dialer.go 3.1 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596
  1. package tcp
  2. import (
  3. "context"
  4. "strings"
  5. "github.com/xtls/xray-core/common"
  6. "github.com/xtls/xray-core/common/errors"
  7. "github.com/xtls/xray-core/common/net"
  8. "github.com/xtls/xray-core/common/session"
  9. "github.com/xtls/xray-core/transport/internet"
  10. "github.com/xtls/xray-core/transport/internet/reality"
  11. "github.com/xtls/xray-core/transport/internet/stat"
  12. "github.com/xtls/xray-core/transport/internet/tls"
  13. )
  14. func IsFromMitm(str string) bool {
  15. return strings.ToLower(str) == "frommitm"
  16. }
  17. // Dial dials a new TCP connection to the given destination.
  18. func Dial(ctx context.Context, dest net.Destination, streamSettings *internet.MemoryStreamConfig) (stat.Connection, error) {
  19. errors.LogInfo(ctx, "dialing TCP to ", dest)
  20. conn, err := internet.DialSystem(ctx, dest, streamSettings.SocketSettings)
  21. if err != nil {
  22. return nil, err
  23. }
  24. if config := tls.ConfigFromStreamSettings(streamSettings); config != nil {
  25. mitmServerName := session.MitmServerNameFromContext(ctx)
  26. mitmAlpn11 := session.MitmAlpn11FromContext(ctx)
  27. tlsConfig := config.GetTLSConfig(tls.WithDestination(dest))
  28. if IsFromMitm(tlsConfig.ServerName) {
  29. tlsConfig.ServerName = mitmServerName
  30. }
  31. if r, ok := tlsConfig.Rand.(*tls.RandCarrier); ok && len(r.VerifyPeerCertInNames) > 0 && IsFromMitm(r.VerifyPeerCertInNames[0]) {
  32. r.VerifyPeerCertInNames = r.VerifyPeerCertInNames[1:]
  33. after := mitmServerName
  34. for {
  35. if len(after) > 0 {
  36. r.VerifyPeerCertInNames = append(r.VerifyPeerCertInNames, after)
  37. }
  38. _, after, _ = strings.Cut(after, ".")
  39. if !strings.Contains(after, ".") {
  40. break
  41. }
  42. }
  43. }
  44. if fingerprint := tls.GetFingerprint(config.Fingerprint); fingerprint != nil {
  45. conn = tls.UClient(conn, tlsConfig, fingerprint)
  46. if len(tlsConfig.NextProtos) == 1 && (tlsConfig.NextProtos[0] == "http/1.1" || (IsFromMitm(tlsConfig.NextProtos[0]) && mitmAlpn11)) {
  47. if err := conn.(*tls.UConn).WebsocketHandshakeContext(ctx); err != nil {
  48. return nil, err
  49. }
  50. } else {
  51. if err := conn.(*tls.UConn).HandshakeContext(ctx); err != nil {
  52. return nil, err
  53. }
  54. }
  55. } else {
  56. if len(tlsConfig.NextProtos) == 1 && IsFromMitm(tlsConfig.NextProtos[0]) {
  57. if mitmAlpn11 {
  58. tlsConfig.NextProtos[0] = "http/1.1"
  59. } else {
  60. tlsConfig.NextProtos = nil
  61. }
  62. }
  63. conn = tls.Client(conn, tlsConfig)
  64. if err := conn.(*tls.Conn).HandshakeContext(ctx); err != nil {
  65. return nil, err
  66. }
  67. }
  68. } else if config := reality.ConfigFromStreamSettings(streamSettings); config != nil {
  69. if conn, err = reality.UClient(conn, config, ctx, dest); err != nil {
  70. return nil, err
  71. }
  72. }
  73. tcpSettings := streamSettings.ProtocolSettings.(*Config)
  74. if tcpSettings.HeaderSettings != nil {
  75. headerConfig, err := tcpSettings.HeaderSettings.GetInstance()
  76. if err != nil {
  77. return nil, errors.New("failed to get header settings").Base(err).AtError()
  78. }
  79. auth, err := internet.CreateConnectionAuthenticator(headerConfig)
  80. if err != nil {
  81. return nil, errors.New("failed to create header authenticator").Base(err).AtError()
  82. }
  83. conn = auth.Client(conn)
  84. }
  85. return stat.Connection(conn), nil
  86. }
  87. func init() {
  88. common.Must(internet.RegisterTransportDialer(protocolName, Dial))
  89. }