control.go 13 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526
  1. package client
  2. import (
  3. "bufio"
  4. "encoding/base64"
  5. "encoding/binary"
  6. "errors"
  7. "fmt"
  8. "io/ioutil"
  9. "log"
  10. "math"
  11. "math/rand"
  12. "net"
  13. "net/http"
  14. "net/url"
  15. "os"
  16. "path/filepath"
  17. "strconv"
  18. "strings"
  19. "time"
  20. "ehang.io/nps/lib/common"
  21. "ehang.io/nps/lib/config"
  22. "ehang.io/nps/lib/conn"
  23. "ehang.io/nps/lib/crypt"
  24. "ehang.io/nps/lib/version"
  25. "github.com/astaxie/beego/logs"
  26. "github.com/xtaci/kcp-go"
  27. "golang.org/x/net/proxy"
  28. )
  29. func GetTaskStatus(path string) {
  30. cnf, err := config.NewConfig(path)
  31. if err != nil {
  32. log.Fatalln(err)
  33. }
  34. c, err := NewConn(cnf.CommonConfig.Tp, cnf.CommonConfig.VKey, cnf.CommonConfig.Server, common.WORK_CONFIG, cnf.CommonConfig.ProxyUrl)
  35. if err != nil {
  36. log.Fatalln(err)
  37. }
  38. if _, err := c.Write([]byte(common.WORK_STATUS)); err != nil {
  39. log.Fatalln(err)
  40. }
  41. //read now vKey and write to server
  42. if f, err := common.ReadAllFromFile(filepath.Join(common.GetTmpPath(), "npc_vkey.txt")); err != nil {
  43. log.Fatalln(err)
  44. } else if _, err := c.Write([]byte(crypt.Md5(string(f)))); err != nil {
  45. log.Fatalln(err)
  46. }
  47. var isPub bool
  48. binary.Read(c, binary.LittleEndian, &isPub)
  49. if l, err := c.GetLen(); err != nil {
  50. log.Fatalln(err)
  51. } else if b, err := c.GetShortContent(l); err != nil {
  52. log.Fatalln(err)
  53. } else {
  54. arr := strings.Split(string(b), common.CONN_DATA_SEQ)
  55. for _, v := range cnf.Hosts {
  56. if common.InStrArr(arr, v.Remark) {
  57. log.Println(v.Remark, "ok")
  58. } else {
  59. log.Println(v.Remark, "not running")
  60. }
  61. }
  62. for _, v := range cnf.Tasks {
  63. ports := common.GetPorts(v.Ports)
  64. if v.Mode == "secret" {
  65. ports = append(ports, 0)
  66. }
  67. for _, vv := range ports {
  68. var remark string
  69. if len(ports) > 1 {
  70. remark = v.Remark + "_" + strconv.Itoa(vv)
  71. } else {
  72. remark = v.Remark
  73. }
  74. if common.InStrArr(arr, remark) {
  75. log.Println(remark, "ok")
  76. } else {
  77. log.Println(remark, "not running")
  78. }
  79. }
  80. }
  81. }
  82. os.Exit(0)
  83. }
  84. var errAdd = errors.New("The server returned an error, which port or host may have been occupied or not allowed to open.")
  85. func StartFromFile(path string) {
  86. first := true
  87. cnf, err := config.NewConfig(path)
  88. if err != nil || cnf.CommonConfig == nil {
  89. logs.Error("Config file %s loading error %s", path, err.Error())
  90. os.Exit(0)
  91. }
  92. logs.Info("Loading configuration file %s successfully", path)
  93. re:
  94. if first || cnf.CommonConfig.AutoReconnection {
  95. if !first {
  96. logs.Info("Reconnecting...")
