2019-01-02 00:55:51 +00:00
|
|
|
/* SPDX-License-Identifier: MIT
|
2018-05-03 13:04:00 +00:00
|
|
|
*
|
2021-01-28 16:52:15 +00:00
|
|
|
* Copyright (C) 2017-2021 WireGuard LLC. All Rights Reserved.
|
2018-05-03 13:04:00 +00:00
|
|
|
*/
|
|
|
|
|
2019-03-03 03:04:41 +00:00
|
|
|
package device
|
2017-05-30 20:36:49 +00:00
|
|
|
|
|
|
|
import (
|
2017-07-13 12:32:40 +00:00
|
|
|
"encoding/base64"
|
2017-06-26 11:14:02 +00:00
|
|
|
"errors"
|
2017-07-13 12:32:40 +00:00
|
|
|
"fmt"
|
2017-05-30 20:36:49 +00:00
|
|
|
"sync"
|
2019-06-11 16:13:52 +00:00
|
|
|
"sync/atomic"
|
2017-06-04 19:48:15 +00:00
|
|
|
"time"
|
2019-11-07 16:13:05 +00:00
|
|
|
|
|
|
|
"golang.zx2c4.com/wireguard/conn"
|
2017-05-30 20:36:49 +00:00
|
|
|
)
|
|
|
|
|
|
|
|
type Peer struct {
|
2018-01-26 21:52:32 +00:00
|
|
|
isRunning AtomicBool
|
2019-01-03 18:04:00 +00:00
|
|
|
sync.RWMutex // Mostly protects endpoint, but is generally taken whenever we modify peer
|
2018-05-13 16:23:40 +00:00
|
|
|
keypairs Keypairs
|
2017-06-24 13:34:17 +00:00
|
|
|
handshake Handshake
|
|
|
|
device *Device
|
2019-11-07 16:13:05 +00:00
|
|
|
endpoint conn.Endpoint
|
2020-12-14 23:28:52 +00:00
|
|
|
persistentKeepaliveInterval uint32 // accessed atomically
|
2021-01-26 22:44:37 +00:00
|
|
|
firstTrieEntry *trieEntry
|
2021-01-29 13:54:11 +00:00
|
|
|
stopping sync.WaitGroup // routines pending stop
|
2018-02-02 15:40:14 +00:00
|
|
|
|
2020-03-01 08:39:24 +00:00
|
|
|
// These fields are accessed with atomic operations, which must be
|
|
|
|
// 64-bit aligned even on 32-bit platforms. Go guarantees that an
|
|
|
|
// allocated struct will be 64-bit aligned. So we place
|
|
|
|
// atomically-accessed fields up front, so that they can share in
|
|
|
|
// this alignment before smaller fields throw it off.
|
2018-02-02 15:40:14 +00:00
|
|
|
stats struct {
|
2017-07-18 13:22:56 +00:00
|
|
|
txBytes uint64 // bytes send to peer (endpoint)
|
|
|
|
rxBytes uint64 // bytes received from peer
|
|
|
|
lastHandshakeNano int64 // nano seconds since epoch
|
|
|
|
}
|
2018-02-02 15:40:14 +00:00
|
|
|
|
2020-12-22 20:34:21 +00:00
|
|
|
disableRoaming bool
|
|
|
|
|
2018-05-07 20:27:03 +00:00
|
|
|
timers struct {
|
|
|
|
retransmitHandshake *Timer
|
|
|
|
sendKeepalive *Timer
|
|
|
|
newHandshake *Timer
|
|
|
|
zeroKeyMaterial *Timer
|
|
|
|
persistentKeepalive *Timer
|
2018-05-20 04:50:07 +00:00
|
|
|
handshakeAttempts uint32
|
|
|
|
needAnotherKeepalive AtomicBool
|
|
|
|
sentLastMinuteHandshake AtomicBool
|
2017-06-28 21:45:45 +00:00
|
|
|
}
|
2018-02-02 15:40:14 +00:00
|
|
|
|
2021-02-08 21:02:52 +00:00
|
|
|
