freedom.go 16 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579
  1. package freedom
  2. import (
  3. "context"
  4. "crypto/rand"
  5. "io"
  6. "time"
  7. "github.com/pires/go-proxyproto"
  8. "github.com/xtls/xray-core/common"
  9. "github.com/xtls/xray-core/common/buf"
  10. "github.com/xtls/xray-core/common/crypto"
  11. "github.com/xtls/xray-core/common/dice"
  12. "github.com/xtls/xray-core/common/errors"
  13. "github.com/xtls/xray-core/common/net"
  14. "github.com/xtls/xray-core/common/platform"
  15. "github.com/xtls/xray-core/common/retry"
  16. "github.com/xtls/xray-core/common/session"
  17. "github.com/xtls/xray-core/common/signal"
  18. "github.com/xtls/xray-core/common/task"
  19. "github.com/xtls/xray-core/common/utils"
  20. "github.com/xtls/xray-core/core"
  21. "github.com/xtls/xray-core/features/policy"
  22. "github.com/xtls/xray-core/features/stats"
  23. "github.com/xtls/xray-core/proxy"
  24. "github.com/xtls/xray-core/transport"
  25. "github.com/xtls/xray-core/transport/internet"
  26. "github.com/xtls/xray-core/transport/internet/stat"
  27. )
  28. var useSplice bool
  29. func init() {
  30. common.Must(common.RegisterConfig((*Config)(nil), func(ctx context.Context, config interface{}) (interface{}, error) {
  31. h := new(Handler)
  32. if err := core.RequireFeatures(ctx, func(pm policy.Manager) error {
  33. return h.Init(config.(*Config), pm)
  34. }); err != nil {
  35. return nil, err
  36. }
  37. return h, nil
  38. }))
  39. const defaultFlagValue = "NOT_DEFINED_AT_ALL"
  40. value := platform.NewEnvFlag(platform.UseFreedomSplice).GetValue(func() string { return defaultFlagValue })
  41. switch value {
  42. case defaultFlagValue, "auto", "enable":
  43. useSplice = true
  44. }
  45. }
  46. // Handler handles Freedom connections.
  47. type Handler struct {
  48. policyManager policy.Manager
  49. config *Config
  50. }
  51. // Init initializes the Handler with necessary parameters.
  52. func (h *Handler) Init(config *Config, pm policy.Manager) error {
  53. h.config = config
  54. h.policyManager = pm
  55. return nil
  56. }
  57. func (h *Handler) policy() policy.Session {
  58. p := h.policyManager.ForLevel(h.config.UserLevel)
  59. return p
  60. }
  61. func isValidAddress(addr *net.IPOrDomain) bool {
  62. if addr == nil {
  63. return false
  64. }
  65. a := addr.AsAddress()
  66. return a != net.AnyIP && a != net.AnyIPv6
  67. }
  68. // Process implements proxy.Outbound.
  69. func (h *Handler) Process(ctx context.Context, link *transport.Link, dialer internet.Dialer) error {
  70. outbounds := session.OutboundsFromContext(ctx)
  71. ob := outbounds[len(outbounds)-1]
  72. if !ob.Target.IsValid() {
  73. return errors.New("target not specified.")
  74. }
  75. ob.Name = "freedom"
  76. ob.CanSpliceCopy = 1
  77. inbound := session.InboundFromContext(ctx)
  78. destination := ob.Target
  79. origTargetAddr := ob.OriginalTarget.Address
  80. if origTargetAddr == nil {
  81. origTargetAddr = ob.Target.Address
  82. }
  83. dialer.SetOutboundGateway(ctx, ob)
  84. outGateway := ob.Gateway
  85. UDPOverride := net.UDPDestination(nil, 0)
  86. if h.config.DestinationOverride != nil {
  87. server := h.config.DestinationOverride.Server
  88. if isValidAddress(server.Address) {
  89. destination.Address = server.Address.AsAddress()
  90. UDPOverride.Address = destination.Address
  91. }
  92. if server.Port != 0 {
  93. destination.Port = net.Port(server.Port)
  94. UDPOverride.Port = destination.Port
  95. }
  96. }
  97. input := link.Reader
  98. output := link.Writer
  99. var conn stat.Connection
  100. err := retry.ExponentialBackoff(5, 100).On(func() error {
  101. dialDest := destination
