package dtls import ( "github.com/pion/dtls" "log" "net" "time" "github.com/golang/snappy" "github.com/net-byte/vtun/common/cache" "github.com/net-byte/vtun/common/cipher" "github.com/net-byte/vtun/common/config" "github.com/net-byte/vtun/common/counter" "github.com/net-byte/vtun/common/netutil" "github.com/net-byte/water" ) // StartClient starts the tls client func StartClient(iface *water.Interface, config config.Config) { log.Println("vtun dtls client started") go tunToTLS(config, iface) tlsConfig := &dtls.Config{ PSK: func(bytes []byte) ([]byte, error) { return []byte{0x09, 0x46, 0x59, 0x02, 0x49}, nil }, PSKIdentityHint: []byte(config.Key), CipherSuites: []dtls.CipherSuiteID{dtls.TLS_PSK_WITH_AES_128_GCM_SHA256, dtls.TLS_PSK_WITH_AES_128_CCM_8}, ExtendedMasterSecret: dtls.RequireExtendedMasterSecret, } if config.TLSSni != "" { tlsConfig.ServerName = config.TLSSni } for { addr, err := net.ResolveUDPAddr("udp", config.ServerAddr) if err != nil { time.Sleep(3 * time.Second) netutil.PrintErr(err, config.Verbose) continue } conn, err := dtls.Dial("udp", addr, tlsConfig) if err != nil { time.Sleep(3 * time.Second) netutil.PrintErr(err, config.Verbose) continue } cache.GetCache().Set("dtlsconn", conn, 24*time.Hour) tlsToTun(config, conn, iface) cache.GetCache().Delete("dtlsconn") } } // tunToTLS sends packets from tun to tls func tunToTLS(config config.Config, iface *water.Interface) { packet := make([]byte, config.BufferSize) for { n, err := iface.Read(packet) if err != nil { netutil.PrintErr(err, config.Verbose) break } if v, ok := cache.GetCache().Get("dtlsconn"); ok { b := packet[:n] if config.Obfs { b = cipher.XOR(b) } if config.Compress { b = snappy.Encode(nil, b) } tlsconn := v.(net.Conn) _, err = tlsconn.Write(b) if err != nil { netutil.PrintErr(err, config.Verbose) continue } counter.IncrWrittenBytes(n) } } } // tlsToTun sends packets from tls to tun func tlsToTun(config config.Config, tlsconn net.Conn, iface *water.Interface) { defer tlsconn.Close() packet := make([]byte, config.BufferSize) for { n, err := tlsconn.Read(packet) if err != nil { netutil.PrintErr(err, config.Verbose) break } b := packet[:n] if config.Compress { b, err = snappy.Decode(nil, b) if err != nil { netutil.PrintErr(err, config.Verbose) break } } if config.Obfs { b = cipher.XOR(b) } _, err = iface.Write(b) if err != nil { netutil.PrintErr(err, config.Verbose) break } counter.IncrReadBytes(n) } }