Highly-opinionated (ex-bullshit-free) MTPROTO proxy for Telegram. If you use v1.0 or upgrade broke you proxy, please read the chapter Version 2
Você não pode selecionar mais de 25 tópicos Os tópicos devem começar com uma letra ou um número, podem incluir traços ('-') e podem ter até 35 caracteres.

proxy.go 8.2KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342
  1. package mtglib
  2. import (
  3. "context"
  4. "errors"
  5. "fmt"
  6. "net"
  7. "strconv"
  8. "sync"
  9. "time"
  10. "github.com/9seconds/mtg/v2/essentials"
  11. "github.com/9seconds/mtg/v2/mtglib/internal/dc"
  12. "github.com/9seconds/mtg/v2/mtglib/internal/faketls"
  13. "github.com/9seconds/mtg/v2/mtglib/internal/faketls/record"
  14. "github.com/9seconds/mtg/v2/mtglib/internal/obfuscated2"
  15. "github.com/9seconds/mtg/v2/mtglib/internal/relay"
  16. "github.com/panjf2000/ants/v2"
  17. )
  18. // Proxy is an MTPROTO proxy structure.
  19. type Proxy struct {
  20. ctx context.Context
  21. ctxCancel context.CancelFunc
  22. streamWaitGroup sync.WaitGroup
  23. allowFallbackOnUnknownDC bool
  24. tolerateTimeSkewness time.Duration
  25. domainFrontingPort int
  26. workerPool *ants.PoolWithFunc
  27. telegram *dc.Telegram
  28. secret Secret
  29. network Network
  30. antiReplayCache AntiReplayCache
  31. blocklist IPBlocklist
  32. allowlist IPBlocklist
  33. eventStream EventStream
  34. logger Logger
  35. }
  36. // DomainFrontingAddress returns a host:port pair for a fronting domain.
  37. func (p *Proxy) DomainFrontingAddress() string {
  38. return net.JoinHostPort(p.secret.Host, strconv.Itoa(p.domainFrontingPort))
  39. }
  40. // ServeConn serves a connection. We do not check IP blocklist and concurrency
  41. // limit here.
  42. func (p *Proxy) ServeConn(conn essentials.Conn) {
  43. p.streamWaitGroup.Add(1)
  44. defer p.streamWaitGroup.Done()
  45. ctx := newStreamContext(p.ctx, p.logger, conn)
  46. defer ctx.Close()
  47. go func() {
  48. <-ctx.Done()
  49. ctx.Close()
  50. }()
  51. p.eventStream.Send(ctx, NewEventStart(ctx.streamID, ctx.ClientIP()))
  52. ctx.logger.Info("Stream has been started")
  53. defer func() {
  54. p.eventStream.Send(ctx, NewEventFinish(ctx.streamID))
  55. ctx.logger.Info("Stream has been finished")
  56. }()
  57. if !p.doFakeTLSHandshake(ctx) {
  58. return
  59. }
  60. if err := p.doObfuscated2Handshake(ctx); err != nil {
  61. p.logger.InfoError("obfuscated2 handshake is failed", err)
  62. return
  63. }
  64. if err := p.doTelegramCall(ctx); err != nil {
  65. p.logger.WarningError("cannot dial to telegram", err)
  66. return
  67. }
  68. relay.Relay(
  69. ctx,
  70. ctx.logger.Named("relay"),
  71. ctx.telegramConn,
  72. ctx.clientConn,
  73. )
  74. }
  75. // Serve starts a proxy on a given listener.
