vmess.go 5.8 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248
  1. // Package vmess contains protocol definition, io lib for VMess.
  2. package vmess
  3. import (
  4. "crypto/aes"
  5. "crypto/cipher"
  6. "crypto/rand"
  7. "encoding/binary"
  8. "errors"
  9. "fmt"
  10. "io"
  11. _ "log"
  12. mrand "math/rand"
  13. "github.com/v2ray/v2ray-core"
  14. v2io "github.com/v2ray/v2ray-core/io"
  15. v2net "github.com/v2ray/v2ray-core/net"
  16. )
  17. const (
  18. addrTypeIPv4 = byte(0x01)
  19. addrTypeIPv6 = byte(0x03)
  20. addrTypeDomain = byte(0x02)
  21. Version = byte(0x01)
  22. )
  23. var (
  24. ErrorInvalidUser = errors.New("Invalid User")
  25. )
  26. // VMessRequest implements the request message of VMess protocol. It only contains
  27. // the header of a request message. The data part will be handled by conection
  28. // handler directly, in favor of data streaming.
  29. type VMessRequest struct {
  30. Version byte
  31. UserId core.VID
  32. RequestIV [16]byte
  33. RequestKey [16]byte
  34. ResponseHeader [4]byte
  35. Command byte
  36. Address v2net.VAddress
  37. }
  38. type VMessRequestReader struct {
  39. vUserSet *core.VUserSet
  40. }
  41. func NewVMessRequestReader(vUserSet *core.VUserSet) *VMessRequestReader {
  42. reader := new(VMessRequestReader)
  43. reader.vUserSet = vUserSet
  44. return reader
  45. }
  46. func (r *VMessRequestReader) Read(reader io.Reader) (*VMessRequest, error) {
  47. request := new(VMessRequest)
  48. buffer := make([]byte, 256)
  49. nBytes, err := reader.Read(buffer[0:1])
  50. if err != nil {
  51. return nil, err
  52. }
  53. // TODO: verify version number
  54. request.Version = buffer[0]
  55. nBytes, err = reader.Read(buffer[:len(request.UserId)])
  56. if err != nil {
  57. return nil, err
  58. }
  59. userId, valid := r.vUserSet.IsValidUserId(buffer[:nBytes])
  60. if !valid {
  61. return nil, ErrorInvalidUser
  62. }
  63. request.UserId = *userId
  64. decryptor, err := NewDecryptionReader(reader, userId.Hash([]byte("PWD")), make([]byte, blockSize))
  65. if err != nil {
  66. return nil, err
  67. }
  68. nBytes, err = decryptor.Read(buffer[0:1])
  69. if err != nil {
  70. return nil, err
  71. }
  72. randomLength := buffer[0]
  73. if randomLength <= 0 || randomLength > 32 {
  74. return nil, fmt.Errorf("Unexpected random length %d", randomLength)
  75. }
  76. _, err = decryptor.Read(buffer[:randomLength])
  77. if err != nil {
  78. return nil, err
  79. }
  80. // TODO: check number of bytes returned
  81. _, err = decryptor.Read(request.RequestIV[:])
  82. if err != nil {
  83. return nil, err
  84. }
  85. _, err = decryptor.Read(request.RequestKey[:])
  86. if err != nil {
  87. return nil, err
  88. }
  89. _, err = decryptor.Read(request.ResponseHeader[:])
  90. if err != nil {
  91. return nil, err
  92. }
  93. _, err = decryptor.Read(buffer[0:1])
  94. if err != nil {
  95. return nil, err
  96. }
  97. request.Command = buffer[0]
  98. _, err = decryptor.Read(buffer[0:2])
  99. if err != nil {
  100. return nil, err
  101. }
  102. port := binary.BigEndian.Uint16(buffer[0:2])
  103. _, err = decryptor.Read(buffer[0:1])
  104. if err != nil {
  105. return nil, err
  106. }
  107. switch buffer[0] {
  108. case addrTypeIPv4:
  109. _, err = decryptor.Read(buffer[1:5])
  110. if err != nil {
  111. return nil, err
  112. }
  113. request.Address = v2net.IPAddress(buffer[1:5], port)
  114. case addrTypeIPv6:
  115. _, err = decryptor.Read(buffer[1:17])
  116. if err != nil {
