Highly-opinionated (ex-bullshit-free) MTPROTO proxy for Telegram. If you use v1.0 or upgrade broke you proxy, please read the chapter Version 2
您最多选择25个主题 主题必须以字母或数字开头,可以包含连字符 (-),并且长度不得超过35个字符

proxy.go 7.2KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305
  1. package mtglib
  2. import (
  3. "context"
  4. "errors"
  5. "fmt"
  6. "net"
  7. "strconv"
  8. "sync"
  9. "time"
  10. "github.com/9seconds/mtg/v2/mtglib/internal/faketls"
  11. "github.com/9seconds/mtg/v2/mtglib/internal/faketls/record"
  12. "github.com/9seconds/mtg/v2/mtglib/internal/obfuscated2"
  13. "github.com/9seconds/mtg/v2/mtglib/internal/relay"
  14. "github.com/9seconds/mtg/v2/mtglib/internal/telegram"
  15. "github.com/panjf2000/ants/v2"
  16. )
  17. type Proxy struct {
  18. ctx context.Context
  19. ctxCancel context.CancelFunc
  20. streamWaitGroup sync.WaitGroup
  21. idleTimeout time.Duration
  22. bufferSize int
  23. domainFrontingPort int
  24. workerPool *ants.PoolWithFunc
  25. telegram *telegram.Telegram
  26. secret Secret
  27. network Network
  28. antiReplayCache AntiReplayCache
  29. timeAttackDetector TimeAttackDetector
  30. ipBlocklist IPBlocklist
  31. eventStream EventStream
  32. logger Logger
  33. }
  34. func (p *Proxy) DomainFrontingAddress() string {
  35. return net.JoinHostPort(p.secret.Host, strconv.Itoa(p.domainFrontingPort))
  36. }
  37. func (p *Proxy) ServeConn(conn net.Conn) {
  38. p.streamWaitGroup.Add(1)
  39. defer p.streamWaitGroup.Done()
  40. ctx := newStreamContext(p.ctx, p.logger, conn)
  41. defer ctx.Close()
  42. go func() {
  43. <-ctx.Done()
  44. ctx.Close()
  45. }()
  46. p.eventStream.Send(ctx, NewEventStart(ctx.streamID, ctx.ClientIP()))
  47. ctx.logger.Info("Stream has been started")
  48. defer func() {
  49. p.eventStream.Send(ctx, NewEventFinish(ctx.streamID))
  50. ctx.logger.Info("Stream has been finished")
  51. }()
  52. if !p.doFakeTLSHandshake(ctx) {
  53. return
  54. }
  55. if err := p.doObfuscated2Handshake(ctx); err != nil {
  56. p.logger.InfoError("obfuscated2 handshake is failed", err)
  57. return
  58. }
  59. if err := p.doTelegramCall(ctx); err != nil {
  60. p.logger.WarningError("cannot dial to telegram", err)
  61. return
  62. }
  63. rel := relay.AcquireRelay(ctx,
  64. p.logger.Named("relay"), p.bufferSize, p.idleTimeout)
  65. defer relay.ReleaseRelay(rel)
  66. if err := rel.Process(ctx.clientConn, ctx.telegramConn); err != nil {
  67. p.logger.DebugError("relay has been finished", err)
  68. }
  69. }
  70. func (p *Proxy) Serve(listener net.Listener) error {
  71. p.streamWaitGroup.Add(1)
  72. defer p.streamWaitGroup.Done()
  73. for {
  74. conn, err := listener.Accept()
  75. if err != nil {
  76. return fmt.Errorf("cannot accept a new connection: %w", err)
  77. }
  78. ipAddr := conn.RemoteAddr().(*net.TCPAddr).IP
  79. logger := p.logger.BindStr("ip", ipAddr.String())
  80. if p.ipBlocklist.Contains(ipAddr) {
  81. conn.Close()
  82. logger.Info("ip was blacklisted")
  83. p.eventStream.Send(p.ctx, NewEventIPBlocklisted(ipAddr))
  84. continue
  85. }
  86. err = p.workerPool.Invoke(conn)
  87. switch {
  88. case err == nil:
  89. case errors.Is(err, ants.ErrPoolClosed):
  90. return nil
  91. case errors.Is(err, ants.ErrPoolOverload):
  92. logger.Info("connection was concurrency limited")
  93. p.eventStream.Send(p.ctx, NewEventConcurrencyLimited())
  94. }
  95. select {
  96. case <-p.ctx.Done():
  97. return p.ctx.Err()
  98. default:
  99. }
  100. }
  101. }
  102. func (p *Proxy) Shutdown() {
  103. p.ctxCancel()
  104. p.streamWaitGroup.Wait()
  105. p.workerPool.Release()
  106. }
  107. func (p *Proxy) doFakeTLSHandshake(ctx *streamContext) bool {
  108. rec := record.AcquireRecord()
  109. defer record.ReleaseRecord(rec)
  110. rewind := newConnRewind(ctx.clientConn)
  111. if err := rec.Read(rewind); err != nil {
  112. p.logger.InfoError("cannot read client hello", err)
  113. p.doDomainFronting(ctx, rewind)
  114. return false
  115. }
  116. hello, err := faketls.ParseClientHello(p.secret.Key[:], rec.Payload.Bytes())
  117. if err != nil {
  118. p.logger.InfoError("cannot parse client hello", err)
  119. p.doDomainFronting(ctx, rewind)
  120. return false
  121. }
  122. if hello.Host != "" && hello.Host != p.secret.Host {
  123. p.logger.BindStr("hostname", hello.Host).Info("incorrect domain was found in SNI")
  124. p.doDomainFronting(ctx, rewind)
  125. return false
  126. }
  127. if err := p.timeAttackDetector.Valid(hello.Time); err != nil {
  128. p.logger.InfoError("invalid faketls time", err)
  129. p.doDomainFronting(ctx, rewind)
  130. return false
  131. }
  132. if p.antiReplayCache.SeenBefore(hello.SessionID) {
  133. p.logger.Warning("replay attack has been detected!")
