freedom.go 13 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521
  1. package freedom
  2. import (
  3. "context"
  4. "crypto/rand"
  5. "io"
  6. "time"
  7. "github.com/pires/go-proxyproto"
  8. "github.com/xtls/xray-core/common"
  9. "github.com/xtls/xray-core/common/buf"
  10. "github.com/xtls/xray-core/common/crypto"
  11. "github.com/xtls/xray-core/common/dice"
  12. "github.com/xtls/xray-core/common/errors"
  13. "github.com/xtls/xray-core/common/net"
  14. "github.com/xtls/xray-core/common/platform"
  15. "github.com/xtls/xray-core/common/retry"
  16. "github.com/xtls/xray-core/common/session"
  17. "github.com/xtls/xray-core/common/signal"
  18. "github.com/xtls/xray-core/common/task"
  19. "github.com/xtls/xray-core/core"
  20. "github.com/xtls/xray-core/features/dns"
  21. "github.com/xtls/xray-core/features/policy"
  22. "github.com/xtls/xray-core/features/stats"
  23. "github.com/xtls/xray-core/proxy"
  24. "github.com/xtls/xray-core/transport"
  25. "github.com/xtls/xray-core/transport/internet"
  26. "github.com/xtls/xray-core/transport/internet/stat"
  27. "github.com/xtls/xray-core/transport/internet/tls"
  28. )
  29. var useSplice bool
  30. func init() {
  31. common.Must(common.RegisterConfig((*Config)(nil), func(ctx context.Context, config interface{}) (interface{}, error) {
  32. h := new(Handler)
  33. if err := core.RequireFeatures(ctx, func(pm policy.Manager, d dns.Client) error {
  34. return h.Init(config.(*Config), pm, d)
  35. }); err != nil {
  36. return nil, err
  37. }
  38. return h, nil
  39. }))
  40. const defaultFlagValue = "NOT_DEFINED_AT_ALL"
  41. value := platform.NewEnvFlag(platform.UseFreedomSplice).GetValue(func() string { return defaultFlagValue })
  42. switch value {
  43. case defaultFlagValue, "auto", "enable":
  44. useSplice = true
  45. }
  46. }
  47. // Handler handles Freedom connections.
  48. type Handler struct {
  49. policyManager policy.Manager
  50. dns dns.Client
  51. config *Config
  52. }
  53. // Init initializes the Handler with necessary parameters.
  54. func (h *Handler) Init(config *Config, pm policy.Manager, d dns.Client) error {
  55. h.config = config
  56. h.policyManager = pm
  57. h.dns = d
  58. return nil
  59. }
  60. func (h *Handler) policy() policy.Session {
  61. p := h.policyManager.ForLevel(h.config.UserLevel)
  62. return p
  63. }
  64. func (h *Handler) resolveIP(ctx context.Context, domain string, localAddr net.Address) net.Address {
  65. ips, err := h.dns.LookupIP(domain, dns.IPOption{
  66. IPv4Enable: (localAddr == nil || localAddr.Family().IsIPv4()) && h.config.preferIP4(),
  67. IPv6Enable: (localAddr == nil || localAddr.Family().IsIPv6()) && h.config.preferIP6(),
  68. })
  69. { // Resolve fallback
  70. if (len(ips) == 0 || err != nil) && h.config.hasFallback() && localAddr == nil {
  71. ips, err = h.dns.LookupIP(domain, dns.IPOption{
  72. IPv4Enable: h.config.fallbackIP4(),
  73. IPv6Enable: h.config.fallbackIP6(),
  74. })
  75. }
  76. }
  77. if err != nil {
  78. errors.LogInfoInner(ctx, err, "failed to get IP address for domain ", domain)
  79. }
  80. if len(ips) == 0 {
  81. return nil
  82. }
  83. return net.IPAddress(ips[dice.Roll(len(ips))])
  84. }
  85. func isValidAddress(addr *net.IPOrDomain) bool {
  86. if addr == nil {
  87. return false
  88. }
  89. a := addr.AsAddress()
  90. return a != net.AnyIP
  91. }
  92. // Process implements proxy.Outbound.
