Highly-opinionated (ex-bullshit-free) MTPROTO proxy for Telegram. If you use v1.0 or upgrade broke you proxy, please read the chapter Version 2
Вы не можете выбрать более 25 тем Темы должны начинаться с буквы или цифры, могут содержать дефисы(-) и должны содержать не более 35 символов.

client_protocol.go 2.7KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586878889909192939495
  1. package newobfuscated2
  2. import (
  3. "bytes"
  4. "crypto/aes"
  5. "crypto/cipher"
  6. "crypto/sha256"
  7. "encoding/binary"
  8. "io"
  9. "time"
  10. "github.com/juju/errors"
  11. "github.com/9seconds/mtg/newantireplay"
  12. "github.com/9seconds/mtg/newconfig"
  13. "github.com/9seconds/mtg/newprotocol"
  14. "github.com/9seconds/mtg/newwrappers"
  15. )
  16. const clientProtocolHandshakeTimeout = 10 * time.Second
  17. type ClientProtocol struct {
  18. newprotocol.BaseProtocol
  19. }
  20. func (c *ClientProtocol) Handshake(socket newwrappers.StreamReadWriteCloser) (newwrappers.StreamReadWriteCloser, error) {
  21. fm, err := c.ReadFrame(socket)
  22. if err != nil {
  23. return nil, errors.Annotate(err, "Cannot make client handshake")
  24. }
  25. decHasher := sha256.New()
  26. decHasher.Write(fm.key()) // nolint: errcheck
  27. decHasher.Write(newconfig.C.Secret) // nolint: errcheck
  28. decryptor := makeStreamCipher(decHasher.Sum(nil), fm.iv())
  29. invertedFrame := fm.invert()
  30. encHasher := sha256.New()
  31. encHasher.Write(invertedFrame.key()) // nolint: errcheck
  32. encHasher.Write(newconfig.C.Secret) // nolint: errcheck
  33. encryptor := makeStreamCipher(encHasher.Sum(nil), invertedFrame.iv())
  34. decryptedFrame := frame{}
  35. decryptor.XORKeyStream(decryptedFrame.bytes(), fm.bytes())
  36. magic := decryptedFrame.magic()
  37. switch {
  38. case bytes.Equal(magic, newprotocol.ConnectionTagAbridged):
  39. c.ConnectionType = newprotocol.ConnectionTypeAbridged
  40. case bytes.Equal(magic, newprotocol.ConnectionTagIntermediate):
  41. c.ConnectionType = newprotocol.ConnectionTypeIntermediate
  42. case bytes.Equal(magic, newprotocol.ConnectionTagSecure):
  43. c.ConnectionType = newprotocol.ConnectionTypeSecure
  44. default:
  45. return nil, errors.New("Unknown connection type")
  46. }
  47. c.ConnectionProtocol = newprotocol.ConnectionProtocolIPv4
  48. if socket.LocalAddr().IP.To4() == nil {
  49. c.ConnectionProtocol = newprotocol.ConnectionProtocolIPv6
  50. }
  51. buf := bytes.NewReader(decryptedFrame.dc())
  52. if err := binary.Read(buf, binary.LittleEndian, &c.DC); err != nil {
  53. c.DC = 1
  54. }
  55. antiReplayKey := decryptedFrame.unique()
  56. if newantireplay.Has(antiReplayKey) {
  57. return nil, errors.New("Replay attack is detected")
  58. }
  59. newantireplay.Add(antiReplayKey)
  60. return newwrappers.NewObfuscated2(socket, encryptor, decryptor), nil
  61. }
  62. func (c *ClientProtocol) ReadFrame(socket newwrappers.StreamReader) (fm frame, err error) {
  63. if _, err := io.ReadFull(handshakeReader{socket}, fm.bytes()); err != nil {
  64. err = errors.Annotate(err, "Cannot extract obfuscated2 frame")
  65. }
  66. return
  67. }
  68. type handshakeReader struct {
  69. parent newwrappers.StreamReader
  70. }
  71. func (h handshakeReader) Read(p []byte) (int, error) {
  72. return h.parent.ReadTimeout(p, clientProtocolHandshakeTimeout)
  73. }
  74. func makeStreamCipher(key, iv []byte) cipher.Stream {
  75. block, _ := aes.NewCipher(key) // nolint: gosec
  76. return cipher.NewCTR(block, iv)
  77. }