Highly-opinionated (ex-bullshit-free) MTPROTO proxy for Telegram. If you use v1.0 or upgrade broke you proxy, please read the chapter Version 2
You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344
  1. package mtglib
  2. import (
  3. "context"
  4. "errors"
  5. "fmt"
  6. "net"
  7. "strconv"
  8. "sync"
  9. "time"
  10. "github.com/9seconds/mtg/v2/mtglib/internal/faketls"
  11. "github.com/9seconds/mtg/v2/mtglib/internal/faketls/record"
  12. "github.com/9seconds/mtg/v2/mtglib/internal/obfuscated2"
  13. "github.com/9seconds/mtg/v2/mtglib/internal/relay"
  14. "github.com/9seconds/mtg/v2/mtglib/internal/telegram"
  15. "github.com/panjf2000/ants/v2"
  16. )
  17. type Proxy struct {
  18. ctx context.Context
  19. ctxCancel context.CancelFunc
  20. streamWaitGroup sync.WaitGroup
  21. idleTimeout time.Duration
  22. bufferSize int
  23. domainFrontAddress string
  24. workerPool *ants.PoolWithFunc
  25. telegram *telegram.Telegram
  26. secret Secret
  27. network Network
  28. antiReplayCache AntiReplayCache
  29. timeAttackDetector TimeAttackDetector
  30. ipBlocklist IPBlocklist
  31. eventStream EventStream
  32. logger Logger
  33. }
  34. func (p *Proxy) ServeConn(conn net.Conn) {
  35. ctx := newStreamContext(p.ctx, p.logger, conn)
  36. defer ctx.Close()
  37. go func() {
  38. <-ctx.Done()
  39. ctx.Close()
  40. }()
  41. p.eventStream.Send(ctx, EventStart{
  42. CreatedAt: time.Now(),
  43. ConnID: ctx.connID,
  44. RemoteIP: ctx.ClientIP(),
  45. })
  46. ctx.logger.Info("Stream has been started")
  47. defer func() {
  48. p.eventStream.Send(ctx, EventFinish{
  49. CreatedAt: time.Now(),
  50. ConnID: ctx.connID,
  51. })
  52. ctx.logger.Info("Stream has been finished")
  53. }()
  54. if !p.doFakeTLSHandshake(ctx) {
  55. return
  56. }
  57. if err := p.doObfuscated2Handshake(ctx); err != nil {
  58. p.logger.InfoError("obfuscated2 handshake is failed", err)
  59. return
  60. }
  61. if err := p.doTelegramCall(ctx); err != nil {
  62. p.logger.WarningError("cannot dial to telegram", err)
  63. return
  64. }
  65. rel := relay.AcquireRelay(ctx,
  66. p.logger.Named("relay"), p.bufferSize, p.idleTimeout)
  67. defer relay.ReleaseRelay(rel)
  68. if err := rel.Process(ctx.clientConn, ctx.telegramConn); err != nil {
  69. p.logger.DebugError("relay has been finished", err)
  70. }
  71. }
  72. func (p *Proxy) Serve(listener net.Listener) error {
  73. for {
  74. conn, err := listener.Accept()
  75. if err != nil {
  76. return fmt.Errorf("cannot accept a new connection: %w", err)
  77. }
  78. if addr := conn.RemoteAddr().(*net.TCPAddr).IP; p.ipBlocklist.Contains(addr) {
  79. conn.Close()
  80. p.logger.
  81. BindStr("ip", conn.RemoteAddr().(*net.TCPAddr).IP.String()).
  82. Info("ip was blacklisted")
  83. p.eventStream.Send(p.ctx, EventIPBlocklisted{
  84. CreatedAt: time.Now(),
  85. RemoteIP: addr,
  86. })
  87. continue
  88. }
  89. err = p.workerPool.Invoke(conn)
  90. switch {
  91. case err == nil:
  92. case errors.Is(err, ants.ErrPoolClosed):
  93. return nil
  94. case errors.Is(err, ants.ErrPoolOverload):
  95. p.logger.
