123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322 |
- // Copyright 2017 fatedier, fatedier@gmail.com
- //
- // Licensed under the Apache License, Version 2.0 (the "License");
- // you may not use this file except in compliance with the License.
- // You may obtain a copy of the License at
- //
- // http://www.apache.org/licenses/LICENSE-2.0
- //
- // Unless required by applicable law or agreed to in writing, software
- // distributed under the License is distributed on an "AS IS" BASIS,
- // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
- // See the License for the specific language governing permissions and
- // limitations under the License.
- package client
- import (
- "bytes"
- "fmt"
- "io"
- "net"
- "strconv"
- "strings"
- "sync"
- "time"
- "golang.org/x/net/ipv4"
- "github.com/fatedier/frp/models/config"
- "github.com/fatedier/frp/models/msg"
- frpIo "github.com/fatedier/frp/utils/io"
- "github.com/fatedier/frp/utils/log"
- frpNet "github.com/fatedier/frp/utils/net"
- "github.com/fatedier/frp/utils/pool"
- "github.com/fatedier/frp/utils/util"
- )
- // Visitor is used for forward traffics from local port tot remote service.
- type Visitor interface {
- Run() error
- Close()
- log.Logger
- }
- func NewVisitor(ctl *Control, pxyConf config.ProxyConf) (visitor Visitor) {
- baseVisitor := BaseVisitor{
- ctl: ctl,
- Logger: log.NewPrefixLogger(pxyConf.GetName()),
- }
- switch cfg := pxyConf.(type) {
- case *config.StcpProxyConf:
- visitor = &StcpVisitor{
- BaseVisitor: baseVisitor,
- cfg: cfg,
- }
- case *config.XtcpProxyConf:
- visitor = &XtcpVisitor{
- BaseVisitor: baseVisitor,
- cfg: cfg,
- }
- }
- return
- }
- type BaseVisitor struct {
- ctl *Control
- l frpNet.Listener
- closed bool
- mu sync.RWMutex
- log.Logger
- }
- type StcpVisitor struct {
- BaseVisitor
- cfg *config.StcpProxyConf
- }
- func (sv *StcpVisitor) Run() (err error) {
- sv.l, err = frpNet.ListenTcp(sv.cfg.BindAddr, sv.cfg.BindPort)
- if err != nil {
- return
- }
- go sv.worker()
- return
- }
- func (sv *StcpVisitor) Close() {
- sv.l.Close()
- }
- func (sv *StcpVisitor) worker() {
- for {
- conn, err := sv.l.Accept()
- if err != nil {
- sv.Warn("stcp local listener closed")
- return
- }
- go sv.handleConn(conn)
- }
- }
- func (sv *StcpVisitor) handleConn(userConn frpNet.Conn) {
- defer userConn.Close()
- sv.Debug("get a new stcp user connection")
- visitorConn, err := sv.ctl.connectServer()
- if err != nil {
- return
- }
- defer visitorConn.Close()
- now := time.Now().Unix()
- newVisitorConnMsg := &msg.NewVisitorConn{
- ProxyName: sv.cfg.ServerName,
- SignKey: util.GetAuthKey(sv.cfg.Sk, now),
- Timestamp: now,
- UseEncryption: sv.cfg.UseEncryption,
- UseCompression: sv.cfg.UseCompression,
- }
- err = msg.WriteMsg(visitorConn, newVisitorConnMsg)
- if err != nil {
- sv.Warn("send newVisitorConnMsg to server error: %v", err)
- return
- }
- var newVisitorConnRespMsg msg.NewVisitorConnResp
- visitorConn.SetReadDeadline(time.Now().Add(10 * time.Second))
- err = msg.ReadMsgInto(visitorConn, &newVisitorConnRespMsg)
- if err != nil {
- sv.Warn("get newVisitorConnRespMsg error: %v", err)
- return
- }
- visitorConn.SetReadDeadline(time.Time{})
- if newVisitorConnRespMsg.Error != "" {
- sv.Warn("start new visitor connection error: %s", newVisitorConnRespMsg.Error)
- return
- }
- var remote io.ReadWriteCloser
- remote = visitorConn
- if sv.cfg.UseEncryption {
- remote, err = frpIo.WithEncryption(remote, []byte(sv.cfg.Sk))
- if err != nil {
- sv.Error("create encryption stream error: %v", err)
- return
- }
- }
- if sv.cfg.UseCompression {
- remote = frpIo.WithCompression(remote)
- }
- frpIo.Join(userConn, remote)
- }
- type XtcpVisitor struct {
- BaseVisitor
- cfg *config.XtcpProxyConf
- }
- func (sv *XtcpVisitor) Run() (err error) {
- sv.l, err = frpNet.ListenTcp(sv.cfg.BindAddr, sv.cfg.BindPort)
- if err != nil {
- return
- }
- go sv.worker()
- return
- }
- func (sv *XtcpVisitor) Close() {
- sv.l.Close()
- }
- func (sv *XtcpVisitor) worker() {
- for {
- conn, err := sv.l.Accept()
- if err != nil {
- sv.Warn("stcp local listener closed")
- return
- }
- go sv.handleConn(conn)
- }
- }
- func (sv *XtcpVisitor) handleConn(userConn frpNet.Conn) {
- defer userConn.Close()
- sv.Debug("get a new xtcp user connection")
- if config.ClientCommonCfg.ServerUdpPort == 0 {
- sv.Error("xtcp is not supported by server")
- return
- }
- raddr, err := net.ResolveUDPAddr("udp",
- fmt.Sprintf("%s:%d", config.ClientCommonCfg.ServerAddr, config.ClientCommonCfg.ServerUdpPort))
- visitorConn, err := net.DialUDP("udp", nil, raddr)
- defer visitorConn.Close()
- now := time.Now().Unix()
- natHoleVisitorMsg := &msg.NatHoleVisitor{
- ProxyName: sv.cfg.ServerName,
- SignKey: util.GetAuthKey(sv.cfg.Sk, now),
- Timestamp: now,
- }
- err = msg.WriteMsg(visitorConn, natHoleVisitorMsg)
- if err != nil {
- sv.Warn("send natHoleVisitorMsg to server error: %v", err)
- return
- }
- // Wait for client address at most 10 seconds.
