2019-01-02 01:55:51 +01:00
|
|
|
/* SPDX-License-Identifier: MIT
|
2018-05-03 15:04:00 +02:00
|
|
|
*
|
2021-01-28 17:52:15 +01:00
|
|
|
* Copyright (C) 2017-2021 WireGuard LLC. All Rights Reserved.
|
2018-05-03 15:04:00 +02:00
|
|
|
*/
|
|
|
|
|
2019-03-03 04:04:41 +01:00
|
|
|
package device
|
2017-08-14 17:09:25 +02:00
|
|
|
|
|
|
|
import (
|
|
|
|
"crypto/hmac"
|
|
|
|
"crypto/rand"
|
|
|
|
"sync"
|
|
|
|
"time"
|
2019-05-14 09:09:52 +02:00
|
|
|
|
2021-12-02 18:13:48 +01:00
|
|
|
"github.com/KusakabeSi/EtherGuard-VPN/path"
|
2019-05-14 09:09:52 +02:00
|
|
|
"golang.org/x/crypto/blake2s"
|
|
|
|
"golang.org/x/crypto/chacha20poly1305"
|
2017-08-14 17:09:25 +02:00
|
|
|
)
|
|
|
|
|
|
|
|
type CookieChecker struct {
|
2019-01-03 19:04:00 +01:00
|
|
|
sync.RWMutex
|
|
|
|
mac1 struct {
|
2017-08-14 17:09:25 +02:00
|
|
|
key [blake2s.Size]byte
|
|
|
|
}
|
|
|
|
mac2 struct {
|
|
|
|
secret [blake2s.Size]byte
|
|
|
|
secretSet time.Time
|
|
|
|
encryptionKey [chacha20poly1305.KeySize]byte
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
type CookieGenerator struct {
|
2019-01-03 19:04:00 +01:00
|
|
|
sync.RWMutex
|
|
|
|
mac1 struct {
|
2017-08-14 17:09:25 +02:00
|
|
|
key [blake2s.Size]byte
|
|
|
|
}
|
|
|
|
mac2 struct {
|
|
|
|
cookie [blake2s.Size128]byte
|
|
|
|
cookieSet time.Time
|
|
|
|
hasLastMAC1 bool
|
|
|
|
lastMAC1 [blake2s.Size128]byte
|
|
|
|
encryptionKey [chacha20poly1305.KeySize]byte
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func (st *CookieChecker) Init(pk NoisePublicKey) {
|
2019-01-03 19:04:00 +01:00
|
|
|
st.Lock()
|
|
|
|
defer st.Unlock()
|
2017-08-14 17:09:25 +02:00
|
|
|
|
|
|
|
// mac1 state
|
|
|
|
|
|
|
|
func() {
|
2018-05-14 12:27:29 +02:00
|
|
|
hash, _ := blake2s.New256(nil)
|
|
|
|
hash.Write([]byte(WGLabelMAC1))
|
|
|
|
hash.Write(pk[:])
|
|
|
|
hash.Sum(st.mac1.key[:0])
|
2017-08-14 17:09:25 +02:00
|
|
|
}()
|
|
|
|
|
|
|
|
// mac2 state
|
|
|
|
|
|
|
|
func() {
|
2018-05-14 12:27:29 +02:00
|
|
|
hash, _ := blake2s.New256(nil)
|
|
|
|
hash.Write([]byte(WGLabelCookie))
|
|
|
|
hash.Write(pk[:])
|
|
|
|
hash.Sum(st.mac2.encryptionKey[:0])
|
2017-08-14 17:09:25 +02:00
|
|
|
}()
|
|
|
|
|
|
|
|
st.mac2.secretSet = time.Time{}
|
|
|
|
}
|
|
|
|
|
|
|
|
func (st *CookieChecker) CheckMAC1(msg []byte) bool {
|
2019-01-03 19:04:00 +01:00
|
|
|
st.RLock()
|
|
|
|
defer st.RUnlock()
|
2018-02-11 23:07:07 +01:00
|
|
|
|
2017-08-14 17:09:25 +02:00
|
|
|
size := len(msg)
|
|
|
|
smac2 := size - blake2s.Size128
|
|
|
|
smac1 := smac2 - blake2s.Size128
|
|
|
|
|
|
|
|
var mac1 [blake2s.Size128]byte
|
|
|
|
|
|
|
|
mac, _ := blake2s.New128(st.mac1.key[:])
|
|
|
|
mac.Write(msg[:smac1])
|
|
|
|
mac.Sum(mac1[:0])
|
|
|
|
|
|
|
|
return hmac.Equal(mac1[:], msg[smac1:smac2])
