2019-01-02 01:55:51 +01:00
|
|
|
/* SPDX-License-Identifier: MIT
|
2018-05-03 15:04:00 +02:00
|
|
|
*
|
2021-01-28 17:52:15 +01:00
|
|
|
* Copyright (C) 2017-2021 WireGuard LLC. All Rights Reserved.
|
2018-05-03 15:04:00 +02:00
|
|
|
*/
|
|
|
|
|
2019-03-03 04:04:41 +01:00
|
|
|
package device
|
2017-05-30 22:36:49 +02:00
|
|
|
|
|
|
|
import (
|
2021-08-20 19:32:50 +02:00
|
|
|
"encoding/base64"
|
2021-08-24 10:43:55 +02:00
|
|
|
"errors"
|
2017-06-28 23:45:45 +02:00
|
|
|
"runtime"
|
2017-05-30 22:36:49 +02:00
|
|
|
"sync"
|
2017-07-15 16:27:59 +02:00
|
|
|
"sync/atomic"
|
2017-08-11 16:18:20 +02:00
|
|
|
"time"
|
2019-05-14 09:09:52 +02:00
|
|
|
|
2021-08-20 19:32:50 +02:00
|
|
|
"github.com/KusakabeSi/EtherGuardVPN/config"
|
2021-08-16 02:43:17 +02:00
|
|
|
"github.com/KusakabeSi/EtherGuardVPN/conn"
|
2021-08-16 20:58:15 +02:00
|
|
|
"github.com/KusakabeSi/EtherGuardVPN/path"
|
2021-08-16 02:43:17 +02:00
|
|
|
"github.com/KusakabeSi/EtherGuardVPN/ratelimiter"
|
|
|
|
"github.com/KusakabeSi/EtherGuardVPN/rwcancel"
|
2021-08-16 20:58:15 +02:00
|
|
|
"github.com/KusakabeSi/EtherGuardVPN/tap"
|
2021-08-20 19:32:50 +02:00
|
|
|
fixed_time_cache "github.com/KusakabeSi/go-cache"
|
2017-05-30 22:36:49 +02:00
|
|
|
)
|
|
|
|
|
|
|
|
type Device struct {
|
2018-01-26 22:52:32 +01:00
|
|
|
state struct {
|
2021-01-19 18:02:16 +01:00
|
|
|
// state holds the device's state. It is accessed atomically.
|
|
|
|
// Use the device.deviceState method to read it.
|
2021-02-09 17:27:48 +01:00
|
|
|
// device.deviceState does not acquire the mutex, so it captures only a snapshot.
|
|
|
|
// During state transitions, the state variable is updated before the device itself.
|
|
|
|
// The state is thus either the current state of the device or
|
|
|
|
// the intended future state of the device.
|
2021-01-19 18:02:16 +01:00
|
|
|
// For example, while executing a call to Up, state will be deviceStateUp.
|
|
|
|
// There is no guarantee that that intended future state of the device
|
|
|
|
// will become the actual state; Up can fail.
|
|
|
|
// The device can also change state multiple times between time of check and time of use.
|
|
|
|
// Unsynchronized uses of state must therefore be advisory/best-effort only.
|
2021-02-09 15:32:55 +01:00
|
|
|
state uint32 // actually a deviceState, but typed uint32 for convenience
|
2021-01-19 18:02:16 +01:00
|
|
|
// stopping blocks until all inputs to Device have been closed.
|
2018-05-05 06:00:38 +02:00
|
|
|
stopping sync.WaitGroup
|
2021-01-19 18:02:16 +01:00
|
|
|
// mu protects state changes.
|
2021-02-09 15:35:43 +01:00
|
|
|
sync.Mutex
|
2018-01-26 22:52:32 +01:00
|
|
|
}
|
2018-02-02 16:40:14 +01:00
|
|
|
|
2017-07-14 14:25:18 +02:00
|
|
|
net struct {
|
2018-05-20 06:19:29 +02:00
|
|
|
stopping sync.WaitGroup
|
2019-01-03 19:04:00 +01:00
|
|
|
sync.RWMutex
|
2019-11-07 17:13:05 +01:00
|
|
|
bind conn.Bind // bind interface
|
|
|
|
netlinkCancel *rwcancel.RWCancel
|
|
|
|
port uint16 // listening port
|
|
|
|
fwmark uint32 // mark value (0 = disabled)
|
2017-06-30 14:41:08 +02:00
|
|
|
}
|
2018-02-02 16:40:14 +01:00
|
|
|
|
2018-05-13 23:14:43 +02:00
|
|
|
staticIdentity struct {
|
2019-01-03 19:04:00 +01:00
|
|
|
sync.RWMutex
|
2018-02-02 16:40:14 +01:00
|
|
|
privateKey NoisePrivateKey
|
|
|
|
publicKey NoisePublicKey
|
|
|
|
}
|
|
|
|
|
2021-02-25 12:28:53 +01:00
|
|
|
rate struct {
|
|
|
|
underLoadUntil int64
|
|
|
|
limiter ratelimiter.Ratelimiter
|
|
|
|
}
|
|
|
|
|
2018-02-02 16:40:14 +01:00
|
|
|
peers struct {
|
2021-02-25 12:28:53 +01:00
|
|
|
sync.RWMutex // protects keyMap
|
2020-12-16 02:44:21 +01:00
|
|
|
keyMap map[NoisePublicKey]*Peer
