Highly-opinionated (ex-bullshit-free) MTPROTO proxy for Telegram. If you use v1.0 or upgrade broke you proxy, please read the chapter Version 2
Вы не можете выбрать более 25 тем Темы должны начинаться с буквы или цифры, могут содержать дефисы(-) и должны содержать не более 35 символов.

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117
  1. package obfuscated2
  2. import (
  3. "bytes"
  4. "crypto/rand"
  5. "encoding/binary"
  6. "io"
  7. "github.com/juju/errors"
  8. )
  9. // [frameOffsetFirst:frameOffsetKey:frameOffsetIV:frameOffsetMagic:frameOffsetDC:frameOffsetEnd]
  10. const (
  11. frameLenKey = 32
  12. frameLenIV = 16
  13. frameLenMagic = 4
  14. frameLenDC = 2
  15. frameOffsetFirst = 8
  16. frameOffsetKey = frameOffsetFirst + frameLenKey
  17. frameOffsetIV = frameOffsetKey + frameLenIV
  18. frameOffsetMagic = frameOffsetIV + frameLenMagic
  19. frameOffsetDC = frameOffsetMagic + frameLenDC
  20. tgMagicByte = byte(239)
  21. FrameLen = 64
  22. )
  23. var tgMagicBytes = []byte{tgMagicByte, tgMagicByte, tgMagicByte, tgMagicByte}
  24. // Frame represents handshake frame. Telegram sends 64 bytes of obfuscated2
  25. // initialization data first.
  26. // https://blog.susanka.eu/how-telegram-obfuscates-its-mtproto-traffic/
  27. type Frame []byte
  28. // Key returns AES encryption key.
  29. func (f Frame) Key() []byte {
  30. return f[frameOffsetFirst:frameOffsetKey]
  31. }
  32. // IV returns AES encryption initialization vector
  33. func (f Frame) IV() []byte {
  34. return f[frameOffsetKey:frameOffsetIV]
  35. }
  36. // Magic returns magic bytes from last 8 bytes of frame. Telegram checks
  37. // for values there. If after decryption magic is not as expected,
  38. // connection considered as failed.
  39. func (f Frame) Magic() []byte {
  40. return f[frameOffsetIV:frameOffsetMagic]
  41. }
  42. // DC returns number of datacenter IP client wants to use.
  43. func (f Frame) DC() (n int16) {
  44. buf := bytes.NewReader(f[frameOffsetMagic:frameOffsetDC])
  45. if err := binary.Read(buf, binary.LittleEndian, &n); err != nil {
  46. n = 1
  47. }
  48. return
  49. }
  50. // Valid checks that *decrypted* frame is valid. Only magic bytes are checked.
  51. func (f Frame) Valid() bool {
  52. return bytes.Equal(f.Magic(), tgMagicBytes)
  53. }
  54. // Invert inverts frame for extracting encryption keys. Pkease check that link:
  55. // https://blog.susanka.eu/how-telegram-obfuscates-its-mtproto-traffic/
  56. func (f Frame) Invert() Frame {
  57. reversed := make(Frame, FrameLen)
  58. copy(reversed, f)
  59. for i := 0; i < frameLenKey+frameLenIV; i++ {
  60. reversed[frameOffsetFirst+i] = f[frameOffsetIV-1-i]
  61. }
  62. return reversed
  63. }
  64. // ExtractFrame extracts exact obfuscated2 handshake frame from given reader.
  65. func ExtractFrame(conn io.Reader) (Frame, error) {
  66. buf := &bytes.Buffer{}
  67. if _, err := io.CopyN(buf, conn, FrameLen); err != nil {
  68. return nil, errors.Annotate(err, "Cannot extract obfuscated header")
  69. }
  70. return Frame(buf.Bytes()), nil
  71. }
  72. func generateFrame() Frame {
  73. data := make(Frame, FrameLen)
  74. for {
  75. if _, err := rand.Read(data); err != nil {
  76. continue
  77. }
  78. if data[0] == 0xef {
  79. continue
  80. }
  81. val := (uint32(data[3]) << 24) | (uint32(data[2]) << 16) | (uint32(data[1]) << 8) | uint32(data[0])
  82. if val == 0x44414548 || val == 0x54534f50 || val == 0x20544547 || val == 0x4954504f || val == 0xeeeeeeee {
  83. continue
  84. }
  85. val = (uint32(data[7]) << 24) | (uint32(data[6]) << 16) | (uint32(data[5]) << 8) | uint32(data[4])
  86. if val == 0x00000000 {
  87. continue
  88. }
  89. copy(data.Magic(), tgMagicBytes)
  90. return data
  91. }
  92. }