state struct {
|
2021-02-09 14:35:43 +00:00
|
|
|
sync.Mutex // protects against concurrent Start/Stop
|
2021-02-08 21:02:52 +00:00
|
|
|
}
|
|
|
|
|
2017-06-28 21:45:45 +00:00
|
|
|
queue struct {
|
2021-01-27 17:13:53 +00:00
|
|
|
staged chan *QueueOutboundElement // staged packets before a handshake is available
|
2021-02-09 14:09:50 +00:00
|
|
|
outbound *autodrainingOutboundQueue // sequential ordering of udp transmission
|
|
|
|
inbound *autodrainingInboundQueue // sequential ordering of tun writing
|
2018-01-13 08:00:37 +00:00
|
|
|
}
|
2018-02-02 15:40:14 +00:00
|
|
|
|
2018-05-13 21:14:43 +00:00
|
|
|
cookieGenerator CookieGenerator
|
2017-06-24 13:34:17 +00:00
|
|
|
}
|
|
|
|
|
2017-08-07 13:25:04 +00:00
|
|
|
func (device *Device) NewPeer(pk NoisePublicKey) (*Peer, error) {
|
2021-01-19 17:02:16 +00:00
|
|
|
if device.isClosed() {
|
2018-05-13 17:33:41 +00:00
|
|
|
return nil, errors.New("device closed")
|
2018-01-26 21:52:32 +00:00
|
|
|
}
|
|
|
|
|
2018-02-02 15:40:14 +00:00
|
|
|
// lock resources
|
2019-01-03 18:04:00 +00:00
|
|
|
device.staticIdentity.RLock()
|
|
|
|
defer device.staticIdentity.RUnlock()
|
2018-02-02 15:40:14 +00:00
|
|
|
|
2019-01-03 18:04:00 +00:00
|
|
|
device.peers.Lock()
|
|
|
|
defer device.peers.Unlock()
|
2018-02-02 15:40:14 +00:00
|
|
|
|
|
|
|
// check if over limit
|
|
|
|
if len(device.peers.keyMap) >= MaxPeers {
|
2018-05-13 17:33:41 +00:00
|
|
|
return nil, errors.New("too many peers")
|
2018-02-02 15:40:14 +00:00
|
|
|
}
|
2018-01-26 21:52:32 +00:00
|
|
|
|
2017-06-26 11:14:02 +00:00
|
|
|
// create peer
|
2017-06-30 12:41:08 +00:00
|
|
|
peer := new(Peer)
|
2019-01-03 18:04:00 +00:00
|
|
|
peer.Lock()
|
|
|
|
defer peer.Unlock()
|
2017-07-01 21:29:22 +00:00
|
|
|
|
2018-05-13 21:14:43 +00:00
|
|
|
peer.cookieGenerator.Init(pk)
|
2017-07-01 21:29:22 +00:00
|
|
|
peer.device = device
|
2017-07-08 21:51:26 +00:00
|
|
|
|
2017-06-30 12:41:08 +00:00
|
|
|
// map public key
|
2018-02-02 15:40:14 +00:00
|
|
|
_, ok := device.peers.keyMap[pk]
|
2017-06-26 11:14:02 +00:00
|
|
|
if ok {
|
2018-05-13 17:33:41 +00:00
|
|
|
return nil, errors.New("adding existing peer")
|
2017-06-26 11:14:02 +00:00
|
|
|
}
|
2017-06-24 13:34:17 +00:00
|
|
|
|
2018-02-02 16:24:29 +00:00
|
|
|
// pre-compute DH
|
2017-06-26 11:14:02 +00:00
|
|
|
handshake := &peer.handshake
|
|
|
|
handshake.mutex.Lock()
|
2018-05-13 21:14:43 +00:00
|
|
|
handshake.precomputedStaticStatic = device.staticIdentity.privateKey.sharedSecret(pk)
|
2019-08-05 14:57:41 +00:00
|
|
|
handshake.remoteStatic = pk
|
2017-06-26 11:14:02 +00:00
|
|
|
handshake.mutex.Unlock()
