示例#1
0
 def _handle_client(self, sock):
     data, r_addr = sock.recvfrom(BUF_SIZE)
     if not data:
         logging.debug('UDP handle_client: data is empty')
         return
     if not self._is_local:
         addrlen = len(r_addr[0])
         if addrlen > 255:
             # drop
             return
         data = pack_addr(r_addr[0]) + struct.pack('>H', r_addr[1]) + data
         response = encrypt.encrypt_all(self._password, self._method, 1,
                                        data)
         if not response:
             return
     else:
         data = encrypt.encrypt_all(self._password, self._method, 0,
                                    data)
         if not data:
             return
         header_result = parse_header(data)
         if header_result is None:
             return
         # addrtype, dest_addr, dest_port, header_length = header_result
         response = '\x00\x00\x00' + data
     client_addr = self._client_fd_to_server_addr.get(sock.fileno())
     if client_addr:
         self._server_socket.sendto(response, client_addr)
     else:
         # this packet is from somewhere else we know
         # simply drop that packet
         pass
示例#2
0
    def _on_local_read(self):

        data, self._browser_addr = self._local_socket.recvfrom(
            BUF_SIZE)  # data, addr

        if not data:
            logging.debug('UDP handle_server: data is empty')

        # 对于序列化帧的实现是可选的;如果一个实现不支持,则应当丢弃任何 FRAG 字段值不为 X‘00’ 的数据包。
        if int(data[2]) != 0:
            logging.warning('UDP drop a message since FRAG is not 0.')
            return
        else:
            data = data[3:]

        # data 现在是 payload
        # 假设:data 是 socks5 类型的,所以才能方便处理 header
        addr_type, dest_addr, dest_port, header_length = common.parse_header(
            data)

        # TODO: 需要加上 DNS 解析
        # dest_addr hostname or ip -> ip

        data = data[header_length:]

        self._remote_socket.sendto(data, (dest_addr, dest_port))
示例#3
0
 def _handle_client(self, sock):
     data, r_addr = sock.recvfrom(BUF_SIZE)
     if not data:
         logging.debug('UDP handle_client: data is empty')
         return
     if not self._is_local:
         addrlen = len(r_addr[0])
         if addrlen > 255:
             # drop
             return
         data = pack_addr(r_addr[0]) + struct.pack('>H', r_addr[1]) + data
         response = encrypt.encrypt_all(self._password, self._method, 1,
                                        data)
         if not response:
             return
     else:
         data = encrypt.encrypt_all(self._password, self._method, 0,
                                    data)
         if not data:
             return
         header_result = parse_header(data)
         if header_result is None:
             return
         # addrtype, dest_addr, dest_port, header_length = header_result
         response = '\x00\x00\x00' + data
     client_addr = self._client_fd_to_server_addr.get(sock.fileno())
     if client_addr:
         self._server_socket.sendto(response, client_addr)
     else:
         # this packet is from somewhere else we know
         # simply drop that packet
         pass
 def _handle_stage_addr(self, data):
     try:
         if self._is_local:
             cmd = common.ord(data[1])
             if cmd == CMD_UDP_ASSOCIATE:
                 logging.debug('UDP associate')
                 if self._local_sock.family == socket.AF_INET6:
                     header = b'\x05\x00\x00\x04'
                 else:
                     header = b'\x05\x00\x00\x01'
                 addr, port = self._local_sock.getsockname()[:2]
                 addr_to_send = socket.inet_pton(self._local_sock.family,
                                                 addr)
                 port_to_send = struct.pack('>H', port)
                 self._write_to_sock(header + addr_to_send + port_to_send,
                                     self._local_sock)
                 self._stage = STAGE_UDP_ASSOC
                 # just wait for the client to disconnect
                 return
             elif cmd == CMD_CONNECT:
                 # just trim VER CMD RSV
                 data = data[3:]
             else:
                 logging.error('unknown command %d', cmd)
                 self.destroy()
                 return
         header_result = parse_header(data)
         if header_result is None:
             raise Exception('can not parse header')
         addrtype, remote_addr, remote_port, header_length = header_result
         logging.info('connecting %s:%d from %s:%d' %
                      (common.to_str(remote_addr), remote_port,
                       self._client_address[0], self._client_address[1]))
         self._remote_address = (common.to_str(remote_addr), remote_port)
         # pause reading
         self._update_stream(STREAM_UP, WAIT_STATUS_WRITING)
         self._stage = STAGE_DNS
         if self._is_local:
             # forward address to remote
             self._write_to_sock((b'\x05\x00\x00\x01'
                                  b'\x00\x00\x00\x00\x10\x10'),
                                 self._local_sock)
             data_to_send = self._encryptor.encrypt(data)
             self._data_to_write_to_remote.append(data_to_send)
             # notice here may go into _handle_dns_resolved directly
             self._dns_resolver.resolve(self._chosen_server[0],
                                        self._handle_dns_resolved)
         else:
             if len(data) > header_length:
                 self._data_to_write_to_remote.append(data[header_length:])
             # notice here may go into _handle_dns_resolved directly
             self._dns_resolver.resolve(remote_addr,
                                        self._handle_dns_resolved)
     except Exception as e:
         self._log_error(e)
         if self._config['verbose']:
             traceback.print_exc()
         # TODO use logging when debug completed
         self.destroy()
 def _handle_stage_addr(self, data):
     try:
         if self._is_local:
             cmd = common.ord(data[1])
             if cmd == CMD_UDP_ASSOCIATE:
                 logging.debug('UDP associate')
                 if self._local_sock.family == socket.AF_INET6:
                     header = b'\x05\x00\x00\x04'
                 else:
                     header = b'\x05\x00\x00\x01'
                 addr, port = self._local_sock.getsockname()[:2]
                 addr_to_send = socket.inet_pton(self._local_sock.family,
                                                 addr)
                 port_to_send = struct.pack('>H', port)
                 self._write_to_sock(header + addr_to_send + port_to_send,
                                     self._local_sock)
                 self._stage = STAGE_UDP_ASSOC
                 # just wait for the client to disconnect
                 return
             elif cmd == CMD_CONNECT:
                 # just trim VER CMD RSV
                 data = data[3:]
             else:
                 logging.error('unknown command %d', cmd)
                 self.destroy()
                 return
         header_result = parse_header(data)
         if header_result is None:
             raise Exception('can not parse header')
         addrtype, remote_addr, remote_port, header_length = header_result
         logging.info('connecting %s:%d from %s:%d' %
                      (common.to_str(remote_addr), remote_port,
                       self._client_address[0], self._client_address[1]))
         self._remote_address = (common.to_str(remote_addr), remote_port)
         # pause reading
         self._update_stream(STREAM_UP, WAIT_STATUS_WRITING)
         self._stage = STAGE_DNS
         if self._is_local:
             # forward address to remote
             self._write_to_sock((b'\x05\x00\x00\x01'
                                  b'\x00\x00\x00\x00\x10\x10'),
                                 self._local_sock)
             data_to_send = self._encryptor.encrypt(data)
             self._data_to_write_to_remote.append(data_to_send)
             # notice here may go into _handle_dns_resolved directly
             self._dns_resolver.resolve(self._chosen_server[0],
                                        self._handle_dns_resolved)
         else:
             if len(data) > header_length:
                 self._data_to_write_to_remote.append(data[header_length:])
             # notice here may go into _handle_dns_resolved directly
             self._dns_resolver.resolve(remote_addr,
                                        self._handle_dns_resolved)
     except Exception as e:
         self._log_error(e)
         if self._config['verbose']:
             traceback.print_exc()
         # TODO use logging when debug completed
         self.destroy()
示例#6
0
    def _handle_server(self):
        server = self._server_socket
        data, r_addr = server.recvfrom(BUF_SIZE)
        if self._is_local:
            frag = ord(data[2])
            if frag != 0:
                logging.warn('drop a message since frag is not 0')
                return
            else:
                data = data[3:]
        else:
            # decrypt data
            data = encrypt.encrypt_all(self._password, self._method, 0, data)
            if not data:
                return
        header_result = parse_header(data)
        if header_result is None:
            return
        addrtype, dest_addr, dest_port, header_length = header_result

