2020-07-22 23:02:15 +08:00
|
|
|
package outbound
|
|
|
|
|
|
|
|
import (
|
|
|
|
"context"
|
2023-05-28 22:51:26 +08:00
|
|
|
"errors"
|
2020-07-22 23:02:15 +08:00
|
|
|
"fmt"
|
|
|
|
"net"
|
|
|
|
"strconv"
|
|
|
|
|
2023-11-03 21:01:45 +08:00
|
|
|
N "github.com/metacubex/mihomo/common/net"
|
|
|
|
"github.com/metacubex/mihomo/component/dialer"
|
|
|
|
"github.com/metacubex/mihomo/component/proxydialer"
|
|
|
|
C "github.com/metacubex/mihomo/constant"
|
|
|
|
"github.com/metacubex/mihomo/transport/shadowsocks/core"
|
|
|
|
"github.com/metacubex/mihomo/transport/shadowsocks/shadowaead"
|
|
|
|
"github.com/metacubex/mihomo/transport/shadowsocks/shadowstream"
|
|
|
|
"github.com/metacubex/mihomo/transport/socks5"
|
|
|
|
"github.com/metacubex/mihomo/transport/ssr/obfs"
|
|
|
|
"github.com/metacubex/mihomo/transport/ssr/protocol"
|
2020-07-22 23:02:15 +08:00
|
|
|
)
|
|
|
|
|
|
|
|
type ShadowSocksR struct {
|
|
|
|
*Base
|
2023-04-10 11:20:28 +08:00
|
|
|
option *ShadowSocksROption
|
2021-02-15 14:32:03 +08:00
|
|
|
cipher core.Cipher
|
2020-07-22 23:02:15 +08:00
|
|
|
obfs obfs.Obfs
|
|
|
|
protocol protocol.Protocol
|
|
|
|
}
|
|
|
|
|
|
|
|
type ShadowSocksROption struct {
|
2021-11-07 16:48:51 +08:00
|
|
|
BasicOption
|
2020-07-22 23:02:15 +08:00
|
|
|
Name string `proxy:"name"`
|
|
|
|
Server string `proxy:"server"`
|
|
|
|
Port int `proxy:"port"`
|
|
|
|
Password string `proxy:"password"`
|
|
|
|
Cipher string `proxy:"cipher"`
|
|
|
|
Obfs string `proxy:"obfs"`
|
|
|
|
ObfsParam string `proxy:"obfs-param,omitempty"`
|
|
|
|
Protocol string `proxy:"protocol"`
|
|
|
|
ProtocolParam string `proxy:"protocol-param,omitempty"`
|
|
|
|
UDP bool `proxy:"udp,omitempty"`
|
|
|
|
}
|
|
|
|
|
2023-05-18 13:15:08 +08:00
|
|
|
// StreamConnContext implements C.ProxyAdapter
|
|
|
|
func (ssr *ShadowSocksR) StreamConnContext(ctx context.Context, c net.Conn, metadata *C.Metadata) (net.Conn, error) {
|
2021-02-15 14:32:03 +08:00
|
|
|
c = ssr.obfs.StreamConn(c)
|
2020-07-22 23:02:15 +08:00
|
|
|
c = ssr.cipher.StreamConn(c)
|
2021-02-15 14:32:03 +08:00
|
|
|
var (
|
|
|
|
iv []byte
|
|
|
|
err error
|
|
|
|
)
|
|
|
|
switch conn := c.(type) {
|
|
|
|
case *shadowstream.Conn:
|
|
|
|
iv, err = conn.ObtainWriteIV()
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
case *shadowaead.Conn:
|
2020-07-22 23:02:15 +08:00
|
|
|
return nil, fmt.Errorf("invalid connection type")
|
|
|
|
}
|
2021-02-15 14:32:03 +08:00
|
|
|
c = ssr.protocol.StreamConn(c, iv)
|
2020-07-22 23:02:15 +08:00
|
|
|
_, err = c.Write(serializesSocksAddr(metadata))
|
|
