You can not select more than 25 topics Topics must start with a chinese character,a letter or number, can include dashes ('-') and can be up to 35 characters long.

TCPRelay.cs 35 kB

12 years ago
12 years ago
10 years ago
12 years ago
12 years ago
10 years ago
12 years ago
12 years ago
12 years ago
12 years ago
10 years ago
12 years ago
12 years ago
12 years ago
12 years ago
10 years ago
10 years ago
10 years ago
10 years ago
10 years ago
10 years ago
10 years ago
10 years ago
10 years ago
10 years ago
10 years ago
10 years ago
10 years ago
10 years ago
10 years ago
10 years ago
10 years ago
12 years ago
12 years ago
12 years ago
12 years ago
12 years ago
10 years ago
12 years ago
12 years ago
12 years ago
12 years ago
12 years ago
12 years ago
10 years ago
12 years ago
12 years ago
12 years ago
12 years ago
12 years ago
12 years ago
10 years ago
12 years ago
12 years ago
12 years ago
12 years ago
10 years ago
12 years ago
12 years ago
12 years ago
12 years ago
123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929930931932933934935936937938939940941942943944945946947948949950951952953954955956957958959960961962963964965966967968969970971972973974975976977978979
  1. using System;
  2. using System.Collections.Generic;
  3. using System.Linq;
  4. using System.Net;
  5. using System.Net.Sockets;
  6. using System.Timers;
  7. using Shadowsocks.Controller.Strategy;
  8. using Shadowsocks.Encryption;
  9. using Shadowsocks.Encryption.AEAD;
  10. using Shadowsocks.Encryption.Exception;
  11. using Shadowsocks.Model;
  12. using Shadowsocks.Proxy;
  13. using Shadowsocks.Util.Sockets;
  14. using static Shadowsocks.Encryption.EncryptorBase;
  15. namespace Shadowsocks.Controller
  16. {
  17. class TCPRelay : Listener.Service
  18. {
  19. private ShadowsocksController _controller;
  20. private DateTime _lastSweepTime;
  21. private Configuration _config;
  22. public ISet<TCPHandler> Handlers { get; set; }
  23. public TCPRelay(ShadowsocksController controller, Configuration conf)
  24. {
  25. _controller = controller;
  26. _config = conf;
  27. Handlers = new HashSet<TCPHandler>();
  28. _lastSweepTime = DateTime.Now;
  29. }
  30. public override bool Handle(byte[] firstPacket, int length, Socket socket, object state)
  31. {
  32. if (socket.ProtocolType != ProtocolType.Tcp
  33. || (length < 2 || firstPacket[0] != 5))
  34. return false;
  35. socket.SetSocketOption(SocketOptionLevel.Tcp, SocketOptionName.NoDelay, true);
  36. TCPHandler handler = new TCPHandler(_controller, _config, this, socket);
  37. IList<TCPHandler> handlersToClose = new List<TCPHandler>();
  38. lock (Handlers)
  39. {
  40. Handlers.Add(handler);
  41. DateTime now = DateTime.Now;
  42. if (now - _lastSweepTime > TimeSpan.FromSeconds(1))
  43. {
  44. _lastSweepTime = now;
  45. foreach (TCPHandler handler1 in Handlers)
  46. if (now - handler1.lastActivity > TimeSpan.FromSeconds(900))
  47. handlersToClose.Add(handler1);
  48. }
  49. }
  50. foreach (TCPHandler handler1 in handlersToClose)
  51. {
  52. Logging.Debug("Closing timed out TCP connection.");
  53. handler1.Close();
  54. }
  55. /*
  56. * Start after we put it into Handlers set. Otherwise if it failed in handler.Start()
  57. * then it will call handler.Close() before we add it into the set.
  58. * Then the handler will never release until the next Handle call. Sometimes it will
  59. * cause odd problems (especially during memory profiling).
