1 Star 0 Fork 0

lqinggang/psiphon-tunnel-core

加入 Gitee
与超过 1200万 开发者一起发现、参与优秀开源项目,私有仓库也完全免费 :)
免费加入
文件
克隆/下载
config.go 40.16 KB
一键复制 编辑 原始数据 按行查看 历史
12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273747576777879808182838485868788899091929394959697989910010110210310410510610710810911011111211311411511611711811912012112212312412512612712812913013113213313413513613713813914014114214314414514614714814915015115215315415515615715815916016116216316416516616716816917017117217317417517617717817918018118218318418518618718818919019119219319419519619719819920020120220320420520620720820921021121221321421521621721821922022122222322422522622722822923023123223323423523623723823924024124224324424524624724824925025125225325425525625725825926026126226326426526626726826927027127227327427527627727827928028128228328428528628728828929029129229329429529629729829930030130230330430530630730830931031131231331431531631731831932032132232332432532632732832933033133233333433533633733833934034134234334434534634734834935035135235335435535635735835936036136236336436536636736836937037137237337437537637737837938038138238338438538638738838939039139239339439539639739839940040140240340440540640740840941041141241341441541641741841942042142242342442542642742842943043143243343443543643743843944044144244344444544644744844945045145245345445545645745845946046146246346446546646746846947047147247347447547647747847948048148248348448548648748848949049149249349449549649749849950050150250350450550650750850951051151251351451551651751851952052152252352452552652752852953053153253353453553653753853954054154254354454554654754854955055155255355455555655755855956056156256356456556656756856957057157257357457557657757857958058158258358458558658758858959059159259359459559659759859960060160260360460560660760860961061161261361461561661761861962062162262362462562662762862963063163263363463563663763863964064164264364464564664764864965065165265365465565665765865966066166266366466566666766866967067167267367467567667767867968068168268368468568668768868969069169269369469569669769869970070170270370470570670770870971071171271371471571671771871972072172272372472572672772872973073173273373473573673773873974074174274374474574674774874975075175275375475575675775875976076176276376476576676776876977077177277377477577677777877978078178278378478578678778878979079179279379479579679779879980080180280380480580680780880981081181281381481581681781881982082182282382482582682782882983083183283383483583683783883984084184284384484584684784884985085185285385485585685785885986086186286386486586686786886987087187287387487587687787887988088188288388488588688788888989089189289389489589689789889990090190290390490590690790890991091191291391491591691791891992092192292392492592692792892993093193293393493593693793893994094194294394494594694794894995095195295395495595695795895996096196296396496596696796896997097197297397497597697797897998098198298398498598698798898999099199299399499599699799899910001001100210031004100510061007100810091010101110121013101410151016101710181019102010211022102310241025102610271028102910301031103210331034103510361037103810391040104110421043104410451046104710481049105010511052105310541055105610571058105910601061106210631064106510661067
/*
* Copyright (c) 2015, Psiphon Inc.
* All rights reserved.
*
* This program is free software: you can redistribute it and/or modify
* it under the terms of the GNU General Public License as published by
* the Free Software Foundation, either version 3 of the License, or
* (at your option) any later version.
*
* This program is distributed in the hope that it will be useful,
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
* GNU General Public License for more details.
*
* You should have received a copy of the GNU General Public License
* along with this program. If not, see <http://www.gnu.org/licenses/>.
*
*/
package psiphon
import (
"encoding/base64"
"encoding/json"
"errors"
"fmt"
"net/http"
"os"
"strconv"
"strings"
"sync"
"unicode"
"github.com/Psiphon-Labs/psiphon-tunnel-core/psiphon/common"
"github.com/Psiphon-Labs/psiphon-tunnel-core/psiphon/common/parameters"
"github.com/Psiphon-Labs/psiphon-tunnel-core/psiphon/common/protocol"
)
const (
TUNNEL_POOL_SIZE = 1
)
// Config is the Psiphon configuration specified by the application. This
// configuration controls the behavior of the core tunnel functionality.
//
// To distinguish omitted timeout params from explicit 0 value timeout params,
// corresponding fieldss are int pointers. nil means no value was supplied and
// to use the default; a non-nil pointer to 0 means no timeout.
type Config struct {
// DataStoreDirectory is the directory in which to store the persistent
// database, which contains information such as server entries. By
// default, current working directory.
//
// Warning: If the datastore file, DataStoreDirectory/DATA_STORE_FILENAME,
// exists but fails to open for any reason (checksum error, unexpected
// file format, etc.) it will be deleted in order to pave a new datastore
// and continue running.
DataStoreDirectory string
// PropagationChannelId is a string identifier which indicates how the
// Psiphon client was distributed. This parameter is required. This value
// is supplied by and depends on the Psiphon Network, and is typically
// embedded in the client binary.
PropagationChannelId string
// SponsorId is a string identifier which indicates who is sponsoring this
// Psiphon client. One purpose of this value is to determine the home
// pages for display. This parameter is required. This value is supplied
// by and depends on the Psiphon Network, and is typically embedded in the
// client binary.
SponsorId string
// ClientVersion is the client version number that the client reports to
// the server. The version number refers to the host client application,
// not the core tunnel library. One purpose of this value is to enable
// automatic updates. This value is supplied by and depends on the Psiphon
// Network, and is typically embedded in the client binary.
//
// Note that sending a ClientPlatform string which includes "windows"
// (case insensitive) and a ClientVersion of <= 44 will cause an error in
// processing the response to DoConnectedRequest calls.
