shadowsocksr 29 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917
  1. #!/bin/sh /etc/rc.common
  2. #
  3. # Copyright (C) 2017 openwrt-ssr
  4. # Copyright (C) 2017 yushi studio <[email protected]>
  5. # Copyright (C) 2018 lean <[email protected]>
  6. # Copyright (C) 2020 Mattraks <[email protected]>
  7. #
  8. # This is free software, licensed under the GNU General Public License v3.
  9. # See /LICENSE for more information.
  10. #
  11. START=95
  12. STOP=15
  13. SERVICE_DAEMONIZE=1
  14. NAME=shadowsocksr
  15. LOCK_FILE=/var/lock/ssrplus.lock
  16. LOG_FILE=/var/log/ssrplus.log
  17. TMP_PATH=/var/etc/ssrplus
  18. TMP_BIN_PATH=$TMP_PATH/bin
  19. TMP_DNSMASQ_PATH=/var/etc/dnsmasq-ssrplus.d
  20. tcp_config_file=
  21. udp_config_file=
  22. shunt_config_file=
  23. local_config_file=
  24. server_config_file=
  25. shunt_dns_config_file=
  26. tmp_local_port=
  27. ARG_UDP=
  28. ARG_OTA=
  29. tmp_dns_port="300" #dns2socks temporary port
  30. tmp_udp_port="301" #udp temporary port
  31. tmp_udp_local_port="302" #udp socks temporary port
  32. tmp_shunt_port="303" #shunt temporary port
  33. tmp_shunt_local_port="304" #shunt socks temporary port
  34. tmp_shunt_dns_port="305" #shunt dns2socks temporary port
  35. server_count=0
  36. redir_tcp=0
  37. redir_udp=0
  38. local_enable=0
  39. kcp_enable_flag=0
  40. pdnsd_enable_flag=0
  41. switch_server=$1
  42. CRON_FILE=/etc/crontabs/root
  43. EXTRA_COMMANDS='reset'
  44. EXTRA_HELP=" reset Reset to default settings"
  45. #extra_command "reset" "Reset to default settings"
  46. uci_get_by_name() {
  47. local ret=$(uci get $NAME.$1.$2 2>/dev/null)
  48. echo ${ret:=$3}
  49. }
  50. uci_get_by_type() {
  51. local ret=$(uci get $NAME.@$1[0].$2 2>/dev/null)
  52. echo ${ret:=$3}
  53. }
  54. uci_set_by_name() {
  55. uci set $NAME.$1.$2=$3 2>/dev/null
  56. uci commit $NAME
  57. }
  58. uci_set_by_type() {
  59. uci set $NAME.@$1[0].$2=$3 2>/dev/null
  60. uci commit $NAME
  61. }
  62. uci_get_by_cfgid() {
  63. local ret=$(uci show $NAME.@$1[0].$2 | awk -F '.' '{print $2}' 2>/dev/null)
  64. echo ${ret:=$3}
  65. }
  66. get_host_ip() {
  67. local host=$(uci_get_by_name $1 server)
  68. local ip=$host
  69. if [ -z "$(echo $host | grep -E "([0-9]{1,3}[\.]){3}[0-9]{1,3}")" ]; then
  70. if [ "$host" == "${host#*:[0-9a-fA-F]}" ]; then
  71. ip=$(resolveip -4 -t 3 $host | awk 'NR==1{print}')
  72. [ -z "$ip" ] && ip=$(wget -q -O- http://119.29.29.29/d?dn=$host | awk -F ';' '{print $1}')
  73. fi
  74. fi
  75. [ -z "$ip" ] || uci_set_by_name $1 ip $ip
  76. echo ${ip:="$(uci_get_by_name $1 ip "ERROR")"}
  77. }
  78. clean_log() {
  79. local logsnum=$(cat $LOG_FILE 2>/dev/null | wc -l)
  80. [ "$logsnum" -gt 1000 ] && {
  81. echo "$(date "+%Y-%m-%d %H:%M:%S") 日志文件过长,清空处理!" >$LOG_FILE
  82. }
  83. }
  84. echolog() {
  85. local d="$(date "+%Y-%m-%d %H:%M:%S")"
  86. echo -e "$d: $*" >>$LOG_FILE
  87. }
  88. add_cron() {
  89. touch $CRON_FILE
  90. sed -i '/ssrplus.log/d' $CRON_FILE
  91. [ $(uci_get_by_type server_subscribe auto_update 0) -eq 1 ] && echo "0 $(uci_get_by_type server_subscribe auto_update_time) * * * /usr/share/shadowsocksr/ssrplusupdate.sh >$LOG_FILE" >>$CRON_FILE
  92. crontab $CRON_FILE
  93. }
  94. del_cron() {
  95. touch $CRON_FILE
  96. sed -i '/ssrplus.log/d' $CRON_FILE
  97. crontab $CRON_FILE
  98. clean_log
  99. }
  100. set_lock() {
  101. exec 1000>"$LOCK_FILE"
  102. flock -xn 1000
  103. }
  104. unset_lock() {
  105. flock -u 1000
  106. rm -rf "$LOCK_FILE"
  107. }
  108. unlock() {
  109. failcount=1
  110. while [ "$failcount" -le 10 ]; do
  111. if [ -f "$LOCK_FILE" ]; then
  112. let "failcount++"
  113. sleep 1s
  114. [ "$failcount" -ge 10 ] && unset_lock
  115. else
  116. break
  117. fi
  118. done
  119. }
  120. _exit() {
  121. local rc=$1
  122. unset_lock
  123. exit ${rc}
  124. }
  125. first_type() {
  126. local ret=$(which "/bin/${path_name}" "${TMP_BIN_PATH}/${path_name}" "${path_name}" "$@" | head -n1)
  127. echo ${ret:=$@}
  128. }
  129. ln_start_bin() {
  130. local file_func=${1}
  131. local ln_name=${2}
  132. shift 2
  133. if [ "${file_func%%/*}" != "${file_func}" ]; then
  134. [ ! -L "${file_func}" ] && {
  135. ln -s "${file_func}" "${TMP_BIN_PATH}/${ln_name}" >/dev/null 2>&1
  136. file_func="${TMP_BIN_PATH}/${ln_name}"
  137. }
  138. [ -x "${file_func}" ] || echolog "$(readlink ${file_func}) 没有执行权限,无法启动:${file_func} $*"
  139. fi
  140. #echo "${file_func} $*" >&2
  141. [ -x "${file_func}" ] || {
  142. echolog "找不到 ${file_func},无法启动..."
