-
Notifications
You must be signed in to change notification settings - Fork 1.7k
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
- Loading branch information
Showing
5 changed files
with
205 additions
and
98 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,193 @@ | ||
package trojan | ||
|
||
import ( | ||
"bufio" | ||
"bytes" | ||
"context" | ||
"crypto/aes" | ||
"crypto/cipher" | ||
"crypto/md5" | ||
"crypto/rand" | ||
"crypto/tls" | ||
"io" | ||
"net" | ||
"net/http" | ||
"time" | ||
|
||
"github.com/p4gefau1t/trojan-go/common" | ||
"github.com/p4gefau1t/trojan-go/conf" | ||
"github.com/p4gefau1t/trojan-go/log" | ||
"github.com/p4gefau1t/trojan-go/protocol" | ||
"golang.org/x/net/websocket" | ||
) | ||
|
||
//this AES layer is used for obfuscation purpose | ||
type obfReadWriteCloser struct { | ||
*websocket.Conn | ||
r cipher.StreamReader | ||
w cipher.StreamWriter | ||
} | ||
|
||
func (rwc *obfReadWriteCloser) Read(p []byte) (int, error) { | ||
return rwc.r.Read(p) | ||
} | ||
|
||
func (rwc *obfReadWriteCloser) Write(p []byte) (int, error) { | ||
return rwc.w.Write(p) | ||
} | ||
|
||
func (rwc *obfReadWriteCloser) Close() error { | ||
return rwc.Conn.Close() | ||
} | ||
|
||
func NewObfReadWriteCloser(password string, conn *websocket.Conn, iv []byte) *obfReadWriteCloser { | ||
md5Hash := md5.New() | ||
md5Hash.Write([]byte(password)) | ||
key := md5Hash.Sum(nil) | ||
block, err := aes.NewCipher(key) | ||
common.Must(err) | ||
return &obfReadWriteCloser{ | ||
Conn: conn, | ||
r: cipher.StreamReader{ | ||
S: cipher.NewCTR(block, iv), | ||
R: conn, | ||
}, | ||
w: cipher.StreamWriter{ | ||
S: cipher.NewCTR(block, iv), | ||
W: conn, | ||
}, | ||
} | ||
} | ||
|
||
//Fake response writer | ||
//Websocket ServeHTTP method uses its Hijack method to get the Readwriter | ||
type wsHttpResponseWriter struct { | ||
http.Hijacker | ||
http.ResponseWriter | ||
|
||
ReadWriter *bufio.ReadWriter | ||
Conn net.Conn | ||
} | ||
|
||
func (w *wsHttpResponseWriter) Hijack() (net.Conn, *bufio.ReadWriter, error) { | ||
return w.Conn, w.ReadWriter, nil | ||
} | ||
|
||
func NewOutboundWebosocket(conn net.Conn, config *conf.GlobalConfig) (io.ReadWriteCloser, error) { | ||
url := "wss://" + config.Websocket.HostName + config.Websocket.Path | ||
origin := "https://" + config.Websocket.HostName | ||
wsConfig, err := websocket.NewConfig(url, origin) | ||
if err != nil { | ||
return nil, err | ||
} | ||
wsConn, err := websocket.NewClient(wsConfig, conn) | ||
if err != nil { | ||
return nil, err | ||
} | ||
tlsConfig := &tls.Config{ | ||
CipherSuites: config.TLS.CipherSuites, | ||
RootCAs: config.TLS.CertPool, | ||
ServerName: config.TLS.SNI, | ||
SessionTicketsDisabled: !config.TLS.SessionTicket, | ||
ClientSessionCache: tls.NewLRUClientSessionCache(-1), | ||
//InsecureSkipVerify: !config.TLS.Verify, //must verify it | ||
} | ||
var transport net.Conn = wsConn | ||
if config.Websocket.Password != "" { | ||
iv := [aes.BlockSize]byte{} | ||
rand.Reader.Read(iv[:]) | ||
wsConn.Write(iv[:]) | ||
transport = NewObfReadWriteCloser(config.Websocket.Password, wsConn, iv[:]) | ||
