control.go 11 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426
  1. package client
  2. import (
  3. "encoding/base64"
  4. "encoding/binary"
  5. "errors"
  6. "github.com/cnlh/nps/lib/common"
  7. "github.com/cnlh/nps/lib/config"
  8. "github.com/cnlh/nps/lib/conn"
  9. "github.com/cnlh/nps/lib/crypt"
  10. "github.com/cnlh/nps/lib/version"
  11. "github.com/cnlh/nps/vender/github.com/astaxie/beego/logs"
  12. "github.com/cnlh/nps/vender/github.com/ccding/go-stun/stun"
  13. "github.com/cnlh/nps/vender/github.com/xtaci/kcp"
  14. "github.com/cnlh/nps/vender/golang.org/x/net/proxy"
  15. "io/ioutil"
  16. "log"
  17. "net"
  18. "net/http"
  19. "net/http/httputil"
  20. "net/url"
  21. "os"
  22. "path/filepath"
  23. "strconv"
  24. "strings"
  25. "time"
  26. )
  27. func GetTaskStatus(path string) {
  28. cnf, err := config.NewConfig(path)
  29. if err != nil {
  30. log.Fatalln(err)
  31. }
  32. c, err := NewConn(cnf.CommonConfig.Tp, cnf.CommonConfig.VKey, cnf.CommonConfig.Server, common.WORK_CONFIG, cnf.CommonConfig.ProxyUrl)
  33. if err != nil {
  34. log.Fatalln(err)
  35. }
  36. if _, err := c.Write([]byte(common.WORK_STATUS)); err != nil {
  37. log.Fatalln(err)
  38. }
  39. //read now vKey and write to server
  40. if f, err := common.ReadAllFromFile(filepath.Join(common.GetTmpPath(), "npc_vkey.txt")); err != nil {
  41. log.Fatalln(err)
  42. } else if _, err := c.Write([]byte(crypt.Md5(string(f)))); err != nil {
  43. log.Fatalln(err)
  44. }
  45. var isPub bool
  46. binary.Read(c, binary.LittleEndian, &isPub)
  47. if l, err := c.GetLen(); err != nil {
  48. log.Fatalln(err)
  49. } else if b, err := c.GetShortContent(l); err != nil {
  50. log.Fatalln(err)
  51. } else {
  52. arr := strings.Split(string(b), common.CONN_DATA_SEQ)
  53. for _, v := range cnf.Hosts {
  54. if common.InStrArr(arr, v.Remark) {
  55. log.Println(v.Remark, "ok")
  56. } else {
  57. log.Println(v.Remark, "not running")
  58. }
  59. }
  60. for _, v := range cnf.Tasks {
  61. ports := common.GetPorts(v.Ports)
  62. if v.Mode == "secret" {
  63. ports = append(ports, 0)
  64. }
  65. for _, vv := range ports {
  66. var remark string
  67. if len(ports) > 1 {
  68. remark = v.Remark + "_" + strconv.Itoa(vv)
  69. } else {
  70. remark = v.Remark
  71. }
  72. if common.InStrArr(arr, remark) {
  73. log.Println(remark, "ok")
  74. } else {
  75. log.Println(remark, "not running")
  76. }
  77. }
  78. }
  79. }
  80. os.Exit(0)
  81. }
  82. var errAdd = errors.New("The server returned an error, which port or host may have been occupied or not allowed to open.")
  83. func StartFromFile(path string) {
  84. first := true
  85. cnf, err := config.NewConfig(path)
  86. if err != nil || cnf.CommonConfig == nil {
  87. logs.Error("Config file %s loading error %s", path, err.Error())
  88. os.Exit(0)
  89. }
  90. logs.Info("Loading configuration file %s successfully", path)
  91. re:
  92. if first || cnf.CommonConfig.AutoReconnection {
  93. if !first {
  94. logs.Info("Reconnecting...")
