mirror of
https://github.com/tailscale/tailscale.git
synced 2024-11-29 13:05:46 +00:00
derp: move away from [32]byte key types
And some minor cleanup in the process. Signed-off-by: Brad Fitzpatrick <bradfitz@tailscale.com>
This commit is contained in:
parent
4d09316f9a
commit
259406e797
76
derp/derp.go
Normal file
76
derp/derp.go
Normal file
@ -0,0 +1,76 @@
|
|||||||
|
// Copyright (c) 2020 Tailscale Inc & AUTHORS All rights reserved.
|
||||||
|
// Use of this source code is governed by a BSD-style
|
||||||
|
// license that can be found in the LICENSE file.
|
||||||
|
|
||||||
|
// Package derp implements DERP, the Detour Encrypted Routing Protocol.
|
||||||
|
//
|
||||||
|
// DERP routes packets to clients using curve25519 keys as addresses.
|
||||||
|
//
|
||||||
|
// DERP is used by Tailscale nodes to proxy encrypted WireGuard
|
||||||
|
// packets through the Tailscale cloud servers when a direct path
|
||||||
|
// cannot be found or opened. DERP is a last resort. Both sides
|
||||||
|
// between very aggressive NATs, firewalls, no IPv6, etc? Well, DERP.
|
||||||
|
package derp
|
||||||
|
|
||||||
|
import (
|
||||||
|
"bufio"
|
||||||
|
"encoding/binary"
|
||||||
|
"fmt"
|
||||||
|
"io"
|
||||||
|
"time"
|
||||||
|
)
|
||||||
|
|
||||||
|
// magic is the derp magic number, sent on the wire as a uint32.
|
||||||
|
// It's "DERP" with a non-ASCII high-bit.
|
||||||
|
const magic = 0x44c55250
|
||||||
|
|
||||||
|
// frameType is the one byte frame type header in frame headers.
|
||||||
|
type frameType byte
|
||||||
|
|
||||||
|
const (
|
||||||
|
typeServerKey = frameType(0x01)
|
||||||
|
typeServerInfo = frameType(0x02)
|
||||||
|
typeSendPacket = frameType(0x03)
|
||||||
|
typeRecvPacket = frameType(0x04)
|
||||||
|
typeKeepAlive = frameType(0x05)
|
||||||
|
)
|
||||||
|
|
||||||
|
func (b frameType) Write(w io.ByteWriter) error {
|
||||||
|
return w.WriteByte(byte(b))
|
||||||
|
}
|
||||||
|
|
||||||
|
const keepAlive = 60 * time.Second
|
||||||
|
|
||||||
|
var bin = binary.BigEndian
|
||||||
|
|
||||||
|
const oneMB = 1 << 20
|
||||||
|
|
||||||
|
func readType(r *bufio.Reader, t frameType) error {
|
||||||
|
packetType, err := r.ReadByte()
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
if frameType(packetType) != t {
|
||||||
|
return fmt.Errorf("bad packet type 0x%X, want 0x%X", packetType, t)
|
||||||
|
}
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func putUint32(w io.Writer, v uint32) error {
|
||||||
|
var b [4]byte
|
||||||
|
bin.PutUint32(b[:], v)
|
||||||
|
_, err := w.Write(b[:])
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
func readUint32(r io.Reader, maxVal uint32) (uint32, error) {
|
||||||
|
b := make([]byte, 4)
|
||||||
|
if _, err := io.ReadFull(r, b); err != nil {
|
||||||
|
return 0, err
|
||||||
|
}
|
||||||
|
val := bin.Uint32(b)
|
||||||
|
if val > maxVal {
|
||||||
|
return 0, fmt.Errorf("uint32 %d exceeds limit %d", val, maxVal)