  97. time.Sleep(time.Second * 5)
  98. }
  99. } else {
  100. return
  101. }
  102. first = false
  103. c, err := NewConn(cnf.CommonConfig.Tp, cnf.CommonConfig.VKey, cnf.CommonConfig.Server, common.WORK_CONFIG, cnf.CommonConfig.ProxyUrl)
  104. if err != nil {
  105. logs.Error(err)
  106. goto re
  107. }
  108. var isPub bool
  109. binary.Read(c, binary.LittleEndian, &isPub)
  110. // get tmp password
  111. var b []byte
  112. vkey := cnf.CommonConfig.VKey
  113. if isPub {
  114. // send global configuration to server and get status of config setting
  115. if _, err := c.SendInfo(cnf.CommonConfig.Client, common.NEW_CONF); err != nil {
  116. logs.Error(err)
  117. goto re
  118. }
  119. if !c.GetAddStatus() {
  120. logs.Error("the web_user may have been occupied!")
  121. goto re
  122. }
  123. if b, err = c.GetShortContent(16); err != nil {
  124. logs.Error(err)
  125. goto re
  126. }
  127. vkey = string(b)
  128. }
  129. ioutil.WriteFile(filepath.Join(common.GetTmpPath(), "npc_vkey.txt"), []byte(vkey), 0600)
  130. //send hosts to server
  131. for _, v := range cnf.Hosts {
  132. if _, err := c.SendInfo(v, common.NEW_HOST); err != nil {
  133. logs.Error(err)
  134. goto re
  135. }
  136. if !c.GetAddStatus() {
  137. logs.Error(errAdd, v.Host)
  138. goto re
  139. }
  140. }
  141. //send task to server
  142. for _, v := range cnf.Tasks {
  143. if _, err := c.SendInfo(v, common.NEW_TASK); err != nil {
  144. logs.Error(err)
  145. goto re
  146. }
  147. if !c.GetAddStatus() {
  148. logs.Error(errAdd, v.Ports, v.Remark)
  149. goto re
  150. }
  151. if v.Mode == "file" {
  152. //start local file server
  153. go startLocalFileServer(cnf.CommonConfig, v, vkey)
  154. }
  155. }
  156. //create local server secret or p2p
  157. for _, v := range cnf.LocalServer {
  158. go StartLocalServer(v, cnf.CommonConfig)
  159. }
  160. c.Close()
  161. if cnf.CommonConfig.Client.WebUserName == "" || cnf.CommonConfig.Client.WebPassword == "" {
  162. logs.Notice("web access login username:user password:%s", vkey)
  163. } else {
  164. logs.Notice("web access login username:%s password:%s", cnf.CommonConfig.Client.WebUserName, cnf.CommonConfig.Client.WebPassword)
  165. }
  166. NewRPClient(cnf.CommonConfig.Server, vkey, cnf.CommonConfig.Tp, cnf.CommonConfig.ProxyUrl, cnf, cnf.CommonConfig.DisconnectTime).Start()
  167. CloseLocalServer()
  168. goto re
  169. }
  170. // Create a new connection with the server and verify it
  171. func NewConn(tp string, vkey string, server string, connType string, proxyUrl string) (*conn.Conn, error) {
  172. var err error
  173. var connection net.Conn
  174. var sess *kcp.UDPSession
  175. if tp == "tcp" {
  176. if proxyUrl != "" {
  177. u, er := url.Parse(proxyUrl)
  178. if er != nil {
  179. return nil, er
  180. }
  181. switch u.Scheme {
  182. case "socks5":
  183. n, er := proxy.FromURL(u, nil)
  184. if er != nil {
  185. return nil, er
  186. }
  187. connection, err = n.Dial("tcp", server)
  188. default:
  189. connection, err = NewHttpProxyConn(u, server)
  190. }
  191. } else {
  192. connection, err = net.Dial("tcp", server)
  193. }
  194. } else {
  195. sess, err = kcp.DialWithOptions(server, nil, 10, 3)
  196. if err == nil {
