socks5.go 9.1 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395
  1. package proxy
  2. import (
  3. "encoding/binary"
  4. "errors"
  5. "io"
  6. "net"
  7. "strconv"
  8. "ehang.io/nps/lib/common"
  9. "ehang.io/nps/lib/conn"
  10. "ehang.io/nps/lib/file"
  11. "github.com/astaxie/beego/logs"
  12. )
  13. const (
  14. ipV4 = 1
  15. domainName = 3
  16. ipV6 = 4
  17. connectMethod = 1
  18. bindMethod = 2
  19. associateMethod = 3
  20. // The maximum packet size of any udp Associate packet, based on ethernet's max size,
  21. // minus the IP and UDP headers. IPv4 has a 20 byte header, UDP adds an
  22. // additional 4 bytes. This is a total overhead of 24 bytes. Ethernet's
  23. // max packet size is 1500 bytes, 1500 - 24 = 1476.
  24. maxUDPPacketSize = 1476
  25. )
  26. const (
  27. succeeded uint8 = iota
  28. serverFailure
  29. notAllowed
  30. networkUnreachable
  31. hostUnreachable
  32. connectionRefused
  33. ttlExpired
  34. commandNotSupported
  35. addrTypeNotSupported
  36. )
  37. const (
  38. UserPassAuth = uint8(2)
  39. userAuthVersion = uint8(1)
  40. authSuccess = uint8(0)
  41. authFailure = uint8(1)
  42. )
  43. type Sock5ModeServer struct {
  44. BaseServer
  45. listener net.Listener
  46. }
  47. //req
  48. func (s *Sock5ModeServer) handleRequest(c net.Conn) {
  49. /*
  50. The SOCKS request is formed as follows:
  51. +----+-----+-------+------+----------+----------+
  52. |VER | CMD | RSV | ATYP | DST.ADDR | DST.PORT |
  53. +----+-----+-------+------+----------+----------+
  54. | 1 | 1 | X'00' | 1 | Variable | 2 |
  55. +----+-----+-------+------+----------+----------+
  56. */
  57. header := make([]byte, 3)
  58. _, err := io.ReadFull(c, header)
  59. if err != nil {
  60. logs.Warn("illegal request", err)
  61. c.Close()
  62. return
  63. }
  64. switch header[1] {
  65. case connectMethod:
  66. s.handleConnect(c)
  67. case bindMethod:
  68. s.handleBind(c)
  69. case associateMethod:
  70. s.handleUDP(c)
  71. default:
  72. s.sendReply(c, commandNotSupported)
  73. c.Close()
  74. }
  75. }
  76. //reply
  77. func (s *Sock5ModeServer) sendReply(c net.Conn, rep uint8) {
  78. reply := []byte{
  79. 5,
  80. rep,
  81. 0,
  82. 1,
  83. }
  84. localAddr := c.LocalAddr().String()
  85. localHost, localPort, _ := net.SplitHostPort(localAddr)
  86. ipBytes := net.ParseIP(localHost).To4()
  87. nPort, _ := strconv.Atoi(localPort)
  88. reply = append(reply, ipBytes...)
  89. portBytes := make([]byte, 2)
  90. binary.BigEndian.PutUint16(portBytes, uint16(nPort))
  91. reply = append(reply, portBytes...)
  92. c.Write(reply)
  93. }
  94. //do conn
  95. func (s *Sock5ModeServer) doConnect(c net.Conn, command uint8) {
  96. addrType := make([]byte, 1)
  97. c.Read(addrType)
  98. var host string
  99. switch addrType[0] {
  100. case ipV4:
  101. ipv4 := make(net.IP, net.IPv4len)
  102. c.Read(ipv4)
  103. host = ipv4.String()
  104. case ipV6:
  105. ipv6 := make(net.IP, net.IPv6len)
  106. c.Read(ipv6)
  107. host = ipv6.String()
  108. case domainName:
  109. var domainLen uint8
  110. binary.Read(c, binary.BigEndian, &domainLen)
  111. domain := make([]byte, domainLen)
  112. c.Read(domain)
  113. host = string(domain)
  114. default:
  115. s.sendReply(c, addrTypeNotSupported)
  116. return
  117. }
  118. var port uint16
  119. binary.Read(c, binary.BigEndian, &port)
  120. // connect to host
  121. addr := net.JoinHostPort(host, strconv.Itoa(int(port)))
  122. var ltype string
  123. if command == associateMethod {
  124. ltype = common.CONN_UDP
  125. } else {
  126. ltype = common.CONN_TCP
  127. }
  128. s.DealClient(conn.NewConn(c), s.task.Client, addr, nil, ltype, func() {
  129. s.sendReply(c, succeeded)
  130. }, s.task.Flow, s.task.Target.LocalProxy)
  131. return
  132. }
  133. //conn
  134. func (s *Sock5ModeServer) handleConnect(c net.Conn) {
  135. s.doConnect(c, connectMethod)
  136. }
  137. // passive mode
  138. func (s *Sock5ModeServer) handleBind(c net.Conn) {
  139. }
  140. func (s *Sock5ModeServer) sendUdpReply(writeConn net.Conn, c net.Conn, rep uint8, serverIp string) {
  141. reply := []byte{
  142. 5,
  143. rep,
  144. 0,
  145. 1,
  146. }
  147. localHost, localPort, _ := net.SplitHostPort(c.LocalAddr().String())
  148. localHost = serverIp
  149. ipBytes := net.ParseIP(localHost).To4()
  150. nPort, _ := strconv.Atoi(localPort)
  151. reply = append(reply, ipBytes...)