  93. func (h *Handler) Process(ctx context.Context, link *transport.Link, dialer internet.Dialer) error {
  94. outbounds := session.OutboundsFromContext(ctx)
  95. ob := outbounds[len(outbounds)-1]
  96. if !ob.Target.IsValid() {
  97. return errors.New("target not specified.")
  98. }
  99. ob.Name = "freedom"
  100. ob.CanSpliceCopy = 1
  101. inbound := session.InboundFromContext(ctx)
  102. destination := ob.Target
  103. UDPOverride := net.UDPDestination(nil, 0)
  104. if h.config.DestinationOverride != nil {
  105. server := h.config.DestinationOverride.Server
  106. if isValidAddress(server.Address) {
  107. destination.Address = server.Address.AsAddress()
  108. UDPOverride.Address = destination.Address
  109. }
  110. if server.Port != 0 {
  111. destination.Port = net.Port(server.Port)
  112. UDPOverride.Port = destination.Port
  113. }
  114. }
  115. input := link.Reader
  116. output := link.Writer
  117. var conn stat.Connection
  118. err := retry.ExponentialBackoff(5, 100).On(func() error {
  119. dialDest := destination
  120. if h.config.hasStrategy() && dialDest.Address.Family().IsDomain() {
  121. ip := h.resolveIP(ctx, dialDest.Address.Domain(), dialer.Address())
  122. if ip != nil {
  123. dialDest = net.Destination{
  124. Network: dialDest.Network,
  125. Address: ip,
  126. Port: dialDest.Port,
  127. }
  128. errors.LogInfo(ctx, "dialing to ", dialDest)
  129. } else if h.config.forceIP() {
  130. return dns.ErrEmptyResponse
  131. }
  132. }
  133. rawConn, err := dialer.Dial(ctx, dialDest)
  134. if err != nil {
  135. return err
  136. }
  137. if h.config.ProxyProtocol > 0 && h.config.ProxyProtocol <= 2 {
  138. version := byte(h.config.ProxyProtocol)
  139. srcAddr := inbound.Source.RawNetAddr()
  140. dstAddr := rawConn.RemoteAddr()
  141. header := proxyproto.HeaderProxyFromAddrs(version, srcAddr, dstAddr)
  142. if _, err = header.WriteTo(rawConn); err != nil {
  143. rawConn.Close()
  144. return err
  145. }
  146. }
  147. conn = rawConn
  148. return nil
  149. })
  150. if err != nil {
  151. return errors.New("failed to open connection to ", destination).Base(err)
  152. }
  153. defer conn.Close()
  154. errors.LogInfo(ctx, "connection opened to ", destination, ", local endpoint ", conn.LocalAddr(), ", remote endpoint ", conn.RemoteAddr())
  155. var newCtx context.Context
  156. var newCancel context.CancelFunc
  157. if session.TimeoutOnlyFromContext(ctx) {
  158. newCtx, newCancel = context.WithCancel(context.Background())
  159. }
  160. plcy := h.policy()
  161. ctx, cancel := context.WithCancel(ctx)
  162. timer := signal.CancelAfterInactivity(ctx, func() {
  163. cancel()
  164. if newCancel != nil {
  165. newCancel()
  166. }
  167. }, plcy.Timeouts.ConnectionIdle)
  168. requestDone := func() error {
  169. defer timer.SetTimeout(plcy.Timeouts.DownlinkOnly)
  170. var writer buf.Writer
  171. if destination.Network == net.Network_TCP {
  172. if h.config.Fragment != nil {
  173. errors.LogDebug(ctx, "FRAGMENT", h.config.Fragment.PacketsFrom, h.config.Fragment.PacketsTo, h.config.Fragment.LengthMin, h.config.Fragment.LengthMax,
