vmessout.go 6.1 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214
  1. package vmess
  2. import (
  3. "bytes"
  4. "crypto/md5"
  5. "crypto/rand"
  6. mrand "math/rand"
  7. "net"
  8. "sync"
  9. "github.com/v2ray/v2ray-core/common/alloc"
  10. v2io "github.com/v2ray/v2ray-core/common/io"
  11. "github.com/v2ray/v2ray-core/common/log"
  12. v2net "github.com/v2ray/v2ray-core/common/net"
  13. "github.com/v2ray/v2ray-core/proxy"
  14. "github.com/v2ray/v2ray-core/proxy/vmess/config"
  15. "github.com/v2ray/v2ray-core/proxy/vmess/protocol"
  16. "github.com/v2ray/v2ray-core/proxy/vmess/protocol/user"
  17. "github.com/v2ray/v2ray-core/transport/ray"
  18. )
  19. const (
  20. InfoTimeNotSync = "Please check the User ID in your vmess configuration, and make sure the time on your local and remote server are in sync."
  21. )
  22. type VMessOutboundHandler struct {
  23. vNextList []*config.OutboundTarget
  24. vNextListUDP []*config.OutboundTarget
  25. }
  26. func NewVMessOutboundHandler(vNextList, vNextListUDP []*config.OutboundTarget) *VMessOutboundHandler {
  27. return &VMessOutboundHandler{
  28. vNextList: vNextList,
  29. vNextListUDP: vNextListUDP,
  30. }
  31. }
  32. func pickVNext(serverList []*config.OutboundTarget) (v2net.Destination, config.User) {
  33. vNextLen := len(serverList)
  34. if vNextLen == 0 {
  35. panic("VMessOut: Zero vNext is configured.")
  36. }
  37. vNextIndex := 0
  38. if vNextLen > 1 {
  39. vNextIndex = mrand.Intn(vNextLen)
  40. }
  41. vNext := serverList[vNextIndex]
  42. vNextUserLen := len(vNext.Accounts)
  43. if vNextUserLen == 0 {
  44. panic("VMessOut: Zero User account.")
  45. }
  46. vNextUserIndex := 0
  47. if vNextUserLen > 1 {
  48. vNextUserIndex = mrand.Intn(vNextUserLen)
  49. }
  50. vNextUser := vNext.Accounts[vNextUserIndex]
  51. return vNext.Destination, vNextUser
  52. }
  53. func (handler *VMessOutboundHandler) Dispatch(firstPacket v2net.Packet, ray ray.OutboundRay) error {
  54. vNextList := handler.vNextList
  55. if firstPacket.Destination().IsUDP() {
  56. vNextList = handler.vNextListUDP
  57. }
  58. vNextAddress, vNextUser := pickVNext(vNextList)
  59. command := protocol.CmdTCP
  60. if firstPacket.Destination().IsUDP() {
  61. command = protocol.CmdUDP
  62. }
  63. request := &protocol.VMessRequest{
  64. Version: protocol.Version,
  65. UserId: *vNextUser.ID(),
  66. Command: command,
  67. Address: firstPacket.Destination().Address(),
  68. }
  69. buffer := alloc.NewSmallBuffer()
  70. defer buffer.Release()
  71. v2net.ReadAllBytes(rand.Reader, buffer.Value[:36]) // 16 + 16 + 4
  72. request.RequestIV = buffer.Value[:16]
  73. request.RequestKey = buffer.Value[16:32]
  74. request.ResponseHeader = buffer.Value[32:36]
  75. return startCommunicate(request, vNextAddress, ray, firstPacket)
  76. }
  77. func startCommunicate(request *protocol.VMessRequest, dest v2net.Destination, ray ray.OutboundRay, firstPacket v2net.Packet) error {
  78. conn, err := net.Dial(dest.Network(), dest.Address().String())
  79. if err != nil {
  80. log.Error("Failed to open %s: %v", dest.String(), err)
  81. if ray != nil {
  82. close(ray.OutboundOutput())
  83. }
  84. return err
  85. }
  86. log.Info("VMessOut: Tunneling request to %s via %s", request.Address.String(), dest.String())
  87. defer conn.Close()
  88. input := ray.OutboundInput()
  89. output := ray.OutboundOutput()
  90. var requestFinish, responseFinish sync.Mutex
  91. requestFinish.Lock()
  92. responseFinish.Lock()
  93. go handleRequest(conn, request, firstPacket, input, &requestFinish)
  94. go handleResponse(conn, request, output, &responseFinish, dest.IsUDP())
  95. requestFinish.Lock()
  96. if tcpConn, ok := conn.(*net.TCPConn); ok {
  97. tcpConn.CloseWrite()
  98. }
  99. responseFinish.Lock()
  100. return nil
  101. }
  102. func handleRequest(conn net.Conn, request *protocol.VMessRequest, firstPacket v2net.Packet, input <-chan *alloc.Buffer, finish *sync.Mutex) {
  103. defer finish.Unlock()
  104. encryptRequestWriter, err := v2io.NewAesEncryptWriter(request.RequestKey[:], request.RequestIV[:], conn)
  105. if err != nil {
  106. log.Error("VMessOut: Failed to create encrypt writer: %v", err)
  107. return
  108. }
  109. buffer := alloc.NewBuffer().Clear()
  110. buffer, err = request.ToBytes(user.NewTimeHash(user.HMACHash{}), user.GenerateRandomInt64InRange, buffer)
  111. if err != nil {
  112. log.Error("VMessOut: Failed to serialize VMess request: %v", err)
  113. return
  114. }
  115. // Send first packet of payload together with request, in favor of small requests.
