1
0
mirror of https://git.zx2c4.com/wireguard-go synced 2024-11-15 01:05:15 +01:00
wireguard-go/src/receive.go

568 lines
11 KiB
Go
Raw Normal View History

2017-07-01 23:29:22 +02:00
package main
import (
"bytes"
"encoding/binary"
"golang.org/x/crypto/chacha20poly1305"
"golang.org/x/net/ipv4"
"golang.org/x/net/ipv6"
2017-07-01 23:29:22 +02:00
"net"
"sync"
"sync/atomic"
"time"
)
type QueueHandshakeElement struct {
msgType uint32
packet []byte
buffer *[MaxMessageSize]byte
2017-07-01 23:29:22 +02:00
source *net.UDPAddr
}
type QueueInboundElement struct {
2017-07-08 23:51:26 +02:00
dropped int32
2017-07-01 23:29:22 +02:00
mutex sync.Mutex
buffer *[MaxMessageSize]byte
2017-07-01 23:29:22 +02:00
packet []byte
counter uint64
keyPair *KeyPair
}
func (elem *QueueInboundElement) Drop() {
2017-07-08 23:51:26 +02:00
atomic.StoreInt32(&elem.dropped, AtomicTrue)
}
func (elem *QueueInboundElement) IsDropped() bool {
2017-07-08 23:51:26 +02:00
return atomic.LoadInt32(&elem.dropped) == AtomicTrue
}
func (device *Device) addToInboundQueue(
queue chan *QueueInboundElement,
element *QueueInboundElement,
) {
for {
select {
case queue <- element:
return
default:
select {
case old := <-queue:
old.Drop()
default:
}
}
}
2017-07-01 23:29:22 +02:00
}
func (device *Device) addToHandshakeQueue(
2017-07-07 13:47:09 +02:00
queue chan QueueHandshakeElement,
element QueueHandshakeElement,
) {
for {
select {
case queue <- element:
return
default:
select {
case elem := <-queue:
device.PutMessageBuffer(elem.buffer)
2017-07-07 13:47:09 +02:00
default:
}
}
}
}
2017-07-08 09:23:10 +02:00
/* Routine determining the busy state of the interface
*/
func (device *Device) RoutineBusyMonitor() {
samples := 0
interval := time.Second
for timer := time.NewTimer(interval); ; {
select {
case <-device.signal.stop:
return
case <-timer.C:
}
// compute busy heuristic
if len(device.queue.handshake) > QueueHandshakeBusySize {
samples += 1
} else if samples > 0 {
samples -= 1
}
samples %= 30
busy := samples > 5
// update busy state
if busy {
2017-07-08 23:51:26 +02:00
atomic.StoreInt32(&device.underLoad, AtomicTrue)
2017-07-08 09:23:10 +02:00
} else {
2017-07-08 23:51:26 +02:00
atomic.StoreInt32(&device.underLoad, AtomicFalse)
2017-07-08 09:23:10 +02:00
}
timer.Reset(interval)
}
}
2017-07-01 23:29:22 +02:00
2017-07-08 09:23:10 +02:00
func (device *Device) RoutineReceiveIncomming() {
2017-07-01 23:29:22 +02:00
logInfo := device.log.Info
2017-07-08 09:23:10 +02:00
logDebug := device.log.Debug
logDebug.Println("Routine, receive incomming, started")
2017-07-01 23:29:22 +02:00
var buffer *[MaxMessageSize]byte
2017-07-01 23:29:22 +02:00
for {
// check if stopped
select {
case <-device.signal.stop:
return
default:
}
// read next datagram
if buffer == nil {
buffer = device.GetMessageBuffer()
2017-07-01 23:29:22 +02:00
}
device.net.mutex.RLock()
conn := device.net.conn
device.net.mutex.RUnlock()
if conn == nil {
time.Sleep(time.Second)
continue
}
2017-07-01 23:29:22 +02:00
conn.SetReadDeadline(time.Now().Add(time.Second))
size, raddr, err := conn.ReadFromUDP(buffer[:])
if err != nil || size < MinMessageSize {
2017-07-01 23:29:22 +02:00
continue
}
// handle packet
packet := buffer[:size]
2017-07-01 23:29:22 +02:00
msgType := binary.LittleEndian.Uint32(packet[:4])
func() {
switch msgType {
