rule_action.go 15 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504
  1. package rule
  2. import (
  3. "context"
  4. "errors"
  5. "net/netip"
  6. "strings"
  7. "sync"
  8. "syscall"
  9. "time"
  10. "github.com/sagernet/sing-box/adapter"
  11. "github.com/sagernet/sing-box/common/dialer"
  12. "github.com/sagernet/sing-box/common/sniff"
  13. C "github.com/sagernet/sing-box/constant"
  14. "github.com/sagernet/sing-box/option"
  15. "github.com/sagernet/sing-tun"
  16. "github.com/sagernet/sing/common"
  17. E "github.com/sagernet/sing/common/exceptions"
  18. F "github.com/sagernet/sing/common/format"
  19. "github.com/sagernet/sing/common/logger"
  20. M "github.com/sagernet/sing/common/metadata"
  21. N "github.com/sagernet/sing/common/network"
  22. "github.com/miekg/dns"
  23. )
  24. func NewRuleAction(ctx context.Context, logger logger.ContextLogger, action option.RuleAction) (adapter.RuleAction, error) {
  25. switch action.Action {
  26. case "":
  27. return nil, nil
  28. case C.RuleActionTypeRoute:
  29. return &RuleActionRoute{
  30. Outbound: action.RouteOptions.Outbound,
  31. RuleActionRouteOptions: RuleActionRouteOptions{
  32. OverrideAddress: M.ParseSocksaddrHostPort(action.RouteOptions.OverrideAddress, 0),
  33. OverridePort: action.RouteOptions.OverridePort,
  34. NetworkStrategy: (*C.NetworkStrategy)(action.RouteOptions.NetworkStrategy),
  35. FallbackDelay: time.Duration(action.RouteOptions.FallbackDelay),
  36. UDPDisableDomainUnmapping: action.RouteOptions.UDPDisableDomainUnmapping,
  37. UDPConnect: action.RouteOptions.UDPConnect,
  38. TLSFragment: action.RouteOptions.TLSFragment,
  39. TLSFragmentFallbackDelay: time.Duration(action.RouteOptions.TLSFragmentFallbackDelay),
  40. TLSRecordFragment: action.RouteOptions.TLSRecordFragment,
  41. },
  42. }, nil
  43. case C.RuleActionTypeRouteOptions:
  44. return &RuleActionRouteOptions{
  45. OverrideAddress: M.ParseSocksaddrHostPort(action.RouteOptionsOptions.OverrideAddress, 0),
  46. OverridePort: action.RouteOptionsOptions.OverridePort,
  47. NetworkStrategy: (*C.NetworkStrategy)(action.RouteOptionsOptions.NetworkStrategy),
  48. FallbackDelay: time.Duration(action.RouteOptionsOptions.FallbackDelay),
  49. UDPDisableDomainUnmapping: action.RouteOptionsOptions.UDPDisableDomainUnmapping,
  50. UDPConnect: action.RouteOptionsOptions.UDPConnect,
  51. UDPTimeout: time.Duration(action.RouteOptionsOptions.UDPTimeout),
  52. TLSFragment: action.RouteOptionsOptions.TLSFragment,
  53. TLSFragmentFallbackDelay: time.Duration(action.RouteOptionsOptions.TLSFragmentFallbackDelay),
  54. TLSRecordFragment: action.RouteOptionsOptions.TLSRecordFragment,
  55. }, nil
  56. case C.RuleActionTypeDirect:
  57. directDialer, err := dialer.New(ctx, option.DialerOptions(action.DirectOptions), false)
  58. if err != nil {
  59. return nil, err
  60. }
  61. var description string
  62. descriptions := action.DirectOptions.Descriptions()
  63. switch len(descriptions) {
  64. case 0:
  65. case 1:
  66. description = F.ToString("(", descriptions[0], ")")
  67. case 2:
  68. description = F.ToString("(", descriptions[0], ",", descriptions[1], ")")
  69. default:
  70. description = F.ToString("(", descriptions[0], ",", descriptions[1], ",...)")