  197. conn.SetUdpSession(sess)
  198. connection = sess
  199. }
  200. }
  201. if err != nil {
  202. return nil, err
  203. }
  204. connection.SetDeadline(time.Now().Add(time.Second * 10))
  205. defer connection.SetDeadline(time.Time{})
  206. c := conn.NewConn(connection)
  207. if _, err := c.Write([]byte(common.CONN_TEST)); err != nil {
  208. return nil, err
  209. }
  210. if err := c.WriteLenContent([]byte(version.GetVersion())); err != nil {
  211. return nil, err
  212. }
  213. if err := c.WriteLenContent([]byte(version.VERSION)); err != nil {
  214. return nil, err
  215. }
  216. b, err := c.GetShortContent(32)
  217. if err != nil {
  218. logs.Error(err)
  219. return nil, err
  220. }
  221. if crypt.Md5(version.GetVersion()) != string(b) {
  222. logs.Error("The client does not match the server version. The current core version of the client is", version.GetVersion())
  223. return nil, err
  224. }
  225. if _, err := c.Write([]byte(common.Getverifyval(vkey))); err != nil {
  226. return nil, err
  227. }
  228. if s, err := c.ReadFlag(); err != nil {
  229. return nil, err
  230. } else if s == common.VERIFY_EER {
  231. return nil, errors.New(fmt.Sprintf("Validation key %s incorrect", vkey))
  232. }
  233. if _, err := c.Write([]byte(connType)); err != nil {
  234. return nil, err
  235. }
  236. c.SetAlive(tp)
  237. return c, nil
  238. }
  239. //http proxy connection
  240. func NewHttpProxyConn(url *url.URL, remoteAddr string) (net.Conn, error) {
  241. req, err := http.NewRequest("CONNECT", "http://"+remoteAddr, nil)
  242. if err != nil {
  243. return nil, err
  244. }
  245. password, _ := url.User.Password()
  246. req.Header.Set("Authorization", "Basic "+basicAuth(strings.Trim(url.User.Username(), " "), password))
  247. // we make a http proxy request
  248. proxyConn, err := net.Dial("tcp", url.Host)
  249. if err != nil {
  250. return nil, err
  251. }
  252. if err := req.Write(proxyConn); err != nil {
  253. return nil, err
  254. }
  255. res, err := http.ReadResponse(bufio.NewReader(proxyConn), req)
  256. if err != nil {
  257. return nil, err
  258. }
  259. _ = res.Body.Close()
  260. if res.StatusCode != 200 {
  261. return nil, errors.New("Proxy error " + res.Status)
  262. }
  263. return proxyConn, nil
  264. }
  265. //get a basic auth string
  266. func basicAuth(username, password string) string {
  267. auth := username + ":" + password
  268. return base64.StdEncoding.EncodeToString([]byte(auth))
  269. }
  270. func getRemoteAddressFromServer(rAddr string, localConn *net.UDPConn, md5Password, role string, add int) error {
  271. rAddr, err := getNextAddr(rAddr, add)
  272. if err != nil {
  273. logs.Error(err)
  274. return err
  275. }
  276. addr, err := net.ResolveUDPAddr("udp", rAddr)
  277. if err != nil {
  278. return err
  279. }
  280. if _, err := localConn.WriteTo(common.GetWriteStr(md5Password, role), addr); err != nil {
  281. return err
  282. }
  283. return nil
  284. }
  285. func handleP2PUdp(localAddr, rAddr, md5Password, role string) (remoteAddress string, c net.PacketConn, err error) {
  286. localConn, err := newUdpConnByAddr(localAddr)
  287. if err != nil {
  288. return
  289. }