|
|
return c, err
|
|
|
|
}
|
|
|
|
|
2021-04-29 11:23:14 +08:00
|
|
|
// DialContext implements C.ProxyAdapter
|
2021-11-07 16:48:51 +08:00
|
|
|
func (ssr *ShadowSocksR) DialContext(ctx context.Context, metadata *C.Metadata, opts ...dialer.Option) (_ C.Conn, err error) {
|
2022-12-20 00:11:02 +08:00
|
|
|
return ssr.DialContextWithDialer(ctx, dialer.NewDialer(ssr.Base.DialOptions(opts...)...), metadata)
|
2022-12-19 21:34:07 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
// DialContextWithDialer implements C.ProxyAdapter
|
|
|
|
func (ssr *ShadowSocksR) DialContextWithDialer(ctx context.Context, dialer C.Dialer, metadata *C.Metadata) (_ C.Conn, err error) {
|
2023-04-10 11:20:28 +08:00
|
|
|
if len(ssr.option.DialerProxy) > 0 {
|
|
|
|
dialer, err = proxydialer.NewByName(ssr.option.DialerProxy, dialer)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
}
|
2022-12-19 21:34:07 +08:00
|
|
|
c, err := dialer.DialContext(ctx, "tcp", ssr.addr)
|
2020-07-22 23:02:15 +08:00
|
|
|
if err != nil {
|
|
|
|
return nil, fmt.Errorf("%s connect error: %w", ssr.addr, err)
|
|
|
|
}
|
|
|
|
|
2022-12-16 22:15:44 +08:00
|
|
|
defer func(c net.Conn) {
|
2022-12-13 13:20:40 +08:00
|
|
|
safeConnClose(c, err)
|
2022-12-16 22:15:44 +08:00
|
|
|
}(c)
|
2021-03-22 23:26:20 +08:00
|
|
|
|
2023-05-18 13:15:08 +08:00
|
|
|
c, err = ssr.StreamConnContext(ctx, c, metadata)
|
2020-07-22 23:02:15 +08:00
|
|
|
return NewConn(c, ssr), err
|
|
|
|
}
|
|
|
|
|
2021-10-15 21:44:53 +08:00
|
|
|
// ListenPacketContext implements C.ProxyAdapter
|
2021-11-07 16:48:51 +08:00
|
|
|
func (ssr *ShadowSocksR) ListenPacketContext(ctx context.Context, metadata *C.Metadata, opts ...dialer.Option) (C.PacketConn, error) {
|
2022-12-20 00:11:02 +08:00
|
|
|
return ssr.ListenPacketWithDialer(ctx, dialer.NewDialer(ssr.Base.DialOptions(opts...)...), metadata)
|
2022-12-19 21:34:07 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
// ListenPacketWithDialer implements C.ProxyAdapter
|
|
|
|
func (ssr *ShadowSocksR) ListenPacketWithDialer(ctx context.Context, dialer C.Dialer, metadata *C.Metadata) (_ C.PacketConn, err error) {
|
2023-04-10 11:20:28 +08:00
|
|
|
if len(ssr.option.DialerProxy) > 0 {
|
|
|
|
dialer, err = proxydialer.NewByName(ssr.option.DialerProxy, dialer)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
}
|
2022-12-13 11:18:32 +08:00
|
|
|
addr, err := resolveUDPAddrWithPrefer(ctx, "udp", ssr.addr, ssr.prefer)
|
2020-07-22 23:02:15 +08:00
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
2022-12-19 21:34:07 +08:00
|
|
|