ClientVersion string
// ClientPlatform is the client platform ("Windows", "Android", etc.) that
// the client reports to the server.
ClientPlatform string
// TunnelWholeDevice is a flag that is passed through to the handshake
// request for stats purposes. Set to 1 when the host application is
// tunneling the whole device, 0 otherwise.
TunnelWholeDevice int
// EgressRegion is a ISO 3166-1 alpha-2 country code which indicates which
// country to egress from. For the default, "", the best performing server
// in any country is selected.
EgressRegion string
// ListenInterface specifies which interface to listen on. If no
// interface is provided then listen on 127.0.0.1. If 'any' is provided
// then use 0.0.0.0. If there are multiple IP addresses on an interface
// use the first IPv4 address.
ListenInterface string
// DisableLocalSocksProxy disables running the local SOCKS proxy.
DisableLocalSocksProxy bool
// LocalSocksProxyPort specifies a port number for the local SOCKS proxy
// running at 127.0.0.1. For the default value, 0, the system selects a
// free port (a notice reporting the selected port is emitted).
LocalSocksProxyPort int
// LocalHttpProxyPort specifies a port number for the local HTTP proxy
// running at 127.0.0.1. For the default value, 0, the system selects a
// free port (a notice reporting the selected port is emitted).
LocalHttpProxyPort int
// DisableLocalHTTPProxy disables running the local HTTP proxy.
DisableLocalHTTPProxy bool
// NetworkLatencyMultiplier is a multiplier that is to be applied to
// default network event timeouts. Set this to tune performance for
// slow networks.
// When set, must be >= 1.0.
NetworkLatencyMultiplier float64
// TunnelProtocol indicates which protocol to use. For the default, "",
// all protocols are used.
//
// Deprecated: Use LimitTunnelProtocols. When LimitTunnelProtocols is not
// nil, this parameter is ignored.
TunnelProtocol string
// LimitTunnelProtocols indicates which protocols to use. Valid values
// include:
// "SSH", "OSSH", "UNFRONTED-MEEK-OSSH", "UNFRONTED-MEEK-HTTPS-OSSH",
// "UNFRONTED-MEEK-SESSION-TICKET-OSSH", "FRONTED-MEEK-OSSH",
// "FRONTED-MEEK-HTTP-OSSH", "QUIC-OSSH", "MARIONETTE-OSSH", and
// "TAPDANCE-OSSH".
// For the default, an empty list, all protocols are used.
LimitTunnelProtocols []string
// InitialLimitTunnelProtocols is an optional initial phase of limited
// protocols for the first InitialLimitTunnelProtocolsCandidateCount
// candidates; after these candidates, LimitTunnelProtocols applies.
//
// For the default, an empty list, InitialLimitTunnelProtocols is off.
InitialLimitTunnelProtocols []string
// InitialLimitTunnelProtocolsCandidateCount is the number of candidates
// to which InitialLimitTunnelProtocols is applied instead of
// LimitTunnelProtocols.
//
// For the default, 0, InitialLimitTunnelProtocols is off.
InitialLimitTunnelProtocolsCandidateCount int
// LimitTLSProfiles indicates which TLS profiles to select from. Valid
// values are listed in protocols.SupportedTLSProfiles.
// For the default, an empty list, all profiles are candidates for
// selection.
LimitTLSProfiles []string
// LimitQUICVersions indicates which QUIC versions to select from. Valid
// values are listed in protocols.SupportedQUICVersions.
// For the default, an empty list, all versions are candidates for
// selection.
LimitQUICVersions []string
// EstablishTunnelTimeoutSeconds specifies a time limit after which to
// halt the core tunnel controller if no tunnel has been established. The
// default is parameters.EstablishTunnelTimeout.
EstablishTunnelTimeoutSeconds *int
// EstablishTunnelPausePeriodSeconds specifies the delay between attempts
// to establish tunnels. Briefly pausing allows for network conditions to
// improve and for asynchronous operations such as fetch remote server
// list to complete. If omitted, a default value is used. This value is
// typical overridden for testing.
EstablishTunnelPausePeriodSeconds *int
// EstablishTunnelPausePeriodSeconds specifies the grace period, or head
// start, provided to the affinity server candidate when establishing. The
// affinity server is the server used for the last established tunnel.
EstablishTunnelServerAffinityGracePeriodMilliseconds *int
// ConnectionWorkerPoolSize specifies how many connection attempts to
// attempt in parallel. If omitted of when 0, a default is used; this is
// recommended.
ConnectionWorkerPoolSize int
// TunnelPoolSize specifies how many tunnels to run in parallel. Port
// forwards are multiplexed over multiple tunnels. If omitted or when 0,
// the default is TUNNEL_POOL_SIZE, which is recommended.
TunnelPoolSize int
// StaggerConnectionWorkersMilliseconds adds a specified delay before
// making each server candidate available to connection workers. This
// option is enabled when StaggerConnectionWorkersMilliseconds > 0.
StaggerConnectionWorkersMilliseconds int
// LimitIntensiveConnectionWorkers limits the number of concurrent
// connection workers attempting connections with resource intensive
// protocols. This option is enabled when LimitIntensiveConnectionWorkers
// > 0.
LimitIntensiveConnectionWorkers int
// LimitMeekBufferSizes selects smaller buffers for meek protocols.
LimitMeekBufferSizes bool
// IgnoreHandshakeStatsRegexps skips compiling and using stats regexes.
