Highly-opinionated (ex-bullshit-free) MTPROTO proxy for Telegram. If you use v1.0 or upgrade broke you proxy, please read the chapter Version 2
Du kan inte välja fler än 25 ämnen Ämnen måste starta med en bokstav eller siffra, kan innehålla bindestreck ('-') och vara max 35 tecken långa.

proxy.go 9.3KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377
  1. package mtglib
  2. import (
  3. "context"
  4. "errors"
  5. "fmt"
  6. "net"
  7. "strconv"
  8. "sync"
  9. "time"
  10. "github.com/9seconds/mtg/v2/essentials"
  11. "github.com/9seconds/mtg/v2/mtglib/internal/dc"
  12. "github.com/9seconds/mtg/v2/mtglib/internal/doppel"
  13. "github.com/9seconds/mtg/v2/mtglib/internal/obfuscation"
  14. "github.com/9seconds/mtg/v2/mtglib/internal/relay"
  15. "github.com/9seconds/mtg/v2/mtglib/internal/tls"
  16. "github.com/9seconds/mtg/v2/mtglib/internal/tls/fake"
  17. "github.com/panjf2000/ants/v2"
  18. )
  19. // Proxy is an MTPROTO proxy structure.
  20. type Proxy struct {
  21. ctx context.Context
  22. ctxCancel context.CancelFunc
  23. streamWaitGroup sync.WaitGroup
  24. allowFallbackOnUnknownDC bool
  25. tolerateTimeSkewness time.Duration
  26. domainFrontingPort int
  27. domainFrontingIP string
  28. domainFrontingProxyProtocol bool
  29. workerPool *ants.PoolWithFunc
  30. telegram *dc.Telegram
  31. configUpdater *dc.PublicConfigUpdater
  32. doppelGanger *doppel.Ganger
  33. clientObfuscatror obfuscation.Obfuscator
  34. secret Secret
  35. network Network
  36. antiReplayCache AntiReplayCache
  37. blocklist IPBlocklist
  38. allowlist IPBlocklist
  39. eventStream EventStream
  40. logger Logger
  41. }
  42. // DomainFrontingAddress returns a host:port pair for a fronting domain.
  43. // If DomainFrontingIP is set, it is used instead of resolving the hostname.
  44. func (p *Proxy) DomainFrontingAddress() string {
  45. host := p.secret.Host
  46. if p.domainFrontingIP != "" {
  47. host = p.domainFrontingIP
  48. }
  49. return net.JoinHostPort(host, strconv.Itoa(p.domainFrontingPort))
  50. }
  51. // ServeConn serves a connection. We do not check IP blocklist and concurrency
  52. // limit here.
  53. func (p *Proxy) ServeConn(conn essentials.Conn) {
  54. p.streamWaitGroup.Add(1)
  55. defer p.streamWaitGroup.Done()
  56. ctx := newStreamContext(p.ctx, p.logger, conn)
  57. defer ctx.Close()
  58. go func() {
  59. <-ctx.Done()
  60. ctx.Close()
  61. }()
  62. p.eventStream.Send(ctx, NewEventStart(ctx.streamID, ctx.ClientIP()))
  63. ctx.logger.Info("Stream has been started")
  64. defer func() {
  65. p.eventStream.Send(ctx, NewEventFinish(ctx.streamID))
  66. ctx.logger.Info("Stream has been finished")
  67. }()
  68. noise, ok := p.doFakeTLSHandshake(ctx)
  69. if !ok {
  70. return
  71. }
  72. clientConn, err := p.doppelGanger.NewConn(ctx.clientConn)
  73. if err != nil {
  74. ctx.logger.InfoError("cannot wrap into doppelganger connection", err)
  75. return
  76. }
  77. defer clientConn.Stop()
  78. if _, err := clientConn.Write(noise); err != nil {
  79. ctx.logger.InfoError("cannot send the first packet", err)
  80. return
  81. }
  82. ctx.clientConn = clientConn
  83. if err := p.doObfuscatedHandshake(ctx); err != nil {
  84. ctx.logger.InfoError("obfuscated handshake is failed", err)
  85. return
  86. }
  87. if err := p.doTelegramCall(ctx); err != nil {
  88. ctx.logger.WarningError("cannot dial to telegram", err)
  89. return
  90. }
  91. relay.Relay(
  92. ctx,
  93. ctx.logger.Named("relay"),
  94. ctx.telegramConn,
  95. ctx.clientConn,
  96. )
  97. }
  98. // Serve starts a proxy on a given listener.
