mirror of
https://github.com/bjdgyc/anylink.git
synced 2025-09-28 16:15:17 +08:00
Compare commits
23 Commits
Author | SHA1 | Date | |
---|---|---|---|
|
9d926edabb | ||
|
7329603c47 | ||
|
a7c6791c1e | ||
|
96c95bb6cd | ||
|
6d3dab6798 | ||
|
b313c6fa00 | ||
|
75b138a7a8 | ||
|
641d6127ba | ||
|
2828d1038d | ||
|
cb902a6b9b | ||
|
1b066ef602 | ||
|
5e804a3483 | ||
|
6e0c0efa85 | ||
|
8f196cb4e2 | ||
|
9182ccfba2 | ||
|
39d89b8c84 | ||
|
24e30509e4 | ||
|
4f56ea49c3 | ||
|
e55b2b6f0a | ||
|
15573a6ef3 | ||
|
38b8f0b2aa | ||
|
8df34428dd | ||
|
26483533a9 |
@@ -23,7 +23,7 @@ AnyLink 是一个企业级远程办公 sslvpn 的软件,可以支持多人同
|
|||||||
AnyLink 基于 [ietf-openconnect](https://tools.ietf.org/html/draft-mavrogiannopoulos-openconnect-02)
|
AnyLink 基于 [ietf-openconnect](https://tools.ietf.org/html/draft-mavrogiannopoulos-openconnect-02)
|
||||||
协议开发,并且借鉴了 [ocserv](http://ocserv.gitlab.io/www/index.html) 的开发思路,使其可以同时兼容 AnyConnect 客户端。
|
协议开发,并且借鉴了 [ocserv](http://ocserv.gitlab.io/www/index.html) 的开发思路,使其可以同时兼容 AnyConnect 客户端。
|
||||||
|
|
||||||
AnyLink 使用 TLS/DTLS 进行数据加密,因此需要 RSA 或 ECC 证书,可以通过 Let's Encrypt 和 TrustAsia 申请免费的 SSL 证书。
|
AnyLink 使用 TLS/DTLS 进行数据加密,因此需要 RSA 或 ECC 证书,可以使用私有自签证书,可以通过 Let's Encrypt 和 TrustAsia 申请免费的 SSL 证书。
|
||||||
|
|
||||||
AnyLink 服务端仅在 CentOS 7、CentOS 8、Ubuntu 18.04、Ubuntu 20.04 测试通过,如需要安装在其他系统,需要服务端支持 tun/tap
|
AnyLink 服务端仅在 CentOS 7、CentOS 8、Ubuntu 18.04、Ubuntu 20.04 测试通过,如需要安装在其他系统,需要服务端支持 tun/tap
|
||||||
功能、ip 设置命令、iptables命令。
|
功能、ip 设置命令、iptables命令。
|
||||||
@@ -60,9 +60,9 @@ AnyLink 服务端仅在 CentOS 7、CentOS 8、Ubuntu 18.04、Ubuntu 20.04 测试
|
|||||||
|
|
||||||
### 使用问题
|
### 使用问题
|
||||||
|
|
||||||
> 对于测试环境,可以使用 vpn.test.vqilu.cn 绑定host进行测试
|
> 对于测试环境,可以直接进行测试,需要客户端取消勾选【阻止不受信任的服务器(Block connections to untrusted servers)】
|
||||||
>
|
>
|
||||||
> 对于线上环境,必须申请安全的https证书(跟nginx使用的证书类型一致),不支持私有证书连接
|
> 对于线上环境,尽量申请安全的https证书(跟nginx使用的pem证书类型一致)
|
||||||
>
|
>
|
||||||
> 群共享文件有相关客户端软件下载,其他版本没有测试过,不保证使用正常
|
> 群共享文件有相关客户端软件下载,其他版本没有测试过,不保证使用正常
|
||||||
>
|
>
|
||||||
@@ -133,6 +133,7 @@ sudo ./anylink
|
|||||||
- [x] 流量压缩功能
|
- [x] 流量压缩功能
|
||||||
- [x] 出口 IP 自动放行
|
- [x] 出口 IP 自动放行
|
||||||
- [x] 支持多服务的配置区分
|
- [x] 支持多服务的配置区分
|
||||||
|
- [x] 支持私有自签证书
|
||||||
- [ ] 基于 ipvtap 设备的桥接访问模式
|
- [ ] 基于 ipvtap 设备的桥接访问模式
|
||||||
|
|
||||||
## Config
|
## Config
|
||||||
|
@@ -75,6 +75,10 @@ func GroupDetail(w http.ResponseWriter, r *http.Request) {
|
|||||||
if len(data.Auth) == 0 {
|
if len(data.Auth) == 0 {
|
||||||
data.Auth["type"] = "local"
|
data.Auth["type"] = "local"
|
||||||
}
|
}
|
||||||
|
// 兼容旧数据
|
||||||
|
if data.SplitDns == nil {