  60. */
  61. handler.Start(firstPacket, length);
  62. return true;
  63. }
  64. public override void Stop()
  65. {
  66. List<TCPHandler> handlersToClose = new List<TCPHandler>();
  67. lock (Handlers)
  68. {
  69. handlersToClose.AddRange(Handlers);
  70. }
  71. handlersToClose.ForEach(h => h.Close());
  72. }
  73. public void UpdateInboundCounter(Server server, long n)
  74. {
  75. _controller.UpdateInboundCounter(server, n);
  76. }
  77. public void UpdateOutboundCounter(Server server, long n)
  78. {
  79. _controller.UpdateOutboundCounter(server, n);
  80. }
  81. public void UpdateLatency(Server server, TimeSpan latency)
  82. {
  83. _controller.UpdateLatency(server, latency);
  84. }
  85. }
  86. internal class TCPHandler
  87. {
  88. class AsyncSession
  89. {
  90. public IProxy Remote { get; }
  91. public AsyncSession(IProxy remote)
  92. {
  93. Remote = remote;
  94. }
  95. }
  96. class AsyncSession<T> : AsyncSession
  97. {
  98. public T State { get; set; }
  99. public AsyncSession(IProxy remote, T state) : base(remote)
  100. {
  101. State = state;
  102. }
  103. public AsyncSession(AsyncSession session, T state) : base(session.Remote)
  104. {
  105. State = state;
  106. }
  107. }
  108. private readonly int _serverTimeout;
  109. private readonly int _proxyTimeout;
  110. // each recv size.
  111. public const int RecvSize = 2048;
  112. // overhead of one chunk, reserved for AEAD ciphers
  113. public const int ChunkOverheadSize = 16 * 2 /* two tags */ + AEADEncryptor.CHUNK_LEN_BYTES;
  114. // max chunk size
  115. public const uint MaxChunkSize = AEADEncryptor.CHUNK_LEN_MASK + AEADEncryptor.CHUNK_LEN_BYTES + 16 * 2;
  116. // In general, the ciphertext length, we should take overhead into account
  117. public const int BufferSize = RecvSize + (int)MaxChunkSize + 32 /* max salt len */;
  118. public DateTime lastActivity;
  119. private ShadowsocksController _controller;
  120. private Configuration _config;
  121. private TCPRelay _tcprelay;
  122. private Socket _connection;
  123. private IEncryptor _encryptor;
  124. private Server _server;
  125. private AsyncSession _currentRemoteSession;
  126. private bool _proxyConnected;
  127. private bool _destConnected;
  128. private byte _command;
  129. private byte[] _firstPacket;
  130. private int _firstPacketLength;
  131. private const int CMD_CONNECT = 0x01;
  132. private const int CMD_BIND = 0x02;
  133. private const int CMD_UDP_ASSOC = 0x03;
  134. private int _addrBufLength = -1;
  135. private int _totalRead = 0;
  136. private int _totalWrite = 0;
  137. // remote -> local proxy (ciphertext, before decrypt)
  138. private byte[] _remoteRecvBuffer = new byte[BufferSize];
  139. // client -> local proxy (plaintext, before encrypt)
  140. private byte[] _connetionRecvBuffer = new byte[BufferSize];
  141. // local proxy -> remote (plaintext, after decrypt)
  142. private byte[] _remoteSendBuffer = new byte[BufferSize];
  143. // local proxy -> client (ciphertext, before decrypt)
  144. private byte[] _connetionSendBuffer = new byte[BufferSize];
  145. private bool _connectionShutdown = false;
  146. private bool _remoteShutdown = false;
  147. private bool _closed = false;
  148. // instance-based lock without static
  149. private readonly object _encryptionLock = new object();
  150. private readonly object _decryptionLock = new object();
  151. private readonly object _closeConnLock = new object();
  152. private DateTime _startConnectTime;
