| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737 |
- // Package proxy contains all proxies used by Xray.
- //
- // To implement an inbound or outbound proxy, one needs to do the following:
- // 1. Implement the interface(s) below.
- // 2. Register a config creator through common.RegisterConfig.
- package proxy
- import (
- "bytes"
- "context"
- "crypto/rand"
- "io"
- "math/big"
- "runtime"
- "strconv"
- "time"
- "github.com/pires/go-proxyproto"
- "github.com/xtls/xray-core/app/dispatcher"
- "github.com/xtls/xray-core/common/buf"
- "github.com/xtls/xray-core/common/errors"
- "github.com/xtls/xray-core/common/net"
- "github.com/xtls/xray-core/common/protocol"
- "github.com/xtls/xray-core/common/session"
- "github.com/xtls/xray-core/common/signal"
- "github.com/xtls/xray-core/features/routing"
- "github.com/xtls/xray-core/features/stats"
- "github.com/xtls/xray-core/proxy/vless/encryption"
- "github.com/xtls/xray-core/transport"
- "github.com/xtls/xray-core/transport/internet"
- "github.com/xtls/xray-core/transport/internet/reality"
- "github.com/xtls/xray-core/transport/internet/stat"
- "github.com/xtls/xray-core/transport/internet/tls"
- )
- var (
- Tls13SupportedVersions = []byte{0x00, 0x2b, 0x00, 0x02, 0x03, 0x04}
- TlsClientHandShakeStart = []byte{0x16, 0x03}
- TlsServerHandShakeStart = []byte{0x16, 0x03, 0x03}
- TlsApplicationDataStart = []byte{0x17, 0x03, 0x03}
- Tls13CipherSuiteDic = map[uint16]string{
- 0x1301: "TLS_AES_128_GCM_SHA256",
- 0x1302: "TLS_AES_256_GCM_SHA384",
- 0x1303: "TLS_CHACHA20_POLY1305_SHA256",
- 0x1304: "TLS_AES_128_CCM_SHA256",
- 0x1305: "TLS_AES_128_CCM_8_SHA256",
- }
- )
- const (
- TlsHandshakeTypeClientHello byte = 0x01
- TlsHandshakeTypeServerHello byte = 0x02
- CommandPaddingContinue byte = 0x00
- CommandPaddingEnd byte = 0x01
- CommandPaddingDirect byte = 0x02
- )
- // An Inbound processes inbound connections.
- type Inbound interface {
- // Network returns a list of networks that this inbound supports. Connections with not-supported networks will not be passed into Process().
- Network() []net.Network
- // Process processes a connection of given network. If necessary, the Inbound can dispatch the connection to an Outbound.
- Process(context.Context, net.Network, stat.Connection, routing.Dispatcher) error
- }
- // An Outbound process outbound connections.
- type Outbound interface {
- // Process processes the given connection. The given dialer may be used to dial a system outbound connection.
- Process(context.Context, *transport.Link, internet.Dialer) error
- }
- // UserManager is the interface for Inbounds and Outbounds that can manage their users.
- type UserManager interface {
- // AddUser adds a new user.
- AddUser(context.Context, *protocol.MemoryUser) error
- // RemoveUser removes a user by email.
- RemoveUser(context.Context, string) error
- // Get user by email.
- GetUser(context.Context, string) *protocol.MemoryUser
- // Get all users.
- GetUsers(context.Context) []*protocol.MemoryUser
- // Get users count.