  143. echolog "-----------end------------"
  144. _exit 2
  145. }
  146. ${file_func:-echolog " - ${ln_name}"} "$@" >/dev/null 2>&1 &
  147. }
  148. start_dns() {
  149. local ssrplus_dns="$(uci_get_by_type global pdnsd_enable 0)"
  150. local dnsstr="$(uci_get_by_type global tunnel_forward 8.8.4.4:53)"
  151. local dnsserver=$(echo "$dnsstr" | awk -F ':' '{print $1}')
  152. local dnsport=$(echo "$dnsstr" | awk -F ':' '{print $2}')
  153. start_pdnsd() {
  154. local usr_dns="$1"
  155. local usr_port="$2"
  156. if [ ! -f "$TMP_PATH/pdnsd/pdnsd.cache" ]; then
  157. mkdir -p $TMP_PATH/pdnsd
  158. touch $TMP_PATH/pdnsd/pdnsd.cache
  159. chown -R nobody:nogroup $TMP_PATH/pdnsd
  160. fi
  161. cat <<-EOF >$TMP_PATH/pdnsd.conf
  162. global{
  163. perm_cache=1024;
  164. cache_dir="$TMP_PATH/pdnsd";
  165. pid_file="/var/run/pdnsd.pid";
  166. run_as="nobody";
  167. server_ip=127.0.0.1;
  168. server_port=5335;
  169. status_ctl=on;
  170. query_method=tcp_only;
  171. min_ttl=1h;
  172. max_ttl=1w;
  173. timeout=10;
  174. neg_domain_pol=on;
  175. proc_limit=2;
  176. procq_limit=8;
  177. par_queries=1;
  178. }
  179. server{
  180. label="ssr-usrdns";
  181. ip=$usr_dns;
  182. port=$usr_port;
  183. timeout=6;
  184. uptest=none;
  185. interval=10m;
  186. purge_cache=off;
  187. reject=::/0;
  188. }
  189. EOF
  190. ln_start_bin $(first_type pdnsd) pdnsd -c $TMP_PATH/pdnsd.conf
  191. }
  192. if [ "$ssrplus_dns" != "0" ]; then
  193. case "$(uci_get_by_type global run_mode)" in
  194. gfw) ipset add gfwlist $dnsserver 2>/dev/null ;;
  195. oversea) ipset add oversea $dnsserver 2>/dev/null ;;
  196. *) ipset add ss_spec_wan_ac $dnsserver nomatch 2>/dev/null ;;
  197. esac
  198. case "$ssrplus_dns" in
  199. 1)
  200. start_pdnsd $dnsserver $dnsport
  201. pdnsd_enable_flag=1
  202. ;;
  203. 2)
  204. ln_start_bin $(first_type microsocks) microsocks -i 127.0.0.1 -p $tmp_dns_port ssrplus-dns
  205. ln_start_bin $(first_type dns2socks) dns2socks 127.0.0.1:$tmp_dns_port $dnsserver:$dnsport 127.0.0.1:5335 -q
  206. pdnsd_enable_flag=2
  207. ;;
  208. esac
  209. fi
  210. }
  211. gen_service_file() {
  212. if [ $(uci_get_by_name $1 fast_open) == "1" ]; then
  213. fastopen="true"
  214. else
  215. fastopen="false"
  216. fi
  217. cat <<-EOF >$2
  218. {
  219. "server": "0.0.0.0",
  220. "server_ipv6": "::",
  221. "server_port": $(uci_get_by_name $1 server_port),
  222. "password": "$(uci_get_by_name $1 password)",
  223. "timeout": $(uci_get_by_name $1 timeout 60),
  224. "method": "$(uci_get_by_name $1 encrypt_method)",
  225. "protocol": "$(uci_get_by_name $1 protocol)",
  226. "protocol_param": "$(uci_get_by_name $1 protocol_param)",
  227. "obfs": "$(uci_get_by_name $1 obfs)",
  228. "obfs_param": "$(uci_get_by_name $1 obfs_param)",
  229. "fast_open": $fastopen
  230. }
  231. EOF
  232. }
  233. get_name() {
  234. case "$1" in
  235. ss) echo "Shadowsocks" ;;
  236. ssr) echo "ShadowsocksR" ;;
  237. esac
  238. }
  239. gen_config_file() { #server1 type2 code3 local_port4 socks_port5 threads5
  240. case "$3" in
  241. 1)
  242. config_file=$tcp_config_file
  243. ;;
  244. 2)
  245. config_file=$udp_config_file
  246. ;;
  247. 3)
  248. if [ -n "$tmp_local_port" ]; then
  249. local tmp_port=$tmp_local_port
  250. else
  251. local tmp_port=$tmp_shunt_local_port
  252. fi
  253. config_file=$shunt_config_file
  254. ;;
  255. 4)
  256. config_file=$local_config_file
  257. ;;
  258. esac
  259. case "$2" in
  260. ss | ssr)
  261. lua /usr/share/shadowsocksr/gen_config.lua $1 $mode $4 >$config_file
  262. if [ "$3" == "3" ]; then
  263. lua /usr/share/shadowsocksr/gen_config.lua $1 $mode $tmp_port >$shunt_dns_config_file
  264. fi
  265. ;;
  266. v2ray)
  267. lua /usr/share/shadowsocksr/gen_config.lua $1 $mode $4 $5 >$config_file
  268. ;;
  269. trojan)
  270. case "$3" in
  271. 1)
  272. lua /usr/share/shadowsocksr/gen_config.lua $1 nat $4 >$config_file