IgnoreHandshakeStatsRegexps bool
// UpstreamProxyURL is a URL specifying an upstream proxy to use for all
// outbound connections. The URL should include proxy type and
// authentication information, as required. See example URLs here:
// https://github.com/Psiphon-Labs/psiphon-tunnel-core/tree/master/psiphon/upstreamproxy
UpstreamProxyURL string
// CustomHeaders is a set of additional arbitrary HTTP headers that are
// added to all plaintext HTTP requests and requests made through an HTTP
// upstream proxy when specified by UpstreamProxyURL.
CustomHeaders http.Header
// Deprecated: Use CustomHeaders. When CustomHeaders is not nil, this
// parameter is ignored.
UpstreamProxyCustomHeaders http.Header
// NetworkConnectivityChecker is an interface that enables tunnel-core to
// call into the host application to check for network connectivity. See:
// NetworkConnectivityChecker doc.
//
// This parameter is only applicable to library deployments.
NetworkConnectivityChecker NetworkConnectivityChecker
// DeviceBinder is an interface that enables tunnel-core to call into the
// host application to bind sockets to specific devices. See: DeviceBinder
// doc.
//
// This parameter is only applicable to library deployments.
DeviceBinder DeviceBinder
// IPv6Synthesizer is an interface that allows tunnel-core to call into
// the host application to synthesize IPv6 addresses. See: IPv6Synthesizer
// doc.
//
// This parameter is only applicable to library deployments.
IPv6Synthesizer IPv6Synthesizer
// DnsServerGetter is an interface that enables tunnel-core to call into
// the host application to discover the native network DNS server
// settings. See: DnsServerGetter doc.
//
// This parameter is only applicable to library deployments.
DnsServerGetter DnsServerGetter
// NetworkIDGetter in an interface that enables tunnel-core to call into
// the host application to get an identifier for the host's current active
// network. See: NetworkIDGetter doc.
//
// This parameter is only applicable to library deployments.
NetworkIDGetter NetworkIDGetter
// NetworkID, when not blank, is used as the identifier for the host's
// current active network.
// NetworkID is ignored when NetworkIDGetter is set.
NetworkID string
// DisableTactics disables tactics operations including requests, payload
// handling, and application of parameters.
DisableTactics bool
// TransformHostNames specifies whether to use hostname transformation
// circumvention strategies. Set to "always" to always transform, "never"
// to never transform, and "", the default, for the default transformation
// strategy.
TransformHostNames string
// TargetServerEntry is an encoded server entry. When specified, this
// server entry is used exclusively and all other known servers are
// ignored.
TargetServerEntry string
// DisableApi disables Psiphon server API calls including handshake,
// connected, status, etc. This is used for special case temporary tunnels
// (Windows VPN mode).
DisableApi bool
// TargetApiProtocol specifies whether to force use of "ssh" or "web" API
// protocol. When blank, the default, the optimal API protocol is used.
// Note that this capability check is not applied before the
// "CandidateServers" count is emitted.
//
// This parameter is intended for testing and debugging only. Not all
// parameters are supported in the legacy "web" API protocol, including
// speed test samples.
TargetApiProtocol string
// RemoteServerListUrl is a URL which specifies a location to fetch out-
// of-band server entries. This facility is used when a tunnel cannot be
// established to known servers. This value is supplied by and depends on
// the Psiphon Network, and is typically embedded in the client binary.
//
// Deprecated: Use RemoteServerListURLs. When RemoteServerListURLs is not
// nil, this parameter is ignored.
RemoteServerListUrl string
// RemoteServerListURLs is list of URLs which specify locations to fetch
// out-of-band server entries. This facility is used when a tunnel cannot
// be established to known servers. This value is supplied by and depends
// on the Psiphon Network, and is typically embedded in the client binary.
// All URLs must point to the same entity with the same ETag. At least one
// DownloadURL must have OnlyAfterAttempts = 0.
RemoteServerListURLs parameters.DownloadURLs
// RemoteServerListDownloadFilename specifies a target filename for
// storing the remote server list download. Data is stored in co-located
// files (RemoteServerListDownloadFilename.part*) to allow for resumable
// downloading.
RemoteServerListDownloadFilename string
// RemoteServerListSignaturePublicKey specifies a public key that's used
// to authenticate the remote server list payload. This value is supplied
// by and depends on the Psiphon Network, and is typically embedded in the
// client binary.
RemoteServerListSignaturePublicKey string
// DisableRemoteServerListFetcher disables fetching remote server lists.
// This is used for special case temporary tunnels.
DisableRemoteServerListFetcher bool
// FetchRemoteServerListRetryPeriodMilliseconds specifies the delay before
// resuming a remote server list download after a failure. If omitted, a
// default value is used. This value is typical overridden for testing.
FetchRemoteServerListRetryPeriodMilliseconds *int
// ObfuscatedServerListRootURL is a URL which specifies the root location
// from which to fetch obfuscated server list files. This value is
// supplied by and depends on the Psiphon Network, and is typically
// embedded in the client binary.
//
// Deprecated: Use ObfuscatedServerListRootURLs. When
// ObfuscatedServerListRootURLs is not nil, this parameter is ignored.
ObfuscatedServerListRootURL string
// ObfuscatedServerListRootURLs is a list of URLs which specify root
// locations from which to fetch obfuscated server list files. This value
// is supplied by and depends on the Psiphon Network, and is typically
// embedded in the client binary. All URLs must point to the same entity
// with the same ETag. At least one DownloadURL must have
// OnlyAfterAttempts = 0.
ObfuscatedServerListRootURLs parameters.DownloadURLs
// ObfuscatedServerListDownloadDirectory specifies a target directory for
// storing the obfuscated remote server list downloads. Data is stored in
// co-located files (<OSL filename>.part*) to allow for resumable
// downloading.