  153. private DateTime _startReceivingTime;
  154. private DateTime _startSendingTime;
  155. private EndPoint _destEndPoint = null;
  156. public TCPHandler(ShadowsocksController controller, Configuration config, TCPRelay tcprelay, Socket socket)
  157. {
  158. _controller = controller;
  159. _config = config;
  160. _tcprelay = tcprelay;
  161. _connection = socket;
  162. _proxyTimeout = config.proxy.proxyTimeout * 1000;
  163. _serverTimeout = config.GetCurrentServer().timeout * 1000;
  164. lastActivity = DateTime.Now;
  165. }
  166. public void CreateRemote()
  167. {
  168. Server server = _controller.GetAServer(IStrategyCallerType.TCP, (IPEndPoint)_connection.RemoteEndPoint,
  169. _destEndPoint);
  170. if (server == null || server.server == "")
  171. throw new ArgumentException("No server configured");
  172. _encryptor = EncryptorFactory.GetEncryptor(server.method, server.password);
  173. this._server = server;
  174. /* prepare address buffer length for AEAD */
  175. Logging.Debug($"_addrBufLength={_addrBufLength}");
  176. _encryptor.AddrBufLength = _addrBufLength;
  177. }
  178. public void Start(byte[] firstPacket, int length)
  179. {
  180. _firstPacket = firstPacket;
  181. _firstPacketLength = length;
  182. HandshakeReceive();
  183. }
  184. private void CheckClose()
  185. {
  186. if (_connectionShutdown && _remoteShutdown)
  187. Close();
  188. }
  189. public void Close()
  190. {
  191. lock (_closeConnLock)
  192. {
  193. if (_closed) return;
  194. _closed = true;
  195. }
  196. lock (_tcprelay.Handlers)
  197. {
  198. _tcprelay.Handlers.Remove(this);
  199. }
  200. try
  201. {
  202. _connection.Shutdown(SocketShutdown.Both);
  203. _connection.Close();
  204. }
  205. catch (Exception e)
  206. {
  207. Logging.LogUsefulException(e);
  208. }
  209. if (_currentRemoteSession != null)
  210. {
  211. try
  212. {
  213. var remote = _currentRemoteSession.Remote;
  214. remote.Shutdown(SocketShutdown.Both);
  215. remote.Close();
  216. }
  217. catch (Exception e)
  218. {
  219. Logging.LogUsefulException(e);
  220. }
  221. }
  222. lock (_encryptionLock)
  223. {
  224. lock (_decryptionLock)
  225. {
  226. _encryptor?.Dispose();
  227. }
  228. }
  229. }
  230. private void HandshakeReceive()
  231. {
  232. if (_closed) return;
  233. try
  234. {
  235. int bytesRead = _firstPacketLength;
  236. if (bytesRead > 1)
  237. {
  238. byte[] response = { 5, 0 };
  239. if (_firstPacket[0] != 5)
  240. {
  241. // reject socks 4
  242. response = new byte[] { 0, 91 };
  243. Logging.Error("socks 5 protocol error");
  244. }
  245. _connection.BeginSend(response, 0, response.Length, SocketFlags.None,
  246. HandshakeSendCallback, null);
  247. }
  248. else
  249. Close();
  250. }
  251. catch (Exception e)
  252. {
  253. Logging.LogUsefulException(e);
  254. Close();
  255. }
  256. }
  257. private void HandshakeSendCallback(IAsyncResult ar)
  258. {
  259. if (_closed) return;
  260. try
  261. {
  262. _connection.EndSend(ar);
  263. // +-----+-----+-------+------+----------+----------+
  264. // | VER | CMD | RSV | ATYP | DST.ADDR | DST.PORT |
  265. // +-----+-----+-------+------+----------+----------+
  266. // | 1 | 1 | X'00' | 1 | Variable | 2 |
  267. // +-----+-----+-------+------+----------+----------+
  268. // Skip first 3 bytes, and read 2 more bytes to analysis the address.
  269. // 2 more bytes is designed if address is domain then we don't need to read once more to get the addr length.
