2023-05-28 16:50:43 +08:00
|
|
|
// Copyright 2023 The frp Authors
|
|
|
|
//
|
|
|
|
// Licensed under the Apache License, Version 2.0 (the "License");
|
|
|
|
// you may not use this file except in compliance with the License.
|
|
|
|
// You may obtain a copy of the License at
|
|
|
|
//
|
|
|
|
// http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
//
|
|
|
|
// Unless required by applicable law or agreed to in writing, software
|
|
|
|
// distributed under the License is distributed on an "AS IS" BASIS,
|
|
|
|
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
|
// See the License for the specific language governing permissions and
|
|
|
|
// limitations under the License.
|
|
|
|
|
|
|
|
package proxy
|
|
|
|
|
|
|
|
import (
|
|
|
|
"io"
|
|
|
|
"net"
|
|
|
|
"time"
|
|
|
|
|
|
|
|
fmux "github.com/hashicorp/yamux"
|
|
|
|
"github.com/quic-go/quic-go"
|
|
|
|
|
|
|
|
"github.com/fatedier/frp/pkg/config"
|
|
|
|
"github.com/fatedier/frp/pkg/msg"
|
|
|
|
"github.com/fatedier/frp/pkg/nathole"
|
|
|
|
plugin "github.com/fatedier/frp/pkg/plugin/client"
|
|
|
|
"github.com/fatedier/frp/pkg/transport"
|
2023-05-29 14:10:34 +08:00
|
|
|
utilnet "github.com/fatedier/frp/pkg/util/net"
|
2023-05-28 16:50:43 +08:00
|
|
|
)
|
|
|
|
|
|
|
|
// XTCP
|
|
|
|
type XTCPProxy struct {
|
|
|
|
*BaseProxy
|
|
|
|
|
|
|
|
cfg *config.XTCPProxyConf
|
|
|
|
proxyPlugin plugin.Plugin
|
|
|
|
}
|
|
|
|
|
|
|
|
func (pxy *XTCPProxy) Run() (err error) {
|
|
|
|
if pxy.cfg.Plugin != "" {
|
|
|
|
pxy.proxyPlugin, err = plugin.Create(pxy.cfg.Plugin, pxy.cfg.PluginParams)
|
|
|
|
if err != nil {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
func (pxy *XTCPProxy) Close() {
|
|
|
|
if pxy.proxyPlugin != nil {
|
|
|
|
pxy.proxyPlugin.Close()
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func (pxy *XTCPProxy) InWorkConn(conn net.Conn, startWorkConnMsg *msg.StartWorkConn) {
|
|
|
|
xl := pxy.xl
|
|
|
|
defer conn.Close()
|
|
|
|
var natHoleSidMsg msg.NatHoleSid
|
|
|
|
err := msg.ReadMsgInto(conn, &natHoleSidMsg)
|
|
|
|
if err != nil {
|
|
|
|
xl.Error("xtcp read from workConn error: %v", err)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
prepareResult, err := nathole.Prepare([]string{pxy.clientCfg.NatHoleSTUNServer})
|
|
|
|
if err != nil {
|
|
|
|
xl.Warn("nathole prepare error: %v", err)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
xl.Info("nathole prepare success, nat type: %s, behavior: %s, addresses: %v, assistedAddresses: %v",
|
|
|
|
prepareResult.NatType, prepareResult.Behavior, prepareResult.Addrs, prepareResult.AssistedAddrs)
|
|
|
|
defer prepareResult.ListenConn.Close()
|
|
|
|
|
|
|
|
// send NatHoleClient msg to server
|
|
|
|
transactionID := nathole.NewTransactionID()
|
|
|
|
natHoleClientMsg := &msg.NatHoleClient{
|
|
|
|
TransactionID: transactionID,
|
|
|
|
ProxyName: pxy.cfg.ProxyName,
|
|
|
|
Sid: natHoleSidMsg.Sid,
|
|
|
|
MappedAddrs: prepareResult.Addrs,
|
|
|
|
AssistedAddrs: prepareResult.AssistedAddrs,
|
|
|
|
}
|
|
|
|
|
|
|
|
natHoleRespMsg, err := nathole.ExchangeInfo(pxy.ctx, pxy.msgTransporter, transactionID, natHoleClientMsg, 5*time.Second)
|
|
|
|
if err != nil {
|
|
|
|
xl.Warn("nathole exchange info error: %v", err)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
xl.Info("get natHoleRespMsg, sid [%s], protocol [%s], candidate address %v, assisted address %v, detectBehavior: %+v",
|
|
|
|
natHoleRespMsg.Sid, natHoleRespMsg.Protocol, natHoleRespMsg.CandidateAddrs,
|
|
|
|
natHoleRespMsg.AssistedAddrs, natHoleRespMsg.DetectBehavior)
|
|
|
|
|
|
|
|
listenConn := prepareResult.ListenConn
|
|
|
|
newListenConn, raddr, err := nathole.MakeHole(pxy.ctx, listenConn, natHoleRespMsg, []byte(pxy.cfg.Sk))
|
|
|
|
if err != nil {
|
|
|
|
listenConn.Close()
|
|
|
|
xl.Warn("make hole error: %v", err)
|
|
|
|
_ = pxy.msgTransporter.Send(&msg.NatHoleReport{
