socks5.go 7.4 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324
  1. package server
  2. import (
  3. "encoding/binary"
  4. "errors"
  5. "github.com/cnlh/easyProxy/bridge"
  6. "github.com/cnlh/easyProxy/utils"
  7. "io"
  8. "log"
  9. "net"
  10. "strconv"
  11. "strings"
  12. )
  13. const (
  14. ipV4 = 1
  15. domainName = 3
  16. ipV6 = 4
  17. connectMethod = 1
  18. bindMethod = 2
  19. associateMethod = 3
  20. // The maximum packet size of any udp Associate packet, based on ethernet's max size,
  21. // minus the IP and UDP headers. IPv4 has a 20 byte header, UDP adds an
  22. // additional 4 bytes. This is a total overhead of 24 bytes. Ethernet's
  23. // max packet size is 1500 bytes, 1500 - 24 = 1476.
  24. maxUDPPacketSize = 1476
  25. )
  26. const (
  27. succeeded uint8 = iota
  28. serverFailure
  29. notAllowed
  30. networkUnreachable
  31. hostUnreachable
  32. connectionRefused
  33. ttlExpired
  34. commandNotSupported
  35. addrTypeNotSupported
  36. )
  37. const (
  38. UserPassAuth = uint8(2)
  39. userAuthVersion = uint8(1)
  40. authSuccess = uint8(0)
  41. authFailure = uint8(1)
  42. )
  43. type Sock5ModeServer struct {
  44. bridge *bridge.Tunnel
  45. isVerify bool
  46. listener net.Listener
  47. config *ServerConfig
  48. }
  49. //req
  50. func (s *Sock5ModeServer) handleRequest(c net.Conn) {
  51. /*
  52. The SOCKS request is formed as follows:
  53. +----+-----+-------+------+----------+----------+
  54. |VER | CMD | RSV | ATYP | DST.ADDR | DST.PORT |
  55. +----+-----+-------+------+----------+----------+
  56. | 1 | 1 | X'00' | 1 | Variable | 2 |
  57. +----+-----+-------+------+----------+----------+
  58. */
  59. header := make([]byte, 3)
  60. _, err := io.ReadFull(c, header)
  61. if err != nil {
  62. log.Println("illegal request", err)
  63. c.Close()
  64. return
  65. }
  66. switch header[1] {
  67. case connectMethod:
  68. s.handleConnect(c)
  69. case bindMethod:
  70. s.handleBind(c)
  71. case associateMethod:
  72. s.handleUDP(c)
  73. default:
  74. s.sendReply(c, commandNotSupported)
  75. c.Close()
  76. }
  77. }
  78. //reply
  79. func (s *Sock5ModeServer) sendReply(c net.Conn, rep uint8) {
  80. reply := []byte{
  81. 5,
  82. rep,
  83. 0,
  84. 1,
  85. }
  86. localAddr := c.LocalAddr().String()
  87. localHost, localPort, _ := net.SplitHostPort(localAddr)
  88. ipBytes := net.ParseIP(localHost).To4()
  89. nPort, _ := strconv.Atoi(localPort)
  90. reply = append(reply, ipBytes...)
  91. portBytes := make([]byte, 2)
  92. binary.BigEndian.PutUint16(portBytes, uint16(nPort))
  93. reply = append(reply, portBytes...)
  94. c.Write(reply)
  95. }
  96. //do conn
  97. func (s *Sock5ModeServer) doConnect(c net.Conn, command uint8) (proxyConn *utils.Conn, err error) {
  98. addrType := make([]byte, 1)
  99. c.Read(addrType)
  100. var host string
  101. switch addrType[0] {
  102. case ipV4:
  103. ipv4 := make(net.IP, net.IPv4len)
  104. c.Read(ipv4)
  105. host = ipv4.String()
  106. case ipV6:
  107. ipv6 := make(net.IP, net.IPv6len)
  108. c.Read(ipv6)
  109. host = ipv6.String()
  110. case domainName:
  111. var domainLen uint8
  112. binary.Read(c, binary.BigEndian, &domainLen)
  113. domain := make([]byte, domainLen)
  114. c.Read(domain)
  115. host = string(domain)
  116. default:
  117. s.sendReply(c, addrTypeNotSupported)
  118. err = errors.New("Address type not supported")
  119. return nil, err
  120. }
  121. var port uint16
  122. binary.Read(c, binary.BigEndian, &port)
  123. // connect to host
  124. addr := net.JoinHostPort(host, strconv.Itoa(int(port)))
  125. client, err := s.bridge.GetTunnel(getverifyval(s.config.VerifyKey), s.config.CompressEncode, s.config.CompressDecode, s.config.Crypt, s.config.Mux)
  126. if err != nil {
  127. log.Println(err)
  128. return
  129. }
  130. s.sendReply(c, succeeded)
  131. var ltype string
  132. if command == associateMethod {
  133. ltype = utils.CONN_UDP
  134. } else {
  135. ltype = utils.CONN_TCP
  136. }
  137. _, err = client.WriteHost(ltype, addr)
  138. var flag string
  139. if flag, err = client.ReadFlag(); err == nil {
  140. if flag != utils.CONN_SUCCESS {
  141. err = errors.New("conn failed")
  142. }
  143. }
  144. return client, err
  145. }
  146. //conn
  147. func (s *Sock5ModeServer) handleConnect(c net.Conn) {
  148. proxyConn, err := s.doConnect(c, connectMethod)
  149. defer func() {
  150. if s.config.Mux {
  151. s.bridge.ReturnTunnel(proxyConn, getverifyval(s.config.VerifyKey))
  152. }
  153. }()
