Highly-opinionated (ex-bullshit-free) MTPROTO proxy for Telegram. If you use v1.0 or upgrade broke you proxy, please read the chapter Version 2
Du kannst nicht mehr als 25 Themen auswählen Themen müssen mit entweder einem Buchstaben oder einer Ziffer beginnen. Sie können Bindestriche („-“) enthalten und bis zu 35 Zeichen lang sein.

run_proxy.go 10KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401
  1. package cli
  2. import (
  3. "context"
  4. "fmt"
  5. "net"
  6. "os"
  7. "strings"
  8. "github.com/9seconds/mtg/v2/antireplay"
  9. "github.com/9seconds/mtg/v2/events"
  10. "github.com/9seconds/mtg/v2/internal/config"
  11. "github.com/9seconds/mtg/v2/internal/proxyprotocol"
  12. "github.com/9seconds/mtg/v2/internal/utils"
  13. "github.com/9seconds/mtg/v2/ipblocklist"
  14. "github.com/9seconds/mtg/v2/ipblocklist/files"
  15. "github.com/9seconds/mtg/v2/logger"
  16. "github.com/9seconds/mtg/v2/mtglib"
  17. "github.com/9seconds/mtg/v2/network/v2"
  18. "github.com/9seconds/mtg/v2/stats"
  19. "github.com/pires/go-proxyproto"
  20. "github.com/rs/zerolog"
  21. "github.com/yl2chen/cidranger"
  22. )
  23. func makeLogger(conf *config.Config) mtglib.Logger {
  24. zerolog.TimeFieldFormat = zerolog.TimeFormatUnixMs
  25. zerolog.TimestampFieldName = "timestamp"
  26. zerolog.LevelFieldName = "level"
  27. if conf.Debug.Get(false) {
  28. zerolog.SetGlobalLevel(zerolog.DebugLevel)
  29. } else {
  30. zerolog.SetGlobalLevel(zerolog.WarnLevel)
  31. }
  32. baseLogger := zerolog.New(os.Stdout).With().Timestamp().Logger()
  33. return logger.NewZeroLogger(baseLogger)
  34. }
  35. func makeNetwork(conf *config.Config, version string) (mtglib.Network, error) {
  36. resolver, err := network.GetDNS(conf.GetDNS())
  37. if err != nil {
  38. return nil, fmt.Errorf("cannot create DNS resolver: %w", err)
  39. }
  40. base := network.New(
  41. resolver,
  42. "",
  43. conf.Network.Timeout.TCP.Get(0),
  44. conf.Network.Timeout.HTTP.Get(0),
  45. conf.Network.Timeout.Idle.Get(0),
  46. net.KeepAliveConfig{
  47. Enable: !conf.Network.KeepAlive.Disabled.Get(false),
  48. Idle: conf.Network.KeepAlive.Idle.Get(0),
  49. Interval: conf.Network.KeepAlive.Interval.Get(0),
  50. Count: int(conf.Network.KeepAlive.Count.Get(0)),
  51. },
  52. )
  53. proxyDialers := make([]mtglib.Network, len(conf.Network.Proxies))
  54. for idx, v := range conf.Network.Proxies {
  55. value, err := network.NewProxyNetwork(base, v.Get(nil))
  56. if err != nil {
  57. return nil, fmt.Errorf("cannot use %v for proxy url: %w", v.Get(nil), err)
  58. }
  59. proxyDialers[idx] = value
  60. }
  61. switch len(proxyDialers) {
  62. case 0:
  63. return base, nil
  64. case 1:
  65. return proxyDialers[0], nil
  66. }
  67. value, err := network.Join(proxyDialers...)
