2019-03-28 16:13:14 +00:00
|
|
|
package multicast
|
2018-05-23 11:13:53 +01:00
|
|
|
|
2018-06-12 17:50:08 -05:00
|
|
|
import (
|
2018-12-05 22:39:04 +00:00
|
|
|
"context"
|
2021-06-05 05:07:04 -05:00
|
|
|
"crypto/ed25519"
|
|
|
|
"encoding/hex"
|
2018-06-12 17:50:08 -05:00
|
|
|
"fmt"
|
|
|
|
"net"
|
2021-05-23 21:47:12 -05:00
|
|
|
"net/url"
|
2019-01-14 19:27:13 +00:00
|
|
|
"regexp"
|
2018-06-12 17:50:08 -05:00
|
|
|
"time"
|
2018-05-23 11:13:53 +01:00
|
|
|
|
2019-09-18 16:51:46 +01:00
|
|
|
"github.com/Arceliar/phony"
|
2019-03-28 16:13:14 +00:00
|
|
|
"github.com/gologme/log"
|
|
|
|
|
|
|
|
"github.com/yggdrasil-network/yggdrasil-go/src/config"
|
2021-05-23 14:42:26 -05:00
|
|
|
"github.com/yggdrasil-network/yggdrasil-go/src/core"
|
2018-06-12 17:50:08 -05:00
|
|
|
"golang.org/x/net/ipv6"
|
|
|
|
)
|
2018-05-23 11:13:53 +01:00
|
|
|
|
2019-03-29 18:18:31 +00:00
|
|
|
// Multicast represents the multicast advertisement and discovery mechanism used
|
|
|
|
// by Yggdrasil to find peers on the same subnet. When a beacon is received on a
|
|
|
|
// configured multicast interface, Yggdrasil will attempt to peer with that node
|
|
|
|
// automatically.
|
2019-03-28 16:13:14 +00:00
|
|
|
type Multicast struct {
|
2019-09-18 16:51:46 +01:00
|
|
|
phony.Inbox
|
2021-05-23 14:42:26 -05:00
|
|
|
core *core.Core
|
2021-06-02 14:19:32 +01:00
|
|
|
config *config.NodeConfig
|
2020-05-24 15:24:39 -05:00
|
|
|
log *log.Logger
|
|
|
|
sock *ipv6.PacketConn
|
|
|
|
groupAddr string
|
|
|
|
listeners map[string]*listenerInfo
|
|
|
|
listenPort uint16
|
|
|
|
isOpen bool
|
|
|
|
_interfaces map[string]interfaceInfo
|
|
|
|
}
|
|
|
|
|
|
|
|
type interfaceInfo struct {
|
|
|
|
iface net.Interface
|
|
|
|
addrs []net.Addr
|
2018-05-23 11:13:53 +01:00
|
|
|
}
|
|
|
|
|
2020-05-24 14:43:38 -05:00
|
|
|
type listenerInfo struct {
|
2021-05-23 14:42:26 -05:00
|
|
|
listener *core.TcpListener
|
2020-05-24 14:43:38 -05:00
|
|
|
time time.Time
|
2019-09-20 17:42:42 -05:00
|
|
|
interval time.Duration
|
2020-05-02 22:26:41 +01:00
|
|
|
}
|
|
|
|
|
2019-03-29 18:18:31 +00:00
|
|
|
// Init prepares the multicast interface for use.
|
2021-06-02 14:19:32 +01:00
|
|
|
func (m *Multicast) Init(core *core.Core, nc *config.NodeConfig, log *log.Logger, options interface{}) error {
|
2018-05-23 11:13:53 +01:00
|
|
|
m.core = core
|
2021-06-02 14:19:32 +01:00
|
|
|
m.config = nc
|
2019-03-28 16:13:14 +00:00
|
|
|
m.log = log
|
2020-05-24 14:43:38 -05:00
|
|
|
m.listeners = make(map[string]*listenerInfo)
|
2020-05-24 15:24:39 -05:00
|
|
|
m._interfaces = make(map[string]interfaceInfo)
|
2021-06-02 14:19:32 +01:00
|
|
|
m.listenPort = m.config.LinkLocalTCPPort
|
2020-05-24 14:43:38 -05:00
|
|
|
m.groupAddr = "[ff02::114]:9001"
|
|
|
|
return nil
|
2018-05-23 11:13:53 +01:00
|
|
|
}
|
|
|
|
|
2019-03-29 18:18:31 +00:00
|
|
|
// Start starts the multicast interface. This launches goroutines which will
|
|
|
|
// listen for multicast beacons from other hosts and will advertise multicast
|
|
|
|
// beacons out to the network.
