go-socks5/handle.go

349 lines
9.5 KiB
Go
Raw Normal View History

2014-01-23 19:29:13 +00:00
package socks5
import (
2020-04-19 09:08:22 +00:00
"context"
2014-01-23 20:04:20 +00:00
"fmt"
"io"
2014-01-23 19:29:13 +00:00
"net"
2014-01-23 21:42:35 +00:00
"strings"
2020-04-20 08:19:51 +00:00
"sync"
2014-01-23 19:29:13 +00:00
2022-10-17 01:36:23 +00:00
"git.tcp.direct/kayos/go-socks5/statute"
2014-01-23 20:04:20 +00:00
)
2020-04-19 14:30:45 +00:00
// AddressRewriter is used to rewrite a destination transparently
type AddressRewriter interface {
2020-08-05 05:17:05 +00:00
Rewrite(ctx context.Context, request *Request) (context.Context, *statute.AddrSpec)
2020-04-19 14:30:45 +00:00
}
// A Request represents request received by a server
type Request struct {
2020-08-05 10:10:50 +00:00
statute.Request
// AuthContext provided during negotiation
AuthContext *AuthContext
2020-04-23 02:15:02 +00:00
// LocalAddr of the the network server listen
LocalAddr net.Addr
// RemoteAddr of the the network that sent the request
RemoteAddr net.Addr
// DestAddr of the actual destination (might be affected by rewrite)
2020-08-05 05:17:05 +00:00
DestAddr *statute.AddrSpec
2020-04-22 02:15:40 +00:00
// Reader connect of request
Reader io.Reader
2020-04-23 02:15:02 +00:00
// RawDestAddr of the desired destination
2020-08-05 05:17:05 +00:00
RawDestAddr *statute.AddrSpec
}
// ParseRequest creates a new Request from the tcp connection
func ParseRequest(bufConn io.Reader) (*Request, error) {
2020-08-05 10:10:50 +00:00
hd, err := statute.ParseRequest(bufConn)
2020-04-20 08:42:10 +00:00
if err != nil {
return nil, err
2020-04-19 13:55:14 +00:00
}
2020-04-19 13:37:05 +00:00
return &Request{
2020-08-05 10:10:50 +00:00
Request: hd,
RawDestAddr: &hd.DstAddr,
2020-04-22 02:15:40 +00:00
Reader: bufConn,
2020-04-19 13:37:05 +00:00
}, nil
}
// handleRequest is used for request processing after authentication
2020-08-06 03:11:30 +00:00
func (sf *Server) handleRequest(write io.Writer, req *Request) error {
var err error
2020-08-06 01:32:19 +00:00
ctx := context.Background()
2014-01-23 21:11:58 +00:00
// Resolve the address if we have a FQDN
2020-04-22 02:15:40 +00:00
dest := req.RawDestAddr
2014-01-24 00:46:32 +00:00
if dest.FQDN != "" {
2020-08-06 03:11:30 +00:00
ctx, dest.IP, err = sf.resolver.Resolve(ctx, dest.FQDN)
2014-01-23 21:11:58 +00:00
if err != nil {
if err := SendReply(write, statute.RepHostUnreachable, nil); err != nil {
return fmt.Errorf("failed to send reply, %v", err)
2014-01-23 21:11:58 +00:00
}
2020-04-19 14:30:45 +00:00
return fmt.Errorf("failed to resolve destination[%v], %v", dest.FQDN, err)
2014-01-23 21:11:58 +00:00
}
}
2014-01-24 00:55:08 +00:00
// Apply any address rewrites
2020-04-22 02:15:40 +00:00
req.DestAddr = req.RawDestAddr
2020-08-06 03:11:30 +00:00
if sf.rewriter != nil {
ctx, req.DestAddr = sf.rewriter.Rewrite(ctx, req)
2014-01-24 00:55:08 +00:00
}
2014-01-24 00:46:32 +00:00
2020-04-21 12:27:02 +00:00
// Check if this is allowed
var ok bool
2020-08-06 03:11:30 +00:00
ctx, ok = sf.rules.Allow(ctx, req)
2020-04-22 02:15:40 +00:00
if !ok {
if err := SendReply(write, statute.RepRuleFailure, nil); err != nil {
2020-04-21 12:27:02 +00:00
return fmt.Errorf("failed to send reply, %v", err)
}
2020-04-22 02:15:40 +00:00
