2019-03-28 00:30:25 +00:00
|
|
|
package tuntap
|
2017-12-29 04:16:20 +00:00
|
|
|
|
|
|
|
// This manages the tun driver to send/recv packets to/from applications
|
|
|
|
|
2019-04-22 23:04:22 +00:00
|
|
|
// TODO: Crypto-key routing support
|
2019-04-22 22:12:13 +00:00
|
|
|
// TODO: Set MTU of session properly
|
2019-04-22 23:04:22 +00:00
|
|
|
// TODO: Reject packets that exceed session MTU with ICMPv6 for PMTU Discovery
|
|
|
|
// TODO: Connection timeouts (call Conn.Close() when we want to time out)
|
|
|
|
// TODO: Don't block in ifaceReader on writes that are pending searches
|
2019-04-22 22:12:13 +00:00
|
|
|
|
2018-06-12 22:50:08 +00:00
|
|
|
import (
|
2019-04-23 09:43:07 +00:00
|
|
|
"bytes"
|
2019-04-20 15:32:27 +00:00
|
|
|
"encoding/hex"
|
2018-11-10 15:46:10 +00:00
|
|
|
"errors"
|
2019-04-22 01:56:12 +00:00
|
|
|
"fmt"
|
2019-01-14 14:25:52 +00:00
|
|
|
"net"
|
2018-12-16 23:01:59 +00:00
|
|
|
"sync"
|
2018-11-10 17:32:03 +00:00
|
|
|
"time"
|
2018-07-07 11:08:52 +00:00
|
|
|
|
2019-03-28 00:30:25 +00:00
|
|
|
"github.com/gologme/log"
|
2019-04-23 09:43:07 +00:00
|
|
|
"github.com/songgao/packets/ethernet"
|
2018-06-12 22:50:08 +00:00
|
|
|
"github.com/yggdrasil-network/water"
|
2018-12-08 01:56:04 +00:00
|
|
|
|
2018-12-15 02:49:18 +00:00
|
|
|
"github.com/yggdrasil-network/yggdrasil-go/src/address"
|
2019-03-28 00:30:25 +00:00
|
|
|
"github.com/yggdrasil-network/yggdrasil-go/src/config"
|
2019-04-20 15:32:27 +00:00
|
|
|
"github.com/yggdrasil-network/yggdrasil-go/src/crypto"
|
2018-12-08 01:56:04 +00:00
|
|
|
"github.com/yggdrasil-network/yggdrasil-go/src/defaults"
|
2019-04-23 09:43:07 +00:00
|
|
|
"github.com/yggdrasil-network/yggdrasil-go/src/util"
|
2019-03-28 00:30:25 +00:00
|
|
|
"github.com/yggdrasil-network/yggdrasil-go/src/yggdrasil"
|
2018-06-12 22:50:08 +00:00
|
|
|
)
|
2017-12-29 04:16:20 +00:00
|
|
|
|
2018-05-27 22:31:34 +00:00
|
|
|
const tun_IPv6_HEADER_LENGTH = 40
|
|
|
|
const tun_ETHER_HEADER_LENGTH = 14
|
2017-12-29 04:16:20 +00:00
|
|
|
|
2019-03-29 18:18:31 +00:00
|
|
|
// TunAdapter represents a running TUN/TAP interface and extends the
|
|
|
|
// yggdrasil.Adapter type. In order to use the TUN/TAP adapter with Yggdrasil,
|
|
|
|
// you should pass this object to the yggdrasil.SetRouterAdapter() function
|
|
|
|
// before calling yggdrasil.Start().