} | ||
tlsConn := tls.Client(transport, tlsConfig) | ||
if err := tlsConn.Handshake(); err != nil { | ||
return nil, err | ||
} | ||
if config.LogLevel == 0 { | ||
state := tlsConn.ConnectionState() | ||
chain := state.VerifiedChains | ||
log.Debug("Websocket TLS handshaked", "cipher:", tls.CipherSuiteName(state.CipherSuite)) | ||
for i := range chain { | ||
for j := range chain[i] { | ||
log.Debug("subject:", chain[i][j].Subject, ", issuer:", chain[i][j].Issuer) | ||
} | ||
} | ||
} | ||
return tlsConn, nil | ||
} | ||
|
||
func NewInboundWebsocket(conn io.ReadWriteCloser, rw *bufio.ReadWriter, ctx context.Context, config *conf.GlobalConfig) (io.ReadWriteCloser, error) { | ||
correct := "GET " + config.Websocket.Path + " HTTP/1.1\r\n" | ||
first, err := rw.Peek(len(correct)) | ||
if err != nil { | ||
return nil, err | ||
} | ||
if !bytes.Equal([]byte(correct), first) { | ||
//it may be a normal trojan conn | ||
log.Debug("not a ws conn", string(first)) | ||
return nil, nil | ||
} | ||
|
||
httpRequest, err := http.ReadRequest(rw.Reader) | ||
if err != nil { | ||
//malformed http request | ||
return nil, err | ||
} | ||
|
||
url := "wss://" + config.Websocket.HostName + config.Websocket.Path | ||
origin := "https://" + config.Websocket.HostName | ||
wsConfig, err := websocket.NewConfig(url, origin) | ||
|
||
handshaked := make(chan struct{}) | ||
|
||
var wsConn *websocket.Conn | ||
wsServer := websocket.Server{ | ||
Config: *wsConfig, | ||
Handler: func(conn *websocket.Conn) { | ||
wsConn = conn //store the websocket after handshaking | ||
log.Debug("websocket obtained") | ||
handshaked <- struct{}{} | ||
//this function will NOT return unless the connection is ended | ||
//or the websocket will be closed by ServeHTTP method | ||
<-ctx.Done() | ||
}, | ||
Handshake: func(wsConfig *websocket.Config, httpRequest *http.Request) error { | ||
log.Debug("websocket url", httpRequest.URL, "origin", httpRequest.Header.Get("Origin")) | ||
return nil | ||
}, | ||
} | ||
|
||
responseWriter := &wsHttpResponseWriter{ | ||
Conn: conn.(net.Conn), | ||
ReadWriter: rw, | ||
} | ||
go wsServer.ServeHTTP(responseWriter, httpRequest) | ||
|
||
select { | ||
case <-handshaked: | ||
case <-time.After(protocol.TCPTimeout): | ||
} | ||
|
||
if wsConn == nil { | ||
return nil, common.NewError("failed to perform websocket handshake") | ||
} | ||
|
||
var transport net.Conn = wsConn | ||
tlsConfig := &tls.Config{ | ||
Certificates: config.TLS.KeyPair, | ||
CipherSuites: config.TLS.CipherSuites, | ||
PreferServerCipherSuites: config.TLS.PreferServerCipher, | ||
SessionTicketsDisabled: !config.TLS.SessionTicket, | ||
} | ||
if config.Websocket.Password != "" { | ||
iv := [aes.BlockSize]byte{} | ||
rand.Reader.Read(iv[:]) | ||
wsConn.Read(iv[:]) | ||
transport = NewObfReadWriteCloser(config.Websocket.Password, wsConn, iv[:]) | ||
} | ||
tlsConn := tls.Server(transport, tlsConfig) | ||
if err := tlsConn.Handshake(); err != nil { | ||
return nil, err | ||
} | ||
return tlsConn, nil | ||
} |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters