mirror of
https://github.com/apernet/hysteria.git
synced 2025-04-04 21:17:47 +03:00
feat: SOCKS5 outbound
This commit is contained in:
parent
c27e6fb8d9
commit
acfb10efc0
4 changed files with 288 additions and 0 deletions
|
@ -147,10 +147,17 @@ type serverConfigOutboundDirect struct {
|
||||||
BindDevice string `mapstructure:"bindDevice"`
|
BindDevice string `mapstructure:"bindDevice"`
|
||||||
}
|
}
|
||||||
|
|
||||||
|
type serverConfigOutboundSOCKS5 struct {
|
||||||
|
Addr string `mapstructure:"addr"`
|
||||||
|
Username string `mapstructure:"username"`
|
||||||
|
Password string `mapstructure:"password"`
|
||||||
|
}
|
||||||
|
|
||||||
type serverConfigOutboundEntry struct {
|
type serverConfigOutboundEntry struct {
|
||||||
Name string `mapstructure:"name"`
|
Name string `mapstructure:"name"`
|
||||||
Type string `mapstructure:"type"`
|
Type string `mapstructure:"type"`
|
||||||
Direct serverConfigOutboundDirect `mapstructure:"direct"`
|
Direct serverConfigOutboundDirect `mapstructure:"direct"`
|
||||||
|
SOCKS5 serverConfigOutboundSOCKS5 `mapstructure:"socks5"`
|
||||||
}
|
}
|
||||||
|
|
||||||
type serverConfigMasqueradeFile struct {
|
type serverConfigMasqueradeFile struct {
|
||||||
|
@ -315,6 +322,13 @@ func serverConfigOutboundDirectToOutbound(c serverConfigOutboundDirect) (outboun
|
||||||
return outbounds.NewDirectOutboundSimple(mode), nil
|
return outbounds.NewDirectOutboundSimple(mode), nil
|
||||||
}
|
}
|
||||||
|
|
||||||
|
func serverConfigOutboundSOCKS5ToOutbound(c serverConfigOutboundSOCKS5) (outbounds.PluggableOutbound, error) {
|
||||||
|
if c.Addr == "" {
|
||||||
|
return nil, configError{Field: "outbounds.socks5.addr", Err: errors.New("empty socks5 address")}
|
||||||
|
}
|
||||||
|
return outbounds.NewSOCKS5Outbound(c.Addr, c.Username, c.Password), nil
|
||||||
|
}
|
||||||
|
|
||||||
func (c *serverConfig) fillOutboundConfig(hyConfig *server.Config) error {
|
func (c *serverConfig) fillOutboundConfig(hyConfig *server.Config) error {
|
||||||
// Resolver, ACL, actual outbound are all implemented through the Outbound interface.
|
// Resolver, ACL, actual outbound are all implemented through the Outbound interface.
|
||||||
// Depending on the config, we build a chain like this:
|
// Depending on the config, we build a chain like this:
|
||||||
|
@ -339,6 +353,8 @@ func (c *serverConfig) fillOutboundConfig(hyConfig *server.Config) error {
|
||||||
switch strings.ToLower(entry.Type) {
|
switch strings.ToLower(entry.Type) {
|
||||||
case "direct":
|
case "direct":
|
||||||
ob, err = serverConfigOutboundDirectToOutbound(entry.Direct)
|
ob, err = serverConfigOutboundDirectToOutbound(entry.Direct)
|
||||||
|
case "socks5":
|
||||||
|
ob, err = serverConfigOutboundSOCKS5ToOutbound(entry.SOCKS5)
|
||||||
default:
|
default:
|
||||||
err = configError{Field: "outbounds.type", Err: errors.New("unsupported outbound type")}
|
err = configError{Field: "outbounds.type", Err: errors.New("unsupported outbound type")}
|
||||||
}
|
}
|
||||||
|
|
|
@ -114,6 +114,15 @@ func TestServerConfig(t *testing.T) {
|
||||||
BindDevice: "eth233",
|