|
2019-03-28 00:30:25 +00:00
|
|
|
type TunAdapter struct {
|
2019-04-22 19:06:39 +00:00
|
|
|
config *config.NodeState
|
|
|
|
log *log.Logger
|
|
|
|
reconfigure chan chan error
|
|
|
|
listener *yggdrasil.Listener
|
|
|
|
dialer *yggdrasil.Dialer
|
|
|
|
addr address.Address
|
|
|
|
subnet address.Subnet
|
|
|
|
icmpv6 ICMPv6
|
|
|
|
mtu int
|
|
|
|
iface *water.Interface
|
2019-04-22 22:12:13 +00:00
|
|
|
mutex sync.RWMutex // Protects the below
|
|
|
|
addrToConn map[address.Address]*yggdrasil.Conn // Managed by connReader
|
|
|
|
subnetToConn map[address.Subnet]*yggdrasil.Conn // Managed by connReader
|
2019-04-22 19:06:39 +00:00
|
|
|
isOpen bool
|
2017-12-29 04:16:20 +00:00
|
|
|
}
|
|
|
|
|
2018-06-12 21:45:53 +00:00
|
|
|
// Gets the maximum supported MTU for the platform based on the defaults in
|
2018-07-07 11:08:52 +00:00
|
|
|
// defaults.GetDefaults().
|
2018-03-03 12:30:54 +00:00
|
|
|
func getSupportedMTU(mtu int) int {
|
2018-07-07 11:08:52 +00:00
|
|
|
if mtu > defaults.GetDefaults().MaximumIfMTU {
|
|
|
|
return defaults.GetDefaults().MaximumIfMTU
|
2018-03-03 11:47:14 +00:00
|
|
|
}
|
|
|
|
return mtu
|
|
|
|
}
|
|
|
|
|
2019-03-29 18:18:31 +00:00
|
|
|
// Name returns the name of the adapter, e.g. "tun0". On Windows, this may
|
|
|
|
// return a canonical adapter name instead.
|
2019-03-28 00:30:25 +00:00
|
|
|
func (tun *TunAdapter) Name() string {
|
|
|
|
return tun.iface.Name()
|
|
|
|
}
|
|
|
|
|
2019-03-29 18:18:31 +00:00
|
|
|
// MTU gets the adapter's MTU. This can range between 1280 and 65535, although
|
|
|
|
// the maximum value is determined by your platform. The returned value will
|
|
|
|
// never exceed that of MaximumMTU().
|
2019-03-28 00:30:25 +00:00
|
|
|
func (tun *TunAdapter) MTU() int {
|
|
|
|
return getSupportedMTU(tun.mtu)
|
|
|
|
}
|
|
|
|
|
2019-03-29 18:18:31 +00:00
|
|
|
// IsTAP returns true if the adapter is a TAP adapter (Layer 2) or false if it
|
|
|
|
// is a TUN adapter (Layer 3).
|
2019-03-28 00:30:25 +00:00
|
|
|
func (tun *TunAdapter) IsTAP() bool {
|
|
|
|
return tun.iface.IsTAP()
|
|
|
|
}
|
|
|
|
|
2019-03-29 18:18:31 +00:00
|
|
|
// DefaultName gets the default TUN/TAP interface name for your platform.
|
2019-03-29 18:05:17 +00:00
|
|
|
func DefaultName() string {
|
|
|
|
return defaults.GetDefaults().DefaultIfName
|
|
|
|
}
|
|
|
|
|
2019-03-29 18:18:31 +00:00
|
|
|
// DefaultMTU gets the default TUN/TAP interface MTU for your platform. This can
|
|
|
|
// be as high as MaximumMTU(), depending on platform, but is never lower than 1280.
|
2019-03-29 18:05:17 +00:00
|
|
|
func DefaultMTU() int {
|
|
|
|
return defaults.GetDefaults().DefaultIfMTU
|
|
|
|
}
|
|
|
|
|
2019-03-29 18:18:31 +00:00
|
|
|
// DefaultIsTAP returns true if the default adapter mode for the current
|
|
|
|
// platform is TAP (Layer 2) and returns false for TUN (Layer 3).
|
2019-03-29 18:05:17 +00:00
|
|
|
func DefaultIsTAP() bool {
|
|
|
|
return defaults.GetDefaults().DefaultIfTAPMode
|
|
|
|
}
|
|
|
|
|
2019-03-29 18:18:31 +00:00
|
|
|
// MaximumMTU returns the maximum supported TUN/TAP interface MTU for your
|
|
|
|
// platform. This can be as high as 65535, depending on platform, but is never
|
|
|
|
// lower than 1280.