  174. h.config.Fragment.IntervalMin, h.config.Fragment.IntervalMax)
  175. writer = buf.NewWriter(&FragmentWriter{
  176. fragment: h.config.Fragment,
  177. writer: conn,
  178. })
  179. } else {
  180. writer = buf.NewWriter(conn)
  181. }
  182. } else {
  183. writer = NewPacketWriter(conn, h, ctx, UDPOverride)
  184. if h.config.Noises != nil {
  185. errors.LogDebug(ctx, "NOISE", h.config.Noises)
  186. writer = &NoisePacketWriter{
  187. Writer: writer,
  188. noises: h.config.Noises,
  189. firstWrite: true,
  190. UDPOverride: UDPOverride,
  191. }
  192. }
  193. }
  194. if err := buf.Copy(input, writer, buf.UpdateActivity(timer)); err != nil {
  195. return errors.New("failed to process request").Base(err)
  196. }
  197. return nil
  198. }
  199. responseDone := func() error {
  200. defer timer.SetTimeout(plcy.Timeouts.UplinkOnly)
  201. if destination.Network == net.Network_TCP {
  202. var writeConn net.Conn
  203. var inTimer *signal.ActivityTimer
  204. if inbound := session.InboundFromContext(ctx); inbound != nil && inbound.Conn != nil && useSplice {
  205. writeConn = inbound.Conn
  206. inTimer = inbound.Timer
  207. }
  208. if !isTLSConn(conn) { // it would be tls conn in special use case of MITM, we need to let link handle traffic
  209. return proxy.CopyRawConnIfExist(ctx, conn, writeConn, link.Writer, timer, inTimer)
  210. }
  211. }
  212. var reader buf.Reader
  213. if destination.Network == net.Network_TCP {
  214. reader = buf.NewReader(conn)
  215. } else {
  216. reader = NewPacketReader(conn, UDPOverride)
  217. }
  218. if err := buf.Copy(reader, output, buf.UpdateActivity(timer)); err != nil {
  219. return errors.New("failed to process response").Base(err)
  220. }
  221. return nil
  222. }
  223. if newCtx != nil {
  224. ctx = newCtx
  225. }
  226. if err := task.Run(ctx, requestDone, task.OnSuccess(responseDone, task.Close(output))); err != nil {
  227. return errors.New("connection ends").Base(err)
  228. }
  229. return nil
  230. }
  231. func isTLSConn(conn stat.Connection) bool {
  232. if conn != nil {
  233. statConn, ok := conn.(*stat.CounterConnection)
  234. if ok {
  235. conn = statConn.Connection
  236. }
  237. if _, ok := conn.(*tls.Conn); ok {
  238. return true
  239. }
  240. if _, ok := conn.(*tls.UConn); ok {
  241. return true
  242. }
  243. }
  244. return false
  245. }
  246. func NewPacketReader(conn net.Conn, UDPOverride net.Destination) buf.Reader {
  247. iConn := conn
  248. statConn, ok := iConn.(*stat.CounterConnection)
  249. if ok {
  250. iConn = statConn.Connection
  251. }
  252. var counter stats.Counter
  253. if statConn != nil {
  254. counter = statConn.ReadCounter
  255. }
  256. if c, ok := iConn.(*internet.PacketConnWrapper); ok && UDPOverride.Address == nil && UDPOverride.Port == 0 {
  257. return &PacketReader{
  258. PacketConnWrapper: c,
  259. Counter: counter,
  260. }
  261. }
  262. return &buf.PacketReader{Reader: conn}
  263. }
  264. type PacketReader struct {
  265. *internet.PacketConnWrapper
  266. stats.Counter
  267. }
  268. func (r *PacketReader) ReadMultiBuffer() (buf.MultiBuffer, error) {
