mirror of
https://github.com/apernet/hysteria.git
synced 2025-04-03 20:47:38 +03:00
this commit makes changes on the hysteria protocol, although old clients still be able to connect to a newer server, newer clients will fail if they connect to older servers and trying to submit a udp request, so the protocolVersion should be bumped if this commit finally get merged. this commit changes the way to handle hyClient.DialUDP(). in the past, the hysteria client asks the server to create the sessionID in every call to hyClient.DialUDP(), which requires a extra RTT to wait the server reply. to avoid this extra RTT, the hysteria client just generates and manages the sessionID by theirselves. the server checks the sessionID sent from clients in every udpMessage, and open & initiate a new udp session for every sessionID it not recognized. the way to release udp sessions is also changed in this commit, as every udp session no longer maintains a quic stream, now the client will open a dedicated quic stream to notify the server to release specified udp session. this also changes the behavior of "max_conn_client" in the server config. this commit can be a partial fix for #348, #352 and #414.
186 lines
5.7 KiB
Go
186 lines
5.7 KiB
Go
package core
|
|
|
|
import (
|
|
"context"
|
|
"crypto/tls"
|
|
"errors"
|
|
"fmt"
|
|
"net"
|
|
|
|
"github.com/HyNetwork/hysteria/pkg/acl"
|
|
"github.com/HyNetwork/hysteria/pkg/obfs"
|
|
"github.com/HyNetwork/hysteria/pkg/pmtud_fix"
|
|
"github.com/HyNetwork/hysteria/pkg/transport"
|
|
"github.com/lucas-clemente/quic-go"
|
|
"github.com/lunixbochs/struc"
|
|
"github.com/prometheus/client_golang/prometheus"
|
|
)
|
|
|
|
type (
|
|
ConnectFunc func(addr net.Addr, auth []byte, sSend uint64, sRecv uint64) (bool, string)
|
|
DisconnectFunc func(addr net.Addr, auth []byte, err error)
|
|
TCPRequestFunc func(addr net.Addr, auth []byte, reqAddr string, action acl.Action, arg string)
|
|
TCPErrorFunc func(addr net.Addr, auth []byte, reqAddr string, err error)
|
|
UDPRequestFunc func(addr net.Addr, auth []byte, sessionID uint32)
|
|
UDPErrorFunc func(addr net.Addr, auth []byte, sessionID uint32, err error)
|
|
)
|
|
|
|
type Server struct {
|
|
transport *transport.ServerTransport
|
|
sendBPS, recvBPS uint64
|
|
congestionFactory CongestionFactory
|
|
disableUDP bool
|
|
aclEngine *acl.Engine
|
|
|
|
connectFunc ConnectFunc
|
|
disconnectFunc DisconnectFunc
|
|
tcpRequestFunc TCPRequestFunc
|
|
tcpErrorFunc TCPErrorFunc
|
|
udpRequestFunc UDPRequestFunc
|
|
udpErrorFunc UDPErrorFunc
|
|
|
|
upCounterVec, downCounterVec *prometheus.CounterVec
|
|
connGaugeVec *prometheus.GaugeVec
|
|
|
|
listener quic.Listener
|
|
}
|
|
|
|
func NewServer(addr string, protocol string, tlsConfig *tls.Config, quicConfig *quic.Config, transport *transport.ServerTransport,
|
|
sendBPS uint64, recvBPS uint64, congestionFactory CongestionFactory, disableUDP bool, aclEngine *acl.Engine,
|
|
obfuscator obfs.Obfuscator, connectFunc ConnectFunc, disconnectFunc DisconnectFunc,
|
|
tcpRequestFunc TCPRequestFunc, tcpErrorFunc TCPErrorFunc,
|
|
udpRequestFunc UDPRequestFunc, udpErrorFunc UDPErrorFunc, promRegistry *prometheus.Registry,
|
|
) (*Server, error) {
|
|
quicConfig.DisablePathMTUDiscovery = quicConfig.DisablePathMTUDiscovery || pmtud_fix.DisablePathMTUDiscovery
|
|
listener, err := transport.QUICListen(protocol, addr, tlsConfig, quicConfig, obfuscator)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
s := &Server{
|
|
listener: listener,
|
|
transport: transport,
|
|
sendBPS: sendBPS,
|
|
recvBPS: recvBPS,
|
|
congestionFactory: congestionFactory,
|
|
disableUDP: disableUDP,
|
|
aclEngine: aclEngine,
|
|
connectFunc: connectFunc,
|
|
disconnectFunc: disconnectFunc,
|
|
