sniff.go 3.1 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147
  1. package tls
  2. import (
  3. "errors"
  4. "strings"
  5. "v2ray.com/core"
  6. "v2ray.com/core/common/serial"
  7. )
  8. type SniffHeader struct {
  9. domain string
  10. }
  11. func (h *SniffHeader) Protocol() string {
  12. return "tls"
  13. }
  14. func (h *SniffHeader) Domain() string {
  15. return h.domain
  16. }
  17. var errNotTLS = errors.New("not TLS header")
  18. var errNotClientHello = errors.New("not client hello")
  19. func IsValidTLSVersion(major, minor byte) bool {
  20. return major == 3
  21. }
  22. // ReadClientHello returns server name (if any) from TLS client hello message.
  23. // https://github.com/golang/go/blob/master/src/crypto/tls/handshake_messages.go#L300
  24. func ReadClientHello(data []byte, h *SniffHeader) error {
  25. if len(data) < 42 {
  26. return core.ErrNoClue
  27. }
  28. sessionIDLen := int(data[38])
  29. if sessionIDLen > 32 || len(data) < 39+sessionIDLen {
  30. return core.ErrNoClue
  31. }
  32. data = data[39+sessionIDLen:]
  33. if len(data) < 2 {
  34. return core.ErrNoClue
  35. }
  36. // cipherSuiteLen is the number of bytes of cipher suite numbers. Since
  37. // they are uint16s, the number must be even.
  38. cipherSuiteLen := int(data[0])<<8 | int(data[1])
  39. if cipherSuiteLen%2 == 1 || len(data) < 2+cipherSuiteLen {
  40. return errNotClientHello
  41. }
  42. data = data[2+cipherSuiteLen:]
  43. if len(data) < 1 {
  44. return core.ErrNoClue
  45. }
  46. compressionMethodsLen := int(data[0])
  47. if len(data) < 1+compressionMethodsLen {
  48. return core.ErrNoClue
  49. }
  50. data = data[1+compressionMethodsLen:]
  51. if len(data) == 0 {
  52. return errNotClientHello
  53. }
  54. if len(data) < 2 {
  55. return errNotClientHello
  56. }
  57. extensionsLength := int(data[0])<<8 | int(data[1])
  58. data = data[2:]
  59. if extensionsLength != len(data) {
  60. return errNotClientHello
  61. }
  62. for len(data) != 0 {
  63. if len(data) < 4 {
  64. return errNotClientHello
  65. }
  66. extension := uint16(data[0])<<8 | uint16(data[1])
  67. length := int(data[2])<<8 | int(data[3])
  68. data = data[4:]
  69. if len(data) < length {
  70. return errNotClientHello
  71. }
  72. switch extension {
  73. case 0x00: /* extensionServerName */
  74. d := data[:length]
  75. if len(d) < 2 {
  76. return errNotClientHello
  77. }
  78. namesLen := int(d[0])<<8 | int(d[1])
  79. d = d[2:]
  80. if len(d) != namesLen {
  81. return errNotClientHello
  82. }
  83. for len(d) > 0 {
  84. if len(d) < 3 {
  85. return errNotClientHello
  86. }
  87. nameType := d[0]
  88. nameLen := int(d[1])<<8 | int(d[2])
  89. d = d[3:]
  90. if len(d) < nameLen {
  91. return errNotClientHello
  92. }
  93. if nameType == 0 {
  94. serverName := string(d[:nameLen])
  95. // An SNI value may not include a
  96. // trailing dot. See
  97. // https://tools.ietf.org/html/rfc6066#section-3.
  98. if strings.HasSuffix(serverName, ".") {
  99. return errNotClientHello
  100. }
  101. h.domain = serverName
  102. return nil
  103. }
  104. d = d[nameLen:]
  105. }
  106. }
  107. data = data[length:]
  108. }
  109. return errNotTLS
  110. }
  111. func SniffTLS(b []byte) (*SniffHeader, error) {
  112. if len(b) < 5 {
  113. return nil, core.ErrNoClue
  114. }
  115. if b[0] != 0x16 /* TLS Handshake */ {
  116. return nil, errNotTLS
  117. }
  118. if !IsValidTLSVersion(b[1], b[2]) {
  119. return nil, errNotTLS
  120. }
  121. headerLen := int(serial.BytesToUint16(b[3:5]))
  122. if 5+headerLen > len(b) {
  123. return nil, core.ErrNoClue
  124. }
  125. h := &SniffHeader{}
  126. err := ReadClientHello(b[5:5+headerLen], h)
  127. if err == nil {
  128. return h, nil
  129. }
  130. return nil, err
  131. }