Python SOCKS5 二级代理服务器 实现白名单与网络控制

过程

如果不太明白SCOKS5具体通讯过程,请先阅读一篇很详细的文章SOCKS5代理原理探索
建立SOCKS5连接时获取访问的目标域名或者IP,如果在白名单中或者是你想要拦截的广告等可进行直连或者屏蔽,其他情况则连接设置的目标SOCKS5代理
话不多说,直接上源码

源码

import datetime
import json
import os
import platform
import re
import socket
import select
import threading
import struct
import time
import traceback

conf = None  # 全局配置


def loadJsonFile(path):
    with open(path, 'r', encoding='utf-8') as f:
        data = json.load(f)
        return data


def add_log(s):
    filename = datetime.datetime.now().strftime('%Y-%m-%d')
    with open(filename + ".txt", 'a') as f:
        f.write(str(s) + "\n")


class Conf(object):
    white_list = None
    black_list = None
    proxy_ip = None
    proxy_port = None
    local_port = None

    def __init__(self):
        json_conf = loadJsonFile('./conf.json')
        self.white_list = set(json_conf["white_list"])
        self.black_list = set(json_conf["black_list"])
        self.proxy_ip = json_conf["proxy_ip"]
        self.proxy_port = int(json_conf["proxy_port"])
        self.local_port = set(json_conf["local_port"])


# 客户端开始发送具体的请求
class S5Req:
    def __init__(self, buf):
        self.ver, self.cmd, self.rsv, self.atyp = struct.unpack("BBBB", buf)
        self.dst_addr = None
        self.dst_port = None
        self.begin_buf = None

    def parse_port(self, buf):  # 解析端口
        port = struct.unpack("H", buf[0:2])[0]
        self.dst_port = int(socket.ntohs(int(port)))

    def parse_ipv4(self, buf):  # 解析IP
        self.dst_addr = socket.inet_ntoa(buf[0:4])
        self.parse_port(buf[4:])

    def parse_domain_name(self, buf):  # 解析域名
        name_len = struct.unpack("B", buf[0:1])[0]
        self.dst_addr = bytes.decode(buf[1:name_len + 1])
        self.parse_port(buf[1 + name_len:])

    def parse_netloc(self, buf):  # 解析网络地址
        if self.atyp == 3:
            self.parse_domain_name(buf)
        if self.atyp == 1:
            self.parse_ipv4(buf)


# 服务端收到请求后,处理后返回
class S5Resp:
    def __init__(self):
        self.ver = 5
        self.rep = 1
        self.rsv = 0
        self.atyp = 1
        self.end_buf = None

    def pack(self):
        buf = struct.pack("BBBBIH", self.ver, self.rep, self.rsv, self.atyp, 0, 0)
        return buf


class Socks5Error(Exception):
    pass


class Socks5Thread(threading.Thread):
    wait = 60.0
    buf_size = 1024 * 4
    buf1 = None
    buf2 = None
    buf3 = None
    is_white = False

    def __init__(self, s, ip, port, socks5):
        self.s = s
        self.dst_s = None
        self.ip = ip
        self.port = port
        self.socks5 = socks5
        threading.Thread.__init__(self)

    def run(self):
        resp = S5Resp()
        try:
            global conf
            self.socks5.a += 1
            self.buf1 = self.s.recv(255)
            if not self.buf1:
                raise socket.error
            # 协议版本号x05 s5 METHOD x00 无需认证
            self.s.send(b"\x05\x00")
            self.buf2 = self.s.recv(4)
            if not self.buf2 or len(self.buf2) != 4:
                raise socket.error
            req = S5Req(self.buf2)
            if req.ver != 5:  # 判断是否为客户端s5代理
                resp.rep = 1
                raise Socks5Error
            count = 255
            if req.atyp == 1:
                count = 6
            self.buf3 = self.s.recv(count)
            req.parse_netloc(self.buf3)
            if req.atyp == 3:
                try:
                    addr = socket.gethostbyname(req.dst_addr)
                except socket.error:
                    resp.rep = 4
                    raise Socks5Error
            else:
                addr = req.dst_addr
            resp.rep = 0
            self.s.send(resp.pack())
            req.begin_buf = self.s.recv(256)
            if not req.begin_buf:
                raise socket.error
            self.dst_s = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
            try:
                if req.dst_addr in conf.black_list:
                    raise socket.error
                elif req.dst_addr in conf.white_list or conf.proxy_ip == "":
                    self.is_white = True
                    self.dst_s.connect((addr, req.dst_port))
                    self.dst_s.send(req.begin_buf)
                    self.forward_loop(req=req)
                else:
                    self.dst_s.connect((conf.proxy_ip, conf.proxy_port))
                    self.dst_s.send(self.buf1)
                    self.dst_s.recv(255)
                    self.dst_s.send(self.buf2 + self.buf3)
                    self.dst_s.recv(255)
                    self.dst_s.send(req.begin_buf)
                    self.forward_loop(req=req)
            except socket.error:
                raise socket.error
        except Socks5Error:
            # traceback.print_exc()
            try:
                self.s.send(resp.pack())
            except Socks5Error:
                pass
        except socket.error:
            # traceback.print_exc()
            pass
        except:
            traceback.print_exc()
        finally:
            if self.s:
                self.s.close()
            if self.dst_s:
                self.dst_s.close()