|
2021-08-20 19:32:50 +02:00
|
|
|
IDMap map[config.Vertex]*Peer
|
|
|
|
SuperPeer map[NoisePublicKey]*Peer
|
|
|
|
Peer_state [32]byte
|
2018-02-02 16:40:14 +01:00
|
|
|
}
|
2021-08-20 19:32:50 +02:00
|
|
|
event_tryendpoint chan struct{}
|
2021-08-24 10:43:55 +02:00
|
|
|
ResetConnInterval float64
|
2021-08-20 19:32:50 +02:00
|
|
|
|
2021-08-24 10:43:55 +02:00
|
|
|
EdgeConfigPath string
|
|
|
|
EdgeConfig *config.EdgeConfig
|
|
|
|
SuperConfigPath string
|
|
|
|
SuperConfig *config.SuperConfig
|
2021-08-20 19:32:50 +02:00
|
|
|
|
|
|
|
Event_server_register chan path.RegisterMsg
|
|
|
|
Event_server_pong chan path.PongMsg
|
|
|
|
Event_server_NhTable_changed chan struct{}
|
|
|
|
Event_save_config chan struct{}
|
2018-02-02 16:40:14 +01:00
|
|
|
|
2021-08-25 10:13:53 +02:00
|
|
|
Event_Supernode_OK chan struct{}
|
|
|
|
|
2018-05-13 23:14:43 +02:00
|
|
|
indexTable IndexTable
|
|
|
|
cookieChecker CookieChecker
|
2018-02-02 16:40:14 +01:00
|
|
|
|
2021-08-21 16:54:24 +02:00
|
|
|
MsgCount uint32
|
2021-08-20 19:32:50 +02:00
|
|
|
IsSuperNode bool
|
|
|
|
ID config.Vertex
|
|
|
|
graph *path.IG
|
2021-08-23 10:35:17 +02:00
|
|
|
l2fib sync.Map
|
2021-08-25 10:13:53 +02:00
|
|
|
LogLevel config.LoggerInfo
|
2021-08-20 19:32:50 +02:00
|
|
|
DRoute config.DynamicRouteInfo
|
|
|
|
DupData fixed_time_cache.Cache
|
2021-08-16 20:58:15 +02:00
|
|
|
|
2018-02-02 16:40:14 +01:00
|
|
|
pool struct {
|
2021-02-02 18:37:49 +01:00
|
|
|
messageBuffers *WaitPool
|
|
|
|
inboundElements *WaitPool
|
|
|
|
outboundElements *WaitPool
|
2018-02-02 16:40:14 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
queue struct {
|
2021-01-29 14:54:11 +01:00
|
|
|
encryption *outboundQueue
|
|
|
|
decryption *inboundQueue
|
2021-01-29 18:24:45 +01:00
|
|
|
handshake *handshakeQueue
|
2017-06-28 23:45:45 +02:00
|
|
|
}
|
2018-02-02 16:40:14 +01:00
|
|
|
|
2021-08-16 20:58:15 +02:00
|
|
|
tap struct {
|
|
|
|
device tap.Device
|
2018-02-02 16:40:14 +01:00
|
|
|
mtu int32
|
|
|
|
}
|
2021-01-28 15:26:22 +01:00
|
|
|
|
|
|
|
ipcMutex sync.RWMutex
|
2021-01-29 18:24:45 +01:00
|
|
|
closed chan struct{}
|
2021-02-09 15:30:32 +01:00
|
|
|
log *Logger
|
2017-06-01 21:31:30 +02:00
|
|
|
}
|
|
|
|
|
2021-01-19 18:02:16 +01:00
|
|
|
// deviceState represents the state of a Device.
|
2021-02-09 15:39:19 +01:00
|
|
|
// There are three states: down, up, closed.
|
2021-01-19 18:02:16 +01:00
|
|
|
// Transitions:
|
|
|
|
//
|
2021-02-09 15:39:19 +01:00
|
|
|
// down -----+
|
|
|
|
// ↑↓ ↓
|
|
|
|
// up -> closed
|
2021-01-19 18:02:16 +01:00
|
|
|
//
|
|
|
|
type deviceState uint32
|
|
|
|
|
2021-02-09 15:39:19 +01:00
|
|
|
//go:generate go run golang.org/x/tools/cmd/stringer -type deviceState -trimprefix=deviceState
|
2021-01-19 18:02:16 +01:00
|
|
|
const (
|
2021-02-09 15:39:19 +01:00
|
|
|
deviceStateDown deviceState = iota
|
2021-01-19 18:02:16 +01:00
|
|
|
deviceStateUp
|
|
|
|
deviceStateClosed
|
|
|
|
)
|
|
|
|
|
|
|
|
// deviceState returns device.state.state as a deviceState
|
|
|
|
// See those docs for how to interpret this value.
|
|
|
|
func (device *Device) deviceState() deviceState {
|
|
|
|
return deviceState(atomic.LoadUint32(&device.state.state))
|
|
|
|
}
|
|
|
|
|
|
|
|
// isClosed reports whether the device is closed (or is closing).
|
|
|
|
// See device.state.state comments for how to interpret this value.
|
|
|
|
func (device *Device) isClosed() bool {
|
|
|
|
return device.deviceState() == deviceStateClosed
|
|
|
|
}
|
|
|
|
|
|
|
|
// isUp reports whether the device is up (or is attempting to come up).
|
|
|
|
// See device.state.state comments for how to interpret this value.
