mirror of
https://github.com/XTLS/Xray-core.git
synced 2024-12-21 21:19:49 +00:00
079d0bd8a9
* Refactor log * Add new log methods * Fix logger test * Change all logging code * Clean up pathObj * Rebase to latest main * Remove invoking method name after the dot
254 lines
7.6 KiB
Go
254 lines
7.6 KiB
Go
package internet
|
|
|
|
import (
|
|
network "net"
|
|
"os"
|
|
"syscall"
|
|
"unsafe"
|
|
|
|
"github.com/xtls/xray-core/common/errors"
|
|
"github.com/xtls/xray-core/common/net"
|
|
"golang.org/x/sys/unix"
|
|
)
|
|
|
|
const (
|
|
// TCP_FASTOPEN_SERVER is the value to enable TCP fast open on darwin for server connections.
|
|
TCP_FASTOPEN_SERVER = 0x01
|
|
// TCP_FASTOPEN_CLIENT is the value to enable TCP fast open on darwin for client connections.
|
|
TCP_FASTOPEN_CLIENT = 0x02 // nolint: revive,stylecheck
|
|
// syscall.TCP_KEEPINTVL is missing on some darwin architectures.
|
|
sysTCP_KEEPINTVL = 0x101 // nolint: revive,stylecheck
|
|
)
|
|
|
|
const (
|
|
PfOut = 2
|
|
IOCOut = 0x40000000
|
|
IOCIn = 0x80000000
|
|
IOCInOut = IOCIn | IOCOut
|
|
IOCPARMMask = 0x1FFF
|
|
LEN = 4*16 + 4*4 + 4*1
|
|
// #define _IOC(inout,group,num,len) (inout | ((len & IOCPARMMask) << 16) | ((group) << 8) | (num))
|
|
// #define _IOWR(g,n,t) _IOC(IOCInOut, (g), (n), sizeof(t))
|
|
// #define DIOCNATLOOK _IOWR('D', 23, struct pfioc_natlook)
|
|
DIOCNATLOOK = IOCInOut | ((LEN & IOCPARMMask) << 16) | ('D' << 8) | 23
|
|
)
|
|
|
|
// OriginalDst uses ioctl to read original destination from /dev/pf
|
|
func OriginalDst(la, ra net.Addr) (net.IP, int, error) {
|
|
f, err := os.Open("/dev/pf")
|
|
if err != nil {
|
|
return net.IP{}, -1, errors.New("failed to open device /dev/pf").Base(err)
|
|
}
|
|
defer f.Close()
|
|
fd := f.Fd()
|
|
nl := struct { // struct pfioc_natlook
|
|
saddr, daddr, rsaddr, rdaddr [16]byte
|
|
sxport, dxport, rsxport, rdxport [4]byte
|
|
af, proto, protoVariant, direction uint8
|
|
}{
|
|
af: syscall.AF_INET,
|
|
proto: syscall.IPPROTO_TCP,
|
|
direction: PfOut,
|
|
}
|
|
var raIP, laIP net.IP
|
|
var raPort, laPort int
|
|
switch la.(type) {
|
|
case *net.TCPAddr:
|
|
raIP = ra.(*net.TCPAddr).IP
|
|
laIP = la.(*net.TCPAddr).IP
|
|
raPort = ra.(*net.TCPAddr).Port
|
|
laPort = la.(*net.TCPAddr).Port
|
|
case *net.UDPAddr:
|
|
raIP = ra.(*net.UDPAddr).IP
|
|
laIP = la.(*net.UDPAddr).IP
|
|
raPort = ra.(*net.UDPAddr).Port
|
|
laPort = la.(*net.UDPAddr).Port
|
|
}
|
|
if raIP.To4() != nil {
|
|
if laIP.IsUnspecified() {
|
|
laIP = net.ParseIP("127.0.0.1")
|
|
}
|
|
copy(nl.saddr[:net.IPv4len], raIP.To4())
|
|
copy(nl.daddr[:net.IPv4len], laIP.To4())
|
|
}
|
|
if raIP.To16() != nil && raIP.To4() == nil {
|
|
if laIP.IsUnspecified() {
|
|
laIP = net.ParseIP("::1")
|
|
}
|
|
copy(nl.saddr[:], raIP)
|
|
copy(nl.daddr[:], laIP)
|
|
}
|
|
nl.sxport[0], nl.sxport[1] = byte(raPort>>8), byte(raPort)
|
|
