Skip to content

Commit

Permalink
Adjust Trojan over XTLS
Browse files Browse the repository at this point in the history
  • Loading branch information
RPRX authored Oct 21, 2020
1 parent 358810b commit c325fae
Show file tree
Hide file tree
Showing 3 changed files with 13 additions and 14 deletions.
11 changes: 6 additions & 5 deletions proxy/trojan/client.go
Original file line number Diff line number Diff line change
Expand Up @@ -100,26 +100,27 @@ func (c *Client) Process(ctx context.Context, link *transport.Link, dialer inter
if destination.Address.Family().IsDomain() && destination.Address.Domain() == muxCoolAddress {
return newError(account.Flow + " doesn't support Mux").AtWarning()
}

if destination.Network == net.Network_UDP {
if !allowUDP443 && destination.Port == 443 {
return newError(account.Flow + " stopped UDP/443").AtInfo()
}
} else { // enable XTLS only if making TCP request
if xtlsConn, ok := iConn.(*xtls.Conn); ok {
connWriter.Flow = account.Flow
xtlsConn.RPRX = true

connWriter.Flow = account.Flow
if account.Flow == XRD {
xtlsConn.DirectMode = true
}
} else {
return newError(`failed to enable XTLS, maybe "security" is not "xtls"`).AtWarning()
return newError(`failed to use ` + account.Flow + `, maybe "security" is not "xtls"`).AtWarning()
}
}
case "":
if _, ok := iConn.(*xtls.Conn); ok {
panic(`To avoid misunderstanding, you must fill in Trojan "flow" when using XTLS.`)
}
default:
return newError("unsupported flow type: ", account.Flow).AtWarning()
return newError("unsupported flow " + account.Flow).AtWarning()
}

sessionPolicy := c.policyManager.ForLevel(user.Level)
Expand Down
8 changes: 4 additions & 4 deletions proxy/trojan/protocol.go
Original file line number Diff line number Diff line change
Expand Up @@ -21,17 +21,17 @@ var (

const (
maxLength = 8192
// XRO is constant for XTLS origin mode
XRO = "xtls-rprx-origin"
// XRD is constant for XTLS direct mode
XRD = "xtls-rprx-direct"
// XRO is constant for XTLS origin mode
XRO = "xtls-rprx-origin"

commandTCP byte = 1
commandUDP byte = 3

// for xtls
// for XTLS
commandXRD byte = 0xf0 // XTLS direct mode
commandXRO byte = 0xf1 // XTLS origin mode
commandXRD byte = 0xf2 // XTLS direct mode
)

// ConnWriter is TCP Connection Writer Wrapper for trojan protocol
Expand Down
8 changes: 3 additions & 5 deletions proxy/trojan/server.go
Original file line number Diff line number Diff line change
Expand Up @@ -194,24 +194,22 @@ func (s *Server) Process(ctx context.Context, network net.Network, conn internet
case XRO, XRD:
if account.Flow == clientReader.Flow {
if destination.Address.Family().IsDomain() && destination.Address.Domain() == muxCoolAddress {
return newError("XTLS doesn't support Mux").AtWarning()
return newError(clientReader.Flow + " doesn't support Mux").AtWarning()
}

if xtlsConn, ok := iConn.(*xtls.Conn); ok {
xtlsConn.RPRX = true

if clientReader.Flow == XRD {
xtlsConn.DirectMode = true
}
} else {
return newError(`failed to enable XTLS, maybe "security" is not "xtls"`).AtWarning()
return newError(`failed to use ` + clientReader.Flow + `, maybe "security" is not "xtls"`).AtWarning()
}
} else {
return newError("unable to use ", clientReader.Flow).AtWarning()
}
case "":
default:
return newError("unsupported flow type: ", account.Flow).AtWarning()
return newError("unsupported flow " + account.Flow).AtWarning()
}

ctx = log.ContextWithAccessMessage(ctx, &log.AccessMessage{
Expand Down

0 comments on commit c325fae

Please sign in to comment.