visitor.go 8.2 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357
  1. // Copyright 2017 fatedier, fatedier@gmail.com
  2. //
  3. // Licensed under the Apache License, Version 2.0 (the "License");
  4. // you may not use this file except in compliance with the License.
  5. // You may obtain a copy of the License at
  6. //
  7. // http://www.apache.org/licenses/LICENSE-2.0
  8. //
  9. // Unless required by applicable law or agreed to in writing, software
  10. // distributed under the License is distributed on an "AS IS" BASIS,
  11. // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  12. // See the License for the specific language governing permissions and
  13. // limitations under the License.
  14. package client
  15. import (
  16. "bytes"
  17. "fmt"
  18. "io"
  19. "io/ioutil"
  20. "net"
  21. "strconv"
  22. "strings"
  23. "sync"
  24. "time"
  25. "golang.org/x/net/ipv4"
  26. "github.com/fatedier/frp/g"
  27. "github.com/fatedier/frp/models/config"
  28. "github.com/fatedier/frp/models/msg"
  29. "github.com/fatedier/frp/utils/log"
  30. frpNet "github.com/fatedier/frp/utils/net"
  31. "github.com/fatedier/frp/utils/util"
  32. frpIo "github.com/fatedier/golib/io"
  33. "github.com/fatedier/golib/pool"
  34. fmux "github.com/hashicorp/yamux"
  35. )
  36. // Visitor is used for forward traffics from local port tot remote service.
  37. type Visitor interface {
  38. Run() error
  39. Close()
  40. log.Logger
  41. }
  42. func NewVisitor(ctl *Control, cfg config.VisitorConf) (visitor Visitor) {
  43. baseVisitor := BaseVisitor{
  44. ctl: ctl,
  45. Logger: log.NewPrefixLogger(cfg.GetBaseInfo().ProxyName),
  46. }
  47. switch cfg := cfg.(type) {
  48. case *config.StcpVisitorConf:
  49. visitor = &StcpVisitor{
  50. BaseVisitor: &baseVisitor,
  51. cfg: cfg,
  52. }
  53. case *config.XtcpVisitorConf:
  54. visitor = &XtcpVisitor{
  55. BaseVisitor: &baseVisitor,
  56. cfg: cfg,
  57. }
  58. }
  59. return
  60. }
  61. type BaseVisitor struct {
  62. ctl *Control
  63. l frpNet.Listener
  64. closed bool
  65. mu sync.RWMutex
  66. log.Logger
  67. }
  68. type StcpVisitor struct {
  69. *BaseVisitor
  70. cfg *config.StcpVisitorConf
  71. }
  72. func (sv *StcpVisitor) Run() (err error) {
  73. sv.l, err = frpNet.ListenTcp(sv.cfg.BindAddr, sv.cfg.BindPort)
  74. if err != nil {
  75. return
  76. }
  77. go sv.worker()
  78. return
  79. }
  80. func (sv *StcpVisitor) Close() {
  81. sv.l.Close()
  82. }
  83. func (sv *StcpVisitor) worker() {
  84. for {
  85. conn, err := sv.l.Accept()
  86. if err != nil {
  87. sv.Warn("stcp local listener closed")
  88. return
  89. }
  90. go sv.handleConn(conn)
  91. }
  92. }
  93. func (sv *StcpVisitor) handleConn(userConn frpNet.Conn) {
  94. defer userConn.Close()
  95. sv.Debug("get a new stcp user connection")
  96. visitorConn, err := sv.ctl.connectServer()
  97. if err != nil {
  98. return
  99. }
  100. defer visitorConn.Close()
  101. now := time.Now().Unix()
  102. newVisitorConnMsg := &msg.NewVisitorConn{
  103. ProxyName: sv.cfg.ServerName,
  104. SignKey: util.GetAuthKey(sv.cfg.Sk, now),
  105. Timestamp: now,
  106. UseEncryption: sv.cfg.UseEncryption,
  107. UseCompression: sv.cfg.UseCompression,
  108. }
  109. err = msg.WriteMsg(visitorConn, newVisitorConnMsg)
  110. if err != nil {
  111. sv.Warn("send newVisitorConnMsg to server error: %v", err)
  112. return
  113. }