|
2019-03-29 18:05:17 +00:00
|
|
|
func MaximumMTU() int {
|
|
|
|
return defaults.GetDefaults().MaximumIfMTU
|
|
|
|
}
|
|
|
|
|
2019-04-20 15:32:27 +00:00
|
|
|
// Init initialises the TUN/TAP module. You must have acquired a Listener from
|
|
|
|
// the Yggdrasil core before this point and it must not be in use elsewhere.
|
|
|
|
func (tun *TunAdapter) Init(config *config.NodeState, log *log.Logger, listener *yggdrasil.Listener, dialer *yggdrasil.Dialer) {
|
|
|
|
tun.config = config
|
|
|
|
tun.log = log
|
|
|
|
tun.listener = listener
|
|
|
|
tun.dialer = dialer
|
2019-04-22 19:06:39 +00:00
|
|
|
tun.addrToConn = make(map[address.Address]*yggdrasil.Conn)
|
|
|
|
tun.subnetToConn = make(map[address.Subnet]*yggdrasil.Conn)
|
2019-04-23 09:43:07 +00:00
|
|
|
tun.icmpv6.Init(tun)
|
2017-12-29 04:16:20 +00:00
|
|
|
}
|
|
|
|
|
2019-03-29 18:18:31 +00:00
|
|
|
// Start the setup process for the TUN/TAP adapter. If successful, starts the
|
|
|
|
// read/write goroutines to handle packets on that interface.
|
2019-04-20 15:32:27 +00:00
|
|
|
func (tun *TunAdapter) Start() error {
|
|
|
|
tun.config.Mutex.Lock()
|
|
|
|
defer tun.config.Mutex.Unlock()
|
|
|
|
if tun.config == nil || tun.listener == nil || tun.dialer == nil {
|
2019-03-28 00:30:25 +00:00
|
|
|
return errors.New("No configuration available to TUN/TAP")
|
|
|
|
}
|
2019-04-20 15:32:27 +00:00
|
|
|
var boxPub crypto.BoxPubKey
|
|
|
|
boxPubHex, err := hex.DecodeString(tun.config.Current.EncryptionPublicKey)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
copy(boxPub[:], boxPubHex)
|
|
|
|
nodeID := crypto.GetNodeID(&boxPub)
|
|
|
|
tun.addr = *address.AddrForNodeID(nodeID)
|
|
|
|
tun.subnet = *address.SubnetForNodeID(nodeID)
|
|
|
|
tun.mtu = tun.config.Current.IfMTU
|
|
|
|
ifname := tun.config.Current.IfName
|
|
|
|
iftapmode := tun.config.Current.IfTAPMode
|
2019-04-22 01:56:12 +00:00
|
|
|
addr := fmt.Sprintf("%s/%d", net.IP(tun.addr[:]).String(), 8*len(address.GetPrefix())-1)
|
2019-01-02 18:05:54 +00:00
|
|
|
if ifname != "none" {
|
2019-04-22 01:56:12 +00:00
|
|
|
if err := tun.setup(ifname, iftapmode, addr, tun.mtu); err != nil {
|
2019-01-02 18:05:54 +00:00
|
|
|
return err
|
|
|
|
}
|
2018-06-02 22:29:06 +00:00
|
|
|
}
|
2019-01-02 18:05:54 +00:00
|
|
|
if ifname == "none" || ifname == "dummy" {
|
2019-04-20 15:32:27 +00:00
|
|
|
tun.log.Debugln("Not starting TUN/TAP as ifname is none or dummy")
|
2019-01-02 18:05:54 +00:00
|
|
|
return nil
|
2018-05-27 21:35:30 +00:00
|
|
|
}
|
2018-12-16 23:01:59 +00:00
|
|
|
tun.mutex.Lock()
|
|
|
|
tun.isOpen = true
|
|
|
|
tun.mutex.Unlock()
|
2018-11-11 04:39:15 +00:00
|
|
|
if iftapmode {
|
|
|
|
go func() {
|
|
|
|
for {
|
2019-03-28 00:30:25 +00:00
|
|
|
if _, ok := tun.icmpv6.peermacs[tun.addr]; ok {
|
2018-11-11 04:39:15 +00:00
|
|
|
break
|
|
|
|
}
|
2019-03-28 00:30:25 +00:00
|
|
|
request, err := tun.icmpv6.CreateNDPL2(tun.addr)
|
2018-11-11 04:39:15 +00:00
|
|
|
if err != nil {
|
|
|
|
panic(err)