return fmt.Errorf("bind to %v blocked by rules", req.RawDestAddr)
2020-04-21 12:27:02 +00:00
}
2014-01-23 20:04:20 +00:00
// Switch on the command
switch req.Command {
2020-08-05 05:17:05 +00:00
case statute.CommandConnect:
2020-08-06 03:11:30 +00:00
if sf.userConnectHandle != nil {
return sf.userConnectHandle(ctx, write, req)
2020-04-22 02:15:40 +00:00
}
2020-08-06 03:11:30 +00:00
return sf.handleConnect(ctx, write, req)
2020-08-05 05:17:05 +00:00
case statute.CommandBind:
2020-08-06 03:11:30 +00:00
if sf.userBindHandle != nil {
return sf.userBindHandle(ctx, write, req)
2020-04-22 02:15:40 +00:00
}
2020-08-06 03:11:30 +00:00
return sf.handleBind(ctx, write, req)
2020-08-05 05:17:05 +00:00
case statute.CommandAssociate:
2020-08-06 03:11:30 +00:00
if sf.userAssociateHandle != nil {
return sf.userAssociateHandle(ctx, write, req)
2020-04-22 02:15:40 +00:00
}
2020-08-06 03:11:30 +00:00
return sf.handleAssociate(ctx, write, req)
2014-01-23 20:04:20 +00:00
default:
if err := SendReply(write, statute.RepCommandNotSupported, nil); err != nil {
return fmt.Errorf("failed to send reply, %v", err)
2014-01-23 21:42:35 +00:00
}
2020-04-19 14:30:45 +00:00
return fmt.Errorf("unsupported command[%v]", req.Command)
2014-01-23 20:04:20 +00:00
}
}
// handleConnect is used to handle a connect command
2020-08-06 03:11:30 +00:00
func (sf *Server) handleConnect(ctx context.Context, writer io.Writer, request *Request) error {
2014-01-23 21:42:35 +00:00
// Attempt to connect
2020-08-06 03:11:30 +00:00
dial := sf.dial
2022-10-17 01:36:23 +00:00
select {
case <-ctx.Done():
return ctx.Err()
default:
}
2016-02-04 19:25:27 +00:00
if dial == nil {
2022-10-17 01:36:23 +00:00
dial = func(ctx context.Context, net_, addr string) (net.Conn, error) { return net.Dial(net_, addr) }
2016-02-04 19:25:27 +00:00
}
2020-04-24 07:52:47 +00:00
target, err := dial(ctx, "tcp", request.DestAddr.String())
2014-01-23 21:42:35 +00:00
if err != nil {
msg := err.Error()
2020-08-05 05:17:05 +00:00
resp := statute.RepHostUnreachable
2014-01-23 21:42:35 +00:00
if strings.Contains(msg, "refused") {
2020-08-05 05:17:05 +00:00
resp = statute.RepConnectionRefused
2014-01-23 21:42:35 +00:00
} else if strings.Contains(msg, "network is unreachable") {
2020-08-05 05:17:05 +00:00
resp = statute.RepNetworkUnreachable
2014-01-23 21:42:35 +00:00
}
if err := SendReply(writer, resp, nil); err != nil {
return fmt.Errorf("failed to send reply, %v", err)
2014-01-23 21:42:35 +00:00
}
2020-04-24 07:52:47 +00:00
return fmt.Errorf("connect to %v failed, %v", request.RawDestAddr, err)
2014-01-23 21:42:35 +00:00
}
defer target.Close()
// Send success
if err := SendReply(writer, statute.RepSuccess, target.LocalAddr()); err != nil {
return fmt.Errorf("failed to send reply, %v", err)
2014-01-23 21:42:35 +00:00
}
// Start proxying
2020-05-06 08:45:30 +00:00
errCh := make(chan error, 2)
sf.goFunc(func() { errCh <- sf.Proxy(target, request.Reader) })
sf.goFunc(func() { errCh <- sf.Proxy(writer, target) })
2014-01-23 21:42:35 +00:00
// Wait
2020-05-06 08:45:30 +00:00
for i := 0; i < 2; i++ {
2022-10-17 01:36:23 +00:00
select {
case <-ctx.Done():
return ctx.Err()
default:
}
2020-05-06 08:45:30 +00:00
e := <-errCh
if e != nil {
// return from this function closes target (and conn).