  76. func (p *Proxy) Serve(listener net.Listener) error {
  77. p.streamWaitGroup.Add(1)
  78. defer p.streamWaitGroup.Done()
  79. for {
  80. conn, err := listener.Accept()
  81. if err != nil {
  82. select {
  83. case <-p.ctx.Done():
  84. return nil
  85. default:
  86. return fmt.Errorf("cannot accept a new connection: %w", err)
  87. }
  88. }
  89. ipAddr := conn.RemoteAddr().(*net.TCPAddr).IP //nolint: forcetypeassert
  90. logger := p.logger.BindStr("ip", ipAddr.String())
  91. if !p.allowlist.Contains(ipAddr) {
  92. conn.Close() //nolint: errcheck
  93. logger.Info("ip was rejected by allowlist")
  94. p.eventStream.Send(p.ctx, NewEventIPAllowlisted(ipAddr))
  95. continue
  96. }
  97. if p.blocklist.Contains(ipAddr) {
  98. conn.Close() //nolint: errcheck
  99. logger.Info("ip was blacklisted")
  100. p.eventStream.Send(p.ctx, NewEventIPBlocklisted(ipAddr))
  101. continue
  102. }
  103. err = p.workerPool.Invoke(conn)
  104. switch {
  105. case err == nil:
  106. case errors.Is(err, ants.ErrPoolClosed):
  107. return nil
  108. case errors.Is(err, ants.ErrPoolOverload):
  109. logger.Info("connection was concurrency limited")
  110. p.eventStream.Send(p.ctx, NewEventConcurrencyLimited())
  111. }
  112. }
  113. }
  114. // Shutdown 'gracefully' shutdowns all connections. Please remember that it
  115. // does not close an underlying listener.
  116. func (p *Proxy) Shutdown() {
  117. p.ctxCancel()
  118. p.streamWaitGroup.Wait()
  119. p.workerPool.Release()
  120. p.allowlist.Shutdown()
  121. p.blocklist.Shutdown()
  122. }
  123. func (p *Proxy) doFakeTLSHandshake(ctx *streamContext) bool {
  124. rec := record.AcquireRecord()
  125. defer record.ReleaseRecord(rec)
  126. rewind := newConnRewind(ctx.clientConn)
  127. if err := rec.Read(rewind); err != nil {
  128. p.logger.InfoError("cannot read client hello", err)
  129. p.doDomainFronting(ctx, rewind)
  130. return false
  131. }
  132. hello, err := faketls.ParseClientHello(p.secret.Key[:], rec.Payload.Bytes())
  133. if err != nil {
  134. p.logger.InfoError("cannot parse client hello", err)
  135. p.doDomainFronting(ctx, rewind)
  136. return false
  137. }
  138. if err := hello.Valid(p.secret.Host, p.tolerateTimeSkewness); err != nil {
  139. p.logger.
  140. BindStr("hostname", hello.Host).
  141. BindStr("hello-time", hello.Time.String()).
  142. InfoError("invalid faketls client hello", err)
  143. p.doDomainFronting(ctx, rewind)
  144. return false
  145. }
  146. if p.antiReplayCache.SeenBefore(hello.SessionID) {
  147. p.logger.Warning("replay attack has been detected!")
  148. p.eventStream.Send(p.ctx, NewEventReplayAttack(ctx.streamID))
  149. p.doDomainFronting(ctx, rewind)
  150. return false
  151. }
  152. if err := faketls.SendWelcomePacket(rewind, p.secret.Key[:], hello); err != nil {
  153. p.logger.InfoError("cannot send welcome packet", err)
  154. return false
  155. }
  156. ctx.clientConn = &faketls.Conn{
  157. Conn: ctx.clientConn,
  158. }
  159. return true
  160. }
  161. func (p *Proxy) doObfuscated2Handshake(ctx *streamContext) error {
  162. dc, encryptor, decryptor, err := obfuscated2.ClientHandshake(p.secret.Key[:], ctx.clientConn)
  163. if err != nil {
  164. return fmt.Errorf("cannot process client handshake: %w", err)
  165. }
  166. ctx.dc = dc
  167. ctx.logger = ctx.logger.BindInt("dc", dc)
  168. ctx.clientConn = obfuscated2.Conn{
  169. Conn: ctx.clientConn,
  170. Encryptor: encryptor,
  171. Decryptor: decryptor,