ObfuscatedServerListDownloadDirectory string
// SplitTunnelRoutesURLFormat is a URL which specifies the location of a
// routes file to use for split tunnel mode. The URL must include a
// placeholder for the client region to be supplied. Split tunnel mode
// uses the routes file to classify port forward destinations as foreign
// or domestic and does not tunnel domestic destinations. Split tunnel
// mode is on when all the SplitTunnel parameters are supplied. This value
// is supplied by and depends on the Psiphon Network, and is typically
// embedded in the client binary.
SplitTunnelRoutesURLFormat string
// SplitTunnelRoutesSignaturePublicKey specifies a public key that's used
// to authenticate the split tunnel routes payload. This value is supplied
// by and depends on the Psiphon Network, and is typically embedded in the
// client binary.
SplitTunnelRoutesSignaturePublicKey string
// SplitTunnelDNSServer specifies a DNS server to use when resolving port
// forward target domain names to IP addresses for classification. The DNS
// server must support TCP requests.
SplitTunnelDNSServer string
// UpgradeDownloadUrl specifies a URL from which to download a host client
// upgrade file, when one is available. The core tunnel controller
// provides a resumable download facility which downloads this resource
// and emits a notice when complete. This value is supplied by and depends
// on the Psiphon Network, and is typically embedded in the client binary.
//
// Deprecated: Use UpgradeDownloadURLs. When UpgradeDownloadURLs is not
// nil, this parameter is ignored.
UpgradeDownloadUrl string
// UpgradeDownloadURLs is list of URLs which specify locations from which
// to download a host client upgrade file, when one is available. The core
// tunnel controller provides a resumable download facility which
// downloads this resource and emits a notice when complete. This value is
// supplied by and depends on the Psiphon Network, and is typically
// embedded in the client binary. All URLs must point to the same entity
// with the same ETag. At least one DownloadURL must have
// OnlyAfterAttempts = 0.
UpgradeDownloadURLs parameters.DownloadURLs
// UpgradeDownloadClientVersionHeader specifies the HTTP header name for
// the entity at UpgradeDownloadURLs which specifies the client version
// (an integer value). A HEAD request may be made to check the version
// number available at UpgradeDownloadURLs.
// UpgradeDownloadClientVersionHeader is required when UpgradeDownloadURLs
// is specified.
UpgradeDownloadClientVersionHeader string
// UpgradeDownloadFilename is the local target filename for an upgrade
// download. This parameter is required when UpgradeDownloadURLs (or
// UpgradeDownloadUrl) is specified. Data is stored in co-located files
// (UpgradeDownloadFilename.part*) to allow for resumable downloading.
UpgradeDownloadFilename string
// FetchUpgradeRetryPeriodMilliseconds specifies the delay before resuming
// a client upgrade download after a failure. If omitted, a default value
// is used. This value is typical overridden for testing.
FetchUpgradeRetryPeriodMilliseconds *int
// EmitBytesTransferred indicates whether to emit periodic notices showing
// bytes sent and received.
EmitBytesTransferred bool
// TrustedCACertificatesFilename specifies a file containing trusted CA
// certs. When set, this toggles use of the trusted CA certs, specified in
// TrustedCACertificatesFilename, for tunneled TLS connections that expect
// server certificates signed with public certificate authorities
// (currently, only upgrade downloads). This option is used with stock Go
// TLS in cases where Go may fail to obtain a list of root CAs from the
// operating system.
TrustedCACertificatesFilename string
// DisablePeriodicSshKeepAlive indicates whether to send an SSH keepalive
// every 1-2 minutes, when the tunnel is idle. If the SSH keepalive times
// out, the tunnel is considered to have failed.
DisablePeriodicSshKeepAlive bool
// DeviceRegion is the optional, reported region the host device is
// running in. This input value should be a ISO 3166-1 alpha-2 country
// code. The device region is reported to the server in the connected
// request and recorded for Psiphon stats.
//
// When provided, this value may be used, pre-connection, to select
// performance or circumvention optimization strategies for the given
// region.
DeviceRegion string
// EmitDiagnosticNotices indicates whether to output notices containing
// detailed information about the Psiphon session. As these notices may
// contain sensitive network information, they should not be insecurely
// distributed or displayed to users. Default is off.
EmitDiagnosticNotices bool
// RateLimits specify throttling configuration for the tunnel.
RateLimits common.RateLimits
// EmitSLOKs indicates whether to emit notices for each seeded SLOK. As
// this could reveal user browsing activity, it's intended for debugging
// and testing only.
EmitSLOKs bool
// PacketTunnelTunDeviceFileDescriptor specifies a tun device file
// descriptor to use for running a packet tunnel. When this value is > 0,
// a packet tunnel is established through the server and packets are
// relayed via the tun device file descriptor. The file descriptor is
// duped in NewController. When PacketTunnelTunDeviceFileDescriptor is
// set, TunnelPoolSize must be 1.
PacketTunnelTunFileDescriptor int
// SessionID specifies a client session ID to use in the Psiphon API. The
// session ID should be a randomly generated value that is used only for a
// single session, which is defined as the period between a user starting
// a Psiphon client and stopping the client.
//
// A session ID must be 32 hex digits (lower case). When blank, a random
// session ID is automatically generated. Supply a session ID when a
// single client session will cross multiple Controller instances.
SessionID string
// Authorizations is a list of encoded, signed access control
// authorizations that the client has obtained and will present to the
// server.
