control.go 11 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424
  1. package client
  2. import (
  3. "encoding/base64"
  4. "encoding/binary"
  5. "errors"
  6. "github.com/cnlh/nps/lib/common"
  7. "github.com/cnlh/nps/lib/config"
  8. "github.com/cnlh/nps/lib/conn"
  9. "github.com/cnlh/nps/lib/crypt"
  10. "github.com/cnlh/nps/lib/version"
  11. "github.com/cnlh/nps/vender/github.com/astaxie/beego/logs"
  12. "github.com/cnlh/nps/vender/github.com/ccding/go-stun/stun"
  13. "github.com/cnlh/nps/vender/github.com/xtaci/kcp"
  14. "github.com/cnlh/nps/vender/golang.org/x/net/proxy"
  15. "io/ioutil"
  16. "log"
  17. "net"
  18. "net/http"
  19. "net/http/httputil"
  20. "net/url"
  21. "os"
  22. "path/filepath"
  23. "strconv"
  24. "strings"
  25. "time"
  26. )
  27. func GetTaskStatus(path string) {
  28. cnf, err := config.NewConfig(path)
  29. if err != nil {
  30. log.Fatalln(err)
  31. }
  32. c, err := NewConn(cnf.CommonConfig.Tp, cnf.CommonConfig.VKey, cnf.CommonConfig.Server, common.WORK_CONFIG, cnf.CommonConfig.ProxyUrl)
  33. if err != nil {
  34. log.Fatalln(err)
  35. }
  36. if _, err := c.Write([]byte(common.WORK_STATUS)); err != nil {
  37. log.Fatalln(err)
  38. }
  39. //read now vKey and write to server
  40. if f, err := common.ReadAllFromFile(filepath.Join(common.GetTmpPath(), "npc_vkey.txt")); err != nil {
  41. log.Fatalln(err)
  42. } else if _, err := c.Write([]byte(crypt.Md5(string(f)))); err != nil {
  43. log.Fatalln(err)
  44. }
  45. var isPub bool
  46. binary.Read(c, binary.LittleEndian, &isPub)
  47. if l, err := c.GetLen(); err != nil {
  48. log.Fatalln(err)
  49. } else if b, err := c.GetShortContent(l); err != nil {
  50. log.Fatalln(err)
  51. } else {
  52. arr := strings.Split(string(b), common.CONN_DATA_SEQ)
  53. for _, v := range cnf.Hosts {
  54. if common.InStrArr(arr, v.Remark) {
  55. log.Println(v.Remark, "ok")
  56. } else {
  57. log.Println(v.Remark, "not running")
  58. }
  59. }
  60. for _, v := range cnf.Tasks {
  61. ports := common.GetPorts(v.Ports)
  62. if v.Mode == "secret" {
  63. ports = append(ports, 0)
  64. }
  65. for _, vv := range ports {
  66. var remark string
  67. if len(ports) > 1 {
  68. remark = v.Remark + "_" + strconv.Itoa(vv)
  69. } else {
  70. remark = v.Remark
  71. }
  72. if common.InStrArr(arr, remark) {
  73. log.Println(remark, "ok")
  74. } else {
  75. log.Println(remark, "not running")
  76. }
  77. }
  78. }
  79. }
  80. os.Exit(0)
  81. }
  82. var errAdd = errors.New("The server returned an error, which port or host may have been occupied or not allowed to open.")
  83. func StartFromFile(path string) {
  84. first := true
  85. cnf, err := config.NewConfig(path)
  86. if err != nil || cnf.CommonConfig == nil {
  87. logs.Error("Config file %s loading error %s", path, err.Error())
  88. os.Exit(0)
  89. }
  90. logs.Info("Loading configuration file %s successfully", path)
  91. re:
  92. if first || cnf.CommonConfig.AutoReconnection {
  93. if !first {
  94. logs.Info("Reconnecting...")
