mirror of
https://github.com/XTLS/Xray-core.git
synced 2025-12-18 21:24:37 +03:00
Compare commits
58 Commits
leak-fix
...
fix-router
| Author | SHA1 | Date | |
|---|---|---|---|
|
|
fc7a3c14d7 | ||
|
|
83c5370eec | ||
|
|
1a48453bea | ||
|
|
3167e5cec0 | ||
|
|
5148c5786f | ||
|
|
3edfb0e335 | ||
|
|
d3248a4f8e | ||
|
|
30e10be95d | ||
|
|
cced1477a0 | ||
|
|
9f5dcb1591 | ||
|
|
ce5c51d3ba | ||
|
|
11f670c8a6 | ||
|
|
a387ae9590 | ||
|
|
4ae497106d | ||
|
|
1f4fc2e7bb | ||
|
|
ae44b86b0d | ||
|
|
8276a443bc | ||
|
|
1e2f251bb3 | ||
|
|
845010b535 | ||
|
|
a0c63ba1cf | ||
|
|
2b82366148 | ||
|
|
ab1fa13ebe | ||
|
|
4740ba2425 | ||
|
|
4b0ee28f1c | ||
|
|
6ec0291d4e | ||
|
|
118131fcaf | ||
|
|
197b319f9a | ||
|
|
8b579bf3ec | ||
|
|
cbade89ab1 | ||
|
|
d20397c15d | ||
|
|
19f8907296 | ||
|
|
e943de5300 | ||
|
|
4064f8dd80 | ||
|
|
2acd206821 | ||
|
|
4c6fd94d97 | ||
|
|
fd54b10d97 | ||
|
|
6830089d3c | ||
|
|
6768a22f67 | ||
|
|
e8b02cd664 | ||
|
|
fbb0ecfb83 | ||
|
|
a31842feaa | ||
|
|
79325ead2e | ||
|
|
81b7cd718a | ||
|
|
ea1a3ae8f1 | ||
|
|
593ededd3e | ||
|
|
82ea7a3cc5 | ||
|
|
56a45ad578 | ||
|
|
4976085ddb | ||
|
|
fcdd4df446 | ||
|
|
12b077f33b | ||
|
|
702d2c06ca | ||
|
|
7951a5c4bf | ||
|
|
c2141f09e7 | ||
|
|
ef640ed309 | ||
|
|
5fa5f3fbb9 | ||
|
|
2ee372e758 | ||
|
|
11f0513bce | ||
|
|
b65da77267 |
2
.github/workflows/release-win7.yml
vendored
2
.github/workflows/release-win7.yml
vendored
@@ -72,7 +72,7 @@ jobs:
|
|||||||
echo "ASSET_NAME=$_NAME" >> $GITHUB_ENV
|
echo "ASSET_NAME=$_NAME" >> $GITHUB_ENV
|
||||||
|
|
||||||
- name: Set up Go
|
- name: Set up Go
|
||||||
uses: actions/setup-go@v5
|
uses: actions/setup-go@v6
|
||||||
with:
|
with:
|
||||||
go-version-file: go.mod
|
go-version-file: go.mod
|
||||||
check-latest: true
|
check-latest: true
|
||||||
|
|||||||
4
.github/workflows/release.yml
vendored
4
.github/workflows/release.yml
vendored
@@ -37,7 +37,7 @@ jobs:
|
|||||||
|
|
||||||
- name: Trigger Asset Update Workflow if Assets Missing
|
- name: Trigger Asset Update Workflow if Assets Missing
|
||||||
if: steps.check-assets.outputs.missing == 'true'
|
if: steps.check-assets.outputs.missing == 'true'
|
||||||
uses: actions/github-script@v7
|
uses: actions/github-script@v8
|
||||||
with:
|
with:
|
||||||
github-token: ${{ secrets.GITHUB_TOKEN }}
|
github-token: ${{ secrets.GITHUB_TOKEN }}
|
||||||
script: |
|
script: |
|
||||||
@@ -176,7 +176,7 @@ jobs:
|
|||||||
echo "ASSET_NAME=$_NAME" >> $GITHUB_ENV
|
echo "ASSET_NAME=$_NAME" >> $GITHUB_ENV
|
||||||
|
|
||||||
- name: Set up Go
|
- name: Set up Go
|
||||||
uses: actions/setup-go@v5
|
uses: actions/setup-go@v6
|
||||||
with:
|
with:
|
||||||
go-version-file: go.mod
|
go-version-file: go.mod
|
||||||
check-latest: true
|
check-latest: true
|
||||||
|
|||||||
2
.github/workflows/test.yml
vendored
2
.github/workflows/test.yml
vendored
@@ -47,7 +47,7 @@ jobs:
|
|||||||
- name: Checkout codebase
|
- name: Checkout codebase
|
||||||
uses: actions/checkout@v5
|
uses: actions/checkout@v5
|
||||||
- name: Set up Go
|
- name: Set up Go
|
||||||
uses: actions/setup-go@v5
|
uses: actions/setup-go@v6
|
||||||
with:
|
with:
|
||||||
go-version-file: go.mod
|
go-version-file: go.mod
|
||||||
check-latest: true
|
check-latest: true
|
||||||
|
|||||||
@@ -11,8 +11,10 @@
|
|||||||
[<img alt="Project X NFT" width="150px" src="https://raw2.seadn.io/ethereum/0x5ee362866001613093361eb8569d59c4141b76d1/7fa9ce900fb39b44226348db330e32/8b7fa9ce900fb39b44226348db330e32.svg" />](https://opensea.io/item/ethereum/0x5ee362866001613093361eb8569d59c4141b76d1/1)
|
[<img alt="Project X NFT" width="150px" src="https://raw2.seadn.io/ethereum/0x5ee362866001613093361eb8569d59c4141b76d1/7fa9ce900fb39b44226348db330e32/8b7fa9ce900fb39b44226348db330e32.svg" />](https://opensea.io/item/ethereum/0x5ee362866001613093361eb8569d59c4141b76d1/1)
|
||||||
|
|
||||||
- **ETH/USDT/USDC: `0xDc3Fe44F0f25D13CACb1C4896CD0D321df3146Ee`**
|
- **ETH/USDT/USDC: `0xDc3Fe44F0f25D13CACb1C4896CD0D321df3146Ee`**
|
||||||
|
- **Project X NFT: https://opensea.io/item/ethereum/0x5ee362866001613093361eb8569d59c4141b76d1/1**
|
||||||
|
- **VLESS NFT: https://opensea.io/collection/vless**
|
||||||
- **REALITY NFT: https://opensea.io/item/ethereum/0x5ee362866001613093361eb8569d59c4141b76d1/2**
|
- **REALITY NFT: https://opensea.io/item/ethereum/0x5ee362866001613093361eb8569d59c4141b76d1/2**
|
||||||
- **Related links: https://opensea.io/collection/xtls, [Announcement of NFTs by Project X](https://github.com/XTLS/Xray-core/discussions/3633), [XHTTP: Beyond REALITY](https://github.com/XTLS/Xray-core/discussions/4113)**
|
- **Related links: [VLESS Post-Quantum Encryption](https://github.com/XTLS/Xray-core/pull/5067), [XHTTP: Beyond REALITY](https://github.com/XTLS/Xray-core/discussions/4113), [Announcement of NFTs by Project X](https://github.com/XTLS/Xray-core/discussions/3633)**
|
||||||
|
|
||||||
## License
|
## License
|
||||||
|
|
||||||
@@ -42,6 +44,7 @@
|
|||||||
- [teddysun/xray](https://hub.docker.com/r/teddysun/xray)
|
- [teddysun/xray](https://hub.docker.com/r/teddysun/xray)
|
||||||
- [wulabing/xray_docker](https://github.com/wulabing/xray_docker)
|
- [wulabing/xray_docker](https://github.com/wulabing/xray_docker)
|
||||||
- Web Panel - **WARNING: Please DO NOT USE plain HTTP panels like 3X-UI**, as they are believed to be bribed by Iran GFW for supporting plain HTTP by default and refused to change (https://github.com/XTLS/Xray-core/pull/3884#issuecomment-2439595331), which has already put many users' data security in danger in the past few years. **If you are already using 3X-UI, please switch to the following panels, which are verified to support HTTPS and SSH port forwarding only:**
|
- Web Panel - **WARNING: Please DO NOT USE plain HTTP panels like 3X-UI**, as they are believed to be bribed by Iran GFW for supporting plain HTTP by default and refused to change (https://github.com/XTLS/Xray-core/pull/3884#issuecomment-2439595331), which has already put many users' data security in danger in the past few years. **If you are already using 3X-UI, please switch to the following panels, which are verified to support HTTPS and SSH port forwarding only:**
|
||||||
|
- [X-Panel](https://github.com/xeefei/X-Panel)
|
||||||
- [Remnawave](https://github.com/remnawave/panel)
|
- [Remnawave](https://github.com/remnawave/panel)
|
||||||
- [Marzban](https://github.com/Gozargah/Marzban)
|
- [Marzban](https://github.com/Gozargah/Marzban)
|
||||||
- [Xray-UI](https://github.com/qist/xray-ui)
|
- [Xray-UI](https://github.com/qist/xray-ui)
|
||||||
|
|||||||
@@ -2,6 +2,7 @@ package dispatcher
|
|||||||
|
|
||||||
import (
|
import (
|
||||||
"context"
|
"context"
|
||||||
|
go_errors "errors"
|
||||||
"regexp"
|
"regexp"
|
||||||
"strings"
|
"strings"
|
||||||
"sync"
|
"sync"
|
||||||
@@ -29,7 +30,7 @@ var errSniffingTimeout = errors.New("timeout on sniffing")
|
|||||||
|
|
||||||
type cachedReader struct {
|
type cachedReader struct {
|
||||||
sync.Mutex
|
sync.Mutex
|
||||||
reader *pipe.Reader
|
reader buf.TimeoutReader // *pipe.Reader or *buf.TimeoutWrapperReader
|
||||||
cache buf.MultiBuffer
|
cache buf.MultiBuffer
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -87,7 +88,9 @@ func (r *cachedReader) Interrupt() {
|
|||||||
r.cache = buf.ReleaseMulti(r.cache)
|
r.cache = buf.ReleaseMulti(r.cache)
|
||||||
}
|
}
|
||||||
r.Unlock()
|
r.Unlock()
|
||||||
r.reader.Interrupt()
|
if p, ok := r.reader.(*pipe.Reader); ok {
|
||||||
|
p.Interrupt()
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
// DefaultDispatcher is a default implementation of Dispatcher.
|
// DefaultDispatcher is a default implementation of Dispatcher.
|
||||||
@@ -194,6 +197,47 @@ func (d *DefaultDispatcher) getLink(ctx context.Context) (*transport.Link, *tran
|
|||||||
return inboundLink, outboundLink
|
return inboundLink, outboundLink
|
||||||
}
|
}
|
||||||
|
|
||||||
|
func (d *DefaultDispatcher) WrapLink(ctx context.Context, link *transport.Link) *transport.Link {
|
||||||
|
sessionInbound := session.InboundFromContext(ctx)
|
||||||
|
var user *protocol.MemoryUser
|
||||||
|
if sessionInbound != nil {
|
||||||
|
user = sessionInbound.User
|
||||||
|
}
|
||||||
|
|
||||||
|
link.Reader = &buf.TimeoutWrapperReader{Reader: link.Reader}
|
||||||
|
|
||||||
|
if user != nil && len(user.Email) > 0 {
|
||||||
|
p := d.policy.ForLevel(user.Level)
|
||||||
|
if p.Stats.UserUplink {
|
||||||
|
name := "user>>>" + user.Email + ">>>traffic>>>uplink"
|
||||||
|
if c, _ := stats.GetOrRegisterCounter(d.stats, name); c != nil {
|
||||||
|
link.Reader.(*buf.TimeoutWrapperReader).Counter = c
|
||||||
|
}
|
||||||
|
}
|
||||||
|
if p.Stats.UserDownlink {
|
||||||
|
name := "user>>>" + user.Email + ">>>traffic>>>downlink"
|
||||||
|
if c, _ := stats.GetOrRegisterCounter(d.stats, name); c != nil {
|
||||||
|
link.Writer = &SizeStatWriter{
|
||||||
|
Counter: c,
|
||||||
|
Writer: link.Writer,
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
if p.Stats.UserOnline {
|
||||||
|
name := "user>>>" + user.Email + ">>>online"
|
||||||
|
if om, _ := stats.GetOrRegisterOnlineMap(d.stats, name); om != nil {
|
||||||
|
sessionInbounds := session.InboundFromContext(ctx)
|
||||||
|
userIP := sessionInbounds.Source.Address.String()
|
||||||
|
om.AddIP(userIP)
|
||||||
|
// log Online user with ips
|
||||||
|
// errors.LogDebug(ctx, "user>>>" + user.Email + ">>>online", om.Count(), om.List())
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
return link
|
||||||
|
}
|
||||||
|
|
||||||
func (d *DefaultDispatcher) shouldOverride(ctx context.Context, result SniffResult, request session.SniffingRequest, destination net.Destination) bool {
|
func (d *DefaultDispatcher) shouldOverride(ctx context.Context, result SniffResult, request session.SniffingRequest, destination net.Destination) bool {
|
||||||
domain := result.Domain()
|
domain := result.Domain()
|
||||||
if domain == "" {
|
if domain == "" {
|
||||||
@@ -314,12 +358,13 @@ func (d *DefaultDispatcher) DispatchLink(ctx context.Context, destination net.De
|
|||||||
content = new(session.Content)
|
content = new(session.Content)
|
||||||
ctx = session.ContextWithContent(ctx, content)
|
ctx = session.ContextWithContent(ctx, content)
|
||||||
}
|
}
|
||||||
|
outbound = d.WrapLink(ctx, outbound)
|
||||||
sniffingRequest := content.SniffingRequest
|
sniffingRequest := content.SniffingRequest
|
||||||
if !sniffingRequest.Enabled {
|
if !sniffingRequest.Enabled {
|
||||||
d.routedDispatch(ctx, outbound, destination)
|
d.routedDispatch(ctx, outbound, destination)
|
||||||
} else {
|
} else {
|
||||||
cReader := &cachedReader{
|
cReader := &cachedReader{
|
||||||
reader: outbound.Reader.(*pipe.Reader),
|
reader: outbound.Reader.(buf.TimeoutReader),
|
||||||
}
|
}
|
||||||
outbound.Reader = cReader
|
outbound.Reader = cReader
|
||||||
result, err := sniffer(ctx, cReader, sniffingRequest.MetadataOnly, destination.Network)
|
result, err := sniffer(ctx, cReader, sniffingRequest.MetadataOnly, destination.Network)
|
||||||
@@ -439,8 +484,17 @@ func (d *DefaultDispatcher) routedDispatch(ctx context.Context, link *transport.
|
|||||||
handler = h
|
handler = h
|
||||||
} else {
|
} else {
|
||||||
errors.LogWarning(ctx, "non existing outTag: ", outTag)
|
errors.LogWarning(ctx, "non existing outTag: ", outTag)
|
||||||
|
common.Close(link.Writer)
|
||||||
|
common.Interrupt(link.Reader)
|
||||||
|
return // DO NOT CHANGE: the traffic shouldn't be processed by default outbound if the specified outbound tag doesn't exist (yet), e.g., VLESS Reverse Proxy
|
||||||
}
|
}
|
||||||
} else {
|
} else {
|
||||||
|
if !go_errors.Is(err, common.ErrNoClue) {
|
||||||
|
errors.LogWarningInner(ctx, err, "get error during route pick ")
|
||||||
|
common.Close(link.Writer)
|
||||||
|
common.Interrupt(link.Reader)
|
||||||
|
return
|
||||||
|
}
|
||||||
errors.LogInfo(ctx, "default route for ", destination)
|
errors.LogInfo(ctx, "default route for ", destination)
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -329,7 +329,7 @@ func init() {
|
|||||||
}
|
}
|
||||||
|
|
||||||
func checkSystemNetwork() (supportIPv4 bool, supportIPv6 bool) {
|
func checkSystemNetwork() (supportIPv4 bool, supportIPv6 bool) {
|
||||||
conn4, err4 := net.Dial("udp4", "8.8.8.8:53")
|
conn4, err4 := net.Dial("udp4", "192.33.4.12:53")
|
||||||
if err4 != nil {
|
if err4 != nil {
|
||||||
supportIPv4 = false
|
supportIPv4 = false
|
||||||
} else {
|
} else {
|
||||||
@@ -337,7 +337,7 @@ func checkSystemNetwork() (supportIPv4 bool, supportIPv6 bool) {
|
|||||||
conn4.Close()
|
conn4.Close()
|
||||||
}
|
}
|
||||||
|
|
||||||
conn6, err6 := net.Dial("udp6", "[2001:4860:4860::8888]:53")
|
conn6, err6 := net.Dial("udp6", "[2001:500:2::c]:53")
|
||||||
if err6 != nil {
|
if err6 != nil {
|
||||||
supportIPv6 = false
|
supportIPv6 = false
|
||||||
} else {
|
} else {
|
||||||
|
|||||||
@@ -39,8 +39,8 @@ func Test_parseResponse(t *testing.T) {
|
|||||||
common.Must2(dns.NewRR("google.com. IN CNAME fake.google.com")),
|
common.Must2(dns.NewRR("google.com. IN CNAME fake.google.com")),
|
||||||
common.Must2(dns.NewRR("google.com. IN CNAME m.test.google.com")),
|
common.Must2(dns.NewRR("google.com. IN CNAME m.test.google.com")),
|
||||||
common.Must2(dns.NewRR("google.com. IN CNAME test.google.com")),
|
common.Must2(dns.NewRR("google.com. IN CNAME test.google.com")),
|
||||||
common.Must2(dns.NewRR("google.com. IN AAAA 2001::123:8888")),
|
common.Must2(dns.NewRR("google.com. IN AAAA 2001:4860:4860::8888")),
|
||||||
common.Must2(dns.NewRR("google.com. IN AAAA 2001::123:8844")),
|
common.Must2(dns.NewRR("google.com. IN AAAA 2001:4860:4860::8844")),
|
||||||
)
|
)
|
||||||
p = append(p, common.Must2(ans.Pack()))
|
p = append(p, common.Must2(ans.Pack()))
|
||||||
|
|
||||||
@@ -72,7 +72,7 @@ func Test_parseResponse(t *testing.T) {
|
|||||||
},
|
},
|
||||||
{
|
{
|
||||||
"aaaa record",
|
"aaaa record",
|
||||||
&IPRecord{2, []net.IP{net.ParseIP("2001::123:8888"), net.ParseIP("2001::123:8844")}, time.Time{}, dnsmessage.RCodeSuccess, nil},
|
&IPRecord{2, []net.IP{net.ParseIP("2001:4860:4860::8888"), net.ParseIP("2001:4860:4860::8844")}, time.Time{}, dnsmessage.RCodeSuccess, nil},
|
||||||
false,
|
false,
|
||||||
},
|
},
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -90,7 +90,9 @@ func (s *ClassicNameServer) RequestsCleanup() error {
|
|||||||
|
|
||||||
// HandleResponse handles udp response packet from remote DNS server.
|
// HandleResponse handles udp response packet from remote DNS server.
|
||||||
func (s *ClassicNameServer) HandleResponse(ctx context.Context, packet *udp_proto.Packet) {
|
func (s *ClassicNameServer) HandleResponse(ctx context.Context, packet *udp_proto.Packet) {
|
||||||
ipRec, err := parseResponse(packet.Payload.Bytes())
|
payload := packet.Payload
|
||||||
|
ipRec, err := parseResponse(payload.Bytes())
|
||||||
|
payload.Release()
|
||||||
if err != nil {
|
if err != nil {
|
||||||
errors.LogError(ctx, s.Name(), " fail to parse responded DNS udp")
|
errors.LogError(ctx, s.Name(), " fail to parse responded DNS udp")
|
||||||
return
|
return
|
||||||
@@ -125,6 +127,8 @@ func (s *ClassicNameServer) HandleResponse(ctx context.Context, packet *udp_prot
|
|||||||
newReq.msg = &newMsg
|
newReq.msg = &newMsg
|
||||||
s.addPendingRequest(&newReq)
|
s.addPendingRequest(&newReq)
|
||||||
b, _ := dns.PackMessage(newReq.msg)
|
b, _ := dns.PackMessage(newReq.msg)
|
||||||
|
copyDest := net.UDPDestination(s.address.Address, s.address.Port)
|
||||||
|
b.UDP = ©Dest
|
||||||
s.udpServer.Dispatch(toDnsContext(newReq.ctx, s.address.String()), *s.address, b)
|
s.udpServer.Dispatch(toDnsContext(newReq.ctx, s.address.String()), *s.address, b)
|
||||||
return
|
return
|
||||||
}
|
}
|
||||||
@@ -158,6 +162,8 @@ func (s *ClassicNameServer) sendQuery(ctx context.Context, _ chan<- error, domai
|
|||||||
}
|
}
|
||||||
s.addPendingRequest(udpReq)
|
s.addPendingRequest(udpReq)
|
||||||
b, _ := dns.PackMessage(req.msg)
|
b, _ := dns.PackMessage(req.msg)
|
||||||
|
copyDest := net.UDPDestination(s.address.Address, s.address.Port)
|
||||||
|
b.UDP = ©Dest
|
||||||
s.udpServer.Dispatch(toDnsContext(ctx, s.address.String()), *s.address, b)
|
s.udpServer.Dispatch(toDnsContext(ctx, s.address.String()), *s.address, b)
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -2,6 +2,7 @@ package inbound
|
|||||||
|
|
||||||
import (
|
import (
|
||||||
"context"
|
"context"
|
||||||
|
gonet "net"
|
||||||
"sync"
|
"sync"
|
||||||
"sync/atomic"
|
"sync/atomic"
|
||||||
"time"
|
"time"
|
||||||
@@ -76,7 +77,25 @@ func (w *tcpWorker) callback(conn stat.Connection) {
|
|||||||
case internet.SocketConfig_TProxy:
|
case internet.SocketConfig_TProxy:
|
||||||
dest = net.DestinationFromAddr(conn.LocalAddr())
|
dest = net.DestinationFromAddr(conn.LocalAddr())
|
||||||
}
|
}
|
||||||
|
|
||||||
if dest.IsValid() {
|
if dest.IsValid() {
|
||||||
|
// Check if try to connect to this inbound itself (can cause loopback)
|
||||||
|
var isLoopBack bool
|
||||||
|
if w.address == net.AnyIP || w.address == net.AnyIPv6 {
|
||||||
|
if dest.Port.Value() == w.port.Value() && IsLocal(dest.Address.IP()) {
|
||||||
|
isLoopBack = true
|
||||||
|
}
|
||||||
|
} else {
|
||||||
|
if w.hub.Addr().String() == dest.NetAddr() {
|
||||||
|
isLoopBack = true
|
||||||
|
}
|
||||||
|
}
|
||||||
|
if isLoopBack {
|
||||||
|
cancel()
|
||||||
|
conn.Close()
|
||||||
|
errors.LogError(ctx, errors.New("loopback connection detected"))
|
||||||
|
return
|
||||||
|
}
|
||||||
outbounds[0].Target = dest
|
outbounds[0].Target = dest
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
@@ -544,3 +563,18 @@ func (w *dsWorker) Close() error {
|
|||||||
|
|
||||||
return nil
|
return nil
|
||||||
}
|
}
|
||||||
|
|
||||||
|
func IsLocal(ip net.IP) bool {
|
||||||
|
addrs, err := gonet.InterfaceAddrs()
|
||||||
|
if err != nil {
|
||||||
|
return false
|
||||||
|
}
|
||||||
|
for _, addr := range addrs {
|
||||||
|
if ipnet, ok := addr.(*gonet.IPNet); ok {
|
||||||
|
if ipnet.IP.Equal(ip) {
|
||||||
|
return true
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return false
|
||||||
|
}
|
||||||
|
|||||||
@@ -108,6 +108,8 @@ func NewHandler(ctx context.Context, config *core.OutboundHandlerConfig) (outbou
|
|||||||
}
|
}
|
||||||
h.proxyConfig = proxyConfig
|
h.proxyConfig = proxyConfig
|
||||||
|
|
||||||
|
ctx = session.ContextWithHandler(ctx, h)
|
||||||
|
|
||||||
rawProxyHandler, err := common.CreateObject(ctx, proxyConfig)
|
rawProxyHandler, err := common.CreateObject(ctx, proxyConfig)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return nil, err
|
return nil, err
|
||||||
@@ -239,8 +241,10 @@ func (h *Handler) Dispatch(ctx context.Context, link *transport.Link) {
|
|||||||
}
|
}
|
||||||
out:
|
out:
|
||||||
err := h.proxy.Process(ctx, link, h)
|
err := h.proxy.Process(ctx, link, h)
|
||||||
|
var errC error
|
||||||
if err != nil {
|
if err != nil {
|
||||||
if goerrors.Is(err, io.EOF) || goerrors.Is(err, io.ErrClosedPipe) || goerrors.Is(err, context.Canceled) {
|
errC = errors.Cause(err)
|
||||||
|
if goerrors.Is(errC, io.EOF) || goerrors.Is(errC, io.ErrClosedPipe) || goerrors.Is(errC, context.Canceled) {
|
||||||
err = nil
|
err = nil
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
@@ -251,7 +255,11 @@ out:
|
|||||||
errors.LogInfo(ctx, err.Error())
|
errors.LogInfo(ctx, err.Error())
|
||||||
common.Interrupt(link.Writer)
|
common.Interrupt(link.Writer)
|
||||||
} else {
|
} else {
|
||||||
common.Close(link.Writer)
|
if errC != nil && goerrors.Is(errC, io.ErrClosedPipe) {
|
||||||
|
common.Interrupt(link.Writer)
|
||||||
|
} else {
|
||||||
|
common.Close(link.Writer)
|
||||||
|
}
|
||||||
}
|
}
|
||||||
common.Interrupt(link.Reader)
|
common.Interrupt(link.Reader)
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -4,10 +4,12 @@ import (
|
|||||||
"context"
|
"context"
|
||||||
"time"
|
"time"
|
||||||
|
|
||||||
|
"github.com/xtls/xray-core/app/dispatcher"
|
||||||
"github.com/xtls/xray-core/common/errors"
|
"github.com/xtls/xray-core/common/errors"
|
||||||
"github.com/xtls/xray-core/common/mux"
|
"github.com/xtls/xray-core/common/mux"
|
||||||
"github.com/xtls/xray-core/common/net"
|
"github.com/xtls/xray-core/common/net"
|
||||||
"github.com/xtls/xray-core/common/session"
|
"github.com/xtls/xray-core/common/session"
|
||||||
|
"github.com/xtls/xray-core/common/signal"
|
||||||
"github.com/xtls/xray-core/common/task"
|
"github.com/xtls/xray-core/common/task"
|
||||||
"github.com/xtls/xray-core/features/routing"
|
"github.com/xtls/xray-core/features/routing"
|
||||||
"github.com/xtls/xray-core/transport"
|
"github.com/xtls/xray-core/transport"
|
||||||
@@ -52,6 +54,11 @@ func (b *Bridge) cleanup() {
|
|||||||
if w.IsActive() {
|
if w.IsActive() {
|
||||||
activeWorkers = append(activeWorkers, w)
|
activeWorkers = append(activeWorkers, w)
|
||||||
}
|
}
|
||||||
|
if w.Closed() {
|
||||||
|
if w.Timer != nil {
|
||||||
|
w.Timer.SetTimeout(0)
|
||||||
|
}
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
if len(activeWorkers) != len(b.workers) {
|
if len(activeWorkers) != len(b.workers) {
|
||||||
@@ -93,10 +100,11 @@ func (b *Bridge) Close() error {
|
|||||||
}
|
}
|
||||||
|
|
||||||
type BridgeWorker struct {
|
type BridgeWorker struct {
|
||||||
tag string
|
Tag string
|
||||||
worker *mux.ServerWorker
|
Worker *mux.ServerWorker
|
||||||
dispatcher routing.Dispatcher
|
Dispatcher routing.Dispatcher
|
||||||
state Control_State
|
State Control_State
|
||||||
|
Timer *signal.ActivityTimer
|
||||||
}
|
}
|
||||||
|
|
||||||
func NewBridgeWorker(domain string, tag string, d routing.Dispatcher) (*BridgeWorker, error) {
|
func NewBridgeWorker(domain string, tag string, d routing.Dispatcher) (*BridgeWorker, error) {
|
||||||
@@ -114,16 +122,20 @@ func NewBridgeWorker(domain string, tag string, d routing.Dispatcher) (*BridgeWo
|
|||||||
}
|
}
|
||||||
|
|
||||||
w := &BridgeWorker{
|
w := &BridgeWorker{
|
||||||
dispatcher: d,
|
Dispatcher: d,
|
||||||
tag: tag,
|
Tag: tag,
|
||||||
}
|
}
|
||||||
|
|
||||||
worker, err := mux.NewServerWorker(context.Background(), w, link)
|
worker, err := mux.NewServerWorker(context.Background(), w, link)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return nil, err
|
return nil, err
|
||||||
}
|
}
|
||||||
w.worker = worker
|
w.Worker = worker
|
||||||
|
|
||||||
|
terminate := func() {
|
||||||
|
worker.Close()
|
||||||
|
}
|
||||||
|
w.Timer = signal.CancelAfterInactivity(ctx, terminate, 60*time.Second)
|
||||||
return w, nil
|
return w, nil
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -140,48 +152,63 @@ func (w *BridgeWorker) Close() error {
|
|||||||
}
|
}
|
||||||
|
|
||||||
func (w *BridgeWorker) IsActive() bool {
|
func (w *BridgeWorker) IsActive() bool {
|
||||||
return w.state == Control_ACTIVE && !w.worker.Closed()
|
return w.State == Control_ACTIVE && !w.Worker.Closed()
|
||||||
|
}
|
||||||
|
|
||||||
|
func (w *BridgeWorker) Closed() bool {
|
||||||
|
return w.Worker.Closed()
|
||||||
}
|
}
|
||||||
|
|
||||||
func (w *BridgeWorker) Connections() uint32 {
|
func (w *BridgeWorker) Connections() uint32 {
|
||||||
return w.worker.ActiveConnections()
|
return w.Worker.ActiveConnections()
|
||||||
}
|
}
|
||||||
|
|
||||||
func (w *BridgeWorker) handleInternalConn(link *transport.Link) {
|
func (w *BridgeWorker) handleInternalConn(link *transport.Link) {
|
||||||
go func() {
|
reader := link.Reader
|
||||||
reader := link.Reader
|
for {
|
||||||
for {
|
mb, err := reader.ReadMultiBuffer()
|
||||||
mb, err := reader.ReadMultiBuffer()
|
if err != nil {
|
||||||
if err != nil {
|
if w.Timer != nil {
|
||||||
break
|
if w.Closed() {
|
||||||
|
w.Timer.SetTimeout(0)
|
||||||
|
} else {
|
||||||
|
w.Timer.SetTimeout(24 * time.Hour)
|
||||||
|
}
|
||||||
}
|
}
|
||||||
for _, b := range mb {
|
return
|
||||||
var ctl Control
|
}
|
||||||
if err := proto.Unmarshal(b.Bytes(), &ctl); err != nil {
|
if w.Timer != nil {
|
||||||
errors.LogInfoInner(context.Background(), err, "failed to parse proto message")
|
w.Timer.Update()
|
||||||
break
|
}
|
||||||
}
|
for _, b := range mb {
|
||||||
if ctl.State != w.state {
|
var ctl Control
|
||||||
w.state = ctl.State
|
if err := proto.Unmarshal(b.Bytes(), &ctl); err != nil {
|
||||||
|
errors.LogInfoInner(context.Background(), err, "failed to parse proto message")
|
||||||
|
if w.Timer != nil {
|
||||||
|
w.Timer.SetTimeout(0)
|
||||||
}
|
}
|
||||||
|
return
|
||||||
|
}
|
||||||
|
if ctl.State != w.State {
|
||||||
|
w.State = ctl.State
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
}()
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
func (w *BridgeWorker) Dispatch(ctx context.Context, dest net.Destination) (*transport.Link, error) {
|
func (w *BridgeWorker) Dispatch(ctx context.Context, dest net.Destination) (*transport.Link, error) {
|
||||||
if !isInternalDomain(dest) {
|
if !isInternalDomain(dest) {
|
||||||
ctx = session.ContextWithInbound(ctx, &session.Inbound{
|
ctx = session.ContextWithInbound(ctx, &session.Inbound{
|
||||||
Tag: w.tag,
|
Tag: w.Tag,
|
||||||
})
|
})
|
||||||
return w.dispatcher.Dispatch(ctx, dest)
|
return w.Dispatcher.Dispatch(ctx, dest)
|
||||||
}
|
}
|
||||||
|
|
||||||
opt := []pipe.Option{pipe.WithSizeLimit(16 * 1024)}
|
opt := []pipe.Option{pipe.WithSizeLimit(16 * 1024)}
|
||||||
uplinkReader, uplinkWriter := pipe.New(opt...)
|
uplinkReader, uplinkWriter := pipe.New(opt...)
|
||||||
downlinkReader, downlinkWriter := pipe.New(opt...)
|
downlinkReader, downlinkWriter := pipe.New(opt...)
|
||||||
|
|
||||||
w.handleInternalConn(&transport.Link{
|
go w.handleInternalConn(&transport.Link{
|
||||||
Reader: downlinkReader,
|
Reader: downlinkReader,
|
||||||
Writer: uplinkWriter,
|
Writer: uplinkWriter,
|
||||||
})
|
})
|
||||||
@@ -195,11 +222,12 @@ func (w *BridgeWorker) Dispatch(ctx context.Context, dest net.Destination) (*tra
|
|||||||
func (w *BridgeWorker) DispatchLink(ctx context.Context, dest net.Destination, link *transport.Link) error {
|
func (w *BridgeWorker) DispatchLink(ctx context.Context, dest net.Destination, link *transport.Link) error {
|
||||||
if !isInternalDomain(dest) {
|
if !isInternalDomain(dest) {
|
||||||
ctx = session.ContextWithInbound(ctx, &session.Inbound{
|
ctx = session.ContextWithInbound(ctx, &session.Inbound{
|
||||||
Tag: w.tag,
|
Tag: w.Tag,
|
||||||
})
|
})
|
||||||
return w.dispatcher.DispatchLink(ctx, dest, link)
|
return w.Dispatcher.DispatchLink(ctx, dest, link)
|
||||||
}
|
}
|
||||||
|
|
||||||
|
link = w.Dispatcher.(*dispatcher.DefaultDispatcher).WrapLink(ctx, link)
|
||||||
w.handleInternalConn(link)
|
w.handleInternalConn(link)
|
||||||
|
|
||||||
return nil
|
return nil
|
||||||
|
|||||||
@@ -12,6 +12,7 @@ import (
|
|||||||
"github.com/xtls/xray-core/common/net"
|
"github.com/xtls/xray-core/common/net"
|
||||||
"github.com/xtls/xray-core/common/serial"
|
"github.com/xtls/xray-core/common/serial"
|
||||||
"github.com/xtls/xray-core/common/session"
|
"github.com/xtls/xray-core/common/session"
|
||||||
|
"github.com/xtls/xray-core/common/signal"
|
||||||
"github.com/xtls/xray-core/common/task"
|
"github.com/xtls/xray-core/common/task"
|
||||||
"github.com/xtls/xray-core/features/outbound"
|
"github.com/xtls/xray-core/features/outbound"
|
||||||
"github.com/xtls/xray-core/transport"
|
"github.com/xtls/xray-core/transport"
|
||||||
@@ -82,9 +83,21 @@ func (p *Portal) HandleConnection(ctx context.Context, link *transport.Link) err
|
|||||||
}
|
}
|
||||||
|
|
||||||
p.picker.AddWorker(worker)
|
p.picker.AddWorker(worker)
|
||||||
|
|
||||||
|
if _, ok := link.Reader.(*pipe.Reader); !ok {
|
||||||
|
select {
|
||||||
|
case <-ctx.Done():
|
||||||
|
case <-muxClient.WaitClosed():
|
||||||
|
}
|
||||||
|
}
|
||||||
return nil
|
return nil
|
||||||
}
|
}
|
||||||
|
|
||||||
|
if ob.Target.Network == net.Network_UDP && ob.OriginalTarget.Address != nil && ob.OriginalTarget.Address != ob.Target.Address {
|
||||||
|
link.Reader = &buf.EndpointOverrideReader{Reader: link.Reader, Dest: ob.Target.Address, OriginalDest: ob.OriginalTarget.Address}
|
||||||
|
link.Writer = &buf.EndpointOverrideWriter{Writer: link.Writer, Dest: ob.Target.Address, OriginalDest: ob.OriginalTarget.Address}
|
||||||
|
}
|
||||||
|
|
||||||
return p.client.Dispatch(ctx, link)
|
return p.client.Dispatch(ctx, link)
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -101,6 +114,7 @@ func (o *Outbound) Dispatch(ctx context.Context, link *transport.Link) {
|
|||||||
if err := o.portal.HandleConnection(ctx, link); err != nil {
|
if err := o.portal.HandleConnection(ctx, link); err != nil {
|
||||||
errors.LogInfoInner(ctx, err, "failed to process reverse connection")
|
errors.LogInfoInner(ctx, err, "failed to process reverse connection")
|
||||||
common.Interrupt(link.Writer)
|
common.Interrupt(link.Writer)
|
||||||
|
common.Interrupt(link.Reader)
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -146,6 +160,8 @@ func (p *StaticMuxPicker) cleanup() error {
|
|||||||
for _, w := range p.workers {
|
for _, w := range p.workers {
|
||||||
if !w.Closed() {
|
if !w.Closed() {
|
||||||
activeWorkers = append(activeWorkers, w)
|
activeWorkers = append(activeWorkers, w)
|
||||||
|
} else {
|
||||||
|
w.timer.SetTimeout(0)
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -212,6 +228,7 @@ type PortalWorker struct {
|
|||||||
reader buf.Reader
|
reader buf.Reader
|
||||||
draining bool
|
draining bool
|
||||||
counter uint32
|
counter uint32
|
||||||
|
timer *signal.ActivityTimer
|
||||||
}
|
}
|
||||||
|
|
||||||
func NewPortalWorker(client *mux.ClientWorker) (*PortalWorker, error) {
|
func NewPortalWorker(client *mux.ClientWorker) (*PortalWorker, error) {
|
||||||
@@ -231,10 +248,14 @@ func NewPortalWorker(client *mux.ClientWorker) (*PortalWorker, error) {
|
|||||||
if !f {
|
if !f {
|
||||||
return nil, errors.New("unable to dispatch control connection")
|
return nil, errors.New("unable to dispatch control connection")
|
||||||
}
|
}
|
||||||
|
terminate := func() {
|
||||||
|
client.Close()
|
||||||
|
}
|
||||||
w := &PortalWorker{
|
w := &PortalWorker{
|
||||||
client: client,
|
client: client,
|
||||||
reader: downlinkReader,
|
reader: downlinkReader,
|
||||||
writer: uplinkWriter,
|
writer: uplinkWriter,
|
||||||
|
timer: signal.CancelAfterInactivity(ctx, terminate, 24*time.Hour), // // prevent leak
|
||||||
}
|
}
|
||||||
w.control = &task.Periodic{
|
w.control = &task.Periodic{
|
||||||
Execute: w.heartbeat,
|
Execute: w.heartbeat,
|
||||||
@@ -261,7 +282,6 @@ func (w *PortalWorker) heartbeat() error {
|
|||||||
msg.State = Control_DRAIN
|
msg.State = Control_DRAIN
|
||||||
|
|
||||||
defer func() {
|
defer func() {
|
||||||
w.client.GetTimer().Reset(time.Second * 16)
|
|
||||||
common.Close(w.writer)
|
common.Close(w.writer)
|
||||||
common.Interrupt(w.reader)
|
common.Interrupt(w.reader)
|
||||||
w.writer = nil
|
w.writer = nil
|
||||||
@@ -273,6 +293,7 @@ func (w *PortalWorker) heartbeat() error {
|
|||||||
b, err := proto.Marshal(msg)
|
b, err := proto.Marshal(msg)
|
||||||
common.Must(err)
|
common.Must(err)
|
||||||
mb := buf.MergeBytes(nil, b)
|
mb := buf.MergeBytes(nil, b)
|
||||||
|
w.timer.Update()
|
||||||
return w.writer.WriteMultiBuffer(mb)
|
return w.writer.WriteMultiBuffer(mb)
|
||||||
}
|
}
|
||||||
return nil
|
return nil
|
||||||
|
|||||||
@@ -12,7 +12,7 @@ import (
|
|||||||
)
|
)
|
||||||
|
|
||||||
const (
|
const (
|
||||||
internalDomain = "reverse.internal.v2fly.org" // make reverse proxy compatible with v2fly
|
internalDomain = "reverse"
|
||||||
)
|
)
|
||||||
|
|
||||||
func isDomain(dest net.Destination, domain string) bool {
|
func isDomain(dest net.Destination, domain string) bool {
|
||||||
|
|||||||
@@ -51,6 +51,10 @@ func (c routingContext) GetSkipDNSResolve() bool {
|
|||||||
return false
|
return false
|
||||||
}
|
}
|
||||||
|
|
||||||
|
func (c routingContext) GetError() error {
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
// AsRoutingContext converts a protobuf RoutingContext into an implementation of routing.Context.
|
// AsRoutingContext converts a protobuf RoutingContext into an implementation of routing.Context.
|
||||||
func AsRoutingContext(r *RoutingContext) routing.Context {
|
func AsRoutingContext(r *RoutingContext) routing.Context {
|
||||||
return routingContext{r}
|
return routingContext{r}
|
||||||
|
|||||||
@@ -195,6 +195,9 @@ func (r *Router) pickRouteInternal(ctx routing.Context) (*Rule, routing.Context,
|
|||||||
if rule.Apply(ctx) {
|
if rule.Apply(ctx) {
|
||||||
return rule, ctx, nil
|
return rule, ctx, nil
|
||||||
}
|
}
|
||||||
|
if err := ctx.GetError(); err != nil {
|
||||||
|
return nil, ctx, err
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
if r.domainStrategy != Config_IpIfNonMatch || len(ctx.GetTargetDomain()) == 0 || skipDNSResolve {
|
if r.domainStrategy != Config_IpIfNonMatch || len(ctx.GetTargetDomain()) == 0 || skipDNSResolve {
|
||||||
@@ -208,6 +211,9 @@ func (r *Router) pickRouteInternal(ctx routing.Context) (*Rule, routing.Context,
|
|||||||
if rule.Apply(ctx) {
|
if rule.Apply(ctx) {
|
||||||
return rule, ctx, nil
|
return rule, ctx, nil
|
||||||
}
|
}
|
||||||
|
if err := ctx.GetError(); err != nil {
|
||||||
|
return nil, ctx, err
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
return nil, ctx, common.ErrNoClue
|
return nil, ctx, common.ErrNoClue
|
||||||
|
|||||||
@@ -15,8 +15,6 @@ const (
|
|||||||
|
|
||||||
var ErrBufferFull = errors.New("buffer is full")
|
var ErrBufferFull = errors.New("buffer is full")
|
||||||
|
|
||||||
var zero = [Size * 10]byte{0}
|
|
||||||
|
|
||||||
var pool = bytespool.GetPool(Size)
|
var pool = bytespool.GetPool(Size)
|
||||||
|
|
||||||
// ownership represents the data owner of the buffer.
|
// ownership represents the data owner of the buffer.
|
||||||
@@ -146,7 +144,7 @@ func (b *Buffer) Bytes() []byte {
|
|||||||
}
|
}
|
||||||
|
|
||||||
// Extend increases the buffer size by n bytes, and returns the extended part.
|
// Extend increases the buffer size by n bytes, and returns the extended part.
|
||||||
// It panics if result size is larger than buf.Size.
|
// It panics if result size is larger than size of this buffer.
|
||||||
func (b *Buffer) Extend(n int32) []byte {
|
func (b *Buffer) Extend(n int32) []byte {
|
||||||
end := b.end + n
|
end := b.end + n
|
||||||
if end > int32(len(b.v)) {
|
if end > int32(len(b.v)) {
|
||||||
@@ -154,7 +152,7 @@ func (b *Buffer) Extend(n int32) []byte {
|
|||||||
}
|
}
|
||||||
ext := b.v[b.end:end]
|
ext := b.v[b.end:end]
|
||||||
b.end = end
|
b.end = end
|
||||||
copy(ext, zero[:])
|
clear(ext)
|
||||||
return ext
|
return ext
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -217,7 +215,7 @@ func (b *Buffer) Resize(from, to int32) {
|
|||||||
b.start += from
|
b.start += from
|
||||||
b.Check()
|
b.Check()
|
||||||
if b.end > oldEnd {
|
if b.end > oldEnd {
|
||||||
copy(b.v[oldEnd:b.end], zero[:])
|
clear(b.v[oldEnd:b.end])
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|||||||
@@ -24,9 +24,59 @@ var ErrReadTimeout = errors.New("IO timeout")
|
|||||||
|
|
||||||
// TimeoutReader is a reader that returns error if Read() operation takes longer than the given timeout.
|
// TimeoutReader is a reader that returns error if Read() operation takes longer than the given timeout.
|
||||||
type TimeoutReader interface {
|
type TimeoutReader interface {
|
||||||
|
Reader
|
||||||
ReadMultiBufferTimeout(time.Duration) (MultiBuffer, error)
|
ReadMultiBufferTimeout(time.Duration) (MultiBuffer, error)
|
||||||
}
|
}
|
||||||
|
|
||||||
|
type TimeoutWrapperReader struct {
|
||||||
|
Reader
|
||||||
|
stats.Counter
|
||||||
|
mb MultiBuffer
|
||||||
|
err error
|
||||||
|
done chan struct{}
|
||||||
|
}
|
||||||
|
|
||||||
|
func (r *TimeoutWrapperReader) ReadMultiBuffer() (MultiBuffer, error) {
|
||||||
|
if r.done != nil {
|
||||||
|
<-r.done
|
||||||
|
r.done = nil
|
||||||
|
if r.Counter != nil {
|
||||||
|
r.Counter.Add(int64(r.mb.Len()))
|
||||||
|
}
|
||||||
|
return r.mb, r.err
|
||||||
|
}
|
||||||
|
r.mb, r.err = r.Reader.ReadMultiBuffer()
|
||||||
|
if r.Counter != nil {
|
||||||
|
r.Counter.Add(int64(r.mb.Len()))
|
||||||
|
}
|
||||||
|
return r.mb, r.err
|
||||||
|
}
|
||||||
|
|
||||||
|
func (r *TimeoutWrapperReader) ReadMultiBufferTimeout(duration time.Duration) (MultiBuffer, error) {
|
||||||
|
if r.done == nil {
|
||||||
|
r.done = make(chan struct{})
|
||||||
|
go func() {
|
||||||
|
r.mb, r.err = r.Reader.ReadMultiBuffer()
|
||||||
|
close(r.done)
|
||||||
|
}()
|
||||||
|
}
|
||||||
|
timeout := make(chan struct{})
|
||||||
|
go func() {
|
||||||
|
time.Sleep(duration)
|
||||||
|
close(timeout)
|
||||||
|
}()
|
||||||
|
select {
|
||||||
|
case <-r.done:
|
||||||
|
r.done = nil
|
||||||
|
if r.Counter != nil {
|
||||||
|
r.Counter.Add(int64(r.mb.Len()))
|
||||||
|
}
|
||||||
|
return r.mb, r.err
|
||||||
|
case <-timeout:
|
||||||
|
return nil, nil
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
// Writer extends io.Writer with MultiBuffer.
|
// Writer extends io.Writer with MultiBuffer.
|
||||||
type Writer interface {
|
type Writer interface {
|
||||||
// WriteMultiBuffer writes a MultiBuffer into underlying writer.
|
// WriteMultiBuffer writes a MultiBuffer into underlying writer.
|
||||||
|
|||||||
@@ -75,9 +75,10 @@ func (w *BufferToBytesWriter) ReadFrom(reader io.Reader) (int64, error) {
|
|||||||
// BufferedWriter is a Writer with internal buffer.
|
// BufferedWriter is a Writer with internal buffer.
|
||||||
type BufferedWriter struct {
|
type BufferedWriter struct {
|
||||||
sync.Mutex
|
sync.Mutex
|
||||||
writer Writer
|
writer Writer
|
||||||
buffer *Buffer
|
buffer *Buffer
|
||||||
buffered bool
|
buffered bool
|
||||||
|
flushNext bool
|
||||||
}
|
}
|
||||||
|
|
||||||
// NewBufferedWriter creates a new BufferedWriter.
|
// NewBufferedWriter creates a new BufferedWriter.
|
||||||
@@ -161,6 +162,12 @@ func (w *BufferedWriter) WriteMultiBuffer(b MultiBuffer) error {
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
if w.flushNext {
|
||||||
|
w.buffered = false
|
||||||
|
w.flushNext = false
|
||||||
|
return w.flushInternal()
|
||||||
|
}
|
||||||
|
|
||||||
return nil
|
return nil
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -201,6 +208,13 @@ func (w *BufferedWriter) SetBuffered(f bool) error {
|
|||||||
return nil
|
return nil
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// SetFlushNext will wait the next WriteMultiBuffer to flush and set buffered = false
|
||||||
|
func (w *BufferedWriter) SetFlushNext() {
|
||||||
|
w.Lock()
|
||||||
|
defer w.Unlock()
|
||||||
|
w.flushNext = true
|
||||||
|
}
|
||||||
|
|
||||||
// ReadFrom implements io.ReaderFrom.
|
// ReadFrom implements io.ReaderFrom.