nl.dxport[0], nl.dxport[1] = byte(laPort>>8), byte(laPort)
|
|
if _, _, errno := syscall.Syscall(syscall.SYS_IOCTL, fd, DIOCNATLOOK, uintptr(unsafe.Pointer(&nl))); errno != 0 {
|
|
return net.IP{}, -1, os.NewSyscallError("ioctl", err)
|
|
}
|
|
|
|
odPort := nl.rdxport
|
|
var odIP net.IP
|
|
switch nl.af {
|
|
case syscall.AF_INET:
|
|
odIP = make(net.IP, net.IPv4len)
|
|
copy(odIP, nl.rdaddr[:net.IPv4len])
|
|
case syscall.AF_INET6:
|
|
odIP = make(net.IP, net.IPv6len)
|
|
copy(odIP, nl.rdaddr[:])
|
|
}
|
|
return odIP, int(net.PortFromBytes(odPort[:2])), nil
|
|
}
|
|
|
|
func applyOutboundSocketOptions(network string, address string, fd uintptr, config *SocketConfig) error {
|
|
if isTCPSocket(network) {
|
|
tfo := config.ParseTFOValue()
|
|
if tfo > 0 {
|
|
tfo = TCP_FASTOPEN_CLIENT
|
|
}
|
|
if tfo >= 0 {
|
|
if err := unix.SetsockoptInt(int(fd), unix.IPPROTO_TCP, unix.TCP_FASTOPEN, tfo); err != nil {
|
|
return err
|
|
}
|
|
}
|
|
if config.Interface != "" {
|
|
InterfaceIndex := getInterfaceIndexByName(config.Interface)
|
|
if InterfaceIndex != 0 {
|
|
if err := unix.SetsockoptInt(int(fd), syscall.IPPROTO_IP, syscall.IP_BOUND_IF, InterfaceIndex); err != nil {
|
|
return errors.New("failed to set Interface").Base(err)
|
|
}
|
|
}
|
|
}
|
|
|
|
if config.TcpKeepAliveIdle > 0 || config.TcpKeepAliveInterval > 0 {
|
|
if config.TcpKeepAliveIdle > 0 {
|
|
if err := unix.SetsockoptInt(int(fd), unix.IPPROTO_TCP, unix.TCP_KEEPALIVE, int(config.TcpKeepAliveInterval)); err != nil {
|
|
return errors.New("failed to set TCP_KEEPINTVL", err)
|
|
}
|
|
}
|
|
if config.TcpKeepAliveInterval > 0 {
|
|
if err := unix.SetsockoptInt(int(fd), unix.IPPROTO_TCP, sysTCP_KEEPINTVL, int(config.TcpKeepAliveIdle)); err != nil {
|
|
return errors.New("failed to set TCP_KEEPIDLE", err)
|
|
}
|
|
}
|
|
if err := unix.SetsockoptInt(int(fd), unix.SOL_SOCKET, unix.SO_KEEPALIVE, 1); err != nil {
|
|
return errors.New("failed to set SO_KEEPALIVE", err)
|
|
}
|
|
} else if config.TcpKeepAliveInterval < 0 || config.TcpKeepAliveIdle < 0 {
|
|
if err := unix.SetsockoptInt(int(fd), unix.SOL_SOCKET, unix.SO_KEEPALIVE, 0); err != nil {
|
|
return errors.New("failed to unset SO_KEEPALIVE", err)
|
|
}
|
|
}
|
|
|
|
if config.TcpNoDelay {
|
|
if err := unix.SetsockoptInt(int(fd), unix.IPPROTO_TCP, unix.TCP_NODELAY, 1); err != nil {
|
|
return errors.New("failed to set TCP_NODELAY", err)
|
|
}
|
|
}
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
func applyInboundSocketOptions(network string, fd uintptr, config *SocketConfig) error {
|
|
if isTCPSocket(network) {
|
|
tfo := config.ParseTFOValue()
|
|
if tfo > 0 {
|
|
tfo = TCP_FASTOPEN_SERVER
|
|
}
|
|
if tfo >= 0 {
|
|
if err := unix.SetsockoptInt(int(fd), unix.IPPROTO_TCP, unix.TCP_FASTOPEN, tfo); err != nil {
|
|
return err
|
|
}
|
|
}
|
|
if config.Interface != "" {
|
|