- GetUsersCount(context.Context) int64
- }
- type GetInbound interface {
- GetInbound() Inbound
- }
- type GetOutbound interface {
- GetOutbound() Outbound
- }
- // TrafficState is used to track uplink and downlink of one connection
- // It is used by XTLS to determine if switch to raw copy mode, It is used by Vision to calculate padding
- type TrafficState struct {
- UserUUID []byte
- NumberOfPacketToFilter int
- EnableXtls bool
- IsTLS12orAbove bool
- IsTLS bool
- Cipher uint16
- RemainingServerHello int32
- Inbound InboundState
- Outbound OutboundState
- }
- type InboundState struct {
- // reader link state
- WithinPaddingBuffers bool
- UplinkReaderDirectCopy bool
- RemainingCommand int32
- RemainingContent int32
- RemainingPadding int32
- CurrentCommand int
- // write link state
- IsPadding bool
- DownlinkWriterDirectCopy bool
- }
- type OutboundState struct {
- // reader link state
- WithinPaddingBuffers bool
- DownlinkReaderDirectCopy bool
- RemainingCommand int32
- RemainingContent int32
- RemainingPadding int32
- CurrentCommand int
- // write link state
- IsPadding bool
- UplinkWriterDirectCopy bool
- }
- func NewTrafficState(userUUID []byte) *TrafficState {
- return &TrafficState{
- UserUUID: userUUID,
- NumberOfPacketToFilter: 8,
- EnableXtls: false,
- IsTLS12orAbove: false,
- IsTLS: false,
- Cipher: 0,
- RemainingServerHello: -1,
- Inbound: InboundState{
- WithinPaddingBuffers: true,
- UplinkReaderDirectCopy: false,
- RemainingCommand: -1,
- RemainingContent: -1,
- RemainingPadding: -1,
- CurrentCommand: 0,
- IsPadding: true,
- DownlinkWriterDirectCopy: false,
- },
- Outbound: OutboundState{
- WithinPaddingBuffers: true,
- DownlinkReaderDirectCopy: false,
- RemainingCommand: -1,
- RemainingContent: -1,
- RemainingPadding: -1,
- CurrentCommand: 0,
- IsPadding: true,
- UplinkWriterDirectCopy: false,
- },
- }
- }
- // VisionReader is used to read xtls vision protocol
- // Note Vision probably only make sense as the inner most layer of reader, since it need assess traffic state from origin proxy traffic
- type VisionReader struct {
- buf.Reader
- trafficState *TrafficState
- ctx context.Context
- isUplink bool
- conn net.Conn
- input *bytes.Reader
- rawInput *bytes.Buffer
- ob *session.Outbound
- // internal
- directReadCounter stats.Counter
- }
- func NewVisionReader(reader buf.Reader, trafficState *TrafficState, isUplink bool, ctx context.Context, conn net.Conn, input *bytes.Reader, rawInput *bytes.Buffer, ob *session.Outbound) *VisionReader {
- return &VisionReader{
- Reader: reader,
- trafficState: trafficState,
- ctx: ctx,
- isUplink: isUplink,
- conn: conn,
- input: input,
- rawInput: rawInput,
- ob: ob,
- }
- }
- func (w *VisionReader) ReadMultiBuffer() (buf.MultiBuffer, error) {
- buffer, err := w.Reader.ReadMultiBuffer()
- if buffer.IsEmpty() {
- return buffer, err
- }
- var withinPaddingBuffers *bool
- var remainingContent *int32
- var remainingPadding *int32
- var currentCommand *int
- var switchToDirectCopy *bool
- if w.isUplink {
- withinPaddingBuffers = &w.trafficState.Inbound.WithinPaddingBuffers
- remainingContent = &w.trafficState.Inbound.RemainingContent
- remainingPadding = &w.trafficState.Inbound.RemainingPadding
- currentCommand = &w.trafficState.Inbound.CurrentCommand
- switchToDirectCopy = &w.trafficState.Inbound.UplinkReaderDirectCopy
- } else {
- withinPaddingBuffers = &w.trafficState.Outbound.WithinPaddingBuffers
