mirror of
https://github.com/XTLS/Xray-core.git
synced 2024-11-14 02:53:02 +00:00
Merge branch 'main' into dns
This commit is contained in:
commit
f4a048aa0c
@ -18,7 +18,7 @@ import (
|
|||||||
)
|
)
|
||||||
|
|
||||||
var (
|
var (
|
||||||
version = "1.4.1"
|
version = "1.4.2"
|
||||||
build = "Custom"
|
build = "Custom"
|
||||||
codename = "Xray, Penetrates Everything."
|
codename = "Xray, Penetrates Everything."
|
||||||
intro = "A unified platform for anti-censorship."
|
intro = "A unified platform for anti-censorship."
|
||||||
|
@ -90,8 +90,14 @@ func getGrpcClient(ctx context.Context, dest net.Destination, tlsConfig *tls.Con
|
|||||||
dialOption = grpc.WithTransportCredentials(credentials.NewTLS(tlsConfig.GetTLSConfig()))
|
dialOption = grpc.WithTransportCredentials(credentials.NewTLS(tlsConfig.GetTLSConfig()))
|
||||||
}
|
}
|
||||||
|
|
||||||
|
var grpcDestHost string
|
||||||
|
if dest.Address.Family().IsDomain() {
|
||||||
|
grpcDestHost = dest.Address.Domain()
|
||||||
|
} else {
|
||||||
|
grpcDestHost = dest.Address.IP().String()
|
||||||
|
}
|
||||||
conn, err := grpc.Dial(
|
conn, err := grpc.Dial(
|
||||||
gonet.JoinHostPort(dest.Address.String(), dest.Port.String()),
|
gonet.JoinHostPort(grpcDestHost, dest.Port.String()),
|
||||||
dialOption,
|
dialOption,
|
||||||
grpc.WithConnectParams(grpc.ConnectParams{
|
grpc.WithConnectParams(grpc.ConnectParams{
|
||||||
Backoff: backoff.Config{
|
Backoff: backoff.Config{
|
||||||
|
@ -148,7 +148,7 @@ func (s *clientSessions) openConnection(destAddr net.Addr, config *Config, tlsCo
|
|||||||
|
|
||||||
quicConfig := &quic.Config{
|
quicConfig := &quic.Config{
|
||||||
ConnectionIDLength: 12,
|
ConnectionIDLength: 12,
|
||||||
MaxIdleTimeout: time.Second * 30,
|
KeepAlive: true,
|
||||||
}
|
}
|
||||||
|
|
||||||
conn, err := wrapSysConn(rawConn, config)
|
conn, err := wrapSysConn(rawConn, config)
|
||||||
|
@ -103,7 +103,7 @@ func Listen(ctx context.Context, address net.Address, port net.Port, streamSetti
|
|||||||
|
|
||||||
quicConfig := &quic.Config{
|
quicConfig := &quic.Config{
|
||||||
ConnectionIDLength: 12,
|
ConnectionIDLength: 12,
|
||||||
MaxIdleTimeout: time.Second * 45,
|
KeepAlive: true,
|
||||||
MaxIncomingStreams: 32,
|
MaxIncomingStreams: 32,
|
||||||
MaxIncomingUniStreams: -1,
|
MaxIncomingUniStreams: -1,
|
||||||
}
|
}
|
||||||
|
@ -3,8 +3,6 @@ package tcp
|
|||||||
import (
|
import (
|
||||||
"context"
|
"context"
|
||||||
|
|
||||||
utls "github.com/refraction-networking/utls"
|
|
||||||
|
|
||||||
"github.com/xtls/xray-core/common"
|
"github.com/xtls/xray-core/common"
|
||||||
"github.com/xtls/xray-core/common/net"
|
"github.com/xtls/xray-core/common/net"
|
||||||
"github.com/xtls/xray-core/common/session"
|
"github.com/xtls/xray-core/common/session"
|
||||||
@ -24,7 +22,10 @@ func Dial(ctx context.Context, dest net.Destination, streamSettings *internet.Me
|
|||||||
if config := tls.ConfigFromStreamSettings(streamSettings); config != nil {
|
if config := tls.ConfigFromStreamSettings(streamSettings); config != nil {
|
||||||
tlsConfig := config.GetTLSConfig(tls.WithDestination(dest))
|
tlsConfig := config.GetTLSConfig(tls.WithDestination(dest))
|
||||||
if fingerprint, ok := tls.Fingerprints[config.Fingerprint]; ok {
|
if fingerprint, ok := tls.Fingerprints[config.Fingerprint]; ok {
|
||||||
conn = utls.UClient(conn, tls.CopyConfig(tlsConfig), fingerprint)
|
conn = tls.UClient(conn, tlsConfig, fingerprint)
|
||||||
|
if err := conn.(*tls.UConn).Handshake(); err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
} else {
|
} else {
|
||||||
conn = tls.Client(conn, tlsConfig)
|
conn = tls.Client(conn, tlsConfig)
|
||||||
}
|
}
|
||||||
|
@ -18,8 +18,6 @@ var (
|
|||||||
globalSessionCache = tls.NewLRUClientSessionCache(128)
|
globalSessionCache = tls.NewLRUClientSessionCache(128)
|
||||||
)
|
)
|
||||||
|
|
||||||
const exp8357 = "experiment:8357"
|
|
||||||
|
|
||||||
// ParseCertificate converts a cert.Certificate to Certificate.