        if self._is_local:
            server_addr, server_port = self._remote_addr, self._remote_port
        else:
            server_addr, server_port = dest_addr, dest_port

        key = client_key(r_addr[0], r_addr[1], dest_addr, dest_port)
        client = self._cache.get(key, None)
        if not client:
            # TODO async getaddrinfo
            addrs = socket.getaddrinfo(server_addr, server_port, 0,
                                       socket.SOCK_DGRAM, socket.SOL_UDP)
            if addrs:
                af, socktype, proto, canonname, sa = addrs[0]
                client = socket.socket(af, socktype, proto)
                client.setblocking(False)
                self._cache[key] = client
                self._client_fd_to_server_addr[client.fileno()] = r_addr
            else:
                # drop
                return
            self._sockets.add(client.fileno())
            self._eventloop.add(client, eventloop.POLL_IN)

        data = data[header_length:]
        if not data:
            return
        if self._is_local:
            data = encrypt.encrypt_all(self._password, self._method, 1, data)
            if not data:
                return
        try:
            client.sendto(data, (server_addr, server_port))
        except IOError as e:
            err = eventloop.errno_from_exception(e)
            if err in (errno.EINPROGRESS, errno.EAGAIN):
                pass
            else:
                logging.error(e)
示例#7
0
 def _handle_client(self, sock):
     data, r_addr = sock.recvfrom(BUF_SIZE)
     if not data:
         logging.debug('UDP handle_client: data is empty')
         return
     if self._stat_callback:
         self._stat_callback(self._listen_port, len(data))
     if not self._is_local:
         addrlen = len(r_addr[0])
         if addrlen > 255:
             # drop
             return
         data = pack_addr(r_addr[0]) + struct.pack('>H', r_addr[1]) + data
         try:
             response = cryptor.encrypt_all(self._password, self._method,
                                            data, self._crypto_path)
         except Exception:
             logging.debug("UDP handle_client: encrypt data failed")
             return
         if not response:
             return
     else:
         try:
             data, key, iv = cryptor.decrypt_all(self._password,
                                                 self._method, data,
                                                 self._crypto_path)
         except Exception:
             logging.debug('UDP handle_client: decrypt data failed')
             return
         if not data:
             return
         header_result = parse_header(data)
         if header_result is None:
             return
         addrtype, dest_addr, dest_port, header_length = header_result
         if self._is_tunnel:
             # remove ss header
             response = data[header_length:]
         else:
             response = b'\x00\x00\x00' + data
     client_addr = self._client_fd_to_server_addr.get(sock.fileno())
     if client_addr:
         logging.debug("send udp response to %s:%d" %
                       (client_addr[0], client_addr[1]))
         self._server_socket.sendto(response, client_addr)
     else:
         # this packet is from somewhere else we know
         # simply drop that packet
         pass
示例#8
0
    def _handle_stage_consult(self, data):

        cmd = int(data[1])
        if cmd == CMD_UDP_ASSOCIATE:
            logging.debug('UDP associate')
            header = b'\x05\x00\x00\x01'
            addr, port = self._local_sock.getsockname()[:2]
            addr_to_send = socket.inet_pton(self._local_sock.family, addr)
            port_to_send = struct.pack('>H', port)
            self._write_to_sock(header + addr_to_send + port_to_send,
                                self._local_sock)
            self._stage = STAGE_UDP_ASSOC  # 切换到 UDP
            # just wait for the client to disconnect
            return

        if cmd != CMD_CONNECT:
            logging.error('unknown command %d', cmd)
            self.destroy()
            return

        # connect 命令
        data = data[3:]

        addrtype, self._remote_addr, self._remote_port, header_length = common.parse_header(
            data)

        logging.info('connecting %s:%d from %s:%d' %
                     (self._remote_addr, self._remote_port, self._local_addr,
                      self._local_port))

        # 答复浏览器,socks5 握手结束
        self._write_to_sock(b'\x05\x00\x00\x01'
                            b'\x00\x00\x00\x00\x10\x10', self._local_sock)

        # create remote sock
        self._remote_sock = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
        self._remote_sock.setsockopt(socket.SOL_TCP, socket.TCP_NODELAY, 1)
        self._remote_sock.setblocking(True)

        self._remote_sock.connect((self._remote_addr, self._remote_port))
        self._loop.add(self._remote_sock, eventloop.POLL_IN, self)

