Highly-opinionated (ex-bullshit-free) MTPROTO proxy for Telegram. If you use v1.0 or upgrade broke you proxy, please read the chapter Version 2
Nelze vybrat více než 25 témat Téma musí začínat písmenem nebo číslem, může obsahovat pomlčky („-“) a může být dlouhé až 35 znaků.

run_proxy.go 9.7KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376
  1. package cli
  2. import (
  3. "context"
  4. "fmt"
  5. "net"
  6. "os"
  7. "strings"
  8. "time"
  9. "github.com/9seconds/mtg/v2/antireplay"
  10. "github.com/9seconds/mtg/v2/events"
  11. "github.com/9seconds/mtg/v2/internal/config"
  12. "github.com/9seconds/mtg/v2/internal/proxyprotocol"
  13. "github.com/9seconds/mtg/v2/internal/utils"
  14. "github.com/9seconds/mtg/v2/ipblocklist"
  15. "github.com/9seconds/mtg/v2/ipblocklist/files"
  16. "github.com/9seconds/mtg/v2/logger"
  17. "github.com/9seconds/mtg/v2/mtglib"
  18. "github.com/9seconds/mtg/v2/network/v2"
  19. "github.com/9seconds/mtg/v2/stats"
  20. "github.com/pires/go-proxyproto"
  21. "github.com/rs/zerolog"
  22. "github.com/yl2chen/cidranger"
  23. )
  24. func makeLogger(conf *config.Config) mtglib.Logger {
  25. zerolog.TimeFieldFormat = zerolog.TimeFormatUnixMs
  26. zerolog.TimestampFieldName = "timestamp"
  27. zerolog.LevelFieldName = "level"
  28. if conf.Debug.Get(false) {
  29. zerolog.SetGlobalLevel(zerolog.DebugLevel)
  30. } else {
  31. zerolog.SetGlobalLevel(zerolog.WarnLevel)
  32. }
  33. baseLogger := zerolog.New(os.Stdout).With().Timestamp().Logger()
  34. return logger.NewZeroLogger(baseLogger)
  35. }
  36. func makeNetwork(conf *config.Config, version string) (mtglib.Network, error) {
  37. resolver, err := network.GetDNS(conf.GetDNS())
  38. if err != nil {
  39. return nil, fmt.Errorf("cannot create DNS resolver: %w", err)
  40. }
  41. base := network.New(
  42. resolver,
  43. "",
  44. conf.Network.Timeout.TCP.Get(0),
  45. conf.Network.Timeout.HTTP.Get(0),
  46. conf.Network.Timeout.Idle.Get(0),
  47. net.KeepAliveConfig{
  48. Enable: !conf.Network.KeepAlive.Disabled.Get(false),
  49. Idle: conf.Network.KeepAlive.Idle.Get(0),
  50. Interval: conf.Network.KeepAlive.Interval.Get(0),
  51. Count: int(conf.Network.KeepAlive.Count.Get(0)),
  52. },
  53. )
  54. proxyDialers := make([]mtglib.Network, len(conf.Network.Proxies))
  55. for idx, v := range conf.Network.Proxies {
  56. value, err := network.NewProxyNetwork(base, v.Get(nil))
  57. if err != nil {
  58. return nil, fmt.Errorf("cannot use %v for proxy url: %w", v.Get(nil), err)
  59. }
  60. proxyDialers[idx] = value
  61. }
  62. switch len(proxyDialers) {
  63. case 0:
  64. return base, nil
  65. case 1:
  66. return proxyDialers[0], nil
  67. }
  68. value, err := network.Join(proxyDialers...)
