diff --git a/README.md b/README.md index 777a6a59..4748dff2 100644 --- a/README.md +++ b/README.md @@ -1,4 +1,4 @@ -gost 2.0 - GO Simple Tunnel +gost - GO Simple Tunnel ==== ### GO语言实现的安全隧道 @@ -15,7 +15,25 @@ gost 2.0 - GO Simple Tunnel Google讨论组: https://groups.google.com/d/forum/go-gost -在gost 2.0中,没有了客户端-服务器的概念,gost与其他代理服务都被看作是代理节点(proxy node),gost可以自己处理请求,或者将请求转发给任意一个或多个代理节点。 +在gost中,gost与其他代理服务都被看作是代理节点(proxy node),gost可以自己处理请求,或者将请求转发给任意一个或多个代理节点。 + +#### 参数说明 + +-L和-F参数格式:[scheme://][user:pass@host]:port + +scheme分为两部分: protocol - 代理协议类型(http, socks5, shadowsocks), transport - 数据传输方式(tcp, websocket, tls)。 + +> http - 作为标准http代理: http://:8080 + +> http+tls - 作为http代理,使用tls传输数据: http+tls://:8080 + +> socks - 作为标准socks5代理: socks://:8080 + +> socks+ws -作为socks5代理,使用websocket传输数据: socks+ws://:8080 + +> tls - 作为http/socks5代理,使用tls传输数据: tls://:8080 + +> ss - 作为shadowsocks服务,ss://aes-256-cfb:123456@:8080 #### 使用方法 @@ -34,23 +52,9 @@ gost -L=admin:123456@localhost:8080 * 多端口监听 ```bash -gost -L=http://localhost:8080 -L=socks://localhost:8081 +gost -L=http://localhost:8080 -L=socks://localhost:8081 -L=ss://aes-256-cfb:123456@:8082 ``` --L参数格式:[scheme://][user:pass@host]:port - -scheme分为两部分: protocol - 代理协议类型(http, socks5, shadowsocks), transport - 数据传输方式(tcp, websocket, tls)。 - -> http - 作为http代理: http://:8080 - -> http+tls - 作为http代理,使用tls传输数据: http+tls://:8080 - -> socks - 作为socks5代理: socks://:8080 - -> socks+ws -作为socks5代理,使用websocket传输数据: socks+ws://:8080 - - - ##### 设置转发代理 @@ -60,14 +64,14 @@ gost -L=:8080 -F=192.168.1.1:8081 * 转发代理认证 ```bash -gost -L=:8080 -F=admin:123456@192.168.1.1:8081 +gost -L=:8080 -F=http://admin:123456@192.168.1.1:8081 ``` ##### 设置多个转发代理(转发链) ```bash -gost -L=:8080 -F=http://192.168.1.1:8081 -F socks://192.168.1.2:8082 -F=··· -F=a.b.c.d:NNNN +gost -L=:8080 -F=http+tls://192.168.1.1:8081 -F socks+ws://192.168.1.2:8082 -F=··· -F=a.b.c.d:NNNN ``` gost通过转发链按照-F设置顺序将请求最终转发给a.b.c.d:NNNN处理,每一个转发代理可以是任意一种类型的代理(http/socks5) diff --git a/conn.go b/conn.go index 3f3d64f5..cefeb561 100644 --- a/conn.go +++ b/conn.go @@ -91,6 +91,7 @@ func handleConn(conn net.Conn, arg Args) { switch arg.Protocol { case "ss": // shadowsocks + handleShadow(conn, arg) return case "http": req, err := http.ReadRequest(bufio.NewReader(conn)) @@ -253,7 +254,11 @@ exit: func forward(conn net.Conn, arg Args) (net.Conn, error) { var err error if glog.V(LINFO) { - glog.Infof("forward: %s/%s %s", arg.Protocol, arg.Transport, arg.Addr) + proto := arg.Protocol + if proto == "default" { + proto = "http" // default is http + } + glog.Infof("forward: %s/%s %s", proto, arg.Transport, arg.Addr) } switch arg.Transport { case "ws": // websocket connection diff --git a/ss.go b/ss.go new file mode 100644 index 00000000..c8560b29 --- /dev/null +++ b/ss.go @@ -0,0 +1,128 @@ +package main + +import ( + "encoding/binary" + "fmt" + "github.com/ginuerzh/gosocks5" + "github.com/golang/glog" + "github.com/shadowsocks/shadowsocks-go/shadowsocks" + "io" + "net" +) + +func handleShadow(conn net.Conn, arg Args) { + if arg.User != nil { + method := arg.User.Username() + password, _ := arg.User.Password() + cipher, err := shadowsocks.NewCipher(method, password) + if err != nil { + if glog.V(LWARNING) { + glog.Warningln("shadowsocks:", err) + } + return + } + conn = shadowsocks.NewConn(conn, cipher) + } + + addr, extra, err := getShadowRequest(conn) + if err != nil { + if glog.V(LWARNING) { + glog.Warningln("shadowsocks:", err) + } + return + } + if glog.V(LINFO) { + glog.Infoln("shadowsocks connect:", addr.String()) + } + sconn, err := Connect(addr.String()) + if err != nil { + if glog.V(LWARNING) { + glog.Warningln("shadowsocks:", err) + } + return + } + defer sconn.Close() + + if extra != nil { + if _, err := sconn.Write(extra); err != nil { + if glog.V(LWARNING) { + glog.Warningln("shadowsocks:", err) + } + return + } + } + + Transport(conn, sconn) +} + +func getShadowRequest(conn net.Conn) (addr *gosocks5.Addr, extra []byte, err error) { + const ( + idType = 0 // address type index + idIP0 = 1 // ip addres start index + idDmLen = 1 // domain address length index + idDm0 = 2 // domain address start index + + typeIPv4 = 1 // type is ipv4 address + typeDm = 3 // type is domain address + typeIPv6 = 4 // type is ipv6 address + + lenIPv4 = 1 + net.IPv4len + 2 // 1addrType + ipv4 + 2port + lenIPv6 = 1 + net.IPv6len + 2 // 1addrType + ipv6 + 2port + lenDmBase = 1 + 1 + 2 // 1addrType + 1addrLen + 2port, plus addrLen + ) + + // buf size should at least have the same size with the largest possible + // request size (when addrType is 3, domain name has at most 256 bytes) + // 1(addrType) + 1(lenByte) + 256(max length address) + 2(port) + buf := make([]byte, 1024) + + var n int + // read till we get possible domain length field + //shadowsocks.SetReadTimeout(conn) + if n, err = io.ReadAtLeast(conn, buf, idDmLen+1); err != nil { + return + } + + addr = &gosocks5.Addr{ + Type: buf[idType], + } + + reqLen := -1 + switch buf[idType] { + case typeIPv4: + reqLen = lenIPv4 + case typeIPv6: + reqLen = lenIPv6 + case typeDm: + reqLen = int(buf[idDmLen]) + lenDmBase + default: + err = fmt.Errorf("addr type %d not supported", buf[idType]) + return + } + + if n < reqLen { // rare case + //ss.SetReadTimeout(conn) + if _, err = io.ReadFull(conn, buf[n:reqLen]); err != nil { + return + } + } else if n > reqLen { + // it's possible to read more than just the request head + extra = buf[reqLen:n] + } + + // Return string for typeIP is not most efficient, but browsers (Chrome, + // Safari, Firefox) all seems using typeDm exclusively. So this is not a + // big problem. + switch buf[idType] { + case typeIPv4: + addr.Host = net.IP(buf[idIP0 : idIP0+net.IPv4len]).String() + case typeIPv6: + addr.Host = net.IP(buf[idIP0 : idIP0+net.IPv6len]).String() + case typeDm: + addr.Host = string(buf[idDm0 : idDm0+buf[idDmLen]]) + } + // parse port + addr.Port = binary.BigEndian.Uint16(buf[reqLen-2 : reqLen]) + + return +} diff --git a/util.go b/util.go index a02cd6ba..732222ee 100644 --- a/util.go +++ b/util.go @@ -92,8 +92,6 @@ type Args struct { Protocol string // protocol: http&socks5/http/socks/socks5/ss, default is http&socks5 Transport string // transport: tcp/ws/tls, default is tcp(raw tcp) User *url.Userinfo - EncMeth string // data encryption method, shadowsocks only - EncPass string // data encryption password, shadowsocks only Cert tls.Certificate // tls certificate } @@ -103,9 +101,8 @@ func (args Args) String() string { authUser = args.User.Username() authPass, _ = args.User.Password() } - return fmt.Sprintf("host: %s, proto: %s, trans: %s, auth: %s:%s, enc: %s:%s", - args.Addr, args.Protocol, args.Transport, authUser, authPass, - args.EncMeth, args.EncPass) + return fmt.Sprintf("host: %s, protocol: %s, transport: %s, auth: %s:%s", + args.Addr, args.Protocol, args.Transport, authUser, authPass) } func parseArgs(ss []string) (args []Args) { @@ -148,15 +145,6 @@ func parseArgs(ss []string) (args []Args) { arg.Transport = "tcp" } - mp := strings.Split(strings.Trim(u.Path, "/"), ":") - if len(mp) == 1 { - arg.EncMeth = mp[0] - } - if len(mp) == 2 { - arg.EncMeth = mp[0] - arg.EncPass = mp[1] - } - args = append(args, arg) }