|
|
|
package socks
|
|
|
|
|
|
|
|
import (
|
|
|
|
"encoding/binary"
|
|
|
|
"fmt"
|
|
|
|
"io"
|
|
|
|
"log"
|
|
|
|
"net"
|
|
|
|
)
|
|
|
|
|
|
|
|
/*
|
|
|
|
socks4 protocol
|
|
|
|
|
|
|
|
request
|
|
|
|
byte | 0 | 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | ... |
|
|
|
|
|0x04|cmd| port | ip | user\0 |
|
|
|
|
|
|
|
|
reply
|
|
|
|
byte | 0 | 1 | 2 | 3 | 4 | 5 | 6 | 7|
|
|
|
|
|0x00|status| | |
|
|
|
|
|
|
|
|
|
|
|
|
socks4a protocol
|
|
|
|
|
|
|
|
request
|
|
|
|
byte | 0 | 1 | 2 | 3 |4 | 5 | 6 | 7 | 8 | ... |... |
|
|
|
|
|0x04|cmd| port | 0.0.0.x | user\0 |domain\0|
|
|
|
|
|
|
|
|
reply
|
|
|
|
byte | 0 | 1 | 2 | 3 | 4 | 5 | 6| 7 |
|
|
|
|
|0x00|staus| port | ip |
|
|
|
|
|
|
|
|
*/
|
|
|
|
type socks4Conn struct {
|
|
|
|
serverConn net.Conn
|
|
|
|
clientConn net.Conn
|
|
|
|
dial DialFunc
|
|
|
|
}
|
|
|
|
|
|
|
|
func (s4 *socks4Conn) Serve() {
|
|
|
|
defer s4.Close()
|
|
|
|
|
|
|
|
if err := s4.processRequest(); err != nil {
|
|
|
|
log.Println(err)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func (s4 *socks4Conn) Close() {
|
|
|
|
if s4.clientConn != nil {
|
|
|
|
s4.clientConn.Close()
|
|
|
|
}
|
|
|
|
|
|
|
|
if s4.serverConn != nil {
|
|
|
|
s4.serverConn.Close()
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func (s4 *socks4Conn) forward() {
|
|
|
|
|
|
|
|
c := make(chan int, 2)
|
|
|
|
|
|
|
|
go func() {
|
|
|
|
io.Copy(s4.clientConn, s4.serverConn)
|
|
|
|
c <- 1
|
|
|
|
}()
|
|
|
|
|
|
|
|
go func() {
|
|
|
|
io.Copy(s4.serverConn, s4.clientConn)
|
|
|
|
c <- 1
|
|
|
|
}()
|
|
|
|
|
|
|
|
<-c
|
|
|
|
}
|
|
|
|
|
|
|
|
func (s4 *socks4Conn) processRequest() error {
|
|
|
|
// version has already read out by socksConn.Serve()
|
|
|
|
// process command and target here
|
|
|
|
|
|
|
|
buf := make([]byte, 128)
|
|
|
|
|
|
|
|
// read header
|
|
|
|
n, err := io.ReadAtLeast(s4.clientConn, buf, 8)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
// command only support connect
|
|
|
|
if buf[0] != cmdConnect {
|
|
|
|
return fmt.Errorf("error command %d", buf[0])
|
|
|
|
}
|
|
|
|
|
|
|
|
// get port
|
|
|
|
port := binary.BigEndian.Uint16(buf[1:3])
|
|
|
|
|
|
|
|
// get ip
|
|
|
|
ip := net.IP(buf[3:7])
|
|
|
|
|
|
|
|
// NULL-terminated user string
|
|
|
|
// jump to NULL character
|
|
|
|
var j int
|
|
|
|
for j = 7; j < n; j++ {
|
|
|
|
if buf[j] == 0x00 {
|
|
|
|
break
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
host := ip.String()
|
|
|
|
|
|
|
|
// socks4a
|
|
|
|
// 0.0.0.x
|
|
|
|
if ip[0] == 0x00 && ip[1] == 0x00 && ip[2] == 0x00 && ip[3] != 0x00 {
|
|
|
|
j++
|
|
|
|
var i = j
|
|
|
|
|
|
|
|
// jump to the end of hostname
|
|
|
|
for j = i; j < n; j++ {
|
|
|
|
if buf[j] == 0x00 {
|
|
|
|
break
|
|
|
|
}
|
|
|
|
}
|
|
|
|
host = string(buf[i:j])
|
|
|
|
}
|
|
|
|
|
|
|
|
target := net.JoinHostPort(host, fmt.Sprintf("%d", port))
|
|
|
|
|
|
|
|
// reply user with connect success
|
|
|
|
// if dial to target failed, user will receive connection reset
|
|
|
|
s4.clientConn.Write([]byte{0x00, 0x5a, 0x01, 0x02, 0x00, 0x00, 0x00, 0x00})
|
|
|
|
|
|
|
|
//log.Printf("connecting to %s\r\n", target)
|
|
|
|
|
|
|
|
// connect to the target
|
|
|
|
s4.serverConn, err = s4.dial("tcp", target)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
// enter data exchange
|
|
|
|
s4.forward()
|
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|