socks5.go 6.7 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301
  1. package server
  2. import (
  3. "encoding/binary"
  4. "errors"
  5. "github.com/cnlh/easyProxy/bridge"
  6. "github.com/cnlh/easyProxy/utils"
  7. "io"
  8. "log"
  9. "net"
  10. "strconv"
  11. "strings"
  12. )
  13. const (
  14. ipV4 = 1
  15. domainName = 3
  16. ipV6 = 4
  17. connectMethod = 1
  18. bindMethod = 2
  19. associateMethod = 3
  20. // The maximum packet size of any udp Associate packet, based on ethernet's max size,
  21. // minus the IP and UDP headers. IPv4 has a 20 byte header, UDP adds an
  22. // additional 4 bytes. This is a total overhead of 24 bytes. Ethernet's
  23. // max packet size is 1500 bytes, 1500 - 24 = 1476.
  24. maxUDPPacketSize = 1476
  25. )
  26. const (
  27. succeeded uint8 = iota
  28. serverFailure
  29. notAllowed
  30. networkUnreachable
  31. hostUnreachable
  32. connectionRefused
  33. ttlExpired
  34. commandNotSupported
  35. addrTypeNotSupported
  36. )
  37. const (
  38. UserPassAuth = uint8(2)
  39. userAuthVersion = uint8(1)
  40. authSuccess = uint8(0)
  41. authFailure = uint8(1)
  42. )
  43. type Sock5ModeServer struct {
  44. server
  45. isVerify bool
  46. listener net.Listener
  47. }
  48. //req
  49. func (s *Sock5ModeServer) handleRequest(c net.Conn) {
  50. /*
  51. The SOCKS request is formed as follows:
  52. +----+-----+-------+------+----------+----------+
  53. |VER | CMD | RSV | ATYP | DST.ADDR | DST.PORT |
  54. +----+-----+-------+------+----------+----------+
  55. | 1 | 1 | X'00' | 1 | Variable | 2 |
  56. +----+-----+-------+------+----------+----------+
  57. */
  58. header := make([]byte, 3)
  59. _, err := io.ReadFull(c, header)
  60. if err != nil {
  61. log.Println("illegal request", err)
  62. c.Close()
  63. return
  64. }
  65. switch header[1] {
  66. case connectMethod:
  67. s.handleConnect(c)
  68. case bindMethod:
  69. s.handleBind(c)
  70. case associateMethod:
  71. s.handleUDP(c)
  72. default:
  73. s.sendReply(c, commandNotSupported)
  74. c.Close()
  75. }
  76. }
  77. //reply
  78. func (s *Sock5ModeServer) sendReply(c net.Conn, rep uint8) {
  79. reply := []byte{
  80. 5,
  81. rep,
  82. 0,
  83. 1,
  84. }
  85. localAddr := c.LocalAddr().String()
  86. localHost, localPort, _ := net.SplitHostPort(localAddr)
  87. ipBytes := net.ParseIP(localHost).To4()
  88. nPort, _ := strconv.Atoi(localPort)
  89. reply = append(reply, ipBytes...)
  90. portBytes := make([]byte, 2)
  91. binary.BigEndian.PutUint16(portBytes, uint16(nPort))
  92. reply = append(reply, portBytes...)
  93. c.Write(reply)
  94. }
  95. //do conn
  96. func (s *Sock5ModeServer) doConnect(c net.Conn, command uint8) {
  97. addrType := make([]byte, 1)
  98. c.Read(addrType)
  99. var host string
  100. switch addrType[0] {
  101. case ipV4:
  102. ipv4 := make(net.IP, net.IPv4len)
  103. c.Read(ipv4)
  104. host = ipv4.String()
  105. case ipV6:
  106. ipv6 := make(net.IP, net.IPv6len)
  107. c.Read(ipv6)
  108. host = ipv6.String()
  109. case domainName:
  110. var domainLen uint8
  111. binary.Read(c, binary.BigEndian, &domainLen)
  112. domain := make([]byte, domainLen)
  113. c.Read(domain)
  114. host = string(domain)
  115. default:
  116. s.sendReply(c, addrTypeNotSupported)
  117. return
  118. }
  119. var port uint16
  120. binary.Read(c, binary.BigEndian, &port)
  121. // connect to host
  122. addr := net.JoinHostPort(host, strconv.Itoa(int(port)))
  123. var ltype string
  124. if command == associateMethod {
  125. ltype = utils.CONN_UDP
  126. } else {
  127. ltype = utils.CONN_TCP
  128. }
  129. link := utils.NewLink(s.task.Client.GetId(), ltype, addr, s.config.CompressEncode, s.config.CompressDecode, s.config.Crypt, utils.NewConn(c), s.task.Flow, nil, s.task.Client.Rate, nil)
  130. if tunnel, err := s.bridge.SendLinkInfo(s.task.Client.Id, link); err != nil {
  131. c.Close()
  132. return
  133. } else {
  134. s.sendReply(c, succeeded)
  135. s.linkCopy(link, utils.NewConn(c), nil, tunnel, s.task.Flow)
  136. }
  137. return
  138. }
  139. //conn