|
||||||
func (w *BufferedWriter) ReadFrom(reader io.Reader) (int64, error) {
|
func (w *BufferedWriter) ReadFrom(reader io.Reader) (int64, error) {
|
||||||
if err := w.SetBuffered(false); err != nil {
|
if err := w.SetBuffered(false); err != nil {
|
||||||
|
|||||||
@@ -7,6 +7,7 @@ import (
|
|||||||
"go/build"
|
"go/build"
|
||||||
"os"
|
"os"
|
||||||
"path/filepath"
|
"path/filepath"
|
||||||
|
"reflect"
|
||||||
"strings"
|
"strings"
|
||||||
|
|
||||||
"github.com/xtls/xray-core/common/errors"
|
"github.com/xtls/xray-core/common/errors"
|
||||||
@@ -153,3 +154,14 @@ func GetModuleName(pathToProjectRoot string) (string, error) {
|
|||||||
}
|
}
|
||||||
return moduleName, fmt.Errorf("no `go.mod` file in every parent directory of `%s`", pathToProjectRoot)
|
return moduleName, fmt.Errorf("no `go.mod` file in every parent directory of `%s`", pathToProjectRoot)
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// CloseIfExists call obj.Close() if obj is not nil.
|
||||||
|
func CloseIfExists(obj any) error {
|
||||||
|
if obj != nil {
|
||||||
|
v := reflect.ValueOf(obj)
|
||||||
|
if !v.IsNil() {
|
||||||
|
return Close(obj)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|||||||
@@ -10,6 +10,9 @@ func RandBetween(from int64, to int64) int64 {
|
|||||||
if from == to {
|
if from == to {
|
||||||
return from
|
return from
|
||||||
}
|
}
|
||||||
|
if from > to {
|
||||||
|
from, to = to, from
|
||||||
|
}
|
||||||
bigInt, _ := rand.Int(rand.Reader, big.NewInt(to-from))
|
bigInt, _ := rand.Int(rand.Reader, big.NewInt(to-from))
|
||||||
return from + bigInt.Int64()
|
return from + bigInt.Int64()
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -2,6 +2,7 @@ package mux
|
|||||||
|
|
||||||
import (
|
import (
|
||||||
"context"
|
"context"
|
||||||
|
goerrors "errors"
|
||||||
"io"
|
"io"
|
||||||
"sync"
|
"sync"
|
||||||
"time"
|
"time"
|
||||||
@@ -154,8 +155,11 @@ func (f *DialingWorkerFactory) Create() (*ClientWorker, error) {
|
|||||||
ctx := session.ContextWithOutbounds(context.Background(), outbounds)
|
ctx := session.ContextWithOutbounds(context.Background(), outbounds)
|
||||||
ctx, cancel := context.WithCancel(ctx)
|
ctx, cancel := context.WithCancel(ctx)
|
||||||
|
|
||||||
if err := p.Process(ctx, &transport.Link{Reader: uplinkReader, Writer: downlinkWriter}, d); err != nil {
|
if errP := p.Process(ctx, &transport.Link{Reader: uplinkReader, Writer: downlinkWriter}, d); errP != nil {
|
||||||
errors.LogInfoInner(ctx, err, "failed to handler mux client connection")
|
errC := errors.Cause(errP)
|
||||||
|
if !(goerrors.Is(errC, io.EOF) || goerrors.Is(errC, io.ErrClosedPipe) || goerrors.Is(errC, context.Canceled)) {
|
||||||
|
errors.LogInfoInner(ctx, errP, "failed to handler mux client connection")
|
||||||
|
}
|
||||||
}
|
}
|
||||||
common.Must(c.Close())
|
common.Must(c.Close())
|
||||||
cancel()
|
cancel()
|
||||||
@@ -211,23 +215,28 @@ func (m *ClientWorker) Closed() bool {
|
|||||||
return m.done.Done()
|
return m.done.Done()
|
||||||
}
|
}
|
||||||
|
|
||||||
func (m *ClientWorker) GetTimer() *time.Ticker {
|
func (m *ClientWorker) WaitClosed() <-chan struct{} {
|
||||||
return m.timer
|
return m.done.Wait()
|
||||||
|
}
|
||||||
|
|
||||||
|
func (m *ClientWorker) Close() error {
|
||||||
|
return m.done.Close()
|
||||||
}
|
}
|
||||||
|
|
||||||
func (m *ClientWorker) monitor() {
|
func (m *ClientWorker) monitor() {
|
||||||
defer m.timer.Stop()
|
defer m.timer.Stop()
|
||||||
|
|
||||||
for {
|
for {
|
||||||
|
checkSize := m.sessionManager.Size()
|
||||||
|
checkCount := m.sessionManager.Count()
|
||||||
select {
|
select {
|
||||||
case <-m.done.Wait():
|
case <-m.done.Wait():
|
||||||
m.sessionManager.Close()
|
m.sessionManager.Close()
|
||||||
common.Close(m.link.Writer)
|
common.Interrupt(m.link.Writer)
|
||||||
common.Interrupt(m.link.Reader)
|
common.Interrupt(m.link.Reader)
|
||||||
return
|
return
|
||||||
case <-m.timer.C:
|
case <-m.timer.C:
|
||||||
size := m.sessionManager.Size()
|
if m.sessionManager.CloseIfNoSessionAndIdle(checkSize, checkCount) {
|
||||||
if size == 0 && m.sessionManager.CloseIfNoSession() {
|
|
||||||
common.Must(m.done.Close())
|
common.Must(m.done.Close())
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
@@ -308,6 +317,12 @@ func (m *ClientWorker) Dispatch(ctx context.Context, link *transport.Link) bool
|
|||||||
s.input = link.Reader
|
s.input = link.Reader
|
||||||
s.output = link.Writer
|
s.output = link.Writer
|
||||||
go fetchInput(ctx, s, m.link.Writer)
|
go fetchInput(ctx, s, m.link.Writer)
|
||||||
|
if _, ok := link.Reader.(*pipe.Reader); !ok {
|
||||||
|
select {
|
||||||
|
case <-ctx.Done():
|
||||||
|
case <-s.done.Wait():
|
||||||
|
}
|
||||||
|
}
|
||||||
return true
|
return true
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|||||||
@@ -3,7 +3,9 @@ package mux
|
|||||||
import (
|
import (
|
||||||
"context"
|
"context"
|
||||||
"io"
|
"io"
|
||||||
|
"time"
|
||||||
|
|
||||||
|
"github.com/xtls/xray-core/app/dispatcher"
|
||||||
"github.com/xtls/xray-core/common"
|
"github.com/xtls/xray-core/common"
|
||||||
"github.com/xtls/xray-core/common/buf"
|
"github.com/xtls/xray-core/common/buf"
|
||||||
"github.com/xtls/xray-core/common/errors"
|
"github.com/xtls/xray-core/common/errors"
|
||||||
@@ -11,6 +13,7 @@ import (
|
|||||||
"github.com/xtls/xray-core/common/net"
|
"github.com/xtls/xray-core/common/net"
|
||||||
"github.com/xtls/xray-core/common/protocol"
|
"github.com/xtls/xray-core/common/protocol"
|
||||||
"github.com/xtls/xray-core/common/session"
|
"github.com/xtls/xray-core/common/session"
|
||||||
|
"github.com/xtls/xray-core/common/signal/done"
|
||||||
"github.com/xtls/xray-core/core"
|
"github.com/xtls/xray-core/core"
|
||||||
"github.com/xtls/xray-core/features/routing"
|
"github.com/xtls/xray-core/features/routing"
|
||||||
"github.com/xtls/xray-core/transport"
|
"github.com/xtls/xray-core/transport"
|
||||||
@@ -61,8 +64,16 @@ func (s *Server) DispatchLink(ctx context.Context, dest net.Destination, link *t
|
|||||||
if dest.Address != muxCoolAddress {
|
if dest.Address != muxCoolAddress {
|
||||||
return s.dispatcher.DispatchLink(ctx, dest, link)
|
return s.dispatcher.DispatchLink(ctx, dest, link)
|
||||||
}
|
}
|
||||||
_, err := NewServerWorker(ctx, s.dispatcher, link)
|
link = s.dispatcher.(*dispatcher.DefaultDispatcher).WrapLink(ctx, link)
|
||||||
return err
|
worker, err := NewServerWorker(ctx, s.dispatcher, link)
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
select {
|
||||||
|
case <-ctx.Done():
|
||||||
|
case <-worker.done.Wait():
|
||||||
|
}
|
||||||
|
return nil
|
||||||
}
|
}
|
||||||
|
|
||||||
// Start implements common.Runnable.
|
// Start implements common.Runnable.
|
||||||
@@ -79,6 +90,8 @@ type ServerWorker struct {
|
|||||||
dispatcher routing.Dispatcher
|
dispatcher routing.Dispatcher
|
||||||
link *transport.Link
|
link *transport.Link
|
||||||
sessionManager *SessionManager
|
sessionManager *SessionManager
|
||||||
|
done *done.Instance
|
||||||
|
timer *time.Ticker
|
||||||
}
|
}
|
||||||
|
|
||||||
func NewServerWorker(ctx context.Context, d routing.Dispatcher, link *transport.Link) (*ServerWorker, error) {
|
func NewServerWorker(ctx context.Context, d routing.Dispatcher, link *transport.Link) (*ServerWorker, error) {
|
||||||
@@ -86,8 +99,14 @@ func NewServerWorker(ctx context.Context, d routing.Dispatcher, link *transport.
|
|||||||
dispatcher: d,
|
dispatcher: d,
|
||||||
link: link,
|
link: link,
|
||||||
sessionManager: NewSessionManager(),
|
sessionManager: NewSessionManager(),
|
||||||
|
done: done.New(),
|
||||||
|
timer: time.NewTicker(60 * time.Second),
|
||||||
|
}
|
||||||
|
if inbound := session.InboundFromContext(ctx); inbound != nil {
|
||||||
|
inbound.CanSpliceCopy = 3
|
||||||
}
|
}
|
||||||
go worker.run(ctx)
|
go worker.run(ctx)
|
||||||
|
go worker.monitor()
|
||||||
return worker, nil
|
return worker, nil
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -102,12 +121,40 @@ func handle(ctx context.Context, s *Session, output buf.Writer) {
|
|||||||
s.Close(false)
|
s.Close(false)
|
||||||
}
|
}
|
||||||
|
|
||||||
|
func (w *ServerWorker) monitor() {
|
||||||
|
defer w.timer.Stop()
|
||||||
|
|
||||||
|
for {
|
||||||
|
checkSize := w.sessionManager.Size()
|
||||||
|
checkCount := w.sessionManager.Count()
|
||||||
|
select {
|
||||||
|
case <-w.done.Wait():
|
||||||
|
w.sessionManager.Close()
|
||||||
|
common.Interrupt(w.link.Writer)
|
||||||
|
common.Interrupt(w.link.Reader)
|
||||||
|
return
|
||||||
|
case <-w.timer.C:
|
||||||
|
if w.sessionManager.CloseIfNoSessionAndIdle(checkSize, checkCount) {
|
||||||
|
common.Must(w.done.Close())
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
func (w *ServerWorker) ActiveConnections() uint32 {
|
func (w *ServerWorker) ActiveConnections() uint32 {
|
||||||
return uint32(w.sessionManager.Size())
|
return uint32(w.sessionManager.Size())
|
||||||
}
|
}
|
||||||
|
|
||||||
func (w *ServerWorker) Closed() bool {
|
func (w *ServerWorker) Closed() bool {
|
||||||
return w.sessionManager.Closed()
|
return w.done.Done()
|
||||||
|
}
|
||||||
|
|
||||||
|
func (w *ServerWorker) WaitClosed() <-chan struct{} {
|
||||||
|
return w.done.Wait()
|
||||||
|
}
|
||||||
|
|
||||||
|
func (w *ServerWorker) Close() error {
|
||||||
|
return w.done.Close()
|
||||||
}
|
}
|
||||||
|
|
||||||
func (w *ServerWorker) handleStatusKeepAlive(meta *FrameMetadata, reader *buf.BufferedReader) error {
|
func (w *ServerWorker) handleStatusKeepAlive(meta *FrameMetadata, reader *buf.BufferedReader) error {
|
||||||
@@ -308,11 +355,11 @@ func (w *ServerWorker) handleFrame(ctx context.Context, reader *buf.BufferedRead
|
|||||||
}
|
}
|
||||||
|
|
||||||
func (w *ServerWorker) run(ctx context.Context) {
|
func (w *ServerWorker) run(ctx context.Context) {
|
||||||
reader := &buf.BufferedReader{Reader: w.link.Reader}
|
defer func() {
|
||||||
|
common.Must(w.done.Close())
|
||||||
|
}()
|
||||||
|
|
||||||
defer w.sessionManager.Close()
|
reader := &buf.BufferedReader{Reader: w.link.Reader}
|
||||||
defer common.Close(w.link.Writer)
|
|
||||||
defer common.Interrupt(w.link.Reader)
|
|
||||||
|
|
||||||
for {
|
for {
|
||||||
select {
|
select {
|
||||||
|
|||||||
@@ -12,6 +12,7 @@ import (
|
|||||||
"github.com/xtls/xray-core/common/errors"
|
"github.com/xtls/xray-core/common/errors"
|
||||||
"github.com/xtls/xray-core/common/net"
|
"github.com/xtls/xray-core/common/net"
|
||||||
"github.com/xtls/xray-core/common/protocol"
|
"github.com/xtls/xray-core/common/protocol"
|
||||||
|
"github.com/xtls/xray-core/common/signal/done"
|
||||||
"github.com/xtls/xray-core/transport/pipe"
|
"github.com/xtls/xray-core/transport/pipe"
|
||||||
)
|
)
|
||||||
|
|
||||||
@@ -53,7 +54,7 @@ func (m *SessionManager) Count() int {
|
|||||||
func (m *SessionManager) Allocate(Strategy *ClientStrategy) *Session {
|
func (m *SessionManager) Allocate(Strategy *ClientStrategy) *Session {
|
||||||
m.Lock()
|
m.Lock()
|
||||||
defer m.Unlock()
|
defer m.Unlock()
|
||||||
|
|
||||||
MaxConcurrency := int(Strategy.MaxConcurrency)
|
MaxConcurrency := int(Strategy.MaxConcurrency)
|
||||||
MaxConnection := uint16(Strategy.MaxConnection)
|
MaxConnection := uint16(Strategy.MaxConnection)
|
||||||
|
|
||||||
@@ -65,6 +66,7 @@ func (m *SessionManager) Allocate(Strategy *ClientStrategy) *Session {
|
|||||||
s := &Session{
|
s := &Session{
|
||||||
ID: m.count,
|
ID: m.count,
|
||||||
parent: m,
|
parent: m,
|
||||||
|
done: done.New(),
|
||||||
}
|
}
|
||||||
m.sessions[s.ID] = s
|
m.sessions[s.ID] = s
|
||||||
return s
|
return s
|
||||||
@@ -115,7 +117,7 @@ func (m *SessionManager) Get(id uint16) (*Session, bool) {
|
|||||||
return s, found
|
return s, found
|
||||||
}
|
}
|
||||||
|
|
||||||
func (m *SessionManager) CloseIfNoSession() bool {
|
func (m *SessionManager) CloseIfNoSessionAndIdle(checkSize int, checkCount int) bool {
|
||||||
m.Lock()
|
m.Lock()
|
||||||
defer m.Unlock()
|
defer m.Unlock()
|
||||||
|
|
||||||
@@ -123,11 +125,13 @@ func (m *SessionManager) CloseIfNoSession() bool {
|
|||||||
return true
|
return true
|
||||||
}
|
}
|
||||||
|
|
||||||
if len(m.sessions) != 0 {
|
if len(m.sessions) != 0 || checkSize != 0 || checkCount != int(m.count) {
|
||||||
return false
|
return false
|
||||||
}
|
}
|
||||||
|
|
||||||
m.closed = true
|
m.closed = true
|
||||||
|
|
||||||
|
m.sessions = nil
|
||||||
return true
|
return true
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -157,6 +161,7 @@ type Session struct {
|
|||||||
ID uint16
|
ID uint16
|
||||||
transferType protocol.TransferType
|
transferType protocol.TransferType
|
||||||
closed bool
|
closed bool
|
||||||
|
done *done.Instance
|
||||||
XUDP *XUDP
|
XUDP *XUDP
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -171,6 +176,9 @@ func (s *Session) Close(locked bool) error {
|
|||||||
return nil
|
return nil
|
||||||
}
|
}
|
||||||
s.closed = true
|
s.closed = true
|
||||||
|
if s.done != nil {
|
||||||
|
s.done.Close()
|
||||||
|
}
|
||||||
if s.XUDP == nil {
|
if s.XUDP == nil {
|
||||||
common.Interrupt(s.input)
|
common.Interrupt(s.input)
|
||||||
common.Close(s.output)
|
common.Close(s.output)
|
||||||
|
|||||||
@@ -41,11 +41,11 @@ func TestSessionManagerClose(t *testing.T) {
|
|||||||
m := NewSessionManager()
|
m := NewSessionManager()
|
||||||
s := m.Allocate(&ClientStrategy{})
|
s := m.Allocate(&ClientStrategy{})
|
||||||
|
|
||||||
if m.CloseIfNoSession() {
|
if m.CloseIfNoSessionAndIdle(m.Size(), m.Count()) {
|
||||||
t.Error("able to close")
|
t.Error("able to close")
|
||||||
}
|
}
|
||||||
m.Remove(false, s.ID)
|
m.Remove(false, s.ID)
|
||||||
if !m.CloseIfNoSession() {
|
if !m.CloseIfNoSessionAndIdle(m.Size(), m.Count()) {
|
||||||
t.Error("not able to close")
|
t.Error("not able to close")
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -16,11 +16,12 @@ const (
|
|||||||
RequestCommandTCP = RequestCommand(0x01)
|
RequestCommandTCP = RequestCommand(0x01)
|
||||||
RequestCommandUDP = RequestCommand(0x02)
|
RequestCommandUDP = RequestCommand(0x02)
|
||||||
RequestCommandMux = RequestCommand(0x03)
|
RequestCommandMux = RequestCommand(0x03)
|
||||||
|
RequestCommandRvs = RequestCommand(0x04)
|
||||||
)
|
)
|
||||||
|
|
||||||
func (c RequestCommand) TransferType() TransferType {
|
func (c RequestCommand) TransferType() TransferType {
|
||||||
switch c {
|
switch c {
|
||||||
case RequestCommandTCP, RequestCommandMux:
|
case RequestCommandTCP, RequestCommandMux, RequestCommandRvs:
|
||||||
return TransferTypeStream
|
return TransferTypeStream
|
||||||
case RequestCommandUDP:
|
case RequestCommandUDP:
|
||||||
return TransferTypePacket
|
return TransferTypePacket
|
||||||
@@ -79,20 +80,18 @@ type CommandSwitchAccount struct {
|
|||||||
}
|
}
|
||||||
|
|
||||||
var (
|
var (
|
||||||
hasGCMAsmAMD64 = cpu.X86.HasAES && cpu.X86.HasPCLMULQDQ
|
// Keep in sync with crypto/tls/cipher_suites.go.
|
||||||
|
hasGCMAsmAMD64 = cpu.X86.HasAES && cpu.X86.HasPCLMULQDQ && cpu.X86.HasSSE41 && cpu.X86.HasSSSE3
|
||||||
hasGCMAsmARM64 = cpu.ARM64.HasAES && cpu.ARM64.HasPMULL
|
hasGCMAsmARM64 = cpu.ARM64.HasAES && cpu.ARM64.HasPMULL
|
||||||
// Keep in sync with crypto/aes/cipher_s390x.go.
|
hasGCMAsmS390X = cpu.S390X.HasAES && cpu.S390X.HasAESCTR && cpu.S390X.HasGHASH
|
||||||
hasGCMAsmS390X = cpu.S390X.HasAES && cpu.S390X.HasAESCBC && cpu.S390X.HasAESCTR &&
|
hasGCMAsmPPC64 = runtime.GOARCH == "ppc64" || runtime.GOARCH == "ppc64le"
|
||||||
(cpu.S390X.HasGHASH || cpu.S390X.HasAESGCM)
|
|
||||||
|
|
||||||
hasAESGCMHardwareSupport = runtime.GOARCH == "amd64" && hasGCMAsmAMD64 ||
|
HasAESGCMHardwareSupport = hasGCMAsmAMD64 || hasGCMAsmARM64 || hasGCMAsmS390X || hasGCMAsmPPC64
|
||||||
runtime.GOARCH == "arm64" && hasGCMAsmARM64 ||
|
|
||||||
runtime.GOARCH == "s390x" && hasGCMAsmS390X
|
|
||||||
)
|
)
|
||||||
|
|
||||||
func (sc *SecurityConfig) GetSecurityType() SecurityType {
|
func (sc *SecurityConfig) GetSecurityType() SecurityType {
|
||||||
if sc == nil || sc.Type == SecurityType_AUTO {
|
if sc == nil || sc.Type == SecurityType_AUTO {
|
||||||
if hasAESGCMHardwareSupport {
|
if HasAESGCMHardwareSupport {
|
||||||
return SecurityType_AES128_GCM
|
return SecurityType_AES128_GCM
|
||||||
}
|
}
|
||||||
return SecurityType_CHACHA20_POLY1305
|
return SecurityType_CHACHA20_POLY1305
|
||||||
|
|||||||
@@ -6,6 +6,7 @@ import (
|
|||||||
|
|
||||||
"github.com/xtls/xray-core/common/ctx"
|
"github.com/xtls/xray-core/common/ctx"
|
||||||
"github.com/xtls/xray-core/common/net"
|
"github.com/xtls/xray-core/common/net"
|
||||||
|
"github.com/xtls/xray-core/features/outbound"
|
||||||
"github.com/xtls/xray-core/features/routing"
|
"github.com/xtls/xray-core/features/routing"
|
||||||
)
|
)
|
||||||
|
|
||||||
@@ -16,13 +17,13 @@ const (
|
|||||||
inboundSessionKey ctx.SessionKey = 1
|
inboundSessionKey ctx.SessionKey = 1
|
||||||
outboundSessionKey ctx.SessionKey = 2
|
outboundSessionKey ctx.SessionKey = 2
|
||||||
contentSessionKey ctx.SessionKey = 3
|
contentSessionKey ctx.SessionKey = 3
|
||||||
muxPreferredSessionKey ctx.SessionKey = 4 // unused
|
muxPreferredSessionKey ctx.SessionKey = 4 // unused
|
||||||
sockoptSessionKey ctx.SessionKey = 5 // used by dokodemo to only receive sockopt.Mark
|
sockoptSessionKey ctx.SessionKey = 5 // used by dokodemo to only receive sockopt.Mark
|
||||||
trackedConnectionErrorKey ctx.SessionKey = 6 // used by observer to get outbound error
|
trackedConnectionErrorKey ctx.SessionKey = 6 // used by observer to get outbound error
|
||||||
dispatcherKey ctx.SessionKey = 7 // used by ss2022 inbounds to get dispatcher
|
dispatcherKey ctx.SessionKey = 7 // used by ss2022 inbounds to get dispatcher
|
||||||
timeoutOnlyKey ctx.SessionKey = 8 // mux context's child contexts to only cancel when its own traffic times out
|
timeoutOnlyKey ctx.SessionKey = 8 // mux context's child contexts to only cancel when its own traffic times out
|
||||||
allowedNetworkKey ctx.SessionKey = 9 // muxcool server control incoming request tcp/udp
|
allowedNetworkKey ctx.SessionKey = 9 // muxcool server control incoming request tcp/udp
|
||||||
handlerSessionKey ctx.SessionKey = 10 // unused
|
handlerSessionKey ctx.SessionKey = 10 // outbound gets full handler
|
||||||
mitmAlpn11Key ctx.SessionKey = 11 // used by TLS dialer
|
mitmAlpn11Key ctx.SessionKey = 11 // used by TLS dialer
|
||||||
mitmServerNameKey ctx.SessionKey = 12 // used by TLS dialer
|
mitmServerNameKey ctx.SessionKey = 12 // used by TLS dialer
|
||||||
)
|
)
|
||||||
@@ -163,6 +164,17 @@ func AllowedNetworkFromContext(ctx context.Context) net.Network {
|
|||||||
return net.Network_Unknown
|
return net.Network_Unknown
|
||||||
}
|
}
|
||||||
|
|
||||||
|
func ContextWithHandler(ctx context.Context, handler outbound.Handler) context.Context {
|
||||||
|
return context.WithValue(ctx, handlerSessionKey, handler)
|
||||||
|
}
|
||||||
|
|
||||||
|
func HandlerFromContext(ctx context.Context) outbound.Handler {
|
||||||
|
if val, ok := ctx.Value(handlerSessionKey).(outbound.Handler); ok {
|
||||||
|
return val
|
||||||
|
}
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
func ContextWithMitmAlpn11(ctx context.Context, alpn11 bool) context.Context {
|
func ContextWithMitmAlpn11(ctx context.Context, alpn11 bool) context.Context {
|
||||||
return context.WithValue(ctx, mitmAlpn11Key, alpn11)
|
return context.WithValue(ctx, mitmAlpn11Key, alpn11)
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -3,6 +3,7 @@ package signal
|
|||||||
import (
|
import (
|
||||||
"context"
|
"context"
|
||||||
"sync"
|
"sync"
|
||||||
|
"sync/atomic"
|
||||||
"time"
|
"time"
|
||||||
|
|
||||||
"github.com/xtls/xray-core/common"
|
"github.com/xtls/xray-core/common"
|
||||||
@@ -14,10 +15,12 @@ type ActivityUpdater interface {
|
|||||||
}
|
}
|
||||||
|
|
||||||
type ActivityTimer struct {
|
type ActivityTimer struct {
|
||||||
sync.RWMutex
|
mu sync.RWMutex
|
||||||
updated chan struct{}
|
updated chan struct{}
|
||||||
checkTask *task.Periodic
|
checkTask *task.Periodic
|
||||||
onTimeout func()
|
onTimeout func()
|
||||||
|
consumed atomic.Bool
|
||||||
|
once sync.Once
|
||||||
}
|
}
|
||||||
|
|
||||||
func (t *ActivityTimer) Update() {
|
func (t *ActivityTimer) Update() {
|
||||||
@@ -37,39 +40,39 @@ func (t *ActivityTimer) check() error {
|
|||||||
}
|
}
|
||||||
|
|
||||||
func (t *ActivityTimer) finish() {
|
func (t *ActivityTimer) finish() {
|
||||||
t.Lock()
|
t.once.Do(func() {
|
||||||
defer t.Unlock()
|
t.consumed.Store(true)
|
||||||
|
t.mu.Lock()
|
||||||
|
defer t.mu.Unlock()
|
||||||
|
|
||||||
if t.onTimeout != nil {
|
common.CloseIfExists(t.checkTask)
|
||||||
t.onTimeout()
|
t.onTimeout()
|
||||||
t.onTimeout = nil
|
})
|
||||||
}
|
|
||||||
if t.checkTask != nil {
|
|
||||||
t.checkTask.Close()
|
|
||||||
t.checkTask = nil
|
|
||||||
}
|
|
||||||
}
|
}
|
||||||
|
|
||||||
func (t *ActivityTimer) SetTimeout(timeout time.Duration) {
|
func (t *ActivityTimer) SetTimeout(timeout time.Duration) {
|
||||||
|
if t.consumed.Load() {
|
||||||
|
return
|
||||||
|
}
|
||||||
if timeout == 0 {
|
if timeout == 0 {
|
||||||
t.finish()
|
t.finish()
|
||||||
return
|
return
|
||||||
}
|
}
|
||||||
|
|
||||||
checkTask := &task.Periodic{
|
t.mu.Lock()
|
||||||
|
defer t.mu.Unlock()
|
||||||
|
// double check, just in case
|
||||||
|
if t.consumed.Load() {
|
||||||
|
return
|
||||||
|
}
|
||||||
|
newCheckTask := &task.Periodic{
|
||||||
Interval: timeout,
|
Interval: timeout,
|
||||||
Execute: t.check,
|
Execute: t.check,
|
||||||
}
|
}
|
||||||
|
common.CloseIfExists(t.checkTask)
|
||||||
t.Lock()
|
t.checkTask = newCheckTask
|
||||||
|
|
||||||
if t.checkTask != nil {
|
|
||||||
t.checkTask.Close()
|
|
||||||
}
|
|
||||||
t.checkTask = checkTask
|
|
||||||
t.Update()
|
t.Update()
|
||||||
common.Must(checkTask.Start())
|
common.Must(newCheckTask.Start())
|
||||||
t.Unlock()
|
|
||||||
}
|
}
|
||||||
|
|
||||||
func CancelAfterInactivity(ctx context.Context, cancel context.CancelFunc, timeout time.Duration) *ActivityTimer {
|
func CancelAfterInactivity(ctx context.Context, cancel context.CancelFunc, timeout time.Duration) *ActivityTimer {
|
||||||
|
|||||||
@@ -18,8 +18,8 @@ import (
|
|||||||
|
|
||||||
var (
|
var (
|
||||||
Version_x byte = 25
|
Version_x byte = 25
|
||||||
Version_y byte = 8
|
Version_y byte = 9
|
||||||
Version_z byte = 3
|
Version_z byte = 11
|
||||||
)
|
)
|
||||||
|
|
||||||
var (
|
var (
|
||||||
|
|||||||
@@ -49,4 +49,7 @@ type Context interface {
|
|||||||
|
|
||||||
// GetSkipDNSResolve returns a flag switch for weather skip dns resolve during route pick.
|
// GetSkipDNSResolve returns a flag switch for weather skip dns resolve during route pick.
|
||||||
GetSkipDNSResolve() bool
|
GetSkipDNSResolve() bool
|
||||||
|
|
||||||
|
// GetError returns errors during route pick, e.g., built-in-dns fail to resolve domain to IP
|
||||||
|
GetError() error
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -1,8 +1,6 @@
|
|||||||
package dns
|
package dns
|
||||||
|
|
||||||
import (
|
import (
|
||||||
"context"
|
|
||||||
|
|
||||||
"github.com/xtls/xray-core/common/errors"
|
"github.com/xtls/xray-core/common/errors"
|
||||||
"github.com/xtls/xray-core/common/net"
|
"github.com/xtls/xray-core/common/net"
|
||||||
"github.com/xtls/xray-core/features/dns"
|
"github.com/xtls/xray-core/features/dns"
|
||||||
@@ -14,6 +12,7 @@ type ResolvableContext struct {
|
|||||||
routing.Context
|
routing.Context
|
||||||
dnsClient dns.Client
|
dnsClient dns.Client
|
||||||
resolvedIPs []net.IP
|
resolvedIPs []net.IP
|
||||||
|
lookupError error
|
||||||
}
|
}
|
||||||
|
|
||||||
// GetTargetIPs overrides original routing.Context's implementation.
|
// GetTargetIPs overrides original routing.Context's implementation.
|
||||||
@@ -22,6 +21,10 @@ func (ctx *ResolvableContext) GetTargetIPs() []net.IP {
|
|||||||
return ctx.resolvedIPs
|
return ctx.resolvedIPs
|
||||||
}
|
}
|
||||||
|
|
||||||
|
if ips := ctx.Context.GetTargetIPs(); len(ips) != 0 {
|
||||||
|
return ips
|
||||||
|
}
|
||||||
|
|
||||||
if domain := ctx.GetTargetDomain(); len(domain) != 0 {
|
if domain := ctx.GetTargetDomain(); len(domain) != 0 {
|
||||||
ips, _, err := ctx.dnsClient.LookupIP(domain, dns.IPOption{
|
ips, _, err := ctx.dnsClient.LookupIP(domain, dns.IPOption{
|
||||||
IPv4Enable: true,
|
IPv4Enable: true,
|
||||||
@@ -32,16 +35,17 @@ func (ctx *ResolvableContext) GetTargetIPs() []net.IP {
|
|||||||
ctx.resolvedIPs = ips
|
ctx.resolvedIPs = ips
|
||||||
return ips
|
return ips
|
||||||
}
|
}
|
||||||
errors.LogInfoInner(context.Background(), err, "resolve ip for ", domain)
|
ctx.lookupError = errors.New("resolve ip for ", domain).Base(err)
|
||||||
}
|
|
||||||
|
|
||||||
if ips := ctx.Context.GetTargetIPs(); len(ips) != 0 {
|
|
||||||
return ips
|
|
||||||
}
|
}
|
||||||
|
|
||||||
return nil
|
return nil
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// GetError override original routing.Context's implementation.
|
||||||
|
func (ctx *ResolvableContext) GetError() error {
|
||||||
|
return ctx.lookupError
|
||||||
|
}
|
||||||
|
|
||||||
// ContextWithDNSClient creates a new routing context with domain resolving capability.
|
// ContextWithDNSClient creates a new routing context with domain resolving capability.
|
||||||
// Resolved domain IPs can be retrieved by GetTargetIPs().
|
// Resolved domain IPs can be retrieved by GetTargetIPs().
|
||||||
func ContextWithDNSClient(ctx routing.Context, client dns.Client) routing.Context {
|
func ContextWithDNSClient(ctx routing.Context, client dns.Client) routing.Context {
|
||||||
|
|||||||
@@ -152,6 +152,11 @@ func (ctx *Context) GetSkipDNSResolve() bool {
|
|||||||
return ctx.Content.SkipDNSResolve
|
return ctx.Content.SkipDNSResolve
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// GetError implements routing.Context.
|
||||||
|
func (ctx *Context) GetError() error {
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
// AsRoutingContext creates a context from context.context with session info.
|
// AsRoutingContext creates a context from context.context with session info.
|
||||||
func AsRoutingContext(ctx context.Context) routing.Context {
|
func AsRoutingContext(ctx context.Context) routing.Context {
|
||||||
outbounds := session.OutboundsFromContext(ctx)
|
outbounds := session.OutboundsFromContext(ctx)
|
||||||
|
|||||||
22
go.mod
22
go.mod
@@ -16,18 +16,18 @@ require (
|
|||||||
github.com/sagernet/sing v0.5.1
|
github.com/sagernet/sing v0.5.1
|
||||||
github.com/sagernet/sing-shadowsocks v0.2.7
|
github.com/sagernet/sing-shadowsocks v0.2.7
|
||||||
github.com/seiflotfy/cuckoofilter v0.0.0-20240715131351-a2f2c23f1771
|
github.com/seiflotfy/cuckoofilter v0.0.0-20240715131351-a2f2c23f1771
|
||||||
github.com/stretchr/testify v1.10.0
|
github.com/stretchr/testify v1.11.1
|
||||||
github.com/v2fly/ss-bloomring v0.0.0-20210312155135-28617310f63e
|
github.com/v2fly/ss-bloomring v0.0.0-20210312155135-28617310f63e
|
||||||
github.com/vishvananda/netlink v1.3.1
|
github.com/vishvananda/netlink v1.3.1
|
||||||
github.com/xtls/reality v0.0.0-20250725142056-5b52a03d4fb7
|
github.com/xtls/reality v0.0.0-20250904214705-431b6ff8c67c
|
||||||
go4.org/netipx v0.0.0-20231129151722-fdeea329fbba
|
go4.org/netipx v0.0.0-20231129151722-fdeea329fbba
|
||||||
golang.org/x/crypto v0.41.0
|
golang.org/x/crypto v0.42.0
|
||||||
golang.org/x/net v0.43.0
|
golang.org/x/net v0.44.0
|
||||||
golang.org/x/sync v0.16.0
|
golang.org/x/sync v0.17.0
|
||||||
golang.org/x/sys v0.35.0
|
golang.org/x/sys v0.36.0
|
||||||
golang.zx2c4.com/wireguard v0.0.0-20231211153847-12269c276173
|
golang.zx2c4.com/wireguard v0.0.0-20231211153847-12269c276173
|
||||||
google.golang.org/grpc v1.75.0
|
google.golang.org/grpc v1.75.1
|
||||||
google.golang.org/protobuf v1.36.8
|
google.golang.org/protobuf v1.36.9
|
||||||
gvisor.dev/gvisor v0.0.0-20250428193742-2d800c3129d5
|
gvisor.dev/gvisor v0.0.0-20250428193742-2d800c3129d5
|
||||||
h12.io/socks v1.0.3
|
h12.io/socks v1.0.3
|
||||||
lukechampine.com/blake3 v1.4.1
|
lukechampine.com/blake3 v1.4.1
|
||||||
@@ -47,10 +47,10 @@ require (
|
|||||||
github.com/riobard/go-bloom v0.0.0-20200614022211-cdc8013cb5b3 // indirect
|
github.com/riobard/go-bloom v0.0.0-20200614022211-cdc8013cb5b3 // indirect
|
||||||
github.com/vishvananda/netns v0.0.5 // indirect
|
github.com/vishvananda/netns v0.0.5 // indirect
|
||||||
go.uber.org/mock v0.5.0 // indirect
|
go.uber.org/mock v0.5.0 // indirect
|
||||||
golang.org/x/mod v0.26.0 // indirect
|
golang.org/x/mod v0.27.0 // indirect
|
||||||
golang.org/x/text v0.28.0 // indirect
|
golang.org/x/text v0.29.0 // indirect
|
||||||
golang.org/x/time v0.7.0 // indirect
|
golang.org/x/time v0.7.0 // indirect
|
||||||
golang.org/x/tools v0.35.0 // indirect
|
golang.org/x/tools v0.36.0 // indirect
|
||||||
golang.zx2c4.com/wintun v0.0.0-20230126152724-0fa3db229ce2 // indirect
|
golang.zx2c4.com/wintun v0.0.0-20230126152724-0fa3db229ce2 // indirect
|
||||||
google.golang.org/genproto/googleapis/rpc v0.0.0-20250707201910-8d1bb00bc6a7 // indirect
|
google.golang.org/genproto/googleapis/rpc v0.0.0-20250707201910-8d1bb00bc6a7 // indirect
|
||||||
gopkg.in/yaml.v2 v2.4.0 // indirect
|
gopkg.in/yaml.v2 v2.4.0 // indirect
|
||||||
|
|||||||
44
go.sum
44
go.sum
@@ -67,16 +67,16 @@ github.com/seiflotfy/cuckoofilter v0.0.0-20240715131351-a2f2c23f1771 h1:emzAzMZ1
|
|||||||
github.com/seiflotfy/cuckoofilter v0.0.0-20240715131351-a2f2c23f1771/go.mod h1:bR6DqgcAl1zTcOX8/pE2Qkj9XO00eCNqmKb7lXP8EAg=
|
github.com/seiflotfy/cuckoofilter v0.0.0-20240715131351-a2f2c23f1771/go.mod h1:bR6DqgcAl1zTcOX8/pE2Qkj9XO00eCNqmKb7lXP8EAg=
|
||||||
github.com/stretchr/objx v0.1.0/go.mod h1:HFkY916IF+rwdDfMAkV7OtwuqBVzrE8GR6GFx+wExME=
|
github.com/stretchr/objx v0.1.0/go.mod h1:HFkY916IF+rwdDfMAkV7OtwuqBVzrE8GR6GFx+wExME=
|
||||||
github.com/stretchr/testify v1.6.1/go.mod h1:6Fq8oRcR53rry900zMqJjRRixrwX3KX962/h/Wwjteg=
|
github.com/stretchr/testify v1.6.1/go.mod h1:6Fq8oRcR53rry900zMqJjRRixrwX3KX962/h/Wwjteg=
|
||||||
github.com/stretchr/testify v1.10.0 h1:Xv5erBjTwe/5IxqUQTdXv5kgmIvbHo3QQyRwhJsOfJA=
|
github.com/stretchr/testify v1.11.1 h1:7s2iGBzp5EwR7/aIZr8ao5+dra3wiQyKjjFuvgVKu7U=
|
||||||
github.com/stretchr/testify v1.10.0/go.mod h1:r2ic/lqez/lEtzL7wO/rwa5dbSLXVDPFyf8C91i36aY=
|
github.com/stretchr/testify v1.11.1/go.mod h1:wZwfW3scLgRK+23gO65QZefKpKQRnfz6sD981Nm4B6U=
|
||||||
github.com/v2fly/ss-bloomring v0.0.0-20210312155135-28617310f63e h1:5QefA066A1tF8gHIiADmOVOV5LS43gt3ONnlEl3xkwI=
|
github.com/v2fly/ss-bloomring v0.0.0-20210312155135-28617310f63e h1:5QefA066A1tF8gHIiADmOVOV5LS43gt3ONnlEl3xkwI=
|
||||||
github.com/v2fly/ss-bloomring v0.0.0-20210312155135-28617310f63e/go.mod h1:5t19P9LBIrNamL6AcMQOncg/r10y3Pc01AbHeMhwlpU=
|
github.com/v2fly/ss-bloomring v0.0.0-20210312155135-28617310f63e/go.mod h1:5t19P9LBIrNamL6AcMQOncg/r10y3Pc01AbHeMhwlpU=
|
||||||
github.com/vishvananda/netlink v1.3.1 h1:3AEMt62VKqz90r0tmNhog0r/PpWKmrEShJU0wJW6bV0=
|
github.com/vishvananda/netlink v1.3.1 h1:3AEMt62VKqz90r0tmNhog0r/PpWKmrEShJU0wJW6bV0=
|
||||||
github.com/vishvananda/netlink v1.3.1/go.mod h1:ARtKouGSTGchR8aMwmkzC0qiNPrrWO5JS/XMVl45+b4=
|
github.com/vishvananda/netlink v1.3.1/go.mod h1:ARtKouGSTGchR8aMwmkzC0qiNPrrWO5JS/XMVl45+b4=
|
||||||
github.com/vishvananda/netns v0.0.5 h1:DfiHV+j8bA32MFM7bfEunvT8IAqQ/NzSJHtcmW5zdEY=
|
github.com/vishvananda/netns v0.0.5 h1:DfiHV+j8bA32MFM7bfEunvT8IAqQ/NzSJHtcmW5zdEY=
|
||||||
github.com/vishvananda/netns v0.0.5/go.mod h1:SpkAiCQRtJ6TvvxPnOSyH3BMl6unz3xZlaprSwhNNJM=
|
github.com/vishvananda/netns v0.0.5/go.mod h1:SpkAiCQRtJ6TvvxPnOSyH3BMl6unz3xZlaprSwhNNJM=
|
||||||
github.com/xtls/reality v0.0.0-20250725142056-5b52a03d4fb7 h1:Ript0vN+nSO33+Vj4n0mgNY5M+oOxFQJdrJ1VnwTBO0=
|
github.com/xtls/reality v0.0.0-20250904214705-431b6ff8c67c h1:LHLhQY3mKXSpTcQAkjFR4/6ar3rXjQryNeM7khK3AHU=
|
||||||
github.com/xtls/reality v0.0.0-20250725142056-5b52a03d4fb7/go.mod h1:XxvnCCgBee4WWE0bc4E+a7wbk8gkJ/rS0vNVNtC5qp0=
|
github.com/xtls/reality v0.0.0-20250904214705-431b6ff8c67c/go.mod h1:XxvnCCgBee4WWE0bc4E+a7wbk8gkJ/rS0vNVNtC5qp0=
|
||||||
github.com/yuin/goldmark v1.4.1/go.mod h1:mwnBkeHKe2W/ZEtQ+71ViKU8L12m81fl3OWwC1Zlc8k=
|
github.com/yuin/goldmark v1.4.1/go.mod h1:mwnBkeHKe2W/ZEtQ+71ViKU8L12m81fl3OWwC1Zlc8k=
|
||||||
go.opentelemetry.io/auto/sdk v1.1.0 h1:cH53jehLUN6UFLY71z+NDOiNJqDdPRaXzTel0sJySYA=
|
go.opentelemetry.io/auto/sdk v1.1.0 h1:cH53jehLUN6UFLY71z+NDOiNJqDdPRaXzTel0sJySYA=
|
||||||
go.opentelemetry.io/auto/sdk v1.1.0/go.mod h1:3wSPjt5PWp2RhlCcmmOial7AvC4DQqZb7a7wCow3W8A=
|
go.opentelemetry.io/auto/sdk v1.1.0/go.mod h1:3wSPjt5PWp2RhlCcmmOial7AvC4DQqZb7a7wCow3W8A=
|
||||||
@@ -96,20 +96,20 @@ go4.org/netipx v0.0.0-20231129151722-fdeea329fbba h1:0b9z3AuHCjxk0x/opv64kcgZLBs
|
|||||||
go4.org/netipx v0.0.0-20231129151722-fdeea329fbba/go.mod h1:PLyyIXexvUFg3Owu6p/WfdlivPbZJsZdgWZlrGope/Y=
|
go4.org/netipx v0.0.0-20231129151722-fdeea329fbba/go.mod h1:PLyyIXexvUFg3Owu6p/WfdlivPbZJsZdgWZlrGope/Y=
|
||||||
golang.org/x/crypto v0.0.0-20190308221718-c2843e01d9a2/go.mod h1:djNgcEr1/C05ACkg1iLfiJU5Ep61QUkGW8qpdssI0+w=
|
golang.org/x/crypto v0.0.0-20190308221718-c2843e01d9a2/go.mod h1:djNgcEr1/C05ACkg1iLfiJU5Ep61QUkGW8qpdssI0+w=
|
||||||
golang.org/x/crypto v0.0.0-20191011191535-87dc89f01550/go.mod h1:yigFU9vqHzYiE8UmvKecakEJjdnWj3jj499lnFckfCI=
|
golang.org/x/crypto v0.0.0-20191011191535-87dc89f01550/go.mod h1:yigFU9vqHzYiE8UmvKecakEJjdnWj3jj499lnFckfCI=
|
||||||
golang.org/x/crypto v0.41.0 h1:WKYxWedPGCTVVl5+WHSSrOBT0O8lx32+zxmHxijgXp4=
|
golang.org/x/crypto v0.42.0 h1:chiH31gIWm57EkTXpwnqf8qeuMUi0yekh6mT2AvFlqI=
|
||||||
golang.org/x/crypto v0.41.0/go.mod h1:pO5AFd7FA68rFak7rOAGVuygIISepHftHnr8dr6+sUc=
|
golang.org/x/crypto v0.42.0/go.mod h1:4+rDnOTJhQCx2q7/j6rAN5XDw8kPjeaXEUR2eL94ix8=
|
||||||
golang.org/x/mod v0.5.1/go.mod h1:5OXOZSfqPIIbmVBIIKWRFfZjPR0E5r58TLhUjH0a2Ro=
|
golang.org/x/mod v0.5.1/go.mod h1:5OXOZSfqPIIbmVBIIKWRFfZjPR0E5r58TLhUjH0a2Ro=
|
||||||
golang.org/x/mod v0.26.0 h1:EGMPT//Ezu+ylkCijjPc+f4Aih7sZvaAr+O3EHBxvZg=
|
golang.org/x/mod v0.27.0 h1:kb+q2PyFnEADO2IEF935ehFUXlWiNjJWtRNgBLSfbxQ=
|
||||||
golang.org/x/mod v0.26.0/go.mod h1:/j6NAhSk8iQ723BGAUyoAcn7SlD7s15Dp9Nd/SfeaFQ=
|
golang.org/x/mod v0.27.0/go.mod h1:rWI627Fq0DEoudcK+MBkNkCe0EetEaDSwJJkCcjpazc=
|
||||||
golang.org/x/net v0.0.0-20190404232315-eb5bcb51f2a3/go.mod h1:t9HGtf8HONx5eT2rtn7q6eTqICYqUVnKs3thJo3Qplg=
|
golang.org/x/net v0.0.0-20190404232315-eb5bcb51f2a3/go.mod h1:t9HGtf8HONx5eT2rtn7q6eTqICYqUVnKs3thJo3Qplg=
|
||||||
golang.org/x/net v0.0.0-20190620200207-3b0461eec859/go.mod h1:z5CRVTTTmAJ677TzLLGU+0bjPO0LkuOLi4/5GtJWs/s=
|
golang.org/x/net v0.0.0-20190620200207-3b0461eec859/go.mod h1:z5CRVTTTmAJ677TzLLGU+0bjPO0LkuOLi4/5GtJWs/s=
|
||||||
golang.org/x/net v0.0.0-20211015210444-4f30a5c0130f/go.mod h1:9nx3DQGgdP8bBQD5qxJ1jj9UTztislL4KSBs9R2vV5Y=
|
golang.org/x/net v0.0.0-20211015210444-4f30a5c0130f/go.mod h1:9nx3DQGgdP8bBQD5qxJ1jj9UTztislL4KSBs9R2vV5Y=
|
||||||
golang.org/x/net v0.43.0 h1:lat02VYK2j4aLzMzecihNvTlJNQUq316m2Mr9rnM6YE=
|
golang.org/x/net v0.44.0 h1:evd8IRDyfNBMBTTY5XRF1vaZlD+EmWx6x8PkhR04H/I=
|
||||||
golang.org/x/net v0.43.0/go.mod h1:vhO1fvI4dGsIjh73sWfUVjj3N7CA9WkKJNQm2svM6Jg=
|
golang.org/x/net v0.44.0/go.mod h1:ECOoLqd5U3Lhyeyo/QDCEVQ4sNgYsqvCZ722XogGieY=
|
||||||
golang.org/x/sync v0.0.0-20190423024810-112230192c58/go.mod h1:RxMgew5VJxzue5/jJTE5uejpjVlOe/izrB70Jof72aM=
|
golang.org/x/sync v0.0.0-20190423024810-112230192c58/go.mod h1:RxMgew5VJxzue5/jJTE5uejpjVlOe/izrB70Jof72aM=
|
||||||
golang.org/x/sync v0.0.0-20210220032951-036812b2e83c/go.mod h1:RxMgew5VJxzue5/jJTE5uejpjVlOe/izrB70Jof72aM=
|
golang.org/x/sync v0.0.0-20210220032951-036812b2e83c/go.mod h1:RxMgew5VJxzue5/jJTE5uejpjVlOe/izrB70Jof72aM=
|
||||||
golang.org/x/sync v0.16.0 h1:ycBJEhp9p4vXvUZNszeOq0kGTPghopOL8q0fq3vstxw=
|
golang.org/x/sync v0.17.0 h1:l60nONMj9l5drqw6jlhIELNv9I0A4OFgRsG9k2oT9Ug=
|
||||||
golang.org/x/sync v0.16.0/go.mod h1:1dzgHSNfp02xaA81J2MS99Qcpr2w7fw1gpm99rleRqA=
|
golang.org/x/sync v0.17.0/go.mod h1:9KTHXmSnoGruLpwFjVSX0lNNA75CykiMECbovNTZqGI=
