mirror of
				https://github.com/v2fly/v2ray-core.git
				synced 2025-10-31 09:49:40 +00:00 
			
		
		
		
	
		
			
				
	
	
		
			216 lines
		
	
	
		
			4.8 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
			
		
		
	
	
			216 lines
		
	
	
		
			4.8 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
| package dispatcher
 | |
| 
 | |
| import (
 | |
| 	"bytes"
 | |
| 	"strings"
 | |
| 
 | |
| 	"v2ray.com/core/app/proxyman"
 | |
| 	"v2ray.com/core/common/serial"
 | |
| )
 | |
| 
 | |
| var (
 | |
| 	ErrMoreData    = newError("need more data")
 | |
| 	ErrInvalidData = newError("invalid data")
 | |
| )
 | |
| 
 | |
| func ContainsValidHTTPMethod(b []byte) bool {
 | |
| 	if len(b) == 0 {
 | |
| 		return false
 | |
| 	}
 | |
| 
 | |
| 	parts := bytes.Split(b, []byte{' '})
 | |
| 	part0Trimed := strings.ToLower(string(bytes.Trim(parts[0], " ")))
 | |
| 	return part0Trimed == "get" || part0Trimed == "post" ||
 | |
| 		part0Trimed == "head" || part0Trimed == "put" ||
 | |
| 		part0Trimed == "delete" || part0Trimed == "options" || part0Trimed == "connect"
 | |
| }
 | |
| 
 | |
| func SniffHTTP(b []byte) (string, error) {
 | |
| 	if len(b) == 0 {
 | |
| 		return "", ErrMoreData
 | |
| 	}
 | |
| 	headers := bytes.Split(b, []byte{'\n'})
 | |
| 	if !ContainsValidHTTPMethod(headers[0]) {
 | |
| 		return "", ErrInvalidData
 | |
| 	}
 | |
| 	for i := 1; i < len(headers); i++ {
 | |
| 		header := headers[i]
 | |
| 		if len(header) == 0 {
 | |
| 			return "", ErrInvalidData
 | |
| 		}
 | |
| 		parts := bytes.SplitN(header, []byte{':'}, 2)
 | |
| 		if len(parts) != 2 {
 | |
| 			return "", ErrInvalidData
 | |
| 		}
 | |
| 		key := strings.ToLower(string(parts[0]))
 | |
| 		value := strings.ToLower(string(bytes.Trim(parts[1], " ")))
 | |
| 		if key == "host" {
 | |
| 			domain := strings.Split(value, ":")
 | |
| 			return strings.TrimSpace(domain[0]), nil
 | |
| 		}
 | |
| 	}
 | |
| 	return "", ErrMoreData
 | |
| }
 | |
| 
 | |
| func IsValidTLSVersion(major, minor byte) bool {
 | |
| 	return major == 3
 | |
| }
 | |
| 
 | |
| // ReadClientHello returns server name (if any) from TLS client hello message.
 | |
| // https://github.com/golang/go/blob/master/src/crypto/tls/handshake_messages.go#L300
 | |
| func ReadClientHello(data []byte) (string, error) {
 | |
| 	if len(data) < 42 {
 | |
| 		return "", ErrMoreData
 | |
| 	}
 | |
| 	sessionIDLen := int(data[38])
 | |
| 	if sessionIDLen > 32 || len(data) < 39+sessionIDLen {
 | |
| 		return "", ErrInvalidData
 | |
| 	}
 | |
| 	data = data[39+sessionIDLen:]
 | |
| 	if len(data) < 2 {
 | |
| 		return "", ErrMoreData
 | |
| 	}
 | |
| 	// cipherSuiteLen is the number of bytes of cipher suite numbers. Since
 | |
| 	// they are uint16s, the number must be even.
 | |
| 	cipherSuiteLen := int(data[0])<<8 | int(data[1])
 | |
| 	if cipherSuiteLen%2 == 1 || len(data) < 2+cipherSuiteLen {
 | |
| 		return "", ErrInvalidData
 | |
| 	}
 | |
| 	data = data[2+cipherSuiteLen:]
 | |
| 	if len(data) < 1 {
 | |
| 		return "", ErrMoreData
 | |
| 	}
 | |
| 	compressionMethodsLen := int(data[0])
 | |
| 	if len(data) < 1+compressionMethodsLen {
 | |
| 		return "", ErrMoreData
 | |
| 	}
 | |
| 	data = data[1+compressionMethodsLen:]
 | |
| 
 | |
| 	if len(data) == 0 {
 | |
| 		return "", ErrInvalidData
 | |
| 	}
 | |
| 	if len(data) < 2 {
 | |
| 		return "", ErrInvalidData
