522 lines
16 KiB
Go
Raw Normal View History

2017-12-28 22:16:20 -06:00
package yggdrasil
// This part does most of the work to handle packets to/from yourself
// It also manages crypto and dht info
// TODO clean up old/unused code, maybe improve comments on whatever is left
2017-12-28 22:16:20 -06:00
// Send:
2019-03-28 19:09:19 +00:00
// Receive a packet from the adapter
2017-12-28 22:16:20 -06:00
// Look up session (if none exists, trigger a search)
// Hand off to session (which encrypts, etc)
// Session will pass it back to router.out, which hands it off to the self peer
// The self peer triggers a lookup to find which peer to send to next
// And then passes it to that's peer's peer.out function
// The peer.out function sends it over the wire to the matching peer
// Recv:
// A packet comes in off the wire, and goes to a peer.handlePacket
// The peer does a lookup, sees no better peer than the self
// Hands it to the self peer.out, which passes it to router.in
// If it's dht/seach/etc. traffic, the router passes it to that part
// If it's an encapsulated IPv6 packet, the router looks up the session for it
// The packet is passed to the session, which decrypts it, router.recvPacket
2019-03-28 19:09:19 +00:00
// The router then runs some sanity checks before passing it to the adapter
2017-12-28 22:16:20 -06:00
2018-06-12 17:50:08 -05:00
import (
"bytes"
2018-06-12 17:50:08 -05:00
"time"
2018-01-04 22:37:51 +00:00
"github.com/yggdrasil-network/yggdrasil-go/src/address"
"github.com/yggdrasil-network/yggdrasil-go/src/crypto"
"github.com/yggdrasil-network/yggdrasil-go/src/util"
2018-06-12 17:50:08 -05:00
)
2017-12-28 22:16:20 -06:00
2019-03-28 19:09:19 +00:00
// The router struct has channels to/from the adapter device and a self peer (0), which is how messages are passed between this node and the peers/switch layer.
// The router's mainLoop goroutine is responsible for managing all information related to the dht, searches, and crypto sessions.
2017-12-28 22:16:20 -06:00
type router struct {
core *Core
2018-12-30 12:04:42 +00:00
reconfigure chan chan error
addr address.Address
subnet address.Subnet
in <-chan []byte // packets we received from the network, link to peer's "out"
out func([]byte) // packets we're sending to the network, link to peer's "in"
toRecv chan router_recvPacket // packets to handle via recvPacket()
2019-03-28 19:09:19 +00:00
adapter adapterImplementation // TUN/TAP adapter
recv chan<- []byte // place where the adapter pulls received packets from
send <-chan []byte // place where the adapter puts outgoing packets
reject chan<- RejectedPacket // place where we send error packets back to adapter
reset chan struct{} // signal that coords changed (re-init sessions/dht)
admin chan func() // pass a lambda for the admin socket to query stuff
cryptokey cryptokey
2019-01-14 19:05:16 +00:00
nodeinfo nodeinfo
2017-12-28 22:16:20 -06:00
}
2019-03-28 19:09:19 +00:00
// Packet and session info, used to check that the packet matches a valid IP range or CKR prefix before sending to the adapter.
type router_recvPacket struct {
bs []byte
sinfo *sessionInfo
}
type RejectedPacketReason int
const (
// The router rejected the packet because it is too big for the session
PacketTooBig = 1 + iota
)
type RejectedPacket struct {
Reason RejectedPacketReason
Packet []byte
Detail interface{}
}
2019-03-28 19:09:19 +00:00
// Initializes the router struct, which includes setting up channels to/from the adapter.
2017-12-28 22:16:20 -06:00
func (r *router) init(core *Core) {
2018-01-04 22:37:51 +00:00
r.core = core
2018-12-30 12:04:42 +00:00
r.reconfigure = make(chan chan error, 1)
r.addr = *address.AddrForNodeID(&r.core.dht.nodeID)
r.subnet = *address.SubnetForNodeID(&r.core.dht.nodeID)
in := make(chan []byte, 1) // TODO something better than this...
self := linkInterface{
name: "(self)",
info: linkInfo{
local: "(self)",
remote: "(self)",
linkType: "self",
},
}
p := r.core.peers.newPeer(&r.core.boxPub, &r.core.sigPub, &crypto.BoxSharedKey{}, &self, nil)
p.out = func(packet []byte) { in <- packet }
2018-01-04 22:37:51 +00:00
r.in = in
out := make(chan []byte, 32)
go func() {
for packet := range out {
p.handlePacket(packet)
}
}()
out2 := make(chan []byte, 32)
go func() {
// This worker makes sure r.out never blocks
// It will buffer traffic long enough for the switch worker to take it
// If (somehow) you can send faster than the switch can receive, then this would use unbounded memory
// But crypto slows sends enough that the switch should always be able to take the packets...