  270. // TODO validate
  271. _connection.BeginReceive(_connetionRecvBuffer, 0, 3 + ADDR_ATYP_LEN + 1, SocketFlags.None,
  272. HandshakeReceive2Callback, null);
  273. }
  274. catch (Exception e)
  275. {
  276. Logging.LogUsefulException(e);
  277. Close();
  278. }
  279. }
  280. private void HandshakeReceive2Callback(IAsyncResult ar)
  281. {
  282. if (_closed) return;
  283. try
  284. {
  285. int bytesRead = _connection.EndReceive(ar);
  286. if (bytesRead >= 5)
  287. {
  288. _command = _connetionRecvBuffer[1];
  289. switch(_command)
  290. {
  291. case CMD_CONNECT:
  292. // +----+-----+-------+------+----------+----------+
  293. // |VER | REP | RSV | ATYP | BND.ADDR | BND.PORT |
  294. // +----+-----+-------+------+----------+----------+
  295. // | 1 | 1 | X'00' | 1 | Variable | 2 |
  296. // +----+-----+-------+------+----------+----------+
  297. byte[] response = { 5, 0, 0, 1, 0, 0, 0, 0, 0, 0 };
  298. _connection.BeginSend(response, 0, response.Length, SocketFlags.None,
  299. ResponseCallback, null);
  300. break;
  301. case CMD_UDP_ASSOC:
  302. ReadAddress(HandleUDPAssociate);
  303. break;
  304. case CMD_BIND: // not implemented
  305. default:
  306. Logging.Debug("Unsupported CMD=" + _command);
  307. Close();
  308. break;
  309. }
  310. }
  311. else
  312. {
  313. Logging.Debug(
  314. "failed to recv data in Shadowsocks.Controller.TCPHandler.handshakeReceive2Callback()");
  315. Close();
  316. }
  317. }
  318. catch (Exception e)
  319. {
  320. Logging.LogUsefulException(e);
  321. Close();
  322. }
  323. }
  324. private void ResponseCallback(IAsyncResult ar)
  325. {
  326. try
  327. {
  328. _connection.EndSend(ar);
  329. ReadAddress(StartConnect);
  330. }
  331. catch (Exception e)
  332. {
  333. Logging.LogUsefulException(e);
  334. Close();
  335. }
  336. }
  337. private void ReadAddress(Action onSuccess)
  338. {
  339. int atyp = _connetionRecvBuffer[3];
  340. switch (atyp)
  341. {
  342. case ATYP_IPv4: // IPv4 address, 4 bytes
  343. ReadAddress(4 + ADDR_PORT_LEN - 1, onSuccess);
  344. break;
  345. case ATYP_DOMAIN: // domain name, length + str
  346. int len = _connetionRecvBuffer[4];
  347. ReadAddress(len + ADDR_PORT_LEN, onSuccess);
  348. break;
  349. case ATYP_IPv6: // IPv6 address, 16 bytes
  350. ReadAddress(16 + ADDR_PORT_LEN - 1, onSuccess);
  351. break;
  352. default:
  353. Logging.Debug("Unsupported ATYP=" + atyp);
  354. Close();
  355. break;
  356. }
  357. }
  358. private void ReadAddress(int bytesRemain, Action onSuccess)
  359. {
  360. // drop [ VER | CMD | RSV ]
  361. Array.Copy(_connetionRecvBuffer, 3, _connetionRecvBuffer, 0, ADDR_ATYP_LEN + 1);
  362. // Read the remain address bytes
  363. _connection.BeginReceive(_connetionRecvBuffer, 2, RecvSize - 2, SocketFlags.None, OnAddressFullyRead,
  364. new object[] { bytesRemain, onSuccess });
  365. }
  366. private void OnAddressFullyRead(IAsyncResult ar)
  367. {
  368. if (_closed) return;
  369. try
  370. {
  371. int bytesRead = _connection.EndReceive(ar);
  372. var states = (object[])ar.AsyncState;
  373. int bytesRemain = (int)states[0];
  374. var onSuccess = (Action)states[1];
  375. if (bytesRead >= bytesRemain)
  376. {
  377. _firstPacketLength = bytesRead + 2;
  378. int atyp = _connetionRecvBuffer[0];
  379. string dstAddr = "Unknown";
  380. int dstPort = -1;
  381. switch (atyp)
  382. {
  383. case ATYP_IPv4: // IPv4 address, 4 bytes
  384. dstAddr = new IPAddress(_connetionRecvBuffer.Skip(1).Take(4).ToArray()).ToString();
  385. dstPort = (_connetionRecvBuffer[5] << 8) + _connetionRecvBuffer[6];
  386. _addrBufLength = ADDR_ATYP_LEN + 4 + ADDR_PORT_LEN;
  387. break;
  388. case ATYP_DOMAIN: // domain name, length + str
  389. int len = _connetionRecvBuffer[1];
  390. dstAddr = System.Text.Encoding.UTF8.GetString(_connetionRecvBuffer, 2, len);
  391. dstPort = (_connetionRecvBuffer[len + 2] << 8) + _connetionRecvBuffer[len + 3];
  392. _addrBufLength = ADDR_ATYP_LEN + 1 + len + ADDR_PORT_LEN;
  393. break;
  394. case ATYP_IPv6: // IPv6 address, 16 bytes
  395. dstAddr = $"[{new IPAddress(_connetionRecvBuffer.Skip(1).Take(16).ToArray())}]";