  102. if h.config.DomainStrategy.HasStrategy() && dialDest.Address.Family().IsDomain() {
  103. strategy := h.config.DomainStrategy
  104. if destination.Network == net.Network_UDP && origTargetAddr != nil && outGateway == nil {
  105. strategy = strategy.GetDynamicStrategy(origTargetAddr.Family())
  106. }
  107. ips, err := internet.LookupForIP(dialDest.Address.Domain(), strategy, outGateway)
  108. if err != nil {
  109. errors.LogInfoInner(ctx, err, "failed to get IP address for domain ", dialDest.Address.Domain())
  110. if h.config.DomainStrategy.ForceIP() {
  111. return err
  112. }
  113. } else {
  114. dialDest = net.Destination{
  115. Network: dialDest.Network,
  116. Address: net.IPAddress(ips[dice.Roll(len(ips))]),
  117. Port: dialDest.Port,
  118. }
  119. errors.LogInfo(ctx, "dialing to ", dialDest)
  120. }
  121. }
  122. rawConn, err := dialer.Dial(ctx, dialDest)
  123. if err != nil {
  124. return err
  125. }
  126. if h.config.ProxyProtocol > 0 && h.config.ProxyProtocol <= 2 {
  127. version := byte(h.config.ProxyProtocol)
  128. srcAddr := inbound.Source.RawNetAddr()
  129. dstAddr := rawConn.RemoteAddr()
  130. header := proxyproto.HeaderProxyFromAddrs(version, srcAddr, dstAddr)
  131. if _, err = header.WriteTo(rawConn); err != nil {
  132. rawConn.Close()
  133. return err
  134. }
  135. }
  136. conn = rawConn
  137. return nil
  138. })
  139. if err != nil {
  140. return errors.New("failed to open connection to ", destination).Base(err)
  141. }
  142. defer conn.Close()
  143. errors.LogInfo(ctx, "connection opened to ", destination, ", local endpoint ", conn.LocalAddr(), ", remote endpoint ", conn.RemoteAddr())
  144. var newCtx context.Context
  145. var newCancel context.CancelFunc
  146. if session.TimeoutOnlyFromContext(ctx) {
  147. newCtx, newCancel = context.WithCancel(context.Background())
  148. }
  149. plcy := h.policy()
  150. ctx, cancel := context.WithCancel(ctx)
  151. timer := signal.CancelAfterInactivity(ctx, func() {
  152. cancel()
  153. if newCancel != nil {
  154. newCancel()
  155. }
  156. }, plcy.Timeouts.ConnectionIdle)
  157. requestDone := func() error {
  158. defer timer.SetTimeout(plcy.Timeouts.DownlinkOnly)
  159. var writer buf.Writer
  160. if destination.Network == net.Network_TCP {
  161. if h.config.Fragment != nil {
  162. errors.LogDebug(ctx, "FRAGMENT", h.config.Fragment.PacketsFrom, h.config.Fragment.PacketsTo, h.config.Fragment.LengthMin, h.config.Fragment.LengthMax,
  163. h.config.Fragment.IntervalMin, h.config.Fragment.IntervalMax, h.config.Fragment.MaxSplitMin, h.config.Fragment.MaxSplitMax)
  164. writer = buf.NewWriter(&FragmentWriter{
  165. fragment: h.config.Fragment,
  166. writer: conn,
  167. })
  168. } else {
  169. writer = buf.NewWriter(conn)
  170. }
  171. } else {
  172. writer = NewPacketWriter(conn, h, UDPOverride, destination)
  173. if h.config.Noises != nil {
  174. errors.LogDebug(ctx, "NOISE", h.config.Noises)
  175. writer = &NoisePacketWriter{
  176. Writer: writer,
  177. noises: h.config.Noises,
  178. firstWrite: true,
  179. UDPOverride: UDPOverride,
  180. remoteAddr: net.DestinationFromAddr(conn.RemoteAddr()).Address,
  181. }
  182. }
  183. }
  184. if err := buf.Copy(input, writer, buf.UpdateActivity(timer)); err != nil {
  185. return errors.New("failed to process request").Base(err)
  186. }
  187. return nil
  188. }
  189. responseDone := func() error {
  190. defer timer.SetTimeout(plcy.Timeouts.UplinkOnly)
  191. if destination.Network == net.Network_TCP && useSplice && proxy.IsRAWTransportWithoutSecurity(conn) { // it would be tls conn in special use case of MITM, we need to let link handle traffic
  192. var writeConn net.Conn
  193. var inTimer *signal.ActivityTimer
