vmessout.go 6.4 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229
  1. package vmess
  2. import (
  3. "bytes"
  4. "crypto/md5"
  5. "crypto/rand"
  6. mrand "math/rand"
  7. "net"
  8. "sync"
  9. "github.com/v2ray/v2ray-core/common/alloc"
  10. v2io "github.com/v2ray/v2ray-core/common/io"
  11. "github.com/v2ray/v2ray-core/common/log"
  12. v2net "github.com/v2ray/v2ray-core/common/net"
  13. "github.com/v2ray/v2ray-core/proxy"
  14. "github.com/v2ray/v2ray-core/proxy/vmess/protocol"
  15. "github.com/v2ray/v2ray-core/proxy/vmess/protocol/user"
  16. "github.com/v2ray/v2ray-core/transport/ray"
  17. )
  18. const (
  19. InfoTimeNotSync = "Please check the User ID in your vmess configuration, and make sure the time on your local and remote server are in sync."
  20. )
  21. // VNext is the next Point server in the connection chain.
  22. type VNextServer struct {
  23. Destination v2net.Destination // Address of VNext server
  24. Users []user.User // User accounts for accessing VNext.
  25. }
  26. type VMessOutboundHandler struct {
  27. vNextList []*VNextServer
  28. vNextListUDP []*VNextServer
  29. }
  30. func NewVMessOutboundHandler(vNextList, vNextListUDP []*VNextServer) *VMessOutboundHandler {
  31. return &VMessOutboundHandler{
  32. vNextList: vNextList,
  33. vNextListUDP: vNextListUDP,
  34. }
  35. }
  36. func pickVNext(serverList []*VNextServer) (v2net.Destination, user.User) {
  37. vNextLen := len(serverList)
  38. if vNextLen == 0 {
  39. panic("VMessOut: Zero vNext is configured.")
  40. }
  41. vNextIndex := 0
  42. if vNextLen > 1 {
  43. vNextIndex = mrand.Intn(vNextLen)
  44. }
  45. vNext := serverList[vNextIndex]
  46. vNextUserLen := len(vNext.Users)
  47. if vNextUserLen == 0 {
  48. panic("VMessOut: Zero User account.")
  49. }
  50. vNextUserIndex := 0
  51. if vNextUserLen > 1 {
  52. vNextUserIndex = mrand.Intn(vNextUserLen)
  53. }
  54. vNextUser := vNext.Users[vNextUserIndex]
  55. return vNext.Destination, vNextUser
  56. }
  57. func (handler *VMessOutboundHandler) Dispatch(firstPacket v2net.Packet, ray ray.OutboundRay) error {
  58. vNextList := handler.vNextList
  59. if firstPacket.Destination().IsUDP() {
  60. vNextList = handler.vNextListUDP
  61. }
  62. vNextAddress, vNextUser := pickVNext(vNextList)
  63. command := protocol.CmdTCP
  64. if firstPacket.Destination().IsUDP() {
  65. command = protocol.CmdUDP
  66. }
  67. request := &protocol.VMessRequest{
  68. Version: protocol.Version,
  69. UserId: vNextUser.Id,
  70. Command: command,
  71. Address: firstPacket.Destination().Address(),
  72. }
  73. buffer := make([]byte, 36) // 16 + 16 + 4
  74. rand.Read(buffer)
  75. request.RequestIV = buffer[:16]
  76. request.RequestKey = buffer[16:32]
  77. request.ResponseHeader = buffer[32:]
  78. return startCommunicate(request, vNextAddress, ray, firstPacket)
  79. }
  80. func startCommunicate(request *protocol.VMessRequest, dest v2net.Destination, ray ray.OutboundRay, firstPacket v2net.Packet) error {
  81. conn, err := net.Dial(dest.Network(), dest.Address().String())
  82. if err != nil {
  83. log.Error("Failed to open %s: %v", dest.String(), err)
  84. if ray != nil {
  85. close(ray.OutboundOutput())
  86. }
  87. return err
  88. }
  89. log.Info("VMessOut: Tunneling request to %s via %s", request.Address.String(), dest.String())
  90. defer conn.Close()
  91. input := ray.OutboundInput()
  92. output := ray.OutboundOutput()
  93. var requestFinish, responseFinish sync.Mutex
  94. requestFinish.Lock()
  95. responseFinish.Lock()
  96. go handleRequest(conn, request, firstPacket, input, &requestFinish)
  97. go handleResponse(conn, request, output, &responseFinish, dest.IsUDP())
  98. requestFinish.Lock()
  99. if tcpConn, ok := conn.(*net.TCPConn); ok {
  100. tcpConn.CloseWrite()
  101. }
  102. responseFinish.Lock()
  103. return nil
  104. }
  105. func handleRequest(conn net.Conn, request *protocol.VMessRequest, firstPacket v2net.Packet, input <-chan *alloc.Buffer, finish *sync.Mutex) {
  106. defer finish.Unlock()
  107. encryptRequestWriter, err := v2io.NewAesEncryptWriter(request.RequestKey[:], request.RequestIV[:], conn)
  108. if err != nil {
  109. log.Error("VMessOut: Failed to create encrypt writer: %v", err)
  110. return
  111. }
  112. buffer := alloc.NewBuffer().Clear()
  113. requestBytes, err := request.ToBytes(user.NewTimeHash(user.HMACHash{}), user.GenerateRandomInt64InRange, buffer.Value)
  114. if err != nil {
  115. log.Error("VMessOut: Failed to serialize VMess request: %v", err)
  116. return
  117. }
  118. // Send first packet of payload together with request, in favor of small requests.