|
// ParseCertificate converts a cert.Certificate to Certificate.
|
||||||
func ParseCertificate(c *cert.Certificate) *Certificate {
|
func ParseCertificate(c *cert.Certificate) *Certificate {
|
||||||
if c != nil {
|
if c != nil {
|
||||||
@ -240,15 +238,7 @@ func getNewGetCertficateFunc(certs []*tls.Certificate) func(hello *tls.ClientHel
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
func (c *Config) IsExperiment8357() bool {
|
|
||||||
return strings.HasPrefix(c.ServerName, exp8357)
|
|
||||||
}
|
|
||||||
|
|
||||||
func (c *Config) parseServerName() string {
|
func (c *Config) parseServerName() string {
|
||||||
if c.IsExperiment8357() {
|
|
||||||
return c.ServerName[len(exp8357):]
|
|
||||||
}
|
|
||||||
|
|
||||||
return c.ServerName
|
return c.ServerName
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -43,26 +43,43 @@ func Client(c net.Conn, config *tls.Config) net.Conn {
|
|||||||
return &Conn{Conn: tlsConn}
|
return &Conn{Conn: tlsConn}
|
||||||
}
|
}
|
||||||
|
|
||||||
var Fingerprints = map[string]utls.ClientHelloID{
|
|
||||||
"chrome": utls.HelloChrome_Auto,
|
|
||||||
"firefox": utls.HelloFirefox_Auto,
|
|
||||||
"safari": utls.HelloIOS_Auto,
|
|
||||||
"randomized": utls.HelloRandomized,
|
|
||||||
}
|
|
||||||
|
|
||||||
func CopyConfig(c *tls.Config) *utls.Config {
|
|
||||||
return &utls.Config{
|
|
||||||
RootCAs: c.RootCAs,
|
|
||||||
NextProtos: c.NextProtos,
|
|
||||||
ServerName: c.ServerName,
|
|
||||||
InsecureSkipVerify: c.InsecureSkipVerify,
|
|
||||||
MinVersion: c.MinVersion,
|
|
||||||
MaxVersion: c.MaxVersion,
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
// Server initiates a TLS server handshake on the given connection.
|
// Server initiates a TLS server handshake on the given connection.
|
||||||
func Server(c net.Conn, config *tls.Config) net.Conn {
|
func Server(c net.Conn, config *tls.Config) net.Conn {
|
||||||
tlsConn := tls.Server(c, config)
|
tlsConn := tls.Server(c, config)
|
||||||
return &Conn{Conn: tlsConn}
|
return &Conn{Conn: tlsConn}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
type UConn struct {
|
||||||
|
*utls.UConn
|
||||||
|
}
|
||||||
|
|
||||||
|
func (c *UConn) HandshakeAddress() net.Address {
|
||||||
|
if err := c.Handshake(); err != nil {
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
state := c.ConnectionState()
|
||||||
|
if state.ServerName == "" {
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
return net.ParseAddress(state.ServerName)
|
||||||
|
}
|
||||||
|
|
||||||
|
func UClient(c net.Conn, config *tls.Config, fingerprint *utls.ClientHelloID) net.Conn {
|
||||||
|
utlsConn := utls.UClient(c, copyConfig(config), *fingerprint)
|
||||||
|
return &UConn{UConn: utlsConn}
|
||||||
|
}
|
||||||
|
|
||||||
|
func copyConfig(c *tls.Config) *utls.Config {
|
||||||
|
return &utls.Config{
|
||||||
|
RootCAs: c.RootCAs,
|
||||||
|
ServerName: c.ServerName,
|
||||||
|
InsecureSkipVerify: c.InsecureSkipVerify,
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
var Fingerprints = map[string]*utls.ClientHelloID{
|
||||||
|
"chrome": &utls.HelloChrome_Auto,
|
||||||
|
"firefox": &utls.HelloFirefox_Auto,
|
||||||
|
"safari": &utls.HelloIOS_Auto,
|
||||||
|
"randomized": &utls.HelloRandomized,
|
||||||
|
}
|
||||||
|
Loading…
Reference in New Issue
Block a user