|
||||||
|
data.SplitDns = []dbdata.ValData{}
|
||||||
|
}
|
||||||
RespSucess(w, data)
|
RespSucess(w, data)
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@@ -214,6 +214,7 @@ type userAccountMailData struct {
|
|||||||
PinCode string
|
PinCode string
|
||||||
OtpImg string
|
OtpImg string
|
||||||
OtpImgBase64 string
|
OtpImgBase64 string
|
||||||
|
DisableOtp bool
|
||||||
}
|
}
|
||||||
|
|
||||||
func userAccountMail(user *dbdata.User) error {
|
func userAccountMail(user *dbdata.User) error {
|
||||||
@@ -265,6 +266,7 @@ func userAccountMail(user *dbdata.User) error {
|
|||||||
PinCode: user.PinCode,
|
PinCode: user.PinCode,
|
||||||
OtpImg: fmt.Sprintf("https://%s/otp_qr?id=%d&jwt=%s", setting.LinkAddr, user.Id, tokenString),
|
OtpImg: fmt.Sprintf("https://%s/otp_qr?id=%d&jwt=%s", setting.LinkAddr, user.Id, tokenString),
|
||||||
OtpImgBase64: "data:image/png;base64," + otpData,
|
OtpImgBase64: "data:image/png;base64," + otpData,
|
||||||
|
DisableOtp: user.DisableOtp,
|
||||||
}
|
}
|
||||||
w := bytes.NewBufferString("")
|
w := bytes.NewBufferString("")
|
||||||
t, _ := template.New("auth_complete").Parse(htmlBody)
|
t, _ := template.New("auth_complete").Parse(htmlBody)
|
||||||
@@ -273,12 +275,18 @@ func userAccountMail(user *dbdata.User) error {
|
|||||||
return err
|
return err
|
||||||
}
|
}
|
||||||
// fmt.Println(w.String())
|
// fmt.Println(w.String())
|
||||||
imgData, _ := userOtpQr(user.Id, false)
|
|
||||||
attach := &mail.File{
|
var attach *mail.File
|
||||||
MimeType: "image/png",
|
if user.DisableOtp {
|
||||||
Name: "userOtpQr.png",
|
attach = nil
|
||||||
Data: []byte(imgData),
|
} else {
|
||||||
Inline: true,
|
imgData, _ := userOtpQr(user.Id, false)
|
||||||
|
attach = &mail.File{
|
||||||
|
MimeType: "image/png",
|
||||||
|
Name: "userOtpQr.png",
|
||||||
|
Data: []byte(imgData),
|
||||||
|
Inline: true,
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
return SendMail(base.Cfg.Issuer, user.Email, w.String(), attach)
|
return SendMail(base.Cfg.Issuer, user.Email, w.String(), attach)
|
||||||
|
@@ -111,12 +111,6 @@ func StartAdmin() {
|
|||||||
selectedCipherSuites = append(selectedCipherSuites, s.ID)
|
selectedCipherSuites = append(selectedCipherSuites, s.ID)
|
||||||
}
|
}
|
||||||
|
|
||||||
if tlscert, _, err := dbdata.ParseCert(); err != nil {
|
|
||||||
base.Fatal("证书加载失败", err)
|
|
||||||
} else {
|
|
||||||
dbdata.LoadCertificate(tlscert)
|
|
||||||
}
|
|
||||||
|
|
||||||
// 设置tls信息
|
// 设置tls信息
|
||||||
tlsConfig := &tls.Config{
|
tlsConfig := &tls.Config{
|
||||||
NextProtos: []string{"http/1.1"},
|