tcpRequestFunc: tcpRequestFunc,
|
|
tcpErrorFunc: tcpErrorFunc,
|
|
udpRequestFunc: udpRequestFunc,
|
|
udpErrorFunc: udpErrorFunc,
|
|
}
|
|
if promRegistry != nil {
|
|
s.upCounterVec = prometheus.NewCounterVec(prometheus.CounterOpts{
|
|
Name: "hysteria_traffic_uplink_bytes_total",
|
|
}, []string{"auth"})
|
|
s.downCounterVec = prometheus.NewCounterVec(prometheus.CounterOpts{
|
|
Name: "hysteria_traffic_downlink_bytes_total",
|
|
}, []string{"auth"})
|
|
s.connGaugeVec = prometheus.NewGaugeVec(prometheus.GaugeOpts{
|
|
Name: "hysteria_active_conn",
|
|
}, []string{"auth"})
|
|
promRegistry.MustRegister(s.upCounterVec, s.downCounterVec, s.connGaugeVec)
|
|
}
|
|
return s, nil
|
|
}
|
|
|
|
func (s *Server) Serve() error {
|
|
for {
|
|
cs, err := s.listener.Accept(context.Background())
|
|
if err != nil {
|
|
return err
|
|
}
|
|
go s.handleClient(cs)
|
|
}
|
|
}
|
|
|
|
func (s *Server) Close() error {
|
|
return s.listener.Close()
|
|
}
|
|
|
|
func (s *Server) handleClient(cs quic.Connection) {
|
|
// Expect the client to create a control stream to send its own information
|
|
ctx, ctxCancel := context.WithTimeout(context.Background(), protocolTimeout)
|
|
stream, err := cs.AcceptStream(ctx)
|
|
ctxCancel()
|
|
if err != nil {
|
|
_ = cs.CloseWithError(closeErrorCodeProtocol, "protocol error")
|
|
return
|
|
}
|
|
// Handle the control stream
|
|
auth, ok, v2, err := s.handleControlStream(cs, stream)
|
|
if err != nil {
|
|
_ = cs.CloseWithError(closeErrorCodeProtocol, "protocol error")
|
|
return
|
|
}
|
|
if !ok {
|
|
_ = cs.CloseWithError(closeErrorCodeAuth, "auth error")
|
|
return
|
|
}
|
|
// Start accepting streams and messages
|
|
sc := newServerClient(v2, cs, s.transport, auth, s.disableUDP, s.aclEngine,
|
|
s.tcpRequestFunc, s.tcpErrorFunc, s.udpRequestFunc, s.udpErrorFunc,
|
|
s.upCounterVec, s.downCounterVec, s.connGaugeVec)
|
|
err = sc.Run()
|
|
_ = cs.CloseWithError(closeErrorCodeGeneric, "")
|
|
s.disconnectFunc(cs.RemoteAddr(), auth, err)
|
|
}
|
|
|
|
// Auth & negotiate speed
|
|
func (s *Server) handleControlStream(cs quic.Connection, stream quic.Stream) ([]byte, bool, bool, error) {
|
|
// Check version
|
|
vb := make([]byte, 1)
|
|
_, err := stream.Read(vb)
|
|
if err != nil {
|
|
return nil, false, false, err
|
|
}
|
|
if vb[0] != protocolVersion && vb[0] != protocolVersionV2 {
|
|
return nil, false, false, fmt.Errorf("unsupported protocol version %d, expecting %d/%d",
|
|
vb[0], protocolVersionV2, protocolVersion)
|
|
}
|
|
// Parse client hello
|
|
var ch clientHello
|
|
err = struc.Unpack(stream, &ch)
|
|
if err != nil {
|
|
return nil, false, false, err
|
|
}
|
|
// Speed
|
|
if ch.Rate.SendBPS == 0 || ch.Rate.RecvBPS == 0 {
|
|
return nil, false, false, errors.New("invalid rate from client")
|
|
}
|
|
serverSendBPS, serverRecvBPS := ch.Rate.RecvBPS, ch.Rate.SendBPS
|
|
if s.sendBPS > 0 && serverSendBPS > s.sendBPS {
|
|
serverSendBPS = s.sendBPS
|
|
}
|
|
if s.recvBPS > 0 && serverRecvBPS > s.recvBPS {
|
|
serverRecvBPS = s.recvBPS
|
|
}
|
|
// Auth
|
|
ok, msg := s.connectFunc(cs.RemoteAddr(), ch.Auth, serverSendBPS, serverRecvBPS)
|
|
status := serverHelloStatusFailed
|
|
if ok {
|
|
status = serverHelloStatusOK
|
|
if s.disableUDP {
|
|
status = serverHelloStatusTCPOnly
|
|
}
|
|
}
|
|
// Response
|
|
err = struc.Pack(stream, &serverHello{
|
|
Status: status,
|
|
Rate: transmissionRate{
|
|
SendBPS: serverSendBPS,
|
|
RecvBPS: serverRecvBPS,
|
|
},
|
|
Message: msg,
|
|
})
|
|
if err != nil {
|
|
return nil, false, false, err
|
|
}
|
|
// Set the congestion accordingly
|
|
if ok && s.congestionFactory != nil {
|
|
cs.SetCongestionControl(s.congestionFactory(serverSendBPS))
|
|
}
|
|
return ch.Auth, ok, vb[0] == protocolVersionV2, nil
|
|
}
|