|
||||||
golang.org/x/sys v0.0.0-20190215142949-d0b11bdaac8a/go.mod h1:STP8DvDyc/dI5b8T5hshtkjS+E42TnysNCUPdjciGhY=
|
golang.org/x/sys v0.0.0-20190215142949-d0b11bdaac8a/go.mod h1:STP8DvDyc/dI5b8T5hshtkjS+E42TnysNCUPdjciGhY=
|
||||||
golang.org/x/sys v0.0.0-20190412213103-97732733099d/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
|
golang.org/x/sys v0.0.0-20190412213103-97732733099d/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
|
||||||
golang.org/x/sys v0.0.0-20201119102817-f84b799fce68/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
|
golang.org/x/sys v0.0.0-20201119102817-f84b799fce68/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
|
||||||
@@ -117,21 +117,21 @@ golang.org/x/sys v0.0.0-20210423082822-04245dca01da/go.mod h1:h1NjWce9XRLGQEsW7w
|
|||||||
golang.org/x/sys v0.0.0-20211019181941-9d821ace8654/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg=
|
golang.org/x/sys v0.0.0-20211019181941-9d821ace8654/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg=
|
||||||
golang.org/x/sys v0.2.0/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg=
|
golang.org/x/sys v0.2.0/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg=
|
||||||
golang.org/x/sys v0.10.0/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg=
|
golang.org/x/sys v0.10.0/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg=
|
||||||
golang.org/x/sys v0.35.0 h1:vz1N37gP5bs89s7He8XuIYXpyY0+QlsKmzipCbUtyxI=
|
golang.org/x/sys v0.36.0 h1:KVRy2GtZBrk1cBYA7MKu5bEZFxQk4NIDV6RLVcC8o0k=
|
||||||
golang.org/x/sys v0.35.0/go.mod h1:BJP2sWEmIv4KK5OTEluFJCKSidICx8ciO85XgH3Ak8k=
|
golang.org/x/sys v0.36.0/go.mod h1:OgkHotnGiDImocRcuBABYBEXf8A9a87e/uXjp9XT3ks=
|
||||||
golang.org/x/term v0.0.0-20201126162022-7de9c90e9dd1/go.mod h1:bj7SfCRtBDWHUb9snDiAeCFNEtKQo2Wmx5Cou7ajbmo=
|
golang.org/x/term v0.0.0-20201126162022-7de9c90e9dd1/go.mod h1:bj7SfCRtBDWHUb9snDiAeCFNEtKQo2Wmx5Cou7ajbmo=
|
||||||
golang.org/x/text v0.3.0/go.mod h1:NqM8EUOU14njkJ3fqMW+pc6Ldnwhi/IjpwHt7yyuwOQ=
|
golang.org/x/text v0.3.0/go.mod h1:NqM8EUOU14njkJ3fqMW+pc6Ldnwhi/IjpwHt7yyuwOQ=
|
||||||
golang.org/x/text v0.3.6/go.mod h1:5Zoc/QRtKVWzQhOtBMvqHzDpF6irO9z98xDceosuGiQ=
|
golang.org/x/text v0.3.6/go.mod h1:5Zoc/QRtKVWzQhOtBMvqHzDpF6irO9z98xDceosuGiQ=
|
||||||
golang.org/x/text v0.3.7/go.mod h1:u+2+/6zg+i71rQMx5EYifcz6MCKuco9NR6JIITiCfzQ=
|
golang.org/x/text v0.3.7/go.mod h1:u+2+/6zg+i71rQMx5EYifcz6MCKuco9NR6JIITiCfzQ=
|
||||||
golang.org/x/text v0.28.0 h1:rhazDwis8INMIwQ4tpjLDzUhx6RlXqZNPEM0huQojng=
|
golang.org/x/text v0.29.0 h1:1neNs90w9YzJ9BocxfsQNHKuAT4pkghyXc4nhZ6sJvk=
|
||||||
golang.org/x/text v0.28.0/go.mod h1:U8nCwOR8jO/marOQ0QbDiOngZVEBB7MAiitBuMjXiNU=
|
golang.org/x/text v0.29.0/go.mod h1:7MhJOA9CD2qZyOKYazxdYMF85OwPdEr9jTtBpO7ydH4=
|
||||||
golang.org/x/time v0.7.0 h1:ntUhktv3OPE6TgYxXWv9vKvUSJyIFJlyohwbkEwPrKQ=
|
golang.org/x/time v0.7.0 h1:ntUhktv3OPE6TgYxXWv9vKvUSJyIFJlyohwbkEwPrKQ=
|
||||||
golang.org/x/time v0.7.0/go.mod h1:3BpzKBy/shNhVucY/MWOyx10tF3SFh9QdLuxbVysPQM=
|
golang.org/x/time v0.7.0/go.mod h1:3BpzKBy/shNhVucY/MWOyx10tF3SFh9QdLuxbVysPQM=
|
||||||
golang.org/x/tools v0.0.0-20180917221912-90fa682c2a6e/go.mod h1:n7NCudcB/nEzxVGmLbDWY5pfWTLqBcC2KZ6jyYvM4mQ=
|
golang.org/x/tools v0.0.0-20180917221912-90fa682c2a6e/go.mod h1:n7NCudcB/nEzxVGmLbDWY5pfWTLqBcC2KZ6jyYvM4mQ=
|
||||||
golang.org/x/tools v0.0.0-20191119224855-298f0cb1881e/go.mod h1:b+2E5dAYhXwXZwtnZ6UAqBI28+e2cm9otk0dWdXHAEo=
|
golang.org/x/tools v0.0.0-20191119224855-298f0cb1881e/go.mod h1:b+2E5dAYhXwXZwtnZ6UAqBI28+e2cm9otk0dWdXHAEo=
|
||||||
golang.org/x/tools v0.1.8/go.mod h1:nABZi5QlRsZVlzPpHl034qft6wpY4eDcsTt5AaioBiU=
|
golang.org/x/tools v0.1.8/go.mod h1:nABZi5QlRsZVlzPpHl034qft6wpY4eDcsTt5AaioBiU=
|
||||||
golang.org/x/tools v0.35.0 h1:mBffYraMEf7aa0sB+NuKnuCy8qI/9Bughn8dC2Gu5r0=
|
golang.org/x/tools v0.36.0 h1:kWS0uv/zsvHEle1LbV5LE8QujrxB3wfQyxHfhOk0Qkg=
|
||||||
golang.org/x/tools v0.35.0/go.mod h1:NKdj5HkL/73byiZSJjqJgKn3ep7KjFkBOkR/Hps3VPw=
|
golang.org/x/tools v0.36.0/go.mod h1:WBDiHKJK8YgLHlcQPYQzNCkUxUypCaa5ZegCVutKm+s=
|
||||||
golang.org/x/xerrors v0.0.0-20190717185122-a985d3407aa7/go.mod h1:I/5z698sn9Ka8TeJc9MKroUUfqBBauWjQqLJ2OPfmY0=
|
golang.org/x/xerrors v0.0.0-20190717185122-a985d3407aa7/go.mod h1:I/5z698sn9Ka8TeJc9MKroUUfqBBauWjQqLJ2OPfmY0=
|
||||||
golang.org/x/xerrors v0.0.0-20191011141410-1b5146add898/go.mod h1:I/5z698sn9Ka8TeJc9MKroUUfqBBauWjQqLJ2OPfmY0=
|
golang.org/x/xerrors v0.0.0-20191011141410-1b5146add898/go.mod h1:I/5z698sn9Ka8TeJc9MKroUUfqBBauWjQqLJ2OPfmY0=
|
||||||
golang.org/x/xerrors v0.0.0-20200804184101-5ec99f83aff1/go.mod h1:I/5z698sn9Ka8TeJc9MKroUUfqBBauWjQqLJ2OPfmY0=
|
golang.org/x/xerrors v0.0.0-20200804184101-5ec99f83aff1/go.mod h1:I/5z698sn9Ka8TeJc9MKroUUfqBBauWjQqLJ2OPfmY0=
|
||||||
@@ -143,10 +143,10 @@ gonum.org/v1/gonum v0.16.0 h1:5+ul4Swaf3ESvrOnidPp4GZbzf0mxVQpDCYUQE7OJfk=
|
|||||||
gonum.org/v1/gonum v0.16.0/go.mod h1:fef3am4MQ93R2HHpKnLk4/Tbh/s0+wqD5nfa6Pnwy4E=
|
gonum.org/v1/gonum v0.16.0/go.mod h1:fef3am4MQ93R2HHpKnLk4/Tbh/s0+wqD5nfa6Pnwy4E=
|
||||||
google.golang.org/genproto/googleapis/rpc v0.0.0-20250707201910-8d1bb00bc6a7 h1:pFyd6EwwL2TqFf8emdthzeX+gZE1ElRq3iM8pui4KBY=
|
google.golang.org/genproto/googleapis/rpc v0.0.0-20250707201910-8d1bb00bc6a7 h1:pFyd6EwwL2TqFf8emdthzeX+gZE1ElRq3iM8pui4KBY=
|
||||||
google.golang.org/genproto/googleapis/rpc v0.0.0-20250707201910-8d1bb00bc6a7/go.mod h1:qQ0YXyHHx3XkvlzUtpXDkS29lDSafHMZBAZDc03LQ3A=
|
google.golang.org/genproto/googleapis/rpc v0.0.0-20250707201910-8d1bb00bc6a7/go.mod h1:qQ0YXyHHx3XkvlzUtpXDkS29lDSafHMZBAZDc03LQ3A=
|
||||||
google.golang.org/grpc v1.75.0 h1:+TW+dqTd2Biwe6KKfhE5JpiYIBWq865PhKGSXiivqt4=
|
google.golang.org/grpc v1.75.1 h1:/ODCNEuf9VghjgO3rqLcfg8fiOP0nSluljWFlDxELLI=
|
||||||
google.golang.org/grpc v1.75.0/go.mod h1:JtPAzKiq4v1xcAB2hydNlWI2RnF85XXcV0mhKXr2ecQ=
|
google.golang.org/grpc v1.75.1/go.mod h1:JtPAzKiq4v1xcAB2hydNlWI2RnF85XXcV0mhKXr2ecQ=
|
||||||
google.golang.org/protobuf v1.36.8 h1:xHScyCOEuuwZEc6UtSOvPbAT4zRh0xcNRYekJwfqyMc=
|
google.golang.org/protobuf v1.36.9 h1:w2gp2mA27hUeUzj9Ex9FBjsBm40zfaDtEWow293U7Iw=
|
||||||
google.golang.org/protobuf v1.36.8/go.mod h1:fuxRtAxBytpl4zzqUh6/eyUujkJdNiuEkXntxiD/uRU=
|
google.golang.org/protobuf v1.36.9/go.mod h1:fuxRtAxBytpl4zzqUh6/eyUujkJdNiuEkXntxiD/uRU=
|
||||||
gopkg.in/check.v1 v0.0.0-20161208181325-20d25e280405/go.mod h1:Co6ibVJAznAaIkqp8huTwlJQCZ016jof/cbN4VW5Yz0=
|
gopkg.in/check.v1 v0.0.0-20161208181325-20d25e280405/go.mod h1:Co6ibVJAznAaIkqp8huTwlJQCZ016jof/cbN4VW5Yz0=
|
||||||
gopkg.in/check.v1 v1.0.0-20201130134442-10cb98267c6c h1:Hei/4ADfdWqJk1ZMxUNpqntNwaWcugrBjAiHlqqRiVk=
|
gopkg.in/check.v1 v1.0.0-20201130134442-10cb98267c6c h1:Hei/4ADfdWqJk1ZMxUNpqntNwaWcugrBjAiHlqqRiVk=
|
||||||
gopkg.in/check.v1 v1.0.0-20201130134442-10cb98267c6c/go.mod h1:JHkPIbrfpd72SG/EVd6muEfDQjcINNoR0C8j2r3qZ4Q=
|
gopkg.in/check.v1 v1.0.0-20201130134442-10cb98267c6c/go.mod h1:JHkPIbrfpd72SG/EVd6muEfDQjcINNoR0C8j2r3qZ4Q=
|
||||||
|
|||||||
@@ -51,12 +51,27 @@ type HTTPRemoteConfig struct {
|
|||||||
}
|
}
|
||||||
|
|
||||||
type HTTPClientConfig struct {
|
type HTTPClientConfig struct {
|
||||||
Servers []*HTTPRemoteConfig `json:"servers"`
|
Address *Address `json:"address"`
|
||||||
Headers map[string]string `json:"headers"`
|
Port uint16 `json:"port"`
|
||||||
|
Level uint32 `json:"level"`
|
||||||
|
Email string `json:"email"`
|
||||||
|
Username string `json:"user"`
|
||||||
|
Password string `json:"pass"`
|
||||||
|
Servers []*HTTPRemoteConfig `json:"servers"`
|
||||||
|
Headers map[string]string `json:"headers"`
|
||||||
}
|
}
|
||||||
|
|
||||||
func (v *HTTPClientConfig) Build() (proto.Message, error) {
|
func (v *HTTPClientConfig) Build() (proto.Message, error) {
|
||||||
config := new(http.ClientConfig)
|
config := new(http.ClientConfig)
|
||||||
|
if v.Address != nil {
|
||||||
|
v.Servers = []*HTTPRemoteConfig{
|
||||||
|
{
|
||||||
|
Address: v.Address,
|
||||||
|
Port: v.Port,
|
||||||
|
Users: []json.RawMessage{{}},
|
||||||
|
},
|
||||||
|
}
|
||||||
|
}
|
||||||
config.Server = make([]*protocol.ServerEndpoint, len(v.Servers))
|
config.Server = make([]*protocol.ServerEndpoint, len(v.Servers))
|
||||||
for idx, serverConfig := range v.Servers {
|
for idx, serverConfig := range v.Servers {
|
||||||
server := &protocol.ServerEndpoint{
|
server := &protocol.ServerEndpoint{
|
||||||
@@ -65,12 +80,22 @@ func (v *HTTPClientConfig) Build() (proto.Message, error) {
|
|||||||
}
|
}
|
||||||
for _, rawUser := range serverConfig.Users {
|
for _, rawUser := range serverConfig.Users {
|
||||||
user := new(protocol.User)
|
user := new(protocol.User)
|
||||||
if err := json.Unmarshal(rawUser, user); err != nil {
|
if v.Address != nil {
|
||||||
return nil, errors.New("failed to parse HTTP user").Base(err).AtError()
|
user.Level = v.Level
|
||||||
|
user.Email = v.Email
|
||||||
|
} else {
|
||||||
|
if err := json.Unmarshal(rawUser, user); err != nil {
|
||||||
|
return nil, errors.New("failed to parse HTTP user").Base(err).AtError()
|
||||||
|
}
|
||||||
}
|
}
|
||||||
account := new(HTTPAccount)
|
account := new(HTTPAccount)
|
||||||
if err := json.Unmarshal(rawUser, account); err != nil {
|
if v.Address != nil {
|
||||||
return nil, errors.New("failed to parse HTTP account").Base(err).AtError()
|
account.Username = v.Username
|
||||||
|
account.Password = v.Password
|
||||||
|
} else {
|
||||||
|
if err := json.Unmarshal(rawUser, account); err != nil {
|
||||||
|
return nil, errors.New("failed to parse HTTP account").Base(err).AtError()
|
||||||
|
}
|
||||||
}
|
}
|
||||||
user.Account = serial.ToTypedMessage(account.Build())
|
user.Account = serial.ToTypedMessage(account.Build())
|
||||||
server.User = append(server.User, user)
|
server.User = append(server.User, user)
|
||||||
|
|||||||
@@ -162,20 +162,44 @@ func buildShadowsocks2022(v *ShadowsocksServerConfig) (proto.Message, error) {
|
|||||||
type ShadowsocksServerTarget struct {
|
type ShadowsocksServerTarget struct {
|
||||||
Address *Address `json:"address"`
|
Address *Address `json:"address"`
|
||||||
Port uint16 `json:"port"`
|
Port uint16 `json:"port"`
|
||||||
|
Level byte `json:"level"`
|
||||||
|
Email string `json:"email"`
|
||||||
Cipher string `json:"method"`
|
Cipher string `json:"method"`
|
||||||
Password string `json:"password"`
|
Password string `json:"password"`
|
||||||
Email string `json:"email"`
|
|
||||||
Level byte `json:"level"`
|
|
||||||
IVCheck bool `json:"ivCheck"`
|
IVCheck bool `json:"ivCheck"`
|
||||||
UoT bool `json:"uot"`
|
UoT bool `json:"uot"`
|
||||||
UoTVersion int `json:"uotVersion"`
|
UoTVersion int `json:"uotVersion"`
|
||||||
}
|
}
|
||||||
|
|
||||||
type ShadowsocksClientConfig struct {
|
type ShadowsocksClientConfig struct {
|
||||||
|
Address *Address `json:"address"`
|
||||||
|
Port uint16 `json:"port"`
|
||||||
|
Level byte `json:"level"`
|
||||||
|
Email string `json:"email"`
|
||||||
|
Cipher string `json:"method"`
|
||||||
|
Password string `json:"password"`
|
||||||
|
IVCheck bool `json:"ivCheck"`
|
||||||
|
UoT bool `json:"uot"`
|
||||||
|
UoTVersion int `json:"uotVersion"`
|
||||||
Servers []*ShadowsocksServerTarget `json:"servers"`
|
Servers []*ShadowsocksServerTarget `json:"servers"`
|
||||||
}
|
}
|
||||||
|
|
||||||
func (v *ShadowsocksClientConfig) Build() (proto.Message, error) {
|
func (v *ShadowsocksClientConfig) Build() (proto.Message, error) {
|
||||||
|
if v.Address != nil {
|
||||||
|
v.Servers = []*ShadowsocksServerTarget{
|
||||||
|
{
|
||||||
|
Address: v.Address,
|
||||||
|
Port: v.Port,
|
||||||
|
Level: v.Level,
|
||||||
|
Email: v.Email,
|
||||||
|
Cipher: v.Cipher,
|
||||||
|
Password: v.Password,
|
||||||
|
IVCheck: v.IVCheck,
|
||||||
|
UoT: v.UoT,
|
||||||
|
UoTVersion: v.UoTVersion,
|
||||||
|
},
|
||||||
|
}
|
||||||
|
}
|
||||||
if len(v.Servers) == 0 {
|
if len(v.Servers) == 0 {
|
||||||
return nil, errors.New("0 Shadowsocks server configured.")
|
return nil, errors.New("0 Shadowsocks server configured.")
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -70,11 +70,26 @@ type SocksRemoteConfig struct {
|
|||||||
}
|
}
|
||||||
|
|
||||||
type SocksClientConfig struct {
|
type SocksClientConfig struct {
|
||||||
Servers []*SocksRemoteConfig `json:"servers"`
|
Address *Address `json:"address"`
|
||||||
|
Port uint16 `json:"port"`
|
||||||
|
Level uint32 `json:"level"`
|
||||||
|
Email string `json:"email"`
|
||||||
|
Username string `json:"user"`
|
||||||
|
Password string `json:"pass"`
|
||||||
|
Servers []*SocksRemoteConfig `json:"servers"`
|
||||||
}
|
}
|
||||||
|
|
||||||
func (v *SocksClientConfig) Build() (proto.Message, error) {
|
func (v *SocksClientConfig) Build() (proto.Message, error) {
|
||||||
config := new(socks.ClientConfig)
|
config := new(socks.ClientConfig)
|
||||||
|
if v.Address != nil {
|
||||||
|
v.Servers = []*SocksRemoteConfig{
|
||||||
|
{
|
||||||
|
Address: v.Address,
|
||||||
|
Port: v.Port,
|
||||||
|
Users: []json.RawMessage{{}},
|
||||||
|
},
|
||||||
|
}
|
||||||
|
}
|
||||||
config.Server = make([]*protocol.ServerEndpoint, len(v.Servers))
|
config.Server = make([]*protocol.ServerEndpoint, len(v.Servers))
|
||||||
for idx, serverConfig := range v.Servers {
|
for idx, serverConfig := range v.Servers {
|
||||||
server := &protocol.ServerEndpoint{
|
server := &protocol.ServerEndpoint{
|
||||||
@@ -83,12 +98,22 @@ func (v *SocksClientConfig) Build() (proto.Message, error) {
|
|||||||
}
|
}
|
||||||
for _, rawUser := range serverConfig.Users {
|
for _, rawUser := range serverConfig.Users {
|
||||||
user := new(protocol.User)
|
user := new(protocol.User)
|
||||||
if err := json.Unmarshal(rawUser, user); err != nil {
|
if v.Address != nil {
|
||||||
return nil, errors.New("failed to parse Socks user").Base(err).AtError()
|
user.Level = v.Level
|
||||||
|
user.Email = v.Email
|
||||||
|
} else {
|
||||||
|
if err := json.Unmarshal(rawUser, user); err != nil {
|
||||||
|
return nil, errors.New("failed to parse Socks user").Base(err).AtError()
|
||||||
|
}
|
||||||
}
|
}
|
||||||
account := new(SocksAccount)
|
account := new(SocksAccount)
|
||||||
if err := json.Unmarshal(rawUser, account); err != nil {
|
if v.Address != nil {
|
||||||
return nil, errors.New("failed to parse socks account").Base(err).AtError()
|
account.Username = v.Username
|
||||||
|
account.Password = v.Password
|
||||||
|
} else {
|
||||||
|
if err := json.Unmarshal(rawUser, account); err != nil {
|
||||||
|
return nil, errors.New("failed to parse socks account").Base(err).AtError()
|
||||||
|
}
|
||||||
}
|
}
|
||||||
user.Account = serial.ToTypedMessage(account.Build())
|
user.Account = serial.ToTypedMessage(account.Build())
|
||||||
server.User = append(server.User, user)
|
server.User = append(server.User, user)
|
||||||
|
|||||||
@@ -86,5 +86,36 @@ func TestSocksOutboundConfig(t *testing.T) {
|
|||||||
},
|
},
|
||||||
},
|
},
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
Input: `{
|
||||||
|
"address": "127.0.0.1",
|
||||||
|
"port": 1234,
|
||||||
|
"user": "test user",
|
||||||
|
"pass": "test pass",
|
||||||
|
"email": "test@email.com"
|
||||||
|
}`,
|
||||||
|
Parser: loadJSON(creator),
|
||||||
|
Output: &socks.ClientConfig{
|
||||||
|
Server: []*protocol.ServerEndpoint{
|
||||||
|
{
|
||||||
|
Address: &net.IPOrDomain{
|
||||||
|
Address: &net.IPOrDomain_Ip{
|
||||||
|
Ip: []byte{127, 0, 0, 1},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
Port: 1234,
|
||||||
|
User: []*protocol.User{
|
||||||
|
{
|
||||||
|
Email: "test@email.com",
|
||||||
|
Account: serial.ToTypedMessage(&socks.Account{
|
||||||
|
Username: "test user",
|
||||||
|
Password: "test pass",
|
||||||
|
}),
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
})
|
})
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -20,19 +20,37 @@ import (
|
|||||||
type TrojanServerTarget struct {
|
type TrojanServerTarget struct {
|
||||||
Address *Address `json:"address"`
|
Address *Address `json:"address"`
|
||||||
Port uint16 `json:"port"`
|
Port uint16 `json:"port"`
|
||||||
Password string `json:"password"`
|
|
||||||
Email string `json:"email"`
|
|
||||||
Level byte `json:"level"`
|
Level byte `json:"level"`
|
||||||
|
Email string `json:"email"`
|
||||||
|
Password string `json:"password"`
|
||||||
Flow string `json:"flow"`
|
Flow string `json:"flow"`
|
||||||
}
|
}
|
||||||
|
|
||||||
// TrojanClientConfig is configuration of trojan servers
|
// TrojanClientConfig is configuration of trojan servers
|
||||||
type TrojanClientConfig struct {
|
type TrojanClientConfig struct {
|
||||||
|
Address *Address `json:"address"`
|
||||||
|
Port uint16 `json:"port"`
|
||||||
|
Level byte `json:"level"`
|
||||||
|
Email string `json:"email"`
|
||||||
|
Password string `json:"password"`
|
||||||
|
Flow string `json:"flow"`
|
||||||
Servers []*TrojanServerTarget `json:"servers"`
|
Servers []*TrojanServerTarget `json:"servers"`
|
||||||
}
|
}
|
||||||
|
|
||||||
// Build implements Buildable
|
// Build implements Buildable
|
||||||
func (c *TrojanClientConfig) Build() (proto.Message, error) {
|
func (c *TrojanClientConfig) Build() (proto.Message, error) {
|
||||||
|
if c.Address != nil {
|
||||||
|
c.Servers = []*TrojanServerTarget{
|
||||||
|
{
|
||||||
|
Address: c.Address,
|
||||||
|
Port: c.Port,
|
||||||
|
Level: c.Level,
|
||||||
|
Email: c.Email,
|
||||||
|
Password: c.Password,
|
||||||
|
Flow: c.Flow,
|
||||||
|
},
|
||||||
|
}
|
||||||
|
}
|
||||||
if len(c.Servers) == 0 {
|
if len(c.Servers) == 0 {
|
||||||
return nil, errors.New("0 Trojan server configured.")
|
return nil, errors.New("0 Trojan server configured.")
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -1,6 +1,7 @@
|
|||||||
package conf
|
package conf
|
||||||
|
|
||||||
import (
|
import (
|
||||||
|
"encoding/base64"
|
||||||
"encoding/json"
|
"encoding/json"
|
||||||
"path/filepath"
|
"path/filepath"
|
||||||
"runtime"
|
"runtime"
|
||||||
@@ -73,17 +74,71 @@ func (c *VLessInboundConfig) Build() (proto.Message, error) {
|
|||||||
}
|
}
|
||||||
|
|
||||||
if account.Encryption != "" {
|
if account.Encryption != "" {
|
||||||
return nil, errors.New(`VLESS clients: "encryption" should not in inbound settings`)
|
return nil, errors.New(`VLESS clients: "encryption" should not be in inbound settings`)
|
||||||
|
}
|
||||||
|
|
||||||
|
if account.Reverse != nil && account.Reverse.Tag == "" {
|
||||||
|
return nil, errors.New(`VLESS clients: "tag" can't be empty for "reverse"`)
|
||||||
}
|
}
|
||||||
|
|
||||||
user.Account = serial.ToTypedMessage(account)
|
user.Account = serial.ToTypedMessage(account)
|
||||||
config.Clients[idx] = user
|
config.Clients[idx] = user
|
||||||
}
|
}
|
||||||
|
|
||||||
if c.Decryption != "none" {
|
|
||||||
return nil, errors.New(`VLESS settings: please add/set "decryption":"none" to every settings`)
|
|
||||||
}
|
|
||||||
config.Decryption = c.Decryption
|
config.Decryption = c.Decryption
|
||||||
|
if !func() bool {
|
||||||
|
s := strings.Split(config.Decryption, ".")
|
||||||
|
if len(s) < 4 || s[0] != "mlkem768x25519plus" {
|
||||||
|
return false
|
||||||
|
}
|
||||||
|
switch s[1] {
|
||||||
|
case "native":
|
||||||
|
case "xorpub":
|
||||||
|
config.XorMode = 1
|
||||||
|
case "random":
|
||||||
|
config.XorMode = 2
|
||||||
|
default:
|
||||||
|
return false
|
||||||
|
}
|
||||||
|
t := strings.SplitN(strings.TrimSuffix(s[2], "s"), "-", 2)
|
||||||
|
i, err := strconv.Atoi(t[0])
|
||||||
|
if err != nil {
|
||||||
|
return false
|
||||||
|
}
|
||||||
|
config.SecondsFrom = int64(i)
|
||||||
|
if len(t) == 2 {
|
||||||
|
i, err := strconv.Atoi(t[1])
|
||||||
|
if err != nil {
|
||||||
|
return false
|
||||||
|
}
|
||||||
|
config.SecondsTo = int64(i)
|
||||||
|
}
|
||||||
|
padding := 0
|
||||||
|
for _, r := range s[3:] {
|
||||||
|
if len(r) < 20 {
|
||||||
|
padding += len(r) + 1
|
||||||
|
continue
|
||||||
|
}
|
||||||
|
if b, _ := base64.RawURLEncoding.DecodeString(r); len(b) != 32 && len(b) != 64 {
|
||||||
|
return false
|
||||||
|
}
|
||||||
|
}
|
||||||
|
config.Decryption = config.Decryption[27+len(s[2]):]
|
||||||
|
if padding > 0 {
|
||||||
|
config.Padding = config.Decryption[:padding-1]
|
||||||
|
config.Decryption = config.Decryption[padding:]
|
||||||
|
}
|
||||||
|
return true
|
||||||
|
}() && config.Decryption != "none" {
|
||||||
|
if config.Decryption == "" {
|
||||||
|
return nil, errors.New(`VLESS settings: please add/set "decryption":"none" to every settings`)
|
||||||
|
}
|
||||||
|
return nil, errors.New(`VLESS settings: unsupported "decryption": ` + config.Decryption)
|
||||||
|
}
|
||||||
|
|
||||||
|
if config.Decryption != "none" && c.Fallbacks != nil {
|
||||||
|
return nil, errors.New(`VLESS settings: "fallbacks" can not be used together with "decryption"`)
|
||||||
|
}
|
||||||
|
|
||||||
for _, fb := range c.Fallbacks {
|
for _, fb := range c.Fallbacks {
|
||||||
var i uint16
|
var i uint16
|
||||||
@@ -148,23 +203,40 @@ type VLessOutboundVnext struct {
|
|||||||
}
|
}
|
||||||
|
|
||||||
type VLessOutboundConfig struct {
|
type VLessOutboundConfig struct {
|
||||||
Vnext []*VLessOutboundVnext `json:"vnext"`
|
Address *Address `json:"address"`
|
||||||
|
Port uint16 `json:"port"`
|
||||||
|
Level uint32 `json:"level"`
|
||||||
|
Email string `json:"email"`
|
||||||
|
Id string `json:"id"`
|
||||||
|
Flow string `json:"flow"`
|
||||||
|
Seed string `json:"seed"`
|
||||||
|
Encryption string `json:"encryption"`
|
||||||
|
Reverse *vless.Reverse `json:"reverse"`
|
||||||
|
Vnext []*VLessOutboundVnext `json:"vnext"`
|
||||||
}
|
}
|
||||||
|
|
||||||
// Build implements Buildable
|
// Build implements Buildable
|
||||||
func (c *VLessOutboundConfig) Build() (proto.Message, error) {
|
func (c *VLessOutboundConfig) Build() (proto.Message, error) {
|
||||||
config := new(outbound.Config)
|
config := new(outbound.Config)
|
||||||
|
if c.Address != nil {
|
||||||
if len(c.Vnext) == 0 {
|
c.Vnext = []*VLessOutboundVnext{
|
||||||
return nil, errors.New(`VLESS settings: "vnext" is empty`)
|
{
|
||||||
|
Address: c.Address,
|
||||||
|
Port: c.Port,
|
||||||
|
Users: []json.RawMessage{{}},
|
||||||
|
},
|
||||||
|
}
|
||||||
|
}
|
||||||
|
if len(c.Vnext) != 1 {
|
||||||
|
return nil, errors.New(`VLESS settings: "vnext" should have one and only one member`)
|
||||||
}
|
}
|
||||||
config.Vnext = make([]*protocol.ServerEndpoint, len(c.Vnext))
|
config.Vnext = make([]*protocol.ServerEndpoint, len(c.Vnext))
|
||||||
for idx, rec := range c.Vnext {
|
for idx, rec := range c.Vnext {
|
||||||
if rec.Address == nil {
|
if rec.Address == nil {
|
||||||
return nil, errors.New(`VLESS vnext: "address" is not set`)
|
return nil, errors.New(`VLESS vnext: "address" is not set`)
|
||||||
}
|
}
|
||||||
if len(rec.Users) == 0 {
|
if len(rec.Users) != 1 {
|
||||||
return nil, errors.New(`VLESS vnext: "users" is empty`)
|
return nil, errors.New(`VLESS vnext: "users" should have one and only one member`)
|
||||||
}
|
}
|
||||||
spec := &protocol.ServerEndpoint{
|
spec := &protocol.ServerEndpoint{
|
||||||
Address: rec.Address.Build(),
|
Address: rec.Address.Build(),
|
||||||
@@ -173,12 +245,25 @@ func (c *VLessOutboundConfig) Build() (proto.Message, error) {
|
|||||||
}
|
}
|
||||||
for idx, rawUser := range rec.Users {
|
for idx, rawUser := range rec.Users {
|
||||||
user := new(protocol.User)
|
user := new(protocol.User)
|
||||||
if err := json.Unmarshal(rawUser, user); err != nil {
|
if c.Address != nil {
|
||||||
return nil, errors.New(`VLESS users: invalid user`).Base(err)
|
user.Level = c.Level
|
||||||
|
user.Email = c.Email
|
||||||
|
} else {
|
||||||
|
if err := json.Unmarshal(rawUser, user); err != nil {
|
||||||
|
return nil, errors.New(`VLESS users: invalid user`).Base(err)
|
||||||
|
}
|
||||||
}
|
}
|
||||||
account := new(vless.Account)
|
account := new(vless.Account)
|
||||||
if err := json.Unmarshal(rawUser, account); err != nil {
|
if c.Address != nil {
|
||||||
return nil, errors.New(`VLESS users: invalid user`).Base(err)
|
account.Id = c.Id
|
||||||
|
account.Flow = c.Flow
|
||||||
|
//account.Seed = c.Seed
|
||||||
|
account.Encryption = c.Encryption
|
||||||
|
account.Reverse = c.Reverse
|
||||||
|
} else {
|
||||||
|
if err := json.Unmarshal(rawUser, account); err != nil {
|
||||||
|
return nil, errors.New(`VLESS users: invalid user`).Base(err)
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
u, err := uuid.ParseString(account.Id)
|
u, err := uuid.ParseString(account.Id)
|
||||||
@@ -193,8 +278,52 @@ func (c *VLessOutboundConfig) Build() (proto.Message, error) {
|
|||||||
return nil, errors.New(`VLESS users: "flow" doesn't support "` + account.Flow + `" in this version`)
|
return nil, errors.New(`VLESS users: "flow" doesn't support "` + account.Flow + `" in this version`)
|
||||||
}
|
}
|
||||||
|
|
||||||
if account.Encryption != "none" {
|
if !func() bool {
|
||||||
return nil, errors.New(`VLESS users: please add/set "encryption":"none" for every user`)
|
s := strings.Split(account.Encryption, ".")
|
||||||
|
if len(s) < 4 || s[0] != "mlkem768x25519plus" {
|
||||||
|
return false
|
||||||
|
}
|
||||||
|
switch s[1] {
|
||||||
|
case "native":
|
||||||
|
case "xorpub":
|
||||||
|
account.XorMode = 1
|
||||||
|
case "random":
|
||||||
|
account.XorMode = 2
|
||||||
|
default:
|
||||||
|
return false
|
||||||
|
}
|
||||||
|
switch s[2] {
|
||||||
|
case "1rtt":
|
||||||
|
case "0rtt":
|
||||||
|
account.Seconds = 1
|
||||||
|
default:
|
||||||
|
return false
|
||||||
|
}
|
||||||
|
padding := 0
|
||||||
|
for _, r := range s[3:] {
|
||||||
|
if len(r) < 20 {
|
||||||
|
padding += len(r) + 1
|
||||||
|
continue
|
||||||
|
}
|
||||||
|
if b, _ := base64.RawURLEncoding.DecodeString(r); len(b) != 32 && len(b) != 1184 {
|
||||||
|
return false
|
||||||
|
}
|
||||||
|
}
|
||||||
|
account.Encryption = account.Encryption[27+len(s[2]):]
|
||||||
|
if padding > 0 {
|
||||||
|
account.Padding = account.Encryption[:padding-1]
|
||||||
|
account.Encryption = account.Encryption[padding:]
|
||||||
|
}
|
||||||
|
return true
|
||||||
|
}() && account.Encryption != "none" {
|
||||||
|
if account.Encryption == "" {
|
||||||
|
return nil, errors.New(`VLESS users: please add/set "encryption":"none" for every user`)
|
||||||
|
}
|
||||||
|
return nil, errors.New(`VLESS users: unsupported "encryption": ` + account.Encryption)
|
||||||
|
}
|
||||||
|
|
||||||
|
if account.Reverse != nil && account.Reverse.Tag == "" {
|
||||||
|
return nil, errors.New(`VLESS clients: "tag" can't be empty for "reverse"`)
|
||||||
}
|
}
|
||||||
|
|
||||||
user.Account = serial.ToTypedMessage(account)
|
user.Account = serial.ToTypedMessage(account)
|
||||||
|
|||||||
@@ -57,6 +57,39 @@ func TestVLessOutbound(t *testing.T) {
|
|||||||
},
|
},
|
||||||
},
|
},
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
Input: `{
|
||||||
|
"address": "example.com",
|
||||||
|
"port": 443,
|
||||||
|
"id": "27848739-7e62-4138-9fd3-098a63964b6b",
|
||||||
|
"flow": "xtls-rprx-vision-udp443",
|
||||||
|
"encryption": "none",
|
||||||
|
"level": 0
|
||||||
|
}`,
|
||||||
|
Parser: loadJSON(creator),
|
||||||
|
Output: &outbound.Config{
|
||||||
|
Vnext: []*protocol.ServerEndpoint{
|
||||||
|
{
|
||||||
|
Address: &net.IPOrDomain{
|
||||||
|
Address: &net.IPOrDomain_Domain{
|
||||||
|
Domain: "example.com",
|
||||||
|
},
|
||||||
|
},
|
||||||
|
Port: 443,
|
||||||
|
User: []*protocol.User{
|
||||||
|
{
|
||||||
|
Account: serial.ToTypedMessage(&vless.Account{
|
||||||
|
Id: "27848739-7e62-4138-9fd3-098a63964b6b",
|
||||||
|
Flow: "xtls-rprx-vision-udp443",
|
||||||
|
Encryption: "none",
|
||||||
|
}),
|
||||||
|
Level: 0,
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
})
|
})
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|||||||
@@ -117,13 +117,28 @@ type VMessOutboundTarget struct {
|
|||||||
}
|
}
|
||||||
|
|
||||||
type VMessOutboundConfig struct {
|
type VMessOutboundConfig struct {
|
||||||
Receivers []*VMessOutboundTarget `json:"vnext"`
|
Address *Address `json:"address"`
|
||||||
|
Port uint16 `json:"port"`
|
||||||
|
Level uint32 `json:"level"`
|
||||||
|
Email string `json:"email"`
|
||||||
|
ID string `json:"id"`
|
||||||
|
Security string `json:"security"`
|
||||||
|
Experiments string `json:"experiments"`
|
||||||
|
Receivers []*VMessOutboundTarget `json:"vnext"`
|
||||||
}
|
}
|
||||||
|
|
||||||
// Build implements Buildable
|
// Build implements Buildable
|
||||||
func (c *VMessOutboundConfig) Build() (proto.Message, error) {
|
func (c *VMessOutboundConfig) Build() (proto.Message, error) {
|
||||||
config := new(outbound.Config)
|
config := new(outbound.Config)
|
||||||
|
if c.Address != nil {
|
||||||
|
c.Receivers = []*VMessOutboundTarget{
|
||||||
|
{
|
||||||
|
Address: c.Address,
|
||||||
|
Port: c.Port,
|
||||||
|
Users: []json.RawMessage{{}},
|
||||||
|
},
|
||||||
|
}
|
||||||
|
}
|
||||||
if len(c.Receivers) == 0 {
|
if len(c.Receivers) == 0 {
|
||||||
return nil, errors.New("0 VMess receiver configured")
|
return nil, errors.New("0 VMess receiver configured")
|
||||||
}
|
}
|
||||||
@@ -141,12 +156,23 @@ func (c *VMessOutboundConfig) Build() (proto.Message, error) {
|
|||||||
}
|
}
|
||||||
for _, rawUser := range rec.Users {
|
for _, rawUser := range rec.Users {
|
||||||
user := new(protocol.User)
|
user := new(protocol.User)
|
||||||
if err := json.Unmarshal(rawUser, user); err != nil {
|
if c.Address != nil {
|
||||||
return nil, errors.New("invalid VMess user").Base(err)
|
user.Level = c.Level
|
||||||
|
user.Email = c.Email
|
||||||
|
} else {
|
||||||
|
if err := json.Unmarshal(rawUser, user); err != nil {
|
||||||
|
return nil, errors.New("invalid VMess user").Base(err)
|
||||||
|
}
|
||||||
}
|
}
|
||||||
account := new(VMessAccount)
|
account := new(VMessAccount)
|
||||||
if err := json.Unmarshal(rawUser, account); err != nil {
|
if c.Address != nil {
|
||||||
return nil, errors.New("invalid VMess user").Base(err)
|
account.ID = c.ID
|
||||||
|
account.Security = c.Security
|
||||||
|
account.Experiments = c.Experiments
|
||||||
|
} else {
|
||||||
|
if err := json.Unmarshal(rawUser, account); err != nil {
|
||||||
|
return nil, errors.New("invalid VMess user").Base(err)
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
u, err := uuid.ParseString(account.ID)
|
u, err := uuid.ParseString(account.ID)
|
||||||
|
|||||||
@@ -58,6 +58,40 @@ func TestVMessOutbound(t *testing.T) {
|
|||||||
},
|
},
|
||||||
},
|
},
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
Input: `{
|
||||||
|
"address": "127.0.0.1",
|
||||||
|
"port": 80,
|
||||||
|
"id": "e641f5ad-9397-41e3-bf1a-e8740dfed019",
|
||||||
|
"email": "love@example.com",
|
||||||
|
"level": 255
|
||||||
|
}`,
|
||||||
|
Parser: loadJSON(creator),
|
||||||
|
Output: &outbound.Config{
|
||||||
|
Receiver: []*protocol.ServerEndpoint{
|
||||||
|
{
|
||||||
|
Address: &net.IPOrDomain{
|
||||||
|
Address: &net.IPOrDomain_Ip{
|
||||||
|
Ip: []byte{127, 0, 0, 1},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
Port: 80,
|
||||||
|
User: []*protocol.User{
|
||||||
|
{
|
||||||
|
Email: "love@example.com",
|
||||||
|
Level: 255,
|
||||||
|
Account: serial.ToTypedMessage(&vmess.Account{
|
||||||
|
Id: "e641f5ad-9397-41e3-bf1a-e8740dfed019",
|
||||||
|
SecuritySettings: &protocol.SecurityConfig{
|
||||||
|
Type: protocol.SecurityType_AUTO,
|
||||||
|
},
|
||||||
|
}),
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
})
|
})
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|||||||
@@ -17,5 +17,7 @@ func init() {
|
|||||||
cmdX25519,
|
cmdX25519,
|
||||||
cmdWG,
|
cmdWG,
|
||||||
cmdMLDSA65,
|
cmdMLDSA65,
|
||||||
|
cmdMLKEM768,
|
||||||
|
cmdVLESSEnc,
|
||||||
)
|
)
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -3,6 +3,7 @@ package convert
|
|||||||
import (
|
import (
|
||||||
"fmt"
|
"fmt"
|
||||||
"os"
|
"os"
|
||||||
|
"strings"
|
||||||
|
|
||||||
"github.com/xtls/xray-core/common/cmdarg"
|
"github.com/xtls/xray-core/common/cmdarg"
|
||||||
creflect "github.com/xtls/xray-core/common/reflect"
|
creflect "github.com/xtls/xray-core/common/reflect"
|
||||||
@@ -14,15 +15,18 @@ import (
|
|||||||
|
|
||||||
var cmdProtobuf = &base.Command{
|
var cmdProtobuf = &base.Command{
|
||||||
CustomFlags: true,
|
CustomFlags: true,
|
||||||
UsageLine: "{{.Exec}} convert pb [-debug] [-type] [json file] [json file] ...",
|
UsageLine: "{{.Exec}} convert pb [-outpbfile file] [-debug] [-type] [json file] [json file] ...",
|
||||||
Short: "Convert multiple json configs to protobuf",
|
Short: "Convert multiple json configs to protobuf",
|
||||||
Long: `
|
Long: `
|
||||||
Convert multiple json configs to protobuf.
|
Convert multiple configs to ProtoBuf. JSON, YAML and TOML can be used.
|
||||||
|
|
||||||
Arguments:
|
Arguments:
|
||||||
|
|
||||||
|
-o file, -outpbfile file
|
||||||
|
Write the ProtoBuf output (eg. mix.pb) to specified file location.
|
||||||
|
|
||||||
-d, -debug
|
-d, -debug
|
||||||
Show mix.pb as json.
|
Show mix.pb as JSON format.
|
||||||
FOR DEBUGGING ONLY!
|
FOR DEBUGGING ONLY!
|
||||||
DO NOT PASS THIS OUTPUT TO XRAY-CORE!
|
DO NOT PASS THIS OUTPUT TO XRAY-CORE!
|
||||||
|
|
||||||
@@ -31,16 +35,20 @@ Arguments:
|
|||||||
|
|
||||||
Examples:
|
Examples:
|
||||||
|
|
||||||
{{.Exec}} convert pb config.json c1.json c2.json c3.json > mix.pb
|
{{.Exec}} convert pb -outpbfile output.pb config.json c1.json c2.json c3.json
|
||||||
|
{{.Exec}} convert pb -debug mix.pb
|
||||||
`,
|
`,
|
||||||
Run: executeConvertConfigsToProtobuf,
|
Run: executeConvertConfigsToProtobuf,
|
||||||
}
|
}
|
||||||
|
|
||||||
func executeConvertConfigsToProtobuf(cmd *base.Command, args []string) {
|
func executeConvertConfigsToProtobuf(cmd *base.Command, args []string) {
|
||||||
|
|
||||||
|
var optFile string
|
||||||
var optDump bool
|
var optDump bool
|
||||||
var optType bool
|
var optType bool
|
||||||
|
|
||||||
|
cmd.Flag.StringVar(&optFile, "o", "", "")
|
||||||
|
cmd.Flag.StringVar(&optFile, "outpbfile", "", "")
|
||||||
cmd.Flag.BoolVar(&optDump, "d", false, "")
|
cmd.Flag.BoolVar(&optDump, "d", false, "")
|
||||||
cmd.Flag.BoolVar(&optDump, "debug", false, "")
|
cmd.Flag.BoolVar(&optDump, "debug", false, "")
|
||||||
cmd.Flag.BoolVar(&optType, "t", false, "")
|
cmd.Flag.BoolVar(&optType, "t", false, "")
|
||||||
@@ -52,6 +60,17 @@ func executeConvertConfigsToProtobuf(cmd *base.Command, args []string) {
|
|||||||
unnamedArgs.Set(v)
|
unnamedArgs.Set(v)
|
||||||
}
|
}
|
||||||
|
|
||||||
|
if len(optFile) > 0 {
|
||||||
|
switch core.GetFormatByExtension(getFileExtension(optFile)){
|
||||||
|
case "protobuf", "":
|
||||||
|
fmt.Println("Output ProtoBuf file is ", optFile)
|
||||||
|
default:
|
||||||
|
base.Fatalf("-outpbfile followed by a possible original config.")
|
||||||
|
}
|
||||||
|
} else if !optDump {
|
||||||
|
base.Fatalf("-outpbfile not specified")
|
||||||
|
}
|
||||||
|
|
||||||
if len(unnamedArgs) < 1 {
|
if len(unnamedArgs) < 1 {
|
||||||
base.Fatalf("invalid config list length: %d", len(unnamedArgs))
|
base.Fatalf("invalid config list length: %d", len(unnamedArgs))
|
||||||
}
|
}
|
||||||
@@ -70,12 +89,28 @@ func executeConvertConfigsToProtobuf(cmd *base.Command, args []string) {
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
bytesConfig, err := proto.Marshal(pbConfig)
|
if len(optFile) > 0 {
|
||||||
if err != nil {
|
bytesConfig, err := proto.Marshal(pbConfig)
|
||||||
base.Fatalf("failed to marshal proto config: %s", err)
|
if err != nil {
|
||||||
}
|
base.Fatalf("failed to marshal proto config: %s", err)
|
||||||
|
}
|
||||||
|
|
||||||
if _, err := os.Stdout.Write(bytesConfig); err != nil {
|
f, err := os.Create(optFile)
|
||||||
base.Fatalf("failed to write proto config: %s", err)
|
if err != nil {
|
||||||
|
base.Fatalf("failed to create proto file: %s", err)
|
||||||
|
}
|
||||||
|
defer f.Close()
|
||||||
|
|
||||||
|
if _, err := f.Write(bytesConfig); err != nil {
|
||||||
|
base.Fatalf("failed to write proto file: %s", err)
|
||||||
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
func getFileExtension(filename string) string {
|
||||||
|
idx := strings.LastIndexByte(filename, '.')