NextProtos: []string{"http/1.1"},
|
||||||
|
@@ -9,6 +9,7 @@
|
|||||||
<RestrictTunnelProtocols>IPSec</RestrictTunnelProtocols>
|
<RestrictTunnelProtocols>IPSec</RestrictTunnelProtocols>
|
||||||
<BypassDownloader>true</BypassDownloader>
|
<BypassDownloader>true</BypassDownloader>
|
||||||
<AutoUpdate UserControllable="false">false</AutoUpdate>
|
<AutoUpdate UserControllable="false">false</AutoUpdate>
|
||||||
|
<LocalLanAccess UserControllable="true">true</LocalLanAccess>
|
||||||
<WindowsVPNEstablishment>AllowRemoteUsers</WindowsVPNEstablishment>
|
<WindowsVPNEstablishment>AllowRemoteUsers</WindowsVPNEstablishment>
|
||||||
<LinuxVPNEstablishment>AllowRemoteUsers</LinuxVPNEstablishment>
|
<LinuxVPNEstablishment>AllowRemoteUsers</LinuxVPNEstablishment>
|
||||||
<CertEnrollmentPin>pinAllowed</CertEnrollmentPin>
|
<CertEnrollmentPin>pinAllowed</CertEnrollmentPin>
|
||||||
|
@@ -174,6 +174,9 @@ func CheckErrNotFound(err error) bool {
|
|||||||
return err == ErrNotFound
|
return err == ErrNotFound
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// base64 图片
|
||||||
|
// 用户动态码(请妥善保存):<br/>
|
||||||
|
// <img src="{{.OtpImgBase64}}"/><br/>
|
||||||
const accountMail = `<p>您好:</p>
|
const accountMail = `<p>您好:</p>
|
||||||
<p> 您的{{.Issuer}}账号已经审核开通。</p>
|
<p> 您的{{.Issuer}}账号已经审核开通。</p>
|
||||||
<p>
|
<p>
|
||||||
@@ -181,17 +184,18 @@ const accountMail = `<p>您好:</p>
|
|||||||
用户组: <b>{{.Group}}</b> <br/>
|
用户组: <b>{{.Group}}</b> <br/>
|
||||||
用户名: <b>{{.Username}}</b> <br/>
|
用户名: <b>{{.Username}}</b> <br/>
|
||||||
用户PIN码: <b>{{.PinCode}}</b> <br/>
|
用户PIN码: <b>{{.PinCode}}</b> <br/>
|
||||||
|
{{if .DisableOtp}}
|
||||||
|
<!-- nothing -->
|
||||||
|
{{else}}
|
||||||
|
|
||||||
<!--
|
<!--
|
||||||
用户动态码(3天后失效):<br/>
|
用户动态码(3天后失效):<br/>
|
||||||
<img src="{{.OtpImg}}"/><br/>
|
<img src="{{.OtpImg}}"/><br/>
|
||||||
|
|
||||||
用户动态码(请妥善保存):<br/>
|
|
||||||
<img src="{{.OtpImgBase64}}"/><br/>
|
|
||||||
|
|
||||||
下面是兼容 gmail 的写法
|
|
||||||
-->
|
-->
|
||||||
用户动态码(请妥善保存):<br/>
|
用户动态码(请妥善保存):<br/>
|
||||||
<img src="cid:userOtpQr.png" alt="userOtpQr" /><br/>
|
<img src="cid:userOtpQr.png" alt="userOtpQr" /><br/>
|
||||||
|
|
||||||
|
{{end}}
|
||||||
</p>
|
</p>
|
||||||
<div>
|
<div>
|
||||||
使用说明:
|
使用说明:
|
||||||
|
@@ -5,6 +5,7 @@ import (
|
|||||||
"fmt"
|
"fmt"
|
||||||
"net"
|
"net"
|
||||||
"regexp"
|
"regexp"
|
||||||
|
"strconv"
|
||||||
"strings"
|
"strings"
|
||||||
"time"
|
"time"
|
||||||
|
|
||||||
@@ -24,11 +25,12 @@ const DsMaxLen = 20000
|
|||||||
|
|
||||||
type GroupLinkAcl struct {
|
type GroupLinkAcl struct {
|
||||||