|
2017-06-24 13:34:17 +00:00
|
|
|
|
2017-10-16 19:33:47 +00:00
|
|
|
// reset endpoint
|
2017-11-18 22:34:02 +00:00
|
|
|
peer.endpoint = nil
|
2017-10-16 19:33:47 +00:00
|
|
|
|
2020-03-18 05:06:56 +00:00
|
|
|
// add
|
|
|
|
device.peers.keyMap[pk] = peer
|
2020-12-16 01:44:21 +00:00
|
|
|
device.peers.empty.Set(false)
|
2019-08-05 14:57:41 +00:00
|
|
|
|
2018-01-26 21:52:32 +00:00
|
|
|
// start peer
|
2021-02-08 18:01:35 +00:00
|
|
|
peer.timersInit()
|
2021-01-19 17:02:16 +00:00
|
|
|
if peer.device.isUp() {
|
2018-01-26 21:52:32 +00:00
|
|
|
peer.Start()
|
|
|
|
}
|
|
|
|
|
2017-08-07 13:25:04 +00:00
|
|
|
return peer, nil
|
2017-05-30 20:36:49 +00:00
|
|
|
}
|
2017-06-28 21:45:45 +00:00
|
|
|
|
2017-10-27 08:43:37 +00:00
|
|
|
func (peer *Peer) SendBuffer(buffer []byte) error {
|
2019-01-03 18:04:00 +00:00
|
|
|
peer.device.net.RLock()
|
|
|
|
defer peer.device.net.RUnlock()
|
2017-12-29 16:42:09 +00:00
|
|
|
|
2018-02-02 19:45:25 +00:00
|
|
|
if peer.device.net.bind == nil {
|
2020-12-14 21:34:03 +00:00
|
|
|
// Packets can leak through to SendBuffer while the device is closing.
|
|
|
|
// When that happens, drop them silently to avoid spurious errors.
|
2021-01-19 17:02:16 +00:00
|
|
|
if peer.device.isClosed() {
|
2020-12-14 21:34:03 +00:00
|
|
|
return nil
|
|
|
|
}
|
2018-05-13 17:33:41 +00:00
|
|
|
return errors.New("no bind")
|
2018-02-02 19:45:25 +00:00
|
|
|
}
|
|
|
|
|
2019-01-03 18:04:00 +00:00
|
|
|
peer.RLock()
|
|
|
|
defer peer.RUnlock()
|
2017-12-29 16:42:09 +00:00
|
|
|
|
2017-11-18 22:34:02 +00:00
|
|
|
if peer.endpoint == nil {
|
2018-05-13 17:33:41 +00:00
|
|
|
return errors.New("no known endpoint for peer")
|
2017-10-27 08:43:37 +00:00
|
|
|
}
|
2017-12-29 16:42:09 +00:00
|
|
|
|
2019-06-11 16:13:52 +00:00
|
|
|
err := peer.device.net.bind.Send(buffer, peer.endpoint)
|
|
|
|
if err == nil {
|
|
|
|
atomic.AddUint64(&peer.stats.txBytes, uint64(len(buffer)))
|
|
|
|
}
|
|
|
|
return err
|
2017-10-27 08:43:37 +00:00
|
|
|
}
|
|
|
|
|
2017-07-13 12:32:40 +00:00
|
|
|
func (peer *Peer) String() string {
|
2018-05-13 17:33:41 +00:00
|
|
|
base64Key := base64.StdEncoding.EncodeToString(peer.handshake.remoteStatic[:])
|
|
|
|
abbreviatedKey := "invalid"
|
|
|
|
if len(base64Key) == 44 {
|
2018-05-13 21:27:28 +00:00
|
|
|
abbreviatedKey = base64Key[0:4] + "…" + base64Key[39:43]
|
2018-05-13 17:33:41 +00:00
|
|
|
}
|
|
|
|
return fmt.Sprintf("peer(%s)", abbreviatedKey)
|
2017-07-13 12:32:40 +00:00
|
|
|
}
|
|
|
|
|
2018-01-13 08:00:37 +00:00
|
|
|
func (peer *Peer) Start() {
|
2018-02-02 16:24:29 +00:00
|
|
|
