more work
This commit is contained in:
parent
2cdddd4515
commit
0d6c39900b
3 changed files with 241 additions and 79 deletions
64
shadowsocks/common.py
Normal file
64
shadowsocks/common.py
Normal file
|
@ -0,0 +1,64 @@
|
|||
#!/usr/bin/python
|
||||
# -*- coding: utf-8 -*-
|
||||
|
||||
# Copyright (c) 2014 clowwindy
|
||||
#
|
||||
# Permission is hereby granted, free of charge, to any person obtaining a copy
|
||||
# of this software and associated documentation files (the "Software"), to deal
|
||||
# in the Software without restriction, including without limitation the rights
|
||||
# to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
|
||||
# copies of the Software, and to permit persons to whom the Software is
|
||||
# furnished to do so, subject to the following conditions:
|
||||
#
|
||||
# The above copyright notice and this permission notice shall be included in
|
||||
# all copies or substantial portions of the Software.
|
||||
#
|
||||
# THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
|
||||
# IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
|
||||
# FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
|
||||
# AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
|
||||
# LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
|
||||
# OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
|
||||
# SOFTWARE.
|
||||
|
||||
import socket
|
||||
import struct
|
||||
import logging
|
||||
|
||||
|
||||
def parse_header(data):
|
||||
addrtype = ord(data[0])
|
||||
dest_addr = None
|
||||
dest_port = None
|
||||
header_length = 0
|
||||
if addrtype == 1:
|
||||
if len(data) >= 7:
|
||||
dest_addr = socket.inet_ntoa(data[1:5])
|
||||
dest_port = struct.unpack('>H', data[5:7])[0]
|
||||
header_length = 7
|
||||
else:
|
||||
logging.warn('header is too short')
|
||||
elif addrtype == 3:
|
||||
if len(data) > 2:
|
||||
addrlen = ord(data[1])
|
||||
if len(data) >= 2 + addrlen:
|
||||
dest_addr = data[2:2 + addrlen]
|
||||
dest_port = struct.unpack('>H', data[2 + addrlen:4 +
|
||||
addrlen])[0]
|
||||
header_length = 4 + addrlen
|
||||
else:
|
||||
logging.warn('header is too short')
|
||||
else:
|
||||
logging.warn('header is too short')
|
||||
elif addrtype == 4:
|
||||
if len(data) >= 19:
|
||||
dest_addr = socket.inet_ntop(socket.AF_INET6, data[1:17])
|
||||
dest_port = struct.unpack('>H', data[17:19])[0]
|
||||
header_length = 19
|
||||
else:
|
||||
logging.warn('header is too short')
|
||||
else:
|
||||
logging.warn('unsupported addrtype %d, maybe wrong password' % addrtype)
|
||||
if dest_addr is None:
|
||||
return None
|
||||
return (addrtype, dest_addr, dest_port, header_length)
|
|
@ -22,41 +22,170 @@
|
|||
# SOFTWARE.
|
||||
|
||||
import time
|
||||
import threading
|
||||
import socket
|
||||
import logging
|
||||
import struct
|
||||
import encrypt
|
||||
import eventloop
|
||||
import errno
|
||||
import eventloop
|
||||
from common import parse_header
|
||||
|
||||
|
||||
# local:
|
||||
# stage 0 init
|
||||
# stage 1 hello received, hello sent
|
||||
# stage 4 addr received, reply sent
|
||||
# stage 5 remote connected
|
||||
|
||||
# remote:
|
||||
# stage 0 init
|
||||
# stage 4 addr received, reply sent
|
||||
# stage 5 remote connected
|
||||
|
||||
|
||||
BUF_SIZE = 8 * 1024
|
||||
|
||||
|
||||
class TCPRelayHandler(object):
|
||||
def __init__(self, fd_to_handlers, loop, conn, config, is_local):