  69. if err != nil {
  70. panic(err)
  71. }
  72. return value, nil
  73. }
  74. func makeAntiReplayCache(conf *config.Config) mtglib.AntiReplayCache {
  75. if !conf.Defense.AntiReplay.Enabled.Get(false) {
  76. return antireplay.NewNoop()
  77. }
  78. return antireplay.NewStableBloomFilter(
  79. conf.Defense.AntiReplay.MaxSize.Get(antireplay.DefaultStableBloomFilterMaxSize),
  80. conf.Defense.AntiReplay.ErrorRate.Get(antireplay.DefaultStableBloomFilterErrorRate),
  81. )
  82. }
  83. func makeIPBlocklist(conf config.ListConfig,
  84. logger mtglib.Logger,
  85. ntw mtglib.Network,
  86. updateCallback ipblocklist.FireholUpdateCallback,
  87. ) (mtglib.IPBlocklist, error) {
  88. if !conf.Enabled.Get(false) {
  89. return ipblocklist.NewNoop(), nil
  90. }
  91. remoteURLs := []string{}
  92. localFiles := []string{}
  93. for _, v := range conf.URLs {
  94. if v.IsRemote() {
  95. remoteURLs = append(remoteURLs, v.String())
  96. } else {
  97. localFiles = append(localFiles, v.String())
  98. }
  99. }
  100. blocklist, err := ipblocklist.NewFirehol(logger.Named("ipblockist"),
  101. ntw,
  102. conf.DownloadConcurrency.Get(1),
  103. remoteURLs,
  104. localFiles,
  105. updateCallback)
  106. if err != nil {
  107. return nil, fmt.Errorf("incorrect parameters for firehol: %w", err)
  108. }
  109. go blocklist.Run(conf.UpdateEach.Get(ipblocklist.DefaultFireholUpdateEach))
  110. return blocklist, nil
  111. }
  112. func makeIPAllowlist(conf config.ListConfig,
  113. logger mtglib.Logger,
  114. ntw mtglib.Network,
  115. updateCallback ipblocklist.FireholUpdateCallback,
  116. ) (mtglib.IPBlocklist, error) {
  117. var (
  118. allowlist mtglib.IPBlocklist
  119. err error
  120. )
  121. if !conf.Enabled.Get(false) {
  122. allowlist, err = ipblocklist.NewFireholFromFiles(
  123. logger.Named("ipblocklist"),
  124. 1,
  125. []files.File{
  126. files.NewMem([]*net.IPNet{
  127. cidranger.AllIPv4,
  128. cidranger.AllIPv6,
  129. }),
  130. },
  131. updateCallback,
  132. )
  133. go allowlist.Run(conf.UpdateEach.Get(ipblocklist.DefaultFireholUpdateEach))
  134. } else {
  135. allowlist, err = makeIPBlocklist(
  136. conf,
  137. logger,
  138. ntw,
  139. updateCallback,
  140. )
  141. }
  142. if err != nil {
  143. return nil, fmt.Errorf("cannot build allowlist: %w", err)
  144. }
  145. return allowlist, nil
  146. }
  147. func makeEventStream(conf *config.Config, logger mtglib.Logger) (mtglib.EventStream, error) {
  148. factories := make([]events.ObserverFactory, 0, 2)
  149. if conf.Stats.StatsD.Enabled.Get(false) {
  150. statsdFactory, err := stats.NewStatsd(
  151. conf.Stats.StatsD.Address.Get(""),
  152. logger.Named("statsd"),
  153. conf.Stats.StatsD.MetricPrefix.Get(stats.DefaultStatsdMetricPrefix),
  154. conf.Stats.StatsD.TagFormat.Get(stats.DefaultStatsdTagFormat))
  155. if err != nil {
  156. return nil, fmt.Errorf("cannot build statsd observer: %w", err)
  157. }
  158. factories = append(factories, statsdFactory.Make)
  159. }
  160. if conf.Stats.Prometheus.Enabled.Get(false) {
  161. prometheus := stats.NewPrometheus(
  162. conf.Stats.Prometheus.MetricPrefix.Get(stats.DefaultMetricPrefix),
  163. conf.Stats.Prometheus.HTTPPath.Get("/"),
  164. )
  165. listener, err := net.Listen("tcp", conf.Stats.Prometheus.BindTo.Get(""))
  166. if err != nil {
  167. return nil, fmt.Errorf("cannot start a listener for prometheus: %w", err)
  168. }
  169. go prometheus.Serve(listener) //nolint: errcheck
  170. factories = append(factories, prometheus.Make)
  171. }
  172. if len(factories) > 0 {
  173. return events.NewEventStream(factories), nil
  174. }
  175. return events.NewNoopStream(), nil
  176. }
  177. func warnSNIMismatch(conf *config.Config, ntw mtglib.Network, log mtglib.Logger) {
  178. if conf.Secret.Host == "" {
  179. return
  180. }
  181. ctx, cancel := context.WithTimeout(context.Background(), 10*time.Second)
  182. defer cancel()
  183. res := runSNICheck(ctx, net.DefaultResolver, conf, ntw)
  184. if res.ResolveErr != nil {
  185. log.BindStr("hostname", res.Host).
  186. WarningError("SNI-DNS check: cannot resolve secret hostname", res.ResolveErr)
  187. return
  188. }
  189. if !res.Known() {
  190. log.Warning("SNI-DNS check: cannot detect public IP address; set public-ipv4/public-ipv6 in config or run 'mtg doctor'")
  191. return
  192. }
  193. if len(res.Resolved) == 0 {
  194. log.BindStr("hostname", res.Host).
  195. Warning("SNI-DNS check: secret hostname does not resolve to any address")
  196. return
  197. }
  198. if res.OK() {
  199. return
  200. }
  201. resolved := make([]string, 0, len(res.Resolved))
  202. for _, ip := range res.Resolved {
  203. resolved = append(resolved, ip.String())
  204. }
  205. our := ""
  206. if res.OurIPv4 != nil {
  207. our = res.OurIPv4.String()
  208. }
  209. if res.OurIPv6 != nil {
  210. if our != "" {
  211. our += "/"
  212. }
  213. our += res.OurIPv6.String()
  214. }
  215. entry := log.BindStr("hostname", res.Host).