|
|
|
|
func (device *Device) isUp() bool {
|
|
|
|
return device.deviceState() == deviceStateUp
|
|
|
|
}
|
|
|
|
|
2021-02-09 16:11:33 +01:00
|
|
|
// Must hold device.peers.Lock()
|
|
|
|
func removePeerLocked(device *Device, peer *Peer, key NoisePublicKey) {
|
2018-02-02 16:40:14 +01:00
|
|
|
// stop routing and processing of packets
|
|
|
|
peer.Stop()
|
|
|
|
|
|
|
|
// remove from peer map
|
2021-08-20 19:32:50 +02:00
|
|
|
id := peer.ID
|
2018-02-02 16:40:14 +01:00
|
|
|
delete(device.peers.keyMap, key)
|
2021-08-25 10:13:53 +02:00
|
|
|
if id == config.SuperNodeMessage {
|
2021-08-20 19:32:50 +02:00
|
|
|
delete(device.peers.SuperPeer, key)
|
|
|
|
} else {
|
|
|
|
delete(device.peers.IDMap, id)
|
|
|
|
}
|
2018-02-02 16:40:14 +01:00
|
|
|
}
|
|
|
|
|
2021-01-19 18:02:16 +01:00
|
|
|
// changeState attempts to change the device state to match want.
|
2021-02-10 00:12:23 +01:00
|
|
|
func (device *Device) changeState(want deviceState) (err error) {
|
2021-02-09 15:35:43 +01:00
|
|
|
device.state.Lock()
|
|
|
|
defer device.state.Unlock()
|
2021-01-19 18:02:16 +01:00
|
|
|
old := device.deviceState()
|
|
|
|
if old == deviceStateClosed {
|
|
|
|
// once closed, always closed
|
|
|
|
device.log.Verbosef("Interface closed, ignored requested state %s", want)
|
2021-02-10 00:12:23 +01:00
|
|
|
return nil
|
2018-01-26 22:52:32 +01:00
|
|
|
}
|
2021-01-19 18:02:16 +01:00
|
|
|
switch want {
|
|
|
|
case old:
|
2021-02-10 00:12:23 +01:00
|
|
|
return nil
|
2021-01-19 18:02:16 +01:00
|
|
|
case deviceStateUp:
|
|
|
|
atomic.StoreUint32(&device.state.state, uint32(deviceStateUp))
|
2021-02-10 00:12:23 +01:00
|
|
|
err = device.upLocked()
|
|
|
|
if err == nil {
|
2018-02-04 16:46:24 +01:00
|
|
|
break
|
|
|
|
}
|
2021-01-19 18:02:16 +01:00
|
|
|
fallthrough // up failed; bring the device all the way back down
|
|
|
|
case deviceStateDown:
|
|
|
|
atomic.StoreUint32(&device.state.state, uint32(deviceStateDown))
|
2021-02-10 00:12:23 +01:00
|
|
|
errDown := device.downLocked()
|
|
|
|
if err == nil {
|
|
|
|
err = errDown
|
|
|
|
}
|
2018-02-04 16:46:24 +01:00
|
|
|
}
|
2021-01-19 18:02:16 +01:00
|
|
|
device.log.Verbosef("Interface state was %s, requested %s, now %s", old, want, device.deviceState())
|
2021-02-10 00:12:23 +01:00
|
|
|
return
|
2021-01-19 18:02:16 +01:00
|
|
|
}
|
2018-01-26 22:52:32 +01:00
|
|
|
|
2021-01-19 18:02:16 +01:00
|
|
|
// upLocked attempts to bring the device up and reports whether it succeeded.
|
|
|
|
// The caller must hold device.state.mu and is responsible for updating device.state.state.
|
2021-02-10 00:12:23 +01:00
|
|
|
func (device *Device) upLocked() error {
|
2021-01-19 18:02:16 +01:00
|
|
|
if err := device.BindUpdate(); err != nil {
|
|
|
|
device.log.Errorf("Unable to update bind: %v", err)
|
2021-02-10 00:12:23 +01:00
|
|
|
return err
|
2021-01-19 18:02:16 +01:00
|
|
|
}
|
2018-01-26 22:52:32 +01:00
|
|
|
|
2021-01-19 18:02:16 +01:00
|
|
|
device.peers.RLock()
|
|
|
|
for _, peer := range device.peers.keyMap {
|
|
|
|
peer.Start()
|
|
|
|
if atomic.LoadUint32(&peer.persistentKeepaliveInterval) > 0 {
|
|
|
|
peer.SendKeepalive()
|
|
|
|
}
|
|
|
|
}
|
|
|
|
device.peers.RUnlock()
|
2021-02-10 00:12:23 +01:00
|
|
|
return nil
|
2017-12-29 17:42:09 +01:00
|
|
|
}
|
|
|
|
|
2021-01-19 18:02:16 +01:00
|
|
|
// downLocked attempts to bring the device down.
|
|
|
|
// The caller must hold device.state.mu and is responsible for updating device.state.state.
