Highly-opinionated (ex-bullshit-free) MTPROTO proxy for Telegram. If you use v1.0 or upgrade broke you proxy, please read the chapter Version 2
Vous ne pouvez pas sélectionner plus de 25 sujets Les noms de sujets doivent commencer par une lettre ou un nombre, peuvent contenir des tirets ('-') et peuvent comporter jusqu'à 35 caractères.

proxy.go 7.4KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313
  1. package mtglib
  2. import (
  3. "context"
  4. "errors"
  5. "fmt"
  6. "net"
  7. "strconv"
  8. "sync"
  9. "time"
  10. "github.com/9seconds/mtg/v2/mtglib/internal/faketls"
  11. "github.com/9seconds/mtg/v2/mtglib/internal/faketls/record"
  12. "github.com/9seconds/mtg/v2/mtglib/internal/obfuscated2"
  13. "github.com/9seconds/mtg/v2/mtglib/internal/relay"
  14. "github.com/9seconds/mtg/v2/mtglib/internal/telegram"
  15. "github.com/panjf2000/ants/v2"
  16. )
  17. // Proxy is an MTPROTO proxy structure.
  18. type Proxy struct {
  19. ctx context.Context
  20. ctxCancel context.CancelFunc
  21. streamWaitGroup sync.WaitGroup
  22. allowFallbackOnUnknownDC bool
  23. tolerateTimeSkewness time.Duration
  24. domainFrontingPort int
  25. workerPool *ants.PoolWithFunc
  26. telegram *telegram.Telegram
  27. secret Secret
  28. network Network
  29. antiReplayCache AntiReplayCache
  30. ipBlocklist IPBlocklist
  31. eventStream EventStream
  32. logger Logger
  33. }
  34. // DomainFrontingAddress returns a host:port pair for a fronting domain.
  35. func (p *Proxy) DomainFrontingAddress() string {
  36. return net.JoinHostPort(p.secret.Host, strconv.Itoa(p.domainFrontingPort))
  37. }
  38. // ServeConn serves a connection. We do not check IP blocklist and
  39. // concurrency limit here.
  40. func (p *Proxy) ServeConn(conn net.Conn) {
  41. p.streamWaitGroup.Add(1)
  42. defer p.streamWaitGroup.Done()
  43. ctx := newStreamContext(p.ctx, p.logger, conn)
  44. defer ctx.Close()
  45. go func() {
  46. <-ctx.Done()
  47. ctx.Close()
  48. }()
  49. p.eventStream.Send(ctx, NewEventStart(ctx.streamID, ctx.ClientIP()))
  50. ctx.logger.Info("Stream has been started")
  51. defer func() {
  52. p.eventStream.Send(ctx, NewEventFinish(ctx.streamID))
  53. ctx.logger.Info("Stream has been finished")
  54. }()
  55. if !p.doFakeTLSHandshake(ctx) {
  56. return
  57. }
  58. if err := p.doObfuscated2Handshake(ctx); err != nil {
  59. p.logger.InfoError("obfuscated2 handshake is failed", err)
  60. return
  61. }
  62. if err := p.doTelegramCall(ctx); err != nil {
  63. p.logger.WarningError("cannot dial to telegram", err)
  64. return
  65. }
  66. relay.Relay(
  67. ctx,
  68. ctx.logger.Named("relay"),
  69. ctx.telegramConn,
  70. ctx.clientConn,
  71. )
  72. }
  73. // Serve starts a proxy on a given listener.
  74. func (p *Proxy) Serve(listener net.Listener) error {
  75. p.streamWaitGroup.Add(1)
  76. defer p.streamWaitGroup.Done()
  77. for {
  78. conn, err := listener.Accept()
  79. if err != nil {
  80. select {
  81. case <-p.ctx.Done():
  82. return nil
  83. default:
  84. return fmt.Errorf("cannot accept a new connection: %w", err)
  85. }
  86. }
  87. ipAddr := conn.RemoteAddr().(*net.TCPAddr).IP
  88. logger := p.logger.BindStr("ip", ipAddr.String())
  89. if p.ipBlocklist.Contains(ipAddr) {
  90. conn.Close()
  91. logger.Info("ip was blacklisted")
  92. p.eventStream.Send(p.ctx, NewEventIPBlocklisted(ipAddr))
  93. continue
  94. }
  95. err = p.workerPool.Invoke(conn)
  96. switch {
  97. case err == nil:
  98. case errors.Is(err, ants.ErrPoolClosed):
  99. return nil
  100. case errors.Is(err, ants.ErrPoolOverload):
  101. logger.Info("connection was concurrency limited")
  102. p.eventStream.Send(p.ctx, NewEventConcurrencyLimited())
  103. }
  104. }
  105. }
  106. // Shutdown 'gracefully' shutdowns all connections. Please remember that
  107. // it does not close an underlying listener.
  108. func (p *Proxy) Shutdown() {
  109. p.ctxCancel()
  110. p.streamWaitGroup.Wait()
  111. p.workerPool.Release()
  112. }
  113. func (p *Proxy) doFakeTLSHandshake(ctx *streamContext) bool {
  114. rec := record.AcquireRecord()
  115. defer record.ReleaseRecord(rec)
  116. rewind := newConnRewind(ctx.clientConn)
  117. if err := rec.Read(rewind); err != nil {
  118. p.logger.InfoError("cannot read client hello", err)
  119. p.doDomainFronting(ctx, rewind)
  120. return false
  121. }
  122. hello, err := faketls.ParseClientHello(p.secret.Key[:], rec.Payload.Bytes())
  123. if err != nil {
  124. p.logger.InfoError("cannot parse client hello", err)
  125. p.doDomainFronting(ctx, rewind)
  126. return false
  127. }
  128. if err := hello.Valid(p.secret.Host, p.tolerateTimeSkewness); err != nil {
  129. p.logger.