|
||||||
|
}
|
||||||
|
return val, nil
|
||||||
|
}
|
@ -117,14 +117,14 @@ func (c *Client) sendClientKey() error {
|
|||||||
return c.conn.Flush()
|
return c.conn.Flush()
|
||||||
}
|
}
|
||||||
|
|
||||||
func (c *Client) Send(dstKey [32]byte, msg []byte) (err error) {
|
func (c *Client) Send(dstKey key.Public, msg []byte) (err error) {
|
||||||
defer func() {
|
defer func() {
|
||||||
if err != nil {
|
if err != nil {
|
||||||
err = fmt.Errorf("derp.Send: %v", err)
|
err = fmt.Errorf("derp.Send: %v", err)
|
||||||
}
|
}
|
||||||
}()
|
}()
|
||||||
|
|
||||||
if err := c.conn.WriteByte(typeSendPacket); err != nil {
|
if err := typeSendPacket.Write(c.conn); err != nil {
|
||||||
return err
|
return err
|
||||||
}
|
}
|
||||||
if _, err := c.conn.Write(dstKey[:]); err != nil {
|
if _, err := c.conn.Write(dstKey[:]); err != nil {
|
||||||
@ -153,17 +153,17 @@ func (c *Client) Recv(b []byte) (n int, err error) {
|
|||||||
loop:
|
loop:
|
||||||
for {
|
for {
|
||||||
c.netConn.SetReadDeadline(time.Now().Add(120 * time.Second))
|
c.netConn.SetReadDeadline(time.Now().Add(120 * time.Second))
|
||||||
packetType, err := c.conn.ReadByte()
|
typ, err := c.conn.ReadByte()
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return 0, err
|
return 0, err
|
||||||
}
|
}
|
||||||
switch packetType {
|
switch frameType(typ) {
|
||||||
case typeKeepAlive:
|
case typeKeepAlive:
|
||||||
continue
|
continue
|
||||||
case typeRecvPacket:
|
case typeRecvPacket:
|
||||||
break loop
|
break loop
|
||||||
default:
|
default:
|
||||||
return 0, fmt.Errorf("derp.Recv: unknown packet type %d", packetType)
|
return 0, fmt.Errorf("derp.Recv: unknown packet type 0x%X", typ)
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -11,8 +11,7 @@
|
|||||||
import (
|
import (
|
||||||
"bufio"
|
"bufio"
|
||||||
"context"
|
"context"
|
||||||
"crypto/rand"
|
crand "crypto/rand"
|
||||||
"encoding/binary"
|
|
||||||
"encoding/json"
|
"encoding/json"
|
||||||
"fmt"
|
"fmt"
|
||||||
"io"
|
"io"
|
||||||
@ -21,45 +20,29 @@
|
|||||||
"sync"
|
"sync"
|
||||||
"time"
|
"time"
|
||||||
|
|
||||||
"golang.org/x/crypto/curve25519"
|
|
||||||
"golang.org/x/crypto/nacl/box"
|
"golang.org/x/crypto/nacl/box"
|
||||||
|
"tailscale.com/types/key"
|
||||||
"tailscale.com/types/logger"
|
"tailscale.com/types/logger"
|
||||||
)
|
)
|
||||||
|
|
||||||
const magic = 0x44c55250 // "DERP" with a non-ASCII high-bit
|
|
||||||
|
|
||||||
const (
|
|
||||||
typeServerKey = 0x01
|
|
||||||
typeServerInfo = 0x02
|
|
||||||
typeSendPacket = 0x03
|
|
||||||
typeRecvPacket = 0x04
|
|
||||||
typeKeepAlive = 0x05
|
|
||||||
)
|
|
||||||
|
|
||||||
const keepAlive = 60 * time.Second
|
|
||||||
|
|
||||||
var bin = binary.BigEndian
|
|
||||||
|
|
||||||
const oneMB = 1 << 20
|
|
||||||
|
|
||||||
type Server struct {
|
type Server struct {
|
||||||
privateKey [32]byte // TODO(crawshaw): make this wgcfg.PrivateKey?