  396. dstPort = (_connetionRecvBuffer[17] << 8) + _connetionRecvBuffer[18];
  397. _addrBufLength = ADDR_ATYP_LEN + 16 + ADDR_PORT_LEN;
  398. break;
  399. }
  400. if (_config.isVerboseLogging)
  401. {
  402. Logging.Info($"connect to {dstAddr}:{dstPort}");
  403. }
  404. _destEndPoint = SocketUtil.GetEndPoint(dstAddr, dstPort);
  405. onSuccess.Invoke(); /* StartConnect() */
  406. }
  407. else
  408. {
  409. Logging.Debug("failed to recv data in Shadowsocks.Controller.TCPHandler.OnAddressFullyRead()");
  410. Close();
  411. }
  412. }
  413. catch (Exception e)
  414. {
  415. Logging.LogUsefulException(e);
  416. Close();
  417. }
  418. }
  419. private void HandleUDPAssociate()
  420. {
  421. IPEndPoint endPoint = (IPEndPoint)_connection.LocalEndPoint;
  422. byte[] address = endPoint.Address.GetAddressBytes();
  423. int port = endPoint.Port;
  424. byte[] response = new byte[4 + address.Length + ADDR_PORT_LEN];
  425. response[0] = 5;
  426. switch (endPoint.AddressFamily)
  427. {
  428. case AddressFamily.InterNetwork:
  429. response[3] = ATYP_IPv4;
  430. break;
  431. case AddressFamily.InterNetworkV6:
  432. response[3] = ATYP_IPv6;
  433. break;
  434. }
  435. address.CopyTo(response, 4);
  436. response[response.Length - 1] = (byte)(port & 0xFF);
  437. response[response.Length - 2] = (byte)((port >> 8) & 0xFF);
  438. _connection.BeginSend(response, 0, response.Length, SocketFlags.None, ReadAll, true);
  439. }
  440. private void ReadAll(IAsyncResult ar)
  441. {
  442. if (_closed) return;
  443. try
  444. {
  445. if (ar.AsyncState != null)
  446. {
  447. _connection.EndSend(ar);
  448. _connection.BeginReceive(_connetionRecvBuffer, 0, RecvSize, SocketFlags.None,
  449. ReadAll, null);
  450. }
  451. else
  452. {
  453. int bytesRead = _connection.EndReceive(ar);
  454. if (bytesRead > 0)
  455. {
  456. _connection.BeginReceive(_connetionRecvBuffer, 0, RecvSize, SocketFlags.None,
  457. ReadAll, null);
  458. }
  459. else
  460. Close();
  461. }
  462. }
  463. catch (Exception e)
  464. {
  465. Logging.LogUsefulException(e);
  466. Close();
  467. }
  468. }
  469. // inner class
  470. private class ProxyTimer : Timer
  471. {
  472. public AsyncSession Session;
  473. public EndPoint DestEndPoint;
  474. public Server Server;
  475. public ProxyTimer(int p) : base(p)
  476. {
  477. }
  478. }
  479. private class ServerTimer : Timer
  480. {
  481. public AsyncSession Session;
  482. public Server Server;
  483. public ServerTimer(int p) : base(p)
  484. {
  485. }
  486. }
  487. private void StartConnect()
  488. {
  489. try
  490. {
  491. CreateRemote();
  492. // Setting up proxy
  493. IProxy remote;
  494. EndPoint proxyEP = null;
  495. EndPoint serverEP = SocketUtil.GetEndPoint(_server.server, _server.server_port);
  496. EndPoint pluginEP = _controller.GetPluginLocalEndPointIfConfigured(_server);
  497. if (pluginEP != null)
  498. {
  499. serverEP = pluginEP;
  500. remote = new DirectConnect();
  501. }
  502. else if (_config.proxy.useProxy)
  503. {
  504. switch (_config.proxy.proxyType)
  505. {
  506. case ProxyConfig.PROXY_SOCKS5:
  507. remote = new Socks5Proxy();
  508. break;
  509. case ProxyConfig.PROXY_HTTP:
  510. remote = new HttpProxy();
  511. break;
  512. default:
  513. throw new NotSupportedException("Unknown forward proxy.");
  514. }
  515. proxyEP = SocketUtil.GetEndPoint(_config.proxy.proxyServer, _config.proxy.proxyPort);
  516. }
  517. else
  518. {
  519. remote = new DirectConnect();
  520. }
  521. var session = new AsyncSession(remote);
  522. lock (_closeConnLock)
  523. {
  524. if (_closed)
  525. {
  526. remote.Close();
  527. return;
  528. }
  529. _currentRemoteSession = session;
  530. }
  531. ProxyTimer proxyTimer = new ProxyTimer(_proxyTimeout) { AutoReset = false };
  532. proxyTimer.Elapsed += ProxyConnectTimer_Elapsed;
  533. proxyTimer.Enabled = true;
  534. proxyTimer.Session = session;
  535. proxyTimer.DestEndPoint = serverEP;
  536. proxyTimer.Server = _server;
  537. _proxyConnected = false;
  538. // Connect to the proxy server.