  290. err = getRemoteAddressFromServer(rAddr, localConn, md5Password, role, 0)
  291. if err != nil {
  292. logs.Error(err)
  293. return
  294. }
  295. err = getRemoteAddressFromServer(rAddr, localConn, md5Password, role, 1)
  296. if err != nil {
  297. logs.Error(err)
  298. return
  299. }
  300. err = getRemoteAddressFromServer(rAddr, localConn, md5Password, role, 2)
  301. if err != nil {
  302. logs.Error(err)
  303. return
  304. }
  305. var remoteAddr1, remoteAddr2, remoteAddr3 string
  306. for {
  307. buf := make([]byte, 1024)
  308. if n, addr, er := localConn.ReadFromUDP(buf); er != nil {
  309. err = er
  310. return
  311. } else {
  312. rAddr2, _ := getNextAddr(rAddr, 1)
  313. rAddr3, _ := getNextAddr(rAddr, 2)
  314. switch addr.String() {
  315. case rAddr:
  316. remoteAddr1 = string(buf[:n])
  317. case rAddr2:
  318. remoteAddr2 = string(buf[:n])
  319. case rAddr3:
  320. remoteAddr3 = string(buf[:n])
  321. }
  322. }
  323. if remoteAddr1 != "" && remoteAddr2 != "" && remoteAddr3 != "" {
  324. break
  325. }
  326. }
  327. if remoteAddress, err = sendP2PTestMsg(localConn, remoteAddr1, remoteAddr2, remoteAddr3); err != nil {
  328. return
  329. }
  330. c, err = newUdpConnByAddr(localAddr)
  331. return
  332. }
  333. func sendP2PTestMsg(localConn *net.UDPConn, remoteAddr1, remoteAddr2, remoteAddr3 string) (string, error) {
  334. logs.Trace(remoteAddr3, remoteAddr2, remoteAddr1)
  335. defer localConn.Close()
  336. isClose := false
  337. defer func() { isClose = true }()
  338. interval, err := getAddrInterval(remoteAddr1, remoteAddr2, remoteAddr3)
  339. if err != nil {
  340. return "", err
  341. }
  342. go func() {
  343. addr, err := getNextAddr(remoteAddr3, interval)
  344. if err != nil {
  345. return
  346. }
  347. remoteUdpAddr, err := net.ResolveUDPAddr("udp", addr)
  348. if err != nil {
  349. return
  350. }
  351. logs.Trace("try send test packet to target %s", addr)
  352. ticker := time.NewTicker(time.Millisecond * 500)
  353. defer ticker.Stop()
  354. for {
  355. select {
  356. case <-ticker.C:
  357. if isClose {
  358. return
  359. }
  360. if _, err := localConn.WriteTo([]byte(common.WORK_P2P_CONNECT), remoteUdpAddr); err != nil {
  361. return
  362. }
  363. }
  364. }
  365. }()
  366. if interval != 0 {
  367. ip := common.GetIpByAddr(remoteAddr2)
  368. go func() {
  369. ports := getRandomPortArr(common.GetPortByAddr(remoteAddr3), common.GetPortByAddr(remoteAddr3)+interval*50)
  370. for i := 0; i <= 50; i++ {
  371. go func(port int) {
  372. trueAddress := ip + ":" + strconv.Itoa(port)
  373. logs.Trace("try send test packet to target %s", trueAddress)
  374. remoteUdpAddr, err := net.ResolveUDPAddr("udp", trueAddress)
  375. if err != nil {
  376. return
  377. }
  378. ticker := time.NewTicker(time.Second * 2)
  379. defer ticker.Stop()
  380. for {
  381. select {
  382. case <-ticker.C:
  383. if isClose {
  384. return
  385. }
  386. if _, err := localConn.WriteTo([]byte(common.WORK_P2P_CONNECT), remoteUdpAddr); err != nil {
  387. return
  388. }
  389. }
  390. }
  391. }(ports[i])
  392. time.Sleep(time.Millisecond * 10)
  393. }
  394. }()
  395. }
  396. buf := make([]byte, 10)
  397. for {
  398. localConn.SetReadDeadline(time.Now().Add(time.Second * 10))