BindDevice: "eth233",
|
||||||
},
|
},
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
Name: "badstuff",
|
||||||
|
Type: "socks5",
|
||||||
|
SOCKS5: serverConfigOutboundSOCKS5{
|
||||||
|
Addr: "shady.proxy.ru:1080",
|
||||||
|
Username: "hackerman",
|
||||||
|
Password: "Elliot Alderson",
|
||||||
|
},
|
||||||
|
},
|
||||||
},
|
},
|
||||||
Masquerade: serverConfigMasquerade{
|
Masquerade: serverConfigMasquerade{
|
||||||
Type: "proxy",
|
Type: "proxy",
|
||||||
|
|
|
@ -85,6 +85,12 @@ outbounds:
|
||||||
bindIPv4: 2.4.6.8
|
bindIPv4: 2.4.6.8
|
||||||
bindIPv6: 0:0:0:0:0:ffff:0204:0608
|
bindIPv6: 0:0:0:0:0:ffff:0204:0608
|
||||||
bindDevice: eth233
|
bindDevice: eth233
|
||||||
|
- name: badstuff
|
||||||
|
type: socks5
|
||||||
|
socks5:
|
||||||
|
addr: shady.proxy.ru:1080
|
||||||
|
username: hackerman
|
||||||
|
password: Elliot Alderson
|
||||||
|
|
||||||
masquerade:
|
masquerade:
|
||||||
type: proxy
|
type: proxy
|
||||||
|
|
257
extras/outbounds/ob_socks5.go
Normal file
257
extras/outbounds/ob_socks5.go
Normal file
|
@ -0,0 +1,257 @@
|
||||||
|
package outbounds
|
||||||
|
|
||||||
|
import (
|
||||||
|
"encoding/binary"
|
||||||
|
"errors"
|
||||||
|
"fmt"
|
||||||
|
"io"
|
||||||
|
"net"
|
||||||
|
"time"
|
||||||
|
|
||||||
|
"github.com/txthinking/socks5"
|
||||||
|
)
|
||||||
|
|
||||||
|
const (
|
||||||
|
socks5NegotiationTimeout = 10 * time.Second
|
||||||
|
socks5RequestTimeout = 10 * time.Second
|
||||||
|
)
|
||||||
|
|
||||||
|
var errSOCKS5AuthFailed = errors.New("SOCKS5 authentication failed")
|
||||||
|
|
||||||
|
type errSOCKS5UnsupportedAuthMethod struct {
|
||||||
|
Method byte
|
||||||
|
}
|
||||||
|
|
||||||
|
func (e errSOCKS5UnsupportedAuthMethod) Error() string {
|
||||||
|
return fmt.Sprintf("unsupported SOCKS5 authentication method: %d", e.Method)
|
||||||
|
}
|
||||||
|
|
||||||
|
type errSOCKS5RequestFailed struct {
|
||||||
|
Rep byte
|
||||||
|
}
|
||||||
|
|
||||||
|
func (e errSOCKS5RequestFailed) Error() string {
|
||||||
|
return fmt.Sprintf("SOCKS5 request failed: %d", e.Rep)
|
||||||
|
}
|
||||||
|
|
||||||
|
// socks5Outbound is a PluggableOutbound that connects to the target using
|
||||||
|
// a SOCKS5 proxy server.
|
||||||
|
// Since SOCKS5 supports using either IP or domain name as the target address,
|
||||||
|
// it will ignore ResolveInfo in AddrEx and always only use Host.
|
||||||
|
type socks5Outbound struct {
|
||||||
|
Dialer *net.Dialer
|
||||||
|
Addr string
|
||||||
|
Username string
|
||||||
|
Password string
|
||||||
|
}
|
||||||
|
|
||||||
|
func NewSOCKS5Outbound(addr, username, password string) PluggableOutbound {
|
||||||
|
return &socks5Outbound{
|
||||||
|
Dialer: &net.Dialer{
|
||||||
|
Timeout: defaultDialerTimeout,
|
||||||
|
},
|
||||||
|
Addr: addr,
|
||||||
|
Username: username,
|
||||||
|
Password: password,
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
// dialAndNegotiate creates a new TCP connection to the SOCKS5 proxy server
|
||||||
|
// and performs the negotiation. Returns an established connection ready to
|
||||||
|
// handle requests, or an error if the process fails.