|
privateKey key.Private
|
||||||
publicKey [32]byte
|
publicKey key.Public
|
||||||
logf logger.Logf
|
logf logger.Logf
|
||||||
|
|
||||||
mu sync.Mutex
|
mu sync.Mutex
|
||||||
netConns map[net.Conn]chan struct{}
|
netConns map[net.Conn]chan struct{} // chan is closed when conn closes
|
||||||
clients map[[32]byte]*client
|
clients map[key.Public]*client
|
||||||
}
|
}
|
||||||
|
|
||||||
func NewServer(privateKey [32]byte, logf logger.Logf) *Server {
|
func NewServer(privateKey key.Private, logf logger.Logf) *Server {
|
||||||
s := &Server{
|
s := &Server{
|
||||||
privateKey: privateKey,
|
privateKey: privateKey,
|
||||||
|
publicKey: privateKey.Public(),
|
||||||
logf: logf,
|
logf: logf,
|
||||||
clients: make(map[[32]byte]*client),
|
clients: make(map[key.Public]*client),
|
||||||
netConns: make(map[net.Conn]chan struct{}),
|
netConns: make(map[net.Conn]chan struct{}),
|
||||||
}
|
}
|
||||||
curve25519.ScalarBaseMult(&s.publicKey, &s.privateKey)
|
|
||||||
return s
|
return s
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -182,7 +165,7 @@ func (s *Server) accept(netConn net.Conn, conn *bufio.ReadWriter) error {
|
|||||||
}
|
}
|
||||||
|
|
||||||
dst.mu.Lock()
|
dst.mu.Lock()
|
||||||
err = s.sendPacket(dst.conn, c.key, contents)
|
err = s.sendPacket(dst.conn.Writer, c.key, contents)
|
||||||
dst.mu.Unlock()
|
dst.mu.Unlock()
|
||||||
|
|
||||||
if err != nil {
|
if err != nil {
|
||||||
@ -199,7 +182,7 @@ func (s *Server) accept(netConn net.Conn, conn *bufio.ReadWriter) error {
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
func (s *Server) verifyClient(clientKey [32]byte, info *clientInfo) error {
|
func (s *Server) verifyClient(clientKey key.Public, info *clientInfo) error {
|
||||||
// TODO(crawshaw): implement policy constraints on who can use the DERP server
|
// TODO(crawshaw): implement policy constraints on who can use the DERP server
|
||||||
return nil
|
return nil
|
||||||
}
|
}
|
||||||
@ -208,7 +191,7 @@ func (s *Server) sendServerKey(conn *bufio.ReadWriter) error {
|
|||||||
if err := putUint32(conn, magic); err != nil {
|
if err := putUint32(conn, magic); err != nil {
|
||||||
return err
|
return err
|
||||||
}
|
}
|
||||||
if err := conn.WriteByte(typeServerKey); err != nil {
|
if err := typeServerKey.Write(conn); err != nil {
|
||||||
return err
|
return err
|
||||||
}
|
}
|
||||||
if _, err := conn.Write(s.publicKey[:]); err != nil {
|
if _, err := conn.Write(s.publicKey[:]); err != nil {
|
||||||
@ -217,15 +200,15 @@ func (s *Server) sendServerKey(conn *bufio.ReadWriter) error {
|
|||||||
return conn.Flush()
|
return conn.Flush()
|
||||||
}
|
}
|
||||||
|
|
||||||
func (s *Server) sendServerInfo(conn *bufio.ReadWriter, clientKey [32]byte) error {
|
func (s *Server) sendServerInfo(conn *bufio.ReadWriter, clientKey key.Public) error {
|
||||||
var nonce [24]byte
|
var nonce [24]byte
|
||||||
if _, err := rand.Read(nonce[:]); err != nil {
|
if _, err := crand.Read(nonce[:]); err != nil {
|
||||||
return err
|
return err
|
||||||
}
|
}
|
||||||
msg := []byte("{}") // no serverInfo for now
