1
0
mirror of https://github.com/v2fly/v2ray-core.git synced 2024-08-26 14:25:06 -04:00
v2fly/proxy/socks/protocol/socks.go

351 lines
7.9 KiB
Go
Raw Normal View History

package protocol
2015-09-07 11:12:31 -04:00
import (
2015-09-07 16:26:37 -04:00
"encoding/binary"
2015-09-07 11:16:30 -04:00
"io"
2015-09-10 18:24:18 -04:00
"github.com/v2ray/v2ray-core/common/errors"
2015-09-19 18:50:21 -04:00
"github.com/v2ray/v2ray-core/common/log"
v2net "github.com/v2ray/v2ray-core/common/net"
2015-09-07 11:12:31 -04:00
)
const (
2015-09-17 11:37:04 -04:00
socksVersion = byte(0x05)
socks4Version = byte(0x04)
2015-09-09 06:13:52 -04:00
2015-09-12 05:51:42 -04:00
AuthNotRequired = byte(0x00)
AuthGssApi = byte(0x01)
AuthUserPass = byte(0x02)
AuthNoMatchingMethod = byte(0xFF)
2015-09-17 11:37:04 -04:00
Socks4RequestGranted = byte(90)
Socks4RequestRejected = byte(91)
)
2015-09-07 11:12:31 -04:00
// Authentication request header of Socks5 protocol
type Socks5AuthenticationRequest struct {
2015-09-07 11:16:30 -04:00
version byte
2015-09-07 16:26:37 -04:00
nMethods byte
2015-09-07 11:16:30 -04:00
authMethods [256]byte
2015-09-07 11:12:31 -04:00
}
2015-09-09 06:13:52 -04:00
func (request *Socks5AuthenticationRequest) HasAuthMethod(method byte) bool {
2015-09-11 08:12:26 -04:00
for i := 0; i < int(request.nMethods); i++ {
2015-09-09 06:13:52 -04:00
if request.authMethods[i] == method {
return true
}
}
return false
}
2015-09-17 11:37:04 -04:00
func ReadAuthentication(reader io.Reader) (auth Socks5AuthenticationRequest, auth4 Socks4AuthenticationRequest, err error) {
2015-09-15 15:40:40 -04:00
buffer := make([]byte, 256)
2015-09-07 11:16:30 -04:00
nBytes, err := reader.Read(buffer)
if err != nil {
return
}
if nBytes < 2 {
log.Info("Socks expected 2 bytes read, but only %d bytes read", nBytes)
err = errors.NewCorruptedPacketError()
2015-09-07 11:16:30 -04:00
return
}
2015-09-17 11:37:04 -04:00
if buffer[0] == socks4Version {
auth4.Version = buffer[0]
auth4.Command = buffer[1]
auth4.Port = binary.BigEndian.Uint16(buffer[2:4])
copy(auth4.IP[:], buffer[4:8])
err = NewSocksVersion4Error()
2015-09-17 11:37:04 -04:00
return
}
2015-09-07 11:16:30 -04:00
auth.version = buffer[0]
if auth.version != socksVersion {
err = errors.NewProtocolVersionError(int(auth.version))
2015-09-07 11:16:30 -04:00
return
}
2015-09-07 16:26:37 -04:00
auth.nMethods = buffer[1]
if auth.nMethods <= 0 {
log.Info("Zero length of authentication methods")
err = errors.NewCorruptedPacketError()
2015-09-07 11:16:30 -04:00
return
}
2015-09-15 18:06:22 -04:00
if nBytes-2 != int(auth.nMethods) {
log.Info("Unmatching number of auth methods, expecting %d, but got %d", auth.nMethods, nBytes)
err = errors.NewCorruptedPacketError()
2015-09-07 16:26:37 -04:00
return
}
2015-09-15 15:40:40 -04:00
copy(auth.authMethods[:], buffer[2:nBytes])
2015-09-07 11:16:30 -04:00
return
2015-09-07 11:12:31 -04:00
}
type Socks5AuthenticationResponse struct {
2015-09-07 11:16:30 -04:00
version byte
authMethod byte
2015-09-07 11:12:31 -04:00
}
2015-09-17 11:37:04 -04:00
type Socks4AuthenticationResponse struct {
result byte
port uint16
ip []byte
}
2015-09-09 06:13:52 -04:00
func NewAuthenticationResponse(authMethod byte) *Socks5AuthenticationResponse {
2015-09-16 10:27:36 -04:00
return &Socks5AuthenticationResponse{
version: socksVersion,
authMethod: authMethod,
}
2015-09-09 06:13:52 -04:00
