client.go 3.1 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109
  1. package tls
  2. import (
  3. "context"
  4. "crypto/tls"
  5. "errors"
  6. "net"
  7. "os"
  8. "github.com/sagernet/sing-box/common/badtls"
  9. C "github.com/sagernet/sing-box/constant"
  10. "github.com/sagernet/sing-box/option"
  11. "github.com/sagernet/sing/common/logger"
  12. M "github.com/sagernet/sing/common/metadata"
  13. N "github.com/sagernet/sing/common/network"
  14. aTLS "github.com/sagernet/sing/common/tls"
  15. )
  16. func NewDialerFromOptions(ctx context.Context, logger logger.ContextLogger, dialer N.Dialer, serverAddress string, options option.OutboundTLSOptions) (N.Dialer, error) {
  17. if !options.Enabled {
  18. return dialer, nil
  19. }
  20. config, err := NewClient(ctx, logger, serverAddress, options)
  21. if err != nil {
  22. return nil, err
  23. }
  24. return NewDialer(dialer, config), nil
  25. }
  26. func NewClient(ctx context.Context, logger logger.ContextLogger, serverAddress string, options option.OutboundTLSOptions) (Config, error) {
  27. if !options.Enabled {
  28. return nil, nil
  29. }
  30. if options.Reality != nil && options.Reality.Enabled {
  31. return NewRealityClient(ctx, logger, serverAddress, options)
  32. } else if options.UTLS != nil && options.UTLS.Enabled {
  33. return NewUTLSClient(ctx, logger, serverAddress, options)
  34. }
  35. return NewSTDClient(ctx, logger, serverAddress, options)
  36. }
  37. func ClientHandshake(ctx context.Context, conn net.Conn, config Config) (Conn, error) {
  38. ctx, cancel := context.WithTimeout(ctx, C.TCPTimeout)
  39. defer cancel()
  40. tlsConn, err := aTLS.ClientHandshake(ctx, conn, config)
  41. if err != nil {
  42. return nil, err
  43. }
  44. readWaitConn, err := badtls.NewReadWaitConn(tlsConn)
  45. if err == nil {
  46. return readWaitConn, nil
  47. } else if err != os.ErrInvalid {
  48. return nil, err
  49. }
  50. return tlsConn, nil
  51. }
  52. type Dialer interface {
  53. N.Dialer
  54. DialTLSContext(ctx context.Context, destination M.Socksaddr) (Conn, error)
  55. }
  56. type defaultDialer struct {
  57. dialer N.Dialer
  58. config Config
  59. }
  60. func NewDialer(dialer N.Dialer, config Config) Dialer {
  61. return &defaultDialer{dialer, config}
  62. }
  63. func (d *defaultDialer) DialContext(ctx context.Context, network string, destination M.Socksaddr) (net.Conn, error) {
  64. if N.NetworkName(network) != N.NetworkTCP {
  65. return nil, os.ErrInvalid
  66. }
  67. return d.DialTLSContext(ctx, destination)
  68. }
  69. func (d *defaultDialer) ListenPacket(ctx context.Context, destination M.Socksaddr) (net.PacketConn, error) {
  70. return nil, os.ErrInvalid
  71. }
  72. func (d *defaultDialer) DialTLSContext(ctx context.Context, destination M.Socksaddr) (Conn, error) {
  73. return d.dialContext(ctx, destination, true)
  74. }
  75. func (d *defaultDialer) dialContext(ctx context.Context, destination M.Socksaddr, echRetry bool) (Conn, error) {
  76. conn, err := d.dialer.DialContext(ctx, N.NetworkTCP, destination)
  77. if err != nil {
  78. return nil, err
  79. }
  80. tlsConn, err := aTLS.ClientHandshake(ctx, conn, d.config)
  81. if err != nil {
  82. conn.Close()
  83. var echErr *tls.ECHRejectionError
  84. if echRetry && errors.As(err, &echErr) && len(echErr.RetryConfigList) > 0 {
  85. if echConfig, isECH := d.config.(ECHCapableConfig); isECH {
  86. echConfig.SetECHConfigList(echErr.RetryConfigList)
  87. return d.dialContext(ctx, destination, false)
  88. }
  89. }
  90. return nil, err
  91. }
  92. return tlsConn, nil
  93. }
  94. func (d *defaultDialer) Upstream() any {
  95. return d.dialer
  96. }