// Copyright 2017 fatedier, fatedier@gmail.com // // Licensed under the Apache License, Version 2.0 (the "License"); // you may not use this file except in compliance with the License. // You may obtain a copy of the License at // // http://www.apache.org/licenses/LICENSE-2.0 // // Unless required by applicable law or agreed to in writing, software // distributed under the License is distributed on an "AS IS" BASIS, // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. // See the License for the specific language governing permissions and // limitations under the License. package client import ( "bytes" "fmt" "io" "net" "strconv" "strings" "sync" "time" "golang.org/x/net/ipv4" "github.com/fatedier/frp/models/config" "github.com/fatedier/frp/models/msg" frpIo "github.com/fatedier/frp/utils/io" "github.com/fatedier/frp/utils/log" frpNet "github.com/fatedier/frp/utils/net" "github.com/fatedier/frp/utils/pool" "github.com/fatedier/frp/utils/util" ) // Vistor is used for forward traffics from local port tot remote service. type Vistor interface { Run() error Close() log.Logger } func NewVistor(ctl *Control, pxyConf config.ProxyConf) (vistor Vistor) { baseVistor := BaseVistor{ ctl: ctl, Logger: log.NewPrefixLogger(pxyConf.GetName()), } switch cfg := pxyConf.(type) { case *config.StcpProxyConf: vistor = &StcpVistor{ BaseVistor: baseVistor, cfg: cfg, } case *config.XtcpProxyConf: vistor = &XtcpVistor{ BaseVistor: baseVistor, cfg: cfg, } } return } type BaseVistor struct { ctl *Control l frpNet.Listener closed bool mu sync.RWMutex log.Logger } type StcpVistor struct { BaseVistor cfg *config.StcpProxyConf } func (sv *StcpVistor) Run() (err error) { sv.l, err = frpNet.ListenTcp(sv.cfg.BindAddr, int64(sv.cfg.BindPort)) if err != nil { return } go sv.worker() return } func (sv *StcpVistor) Close() { sv.l.Close() } func (sv *StcpVistor) worker() { for { conn, err := sv.l.Accept() if err != nil { sv.Warn("stcp local listener closed") return } go sv.handleConn(conn) } } func (sv *StcpVistor) handleConn(userConn frpNet.Conn) { defer userConn.Close() sv.Debug("get a new stcp user connection") vistorConn, err := sv.ctl.connectServer() if err != nil { return } defer vistorConn.Close() now := time.Now().Unix() newVistorConnMsg := &msg.NewVistorConn{ ProxyName: sv.cfg.ServerName, SignKey: util.GetAuthKey(sv.cfg.Sk, now), Timestamp: now, UseEncryption: sv.cfg.UseEncryption, UseCompression: sv.cfg.UseCompression, } err = msg.WriteMsg(vistorConn, newVistorConnMsg) if err != nil { sv.Warn("send newVistorConnMsg to server error: %v", err) return } var newVistorConnRespMsg msg.NewVistorConnResp vistorConn.SetReadDeadline(time.Now().Add(10 * time.Second)) err = msg.ReadMsgInto(vistorConn, &newVistorConnRespMsg) if err != nil { sv.Warn("get newVistorConnRespMsg error: %v", err) return } vistorConn.SetReadDeadline(time.Time{}) if newVistorConnRespMsg.Error != "" { sv.Warn("start new vistor connection error: %s", newVistorConnRespMsg.Error) return } var remote io.ReadWriteCloser remote = vistorConn if sv.cfg.UseEncryption { remote, err = frpIo.WithEncryption(remote, []byte(sv.cfg.Sk)) if err != nil { sv.Error("create encryption stream error: %v", err) return } } if sv.cfg.UseCompression { remote = frpIo.WithCompression(remote) } frpIo.Join(userConn, remote) } type XtcpVistor struct { BaseVistor cfg *config.XtcpProxyConf } func (sv *XtcpVistor) Run() (err error) { sv.l, err = frpNet.ListenTcp(sv.cfg.BindAddr, int64(sv.cfg.BindPort)) if err != nil { return } go sv.worker() return } func (sv *XtcpVistor) Close() { sv.l.Close() } func (sv *XtcpVistor) worker() { for { conn, err := sv.l.Accept() if err != nil { sv.Warn("stcp local listener closed") return } go sv.handleConn(conn) } } func (sv *XtcpVistor) handleConn(userConn frpNet.Conn) { defer userConn.Close() sv.Debug("get a new xtcp user connection") if config.ClientCommonCfg.ServerUdpPort == 0 { sv.Error("xtcp is not supported by server") return } raddr, err := net.ResolveUDPAddr("udp", fmt.Sprintf("%s:%d", config.ClientCommonCfg.ServerAddr, config.ClientCommonCfg.ServerUdpPort)) vistorConn, err := net.DialUDP("udp", nil, raddr) defer vistorConn.Close() now := time.Now().Unix() natHoleVistorMsg := &msg.NatHoleVistor{ ProxyName: sv.cfg.ServerName, SignKey: util.GetAuthKey(sv.cfg.Sk, now), Timestamp: now, } err = msg.WriteMsg(vistorConn, natHoleVistorMsg) if err != nil { sv.Warn("send natHoleVistorMsg to server error: %v", err) return } // Wait for client address at most 10 seconds. var natHoleRespMsg msg.NatHoleResp vistorConn.SetReadDeadline(time.Now().Add(10 * time.Second)) buf := pool.GetBuf(1024) n, err := vistorConn.Read(buf) if err != nil { sv.Warn("get natHoleRespMsg error: %v", err) return } err = msg.ReadMsgInto(bytes.NewReader(buf[:n]), &natHoleRespMsg) if err != nil { sv.Warn("get natHoleRespMsg error: %v", err) return } vistorConn.SetReadDeadline(time.Time{}) pool.PutBuf(buf) sv.Trace("get natHoleRespMsg, sid [%s], client address [%s]", natHoleRespMsg.Sid, natHoleRespMsg.ClientAddr) // Close vistorConn, so we can use it's local address. vistorConn.Close() // Send detect message. array := strings.Split(natHoleRespMsg.ClientAddr, ":") if len(array) <= 1 { sv.Error("get natHoleResp client address error: %s", natHoleRespMsg.ClientAddr) return } laddr, _ := net.ResolveUDPAddr("udp", vistorConn.LocalAddr().String()) /* for i := 1000; i < 65000; i++ { sv.sendDetectMsg(array[0], int64(i), laddr, "a") } */ port, err := strconv.ParseInt(array[1], 10, 64) if err != nil { sv.Error("get natHoleResp client address error: %s", natHoleRespMsg.ClientAddr) return } sv.sendDetectMsg(array[0], int64(port), laddr, []byte(natHoleRespMsg.Sid)) sv.Trace("send all detect msg done") // Listen for vistorConn's address and wait for client connection. lConn, _ := net.ListenUDP("udp", laddr) lConn.SetReadDeadline(time.Now().Add(5 * time.Second)) sidBuf := pool.GetBuf(1024) n, _, err = lConn.ReadFromUDP(sidBuf) if err != nil { sv.Warn("get sid from client error: %v", err) return } lConn.SetReadDeadline(time.Time{}) if string(sidBuf[:n]) != natHoleRespMsg.Sid { sv.Warn("incorrect sid from client") return } sv.Info("nat hole connection make success, sid [%s]", string(sidBuf[:n])) pool.PutBuf(sidBuf) var remote io.ReadWriteCloser remote, err = frpNet.NewKcpConnFromUdp(lConn, false, natHoleRespMsg.ClientAddr) if err != nil { sv.Error("create kcp connection from udp connection error: %v", err) return } if sv.cfg.UseEncryption { remote, err = frpIo.WithEncryption(remote, []byte(sv.cfg.Sk)) if err != nil { sv.Error("create encryption stream error: %v", err) return } } if sv.cfg.UseCompression { remote = frpIo.WithCompression(remote) } frpIo.Join(userConn, remote) sv.Debug("join connections closed") } func (sv *XtcpVistor) sendDetectMsg(addr string, port int64, laddr *net.UDPAddr, content []byte) (err error) { daddr, err := net.ResolveUDPAddr("udp", fmt.Sprintf("%s:%d", addr, port)) if err != nil { return err } tConn, err := net.DialUDP("udp", laddr, daddr) if err != nil { return err } uConn := ipv4.NewConn(tConn) uConn.SetTTL(3) tConn.Write(content) tConn.Close() return nil }