  95. time.Sleep(time.Second * 5)
  96. }
  97. } else {
  98. return
  99. }
  100. first = false
  101. c, err := NewConn(cnf.CommonConfig.Tp, cnf.CommonConfig.VKey, cnf.CommonConfig.Server, common.WORK_CONFIG, cnf.CommonConfig.ProxyUrl)
  102. if err != nil {
  103. logs.Error(err)
  104. goto re
  105. }
  106. var isPub bool
  107. binary.Read(c, binary.LittleEndian, &isPub)
  108. // get tmp password
  109. var b []byte
  110. vkey := cnf.CommonConfig.VKey
  111. if isPub {
  112. // send global configuration to server and get status of config setting
  113. if _, err := c.SendInfo(cnf.CommonConfig.Client, common.NEW_CONF); err != nil {
  114. logs.Error(err)
  115. goto re
  116. }
  117. if !c.GetAddStatus() {
  118. logs.Error("the web_user may have been occupied!")
  119. goto re
  120. }
  121. if b, err = c.GetShortContent(16); err != nil {
  122. logs.Error(err)
  123. goto re
  124. }
  125. vkey = string(b)
  126. }
  127. ioutil.WriteFile(filepath.Join(common.GetTmpPath(), "npc_vkey.txt"), []byte(vkey), 0600)
  128. //send hosts to server
  129. for _, v := range cnf.Hosts {
  130. if _, err := c.SendInfo(v, common.NEW_HOST); err != nil {
  131. logs.Error(err)
  132. goto re
  133. }
  134. if !c.GetAddStatus() {
  135. logs.Error(errAdd, v.Host)
  136. goto re
  137. }
  138. }
  139. //send task to server
  140. for _, v := range cnf.Tasks {
  141. if _, err := c.SendInfo(v, common.NEW_TASK); err != nil {
  142. logs.Error(err)
  143. goto re
  144. }
  145. if !c.GetAddStatus() {
  146. logs.Error(errAdd, v.Ports, v.Remark)
  147. goto re
  148. }
  149. if v.Mode == "file" {
  150. //start local file server
  151. go startLocalFileServer(cnf.CommonConfig, v, vkey)
  152. }
  153. }
  154. //create local server secret or p2p
  155. for _, v := range cnf.LocalServer {
  156. go StartLocalServer(v, cnf.CommonConfig)
  157. }
  158. c.Close()
  159. if cnf.CommonConfig.Client.WebUserName == "" || cnf.CommonConfig.Client.WebPassword == "" {
  160. logs.Notice("web access login username:user password:%s", vkey)
  161. } else {
  162. logs.Notice("web access login username:%s password:%s", cnf.CommonConfig.Client.WebUserName, cnf.CommonConfig.Client.WebPassword)
  163. }
  164. NewRPClient(cnf.CommonConfig.Server, vkey, cnf.CommonConfig.Tp, cnf.CommonConfig.ProxyUrl, cnf).Start()
  165. CloseLocalServer()
  166. goto re
  167. }
  168. // Create a new connection with the server and verify it
  169. func NewConn(tp string, vkey string, server string, connType string, proxyUrl string) (*conn.Conn, error) {
  170. var err error
  171. var connection net.Conn
  172. var sess *kcp.UDPSession
  173. if tp == "tcp" {
  174. if proxyUrl != "" {
  175. u, er := url.Parse(proxyUrl)
  176. if er != nil {
  177. return nil, er
  178. }
  179. switch u.Scheme {
  180. case "socks5":
  181. n, er := proxy.FromURL(u, nil)
  182. if er != nil {
  183. return nil, er
  184. }
  185. connection, err = n.Dial("tcp", server)
  186. case "http":
  187. connection, err = NewHttpProxyConn(u, server)
  188. }
  189. } else {
  190. connection, err = net.Dial("tcp", server)
  191. }
  192. } else {
  193. sess, err = kcp.DialWithOptions(server, nil, 10, 3)
  194. if err == nil {
  195. conn.SetUdpSession(sess)
  196. connection = sess
  197. }
  198. }
  199. if err != nil {
  200. return nil, err
  201. }
  202. connection.SetDeadline(time.Now().Add(time.Second * 10))
  203. defer connection.SetDeadline(time.Time{})
