You can not select more than 25 topics Topics must start with a chinese character,a letter or number, can include dashes ('-') and can be up to 35 characters long.

TCPRelay.cs 27 kB

12 years ago
12 years ago
10 years ago
12 years ago
10 years ago
12 years ago
10 years ago
12 years ago
12 years ago
12 years ago
12 years ago
10 years ago
10 years ago
12 years ago
12 years ago
12 years ago
12 years ago
12 years ago
10 years ago
12 years ago
10 years ago
10 years ago
10 years ago
10 years ago
10 years ago
10 years ago
12 years ago
12 years ago
10 years ago
10 years ago
10 years ago
10 years ago
10 years ago
12 years ago
12 years ago
10 years ago
12 years ago
10 years ago
10 years ago
12 years ago
12 years ago
12 years ago
10 years ago
12 years ago
12 years ago
12 years ago
12 years ago
12 years ago
12 years ago
12 years ago
12 years ago
12 years ago
12 years ago
10 years ago
10 years ago
10 years ago
10 years ago
10 years ago
10 years ago
10 years ago
10 years ago
10 years ago
10 years ago
10 years ago
10 years ago
10 years ago
10 years ago
12 years ago
12 years ago
12 years ago
12 years ago
12 years ago
10 years ago
12 years ago
12 years ago
12 years ago
10 years ago
10 years ago
12 years ago
12 years ago
12 years ago
10 years ago
12 years ago
12 years ago
12 years ago
12 years ago
10 years ago
10 years ago
12 years ago
12 years ago
12 years ago
10 years ago
12 years ago
12 years ago
12 years ago
12 years ago
10 years ago
12 years ago
12 years ago
12 years ago
12 years ago
12 years ago
123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771
  1. using System;
  2. using System.Collections.Generic;
  3. using System.Linq;
  4. using System.Net;
  5. using System.Net.Sockets;
  6. using System.Timers;
  7. using Shadowsocks.Controller.Strategy;
  8. using Shadowsocks.Encryption;
  9. using Shadowsocks.Model;
  10. using Shadowsocks.Proxy;
  11. using Shadowsocks.Util.Sockets;
  12. namespace Shadowsocks.Controller
  13. {
  14. class TCPRelay : Listener.Service
  15. {
  16. private ShadowsocksController _controller;
  17. private DateTime _lastSweepTime;
  18. private Configuration _config;
  19. public ISet<TCPHandler> Handlers { get; set; }
  20. public TCPRelay(ShadowsocksController controller, Configuration conf)
  21. {
  22. _controller = controller;
  23. _config = conf;
  24. Handlers = new HashSet<TCPHandler>();
  25. _lastSweepTime = DateTime.Now;
  26. }
  27. public override bool Handle(byte[] firstPacket, int length, Socket socket, object state)
  28. {
  29. if (socket.ProtocolType != ProtocolType.Tcp
  30. || (length < 2 || firstPacket[0] != 5))
  31. return false;
  32. socket.SetSocketOption(SocketOptionLevel.Tcp, SocketOptionName.NoDelay, true);
  33. TCPHandler handler = new TCPHandler(this, _config);
  34. handler.connection = socket;
  35. handler.controller = _controller;
  36. handler.tcprelay = this;
  37. IList<TCPHandler> handlersToClose = new List<TCPHandler>();
  38. lock (Handlers)
  39. {
  40. Handlers.Add(handler);
  41. DateTime now = DateTime.Now;
  42. if (now - _lastSweepTime > TimeSpan.FromSeconds(1))
  43. {
  44. _lastSweepTime = now;
  45. foreach (TCPHandler handler1 in Handlers)
  46. if (now - handler1.lastActivity > TimeSpan.FromSeconds(900))
  47. handlersToClose.Add(handler1);
  48. }
  49. }
  50. foreach (TCPHandler handler1 in handlersToClose)
  51. {
  52. Logging.Debug("Closing timed out TCP connection.");
  53. handler1.Close();
  54. }
  55. /*
  56. * Start after we put it into Handlers set. Otherwise if it failed in handler.Start()
  57. * then it will call handler.Close() before we add it into the set.
