2017-12-29 04:16:20 +00:00
|
|
|
package yggdrasil
|
|
|
|
|
|
|
|
// This part does most of the work to handle packets to/from yourself
|
|
|
|
// It also manages crypto and dht info
|
2018-01-26 23:30:51 +00:00
|
|
|
// TODO clean up old/unused code, maybe improve comments on whatever is left
|
2017-12-29 04:16:20 +00:00
|
|
|
|
|
|
|
// Send:
|
|
|
|
// Receive a packet from the tun
|
|
|
|
// Look up session (if none exists, trigger a search)
|
|
|
|
// Hand off to session (which encrypts, etc)
|
|
|
|
// Session will pass it back to router.out, which hands it off to the self peer
|
|
|
|
// The self peer triggers a lookup to find which peer to send to next
|
|
|
|
// And then passes it to that's peer's peer.out function
|
|
|
|
// The peer.out function sends it over the wire to the matching peer
|
|
|
|
|
|
|
|
// Recv:
|
|
|
|
// A packet comes in off the wire, and goes to a peer.handlePacket
|
|
|
|
// The peer does a lookup, sees no better peer than the self
|
|
|
|
// Hands it to the self peer.out, which passes it to router.in
|
|
|
|
// If it's dht/seach/etc. traffic, the router passes it to that part
|
|
|
|
// If it's an encapsulated IPv6 packet, the router looks up the session for it
|
|
|
|
// The packet is passed to the session, which decrypts it, router.recvPacket
|
|
|
|
// The router then runs some sanity checks before passing it to the tun
|
|
|
|
|
|
|
|
import "time"
|
2018-02-14 22:59:24 +00:00
|
|
|
import "golang.org/x/net/icmp"
|
|
|
|
import "golang.org/x/net/ipv6"
|
2018-01-04 22:37:51 +00:00
|
|
|
|
2017-12-29 04:16:20 +00:00
|
|
|
//import "fmt"
|
|
|
|
//import "net"
|
|
|
|
|
|
|
|
type router struct {
|
2018-01-04 22:37:51 +00:00
|
|
|
core *Core
|
|
|
|
addr address
|
|
|
|
in <-chan []byte // packets we received from the network, link to peer's "out"
|
|
|
|
out func([]byte) // packets we're sending to the network, link to peer's "in"
|
|
|
|
recv chan<- []byte // place where the tun pulls received packets from
|
|
|
|
send <-chan []byte // place where the tun puts outgoing packets
|
|
|
|
reset chan struct{} // signal that coords changed (re-init sessions/dht)
|
2018-01-21 18:55:45 +00:00
|
|
|
admin chan func() // pass a lambda for the admin socket to query stuff
|
2017-12-29 04:16:20 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
func (r *router) init(core *Core) {
|
2018-01-04 22:37:51 +00:00
|
|
|
r.core = core
|
|
|
|
r.addr = *address_addrForNodeID(&r.core.dht.nodeID)
|
2018-02-07 23:48:30 +00:00
|
|
|
in := make(chan []byte, 32) // TODO something better than this...
