socks.go 5.4 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195
  1. package socks
  2. import (
  3. _ "bufio"
  4. "errors"
  5. "io"
  6. "net"
  7. "strconv"
  8. "github.com/v2ray/v2ray-core"
  9. "github.com/v2ray/v2ray-core/common/log"
  10. v2net "github.com/v2ray/v2ray-core/common/net"
  11. protocol "github.com/v2ray/v2ray-core/proxy/socks/protocol"
  12. )
  13. var (
  14. ErrorAuthenticationFailed = errors.New("None of the authentication methods is allowed.")
  15. ErrorCommandNotSupported = errors.New("Client requested an unsupported command.")
  16. ErrorInvalidUser = errors.New("Invalid username or password.")
  17. )
  18. // SocksServer is a SOCKS 5 proxy server
  19. type SocksServer struct {
  20. accepting bool
  21. vPoint *core.Point
  22. config SocksConfig
  23. }
  24. func NewSocksServer(vp *core.Point, rawConfig []byte) *SocksServer {
  25. config, err := loadConfig(rawConfig)
  26. if err != nil {
  27. panic(log.Error("Unable to load socks config: %v", err))
  28. }
  29. return &SocksServer{
  30. vPoint: vp,
  31. config: config,
  32. }
  33. }
  34. func (server *SocksServer) Listen(port uint16) error {
  35. listener, err := net.Listen("tcp", ":"+strconv.Itoa(int(port)))
  36. if err != nil {
  37. log.Error("Error on listening port %d: %v", port, err)
  38. return err
  39. }
  40. log.Debug("Working on tcp:%d", port)
  41. server.accepting = true
  42. go server.AcceptConnections(listener)
  43. return nil
  44. }
  45. func (server *SocksServer) AcceptConnections(listener net.Listener) {
  46. for server.accepting {
  47. connection, err := listener.Accept()
  48. if err != nil {
  49. log.Error("Error on accepting socks connection: %v", err)
  50. }
  51. go server.HandleConnection(connection)
  52. }
  53. }
  54. func (server *SocksServer) HandleConnection(connection net.Conn) error {
  55. defer connection.Close()
  56. reader := connection.(io.Reader)
  57. auth, auth4, err := protocol.ReadAuthentication(reader)
  58. if err != nil && err != protocol.ErrorSocksVersion4 {
  59. log.Error("Error on reading authentication: %v", err)
  60. return err
  61. }
  62. var dest v2net.Destination
  63. // TODO refactor this part
  64. if err == protocol.ErrorSocksVersion4 {
  65. result := protocol.Socks4RequestGranted
  66. if auth4.Command == protocol.CmdBind {
  67. result = protocol.Socks4RequestRejected
  68. }
  69. socks4Response := protocol.NewSocks4AuthenticationResponse(result, auth4.Port, auth4.IP[:])
  70. protocol.WriteSocks4AuthenticationResponse(connection, socks4Response)
  71. if result == protocol.Socks4RequestRejected {
  72. return ErrorCommandNotSupported
  73. }
  74. dest = v2net.NewTCPDestination(v2net.IPAddress(auth4.IP[:], auth4.Port))
  75. } else {
  76. expectedAuthMethod := protocol.AuthNotRequired
  77. if server.config.AuthMethod == JsonAuthMethodUserPass {
  78. expectedAuthMethod = protocol.AuthUserPass
  79. }
  80. if !auth.HasAuthMethod(expectedAuthMethod) {
  81. authResponse := protocol.NewAuthenticationResponse(protocol.AuthNoMatchingMethod)
  82. err = protocol.WriteAuthentication(connection, authResponse)
  83. if err != nil {
  84. log.Error("Error on socksio write authentication: %v", err)
  85. return err
  86. }
  87. log.Warning("Client doesn't support allowed any auth methods.")
  88. return ErrorAuthenticationFailed
  89. }
  90. authResponse := protocol.NewAuthenticationResponse(expectedAuthMethod)
  91. err = protocol.WriteAuthentication(connection, authResponse)
  92. if err != nil {
  93. log.Error("Error on socksio write authentication: %v", err)
  94. return err
  95. }
  96. if server.config.AuthMethod == JsonAuthMethodUserPass {
  97. upRequest, err := protocol.ReadUserPassRequest(reader)
  98. if err != nil {
  99. log.Error("Failed to read username and password: %v", err)
  100. return err
  101. }
  102. status := byte(0)
  103. if !upRequest.IsValid(server.config.Username, server.config.Password) {
  104. status = byte(0xFF)
  105. }
  106. upResponse := protocol.NewSocks5UserPassResponse(status)
  107. err = protocol.WriteUserPassResponse(connection, upResponse)
  108. if err != nil {
  109. log.Error("Error on socksio write user pass response: %v", err)
  110. return err
  111. }
  112. if status != byte(0) {
  113. return ErrorInvalidUser
  114. }
  115. }
  116. request, err := protocol.ReadRequest(reader)
  117. if err != nil {
  118. log.Error("Error on reading socks request: %v", err)
  119. return err
  120. }
  121. response := protocol.NewSocks5Response()
  122. if request.Command == protocol.CmdBind || request.Command == protocol.CmdUdpAssociate {
  123. response := protocol.NewSocks5Response()
  124. response.Error = protocol.ErrorCommandNotSupported
  125. err = protocol.WriteResponse(connection, response)
  126. if err != nil {
  127. log.Error("Error on socksio write response: %v", err)
  128. return err
  129. }
  130. log.Warning("Unsupported socks command %d", request.Command)
  131. return ErrorCommandNotSupported
  132. }
  133. response.Error = protocol.ErrorSuccess
  134. response.Port = request.Port
  135. response.AddrType = request.AddrType
  136. switch response.AddrType {
  137. case protocol.AddrTypeIPv4:
  138. copy(response.IPv4[:], request.IPv4[:])
  139. case protocol.AddrTypeIPv6:
  140. copy(response.IPv6[:], request.IPv6[:])
  141. case protocol.AddrTypeDomain:
  142. response.Domain = request.Domain
  143. }
  144. err = protocol.WriteResponse(connection, response)
  145. if err != nil {
  146. log.Error("Error on socksio write response: %v", err)
  147. return err
  148. }
  149. dest = request.Destination()
  150. }
  151. ray := server.vPoint.DispatchToOutbound(v2net.NewTCPPacket(dest))
  152. input := ray.InboundInput()
  153. output := ray.InboundOutput()
  154. readFinish := make(chan bool)
  155. writeFinish := make(chan bool)
  156. go dumpInput(reader, input, readFinish)
  157. go dumpOutput(connection, output, writeFinish)
  158. <-writeFinish
  159. return nil
  160. }
  161. func dumpInput(reader io.Reader, input chan<- []byte, finish chan<- bool) {
  162. v2net.ReaderToChan(input, reader)
  163. close(input)
  164. close(finish)
  165. }
  166. func dumpOutput(writer io.Writer, output <-chan []byte, finish chan<- bool) {
  167. v2net.ChanToWriter(writer, output)
  168. close(finish)
  169. }