1
0

visitor.go 7.8 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338
  1. // Copyright 2017 fatedier, fatedier@gmail.com
  2. //
  3. // Licensed under the Apache License, Version 2.0 (the "License");
  4. // you may not use this file except in compliance with the License.
  5. // You may obtain a copy of the License at
  6. //
  7. // http://www.apache.org/licenses/LICENSE-2.0
  8. //
  9. // Unless required by applicable law or agreed to in writing, software
  10. // distributed under the License is distributed on an "AS IS" BASIS,
  11. // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  12. // See the License for the specific language governing permissions and
  13. // limitations under the License.
  14. package client
  15. import (
  16. "bytes"
  17. "fmt"
  18. "io"
  19. "net"
  20. "strconv"
  21. "strings"
  22. "sync"
  23. "time"
  24. "golang.org/x/net/ipv4"
  25. "github.com/fatedier/frp/g"
  26. "github.com/fatedier/frp/models/config"
  27. "github.com/fatedier/frp/models/msg"
  28. "github.com/fatedier/frp/utils/log"
  29. frpNet "github.com/fatedier/frp/utils/net"
  30. "github.com/fatedier/frp/utils/util"
  31. frpIo "github.com/fatedier/golib/io"
  32. "github.com/fatedier/golib/pool"
  33. )
  34. // Visitor is used for forward traffics from local port tot remote service.
  35. type Visitor interface {
  36. Run() error
  37. Close()
  38. log.Logger
  39. }
  40. func NewVisitor(ctl *Control, cfg config.VisitorConf) (visitor Visitor) {
  41. baseVisitor := BaseVisitor{
  42. ctl: ctl,
  43. Logger: log.NewPrefixLogger(cfg.GetBaseInfo().ProxyName),
  44. }
  45. switch cfg := cfg.(type) {
  46. case *config.StcpVisitorConf:
  47. visitor = &StcpVisitor{
  48. BaseVisitor: &baseVisitor,
  49. cfg: cfg,
  50. }
  51. case *config.XtcpVisitorConf:
  52. visitor = &XtcpVisitor{
  53. BaseVisitor: &baseVisitor,
  54. cfg: cfg,
  55. }
  56. }
  57. return
  58. }
  59. type BaseVisitor struct {
  60. ctl *Control
  61. l frpNet.Listener
  62. closed bool
  63. mu sync.RWMutex
  64. log.Logger
  65. }
  66. type StcpVisitor struct {
  67. *BaseVisitor
  68. cfg *config.StcpVisitorConf
  69. }
  70. func (sv *StcpVisitor) Run() (err error) {
  71. sv.l, err = frpNet.ListenTcp(sv.cfg.BindAddr, sv.cfg.BindPort)
  72. if err != nil {
  73. return
  74. }
  75. go sv.worker()
  76. return
  77. }
  78. func (sv *StcpVisitor) Close() {
  79. sv.l.Close()
  80. }
  81. func (sv *StcpVisitor) worker() {
  82. for {
  83. conn, err := sv.l.Accept()
  84. if err != nil {
  85. sv.Warn("stcp local listener closed")
  86. return
  87. }
  88. go sv.handleConn(conn)
  89. }
  90. }
  91. func (sv *StcpVisitor) handleConn(userConn frpNet.Conn) {
  92. defer userConn.Close()
  93. sv.Debug("get a new stcp user connection")
  94. visitorConn, err := sv.ctl.connectServer()
  95. if err != nil {
  96. return
  97. }
  98. defer visitorConn.Close()
  99. now := time.Now().Unix()
  100. newVisitorConnMsg := &msg.NewVisitorConn{