  119. firstChunk := firstPacket.Chunk()
  120. moreChunks := firstPacket.MoreChunks()
  121. if firstChunk == nil && moreChunks {
  122. firstChunk, moreChunks = <-input
  123. }
  124. if firstChunk != nil {
  125. encryptRequestWriter.Crypt(firstChunk.Value)
  126. requestBytes = append(requestBytes, firstChunk.Value...)
  127. firstChunk.Release()
  128. _, err = conn.Write(requestBytes)
  129. buffer.Release()
  130. if err != nil {
  131. log.Error("VMessOut: Failed to write VMess request: %v", err)
  132. return
  133. }
  134. }
  135. if moreChunks {
  136. v2net.ChanToWriter(encryptRequestWriter, input)
  137. }
  138. return
  139. }
  140. func handleResponse(conn net.Conn, request *protocol.VMessRequest, output chan<- *alloc.Buffer, finish *sync.Mutex, isUDP bool) {
  141. defer finish.Unlock()
  142. defer close(output)
  143. responseKey := md5.Sum(request.RequestKey[:])
  144. responseIV := md5.Sum(request.RequestIV[:])
  145. decryptResponseReader, err := v2io.NewAesDecryptReader(responseKey[:], responseIV[:], conn)
  146. if err != nil {
  147. log.Error("VMessOut: Failed to create decrypt reader: %v", err)
  148. return
  149. }
  150. buffer, err := v2net.ReadFrom(decryptResponseReader, nil)
  151. if err != nil {
  152. log.Error("VMessOut: Failed to read VMess response (%d bytes): %v", buffer.Len(), err)
  153. return
  154. }
  155. if buffer.Len() < 4 || !bytes.Equal(buffer.Value[:4], request.ResponseHeader[:]) {
  156. log.Warning("VMessOut: unexepcted response header. The connection is probably hijacked.")
  157. return
  158. }
  159. log.Info("VMessOut received %d bytes from %s", buffer.Len()-4, conn.RemoteAddr().String())
  160. buffer.SliceFrom(4)
  161. output <- buffer
  162. if !isUDP {
  163. v2net.ReaderToChan(output, decryptResponseReader)
  164. }
  165. return
  166. }
  167. type VMessOutboundHandlerFactory struct {
  168. }
  169. func (factory *VMessOutboundHandlerFactory) Create(rawConfig interface{}) (proxy.OutboundConnectionHandler, error) {
  170. config := rawConfig.(*VMessOutboundConfig)
  171. servers := make([]*VNextServer, 0, len(config.VNextList))
  172. udpServers := make([]*VNextServer, 0, len(config.VNextList))
  173. for _, server := range config.VNextList {
  174. if server.HasNetwork("tcp") {
  175. aServer, err := server.ToVNextServer("tcp")
  176. if err == nil {
  177. servers = append(servers, aServer)
  178. } else {
  179. log.Warning("Discarding the server.")
  180. }
  181. }
  182. if server.HasNetwork("udp") {
  183. aServer, err := server.ToVNextServer("udp")
  184. if err == nil {
  185. udpServers = append(udpServers, aServer)
  186. } else {
  187. log.Warning("Discarding the server.")
  188. }
  189. }
  190. }
  191. return NewVMessOutboundHandler(servers, udpServers), nil
  192. }
  193. func init() {
  194. proxy.RegisterOutboundConnectionHandlerFactory("vmess", &VMessOutboundHandlerFactory{})
  195. }