  269. b := buf.New()
  270. b.Resize(0, buf.Size)
  271. n, d, err := r.PacketConnWrapper.ReadFrom(b.Bytes())
  272. if err != nil {
  273. b.Release()
  274. return nil, err
  275. }
  276. b.Resize(0, int32(n))
  277. b.UDP = &net.Destination{
  278. Address: net.IPAddress(d.(*net.UDPAddr).IP),
  279. Port: net.Port(d.(*net.UDPAddr).Port),
  280. Network: net.Network_UDP,
  281. }
  282. if r.Counter != nil {
  283. r.Counter.Add(int64(n))
  284. }
  285. return buf.MultiBuffer{b}, nil
  286. }
  287. func NewPacketWriter(conn net.Conn, h *Handler, ctx context.Context, UDPOverride net.Destination) buf.Writer {
  288. iConn := conn
  289. statConn, ok := iConn.(*stat.CounterConnection)
  290. if ok {
  291. iConn = statConn.Connection
  292. }
  293. var counter stats.Counter
  294. if statConn != nil {
  295. counter = statConn.WriteCounter
  296. }
  297. if c, ok := iConn.(*internet.PacketConnWrapper); ok {
  298. return &PacketWriter{
  299. PacketConnWrapper: c,
  300. Counter: counter,
  301. Handler: h,
  302. Context: ctx,
  303. UDPOverride: UDPOverride,
  304. }
  305. }
  306. return &buf.SequentialWriter{Writer: conn}
  307. }
  308. type PacketWriter struct {
  309. *internet.PacketConnWrapper
  310. stats.Counter
  311. *Handler
  312. context.Context
  313. UDPOverride net.Destination
  314. }
  315. func (w *PacketWriter) WriteMultiBuffer(mb buf.MultiBuffer) error {
  316. for {
  317. mb2, b := buf.SplitFirst(mb)
  318. mb = mb2
  319. if b == nil {
  320. break
  321. }
  322. var n int
  323. var err error
  324. if b.UDP != nil {
  325. if w.UDPOverride.Address != nil {
  326. b.UDP.Address = w.UDPOverride.Address
  327. }
  328. if w.UDPOverride.Port != 0 {
  329. b.UDP.Port = w.UDPOverride.Port
  330. }
  331. if w.Handler.config.hasStrategy() && b.UDP.Address.Family().IsDomain() {
  332. ip := w.Handler.resolveIP(w.Context, b.UDP.Address.Domain(), nil)
  333. if ip != nil {
  334. b.UDP.Address = ip
  335. }
  336. }
  337. destAddr, _ := net.ResolveUDPAddr("udp", b.UDP.NetAddr())
  338. if destAddr == nil {
  339. b.Release()
  340. continue
  341. }
  342. n, err = w.PacketConnWrapper.WriteTo(b.Bytes(), destAddr)
  343. } else {
  344. n, err = w.PacketConnWrapper.Write(b.Bytes())
  345. }
  346. b.Release()
  347. if err != nil {
  348. buf.ReleaseMulti(mb)
  349. return err
  350. }
  351. if w.Counter != nil {
  352. w.Counter.Add(int64(n))
  353. }
  354. }
  355. return nil
  356. }
  357. type NoisePacketWriter struct {
  358. buf.Writer
  359. noises []*Noise
  360. firstWrite bool
  361. UDPOverride net.Destination
  362. }
  363. // MultiBuffer writer with Noise before first packet
  364. func (w *NoisePacketWriter) WriteMultiBuffer(mb buf.MultiBuffer) error {
  365. if w.firstWrite {
  366. w.firstWrite = false
  367. //Do not send Noise for dns requests(just to be safe)
  368. if w.UDPOverride.Port == 53 {
  369. return w.Writer.WriteMultiBuffer(mb)
  370. }
  371. var noise []byte
  372. var err error
  373. for _, n := range w.noises {
  374. //User input string or base64 encoded string
  375. if n.Packet != nil {
  376. noise = n.Packet
