2018-05-03 15:04:00 +02:00
|
|
|
/* SPDX-License-Identifier: GPL-2.0
|
|
|
|
*
|
|
|
|
* Copyright (C) 2017-2018 Jason A. Donenfeld <Jason@zx2c4.com>. All Rights Reserved.
|
|
|
|
*/
|
|
|
|
|
2017-05-30 22:36:49 +02:00
|
|
|
package main
|
|
|
|
|
|
|
|
import (
|
2018-02-12 23:48:09 +01:00
|
|
|
"./ratelimiter"
|
2017-06-28 23:45:45 +02:00
|
|
|
"runtime"
|
2017-05-30 22:36:49 +02:00
|
|
|
"sync"
|
2017-07-15 16:27:59 +02:00
|
|
|
"sync/atomic"
|
2017-08-11 16:18:20 +02:00
|
|
|
"time"
|
2017-05-30 22:36:49 +02:00
|
|
|
)
|
|
|
|
|
2018-05-05 06:00:38 +02:00
|
|
|
const (
|
|
|
|
DeviceRoutineNumberPerCPU = 3
|
|
|
|
)
|
|
|
|
|
2017-05-30 22:36:49 +02:00
|
|
|
type Device struct {
|
2018-02-02 16:40:14 +01:00
|
|
|
isUp AtomicBool // device is (going) up
|
|
|
|
isClosed AtomicBool // device is closed? (acting as guard)
|
|
|
|
log *Logger
|
|
|
|
|
|
|
|
// synchronized resources (locks acquired in order)
|
|
|
|
|
2018-01-26 22:52:32 +01:00
|
|
|
state struct {
|
2018-05-05 06:00:38 +02:00
|
|
|
stopping sync.WaitGroup
|
2018-02-04 16:46:24 +01:00
|
|
|
mutex sync.Mutex
|
2018-01-26 22:52:32 +01:00
|
|
|
changing AtomicBool
|
|
|
|
current bool
|
|
|
|
}
|
2018-02-02 16:40:14 +01:00
|
|
|
|
2017-07-14 14:25:18 +02:00
|
|
|
net struct {
|
2018-02-04 16:46:24 +01:00
|
|
|
mutex sync.RWMutex
|
2017-11-18 23:34:02 +01:00
|
|
|
bind Bind // bind interface
|
|
|
|
port uint16 // listening port
|
|
|
|
fwmark uint32 // mark value (0 = disabled)
|
2017-06-30 14:41:08 +02:00
|
|
|
}
|
2018-02-02 16:40:14 +01:00
|
|
|
|
|
|
|
noise struct {
|
2018-02-04 16:46:24 +01:00
|
|
|
mutex sync.RWMutex
|
2018-02-02 16:40:14 +01:00
|
|
|
privateKey NoisePrivateKey
|
|
|
|
publicKey NoisePublicKey
|
|
|
|
}
|
|
|
|
|
|
|
|
routing struct {
|
2018-02-04 16:46:24 +01:00
|
|
|
mutex sync.RWMutex
|
2018-02-02 16:40:14 +01:00
|
|
|
table RoutingTable
|
|
|
|
}
|
|
|
|
|
|
|
|
peers struct {
|
2018-02-04 16:46:24 +01:00
|
|
|
mutex sync.RWMutex
|
2018-02-02 16:40:14 +01:00
|
|
|
keyMap map[NoisePublicKey]*Peer
|
|
|
|
}
|
|
|
|
|
|
|
|
// unprotected / "self-synchronising resources"
|
|
|
|
|
|
|
|
indices IndexTable
|
|
|
|
mac CookieChecker
|
|
|
|
|
|
|
|
rate struct {
|
|
|
|
underLoadUntil atomic.Value
|
2018-02-12 22:29:11 +01:00
|
|
|
limiter ratelimiter.Ratelimiter
|
2018-02-02 16:40:14 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
pool struct {
|
|
|
|
messageBuffers sync.Pool
|
|
|
|
}
|
|
|
|
|
|
|
|
queue struct {
|
2017-07-01 23:29:22 +02:00
|
|
|
encryption chan *QueueOutboundElement
|
|
|
|
decryption chan *QueueInboundElement
|
|
|
|
handshake chan QueueHandshakeElement
|
|
|
|
}
|
2018-02-02 16:40:14 +01:00
|
|
|
|
2018-05-07 22:27:03 +02:00
|
|
|
signals struct {
|
|
|
|
stop chan struct{}
|
2017-06-28 23:45:45 +02:00
|
|
|
}
|
2018-02-02 16:40:14 +01:00
|
|
|
|
|
|
|
tun struct {
|
|
|
|
device TUNDevice
|
|
|
|
mtu int32
|
|
|
|
}
|
2017-06-01 21:31:30 +02:00
|
|
|
}
|
|
|
|
|
2018-02-02 16:40:14 +01:00
|
|
|
/* Converts the peer into a "zombie", which remains in the peer map,
|
|
|
|
* but processes no packets and does not exists in the routing table.
