mirror of
https://github.com/masterking32/MasterHttpRelayVPN.git
synced 2026-05-19 08:04:38 +03:00
First commit, (Socks5 server!)
This commit is contained in:
@@ -0,0 +1,105 @@
|
||||
// ==============================================================================
|
||||
// MasterHttpRelayVPN
|
||||
// Author: MasterkinG32
|
||||
// Github: https://github.com/masterking32
|
||||
// Year: 2026
|
||||
// ==============================================================================
|
||||
package client
|
||||
|
||||
import (
|
||||
"context"
|
||||
"fmt"
|
||||
"net"
|
||||
"sync"
|
||||
"time"
|
||||
|
||||
"masterhttprelayvpn/internal/config"
|
||||
"masterhttprelayvpn/internal/logger"
|
||||
)
|
||||
|
||||
type Client struct {
|
||||
cfg config.Config
|
||||
log *logger.Logger
|
||||
sessions *SessionStore
|
||||
|
||||
connMu sync.Mutex
|
||||
conns map[net.Conn]struct{}
|
||||
}
|
||||
|
||||
func New(cfg config.Config, lg *logger.Logger) *Client {
|
||||
return &Client{
|
||||
cfg: cfg,
|
||||
log: lg,
|
||||
sessions: NewSessionStore(),
|
||||
conns: make(map[net.Conn]struct{}),
|
||||
}
|
||||
}
|
||||
|
||||
func (c *Client) Run(ctx context.Context) error {
|
||||
addr := fmt.Sprintf("%s:%d", c.cfg.SOCKSHost, c.cfg.SOCKSPort)
|
||||
ln, err := net.Listen("tcp", addr)
|
||||
if err != nil {
|
||||
return err
|
||||
}
|
||||
defer ln.Close()
|
||||
|
||||
c.log.Infof("<green>SOCKS5 listener started on <cyan>%s</cyan></green>", addr)
|
||||
|
||||
go func() {
|
||||
<-ctx.Done()
|
||||
c.log.Infof("<yellow>shutdown requested, closing listener and active sessions</yellow>")
|
||||
_ = ln.Close()
|
||||
c.closeAllConns()
|
||||
}()
|
||||
|
||||
var wg sync.WaitGroup
|
||||
defer wg.Wait()
|
||||
|
||||
for {
|
||||
conn, err := ln.Accept()
|
||||
if err != nil {
|
||||
select {
|
||||
case <-ctx.Done():
|
||||
return nil
|
||||
default:
|
||||
}
|
||||
|
||||
if ne, ok := err.(net.Error); ok && ne.Temporary() {
|
||||
time.Sleep(100 * time.Millisecond)
|
||||
continue
|
||||
}
|
||||
return err
|
||||
}
|
||||
|
||||
wg.Add(1)
|
||||
go func() {
|
||||
defer wg.Done()
|
||||
c.handleConn(ctx, conn)
|
||||
}()
|
||||
}
|
||||
}
|
||||
|
||||
func (c *Client) registerConn(conn net.Conn) {
|
||||
c.connMu.Lock()
|
||||
c.conns[conn] = struct{}{}
|
||||
c.connMu.Unlock()
|
||||
}
|
||||
|
||||
func (c *Client) unregisterConn(conn net.Conn) {
|
||||
c.connMu.Lock()
|
||||
delete(c.conns, conn)
|
||||
c.connMu.Unlock()
|
||||
}
|
||||
|
||||
func (c *Client) closeAllConns() {
|
||||
c.connMu.Lock()
|
||||
conns := make([]net.Conn, 0, len(c.conns))
|
||||
for conn := range c.conns {
|
||||
conns = append(conns, conn)
|
||||
}
|
||||
c.connMu.Unlock()
|
||||
|
||||
for _, conn := range conns {
|
||||
_ = conn.Close()
|
||||
}
|
||||
}
|
||||
@@ -0,0 +1,71 @@
|
||||
// ==============================================================================
|
||||
// MasterHttpRelayVPN
|
||||
// Author: MasterkinG32
|
||||
// Github: https://github.com/masterking32
|
||||
// Year: 2026
|
||||
// ==============================================================================
|
||||
package client
|
||||
|
||||
import (
|
||||
"encoding/hex"
|
||||
"sync"
|
||||
"sync/atomic"
|
||||
"time"
|
||||
)
|
||||
|
||||
type Session struct {
|
||||
ID uint64
|
||||
CreatedAt time.Time
|
||||
LastActivityAt time.Time
|
||||
ClientAddr string
|
||||
TargetHost string
|
||||
TargetPort uint16
|
||||
AddressType byte
|
||||
InitialPayload []byte
|
||||
BytesCaptured int
|