  273. ;;
  274. 2)
  275. lua /usr/share/shadowsocksr/gen_config.lua $1 client $4 >$config_file
  276. ;;
  277. 3)
  278. lua /usr/share/shadowsocksr/gen_config.lua $1 nat $4 >$config_file
  279. lua /usr/share/shadowsocksr/gen_config.lua $1 client $tmp_port >$shunt_dns_config_file
  280. ;;
  281. 4)
  282. lua /usr/share/shadowsocksr/gen_config.lua $1 client $4 >$config_file
  283. ;;
  284. esac
  285. ;;
  286. trojan-go)
  287. case "$3" in
  288. 1 | 2)
  289. lua /usr/share/shadowsocksr/gen_config.lua $1 nat $4 >$config_file
  290. ;;
  291. 3)
  292. lua /usr/share/shadowsocksr/gen_config.lua $1 nat $4 >$config_file
  293. lua /usr/share/shadowsocksr/gen_config.lua $1 client $tmp_port >$shunt_dns_config_file
  294. ;;
  295. 4)
  296. lua /usr/share/shadowsocksr/gen_config.lua $1 client $4 >$config_file
  297. ;;
  298. esac
  299. ;;
  300. naiveproxy)
  301. case "$3" in
  302. 1)
  303. lua /usr/share/shadowsocksr/gen_config.lua $1 redir $4 $5 >$config_file
  304. ;;
  305. 3)
  306. lua /usr/share/shadowsocksr/gen_config.lua $1 redir $4 $5 >$config_file
  307. lua /usr/share/shadowsocksr/gen_config.lua $1 socks $tmp_port >$shunt_dns_config_file
  308. ;;
  309. 4)
  310. lua /usr/share/shadowsocksr/gen_config.lua $1 socks $4 >$config_file
  311. ;;
  312. esac
  313. ;;
  314. socks5)
  315. /usr/share/shadowsocksr/genred2config.sh $config_file $2 $mode $4 \
  316. "$(uci_get_by_name $1 server)" \
  317. "$(uci_get_by_name $1 server_port)" \
  318. "$(uci_get_by_name $1 auth_enable 0)" \
  319. "$(uci_get_by_name $1 username)" \
  320. "$(uci_get_by_name $1 password)"
  321. ;;
  322. tun)
  323. /usr/share/shadowsocksr/genred2config.sh $config_file $2 $(uci_get_by_name $1 iface "br-lan") $4
  324. ;;
  325. esac
  326. sed -i 's/\\//g' $TMP_PATH/*-ssr-*.json
  327. }
  328. start_udp() {
  329. local type=$(uci_get_by_name $UDP_RELAY_SERVER type)
  330. redir_udp=1
  331. case "$type" in
  332. ss | ssr)
  333. gen_config_file $UDP_RELAY_SERVER $type 2 $tmp_udp_port
  334. ln_start_bin $(first_type ${type}-redir) ${type}-redir -c $udp_config_file -U
  335. echolog "UDP TPROXY Relay:$(get_name $type) Started!"
  336. ;;
  337. v2ray)
  338. gen_config_file $UDP_RELAY_SERVER $type 2 $tmp_udp_port
  339. ln_start_bin $(first_type xray v2ray) v2ray -config $udp_config_file
  340. echolog "UDP TPROXY Relay:$($(first_type "xray" "v2ray") -version | head -1) Started!"
  341. ;;
  342. trojan) #client
  343. gen_config_file $UDP_RELAY_SERVER $type 2 $tmp_udp_local_port
  344. ln_start_bin $(first_type trojan-go trojan) $type --config $udp_config_file
  345. ln_start_bin $(first_type ipt2socks) ipt2socks -U -b 0.0.0.0 -4 -s 127.0.0.1 -p $tmp_udp_local_port -l $tmp_udp_port
  346. echolog "UDP TPROXY Relay:$($(first_type trojan-go trojan) --version 2>&1 | head -1) Started!"
  347. ;;
  348. trojan-go)
  349. gen_config_file $UDP_RELAY_SERVER $type 2 $udp_config_file
  350. ln_start_bin $(first_type trojan-go) $type --config $udp_config_file
  351. echolog "UDP TPROXY Relay:$($(first_type trojan-go) --version 2>&1 | head -1) Started!"
  352. ;;
  353. naiveproxy)
  354. echolog "NaïveProxy UDP TPROXY Relay not supported!"
  355. redir_udp=0
  356. ARG_UDP=""
  357. ;;
  358. socks5)
  359. if [ "$(uci_get_by_name $UDP_RELAY_SERVER auth_enable 0)" == "1" ]; then
  360. local auth="-a $(uci_get_by_name $UDP_RELAY_SERVER username) -k $(uci_get_by_name $UDP_RELAY_SERVER password)"
  361. fi
  362. ln_start_bin $(first_type ipt2socks) ipt2socks $udp_config_file -U -4 -s $(uci_get_by_name $UDP_RELAY_SERVER server) -p $(uci_get_by_name $UDP_RELAY_SERVER server_port) -l $tmp_udp_port $auth
  363. #gen_config_file $UDP_RELAY_SERVER $type 2 $tmp_udp_port
  364. #ln_start_bin $(first_type redsocks2) redsocks2 -c $udp_config_file
  365. echolog "UDP TPROXY Relay:Socks5 REDIRECT/TPROXY Started!"
  366. ;;
  367. tun)
  368. echolog "Network Tunnel UDP TPROXY Relay not supported!"
