2018-05-03 15:04:00 +02:00
|
|
|
/* SPDX-License-Identifier: GPL-2.0
|
|
|
|
*
|
|
|
|
* Copyright (C) 2017-2018 Jason A. Donenfeld <Jason@zx2c4.com>. All Rights Reserved.
|
2018-05-19 00:34:56 +02:00
|
|
|
* Copyright (C) 2017-2018 Mathias N. Hall-Andersen <mathias@hall-andersen.dk>.
|
2018-05-03 15:04:00 +02:00
|
|
|
*/
|
|
|
|
|
2017-05-30 22:36:49 +02:00
|
|
|
package main
|
|
|
|
|
|
|
|
import (
|
2017-07-13 14:32:40 +02:00
|
|
|
"encoding/base64"
|
2017-06-26 13:14:02 +02:00
|
|
|
"errors"
|
2017-07-13 14:32:40 +02:00
|
|
|
"fmt"
|
2017-05-30 22:36:49 +02:00
|
|
|
"sync"
|
2017-06-04 21:48:15 +02:00
|
|
|
"time"
|
2017-05-30 22:36:49 +02:00
|
|
|
)
|
|
|
|
|
2018-01-13 09:00:37 +01:00
|
|
|
const (
|
2018-05-07 22:27:03 +02:00
|
|
|
PeerRoutineNumber = 3
|
2018-01-13 09:00:37 +01:00
|
|
|
)
|
|
|
|
|
2017-05-30 22:36:49 +02:00
|
|
|
type Peer struct {
|
2018-01-26 22:52:32 +01:00
|
|
|
isRunning AtomicBool
|
2018-05-13 23:14:43 +02:00
|
|
|
mutex sync.RWMutex // Mostly protects endpoint, but is generally taken whenever we modify peer
|
2018-05-13 18:23:40 +02:00
|
|
|
keypairs Keypairs
|
2017-06-24 15:34:17 +02:00
|
|
|
handshake Handshake
|
|
|
|
device *Device
|
2017-11-18 23:34:02 +01:00
|
|
|
endpoint Endpoint
|
2018-04-18 07:24:33 +02:00
|
|
|
persistentKeepaliveInterval uint16
|
2018-02-02 16:40:14 +01:00
|
|
|
|
2018-05-14 04:36:20 +02:00
|
|
|
// This must be 64-bit aligned, so make sure the above members come out to even alignment and pad accordingly
|
2018-02-02 16:40:14 +01:00
|
|
|
stats struct {
|
2017-07-18 15:22:56 +02:00
|
|
|
txBytes uint64 // bytes send to peer (endpoint)
|
|
|
|
rxBytes uint64 // bytes received from peer
|
|
|
|
lastHandshakeNano int64 // nano seconds since epoch
|
|
|
|
}
|
2018-02-02 16:40:14 +01:00
|
|
|
|
2018-05-07 22:27:03 +02:00
|
|
|
timers struct {
|
|
|
|
retransmitHandshake *Timer
|
|
|
|
sendKeepalive *Timer
|
|
|
|
newHandshake *Timer
|
|
|
|
zeroKeyMaterial *Timer
|
|
|
|
persistentKeepalive *Timer
|
|
|
|
handshakeAttempts uint
|
|
|
|
needAnotherKeepalive bool
|
|
|
|
sentLastMinuteHandshake bool
|
2017-06-28 23:45:45 +02:00
|
|
|
}
|
2018-02-02 16:40:14 +01:00
|
|
|
|
2018-05-07 22:27:03 +02:00
|
|
|
signals struct {
|
|
|
|
newKeypairArrived chan struct{}
|
|
|
|
flushNonceQueue chan struct{}
|
2017-06-28 23:45:45 +02:00
|
|
|
}
|
2018-02-02 16:40:14 +01:00
|
|
|
|
2017-06-28 23:45:45 +02:00
|
|
|
queue struct {
|
2018-05-07 22:27:03 +02:00
|
|
|
nonce chan *QueueOutboundElement // nonce / pre-handshake queue
|
|
|
|
outbound chan *QueueOutboundElement // sequential ordering of work
|
|
|
|
inbound chan *QueueInboundElement // sequential ordering of work
|