var buf [][]byte
for {
buf = append(buf, <-out2)
for len(buf) > 0 {
select {
case bs := <-out2:
buf = append(buf, bs)
case out <- buf[0]:
buf = buf[1:]
}
}
}
}()
r.out = func(packet []byte) { out2 <- packet }
r.toRecv = make(chan router_recvPacket, 32)
recv := make(chan []byte, 32)
send := make(chan []byte, 32)
reject := make(chan RejectedPacket, 32)
2018-01-04 22:37:51 +00:00
r.recv = recv
r.send = send
r.reject = reject
2018-01-04 22:37:51 +00:00
r.reset = make(chan struct{}, 1)
r.admin = make(chan func(), 32)
2019-01-16 13:23:26 +00:00
r.nodeinfo.init(r.core)
r.core.config.Mutex.RLock()
r.nodeinfo.setNodeInfo(r.core.config.Current.NodeInfo, r.core.config.Current.NodeInfoPrivacy)
r.core.config.Mutex.RUnlock()
r.cryptokey.init(r.core)
2019-03-28 19:09:19 +00:00
r.adapter.Init(&r.core.config, r.core.log, send, recv, reject)
2018-05-27 22:13:37 +01:00
}
// Starts the mainLoop goroutine.
2018-05-27 22:13:37 +01:00
func (r *router) start() error {
r.core.log.Infoln("Starting router")
2018-01-04 22:37:51 +00:00
go r.mainLoop()
2018-05-27 22:13:37 +01:00
return nil
2017-12-28 22:16:20 -06:00
}
2019-03-28 19:09:19 +00:00
// Takes traffic from the adapter and passes it to router.send, or from r.in and handles incoming traffic.
// Also adds new peer info to the DHT.
// Also resets the DHT and sesssions in the event of a coord change.
// Also does periodic maintenance stuff.
2017-12-28 22:16:20 -06:00
func (r *router) mainLoop() {
2018-01-04 22:37:51 +00:00
ticker := time.NewTicker(time.Second)
defer ticker.Stop()
for {
select {
case rp := <-r.toRecv:
r.recvPacket(rp.bs, rp.sinfo)
2018-01-04 22:37:51 +00:00
case p := <-r.in:
r.handleIn(p)
case p := <-r.send:
r.sendPacket(p)
case info := <-r.core.dht.peers:
r.core.dht.insertPeer(info)
2018-01-04 22:37:51 +00:00
case <-r.reset:
r.core.sessions.resetInits()
r.core.dht.reset()
2018-01-04 22:37:51 +00:00
case <-ticker.C:
{
// Any periodic maintenance stuff goes here
r.core.switchTable.doMaintenance()
2018-01-04 22:37:51 +00:00
r.core.dht.doMaintenance()
r.core.sessions.cleanup()
util.GetBytes() // To slowly drain things
2018-01-04 22:37:51 +00:00
}
case f := <-r.admin:
f()
2018-12-30 12:04:42 +00:00
case e := <-r.reconfigure:
current, _ := r.core.config.Get()
e <- r.nodeinfo.setNodeInfo(current.NodeInfo, current.NodeInfoPrivacy)
2018-01-04 22:37:51 +00:00
}
}
2017-12-28 22:16:20 -06:00
}
// Checks a packet's to/from address to make sure it's in the allowed range.
// If a session to the destination exists, gets the session and passes the packet to it.
// If no session exists, it triggers (or continues) a search.
// If the session hasn't responded recently, it triggers a ping or search to keep things alive or deal with broken coords *relatively* quickly.
2019-03-28 19:09:19 +00:00
// It also deals with oversized packets if there are MTU issues by calling into icmpv6.go to spoof PacketTooBig traffic, or DestinationUnreachable if the other side has their adapter disabled.
2017-12-28 22:16:20 -06:00
func (r *router) sendPacket(bs []byte) {
var sourceAddr address.Address
var destAddr address.Address
var destSnet address.Subnet
var destPubKey *crypto.BoxPubKey
var destNodeID *crypto.NodeID
2018-11-06 20:49:19 +00:00
var addrlen int
if bs[0]&0xf0 == 0x60 {
// Check if we have a fully-sized header
if len(bs) < 40 {
panic("Tried to send a packet shorter than an IPv6 header...")
