Highly-opinionated (ex-bullshit-free) MTPROTO proxy for Telegram. If you use v1.0 or upgrade broke you proxy, please read the chapter Version 2
Вы не можете выбрать более 25 тем Темы должны начинаться с буквы или цифры, могут содержать дефисы(-) и должны содержать не более 35 символов.

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338
  1. package mtglib
  2. import (
  3. "context"
  4. "errors"
  5. "fmt"
  6. "net"
  7. "strconv"
  8. "sync"
  9. "time"
  10. "github.com/9seconds/mtg/v2/essentials"
  11. "github.com/9seconds/mtg/v2/mtglib/internal/dc"
  12. "github.com/9seconds/mtg/v2/mtglib/internal/faketls"
  13. "github.com/9seconds/mtg/v2/mtglib/internal/faketls/record"
  14. "github.com/9seconds/mtg/v2/mtglib/internal/obfuscation"
  15. "github.com/9seconds/mtg/v2/mtglib/internal/relay"
  16. "github.com/panjf2000/ants/v2"
  17. )
  18. // Proxy is an MTPROTO proxy structure.
  19. type Proxy struct {
  20. ctx context.Context
  21. ctxCancel context.CancelFunc
  22. streamWaitGroup sync.WaitGroup
  23. allowFallbackOnUnknownDC bool
  24. tolerateTimeSkewness time.Duration
  25. domainFrontingPort int
  26. workerPool *ants.PoolWithFunc
  27. telegram *dc.Telegram
  28. clientObfuscatror obfuscation.Obfuscator
  29. secret Secret
  30. network Network
  31. antiReplayCache AntiReplayCache
  32. blocklist IPBlocklist
  33. allowlist IPBlocklist
  34. eventStream EventStream
  35. logger Logger
  36. }
  37. // DomainFrontingAddress returns a host:port pair for a fronting domain.
  38. func (p *Proxy) DomainFrontingAddress() string {
  39. return net.JoinHostPort(p.secret.Host, strconv.Itoa(p.domainFrontingPort))
  40. }
  41. // ServeConn serves a connection. We do not check IP blocklist and concurrency
  42. // limit here.
  43. func (p *Proxy) ServeConn(conn essentials.Conn) {
  44. p.streamWaitGroup.Add(1)
  45. defer p.streamWaitGroup.Done()
  46. ctx := newStreamContext(p.ctx, p.logger, conn)
  47. defer ctx.Close()
  48. go func() {
  49. <-ctx.Done()
  50. ctx.Close()
  51. }()
  52. p.eventStream.Send(ctx, NewEventStart(ctx.streamID, ctx.ClientIP()))
  53. ctx.logger.Info("Stream has been started")
  54. defer func() {
  55. p.eventStream.Send(ctx, NewEventFinish(ctx.streamID))
  56. ctx.logger.Info("Stream has been finished")
  57. }()
  58. if !p.doFakeTLSHandshake(ctx) {
  59. return
  60. }
  61. if err := p.doObfuscatedHandshake(ctx); err != nil {
  62. p.logger.InfoError("obfuscated handshake is failed", err)
  63. return
  64. }
  65. if err := p.doTelegramCall(ctx); err != nil {
  66. p.logger.WarningError("cannot dial to telegram", err)
  67. return
  68. }
  69. relay.Relay(
  70. ctx,
  71. ctx.logger.Named("relay"),
  72. ctx.telegramConn,
  73. ctx.clientConn,
  74. )
  75. }
  76. // Serve starts a proxy on a given listener.
