You can not select more than 25 topics Topics must start with a chinese character,a letter or number, can include dashes ('-') and can be up to 35 characters long.

TCPRelay.cs 36 kB

12 years ago
12 years ago
10 years ago
12 years ago
12 years ago
10 years ago
12 years ago
12 years ago
12 years ago
12 years ago
10 years ago
12 years ago
12 years ago
12 years ago
12 years ago
10 years ago
10 years ago
10 years ago
10 years ago
10 years ago
10 years ago
10 years ago
10 years ago
10 years ago
10 years ago
10 years ago
10 years ago
10 years ago
10 years ago
10 years ago
10 years ago
10 years ago
12 years ago
12 years ago
12 years ago
12 years ago
12 years ago
10 years ago
12 years ago
12 years ago
12 years ago
12 years ago
12 years ago
12 years ago
10 years ago
12 years ago
12 years ago
12 years ago
12 years ago
12 years ago
12 years ago
10 years ago
12 years ago
12 years ago
12 years ago
12 years ago
10 years ago
12 years ago
12 years ago
12 years ago
12 years ago
123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929930931932933934935936937938939940941942943944945946947948949950951952953954955956957958959960961962963964965966967968969970971972973974975976977978
  1. using NLog;
  2. using System;
  3. using System.Collections.Generic;
  4. using System.Linq;
  5. using System.Net;
  6. using System.Net.Sockets;
  7. using System.Timers;
  8. using Shadowsocks.Controller.Strategy;
  9. using Shadowsocks.Encryption;
  10. using Shadowsocks.Encryption.AEAD;
  11. using Shadowsocks.Encryption.Exception;
  12. using Shadowsocks.Model;
  13. using Shadowsocks.Proxy;
  14. using Shadowsocks.Util.Sockets;
  15. using static Shadowsocks.Encryption.EncryptorBase;
  16. namespace Shadowsocks.Controller
  17. {
  18. class TCPRelay : Listener.Service
  19. {
  20. private static Logger logger = LogManager.GetCurrentClassLogger();
  21. private ShadowsocksController _controller;
  22. private DateTime _lastSweepTime;
  23. private Configuration _config;
  24. public ISet<TCPHandler> Handlers { get; set; }
  25. public TCPRelay(ShadowsocksController controller, Configuration conf)
  26. {
  27. _controller = controller;
  28. _config = conf;
  29. Handlers = new HashSet<TCPHandler>();
  30. _lastSweepTime = DateTime.Now;
  31. }
  32. public override bool Handle(CachedNetworkStream stream, object state)
  33. {
  34. byte[] fp = new byte[256];
  35. int len = stream.ReadFirstBlock(fp);
  36. return Handle(fp, len, stream.Socket, state);
  37. }
  38. public override bool Handle(byte[] firstPacket, int length, Socket socket, object state)
  39. {
  40. if (socket.ProtocolType != ProtocolType.Tcp
  41. || (length < 2 || firstPacket[0] != 5))
  42. return false;
  43. socket.SetSocketOption(SocketOptionLevel.Tcp, SocketOptionName.NoDelay, true);
  44. TCPHandler handler = new TCPHandler(_controller, _config, this, socket);
  45. IList<TCPHandler> handlersToClose = new List<TCPHandler>();
  46. lock (Handlers)
  47. {
  48. Handlers.Add(handler);
  49. DateTime now = DateTime.Now;
  50. if (now - _lastSweepTime > TimeSpan.FromSeconds(1))
  51. {
  52. _lastSweepTime = now;
  53. foreach (TCPHandler handler1 in Handlers)
  54. if (now - handler1.lastActivity > TimeSpan.FromSeconds(900))
  55. handlersToClose.Add(handler1);
  56. }
  57. }
  58. foreach (TCPHandler handler1 in handlersToClose)
  59. {
  60. logger.Debug("Closing timed out TCP connection.");
  61. handler1.Close();
  62. }
  63. /*
  64. * Start after we put it into Handlers set. Otherwise if it failed in handler.Start()
  65. * then it will call handler.Close() before we add it into the set.
  66. * Then the handler will never release until the next Handle call. Sometimes it will
  67. * cause odd problems (especially during memory profiling).