  172. }
  173. return nil
  174. }
  175. func (p *Proxy) doTelegramCall(ctx *streamContext) error {
  176. dcid := ctx.dc
  177. addresses := p.telegram.GetAddresses(dcid)
  178. if len(addresses) == 0 && p.allowFallbackOnUnknownDC {
  179. ctx.logger = ctx.logger.BindInt("fallback_dc", dc.DefaultDC)
  180. ctx.logger.Warning("unknown DC, fallbacks")
  181. addresses = p.telegram.GetAddresses(dc.DefaultDC)
  182. }
  183. var conn essentials.Conn
  184. var err error
  185. for _, addr := range addresses {
  186. conn, err = p.network.Dial(addr.Network, addr.Address)
  187. if err == nil {
  188. break
  189. }
  190. }
  191. if err != nil {
  192. return fmt.Errorf("no addresses to call: %w", err)
  193. }
  194. encryptor, decryptor, err := obfuscated2.ServerHandshake(conn)
  195. if err != nil {
  196. conn.Close() //nolint: errcheck
  197. return fmt.Errorf("cannot perform obfuscated2 handshake: %w", err)
  198. }
  199. ctx.telegramConn = obfuscated2.Conn{
  200. Conn: connTraffic{
  201. Conn: conn,
  202. streamID: ctx.streamID,
  203. stream: p.eventStream,
  204. ctx: ctx,
  205. },
  206. Encryptor: encryptor,
  207. Decryptor: decryptor,
  208. }
  209. p.eventStream.Send(ctx,
  210. NewEventConnectedToDC(ctx.streamID,
  211. conn.RemoteAddr().(*net.TCPAddr).IP, //nolint: forcetypeassert
  212. ctx.dc),
  213. )
  214. return nil
  215. }
  216. func (p *Proxy) doDomainFronting(ctx *streamContext, conn *connRewind) {
  217. p.eventStream.Send(p.ctx, NewEventDomainFronting(ctx.streamID))
  218. conn.Rewind()
  219. frontConn, err := p.network.DialContext(ctx, "tcp", p.DomainFrontingAddress())
  220. if err != nil {
  221. p.logger.WarningError("cannot dial to the fronting domain", err)
  222. return
  223. }
  224. frontConn = connTraffic{
  225. Conn: frontConn,
  226. ctx: ctx,
  227. streamID: ctx.streamID,
  228. stream: p.eventStream,
  229. }
  230. relay.Relay(
  231. ctx,
  232. ctx.logger.Named("domain-fronting"),
  233. frontConn,
  234. conn,
  235. )
  236. }
  237. // NewProxy makes a new proxy instance.
  238. func NewProxy(opts ProxyOpts) (*Proxy, error) {
  239. if err := opts.valid(); err != nil {
  240. return nil, fmt.Errorf("invalid settings: %w", err)
  241. }
  242. logger := opts.getLogger("proxy")
  243. tg, err := dc.New(logger.Named("telegram"), opts.getPreferIP(), opts.DCOverrides)
  244. if err != nil {
  245. return nil, fmt.Errorf("cannot build telegram dc fetcher: %w", err)
  246. }
  247. ctx, cancel := context.WithCancel(context.Background())
  248. proxy := &Proxy{
  249. ctx: ctx,
  250. ctxCancel: cancel,
  251. secret: opts.Secret,
  252. network: opts.Network,
  253. antiReplayCache: opts.AntiReplayCache,
  254. blocklist: opts.IPBlocklist,
  255. allowlist: opts.IPAllowlist,
  256. eventStream: opts.EventStream,
  257. logger: opts.getLogger("proxy"),
  258. domainFrontingPort: opts.getDomainFrontingPort(),
  259. tolerateTimeSkewness: opts.getTolerateTimeSkewness(),
  260. allowFallbackOnUnknownDC: opts.AllowFallbackOnUnknownDC,
  261. telegram: tg,
  262. }
  263. go tg.Run(ctx, 0) // TODO: propagate value
  264. pool, err := ants.NewPoolWithFunc(opts.getConcurrency(),
  265. func(arg interface{}) {
  266. proxy.ServeConn(arg.(essentials.Conn)) //nolint: forcetypeassert
  267. },
  268. ants.WithLogger(opts.getLogger("ants")),
  269. ants.WithNonblocking(true))
  270. if err != nil {
  271. panic(err)
  272. }
  273. proxy.workerPool = pool
  274. return proxy, nil
  275. }