More meaningful logs

pull/27/head
V2Ray 2015-09-18 13:19:12 +02:00
parent b000850370
commit d1811c019f
3 changed files with 28 additions and 29 deletions

View File

@ -24,9 +24,9 @@ func (vconn *FreedomConnection) Start(ray core.OutboundRay) error {
conn, err := net.Dial("tcp", vconn.dest.String()) conn, err := net.Dial("tcp", vconn.dest.String())
if err != nil { if err != nil {
close(output) close(output)
return log.Error("Failed to open tcp: %s : %v", vconn.dest.String(), err) return log.Error("Freedom: Failed to open tcp connection: %s : %v", vconn.dest.String(), err)
} }
log.Debug("Sending outbound tcp: %s", vconn.dest.String()) log.Info("Freedom: Sending outbound tcp: %s", vconn.dest.String())
readFinish := make(chan bool) readFinish := make(chan bool)
writeFinish := make(chan bool) writeFinish := make(chan bool)
@ -39,21 +39,18 @@ func (vconn *FreedomConnection) Start(ray core.OutboundRay) error {
func (vconn *FreedomConnection) DumpInput(conn net.Conn, input <-chan []byte, finish chan<- bool) { func (vconn *FreedomConnection) DumpInput(conn net.Conn, input <-chan []byte, finish chan<- bool) {
v2net.ChanToWriter(conn, input) v2net.ChanToWriter(conn, input)
log.Debug("Freedom closing input")
finish <- true finish <- true
} }
func (vconn *FreedomConnection) DumpOutput(conn net.Conn, output chan<- []byte, finish chan<- bool) { func (vconn *FreedomConnection) DumpOutput(conn net.Conn, output chan<- []byte, finish chan<- bool) {
v2net.ReaderToChan(output, conn) v2net.ReaderToChan(output, conn)
close(output) close(output)
log.Debug("Freedom closing output")
finish <- true finish <- true
} }
func (vconn *FreedomConnection) CloseConn(conn net.Conn, readFinish <-chan bool, writeFinish <-chan bool) { func (vconn *FreedomConnection) CloseConn(conn net.Conn, readFinish <-chan bool, writeFinish <-chan bool) {
<-writeFinish <-writeFinish
if tcpConn, ok := conn.(*net.TCPConn); ok { if tcpConn, ok := conn.(*net.TCPConn); ok {
log.Debug("Closing freedom write.")
tcpConn.CloseWrite() tcpConn.CloseWrite()
} }
<-readFinish <-readFinish