  114. var newVisitorConnRespMsg msg.NewVisitorConnResp
  115. visitorConn.SetReadDeadline(time.Now().Add(10 * time.Second))
  116. err = msg.ReadMsgInto(visitorConn, &newVisitorConnRespMsg)
  117. if err != nil {
  118. sv.Warn("get newVisitorConnRespMsg error: %v", err)
  119. return
  120. }
  121. visitorConn.SetReadDeadline(time.Time{})
  122. if newVisitorConnRespMsg.Error != "" {
  123. sv.Warn("start new visitor connection error: %s", newVisitorConnRespMsg.Error)
  124. return
  125. }
  126. var remote io.ReadWriteCloser
  127. remote = visitorConn
  128. if sv.cfg.UseEncryption {
  129. remote, err = frpIo.WithEncryption(remote, []byte(sv.cfg.Sk))
  130. if err != nil {
  131. sv.Error("create encryption stream error: %v", err)
  132. return
  133. }
  134. }
  135. if sv.cfg.UseCompression {
  136. remote = frpIo.WithCompression(remote)
  137. }
  138. frpIo.Join(userConn, remote)
  139. }
  140. type XtcpVisitor struct {
  141. *BaseVisitor
  142. cfg *config.XtcpVisitorConf
  143. }
  144. func (sv *XtcpVisitor) Run() (err error) {
  145. sv.l, err = frpNet.ListenTcp(sv.cfg.BindAddr, sv.cfg.BindPort)
  146. if err != nil {
  147. return
  148. }
  149. go sv.worker()
  150. return
  151. }
  152. func (sv *XtcpVisitor) Close() {
  153. sv.l.Close()
  154. }
  155. func (sv *XtcpVisitor) worker() {
  156. for {
  157. conn, err := sv.l.Accept()
  158. if err != nil {
  159. sv.Warn("xtcp local listener closed")
  160. return
  161. }
  162. go sv.handleConn(conn)
  163. }
  164. }
  165. func (sv *XtcpVisitor) handleConn(userConn frpNet.Conn) {
  166. defer userConn.Close()
  167. sv.Debug("get a new xtcp user connection")
  168. if g.GlbClientCfg.ServerUdpPort == 0 {
  169. sv.Error("xtcp is not supported by server")
  170. return
  171. }
  172. raddr, err := net.ResolveUDPAddr("udp",
  173. fmt.Sprintf("%s:%d", g.GlbClientCfg.ServerAddr, g.GlbClientCfg.ServerUdpPort))
  174. if err != nil {
  175. sv.Error("resolve server UDP addr error")
  176. return
  177. }
  178. visitorConn, err := net.DialUDP("udp", nil, raddr)
  179. if err != nil {
  180. sv.Warn("dial server udp addr error: %v", err)
  181. return
  182. }
  183. defer visitorConn.Close()
  184. now := time.Now().Unix()
  185. natHoleVisitorMsg := &msg.NatHoleVisitor{
  186. ProxyName: sv.cfg.ServerName,
  187. SignKey: util.GetAuthKey(sv.cfg.Sk, now),
  188. Timestamp: now,
  189. }
  190. err = msg.WriteMsg(visitorConn, natHoleVisitorMsg)
  191. if err != nil {
  192. sv.Warn("send natHoleVisitorMsg to server error: %v", err)
  193. return
  194. }
  195. // Wait for client address at most 10 seconds.
  196. var natHoleRespMsg msg.NatHoleResp
  197. visitorConn.SetReadDeadline(time.Now().Add(10 * time.Second))
  198. buf := pool.GetBuf(1024)
  199. n, err := visitorConn.Read(buf)
  200. if err != nil {
  201. sv.Warn("get natHoleRespMsg error: %v", err)
  202. return
  203. }
  204. err = msg.ReadMsgInto(bytes.NewReader(buf[:n]), &natHoleRespMsg)
  205. if err != nil {
  206. sv.Warn("get natHoleRespMsg error: %v", err)
  207. return
  208. }
  209. visitorConn.SetReadDeadline(time.Time{})
  210. pool.PutBuf(buf)
  211. if natHoleRespMsg.Error != "" {
  212. sv.Error("natHoleRespMsg get error info: %s", natHoleRespMsg.Error)
  213. return
  214. }
  215. sv.Trace("get natHoleRespMsg, sid [%s], client address [%s]", natHoleRespMsg.Sid, natHoleRespMsg.ClientAddr)
  216. // Close visitorConn, so we can use it's local address.