  96. BindStr("ip", conn.RemoteAddr().(*net.TCPAddr).IP.String()).
  97. Info("connection was concurrency limited")
  98. p.eventStream.Send(p.ctx, EventConcurrencyLimited{
  99. CreatedAt: time.Now(),
  100. })
  101. }
  102. }
  103. }
  104. func (p *Proxy) Shutdown() {
  105. p.ctxCancel()
  106. p.streamWaitGroup.Wait()
  107. p.workerPool.Release()
  108. }
  109. func (p *Proxy) doFakeTLSHandshake(ctx *streamContext) bool {
  110. rec := record.AcquireRecord()
  111. defer record.ReleaseRecord(rec)
  112. rewind := newConnRewind(ctx.clientConn)
  113. if err := rec.Read(rewind); err != nil {
  114. p.logger.InfoError("cannot read client hello", err)
  115. p.doDomainFronting(ctx, rewind)
  116. return false
  117. }
  118. hello, err := faketls.ParseClientHello(p.secret.Key[:], rec.Payload.Bytes())
  119. if err != nil {
  120. p.logger.InfoError("cannot parse client hello", err)
  121. p.doDomainFronting(ctx, rewind)
  122. return false
  123. }
  124. if hello.Host != "" && hello.Host != p.secret.Host {
  125. p.logger.BindStr("hostname", hello.Host).Info("incorrect domain was found in SNI")
  126. p.doDomainFronting(ctx, rewind)
  127. return false
  128. }
  129. if err := p.timeAttackDetector.Valid(hello.Time); err != nil {
  130. p.logger.InfoError("invalid faketls time", err)
  131. p.doDomainFronting(ctx, rewind)
  132. return false
  133. }
  134. if p.antiReplayCache.SeenBefore(hello.SessionID) {
  135. p.logger.Warning("replay attack has been detected!")
  136. p.eventStream.Send(p.ctx, EventReplayAttack{
  137. CreatedAt: time.Now(),
  138. ConnID: ctx.connID,
  139. })
  140. p.doDomainFronting(ctx, rewind)
  141. return false
  142. }
  143. if err := faketls.SendWelcomePacket(rewind, p.secret.Key[:], hello); err != nil {
  144. p.logger.InfoError("cannot send welcome packet", err)
  145. return false
  146. }
  147. ctx.clientConn = &faketls.Conn{
  148. Conn: ctx.clientConn,
  149. }
  150. return true
  151. }
  152. func (p *Proxy) doObfuscated2Handshake(ctx *streamContext) error {
  153. dc, encryptor, decryptor, err := obfuscated2.ClientHandshake(p.secret.Key[:], ctx.clientConn)
  154. if err != nil {
  155. return fmt.Errorf("cannot process client handshake: %w", err)
  156. }
  157. ctx.dc = dc
  158. ctx.logger = ctx.logger.BindInt("dc", dc)
  159. ctx.clientConn = obfuscated2.Conn{
  160. Conn: ctx.clientConn,
  161. Encryptor: encryptor,
  162. Decryptor: decryptor,
  163. }
  164. return nil
  165. }
  166. func (p *Proxy) doTelegramCall(ctx *streamContext) error {
  167. conn, err := p.telegram.Dial(ctx, ctx.dc)
  168. if err != nil {
  169. return fmt.Errorf("cannot dial to Telegram: %w", err)
  170. }
  171. encryptor, decryptor, err := obfuscated2.ServerHandshake(conn)
  172. if err != nil {
  173. conn.Close()
  174. return fmt.Errorf("cannot perform obfuscated2 handshake: %w", err)
  175. }
  176. ctx.telegramConn = obfuscated2.Conn{
  177. Conn: connTraffic{
  178. Conn: conn,
  179. connID: ctx.connID,
  180. stream: p.eventStream,
  181. ctx: ctx,
  182. },
  183. Encryptor: encryptor,
  184. Decryptor: decryptor,
  185. }
  186. p.eventStream.Send(ctx, EventConnectedToDC{
  187. CreatedAt: time.Now(),
  188. ConnID: ctx.connID,