View File

@ -55,10 +55,10 @@ func (handler *VMessInboundHandler) HandleConnection(connection net.Conn) error
request, err := reader.Read(connection) request, err := reader.Read(connection)
if err != nil { if err != nil {
log.Debug("Failed to parse VMess request: %v", err) log.Warning("VMessIn: Invalid request from (%s): %v", connection.RemoteAddr().String(), err)
return err return err
} }
log.Debug("Received request for %s", request.Address.String()) log.Debug("VMessIn: Received request for %s", request.Address.String())
ray := handler.vPoint.NewInboundConnectionAccepted(request.Address) ray := handler.vPoint.NewInboundConnectionAccepted(request.Address)
input := ray.InboundInput() input := ray.InboundInput()
@ -75,7 +75,7 @@ func (handler *VMessInboundHandler) HandleConnection(connection net.Conn) error
response := vmessio.NewVMessResponse(request) response := vmessio.NewVMessResponse(request)
responseWriter, err := v2io.NewAesEncryptWriter(responseKey[:], responseIV[:], connection) responseWriter, err := v2io.NewAesEncryptWriter(responseKey[:], responseIV[:], connection)
if err != nil { if err != nil {
return log.Error("Failed to create encrypt writer: %v", err) return log.Error("VMessIn: Failed to create encrypt writer: %v", err)
} }
// Optimize for small response packet // Optimize for small response packet
@ -90,7 +90,6 @@ func (handler *VMessInboundHandler) HandleConnection(connection net.Conn) error
} }
if tcpConn, ok := connection.(*net.TCPConn); ok { if tcpConn, ok := connection.(*net.TCPConn); ok {
log.Debug("VMessIn closing write")
tcpConn.CloseWrite() tcpConn.CloseWrite()
} }
<-readFinish <-readFinish
@ -104,7 +103,7 @@ func handleInput(request *vmessio.VMessRequest, reader io.Reader, input chan<- [
requestReader, err := v2io.NewAesDecryptReader(request.RequestKey[:], request.RequestIV[:], reader) requestReader, err := v2io.NewAesDecryptReader(request.RequestKey[:], request.RequestIV[:], reader)
if err != nil { if err != nil {
log.Error("Failed to create decrypt reader: %v", err) log.Error("VMessIn: Failed to create decrypt reader: %v", err)
return return
} }
@ -122,13 +121,13 @@ type VMessInboundHandlerFactory struct {
func (factory *VMessInboundHandlerFactory) Create(vp *core.Point, rawConfig []byte) (core.InboundConnectionHandler, error) { func (factory *VMessInboundHandlerFactory) Create(vp *core.Point, rawConfig []byte) (core.InboundConnectionHandler, error) {
config, err := loadInboundConfig(rawConfig) config, err := loadInboundConfig(rawConfig)
if err != nil { if err != nil {
panic(log.Error("Failed to load VMess inbound config: %v", err)) panic(log.Error("VMessIn: Failed to load VMess inbound config: %v", err))
} }
allowedClients := core.NewTimedUserSet() allowedClients := core.NewTimedUserSet()
for _, client := range config.AllowedClients { for _, client := range config.AllowedClients {
user, err := client.ToUser() user, err := client.ToUser()
if err != nil { if err != nil {
panic(log.Error("Failed to parse user id %s: %v", client.Id, err)) panic(log.Error("VMessIn: Failed to parse user id %s: %v", client.Id, err))
} }
allowedClients.AddUser(user) allowedClients.AddUser(user)
} }