  152. portBytes := make([]byte, 2)
  153. binary.BigEndian.PutUint16(portBytes, uint16(nPort))
  154. reply = append(reply, portBytes...)
  155. writeConn.Write(reply)
  156. }
  157. func (s *Sock5ModeServer) handleUDP(c net.Conn) {
  158. defer c.Close()
  159. addrType := make([]byte, 1)
  160. c.Read(addrType)
  161. var host string
  162. switch addrType[0] {
  163. case ipV4:
  164. ipv4 := make(net.IP, net.IPv4len)
  165. c.Read(ipv4)
  166. host = ipv4.String()
  167. case ipV6:
  168. ipv6 := make(net.IP, net.IPv6len)
  169. c.Read(ipv6)
  170. host = ipv6.String()
  171. case domainName:
  172. var domainLen uint8
  173. binary.Read(c, binary.BigEndian, &domainLen)
  174. domain := make([]byte, domainLen)
  175. c.Read(domain)
  176. host = string(domain)
  177. default:
  178. s.sendReply(c, addrTypeNotSupported)
  179. return
  180. }
  181. //读取端口
  182. var port uint16
  183. binary.Read(c, binary.BigEndian, &port)
  184. logs.Warn(host, string(port))
  185. replyAddr, err := net.ResolveUDPAddr("udp", s.task.ServerIp+":0")
  186. if err != nil {
  187. logs.Error("build local reply addr error", err)
  188. return
  189. }
  190. reply, err := net.ListenUDP("udp", replyAddr)
  191. if err != nil {
  192. s.sendReply(c, addrTypeNotSupported)
  193. logs.Error("listen local reply udp port error")
  194. return
  195. }
  196. // reply the local addr
  197. s.sendUdpReply(c, reply, succeeded, common.GetServerIpByClientIp(c.RemoteAddr().(*net.TCPAddr).IP))
  198. defer reply.Close()
  199. // new a tunnel to client
  200. link := conn.NewLink("udp5", "", s.task.Client.Cnf.Crypt, s.task.Client.Cnf.Compress, c.RemoteAddr().String(), false)
  201. target, err := s.bridge.SendLinkInfo(s.task.Client.Id, link, s.task)
  202. if err != nil {
  203. logs.Warn("get connection from client id %d error %s", s.task.Client.Id, err.Error())
  204. return
  205. }
  206. var clientAddr net.Addr
  207. // copy buffer
  208. go func() {
  209. b := common.BufPoolUdp.Get().([]byte)
  210. defer common.BufPoolUdp.Put(b)
  211. defer c.Close()
  212. for {
  213. n, laddr, err := reply.ReadFrom(b)
  214. if err != nil {
  215. logs.Error("read data from %s err %s", reply.LocalAddr().String(), err.Error())
  216. return
  217. }
  218. if clientAddr == nil {
  219. clientAddr = laddr
  220. }
  221. if _, err := target.Write(b[:n]); err != nil {
  222. logs.Error("write data to client error", err.Error())
  223. return
  224. }
  225. }
  226. }()
  227. go func() {
  228. var l int32
  229. b := common.BufPoolUdp.Get().([]byte)
  230. defer common.BufPoolUdp.Put(b)
  231. defer c.Close()
  232. for {
  233. if err := binary.Read(target, binary.LittleEndian, &l); err != nil || l >= common.PoolSizeUdp || l <= 0 {
  234. logs.Warn("read len bytes error", err.Error())
  235. return
  236. }
  237. binary.Read(target, binary.LittleEndian, b[:l])
  238. if err != nil {
  239. logs.Warn("read data form client error", err.Error())
  240. return
  241. }
  242. if _, err := reply.WriteTo(b[:l], clientAddr); err != nil {
  243. logs.Warn("write data to user ", err.Error())
  244. return
  245. }
  246. }
  247. }()
  248. b := common.BufPoolUdp.Get().([]byte)
  249. defer common.BufPoolUdp.Put(b)
  250. defer target.Close()
  251. for {
  252. _, err := c.Read(b)
  253. if err != nil {
  254. c.Close()
  255. return
