vmess.go 5.9 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257
  1. // Package vmess contains protocol definition, io lib for VMess.
  2. package vmess
  3. import (
  4. "crypto/aes"
  5. "crypto/cipher"
  6. "crypto/rand"
  7. "encoding/binary"
  8. "errors"
  9. "fmt"
  10. "io"
  11. mrand "math/rand"
  12. "github.com/v2ray/v2ray-core"
  13. v2io "github.com/v2ray/v2ray-core/io"
  14. v2net "github.com/v2ray/v2ray-core/net"
  15. )
  16. const (
  17. addrTypeIPv4 = byte(0x01)
  18. addrTypeIPv6 = byte(0x03)
  19. addrTypeDomain = byte(0x02)
  20. Version = byte(0x01)
  21. blockSize = 16
  22. )
  23. var (
  24. ErrorInvalidUser = errors.New("Invalid User")
  25. emptyIV = make([]byte, blockSize)
  26. )
  27. // VMessRequest implements the request message of VMess protocol. It only contains
  28. // the header of a request message. The data part will be handled by conection
  29. // handler directly, in favor of data streaming.
  30. type VMessRequest struct {
  31. Version byte
  32. UserId core.ID
  33. RequestIV [16]byte
  34. RequestKey [16]byte
  35. ResponseHeader [4]byte
  36. Command byte
  37. Address v2net.Address
  38. }
  39. type VMessRequestReader struct {
  40. vUserSet *core.UserSet
  41. }
  42. func NewVMessRequestReader(vUserSet *core.UserSet) *VMessRequestReader {
  43. reader := new(VMessRequestReader)
  44. reader.vUserSet = vUserSet
  45. return reader
  46. }
  47. func (r *VMessRequestReader) Read(reader io.Reader) (*VMessRequest, error) {
  48. request := new(VMessRequest)
  49. buffer := make([]byte, 256)
  50. nBytes, err := reader.Read(buffer[0:1])
  51. if err != nil {
  52. return nil, err
  53. }
  54. // TODO: verify version number
  55. request.Version = buffer[0]
  56. nBytes, err = reader.Read(buffer[:len(request.UserId)])
  57. if err != nil {
  58. return nil, err
  59. }
  60. userId, valid := r.vUserSet.IsValidUserId(buffer[:nBytes])
  61. if !valid {
  62. return nil, ErrorInvalidUser
  63. }
  64. request.UserId = *userId
  65. aesCipher, err := aes.NewCipher(userId.Hash([]byte("PWD")))
  66. if err != nil {
  67. return nil, err
  68. }
  69. aesStream := cipher.NewCFBDecrypter(aesCipher, emptyIV)
  70. decryptor := v2io.NewCryptionReader(aesStream, reader)
  71. if err != nil {
  72. return nil, err
  73. }
  74. nBytes, err = decryptor.Read(buffer[0:1])
  75. if err != nil {
  76. return nil, err
  77. }
  78. randomLength := buffer[0]
  79. if randomLength <= 0 || randomLength > 32 {
  80. return nil, fmt.Errorf("Unexpected random length %d", randomLength)
  81. }
  82. _, err = decryptor.Read(buffer[:randomLength])
  83. if err != nil {
  84. return nil, err
  85. }
  86. // TODO: check number of bytes returned
  87. _, err = decryptor.Read(request.RequestIV[:])
  88. if err != nil {
  89. return nil, err
  90. }
  91. _, err = decryptor.Read(request.RequestKey[:])
  92. if err != nil {
  93. return nil, err
  94. }
  95. _, err = decryptor.Read(request.ResponseHeader[:])
  96. if err != nil {
  97. return nil, err
  98. }
  99. _, err = decryptor.Read(buffer[0:1])
  100. if err != nil {
  101. return nil, err
  102. }
  103. request.Command = buffer[0]
  104. _, err = decryptor.Read(buffer[0:2])
  105. if err != nil {
  106. return nil, err
  107. }
  108. port := binary.BigEndian.Uint16(buffer[0:2])
  109. _, err = decryptor.Read(buffer[0:1])
  110. if err != nil {
  111. return nil, err
  112. }
  113. switch buffer[0] {
  114. case addrTypeIPv4:
  115. _, err = decryptor.Read(buffer[1:5])
  116. if err != nil {
  117. return nil, err
  118. }
  119. request.Address = v2net.IPAddress(buffer[1:5], port)
