Cloak/cmd/ck-client/ck-client.go

207 lines
5.7 KiB
Go
Raw Normal View History

2023-03-06 16:51:05 +00:00
//go:build go1.11
2018-10-07 17:09:45 +00:00
// +build go1.11
package main
import (
"encoding/base64"
"encoding/binary"
2018-10-07 17:09:45 +00:00
"flag"
"fmt"
2020-04-08 23:34:02 +00:00
"net"
"os"
2023-03-06 16:51:05 +00:00
"github.com/cbeuw/Cloak/internal/common"
2018-10-07 17:09:45 +00:00
"github.com/cbeuw/Cloak/internal/client"
mux "github.com/cbeuw/Cloak/internal/multiplex"
2019-08-02 14:45:33 +00:00
log "github.com/sirupsen/logrus"
2018-10-07 17:09:45 +00:00
)
var version string
func main() {
// Should be 127.0.0.1 to listen to a proxy client on this machine
2018-10-07 17:09:45 +00:00
var localHost string
// port used by proxy clients to communicate with cloak client
2018-10-07 17:09:45 +00:00
var localPort string
// The ip of the proxy server
var remoteHost string
// The proxy port,should be 443
var remotePort string
var proxyMethod string
2019-08-14 09:04:27 +00:00
var udp bool
var config string
var b64AdminUID string
var vpnMode bool
var tcpFastOpen bool
2018-11-22 21:55:23 +00:00
2018-10-07 17:09:45 +00:00
log_init()
2020-04-06 12:07:16 +00:00
ssPluginMode := os.Getenv("SS_LOCAL_HOST") != ""
2020-04-04 14:29:06 +00:00
verbosity := flag.String("verbosity", "info", "verbosity level")
2020-04-06 12:07:16 +00:00
if ssPluginMode {
config = os.Getenv("SS_PLUGIN_OPTIONS")
flag.BoolVar(&vpnMode, "V", false, "ignored.")
flag.BoolVar(&tcpFastOpen, "fast-open", false, "ignored.")
2020-04-04 14:29:06 +00:00
flag.Parse() // for verbosity only
2018-10-07 17:09:45 +00:00
} else {
2019-08-09 21:51:17 +00:00
flag.StringVar(&localHost, "i", "127.0.0.1", "localHost: Cloak listens to proxy clients on this ip")
2019-07-31 18:27:05 +00:00
flag.StringVar(&localPort, "l", "1984", "localPort: Cloak listens to proxy clients on this port")
2018-10-07 17:09:45 +00:00
flag.StringVar(&remoteHost, "s", "", "remoteHost: IP of your proxy server")
flag.StringVar(&remotePort, "p", "443", "remotePort: proxy port, should be 443")
2019-08-14 09:04:27 +00:00
flag.BoolVar(&udp, "u", false, "udp: set this flag if the underlying proxy is using UDP protocol")
2020-08-17 16:56:05 +00:00
flag.StringVar(&config, "c", "ckclient.json", "config: path to the configuration file or options separated with semicolons")
flag.StringVar(&proxyMethod, "proxy", "", "proxy: the proxy method's name. It must match exactly with the corresponding entry in server's ProxyBook")
flag.StringVar(&b64AdminUID, "a", "", "adminUID: enter the adminUID to serve the admin api")
2018-10-07 17:09:45 +00:00
askVersion := flag.Bool("v", false, "Print the version number")
printUsage := flag.Bool("h", false, "Print this message")
2020-04-06 12:07:16 +00:00
// commandline arguments overrides json
2018-10-07 17:09:45 +00:00
flag.Parse()
if *askVersion {
2019-08-02 14:45:33 +00:00
fmt.Printf("ck-client %s", version)
2018-10-07 17:09:45 +00:00
return
}
if *printUsage {
flag.Usage()
return
}
2019-08-02 14:45:33 +00:00
log.Info("Starting standalone mode")
2018-10-07 17:09:45 +00:00
}
2020-12-27 20:27:04 +00:00
log.SetFormatter(&log.TextFormatter{
FullTimestamp: true,
})
2020-04-04 14:29:06 +00:00
lvl, err := log.ParseLevel(*verbosity)
if err != nil {
log.Fatal(err)
}
log.SetLevel(lvl)
2020-04-06 12:07:16 +00:00
rawConfig, err := client.ParseConfig(config)
2018-10-07 17:09:45 +00:00
if err != nil {
log.Fatal(err)
}
2020-04-06 12:07:16 +00:00
if ssPluginMode {
if rawConfig.ProxyMethod == "" {
rawConfig.ProxyMethod = "shadowsocks"
