Highly-opinionated (ex-bullshit-free) MTPROTO proxy for Telegram. If you use v1.0 or upgrade broke you proxy, please read the chapter Version 2
Ви не можете вибрати більше 25 тем Теми мають розпочинатися з літери або цифри, можуть містити дефіси (-) і не повинні перевищувати 35 символів.

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365
  1. package mtglib
  2. import (
  3. "context"
  4. "errors"
  5. "fmt"
  6. "net"
  7. "strconv"
  8. "sync"
  9. "time"
  10. "github.com/9seconds/mtg/v2/mtglib/internal/faketls"
  11. "github.com/9seconds/mtg/v2/mtglib/internal/faketls/record"
  12. "github.com/9seconds/mtg/v2/mtglib/internal/obfuscated2"
  13. "github.com/9seconds/mtg/v2/mtglib/internal/relay"
  14. "github.com/9seconds/mtg/v2/mtglib/internal/telegram"
  15. "github.com/panjf2000/ants/v2"
  16. )
  17. type Proxy struct {
  18. ctx context.Context
  19. ctxCancel context.CancelFunc
  20. streamWaitGroup sync.WaitGroup
  21. idleTimeout time.Duration
  22. bufferSize int
  23. domainFrontingPort int
  24. workerPool *ants.PoolWithFunc
  25. telegram *telegram.Telegram
  26. secret Secret
  27. network Network
  28. antiReplayCache AntiReplayCache
  29. timeAttackDetector TimeAttackDetector
  30. ipBlocklist IPBlocklist
  31. eventStream EventStream
  32. logger Logger
  33. }
  34. func (p *Proxy) DomainFrontingAddress() string {
  35. return net.JoinHostPort(p.secret.Host, strconv.Itoa(p.domainFrontingPort))
  36. }
  37. func (p *Proxy) ServeConn(conn net.Conn) {
  38. p.streamWaitGroup.Add(1)
  39. defer p.streamWaitGroup.Done()
  40. ctx := newStreamContext(p.ctx, p.logger, conn)
  41. defer ctx.Close()
  42. go func() {
  43. <-ctx.Done()
  44. ctx.Close()
  45. }()
  46. p.eventStream.Send(ctx, EventStart{
  47. CreatedAt: time.Now(),
  48. ConnID: ctx.connID,
  49. RemoteIP: ctx.ClientIP(),
  50. })
  51. ctx.logger.Info("Stream has been started")
  52. defer func() {
  53. p.eventStream.Send(ctx, EventFinish{
  54. CreatedAt: time.Now(),
  55. ConnID: ctx.connID,
  56. })
  57. ctx.logger.Info("Stream has been finished")
  58. }()
  59. if !p.doFakeTLSHandshake(ctx) {
  60. return
  61. }
  62. if err := p.doObfuscated2Handshake(ctx); err != nil {
  63. p.logger.InfoError("obfuscated2 handshake is failed", err)
  64. return
  65. }
  66. if err := p.doTelegramCall(ctx); err != nil {
  67. p.logger.WarningError("cannot dial to telegram", err)
  68. return
  69. }
  70. rel := relay.AcquireRelay(ctx,
  71. p.logger.Named("relay"), p.bufferSize, p.idleTimeout)
  72. defer relay.ReleaseRelay(rel)
  73. if err := rel.Process(ctx.clientConn, ctx.telegramConn); err != nil {
  74. p.logger.DebugError("relay has been finished", err)
  75. }
  76. }
  77. func (p *Proxy) Serve(listener net.Listener) error {
  78. p.streamWaitGroup.Add(1)
  79. defer p.streamWaitGroup.Done()
  80. for {
  81. conn, err := listener.Accept()
  82. if err != nil {
  83. return fmt.Errorf("cannot accept a new connection: %w", err)
  84. }
  85. ipAddr := conn.RemoteAddr().(*net.TCPAddr).IP
  86. logger := p.logger.BindStr("ip", ipAddr.String())
  87. if p.ipBlocklist.Contains(ipAddr) {
  88. conn.Close()
  89. logger.Info("ip was blacklisted")
  90. p.eventStream.Send(p.ctx, EventIPBlocklisted{
  91. CreatedAt: time.Now(),
  92. RemoteIP: ipAddr,
  93. })
  94. continue
  95. }
  96. err = p.workerPool.Invoke(conn)