  377. } else {
  378. //Random noise
  379. noise, err = GenerateRandomBytes(crypto.RandBetween(int64(n.LengthMin),
  380. int64(n.LengthMax)))
  381. }
  382. if err != nil {
  383. return err
  384. }
  385. w.Writer.WriteMultiBuffer(buf.MultiBuffer{buf.FromBytes(noise)})
  386. if n.DelayMin != 0 || n.DelayMax != 0 {
  387. time.Sleep(time.Duration(crypto.RandBetween(int64(n.DelayMin), int64(n.DelayMax))) * time.Millisecond)
  388. }
  389. }
  390. }
  391. return w.Writer.WriteMultiBuffer(mb)
  392. }
  393. type FragmentWriter struct {
  394. fragment *Fragment
  395. writer io.Writer
  396. count uint64
  397. }
  398. func (f *FragmentWriter) Write(b []byte) (int, error) {
  399. f.count++
  400. if f.fragment.PacketsFrom == 0 && f.fragment.PacketsTo == 1 {
  401. if f.count != 1 || len(b) <= 5 || b[0] != 22 {
  402. return f.writer.Write(b)
  403. }
  404. recordLen := 5 + ((int(b[3]) << 8) | int(b[4]))
  405. if len(b) < recordLen { // maybe already fragmented somehow
  406. return f.writer.Write(b)
  407. }
  408. data := b[5:recordLen]
  409. buf := make([]byte, 1024)
  410. var hello []byte
  411. for from := 0; ; {
  412. to := from + int(crypto.RandBetween(int64(f.fragment.LengthMin), int64(f.fragment.LengthMax)))
  413. if to > len(data) {
  414. to = len(data)
  415. }
  416. copy(buf[:3], b)
  417. copy(buf[5:], data[from:to])
  418. l := to - from
  419. from = to
  420. buf[3] = byte(l >> 8)
  421. buf[4] = byte(l)
  422. if f.fragment.IntervalMax == 0 { // combine fragmented tlshello if interval is 0
  423. hello = append(hello, buf[:5+l]...)
  424. } else {
  425. _, err := f.writer.Write(buf[:5+l])
  426. time.Sleep(time.Duration(crypto.RandBetween(int64(f.fragment.IntervalMin), int64(f.fragment.IntervalMax))) * time.Millisecond)
  427. if err != nil {
  428. return 0, err
  429. }
  430. }
  431. if from == len(data) {
  432. if len(hello) > 0 {
  433. _, err := f.writer.Write(hello)
  434. if err != nil {
  435. return 0, err
  436. }
  437. }
  438. if len(b) > recordLen {
  439. n, err := f.writer.Write(b[recordLen:])
  440. if err != nil {
  441. return recordLen + n, err
  442. }
  443. }
  444. return len(b), nil
  445. }
  446. }
  447. }
  448. if f.fragment.PacketsFrom != 0 && (f.count < f.fragment.PacketsFrom || f.count > f.fragment.PacketsTo) {
  449. return f.writer.Write(b)
  450. }
  451. for from := 0; ; {
  452. to := from + int(crypto.RandBetween(int64(f.fragment.LengthMin), int64(f.fragment.LengthMax)))
  453. if to > len(b) {
  454. to = len(b)
  455. }
  456. n, err := f.writer.Write(b[from:to])
  457. from += n
  458. time.Sleep(time.Duration(crypto.RandBetween(int64(f.fragment.IntervalMin), int64(f.fragment.IntervalMax))) * time.Millisecond)
  459. if err != nil {
  460. return from, err
  461. }
  462. if from >= len(b) {
  463. return from, nil
  464. }
  465. }
  466. }
  467. func GenerateRandomBytes(n int64) ([]byte, error) {
  468. b := make([]byte, n)
  469. _, err := rand.Read(b)
  470. // Note that err == nil only if we read len(b) bytes.
  471. if err != nil {
  472. return nil, err
  473. }
  474. return b, nil
  475. }