  68. if err != nil {
  69. panic(err)
  70. }
  71. return value, nil
  72. }
  73. func makeAntiReplayCache(conf *config.Config) mtglib.AntiReplayCache {
  74. if !conf.Defense.AntiReplay.Enabled.Get(false) {
  75. return antireplay.NewNoop()
  76. }
  77. return antireplay.NewStableBloomFilter(
  78. conf.Defense.AntiReplay.MaxSize.Get(antireplay.DefaultStableBloomFilterMaxSize),
  79. conf.Defense.AntiReplay.ErrorRate.Get(antireplay.DefaultStableBloomFilterErrorRate),
  80. )
  81. }
  82. func makeIPBlocklist(conf config.ListConfig,
  83. logger mtglib.Logger,
  84. ntw mtglib.Network,
  85. updateCallback ipblocklist.FireholUpdateCallback,
  86. ) (mtglib.IPBlocklist, error) {
  87. if !conf.Enabled.Get(false) {
  88. return ipblocklist.NewNoop(), nil
  89. }
  90. remoteURLs := []string{}
  91. localFiles := []string{}
  92. for _, v := range conf.URLs {
  93. if v.IsRemote() {
  94. remoteURLs = append(remoteURLs, v.String())
  95. } else {
  96. localFiles = append(localFiles, v.String())
  97. }
  98. }
  99. blocklist, err := ipblocklist.NewFirehol(logger.Named("ipblockist"),
  100. ntw,
  101. conf.DownloadConcurrency.Get(1),
  102. remoteURLs,
  103. localFiles,
  104. updateCallback)
  105. if err != nil {
  106. return nil, fmt.Errorf("incorrect parameters for firehol: %w", err)
  107. }
  108. go blocklist.Run(conf.UpdateEach.Get(ipblocklist.DefaultFireholUpdateEach))
  109. return blocklist, nil
  110. }
  111. func makeIPAllowlist(conf config.ListConfig,
  112. logger mtglib.Logger,
  113. ntw mtglib.Network,
  114. updateCallback ipblocklist.FireholUpdateCallback,
  115. ) (mtglib.IPBlocklist, error) {
  116. var (
  117. allowlist mtglib.IPBlocklist
  118. err error
  119. )
  120. if !conf.Enabled.Get(false) {
  121. allowlist, err = ipblocklist.NewFireholFromFiles(
  122. logger.Named("ipblocklist"),
  123. 1,
  124. []files.File{
  125. files.NewMem([]*net.IPNet{
  126. cidranger.AllIPv4,
  127. cidranger.AllIPv6,
  128. }),
  129. },
  130. updateCallback,
  131. )
  132. go allowlist.Run(conf.UpdateEach.Get(ipblocklist.DefaultFireholUpdateEach))
  133. } else {
  134. allowlist, err = makeIPBlocklist(
  135. conf,
  136. logger,
  137. ntw,
  138. updateCallback,
  139. )
  140. }
  141. if err != nil {
  142. return nil, fmt.Errorf("cannot build allowlist: %w", err)
  143. }
  144. return allowlist, nil
  145. }
  146. func makeEventStream(conf *config.Config, logger mtglib.Logger) (mtglib.EventStream, error) {
  147. factories := make([]events.ObserverFactory, 0, 2)
  148. if conf.Stats.StatsD.Enabled.Get(false) {
  149. statsdFactory, err := stats.NewStatsd(
  150. conf.Stats.StatsD.Address.Get(""),
  151. logger.Named("statsd"),
  152. conf.Stats.StatsD.MetricPrefix.Get(stats.DefaultStatsdMetricPrefix),
  153. conf.Stats.StatsD.TagFormat.Get(stats.DefaultStatsdTagFormat))
  154. if err != nil {
  155. return nil, fmt.Errorf("cannot build statsd observer: %w", err)
  156. }
  157. factories = append(factories, statsdFactory.Make)
  158. }
  159. if conf.Stats.Prometheus.Enabled.Get(false) {
  160. prometheus := stats.NewPrometheus(
  161. conf.Stats.Prometheus.MetricPrefix.Get(stats.DefaultMetricPrefix),
  162. conf.Stats.Prometheus.HTTPPath.Get("/"),
  163. )
  164. listener, err := net.Listen("tcp", conf.Stats.Prometheus.BindTo.Get(""))
  165. if err != nil {
  166. return nil, fmt.Errorf("cannot start a listener for prometheus: %w", err)
  167. }
  168. go prometheus.Serve(listener) //nolint: errcheck
  169. factories = append(factories, prometheus.Make)
  170. }
  171. if len(factories) > 0 {
  172. return events.NewEventStream(factories), nil
  173. }
  174. return events.NewNoopStream(), nil
  175. }
  176. func warnSNIMismatch(conf *config.Config, ntw mtglib.Network, log mtglib.Logger) {
  177. host := conf.Secret.Host
  178. if host == "" {
  179. return
  180. }
  181. addresses, err := net.DefaultResolver.LookupIPAddr(context.Background(), host)
  182. if err != nil {
  183. log.BindStr("hostname", host).
