Highly-opinionated (ex-bullshit-free) MTPROTO proxy for Telegram. If you use v1.0 or upgrade broke you proxy, please read the chapter Version 2
Вы не можете выбрать более 25 тем Темы должны начинаться с буквы или цифры, могут содержать дефисы(-) и должны содержать не более 35 символов.

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123
  1. package obfuscated2
  2. import (
  3. "bytes"
  4. "crypto/rand"
  5. "encoding/binary"
  6. "io"
  7. "github.com/juju/errors"
  8. )
  9. // [frameOffsetFirst:frameOffsetKey:frameOffsetIV:frameOffsetMagic:frameOffsetDC:frameOffsetEnd]
  10. const (
  11. frameLenKey = 32
  12. frameLenIV = 16
  13. frameLenMagic = 4
  14. frameLenDC = 2
  15. frameOffsetFirst = 8
  16. frameOffsetKey = frameOffsetFirst + frameLenKey
  17. frameOffsetIV = frameOffsetKey + frameLenIV
  18. frameOffsetMagic = frameOffsetIV + frameLenMagic
  19. frameOffsetDC = frameOffsetMagic + frameLenDC
  20. tgMagicByte = byte(239)
  21. FrameLen = 64
  22. )
  23. var tgMagicBytes = []byte{tgMagicByte, tgMagicByte, tgMagicByte, tgMagicByte}
  24. // Frame represents handshake frame. Telegram sends 64 bytes of obfuscated2
  25. // initialization data first.
  26. // https://blog.susanka.eu/how-telegram-obfuscates-its-mtproto-traffic/
  27. type Frame []byte
  28. // Key returns AES encryption key.
  29. func (f Frame) Key() []byte {
  30. return f[frameOffsetFirst:frameOffsetKey]
  31. }
  32. // IV returns AES encryption initialization vector
  33. func (f Frame) IV() []byte {
  34. return f[frameOffsetKey:frameOffsetIV]
  35. }
  36. // Magic returns magic bytes from last 8 bytes of frame. Telegram checks
  37. // for values there. If after decryption magic is not as expected,
  38. // connection considered as failed.
  39. func (f Frame) Magic() []byte {
  40. return f[frameOffsetIV:frameOffsetMagic]
  41. }
  42. // DC returns number of datacenter IP client wants to use.
  43. func (f Frame) DC() (n int16) {
  44. buf := bytes.NewReader(f[frameOffsetMagic:frameOffsetDC])
  45. if err := binary.Read(buf, binary.LittleEndian, &n); err != nil {
  46. n = 1
  47. }
  48. return
  49. }
  50. // Valid checks that *decrypted* frame is valid. Only magic bytes are checked.
  51. func (f Frame) Valid() bool {
  52. return bytes.Equal(f.Magic(), tgMagicBytes)
  53. }
  54. // Invert inverts frame for extracting encryption keys. Pkease check that link:
  55. // https://blog.susanka.eu/how-telegram-obfuscates-its-mtproto-traffic/
  56. func (f Frame) Invert() *Frame {
  57. reversed := MakeFrame()
  58. copy(*reversed, f)
  59. for i := 0; i < frameLenKey+frameLenIV; i++ {
  60. (*reversed)[frameOffsetFirst+i] = f[frameOffsetIV-1-i]
  61. }
  62. return reversed
  63. }
  64. // ExtractFrame extracts exact obfuscated2 handshake frame from given reader.
  65. func ExtractFrame(conn io.Reader) (*Frame, error) {
  66. frame := MakeFrame()
  67. buf := bytes.NewBuffer(*frame)
  68. buf.Reset()
  69. if _, err := io.CopyN(buf, conn, FrameLen); err != nil {
  70. ReturnFrame(frame)
  71. return nil, errors.Annotate(err, "Cannot extract obfuscated header")
  72. }
  73. copy(*frame, buf.Bytes())
  74. return frame, nil
  75. }
  76. func generateFrame() *Frame {
  77. frame := MakeFrame()
  78. data := *frame
  79. for {
  80. if _, err := rand.Read(data); err != nil {
  81. continue
  82. }
  83. if data[0] == 0xef {
  84. continue
  85. }
  86. val := (uint32(data[3]) << 24) | (uint32(data[2]) << 16) | (uint32(data[1]) << 8) | uint32(data[0])
  87. if val == 0x44414548 || val == 0x54534f50 || val == 0x20544547 || val == 0x4954504f || val == 0xeeeeeeee {
  88. continue
  89. }
  90. val = (uint32(data[7]) << 24) | (uint32(data[6]) << 16) | (uint32(data[5]) << 8) | uint32(data[4])
  91. if val == 0x00000000 {
  92. continue
  93. }
  94. copy(data.Magic(), tgMagicBytes)
  95. return frame
  96. }
  97. }