Highly-opinionated (ex-bullshit-free) MTPROTO proxy for Telegram. If you use v1.0 or upgrade broke you proxy, please read the chapter Version 2
You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451
  1. package mtglib
  2. import (
  3. "context"
  4. "errors"
  5. "fmt"
  6. "net"
  7. "sort"
  8. "strconv"
  9. "sync"
  10. "time"
  11. "github.com/dolonet/mtg-multi/essentials"
  12. "github.com/dolonet/mtg-multi/mtglib/internal/dc"
  13. "github.com/dolonet/mtg-multi/mtglib/internal/doppel"
  14. "github.com/dolonet/mtg-multi/mtglib/internal/obfuscation"
  15. "github.com/dolonet/mtg-multi/mtglib/internal/relay"
  16. "github.com/dolonet/mtg-multi/mtglib/internal/tls"
  17. "github.com/dolonet/mtg-multi/mtglib/internal/tls/fake"
  18. "github.com/panjf2000/ants/v2"
  19. )
  20. // Proxy is an MTPROTO proxy structure.
  21. type Proxy struct {
  22. ctx context.Context
  23. ctxCancel context.CancelFunc
  24. streamWaitGroup sync.WaitGroup
  25. allowFallbackOnUnknownDC bool
  26. tolerateTimeSkewness time.Duration
  27. idleTimeout time.Duration
  28. domainFrontingPort int
  29. domainFrontingIP string
  30. domainFrontingProxyProtocol bool
  31. workerPool *ants.PoolWithFunc
  32. telegram *dc.Telegram
  33. configUpdater *dc.PublicConfigUpdater
  34. doppelGanger *doppel.Ganger
  35. stats *ProxyStats
  36. secrets []Secret
  37. secretNames []string
  38. network Network
  39. antiReplayCache AntiReplayCache
  40. blocklist IPBlocklist
  41. allowlist IPBlocklist
  42. eventStream EventStream
  43. logger Logger
  44. }
  45. // DomainFrontingAddress returns a host:port pair for a fronting domain.
  46. // If DomainFrontingIP is set, it is used instead of resolving the hostname.
  47. func (p *Proxy) DomainFrontingAddress() string {
  48. // All secrets share the same host (enforced by validation),
  49. // so we use the first one.
  50. host := p.secrets[0].Host
  51. if p.domainFrontingIP != "" {
  52. host = p.domainFrontingIP
  53. }
  54. return net.JoinHostPort(host, strconv.Itoa(p.domainFrontingPort))
  55. }
  56. // ServeConn serves a connection. We do not check IP blocklist and concurrency
  57. // limit here.
  58. func (p *Proxy) ServeConn(conn essentials.Conn) {
  59. p.streamWaitGroup.Add(1)
  60. defer p.streamWaitGroup.Done()
  61. ctx := newStreamContext(p.ctx, p.logger, conn)
  62. defer ctx.Close()
  63. stop := context.AfterFunc(ctx, func() {
  64. ctx.Close()
  65. })
  66. defer stop()
  67. p.eventStream.Send(ctx, NewEventStart(ctx.streamID, ctx.ClientIP()))
  68. ctx.logger.Info("Stream has been started")
  69. defer func() {
  70. p.eventStream.Send(ctx, NewEventFinish(ctx.streamID))
  71. ctx.logger.Info("Stream has been finished")
  72. }()
  73. if !p.doFakeTLSHandshake(ctx) {
  74. return
  75. }
  76. if !p.stats.CanConnect(ctx.secretName) {
  77. ctx.logger.Info("connection throttled")
  78. p.eventStream.Send(ctx, NewEventThrottled(ctx.streamID, ctx.secretName))
  79. return
  80. }
  81. p.stats.OnConnect(ctx.secretName)
  82. p.stats.UpdateLastSeen(ctx.secretName)
  83. defer p.stats.OnDisconnect(ctx.secretName)
  84. clientConn, err := p.doppelGanger.NewConn(ctx.clientConn)
  85. if err != nil {
  86. ctx.logger.InfoError("cannot wrap into doppelganger connection", err)
  87. return
  88. }
  89. defer clientConn.Stop()
  90. ctx.clientConn = clientConn
  91. if err := p.doObfuscatedHandshake(ctx); err != nil {
  92. ctx.logger.InfoError("obfuscated handshake is failed", err)
  93. return
  94. }
  95. if err := p.doTelegramCall(ctx); err != nil {
  96. ctx.logger.WarningError("cannot dial to telegram", err)
  97. return
  98. }
  99. tracker := newIdleTracker(p.idleTimeout)
  100. relay.Relay(
  101. ctx,
  102. ctx.logger.Named("relay"),
  103. connIdleTimeout{Conn: ctx.telegramConn, tracker: tracker},
  104. newCountingConn(connIdleTimeout{Conn: ctx.clientConn, tracker: tracker}, p.stats, ctx.secretName),
  105. )
  106. }
  107. // Serve starts a proxy on a given listener.
