Highly-opinionated (ex-bullshit-free) MTPROTO proxy for Telegram. If you use v1.0 or upgrade broke you proxy, please read the chapter Version 2
Você não pode selecionar mais de 25 tópicos Os tópicos devem começar com uma letra ou um número, podem incluir traços ('-') e podem ter até 35 caracteres.

frame.go 3.0KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123
  1. package obfuscated2
  2. import (
  3. "bytes"
  4. "crypto/rand"
  5. "encoding/binary"
  6. "io"
  7. "github.com/juju/errors"
  8. )
  9. // [frameOffsetFirst:frameOffsetKey:frameOffsetIV:frameOffsetMagic:frameOffsetDC:frameOffsetEnd]
  10. const (
  11. frameLenKey = 32
  12. frameLenIV = 16
  13. frameLenMagic = 4
  14. frameLenDC = 2
  15. frameOffsetFirst = 8
  16. frameOffsetKey = frameOffsetFirst + frameLenKey
  17. frameOffsetIV = frameOffsetKey + frameLenIV
  18. frameOffsetMagic = frameOffsetIV + frameLenMagic
  19. frameOffsetDC = frameOffsetMagic + frameLenDC
  20. tgMagicByte = byte(239)
  21. FrameLen = 64
  22. )
  23. var tgMagicBytes = []byte{tgMagicByte, tgMagicByte, tgMagicByte, tgMagicByte}
  24. // Frame represents handshake frame. Telegram sends 64 bytes of obfuscated2
  25. // initialization data first.
  26. // https://blog.susanka.eu/how-telegram-obfuscates-its-mtproto-traffic/
  27. type Frame []byte
  28. // Key returns AES encryption key.
  29. func (f Frame) Key() []byte {
  30. return f[frameOffsetFirst:frameOffsetKey]
  31. }
  32. // IV returns AES encryption initialization vector
  33. func (f Frame) IV() []byte {
  34. return f[frameOffsetKey:frameOffsetIV]
  35. }
  36. // Magic returns magic bytes from last 8 bytes of frame. Telegram checks
  37. // for values there. If after decryption magic is not as expected,
  38. // connection considered as failed.
  39. func (f Frame) Magic() []byte {
  40. return f[frameOffsetIV:frameOffsetMagic]
  41. }
  42. // DC returns number of datacenter IP client wants to use.
  43. func (f Frame) DC() (n int16) {
  44. buf := bytes.NewReader(f[frameOffsetMagic:frameOffsetDC])
  45. if err := binary.Read(buf, binary.LittleEndian, &n); err != nil {
  46. n = 1
  47. }
  48. if n < 0 {
  49. n = -n
  50. } else if n == 0 {
  51. n = 1
  52. }
  53. return n - 1
  54. }
  55. // Valid checks that *decrypted* frame is valid. Only magic bytes are checked.
  56. func (f Frame) Valid() bool {
  57. return bytes.Equal(f.Magic(), tgMagicBytes)
  58. }
  59. // Invert inverts frame for extracting encryption keys. Pkease check that link:
  60. // https://blog.susanka.eu/how-telegram-obfuscates-its-mtproto-traffic/
  61. func (f Frame) Invert() Frame {
  62. reversed := make(Frame, FrameLen)
  63. copy(reversed, f)
  64. for i := 0; i < frameLenKey+frameLenIV; i++ {
  65. reversed[frameOffsetFirst+i] = f[frameOffsetIV-1-i]
  66. }
  67. return reversed
  68. }
  69. // ExtractFrame extracts exact obfuscated2 handshake frame from given reader.
  70. func ExtractFrame(conn io.Reader) (Frame, error) {
  71. buf := &bytes.Buffer{}
  72. if _, err := io.CopyN(buf, conn, FrameLen); err != nil {
  73. return nil, errors.Annotate(err, "Cannot extract obfuscated header")
  74. }
  75. return Frame(buf.Bytes()), nil
  76. }
  77. func generateFrame() Frame {
  78. data := make(Frame, FrameLen)
  79. for {
  80. if _, err := rand.Read(data); err != nil {
  81. continue
  82. }
  83. if data[0] == 0xef {
  84. continue
  85. }
  86. val := (uint32(data[3]) << 24) | (uint32(data[2]) << 16) | (uint32(data[1]) << 8) | uint32(data[0])
  87. if val == 0x44414548 || val == 0x54534f50 || val == 0x20544547 || val == 0x4954504f || val == 0xeeeeeeee {
  88. continue
  89. }
  90. val = (uint32(data[7]) << 24) | (uint32(data[6]) << 16) | (uint32(data[5]) << 8) | uint32(data[4])
  91. if val == 0x00000000 {
  92. continue
  93. }
  94. copy(data.Magic(), tgMagicBytes)
  95. return data
  96. }
  97. }