  184. WarningError("SNI-DNS check: cannot resolve secret hostname", err)
  185. return
  186. }
  187. ourIP4 := conf.PublicIPv4.Get(nil)
  188. if ourIP4 == nil {
  189. ourIP4 = getIP(ntw, "tcp4")
  190. }
  191. ourIP6 := conf.PublicIPv6.Get(nil)
  192. if ourIP6 == nil {
  193. ourIP6 = getIP(ntw, "tcp6")
  194. }
  195. if ourIP4 == nil && ourIP6 == nil {
  196. log.Warning("SNI-DNS check: cannot detect public IP address; set public-ipv4/public-ipv6 in config or run 'mtg doctor'")
  197. return
  198. }
  199. v4Match := ourIP4 == nil
  200. v6Match := ourIP6 == nil
  201. for _, addr := range addresses {
  202. if ourIP4 != nil && addr.IP.String() == ourIP4.String() {
  203. v4Match = true
  204. }
  205. if ourIP6 != nil && addr.IP.String() == ourIP6.String() {
  206. v6Match = true
  207. }
  208. }
  209. if v4Match && v6Match {
  210. return
  211. }
  212. resolved := make([]string, 0, len(addresses))
  213. for _, addr := range addresses {
  214. resolved = append(resolved, addr.IP.String())
  215. }
  216. our := ""
  217. if ourIP4 != nil {
  218. our = ourIP4.String()
  219. }
  220. if ourIP6 != nil {
  221. if our != "" {
  222. our += "/"
  223. }
  224. our += ourIP6.String()
  225. }
  226. entry := log.BindStr("hostname", host).
  227. BindStr("resolved", strings.Join(resolved, ", ")).
  228. BindStr("public_ip", our)
  229. if ourIP4 != nil {
  230. entry = entry.BindStr("ipv4_match", fmt.Sprintf("%t", v4Match))
  231. }
  232. if ourIP6 != nil {
  233. entry = entry.BindStr("ipv6_match", fmt.Sprintf("%t", v6Match))
  234. }
  235. entry.Warning("SNI-DNS mismatch: secret hostname does not resolve to this server's public IP. " +
  236. "DPI may detect and block the proxy. See 'mtg doctor' for details")
  237. }
  238. func warnDeprecatedDomainFronting(conf *config.Config, log mtglib.Logger) {
  239. if conf.DomainFrontingIP.Value != nil {
  240. log.Warning(`config option "domain-fronting-ip" is deprecated and ignored; use "host" in [domain-fronting] instead`)
  241. }
  242. if conf.DomainFronting.IP.Value != nil {
  243. log.Warning(`config option "ip" in [domain-fronting] is deprecated and ignored; use "host" instead`)
  244. }
  245. }
  246. func runProxy(conf *config.Config, version string) error { //nolint: funlen, cyclop
  247. logger := makeLogger(conf)
  248. logger.BindJSON("configuration", conf.String()).Debug("configuration")
  249. warnDeprecatedDomainFronting(conf, logger)
  250. eventStream, err := makeEventStream(conf, logger)
  251. if err != nil {
  252. return fmt.Errorf("cannot build event stream: %w", err)
  253. }
  254. ntw, err := makeNetwork(conf, version)
  255. if err != nil {
  256. return fmt.Errorf("cannot build network: %w", err)
  257. }
  258. warnSNIMismatch(conf, ntw, logger)