  68. */
  69. handler.Start(firstPacket, length);
  70. return true;
  71. }
  72. public override void Stop()
  73. {
  74. List<TCPHandler> handlersToClose = new List<TCPHandler>();
  75. lock (Handlers)
  76. {
  77. handlersToClose.AddRange(Handlers);
  78. }
  79. handlersToClose.ForEach(h => h.Close());
  80. }
  81. public void UpdateInboundCounter(Server server, long n)
  82. {
  83. _controller.UpdateInboundCounter(server, n);
  84. }
  85. public void UpdateOutboundCounter(Server server, long n)
  86. {
  87. _controller.UpdateOutboundCounter(server, n);
  88. }
  89. public void UpdateLatency(Server server, TimeSpan latency)
  90. {
  91. _controller.UpdateLatency(server, latency);
  92. }
  93. }
  94. internal class TCPHandler
  95. {
  96. class AsyncSession
  97. {
  98. public IProxy Remote { get; }
  99. public AsyncSession(IProxy remote)
  100. {
  101. Remote = remote;
  102. }
  103. }
  104. class AsyncSession<T> : AsyncSession
  105. {
  106. public T State { get; set; }
  107. public AsyncSession(IProxy remote, T state) : base(remote)
  108. {
  109. State = state;
  110. }
  111. public AsyncSession(AsyncSession session, T state) : base(session.Remote)
  112. {
  113. State = state;
  114. }
  115. }
  116. private static Logger Logger = LogManager.GetCurrentClassLogger();
  117. private readonly int _serverTimeout;
  118. private readonly int _proxyTimeout;
  119. // each recv size.
  120. public const int RecvSize = 2048;
  121. // overhead of one chunk, reserved for AEAD ciphers
  122. public const int ChunkOverheadSize = 16 * 2 /* two tags */ + AEADEncryptor.ChunkLengthBytes;
  123. // max chunk size
  124. public const uint MaxChunkSize = AEADEncryptor.ChunkLengthMask + AEADEncryptor.ChunkLengthBytes + 16 * 2;
  125. // In general, the ciphertext length, we should take overhead into account
  126. public const int BufferSize = RecvSize + (int)MaxChunkSize + 32 /* max salt len */;
  127. public DateTime lastActivity;
  128. private ShadowsocksController _controller;
  129. private Configuration _config;
  130. private TCPRelay _tcprelay;
  131. private Socket _connection;
  132. private IEncryptor encryptor;
  133. // workaround
  134. private IEncryptor decryptor;
  135. private Server _server;
  136. private AsyncSession _currentRemoteSession;
  137. private bool _proxyConnected;
  138. private bool _destConnected;
  139. private byte _command;
  140. private byte[] _firstPacket;
  141. private int _firstPacketLength;
  142. private const int CMD_CONNECT = 0x01;
  143. private const int CMD_BIND = 0x02;
  144. private const int CMD_UDP_ASSOC = 0x03;
  145. private int _addrBufLength = -1;
  146. private int _totalRead = 0;
  147. private int _totalWrite = 0;
  148. // remote -> local proxy (ciphertext, before decrypt)
  149. private byte[] _remoteRecvBuffer = new byte[BufferSize];
  150. // client -> local proxy (plaintext, before encrypt)
  151. private byte[] _connetionRecvBuffer = new byte[BufferSize];
  152. // local proxy -> remote (plaintext, after decrypt)
  153. private byte[] _remoteSendBuffer = new byte[BufferSize];
  154. // local proxy -> client (ciphertext, before decrypt)
  155. private byte[] _connetionSendBuffer = new byte[BufferSize];
  156. private bool _connectionShutdown = false;
  157. private bool _remoteShutdown = false;
  158. private bool _closed = false;
  159. // instance-based lock without static
  160. private readonly object _encryptionLock = new object();
  161. private readonly object _decryptionLock = new object();
  162. private readonly object _closeConnLock = new object();