  58. * Then the handler will never release until the next Handle call. Sometimes it will
  59. * cause odd problems (especially during memory profiling).
  60. */
  61. handler.Start(firstPacket, length);
  62. return true;
  63. }
  64. public override void Stop()
  65. {
  66. List<TCPHandler> handlersToClose = new List<TCPHandler>();
  67. lock (Handlers)
  68. {
  69. handlersToClose.AddRange(Handlers);
  70. }
  71. handlersToClose.ForEach(h=>h.Close());
  72. }
  73. public void UpdateInboundCounter(Server server, long n)
  74. {
  75. _controller.UpdateInboundCounter(server, n);
  76. }
  77. public void UpdateOutboundCounter(Server server, long n)
  78. {
  79. _controller.UpdateOutboundCounter(server, n);
  80. }
  81. public void UpdateLatency(Server server, TimeSpan latency)
  82. {
  83. _controller.UpdateLatency(server, latency);
  84. }
  85. }
  86. class TCPHandler
  87. {
  88. class AsyncSession
  89. {
  90. public IProxy Remote { get; }
  91. public AsyncSession(IProxy remote)
  92. {
  93. Remote = remote;
  94. }
  95. }
  96. class AsyncSession<T> : AsyncSession
  97. {
  98. public T State { get; set; }
  99. public AsyncSession(IProxy remote, T state) : base(remote)
  100. {
  101. State = state;
  102. }
  103. public AsyncSession(AsyncSession session, T state): base(session.Remote)
  104. {
  105. State = state;
  106. }
  107. }
  108. // Size of receive buffer.
  109. public static readonly int RecvSize = 8192;
  110. public static readonly int RecvReserveSize = IVEncryptor.ONETIMEAUTH_BYTES + IVEncryptor.AUTH_BYTES; // reserve for one-time auth
  111. public static readonly int BufferSize = RecvSize + RecvReserveSize + 32;
  112. // public Encryptor encryptor;
  113. public IEncryptor encryptor;
  114. public Server server;
  115. // Client socket.
  116. private AsyncSession _currentRemoteSession;
  117. public Socket connection;
  118. public ShadowsocksController controller;
  119. public TCPRelay tcprelay;
  120. public DateTime lastActivity;
  121. private const int MaxRetry = 4;
  122. private int _retryCount = 0;
  123. private bool _proxyConnected;
  124. private bool _destConnected;
  125. private byte _command;
  126. private byte[] _firstPacket;
  127. private int _firstPacketLength;
  128. private int _totalRead = 0;
  129. private int _totalWrite = 0;
  130. private byte[] _remoteRecvBuffer = new byte[BufferSize];
  131. private byte[] _remoteSendBuffer = new byte[BufferSize];
  132. private byte[] _connetionRecvBuffer = new byte[BufferSize];
  133. private byte[] _connetionSendBuffer = new byte[BufferSize];
  134. private bool _connectionShutdown = false;
  135. private bool _remoteShutdown = false;
  136. private bool _closed = false;
  137. private object _encryptionLock = new object();
  138. private object _decryptionLock = new object();
  139. private DateTime _startConnectTime;
  140. private DateTime _startReceivingTime;
  141. private DateTime _startSendingTime;
  142. private int _bytesToSend;
  143. private TCPRelay _tcprelay; // TODO: is _tcprelay equals tcprelay declared above?