  259. blocklist, err := makeIPBlocklist(
  260. conf.Defense.Blocklist,
  261. logger.Named("blocklist"),
  262. ntw,
  263. func(ctx context.Context, size int) {
  264. eventStream.Send(ctx, mtglib.NewEventIPListSize(size, true))
  265. })
  266. if err != nil {
  267. return fmt.Errorf("cannot build ip blocklist: %w", err)
  268. }
  269. allowlist, err := makeIPAllowlist(
  270. conf.Defense.Allowlist,
  271. logger.Named("allowlist"),
  272. ntw,
  273. func(ctx context.Context, size int) {
  274. eventStream.Send(ctx, mtglib.NewEventIPListSize(size, false))
  275. },
  276. )
  277. if err != nil {
  278. return fmt.Errorf("cannot build ip allowlist: %w", err)
  279. }
  280. doppelGangerURLs := make([]string, len(conf.Defense.Doppelganger.URLs))
  281. for i, v := range conf.Defense.Doppelganger.URLs {
  282. doppelGangerURLs[i] = v.String()
  283. }
  284. opts := mtglib.ProxyOpts{
  285. Logger: logger,
  286. Network: ntw,
  287. AntiReplayCache: makeAntiReplayCache(conf),
  288. IPBlocklist: blocklist,
  289. IPAllowlist: allowlist,
  290. EventStream: eventStream,
  291. Secret: conf.Secret,
  292. Concurrency: conf.GetConcurrency(mtglib.DefaultConcurrency),
  293. DomainFrontingPort: conf.GetDomainFrontingPort(mtglib.DefaultDomainFrontingPort),
  294. DomainFrontingHost: conf.GetDomainFrontingHost(),
  295. DomainFrontingProxyProtocol: conf.GetDomainFrontingProxyProtocol(false),
  296. PreferIP: conf.PreferIP.Get(mtglib.DefaultPreferIP),
  297. AutoUpdate: conf.AutoUpdate.Get(false),
  298. AllowFallbackOnUnknownDC: conf.AllowFallbackOnUnknownDC.Get(false),
  299. TolerateTimeSkewness: conf.TolerateTimeSkewness.Value,
  300. IdleTimeout: conf.Network.Timeout.Idle.Get(mtglib.DefaultIdleTimeout),
  301. HandshakeTimeout: conf.Network.Timeout.Handshake.Get(mtglib.DefaultHandshakeTimeout),
  302. DoppelGangerURLs: doppelGangerURLs,
  303. DoppelGangerPerRaid: conf.Defense.Doppelganger.Repeats.Get(mtglib.DoppelGangerPerRaid),
  304. DoppelGangerEach: conf.Defense.Doppelganger.UpdateEach.Get(mtglib.DoppelGangerEach),
  305. DoppelGangerDRS: conf.Defense.Doppelganger.DRS.Get(false),
  306. }
  307. proxy, err := mtglib.NewProxy(opts)
  308. if err != nil {
  309. return fmt.Errorf("cannot create a proxy: %w", err)
  310. }
  311. listener, err := utils.NewListener(conf.BindTo.Get(""), 0)
  312. if err != nil {
  313. return fmt.Errorf("cannot start proxy: %w", err)
  314. }
  315. if conf.ProxyProtocolListener.Get(false) {
  316. listener = &proxyprotocol.ListenerAdapter{
  317. Listener: proxyproto.Listener{
  318. Listener: listener,
  319. },
  320. }
  321. }
  322. ctx := utils.RootContext()
  323. go proxy.Serve(listener) //nolint: errcheck
  324. <-ctx.Done()
  325. listener.Close() //nolint: errcheck
  326. proxy.Shutdown()
  327. return nil
  328. }