  163. private DateTime _startConnectTime;
  164. private DateTime _startReceivingTime;
  165. private DateTime _startSendingTime;
  166. private EndPoint _destEndPoint = null;
  167. public TCPHandler(ShadowsocksController controller, Configuration config, TCPRelay tcprelay, Socket socket)
  168. {
  169. _controller = controller;
  170. _config = config;
  171. _tcprelay = tcprelay;
  172. _connection = socket;
  173. _proxyTimeout = config.proxy.proxyTimeout * 1000;
  174. _serverTimeout = config.GetCurrentServer().timeout * 1000;
  175. lastActivity = DateTime.Now;
  176. }
  177. public void CreateRemote()
  178. {
  179. Server server = _controller.GetAServer(IStrategyCallerType.TCP, (IPEndPoint)_connection.RemoteEndPoint,
  180. _destEndPoint);
  181. if (server == null || server.server == "")
  182. throw new ArgumentException("No server configured");
  183. encryptor = EncryptorFactory.GetEncryptor(server.method, server.password);
  184. decryptor = EncryptorFactory.GetEncryptor(server.method, server.password);
  185. this._server = server;
  186. /* prepare address buffer length for AEAD */
  187. Logger.Debug($"_addrBufLength={_addrBufLength}");
  188. encryptor.AddressBufferLength = _addrBufLength;
  189. decryptor.AddressBufferLength = _addrBufLength;
  190. }
  191. public void Start(byte[] firstPacket, int length)
  192. {
  193. _firstPacket = firstPacket;
  194. _firstPacketLength = length;
  195. HandshakeReceive();
  196. }
  197. private void CheckClose()
  198. {
  199. if (_connectionShutdown && _remoteShutdown)
  200. Close();
  201. }
  202. public void Close()
  203. {
  204. lock (_closeConnLock)
  205. {
  206. if (_closed) return;
  207. _closed = true;
  208. }
  209. lock (_tcprelay.Handlers)
  210. {
  211. _tcprelay.Handlers.Remove(this);
  212. }
  213. try
  214. {
  215. _connection.Shutdown(SocketShutdown.Both);
  216. _connection.Close();
  217. }
  218. catch (Exception e)
  219. {
  220. Logger.LogUsefulException(e);
  221. }
  222. if (_currentRemoteSession != null)
  223. {
  224. try
  225. {
  226. var remote = _currentRemoteSession.Remote;
  227. remote.Shutdown(SocketShutdown.Both);
  228. remote.Close();
  229. }
  230. catch (Exception e)
  231. {
  232. Logger.LogUsefulException(e);
  233. }
  234. }
  235. }
  236. private void HandshakeReceive()
  237. {
  238. if (_closed) return;
  239. try
  240. {
  241. int bytesRead = _firstPacketLength;
  242. if (bytesRead > 1)
  243. {
  244. byte[] response = { 5, 0 };
  245. if (_firstPacket[0] != 5)
  246. {
  247. // reject socks 4
  248. response = new byte[] { 0, 91 };
  249. Logger.Error("socks 5 protocol error");
  250. }
  251. _connection.BeginSend(response, 0, response.Length, SocketFlags.None,
  252. HandshakeSendCallback, null);
  253. }
  254. else
  255. Close();
  256. }
  257. catch (Exception e)
  258. {
  259. Logger.LogUsefulException(e);
  260. Close();
  261. }
  262. }
  263. private void HandshakeSendCallback(IAsyncResult ar)
  264. {
  265. if (_closed) return;
  266. try
  267. {
  268. _connection.EndSend(ar);
  269. // +-----+-----+-------+------+----------+----------+
  270. // | VER | CMD | RSV | ATYP | DST.ADDR | DST.PORT |
  271. // +-----+-----+-------+------+----------+----------+
  272. // | 1 | 1 | X'00' | 1 | Variable | 2 |
  273. // +-----+-----+-------+------+----------+----------+
  274. // Skip first 3 bytes, and read 2 more bytes to analysis the address.
  275. // 2 more bytes is designed if address is domain then we don't need to read once more to get the addr length.
  276. // TODO validate
  277. _connection.BeginReceive(_connetionRecvBuffer, 0, 3 + ADDR_ATYP_LEN + 1, SocketFlags.None,
  278. HandshakeReceive2Callback, null);
  279. }
  280. catch (Exception e)
  281. {
  282. Logger.LogUsefulException(e);
  283. Close();
  284. }
  285. }
  286. private void HandshakeReceive2Callback(IAsyncResult ar)
  287. {
  288. if (_closed) return;
  289. try
  290. {
  291. int bytesRead = _connection.EndReceive(ar);
  292. if (bytesRead >= 5)
  293. {
  294. _command = _connetionRecvBuffer[1];
  295. switch (_command)
  296. {
  297. case CMD_CONNECT:
  298. // +----+-----+-------+------+----------+----------+
  299. // |VER | REP | RSV | ATYP | BND.ADDR | BND.PORT |
  300. // +----+-----+-------+------+----------+----------+
  301. // | 1 | 1 | X'00' | 1 | Variable | 2 |
  302. // +----+-----+-------+------+----------+----------+
  303. byte[] response = { 5, 0, 0, 1, 0, 0, 0, 0, 0, 0 };
  304. _connection.BeginSend(response, 0, response.Length, SocketFlags.None,
  305. ResponseCallback, null);
  306. break;
  307. case CMD_UDP_ASSOC:
  308. ReadAddress(HandleUDPAssociate);
  309. break;
  310. case CMD_BIND: // not implemented
  311. default:
  312. Logger.Debug("Unsupported CMD=" + _command);
  313. Close();
  314. break;
  315. }
  316. }
  317. else
  318. {
  319. Logger.Debug(
  320. "failed to recv data in Shadowsocks.Controller.TCPHandler.handshakeReceive2Callback()");
  321. Close();
  322. }
  323. }
  324. catch (Exception e)
  325. {
  326. Logger.LogUsefulException(e);
  327. Close();
  328. }
  329. }
  330. private void ResponseCallback(IAsyncResult ar)
  331. {
  332. try
  333. {
  334. _connection.EndSend(ar);
  335. ReadAddress(StartConnect);
  336. }
  337. catch (Exception e)
  338. {
  339. Logger.LogUsefulException(e);
  340. Close();
  341. }
  342. }
  343. private void ReadAddress(Action onSuccess)
  344. {
  345. int atyp = _connetionRecvBuffer[3];
  346. switch (atyp)
  347. {
  348. case ATYP_IPv4: // IPv4 address, 4 bytes
  349. ReadAddress(4 + ADDR_PORT_LEN - 1, onSuccess);
  350. break;
  351. case ATYP_DOMAIN: // domain name, length + str
  352. int len = _connetionRecvBuffer[4];
  353. ReadAddress(len + ADDR_PORT_LEN, onSuccess);
  354. break;
  355. case ATYP_IPv6: // IPv6 address, 16 bytes
  356. ReadAddress(16 + ADDR_PORT_LEN - 1, onSuccess);
  357. break;
  358. default:
  359. Logger.Debug("Unsupported ATYP=" + atyp);
  360. Close();
  361. break;
  362. }
  363. }
  364. private void ReadAddress(int bytesRemain, Action onSuccess)
  365. {
  366. // drop [ VER | CMD | RSV ]
  367. Array.Copy(_connetionRecvBuffer, 3, _connetionRecvBuffer, 0, ADDR_ATYP_LEN + 1);
  368. // Read the remain address bytes
  369. _connection.BeginReceive(_connetionRecvBuffer, 2, RecvSize - 2, SocketFlags.None, OnAddressFullyRead,
  370. new object[] { bytesRemain, onSuccess });
  371. }
  372. private void OnAddressFullyRead(IAsyncResult ar)
  373. {
  374. if (_closed) return;
  375. try
  376. {
  377. int bytesRead = _connection.EndReceive(ar);
  378. var states = (object[])ar.AsyncState;
  379. int bytesRemain = (int)states[0];
  380. var onSuccess = (Action)states[1];
  381. if (bytesRead >= bytesRemain)
  382. {
  383. _firstPacketLength = bytesRead + 2;
  384. int atyp = _connetionRecvBuffer[0];
  385. string dstAddr = "Unknown";
  386. int dstPort = -1;
  387. switch (atyp)
  388. {
  389. case ATYP_IPv4: // IPv4 address, 4 bytes
  390. dstAddr = new IPAddress(_connetionRecvBuffer.Skip(1).Take(4).ToArray()).ToString();
  391. dstPort = (_connetionRecvBuffer[5] << 8) + _connetionRecvBuffer[6];
  392. _addrBufLength = ADDR_ATYP_LEN + 4 + ADDR_PORT_LEN;
  393. break;
  394. case ATYP_DOMAIN: // domain name, length + str
  395. int len = _connetionRecvBuffer[1];
  396. dstAddr = System.Text.Encoding.UTF8.GetString(_connetionRecvBuffer, 2, len);
  397. dstPort = (_connetionRecvBuffer[len + 2] << 8) + _connetionRecvBuffer[len + 3];
  398. _addrBufLength = ADDR_ATYP_LEN + 1 + len + ADDR_PORT_LEN;
  399. break;
  400. case ATYP_IPv6: // IPv6 address, 16 bytes
