2018-09-06 10:53:29 +08:00
|
|
|
package vmess
|
|
|
|
|
|
|
|
import (
|
2018-09-08 19:53:24 +08:00
|
|
|
"crypto/tls"
|
2018-09-06 10:53:29 +08:00
|
|
|
"fmt"
|
|
|
|
"math/rand"
|
|
|
|
"net"
|
2018-10-28 23:46:32 +08:00
|
|
|
"net/url"
|
2018-09-06 10:53:29 +08:00
|
|
|
"runtime"
|
2018-11-01 11:54:45 +08:00
|
|
|
"sync"
|
2018-10-28 23:46:32 +08:00
|
|
|
"time"
|
2018-09-06 10:53:29 +08:00
|
|
|
|
|
|
|
"github.com/gofrs/uuid"
|
2018-10-28 23:46:32 +08:00
|
|
|
"github.com/gorilla/websocket"
|
2018-09-06 10:53:29 +08:00
|
|
|
)
|
|
|
|
|
|
|
|
// Version of vmess
|
|
|
|
const Version byte = 1
|
|
|
|
|
|
|
|
// Request Options
|
|
|
|
const (
|
|
|
|
OptionChunkStream byte = 1
|
|
|
|
OptionChunkMasking byte = 4
|
|
|
|
)
|
|
|
|
|
|
|
|
// Security type vmess
|
|
|
|
type Security = byte
|
|
|
|
|
|
|
|
// Cipher types
|
|
|
|
const (
|
|
|
|
SecurityAES128GCM Security = 3
|
|
|
|
SecurityCHACHA20POLY1305 Security = 4
|
|
|
|
SecurityNone Security = 5
|
|
|
|
)
|
|
|
|
|
|
|
|
// CipherMapping return
|
|
|
|
var CipherMapping = map[string]byte{
|
|
|
|
"none": SecurityNone,
|
|
|
|
"aes-128-gcm": SecurityAES128GCM,
|
|
|
|
"chacha20-poly1305": SecurityCHACHA20POLY1305,
|
|
|
|
}
|
|
|
|
|
2018-11-01 11:54:45 +08:00
|
|
|
var (
|
|
|
|
clientSessionCache tls.ClientSessionCache
|
|
|
|
once sync.Once
|
|
|
|
)
|
|
|
|
|
2018-09-06 10:53:29 +08:00
|
|
|
// Command types
|
|
|
|
const (
|
|
|
|
CommandTCP byte = 1
|
|
|
|
CommandUDP byte = 2
|
|
|
|
)
|
|
|
|
|
|
|
|
// Addr types
|
|
|
|
const (
|
|
|
|
AtypIPv4 byte = 1
|
|
|
|
AtypDomainName byte = 2
|
|
|
|
AtypIPv6 byte = 3
|
|
|
|
)
|
|
|
|
|
|
|
|
// DstAddr store destination address
|
|
|
|
type DstAddr struct {
|
|
|
|
AddrType byte
|
|
|
|
Addr []byte
|
|
|
|
Port uint
|
|
|
|
}
|
|
|
|
|
|
|
|
// Client is vmess connection generator
|
|
|
|
type Client struct {
|
2018-11-01 11:54:45 +08:00
|
|
|
user []*ID
|
|
|
|
uuid *uuid.UUID
|
|
|
|
security Security
|
|
|
|
tls bool
|
|
|
|
host string
|
|
|
|
websocket bool
|
|
|
|
websocketPath string
|
|
|
|
tlsConfig *tls.Config
|
2018-09-06 10:53:29 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
// Config of vmess
|
|
|
|
type Config struct {
|
2018-10-29 20:16:43 +08:00
|
|
|
UUID string
|
|
|
|
AlterID uint16
|
|
|
|
Security string
|
|
|
|
TLS bool
|
|
|
|
Host string
|
|
|
|
NetWork string
|
|
|
|
WebSocketPath string
|
|
|
|
SkipCertVerify bool
|
2018-11-01 11:54:45 +08:00
|
|
|
SessionCacahe tls.ClientSessionCache
|
2018-09-06 10:53:29 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
// New return a Conn with net.Conn and DstAddr
|
2018-10-28 23:46:32 +08:00
|
|
|
func (c *Client) New(conn net.Conn, dst *DstAddr) (net.Conn, error) {
|
2018-09-06 10:53:29 +08:00
|
|
|
r := rand.Intn(len(c.user))
|
2018-10-28 23:46:32 +08:00
|
|
|
if c.websocket {
|
|
|
|
dialer := &websocket.Dialer{
|
|
|
|
NetDial: func(network, addr string) (net.Conn, error) {
|
|
|
|
return conn, nil
|
|
|
|
},
|
|
|
|
ReadBufferSize: 4 * 1024,
|
|
|
|
WriteBufferSize: 4 * 1024,
|
|
|
|
HandshakeTimeout: time.Second * 8,
|
|
|
|
}
|
|
|
|
scheme := "ws"