||||
AuthMethod byte
|
||||
UsernameUsed string
|
||||
HandshakeDone bool
|
||||
ConnectAccepted bool
|
||||
}
|
||||
|
||||
func (s *Session) InitialPayloadHex() string {
|
||||
if len(s.InitialPayload) == 0 {
|
||||
return ""
|
||||
}
|
||||
return hex.EncodeToString(s.InitialPayload)
|
||||
}
|
||||
|
||||
type SessionStore struct {
|
||||
nextID atomic.Uint64
|
||||
mu sync.RWMutex
|
||||
items map[uint64]*Session
|
||||
}
|
||||
|
||||
func NewSessionStore() *SessionStore {
|
||||
return &SessionStore{
|
||||
items: make(map[uint64]*Session),
|
||||
}
|
||||
}
|
||||
|
||||
func (s *SessionStore) New(clientAddr string) *Session {
|
||||
id := s.nextID.Add(1)
|
||||
now := time.Now()
|
||||
session := &Session{
|
||||
ID: id,
|
||||
CreatedAt: now,
|
||||
LastActivityAt: now,
|
||||
ClientAddr: clientAddr,
|
||||
}
|
||||
|
||||
s.mu.Lock()
|
||||
s.items[id] = session
|
||||
s.mu.Unlock()
|
||||
return session
|
||||
}
|
||||
|
||||
func (s *SessionStore) Delete(id uint64) {
|
||||
s.mu.Lock()
|
||||
delete(s.items, id)
|
||||
s.mu.Unlock()
|
||||
}
|
||||
@@ -0,0 +1,302 @@
|
||||
// ==============================================================================
|
||||
// MasterHttpRelayVPN
|
||||
// Author: MasterkinG32
|
||||
// Github: https://github.com/masterking32
|
||||
// Year: 2026
|
||||
// ==============================================================================
|
||||
package client
|
||||
|
||||
import (
|
||||
"context"
|
||||
"encoding/binary"
|
||||
"errors"
|
||||
"fmt"
|
||||
"io"
|
||||
"net"
|
||||
"slices"
|
||||
"strconv"
|
||||
"time"
|
||||
)
|
||||
|
||||
const (
|
||||
socksVersion5 = 0x05
|
||||
|
||||
socksMethodNoAuth = 0x00
|
||||
socksMethodUserPass = 0x02
|
||||
socksMethodNoAcceptable = 0xFF
|
||||
|
||||
socksCmdConnect = 0x01
|
||||
|
||||
socksAtypIPv4 = 0x01
|
||||
socksAtypDomain = 0x03
|
||||
socksAtypIPv6 = 0x04
|
||||
|
||||
socksReplySuccess = 0x00
|
||||
socksReplyGeneralFailure = 0x01
|
||||
socksReplyCommandUnsupported = 0x07
|
||||
socksReplyAddressUnsupported = 0x08
|
||||
|
||||
socksUserPassVersion = 0x01
|
||||
socksAuthSuccess = 0x00
|
||||
socksAuthFailure = 0x01
|
||||
)
|
||||
|
||||
func (c *Client) handleConn(ctx context.Context, conn net.Conn) {
|
||||
c.registerConn(conn)
|
||||
defer c.unregisterConn(conn)
|
||||
defer conn.Close()
|
||||
|
||||
session := c.sessions.New(conn.RemoteAddr().String())
|
||||
defer c.sessions.Delete(session.ID)
|
||||
|
||||
c.log.Infof("<green>accepted client <cyan>%s</cyan> session=<cyan>%d</cyan></green>", conn.RemoteAddr(), session.ID)
|
||||
|
||||
if err := c.handleSOCKS5(ctx, conn, session); err != nil {
|
||||
c.log.Errorf("<red>session=<cyan>%d</cyan> closed: <cyan>%v</cyan></red>", session.ID, err)
|
||||
return
|
||||
}
|
||||
}
|
||||
|
||||
func (c *Client) handleSOCKS5(ctx context.Context, conn net.Conn, session *Session) error {
|
||||
version := make([]byte, 1)
|
||||
if _, err := io.ReadFull(conn, version); err != nil {
|
||||
return err
|
||||
}
|
||||
if version[0] != socksVersion5 {
|
||||
return fmt.Errorf("<red>unsupported SOCKS version: <cyan>%d</cyan></red>", version[0])
|
||||
}
|
||||
|
||||
method, err := c.negotiateAuth(conn, session)
|
||||
if err != nil {
|
||||
return err
|
||||
}
|
||||
|
||||
if method == socksMethodUserPass {
|
||||
if err := c.handleUserPassAuth(conn, session); err != nil {
|
||||
return err
|
||||
}
|
||||
}
|
||||
|
||||
targetHost, targetPort, atyp, err := readConnectRequest(conn)
|
||||