  120. case addrTypeIPv6:
  121. _, err = decryptor.Read(buffer[1:17])
  122. if err != nil {
  123. return nil, err
  124. }
  125. request.Address = v2net.IPAddress(buffer[1:17], port)
  126. case addrTypeDomain:
  127. _, err = decryptor.Read(buffer[1:2])
  128. if err != nil {
  129. return nil, err
  130. }
  131. domainLength := buffer[1]
  132. _, err = decryptor.Read(buffer[2 : 2+domainLength])
  133. if err != nil {
  134. return nil, err
  135. }
  136. request.Address = v2net.DomainAddress(string(buffer[2:2+domainLength]), port)
  137. }
  138. _, err = decryptor.Read(buffer[0:1])
  139. if err != nil {
  140. return nil, err
  141. }
  142. randomLength = buffer[0]
  143. _, err = decryptor.Read(buffer[:randomLength])
  144. if err != nil {
  145. return nil, err
  146. }
  147. return request, nil
  148. }
  149. type VMessRequestWriter struct {
  150. }
  151. func NewVMessRequestWriter() *VMessRequestWriter {
  152. writer := new(VMessRequestWriter)
  153. return writer
  154. }
  155. func (w *VMessRequestWriter) Write(writer io.Writer, request *VMessRequest) error {
  156. buffer := make([]byte, 0, 300)
  157. buffer = append(buffer, request.Version)
  158. buffer = append(buffer, request.UserId.Hash([]byte("ASK"))...)
  159. encryptionBegin := len(buffer)
  160. randomLength := mrand.Intn(32) + 1
  161. randomContent := make([]byte, randomLength)
  162. _, err := rand.Read(randomContent)
  163. if err != nil {
  164. return err
  165. }
  166. buffer = append(buffer, byte(randomLength))
  167. buffer = append(buffer, randomContent...)
  168. buffer = append(buffer, request.RequestIV[:]...)
  169. buffer = append(buffer, request.RequestKey[:]...)
  170. buffer = append(buffer, request.ResponseHeader[:]...)
  171. buffer = append(buffer, request.Command)
  172. portBytes := make([]byte, 2)
  173. binary.BigEndian.PutUint16(portBytes, request.Address.Port)
  174. buffer = append(buffer, portBytes...)
  175. switch {
  176. case request.Address.IsIPv4():
  177. buffer = append(buffer, addrTypeIPv4)
  178. buffer = append(buffer, request.Address.IP...)
  179. case request.Address.IsIPv6():
  180. buffer = append(buffer, addrTypeIPv6)
  181. buffer = append(buffer, request.Address.IP...)
  182. case request.Address.IsDomain():
  183. buffer = append(buffer, addrTypeDomain)
  184. buffer = append(buffer, byte(len(request.Address.Domain)))
  185. buffer = append(buffer, []byte(request.Address.Domain)...)
  186. }
  187. paddingLength := blockSize - 1 - (len(buffer)-encryptionBegin)%blockSize
  188. if paddingLength == 0 {
  189. paddingLength = blockSize
  190. }
  191. paddingBuffer := make([]byte, paddingLength)
  192. _, err = rand.Read(paddingBuffer)
  193. if err != nil {
  194. return err
  195. }
  196. buffer = append(buffer, byte(paddingLength))
  197. buffer = append(buffer, paddingBuffer...)
  198. encryptionEnd := len(buffer)
  199. aesCipher, err := aes.NewCipher(request.UserId.Hash([]byte("PWD")))
  200. if err != nil {
  201. return err
  202. }
  203. aesStream := cipher.NewCFBEncrypter(aesCipher, emptyIV)
  204. cWriter := v2io.NewCryptionWriter(aesStream, writer)
  205. _, err = writer.Write(buffer[0:encryptionBegin])
  206. if err != nil {
  207. return err
  208. }
  209. _, err = cWriter.Write(buffer[encryptionBegin:encryptionEnd])
  210. if err != nil {
  211. return err
  212. }
  213. return nil
  214. }
  215. type VMessResponse [4]byte
  216. func NewVMessResponse(request *VMessRequest) *VMessResponse {
  217. response := new(VMessResponse)
  218. copy(response[:], request.ResponseHeader[:])
  219. return response
  220. }