Authorizations []string
// UseFragmentor and associated Fragmentor fields are for testing
// purposes.
UseFragmentor string
FragmentorMinTotalBytes *int
FragmentorMaxTotalBytes *int
FragmentorMinWriteBytes *int
FragmentorMaxWriteBytes *int
FragmentorMinDelayMicroseconds *int
FragmentorMaxDelayMicroseconds *int
// ObfuscatedSSHAlgorithms and associated ObfuscatedSSH fields are for
// testing purposes. If specified, ObfuscatedSSHAlgorithms must have 4 SSH
// KEX elements in order: the kex algorithm, cipher, MAC, and server host
// key algorithm.
ObfuscatedSSHAlgorithms []string
ObfuscatedSSHMinPadding *int
ObfuscatedSSHMaxPadding *int
// LivenessTestMinUpstreamBytes and other LivenessTest fields are for
// testing purposes.
LivenessTestMinUpstreamBytes *int
LivenessTestMaxUpstreamBytes *int
LivenessTestMinDownstreamBytes *int
LivenessTestMaxDownstreamBytes *int
// ReplayCandidateCount and other Replay fields are for
// testing purposes.
ReplayCandidateCount *int
ReplayDialParametersTTLSeconds *int
// clientParameters is the active ClientParameters with defaults, config
// values, and, optionally, tactics applied.
//
// New tactics must be applied by calling Config.SetClientParameters;
// calling clientParameters.Set directly will fail to add config values.
clientParameters *parameters.ClientParameters
dynamicConfigMutex sync.Mutex
sponsorID string
authorizations []string
deviceBinder DeviceBinder
networkIDGetter NetworkIDGetter
committed bool
}
// LoadConfig parses a JSON format Psiphon config JSON string and returns a
// Config struct populated with config values.
//
// The Config struct may then be programmatically populated with additional
// values, including callbacks such as DeviceBinder.
//
// Before using the Config, Commit must be called, which will perform further
// validation and initialize internal data structures.
func LoadConfig(configJson []byte) (*Config, error) {
var config Config
err := json.Unmarshal(configJson, &config)
if err != nil {
return nil, common.ContextError(err)
}
return &config, nil
}
// IsCommitted checks if Commit was called.
func (config *Config) IsCommitted() bool {
return config.committed
}
// Commit validates Config fields finalizes initialization.
//
// Config fields should not be set after calling Config, as any changes may
// not be reflected in internal data structures.
func (config *Config) Commit() error {
// Do SetEmitDiagnosticNotices first, to ensure config file errors are emitted.
if config.EmitDiagnosticNotices {
SetEmitDiagnosticNotices(true)
}
// Promote legacy fields.
if config.CustomHeaders == nil {
config.CustomHeaders = config.UpstreamProxyCustomHeaders
config.UpstreamProxyCustomHeaders = nil
}
if config.RemoteServerListUrl != "" && config.RemoteServerListURLs == nil {
config.RemoteServerListURLs = promoteLegacyDownloadURL(config.RemoteServerListUrl)
}
if config.ObfuscatedServerListRootURL != "" && config.ObfuscatedServerListRootURLs == nil {
config.ObfuscatedServerListRootURLs = promoteLegacyDownloadURL(config.ObfuscatedServerListRootURL)
}
if config.UpgradeDownloadUrl != "" && config.UpgradeDownloadURLs == nil {
config.UpgradeDownloadURLs = promoteLegacyDownloadURL(config.UpgradeDownloadUrl)
}
// Supply default values.
if config.DataStoreDirectory == "" {
wd, err := os.Getwd()
if err != nil {
return common.ContextError(err)
}
config.DataStoreDirectory = wd
}
if config.ClientVersion == "" {
config.ClientVersion = "0"
}
if config.TunnelPoolSize == 0 {
config.TunnelPoolSize = TUNNEL_POOL_SIZE
}
// Validate config fields.
if config.PropagationChannelId == "" {
return common.ContextError(
errors.New("propagation channel ID is missing from the configuration file"))
}
if config.SponsorId == "" {
return common.ContextError(
errors.New("sponsor ID is missing from the configuration file"))
}
_, err := strconv.Atoi(config.ClientVersion)
if err != nil {
return common.ContextError(
fmt.Errorf("invalid client version: %s", err))
}
if !common.Contains(
[]string{"", protocol.PSIPHON_SSH_API_PROTOCOL, protocol.PSIPHON_WEB_API_PROTOCOL},
config.TargetApiProtocol) {
return common.ContextError(
errors.New("invalid TargetApiProtocol"))
}
if !config.DisableRemoteServerListFetcher {
if config.RemoteServerListURLs != nil {
if config.RemoteServerListSignaturePublicKey == "" {
return common.ContextError(errors.New("missing RemoteServerListSignaturePublicKey"))
}
if config.RemoteServerListDownloadFilename == "" {
return common.ContextError(errors.New("missing RemoteServerListDownloadFilename"))
}
}
if config.ObfuscatedServerListRootURLs != nil {
if config.RemoteServerListSignaturePublicKey == "" {
return common.ContextError(errors.New("missing RemoteServerListSignaturePublicKey"))
}
if config.ObfuscatedServerListDownloadDirectory == "" {
return common.ContextError(errors.New("missing ObfuscatedServerListDownloadDirectory"))
}
}
}
if config.SplitTunnelRoutesURLFormat != "" {
if config.SplitTunnelRoutesSignaturePublicKey == "" {
return common.ContextError(errors.New("missing SplitTunnelRoutesSignaturePublicKey"))
}
if config.SplitTunnelDNSServer == "" {
return common.ContextError(errors.New("missing SplitTunnelDNSServer"))
}
}
if config.UpgradeDownloadURLs != nil {
if config.UpgradeDownloadClientVersionHeader == "" {
return common.ContextError(errors.New("missing UpgradeDownloadClientVersionHeader"))
}
if config.UpgradeDownloadFilename == "" {
return common.ContextError(errors.New("missing UpgradeDownloadFilename"))
}
}
// This constraint is expected by logic in Controller.runTunnels().