}
2018-11-06 20:49:19 +00:00
// IPv6 address
addrlen = 16
copy(sourceAddr[:addrlen], bs[8:])
copy(destAddr[:addrlen], bs[24:])
copy(destSnet[:addrlen/2], bs[24:])
2018-11-06 20:49:19 +00:00
} else if bs[0]&0xf0 == 0x40 {
// Check if we have a fully-sized header
if len(bs) < 20 {
panic("Tried to send a packet shorter than an IPv4 header...")
}
2018-11-06 20:49:19 +00:00
// IPv4 address
addrlen = 4
copy(sourceAddr[:addrlen], bs[12:])
copy(destAddr[:addrlen], bs[16:])
2018-11-06 20:49:19 +00:00
} else {
// Unknown address length
2018-11-06 20:49:19 +00:00
return
}
if !r.cryptokey.isValidSource(sourceAddr, addrlen) {
// The packet had a source address that doesn't belong to us or our
// configured crypto-key routing source subnets
return
}
if !destAddr.IsValid() && !destSnet.IsValid() {
// The addresses didn't match valid Yggdrasil node addresses so let's see
// whether it matches a crypto-key routing range instead
if key, err := r.cryptokey.getPublicKeyForAddress(destAddr, addrlen); err == nil {
// A public key was found, get the node ID for the search
destPubKey = &key
destNodeID = crypto.GetNodeID(destPubKey)
// Do a quick check to ensure that the node ID refers to a vaild Yggdrasil
// address or subnet - this might be superfluous
addr := *address.AddrForNodeID(destNodeID)
copy(destAddr[:], addr[:])
copy(destSnet[:], addr[:])
if !destAddr.IsValid() && !destSnet.IsValid() {
2018-11-05 22:39:30 +00:00
return
}
} else {
// No public key was found in the CKR table so we've exhausted our options
2018-11-05 22:39:30 +00:00
return
}
2018-01-04 22:37:51 +00:00
}
doSearch := func(packet []byte) {
var nodeID, mask *crypto.NodeID
switch {
case destNodeID != nil:
// We already know the full node ID, probably because it's from a CKR
// route in which the public key is known ahead of time
nodeID = destNodeID
var m crypto.NodeID
for i := range m {
m[i] = 0xFF
}
mask = &m
case destAddr.IsValid():
// We don't know the full node ID - try and use the address to generate
// a truncated node ID
nodeID, mask = destAddr.GetNodeIDandMask()
case destSnet.IsValid():
// We don't know the full node ID - try and use the subnet to generate
// a truncated node ID
nodeID, mask = destSnet.GetNodeIDandMask()
default:
return
2018-01-04 22:37:51 +00:00
}
sinfo, isIn := r.core.searches.searches[*nodeID]
if !isIn {
2018-06-01 23:34:21 -05:00
sinfo = r.core.searches.newIterSearch(nodeID, mask)
2018-01-04 22:37:51 +00:00
}
if packet != nil {
sinfo.packet = packet
}
2018-06-01 23:34:21 -05:00
r.core.searches.continueSearch(sinfo)
2018-01-04 22:37:51 +00:00
}
var sinfo *sessionInfo
var isIn bool
if destAddr.IsValid() {
sinfo, isIn = r.core.sessions.getByTheirAddr(&destAddr)
2018-01-04 22:37:51 +00:00
}
if destSnet.IsValid() {
sinfo, isIn = r.core.sessions.getByTheirSubnet(&destSnet)
2018-01-04 22:37:51 +00:00
}
switch {
case !isIn || !sinfo.init:
// No or unintiialized session, so we need to search first
doSearch(bs)
case time.Since(sinfo.time) > 6*time.Second:
if sinfo.time.Before(sinfo.pingTime) && time.Since(sinfo.pingTime) > 6*time.Second {
// We haven't heard from the dest in a while
// We tried pinging but didn't get a response
// They may have changed coords
// Try searching to discover new coords
// Note that search spam is throttled internally
doSearch(nil)
} else {
// We haven't heard about the dest in a while
now := time.Now()
if !sinfo.time.Before(sinfo.pingTime) {
// Update pingTime to start the clock for searches (above)
sinfo.pingTime = now
}
if time.Since(sinfo.pingSend) > time.Second {
// Send at most 1 ping per second
sinfo.pingSend = now
r.core.sessions.sendPingPong(sinfo, false)
}
}
fallthrough // Also send the packet
2018-01-04 22:37:51 +00:00
default:
// If we know the public key ahead of time (i.e. a CKR route) then check
// if the session perm pub key matches before we send the packet to it
if destPubKey != nil {
if !bytes.Equal((*destPubKey)[:], sinfo.theirPermPub[:]) {
return
}
}
// Drop packets if the session MTU is 0 - this means that one or other
// side probably has their TUN adapter disabled
if sinfo.getMTU() == 0 {
// Don't continue - drop the packet
return
}
// Generate an ICMPv6 Packet Too Big for packets larger than session MTU
if len(bs) > int(sinfo.getMTU()) {
// Get the size of the oversized payload, up to a max of 900 bytes
window := 900
if int(sinfo.getMTU()) < window {
window = int(sinfo.getMTU())
}
// Send the error back to the adapter
r.reject <- RejectedPacket{
Reason: PacketTooBig,
Packet: bs[:window],
Detail: int(sinfo.getMTU()),
}
// Don't continue - drop the packet
return
}
sinfo.send <- bs
2018-01-04 22:37:51 +00:00
}
2017-12-28 22:16:20 -06:00
}
// Called for incoming traffic by the session worker for that connection.