  97. switch {
  98. case err == nil:
  99. case errors.Is(err, ants.ErrPoolClosed):
  100. return nil
  101. case errors.Is(err, ants.ErrPoolOverload):
  102. logger.Info("connection was concurrency limited")
  103. p.eventStream.Send(p.ctx, EventConcurrencyLimited{
  104. CreatedAt: time.Now(),
  105. })
  106. }
  107. select {
  108. case <-p.ctx.Done():
  109. return p.ctx.Err()
  110. default:
  111. }
  112. }
  113. }
  114. func (p *Proxy) Shutdown() {
  115. p.ctxCancel()
  116. p.streamWaitGroup.Wait()
  117. p.workerPool.Release()
  118. }
  119. func (p *Proxy) doFakeTLSHandshake(ctx *streamContext) bool {
  120. rec := record.AcquireRecord()
  121. defer record.ReleaseRecord(rec)
  122. rewind := newConnRewind(ctx.clientConn)
  123. if err := rec.Read(rewind); err != nil {
  124. p.logger.InfoError("cannot read client hello", err)
  125. p.doDomainFronting(ctx, rewind)
  126. return false
  127. }
  128. hello, err := faketls.ParseClientHello(p.secret.Key[:], rec.Payload.Bytes())
  129. if err != nil {
  130. p.logger.InfoError("cannot parse client hello", err)
  131. p.doDomainFronting(ctx, rewind)
  132. return false
  133. }
  134. if hello.Host != "" && hello.Host != p.secret.Host {
  135. p.logger.BindStr("hostname", hello.Host).Info("incorrect domain was found in SNI")
  136. p.doDomainFronting(ctx, rewind)
  137. return false
  138. }
  139. if err := p.timeAttackDetector.Valid(hello.Time); err != nil {
  140. p.logger.InfoError("invalid faketls time", err)
  141. p.doDomainFronting(ctx, rewind)
  142. return false
  143. }
  144. if p.antiReplayCache.SeenBefore(hello.SessionID) {
  145. p.logger.Warning("replay attack has been detected!")
  146. p.eventStream.Send(p.ctx, EventReplayAttack{
  147. CreatedAt: time.Now(),
  148. ConnID: ctx.connID,
  149. })
  150. p.doDomainFronting(ctx, rewind)
  151. return false
  152. }
  153. if err := faketls.SendWelcomePacket(rewind, p.secret.Key[:], hello); err != nil {
  154. p.logger.InfoError("cannot send welcome packet", err)
  155. return false
  156. }
  157. ctx.clientConn = &faketls.Conn{
  158. Conn: ctx.clientConn,
  159. }
  160. return true
  161. }
  162. func (p *Proxy) doObfuscated2Handshake(ctx *streamContext) error {
  163. dc, encryptor, decryptor, err := obfuscated2.ClientHandshake(p.secret.Key[:], ctx.clientConn)
  164. if err != nil {
  165. return fmt.Errorf("cannot process client handshake: %w", err)
  166. }
  167. ctx.dc = dc
  168. ctx.logger = ctx.logger.BindInt("dc", dc)
  169. ctx.clientConn = obfuscated2.Conn{
  170. Conn: ctx.clientConn,
  171. Encryptor: encryptor,
  172. Decryptor: decryptor,
  173. }
  174. return nil
  175. }
  176. func (p *Proxy) doTelegramCall(ctx *streamContext) error {
  177. conn, err := p.telegram.Dial(ctx, ctx.dc)
  178. if err != nil {
  179. return fmt.Errorf("cannot dial to Telegram: %w", err)
  180. }
  181. encryptor, decryptor, err := obfuscated2.ServerHandshake(conn)
  182. if err != nil {
  183. conn.Close()
  184. return fmt.Errorf("cannot perform obfuscated2 handshake: %w", err)
  185. }
  186. ctx.telegramConn = obfuscated2.Conn{
  187. Conn: connTraffic{
  188. Conn: conn,
  189. connID: ctx.connID,
  190. stream: p.eventStream,
  191. ctx: ctx,
  192. },
  193. Encryptor: encryptor,
  194. Decryptor: decryptor,
  195. }
  196. p.eventStream.Send(ctx, EventConnectedToDC{