|
||||||
|
if idx == -1 {
|
||||||
|
return ""
|
||||||
|
}
|
||||||
|
return filename[idx+1:]
|
||||||
|
}
|
||||||
|
|||||||
@@ -1,17 +1,15 @@
|
|||||||
package all
|
package all
|
||||||
|
|
||||||
import (
|
import (
|
||||||
|
"crypto/ecdh"
|
||||||
"crypto/rand"
|
"crypto/rand"
|
||||||
"encoding/base64"
|
"encoding/base64"
|
||||||
"fmt"
|
"fmt"
|
||||||
|
|
||||||
"golang.org/x/crypto/curve25519"
|
"lukechampine.com/blake3"
|
||||||
)
|
)
|
||||||
|
|
||||||
func Curve25519Genkey(StdEncoding bool, input_base64 string) {
|
func Curve25519Genkey(StdEncoding bool, input_base64 string) {
|
||||||
var output string
|
|
||||||
var err error
|
|
||||||
var privateKey, publicKey []byte
|
|
||||||
var encoding *base64.Encoding
|
var encoding *base64.Encoding
|
||||||
if *input_stdEncoding || StdEncoding {
|
if *input_stdEncoding || StdEncoding {
|
||||||
encoding = base64.StdEncoding
|
encoding = base64.StdEncoding
|
||||||
@@ -19,40 +17,47 @@ func Curve25519Genkey(StdEncoding bool, input_base64 string) {
|
|||||||
encoding = base64.RawURLEncoding
|
encoding = base64.RawURLEncoding
|
||||||
}
|
}
|
||||||
|
|
||||||
|
var privateKey []byte
|
||||||
if len(input_base64) > 0 {
|
if len(input_base64) > 0 {
|
||||||
privateKey, err = encoding.DecodeString(input_base64)
|
privateKey, _ = encoding.DecodeString(input_base64)
|
||||||
if err != nil {
|
if len(privateKey) != 32 {
|
||||||
output = err.Error()
|
fmt.Println("Invalid length of X25519 private key.")
|
||||||
goto out
|
return
|
||||||
}
|
|
||||||
if len(privateKey) != curve25519.ScalarSize {
|
|
||||||
output = "Invalid length of private key."
|
|
||||||
goto out
|
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
privateKey, password, hash32, err := genCurve25519(privateKey)
|
||||||
|
if err != nil {
|
||||||
|
fmt.Println(err)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
fmt.Printf("PrivateKey: %v\nPassword: %v\nHash32: %v\n",
|
||||||
|
encoding.EncodeToString(privateKey),
|
||||||
|
encoding.EncodeToString(password),
|
||||||
|
encoding.EncodeToString(hash32[:]))
|
||||||
|
}
|
||||||
|
|
||||||
|
func genCurve25519(inputPrivateKey []byte) (privateKey []byte, password []byte, hash32 [32]byte, returnErr error) {
|
||||||
|
if len(inputPrivateKey) > 0 {
|
||||||
|
privateKey = inputPrivateKey
|
||||||
|
}
|
||||||
if privateKey == nil {
|
if privateKey == nil {
|
||||||
privateKey = make([]byte, curve25519.ScalarSize)
|
privateKey = make([]byte, 32)
|
||||||
if _, err = rand.Read(privateKey); err != nil {
|
rand.Read(privateKey)
|
||||||
output = err.Error()
|
|
||||||
goto out
|
|
||||||
}
|
|
||||||
}
|
}
|
||||||
|
|
||||||
// Modify random bytes using algorithm described at:
|
// Modify random bytes using algorithm described at:
|
||||||
// https://cr.yp.to/ecdh.html.
|
// https://cr.yp.to/ecdh.html
|
||||||
|
// (Just to make sure printing the real private key)
|
||||||
privateKey[0] &= 248
|
privateKey[0] &= 248
|
||||||
privateKey[31] &= 127
|
privateKey[31] &= 127
|
||||||
privateKey[31] |= 64
|
privateKey[31] |= 64
|
||||||
|
|
||||||
if publicKey, err = curve25519.X25519(privateKey, curve25519.Basepoint); err != nil {
|
key, err := ecdh.X25519().NewPrivateKey(privateKey)
|
||||||
output = err.Error()
|
if err != nil {
|
||||||
goto out
|
returnErr = err
|
||||||
|
return
|
||||||
}
|
}
|
||||||
|
password = key.PublicKey().Bytes()
|
||||||
output = fmt.Sprintf("Private key: %v\nPublic key: %v",
|
hash32 = blake3.Sum256(password)
|
||||||
encoding.EncodeToString(privateKey),
|
return
|
||||||
encoding.EncodeToString(publicKey))
|
|
||||||
out:
|
|
||||||
fmt.Println(output)
|
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -11,9 +11,9 @@ import (
|
|||||||
|
|
||||||
var cmdMLDSA65 = &base.Command{
|
var cmdMLDSA65 = &base.Command{
|
||||||
UsageLine: `{{.Exec}} mldsa65 [-i "seed (base64.RawURLEncoding)"]`,
|
UsageLine: `{{.Exec}} mldsa65 [-i "seed (base64.RawURLEncoding)"]`,
|
||||||
Short: `Generate key pair for ML-DSA-65 post-quantum signature`,
|
Short: `Generate key pair for ML-DSA-65 post-quantum signature (REALITY)`,
|
||||||
Long: `
|
Long: `
|
||||||
Generate key pair for ML-DSA-65 post-quantum signature.
|
Generate key pair for ML-DSA-65 post-quantum signature (REALITY).
|
||||||
|
|
||||||
Random: {{.Exec}} mldsa65
|
Random: {{.Exec}} mldsa65
|
||||||
|
|
||||||
@@ -25,18 +25,22 @@ func init() {
|
|||||||
cmdMLDSA65.Run = executeMLDSA65 // break init loop
|
cmdMLDSA65.Run = executeMLDSA65 // break init loop
|
||||||
}
|
}
|
||||||
|
|
||||||
var input_seed = cmdMLDSA65.Flag.String("i", "", "")
|
var input_mldsa65 = cmdMLDSA65.Flag.String("i", "", "")
|
||||||
|
|
||||||
func executeMLDSA65(cmd *base.Command, args []string) {
|
func executeMLDSA65(cmd *base.Command, args []string) {
|
||||||
var seed [32]byte
|
var seed [32]byte
|
||||||
if len(*input_seed) > 0 {
|
if len(*input_mldsa65) > 0 {
|
||||||
s, _ := base64.RawURLEncoding.DecodeString(*input_seed)
|
s, _ := base64.RawURLEncoding.DecodeString(*input_mldsa65)
|
||||||
|
if len(s) != 32 {
|
||||||
|
fmt.Println("Invalid length of ML-DSA-65 seed.")
|
||||||
|
return
|
||||||
|
}
|
||||||
seed = [32]byte(s)
|
seed = [32]byte(s)
|
||||||
} else {
|
} else {
|
||||||
rand.Read(seed[:])
|
rand.Read(seed[:])
|
||||||
}
|
}
|
||||||
pub, _ := mldsa65.NewKeyFromSeed(&seed)
|
pub, _ := mldsa65.NewKeyFromSeed(&seed)
|
||||||
fmt.Printf("Seed: %v\nVerify: %v",
|
fmt.Printf("Seed: %v\nVerify: %v\n",
|
||||||
base64.RawURLEncoding.EncodeToString(seed[:]),
|
base64.RawURLEncoding.EncodeToString(seed[:]),
|
||||||
base64.RawURLEncoding.EncodeToString(pub.Bytes()))
|
base64.RawURLEncoding.EncodeToString(pub.Bytes()))
|
||||||
}
|
}
|
||||||
|
|||||||
60
main/commands/all/mlkem768.go
Normal file
60
main/commands/all/mlkem768.go
Normal file
@@ -0,0 +1,60 @@
|
|||||||
|
package all
|
||||||
|
|
||||||
|
import (
|
||||||
|
"crypto/mlkem"
|
||||||
|
"crypto/rand"
|
||||||
|
"encoding/base64"
|
||||||
|
"fmt"
|
||||||
|
|
||||||
|
"github.com/xtls/xray-core/main/commands/base"
|
||||||
|
"lukechampine.com/blake3"
|
||||||
|
)
|
||||||
|
|
||||||
|
var cmdMLKEM768 = &base.Command{
|
||||||
|
UsageLine: `{{.Exec}} mlkem768 [-i "seed (base64.RawURLEncoding)"]`,
|
||||||
|
Short: `Generate key pair for ML-KEM-768 post-quantum key exchange (VLESS Encryption)`,
|
||||||
|
Long: `
|
||||||
|
Generate key pair for ML-KEM-768 post-quantum key exchange (VLESS Encryption).
|
||||||
|
|
||||||
|
Random: {{.Exec}} mlkem768
|
||||||
|
|
||||||
|
From seed: {{.Exec}} mlkem768 -i "seed (base64.RawURLEncoding)"
|
||||||
|
`,
|
||||||
|
}
|
||||||
|
|
||||||
|
func init() {
|
||||||
|
cmdMLKEM768.Run = executeMLKEM768 // break init loop
|
||||||
|
}
|
||||||
|
|
||||||
|
var input_mlkem768 = cmdMLKEM768.Flag.String("i", "", "")
|
||||||
|
|
||||||
|
func executeMLKEM768(cmd *base.Command, args []string) {
|
||||||
|
var seed [64]byte
|
||||||
|
if len(*input_mlkem768) > 0 {
|
||||||
|
s, _ := base64.RawURLEncoding.DecodeString(*input_mlkem768)
|
||||||
|
if len(s) != 64 {
|
||||||
|
fmt.Println("Invalid length of ML-KEM-768 seed.")
|
||||||
|
return
|
||||||
|
}
|
||||||
|
seed = [64]byte(s)
|
||||||
|
} else {
|
||||||
|
rand.Read(seed[:])
|
||||||
|
}
|
||||||
|
seed, client, hash32 := genMLKEM768(&seed)
|
||||||
|
fmt.Printf("Seed: %v\nClient: %v\nHash32: %v\n",
|
||||||
|
base64.RawURLEncoding.EncodeToString(seed[:]),
|
||||||
|
base64.RawURLEncoding.EncodeToString(client),
|
||||||
|
base64.RawURLEncoding.EncodeToString(hash32[:]))
|
||||||
|
}
|
||||||
|
|
||||||
|
func genMLKEM768(inputSeed *[64]byte) (seed [64]byte, client []byte, hash32 [32]byte) {
|
||||||
|
if inputSeed == nil {
|
||||||
|
rand.Read(seed[:])
|
||||||
|
} else {
|
||||||
|
seed = *inputSeed
|
||||||
|
}
|
||||||
|
key, _ := mlkem.NewDecapsulationKey768(seed[:])
|
||||||
|
client = key.EncapsulationKey().Bytes()
|
||||||
|
hash32 = blake3.Sum256(client)
|
||||||
|
return
|
||||||
|
}
|
||||||
@@ -92,7 +92,7 @@ func executePing(cmd *base.Command, args []string) {
|
|||||||
fmt.Println("-------------------")
|
fmt.Println("-------------------")
|
||||||
fmt.Println("Pinging with SNI")
|
fmt.Println("Pinging with SNI")
|
||||||
{
|
{
|
||||||
tcpConn, err := net.DialTCP("tcp", nil, &net.TCPAddr{IP: ip, Port: 443})
|
tcpConn, err := net.DialTCP("tcp", nil, &net.TCPAddr{IP: ip, Port: TargetPort})
|
||||||
if err != nil {
|
if err != nil {
|
||||||
base.Fatalf("Failed to dial tcp: %s", err)
|
base.Fatalf("Failed to dial tcp: %s", err)
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -9,9 +9,9 @@ import (
|
|||||||
|
|
||||||
var cmdUUID = &base.Command{
|
var cmdUUID = &base.Command{
|
||||||
UsageLine: `{{.Exec}} uuid [-i "example"]`,
|
UsageLine: `{{.Exec}} uuid [-i "example"]`,
|
||||||
Short: `Generate UUIDv4 or UUIDv5`,
|
Short: `Generate UUIDv4 or UUIDv5 (VLESS)`,
|
||||||
Long: `
|
Long: `
|
||||||
Generate UUIDv4 or UUIDv5.
|
Generate UUIDv4 or UUIDv5 (VLESS).
|
||||||
|
|
||||||
UUIDv4 (random): {{.Exec}} uuid
|
UUIDv4 (random): {{.Exec}} uuid
|
||||||
|
|
||||||
|
|||||||
41
main/commands/all/vlessenc.go
Normal file
41
main/commands/all/vlessenc.go
Normal file
@@ -0,0 +1,41 @@
|
|||||||
|
package all
|
||||||
|
|
||||||
|
import (
|
||||||
|
"encoding/base64"
|
||||||
|
"fmt"
|
||||||
|
"strings"
|
||||||
|
|
||||||
|
"github.com/xtls/xray-core/main/commands/base"
|
||||||
|
)
|
||||||
|
|
||||||
|
var cmdVLESSEnc = &base.Command{
|
||||||
|
UsageLine: `{{.Exec}} vlessenc`,
|
||||||
|
Short: `Generate decryption/encryption json pair (VLESS Encryption)`,
|
||||||
|
Long: `
|
||||||
|
Generate decryption/encryption json pair (VLESS Encryption).
|
||||||
|
`,
|
||||||
|
}
|
||||||
|
|
||||||
|
func init() {
|
||||||
|
cmdVLESSEnc.Run = executeVLESSEnc // break init loop
|
||||||
|
}
|
||||||
|
|
||||||
|
func executeVLESSEnc(cmd *base.Command, args []string) {
|
||||||
|
privateKey, password, _, _ := genCurve25519(nil)
|
||||||
|
serverKey := base64.RawURLEncoding.EncodeToString(privateKey)
|
||||||
|
clientKey := base64.RawURLEncoding.EncodeToString(password)
|
||||||
|
decryption := generateDotConfig("mlkem768x25519plus", "native", "600s", serverKey)
|
||||||
|
encryption := generateDotConfig("mlkem768x25519plus", "native", "0rtt", clientKey)
|
||||||
|
seed, client, _ := genMLKEM768(nil)
|
||||||
|
serverKeyPQ := base64.RawURLEncoding.EncodeToString(seed[:])
|
||||||
|
clientKeyPQ := base64.RawURLEncoding.EncodeToString(client)
|
||||||
|
decryptionPQ := generateDotConfig("mlkem768x25519plus", "native", "600s", serverKeyPQ)
|
||||||
|
encryptionPQ := generateDotConfig("mlkem768x25519plus", "native", "0rtt", clientKeyPQ)
|
||||||
|
fmt.Printf("Choose one Authentication to use, do not mix them. Ephemeral key exchange is Post-Quantum safe anyway.\n\n")
|
||||||
|
fmt.Printf("Authentication: X25519, not Post-Quantum\n\"decryption\": \"%v\"\n\"encryption\": \"%v\"\n\n", decryption, encryption)
|
||||||
|
fmt.Printf("Authentication: ML-KEM-768, Post-Quantum\n\"decryption\": \"%v\"\n\"encryption\": \"%v\"\n", decryptionPQ, encryptionPQ)
|
||||||
|
}
|
||||||
|
|
||||||
|
func generateDotConfig(fields ...string) string {
|
||||||
|
return strings.Join(fields, ".")
|
||||||
|
}
|
||||||
@@ -6,9 +6,9 @@ import (
|
|||||||
|
|
||||||
var cmdWG = &base.Command{
|
var cmdWG = &base.Command{
|
||||||
UsageLine: `{{.Exec}} wg [-i "private key (base64.StdEncoding)"]`,
|
UsageLine: `{{.Exec}} wg [-i "private key (base64.StdEncoding)"]`,
|
||||||
Short: `Generate key pair for wireguard key exchange`,
|
Short: `Generate key pair for X25519 key exchange (WireGuard)`,
|
||||||
Long: `
|
Long: `
|
||||||
Generate key pair for wireguard key exchange.
|
Generate key pair for X25519 key exchange (WireGuard).
|
||||||
|
|
||||||
Random: {{.Exec}} wg
|
Random: {{.Exec}} wg
|
||||||
|
|
||||||
|
|||||||
@@ -6,9 +6,9 @@ import (
|
|||||||
|
|
||||||
var cmdX25519 = &base.Command{
|
var cmdX25519 = &base.Command{
|
||||||
UsageLine: `{{.Exec}} x25519 [-i "private key (base64.RawURLEncoding)"] [--std-encoding]`,
|
UsageLine: `{{.Exec}} x25519 [-i "private key (base64.RawURLEncoding)"] [--std-encoding]`,
|
||||||
Short: `Generate key pair for x25519 key exchange`,
|
Short: `Generate key pair for X25519 key exchange (REALITY, VLESS Encryption)`,
|
||||||
Long: `
|
Long: `
|
||||||
Generate key pair for x25519 key exchange.
|
Generate key pair for X25519 key exchange (REALITY, VLESS Encryption).
|
||||||
|
|
||||||
Random: {{.Exec}} x25519
|
Random: {{.Exec}} x25519
|
||||||
|
|
||||||
|
|||||||
13
main/run.go
13
main/run.go
@@ -182,12 +182,15 @@ func getConfigFilePath(verbose bool) cmdarg.Arg {
|
|||||||
}
|
}
|
||||||
|
|
||||||
if workingDir, err := os.Getwd(); err == nil {
|
if workingDir, err := os.Getwd(); err == nil {
|
||||||
configFile := filepath.Join(workingDir, "config.json")
|
suffixes := []string{".json", ".jsonc", ".toml", ".yaml", ".yml"}
|
||||||
if fileExists(configFile) {
|
for _, suffix := range suffixes {
|
||||||
if verbose {
|
configFile := filepath.Join(workingDir, "config"+suffix)
|
||||||
log.Println("Using default config: ", configFile)
|
if fileExists(configFile) {
|
||||||
|
if verbose {
|
||||||
|
log.Println("Using default config: ", configFile)
|
||||||
|
}
|
||||||
|
return cmdarg.Arg{configFile}
|
||||||
}
|
}
|
||||||
return cmdarg.Arg{configFile}
|
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|||||||
@@ -4,6 +4,7 @@ import (
|
|||||||
"context"
|
"context"
|
||||||
go_errors "errors"
|
go_errors "errors"
|
||||||
"io"
|
"io"
|
||||||
|
"strings"
|
||||||
"sync"
|
"sync"
|
||||||
"time"
|
"time"
|
||||||
|
|
||||||
@@ -168,11 +169,15 @@ func (h *Handler) Process(ctx context.Context, link *transport.Link, d internet.
|
|||||||
}
|
}
|
||||||
|
|
||||||
ctx, cancel := context.WithCancel(ctx)
|
ctx, cancel := context.WithCancel(ctx)
|
||||||
timer := signal.CancelAfterInactivity(ctx, cancel, h.timeout)
|
terminate := func() {
|
||||||
|
cancel()
|
||||||
|
conn.Close()
|
||||||
|
}
|
||||||
|
timer := signal.CancelAfterInactivity(ctx, terminate, h.timeout)
|
||||||
|
defer timer.SetTimeout(0)
|
||||||
|
|
||||||
request := func() error {
|
request := func() error {
|
||||||
defer conn.Close()
|
defer timer.SetTimeout(0)
|
||||||
|
|
||||||
for {
|
for {
|
||||||
b, err := reader.ReadMessage()
|
b, err := reader.ReadMessage()
|
||||||
if err == io.EOF {
|
if err == io.EOF {
|
||||||
@@ -190,24 +195,33 @@ func (h *Handler) Process(ctx context.Context, link *transport.Link, d internet.
|
|||||||
if len(h.blockTypes) > 0 {
|
if len(h.blockTypes) > 0 {
|
||||||
for _, blocktype := range h.blockTypes {
|
for _, blocktype := range h.blockTypes {
|
||||||
if blocktype == int32(qType) {
|
if blocktype == int32(qType) {
|
||||||
if h.nonIPQuery == "reject" {
|
b.Release()
|
||||||
go h.rejectNonIPQuery(id, qType, domain, writer)
|
|
||||||
}
|
|
||||||
errors.LogInfo(ctx, "blocked type ", qType, " query for domain ", domain)
|
errors.LogInfo(ctx, "blocked type ", qType, " query for domain ", domain)
|
||||||
|
if h.nonIPQuery == "reject" {
|
||||||
|
err := h.rejectNonIPQuery(id, qType, domain, writer)
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
}
|
||||||
return nil
|
return nil
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
if isIPQuery {
|
if isIPQuery {
|
||||||
go h.handleIPQuery(id, qType, domain, writer)
|
b.Release()
|
||||||
|
go h.handleIPQuery(id, qType, domain, writer, timer)
|
||||||
|
continue
|
||||||
}
|
}
|
||||||
if isIPQuery || h.nonIPQuery == "drop" {
|
if h.nonIPQuery == "drop" {
|
||||||
b.Release()
|
b.Release()
|
||||||
continue
|
continue
|
||||||
}
|
}
|
||||||
if h.nonIPQuery == "reject" {
|
if h.nonIPQuery == "reject" {
|
||||||
go h.rejectNonIPQuery(id, qType, domain, writer)
|
|
||||||
b.Release()
|
b.Release()
|
||||||
|
err := h.rejectNonIPQuery(id, qType, domain, writer)
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
continue
|
continue
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
@@ -219,6 +233,7 @@ func (h *Handler) Process(ctx context.Context, link *transport.Link, d internet.
|
|||||||
}
|
}
|
||||||
|
|
||||||
response := func() error {
|
response := func() error {
|
||||||
|
defer timer.SetTimeout(0)
|
||||||
for {
|
for {
|
||||||
b, err := connReader.ReadMessage()
|
b, err := connReader.ReadMessage()
|
||||||
if err == io.EOF {
|
if err == io.EOF {
|
||||||
@@ -244,7 +259,7 @@ func (h *Handler) Process(ctx context.Context, link *transport.Link, d internet.
|
|||||||
return nil
|
return nil
|
||||||
}
|
}
|
||||||
|
|
||||||
func (h *Handler) handleIPQuery(id uint16, qType dnsmessage.Type, domain string, writer dns_proto.MessageWriter) {
|
func (h *Handler) handleIPQuery(id uint16, qType dnsmessage.Type, domain string, writer dns_proto.MessageWriter, timer *signal.ActivityTimer) {
|
||||||
var ips []net.IP
|
var ips []net.IP
|
||||||
var err error
|
var err error
|
||||||
|
|
||||||
@@ -319,16 +334,21 @@ func (h *Handler) handleIPQuery(id uint16, qType dnsmessage.Type, domain string,
|
|||||||
if err != nil {
|
if err != nil {
|
||||||
errors.LogInfoInner(context.Background(), err, "pack message")
|
errors.LogInfoInner(context.Background(), err, "pack message")
|
||||||
b.Release()
|
b.Release()
|
||||||
return
|
timer.SetTimeout(0)
|
||||||
}
|
}
|
||||||
b.Resize(0, int32(len(msgBytes)))
|
b.Resize(0, int32(len(msgBytes)))
|
||||||
|
|
||||||
if err := writer.WriteMessage(b); err != nil {
|
if err := writer.WriteMessage(b); err != nil {
|
||||||
errors.LogInfoInner(context.Background(), err, "write IP answer")
|
errors.LogInfoInner(context.Background(), err, "write IP answer")
|
||||||
|
timer.SetTimeout(0)
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
func (h *Handler) rejectNonIPQuery(id uint16, qType dnsmessage.Type, domain string, writer dns_proto.MessageWriter) {
|
func (h *Handler) rejectNonIPQuery(id uint16, qType dnsmessage.Type, domain string, writer dns_proto.MessageWriter) error {
|
||||||
|
domainT := strings.TrimSuffix(domain, ".")
|
||||||
|
if domainT == "" {
|
||||||
|
return errors.New("empty domain name")
|
||||||
|
}
|
||||||
b := buf.New()
|
b := buf.New()
|
||||||
rawBytes := b.Extend(buf.Size)
|
rawBytes := b.Extend(buf.Size)
|
||||||
builder := dnsmessage.NewBuilder(rawBytes[:0], dnsmessage.Header{
|
builder := dnsmessage.NewBuilder(rawBytes[:0], dnsmessage.Header{
|
||||||
@@ -349,20 +369,22 @@ func (h *Handler) rejectNonIPQuery(id uint16, qType dnsmessage.Type, domain stri
|
|||||||
if err != nil {
|
if err != nil {
|
||||||
errors.LogInfo(context.Background(), "unexpected domain ", domain, " when building reject message: ", err)
|
errors.LogInfo(context.Background(), "unexpected domain ", domain, " when building reject message: ", err)
|
||||||
b.Release()
|
b.Release()
|
||||||
return
|
return err
|
||||||
}
|
}
|
||||||
|
|
||||||
msgBytes, err := builder.Finish()
|
msgBytes, err := builder.Finish()
|
||||||
if err != nil {
|
if err != nil {
|
||||||
errors.LogInfoInner(context.Background(), err, "pack reject message")
|
errors.LogInfoInner(context.Background(), err, "pack reject message")
|
||||||
b.Release()
|
b.Release()
|
||||||
return
|
return err
|
||||||
}
|
}
|
||||||
b.Resize(0, int32(len(msgBytes)))
|
b.Resize(0, int32(len(msgBytes)))
|
||||||
|
|
||||||
if err := writer.WriteMessage(b); err != nil {
|
if err := writer.WriteMessage(b); err != nil {
|
||||||
errors.LogInfoInner(context.Background(), err, "write reject answer")
|
errors.LogInfoInner(context.Background(), err, "write reject answer")
|
||||||
|
return err
|
||||||
}
|
}
|
||||||
|
return nil
|
||||||
}
|
}
|
||||||
|
|
||||||
type outboundConn struct {
|
type outboundConn struct {
|
||||||
@@ -371,6 +393,7 @@ type outboundConn struct {
|
|||||||
|
|
||||||
conn net.Conn
|
conn net.Conn
|
||||||
connReady chan struct{}
|
connReady chan struct{}
|
||||||
|
closed bool
|
||||||
}
|
}
|
||||||
|
|
||||||
func (c *outboundConn) dial() error {
|
func (c *outboundConn) dial() error {
|
||||||
@@ -385,12 +408,16 @@ func (c *outboundConn) dial() error {
|
|||||||
|
|
||||||
func (c *outboundConn) Write(b []byte) (int, error) {
|
func (c *outboundConn) Write(b []byte) (int, error) {
|
||||||
c.access.Lock()
|
c.access.Lock()
|
||||||
|
if c.closed {
|
||||||
|
c.access.Unlock()
|
||||||
|
return 0, errors.New("outbound connection closed")
|
||||||
|
}
|
||||||
|
|
||||||
if c.conn == nil {
|
if c.conn == nil {
|
||||||
if err := c.dial(); err != nil {
|
if err := c.dial(); err != nil {
|
||||||
c.access.Unlock()
|
c.access.Unlock()
|
||||||
errors.LogWarningInner(context.Background(), err, "failed to dial outbound connection")
|
errors.LogWarningInner(context.Background(), err, "failed to dial outbound connection")
|
||||||
return len(b), nil
|
return 0, err
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -400,24 +427,27 @@ func (c *outboundConn) Write(b []byte) (int, error) {
|
|||||||
}
|
}
|
||||||
|
|
||||||
func (c *outboundConn) Read(b []byte) (int, error) {
|
func (c *outboundConn) Read(b []byte) (int, error) {
|
||||||
var conn net.Conn
|
|
||||||
c.access.Lock()
|
c.access.Lock()
|
||||||
conn = c.conn
|
if c.closed {
|
||||||
c.access.Unlock()
|
c.access.Unlock()
|
||||||
|
return 0, io.EOF
|
||||||
|
}
|
||||||
|
|
||||||
if conn == nil {
|
if c.conn == nil {
|
||||||
|
c.access.Unlock()
|
||||||
_, open := <-c.connReady
|
_, open := <-c.connReady
|
||||||
if !open {
|
if !open {
|
||||||
return 0, io.EOF
|
return 0, io.EOF
|
||||||
}
|
}
|
||||||
conn = c.conn
|
return c.conn.Read(b)
|
||||||
}
|
}
|
||||||
|
c.access.Unlock()
|
||||||
return conn.Read(b)
|
return c.conn.Read(b)
|
||||||
}
|
}
|
||||||
|
|
||||||
func (c *outboundConn) Close() error {
|
func (c *outboundConn) Close() error {
|
||||||
c.access.Lock()
|
c.access.Lock()
|
||||||
|
c.closed = true
|
||||||
close(c.connReady)
|
close(c.connReady)
|
||||||
if c.conn != nil {
|
if c.conn != nil {
|
||||||
c.conn.Close()
|
c.conn.Close()
|
||||||
|
|||||||
@@ -2,10 +2,8 @@ package dokodemo
|
|||||||
|
|
||||||
import (
|
import (
|
||||||
"context"
|
"context"
|
||||||
"runtime"
|
|
||||||
"strconv"
|
"strconv"
|
||||||
"strings"
|
"strings"
|
||||||
"sync/atomic"
|
|
||||||
|
|
||||||
"github.com/xtls/xray-core/common"
|
"github.com/xtls/xray-core/common"
|
||||||
"github.com/xtls/xray-core/common/buf"
|
"github.com/xtls/xray-core/common/buf"
|
||||||
@@ -14,11 +12,10 @@ import (
|
|||||||
"github.com/xtls/xray-core/common/net"
|
"github.com/xtls/xray-core/common/net"
|
||||||
"github.com/xtls/xray-core/common/protocol"
|
"github.com/xtls/xray-core/common/protocol"
|
||||||
"github.com/xtls/xray-core/common/session"
|
"github.com/xtls/xray-core/common/session"
|
||||||
"github.com/xtls/xray-core/common/signal"
|
|
||||||
"github.com/xtls/xray-core/common/task"
|
|
||||||
"github.com/xtls/xray-core/core"
|
"github.com/xtls/xray-core/core"
|
||||||
"github.com/xtls/xray-core/features/policy"
|
"github.com/xtls/xray-core/features/policy"
|
||||||
"github.com/xtls/xray-core/features/routing"
|
"github.com/xtls/xray-core/features/routing"
|
||||||
|
"github.com/xtls/xray-core/transport"
|
||||||
"github.com/xtls/xray-core/transport/internet/stat"
|
"github.com/xtls/xray-core/transport/internet/stat"
|
||||||
"github.com/xtls/xray-core/transport/internet/tls"
|
"github.com/xtls/xray-core/transport/internet/tls"
|
||||||
)
|
)
|
||||||
@@ -144,39 +141,11 @@ func (d *DokodemoDoor) Process(ctx context.Context, network net.Network, conn st
|
|||||||
})
|
})
|
||||||
errors.LogInfo(ctx, "received request for ", conn.RemoteAddr())
|
errors.LogInfo(ctx, "received request for ", conn.RemoteAddr())
|
||||||
|
|
||||||
plcy := d.policy()
|
var reader buf.Reader
|
||||||
ctx, cancel := context.WithCancel(ctx)
|
if dest.Network == net.Network_TCP {
|
||||||
timer := signal.CancelAfterInactivity(ctx, cancel, plcy.Timeouts.ConnectionIdle)
|
reader = buf.NewReader(conn)
|
||||||
|
} else {
|
||||||
if inbound != nil {
|
reader = buf.NewPacketReader(conn)
|
||||||
inbound.Timer = timer
|
|
||||||
}
|
|
||||||
|
|
||||||
ctx = policy.ContextWithBufferPolicy(ctx, plcy.Buffer)
|
|
||||||
link, err := dispatcher.Dispatch(ctx, dest)
|
|
||||||
if err != nil {
|
|
||||||
return errors.New("failed to dispatch request").Base(err)
|
|
||||||
}
|
|
||||||
|
|
||||||
requestCount := int32(1)
|
|
||||||
requestDone := func() error {
|
|
||||||
defer func() {
|
|
||||||
if atomic.AddInt32(&requestCount, -1) == 0 {
|
|
||||||
timer.SetTimeout(plcy.Timeouts.DownlinkOnly)
|
|
||||||
}
|
|
||||||
}()
|
|
||||||
|
|
||||||
var reader buf.Reader
|
|
||||||
if dest.Network == net.Network_UDP {
|
|
||||||
reader = buf.NewPacketReader(conn)
|
|
||||||
} else {
|
|
||||||
reader = buf.NewReader(conn)
|
|
||||||
}
|
|
||||||
if err := buf.Copy(reader, link.Writer, buf.UpdateActivity(timer)); err != nil {
|
|
||||||
return errors.New("failed to transport request").Base(err)
|
|
||||||
}
|
|
||||||
|
|
||||||
return nil
|
|
||||||
}
|
}
|
||||||
|
|
||||||
var writer buf.Writer
|
var writer buf.Writer
|
||||||
@@ -208,72 +177,17 @@ func (d *DokodemoDoor) Process(ctx context.Context, network net.Network, conn st
|
|||||||
return err
|
return err
|
||||||
}
|
}
|
||||||
writer = NewPacketWriter(pConn, &dest, mark, back)
|
writer = NewPacketWriter(pConn, &dest, mark, back)
|
||||||
defer func() {
|
defer writer.(*PacketWriter).Close() // close fake UDP conns
|
||||||
runtime.Gosched()
|
|
||||||
common.Interrupt(link.Reader) // maybe duplicated
|
|
||||||
runtime.Gosched()
|
|
||||||
writer.(*PacketWriter).Close() // close fake UDP conns
|
|
||||||
}()
|
|
||||||
/*
|
|
||||||
sockopt := &internet.SocketConfig{
|
|
||||||
Tproxy: internet.SocketConfig_TProxy,
|
|
||||||
}
|
|
||||||
if dest.Address.Family().IsIP() {
|
|
||||||
sockopt.BindAddress = dest.Address.IP()
|
|
||||||
sockopt.BindPort = uint32(dest.Port)
|
|
||||||
}
|
|
||||||
if d.sockopt != nil {
|
|
||||||
sockopt.Mark = d.sockopt.Mark
|
|
||||||
}
|
|
||||||
tConn, err := internet.DialSystem(ctx, net.DestinationFromAddr(conn.RemoteAddr()), sockopt)
|
|
||||||
if err != nil {
|
|
||||||
return err
|
|
||||||
}
|
|
||||||
defer tConn.Close()
|
|
||||||
|
|
||||||
writer = &buf.SequentialWriter{Writer: tConn}
|
|
||||||
tReader := buf.NewPacketReader(tConn)
|
|
||||||
requestCount++
|
|
||||||
tproxyRequest = func() error {
|
|
||||||
defer func() {
|
|
||||||
if atomic.AddInt32(&requestCount, -1) == 0 {
|
|
||||||
timer.SetTimeout(plcy.Timeouts.DownlinkOnly)
|
|
||||||
}
|
|
||||||
}()
|
|
||||||
if err := buf.Copy(tReader, link.Writer, buf.UpdateActivity(timer)); err != nil {
|
|
||||||
return errors.New("failed to transport request (TPROXY conn)").Base(err)
|
|
||||||
}
|
|
||||||
return nil
|
|
||||||
}
|
|
||||||
*/
|
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
responseDone := func() error {
|
if err := dispatcher.DispatchLink(ctx, dest, &transport.Link{
|
||||||
defer timer.SetTimeout(plcy.Timeouts.UplinkOnly)
|
Reader: reader,
|
||||||
|
Writer: writer},
|
||||||
if network == net.Network_UDP && destinationOverridden {
|
); err != nil {
|
||||||
buf.Copy(link.Reader, writer) // respect upload's timeout
|
return errors.New("failed to dispatch request").Base(err)
|
||||||
return nil
|
|
||||||
}
|
|
||||||
|
|
||||||
if err := buf.Copy(link.Reader, writer, buf.UpdateActivity(timer)); err != nil {
|
|
||||||
return errors.New("failed to transport response").Base(err)
|
|
||||||
}
|
|
||||||
return nil
|
|
||||||
}
|
}
|
||||||
|
return nil // Unlike Dispatch(), DispatchLink() will not return until the outbound finishes Process()
|
||||||
if err := task.Run(ctx,
|
|
||||||
task.OnSuccess(func() error { return task.Run(ctx, requestDone) }, task.Close(link.Writer)),
|
|
||||||
responseDone); err != nil {
|
|
||||||
runtime.Gosched()
|
|
||||||
common.Interrupt(link.Writer)
|
|
||||||
runtime.Gosched()
|
|
||||||
common.Interrupt(link.Reader)
|
|
||||||
return errors.New("connection ends").Base(err)
|
|
||||||
}
|
|
||||||
|
|
||||||
return nil
|
|
||||||
}
|
}
|
||||||
|
|
||||||
func NewPacketWriter(conn net.PacketConn, d *net.Destination, mark int, back *net.UDPAddr) buf.Writer {
|
func NewPacketWriter(conn net.PacketConn, d *net.Destination, mark int, back *net.UDPAddr) buf.Writer {
|
||||||
|
|||||||
@@ -26,7 +26,6 @@ import (
|
|||||||
"github.com/xtls/xray-core/transport"
|
"github.com/xtls/xray-core/transport"
|
||||||
"github.com/xtls/xray-core/transport/internet"
|
"github.com/xtls/xray-core/transport/internet"
|
||||||
"github.com/xtls/xray-core/transport/internet/stat"
|
"github.com/xtls/xray-core/transport/internet/stat"
|
||||||
"github.com/xtls/xray-core/transport/internet/tls"
|
|
||||||
)
|
)
|
||||||
|
|
||||||
var useSplice bool
|
var useSplice bool
|
||||||
@@ -73,7 +72,7 @@ func isValidAddress(addr *net.IPOrDomain) bool {
|
|||||||
}
|
}
|
||||||
|
|
||||||
a := addr.AsAddress()
|
a := addr.AsAddress()
|
||||||
return a != net.AnyIP
|
return a != net.AnyIP && a != net.AnyIPv6
|
||||||
}
|
}
|
||||||
|
|
||||||
// Process implements proxy.Outbound.
|
// Process implements proxy.Outbound.
