Highly-opinionated (ex-bullshit-free) MTPROTO proxy for Telegram. If you use v1.0 or upgrade broke you proxy, please read the chapter Version 2
選択できるのは25トピックまでです。 トピックは、先頭が英数字で、英数字とダッシュ('-')を使用した35文字以内のものにしてください。

proxy.go 8.2KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347
  1. package mtglib
  2. import (
  3. "context"
  4. "errors"
  5. "fmt"
  6. "net"
  7. "strconv"
  8. "sync"
  9. "time"
  10. "github.com/9seconds/mtg/v2/mtglib/internal/faketls"
  11. "github.com/9seconds/mtg/v2/mtglib/internal/faketls/record"
  12. "github.com/9seconds/mtg/v2/mtglib/internal/obfuscated2"
  13. "github.com/9seconds/mtg/v2/mtglib/internal/relay"
  14. "github.com/9seconds/mtg/v2/mtglib/internal/telegram"
  15. "github.com/panjf2000/ants/v2"
  16. )
  17. type Proxy struct {
  18. ctx context.Context
  19. ctxCancel context.CancelFunc
  20. streamWaitGroup sync.WaitGroup
  21. idleTimeout time.Duration
  22. bufferSize int
  23. domainFrontingPort int
  24. workerPool *ants.PoolWithFunc
  25. telegram *telegram.Telegram
  26. secret Secret
  27. network Network
  28. antiReplayCache AntiReplayCache
  29. timeAttackDetector TimeAttackDetector
  30. ipBlocklist IPBlocklist
  31. eventStream EventStream
  32. logger Logger
  33. }
  34. func (p *Proxy) DomainFrontingAddress() string {
  35. return net.JoinHostPort(p.secret.Host, strconv.Itoa(p.domainFrontingPort))
  36. }
  37. func (p *Proxy) ServeConn(conn net.Conn) {
  38. ctx := newStreamContext(p.ctx, p.logger, conn)
  39. defer ctx.Close()
  40. go func() {
  41. <-ctx.Done()
  42. ctx.Close()
  43. }()
  44. p.eventStream.Send(ctx, EventStart{
  45. CreatedAt: time.Now(),
  46. ConnID: ctx.connID,
  47. RemoteIP: ctx.ClientIP(),
  48. })
  49. ctx.logger.Info("Stream has been started")
  50. defer func() {
  51. p.eventStream.Send(ctx, EventFinish{
  52. CreatedAt: time.Now(),
  53. ConnID: ctx.connID,
  54. })
  55. ctx.logger.Info("Stream has been finished")
  56. }()
  57. if !p.doFakeTLSHandshake(ctx) {
  58. return
  59. }
  60. if err := p.doObfuscated2Handshake(ctx); err != nil {
  61. p.logger.InfoError("obfuscated2 handshake is failed", err)
  62. return
  63. }
  64. if err := p.doTelegramCall(ctx); err != nil {
  65. p.logger.WarningError("cannot dial to telegram", err)
  66. return
  67. }
  68. rel := relay.AcquireRelay(ctx,
  69. p.logger.Named("relay"), p.bufferSize, p.idleTimeout)
  70. defer relay.ReleaseRelay(rel)
  71. if err := rel.Process(ctx.clientConn, ctx.telegramConn); err != nil {
  72. p.logger.DebugError("relay has been finished", err)
  73. }
  74. }
  75. func (p *Proxy) Serve(listener net.Listener) error {
  76. for {
  77. conn, err := listener.Accept()
  78. if err != nil {
  79. return fmt.Errorf("cannot accept a new connection: %w", err)
  80. }
  81. if addr := conn.RemoteAddr().(*net.TCPAddr).IP; p.ipBlocklist.Contains(addr) {
  82. conn.Close()
  83. p.logger.
  84. BindStr("ip", conn.RemoteAddr().(*net.TCPAddr).IP.String()).
  85. Info("ip was blacklisted")
  86. p.eventStream.Send(p.ctx, EventIPBlocklisted{
  87. CreatedAt: time.Now(),
  88. RemoteIP: addr,
  89. })
  90. continue
  91. }
  92. err = p.workerPool.Invoke(conn)
  93. switch {
  94. case err == nil:
  95. case errors.Is(err, ants.ErrPoolClosed):
  96. return nil
  97. case errors.Is(err, ants.ErrPoolOverload):
  98. p.logger.