  194. if inbound := session.InboundFromContext(ctx); inbound != nil && inbound.Conn != nil {
  195. writeConn = inbound.Conn
  196. inTimer = inbound.Timer
  197. }
  198. return proxy.CopyRawConnIfExist(ctx, conn, writeConn, link.Writer, timer, inTimer)
  199. }
  200. var reader buf.Reader
  201. if destination.Network == net.Network_TCP {
  202. reader = buf.NewReader(conn)
  203. } else {
  204. reader = NewPacketReader(conn, UDPOverride, destination)
  205. }
  206. if err := buf.Copy(reader, output, buf.UpdateActivity(timer)); err != nil {
  207. return errors.New("failed to process response").Base(err)
  208. }
  209. return nil
  210. }
  211. if newCtx != nil {
  212. ctx = newCtx
  213. }
  214. if err := task.Run(ctx, requestDone, task.OnSuccess(responseDone, task.Close(output))); err != nil {
  215. return errors.New("connection ends").Base(err)
  216. }
  217. return nil
  218. }
  219. func NewPacketReader(conn net.Conn, UDPOverride net.Destination, DialDest net.Destination) buf.Reader {
  220. iConn := conn
  221. statConn, ok := iConn.(*stat.CounterConnection)
  222. if ok {
  223. iConn = statConn.Connection
  224. }
  225. var counter stats.Counter
  226. if statConn != nil {
  227. counter = statConn.ReadCounter
  228. }
  229. if c, ok := iConn.(*internet.PacketConnWrapper); ok {
  230. isOverridden := false
  231. if UDPOverride.Address != nil || UDPOverride.Port != 0 {
  232. isOverridden = true
  233. }
  234. return &PacketReader{
  235. PacketConnWrapper: c,
  236. Counter: counter,
  237. IsOverridden: isOverridden,
  238. InitUnchangedAddr: DialDest.Address,
  239. InitChangedAddr: net.DestinationFromAddr(conn.RemoteAddr()).Address,
  240. }
  241. }
  242. return &buf.PacketReader{Reader: conn}
  243. }
  244. type PacketReader struct {
  245. *internet.PacketConnWrapper
  246. stats.Counter
  247. IsOverridden bool
  248. InitUnchangedAddr net.Address
  249. InitChangedAddr net.Address
  250. }
  251. func (r *PacketReader) ReadMultiBuffer() (buf.MultiBuffer, error) {
  252. b := buf.New()
  253. b.Resize(0, buf.Size)
  254. n, d, err := r.PacketConnWrapper.ReadFrom(b.Bytes())
  255. if err != nil {
  256. b.Release()
  257. return nil, err
  258. }
  259. b.Resize(0, int32(n))
  260. // if udp dest addr is changed, we are unable to get the correct src addr
  261. // so we don't attach src info to udp packet, break cone behavior, assuming the dial dest is the expected scr addr
  262. if !r.IsOverridden {
  263. address := net.IPAddress(d.(*net.UDPAddr).IP)
  264. if r.InitChangedAddr == address {
  265. address = r.InitUnchangedAddr
  266. }
  267. b.UDP = &net.Destination{
  268. Address: address,
  269. Port: net.Port(d.(*net.UDPAddr).Port),
  270. Network: net.Network_UDP,
  271. }
  272. }
  273. if r.Counter != nil {
  274. r.Counter.Add(int64(n))
  275. }
  276. return buf.MultiBuffer{b}, nil
  277. }
  278. // DialDest means the dial target used in the dialer when creating conn
  279. func NewPacketWriter(conn net.Conn, h *Handler, UDPOverride net.Destination, DialDest net.Destination) buf.Writer {
  280. iConn := conn
  281. statConn, ok := iConn.(*stat.CounterConnection)
  282. if ok {
  283. iConn = statConn.Connection
  284. }
  285. var counter stats.Counter
  286. if statConn != nil {
  287. counter = statConn.WriteCounter
  288. }
  289. if c, ok := iConn.(*internet.PacketConnWrapper); ok {
  290. // If DialDest is a domain, it will be resolved in dialer
  291. // check this behavior and add it to map
  292. resolvedUDPAddr := utils.NewTypedSyncMap[string, net.Address]()
  293. if DialDest.Address.Family().IsDomain() {
  294. resolvedUDPAddr.Store(DialDest.Address.Domain(), net.DestinationFromAddr(conn.RemoteAddr()).Address)
  295. }
  296. return &PacketWriter{
