-
Notifications
You must be signed in to change notification settings - Fork 1.2k
/
Copy pathsocks5_local.rs
253 lines (204 loc) · 8.17 KB
/
socks5_local.rs
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
//! Local server that accepts SOCKS 5 protocol
use std::{
io::{self, ErrorKind},
net::{IpAddr, Ipv4Addr, SocketAddr},
};
use futures::future::{self, Either};
use log::{debug, error, info, trace, warn};
use tokio::{
self,
net::{TcpListener, TcpStream},
};
use crate::{
context::SharedContext,
relay::{
loadbalancing::server::{PlainPingBalancer, ServerType, SharedPlainServerStatistic},
socks5::{self, Address, HandshakeRequest, HandshakeResponse, TcpRequestHeader, TcpResponseHeader},
},
};
use super::{ignore_until_end, ProxyStream};
#[derive(Debug, Clone)]
struct UdpConfig {
enable_udp: bool,
client_addr: SocketAddr,
}
async fn handle_socks5_connect<'a>(
server: &SharedPlainServerStatistic,
stream: &mut TcpStream,
client_addr: SocketAddr,
addr: &Address,
) -> io::Result<()> {
let context = server.context();
let svr_cfg = server.server_config();
let svr_s = match ProxyStream::connect(server.clone_context(), svr_cfg, addr).await {
Ok(svr_s) => {
// Tell the client that we are ready
let header = TcpResponseHeader::new(socks5::Reply::Succeeded, Address::SocketAddress(svr_s.local_addr()?));
header.write_to(stream).await?;
trace!("sent header: {:?}", header);
svr_s
}
Err(perr) => {
use crate::relay::socks5::Reply;
if perr.is_proxied() {
// Report to global statistic
server.report_failure().await;
}
let err = perr.into_inner();
let reply = match err.kind() {
ErrorKind::ConnectionRefused => Reply::ConnectionRefused,
ErrorKind::ConnectionAborted => Reply::HostUnreachable,
_ => Reply::NetworkUnreachable,
};
let dummy_address = SocketAddr::new(IpAddr::V4(Ipv4Addr::new(0, 0, 0, 0)), 0);
let header = TcpResponseHeader::new(reply, Address::SocketAddress(dummy_address));
header.write_to(stream).await?;
return Err(err);
}
};
let (mut svr_r, mut svr_w) = svr_s.split();
// Reset `TCP_NODELAY` after Socks5 handshake
if !context.config().no_delay {
if let Err(err) = stream.set_nodelay(false) {
error!("failed to reset TCP_NODELAY on socket, error: {:?}", err);
}
}
let (mut r, mut w) = stream.split();
use tokio::io::copy;
let rhalf = copy(&mut r, &mut svr_w);
let whalf = copy(&mut svr_r, &mut w);
debug!("CONNECT relay established {} <-> {}", client_addr, addr,);
match future::select(rhalf, whalf).await {
Either::Left((Ok(..), _)) => trace!("CONNECT relay {} -> {} closed", client_addr, addr),
Either::Left((Err(err), _)) => {
if let ErrorKind::TimedOut = err.kind() {
trace!("CONNECT relay {} -> {} closed with error {}", client_addr, addr, err);
} else {
error!("CONNECT relay {} -> {} closed with error {}", client_addr, addr, err);
}
}
Either::Right((Ok(..), _)) => trace!("CONNECT relay {} <- {} closed", client_addr, addr),
Either::Right((Err(err), _)) => {
if let ErrorKind::TimedOut = err.kind() {
trace!("CONNECT relay {} <- {} closed with error {}", client_addr, addr, err);
} else {
error!("CONNECT relay {} <- {} closed with error {}", client_addr, addr, err);
}
}
}
debug!("CONNECT relay {} <-> {} closed", client_addr, addr);
Ok(())
}
#[allow(clippy::cognitive_complexity)]
async fn handle_socks5_client(
server: &SharedPlainServerStatistic,
mut s: TcpStream,
udp_conf: UdpConfig,
) -> io::Result<()> {
let svr_cfg = server.server_config();
if let Err(err) = s.set_keepalive(svr_cfg.timeout()) {