|
msg := []byte("{}") // no serverInfo for now
|
||||||
msgbox := box.Seal(nil, msg, &nonce, &clientKey, &s.privateKey)
|
msgbox := box.Seal(nil, msg, &nonce, clientKey.B32(), s.privateKey.B32())
|
||||||
|
|
||||||
if err := conn.WriteByte(typeServerInfo); err != nil {
|
if err := typeServerInfo.Write(conn); err != nil {
|
||||||
return err
|
return err
|
||||||
}
|
}
|
||||||
if _, err := conn.Write(nonce[:]); err != nil {
|
if _, err := conn.Write(nonce[:]); err != nil {
|
||||||
@ -240,67 +223,67 @@ func (s *Server) sendServerInfo(conn *bufio.ReadWriter, clientKey [32]byte) erro
|
|||||||
return conn.Flush()
|
return conn.Flush()
|
||||||
}
|
}
|
||||||
|
|
||||||
func (s *Server) recvClientKey(conn *bufio.ReadWriter) (clientKey [32]byte, info *clientInfo, err error) {
|
func (s *Server) recvClientKey(conn *bufio.ReadWriter) (clientKey key.Public, info *clientInfo, err error) {
|
||||||
if _, err := io.ReadFull(conn, clientKey[:]); err != nil {
|
if _, err := io.ReadFull(conn, clientKey[:]); err != nil {
|
||||||
return [32]byte{}, nil, err
|
return key.Public{}, nil, err
|
||||||
}
|
}
|
||||||
var nonce [24]byte
|
var nonce [24]byte
|
||||||
if _, err := io.ReadFull(conn, nonce[:]); err != nil {
|
if _, err := io.ReadFull(conn, nonce[:]); err != nil {
|
||||||
return [32]byte{}, nil, fmt.Errorf("nonce: %v", err)
|
return key.Public{}, nil, fmt.Errorf("nonce: %v", err)
|
||||||
}
|
}
|
||||||
msgLen, err := readUint32(conn, oneMB)
|
msgLen, err := readUint32(conn, oneMB)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return [32]byte{}, nil, fmt.Errorf("msglen: %v", err)
|
return key.Public{}, nil, fmt.Errorf("msglen: %v", err)
|
||||||
}
|
}
|
||||||
msgbox := make([]byte, msgLen)
|
msgbox := make([]byte, msgLen)
|
||||||
if _, err := io.ReadFull(conn, msgbox); err != nil {
|
if _, err := io.ReadFull(conn, msgbox); err != nil {
|
||||||
return [32]byte{}, nil, fmt.Errorf("msgbox: %v", err)
|
return key.Public{}, nil, fmt.Errorf("msgbox: %v", err)
|
||||||
}
|
}
|
||||||
msg, ok := box.Open(nil, msgbox, &nonce, &clientKey, &s.privateKey)
|
msg, ok := box.Open(nil, msgbox, &nonce, (*[32]byte)(&clientKey), s.privateKey.B32())
|
||||||
if !ok {
|
if !ok {
|
||||||
return [32]byte{}, nil, fmt.Errorf("msgbox: cannot open len=%d with client key %x", msgLen, clientKey[:])
|
return key.Public{}, nil, fmt.Errorf("msgbox: cannot open len=%d with client key %x", msgLen, clientKey[:])
|
||||||
}
|
}
|
||||||
info = new(clientInfo)
|
info = new(clientInfo)
|
||||||
if err := json.Unmarshal(msg, info); err != nil {
|
if err := json.Unmarshal(msg, info); err != nil {
|
||||||
return [32]byte{}, nil, fmt.Errorf("msg: %v", err)
|
return key.Public{}, nil, fmt.Errorf("msg: %v", err)
|
||||||
}
|
}
|
||||||
return clientKey, info, nil
|
return clientKey, info, nil
|
||||||
}
|
}
|
||||||
|
|
||||||
func (s *Server) sendPacket(conn *bufio.ReadWriter, srcKey [32]byte, contents []byte) error {
|
func (s *Server) sendPacket(bw *bufio.Writer, srcKey key.Public, contents []byte) error {
|
||||||
if err := conn.WriteByte(typeRecvPacket); err != nil {