|
|
|
|
}
|
|
|
|
if _, err := tun.iface.Write(request); err != nil {
|
|
|
|
panic(err)
|
|
|
|
}
|
|
|
|
time.Sleep(time.Second)
|
2018-11-10 17:32:03 +00:00
|
|
|
}
|
2018-11-11 04:39:15 +00:00
|
|
|
}()
|
|
|
|
}
|
2019-04-20 15:32:27 +00:00
|
|
|
go func() {
|
|
|
|
for {
|
|
|
|
e := <-tun.reconfigure
|
|
|
|
e <- nil
|
|
|
|
}
|
|
|
|
}()
|
|
|
|
go tun.handler()
|
|
|
|
go tun.ifaceReader()
|
2018-05-27 21:35:30 +00:00
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2019-04-20 15:32:27 +00:00
|
|
|
func (tun *TunAdapter) handler() error {
|
|
|
|
for {
|
|
|
|
// Accept the incoming connection
|
|
|
|
conn, err := tun.listener.Accept()
|
|
|
|
if err != nil {
|
2019-04-21 11:28:46 +00:00
|
|
|
tun.log.Errorln("TUN/TAP connection accept error:", err)
|
2019-04-20 15:32:27 +00:00
|
|
|
return err
|
|
|
|
}
|
|
|
|
go tun.connReader(conn)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func (tun *TunAdapter) connReader(conn *yggdrasil.Conn) error {
|
2019-04-21 11:00:31 +00:00
|
|
|
remoteNodeID := conn.RemoteAddr()
|
2019-04-22 19:06:39 +00:00
|
|
|
remoteAddr := address.AddrForNodeID(&remoteNodeID)
|
|
|
|
remoteSubnet := address.SubnetForNodeID(&remoteNodeID)
|
|
|
|
err := func() error {
|
|
|
|
tun.mutex.RLock()
|
|
|
|
defer tun.mutex.RUnlock()
|
|
|
|
if _, isIn := tun.addrToConn[*remoteAddr]; isIn {
|
|
|
|
return errors.New("duplicate connection for address " + net.IP(remoteAddr[:]).String())
|
|
|
|
}
|
|
|
|
if _, isIn := tun.subnetToConn[*remoteSubnet]; isIn {
|
|
|
|
return errors.New("duplicate connection for subnet " + net.IP(remoteSubnet[:]).String())
|
|
|
|
}
|
|
|
|
return nil
|
|
|
|
}()
|
|
|
|
if err != nil {
|
|
|
|
//return err
|
|
|
|
panic(err)
|
2019-04-21 11:00:31 +00:00
|
|
|
}
|
2019-04-22 19:06:39 +00:00
|
|
|
// Store the connection mapped to address and subnet
|
|
|
|
tun.mutex.Lock()
|
|
|
|
tun.addrToConn[*remoteAddr] = conn
|
|
|
|
tun.subnetToConn[*remoteSubnet] = conn
|
2019-04-21 11:00:31 +00:00
|
|
|
tun.mutex.Unlock()
|
2019-04-22 19:06:39 +00:00
|
|
|
// Make sure to clean those up later when the connection is closed
|
2019-04-21 11:00:31 +00:00
|
|
|
defer func() {
|
|
|
|
tun.mutex.Lock()
|
2019-04-22 19:06:39 +00:00
|
|
|
delete(tun.addrToConn, *remoteAddr)
|
|
|
|
delete(tun.subnetToConn, *remoteSubnet)
|
2019-04-21 11:00:31 +00:00
|
|
|
tun.mutex.Unlock()
|
|
|
|
}()
|
2019-04-20 15:32:27 +00:00
|
|
|
b := make([]byte, 65535)
|
|
|
|
for {
|
|
|
|
n, err := conn.Read(b)
|
|
|
|
if err != nil {
|
2019-04-22 21:38:37 +00:00
|
|
|
tun.log.Errorln(conn.String(), "TUN/TAP conn read error:", err)
|
2019-04-22 10:20:35 +00:00
|
|
|
continue
|
2019-04-20 15:32:27 +00:00
|
|
|
}
|
|
|
|
if n == 0 {
|
|
|
|
continue
|
|
|
|
}
|
2019-04-23 09:43:07 +00:00
|
|
|
var w int
|
|
|
|
if tun.iface.IsTAP() {
|
|
|
|
var dstAddr address.Address
|
|
|
|
if b[0]&0xf0 == 0x60 {
|
|
|
|
if len(b) < 40 {
|
|
|
|
//panic("Tried to sendb a packet shorter than an IPv6 header...")