  256. }
  257. }
  258. }
  259. //new conn
  260. func (s *Sock5ModeServer) handleConn(c net.Conn) {
  261. buf := make([]byte, 2)
  262. if _, err := io.ReadFull(c, buf); err != nil {
  263. logs.Warn("negotiation err", err)
  264. c.Close()
  265. return
  266. }
  267. if version := buf[0]; version != 5 {
  268. logs.Warn("only support socks5, request from: ", c.RemoteAddr())
  269. c.Close()
  270. return
  271. }
  272. nMethods := buf[1]
  273. methods := make([]byte, nMethods)
  274. if len, err := c.Read(methods); len != int(nMethods) || err != nil {
  275. logs.Warn("wrong method")
  276. c.Close()
  277. return
  278. }
  279. if (s.task.Client.Cnf.U != "" && s.task.Client.Cnf.P != "") || (s.task.MultiAccount != nil && len(s.task.MultiAccount.AccountMap) > 0) {
  280. buf[1] = UserPassAuth
  281. c.Write(buf)
  282. if err := s.Auth(c); err != nil {
  283. c.Close()
  284. logs.Warn("Validation failed:", err)
  285. return
  286. }
  287. } else {
  288. buf[1] = 0
  289. c.Write(buf)
  290. }
  291. s.handleRequest(c)
  292. }
  293. //socks5 auth
  294. func (s *Sock5ModeServer) Auth(c net.Conn) error {
  295. header := []byte{0, 0}
  296. if _, err := io.ReadAtLeast(c, header, 2); err != nil {
  297. return err
  298. }
  299. if header[0] != userAuthVersion {
  300. return errors.New("验证方式不被支持")
  301. }
  302. userLen := int(header[1])
  303. user := make([]byte, userLen)
  304. if _, err := io.ReadAtLeast(c, user, userLen); err != nil {
  305. return err
  306. }
  307. if _, err := c.Read(header[:1]); err != nil {
  308. return errors.New("密码长度获取错误")
  309. }
  310. passLen := int(header[0])
  311. pass := make([]byte, passLen)
  312. if _, err := io.ReadAtLeast(c, pass, passLen); err != nil {
  313. return err
  314. }
  315. var U, P string
  316. if s.task.MultiAccount != nil {
  317. // enable multi user auth
  318. U = string(user)
  319. var ok bool
  320. P, ok = s.task.MultiAccount.AccountMap[U]
  321. if !ok {
  322. return errors.New("验证不通过")
  323. }
  324. } else {
  325. U = s.task.Client.Cnf.U
  326. P = s.task.Client.Cnf.P
  327. }
  328. if string(user) == U && string(pass) == P {
  329. if _, err := c.Write([]byte{userAuthVersion, authSuccess}); err != nil {
  330. return err
  331. }
  332. return nil
  333. } else {
  334. if _, err := c.Write([]byte{userAuthVersion, authFailure}); err != nil {
  335. return err
  336. }
  337. return errors.New("验证不通过")
  338. }
  339. }
  340. //start
  341. func (s *Sock5ModeServer) Start() error {
  342. return conn.NewTcpListenerAndProcess(s.task.ServerIp+":"+strconv.Itoa(s.task.Port), func(c net.Conn) {
  343. if err := s.CheckFlowAndConnNum(s.task.Client); err != nil {
  344. logs.Warn("client id %d, task id %d, error %s, when socks5 connection", s.task.Client.Id, s.task.Id, err.Error())
  345. c.Close()
  346. return
  347. }
  348. logs.Trace("New socks5 connection,client %d,remote address %s", s.task.Client.Id, c.RemoteAddr())
  349. s.handleConn(c)
  350. s.task.Client.AddConn()
  351. }, &s.listener)
  352. }
  353. //new
  354. func NewSock5ModeServer(bridge NetBridge, task *file.Tunnel) *Sock5ModeServer {
  355. s := new(Sock5ModeServer)
  356. s.bridge = bridge
  357. s.task = task
  358. return s
  359. }
  360. //close
  361. func (s *Sock5ModeServer) Close() error {
  362. return s.listener.Close()
  363. }