if config.PacketTunnelTunFileDescriptor > 0 && config.TunnelPoolSize != 1 {
return common.ContextError(errors.New("packet tunnel mode requires TunnelPoolSize to be 1"))
}
// SessionID must be PSIPHON_API_CLIENT_SESSION_ID_LENGTH lowercase hex-encoded bytes.
if config.SessionID == "" {
sessionID, err := MakeSessionId()
if err != nil {
return common.ContextError(err)
}
config.SessionID = sessionID
}
if len(config.SessionID) != 2*protocol.PSIPHON_API_CLIENT_SESSION_ID_LENGTH ||
-1 != strings.IndexFunc(config.SessionID, func(c rune) bool {
return !unicode.Is(unicode.ASCII_Hex_Digit, c) || unicode.IsUpper(c)
}) {
return common.ContextError(errors.New("invalid SessionID"))
}
config.clientParameters, err = parameters.NewClientParameters(
func(err error) {
NoticeAlert("ClientParameters getValue failed: %s", err)
})
if err != nil {
return common.ContextError(err)
}
if config.ObfuscatedSSHAlgorithms != nil &&
len(config.ObfuscatedSSHAlgorithms) != 4 {
// TODO: validate each algorithm?
return common.ContextError(errors.New("invalid ObfuscatedSSHAlgorithms"))
}
// clientParameters.Set will validate the config fields applied to parameters.
err = config.SetClientParameters("", false, nil)
if err != nil {
return common.ContextError(err)
}
// Set defaults for dynamic config fields.
config.SetDynamicConfig(config.SponsorId, config.Authorizations)
// Initialize config.deviceBinder and config.config.networkIDGetter. These
// wrap config.DeviceBinder and config.NetworkIDGetter/NetworkID with
// loggers.
//
// New variables are set to avoid mutating input config fields.
// Internally, code must use config.deviceBinder and
// config.networkIDGetter and not the input/exported fields.
if config.DeviceBinder != nil {
config.deviceBinder = &loggingDeviceBinder{config.DeviceBinder}
}
networkIDGetter := config.NetworkIDGetter
if networkIDGetter == nil {
// Limitation: unlike NetworkIDGetter, which calls back to platform APIs
// this method of network identification is not dynamic and will not reflect
// network changes that occur while running.
if config.NetworkID != "" {
networkIDGetter = newStaticNetworkGetter(config.NetworkID)
} else {
networkIDGetter = newStaticNetworkGetter("UNKNOWN")
}
}
config.networkIDGetter = &loggingNetworkIDGetter{networkIDGetter}
config.committed = true
return nil
}
// GetClientParameters returns a snapshot of the current client parameters.
func (config *Config) GetClientParameters() *parameters.ClientParametersSnapshot {
return config.clientParameters.Get()
}
// SetClientParameters resets Config.clientParameters to the default values,
// applies any config file values, and then applies the input parameters (from
// tactics, etc.)
//
// Set skipOnError to false when initially applying only config values, as
// this will validate the values and should fail. Set skipOnError to true when
// applying tactics to ignore invalid or unknown parameter values from tactics.
//
// In the case of applying tactics, do not call Config.clientParameters.Set
// directly as this will not first apply config values.
//
// If there is an error, the existing Config.clientParameters are left
// entirely unmodified.
func (config *Config) SetClientParameters(tag string, skipOnError bool, applyParameters map[string]interface{}) error {
setParameters := []map[string]interface{}{config.makeConfigParameters()}
if applyParameters != nil {
setParameters = append(setParameters, applyParameters)
}
counts, err := config.clientParameters.Set(tag, skipOnError, setParameters...)
if err != nil {
return common.ContextError(err)
}
NoticeInfo("applied %v parameters with tag '%s'", counts, tag)
// Emit certain individual parameter values for quick reference in diagnostics.
networkLatencyMultiplier := config.clientParameters.Get().Float(parameters.NetworkLatencyMultiplier)
if networkLatencyMultiplier != 0.0 {
NoticeInfo(
"NetworkLatencyMultiplier: %f",
config.clientParameters.Get().Float(parameters.NetworkLatencyMultiplier))
}
return nil
}
// SetDynamicConfig sets the current client sponsor ID and authorizations.
// Invalid values for sponsor ID are ignored. The caller must not modify the
// input authorizations slice.
func (config *Config) SetDynamicConfig(sponsorID string, authorizations []string) {
config.dynamicConfigMutex.Lock()
defer config.dynamicConfigMutex.Unlock()
if sponsorID != "" {
config.sponsorID = sponsorID
}
config.authorizations = authorizations
}
// GetSponsorID returns the current client sponsor ID.
func (config *Config) GetSponsorID() string {
config.dynamicConfigMutex.Lock()
defer config.dynamicConfigMutex.Unlock()
return config.sponsorID
}
// GetAuthorizations returns the current client authorizations.
