Highly-opinionated (ex-bullshit-free) MTPROTO proxy for Telegram. If you use v1.0 or upgrade broke you proxy, please read the chapter Version 2
Du kannst nicht mehr als 25 Themen auswählen Themen müssen mit entweder einem Buchstaben oder einer Ziffer beginnen. Sie können Bindestriche („-“) enthalten und bis zu 35 Zeichen lang sein.

proxy.go 7.5KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314
  1. package mtglib
  2. import (
  3. "context"
  4. "errors"
  5. "fmt"
  6. "net"
  7. "strconv"
  8. "sync"
  9. "time"
  10. "github.com/9seconds/mtg/v2/essentials"
  11. "github.com/9seconds/mtg/v2/mtglib/internal/faketls"
  12. "github.com/9seconds/mtg/v2/mtglib/internal/faketls/record"
  13. "github.com/9seconds/mtg/v2/mtglib/internal/obfuscated2"
  14. "github.com/9seconds/mtg/v2/mtglib/internal/relay"
  15. "github.com/9seconds/mtg/v2/mtglib/internal/telegram"
  16. "github.com/panjf2000/ants/v2"
  17. )
  18. // Proxy is an MTPROTO proxy structure.
  19. type Proxy struct {
  20. ctx context.Context
  21. ctxCancel context.CancelFunc
  22. streamWaitGroup sync.WaitGroup
  23. allowFallbackOnUnknownDC bool
  24. tolerateTimeSkewness time.Duration
  25. domainFrontingPort int
  26. workerPool *ants.PoolWithFunc
  27. telegram *telegram.Telegram
  28. secret Secret
  29. network Network
  30. antiReplayCache AntiReplayCache
  31. ipBlocklist IPBlocklist
  32. eventStream EventStream
  33. logger Logger
  34. }
  35. // DomainFrontingAddress returns a host:port pair for a fronting domain.
  36. func (p *Proxy) DomainFrontingAddress() string {
  37. return net.JoinHostPort(p.secret.Host, strconv.Itoa(p.domainFrontingPort))
  38. }
  39. // ServeConn serves a connection. We do not check IP blocklist and
  40. // concurrency limit here.
  41. func (p *Proxy) ServeConn(conn essentials.Conn) {
  42. p.streamWaitGroup.Add(1)
  43. defer p.streamWaitGroup.Done()
  44. ctx := newStreamContext(p.ctx, p.logger, conn)
  45. defer ctx.Close()
  46. go func() {
  47. <-ctx.Done()
  48. ctx.Close()
  49. }()
  50. p.eventStream.Send(ctx, NewEventStart(ctx.streamID, ctx.ClientIP()))
  51. ctx.logger.Info("Stream has been started")
  52. defer func() {
  53. p.eventStream.Send(ctx, NewEventFinish(ctx.streamID))
  54. ctx.logger.Info("Stream has been finished")
  55. }()
  56. if !p.doFakeTLSHandshake(ctx) {
  57. return
  58. }
  59. if err := p.doObfuscated2Handshake(ctx); err != nil {
  60. p.logger.InfoError("obfuscated2 handshake is failed", err)
  61. return
  62. }
  63. if err := p.doTelegramCall(ctx); err != nil {
  64. p.logger.WarningError("cannot dial to telegram", err)
  65. return
  66. }
  67. relay.Relay(
  68. ctx,
  69. ctx.logger.Named("relay"),
  70. ctx.telegramConn,
  71. ctx.clientConn,
  72. )
  73. }
  74. // Serve starts a proxy on a given listener.
  75. func (p *Proxy) Serve(listener net.Listener) error {
  76. p.streamWaitGroup.Add(1)
  77. defer p.streamWaitGroup.Done()
  78. for {
  79. conn, err := listener.Accept()
  80. if err != nil {
  81. select {
  82. case <-p.ctx.Done():
  83. return nil
  84. default:
  85. return fmt.Errorf("cannot accept a new connection: %w", err)
  86. }
  87. }
  88. ipAddr := conn.RemoteAddr().(*net.TCPAddr).IP
  89. logger := p.logger.BindStr("ip", ipAddr.String())
  90. if p.ipBlocklist.Contains(ipAddr) {
  91. conn.Close()
  92. logger.Info("ip was blacklisted")
  93. p.eventStream.Send(p.ctx, NewEventIPBlocklisted(ipAddr))
  94. continue
  95. }
  96. err = p.workerPool.Invoke(conn)
  97. switch {
  98. case err == nil:
  99. case errors.Is(err, ants.ErrPoolClosed):
  100. return nil
  101. case errors.Is(err, ants.ErrPoolOverload):
  102. logger.Info("connection was concurrency limited")
  103. p.eventStream.Send(p.ctx, NewEventConcurrencyLimited())
  104. }
  105. }
  106. }
  107. // Shutdown 'gracefully' shutdowns all connections. Please remember that
  108. // it does not close an underlying listener.
  109. func (p *Proxy) Shutdown() {
  110. p.ctxCancel()
  111. p.streamWaitGroup.Wait()
  112. p.workerPool.Release()
  113. }
  114. func (p *Proxy) doFakeTLSHandshake(ctx *streamContext) bool {
  115. rec := record.AcquireRecord()
  116. defer record.ReleaseRecord(rec)
  117. rewind := newConnRewind(ctx.clientConn)
  118. if err := rec.Read(rewind); err != nil {
  119. p.logger.InfoError("cannot read client hello", err)
  120. p.doDomainFronting(ctx, rewind)
  121. return false
  122. }
  123. hello, err := faketls.ParseClientHello(p.secret.Key[:], rec.Payload.Bytes())
  124. if err != nil {
  125. p.logger.InfoError("cannot parse client hello", err)
  126. p.doDomainFronting(ctx, rewind)
  127. return false
  128. }
  129. if err := hello.Valid(p.secret.Host, p.tolerateTimeSkewness); err != nil {
  130. p.logger.