|
2021-02-10 00:12:23 +01:00
|
|
|
func (device *Device) downLocked() error {
|
2021-01-19 18:02:16 +01:00
|
|
|
err := device.BindClose()
|
|
|
|
if err != nil {
|
|
|
|
device.log.Errorf("Bind close failed: %v", err)
|
|
|
|
}
|
2017-12-29 17:42:09 +01:00
|
|
|
|
2021-01-19 18:02:16 +01:00
|
|
|
device.peers.RLock()
|
|
|
|
for _, peer := range device.peers.keyMap {
|
|
|
|
peer.Stop()
|
2018-01-13 09:00:37 +01:00
|
|
|
}
|
2021-01-19 18:02:16 +01:00
|
|
|
device.peers.RUnlock()
|
2021-02-10 00:12:23 +01:00
|
|
|
return err
|
2021-01-19 18:02:16 +01:00
|
|
|
}
|
2018-01-13 09:00:37 +01:00
|
|
|
|
2021-02-10 00:12:23 +01:00
|
|
|
func (device *Device) Up() error {
|
|
|
|
return device.changeState(deviceStateUp)
|
2018-01-26 22:52:32 +01:00
|
|
|
}
|
2018-01-13 09:00:37 +01:00
|
|
|
|
2021-02-10 00:12:23 +01:00
|
|
|
func (device *Device) Down() error {
|
|
|
|
return device.changeState(deviceStateDown)
|
2017-12-29 17:42:09 +01:00
|
|
|
}
|
|
|
|
|
2017-08-11 16:18:20 +02:00
|
|
|
func (device *Device) IsUnderLoad() bool {
|
|
|
|
// check if currently under load
|
|
|
|
now := time.Now()
|
2021-05-22 00:57:42 +02:00
|
|
|
underLoad := len(device.queue.handshake.c) >= QueueHandshakeSize/8
|
2017-08-11 16:18:20 +02:00
|
|
|
if underLoad {
|
2021-01-29 18:54:19 +01:00
|
|
|
atomic.StoreInt64(&device.rate.underLoadUntil, now.Add(UnderLoadAfterTime).UnixNano())
|
2017-08-11 16:18:20 +02:00
|
|
|
return true
|
|
|
|
}
|
|
|
|
// check if recently under load
|
2021-01-29 18:54:19 +01:00
|
|
|
return atomic.LoadInt64(&device.rate.underLoadUntil) > now.UnixNano()
|
2017-08-11 16:18:20 +02:00
|
|
|
}
|
|
|
|
|
2017-08-04 16:15:53 +02:00
|
|
|
func (device *Device) SetPrivateKey(sk NoisePrivateKey) error {
|
2018-02-02 16:40:14 +01:00
|
|
|
// lock required resources
|
|
|
|
|
2019-01-03 19:04:00 +01:00
|
|
|
device.staticIdentity.Lock()
|
|
|
|
defer device.staticIdentity.Unlock()
|
2018-02-02 16:40:14 +01:00
|
|
|
|
2019-07-11 17:36:36 +02:00
|
|
|
if sk.Equals(device.staticIdentity.privateKey) {
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2019-01-03 19:04:00 +01:00
|
|
|
device.peers.Lock()
|
|
|
|
defer device.peers.Unlock()
|
2018-02-02 16:40:14 +01:00
|
|
|
|
2019-08-05 17:46:34 +02:00
|
|
|
lockedPeers := make([]*Peer, 0, len(device.peers.keyMap))
|
2018-02-02 16:40:14 +01:00
|
|
|
for _, peer := range device.peers.keyMap {
|
|
|
|
peer.handshake.mutex.RLock()
|
2019-08-05 17:46:34 +02:00
|
|
|
lockedPeers = append(lockedPeers, peer)
|
2018-02-02 16:40:14 +01:00
|
|
|
}
|
2017-06-24 15:34:17 +02:00
|
|
|
|
2017-08-07 15:25:04 +02:00
|
|
|
// remove peers with matching public keys
|
2017-08-04 16:15:53 +02:00
|
|
|
|
|
|
|
publicKey := sk.publicKey()
|
2018-02-02 16:40:14 +01:00
|
|
|
for key, peer := range device.peers.keyMap {
|
|
|
|
if peer.handshake.remoteStatic.Equals(publicKey) {
|
2021-01-27 15:53:21 +01:00
|
|
|
peer.handshake.mutex.RUnlock()
|
2021-02-09 16:11:33 +01:00
|
|
|
removePeerLocked(device, peer, key)
|
2021-01-27 15:53:21 +01:00
|
|
|
peer.handshake.mutex.RLock()
|
2017-08-04 16:15:53 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2017-06-24 15:34:17 +02:00
|
|
|
// update key material
|
|
|
|
|
2018-05-13 23:14:43 +02:00
|
|
|
device.staticIdentity.privateKey = sk
|
|
|
|
device.staticIdentity.publicKey = publicKey
|
|
|
|
device.cookieChecker.Init(publicKey)
|
2017-06-24 15:34:17 +02:00
|
|
|
|
2018-02-02 16:40:14 +01:00
|
|
|
// do static-static DH pre-computations
|
|
|
|
|
2019-08-05 17:46:34 +02:00
|
|
|
expiredPeers := make([]*Peer, 0, len(device.peers.keyMap))
|
2020-02-04 18:08:51 +01:00
|
|
|
for _, peer := range device.peers.keyMap {
|
2018-05-14 12:27:29 +02:00
|
|
|
handshake := &peer.handshake
|
2020-02-04 18:08:51 +01:00
|
|
|