}
2020-04-06 12:07:16 +00:00
// json takes precedence over environment variables
// i.e. if json field isn't empty, use that
if rawConfig.RemoteHost == "" {
rawConfig.RemoteHost = os.Getenv("SS_REMOTE_HOST")
}
if rawConfig.RemotePort == "" {
rawConfig.RemotePort = os.Getenv("SS_REMOTE_PORT")
2020-04-06 12:07:16 +00:00
}
if rawConfig.LocalHost == "" {
rawConfig.LocalHost = os.Getenv("SS_LOCAL_HOST")
}
if rawConfig.LocalPort == "" {
rawConfig.LocalPort = os.Getenv("SS_LOCAL_PORT")
}
} else {
// commandline argument takes precedence over json
// if commandline argument is set, use commandline
flag.Visit(func(f *flag.Flag) {
// manually set ones
switch f.Name {
case "i":
rawConfig.LocalHost = localHost
case "l":
rawConfig.LocalPort = localPort
case "s":
rawConfig.RemoteHost = remoteHost
case "p":
rawConfig.RemotePort = remotePort
case "u":
rawConfig.UDP = udp
2020-04-06 12:07:16 +00:00
case "proxy":
rawConfig.ProxyMethod = proxyMethod
}
})
// ones with default values
if rawConfig.LocalHost == "" {
rawConfig.LocalHost = localHost
}
if rawConfig.LocalPort == "" {
rawConfig.LocalPort = localPort
}
if rawConfig.RemotePort == "" {
rawConfig.RemotePort = remotePort
}
}
localConfig, remoteConfig, authInfo, err := rawConfig.ProcessRawConfig(common.RealWorldState)
2020-04-06 12:07:16 +00:00
if err != nil {
log.Fatal(err)
2018-10-07 17:09:45 +00:00
}
var adminUID []byte
if b64AdminUID != "" {
adminUID, err = base64.StdEncoding.DecodeString(b64AdminUID)
if err != nil {
log.Fatal(err)
}
}
2020-04-06 12:07:16 +00:00
var seshMaker func() *mux.Session
2020-04-08 23:34:02 +00:00
d := &net.Dialer{Control: protector, KeepAlive: remoteConfig.KeepAlive}
if adminUID != nil {
2020-04-06 12:07:16 +00:00
log.Infof("API base is %v", localConfig.LocalAddr)
authInfo.UID = adminUID
authInfo.SessionId = 0
2020-04-06 12:07:16 +00:00
remoteConfig.NumConn = 1
seshMaker = func() *mux.Session {
return client.MakeSession(remoteConfig, authInfo, d)
2020-04-06 12:07:16 +00:00
}
2019-08-02 14:45:33 +00:00
} else {
2019-08-14 10:46:33 +00:00
var network string
if authInfo.Unordered {
2019-08-16 22:20:24 +00:00
network = "UDP"
2019-08-14 10:46:33 +00:00
} else {
2019-08-16 22:20:24 +00:00
network = "TCP"
2020-04-06 12:07:16 +00:00
}
log.Infof("Listening on %v %v for %v client", network, localConfig.LocalAddr, authInfo.ProxyMethod)
seshMaker = func() *mux.Session {
authInfo := authInfo // copy the struct because we are overwriting SessionId
randByte := make([]byte, 1)
common.RandRead(authInfo.WorldState.Rand, randByte)
authInfo.MockDomain = localConfig.MockDomainList[int(randByte[0])%len(localConfig.MockDomainList)]
// sessionID is usergenerated. There shouldn't be a security concern because the scope of
// sessionID is limited to its UID.
quad := make([]byte, 4)
common.RandRead(authInfo.WorldState.Rand, quad)
authInfo.SessionId = binary.BigEndian.Uint32(quad)
return client.MakeSession(remoteConfig, authInfo, d)
2019-08-14 10:46:33 +00:00
}
}
if authInfo.Unordered {
2020-05-23 21:25:17 +00:00
acceptor := func() (*net.UDPConn, error) {
udpAddr, _ := net.ResolveUDPAddr("udp", localConfig.LocalAddr)
return net.ListenUDP("udp", udpAddr)
}
client.RouteUDP(acceptor, localConfig.Timeout, remoteConfig.Singleplex, seshMaker)
2019-08-14 09:04:27 +00:00
} else {
2020-04-10 10:07:38 +00:00
listener, err := net.Listen("tcp", localConfig.LocalAddr)
if err != nil {
log.Fatal(err)
}
client.RouteTCP(listener, localConfig.Timeout, remoteConfig.Singleplex, seshMaker)
2018-10-07 17:09:45 +00:00
}
}