  108. func (p *Proxy) Serve(listener net.Listener) error {
  109. p.streamWaitGroup.Add(1)
  110. defer p.streamWaitGroup.Done()
  111. for {
  112. conn, err := listener.Accept()
  113. if err != nil {
  114. select {
  115. case <-p.ctx.Done():
  116. return nil
  117. default:
  118. return fmt.Errorf("cannot accept a new connection: %w", err)
  119. }
  120. }
  121. ipAddr := conn.RemoteAddr().(*net.TCPAddr).IP //nolint: forcetypeassert
  122. logger := p.logger.BindStr("ip", ipAddr.String())
  123. if !p.allowlist.Contains(ipAddr) {
  124. conn.Close() //nolint: errcheck
  125. logger.Info("ip was rejected by allowlist")
  126. p.eventStream.Send(p.ctx, NewEventIPAllowlisted(ipAddr))
  127. continue
  128. }
  129. if p.blocklist.Contains(ipAddr) {
  130. conn.Close() //nolint: errcheck
  131. logger.Info("ip was blacklisted")
  132. p.eventStream.Send(p.ctx, NewEventIPBlocklisted(ipAddr))
  133. continue
  134. }
  135. err = p.workerPool.Invoke(conn)
  136. switch {
  137. case err == nil:
  138. case errors.Is(err, ants.ErrPoolClosed):
  139. return nil
  140. case errors.Is(err, ants.ErrPoolOverload):
  141. conn.Close() //nolint: errcheck
  142. logger.Info("connection was concurrency limited")
  143. p.eventStream.Send(p.ctx, NewEventConcurrencyLimited())
  144. }
  145. }
  146. }
  147. // Shutdown 'gracefully' shutdowns all connections. Please remember that it
  148. // does not close an underlying listener.
  149. func (p *Proxy) Shutdown() {
  150. p.ctxCancel()
  151. p.streamWaitGroup.Wait()
  152. p.workerPool.Release()
  153. p.configUpdater.Wait()
  154. p.doppelGanger.Shutdown()
  155. p.allowlist.Shutdown()
  156. p.blocklist.Shutdown()
  157. }
  158. func (p *Proxy) doFakeTLSHandshake(ctx *streamContext) bool {
  159. rewind := newConnRewind(ctx.clientConn)
  160. // Build a slice of secret keys to try during HMAC validation.
  161. secretKeys := make([][]byte, len(p.secrets))
  162. for i := range p.secrets {
  163. secretKeys[i] = p.secrets[i].Key[:]
  164. }
  165. result, err := fake.ReadClientHelloMulti(
  166. rewind,
  167. secretKeys,
  168. p.secrets[0].Host,
  169. p.tolerateTimeSkewness,
  170. )
  171. if err != nil {
  172. p.logger.InfoError("cannot read client hello", err)
  173. p.doDomainFronting(ctx, rewind)
  174. return false
  175. }
  176. if p.antiReplayCache.SeenBefore(result.Hello.SessionID) {
  177. p.logger.Warning("replay attack has been detected!")