  140. func (s *Sock5ModeServer) handleConnect(c net.Conn) {
  141. s.doConnect(c, connectMethod)
  142. }
  143. // passive mode
  144. func (s *Sock5ModeServer) handleBind(c net.Conn) {
  145. }
  146. //udp
  147. func (s *Sock5ModeServer) handleUDP(c net.Conn) {
  148. log.Println("UDP Associate")
  149. /*
  150. +----+------+------+----------+----------+----------+
  151. |RSV | FRAG | ATYP | DST.ADDR | DST.PORT | DATA |
  152. +----+------+------+----------+----------+----------+
  153. | 2 | 1 | 1 | Variable | 2 | Variable |
  154. +----+------+------+----------+----------+----------+
  155. */
  156. buf := make([]byte, 3)
  157. c.Read(buf)
  158. // relay udp datagram silently, without any notification to the requesting client
  159. if buf[2] != 0 {
  160. // does not support fragmentation, drop it
  161. log.Println("does not support fragmentation, drop")
  162. dummy := make([]byte, maxUDPPacketSize)
  163. c.Read(dummy)
  164. }
  165. s.doConnect(c, associateMethod)
  166. }
  167. //new conn
  168. func (s *Sock5ModeServer) handleConn(c net.Conn) {
  169. buf := make([]byte, 2)
  170. if _, err := io.ReadFull(c, buf); err != nil {
  171. log.Println("negotiation err", err)
  172. c.Close()
  173. return
  174. }
  175. if version := buf[0]; version != 5 {
  176. log.Println("only support socks5, request from: ", c.RemoteAddr())
  177. c.Close()
  178. return
  179. }
  180. nMethods := buf[1]
  181. methods := make([]byte, nMethods)
  182. if len, err := c.Read(methods); len != int(nMethods) || err != nil {
  183. log.Println("wrong method")
  184. c.Close()
  185. return
  186. }
  187. if s.isVerify {
  188. buf[1] = UserPassAuth
  189. c.Write(buf)
  190. if err := s.Auth(c); err != nil {
  191. c.Close()
  192. log.Println("验证失败:", err)
  193. return
  194. }
  195. } else {
  196. buf[1] = 0
  197. c.Write(buf)
  198. }
  199. s.handleRequest(c)
  200. }
  201. //socks5 auth
  202. func (s *Sock5ModeServer) Auth(c net.Conn) error {
  203. header := []byte{0, 0}
  204. if _, err := io.ReadAtLeast(c, header, 2); err != nil {
  205. return err
  206. }
  207. if header[0] != userAuthVersion {
  208. return errors.New("验证方式不被支持")
  209. }
  210. userLen := int(header[1])
  211. user := make([]byte, userLen)
  212. if _, err := io.ReadAtLeast(c, user, userLen); err != nil {
  213. return err
  214. }
  215. if _, err := c.Read(header[:1]); err != nil {
  216. return errors.New("密码长度获取错误")
  217. }
  218. passLen := int(header[0])
  219. pass := make([]byte, passLen)
  220. if _, err := io.ReadAtLeast(c, pass, passLen); err != nil {
  221. return err
  222. }
  223. if string(pass) == s.config.U && string(user) == s.config.P {
  224. if _, err := c.Write([]byte{userAuthVersion, authSuccess}); err != nil {
  225. return err
  226. }
  227. return nil
  228. } else {
  229. if _, err := c.Write([]byte{userAuthVersion, authFailure}); err != nil {
  230. return err
  231. }
  232. return errors.New("验证不通过")
  233. }
  234. return errors.New("未知错误")
  235. }
  236. //start
  237. func (s *Sock5ModeServer) Start() error {
  238. var err error
  239. s.listener, err = net.Listen("tcp", ":"+strconv.Itoa(s.task.TcpPort))
  240. if err != nil {
  241. return err
  242. }
  243. for {
  244. conn, err := s.listener.Accept()
  245. if err != nil {
  246. if strings.Contains(err.Error(), "use of closed network connection") {
  247. break
  248. }
  249. log.Fatal("accept error: ", err)
  250. }
  251. if !s.ResetConfig() {
  252. conn.Close()
  253. continue
  254. }
  255. go s.handleConn(conn)
  256. }
  257. return nil
  258. }
  259. //close
  260. func (s *Sock5ModeServer) Close() error {
  261. return s.listener.Close()
  262. }
  263. //new
  264. func NewSock5ModeServer(bridge *bridge.Bridge, task *utils.Tunnel) *Sock5ModeServer {
  265. s := new(Sock5ModeServer)
  266. s.bridge = bridge
  267. s.task = task
  268. s.config = utils.DeepCopyConfig(task.Config)
  269. if s.config.U != "" && s.config.P != "" {
  270. s.isVerify = true
  271. } else {
  272. s.isVerify = false
  273. }
  274. return s
  275. }