  144. private Configuration _config;
  145. public TCPHandler(TCPRelay tcprelay, Configuration config)
  146. {
  147. this._tcprelay = tcprelay;
  148. this._config = config;
  149. }
  150. public void CreateRemote()
  151. {
  152. Server server = controller.GetAServer(IStrategyCallerType.TCP, (IPEndPoint)connection.RemoteEndPoint);
  153. if (server == null || server.server == "")
  154. throw new ArgumentException("No server configured");
  155. lock (_encryptionLock)
  156. {
  157. lock (_decryptionLock)
  158. {
  159. encryptor = EncryptorFactory.GetEncryptor(server.method, server.password, server.auth, false);
  160. }
  161. }
  162. this.server = server;
  163. }
  164. public void Start(byte[] firstPacket, int length)
  165. {
  166. _firstPacket = firstPacket;
  167. _firstPacketLength = length;
  168. HandshakeReceive();
  169. lastActivity = DateTime.Now;
  170. }
  171. private void CheckClose()
  172. {
  173. if (_connectionShutdown && _remoteShutdown)
  174. Close();
  175. }
  176. public void Close()
  177. {
  178. lock (tcprelay.Handlers)
  179. {
  180. tcprelay.Handlers.Remove(this);
  181. }
  182. lock (this) {
  183. if (_closed) return;
  184. _closed = true;
  185. }
  186. try
  187. {
  188. connection?.Shutdown(SocketShutdown.Both);
  189. connection?.Close();
  190. }
  191. catch (Exception e)
  192. {
  193. Logging.LogUsefulException(e);
  194. }
  195. try
  196. {
  197. var remote = _currentRemoteSession?.Remote;
  198. remote?.Shutdown(SocketShutdown.Both);
  199. remote?.Close();
  200. }
  201. catch (Exception e)
  202. {
  203. Logging.LogUsefulException(e);
  204. }
  205. lock (_encryptionLock)
  206. {
  207. lock (_decryptionLock)
  208. {
  209. encryptor?.Dispose();
  210. }
  211. }
  212. }
  213. private void HandshakeReceive()
  214. {
  215. if (_closed) return;
  216. try
  217. {
  218. int bytesRead = _firstPacketLength;
  219. if (bytesRead > 1)
  220. {
  221. byte[] response = { 5, 0 };
  222. if (_firstPacket[0] != 5)
  223. {
  224. // reject socks 4
  225. response = new byte[] { 0, 91 };
  226. Logging.Error("socks 5 protocol error");
  227. }
  228. connection?.BeginSend(response, 0, response.Length, SocketFlags.None, new AsyncCallback(HandshakeSendCallback), null);
  229. }
  230. else
  231. Close();
  232. }
  233. catch (Exception e)
  234. {
  235. Logging.LogUsefulException(e);
  236. Close();
  237. }
  238. }
  239. private void HandshakeSendCallback(IAsyncResult ar)
  240. {
  241. if (_closed) return;
  242. try
  243. {
  244. connection.EndSend(ar);
  245. // +-----+-----+-------+------+----------+----------+
  246. // | VER | CMD | RSV | ATYP | DST.ADDR | DST.PORT |
  247. // +-----+-----+-------+------+----------+----------+
  248. // | 1 | 1 | X'00' | 1 | Variable | 2 |
  249. // +-----+-----+-------+------+----------+----------+
  250. // Skip first 3 bytes
  251. // TODO validate
  252. connection.BeginReceive(_connetionRecvBuffer, 0, 3, SocketFlags.None, new AsyncCallback(handshakeReceive2Callback), null);
  253. }
  254. catch (Exception e)
  255. {
  256. Logging.LogUsefulException(e);
  257. Close();
  258. }
  259. }
  260. private void handshakeReceive2Callback(IAsyncResult ar)
  261. {
  262. if (_closed) return;
  263. try
  264. {
  265. int bytesRead = connection.EndReceive(ar);
  266. if (bytesRead >= 3)
  267. {
  268. _command = _connetionRecvBuffer[1];
  269. if (_command == 1)
  270. {
  271. byte[] response = { 5, 0, 0, 1, 0, 0, 0, 0, 0, 0 };
