2017-07-26 18:56:24 +08:00
|
|
|
// getOrigDst:
|
|
|
|
// https://github.com/shadowsocks/go-shadowsocks2/blob/master/tcp_linux.go#L30
|
|
|
|
|
2018-06-26 16:15:48 +08:00
|
|
|
package redir
|
2017-07-26 18:56:24 +08:00
|
|
|
|
|
|
|
import (
|
2017-07-30 12:03:19 +08:00
|
|
|
"errors"
|
2017-07-26 18:56:24 +08:00
|
|
|
"net"
|
2018-06-26 16:15:48 +08:00
|
|
|
"net/url"
|
2017-07-26 18:56:24 +08:00
|
|
|
"syscall"
|
|
|
|
"unsafe"
|
2018-06-26 16:15:48 +08:00
|
|
|
|
|
|
|
"github.com/nadoo/glider/common/conn"
|
|
|
|
"github.com/nadoo/glider/common/log"
|
|
|
|
"github.com/nadoo/glider/common/socks"
|
|
|
|
"github.com/nadoo/glider/proxy"
|
2017-07-26 18:56:24 +08:00
|
|
|
)
|
|
|
|
|
|
|
|
const (
|
2017-10-02 19:39:57 +08:00
|
|
|
// SO_ORIGINAL_DST from linux/include/uapi/linux/netfilter_ipv4.h
|
2017-09-21 23:13:44 +08:00
|
|
|
SO_ORIGINAL_DST = 80
|
2017-10-02 19:39:57 +08:00
|
|
|
// IP6T_SO_ORIGINAL_DST from linux/include/uapi/linux/netfilter_ipv6/ip6_tables.h
|
2017-09-21 23:13:44 +08:00
|
|
|
IP6T_SO_ORIGINAL_DST = 80
|
2017-07-26 18:56:24 +08:00
|
|
|
)
|
|
|
|
|
2018-08-12 12:37:25 +08:00
|
|
|
// RedirProxy struct
|
|
|
|
type RedirProxy struct {
|
|
|
|
dialer proxy.Dialer
|
|
|
|
addr string
|
2018-09-04 20:26:40 +08:00
|
|
|
ipv6 bool
|
2018-08-12 12:37:25 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
func init() {
|
|
|
|
proxy.RegisterServer("redir", NewRedirServer)
|
2018-09-17 19:22:36 +08:00
|
|
|
proxy.RegisterServer("redir6", NewRedir6Server)
|
2018-06-26 16:15:48 +08:00
|
|
|
}
|
|
|
|
|
2018-08-12 12:37:25 +08:00
|
|
|
// NewRedirProxy returns a redirect proxy.
|
2018-09-04 20:26:40 +08:00
|
|
|
func NewRedirProxy(s string, dialer proxy.Dialer, ipv6 bool) (*RedirProxy, error) {
|
2018-06-26 16:15:48 +08:00
|
|
|
u, err := url.Parse(s)
|
|
|
|
if err != nil {
|
|
|
|
log.F("parse err: %s", err)
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
2018-08-12 12:37:25 +08:00
|
|
|
addr := u.Host
|
|
|
|
r := &RedirProxy{
|
|
|
|
dialer: dialer,
|
|
|
|
addr: addr,
|
2018-09-04 20:26:40 +08:00
|
|
|
ipv6: ipv6,
|
2018-08-12 12:37:25 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
return r, nil
|
2018-06-26 16:15:48 +08:00
|
|
|
}
|
|
|
|
|
2018-08-12 12:37:25 +08:00
|
|
|
// NewRedirServer returns a redir server.
|
|
|
|
func NewRedirServer(s string, dialer proxy.Dialer) (proxy.Server, error) {
|
2018-09-04 20:26:40 +08:00
|
|
|
return NewRedirProxy(s, dialer, false)
|
|
|
|
}
|
|
|
|
|
2018-09-17 19:16:17 +08:00
|
|
|
// NewRedir6Server returns a redir server for ipv6.
|
|
|
|
func NewRedir6Server(s string, dialer proxy.Dialer) (proxy.Server, error) {
|
2018-09-04 20:26:40 +08:00
|
|
|
return NewRedirProxy(s, dialer, true)
|
2017-07-26 18:56:24 +08:00
|
|
|
}
|
|
|
|
|
2017-09-09 15:06:44 +08:00
|
|
|
// ListenAndServe .