|
2019-03-28 16:13:14 +00:00
|
|
|
func (m *Multicast) Start() error {
|
2019-10-24 09:25:31 +01:00
|
|
|
var err error
|
|
|
|
phony.Block(m, func() {
|
|
|
|
err = m._start()
|
|
|
|
})
|
2019-10-24 09:54:57 +01:00
|
|
|
m.log.Debugln("Started multicast module")
|
2019-10-24 09:25:31 +01:00
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
func (m *Multicast) _start() error {
|
2019-10-24 23:31:47 +01:00
|
|
|
if m.isOpen {
|
2019-10-24 09:25:31 +01:00
|
|
|
return fmt.Errorf("multicast module is already started")
|
|
|
|
}
|
2021-06-02 14:19:32 +01:00
|
|
|
m.config.RLock()
|
|
|
|
defer m.config.RUnlock()
|
|
|
|
if len(m.config.MulticastInterfaces) == 0 {
|
2019-10-24 09:54:57 +01:00
|
|
|
return nil
|
2019-10-24 09:25:31 +01:00
|
|
|
}
|
|
|
|
m.log.Infoln("Starting multicast module")
|
2020-05-24 14:43:38 -05:00
|
|
|
addr, err := net.ResolveUDPAddr("udp", m.groupAddr)
|
2019-06-20 15:11:55 +01:00
|
|
|
if err != nil {
|
|
|
|
return err
|
2018-05-23 11:28:20 +01:00
|
|
|
}
|
2019-06-20 15:11:55 +01:00
|
|
|
listenString := fmt.Sprintf("[::]:%v", addr.Port)
|
|
|
|
lc := net.ListenConfig{
|
|
|
|
Control: m.multicastReuse,
|
|
|
|
}
|
|
|
|
conn, err := lc.ListenPacket(context.Background(), "udp6", listenString)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
m.sock = ipv6.NewPacketConn(conn)
|
2021-06-02 14:40:09 +01:00
|
|
|
if err = m.sock.SetControlMessage(ipv6.FlagDst, true); err != nil { // nolint:staticcheck
|
2019-06-20 15:11:55 +01:00
|
|
|
// Windows can't set this flag, so we need to handle it in other ways
|
|
|
|
}
|
|
|
|
|
2019-10-24 23:31:47 +01:00
|
|
|
m.isOpen = true
|
2019-06-20 15:11:55 +01:00
|
|
|
go m.listen()
|
2020-05-02 17:23:20 -05:00
|
|
|
m.Act(nil, m._multicastStarted)
|
2020-05-24 14:43:38 -05:00
|
|
|
m.Act(nil, m._announce)
|
2019-06-20 15:11:55 +01:00
|
|
|
|
2018-05-27 22:13:37 +01:00
|
|
|
return nil
|
2018-05-23 11:13:53 +01:00
|
|
|
}
|
|
|
|
|
2019-10-24 09:25:31 +01:00
|
|
|
// IsStarted returns true if the module has been started.
|
|
|
|
func (m *Multicast) IsStarted() bool {
|
2019-10-24 23:31:47 +01:00
|
|
|
var isOpen bool
|
|
|
|
phony.Block(m, func() {
|
|
|
|
isOpen = m.isOpen
|
|
|
|
})
|
|
|
|
return isOpen
|
2019-10-24 09:25:31 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
// Stop stops the multicast module.