handshake.precomputedStaticStatic = device.staticIdentity.privateKey.sharedSecret(handshake.remoteStatic)
|
|
|
|
expiredPeers = append(expiredPeers, peer)
|
2017-06-23 13:41:59 +02:00
|
|
|
}
|
2017-08-04 16:15:53 +02:00
|
|
|
|
2019-08-05 17:46:34 +02:00
|
|
|
for _, peer := range lockedPeers {
|
|
|
|
peer.handshake.mutex.RUnlock()
|
|
|
|
}
|
|
|
|
for _, peer := range expiredPeers {
|
|
|
|
peer.ExpireCurrentKeypairs()
|
|
|
|
}
|
|
|
|
|
2017-08-04 16:15:53 +02:00
|
|
|
return nil
|
2017-06-23 13:41:59 +02:00
|
|
|
}
|
|
|
|
|
2021-08-24 10:43:55 +02:00
|
|
|
func NewDevice(tapDevice tap.Device, id config.Vertex, bind conn.Bind, logger *Logger, graph *path.IG, IsSuperNode bool, configpath string, econfig *config.EdgeConfig, sconfig *config.SuperConfig, superevents *path.SUPER_Events) *Device {
|
2017-06-28 23:45:45 +02:00
|
|
|
device := new(Device)
|
2021-01-19 18:02:16 +01:00
|
|
|
device.state.state = uint32(deviceStateDown)
|
2021-01-29 18:24:45 +01:00
|
|
|
device.closed = make(chan struct{})
|
2017-11-14 18:26:28 +01:00
|
|
|
device.log = logger
|
2021-02-22 02:01:50 +01:00
|
|
|
device.net.bind = bind
|
2021-08-16 20:58:15 +02:00
|
|
|
device.tap.device = tapDevice
|
|
|
|
mtu, err := device.tap.device.MTU()
|
2018-04-18 16:39:14 +02:00
|
|
|
if err != nil {
|
2021-01-26 23:05:48 +01:00
|
|
|
device.log.Errorf("Trouble determining MTU, assuming default: %v", err)
|
2018-04-19 15:52:59 +02:00
|
|
|
mtu = DefaultMTU
|
2018-04-18 16:39:14 +02:00
|
|
|
}
|
2021-08-16 20:58:15 +02:00
|
|
|
device.tap.mtu = int32(mtu)
|
2018-02-02 16:40:14 +01:00
|
|
|
device.peers.keyMap = make(map[NoisePublicKey]*Peer)
|
2021-08-20 19:32:50 +02:00
|
|
|
device.peers.IDMap = make(map[config.Vertex]*Peer)
|
2021-08-21 16:54:24 +02:00
|
|
|
device.peers.SuperPeer = make(map[NoisePublicKey]*Peer)
|
2021-08-20 19:32:50 +02:00
|
|
|
device.IsSuperNode = IsSuperNode
|
2021-08-16 20:58:15 +02:00
|
|
|
device.ID = id
|
2021-08-20 19:32:50 +02:00
|
|
|
device.graph = graph
|
|
|
|
|
2018-02-02 16:40:14 +01:00
|
|
|
device.rate.limiter.Init()
|
2018-05-13 18:23:40 +02:00
|
|
|
device.indexTable.Init()
|
2018-09-22 06:29:02 +02:00
|
|
|
device.PopulatePools()
|
2021-08-20 19:32:50 +02:00
|
|
|
if IsSuperNode {
|
|
|
|
device.Event_server_pong = superevents.Event_server_pong
|
|
|
|
device.Event_server_register = superevents.Event_server_register
|
|
|
|
device.Event_server_NhTable_changed = superevents.Event_server_NhTable_changed
|
2021-08-25 10:13:53 +02:00
|
|
|
device.LogLevel = sconfig.LogLevel
|
2021-08-24 10:43:55 +02:00
|
|
|
device.SuperConfig = sconfig
|
|
|
|
device.SuperConfigPath = configpath
|
2021-08-20 19:32:50 +02:00
|
|
|
go device.RoutineRecalculateNhTable()
|
|
|
|
} else {
|
2021-08-24 10:43:55 +02:00
|
|
|
device.EdgeConfigPath = configpath
|
2021-08-21 16:54:24 +02:00
|
|
|
device.EdgeConfig = econfig
|
|
|
|
device.DRoute = econfig.DynamicRoute
|
2021-08-23 18:39:04 +02:00
|
|
|
device.DupData = *fixed_time_cache.NewCache(path.S2TD(econfig.DynamicRoute.DupCheckTimeout), false, path.S2TD(60))
|
2021-08-20 19:32:50 +02:00
|
|
|
device.event_tryendpoint = make(chan struct{}, 1<<6)
|
|
|
|
device.Event_save_config = make(chan struct{}, 1<<5)
|
2021-08-25 10:13:53 +02:00
|
|
|
device.Event_Supernode_OK = make(chan struct{}, 4)
|
|
|
|
device.LogLevel = econfig.LogLevel
|
2021-08-24 10:43:55 +02:00
|
|
|
device.ResetConnInterval = device.EdgeConfig.ResetConnInterval
|
2021-08-20 19:32:50 +02:00
|
|
|
go device.RoutineSetEndpoint()
|
|
|
|
go device.RoutineRegister()
|
|
|
|
go device.RoutineSendPing()
|
|
|
|
go device.RoutineRecalculateNhTable()
|
2021-08-23 18:39:04 +02:00
|
|
|
go device.RoutineSpreadAllMyNeighbor()
|
2021-08-24 10:43:55 +02:00
|
|
|
go device.RoutineResetConn()
|
2021-08-20 19:32:50 +02:00
