Highly-opinionated (ex-bullshit-free) MTPROTO proxy for Telegram. If you use v1.0 or upgrade broke you proxy, please read the chapter Version 2
Nevar pievienot vairāk kā 25 tēmas Tēmai ir jāsākas ar burtu vai ciparu, tā var saturēt domu zīmes ('-') un var būt līdz 35 simboliem gara.

direct.go 2.0KB

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061
  1. package client
  2. import (
  3. "context"
  4. "net"
  5. "time"
  6. "github.com/juju/errors"
  7. "github.com/9seconds/mtg/antireplay"
  8. "github.com/9seconds/mtg/config"
  9. "github.com/9seconds/mtg/mtproto"
  10. "github.com/9seconds/mtg/obfuscated2"
  11. "github.com/9seconds/mtg/wrappers"
  12. )
  13. const handshakeTimeout = 10 * time.Second
  14. // DirectInit initializes client connection for proxy which connects to
  15. // Telegram directly.
  16. func DirectInit(ctx context.Context, cancel context.CancelFunc, socket net.Conn,
  17. connID string, antiReplayCache antireplay.Cache,
  18. conf *config.Config) (wrappers.Wrap, *mtproto.ConnectionOpts, error) {
  19. tcpSocket := socket.(*net.TCPConn)
  20. if err := tcpSocket.SetNoDelay(false); err != nil {
  21. return nil, nil, errors.Annotate(err, "Cannot disable NO_DELAY to client socket")
  22. }
  23. if err := tcpSocket.SetReadBuffer(conf.ReadBufferSize); err != nil {
  24. return nil, nil, errors.Annotate(err, "Cannot set read buffer size of client socket")
  25. }
  26. if err := tcpSocket.SetWriteBuffer(conf.WriteBufferSize); err != nil {
  27. return nil, nil, errors.Annotate(err, "Cannot set write buffer size of client socket")
  28. }
  29. socket.SetReadDeadline(time.Now().Add(handshakeTimeout)) // nolint: errcheck, gosec
  30. frame, err := obfuscated2.ExtractFrame(socket)
  31. if err != nil {
  32. return nil, nil, errors.Annotate(err, "Cannot extract frame")
  33. }
  34. socket.SetReadDeadline(time.Time{}) // nolint: errcheck, gosec
  35. conn := wrappers.NewConn(ctx, cancel, socket, connID, wrappers.ConnPurposeClient, conf.PublicIPv4, conf.PublicIPv6)
  36. obfs2, connOpts, err := obfuscated2.ParseObfuscated2ClientFrame(conf.Secret, frame)
  37. if err != nil {
  38. return nil, nil, errors.Annotate(err, "Cannot parse obfuscated frame")
  39. }
  40. if antiReplayCache.Has([]byte(frame)) {
  41. return nil, nil, errors.New("Replay attack is detected")
  42. }
  43. antiReplayCache.Add([]byte(frame))
  44. connOpts.ConnectionProto = mtproto.ConnectionProtocolAny
  45. connOpts.ClientAddr = conn.RemoteAddr()
  46. conn = wrappers.NewStreamCipher(conn, obfs2.Encryptor, obfs2.Decryptor)
  47. conn.Logger().Infow("Client connection initialized")
  48. return conn, connOpts, nil
  49. }