  77. func (p *Proxy) Serve(listener net.Listener) error {
  78. p.streamWaitGroup.Add(1)
  79. defer p.streamWaitGroup.Done()
  80. for {
  81. conn, err := listener.Accept()
  82. if err != nil {
  83. select {
  84. case <-p.ctx.Done():
  85. return nil
  86. default:
  87. return fmt.Errorf("cannot accept a new connection: %w", err)
  88. }
  89. }
  90. ipAddr := conn.RemoteAddr().(*net.TCPAddr).IP //nolint: forcetypeassert
  91. logger := p.logger.BindStr("ip", ipAddr.String())
  92. if !p.allowlist.Contains(ipAddr) {
  93. conn.Close() //nolint: errcheck
  94. logger.Info("ip was rejected by allowlist")
  95. p.eventStream.Send(p.ctx, NewEventIPAllowlisted(ipAddr))
  96. continue
  97. }
  98. if p.blocklist.Contains(ipAddr) {
  99. conn.Close() //nolint: errcheck
  100. logger.Info("ip was blacklisted")
  101. p.eventStream.Send(p.ctx, NewEventIPBlocklisted(ipAddr))
  102. continue
  103. }
  104. err = p.workerPool.Invoke(conn)
  105. switch {
  106. case err == nil:
  107. case errors.Is(err, ants.ErrPoolClosed):
  108. return nil
  109. case errors.Is(err, ants.ErrPoolOverload):
  110. logger.Info("connection was concurrency limited")
  111. p.eventStream.Send(p.ctx, NewEventConcurrencyLimited())
  112. }
  113. }
  114. }
  115. // Shutdown 'gracefully' shutdowns all connections. Please remember that it
  116. // does not close an underlying listener.
  117. func (p *Proxy) Shutdown() {
  118. p.ctxCancel()
  119. p.streamWaitGroup.Wait()
  120. p.workerPool.Release()
  121. p.allowlist.Shutdown()
  122. p.blocklist.Shutdown()
  123. }
  124. func (p *Proxy) doFakeTLSHandshake(ctx *streamContext) bool {
  125. rec := record.AcquireRecord()
  126. defer record.ReleaseRecord(rec)
  127. rewind := newConnRewind(ctx.clientConn)
  128. if err := rec.Read(rewind); err != nil {
  129. p.logger.InfoError("cannot read client hello", err)
  130. p.doDomainFronting(ctx, rewind)
  131. return false
  132. }
  133. hello, err := faketls.ParseClientHello(p.secret.Key[:], rec.Payload.Bytes())
  134. if err != nil {
  135. p.logger.InfoError("cannot parse client hello", err)
  136. p.doDomainFronting(ctx, rewind)
  137. return false
  138. }
  139. if err := hello.Valid(p.secret.Host, p.tolerateTimeSkewness); err != nil {
  140. p.logger.
  141. BindStr("hostname", hello.Host).
  142. BindStr("hello-time", hello.Time.String()).
  143. InfoError("invalid faketls client hello", err)
  144. p.doDomainFronting(ctx, rewind)
  145. return false
  146. }
  147. if p.antiReplayCache.SeenBefore(hello.SessionID) {
  148. p.logger.Warning("replay attack has been detected!")
  149. p.eventStream.Send(p.ctx, NewEventReplayAttack(ctx.streamID))
  150. p.doDomainFronting(ctx, rewind)
  151. return false
  152. }
  153. if err := faketls.SendWelcomePacket(rewind, p.secret.Key[:], hello); err != nil {
  154. p.logger.InfoError("cannot send welcome packet", err)
  155. return false
  156. }
  157. ctx.clientConn = &faketls.Conn{
  158. Conn: ctx.clientConn,
  159. }
  160. return true
  161. }
  162. func (p *Proxy) doObfuscatedHandshake(ctx *streamContext) error {
  163. dc, conn, err := p.clientObfuscatror.ReadHandshake(ctx.clientConn)
  164. if err != nil {
  165. return fmt.Errorf("cannot process client handshake: %w", err)
  166. }
  167. ctx.dc = dc
  168. ctx.clientConn = conn
  169. ctx.logger = ctx.logger.BindInt("dc", dc)
  170. return nil