  101. ProxyName: sv.cfg.ServerName,
  102. SignKey: util.GetAuthKey(sv.cfg.Sk, now),
  103. Timestamp: now,
  104. UseEncryption: sv.cfg.UseEncryption,
  105. UseCompression: sv.cfg.UseCompression,
  106. }
  107. err = msg.WriteMsg(visitorConn, newVisitorConnMsg)
  108. if err != nil {
  109. sv.Warn("send newVisitorConnMsg to server error: %v", err)
  110. return
  111. }
  112. var newVisitorConnRespMsg msg.NewVisitorConnResp
  113. visitorConn.SetReadDeadline(time.Now().Add(10 * time.Second))
  114. err = msg.ReadMsgInto(visitorConn, &newVisitorConnRespMsg)
  115. if err != nil {
  116. sv.Warn("get newVisitorConnRespMsg error: %v", err)
  117. return
  118. }
  119. visitorConn.SetReadDeadline(time.Time{})
  120. if newVisitorConnRespMsg.Error != "" {
  121. sv.Warn("start new visitor connection error: %s", newVisitorConnRespMsg.Error)
  122. return
  123. }
  124. var remote io.ReadWriteCloser
  125. remote = visitorConn
  126. if sv.cfg.UseEncryption {
  127. remote, err = frpIo.WithEncryption(remote, []byte(sv.cfg.Sk))
  128. if err != nil {
  129. sv.Error("create encryption stream error: %v", err)
  130. return
  131. }
  132. }
  133. if sv.cfg.UseCompression {
  134. remote = frpIo.WithCompression(remote)
  135. }
  136. frpIo.Join(userConn, remote)
  137. }
  138. type XtcpVisitor struct {
  139. *BaseVisitor
  140. cfg *config.XtcpVisitorConf
  141. }
  142. func (sv *XtcpVisitor) Run() (err error) {
  143. sv.l, err = frpNet.ListenTcp(sv.cfg.BindAddr, sv.cfg.BindPort)
  144. if err != nil {
  145. return
  146. }
  147. go sv.worker()
  148. return
  149. }
  150. func (sv *XtcpVisitor) Close() {
  151. sv.l.Close()
  152. }
  153. func (sv *XtcpVisitor) worker() {
  154. for {
  155. conn, err := sv.l.Accept()
  156. if err != nil {
  157. sv.Warn("xtcp local listener closed")
  158. return
  159. }
  160. go sv.handleConn(conn)
  161. }
  162. }
  163. func (sv *XtcpVisitor) handleConn(userConn frpNet.Conn) {
  164. defer userConn.Close()
  165. sv.Debug("get a new xtcp user connection")
  166. if g.GlbClientCfg.ServerUdpPort == 0 {
  167. sv.Error("xtcp is not supported by server")
  168. return
  169. }
  170. raddr, err := net.ResolveUDPAddr("udp",
  171. fmt.Sprintf("%s:%d", g.GlbClientCfg.ServerAddr, g.GlbClientCfg.ServerUdpPort))
  172. if err != nil {
  173. sv.Error("resolve server UDP addr error")
  174. return
  175. }
  176. visitorConn, err := net.DialUDP("udp", nil, raddr)
  177. if err != nil {
  178. sv.Warn("dial server udp addr error: %v", err)
  179. return
  180. }
  181. defer visitorConn.Close()
  182. now := time.Now().Unix()
  183. natHoleVisitorMsg := &msg.NatHoleVisitor{
  184. ProxyName: sv.cfg.ServerName,
  185. SignKey: util.GetAuthKey(sv.cfg.Sk, now),
  186. Timestamp: now,
  187. }
  188. err = msg.WriteMsg(visitorConn, natHoleVisitorMsg)
  189. if err != nil {
  190. sv.Warn("send natHoleVisitorMsg to server error: %v", err)
  191. return
  192. }
  193. // Wait for client address at most 10 seconds.