  272. connection.BeginSend(response, 0, response.Length, SocketFlags.None, new AsyncCallback(ResponseCallback), null);
  273. }
  274. else if (_command == 3)
  275. HandleUDPAssociate();
  276. }
  277. else
  278. {
  279. Logging.Debug("failed to recv data in Shadowsocks.Controller.TCPHandler.handshakeReceive2Callback()");
  280. Close();
  281. }
  282. }
  283. catch (Exception e)
  284. {
  285. Logging.LogUsefulException(e);
  286. Close();
  287. }
  288. }
  289. private void HandleUDPAssociate()
  290. {
  291. IPEndPoint endPoint = (IPEndPoint)connection.LocalEndPoint;
  292. byte[] address = endPoint.Address.GetAddressBytes();
  293. int port = endPoint.Port;
  294. byte[] response = new byte[4 + address.Length + 2];
  295. response[0] = 5;
  296. switch (endPoint.AddressFamily)
  297. {
  298. case AddressFamily.InterNetwork:
  299. response[3] = 1;
  300. break;
  301. case AddressFamily.InterNetworkV6:
  302. response[3] = 4;
  303. break;
  304. }
  305. address.CopyTo(response, 4);
  306. response[response.Length - 1] = (byte)(port & 0xFF);
  307. response[response.Length - 2] = (byte)((port >> 8) & 0xFF);
  308. connection.BeginSend(response, 0, response.Length, SocketFlags.None, new AsyncCallback(ReadAll), true);
  309. }
  310. private void ReadAll(IAsyncResult ar)
  311. {
  312. if (_closed) return;
  313. try
  314. {
  315. if (ar.AsyncState != null)
  316. {
  317. connection.EndSend(ar);
  318. connection.BeginReceive(_connetionRecvBuffer, 0, RecvSize, SocketFlags.None, new AsyncCallback(ReadAll), null);
  319. }
  320. else
  321. {
  322. int bytesRead = connection.EndReceive(ar);
  323. if (bytesRead > 0)
  324. {
  325. connection.BeginReceive(_connetionRecvBuffer, 0, RecvSize, SocketFlags.None, new AsyncCallback(ReadAll), null);
  326. }
  327. else
  328. Close();
  329. }
  330. }
  331. catch (Exception e)
  332. {
  333. Logging.LogUsefulException(e);
  334. Close();
  335. }
  336. }
  337. private void ResponseCallback(IAsyncResult ar)
  338. {
  339. try
  340. {
  341. connection?.EndSend(ar);
  342. StartConnect();
  343. }
  344. catch (Exception e)
  345. {
  346. Logging.LogUsefulException(e);
  347. Close();
  348. }
  349. }
  350. // inner class
  351. private class ProxyTimer : Timer
  352. {
  353. public AsyncSession Session;
  354. public EndPoint DestEndPoint;
  355. public Server Server;
  356. public ProxyTimer(int p) : base(p)
  357. {
  358. }
  359. }
  360. private class ServerTimer : Timer
  361. {
  362. public AsyncSession Session;
  363. public Server Server;
  364. public ServerTimer(int p) : base(p) { }
  365. }
  366. private void StartConnect()
  367. {
  368. try
  369. {
  370. CreateRemote();
  371. // Setting up proxy
  372. IProxy remote;
  373. EndPoint proxyEP;
  374. if (_config.useProxy)
  375. {
  376. remote = new Socks5Proxy();
  377. proxyEP = SocketUtil.GetEndPoint(_config.proxyServer, _config.proxyPort);
  378. }
  379. else
  380. {
  381. remote = new DirectConnect();
  382. proxyEP = null;
  383. }
  384. var session = new AsyncSession(remote);
  385. _currentRemoteSession = session;
  386. ProxyTimer proxyTimer = new ProxyTimer(3000);
  387. proxyTimer.AutoReset = false;
  388. proxyTimer.Elapsed += proxyConnectTimer_Elapsed;
  389. proxyTimer.Enabled = true;
  390. proxyTimer.Session = session;
  391. proxyTimer.DestEndPoint = SocketUtil.GetEndPoint(server.server, server.server_port);
  392. proxyTimer.Server = server;
  393. _proxyConnected = false;
  394. // Connect to the proxy server.