// should never start a peer on a closed device
|
2021-01-19 17:02:16 +00:00
|
|
|
if peer.device.isClosed() {
|
2018-02-02 15:40:14 +00:00
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2018-02-02 16:24:29 +00:00
|
|
|
// prevent simultaneous start/stop operations
|
2021-02-09 14:35:43 +00:00
|
|
|
peer.state.Lock()
|
|
|
|
defer peer.state.Unlock()
|
2018-02-02 19:45:25 +00:00
|
|
|
|
|
|
|
if peer.isRunning.Get() {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2018-02-04 18:18:44 +00:00
|
|
|
device := peer.device
|
2021-01-26 22:05:48 +00:00
|
|
|
device.log.Verbosef("%v - Starting...", peer)
|
2018-01-26 21:52:32 +00:00
|
|
|
|
2018-05-05 20:07:58 +00:00
|
|
|
// reset routine state
|
2021-01-29 13:54:11 +00:00
|
|
|
peer.stopping.Wait()
|
|
|
|
peer.stopping.Add(2)
|
2017-12-29 16:42:09 +00:00
|
|
|
|
2021-02-03 16:52:31 +00:00
|
|
|
peer.handshake.mutex.Lock()
|
|
|
|
peer.handshake.lastSentHandshake = time.Now().Add(-(RekeyTimeout + time.Second))
|
|
|
|
peer.handshake.mutex.Unlock()
|
|
|
|
|
2018-05-05 20:07:58 +00:00
|
|
|
// prepare queues
|
2021-02-08 21:02:52 +00:00
|
|
|
peer.queue.outbound = newAutodrainingOutboundQueue(device)
|
|
|
|
peer.queue.inbound = newAutodrainingInboundQueue(device)
|
2021-01-29 13:54:11 +00:00
|
|
|
if peer.queue.staged == nil {
|
|
|
|
peer.queue.staged = make(chan *QueueOutboundElement, QueueStagedSize)
|
|
|
|
}
|
2021-02-02 18:46:34 +00:00
|
|
|
peer.device.queue.encryption.wg.Add(1) // keep encryption queue open for our writes
|
2018-01-26 21:52:32 +00:00
|
|
|
|
2021-02-08 18:01:35 +00:00
|
|
|
peer.timersStart()
|
2018-02-02 19:45:25 +00:00
|
|
|
|
2017-12-29 16:42:09 +00:00
|
|
|
go peer.RoutineSequentialSender()
|
|
|
|
go peer.RoutineSequentialReceiver()
|
|
|
|
|
2018-01-26 21:52:32 +00:00
|
|
|
peer.isRunning.Set(true)
|
2017-12-29 16:42:09 +00:00
|
|
|
}
|
|
|
|
|
2018-05-13 21:14:43 +00:00
|
|
|
func (peer *Peer) ZeroAndFlushAll() {
|
|
|
|
device := peer.device
|
|
|
|
|
|
|
|
// clear key pairs
|
|
|
|
|
|
|
|
keypairs := &peer.keypairs
|
2019-01-03 18:04:00 +00:00
|
|
|
keypairs.Lock()
|
2018-05-13 21:14:43 +00:00
|
|
|
device.DeleteKeypair(keypairs.previous)
|
|
|
|
device.DeleteKeypair(keypairs.current)
|
2020-05-02 07:30:23 +00:00
|
|
|
device.DeleteKeypair(keypairs.loadNext())
|
2018-05-13 21:14:43 +00:00
|
|
|
keypairs.previous = nil
|
|
|
|
keypairs.current = nil
|
2020-05-02 07:30:23 +00:00
|
|
|
keypairs.storeNext(nil)
|
2019-01-03 18:04:00 +00:00
|
|
|
keypairs.Unlock()
|
2018-05-13 21:14:43 +00:00
|
|
|
|
|
|
|
// clear handshake state
|
|
|
|
|
|
|
|
handshake := &peer.handshake