- remainingContent = &w.trafficState.Outbound.RemainingContent
- remainingPadding = &w.trafficState.Outbound.RemainingPadding
- currentCommand = &w.trafficState.Outbound.CurrentCommand
- switchToDirectCopy = &w.trafficState.Outbound.DownlinkReaderDirectCopy
- }
- if *switchToDirectCopy {
- if w.directReadCounter != nil {
- w.directReadCounter.Add(int64(buffer.Len()))
- }
- return buffer, err
- }
- if *withinPaddingBuffers || w.trafficState.NumberOfPacketToFilter > 0 {
- mb2 := make(buf.MultiBuffer, 0, len(buffer))
- for _, b := range buffer {
- newbuffer := XtlsUnpadding(b, w.trafficState, w.isUplink, w.ctx)
- if newbuffer.Len() > 0 {
- mb2 = append(mb2, newbuffer)
- }
- }
- buffer = mb2
- if *remainingContent > 0 || *remainingPadding > 0 || *currentCommand == 0 {
- *withinPaddingBuffers = true
- } else if *currentCommand == 1 {
- *withinPaddingBuffers = false
- } else if *currentCommand == 2 {
- *withinPaddingBuffers = false
- *switchToDirectCopy = true
- } else {
- errors.LogInfo(w.ctx, "XtlsRead unknown command ", *currentCommand, buffer.Len())
- }
- }
- if w.trafficState.NumberOfPacketToFilter > 0 {
- XtlsFilterTls(buffer, w.trafficState, w.ctx)
- }
- if *switchToDirectCopy {
- // XTLS Vision processes TLS-like conn's input and rawInput
- if inputBuffer, err := buf.ReadFrom(w.input); err == nil && !inputBuffer.IsEmpty() {
- buffer, _ = buf.MergeMulti(buffer, inputBuffer)
- }
- if rawInputBuffer, err := buf.ReadFrom(w.rawInput); err == nil && !rawInputBuffer.IsEmpty() {
- buffer, _ = buf.MergeMulti(buffer, rawInputBuffer)
- }
- *w.input = bytes.Reader{} // release memory
- w.input = nil
- *w.rawInput = bytes.Buffer{} // release memory
- w.rawInput = nil
- if inbound := session.InboundFromContext(w.ctx); inbound != nil && inbound.Conn != nil {
- if w.isUplink && inbound.CanSpliceCopy == 2 {
- inbound.CanSpliceCopy = 1
- }
- if !w.isUplink && w.ob != nil && w.ob.CanSpliceCopy == 2 { // ob need to be passed in due to context can have more than one ob
- w.ob.CanSpliceCopy = 1
- }
- }
- readerConn, readCounter, _ := UnwrapRawConn(w.conn)
- w.directReadCounter = readCounter
- w.Reader = buf.NewReader(readerConn)
- }
- return buffer, err
- }
- // VisionWriter is used to write xtls vision protocol
- // Note Vision probably only make sense as the inner most layer of writer, since it need assess traffic state from origin proxy traffic
- type VisionWriter struct {
- buf.Writer
- trafficState *TrafficState
- ctx context.Context
- isUplink bool
- conn net.Conn
- ob *session.Outbound
- // internal
- writeOnceUserUUID []byte
- directWriteCounter stats.Counter
- }
- func NewVisionWriter(writer buf.Writer, trafficState *TrafficState, isUplink bool, ctx context.Context, conn net.Conn, ob *session.Outbound) *VisionWriter {
- w := make([]byte, len(trafficState.UserUUID))
- copy(w, trafficState.UserUUID)
- return &VisionWriter{
- Writer: writer,
- trafficState: trafficState,
- ctx: ctx,
- writeOnceUserUUID: w,
- isUplink: isUplink,
- conn: conn,
- ob: ob,
- }
- }
- func (w *VisionWriter) WriteMultiBuffer(mb buf.MultiBuffer) error {
- var isPadding *bool
- var switchToDirectCopy *bool
- if w.isUplink {
- isPadding = &w.trafficState.Outbound.IsPadding
- switchToDirectCopy = &w.trafficState.Outbound.UplinkWriterDirectCopy
- } else {
- isPadding = &w.trafficState.Inbound.IsPadding
- switchToDirectCopy = &w.trafficState.Inbound.DownlinkWriterDirectCopy
- }