  297. PacketConnWrapper: c,
  298. Counter: counter,
  299. Handler: h,
  300. UDPOverride: UDPOverride,
  301. ResolvedUDPAddr: resolvedUDPAddr,
  302. LocalAddr: net.DestinationFromAddr(conn.LocalAddr()).Address,
  303. }
  304. }
  305. return &buf.SequentialWriter{Writer: conn}
  306. }
  307. type PacketWriter struct {
  308. *internet.PacketConnWrapper
  309. stats.Counter
  310. *Handler
  311. UDPOverride net.Destination
  312. // Dest of udp packets might be a domain, we will resolve them to IP
  313. // But resolver will return a random one if the domain has many IPs
  314. // Resulting in these packets being sent to many different IPs randomly
  315. // So, cache and keep the resolve result
  316. ResolvedUDPAddr *utils.TypedSyncMap[string, net.Address]
  317. LocalAddr net.Address
  318. }
  319. func (w *PacketWriter) WriteMultiBuffer(mb buf.MultiBuffer) error {
  320. for {
  321. mb2, b := buf.SplitFirst(mb)
  322. mb = mb2
  323. if b == nil {
  324. break
  325. }
  326. var n int
  327. var err error
  328. if b.UDP != nil {
  329. if w.UDPOverride.Address != nil {
  330. b.UDP.Address = w.UDPOverride.Address
  331. }
  332. if w.UDPOverride.Port != 0 {
  333. b.UDP.Port = w.UDPOverride.Port
  334. }
  335. if b.UDP.Address.Family().IsDomain() {
  336. if ip, ok := w.ResolvedUDPAddr.Load(b.UDP.Address.Domain()); ok {
  337. b.UDP.Address = ip
  338. } else {
  339. ShouldUseSystemResolver := true
  340. if w.Handler.config.DomainStrategy.HasStrategy() {
  341. ips, err := internet.LookupForIP(b.UDP.Address.Domain(), w.Handler.config.DomainStrategy, w.LocalAddr)
  342. if err != nil {
  343. // drop packet if resolve failed when forceIP
  344. if w.Handler.config.DomainStrategy.ForceIP() {
  345. b.Release()
  346. continue
  347. }
  348. } else {
  349. ip = net.IPAddress(ips[dice.Roll(len(ips))])
  350. ShouldUseSystemResolver = false
  351. }
  352. }
  353. if ShouldUseSystemResolver {
  354. udpAddr, err := net.ResolveUDPAddr("udp", b.UDP.NetAddr())
  355. if err != nil {
  356. b.Release()
  357. continue
  358. } else {
  359. ip = net.IPAddress(udpAddr.IP)
  360. }
  361. }
  362. if ip != nil {
  363. b.UDP.Address, _ = w.ResolvedUDPAddr.LoadOrStore(b.UDP.Address.Domain(), ip)
  364. }
  365. }
  366. }
  367. destAddr := b.UDP.RawNetAddr()
  368. if destAddr == nil {
  369. b.Release()
  370. continue
  371. }
  372. n, err = w.PacketConnWrapper.WriteTo(b.Bytes(), destAddr)
  373. } else {
  374. n, err = w.PacketConnWrapper.Write(b.Bytes())
  375. }
  376. b.Release()
  377. if err != nil {
  378. buf.ReleaseMulti(mb)
  379. return err
  380. }
  381. if w.Counter != nil {
  382. w.Counter.Add(int64(n))
  383. }
  384. }
  385. return nil
  386. }
  387. type NoisePacketWriter struct {
  388. buf.Writer
  389. noises []*Noise
  390. firstWrite bool
  391. UDPOverride net.Destination
  392. remoteAddr net.Address
  393. }
  394. // MultiBuffer writer with Noise before first packet
  395. func (w *NoisePacketWriter) WriteMultiBuffer(mb buf.MultiBuffer) error {
  396. if w.firstWrite {
  397. w.firstWrite = false
  398. //Do not send Noise for dns requests(just to be safe)
  399. if w.UDPOverride.Port == 53 {
  400. return w.Writer.WriteMultiBuffer(mb)
  401. }
  402. var noise []byte
  403. var err error
  404. if w.remoteAddr.Family().IsDomain() {
  405. panic("impossible, remoteAddr is always IP")
  406. }
  407. for _, n := range w.noises {
  408. switch n.ApplyTo {
  409. case "ipv4":
  410. if w.remoteAddr.Family().IsIPv6() {
  411. continue
  412. }
  413. case "ipv6":
  414. if w.remoteAddr.Family().IsIPv4() {
  415. continue
  416. }
  417. case "ip":
  418. default:
  419. panic("unreachable, applyTo is ip/ipv4/ipv6")
  420. }
