mirror of
https://github.com/SagerNet/sing-box.git
synced 2025-08-15 06:47:35 +08:00
111 lines
3.0 KiB
Go
111 lines
3.0 KiB
Go
package tls
|
|
|
|
import (
|
|
"context"
|
|
"crypto/tls"
|
|
"errors"
|
|
"net"
|
|
"os"
|
|
|
|
"github.com/sagernet/sing-box/common/badtls"
|
|
C "github.com/sagernet/sing-box/constant"
|
|
"github.com/sagernet/sing-box/option"
|
|
M "github.com/sagernet/sing/common/metadata"
|
|
N "github.com/sagernet/sing/common/network"
|
|
aTLS "github.com/sagernet/sing/common/tls"
|
|
)
|
|
|
|
func NewDialerFromOptions(ctx context.Context, dialer N.Dialer, serverAddress string, options option.OutboundTLSOptions) (N.Dialer, error) {
|
|
if !options.Enabled {
|
|
return dialer, nil
|
|
}
|
|
config, err := NewClient(ctx, serverAddress, options)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
return NewDialer(dialer, config), nil
|
|
}
|
|
|
|
func NewClient(ctx context.Context, serverAddress string, options option.OutboundTLSOptions) (Config, error) {
|
|
if !options.Enabled {
|
|
return nil, nil
|
|
}
|
|
if options.Reality != nil && options.Reality.Enabled {
|
|
return NewRealityClient(ctx, serverAddress, options)
|
|
} else if options.UTLS != nil && options.UTLS.Enabled {
|
|
return NewUTLSClient(ctx, serverAddress, options)
|
|
}
|
|
return NewSTDClient(ctx, serverAddress, options)
|
|
}
|
|
|
|
func ClientHandshake(ctx context.Context, conn net.Conn, config Config) (Conn, error) {
|
|
ctx, cancel := context.WithTimeout(ctx, C.TCPTimeout)
|
|
defer cancel()
|
|
tlsConn, err := aTLS.ClientHandshake(ctx, conn, config)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
readWaitConn, err := badtls.NewReadWaitConn(tlsConn)
|
|
if err == nil {
|
|
return readWaitConn, nil
|
|
} else if err != os.ErrInvalid {
|
|
return nil, err
|
|
}
|
|
return tlsConn, nil
|
|
}
|
|
|
|
type Dialer interface {
|
|
N.Dialer
|
|
DialTLSContext(ctx context.Context, destination M.Socksaddr) (Conn, error)
|
|
}
|
|
|
|
type defaultDialer struct {
|
|
dialer N.Dialer
|
|
config Config
|
|
}
|
|
|
|
func NewDialer(dialer N.Dialer, config Config) Dialer {
|
|
return &defaultDialer{dialer, config}
|
|
}
|
|
|
|
func (d *defaultDialer) DialContext(ctx context.Context, network string, destination M.Socksaddr) (net.Conn, error) {
|
|
if N.NetworkName(network) != N.NetworkTCP {
|
|
return nil, os.ErrInvalid
|
|
}
|
|
return d.DialTLSContext(ctx, destination)
|
|
}
|
|
|
|
func (d *defaultDialer) ListenPacket(ctx context.Context, destination M.Socksaddr) (net.PacketConn, error) {
|
|
return nil, os.ErrInvalid
|
|
}
|
|
|
|
func (d *defaultDialer) DialTLSContext(ctx context.Context, destination M.Socksaddr) (Conn, error) {
|
|
return d.dialContext(ctx, destination, true)
|
|
}
|
|
|
|
func (d *defaultDialer) dialContext(ctx context.Context, destination M.Socksaddr, echRetry bool) (Conn, error) {
|
|
conn, err := d.dialer.DialContext(ctx, N.NetworkTCP, destination)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
tlsConn, err := ClientHandshake(ctx, conn, d.config)
|
|
if err == nil {
|
|
return tlsConn, nil
|
|
}
|
|
conn.Close()
|
|
if echRetry {
|
|
var echErr *tls.ECHRejectionError
|
|
if errors.As(err, &echErr) && len(echErr.RetryConfigList) > 0 {
|
|
if echConfig, isECH := d.config.(ECHCapableConfig); isECH {
|
|
echConfig.SetECHConfigList(echErr.RetryConfigList)
|
|
}
|
|
}
|
|
return d.dialContext(ctx, destination, false)
|
|
}
|
|
return nil, err
|
|
}
|
|
|
|
func (d *defaultDialer) Upstream() any {
|
|
return d.dialer
|
|
}
|