  369. redir_udp=0
  370. ARG_UDP=""
  371. ;;
  372. esac
  373. }
  374. start_shunt() {
  375. local type=$(uci_get_by_name $SHUNT_SERVER type)
  376. case "$type" in
  377. ss | ssr)
  378. gen_config_file $SHUNT_SERVER $type 3 $tmp_shunt_port
  379. ln_start_bin $(first_type ${type}-redir) ${type}-redir -c $shunt_config_file
  380. if [ -n "$tmp_local_port" ]; then
  381. local tmp_port=$tmp_local_port
  382. else
  383. local tmp_port=$tmp_shunt_local_port
  384. ln_start_bin $(first_type ${type}-local) ${type}-local -c $shunt_dns_config_file
  385. fi
  386. ln_start_bin $(first_type dns2socks) dns2socks 127.0.0.1:$tmp_port 8.8.8.8:53 127.0.0.1:$tmp_shunt_dns_port -q
  387. echolog "shunt:$(get_name $type) Started!"
  388. ;;
  389. v2ray)
  390. if [ -n "$tmp_local_port" ]; then
  391. local tmp_port=$tmp_local_port
  392. else
  393. local tmp_port=$tmp_shunt_local_port
  394. gen_config_file $SHUNT_SERVER $type 3 $tmp_shunt_port $tmp_port
  395. ln_start_bin $(first_type xray v2ray) v2ray -config $shunt_config_file
  396. fi
  397. ln_start_bin $(first_type dns2socks) dns2socks 127.0.0.1:$tmp_port 8.8.8.8:53 127.0.0.1:$tmp_shunt_dns_port -q
  398. echolog "shunt:$($(first_type xray v2ray) -version | head -1) Started!"
  399. ;;
  400. trojan | trojan-go)
  401. gen_config_file $SHUNT_SERVER $type 3 $tmp_shunt_port
  402. ln_start_bin $(first_type trojan-go trojan) $type --config $shunt_config_file
  403. if [ -n "$tmp_local_port" ]; then
  404. local tmp_port=$tmp_local_port
  405. else
  406. local tmp_port=$tmp_shunt_local_port
  407. ln_start_bin $(first_type trojan-go trojan) $type --config $shunt_dns_config_file
  408. fi
  409. ln_start_bin $(first_type dns2socks) dns2socks 127.0.0.1:$tmp_port 8.8.8.8:53 127.0.0.1:$tmp_shunt_dns_port -q
  410. echolog "shunt:$($(first_type trojan-go trojan) --version 2>&1 | head -1) Started!"
  411. ;;
  412. naiveproxy)
  413. gen_config_file $SHUNT_SERVER $type 3 $tmp_shunt_port
  414. ln_start_bin $(first_type naive) naive --config $shunt_config_file
  415. if [ -n "$tmp_local_port" ]; then
  416. local tmp_port=$tmp_local_port
  417. else
  418. local tmp_port=$tmp_shunt_local_port
  419. ln_start_bin $(first_type naive) naive --config $shunt_dns_config_file
  420. fi
  421. ln_start_bin $(first_type dns2socks) dns2socks 127.0.0.1:$tmp_port 8.8.8.8:53 127.0.0.1:$tmp_shunt_dns_port -q
  422. echolog "shunt:$($(first_type "naive") --version 2>&1 | head -1) Started!"
  423. redir_udp=0
  424. ;;
  425. socks5)
  426. if [ "$(uci_get_by_name $SHUNT_SERVER auth_enable 0)" == "1" ]; then
  427. local auth="-a $(uci_get_by_name $SHUNT_SERVER username) -k $(uci_get_by_name $SHUNT_SERVER password)"
  428. fi
  429. ln_start_bin $(first_type ipt2socks) ipt2socks $shunt_config_file -R -4 -s $(uci_get_by_name $SHUNT_SERVER server) -p $(uci_get_by_name $SHUNT_SERVER server_port) -l $tmp_shunt_port $auth
  430. #gen_config_file $SHUNT_SERVER $type 3 $tmp_shunt_port
  431. #ln_start_bin $(first_type redsocks2) redsocks2 -c $shunt_config_file
  432. if [ -n "$tmp_local_port" ]; then
  433. local tmp_port=$tmp_local_port
  434. else
  435. local tmp_port=$tmp_shunt_local_port
  436. ln_start_bin $(first_type microsocks) microsocks -i 127.0.0.1 -p $tmp_port shunt-dns-ssr-plus
  437. fi
  438. ln_start_bin $(first_type dns2socks) dns2socks 127.0.0.1:$tmp_port 8.8.8.8:53 127.0.0.1:$tmp_shunt_dns_port -q
  439. echolog "shunt:$type REDIRECT/TPROXY Started!"
  440. ;;
  441. *)
  442. gen_config_file $SHUNT_SERVER $type 3 $tmp_shunt_port
  443. ln_start_bin $(first_type redsocks2) redsocks2 -c $shunt_config_file
  444. if [ -n "$tmp_local_port" ]; then
  445. local tmp_port=$tmp_local_port
  446. else
  447. local tmp_port=$tmp_shunt_local_port
  448. ln_start_bin $(first_type microsocks) microsocks -i 127.0.0.1 -p $tmp_port shunt-dns-ssr-plus
  449. fi
  450. ln_start_bin $(first_type dns2socks) dns2socks 127.0.0.1:$tmp_port 8.8.8.8:53 127.0.0.1:$tmp_shunt_dns_port -q
  451. echolog "shunt:$type REDIRECT/TPROXY Started!"
  452. ;;
  453. esac
  454. return 0
  455. }
  456. start_local() {
  457. local local_port=$(uci_get_by_type socks5_proxy local_port)
  458. [ "$LOCAL_SERVER" == "$SHUNT_SERVER" ] && tmp_local_port=$local_port
  459. local type=$(uci_get_by_name $LOCAL_SERVER type)
  460. case "$type" in
  461. ss | ssr)
  462. gen_config_file $LOCAL_SERVER $type 4 $local_port
  463. ln_start_bin $(first_type ${type}-local) ${type}-local -c $local_config_file -u
  464. echolog "Global_Socks5:$(get_name $type) Started!"