  117. return nil, err
  118. }
  119. request.Address = v2net.IPAddress(buffer[1:17], port)
  120. case addrTypeDomain:
  121. _, err = decryptor.Read(buffer[1:2])
  122. if err != nil {
  123. return nil, err
  124. }
  125. domainLength := buffer[1]
  126. _, err = decryptor.Read(buffer[2 : 2+domainLength])
  127. if err != nil {
  128. return nil, err
  129. }
  130. request.Address = v2net.DomainAddress(string(buffer[2:2+domainLength]), port)
  131. }
  132. _, err = decryptor.Read(buffer[0:1])
  133. if err != nil {
  134. return nil, err
  135. }
  136. randomLength = buffer[0]
  137. _, err = decryptor.Read(buffer[:randomLength])
  138. if err != nil {
  139. return nil, err
  140. }
  141. return request, nil
  142. }
  143. type VMessRequestWriter struct {
  144. }
  145. func NewVMessRequestWriter() *VMessRequestWriter {
  146. writer := new(VMessRequestWriter)
  147. return writer
  148. }
  149. func (w *VMessRequestWriter) Write(writer io.Writer, request *VMessRequest) error {
  150. buffer := make([]byte, 0, 300)
  151. buffer = append(buffer, request.Version)
  152. buffer = append(buffer, request.UserId.Hash([]byte("ASK"))...)
  153. encryptionBegin := len(buffer)
  154. randomLength := mrand.Intn(32) + 1
  155. randomContent := make([]byte, randomLength)
  156. _, err := rand.Read(randomContent)
  157. if err != nil {
  158. return err
  159. }
  160. buffer = append(buffer, byte(randomLength))
  161. buffer = append(buffer, randomContent...)
  162. buffer = append(buffer, request.RequestIV[:]...)
  163. buffer = append(buffer, request.RequestKey[:]...)
  164. buffer = append(buffer, request.ResponseHeader[:]...)
  165. buffer = append(buffer, request.Command)
  166. portBytes := make([]byte, 2)
  167. binary.BigEndian.PutUint16(portBytes, request.Address.Port)
  168. buffer = append(buffer, portBytes...)
  169. switch {
  170. case request.Address.IsIPv4():
  171. buffer = append(buffer, addrTypeIPv4)
  172. buffer = append(buffer, request.Address.IP...)
  173. case request.Address.IsIPv6():
  174. buffer = append(buffer, addrTypeIPv6)
  175. buffer = append(buffer, request.Address.IP...)
  176. case request.Address.IsDomain():
  177. buffer = append(buffer, addrTypeDomain)
  178. buffer = append(buffer, byte(len(request.Address.Domain)))
  179. buffer = append(buffer, []byte(request.Address.Domain)...)
  180. }
  181. paddingLength := blockSize - 1 - (len(buffer)-encryptionBegin)%blockSize
  182. if paddingLength == 0 {
  183. paddingLength = blockSize
  184. }
  185. paddingBuffer := make([]byte, paddingLength)
  186. _, err = rand.Read(paddingBuffer)
  187. if err != nil {
  188. return err
  189. }
  190. buffer = append(buffer, byte(paddingLength))
  191. buffer = append(buffer, paddingBuffer...)
  192. encryptionEnd := len(buffer)
  193. aesCipher, err := aes.NewCipher(request.UserId.Hash([]byte("PWD")))
  194. if err != nil {
  195. return err
  196. }
  197. aesStream := cipher.NewCFBEncrypter(aesCipher, make([]byte, blockSize))
  198. cWriter := v2io.NewCryptionWriter(aesStream, writer)
  199. _, err = writer.Write(buffer[0:encryptionBegin])
  200. if err != nil {
  201. return err
  202. }
  203. _, err = cWriter.Write(buffer[encryptionBegin:encryptionEnd])
  204. if err != nil {
  205. return err
  206. }
  207. return nil
  208. }
  209. type VMessResponse [4]byte
  210. func NewVMessResponse(request *VMessRequest) *VMessResponse {
  211. response := new(VMessResponse)
  212. copy(response[:], request.ResponseHeader[:])
  213. return response
  214. }