- if *switchToDirectCopy {
- if inbound := session.InboundFromContext(w.ctx); inbound != nil {
- if !w.isUplink && inbound.CanSpliceCopy == 2 {
- inbound.CanSpliceCopy = 1
- }
- if w.isUplink && w.ob != nil && w.ob.CanSpliceCopy == 2 {
- w.ob.CanSpliceCopy = 1
- }
- }
- rawConn, _, writerCounter := UnwrapRawConn(w.conn)
- w.Writer = buf.NewWriter(rawConn)
- w.directWriteCounter = writerCounter
- *switchToDirectCopy = false
- }
- if !mb.IsEmpty() && w.directWriteCounter != nil {
- w.directWriteCounter.Add(int64(mb.Len()))
- }
- if w.trafficState.NumberOfPacketToFilter > 0 {
- XtlsFilterTls(mb, w.trafficState, w.ctx)
- }
- if *isPadding {
- if len(mb) == 1 && mb[0] == nil {
- mb[0] = XtlsPadding(nil, CommandPaddingContinue, &w.writeOnceUserUUID, true, w.ctx) // we do a long padding to hide vless header
- return w.Writer.WriteMultiBuffer(mb)
- }
- mb = ReshapeMultiBuffer(w.ctx, mb)
- longPadding := w.trafficState.IsTLS
- for i, b := range mb {
- if w.trafficState.IsTLS && b.Len() >= 6 && bytes.Equal(TlsApplicationDataStart, b.BytesTo(3)) {
- if w.trafficState.EnableXtls {
- *switchToDirectCopy = true
- }
- var command byte = CommandPaddingContinue
- if i == len(mb)-1 {
- command = CommandPaddingEnd
- if w.trafficState.EnableXtls {
- command = CommandPaddingDirect
- }
- }
- mb[i] = XtlsPadding(b, command, &w.writeOnceUserUUID, true, w.ctx)
- *isPadding = false // padding going to end
- longPadding = false
- continue
- } else if !w.trafficState.IsTLS12orAbove && w.trafficState.NumberOfPacketToFilter <= 1 { // For compatibility with earlier vision receiver, we finish padding 1 packet early
- *isPadding = false
- mb[i] = XtlsPadding(b, CommandPaddingEnd, &w.writeOnceUserUUID, longPadding, w.ctx)
- break
- }
- var command byte = CommandPaddingContinue
- if i == len(mb)-1 && !*isPadding {
- command = CommandPaddingEnd
- if w.trafficState.EnableXtls {
- command = CommandPaddingDirect
- }
- }
- mb[i] = XtlsPadding(b, command, &w.writeOnceUserUUID, longPadding, w.ctx)
- }
- }
- return w.Writer.WriteMultiBuffer(mb)
- }
- // ReshapeMultiBuffer prepare multi buffer for padding structure (max 21 bytes)
- func ReshapeMultiBuffer(ctx context.Context, buffer buf.MultiBuffer) buf.MultiBuffer {
- needReshape := 0
- for _, b := range buffer {
- if b.Len() >= buf.Size-21 {
- needReshape += 1
- }
- }
- if needReshape == 0 {
- return buffer
- }
- mb2 := make(buf.MultiBuffer, 0, len(buffer)+needReshape)
- toPrint := ""
- for i, buffer1 := range buffer {
- if buffer1.Len() >= buf.Size-21 {
- index := int32(bytes.LastIndex(buffer1.Bytes(), TlsApplicationDataStart))
- if index < 21 || index > buf.Size-21 {
- index = buf.Size / 2
- }
- buffer2 := buf.New()
- buffer2.Write(buffer1.BytesFrom(index))
- buffer1.Resize(0, index)
- mb2 = append(mb2, buffer1, buffer2)
- toPrint += " " + strconv.Itoa(int(buffer1.Len())) + " " + strconv.Itoa(int(buffer2.Len()))
- } else {
- mb2 = append(mb2, buffer1)
- toPrint += " " + strconv.Itoa(int(buffer1.Len()))
- }
- buffer[i] = nil
- }
- buffer = buffer[:0]
- errors.LogInfo(ctx, "ReshapeMultiBuffer ", toPrint)
- return mb2
- }
- // XtlsPadding add padding to eliminate length signature during tls handshake
- func XtlsPadding(b *buf.Buffer, command byte, userUUID *[]byte, longPadding bool, ctx context.Context) *buf.Buffer {
- var contentLen int32 = 0
- var paddingLen int32 = 0
- if b != nil {
- contentLen = b.Len()
- }
- if contentLen < 900 && longPadding {