  130. BindStr("hostname", hello.Host).
  131. BindStr("hello-time", hello.Time.String()).
  132. InfoError("invalid faketls client hello", err)
  133. p.doDomainFronting(ctx, rewind)
  134. return false
  135. }
  136. if p.antiReplayCache.SeenBefore(hello.SessionID) {
  137. p.logger.Warning("replay attack has been detected!")
  138. p.eventStream.Send(p.ctx, NewEventReplayAttack(ctx.streamID))
  139. p.doDomainFronting(ctx, rewind)
  140. return false
  141. }
  142. if err := faketls.SendWelcomePacket(rewind, p.secret.Key[:], hello); err != nil {
  143. p.logger.InfoError("cannot send welcome packet", err)
  144. return false
  145. }
  146. ctx.clientConn = &faketls.Conn{
  147. Conn: ctx.clientConn,
  148. }
  149. return true
  150. }
  151. func (p *Proxy) doObfuscated2Handshake(ctx *streamContext) error {
  152. dc, encryptor, decryptor, err := obfuscated2.ClientHandshake(p.secret.Key[:], ctx.clientConn)
  153. if err != nil {
  154. return fmt.Errorf("cannot process client handshake: %w", err)
  155. }
  156. ctx.dc = dc
  157. ctx.logger = ctx.logger.BindInt("dc", dc)
  158. ctx.clientConn = obfuscated2.Conn{
  159. Conn: ctx.clientConn,
  160. Encryptor: encryptor,
  161. Decryptor: decryptor,
  162. }
  163. return nil
  164. }
  165. func (p *Proxy) doTelegramCall(ctx *streamContext) error {
  166. dc := ctx.dc
  167. if p.allowFallbackOnUnknownDC && !p.telegram.IsKnownDC(dc) {
  168. dc = p.telegram.GetFallbackDC()
  169. ctx.logger = ctx.logger.BindInt("fallback_dc", dc)
  170. ctx.logger.Warning("unknown DC, fallbacks")
  171. }
  172. conn, err := p.telegram.Dial(ctx, dc)
  173. if err != nil {
  174. return fmt.Errorf("cannot dial to Telegram: %w", err)
  175. }
  176. encryptor, decryptor, err := obfuscated2.ServerHandshake(conn)
  177. if err != nil {
  178. conn.Close()
  179. return fmt.Errorf("cannot perform obfuscated2 handshake: %w", err)
  180. }
  181. ctx.telegramConn = obfuscated2.Conn{
  182. Conn: connTraffic{
  183. Conn: conn,
  184. streamID: ctx.streamID,
  185. stream: p.eventStream,
  186. ctx: ctx,
  187. },
  188. Encryptor: encryptor,
  189. Decryptor: decryptor,
  190. }
  191. p.eventStream.Send(ctx,
  192. NewEventConnectedToDC(ctx.streamID, conn.RemoteAddr().(*net.TCPAddr).IP, ctx.dc))
  193. return nil
  194. }
  195. func (p *Proxy) doDomainFronting(ctx *streamContext, conn *connRewind) {
  196. p.eventStream.Send(p.ctx, NewEventDomainFronting(ctx.streamID))
  197. conn.Rewind()
  198. frontConn, err := p.network.DialContext(ctx, "tcp", p.DomainFrontingAddress())
  199. if err != nil {
  200. p.logger.WarningError("cannot dial to the fronting domain", err)
  201. return
  202. }
  203. frontConn = connTraffic{
  204. Conn: frontConn,
  205. ctx: ctx,
  206. streamID: ctx.streamID,
  207. stream: p.eventStream,
  208. }
  209. relay.Relay(
  210. ctx,
  211. ctx.logger.Named("domain-fronting"),
  212. frontConn,
  213. conn,
  214. )
  215. }
  216. // NewProxy makes a new proxy instance.
  217. func NewProxy(opts ProxyOpts) (*Proxy, error) {
  218. if err := opts.valid(); err != nil {
  219. return nil, fmt.Errorf("invalid settings: %w", err)
  220. }
  221. tg, err := telegram.New(opts.Network, opts.getPreferIP(), opts.UseTestDCs)
  222. if err != nil {
  223. return nil, fmt.Errorf("cannot build telegram dialer: %w", err)
  224. }
  225. ctx, cancel := context.WithCancel(context.Background())
  226. proxy := &Proxy{
  227. ctx: ctx,
  228. ctxCancel: cancel,
  229. secret: opts.Secret,
  230. network: opts.Network,
  231. antiReplayCache: opts.AntiReplayCache,
  232. ipBlocklist: opts.IPBlocklist,
  233. eventStream: opts.EventStream,
  234. logger: opts.getLogger("proxy"),
  235. domainFrontingPort: opts.getDomainFrontingPort(),
  236. tolerateTimeSkewness: opts.getTolerateTimeSkewness(),
  237. allowFallbackOnUnknownDC: opts.AllowFallbackOnUnknownDC,
  238. telegram: tg,
  239. }
  240. pool, err := ants.NewPoolWithFunc(opts.getConcurrency(),
  241. func(arg interface{}) {
  242. proxy.ServeConn(arg.(net.Conn))
  243. },
  244. ants.WithLogger(opts.getLogger("ants")),
  245. ants.WithNonblocking(true))
  246. if err != nil {
  247. panic(err)
  248. }
  249. proxy.workerPool = pool
  250. return proxy, nil
  251. }