return e
}
2014-01-23 21:42:35 +00:00
}
2020-05-06 08:45:30 +00:00
return nil
2014-01-23 20:04:20 +00:00
}
// handleBind is used to handle a connect command
2020-08-06 03:11:30 +00:00
func (sf *Server) handleBind(_ context.Context, writer io.Writer, _ *Request) error {
2014-01-23 21:42:35 +00:00
// TODO: Support bind
if err := SendReply(writer, statute.RepCommandNotSupported, nil); err != nil {
2020-04-19 14:30:45 +00:00
return fmt.Errorf("failed to send reply: %v", err)
2014-01-23 21:42:35 +00:00
}
2014-01-23 20:04:20 +00:00
return nil
}
// handleAssociate is used to handle a connect command
2020-08-06 03:11:30 +00:00
func (sf *Server) handleAssociate(ctx context.Context, writer io.Writer, request *Request) error {
// Attempt to connect
2020-08-06 03:11:30 +00:00
dial := sf.dial
if dial == nil {
dial = func(ctx context.Context, net_, addr string) (net.Conn, error) {
return net.Dial(net_, addr)
}
}
2020-08-06 03:11:30 +00:00
2020-04-24 07:52:47 +00:00
target, err := dial(ctx, "udp", request.DestAddr.String())
if err != nil {
msg := err.Error()
2020-08-05 05:17:05 +00:00
resp := statute.RepHostUnreachable
if strings.Contains(msg, "refused") {
2020-08-05 05:17:05 +00:00
resp = statute.RepConnectionRefused
} else if strings.Contains(msg, "network is unreachable") {
2020-08-05 05:17:05 +00:00
resp = statute.RepNetworkUnreachable
}
if err := SendReply(writer, resp, nil); err != nil {
return fmt.Errorf("failed to send reply, %v", err)
}
2020-04-24 07:52:47 +00:00
return fmt.Errorf("connect to %v failed, %v", request.RawDestAddr, err)
}
defer target.Close()
2020-04-22 02:15:40 +00:00
targetUDP, ok := target.(*net.UDPConn)
if !ok {
if err := SendReply(writer, statute.RepServerFailure, nil); err != nil {
return fmt.Errorf("failed to send reply, %v", err)
}
return fmt.Errorf("dial udp invalid")
}
2020-04-20 09:09:16 +00:00
bindLn, err := net.ListenUDP("udp", nil)
if err != nil {
if err := SendReply(writer, statute.RepServerFailure, nil); err != nil {
return fmt.Errorf("failed to send reply, %v", err)
}
return fmt.Errorf("listen udp failed, %v", err)
}
2020-04-20 12:41:58 +00:00
defer bindLn.Close()
2020-08-06 03:11:30 +00:00
sf.logger.Errorf("target addr %v, listen addr: %s", targetUDP.RemoteAddr(), bindLn.LocalAddr())
// send BND.ADDR and BND.PORT, client used
if err = SendReply(writer, statute.RepSuccess, bindLn.LocalAddr()); err != nil {
return fmt.Errorf("failed to send reply, %v", err)
2014-01-23 21:42:35 +00:00
}
sf.goFunc(func() {
// read from client and write to remote server
2020-04-20 08:19:51 +00:00
conns := sync.Map{}
2020-08-06 03:11:30 +00:00
bufPool := sf.bufferPool.Get()
2020-04-20 12:41:58 +00:00
defer func() {
2020-04-22 02:15:40 +00:00
targetUDP.Close()
2020-04-20 12:41:58 +00:00
bindLn.Close()
2020-08-06 03:11:30 +00:00
sf.bufferPool.Put(bufPool)
2020-04-20 12:41:58 +00:00
}()
for {
2020-04-24 07:52:47 +00:00
n, srcAddr, err := bindLn.ReadFrom(bufPool[:cap(bufPool)])
if err != nil {
2020-04-24 01:08:15 +00:00
if strings.Contains(err.Error(), "use of closed network connection") {
2020-08-06 03:11:30 +00:00
sf.logger.Errorf("read data from bind listen address %s failed, %v", bindLn.LocalAddr(), err)
2020-04-24 01:08:15 +00:00
return
}
continue
}
2020-04-20 13:17:38 +00:00
pk, err := statute.ParseDatagram(bufPool[:n])
if err != nil {
2020-04-20 12:41:58 +00:00
continue
}
2020-04-20 08:19:51 +00:00
if _, ok := conns.LoadOrStore(srcAddr.String(), struct{}{}); !ok {
sf.goFunc(func() {
2020-04-20 08:19:51 +00:00
// read from remote server and write to client
2020-08-06 03:11:30 +00:00
bufPool := sf.bufferPool.Get()
2020-04-20 12:41:58 +00:00
defer func() {
2020-04-22 02:15:40 +00:00
targetUDP.Close()
2020-04-20 12:41:58 +00:00
bindLn.Close()
2020-08-06 03:11:30 +00:00
sf.bufferPool.Put(bufPool)
2020-04-20 12:41:58 +00:00
}()
2020-04-20 08:19:51 +00:00
for {
2020-04-20 12:41:58 +00:00
buf := bufPool[:cap(bufPool)]
2020-04-22 02:15:40 +00:00
n, remote, err := targetUDP.ReadFrom(buf)
2020-04-20 08:19:51 +00:00
if err != nil {
2020-08-06 03:11:30 +00:00
sf.logger.Errorf("read data from remote %s failed, %v", targetUDP.RemoteAddr(), err)
2020-04-20 08:19:51 +00:00
return
}
pkb, err := statute.NewDatagram(remote.String(), buf[:n])
2020-04-23 15:17:54 +00:00
if err != nil {
continue
}
2020-08-06 03:11:30 +00:00
tmpBufPool := sf.bufferPool.Get()
2020-04-20 12:41:58 +00:00
proBuf := tmpBufPool
2020-04-23 15:40:00 +00:00
proBuf = append(proBuf, pkb.Header()...)