2019-03-28 19:09:19 +00:00
// Checks that the IP address is correct (matches the session) and passes the packet to the adapter.
func (r *router) recvPacket(bs []byte, sinfo *sessionInfo) {
// Note: called directly by the session worker, not the router goroutine
2018-01-04 22:37:51 +00:00
if len(bs) < 24 {
util.PutBytes(bs)
2018-01-04 22:37:51 +00:00
return
}
var sourceAddr address.Address
var dest address.Address
var snet address.Subnet
2018-11-06 20:49:19 +00:00
var addrlen int
if bs[0]&0xf0 == 0x60 {
// IPv6 address
addrlen = 16
copy(sourceAddr[:addrlen], bs[8:])
copy(dest[:addrlen], bs[24:])
copy(snet[:addrlen/2], bs[8:])
2018-11-06 20:49:19 +00:00
} else if bs[0]&0xf0 == 0x40 {
// IPv4 address
addrlen = 4
copy(sourceAddr[:addrlen], bs[12:])
copy(dest[:addrlen], bs[16:])
} else {
// Unknown address length
2018-11-06 20:49:19 +00:00
return
}
// Check that the packet is destined for either our Yggdrasil address or
// subnet, or that it matches one of the crypto-key routing source routes
2018-11-06 20:49:19 +00:00
if !r.cryptokey.isValidSource(dest, addrlen) {
util.PutBytes(bs)
return
}
// See whether the packet they sent should have originated from this session
switch {
case sourceAddr.IsValid() && sourceAddr == sinfo.theirAddr:
case snet.IsValid() && snet == sinfo.theirSubnet:
default:
2018-11-06 20:49:19 +00:00
key, err := r.cryptokey.getPublicKeyForAddress(sourceAddr, addrlen)
if err != nil || key != sinfo.theirPermPub {
util.PutBytes(bs)
return
}
2018-01-04 22:37:51 +00:00
}
//go func() { r.recv<-bs }()
r.recv <- bs
2017-12-28 22:16:20 -06:00
}
// Checks incoming traffic type and passes it to the appropriate handler.
2017-12-28 22:16:20 -06:00
func (r *router) handleIn(packet []byte) {
2018-01-04 22:37:51 +00:00
pType, pTypeLen := wire_decode_uint64(packet)
if pTypeLen == 0 {
return
}
switch pType {
case wire_Traffic:
r.handleTraffic(packet)
case wire_ProtocolTraffic:
r.handleProto(packet)
2018-06-12 17:50:08 -05:00
default:
2018-01-04 22:37:51 +00:00
}
2017-12-28 22:16:20 -06:00
}
// Handles incoming traffic, i.e. encapuslated ordinary IPv6 packets.
2019-03-28 19:09:19 +00:00
// Passes them to the crypto session worker to be decrypted and sent to the adapter.
2017-12-28 22:16:20 -06:00
func (r *router) handleTraffic(packet []byte) {
defer util.PutBytes(packet)
2018-01-04 22:37:51 +00:00
p := wire_trafficPacket{}
if !p.decode(packet) {
return
}
2018-06-02 21:21:05 +01:00
sinfo, isIn := r.core.sessions.getSessionForHandle(&p.Handle)
2018-01-04 22:37:51 +00:00
if !isIn {
return
}
sinfo.recv <- &p
2017-12-28 22:16:20 -06:00
}
// Handles protocol traffic by decrypting it, checking its type, and passing it to the appropriate handler for that traffic type.