|
2018-01-04 22:37:51 +00:00
|
|
|
p := r.core.peers.newPeer(&r.core.boxPub, &r.core.sigPub) //, out, in)
|
2018-01-26 23:30:51 +00:00
|
|
|
p.out = func(packet []byte) {
|
|
|
|
// This is to make very sure it never blocks
|
2018-02-07 23:48:30 +00:00
|
|
|
select {
|
|
|
|
case in <- packet:
|
|
|
|
return
|
|
|
|
default:
|
|
|
|
util_putBytes(packet)
|
2018-01-26 23:30:51 +00:00
|
|
|
}
|
|
|
|
}
|
2018-01-04 22:37:51 +00:00
|
|
|
r.in = in
|
2018-06-06 22:44:10 +00:00
|
|
|
r.out = func(packet []byte) { p.handlePacket(packet) } // The caller is responsible for go-ing if it needs to not block
|
2018-02-04 00:44:28 +00:00
|
|
|
recv := make(chan []byte, 32)
|
|
|
|
send := make(chan []byte, 32)
|
2018-01-04 22:37:51 +00:00
|
|
|
r.recv = recv
|
|
|
|
r.send = send
|
|
|
|
r.core.tun.recv = recv
|
|
|
|
r.core.tun.send = send
|
|
|
|
r.reset = make(chan struct{}, 1)
|
2018-01-21 18:55:45 +00:00
|
|
|
r.admin = make(chan func())
|
2018-05-27 21:13:37 +00:00
|
|
|
// go r.mainLoop()
|
|
|
|
}
|
|
|
|
|
|
|
|
func (r *router) start() error {
|
|
|
|
r.core.log.Println("Starting router")
|
2018-01-04 22:37:51 +00:00
|
|
|
go r.mainLoop()
|
2018-05-27 21:13:37 +00:00
|
|
|
return nil
|
2017-12-29 04:16:20 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
func (r *router) mainLoop() {
|
2018-01-04 22:37:51 +00:00
|
|
|
ticker := time.NewTicker(time.Second)
|
|
|
|
defer ticker.Stop()
|
|
|
|
for {
|
|
|
|
select {
|
|
|
|
case p := <-r.in:
|
|
|
|
r.handleIn(p)
|
|
|
|
case p := <-r.send:
|
|
|
|
r.sendPacket(p)
|
|
|
|
case info := <-r.core.dht.peers:
|
2018-05-18 02:20:31 +00:00
|
|
|
r.core.dht.insertIfNew(info, false) // Insert as a normal node
|
|
|
|
r.core.dht.insertIfNew(info, true) // Insert as a peer
|
2018-01-04 22:37:51 +00:00
|
|
|
case <-r.reset:
|
|
|
|
r.core.sessions.resetInits()
|
2018-05-16 04:57:00 +00:00
|
|
|
r.core.dht.reset()
|
2018-01-04 22:37:51 +00:00
|
|
|
case <-ticker.C:
|
|
|
|
{
|
|
|
|
// Any periodic maintenance stuff goes here
|
2018-06-07 04:10:33 +00:00
|
|
|
r.core.switchTable.doMaintenance()
|
2018-01-04 22:37:51 +00:00
|
|
|
r.core.dht.doMaintenance()
|
2018-06-07 21:49:51 +00:00
|
|
|
//r.core.peers.sendSwitchMsgs() // FIXME debugging
|
2018-01-04 22:37:51 +00:00
|
|
|
util_getBytes() // To slowly drain things
|
|
|
|
}
|
2018-01-21 18:55:45 +00:00
|
|
|
case f := <-r.admin:
|
|
|
|
f()
|
2018-01-04 22:37:51 +00:00
|
|
|
}
|
|
|
|
}
|
2017-12-29 04:16:20 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
func (r *router) sendPacket(bs []byte) {
|
2018-01-04 22:37:51 +00:00
|
|
|
if len(bs) < 40 {
|
|
|
|
panic("Tried to send a packet shorter than a header...")
|
|
|
|
}
|
|
|
|
var sourceAddr address
|
|
|
|
var sourceSubnet subnet
|
|
|
|
copy(sourceAddr[:], bs[8:])
|
|
|
|
copy(sourceSubnet[:], bs[8:])
|
|
|
|
if !sourceAddr.isValid() && !sourceSubnet.isValid() {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
var dest address
|
|
|
|
copy(dest[:], bs[24:])
|
|
|
|
var snet subnet
|
|
|
|
copy(snet[:], bs[24:])
|
|
|
|
if !dest.isValid() && !snet.isValid() {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
doSearch := func(packet []byte) {
|
|
|
|
var nodeID, mask *NodeID
|
|
|
|
if dest.isValid() {
|
|
|
|
nodeID, mask = dest.getNodeIDandMask()
|
|
|
|
}
|
|
|
|
if snet.isValid() {
|
|
|
|