InterfaceIndex := getInterfaceIndexByName(config.Interface)
|
|
if InterfaceIndex != 0 {
|
|
if err := unix.SetsockoptInt(int(fd), syscall.IPPROTO_IP, syscall.IP_BOUND_IF, InterfaceIndex); err != nil {
|
|
return errors.New("failed to set Interface").Base(err)
|
|
}
|
|
}
|
|
}
|
|
|
|
if config.TcpKeepAliveIdle > 0 || config.TcpKeepAliveInterval > 0 {
|
|
if config.TcpKeepAliveIdle > 0 {
|
|
if err := unix.SetsockoptInt(int(fd), unix.IPPROTO_TCP, unix.TCP_KEEPALIVE, int(config.TcpKeepAliveInterval)); err != nil {
|
|
return errors.New("failed to set TCP_KEEPINTVL", err)
|
|
}
|
|
}
|
|
if config.TcpKeepAliveInterval > 0 {
|
|
if err := unix.SetsockoptInt(int(fd), unix.IPPROTO_TCP, sysTCP_KEEPINTVL, int(config.TcpKeepAliveIdle)); err != nil {
|
|
return errors.New("failed to set TCP_KEEPIDLE", err)
|
|
}
|
|
}
|
|
if err := unix.SetsockoptInt(int(fd), unix.SOL_SOCKET, unix.SO_KEEPALIVE, 1); err != nil {
|
|
return errors.New("failed to set SO_KEEPALIVE", err)
|
|
}
|
|
} else if config.TcpKeepAliveInterval < 0 || config.TcpKeepAliveIdle < 0 {
|
|
if err := unix.SetsockoptInt(int(fd), unix.SOL_SOCKET, unix.SO_KEEPALIVE, 0); err != nil {
|
|
return errors.New("failed to unset SO_KEEPALIVE", err)
|
|
}
|
|
}
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
func bindAddr(fd uintptr, address []byte, port uint32) error {
|
|
setReuseAddr(fd)
|
|
setReusePort(fd)
|
|
|
|
var sockaddr unix.Sockaddr
|
|
|
|
switch len(address) {
|
|
case net.IPv4len:
|
|
a4 := &unix.SockaddrInet4{
|
|
Port: int(port),
|
|
}
|
|
copy(a4.Addr[:], address)
|
|
sockaddr = a4
|
|
case net.IPv6len:
|
|
a6 := &unix.SockaddrInet6{
|
|
Port: int(port),
|
|
}
|
|
copy(a6.Addr[:], address)
|
|
sockaddr = a6
|
|
default:
|
|
return errors.New("unexpected length of ip")
|
|
}
|
|
|
|
return unix.Bind(int(fd), sockaddr)
|
|
}
|
|
|
|
func setReuseAddr(fd uintptr) error {
|
|
if err := unix.SetsockoptInt(int(fd), unix.SOL_SOCKET, unix.SO_REUSEADDR, 1); err != nil {
|
|
return errors.New("failed to set SO_REUSEADDR").Base(err).AtWarning()
|
|
}
|
|
return nil
|
|
}
|
|
|
|
func setReusePort(fd uintptr) error {
|
|
if err := unix.SetsockoptInt(int(fd), unix.SOL_SOCKET, unix.SO_REUSEPORT, 1); err != nil {
|
|
return errors.New("failed to set SO_REUSEPORT").Base(err).AtWarning()
|
|
}
|
|
return nil
|
|
}
|
|
func getInterfaceIndexByName(name string) int {
|
|
ifaces, err := network.Interfaces()
|
|
if err == nil {
|
|
for _, iface := range ifaces {
|
|
if (iface.Flags&network.FlagUp == network.FlagUp) && (iface.Flags&network.FlagLoopback != network.FlagLoopback) {
|
|
addrs, _ := iface.Addrs()
|
|
for _, addr := range addrs {
|
|
if ipnet, ok := addr.(*network.IPNet); ok && !ipnet.IP.IsLoopback() {
|
|
if ipnet.IP.To4() != nil {
|
|
if iface.Name == name {
|
|
return iface.Index
|
|
}
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
}
|
|
}
|
|
return 0
|
|
}
|