shadowtls.go 2.6 KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586878889
  1. package sing_shadowtls
  2. import (
  3. "context"
  4. "crypto/tls"
  5. "net"
  6. "github.com/metacubex/mihomo/component/ca"
  7. tlsC "github.com/metacubex/mihomo/component/tls"
  8. "github.com/metacubex/mihomo/log"
  9. utls "github.com/metacubex/utls"
  10. "github.com/sagernet/sing-shadowtls"
  11. sing_common "github.com/sagernet/sing/common"
  12. )
  13. const (
  14. Mode string = "shadow-tls"
  15. )
  16. var (
  17. DefaultALPN = []string{"h2", "http/1.1"}
  18. )
  19. type ShadowTLSOption struct {
  20. Password string
  21. Host string
  22. Fingerprint string
  23. ClientFingerprint string
  24. SkipCertVerify bool
  25. Version int
  26. }
  27. func NewShadowTLS(ctx context.Context, conn net.Conn, option *ShadowTLSOption) (net.Conn, error) {
  28. tlsConfig := &tls.Config{
  29. NextProtos: DefaultALPN,
  30. MinVersion: tls.VersionTLS12,
  31. InsecureSkipVerify: option.SkipCertVerify,
  32. ServerName: option.Host,
  33. }
  34. var err error
  35. tlsConfig, err = ca.GetSpecifiedFingerprintTLSConfig(tlsConfig, option.Fingerprint)
  36. if err != nil {
  37. return nil, err
  38. }
  39. tlsHandshake := shadowtls.DefaultTLSHandshakeFunc(option.Password, tlsConfig)
  40. if len(option.ClientFingerprint) != 0 {
  41. if fingerprint, exists := tlsC.GetFingerprint(option.ClientFingerprint); exists {
  42. tlsHandshake = uTLSHandshakeFunc(tlsConfig, *fingerprint.ClientHelloID)
  43. }
  44. }
  45. client, err := shadowtls.NewClient(shadowtls.ClientConfig{
  46. Version: option.Version,
  47. Password: option.Password,
  48. TLSHandshake: tlsHandshake,
  49. Logger: log.SingLogger,
  50. })
  51. if err != nil {
  52. return nil, err
  53. }
  54. return client.DialContextConn(ctx, conn)
  55. }
  56. func uTLSHandshakeFunc(config *tls.Config, clientHelloID utls.ClientHelloID) shadowtls.TLSHandshakeFunc {
  57. return func(ctx context.Context, conn net.Conn, sessionIDGenerator shadowtls.TLSSessionIDGeneratorFunc) error {
  58. tlsConfig := &utls.Config{
  59. Rand: config.Rand,
  60. Time: config.Time,
  61. VerifyPeerCertificate: config.VerifyPeerCertificate,
  62. RootCAs: config.RootCAs,
  63. NextProtos: config.NextProtos,
  64. ServerName: config.ServerName,
  65. InsecureSkipVerify: config.InsecureSkipVerify,
  66. CipherSuites: config.CipherSuites,
  67. MinVersion: config.MinVersion,
  68. MaxVersion: config.MaxVersion,
  69. CurvePreferences: sing_common.Map(config.CurvePreferences, func(it tls.CurveID) utls.CurveID {
  70. return utls.CurveID(it)
  71. }),
  72. SessionTicketsDisabled: config.SessionTicketsDisabled,
  73. Renegotiation: utls.RenegotiationSupport(config.Renegotiation),
  74. SessionIDGenerator: sessionIDGenerator,
  75. }
  76. tlsConn := utls.UClient(conn, tlsConfig, clientHelloID)
  77. return tlsConn.HandshakeContext(ctx)
  78. }
  79. }