nodeID, mask = snet.getNodeIDandMask()
|
|
|
|
}
|
|
|
|
sinfo, isIn := r.core.searches.searches[*nodeID]
|
|
|
|
if !isIn {
|
2018-06-02 04:34:21 +00:00
|
|
|
sinfo = r.core.searches.newIterSearch(nodeID, mask)
|
2018-01-04 22:37:51 +00:00
|
|
|
}
|
|
|
|
if packet != nil {
|
|
|
|
sinfo.packet = packet
|
|
|
|
}
|
2018-06-02 04:34:21 +00:00
|
|
|
r.core.searches.continueSearch(sinfo)
|
2018-01-04 22:37:51 +00:00
|
|
|
}
|
|
|
|
var sinfo *sessionInfo
|
|
|
|
var isIn bool
|
|
|
|
if dest.isValid() {
|
|
|
|
sinfo, isIn = r.core.sessions.getByTheirAddr(&dest)
|
|
|
|
}
|
|
|
|
if snet.isValid() {
|
|
|
|
sinfo, isIn = r.core.sessions.getByTheirSubnet(&snet)
|
|
|
|
}
|
|
|
|
switch {
|
|
|
|
case !isIn || !sinfo.init:
|
|
|
|
// No or unintiialized session, so we need to search first
|
|
|
|
doSearch(bs)
|
|
|
|
case time.Since(sinfo.time) > 6*time.Second:
|
2018-04-22 20:31:30 +00:00
|
|
|
if sinfo.time.Before(sinfo.pingTime) && time.Since(sinfo.pingTime) > 6*time.Second {
|
|
|
|
// We haven't heard from the dest in a while
|
|
|
|
// We tried pinging but didn't get a response
|
|
|
|
// They may have changed coords
|
|
|
|
// Try searching to discover new coords
|
|
|
|
// Note that search spam is throttled internally
|
|
|
|
doSearch(nil)
|
|
|
|
} else {
|
|
|
|
// We haven't heard about the dest in a while
|
|
|
|
now := time.Now()
|
|
|
|
if !sinfo.time.Before(sinfo.pingTime) {
|
|
|
|
// Update pingTime to start the clock for searches (above)
|
|
|
|
sinfo.pingTime = now
|
|
|
|
}
|
|
|
|
if time.Since(sinfo.pingSend) > time.Second {
|
|
|
|
// Send at most 1 ping per second
|
|
|
|
sinfo.pingSend = now
|
|
|
|
r.core.sessions.sendPingPong(sinfo, false)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
fallthrough // Also send the packet
|
2018-01-04 22:37:51 +00:00
|
|
|
default:
|
2018-05-18 17:56:33 +00:00
|
|
|
// Drop packets if the session MTU is 0 - this means that one or other
|
|
|
|
// side probably has their TUN adapter disabled
|
|
|
|
if sinfo.getMTU() == 0 {
|
|
|
|
// Get the size of the oversized payload, up to a max of 900 bytes
|
|
|
|
window := 900
|
|
|
|
if len(bs) < window {
|
|
|
|
window = len(bs)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Create the Destination Unreachable response
|
|
|
|
ptb := &icmp.DstUnreach{
|
|
|
|
Data: bs[:window],
|
|
|
|
}
|
|
|
|
|
|
|
|
// Create the ICMPv6 response from it
|
|
|
|
icmpv6Buf, err := r.core.tun.icmpv6.create_icmpv6_tun(
|
|
|
|
bs[8:24], bs[24:40],
|
|
|
|
ipv6.ICMPTypeDestinationUnreachable, 1, ptb)
|
|
|
|
if err == nil {
|
|
|
|
r.recv <- icmpv6Buf
|
|
|
|
}
|
|
|
|
|
|
|
|
// Don't continue - drop the packet
|
|
|
|
return
|
|
|
|
}
|
2018-02-14 22:59:24 +00:00
|
|
|
// Generate an ICMPv6 Packet Too Big for packets larger than session MTU
|
2018-02-14 14:08:40 +00:00
|
|
|
if len(bs) > int(sinfo.getMTU()) {
|
2018-02-14 22:59:24 +00:00
|
|
|
// Get the size of the oversized payload, up to a max of 900 bytes
|
|
|
|
window := 900
|
|
|
|
if int(sinfo.getMTU()) < window {
|
|
|
|
window = int(sinfo.getMTU())
|
|
|
|
}
|
|
|
|
|
|
|
|
// Create the Packet Too Big response
|
|
|
|
ptb := &icmp.PacketTooBig{
|
2018-02-15 13:38:54 +00:00
|
|
|
MTU: int(sinfo.getMTU()),
|
2018-02-14 22:59:24 +00:00
|
|
|
Data: bs[:window],
|
|
|
|
}
|
|
|
|
|
|
|
|
// Create the ICMPv6 response from it
|