|
|
|
}
|
2017-06-30 14:41:08 +02:00
|
|
|
// create queues
|
|
|
|
|
2021-01-29 18:24:45 +01:00
|
|
|
device.queue.handshake = newHandshakeQueue()
|
2021-01-29 14:54:11 +01:00
|
|
|
device.queue.encryption = newOutboundQueue()
|
|
|
|
device.queue.decryption = newInboundQueue()
|
2017-07-01 23:29:22 +02:00
|
|
|
|
2017-06-28 23:45:45 +02:00
|
|
|
// start workers
|
|
|
|
|
2018-05-05 06:00:38 +02:00
|
|
|
cpus := runtime.NumCPU()
|
2018-05-16 22:20:15 +02:00
|
|
|
device.state.stopping.Wait()
|
2021-02-09 19:26:45 +01:00
|
|
|
device.queue.encryption.wg.Add(cpus) // One for each RoutineHandshake
|
2020-12-22 20:38:24 +01:00
|
|
|
for i := 0; i < cpus; i++ {
|
2021-05-07 12:21:21 +02:00
|
|
|
go device.RoutineEncryption(i + 1)
|
|
|
|
go device.RoutineDecryption(i + 1)
|
|
|
|
go device.RoutineHandshake(i + 1)
|
2017-06-28 23:45:45 +02:00
|
|
|
}
|
2017-12-01 23:37:26 +01:00
|
|
|
|
2021-02-09 18:53:00 +01:00
|
|
|
device.state.stopping.Add(1) // RoutineReadFromTUN
|
|
|
|
device.queue.encryption.wg.Add(1) // RoutineReadFromTUN
|
2017-10-07 22:35:23 +02:00
|
|
|
go device.RoutineReadFromTUN()
|
2017-08-07 15:25:04 +02:00
|
|
|
go device.RoutineTUNEventReader()
|
2017-12-01 23:37:26 +01:00
|
|
|
|
2017-06-28 23:45:45 +02:00
|
|
|
return device
|
2017-06-24 15:34:17 +02:00
|
|
|
}
|
|
|
|
|
2021-08-24 10:43:55 +02:00
|
|
|
func (device *Device) LookupPeerIDAtConfig(pk NoisePublicKey) (ID config.Vertex, err error) {
|
|
|
|
var peerlist []config.PeerInfo
|
|
|
|
if device.IsSuperNode {
|
|
|
|
if device.SuperConfig == nil {
|
|
|
|
return 0, errors.New("Superconfig is nil")
|
|
|
|
}
|
|
|
|
peerlist = device.SuperConfig.Peers
|
|
|
|
} else {
|
|
|
|
if device.EdgeConfig == nil {
|
|
|
|
return 0, errors.New("EdgeConfig is nil")
|
|
|
|
}
|
|
|
|
peerlist = device.EdgeConfig.Peers
|
|
|
|
}
|
|
|
|
|
|
|
|
pkstr := PubKey2Str(pk)
|
|
|
|
for _, peerinfo := range peerlist {
|
|
|
|
if peerinfo.PubKey == pkstr {
|
|
|
|
return peerinfo.NodeID, nil
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return 0, errors.New("Peer not found in the config file.")
|
|
|
|
}
|
|
|
|
|
2017-06-24 15:34:17 +02:00
|
|
|
func (device *Device) LookupPeer(pk NoisePublicKey) *Peer {
|
2019-01-03 19:04:00 +01:00
|
|
|
device.peers.RLock()
|
|
|
|
defer device.peers.RUnlock()
|
2018-02-02 16:40:14 +01:00
|
|
|
|
|
|
|
return device.peers.keyMap[pk]
|
2017-06-24 15:34:17 +02:00
|
|
|
}
|
|
|
|
|
2021-08-20 19:32:50 +02:00
|
|
|
func (device *Device) LookupPeerByStr(pks string) *Peer {
|
|
|
|
var pk NoisePublicKey
|
|
|
|
sk_slice, _ := base64.StdEncoding.DecodeString(pks)
|
|
|
|
copy(pk[:], sk_slice)
|
|
|
|
return device.LookupPeer(pk)
|
|
|
|
}
|
|
|
|
|
|
|
|
func PubKey2Str(pk NoisePublicKey) (result string) {
|
|
|
|
result = string(base64.StdEncoding.EncodeToString(pk[:]))
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
func PriKey2Str(pk NoisePrivateKey) (result string) {
|
|
|
|
result = string(base64.StdEncoding.EncodeToString(pk[:]))
|
|
|
|
return
|
|
|
|
}
|
|
|
|
func PSKeyStr(pk NoisePresharedKey) (result string) {
|
|
|
|
result = string(base64.StdEncoding.EncodeToString(pk[:]))
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
func Str2PubKey(k string) (pk NoisePublicKey) {
|
|
|
|
sk_slice, _ := base64.StdEncoding.DecodeString(k)
|
|
|
|
copy(pk[:], sk_slice)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
func Str2PriKey(k string) (pk NoisePrivateKey) {
|
|
|
|
sk_slice, _ := base64.StdEncoding.DecodeString(k)
|
|
|
|
copy(pk[:], sk_slice)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
func Str2PSKey(k string) (pk NoisePresharedKey) {
|
|
|
|
sk_slice, _ := base64.StdEncoding.DecodeString(k)
|
|
|
|
copy(pk[:], sk_slice)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