|
2019-10-24 09:54:57 +01:00
|
|
|
func (m *Multicast) Stop() error {
|
|
|
|
var err error
|
|
|
|
phony.Block(m, func() {
|
|
|
|
err = m._stop()
|
|
|
|
})
|
|
|
|
m.log.Debugln("Stopped multicast module")
|
2019-11-30 16:05:44 +02:00
|
|
|
return err
|
2019-10-24 09:25:31 +01:00
|
|
|
}
|
|
|
|
|
2019-10-24 09:54:57 +01:00
|
|
|
func (m *Multicast) _stop() error {
|
2019-10-24 09:25:31 +01:00
|
|
|
m.log.Infoln("Stopping multicast module")
|
2019-10-24 23:31:47 +01:00
|
|
|
m.isOpen = false
|
2019-10-25 18:40:09 -05:00
|
|
|
if m.sock != nil {
|
|
|
|
m.sock.Close()
|
|
|
|
}
|
2019-10-24 09:54:57 +01:00
|
|
|
return nil
|
2019-03-28 19:09:19 +00:00
|
|
|
}
|
|
|
|
|
2020-05-24 15:24:39 -05:00
|
|
|
func (m *Multicast) _updateInterfaces() {
|
|
|
|
interfaces := make(map[string]interfaceInfo)
|
|
|
|
intfs := m.getAllowedInterfaces()
|
|
|
|
for _, intf := range intfs {
|
|
|
|
addrs, err := intf.Addrs()
|
|
|
|
if err != nil {
|
|
|
|
m.log.Warnf("Failed up get addresses for interface %s: %s", intf.Name, err)
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
interfaces[intf.Name] = interfaceInfo{
|
|
|
|
iface: intf,
|
|
|
|
addrs: addrs,
|
|
|
|
}
|
|
|
|
}
|
|
|
|
m._interfaces = interfaces
|
|
|
|
}
|
|
|
|
|
2019-06-29 00:12:56 +01:00
|
|
|
func (m *Multicast) Interfaces() map[string]net.Interface {
|
2020-05-24 15:24:39 -05:00
|
|
|
interfaces := make(map[string]net.Interface)
|
|
|
|
phony.Block(m, func() {
|
|
|
|
for _, info := range m._interfaces {
|
|
|
|
interfaces[info.iface.Name] = info.iface
|
|
|
|
}
|
|
|
|
})
|
|
|
|
return interfaces
|
|
|
|
}
|
|
|
|
|
|
|
|
// getAllowedInterfaces returns the currently known/enabled multicast interfaces.
|
|
|
|
func (m *Multicast) getAllowedInterfaces() map[string]net.Interface {
|
2019-06-29 00:12:56 +01:00
|
|
|
interfaces := make(map[string]net.Interface)
|
2019-01-14 19:27:13 +00:00
|
|
|
// Get interface expressions from config
|
2021-06-02 14:19:32 +01:00
|
|
|
exprs := m.config.MulticastInterfaces
|
2018-06-07 22:07:19 -05:00
|
|
|
// Ask the system for network interfaces
|
|
|
|
allifaces, err := net.Interfaces()
|
|
|
|
if err != nil {
|
2020-10-18 11:01:18 -05:00
|
|
|
// Don't panic, since this may be from e.g. too many open files (from too much connection spam)
|
|
|
|
// TODO? log something
|
|
|
|
return nil
|
2018-06-07 22:07:19 -05:00
|
|
|
}
|
|
|
|
// Work out which interfaces to announce on
|
|
|
|
for _, iface := range allifaces {
|
|
|
|
if iface.Flags&net.FlagUp == 0 {
|
|
|
|
// Ignore interfaces that are down
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
if iface.Flags&net.FlagMulticast == 0 {
|
|
|
|
// Ignore non-multicast interfaces
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
if iface.Flags&net.FlagPointToPoint != 0 {
|
|
|
|
// Ignore point-to-point interfaces
|
|
|
|
continue
|
|
|
|
}
|
2019-01-14 19:27:13 +00:00
|
|
|
for _, expr := range exprs {
|
2019-03-06 11:06:13 +00:00
|
|
|
// Compile each regular expression
|
2019-01-14 19:27:13 +00:00
|
|
|
e, err := regexp.Compile(expr)
|
|
|
|
if err != nil {
|
|
|
|
panic(err)
|
|
|
|
}
|
2019-03-06 11:06:13 +00:00
|
|
|
// Does the interface match the regular expression? Store it if so
|
2019-01-14 19:27:13 +00:00
|
|
|
if e.MatchString(iface.Name) {
|
2019-06-29 00:12:56 +01:00
|
|
|
interfaces[iface.Name] = iface
|
2018-06-07 22:07:19 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
2020-05-24 14:43:38 -05:00
|
|
|
return interfaces
|
|
|
|
}
|
|
|
|
|
|
|
|
func (m *Multicast) _announce() {
|
|
|
|
if !m.isOpen {
|
|
|
|
return
|
|
|
|
}
|
2020-05-24 15:24:39 -05:00
|
|
|
m._updateInterfaces()
|
2020-05-24 14:43:38 -05:00
|
|
|
groupAddr, err := net.ResolveUDPAddr("udp6", m.groupAddr)
|
|
|
|
if err != nil {
|
|
|
|
panic(err)
|
|
|
|
}
|
|
|
|
destAddr, err := net.ResolveUDPAddr("udp6", m.groupAddr)
|
|
|
|
if err != nil {
|
|
|
|
panic(err)
|
|
|
|
}
|
|
|
|
// There might be interfaces that we configured listeners for but are no
|
|
|
|
// longer up - if that's the case then we should stop the listeners
|
|
|
|
for name, info := range m.listeners {
|
|
|
|
// Prepare our stop function!