|
||||
def __init__(self, fd_to_handlers, loop, local_sock, config, is_local):
|
||||
self._fd_to_handlers = fd_to_handlers
|
||||
self._loop = loop
|
||||
self._local_conn = conn
|
||||
self._remote_conn = None
|
||||
self._remains_data_for_local = None
|
||||
self._remains_data_for_remote = None
|
||||
self._local_sock = local_sock
|
||||
self._remote_sock = None
|
||||
self._config = config
|
||||
self._is_local = is_local
|
||||
self._stage = 0
|
||||
fd_to_handlers[conn.fileno()] = self
|
||||
conn.setblocking(False)
|
||||
loop.add(conn, eventloop.POLL_IN)
|
||||
self._encryptor = encrypt.Encryptor(config['password'],
|
||||
config['method'])
|
||||
self._data_to_write_to_local = []
|
||||
self._data_to_write_to_remote = []
|
||||
fd_to_handlers[local_sock.fileno()] = self
|
||||
local_sock.setblocking(False)
|
||||
loop.add(local_sock, eventloop.POLL_IN)
|
||||
|
||||
def resume_reading(self, sock):
|
||||
pass
|
||||
|
||||
def pause_reading(self, sock):
|
||||
pass
|
||||
|
||||
def resume_writing(self, sock):
|
||||
pass
|
||||
|
||||
def pause_writing(self, sock):
|
||||
pass
|
||||
|
||||
def write_all_to_sock(self, data, sock):
|
||||
# write to sock
|
||||
# put remaining bytes into buffer
|
||||
# return true if all written
|
||||
# return false if some bytes left in buffer
|
||||
# raise if encounter error
|
||||
return True
|
||||
|
||||
def on_local_read(self):
|
||||
pass
|
||||
if not self._local_sock:
|
||||
return
|
||||
is_local = self._is_local
|
||||
data = self._local_sock.recv(BUF_SIZE)
|
||||
if not is_local:
|
||||
data = self._encryptor.decrypt(data)
|
||||
if self._stage == 5:
|
||||
if self._is_local:
|
||||
data = self._encryptor.encrypt(data)
|
||||
if not self.write_all_to_sock(data, self._remote_sock):
|
||||
self.pause_reading(self._local_sock)
|
||||
return
|
||||
if is_local and self._stage == 0:
|
||||
# TODO check auth method
|
||||
self.write_all_to_sock('\x05\00', self._local_sock)
|
||||
self._stage = 1
|
||||
return
|
||||
if self._stage == 4:
|
||||
self._data_to_write_to_remote.append(data)
|
||||
if (is_local and self._stage == 0) or \
|
||||
(not is_local and self._stage == 1):
|
||||
try:
|
||||
if is_local:
|
||||
cmd = ord(data[1])
|
||||
# TODO check cmd == 1
|
||||
assert cmd == 1
|
||||
# just trim VER CMD RSV
|
||||
data = data[3:]
|
||||
header_result = parse_header(data)
|
||||
if header_result is None:
|
||||
raise Exception('can not parse header')
|
||||
addrtype, remote_addr, remote_port, header_length =\
|
||||
header_result
|
||||
logging.info('connecting %s:%d' % (remote_addr, remote_port))
|
||||
if is_local:
|
||||
# forward address to remote
|
||||
self._data_to_write_to_remote.append(data[:header_length])
|
||||
self.write_all_to_sock('\x05\x00\x00\x01' +
|
||||
'\x00\x00\x00\x00\x10\x10',
|
||||
self._local_sock)
|
||||
else:
|
||||
remote_addr = self._config['server']
|
||||
remote_port = self._config['server_port']
|
||||
|
||||
# TODO async DNS
|
||||
addrs = socket.getaddrinfo(remote_addr, remote_port, 0,
|
||||
socket.SOCK_STREAM, socket.SOL_TCP)
|
||||
if len(addrs) == 0:
|
||||
raise Exception("can't get addrinfo for %s:%d" %
|
||||
(remote_addr, remote_port))
|
||||
af, socktype, proto, canonname, sa = addrs[0]
|
||||
self._remote_sock = socket.socket(af, socktype, proto)
|
||||
self._remote_sock.setblocking(False)
|
||||
# TODO support TCP fast open
|
||||