  401. dstAddr = $"[{new IPAddress(_connetionRecvBuffer.Skip(1).Take(16).ToArray())}]";
  402. dstPort = (_connetionRecvBuffer[17] << 8) + _connetionRecvBuffer[18];
  403. _addrBufLength = ADDR_ATYP_LEN + 16 + ADDR_PORT_LEN;
  404. break;
  405. }
  406. Logger.Debug($"connect to {dstAddr}:{dstPort}");
  407. _destEndPoint = SocketUtil.GetEndPoint(dstAddr, dstPort);
  408. onSuccess.Invoke(); /* StartConnect() */
  409. }
  410. else
  411. {
  412. Logger.Debug("failed to recv data in Shadowsocks.Controller.TCPHandler.OnAddressFullyRead()");
  413. Close();
  414. }
  415. }
  416. catch (Exception e)
  417. {
  418. Logger.LogUsefulException(e);
  419. Close();
  420. }
  421. }
  422. private void HandleUDPAssociate()
  423. {
  424. IPEndPoint endPoint = (IPEndPoint)_connection.LocalEndPoint;
  425. byte[] address = endPoint.Address.GetAddressBytes();
  426. int port = endPoint.Port;
  427. byte[] response = new byte[4 + address.Length + ADDR_PORT_LEN];
  428. response[0] = 5;
  429. switch (endPoint.AddressFamily)
  430. {
  431. case AddressFamily.InterNetwork:
  432. response[3] = ATYP_IPv4;
  433. break;
  434. case AddressFamily.InterNetworkV6:
  435. response[3] = ATYP_IPv6;
  436. break;
  437. }
  438. address.CopyTo(response, 4);
  439. response[response.Length - 1] = (byte)(port & 0xFF);
  440. response[response.Length - 2] = (byte)((port >> 8) & 0xFF);
  441. _connection.BeginSend(response, 0, response.Length, SocketFlags.None, ReadAll, true);
  442. }
  443. private void ReadAll(IAsyncResult ar)
  444. {
  445. if (_closed) return;
  446. try
  447. {
  448. if (ar.AsyncState != null)
  449. {
  450. _connection.EndSend(ar);
  451. _connection.BeginReceive(_connetionRecvBuffer, 0, RecvSize, SocketFlags.None,
  452. ReadAll, null);
  453. }
  454. else
  455. {
  456. int bytesRead = _connection.EndReceive(ar);
  457. if (bytesRead > 0)
  458. {
  459. _connection.BeginReceive(_connetionRecvBuffer, 0, RecvSize, SocketFlags.None,
  460. ReadAll, null);
  461. }
  462. else
  463. Close();
  464. }
  465. }
  466. catch (Exception e)
  467. {
  468. Logger.LogUsefulException(e);
  469. Close();
  470. }
  471. }
  472. // inner class
  473. private class ProxyTimer : Timer
  474. {
  475. public AsyncSession Session;
  476. public EndPoint DestEndPoint;
  477. public Server Server;
  478. public ProxyTimer(int p) : base(p)
  479. {
  480. }
  481. }
  482. private class ServerTimer : Timer
  483. {
  484. public AsyncSession Session;
  485. public Server Server;
  486. public ServerTimer(int p) : base(p)
  487. {
  488. }
  489. }
  490. private void StartConnect()
  491. {
  492. try
  493. {
  494. CreateRemote();
  495. // Setting up proxy
  496. IProxy remote;
  497. EndPoint proxyEP = null;
  498. EndPoint serverEP = SocketUtil.GetEndPoint(_server.server, _server.server_port);
  499. EndPoint pluginEP = _controller.GetPluginLocalEndPointIfConfigured(_server);
  500. if (pluginEP != null)
  501. {
  502. serverEP = pluginEP;
  503. remote = new DirectConnect();
  504. }
  505. else if (_config.proxy.useProxy)
  506. {
  507. switch (_config.proxy.proxyType)
  508. {
  509. case ProxyConfig.PROXY_SOCKS5:
  510. remote = new Socks5Proxy();
  511. break;
  512. case ProxyConfig.PROXY_HTTP:
  513. remote = new HttpProxy();
  514. break;
  515. default:
  516. throw new NotSupportedException("Unknown forward proxy.");
  517. }
  518. proxyEP = SocketUtil.GetEndPoint(_config.proxy.proxyServer, _config.proxy.proxyPort);
  519. }
  520. else
  521. {
  522. remote = new DirectConnect();
  523. }
  524. var session = new AsyncSession(remote);
  525. lock (_closeConnLock)
  526. {
  527. if (_closed)
  528. {
  529. remote.Close();
  530. return;
  531. }
  532. _currentRemoteSession = session;
  533. }
  534. ProxyTimer proxyTimer = new ProxyTimer(_proxyTimeout) { AutoReset = false };
  535. proxyTimer.Elapsed += ProxyConnectTimer_Elapsed;
  536. proxyTimer.Enabled = true;
  537. proxyTimer.Session = session;
  538. proxyTimer.DestEndPoint = serverEP;
  539. proxyTimer.Server = _server;
  540. _proxyConnected = false;
  541. // Connect to the proxy server.
