mirror of
https://github.com/LonamiWebs/Telethon.git
synced 2024-11-26 19:33:45 +03:00
228 lines
7.4 KiB
Python
228 lines
7.4 KiB
Python
import os
|
|
import struct
|
|
from datetime import timedelta
|
|
from zlib import crc32
|
|
from enum import Enum
|
|
|
|
import errno
|
|
|
|
from ..crypto import AESModeCTR
|
|
from ..extensions import TcpClient
|
|
from ..errors import InvalidChecksumError
|
|
|
|
|
|
class ConnectionMode(Enum):
|
|
"""Represents which mode should be used to stabilise a connection.
|
|
|
|
TCP_FULL: Default Telegram mode. Sends 12 additional bytes and
|
|
needs to calculate the CRC value of the packet itself.
|
|
|
|
TCP_INTERMEDIATE: Intermediate mode between TCP_FULL and TCP_ABRIDGED.
|
|
Always sends 4 extra bytes for the packet length.
|
|
|
|
TCP_ABRIDGED: This is the mode with the lowest overhead, as it will
|
|
only require 1 byte if the packet length is less than
|
|
508 bytes (127 << 2, which is very common).
|
|
|
|
TCP_OBFUSCATED: Encodes the packet just like TCP_ABRIDGED, but encrypts
|
|
every message with a randomly generated key using the
|
|
AES-CTR mode so the packets are harder to discern.
|
|
"""
|
|
TCP_FULL = 1
|
|
TCP_INTERMEDIATE = 2
|
|
TCP_ABRIDGED = 3
|
|
TCP_OBFUSCATED = 4
|
|
|
|
|
|
class Connection:
|
|
"""Represents an abstract connection (TCP, TCP abridged...).
|
|
'mode' must be any of the ConnectionMode enumeration.
|
|
|
|
Note that '.send()' and '.recv()' refer to messages, which
|
|
will be packed accordingly, whereas '.write()' and '.read()'
|
|
work on plain bytes, with no further additions.
|
|
"""
|
|
|
|
def __init__(self, mode=ConnectionMode.TCP_FULL,
|
|
proxy=None, timeout=timedelta(seconds=5)):
|
|
self._mode = mode
|
|
self._send_counter = 0
|
|
self._aes_encrypt, self._aes_decrypt = None, None
|
|
|
|
# TODO Rename "TcpClient" as some sort of generic socket?
|
|
self.conn = TcpClient(proxy=proxy, timeout=timeout)
|
|
|
|
# Sending messages
|
|
if mode == ConnectionMode.TCP_FULL:
|
|
setattr(self, 'send', self._send_tcp_full)
|
|
setattr(self, 'recv', self._recv_tcp_full)
|
|
|
|
elif mode == ConnectionMode.TCP_INTERMEDIATE:
|
|
setattr(self, 'send', self._send_intermediate)
|
|
setattr(self, 'recv', self._recv_intermediate)
|
|
|
|
elif mode in (ConnectionMode.TCP_ABRIDGED,
|
|
ConnectionMode.TCP_OBFUSCATED):
|
|
setattr(self, 'send', self._send_abridged)
|
|
setattr(self, 'recv', self._recv_abridged)
|
|
|
|
# Writing and reading from the socket
|
|
if mode == ConnectionMode.TCP_OBFUSCATED:
|
|
setattr(self, 'write', self._write_obfuscated)
|
|
setattr(self, 'read', self._read_obfuscated)
|
|
else:
|
|
setattr(self, 'write', self._write_plain)
|
|
setattr(self, 'read', self._read_plain)
|
|
|
|
def connect(self, ip, port):
|
|
try:
|
|
self.conn.connect(ip, port)
|
|
except OSError as e:
|
|
if e.errno == errno.EISCONN:
|
|
return # Already connected, no need to re-set everything up
|
|
else:
|
|
raise
|
|
|
|
self._send_counter = 0
|
|
if self._mode == ConnectionMode.TCP_ABRIDGED:
|
|
self.conn.write(b'\xef')
|
|
elif self._mode == ConnectionMode.TCP_INTERMEDIATE:
|
|
self.conn.write(b'\xee\xee\xee\xee')
|
|
elif self._mode == ConnectionMode.TCP_OBFUSCATED:
|
|
self._setup_obfuscation()
|
|
|
|
def get_timeout(self):
|
|
return self.conn.timeout
|
|
|
|
def _setup_obfuscation(self):
|
|
# Obfuscated messages secrets cannot start with any of these
|
|
keywords = (b'PVrG', b'GET ', b'POST', b'\xee' * 4)
|
|
while True:
|
|
random = os.urandom(64)
|
|
if (random[0] != b'\xef' and
|
|
random[:4] not in keywords and
|
|
random[4:4] != b'\0\0\0\0'):
|
|
# Invalid random generated
|