  99. func (p *Proxy) Serve(listener net.Listener) error {
  100. p.streamWaitGroup.Add(1)
  101. defer p.streamWaitGroup.Done()
  102. for {
  103. conn, err := listener.Accept()
  104. if err != nil {
  105. select {
  106. case <-p.ctx.Done():
  107. return nil
  108. default:
  109. return fmt.Errorf("cannot accept a new connection: %w", err)
  110. }
  111. }
  112. ipAddr := conn.RemoteAddr().(*net.TCPAddr).IP //nolint: forcetypeassert
  113. logger := p.logger.BindStr("ip", ipAddr.String())
  114. if !p.allowlist.Contains(ipAddr) {
  115. conn.Close() //nolint: errcheck
  116. logger.Info("ip was rejected by allowlist")
  117. p.eventStream.Send(p.ctx, NewEventIPAllowlisted(ipAddr))
  118. continue
  119. }
  120. if p.blocklist.Contains(ipAddr) {
  121. conn.Close() //nolint: errcheck
  122. logger.Info("ip was blacklisted")
  123. p.eventStream.Send(p.ctx, NewEventIPBlocklisted(ipAddr))
  124. continue
  125. }
  126. err = p.workerPool.Invoke(conn)
  127. switch {
  128. case err == nil:
  129. case errors.Is(err, ants.ErrPoolClosed):
  130. return nil
  131. case errors.Is(err, ants.ErrPoolOverload):
  132. logger.Info("connection was concurrency limited")
  133. p.eventStream.Send(p.ctx, NewEventConcurrencyLimited())
  134. }
  135. }
  136. }
  137. // Shutdown 'gracefully' shutdowns all connections. Please remember that it
  138. // does not close an underlying listener.
  139. func (p *Proxy) Shutdown() {
  140. p.ctxCancel()
  141. p.streamWaitGroup.Wait()
  142. p.workerPool.Release()
  143. p.configUpdater.Wait()
  144. p.doppelGanger.Shutdown()
  145. p.allowlist.Shutdown()
  146. p.blocklist.Shutdown()
  147. }
  148. func (p *Proxy) doFakeTLSHandshake(ctx *streamContext) ([]byte, bool) {
  149. rewind := newConnRewind(ctx.clientConn)
  150. clientHello, err := fake.ReadClientHello(
  151. rewind,
  152. p.secret.Key[:],
  153. p.secret.Host,
  154. p.tolerateTimeSkewness,
  155. )
  156. if err != nil {
  157. p.logger.InfoError("cannot read client hello", err)
  158. p.doDomainFronting(ctx, rewind)
  159. return nil, false
  160. }
  161. if p.antiReplayCache.SeenBefore(clientHello.SessionID) {
  162. p.logger.Warning("replay attack has been detected!")
  163. p.eventStream.Send(p.ctx, NewEventReplayAttack(ctx.streamID))
  164. p.doDomainFronting(ctx, rewind)
  165. return nil, false
  166. }
  167. noise, err := fake.SendServerHello(ctx.clientConn, p.secret.Key[:], clientHello)
  168. if err != nil {
  169. p.logger.InfoError("cannot send welcome packet", err)
  170. return nil, false
  171. }
  172. ctx.clientConn = tls.New(ctx.clientConn, true, true)
  173. return noise, true
  174. }
  175. func (p *Proxy) doObfuscatedHandshake(ctx *streamContext) error {
  176. dc, conn, err := p.clientObfuscatror.ReadHandshake(ctx.clientConn)
  177. if err != nil {
  178. return fmt.Errorf("cannot process client handshake: %w", err)
  179. }
  180. ctx.dc = dc
  181. ctx.clientConn = conn
  182. ctx.logger = ctx.logger.BindInt("dc", dc)
  183. return nil
  184. }
  185. func (p *Proxy) doTelegramCall(ctx *streamContext) error {
  186. dcid := ctx.dc
  187. addresses := p.telegram.GetAddresses(dcid)
  188. if len(addresses) == 0 && p.allowFallbackOnUnknownDC {
  189. ctx.logger = ctx.logger.BindInt("original_dc", dcid)
  190. ctx.logger.Warning("unknown DC, fallbacks")
  191. ctx.dc = dc.DefaultDC
  192. addresses = p.telegram.GetAddresses(dc.DefaultDC)
  193. }
  194. var (
  195. conn essentials.Conn
  196. err error
  197. foundAddr dc.Addr
  198. )
  199. for _, addr := range addresses {
  200. conn, err = p.network.Dial(addr.Network, addr.Address)
  201. if err == nil {
  202. foundAddr = addr
  203. break
  204. }
  205. }