  465. ;;
  466. v2ray)
  467. if [ "$_local" == "2" ]; then
  468. gen_config_file $LOCAL_SERVER $type 4 0 $local_port
  469. ln_start_bin $(first_type xray v2ray) v2ray -config $local_config_file
  470. echolog "Global_Socks5:$($(first_type "xray" "v2ray") -version | head -1) Started!"
  471. fi
  472. ;;
  473. trojan | trojan-go) #client
  474. gen_config_file $LOCAL_SERVER $type 4 $local_port
  475. ln_start_bin $(first_type trojan-go trojan) $type --config $local_config_file
  476. echolog "Global_Socks5:$($(first_type trojan-go trojan) --version 2>&1 | head -1) Started!"
  477. ;;
  478. naiveproxy)
  479. gen_config_file $LOCAL_SERVER $type 4 $local_port
  480. ln_start_bin $(first_type naive) naive --config $local_config_file
  481. echolog "Global_Socks5:$($(first_type $type) --version | head -1) Started!"
  482. ;;
  483. *)
  484. [ -e /proc/sys/net/ipv6 ] && local listenip='-i ::'
  485. ln_start_bin $(first_type microsocks) microsocks $listenip -p $local_port tcp-udp-ssr-local
  486. echolog "Global_Socks5:$type Started!"
  487. ;;
  488. esac
  489. local_enable=1
  490. return 0
  491. }
  492. Start_Run() {
  493. if [ "$(uci_get_by_type global threads 0)" == "0" ]; then
  494. local threads=$(cat /proc/cpuinfo | grep 'processor' | wc -l)
  495. else
  496. local threads=$(uci_get_by_type global threads)
  497. fi
  498. if [ "$(uci_get_by_name $GLOBAL_SERVER kcp_enable 0)" == "1" ]; then
  499. [ ! -f "/usr/bin/kcptun-client" ] && return 1
  500. local kcp_str=$(/usr/bin/kcptun-client -v | grep kcptun | wc -l)
  501. [ "0" == "$kcp_str" ] && return 1
  502. local kcp_server=$(uci_get_by_name $GLOBAL_SERVER server)
  503. local kcp_port=$(uci_get_by_name $GLOBAL_SERVER kcp_port)
  504. local server_port=$(uci_get_by_name $GLOBAL_SERVER server_port)
  505. local password=$(uci_get_by_name $GLOBAL_SERVER kcp_password)
  506. local kcp_param=$(uci_get_by_name $GLOBAL_SERVER kcp_param)
  507. [ "$password" != "" ] && password="--key "$password
  508. service_start /usr/bin/kcptun-client -r $kcp_server:$kcp_port -l :$server_port $password $kcp_param
  509. kcp_enable_flag=1
  510. ARG_UDP=""
  511. fi
  512. if [ "$_local" == "1" ]; then
  513. local socks_port=$(uci_get_by_type socks5_proxy local_port)
  514. tcp_config_file=$TMP_PATH/local-ssr-retcp.json
  515. [ "$mode" == "tcp,udp" ] && tcp_config_file=$TMP_PATH/local-udp-ssr-retcp.json
  516. fi
  517. local tcp_port=$(uci_get_by_name $GLOBAL_SERVER local_port)
  518. local type=$(uci_get_by_name $GLOBAL_SERVER type)
  519. case "$type" in
  520. ss | ssr)
  521. gen_config_file $GLOBAL_SERVER $type 1 $tcp_port
  522. for i in $(seq 1 $threads); do
  523. ln_start_bin "$(first_type ${type}-redir)" ${type}-redir -c $tcp_config_file $ARG_OTA
  524. done
  525. echolog "Main node:$(get_name $type) $threads Threads Started!"
  526. ;;
  527. v2ray)
  528. gen_config_file $GLOBAL_SERVER $type 1 $tcp_port $socks_port
  529. ln_start_bin $(first_type xray v2ray) v2ray -config $tcp_config_file
  530. echolog "Main node:$($(first_type xray v2ray) -version | head -1) Started!"
  531. ;;
  532. trojan | trojan-go)
  533. gen_config_file $GLOBAL_SERVER $type 1 $tcp_port
  534. ln_start_bin $(first_type trojan-go trojan) $type --config $tcp_config_file
  535. echolog "Main node:$($(first_type trojan-go trojan) --version 2>&1 | head -1) Started!"
  536. ;;
  537. naiveproxy)
  538. gen_config_file $GLOBAL_SERVER $type 1 $tcp_port
  539. ln_start_bin $(first_type naive) naive $tcp_config_file
  540. echolog "Main node:$($(first_type naive) --version 2>&1 | head -1) , $threads Threads Started!"
  541. ;;
  542. socks5)
  543. if [ "$(uci_get_by_name $GLOBAL_SERVER auth_enable 0)" == "1" ]; then
  544. local auth="-a $(uci_get_by_name $GLOBAL_SERVER username) -k $(uci_get_by_name $GLOBAL_SERVER password)"
  545. fi
  546. ln_start_bin $(first_type ipt2socks) ipt2socks $tcp_config_file -R -4 -j $threads -s $(uci_get_by_name $GLOBAL_SERVER server) -p $(uci_get_by_name $GLOBAL_SERVER server_port) -l $tcp_port $auth
  547. #gen_config_file $GLOBAL_SERVER $type 1 $tcp_port
  548. #for i in $(seq 1 $threads); do
  549. # ln_start_bin $(first_type redsocks2) redsocks2 -c $tcp_config_file
  550. #done
  551. echolog "Main node:Socks5 REDIRECT/TPROXY $threads Threads Started!"
