add tcp forward to tunnel and fix a bug for pack_addr from common.py
1. update tunnel to tcprelay.py 2. add tunnel_tcp_server to tunnel.py 3. add tunnel_tcp_server to local.py 4. add `address = to_bytes(address)` to `pack_addr` from common.py (fix a error when address is a domain)
This commit is contained in:
parent
70c8373a0f
commit
d29baa3102
5 changed files with 86 additions and 37 deletions
|
@ -146,6 +146,7 @@ ADDRTYPE_MASK = 0xF
|
||||||
|
|
||||||
def pack_addr(address):
|
def pack_addr(address):
|
||||||
address_str = to_str(address)
|
address_str = to_str(address)
|
||||||
|
address = to_bytes(address)
|
||||||
for family in (socket.AF_INET, socket.AF_INET6):
|
for family in (socket.AF_INET, socket.AF_INET6):
|
||||||
try:
|
try:
|
||||||
r = socket.inet_pton(family, address_str)
|
r = socket.inet_pton(family, address_str)
|
||||||
|
@ -162,9 +163,9 @@ def pack_addr(address):
|
||||||
|
|
||||||
# add ss header
|
# add ss header
|
||||||
def add_header(address, port, data):
|
def add_header(address, port, data):
|
||||||
header = b''
|
_data = b''
|
||||||
header = pack_addr(address) + struct.pack('>H', port) + data
|
_data = pack_addr(address) + struct.pack('>H', port) + data
|
||||||
return header
|
return _data
|
||||||
|
|
||||||
|
|
||||||
def parse_header(data):
|
def parse_header(data):
|
||||||
|
|
|
@ -55,7 +55,13 @@ def main():
|
||||||
if config["both_tunnel_local"]:
|
if config["both_tunnel_local"]:
|
||||||
_config = config.copy()
|
_config = config.copy()
|
||||||
_config["local_port"] = _config["tunnel_port"]
|
_config["local_port"] = _config["tunnel_port"]
|
||||||
logging.info("starting tunnel at %s:%d forward to %s:%d" %
|
logging.info("starting tcp tunnel at %s:%d forward to %s:%d" %
|
||||||
|
(_config['local_address'], _config['local_port'],
|
||||||
|
_config['tunnel_remote'], _config['tunnel_remote_port']))
|
||||||
|
tunnel_tcp_server = tcprelay.TCPRelay(_config, dns_resolver, True)
|
||||||
|
tunnel_tcp_server.is_tunnel = True
|
||||||
|
tunnel_tcp_server.add_to_loop(loop)
|
||||||
|
logging.info("starting udp tunnel at %s:%d forward to %s:%d" %
|
||||||
(_config['local_address'], _config['local_port'],
|
(_config['local_address'], _config['local_port'],
|
||||||
_config['tunnel_remote'], _config['tunnel_remote_port']))
|
_config['tunnel_remote'], _config['tunnel_remote_port']))
|
||||||
tunnel_udp_server = udprelay.UDPRelay(_config, dns_resolver, True)
|
tunnel_udp_server = udprelay.UDPRelay(_config, dns_resolver, True)
|
||||||
|
@ -69,6 +75,7 @@ def main():
|
||||||
udp_server.close(next_tick=True)
|
udp_server.close(next_tick=True)
|
||||||
if has_tunnel:
|
if has_tunnel:
|
||||||
tunnel_udp_server.close(next_tick=True)
|
tunnel_udp_server.close(next_tick=True)
|
||||||
|
tunnel_tcp_server.close(next_tick=True)
|
||||||
signal.signal(getattr(signal, 'SIGQUIT', signal.SIGTERM), handler)
|
signal.signal(getattr(signal, 'SIGQUIT', signal.SIGTERM), handler)
|
||||||
|
|
||||||
def int_handler(signum, _):
|
def int_handler(signum, _):
|
||||||
|
|
|
@ -132,6 +132,13 @@ def check_config(config, is_local):
|
||||||
sys.exit(2)
|
sys.exit(2)
|
||||||
else:
|
else:
|
||||||
config['server'] = to_str(config['server'])
|
config['server'] = to_str(config['server'])
|
||||||
|
|
||||||
|
if config.get('tunnel_remote', None) is None:
|
||||||
|
logging.error('tunnel_remote addr not specified')
|
||||||
|
print_local_help()
|
||||||
|
sys.exit(2)
|
||||||
|
else:
|
||||||
|
config['tunnel_remote'] = to_str(config['tunnel_remote'])
|
||||||
else:
|
else:
|
||||||
config['server'] = to_str(config.get('server', '0.0.0.0'))