pc, err := dialer.ListenPacket(ctx, "udp", "", addr.AddrPort())
|
2020-07-22 23:02:15 +08:00
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
2023-05-28 22:51:26 +08:00
|
|
|
epc := ssr.cipher.PacketConn(N.NewEnhancePacketConn(pc))
|
|
|
|
epc = ssr.protocol.PacketConn(epc)
|
|
|
|
return newPacketConn(&ssrPacketConn{EnhancePacketConn: epc, rAddr: addr}, ssr), nil
|
2020-07-22 23:02:15 +08:00
|
|
|
}
|
|
|
|
|
2022-12-19 21:34:07 +08:00
|
|
|
// SupportWithDialer implements C.ProxyAdapter
|
2023-04-11 12:51:24 +08:00
|
|
|
func (ssr *ShadowSocksR) SupportWithDialer() C.NetWork {
|
|
|
|
return C.ALLNet
|
2022-12-19 17:02:04 +08:00
|
|
|
}
|
|
|
|
|
2020-07-22 23:02:15 +08:00
|
|
|
func NewShadowSocksR(option ShadowSocksROption) (*ShadowSocksR, error) {
|
2022-04-13 10:06:06 +08:00
|
|
|
// SSR protocol compatibility
|
2023-11-03 21:01:45 +08:00
|
|
|
// https://github.com/metacubex/mihomo/pull/2056
|
2022-04-13 10:06:06 +08:00
|
|
|
if option.Cipher == "none" {
|
|
|
|
option.Cipher = "dummy"
|
|
|
|
}
|
|
|
|
|
2020-07-22 23:02:15 +08:00
|
|
|
addr := net.JoinHostPort(option.Server, strconv.Itoa(option.Port))
|
|
|
|
cipher := option.Cipher
|
|
|
|
password := option.Password
|
|
|
|
coreCiph, err := core.PickCipher(cipher, nil, password)
|
|
|
|
if err != nil {
|
2021-02-15 14:32:03 +08:00
|
|
|
return nil, fmt.Errorf("ssr %s initialize error: %w", addr, err)
|
2020-07-22 23:02:15 +08:00
|
|
|
}
|
2021-02-15 14:32:03 +08:00
|
|
|
var (
|
|
|
|
ivSize int
|
|
|
|
key []byte
|
|
|
|
)
|
2022-04-13 10:06:06 +08:00
|
|
|
|
2021-02-15 14:32:03 +08:00
|
|
|
if option.Cipher == "dummy" {
|
|
|
|
ivSize = 0
|
|
|
|
key = core.Kdf(option.Password, 16)
|
|
|
|
} else {
|
|
|
|
ciph, ok := coreCiph.(*core.StreamCipher)
|
|
|
|
if !ok {
|
2022-04-13 10:06:06 +08:00
|
|
|
return nil, fmt.Errorf("%s is not none or a supported stream cipher in ssr", cipher)
|
2021-02-15 14:32:03 +08:00
|
|
|
}
|
|
|
|
ivSize = ciph.IVSize()
|
|
|
|
key = ciph.Key
|
2020-07-22 23:02:15 +08:00
|
|
|
}
|
|
|
|
|
2021-02-15 14:32:03 +08:00
|
|
|
obfs, obfsOverhead, err := obfs.PickObfs(option.Obfs, &obfs.Base{
|
|
|
|
Host: option.Server,
|
|
|
|
Port: option.Port,
|
|
|
|
Key: key,
|
|
|
|
IVSize: ivSize,
|
|
|
|
Param: option.ObfsParam,
|
2020-07-22 23:02:15 +08:00
|
|
|
})
|
|
|
|
if err != nil {
|
|
|
|
return nil, fmt.Errorf("ssr %s initialize obfs error: %w", addr, err)
|
|
|
|
}
|
|
|
|
|
|
|
|
protocol, err := protocol.PickProtocol(option.Protocol, &protocol.Base{
|
2021-02-15 14:32:03 +08:00
|
|
|
Key: key,
|
|
|
|
Overhead: obfsOverhead,
|
|
|
|
Param: option.ProtocolParam,