// 自上而下匹配 默认 allow * *
|
// 自上而下匹配 默认 allow * *
|
||||||
Action string `json:"action"` // allow、deny
|
Action string `json:"action"` // allow、deny
|
||||||
Val string `json:"val"`
|
Val string `json:"val"`
|
||||||
Port uint16 `json:"port"`
|
Port string `json:"port"` // 兼容单端口历史数据类型uint16
|
||||||
IpNet *net.IPNet `json:"ip_net"`
|
Ports map[uint16]int8 `json:"ports"`
|
||||||
Note string `json:"note"`
|
IpNet *net.IPNet `json:"ip_net"`
|
||||||
|
Note string `json:"note"`
|
||||||
}
|
}
|
||||||
|
|
||||||
type ValData struct {
|
type ValData struct {
|
||||||
@@ -161,14 +163,59 @@ func SetGroup(g *Group) error {
|
|||||||
return errors.New("GroupLinkAcl 错误" + err.Error())
|
return errors.New("GroupLinkAcl 错误" + err.Error())
|
||||||
}
|
}
|
||||||
v.IpNet = ipNet
|
v.IpNet = ipNet
|
||||||
linkAcl = append(linkAcl, v)
|
|
||||||
|
portsStr := v.Port
|
||||||
|
v.Port = strings.TrimSpace(portsStr)
|
||||||
|
// switch vp := v.Port.(type) {
|
||||||
|
// case float64:
|
||||||
|
// portsStr = strconv.Itoa(int(vp))
|
||||||
|
// case string:
|
||||||
|
// portsStr = vp
|
||||||
|
// }
|
||||||
|
|
||||||
|
if regexp.MustCompile(`^\d{1,5}(-\d{1,5})?(,\d{1,5}(-\d{1,5})?)*$`).MatchString(portsStr) {
|
||||||
|
ports := map[uint16]int8{}
|
||||||
|
for _, p := range strings.Split(portsStr, ",") {
|
||||||
|
if p == "" {
|
||||||
|
continue
|
||||||
|
}
|
||||||
|
if regexp.MustCompile(`^\d{1,5}-\d{1,5}$`).MatchString(p) {
|
||||||
|
rp := strings.Split(p, "-")
|
||||||
|
portfrom, err := strconv.Atoi(rp[0])
|
||||||
|
if err != nil {
|
||||||
|
return errors.New("端口:" + rp[0] + " 格式错误, " + err.Error())
|
||||||
|
}
|
||||||
|
portto, err := strconv.Atoi(rp[1])
|
||||||
|
if err != nil {
|
||||||
|
return errors.New("端口:" + rp[1] + " 格式错误, " + err.Error())
|
||||||
|
}
|
||||||
|
for i := portfrom; i <= portto; i++ {
|
||||||
|
ports[uint16(i)] = 1
|
||||||
|
}
|
||||||
|
|
||||||
|
} else {
|
||||||
|
port, err := strconv.Atoi(p)
|
||||||
|
if err != nil {
|
||||||
|
return errors.New("端口:" + p + " 格式错误, " + err.Error())
|
||||||
|
}
|
||||||
|
ports[uint16(port)] = 1
|
||||||
|
}
|
||||||
|
}
|
||||||
|
v.Ports = ports
|
||||||
|
linkAcl = append(linkAcl, v)
|
||||||
|
} else {
|
||||||
|
return errors.New("端口: " + portsStr + " 格式错误,请用逗号分隔的端口,比如: 22,80,443 连续端口用-,比如:1234-5678")
|
||||||
|
}
|
||||||
|
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
g.LinkAcl = linkAcl
|
g.LinkAcl = linkAcl
|
||||||
|
|
||||||
// DNS 判断
|
// DNS 判断
|
||||||
clientDns := []ValData{}
|
clientDns := []ValData{}
|
||||||
for _, v := range g.ClientDns {
|