|
|
|
|
}
|
|
|
|
|
2017-10-08 22:03:32 +02:00
|
|
|
func (st *CookieChecker) CheckMAC2(msg []byte, src []byte) bool {
|
2019-01-03 19:04:00 +01:00
|
|
|
st.RLock()
|
|
|
|
defer st.RUnlock()
|
2017-08-14 17:09:25 +02:00
|
|
|
|
2019-06-03 21:46:46 +02:00
|
|
|
if time.Since(st.mac2.secretSet) > CookieRefreshTime {
|
2017-08-14 17:09:25 +02:00
|
|
|
return false
|
|
|
|
}
|
|
|
|
|
|
|
|
// derive cookie key
|
|
|
|
|
|
|
|
var cookie [blake2s.Size128]byte
|
|
|
|
func() {
|
|
|
|
mac, _ := blake2s.New128(st.mac2.secret[:])
|
2017-10-08 22:03:32 +02:00
|
|
|
mac.Write(src)
|
2017-08-14 17:09:25 +02:00
|
|
|
mac.Sum(cookie[:0])
|
|
|
|
}()
|
|
|
|
|
|
|
|
// calculate mac of packet (including mac1)
|
|
|
|
|
|
|
|
smac2 := len(msg) - blake2s.Size128
|
|
|
|
|
|
|
|
var mac2 [blake2s.Size128]byte
|
|
|
|
func() {
|
|
|
|
mac, _ := blake2s.New128(cookie[:])
|
|
|
|
mac.Write(msg[:smac2])
|
|
|
|
mac.Sum(mac2[:0])
|
|
|
|
}()
|
|
|
|
|
|
|
|
return hmac.Equal(mac2[:], msg[smac2:])
|
|
|
|
}
|
|
|
|
|
|
|
|
func (st *CookieChecker) CreateReply(
|
|
|
|
msg []byte,
|
|
|
|
recv uint32,
|
2017-10-08 22:03:32 +02:00
|
|
|
src []byte,
|
2017-08-14 17:09:25 +02:00
|
|
|
) (*MessageCookieReply, error) {
|
|
|
|
|
2019-01-03 19:04:00 +01:00
|
|
|
st.RLock()
|
2017-08-14 17:09:25 +02:00
|
|
|
|
|
|
|
// refresh cookie secret
|
|
|
|
|
2019-06-03 21:46:46 +02:00
|
|
|
if time.Since(st.mac2.secretSet) > CookieRefreshTime {
|
2019-01-03 19:04:00 +01:00
|
|
|
st.RUnlock()
|
|
|
|
st.Lock()
|
2017-08-14 17:09:25 +02:00
|
|
|
_, err := rand.Read(st.mac2.secret[:])
|
|
|
|
if err != nil {
|
2019-01-03 19:04:00 +01:00
|
|
|
st.Unlock()
|
2017-08-14 17:09:25 +02:00
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
st.mac2.secretSet = time.Now()
|
2019-01-03 19:04:00 +01:00
|
|
|
st.Unlock()
|
|
|
|
st.RLock()
|
2017-08-14 17:09:25 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
// derive cookie
|
|
|
|
|
|
|
|
var cookie [blake2s.Size128]byte
|
|
|
|
func() {
|
|
|
|
mac, _ := blake2s.New128(st.mac2.secret[:])
|
2017-10-08 22:03:32 +02:00
|
|
|
mac.Write(src)
|
2017-08-14 17:09:25 +02:00
|
|
|
mac.Sum(cookie[:0])
|
|
|
|
}()
|
|
|
|
|
|
|
|
// encrypt cookie
|
|
|
|
|
|
|
|
size := len(msg)
|
|
|
|
|
|
|
|
smac2 := size - blake2s.Size128
|
|
|
|
smac1 := smac2 - blake2s.Size128
|
|
|
|
|
|
|
|
reply := new(MessageCookieReply)
|
2021-09-21 03:15:23 +02:00
|
|
|
reply.Type = path.MessageCookieReplyType
|
2017-08-14 17:09:25 +02:00
|
|
|
reply.Receiver = recv
|
|
|
|
|
|
|
|
_, err := rand.Read(reply.Nonce[:])
|
|
|
|
if err != nil {
|
2019-01-03 19:04:00 +01:00
|
|
|
st.RUnlock()
|
2017-08-14 17:09:25 +02:00
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
2018-12-10 04:23:17 +01:00