- l, err := rand.Int(rand.Reader, big.NewInt(500))
- if err != nil {
- errors.LogDebugInner(ctx, err, "failed to generate padding")
- }
- paddingLen = int32(l.Int64()) + 900 - contentLen
- } else {
- l, err := rand.Int(rand.Reader, big.NewInt(256))
- if err != nil {
- errors.LogDebugInner(ctx, err, "failed to generate padding")
- }
- paddingLen = int32(l.Int64())
- }
- if paddingLen > buf.Size-21-contentLen {
- paddingLen = buf.Size - 21 - contentLen
- }
- newbuffer := buf.New()
- if userUUID != nil {
- newbuffer.Write(*userUUID)
- *userUUID = nil
- }
- newbuffer.Write([]byte{command, byte(contentLen >> 8), byte(contentLen), byte(paddingLen >> 8), byte(paddingLen)})
- if b != nil {
- newbuffer.Write(b.Bytes())
- b.Release()
- b = nil
- }
- newbuffer.Extend(paddingLen)
- errors.LogInfo(ctx, "XtlsPadding ", contentLen, " ", paddingLen, " ", command)
- return newbuffer
- }
- // XtlsUnpadding remove padding and parse command
- func XtlsUnpadding(b *buf.Buffer, s *TrafficState, isUplink bool, ctx context.Context) *buf.Buffer {
- var remainingCommand *int32
- var remainingContent *int32
- var remainingPadding *int32
- var currentCommand *int
- if isUplink {
- remainingCommand = &s.Inbound.RemainingCommand
- remainingContent = &s.Inbound.RemainingContent
- remainingPadding = &s.Inbound.RemainingPadding
- currentCommand = &s.Inbound.CurrentCommand
- } else {
- remainingCommand = &s.Outbound.RemainingCommand
- remainingContent = &s.Outbound.RemainingContent
- remainingPadding = &s.Outbound.RemainingPadding
- currentCommand = &s.Outbound.CurrentCommand
- }
- if *remainingCommand == -1 && *remainingContent == -1 && *remainingPadding == -1 { // initial state
- if b.Len() >= 21 && bytes.Equal(s.UserUUID, b.BytesTo(16)) {
- b.Advance(16)
- *remainingCommand = 5
- } else {
- return b
- }
- }
- newbuffer := buf.New()
- for b.Len() > 0 {
- if *remainingCommand > 0 {
- data, err := b.ReadByte()
- if err != nil {
- return newbuffer
- }
- switch *remainingCommand {
- case 5:
- *currentCommand = int(data)
- case 4:
- *remainingContent = int32(data) << 8
- case 3:
- *remainingContent = *remainingContent | int32(data)
- case 2:
- *remainingPadding = int32(data) << 8
- case 1:
- *remainingPadding = *remainingPadding | int32(data)
- errors.LogInfo(ctx, "Xtls Unpadding new block, content ", *remainingContent, " padding ", *remainingPadding, " command ", *currentCommand)
- }
- *remainingCommand--
- } else if *remainingContent > 0 {
- len := *remainingContent
- if b.Len() < len {
- len = b.Len()
- }
- data, err := b.ReadBytes(len)
- if err != nil {
- return newbuffer
- }
- newbuffer.Write(data)
- *remainingContent -= len
- } else { // remainingPadding > 0
- len := *remainingPadding
- if b.Len() < len {
- len = b.Len()
- }
- b.Advance(len)
- *remainingPadding -= len
- }
- if *remainingCommand <= 0 && *remainingContent <= 0 && *remainingPadding <= 0 { // this block done
- if *currentCommand == 0 {
- *remainingCommand = 5
- } else {
- *remainingCommand = -1 // set to initial state
- *remainingContent = -1
- *remainingPadding = -1
- if b.Len() > 0 { // shouldn't happen
- newbuffer.Write(b.Bytes())
- }
- break
- }
- }
- }
- b.Release()
- b = nil
- return newbuffer
- }
- // XtlsFilterTls filter and recognize tls 1.3 and other info
- func XtlsFilterTls(buffer buf.MultiBuffer, trafficState *TrafficState, ctx context.Context) {
- for _, b := range buffer {
- if b == nil {
