| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330 |
- package mtglib
-
- import (
- "context"
- "errors"
- "fmt"
- "net"
- "strconv"
- "sync"
- "time"
-
- "github.com/9seconds/mtg/v2/essentials"
- "github.com/9seconds/mtg/v2/mtglib/internal/faketls"
- "github.com/9seconds/mtg/v2/mtglib/internal/faketls/record"
- "github.com/9seconds/mtg/v2/mtglib/internal/obfuscated2"
- "github.com/9seconds/mtg/v2/mtglib/internal/relay"
- "github.com/9seconds/mtg/v2/mtglib/internal/telegram"
- "github.com/panjf2000/ants/v2"
- )
-
- // Proxy is an MTPROTO proxy structure.
- type Proxy struct {
- ctx context.Context
- ctxCancel context.CancelFunc
- streamWaitGroup sync.WaitGroup
-
- allowFallbackOnUnknownDC bool
- tolerateTimeSkewness time.Duration
- domainFrontingPort int
- workerPool *ants.PoolWithFunc
- telegram *telegram.Telegram
-
- secret Secret
- network Network
- antiReplayCache AntiReplayCache
- blocklist IPBlocklist
- whitelist IPBlocklist
- eventStream EventStream
- logger Logger
- }
-
- // DomainFrontingAddress returns a host:port pair for a fronting domain.
- func (p *Proxy) DomainFrontingAddress() string {
- return net.JoinHostPort(p.secret.Host, strconv.Itoa(p.domainFrontingPort))
- }
-
- // ServeConn serves a connection. We do not check IP blocklist and
- // concurrency limit here.
- func (p *Proxy) ServeConn(conn essentials.Conn) {
- p.streamWaitGroup.Add(1)
- defer p.streamWaitGroup.Done()
-
- ctx := newStreamContext(p.ctx, p.logger, conn)
- defer ctx.Close()
-
- go func() {
- <-ctx.Done()
- ctx.Close()
- }()
-
- p.eventStream.Send(ctx, NewEventStart(ctx.streamID, ctx.ClientIP()))
- ctx.logger.Info("Stream has been started")
-
- defer func() {
- p.eventStream.Send(ctx, NewEventFinish(ctx.streamID))
- ctx.logger.Info("Stream has been finished")
- }()
-
- if !p.doFakeTLSHandshake(ctx) {
- return
- }
-
- if err := p.doObfuscated2Handshake(ctx); err != nil {
- p.logger.InfoError("obfuscated2 handshake is failed", err)
-
- return
- }
-
- if err := p.doTelegramCall(ctx); err != nil {
- p.logger.WarningError("cannot dial to telegram", err)
-
- return
- }
-
- relay.Relay(
- ctx,
- ctx.logger.Named("relay"),
- ctx.telegramConn,
- ctx.clientConn,
- )
- }
-
- // Serve starts a proxy on a given listener.
- func (p *Proxy) Serve(listener net.Listener) error { // nolint: cyclop
- p.streamWaitGroup.Add(1)
- defer p.streamWaitGroup.Done()
-
- for {
- conn, err := listener.Accept()
- if err != nil {
- select {
- case <-p.ctx.Done():
- return nil
- default:
- return fmt.Errorf("cannot accept a new connection: %w", err)
- }
- }
-
- ipAddr := conn.RemoteAddr().(*net.TCPAddr).IP
- logger := p.logger.BindStr("ip", ipAddr.String())
-
- if p.whitelist != nil && !p.whitelist.Contains(ipAddr) {
- conn.Close()
- logger.Info("ip was rejected by whitelist")
- p.eventStream.Send(p.ctx, NewEventIPBlocklisted(ipAddr))
-
- continue
- }
-
- if p.blocklist.Contains(ipAddr) {
- conn.Close()
- logger.Info("ip was blacklisted")
- p.eventStream.Send(p.ctx, NewEventIPBlocklisted(ipAddr))
-
- continue
- }
-
- err = p.workerPool.Invoke(conn)
-
- switch {
- case err == nil:
- case errors.Is(err, ants.ErrPoolClosed):
- return nil
- case errors.Is(err, ants.ErrPoolOverload):
- logger.Info("connection was concurrency limited")
- p.eventStream.Send(p.ctx, NewEventConcurrencyLimited())
- }
- }
- }
-
- // Shutdown 'gracefully' shutdowns all connections. Please remember that
- // it does not close an underlying listener.
- func (p *Proxy) Shutdown() {
- p.ctxCancel()
- p.streamWaitGroup.Wait()
- p.workerPool.Release()
-
- if p.whitelist != nil {
- p.whitelist.Shutdown()
- }
-
- p.blocklist.Shutdown()
- }
-
- func (p *Proxy) doFakeTLSHandshake(ctx *streamContext) bool {
- rec := record.AcquireRecord()
- defer record.ReleaseRecord(rec)
-
- rewind := newConnRewind(ctx.clientConn)
-
- if err := rec.Read(rewind); err != nil {
- p.logger.InfoError("cannot read client hello", err)
- p.doDomainFronting(ctx, rewind)
-
- return false
- }
-
- hello, err := faketls.ParseClientHello(p.secret.Key[:], rec.Payload.Bytes())
- if err != nil {
- p.logger.InfoError("cannot parse client hello", err)
- p.doDomainFronting(ctx, rewind)
-
- return false
- }
-
- if err := hello.Valid(p.secret.Host, p.tolerateTimeSkewness); err != nil {
- p.logger.