  552. ;;
  553. tun)
  554. gen_config_file $GLOBAL_SERVER $type 1 $tcp_port
  555. for i in $(seq 1 $threads); do
  556. ln_start_bin $(first_type redsocks2) redsocks2 -c $tcp_config_file
  557. done
  558. echolog "Main node:Network Tunnel REDIRECT $threads Threads Started!"
  559. ;;
  560. esac
  561. redir_tcp=1
  562. return 0
  563. }
  564. load_config() {
  565. if [ -z "$switch_server" ]; then
  566. GLOBAL_SERVER=$(uci_get_by_type global global_server nil)
  567. else
  568. GLOBAL_SERVER=$switch_server
  569. fi
  570. if [ "$GLOBAL_SERVER" == "nil" ]; then
  571. return 1
  572. fi
  573. UDP_RELAY_SERVER=$(uci_get_by_type global udp_relay_server nil)
  574. SHUNT_SERVER=$(uci_get_by_type global netflix_server nil)
  575. LOCAL_SERVER=$(uci_get_by_type socks5_proxy server nil)
  576. tcp_config_file=$TMP_PATH/tcp-only-ssr-retcp.json
  577. case "$UDP_RELAY_SERVER" in
  578. nil)
  579. mode="tcp"
  580. ;;
  581. $GLOBAL_SERVER | same)
  582. mode="tcp,udp"
  583. tcp_config_file=$TMP_PATH/tcp-udp-ssr-retcp.json
  584. ARG_UDP="-u"
  585. ARG_OTA="-u"
  586. UDP_RELAY_SERVER=$GLOBAL_SERVER
  587. ;;
  588. *)
  589. mode="udp"
  590. udp_config_file=$TMP_PATH/udp-only-ssr-reudp.json
  591. ARG_UDP="-U"
  592. ARG_OTA="-U"
  593. start_udp
  594. ARG_OTA=""
  595. mode="tcp"
  596. ;;
  597. esac
  598. case "$LOCAL_SERVER" in
  599. nil)
  600. _local="0"
  601. ;;
  602. $GLOBAL_SERVER | same)
  603. _local="1"
  604. LOCAL_SERVER=$GLOBAL_SERVER
  605. local_config_file=$TMP_PATH/tcp-udp-ssr-local.json
  606. start_local
  607. local_enable=0
  608. ;;
  609. *)
  610. _local="2"
  611. local_config_file=$TMP_PATH/tcp-udp-ssr-local.json
  612. start_local
  613. ;;
  614. esac
  615. case "$SHUNT_SERVER" in
  616. nil)
  617. shunt="0"
  618. ;;
  619. $GLOBAL_SERVER | same)
  620. shunt="1"
  621. SHUNT_SERVER=$GLOBAL_SERVER
  622. ;;
  623. *)
  624. shunt="$tmp_shunt_port"
  625. shunt_config_file=$TMP_PATH/shunt-ssr-retcp.json
  626. shunt_dns_config_file=$TMP_PATH/shunt-dns-ssr-plus.json
  627. start_shunt
  628. ;;
  629. esac
  630. return 0
  631. }
  632. check_server() {
  633. ENABLE_SERVER=$(uci_get_by_type global global_server nil)
  634. if [ "$ENABLE_SERVER" == "nil" ]; then
  635. return 1
  636. else
  637. local STYPE=$(uci_get_by_name $ENABLE_SERVER type nil)
  638. if [ "$STYPE" == "nil" ]; then
  639. local CFGID=$(uci_get_by_cfgid servers type nil)
  640. if [ "$CFGID" == "nil" ]; then
  641. uci_set_by_type global global_server 'nil'
  642. else
  643. uci_set_by_type global global_server $CFGID
  644. fi
  645. /etc/init.d/shadowsocksr restart
  646. fi
  647. fi
  648. }
  649. start_server() {
  650. [ "$(uci_get_by_type server_global enable_server 0)" == "0" ] && return 0
  651. server_service() {
  652. [ "$(uci_get_by_name $1 enable 0)" == "0" ] && return 1
  653. let server_count=server_count+1
  654. if [ "$server_count" == "1" ]; then
  655. if ! (iptables-save -t filter | grep SSR-SERVER-RULE >/dev/null); then
  656. iptables -N SSR-SERVER-RULE && iptables -t filter -I INPUT -j SSR-SERVER-RULE
  657. fi
  658. fi
  659. if [ "$(uci_get_by_name $1 type ssr)" == "ssr" ]; then
  660. gen_service_file $1 $server_config_file/ssr-server$server_count.json
  661. ln_start_bin $(first_type ssr-server) ssr-server -c $server_config_file/ssr-server$server_count.json -u
  662. echolog "Server:ShadowsocksR Server$server_count Started!"
  663. else
  664. [ -e /proc/sys/net/ipv6 ] && local listenip='-i ::'
  665. ln_start_bin $(first_type microsocks) microsocks $listenip -p $(uci_get_by_name $1 server_port) -1 -u $(uci_get_by_name $1 username) -P $(uci_get_by_name $1 password) ssr-server$server_count
  666. echolog "Server:Socks5 Server$server_count Started!"