2018-05-20 03:24:14 +02:00
|
|
|
packetInNonceQueueIsAwaitingKey AtomicBool
|
2017-06-28 23:45:45 +02:00
|
|
|
}
|
2018-02-02 16:40:14 +01:00
|
|
|
|
2018-01-13 09:00:37 +01:00
|
|
|
routines struct {
|
2018-02-04 16:46:24 +01:00
|
|
|
mutex sync.Mutex // held when stopping / starting routines
|
2018-01-13 09:00:37 +01:00
|
|
|
starting sync.WaitGroup // routines pending start
|
|
|
|
stopping sync.WaitGroup // routines pending stop
|
2018-05-13 19:33:41 +02:00
|
|
|
stop chan struct{} // size 0, stop all go routines in peer
|
2018-01-13 09:00:37 +01:00
|
|
|
}
|
2018-02-02 16:40:14 +01:00
|
|
|
|
2018-05-13 23:14:43 +02:00
|
|
|
cookieGenerator CookieGenerator
|
2017-06-24 15:34:17 +02:00
|
|
|
}
|
|
|
|
|
2017-08-07 15:25:04 +02:00
|
|
|
func (device *Device) NewPeer(pk NoisePublicKey) (*Peer, error) {
|
2018-01-26 22:52:32 +01:00
|
|
|
|
|
|
|
if device.isClosed.Get() {
|
2018-05-13 19:33:41 +02:00
|
|
|
return nil, errors.New("device closed")
|
2018-01-26 22:52:32 +01:00
|
|
|
}
|
|
|
|
|
2018-02-02 16:40:14 +01:00
|
|
|
// lock resources
|
|
|
|
|
2018-05-13 23:14:43 +02:00
|
|
|
device.staticIdentity.mutex.RLock()
|
|
|
|
defer device.staticIdentity.mutex.RUnlock()
|
2018-02-02 16:40:14 +01:00
|
|
|
|
|
|
|
device.peers.mutex.Lock()
|
|
|
|
defer device.peers.mutex.Unlock()
|
|
|
|
|
|
|
|
// check if over limit
|
|
|
|
|
|
|
|
if len(device.peers.keyMap) >= MaxPeers {
|
2018-05-13 19:33:41 +02:00
|
|
|
return nil, errors.New("too many peers")
|
2018-02-02 16:40:14 +01:00
|
|
|
}
|
2018-01-26 22:52:32 +01:00
|
|
|
|
2017-06-26 13:14:02 +02:00
|
|
|
// create peer
|
|
|
|
|
2017-06-30 14:41:08 +02:00
|
|
|
peer := new(Peer)
|
2017-06-26 13:14:02 +02:00
|
|
|
peer.mutex.Lock()
|
2017-06-30 14:41:08 +02:00
|
|
|
defer peer.mutex.Unlock()
|
2017-07-01 23:29:22 +02:00
|
|
|
|
2018-05-13 23:14:43 +02:00
|
|
|
peer.cookieGenerator.Init(pk)
|
2017-07-01 23:29:22 +02:00
|
|
|
peer.device = device
|
2018-01-26 22:52:32 +01:00
|
|
|
peer.isRunning.Set(false)
|
2017-07-08 23:51:26 +02:00
|
|
|
|
2017-06-30 14:41:08 +02:00
|
|
|
// map public key
|
|
|
|
|
2018-02-02 16:40:14 +01:00
|
|
|
_, ok := device.peers.keyMap[pk]
|
2017-06-26 13:14:02 +02:00
|
|
|
if ok {
|
2018-05-13 19:33:41 +02:00
|
|
|
return nil, errors.New("adding existing peer")
|
2017-06-26 13:14:02 +02:00
|
|
|
}
|
2018-02-02 16:40:14 +01:00
|
|
|
device.peers.keyMap[pk] = peer
|
2017-06-24 15:34:17 +02:00
|
|
|
|
2018-02-02 17:24:29 +01:00
|
|
|
// pre-compute DH
|
2017-06-24 15:34:17 +02:00
|
|
|
|
2017-06-26 13:14:02 +02:00
|
|
|
handshake := &peer.handshake
|
|
|
|
handshake.mutex.Lock()
|
|
|
|
handshake.remoteStatic = pk
|
2018-05-13 23:14:43 +02:00
|
|
|