  171. }
  172. func (p *Proxy) doTelegramCall(ctx *streamContext) error {
  173. dcid := ctx.dc
  174. addresses := p.telegram.GetAddresses(dcid)
  175. if len(addresses) == 0 && p.allowFallbackOnUnknownDC {
  176. ctx.logger = ctx.logger.BindInt("original_dc", dcid)
  177. ctx.logger.Warning("unknown DC, fallbacks")
  178. ctx.dc = dc.DefaultDC
  179. addresses = p.telegram.GetAddresses(dc.DefaultDC)
  180. }
  181. var (
  182. conn essentials.Conn
  183. err error
  184. foundAddr dc.Addr
  185. )
  186. for _, addr := range addresses {
  187. conn, err = p.network.Dial(addr.Network, addr.Address)
  188. if err == nil {
  189. foundAddr = addr
  190. break
  191. }
  192. }
  193. if err != nil {
  194. return fmt.Errorf("no addresses to call: %w", err)
  195. }
  196. tgConn, err := foundAddr.Obfuscator.SendHandshake(conn, ctx.dc)
  197. if err != nil {
  198. conn.Close()
  199. return fmt.Errorf("cannot perform server handshake: %w", err)
  200. }
  201. ctx.telegramConn = connTraffic{
  202. Conn: tgConn,
  203. streamID: ctx.streamID,
  204. stream: p.eventStream,
  205. ctx: ctx,
  206. }
  207. p.eventStream.Send(ctx,
  208. NewEventConnectedToDC(ctx.streamID,
  209. conn.RemoteAddr().(*net.TCPAddr).IP, //nolint: forcetypeassert
  210. ctx.dc),
  211. )
  212. return nil
  213. }
  214. func (p *Proxy) doDomainFronting(ctx *streamContext, conn *connRewind) {
  215. p.eventStream.Send(p.ctx, NewEventDomainFronting(ctx.streamID))
  216. conn.Rewind()
  217. frontConn, err := p.network.DialContext(ctx, "tcp", p.DomainFrontingAddress())
  218. if err != nil {
  219. p.logger.WarningError("cannot dial to the fronting domain", err)
  220. return
  221. }
  222. frontConn = connTraffic{
  223. Conn: frontConn,
  224. ctx: ctx,
  225. streamID: ctx.streamID,
  226. stream: p.eventStream,
  227. }
  228. relay.Relay(
  229. ctx,
  230. ctx.logger.Named("domain-fronting"),
  231. frontConn,
  232. conn,
  233. )
  234. }
  235. // NewProxy makes a new proxy instance.
  236. func NewProxy(opts ProxyOpts) (*Proxy, error) {
  237. if err := opts.valid(); err != nil {
  238. return nil, fmt.Errorf("invalid settings: %w", err)
  239. }
  240. tg, err := dc.New(opts.getPreferIP(), opts.DCOverrides)
  241. if err != nil {
  242. return nil, fmt.Errorf("cannot build telegram dc fetcher: %w", err)
  243. }
  244. ctx, cancel := context.WithCancel(context.Background())
  245. proxy := &Proxy{
  246. ctx: ctx,
  247. ctxCancel: cancel,
  248. secret: opts.Secret,
  249. network: opts.Network,
  250. antiReplayCache: opts.AntiReplayCache,
  251. blocklist: opts.IPBlocklist,
  252. allowlist: opts.IPAllowlist,
  253. eventStream: opts.EventStream,
  254. logger: opts.getLogger("proxy"),
  255. domainFrontingPort: opts.getDomainFrontingPort(),
  256. tolerateTimeSkewness: opts.getTolerateTimeSkewness(),
  257. allowFallbackOnUnknownDC: opts.AllowFallbackOnUnknownDC,
  258. telegram: tg,
  259. clientObfuscatror: obfuscation.Obfuscator{
  260. Secret: opts.Secret.Key[:],
  261. },
  262. }
  263. pool, err := ants.NewPoolWithFunc(opts.getConcurrency(),
  264. func(arg any) {
  265. proxy.ServeConn(arg.(essentials.Conn)) //nolint: forcetypeassert
  266. },
  267. ants.WithLogger(opts.getLogger("ants")),
  268. ants.WithNonblocking(true))
  269. if err != nil {
  270. panic(err)
  271. }
  272. proxy.workerPool = pool
  273. return proxy, nil
  274. }