self._remote_sock.connect(sa)
|
||||
self._loop.add(self._remote_sock, eventloop.POLL_OUT)
|
||||
|
||||
if len(data) > header_length:
|
||||
self._data_to_write_to_remote.append(data[header_length:])
|
||||
|
||||
self._stage = 4
|
||||
self.pause_reading(self._local_sock)
|
||||
return
|
||||
except Exception:
|
||||
import traceback
|
||||
traceback.print_exc()
|
||||
# TODO use logging when debug completed
|
||||
self.destroy()
|
||||
|
||||
if self._stage == 4:
|
||||
self._data_to_write_to_remote.append(data)
|
||||
|
||||
def on_remote_read(self):
|
||||
pass
|
||||
data = self._remote_sock.recv(BUF_SIZE)
|
||||
if self._is_local:
|
||||
data = self._encryptor.decrypt(data)
|
||||
try:
|
||||
if not self.write_all_to_sock(data, self._local_sock):
|
||||
self.pause_reading(self._remote_sock)
|
||||
self.resume_writing(self._local_sock)
|
||||
except Exception:
|
||||
import traceback
|
||||
traceback.print_exc()
|
||||
# TODO use logging when debug completed
|
||||
self.destroy()
|
||||
|
||||
def on_local_write(self):
|
||||
pass
|
||||
if self._data_to_write_to_local:
|
||||
written = self.write_all_to_sock(
|
||||
''.join(self._data_to_write_to_local), self._local_sock)
|
||||
if written:
|
||||
self.pause_writing(self._local_sock)
|
||||
else:
|
||||
self.pause_writing(self._local_sock)
|
||||
|
||||
def on_remote_write(self):
|
||||
pass
|
||||
if self._data_to_write_to_remote:
|
||||
written = self.write_all_to_sock(
|
||||
''.join(self._data_to_write_to_remote), self._remote_sock)
|
||||
if written:
|
||||
self.pause_writing(self._remote_sock)
|
||||
else:
|
||||
self.pause_writing(self._remote_sock)
|
||||
|
||||
def on_local_error(self):
|
||||
self.destroy()
|
||||
|
@ -66,33 +195,34 @@ class TCPRelayHandler(object):
|
|||
|
||||
def handle_event(self, sock, event):
|
||||
# order is important
|
||||
if sock == self._local_conn:
|
||||
if event & eventloop.POLL_IN:
|
||||
self.on_local_read()
|
||||
if event & eventloop.POLL_OUT:
|
||||
self.on_local_write()
|
||||
if event & eventloop.POLL_ERR:
|
||||
self.on_local_error()
|
||||
elif sock == self._remote_conn:
|
||||
if sock == self._remote_sock:
|
||||
if event & eventloop.POLL_IN:
|
||||
self.on_remote_read()
|
||||
if event & eventloop.POLL_OUT:
|
||||
self.on_remote_write()
|
||||
if event & eventloop.POLL_ERR:
|
||||
self.on_remote_error()
|
||||
elif sock == self._local_sock:
|
||||
if event & eventloop.POLL_IN:
|
||||
self.on_local_read()
|
||||
if event & eventloop.POLL_OUT:
|
||||
self.on_local_write()
|
||||
if event & eventloop.POLL_ERR:
|
||||
self.on_local_error()
|
||||
else:
|
||||
logging.warn('unknown socket')
|
||||
|
||||
def destroy(self):
|
||||
if self._local_conn:
|
||||
self._local_conn.close()
|
||||
eventloop.remove(self._local_conn)
|
||||
# TODO maybe better to delete the key
|
||||
self._fd_to_handlers[self._local_conn.fileno()] = None
|
||||
if self._remote_conn:
|
||||
self._remote_conn.close()
|
||||
eventloop.remove(self._remote_conn)
|
||||
self._fd_to_handlers[self._local_conn.fileno()] = None
|
||||
if self._remote_sock:
|
||||
self._remote_sock.close()
|
||||
self._loop.remove(self._remote_sock)
|
||||
del self._fd_to_handlers[self._remote_sock.fileno()]
|
||||
self._remote_sock = None
|
||||
if self._local_sock:
|
||||
self._local_sock.close()
|
||||
self._loop.remove(self._local_sock)
|
||||
del self._fd_to_handlers[self._local_sock.fileno()]
|