|
|
|
|
*
|
|
|
|
* Must hold:
|
|
|
|
* device.peers.mutex : exclusive lock
|
|
|
|
* device.routing : exclusive lock
|
|
|
|
*/
|
|
|
|
func unsafeRemovePeer(device *Device, peer *Peer, key NoisePublicKey) {
|
2017-12-29 17:42:09 +01:00
|
|
|
|
2018-02-02 16:40:14 +01:00
|
|
|
// stop routing and processing of packets
|
2018-01-13 09:00:37 +01:00
|
|
|
|
2018-02-02 16:40:14 +01:00
|
|
|
device.routing.table.RemovePeer(peer)
|
|
|
|
peer.Stop()
|
|
|
|
|
|
|
|
// remove from peer map
|
|
|
|
|
|
|
|
delete(device.peers.keyMap, key)
|
|
|
|
}
|
|
|
|
|
|
|
|
func deviceUpdateState(device *Device) {
|
|
|
|
|
|
|
|
// check if state already being updated (guard)
|
|
|
|
|
|
|
|
if device.state.changing.Swap(true) {
|
2018-01-26 22:52:32 +01:00
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2018-02-04 16:46:24 +01:00
|
|
|
// compare to current state of device
|
2018-01-26 22:52:32 +01:00
|
|
|
|
2018-02-04 16:46:24 +01:00
|
|
|
device.state.mutex.Lock()
|
2018-01-26 22:52:32 +01:00
|
|
|
|
2018-02-04 16:46:24 +01:00
|
|
|
newIsUp := device.isUp.Get()
|
2018-01-26 22:52:32 +01:00
|
|
|
|
2018-02-04 16:46:24 +01:00
|
|
|
if newIsUp == device.state.current {
|
|
|
|
device.state.changing.Set(false)
|
|
|
|
device.state.mutex.Unlock()
|
|
|
|
return
|
|
|
|
}
|
2018-01-26 22:52:32 +01:00
|
|
|
|
2018-02-04 16:46:24 +01:00
|
|
|
// change state of device
|
2018-01-13 09:00:37 +01:00
|
|
|
|
2018-02-04 16:46:24 +01:00
|
|
|
switch newIsUp {
|
|
|
|
case true:
|
|
|
|
if err := device.BindUpdate(); err != nil {
|
|
|
|
device.isUp.Set(false)
|
|
|
|
break
|
|
|
|
}
|
|
|
|
device.peers.mutex.Lock()
|
|
|
|
for _, peer := range device.peers.keyMap {
|
|
|
|
peer.Start()
|
|
|
|
}
|
|
|
|
device.peers.mutex.Unlock()
|
2018-01-26 22:52:32 +01:00
|
|
|
|
2018-02-04 16:46:24 +01:00
|
|
|
case false:
|
|
|
|
device.BindClose()
|
|
|
|
device.peers.mutex.Lock()
|
|
|
|
for _, peer := range device.peers.keyMap {
|
|
|
|
peer.Stop()
|
2018-01-26 22:52:32 +01:00
|
|
|
}
|
2018-02-04 16:46:24 +01:00
|
|
|
device.peers.mutex.Unlock()
|
|
|
|
}
|
2018-01-26 22:52:32 +01:00
|
|
|
|
2018-02-04 16:46:24 +01:00
|
|
|
// update state variables
|
2018-02-02 16:40:14 +01:00
|
|
|
|
2018-02-04 16:46:24 +01:00
|
|
|
device.state.current = newIsUp
|
|
|
|
device.state.changing.Set(false)
|
|
|
|
device.state.mutex.Unlock()
|
2018-02-02 16:40:14 +01:00
|
|
|
|
|
|
|
// check for state change in the mean time
|
2018-01-26 22:52:32 +01:00
|
|
|
|
|
|
|
deviceUpdateState(device)
|
2017-12-29 17:42:09 +01:00
|
|
|
}
|
|
|
|
|