|
||||||
|
func (o *socks5Outbound) dialAndNegotiate() (net.Conn, error) {
|
||||||
|
conn, err := o.Dialer.Dial("tcp", o.Addr)
|
||||||
|
if err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
if err := conn.SetDeadline(time.Now().Add(socks5NegotiationTimeout)); err != nil {
|
||||||
|
_ = conn.Close()
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
authMethods := []byte{socks5.MethodNone}
|
||||||
|
if o.Username != "" && o.Password != "" {
|
||||||
|
authMethods = append(authMethods, socks5.MethodUsernamePassword)
|
||||||
|
}
|
||||||
|
req := socks5.NewNegotiationRequest(authMethods)
|
||||||
|
if _, err := req.WriteTo(conn); err != nil {
|
||||||
|
_ = conn.Close()
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
resp, err := socks5.NewNegotiationReplyFrom(conn)
|
||||||
|
if err != nil {
|
||||||
|
_ = conn.Close()
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
if resp.Method == socks5.MethodUsernamePassword {
|
||||||
|
upReq := socks5.NewUserPassNegotiationRequest([]byte(o.Username), []byte(o.Password))
|
||||||
|
if _, err := upReq.WriteTo(conn); err != nil {
|
||||||
|
_ = conn.Close()
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
upResp, err := socks5.NewUserPassNegotiationReplyFrom(conn)
|
||||||
|
if err != nil {
|
||||||
|
_ = conn.Close()
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
if upResp.Status != socks5.UserPassStatusSuccess {
|
||||||
|
_ = conn.Close()
|
||||||
|
return nil, errSOCKS5AuthFailed
|
||||||
|
}
|
||||||
|
} else if resp.Method != socks5.MethodNone {
|
||||||
|
// We only support none & username/password authentication methods.
|
||||||
|
_ = conn.Close()
|
||||||
|
return nil, errSOCKS5UnsupportedAuthMethod{resp.Method}
|
||||||
|
}
|
||||||
|
// Negotiation succeeded, reset the deadline.
|
||||||
|
if err := conn.SetDeadline(time.Time{}); err != nil {
|
||||||
|
_ = conn.Close()
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
return conn, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// request sends a SOCKS5 request to the proxy server and returns the reply.
|
||||||
|
// Note that it will return an error if the reply from the server indicates
|
||||||
|
// a failure.
|
||||||
|
func (o *socks5Outbound) request(conn net.Conn, req *socks5.Request) (*socks5.Reply, error) {
|
||||||
|
if err := conn.SetDeadline(time.Now().Add(socks5RequestTimeout)); err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
if _, err := req.WriteTo(conn); err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
resp, err := socks5.NewReplyFrom(conn)
|
||||||
|
if err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
if resp.Rep != socks5.RepSuccess {
|
||||||
|
return nil, errSOCKS5RequestFailed{resp.Rep}
|
||||||
|
}
|
||||||
|
if err := conn.SetDeadline(time.Time{}); err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
return resp, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func (s *socks5Outbound) TCP(reqAddr *AddrEx) (net.Conn, error) {
|
||||||
|
conn, err := s.dialAndNegotiate()
|
||||||
|
if err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
atyp, dstAddr, dstPort := addrExToSOCKS5Addr(reqAddr)
|
||||||
|
req := socks5.NewRequest(socks5.CmdConnect, atyp, dstAddr, dstPort)
|
||||||
|
if _, err := s.request(conn, req); err != nil {
|
||||||
|
_ = conn.Close()
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
return conn, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func (s *socks5Outbound) UDP(reqAddr *AddrEx) (UDPConn, error) {
|
||||||
|