func (device *Device) GetIPMap() map[config.Vertex]*Peer {
|
|
|
|
return device.peers.IDMap
|
|
|
|
}
|
|
|
|
|
2017-06-24 15:34:17 +02:00
|
|
|
func (device *Device) RemovePeer(key NoisePublicKey) {
|
2019-01-03 19:04:00 +01:00
|
|
|
device.peers.Lock()
|
|
|
|
defer device.peers.Unlock()
|
2018-02-02 16:40:14 +01:00
|
|
|
// stop peer and remove from routing
|
|
|
|
|
|
|
|
peer, ok := device.peers.keyMap[key]
|
|
|
|
if ok {
|
2021-02-09 16:11:33 +01:00
|
|
|
removePeerLocked(device, peer, key)
|
2018-02-02 16:40:14 +01:00
|
|
|
}
|
2017-06-01 21:31:30 +02:00
|
|
|
}
|
|
|
|
|
2017-06-24 15:34:17 +02:00
|
|
|
func (device *Device) RemoveAllPeers() {
|
2019-01-03 19:04:00 +01:00
|
|
|
device.peers.Lock()
|
|
|
|
defer device.peers.Unlock()
|
2018-02-02 16:40:14 +01:00
|
|
|
|
|
|
|
for key, peer := range device.peers.keyMap {
|
2021-02-09 16:11:33 +01:00
|
|
|
removePeerLocked(device, peer, key)
|
2017-06-01 21:31:30 +02:00
|
|
|
}
|
2018-02-02 16:40:14 +01:00
|
|
|
|
|
|
|
device.peers.keyMap = make(map[NoisePublicKey]*Peer)
|
2021-08-20 19:32:50 +02:00
|
|
|
device.peers.IDMap = make(map[config.Vertex]*Peer)
|
2017-05-30 22:36:49 +02:00
|
|
|
}
|
2017-06-30 14:41:08 +02:00
|
|
|
|
|
|
|
func (device *Device) Close() {
|
2021-02-09 15:35:43 +01:00
|
|
|
device.state.Lock()
|
|
|
|
defer device.state.Unlock()
|
2021-01-19 18:02:16 +01:00
|
|
|
if device.isClosed() {
|
2017-11-17 17:25:45 +01:00
|
|
|
return
|
|
|
|
}
|
2021-01-19 18:02:16 +01:00
|
|
|
atomic.StoreUint32(&device.state.state, uint32(deviceStateClosed))
|
2021-01-26 23:05:48 +01:00
|
|
|
device.log.Verbosef("Device closing")
|
2018-05-01 16:59:13 +02:00
|
|
|
|
2021-08-16 20:58:15 +02:00
|
|
|
device.tap.device.Close()
|
2021-01-19 18:02:16 +01:00
|
|
|
device.downLocked()
|
2018-05-01 16:59:13 +02:00
|
|
|
|
2021-02-02 19:46:34 +01:00
|
|
|
// Remove peers before closing queues,
|
|
|
|
// because peers assume that queues are active.
|
|
|
|
device.RemoveAllPeers()
|
|
|
|
|
2021-01-12 02:34:02 +01:00
|
|
|
// We kept a reference to the encryption and decryption queues,
|
|
|
|
// in case we started any new peers that might write to them.
|
|
|
|
// No new peers are coming; we are done with these queues.
|
2020-12-15 00:07:23 +01:00
|
|
|
device.queue.encryption.wg.Done()
|
2021-01-12 02:34:02 +01:00
|
|
|
device.queue.decryption.wg.Done()
|
2021-01-29 18:24:45 +01:00
|
|
|
device.queue.handshake.wg.Done()
|
2020-06-24 07:35:41 +02:00
|
|
|
device.state.stopping.Wait()
|
2018-05-01 16:59:13 +02:00
|
|
|
|
2018-02-11 22:53:39 +01:00
|
|
|
device.rate.limiter.Close()
|
2018-05-01 16:59:13 +02:00
|
|
|
|
2021-01-19 18:02:16 +01:00
|
|
|
device.log.Verbosef("Device closed")
|
2021-01-29 18:24:45 +01:00
|
|
|
close(device.closed)
|
2017-07-13 14:32:40 +02:00
|
|
|
}
|
|
|
|
|
2017-12-01 23:37:26 +01:00
|
|
|
func (device *Device) Wait() chan struct{} {
|
2021-01-29 18:24:45 +01:00
|
|
|
return device.closed
|
2017-06-30 14:41:08 +02:00
|
|
|
}
|
2019-05-30 15:15:54 +02:00
|
|
|
|
|
|
|
func (device *Device) SendKeepalivesToPeersWithCurrentKeypair() {
|
2021-01-19 18:02:16 +01:00
|
|
|
if !device.isUp() {
|
2019-05-30 15:15:54 +02:00
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
device.peers.RLock()
|
|
|
|
for _, peer := range device.peers.keyMap {
|
|
|
|
peer.keypairs.RLock()
|
|
|
|
sendKeepalive := peer.keypairs.current != nil && !peer.keypairs.current.created.Add(RejectAfterTime).Before(time.Now())
|
|
|
|
peer.keypairs.RUnlock()
|
|
|
|
if sendKeepalive {
|
|
|
|
peer.SendKeepalive()
|
|
|
|
}
|
|
|
|
}
|
|
|
|
device.peers.RUnlock()
|
|
|
|
}
|
2019-11-07 17:13:05 +01:00
|
|
|
|
2021-03-29 21:36:09 +02:00
|
|
|
// closeBindLocked closes the device's net.bind.
|
|
|
|
// The caller must hold the net mutex.
