merge master
This commit is contained in:
parent
69d369268a
commit
469d9f7bfa
3 changed files with 34 additions and 28 deletions
|
@ -76,8 +76,9 @@ from shadowsocks.common import pre_parse_header, parse_header, pack_addr
|
||||||
BUF_SIZE = 65536
|
BUF_SIZE = 65536
|
||||||
|
|
||||||
|
|
||||||
def client_key(a, b, c, d):
|
def client_key(source_addr, server_af):
|
||||||
return '%s:%s:%s:%s' % (a, b, c, d)
|
# notice this is server af, not dest af
|
||||||
|
return '%s:%s:%d' % (source_addr[0], source_addr[1], server_af)
|
||||||
|
|
||||||
|
|
||||||
class UDPRelay(object):
|
class UDPRelay(object):
|
||||||
|
@ -102,6 +103,7 @@ class UDPRelay(object):
|
||||||
close_callback=self._close_client)
|
close_callback=self._close_client)
|
||||||
self._client_fd_to_server_addr = \
|
self._client_fd_to_server_addr = \
|
||||||
lru_cache.LRUCache(timeout=config['timeout'])
|
lru_cache.LRUCache(timeout=config['timeout'])
|
||||||
|
self._dns_cache = lru_cache.LRUCache(timeout=300)
|
||||||
self._eventloop = None
|
self._eventloop = None
|
||||||
self._closed = False
|
self._closed = False
|
||||||
self._last_time = time.time()
|
self._last_time = time.time()
|
||||||
|
@ -172,37 +174,36 @@ class UDPRelay(object):
|
||||||
|
|
||||||
if self._is_local:
|
if self._is_local:
|
||||||
server_addr, server_port = self._get_a_server()
|
server_addr, server_port = self._get_a_server()
|
||||||
key = client_key(r_addr[0], r_addr[1], dest_addr, dest_port)
|
|
||||||
else:
|
else:
|
||||||
server_addr, server_port = dest_addr, dest_port
|
server_addr, server_port = dest_addr, dest_port
|
||||||
addrs = socket.getaddrinfo(dest_addr, dest_port, 0, socket.SOCK_DGRAM, socket.SOL_UDP)
|
|
||||||
if addrs:
|
|
||||||
af, socktype, proto, canonname, sa = addrs[0]
|
|
||||||
key = client_key(r_addr[0], r_addr[1], af, 0)
|
|
||||||
else:
|
|
||||||
key = None
|
|
||||||
|
|
||||||
|
addrs = self._dns_cache.get(server_addr, None)
|
||||||
|
if addrs is None:
|
||||||
|
addrs = socket.getaddrinfo(server_addr, server_port, 0,
|
||||||
|
socket.SOCK_DGRAM, socket.SOL_UDP)
|
||||||
|
if not addrs:
|
||||||
|
# drop
|
||||||
|
return
|
||||||
|
else:
|
||||||
|
self._dns_cache[server_addr] = addrs
|
||||||
|
|
||||||
|
af, socktype, proto, canonname, sa = addrs[0]
|
||||||
|
key = client_key(r_addr, af)
|
||||||
|
logging.debug(key)
|
||||||
client = self._cache.get(key, None)
|
client = self._cache.get(key, None)
|
||||||
if not client:
|
if not client:
|
||||||
# TODO async getaddrinfo
|
# TODO async getaddrinfo
|
||||||
#logging.info('UDP handle_server %s:%d from %s:%d' % (common.to_str(server_addr), server_port, self._listen_addr, self._listen_port))
|
if self._forbidden_iplist:
|
||||||
addrs = socket.getaddrinfo(server_addr, server_port, 0,
|
if common.to_str(sa[0]) in self._forbidden_iplist:
|
||||||
socket.SOCK_DGRAM, socket.SOL_UDP)
|
logging.debug('IP %s is in forbidden list, drop' %
|
||||||
if addrs:
|
common.to_str(sa[0]))
|
||||||
af, socktype, proto, canonname, sa = addrs[0]
|
# drop
|
||||||
if self._forbidden_iplist:
|
return
|
||||||
if common.to_str(sa[0]) in self._forbidden_iplist:
|
client = socket.socket(af, socktype, proto)
|
||||||
logging.debug('IP %s is in forbidden list, drop' %
|
client.setblocking(False)
|
||||||
common.to_str(sa[0]))
|
self._cache[key] = client
|
||||||
# drop
|
self._client_fd_to_server_addr[client.fileno()] = r_addr
|
||||||
return
|
|
||||||
client = socket.socket(af, socktype, proto)
|
|
||||||
client.setblocking(False)
|
|
||||||
self._cache[key] = client
|
|
||||||
self._client_fd_to_server_addr[client.fileno()] = r_addr
|
|
||||||
else:
|
|
||||||
# drop
|
|
||||||
return
|
|
||||||
self._sockets.add(client.fileno())
|
self._sockets.add(client.fileno())
|
||||||
self._eventloop.add(client, eventloop.POLL_IN)
|
self._eventloop.add(client, eventloop.POLL_IN)
|
||||||
|
|
||||||
|
|
|
@ -69,7 +69,7 @@ if [ -f /proc/sys/net/ipv4/tcp_fastopen ] ; then
|
||||||
fi
|
fi
|
||||||
|
|
||||||
run_test tests/test_large_file.sh
|
run_test tests/test_large_file.sh
|
||||||
|
run_test tests/test_udp_src.sh
|
||||||
run_test tests/test_command.sh
|
run_test tests/test_command.sh
|
||||||
|
|
||||||
coverage combine && coverage report --include=shadowsocks/*
|
coverage combine && coverage report --include=shadowsocks/*
|
||||||
|
|
5
utils/fail2ban/shadowsocks.conf
Normal file
5
utils/fail2ban/shadowsocks.conf
Normal file
|
@ -0,0 +1,5 @@
|
||||||
|
[Definition]
|
||||||
|
|
||||||
|
_daemon = shadowsocks
|
||||||
|
|
||||||
|
failregex = ^\s+ERROR\s+can not parse header when handling connection from <HOST>:\d+$
|
Loading…
Add table
Reference in a new issue