        # 剩下的数据发送到 remote sock
        self._write_to_sock(data, self._remote_sock)

        self._stage = STAGE_CONNECTING
示例#9
0
 def _local_read(self):
     sock = self._local_sock
     try:
         data = sock.recv(BUF_SIZE)
     except (OSError, IOError) as e:
         logging.exception(e)
         return
     if not data:
         self.destroy()
         return
     logging.info("recv local read len: %s", len(data))
     if data == b'\x05\x01\x00':
         self.write_to_sock(b'\x05\00', self._local_sock)
         return
     if b'\x05\x01\x00' == data[:3]:
         data = data[3:]
     if self._stage == STAGE_INIT:
         self.req_data += data
         logging.info("POLL_IN event fd:%s", sock.fileno())
         header_result = parse_header(self.req_data)
         if not header_result:
             logging.error("[parse_header] error res:%s data:%s",
                           header_result, self.req_data)
             return
         self._stage = STAGE_STREAM
         addrtype, remote_addr, remote_port, header_length = header_result
         logging.info('connecting %s:%d from %s:%d header_len:%s' %
                      (common.to_str(remote_addr), remote_port,
                       self._client_address[0], self._client_address[1],
                       header_length))
         self.req_data = self.req_data[header_length:]
         remote_sock = create_remote_socket(remote_addr, remote_port)
         self._remote_sock = remote_sock
         self.write_to_sock(b'\x05\x00\x00\x01\x00\x00\x00\x00\x10\x10',
                            self._local_sock)
         logging.info("connecting %s:%s from :%s", remote_addr, remote_port,
                      self._client_address)
         logging.info("remote_sock:%s local_sock:%s",
                      self._remote_sock.fileno(), self._local_sock.fileno())
         self.loop.add(remote_sock, POLL_OUT | POLL_ERR, self)
     elif self._stage == STAGE_STREAM:
         data = self.req_data + data
         self.req_data = bytes()
         self.write_to_sock(data, self._remote_sock)
示例#10
0
    def data_received(self, data):
        if self.stage == SOCKS5_SERVER_STAGE_DATA:
            self.remote_transport.write(data)
            return

        self.buffer += data

        if self.stage == SOCKS5_SERVER_STAGE_INIT:
            if len(self.buffer) >= config.SOCKS5_STAGE["INIT"]["LENGTH"]:
                self.transport.write(b"\x05\x00")
                self.stage = SOCKS5_SERVER_STAGE_ADDR
                self.buffer = self.buffer[3:]
                print("[NOTICE] Stage Changed to ADDR")
        if self.stage == SOCKS5_SERVER_STAGE_ADDR:
            if len(self.buffer) >= config.SOCKS5_STAGE["ADDR"]["LENGTH"]:
                addrtype, self.remote_addr, self.remote_port, header_length = common.parse_header(self.buffer[3:])
                self.transport.write(b'\x05\x00\x00\x01'
                                     b'\x00\x00\x00\x00\x10\x10')
                self.stage = SOCKS5_SERVER_STAGE_ESTABLISHING
                self.buffer = self.buffer[header_length + 3:]
                print("[NOTICE] Establishing Connection to %s:%d" % (self.remote_addr, self.remote_port))
                asyncio.async(self.connect_remote())
        if self.stage == SOCKS5_SERVER_STAGE_ESTABLISHING:
            pass
示例#11
0
    def on_local_read(self):
        self.update_activity()
        if not self._local_sock:
            return
        is_local = self._is_local
        data = None
        try:
            data = self._local_sock.recv(BUF_SIZE)
        except (OSError, IOError) as e:
            if eventloop.errno_from_exception(e) in \
                    (errno.ETIMEDOUT, errno.EAGAIN):
                return
        if not data:
            self.destroy()
            return
        if not is_local:
            data = self._encryptor.decrypt(data)
            if not data:
                return
        if self._stage == STAGE_STREAM:
            if self._is_local:
                data = self._encryptor.encrypt(data)
            self.write_to_sock(data, self._remote_sock)
            return
        elif is_local and self._stage == STAGE_INIT:
            # TODO check auth method
            self.write_to_sock('\x05\00', self._local_sock)
            self._stage = STAGE_HELLO
            return
        elif self._stage == STAGE_REPLY:
            if is_local:
                data = self._encryptor.encrypt(data)
            self._data_to_write_to_remote.append(data)
        elif (is_local and self._stage == STAGE_HELLO) or \
                (not is_local and self._stage == STAGE_INIT):
            try:
                if is_local:
                    cmd = ord(data[1])
                    if cmd == CMD_UDP_ASSOCIATE:
                        logging.debug('UDP associate')
                        if self._local_sock.family == socket.AF_INET6:
                            header = '\x05\x00\x00\x04'
                        else:
                            header = '\x05\x00\x00\x01'
                        addr, port = self._local_sock.getsockname()
                        addr_to_send = socket.inet_pton(self._local_sock.family,
                                                        addr)
                        port_to_send = struct.pack('>H', port)
                        self.write_to_sock(header + addr_to_send + port_to_send,
                                           self._local_sock)
                        self._stage = STAGE_UDP_ASSOC
                        # just wait for the client to disconnect
                        return
                    elif cmd == CMD_CONNECT:
                        # just trim VER CMD RSV
                        data = data[3:]
                    else:
                        logging.error('unknown command %d', cmd)
                        self.destroy()
                        return
                header_result = parse_header(data)
                if header_result is None:
                    raise Exception('can not parse header')
                addrtype, remote_addr, remote_port, header_length =\
                    header_result
                logging.info('connecting %s:%d' % (remote_addr, remote_port))
                self._remote_address = (remote_addr, remote_port)
                if is_local:
                    # forward address to remote
                    self.write_to_sock('\x05\x00\x00\x01' +
                                       '\x00\x00\x00\x00\x10\x10',
                                       self._local_sock)
                    data_to_send = self._encryptor.encrypt(data)
                    self._data_to_write_to_remote.append(data_to_send)
                    remote_addr = self._config['server']
                    remote_port = self._config['server_port']
                else:
                    if len(data) > header_length:
                        self._data_to_write_to_remote.append(
                            data[header_length:])

                # TODO async DNS
                addrs = socket.getaddrinfo(remote_addr, remote_port, 0,
                                           socket.SOCK_STREAM, socket.SOL_TCP)
                if len(addrs) == 0:
                    raise Exception("can't get addrinfo for %s:%d" %
                                    (remote_addr, remote_port))
                af, socktype, proto, canonname, sa = addrs[0]
                remote_sock = socket.socket(af, socktype, proto)
                self._remote_sock = remote_sock
                self._fd_to_handlers[remote_sock.fileno()] = self
                remote_sock.setblocking(False)
                remote_sock.setsockopt(socket.SOL_TCP, socket.TCP_NODELAY, 1)
                # TODO support TCP fast open
                try:
                    remote_sock.connect(sa)
                except (OSError, IOError) as e:
                    if eventloop.errno_from_exception(e) == errno.EINPROGRESS:
                        pass
                self._loop.add(remote_sock,
                               eventloop.POLL_ERR | eventloop.POLL_OUT)