  134. p.eventStream.Send(p.ctx, NewEventReplayAttack(ctx.streamID))
  135. p.doDomainFronting(ctx, rewind)
  136. return false
  137. }
  138. if err := faketls.SendWelcomePacket(rewind, p.secret.Key[:], hello); err != nil {
  139. p.logger.InfoError("cannot send welcome packet", err)
  140. return false
  141. }
  142. ctx.clientConn = &faketls.Conn{
  143. Conn: ctx.clientConn,
  144. }
  145. return true
  146. }
  147. func (p *Proxy) doObfuscated2Handshake(ctx *streamContext) error {
  148. dc, encryptor, decryptor, err := obfuscated2.ClientHandshake(p.secret.Key[:], ctx.clientConn)
  149. if err != nil {
  150. return fmt.Errorf("cannot process client handshake: %w", err)
  151. }
  152. ctx.dc = dc
  153. ctx.logger = ctx.logger.BindInt("dc", dc)
  154. ctx.clientConn = obfuscated2.Conn{
  155. Conn: ctx.clientConn,
  156. Encryptor: encryptor,
  157. Decryptor: decryptor,
  158. }
  159. return nil
  160. }
  161. func (p *Proxy) doTelegramCall(ctx *streamContext) error {
  162. conn, err := p.telegram.Dial(ctx, ctx.dc)
  163. if err != nil {
  164. return fmt.Errorf("cannot dial to Telegram: %w", err)
  165. }
  166. encryptor, decryptor, err := obfuscated2.ServerHandshake(conn)
  167. if err != nil {
  168. conn.Close()
  169. return fmt.Errorf("cannot perform obfuscated2 handshake: %w", err)
  170. }
  171. ctx.telegramConn = obfuscated2.Conn{
  172. Conn: connTraffic{
  173. Conn: conn,
  174. streamID: ctx.streamID,
  175. stream: p.eventStream,
  176. ctx: ctx,
  177. },
  178. Encryptor: encryptor,
  179. Decryptor: decryptor,
  180. }
  181. p.eventStream.Send(ctx,
  182. NewEventConnectedToDC(ctx.streamID, conn.RemoteAddr().(*net.TCPAddr).IP, ctx.dc))
  183. return nil
  184. }
  185. func (p *Proxy) doDomainFronting(ctx *streamContext, conn *connRewind) {
  186. p.eventStream.Send(p.ctx, NewEventDomainFronting(ctx.streamID))
  187. conn.Rewind()
  188. frontConn, err := p.network.DialContext(ctx, "tcp", p.DomainFrontingAddress())
  189. if err != nil {
  190. p.logger.WarningError("cannot dial to the fronting domain", err)
  191. return
  192. }
  193. frontConn = connTraffic{
  194. Conn: frontConn,
  195. ctx: ctx,
  196. streamID: ctx.streamID,
  197. stream: p.eventStream,
  198. }
  199. rel := relay.AcquireRelay(ctx,
  200. p.logger.Named("domain-fronting"), p.bufferSize, p.idleTimeout)
  201. defer relay.ReleaseRelay(rel)
  202. if err := rel.Process(conn, frontConn); err != nil {
  203. p.logger.DebugError("domain fronting relay has been finished", err)
  204. }
  205. }
  206. func NewProxy(opts ProxyOpts) (*Proxy, error) {
  207. if err := opts.valid(); err != nil {
  208. return nil, fmt.Errorf("invalid settings: %w", err)
  209. }
  210. tg, err := telegram.New(opts.Network, opts.getPreferIP())
  211. if err != nil {
  212. return nil, fmt.Errorf("cannot build telegram dialer: %w", err)
  213. }
  214. ctx, cancel := context.WithCancel(context.Background())
  215. proxy := &Proxy{
  216. ctx: ctx,
  217. ctxCancel: cancel,
  218. secret: opts.Secret,
  219. network: opts.Network,
  220. antiReplayCache: opts.AntiReplayCache,
  221. timeAttackDetector: opts.TimeAttackDetector,
  222. ipBlocklist: opts.IPBlocklist,
  223. eventStream: opts.EventStream,
  224. logger: opts.getLogger("proxy"),
  225. domainFrontingPort: opts.getDomainFrontingPort(),
  226. idleTimeout: opts.getIdleTimeout(),
  227. bufferSize: opts.getBufferSize(),
  228. telegram: tg,
  229. }
  230. pool, err := ants.NewPoolWithFunc(opts.getConcurrency(),
  231. func(arg interface{}) {
  232. proxy.ServeConn(arg.(net.Conn))
  233. },
  234. ants.WithLogger(opts.getLogger("ants")),
  235. ants.WithNonblocking(true))
  236. if err != nil {
  237. panic(err)
  238. }
  239. proxy.workerPool = pool
  240. return proxy, nil
  241. }