  204. c := conn.NewConn(connection)
  205. if _, err := c.Write([]byte(common.CONN_TEST)); err != nil {
  206. return nil, err
  207. }
  208. if _, err := c.Write([]byte(crypt.Md5(version.GetVersion()))); err != nil {
  209. return nil, err
  210. }
  211. if b, err := c.GetShortContent(32); err != nil || crypt.Md5(version.GetVersion()) != string(b) {
  212. logs.Error("The client does not match the server version. The current version of the client is", version.GetVersion())
  213. return nil, err
  214. }
  215. if _, err := c.Write([]byte(common.Getverifyval(vkey))); err != nil {
  216. return nil, err
  217. }
  218. if s, err := c.ReadFlag(); err != nil {
  219. return nil, err
  220. } else if s == common.VERIFY_EER {
  221. logs.Error("Validation key %s incorrect", vkey)
  222. os.Exit(0)
  223. }
  224. if _, err := c.Write([]byte(connType)); err != nil {
  225. return nil, err
  226. }
  227. c.SetAlive(tp)
  228. return c, nil
  229. }
  230. //http proxy connection
  231. func NewHttpProxyConn(url *url.URL, remoteAddr string) (net.Conn, error) {
  232. req := &http.Request{
  233. Method: "CONNECT",
  234. URL: url,
  235. Host: remoteAddr,
  236. Header: http.Header{},
  237. Proto: "HTTP/1.1",
  238. }
  239. password, _ := url.User.Password()
  240. req.Header.Set("Proxy-Authorization", "Basic "+basicAuth(url.User.Username(), password))
  241. b, err := httputil.DumpRequest(req, false)
  242. if err != nil {
  243. return nil, err
  244. }
  245. proxyConn, err := net.Dial("tcp", url.Host)
  246. if err != nil {
  247. return nil, err
  248. }
  249. if _, err := proxyConn.Write(b); err != nil {
  250. return nil, err
  251. }
  252. buf := make([]byte, 1024)
  253. if _, err := proxyConn.Read(buf); err != nil {
  254. return nil, err
  255. }
  256. return proxyConn, nil
  257. }
  258. //get a basic auth string
  259. func basicAuth(username, password string) string {
  260. auth := username + ":" + password
  261. return base64.StdEncoding.EncodeToString([]byte(auth))
  262. }
  263. func handleP2PUdp(rAddr, md5Password, role string) (remoteAddress string, c net.PacketConn, err error) {
  264. tmpConn, err := common.GetLocalUdpAddr()
  265. if err != nil {
  266. logs.Error(err)
  267. return
  268. }
  269. localConn, err := newUdpConnByAddr(tmpConn.LocalAddr().String())
  270. if err != nil {
  271. logs.Error(err)
  272. return
  273. }
  274. localKcpConn, err := kcp.NewConn(rAddr, nil, 150, 3, localConn)
  275. if err != nil {
  276. logs.Error(err)
  277. return
  278. }
  279. conn.SetUdpSession(localKcpConn)
  280. localToolConn := conn.NewConn(localKcpConn)
  281. //get local nat type
  282. //localNatType, host, err := stun.NewClient().Discover()
  283. //if err != nil || host == nil {
  284. // err = errors.New("get nat type error")
  285. // return
  286. //}
  287. localNatType := stun.NATRestricted
  288. //write password
  289. if _, err = localToolConn.Write([]byte(md5Password)); err != nil {
  290. return
  291. }
  292. //write role
  293. if _, err = localToolConn.Write([]byte(role)); err != nil {
  294. return
  295. }
  296. if err = binary.Write(localToolConn, binary.LittleEndian, int32(localNatType)); err != nil {
  297. return
  298. }
  299. //get another type address and nat type from server
  300. var remoteAddr []byte
  301. var remoteNatType int32
  302. if remoteAddr, err = localToolConn.GetShortLenContent(); err != nil {
  303. return
  304. }
  305. if err = binary.Read(localToolConn, binary.LittleEndian, &remoteNatType); err != nil {