  189. RemoteIP: conn.RemoteAddr().(*net.TCPAddr).IP,
  190. DC: ctx.dc,
  191. })
  192. return nil
  193. }
  194. func (p *Proxy) doDomainFronting(ctx *streamContext, conn *connRewind) {
  195. p.eventStream.Send(p.ctx, EventDomainFronting{
  196. CreatedAt: time.Now(),
  197. ConnID: ctx.connID,
  198. })
  199. conn.Rewind()
  200. frontConn, err := p.network.DialContext(ctx, "tcp", p.domainFrontAddress)
  201. if err != nil {
  202. p.logger.WarningError("cannot dial to the fronting domain", err)
  203. return
  204. }
  205. frontConn = connTraffic{
  206. Conn: frontConn,
  207. ctx: ctx,
  208. connID: ctx.connID,
  209. stream: p.eventStream,
  210. }
  211. rel := relay.AcquireRelay(ctx,
  212. p.logger.Named("domain-fronting"), p.bufferSize, p.idleTimeout)
  213. defer relay.ReleaseRelay(rel)
  214. if err := rel.Process(conn, frontConn); err != nil {
  215. p.logger.DebugError("domain fronting relay has been finished", err)
  216. }
  217. }
  218. func NewProxy(opts ProxyOpts) (*Proxy, error) { // nolint: cyclop, funlen
  219. switch {
  220. case opts.Network == nil:
  221. return nil, ErrNetworkIsNotDefined
  222. case opts.AntiReplayCache == nil:
  223. return nil, ErrAntiReplayCacheIsNotDefined
  224. case opts.IPBlocklist == nil:
  225. return nil, ErrIPBlocklistIsNotDefined
  226. case opts.EventStream == nil:
  227. return nil, ErrEventStreamIsNotDefined
  228. case opts.TimeAttackDetector == nil:
  229. return nil, ErrTimeAttackDetectorIsNotDefined
  230. case opts.Logger == nil:
  231. return nil, ErrLoggerIsNotDefined
  232. case !opts.Secret.Valid():
  233. return nil, ErrSecretInvalid
  234. }
  235. tg, err := telegram.New(opts.Network, opts.PreferIP)
  236. if err != nil {
  237. return nil, fmt.Errorf("cannot build telegram dialer: %w", err)
  238. }
  239. concurrency := opts.Concurrency
  240. if concurrency == 0 {
  241. concurrency = DefaultConcurrency
  242. }
  243. idleTimeout := opts.IdleTimeout
  244. if idleTimeout < 1 {
  245. idleTimeout = DefaultIdleTimeout
  246. }
  247. bufferSize := opts.BufferSize
  248. if bufferSize < 1 {
  249. bufferSize = DefaultBufferSize
  250. }
  251. domainFrontingPort := int(opts.DomainFrontingPort)
  252. if domainFrontingPort == 0 {
  253. domainFrontingPort = DefaultDomainFrontingPort
  254. }
  255. ctx, cancel := context.WithCancel(context.Background())
  256. proxy := &Proxy{
  257. ctx: ctx,
  258. ctxCancel: cancel,
  259. secret: opts.Secret,
  260. network: opts.Network,
  261. antiReplayCache: opts.AntiReplayCache,
  262. timeAttackDetector: opts.TimeAttackDetector,
  263. ipBlocklist: opts.IPBlocklist,
  264. eventStream: opts.EventStream,
  265. logger: opts.Logger.Named("proxy"),
  266. domainFrontAddress: net.JoinHostPort(opts.Secret.Host,
  267. strconv.Itoa(domainFrontingPort)),
  268. idleTimeout: idleTimeout,
  269. bufferSize: int(bufferSize),
  270. telegram: tg,
  271. }
  272. pool, err := ants.NewPoolWithFunc(int(concurrency), func(arg interface{}) {
  273. proxy.ServeConn(arg.(net.Conn))
  274. }, ants.WithLogger(opts.Logger.Named("ants")))
  275. if err != nil {
  276. return nil, fmt.Errorf("cannot initialize a pool: %w", err)
  277. }
  278. proxy.workerPool = pool
  279. return proxy, nil
  280. }