  539. remote.BeginConnectProxy(proxyEP, ProxyConnectCallback,
  540. new AsyncSession<ProxyTimer>(remote, proxyTimer));
  541. }
  542. catch (Exception e)
  543. {
  544. Logging.LogUsefulException(e);
  545. Close();
  546. }
  547. }
  548. private void ProxyConnectTimer_Elapsed(object sender, ElapsedEventArgs e)
  549. {
  550. var timer = (ProxyTimer)sender;
  551. timer.Elapsed -= ProxyConnectTimer_Elapsed;
  552. timer.Enabled = false;
  553. timer.Dispose();
  554. if (_proxyConnected || _destConnected || _closed)
  555. {
  556. return;
  557. }
  558. var proxy = timer.Session.Remote;
  559. Logging.Info($"Proxy {proxy.ProxyEndPoint} timed out");
  560. proxy.Close();
  561. Close();
  562. }
  563. private void ProxyConnectCallback(IAsyncResult ar)
  564. {
  565. if (_closed)
  566. {
  567. return;
  568. }
  569. try
  570. {
  571. var session = (AsyncSession<ProxyTimer>)ar.AsyncState;
  572. ProxyTimer timer = session.State;
  573. var destEndPoint = timer.DestEndPoint;
  574. var server = timer.Server;
  575. timer.Elapsed -= ProxyConnectTimer_Elapsed;
  576. timer.Enabled = false;
  577. timer.Dispose();
  578. var remote = session.Remote;
  579. // Complete the connection.
  580. remote.EndConnectProxy(ar);
  581. _proxyConnected = true;
  582. if (_config.isVerboseLogging)
  583. {
  584. if (!(remote is DirectConnect))
  585. {
  586. Logging.Info($"Socket connected to proxy {remote.ProxyEndPoint}");
  587. }
  588. }
  589. _startConnectTime = DateTime.Now;
  590. ServerTimer connectTimer = new ServerTimer(_serverTimeout) { AutoReset = false };
  591. connectTimer.Elapsed += DestConnectTimer_Elapsed;
  592. connectTimer.Enabled = true;
  593. connectTimer.Session = session;
  594. connectTimer.Server = server;
  595. _destConnected = false;
  596. NetworkCredential auth = null;
  597. if (_config.proxy.useAuth)
  598. {
  599. auth = new NetworkCredential(_config.proxy.authUser, _config.proxy.authPwd);
  600. }
  601. // Connect to the remote endpoint.
  602. remote.BeginConnectDest(destEndPoint, ConnectCallback,
  603. new AsyncSession<ServerTimer>(session, connectTimer), auth);
  604. }
  605. catch (ArgumentException)
  606. {
  607. }
  608. catch (Exception e)
  609. {
  610. Logging.LogUsefulException(e);
  611. Close();
  612. }
  613. }
  614. private void DestConnectTimer_Elapsed(object sender, ElapsedEventArgs e)
  615. {
  616. var timer = (ServerTimer)sender;
  617. timer.Elapsed -= DestConnectTimer_Elapsed;
  618. timer.Enabled = false;
  619. timer.Dispose();
  620. if (_destConnected || _closed)
  621. {
  622. return;
  623. }
  624. var session = timer.Session;
  625. Server server = timer.Server;
  626. IStrategy strategy = _controller.GetCurrentStrategy();
  627. strategy?.SetFailure(server);
  628. Logging.Info($"{server.FriendlyName()} timed out");
  629. session.Remote.Close();
  630. Close();
  631. }
  632. private void ConnectCallback(IAsyncResult ar)
  633. {
  634. if (_closed) return;
  635. try
  636. {
  637. var session = (AsyncSession<ServerTimer>)ar.AsyncState;
  638. ServerTimer timer = session.State;
  639. _server = timer.Server;
  640. timer.Elapsed -= DestConnectTimer_Elapsed;
  641. timer.Enabled = false;
  642. timer.Dispose();
  643. var remote = session.Remote;
  644. // Complete the connection.