}
2015-09-17 11:37:04 -04:00
func NewSocks4AuthenticationResponse(result byte, port uint16, ip []byte) *Socks4AuthenticationResponse {
return &Socks4AuthenticationResponse{
result: result,
port: port,
ip: ip,
}
}
2015-09-16 10:06:16 -04:00
func WriteAuthentication(writer io.Writer, r *Socks5AuthenticationResponse) error {
_, err := writer.Write([]byte{r.version, r.authMethod})
return err
2015-09-17 11:37:04 -04:00
}
func WriteSocks4AuthenticationResponse(writer io.Writer, r *Socks4AuthenticationResponse) error {
buffer := make([]byte, 8)
// buffer[0] is always 0
buffer[1] = r.result
binary.BigEndian.PutUint16(buffer[2:4], r.port)
copy(buffer[4:], r.ip)
_, err := writer.Write(buffer)
return err
2015-09-07 11:12:31 -04:00
}
2015-09-07 16:26:37 -04:00
type Socks5UserPassRequest struct {
2015-09-15 18:06:22 -04:00
version byte
username string
password string
}
func (request Socks5UserPassRequest) IsValid(username string, password string) bool {
2015-09-15 18:06:22 -04:00
return request.username == username && request.password == password
}
func ReadUserPassRequest(reader io.Reader) (request Socks5UserPassRequest, err error) {
2015-09-15 18:06:22 -04:00
buffer := make([]byte, 256)
_, err = reader.Read(buffer[0:2])
if err != nil {
return
}
request.version = buffer[0]
nUsername := buffer[1]
nBytes, err := reader.Read(buffer[:nUsername])
if err != nil {
return
}
request.username = string(buffer[:nBytes])
_, err = reader.Read(buffer[0:1])
if err != nil {
return
}
nPassword := buffer[0]
nBytes, err = reader.Read(buffer[:nPassword])
if err != nil {
return
}
request.password = string(buffer[:nBytes])
return
}
type Socks5UserPassResponse struct {
2015-09-15 18:06:22 -04:00
version byte
status byte
}
func NewSocks5UserPassResponse(status byte) Socks5UserPassResponse {
return Socks5UserPassResponse{
version: socksVersion,
status: status,
}
}
func WriteUserPassResponse(writer io.Writer, response Socks5UserPassResponse) error {
2015-09-15 18:06:22 -04:00
_, err := writer.Write([]byte{response.version, response.status})
return err
}
const (
AddrTypeIPv4 = byte(0x01)
AddrTypeIPv6 = byte(0x04)
AddrTypeDomain = byte(0x03)
2015-09-09 06:13:52 -04:00
CmdConnect = byte(0x01)
CmdBind = byte(0x02)
CmdUdpAssociate = byte(0x03)
)
2015-09-07 16:26:37 -04:00
type Socks5Request struct {
2015-09-09 06:13:52 -04:00
Version byte
Command byte
AddrType byte
IPv4 [4]byte
Domain string
IPv6 [16]byte
Port uint16
2015-09-07 16:26:37 -04:00
}
func ReadRequest(reader io.Reader) (request *Socks5Request, err error) {
buffer := make([]byte, 256)
nBytes, err := reader.Read(buffer[:4])
2015-09-07 16:26:37 -04:00
if err != nil {
return
}
if nBytes < 4 {
err = errors.NewCorruptedPacketError()
2015-09-07 16:26:37 -04:00
return
}
2015-09-16 10:27:36 -04:00
request = &Socks5Request{
Version: buffer[0],
Command: buffer[1],
// buffer[2] is a reserved field
AddrType: buffer[3],
}
2015-09-09 06:13:52 -04:00
switch request.AddrType {
2015-09-10 18:24:18 -04:00
case AddrTypeIPv4:
2015-09-09 06:13:52 -04:00
nBytes, err = reader.Read(request.IPv4[:])
2015-09-07 16:26:37 -04:00
if err != nil {
return
}
if nBytes != 4 {
err = errors.NewCorruptedPacketError()
2015-09-07 16:26:37 -04:00
return
}
2015-09-10 18:24:18 -04:00
case AddrTypeDomain:
2015-09-11 08:12:26 -04:00
nBytes, err = reader.Read(buffer[0:1])
if err != nil {
return
}
domainLength := buffer[0]