  99. BindStr("ip", conn.RemoteAddr().(*net.TCPAddr).IP.String()).
  100. Info("connection was concurrency limited")
  101. p.eventStream.Send(p.ctx, EventConcurrencyLimited{
  102. CreatedAt: time.Now(),
  103. })
  104. }
  105. }
  106. }
  107. func (p *Proxy) Shutdown() {
  108. p.ctxCancel()
  109. p.streamWaitGroup.Wait()
  110. p.workerPool.Release()
  111. }
  112. func (p *Proxy) doFakeTLSHandshake(ctx *streamContext) bool {
  113. rec := record.AcquireRecord()
  114. defer record.ReleaseRecord(rec)
  115. rewind := newConnRewind(ctx.clientConn)
  116. if err := rec.Read(rewind); err != nil {
  117. p.logger.InfoError("cannot read client hello", err)
  118. p.doDomainFronting(ctx, rewind)
  119. return false
  120. }
  121. hello, err := faketls.ParseClientHello(p.secret.Key[:], rec.Payload.Bytes())
  122. if err != nil {
  123. p.logger.InfoError("cannot parse client hello", err)
  124. p.doDomainFronting(ctx, rewind)
  125. return false
  126. }
  127. if hello.Host != "" && hello.Host != p.secret.Host {
  128. p.logger.BindStr("hostname", hello.Host).Info("incorrect domain was found in SNI")
  129. p.doDomainFronting(ctx, rewind)
  130. return false
  131. }
  132. if err := p.timeAttackDetector.Valid(hello.Time); err != nil {
  133. p.logger.InfoError("invalid faketls time", err)
  134. p.doDomainFronting(ctx, rewind)
  135. return false
  136. }
  137. if p.antiReplayCache.SeenBefore(hello.SessionID) {
  138. p.logger.Warning("replay attack has been detected!")
  139. p.eventStream.Send(p.ctx, EventReplayAttack{
  140. CreatedAt: time.Now(),
  141. ConnID: ctx.connID,
  142. })
  143. p.doDomainFronting(ctx, rewind)
  144. return false
  145. }
  146. if err := faketls.SendWelcomePacket(rewind, p.secret.Key[:], hello); err != nil {
  147. p.logger.InfoError("cannot send welcome packet", err)
  148. return false
  149. }
  150. ctx.clientConn = &faketls.Conn{
  151. Conn: ctx.clientConn,
  152. }
  153. return true
  154. }
  155. func (p *Proxy) doObfuscated2Handshake(ctx *streamContext) error {
  156. dc, encryptor, decryptor, err := obfuscated2.ClientHandshake(p.secret.Key[:], ctx.clientConn)
  157. if err != nil {
  158. return fmt.Errorf("cannot process client handshake: %w", err)
  159. }
  160. ctx.dc = dc
  161. ctx.logger = ctx.logger.BindInt("dc", dc)
  162. ctx.clientConn = obfuscated2.Conn{
  163. Conn: ctx.clientConn,
  164. Encryptor: encryptor,
  165. Decryptor: decryptor,
  166. }
  167. return nil
  168. }
  169. func (p *Proxy) doTelegramCall(ctx *streamContext) error {
  170. conn, err := p.telegram.Dial(ctx, ctx.dc)
  171. if err != nil {
  172. return fmt.Errorf("cannot dial to Telegram: %w", err)
  173. }
  174. encryptor, decryptor, err := obfuscated2.ServerHandshake(conn)
  175. if err != nil {
  176. conn.Close()
  177. return fmt.Errorf("cannot perform obfuscated2 handshake: %w", err)
  178. }
  179. ctx.telegramConn = obfuscated2.Conn{
  180. Conn: connTraffic{
  181. Conn: conn,
  182. connID: ctx.connID,
  183. stream: p.eventStream,
  184. ctx: ctx,
  185. },
  186. Encryptor: encryptor,
  187. Decryptor: decryptor,
  188. }
  189. p.eventStream.Send(ctx, EventConnectedToDC{
  190. CreatedAt: time.Now(),
  191. ConnID: ctx.connID,