  154. if err != nil {
  155. c.Close()
  156. } else {
  157. go utils.Relay(proxyConn.Conn, c, s.config.CompressEncode, s.config.Crypt, s.config.Mux)
  158. utils.Relay(c, proxyConn.Conn, s.config.CompressDecode, s.config.Crypt, s.config.Mux)
  159. }
  160. }
  161. // passive mode
  162. func (s *Sock5ModeServer) handleBind(c net.Conn) {
  163. }
  164. //udp
  165. func (s *Sock5ModeServer) handleUDP(c net.Conn) {
  166. log.Println("UDP Associate")
  167. /*
  168. +----+------+------+----------+----------+----------+
  169. |RSV | FRAG | ATYP | DST.ADDR | DST.PORT | DATA |
  170. +----+------+------+----------+----------+----------+
  171. | 2 | 1 | 1 | Variable | 2 | Variable |
  172. +----+------+------+----------+----------+----------+
  173. */
  174. buf := make([]byte, 3)
  175. c.Read(buf)
  176. // relay udp datagram silently, without any notification to the requesting client
  177. if buf[2] != 0 {
  178. // does not support fragmentation, drop it
  179. log.Println("does not support fragmentation, drop")
  180. dummy := make([]byte, maxUDPPacketSize)
  181. c.Read(dummy)
  182. }
  183. proxyConn, err := s.doConnect(c, associateMethod)
  184. defer func() {
  185. if s.config.Mux {
  186. s.bridge.ReturnTunnel(proxyConn, getverifyval(s.config.VerifyKey))
  187. }
  188. }()
  189. if err != nil {
  190. c.Close()
  191. } else {
  192. go utils.Relay(proxyConn.Conn, c, s.config.CompressEncode, s.config.Crypt, s.config.Mux)
  193. utils.Relay(c, proxyConn.Conn, s.config.CompressDecode, s.config.Crypt, s.config.Mux)
  194. }
  195. }
  196. //new conn
  197. func (s *Sock5ModeServer) handleConn(c net.Conn) {
  198. buf := make([]byte, 2)
  199. if _, err := io.ReadFull(c, buf); err != nil {
  200. log.Println("negotiation err", err)
  201. c.Close()
  202. return
  203. }
  204. if version := buf[0]; version != 5 {
  205. log.Println("only support socks5, request from: ", c.RemoteAddr())
  206. c.Close()
  207. return
  208. }
  209. nMethods := buf[1]
  210. methods := make([]byte, nMethods)
  211. if len, err := c.Read(methods); len != int(nMethods) || err != nil {
  212. log.Println("wrong method")
  213. c.Close()
  214. return
  215. }
  216. if s.isVerify {
  217. buf[1] = UserPassAuth
  218. c.Write(buf)
  219. if err := s.Auth(c); err != nil {
  220. c.Close()
  221. log.Println("验证失败:", err)
  222. return
  223. }
  224. } else {
  225. buf[1] = 0
  226. c.Write(buf)
  227. }
  228. s.handleRequest(c)
  229. }
  230. //socks5 auth
  231. func (s *Sock5ModeServer) Auth(c net.Conn) error {
  232. header := []byte{0, 0}
  233. if _, err := io.ReadAtLeast(c, header, 2); err != nil {
  234. return err
  235. }
  236. if header[0] != userAuthVersion {
  237. return errors.New("验证方式不被支持")
  238. }
  239. userLen := int(header[1])
  240. user := make([]byte, userLen)
  241. if _, err := io.ReadAtLeast(c, user, userLen); err != nil {
  242. return err
  243. }
  244. if _, err := c.Read(header[:1]); err != nil {
  245. return errors.New("密码长度获取错误")
  246. }
  247. passLen := int(header[0])
  248. pass := make([]byte, passLen)
  249. if _, err := io.ReadAtLeast(c, pass, passLen); err != nil {
  250. return err
  251. }
  252. if string(pass) == s.config.U && string(user) == s.config.P {
  253. if _, err := c.Write([]byte{userAuthVersion, authSuccess}); err != nil {
  254. return err
  255. }
  256. return nil
  257. } else {
  258. if _, err := c.Write([]byte{userAuthVersion, authFailure}); err != nil {
  259. return err
  260. }
  261. return errors.New("验证不通过")
  262. }
  263. return errors.New("未知错误")
  264. }
  265. //start
  266. func (s *Sock5ModeServer) Start() error {
  267. var err error
  268. s.listener, err = net.Listen("tcp", ":"+strconv.Itoa(s.config.TcpPort))
  269. if err != nil {
  270. return err
  271. }
  272. for {
  273. conn, err := s.listener.Accept()
  274. if err != nil {
  275. if strings.Contains(err.Error(), "use of closed network connection") {
  276. break
  277. }
  278. log.Fatal("accept error: ", err)
  279. }
  280. go s.handleConn(conn)
  281. }
  282. return nil
  283. }
  284. //close
  285. func (s *Sock5ModeServer) Close() error {
  286. return s.listener.Close()
  287. }
  288. //new
  289. func NewSock5ModeServer(bridge *bridge.Tunnel, cnf *ServerConfig) *Sock5ModeServer {
  290. s := new(Sock5ModeServer)
  291. s.bridge = bridge
  292. s.config = cnf
  293. if s.config.U != "" && s.config.P != "" {
  294. s.isVerify = true
  295. } else {
  296. s.isVerify = false
  297. }
  298. return s
  299. }