- continue
- }
- trafficState.NumberOfPacketToFilter--
- if b.Len() >= 6 {
- startsBytes := b.BytesTo(6)
- if bytes.Equal(TlsServerHandShakeStart, startsBytes[:3]) && startsBytes[5] == TlsHandshakeTypeServerHello {
- trafficState.RemainingServerHello = (int32(startsBytes[3])<<8 | int32(startsBytes[4])) + 5
- trafficState.IsTLS12orAbove = true
- trafficState.IsTLS = true
- if b.Len() >= 79 && trafficState.RemainingServerHello >= 79 {
- sessionIdLen := int32(b.Byte(43))
- cipherSuite := b.BytesRange(43+sessionIdLen+1, 43+sessionIdLen+3)
- trafficState.Cipher = uint16(cipherSuite[0])<<8 | uint16(cipherSuite[1])
- } else {
- errors.LogInfo(ctx, "XtlsFilterTls short server hello, tls 1.2 or older? ", b.Len(), " ", trafficState.RemainingServerHello)
- }
- } else if bytes.Equal(TlsClientHandShakeStart, startsBytes[:2]) && startsBytes[5] == TlsHandshakeTypeClientHello {
- trafficState.IsTLS = true
- errors.LogInfo(ctx, "XtlsFilterTls found tls client hello! ", buffer.Len())
- }
- }
- if trafficState.RemainingServerHello > 0 {
- end := trafficState.RemainingServerHello
- if end > b.Len() {
- end = b.Len()
- }
- trafficState.RemainingServerHello -= b.Len()
- if bytes.Contains(b.BytesTo(end), Tls13SupportedVersions) {
- v, ok := Tls13CipherSuiteDic[trafficState.Cipher]
- if !ok {
- v = "Old cipher: " + strconv.FormatUint(uint64(trafficState.Cipher), 16)
- } else if v != "TLS_AES_128_CCM_8_SHA256" {
- trafficState.EnableXtls = true
- }
- errors.LogInfo(ctx, "XtlsFilterTls found tls 1.3! ", b.Len(), " ", v)
- trafficState.NumberOfPacketToFilter = 0
- return
- } else if trafficState.RemainingServerHello <= 0 {
- errors.LogInfo(ctx, "XtlsFilterTls found tls 1.2! ", b.Len())
- trafficState.NumberOfPacketToFilter = 0
- return
- }
- errors.LogInfo(ctx, "XtlsFilterTls inconclusive server hello ", b.Len(), " ", trafficState.RemainingServerHello)
- }
- if trafficState.NumberOfPacketToFilter <= 0 {
- errors.LogInfo(ctx, "XtlsFilterTls stop filtering", buffer.Len())
- }
- }
- }
- // UnwrapRawConn support unwrap encryption, stats, tls, utls, reality, proxyproto, uds-wrapper conn and get raw tcp/uds conn from it
- func UnwrapRawConn(conn net.Conn) (net.Conn, stats.Counter, stats.Counter) {
- var readCounter, writerCounter stats.Counter
- if conn != nil {
- isEncryption := false
- if commonConn, ok := conn.(*encryption.CommonConn); ok {
- conn = commonConn.Conn
- isEncryption = true
- }
- if xorConn, ok := conn.(*encryption.XorConn); ok {
- return xorConn, nil, nil // full-random xorConn should not be penetrated
- }
- if statConn, ok := conn.(*stat.CounterConnection); ok {
- conn = statConn.Connection
- readCounter = statConn.ReadCounter
- writerCounter = statConn.WriteCounter
- }
- if !isEncryption { // avoids double penetration
- if xc, ok := conn.(*tls.Conn); ok {
- conn = xc.NetConn()
- } else if utlsConn, ok := conn.(*tls.UConn); ok {
- conn = utlsConn.NetConn()
- } else if realityConn, ok := conn.(*reality.Conn); ok {
- conn = realityConn.NetConn()
- } else if realityUConn, ok := conn.(*reality.UConn); ok {
- conn = realityUConn.NetConn()
- }
- }
- if pc, ok := conn.(*proxyproto.Conn); ok {
- conn = pc.Raw()
- // 8192 > 4096, there is no need to process pc's bufReader
- }
- if uc, ok := conn.(*internet.UnixConnWrapper); ok {
- conn = uc.UnixConn
- }
- }
- return conn, readCounter, writerCounter
- }
- // CopyRawConnIfExist use the most efficient copy method.