|
|
|
|
handshake.mutex.Lock()
|
|
|
|
device.indexTable.Delete(handshake.localIndex)
|
|
|
|
handshake.Clear()
|
|
|
|
handshake.mutex.Unlock()
|
|
|
|
|
2021-01-27 17:13:53 +00:00
|
|
|
peer.FlushStagedPackets()
|
2018-05-13 21:14:43 +00:00
|
|
|
}
|
|
|
|
|
2019-07-11 15:36:36 +00:00
|
|
|
func (peer *Peer) ExpireCurrentKeypairs() {
|
|
|
|
handshake := &peer.handshake
|
|
|
|
handshake.mutex.Lock()
|
|
|
|
peer.device.indexTable.Delete(handshake.localIndex)
|
|
|
|
handshake.Clear()
|
|
|
|
peer.handshake.lastSentHandshake = time.Now().Add(-(RekeyTimeout + time.Second))
|
2020-12-15 23:02:13 +00:00
|
|
|
handshake.mutex.Unlock()
|
2019-07-11 15:36:36 +00:00
|
|
|
|
|
|
|
keypairs := &peer.keypairs
|
|
|
|
keypairs.Lock()
|
|
|
|
if keypairs.current != nil {
|
2020-12-15 23:02:13 +00:00
|
|
|
atomic.StoreUint64(&keypairs.current.sendNonce, RejectAfterMessages)
|
2019-07-11 15:36:36 +00:00
|
|
|
}
|
|
|
|
if keypairs.next != nil {
|
2020-12-15 23:02:13 +00:00
|
|
|
next := keypairs.loadNext()
|
|
|
|
atomic.StoreUint64(&next.sendNonce, RejectAfterMessages)
|
2019-07-11 15:36:36 +00:00
|
|
|
}
|
|
|
|
keypairs.Unlock()
|
|
|
|
}
|
|
|
|
|
2017-12-29 16:42:09 +00:00
|
|
|
func (peer *Peer) Stop() {
|
2021-02-09 14:35:43 +00:00
|
|
|
peer.state.Lock()
|
|
|
|
defer peer.state.Unlock()
|
2018-02-02 16:24:29 +00:00
|
|
|
|
2018-02-02 19:45:25 +00:00
|
|
|
if !peer.isRunning.Swap(false) {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2021-01-26 22:05:48 +00:00
|
|
|
peer.device.log.Verbosef("%v - Stopping...", peer)
|
2018-01-26 21:52:32 +00:00
|
|
|
|
2018-05-07 20:27:03 +00:00
|
|
|
peer.timersStop()
|
2021-02-08 21:02:52 +00:00
|
|
|
// Signal that RoutineSequentialSender and RoutineSequentialReceiver should exit.
|
2021-02-09 14:09:50 +00:00
|
|
|
peer.queue.inbound.c <- nil
|
|
|
|
peer.queue.outbound.c <- nil
|
2021-01-29 13:54:11 +00:00
|
|
|
peer.stopping.Wait()
|
2021-02-02 18:46:34 +00:00
|
|
|
peer.device.queue.encryption.wg.Done() // no more writes to encryption queue from us
|
2018-01-26 21:52:32 +00:00
|
|
|
|
2018-05-13 21:14:43 +00:00
|
|
|
peer.ZeroAndFlushAll()
|
2017-06-28 21:45:45 +00:00
|
|
|
}
|
2018-05-26 00:59:26 +00:00
|
|
|
|
2019-11-07 16:13:05 +00:00
|
|
|
func (peer *Peer) SetEndpointFromPacket(endpoint conn.Endpoint) {
|
2020-10-07 08:17:48 +00:00
|
|
|
if peer.disableRoaming {
|
2018-05-26 00:59:26 +00:00
|
|
|
return
|
|
|
|
}
|
2019-01-03 18:04:00 +00:00
|
|
|
peer.Lock()
|
2018-05-26 00:59:26 +00:00
|
|
|
peer.endpoint = endpoint
|
2019-01-03 18:04:00 +00:00
|
|
|
peer.Unlock()
|
2018-05-26 00:59:26 +00:00
|
|
|
}
|