  95. time.Sleep(time.Second * 5)
  96. }
  97. } else {
  98. return
  99. }
  100. first = false
  101. c, err := NewConn(cnf.CommonConfig.Tp, cnf.CommonConfig.VKey, cnf.CommonConfig.Server, common.WORK_CONFIG, cnf.CommonConfig.ProxyUrl)
  102. if err != nil {
  103. logs.Error(err)
  104. goto re
  105. }
  106. var isPub bool
  107. binary.Read(c, binary.LittleEndian, &isPub)
  108. // get tmp password
  109. var b []byte
  110. vkey := cnf.CommonConfig.VKey
  111. if isPub {
  112. // send global configuration to server and get status of config setting
  113. if _, err := c.SendInfo(cnf.CommonConfig.Client, common.NEW_CONF); err != nil {
  114. logs.Error(err)
  115. goto re
  116. }
  117. if !c.GetAddStatus() {
  118. logs.Error("the web_user may have been occupied!")
  119. goto re
  120. }
  121. if b, err = c.GetShortContent(16); err != nil {
  122. logs.Error(err)
  123. goto re
  124. }
  125. vkey = string(b)
  126. }
  127. ioutil.WriteFile(filepath.Join(common.GetTmpPath(), "npc_vkey.txt"), []byte(vkey), 0600)
  128. //send hosts to server
  129. for _, v := range cnf.Hosts {
  130. if _, err := c.SendInfo(v, common.NEW_HOST); err != nil {
  131. logs.Error(err)
  132. goto re
  133. }
  134. if !c.GetAddStatus() {
  135. logs.Error(errAdd, v.Host)
  136. goto re
  137. }
  138. }
  139. //send task to server
  140. for _, v := range cnf.Tasks {
  141. if _, err := c.SendInfo(v, common.NEW_TASK); err != nil {
  142. logs.Error(err)
  143. goto re
  144. }
  145. if !c.GetAddStatus() {
  146. logs.Error(errAdd, v.Ports, v.Remark)
  147. goto re
  148. }
  149. if v.Mode == "file" {
  150. //start local file server
  151. go startLocalFileServer(cnf.CommonConfig, v, vkey)
  152. }
  153. }
  154. //create local server secret or p2p
  155. for _, v := range cnf.LocalServer {
  156. go StartLocalServer(v, cnf.CommonConfig)
  157. }
  158. c.Close()
  159. if cnf.CommonConfig.Client.WebUserName == "" || cnf.CommonConfig.Client.WebPassword == "" {
  160. logs.Notice("web access login username:user password:%s", vkey)
  161. } else {
  162. logs.Notice("web access login username:%s password:%s", cnf.CommonConfig.Client.WebUserName, cnf.CommonConfig.Client.WebPassword)
  163. }
  164. NewRPClient(cnf.CommonConfig.Server, vkey, cnf.CommonConfig.Tp, cnf.CommonConfig.ProxyUrl, cnf).Start()
  165. CloseLocalServer()
  166. goto re
  167. }
  168. // Create a new connection with the server and verify it
  169. func NewConn(tp string, vkey string, server string, connType string, proxyUrl string) (*conn.Conn, error) {
  170. var err error
  171. var connection net.Conn
  172. var sess *kcp.UDPSession
  173. if tp == "tcp" {
  174. if proxyUrl != "" {
  175. u, er := url.Parse(proxyUrl)
  176. if er != nil {
  177. return nil, er
  178. }
  179. switch u.Scheme {
  180. case "socks5":
  181. n, er := proxy.FromURL(u, nil)
  182. if er != nil {
  183. return nil, er
  184. }
  185. connection, err = n.Dial("tcp", server)
  186. case "http":
  187. connection, err = NewHttpProxyConn(u, server)
  188. }
  189. } else {
  190. connection, err = net.Dial("tcp", server)
  191. }
  192. } else {
  193. sess, err = kcp.DialWithOptions(server, nil, 10, 3)
  194. if err == nil {
  195. conn.SetUdpSession(sess)
  196. connection = sess
  197. }
  198. }
  199. if err != nil {
  200. return nil, err
  201. }
  202. c := conn.NewConn(connection)
  203. if _, err := c.Write([]byte(common.CONN_TEST)); err != nil {