  542. remote.BeginConnectProxy(proxyEP, ProxyConnectCallback,
  543. new AsyncSession<ProxyTimer>(remote, proxyTimer));
  544. }
  545. catch (Exception e)
  546. {
  547. Logger.LogUsefulException(e);
  548. Close();
  549. }
  550. }
  551. private void ProxyConnectTimer_Elapsed(object sender, ElapsedEventArgs e)
  552. {
  553. var timer = (ProxyTimer)sender;
  554. timer.Elapsed -= ProxyConnectTimer_Elapsed;
  555. timer.Enabled = false;
  556. timer.Dispose();
  557. if (_proxyConnected || _destConnected || _closed)
  558. {
  559. return;
  560. }
  561. var proxy = timer.Session.Remote;
  562. Logger.Info($"Proxy {proxy.ProxyEndPoint} timed out");
  563. proxy.Close();
  564. Close();
  565. }
  566. private void ProxyConnectCallback(IAsyncResult ar)
  567. {
  568. if (_closed)
  569. {
  570. return;
  571. }
  572. try
  573. {
  574. var session = (AsyncSession<ProxyTimer>)ar.AsyncState;
  575. ProxyTimer timer = session.State;
  576. var destEndPoint = timer.DestEndPoint;
  577. var server = timer.Server;
  578. timer.Elapsed -= ProxyConnectTimer_Elapsed;
  579. timer.Enabled = false;
  580. timer.Dispose();
  581. var remote = session.Remote;
  582. // Complete the connection.
  583. remote.EndConnectProxy(ar);
  584. _proxyConnected = true;
  585. if (!(remote is DirectConnect))
  586. {
  587. Logger.Debug($"Socket connected to proxy {remote.ProxyEndPoint}");
  588. }
  589. _startConnectTime = DateTime.Now;
  590. ServerTimer connectTimer = new ServerTimer(_serverTimeout) { AutoReset = false };
  591. connectTimer.Elapsed += DestConnectTimer_Elapsed;
  592. connectTimer.Enabled = true;
  593. connectTimer.Session = session;
  594. connectTimer.Server = server;
  595. _destConnected = false;
  596. NetworkCredential auth = null;
  597. if (_config.proxy.useAuth)
  598. {
  599. auth = new NetworkCredential(_config.proxy.authUser, _config.proxy.authPwd);
  600. }
  601. // Connect to the remote endpoint.
  602. remote.BeginConnectDest(destEndPoint, ConnectCallback,
  603. new AsyncSession<ServerTimer>(session, connectTimer), auth);
  604. }
  605. catch (ArgumentException)
  606. {
  607. }
  608. catch (Exception e)
  609. {
  610. Logger.LogUsefulException(e);
  611. Close();
  612. }
  613. }
  614. private void DestConnectTimer_Elapsed(object sender, ElapsedEventArgs e)
  615. {
  616. var timer = (ServerTimer)sender;
  617. timer.Elapsed -= DestConnectTimer_Elapsed;
  618. timer.Enabled = false;
  619. timer.Dispose();
  620. if (_destConnected || _closed)
  621. {
  622. return;
  623. }
  624. var session = timer.Session;
  625. Server server = timer.Server;
  626. IStrategy strategy = _controller.GetCurrentStrategy();
  627. strategy?.SetFailure(server);
  628. Logger.Info($"{server.FriendlyName()} timed out");
  629. session.Remote.Close();
  630. Close();
  631. }
  632. private void ConnectCallback(IAsyncResult ar)
  633. {
  634. if (_closed) return;
  635. try
  636. {
  637. var session = (AsyncSession<ServerTimer>)ar.AsyncState;
  638. ServerTimer timer = session.State;
  639. _server = timer.Server;
  640. timer.Elapsed -= DestConnectTimer_Elapsed;
  641. timer.Enabled = false;
  642. timer.Dispose();
  643. var remote = session.Remote;
  644. // Complete the connection.