for _, v := range g.ClientDns {
|
||||||
|
v.Val = strings.TrimSpace(v.Val)
|
||||||
if v.Val != "" {
|
if v.Val != "" {
|
||||||
ip := net.ParseIP(v.Val)
|
ip := net.ParseIP(v.Val)
|
||||||
if ip.String() != v.Val {
|
if ip.String() != v.Val {
|
||||||
@@ -183,6 +230,20 @@ func SetGroup(g *Group) error {
|
|||||||
return errors.New("默认路由,必须设置一个DNS")
|
return errors.New("默认路由,必须设置一个DNS")
|
||||||
}
|
}
|
||||||
g.ClientDns = clientDns
|
g.ClientDns = clientDns
|
||||||
|
|
||||||
|
splitDns := []ValData{}
|
||||||
|
for _, v := range g.SplitDns {
|
||||||
|
v.Val = strings.TrimSpace(v.Val)
|
||||||
|
if v.Val != "" {
|
||||||
|
ValidateDomainName(v.Val)
|
||||||
|
if !ValidateDomainName(v.Val) {
|
||||||
|
return errors.New("域名 错误")
|
||||||
|
}
|
||||||
|
splitDns = append(splitDns, v)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
g.SplitDns = splitDns
|
||||||
|
|
||||||
// 域名拆分隧道,不能同时填写
|
// 域名拆分隧道,不能同时填写
|
||||||
g.DsIncludeDomains = strings.TrimSpace(g.DsIncludeDomains)
|
g.DsIncludeDomains = strings.TrimSpace(g.DsIncludeDomains)
|
||||||
g.DsExcludeDomains = strings.TrimSpace(g.DsExcludeDomains)
|
g.DsExcludeDomains = strings.TrimSpace(g.DsExcludeDomains)
|
||||||
@@ -238,6 +299,15 @@ func SetGroup(g *Group) error {
|
|||||||
return err
|
return err
|
||||||
}
|
}
|
||||||
|
|
||||||
|
func ContainsInPorts(ports map[uint16]int8, port uint16) bool {
|
||||||
|
_, ok := ports[port]
|
||||||
|
if ok {
|
||||||
|
return true
|
||||||
|
} else {
|
||||||
|
return false
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
func GroupAuthLogin(name, pwd string, authData map[string]interface{}) error {
|
func GroupAuthLogin(name, pwd string, authData map[string]interface{}) error {
|
||||||
g := &Group{Auth: authData}
|
g := &Group{Auth: authData}
|
||||||
authType := g.Auth["type"].(string)
|
authType := g.Auth["type"].(string)
|
||||||
|
@@ -11,6 +11,7 @@ type Group struct {
|
|||||||
Note string `json:"note" xorm:"varchar(255)"`
|
Note string `json:"note" xorm:"varchar(255)"`
|
||||||
AllowLan bool `json:"allow_lan" xorm:"Bool"`
|
AllowLan bool `json:"allow_lan" xorm:"Bool"`
|
||||||
ClientDns []ValData `json:"client_dns" xorm:"Text"`
|
ClientDns []ValData `json:"client_dns" xorm:"Text"`
|
||||||
|
SplitDns []ValData `json:"split_dns" xorm:"Text"`
|
||||||
RouteInclude []ValData `json:"route_include" xorm:"Text"`
|
RouteInclude []ValData `json:"route_include" xorm:"Text"`
|
||||||
RouteExclude []ValData `json:"route_exclude" xorm:"Text"`
|
RouteExclude []ValData `json:"route_exclude" xorm:"Text"`
|
||||||
DsExcludeDomains string `json:"ds_exclude_domains" xorm:"Text"`