  116. firstChunk := firstPacket.Chunk()
  117. moreChunks := firstPacket.MoreChunks()
  118. if firstChunk == nil && moreChunks {
  119. firstChunk, moreChunks = <-input
  120. }
  121. if firstChunk != nil {
  122. encryptRequestWriter.Crypt(firstChunk.Value)
  123. buffer.Append(firstChunk.Value)
  124. firstChunk.Release()
  125. _, err = conn.Write(buffer.Value)
  126. buffer.Release()
  127. if err != nil {
  128. log.Error("VMessOut: Failed to write VMess request: %v", err)
  129. return
  130. }
  131. }
  132. if moreChunks {
  133. v2net.ChanToWriter(encryptRequestWriter, input)
  134. }
  135. return
  136. }
  137. func handleResponse(conn net.Conn, request *protocol.VMessRequest, output chan<- *alloc.Buffer, finish *sync.Mutex, isUDP bool) {
  138. defer finish.Unlock()
  139. defer close(output)
  140. responseKey := md5.Sum(request.RequestKey[:])
  141. responseIV := md5.Sum(request.RequestIV[:])
  142. decryptResponseReader, err := v2io.NewAesDecryptReader(responseKey[:], responseIV[:], conn)
  143. if err != nil {
  144. log.Error("VMessOut: Failed to create decrypt reader: %v", err)
  145. return
  146. }
  147. buffer, err := v2net.ReadFrom(decryptResponseReader, nil)
  148. if err != nil {
  149. log.Error("VMessOut: Failed to read VMess response (%d bytes): %v", buffer.Len(), err)
  150. return
  151. }
  152. if buffer.Len() < 4 || !bytes.Equal(buffer.Value[:4], request.ResponseHeader[:]) {
  153. log.Warning("VMessOut: unexepcted response header. The connection is probably hijacked.")
  154. return
  155. }
  156. log.Info("VMessOut received %d bytes from %s", buffer.Len()-4, conn.RemoteAddr().String())
  157. buffer.SliceFrom(4)
  158. output <- buffer
  159. if !isUDP {
  160. v2net.ReaderToChan(output, decryptResponseReader)
  161. }
  162. return
  163. }
  164. type VMessOutboundHandlerFactory struct {
  165. }
  166. func (factory *VMessOutboundHandlerFactory) Create(rawConfig interface{}) (proxy.OutboundConnectionHandler, error) {
  167. vOutConfig := rawConfig.(config.Outbound)
  168. servers := make([]*config.OutboundTarget, 0, 16)
  169. udpServers := make([]*config.OutboundTarget, 0, 16)
  170. for _, target := range vOutConfig.Targets() {
  171. if target.Destination.IsTCP() {
  172. servers = append(servers, target)
  173. }
  174. if target.Destination.IsUDP() {
  175. udpServers = append(udpServers, target)
  176. }
  177. }
  178. return NewVMessOutboundHandler(servers, udpServers), nil
  179. }
  180. func init() {
  181. proxy.RegisterOutboundConnectionHandlerFactory("vmess", &VMessOutboundHandlerFactory{})
  182. }