2017-12-28 22:16:20 -06:00
func (r *router) handleProto(packet []byte) {
2018-01-04 22:37:51 +00:00
// First parse the packet
p := wire_protoTrafficPacket{}
if !p.decode(packet) {
return
}
// Now try to open the payload
var sharedKey *crypto.BoxSharedKey
2018-06-02 21:21:05 +01:00
if p.ToKey == r.core.boxPub {
2018-01-04 22:37:51 +00:00
// Try to open using our permanent key
2018-06-02 21:21:05 +01:00
sharedKey = r.core.sessions.getSharedKey(&r.core.boxPriv, &p.FromKey)
2018-01-04 22:37:51 +00:00
} else {
return
}
bs, isOK := crypto.BoxOpen(sharedKey, p.Payload, &p.Nonce)
2018-01-04 22:37:51 +00:00
if !isOK {
return
}
// Now do something with the bytes in bs...
2019-03-28 19:09:19 +00:00
// send dht messages to dht, sessionRefresh to sessions, data to adapter...
2018-01-04 22:37:51 +00:00
// For data, should check that key and IP match...
bsType, bsTypeLen := wire_decode_uint64(bs)
if bsTypeLen == 0 {
return
}
switch bsType {
case wire_SessionPing:
2018-06-02 21:21:05 +01:00
r.handlePing(bs, &p.FromKey)
2018-01-04 22:37:51 +00:00
case wire_SessionPong:
2018-06-02 21:21:05 +01:00
r.handlePong(bs, &p.FromKey)
2018-12-15 22:37:11 +00:00
case wire_NodeInfoRequest:
fallthrough
2018-12-15 22:37:11 +00:00
case wire_NodeInfoResponse:
r.handleNodeInfo(bs, &p.FromKey)
2018-01-04 22:37:51 +00:00
case wire_DHTLookupRequest:
2018-06-02 21:21:05 +01:00
r.handleDHTReq(bs, &p.FromKey)
2018-01-04 22:37:51 +00:00
case wire_DHTLookupResponse:
2018-06-02 21:21:05 +01:00
r.handleDHTRes(bs, &p.FromKey)
default:
util.PutBytes(packet)
2018-01-04 22:37:51 +00:00
}
2017-12-28 22:16:20 -06:00
}
// Decodes session pings from wire format and passes them to sessions.handlePing where they either create or update a session.
func (r *router) handlePing(bs []byte, fromKey *crypto.BoxPubKey) {
2018-01-04 22:37:51 +00:00
ping := sessionPing{}
if !ping.decode(bs) {
return
}
ping.SendPermPub = *fromKey
2018-01-04 22:37:51 +00:00
r.core.sessions.handlePing(&ping)
2017-12-28 22:16:20 -06:00
}
// Handles session pongs (which are really pings with an extra flag to prevent acknowledgement).
func (r *router) handlePong(bs []byte, fromKey *crypto.BoxPubKey) {
2018-01-04 22:37:51 +00:00
r.handlePing(bs, fromKey)
2017-12-28 22:16:20 -06:00
}
// Decodes dht requests and passes them to dht.handleReq to trigger a lookup/response.
func (r *router) handleDHTReq(bs []byte, fromKey *crypto.BoxPubKey) {
2018-01-04 22:37:51 +00:00
req := dhtReq{}
if !req.decode(bs) {
return
}
req.Key = *fromKey
2018-01-04 22:37:51 +00:00
r.core.dht.handleReq(&req)
2017-12-28 22:16:20 -06:00
}
// Decodes dht responses and passes them to dht.handleRes to update the DHT table and further pass them to the search code (if applicable).
func (r *router) handleDHTRes(bs []byte, fromKey *crypto.BoxPubKey) {
2018-01-04 22:37:51 +00:00
res := dhtRes{}
if !res.decode(bs) {
return
}
res.Key = *fromKey
2018-01-04 22:37:51 +00:00
r.core.dht.handleRes(&res)
2017-12-28 22:16:20 -06:00
}
2018-12-15 22:37:11 +00:00
// Decodes nodeinfo request
func (r *router) handleNodeInfo(bs []byte, fromKey *crypto.BoxPubKey) {
2018-12-15 22:37:11 +00:00
req := nodeinfoReqRes{}
if !req.decode(bs) {
return
}
req.SendPermPub = *fromKey
2019-01-14 19:05:16 +00:00
r.nodeinfo.handleNodeInfo(&req)
}
// Passed a function to call.
// This will send the function to r.admin and block until it finishes.
// It's used by the admin socket to ask the router mainLoop goroutine about information in the session or dht structs, which cannot be read safely from outside that goroutine.
func (r *router) doAdmin(f func()) {
// Pass this a function that needs to be run by the router's main goroutine
// It will pass the function to the router and wait for the router to finish
done := make(chan struct{})
newF := func() {
f()
close(done)
}
r.admin <- newF
<-done
}