|
|
|
xchapoly, _ := chacha20poly1305.NewX(st.mac2.encryptionKey[:])
|
|
|
|
xchapoly.Seal(reply.Cookie[:0], reply.Nonce[:], cookie[:], msg[smac1:smac2])
|
2017-08-14 17:09:25 +02:00
|
|
|
|
2019-01-03 19:04:00 +01:00
|
|
|
st.RUnlock()
|
2017-08-14 17:09:25 +02:00
|
|
|
|
|
|
|
return reply, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func (st *CookieGenerator) Init(pk NoisePublicKey) {
|
2019-01-03 19:04:00 +01:00
|
|
|
st.Lock()
|
|
|
|
defer st.Unlock()
|
2017-08-14 17:09:25 +02:00
|
|
|
|
|
|
|
func() {
|
2018-05-14 12:27:29 +02:00
|
|
|
hash, _ := blake2s.New256(nil)
|
|
|
|
hash.Write([]byte(WGLabelMAC1))
|
|
|
|
hash.Write(pk[:])
|
|
|
|
hash.Sum(st.mac1.key[:0])
|
2017-08-14 17:09:25 +02:00
|
|
|
}()
|
|
|
|
|
|
|
|
func() {
|
2018-05-14 12:27:29 +02:00
|
|
|
hash, _ := blake2s.New256(nil)
|
|
|
|
hash.Write([]byte(WGLabelCookie))
|
|
|
|
hash.Write(pk[:])
|
|
|
|
hash.Sum(st.mac2.encryptionKey[:0])
|
2017-08-14 17:09:25 +02:00
|
|
|
}()
|
|
|
|
|
|
|
|
st.mac2.cookieSet = time.Time{}
|
|
|
|
}
|
|
|
|
|
|
|
|
func (st *CookieGenerator) ConsumeReply(msg *MessageCookieReply) bool {
|
2019-01-03 19:04:00 +01:00
|
|
|
st.Lock()
|
|
|
|
defer st.Unlock()
|
2017-08-14 17:09:25 +02:00
|
|
|
|
|
|
|
if !st.mac2.hasLastMAC1 {
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
|
|
|
|
var cookie [blake2s.Size128]byte
|
|
|
|
|
2018-12-10 04:23:17 +01:00
|
|
|
xchapoly, _ := chacha20poly1305.NewX(st.mac2.encryptionKey[:])
|
|
|
|
_, err := xchapoly.Open(cookie[:0], msg.Nonce[:], msg.Cookie[:], st.mac2.lastMAC1[:])
|
2017-08-14 17:09:25 +02:00
|
|
|
|
|
|
|
if err != nil {
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
|
|
|
|
st.mac2.cookieSet = time.Now()
|
|
|
|
st.mac2.cookie = cookie
|
|
|
|
return true
|
|
|
|
}
|
|
|
|
|
|
|
|
func (st *CookieGenerator) AddMacs(msg []byte) {
|
|
|
|
|
|
|
|
size := len(msg)
|
|
|
|
|
|
|
|
smac2 := size - blake2s.Size128
|
|
|
|
smac1 := smac2 - blake2s.Size128
|
|
|
|
|
|
|
|
mac1 := msg[smac1:smac2]
|
|
|
|
mac2 := msg[smac2:]
|
|
|
|
|
2019-01-03 19:04:00 +01:00
|
|
|
st.Lock()
|
|
|
|
defer st.Unlock()
|
2017-08-14 17:09:25 +02:00
|
|
|
|
|
|
|
// set mac1
|
|
|
|
|
|
|
|
func() {
|
|
|
|
mac, _ := blake2s.New128(st.mac1.key[:])
|
|
|
|
mac.Write(msg[:smac1])
|
|
|
|
mac.Sum(mac1[:0])
|
|
|
|
}()
|
|
|
|
copy(st.mac2.lastMAC1[:], mac1)
|
|
|
|
st.mac2.hasLastMAC1 = true
|
|
|
|
|
|
|
|
// set mac2
|
|
|
|
|
2019-06-03 21:46:46 +02:00
|
|
|
if time.Since(st.mac2.cookieSet) > CookieRefreshTime {
|
2017-08-14 17:09:25 +02:00
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
func() {
|
|
|
|
mac, _ := blake2s.New128(st.mac2.cookie[:])
|
|
|
|
mac.Write(msg[:smac2])
|
|
|
|
mac.Sum(mac2[:0])
|
|
|
|
}()
|
|
|
|
}
|