  217. visitorConn.Close()
  218. // Send detect message.
  219. array := strings.Split(natHoleRespMsg.ClientAddr, ":")
  220. if len(array) <= 1 {
  221. sv.Error("get natHoleResp client address error: %s", natHoleRespMsg.ClientAddr)
  222. return
  223. }
  224. laddr, _ := net.ResolveUDPAddr("udp", visitorConn.LocalAddr().String())
  225. /*
  226. for i := 1000; i < 65000; i++ {
  227. sv.sendDetectMsg(array[0], int64(i), laddr, "a")
  228. }
  229. */
  230. port, err := strconv.ParseInt(array[1], 10, 64)
  231. if err != nil {
  232. sv.Error("get natHoleResp client address error: %s", natHoleRespMsg.ClientAddr)
  233. return
  234. }
  235. sv.sendDetectMsg(array[0], int(port), laddr, []byte(natHoleRespMsg.Sid))
  236. sv.Trace("send all detect msg done")
  237. // Listen for visitorConn's address and wait for client connection.
  238. lConn, err := net.ListenUDP("udp", laddr)
  239. if err != nil {
  240. sv.Error("listen on visitorConn's local adress error: %v", err)
  241. return
  242. }
  243. defer lConn.Close()
  244. lConn.SetReadDeadline(time.Now().Add(5 * time.Second))
  245. sidBuf := pool.GetBuf(1024)
  246. n, _, err = lConn.ReadFromUDP(sidBuf)
  247. if err != nil {
  248. sv.Warn("get sid from client error: %v", err)
  249. return
  250. }
  251. lConn.SetReadDeadline(time.Time{})
  252. if string(sidBuf[:n]) != natHoleRespMsg.Sid {
  253. sv.Warn("incorrect sid from client")
  254. return
  255. }
  256. sv.Info("nat hole connection make success, sid [%s]", string(sidBuf[:n]))
  257. pool.PutBuf(sidBuf)
  258. var remote io.ReadWriteCloser
  259. remote, err = frpNet.NewKcpConnFromUdp(lConn, false, natHoleRespMsg.ClientAddr)
  260. if err != nil {
  261. sv.Error("create kcp connection from udp connection error: %v", err)
  262. return
  263. }
  264. if sv.cfg.UseEncryption {
  265. remote, err = frpIo.WithEncryption(remote, []byte(sv.cfg.Sk))
  266. if err != nil {
  267. sv.Error("create encryption stream error: %v", err)
  268. return
  269. }
  270. }
  271. if sv.cfg.UseCompression {
  272. remote = frpIo.WithCompression(remote)
  273. }
  274. fmuxCfg := fmux.DefaultConfig()
  275. fmuxCfg.KeepAliveInterval = 5 * time.Second
  276. fmuxCfg.LogOutput = ioutil.Discard
  277. sess, err := fmux.Client(remote, fmuxCfg)
  278. if err != nil {
  279. sv.Error("create yamux session error: %v", err)
  280. return
  281. }
  282. defer sess.Close()
  283. muxConn, err := sess.Open()
  284. if err != nil {
  285. sv.Error("open yamux stream error: %v", err)
  286. return
  287. }
  288. frpIo.Join(userConn, muxConn)
  289. sv.Debug("join connections closed")
  290. }
  291. func (sv *XtcpVisitor) sendDetectMsg(addr string, port int, laddr *net.UDPAddr, content []byte) (err error) {
  292. daddr, err := net.ResolveUDPAddr("udp", fmt.Sprintf("%s:%d", addr, port))
  293. if err != nil {
  294. return err
  295. }
  296. tConn, err := net.DialUDP("udp", laddr, daddr)
  297. if err != nil {
  298. return err
  299. }
  300. uConn := ipv4.NewConn(tConn)
  301. uConn.SetTTL(3)
  302. tConn.Write(content)
  303. tConn.Close()
  304. return nil
  305. }