wireguard-go/peer.go

302 lines
6.8 KiB
Go
Raw Normal View History

/* SPDX-License-Identifier: GPL-2.0
*
* Copyright (C) 2017-2018 Jason A. Donenfeld <Jason@zx2c4.com>. All Rights Reserved.
*/
package main
import (
"encoding/base64"
2017-06-26 11:14:02 +00:00
"errors"
"fmt"
"sync"
"time"
)
const (
PeerRoutineNumber = 4
)
type Peer struct {
isRunning AtomicBool
2018-02-04 15:46:24 +00:00
mutex sync.RWMutex
2017-06-26 11:14:02 +00:00
keyPairs KeyPairs
2017-06-24 13:34:17 +00:00
handshake Handshake
device *Device
endpoint Endpoint
persistentKeepaliveInterval uint16
_ uint32 // padding for alignment
stats struct {
txBytes uint64 // bytes send to peer (endpoint)
rxBytes uint64 // bytes received from peer
lastHandshakeNano int64 // nano seconds since epoch
}
time struct {
2018-02-04 15:46:24 +00:00
mutex sync.RWMutex
lastSend time.Time // last send message
lastHandshake time.Time // last completed handshake
2017-07-08 21:51:26 +00:00
nextKeepalive time.Time
}
signal struct {
2017-11-30 22:22:40 +00:00
newKeyPair Signal // size 1, new key pair was generated
handshakeCompleted Signal // size 1, handshake completed
handshakeBegin Signal // size 1, begin new handshake begin
flushNonceQueue Signal // size 1, empty queued packets
messageSend Signal // size 1, message was send to peer
messageReceived Signal // size 1, authenticated message recv
}
timer struct {
// state related to WireGuard timers
keepalivePersistent Timer // set for persistent keep-alive
keepalivePassive Timer // set upon receiving messages
2017-11-30 22:22:40 +00:00
zeroAllKeys Timer // zero all key material
2017-12-29 16:42:09 +00:00
handshakeNew Timer // begin a new handshake (stale)
2017-11-30 22:22:40 +00:00
handshakeDeadline Timer // complete handshake timeout
handshakeTimeout Timer // current handshake message timeout
2017-07-27 21:45:37 +00:00
sendLastMinuteHandshake AtomicBool
needAnotherKeepalive AtomicBool
}
queue struct {
nonce chan *QueueOutboundElement // nonce / pre-handshake queue
outbound chan *QueueOutboundElement // sequential ordering of work
2017-07-01 21:29:22 +00:00
inbound chan *QueueInboundElement // sequential ordering of work
}
routines struct {
2018-02-04 15:46:24 +00:00
mutex sync.Mutex // held when stopping / starting routines
starting sync.WaitGroup // routines pending start
stopping sync.WaitGroup // routines pending stop
stop Signal // size 0, stop all go-routines in peer
}
2017-08-14 15:09:25 +00:00
mac CookieGenerator
2017-06-24 13:34:17 +00:00
}
func (device *Device) NewPeer(pk NoisePublicKey) (*Peer, error) {
if device.isClosed.Get() {
return nil, errors.New("Device closed")
}
// lock resources
device.state.mutex.Lock()
defer device.state.mutex.Unlock()
device.noise.mutex.RLock()
defer device.noise.mutex.RUnlock()
device.peers.mutex.Lock()
defer device.peers.mutex.Unlock()
// check if over limit
if len(device.peers.keyMap) >= MaxPeers {
return nil, errors.New("Too many peers")
}
2017-06-26 11:14:02 +00:00
// create peer
peer := new(Peer)
2017-06-26 11:14:02 +00:00
peer.mutex.Lock()
defer peer.mutex.Unlock()
2017-07-01 21:29:22 +00:00
2017-06-27 15:33:06 +00:00
peer.mac.Init(pk)
2017-07-01 21:29:22 +00:00
peer.device = device
peer.isRunning.Set(false)
2017-07-08 21:51:26 +00:00
peer.timer.zeroAllKeys = NewTimer()
2017-11-30 22:22:40 +00:00
peer.timer.keepalivePersistent = NewTimer()
peer.timer.keepalivePassive = NewTimer()
2017-12-29 16:42:09 +00:00
peer.timer.handshakeNew = NewTimer()
2017-11-30 22:22:40 +00:00
peer.timer.handshakeDeadline = NewTimer()
peer.timer.handshakeTimeout = NewTimer()
2017-07-08 21:51:26 +00:00
// map public key
_, ok := device.peers.keyMap[pk]
2017-06-26 11:14:02 +00:00
if ok {
return nil, errors.New("Adding existing peer")
2017-06-26 11:14:02 +00:00
}
device.peers.keyMap[pk] = peer
2017-06-24 13:34:17 +00:00
// pre-compute DH
2017-06-24 13:34:17 +00:00
2017-06-26 11:14:02 +00:00
handshake := &peer.handshake
handshake.mutex.Lock()