case MessageInitiationType, MessageResponseType:
// add to handshake queue
device.addToHandshakeQueue(
2017-07-07 13:47:09 +02:00
device.queue.handshake,
QueueHandshakeElement{
msgType: msgType,
buffer: buffer,
2017-07-07 13:47:09 +02:00
packet: packet,
source: raddr,
},
)
buffer = nil
2017-07-01 23:29:22 +02:00
case MessageCookieReplyType:
// verify and update peer cookie state
if len(packet) != MessageCookieReplySize {
return
}
var reply MessageCookieReply
reader := bytes.NewReader(packet)
err := binary.Read(reader, binary.LittleEndian, &reply)
if err != nil {
2017-07-08 09:23:10 +02:00
logDebug.Println("Failed to decode cookie reply")
2017-07-01 23:29:22 +02:00
return
}
device.ConsumeMessageCookieReply(&reply)
case MessageTransportType:
// lookup key pair
if len(packet) < MessageTransportSize {
return
}
receiver := binary.LittleEndian.Uint32(
packet[MessageTransportOffsetReceiver:MessageTransportOffsetCounter],
)
value := device.indices.Lookup(receiver)
keyPair := value.keyPair
if keyPair == nil {
return
}
// check key-pair expiry
if keyPair.created.Add(RejectAfterTime).Before(time.Now()) {
return
}
// add to peer queue
peer := value.peer
2017-07-17 16:16:18 +02:00
elem := &QueueInboundElement{
packet: packet,
buffer: buffer,
keyPair: keyPair,
dropped: AtomicFalse,
}
2017-07-17 16:16:18 +02:00
elem.mutex.Lock()
2017-07-01 23:29:22 +02:00
// add to decryption queues
2017-07-17 16:16:18 +02:00
device.addToInboundQueue(device.queue.decryption, elem)
device.addToInboundQueue(peer.queue.inbound, elem)
buffer = nil
2017-07-01 23:29:22 +02:00
default:
logInfo.Println("Got unknown message from:", raddr)
2017-07-01 23:29:22 +02:00
}
}()
}
}
func (device *Device) RoutineDecryption() {
var elem *QueueInboundElement
var nonce [chacha20poly1305.NonceSize]byte
logDebug := device.log.Debug
logDebug.Println("Routine, decryption, started for device")
2017-07-01 23:29:22 +02:00
for {
select {
case elem = <-device.queue.decryption:
case <-device.signal.stop:
return
}
// check if dropped
if elem.IsDropped() {
elem.mutex.Unlock()
2017-07-01 23:29:22 +02:00
continue
}
// split message into fields
counter := elem.packet[MessageTransportOffsetCounter:MessageTransportOffsetContent]
2017-07-01 23:29:22 +02:00
content := elem.packet[MessageTransportOffsetContent:]
// decrypt with key-pair
var err error
copy(nonce[4:], counter)
elem.counter = binary.LittleEndian.Uint64(counter)
elem.packet, err = elem.keyPair.receive.Open(
elem.buffer[:0],
nonce[:],
content,
nil,
)
2017-07-01 23:29:22 +02:00
if err != nil {
elem.Drop()
}
elem.mutex.Unlock()
}
}
/* Handles incomming packets related to handshake
*
*
*/
func (device *Device) RoutineHandshake() {
logInfo := device.log.Info
logError := device.log.Error
logDebug := device.log.Debug
logDebug.Println("Routine, handshake routine, started for device")
2017-07-01 23:29:22 +02:00
var elem QueueHandshakeElement
for {
select {
case elem = <-device.queue.handshake:
case <-device.signal.stop:
return
}
func() {
2017-07-08 09:23:10 +02:00
// verify mac1
if !device.mac.CheckMAC1(elem.packet) {
logDebug.Println("Received packet with invalid mac1")
return
}
// verify mac2
2017-07-08 23:51:26 +02:00
busy := atomic.LoadInt32(&device.underLoad) == AtomicTrue
2017-07-08 09:23:10 +02:00
if busy && !device.mac.CheckMAC2(elem.packet, elem.source) {
