2021-03-07 06:39:50 +02:00
|
|
|
package dispatcher
|
|
|
|
|
|
|
|
import (
|
|
|
|
"context"
|
2021-10-20 08:15:49 +03:00
|
|
|
"strings"
|
2021-03-07 06:39:50 +02:00
|
|
|
|
|
|
|
"github.com/xtls/xray-core/common"
|
|
|
|
"github.com/xtls/xray-core/common/net"
|
|
|
|
"github.com/xtls/xray-core/common/session"
|
2021-03-14 17:05:08 +02:00
|
|
|
"github.com/xtls/xray-core/core"
|
2021-03-07 06:39:50 +02:00
|
|
|
"github.com/xtls/xray-core/features/dns"
|
|
|
|
)
|
|
|
|
|
2022-01-11 06:39:58 +02:00
|
|
|
// newFakeDNSSniffer Creates a Fake DNS metadata sniffer
|
2021-03-07 06:39:50 +02:00
|
|
|
func newFakeDNSSniffer(ctx context.Context) (protocolSnifferWithMetadata, error) {
|
|
|
|
var fakeDNSEngine dns.FakeDNSEngine
|
2022-04-28 07:22:05 +03:00
|
|
|
{
|
2022-04-30 06:22:42 +03:00
|
|
|
fakeDNSEngineFeat := core.MustFromContext(ctx).GetFeature((*dns.FakeDNSEngine)(nil))
|
2022-04-28 07:22:05 +03:00
|
|
|
if fakeDNSEngineFeat != nil {
|
|
|
|
fakeDNSEngine = fakeDNSEngineFeat.(dns.FakeDNSEngine)
|
|
|
|
}
|
2021-03-07 06:39:50 +02:00
|
|
|
}
|
2022-04-28 07:22:05 +03:00
|
|
|
|
2021-03-07 06:39:50 +02:00
|
|
|
if fakeDNSEngine == nil {
|
|
|
|
errNotInit := newError("FakeDNSEngine is not initialized, but such a sniffer is used").AtError()
|
|
|
|
return protocolSnifferWithMetadata{}, errNotInit
|
|
|
|
}
|
|
|
|
return protocolSnifferWithMetadata{protocolSniffer: func(ctx context.Context, bytes []byte) (SniffResult, error) {
|
|
|
|
Target := session.OutboundFromContext(ctx).Target
|
|
|
|
if Target.Network == net.Network_TCP || Target.Network == net.Network_UDP {
|
|
|
|
domainFromFakeDNS := fakeDNSEngine.GetDomainFromFakeDNS(Target.Address)
|
|
|
|
if domainFromFakeDNS != "" {
|
|
|
|
newError("fake dns got domain: ", domainFromFakeDNS, " for ip: ", Target.Address.String()).WriteToLog(session.ExportIDToError(ctx))
|
|
|
|
return &fakeDNSSniffResult{domainName: domainFromFakeDNS}, nil
|
|
|
|
}
|
|
|
|
}
|
2021-10-20 08:15:49 +03:00
|
|
|
|
|
|
|
if ipAddressInRangeValueI := ctx.Value(ipAddressInRange); ipAddressInRangeValueI != nil {
|
|
|
|
ipAddressInRangeValue := ipAddressInRangeValueI.(*ipAddressInRangeOpt)
|
|
|
|
if fkr0, ok := fakeDNSEngine.(dns.FakeDNSEngineRev0); ok {
|
|
|
|
inPool := fkr0.IsIPInIPPool(Target.Address)
|
|
|
|
ipAddressInRangeValue.addressInRange = &inPool
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2021-03-07 06:39:50 +02:00
|
|
|
return nil, common.ErrNoClue
|
|
|
|
}, metadataSniffer: true}, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
type fakeDNSSniffResult struct {
|
|
|
|
domainName string
|
|
|
|
}
|
|
|
|
|
|
|
|
func (fakeDNSSniffResult) Protocol() string {
|
|
|
|
return "fakedns"
|
|
|
|
}
|
|
|
|
|
|
|
|
func (f fakeDNSSniffResult) Domain() string {
|
|
|
|
return f.domainName
|
|
|
|
}
|
2021-10-20 08:15:49 +03:00
|
|
|
|
|
|
|
type fakeDNSExtraOpts int
|
|
|
|
|
|
|
|
const ipAddressInRange fakeDNSExtraOpts = 1
|
|
|
|
|
|
|
|
type ipAddressInRangeOpt struct {
|
|
|
|
addressInRange *bool
|
|
|
|
}
|
|
|
|
|
|
|
|
type DNSThenOthersSniffResult struct {
|
|
|
|
domainName string
|
|
|
|
protocolOriginalName string
|
|
|
|
}
|
|
|
|
|
|
|
|
func (f DNSThenOthersSniffResult) IsProtoSubsetOf(protocolName string) bool {
|
|
|
|
return strings.HasPrefix(protocolName, f.protocolOriginalName)
|
|
|
|
}
|
|
|
|
|
|
|
|
func (DNSThenOthersSniffResult) Protocol() string {
|
|
|
|
return "fakedns+others"
|
|
|
|
}
|
|
|
|
|
|
|
|
func (f DNSThenOthersSniffResult) Domain() string {
|
|
|
|
return f.domainName
|
|
|
|
}
|
|
|
|
|
|
|
|
func newFakeDNSThenOthers(ctx context.Context, fakeDNSSniffer protocolSnifferWithMetadata, others []protocolSnifferWithMetadata) (
|
2022-05-18 10:29:01 +03:00
|
|
|
protocolSnifferWithMetadata, error,
|
|
|
|
) { // nolint: unparam
|
2021-10-20 08:15:49 +03:00
|
|
|
// ctx may be used in the future
|
|
|
|
_ = ctx
|
|
|
|
return protocolSnifferWithMetadata{
|
|
|
|
protocolSniffer: func(ctx context.Context, bytes []byte) (SniffResult, error) {
|
|
|
|
ipAddressInRangeValue := &ipAddressInRangeOpt{}
|
|
|
|
ctx = context.WithValue(ctx, ipAddressInRange, ipAddressInRangeValue)
|
|
|
|
result, err := fakeDNSSniffer.protocolSniffer(ctx, bytes)
|
|
|
|
if err == nil {
|
|
|
|
return result, nil
|
|
|
|
}
|
|
|
|
if ipAddressInRangeValue.addressInRange != nil {
|
|
|
|
if *ipAddressInRangeValue.addressInRange {
|
|
|
|
for _, v := range others {
|
|
|
|
if v.metadataSniffer || bytes != nil {
|
|
|
|
if result, err := v.protocolSniffer(ctx, bytes); err == nil {
|
|
|
|
return DNSThenOthersSniffResult{domainName: result.Domain(), protocolOriginalName: result.Protocol()}, nil
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return nil, common.ErrNoClue
|
|
|
|
}
|
|
|
|
newError("ip address not in fake dns range, return as is").AtDebug().WriteToLog()
|
|
|
|
return nil, common.ErrNoClue
|
|
|
|
}
|
|
|
|
newError("fake dns sniffer did not set address in range option, assume false.").AtWarning().WriteToLog()
|
|
|
|
return nil, common.ErrNoClue
|
|
|
|
},
|
|
|
|
metadataSniffer: false,
|
|
|
|
}, nil
|
|
|
|
}
|