socks5.go 7.1 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313
  1. package lib
  2. import (
  3. "encoding/binary"
  4. "errors"
  5. "io"
  6. "log"
  7. "net"
  8. "strconv"
  9. "strings"
  10. )
  11. const (
  12. ipV4 = 1
  13. domainName = 3
  14. ipV6 = 4
  15. connectMethod = 1
  16. bindMethod = 2
  17. associateMethod = 3
  18. // The maximum packet size of any udp Associate packet, based on ethernet's max size,
  19. // minus the IP and UDP headers. IPv4 has a 20 byte header, UDP adds an
  20. // additional 4 bytes. This is a total overhead of 24 bytes. Ethernet's
  21. // max packet size is 1500 bytes, 1500 - 24 = 1476.
  22. maxUDPPacketSize = 1476
  23. )
  24. const (
  25. succeeded uint8 = iota
  26. serverFailure
  27. notAllowed
  28. networkUnreachable
  29. hostUnreachable
  30. connectionRefused
  31. ttlExpired
  32. commandNotSupported
  33. addrTypeNotSupported
  34. )
  35. const (
  36. UserPassAuth = uint8(2)
  37. userAuthVersion = uint8(1)
  38. authSuccess = uint8(0)
  39. authFailure = uint8(1)
  40. )
  41. type Sock5ModeServer struct {
  42. bridge *Tunnel
  43. isVerify bool
  44. listener net.Listener
  45. config *ServerConfig
  46. }
  47. //req
  48. func (s *Sock5ModeServer) handleRequest(c net.Conn) {
  49. /*
  50. The SOCKS request is formed as follows:
  51. +----+-----+-------+------+----------+----------+
  52. |VER | CMD | RSV | ATYP | DST.ADDR | DST.PORT |
  53. +----+-----+-------+------+----------+----------+
  54. | 1 | 1 | X'00' | 1 | Variable | 2 |
  55. +----+-----+-------+------+----------+----------+
  56. */
  57. header := make([]byte, 3)
  58. _, err := io.ReadFull(c, header)
  59. if err != nil {
  60. log.Println("illegal request", err)
  61. c.Close()
  62. return
  63. }
  64. switch header[1] {
  65. case connectMethod:
  66. s.handleConnect(c)
  67. case bindMethod:
  68. s.handleBind(c)
  69. case associateMethod:
  70. s.handleUDP(c)
  71. default:
  72. s.sendReply(c, commandNotSupported)
  73. c.Close()
  74. }
  75. }
  76. //reply
  77. func (s *Sock5ModeServer) sendReply(c net.Conn, rep uint8) {
  78. reply := []byte{
  79. 5,
  80. rep,
  81. 0,
  82. 1,
  83. }
  84. localAddr := c.LocalAddr().String()
  85. localHost, localPort, _ := net.SplitHostPort(localAddr)
  86. ipBytes := net.ParseIP(localHost).To4()
  87. nPort, _ := strconv.Atoi(localPort)
  88. reply = append(reply, ipBytes...)
  89. portBytes := make([]byte, 2)
  90. binary.BigEndian.PutUint16(portBytes, uint16(nPort))
  91. reply = append(reply, portBytes...)
  92. c.Write(reply)
  93. }
  94. //do conn
  95. func (s *Sock5ModeServer) doConnect(c net.Conn, command uint8) (proxyConn *Conn, err error) {
  96. addrType := make([]byte, 1)
  97. c.Read(addrType)
  98. var host string
  99. switch addrType[0] {
  100. case ipV4:
  101. ipv4 := make(net.IP, net.IPv4len)
  102. c.Read(ipv4)
  103. host = ipv4.String()
  104. case ipV6:
  105. ipv6 := make(net.IP, net.IPv6len)
  106. c.Read(ipv6)
  107. host = ipv6.String()
  108. case domainName:
  109. var domainLen uint8
  110. binary.Read(c, binary.BigEndian, &domainLen)
  111. domain := make([]byte, domainLen)
  112. c.Read(domain)
  113. host = string(domain)
  114. default:
  115. s.sendReply(c, addrTypeNotSupported)
  116. err = errors.New("Address type not supported")
  117. return nil, err
  118. }
  119. var port uint16
  120. binary.Read(c, binary.BigEndian, &port)
  121. // connect to host
  122. addr := net.JoinHostPort(host, strconv.Itoa(int(port)))
  123. client, err := s.bridge.GetTunnel(getverifyval(s.config.VerifyKey), s.config.CompressEncode, s.config.CompressDecode, s.config.Crypt, s.config.Mux)
  124. if err != nil {
  125. log.Println(err)
  126. return
  127. }
  128. s.sendReply(c, succeeded)
  129. var ltype string
  130. if command == associateMethod {
  131. ltype = CONN_UDP
  132. } else {
  133. ltype = CONN_TCP
  134. }
  135. _, err = client.WriteHost(ltype, addr)
  136. return client, nil
  137. }
  138. //conn
  139. func (s *Sock5ModeServer) handleConnect(c net.Conn) {
  140. proxyConn, err := s.doConnect(c, connectMethod)
  141. if err != nil {
  142. log.Println(err)
  143. c.Close()
  144. } else {
  145. go relay(proxyConn, NewConn(c), s.config.CompressEncode, s.config.Crypt, s.config.Mux)
  146. relay(NewConn(c), proxyConn, s.config.CompressDecode, s.config.Crypt, s.config.Mux)