||||
self._local_sock = None
|
||||
|
||||
|
||||
class TCPRelay(object):
|
||||
|
@ -102,15 +232,23 @@ class TCPRelay(object):
|
|||
self._closed = False
|
||||
self._fd_to_handlers = {}
|
||||
|
||||
addrs = socket.getaddrinfo(self._listen_addr, self._listen_port, 0,
|
||||
if is_local:
|
||||
listen_addr = config['local_address']
|
||||
listen_port = config['local_port']
|
||||
else:
|
||||
listen_addr = config['server']
|
||||
listen_port = config['server_port']
|
||||
|
||||
addrs = socket.getaddrinfo(listen_addr, listen_port, 0,
|
||||
socket.SOCK_STREAM, socket.SOL_TCP)
|
||||
if len(addrs) == 0:
|
||||
raise Exception("can't get addrinfo for %s:%d" %
|
||||
(self._listen_addr, self._listen_port))
|
||||
(listen_addr, listen_port))
|
||||
af, socktype, proto, canonname, sa = addrs[0]
|
||||
server_socket = socket.socket(af, socktype, proto)
|
||||
server_socket.bind((self._listen_addr, self._listen_port))
|
||||
server_socket.bind(sa)
|
||||
server_socket.setblocking(False)
|
||||
server_socket.listen(1024)
|
||||
self._server_socket = server_socket
|
||||
|
||||
def _run(self):
|
||||
|
@ -132,8 +270,8 @@ class TCPRelay(object):
|
|||
if sock == self._server_socket:
|
||||
try:
|
||||
conn = self._server_socket.accept()
|
||||
TCPRelayHandler(loop, conn, remote_addr, remote_port,
|
||||
password, method, timeout, is_local)
|
||||
TCPRelayHandler(self._eventloop, conn, self._config,
|
||||
self._is_local)
|
||||
except (OSError, IOError) as e:
|
||||
error_no = eventloop.errno_from_exception(e)
|
||||
if error_no in [errno.EAGAIN, errno.EINPROGRESS]:
|
||||
|
@ -149,6 +287,3 @@ class TCPRelay(object):
|
|||
if now - last_time > 5:
|
||||
# TODO sweep timeouts
|
||||
last_time = now
|
||||
|
||||
|
||||
|
||||
|
|
|
@ -71,53 +71,16 @@ import threading
|
|||
import socket
|
||||
import logging
|
||||
import struct
|
||||
import errno
|
||||
import encrypt
|
||||
import eventloop
|
||||
import lru_cache
|
||||
import errno
|
||||
from common import parse_header
|
||||
|
||||
|
||||
BUF_SIZE = 65536
|
||||
|
||||
|
||||
def parse_header(data):
|
||||
addrtype = ord(data[0])
|
||||
dest_addr = None
|
||||
dest_port = None
|
||||
header_length = 0
|
||||
if addrtype == 1:
|
||||
if len(data) >= 7:
|
||||
dest_addr = socket.inet_ntoa(data[1:5])
|
||||
dest_port = struct.unpack('>H', data[5:7])[0]
|
||||
header_length = 7
|
||||
else:
|
||||
logging.warn('[udp] header is too short')
|
||||
elif addrtype == 3:
|
||||
if len(data) > 2:
|
||||
addrlen = ord(data[1])
|
||||
if len(data) >= 2 + addrlen:
|
||||
dest_addr = data[2:2 + addrlen]
|
||||
dest_port = struct.unpack('>H', data[2 + addrlen:4 +
|
||||
addrlen])[0]
|
||||
header_length = 4 + addrlen
|
||||
else:
|
||||
logging.warn('[udp] header is too short')
|
||||
else:
|
||||
logging.warn('[udp] header is too short')
|
||||
elif addrtype == 4:
|
||||
if len(data) >= 19:
|
||||
dest_addr = socket.inet_ntop(socket.AF_INET6, data[1:17])
|
||||
dest_port = struct.unpack('>H', data[17:19])[0]
|
||||
header_length = 19
|
||||
else:
|
||||
logging.warn('[udp] header is too short')
|
||||
else:
|
||||
logging.warn('unsupported addrtype %d' % addrtype)
|
||||
if dest_addr is None:
|
||||
return None
|
||||
return (addrtype, dest_addr, dest_port, header_length)
|
||||
|
||||
|
||||
def client_key(a, b, c, d):
|
||||
return '%s:%s:%s:%s' % (a, b, c, d)
|
||||
|
||||
|
|
Loading…
Reference in a new issue