  645. remote.EndConnectDest(ar);
  646. _destConnected = true;
  647. Logger.Debug($"Socket connected to ss server: {_server.FriendlyName()}");
  648. var latency = DateTime.Now - _startConnectTime;
  649. IStrategy strategy = _controller.GetCurrentStrategy();
  650. strategy?.UpdateLatency(_server, latency);
  651. _tcprelay.UpdateLatency(_server, latency);
  652. StartPipe(session);
  653. }
  654. catch (ArgumentException)
  655. {
  656. }
  657. catch (Exception e)
  658. {
  659. if (_server != null)
  660. {
  661. IStrategy strategy = _controller.GetCurrentStrategy();
  662. strategy?.SetFailure(_server);
  663. }
  664. Logger.LogUsefulException(e);
  665. Close();
  666. }
  667. }
  668. private void TryReadAvailableData()
  669. {
  670. int available = Math.Min(_connection.Available, RecvSize - _firstPacketLength);
  671. if (available > 0)
  672. {
  673. var size = _connection.Receive(_connetionRecvBuffer, _firstPacketLength, available,
  674. SocketFlags.None);
  675. _firstPacketLength += size;
  676. }
  677. }
  678. private void StartPipe(AsyncSession session)
  679. {
  680. if (_closed) return;
  681. try
  682. {
  683. _startReceivingTime = DateTime.Now;
  684. session.Remote.BeginReceive(_remoteRecvBuffer, 0, RecvSize, SocketFlags.None,
  685. PipeRemoteReceiveCallback, session);
  686. TryReadAvailableData();
  687. Logger.Debug($"_firstPacketLength = {_firstPacketLength}");
  688. SendToServer(_firstPacketLength, session);
  689. }
  690. catch (Exception e)
  691. {
  692. Logger.LogUsefulException(e);
  693. Close();
  694. }
  695. }
  696. private void PipeRemoteReceiveCallback(IAsyncResult ar)
  697. {
  698. if (_closed) return;
  699. try
  700. {
  701. var session = (AsyncSession)ar.AsyncState;
  702. int bytesRead = session.Remote.EndReceive(ar);
  703. _totalRead += bytesRead;
  704. _tcprelay.UpdateInboundCounter(_server, bytesRead);
  705. if (bytesRead > 0)
  706. {
  707. lastActivity = DateTime.Now;
  708. int bytesToSend = -1;
  709. lock (_decryptionLock)
  710. {
  711. try
  712. {
  713. bytesToSend = decryptor.Decrypt(_remoteSendBuffer, _remoteRecvBuffer.AsSpan(0, bytesRead));
  714. // decryptor.Decrypt(_remoteRecvBuffer, bytesRead, _remoteSendBuffer, out bytesToSend);
  715. }
  716. catch (CryptoErrorException)
  717. {
  718. Logger.Error("decryption error");
  719. Close();
  720. return;
  721. }
  722. }
  723. if (bytesToSend == 0)
  724. {
  725. // need more to decrypt
  726. Logger.Debug("Need more to decrypt");
  727. session.Remote.BeginReceive(_remoteRecvBuffer, 0, RecvSize, SocketFlags.None,
  728. PipeRemoteReceiveCallback, session);
  729. return;
  730. }
  731. Logger.Debug($"start sending {bytesToSend}");
  732. _connection.BeginSend(_remoteSendBuffer, 0, bytesToSend, SocketFlags.None,
  733. PipeConnectionSendCallback, new object[] { session, bytesToSend });
  734. IStrategy strategy = _controller.GetCurrentStrategy();
  735. strategy?.UpdateLastRead(_server);
  736. }
  737. else
  738. {
  739. _connection.Shutdown(SocketShutdown.Send);
  740. _connectionShutdown = true;
  741. CheckClose();
  742. }
  743. }
  744. catch (Exception e)
  745. {
  746. Logger.LogUsefulException(e);
  747. Close();
  748. }
  749. }
  750. private void PipeConnectionReceiveCallback(IAsyncResult ar)
  751. {
  752. if (_closed) return;
  753. try
  754. {
  755. int bytesRead = _connection.EndReceive(ar);