  395. remote.BeginConnectProxy(proxyEP, new AsyncCallback(ProxyConnectCallback), new AsyncSession<ProxyTimer>(remote, proxyTimer));
  396. }
  397. catch (Exception e)
  398. {
  399. Logging.LogUsefulException(e);
  400. Close();
  401. }
  402. }
  403. private void proxyConnectTimer_Elapsed(object sender, ElapsedEventArgs e)
  404. {
  405. var timer = (ProxyTimer) sender;
  406. timer.Elapsed -= proxyConnectTimer_Elapsed;
  407. timer.Enabled = false;
  408. timer.Dispose();
  409. if (_proxyConnected || _destConnected || _closed)
  410. {
  411. return;
  412. }
  413. var proxy = timer.Session.Remote;
  414. Logging.Info($"Proxy {proxy.ProxyEndPoint} timed out");
  415. proxy.Close();
  416. RetryConnect();
  417. }
  418. private void ProxyConnectCallback(IAsyncResult ar)
  419. {
  420. Server server = null;
  421. if (_closed)
  422. {
  423. return;
  424. }
  425. try
  426. {
  427. var session = (AsyncSession<ProxyTimer>) ar.AsyncState;
  428. ProxyTimer timer = session.State;
  429. var destEndPoint = timer.DestEndPoint;
  430. server = timer.Server;
  431. timer.Elapsed -= proxyConnectTimer_Elapsed;
  432. timer.Enabled = false;
  433. timer.Dispose();
  434. var remote = session.Remote;
  435. // Complete the connection.
  436. remote.EndConnectProxy(ar);
  437. _proxyConnected = true;
  438. if (_config.isVerboseLogging)
  439. {
  440. if (!(remote is DirectConnect))
  441. {
  442. Logging.Info($"Socket connected to proxy {remote.ProxyEndPoint}");
  443. }
  444. }
  445. _startConnectTime = DateTime.Now;
  446. ServerTimer connectTimer = new ServerTimer(3000);
  447. connectTimer.AutoReset = false;
  448. connectTimer.Elapsed += destConnectTimer_Elapsed;
  449. connectTimer.Enabled = true;
  450. connectTimer.Session = session;
  451. connectTimer.Server = server;
  452. _destConnected = false;
  453. // Connect to the remote endpoint.
  454. remote.BeginConnectDest(destEndPoint, new AsyncCallback(ConnectCallback), new AsyncSession<ServerTimer>(session, connectTimer));
  455. }
  456. catch (ArgumentException)
  457. {
  458. }
  459. catch (Exception e)
  460. {
  461. Logging.LogUsefulException(e);
  462. RetryConnect();
  463. }
  464. }
  465. private void destConnectTimer_Elapsed(object sender, ElapsedEventArgs e)
  466. {
  467. var timer = (ServerTimer)sender;
  468. timer.Elapsed -= destConnectTimer_Elapsed;
  469. timer.Enabled = false;
  470. timer.Dispose();
  471. if (_destConnected || _closed)
  472. {
  473. return;
  474. }
  475. var session = timer.Session;
  476. Server server = timer.Server;
  477. IStrategy strategy = controller.GetCurrentStrategy();
  478. strategy?.SetFailure(server);
  479. Logging.Info($"{server.FriendlyName()} timed out");
  480. session.Remote.Close();
  481. RetryConnect();
  482. }
  483. private void RetryConnect()
  484. {
  485. if (_retryCount < MaxRetry)
  486. {
  487. Logging.Debug($"Connection failed, retry ({_retryCount})");
  488. StartConnect();
  489. _retryCount++;
  490. }
  491. else
  492. Close();
  493. }
  494. private void ConnectCallback(IAsyncResult ar)
  495. {
  496. if (_closed) return;
  497. try
  498. {
  499. var session = (AsyncSession<ServerTimer>) ar.AsyncState;
  500. ServerTimer timer = session.State;
  501. server = timer.Server;
  502. timer.Elapsed -= destConnectTimer_Elapsed;
  503. timer.Enabled = false;
  504. timer.Dispose();
  505. var remote = session.Remote;
  506. // Complete the connection.
