Highly-opinionated (ex-bullshit-free) MTPROTO proxy for Telegram. If you use v1.0 or upgrade broke you proxy, please read the chapter Version 2
Вы не можете выбрать более 25 тем Темы должны начинаться с буквы или цифры, могут содержать дефисы(-) и должны содержать не более 35 символов.

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263
  1. package client
  2. import (
  3. "context"
  4. "net"
  5. "time"
  6. "github.com/juju/errors"
  7. "github.com/9seconds/mtg/antireplay"
  8. "github.com/9seconds/mtg/config"
  9. "github.com/9seconds/mtg/mtproto"
  10. "github.com/9seconds/mtg/obfuscated2"
  11. "github.com/9seconds/mtg/wrappers"
  12. )
  13. const handshakeTimeout = 10 * time.Second
  14. // DirectInit initializes client connection for proxy which connects to
  15. // Telegram directly.
  16. func DirectInit(ctx context.Context, cancel context.CancelFunc, socket net.Conn,
  17. connID string, antiReplayCache antireplay.Cache,
  18. conf *config.Config) (wrappers.Wrap, *mtproto.ConnectionOpts, error) {
  19. tcpSocket := socket.(*net.TCPConn)
  20. if err := tcpSocket.SetNoDelay(false); err != nil {
  21. return nil, nil, errors.Annotate(err, "Cannot disable NO_DELAY to client socket")
  22. }
  23. if err := tcpSocket.SetReadBuffer(conf.ReadBufferSize); err != nil {
  24. return nil, nil, errors.Annotate(err, "Cannot set read buffer size of client socket")
  25. }
  26. if err := tcpSocket.SetWriteBuffer(conf.WriteBufferSize); err != nil {
  27. return nil, nil, errors.Annotate(err, "Cannot set write buffer size of client socket")
  28. }
  29. socket.SetReadDeadline(time.Now().Add(handshakeTimeout)) // nolint: errcheck, gosec
  30. frame, err := obfuscated2.ExtractFrame(socket)
  31. if err != nil {
  32. return nil, nil, errors.Annotate(err, "Cannot extract frame")
  33. }
  34. socket.SetReadDeadline(time.Time{}) // nolint: errcheck, gosec
  35. conn := wrappers.NewConn(ctx, cancel, socket, connID, wrappers.ConnPurposeClient, conf.PublicIPv4, conf.PublicIPv6)
  36. obfs2, connOpts, err := obfuscated2.ParseObfuscated2ClientFrame(conf.Secret, frame)
  37. if err != nil {
  38. return nil, nil, errors.Annotate(err, "Cannot parse obfuscated frame")
  39. }
  40. var replayPart = []byte(frame)
  41. if antiReplayCache.Has(replayPart[4:60]) {
  42. return nil, nil, errors.New("Replay attack is detected")
  43. }
  44. antiReplayCache.Add(replayPart[4:60])
  45. connOpts.ConnectionProto = mtproto.ConnectionProtocolAny
  46. connOpts.ClientAddr = conn.RemoteAddr()
  47. conn = wrappers.NewStreamCipher(conn, obfs2.Encryptor, obfs2.Decryptor)
  48. conn.Logger().Infow("Client connection initialized")
  49. return conn, connOpts, nil
  50. }