  645. remote.EndConnectDest(ar);
  646. _destConnected = true;
  647. if (_config.isVerboseLogging)
  648. {
  649. Logging.Info($"Socket connected to ss server: {_server.FriendlyName()}");
  650. }
  651. var latency = DateTime.Now - _startConnectTime;
  652. IStrategy strategy = _controller.GetCurrentStrategy();
  653. strategy?.UpdateLatency(_server, latency);
  654. _tcprelay.UpdateLatency(_server, latency);
  655. StartPipe(session);
  656. }
  657. catch (ArgumentException)
  658. {
  659. }
  660. catch (Exception e)
  661. {
  662. if (_server != null)
  663. {
  664. IStrategy strategy = _controller.GetCurrentStrategy();
  665. strategy?.SetFailure(_server);
  666. }
  667. Logging.LogUsefulException(e);
  668. Close();
  669. }
  670. }
  671. private void TryReadAvailableData()
  672. {
  673. int available = Math.Min(_connection.Available, RecvSize - _firstPacketLength);
  674. if (available > 0)
  675. {
  676. var size = _connection.Receive(_connetionRecvBuffer, _firstPacketLength, available,
  677. SocketFlags.None);
  678. _firstPacketLength += size;
  679. }
  680. }
  681. private void StartPipe(AsyncSession session)
  682. {
  683. if (_closed) return;
  684. try
  685. {
  686. _startReceivingTime = DateTime.Now;
  687. session.Remote.BeginReceive(_remoteRecvBuffer, 0, RecvSize, SocketFlags.None,
  688. PipeRemoteReceiveCallback, session);
  689. TryReadAvailableData();
  690. Logging.Debug($"_firstPacketLength = {_firstPacketLength}");
  691. SendToServer(_firstPacketLength, session);
  692. }
  693. catch (Exception e)
  694. {
  695. Logging.LogUsefulException(e);
  696. Close();
  697. }
  698. }
  699. private void PipeRemoteReceiveCallback(IAsyncResult ar)
  700. {
  701. if (_closed) return;
  702. try
  703. {
  704. var session = (AsyncSession)ar.AsyncState;
  705. int bytesRead = session.Remote.EndReceive(ar);
  706. _totalRead += bytesRead;
  707. _tcprelay.UpdateInboundCounter(_server, bytesRead);
  708. if (bytesRead > 0)
  709. {
  710. lastActivity = DateTime.Now;
  711. int bytesToSend = -1;
  712. lock (_decryptionLock)
  713. {
  714. try
  715. {
  716. _encryptor.Decrypt(_remoteRecvBuffer, bytesRead, _remoteSendBuffer, out bytesToSend);
  717. }
  718. catch (CryptoErrorException)
  719. {
  720. Logging.Error("decryption error");
  721. Close();
  722. return;
  723. }
  724. }
  725. if (bytesToSend == 0)
  726. {
  727. // need more to decrypt
  728. Logging.Debug("Need more to decrypt");
  729. session.Remote.BeginReceive(_remoteRecvBuffer, 0, RecvSize, SocketFlags.None,
  730. PipeRemoteReceiveCallback, session);
  731. return;
  732. }
  733. Logging.Debug($"start sending {bytesToSend}");
  734. _connection.BeginSend(_remoteSendBuffer, 0, bytesToSend, SocketFlags.None,
  735. PipeConnectionSendCallback, new object[] { session, bytesToSend });
  736. IStrategy strategy = _controller.GetCurrentStrategy();
  737. strategy?.UpdateLastRead(_server);
  738. }
  739. else
  740. {
  741. _connection.Shutdown(SocketShutdown.Send);
  742. _connectionShutdown = true;
  743. CheckClose();
  744. }
  745. }
  746. catch (Exception e)
  747. {
  748. Logging.LogUsefulException(e);
  749. Close();
  750. }
  751. }
  752. private void PipeConnectionReceiveCallback(IAsyncResult ar)
  753. {
  754. if (_closed) return;
  755. try
  756. {
