|
| 1 | +package main |
| 2 | + |
| 3 | +import ( |
| 4 | + "bytes" |
| 5 | + "flag" |
| 6 | + "fmt" |
| 7 | + "io" |
| 8 | + "log" |
| 9 | + "net" |
| 10 | + "sync" |
| 11 | + "time" |
| 12 | +) |
| 13 | + |
| 14 | +var cfgFile = flag.String("conf", "", "configuration file") |
| 15 | +var listen = flag.String("listen", ":443", "listening port") |
| 16 | + |
| 17 | +var config Config |
| 18 | + |
| 19 | +func main() { |
| 20 | + flag.Parse() |
| 21 | + |
| 22 | + if err := config.ReadFile(*cfgFile); err != nil { |
| 23 | + log.Fatalf("Failed to read config %q: %s", *cfgFile, err) |
| 24 | + } |
| 25 | + |
| 26 | + l, err := net.Listen("tcp", *listen) |
| 27 | + if err != nil { |
| 28 | + log.Fatalf("Failed to listen: %s", err) |
| 29 | + } |
| 30 | + |
| 31 | + for { |
| 32 | + c, err := l.Accept() |
| 33 | + if err != nil { |
| 34 | + log.Fatalf("Error while accepting: %s", err) |
| 35 | + } |
| 36 | + |
| 37 | + conn := &Conn{TCPConn: c.(*net.TCPConn)} |
| 38 | + go conn.proxy() |
| 39 | + } |
| 40 | +} |
| 41 | + |
| 42 | +type Conn struct { |
| 43 | + *net.TCPConn |
| 44 | + |
| 45 | + tlsMinor int |
| 46 | + hostname string |
| 47 | + backend string |
| 48 | + backendConn *net.TCPConn |
| 49 | +} |
| 50 | + |
| 51 | +func (c *Conn) log(msg string, args ...interface{}) { |
| 52 | + msg = fmt.Sprintf(msg, args...) |
| 53 | + log.Printf("%s <> %s: %s", c.RemoteAddr(), c.LocalAddr(), msg) |
| 54 | +} |
| 55 | + |
| 56 | +func (c *Conn) abort(alert byte, msg string, args ...interface{}) { |
| 57 | + c.log(msg, args...) |
| 58 | + alertMsg := []byte{21, 3, byte(c.tlsMinor), 0, 2, 2, alert} |
| 59 | + if _, err := c.Write(alertMsg); err != nil { |
| 60 | + c.log("error while sending alert: %s", err) |
| 61 | + } |
| 62 | +} |
| 63 | + |
| 64 | +func (c *Conn) internalError(msg string, args ...interface{}) { c.abort(80, msg, args...) } |
| 65 | +func (c *Conn) sniFailed(msg string, args ...interface{}) { c.abort(112, msg, args...) } |
| 66 | + |
| 67 | +func (c *Conn) proxy() { |
| 68 | + defer c.Close() |
| 69 | + |
| 70 | + var ( |
| 71 | + err error |
| 72 | + handshakeBuf bytes.Buffer |
| 73 | + ) |
| 74 | + c.hostname, c.tlsMinor, err = extractSNI(io.TeeReader(c, &handshakeBuf)) |
| 75 | + if err != nil { |
| 76 | + c.internalError("Extracting SNI: %s", err) |
| 77 | + return |
| 78 | + } |
| 79 | + |
| 80 | + c.backend = config.Match(c.hostname) |
| 81 | + if c.backend == "" { |
| 82 | + c.sniFailed("no backend found for %q", c.hostname) |
| 83 | + return |
| 84 | + } |
| 85 | + |
| 86 | + c.log("routing %q to %q", c.hostname, c.backend) |
| 87 | + backend, err := net.DialTimeout("tcp", c.backend, 10*time.Second) |
| 88 | + if err != nil { |
| 89 | + c.internalError("failed to dial backend %q for %q: %s", c.backend, c.hostname, err) |
| 90 | + return |
| 91 | + } |
| 92 | + defer backend.Close() |
| 93 | + |
| 94 | + c.backendConn = backend.(*net.TCPConn) |
| 95 | + |
| 96 | + // Replay the piece of the handshake we had to read to do the |
| 97 | + // routing, then blindly proxy any other bytes. |
| 98 | + if _, err = io.Copy(c.backendConn, &handshakeBuf); err != nil { |
| 99 | + c.internalError("failed to replay handshake to %q: %s", c.backend, err) |
| 100 | + return |
| 101 | + } |
| 102 | + |
| 103 | + var wg sync.WaitGroup |
| 104 | + wg.Add(2) |
| 105 | + go proxy(&wg, c.TCPConn, c.backendConn) |
| 106 | + go proxy(&wg, c.backendConn, c.TCPConn) |
| 107 | + wg.Wait() |
| 108 | +} |
| 109 | + |
| 110 | +func proxy(wg *sync.WaitGroup, a, b net.Conn) { |
| 111 | + defer wg.Done() |
| 112 | + atcp, btcp := a.(*net.TCPConn), b.(*net.TCPConn) |
| 113 | + if _, err := io.Copy(atcp, btcp); err != nil { |
| 114 | + log.Printf("%s<>%s -> %s<>%s: %s", atcp.RemoteAddr(), atcp.LocalAddr(), btcp.LocalAddr(), btcp.RemoteAddr(), err) |
| 115 | + } |
| 116 | + btcp.CloseWrite() |
| 117 | + atcp.CloseRead() |
| 118 | +} |
0 commit comments