if err != nil {
|
||||
return err
|
||||
}
|
||||
|
||||
session.TargetHost = targetHost
|
||||
session.TargetPort = targetPort
|
||||
session.AddressType = atyp
|
||||
session.ConnectAccepted = true
|
||||
session.HandshakeDone = true
|
||||
session.LastActivityAt = time.Now()
|
||||
|
||||
if err := writeSocksReply(conn, socksReplySuccess); err != nil {
|
||||
return err
|
||||
}
|
||||
|
||||
c.log.Infof(
|
||||
"<green>session=<cyan>%d</cyan> CONNECT target=<cyan>%s:%d</cyan> auth_method=<cyan>%d</cyan></green>",
|
||||
session.ID, session.TargetHost, session.TargetPort, session.AuthMethod,
|
||||
)
|
||||
|
||||
return c.captureInitialPayload(ctx, conn, session)
|
||||
}
|
||||
|
||||
func (c *Client) negotiateAuth(conn net.Conn, session *Session) (byte, error) {
|
||||
countBuf := make([]byte, 1)
|
||||
if _, err := io.ReadFull(conn, countBuf); err != nil {
|
||||
return 0, err
|
||||
}
|
||||
|
||||
methodCount := int(countBuf[0])
|
||||
methods := make([]byte, methodCount)
|
||||
if _, err := io.ReadFull(conn, methods); err != nil {
|
||||
return 0, err
|
||||
}
|
||||
|
||||
selected := byte(socksMethodNoAcceptable)
|
||||
if c.cfg.SOCKSAuth {
|
||||
if slices.Contains(methods, socksMethodUserPass) {
|
||||
selected = socksMethodUserPass
|
||||
}
|
||||
} else {
|
||||
if slices.Contains(methods, socksMethodNoAuth) {
|
||||
selected = socksMethodNoAuth
|
||||
}
|
||||
}
|
||||
|
||||
if _, err := conn.Write([]byte{socksVersion5, selected}); err != nil {
|
||||
return 0, err
|
||||
}
|
||||
if selected == socksMethodNoAcceptable {
|
||||
return 0, errors.New("no acceptable auth method")
|
||||
}
|
||||
|
||||
session.AuthMethod = selected
|
||||
return selected, nil
|
||||
}
|
||||
|
||||
func (c *Client) handleUserPassAuth(conn net.Conn, session *Session) error {
|
||||
header := make([]byte, 2)
|
||||
if _, err := io.ReadFull(conn, header); err != nil {
|
||||
return err
|
||||
}
|
||||
if header[0] != socksUserPassVersion {
|
||||
return fmt.Errorf("<red>invalid username/password auth version: <cyan>%d</cyan></red>", header[0])
|
||||
}
|
||||
|
||||
username := make([]byte, int(header[1]))
|
||||
if _, err := io.ReadFull(conn, username); err != nil {
|
||||
return err
|
||||
}
|
||||
|
||||
passLen := make([]byte, 1)
|
||||
if _, err := io.ReadFull(conn, passLen); err != nil {
|
||||
return err
|
||||
}
|
||||
|
||||
password := make([]byte, int(passLen[0]))
|
||||
if _, err := io.ReadFull(conn, password); err != nil {
|
||||
return err
|
||||
}
|
||||
|
||||
ok := string(username) == c.cfg.SOCKSUsername && string(password) == c.cfg.SOCKSPassword
|
||||
session.UsernameUsed = string(username)
|
||||
if ok {
|
||||
_, err := conn.Write([]byte{socksUserPassVersion, socksAuthSuccess})
|
||||
return err
|
||||
}
|
||||
|
||||
_, _ = conn.Write([]byte{socksUserPassVersion, socksAuthFailure})
|
||||
return errors.New("invalid SOCKS username/password")
|
||||
}
|
||||
|
||||
func readConnectRequest(conn net.Conn) (string, uint16, byte, error) {
|
||||
header := make([]byte, 4)
|
||||
if _, err := io.ReadFull(conn, header); err != nil {
|
||||
return "", 0, 0, err
|
||||
}
|
||||
|
||||
if header[0] != socksVersion5 {
|
||||
return "", 0, 0, fmt.Errorf("<red>invalid request version: <cyan>%d</cyan></red>", header[0])
|
||||
}
|
||||
if header[1] != socksCmdConnect {
|
||||
_ = writeSocksReply(conn, socksReplyCommandUnsupported)
|
||||
return "", 0, 0, fmt.Errorf("<red>unsupported SOCKS command: <cyan>%d</cyan></red>", header[1])
|
||||
}
|
||||
