sniff.go 3.3 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153
  1. package tls
  2. import (
  3. "encoding/binary"
  4. "errors"
  5. "github.com/xtls/xray-core/common"
  6. "github.com/xtls/xray-core/common/protocol"
  7. )
  8. type SniffHeader struct {
  9. domain string
  10. }
  11. func (h *SniffHeader) Protocol() string {
  12. return "tls"
  13. }
  14. func (h *SniffHeader) Domain() string {
  15. return h.domain
  16. }
  17. var (
  18. errNotTLS = errors.New("not TLS header")
  19. errNotClientHello = errors.New("not client hello")
  20. )
  21. func IsValidTLSVersion(major, minor byte) bool {
  22. return major == 3
  23. }
  24. // ReadClientHello returns server name (if any) from TLS client hello message.
  25. // https://github.com/golang/go/blob/master/src/crypto/tls/handshake_messages.go#L300
  26. func ReadClientHello(data []byte, h *SniffHeader) error {
  27. if len(data) < 42 {
  28. return common.ErrNoClue
  29. }
  30. sessionIDLen := int(data[38])
  31. if sessionIDLen > 32 || len(data) < 39+sessionIDLen {
  32. return common.ErrNoClue
  33. }
  34. data = data[39+sessionIDLen:]
  35. if len(data) < 2 {
  36. return common.ErrNoClue
  37. }
  38. // cipherSuiteLen is the number of bytes of cipher suite numbers. Since
  39. // they are uint16s, the number must be even.
  40. cipherSuiteLen := int(data[0])<<8 | int(data[1])
  41. if cipherSuiteLen%2 == 1 || len(data) < 2+cipherSuiteLen {
  42. return errNotClientHello
  43. }
  44. data = data[2+cipherSuiteLen:]
  45. if len(data) < 1 {
  46. return common.ErrNoClue
  47. }
  48. compressionMethodsLen := int(data[0])
  49. if len(data) < 1+compressionMethodsLen {
  50. return common.ErrNoClue
  51. }
  52. data = data[1+compressionMethodsLen:]
  53. if len(data) < 2 {
  54. return errNotClientHello
  55. }
  56. extensionsLength := int(data[0])<<8 | int(data[1])
  57. data = data[2:]
  58. if extensionsLength != len(data) {
  59. return errNotClientHello
  60. }
  61. for len(data) != 0 {
  62. if len(data) < 4 {
  63. return errNotClientHello
  64. }
  65. extension := uint16(data[0])<<8 | uint16(data[1])
  66. length := int(data[2])<<8 | int(data[3])
  67. data = data[4:]
  68. if len(data) < length {
  69. return errNotClientHello
  70. }
  71. if extension == 0x00 { /* extensionServerName */
  72. d := data[:length]
  73. if len(d) < 2 {
  74. return errNotClientHello
  75. }
  76. namesLen := int(d[0])<<8 | int(d[1])
  77. d = d[2:]
  78. if len(d) != namesLen {
  79. return errNotClientHello
  80. }
  81. for len(d) > 0 {
  82. if len(d) < 3 {
  83. return errNotClientHello
  84. }
  85. nameType := d[0]
  86. nameLen := int(d[1])<<8 | int(d[2])
  87. d = d[3:]
  88. if len(d) < nameLen {
  89. return errNotClientHello
  90. }
  91. if nameType == 0 {
  92. // QUIC separated across packets
  93. // May cause the serverName to be incomplete
  94. b := byte(0)
  95. for _, b = range d[:nameLen] {
  96. if b <= ' ' {
  97. return protocol.ErrProtoNeedMoreData
  98. }
  99. }
  100. // An SNI value may not include a
  101. // trailing dot. See
  102. // https://tools.ietf.org/html/rfc6066#section-3.
  103. if b == '.' {
  104. return errNotClientHello
  105. }
  106. serverName := string(d[:nameLen])
  107. h.domain = serverName
  108. return nil
  109. }
  110. d = d[nameLen:]
  111. }
  112. }
  113. data = data[length:]
  114. }
  115. return errNotTLS
  116. }
  117. func SniffTLS(b []byte) (*SniffHeader, error) {
  118. if len(b) < 5 {
  119. return nil, common.ErrNoClue
  120. }
  121. if b[0] != 0x16 /* TLS Handshake */ {
  122. return nil, errNotTLS
  123. }
  124. if !IsValidTLSVersion(b[1], b[2]) {
  125. return nil, errNotTLS
  126. }
  127. headerLen := int(binary.BigEndian.Uint16(b[3:5]))
  128. if 5+headerLen > len(b) {
  129. return nil, common.ErrNoClue
  130. }
  131. h := &SniffHeader{}
  132. err := ReadClientHello(b[5:5+headerLen], h)
  133. if err == nil {
  134. return h, nil
  135. }
  136. return nil, err
  137. }