handshake.precomputedStaticStatic = device.staticIdentity.privateKey.sharedSecret(pk)
|
2017-06-26 13:14:02 +02:00
|
|
|
handshake.mutex.Unlock()
|
2017-06-24 15:34:17 +02:00
|
|
|
|
2017-10-16 21:33:47 +02:00
|
|
|
// reset endpoint
|
|
|
|
|
2017-11-18 23:34:02 +01:00
|
|
|
peer.endpoint = nil
|
2017-10-16 21:33:47 +02:00
|
|
|
|
2018-01-26 22:52:32 +01:00
|
|
|
// start peer
|
|
|
|
|
|
|
|
if peer.device.isUp.Get() {
|
|
|
|
peer.Start()
|
|
|
|
}
|
|
|
|
|
2017-08-07 15:25:04 +02:00
|
|
|
return peer, nil
|
2017-05-30 22:36:49 +02:00
|
|
|
}
|
2017-06-28 23:45:45 +02:00
|
|
|
|
2017-10-27 10:43:37 +02:00
|
|
|
func (peer *Peer) SendBuffer(buffer []byte) error {
|
|
|
|
peer.device.net.mutex.RLock()
|
|
|
|
defer peer.device.net.mutex.RUnlock()
|
2017-12-29 17:42:09 +01:00
|
|
|
|
2018-02-02 20:45:25 +01:00
|
|
|
if peer.device.net.bind == nil {
|
2018-05-13 19:33:41 +02:00
|
|
|
return errors.New("no bind")
|
2018-02-02 20:45:25 +01:00
|
|
|
}
|
|
|
|
|
2017-10-27 10:43:37 +02:00
|
|
|
peer.mutex.RLock()
|
|
|
|
defer peer.mutex.RUnlock()
|
2017-12-29 17:42:09 +01:00
|
|
|
|
2017-11-18 23:34:02 +01:00
|
|
|
if peer.endpoint == nil {
|
2018-05-13 19:33:41 +02:00
|
|
|
return errors.New("no known endpoint for peer")
|
2017-10-27 10:43:37 +02:00
|
|
|
}
|
2017-12-29 17:42:09 +01:00
|
|
|
|
2017-11-18 23:34:02 +01:00
|
|
|
return peer.device.net.bind.Send(buffer, peer.endpoint)
|
2017-10-27 10:43:37 +02:00
|
|
|
}
|
|
|
|
|
2017-07-13 14:32:40 +02:00
|
|
|
func (peer *Peer) String() string {
|
2018-05-13 19:33:41 +02:00
|
|
|
base64Key := base64.StdEncoding.EncodeToString(peer.handshake.remoteStatic[:])
|
|
|
|
abbreviatedKey := "invalid"
|
|
|
|
if len(base64Key) == 44 {
|
2018-05-13 23:27:28 +02:00
|
|
|
abbreviatedKey = base64Key[0:4] + "…" + base64Key[39:43]
|
2018-05-13 19:33:41 +02:00
|
|
|
}
|
|
|
|
return fmt.Sprintf("peer(%s)", abbreviatedKey)
|
2017-07-13 14:32:40 +02:00
|
|
|
}
|
|
|
|
|
2018-01-13 09:00:37 +01:00
|
|
|
func (peer *Peer) Start() {
|
|
|
|
|
2018-02-02 17:24:29 +01:00
|
|
|
// should never start a peer on a closed device
|
|
|
|
|
2018-02-02 16:40:14 +01:00
|
|
|
if peer.device.isClosed.Get() {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2018-02-02 17:24:29 +01:00
|
|
|
// prevent simultaneous start/stop operations
|
|
|
|
|
2018-01-13 09:00:37 +01:00
|
|
|
peer.routines.mutex.Lock()
|
2018-02-02 16:40:14 +01:00
|
|
|
defer peer.routines.mutex.Unlock()
|
2018-02-02 20:45:25 +01:00
|
|
|
|
|
|
|
if peer.isRunning.Get() {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2018-02-04 19:18:44 +01:00
|
|
|
device := peer.device
|
2018-05-05 02:20:52 +02:00
|
|
|
device.log.Debug.Println(peer, ": Starting...")