2018-01-26 22:52:32 +01:00
|
|
|
func (device *Device) Up() {
|
|
|
|
|
|
|
|
// closed device cannot be brought up
|
2017-12-29 17:42:09 +01:00
|
|
|
|
2018-01-26 22:52:32 +01:00
|
|
|
if device.isClosed.Get() {
|
2018-01-13 09:00:37 +01:00
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2018-01-26 22:52:32 +01:00
|
|
|
device.state.mutex.Lock()
|
|
|
|
device.isUp.Set(true)
|
|
|
|
device.state.mutex.Unlock()
|
|
|
|
deviceUpdateState(device)
|
|
|
|
}
|
2018-01-13 09:00:37 +01:00
|
|
|
|
2018-01-26 22:52:32 +01:00
|
|
|
func (device *Device) Down() {
|
|
|
|
device.state.mutex.Lock()
|
|
|
|
device.isUp.Set(false)
|
|
|
|
device.state.mutex.Unlock()
|
|
|
|
deviceUpdateState(device)
|
2017-12-29 17:42:09 +01:00
|
|
|
}
|
|
|
|
|
2017-08-11 16:18:20 +02:00
|
|
|
func (device *Device) IsUnderLoad() bool {
|
|
|
|
|
|
|
|
// check if currently under load
|
|
|
|
|
|
|
|
now := time.Now()
|
|
|
|
underLoad := len(device.queue.handshake) >= UnderLoadQueueSize
|
|
|
|
if underLoad {
|
2018-02-02 16:40:14 +01:00
|
|
|
device.rate.underLoadUntil.Store(now.Add(time.Second))
|
2017-08-11 16:18:20 +02:00
|
|
|
return true
|
|
|
|
}
|
|
|
|
|
|
|
|
// check if recently under load
|
|
|
|
|
2018-02-02 16:40:14 +01:00
|
|
|
until := device.rate.underLoadUntil.Load().(time.Time)
|
2017-08-11 16:18:20 +02:00
|
|
|
return until.After(now)
|
|
|
|
}
|
|
|
|
|
2017-08-04 16:15:53 +02:00
|
|
|
func (device *Device) SetPrivateKey(sk NoisePrivateKey) error {
|
2018-02-02 16:40:14 +01:00
|
|
|
|
|
|
|
// lock required resources
|
|
|
|
|
|
|
|
device.noise.mutex.Lock()
|
|
|
|
defer device.noise.mutex.Unlock()
|
|
|
|
|
|
|
|
device.routing.mutex.Lock()
|
|
|
|
defer device.routing.mutex.Unlock()
|
|
|
|
|
|
|
|
device.peers.mutex.Lock()
|
|
|
|
defer device.peers.mutex.Unlock()
|
|
|
|
|
|
|
|
for _, peer := range device.peers.keyMap {
|
|
|
|
peer.handshake.mutex.RLock()
|
|
|
|
defer peer.handshake.mutex.RUnlock()
|
|
|
|
}
|
2017-06-24 15:34:17 +02:00
|
|
|
|
2017-08-07 15:25:04 +02:00
|
|
|
// remove peers with matching public keys
|
2017-08-04 16:15:53 +02:00
|
|
|
|
|
|
|
publicKey := sk.publicKey()
|
2018-02-02 16:40:14 +01:00
|
|
|
for key, peer := range device.peers.keyMap {
|
|
|
|
if peer.handshake.remoteStatic.Equals(publicKey) {
|
|
|
|
unsafeRemovePeer(device, peer, key)
|
2017-08-04 16:15:53 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2017-06-24 15:34:17 +02:00
|
|
|
// update key material
|
|
|
|
|
2018-02-02 16:40:14 +01:00
|
|
|
device.noise.privateKey = sk
|
|
|
|
device.noise.publicKey = publicKey