                self._stage = STAGE_REPLY
                self.update_stream(STREAM_UP, WAIT_STATUS_READWRITING)
                self.update_stream(STREAM_DOWN, WAIT_STATUS_READING)
                return
            except Exception:
                import traceback
                traceback.print_exc()
                # TODO use logging when debug completed
                self.destroy()
示例#12
0
    def _handle_stage_hello(self, data):
        try:
            if self._is_local:
                cmd = ord(data[1])
                if cmd == CMD_UDP_ASSOCIATE:
                    logging.debug('UDP associate')
                    if self._local_sock.family == socket.AF_INET6:
                        header = '\x05\x00\x00\x04'
                    else:
                        header = '\x05\x00\x00\x01'
                    addr, port = self._local_sock.getsockname()
                    addr_to_send = socket.inet_pton(self._local_sock.family,
                                                    addr)
                    port_to_send = struct.pack('>H', port)
                    self._write_to_sock(header + addr_to_send + port_to_send,
                                        self._local_sock)
                    self._stage = STAGE_UDP_ASSOC
                    # just wait for the client to disconnect
                    return
                elif cmd == CMD_CONNECT:
                    # just trim VER CMD RSV
                    data = data[3:]
                else:
                    logging.error('unknown command %d', cmd)
                    self.destroy()
                    return
            header_result = parse_header(data)
            if header_result is None:
                raise Exception('can not parse header')
            addrtype, remote_addr, remote_port, header_length = header_result
            logging.info('connecting %s:%d' % (remote_addr, remote_port))
            self._remote_address = (remote_addr, remote_port)
            if self._is_local:
                # forward address to remote
                self._write_to_sock('\x05\x00\x00\x01\x00\x00\x00\x00\x10\x10',
                                    self._local_sock)
                data_to_send = self._encryptor.encrypt(data)
                self._data_to_write_to_remote.append(data_to_send)
                remote_addr = self._config['server']
                remote_port = self._config['server_port']
            else:
                if len(data) > header_length:
                    self._data_to_write_to_remote.append(data[header_length:])

            # TODO async DNS
            addrs = socket.getaddrinfo(remote_addr, remote_port, 0,
                                       socket.SOCK_STREAM, socket.SOL_TCP)
            if len(addrs) == 0:
                raise Exception("can't get addrinfo for %s:%d" %
                                (remote_addr, remote_port))
            af, socktype, proto, canonname, sa = addrs[0]
            remote_sock = socket.socket(af, socktype, proto)
            self._remote_sock = remote_sock
            self._fd_to_handlers[remote_sock.fileno()] = self
            remote_sock.setblocking(False)
            remote_sock.setsockopt(socket.SOL_TCP, socket.TCP_NODELAY, 1)

            if self._is_local and self._config['fast_open']:
                # wait for more data to arrive and send them in one SYN
                self._stage = STAGE_REPLY
                self._loop.add(remote_sock, eventloop.POLL_ERR)
                # TODO when there is already data in this packet
            else:
                try:
                    remote_sock.connect(sa)
                except (OSError, IOError) as e:
                    if eventloop.errno_from_exception(e) == errno.EINPROGRESS:
                        pass
                self._loop.add(remote_sock,
                               eventloop.POLL_ERR | eventloop.POLL_OUT)
                self._stage = STAGE_REPLY
                self._update_stream(STREAM_UP, WAIT_STATUS_READWRITING)
                self._update_stream(STREAM_DOWN, WAIT_STATUS_READING)
        except Exception as e:
            logging.error(e)
            traceback.print_exc()
            # TODO use logging when debug completed
            self.destroy()
示例#13
0
    def _handle_stage_hello(self, data):
        try:
            if self._is_local:
                cmd = ord(data[1])
                if cmd == CMD_UDP_ASSOCIATE:
                    logging.debug('UDP associate')
                    if self._local_sock.family == socket.AF_INET6:
                        header = '\x05\x00\x00\x04'
                    else:
                        header = '\x05\x00\x00\x01'
                    addr, port = self._local_sock.getsockname()
                    addr_to_send = socket.inet_pton(self._local_sock.family,
                                                    addr)
                    port_to_send = struct.pack('>H', port)
                    self._write_to_sock(header + addr_to_send + port_to_send,
                                        self._local_sock)
                    self._stage = STAGE_UDP_ASSOC
                    # just wait for the client to disconnect
                    return
                elif cmd == CMD_CONNECT:
                    # just trim VER CMD RSV
                    data = data[3:]
                else:
                    logging.error('unknown command %d', cmd)
                    self.destroy()
                    return
            header_result = parse_header(data)
            if header_result is None:
                raise Exception('can not parse header')
            addrtype, remote_addr, remote_port, header_length = header_result
            logging.info('connecting %s:%d' % (remote_addr, remote_port))
            self._remote_address = (remote_addr, remote_port)
            if self._is_local:
                # forward address to remote
                self._write_to_sock('\x05\x00\x00\x01\x00\x00\x00\x00\x10\x10',
                                    self._local_sock)
                data_to_send = self._encryptor.encrypt(data)
                self._data_to_write_to_remote.append(data_to_send)
                remote_addr = self._config['server']
                remote_port = self._config['server_port']
            else:
                if len(data) > header_length:
                    self._data_to_write_to_remote.append(data[header_length:])

            # TODO async DNS
            addrs = socket.getaddrinfo(remote_addr, remote_port, 0,
                                       socket.SOCK_STREAM, socket.SOL_TCP)
            if len(addrs) == 0:
                raise Exception("can't get addrinfo for %s:%d" %
                                (remote_addr, remote_port))
            af, socktype, proto, canonname, sa = addrs[0]
            remote_sock = socket.socket(af, socktype, proto)
            self._remote_sock = remote_sock
            self._fd_to_handlers[remote_sock.fileno()] = self
            remote_sock.setblocking(False)
            remote_sock.setsockopt(socket.SOL_TCP, socket.TCP_NODELAY, 1)