  667. fi
  668. iptables -t filter -A SSR-SERVER-RULE -p tcp --dport $(uci_get_by_name $1 server_port) -j ACCEPT
  669. iptables -t filter -A SSR-SERVER-RULE -p udp --dport $(uci_get_by_name $1 server_port) -j ACCEPT
  670. return 0
  671. }
  672. gen_serv_include() {
  673. local FWI=$(uci get firewall.shadowsocksr.path 2>/dev/null)
  674. [ -n "$FWI" ] || return 0
  675. if [ ! -f $FWI ]; then
  676. echo '#!/bin/sh' >$FWI
  677. fi
  678. extract_rules() {
  679. echo "*filter"
  680. iptables-save -t filter | grep SSR-SERVER-RULE | sed -e "s/^-A INPUT/-I INPUT/"
  681. echo 'COMMIT'
  682. }
  683. cat <<-EOF >>$FWI
  684. iptables-save -c | grep -v "SSR-SERVER" | iptables-restore -c
  685. iptables-restore -n <<-EOT
  686. $(extract_rules)
  687. EOT
  688. EOF
  689. }
  690. config_load $NAME
  691. config_foreach server_service server_config
  692. gen_serv_include
  693. return 0
  694. }
  695. start_switch() {
  696. if [ "$(uci_get_by_type global enable_switch 0)" == "1" ]; then
  697. if [ -z "$switch_server" ]; then
  698. local switch_time=$(uci_get_by_type global switch_time)s
  699. local switch_timeout=$(uci_get_by_type global switch_timeout)
  700. service_start /usr/bin/ssr-switch start $switch_time $switch_timeout
  701. fi
  702. fi
  703. }
  704. start_monitor() {
  705. if [ $(uci_get_by_type global monitor_enable 1) == "1" ]; then
  706. let total_count=server_count+redir_tcp+redir_udp+kcp_enable_flag+local_enable+pdnsd_enable_flag
  707. if [ $total_count -gt 0 ]; then
  708. service_start /usr/bin/ssr-monitor $server_count $redir_tcp $redir_udp $kcp_enable_flag $local_enable $pdnsd_enable_flag
  709. fi
  710. fi
  711. }
  712. start_rules() {
  713. local server=$(get_host_ip $GLOBAL_SERVER)
  714. local local_port=$(uci_get_by_name $GLOBAL_SERVER local_port)
  715. local lan_ac_ips=$(uci_get_by_type access_control lan_ac_ips)
  716. local lan_ac_mode=$(uci_get_by_type access_control lan_ac_mode)
  717. if [ "$kcp_enable_flag" == "0" -a "$redir_udp" == "1" ]; then
  718. local udp_server=$(get_host_ip $UDP_RELAY_SERVER)
  719. local udp_local_port=$tmp_udp_port
  720. fi
  721. if [ "$shunt" != "0" ]; then
  722. local shunt_ip=$(get_host_ip $SHUNT_SERVER)
  723. fi
  724. if [ -n "$lan_ac_ips" ]; then
  725. case "$lan_ac_mode" in
  726. w | W | b | B) local ac_ips="$lan_ac_mode$lan_ac_ips" ;;
  727. esac
  728. fi
  729. gfwmode() {
  730. case "$(uci_get_by_type global run_mode)" in
  731. gfw) echo "-g" ;;
  732. router) echo "-r" ;;
  733. oversea) echo "-c" ;;
  734. all) echo "-z" ;;
  735. esac
  736. }
  737. if [ "$(uci_get_by_type global dports 1)" == "2" ]; then
  738. local proxyport="-m multiport --dports 22,53,587,465,995,993,143,80,443,853,9418"
  739. fi
  740. get_arg_out() {
  741. case "$(uci_get_by_type access_control router_proxy 1)" in
  742. 1) echo "-o" ;;
  743. 2) echo "-O" ;;
  744. esac
  745. }
  746. /usr/share/shadowsocksr/gfw2ipset.sh
  747. /usr/bin/ssr-rules \
  748. -s "$server" \
  749. -l "$local_port" \
  750. -S "$udp_server" \
  751. -L "$udp_local_port" \
  752. -a "$ac_ips" \
  753. -i "/etc/ssrplus/china_ssr.txt" \
  754. -b "$(uci_get_by_type access_control wan_bp_ips)" \
  755. -w "$(uci_get_by_type access_control wan_fw_ips)" \
  756. -B "$(uci_get_by_type access_control lan_bp_ips)" \
  757. -p "$(uci_get_by_type access_control lan_fp_ips)" \
  758. -G "$(uci_get_by_type access_control lan_gm_ips)" \
  759. -m "$(uci_get_by_type access_control Interface)" \
  760. -D "$proxyport" \
  761. -F "$shunt" \
  762. -N "$shunt_ip" \
  763. -M "$(uci_get_by_type global netflix_proxy 0)" \
  764. -I "/etc/ssrplus/netflixip.list" \
  765. $(get_arg_out) $(gfwmode) $ARG_UDP
  766. return $?
  767. }
  768. start() {
  769. set_lock
  770. echolog "----------start------------"
  771. mkdir -p /var/run /var/lock /var/log /var/dnsmasq.d $TMP_BIN_PATH $TMP_DNSMASQ_PATH
  772. echo "conf-dir=${TMP_DNSMASQ_PATH}" >"/var/dnsmasq.d/dnsmasq-ssrplus.conf"
  773. if load_config; then
  774. Start_Run
  775. start_rules
  776. start_dns
  777. add_cron
  778. start_switch
  779. else
  780. echolog "未启动主节点,禁止连接的域名正在加载。"
  781. cat /etc/ssrplus/deny.list | sed '/^$/d' | sed '/#/d' | sed "/.*/s/.*/address=\/&\//" >$TMP_DNSMASQ_PATH/denylist.conf
  782. echolog "禁止连接的域名加载完毕。"
  783. if [ "$(uci_get_by_type global adblock 0)" == "1" ]; then
  784. echolog "未启动主节点,广告过滤正在加载。"
  785. cp -f /etc/ssrplus/ad.conf $TMP_DNSMASQ_PATH/
  786. if [ -f "$TMP_DNSMASQ_PATH/ad.conf" ]; then
  787. for line in $(cat /etc/ssrplus/black.list); do sed -i "/$line/d" $TMP_DNSMASQ_PATH/ad.conf; done
  788. for line in $(cat /etc/ssrplus/white.list); do sed -i "/$line/d" $TMP_DNSMASQ_PATH/ad.conf; done
  789. for line in $(cat /etc/ssrplus/deny.list); do sed -i "/$line/d" $TMP_DNSMASQ_PATH/ad.conf; done
  790. fi
  791. echolog "广告过滤加载完毕。"
  792. fi
  793. fi
  794. /etc/init.d/dnsmasq restart >/dev/null 2>&1
  795. check_server
  796. start_server
  797. start_monitor
  798. clean_log
  799. echolog "-----------end------------"
  800. unset_lock
  801. }
  802. boot() {
  803. echolog "boot!"