|
|
|
|
func closeBindLocked(device *Device) error {
|
2019-11-07 17:13:05 +01:00
|
|
|
var err error
|
|
|
|
netc := &device.net
|
|
|
|
if netc.netlinkCancel != nil {
|
|
|
|
netc.netlinkCancel.Cancel()
|
|
|
|
}
|
|
|
|
if netc.bind != nil {
|
|
|
|
err = netc.bind.Close()
|
|
|
|
}
|
|
|
|
netc.stopping.Wait()
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
2020-06-22 02:42:28 +02:00
|
|
|
func (device *Device) Bind() conn.Bind {
|
|
|
|
device.net.Lock()
|
|
|
|
defer device.net.Unlock()
|
|
|
|
return device.net.bind
|
|
|
|
}
|
|
|
|
|
2019-11-07 17:13:05 +01:00
|
|
|
func (device *Device) BindSetMark(mark uint32) error {
|
|
|
|
device.net.Lock()
|
|
|
|
defer device.net.Unlock()
|
|
|
|
|
|
|
|
// check if modified
|
|
|
|
if device.net.fwmark == mark {
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// update fwmark on existing bind
|
|
|
|
device.net.fwmark = mark
|
2021-01-19 18:02:16 +01:00
|
|
|
if device.isUp() && device.net.bind != nil {
|
2019-11-07 17:13:05 +01:00
|
|
|
if err := device.net.bind.SetMark(mark); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// clear cached source addresses
|
|
|
|
device.peers.RLock()
|
|
|
|
for _, peer := range device.peers.keyMap {
|
|
|
|
peer.Lock()
|
|
|
|
defer peer.Unlock()
|
|
|
|
if peer.endpoint != nil {
|
|
|
|
peer.endpoint.ClearSrc()
|
|
|
|
}
|
|
|
|
}
|
|
|
|
device.peers.RUnlock()
|
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func (device *Device) BindUpdate() error {
|
|
|
|
device.net.Lock()
|
|
|
|
defer device.net.Unlock()
|
|
|
|
|
|
|
|
// close existing sockets
|
2021-03-29 21:36:09 +02:00
|
|
|
if err := closeBindLocked(device); err != nil {
|
2019-11-07 17:13:05 +01:00
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
// open new sockets
|
2021-01-19 18:02:16 +01:00
|
|
|
if !device.isUp() {
|
|
|
|
return nil
|
|
|
|
}
|
2019-11-07 17:13:05 +01:00
|
|
|
|
2021-01-19 18:02:16 +01:00
|
|
|
// bind to new port
|
|
|
|
var err error
|
2021-03-31 22:55:18 +02:00
|
|
|
var recvFns []conn.ReceiveFunc
|
2021-01-19 18:02:16 +01:00
|
|
|
netc := &device.net
|
2021-03-31 22:55:18 +02:00
|
|
|
recvFns, netc.port, err = netc.bind.Open(netc.port)
|
2021-01-19 18:02:16 +01:00
|
|
|
if err != nil {
|
|
|
|
netc.port = 0
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
netc.netlinkCancel, err = device.startRouteListener(netc.bind)
|
|
|
|
if err != nil {
|
|
|
|
netc.bind.Close()
|
|
|
|
netc.port = 0
|
|
|
|
return err
|
|
|
|
}
|
2019-11-07 17:13:05 +01:00
|
|
|
|
2021-01-19 18:02:16 +01:00
|
|
|
// set fwmark
|
|
|
|
if netc.fwmark != 0 {
|
|
|
|
err = netc.bind.SetMark(netc.fwmark)
|
2019-11-07 17:13:05 +01:00
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
2021-01-19 18:02:16 +01:00
|
|
|
}
|
2019-11-07 17:13:05 +01:00
|
|
|
|
2021-01-19 18:02:16 +01:00
|
|
|
// clear cached source addresses
|
|
|
|
device.peers.RLock()
|
|
|
|
for _, peer := range device.peers.keyMap {
|
|
|
|
peer.Lock()
|
|
|
|
defer peer.Unlock()
|
|
|
|
if peer.endpoint != nil {
|
|
|
|
peer.endpoint.ClearSrc()
|
2019-11-07 17:13:05 +01:00
|
|
|
}
|
|
|
|
}
|
2021-01-19 18:02:16 +01:00
|
|
|
device.peers.RUnlock()
|
|
|
|
|
|
|
|
// start receiving routines
|
2021-03-31 22:55:18 +02:00
|
|
|
device.net.stopping.Add(len(recvFns))
|
|
|
|
device.queue.decryption.wg.Add(len(recvFns)) // each RoutineReceiveIncoming goroutine writes to device.queue.decryption
|
|
|
|
device.queue.handshake.wg.Add(len(recvFns)) // each RoutineReceiveIncoming goroutine writes to device.queue.handshake
|
|
|
|
for _, fn := range recvFns {
|
|
|
|
go device.RoutineReceiveIncoming(fn)
|
|
|
|
}
|
2019-11-07 17:13:05 +01:00
|
|
|
|
2021-01-19 18:02:16 +01:00
|
|
|
device.log.Verbosef("UDP bind has been updated")
|
2019-11-07 17:13:05 +01:00
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func (device *Device) BindClose() error {
|
|
|
|
device.net.Lock()
|
2021-03-29 21:36:09 +02:00
|
|
|
err := closeBindLocked(device)
|
2019-11-07 17:13:05 +01:00
|
|
|
device.net.Unlock()
|
|
|
|
return err
|
|
|
|
}
|