            if self._is_local and self._config['fast_open']:
                # wait for more data to arrive and send them in one SYN
                self._stage = STAGE_REPLY
                self._loop.add(remote_sock, eventloop.POLL_ERR)
                # TODO when there is already data in this packet
            else:
                try:
                    remote_sock.connect(sa)
                except (OSError, IOError) as e:
                    if eventloop.errno_from_exception(e) == errno.EINPROGRESS:
                        pass
                self._loop.add(remote_sock,
                               eventloop.POLL_ERR | eventloop.POLL_OUT)
                self._stage = STAGE_REPLY
                self._update_stream(STREAM_UP, WAIT_STATUS_READWRITING)
                self._update_stream(STREAM_DOWN, WAIT_STATUS_READING)
        except Exception:
            import traceback
            traceback.print_exc()
            # TODO use logging when debug completed
            self.destroy()
示例#14
0
 def _handle_stage_addr(self, data):
     try:
         if self._is_local:
             cmd = common.ord(data[1])
             if cmd == CMD_UDP_ASSOCIATE:
                 logging.debug('UDP associate')
                 if self._local_sock.family == socket.AF_INET6:
                     # 0x4 ipv6
                     header = b'\x05\x00\x00\x04'
                 else:
                     # 0x1 ipv4
                     header = b'\x05\x00\x00\x01'
                 addr, port = self._local_sock.getsockname()[:2]
                 addr_to_send = socket.inet_pton(self._local_sock.family,
                                                 addr)
                 port_to_send = struct.pack('>H', port)
                 # 响应 CMD_UDP_ASSOCIATE 命令,告诉客户端udp地址
                 self._write_to_sock(header + addr_to_send + port_to_send,
                                     self._local_sock)
                 self._stage = STAGE_UDP_ASSOC
                 # just wait for the client to disconnect
                 # 这里已经返回
                 return
             elif cmd == CMD_CONNECT:
                 # just trim VER CMD RSV
                 # 跨过socks5前面3字节,后面字节与socks5兼容,不过在addrtype字段加入了ota验证
                 data = data[3:]
             else:
                 # bing命令?
                 logging.error('unknown command %d', cmd)
                 self.destroy()
                 return
         # 服务器端初始时候解析包头,下面也是socks5请求时从第三个字节开始的地址数据
         # 这里ssserver刚好兼容剩下的socks5的请求头
         header_result = parse_header(data)
         if header_result is None:
             raise Exception('can not parse header')
         addrtype, remote_addr, remote_port, header_length = header_result
         # 经常看到的服务器接收到请求时候打印的日志
         logging.info('connecting %s:%d from %s:%d' %
                      (common.to_str(remote_addr), remote_port,
                       self._client_address[0], self._client_address[1]))
         if self._is_local is False:
             # spec https://shadowsocks.org/en/spec/one-time-auth.html
             # 验证ota正确性
             if self._ota_enable or addrtype & ADDRTYPE_AUTH:
                 self._ota_enable = True
                 if len(data) < header_length + ONETIMEAUTH_BYTES:
                     logging.warn('one time auth header is too short')
                     return None
                 offset = header_length + ONETIMEAUTH_BYTES
                 # header后的一段hash值, 10字节one-time-auth
                 _hash = data[header_length:offset]
                 _data = data[:header_length]
                 # iv+key
                 key = self._encryptor.decipher_iv + self._encryptor.key
                 # 验证是否允许
                 if onetimeauth_verify(_hash, _data, key) is False:
                     logging.warn('one time auth fail')
                     self.destroy()
                     return
                 header_length += ONETIMEAUTH_BYTES
         self._remote_address = (common.to_str(remote_addr), remote_port)
         # pause reading 上送数据
         self._update_stream(STREAM_UP, WAIT_STATUS_WRITING)
         self._stage = STAGE_DNS
         if self._is_local:
             # 客户端
             # forward address to remote
             # 告诉浏览器,socks5验证成功
             self._write_to_sock((b'\x05\x00\x00\x01'
                                  b'\x00\x00\x00\x00\x10\x10'),
                                 self._local_sock)
             # spec https://shadowsocks.org/en/spec/one-time-auth.html
             # ATYP & 0x10 == 1, then OTA is enabled.
             if self._ota_enable:
                 # 自己实现的ota,在浏览器之类发来的socks5请求头部的addrtype中加入ADDRTYPE_AUTH
                 # 然后发往ssserver,修改第一字节,实际是socks5头部的第3字节
                 data = common.chr(addrtype | ADDRTYPE_AUTH) + data[1:]
                 key = self._encryptor.cipher_iv + self._encryptor.key
                 # 附在数据尾部? 这里的data是socks5请求报文第三字节之后的数据
                 data += onetimeauth_gen(data, key)
             # 加密
             data_to_send = self._encryptor.encrypt(data)
             self._data_to_write_to_remote.append(data_to_send)
             # notice here may go into _handle_dns_resolved directly
             # 选择一个ssserver发送数据
             self._dns_resolver.resolve(self._chosen_server[0],
                                        self._handle_dns_resolved)
         else:
             # 服务端
             if self._ota_enable:
                 # 过滤前面的远程地址和ota hmac-sha1头
                 data = data[header_length:]
                 self._ota_chunk_data(data,
                                      self._data_to_write_to_remote.append)
             elif len(data) > header_length:
                 # 过滤掉头部还有数据要发送
                 self._data_to_write_to_remote.append(data[header_length:])
             # notice here may go into _handle_dns_resolved directly
             # 解析dns之后remote_sock连接远端web站点
             self._dns_resolver.resolve(remote_addr,
                                        self._handle_dns_resolved)
     except Exception as e:
         self._log_error(e)
         if self._config['verbose']:
             traceback.print_exc()
         self.destroy()
示例#15
0
    def on_local_read(self):
        self.update_activity()
        if not self._local_sock:
            return
        is_local = self._is_local
        data = None
        try:
            data = self._local_sock.recv(BUF_SIZE)
        except (OSError, IOError) as e:
            if eventloop.errno_from_exception(e) in \
                    (errno.ETIMEDOUT, errno.EAGAIN):
                return
        if not data:
            self.destroy()
            return
        if not is_local:
            data = self._encryptor.decrypt(data)
            if not data:
                return
        if self._stage == STAGE_STREAM:
            if self._is_local:
                data = self._encryptor.encrypt(data)
            self.write_to_sock(data, self._remote_sock)
            return
        elif is_local and self._stage == STAGE_INIT:
            # TODO check auth method
            self.write_to_sock('\x05\00', self._local_sock)
            self._stage = STAGE_HELLO
            return
        elif self._stage == STAGE_REPLY:
            if is_local:
                data = self._encryptor.encrypt(data)
            self._data_to_write_to_remote.append(data)
        elif (is_local and self._stage == STAGE_HELLO) or \
                (not is_local and self._stage == STAGE_INIT):
            try:
                if is_local:
                    cmd = ord(data[1])
                    if cmd == CMD_UDP_ASSOCIATE:
                        logging.debug('UDP associate')
                        if self._local_sock.family == socket.AF_INET6:
                            header = '\x05\x00\x00\x04'
                        else:
                            header = '\x05\x00\x00\x01'
                        addr, port = self._local_sock.getsockname()
                        addr_to_send = socket.inet_pton(
                            self._local_sock.family, addr)
                        port_to_send = struct.pack('>H', port)
                        self.write_to_sock(
                            header + addr_to_send + port_to_send,
                            self._local_sock)
                        self._stage = STAGE_UDP_ASSOC
                        # just wait for the client to disconnect
                        return
                    elif cmd == CMD_CONNECT:
                        # just trim VER CMD RSV
                        data = data[3:]
                    else:
                        logging.error('unknown command %d', cmd)
                        self.destroy()
                        return
                header_result = parse_header(data)
                if header_result is None:
                    raise Exception('can not parse header')
                addrtype, remote_addr, remote_port, header_length =\
                    header_result
                logging.info('connecting %s:%d' % (remote_addr, remote_port))
                self._remote_address = (remote_addr, remote_port)
                if is_local:
                    # forward address to remote
                    self.write_to_sock(
                        '\x05\x00\x00\x01' + '\x00\x00\x00\x00\x10\x10',
                        self._local_sock)
                    data_to_send = self._encryptor.encrypt(data)
                    self._data_to_write_to_remote.append(data_to_send)
                    remote_addr = self._config['server']
                    remote_port = self._config['server_port']
                else:
                    if len(data) > header_length:
                        self._data_to_write_to_remote.append(
                            data[header_length:])