  71. }
  72. return &RuleActionDirect{
  73. Dialer: directDialer,
  74. description: description,
  75. }, nil
  76. case C.RuleActionTypeReject:
  77. return &RuleActionReject{
  78. Method: action.RejectOptions.Method,
  79. NoDrop: action.RejectOptions.NoDrop,
  80. logger: logger,
  81. }, nil
  82. case C.RuleActionTypeHijackDNS:
  83. return &RuleActionHijackDNS{}, nil
  84. case C.RuleActionTypeSniff:
  85. sniffAction := &RuleActionSniff{
  86. snifferNames: action.SniffOptions.Sniffer,
  87. Timeout: time.Duration(action.SniffOptions.Timeout),
  88. }
  89. return sniffAction, sniffAction.build()
  90. case C.RuleActionTypeResolve:
  91. return &RuleActionResolve{
  92. Server: action.ResolveOptions.Server,
  93. Strategy: C.DomainStrategy(action.ResolveOptions.Strategy),
  94. DisableCache: action.ResolveOptions.DisableCache,
  95. RewriteTTL: action.ResolveOptions.RewriteTTL,
  96. ClientSubnet: action.ResolveOptions.ClientSubnet.Build(netip.Prefix{}),
  97. }, nil
  98. default:
  99. panic(F.ToString("unknown rule action: ", action.Action))
  100. }
  101. }
  102. func NewDNSRuleAction(logger logger.ContextLogger, action option.DNSRuleAction) adapter.RuleAction {
  103. switch action.Action {
  104. case "":
  105. return nil
  106. case C.RuleActionTypeRoute:
  107. return &RuleActionDNSRoute{
  108. Server: action.RouteOptions.Server,
  109. RuleActionDNSRouteOptions: RuleActionDNSRouteOptions{
  110. Strategy: C.DomainStrategy(action.RouteOptions.Strategy),
  111. DisableCache: action.RouteOptions.DisableCache,
  112. RewriteTTL: action.RouteOptions.RewriteTTL,
  113. ClientSubnet: netip.Prefix(common.PtrValueOrDefault(action.RouteOptions.ClientSubnet)),
  114. },
  115. }
  116. case C.RuleActionTypeRouteOptions:
  117. return &RuleActionDNSRouteOptions{
  118. Strategy: C.DomainStrategy(action.RouteOptionsOptions.Strategy),
  119. DisableCache: action.RouteOptionsOptions.DisableCache,
  120. RewriteTTL: action.RouteOptionsOptions.RewriteTTL,
  121. ClientSubnet: netip.Prefix(common.PtrValueOrDefault(action.RouteOptionsOptions.ClientSubnet)),
  122. }
  123. case C.RuleActionTypeReject:
  124. return &RuleActionReject{
  125. Method: action.RejectOptions.Method,
  126. NoDrop: action.RejectOptions.NoDrop,
  127. logger: logger,
  128. }
  129. case C.RuleActionTypePredefined:
  130. return &RuleActionPredefined{
  131. Rcode: action.PredefinedOptions.Rcode.Build(),
  132. Answer: common.Map(action.PredefinedOptions.Answer, option.DNSRecordOptions.Build),
  133. Ns: common.Map(action.PredefinedOptions.Ns, option.DNSRecordOptions.Build),
  134. Extra: common.Map(action.PredefinedOptions.Extra, option.DNSRecordOptions.Build),
  135. }
  136. default:
  137. panic(F.ToString("unknown rule action: ", action.Action))
  138. }
  139. }
  140. type RuleActionRoute struct {
  141. Outbound string
  142. RuleActionRouteOptions
  143. }
  144. func (r *RuleActionRoute) Type() string {
  145. return C.RuleActionTypeRoute
  146. }
  147. func (r *RuleActionRoute) String() string {
  148. var descriptions []string
  149. descriptions = append(descriptions, r.Outbound)
  150. descriptions = append(descriptions, r.Descriptions()...)