|
|
|
|
if c.tls {
|
|
|
|
scheme = "wss"
|
2018-11-01 11:54:45 +08:00
|
|
|
dialer.TLSClientConfig = c.tlsConfig
|
2018-10-28 23:46:32 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
host, port, err := net.SplitHostPort(c.host)
|
|
|
|
if (scheme == "ws" && port != "80") || (scheme == "wss" && port != "443") {
|
|
|
|
host = c.host
|
|
|
|
}
|
|
|
|
|
|
|
|
uri := url.URL{
|
|
|
|
Scheme: scheme,
|
|
|
|
Host: host,
|
|
|
|
Path: c.websocketPath,
|
|
|
|
}
|
|
|
|
|
|
|
|
wsConn, resp, err := dialer.Dial(uri.String(), nil)
|
|
|
|
if err != nil {
|
|
|
|
var reason string
|
|
|
|
if resp != nil {
|
|
|
|
reason = resp.Status
|
|
|
|
}
|
|
|
|
return nil, fmt.Errorf("Dial %s error: %s", host, reason)
|
|
|
|
}
|
|
|
|
|
|
|
|
conn = newWebsocketConn(wsConn, conn.RemoteAddr())
|
|
|
|
} else if c.tls {
|
2018-11-01 11:54:45 +08:00
|
|
|
conn = tls.Client(conn, c.tlsConfig)
|
2018-09-08 19:53:24 +08:00
|
|
|
}
|
2018-10-28 23:46:32 +08:00
|
|
|
return newConn(conn, c.user[r], dst, c.security), nil
|
2018-09-06 10:53:29 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
// NewClient return Client instance
|
|
|
|
func NewClient(config Config) (*Client, error) {
|
|
|
|
uid, err := uuid.FromString(config.UUID)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
var security Security
|
|
|
|
switch config.Security {
|
|
|
|
case "aes-128-gcm":
|
|
|
|
security = SecurityAES128GCM
|
|
|
|
case "chacha20-poly1305":
|
|
|
|
security = SecurityCHACHA20POLY1305
|
|
|
|
case "none":
|
|
|
|
security = SecurityNone
|
|
|
|
case "auto":
|
|
|
|
security = SecurityCHACHA20POLY1305
|
|
|
|
if runtime.GOARCH == "amd64" || runtime.GOARCH == "s390x" || runtime.GOARCH == "arm64" {
|
|
|
|
security = SecurityAES128GCM
|
|
|
|
}
|
|
|
|
default:
|
|
|
|
return nil, fmt.Errorf("Unknown security type: %s", config.Security)
|
|
|
|
}
|
2018-10-28 23:46:32 +08:00
|
|
|
|
|
|
|
if config.NetWork != "" && config.NetWork != "ws" {
|
|
|
|
return nil, fmt.Errorf("Unknown network type: %s", config.NetWork)
|
|
|
|
}
|
|
|
|
|
2018-11-01 11:54:45 +08:00
|
|
|
var tlsConfig *tls.Config
|
|
|
|
if config.TLS {
|
|
|
|
tlsConfig = &tls.Config{
|
|
|
|
InsecureSkipVerify: config.SkipCertVerify,
|
|
|
|
ClientSessionCache: config.SessionCacahe,
|
|
|
|
}
|
|
|
|
if tlsConfig.ClientSessionCache == nil {
|
|
|
|
tlsConfig.ClientSessionCache = getClientSessionCache()
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2018-09-06 10:53:29 +08:00
|
|
|
return &Client{
|
2018-10-28 23:46:32 +08:00
|
|
|
user: newAlterIDs(newID(&uid), config.AlterID),
|
|
|
|
uuid: &uid,
|
|
|
|
security: security,
|
|
|
|
tls: config.TLS,
|
|
|
|
host: config.Host,
|
|
|
|
websocket: config.NetWork == "ws",
|
|
|
|
websocketPath: config.WebSocketPath,
|
2018-11-01 11:54:45 +08:00
|
|
|
tlsConfig: tlsConfig,
|
2018-09-06 10:53:29 +08:00
|
|
|
}, nil
|
|
|
|
}
|
2018-11-01 11:54:45 +08:00
|
|
|
|
|
|
|
func getClientSessionCache() tls.ClientSessionCache {
|
|
|
|
once.Do(func() {
|
|
|
|
clientSessionCache = tls.NewLRUClientSessionCache(128)
|
|
|
|
})
|
|
|
|
return clientSessionCache
|
|
|
|
}
|