#include #include #ifndef _WIN32 #include #include #include #include #include #include #include #ifdef __linux__ #include #define _sendfile(outfd, infd, start, len) sendfile(outfd, infd, start, len) #else #include #define _sendfile(outfd, infd, start, len) sendfile(infd, outfd, start, len, 0, 0) #endif #ifdef MFD_CLOEXEC #include #define memfd_create(name, flags) syscall(__NR_memfd_create, name, flags); #else #define memfd_create(name, flags) fileno(tmpfile()) #endif #else #include #include #include #endif #include #include #include static inline int get_family(struct sockaddr *dst) { if (dst->sa_family == AF_INET6) { struct sockaddr_in6 *d6 = (struct sockaddr_in6 *)dst; static char *pat = "\0\0\0\0\0\0\0\0\0\0\xff\xff"; if (!memcmp(&d6->sin6_addr, pat, 12)) { return AF_INET; } } return dst->sa_family; } int setttl(int fd, int ttl, int family) { int _ttl = ttl; if (family == AF_INET) { if (setsockopt(fd, IPPROTO_IP, IP_TTL, (char *)&_ttl, sizeof(_ttl)) < 0) { uniperror("setsockopt IP_TTL"); return -1; } } else if (setsockopt(fd, IPPROTO_IPV6, IPV6_UNICAST_HOPS, (char *)&_ttl, sizeof(_ttl)) < 0) { uniperror("setsockopt IPV6_UNICAST_HOPS"); return -1; } return 0; } #ifndef _WIN32 static inline void delay(long ms) { struct timespec time = { .tv_nsec = ms * 1000000 }; nanosleep(&time, 0); } #else #define delay(ms) Sleep(ms) #endif #ifndef _WIN32 int send_fake(int sfd, char *buffer, int cnt, long pos, int fa, int ttl) { struct packet pkt = cnt != IS_HTTP ? fake_tls : fake_http; size_t psz = pkt.size; int ffd = memfd_create("name", O_RDWR); if (ffd < 0) { uniperror("memfd_create"); return -1; } char *p = 0; int status = -1; while (status) { if (ftruncate(ffd, pos) < 0) { uniperror("ftruncate"); break; } p = mmap(0, pos, PROT_WRITE, MAP_SHARED, ffd, 0); if (p == MAP_FAILED) { uniperror("mmap"); p = 0; break; } memcpy(p, pkt.data, psz < pos ? psz : pos); if (setttl(sfd, ttl, fa) < 0) { break; } if (_sendfile(sfd, ffd, 0, pos) < 0) { uniperror("sendfile"); break; } delay(params.sfdelay); memcpy(p, buffer, pos); if (setttl(sfd, params.def_ttl, fa) < 0) { break; } status = 0; } if (p) munmap(p, pos); close(ffd); return status; } #endif int send_oob(int sfd, char *buffer, ssize_t n, long pos) { ssize_t size = oob_data.size - 1; char *data = oob_data.data + 1; char rchar = buffer[pos]; buffer[pos] = oob_data.data[0]; if (send(sfd, buffer, pos + 1, MSG_OOB) < 0) { uniperror("send"); buffer[pos] = rchar; return -1; } buffer[pos] = rchar; if (size) { delay(params.sfdelay); } for (long i = 0; i < size; i++) { if (send(sfd, data + i, 1, MSG_OOB) < 0) { uniperror("send"); return -1; } if (size != 1) { delay(params.sfdelay); } } return 0; } int send_disorder(int sfd, char *buffer, long pos, int fa) { int bttl = 1; if (setttl(sfd, bttl, fa) < 0) { return -1; } if (send(sfd, buffer, pos, 0) < 0) { uniperror("send"); return -1; } if (setttl(sfd, params.def_ttl, fa) < 0) { return -1; } return 0; } int desync(int sfd, char *buffer, size_t bfsize, ssize_t n, struct sockaddr *dst, int dp_c) { struct desync_params dp = params.dp[dp_c]; if (dp.redirect) { dst = (struct sockaddr *)&dp.ext_proxy; } char *host = 0; int len = 0, type = 0; int fa = get_family(dst); if ((len = parse_tls(buffer, n, &host))) { type = IS_HTTPS; } else if ((len = parse_http(buffer, n, &host, 0))) { type = IS_HTTP; } if (len && host) { LOG(LOG_S, "host: %.*s (%ld)\n", len, host, host - buffer); } if (type == IS_HTTP && dp.mod_http) { LOG(LOG_S, "modify HTTP: n=%ld\n", n); if (mod_http(buffer, n, dp.mod_http)) { LOG(LOG_E, "mod http error\n"); return -1; } } else if (type == IS_HTTPS && dp.tlsrec_n) { long lp = 0; for (int i = 0; i < dp.tlsrec_n; i++) { struct part part = dp.tlsrec[i]; long pos = part.pos + i * 5; if (part.flag == OFFSET_SNI) { pos += (host - buffer - 5); } else if (pos < 0) { pos += n; } if (pos < lp) { LOG(LOG_E, "tlsrec cancel: %ld < %ld\n", pos, lp); break; } if (!part_tls(buffer + lp, bfsize - lp, n - lp, pos - lp)) { LOG(LOG_E, "tlsrec error: pos=%ld, n=%ld\n", pos, n); break; } LOG(LOG_S, "tlsrec: pos=%ld, n=%ld\n", pos, n); n += 5; lp = pos + 5; } } if (params.custom_ttl) { if (setttl(sfd, params.def_ttl, fa) < 0) { return -1; } } long lp = 0; if (!type && params.de_known) { } else for (int i = 0; i < dp.parts_n; i++) { struct part part = dp.parts[i]; long pos = part.pos; if (part.flag == OFFSET_SNI) { if (type != IS_HTTPS) continue; else pos += (host - buffer); } else if (part.flag == OFFSET_HOST) { if (type != IS_HTTP) continue; else pos += (host - buffer); } else if (pos < 0) { pos += n; } if (pos <= 0 || pos >= n || pos <= lp) { LOG(LOG_E, "split cancel: pos=%ld-%ld, n=%ld\n", lp, pos, n); break; } LOG(LOG_S, "split: pos=%ld-%ld, m=%d\n", lp, pos, part.m); int s = 0; switch (part.m) { #ifndef _WIN32 case DESYNC_FAKE: s = send_fake(sfd, buffer + lp, type, pos - lp, fa, dp.ttl ? dp.ttl : 8); break; #endif case DESYNC_DISORDER: s = send_disorder(sfd, buffer + lp, pos - lp, fa); break; case DESYNC_OOB: s = send_oob(sfd, buffer + lp, n - lp, pos - lp); break; case DESYNC_SPLIT: default: if (send(sfd, buffer + lp, pos - lp, 0) < 0) { uniperror("send"); return -1; } } if (s) { return -1; } lp = pos; } if (lp < n) { LOG((lp ? LOG_S : LOG_L), "send: pos=%ld-%ld\n", lp, n); if (send(sfd, buffer + lp, n - lp, 0) < 0) { uniperror("send"); return -1; } } return 0; }