  757. int bytesRead = _connection.EndReceive(ar);
  758. var session = (AsyncSession)ar.AsyncState;
  759. var remote = session.Remote;
  760. if (bytesRead > 0)
  761. {
  762. SendToServer(bytesRead, session);
  763. }
  764. else
  765. {
  766. remote.Shutdown(SocketShutdown.Send);
  767. _remoteShutdown = true;
  768. CheckClose();
  769. }
  770. }
  771. catch (Exception e)
  772. {
  773. Logging.LogUsefulException(e);
  774. Close();
  775. }
  776. }
  777. private void SendToServer(int length, AsyncSession session)
  778. {
  779. _totalWrite += length;
  780. int bytesToSend;
  781. lock (_encryptionLock)
  782. {
  783. try
  784. {
  785. _encryptor.Encrypt(_connetionRecvBuffer, length, _connetionSendBuffer, out bytesToSend);
  786. }
  787. catch (CryptoErrorException)
  788. {
  789. Logging.Debug("encryption error");
  790. Close();
  791. return;
  792. }
  793. }
  794. _tcprelay.UpdateOutboundCounter(_server, bytesToSend);
  795. _startSendingTime = DateTime.Now;
  796. session.Remote.BeginSend(_connetionSendBuffer, 0, bytesToSend, SocketFlags.None,
  797. PipeRemoteSendCallback, new object[] { session, bytesToSend });
  798. IStrategy strategy = _controller.GetCurrentStrategy();
  799. strategy?.UpdateLastWrite(_server);
  800. }
  801. private void PipeRemoteSendCallback(IAsyncResult ar)
  802. {
  803. if (_closed) return;
  804. try
  805. {
  806. var container = (object[])ar.AsyncState;
  807. var session = (AsyncSession)container[0];
  808. var bytesShouldSend = (int)container[1];
  809. int bytesSent = session.Remote.EndSend(ar);
  810. int bytesRemaining = bytesShouldSend - bytesSent;
  811. if (bytesRemaining > 0)
  812. {
  813. Logging.Info("reconstruct _connetionSendBuffer to re-send");
  814. Buffer.BlockCopy(_connetionSendBuffer, bytesSent, _connetionSendBuffer, 0, bytesRemaining);
  815. session.Remote.BeginSend(_connetionSendBuffer, 0, bytesRemaining, SocketFlags.None,
  816. PipeRemoteSendCallback, new object[] { session, bytesRemaining });
  817. return;
  818. }
  819. _connection.BeginReceive(_connetionRecvBuffer, 0, RecvSize, SocketFlags.None,
  820. PipeConnectionReceiveCallback, session);
  821. }
  822. catch (Exception e)
  823. {
  824. Logging.LogUsefulException(e);
  825. Close();
  826. }
  827. }
  828. // In general, we assume there is no delay between local proxy and client, add this for sanity
  829. private void PipeConnectionSendCallback(IAsyncResult ar)
  830. {
  831. try
  832. {
  833. var container = (object[])ar.AsyncState;
  834. var session = (AsyncSession)container[0];
  835. var bytesShouldSend = (int)container[1];
  836. var bytesSent = _connection.EndSend(ar);
  837. var bytesRemaining = bytesShouldSend - bytesSent;
  838. if (bytesRemaining > 0)
  839. {
  840. Logging.Info("reconstruct _remoteSendBuffer to re-send");
  841. Buffer.BlockCopy(_remoteSendBuffer, bytesSent, _remoteSendBuffer, 0, bytesRemaining);
  842. _connection.BeginSend(_remoteSendBuffer, 0, bytesRemaining, SocketFlags.None,
  843. PipeConnectionSendCallback, new object[] { session, bytesRemaining });
  844. return;
  845. }
  846. session.Remote.BeginReceive(_remoteRecvBuffer, 0, RecvSize, SocketFlags.None,
  847. PipeRemoteReceiveCallback, session);
  848. }
  849. catch (Exception e)
  850. {
  851. Logging.LogUsefulException(e);
  852. Close();
  853. }
  854. }
  855. }
  856. }