  131. BindStr("hostname", hello.Host).
  132. BindStr("hello-time", hello.Time.String()).
  133. InfoError("invalid faketls client hello", err)
  134. p.doDomainFronting(ctx, rewind)
  135. return false
  136. }
  137. if p.antiReplayCache.SeenBefore(hello.SessionID) {
  138. p.logger.Warning("replay attack has been detected!")
  139. p.eventStream.Send(p.ctx, NewEventReplayAttack(ctx.streamID))
  140. p.doDomainFronting(ctx, rewind)
  141. return false
  142. }
  143. if err := faketls.SendWelcomePacket(rewind, p.secret.Key[:], hello); err != nil {
  144. p.logger.InfoError("cannot send welcome packet", err)
  145. return false
  146. }
  147. ctx.clientConn = &faketls.Conn{
  148. Conn: ctx.clientConn,
  149. }
  150. return true
  151. }
  152. func (p *Proxy) doObfuscated2Handshake(ctx *streamContext) error {
  153. dc, encryptor, decryptor, err := obfuscated2.ClientHandshake(p.secret.Key[:], ctx.clientConn)
  154. if err != nil {
  155. return fmt.Errorf("cannot process client handshake: %w", err)
  156. }
  157. ctx.dc = dc
  158. ctx.logger = ctx.logger.BindInt("dc", dc)
  159. ctx.clientConn = obfuscated2.Conn{
  160. Conn: ctx.clientConn,
  161. Encryptor: encryptor,
  162. Decryptor: decryptor,
  163. }
  164. return nil
  165. }
  166. func (p *Proxy) doTelegramCall(ctx *streamContext) error {
  167. dc := ctx.dc
  168. if p.allowFallbackOnUnknownDC && !p.telegram.IsKnownDC(dc) {
  169. dc = p.telegram.GetFallbackDC()
  170. ctx.logger = ctx.logger.BindInt("fallback_dc", dc)
  171. ctx.logger.Warning("unknown DC, fallbacks")
  172. }
  173. conn, err := p.telegram.Dial(ctx, dc)
  174. if err != nil {
  175. return fmt.Errorf("cannot dial to Telegram: %w", err)
  176. }
  177. encryptor, decryptor, err := obfuscated2.ServerHandshake(conn)
  178. if err != nil {
  179. conn.Close()
  180. return fmt.Errorf("cannot perform obfuscated2 handshake: %w", err)
  181. }
  182. ctx.telegramConn = obfuscated2.Conn{
  183. Conn: connTraffic{
  184. Conn: conn,
  185. streamID: ctx.streamID,
  186. stream: p.eventStream,
  187. ctx: ctx,
  188. },
  189. Encryptor: encryptor,
  190. Decryptor: decryptor,
  191. }
  192. p.eventStream.Send(ctx,
  193. NewEventConnectedToDC(ctx.streamID, conn.RemoteAddr().(*net.TCPAddr).IP, ctx.dc))
  194. return nil
  195. }
  196. func (p *Proxy) doDomainFronting(ctx *streamContext, conn *connRewind) {
  197. p.eventStream.Send(p.ctx, NewEventDomainFronting(ctx.streamID))
  198. conn.Rewind()
  199. frontConn, err := p.network.DialContext(ctx, "tcp", p.DomainFrontingAddress())
  200. if err != nil {
  201. p.logger.WarningError("cannot dial to the fronting domain", err)
  202. return
  203. }
  204. frontConn = connTraffic{
  205. Conn: frontConn,
  206. ctx: ctx,
  207. streamID: ctx.streamID,
  208. stream: p.eventStream,
  209. }
  210. relay.Relay(
  211. ctx,
  212. ctx.logger.Named("domain-fronting"),
  213. frontConn,
  214. conn,
  215. )
  216. }
  217. // NewProxy makes a new proxy instance.
  218. func NewProxy(opts ProxyOpts) (*Proxy, error) {
  219. if err := opts.valid(); err != nil {
  220. return nil, fmt.Errorf("invalid settings: %w", err)
  221. }
  222. tg, err := telegram.New(opts.Network, opts.getPreferIP(), opts.UseTestDCs)
  223. if err != nil {
  224. return nil, fmt.Errorf("cannot build telegram dialer: %w", err)
  225. }
  226. ctx, cancel := context.WithCancel(context.Background())
  227. proxy := &Proxy{
  228. ctx: ctx,
  229. ctxCancel: cancel,
  230. secret: opts.Secret,
  231. network: opts.Network,
  232. antiReplayCache: opts.AntiReplayCache,
  233. ipBlocklist: opts.IPBlocklist,
  234. eventStream: opts.EventStream,
  235. logger: opts.getLogger("proxy"),
  236. domainFrontingPort: opts.getDomainFrontingPort(),
  237. tolerateTimeSkewness: opts.getTolerateTimeSkewness(),
  238. allowFallbackOnUnknownDC: opts.AllowFallbackOnUnknownDC,
  239. telegram: tg,
  240. }
  241. pool, err := ants.NewPoolWithFunc(opts.getConcurrency(),
  242. func(arg interface{}) {
  243. proxy.ServeConn(arg.(essentials.Conn))
  244. },
  245. ants.WithLogger(opts.getLogger("ants")),
  246. ants.WithNonblocking(true))
  247. if err != nil {
  248. panic(err)
  249. }
  250. proxy.workerPool = pool
  251. return proxy, nil
  252. }