// The caller must not modify the returned slice.
func (config *Config) GetAuthorizations() []string {
config.dynamicConfigMutex.Lock()
defer config.dynamicConfigMutex.Unlock()
return config.authorizations
}
// UseUpstreamProxy indicates if an upstream proxy has been
// configured.
func (config *Config) UseUpstreamProxy() bool {
return config.UpstreamProxyURL != ""
}
// GetNetworkID returns the current network ID. When NetworkIDGetter
// is set, this calls into the host application; otherwise, a default
// value is returned.
func (config *Config) GetNetworkID() string {
return config.networkIDGetter.GetNetworkID()
}
func (config *Config) makeConfigParameters() map[string]interface{} {
// Build set of config values to apply to parameters.
//
// Note: names of some config fields such as
// StaggerConnectionWorkersMilliseconds and LimitMeekBufferSizes have
// changed in the parameters. The existing config fields are retained for
// backwards compatibility.
applyParameters := make(map[string]interface{})
if config.NetworkLatencyMultiplier > 0.0 {
applyParameters[parameters.NetworkLatencyMultiplier] = config.NetworkLatencyMultiplier
}
if len(config.LimitTunnelProtocols) > 0 {
applyParameters[parameters.LimitTunnelProtocols] = protocol.TunnelProtocols(config.LimitTunnelProtocols)
} else if config.TunnelProtocol != "" {
applyParameters[parameters.LimitTunnelProtocols] = protocol.TunnelProtocols{config.TunnelProtocol}
}
if len(config.InitialLimitTunnelProtocols) > 0 && config.InitialLimitTunnelProtocolsCandidateCount > 0 {
applyParameters[parameters.InitialLimitTunnelProtocols] = protocol.TunnelProtocols(config.InitialLimitTunnelProtocols)
applyParameters[parameters.InitialLimitTunnelProtocolsCandidateCount] = config.InitialLimitTunnelProtocolsCandidateCount
}
if len(config.LimitTLSProfiles) > 0 {
applyParameters[parameters.LimitTLSProfiles] = protocol.TunnelProtocols(config.LimitTLSProfiles)
}
if len(config.LimitQUICVersions) > 0 {
applyParameters[parameters.LimitQUICVersions] = protocol.QUICVersions(config.LimitQUICVersions)
}
if config.EstablishTunnelTimeoutSeconds != nil {
applyParameters[parameters.EstablishTunnelTimeout] = fmt.Sprintf("%ds", *config.EstablishTunnelTimeoutSeconds)
}
if config.EstablishTunnelServerAffinityGracePeriodMilliseconds != nil {
applyParameters[parameters.EstablishTunnelServerAffinityGracePeriod] = fmt.Sprintf("%dms", *config.EstablishTunnelServerAffinityGracePeriodMilliseconds)
}
if config.EstablishTunnelPausePeriodSeconds != nil {
applyParameters[parameters.EstablishTunnelPausePeriod] = fmt.Sprintf("%ds", *config.EstablishTunnelPausePeriodSeconds)
}
if config.ConnectionWorkerPoolSize != 0 {
applyParameters[parameters.ConnectionWorkerPoolSize] = config.ConnectionWorkerPoolSize
}
if config.StaggerConnectionWorkersMilliseconds > 0 {
applyParameters[parameters.StaggerConnectionWorkersPeriod] = fmt.Sprintf("%dms", config.StaggerConnectionWorkersMilliseconds)
}
if config.LimitIntensiveConnectionWorkers > 0 {
applyParameters[parameters.LimitIntensiveConnectionWorkers] = config.LimitIntensiveConnectionWorkers
}
applyParameters[parameters.MeekLimitBufferSizes] = config.LimitMeekBufferSizes
applyParameters[parameters.IgnoreHandshakeStatsRegexps] = config.IgnoreHandshakeStatsRegexps
if config.EstablishTunnelTimeoutSeconds != nil {
applyParameters[parameters.EstablishTunnelTimeout] = fmt.Sprintf("%ds", *config.EstablishTunnelTimeoutSeconds)
}
if config.FetchRemoteServerListRetryPeriodMilliseconds != nil {
applyParameters[parameters.FetchRemoteServerListRetryPeriod] = fmt.Sprintf("%dms", *config.FetchRemoteServerListRetryPeriodMilliseconds)
}
if config.FetchUpgradeRetryPeriodMilliseconds != nil {
applyParameters[parameters.FetchUpgradeRetryPeriod] = fmt.Sprintf("%dms", *config.FetchUpgradeRetryPeriodMilliseconds)
}
switch config.TransformHostNames {
case "always":
applyParameters[parameters.TransformHostNameProbability] = 1.0
case "never":
applyParameters[parameters.TransformHostNameProbability] = 0.0
}
if !config.DisableRemoteServerListFetcher {
if config.RemoteServerListURLs != nil {
applyParameters[parameters.RemoteServerListSignaturePublicKey] = config.RemoteServerListSignaturePublicKey
applyParameters[parameters.RemoteServerListURLs] = config.RemoteServerListURLs
}
if config.ObfuscatedServerListRootURLs != nil {
applyParameters[parameters.RemoteServerListSignaturePublicKey] = config.RemoteServerListSignaturePublicKey
applyParameters[parameters.ObfuscatedServerListRootURLs] = config.ObfuscatedServerListRootURLs
}
}