- BindStr("hostname", hello.Host).
- BindStr("hello-time", hello.Time.String()).
- InfoError("invalid faketls client hello", err)
- p.doDomainFronting(ctx, rewind)
-
- return false
- }
-
- if p.antiReplayCache.SeenBefore(hello.SessionID) {
- p.logger.Warning("replay attack has been detected!")
- p.eventStream.Send(p.ctx, NewEventReplayAttack(ctx.streamID))
- p.doDomainFronting(ctx, rewind)
-
- return false
- }
-
- if err := faketls.SendWelcomePacket(rewind, p.secret.Key[:], hello); err != nil {
- p.logger.InfoError("cannot send welcome packet", err)
-
- return false
- }
-
- ctx.clientConn = &faketls.Conn{
- Conn: ctx.clientConn,
- }
-
- return true
- }
-
- func (p *Proxy) doObfuscated2Handshake(ctx *streamContext) error {
- dc, encryptor, decryptor, err := obfuscated2.ClientHandshake(p.secret.Key[:], ctx.clientConn)
- if err != nil {
- return fmt.Errorf("cannot process client handshake: %w", err)
- }
-
- ctx.dc = dc
- ctx.logger = ctx.logger.BindInt("dc", dc)
- ctx.clientConn = obfuscated2.Conn{
- Conn: ctx.clientConn,
- Encryptor: encryptor,
- Decryptor: decryptor,
- }
-
- return nil
- }
-
- func (p *Proxy) doTelegramCall(ctx *streamContext) error {
- dc := ctx.dc
-
- if p.allowFallbackOnUnknownDC && !p.telegram.IsKnownDC(dc) {
- dc = p.telegram.GetFallbackDC()
- ctx.logger = ctx.logger.BindInt("fallback_dc", dc)
-
- ctx.logger.Warning("unknown DC, fallbacks")
- }
-
- conn, err := p.telegram.Dial(ctx, dc)
- if err != nil {
- return fmt.Errorf("cannot dial to Telegram: %w", err)
- }
-
- encryptor, decryptor, err := obfuscated2.ServerHandshake(conn)
- if err != nil {
- conn.Close()
-
- return fmt.Errorf("cannot perform obfuscated2 handshake: %w", err)
- }
-
- ctx.telegramConn = obfuscated2.Conn{
- Conn: connTraffic{
- Conn: conn,
- streamID: ctx.streamID,
- stream: p.eventStream,
- ctx: ctx,
- },
- Encryptor: encryptor,
- Decryptor: decryptor,
- }
-
- p.eventStream.Send(ctx,
- NewEventConnectedToDC(ctx.streamID, conn.RemoteAddr().(*net.TCPAddr).IP, ctx.dc))
-
- return nil
- }
-
- func (p *Proxy) doDomainFronting(ctx *streamContext, conn *connRewind) {
- p.eventStream.Send(p.ctx, NewEventDomainFronting(ctx.streamID))
- conn.Rewind()
-
- frontConn, err := p.network.DialContext(ctx, "tcp", p.DomainFrontingAddress())
- if err != nil {
- p.logger.WarningError("cannot dial to the fronting domain", err)
-
- return
- }
-
- frontConn = connTraffic{
- Conn: frontConn,
- ctx: ctx,
- streamID: ctx.streamID,
- stream: p.eventStream,
- }
-
- relay.Relay(
- ctx,
- ctx.logger.Named("domain-fronting"),
- frontConn,
- conn,
- )
- }
-
- // NewProxy makes a new proxy instance.
- func NewProxy(opts ProxyOpts) (*Proxy, error) {
- if err := opts.valid(); err != nil {
- return nil, fmt.Errorf("invalid settings: %w", err)
- }
-
- tg, err := telegram.New(opts.Network, opts.getPreferIP(), opts.UseTestDCs)
- if err != nil {
- return nil, fmt.Errorf("cannot build telegram dialer: %w", err)
- }
-
- ctx, cancel := context.WithCancel(context.Background())
- proxy := &Proxy{
- ctx: ctx,
- ctxCancel: cancel,
- secret: opts.Secret,
- network: opts.Network,
- antiReplayCache: opts.AntiReplayCache,
- blocklist: opts.IPBlocklist,
- whitelist: opts.IPWhitelist,
- eventStream: opts.EventStream,
- logger: opts.getLogger("proxy"),
- domainFrontingPort: opts.getDomainFrontingPort(),
- tolerateTimeSkewness: opts.getTolerateTimeSkewness(),
- allowFallbackOnUnknownDC: opts.AllowFallbackOnUnknownDC,
- telegram: tg,
- }
-
- pool, err := ants.NewPoolWithFunc(opts.getConcurrency(),
- func(arg interface{}) {
- proxy.ServeConn(arg.(essentials.Conn))
- },
- ants.WithLogger(opts.getLogger("ants")),
- ants.WithNonblocking(true))
- if err != nil {
- panic(err)
- }
-
- proxy.workerPool = pool
-
- return proxy, nil
- }
|