sender := binary.LittleEndian.Uint32(elem.packet[4:8]) // "sender" always follows "type"
reply, err := device.CreateMessageCookieReply(elem.packet, sender, elem.source)
if err != nil {
logError.Println("Failed to create cookie reply:", err)
return
}
writer := bytes.NewBuffer(elem.packet[:0])
binary.Write(writer, binary.LittleEndian, reply)
elem.packet = writer.Bytes()
_, err = device.net.conn.WriteToUDP(elem.packet, elem.source)
if err != nil {
logDebug.Println("Failed to send cookie reply:", err)
}
return
}
// ratelimit
if !device.ratelimiter.Allow(elem.source.IP) {
return
}
2017-07-08 09:23:10 +02:00
// handle messages
2017-07-01 23:29:22 +02:00
switch elem.msgType {
case MessageInitiationType:
// unmarshal
if len(elem.packet) != MessageInitiationSize {
return
}
var msg MessageInitiation
reader := bytes.NewReader(elem.packet)
err := binary.Read(reader, binary.LittleEndian, &msg)
if err != nil {
logError.Println("Failed to decode initiation message")
return
}
// consume initiation
peer := device.ConsumeMessageInitiation(&msg)
if peer == nil {
logInfo.Println(
"Recieved invalid initiation message from",
elem.source.IP.String(),
elem.source.Port,
)
return
}
2017-07-07 13:47:09 +02:00
// update endpoint
peer.mutex.Lock()
peer.endpoint = elem.source
peer.mutex.Unlock()
2017-07-07 13:47:09 +02:00
// create response
response, err := device.CreateMessageResponse(peer)
if err != nil {
logError.Println("Failed to create response message:", err)
return
}
2017-07-08 09:23:10 +02:00
logDebug.Println("Creating response message for", peer.String())
2017-07-10 17:20:43 +02:00
2017-07-07 13:47:09 +02:00
outElem := device.NewOutboundElement()
writer := bytes.NewBuffer(outElem.buffer[:0])
2017-07-07 13:47:09 +02:00
binary.Write(writer, binary.LittleEndian, response)
2017-07-10 17:20:43 +02:00
outElem.packet = writer.Bytes()
peer.mac.AddMacs(outElem.packet)
2017-07-07 13:47:09 +02:00
addToOutboundQueue(peer.queue.outbound, outElem)
2017-07-01 23:29:22 +02:00
// create new keypair
peer.NewKeyPair()
2017-07-01 23:29:22 +02:00
case MessageResponseType:
// unmarshal
if len(elem.packet) != MessageResponseSize {
return
}
var msg MessageResponse
reader := bytes.NewReader(elem.packet)
err := binary.Read(reader, binary.LittleEndian, &msg)
if err != nil {
logError.Println("Failed to decode response message")
return
}
// consume response
peer := device.ConsumeMessageResponse(&msg)
if peer == nil {
logInfo.Println(
"Recieved invalid response message from",
elem.source.IP.String(),
elem.source.Port,
)
return
}
kp := peer.NewKeyPair()
if kp == nil {
logDebug.Println("Failed to derieve key-pair")
}
2017-07-01 23:29:22 +02:00
peer.SendKeepAlive()
2017-07-08 23:51:26 +02:00
peer.EventHandshakeComplete()
2017-07-01 23:29:22 +02:00
default:
logError.Println("Invalid message type in handshake queue")
2017-07-01 23:29:22 +02:00
}
}()
}
}
func (peer *Peer) RoutineSequentialReceiver() {
var elem *QueueInboundElement
device := peer.device
logInfo := device.log.Info
2017-07-01 23:29:22 +02:00
logDebug := device.log.Debug
logDebug.Println("Routine, sequential receiver, started for peer", peer.id)
for {
// wait for decryption
select {
case <-peer.signal.stop:
return
case elem = <-peer.queue.inbound:
}
elem.mutex.Lock()
2017-07-01 23:29:22 +02:00