applyParameters[parameters.SplitTunnelRoutesURLFormat] = config.SplitTunnelRoutesURLFormat
applyParameters[parameters.SplitTunnelRoutesSignaturePublicKey] = config.SplitTunnelRoutesSignaturePublicKey
applyParameters[parameters.SplitTunnelDNSServer] = config.SplitTunnelDNSServer
if config.UpgradeDownloadURLs != nil {
applyParameters[parameters.UpgradeDownloadClientVersionHeader] = config.UpgradeDownloadClientVersionHeader
applyParameters[parameters.UpgradeDownloadURLs] = config.UpgradeDownloadURLs
}
applyParameters[parameters.TunnelRateLimits] = config.RateLimits
switch config.UseFragmentor {
case "always":
applyParameters[parameters.FragmentorProbability] = 1.0
case "never":
applyParameters[parameters.FragmentorProbability] = 0.0
}
if config.FragmentorMinTotalBytes != nil {
applyParameters[parameters.FragmentorMinTotalBytes] = *config.FragmentorMinTotalBytes
}
if config.FragmentorMaxTotalBytes != nil {
applyParameters[parameters.FragmentorMaxTotalBytes] = *config.FragmentorMaxTotalBytes
}
if config.FragmentorMinWriteBytes != nil {
applyParameters[parameters.FragmentorMinWriteBytes] = *config.FragmentorMinWriteBytes
}
if config.FragmentorMaxWriteBytes != nil {
applyParameters[parameters.FragmentorMaxWriteBytes] = *config.FragmentorMaxWriteBytes
}
if config.FragmentorMinDelayMicroseconds != nil {
applyParameters[parameters.FragmentorMinDelay] = fmt.Sprintf("%dus", *config.FragmentorMinDelayMicroseconds)
}
if config.FragmentorMaxDelayMicroseconds != nil {
applyParameters[parameters.FragmentorMaxDelay] = fmt.Sprintf("%dus", *config.FragmentorMaxDelayMicroseconds)
}
if config.ObfuscatedSSHMinPadding != nil {
applyParameters[parameters.ObfuscatedSSHMinPadding] = *config.ObfuscatedSSHMinPadding
}
if config.ObfuscatedSSHMaxPadding != nil {
applyParameters[parameters.ObfuscatedSSHMaxPadding] = *config.ObfuscatedSSHMaxPadding
}
if config.LivenessTestMinUpstreamBytes != nil {
applyParameters[parameters.LivenessTestMinUpstreamBytes] = *config.LivenessTestMinUpstreamBytes
}
if config.LivenessTestMaxUpstreamBytes != nil {
applyParameters[parameters.LivenessTestMaxUpstreamBytes] = *config.LivenessTestMaxUpstreamBytes
}
if config.LivenessTestMinDownstreamBytes != nil {
applyParameters[parameters.LivenessTestMinDownstreamBytes] = *config.LivenessTestMinDownstreamBytes
}
if config.LivenessTestMaxDownstreamBytes != nil {
applyParameters[parameters.LivenessTestMaxDownstreamBytes] = *config.LivenessTestMaxDownstreamBytes
}
if config.ReplayCandidateCount != nil {
applyParameters[parameters.ReplayCandidateCount] = *config.ReplayCandidateCount
}
if config.ReplayDialParametersTTLSeconds != nil {
applyParameters[parameters.ReplayDialParametersTTL] = fmt.Sprintf("%ds", *config.ReplayDialParametersTTLSeconds)
}
return applyParameters
}
func promoteLegacyDownloadURL(URL string) parameters.DownloadURLs {
downloadURLs := make(parameters.DownloadURLs, 1)
downloadURLs[0] = &parameters.DownloadURL{
URL: base64.StdEncoding.EncodeToString([]byte(URL)),
SkipVerify: false,
OnlyAfterAttempts: 0,
}
return downloadURLs
}
type loggingDeviceBinder struct {
d DeviceBinder
}
func newLoggingDeviceBinder(d DeviceBinder) *loggingDeviceBinder {
return &loggingDeviceBinder{d: d}
}
func (d *loggingDeviceBinder) BindToDevice(fileDescriptor int) (string, error) {
deviceInfo, err := d.d.BindToDevice(fileDescriptor)
if err == nil && deviceInfo != "" {
NoticeBindToDevice(deviceInfo)
}
return deviceInfo, err
}
type staticNetworkGetter struct {
networkID string
}
func newStaticNetworkGetter(networkID string) *staticNetworkGetter {
return &staticNetworkGetter{networkID: networkID}
}
func (n *staticNetworkGetter) GetNetworkID() string {
return n.networkID
}
type loggingNetworkIDGetter struct {
n NetworkIDGetter
}
func newLoggingNetworkIDGetter(n NetworkIDGetter) *loggingNetworkIDGetter {
return &loggingNetworkIDGetter{n: n}
}
func (n *loggingNetworkIDGetter) GetNetworkID() string {
networkID := n.n.GetNetworkID()
// All PII must appear after the initial "-"
// See: https://godoc.org/github.com/Psiphon-Labs/psiphon-tunnel-core/psiphon#NetworkIDGetter
logNetworkID := networkID
index := strings.Index(logNetworkID, "-")
if index != -1 {
logNetworkID = logNetworkID[:index]
}
if len(logNetworkID)+1 < len(networkID) {
// Indicate when additional network info was present after the first "-".
logNetworkID += "+<network info>"
}
NoticeNetworkID(logNetworkID)
return networkID
}
Loading...
马建仓 AI 助手
尝试更多
代码解读
代码找茬
代码优化
Go
1
https://gitee.com/lqinggang/psiphon-tunnel-core.git
git@gitee.com:lqinggang/psiphon-tunnel-core.git
lqinggang
psiphon-tunnel-core
psiphon-tunnel-core
v2.0.2

搜索帮助