- // - If caller don't want to turn on splice, do not pass in both reader conn and writer conn
- // - writer are from *transport.Link
- func CopyRawConnIfExist(ctx context.Context, readerConn net.Conn, writerConn net.Conn, writer buf.Writer, timer *signal.ActivityTimer, inTimer *signal.ActivityTimer) error {
- readerConn, readCounter, _ := UnwrapRawConn(readerConn)
- writerConn, _, writeCounter := UnwrapRawConn(writerConn)
- reader := buf.NewReader(readerConn)
- if runtime.GOOS != "linux" && runtime.GOOS != "android" {
- return readV(ctx, reader, writer, timer, readCounter)
- }
- tc, ok := writerConn.(*net.TCPConn)
- if !ok || readerConn == nil || writerConn == nil {
- return readV(ctx, reader, writer, timer, readCounter)
- }
- inbound := session.InboundFromContext(ctx)
- if inbound == nil || inbound.CanSpliceCopy == 3 {
- return readV(ctx, reader, writer, timer, readCounter)
- }
- outbounds := session.OutboundsFromContext(ctx)
- if len(outbounds) == 0 {
- return readV(ctx, reader, writer, timer, readCounter)
- }
- for _, ob := range outbounds {
- if ob.CanSpliceCopy == 3 {
- return readV(ctx, reader, writer, timer, readCounter)
- }
- }
- for {
- inbound := session.InboundFromContext(ctx)
- outbounds := session.OutboundsFromContext(ctx)
- var splice = inbound.CanSpliceCopy == 1
- for _, ob := range outbounds {
- if ob.CanSpliceCopy != 1 {
- splice = false
- }
- }
- if splice {
- errors.LogInfo(ctx, "CopyRawConn splice")
- statWriter, _ := writer.(*dispatcher.SizeStatWriter)
- //runtime.Gosched() // necessary
- time.Sleep(time.Millisecond) // without this, there will be a rare ssl error for freedom splice
- timer.SetTimeout(24 * time.Hour) // prevent leak, just in case
- if inTimer != nil {
- inTimer.SetTimeout(24 * time.Hour)
- }
- w, err := tc.ReadFrom(readerConn)
- if readCounter != nil {
- readCounter.Add(w) // outbound stats
- }
- if writeCounter != nil {
- writeCounter.Add(w) // inbound stats
- }
- if statWriter != nil {
- statWriter.Counter.Add(w) // user stats
- }
- if err != nil && errors.Cause(err) != io.EOF {
- return err
- }
- return nil
- }
- buffer, err := reader.ReadMultiBuffer()
- if !buffer.IsEmpty() {
- if readCounter != nil {
- readCounter.Add(int64(buffer.Len()))
- }
- timer.Update()
- if werr := writer.WriteMultiBuffer(buffer); werr != nil {
- return werr
- }
- }
- if err != nil {
- if errors.Cause(err) == io.EOF {
- return nil
- }
- return err
- }
- }
- }
- func readV(ctx context.Context, reader buf.Reader, writer buf.Writer, timer signal.ActivityUpdater, readCounter stats.Counter) error {
- errors.LogInfo(ctx, "CopyRawConn (maybe) readv")
- if err := buf.Copy(reader, writer, buf.UpdateActivity(timer), buf.AddToStatCounter(readCounter)); err != nil {
- return errors.New("failed to process response").Base(err)
- }
- return nil
- }
- func IsRAWTransportWithoutSecurity(conn stat.Connection) bool {
- iConn := conn
- if statConn, ok := iConn.(*stat.CounterConnection); ok {
- iConn = statConn.Connection
- }
- _, ok1 := iConn.(*proxyproto.Conn)
- _, ok2 := iConn.(*net.TCPConn)
- _, ok3 := iConn.(*internet.UnixConnWrapper)
- return ok1 || ok2 || ok3
- }
|