client.go 3.0 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110
  1. package tls
  2. import (
  3. "context"
  4. "crypto/tls"
  5. "errors"
  6. "net"
  7. "os"
  8. "github.com/sagernet/sing-box/common/badtls"
  9. C "github.com/sagernet/sing-box/constant"
  10. "github.com/sagernet/sing-box/option"
  11. M "github.com/sagernet/sing/common/metadata"
  12. N "github.com/sagernet/sing/common/network"
  13. aTLS "github.com/sagernet/sing/common/tls"
  14. )
  15. func NewDialerFromOptions(ctx context.Context, dialer N.Dialer, serverAddress string, options option.OutboundTLSOptions) (N.Dialer, error) {
  16. if !options.Enabled {
  17. return dialer, nil
  18. }
  19. config, err := NewClient(ctx, serverAddress, options)
  20. if err != nil {
  21. return nil, err
  22. }
  23. return NewDialer(dialer, config), nil
  24. }
  25. func NewClient(ctx context.Context, serverAddress string, options option.OutboundTLSOptions) (Config, error) {
  26. if !options.Enabled {
  27. return nil, nil
  28. }
  29. if options.Reality != nil && options.Reality.Enabled {
  30. return NewRealityClient(ctx, serverAddress, options)
  31. } else if options.UTLS != nil && options.UTLS.Enabled {
  32. return NewUTLSClient(ctx, serverAddress, options)
  33. }
  34. return NewSTDClient(ctx, serverAddress, options)
  35. }
  36. func ClientHandshake(ctx context.Context, conn net.Conn, config Config) (Conn, error) {
  37. ctx, cancel := context.WithTimeout(ctx, C.TCPTimeout)
  38. defer cancel()
  39. tlsConn, err := aTLS.ClientHandshake(ctx, conn, config)
  40. if err != nil {
  41. return nil, err
  42. }
  43. readWaitConn, err := badtls.NewReadWaitConn(tlsConn)
  44. if err == nil {
  45. return readWaitConn, nil
  46. } else if err != os.ErrInvalid {
  47. return nil, err
  48. }
  49. return tlsConn, nil
  50. }
  51. type Dialer interface {
  52. N.Dialer
  53. DialTLSContext(ctx context.Context, destination M.Socksaddr) (Conn, error)
  54. }
  55. type defaultDialer struct {
  56. dialer N.Dialer
  57. config Config
  58. }
  59. func NewDialer(dialer N.Dialer, config Config) Dialer {
  60. return &defaultDialer{dialer, config}
  61. }
  62. func (d *defaultDialer) DialContext(ctx context.Context, network string, destination M.Socksaddr) (net.Conn, error) {
  63. if N.NetworkName(network) != N.NetworkTCP {
  64. return nil, os.ErrInvalid
  65. }
  66. return d.DialTLSContext(ctx, destination)
  67. }
  68. func (d *defaultDialer) ListenPacket(ctx context.Context, destination M.Socksaddr) (net.PacketConn, error) {
  69. return nil, os.ErrInvalid
  70. }
  71. func (d *defaultDialer) DialTLSContext(ctx context.Context, destination M.Socksaddr) (Conn, error) {
  72. return d.dialContext(ctx, destination, true)
  73. }
  74. func (d *defaultDialer) dialContext(ctx context.Context, destination M.Socksaddr, echRetry bool) (Conn, error) {
  75. conn, err := d.dialer.DialContext(ctx, N.NetworkTCP, destination)
  76. if err != nil {
  77. return nil, err
  78. }
  79. tlsConn, err := aTLS.ClientHandshake(ctx, conn, d.config)
  80. if err == nil {
  81. return tlsConn, nil
  82. }
  83. conn.Close()
  84. if echRetry {
  85. var echErr *tls.ECHRejectionError
  86. if errors.As(err, &echErr) && len(echErr.RetryConfigList) > 0 {
  87. if echConfig, isECH := d.config.(ECHCapableConfig); isECH {
  88. echConfig.SetECHConfigList(echErr.RetryConfigList)
  89. }
  90. }
  91. return d.dialContext(ctx, destination, false)
  92. }
  93. return nil, err
  94. }
  95. func (d *defaultDialer) Upstream() any {
  96. return d.dialer
  97. }