                # TODO async DNS
                addrs = socket.getaddrinfo(remote_addr, remote_port, 0,
                                           socket.SOCK_STREAM, socket.SOL_TCP)
                if len(addrs) == 0:
                    raise Exception("can't get addrinfo for %s:%d" %
                                    (remote_addr, remote_port))
                af, socktype, proto, canonname, sa = addrs[0]
                remote_sock = socket.socket(af, socktype, proto)
                self._remote_sock = remote_sock
                self._fd_to_handlers[remote_sock.fileno()] = self
                remote_sock.setblocking(False)
                remote_sock.setsockopt(socket.SOL_TCP, socket.TCP_NODELAY, 1)
                # TODO support TCP fast open
                try:
                    remote_sock.connect(sa)
                except (OSError, IOError) as e:
                    if eventloop.errno_from_exception(e) == errno.EINPROGRESS:
                        pass
                self._loop.add(remote_sock,
                               eventloop.POLL_ERR | eventloop.POLL_OUT)

                self._stage = STAGE_REPLY
                self.update_stream(STREAM_UP, WAIT_STATUS_READWRITING)
                self.update_stream(STREAM_DOWN, WAIT_STATUS_READING)
                return
            except Exception:
                import traceback
                traceback.print_exc()
                # TODO use logging when debug completed
                self.destroy()
示例#16
0
 def _handle_stage_addr(self, data):
     if self._is_local:
         if self._is_tunnel:
             # add ss header to data
             tunnel_remote = self.tunnel_remote
             tunnel_remote_port = self.tunnel_remote_port
             data = common.add_header(tunnel_remote, tunnel_remote_port,
                                      data)
         else:
             cmd = common.ord(data[1])
             if cmd == CMD_UDP_ASSOCIATE:
                 logging.debug('UDP associate')
                 if self._local_sock.family == socket.AF_INET6:
                     header = b'\x05\x00\x00\x04'
                 else:
                     header = b'\x05\x00\x00\x01'
                 addr, port = self._local_sock.getsockname()[:2]
                 addr_to_send = socket.inet_pton(self._local_sock.family,
                                                 addr)
                 port_to_send = struct.pack('>H', port)
                 self._write_to_sock(header + addr_to_send + port_to_send,
                                     self._local_sock)
                 self._stage = STAGE_UDP_ASSOC
                 # just wait for the client to disconnect
                 return
             elif cmd == CMD_CONNECT:
                 # just trim VER CMD RSV
                 data = data[3:]
             else:
                 logging.error('unknown command %d', cmd)
                 self.destroy()
                 return
     header_result = parse_header(data)
     if header_result is None:
         raise Exception('can not parse header')
     addrtype, remote_addr, remote_port, header_length = header_result
     logging.info('connecting %s:%d from %s:%d' %
                  (common.to_str(remote_addr), remote_port,
                   self._client_address[0], self._client_address[1]))
     #logging.info('connecting %s:%d from %s:%d,  %s' %
     #             (common.to_str(remote_addr), remote_port,
     #              self._client_address[0], self._client_address[1], data))
     if self._is_local is False:
         # spec https://shadowsocks.org/en/spec/one-time-auth.html
         self._ota_enable_session = addrtype & ADDRTYPE_AUTH
         if self._ota_enable and not self._ota_enable_session:
             logging.warn('client one time auth is required')
             return
         if self._ota_enable_session:
             if len(data) < header_length + ONETIMEAUTH_BYTES:
                 logging.warn('one time auth header is too short')
                 return None
             offset = header_length + ONETIMEAUTH_BYTES
             _hash = data[header_length:offset]
             _data = data[:header_length]
             key = self._cryptor.decipher_iv + self._cryptor.key
             if onetimeauth_verify(_hash, _data, key) is False:
                 logging.warn('one time auth fail')
                 self.destroy()
                 return
             header_length += ONETIMEAUTH_BYTES
     self._remote_address = (common.to_str(remote_addr), remote_port)
     # pause reading
     self._update_stream(STREAM_UP, WAIT_STATUS_WRITING)
     self._stage = STAGE_DNS
     if self._is_local:
         # jump over socks5 response
         if not self._is_tunnel:
             # forward address to remote
             self._write_to_sock((b'\x05\x00\x00\x01'
                                  b'\x00\x00\x00\x00\x10\x10'),
                                 self._local_sock)
         # spec https://shadowsocks.org/en/spec/one-time-auth.html
         # ATYP & 0x10 == 0x10, then OTA is enabled.
         if self._ota_enable_session:
             data = common.chr(addrtype | ADDRTYPE_AUTH) + data[1:]
             key = self._cryptor.cipher_iv + self._cryptor.key
             _header = data[:header_length]
             sha110 = onetimeauth_gen(data, key)
             data = _header + sha110 + data[header_length:]
         data_to_send = self._cryptor.encrypt(data)
         self._data_to_write_to_remote.append(data_to_send)
         # notice here may go into _handle_dns_resolved directly
         self._dns_resolver.resolve(self._chosen_server[0],
                                    self._handle_dns_resolved)
     else:
         if self._ota_enable_session:
             data = data[header_length:]
             self._ota_chunk_data(data,
                                  self._data_to_write_to_remote.append)
         elif len(data) > header_length:
             self._data_to_write_to_remote.append(data[header_length:])
         # notice here may go into _handle_dns_resolved directly
         self._dns_resolver.resolve(remote_addr, self._handle_dns_resolved)
示例#17
0
    def _handle_client(self, sock):
        data, r_addr = sock.recvfrom(BUF_SIZE)
        if not data:
            logging.debug('UDP handle_client: data is empty')
            return
        if self._stat_callback:
            self._stat_callback(self._listen_port, len(data))

        client_addr = self._client_fd_to_server_addr.get(sock.fileno())
        client_uid = None
        if client_addr:
            key = client_key(client_addr[0], client_addr[1])
            client_pair = self._cache.get(key, None)
            client_dns_pair = self._cache_dns_client.get(key, None)
            if client_pair:
                client, client_uid = client_pair
            elif client_dns_pair:
                client, client_uid = client_dns_pair