2018-03-10 22:31:36 +00:00
|
|
|
icmpv6Buf, err := r.core.tun.icmpv6.create_icmpv6_tun(
|
|
|
|
bs[8:24], bs[24:40],
|
|
|
|
ipv6.ICMPTypePacketTooBig, 0, ptb)
|
2018-02-14 22:59:24 +00:00
|
|
|
if err == nil {
|
|
|
|
r.recv <- icmpv6Buf
|
|
|
|
}
|
|
|
|
|
|
|
|
// Don't continue - drop the packet
|
|
|
|
return
|
2018-02-14 14:08:40 +00:00
|
|
|
}
|
2018-02-27 00:12:28 +00:00
|
|
|
sinfo.send <- bs
|
2018-01-04 22:37:51 +00:00
|
|
|
}
|
2017-12-29 04:16:20 +00:00
|
|
|
}
|
|
|
|
|
2018-01-19 23:33:04 +00:00
|
|
|
func (r *router) recvPacket(bs []byte, theirAddr *address, theirSubnet *subnet) {
|
2018-01-26 23:30:51 +00:00
|
|
|
// Note: called directly by the session worker, not the router goroutine
|
2018-01-04 22:37:51 +00:00
|
|
|
//fmt.Println("Recv packet")
|
|
|
|
if len(bs) < 24 {
|
2018-01-19 23:33:04 +00:00
|
|
|
util_putBytes(bs)
|
2018-01-04 22:37:51 +00:00
|
|
|
return
|
|
|
|
}
|
|
|
|
var source address
|
|
|
|
copy(source[:], bs[8:])
|
|
|
|
var snet subnet
|
|
|
|
copy(snet[:], bs[8:])
|
2018-01-19 23:33:04 +00:00
|
|
|
switch {
|
|
|
|
case source.isValid() && source == *theirAddr:
|
|
|
|
case snet.isValid() && snet == *theirSubnet:
|
|
|
|
default:
|
|
|
|
util_putBytes(bs)
|
2018-01-04 22:37:51 +00:00
|
|
|
return
|
|
|
|
}
|
|
|
|
//go func() { r.recv<-bs }()
|
|
|
|
r.recv <- bs
|
2017-12-29 04:16:20 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
func (r *router) handleIn(packet []byte) {
|
2018-01-04 22:37:51 +00:00
|
|
|
pType, pTypeLen := wire_decode_uint64(packet)
|
|
|
|
if pTypeLen == 0 {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
switch pType {
|
|
|
|
case wire_Traffic:
|
|
|
|
r.handleTraffic(packet)
|
|
|
|
case wire_ProtocolTraffic:
|
|
|
|
r.handleProto(packet)
|
|
|
|
default: /*panic("Should not happen in testing") ;*/
|
|
|
|
}
|
2017-12-29 04:16:20 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
func (r *router) handleTraffic(packet []byte) {
|
2018-01-04 22:37:51 +00:00
|
|
|
defer util_putBytes(packet)
|
|
|
|
p := wire_trafficPacket{}
|
|
|
|
if !p.decode(packet) {
|
|
|
|
return
|
|
|
|
}
|
2018-06-02 20:21:05 +00:00
|
|
|
sinfo, isIn := r.core.sessions.getSessionForHandle(&p.Handle)
|
2018-01-04 22:37:51 +00:00
|
|
|
if !isIn {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
//go func () { sinfo.recv<-&p }()
|
2018-02-27 00:12:28 +00:00
|
|
|
sinfo.recv <- &p
|
2017-12-29 04:16:20 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
func (r *router) handleProto(packet []byte) {
|
2018-01-04 22:37:51 +00:00
|
|
|
// First parse the packet
|
|
|
|
p := wire_protoTrafficPacket{}
|
|
|
|
if !p.decode(packet) {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
// Now try to open the payload
|
|
|
|
var sharedKey *boxSharedKey
|
|
|
|
//var theirPermPub *boxPubKey
|
2018-06-02 20:21:05 +00:00
|
|
|
if p.ToKey == r.core.boxPub {
|
2018-01-04 22:37:51 +00:00
|
|
|
// Try to open using our permanent key
|
2018-06-02 20:21:05 +00:00
|
|
|
sharedKey = r.core.sessions.getSharedKey(&r.core.boxPriv, &p.FromKey)
|
2018-01-04 22:37:51 +00:00
|
|
|
} else {
|
|
|
|
return
|
|
|
|
}
|
2018-06-02 20:21:05 +00:00
|
|
|
bs, isOK := boxOpen(sharedKey, p.Payload, &p.Nonce)
|
2018-01-04 22:37:51 +00:00
|
|
|
if !isOK {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
// Now do something with the bytes in bs...