|
if err := typeRecvPacket.Write(bw); err != nil {
|
||||||
return err
|
return err
|
||||||
}
|
}
|
||||||
if err := putUint32(conn.Writer, uint32(len(contents))); err != nil {
|
if err := putUint32(bw, uint32(len(contents))); err != nil {
|
||||||
return err
|
return err
|
||||||
}
|
}
|
||||||
if _, err := conn.Write(contents); err != nil {
|
if _, err := bw.Write(contents); err != nil {
|
||||||
return err
|
return err
|
||||||
}
|
}
|
||||||
return conn.Flush()
|
return bw.Flush()
|
||||||
}
|
}
|
||||||
|
|
||||||
func (s *Server) recvPacket(conn *bufio.ReadWriter) (dstKey [32]byte, contents []byte, err error) {
|
func (s *Server) recvPacket(conn *bufio.ReadWriter) (dstKey key.Public, contents []byte, err error) {
|
||||||
if err := readType(conn.Reader, typeSendPacket); err != nil {
|
if err := readType(conn.Reader, typeSendPacket); err != nil {
|
||||||
return [32]byte{}, nil, err
|
return key.Public{}, nil, err
|
||||||
}
|
}
|
||||||
if _, err := io.ReadFull(conn, dstKey[:]); err != nil {
|
if _, err := io.ReadFull(conn, dstKey[:]); err != nil {
|
||||||
return [32]byte{}, nil, err
|
return key.Public{}, nil, err
|
||||||
}
|
}
|
||||||
packetLen, err := readUint32(conn.Reader, oneMB)
|
packetLen, err := readUint32(conn.Reader, oneMB)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return [32]byte{}, nil, err
|
return key.Public{}, nil, err
|
||||||
}
|
}
|
||||||
contents = make([]byte, packetLen)
|
contents = make([]byte, packetLen)
|
||||||
if _, err := io.ReadFull(conn, contents); err != nil {
|
if _, err := io.ReadFull(conn, contents); err != nil {
|
||||||
return [32]byte{}, nil, err
|
return key.Public{}, nil, err
|
||||||
}
|
}
|
||||||
return dstKey, contents, nil
|
return dstKey, contents, nil
|
||||||
}
|
}
|
||||||
|
|
||||||
type client struct {
|
type client struct {
|
||||||
netConn net.Conn
|
netConn net.Conn
|
||||||
key [32]byte
|
key key.Public
|
||||||
info clientInfo
|
info clientInfo
|
||||||
|
|
||||||
keepAliveTimer *time.Timer
|
keepAliveTimer *time.Timer
|
||||||
@ -311,7 +294,7 @@ type client struct {
|
|||||||
}
|
}
|
||||||
|
|
||||||
func (c *client) keepAlive(ctx context.Context) error {
|
func (c *client) keepAlive(ctx context.Context) error {
|
||||||
jitterMs, err := rand.Int(rand.Reader, big.NewInt(5000))
|
jitterMs, err := crand.Int(crand.Reader, big.NewInt(5000))
|
||||||
if err != nil {
|
if err != nil {
|
||||||
panic(err)
|
panic(err)
|
||||||
}
|
}
|
||||||
@ -329,7 +312,7 @@ func (c *client) keepAlive(ctx context.Context) error {
|
|||||||
c.keepAliveTimer.Reset(keepAlive + jitter)
|
c.keepAliveTimer.Reset(keepAlive + jitter)
|
||||||
case <-c.keepAliveTimer.C:
|
case <-c.keepAliveTimer.C:
|
||||||
c.mu.Lock()
|
c.mu.Lock()
|
||||||
err := c.conn.WriteByte(typeKeepAlive)
|
err := typeKeepAlive.Write(c.conn)
|
||||||
if err == nil {
|
if err == nil {
|
||||||
err = c.conn.Flush()
|
err = c.conn.Flush()
|
||||||
}
|
}
|
||||||
@ -349,33 +332,3 @@ type clientInfo struct {
|
|||||||
|
|
||||||
type serverInfo struct {
|
type serverInfo struct {
|
||||||
}