  178. p.eventStream.Send(p.ctx, NewEventReplayAttack(ctx.streamID))
  179. p.doDomainFronting(ctx, rewind)
  180. return false
  181. }
  182. matchedSecret := p.secrets[result.MatchedIndex]
  183. ctx.matchedSecretKey = matchedSecret.Key[:]
  184. ctx.secretName = p.secretNames[result.MatchedIndex]
  185. ctx.logger = ctx.logger.BindStr("secret_name", ctx.secretName)
  186. gangerNoise := p.doppelGanger.NoiseParams()
  187. noiseParams := fake.NoiseParams{Mean: gangerNoise.Mean, Jitter: gangerNoise.Jitter}
  188. if err := fake.SendServerHello(ctx.clientConn, matchedSecret.Key[:], result.Hello, noiseParams); err != nil {
  189. p.logger.InfoError("cannot send welcome packet", err)
  190. return false
  191. }
  192. ctx.clientConn = tls.New(ctx.clientConn, true, false)
  193. return true
  194. }
  195. func (p *Proxy) doObfuscatedHandshake(ctx *streamContext) error {
  196. // Use the secret key that was matched during the FakeTLS handshake.
  197. obfs := obfuscation.Obfuscator{
  198. Secret: ctx.matchedSecretKey,
  199. }
  200. dc, conn, err := obfs.ReadHandshake(ctx.clientConn)
  201. if err != nil {
  202. return fmt.Errorf("cannot process client handshake: %w", err)
  203. }
  204. ctx.dc = dc
  205. ctx.clientConn = conn
  206. ctx.logger = ctx.logger.BindInt("dc", dc)
  207. return nil
  208. }
  209. func (p *Proxy) doTelegramCall(ctx *streamContext) error {
  210. dcid := ctx.dc
  211. addresses := p.telegram.GetAddresses(dcid)
  212. if len(addresses) == 0 && p.allowFallbackOnUnknownDC {
  213. ctx.logger = ctx.logger.BindInt("original_dc", dcid)
  214. ctx.logger.Warning("unknown DC, fallbacks")
  215. ctx.dc = dc.DefaultDC
  216. addresses = p.telegram.GetAddresses(dc.DefaultDC)
  217. }
  218. var (
  219. conn essentials.Conn
  220. err error
  221. foundAddr dc.Addr
  222. )
  223. for _, addr := range addresses {
  224. conn, err = p.network.Dial(addr.Network, addr.Address)
  225. if err == nil {
  226. foundAddr = addr
  227. break
  228. }
  229. }
  230. if err != nil {
  231. return fmt.Errorf("no addresses to call: %w", err)
  232. }
  233. if conn == nil {
  234. return fmt.Errorf("no available addresses for DC %d", ctx.dc)
  235. }
  236. tgConn, err := foundAddr.Obfuscator.SendHandshake(conn, ctx.dc)
  237. if err != nil {
  238. conn.Close() // nolint: errcheck
  239. return fmt.Errorf("cannot perform server handshake: %w", err)
  240. }
  241. ctx.telegramConn = connTraffic{
  242. Conn: tgConn,
  243. streamID: ctx.streamID,
  244. stream: p.eventStream,
  245. ctx: ctx,
  246. }
  247. telegramHost, _, err := net.SplitHostPort(foundAddr.Address)
  248. if err != nil {
  249. conn.Close() //nolint: errcheck
  250. return fmt.Errorf("cannot parse telegram address %s: %w", foundAddr.Address, err)
  251. }
  252. p.eventStream.Send(ctx,
  253. NewEventConnectedToDC(ctx.streamID,
  254. net.ParseIP(telegramHost),
  255. ctx.dc),
  256. )
  257. return nil
  258. }
  259. func (p *Proxy) doDomainFronting(ctx *streamContext, conn *connRewind) {
  260. p.eventStream.Send(p.ctx, NewEventDomainFronting(ctx.streamID))
  261. conn.Rewind()
  262. nativeDialer := p.network.NativeDialer()
  263. fConn, err := nativeDialer.DialContext(ctx, "tcp", p.DomainFrontingAddress())
  264. if err != nil {
  265. p.logger.WarningError("cannot dial to the fronting domain", err)
  266. return
  267. }
  268. frontConn := essentials.WrapNetConn(fConn)
  269. if p.domainFrontingProxyProtocol {
  270. frontConn = newConnProxyProtocol(ctx.clientConn, frontConn)
  271. }
  272. frontConn = connTraffic{
  273. Conn: frontConn,
  274. ctx: ctx,
  275. streamID: ctx.streamID,
  276. stream: p.eventStream,
  277. }
  278. tracker := newIdleTracker(p.idleTimeout)
  279. relay.Relay(
  280. ctx,
  281. ctx.logger.Named("domain-fronting"),
  282. connIdleTimeout{Conn: frontConn, tracker: tracker},
  283. connIdleTimeout{Conn: conn, tracker: tracker},
  284. )
  285. }
  286. // NewProxy makes a new proxy instance.