error!("failed to set keep alive: {:?}", err);
}
// Enable TCP_NODELAY for quick handshaking
if let Err(err) = s.set_nodelay(true) {
error!("failed to set TCP_NODELAY on accepted socket, error: {:?}", err);
}
let client_addr = s.peer_addr()?;
let handshake_req = HandshakeRequest::read_from(&mut s).await?;
// Socks5 handshakes
trace!("socks5 {:?}", handshake_req);
if !handshake_req.methods.contains(&socks5::SOCKS5_AUTH_METHOD_NONE) {
use std::io::Error;
let resp = HandshakeResponse::new(socks5::SOCKS5_AUTH_METHOD_NOT_ACCEPTABLE);
resp.write_to(&mut s).await?;
return Err(Error::new(
ErrorKind::Other,
"currently shadowsocks-rust does not support authentication",
));
} else {
// Reply to client
let resp = HandshakeResponse::new(socks5::SOCKS5_AUTH_METHOD_NONE);
trace!("Reply handshake {:?}", resp);
resp.write_to(&mut s).await?;
}
// Fetch headers
let header = match TcpRequestHeader::read_from(&mut s).await {
Ok(h) => h,
Err(err) => {
error!("Failed to get TcpRequestHeader: {}", err);
let rh = TcpResponseHeader::new(err.reply, Address::SocketAddress(client_addr));
rh.write_to(&mut s).await?;
return Err(From::from(err));
}
};
trace!("Socks5 {:?}", header);
let addr = header.address;
match header.command {
socks5::Command::TcpConnect => {
let enable_tcp = server.config().mode.enable_tcp();
if enable_tcp {
debug!("CONNECT {}", addr);
match handle_socks5_connect(server, &mut s, client_addr, &addr).await {
Ok(..) => Ok(()),
Err(err) => Err(io::Error::new(
err.kind(),
format!("CONNECT {} failed with error \"{}\"", addr, err),
)),
}
} else {
warn!("CONNECT is not enabled");
let rh = TcpResponseHeader::new(socks5::Reply::CommandNotSupported, addr);
rh.write_to(&mut s).await?;
Ok(())
}
}
socks5::Command::TcpBind => {
warn!("BIND is not supported");
let rh = TcpResponseHeader::new(socks5::Reply::CommandNotSupported, addr);
rh.write_to(&mut s).await?;
Ok(())
}
socks5::Command::UdpAssociate => {
if udp_conf.enable_udp {
debug!("UDP ASSOCIATE {}", addr);
let rh = TcpResponseHeader::new(socks5::Reply::Succeeded, From::from(udp_conf.client_addr));
rh.write_to(&mut s).await?;
// Hold the connection until it ends by its own
ignore_until_end(&mut s).await?;
Ok(())
} else {
warn!("UDP ASSOCIATE is not enabled");
let rh = TcpResponseHeader::new(socks5::Reply::CommandNotSupported, addr);
rh.write_to(&mut s).await?;
Ok(())
}
}
}
}
/// Starts a TCP local server with Socks5 proxy protocol
pub async fn run(context: SharedContext) -> io::Result<()> {
let local_addr = context.config().local.as_ref().expect("local config");
let bind_addr = local_addr.bind_addr(&*context).await?;
let mut listener = TcpListener::bind(&bind_addr)
.await
.unwrap_or_else(|err| panic!("failed to listen on {}, {}", local_addr, err));
let actual_local_addr = listener.local_addr().expect("determine port bound to");
let udp_conf = UdpConfig {
enable_udp: context.config().mode.enable_udp(),
client_addr: actual_local_addr,
};
let servers = PlainPingBalancer::new(context, ServerType::Tcp).await;
info!("shadowsocks TCP listening on {}", actual_local_addr);
loop {
let (socket, peer_addr) = listener.accept().await?;
let server = servers.pick_server();
trace!("got connection, addr: {}", peer_addr);
trace!("picked proxy server: {:?}", server.server_config());
let udp_conf = udp_conf.clone();
tokio::spawn(async move {
if let Err(err) = handle_socks5_client(&server, socket, udp_conf).await {
error!("TCP socks5 client exited with error: {}", err);
}
});
}
}