vmessout.go 4.9 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173
  1. package vmess
  2. import (
  3. "bytes"
  4. "crypto/md5"
  5. "crypto/rand"
  6. mrand "math/rand"
  7. "net"
  8. "github.com/v2ray/v2ray-core"
  9. v2hash "github.com/v2ray/v2ray-core/hash"
  10. v2io "github.com/v2ray/v2ray-core/io"
  11. vmessio "github.com/v2ray/v2ray-core/io/vmess"
  12. "github.com/v2ray/v2ray-core/log"
  13. v2math "github.com/v2ray/v2ray-core/math"
  14. v2net "github.com/v2ray/v2ray-core/net"
  15. )
  16. // VNext is the next Point server in the connection chain.
  17. type VNextServer struct {
  18. Address v2net.Address // Address of VNext server
  19. Users []core.User // User accounts for accessing VNext.
  20. }
  21. type VMessOutboundHandler struct {
  22. vPoint *core.Point
  23. dest v2net.Address
  24. vNextList []VNextServer
  25. }
  26. func NewVMessOutboundHandler(vp *core.Point, vNextList []VNextServer, dest v2net.Address) *VMessOutboundHandler {
  27. return &VMessOutboundHandler{
  28. vPoint: vp,
  29. dest: dest,
  30. vNextList: vNextList,
  31. }
  32. }
  33. func (handler *VMessOutboundHandler) pickVNext() (v2net.Address, core.User) {
  34. vNextLen := len(handler.vNextList)
  35. if vNextLen == 0 {
  36. panic("VMessOut: Zero vNext is configured.")
  37. }
  38. vNextIndex := mrand.Intn(vNextLen)
  39. vNext := handler.vNextList[vNextIndex]
  40. vNextUserLen := len(vNext.Users)
  41. if vNextUserLen == 0 {
  42. panic("VMessOut: Zero User account.")
  43. }
  44. vNextUserIndex := mrand.Intn(vNextUserLen)
  45. vNextUser := vNext.Users[vNextUserIndex]
  46. return vNext.Address, vNextUser
  47. }
  48. func (handler *VMessOutboundHandler) Start(ray core.OutboundRay) error {
  49. vNextAddress, vNextUser := handler.pickVNext()
  50. request := &vmessio.VMessRequest{
  51. Version: vmessio.Version,
  52. UserId: vNextUser.Id,
  53. Command: byte(0x01),
  54. Address: handler.dest,
  55. }
  56. rand.Read(request.RequestIV[:])
  57. rand.Read(request.RequestKey[:])
  58. rand.Read(request.ResponseHeader[:])
  59. go startCommunicate(request, vNextAddress, ray)
  60. return nil
  61. }
  62. func startCommunicate(request *vmessio.VMessRequest, dest v2net.Address, ray core.OutboundRay) error {
  63. input := ray.OutboundInput()
  64. output := ray.OutboundOutput()
  65. conn, err := net.DialTCP("tcp", nil, &net.TCPAddr{dest.IP, int(dest.Port), ""})
  66. if err != nil {
  67. log.Error("Failed to open tcp (%s): %v", dest.String(), err)
  68. close(output)
  69. return err
  70. }
  71. log.Info("VMessOut: Tunneling request for %s", request.Address.String())
  72. defer conn.Close()
  73. requestFinish := make(chan bool)
  74. responseFinish := make(chan bool)
  75. go handleRequest(conn, request, input, requestFinish)
  76. go handleResponse(conn, request, output, responseFinish)
  77. <-requestFinish
  78. conn.CloseWrite()
  79. <-responseFinish
  80. return nil
  81. }
  82. func handleRequest(conn *net.TCPConn, request *vmessio.VMessRequest, input <-chan []byte, finish chan<- bool) {
  83. defer close(finish)
  84. encryptRequestWriter, err := v2io.NewAesEncryptWriter(request.RequestKey[:], request.RequestIV[:], conn)
  85. if err != nil {
  86. log.Error("VMessOut: Failed to create encrypt writer: %v", err)
  87. return
  88. }
  89. buffer, err := request.ToBytes(v2hash.NewTimeHash(v2hash.HMACHash{}), v2math.GenerateRandomInt64InRange)
  90. if err != nil {
  91. log.Error("VMessOut: Failed to serialize VMess request: %v", err)
  92. return
  93. }
  94. // Send first packet of payload together with request, in favor of small requests.
  95. payload, open := <-input
  96. if open {
  97. encryptRequestWriter.Crypt(payload)
  98. buffer = append(buffer, payload...)
  99. _, err = conn.Write(buffer)
  100. if err != nil {
  101. log.Error("VMessOut: Failed to write VMess request: %v", err)
  102. return
  103. }
  104. v2net.ChanToWriter(encryptRequestWriter, input)
  105. }
  106. return
  107. }
  108. func handleResponse(conn *net.TCPConn, request *vmessio.VMessRequest, output chan<- []byte, finish chan<- bool) {
  109. defer close(finish)
  110. defer close(output)
  111. responseKey := md5.Sum(request.RequestKey[:])
  112. responseIV := md5.Sum(request.RequestIV[:])
  113. decryptResponseReader, err := v2io.NewAesDecryptReader(responseKey[:], responseIV[:], conn)
  114. if err != nil {
  115. log.Error("VMessOut: Failed to create decrypt reader: %v", err)
  116. return
  117. }
  118. response := vmessio.VMessResponse{}
  119. nBytes, err := decryptResponseReader.Read(response[:])
  120. if err != nil {
  121. log.Error("VMessOut: Failed to read VMess response (%d bytes): %v", nBytes, err)
  122. return
  123. }
  124. if !bytes.Equal(response[:], request.ResponseHeader[:]) {
  125. log.Warning("VMessOut: unexepcted response header. The connection is probably hijacked.")
  126. return
  127. }
  128. v2net.ReaderToChan(output, decryptResponseReader)
  129. return
  130. }
  131. type VMessOutboundHandlerFactory struct {
  132. }
  133. func (factory *VMessOutboundHandlerFactory) Create(vp *core.Point, rawConfig []byte, destination v2net.Address) (core.OutboundConnectionHandler, error) {
  134. config, err := loadOutboundConfig(rawConfig)
  135. if err != nil {
  136. panic(log.Error("Failed to load VMess outbound config: %v", err))
  137. }
  138. servers := make([]VNextServer, 0, len(config.VNextList))
  139. for _, server := range config.VNextList {
  140. servers = append(servers, server.ToVNextServer())
  141. }
  142. return NewVMessOutboundHandler(vp, servers, destination), nil
  143. }
  144. func init() {
  145. core.RegisterOutboundConnectionHandlerFactory("vmess", &VMessOutboundHandlerFactory{})
  146. }