package adapters import ( "bytes" "crypto/tls" "errors" "fmt" "io" "net" C "github.com/Dreamacro/clash/constant" "github.com/Dreamacro/go-shadowsocks2/socks" ) // Socks5Adapter is a shadowsocks adapter type Socks5Adapter struct { conn net.Conn } // Close is used to close connection func (ss *Socks5Adapter) Close() { ss.conn.Close() } func (ss *Socks5Adapter) Conn() net.Conn { return ss.conn } type Socks5 struct { addr string name string tls bool skipCertVerify bool } type Socks5Option struct { Name string `proxy:"name"` Server string `proxy:"server"` Port int `proxy:"port"` TLS bool `proxy:"tls,omitempty"` SkipCertVerify bool `proxy:"skip-cert-verify,omitempty"` } func (ss *Socks5) Name() string { return ss.name } func (ss *Socks5) Type() C.AdapterType { return C.Socks5 } func (ss *Socks5) Generator(metadata *C.Metadata) (adapter C.ProxyAdapter, err error) { c, err := net.DialTimeout("tcp", ss.addr, tcpTimeout) if err == nil && ss.tls { tlsConfig := tls.Config{ InsecureSkipVerify: ss.skipCertVerify, MaxVersion: tls.VersionTLS12, } c = tls.Client(c, &tlsConfig) } if err != nil { return nil, fmt.Errorf("%s connect error", ss.addr) } tcpKeepAlive(c) if err := ss.shakeHand(metadata, c); err != nil { return nil, err } return &Socks5Adapter{conn: c}, nil } func (ss *Socks5) shakeHand(metadata *C.Metadata, rw io.ReadWriter) error { buf := make([]byte, socks.MaxAddrLen) // VER, CMD, RSV _, err := rw.Write([]byte{5, 1, 0}) if err != nil { return err } if _, err := io.ReadFull(rw, buf[:2]); err != nil { return err } if buf[0] != 5 { return errors.New("SOCKS version error") } else if buf[1] != 0 { return errors.New("SOCKS need auth") } // VER, CMD, RSV, ADDR if _, err := rw.Write(bytes.Join([][]byte{{5, 1, 0}, serializesSocksAddr(metadata)}, []byte(""))); err != nil { return err } if _, err := io.ReadFull(rw, buf[:10]); err != nil { return err } return nil } func NewSocks5(option Socks5Option) *Socks5 { return &Socks5{ addr: fmt.Sprintf("%s:%d", option.Server, option.Port), name: option.Name, tls: option.TLS, skipCertVerify: option.SkipCertVerify, } }