        if not self._is_local:
            addrlen = len(r_addr[0])
            if addrlen > 255:
                # drop
                return
            data = pack_addr(r_addr[0]) + struct.pack('>H', r_addr[1]) + data
            ref_iv = [encrypt.encrypt_new_iv(self._method)]
            self._protocol.obfs.server_info.iv = ref_iv[0]
            data = self._protocol.server_udp_pre_encrypt(data, client_uid)
            response = encrypt.encrypt_all_iv(
                self._protocol.obfs.server_info.key, self._method, 1, data,
                ref_iv)
            if not response:
                return
        else:
            ref_iv = [0]
            data = encrypt.encrypt_all_iv(self._protocol.obfs.server_info.key,
                                          self._method, 0, data, ref_iv)
            if not data:
                return
            self._protocol.obfs.server_info.recv_iv = ref_iv[0]
            data = self._protocol.client_udp_post_decrypt(data)
            header_result = parse_header(data)
            if header_result is None:
                return
            #connecttype, dest_addr, dest_port, header_length = header_result
            #logging.debug('UDP handle_client %s:%d to %s:%d' % (common.to_str(r_addr[0]), r_addr[1], dest_addr, dest_port))

            response = b'\x00\x00\x00' + data

        if client_addr:
            if client_uid:
                self.add_transfer_d(client_uid, len(response))
            else:
                self.server_transfer_dl += len(response)
            self.write_to_server_socket(response, client_addr[0])
            if client_dns_pair:
                logging.debug("remove dns client %s:%d" %
                              (client_addr[0][0], client_addr[0][1]))
                del self._cache_dns_client[key]
                self._close_client(client_dns_pair[0])
        else:
            # this packet is from somewhere else we know
            # simply drop that packet
            pass
示例#18
0
    def _handle_server(self):
        server = self._server_socket
        data, r_addr = server.recvfrom(BUF_SIZE)
        ogn_data = data
        if not data:
            logging.debug('UDP handle_server: data is empty')
        if self._stat_callback:
            self._stat_callback(self._listen_port, len(data))
        uid = None
        if self._is_local:
            frag = common.ord(data[2])
            if frag != 0:
                logging.warn('drop a message since frag is not 0')
                return
            else:
                data = data[3:]
        else:
            ref_iv = [0]
            data = encrypt.encrypt_all_iv(self._protocol.obfs.server_info.key,
                                          self._method, 0, data, ref_iv)
            # decrypt data
            if not data:
                logging.debug('UDP handle_server: data is empty after decrypt')
                return
            self._protocol.obfs.server_info.recv_iv = ref_iv[0]
            data, uid = self._protocol.server_udp_post_decrypt(data)

        #logging.info("UDP data %s" % (binascii.hexlify(data),))
        if not self._is_local:
            data = pre_parse_header(data)
            if data is None:
                return

        try:
            header_result = parse_header(data)
        except:
            self._handel_protocol_error(r_addr, ogn_data)
            return

        if header_result is None:
            self._handel_protocol_error(r_addr, ogn_data)
            return
        connecttype, addrtype, dest_addr, dest_port, header_length = header_result

        if self._is_local:
            addrtype = 3
            server_addr, server_port = self._get_a_server()
        else:
            server_addr, server_port = dest_addr, dest_port

        if (addrtype & 7) == 3:
            af = common.is_ip(server_addr)
            if af == False:
                handler = common.UDPAsyncDNSHandler(
                    (data, r_addr, uid, header_length))
                handler.resolve(self._dns_resolver, (server_addr, server_port),
                                self._handle_server_dns_resolved)
            else:
                self._handle_server_dns_resolved(
                    "", (server_addr, server_port), server_addr,
                    (data, r_addr, uid, header_length))
        else:
            self._handle_server_dns_resolved(
                "", (server_addr, server_port), server_addr,
                (data, r_addr, uid, header_length))
    def _handle_server(self):
        server = self._server_socket
        data, r_addr = server.recvfrom(BUF_SIZE)
        if not data:
            logging.debug('UDP handle_server: data is empty')
        if self._is_local:
            frag = common.ord(data[2])
            if frag != 0:
                logging.warn('drop a message since frag is not 0')
                return
            else:
                data = data[3:]
        else:
            data = encrypt.encrypt_all(self._password, self._method, 0, data)
            # decrypt data
            if not data:
                logging.debug('UDP handle_server: data is empty after decrypt')
                return
        header_result = parse_header(data)
        if header_result is None:
            return
        addrtype, dest_addr, dest_port, header_length = header_result

        if self._is_local:
            server_addr, server_port = self._get_a_server()
        else:
            server_addr, server_port = dest_addr, dest_port

        addrs = self._dns_cache.get(server_addr, None)
        if addrs is None:
            addrs = socket.getaddrinfo(server_addr, server_port, 0,
                                       socket.SOCK_DGRAM, socket.SOL_UDP)
            if not addrs:
                # drop
                return
            else:
                self._dns_cache[server_addr] = addrs

        af, socktype, proto, canonname, sa = addrs[0]
        key = client_key(r_addr, af)
        logging.debug(key)
        client = self._cache.get(key, None)
        if not client:
            # TODO async getaddrinfo
            if self._forbidden_iplist:
                if common.to_str(sa[0]) in self._forbidden_iplist:
                    logging.debug('IP %s is in forbidden list, drop' %
                                  common.to_str(sa[0]))
                    # drop
                    return
            client = socket.socket(af, socktype, proto)
            client.setblocking(False)
            self._cache[key] = client
            self._client_fd_to_server_addr[client.fileno()] = r_addr

            self._sockets.add(client.fileno())
            self._eventloop.add(client, eventloop.POLL_IN)

        if self._is_local:
            data = encrypt.encrypt_all(self._password, self._method, 1, data)
            if not data:
                return
        else:
            data = data[header_length:]
        if not data:
            return
        try:
            client.sendto(data, (server_addr, server_port))
        except IOError as e:
            err = eventloop.errno_from_exception(e)
            if err in (errno.EINPROGRESS, errno.EAGAIN):
                pass
            else:
                shell.print_exception(e)
示例#20
0
    def _handle_server(self):
        server = self._server_socket
        data, r_addr = server.recvfrom(BUF_SIZE)
        key = None
        iv = None
        if not data:
            logging.debug('UDP handle_server: data is empty')
        if self._stat_callback:
            self._stat_callback(self._listen_port, len(data))
        if self._is_local:
            frag = common.ord(data[2])
            if frag != 0:
                logging.warn('UDP drop a message since frag is not 0')
                return
            else:
                # RSV and FRAG are dropped
                data = data[3:]
        else:
            # 服务器解密
            data, key, iv = encrypt.dencrypt_all(self._password, self._method,
                                                 data)
            # decrypt data
            if not data:
                logging.debug('UDP handle_server: data is empty after decrypt')
                return
        # +------+---------------------+------------------+----------+-----------+
        # | ATYP | Destination Address | Destination Port | DATA | HMAC - SHA1 |
        # +------+---------------------+------------------+----------+-----------+
        # | 1 | Variable | 2 | Variable | 10 |
        # +------+---------------------+------------------+----------+-----------+
        header_result = parse_header(data)
        if header_result is None:
            return
        addrtype, dest_addr, dest_port, header_length = header_result
        if self._is_local:
            server_addr, server_port = self._get_a_server()
        else:
            # 服务端拆包,ota验证
            server_addr, server_port = dest_addr, dest_port
            # spec https://shadowsocks.org/en/spec/one-time-auth.html
            if self._one_time_auth_enable or addrtype & ADDRTYPE_AUTH:
                self._one_time_auth_enable = True
                if len(data) < header_length + ONETIMEAUTH_BYTES:
                    logging.warn('UDP one time auth header is too short')
                    return
                # 尾巴的hmac-sha1
                _hash = data[-ONETIMEAUTH_BYTES:]
                data = data[:-ONETIMEAUTH_BYTES]
                _key = iv + key
                if onetimeauth_verify(_hash, data, _key) is False:
                    logging.warn('UDP one time auth fail')
                    return
        addrs = self._dns_cache.get(server_addr, None)
        if addrs is None:
            # 同步查询DNS
            addrs = socket.getaddrinfo(server_addr, server_port, 0,
                                       socket.SOCK_DGRAM, socket.SOL_UDP)
            if not addrs:
                # drop
                return
            else:
                self._dns_cache[server_addr] = addrs