  151. return F.ToString("route(", strings.Join(descriptions, ","), ")")
  152. }
  153. type RuleActionRouteOptions struct {
  154. OverrideAddress M.Socksaddr
  155. OverridePort uint16
  156. NetworkStrategy *C.NetworkStrategy
  157. NetworkType []C.InterfaceType
  158. FallbackNetworkType []C.InterfaceType
  159. FallbackDelay time.Duration
  160. UDPDisableDomainUnmapping bool
  161. UDPConnect bool
  162. UDPTimeout time.Duration
  163. TLSFragment bool
  164. TLSFragmentFallbackDelay time.Duration
  165. TLSRecordFragment bool
  166. }
  167. func (r *RuleActionRouteOptions) Type() string {
  168. return C.RuleActionTypeRouteOptions
  169. }
  170. func (r *RuleActionRouteOptions) String() string {
  171. return F.ToString("route-options(", strings.Join(r.Descriptions(), ","), ")")
  172. }
  173. func (r *RuleActionRouteOptions) Descriptions() []string {
  174. var descriptions []string
  175. if r.OverrideAddress.IsValid() {
  176. descriptions = append(descriptions, F.ToString("override-address=", r.OverrideAddress.AddrString()))
  177. }
  178. if r.OverridePort > 0 {
  179. descriptions = append(descriptions, F.ToString("override-port=", r.OverridePort))
  180. }
  181. if r.NetworkStrategy != nil {
  182. descriptions = append(descriptions, F.ToString("network-strategy=", r.NetworkStrategy))
  183. }
  184. if r.NetworkType != nil {
  185. descriptions = append(descriptions, F.ToString("network-type=", strings.Join(common.Map(r.NetworkType, C.InterfaceType.String), ",")))
  186. }
  187. if r.FallbackNetworkType != nil {
  188. descriptions = append(descriptions, F.ToString("fallback-network-type="+strings.Join(common.Map(r.NetworkType, C.InterfaceType.String), ",")))
  189. }
  190. if r.FallbackDelay > 0 {
  191. descriptions = append(descriptions, F.ToString("fallback-delay=", r.FallbackDelay.String()))
  192. }
  193. if r.UDPDisableDomainUnmapping {
  194. descriptions = append(descriptions, "udp-disable-domain-unmapping")
  195. }
  196. if r.UDPConnect {
  197. descriptions = append(descriptions, "udp-connect")
  198. }
  199. if r.UDPTimeout > 0 {
  200. descriptions = append(descriptions, "udp-timeout")
  201. }
  202. if r.TLSFragment {
  203. descriptions = append(descriptions, "tls-fragment")
  204. }
  205. if r.TLSFragmentFallbackDelay > 0 {
  206. descriptions = append(descriptions, F.ToString("tls-fragment-fallback-delay=", r.TLSFragmentFallbackDelay.String()))
  207. }
  208. if r.TLSRecordFragment {
  209. descriptions = append(descriptions, "tls-record-fragment")
  210. }
  211. return descriptions
  212. }
  213. type RuleActionDNSRoute struct {
  214. Server string
  215. RuleActionDNSRouteOptions
  216. }
  217. func (r *RuleActionDNSRoute) Type() string {
  218. return C.RuleActionTypeRoute
  219. }
  220. func (r *RuleActionDNSRoute) String() string {
  221. var descriptions []string
  222. descriptions = append(descriptions, r.Server)
  223. if r.DisableCache {
  224. descriptions = append(descriptions, "disable-cache")
  225. }
  226. if r.RewriteTTL != nil {
  227. descriptions = append(descriptions, F.ToString("rewrite-ttl=", *r.RewriteTTL))
  228. }
  229. if r.ClientSubnet.IsValid() {
  230. descriptions = append(descriptions, F.ToString("client-subnet=", r.ClientSubnet))
  231. }
  232. return F.ToString("route(", strings.Join(descriptions, ","), ")")
  233. }
  234. type RuleActionDNSRouteOptions struct {
  235. Strategy C.DomainStrategy
  236. DisableCache bool
  237. RewriteTTL *uint32
  238. ClientSubnet netip.Prefix
  239. }
  240. func (r *RuleActionDNSRouteOptions) Type() string {
  241. return C.RuleActionTypeRouteOptions
  242. }
  243. func (r *RuleActionDNSRouteOptions) String() string {
  244. var descriptions []string
  245. if r.DisableCache {