if header[2] != 0x00 {
|
||||
return "", 0, 0, errors.New("non-zero reserved byte in SOCKS request")
|
||||
}
|
||||
|
||||
atyp := header[3]
|
||||
host, err := readTargetHost(conn, atyp)
|
||||
if err != nil {
|
||||
_ = writeSocksReply(conn, socksReplyAddressUnsupported)
|
||||
return "", 0, 0, err
|
||||
}
|
||||
|
||||
portBytes := make([]byte, 2)
|
||||
if _, err := io.ReadFull(conn, portBytes); err != nil {
|
||||
return "", 0, 0, err
|
||||
}
|
||||
|
||||
return host, binary.BigEndian.Uint16(portBytes), atyp, nil
|
||||
}
|
||||
|
||||
func readTargetHost(conn net.Conn, atyp byte) (string, error) {
|
||||
switch atyp {
|
||||
case socksAtypIPv4:
|
||||
ip := make([]byte, 4)
|
||||
if _, err := io.ReadFull(conn, ip); err != nil {
|
||||
return "", err
|
||||
}
|
||||
return net.IP(ip).String(), nil
|
||||
case socksAtypIPv6:
|
||||
ip := make([]byte, 16)
|
||||
if _, err := io.ReadFull(conn, ip); err != nil {
|
||||
return "", err
|
||||
}
|
||||
return net.IP(ip).String(), nil
|
||||
case socksAtypDomain:
|
||||
size := make([]byte, 1)
|
||||
if _, err := io.ReadFull(conn, size); err != nil {
|
||||
return "", err
|
||||
}
|
||||
domain := make([]byte, int(size[0]))
|
||||
if _, err := io.ReadFull(conn, domain); err != nil {
|
||||
return "", err
|
||||
}
|
||||
return string(domain), nil
|
||||
default:
|
||||
return "", fmt.Errorf("<red>unsupported address type: <cyan>%d</cyan></red>", atyp)
|
||||
}
|
||||
}
|
||||
|
||||
func writeSocksReply(conn net.Conn, reply byte) error {
|
||||
resp := []byte{
|
||||
socksVersion5,
|
||||
reply,
|
||||
0x00,
|
||||
socksAtypIPv4,
|
||||
0x00, 0x00, 0x00, 0x00,
|
||||
0x00, 0x00,
|
||||
}
|
||||
_, err := conn.Write(resp)
|
||||
return err
|
||||
}
|
||||
|
||||
func (c *Client) captureInitialPayload(ctx context.Context, conn net.Conn, session *Session) error {
|
||||
peekTimeout := 2 * time.Second
|
||||
idleTimeout := 30 * time.Second
|
||||
buf := make([]byte, 32*1024)
|
||||
|
||||
if err := conn.SetReadDeadline(time.Now().Add(peekTimeout)); err != nil {
|
||||
return err
|
||||
}
|
||||
|
||||
n, err := conn.Read(buf)
|
||||
if err == nil && n > 0 {
|
||||
session.InitialPayload = append([]byte(nil), buf[:n]...)
|
||||
session.BytesCaptured += n
|
||||
session.LastActivityAt = time.Now()
|
||||
c.log.Infof(
|
||||
"<green>session=<cyan>%d</cyan> captured initial payload bytes=<cyan>%d</cyan> target=<cyan>%s</cyan></green>",
|
||||
session.ID, n, net.JoinHostPort(session.TargetHost, strconv.Itoa(int(session.TargetPort))),
|
||||
)
|
||||
} else if ne, ok := err.(net.Error); !ok || !ne.Timeout() {
|
||||
if errors.Is(err, io.EOF) {
|
||||
return nil
|
||||
}
|
||||
if err != nil {
|
||||
return err
|
||||
}
|
||||
}
|
||||
|
||||
for {
|
||||
select {
|
||||
case <-ctx.Done():
|
||||
return nil
|
||||
default:
|
||||
}
|
||||
|
||||
if err := conn.SetReadDeadline(time.Now().Add(idleTimeout)); err != nil {
|
||||
return err
|
||||
}
|
||||
|
||||
n, err := conn.Read(buf)
|
||||
if n > 0 {
|
||||
session.BytesCaptured += n
|
||||
session.LastActivityAt = time.Now()
|
||||
c.log.Debugf("<green>session=<cyan>%d</cyan> buffered payload chunk=<cyan>%d</cyan> total=<cyan>%d</cyan></green>", session.ID, n, session.BytesCaptured)
|
||||
}
|
||||
|
||||
if err != nil {
|
||||
if errors.Is(err, io.EOF) {
|
||||
return nil
|
||||
}
|
||||
if ne, ok := err.(net.Error); ok && ne.Timeout() {
|
||||
return nil
|
||||
}
|
||||
return err
|
||||
}
|
||||
}
|
||||
}
|
||||
Reference in New Issue
Block a user