  756. var session = (AsyncSession)ar.AsyncState;
  757. var remote = session.Remote;
  758. if (bytesRead > 0)
  759. {
  760. SendToServer(bytesRead, session);
  761. }
  762. else
  763. {
  764. remote.Shutdown(SocketShutdown.Send);
  765. _remoteShutdown = true;
  766. CheckClose();
  767. }
  768. }
  769. catch (Exception e)
  770. {
  771. Logger.LogUsefulException(e);
  772. Close();
  773. }
  774. }
  775. private void SendToServer(int length, AsyncSession session)
  776. {
  777. _totalWrite += length;
  778. int bytesToSend;
  779. lock (_encryptionLock)
  780. {
  781. try
  782. {
  783. bytesToSend = encryptor.Encrypt(_connetionRecvBuffer.AsSpan(0, length), _connetionSendBuffer);
  784. // encryptor.Encrypt(_connetionRecvBuffer, length, _connetionSendBuffer, out bytesToSend);
  785. }
  786. catch (CryptoErrorException)
  787. {
  788. Logger.Debug("encryption error");
  789. Close();
  790. return;
  791. }
  792. }
  793. _tcprelay.UpdateOutboundCounter(_server, bytesToSend);
  794. _startSendingTime = DateTime.Now;
  795. session.Remote.BeginSend(_connetionSendBuffer, 0, bytesToSend, SocketFlags.None,
  796. PipeRemoteSendCallback, new object[] { session, bytesToSend });
  797. IStrategy strategy = _controller.GetCurrentStrategy();
  798. strategy?.UpdateLastWrite(_server);
  799. }
  800. private void PipeRemoteSendCallback(IAsyncResult ar)
  801. {
  802. if (_closed) return;
  803. try
  804. {
  805. var container = (object[])ar.AsyncState;
  806. var session = (AsyncSession)container[0];
  807. var bytesShouldSend = (int)container[1];
  808. int bytesSent = session.Remote.EndSend(ar);
  809. int bytesRemaining = bytesShouldSend - bytesSent;
  810. if (bytesRemaining > 0)
  811. {
  812. Logger.Info("reconstruct _connetionSendBuffer to re-send");
  813. Buffer.BlockCopy(_connetionSendBuffer, bytesSent, _connetionSendBuffer, 0, bytesRemaining);
  814. session.Remote.BeginSend(_connetionSendBuffer, 0, bytesRemaining, SocketFlags.None,
  815. PipeRemoteSendCallback, new object[] { session, bytesRemaining });
  816. return;
  817. }
  818. _connection.BeginReceive(_connetionRecvBuffer, 0, RecvSize, SocketFlags.None,
  819. PipeConnectionReceiveCallback, session);
  820. }
  821. catch (Exception e)
  822. {
  823. Logger.LogUsefulException(e);
  824. Close();
  825. }
  826. }
  827. // In general, we assume there is no delay between local proxy and client, add this for sanity
  828. private void PipeConnectionSendCallback(IAsyncResult ar)
  829. {
  830. try
  831. {
  832. var container = (object[])ar.AsyncState;
  833. var session = (AsyncSession)container[0];
  834. var bytesShouldSend = (int)container[1];
  835. var bytesSent = _connection.EndSend(ar);
  836. var bytesRemaining = bytesShouldSend - bytesSent;
  837. if (bytesRemaining > 0)
  838. {
  839. Logger.Info("reconstruct _remoteSendBuffer to re-send");
  840. Buffer.BlockCopy(_remoteSendBuffer, bytesSent, _remoteSendBuffer, 0, bytesRemaining);
  841. _connection.BeginSend(_remoteSendBuffer, 0, bytesRemaining, SocketFlags.None,
  842. PipeConnectionSendCallback, new object[] { session, bytesRemaining });
  843. return;
  844. }
  845. session.Remote.BeginReceive(_remoteRecvBuffer, 0, RecvSize, SocketFlags.None,
  846. PipeRemoteReceiveCallback, session);
  847. }
  848. catch (Exception e)
  849. {
  850. Logger.LogUsefulException(e);
  851. Close();
  852. }
  853. }
  854. }
  855. }