  246. descriptions = append(descriptions, "disable-cache")
  247. }
  248. if r.RewriteTTL != nil {
  249. descriptions = append(descriptions, F.ToString("rewrite-ttl=", *r.RewriteTTL))
  250. }
  251. if r.ClientSubnet.IsValid() {
  252. descriptions = append(descriptions, F.ToString("client-subnet=", r.ClientSubnet))
  253. }
  254. return F.ToString("route-options(", strings.Join(descriptions, ","), ")")
  255. }
  256. type RuleActionDirect struct {
  257. Dialer N.Dialer
  258. description string
  259. }
  260. func (r *RuleActionDirect) Type() string {
  261. return C.RuleActionTypeDirect
  262. }
  263. func (r *RuleActionDirect) String() string {
  264. return "direct" + r.description
  265. }
  266. type RejectedError struct {
  267. Cause error
  268. }
  269. func (r *RejectedError) Error() string {
  270. return "rejected"
  271. }
  272. func (r *RejectedError) Unwrap() error {
  273. return r.Cause
  274. }
  275. func IsRejected(err error) bool {
  276. var rejected *RejectedError
  277. return errors.As(err, &rejected)
  278. }
  279. type RuleActionReject struct {
  280. Method string
  281. NoDrop bool
  282. logger logger.ContextLogger
  283. dropAccess sync.Mutex
  284. dropCounter []time.Time
  285. }
  286. func (r *RuleActionReject) Type() string {
  287. return C.RuleActionTypeReject
  288. }
  289. func (r *RuleActionReject) String() string {
  290. if r.Method == C.RuleActionRejectMethodDefault {
  291. return "reject"
  292. }
  293. return F.ToString("reject(", r.Method, ")")
  294. }
  295. func (r *RuleActionReject) Error(ctx context.Context) error {
  296. var returnErr error
  297. switch r.Method {
  298. case C.RuleActionRejectMethodDefault:
  299. returnErr = &RejectedError{syscall.ECONNREFUSED}
  300. case C.RuleActionRejectMethodDrop:
  301. return &RejectedError{tun.ErrDrop}
  302. default:
  303. panic(F.ToString("unknown reject method: ", r.Method))
  304. }
  305. if r.NoDrop {
  306. return returnErr
  307. }
  308. r.dropAccess.Lock()
  309. defer r.dropAccess.Unlock()
  310. timeNow := time.Now()
  311. r.dropCounter = common.Filter(r.dropCounter, func(t time.Time) bool {
  312. return timeNow.Sub(t) <= 30*time.Second
  313. })
  314. r.dropCounter = append(r.dropCounter, timeNow)
  315. if len(r.dropCounter) > 50 {
  316. if ctx != nil {
  317. r.logger.DebugContext(ctx, "dropped due to flooding")
  318. }
  319. return &RejectedError{tun.ErrDrop}
  320. }
  321. return returnErr
  322. }
  323. type RuleActionHijackDNS struct{}
  324. func (r *RuleActionHijackDNS) Type() string {
  325. return C.RuleActionTypeHijackDNS
  326. }
  327. func (r *RuleActionHijackDNS) String() string {
  328. return "hijack-dns"
  329. }
  330. type RuleActionSniff struct {
  331. snifferNames []string
  332. StreamSniffers []sniff.StreamSniffer
  333. PacketSniffers []sniff.PacketSniffer
  334. Timeout time.Duration
  335. // Deprecated
  336. OverrideDestination bool
  337. }
  338. func (r *RuleActionSniff) Type() string {
  339. return C.RuleActionTypeSniff
  340. }
  341. func (r *RuleActionSniff) build() error {
  342. for _, name := range r.snifferNames {
  343. switch name {
  344. case C.ProtocolTLS:
  345. r.StreamSniffers = append(r.StreamSniffers, sniff.TLSClientHello)
  346. case C.ProtocolHTTP:
  347. r.StreamSniffers = append(r.StreamSniffers, sniff.HTTPHost)
  348. case C.ProtocolQUIC:
  349. r.PacketSniffers = append(r.PacketSniffers, sniff.QUICClientHello)
  350. case C.ProtocolDNS:
  351. r.StreamSniffers = append(r.StreamSniffers, sniff.StreamDomainNameQuery)
  352. r.PacketSniffers = append(r.PacketSniffers, sniff.DomainNameQuery)
  353. case C.ProtocolSTUN:
  354. r.PacketSniffers = append(r.PacketSniffers, sniff.STUNMessage)
  355. case C.ProtocolBitTorrent:
  356. r.StreamSniffers = append(r.StreamSniffers, sniff.BitTorrent)