|
|
|
|
// send dht messages to dht, sessionRefresh to sessions, data to tun...
|
|
|
|
// For data, should check that key and IP match...
|
|
|
|
bsType, bsTypeLen := wire_decode_uint64(bs)
|
|
|
|
if bsTypeLen == 0 {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
//fmt.Println("RECV bytes:", bs)
|
|
|
|
switch bsType {
|
|
|
|
case wire_SessionPing:
|
2018-06-02 20:21:05 +00:00
|
|
|
r.handlePing(bs, &p.FromKey)
|
2018-01-04 22:37:51 +00:00
|
|
|
case wire_SessionPong:
|
2018-06-02 20:21:05 +00:00
|
|
|
r.handlePong(bs, &p.FromKey)
|
2018-01-04 22:37:51 +00:00
|
|
|
case wire_DHTLookupRequest:
|
2018-06-02 20:21:05 +00:00
|
|
|
r.handleDHTReq(bs, &p.FromKey)
|
2018-01-04 22:37:51 +00:00
|
|
|
case wire_DHTLookupResponse:
|
2018-06-02 20:21:05 +00:00
|
|
|
r.handleDHTRes(bs, &p.FromKey)
|
2018-01-04 22:37:51 +00:00
|
|
|
default: /*panic("Should not happen in testing") ;*/
|
|
|
|
return
|
|
|
|
}
|
2017-12-29 04:16:20 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
func (r *router) handlePing(bs []byte, fromKey *boxPubKey) {
|
2018-01-04 22:37:51 +00:00
|
|
|
ping := sessionPing{}
|
|
|
|
if !ping.decode(bs) {
|
|
|
|
return
|
|
|
|
}
|
2018-06-02 21:19:42 +00:00
|
|
|
ping.SendPermPub = *fromKey
|
2018-01-04 22:37:51 +00:00
|
|
|
r.core.sessions.handlePing(&ping)
|
2017-12-29 04:16:20 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
func (r *router) handlePong(bs []byte, fromKey *boxPubKey) {
|
2018-01-04 22:37:51 +00:00
|
|
|
r.handlePing(bs, fromKey)
|
2017-12-29 04:16:20 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
func (r *router) handleDHTReq(bs []byte, fromKey *boxPubKey) {
|
2018-01-04 22:37:51 +00:00
|
|
|
req := dhtReq{}
|
|
|
|
if !req.decode(bs) {
|
|
|
|
return
|
|
|
|
}
|
2018-06-02 21:19:42 +00:00
|
|
|
req.Key = *fromKey
|
2018-01-04 22:37:51 +00:00
|
|
|
r.core.dht.handleReq(&req)
|
2017-12-29 04:16:20 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
func (r *router) handleDHTRes(bs []byte, fromKey *boxPubKey) {
|
2018-01-04 22:37:51 +00:00
|
|
|
res := dhtRes{}
|
|
|
|
if !res.decode(bs) {
|
|
|
|
return
|
|
|
|
}
|
2018-06-02 21:19:42 +00:00
|
|
|
res.Key = *fromKey
|
2018-01-04 22:37:51 +00:00
|
|
|
r.core.dht.handleRes(&res)
|
2017-12-29 04:16:20 +00:00
|
|
|
}
|
|
|
|
|
2018-01-21 18:55:45 +00:00
|
|
|
func (r *router) doAdmin(f func()) {
|
|
|
|
// Pass this a function that needs to be run by the router's main goroutine
|
|
|
|
// It will pass the function to the router and wait for the router to finish
|
|
|
|
done := make(chan struct{})
|
|
|
|
newF := func() {
|
|
|
|
f()
|
|
|
|
close(done)
|
|
|
|
}
|
|
|
|
r.admin <- newF
|
|
|
|
<-done
|
|
|
|
}
|