|
config['server'] = to_str(config.get('server', '0.0.0.0'))
|
||||||
try:
|
try:
|
||||||
|
|
|
@ -115,6 +115,11 @@ class TCPRelayHandler(object):
|
||||||
self._remote_sock = None
|
self._remote_sock = None
|
||||||
self._config = config
|
self._config = config
|
||||||
self._dns_resolver = dns_resolver
|
self._dns_resolver = dns_resolver
|
||||||
|
self.both_tunnel_local = config.get('both_tunnel_local', False)
|
||||||
|
self.tunnel_remote = config.get('tunnel_remote', "8.8.8.8")
|
||||||
|
self.tunnel_remote_port = config.get('tunnel_remote_port', 53)
|
||||||
|
self.tunnel_port = config.get('tunnel_port', 53)
|
||||||
|
self.is_tunnel = server.is_tunnel
|
||||||
|
|
||||||
# TCP Relay works as either sslocal or ssserver
|
# TCP Relay works as either sslocal or ssserver
|
||||||
# if is_local, this is sslocal
|
# if is_local, this is sslocal
|
||||||
|
@ -250,7 +255,12 @@ class TCPRelayHandler(object):
|
||||||
else:
|
else:
|
||||||
self._data_to_write_to_remote.append(data)
|
self._data_to_write_to_remote.append(data)
|
||||||
return
|
return
|
||||||
|
if self.is_tunnel:
|
||||||
|
# add ss header to data
|
||||||
|
tunnel_remote = self.tunnel_remote
|
||||||
|
tunnel_remote_port = self.tunnel_remote_port
|
||||||
|
data = common.add_header(tunnel_remote,
|
||||||
|
tunnel_remote_port, data)
|
||||||
if self._ota_enable_session:
|
if self._ota_enable_session:
|
||||||
data = self._ota_chunk_data_gen(data)
|
data = self._ota_chunk_data_gen(data)
|
||||||
data = self._encryptor.encrypt(data)
|
data = self._encryptor.encrypt(data)
|
||||||
|
@ -293,6 +303,13 @@ class TCPRelayHandler(object):
|
||||||
@shell.exception_handle(self_=True, destroy=True, conn_err=True)
|
@shell.exception_handle(self_=True, destroy=True, conn_err=True)
|
||||||
def _handle_stage_addr(self, data):
|
def _handle_stage_addr(self, data):
|
||||||
if self._is_local:
|
if self._is_local:
|
||||||
|
if self.is_tunnel:
|
||||||
|
# add ss header to data
|
||||||
|
tunnel_remote = self.tunnel_remote
|
||||||
|
tunnel_remote_port = self.tunnel_remote_port
|
||||||
|
data = common.add_header(tunnel_remote,
|
||||||
|
tunnel_remote_port, data)
|
||||||
|
else:
|
||||||
cmd = common.ord(data[1])
|
cmd = common.ord(data[1])
|
||||||
if cmd == CMD_UDP_ASSOCIATE:
|
if cmd == CMD_UDP_ASSOCIATE:
|
||||||
logging.debug('UDP associate')
|
logging.debug('UDP associate')
|
||||||
|
@ -347,6 +364,8 @@ class TCPRelayHandler(object):
|
||||||
self._update_stream(STREAM_UP, WAIT_STATUS_WRITING)
|
self._update_stream(STREAM_UP, WAIT_STATUS_WRITING)
|
||||||
self._stage = STAGE_DNS
|
self._stage = STAGE_DNS
|
||||||
if self._is_local:
|
if self._is_local:
|
||||||
|
# jump over socks5 response
|
||||||
|
if not self.is_tunnel:
|
||||||
# forward address to remote
|
# forward address to remote
|
||||||
self._write_to_sock((b'\x05\x00\x00\x01'
|
self._write_to_sock((b'\x05\x00\x00\x01'
|
||||||
b'\x00\x00\x00\x00\x10\x10'),
|
b'\x00\x00\x00\x00\x10\x10'),
|
||||||
|
@ -484,6 +503,12 @@ class TCPRelayHandler(object):
|
||||||
|
|
||||||
def _handle_stage_stream(self, data):
|
def _handle_stage_stream(self, data):
|
||||||
if self._is_local:
|
if self._is_local:
|
||||||
|
if self.is_tunnel:
|
||||||
|
# add ss header to data
|
||||||
|
tunnel_remote = self.tunnel_remote
|
||||||
|
tunnel_remote_port = self.tunnel_remote_port
|
||||||
|
data = common.add_header(tunnel_remote,
|
||||||
|
tunnel_remote_port, data)
|
||||||
if self._ota_enable_session:
|
if self._ota_enable_session:
|
||||||
data = self._ota_chunk_data_gen(data)
|
data = self._ota_chunk_data_gen(data)