View File

@ -1,6 +1,7 @@
package vmess package vmess
import ( import (
"bytes"
"crypto/md5" "crypto/md5"
"crypto/rand" "crypto/rand"
mrand "math/rand" mrand "math/rand"
@ -38,13 +39,13 @@ func NewVMessOutboundHandler(vp *core.Point, vNextList []VNextServer, dest v2net
func (handler *VMessOutboundHandler) pickVNext() (v2net.Address, core.User) { func (handler *VMessOutboundHandler) pickVNext() (v2net.Address, core.User) {
vNextLen := len(handler.vNextList) vNextLen := len(handler.vNextList)
if vNextLen == 0 { if vNextLen == 0 {
panic("Zero vNext is configured.") panic("VMessOut: Zero vNext is configured.")
} }
vNextIndex := mrand.Intn(vNextLen) vNextIndex := mrand.Intn(vNextLen)
vNext := handler.vNextList[vNextIndex] vNext := handler.vNextList[vNextIndex]
vNextUserLen := len(vNext.Users) vNextUserLen := len(vNext.Users)
if vNextUserLen == 0 { if vNextUserLen == 0 {
panic("Zero User account.") panic("VMessOut: Zero User account.")
} }
vNextUserIndex := mrand.Intn(vNextUserLen) vNextUserIndex := mrand.Intn(vNextUserLen)
vNextUser := vNext.Users[vNextUserIndex] vNextUser := vNext.Users[vNextUserIndex]
@ -73,14 +74,12 @@ func startCommunicate(request *vmessio.VMessRequest, dest v2net.Address, ray cor
output := ray.OutboundOutput() output := ray.OutboundOutput()
conn, err := net.DialTCP("tcp", nil, &net.TCPAddr{dest.IP, int(dest.Port), ""}) conn, err := net.DialTCP("tcp", nil, &net.TCPAddr{dest.IP, int(dest.Port), ""})
log.Debug("VMessOutbound dialing tcp: %s", dest.String())
if err != nil { if err != nil {
log.Error("Failed to open tcp (%s): %v", dest.String(), err) log.Error("Failed to open tcp (%s): %v", dest.String(), err)
close(output) close(output)
return err return err
} }
log.Info("VMessOut: Tunneling request for %s", request.Address.String())
log.Debug("VMessOut: Tunneling request for %s", request.Address.String())
defer conn.Close() defer conn.Close()
@ -96,17 +95,18 @@ func startCommunicate(request *vmessio.VMessRequest, dest v2net.Address, ray cor
return nil return nil
} }
func handleRequest(conn *net.TCPConn, request *vmessio.VMessRequest, input <-chan []byte, finish chan<- bool) error { func handleRequest(conn *net.TCPConn, request *vmessio.VMessRequest, input <-chan []byte, finish chan<- bool) {
defer close(finish) defer close(finish)
encryptRequestWriter, err := v2io.NewAesEncryptWriter(request.RequestKey[:], request.RequestIV[:], conn) encryptRequestWriter, err := v2io.NewAesEncryptWriter(request.RequestKey[:], request.RequestIV[:], conn)
if err != nil { if err != nil {
log.Error("Failed to create encrypt writer: %v", err) log.Error("VMessOut: Failed to create encrypt writer: %v", err)
return err return
} }
buffer, err := request.ToBytes(v2hash.NewTimeHash(v2hash.HMACHash{}), v2math.GenerateRandomInt64InRange) buffer, err := request.ToBytes(v2hash.NewTimeHash(v2hash.HMACHash{}), v2math.GenerateRandomInt64InRange)
if err != nil { if err != nil {
log.Error("VMessOut: Failed to serialize VMess request: %v", err) log.Error("VMessOut: Failed to serialize VMess request: %v", err)
return
} }
// Send first packet of payload together with request, in favor of small requests. // Send first packet of payload together with request, in favor of small requests.
@ -118,14 +118,15 @@ func handleRequest(conn *net.TCPConn, request *vmessio.VMessRequest, input <-cha
_, err = conn.Write(buffer) _, err = conn.Write(buffer)
if err != nil { if err != nil {
log.Error("VMessOut: Failed to write VMess request: %v", err) log.Error("VMessOut: Failed to write VMess request: %v", err)
return
} }
v2net.ChanToWriter(encryptRequestWriter, input) v2net.ChanToWriter(encryptRequestWriter, input)
} }
return nil return
} }
func handleResponse(conn *net.TCPConn, request *vmessio.VMessRequest, output chan<- []byte, finish chan<- bool) error { func handleResponse(conn *net.TCPConn, request *vmessio.VMessRequest, output chan<- []byte, finish chan<- bool) {
defer close(finish) defer close(finish)
defer close(output) defer close(output)
responseKey := md5.Sum(request.RequestKey[:]) responseKey := md5.Sum(request.RequestKey[:])
@ -133,21 +134,23 @@ func handleResponse(conn *net.TCPConn, request *vmessio.VMessRequest, output cha
decryptResponseReader, err := v2io.NewAesDecryptReader(responseKey[:], responseIV[:], conn) decryptResponseReader, err := v2io.NewAesDecryptReader(responseKey[:], responseIV[:], conn)
if err != nil { if err != nil {
log.Error("Failed to create decrypt reader: %v", err) log.Error("VMessOut: Failed to create decrypt reader: %v", err)
return err return
} }
response := vmessio.VMessResponse{} response := vmessio.VMessResponse{}
nBytes, err := decryptResponseReader.Read(response[:]) nBytes, err := decryptResponseReader.Read(response[:])
if err != nil { if err != nil {
log.Error("Failed to read VMess response (%d bytes): %v", nBytes, err) log.Error("VMessOut: Failed to read VMess response (%d bytes): %v", nBytes, err)
return err return
}
if !bytes.Equal(response[:], request.ResponseHeader[:]) {
log.Warning("VMessOut: unexepcted response header. The connection is probably hijacked.")
return
} }
log.Debug("Got response %v", response)
// TODO: check response
v2net.ReaderToChan(output, decryptResponseReader) v2net.ReaderToChan(output, decryptResponseReader)
return nil return
} }
type VMessOutboundHandlerFactory struct { type VMessOutboundHandlerFactory struct {