|
|
|
|
stop := func() {
|
|
|
|
info.listener.Stop()
|
|
|
|
delete(m.listeners, name)
|
|
|
|
m.log.Debugln("No longer multicasting on", name)
|
|
|
|
}
|
|
|
|
// If the interface is no longer visible on the system then stop the
|
|
|
|
// listener, as another one will be started further down
|
2020-05-24 15:24:39 -05:00
|
|
|
if _, ok := m._interfaces[name]; !ok {
|
2020-05-24 14:43:38 -05:00
|
|
|
stop()
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
// It's possible that the link-local listener address has changed so if
|
|
|
|
// that is the case then we should clean up the interface listener
|
|
|
|
found := false
|
|
|
|
listenaddr, err := net.ResolveTCPAddr("tcp6", info.listener.Listener.Addr().String())
|
|
|
|
if err != nil {
|
|
|
|
stop()
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
// Find the interface that matches the listener
|
2020-09-27 07:16:51 -05:00
|
|
|
if info, ok := m._interfaces[name]; ok {
|
|
|
|
for _, addr := range info.addrs {
|
|
|
|
if ip, _, err := net.ParseCIDR(addr.String()); err == nil {
|
|
|
|
// Does the interface address match our listener address?
|
|
|
|
if ip.Equal(listenaddr.IP) {
|
|
|
|
found = true
|
|
|
|
break
|
2020-05-24 14:43:38 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
// If the address has not been found on the adapter then we should stop
|
|
|
|
// and clean up the TCP listener. A new one will be created below if a
|
|
|
|
// suitable link-local address is found
|
|
|
|
if !found {
|
|
|
|
stop()
|
|
|
|
}
|
|
|
|
}
|
|
|
|
// Now that we have a list of valid interfaces from the operating system,
|
|
|
|
// we can start checking if we can send multicasts on them
|
2020-05-24 15:24:39 -05:00
|
|
|
for _, info := range m._interfaces {
|
|
|
|
iface := info.iface
|
|
|
|
for _, addr := range info.addrs {
|
2020-05-24 14:43:38 -05:00
|
|
|
addrIP, _, _ := net.ParseCIDR(addr.String())
|
|
|
|
// Ignore IPv4 addresses
|
|
|
|
if addrIP.To4() != nil {
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
// Ignore non-link-local addresses
|
|
|
|
if !addrIP.IsLinkLocalUnicast() {
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
// Join the multicast group
|
2021-06-02 14:40:09 +01:00
|
|
|
_ = m.sock.JoinGroup(&iface, groupAddr)
|
2020-05-24 14:43:38 -05:00
|
|
|
// Try and see if we already have a TCP listener for this interface
|
|
|
|
var info *listenerInfo
|
|
|
|
if nfo, ok := m.listeners[iface.Name]; !ok || nfo.listener.Listener == nil {
|
|
|
|
// No listener was found - let's create one
|
2021-05-24 18:53:54 -05:00
|
|
|
urlString := fmt.Sprintf("tcp://[%s]:%d", addrIP, m.listenPort)
|
2021-05-23 21:47:12 -05:00
|
|
|
u, err := url.Parse(urlString)
|
|
|
|
if err != nil {
|
|
|
|
panic(err)
|
|
|
|
}
|
|
|
|
if li, err := m.core.Listen(u, iface.Name); err == nil {
|
2020-05-24 14:43:38 -05:00
|
|
|
m.log.Debugln("Started multicasting on", iface.Name)
|
|
|
|
// Store the listener so that we can stop it later if needed
|
|
|
|
info = &listenerInfo{listener: li, time: time.Now()}
|
|
|
|
m.listeners[iface.Name] = info
|
|
|
|
} else {
|
|
|
|
m.log.Warnln("Not multicasting on", iface.Name, "due to error:", err)
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
// An existing listener was found
|
|
|
|
info = m.listeners[iface.Name]
|
|
|
|
}
|
|
|
|
// Make sure nothing above failed for some reason
|
|
|
|
if info == nil {
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
if time.Since(info.time) < info.interval {
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
// Get the listener details and construct the multicast beacon
|
|
|
|
lladdr := info.listener.Listener.Addr().String()
|
|
|
|
if a, err := net.ResolveTCPAddr("tcp6", lladdr); err == nil {
|
|
|
|
a.Zone = ""
|
|
|
|
destAddr.Zone = iface.Name
|
2021-06-05 21:32:04 +01:00
|
|
|
msg := append([]byte(nil), m.core.GetSelf().Key...)