|
break
|
|
|
|
random = list(random)
|
|
random[56] = random[57] = random[58] = random[59] = 0xef
|
|
random_reversed = random[55:7:-1] # Reversed (8, len=48)
|
|
|
|
# encryption has "continuous buffer" enabled
|
|
encrypt_key = bytes(random[8:40])
|
|
encrypt_iv = bytes(random[40:56])
|
|
decrypt_key = bytes(random_reversed[:32])
|
|
decrypt_iv = bytes(random_reversed[32:48])
|
|
|
|
self._aes_encrypt = AESModeCTR(encrypt_key, encrypt_iv)
|
|
self._aes_decrypt = AESModeCTR(decrypt_key, decrypt_iv)
|
|
|
|
random[56:64] = self._aes_encrypt.encrypt(bytes(random))[56:64]
|
|
self.conn.write(bytes(random))
|
|
|
|
def is_connected(self):
|
|
return self.conn.connected
|
|
|
|
def close(self):
|
|
self.conn.close()
|
|
|
|
def clone(self):
|
|
"""Creates a copy of this Connection"""
|
|
return Connection(
|
|
mode=self._mode, proxy=self.conn.proxy, timeout=self.conn.timeout
|
|
)
|
|
|
|
# region Receive message implementations
|
|
|
|
def recv(self):
|
|
"""Receives and unpacks a message"""
|
|
# Default implementation is just an error
|
|
raise ValueError('Invalid connection mode specified: ' + str(self._mode))
|
|
|
|
def _recv_tcp_full(self):
|
|
packet_length_bytes = self.read(4)
|
|
packet_length = int.from_bytes(packet_length_bytes, 'little')
|
|
|
|
seq_bytes = self.read(4)
|
|
seq = int.from_bytes(seq_bytes, 'little')
|
|
|
|
body = self.read(packet_length - 12)
|
|
checksum = int.from_bytes(self.read(4), 'little')
|
|
|
|
valid_checksum = crc32(packet_length_bytes + seq_bytes + body)
|
|
if checksum != valid_checksum:
|
|
raise InvalidChecksumError(checksum, valid_checksum)
|
|
|
|
return body
|
|
|
|
def _recv_intermediate(self):
|
|
return self.read(int.from_bytes(self.read(4), 'little'))
|
|
|
|
def _recv_abridged(self):
|
|
length = int.from_bytes(self.read(1), 'little')
|
|
if length >= 127:
|
|
length = int.from_bytes(self.read(3) + b'\0', 'little')
|
|
|
|
return self.read(length << 2)
|
|
|
|
# endregion
|
|
|
|
# region Send message implementations
|
|
|
|
def send(self, message):
|
|
"""Encapsulates and sends the given message"""
|
|
# Default implementation is just an error
|
|
raise ValueError('Invalid connection mode specified: ' + str(self._mode))
|
|
|
|
def _send_tcp_full(self, message):
|
|
# https://core.telegram.org/mtproto#tcp-transport
|
|
# total length, sequence number, packet and checksum (CRC32)
|
|
length = len(message) + 12
|
|
data = struct.pack('<ii', length, self._send_counter) + message
|
|
crc = struct.pack('<I', crc32(data))
|
|
self._send_counter += 1
|
|
self.write(data + crc)
|
|
|
|
def _send_intermediate(self, message):
|
|
self.write(struct.pack('<i', len(message)) + message)
|
|
|
|
def _send_abridged(self, message):
|
|
length = len(message) >> 2
|
|
if length < 127:
|
|
length = struct.pack('B', length)
|
|
else:
|
|
length = b'\x7f' + int.to_bytes(length, 3, 'little')
|
|
|
|
self.write(length + message)
|
|
|
|
# endregion
|
|
|
|
# region Read implementations
|
|
|
|
def read(self, length):
|
|
raise ValueError('Invalid connection mode specified: ' + str(self._mode))
|
|
|
|
def _read_plain(self, length):
|
|
return self.conn.read(length)
|
|
|
|
def _read_obfuscated(self, length):
|
|
return self._aes_decrypt.encrypt(
|
|
self.conn.read(length)
|
|
)
|
|
|
|
# endregion
|
|
|
|
# region Write implementations
|
|
|
|
def write(self, data):
|
|
raise ValueError('Invalid connection mode specified: ' + str(self._mode))
|
|
|
|
def _write_plain(self, data):
|
|
self.conn.write(data)
|
|
|
|
def _write_obfuscated(self, data):
|
|
self.conn.write(self._aes_encrypt.encrypt(data))
|
|
|
|
# endregion
|