|
2020-07-22 23:02:15 +08:00
|
|
|
})
|
|
|
|
if err != nil {
|
|
|
|
return nil, fmt.Errorf("ssr %s initialize protocol error: %w", addr, err)
|
|
|
|
}
|
|
|
|
|
|
|
|
return &ShadowSocksR{
|
|
|
|
Base: &Base{
|
2022-08-28 13:41:19 +08:00
|
|
|
name: option.Name,
|
|
|
|
addr: addr,
|
|
|
|
tp: C.ShadowsocksR,
|
|
|
|
udp: option.UDP,
|
2023-02-24 13:53:44 +08:00
|
|
|
tfo: option.TFO,
|
2023-08-09 16:57:39 +08:00
|
|
|
mpTcp: option.MPTCP,
|
2022-08-28 13:41:19 +08:00
|
|
|
iface: option.Interface,
|
|
|
|
rmark: option.RoutingMark,
|
|
|
|
prefer: C.NewDNSPrefer(option.IPVersion),
|
2020-07-22 23:02:15 +08:00
|
|
|
},
|
2023-04-10 11:20:28 +08:00
|
|
|
option: &option,
|
2021-02-15 14:32:03 +08:00
|
|
|
cipher: coreCiph,
|
2020-07-22 23:02:15 +08:00
|
|
|
obfs: obfs,
|
|
|
|
protocol: protocol,
|
|
|
|
}, nil
|
|
|
|
}
|
2023-05-28 22:51:26 +08:00
|
|
|
|
|
|
|
type ssrPacketConn struct {
|
|
|
|
N.EnhancePacketConn
|
|
|
|
rAddr net.Addr
|
|
|
|
}
|
|
|
|
|
|
|
|
func (spc *ssrPacketConn) WriteTo(b []byte, addr net.Addr) (n int, err error) {
|
|
|
|
packet, err := socks5.EncodeUDPPacket(socks5.ParseAddrToSocksAddr(addr), b)
|
|
|
|
if err != nil {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
return spc.EnhancePacketConn.WriteTo(packet[3:], spc.rAddr)
|
|
|
|
}
|
|
|
|
|
|
|
|
func (spc *ssrPacketConn) ReadFrom(b []byte) (int, net.Addr, error) {
|
|
|
|
n, _, e := spc.EnhancePacketConn.ReadFrom(b)
|
|
|
|
if e != nil {
|
|
|
|
return 0, nil, e
|
|
|
|
}
|
|
|
|
|
|
|
|
addr := socks5.SplitAddr(b[:n])
|
|
|
|
if addr == nil {
|
|
|
|
return 0, nil, errors.New("parse addr error")
|
|
|
|
}
|
|
|
|
|
|
|
|
udpAddr := addr.UDPAddr()
|
|
|
|
if udpAddr == nil {
|
|
|
|
return 0, nil, errors.New("parse addr error")
|
|
|
|
}
|
|
|
|
|
|
|
|
copy(b, b[len(addr):])
|
|
|
|
return n - len(addr), udpAddr, e
|
|
|
|
}
|
|
|
|
|
|
|
|
func (spc *ssrPacketConn) WaitReadFrom() (data []byte, put func(), addr net.Addr, err error) {
|
|
|
|
data, put, _, err = spc.EnhancePacketConn.WaitReadFrom()
|
|
|
|
if err != nil {
|
|
|
|
return nil, nil, nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
_addr := socks5.SplitAddr(data)
|
|
|
|
if _addr == nil {
|
|
|
|
if put != nil {
|
|
|
|
put()
|
|
|
|
}
|
|
|
|
return nil, nil, nil, errors.New("parse addr error")
|
|
|
|
}
|
|
|
|
|
|
|
|
addr = _addr.UDPAddr()
|
|
|
|
if addr == nil {
|
|
|
|
if put != nil {
|
|
|
|
put()
|
|
|
|
}
|
|
|
|
return nil, nil, nil, errors.New("parse addr error")
|
|
|
|
}
|
|
|
|
|
|
|
|
data = data[len(_addr):]
|
|
|
|
return
|
|
|
|
}
|