    def forward_loop(self, req):
        rs_time = 0
        send_size = 0
        recv_size = 0
        begin_time = time.time()
        try:
            while 1:
                r, w, x = select.select([self.s, self.dst_s], [], [], self.wait)
                if not r:
                    return
                begin_rs = time.time()
                try:
                    for s in r:
                        if s is self.s:
                            buf = self.s.recv(self.buf_size)
                            if not buf:
                                raise socket.error
                            send_size += len(buf)
                            self.dst_s.send(buf)
                        if s is self.dst_s:
                            buf = self.dst_s.recv(self.buf_size)
                            if not buf:
                                raise socket.error
                            recv_size += len(buf)
                            self.s.send(buf)
                finally:
                    rs_time += (time.time() - begin_rs)
        finally:
            if req.begin_buf:
                send_size = send_size >> 10
                recv_size = recv_size >> 10
                info = "是否直连:" + str(self.is_white) + " " + req.dst_addr + " " + str(
                    req.dst_port) + " 发送:" + str(send_size) + "KB 接收:" + str(recv_size) + "KB 连接时长:" + \
                       str(round(time.time() - begin_time, 4)) + "秒 传输时长:" + str(round(rs_time, 4)) + "秒 首次内容:" + \
                       str(req.begin_buf)
                print(info)
                add_log(info)


class Socks5(threading.Thread):
    def __init__(self, ip="0.0.0.0", port=8080):
        self.ip = ip
        self.port = port
        self.s = None
        threading.Thread.__init__(self)
        self.a = 1

    def run(self):
        try:
            self.s = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
            self.s.bind((self.ip, self.port))
            self.s.listen(5)
        except socket.error as msg:
            print(msg)
            if self.s:
                self.s.close()
                self.s = None
            return False
        while 1:
            try:
                conn, addr = self.s.accept()
                thread = Socks5Thread(conn, addr[0], addr[1], self)
                thread.start()
            except socket.error as msg:
                print(msg)
                self.s.close()
                self.s = None
                return False
            pass


def kill_process(port):
    ret = os.popen("netstat -nao|findstr " + str(port))
    # 注意解码方式和cmd要相同,即为"gbk",否则输出乱码
    str_list = ret.read()
    ret_list = re.split('\n', str_list)
    try:
        process_pid = list(ret_list[0].split())[-1]
        os.popen('taskkill /pid ' + str(process_pid) + ' /F')
    except:
        pass


def begin():
    global conf
    conf = Conf()
    print("目标代理地址为:", end="")
    if conf.proxy_ip == "":
        print("无代理,直连")
    else:
        print(conf.proxy_ip, conf.proxy_port)
    print("当前计算机类型", platform.system())
    print("当前局域网地址:", socket.gethostbyname(socket.gethostname()))
    print("开放的端口如下:")
    ip_addr = "0.0.0.0"
    socks_set = {}
    for port in conf.local_port:
        print(port)
        kill_process(port)
        s5 = Socks5(ip_addr, int(port))
        s5.start()
        socks_set[int(port)] = s5


if __name__ == '__main__':
    begin()

配置文件conf.json

{
  "#white_list": "白名单,可以是IP,也可以是域名",
  "white_list": [
    "example1.com",
    "1.1.1.1"
  ],
  "#black_list": "黑名单,可以是IP,也可以是域名",
  "black_list": [
    "example2.com",
    "2.2.2.2"
  ],
  "#proxy_ip": "Socks5代理IP,当proxy_ip为空字符串时则无代理",
  "#proxy_port": "Socks5代理端口,当proxy_ip为空字符串时则无代理",
  "eg_proxy_ip": "1.1.1.1",
  "proxy_ip": "",
  "proxy_port": "8000",
  "local_port": [
    10073,
    10074,
    10075
  ]
}