|
2021-06-05 05:07:04 -05:00
|
|
|
msg = append(msg, a.String()...)
|
2021-06-02 14:40:09 +01:00
|
|
|
_, _ = m.sock.WriteTo(msg, nil, destAddr)
|
2020-05-24 14:43:38 -05:00
|
|
|
}
|
|
|
|
if info.interval.Seconds() < 15 {
|
|
|
|
info.interval += time.Second
|
|
|
|
}
|
|
|
|
break
|
|
|
|
}
|
|
|
|
}
|
|
|
|
time.AfterFunc(time.Second, func() {
|
|
|
|
m.Act(nil, m._announce)
|
|
|
|
})
|
2018-06-07 22:07:19 -05:00
|
|
|
}
|
|
|
|
|
2019-03-28 16:13:14 +00:00
|
|
|
func (m *Multicast) listen() {
|
2020-05-24 14:43:38 -05:00
|
|
|
groupAddr, err := net.ResolveUDPAddr("udp6", m.groupAddr)
|
2018-05-23 11:13:53 +01:00
|
|
|
if err != nil {
|
|
|
|
panic(err)
|
|
|
|
}
|
|
|
|
bs := make([]byte, 2048)
|
|
|
|
for {
|
|
|
|
nBytes, rcm, fromAddr, err := m.sock.ReadFrom(bs)
|
|
|
|
if err != nil {
|
2019-10-24 09:54:57 +01:00
|
|
|
if !m.IsStarted() {
|
2019-07-06 11:52:30 +01:00
|
|
|
return
|
|
|
|
}
|
2018-05-23 11:13:53 +01:00
|
|
|
panic(err)
|
|
|
|
}
|
|
|
|
if rcm != nil {
|
|
|
|
// Windows can't set the flag needed to return a non-nil value here
|
|
|
|
// So only make these checks if we get something useful back
|
|
|
|
// TODO? Skip them always, I'm not sure if they're really needed...
|
|
|
|
if !rcm.Dst.IsLinkLocalMulticast() {
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
if !rcm.Dst.Equal(groupAddr.IP) {
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
}
|
2021-06-06 04:48:00 -05:00
|
|
|
if nBytes < ed25519.PublicKeySize {
|
2021-06-05 05:07:04 -05:00
|
|
|
continue
|
|
|
|
}
|
|
|
|
var key ed25519.PublicKey
|
|
|
|
key = append(key, bs[:ed25519.PublicKeySize]...)
|
|
|
|
anAddr := string(bs[ed25519.PublicKeySize:nBytes])
|
2018-05-23 11:13:53 +01:00
|
|
|
addr, err := net.ResolveTCPAddr("tcp6", anAddr)
|
|
|
|
if err != nil {
|
|
|
|
continue
|
2018-06-12 17:50:08 -05:00
|
|
|
}
|
2018-05-23 11:13:53 +01:00
|
|
|
from := fromAddr.(*net.UDPAddr)
|
|
|
|
if addr.IP.String() != from.IP.String() {
|
|
|
|
continue
|
|
|
|
}
|
2020-05-24 15:24:39 -05:00
|
|
|
var interfaces map[string]interfaceInfo
|
|
|
|
phony.Block(m, func() {
|
|
|
|
interfaces = m._interfaces
|
|
|
|
})
|
|
|
|
if _, ok := interfaces[from.Zone]; ok {
|
2019-06-20 15:11:55 +01:00
|
|
|
addr.Zone = ""
|
2021-06-05 05:07:04 -05:00
|
|
|
pin := fmt.Sprintf("/?ed25519=%s", hex.EncodeToString(key))
|
|
|
|
u, err := url.Parse("tcp://" + addr.String() + pin)
|
2021-05-23 21:47:12 -05:00
|
|
|
if err != nil {
|
|
|
|
m.log.Debugln("Call from multicast failed, parse error:", addr.String(), err)
|
|
|
|
}
|
|
|
|
if err := m.core.CallPeer(u, from.Zone); err != nil {
|
2019-06-20 15:11:55 +01:00
|
|
|
m.log.Debugln("Call from multicast failed:", err)
|
|
|
|
}
|
2019-03-09 09:24:52 +00:00
|
|
|
}
|
2018-05-23 11:13:53 +01:00
|
|
|
}
|
|
|
|
}
|