|
2018-01-26 22:52:32 +01:00
|
|
|
|
2018-05-05 22:07:58 +02:00
|
|
|
// reset routine state
|
2018-01-13 09:00:37 +01:00
|
|
|
|
|
|
|
peer.routines.starting.Wait()
|
|
|
|
peer.routines.stopping.Wait()
|
2018-05-05 22:07:58 +02:00
|
|
|
peer.routines.stop = make(chan struct{})
|
2018-05-07 22:27:03 +02:00
|
|
|
peer.routines.starting.Add(PeerRoutineNumber)
|
|
|
|
peer.routines.stopping.Add(PeerRoutineNumber)
|
2017-12-29 17:42:09 +01:00
|
|
|
|
2018-05-05 22:07:58 +02:00
|
|
|
// prepare queues
|
2018-01-26 22:52:32 +01:00
|
|
|
|
|
|
|
peer.queue.nonce = make(chan *QueueOutboundElement, QueueOutboundSize)
|
|
|
|
peer.queue.outbound = make(chan *QueueOutboundElement, QueueOutboundSize)
|
|
|
|
peer.queue.inbound = make(chan *QueueInboundElement, QueueInboundSize)
|
|
|
|
|
2018-05-07 22:27:03 +02:00
|
|
|
peer.timersInit()
|
2018-05-13 23:14:43 +02:00
|
|
|
peer.handshake.lastSentHandshake = time.Now().Add(-(RekeyTimeout + time.Second))
|
2018-05-07 22:27:03 +02:00
|
|
|
peer.signals.newKeypairArrived = make(chan struct{}, 1)
|
|
|
|
peer.signals.flushNonceQueue = make(chan struct{}, 1)
|
2018-02-02 20:45:25 +01:00
|
|
|
|
|
|
|
// wait for routines to start
|
|
|
|
|
2017-12-29 17:42:09 +01:00
|
|
|
go peer.RoutineNonce()
|
|
|
|
go peer.RoutineSequentialSender()
|
|
|
|
go peer.RoutineSequentialReceiver()
|
|
|
|
|
2018-01-13 09:00:37 +01:00
|
|
|
peer.routines.starting.Wait()
|
2018-01-26 22:52:32 +01:00
|
|
|
peer.isRunning.Set(true)
|
2017-12-29 17:42:09 +01:00
|
|
|
}
|
|
|
|
|
2018-05-13 23:14:43 +02:00
|
|
|
func (peer *Peer) ZeroAndFlushAll() {
|
|
|
|
device := peer.device
|
|
|
|
|
|
|
|
// clear key pairs
|
|
|
|
|
|
|
|
keypairs := &peer.keypairs
|
|
|
|
keypairs.mutex.Lock()
|
|
|
|
device.DeleteKeypair(keypairs.previous)
|
|
|
|
device.DeleteKeypair(keypairs.current)
|
|
|
|
device.DeleteKeypair(keypairs.next)
|
|
|
|
keypairs.previous = nil
|
|
|
|
keypairs.current = nil
|
|
|
|
keypairs.next = nil
|
|
|
|
keypairs.mutex.Unlock()
|
|
|
|
|
|
|
|
// clear handshake state
|
|
|
|
|
|
|
|
handshake := &peer.handshake
|
|
|
|
handshake.mutex.Lock()
|
|
|
|
device.indexTable.Delete(handshake.localIndex)
|
|
|
|
handshake.Clear()
|
|
|
|
handshake.mutex.Unlock()
|
|
|
|
|
|
|
|
peer.FlushNonceQueue()
|
|
|
|
}
|
|
|
|
|
2017-12-29 17:42:09 +01:00
|
|
|
func (peer *Peer) Stop() {
|
2018-01-13 09:00:37 +01:00
|
|
|
|
2018-02-02 17:24:29 +01:00
|
|
|
// prevent simultaneous start/stop operations
|
|
|
|
|
2018-02-02 20:45:25 +01:00
|
|
|
if !peer.isRunning.Swap(false) {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2018-05-16 22:20:15 +02:00
|
|
|
peer.routines.starting.Wait()
|
|
|
|
|
|
|
|
peer.routines.mutex.Lock()
|
|
|
|
defer peer.routines.mutex.Unlock()
|
|
|
|
|
2018-05-13 23:14:43 +02:00
|
|
|
peer.device.log.Debug.Println(peer, ": Stopping...")
|
2018-01-26 22:52:32 +01:00
|
|
|
|
2018-05-07 22:27:03 +02:00
|
|
|
peer.timersStop()
|
|
|
|
|
2018-02-02 20:45:25 +01:00
|
|
|
// stop & wait for ongoing peer routines
|
2018-01-13 09:00:37 +01:00
|
|
|
|
2018-05-05 22:07:58 +02:00
|
|
|
close(peer.routines.stop)
|
2018-01-13 09:00:37 +01:00
|
|
|
peer.routines.stopping.Wait()
|
|
|
|
|
2018-01-26 22:52:32 +01:00
|
|
|
// close queues
|
|
|
|
|
|
|
|
close(peer.queue.nonce)
|
|
|
|
close(peer.queue.outbound)
|
|
|
|
close(peer.queue.inbound)
|
|
|
|
|
2018-05-13 23:14:43 +02:00
|
|
|
peer.ZeroAndFlushAll()
|
2017-06-28 23:45:45 +02:00
|
|
|
}
|