|
}
|
||||||
|
|
||||||
func readType(r *bufio.Reader, t uint8) error {
|
|
||||||
packetType, err := r.ReadByte()
|
|
||||||
if err != nil {
|
|
||||||
return err
|
|
||||||
}
|
|
||||||
if packetType != t {
|
|
||||||
return fmt.Errorf("bad packet type 0x%X, want 0x%X", packetType, t)
|
|
||||||
}
|
|
||||||
return nil
|
|
||||||
}
|
|
||||||
|
|
||||||
func putUint32(w io.Writer, v uint32) error {
|
|
||||||
var b [4]byte
|
|
||||||
bin.PutUint32(b[:], v)
|
|
||||||
_, err := w.Write(b[:])
|
|
||||||
return err
|
|
||||||
}
|
|
||||||
|
|
||||||
func readUint32(r io.Reader, maxVal uint32) (uint32, error) {
|
|
||||||
b := make([]byte, 4)
|
|
||||||
if _, err := io.ReadFull(r, b); err != nil {
|
|
||||||
return 0, err
|
|
||||||
}
|
|
||||||
val := bin.Uint32(b)
|
|
||||||
if val > maxVal {
|
|
||||||
return 0, fmt.Errorf("uint32 %d exceeds limit %d", val, maxVal)
|
|
||||||
}
|
|
||||||
return val, nil
|
|
||||||
}
|
|
||||||
|
@ -6,33 +6,31 @@
|
|||||||
|
|
||||||
import (
|
import (
|
||||||
"bufio"
|
"bufio"
|
||||||
"crypto/rand"
|
crand "crypto/rand"
|
||||||
"net"
|
"net"
|
||||||
"testing"
|
"testing"
|
||||||
"time"
|
"time"
|
||||||
|
|
||||||
"golang.org/x/crypto/curve25519"
|
"tailscale.com/types/key"
|
||||||
)
|
)
|
||||||
|
|
||||||
func TestSendRecv(t *testing.T) {
|
func TestSendRecv(t *testing.T) {
|
||||||
const numClients = 3
|
const numClients = 3
|
||||||
var serverPrivateKey [32]byte
|
var serverPrivateKey key.Private
|
||||||
if _, err := rand.Read(serverPrivateKey[:]); err != nil {
|
if _, err := crand.Read(serverPrivateKey[:]); err != nil {
|
||||||
t.Fatal(err)
|
t.Fatal(err)
|
||||||
}
|
}
|
||||||
var clientPrivateKeys [][32]byte
|
var clientPrivateKeys []key.Private
|
||||||
for i := 0; i < numClients; i++ {
|
for i := 0; i < numClients; i++ {
|
||||||
var key [32]byte
|
var key key.Private
|
||||||
if _, err := rand.Read(key[:]); err != nil {
|
if _, err := crand.Read(key[:]); err != nil {
|
||||||
t.Fatal(err)
|
t.Fatal(err)
|
||||||
}
|
}
|
||||||
clientPrivateKeys = append(clientPrivateKeys, key)
|
clientPrivateKeys = append(clientPrivateKeys, key)
|
||||||
}
|
}
|
||||||
var clientKeys [][32]byte
|
var clientKeys []key.Public
|
||||||
for _, privKey := range clientPrivateKeys {
|
for _, privKey := range clientPrivateKeys {
|
||||||
var key [32]byte
|
clientKeys = append(clientKeys, privKey.Public())
|
||||||
curve25519.ScalarBaseMult(&key, &privKey)
|
|
||||||
clientKeys = append(clientKeys, key)
|
|
||||||
}
|
}
|
||||||
|
|
||||||
ln, err := net.Listen("tcp", ":0")
|
ln, err := net.Listen("tcp", ":0")
|
||||||
|
@ -23,6 +23,7 @@
|
|||||||
"sync"
|
"sync"
|
||||||
|
|
||||||
"tailscale.com/derp"
|
"tailscale.com/derp"
|
||||||
|
"tailscale.com/types/key"
|
||||||
"tailscale.com/types/logger"
|
"tailscale.com/types/logger"
|
||||||
)
|
)
|
||||||
|
|
||||||
@ -32,7 +33,7 @@
|
|||||||
// Recv will report the error and not retry, but subsequent calls to
|
// Recv will report the error and not retry, but subsequent calls to
|
||||||
// Send/Recv will completely re-establish the connection.
