123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253 |
- package naive
- import (
- "context"
- "io"
- "math/rand"
- "net"
- "net/http"
- "github.com/sagernet/sing-box/adapter"
- "github.com/sagernet/sing-box/adapter/inbound"
- "github.com/sagernet/sing-box/common/listener"
- "github.com/sagernet/sing-box/common/tls"
- "github.com/sagernet/sing-box/common/uot"
- C "github.com/sagernet/sing-box/constant"
- "github.com/sagernet/sing-box/log"
- "github.com/sagernet/sing-box/option"
- "github.com/sagernet/sing-box/transport/v2rayhttp"
- "github.com/sagernet/sing/common"
- "github.com/sagernet/sing/common/auth"
- E "github.com/sagernet/sing/common/exceptions"
- "github.com/sagernet/sing/common/logger"
- M "github.com/sagernet/sing/common/metadata"
- N "github.com/sagernet/sing/common/network"
- sHttp "github.com/sagernet/sing/protocol/http"
- )
- var ConfigureHTTP3ListenerFunc func(listener *listener.Listener, handler http.Handler, tlsConfig tls.ServerConfig, logger logger.Logger) (io.Closer, error)
- func RegisterInbound(registry *inbound.Registry) {
- inbound.Register[option.NaiveInboundOptions](registry, C.TypeNaive, NewInbound)
- }
- type Inbound struct {
- inbound.Adapter
- ctx context.Context
- router adapter.ConnectionRouterEx
- logger logger.ContextLogger
- listener *listener.Listener
- network []string
- networkIsDefault bool
- authenticator *auth.Authenticator
- tlsConfig tls.ServerConfig
- httpServer *http.Server
- h3Server io.Closer
- }
- func NewInbound(ctx context.Context, router adapter.Router, logger log.ContextLogger, tag string, options option.NaiveInboundOptions) (adapter.Inbound, error) {
- inbound := &Inbound{
- Adapter: inbound.NewAdapter(C.TypeNaive, tag),
- ctx: ctx,
- router: uot.NewRouter(router, logger),
- logger: logger,
- listener: listener.New(listener.Options{
- Context: ctx,
- Logger: logger,
- Listen: options.ListenOptions,
- }),
- networkIsDefault: options.Network == "",
- network: options.Network.Build(),
- authenticator: auth.NewAuthenticator(options.Users),
- }
- if common.Contains(inbound.network, N.NetworkUDP) {
- if options.TLS == nil || !options.TLS.Enabled {
- return nil, E.New("TLS is required for QUIC server")
- }
- }
- if len(options.Users) == 0 {
- return nil, E.New("missing users")
- }
- if options.TLS != nil {
- tlsConfig, err := tls.NewServer(ctx, logger, common.PtrValueOrDefault(options.TLS))
- if err != nil {
- return nil, err
- }
- inbound.tlsConfig = tlsConfig
- }
- return inbound, nil
- }
- func (n *Inbound) Start(stage adapter.StartStage) error {
- if stage != adapter.StartStateStart {
- return nil
- }
- var tlsConfig *tls.STDConfig
- if n.tlsConfig != nil {
- err := n.tlsConfig.Start()
- if err != nil {
- return E.Cause(err, "create TLS config")
- }
- tlsConfig, err = n.tlsConfig.Config()
- if err != nil {
- return err
- }
- }
- if common.Contains(n.network, N.NetworkTCP) {
- tcpListener, err := n.listener.ListenTCP()
- if err != nil {
- return err
- }
- n.httpServer = &http.Server{
- Handler: n,
- TLSConfig: tlsConfig,
- BaseContext: func(listener net.Listener) context.Context {
- return n.ctx
- },
- }
- go func() {
- var sErr error
- if tlsConfig != nil {
- sErr = n.httpServer.ServeTLS(tcpListener, "", "")
- } else {
- sErr = n.httpServer.Serve(tcpListener)
- }
- if sErr != nil && !E.IsClosedOrCanceled(sErr) {
- n.logger.Error("http server serve error: ", sErr)
- }
- }()
- }
- if common.Contains(n.network, N.NetworkUDP) {
- http3Server, err := ConfigureHTTP3ListenerFunc(n.listener, n, n.tlsConfig, n.logger)
- if err == nil {
- n.h3Server = http3Server
- } else if len(n.network) > 1 {
- n.logger.Warn(E.Cause(err, "naive http3 disabled"))
- } else {
- return err
- }
- }
- return nil
- }
- func (n *Inbound) Close() error {