  399. n, addr, err := localConn.ReadFromUDP(buf)
  400. localConn.SetReadDeadline(time.Time{})
  401. if err != nil {
  402. break
  403. }
  404. switch string(buf[:n]) {
  405. case common.WORK_P2P_SUCCESS:
  406. for i := 20; i > 0; i-- {
  407. if _, err = localConn.WriteTo([]byte(common.WORK_P2P_END), addr); err != nil {
  408. return "", err
  409. }
  410. }
  411. return addr.String(), nil
  412. case common.WORK_P2P_END:
  413. logs.Trace("Remotely Address %s Reply Packet Successfully Received", addr.String())
  414. return addr.String(), nil
  415. case common.WORK_P2P_CONNECT:
  416. go func() {
  417. for i := 20; i > 0; i-- {
  418. logs.Trace("try send receive success packet to target %s", addr.String())
  419. if _, err = localConn.WriteTo([]byte(common.WORK_P2P_SUCCESS), addr); err != nil {
  420. return
  421. }
  422. time.Sleep(time.Second)
  423. }
  424. }()
  425. default:
  426. continue
  427. }
  428. }
  429. return "", errors.New("connect to the target failed, maybe the nat type is not support p2p")
  430. }
  431. func newUdpConnByAddr(addr string) (*net.UDPConn, error) {
  432. udpAddr, err := net.ResolveUDPAddr("udp", addr)
  433. if err != nil {
  434. return nil, err
  435. }
  436. udpConn, err := net.ListenUDP("udp", udpAddr)
  437. if err != nil {
  438. return nil, err
  439. }
  440. return udpConn, nil
  441. }
  442. func getNextAddr(addr string, n int) (string, error) {
  443. arr := strings.Split(addr, ":")
  444. if len(arr) != 2 {
  445. return "", errors.New(fmt.Sprintf("the format of %s incorrect", addr))
  446. }
  447. if p, err := strconv.Atoi(arr[1]); err != nil {
  448. return "", err
  449. } else {
  450. return arr[0] + ":" + strconv.Itoa(p+n), nil
  451. }
  452. }
  453. func getAddrInterval(addr1, addr2, addr3 string) (int, error) {
  454. arr1 := strings.Split(addr1, ":")
  455. if len(arr1) != 2 {
  456. return 0, errors.New(fmt.Sprintf("the format of %s incorrect", addr1))
  457. }
  458. arr2 := strings.Split(addr2, ":")
  459. if len(arr2) != 2 {
  460. return 0, errors.New(fmt.Sprintf("the format of %s incorrect", addr2))
  461. }
  462. arr3 := strings.Split(addr3, ":")
  463. if len(arr3) != 2 {
  464. return 0, errors.New(fmt.Sprintf("the format of %s incorrect", addr3))
  465. }
  466. p1, err := strconv.Atoi(arr1[1])
  467. if err != nil {
  468. return 0, err
  469. }
  470. p2, err := strconv.Atoi(arr2[1])
  471. if err != nil {
  472. return 0, err
  473. }
  474. p3, err := strconv.Atoi(arr3[1])
  475. if err != nil {
  476. return 0, err
  477. }
  478. interVal := int(math.Floor(math.Min(math.Abs(float64(p3-p2)), math.Abs(float64(p2-p1)))))
  479. if p3-p1 < 0 {
  480. return -interVal, nil
  481. }
  482. return interVal, nil
  483. }
  484. func getRandomPortArr(min, max int) []int {
  485. if min > max {
  486. min, max = max, min
  487. }
  488. addrAddr := make([]int, max-min+1)
  489. for i := min; i <= max; i++ {
  490. addrAddr[max-i] = i
  491. }
  492. rand.Seed(time.Now().UnixNano())
  493. var r, temp int
  494. for i := max - min; i > 0; i-- {
  495. r = rand.Int() % i
  496. temp = addrAddr[i]
  497. addrAddr[i] = addrAddr[r]
  498. addrAddr[r] = temp
  499. }
  500. return addrAddr
  501. }