  197. CreatedAt: time.Now(),
  198. ConnID: ctx.connID,
  199. RemoteIP: conn.RemoteAddr().(*net.TCPAddr).IP,
  200. DC: ctx.dc,
  201. })
  202. return nil
  203. }
  204. func (p *Proxy) doDomainFronting(ctx *streamContext, conn *connRewind) {
  205. p.eventStream.Send(p.ctx, EventDomainFronting{
  206. CreatedAt: time.Now(),
  207. ConnID: ctx.connID,
  208. })
  209. conn.Rewind()
  210. frontConn, err := p.network.DialContext(ctx, "tcp", p.DomainFrontingAddress())
  211. if err != nil {
  212. p.logger.WarningError("cannot dial to the fronting domain", err)
  213. return
  214. }
  215. frontConn = connTraffic{
  216. Conn: frontConn,
  217. ctx: ctx,
  218. connID: ctx.connID,
  219. stream: p.eventStream,
  220. }
  221. rel := relay.AcquireRelay(ctx,
  222. p.logger.Named("domain-fronting"), p.bufferSize, p.idleTimeout)
  223. defer relay.ReleaseRelay(rel)
  224. if err := rel.Process(conn, frontConn); err != nil {
  225. p.logger.DebugError("domain fronting relay has been finished", err)
  226. }
  227. }
  228. func NewProxy(opts ProxyOpts) (*Proxy, error) { // nolint: cyclop, funlen
  229. switch {
  230. case opts.Network == nil:
  231. return nil, ErrNetworkIsNotDefined
  232. case opts.AntiReplayCache == nil:
  233. return nil, ErrAntiReplayCacheIsNotDefined
  234. case opts.IPBlocklist == nil:
  235. return nil, ErrIPBlocklistIsNotDefined
  236. case opts.EventStream == nil:
  237. return nil, ErrEventStreamIsNotDefined
  238. case opts.TimeAttackDetector == nil:
  239. return nil, ErrTimeAttackDetectorIsNotDefined
  240. case opts.Logger == nil:
  241. return nil, ErrLoggerIsNotDefined
  242. case !opts.Secret.Valid():
  243. return nil, ErrSecretInvalid
  244. }
  245. preferIP := opts.PreferIP
  246. if preferIP == "" {
  247. preferIP = DefaultPreferIP
  248. }
  249. concurrency := opts.Concurrency
  250. if concurrency == 0 {
  251. concurrency = DefaultConcurrency
  252. }
  253. idleTimeout := opts.IdleTimeout
  254. if idleTimeout < 1 {
  255. idleTimeout = DefaultIdleTimeout
  256. }
  257. bufferSize := opts.BufferSize
  258. if bufferSize < 1 {
  259. bufferSize = DefaultBufferSize
  260. }
  261. domainFrontingPort := int(opts.DomainFrontingPort)
  262. if domainFrontingPort == 0 {
  263. domainFrontingPort = DefaultDomainFrontingPort
  264. }
  265. tg, err := telegram.New(opts.Network, preferIP)
  266. if err != nil {
  267. return nil, fmt.Errorf("cannot build telegram dialer: %w", err)
  268. }
  269. ctx, cancel := context.WithCancel(context.Background())
  270. proxy := &Proxy{
  271. ctx: ctx,
  272. ctxCancel: cancel,
  273. secret: opts.Secret,
  274. network: opts.Network,
  275. antiReplayCache: opts.AntiReplayCache,
  276. timeAttackDetector: opts.TimeAttackDetector,
  277. ipBlocklist: opts.IPBlocklist,
  278. eventStream: opts.EventStream,
  279. logger: opts.Logger.Named("proxy"),
  280. domainFrontingPort: domainFrontingPort,
  281. idleTimeout: idleTimeout,
  282. bufferSize: int(bufferSize),
  283. telegram: tg,
  284. }
  285. pool, err := ants.NewPoolWithFunc(int(concurrency), func(arg interface{}) {
  286. proxy.ServeConn(arg.(net.Conn))
  287. },
  288. ants.WithLogger(opts.Logger.Named("ants")),
  289. ants.WithNonblocking(true))
  290. if err != nil {
  291. panic(err)
  292. }
  293. proxy.workerPool = pool
  294. return proxy, nil
  295. }