handshake.remoteStatic = pk
handshake.precomputedStaticStatic = device.noise.privateKey.sharedSecret(pk)
2017-06-26 11:14:02 +00:00
handshake.mutex.Unlock()
2017-06-24 13:34:17 +00:00
// reset endpoint
peer.endpoint = nil
2017-07-08 21:51:26 +00:00
// prepare signaling & routines
peer.routines.mutex.Lock()
peer.routines.stop = NewSignal()
peer.routines.mutex.Unlock()
// start peer
if peer.device.isUp.Get() {
peer.Start()
}
return peer, nil
}
func (peer *Peer) SendBuffer(buffer []byte) error {
peer.device.net.mutex.RLock()
defer peer.device.net.mutex.RUnlock()
2017-12-29 16:42:09 +00:00
2018-02-02 19:45:25 +00:00
if peer.device.net.bind == nil {
return errors.New("No bind")
}
peer.mutex.RLock()
defer peer.mutex.RUnlock()
2017-12-29 16:42:09 +00:00
if peer.endpoint == nil {
return errors.New("No known endpoint for peer")
}
2017-12-29 16:42:09 +00:00
return peer.device.net.bind.Send(buffer, peer.endpoint)
}
2017-12-29 16:42:09 +00:00
/* Returns a short string identifier for logging
*/
func (peer *Peer) String() string {
return fmt.Sprintf(
"peer(%s)",
base64.StdEncoding.EncodeToString(peer.handshake.remoteStatic[:]),
)
}
func (peer *Peer) Start() {
// should never start a peer on a closed device
if peer.device.isClosed.Get() {
return
}
// prevent simultaneous start/stop operations
peer.routines.mutex.Lock()
defer peer.routines.mutex.Unlock()
2018-02-02 19:45:25 +00:00
if peer.isRunning.Get() {
return
}
2018-02-04 18:18:44 +00:00
device := peer.device
device.log.Debug.Println(peer.String() + ": Starting...")
2018-02-02 19:45:25 +00:00
// sanity check : these should be 0
peer.routines.starting.Wait()
peer.routines.stopping.Wait()
2017-12-29 16:42:09 +00:00
2018-02-02 19:45:25 +00:00
// prepare queues and signals
peer.signal.newKeyPair = NewSignal()
peer.signal.handshakeBegin = NewSignal()
peer.signal.handshakeCompleted = NewSignal()
peer.signal.flushNonceQueue = NewSignal()
peer.queue.nonce = make(chan *QueueOutboundElement, QueueOutboundSize)
peer.queue.outbound = make(chan *QueueOutboundElement, QueueOutboundSize)
peer.queue.inbound = make(chan *QueueInboundElement, QueueInboundSize)
peer.routines.stop = NewSignal()
2018-02-02 19:45:25 +00:00
peer.isRunning.Set(true)
// wait for routines to start
peer.routines.starting.Add(PeerRoutineNumber)
peer.routines.stopping.Add(PeerRoutineNumber)
2017-12-29 16:42:09 +00:00
go peer.RoutineNonce()
go peer.RoutineTimerHandler()
2017-12-29 16:42:09 +00:00
go peer.RoutineSequentialSender()
go peer.RoutineSequentialReceiver()
peer.routines.starting.Wait()
peer.isRunning.Set(true)
2017-12-29 16:42:09 +00:00
}
func (peer *Peer) Stop() {
// prevent simultaneous start/stop operations
peer.routines.mutex.Lock()
defer peer.routines.mutex.Unlock()
2018-02-02 19:45:25 +00:00
if !peer.isRunning.Swap(false) {
return
}
device := peer.device
device.log.Debug.Println(peer.String() + ": Stopping...")
2018-02-02 19:45:25 +00:00
// stop & wait for ongoing peer routines
peer.routines.starting.Wait()
peer.routines.stop.Broadcast()
peer.routines.stopping.Wait()
2018-02-02 19:45:25 +00:00
// stop timers
peer.timer.keepalivePersistent.Stop()
peer.timer.keepalivePassive.Stop()
peer.timer.zeroAllKeys.Stop()
peer.timer.handshakeNew.Stop()
peer.timer.handshakeDeadline.Stop()
peer.timer.handshakeTimeout.Stop()
// close queues
close(peer.queue.nonce)
close(peer.queue.outbound)
close(peer.queue.inbound)
2018-02-04 18:18:44 +00:00
// close signals
peer.signal.newKeyPair.Close()
peer.signal.handshakeBegin.Close()
peer.signal.handshakeCompleted.Close()
peer.signal.flushNonceQueue.Close()
// clear key pairs
kp := &peer.keyPairs
kp.mutex.Lock()
device.DeleteKeyPair(kp.previous)
device.DeleteKeyPair(kp.current)
device.DeleteKeyPair(kp.next)
kp.previous = nil
kp.current = nil
kp.next = nil
kp.mutex.Unlock()
// clear handshake state
hs := &peer.handshake
hs.mutex.Lock()
device.indices.Delete(hs.localIndex)
hs.Clear()
hs.mutex.Unlock()
}