sock5.go 7.0 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310
  1. package lib
  2. import (
  3. "encoding/binary"
  4. "errors"
  5. "io"
  6. "log"
  7. "net"
  8. "strconv"
  9. "strings"
  10. )
  11. const (
  12. ipV4 = 1
  13. domainName = 3
  14. ipV6 = 4
  15. connectMethod = 1
  16. bindMethod = 2
  17. associateMethod = 3
  18. // The maximum packet size of any udp Associate packet, based on ethernet's max size,
  19. // minus the IP and UDP headers. IPv4 has a 20 byte header, UDP adds an
  20. // additional 4 bytes. This is a total overhead of 24 bytes. Ethernet's
  21. // max packet size is 1500 bytes, 1500 - 24 = 1476.
  22. maxUDPPacketSize = 1476
  23. )
  24. const (
  25. succeeded uint8 = iota
  26. serverFailure
  27. notAllowed
  28. networkUnreachable
  29. hostUnreachable
  30. connectionRefused
  31. ttlExpired
  32. commandNotSupported
  33. addrTypeNotSupported
  34. )
  35. const (
  36. UserPassAuth = uint8(2)
  37. userAuthVersion = uint8(1)
  38. authSuccess = uint8(0)
  39. authFailure = uint8(1)
  40. )
  41. type Sock5ModeServer struct {
  42. bridge *Tunnel
  43. httpPort int
  44. u string //用户名
  45. p string //密码
  46. enCompress int
  47. deCompress int
  48. isVerify bool
  49. listener net.Listener
  50. vKey string
  51. crypt bool
  52. }
  53. func (s *Sock5ModeServer) handleRequest(c net.Conn) {
  54. /*
  55. The SOCKS request is formed as follows:
  56. +----+-----+-------+------+----------+----------+
  57. |VER | CMD | RSV | ATYP | DST.ADDR | DST.PORT |
  58. +----+-----+-------+------+----------+----------+
  59. | 1 | 1 | X'00' | 1 | Variable | 2 |
  60. +----+-----+-------+------+----------+----------+
  61. */
  62. header := make([]byte, 3)
  63. _, err := io.ReadFull(c, header)
  64. if err != nil {
  65. log.Println("illegal request", err)
  66. c.Close()
  67. return
  68. }
  69. switch header[1] {
  70. case connectMethod:
  71. s.handleConnect(c)
  72. case bindMethod:
  73. s.handleBind(c)
  74. case associateMethod:
  75. s.handleUDP(c)
  76. default:
  77. s.sendReply(c, commandNotSupported)
  78. c.Close()
  79. }
  80. }
  81. func (s *Sock5ModeServer) sendReply(c net.Conn, rep uint8) {
  82. reply := []byte{
  83. 5,
  84. rep,
  85. 0,
  86. 1,
  87. }
  88. localAddr := c.LocalAddr().String()
  89. localHost, localPort, _ := net.SplitHostPort(localAddr)
  90. ipBytes := net.ParseIP(localHost).To4()
  91. nPort, _ := strconv.Atoi(localPort)
  92. reply = append(reply, ipBytes...)
  93. portBytes := make([]byte, 2)
  94. binary.BigEndian.PutUint16(portBytes, uint16(nPort))
  95. reply = append(reply, portBytes...)
  96. c.Write(reply)
  97. }
  98. func (s *Sock5ModeServer) doConnect(c net.Conn, command uint8) (proxyConn *Conn, err error) {
  99. addrType := make([]byte, 1)
  100. c.Read(addrType)
  101. var host string
  102. switch addrType[0] {
  103. case ipV4:
  104. ipv4 := make(net.IP, net.IPv4len)
  105. c.Read(ipv4)
  106. host = ipv4.String()
  107. case ipV6:
  108. ipv6 := make(net.IP, net.IPv6len)
  109. c.Read(ipv6)
  110. host = ipv6.String()
  111. case domainName:
  112. var domainLen uint8
  113. binary.Read(c, binary.BigEndian, &domainLen)
  114. domain := make([]byte, domainLen)
  115. c.Read(domain)
  116. host = string(domain)
  117. default:
  118. s.sendReply(c, addrTypeNotSupported)
  119. err = errors.New("Address type not supported")
  120. return nil, err
  121. }
  122. var port uint16
  123. binary.Read(c, binary.BigEndian, &port)
  124. // connect to host
  125. addr := net.JoinHostPort(host, strconv.Itoa(int(port)))
  126. client, err := s.bridge.GetTunnel(getverifyval(s.vKey), s.enCompress, s.deCompress, s.crypt)
  127. if err != nil {
  128. log.Println(err)
  129. client.Close()
  130. return
  131. }
  132. s.sendReply(c, succeeded)
  133. var ltype string
  134. if command == associateMethod {
  135. ltype = CONN_UDP
  136. } else {
  137. ltype = CONN_TCP
  138. }
  139. _, err = client.WriteHost(ltype, addr)
  140. return client, nil
  141. }
  142. func (s *Sock5ModeServer) handleConnect(c net.Conn) {
  143. proxyConn, err := s.doConnect(c, connectMethod)
  144. if err != nil {
  145. log.Println(err)
  146. c.Close()
  147. } else {