  507. remote?.EndConnectDest(ar);
  508. _destConnected = true;
  509. if (_config.isVerboseLogging)
  510. {
  511. Logging.Info($"Socket connected to ss server: {server.FriendlyName()}");
  512. }
  513. var latency = DateTime.Now - _startConnectTime;
  514. IStrategy strategy = controller.GetCurrentStrategy();
  515. strategy?.UpdateLatency(server, latency);
  516. _tcprelay.UpdateLatency(server, latency);
  517. StartPipe(session);
  518. }
  519. catch (ArgumentException)
  520. {
  521. }
  522. catch (Exception e)
  523. {
  524. if (server != null)
  525. {
  526. IStrategy strategy = controller.GetCurrentStrategy();
  527. strategy?.SetFailure(server);
  528. }
  529. Logging.LogUsefulException(e);
  530. RetryConnect();
  531. }
  532. }
  533. private void StartPipe(AsyncSession session)
  534. {
  535. if (_closed) return;
  536. try
  537. {
  538. _startReceivingTime = DateTime.Now;
  539. session.Remote.BeginReceive(_remoteRecvBuffer, 0, RecvSize, SocketFlags.None, new AsyncCallback(PipeRemoteReceiveCallback), session);
  540. connection?.BeginReceive(_connetionRecvBuffer, 0, RecvSize, SocketFlags.None, new AsyncCallback(PipeConnectionReceiveCallback),
  541. new AsyncSession<bool>(session, true) /* to tell the callback this is the first time reading packet, and we haven't found the header yet. */);
  542. }
  543. catch (Exception e)
  544. {
  545. Logging.LogUsefulException(e);
  546. Close();
  547. }
  548. }
  549. private void PipeRemoteReceiveCallback(IAsyncResult ar)
  550. {
  551. if (_closed) return;
  552. try
  553. {
  554. var session = (AsyncSession) ar.AsyncState;
  555. int bytesRead = session.Remote.EndReceive(ar);
  556. _totalRead += bytesRead;
  557. _tcprelay.UpdateInboundCounter(server, bytesRead);
  558. if (bytesRead > 0)
  559. {
  560. lastActivity = DateTime.Now;
  561. int bytesToSend;
  562. lock (_decryptionLock)
  563. {
  564. if (_closed) return;
  565. encryptor.Decrypt(_remoteRecvBuffer, bytesRead, _remoteSendBuffer, out bytesToSend);
  566. }
  567. connection.BeginSend(_remoteSendBuffer, 0, bytesToSend, SocketFlags.None, new AsyncCallback(PipeConnectionSendCallback), session);
  568. IStrategy strategy = controller.GetCurrentStrategy();
  569. strategy?.UpdateLastRead(server);
  570. }
  571. else
  572. {
  573. connection.Shutdown(SocketShutdown.Send);
  574. _connectionShutdown = true;
  575. CheckClose();
  576. }
  577. }
  578. catch (Exception e)
  579. {
  580. Logging.LogUsefulException(e);
  581. Close();
  582. }
  583. }
  584. private void PipeConnectionReceiveCallback(IAsyncResult ar)
  585. {
  586. if (_closed) return;
  587. try
  588. {
  589. if(connection == null) return;
  590. int bytesRead = connection.EndReceive(ar);
  591. _totalWrite += bytesRead;
  592. var session = (AsyncSession<bool>) ar.AsyncState;
  593. var remote = session.Remote;
  594. if (bytesRead > 0)
  595. {
  596. /*
  597. * Only the first packet contains the socks5 header, it doesn't make sense to parse every packets.