|
// Send/Recv will completely re-establish the connection.
|
||||||
type Client struct {
|
type Client struct {
|
||||||
privateKey [32]byte
|
privateKey key.Private
|
||||||
logf logger.Logf
|
logf logger.Logf
|
||||||
closed chan struct{}
|
closed chan struct{}
|
||||||
url *url.URL
|
url *url.URL
|
||||||
@ -45,7 +46,7 @@ type Client struct {
|
|||||||
client *derp.Client
|
client *derp.Client
|
||||||
}
|
}
|
||||||
|
|
||||||
func NewClient(privateKey [32]byte, serverURL string, logf logger.Logf) (*Client, error) {
|
func NewClient(privateKey key.Private, serverURL string, logf logger.Logf) (*Client, error) {
|
||||||
u, err := url.Parse(serverURL)
|
u, err := url.Parse(serverURL)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return nil, fmt.Errorf("derphttp.NewClient: %v", err)
|
return nil, fmt.Errorf("derphttp.NewClient: %v", err)
|
||||||
@ -146,7 +147,7 @@ func (c *Client) connect(caller string) (client *derp.Client, err error) {
|
|||||||
return c.client, nil
|
return c.client, nil
|
||||||
}
|
}
|
||||||
|
|
||||||
func (c *Client) Send(dstKey [32]byte, b []byte) error {
|
func (c *Client) Send(dstKey key.Public, b []byte) error {
|
||||||
client, err := c.connect("derphttp.Client.Send")
|
client, err := c.connect("derphttp.Client.Send")
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return err
|
return err
|
||||||
|
@ -5,7 +5,7 @@
|
|||||||
package derphttp
|
package derphttp
|
||||||
|
|
||||||
import (
|
import (
|
||||||
"crypto/rand"
|
crand "crypto/rand"
|
||||||
"crypto/tls"
|
"crypto/tls"
|
||||||
"net"
|
"net"
|
||||||
"net/http"
|
"net/http"
|
||||||
@ -13,29 +13,27 @@
|
|||||||
"testing"
|
"testing"
|
||||||
"time"
|
"time"
|
||||||
|
|
||||||
"golang.org/x/crypto/curve25519"
|
|
||||||
"tailscale.com/derp"
|
"tailscale.com/derp"
|
||||||
|
"tailscale.com/types/key"
|
||||||
)
|
)
|
||||||
|
|
||||||
func TestSendRecv(t *testing.T) {
|
func TestSendRecv(t *testing.T) {
|
||||||
const numClients = 3
|
const numClients = 3
|
||||||
var serverPrivateKey [32]byte
|
var serverPrivateKey key.Private
|
||||||
if _, err := rand.Read(serverPrivateKey[:]); err != nil {
|
if _, err := crand.Read(serverPrivateKey[:]); err != nil {
|
||||||
t.Fatal(err)
|
t.Fatal(err)
|
||||||
}
|
}
|
||||||
var clientPrivateKeys [][32]byte
|
var clientPrivateKeys []key.Private
|
||||||
for i := 0; i < numClients; i++ {
|
for i := 0; i < numClients; i++ {
|
||||||
var key [32]byte
|
var key key.Private
|
||||||
if _, err := rand.Read(key[:]); err != nil {
|
if _, err := crand.Read(key[:]); err != nil {
|
||||||
t.Fatal(err)
|
t.Fatal(err)
|
||||||
}
|
}
|
||||||
clientPrivateKeys = append(clientPrivateKeys, key)
|
clientPrivateKeys = append(clientPrivateKeys, key)
|
||||||
}
|
}
|
||||||
var clientKeys [][32]byte
|
var clientKeys []key.Public
|
||||||
for _, privKey := range clientPrivateKeys {
|
for _, privKey := range clientPrivateKeys {
|
||||||
var key [32]byte
|
clientKeys = append(clientKeys, privKey.Public())
|
||||||
curve25519.ScalarBaseMult(&key, &privKey)
|
|
||||||
clientKeys = append(clientKeys, key)
|
|
||||||
}
|
}
|
||||||
|
|
||||||
s := derp.NewServer(serverPrivateKey, t.Logf)
|
s := derp.NewServer(serverPrivateKey, t.Logf)
|
||||||
|
13
derp/doc.go
13
derp/doc.go
@ -1,13 +0,0 @@
|
|||||||
// Copyright (c) 2020 Tailscale Inc & AUTHORS All rights reserved.