2017-07-08 09:23:10 +02:00
// process packet
2017-07-07 13:47:09 +02:00
func() {
if elem.IsDropped() {
return
}
2017-07-01 23:29:22 +02:00
2017-07-07 13:47:09 +02:00
// check for replay
2017-07-02 15:28:38 +02:00
2017-07-10 12:09:19 +02:00
if !elem.keyPair.replayFilter.ValidateCounter(elem.counter) {
return
}
2017-07-08 23:51:26 +02:00
// time (passive) keep-alive
peer.TimerStartKeepalive()
// refresh key material (rekey)
2017-07-01 23:29:22 +02:00
2017-07-08 23:51:26 +02:00
peer.KeepKeyFreshReceiving()
// check if using new key-pair
2017-07-08 23:51:26 +02:00
kp := &peer.keyPairs
kp.mutex.Lock()
if kp.next == elem.keyPair {
peer.EventHandshakeComplete()
kp.previous = kp.current
kp.current = kp.next
kp.next = nil
}
kp.mutex.Unlock()
2017-07-01 23:29:22 +02:00
2017-07-07 13:47:09 +02:00
// check for keep-alive
2017-07-07 13:47:09 +02:00
if len(elem.packet) == 0 {
logDebug.Println("Received keep-alive from", peer.String())
2017-07-07 13:47:09 +02:00
return
}
2017-07-01 23:29:22 +02:00
2017-07-08 09:23:10 +02:00
// verify source and strip padding
2017-07-01 23:29:22 +02:00
2017-07-07 13:47:09 +02:00
switch elem.packet[0] >> 4 {
case ipv4.Version:
2017-07-08 09:23:10 +02:00
// strip padding
if len(elem.packet) < ipv4.HeaderLen {
2017-07-07 13:47:09 +02:00
return
}
2017-07-08 09:23:10 +02:00
2017-07-07 13:47:09 +02:00
field := elem.packet[IPv4offsetTotalLength : IPv4offsetTotalLength+2]
length := binary.BigEndian.Uint16(field)
elem.packet = elem.packet[:length]
2017-07-08 09:23:10 +02:00
// verify IPv4 source
dst := elem.packet[IPv4offsetDst : IPv4offsetDst+net.IPv4len]
if device.routingTable.LookupIPv4(dst) != peer {
logInfo.Println("Packet with unallowed source IP from", peer.String())
2017-07-08 09:23:10 +02:00
return
}
case ipv6.Version:
2017-07-08 09:23:10 +02:00
// strip padding
if len(elem.packet) < ipv6.HeaderLen {
2017-07-07 13:47:09 +02:00
return
}
2017-07-08 09:23:10 +02:00
2017-07-07 13:47:09 +02:00
field := elem.packet[IPv6offsetPayloadLength : IPv6offsetPayloadLength+2]
length := binary.BigEndian.Uint16(field)
length += ipv6.HeaderLen
2017-07-07 13:47:09 +02:00
elem.packet = elem.packet[:length]
2017-07-08 09:23:10 +02:00
// verify IPv6 source
dst := elem.packet[IPv6offsetDst : IPv6offsetDst+net.IPv6len]
if device.routingTable.LookupIPv6(dst) != peer {
logInfo.Println("Packet with unallowed source IP from", peer.String())
2017-07-08 09:23:10 +02:00
return
}
2017-07-07 13:47:09 +02:00
default:
logInfo.Println("Packet with invalid IP version from", peer.String())
2017-07-07 13:47:09 +02:00
return
}
2017-07-08 09:23:10 +02:00
atomic.AddUint64(&peer.stats.rxBytes, uint64(len(elem.packet)))
device.addToInboundQueue(device.queue.inbound, elem)
2017-07-07 13:47:09 +02:00
}()
}
2017-07-01 23:29:22 +02:00
}
func (device *Device) RoutineWriteToTUN(tun TUNDevice) {
logError := device.log.Error
logDebug := device.log.Debug
logDebug.Println("Routine, sequential tun writer, started")
2017-07-01 23:29:22 +02:00
for {
2017-07-01 23:29:22 +02:00
select {
case <-device.signal.stop:
return
2017-07-07 13:47:09 +02:00
case elem := <-device.queue.inbound:
_, err := tun.Write(elem.packet)
device.PutMessageBuffer(elem.buffer)
if err != nil {
logError.Println("Failed to write packet to TUN device:", err)
}
2017-07-01 23:29:22 +02:00
}
}
}