  216. BindStr("resolved", strings.Join(resolved, ", ")).
  217. BindStr("public_ip", our)
  218. if res.OurIPv4 != nil {
  219. entry = entry.BindStr("ipv4_match", fmt.Sprintf("%t", res.IPv4Match))
  220. }
  221. if res.OurIPv6 != nil {
  222. entry = entry.BindStr("ipv6_match", fmt.Sprintf("%t", res.IPv6Match))
  223. }
  224. entry.Warning("SNI-DNS mismatch: secret hostname does not resolve to this server's public IP. " +
  225. "DPI may detect and block the proxy. See 'mtg doctor' for details")
  226. }
  227. func runProxy(conf *config.Config, version string) error { //nolint: funlen, cyclop
  228. logger := makeLogger(conf)
  229. logger.BindJSON("configuration", conf.String()).Debug("configuration")
  230. eventStream, err := makeEventStream(conf, logger)
  231. if err != nil {
  232. return fmt.Errorf("cannot build event stream: %w", err)
  233. }
  234. ntw, err := makeNetwork(conf, version)
  235. if err != nil {
  236. return fmt.Errorf("cannot build network: %w", err)
  237. }
  238. warnSNIMismatch(conf, ntw, logger)
  239. blocklist, err := makeIPBlocklist(
  240. conf.Defense.Blocklist,
  241. logger.Named("blocklist"),
  242. ntw,
  243. func(ctx context.Context, size int) {
  244. eventStream.Send(ctx, mtglib.NewEventIPListSize(size, true))
  245. })
  246. if err != nil {
  247. return fmt.Errorf("cannot build ip blocklist: %w", err)
  248. }
  249. allowlist, err := makeIPAllowlist(
  250. conf.Defense.Allowlist,
  251. logger.Named("allowlist"),
  252. ntw,
  253. func(ctx context.Context, size int) {
  254. eventStream.Send(ctx, mtglib.NewEventIPListSize(size, false))
  255. },
  256. )
  257. if err != nil {
  258. return fmt.Errorf("cannot build ip allowlist: %w", err)
  259. }
  260. doppelGangerURLs := make([]string, len(conf.Defense.Doppelganger.URLs))
  261. for i, v := range conf.Defense.Doppelganger.URLs {
  262. doppelGangerURLs[i] = v.String()
  263. }
  264. opts := mtglib.ProxyOpts{
  265. Logger: logger,
  266. Network: ntw,
  267. AntiReplayCache: makeAntiReplayCache(conf),
  268. IPBlocklist: blocklist,
  269. IPAllowlist: allowlist,
  270. EventStream: eventStream,
  271. Secret: conf.Secret,
  272. Concurrency: conf.GetConcurrency(mtglib.DefaultConcurrency),
  273. DomainFrontingPort: conf.GetDomainFrontingPort(mtglib.DefaultDomainFrontingPort),
  274. DomainFrontingIP: conf.GetDomainFrontingIP(nil),
  275. DomainFrontingProxyProtocol: conf.GetDomainFrontingProxyProtocol(false),
  276. PreferIP: conf.PreferIP.Get(mtglib.DefaultPreferIP),
  277. AutoUpdate: conf.AutoUpdate.Get(false),
  278. AllowFallbackOnUnknownDC: conf.AllowFallbackOnUnknownDC.Get(false),
  279. TolerateTimeSkewness: conf.TolerateTimeSkewness.Value,
  280. IdleTimeout: conf.Network.Timeout.Idle.Get(mtglib.DefaultIdleTimeout),
  281. HandshakeTimeout: conf.Network.Timeout.Handshake.Get(mtglib.DefaultHandshakeTimeout),
  282. DoppelGangerURLs: doppelGangerURLs,
  283. DoppelGangerPerRaid: conf.Defense.Doppelganger.Repeats.Get(mtglib.DoppelGangerPerRaid),
  284. DoppelGangerEach: conf.Defense.Doppelganger.UpdateEach.Get(mtglib.DoppelGangerEach),
  285. DoppelGangerDRS: conf.Defense.Doppelganger.DRS.Get(false),
  286. }
  287. proxy, err := mtglib.NewProxy(opts)
  288. if err != nil {
  289. return fmt.Errorf("cannot create a proxy: %w", err)
  290. }
  291. listener, err := utils.NewListener(conf.BindTo.Get(""), 0)
  292. if err != nil {
  293. return fmt.Errorf("cannot start proxy: %w", err)
  294. }
  295. if conf.ProxyProtocolListener.Get(false) {
  296. listener = &proxyprotocol.ListenerAdapter{
  297. Listener: proxyproto.Listener{
  298. Listener: listener,
  299. },
  300. }
  301. }
  302. ctx := utils.RootContext()
  303. go proxy.Serve(listener) //nolint: errcheck
  304. <-ctx.Done()
  305. listener.Close() //nolint: errcheck
  306. proxy.Shutdown()
  307. return nil
  308. }