|
2017-08-04 16:15:53 +02:00
|
|
|
device.mac.Init(publicKey)
|
2017-06-24 15:34:17 +02:00
|
|
|
|
2018-02-02 16:40:14 +01:00
|
|
|
// do static-static DH pre-computations
|
|
|
|
|
|
|
|
rmKey := device.noise.privateKey.IsZero()
|
2017-06-24 15:34:17 +02:00
|
|
|
|
2018-02-02 16:40:14 +01:00
|
|
|
for key, peer := range device.peers.keyMap {
|
|
|
|
|
|
|
|
hs := &peer.handshake
|
2017-08-04 16:15:53 +02:00
|
|
|
|
2017-08-07 15:25:04 +02:00
|
|
|
if rmKey {
|
2018-02-02 16:40:14 +01:00
|
|
|
hs.precomputedStaticStatic = [NoisePublicKeySize]byte{}
|
2017-08-04 16:15:53 +02:00
|
|
|
} else {
|
2018-02-02 16:40:14 +01:00
|
|
|
hs.precomputedStaticStatic = device.noise.privateKey.sharedSecret(hs.remoteStatic)
|
|
|
|
}
|
|
|
|
|
|
|
|
if isZero(hs.precomputedStaticStatic[:]) {
|
|
|
|
unsafeRemovePeer(device, peer, key)
|
2017-08-04 16:15:53 +02:00
|
|
|
}
|
2017-06-23 13:41:59 +02:00
|
|
|
}
|
2017-08-04 16:15:53 +02:00
|
|
|
|
|
|
|
return nil
|
2017-06-23 13:41:59 +02:00
|
|
|
}
|
|
|
|
|
2017-07-14 14:25:18 +02:00
|
|
|
func (device *Device) GetMessageBuffer() *[MaxMessageSize]byte {
|
|
|
|
return device.pool.messageBuffers.Get().(*[MaxMessageSize]byte)
|
|
|
|
}
|
|
|
|
|
|
|
|
func (device *Device) PutMessageBuffer(msg *[MaxMessageSize]byte) {
|
|
|
|
device.pool.messageBuffers.Put(msg)
|
|
|
|
}
|
|
|
|
|
2017-11-14 18:26:28 +01:00
|
|
|
func NewDevice(tun TUNDevice, logger *Logger) *Device {
|
2017-06-28 23:45:45 +02:00
|
|
|
device := new(Device)
|
2017-06-24 15:34:17 +02:00
|
|
|
|
2017-12-29 17:42:09 +01:00
|
|
|
device.isUp.Set(false)
|
|
|
|
device.isClosed.Set(false)
|
|
|
|
|
2017-11-14 18:26:28 +01:00
|
|
|
device.log = logger
|
2018-04-18 16:39:14 +02:00
|
|
|
|
2017-08-11 16:18:20 +02:00
|
|
|
device.tun.device = tun
|
2018-04-18 16:39:14 +02:00
|
|
|
mtu, err := device.tun.device.MTU()
|
|
|
|
if err != nil {
|
2018-04-19 15:52:59 +02:00
|
|
|
logger.Error.Println("Trouble determining MTU, assuming default:", err)
|
|
|
|
mtu = DefaultMTU
|
2018-04-18 16:39:14 +02:00
|
|
|
}
|
|
|
|
device.tun.mtu = int32(mtu)
|
|
|
|
|
2018-02-02 16:40:14 +01:00
|
|
|
device.peers.keyMap = make(map[NoisePublicKey]*Peer)
|
2017-10-07 22:35:23 +02:00
|
|
|
|
2018-02-02 16:40:14 +01:00
|
|
|
// initialize anti-DoS / anti-scanning features
|
|
|
|
|
|
|
|
device.rate.limiter.Init()
|
|
|
|
device.rate.underLoadUntil.Store(time.Time{})
|
2017-10-07 22:35:23 +02:00
|
|
|
|
2018-02-02 16:40:14 +01:00
|
|
|
// initialize noise & crypt-key routine
|
|
|
|
|
|
|
|
device.indices.Init()
|