|
2018-11-25 13:18:15 +08:00
|
|
|
func (s *RedirProxy) ListenAndServe() {
|
2017-07-26 18:56:24 +08:00
|
|
|
l, err := net.Listen("tcp", s.addr)
|
|
|
|
if err != nil {
|
2018-06-28 23:20:04 +08:00
|
|
|
log.F("[redir] failed to listen on %s: %v", s.addr, err)
|
2017-07-26 18:56:24 +08:00
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2018-06-28 23:20:04 +08:00
|
|
|
log.F("[redir] listening TCP on %s", s.addr)
|
2017-07-26 18:56:24 +08:00
|
|
|
|
|
|
|
for {
|
|
|
|
c, err := l.Accept()
|
|
|
|
if err != nil {
|
2018-06-28 23:20:04 +08:00
|
|
|
log.F("[redir] failed to accept: %v", err)
|
2017-07-26 18:56:24 +08:00
|
|
|
continue
|
|
|
|
}
|
|
|
|
|
|
|
|
go func() {
|
|
|
|
defer c.Close()
|
|
|
|
|
|
|
|
if c, ok := c.(*net.TCPConn); ok {
|
|
|
|
c.SetKeepAlive(true)
|
|
|
|
}
|
|
|
|
|
2018-09-04 20:26:40 +08:00
|
|
|
tgt, err := getOrigDst(c, s.ipv6)
|
2017-07-26 18:56:24 +08:00
|
|
|
if err != nil {
|
2018-06-28 23:20:04 +08:00
|
|
|
log.F("[redir] failed to get target address: %v", err)
|
2017-07-26 18:56:24 +08:00
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2018-08-12 12:37:25 +08:00
|
|
|
rc, err := s.dialer.Dial("tcp", tgt.String())
|
2017-07-26 18:56:24 +08:00
|
|
|
if err != nil {
|
2018-06-28 23:20:04 +08:00
|
|
|
log.F("[redir] failed to connect to target: %v", err)
|
2017-07-26 18:56:24 +08:00
|
|
|
return
|
|
|
|
}
|
|
|
|
defer rc.Close()
|
|
|
|
|
2018-06-28 23:20:04 +08:00
|
|
|
log.F("[redir] %s <-> %s", c.RemoteAddr(), tgt)
|
2017-07-26 18:56:24 +08:00
|
|
|
|
2018-06-26 16:15:48 +08:00
|
|
|
_, _, err = conn.Relay(c, rc)
|
2017-07-26 18:56:24 +08:00
|
|
|
if err != nil {
|
|
|
|
if err, ok := err.(net.Error); ok && err.Timeout() {
|
|
|
|
return // ignore i/o timeout
|
|
|
|
}
|
2018-06-28 23:20:04 +08:00
|
|
|
log.F("[redir] relay error: %v", err)
|
2017-07-26 18:56:24 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
}()
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2018-11-25 13:18:15 +08:00
|
|
|
// Serve .
|
|
|
|
func (s *RedirProxy) Serve(c net.Conn) {
|
2018-11-25 15:41:47 +08:00
|
|
|
log.F("[redir] func Serve: can not be called directly")
|
2018-11-25 13:18:15 +08:00
|
|
|
}
|
|
|
|
|
2017-07-30 12:03:19 +08:00
|
|
|
// Get the original destination of a TCP connection.
|
2018-06-26 16:15:48 +08:00
|
|
|
func getOrigDst(conn net.Conn, ipv6 bool) (socks.Addr, error) {
|
2017-07-30 12:03:19 +08:00
|
|
|
c, ok := conn.(*net.TCPConn)
|
|
|
|
if !ok {
|
|
|
|
return nil, errors.New("only work with TCP connection")
|
|
|
|
}
|
|
|
|
f, err := c.File()
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
defer f.Close()
|
|
|
|
|
|
|
|
fd := f.Fd()
|
|
|
|
|
|
|
|
// The File() call above puts both the original socket fd and the file fd in blocking mode.
|
|
|
|
// Set the file fd back to non-blocking mode and the original socket fd will become non-blocking as well.
|
|
|
|
// Otherwise blocking I/O will waste OS threads.
|
|
|
|
if err := syscall.SetNonblock(int(fd), true); err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
if ipv6 {
|
2017-09-21 23:13:44 +08:00
|
|
|
return getorigdstIPv6(fd)
|
2017-07-30 12:03:19 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
return getorigdst(fd)
|
|
|
|
}
|
|
|
|
|
2017-07-26 18:56:24 +08:00
|
|
|
// Call getorigdst() from linux/net/ipv4/netfilter/nf_conntrack_l3proto_ipv4.c
|
2018-06-26 16:15:48 +08:00
|
|
|
func getorigdst(fd uintptr) (socks.Addr, error) {
|
2017-07-26 18:56:24 +08:00
|
|
|
raw := syscall.RawSockaddrInet4{}
|
|
|
|
siz := unsafe.Sizeof(raw)
|
|
|
|
if err := socketcall(GETSOCKOPT, fd, syscall.IPPROTO_IP, SO_ORIGINAL_DST, uintptr(unsafe.Pointer(&raw)), uintptr(unsafe.Pointer(&siz)), 0); err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
addr := make([]byte, 1+net.IPv4len+2)
|
2018-07-03 00:31:43 +08:00
|
|
|
addr[0] = socks.ATypIP4
|
2017-07-26 18:56:24 +08:00
|
|
|
copy(addr[1:1+net.IPv4len], raw.Addr[:])
|
|
|
|
port := (*[2]byte)(unsafe.Pointer(&raw.Port)) // big-endian
|
|
|
|
addr[1+net.IPv4len], addr[1+net.IPv4len+1] = port[0], port[1]
|
|
|
|
return addr, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// Call ipv6_getorigdst() from linux/net/ipv6/netfilter/nf_conntrack_l3proto_ipv6.c
|
2018-06-26 16:15:48 +08:00
|
|
|
func getorigdstIPv6(fd uintptr) (socks.Addr, error) {
|
2017-07-26 18:56:24 +08:00
|
|
|
raw := syscall.RawSockaddrInet6{}
|
|
|
|
siz := unsafe.Sizeof(raw)
|
|
|
|
if err := socketcall(GETSOCKOPT, fd, syscall.IPPROTO_IPV6, IP6T_SO_ORIGINAL_DST, uintptr(unsafe.Pointer(&raw)), uintptr(unsafe.Pointer(&siz)), 0); err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
addr := make([]byte, 1+net.IPv6len+2)
|
2018-07-03 00:31:43 +08:00
|
|
|
addr[0] = socks.ATypIP6
|
2017-07-26 18:56:24 +08:00
|
|
|
copy(addr[1:1+net.IPv6len], raw.Addr[:])
|
|
|
|
port := (*[2]byte)(unsafe.Pointer(&raw.Port)) // big-endian
|
|
|
|
addr[1+net.IPv6len], addr[1+net.IPv6len+1] = port[0], port[1]
|
|
|
|
return addr, nil
|
|
|
|
}
|