|
||||||
@@ -212,16 +211,14 @@ func (h *Handler) Process(ctx context.Context, link *transport.Link, dialer inte
|
|||||||
|
|
||||||
responseDone := func() error {
|
responseDone := func() error {
|
||||||
defer timer.SetTimeout(plcy.Timeouts.UplinkOnly)
|
defer timer.SetTimeout(plcy.Timeouts.UplinkOnly)
|
||||||
if destination.Network == net.Network_TCP {
|
if destination.Network == net.Network_TCP && useSplice && proxy.IsRAWTransportWithoutSecurity(conn) { // it would be tls conn in special use case of MITM, we need to let link handle traffic
|
||||||
var writeConn net.Conn
|
var writeConn net.Conn
|
||||||
var inTimer *signal.ActivityTimer
|
var inTimer *signal.ActivityTimer
|
||||||
if inbound := session.InboundFromContext(ctx); inbound != nil && inbound.Conn != nil && useSplice {
|
if inbound := session.InboundFromContext(ctx); inbound != nil && inbound.Conn != nil {
|
||||||
writeConn = inbound.Conn
|
writeConn = inbound.Conn
|
||||||
inTimer = inbound.Timer
|
inTimer = inbound.Timer
|
||||||
}
|
}
|
||||||
if !isTLSConn(conn) { // it would be tls conn in special use case of MITM, we need to let link handle traffic
|
return proxy.CopyRawConnIfExist(ctx, conn, writeConn, link.Writer, timer, inTimer)
|
||||||
return proxy.CopyRawConnIfExist(ctx, conn, writeConn, link.Writer, timer, inTimer)
|
|
||||||
}
|
|
||||||
}
|
}
|
||||||
var reader buf.Reader
|
var reader buf.Reader
|
||||||
if destination.Network == net.Network_TCP {
|
if destination.Network == net.Network_TCP {
|
||||||
@@ -246,22 +243,6 @@ func (h *Handler) Process(ctx context.Context, link *transport.Link, dialer inte
|
|||||||
return nil
|
return nil
|
||||||
}
|
}
|
||||||
|
|
||||||
func isTLSConn(conn stat.Connection) bool {
|
|
||||||
if conn != nil {
|
|
||||||
statConn, ok := conn.(*stat.CounterConnection)
|
|
||||||
if ok {
|
|
||||||
conn = statConn.Connection
|
|
||||||
}
|
|
||||||
if _, ok := conn.(*tls.Conn); ok {
|
|
||||||
return true
|
|
||||||
}
|
|
||||||
if _, ok := conn.(*tls.UConn); ok {
|
|
||||||
return true
|
|
||||||
}
|
|
||||||
}
|
|
||||||
return false
|
|
||||||
}
|
|
||||||
|
|
||||||
func NewPacketReader(conn net.Conn, UDPOverride net.Destination, DialDest net.Destination) buf.Reader {
|
func NewPacketReader(conn net.Conn, UDPOverride net.Destination, DialDest net.Destination) buf.Reader {
|
||||||
iConn := conn
|
iConn := conn
|
||||||
statConn, ok := iConn.(*stat.CounterConnection)
|
statConn, ok := iConn.(*stat.CounterConnection)
|
||||||
@@ -418,7 +399,7 @@ func (w *PacketWriter) WriteMultiBuffer(mb buf.MultiBuffer) error {
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
destAddr, _ := net.ResolveUDPAddr("udp", b.UDP.NetAddr())
|
destAddr := b.UDP.RawNetAddr()
|
||||||
if destAddr == nil {
|
if destAddr == nil {
|
||||||
b.Release()
|
b.Release()
|
||||||
continue
|
continue
|
||||||
|
|||||||
@@ -18,11 +18,12 @@ import (
|
|||||||
"github.com/xtls/xray-core/common/protocol"
|
"github.com/xtls/xray-core/common/protocol"
|
||||||
http_proto "github.com/xtls/xray-core/common/protocol/http"
|
http_proto "github.com/xtls/xray-core/common/protocol/http"
|
||||||
"github.com/xtls/xray-core/common/session"
|
"github.com/xtls/xray-core/common/session"
|
||||||
"github.com/xtls/xray-core/common/signal"
|
|
||||||
"github.com/xtls/xray-core/common/task"
|
"github.com/xtls/xray-core/common/task"
|
||||||
"github.com/xtls/xray-core/core"
|
"github.com/xtls/xray-core/core"
|
||||||
"github.com/xtls/xray-core/features/policy"
|
"github.com/xtls/xray-core/features/policy"
|
||||||
"github.com/xtls/xray-core/features/routing"
|
"github.com/xtls/xray-core/features/routing"
|
||||||
|
"github.com/xtls/xray-core/proxy"
|
||||||
|
"github.com/xtls/xray-core/transport"
|
||||||
"github.com/xtls/xray-core/transport/internet/stat"
|
"github.com/xtls/xray-core/transport/internet/stat"
|
||||||
)
|
)
|
||||||
|
|
||||||
@@ -95,6 +96,9 @@ func (s *Server) ProcessWithFirstbyte(ctx context.Context, network net.Network,
|
|||||||
inbound.User = &protocol.MemoryUser{
|
inbound.User = &protocol.MemoryUser{
|
||||||
Level: s.config.UserLevel,
|
Level: s.config.UserLevel,
|
||||||
}
|
}
|
||||||
|
if !proxy.IsRAWTransportWithoutSecurity(conn) {
|
||||||
|
inbound.CanSpliceCopy = 3
|
||||||
|
}
|
||||||
var reader *bufio.Reader
|
var reader *bufio.Reader
|
||||||
if len(firstbyte) > 0 {
|
if len(firstbyte) > 0 {
|
||||||
readerWithoutFirstbyte := bufio.NewReaderSize(readerOnly{conn}, buf.Size)
|
readerWithoutFirstbyte := bufio.NewReaderSize(readerOnly{conn}, buf.Size)
|
||||||
@@ -169,62 +173,31 @@ Start:
|
|||||||
return err
|
return err
|
||||||
}
|
}
|
||||||
|
|
||||||
func (s *Server) handleConnect(ctx context.Context, _ *http.Request, reader *bufio.Reader, conn stat.Connection, dest net.Destination, dispatcher routing.Dispatcher, inbound *session.Inbound) error {
|
func (s *Server) handleConnect(ctx context.Context, _ *http.Request, buffer *bufio.Reader, conn stat.Connection, dest net.Destination, dispatcher routing.Dispatcher, inbound *session.Inbound) error {
|
||||||
_, err := conn.Write([]byte("HTTP/1.1 200 Connection established\r\n\r\n"))
|
_, err := conn.Write([]byte("HTTP/1.1 200 Connection established\r\n\r\n"))
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return errors.New("failed to write back OK response").Base(err)
|
return errors.New("failed to write back OK response").Base(err)
|
||||||
}
|
}
|
||||||
|
|
||||||
plcy := s.policy()
|
reader := buf.NewReader(conn)
|
||||||
ctx, cancel := context.WithCancel(ctx)
|
if buffer.Buffered() > 0 {
|
||||||
timer := signal.CancelAfterInactivity(ctx, cancel, plcy.Timeouts.ConnectionIdle)
|
payload, err := buf.ReadFrom(io.LimitReader(buffer, int64(buffer.Buffered())))
|
||||||
|
|
||||||
if inbound != nil {
|
|
||||||
inbound.Timer = timer
|
|
||||||
}
|
|
||||||
|
|
||||||
ctx = policy.ContextWithBufferPolicy(ctx, plcy.Buffer)
|
|
||||||
link, err := dispatcher.Dispatch(ctx, dest)
|
|
||||||
if err != nil {
|
|
||||||
return err
|
|
||||||
}
|
|
||||||
|
|
||||||
if reader.Buffered() > 0 {
|
|
||||||
payload, err := buf.ReadFrom(io.LimitReader(reader, int64(reader.Buffered())))
|
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return err
|
return err
|
||||||
}
|
}
|
||||||
if err := link.Writer.WriteMultiBuffer(payload); err != nil {
|
reader = &buf.BufferedReader{Reader: reader, Buffer: payload}
|
||||||
return err
|
buffer = nil
|
||||||
}
|
|
||||||
reader = nil
|
|
||||||
}
|
}
|
||||||
|
|
||||||
requestDone := func() error {
|
if inbound.CanSpliceCopy == 2 {
|
||||||
defer timer.SetTimeout(plcy.Timeouts.DownlinkOnly)
|
|
||||||
|
|
||||||
return buf.Copy(buf.NewReader(conn), link.Writer, buf.UpdateActivity(timer))
|
|
||||||
}
|
|
||||||
|
|
||||||
responseDone := func() error {
|
|
||||||
inbound.CanSpliceCopy = 1
|
inbound.CanSpliceCopy = 1
|
||||||
defer timer.SetTimeout(plcy.Timeouts.UplinkOnly)
|
|
||||||
|
|
||||||
v2writer := buf.NewWriter(conn)
|
|
||||||
if err := buf.Copy(link.Reader, v2writer, buf.UpdateActivity(timer)); err != nil {
|
|
||||||
return err
|
|
||||||
}
|
|
||||||
|
|
||||||
return nil
|
|
||||||
}
|
}
|
||||||
|
if err := dispatcher.DispatchLink(ctx, dest, &transport.Link{
|
||||||
closeWriter := task.OnSuccess(requestDone, task.Close(link.Writer))
|
Reader: reader,
|
||||||
if err := task.Run(ctx, closeWriter, responseDone); err != nil {
|
Writer: buf.NewWriter(conn)},
|
||||||
common.Interrupt(link.Reader)
|
); err != nil {
|
||||||
common.Interrupt(link.Writer)
|
return errors.New("failed to dispatch request").Base(err)
|
||||||
return errors.New("connection ends").Base(err)
|
|
||||||
}
|
}
|
||||||
|
|
||||||
return nil
|
return nil
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|||||||
235
proxy/proxy.go
235
proxy/proxy.go
@@ -25,6 +25,7 @@ import (
|
|||||||
"github.com/xtls/xray-core/common/signal"
|
"github.com/xtls/xray-core/common/signal"
|
||||||
"github.com/xtls/xray-core/features/routing"
|
"github.com/xtls/xray-core/features/routing"
|
||||||
"github.com/xtls/xray-core/features/stats"
|
"github.com/xtls/xray-core/features/stats"
|
||||||
|
"github.com/xtls/xray-core/proxy/vless/encryption"
|
||||||
"github.com/xtls/xray-core/transport"
|
"github.com/xtls/xray-core/transport"
|
||||||
"github.com/xtls/xray-core/transport/internet"
|
"github.com/xtls/xray-core/transport/internet"
|
||||||
"github.com/xtls/xray-core/transport/internet/reality"
|
"github.com/xtls/xray-core/transport/internet/reality"
|
||||||
@@ -176,63 +177,109 @@ type VisionReader struct {
|
|||||||
trafficState *TrafficState
|
trafficState *TrafficState
|
||||||
ctx context.Context
|
ctx context.Context
|
||||||
isUplink bool
|
isUplink bool
|
||||||
|
conn net.Conn
|
||||||
|
input *bytes.Reader
|
||||||
|
rawInput *bytes.Buffer
|
||||||
|
ob *session.Outbound
|
||||||
|
|
||||||
|
// internal
|
||||||
|
directReadCounter stats.Counter
|
||||||
}
|
}
|
||||||
|
|
||||||
func NewVisionReader(reader buf.Reader, state *TrafficState, isUplink bool, context context.Context) *VisionReader {
|
func NewVisionReader(reader buf.Reader, trafficState *TrafficState, isUplink bool, ctx context.Context, conn net.Conn, input *bytes.Reader, rawInput *bytes.Buffer, ob *session.Outbound) *VisionReader {
|
||||||
return &VisionReader{
|
return &VisionReader{
|
||||||
Reader: reader,
|
Reader: reader,
|
||||||
trafficState: state,
|
trafficState: trafficState,
|
||||||
ctx: context,
|
ctx: ctx,
|
||||||
isUplink: isUplink,
|
isUplink: isUplink,
|
||||||
|
conn: conn,
|
||||||
|
input: input,
|
||||||
|
rawInput: rawInput,
|
||||||
|
ob: ob,
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
func (w *VisionReader) ReadMultiBuffer() (buf.MultiBuffer, error) {
|
func (w *VisionReader) ReadMultiBuffer() (buf.MultiBuffer, error) {
|
||||||
buffer, err := w.Reader.ReadMultiBuffer()
|
buffer, err := w.Reader.ReadMultiBuffer()
|
||||||
if !buffer.IsEmpty() {
|
if buffer.IsEmpty() {
|
||||||
var withinPaddingBuffers *bool
|
return buffer, err
|
||||||
var remainingContent *int32
|
}
|
||||||
var remainingPadding *int32
|
|
||||||
var currentCommand *int
|
|
||||||
var switchToDirectCopy *bool
|
|
||||||
if w.isUplink {
|
|
||||||
withinPaddingBuffers = &w.trafficState.Inbound.WithinPaddingBuffers
|
|
||||||
remainingContent = &w.trafficState.Inbound.RemainingContent
|
|
||||||
remainingPadding = &w.trafficState.Inbound.RemainingPadding
|
|
||||||
currentCommand = &w.trafficState.Inbound.CurrentCommand
|
|
||||||
switchToDirectCopy = &w.trafficState.Inbound.UplinkReaderDirectCopy
|
|
||||||
} else {
|
|
||||||
withinPaddingBuffers = &w.trafficState.Outbound.WithinPaddingBuffers
|
|
||||||
remainingContent = &w.trafficState.Outbound.RemainingContent
|
|
||||||
remainingPadding = &w.trafficState.Outbound.RemainingPadding
|
|
||||||
currentCommand = &w.trafficState.Outbound.CurrentCommand
|
|
||||||
switchToDirectCopy = &w.trafficState.Outbound.DownlinkReaderDirectCopy
|
|
||||||
}
|
|
||||||
|
|
||||||
if *withinPaddingBuffers || w.trafficState.NumberOfPacketToFilter > 0 {
|
var withinPaddingBuffers *bool
|
||||||
mb2 := make(buf.MultiBuffer, 0, len(buffer))
|
var remainingContent *int32
|
||||||
for _, b := range buffer {
|
var remainingPadding *int32
|
||||||
newbuffer := XtlsUnpadding(b, w.trafficState, w.isUplink, w.ctx)
|
var currentCommand *int
|
||||||
if newbuffer.Len() > 0 {
|
var switchToDirectCopy *bool
|
||||||
mb2 = append(mb2, newbuffer)
|
if w.isUplink {
|
||||||
}
|
withinPaddingBuffers = &w.trafficState.Inbound.WithinPaddingBuffers
|
||||||
}
|
remainingContent = &w.trafficState.Inbound.RemainingContent
|
||||||
buffer = mb2
|
remainingPadding = &w.trafficState.Inbound.RemainingPadding
|
||||||
if *remainingContent > 0 || *remainingPadding > 0 || *currentCommand == 0 {
|
currentCommand = &w.trafficState.Inbound.CurrentCommand
|
||||||
*withinPaddingBuffers = true
|
switchToDirectCopy = &w.trafficState.Inbound.UplinkReaderDirectCopy
|
||||||
} else if *currentCommand == 1 {
|
} else {
|
||||||
*withinPaddingBuffers = false
|
withinPaddingBuffers = &w.trafficState.Outbound.WithinPaddingBuffers
|
||||||
} else if *currentCommand == 2 {
|
remainingContent = &w.trafficState.Outbound.RemainingContent
|
||||||
*withinPaddingBuffers = false
|
remainingPadding = &w.trafficState.Outbound.RemainingPadding
|
||||||
*switchToDirectCopy = true
|
currentCommand = &w.trafficState.Outbound.CurrentCommand
|
||||||
} else {
|
switchToDirectCopy = &w.trafficState.Outbound.DownlinkReaderDirectCopy
|
||||||
errors.LogInfo(w.ctx, "XtlsRead unknown command ", *currentCommand, buffer.Len())
|
}
|
||||||
|
|
||||||
|
if *switchToDirectCopy {
|
||||||
|
if w.directReadCounter != nil {
|
||||||
|
w.directReadCounter.Add(int64(buffer.Len()))
|
||||||
|
}
|
||||||
|
return buffer, err
|
||||||
|
}
|
||||||
|
|
||||||
|
if *withinPaddingBuffers || w.trafficState.NumberOfPacketToFilter > 0 {
|
||||||
|
mb2 := make(buf.MultiBuffer, 0, len(buffer))
|
||||||
|
for _, b := range buffer {
|
||||||
|
newbuffer := XtlsUnpadding(b, w.trafficState, w.isUplink, w.ctx)
|
||||||
|
if newbuffer.Len() > 0 {
|
||||||
|
mb2 = append(mb2, newbuffer)
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
if w.trafficState.NumberOfPacketToFilter > 0 {
|
buffer = mb2
|
||||||
XtlsFilterTls(buffer, w.trafficState, w.ctx)
|
if *remainingContent > 0 || *remainingPadding > 0 || *currentCommand == 0 {
|
||||||
|
*withinPaddingBuffers = true
|
||||||
|
} else if *currentCommand == 1 {
|
||||||
|
*withinPaddingBuffers = false
|
||||||
|
} else if *currentCommand == 2 {
|
||||||
|
*withinPaddingBuffers = false
|
||||||
|
*switchToDirectCopy = true
|
||||||
|
} else {
|
||||||
|
errors.LogInfo(w.ctx, "XtlsRead unknown command ", *currentCommand, buffer.Len())
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
if w.trafficState.NumberOfPacketToFilter > 0 {
|
||||||
|
XtlsFilterTls(buffer, w.trafficState, w.ctx)
|
||||||
|
}
|
||||||
|
|
||||||
|
if *switchToDirectCopy {
|
||||||
|
// XTLS Vision processes TLS-like conn's input and rawInput
|
||||||
|
if inputBuffer, err := buf.ReadFrom(w.input); err == nil && !inputBuffer.IsEmpty() {
|
||||||
|
buffer, _ = buf.MergeMulti(buffer, inputBuffer)
|
||||||
|
}
|
||||||
|
if rawInputBuffer, err := buf.ReadFrom(w.rawInput); err == nil && !rawInputBuffer.IsEmpty() {
|
||||||
|
buffer, _ = buf.MergeMulti(buffer, rawInputBuffer)
|
||||||
|
}
|
||||||
|
*w.input = bytes.Reader{} // release memory
|
||||||
|
w.input = nil
|
||||||
|
*w.rawInput = bytes.Buffer{} // release memory
|
||||||
|
w.rawInput = nil
|
||||||
|
|
||||||
|
if inbound := session.InboundFromContext(w.ctx); inbound != nil && inbound.Conn != nil {
|
||||||
|
if w.isUplink && inbound.CanSpliceCopy == 2 {
|
||||||
|
inbound.CanSpliceCopy = 1
|
||||||
|
}
|
||||||
|
if !w.isUplink && w.ob != nil && w.ob.CanSpliceCopy == 2 { // ob need to be passed in due to context can have more than one ob
|
||||||
|
w.ob.CanSpliceCopy = 1
|
||||||
|
}
|
||||||
|
}
|
||||||
|
readerConn, readCounter, _ := UnwrapRawConn(w.conn)
|
||||||
|
w.directReadCounter = readCounter
|
||||||
|
w.Reader = buf.NewReader(readerConn)
|
||||||
|
}
|
||||||
return buffer, err
|
return buffer, err
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -240,28 +287,32 @@ func (w *VisionReader) ReadMultiBuffer() (buf.MultiBuffer, error) {
|
|||||||
// Note Vision probably only make sense as the inner most layer of writer, since it need assess traffic state from origin proxy traffic
|
// Note Vision probably only make sense as the inner most layer of writer, since it need assess traffic state from origin proxy traffic
|
||||||
type VisionWriter struct {
|
type VisionWriter struct {
|
||||||
buf.Writer
|
buf.Writer
|
||||||
trafficState *TrafficState
|
trafficState *TrafficState
|
||||||
ctx context.Context
|
ctx context.Context
|
||||||
writeOnceUserUUID []byte
|
isUplink bool
|
||||||
isUplink bool
|
conn net.Conn
|
||||||
|
ob *session.Outbound
|
||||||
|
|
||||||
|
// internal
|
||||||
|
writeOnceUserUUID []byte
|
||||||
|
directWriteCounter stats.Counter
|
||||||
}
|
}
|
||||||
|
|
||||||
func NewVisionWriter(writer buf.Writer, state *TrafficState, isUplink bool, context context.Context) *VisionWriter {
|
func NewVisionWriter(writer buf.Writer, trafficState *TrafficState, isUplink bool, ctx context.Context, conn net.Conn, ob *session.Outbound) *VisionWriter {
|
||||||
w := make([]byte, len(state.UserUUID))
|
w := make([]byte, len(trafficState.UserUUID))
|
||||||
copy(w, state.UserUUID)
|
copy(w, trafficState.UserUUID)
|
||||||
return &VisionWriter{
|
return &VisionWriter{
|
||||||
Writer: writer,
|
Writer: writer,
|
||||||
trafficState: state,
|
trafficState: trafficState,
|
||||||
ctx: context,
|
ctx: ctx,
|
||||||
writeOnceUserUUID: w,
|
writeOnceUserUUID: w,
|
||||||
isUplink: isUplink,
|
isUplink: isUplink,
|
||||||
|
conn: conn,
|
||||||
|
ob: ob,
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
func (w *VisionWriter) WriteMultiBuffer(mb buf.MultiBuffer) error {
|
func (w *VisionWriter) WriteMultiBuffer(mb buf.MultiBuffer) error {
|
||||||
if w.trafficState.NumberOfPacketToFilter > 0 {
|
|
||||||
XtlsFilterTls(mb, w.trafficState, w.ctx)
|
|
||||||
}
|
|
||||||
var isPadding *bool
|
var isPadding *bool
|
||||||
var switchToDirectCopy *bool
|
var switchToDirectCopy *bool
|
||||||
if w.isUplink {
|
if w.isUplink {
|
||||||
@@ -271,6 +322,29 @@ func (w *VisionWriter) WriteMultiBuffer(mb buf.MultiBuffer) error {
|
|||||||
isPadding = &w.trafficState.Inbound.IsPadding
|
isPadding = &w.trafficState.Inbound.IsPadding
|
||||||
switchToDirectCopy = &w.trafficState.Inbound.DownlinkWriterDirectCopy
|
switchToDirectCopy = &w.trafficState.Inbound.DownlinkWriterDirectCopy
|
||||||
}
|
}
|
||||||
|
|
||||||
|
if *switchToDirectCopy {
|
||||||
|
if inbound := session.InboundFromContext(w.ctx); inbound != nil {
|
||||||
|
if !w.isUplink && inbound.CanSpliceCopy == 2 {
|
||||||
|
inbound.CanSpliceCopy = 1
|
||||||
|
}
|
||||||
|
if w.isUplink && w.ob != nil && w.ob.CanSpliceCopy == 2 {
|
||||||
|
w.ob.CanSpliceCopy = 1
|
||||||
|
}
|
||||||
|
}
|
||||||
|
rawConn, _, writerCounter := UnwrapRawConn(w.conn)
|
||||||
|
w.Writer = buf.NewWriter(rawConn)
|
||||||
|
w.directWriteCounter = writerCounter
|
||||||
|
*switchToDirectCopy = false
|
||||||
|
}
|
||||||
|
if !mb.IsEmpty() && w.directWriteCounter != nil {
|
||||||
|
w.directWriteCounter.Add(int64(mb.Len()))
|
||||||
|
}
|
||||||
|
|
||||||
|
if w.trafficState.NumberOfPacketToFilter > 0 {
|
||||||
|
XtlsFilterTls(mb, w.trafficState, w.ctx)
|
||||||
|
}
|
||||||
|
|
||||||
if *isPadding {
|
if *isPadding {
|
||||||
if len(mb) == 1 && mb[0] == nil {
|
if len(mb) == 1 && mb[0] == nil {
|
||||||
mb[0] = XtlsPadding(nil, CommandPaddingContinue, &w.writeOnceUserUUID, true, w.ctx) // we do a long padding to hide vless header
|
mb[0] = XtlsPadding(nil, CommandPaddingContinue, &w.writeOnceUserUUID, true, w.ctx) // we do a long padding to hide vless header
|
||||||
@@ -524,24 +598,33 @@ func XtlsFilterTls(buffer buf.MultiBuffer, trafficState *TrafficState, ctx conte
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
// UnwrapRawConn support unwrap stats, tls, utls, reality, proxyproto, uds-wrapper conn and get raw tcp/uds conn from it
|
// UnwrapRawConn support unwrap encryption, stats, tls, utls, reality, proxyproto, uds-wrapper conn and get raw tcp/uds conn from it
|
||||||
func UnwrapRawConn(conn net.Conn) (net.Conn, stats.Counter, stats.Counter) {
|
func UnwrapRawConn(conn net.Conn) (net.Conn, stats.Counter, stats.Counter) {
|
||||||
var readCounter, writerCounter stats.Counter
|
var readCounter, writerCounter stats.Counter
|
||||||
if conn != nil {
|
if conn != nil {
|
||||||
statConn, ok := conn.(*stat.CounterConnection)
|
isEncryption := false
|
||||||
if ok {
|
if commonConn, ok := conn.(*encryption.CommonConn); ok {
|
||||||
|
conn = commonConn.Conn
|
||||||
|
isEncryption = true
|
||||||
|
}
|
||||||
|
if xorConn, ok := conn.(*encryption.XorConn); ok {
|
||||||
|
return xorConn, nil, nil // full-random xorConn should not be penetrated
|
||||||
|
}
|
||||||
|
if statConn, ok := conn.(*stat.CounterConnection); ok {
|
||||||
conn = statConn.Connection
|
conn = statConn.Connection
|
||||||
readCounter = statConn.ReadCounter
|
readCounter = statConn.ReadCounter
|
||||||
writerCounter = statConn.WriteCounter
|
writerCounter = statConn.WriteCounter
|
||||||
}
|
}
|
||||||
if xc, ok := conn.(*tls.Conn); ok {
|
if !isEncryption { // avoids double penetration
|
||||||
conn = xc.NetConn()
|
if xc, ok := conn.(*tls.Conn); ok {
|
||||||
} else if utlsConn, ok := conn.(*tls.UConn); ok {
|
conn = xc.NetConn()
|
||||||
conn = utlsConn.NetConn()
|
} else if utlsConn, ok := conn.(*tls.UConn); ok {
|
||||||
} else if realityConn, ok := conn.(*reality.Conn); ok {
|
conn = utlsConn.NetConn()
|
||||||
conn = realityConn.NetConn()
|
} else if realityConn, ok := conn.(*reality.Conn); ok {
|
||||||
} else if realityUConn, ok := conn.(*reality.UConn); ok {
|
conn = realityConn.NetConn()
|
||||||
conn = realityUConn.NetConn()
|
} else if realityUConn, ok := conn.(*reality.UConn); ok {
|
||||||
|
conn = realityUConn.NetConn()
|
||||||
|
}
|
||||||
}
|
}
|
||||||
if pc, ok := conn.(*proxyproto.Conn); ok {
|
if pc, ok := conn.(*proxyproto.Conn); ok {
|
||||||
conn = pc.Raw()
|
conn = pc.Raw()
|
||||||
@@ -595,10 +678,10 @@ func CopyRawConnIfExist(ctx context.Context, readerConn net.Conn, writerConn net
|
|||||||
errors.LogInfo(ctx, "CopyRawConn splice")
|
errors.LogInfo(ctx, "CopyRawConn splice")
|
||||||
statWriter, _ := writer.(*dispatcher.SizeStatWriter)
|
statWriter, _ := writer.(*dispatcher.SizeStatWriter)
|
||||||
//runtime.Gosched() // necessary
|
//runtime.Gosched() // necessary
|
||||||
time.Sleep(time.Millisecond) // without this, there will be a rare ssl error for freedom splice
|
time.Sleep(time.Millisecond) // without this, there will be a rare ssl error for freedom splice
|
||||||
timer.SetTimeout(8 * time.Hour) // prevent leak, just in case
|
timer.SetTimeout(24 * time.Hour) // prevent leak, just in case
|
||||||
if inTimer != nil {
|
if inTimer != nil {
|
||||||
inTimer.SetTimeout(8 * time.Hour)
|
inTimer.SetTimeout(24 * time.Hour)
|
||||||
}
|
}
|
||||||
w, err := tc.ReadFrom(readerConn)
|
w, err := tc.ReadFrom(readerConn)
|
||||||
if readCounter != nil {
|
if readCounter != nil {
|
||||||
@@ -626,15 +709,29 @@ func CopyRawConnIfExist(ctx context.Context, readerConn net.Conn, writerConn net
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
if err != nil {
|
if err != nil {
|
||||||
|
if errors.Cause(err) == io.EOF {
|
||||||
|
return nil
|
||||||
|
}
|
||||||
return err
|
return err
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
func readV(ctx context.Context, reader buf.Reader, writer buf.Writer, timer signal.ActivityUpdater, readCounter stats.Counter) error {
|
func readV(ctx context.Context, reader buf.Reader, writer buf.Writer, timer signal.ActivityUpdater, readCounter stats.Counter) error {
|
||||||
errors.LogInfo(ctx, "CopyRawConn readv")
|
errors.LogInfo(ctx, "CopyRawConn (maybe) readv")
|
||||||
if err := buf.Copy(reader, writer, buf.UpdateActivity(timer), buf.AddToStatCounter(readCounter)); err != nil {
|
if err := buf.Copy(reader, writer, buf.UpdateActivity(timer), buf.AddToStatCounter(readCounter)); err != nil {
|
||||||
return errors.New("failed to process response").Base(err)
|
return errors.New("failed to process response").Base(err)
|
||||||
}
|
}
|
||||||
return nil
|
return nil
|
||||||
}
|
}
|
||||||
|
|
||||||
|
func IsRAWTransportWithoutSecurity(conn stat.Connection) bool {
|
||||||
|
iConn := conn
|
||||||
|
if statConn, ok := iConn.(*stat.CounterConnection); ok {
|
||||||
|
iConn = statConn.Connection
|
||||||
|
}
|
||||||
|
_, ok1 := iConn.(*proxyproto.Conn)
|
||||||
|
_, ok2 := iConn.(*net.TCPConn)
|
||||||
|
_, ok3 := iConn.(*internet.UnixConnWrapper)
|
||||||
|
return ok1 || ok2 || ok3
|
||||||
|
}
|
||||||
|
|||||||
@@ -104,12 +104,12 @@ func (s *Server) Process(ctx context.Context, network net.Network, conn stat.Con
|
|||||||
func (s *Server) handleUDPPayload(ctx context.Context, conn stat.Connection, dispatcher routing.Dispatcher) error {
|
func (s *Server) handleUDPPayload(ctx context.Context, conn stat.Connection, dispatcher routing.Dispatcher) error {
|
||||||
udpServer := udp.NewDispatcher(dispatcher, func(ctx context.Context, packet *udp_proto.Packet) {
|
udpServer := udp.NewDispatcher(dispatcher, func(ctx context.Context, packet *udp_proto.Packet) {
|
||||||
request := protocol.RequestHeaderFromContext(ctx)
|
request := protocol.RequestHeaderFromContext(ctx)
|
||||||
|
payload := packet.Payload
|
||||||
if request == nil {
|
if request == nil {
|
||||||
|
payload.Release()
|
||||||
return
|
return
|
||||||
}
|
}
|
||||||
|
|
||||||
payload := packet.Payload
|
|
||||||
|
|
||||||
if payload.UDP != nil {
|
if payload.UDP != nil {
|
||||||
request = &protocol.RequestHeader{
|
request = &protocol.RequestHeader{
|
||||||
User: request.User,
|
User: request.User,
|
||||||
@@ -124,9 +124,9 @@ func (s *Server) handleUDPPayload(ctx context.Context, conn stat.Connection, dis
|
|||||||
errors.LogWarningInner(ctx, err, "failed to encode UDP packet")
|
errors.LogWarningInner(ctx, err, "failed to encode UDP packet")
|
||||||
return
|
return
|
||||||
}
|
}
|
||||||
defer data.Release()
|
|
||||||
|
|
||||||
conn.Write(data.Bytes())
|
conn.Write(data.Bytes())
|
||||||
|
data.Release()
|
||||||
})
|
})
|
||||||
defer udpServer.RemoveRay()
|
defer udpServer.RemoveRay()
|
||||||
|
|
||||||
|
|||||||
@@ -14,12 +14,12 @@ import (
|
|||||||
"github.com/xtls/xray-core/common/protocol"
|
"github.com/xtls/xray-core/common/protocol"
|
||||||
udp_proto "github.com/xtls/xray-core/common/protocol/udp"
|
udp_proto "github.com/xtls/xray-core/common/protocol/udp"
|
||||||
"github.com/xtls/xray-core/common/session"
|
"github.com/xtls/xray-core/common/session"
|
||||||
"github.com/xtls/xray-core/common/signal"
|
|
||||||
"github.com/xtls/xray-core/common/task"
|
|
||||||
"github.com/xtls/xray-core/core"
|
"github.com/xtls/xray-core/core"
|
||||||
"github.com/xtls/xray-core/features/policy"
|
"github.com/xtls/xray-core/features/policy"
|
||||||
"github.com/xtls/xray-core/features/routing"
|
"github.com/xtls/xray-core/features/routing"
|
||||||
|
"github.com/xtls/xray-core/proxy"
|
||||||
"github.com/xtls/xray-core/proxy/http"
|
"github.com/xtls/xray-core/proxy/http"
|
||||||
|
"github.com/xtls/xray-core/transport"
|
||||||
"github.com/xtls/xray-core/transport/internet/stat"
|
"github.com/xtls/xray-core/transport/internet/stat"
|
||||||
"github.com/xtls/xray-core/transport/internet/udp"
|
"github.com/xtls/xray-core/transport/internet/udp"
|
||||||
)
|
)
|
||||||
@@ -75,6 +75,9 @@ func (s *Server) Process(ctx context.Context, network net.Network, conn stat.Con
|
|||||||
inbound.User = &protocol.MemoryUser{
|
inbound.User = &protocol.MemoryUser{
|
||||||
Level: s.config.UserLevel,
|
Level: s.config.UserLevel,
|
||||||
}
|
}
|
||||||
|
if !proxy.IsRAWTransportWithoutSecurity(conn) {
|
||||||
|
inbound.CanSpliceCopy = 3
|
||||||
|
}
|
||||||
|
|
||||||
switch network {
|
switch network {
|
||||||
case net.Network_TCP:
|
case net.Network_TCP:
|
||||||
@@ -154,8 +157,16 @@ func (s *Server) processTCP(ctx context.Context, conn stat.Connection, dispatche
|
|||||||
Reason: "",
|
Reason: "",
|
||||||
})
|
})
|
||||||
}
|
}
|
||||||
|
if inbound.CanSpliceCopy == 2 {
|
||||||
return s.transport(ctx, reader, conn, dest, dispatcher, inbound)
|
inbound.CanSpliceCopy = 1
|
||||||
|
}
|
||||||
|
if err := dispatcher.DispatchLink(ctx, dest, &transport.Link{
|
||||||
|
Reader: reader,
|
||||||
|
Writer: buf.NewWriter(conn)},
|
||||||
|
); err != nil {
|
||||||
|
return errors.New("failed to dispatch request").Base(err)
|
||||||
|
}
|
||||||
|
return nil
|
||||||
}
|
}
|
||||||
|
|
||||||
if request.Command == protocol.RequestCommandUDP {
|
if request.Command == protocol.RequestCommandUDP {
|
||||||
@@ -174,52 +185,6 @@ func (*Server) handleUDP(c io.Reader) error {
|
|||||||
return common.Error2(io.Copy(buf.DiscardBytes, c))
|
return common.Error2(io.Copy(buf.DiscardBytes, c))
|
||||||
}
|
}
|
||||||
|
|
||||||
func (s *Server) transport(ctx context.Context, reader io.Reader, writer io.Writer, dest net.Destination, dispatcher routing.Dispatcher, inbound *session.Inbound) error {
|
|
||||||
ctx, cancel := context.WithCancel(ctx)
|
|
||||||
timer := signal.CancelAfterInactivity(ctx, cancel, s.policy().Timeouts.ConnectionIdle)
|
|
||||||
|
|
||||||
if inbound != nil {
|
|
||||||
inbound.Timer = timer
|
|
||||||
}
|
|
||||||
|
|
||||||
plcy := s.policy()
|
|
||||||
ctx = policy.ContextWithBufferPolicy(ctx, plcy.Buffer)
|
|
||||||
link, err := dispatcher.Dispatch(ctx, dest)
|
|
||||||
if err != nil {
|
|
||||||
return err
|
|
||||||
}
|
|
||||||
|
|
||||||
requestDone := func() error {
|
|
||||||
defer timer.SetTimeout(plcy.Timeouts.DownlinkOnly)
|
|
||||||
if err := buf.Copy(buf.NewReader(reader), link.Writer, buf.UpdateActivity(timer)); err != nil {
|
|
||||||
return errors.New("failed to transport all TCP request").Base(err)
|
|
||||||
}
|
|
||||||
|
|
||||||
return nil
|
|
||||||
}
|
|
||||||
|
|
||||||
responseDone := func() error {
|
|
||||||
inbound.CanSpliceCopy = 1
|
|
||||||
defer timer.SetTimeout(plcy.Timeouts.UplinkOnly)
|
|
||||||
|
|
||||||
v2writer := buf.NewWriter(writer)
|
|
||||||
if err := buf.Copy(link.Reader, v2writer, buf.UpdateActivity(timer)); err != nil {
|
|
||||||
return errors.New("failed to transport all TCP response").Base(err)
|
|
||||||
}
|
|
||||||
|
|
||||||
return nil
|
|
||||||
}
|
|
||||||
|
|
||||||
requestDonePost := task.OnSuccess(requestDone, task.Close(link.Writer))
|
|
||||||
if err := task.Run(ctx, requestDonePost, responseDone); err != nil {
|
|
||||||
common.Interrupt(link.Reader)
|
|
||||||
common.Interrupt(link.Writer)
|
|
||||||
return errors.New("connection ends").Base(err)
|
|
||||||
}
|
|
||||||
|
|
||||||
return nil
|
|
||||||
}
|
|
||||||
|
|
||||||
func (s *Server) handleUDPPayload(ctx context.Context, conn stat.Connection, dispatcher routing.Dispatcher) error {
|
func (s *Server) handleUDPPayload(ctx context.Context, conn stat.Connection, dispatcher routing.Dispatcher) error {
|
||||||
if s.udpFilter != nil && !s.udpFilter.Check(conn.RemoteAddr()) {
|
if s.udpFilter != nil && !s.udpFilter.Check(conn.RemoteAddr()) {
|
||||||
errors.LogDebug(ctx, "Unauthorized UDP access from ", conn.RemoteAddr().String())
|
errors.LogDebug(ctx, "Unauthorized UDP access from ", conn.RemoteAddr().String())
|
||||||
@@ -231,6 +196,7 @@ func (s *Server) handleUDPPayload(ctx context.Context, conn stat.Connection, dis
|
|||||||
|
|
||||||
request := protocol.RequestHeaderFromContext(ctx)
|
request := protocol.RequestHeaderFromContext(ctx)
|
||||||
if request == nil {
|
if request == nil {
|
||||||
|
payload.Release()
|
||||||
return
|
return
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -249,9 +215,9 @@ func (s *Server) handleUDPPayload(ctx context.Context, conn stat.Connection, dis
|
|||||||
errors.LogWarningInner(ctx, err, "failed to write UDP response")
|
errors.LogWarningInner(ctx, err, "failed to write UDP response")
|
||||||
return
|
return
|
||||||
}
|
}
|
||||||
defer udpMessage.Release()
|
|
||||||
|
|
||||||
conn.Write(udpMessage.Bytes())
|
conn.Write(udpMessage.Bytes())
|
||||||
|
udpMessage.Release()
|
||||||
})
|
})
|
||||||
defer udpServer.RemoveRay()
|
defer udpServer.RemoveRay()
|
||||||
|
|
||||||
@@ -259,7 +225,6 @@ func (s *Server) handleUDPPayload(ctx context.Context, conn stat.Connection, dis
|
|||||||
if inbound != nil && inbound.Source.IsValid() {
|
if inbound != nil && inbound.Source.IsValid() {
|
||||||
errors.LogInfo(ctx, "client UDP connection from ", inbound.Source)
|
errors.LogInfo(ctx, "client UDP connection from ", inbound.Source)
|
||||||
}
|
}
|
||||||
inbound.CanSpliceCopy = 1
|
|
||||||
|
|
||||||
var dest *net.Destination
|
var dest *net.Destination
|
||||||
|
|
||||||
|
|||||||
@@ -113,9 +113,11 @@ func (w *PacketWriter) WriteMultiBuffer(mb buf.MultiBuffer) error {
|
|||||||
target = b.UDP
|
target = b.UDP
|
||||||
}
|
}
|
||||||
if _, err := w.writePacket(b.Bytes(), *target); err != nil {
|
if _, err := w.writePacket(b.Bytes(), *target); err != nil {
|
||||||
|
b.Release()
|
||||||
buf.ReleaseMulti(mb)
|
buf.ReleaseMulti(mb)
|
||||||
return err
|
return err
|
||||||
}
|
}
|
||||||
|
b.Release()
|
||||||
}
|
}
|
||||||
return nil
|
return nil
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -233,7 +233,7 @@ func (s *Server) Process(ctx context.Context, network net.Network, conn stat.Con
|
|||||||
sessionPolicy = s.policyManager.ForLevel(user.Level)
|
sessionPolicy = s.policyManager.ForLevel(user.Level)
|
||||||
|
|
||||||
if destination.Network == net.Network_UDP { // handle udp request
|
if destination.Network == net.Network_UDP { // handle udp request
|
||||||
return s.handleUDPPayload(ctx, &PacketReader{Reader: clientReader}, &PacketWriter{Writer: conn}, dispatcher)
|
return s.handleUDPPayload(ctx, sessionPolicy, &PacketReader{Reader: clientReader}, &PacketWriter{Writer: conn}, dispatcher)
|
||||||
}
|
}
|
||||||
|
|
||||||
ctx = log.ContextWithAccessMessage(ctx, &log.AccessMessage{
|
ctx = log.ContextWithAccessMessage(ctx, &log.AccessMessage{
|
||||||
@@ -248,7 +248,11 @@ func (s *Server) Process(ctx context.Context, network net.Network, conn stat.Con
|
|||||||
return s.handleConnection(ctx, sessionPolicy, destination, clientReader, buf.NewWriter(conn), dispatcher)
|
return s.handleConnection(ctx, sessionPolicy, destination, clientReader, buf.NewWriter(conn), dispatcher)
|
||||||
}
|
}
|
||||||
|
|
||||||
func (s *Server) handleUDPPayload(ctx context.Context, clientReader *PacketReader, clientWriter *PacketWriter, dispatcher routing.Dispatcher) error {
|
func (s *Server) handleUDPPayload(ctx context.Context, sessionPolicy policy.Session, clientReader *PacketReader, clientWriter *PacketWriter, dispatcher routing.Dispatcher) error {
|
||||||
|
ctx, cancel := context.WithCancel(ctx)
|
||||||
|
defer cancel()
|
||||||
|
timer := signal.CancelAfterInactivity(ctx, cancel, sessionPolicy.Timeouts.ConnectionIdle)
|
||||||
|
defer timer.SetTimeout(0)
|
||||||
udpServer := udp.NewDispatcher(dispatcher, func(ctx context.Context, packet *udp_proto.Packet) {
|
udpServer := udp.NewDispatcher(dispatcher, func(ctx context.Context, packet *udp_proto.Packet) {
|
||||||
udpPayload := packet.Payload
|
udpPayload := packet.Payload
|
||||||
if udpPayload.UDP == nil {
|
if udpPayload.UDP == nil {
|
||||||
@@ -257,6 +261,9 @@ func (s *Server) handleUDPPayload(ctx context.Context, clientReader *PacketReade
|
|||||||
|
|
||||||
if err := clientWriter.WriteMultiBuffer(buf.MultiBuffer{udpPayload}); err != nil {
|
if err := clientWriter.WriteMultiBuffer(buf.MultiBuffer{udpPayload}); err != nil {
|
||||||
errors.LogWarningInner(ctx, err, "failed to write response")
|
errors.LogWarningInner(ctx, err, "failed to write response")
|
||||||
|
cancel()
|
||||||
|
} else {
|
||||||
|
timer.Update()
|
||||||
}
|
}
|
||||||
})
|
})
|
||||||
defer udpServer.RemoveRay()
|
defer udpServer.RemoveRay()
|
||||||
@@ -266,47 +273,56 @@ func (s *Server) handleUDPPayload(ctx context.Context, clientReader *PacketReade
|
|||||||
|
|
||||||
var dest *net.Destination
|
var dest *net.Destination
|
||||||
|
|
||||||
for {
|
requestDone := func() error {
|
||||||
select {
|
for {
|
||||||
case <-ctx.Done():
|
select {
|
||||||
return nil
|
case <-ctx.Done():
|
||||||
default:
|
|
||||||
mb, err := clientReader.ReadMultiBuffer()
|
|
||||||
if err != nil {
|
|
||||||
if errors.Cause(err) != io.EOF {
|
|
||||||
return errors.New("unexpected EOF").Base(err)
|
|
||||||
}
|
|
||||||
return nil
|
return nil
|
||||||
}
|
default:
|
||||||
|
mb, err := clientReader.ReadMultiBuffer()
|
||||||
|
if err != nil {
|
||||||
|
if errors.Cause(err) != io.EOF {
|
||||||
|
return errors.New("unexpected EOF").Base(err)
|
||||||
|
}
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
mb2, b := buf.SplitFirst(mb)
|
mb2, b := buf.SplitFirst(mb)
|
||||||
if b == nil {
|
if b == nil {
|
||||||
continue
|
continue
|
||||||
}
|
}
|
||||||
destination := *b.UDP
|
timer.Update()
|
||||||
|
destination := *b.UDP
|
||||||
|
|
||||||
currentPacketCtx := ctx
|
currentPacketCtx := ctx
|
||||||
if inbound.Source.IsValid() {
|
if inbound.Source.IsValid() {
|
||||||
currentPacketCtx = log.ContextWithAccessMessage(ctx, &log.AccessMessage{
|
currentPacketCtx = log.ContextWithAccessMessage(ctx, &log.AccessMessage{
|
||||||
From: inbound.Source,
|
From: inbound.Source,
|
||||||
To: destination,
|
To: destination,
|
||||||
Status: log.AccessAccepted,
|
Status: log.AccessAccepted,
|
||||||
Reason: "",
|
Reason: "",
|
||||||
Email: user.Email,
|
Email: user.Email,
|
||||||
})
|
})
|
||||||
}
|
}
|
||||||
errors.LogInfo(ctx, "tunnelling request to ", destination)
|
errors.LogInfo(ctx, "tunnelling request to ", destination)
|
||||||
|
|
||||||
if !s.cone || dest == nil {
|
if !s.cone || dest == nil {
|
||||||
dest = &destination
|
dest = &destination
|
||||||
}
|
}
|
||||||
|
|
||||||
udpServer.Dispatch(currentPacketCtx, *dest, b) // first packet
|
udpServer.Dispatch(currentPacketCtx, *dest, b) // first packet
|
||||||
for _, payload := range mb2 {
|
for _, payload := range mb2 {
|
||||||
udpServer.Dispatch(currentPacketCtx, *dest, payload)
|
udpServer.Dispatch(currentPacketCtx, *dest, payload)
|
||||||
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
}
|
}
|
||||||
|
|
||||||
|
if err := task.Run(ctx, requestDone); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
return nil
|
||||||
}
|
}
|
||||||
|
|
||||||
func (s *Server) handleConnection(ctx context.Context, sessionPolicy policy.Session,
|
func (s *Server) handleConnection(ctx context.Context, sessionPolicy policy.Session,
|
||||||
|
|||||||
@@ -18,6 +18,10 @@ func (a *Account) AsAccount() (protocol.Account, error) {
|
|||||||
ID: protocol.NewID(id),
|
ID: protocol.NewID(id),
|
||||||
Flow: a.Flow, // needs parser here?
|
Flow: a.Flow, // needs parser here?
|
||||||
Encryption: a.Encryption, // needs parser here?
|
Encryption: a.Encryption, // needs parser here?
|
||||||
|
XorMode: a.XorMode,
|
||||||
|
Seconds: a.Seconds,
|
||||||
|
Padding: a.Padding,
|
||||||
|
Reverse: a.Reverse,
|
||||||
}, nil
|
}, nil
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -27,8 +31,13 @@ type MemoryAccount struct {
|
|||||||
ID *protocol.ID
|
ID *protocol.ID
|
||||||
// Flow of the account. May be "xtls-rprx-vision".
|
// Flow of the account. May be "xtls-rprx-vision".
|
||||||
Flow string
|
Flow string
|
||||||
// Encryption of the account. Used for client connections, and only accepts "none" for now.
|
|
||||||
Encryption string
|
Encryption string
|
||||||
|
XorMode uint32
|
||||||
|
Seconds uint32
|
||||||
|
Padding string
|
||||||
|
|
||||||
|
Reverse *Reverse
|
||||||
}
|
}
|
||||||
|
|
||||||
// Equals implements protocol.Account.Equals().
|
// Equals implements protocol.Account.Equals().
|
||||||
@@ -45,5 +54,9 @@ func (a *MemoryAccount) ToProto() proto.Message {
|
|||||||
Id: a.ID.String(),
|
Id: a.ID.String(),
|
||||||
Flow: a.Flow,
|
Flow: a.Flow,
|
||||||
Encryption: a.Encryption,
|
Encryption: a.Encryption,
|
||||||
|
XorMode: a.XorMode,
|
||||||
|
Seconds: a.Seconds,
|
||||||
|
Padding: a.Padding,
|
||||||
|
Reverse: a.Reverse,
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -20,6 +20,51 @@ const (
|
|||||||
_ = protoimpl.EnforceVersion(protoimpl.MaxVersion - 20)
|
_ = protoimpl.EnforceVersion(protoimpl.MaxVersion - 20)
|
||||||
)
|
)
|
||||||
|
|
||||||
|
type Reverse struct {
|
||||||
|
state protoimpl.MessageState
|
||||||
|
sizeCache protoimpl.SizeCache
|
||||||
|
unknownFields protoimpl.UnknownFields
|
||||||
|
|
||||||
|
Tag string `protobuf:"bytes,1,opt,name=tag,proto3" json:"tag,omitempty"`
|
||||||
|
}
|
||||||
|
|
||||||
|
func (x *Reverse) Reset() {
|
||||||
|
*x = Reverse{}
|
||||||
|
mi := &file_proxy_vless_account_proto_msgTypes[0]
|
||||||
|
ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x))
|
||||||
|
ms.StoreMessageInfo(mi)
|
||||||
|
}
|
||||||
|
|
||||||
|
func (x *Reverse) String() string {
|
||||||
|
return protoimpl.X.MessageStringOf(x)
|
||||||
|
}
|
||||||
|
|
||||||
|
func (*Reverse) ProtoMessage() {}
|
||||||
|
|
||||||
|
func (x *Reverse) ProtoReflect() protoreflect.Message {
|
||||||
|
mi := &file_proxy_vless_account_proto_msgTypes[0]
|
||||||
|
if x != nil {
|
||||||
|
ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x))
|
||||||
|
if ms.LoadMessageInfo() == nil {
|
||||||
|
ms.StoreMessageInfo(mi)
|
||||||
|
}
|
||||||
|
return ms
|
||||||
|
}
|
||||||
|
return mi.MessageOf(x)
|
||||||
|
}
|
||||||
|
|
||||||
|
// Deprecated: Use Reverse.ProtoReflect.Descriptor instead.
|
||||||
|
func (*Reverse) Descriptor() ([]byte, []int) {
|
||||||
|
return file_proxy_vless_account_proto_rawDescGZIP(), []int{0}
|
||||||
|
}
|
||||||
|
|
||||||
|
func (x *Reverse) GetTag() string {
|
||||||
|
if x != nil {
|
||||||
|
return x.Tag
|
||||||
|
}
|
||||||
|
return ""
|
||||||
|
}
|
||||||
|
|
||||||
type Account struct {
|
type Account struct {
|
||||||
state protoimpl.MessageState
|
state protoimpl.MessageState
|
||||||
sizeCache protoimpl.SizeCache
|
sizeCache protoimpl.SizeCache
|
||||||
@@ -28,14 +73,17 @@ type Account struct {
|
|||||||
// ID of the account, in the form of a UUID, e.g., "66ad4540-b58c-4ad2-9926-ea63445a9b57".
|
// ID of the account, in the form of a UUID, e.g., "66ad4540-b58c-4ad2-9926-ea63445a9b57".
|
||||||
Id string `protobuf:"bytes,1,opt,name=id,proto3" json:"id,omitempty"`
|
Id string `protobuf:"bytes,1,opt,name=id,proto3" json:"id,omitempty"`
|
||||||
// Flow settings. May be "xtls-rprx-vision".
|
// Flow settings. May be "xtls-rprx-vision".
|
||||||
Flow string `protobuf:"bytes,2,opt,name=flow,proto3" json:"flow,omitempty"`
|
Flow string `protobuf:"bytes,2,opt,name=flow,proto3" json:"flow,omitempty"`
|
||||||
// Encryption settings. Only applies to client side, and only accepts "none" for now.
|
Encryption string `protobuf:"bytes,3,opt,name=encryption,proto3" json:"encryption,omitempty"`
|
||||||
Encryption string `protobuf:"bytes,3,opt,name=encryption,proto3" json:"encryption,omitempty"`
|
XorMode uint32 `protobuf:"varint,4,opt,name=xorMode,proto3" json:"xorMode,omitempty"`
|
||||||
|
Seconds uint32 `protobuf:"varint,5,opt,name=seconds,proto3" json:"seconds,omitempty"`
|
||||||
|
Padding string `protobuf:"bytes,6,opt,name=padding,proto3" json:"padding,omitempty"`
|
||||||
|
Reverse *Reverse `protobuf:"bytes,7,opt,name=reverse,proto3" json:"reverse,omitempty"`
|
||||||
}
|
}
|
||||||
|
|
||||||
func (x *Account) Reset() {
|
func (x *Account) Reset() {
|
||||||
*x = Account{}
|
*x = Account{}
|
||||||
mi := &file_proxy_vless_account_proto_msgTypes[0]
|
mi := &file_proxy_vless_account_proto_msgTypes[1]
|
||||||
ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x))
|
ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x))
|
||||||
ms.StoreMessageInfo(mi)
|
ms.StoreMessageInfo(mi)
|
||||||
}
|
}
|
||||||
@@ -47,7 +95,7 @@ func (x *Account) String() string {
|
|||||||
func (*Account) ProtoMessage() {}
|
func (*Account) ProtoMessage() {}
|
||||||
|
|
||||||
func (x *Account) ProtoReflect() protoreflect.Message {
|
func (x *Account) ProtoReflect() protoreflect.Message {
|
||||||
mi := &file_proxy_vless_account_proto_msgTypes[0]
|
mi := &file_proxy_vless_account_proto_msgTypes[1]
|
||||||
if x != nil {
|
if x != nil {
|
||||||
ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x))
|
ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x))
|
||||||
if ms.LoadMessageInfo() == nil {
|
if ms.LoadMessageInfo() == nil {
|
||||||
@@ -60,7 +108,7 @@ func (x *Account) ProtoReflect() protoreflect.Message {
|
|||||||
|
|
||||||
// Deprecated: Use Account.ProtoReflect.Descriptor instead.
|
// Deprecated: Use Account.ProtoReflect.Descriptor instead.
|
||||||
func (*Account) Descriptor() ([]byte, []int) {
|
func (*Account) Descriptor() ([]byte, []int) {
|
||||||
return file_proxy_vless_account_proto_rawDescGZIP(), []int{0}
|
return file_proxy_vless_account_proto_rawDescGZIP(), []int{1}
|
||||||
}
|
}
|
||||||
|
|
||||||
func (x *Account) GetId() string {
|
func (x *Account) GetId() string {
|
||||||
@@ -84,23 +132,61 @@ func (x *Account) GetEncryption() string {
|
|||||||
return ""
|
return ""
|
||||||
}
|
}
|
||||||
|
|
||||||
|
func (x *Account) GetXorMode() uint32 {
|
||||||
|
if x != nil {
|
||||||
|
return x.XorMode
|
||||||
|
}
|
||||||
|
return 0
|
||||||
|
}
|
||||||
|
|
||||||
|
func (x *Account) GetSeconds() uint32 {
|
||||||
|
if x != nil {
|
||||||
|
return x.Seconds
|
||||||
|
}
|
||||||
|
return 0
|
||||||
|
}
|
||||||
|
|
||||||
|
func (x *Account) GetPadding() string {
|
||||||
|
if x != nil {
|
||||||
|
return x.Padding
|
||||||
|
}
|
||||||
|
return ""
|
||||||
|
}
|
||||||
|
|
||||||
|
func (x *Account) GetReverse() *Reverse {
|
||||||
|
if x != nil {
|
||||||
|
return x.Reverse
|
||||||
|
}
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
var File_proxy_vless_account_proto protoreflect.FileDescriptor
|
var File_proxy_vless_account_proto protoreflect.FileDescriptor
|
||||||
|
|
||||||
var file_proxy_vless_account_proto_rawDesc = []byte{
|
var file_proxy_vless_account_proto_rawDesc = []byte{
|
||||||
0x0a, 0x19, 0x70, 0x72, 0x6f, 0x78, 0x79, 0x2f, 0x76, 0x6c, 0x65, 0x73, 0x73, 0x2f, 0x61, 0x63,
|
0x0a, 0x19, 0x70, 0x72, 0x6f, 0x78, 0x79, 0x2f, 0x76, 0x6c, 0x65, 0x73, 0x73, 0x2f, 0x61, 0x63,
|
||||||
0x63, 0x6f, 0x75, 0x6e, 0x74, 0x2e, 0x70, 0x72, 0x6f, 0x74, 0x6f, 0x12, 0x10, 0x78, 0x72, 0x61,
|
0x63, 0x6f, 0x75, 0x6e, 0x74, 0x2e, 0x70, 0x72, 0x6f, 0x74, 0x6f, 0x12, 0x10, 0x78, 0x72, 0x61,
|
||||||
0x79, 0x2e, 0x70, 0x72, 0x6f, 0x78, 0x79, 0x2e, 0x76, 0x6c, 0x65, 0x73, 0x73, 0x22, 0x4d, 0x0a,
|
0x79, 0x2e, 0x70, 0x72, 0x6f, 0x78, 0x79, 0x2e, 0x76, 0x6c, 0x65, 0x73, 0x73, 0x22, 0x1b, 0x0a,
|
||||||
0x07, 0x41, 0x63, 0x63, 0x6f, 0x75, 0x6e, 0x74, 0x12, 0x0e, 0x0a, 0x02, 0x69, 0x64, 0x18, 0x01,
|
0x07, 0x52, 0x65, 0x76, 0x65, 0x72, 0x73, 0x65, 0x12, 0x10, 0x0a, 0x03, 0x74, 0x61, 0x67, 0x18,
|
||||||
0x20, 0x01, 0x28, 0x09, 0x52, 0x02, 0x69, 0x64, 0x12, 0x12, 0x0a, 0x04, 0x66, 0x6c, 0x6f, 0x77,
|
0x01, 0x20, 0x01, 0x28, 0x09, 0x52, 0x03, 0x74, 0x61, 0x67, 0x22, 0xd0, 0x01, 0x0a, 0x07, 0x41,
|
||||||
0x18, 0x02, 0x20, 0x01, 0x28, 0x09, 0x52, 0x04, 0x66, 0x6c, 0x6f, 0x77, 0x12, 0x1e, 0x0a, 0x0a,
|
0x63, 0x63, 0x6f, 0x75, 0x6e, 0x74, 0x12, 0x0e, 0x0a, 0x02, 0x69, 0x64, 0x18, 0x01, 0x20, 0x01,
|
||||||
0x65, 0x6e, 0x63, 0x72, 0x79, 0x70, 0x74, 0x69, 0x6f, 0x6e, 0x18, 0x03, 0x20, 0x01, 0x28, 0x09,
|
0x28, 0x09, 0x52, 0x02, 0x69, 0x64, 0x12, 0x12, 0x0a, 0x04, 0x66, 0x6c, 0x6f, 0x77, 0x18, 0x02,
|
||||||
0x52, 0x0a, 0x65, 0x6e, 0x63, 0x72, 0x79, 0x70, 0x74, 0x69, 0x6f, 0x6e, 0x42, 0x52, 0x0a, 0x14,
|
0x20, 0x01, 0x28, 0x09, 0x52, 0x04, 0x66, 0x6c, 0x6f, 0x77, 0x12, 0x1e, 0x0a, 0x0a, 0x65, 0x6e,
|
||||||
0x63, 0x6f, 0x6d, 0x2e, 0x78, 0x72, 0x61, 0x79, 0x2e, 0x70, 0x72, 0x6f, 0x78, 0x79, 0x2e, 0x76,
|
0x63, 0x72, 0x79, 0x70, 0x74, 0x69, 0x6f, 0x6e, 0x18, 0x03, 0x20, 0x01, 0x28, 0x09, 0x52, 0x0a,
|
||||||
0x6c, 0x65, 0x73, 0x73, 0x50, 0x01, 0x5a, 0x25, 0x67, 0x69, 0x74, 0x68, 0x75, 0x62, 0x2e, 0x63,
|
0x65, 0x6e, 0x63, 0x72, 0x79, 0x70, 0x74, 0x69, 0x6f, 0x6e, 0x12, 0x18, 0x0a, 0x07, 0x78, 0x6f,
|
||||||
0x6f, 0x6d, 0x2f, 0x78, 0x74, 0x6c, 0x73, 0x2f, 0x78, 0x72, 0x61, 0x79, 0x2d, 0x63, 0x6f, 0x72,
|
0x72, 0x4d, 0x6f, 0x64, 0x65, 0x18, 0x04, 0x20, 0x01, 0x28, 0x0d, 0x52, 0x07, 0x78, 0x6f, 0x72,
|
||||||
0x65, 0x2f, 0x70, 0x72, 0x6f, 0x78, 0x79, 0x2f, 0x76, 0x6c, 0x65, 0x73, 0x73, 0xaa, 0x02, 0x10,
|
0x4d, 0x6f, 0x64, 0x65, 0x12, 0x18, 0x0a, 0x07, 0x73, 0x65, 0x63, 0x6f, 0x6e, 0x64, 0x73, 0x18,
|
||||||
0x58, 0x72, 0x61, 0x79, 0x2e, 0x50, 0x72, 0x6f, 0x78, 0x79, 0x2e, 0x56, 0x6c, 0x65, 0x73, 0x73,
|
0x05, 0x20, 0x01, 0x28, 0x0d, 0x52, 0x07, 0x73, 0x65, 0x63, 0x6f, 0x6e, 0x64, 0x73, 0x12, 0x18,
|
||||||
0x62, 0x06, 0x70, 0x72, 0x6f, 0x74, 0x6f, 0x33,
|
0x0a, 0x07, 0x70, 0x61, 0x64, 0x64, 0x69, 0x6e, 0x67, 0x18, 0x06, 0x20, 0x01, 0x28, 0x09, 0x52,
|
||||||
|
0x07, 0x70, 0x61, 0x64, 0x64, 0x69, 0x6e, 0x67, 0x12, 0x33, 0x0a, 0x07, 0x72, 0x65, 0x76, 0x65,
|
||||||
|
0x72, 0x73, 0x65, 0x18, 0x07, 0x20, 0x01, 0x28, 0x0b, 0x32, 0x19, 0x2e, 0x78, 0x72, 0x61, 0x79,
|
||||||
|
0x2e, 0x70, 0x72, 0x6f, 0x78, 0x79, 0x2e, 0x76, 0x6c, 0x65, 0x73, 0x73, 0x2e, 0x52, 0x65, 0x76,
|
||||||
|
0x65, 0x72, 0x73, 0x65, 0x52, 0x07, 0x72, 0x65, 0x76, 0x65, 0x72, 0x73, 0x65, 0x42, 0x52, 0x0a,
|
||||||
|
0x14, 0x63, 0x6f, 0x6d, 0x2e, 0x78, 0x72, 0x61, 0x79, 0x2e, 0x70, 0x72, 0x6f, 0x78, 0x79, 0x2e,
|
||||||
|
0x76, 0x6c, 0x65, 0x73, 0x73, 0x50, 0x01, 0x5a, 0x25, 0x67, 0x69, 0x74, 0x68, 0x75, 0x62, 0x2e,
|
||||||
|
0x63, 0x6f, 0x6d, 0x2f, 0x78, 0x74, 0x6c, 0x73, 0x2f, 0x78, 0x72, 0x61, 0x79, 0x2d, 0x63, 0x6f,
|
||||||
|
0x72, 0x65, 0x2f, 0x70, 0x72, 0x6f, 0x78, 0x79, 0x2f, 0x76, 0x6c, 0x65, 0x73, 0x73, 0xaa, 0x02,
|
||||||
|
0x10, 0x58, 0x72, 0x61, 0x79, 0x2e, 0x50, 0x72, 0x6f, 0x78, 0x79, 0x2e, 0x56, 0x6c, 0x65, 0x73,
|
||||||
|
0x73, 0x62, 0x06, 0x70, 0x72, 0x6f, 0x74, 0x6f, 0x33,
|
||||||
}
|
}
|
||||||
|
|
||||||
var (
|
var (
|
||||||
@@ -115,16 +201,18 @@ func file_proxy_vless_account_proto_rawDescGZIP() []byte {
|
|||||||
return file_proxy_vless_account_proto_rawDescData
|
return file_proxy_vless_account_proto_rawDescData
|
||||||
}
|
}
|
||||||
|
|
||||||
var file_proxy_vless_account_proto_msgTypes = make([]protoimpl.MessageInfo, 1)
|
var file_proxy_vless_account_proto_msgTypes = make([]protoimpl.MessageInfo, 2)
|
||||||
var file_proxy_vless_account_proto_goTypes = []any{
|
var file_proxy_vless_account_proto_goTypes = []any{
|
||||||
(*Account)(nil), // 0: xray.proxy.vless.Account
|
(*Reverse)(nil), // 0: xray.proxy.vless.Reverse
|
||||||
|
(*Account)(nil), // 1: xray.proxy.vless.Account
|
||||||
}
|
}
|
||||||
var file_proxy_vless_account_proto_depIdxs = []int32{
|
var file_proxy_vless_account_proto_depIdxs = []int32{
|
||||||
0, // [0:0] is the sub-list for method output_type
|
0, // 0: xray.proxy.vless.Account.reverse:type_name -> xray.proxy.vless.Reverse
|
||||||
0, // [0:0] is the sub-list for method input_type
|
1, // [1:1] is the sub-list for method output_type
|
||||||
0, // [0:0] is the sub-list for extension type_name
|
1, // [1:1] is the sub-list for method input_type
|
||||||
0, // [0:0] is the sub-list for extension extendee
|
1, // [1:1] is the sub-list for extension type_name
|
||||||
0, // [0:0] is the sub-list for field type_name
|
1, // [1:1] is the sub-list for extension extendee
|
||||||
|
0, // [0:1] is the sub-list for field type_name
|
||||||
}
|
}
|
||||||
|
|
||||||
func init() { file_proxy_vless_account_proto_init() }
|
func init() { file_proxy_vless_account_proto_init() }
|
||||||
@@ -138,7 +226,7 @@ func file_proxy_vless_account_proto_init() {
|
|||||||
GoPackagePath: reflect.TypeOf(x{}).PkgPath(),
|
GoPackagePath: reflect.TypeOf(x{}).PkgPath(),
|
||||||
RawDescriptor: file_proxy_vless_account_proto_rawDesc,
|
RawDescriptor: file_proxy_vless_account_proto_rawDesc,
|
||||||
NumEnums: 0,
|
NumEnums: 0,
|
||||||
NumMessages: 1,
|
NumMessages: 2,
|
||||||
NumExtensions: 0,
|
NumExtensions: 0,
|
||||||
NumServices: 0,
|
NumServices: 0,
|
||||||
},
|
},
|
||||||
|
|||||||
@@ -6,11 +6,20 @@ option go_package = "github.com/xtls/xray-core/proxy/vless";
|
|||||||
option java_package = "com.xray.proxy.vless";
|
option java_package = "com.xray.proxy.vless";
|
||||||
option java_multiple_files = true;
|
option java_multiple_files = true;
|
||||||
|
|
||||||
|
message Reverse {
|
||||||
|
string tag = 1;
|
||||||
|
}
|
||||||
|
|
||||||
message Account {
|
message Account {
|
||||||
// ID of the account, in the form of a UUID, e.g., "66ad4540-b58c-4ad2-9926-ea63445a9b57".