|
DsExcludeDomains string `json:"ds_exclude_domains" xorm:"Text"`
|
||||||
|
@@ -17,7 +17,10 @@ import (
|
|||||||
"github.com/bjdgyc/anylink/sessdata"
|
"github.com/bjdgyc/anylink/sessdata"
|
||||||
)
|
)
|
||||||
|
|
||||||
var profileHash = ""
|
var (
|
||||||
|
profileHash = ""
|
||||||
|
certHash = ""
|
||||||
|
)
|
||||||
|
|
||||||
func LinkAuth(w http.ResponseWriter, r *http.Request) {
|
func LinkAuth(w http.ResponseWriter, r *http.Request) {
|
||||||
// TODO 调试信息输出
|
// TODO 调试信息输出
|
||||||
@@ -138,7 +141,7 @@ func LinkAuth(w http.ResponseWriter, r *http.Request) {
|
|||||||
other := &dbdata.SettingOther{}
|
other := &dbdata.SettingOther{}
|
||||||
_ = dbdata.SettingGet(other)
|
_ = dbdata.SettingGet(other)
|
||||||
rd := RequestData{SessionId: sess.Sid, SessionToken: sess.Sid + "@" + sess.Token,
|
rd := RequestData{SessionId: sess.Sid, SessionToken: sess.Sid + "@" + sess.Token,
|
||||||
Banner: other.Banner, ProfileName: base.Cfg.ProfileName, ProfileHash: profileHash}
|
Banner: other.Banner, ProfileName: base.Cfg.ProfileName, ProfileHash: profileHash, CertHash: certHash}
|
||||||
w.WriteHeader(http.StatusOK)
|
w.WriteHeader(http.StatusOK)
|
||||||
tplRequest(tpl_complete, w, rd)
|
tplRequest(tpl_complete, w, rd)
|
||||||
base.Info("login", cr.Auth.Username, userAgent)
|
base.Info("login", cr.Auth.Username, userAgent)
|
||||||
@@ -178,6 +181,7 @@ type RequestData struct {
|
|||||||
Banner string
|
Banner string
|
||||||
ProfileName string
|
ProfileName string
|
||||||
ProfileHash string
|
ProfileHash string
|
||||||
|
CertHash string
|
||||||
}
|
}
|
||||||
|
|
||||||
var auth_request = `<?xml version="1.0" encoding="UTF-8"?>
|
var auth_request = `<?xml version="1.0" encoding="UTF-8"?>
|
||||||
@@ -223,7 +227,7 @@ var auth_complete = `<?xml version="1.0" encoding="UTF-8"?>
|
|||||||
</capabilities>
|
</capabilities>
|
||||||
<config client="vpn" type="private">
|
<config client="vpn" type="private">
|
||||||
<vpn-base-config>
|
<vpn-base-config>
|
||||||
<server-cert-hash>240B97A685B2BFA66AD699B90AAC49EA66495D69</server-cert-hash>
|
<server-cert-hash>{{.CertHash}}</server-cert-hash>
|
||||||
</vpn-base-config>
|
</vpn-base-config>
|
||||||
<opaque is-for="vpn-client"></opaque>
|
<opaque is-for="vpn-client"></opaque>
|
||||||
<vpn-profile-manifest>
|
<vpn-profile-manifest>
|
||||||
|
@@ -86,7 +86,7 @@ func LinkTunnel(w http.ResponseWriter, r *http.Request) {
|
|||||||
}
|
}
|
||||||
cSess.CstpDpd = cstpDpd
|
cSess.CstpDpd = cstpDpd
|
||||||
|
|
||||||
dtlsPort := "4433"
|
dtlsPort := "443"
|
||||||
if strings.Contains(base.Cfg.ServerDTLSAddr, ":") {