|
|
|
device.routing.table.Reset()
|
2017-06-30 14:41:08 +02:00
|
|
|
|
2017-10-07 22:35:23 +02:00
|
|
|
// setup buffer pool
|
2017-07-14 14:25:18 +02:00
|
|
|
|
|
|
|
device.pool.messageBuffers = sync.Pool{
|
|
|
|
New: func() interface{} {
|
|
|
|
return new([MaxMessageSize]byte)
|
|
|
|
},
|
|
|
|
}
|
|
|
|
|
2017-06-30 14:41:08 +02:00
|
|
|
// create queues
|
|
|
|
|
2017-07-01 23:29:22 +02:00
|
|
|
device.queue.handshake = make(chan QueueHandshakeElement, QueueHandshakeSize)
|
2017-07-07 13:47:09 +02:00
|
|
|
device.queue.encryption = make(chan *QueueOutboundElement, QueueOutboundSize)
|
2017-07-01 23:29:22 +02:00
|
|
|
device.queue.decryption = make(chan *QueueInboundElement, QueueInboundSize)
|
|
|
|
|
|
|
|
// prepare signals
|
|
|
|
|
2018-05-07 22:27:03 +02:00
|
|
|
device.signals.stop = make(chan struct{}, 1)
|
2017-06-30 14:41:08 +02:00
|
|
|
|
2017-11-11 15:43:55 +01:00
|
|
|
// prepare net
|
|
|
|
|
|
|
|
device.net.port = 0
|
|
|
|
device.net.bind = nil
|
|
|
|
|
2017-06-28 23:45:45 +02:00
|
|
|
// start workers
|
|
|
|
|
2018-05-05 06:00:38 +02:00
|
|
|
cpus := runtime.NumCPU()
|
|
|
|
device.state.stopping.Add(DeviceRoutineNumberPerCPU * cpus)
|
|
|
|
for i := 0; i < cpus; i += 1 {
|
2017-06-28 23:45:45 +02:00
|
|
|
go device.RoutineEncryption()
|
2017-07-01 23:29:22 +02:00
|
|
|
go device.RoutineDecryption()
|
|
|
|
go device.RoutineHandshake()
|
2017-06-28 23:45:45 +02:00
|
|
|
}
|
2017-12-01 23:37:26 +01:00
|
|
|
|
2017-10-07 22:35:23 +02:00
|
|
|
go device.RoutineReadFromTUN()
|
2017-08-07 15:25:04 +02:00
|
|
|
go device.RoutineTUNEventReader()
|
2017-12-01 23:37:26 +01:00
|
|
|
|
2017-06-28 23:45:45 +02:00
|
|
|
return device
|
2017-06-24 15:34:17 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
func (device *Device) LookupPeer(pk NoisePublicKey) *Peer {
|
2018-02-02 16:40:14 +01:00
|
|
|
device.peers.mutex.RLock()
|
|
|
|
defer device.peers.mutex.RUnlock()
|
|
|
|
|
|
|
|
return device.peers.keyMap[pk]
|
2017-06-24 15:34:17 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
func (device *Device) RemovePeer(key NoisePublicKey) {
|
2018-02-02 16:40:14 +01:00
|
|
|
device.noise.mutex.Lock()
|
|
|
|
defer device.noise.mutex.Unlock()
|
|
|
|
|
|
|
|
device.routing.mutex.Lock()
|
|
|
|
defer device.routing.mutex.Unlock()
|
|
|
|
|
|
|
|
device.peers.mutex.Lock()
|
|
|
|
defer device.peers.mutex.Unlock()
|
|
|
|
|
|
|
|
// stop peer and remove from routing
|
|
|
|
|
|
|
|
peer, ok := device.peers.keyMap[key]
|
|
|
|
if ok {
|
|
|
|
unsafeRemovePeer(device, peer, key)
|
|
|
