123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169 |
- package socks5
- import (
- "bufio"
- "fmt"
- "log"
- "net"
- "os"
- "golang.org/x/net/context"
- )
- const (
- socks5Version = uint8(5)
- )
- type Config struct {
-
-
-
- AuthMethods []Authenticator
-
-
-
- Credentials CredentialStore
-
-
- Resolver NameResolver
-
-
- Rules RuleSet
-
-
-
- Rewriter AddressRewriter
-
- BindIP net.IP
-
-
- Logger *log.Logger
-
- Dial func(ctx context.Context, network, addr string) (net.Conn, error)
- }
- type Server struct {
- config *Config
- authMethods map[uint8]Authenticator
- }
- func New(conf *Config) (*Server, error) {
-
- if len(conf.AuthMethods) == 0 {
- if conf.Credentials != nil {
- conf.AuthMethods = []Authenticator{&UserPassAuthenticator{conf.Credentials}}
- } else {
- conf.AuthMethods = []Authenticator{&NoAuthAuthenticator{}}
- }
- }
-
- if conf.Resolver == nil {
- conf.Resolver = DNSResolver{}
- }
-
- if conf.Rules == nil {
- conf.Rules = PermitAll()
- }
-
- if conf.Logger == nil {
- conf.Logger = log.New(os.Stdout, "", log.LstdFlags)
- }
- server := &Server{
- config: conf,
- }
- server.authMethods = make(map[uint8]Authenticator)
- for _, a := range conf.AuthMethods {
- server.authMethods[a.GetCode()] = a
- }
- return server, nil
- }
- func (s *Server) ListenAndServe(network, addr string) error {
- l, err := net.Listen(network, addr)
- if err != nil {
- return err
- }
- return s.Serve(l)
- }
- func (s *Server) Serve(l net.Listener) error {
- for {
- conn, err := l.Accept()
- if err != nil {
- return err
- }
- go s.ServeConn(conn)
- }
- return nil
- }
- func (s *Server) ServeConn(conn net.Conn) error {
- defer conn.Close()
- bufConn := bufio.NewReader(conn)
-
- version := []byte{0}
- if _, err := bufConn.Read(version); err != nil {
- s.config.Logger.Printf("[ERR] socks: Failed to get version byte: %v", err)
- return err
- }
-
- if version[0] != socks5Version {
- err := fmt.Errorf("Unsupported SOCKS version: %v", version)
- s.config.Logger.Printf("[ERR] socks: %v", err)
- return err
- }
-
- authContext, err := s.authenticate(conn, bufConn)
- if err != nil {
- err = fmt.Errorf("Failed to authenticate: %v", err)
- s.config.Logger.Printf("[ERR] socks: %v", err)
- return err
- }
- request, err := NewRequest(bufConn)
- if err != nil {
- if err == unrecognizedAddrType {
- if err := sendReply(conn, addrTypeNotSupported, nil); err != nil {
- return fmt.Errorf("Failed to send reply: %v", err)
- }
- }
- return fmt.Errorf("Failed to read destination address: %v", err)
- }
- request.AuthContext = authContext
- if client, ok := conn.RemoteAddr().(*net.TCPAddr); ok {
- request.RemoteAddr = &AddrSpec{IP: client.IP, Port: client.Port}
- }
-
- if err := s.handleRequest(request, conn); err != nil {
- err = fmt.Errorf("Failed to handle request: %v", err)
- s.config.Logger.Printf("[ERR] socks: %v", err)
- return err
- }
- return nil
- }
|