|
if strings.Contains(base.Cfg.ServerDTLSAddr, ":") {
|
||||||
ss := strings.Split(base.Cfg.ServerDTLSAddr, ":")
|
ss := strings.Split(base.Cfg.ServerDTLSAddr, ":")
|
||||||
dtlsPort = ss[1]
|
dtlsPort = ss[1]
|
||||||
@@ -131,6 +131,11 @@ func LinkTunnel(w http.ResponseWriter, r *http.Request) {
|
|||||||
for _, v := range cSess.Group.ClientDns {
|
for _, v := range cSess.Group.ClientDns {
|
||||||
HttpAddHeader(w, "X-CSTP-DNS", v.Val)
|
HttpAddHeader(w, "X-CSTP-DNS", v.Val)
|
||||||
}
|
}
|
||||||
|
// 分割dns
|
||||||
|
for _, v := range cSess.Group.SplitDns {
|
||||||
|
HttpAddHeader(w, "X-CSTP-Split-DNS", v.Val)
|
||||||
|
}
|
||||||
|
|
||||||
// 允许的路由
|
// 允许的路由
|
||||||
for _, v := range cSess.Group.RouteInclude {
|
for _, v := range cSess.Group.RouteInclude {
|
||||||
if strings.ToLower(v.Val) == dbdata.All {
|
if strings.ToLower(v.Val) == dbdata.All {
|
||||||
@@ -156,9 +161,9 @@ func LinkTunnel(w http.ResponseWriter, r *http.Request) {
|
|||||||
HttpSetHeader(w, "X-CSTP-Keep", "true")
|
HttpSetHeader(w, "X-CSTP-Keep", "true")
|
||||||
HttpSetHeader(w, "X-CSTP-Tunnel-All-DNS", "false")
|
HttpSetHeader(w, "X-CSTP-Tunnel-All-DNS", "false")
|
||||||
|
|
||||||
HttpSetHeader(w, "X-CSTP-Rekey-Time", "43200") // 172800
|
HttpSetHeader(w, "X-CSTP-Rekey-Time", "86400") // 172800
|
||||||
HttpSetHeader(w, "X-CSTP-Rekey-Method", "new-tunnel")
|
HttpSetHeader(w, "X-CSTP-Rekey-Method", "new-tunnel")
|
||||||
HttpSetHeader(w, "X-DTLS-Rekey-Time", "43200")
|
HttpSetHeader(w, "X-DTLS-Rekey-Time", "86400")
|
||||||
HttpSetHeader(w, "X-DTLS-Rekey-Method", "new-tunnel")
|
HttpSetHeader(w, "X-DTLS-Rekey-Method", "new-tunnel")
|
||||||
|
|
||||||
HttpSetHeader(w, "X-CSTP-DPD", fmt.Sprintf("%d", cstpDpd))
|
HttpSetHeader(w, "X-CSTP-DPD", fmt.Sprintf("%d", cstpDpd))
|
||||||
@@ -180,7 +185,7 @@ func LinkTunnel(w http.ResponseWriter, r *http.Request) {
|
|||||||
HttpSetHeader(w, "X-CSTP-Routing-Filtering-Ignore", "false")
|
HttpSetHeader(w, "X-CSTP-Routing-Filtering-Ignore", "false")
|
||||||
HttpSetHeader(w, "X-CSTP-Quarantine", "false")
|
HttpSetHeader(w, "X-CSTP-Quarantine", "false")
|
||||||
HttpSetHeader(w, "X-CSTP-Disable-Always-On-VPN", "false")
|
HttpSetHeader(w, "X-CSTP-Disable-Always-On-VPN", "false")
|
||||||
HttpSetHeader(w, "X-CSTP-Client-Bypass-Protocol", "false")
|
HttpSetHeader(w, "X-CSTP-Client-Bypass-Protocol", "true")
|
||||||
HttpSetHeader(w, "X-CSTP-TCP-Keepalive", "false")
|
HttpSetHeader(w, "X-CSTP-TCP-Keepalive", "false")
|
||||||
// 设置域名拆分隧道(移动端不支持)
|
// 设置域名拆分隧道(移动端不支持)
|
||||||
if mobile != "mobile" {
|