  804. mkdir -p /var/run /var/lock /var/log /var/dnsmasq.d $TMP_BIN_PATH $TMP_DNSMASQ_PATH
  805. ulimit -n 65535
  806. start
  807. }
  808. stop() {
  809. unlock
  810. set_lock
  811. /usr/bin/ssr-rules -f
  812. local srulecount=$(iptables -L | grep SSR-SERVER-RULE | wc -l)
  813. if [ $srulecount -gt 0 ]; then
  814. iptables -F SSR-SERVER-RULE
  815. iptables -t filter -D INPUT -j SSR-SERVER-RULE
  816. iptables -X SSR-SERVER-RULE 2>/dev/null
  817. fi
  818. if [ -z "$switch_server" ]; then
  819. ps -w | grep -v "grep" | grep ssr-switch | awk '{print $1}' | xargs kill -9 >/dev/null 2>&1 &
  820. rm -f /var/lock/ssr-switch.lock
  821. killall -q -9 kcptun-client
  822. fi
  823. ps -w | grep -v "grep" | grep ssr-monitor | awk '{print $1}' | xargs kill -9 >/dev/null 2>&1 &
  824. ps -w | grep -v "grep" | grep "sleep 0000" | awk '{print $1}' | xargs kill -9 >/dev/null 2>&1 &
  825. ps -w | grep -v "grep" | grep "$TMP_PATH" | awk '{print $1}' | xargs kill -9 >/dev/null 2>&1 &
  826. killall -q -9 v2ray-plugin obfs-local
  827. rm -f /var/lock/ssr-monitor.lock
  828. if [ -f "/var/dnsmasq.d/dnsmasq-ssrplus.conf" ]; then
  829. rm -rf /var/dnsmasq.d/dnsmasq-ssrplus.conf $TMP_DNSMASQ_PATH $TMP_PATH/*-ssr-*.json
  830. /etc/init.d/dnsmasq restart >/dev/null 2>&1
  831. fi
  832. del_cron
  833. unset_lock
  834. }
  835. reset() {
  836. stop
  837. set_lock
  838. rm -rf /etc/config/shadowsocksr $LOG_FILE
  839. touch /etc/config/shadowsocksr $LOG_FILE
  840. uci -q batch <<-EOF >/dev/null
  841. add shadowsocksr global
  842. set shadowsocksr.@global[0].global_server='nil'
  843. set shadowsocksr.@global[0].netflix_server='nil'
  844. set shadowsocksr.@global[0].netflix_proxy='0'
  845. set shadowsocksr.@global[0].threads='0'
  846. set shadowsocksr.@global[0].run_mode='router'
  847. set shadowsocksr.@global[0].dports='2'
  848. set shadowsocksr.@global[0].pdnsd_enable='1'
  849. set shadowsocksr.@global[0].tunnel_forward='8.8.4.4:53'
  850. set shadowsocksr.@global[0].monitor_enable='1'
  851. set shadowsocksr.@global[0].enable_switch='1'
  852. set shadowsocksr.@global[0].switch_time='667'
  853. set shadowsocksr.@global[0].switch_timeout='5'
  854. set shadowsocksr.@global[0].switch_try_count='3'
  855. set shadowsocksr.@global[0].gfwlist_url='https://cdn.jsdelivr.net/gh/YW5vbnltb3Vz/domain-list-community@release/gfwlist.txt'
  856. set shadowsocksr.@global[0].chnroute_url='https://ispip.clang.cn/all_cn.txt'
  857. set shadowsocksr.@global[0].nfip_url='https://cdn.jsdelivr.net/gh/QiuSimons/Netflix_IP/NF_only.txt'
  858. set shadowsocksr.@global[0].adblock_url='https://anti-ad.net/anti-ad-for-dnsmasq.conf'
  859. add shadowsocksr server_subscribe
  860. set shadowsocksr.@server_subscribe[0].proxy='0'
  861. set shadowsocksr.@server_subscribe[0].auto_update_time='2'
  862. set shadowsocksr.@server_subscribe[0].auto_update='1'
  863. set shadowsocksr.@server_subscribe[0].filter_words='过期时间/剩余流量/QQ群/官网/防失联地址/回国'
  864. add shadowsocksr access_control
  865. set shadowsocksr.@access_control[0].lan_ac_mode='0'
  866. set shadowsocksr.@access_control[0].router_proxy='1'
  867. add_list shadowsocksr.@access_control[0].wan_fw_ips=149.154.160.0/20
  868. add_list shadowsocksr.@access_control[0].wan_fw_ips=67.198.55.0/24
  869. add_list shadowsocksr.@access_control[0].wan_fw_ips=91.108.4.0/22
  870. add_list shadowsocksr.@access_control[0].wan_fw_ips=91.108.56.0/22
  871. add_list shadowsocksr.@access_control[0].wan_fw_ips=109.239.140.0/24
  872. add_list shadowsocksr.@access_control[0].Interface='lan'
  873. add shadowsocksr socks5_proxy
  874. set shadowsocksr.@socks5_proxy[0].server='nil'
  875. set shadowsocksr.@socks5_proxy[0].local_port='1080'
  876. add shadowsocksr server_global
  877. set shadowsocksr.@server_global[0].enable_server='0'
  878. commit shadowsocksr
  879. EOF
  880. unset_lock
  881. }