  357. r.PacketSniffers = append(r.PacketSniffers, sniff.UTP)
  358. r.PacketSniffers = append(r.PacketSniffers, sniff.UDPTracker)
  359. case C.ProtocolDTLS:
  360. r.PacketSniffers = append(r.PacketSniffers, sniff.DTLSRecord)
  361. case C.ProtocolSSH:
  362. r.StreamSniffers = append(r.StreamSniffers, sniff.SSH)
  363. case C.ProtocolRDP:
  364. r.StreamSniffers = append(r.StreamSniffers, sniff.RDP)
  365. case C.ProtocolNTP:
  366. r.PacketSniffers = append(r.PacketSniffers, sniff.NTP)
  367. default:
  368. return E.New("unknown sniffer: ", name)
  369. }
  370. }
  371. return nil
  372. }
  373. func (r *RuleActionSniff) String() string {
  374. if len(r.snifferNames) == 0 && r.Timeout == 0 {
  375. return "sniff"
  376. } else if len(r.snifferNames) > 0 && r.Timeout == 0 {
  377. return F.ToString("sniff(", strings.Join(r.snifferNames, ","), ")")
  378. } else if len(r.snifferNames) == 0 && r.Timeout > 0 {
  379. return F.ToString("sniff(", r.Timeout.String(), ")")
  380. } else {
  381. return F.ToString("sniff(", strings.Join(r.snifferNames, ","), ",", r.Timeout.String(), ")")
  382. }
  383. }
  384. type RuleActionResolve struct {
  385. Server string
  386. Strategy C.DomainStrategy
  387. DisableCache bool
  388. RewriteTTL *uint32
  389. ClientSubnet netip.Prefix
  390. }
  391. func (r *RuleActionResolve) Type() string {
  392. return C.RuleActionTypeResolve
  393. }
  394. func (r *RuleActionResolve) String() string {
  395. var options []string
  396. if r.Server != "" {
  397. options = append(options, r.Server)
  398. }
  399. if r.Strategy != C.DomainStrategyAsIS {
  400. options = append(options, F.ToString(option.DomainStrategy(r.Strategy)))
  401. }
  402. if r.DisableCache {
  403. options = append(options, "disable_cache")
  404. }
  405. if r.RewriteTTL != nil {
  406. options = append(options, F.ToString("rewrite_ttl=", *r.RewriteTTL))
  407. }
  408. if r.ClientSubnet.IsValid() {
  409. options = append(options, F.ToString("client_subnet=", r.ClientSubnet))
  410. }
  411. if len(options) == 0 {
  412. return "resolve"
  413. } else {
  414. return F.ToString("resolve(", strings.Join(options, ","), ")")
  415. }
  416. }
  417. type RuleActionPredefined struct {
  418. Rcode int
  419. Answer []dns.RR
  420. Ns []dns.RR
  421. Extra []dns.RR
  422. }
  423. func (r *RuleActionPredefined) Type() string {
  424. return C.RuleActionTypePredefined
  425. }
  426. func (r *RuleActionPredefined) String() string {
  427. var options []string
  428. options = append(options, dns.RcodeToString[r.Rcode])
  429. options = append(options, common.Map(r.Answer, dns.RR.String)...)
  430. options = append(options, common.Map(r.Ns, dns.RR.String)...)
  431. options = append(options, common.Map(r.Extra, dns.RR.String)...)
  432. return F.ToString("predefined(", strings.Join(options, ","), ")")
  433. }
  434. func (r *RuleActionPredefined) Response(request *dns.Msg) *dns.Msg {
  435. return &dns.Msg{
  436. MsgHdr: dns.MsgHdr{
  437. Id: request.Id,
  438. Response: true,
  439. Authoritative: true,
  440. RecursionDesired: true,
  441. RecursionAvailable: true,
  442. Rcode: r.Rcode,
  443. },
  444. Question: request.Question,
  445. Answer: rewriteRecords(r.Answer, request.Question[0]),
  446. Ns: rewriteRecords(r.Ns, request.Question[0]),
  447. Extra: rewriteRecords(r.Extra, request.Question[0]),
  448. }
  449. }
  450. func rewriteRecords(records []dns.RR, question dns.Question) []dns.RR {
  451. return common.Map(records, func(it dns.RR) dns.RR {
  452. if strings.HasPrefix(it.Header().Name, "*") {
  453. if strings.HasSuffix(question.Name, it.Header().Name[1:]) {
  454. it = dns.Copy(it)
  455. it.Header().Name = question.Name
  456. }
  457. }
  458. return it
  459. })
  460. }