  194. var natHoleRespMsg msg.NatHoleResp
  195. visitorConn.SetReadDeadline(time.Now().Add(10 * time.Second))
  196. buf := pool.GetBuf(1024)
  197. n, err := visitorConn.Read(buf)
  198. if err != nil {
  199. sv.Warn("get natHoleRespMsg error: %v", err)
  200. return
  201. }
  202. err = msg.ReadMsgInto(bytes.NewReader(buf[:n]), &natHoleRespMsg)
  203. if err != nil {
  204. sv.Warn("get natHoleRespMsg error: %v", err)
  205. return
  206. }
  207. visitorConn.SetReadDeadline(time.Time{})
  208. pool.PutBuf(buf)
  209. if natHoleRespMsg.Error != "" {
  210. sv.Error("natHoleRespMsg get error info: %s", natHoleRespMsg.Error)
  211. return
  212. }
  213. sv.Trace("get natHoleRespMsg, sid [%s], client address [%s]", natHoleRespMsg.Sid, natHoleRespMsg.ClientAddr)
  214. // Close visitorConn, so we can use it's local address.
  215. visitorConn.Close()
  216. // Send detect message.
  217. array := strings.Split(natHoleRespMsg.ClientAddr, ":")
  218. if len(array) <= 1 {
  219. sv.Error("get natHoleResp client address error: %s", natHoleRespMsg.ClientAddr)
  220. return
  221. }
  222. laddr, _ := net.ResolveUDPAddr("udp", visitorConn.LocalAddr().String())
  223. /*
  224. for i := 1000; i < 65000; i++ {
  225. sv.sendDetectMsg(array[0], int64(i), laddr, "a")
  226. }
  227. */
  228. port, err := strconv.ParseInt(array[1], 10, 64)
  229. if err != nil {
  230. sv.Error("get natHoleResp client address error: %s", natHoleRespMsg.ClientAddr)
  231. return
  232. }
  233. sv.sendDetectMsg(array[0], int(port), laddr, []byte(natHoleRespMsg.Sid))
  234. sv.Trace("send all detect msg done")
  235. // Listen for visitorConn's address and wait for client connection.
  236. lConn, err := net.ListenUDP("udp", laddr)
  237. if err != nil {
  238. sv.Error("listen on visitorConn's local adress error: %v", err)
  239. return
  240. }
  241. lConn.SetReadDeadline(time.Now().Add(5 * time.Second))
  242. sidBuf := pool.GetBuf(1024)
  243. n, _, err = lConn.ReadFromUDP(sidBuf)
  244. if err != nil {
  245. sv.Warn("get sid from client error: %v", err)
  246. return
  247. }
  248. lConn.SetReadDeadline(time.Time{})
  249. if string(sidBuf[:n]) != natHoleRespMsg.Sid {
  250. sv.Warn("incorrect sid from client")
  251. return
  252. }
  253. sv.Info("nat hole connection make success, sid [%s]", string(sidBuf[:n]))
  254. pool.PutBuf(sidBuf)
  255. var remote io.ReadWriteCloser
  256. remote, err = frpNet.NewKcpConnFromUdp(lConn, false, natHoleRespMsg.ClientAddr)
  257. if err != nil {
  258. sv.Error("create kcp connection from udp connection error: %v", err)
  259. return
  260. }
  261. if sv.cfg.UseEncryption {
  262. remote, err = frpIo.WithEncryption(remote, []byte(sv.cfg.Sk))
  263. if err != nil {
  264. sv.Error("create encryption stream error: %v", err)
  265. return
  266. }
  267. }
  268. if sv.cfg.UseCompression {
  269. remote = frpIo.WithCompression(remote)
  270. }
  271. frpIo.Join(userConn, remote)
  272. sv.Debug("join connections closed")
  273. }
  274. func (sv *XtcpVisitor) sendDetectMsg(addr string, port int, laddr *net.UDPAddr, content []byte) (err error) {
  275. daddr, err := net.ResolveUDPAddr("udp", fmt.Sprintf("%s:%d", addr, port))
  276. if err != nil {
  277. return err
  278. }
  279. tConn, err := net.DialUDP("udp", laddr, daddr)
  280. if err != nil {
  281. return err
  282. }
  283. uConn := ipv4.NewConn(tConn)
  284. uConn.SetTTL(3)
  285. tConn.Write(content)
  286. tConn.Close()
  287. return nil
  288. }