  204. return nil, err
  205. }
  206. if _, err := c.Write([]byte(crypt.Md5(version.GetVersion()))); err != nil {
  207. return nil, err
  208. }
  209. if b, err := c.GetShortContent(32); err != nil || crypt.Md5(version.GetVersion()) != string(b) {
  210. logs.Error("The client does not match the server version. The current version of the client is", version.GetVersion())
  211. os.Exit(0)
  212. }
  213. if _, err := c.Write([]byte(common.Getverifyval(vkey))); err != nil {
  214. return nil, err
  215. }
  216. if s, err := c.ReadFlag(); err != nil {
  217. return nil, err
  218. } else if s == common.VERIFY_EER {
  219. logs.Error("Validation key %s incorrect", vkey)
  220. os.Exit(0)
  221. }
  222. if _, err := c.Write([]byte(connType)); err != nil {
  223. return nil, err
  224. }
  225. c.SetAlive(tp)
  226. return c, nil
  227. }
  228. //http proxy connection
  229. func NewHttpProxyConn(url *url.URL, remoteAddr string) (net.Conn, error) {
  230. req := &http.Request{
  231. Method: "CONNECT",
  232. URL: url,
  233. Host: remoteAddr,
  234. Header: http.Header{},
  235. Proto: "HTTP/1.1",
  236. }
  237. password, _ := url.User.Password()
  238. req.Header.Set("Proxy-Authorization", "Basic "+basicAuth(url.User.Username(), password))
  239. b, err := httputil.DumpRequest(req, false)
  240. if err != nil {
  241. return nil, err
  242. }
  243. proxyConn, err := net.Dial("tcp", url.Host)
  244. if err != nil {
  245. return nil, err
  246. }
  247. if _, err := proxyConn.Write(b); err != nil {
  248. return nil, err
  249. }
  250. buf := make([]byte, 1024)
  251. if _, err := proxyConn.Read(buf); err != nil {
  252. return nil, err
  253. }
  254. return proxyConn, nil
  255. }
  256. //get a basic auth string
  257. func basicAuth(username, password string) string {
  258. auth := username + ":" + password
  259. return base64.StdEncoding.EncodeToString([]byte(auth))
  260. }
  261. func handleP2PUdp(rAddr, md5Password, role string) (remoteAddress string, c net.PacketConn, err error) {
  262. tmpConn, err := common.GetLocalUdpAddr()
  263. if err != nil {
  264. logs.Error(err)
  265. return
  266. }
  267. localConn, err := newUdpConnByAddr(tmpConn.LocalAddr().String())
  268. if err != nil {
  269. logs.Error(err)
  270. return
  271. }
  272. localKcpConn, err := kcp.NewConn(rAddr, nil, 150, 3, localConn)
  273. if err != nil {
  274. logs.Error(err)
  275. return
  276. }
  277. conn.SetUdpSession(localKcpConn)
  278. localToolConn := conn.NewConn(localKcpConn)
  279. //get local nat type
  280. //localNatType, host, err := stun.NewClient().Discover()
  281. //if err != nil || host == nil {
  282. // err = errors.New("get nat type error")
  283. // return
  284. //}
  285. localNatType := stun.NATRestricted
  286. //write password
  287. if _, err = localToolConn.Write([]byte(md5Password)); err != nil {
  288. return
  289. }
  290. //write role
  291. if _, err = localToolConn.Write([]byte(role)); err != nil {
  292. return
  293. }
  294. if err = binary.Write(localToolConn, binary.LittleEndian, int32(localNatType)); err != nil {
  295. return
  296. }
  297. //get another type address and nat type from server
  298. var remoteAddr []byte
  299. var remoteNatType int32
  300. if remoteAddr, err = localToolConn.GetShortLenContent(); err != nil {
  301. return
  302. }
  303. if err = binary.Read(localToolConn, binary.LittleEndian, &remoteNatType); err != nil {