- var natHoleRespMsg msg.NatHoleResp
- visitorConn.SetReadDeadline(time.Now().Add(10 * time.Second))
- buf := pool.GetBuf(1024)
- n, err := visitorConn.Read(buf)
- if err != nil {
- sv.Warn("get natHoleRespMsg error: %v", err)
- return
- }
- err = msg.ReadMsgInto(bytes.NewReader(buf[:n]), &natHoleRespMsg)
- if err != nil {
- sv.Warn("get natHoleRespMsg error: %v", err)
- return
- }
- visitorConn.SetReadDeadline(time.Time{})
- pool.PutBuf(buf)
- sv.Trace("get natHoleRespMsg, sid [%s], client address [%s]", natHoleRespMsg.Sid, natHoleRespMsg.ClientAddr)
- // Close visitorConn, so we can use it's local address.
- visitorConn.Close()
- // Send detect message.
- array := strings.Split(natHoleRespMsg.ClientAddr, ":")
- if len(array) <= 1 {
- sv.Error("get natHoleResp client address error: %s", natHoleRespMsg.ClientAddr)
- return
- }
- laddr, _ := net.ResolveUDPAddr("udp", visitorConn.LocalAddr().String())
- /*
- for i := 1000; i < 65000; i++ {
- sv.sendDetectMsg(array[0], int64(i), laddr, "a")
- }
- */
- port, err := strconv.ParseInt(array[1], 10, 64)
- if err != nil {
- sv.Error("get natHoleResp client address error: %s", natHoleRespMsg.ClientAddr)
- return
- }
- sv.sendDetectMsg(array[0], int(port), laddr, []byte(natHoleRespMsg.Sid))
- sv.Trace("send all detect msg done")
- // Listen for visitorConn's address and wait for client connection.
- lConn, err := net.ListenUDP("udp", laddr)
- if err != nil {
- sv.Error("listen on visitorConn's local adress error: %v", err)
- return
- }
- lConn.SetReadDeadline(time.Now().Add(5 * time.Second))
- sidBuf := pool.GetBuf(1024)
- n, _, err = lConn.ReadFromUDP(sidBuf)
- if err != nil {
- sv.Warn("get sid from client error: %v", err)
- return
- }
- lConn.SetReadDeadline(time.Time{})
- if string(sidBuf[:n]) != natHoleRespMsg.Sid {
- sv.Warn("incorrect sid from client")
- return
- }
- sv.Info("nat hole connection make success, sid [%s]", string(sidBuf[:n]))
- pool.PutBuf(sidBuf)
- var remote io.ReadWriteCloser
- remote, err = frpNet.NewKcpConnFromUdp(lConn, false, natHoleRespMsg.ClientAddr)
- if err != nil {
- sv.Error("create kcp connection from udp connection error: %v", err)
- return
- }
- if sv.cfg.UseEncryption {
- remote, err = frpIo.WithEncryption(remote, []byte(sv.cfg.Sk))
- if err != nil {
- sv.Error("create encryption stream error: %v", err)
- return
- }
- }
- if sv.cfg.UseCompression {
- remote = frpIo.WithCompression(remote)
- }
- frpIo.Join(userConn, remote)
- sv.Debug("join connections closed")
- }
- func (sv *XtcpVisitor) sendDetectMsg(addr string, port int, laddr *net.UDPAddr, content []byte) (err error) {
- daddr, err := net.ResolveUDPAddr("udp", fmt.Sprintf("%s:%d", addr, port))
- if err != nil {
- return err
- }
- tConn, err := net.DialUDP("udp", laddr, daddr)
- if err != nil {
- return err
- }
- uConn := ipv4.NewConn(tConn)
- uConn.SetTTL(3)
- tConn.Write(content)
- tConn.Close()
- return nil
- }
|