如果对你有帮助,不妨点个赞再走,让更多人能看到

如果有什么疑问,欢迎在下方留言,开源的世界相互学习交流,才能进步的更快

  • 1
    点赞
  • 12
    收藏
    觉得还不错? 一键收藏
  • 0
    评论
好的,基于 Python 的 PySocks 库,可以实现一个简单的 SOCKS5 代理服务器,并支持用户认证和域名白名单。 以下是代码实现: ```python import socket import select import struct import sys import argparse import socks # 需要安装 PySocks 库,可以通过 pip 安装 # 定义常量 SOCKS_VERSION = 5 USER_AUTHENTICATION = 2 NO_ACCEPTABLE_METHODS = 0xFF SUCCESS = 0 # 定义命令行参数 parser = argparse.ArgumentParser() parser.add_argument("--ip", type=str, default="127.0.0.1", help="代理服务器 IP 地址,默认为 127.0.0.1") parser.add_argument("--port", type=int, default=1080, help="代理服务器端口号,默认为 1080") parser.add_argument("--username", type=str, default=None, help="代理服务器用户名,默认为 None") parser.add_argument("--password", type=str, default=None, help="代理服务器密码,默认为 None") parser.add_argument("--whitelist", type=str, default=None, help="代理服务器域名白名单,多个域名用逗号分隔,默认为 None") args = parser.parse_args() # 解析域名白名单 whitelist = [] if args.whitelist is not None: whitelist = args.whitelist.split(",") # 创建代理服务器 Socket server_socket = socket.socket(socket.AF_INET, socket.SOCK_STREAM) server_socket.setsockopt(socket.SOL_SOCKET, socket.SO_REUSEADDR, 1) server_socket.bind((args.ip, args.port)) server_socket.listen(5) print(f"代理服务器已启动,监听地址为 {args.ip}:{args.port},用户名为 {args.username},密码为 {args.password},域名白名单为 {whitelist}") inputs = [server_socket] # 处理 SOCKS5 协议的请求 def handle_socks5_request(client_socket): # 接收客户端发来的协议版本和支持的身份验证方式 version, nmethods = struct.unpack("!BB", client_socket.recv(2)) # 校验协议版本是否为 SOCKS5 if version != SOCKS_VERSION: print("无效的协议版本") client_socket.close() return # 接收客户端发来的身份验证方式 methods = client_socket.recv(nmethods) # 判断客户端是否支持用户名密码验证方式 if USER_AUTHENTICATION not in methods: print("不支持用户名密码身份验证方式") client_socket.sendall(struct.pack("!BB", SOCKS_VERSION, NO_ACCEPTABLE_METHODS)) client_socket.close() return # 向客户端发送支持的身份验证方式 client_socket.sendall(struct.pack("!BB", SOCKS_VERSION, USER_AUTHENTICATION)) # 接收客户端发来的用户名和密码 version, username_length = struct.unpack("!BB", client_socket.recv(2)) username = client_socket.recv(username_length).decode("utf-8") password_length = struct.unpack("!B", client_socket.recv(1))[0] password = client_socket.recv(password_length).decode("utf-8") # 校验用户名和密码是否正确 if args.username is not None and args.password is not None: if username != args.username or password != args.password: print("用户名或密码错误") client_socket.sendall(struct.pack("!BB", SOCKS_VERSION, NO_ACCEPTABLE_METHODS)) client_socket.close() return # 向客户端发送身份验证通过的消息 client_socket.sendall(struct.pack("!BB", SOCKS_VERSION, SUCCESS)) # 接收客户端发来的请求 version, cmd, _, address_type = struct.unpack("!BBBB", client_socket.recv(4)) if address_type == 1: # IPv4 address = socket.inet_ntoa(client_socket.recv(4)) elif address_type == 3: # 域名 address_length = struct.unpack("!B", client_socket.recv(1))[0] address = client_socket.recv(address_length).decode("utf-8") elif address_type == 4: # IPv6 address = socket.inet_ntop(socket.AF_INET6, client_socket.recv(16)) else: print("不支持的地址类型") client_socket.close() return port = struct.unpack("!H", client_socket.recv(2))[0] print(f"收到请求:{address}:{port}") # 校验域名是否在白名单中 if address in whitelist: print(f"请求的域名 {address} 在白名单中,允许访问") else: print(f"请求的域名 {address} 不在白名单中,禁止访问") client_socket.close() return # 连接远程服务器,并将请求转发过去 remote_socket = socks.socksocket() remote_socket.set_proxy(socks.SOCKS5, args.ip, args.port) remote_socket.connect((address, port)) client_socket.sendall(struct.pack("!BBBB", SOCKS_VERSION, SUCCESS, 0, address_type)) if address_type == 1: client_socket.sendall(socket.inet_aton(address)) elif address_type == 3: client_socket.sendall(struct.pack("!B", len(address)) + address.encode("utf-8")) elif address_type == 4: client_socket.sendall(socket.inet_pton(socket.AF_INET6, address)) client_socket.sendall(struct.pack("!H", port)) inputs.append(client_socket) inputs.append(remote_socket) print(f"请求 {address}:{port} 转发成功") while True: readable, _, _ = select.select(inputs, [], []) for sock in readable: if sock is server_socket: # 有新的客户端连接进来 client_socket, client_address = sock.accept() inputs.append(client_socket) print(f"客户端 {client_address} 已连接") else: # 处理客户端发来的请求 try: handle_socks5_request(sock) except Exception as e: print(f"请求处理失败:{e}") sock.close() inputs.remove(sock) ``` 通过命令行参数,可以设置代理服务器的 IP 地址、端口号、用户名、密码和域名白名单。启动代理服务器后,可以使用浏览器或其他支持 SOCKS5 协议的应用程序进行访问,代理服务器会根据域名白名单进行筛选,只允许访问指定的域名。
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值