2015-09-11 08:12:09 -04:00
nBytes, err = reader.Read(buffer[:domainLength])
2015-09-07 16:26:37 -04:00
if err != nil {
return
}
2015-09-11 08:12:26 -04:00
2015-09-11 08:12:09 -04:00
if nBytes != int(domainLength) {
log.Info("Unable to read domain with %d bytes, expecting %d bytes", nBytes, domainLength)
err = errors.NewCorruptedPacketError()
2015-09-07 16:26:37 -04:00
return
}
2015-09-11 08:12:09 -04:00
request.Domain = string(buffer[:domainLength])
2015-09-10 18:24:18 -04:00
case AddrTypeIPv6:
2015-09-09 06:13:52 -04:00
nBytes, err = reader.Read(request.IPv6[:])
2015-09-07 16:26:37 -04:00
if err != nil {
return
}
if nBytes != 16 {
err = errors.NewCorruptedPacketError()
2015-09-07 16:26:37 -04:00
return
}
default:
log.Info("Unexpected address type %d", request.AddrType)
err = errors.NewCorruptedPacketError()
2015-09-07 16:26:37 -04:00
return
}
nBytes, err = reader.Read(buffer[:2])
2015-09-07 16:26:37 -04:00
if err != nil {
return
}
if nBytes != 2 {
err = errors.NewCorruptedPacketError()
2015-09-07 16:26:37 -04:00
return
}
2015-09-09 06:13:52 -04:00
request.Port = binary.BigEndian.Uint16(buffer)
2015-09-07 16:26:37 -04:00
return
}
2015-09-20 12:22:29 -04:00
func (request *Socks5Request) Destination() v2net.Destination {
var address v2net.Address
2015-09-10 18:24:18 -04:00
switch request.AddrType {
case AddrTypeIPv4:
address = v2net.IPAddress(request.IPv4[:], request.Port)
2015-09-10 18:24:18 -04:00
case AddrTypeIPv6:
address = v2net.IPAddress(request.IPv6[:], request.Port)
2015-09-10 18:24:18 -04:00
case AddrTypeDomain:
address = v2net.DomainAddress(request.Domain, request.Port)
2015-09-10 18:24:18 -04:00
default:
panic("Unknown address type")
}
2015-09-20 12:22:29 -04:00
return v2net.NewTCPDestination(address)
2015-09-10 18:24:18 -04:00
}
const (
ErrorSuccess = byte(0x00)
ErrorGeneralFailure = byte(0x01)
ErrorConnectionNotAllowed = byte(0x02)
ErrorNetworkUnreachable = byte(0x03)
ErrorHostUnUnreachable = byte(0x04)
ErrorConnectionRefused = byte(0x05)
ErrorTTLExpired = byte(0x06)
ErrorCommandNotSupported = byte(0x07)
ErrorAddressTypeNotSupported = byte(0x08)
)
type Socks5Response struct {
Version byte
Error byte
AddrType byte
IPv4 [4]byte
Domain string
IPv6 [16]byte
Port uint16
}
2015-09-09 06:13:52 -04:00
func NewSocks5Response() *Socks5Response {
2015-09-16 10:27:36 -04:00
return &Socks5Response{
Version: socksVersion,
}
2015-09-09 06:13:52 -04:00
}
func (r *Socks5Response) SetIPv4(ipv4 []byte) {
r.AddrType = AddrTypeIPv4
copy(r.IPv4[:], ipv4)
}
func (r *Socks5Response) SetIPv6(ipv6 []byte) {
r.AddrType = AddrTypeIPv6
copy(r.IPv6[:], ipv6)
}
func (r *Socks5Response) SetDomain(domain string) {
r.AddrType = AddrTypeDomain
r.Domain = domain
}
func (r *Socks5Response) toBytes() []byte {
buffer := make([]byte, 0, 300)
buffer = append(buffer, r.Version)
buffer = append(buffer, r.Error)
buffer = append(buffer, 0x00) // reserved
buffer = append(buffer, r.AddrType)
switch r.AddrType {
case 0x01:
buffer = append(buffer, r.IPv4[:]...)
case 0x03:
buffer = append(buffer, byte(len(r.Domain)))
buffer = append(buffer, []byte(r.Domain)...)
case 0x04:
buffer = append(buffer, r.IPv6[:]...)
}
buffer = append(buffer, byte(r.Port>>8), byte(r.Port))
return buffer
}
2015-09-09 06:13:52 -04:00
func WriteResponse(writer io.Writer, response *Socks5Response) error {
_, err := writer.Write(response.toBytes())
return err
}