  147. if s.config.Mux {
  148. s.bridge.ReturnTunnel(proxyConn, getverifyval(s.config.VerifyKey))
  149. }
  150. }
  151. }
  152. // passive mode
  153. func (s *Sock5ModeServer) handleBind(c net.Conn) {
  154. }
  155. //udp
  156. func (s *Sock5ModeServer) handleUDP(c net.Conn) {
  157. log.Println("UDP Associate")
  158. /*
  159. +----+------+------+----------+----------+----------+
  160. |RSV | FRAG | ATYP | DST.ADDR | DST.PORT | DATA |
  161. +----+------+------+----------+----------+----------+
  162. | 2 | 1 | 1 | Variable | 2 | Variable |
  163. +----+------+------+----------+----------+----------+
  164. */
  165. buf := make([]byte, 3)
  166. c.Read(buf)
  167. // relay udp datagram silently, without any notification to the requesting client
  168. if buf[2] != 0 {
  169. // does not support fragmentation, drop it
  170. log.Println("does not support fragmentation, drop")
  171. dummy := make([]byte, maxUDPPacketSize)
  172. c.Read(dummy)
  173. }
  174. proxyConn, err := s.doConnect(c, associateMethod)
  175. if err != nil {
  176. c.Close()
  177. } else {
  178. go relay(proxyConn, NewConn(c), s.config.CompressEncode, s.config.Crypt, s.config.Mux)
  179. relay(NewConn(c), proxyConn, s.config.CompressDecode, s.config.Crypt, s.config.Mux)
  180. if s.config.Mux {
  181. s.bridge.ReturnTunnel(proxyConn, getverifyval(s.config.VerifyKey))
  182. }
  183. }
  184. }
  185. //new conn
  186. func (s *Sock5ModeServer) handleNewConn(c net.Conn) {
  187. buf := make([]byte, 2)
  188. if _, err := io.ReadFull(c, buf); err != nil {
  189. log.Println("negotiation err", err)
  190. c.Close()
  191. return
  192. }
  193. if version := buf[0]; version != 5 {
  194. log.Println("only support socks5, request from: ", c.RemoteAddr())
  195. c.Close()
  196. return
  197. }
  198. nMethods := buf[1]
  199. methods := make([]byte, nMethods)
  200. if len, err := c.Read(methods); len != int(nMethods) || err != nil {
  201. log.Println("wrong method")
  202. c.Close()
  203. return
  204. }
  205. if s.isVerify {
  206. buf[1] = UserPassAuth
  207. c.Write(buf)
  208. if err := s.Auth(c); err != nil {
  209. c.Close()
  210. log.Println("验证失败:", err)
  211. return
  212. }
  213. } else {
  214. buf[1] = 0
  215. c.Write(buf)
  216. }
  217. s.handleRequest(c)
  218. }
  219. //socks5 auth
  220. func (s *Sock5ModeServer) Auth(c net.Conn) error {
  221. header := []byte{0, 0}
  222. if _, err := io.ReadAtLeast(c, header, 2); err != nil {
  223. return err
  224. }
  225. if header[0] != userAuthVersion {
  226. return errors.New("验证方式不被支持")
  227. }
  228. userLen := int(header[1])
  229. user := make([]byte, userLen)
  230. if _, err := io.ReadAtLeast(c, user, userLen); err != nil {
  231. return err
  232. }
  233. if _, err := c.Read(header[:1]); err != nil {
  234. return errors.New("密码长度获取错误")
  235. }
  236. passLen := int(header[0])
  237. pass := make([]byte, passLen)
  238. if _, err := io.ReadAtLeast(c, pass, passLen); err != nil {
  239. return err
  240. }
  241. if string(pass) == s.config.U && string(user) == s.config.P {
  242. if _, err := c.Write([]byte{userAuthVersion, authSuccess}); err != nil {
  243. return err
  244. }
  245. return nil
  246. } else {
  247. if _, err := c.Write([]byte{userAuthVersion, authFailure}); err != nil {
  248. return err
  249. }
  250. return errors.New("验证不通过")
  251. }
  252. return errors.New("未知错误")
  253. }
  254. //start
  255. func (s *Sock5ModeServer) Start() error {
  256. s.listener, err = net.Listen("tcp", ":"+strconv.Itoa(s.config.TcpPort))
  257. if err != nil {
  258. return err
  259. }
  260. for {
  261. conn, err := s.listener.Accept()
  262. if err != nil {
  263. if strings.Contains(err.Error(), "use of closed network connection") {
  264. break
  265. }
  266. log.Fatal("accept error: ", err)
  267. }
  268. go s.handleNewConn(conn)
  269. }
  270. return nil
  271. }
  272. //close
  273. func (s *Sock5ModeServer) Close() error {
  274. return s.listener.Close()
  275. }
  276. //new
  277. func NewSock5ModeServer(bridge *Tunnel, cnf *ServerConfig) *Sock5ModeServer {
  278. s := new(Sock5ModeServer)
  279. s.bridge = bridge
  280. s.config = cnf
  281. if s.config.U != "" && s.config.P != "" {
  282. s.isVerify = true
  283. } else {
  284. s.isVerify = false
  285. }
  286. return s
  287. }