|
// ID of the account, in the form of a UUID, e.g., "66ad4540-b58c-4ad2-9926-ea63445a9b57".
|
||||||
string id = 1;
|
string id = 1;
|
||||||
// Flow settings. May be "xtls-rprx-vision".
|
// Flow settings. May be "xtls-rprx-vision".
|
||||||
string flow = 2;
|
string flow = 2;
|
||||||
// Encryption settings. Only applies to client side, and only accepts "none" for now.
|
|
||||||
string encryption = 3;
|
string encryption = 3;
|
||||||
|
uint32 xorMode = 4;
|
||||||
|
uint32 seconds = 5;
|
||||||
|
string padding = 6;
|
||||||
|
|
||||||
|
Reverse reverse = 7;
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -3,10 +3,12 @@ package encoding
|
|||||||
import (
|
import (
|
||||||
"context"
|
"context"
|
||||||
"io"
|
"io"
|
||||||
|
"net"
|
||||||
|
|
||||||
"github.com/xtls/xray-core/common/buf"
|
"github.com/xtls/xray-core/common/buf"
|
||||||
"github.com/xtls/xray-core/common/errors"
|
"github.com/xtls/xray-core/common/errors"
|
||||||
"github.com/xtls/xray-core/common/protocol"
|
"github.com/xtls/xray-core/common/protocol"
|
||||||
|
"github.com/xtls/xray-core/common/session"
|
||||||
"github.com/xtls/xray-core/proxy"
|
"github.com/xtls/xray-core/proxy"
|
||||||
"github.com/xtls/xray-core/proxy/vless"
|
"github.com/xtls/xray-core/proxy/vless"
|
||||||
"google.golang.org/protobuf/proto"
|
"google.golang.org/protobuf/proto"
|
||||||
@@ -61,15 +63,14 @@ func DecodeHeaderAddons(buffer *buf.Buffer, reader io.Reader) (*Addons, error) {
|
|||||||
}
|
}
|
||||||
|
|
||||||
// EncodeBodyAddons returns a Writer that auto-encrypt content written by caller.
|
// EncodeBodyAddons returns a Writer that auto-encrypt content written by caller.
|
||||||
func EncodeBodyAddons(writer io.Writer, request *protocol.RequestHeader, requestAddons *Addons, state *proxy.TrafficState, isUplink bool, context context.Context) buf.Writer {
|
func EncodeBodyAddons(writer buf.Writer, request *protocol.RequestHeader, requestAddons *Addons, state *proxy.TrafficState, isUplink bool, context context.Context, conn net.Conn, ob *session.Outbound) buf.Writer {
|
||||||
if request.Command == protocol.RequestCommandUDP {
|
if request.Command == protocol.RequestCommandUDP {
|
||||||
return NewMultiLengthPacketWriter(writer.(buf.Writer))
|
return NewMultiLengthPacketWriter(writer)
|
||||||
}
|
}
|
||||||
w := buf.NewWriter(writer)
|
|
||||||
if requestAddons.Flow == vless.XRV {
|
if requestAddons.Flow == vless.XRV {
|
||||||
w = proxy.NewVisionWriter(w, state, isUplink, context)
|
return proxy.NewVisionWriter(writer, state, isUplink, context, conn, ob)
|
||||||
}
|
}
|
||||||
return w
|
return writer
|
||||||
}
|
}
|
||||||
|
|
||||||
// DecodeBodyAddons returns a Reader from which caller can fetch decrypted body.
|
// DecodeBodyAddons returns a Reader from which caller can fetch decrypted body.
|
||||||
|
|||||||
@@ -1,7 +1,6 @@
|
|||||||
package encoding
|
package encoding
|
||||||
|
|
||||||
import (
|
import (
|
||||||
"bytes"
|
|
||||||
"context"
|
"context"
|
||||||
"io"
|
"io"
|
||||||
|
|
||||||
@@ -11,7 +10,6 @@ import (
|
|||||||
"github.com/xtls/xray-core/common/protocol"
|
"github.com/xtls/xray-core/common/protocol"
|
||||||
"github.com/xtls/xray-core/common/session"
|
"github.com/xtls/xray-core/common/session"
|
||||||
"github.com/xtls/xray-core/common/signal"
|
"github.com/xtls/xray-core/common/signal"
|
||||||
"github.com/xtls/xray-core/features/stats"
|
|
||||||
"github.com/xtls/xray-core/proxy"
|
"github.com/xtls/xray-core/proxy"
|
||||||
"github.com/xtls/xray-core/proxy/vless"
|
"github.com/xtls/xray-core/proxy/vless"
|
||||||
)
|
)
|
||||||
@@ -48,7 +46,7 @@ func EncodeRequestHeader(writer io.Writer, request *protocol.RequestHeader, requ
|
|||||||
return errors.New("failed to write request command").Base(err)
|
return errors.New("failed to write request command").Base(err)
|
||||||
}
|
}
|
||||||
|
|
||||||
if request.Command != protocol.RequestCommandMux {
|
if request.Command != protocol.RequestCommandMux && request.Command != protocol.RequestCommandRvs {
|
||||||
if err := addrParser.WriteAddressPort(&buffer, request.Address, request.Port); err != nil {
|
if err := addrParser.WriteAddressPort(&buffer, request.Address, request.Port); err != nil {
|
||||||
return errors.New("failed to write request address and port").Base(err)
|
return errors.New("failed to write request address and port").Base(err)
|
||||||
}
|
}
|
||||||
@@ -114,7 +112,8 @@ func DecodeRequestHeader(isfb bool, first *buf.Buffer, reader io.Reader, validat
|
|||||||
switch request.Command {
|
switch request.Command {
|
||||||
case protocol.RequestCommandMux:
|
case protocol.RequestCommandMux:
|
||||||
request.Address = net.DomainAddress("v1.mux.cool")
|
request.Address = net.DomainAddress("v1.mux.cool")
|
||||||
request.Port = 0
|
case protocol.RequestCommandRvs:
|
||||||
|
request.Address = net.DomainAddress("v1.rvs.cool")
|
||||||
case protocol.RequestCommandTCP, protocol.RequestCommandUDP:
|
case protocol.RequestCommandTCP, protocol.RequestCommandUDP:
|
||||||
if addr, port, err := addrParser.ReadAddressPort(&buffer, reader); err == nil {
|
if addr, port, err := addrParser.ReadAddressPort(&buffer, reader); err == nil {
|
||||||
request.Address = addr
|
request.Address = addr
|
||||||
@@ -171,8 +170,8 @@ func DecodeResponseHeader(reader io.Reader, request *protocol.RequestHeader) (*A
|
|||||||
return responseAddons, nil
|
return responseAddons, nil
|
||||||
}
|
}
|
||||||
|
|
||||||
// XtlsRead filter and read xtls protocol
|
// XtlsRead can switch to splice copy
|
||||||
func XtlsRead(reader buf.Reader, writer buf.Writer, timer *signal.ActivityTimer, conn net.Conn, input *bytes.Reader, rawInput *bytes.Buffer, trafficState *proxy.TrafficState, ob *session.Outbound, isUplink bool, ctx context.Context) error {
|
func XtlsRead(reader buf.Reader, writer buf.Writer, timer *signal.ActivityTimer, conn net.Conn, trafficState *proxy.TrafficState, isUplink bool, ctx context.Context) error {
|
||||||
err := func() error {
|
err := func() error {
|
||||||
for {
|
for {
|
||||||
if isUplink && trafficState.Inbound.UplinkReaderDirectCopy || !isUplink && trafficState.Outbound.DownlinkReaderDirectCopy {
|
if isUplink && trafficState.Inbound.UplinkReaderDirectCopy || !isUplink && trafficState.Outbound.DownlinkReaderDirectCopy {
|
||||||
@@ -181,74 +180,11 @@ func XtlsRead(reader buf.Reader, writer buf.Writer, timer *signal.ActivityTimer,
|
|||||||
if inbound := session.InboundFromContext(ctx); inbound != nil && inbound.Conn != nil {
|
if inbound := session.InboundFromContext(ctx); inbound != nil && inbound.Conn != nil {
|
||||||
writerConn = inbound.Conn
|
writerConn = inbound.Conn
|
||||||
inTimer = inbound.Timer
|
inTimer = inbound.Timer
|
||||||
if isUplink && inbound.CanSpliceCopy == 2 {
|
|
||||||
inbound.CanSpliceCopy = 1
|
|
||||||
}
|
|
||||||
if !isUplink && ob != nil && ob.CanSpliceCopy == 2 { // ob need to be passed in due to context can change
|
|
||||||
ob.CanSpliceCopy = 1
|
|
||||||
}
|
|
||||||
}
|
}
|
||||||
return proxy.CopyRawConnIfExist(ctx, conn, writerConn, writer, timer, inTimer)
|
return proxy.CopyRawConnIfExist(ctx, conn, writerConn, writer, timer, inTimer)
|
||||||
}
|
}
|
||||||
buffer, err := reader.ReadMultiBuffer()
|
buffer, err := reader.ReadMultiBuffer()
|
||||||
if !buffer.IsEmpty() {
|
if !buffer.IsEmpty() {
|
||||||
timer.Update()
|
|
||||||
if isUplink && trafficState.Inbound.UplinkReaderDirectCopy || !isUplink && trafficState.Outbound.DownlinkReaderDirectCopy {
|
|
||||||
// XTLS Vision processes struct TLS Conn's input and rawInput
|
|
||||||
if inputBuffer, err := buf.ReadFrom(input); err == nil {
|
|
||||||
if !inputBuffer.IsEmpty() {
|
|
||||||
buffer, _ = buf.MergeMulti(buffer, inputBuffer)
|
|
||||||
}
|
|
||||||
}
|
|
||||||
if rawInputBuffer, err := buf.ReadFrom(rawInput); err == nil {
|
|
||||||
if !rawInputBuffer.IsEmpty() {
|
|
||||||
buffer, _ = buf.MergeMulti(buffer, rawInputBuffer)
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
if werr := writer.WriteMultiBuffer(buffer); werr != nil {
|
|
||||||
return werr
|
|
||||||
}
|
|
||||||
}
|
|
||||||
if err != nil {
|
|
||||||
return err
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}()
|
|
||||||
if err != nil && errors.Cause(err) != io.EOF {
|
|
||||||
return err
|
|
||||||
}
|
|
||||||
return nil
|
|
||||||
}
|
|
||||||
|
|
||||||
// XtlsWrite filter and write xtls protocol
|
|
||||||
func XtlsWrite(reader buf.Reader, writer buf.Writer, timer signal.ActivityUpdater, conn net.Conn, trafficState *proxy.TrafficState, ob *session.Outbound, isUplink bool, ctx context.Context) error {
|
|
||||||
err := func() error {
|
|
||||||
var ct stats.Counter
|
|
||||||
for {
|
|
||||||
buffer, err := reader.ReadMultiBuffer()
|
|
||||||
if isUplink && trafficState.Outbound.UplinkWriterDirectCopy || !isUplink && trafficState.Inbound.DownlinkWriterDirectCopy {
|
|
||||||
if inbound := session.InboundFromContext(ctx); inbound != nil {
|
|
||||||
if !isUplink && inbound.CanSpliceCopy == 2 {
|
|
||||||
inbound.CanSpliceCopy = 1
|
|
||||||
}
|
|
||||||
if isUplink && ob != nil && ob.CanSpliceCopy == 2 {
|
|
||||||
ob.CanSpliceCopy = 1
|
|
||||||
}
|
|
||||||
}
|
|
||||||
rawConn, _, writerCounter := proxy.UnwrapRawConn(conn)
|
|
||||||
writer = buf.NewWriter(rawConn)
|
|
||||||
ct = writerCounter
|
|
||||||
if isUplink {
|
|
||||||
trafficState.Outbound.UplinkWriterDirectCopy = false
|
|
||||||
} else {
|
|
||||||
trafficState.Inbound.DownlinkWriterDirectCopy = false
|
|
||||||
}
|
|
||||||
}
|
|
||||||
if !buffer.IsEmpty() {
|
|
||||||
if ct != nil {
|
|
||||||
ct.Add(int64(buffer.Len()))
|
|
||||||
}
|
|
||||||
timer.Update()
|
timer.Update()
|
||||||
if werr := writer.WriteMultiBuffer(buffer); werr != nil {
|
if werr := writer.WriteMultiBuffer(buffer); werr != nil {
|
||||||
return werr
|
return werr
|
||||||
|
|||||||
210
proxy/vless/encryption/client.go
Normal file
210
proxy/vless/encryption/client.go
Normal file
@@ -0,0 +1,210 @@
|
|||||||
|
package encryption
|
||||||
|
|
||||||
|
import (
|
||||||
|
"crypto/cipher"
|
||||||
|
"crypto/ecdh"
|
||||||
|
"crypto/mlkem"
|
||||||
|
"crypto/rand"
|
||||||
|
"io"
|
||||||
|
"net"
|
||||||
|
"sync"
|
||||||
|
"time"
|
||||||
|
|
||||||
|
"github.com/xtls/xray-core/common/errors"
|
||||||
|
"github.com/xtls/xray-core/common/protocol"
|
||||||
|
"lukechampine.com/blake3"
|
||||||
|
)
|
||||||
|
|
||||||
|
type ClientInstance struct {
|
||||||
|
NfsPKeys []any
|
||||||
|
NfsPKeysBytes [][]byte
|
||||||
|
Hash32s [][32]byte
|
||||||
|
RelaysLength int
|
||||||
|
XorMode uint32
|
||||||
|
Seconds uint32
|
||||||
|
PaddingLens [][3]int
|
||||||
|
PaddingGaps [][3]int
|
||||||
|
|
||||||
|
RWLock sync.RWMutex
|
||||||
|
Expire time.Time
|
||||||
|
PfsKey []byte
|
||||||
|
Ticket []byte
|
||||||
|
}
|
||||||
|
|
||||||
|
func (i *ClientInstance) Init(nfsPKeysBytes [][]byte, xorMode, seconds uint32, padding string) (err error) {
|
||||||
|
if i.NfsPKeys != nil {
|
||||||
|
return errors.New("already initialized")
|
||||||
|
}
|
||||||
|
l := len(nfsPKeysBytes)
|
||||||
|
if l == 0 {
|
||||||
|
return errors.New("empty nfsPKeysBytes")
|
||||||
|
}
|
||||||
|
i.NfsPKeys = make([]any, l)
|
||||||
|
i.NfsPKeysBytes = nfsPKeysBytes
|
||||||
|
i.Hash32s = make([][32]byte, l)
|
||||||
|
for j, k := range nfsPKeysBytes {
|
||||||
|
if len(k) == 32 {
|
||||||
|
if i.NfsPKeys[j], err = ecdh.X25519().NewPublicKey(k); err != nil {
|
||||||
|
return
|
||||||
|
}
|
||||||
|
i.RelaysLength += 32 + 32
|
||||||
|
} else {
|
||||||
|
if i.NfsPKeys[j], err = mlkem.NewEncapsulationKey768(k); err != nil {
|
||||||
|
return
|
||||||
|
}
|
||||||
|
i.RelaysLength += 1088 + 32
|
||||||
|
}
|
||||||
|
i.Hash32s[j] = blake3.Sum256(k)
|
||||||
|
}
|
||||||
|
i.RelaysLength -= 32
|
||||||
|
i.XorMode = xorMode
|
||||||
|
i.Seconds = seconds
|
||||||
|
return ParsePadding(padding, &i.PaddingLens, &i.PaddingGaps)
|
||||||
|
}
|
||||||
|
|
||||||
|
func (i *ClientInstance) Handshake(conn net.Conn) (*CommonConn, error) {
|
||||||
|
if i.NfsPKeys == nil {
|
||||||
|
return nil, errors.New("uninitialized")
|
||||||
|
}
|
||||||
|
c := NewCommonConn(conn, protocol.HasAESGCMHardwareSupport)
|
||||||
|
|
||||||
|
ivAndRealysLength := 16 + i.RelaysLength
|
||||||
|
pfsKeyExchangeLength := 18 + 1184 + 32 + 16
|
||||||
|
paddingLength, paddingLens, paddingGaps := CreatPadding(i.PaddingLens, i.PaddingGaps)
|
||||||
|
clientHello := make([]byte, ivAndRealysLength+pfsKeyExchangeLength+paddingLength)
|
||||||
|
|
||||||
|
iv := clientHello[:16]
|
||||||
|
rand.Read(iv)
|
||||||
|
relays := clientHello[16:ivAndRealysLength]
|
||||||
|
var nfsKey []byte
|
||||||
|
var lastCTR cipher.Stream
|
||||||
|
for j, k := range i.NfsPKeys {
|
||||||
|
var index = 32
|
||||||
|
if k, ok := k.(*ecdh.PublicKey); ok {
|
||||||
|
privateKey, _ := ecdh.X25519().GenerateKey(rand.Reader)
|
||||||
|
copy(relays, privateKey.PublicKey().Bytes())
|
||||||
|
var err error
|
||||||
|
nfsKey, err = privateKey.ECDH(k)
|
||||||
|
if err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
}
|
||||||
|
if k, ok := k.(*mlkem.EncapsulationKey768); ok {
|
||||||
|
var ciphertext []byte
|
||||||
|
nfsKey, ciphertext = k.Encapsulate()
|
||||||
|
copy(relays, ciphertext)
|
||||||
|
index = 1088
|
||||||
|
}
|
||||||
|
if i.XorMode > 0 { // this xor can (others can't) be recovered by client's config, revealing an X25519 public key / ML-KEM-768 ciphertext, that's why "native" values
|
||||||
|
NewCTR(i.NfsPKeysBytes[j], iv).XORKeyStream(relays, relays[:index]) // make X25519 public key / ML-KEM-768 ciphertext distinguishable from random bytes
|
||||||
|
}
|
||||||
|
if lastCTR != nil {
|
||||||
|
lastCTR.XORKeyStream(relays, relays[:32]) // make this relay irreplaceable
|
||||||
|
}
|
||||||
|
if j == len(i.NfsPKeys)-1 {
|
||||||
|
break
|
||||||
|
}
|
||||||
|
lastCTR = NewCTR(nfsKey, iv)
|
||||||
|
lastCTR.XORKeyStream(relays[index:], i.Hash32s[j+1][:])
|
||||||
|
relays = relays[index+32:]
|
||||||
|
}
|
||||||
|
nfsAEAD := NewAEAD(iv, nfsKey, c.UseAES)
|
||||||
|
|
||||||
|
if i.Seconds > 0 {
|
||||||
|
i.RWLock.RLock()
|
||||||
|
if time.Now().Before(i.Expire) {
|
||||||
|
c.Client = i
|
||||||
|
c.UnitedKey = append(i.PfsKey, nfsKey...) // different unitedKey for each connection
|
||||||
|
nfsAEAD.Seal(clientHello[:ivAndRealysLength], nil, EncodeLength(32), nil)
|
||||||
|
nfsAEAD.Seal(clientHello[:ivAndRealysLength+18], nil, i.Ticket, nil)
|
||||||
|
i.RWLock.RUnlock()
|
||||||
|
c.PreWrite = clientHello[:ivAndRealysLength+18+32]
|
||||||
|
c.AEAD = NewAEAD(clientHello[ivAndRealysLength+18:ivAndRealysLength+18+32], c.UnitedKey, c.UseAES)
|
||||||
|
if i.XorMode == 2 {
|
||||||
|
c.Conn = NewXorConn(conn, NewCTR(c.UnitedKey, iv), nil, len(c.PreWrite), 16)
|
||||||
|
}
|
||||||
|
return c, nil
|
||||||
|
}
|
||||||
|
i.RWLock.RUnlock()
|
||||||
|
}
|
||||||
|
|
||||||
|
pfsKeyExchange := clientHello[ivAndRealysLength : ivAndRealysLength+pfsKeyExchangeLength]
|
||||||
|
nfsAEAD.Seal(pfsKeyExchange[:0], nil, EncodeLength(pfsKeyExchangeLength-18), nil)
|
||||||
|
mlkem768DKey, _ := mlkem.GenerateKey768()
|
||||||
|
x25519SKey, _ := ecdh.X25519().GenerateKey(rand.Reader)
|
||||||
|
pfsPublicKey := append(mlkem768DKey.EncapsulationKey().Bytes(), x25519SKey.PublicKey().Bytes()...)
|
||||||
|
nfsAEAD.Seal(pfsKeyExchange[:18], nil, pfsPublicKey, nil)
|
||||||
|
|
||||||
|
padding := clientHello[ivAndRealysLength+pfsKeyExchangeLength:]
|
||||||
|
nfsAEAD.Seal(padding[:0], nil, EncodeLength(paddingLength-18), nil)
|
||||||
|
nfsAEAD.Seal(padding[:18], nil, padding[18:paddingLength-16], nil)
|
||||||
|
|
||||||
|
paddingLens[0] = ivAndRealysLength + pfsKeyExchangeLength + paddingLens[0]
|
||||||
|
for i, l := range paddingLens { // sends padding in a fragmented way, to create variable traffic pattern, before inner VLESS flow takes control
|
||||||
|
if l > 0 {
|
||||||
|
if _, err := conn.Write(clientHello[:l]); err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
clientHello = clientHello[l:]
|
||||||
|
}
|
||||||
|
if len(paddingGaps) > i {
|
||||||
|
time.Sleep(paddingGaps[i])
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
encryptedPfsPublicKey := make([]byte, 1088+32+16)
|
||||||
|
if _, err := io.ReadFull(conn, encryptedPfsPublicKey); err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
nfsAEAD.Open(encryptedPfsPublicKey[:0], MaxNonce, encryptedPfsPublicKey, nil)
|
||||||
|
mlkem768Key, err := mlkem768DKey.Decapsulate(encryptedPfsPublicKey[:1088])
|
||||||
|
if err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
peerX25519PKey, err := ecdh.X25519().NewPublicKey(encryptedPfsPublicKey[1088 : 1088+32])
|
||||||
|
if err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
x25519Key, err := x25519SKey.ECDH(peerX25519PKey)
|
||||||
|
if err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
pfsKey := make([]byte, 32+32) // no more capacity
|
||||||
|
copy(pfsKey, mlkem768Key)
|
||||||
|
copy(pfsKey[32:], x25519Key)
|
||||||
|
c.UnitedKey = append(pfsKey, nfsKey...)
|
||||||
|
c.AEAD = NewAEAD(pfsPublicKey, c.UnitedKey, c.UseAES)
|
||||||
|
c.PeerAEAD = NewAEAD(encryptedPfsPublicKey[:1088+32], c.UnitedKey, c.UseAES)
|
||||||
|
|
||||||
|
encryptedTicket := make([]byte, 32)
|
||||||
|
if _, err := io.ReadFull(conn, encryptedTicket); err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
if _, err := c.PeerAEAD.Open(encryptedTicket[:0], nil, encryptedTicket, nil); err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
seconds := DecodeLength(encryptedTicket)
|
||||||
|
|
||||||
|
if i.Seconds > 0 && seconds > 0 {
|
||||||
|
i.RWLock.Lock()
|
||||||
|
i.Expire = time.Now().Add(time.Duration(seconds) * time.Second)
|
||||||
|
i.PfsKey = pfsKey
|
||||||
|
i.Ticket = encryptedTicket[:16]
|
||||||
|
i.RWLock.Unlock()
|
||||||
|
}
|
||||||
|
|
||||||
|
encryptedLength := make([]byte, 18)
|
||||||
|
if _, err := io.ReadFull(conn, encryptedLength); err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
if _, err := c.PeerAEAD.Open(encryptedLength[:0], nil, encryptedLength, nil); err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
length := DecodeLength(encryptedLength[:2])
|
||||||
|
c.PeerPadding = make([]byte, length) // important: allows server sends padding slowly, eliminating 1-RTT's traffic pattern
|
||||||
|
|
||||||
|
if i.XorMode == 2 {
|
||||||
|
c.Conn = NewXorConn(conn, NewCTR(c.UnitedKey, iv), NewCTR(c.UnitedKey, encryptedTicket[:16]), 0, length)
|
||||||
|
}
|
||||||
|
return c, nil
|
||||||
|
}
|
||||||
280
proxy/vless/encryption/common.go
Normal file
280
proxy/vless/encryption/common.go
Normal file
@@ -0,0 +1,280 @@
|
|||||||
|
package encryption
|
||||||
|
|
||||||
|
import (
|
||||||
|
"bytes"
|
||||||
|
"crypto/aes"
|
||||||
|
"crypto/cipher"
|
||||||
|
"fmt"
|
||||||
|
"io"
|
||||||
|
"net"
|
||||||
|
"strconv"
|
||||||
|
"strings"
|
||||||
|
"sync"
|
||||||
|
"time"
|
||||||
|
|
||||||
|
"github.com/xtls/xray-core/common/crypto"
|
||||||
|
"github.com/xtls/xray-core/common/errors"
|
||||||
|
"golang.org/x/crypto/chacha20poly1305"
|
||||||
|
"lukechampine.com/blake3"
|
||||||
|
)
|
||||||
|
|
||||||
|
var OutBytesPool = sync.Pool{
|
||||||
|
New: func() any {
|
||||||
|
return make([]byte, 5+8192+16)
|
||||||
|
},
|
||||||
|
}
|
||||||
|
|
||||||
|
type CommonConn struct {
|
||||||
|
net.Conn
|
||||||
|
UseAES bool
|
||||||
|
Client *ClientInstance
|
||||||
|
UnitedKey []byte
|
||||||
|
PreWrite []byte
|
||||||
|
AEAD *AEAD
|
||||||
|
PeerAEAD *AEAD
|
||||||
|
PeerPadding []byte
|
||||||
|
rawInput bytes.Buffer
|
||||||
|
input bytes.Reader
|
||||||
|
}
|
||||||
|
|
||||||
|
func NewCommonConn(conn net.Conn, useAES bool) *CommonConn {
|
||||||
|
return &CommonConn{
|
||||||
|
Conn: conn,
|
||||||
|
UseAES: useAES,
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func (c *CommonConn) Write(b []byte) (int, error) {
|
||||||
|
if len(b) == 0 {
|
||||||
|
return 0, nil
|
||||||
|
}
|
||||||
|
outBytes := OutBytesPool.Get().([]byte)
|
||||||
|
defer OutBytesPool.Put(outBytes)
|
||||||
|
for n := 0; n < len(b); {
|
||||||
|
b := b[n:]
|
||||||
|
if len(b) > 8192 {
|
||||||
|
b = b[:8192] // for avoiding another copy() in peer's Read()
|
||||||
|
}
|
||||||
|
n += len(b)
|
||||||
|
headerAndData := outBytes[:5+len(b)+16]
|
||||||
|
EncodeHeader(headerAndData, len(b)+16)
|
||||||
|
max := false
|
||||||
|
if bytes.Equal(c.AEAD.Nonce[:], MaxNonce) {
|
||||||
|
max = true
|
||||||
|
}
|
||||||
|
c.AEAD.Seal(headerAndData[:5], nil, b, headerAndData[:5])
|
||||||
|
if max {
|
||||||
|
c.AEAD = NewAEAD(headerAndData, c.UnitedKey, c.UseAES)
|
||||||
|
}
|
||||||
|
if c.PreWrite != nil {
|
||||||
|
headerAndData = append(c.PreWrite, headerAndData...)
|
||||||
|
c.PreWrite = nil
|
||||||
|
}
|
||||||
|
if _, err := c.Conn.Write(headerAndData); err != nil {
|
||||||
|
return 0, err
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return len(b), nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func (c *CommonConn) Read(b []byte) (int, error) {
|
||||||
|
if len(b) == 0 {
|
||||||
|
return 0, nil
|
||||||
|
}
|
||||||
|
if c.PeerAEAD == nil { // client's 0-RTT
|
||||||
|
serverRandom := make([]byte, 16)
|
||||||
|
if _, err := io.ReadFull(c.Conn, serverRandom); err != nil {
|
||||||
|
return 0, err
|
||||||
|
}
|
||||||
|
c.PeerAEAD = NewAEAD(serverRandom, c.UnitedKey, c.UseAES)
|
||||||
|
if xorConn, ok := c.Conn.(*XorConn); ok {
|
||||||
|
xorConn.PeerCTR = NewCTR(c.UnitedKey, serverRandom)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
if c.PeerPadding != nil { // client's 1-RTT
|
||||||
|
if _, err := io.ReadFull(c.Conn, c.PeerPadding); err != nil {
|
||||||
|
return 0, err
|
||||||
|
}
|
||||||
|
if _, err := c.PeerAEAD.Open(c.PeerPadding[:0], nil, c.PeerPadding, nil); err != nil {
|
||||||
|
return 0, err
|
||||||
|
}
|
||||||
|
c.PeerPadding = nil
|
||||||
|
}
|
||||||
|
if c.input.Len() > 0 {
|
||||||
|
return c.input.Read(b)
|
||||||
|
}
|
||||||
|
peerHeader := [5]byte{}
|
||||||
|
if _, err := io.ReadFull(c.Conn, peerHeader[:]); err != nil {
|
||||||
|
return 0, err
|
||||||
|
}
|
||||||
|
l, err := DecodeHeader(peerHeader[:]) // l: 17~17000
|
||||||
|
if err != nil {
|
||||||
|
if c.Client != nil && strings.Contains(err.Error(), "invalid header: ") { // client's 0-RTT
|
||||||
|
c.Client.RWLock.Lock()
|
||||||
|
if bytes.HasPrefix(c.UnitedKey, c.Client.PfsKey) {
|
||||||
|
c.Client.Expire = time.Now() // expired
|
||||||
|
}
|
||||||
|
c.Client.RWLock.Unlock()
|
||||||
|
return 0, errors.New("new handshake needed")
|
||||||
|
}
|
||||||
|
return 0, err
|
||||||
|
}
|
||||||
|
c.Client = nil
|
||||||
|
if c.rawInput.Cap() < l {
|
||||||
|
c.rawInput.Grow(l) // no need to use sync.Pool, because we are always reading
|
||||||
|
}
|
||||||
|
peerData := c.rawInput.Bytes()[:l]
|
||||||
|
if _, err := io.ReadFull(c.Conn, peerData); err != nil {
|
||||||
|
return 0, err
|
||||||
|
}
|
||||||
|
dst := peerData[:l-16]
|
||||||
|
if len(dst) <= len(b) {
|
||||||
|
dst = b[:len(dst)] // avoids another copy()
|
||||||
|
}
|
||||||
|
var newAEAD *AEAD
|
||||||
|
if bytes.Equal(c.PeerAEAD.Nonce[:], MaxNonce) {
|
||||||
|
newAEAD = NewAEAD(append(peerHeader[:], peerData...), c.UnitedKey, c.UseAES)
|
||||||
|
}
|
||||||
|
_, err = c.PeerAEAD.Open(dst[:0], nil, peerData, peerHeader[:])
|
||||||
|
if newAEAD != nil {
|
||||||
|
c.PeerAEAD = newAEAD
|
||||||
|
}
|
||||||
|
if err != nil {
|
||||||
|
return 0, err
|
||||||
|
}
|
||||||
|
if len(dst) > len(b) {
|
||||||
|
c.input.Reset(dst[copy(b, dst):])
|
||||||
|
dst = b // for len(dst)
|
||||||
|
}
|
||||||
|
return len(dst), nil
|
||||||
|
}
|
||||||
|
|
||||||
|
type AEAD struct {
|
||||||
|
cipher.AEAD
|
||||||
|
Nonce [12]byte
|
||||||
|
}
|
||||||
|
|
||||||
|
func NewAEAD(ctx, key []byte, useAES bool) *AEAD {
|
||||||
|
k := make([]byte, 32)
|
||||||
|
blake3.DeriveKey(k, string(ctx), key)
|
||||||
|
var aead cipher.AEAD
|
||||||
|
if useAES {
|
||||||
|
block, _ := aes.NewCipher(k)
|
||||||
|
aead, _ = cipher.NewGCM(block)
|
||||||
|
} else {
|
||||||
|
aead, _ = chacha20poly1305.New(k)
|
||||||
|
}
|
||||||
|
return &AEAD{AEAD: aead}
|
||||||
|
}
|
||||||
|
|
||||||
|
func (a *AEAD) Seal(dst, nonce, plaintext, additionalData []byte) []byte {
|
||||||
|
if nonce == nil {
|
||||||
|
nonce = IncreaseNonce(a.Nonce[:])
|
||||||
|
}
|
||||||
|
return a.AEAD.Seal(dst, nonce, plaintext, additionalData)
|
||||||
|
}
|
||||||
|
|
||||||
|
func (a *AEAD) Open(dst, nonce, ciphertext, additionalData []byte) ([]byte, error) {
|
||||||
|
if nonce == nil {
|
||||||
|
nonce = IncreaseNonce(a.Nonce[:])
|
||||||
|
}
|
||||||
|
return a.AEAD.Open(dst, nonce, ciphertext, additionalData)
|
||||||
|
}
|
||||||
|
|
||||||
|
func IncreaseNonce(nonce []byte) []byte {
|
||||||
|
for i := range 12 {
|
||||||
|
nonce[11-i]++
|
||||||
|
if nonce[11-i] != 0 {
|
||||||
|
break
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return nonce
|
||||||
|
}
|
||||||
|
|
||||||
|
var MaxNonce = bytes.Repeat([]byte{255}, 12)
|
||||||
|
|
||||||
|
func EncodeLength(l int) []byte {
|
||||||
|
return []byte{byte(l >> 8), byte(l)}
|
||||||
|
}
|
||||||
|
|
||||||
|
func DecodeLength(b []byte) int {
|
||||||
|
return int(b[0])<<8 | int(b[1])
|
||||||
|
}
|
||||||
|
|
||||||
|
func EncodeHeader(h []byte, l int) {
|
||||||
|
h[0] = 23
|
||||||
|
h[1] = 3
|
||||||
|
h[2] = 3
|
||||||
|
h[3] = byte(l >> 8)
|
||||||
|
h[4] = byte(l)
|
||||||
|
}
|
||||||
|
|
||||||
|
func DecodeHeader(h []byte) (l int, err error) {
|
||||||
|
l = int(h[3])<<8 | int(h[4])
|
||||||
|
if h[0] != 23 || h[1] != 3 || h[2] != 3 {
|
||||||
|
l = 0
|
||||||
|
}
|
||||||
|
if l < 17 || l > 17000 { // TODO: TLSv1.3 max length
|
||||||
|
err = errors.New("invalid header: " + fmt.Sprintf("%v", h[:5])) // DO NOT CHANGE: relied by client's Read()
|
||||||
|
}
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
func ParsePadding(padding string, paddingLens, paddingGaps *[][3]int) (err error) {
|
||||||
|
if padding == "" {
|
||||||
|
return
|
||||||
|
}
|
||||||
|
maxLen := 0
|
||||||
|
for i, s := range strings.Split(padding, ".") {
|
||||||
|
x := strings.Split(s, "-")
|
||||||
|
if len(x) < 3 || x[0] == "" || x[1] == "" || x[2] == "" {
|
||||||
|
return errors.New("invalid padding lenth/gap parameter: " + s)
|
||||||
|
}
|
||||||
|
y := [3]int{}
|
||||||
|
if y[0], err = strconv.Atoi(x[0]); err != nil {
|
||||||
|
return
|
||||||
|
}
|
||||||
|
if y[1], err = strconv.Atoi(x[1]); err != nil {
|
||||||
|
return
|
||||||
|
}
|
||||||
|
if y[2], err = strconv.Atoi(x[2]); err != nil {
|
||||||
|
return
|
||||||
|
}
|
||||||
|
if i == 0 && (y[0] < 100 || y[1] < 18+17 || y[2] < 18+17) {
|
||||||
|
return errors.New("first padding length must not be smaller than 35")
|
||||||
|
}
|
||||||
|
if i%2 == 0 {
|
||||||
|
*paddingLens = append(*paddingLens, y)
|
||||||
|
maxLen += max(y[1], y[2])
|
||||||
|
} else {
|
||||||
|
*paddingGaps = append(*paddingGaps, y)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
if maxLen > 18+65535 {
|
||||||
|
return errors.New("total padding length must not be larger than 65553")
|
||||||
|
}
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
func CreatPadding(paddingLens, paddingGaps [][3]int) (length int, lens []int, gaps []time.Duration) {
|
||||||
|
if len(paddingLens) == 0 {
|
||||||
|
paddingLens = [][3]int{{100, 111, 1111}, {50, 0, 3333}}
|
||||||
|
paddingGaps = [][3]int{{75, 0, 111}}
|
||||||
|
}
|
||||||
|
for _, y := range paddingLens {
|
||||||
|
l := 0
|
||||||
|
if y[0] >= int(crypto.RandBetween(0, 100)) {
|
||||||
|
l = int(crypto.RandBetween(int64(y[1]), int64(y[2])))
|
||||||
|
}
|
||||||
|
lens = append(lens, l)
|
||||||
|
length += l
|
||||||
|
}
|
||||||
|
for _, y := range paddingGaps {
|
||||||
|
g := 0
|
||||||
|
if y[0] >= int(crypto.RandBetween(0, 100)) {
|
||||||
|
g = int(crypto.RandBetween(int64(y[1]), int64(y[2])))
|
||||||
|
}
|
||||||
|
gaps = append(gaps, time.Duration(g)*time.Millisecond)
|
||||||
|
}
|
||||||
|
return
|
||||||
|
}
|
||||||
328
proxy/vless/encryption/server.go
Normal file
328
proxy/vless/encryption/server.go
Normal file
@@ -0,0 +1,328 @@
|
|||||||
|
package encryption
|
||||||
|
|
||||||
|
import (
|
||||||
|
"bytes"
|
||||||
|
"crypto/cipher"
|
||||||
|
"crypto/ecdh"
|
||||||
|
"crypto/mlkem"
|
||||||
|
"crypto/rand"
|
||||||
|
"fmt"
|
||||||
|
"io"
|
||||||
|
"net"
|
||||||
|
"sync"
|
||||||
|
"time"
|
||||||
|
|
||||||
|
"github.com/xtls/xray-core/common/crypto"
|
||||||
|
"github.com/xtls/xray-core/common/errors"
|
||||||
|
"lukechampine.com/blake3"
|
||||||
|
)
|
||||||
|
|
||||||
|
type ServerSession struct {
|
||||||
|
PfsKey []byte
|
||||||
|
NfsKeys sync.Map
|
||||||
|
}
|
||||||
|
|
||||||
|
type ServerInstance struct {
|
||||||
|
NfsSKeys []any
|
||||||
|
NfsPKeysBytes [][]byte
|
||||||
|
Hash32s [][32]byte
|
||||||
|
RelaysLength int
|
||||||
|
XorMode uint32
|
||||||
|
SecondsFrom int64
|
||||||
|
SecondsTo int64
|
||||||
|
PaddingLens [][3]int
|
||||||
|
PaddingGaps [][3]int
|
||||||
|
|
||||||
|
RWLock sync.RWMutex
|
||||||
|
Closed bool
|
||||||
|
Lasts map[int64][16]byte
|
||||||
|
Tickets [][16]byte
|
||||||
|
Sessions map[[16]byte]*ServerSession
|
||||||
|
}
|
||||||
|
|
||||||
|
func (i *ServerInstance) Init(nfsSKeysBytes [][]byte, xorMode uint32, secondsFrom, secondsTo int64, padding string) (err error) {
|
||||||
|
if i.NfsSKeys != nil {
|
||||||
|
return errors.New("already initialized")
|
||||||
|
}
|
||||||
|
l := len(nfsSKeysBytes)
|
||||||
|
if l == 0 {
|
||||||
|
return errors.New("empty nfsSKeysBytes")
|
||||||
|
}
|
||||||
|
i.NfsSKeys = make([]any, l)
|
||||||
|
i.NfsPKeysBytes = make([][]byte, l)
|
||||||
|
i.Hash32s = make([][32]byte, l)
|
||||||
|
for j, k := range nfsSKeysBytes {
|
||||||
|
if len(k) == 32 {
|
||||||
|
if i.NfsSKeys[j], err = ecdh.X25519().NewPrivateKey(k); err != nil {
|
||||||
|
return
|
||||||
|
}
|
||||||
|
i.NfsPKeysBytes[j] = i.NfsSKeys[j].(*ecdh.PrivateKey).PublicKey().Bytes()
|
||||||
|
i.RelaysLength += 32 + 32
|
||||||
|
} else {
|
||||||
|
if i.NfsSKeys[j], err = mlkem.NewDecapsulationKey768(k); err != nil {
|
||||||
|
return
|
||||||
|
}
|
||||||
|
i.NfsPKeysBytes[j] = i.NfsSKeys[j].(*mlkem.DecapsulationKey768).EncapsulationKey().Bytes()
|
||||||
|
i.RelaysLength += 1088 + 32
|
||||||
|
}
|
||||||
|
i.Hash32s[j] = blake3.Sum256(i.NfsPKeysBytes[j])
|
||||||
|
}
|
||||||
|
i.RelaysLength -= 32
|
||||||
|
i.XorMode = xorMode
|
||||||
|
i.SecondsFrom = secondsFrom
|
||||||
|
i.SecondsTo = secondsTo
|
||||||
|
err = ParsePadding(padding, &i.PaddingLens, &i.PaddingGaps)
|
||||||
|
if err != nil {
|
||||||
|
return
|
||||||
|
}
|
||||||
|
if i.SecondsFrom > 0 || i.SecondsTo > 0 {
|
||||||
|
i.Lasts = make(map[int64][16]byte)
|
||||||
|
i.Tickets = make([][16]byte, 0, 1024)
|
||||||
|
i.Sessions = make(map[[16]byte]*ServerSession)
|
||||||
|
go func() {
|
||||||
|
for {
|
||||||
|
time.Sleep(time.Minute)
|
||||||
|
i.RWLock.Lock()
|
||||||
|
if i.Closed {
|
||||||
|
i.RWLock.Unlock()
|
||||||
|
return
|
||||||
|
}
|
||||||
|
minute := time.Now().Unix() / 60
|
||||||
|
last := i.Lasts[minute]
|
||||||
|
delete(i.Lasts, minute)
|
||||||
|
delete(i.Lasts, minute-1) // for insurance
|
||||||
|
if last != [16]byte{} {
|
||||||
|
for j, ticket := range i.Tickets {
|
||||||
|
delete(i.Sessions, ticket)
|
||||||
|
if ticket == last {
|
||||||
|
i.Tickets = i.Tickets[j+1:]
|
||||||
|
break
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
i.RWLock.Unlock()
|
||||||
|
}
|
||||||
|
}()
|
||||||
|
}
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
func (i *ServerInstance) Close() (err error) {
|
||||||
|
i.RWLock.Lock()
|
||||||
|
i.Closed = true
|
||||||
|
i.RWLock.Unlock()
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
func (i *ServerInstance) Handshake(conn net.Conn, fallback *[]byte) (*CommonConn, error) {
|
||||||
|
if i.NfsSKeys == nil {
|
||||||
|
return nil, errors.New("uninitialized")
|
||||||
|
}
|
||||||
|
c := NewCommonConn(conn, true)
|
||||||
|
|
||||||
|
ivAndRelays := make([]byte, 16+i.RelaysLength)
|
||||||
|
if _, err := io.ReadFull(conn, ivAndRelays); err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
if fallback != nil {
|
||||||
|
*fallback = append(*fallback, ivAndRelays...)