|
|
||||||
// Use of this source code is governed by a BSD-style
|
|
||||||
// license that can be found in the LICENSE file.
|
|
||||||
|
|
||||||
// Package derp implements DERP, the Detour Encrypted Routing Protocol.
|
|
||||||
//
|
|
||||||
// DERP routes packets to clients using curve25519 keys as addresses.
|
|
||||||
//
|
|
||||||
// DERP is used by Tailscale nodes to proxy encrypted WireGuard
|
|
||||||
// packets through the Tailscale cloud servers when a direct path
|
|
||||||
// cannot be found or opened. DERP is a last resort. Both sides
|
|
||||||
// between very aggressive NATs, firewalls, no IPv6, etc? Well, DERP.
|
|
||||||
package derp
|
|
@ -22,6 +22,7 @@
|
|||||||
"tailscale.com/derp/derphttp"
|
"tailscale.com/derp/derphttp"
|
||||||
"tailscale.com/stun"
|
"tailscale.com/stun"
|
||||||
"tailscale.com/stunner"
|
"tailscale.com/stunner"
|
||||||
|
"tailscale.com/types/key"
|
||||||
)
|
)
|
||||||
|
|
||||||
// A Conn routes UDP packets and actively manages a list of its endpoints.
|
// A Conn routes UDP packets and actively manages a list of its endpoints.
|
||||||
@ -446,12 +447,12 @@ func (c *Conn) ReceiveIPv6(buff []byte) (int, device.Endpoint, *net.UDPAddr, err
|
|||||||
return 0, nil, nil, syscall.EAFNOSUPPORT
|
return 0, nil, nil, syscall.EAFNOSUPPORT
|
||||||
}
|
}
|
||||||
|
|
||||||
func (c *Conn) SetPrivateKey(privateKey [32]byte) error {
|
func (c *Conn) SetPrivateKey(privateKey wgcfg.PrivateKey) error {
|
||||||
if c.derpServer == "" {
|
if c.derpServer == "" {
|
||||||
return nil
|
return nil
|
||||||
}
|
}
|
||||||
|
|
||||||
derp, err := derphttp.NewClient(privateKey, c.derpServer, log.Printf)
|
derp, err := derphttp.NewClient(key.Private(privateKey), c.derpServer, log.Printf)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return err
|
return err
|
||||||
}
|
}
|
||||||
@ -528,7 +529,7 @@ func (c *Conn) LinkChange() {
|
|||||||
|
|
||||||
// AddrSet is a set of UDP addresses that implements wireguard/device.Endpoint.
|
// AddrSet is a set of UDP addresses that implements wireguard/device.Endpoint.
|
||||||
type AddrSet struct {
|
type AddrSet struct {
|
||||||
publicKey [32]byte // peer public key used for DERP communication
|
publicKey key.Public // peer public key used for DERP communication
|
||||||
addrs []net.UDPAddr // ordered priority list provided by wgengine
|
addrs []net.UDPAddr // ordered priority list provided by wgengine
|
||||||
|
|
||||||
mu sync.Mutex // guards roamAddr and curAddr
|
mu sync.Mutex // guards roamAddr and curAddr
|
||||||
|
Loading…
Reference in New Issue
Block a user