        af, socktype, proto, canonname, sa = addrs[0]
        key = client_key(r_addr, af)
        client = self._cache.get(key, None)
        if not client:
            # 创建client socket
            # TODO async getaddrinfo
            if self._forbidden_iplist:
                if common.to_str(sa[0]) in self._forbidden_iplist:
                    logging.debug('IP %s is in forbidden list, drop' %
                                  common.to_str(sa[0]))
                    # drop
                    return
            client = socket.socket(af, socktype, proto)
            client.setblocking(False)
            self._cache[key] = client
            # 记录数据要返回给谁
            self._client_fd_to_server_addr[client.fileno()] = r_addr

            self._sockets.add(client.fileno())
            self._eventloop.add(client, eventloop.POLL_IN, self)

        if self._is_local:
            # 客户端 ota数据生成,然后加密
            key, iv, m = encrypt.gen_key_iv(self._password, self._method)
            # spec https://shadowsocks.org/en/spec/one-time-auth.html
            if self._one_time_auth_enable:
                data = self._ota_chunk_data_gen(key, iv, data)
            data = encrypt.encrypt_all_m(key, iv, m, self._method, data)
            if not data:
                return
        else:
            # 服务器忽略前面的地址与端口头
            data = data[header_length:]
        if not data:
            return
        try:
            # 数据上行upstream
            client.sendto(data, (server_addr, server_port))
        except IOError as e:
            err = eventloop.errno_from_exception(e)
            if err in (errno.EINPROGRESS, errno.EAGAIN):
                pass
            else:
                shell.print_exception(e)
示例#21
0
    def _handle_server(self):
        server = self._server_socket
        data, r_addr = server.recvfrom(BUF_SIZE)
        key = None
        iv = None
        if not data:
            logging.debug('UDP handle_server: data is empty')
        if self._stat_callback:
            self._stat_callback(self._listen_port, len(data))
        if self._is_local:
            if self._is_tunnel:
                # add ss header to data
                tunnel_remote = self.tunnel_remote
                tunnel_remote_port = self.tunnel_remote_port
                data = common.add_header(tunnel_remote, tunnel_remote_port,
                                         data)
            else:
                frag = common.ord(data[2])
                if frag != 0:
                    logging.warn('UDP drop a message since frag is not 0')
                    return
                else:
                    data = data[3:]
        else:
            # decrypt data
            try:
                data, key, iv = cryptor.decrypt_all(self._password,
                                                    self._method, data,
                                                    self._crypto_path)
            except Exception:
                logging.debug('UDP handle_server: decrypt data failed')
                return
            if not data:
                logging.debug('UDP handle_server: data is empty after decrypt')
                return
        header_result = parse_header(data)
        if header_result is None:
            return
        addrtype, dest_addr, dest_port, header_length = header_result
        logging.info("udp data to %s:%d from %s:%d" %
                     (dest_addr, dest_port, r_addr[0], r_addr[1]))
        if self._is_local:
            server_addr, server_port = self._get_a_server()
        else:
            server_addr, server_port = dest_addr, dest_port
            # spec https://shadowsocks.org/en/spec/one-time-auth.html
            self._ota_enable_session = addrtype & ADDRTYPE_AUTH
            if self._ota_enable and not self._ota_enable_session:
                logging.warn('client one time auth is required')
                return
            if self._ota_enable_session:
                if len(data) < header_length + ONETIMEAUTH_BYTES:
                    logging.warn('UDP one time auth header is too short')
                    return
                _hash = data[-ONETIMEAUTH_BYTES:]
                data = data[:-ONETIMEAUTH_BYTES]
                _key = iv + key
                if onetimeauth_verify(_hash, data, _key) is False:
                    logging.warn('UDP one time auth fail')
                    return
        addrs = self._dns_cache.get(server_addr, None)
        if addrs is None:
            addrs = socket.getaddrinfo(server_addr, server_port, 0,
                                       socket.SOCK_DGRAM, socket.SOL_UDP)
            if not addrs:
                # drop
                return
            else:
                self._dns_cache[server_addr] = addrs

        af, socktype, proto, canonname, sa = addrs[0]
        key = client_key(r_addr, af)
        client = self._cache.get(key, None)
        if not client:
            # TODO async getaddrinfo
            if self._forbidden_iplist:
                if common.to_str(sa[0]) in self._forbidden_iplist:
                    logging.debug('IP %s is in forbidden list, drop' %
                                  common.to_str(sa[0]))
                    # drop
                    return
            client = socket.socket(af, socktype, proto)
            client.setblocking(False)
            self._cache[key] = client
            self._client_fd_to_server_addr[client.fileno()] = r_addr

            self._sockets.add(client.fileno())
            self._eventloop.add(client, eventloop.POLL_IN, self)

        if self._is_local:
            key, iv, m = cryptor.gen_key_iv(self._password, self._method)
            # spec https://shadowsocks.org/en/spec/one-time-auth.html
            if self._ota_enable_session:
                data = self._ota_chunk_data_gen(key, iv, data)
            try:
                data = cryptor.encrypt_all_m(key, iv, m, self._method, data,
                                             self._crypto_path)
            except Exception:
                logging.debug("UDP handle_server: encrypt data failed")
                return
            if not data:
                return
        else:
            data = data[header_length:]
        if not data:
            return
        try:
            client.sendto(data, (server_addr, server_port))
        except IOError as e:
            err = eventloop.errno_from_exception(e)
            if err in (errno.EINPROGRESS, errno.EAGAIN):
                pass
            else:
                shell.print_exception(e)