|
}
|
2017-06-01 21:31:30 +02:00
|
|
|
}
|
|
|
|
|
2017-06-24 15:34:17 +02:00
|
|
|
func (device *Device) RemoveAllPeers() {
|
2018-05-01 16:59:13 +02:00
|
|
|
device.noise.mutex.Lock()
|
|
|
|
defer device.noise.mutex.Unlock()
|
2018-01-26 22:52:32 +01:00
|
|
|
|
2018-02-02 16:40:14 +01:00
|
|
|
device.routing.mutex.Lock()
|
|
|
|
defer device.routing.mutex.Unlock()
|
|
|
|
|
|
|
|
device.peers.mutex.Lock()
|
|
|
|
defer device.peers.mutex.Unlock()
|
|
|
|
|
|
|
|
for key, peer := range device.peers.keyMap {
|
|
|
|
unsafeRemovePeer(device, peer, key)
|
2017-06-01 21:31:30 +02:00
|
|
|
}
|
2018-02-02 16:40:14 +01:00
|
|
|
|
|
|
|
device.peers.keyMap = make(map[NoisePublicKey]*Peer)
|
2017-05-30 22:36:49 +02:00
|
|
|
}
|
2017-06-30 14:41:08 +02:00
|
|
|
|
2018-05-05 06:00:38 +02:00
|
|
|
func (device *Device) FlushPacketQueues() {
|
|
|
|
for {
|
|
|
|
select {
|
|
|
|
case elem, ok := <-device.queue.decryption:
|
|
|
|
if ok {
|
|
|
|
elem.Drop()
|
|
|
|
}
|
|
|
|
case elem, ok := <-device.queue.encryption:
|
|
|
|
if ok {
|
|
|
|
elem.Drop()
|
|
|
|
}
|
|
|
|
case <-device.queue.handshake:
|
|
|
|
default:
|
|
|
|
return
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
}
|
|
|
|
|
2017-06-30 14:41:08 +02:00
|
|
|
func (device *Device) Close() {
|
2017-12-29 17:42:09 +01:00
|
|
|
if device.isClosed.Swap(true) {
|
2017-11-17 17:25:45 +01:00
|
|
|
return
|
|
|
|
}
|
2018-05-01 16:59:13 +02:00
|
|
|
device.log.Info.Println("Device closing")
|
|
|
|
device.state.changing.Set(true)
|
|
|
|
device.state.mutex.Lock()
|
|
|
|
defer device.state.mutex.Unlock()
|
|
|
|
|
2017-11-11 23:26:44 +01:00
|
|
|
device.tun.device.Close()
|
2018-01-26 22:52:32 +01:00
|
|
|
device.BindClose()
|
2018-05-01 16:59:13 +02:00
|
|
|
|
2018-01-26 22:52:32 +01:00
|
|
|
device.isUp.Set(false)
|
2018-05-01 16:59:13 +02:00
|
|
|
|
2018-05-07 22:27:03 +02:00
|
|
|
close(device.signals.stop)
|
2018-05-01 16:59:13 +02:00
|
|
|
|
2018-05-05 06:00:38 +02:00
|
|
|
device.state.stopping.Wait()
|
|
|
|
device.FlushPacketQueues()
|
|
|
|
|
2018-01-26 22:52:32 +01:00
|
|
|
device.RemoveAllPeers()
|
2018-02-11 22:53:39 +01:00
|
|
|
device.rate.limiter.Close()
|
2018-05-01 16:59:13 +02:00
|
|
|
|
|
|
|
device.state.changing.Set(false)
|
2018-01-26 22:52:32 +01:00
|
|
|
device.log.Info.Println("Interface closed")
|
2017-07-13 14:32:40 +02:00
|
|
|
}
|
|
|
|
|
2017-12-01 23:37:26 +01:00
|
|
|
func (device *Device) Wait() chan struct{} {
|
2018-05-07 22:27:03 +02:00
|
|
|
return device.signals.stop
|
2017-06-30 14:41:08 +02:00
|
|
|
}
|