mirror of
https://github.com/netbirdio/netbird.git
synced 2024-12-01 04:23:44 +01:00
d93dd4fc7f
* Move the handshake logic to separated struct - The server will response to the client after it ready to process the peer - Preload the response messages * Fix deprecated lint issue * Fix error handling * [relay-server] Relay measure auth time (#2675) Measure the Relay client's authentication time
154 lines
4.0 KiB
Go
154 lines
4.0 KiB
Go
package server
|
|
|
|
import (
|
|
"fmt"
|
|
"net"
|
|
|
|
log "github.com/sirupsen/logrus"
|
|
|
|
"github.com/netbirdio/netbird/relay/auth"
|
|
"github.com/netbirdio/netbird/relay/messages"
|
|
//nolint:staticcheck
|
|
"github.com/netbirdio/netbird/relay/messages/address"
|
|
//nolint:staticcheck
|
|
authmsg "github.com/netbirdio/netbird/relay/messages/auth"
|
|
)
|
|
|
|
// preparedMsg contains the marshalled success response messages
|
|
type preparedMsg struct {
|
|
responseHelloMsg []byte
|
|
responseAuthMsg []byte
|
|
}
|
|
|
|
func newPreparedMsg(instanceURL string) (*preparedMsg, error) {
|
|
rhm, err := marshalResponseHelloMsg(instanceURL)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
ram, err := messages.MarshalAuthResponse(instanceURL)
|
|
if err != nil {
|
|
return nil, fmt.Errorf("failed to marshal auth response msg: %w", err)
|
|
}
|
|
|
|
return &preparedMsg{
|
|
responseHelloMsg: rhm,
|
|
responseAuthMsg: ram,
|
|
}, nil
|
|
}
|
|
|
|
func marshalResponseHelloMsg(instanceURL string) ([]byte, error) {
|
|
addr := &address.Address{URL: instanceURL}
|
|
addrData, err := addr.Marshal()
|
|
if err != nil {
|
|
return nil, fmt.Errorf("failed to marshal response address: %w", err)
|
|
}
|
|
|
|
//nolint:staticcheck
|
|
responseMsg, err := messages.MarshalHelloResponse(addrData)
|
|
if err != nil {
|
|
return nil, fmt.Errorf("failed to marshal hello response: %w", err)
|
|
}
|
|
return responseMsg, nil
|
|
}
|
|
|
|
type handshake struct {
|
|
conn net.Conn
|
|
validator auth.Validator
|
|
preparedMsg *preparedMsg
|
|
|
|
handshakeMethodAuth bool
|
|
peerID string
|
|
}
|
|
|
|
func (h *handshake) handshakeReceive() ([]byte, error) {
|
|
buf := make([]byte, messages.MaxHandshakeSize)
|
|
n, err := h.conn.Read(buf)
|
|
if err != nil {
|
|
return nil, fmt.Errorf("read from %s: %w", h.conn.RemoteAddr(), err)
|
|
}
|
|
|
|
_, err = messages.ValidateVersion(buf[:n])
|
|
if err != nil {
|
|
return nil, fmt.Errorf("validate version from %s: %w", h.conn.RemoteAddr(), err)
|
|
}
|
|
|
|
msgType, err := messages.DetermineClientMessageType(buf[messages.SizeOfVersionByte:n])
|
|
if err != nil {
|
|
return nil, fmt.Errorf("determine message type from %s: %w", h.conn.RemoteAddr(), err)
|
|
}
|
|
|
|
var (
|
|
bytePeerID []byte
|
|
peerID string
|
|
)
|
|
switch msgType {
|
|
//nolint:staticcheck
|
|
case messages.MsgTypeHello:
|
|
bytePeerID, peerID, err = h.handleHelloMsg(buf[messages.SizeOfProtoHeader:n])
|
|
case messages.MsgTypeAuth:
|
|
h.handshakeMethodAuth = true
|
|
bytePeerID, peerID, err = h.handleAuthMsg(buf[messages.SizeOfProtoHeader:n])
|
|
default:
|
|
return nil, fmt.Errorf("invalid message type %d from %s", msgType, h.conn.RemoteAddr())
|
|
}
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
h.peerID = peerID
|
|
return bytePeerID, nil
|
|
}
|
|
|
|
func (h *handshake) handshakeResponse() error {
|
|
var responseMsg []byte
|
|
if h.handshakeMethodAuth {
|
|
responseMsg = h.preparedMsg.responseAuthMsg
|
|
} else {
|
|
responseMsg = h.preparedMsg.responseHelloMsg
|
|
}
|
|
|
|
if _, err := h.conn.Write(responseMsg); err != nil {
|
|
return fmt.Errorf("handshake response write to %s (%s): %w", h.peerID, h.conn.RemoteAddr(), err)
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
func (h *handshake) handleHelloMsg(buf []byte) ([]byte, string, error) {
|
|
//nolint:staticcheck
|
|
rawPeerID, authData, err := messages.UnmarshalHelloMsg(buf)
|
|
if err != nil {
|
|
return nil, "", fmt.Errorf("unmarshal hello message: %w", err)
|
|
}
|
|
|
|
peerID := messages.HashIDToString(rawPeerID)
|
|
log.Warnf("peer %s (%s) is using deprecated initial message type", peerID, h.conn.RemoteAddr())
|
|
|
|
authMsg, err := authmsg.UnmarshalMsg(authData)
|
|
if err != nil {
|
|
return nil, "", fmt.Errorf("unmarshal auth message: %w", err)
|
|
}
|
|
|
|
//nolint:staticcheck
|
|
if err := h.validator.ValidateHelloMsgType(authMsg.AdditionalData); err != nil {
|
|
return nil, "", fmt.Errorf("validate %s (%s): %w", peerID, h.conn.RemoteAddr(), err)
|
|
}
|
|
|
|
return rawPeerID, peerID, nil
|
|
}
|
|
|
|
func (h *handshake) handleAuthMsg(buf []byte) ([]byte, string, error) {
|
|
rawPeerID, authPayload, err := messages.UnmarshalAuthMsg(buf)
|
|
if err != nil {
|
|
return nil, "", fmt.Errorf("unmarshal hello message: %w", err)
|
|
}
|
|
|
|
peerID := messages.HashIDToString(rawPeerID)
|
|
|
|
if err := h.validator.Validate(authPayload); err != nil {
|
|
return nil, "", fmt.Errorf("validate %s (%s): %w", peerID, h.conn.RemoteAddr(), err)
|
|
}
|
|
|
|
return rawPeerID, peerID, nil
|
|
}
|