- return common.Close(
- &n.listener,
- common.PtrOrNil(n.httpServer),
- n.h3Server,
- n.tlsConfig,
- )
- }
- func (n *Inbound) ServeHTTP(writer http.ResponseWriter, request *http.Request) {
- ctx := log.ContextWithNewID(request.Context())
- if request.Method != "CONNECT" {
- rejectHTTP(writer, http.StatusBadRequest)
- n.badRequest(ctx, request, E.New("not CONNECT request"))
- return
- } else if request.Header.Get("Padding") == "" {
- rejectHTTP(writer, http.StatusBadRequest)
- n.badRequest(ctx, request, E.New("missing naive padding"))
- return
- }
- userName, password, authOk := sHttp.ParseBasicAuth(request.Header.Get("Proxy-Authorization"))
- if authOk {
- authOk = n.authenticator.Verify(userName, password)
- }
- if !authOk {
- rejectHTTP(writer, http.StatusProxyAuthRequired)
- n.badRequest(ctx, request, E.New("authorization failed"))
- return
- }
- writer.Header().Set("Padding", generateNaivePaddingHeader())
- writer.WriteHeader(http.StatusOK)
- writer.(http.Flusher).Flush()
- hostPort := request.URL.Host
- if hostPort == "" {
- hostPort = request.Host
- }
- source := sHttp.SourceAddress(request)
- destination := M.ParseSocksaddr(hostPort)
- if hijacker, isHijacker := writer.(http.Hijacker); isHijacker {
- conn, _, err := hijacker.Hijack()
- if err != nil {
- n.badRequest(ctx, request, E.New("hijack failed"))
- return
- }
- n.newConnection(ctx, false, &naiveH1Conn{Conn: conn}, userName, source, destination)
- } else {
- n.newConnection(ctx, true, &naiveH2Conn{reader: request.Body, writer: writer, flusher: writer.(http.Flusher)}, userName, source, destination)
- }
- }
- func (n *Inbound) newConnection(ctx context.Context, waitForClose bool, conn net.Conn, userName string, source M.Socksaddr, destination M.Socksaddr) {
- if userName != "" {
- n.logger.InfoContext(ctx, "[", userName, "] inbound connection from ", source)
- n.logger.InfoContext(ctx, "[", userName, "] inbound connection to ", destination)
- } else {
- n.logger.InfoContext(ctx, "inbound connection from ", source)
- n.logger.InfoContext(ctx, "inbound connection to ", destination)
- }
- var metadata adapter.InboundContext
- metadata.Inbound = n.Tag()
- metadata.InboundType = n.Type()
- //nolint:staticcheck
- metadata.InboundDetour = n.listener.ListenOptions().Detour
- //nolint:staticcheck
- metadata.InboundOptions = n.listener.ListenOptions().InboundOptions
- metadata.Source = source
- metadata.Destination = destination
- metadata.OriginDestination = M.SocksaddrFromNet(conn.LocalAddr()).Unwrap()
- metadata.User = userName
- if !waitForClose {
- n.router.RouteConnectionEx(ctx, conn, metadata, nil)
- } else {
- done := make(chan struct{})
- wrapper := v2rayhttp.NewHTTP2Wrapper(conn)
- n.router.RouteConnectionEx(ctx, conn, metadata, N.OnceClose(func(it error) {
- close(done)
- }))
- <-done
- wrapper.CloseWrapper()
- }
- }
- func (n *Inbound) badRequest(ctx context.Context, request *http.Request, err error) {
- n.logger.ErrorContext(ctx, E.Cause(err, "process connection from ", request.RemoteAddr))
- }
- func rejectHTTP(writer http.ResponseWriter, statusCode int) {
- hijacker, ok := writer.(http.Hijacker)
- if !ok {
- writer.WriteHeader(statusCode)
- return
- }
- conn, _, err := hijacker.Hijack()
- if err != nil {
- writer.WriteHeader(statusCode)
- return
- }
- if tcpConn, isTCP := common.Cast[*net.TCPConn](conn); isTCP {
- tcpConn.SetLinger(0)
- }
- conn.Close()
- }
- func generateNaivePaddingHeader() string {
- paddingLen := rand.Intn(32) + 30
- padding := make([]byte, paddingLen)
- bits := rand.Uint64()
- for i := 0; i < 16; i++ {
- // Codes that won't be Huffman coded.
- padding[i] = "!#$()+<>?@[]^`{}"[bits&15]
- bits >>= 4
- }
- for i := 16; i < paddingLen; i++ {
- padding[i] = '~'
- }
- return string(padding)
- }
|