  287. func NewProxy(opts ProxyOpts) (*Proxy, error) {
  288. if err := opts.valid(); err != nil {
  289. return nil, fmt.Errorf("invalid settings: %w", err)
  290. }
  291. tg, err := dc.New(opts.getPreferIP())
  292. if err != nil {
  293. return nil, fmt.Errorf("cannot build telegram dc fetcher: %w", err)
  294. }
  295. ctx, cancel := context.WithCancel(context.Background())
  296. logger := opts.getLogger("proxy")
  297. updatersLogger := logger.Named("telegram-updaters")
  298. secretsMap := opts.getSecrets()
  299. secretNames := make([]string, 0, len(secretsMap))
  300. for name := range secretsMap {
  301. secretNames = append(secretNames, name)
  302. }
  303. sort.Strings(secretNames)
  304. secretsList := make([]Secret, 0, len(secretsMap))
  305. for _, name := range secretNames {
  306. secretsList = append(secretsList, secretsMap[name])
  307. }
  308. stats := NewProxyStats()
  309. for _, name := range secretNames {
  310. stats.PreRegister(name)
  311. }
  312. if opts.APIBindTo != "" {
  313. stats.StartServer(ctx, opts.APIBindTo, logger)
  314. }
  315. if opts.ThrottleMaxConnections > 0 {
  316. stats.SetThrottle(int64(opts.ThrottleMaxConnections), opts.getThrottleCheckInterval())
  317. stats.startThrottleLoop(ctx, logger)
  318. }
  319. proxy := &Proxy{
  320. ctx: ctx,
  321. ctxCancel: cancel,
  322. stats: stats,
  323. secrets: secretsList,
  324. secretNames: secretNames,
  325. network: opts.Network,
  326. antiReplayCache: opts.AntiReplayCache,
  327. blocklist: opts.IPBlocklist,
  328. allowlist: opts.IPAllowlist,
  329. eventStream: opts.EventStream,
  330. logger: logger,
  331. domainFrontingPort: opts.getDomainFrontingPort(),
  332. domainFrontingIP: opts.DomainFrontingIP,
  333. tolerateTimeSkewness: opts.getTolerateTimeSkewness(),
  334. idleTimeout: opts.getIdleTimeout(),
  335. allowFallbackOnUnknownDC: opts.AllowFallbackOnUnknownDC,
  336. telegram: tg,
  337. doppelGanger: doppel.NewGanger(
  338. ctx,
  339. opts.Network,
  340. logger.Named("doppelganger"),
  341. opts.DoppelGangerEach,
  342. int(opts.DoppelGangerPerRaid),
  343. opts.DoppelGangerURLs,
  344. opts.DoppelGangerDRS,
  345. ),
  346. configUpdater: dc.NewPublicConfigUpdater(
  347. tg,
  348. updatersLogger.Named("public-config"),
  349. opts.Network.MakeHTTPClient(nil),
  350. ),
  351. domainFrontingProxyProtocol: opts.DomainFrontingProxyProtocol,
  352. }
  353. proxy.doppelGanger.Run()
  354. if opts.AutoUpdate {
  355. proxy.configUpdater.Run(ctx, dc.PublicConfigUpdateURLv4, "tcp4")
  356. proxy.configUpdater.Run(ctx, dc.PublicConfigUpdateURLv6, "tcp6")
  357. }
  358. pool, err := ants.NewPoolWithFunc(opts.getConcurrency(),
  359. func(arg any) {
  360. proxy.ServeConn(arg.(essentials.Conn)) //nolint: forcetypeassert
  361. },
  362. ants.WithLogger(opts.getLogger("ants")),
  363. ants.WithNonblocking(true))
  364. if err != nil {
  365. panic(err)
  366. }
  367. proxy.workerPool = pool
  368. return proxy, nil
  369. }