vtun/dtls/dtlsclient.go
NNdroid 7c8048e7c2 add utls support
add dtls support
2023-05-30 14:12:39 +08:00

109 lines
2.6 KiB
Go

package dtls
import (
"github.com/pion/dtls"
"log"
"net"
"time"
"github.com/golang/snappy"
"github.com/net-byte/vtun/common/cache"
"github.com/net-byte/vtun/common/cipher"
"github.com/net-byte/vtun/common/config"
"github.com/net-byte/vtun/common/counter"
"github.com/net-byte/vtun/common/netutil"
"github.com/net-byte/water"
)
// StartClient starts the tls client
func StartClient(iface *water.Interface, config config.Config) {
log.Println("vtun dtls client started")
go tunToTLS(config, iface)
tlsConfig := &dtls.Config{
PSK: func(bytes []byte) ([]byte, error) {
return []byte{0x09, 0x46, 0x59, 0x02, 0x49}, nil
},
PSKIdentityHint: []byte(config.Key),
CipherSuites: []dtls.CipherSuiteID{dtls.TLS_PSK_WITH_AES_128_GCM_SHA256, dtls.TLS_PSK_WITH_AES_128_CCM_8},
ExtendedMasterSecret: dtls.RequireExtendedMasterSecret,
}
if config.TLSSni != "" {
tlsConfig.ServerName = config.TLSSni
}
for {
addr, err := net.ResolveUDPAddr("udp", config.ServerAddr)
if err != nil {
time.Sleep(3 * time.Second)
netutil.PrintErr(err, config.Verbose)
continue
}
conn, err := dtls.Dial("udp", addr, tlsConfig)
if err != nil {
time.Sleep(3 * time.Second)
netutil.PrintErr(err, config.Verbose)
continue
}
cache.GetCache().Set("dtlsconn", conn, 24*time.Hour)
tlsToTun(config, conn, iface)
cache.GetCache().Delete("dtlsconn")
}
}
// tunToTLS sends packets from tun to tls
func tunToTLS(config config.Config, iface *water.Interface) {
packet := make([]byte, config.BufferSize)
for {
n, err := iface.Read(packet)
if err != nil {
netutil.PrintErr(err, config.Verbose)
break
}
if v, ok := cache.GetCache().Get("dtlsconn"); ok {
b := packet[:n]
if config.Obfs {
b = cipher.XOR(b)
}
if config.Compress {
b = snappy.Encode(nil, b)
}
tlsconn := v.(net.Conn)
_, err = tlsconn.Write(b)
if err != nil {
netutil.PrintErr(err, config.Verbose)
continue
}
counter.IncrWrittenBytes(n)
}
}
}
// tlsToTun sends packets from tls to tun
func tlsToTun(config config.Config, tlsconn net.Conn, iface *water.Interface) {
defer tlsconn.Close()
packet := make([]byte, config.BufferSize)
for {
n, err := tlsconn.Read(packet)
if err != nil {
netutil.PrintErr(err, config.Verbose)
break
}
b := packet[:n]
if config.Compress {
b, err = snappy.Decode(nil, b)
if err != nil {
netutil.PrintErr(err, config.Verbose)
break
}
}
if config.Obfs {
b = cipher.XOR(b)
}
_, err = iface.Write(b)
if err != nil {
netutil.PrintErr(err, config.Verbose)
break
}
counter.IncrReadBytes(n)
}
}