|
|
|
|
Sid: natHoleRespMsg.Sid,
|
|
|
|
Success: false,
|
|
|
|
})
|
|
|
|
return
|
|
|
|
}
|
|
|
|
listenConn = newListenConn
|
|
|
|
xl.Info("establishing nat hole connection successful, sid [%s], remoteAddr [%s]", natHoleRespMsg.Sid, raddr)
|
|
|
|
|
|
|
|
_ = pxy.msgTransporter.Send(&msg.NatHoleReport{
|
|
|
|
Sid: natHoleRespMsg.Sid,
|
|
|
|
Success: true,
|
|
|
|
})
|
|
|
|
|
|
|
|
if natHoleRespMsg.Protocol == "kcp" {
|
|
|
|
pxy.listenByKCP(listenConn, raddr, startWorkConnMsg)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
// default is quic
|
|
|
|
pxy.listenByQUIC(listenConn, raddr, startWorkConnMsg)
|
|
|
|
}
|
|
|
|
|
|
|
|
func (pxy *XTCPProxy) listenByKCP(listenConn *net.UDPConn, raddr *net.UDPAddr, startWorkConnMsg *msg.StartWorkConn) {
|
|
|
|
xl := pxy.xl
|
|
|
|
listenConn.Close()
|
|
|
|
laddr, _ := net.ResolveUDPAddr("udp", listenConn.LocalAddr().String())
|
|
|
|
lConn, err := net.DialUDP("udp", laddr, raddr)
|
|
|
|
if err != nil {
|
|
|
|
xl.Warn("dial udp error: %v", err)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
defer lConn.Close()
|
|
|
|
|
2023-05-29 14:10:34 +08:00
|
|
|
remote, err := utilnet.NewKCPConnFromUDP(lConn, true, raddr.String())
|
2023-05-28 16:50:43 +08:00
|
|
|
if err != nil {
|
|
|
|
xl.Warn("create kcp connection from udp connection error: %v", err)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
fmuxCfg := fmux.DefaultConfig()
|
|
|
|
fmuxCfg.KeepAliveInterval = 10 * time.Second
|
|
|
|
fmuxCfg.MaxStreamWindowSize = 2 * 1024 * 1024
|
|
|
|
fmuxCfg.LogOutput = io.Discard
|
|
|
|
session, err := fmux.Server(remote, fmuxCfg)
|
|
|
|
if err != nil {
|
|
|
|
xl.Error("create mux session error: %v", err)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
defer session.Close()
|
|
|
|
|
|
|
|
for {
|
|
|
|
muxConn, err := session.Accept()
|
|
|
|
if err != nil {
|
|
|
|
xl.Error("accept connection error: %v", err)
|
|
|
|
return
|
|
|
|
}
|
2023-05-30 20:25:22 +08:00
|
|
|
go HandleTCPWorkConnection(pxy.ctx, &pxy.cfg.LocalSvrConf, pxy.proxyPlugin, pxy.cfg.GetBaseConfig(), pxy.limiter,
|
2023-05-28 16:50:43 +08:00
|
|
|
muxConn, []byte(pxy.cfg.Sk), startWorkConnMsg)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func (pxy *XTCPProxy) listenByQUIC(listenConn *net.UDPConn, _ *net.UDPAddr, startWorkConnMsg *msg.StartWorkConn) {
|
|
|
|
xl := pxy.xl
|
|
|
|
defer listenConn.Close()
|
|
|
|
|
|
|
|
tlsConfig, err := transport.NewServerTLSConfig("", "", "")
|
|
|
|
if err != nil {
|
|
|
|
xl.Warn("create tls config error: %v", err)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
tlsConfig.NextProtos = []string{"frp"}
|
|
|
|
quicListener, err := quic.Listen(listenConn, tlsConfig,
|
|
|
|
&quic.Config{
|
|
|
|
MaxIdleTimeout: time.Duration(pxy.clientCfg.QUICMaxIdleTimeout) * time.Second,
|
|
|
|
MaxIncomingStreams: int64(pxy.clientCfg.QUICMaxIncomingStreams),
|
|
|
|
KeepAlivePeriod: time.Duration(pxy.clientCfg.QUICKeepalivePeriod) * time.Second,
|
|
|
|
},
|
|
|
|
)
|
|
|
|
if err != nil {
|
|
|
|
xl.Warn("dial quic error: %v", err)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
// only accept one connection from raddr
|
|
|
|
c, err := quicListener.Accept(pxy.ctx)
|
|
|
|
if err != nil {
|
|
|
|
xl.Error("quic accept connection error: %v", err)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
for {
|
|
|
|
stream, err := c.AcceptStream(pxy.ctx)
|
|
|
|
if err != nil {
|
|
|
|
xl.Debug("quic accept stream error: %v", err)
|
|
|
|
_ = c.CloseWithError(0, "")
|
|
|
|
return
|
|
|
|
}
|
2023-05-30 20:25:22 +08:00
|
|
|
go HandleTCPWorkConnection(pxy.ctx, &pxy.cfg.LocalSvrConf, pxy.proxyPlugin, pxy.cfg.GetBaseConfig(), pxy.limiter,
|
2023-05-29 14:10:34 +08:00
|
|
|
utilnet.QuicStreamToNetConn(stream, c), []byte(pxy.cfg.Sk), startWorkConnMsg)
|
2023-05-28 16:50:43 +08:00
|
|
|
}
|
|
|
|
}
|