  598. * Also it's unnecessary to parse these data if we turn off the VerboseLogging.
  599. */
  600. if (session.State && _config.isVerboseLogging)
  601. {
  602. int atyp = _connetionRecvBuffer[0];
  603. string dst_addr;
  604. int dst_port;
  605. switch (atyp)
  606. {
  607. case 1: // IPv4 address, 4 bytes
  608. dst_addr = new IPAddress(_connetionRecvBuffer.Skip(1).Take(4).ToArray()).ToString();
  609. dst_port = (_connetionRecvBuffer[5] << 8) + _connetionRecvBuffer[6];
  610. Logging.Info($"connect to {dst_addr}:{dst_port}");
  611. session.State = false;
  612. break;
  613. case 3: // domain name, length + str
  614. int len = _connetionRecvBuffer[1];
  615. dst_addr = System.Text.Encoding.UTF8.GetString(_connetionRecvBuffer, 2, len);
  616. dst_port = (_connetionRecvBuffer[len + 2] << 8) + _connetionRecvBuffer[len + 3];
  617. Logging.Info($"connect to {dst_addr}:{dst_port}");
  618. session.State = false;
  619. break;
  620. case 4: // IPv6 address, 16 bytes
  621. dst_addr = new IPAddress(_connetionRecvBuffer.Skip(1).Take(16).ToArray()).ToString();
  622. dst_port = (_connetionRecvBuffer[17] << 8) + _connetionRecvBuffer[18];
  623. Logging.Info($"connect to [{dst_addr}]:{dst_port}");
  624. session.State = false;
  625. break;
  626. }
  627. }
  628. int bytesToSend;
  629. lock (_encryptionLock)
  630. {
  631. if (_closed) return;
  632. encryptor.Encrypt(_connetionRecvBuffer, bytesRead, _connetionSendBuffer, out bytesToSend);
  633. }
  634. _tcprelay.UpdateOutboundCounter(server, bytesToSend);
  635. _startSendingTime = DateTime.Now;
  636. _bytesToSend = bytesToSend;
  637. remote.BeginSend(_connetionSendBuffer, 0, bytesToSend, SocketFlags.None, new AsyncCallback(PipeRemoteSendCallback), session);
  638. IStrategy strategy = controller.GetCurrentStrategy();
  639. strategy?.UpdateLastWrite(server);
  640. }
  641. else
  642. {
  643. remote.Shutdown(SocketShutdown.Send);
  644. _remoteShutdown = true;
  645. CheckClose();
  646. }
  647. }
  648. catch (Exception e)
  649. {
  650. Logging.LogUsefulException(e);
  651. Close();
  652. }
  653. }
  654. private void PipeRemoteSendCallback(IAsyncResult ar)
  655. {
  656. if (_closed) return;
  657. try
  658. {
  659. var session = (AsyncSession)ar.AsyncState;
  660. session.Remote.EndSend(ar);
  661. connection?.BeginReceive(_connetionRecvBuffer, 0, RecvSize, SocketFlags.None, new AsyncCallback(PipeConnectionReceiveCallback), session);
  662. }
  663. catch (Exception e)
  664. {
  665. Logging.LogUsefulException(e);
  666. Close();
  667. }
  668. }
  669. private void PipeConnectionSendCallback(IAsyncResult ar)
  670. {
  671. if (_closed) return;
  672. try
  673. {
  674. var session = (AsyncSession)ar.AsyncState;
  675. connection?.EndSend(ar);
  676. session.Remote.BeginReceive(_remoteRecvBuffer, 0, RecvSize, SocketFlags.None, new AsyncCallback(PipeRemoteReceiveCallback), session);
  677. }
  678. catch (Exception e)
  679. {
  680. Logging.LogUsefulException(e);
  681. Close();
  682. }
  683. }
  684. }
  685. }