  206. if err != nil {
  207. return fmt.Errorf("no addresses to call: %w", err)
  208. }
  209. if conn == nil {
  210. return fmt.Errorf("no available addresses for DC %d", ctx.dc)
  211. }
  212. tgConn, err := foundAddr.Obfuscator.SendHandshake(conn, ctx.dc)
  213. if err != nil {
  214. conn.Close() // nolint: errcheck
  215. return fmt.Errorf("cannot perform server handshake: %w", err)
  216. }
  217. ctx.telegramConn = connTraffic{
  218. Conn: tgConn,
  219. streamID: ctx.streamID,
  220. stream: p.eventStream,
  221. ctx: ctx,
  222. }
  223. p.eventStream.Send(ctx,
  224. NewEventConnectedToDC(ctx.streamID,
  225. conn.RemoteAddr().(*net.TCPAddr).IP, //nolint: forcetypeassert
  226. ctx.dc),
  227. )
  228. return nil
  229. }
  230. func (p *Proxy) doDomainFronting(ctx *streamContext, conn *connRewind) {
  231. p.eventStream.Send(p.ctx, NewEventDomainFronting(ctx.streamID))
  232. conn.Rewind()
  233. frontConn, err := p.network.DialContext(ctx, "tcp", p.DomainFrontingAddress())
  234. if err != nil {
  235. p.logger.WarningError("cannot dial to the fronting domain", err)
  236. return
  237. }
  238. if p.domainFrontingProxyProtocol {
  239. frontConn = newConnProxyProtocol(ctx.clientConn, frontConn)
  240. }
  241. frontConn = connTraffic{
  242. Conn: frontConn,
  243. ctx: ctx,
  244. streamID: ctx.streamID,
  245. stream: p.eventStream,
  246. }
  247. relay.Relay(
  248. ctx,
  249. ctx.logger.Named("domain-fronting"),
  250. frontConn,
  251. conn,
  252. )
  253. }
  254. // NewProxy makes a new proxy instance.
  255. func NewProxy(opts ProxyOpts) (*Proxy, error) {
  256. if err := opts.valid(); err != nil {
  257. return nil, fmt.Errorf("invalid settings: %w", err)
  258. }
  259. tg, err := dc.New(opts.getPreferIP())
  260. if err != nil {
  261. return nil, fmt.Errorf("cannot build telegram dc fetcher: %w", err)
  262. }
  263. ctx, cancel := context.WithCancel(context.Background())
  264. logger := opts.getLogger("proxy")
  265. updatersLogger := logger.Named("telegram-updaters")
  266. proxy := &Proxy{
  267. ctx: ctx,
  268. ctxCancel: cancel,
  269. secret: opts.Secret,
  270. network: opts.Network,
  271. antiReplayCache: opts.AntiReplayCache,
  272. blocklist: opts.IPBlocklist,
  273. allowlist: opts.IPAllowlist,
  274. eventStream: opts.EventStream,
  275. logger: logger,
  276. domainFrontingPort: opts.getDomainFrontingPort(),
  277. domainFrontingIP: opts.DomainFrontingIP,
  278. tolerateTimeSkewness: opts.getTolerateTimeSkewness(),
  279. allowFallbackOnUnknownDC: opts.AllowFallbackOnUnknownDC,
  280. telegram: tg,
  281. doppelGanger: doppel.NewGanger(
  282. ctx,
  283. opts.Network,
  284. logger.Named("doppelganger"),
  285. opts.DoppelGangerEach,
  286. int(opts.DoppelGangerPerRaid),
  287. opts.DoppelGangerURLs,
  288. ),
  289. configUpdater: dc.NewPublicConfigUpdater(
  290. tg,
  291. updatersLogger.Named("public-config"),
  292. opts.Network.MakeHTTPClient(nil),
  293. ),
  294. clientObfuscatror: obfuscation.Obfuscator{
  295. Secret: opts.Secret.Key[:],
  296. },
  297. domainFrontingProxyProtocol: opts.DomainFrontingProxyProtocol,
  298. }
  299. proxy.doppelGanger.Run()
  300. if opts.AutoUpdate {
  301. proxy.configUpdater.Run(ctx, dc.PublicConfigUpdateURLv4, "tcp4")
  302. proxy.configUpdater.Run(ctx, dc.PublicConfigUpdateURLv6, "tcp6")
  303. }
  304. pool, err := ants.NewPoolWithFunc(opts.getConcurrency(),
  305. func(arg any) {
  306. proxy.ServeConn(arg.(essentials.Conn)) //nolint: forcetypeassert
  307. },
  308. ants.WithLogger(opts.getLogger("ants")),
  309. ants.WithNonblocking(true))
  310. if err != nil {
  311. panic(err)
  312. }
  313. proxy.workerPool = pool
  314. return proxy, nil
  315. }