  421. //User input string or base64 encoded string or hex string
  422. if n.Packet != nil {
  423. noise = n.Packet
  424. } else {
  425. //Random noise
  426. noise, err = GenerateRandomBytes(crypto.RandBetween(int64(n.LengthMin),
  427. int64(n.LengthMax)))
  428. }
  429. if err != nil {
  430. return err
  431. }
  432. err = w.Writer.WriteMultiBuffer(buf.MultiBuffer{buf.FromBytes(noise)})
  433. if err != nil {
  434. return err
  435. }
  436. if n.DelayMin != 0 || n.DelayMax != 0 {
  437. time.Sleep(time.Duration(crypto.RandBetween(int64(n.DelayMin), int64(n.DelayMax))) * time.Millisecond)
  438. }
  439. }
  440. }
  441. return w.Writer.WriteMultiBuffer(mb)
  442. }
  443. type FragmentWriter struct {
  444. fragment *Fragment
  445. writer io.Writer
  446. count uint64
  447. }
  448. func (f *FragmentWriter) Write(b []byte) (int, error) {
  449. f.count++
  450. if f.fragment.PacketsFrom == 0 && f.fragment.PacketsTo == 1 {
  451. if f.count != 1 || len(b) <= 5 || b[0] != 22 {
  452. return f.writer.Write(b)
  453. }
  454. recordLen := 5 + ((int(b[3]) << 8) | int(b[4]))
  455. if len(b) < recordLen { // maybe already fragmented somehow
  456. return f.writer.Write(b)
  457. }
  458. data := b[5:recordLen]
  459. buff := make([]byte, 2048)
  460. var hello []byte
  461. maxSplit := crypto.RandBetween(int64(f.fragment.MaxSplitMin), int64(f.fragment.MaxSplitMax))
  462. var splitNum int64
  463. for from := 0; ; {
  464. to := from + int(crypto.RandBetween(int64(f.fragment.LengthMin), int64(f.fragment.LengthMax)))
  465. splitNum++
  466. if to > len(data) || (maxSplit > 0 && splitNum >= maxSplit) {
  467. to = len(data)
  468. }
  469. l := to - from
  470. if 5+l > len(buff) {
  471. buff = make([]byte, 5+l)
  472. }
  473. copy(buff[:3], b)
  474. copy(buff[5:], data[from:to])
  475. from = to
  476. buff[3] = byte(l >> 8)
  477. buff[4] = byte(l)
  478. if f.fragment.IntervalMax == 0 { // combine fragmented tlshello if interval is 0
  479. hello = append(hello, buff[:5+l]...)
  480. } else {
  481. _, err := f.writer.Write(buff[:5+l])
  482. time.Sleep(time.Duration(crypto.RandBetween(int64(f.fragment.IntervalMin), int64(f.fragment.IntervalMax))) * time.Millisecond)
  483. if err != nil {
  484. return 0, err
  485. }
  486. }
  487. if from == len(data) {
  488. if len(hello) > 0 {
  489. _, err := f.writer.Write(hello)
  490. if err != nil {
  491. return 0, err
  492. }
  493. }
  494. if len(b) > recordLen {
  495. n, err := f.writer.Write(b[recordLen:])
  496. if err != nil {
  497. return recordLen + n, err
  498. }
  499. }
  500. return len(b), nil
  501. }
  502. }
  503. }
  504. if f.fragment.PacketsFrom != 0 && (f.count < f.fragment.PacketsFrom || f.count > f.fragment.PacketsTo) {
  505. return f.writer.Write(b)
  506. }
  507. maxSplit := crypto.RandBetween(int64(f.fragment.MaxSplitMin), int64(f.fragment.MaxSplitMax))
  508. var splitNum int64
  509. for from := 0; ; {
  510. to := from + int(crypto.RandBetween(int64(f.fragment.LengthMin), int64(f.fragment.LengthMax)))
  511. splitNum++
  512. if to > len(b) || (maxSplit > 0 && splitNum >= maxSplit) {
  513. to = len(b)
  514. }
  515. n, err := f.writer.Write(b[from:to])
  516. from += n
  517. if err != nil {
  518. return from, err
  519. }
  520. time.Sleep(time.Duration(crypto.RandBetween(int64(f.fragment.IntervalMin), int64(f.fragment.IntervalMax))) * time.Millisecond)
  521. if from >= len(b) {
  522. return from, nil
  523. }
  524. }
  525. }
  526. func GenerateRandomBytes(n int64) ([]byte, error) {
  527. b := make([]byte, n)
  528. _, err := rand.Read(b)
  529. // Note that err == nil only if we read len(b) bytes.
  530. if err != nil {
  531. return nil, err
  532. }
  533. return b, nil
  534. }