 | |
| 	}
 | |
| 
 | |
| 	extensionsLength := int(data[0])<<8 | int(data[1])
 | |
| 	data = data[2:]
 | |
| 	if extensionsLength != len(data) {
 | |
| 		return "", ErrInvalidData
 | |
| 	}
 | |
| 
 | |
| 	for len(data) != 0 {
 | |
| 		if len(data) < 4 {
 | |
| 			return "", ErrInvalidData
 | |
| 		}
 | |
| 		extension := uint16(data[0])<<8 | uint16(data[1])
 | |
| 		length := int(data[2])<<8 | int(data[3])
 | |
| 		data = data[4:]
 | |
| 		if len(data) < length {
 | |
| 			return "", ErrInvalidData
 | |
| 		}
 | |
| 
 | |
| 		switch extension {
 | |
| 		case 0x00: /* extensionServerName */
 | |
| 			d := data[:length]
 | |
| 			if len(d) < 2 {
 | |
| 				return "", ErrInvalidData
 | |
| 			}
 | |
| 			namesLen := int(d[0])<<8 | int(d[1])
 | |
| 			d = d[2:]
 | |
| 			if len(d) != namesLen {
 | |
| 				return "", ErrInvalidData
 | |
| 			}
 | |
| 			for len(d) > 0 {
 | |
| 				if len(d) < 3 {
 | |
| 					return "", ErrInvalidData
 | |
| 				}
 | |
| 				nameType := d[0]
 | |
| 				nameLen := int(d[1])<<8 | int(d[2])
 | |
| 				d = d[3:]
 | |
| 				if len(d) < nameLen {
 | |
| 					return "", ErrInvalidData
 | |
| 				}
 | |
| 				if nameType == 0 {
 | |
| 					serverName := string(d[:nameLen])
 | |
| 					// An SNI value may not include a
 | |
| 					// trailing dot. See
 | |
| 					// https://tools.ietf.org/html/rfc6066#section-3.
 | |
| 					if strings.HasSuffix(serverName, ".") {
 | |
| 						return "", ErrInvalidData
 | |
| 					}
 | |
| 					return serverName, nil
 | |
| 				}
 | |
| 				d = d[nameLen:]
 | |
| 			}
 | |
| 		}
 | |
| 		data = data[length:]
 | |
| 	}
 | |
| 
 | |
| 	return "", ErrInvalidData
 | |
| }
 | |
| 
 | |
| func SniffTLS(b []byte) (string, error) {
 | |
| 	if len(b) < 5 {
 | |
| 		return "", ErrMoreData
 | |
| 	}
 | |
| 
 | |
| 	if b[0] != 0x16 /* TLS Handshake */ {
 | |
| 		return "", ErrInvalidData
 | |
| 	}
 | |
| 	if !IsValidTLSVersion(b[1], b[2]) {
 | |
| 		return "", ErrInvalidData
 | |
| 	}
 | |
| 	headerLen := int(serial.BytesToUint16(b[3:5]))
 | |
| 	if 5+headerLen > len(b) {
 | |
| 		return "", ErrMoreData
 | |
| 	}
 | |
| 	return ReadClientHello(b[5 : 5+headerLen])
 | |
| }
 | |
| 
 | |
| type Sniffer struct {
 | |
| 	slist []func([]byte) (string, error)
 | |
| 	err   []error
 | |
| }
 | |
| 
 | |
| func NewSniffer(snifferList []proxyman.KnownProtocols) *Sniffer {
 | |
| 	s := new(Sniffer)
 | |
| 
 | |
| 	for _, protocol := range snifferList {
 | |
| 		var f func([]byte) (string, error)
 | |
| 		switch protocol {
 | |
| 		case proxyman.KnownProtocols_HTTP:
 | |
| 			f = SniffHTTP
 | |
| 		case proxyman.KnownProtocols_TLS:
 | |
| 			f = SniffTLS
 | |
| 		default:
 | |
| 			panic("Unsupported protocol")
 | |
| 		}
 | |
| 		s.slist = append(s.slist, f)
 | |
| 	}
 | |
| 	s.err = make([]error, len(s.slist))
 | |
| 
 | |
| 	return s
 | |
| }
 | |
| 
 | |
| func (s *Sniffer) Sniff(payload []byte) (string, error) {
 | |
| 	sniffed := false
 | |
| 	for idx, sniffer := range s.slist {
 | |
| 		if s.err[idx] != nil {
 | |
| 			continue
 | |
| 		}
 | |
| 		sniffed = true
 | |
| 		domain, err := sniffer(payload)
 | |
| 		if err == nil {
 | |
| 			return domain, nil
 | |
| 		}
 | |
| 		if err != ErrMoreData {
 | |
| 			s.err[idx] = err
 | |
| 		}
 | |
| 	}
 | |
| 	if sniffed {
 | |
| 		return "", ErrMoreData
 | |
| 	}
 | |
| 	return "", s.err[0]
 | |
| }
 | 
