vmessin.go 4.4 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162
  1. package vmess
  2. import (
  3. "crypto/md5"
  4. "io"
  5. "net"
  6. "sync"
  7. "github.com/v2ray/v2ray-core/app"
  8. "github.com/v2ray/v2ray-core/common/alloc"
  9. v2io "github.com/v2ray/v2ray-core/common/io"
  10. "github.com/v2ray/v2ray-core/common/log"
  11. v2net "github.com/v2ray/v2ray-core/common/net"
  12. "github.com/v2ray/v2ray-core/common/retry"
  13. "github.com/v2ray/v2ray-core/proxy"
  14. "github.com/v2ray/v2ray-core/proxy/vmess/protocol"
  15. "github.com/v2ray/v2ray-core/proxy/vmess/protocol/user"
  16. )
  17. type VMessInboundHandler struct {
  18. dispatcher app.PacketDispatcher
  19. clients user.UserSet
  20. accepting bool
  21. udpEnabled bool
  22. }
  23. func NewVMessInboundHandler(dispatcher app.PacketDispatcher, clients user.UserSet, udpEnabled bool) *VMessInboundHandler {
  24. return &VMessInboundHandler{
  25. dispatcher: dispatcher,
  26. clients: clients,
  27. udpEnabled: udpEnabled,
  28. }
  29. }
  30. func (handler *VMessInboundHandler) Listen(port uint16) error {
  31. listener, err := net.ListenTCP("tcp", &net.TCPAddr{
  32. IP: []byte{0, 0, 0, 0},
  33. Port: int(port),
  34. Zone: "",
  35. })
  36. if err != nil {
  37. log.Error("Unable to listen tcp port %d: %v", port, err)
  38. return err
  39. }
  40. handler.accepting = true
  41. go handler.AcceptConnections(listener)
  42. if handler.udpEnabled {
  43. handler.ListenUDP(port)
  44. }
  45. return nil
  46. }
  47. func (handler *VMessInboundHandler) AcceptConnections(listener *net.TCPListener) error {
  48. for handler.accepting {
  49. retry.Timed(100 /* times */, 100 /* ms */).On(func() error {
  50. connection, err := listener.AcceptTCP()
  51. if err != nil {
  52. log.Error("Failed to accpet connection: %s", err.Error())
  53. return err
  54. }
  55. go handler.HandleConnection(connection)
  56. return nil
  57. })
  58. }
  59. return nil
  60. }
  61. func (handler *VMessInboundHandler) HandleConnection(connection *net.TCPConn) error {
  62. defer connection.Close()
  63. connReader := v2net.NewTimeOutReader(120, connection)
  64. requestReader := protocol.NewVMessRequestReader(handler.clients)
  65. request, err := requestReader.Read(connReader)
  66. if err != nil {
  67. log.Access(connection.RemoteAddr().String(), "", log.AccessRejected, err.Error())
  68. log.Warning("VMessIn: Invalid request from (%s): %v", connection.RemoteAddr().String(), err)
  69. return err
  70. }
  71. log.Access(connection.RemoteAddr().String(), request.Address.String(), log.AccessAccepted, "")
  72. log.Debug("VMessIn: Received request for %s", request.Address.String())
  73. ray := handler.dispatcher.DispatchToOutbound(v2net.NewPacket(request.Destination(), nil, true))
  74. input := ray.InboundInput()
  75. output := ray.InboundOutput()
  76. var readFinish, writeFinish sync.Mutex
  77. readFinish.Lock()
  78. writeFinish.Lock()
  79. go handleInput(request, connReader, input, &readFinish)
  80. responseKey := md5.Sum(request.RequestKey)
  81. responseIV := md5.Sum(request.RequestIV)
  82. responseWriter, err := v2io.NewAesEncryptWriter(responseKey[:], responseIV[:], connection)
  83. if err != nil {
  84. log.Error("VMessIn: Failed to create encrypt writer: %v", err)
  85. return err
  86. }
  87. // Optimize for small response packet
  88. buffer := alloc.NewLargeBuffer().Clear()
  89. buffer.Append(request.ResponseHeader)
  90. if data, open := <-output; open {
  91. buffer.Append(data.Value)
  92. data.Release()
  93. responseWriter.Write(buffer.Value)
  94. buffer.Release()
  95. go handleOutput(request, responseWriter, output, &writeFinish)
  96. writeFinish.Lock()
  97. }
  98. connection.CloseWrite()
  99. readFinish.Lock()
  100. return nil
  101. }
  102. func handleInput(request *protocol.VMessRequest, reader io.Reader, input chan<- *alloc.Buffer, finish *sync.Mutex) {
  103. defer close(input)
  104. defer finish.Unlock()
  105. requestReader, err := v2io.NewAesDecryptReader(request.RequestKey, request.RequestIV, reader)
  106. if err != nil {
  107. log.Error("VMessIn: Failed to create decrypt reader: %v", err)
  108. return
  109. }
  110. v2net.ReaderToChan(input, requestReader)
  111. }
  112. func handleOutput(request *protocol.VMessRequest, writer io.Writer, output <-chan *alloc.Buffer, finish *sync.Mutex) {
  113. v2net.ChanToWriter(writer, output)
  114. finish.Unlock()
  115. }
  116. type VMessInboundHandlerFactory struct {
  117. }
  118. func (factory *VMessInboundHandlerFactory) Create(dispatcher app.PacketDispatcher, rawConfig interface{}) (proxy.InboundConnectionHandler, error) {
  119. config := rawConfig.(*VMessInboundConfig)
  120. allowedClients := user.NewTimedUserSet()
  121. for _, client := range config.AllowedClients {
  122. user, err := client.ToUser()
  123. if err != nil {
  124. log.Error("VMessIn: Failed to parse user id %s: %v", client.Id, err)
  125. return nil, err
  126. }
  127. allowedClients.AddUser(user)
  128. }
  129. return NewVMessInboundHandler(dispatcher, allowedClients, config.UDPEnabled), nil
  130. }
  131. func init() {
  132. proxy.RegisterInboundConnectionHandlerFactory("vmess", &VMessInboundHandlerFactory{})
  133. }