  192. RemoteIP: conn.RemoteAddr().(*net.TCPAddr).IP,
  193. DC: ctx.dc,
  194. })
  195. return nil
  196. }
  197. func (p *Proxy) doDomainFronting(ctx *streamContext, conn *connRewind) {
  198. p.eventStream.Send(p.ctx, EventDomainFronting{
  199. CreatedAt: time.Now(),
  200. ConnID: ctx.connID,
  201. })
  202. conn.Rewind()
  203. frontConn, err := p.network.DialContext(ctx, "tcp", p.DomainFrontingAddress())
  204. if err != nil {
  205. p.logger.WarningError("cannot dial to the fronting domain", err)
  206. return
  207. }
  208. frontConn = connTraffic{
  209. Conn: frontConn,
  210. ctx: ctx,
  211. connID: ctx.connID,
  212. stream: p.eventStream,
  213. }
  214. rel := relay.AcquireRelay(ctx,
  215. p.logger.Named("domain-fronting"), p.bufferSize, p.idleTimeout)
  216. defer relay.ReleaseRelay(rel)
  217. if err := rel.Process(conn, frontConn); err != nil {
  218. p.logger.DebugError("domain fronting relay has been finished", err)
  219. }
  220. }
  221. func NewProxy(opts ProxyOpts) (*Proxy, error) { // nolint: cyclop, funlen
  222. switch {
  223. case opts.Network == nil:
  224. return nil, ErrNetworkIsNotDefined
  225. case opts.AntiReplayCache == nil:
  226. return nil, ErrAntiReplayCacheIsNotDefined
  227. case opts.IPBlocklist == nil:
  228. return nil, ErrIPBlocklistIsNotDefined
  229. case opts.EventStream == nil:
  230. return nil, ErrEventStreamIsNotDefined
  231. case opts.TimeAttackDetector == nil:
  232. return nil, ErrTimeAttackDetectorIsNotDefined
  233. case opts.Logger == nil:
  234. return nil, ErrLoggerIsNotDefined
  235. case !opts.Secret.Valid():
  236. return nil, ErrSecretInvalid
  237. }
  238. tg, err := telegram.New(opts.Network, opts.PreferIP)
  239. if err != nil {
  240. return nil, fmt.Errorf("cannot build telegram dialer: %w", err)
  241. }
  242. concurrency := opts.Concurrency
  243. if concurrency == 0 {
  244. concurrency = DefaultConcurrency
  245. }
  246. idleTimeout := opts.IdleTimeout
  247. if idleTimeout < 1 {
  248. idleTimeout = DefaultIdleTimeout
  249. }
  250. bufferSize := opts.BufferSize
  251. if bufferSize < 1 {
  252. bufferSize = DefaultBufferSize
  253. }
  254. domainFrontingPort := int(opts.DomainFrontingPort)
  255. if domainFrontingPort == 0 {
  256. domainFrontingPort = DefaultDomainFrontingPort
  257. }
  258. ctx, cancel := context.WithCancel(context.Background())
  259. proxy := &Proxy{
  260. ctx: ctx,
  261. ctxCancel: cancel,
  262. secret: opts.Secret,
  263. network: opts.Network,
  264. antiReplayCache: opts.AntiReplayCache,
  265. timeAttackDetector: opts.TimeAttackDetector,
  266. ipBlocklist: opts.IPBlocklist,
  267. eventStream: opts.EventStream,
  268. logger: opts.Logger.Named("proxy"),
  269. domainFrontingPort: int(domainFrontingPort),
  270. idleTimeout: idleTimeout,
  271. bufferSize: int(bufferSize),
  272. telegram: tg,
  273. }
  274. pool, err := ants.NewPoolWithFunc(int(concurrency), func(arg interface{}) {
  275. proxy.ServeConn(arg.(net.Conn))
  276. }, ants.WithLogger(opts.Logger.Named("ants")))
  277. if err != nil {
  278. return nil, fmt.Errorf("cannot initialize a pool: %w", err)
  279. }
  280. proxy.workerPool = pool
  281. return proxy, nil
  282. }