  304. return
  305. }
  306. localConn.Close()
  307. //logs.Trace("remote nat type %d,local nat type %s", remoteNatType, localNatType)
  308. if remoteAddress, err = sendP2PTestMsg(string(remoteAddr), tmpConn.LocalAddr().String()); err != nil {
  309. return
  310. }
  311. c, err = newUdpConnByAddr(tmpConn.LocalAddr().String())
  312. return
  313. }
  314. func handleP2P(natType1, natType2 int, addr1, addr2 string, role string) (string, error) {
  315. switch natType1 {
  316. case int(stun.NATFull):
  317. return sendP2PTestMsg(addr2, addr1)
  318. case int(stun.NATRestricted):
  319. switch natType2 {
  320. case int(stun.NATFull), int(stun.NATRestricted), int(stun.NATPortRestricted), int(stun.NATSymetric):
  321. return sendP2PTestMsg(addr2, addr1)
  322. }
  323. case int(stun.NATPortRestricted):
  324. switch natType2 {
  325. case int(stun.NATFull), int(stun.NATRestricted), int(stun.NATPortRestricted):
  326. return sendP2PTestMsg(addr2, addr1)
  327. }
  328. case int(stun.NATSymetric):
  329. switch natType2 {
  330. case int(stun.NATFull), int(stun.NATRestricted):
  331. return sendP2PTestMsg(addr2, addr1)
  332. }
  333. }
  334. return "", errors.New("not support p2p")
  335. }
  336. func sendP2PTestMsg(remoteAddr string, localAddr string) (string, error) {
  337. remoteUdpAddr, err := net.ResolveUDPAddr("udp", remoteAddr)
  338. if err != nil {
  339. return "", err
  340. }
  341. localConn, err := newUdpConnByAddr(localAddr)
  342. if err != nil {
  343. return "", err
  344. }
  345. defer localConn.Close()
  346. ticker := time.NewTicker(time.Millisecond * 500)
  347. go func(ticker *time.Ticker) {
  348. for {
  349. select {
  350. case <-ticker.C:
  351. logs.Trace("try send test packet to target %s", remoteAddr)
  352. if _, err := localConn.WriteTo([]byte(common.WORK_P2P_CONNECT), remoteUdpAddr); err != nil {
  353. return
  354. }
  355. }
  356. }
  357. }(ticker)
  358. buf := make([]byte, 10)
  359. for {
  360. localConn.SetReadDeadline(time.Now().Add(time.Second * 30))
  361. n, addr, err := localConn.ReadFromUDP(buf)
  362. localConn.SetReadDeadline(time.Time{})
  363. if err != nil {
  364. break
  365. }
  366. switch string(buf[:n]) {
  367. case common.WORK_P2P_SUCCESS:
  368. for i := 20; i > 0; i-- {
  369. if _, err = localConn.WriteTo([]byte(common.WORK_P2P_END), addr); err != nil {
  370. return "", err
  371. }
  372. }
  373. return addr.String(), nil
  374. case common.WORK_P2P_END:
  375. logs.Trace("Remotely Address %s Reply Packet Successfully Received", addr.String())
  376. return addr.String(), nil
  377. case common.WORK_P2P_CONNECT:
  378. go func() {
  379. for i := 20; i > 0; i-- {
  380. logs.Trace("try send receive success packet to target %s", remoteAddr)
  381. if _, err = localConn.WriteTo([]byte(common.WORK_P2P_SUCCESS), addr); err != nil {
  382. return
  383. }
  384. time.Sleep(time.Second)
  385. }
  386. }()
  387. default:
  388. continue
  389. }
  390. ticker.Stop()
  391. }
  392. ticker.Stop()
  393. return "", errors.New("connect to the target failed, maybe the nat type is not support p2p")
  394. }
  395. func newUdpConnByAddr(addr string) (*net.UDPConn, error) {
  396. udpAddr, err := net.ResolveUDPAddr("udp", addr)
  397. if err != nil {
  398. return nil, err
  399. }
  400. udpConn, err := net.ListenUDP("udp", udpAddr)
  401. if err != nil {
  402. return nil, err
  403. }
  404. return udpConn, nil
  405. }