  148. go relay(proxyConn, NewConn(c), s.enCompress, s.crypt)
  149. go relay(NewConn(c), proxyConn, s.deCompress, s.crypt)
  150. }
  151. }
  152. // passive mode
  153. func (s *Sock5ModeServer) handleBind(c net.Conn) {
  154. }
  155. func (s *Sock5ModeServer) handleUDP(c net.Conn) {
  156. log.Println("UDP Associate")
  157. /*
  158. +----+------+------+----------+----------+----------+
  159. |RSV | FRAG | ATYP | DST.ADDR | DST.PORT | DATA |
  160. +----+------+------+----------+----------+----------+
  161. | 2 | 1 | 1 | Variable | 2 | Variable |
  162. +----+------+------+----------+----------+----------+
  163. */
  164. buf := make([]byte, 3)
  165. c.Read(buf)
  166. // relay udp datagram silently, without any notification to the requesting client
  167. if buf[2] != 0 {
  168. // does not support fragmentation, drop it
  169. log.Println("does not support fragmentation, drop")
  170. dummy := make([]byte, maxUDPPacketSize)
  171. c.Read(dummy)
  172. }
  173. proxyConn, err := s.doConnect(c, associateMethod)
  174. if err != nil {
  175. c.Close()
  176. } else {
  177. go relay(proxyConn, NewConn(c), s.enCompress, s.crypt)
  178. go relay(NewConn(c), proxyConn, s.deCompress, s.crypt)
  179. }
  180. }
  181. func (s *Sock5ModeServer) handleNewConn(c net.Conn) {
  182. buf := make([]byte, 2)
  183. if _, err := io.ReadFull(c, buf); err != nil {
  184. log.Println("negotiation err", err)
  185. c.Close()
  186. return
  187. }
  188. if version := buf[0]; version != 5 {
  189. log.Println("only support socks5, request from: ", c.RemoteAddr())
  190. c.Close()
  191. return
  192. }
  193. nMethods := buf[1]
  194. methods := make([]byte, nMethods)
  195. if len, err := c.Read(methods); len != int(nMethods) || err != nil {
  196. log.Println("wrong method")
  197. c.Close()
  198. return
  199. }
  200. if s.isVerify {
  201. buf[1] = UserPassAuth
  202. c.Write(buf)
  203. if err := s.Auth(c); err != nil {
  204. c.Close()
  205. log.Println("验证失败:", err)
  206. return
  207. }
  208. } else {
  209. buf[1] = 0
  210. c.Write(buf)
  211. }
  212. s.handleRequest(c)
  213. }
  214. func (s *Sock5ModeServer) Auth(c net.Conn) error {
  215. header := []byte{0, 0}
  216. if _, err := io.ReadAtLeast(c, header, 2); err != nil {
  217. return err
  218. }
  219. if header[0] != userAuthVersion {
  220. return errors.New("验证方式不被支持")
  221. }
  222. userLen := int(header[1])
  223. user := make([]byte, userLen)
  224. if _, err := io.ReadAtLeast(c, user, userLen); err != nil {
  225. return err
  226. }
  227. if _, err := c.Read(header[:1]); err != nil {
  228. return errors.New("密码长度获取错误")
  229. }
  230. passLen := int(header[0])
  231. pass := make([]byte, passLen)
  232. if _, err := io.ReadAtLeast(c, pass, passLen); err != nil {
  233. return err
  234. }
  235. if string(pass) == s.p && string(user) == s.u {
  236. if _, err := c.Write([]byte{userAuthVersion, authSuccess}); err != nil {
  237. return err
  238. }
  239. return nil
  240. } else {
  241. if _, err := c.Write([]byte{userAuthVersion, authFailure}); err != nil {
  242. return err
  243. }
  244. return errors.New("验证不通过")
  245. }
  246. return errors.New("未知错误")
  247. }
  248. func (s *Sock5ModeServer) Start() error {
  249. s.listener, err = net.Listen("tcp", ":"+strconv.Itoa(s.httpPort))
  250. if err != nil {
  251. return err
  252. }
  253. for {
  254. conn, err := s.listener.Accept()
  255. if err != nil {
  256. if strings.Contains(err.Error(), "use of closed network connection") {
  257. break
  258. }
  259. log.Fatal("accept error: ", err)
  260. }
  261. go s.handleNewConn(conn)
  262. }
  263. return nil
  264. }
  265. func (s *Sock5ModeServer) Close() error {
  266. return s.listener.Close()
  267. }
  268. func NewSock5ModeServer(httpPort int, u, p string, brige *Tunnel, enCompress int, deCompress int, vKey string, crypt bool) *Sock5ModeServer {
  269. s := new(Sock5ModeServer)
  270. s.httpPort = httpPort
  271. s.bridge = brige
  272. if u != "" && p != "" {
  273. s.isVerify = true
  274. s.u = u
  275. s.p = p
  276. } else {
  277. s.isVerify = false
  278. }
  279. s.enCompress = enCompress
  280. s.deCompress = deCompress
  281. s.vKey = vKey
  282. s.crypt = crypt
  283. return s
  284. }