if mobile != "mobile" {
|
||||||
|
@@ -88,8 +88,21 @@ func checkLinkAcl(group *dbdata.Group, pl *sessdata.Payload) bool {
|
|||||||
for _, v := range group.LinkAcl {
|
for _, v := range group.LinkAcl {
|
||||||
// 循环判断ip和端口
|
// 循环判断ip和端口
|
||||||
if v.IpNet.Contains(ipDst) {
|
if v.IpNet.Contains(ipDst) {
|
||||||
|
|
||||||
// 放行允许ip的ping
|
// 放行允许ip的ping
|
||||||
if v.Port == ipPort || v.Port == 0 || ipProto == waterutil.ICMP {
|
// if v.Ports == nil || len(v.Ports) == 0 {
|
||||||
|
// //单端口历史数据兼容
|
||||||
|
// port := uint16(v.Port.(float64))
|
||||||
|
// if port == ipPort || port == 0 || ipProto == waterutil.ICMP {
|
||||||
|
// if v.Action == dbdata.Allow {
|
||||||
|
// return true
|
||||||
|
// } else {
|
||||||
|
// return false
|
||||||
|
// }
|
||||||
|
// }
|
||||||
|
// } else {
|
||||||
|
|
||||||
|
if dbdata.ContainsInPorts(v.Ports, ipPort) || dbdata.ContainsInPorts(v.Ports, 0) || ipProto == waterutil.ICMP {
|
||||||
if v.Action == dbdata.Allow {
|
if v.Action == dbdata.Allow {
|
||||||
return true
|
return true
|
||||||
} else {
|
} else {
|
||||||
|
@@ -1,13 +1,16 @@
|
|||||||
package handler
|
package handler
|
||||||
|
|
||||||
import (
|
import (
|
||||||
|
"crypto/sha1"
|
||||||
"crypto/tls"
|
"crypto/tls"
|
||||||
|
"encoding/hex"
|
||||||
"fmt"
|
"fmt"
|
||||||
"io"
|
"io"
|
||||||
"net"
|
"net"
|
||||||
"net/http"
|
"net/http"
|
||||||
"net/http/httputil"
|
"net/http/httputil"
|
||||||
"os"
|
"os"
|
||||||
|
"strings"
|
||||||
"time"
|
"time"
|
||||||
|
|
||||||
"github.com/bjdgyc/anylink/base"
|
"github.com/bjdgyc/anylink/base"
|
||||||
@@ -36,6 +39,19 @@ func startTls() {
|
|||||||
// certs[0], err = tls.LoadX509KeyPair(certFile, keyFile)
|
// certs[0], err = tls.LoadX509KeyPair(certFile, keyFile)
|
||||||
// }
|
// }
|
||||||
|
|
||||||
|
tlscert, _, err := dbdata.ParseCert()
|
||||||
|
if err != nil {
|
||||||
|
base.Fatal("证书加载失败", err)
|
||||||
|
}
|
||||||
|
dbdata.LoadCertificate(tlscert)
|
||||||
|
|
||||||
|
// 计算证书hash值
|
||||||
|
s1 := sha1.New()
|
||||||
|
s1.Write(tlscert.Certificate[0])
|
||||||
|
h2s := hex.EncodeToString(s1.Sum(nil))
|
||||||
|
certHash = strings.ToUpper(h2s)
|
||||||
|
base.Info("certHash", certHash)
|
||||||
|
|
||||||
// 修复 CVE-2016-2183
|
// 修复 CVE-2016-2183
|
||||||
// https://segmentfault.com/a/1190000038486901
|
// https://segmentfault.com/a/1190000038486901
|
||||||
// nmap -sV --script ssl-enum-ciphers -p 443 www.example.com
|
// nmap -sV --script ssl-enum-ciphers -p 443 www.example.com
|
||||||
|
File diff suppressed because it is too large
Load Diff
Reference in New Issue
Block a user