|
||||||
|
}
|
||||||
|
iv := ivAndRelays[:16]
|
||||||
|
relays := ivAndRelays[16:]
|
||||||
|
var nfsKey []byte
|
||||||
|
var lastCTR cipher.Stream
|
||||||
|
for j, k := range i.NfsSKeys {
|
||||||
|
if lastCTR != nil {
|
||||||
|
lastCTR.XORKeyStream(relays, relays[:32]) // recover this relay
|
||||||
|
}
|
||||||
|
var index = 32
|
||||||
|
if _, ok := k.(*mlkem.DecapsulationKey768); ok {
|
||||||
|
index = 1088
|
||||||
|
}
|
||||||
|
if i.XorMode > 0 {
|
||||||
|
NewCTR(i.NfsPKeysBytes[j], iv).XORKeyStream(relays, relays[:index]) // we don't use buggy elligator2, because we have PSK :)
|
||||||
|
}
|
||||||
|
if k, ok := k.(*ecdh.PrivateKey); ok {
|
||||||
|
publicKey, err := ecdh.X25519().NewPublicKey(relays[:index])
|
||||||
|
if err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
if publicKey.Bytes()[31] > 127 { // we just don't want the observer can change even one bit without breaking the connection, though it has nothing to do with security
|
||||||
|
return nil, errors.New("the highest bit of the last byte of the peer-sent X25519 public key is not 0")
|
||||||
|
}
|
||||||
|
nfsKey, err = k.ECDH(publicKey)
|
||||||
|
if err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
}
|
||||||
|
if k, ok := k.(*mlkem.DecapsulationKey768); ok {
|
||||||
|
var err error
|
||||||
|
nfsKey, err = k.Decapsulate(relays[:index])
|
||||||
|
if err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
}
|
||||||
|
if j == len(i.NfsSKeys)-1 {
|
||||||
|
break
|
||||||
|
}
|
||||||
|
relays = relays[index:]
|
||||||
|
lastCTR = NewCTR(nfsKey, iv)
|
||||||
|
lastCTR.XORKeyStream(relays, relays[:32])
|
||||||
|
if !bytes.Equal(relays[:32], i.Hash32s[j+1][:]) {
|
||||||
|
return nil, errors.New("unexpected hash32: ", fmt.Sprintf("%v", relays[:32]))
|
||||||
|
}
|
||||||
|
relays = relays[32:]
|
||||||
|
}
|
||||||
|
nfsAEAD := NewAEAD(iv, nfsKey, c.UseAES)
|
||||||
|
|
||||||
|
encryptedLength := make([]byte, 18)
|
||||||
|
if _, err := io.ReadFull(conn, encryptedLength); err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
if fallback != nil {
|
||||||
|
*fallback = append(*fallback, encryptedLength...)
|
||||||
|
}
|
||||||
|
decryptedLength := make([]byte, 2)
|
||||||
|
if _, err := nfsAEAD.Open(decryptedLength[:0], nil, encryptedLength, nil); err != nil {
|
||||||
|
c.UseAES = !c.UseAES
|
||||||
|
nfsAEAD = NewAEAD(iv, nfsKey, c.UseAES)
|
||||||
|
if _, err := nfsAEAD.Open(decryptedLength[:0], nil, encryptedLength, nil); err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
}
|
||||||
|
if fallback != nil {
|
||||||
|
*fallback = nil
|
||||||
|
}
|
||||||
|
length := DecodeLength(decryptedLength)
|
||||||
|
|
||||||
|
if length == 32 {
|
||||||
|
if i.SecondsFrom == 0 && i.SecondsTo == 0 {
|
||||||
|
return nil, errors.New("0-RTT is not allowed")
|
||||||
|
}
|
||||||
|
encryptedTicket := make([]byte, 32)
|
||||||
|
if _, err := io.ReadFull(conn, encryptedTicket); err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
ticket, err := nfsAEAD.Open(nil, nil, encryptedTicket, nil)
|
||||||
|
if err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
i.RWLock.RLock()
|
||||||
|
s := i.Sessions[[16]byte(ticket)]
|
||||||
|
i.RWLock.RUnlock()
|
||||||
|
if s == nil {
|
||||||
|
noises := make([]byte, crypto.RandBetween(1279, 2279)) // matches 1-RTT's server hello length for "random", though it is not important, just for example
|
||||||
|
var err error
|
||||||
|
for err == nil {
|
||||||
|
rand.Read(noises)
|
||||||
|
_, err = DecodeHeader(noises)
|
||||||
|
}
|
||||||
|
conn.Write(noises) // make client do new handshake
|
||||||
|
return nil, errors.New("expired ticket")
|
||||||
|
}
|
||||||
|
if _, loaded := s.NfsKeys.LoadOrStore([32]byte(nfsKey), true); loaded { // prevents bad client also
|
||||||
|
return nil, errors.New("replay detected")
|
||||||
|
}
|
||||||
|
c.UnitedKey = append(s.PfsKey, nfsKey...) // the same nfsKey links the upload & download (prevents server -> client's another request)
|
||||||
|
c.PreWrite = make([]byte, 16)
|
||||||
|
rand.Read(c.PreWrite) // always trust yourself, not the client (also prevents being parsed as TLS thus causing false interruption for "native" and "xorpub")
|
||||||
|
c.AEAD = NewAEAD(c.PreWrite, c.UnitedKey, c.UseAES)
|
||||||
|
c.PeerAEAD = NewAEAD(encryptedTicket, c.UnitedKey, c.UseAES) // unchangeable ctx (prevents server -> server), and different ctx length for upload / download (prevents client -> client)
|
||||||
|
if i.XorMode == 2 {
|
||||||
|
c.Conn = NewXorConn(conn, NewCTR(c.UnitedKey, c.PreWrite), NewCTR(c.UnitedKey, iv), 16, 0) // it doesn't matter if the attacker sends client's iv back to the client
|
||||||
|
}
|
||||||
|
return c, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
if length < 1184+32+16 { // client may send more public keys in the future's version
|
||||||
|
return nil, errors.New("too short length")
|
||||||
|
}
|
||||||
|
encryptedPfsPublicKey := make([]byte, length)
|
||||||
|
if _, err := io.ReadFull(conn, encryptedPfsPublicKey); err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
if _, err := nfsAEAD.Open(encryptedPfsPublicKey[:0], nil, encryptedPfsPublicKey, nil); err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
mlkem768EKey, err := mlkem.NewEncapsulationKey768(encryptedPfsPublicKey[:1184])
|
||||||
|
if err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
mlkem768Key, encapsulatedPfsKey := mlkem768EKey.Encapsulate()
|
||||||
|
peerX25519PKey, err := ecdh.X25519().NewPublicKey(encryptedPfsPublicKey[1184 : 1184+32])
|
||||||
|
if err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
x25519SKey, _ := ecdh.X25519().GenerateKey(rand.Reader)
|
||||||
|
x25519Key, err := x25519SKey.ECDH(peerX25519PKey)
|
||||||
|
if err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
pfsKey := make([]byte, 32+32) // no more capacity
|
||||||
|
copy(pfsKey, mlkem768Key)
|
||||||
|
copy(pfsKey[32:], x25519Key)
|
||||||
|
pfsPublicKey := append(encapsulatedPfsKey, x25519SKey.PublicKey().Bytes()...)
|
||||||
|
c.UnitedKey = append(pfsKey, nfsKey...)
|
||||||
|
c.AEAD = NewAEAD(pfsPublicKey, c.UnitedKey, c.UseAES)
|
||||||
|
c.PeerAEAD = NewAEAD(encryptedPfsPublicKey[:1184+32], c.UnitedKey, c.UseAES)
|
||||||
|
|
||||||
|
ticket := [16]byte{}
|
||||||
|
rand.Read(ticket[:])
|
||||||
|
var seconds int64
|
||||||
|
if i.SecondsTo == 0 {
|
||||||
|
seconds = i.SecondsFrom * crypto.RandBetween(50, 100) / 100
|
||||||
|
} else {
|
||||||
|
seconds = crypto.RandBetween(i.SecondsFrom, i.SecondsTo)
|
||||||
|
}
|
||||||
|
copy(ticket[:], EncodeLength(int(seconds)))
|
||||||
|
if seconds > 0 {
|
||||||
|
i.RWLock.Lock()
|
||||||
|
i.Lasts[(time.Now().Unix()+max(i.SecondsFrom, i.SecondsTo))/60+2] = ticket
|
||||||
|
i.Tickets = append(i.Tickets, ticket)
|
||||||
|
i.Sessions[ticket] = &ServerSession{PfsKey: pfsKey}
|
||||||
|
i.RWLock.Unlock()
|
||||||
|
}
|
||||||
|
|
||||||
|
pfsKeyExchangeLength := 1088 + 32 + 16
|
||||||
|
encryptedTicketLength := 32
|
||||||
|
paddingLength, paddingLens, paddingGaps := CreatPadding(i.PaddingLens, i.PaddingGaps)
|
||||||
|
serverHello := make([]byte, pfsKeyExchangeLength+encryptedTicketLength+paddingLength)
|
||||||
|
nfsAEAD.Seal(serverHello[:0], MaxNonce, pfsPublicKey, nil)
|
||||||
|
c.AEAD.Seal(serverHello[:pfsKeyExchangeLength], nil, ticket[:], nil)
|
||||||
|
padding := serverHello[pfsKeyExchangeLength+encryptedTicketLength:]
|
||||||
|
c.AEAD.Seal(padding[:0], nil, EncodeLength(paddingLength-18), nil)
|
||||||
|
c.AEAD.Seal(padding[:18], nil, padding[18:paddingLength-16], nil)
|
||||||
|
|
||||||
|
paddingLens[0] = pfsKeyExchangeLength + encryptedTicketLength + paddingLens[0]
|
||||||
|
for i, l := range paddingLens { // sends padding in a fragmented way, to create variable traffic pattern, before inner VLESS flow takes control
|
||||||
|
if l > 0 {
|
||||||
|
if _, err := conn.Write(serverHello[:l]); err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
serverHello = serverHello[l:]
|
||||||
|
}
|
||||||
|
if len(paddingGaps) > i {
|
||||||
|
time.Sleep(paddingGaps[i])
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
// important: allows client sends padding slowly, eliminating 1-RTT's traffic pattern
|
||||||
|
if _, err := io.ReadFull(conn, encryptedLength); err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
if _, err := nfsAEAD.Open(encryptedLength[:0], nil, encryptedLength, nil); err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
encryptedPadding := make([]byte, DecodeLength(encryptedLength[:2]))
|
||||||
|
if _, err := io.ReadFull(conn, encryptedPadding); err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
if _, err := nfsAEAD.Open(encryptedPadding[:0], nil, encryptedPadding, nil); err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
|
||||||
|
if i.XorMode == 2 {
|
||||||
|
c.Conn = NewXorConn(conn, NewCTR(c.UnitedKey, ticket[:]), NewCTR(c.UnitedKey, iv), 0, 0)
|
||||||
|
}
|
||||||
|
return c, nil
|
||||||
|
}
|
||||||
93
proxy/vless/encryption/xor.go
Normal file
93
proxy/vless/encryption/xor.go
Normal file
@@ -0,0 +1,93 @@
|
|||||||
|
package encryption
|
||||||
|
|
||||||
|
import (
|
||||||
|
"crypto/aes"
|
||||||
|
"crypto/cipher"
|
||||||
|
"net"
|
||||||
|
|
||||||
|
"lukechampine.com/blake3"
|
||||||
|
)
|
||||||
|
|
||||||
|
func NewCTR(key, iv []byte) cipher.Stream {
|
||||||
|
k := make([]byte, 32)
|
||||||
|
blake3.DeriveKey(k, "VLESS", key) // avoids using key directly
|
||||||
|
block, _ := aes.NewCipher(k)
|
||||||
|
return cipher.NewCTR(block, iv)
|
||||||
|
//chacha20.NewUnauthenticatedCipher()
|
||||||
|
}
|
||||||
|
|
||||||
|
type XorConn struct {
|
||||||
|
net.Conn
|
||||||
|
CTR cipher.Stream
|
||||||
|
PeerCTR cipher.Stream
|
||||||
|
OutSkip int
|
||||||
|
OutHeader []byte
|
||||||
|
InSkip int
|
||||||
|
InHeader []byte
|
||||||
|
}
|
||||||
|
|
||||||
|
func NewXorConn(conn net.Conn, ctr, peerCTR cipher.Stream, outSkip, inSkip int) *XorConn {
|
||||||
|
return &XorConn{
|
||||||
|
Conn: conn,
|
||||||
|
CTR: ctr,
|
||||||
|
PeerCTR: peerCTR,
|
||||||
|
OutSkip: outSkip,
|
||||||
|
OutHeader: make([]byte, 0, 5), // important
|
||||||
|
InSkip: inSkip,
|
||||||
|
InHeader: make([]byte, 0, 5), // important
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func (c *XorConn) Write(b []byte) (int, error) {
|
||||||
|
if len(b) == 0 {
|
||||||
|
return 0, nil
|
||||||
|
}
|
||||||
|
for p := b; ; {
|
||||||
|
if len(p) <= c.OutSkip {
|
||||||
|
c.OutSkip -= len(p)
|
||||||
|
break
|
||||||
|
}
|
||||||
|
p = p[c.OutSkip:]
|
||||||
|
c.OutSkip = 0
|
||||||
|
need := 5 - len(c.OutHeader)
|
||||||
|
if len(p) < need {
|
||||||
|
c.OutHeader = append(c.OutHeader, p...)
|
||||||
|
c.CTR.XORKeyStream(p, p)
|
||||||
|
break
|
||||||
|
}
|
||||||
|
c.OutSkip, _ = DecodeHeader(append(c.OutHeader, p[:need]...))
|
||||||
|
c.OutHeader = c.OutHeader[:0]
|
||||||
|
c.CTR.XORKeyStream(p[:need], p[:need])
|
||||||
|
p = p[need:]
|
||||||
|
}
|
||||||
|
if _, err := c.Conn.Write(b); err != nil {
|
||||||
|
return 0, err
|
||||||
|
}
|
||||||
|
return len(b), nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func (c *XorConn) Read(b []byte) (int, error) {
|
||||||
|
if len(b) == 0 {
|
||||||
|
return 0, nil
|
||||||
|
}
|
||||||
|
n, err := c.Conn.Read(b)
|
||||||
|
for p := b[:n]; ; {
|
||||||
|
if len(p) <= c.InSkip {
|
||||||
|
c.InSkip -= len(p)
|
||||||
|
break
|
||||||
|
}
|
||||||
|
p = p[c.InSkip:]
|
||||||
|
c.InSkip = 0
|
||||||
|
need := 5 - len(c.InHeader)
|
||||||
|
if len(p) < need {
|
||||||
|
c.PeerCTR.XORKeyStream(p, p)
|
||||||
|
c.InHeader = append(c.InHeader, p...)
|
||||||
|
break
|
||||||
|
}
|
||||||
|
c.PeerCTR.XORKeyStream(p[:need], p[:need])
|
||||||
|
c.InSkip, _ = DecodeHeader(append(c.InHeader, p[:need]...))
|
||||||
|
c.InHeader = c.InHeader[:0]
|
||||||
|
p = p[need:]
|
||||||
|
}
|
||||||
|
return n, err
|
||||||
|
}
|
||||||
@@ -111,11 +111,13 @@ type Config struct {
|
|||||||
sizeCache protoimpl.SizeCache
|
sizeCache protoimpl.SizeCache
|
||||||
unknownFields protoimpl.UnknownFields
|
unknownFields protoimpl.UnknownFields
|
||||||
|
|
||||||
Clients []*protocol.User `protobuf:"bytes,1,rep,name=clients,proto3" json:"clients,omitempty"`
|
Clients []*protocol.User `protobuf:"bytes,1,rep,name=clients,proto3" json:"clients,omitempty"`
|
||||||
// Decryption settings. Only applies to server side, and only accepts "none"
|
Fallbacks []*Fallback `protobuf:"bytes,2,rep,name=fallbacks,proto3" json:"fallbacks,omitempty"`
|
||||||
// for now.
|
Decryption string `protobuf:"bytes,3,opt,name=decryption,proto3" json:"decryption,omitempty"`
|
||||||
Decryption string `protobuf:"bytes,2,opt,name=decryption,proto3" json:"decryption,omitempty"`
|
XorMode uint32 `protobuf:"varint,4,opt,name=xorMode,proto3" json:"xorMode,omitempty"`
|
||||||
Fallbacks []*Fallback `protobuf:"bytes,3,rep,name=fallbacks,proto3" json:"fallbacks,omitempty"`
|
SecondsFrom int64 `protobuf:"varint,5,opt,name=seconds_from,json=secondsFrom,proto3" json:"seconds_from,omitempty"`
|
||||||
|
SecondsTo int64 `protobuf:"varint,6,opt,name=seconds_to,json=secondsTo,proto3" json:"seconds_to,omitempty"`
|
||||||
|
Padding string `protobuf:"bytes,7,opt,name=padding,proto3" json:"padding,omitempty"`
|
||||||
}
|
}
|
||||||
|
|
||||||
func (x *Config) Reset() {
|
func (x *Config) Reset() {
|
||||||
@@ -155,6 +157,13 @@ func (x *Config) GetClients() []*protocol.User {
|
|||||||
return nil
|
return nil
|
||||||
}
|
}
|
||||||
|
|
||||||
|
func (x *Config) GetFallbacks() []*Fallback {
|
||||||
|
if x != nil {
|
||||||
|
return x.Fallbacks
|
||||||
|
}
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
func (x *Config) GetDecryption() string {
|
func (x *Config) GetDecryption() string {
|
||||||
if x != nil {
|
if x != nil {
|
||||||
return x.Decryption
|
return x.Decryption
|
||||||
@@ -162,11 +171,32 @@ func (x *Config) GetDecryption() string {
|
|||||||
return ""
|
return ""
|
||||||
}
|
}
|
||||||
|
|
||||||
func (x *Config) GetFallbacks() []*Fallback {
|
func (x *Config) GetXorMode() uint32 {
|
||||||
if x != nil {
|
if x != nil {
|
||||||
return x.Fallbacks
|
return x.XorMode
|
||||||
}
|
}
|
||||||
return nil
|
return 0
|
||||||
|
}
|
||||||
|
|
||||||
|
func (x *Config) GetSecondsFrom() int64 {
|
||||||
|
if x != nil {
|
||||||
|
return x.SecondsFrom
|
||||||
|
}
|
||||||
|
return 0
|
||||||
|
}
|
||||||
|
|
||||||
|
func (x *Config) GetSecondsTo() int64 {
|
||||||
|
if x != nil {
|
||||||
|
return x.SecondsTo
|
||||||
|
}
|
||||||
|
return 0
|
||||||
|
}
|
||||||
|
|
||||||
|
func (x *Config) GetPadding() string {
|
||||||
|
if x != nil {
|
||||||
|
return x.Padding
|
||||||
|
}
|
||||||
|
return ""
|
||||||
}
|
}
|
||||||
|
|
||||||
var File_proxy_vless_inbound_config_proto protoreflect.FileDescriptor
|
var File_proxy_vless_inbound_config_proto protoreflect.FileDescriptor
|
||||||
@@ -185,25 +215,32 @@ var file_proxy_vless_inbound_config_proto_rawDesc = []byte{
|
|||||||
0x68, 0x12, 0x12, 0x0a, 0x04, 0x74, 0x79, 0x70, 0x65, 0x18, 0x04, 0x20, 0x01, 0x28, 0x09, 0x52,
|
0x68, 0x12, 0x12, 0x0a, 0x04, 0x74, 0x79, 0x70, 0x65, 0x18, 0x04, 0x20, 0x01, 0x28, 0x09, 0x52,
|
||||||
0x04, 0x74, 0x79, 0x70, 0x65, 0x12, 0x12, 0x0a, 0x04, 0x64, 0x65, 0x73, 0x74, 0x18, 0x05, 0x20,
|
0x04, 0x74, 0x79, 0x70, 0x65, 0x12, 0x12, 0x0a, 0x04, 0x64, 0x65, 0x73, 0x74, 0x18, 0x05, 0x20,
|
||||||
0x01, 0x28, 0x09, 0x52, 0x04, 0x64, 0x65, 0x73, 0x74, 0x12, 0x12, 0x0a, 0x04, 0x78, 0x76, 0x65,
|
0x01, 0x28, 0x09, 0x52, 0x04, 0x64, 0x65, 0x73, 0x74, 0x12, 0x12, 0x0a, 0x04, 0x78, 0x76, 0x65,
|
||||||
0x72, 0x18, 0x06, 0x20, 0x01, 0x28, 0x04, 0x52, 0x04, 0x78, 0x76, 0x65, 0x72, 0x22, 0xa0, 0x01,
|
0x72, 0x18, 0x06, 0x20, 0x01, 0x28, 0x04, 0x52, 0x04, 0x78, 0x76, 0x65, 0x72, 0x22, 0x96, 0x02,
|
||||||
0x0a, 0x06, 0x43, 0x6f, 0x6e, 0x66, 0x69, 0x67, 0x12, 0x34, 0x0a, 0x07, 0x63, 0x6c, 0x69, 0x65,
|
0x0a, 0x06, 0x43, 0x6f, 0x6e, 0x66, 0x69, 0x67, 0x12, 0x34, 0x0a, 0x07, 0x63, 0x6c, 0x69, 0x65,
|
||||||
0x6e, 0x74, 0x73, 0x18, 0x01, 0x20, 0x03, 0x28, 0x0b, 0x32, 0x1a, 0x2e, 0x78, 0x72, 0x61, 0x79,
|
0x6e, 0x74, 0x73, 0x18, 0x01, 0x20, 0x03, 0x28, 0x0b, 0x32, 0x1a, 0x2e, 0x78, 0x72, 0x61, 0x79,
|
||||||
0x2e, 0x63, 0x6f, 0x6d, 0x6d, 0x6f, 0x6e, 0x2e, 0x70, 0x72, 0x6f, 0x74, 0x6f, 0x63, 0x6f, 0x6c,
|
0x2e, 0x63, 0x6f, 0x6d, 0x6d, 0x6f, 0x6e, 0x2e, 0x70, 0x72, 0x6f, 0x74, 0x6f, 0x63, 0x6f, 0x6c,
|
||||||
0x2e, 0x55, 0x73, 0x65, 0x72, 0x52, 0x07, 0x63, 0x6c, 0x69, 0x65, 0x6e, 0x74, 0x73, 0x12, 0x1e,
|
0x2e, 0x55, 0x73, 0x65, 0x72, 0x52, 0x07, 0x63, 0x6c, 0x69, 0x65, 0x6e, 0x74, 0x73, 0x12, 0x40,
|
||||||
0x0a, 0x0a, 0x64, 0x65, 0x63, 0x72, 0x79, 0x70, 0x74, 0x69, 0x6f, 0x6e, 0x18, 0x02, 0x20, 0x01,
|
0x0a, 0x09, 0x66, 0x61, 0x6c, 0x6c, 0x62, 0x61, 0x63, 0x6b, 0x73, 0x18, 0x02, 0x20, 0x03, 0x28,
|
||||||
0x28, 0x09, 0x52, 0x0a, 0x64, 0x65, 0x63, 0x72, 0x79, 0x70, 0x74, 0x69, 0x6f, 0x6e, 0x12, 0x40,
|
|
||||||
0x0a, 0x09, 0x66, 0x61, 0x6c, 0x6c, 0x62, 0x61, 0x63, 0x6b, 0x73, 0x18, 0x03, 0x20, 0x03, 0x28,
|
|
||||||
0x0b, 0x32, 0x22, 0x2e, 0x78, 0x72, 0x61, 0x79, 0x2e, 0x70, 0x72, 0x6f, 0x78, 0x79, 0x2e, 0x76,
|
0x0b, 0x32, 0x22, 0x2e, 0x78, 0x72, 0x61, 0x79, 0x2e, 0x70, 0x72, 0x6f, 0x78, 0x79, 0x2e, 0x76,
|
||||||
0x6c, 0x65, 0x73, 0x73, 0x2e, 0x69, 0x6e, 0x62, 0x6f, 0x75, 0x6e, 0x64, 0x2e, 0x46, 0x61, 0x6c,
|
0x6c, 0x65, 0x73, 0x73, 0x2e, 0x69, 0x6e, 0x62, 0x6f, 0x75, 0x6e, 0x64, 0x2e, 0x46, 0x61, 0x6c,
|
||||||
0x6c, 0x62, 0x61, 0x63, 0x6b, 0x52, 0x09, 0x66, 0x61, 0x6c, 0x6c, 0x62, 0x61, 0x63, 0x6b, 0x73,
|
0x6c, 0x62, 0x61, 0x63, 0x6b, 0x52, 0x09, 0x66, 0x61, 0x6c, 0x6c, 0x62, 0x61, 0x63, 0x6b, 0x73,
|
||||||
0x42, 0x6a, 0x0a, 0x1c, 0x63, 0x6f, 0x6d, 0x2e, 0x78, 0x72, 0x61, 0x79, 0x2e, 0x70, 0x72, 0x6f,
|
0x12, 0x1e, 0x0a, 0x0a, 0x64, 0x65, 0x63, 0x72, 0x79, 0x70, 0x74, 0x69, 0x6f, 0x6e, 0x18, 0x03,
|
||||||
0x78, 0x79, 0x2e, 0x76, 0x6c, 0x65, 0x73, 0x73, 0x2e, 0x69, 0x6e, 0x62, 0x6f, 0x75, 0x6e, 0x64,
|
0x20, 0x01, 0x28, 0x09, 0x52, 0x0a, 0x64, 0x65, 0x63, 0x72, 0x79, 0x70, 0x74, 0x69, 0x6f, 0x6e,
|
||||||
0x50, 0x01, 0x5a, 0x2d, 0x67, 0x69, 0x74, 0x68, 0x75, 0x62, 0x2e, 0x63, 0x6f, 0x6d, 0x2f, 0x78,
|
0x12, 0x18, 0x0a, 0x07, 0x78, 0x6f, 0x72, 0x4d, 0x6f, 0x64, 0x65, 0x18, 0x04, 0x20, 0x01, 0x28,
|
||||||
0x74, 0x6c, 0x73, 0x2f, 0x78, 0x72, 0x61, 0x79, 0x2d, 0x63, 0x6f, 0x72, 0x65, 0x2f, 0x70, 0x72,
|
0x0d, 0x52, 0x07, 0x78, 0x6f, 0x72, 0x4d, 0x6f, 0x64, 0x65, 0x12, 0x21, 0x0a, 0x0c, 0x73, 0x65,
|
||||||
0x6f, 0x78, 0x79, 0x2f, 0x76, 0x6c, 0x65, 0x73, 0x73, 0x2f, 0x69, 0x6e, 0x62, 0x6f, 0x75, 0x6e,
|
0x63, 0x6f, 0x6e, 0x64, 0x73, 0x5f, 0x66, 0x72, 0x6f, 0x6d, 0x18, 0x05, 0x20, 0x01, 0x28, 0x03,
|
||||||
0x64, 0xaa, 0x02, 0x18, 0x58, 0x72, 0x61, 0x79, 0x2e, 0x50, 0x72, 0x6f, 0x78, 0x79, 0x2e, 0x56,
|
0x52, 0x0b, 0x73, 0x65, 0x63, 0x6f, 0x6e, 0x64, 0x73, 0x46, 0x72, 0x6f, 0x6d, 0x12, 0x1d, 0x0a,
|
||||||
0x6c, 0x65, 0x73, 0x73, 0x2e, 0x49, 0x6e, 0x62, 0x6f, 0x75, 0x6e, 0x64, 0x62, 0x06, 0x70, 0x72,
|
0x0a, 0x73, 0x65, 0x63, 0x6f, 0x6e, 0x64, 0x73, 0x5f, 0x74, 0x6f, 0x18, 0x06, 0x20, 0x01, 0x28,
|
||||||
0x6f, 0x74, 0x6f, 0x33,
|
0x03, 0x52, 0x09, 0x73, 0x65, 0x63, 0x6f, 0x6e, 0x64, 0x73, 0x54, 0x6f, 0x12, 0x18, 0x0a, 0x07,
|
||||||
|
0x70, 0x61, 0x64, 0x64, 0x69, 0x6e, 0x67, 0x18, 0x07, 0x20, 0x01, 0x28, 0x09, 0x52, 0x07, 0x70,
|
||||||
|
0x61, 0x64, 0x64, 0x69, 0x6e, 0x67, 0x42, 0x6a, 0x0a, 0x1c, 0x63, 0x6f, 0x6d, 0x2e, 0x78, 0x72,
|
||||||
|
0x61, 0x79, 0x2e, 0x70, 0x72, 0x6f, 0x78, 0x79, 0x2e, 0x76, 0x6c, 0x65, 0x73, 0x73, 0x2e, 0x69,
|
||||||
|
0x6e, 0x62, 0x6f, 0x75, 0x6e, 0x64, 0x50, 0x01, 0x5a, 0x2d, 0x67, 0x69, 0x74, 0x68, 0x75, 0x62,
|
||||||
|
0x2e, 0x63, 0x6f, 0x6d, 0x2f, 0x78, 0x74, 0x6c, 0x73, 0x2f, 0x78, 0x72, 0x61, 0x79, 0x2d, 0x63,
|
||||||
|
0x6f, 0x72, 0x65, 0x2f, 0x70, 0x72, 0x6f, 0x78, 0x79, 0x2f, 0x76, 0x6c, 0x65, 0x73, 0x73, 0x2f,
|
||||||
|
0x69, 0x6e, 0x62, 0x6f, 0x75, 0x6e, 0x64, 0xaa, 0x02, 0x18, 0x58, 0x72, 0x61, 0x79, 0x2e, 0x50,
|
||||||
|
0x72, 0x6f, 0x78, 0x79, 0x2e, 0x56, 0x6c, 0x65, 0x73, 0x73, 0x2e, 0x49, 0x6e, 0x62, 0x6f, 0x75,
|
||||||
|
0x6e, 0x64, 0x62, 0x06, 0x70, 0x72, 0x6f, 0x74, 0x6f, 0x33,
|
||||||
}
|
}
|
||||||
|
|
||||||
var (
|
var (
|
||||||
|
|||||||
@@ -19,8 +19,11 @@ message Fallback {
|
|||||||
|
|
||||||
message Config {
|
message Config {
|
||||||
repeated xray.common.protocol.User clients = 1;
|
repeated xray.common.protocol.User clients = 1;
|
||||||
// Decryption settings. Only applies to server side, and only accepts "none"
|
repeated Fallback fallbacks = 2;
|
||||||
// for now.
|
|
||||||
string decryption = 2;
|
string decryption = 3;
|
||||||
repeated Fallback fallbacks = 3;
|
uint32 xorMode = 4;
|
||||||
|
int64 seconds_from = 5;
|
||||||
|
int64 seconds_to = 6;
|
||||||
|
string padding = 7;
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -4,6 +4,7 @@ import (
|
|||||||
"bytes"
|
"bytes"
|
||||||
"context"
|
"context"
|
||||||
gotls "crypto/tls"
|
gotls "crypto/tls"
|
||||||
|
"encoding/base64"
|
||||||
"io"
|
"io"
|
||||||
"reflect"
|
"reflect"
|
||||||
"strconv"
|
"strconv"
|
||||||
@@ -11,24 +12,31 @@ import (
|
|||||||
"time"
|
"time"
|
||||||
"unsafe"
|
"unsafe"
|
||||||
|
|
||||||
|
"github.com/xtls/xray-core/app/dispatcher"
|
||||||
|
"github.com/xtls/xray-core/app/reverse"
|
||||||
"github.com/xtls/xray-core/common"
|
"github.com/xtls/xray-core/common"
|
||||||
"github.com/xtls/xray-core/common/buf"
|
"github.com/xtls/xray-core/common/buf"
|
||||||
"github.com/xtls/xray-core/common/errors"
|
"github.com/xtls/xray-core/common/errors"
|
||||||
"github.com/xtls/xray-core/common/log"
|
"github.com/xtls/xray-core/common/log"
|
||||||
|
"github.com/xtls/xray-core/common/mux"
|
||||||
"github.com/xtls/xray-core/common/net"
|
"github.com/xtls/xray-core/common/net"
|
||||||
"github.com/xtls/xray-core/common/protocol"
|
"github.com/xtls/xray-core/common/protocol"
|
||||||
"github.com/xtls/xray-core/common/retry"
|
"github.com/xtls/xray-core/common/retry"
|
||||||
|
"github.com/xtls/xray-core/common/serial"
|
||||||
"github.com/xtls/xray-core/common/session"
|
"github.com/xtls/xray-core/common/session"
|
||||||
"github.com/xtls/xray-core/common/signal"
|
"github.com/xtls/xray-core/common/signal"
|
||||||
"github.com/xtls/xray-core/common/task"
|
"github.com/xtls/xray-core/common/task"
|
||||||
"github.com/xtls/xray-core/core"
|
"github.com/xtls/xray-core/core"
|
||||||
"github.com/xtls/xray-core/features/dns"
|
"github.com/xtls/xray-core/features/dns"
|
||||||
feature_inbound "github.com/xtls/xray-core/features/inbound"
|
feature_inbound "github.com/xtls/xray-core/features/inbound"
|
||||||
|
"github.com/xtls/xray-core/features/outbound"
|
||||||
"github.com/xtls/xray-core/features/policy"
|
"github.com/xtls/xray-core/features/policy"
|
||||||
"github.com/xtls/xray-core/features/routing"
|
"github.com/xtls/xray-core/features/routing"
|
||||||
"github.com/xtls/xray-core/proxy"
|
"github.com/xtls/xray-core/proxy"
|
||||||
"github.com/xtls/xray-core/proxy/vless"
|
"github.com/xtls/xray-core/proxy/vless"
|
||||||
"github.com/xtls/xray-core/proxy/vless/encoding"
|
"github.com/xtls/xray-core/proxy/vless/encoding"
|
||||||
|
"github.com/xtls/xray-core/proxy/vless/encryption"
|
||||||
|
"github.com/xtls/xray-core/transport"
|
||||||
"github.com/xtls/xray-core/transport/internet/reality"
|
"github.com/xtls/xray-core/transport/internet/reality"
|
||||||
"github.com/xtls/xray-core/transport/internet/stat"
|
"github.com/xtls/xray-core/transport/internet/stat"
|
||||||
"github.com/xtls/xray-core/transport/internet/tls"
|
"github.com/xtls/xray-core/transport/internet/tls"
|
||||||
@@ -63,11 +71,14 @@ func init() {
|
|||||||
|
|
||||||
// Handler is an inbound connection handler that handles messages in VLess protocol.
|
// Handler is an inbound connection handler that handles messages in VLess protocol.
|
||||||
type Handler struct {
|
type Handler struct {
|
||||||
inboundHandlerManager feature_inbound.Manager
|
inboundHandlerManager feature_inbound.Manager
|
||||||
policyManager policy.Manager
|
policyManager policy.Manager
|
||||||
validator vless.Validator
|
validator vless.Validator
|
||||||
dns dns.Client
|
decryption *encryption.ServerInstance
|
||||||
fallbacks map[string]map[string]map[string]*Fallback // or nil
|
outboundHandlerManager outbound.Manager
|
||||||
|
defaultDispatcher *dispatcher.DefaultDispatcher
|
||||||
|
ctx context.Context
|
||||||
|
fallbacks map[string]map[string]map[string]*Fallback // or nil
|
||||||
// regexps map[string]*regexp.Regexp // or nil
|
// regexps map[string]*regexp.Regexp // or nil
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -75,10 +86,25 @@ type Handler struct {
|
|||||||
func New(ctx context.Context, config *Config, dc dns.Client, validator vless.Validator) (*Handler, error) {
|
func New(ctx context.Context, config *Config, dc dns.Client, validator vless.Validator) (*Handler, error) {
|
||||||
v := core.MustFromContext(ctx)
|
v := core.MustFromContext(ctx)
|
||||||
handler := &Handler{
|
handler := &Handler{
|
||||||
inboundHandlerManager: v.GetFeature(feature_inbound.ManagerType()).(feature_inbound.Manager),
|
inboundHandlerManager: v.GetFeature(feature_inbound.ManagerType()).(feature_inbound.Manager),
|
||||||
policyManager: v.GetFeature(policy.ManagerType()).(policy.Manager),
|
policyManager: v.GetFeature(policy.ManagerType()).(policy.Manager),
|
||||||
dns: dc,
|
validator: validator,
|
||||||
validator: validator,
|
outboundHandlerManager: v.GetFeature(outbound.ManagerType()).(outbound.Manager),
|
||||||
|
defaultDispatcher: v.GetFeature(routing.DispatcherType()).(*dispatcher.DefaultDispatcher),
|
||||||
|
ctx: ctx,
|
||||||
|
}
|
||||||
|
|
||||||
|
if config.Decryption != "" && config.Decryption != "none" {
|
||||||
|
s := strings.Split(config.Decryption, ".")
|
||||||
|
var nfsSKeysBytes [][]byte
|
||||||
|
for _, r := range s {
|
||||||
|
b, _ := base64.RawURLEncoding.DecodeString(r)
|
||||||
|
nfsSKeysBytes = append(nfsSKeysBytes, b)
|
||||||
|
}
|
||||||
|
handler.decryption = &encryption.ServerInstance{}
|
||||||
|
if err := handler.decryption.Init(nfsSKeysBytes, config.XorMode, config.SecondsFrom, config.SecondsTo, config.Padding); err != nil {
|
||||||
|
return nil, errors.New("failed to use decryption").Base(err).AtError()
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
if config.Fallbacks != nil {
|
if config.Fallbacks != nil {
|
||||||
@@ -157,8 +183,49 @@ func isMuxAndNotXUDP(request *protocol.RequestHeader, first *buf.Buffer) bool {
|
|||||||
firstBytes[6] == 2) // Network type: UDP
|
firstBytes[6] == 2) // Network type: UDP
|
||||||
}
|
}
|
||||||
|
|
||||||
|
func (h *Handler) GetReverse(a *vless.MemoryAccount) (*Reverse, error) {
|
||||||
|
u := h.validator.Get(a.ID.UUID())
|
||||||
|
if u == nil {
|
||||||
|
return nil, errors.New("reverse: user " + a.ID.String() + " doesn't exist anymore")
|
||||||
|
}
|
||||||
|
a = u.Account.(*vless.MemoryAccount)
|
||||||
|
if a.Reverse == nil || a.Reverse.Tag == "" {
|
||||||
|
return nil, errors.New("reverse: user " + a.ID.String() + " is not allowed to create reverse proxy")
|
||||||
|
}
|
||||||
|
r := h.outboundHandlerManager.GetHandler(a.Reverse.Tag)
|
||||||
|
if r == nil {
|
||||||
|
picker, _ := reverse.NewStaticMuxPicker()
|
||||||
|
r = &Reverse{tag: a.Reverse.Tag, picker: picker, client: &mux.ClientManager{Picker: picker}}
|
||||||
|
for len(h.outboundHandlerManager.ListHandlers(h.ctx)) == 0 {
|
||||||
|
time.Sleep(time.Second) // prevents this outbound from becoming the default outbound
|
||||||
|
}
|
||||||
|
if err := h.outboundHandlerManager.AddHandler(h.ctx, r); err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
}
|
||||||
|
if r, ok := r.(*Reverse); ok {
|
||||||
|
return r, nil
|
||||||
|
}
|
||||||
|
return nil, errors.New("reverse: outbound " + a.Reverse.Tag + " is not type Reverse")
|
||||||
|
}
|
||||||
|
|
||||||
|
func (h *Handler) RemoveReverse(u *protocol.MemoryUser) {
|
||||||
|
if u != nil {
|
||||||
|
a := u.Account.(*vless.MemoryAccount)
|
||||||
|
if a.Reverse != nil && a.Reverse.Tag != "" {
|
||||||
|
h.outboundHandlerManager.RemoveHandler(h.ctx, a.Reverse.Tag)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
// Close implements common.Closable.Close().
|
// Close implements common.Closable.Close().
|
||||||
func (h *Handler) Close() error {
|
func (h *Handler) Close() error {
|
||||||
|
if h.decryption != nil {
|
||||||
|
h.decryption.Close()
|
||||||
|
}
|
||||||
|
for _, u := range h.validator.GetAll() {
|
||||||
|
h.RemoveReverse(u)
|
||||||
|
}
|
||||||
return errors.Combine(common.Close(h.validator))
|
return errors.Combine(common.Close(h.validator))
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -169,6 +236,7 @@ func (h *Handler) AddUser(ctx context.Context, u *protocol.MemoryUser) error {
|
|||||||
|
|
||||||
// RemoveUser implements proxy.UserManager.RemoveUser().
|
// RemoveUser implements proxy.UserManager.RemoveUser().
|
||||||
func (h *Handler) RemoveUser(ctx context.Context, e string) error {
|
func (h *Handler) RemoveUser(ctx context.Context, e string) error {
|
||||||
|
h.RemoveReverse(h.validator.GetByEmail(e))
|
||||||
return h.validator.Del(e)
|
return h.validator.Del(e)
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -199,6 +267,13 @@ func (h *Handler) Process(ctx context.Context, network net.Network, connection s
|
|||||||
iConn = statConn.Connection
|
iConn = statConn.Connection
|
||||||
}
|
}
|
||||||
|
|
||||||
|
if h.decryption != nil {
|
||||||
|
var err error
|
||||||
|
if connection, err = h.decryption.Handshake(connection, nil); err != nil {
|
||||||
|
return errors.New("ML-KEM-768 handshake failed").Base(err).AtInfo()
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
sessionPolicy := h.policyManager.ForLevel(0)
|
sessionPolicy := h.policyManager.ForLevel(0)
|
||||||
if err := connection.SetReadDeadline(time.Now().Add(sessionPolicy.Timeouts.Handshake)); err != nil {
|
if err := connection.SetReadDeadline(time.Now().Add(sessionPolicy.Timeouts.Handshake)); err != nil {
|
||||||
return errors.New("unable to set read deadline").Base(err).AtWarning()
|
return errors.New("unable to set read deadline").Base(err).AtWarning()
|
||||||
@@ -473,12 +548,19 @@ func (h *Handler) Process(ctx context.Context, network net.Network, connection s
|
|||||||
switch request.Command {
|
switch request.Command {
|
||||||
case protocol.RequestCommandUDP:
|
case protocol.RequestCommandUDP:
|
||||||
return errors.New(requestAddons.Flow + " doesn't support UDP").AtWarning()
|
return errors.New(requestAddons.Flow + " doesn't support UDP").AtWarning()
|
||||||
case protocol.RequestCommandMux:
|
case protocol.RequestCommandMux, protocol.RequestCommandRvs:
|
||||||
|
inbound.CanSpliceCopy = 3
|
||||||
fallthrough // we will break Mux connections that contain TCP requests
|
fallthrough // we will break Mux connections that contain TCP requests
|
||||||
case protocol.RequestCommandTCP:
|
case protocol.RequestCommandTCP:
|
||||||
var t reflect.Type
|
var t reflect.Type
|
||||||
var p uintptr
|
var p uintptr
|
||||||
if tlsConn, ok := iConn.(*tls.Conn); ok {
|
if commonConn, ok := connection.(*encryption.CommonConn); ok {
|
||||||
|
if _, ok := commonConn.Conn.(*encryption.XorConn); ok || !proxy.IsRAWTransportWithoutSecurity(iConn) {
|
||||||
|
inbound.CanSpliceCopy = 3 // full-random xorConn / non-RAW transport / another securityConn should not be penetrated
|
||||||
|
}
|
||||||
|
t = reflect.TypeOf(commonConn).Elem()
|
||||||
|
p = uintptr(unsafe.Pointer(commonConn))
|
||||||
|
} else if tlsConn, ok := iConn.(*tls.Conn); ok {
|
||||||
if tlsConn.ConnectionState().Version != gotls.VersionTLS13 {
|
if tlsConn.ConnectionState().Version != gotls.VersionTLS13 {
|
||||||
return errors.New(`failed to use `+requestAddons.Flow+`, found outer tls version `, tlsConn.ConnectionState().Version).AtWarning()
|
return errors.New(`failed to use `+requestAddons.Flow+`, found outer tls version `, tlsConn.ConnectionState().Version).AtWarning()
|
||||||
}
|
}
|
||||||
@@ -519,89 +601,87 @@ func (h *Handler) Process(ctx context.Context, network net.Network, connection s
|
|||||||
ctx = session.ContextWithAllowedNetwork(ctx, net.Network_UDP)
|
ctx = session.ContextWithAllowedNetwork(ctx, net.Network_UDP)
|
||||||
}
|
}
|
||||||
|
|
||||||
sessionPolicy = h.policyManager.ForLevel(request.User.Level)
|
|
||||||
ctx, cancel := context.WithCancel(ctx)
|
|
||||||
timer := signal.CancelAfterInactivity(ctx, cancel, sessionPolicy.Timeouts.ConnectionIdle)
|
|
||||||
inbound.Timer = timer
|
|
||||||
ctx = policy.ContextWithBufferPolicy(ctx, sessionPolicy.Buffer)
|
|
||||||
|
|
||||||
link, err := dispatcher.Dispatch(ctx, request.Destination())
|
|
||||||
if err != nil {
|
|
||||||
return errors.New("failed to dispatch request to ", request.Destination()).Base(err).AtWarning()
|
|
||||||
}
|
|
||||||
|
|
||||||
serverReader := link.Reader // .(*pipe.Reader)
|
|
||||||
serverWriter := link.Writer // .(*pipe.Writer)
|
|
||||||
trafficState := proxy.NewTrafficState(userSentID)
|
trafficState := proxy.NewTrafficState(userSentID)
|
||||||
postRequest := func() error {
|
clientReader := encoding.DecodeBodyAddons(reader, request, requestAddons)
|
||||||
defer timer.SetTimeout(sessionPolicy.Timeouts.DownlinkOnly)
|
if requestAddons.Flow == vless.XRV {
|
||||||
|
clientReader = proxy.NewVisionReader(clientReader, trafficState, true, ctx, connection, input, rawInput, nil)
|
||||||
|
}
|
||||||
|
|
||||||
// default: clientReader := reader
|
bufferWriter := buf.NewBufferedWriter(buf.NewWriter(connection))
|
||||||
clientReader := encoding.DecodeBodyAddons(reader, request, requestAddons)
|
if err := encoding.EncodeResponseHeader(bufferWriter, request, responseAddons); err != nil {
|
||||||
|
return errors.New("failed to encode response header").Base(err).AtWarning()
|
||||||
var err error
|
}
|
||||||
|
clientWriter := encoding.EncodeBodyAddons(bufferWriter, request, requestAddons, trafficState, false, ctx, connection, nil)
|
||||||
if requestAddons.Flow == vless.XRV {
|
bufferWriter.SetFlushNext()
|
||||||
ctx1 := session.ContextWithInbound(ctx, nil) // TODO enable splice
|
|
||||||
clientReader = proxy.NewVisionReader(clientReader, trafficState, true, ctx1)
|
|
||||||
err = encoding.XtlsRead(clientReader, serverWriter, timer, connection, input, rawInput, trafficState, nil, true, ctx1)
|
|
||||||
} else {
|
|
||||||
// from clientReader.ReadMultiBuffer to serverWriter.WriteMultiBuffer
|
|
||||||
err = buf.Copy(clientReader, serverWriter, buf.UpdateActivity(timer))
|
|
||||||
}
|
|
||||||
|
|
||||||
|
if request.Command == protocol.RequestCommandRvs {
|
||||||
|
r, err := h.GetReverse(account)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return errors.New("failed to transfer request payload").Base(err).AtInfo()
|
return err
|
||||||
}
|
}
|
||||||
|
return r.NewMux(ctx, h.defaultDispatcher.WrapLink(ctx, &transport.Link{Reader: clientReader, Writer: clientWriter}))
|
||||||
return nil
|
|
||||||
}
|
}
|
||||||
|
|
||||||
getResponse := func() error {
|
if err := dispatcher.DispatchLink(ctx, request.Destination(), &transport.Link{
|
||||||
defer timer.SetTimeout(sessionPolicy.Timeouts.UplinkOnly)
|
Reader: clientReader,
|
||||||
|
Writer: clientWriter},
|
||||||
bufferWriter := buf.NewBufferedWriter(buf.NewWriter(connection))
|
); err != nil {
|
||||||
if err := encoding.EncodeResponseHeader(bufferWriter, request, responseAddons); err != nil {
|
return errors.New("failed to dispatch request").Base(err)
|
||||||
return errors.New("failed to encode response header").Base(err).AtWarning()
|
|
||||||
}
|
|
||||||
|
|
||||||
// default: clientWriter := bufferWriter
|
|
||||||
clientWriter := encoding.EncodeBodyAddons(bufferWriter, request, requestAddons, trafficState, false, ctx)
|
|
||||||
multiBuffer, err1 := serverReader.ReadMultiBuffer()
|
|
||||||
if err1 != nil {
|
|
||||||
return err1 // ...
|
|
||||||
}
|
|
||||||
if err := clientWriter.WriteMultiBuffer(multiBuffer); err != nil {
|
|
||||||
return err // ...
|
|
||||||
}
|
|
||||||
// Flush; bufferWriter.WriteMultiBuffer now is bufferWriter.writer.WriteMultiBuffer
|
|
||||||
if err := bufferWriter.SetBuffered(false); err != nil {
|
|
||||||
return errors.New("failed to write A response payload").Base(err).AtWarning()
|
|
||||||
}
|
|
||||||
|
|
||||||
var err error
|
|
||||||
if requestAddons.Flow == vless.XRV {
|
|
||||||
err = encoding.XtlsWrite(serverReader, clientWriter, timer, connection, trafficState, nil, false, ctx)
|
|
||||||
} else {
|
|
||||||
// from serverReader.ReadMultiBuffer to clientWriter.WriteMultiBuffer
|
|
||||||
err = buf.Copy(serverReader, clientWriter, buf.UpdateActivity(timer))
|
|
||||||
}
|
|
||||||
if err != nil {
|
|
||||||
return errors.New("failed to transfer response payload").Base(err).AtInfo()
|
|
||||||
}
|
|
||||||
// Indicates the end of response payload.