conn, err := s.dialAndNegotiate()
|
||||||
|
if err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
atyp, dstAddr, dstPort := addrExToSOCKS5Addr(reqAddr)
|
||||||
|
req := socks5.NewRequest(socks5.CmdUDP, atyp, dstAddr, dstPort)
|
||||||
|
resp, err := s.request(conn, req)
|
||||||
|
if err != nil {
|
||||||
|
_ = conn.Close()
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
return newSOCKS5UDPConn(conn, resp.Address())
|
||||||
|
}
|
||||||
|
|
||||||
|
type socks5UDPConn struct {
|
||||||
|
tcpConn net.Conn
|
||||||
|
udpConn net.Conn
|
||||||
|
}
|
||||||
|
|
||||||
|
func newSOCKS5UDPConn(tcpConn net.Conn, udpAddr string) (*socks5UDPConn, error) {
|
||||||
|
udpConn, err := net.Dial("udp", udpAddr)
|
||||||
|
if err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
sc := &socks5UDPConn{
|
||||||
|
tcpConn: tcpConn,
|
||||||
|
udpConn: udpConn,
|
||||||
|
}
|
||||||
|
go sc.hold()
|
||||||
|
return sc, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func (c *socks5UDPConn) hold() {
|
||||||
|
_, _ = io.Copy(io.Discard, c.tcpConn)
|
||||||
|
_ = c.tcpConn.Close()
|
||||||
|
_ = c.udpConn.Close()
|
||||||
|
}
|
||||||
|
|
||||||
|
func (c *socks5UDPConn) ReadFrom(b []byte) (int, *AddrEx, error) {
|
||||||
|
n, err := c.udpConn.Read(b)
|
||||||
|
if err != nil {
|
||||||
|
return 0, nil, err
|
||||||
|
}
|
||||||
|
d, err := socks5.NewDatagramFromBytes(b[:n])
|
||||||
|
if err != nil {
|
||||||
|
return 0, nil, err
|
||||||
|
}
|
||||||
|
addr := socks5AddrToAddrEx(d.Atyp, d.DstAddr, d.DstPort)
|
||||||
|
n = copy(b, d.Data)
|
||||||
|
return n, addr, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func (c *socks5UDPConn) WriteTo(b []byte, addr *AddrEx) (int, error) {
|
||||||
|
atyp, dstAddr, dstPort := addrExToSOCKS5Addr(addr)
|
||||||
|
d := socks5.NewDatagram(atyp, dstAddr, dstPort, b)
|
||||||
|
_, err := c.udpConn.Write(d.Bytes())
|
||||||
|
if err != nil {
|
||||||
|
return 0, err
|
||||||
|
}
|
||||||
|
return len(b), nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func (c *socks5UDPConn) Close() error {
|
||||||
|
_ = c.tcpConn.Close()
|
||||||
|
_ = c.udpConn.Close()
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func addrExToSOCKS5Addr(addr *AddrEx) (atyp byte, dstAddr, dstPort []byte) {
|
||||||
|
// Host
|
||||||
|
ip := net.ParseIP(addr.Host)
|
||||||
|
if ip != nil {
|
||||||
|
if ip.To4() != nil {
|
||||||
|
atyp = socks5.ATYPIPv4
|
||||||
|
dstAddr = ip.To4()
|
||||||
|
} else {
|
||||||
|
atyp = socks5.ATYPIPv6
|
||||||
|
dstAddr = ip.To16()
|
||||||
|
}
|
||||||
|
} else {
|
||||||
|
atyp = socks5.ATYPDomain
|
||||||
|
dstAddr = []byte(addr.Host)
|
||||||
|
}
|
||||||
|
// Port
|
||||||
|
dstPort = make([]byte, 2)
|
||||||
|
binary.BigEndian.PutUint16(dstPort, addr.Port)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
func socks5AddrToAddrEx(atyp byte, dstAddr, dstPort []byte) *AddrEx {
|
||||||
|
// Host
|
||||||
|
var host string
|
||||||
|
if atyp == socks5.ATYPIPv4 {
|
||||||
|
host = net.IP(dstAddr).To4().String()
|
||||||
|
} else if atyp == socks5.ATYPIPv6 {
|
||||||
|
host = net.IP(dstAddr).To16().String()
|
||||||
|
} else if atyp == socks5.ATYPDomain {
|
||||||
|
// Need to strip the first byte which is the domain length.
|
||||||
|
host = string(dstAddr[1:])
|
||||||
|
}
|
||||||
|
// Port
|
||||||
|
port := binary.BigEndian.Uint16(dstPort)
|
||||||
|
return &AddrEx{
|
||||||
|
Host: host,
|
||||||
|
Port: port,
|
||||||
|
}
|
||||||
|
}
|
Loading…
Add table
Add a link
Reference in a new issue