|
||||||
data = self._encryptor.encrypt(data)
|
data = self._encryptor.encrypt(data)
|
||||||
|
@ -554,6 +579,9 @@ class TCPRelayHandler(object):
|
||||||
data = self._encryptor.decrypt(data)
|
data = self._encryptor.decrypt(data)
|
||||||
if not data:
|
if not data:
|
||||||
return
|
return
|
||||||
|
# jump over socks5 init
|
||||||
|
if self.is_tunnel:
|
||||||
|
self._stage = STAGE_ADDR
|
||||||
if self._stage == STAGE_STREAM:
|
if self._stage == STAGE_STREAM:
|
||||||
self._handle_stage_stream(data)
|
self._handle_stage_stream(data)
|
||||||
return
|
return
|
||||||
|
@ -696,6 +724,7 @@ class TCPRelay(object):
|
||||||
self._closed = False
|
self._closed = False
|
||||||
self._eventloop = None
|
self._eventloop = None
|
||||||
self._fd_to_handlers = {}
|
self._fd_to_handlers = {}
|
||||||
|
self.is_tunnel = False
|
||||||
|
|
||||||
self._timeout = config['timeout']
|
self._timeout = config['timeout']
|
||||||
self._timeouts = [] # a list for all the handlers
|
self._timeouts = [] # a list for all the handlers
|
||||||
|
|
|
@ -24,7 +24,7 @@ import logging
|
||||||
import signal
|
import signal
|
||||||
|
|
||||||
sys.path.insert(0, os.path.join(os.path.dirname(__file__), '../'))
|
sys.path.insert(0, os.path.join(os.path.dirname(__file__), '../'))
|
||||||
from shadowsocks import shell, daemon, eventloop, udprelay, asyncdns
|
from shadowsocks import shell, daemon, eventloop, tcprelay, udprelay, asyncdns
|
||||||
|
|
||||||
|
|
||||||
@shell.exception_handle(self_=False, exit_code=1)
|
@shell.exception_handle(self_=False, exit_code=1)
|
||||||
|
@ -42,10 +42,15 @@ def main():
|
||||||
dns_resolver = asyncdns.DNSResolver()
|
dns_resolver = asyncdns.DNSResolver()
|
||||||
loop = eventloop.EventLoop()
|
loop = eventloop.EventLoop()
|
||||||
dns_resolver.add_to_loop(loop)
|
dns_resolver.add_to_loop(loop)
|
||||||
# tcp_server.add_to_loop(loop)
|
|
||||||
_config = config.copy()
|
_config = config.copy()
|
||||||
_config["local_port"] = _config["tunnel_port"]
|
_config["local_port"] = _config["tunnel_port"]
|
||||||
logging.info("starting tunnel at %s:%d forward to %s:%d" %
|
logging.info("starting tcp tunnel at %s:%d forward to %s:%d" %
|
||||||
|
(_config['local_address'], _config['local_port'],
|
||||||
|
_config['tunnel_remote'], _config['tunnel_remote_port']))
|
||||||
|
tunnel_tcp_server = tcprelay.TCPRelay(_config, dns_resolver, True)
|
||||||
|
tunnel_tcp_server.is_tunnel = True
|
||||||
|
tunnel_tcp_server.add_to_loop(loop)
|
||||||
|
logging.info("starting udp tunnel at %s:%d forward to %s:%d" %
|
||||||
(_config['local_address'], _config['local_port'],
|
(_config['local_address'], _config['local_port'],
|
||||||
_config['tunnel_remote'], _config['tunnel_remote_port']))
|
_config['tunnel_remote'], _config['tunnel_remote_port']))
|
||||||
tunnel_udp_server = udprelay.UDPRelay(_config, dns_resolver, True)
|
tunnel_udp_server = udprelay.UDPRelay(_config, dns_resolver, True)
|
||||||
|
@ -54,7 +59,7 @@ def main():
|
||||||
|
|
||||||
def handler(signum, _):
|
def handler(signum, _):
|
||||||
logging.warn('received SIGQUIT, doing graceful shutting down..')
|
logging.warn('received SIGQUIT, doing graceful shutting down..')
|
||||||
# tcp_server.close(next_tick=True)
|
tunnel_tcp_server.close(next_tick=True)
|
||||||
tunnel_udp_server.close(next_tick=True)
|
tunnel_udp_server.close(next_tick=True)
|
||||||
signal.signal(getattr(signal, 'SIGQUIT', signal.SIGTERM), handler)
|
signal.signal(getattr(signal, 'SIGQUIT', signal.SIGTERM), handler)
|
||||||
|
|
||||||
|
|
Loading…
Add table
Add a link
Reference in a new issue