|
|
||||||
switch responseAddons.Flow {
|
|
||||||
default:
|
|
||||||
}
|
|
||||||
|
|
||||||
return nil
|
|
||||||
}
|
}
|
||||||
|
return nil
|
||||||
if err := task.Run(ctx, task.OnSuccess(postRequest, task.Close(serverWriter)), getResponse); err != nil {
|
}
|
||||||
common.Interrupt(serverReader)
|
|
||||||
common.Interrupt(serverWriter)
|
type Reverse struct {
|
||||||
return errors.New("connection ends").Base(err).AtInfo()
|
tag string
|
||||||
}
|
picker *reverse.StaticMuxPicker
|
||||||
|
client *mux.ClientManager
|
||||||
|
}
|
||||||
|
|
||||||
|
func (r *Reverse) Tag() string {
|
||||||
|
return r.tag
|
||||||
|
}
|
||||||
|
|
||||||
|
func (r *Reverse) NewMux(ctx context.Context, link *transport.Link) error {
|
||||||
|
muxClient, err := mux.NewClientWorker(*link, mux.ClientStrategy{})
|
||||||
|
if err != nil {
|
||||||
|
return errors.New("failed to create mux client worker").Base(err).AtWarning()
|
||||||
|
}
|
||||||
|
worker, err := reverse.NewPortalWorker(muxClient)
|
||||||
|
if err != nil {
|
||||||
|
return errors.New("failed to create portal worker").Base(err).AtWarning()
|
||||||
|
}
|
||||||
|
r.picker.AddWorker(worker)
|
||||||
|
select {
|
||||||
|
case <-ctx.Done():
|
||||||
|
case <-muxClient.WaitClosed():
|
||||||
|
}
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func (r *Reverse) Dispatch(ctx context.Context, link *transport.Link) {
|
||||||
|
outbounds := session.OutboundsFromContext(ctx)
|
||||||
|
ob := outbounds[len(outbounds)-1]
|
||||||
|
if ob != nil {
|
||||||
|
if ob.Target.Network == net.Network_UDP && ob.OriginalTarget.Address != nil && ob.OriginalTarget.Address != ob.Target.Address {
|
||||||
|
link.Reader = &buf.EndpointOverrideReader{Reader: link.Reader, Dest: ob.Target.Address, OriginalDest: ob.OriginalTarget.Address}
|
||||||
|
link.Writer = &buf.EndpointOverrideWriter{Writer: link.Writer, Dest: ob.Target.Address, OriginalDest: ob.OriginalTarget.Address}
|
||||||
|
}
|
||||||
|
r.client.Dispatch(ctx, link)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func (r *Reverse) Start() error {
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func (r *Reverse) Close() error {
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func (r *Reverse) SenderSettings() *serial.TypedMessage {
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func (r *Reverse) ProxySettings() *serial.TypedMessage {
|
||||||
return nil
|
return nil
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -4,14 +4,19 @@ import (
|
|||||||
"bytes"
|
"bytes"
|
||||||
"context"
|
"context"
|
||||||
gotls "crypto/tls"
|
gotls "crypto/tls"
|
||||||
|
"encoding/base64"
|
||||||
"reflect"
|
"reflect"
|
||||||
|
"strings"
|
||||||
"time"
|
"time"
|
||||||
"unsafe"
|
"unsafe"
|
||||||
|
|
||||||
utls "github.com/refraction-networking/utls"
|
utls "github.com/refraction-networking/utls"
|
||||||
|
proxyman "github.com/xtls/xray-core/app/proxyman/outbound"
|
||||||
|
"github.com/xtls/xray-core/app/reverse"
|
||||||
"github.com/xtls/xray-core/common"
|
"github.com/xtls/xray-core/common"
|
||||||
"github.com/xtls/xray-core/common/buf"
|
"github.com/xtls/xray-core/common/buf"
|
||||||
"github.com/xtls/xray-core/common/errors"
|
"github.com/xtls/xray-core/common/errors"
|
||||||
|
"github.com/xtls/xray-core/common/mux"
|
||||||
"github.com/xtls/xray-core/common/net"
|
"github.com/xtls/xray-core/common/net"
|
||||||
"github.com/xtls/xray-core/common/protocol"
|
"github.com/xtls/xray-core/common/protocol"
|
||||||
"github.com/xtls/xray-core/common/retry"
|
"github.com/xtls/xray-core/common/retry"
|
||||||
@@ -21,14 +26,17 @@ import (
|
|||||||
"github.com/xtls/xray-core/common/xudp"
|
"github.com/xtls/xray-core/common/xudp"
|
||||||
"github.com/xtls/xray-core/core"
|
"github.com/xtls/xray-core/core"
|
||||||
"github.com/xtls/xray-core/features/policy"
|
"github.com/xtls/xray-core/features/policy"
|
||||||
|
"github.com/xtls/xray-core/features/routing"
|
||||||
"github.com/xtls/xray-core/proxy"
|
"github.com/xtls/xray-core/proxy"
|
||||||
"github.com/xtls/xray-core/proxy/vless"
|
"github.com/xtls/xray-core/proxy/vless"
|
||||||
"github.com/xtls/xray-core/proxy/vless/encoding"
|
"github.com/xtls/xray-core/proxy/vless/encoding"
|
||||||
|
"github.com/xtls/xray-core/proxy/vless/encryption"
|
||||||
"github.com/xtls/xray-core/transport"
|
"github.com/xtls/xray-core/transport"
|
||||||
"github.com/xtls/xray-core/transport/internet"
|
"github.com/xtls/xray-core/transport/internet"
|
||||||
"github.com/xtls/xray-core/transport/internet/reality"
|
"github.com/xtls/xray-core/transport/internet/reality"
|
||||||
"github.com/xtls/xray-core/transport/internet/stat"
|
"github.com/xtls/xray-core/transport/internet/stat"
|
||||||
"github.com/xtls/xray-core/transport/internet/tls"
|
"github.com/xtls/xray-core/transport/internet/tls"
|
||||||
|
"github.com/xtls/xray-core/transport/pipe"
|
||||||
)
|
)
|
||||||
|
|
||||||
func init() {
|
func init() {
|
||||||
@@ -43,6 +51,8 @@ type Handler struct {
|
|||||||
serverPicker protocol.ServerPicker
|
serverPicker protocol.ServerPicker
|
||||||
policyManager policy.Manager
|
policyManager policy.Manager
|
||||||
cone bool
|
cone bool
|
||||||
|
encryption *encryption.ClientInstance
|
||||||
|
reverse *Reverse
|
||||||
}
|
}
|
||||||
|
|
||||||
// New creates a new VLess outbound handler.
|
// New creates a new VLess outbound handler.
|
||||||
@@ -64,14 +74,53 @@ func New(ctx context.Context, config *Config) (*Handler, error) {
|
|||||||
cone: ctx.Value("cone").(bool),
|
cone: ctx.Value("cone").(bool),
|
||||||
}
|
}
|
||||||
|
|
||||||
|
a := handler.serverPicker.PickServer().PickUser().Account.(*vless.MemoryAccount)
|
||||||
|
if a.Encryption != "" && a.Encryption != "none" {
|
||||||
|
s := strings.Split(a.Encryption, ".")
|
||||||
|
var nfsPKeysBytes [][]byte
|
||||||
|
for _, r := range s {
|
||||||
|
b, _ := base64.RawURLEncoding.DecodeString(r)
|
||||||
|
nfsPKeysBytes = append(nfsPKeysBytes, b)
|
||||||
|
}
|
||||||
|
handler.encryption = &encryption.ClientInstance{}
|
||||||
|
if err := handler.encryption.Init(nfsPKeysBytes, a.XorMode, a.Seconds, a.Padding); err != nil {
|
||||||
|
return nil, errors.New("failed to use encryption").Base(err).AtError()
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
if a.Reverse != nil {
|
||||||
|
handler.reverse = &Reverse{
|
||||||
|
tag: a.Reverse.Tag,
|
||||||
|
dispatcher: v.GetFeature(routing.DispatcherType()).(routing.Dispatcher),
|
||||||
|
ctx: ctx,
|
||||||
|
handler: handler,
|
||||||
|
}
|
||||||
|
handler.reverse.monitorTask = &task.Periodic{
|
||||||
|
Execute: handler.reverse.monitor,
|
||||||
|
Interval: time.Second * 2,
|
||||||
|
}
|
||||||
|
go func() {
|
||||||
|
time.Sleep(2 * time.Second)
|
||||||
|
handler.reverse.Start()
|
||||||
|
}()
|
||||||
|
}
|
||||||
|
|
||||||
return handler, nil
|
return handler, nil
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// Close implements common.Closable.Close().
|
||||||
|
func (h *Handler) Close() error {
|
||||||
|
if h.reverse != nil {
|
||||||
|
return h.reverse.Close()
|
||||||
|
}
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
// Process implements proxy.Outbound.Process().
|
// Process implements proxy.Outbound.Process().
|
||||||
func (h *Handler) Process(ctx context.Context, link *transport.Link, dialer internet.Dialer) error {
|
func (h *Handler) Process(ctx context.Context, link *transport.Link, dialer internet.Dialer) error {
|
||||||
outbounds := session.OutboundsFromContext(ctx)
|
outbounds := session.OutboundsFromContext(ctx)
|
||||||
ob := outbounds[len(outbounds)-1]
|
ob := outbounds[len(outbounds)-1]
|
||||||
if !ob.Target.IsValid() {
|
if !ob.Target.IsValid() && ob.Target.Address.String() != "v1.rvs.cool" {
|
||||||
return errors.New("target not specified").AtError()
|
return errors.New("target not specified").AtError()
|
||||||
}
|
}
|
||||||
ob.Name = "vless"
|
ob.Name = "vless"
|
||||||
@@ -98,12 +147,27 @@ func (h *Handler) Process(ctx context.Context, link *transport.Link, dialer inte
|
|||||||
target := ob.Target
|
target := ob.Target
|
||||||
errors.LogInfo(ctx, "tunneling request to ", target, " via ", rec.Destination().NetAddr())
|
errors.LogInfo(ctx, "tunneling request to ", target, " via ", rec.Destination().NetAddr())
|
||||||
|
|
||||||
|
if h.encryption != nil {
|
||||||
|
var err error
|
||||||
|
if conn, err = h.encryption.Handshake(conn); err != nil {
|
||||||
|
return errors.New("ML-KEM-768 handshake failed").Base(err).AtInfo()
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
command := protocol.RequestCommandTCP
|
command := protocol.RequestCommandTCP
|
||||||
if target.Network == net.Network_UDP {
|
if target.Network == net.Network_UDP {
|
||||||
command = protocol.RequestCommandUDP
|
command = protocol.RequestCommandUDP
|
||||||
}
|
}
|
||||||
if target.Address.Family().IsDomain() && target.Address.Domain() == "v1.mux.cool" {
|
if target.Address.Family().IsDomain() {
|
||||||
command = protocol.RequestCommandMux
|
switch target.Address.Domain() {
|
||||||
|
case "v1.mux.cool":
|
||||||
|
command = protocol.RequestCommandMux
|
||||||
|
case "v1.rvs.cool":
|
||||||
|
if target.Network != net.Network_Unknown {
|
||||||
|
return errors.New("nice try baby").AtError()
|
||||||
|
}
|
||||||
|
command = protocol.RequestCommandRvs
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
request := &protocol.RequestHeader{
|
request := &protocol.RequestHeader{
|
||||||
@@ -140,7 +204,13 @@ func (h *Handler) Process(ctx context.Context, link *transport.Link, dialer inte
|
|||||||
case protocol.RequestCommandTCP:
|
case protocol.RequestCommandTCP:
|
||||||
var t reflect.Type
|
var t reflect.Type
|
||||||
var p uintptr
|
var p uintptr
|
||||||
if tlsConn, ok := iConn.(*tls.Conn); ok {
|
if commonConn, ok := conn.(*encryption.CommonConn); ok {
|
||||||
|
if _, ok := commonConn.Conn.(*encryption.XorConn); ok || !proxy.IsRAWTransportWithoutSecurity(iConn) {
|
||||||
|
ob.CanSpliceCopy = 3 // full-random xorConn / non-RAW transport / another securityConn should not be penetrated
|
||||||
|
}
|
||||||
|
t = reflect.TypeOf(commonConn).Elem()
|
||||||
|
p = uintptr(unsafe.Pointer(commonConn))
|
||||||
|
} else if tlsConn, ok := iConn.(*tls.Conn); ok {
|
||||||
t = reflect.TypeOf(tlsConn.Conn).Elem()
|
t = reflect.TypeOf(tlsConn.Conn).Elem()
|
||||||
p = uintptr(unsafe.Pointer(tlsConn.Conn))
|
p = uintptr(unsafe.Pointer(tlsConn.Conn))
|
||||||
} else if utlsConn, ok := iConn.(*tls.UConn); ok {
|
} else if utlsConn, ok := iConn.(*tls.UConn); ok {
|
||||||
@@ -194,7 +264,7 @@ func (h *Handler) Process(ctx context.Context, link *transport.Link, dialer inte
|
|||||||
}
|
}
|
||||||
|
|
||||||
// default: serverWriter := bufferWriter
|
// default: serverWriter := bufferWriter
|
||||||
serverWriter := encoding.EncodeBodyAddons(bufferWriter, request, requestAddons, trafficState, true, ctx)
|
serverWriter := encoding.EncodeBodyAddons(bufferWriter, request, requestAddons, trafficState, true, ctx, conn, ob)
|
||||||
if request.Command == protocol.RequestCommandMux && request.Port == 666 {
|
if request.Command == protocol.RequestCommandMux && request.Port == 666 {
|
||||||
serverWriter = xudp.NewPacketWriter(serverWriter, target, xudp.GetGlobalID(ctx))
|
serverWriter = xudp.NewPacketWriter(serverWriter, target, xudp.GetGlobalID(ctx))
|
||||||
}
|
}
|
||||||
@@ -222,7 +292,6 @@ func (h *Handler) Process(ctx context.Context, link *transport.Link, dialer inte
|
|||||||
return errors.New("failed to write A request payload").Base(err).AtWarning()
|
return errors.New("failed to write A request payload").Base(err).AtWarning()
|
||||||
}
|
}
|
||||||
|
|
||||||
var err error
|
|
||||||
if requestAddons.Flow == vless.XRV {
|
if requestAddons.Flow == vless.XRV {
|
||||||
if tlsConn, ok := iConn.(*tls.Conn); ok {
|
if tlsConn, ok := iConn.(*tls.Conn); ok {
|
||||||
if tlsConn.ConnectionState().Version != gotls.VersionTLS13 {
|
if tlsConn.ConnectionState().Version != gotls.VersionTLS13 {
|
||||||
@@ -233,12 +302,8 @@ func (h *Handler) Process(ctx context.Context, link *transport.Link, dialer inte
|
|||||||
return errors.New(`failed to use `+requestAddons.Flow+`, found outer tls version `, utlsConn.ConnectionState().Version).AtWarning()
|
return errors.New(`failed to use `+requestAddons.Flow+`, found outer tls version `, utlsConn.ConnectionState().Version).AtWarning()
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
ctx1 := session.ContextWithInbound(ctx, nil) // TODO enable splice
|
|
||||||
err = encoding.XtlsWrite(clientReader, serverWriter, timer, conn, trafficState, ob, true, ctx1)
|
|
||||||
} else {
|
|
||||||
// from clientReader.ReadMultiBuffer to serverWriter.WriteMultiBuffer
|
|
||||||
err = buf.Copy(clientReader, serverWriter, buf.UpdateActivity(timer))
|
|
||||||
}
|
}
|
||||||
|
err := buf.Copy(clientReader, serverWriter, buf.UpdateActivity(timer))
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return errors.New("failed to transfer request payload").Base(err).AtInfo()
|
return errors.New("failed to transfer request payload").Base(err).AtInfo()
|
||||||
}
|
}
|
||||||
@@ -261,7 +326,7 @@ func (h *Handler) Process(ctx context.Context, link *transport.Link, dialer inte
|
|||||||
// default: serverReader := buf.NewReader(conn)
|
// default: serverReader := buf.NewReader(conn)
|
||||||
serverReader := encoding.DecodeBodyAddons(conn, request, responseAddons)
|
serverReader := encoding.DecodeBodyAddons(conn, request, responseAddons)
|
||||||
if requestAddons.Flow == vless.XRV {
|
if requestAddons.Flow == vless.XRV {
|
||||||
serverReader = proxy.NewVisionReader(serverReader, trafficState, false, ctx)
|
serverReader = proxy.NewVisionReader(serverReader, trafficState, false, ctx, conn, input, rawInput, ob)
|
||||||
}
|
}
|
||||||
if request.Command == protocol.RequestCommandMux && request.Port == 666 {
|
if request.Command == protocol.RequestCommandMux && request.Port == 666 {
|
||||||
if requestAddons.Flow == vless.XRV {
|
if requestAddons.Flow == vless.XRV {
|
||||||
@@ -272,7 +337,7 @@ func (h *Handler) Process(ctx context.Context, link *transport.Link, dialer inte
|
|||||||
}
|
}
|
||||||
|
|
||||||
if requestAddons.Flow == vless.XRV {
|
if requestAddons.Flow == vless.XRV {
|
||||||
err = encoding.XtlsRead(serverReader, clientWriter, timer, conn, input, rawInput, trafficState, ob, false, ctx)
|
err = encoding.XtlsRead(serverReader, clientWriter, timer, conn, trafficState, false, ctx)
|
||||||
} else {
|
} else {
|
||||||
// from serverReader.ReadMultiBuffer to clientWriter.WriteMultiBuffer
|
// from serverReader.ReadMultiBuffer to clientWriter.WriteMultiBuffer
|
||||||
err = buf.Copy(serverReader, clientWriter, buf.UpdateActivity(timer))
|
err = buf.Copy(serverReader, clientWriter, buf.UpdateActivity(timer))
|
||||||
@@ -295,3 +360,67 @@ func (h *Handler) Process(ctx context.Context, link *transport.Link, dialer inte
|
|||||||
|
|
||||||
return nil
|
return nil
|
||||||
}
|
}
|
||||||
|
|
||||||
|
type Reverse struct {
|
||||||
|
tag string
|
||||||
|
dispatcher routing.Dispatcher
|
||||||
|
ctx context.Context
|
||||||
|
handler *Handler
|
||||||
|
workers []*reverse.BridgeWorker
|
||||||
|
monitorTask *task.Periodic
|
||||||
|
}
|
||||||
|
|
||||||
|
func (r *Reverse) monitor() error {
|
||||||
|
var activeWorkers []*reverse.BridgeWorker
|
||||||
|
for _, w := range r.workers {
|
||||||
|
if w.IsActive() {
|
||||||
|
activeWorkers = append(activeWorkers, w)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
if len(activeWorkers) != len(r.workers) {
|
||||||
|
r.workers = activeWorkers
|
||||||
|
}
|
||||||
|
|
||||||
|
var numConnections uint32
|
||||||
|
var numWorker uint32
|
||||||
|
for _, w := range r.workers {
|
||||||
|
if w.IsActive() {
|
||||||
|
numConnections += w.Connections()
|
||||||
|
numWorker++
|
||||||
|
}
|
||||||
|
}
|
||||||
|
if numWorker == 0 || numConnections/numWorker > 16 {
|
||||||
|
reader1, writer1 := pipe.New(pipe.WithSizeLimit(2 * buf.Size))
|
||||||
|
reader2, writer2 := pipe.New(pipe.WithSizeLimit(2 * buf.Size))
|
||||||
|
link1 := &transport.Link{Reader: reader1, Writer: writer2}
|
||||||
|
link2 := &transport.Link{Reader: reader2, Writer: writer1}
|
||||||
|
w := &reverse.BridgeWorker{
|
||||||
|
Tag: r.tag,
|
||||||
|
Dispatcher: r.dispatcher,
|
||||||
|
}
|
||||||
|
worker, err := mux.NewServerWorker(r.ctx, w, link1)
|
||||||
|
if err != nil {
|
||||||
|
errors.LogWarningInner(r.ctx, err, "failed to create mux server worker")
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
w.Worker = worker
|
||||||
|
r.workers = append(r.workers, w)
|
||||||
|
go func() {
|
||||||
|
ctx := session.ContextWithOutbounds(r.ctx, []*session.Outbound{{
|
||||||
|
Target: net.Destination{Address: net.DomainAddress("v1.rvs.cool")},
|
||||||
|
}})
|
||||||
|
r.handler.Process(ctx, link2, session.HandlerFromContext(ctx).(*proxyman.Handler))
|
||||||
|
common.Interrupt(reader1)
|
||||||
|
common.Interrupt(reader2)
|
||||||
|
}()
|
||||||
|
}
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func (r *Reverse) Start() error {
|
||||||
|
return r.monitorTask.Start()
|
||||||
|
}
|
||||||
|
|
||||||
|
func (r *Reverse) Close() error {
|
||||||
|
return r.monitorTask.Close()
|
||||||
|
}
|
||||||
|
|||||||
@@ -17,8 +17,10 @@ import (
|
|||||||
)
|
)
|
||||||
|
|
||||||
var (
|
var (
|
||||||
ErrNotFound = errors.New("user do not exist")
|
ErrNotFound = errors.New("user do not exist")
|
||||||
ErrReplay = errors.New("replayed request")
|
ErrNeagtiveTime = errors.New("timestamp is negative")
|
||||||
|
ErrInvalidTime = errors.New("invalid timestamp, perhaps unsynchronized time")
|
||||||
|
ErrReplay = errors.New("replayed request")
|
||||||
)
|
)
|
||||||
|
|
||||||
func CreateAuthID(cmdKey []byte, time int64) [16]byte {
|
func CreateAuthID(cmdKey []byte, time int64) [16]byte {
|
||||||
@@ -102,11 +104,11 @@ func (a *AuthIDDecoderHolder) Match(authID [16]byte) (interface{}, error) {
|
|||||||
}
|
}
|
||||||
|
|
||||||
if t < 0 {
|
if t < 0 {
|
||||||
continue
|
return nil, ErrNeagtiveTime
|
||||||
}
|
}
|
||||||
|
|
||||||
if math.Abs(math.Abs(float64(t))-float64(time.Now().Unix())) > 120 {
|
if math.Abs(math.Abs(float64(t))-float64(time.Now().Unix())) > 120 {
|
||||||
continue
|
return nil, ErrInvalidTime
|
||||||
}
|
}
|
||||||
|
|
||||||
if !a.filter.Check(authID[:]) {
|
if !a.filter.Check(authID[:]) {
|
||||||
|
|||||||
@@ -129,7 +129,8 @@ func (h *Handler) processWireGuard(ctx context.Context, dialer internet.Dialer)
|
|||||||
}
|
}
|
||||||
defer func() {
|
defer func() {
|
||||||
if err != nil {
|
if err != nil {
|
||||||
_ = h.bind.Close()
|
h.bind.Close()
|
||||||
|
h.bind = nil
|
||||||
}
|
}
|
||||||
}()
|
}()
|
||||||
|
|
||||||
|
|||||||
@@ -249,7 +249,7 @@ func TestZeroBuffer(t *testing.T) {
|
|||||||
defer CloseAllServers(servers)
|
defer CloseAllServers(servers)
|
||||||
|
|
||||||
var errg errgroup.Group
|
var errg errgroup.Group
|
||||||
for i := 0; i < 10; i++ {
|
for range 3 {
|
||||||
errg.Go(testTCPConn(clientPort, 10240*1024, time.Second*20))
|
errg.Go(testTCPConn(clientPort, 10240*1024, time.Second*20))
|
||||||
}
|
}
|
||||||
if err := errg.Wait(); err != nil {
|
if err := errg.Wait(); err != nil {
|
||||||
|
|||||||
@@ -182,7 +182,7 @@ func TestReverseProxy(t *testing.T) {
|
|||||||
defer CloseAllServers(servers)
|
defer CloseAllServers(servers)
|
||||||
|
|
||||||
var errg errgroup.Group
|
var errg errgroup.Group
|
||||||
for i := 0; i < 32; i++ {
|
for range 32 {
|
||||||
errg.Go(testTCPConn(externalPort, 10240*1024, time.Second*40))
|
errg.Go(testTCPConn(externalPort, 10240*1024, time.Second*40))
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -374,7 +374,7 @@ func TestReverseProxyLongRunning(t *testing.T) {
|
|||||||
|
|
||||||
defer CloseAllServers(servers)
|
defer CloseAllServers(servers)
|
||||||
|
|
||||||
for i := 0; i < 4096; i++ {
|
for range 4096 {
|
||||||
if err := testTCPConn(externalPort, 1024, time.Second*20)(); err != nil {
|
if err := testTCPConn(externalPort, 1024, time.Second*20)(); err != nil {
|
||||||
t.Error(err)
|
t.Error(err)
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -124,7 +124,7 @@ func testShadowsocks2022Tcp(t *testing.T, method string, password string) {
|
|||||||
defer CloseAllServers(servers)
|
defer CloseAllServers(servers)
|
||||||
|
|
||||||
var errGroup errgroup.Group
|
var errGroup errgroup.Group
|
||||||
for i := 0; i < 10; i++ {
|
for range 3 {
|
||||||
errGroup.Go(testTCPConn(clientPort, 10240*1024, time.Second*20))
|
errGroup.Go(testTCPConn(clientPort, 10240*1024, time.Second*20))
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -207,7 +207,7 @@ func testShadowsocks2022Udp(t *testing.T, method string, password string) {
|
|||||||
defer CloseAllServers(servers)
|
defer CloseAllServers(servers)
|
||||||
|
|
||||||
var errGroup errgroup.Group
|
var errGroup errgroup.Group
|
||||||
for i := 0; i < 2; i++ {
|
for range 3 {
|
||||||
errGroup.Go(testUDPConn(udpClientPort, 1024, time.Second*5))
|
errGroup.Go(testUDPConn(udpClientPort, 1024, time.Second*5))
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|||||||
@@ -96,7 +96,7 @@ func TestShadowsocksChaCha20Poly1305TCP(t *testing.T) {
|
|||||||
defer CloseAllServers(servers)
|
defer CloseAllServers(servers)
|
||||||
|
|
||||||
var errGroup errgroup.Group
|
var errGroup errgroup.Group
|
||||||
for i := 0; i < 10; i++ {
|
for range 3 {
|
||||||
errGroup.Go(testTCPConn(clientPort, 10240*1024, time.Second*20))
|
errGroup.Go(testTCPConn(clientPort, 10240*1024, time.Second*20))
|
||||||
}
|
}
|
||||||
if err := errGroup.Wait(); err != nil {
|
if err := errGroup.Wait(); err != nil {
|
||||||
@@ -192,7 +192,7 @@ func TestShadowsocksAES256GCMTCP(t *testing.T) {
|
|||||||
defer CloseAllServers(servers)
|
defer CloseAllServers(servers)
|
||||||
|
|
||||||
var errGroup errgroup.Group
|
var errGroup errgroup.Group
|
||||||
for i := 0; i < 10; i++ {
|
for range 3 {
|
||||||
errGroup.Go(testTCPConn(clientPort, 10240*1024, time.Second*20))
|
errGroup.Go(testTCPConn(clientPort, 10240*1024, time.Second*20))
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -289,7 +289,7 @@ func TestShadowsocksAES128GCMUDP(t *testing.T) {
|
|||||||
defer CloseAllServers(servers)
|
defer CloseAllServers(servers)
|
||||||
|
|
||||||
var errGroup errgroup.Group
|
var errGroup errgroup.Group
|
||||||
for i := 0; i < 2; i++ {
|
for range 3 {
|
||||||
errGroup.Go(testUDPConn(clientPort, 1024, time.Second*5))
|
errGroup.Go(testUDPConn(clientPort, 1024, time.Second*5))
|
||||||
}
|
}
|
||||||
if err := errGroup.Wait(); err != nil {
|
if err := errGroup.Wait(); err != nil {
|
||||||
@@ -391,7 +391,7 @@ func TestShadowsocksAES128GCMUDPMux(t *testing.T) {
|
|||||||
defer CloseAllServers(servers)
|
defer CloseAllServers(servers)
|
||||||
|
|
||||||
var errGroup errgroup.Group
|
var errGroup errgroup.Group
|
||||||
for i := 0; i < 2; i++ {
|
for range 3 {
|
||||||
errGroup.Go(testUDPConn(clientPort, 1024, time.Second*5))
|
errGroup.Go(testUDPConn(clientPort, 1024, time.Second*5))
|
||||||
}
|
}
|
||||||
if err := errGroup.Wait(); err != nil {
|
if err := errGroup.Wait(); err != nil {
|
||||||
@@ -477,7 +477,7 @@ func TestShadowsocksNone(t *testing.T) {
|
|||||||
defer CloseAllServers(servers)
|
defer CloseAllServers(servers)
|
||||||
|
|
||||||
var errGroup errgroup.Group
|
var errGroup errgroup.Group
|
||||||
for i := 0; i < 10; i++ {
|
for range 3 {
|
||||||
errGroup.Go(testTCPConn(clientPort, 10240*1024, time.Second*20))
|
errGroup.Go(testTCPConn(clientPort, 10240*1024, time.Second*20))
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|||||||
@@ -240,7 +240,7 @@ func TestAutoIssuingCertificate(t *testing.T) {
|
|||||||
common.Must(err)
|
common.Must(err)
|
||||||
defer CloseAllServers(servers)
|
defer CloseAllServers(servers)
|
||||||
|
|
||||||
for i := 0; i < 10; i++ {
|
for range 3 {
|
||||||
if err := testTCPConn(clientPort, 1024, time.Second*20)(); err != nil {
|
if err := testTCPConn(clientPort, 1024, time.Second*20)(); err != nil {
|
||||||
t.Error(err)
|
t.Error(err)
|
||||||
}
|
}
|
||||||
@@ -449,7 +449,7 @@ func TestTLSOverWebSocket(t *testing.T) {
|
|||||||
defer CloseAllServers(servers)
|
defer CloseAllServers(servers)
|
||||||
|
|
||||||
var errg errgroup.Group
|
var errg errgroup.Group
|
||||||
for i := 0; i < 10; i++ {
|
for range 3 {
|
||||||
errg.Go(testTCPConn(clientPort, 10240*1024, time.Second*20))
|
errg.Go(testTCPConn(clientPort, 10240*1024, time.Second*20))
|
||||||
}
|
}
|
||||||
if err := errg.Wait(); err != nil {
|
if err := errg.Wait(); err != nil {
|
||||||
@@ -565,7 +565,7 @@ func TestGRPC(t *testing.T) {
|
|||||||
defer CloseAllServers(servers)
|
defer CloseAllServers(servers)
|
||||||
|
|
||||||
var errg errgroup.Group
|
var errg errgroup.Group
|
||||||
for i := 0; i < 10; i++ {
|
for range 3 {
|
||||||
errg.Go(testTCPConn(clientPort, 1024*10240, time.Second*40))
|
errg.Go(testTCPConn(clientPort, 1024*10240, time.Second*40))
|
||||||
}
|
}
|
||||||
if err := errg.Wait(); err != nil {
|
if err := errg.Wait(); err != nil {
|
||||||
@@ -681,7 +681,7 @@ func TestGRPCMultiMode(t *testing.T) {
|
|||||||
defer CloseAllServers(servers)
|
defer CloseAllServers(servers)
|
||||||
|
|
||||||
var errg errgroup.Group
|
var errg errgroup.Group
|
||||||
for i := 0; i < 10; i++ {
|
for range 3 {
|
||||||
errg.Go(testTCPConn(clientPort, 1024*10240, time.Second*40))
|
errg.Go(testTCPConn(clientPort, 1024*10240, time.Second*40))
|
||||||
}
|
}
|
||||||
if err := errg.Wait(); err != nil {
|
if err := errg.Wait(); err != nil {
|
||||||
|
|||||||
@@ -117,7 +117,7 @@ func TestVless(t *testing.T) {
|
|||||||
defer CloseAllServers(servers)
|
defer CloseAllServers(servers)
|
||||||
|
|
||||||
var errg errgroup.Group
|
var errg errgroup.Group
|
||||||
for i := 0; i < 10; i++ {
|
for range 3 {
|
||||||
errg.Go(testTCPConn(clientPort, 1024*1024, time.Second*30))
|
errg.Go(testTCPConn(clientPort, 1024*1024, time.Second*30))
|
||||||
}
|
}
|
||||||
if err := errg.Wait(); err != nil {
|
if err := errg.Wait(); err != nil {
|
||||||
@@ -239,7 +239,7 @@ func TestVlessTls(t *testing.T) {
|
|||||||
defer CloseAllServers(servers)
|
defer CloseAllServers(servers)
|
||||||
|
|
||||||
var errg errgroup.Group
|
var errg errgroup.Group
|
||||||
for i := 0; i < 10; i++ {
|
for range 3 {
|
||||||
errg.Go(testTCPConn(clientPort, 1024*1024, time.Second*30))
|
errg.Go(testTCPConn(clientPort, 1024*1024, time.Second*30))
|
||||||
}
|
}
|
||||||
if err := errg.Wait(); err != nil {
|
if err := errg.Wait(); err != nil {
|
||||||
@@ -363,7 +363,7 @@ func TestVlessXtlsVision(t *testing.T) {
|
|||||||
defer CloseAllServers(servers)
|
defer CloseAllServers(servers)
|
||||||
|
|
||||||
var errg errgroup.Group
|
var errg errgroup.Group
|
||||||
for i := 0; i < 10; i++ {
|
for range 3 {
|
||||||
errg.Go(testTCPConn(clientPort, 1024*1024, time.Second*30))
|
errg.Go(testTCPConn(clientPort, 1024*1024, time.Second*30))
|
||||||
}
|
}
|
||||||
if err := errg.Wait(); err != nil {
|
if err := errg.Wait(); err != nil {
|
||||||
@@ -502,7 +502,7 @@ func TestVlessXtlsVisionReality(t *testing.T) {
|
|||||||
defer CloseAllServers(servers)
|
defer CloseAllServers(servers)
|
||||||
|
|
||||||
var errg errgroup.Group
|
var errg errgroup.Group
|
||||||
for i := 0; i < 1; i++ {
|
for range 3 {
|
||||||
errg.Go(testTCPConn(clientPort, 1024*1024, time.Second*30))
|
errg.Go(testTCPConn(clientPort, 1024*1024, time.Second*30))
|
||||||
}
|
}
|
||||||
if err := errg.Wait(); err != nil {
|
if err := errg.Wait(); err != nil {
|
||||||
|
|||||||
@@ -260,7 +260,7 @@ func TestVMessGCM(t *testing.T) {
|
|||||||
defer CloseAllServers(servers)
|
defer CloseAllServers(servers)
|
||||||
|
|
||||||
var errg errgroup.Group
|
var errg errgroup.Group
|
||||||
for i := 0; i < 10; i++ {
|
for range 3 {
|
||||||
errg.Go(testTCPConn(clientPort, 10240*1024, time.Second*40))
|
errg.Go(testTCPConn(clientPort, 10240*1024, time.Second*40))
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -366,7 +366,7 @@ func TestVMessGCMReadv(t *testing.T) {
|
|||||||
defer CloseAllServers(servers)
|
defer CloseAllServers(servers)
|
||||||
|
|
||||||
var errg errgroup.Group
|
var errg errgroup.Group
|
||||||
for i := 0; i < 10; i++ {
|
for range 3 {
|
||||||
errg.Go(testTCPConn(clientPort, 10240*1024, time.Second*40))
|
errg.Go(testTCPConn(clientPort, 10240*1024, time.Second*40))
|
||||||
}
|
}
|
||||||
if err := errg.Wait(); err != nil {
|
if err := errg.Wait(); err != nil {
|
||||||
@@ -465,7 +465,7 @@ func TestVMessGCMUDP(t *testing.T) {
|
|||||||
defer CloseAllServers(servers)
|
defer CloseAllServers(servers)
|
||||||
|
|
||||||
var errg errgroup.Group
|
var errg errgroup.Group
|
||||||
for i := 0; i < 2; i++ {
|
for range 3 {
|
||||||
errg.Go(testUDPConn(clientPort, 1024, time.Second*5))
|
errg.Go(testUDPConn(clientPort, 1024, time.Second*5))
|
||||||
}
|
}
|
||||||
if err := errg.Wait(); err != nil {
|
if err := errg.Wait(); err != nil {
|
||||||
@@ -564,7 +564,7 @@ func TestVMessChacha20(t *testing.T) {
|
|||||||
defer CloseAllServers(servers)
|
defer CloseAllServers(servers)
|
||||||
|
|
||||||
var errg errgroup.Group
|
var errg errgroup.Group
|
||||||
for i := 0; i < 10; i++ {
|
for range 3 {
|
||||||
errg.Go(testTCPConn(clientPort, 10240*1024, time.Second*20))
|
errg.Go(testTCPConn(clientPort, 10240*1024, time.Second*20))
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -664,7 +664,7 @@ func TestVMessNone(t *testing.T) {
|
|||||||
defer CloseAllServers(servers)
|
defer CloseAllServers(servers)
|
||||||
|
|
||||||
var errg errgroup.Group
|
var errg errgroup.Group
|
||||||
for i := 0; i < 10; i++ {
|
for range 3 {
|
||||||
errg.Go(testTCPConn(clientPort, 1024*1024, time.Second*30))
|
errg.Go(testTCPConn(clientPort, 1024*1024, time.Second*30))
|
||||||
}
|
}
|
||||||
if err := errg.Wait(); err != nil {
|
if err := errg.Wait(); err != nil {
|
||||||
@@ -771,7 +771,7 @@ func TestVMessKCP(t *testing.T) {
|
|||||||
defer CloseAllServers(servers)
|
defer CloseAllServers(servers)
|
||||||
|
|
||||||
var errg errgroup.Group
|
var errg errgroup.Group
|
||||||
for i := 0; i < 2; i++ {
|
for range 3 {
|
||||||
errg.Go(testTCPConn(clientPort, 1024, time.Minute*2))
|
errg.Go(testTCPConn(clientPort, 1024, time.Minute*2))
|
||||||
}
|
}
|
||||||
if err := errg.Wait(); err != nil {
|
if err := errg.Wait(); err != nil {
|
||||||
@@ -915,7 +915,7 @@ func TestVMessKCPLarge(t *testing.T) {
|
|||||||
common.Must(err)
|
common.Must(err)
|
||||||
|
|
||||||
var errg errgroup.Group
|
var errg errgroup.Group
|
||||||
for i := 0; i < 2; i++ {
|
for range 3 {
|
||||||
errg.Go(testTCPConn(clientPort, 513*1024, time.Minute*5))
|
errg.Go(testTCPConn(clientPort, 513*1024, time.Minute*5))
|
||||||
}
|
}
|
||||||
if err := errg.Wait(); err != nil {
|
if err := errg.Wait(); err != nil {
|
||||||
@@ -1026,7 +1026,7 @@ func TestVMessGCMMux(t *testing.T) {
|
|||||||
|
|
||||||
for range "abcd" {
|
for range "abcd" {
|
||||||
var errg errgroup.Group
|
var errg errgroup.Group
|
||||||
for i := 0; i < 16; i++ {
|
for range 3 {
|
||||||
errg.Go(testTCPConn(clientPort, 10240, time.Second*20))
|
errg.Go(testTCPConn(clientPort, 10240, time.Second*20))
|
||||||
}
|
}
|
||||||
if err := errg.Wait(); err != nil {
|
if err := errg.Wait(); err != nil {
|
||||||
@@ -1152,7 +1152,7 @@ func TestVMessGCMMuxUDP(t *testing.T) {
|
|||||||
|
|
||||||
for range "ab" {
|
for range "ab" {
|
||||||
var errg errgroup.Group
|
var errg errgroup.Group
|
||||||
for i := 0; i < 2; i++ {
|
for range 3 {
|
||||||
errg.Go(testTCPConn(clientPort, 1024, time.Second*10))
|
errg.Go(testTCPConn(clientPort, 1024, time.Second*10))
|
||||||
errg.Go(testUDPConn(clientUDPPort, 1024, time.Second*10))
|
errg.Go(testUDPConn(clientUDPPort, 1024, time.Second*10))
|
||||||
}
|
}
|
||||||
@@ -1259,7 +1259,7 @@ func TestVMessZero(t *testing.T) {
|
|||||||
defer CloseAllServers(servers)
|
defer CloseAllServers(servers)
|
||||||
|
|
||||||
var errg errgroup.Group
|
var errg errgroup.Group
|
||||||
for i := 0; i < 10; i++ {
|
for range 3 {
|
||||||
errg.Go(testTCPConn(clientPort, 1024*1024, time.Second*30))
|
errg.Go(testTCPConn(clientPort, 1024*1024, time.Second*30))
|
||||||
}
|
}
|
||||||
if err := errg.Wait(); err != nil {
|
if err := errg.Wait(); err != nil {
|
||||||
@@ -1361,7 +1361,7 @@ func TestVMessGCMLengthAuth(t *testing.T) {
|
|||||||
defer CloseAllServers(servers)
|
defer CloseAllServers(servers)
|
||||||
|
|
||||||
var errg errgroup.Group
|
var errg errgroup.Group
|
||||||
for i := 0; i < 10; i++ {
|
for range 3 {
|
||||||
errg.Go(testTCPConn(clientPort, 10240*1024, time.Second*40))
|
errg.Go(testTCPConn(clientPort, 10240*1024, time.Second*40))
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -1465,7 +1465,7 @@ func TestVMessGCMLengthAuthPlusNoTerminationSignal(t *testing.T) {
|
|||||||
defer CloseAllServers(servers)
|
defer CloseAllServers(servers)
|
||||||
|
|
||||||
var errg errgroup.Group
|
var errg errgroup.Group
|
||||||
for i := 0; i < 10; i++ {
|
for range 3 {
|
||||||
errg.Go(testTCPConn(clientPort, 10240*1024, time.Second*40))
|
errg.Go(testTCPConn(clientPort, 10240*1024, time.Second*40))
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|||||||
@@ -9,5 +9,5 @@ import (
|
|||||||
|
|
||||||
func NewAEADAESGCMBasedOnSeed(seed string) cipher.AEAD {
|
func NewAEADAESGCMBasedOnSeed(seed string) cipher.AEAD {
|
||||||
hashedSeed := sha256.Sum256([]byte(seed))
|
hashedSeed := sha256.Sum256([]byte(seed))
|
||||||
return crypto.NewAesGcm(hashedSeed[:])
|
return crypto.NewAesGcm(hashedSeed[:16])
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -22,8 +22,24 @@ type ResponseCallback func(ctx context.Context, packet *udp.Packet)
|
|||||||
|
|
||||||
type connEntry struct {
|
type connEntry struct {
|
||||||
link *transport.Link
|
link *transport.Link
|
||||||
timer signal.ActivityUpdater
|
timer *signal.ActivityTimer
|
||||||
cancel context.CancelFunc
|
cancel context.CancelFunc
|
||||||
|
closed bool
|
||||||
|
}
|
||||||
|
|
||||||
|
func (c *connEntry) Close() error {
|
||||||
|
c.timer.SetTimeout(0)
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func (c *connEntry) terminate() {
|
||||||
|
if c.closed {
|
||||||
|
panic("terminate called more than once")
|
||||||
|
}
|
||||||
|
c.closed = true
|
||||||
|
c.cancel()
|
||||||
|
common.Interrupt(c.link.Reader)
|
||||||
|
common.Interrupt(c.link.Writer)
|
||||||
}
|
}
|
||||||
|
|
||||||
type Dispatcher struct {
|
type Dispatcher struct {
|
||||||
@@ -32,6 +48,7 @@ type Dispatcher struct {
|
|||||||
dispatcher routing.Dispatcher
|
dispatcher routing.Dispatcher
|
||||||
callback ResponseCallback
|
callback ResponseCallback
|
||||||
callClose func() error
|
callClose func() error
|
||||||
|
closed bool
|
||||||
}
|
}
|
||||||
|
|
||||||
func NewDispatcher(dispatcher routing.Dispatcher, callback ResponseCallback) *Dispatcher {
|
func NewDispatcher(dispatcher routing.Dispatcher, callback ResponseCallback) *Dispatcher {
|
||||||
@@ -44,13 +61,9 @@ func NewDispatcher(dispatcher routing.Dispatcher, callback ResponseCallback) *Di
|
|||||||
func (v *Dispatcher) RemoveRay() {
|
func (v *Dispatcher) RemoveRay() {
|
||||||
v.Lock()
|
v.Lock()
|
||||||
defer v.Unlock()
|
defer v.Unlock()
|
||||||
v.removeRay()
|
v.closed = true
|
||||||
}
|
|
||||||
|
|
||||||
func (v *Dispatcher) removeRay() {
|
|
||||||
if v.conn != nil {
|
if v.conn != nil {
|
||||||
common.Interrupt(v.conn.link.Reader)
|
v.conn.Close()
|
||||||
common.Close(v.conn.link.Writer)
|
|
||||||
v.conn = nil
|
v.conn = nil
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
@@ -59,35 +72,34 @@ func (v *Dispatcher) getInboundRay(ctx context.Context, dest net.Destination) (*
|
|||||||
v.Lock()
|
v.Lock()
|
||||||
defer v.Unlock()
|
defer v.Unlock()
|
||||||
|
|
||||||
|
if v.closed {
|
||||||
|
return nil, errors.New("dispatcher is closed")
|
||||||
|
}
|
||||||
|
|
||||||
if v.conn != nil {
|
if v.conn != nil {
|
||||||
return v.conn, nil
|
if v.conn.closed {
|
||||||
|
v.conn = nil
|
||||||
|
} else {
|
||||||
|
return v.conn, nil
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
errors.LogInfo(ctx, "establishing new connection for ", dest)
|
errors.LogInfo(ctx, "establishing new connection for ", dest)
|
||||||
|
|
||||||
ctx, cancel := context.WithCancel(ctx)
|
ctx, cancel := context.WithCancel(ctx)
|
||||||
entry := &connEntry{}
|
|
||||||
removeRay := func() {
|
|
||||||
v.Lock()
|
|
||||||
defer v.Unlock()
|
|
||||||
// sometimes the entry is already removed by others, don't close again
|
|
||||||
if entry == v.conn {
|
|
||||||
cancel()
|
|
||||||
v.removeRay()
|
|
||||||
}
|
|
||||||
}
|
|
||||||
timer := signal.CancelAfterInactivity(ctx, removeRay, time.Minute)
|
|
||||||
|
|
||||||
link, err := v.dispatcher.Dispatch(ctx, dest)
|
link, err := v.dispatcher.Dispatch(ctx, dest)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
|
cancel()
|
||||||
return nil, errors.New("failed to dispatch request to ", dest).Base(err)
|
return nil, errors.New("failed to dispatch request to ", dest).Base(err)
|
||||||
}
|
}
|
||||||
|
|
||||||
*entry = connEntry{
|
entry := &connEntry{
|
||||||
link: link,
|
link: link,
|
||||||
timer: timer,
|
cancel: cancel,
|
||||||
cancel: removeRay,
|
|
||||||
}
|
}
|
||||||
|
|
||||||
|
entry.timer = signal.CancelAfterInactivity(ctx, entry.terminate, time.Minute)
|
||||||
v.conn = entry
|
v.conn = entry
|
||||||
go handleInput(ctx, entry, dest, v.callback, v.callClose)
|
go handleInput(ctx, entry, dest, v.callback, v.callClose)
|
||||||
return entry, nil
|
return entry, nil
|
||||||
@@ -106,7 +118,7 @@ func (v *Dispatcher) Dispatch(ctx context.Context, destination net.Destination,
|
|||||||
if outputStream != nil {
|
if outputStream != nil {
|
||||||
if err := outputStream.WriteMultiBuffer(buf.MultiBuffer{payload}); err != nil {
|
if err := outputStream.WriteMultiBuffer(buf.MultiBuffer{payload}); err != nil {
|
||||||
errors.LogInfoInner(ctx, err, "failed to write first UDP payload")
|
errors.LogInfoInner(ctx, err, "failed to write first UDP payload")
|
||||||
conn.cancel()
|
conn.Close()
|
||||||
return
|
return
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
@@ -114,7 +126,7 @@ func (v *Dispatcher) Dispatch(ctx context.Context, destination net.Destination,
|
|||||||
|
|
||||||
func handleInput(ctx context.Context, conn *connEntry, dest net.Destination, callback ResponseCallback, callClose func() error) {
|
func handleInput(ctx context.Context, conn *connEntry, dest net.Destination, callback ResponseCallback, callClose func() error) {
|
||||||
defer func() {
|
defer func() {
|
||||||
conn.cancel()
|
conn.Close()
|
||||||
if callClose != nil {
|
if callClose != nil {
|
||||||
callClose()
|
callClose()
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -200,16 +200,19 @@ func (p *pipe) Interrupt() {
|
|||||||
p.Lock()
|
p.Lock()
|
||||||
defer p.Unlock()
|
defer p.Unlock()
|
||||||
|
|
||||||
|
if !p.data.IsEmpty() {
|
||||||
|
buf.ReleaseMulti(p.data)
|
||||||
|
p.data = nil
|
||||||
|
if p.state == closed {
|
||||||
|
p.state = errord
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
if p.state == closed || p.state == errord {
|
if p.state == closed || p.state == errord {
|
||||||
return
|
return
|
||||||
}
|
}
|
||||||
|
|
||||||
p.state = errord
|
p.state = errord
|
||||||
|
|
||||||
if !p.data.IsEmpty() {
|
|
||||||
buf.ReleaseMulti(p.data)
|
|
||||||
p.data = nil
|
|
||||||
}
|
|
||||||
|
|
||||||
common.Must(p.done.Close())
|
common.Must(p.done.Close())
|
||||||
}
|
}
|
||||||
|
|||||||
Reference in New Issue
Block a user