  306. return
  307. }
  308. localConn.Close()
  309. //logs.Trace("remote nat type %d,local nat type %s", remoteNatType, localNatType)
  310. if remoteAddress, err = sendP2PTestMsg(string(remoteAddr), tmpConn.LocalAddr().String()); err != nil {
  311. return
  312. }
  313. c, err = newUdpConnByAddr(tmpConn.LocalAddr().String())
  314. return
  315. }
  316. func handleP2P(natType1, natType2 int, addr1, addr2 string, role string) (string, error) {
  317. switch natType1 {
  318. case int(stun.NATFull):
  319. return sendP2PTestMsg(addr2, addr1)
  320. case int(stun.NATRestricted):
  321. switch natType2 {
  322. case int(stun.NATFull), int(stun.NATRestricted), int(stun.NATPortRestricted), int(stun.NATSymetric):
  323. return sendP2PTestMsg(addr2, addr1)
  324. }
  325. case int(stun.NATPortRestricted):
  326. switch natType2 {
  327. case int(stun.NATFull), int(stun.NATRestricted), int(stun.NATPortRestricted):
  328. return sendP2PTestMsg(addr2, addr1)
  329. }
  330. case int(stun.NATSymetric):
  331. switch natType2 {
  332. case int(stun.NATFull), int(stun.NATRestricted):
  333. return sendP2PTestMsg(addr2, addr1)
  334. }
  335. }
  336. return "", errors.New("not support p2p")
  337. }
  338. func sendP2PTestMsg(remoteAddr string, localAddr string) (string, error) {
  339. remoteUdpAddr, err := net.ResolveUDPAddr("udp", remoteAddr)
  340. if err != nil {
  341. return "", err
  342. }
  343. localConn, err := newUdpConnByAddr(localAddr)
  344. if err != nil {
  345. return "", err
  346. }
  347. defer localConn.Close()
  348. ticker := time.NewTicker(time.Millisecond * 500)
  349. go func(ticker *time.Ticker) {
  350. for {
  351. select {
  352. case <-ticker.C:
  353. logs.Trace("try send test packet to target %s", remoteAddr)
  354. if _, err := localConn.WriteTo([]byte(common.WORK_P2P_CONNECT), remoteUdpAddr); err != nil {
  355. return
  356. }
  357. }
  358. }
  359. }(ticker)
  360. buf := make([]byte, 10)
  361. for {
  362. localConn.SetReadDeadline(time.Now().Add(time.Second * 30))
  363. n, addr, err := localConn.ReadFromUDP(buf)
  364. localConn.SetReadDeadline(time.Time{})
  365. if err != nil {
  366. break
  367. }
  368. switch string(buf[:n]) {
  369. case common.WORK_P2P_SUCCESS:
  370. for i := 20; i > 0; i-- {
  371. if _, err = localConn.WriteTo([]byte(common.WORK_P2P_END), addr); err != nil {
  372. return "", err
  373. }
  374. }
  375. return addr.String(), nil
  376. case common.WORK_P2P_END:
  377. logs.Trace("Remotely Address %s Reply Packet Successfully Received", addr.String())
  378. return addr.String(), nil
  379. case common.WORK_P2P_CONNECT:
  380. go func() {
  381. for i := 20; i > 0; i-- {
  382. logs.Trace("try send receive success packet to target %s", remoteAddr)
  383. if _, err = localConn.WriteTo([]byte(common.WORK_P2P_SUCCESS), addr); err != nil {
  384. return
  385. }
  386. time.Sleep(time.Second)
  387. }
  388. }()
  389. default:
  390. continue
  391. }
  392. ticker.Stop()
  393. }
  394. ticker.Stop()
  395. return "", errors.New("connect to the target failed, maybe the nat type is not support p2p")
  396. }
  397. func newUdpConnByAddr(addr string) (*net.UDPConn, error) {
  398. udpAddr, err := net.ResolveUDPAddr("udp", addr)
  399. if err != nil {
  400. return nil, err
  401. }
  402. udpConn, err := net.ListenUDP("udp", udpAddr)
  403. if err != nil {
  404. return nil, err
  405. }
  406. return udpConn, nil
  407. }