2020-04-23 15:17:54 +00:00
proBuf = append(proBuf, pkb.Data...)
2020-04-20 12:41:58 +00:00
if _, err := bindLn.WriteTo(proBuf, srcAddr); err != nil {
2020-08-06 03:11:30 +00:00
sf.bufferPool.Put(tmpBufPool)
sf.logger.Errorf("write data to client %s failed, %v", bindLn.LocalAddr(), err)
2020-04-20 08:19:51 +00:00
return
}
2020-08-06 03:11:30 +00:00
sf.bufferPool.Put(tmpBufPool)
2020-04-20 08:19:51 +00:00
}
2020-04-20 08:52:29 +00:00
})
}
2020-04-24 07:52:47 +00:00
// 把消息写给remote sever
if _, err := targetUDP.Write(pk.Data); err != nil {
2020-08-06 03:11:30 +00:00
sf.logger.Errorf("write data to remote %s failed, %v", targetUDP.RemoteAddr(), err)
2020-04-24 07:52:47 +00:00
return
}
}
2020-04-20 08:52:29 +00:00
})
2020-08-06 03:11:30 +00:00
buf := sf.bufferPool.Get()
defer sf.bufferPool.Put(buf)
for {
2020-04-24 07:52:47 +00:00
_, err := request.Reader.Read(buf[:cap(buf)])
if err != nil {
2020-04-24 07:52:47 +00:00
if strings.Contains(err.Error(), "use of closed network connection") {
return err
}
}
}
2014-01-23 19:29:13 +00:00
}
2014-01-23 20:04:20 +00:00
2020-04-22 02:15:40 +00:00
// SendReply is used to send a reply message
2020-08-06 01:32:19 +00:00
// rep: reply status see statute's statute file
func SendReply(w io.Writer, rep uint8, bindAddr net.Addr) error {
rsp := statute.Reply{
Version: statute.VersionSocks5,
2020-08-06 01:32:19 +00:00
Response: rep,
BndAddr: statute.AddrSpec{
AddrType: statute.ATYPIPv4,
IP: net.IPv4zero,
Port: 0,
},
}
2020-04-19 15:40:14 +00:00
if rsp.Response == statute.RepSuccess {
if tcpAddr, ok := bindAddr.(*net.TCPAddr); ok && tcpAddr != nil {
rsp.BndAddr.IP = tcpAddr.IP
rsp.BndAddr.Port = tcpAddr.Port
} else if udpAddr, ok := bindAddr.(*net.UDPAddr); ok && udpAddr != nil {
rsp.BndAddr.IP = udpAddr.IP
rsp.BndAddr.Port = udpAddr.Port
2020-04-20 08:19:51 +00:00
} else {
rsp.Response = statute.RepAddrTypeNotSupported
2020-04-20 08:19:51 +00:00
}
2020-08-06 01:32:19 +00:00
if rsp.BndAddr.IP.To4() != nil {
rsp.BndAddr.AddrType = statute.ATYPIPv4
} else if rsp.BndAddr.IP.To16() != nil {
rsp.BndAddr.AddrType = statute.ATYPIPv6
2020-04-19 15:40:14 +00:00
}
2020-04-20 08:19:51 +00:00
}
2014-01-23 20:04:20 +00:00
// Send the message
_, err := w.Write(rsp.Bytes())
2014-01-23 20:04:20 +00:00
return err
}
2014-01-23 21:42:35 +00:00
type closeWriter interface {
CloseWrite() error
}
2020-04-22 02:15:40 +00:00
// Proxy is used to suffle data from src to destination, and sends errors
2014-01-23 21:42:35 +00:00
// down a dedicated channel
2020-08-06 03:11:30 +00:00
func (sf *Server) Proxy(dst io.Writer, src io.Reader) error {
buf := sf.bufferPool.Get()
defer sf.bufferPool.Put(buf)
2020-04-20 01:41:06 +00:00
_, err := io.CopyBuffer(dst, src, buf[:cap(buf)])
if tcpConn, ok := dst.(closeWriter); ok {
tcpConn.CloseWrite() // nolint: errcheck
}
return err
2014-01-23 21:42:35 +00:00
}