|
|
|
|
util.PutBytes(b)
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
copy(dstAddr[:16], b[24:])
|
|
|
|
} else if b[0]&0xf0 == 0x40 {
|
|
|
|
if len(b) < 20 {
|
|
|
|
//panic("Tried to send a packet shorter than an IPv4 header...")
|
|
|
|
util.PutBytes(b)
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
copy(dstAddr[:4], b[16:])
|
|
|
|
} else {
|
|
|
|
return errors.New("Invalid address family")
|
|
|
|
}
|
|
|
|
sendndp := func(dstAddr address.Address) {
|
|
|
|
neigh, known := tun.icmpv6.peermacs[dstAddr]
|
|
|
|
known = known && (time.Since(neigh.lastsolicitation).Seconds() < 30)
|
|
|
|
if !known {
|
|
|
|
request, err := tun.icmpv6.CreateNDPL2(dstAddr)
|
|
|
|
if err != nil {
|
|
|
|
panic(err)
|
|
|
|
}
|
|
|
|
if _, err := tun.iface.Write(request); err != nil {
|
|
|
|
panic(err)
|
|
|
|
}
|
|
|
|
tun.icmpv6.peermacs[dstAddr] = neighbor{
|
|
|
|
lastsolicitation: time.Now(),
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
var peermac macAddress
|
|
|
|
var peerknown bool
|
|
|
|
if b[0]&0xf0 == 0x40 {
|
|
|
|
dstAddr = tun.addr
|
|
|
|
} else if b[0]&0xf0 == 0x60 {
|
|
|
|
if !bytes.Equal(tun.addr[:16], dstAddr[:16]) && !bytes.Equal(tun.subnet[:8], dstAddr[:8]) {
|
|
|
|
dstAddr = tun.addr
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if neighbor, ok := tun.icmpv6.peermacs[dstAddr]; ok && neighbor.learned {
|
|
|
|
peermac = neighbor.mac
|
|
|
|
peerknown = true
|
|
|
|
} else if neighbor, ok := tun.icmpv6.peermacs[tun.addr]; ok && neighbor.learned {
|
|
|
|
peermac = neighbor.mac
|
|
|
|
peerknown = true
|
|
|
|
sendndp(dstAddr)
|
|
|
|
} else {
|
|
|
|
sendndp(tun.addr)
|
|
|
|
}
|
|
|
|
if peerknown {
|
|
|
|
var proto ethernet.Ethertype
|
|
|
|
switch {
|
|
|
|
case b[0]&0xf0 == 0x60:
|
|
|
|
proto = ethernet.IPv6
|
|
|
|
case b[0]&0xf0 == 0x40:
|
|
|
|
proto = ethernet.IPv4
|
|
|
|
}
|
|
|
|
var frame ethernet.Frame
|
|
|
|
frame.Prepare(
|
|
|
|
peermac[:6], // Destination MAC address
|
|
|
|
tun.icmpv6.mymac[:6], // Source MAC address
|
|
|
|
ethernet.NotTagged, // VLAN tagging
|
|
|
|
proto, // Ethertype
|
|
|
|
len(b)) // Payload length
|
|
|
|
copy(frame[tun_ETHER_HEADER_LENGTH:], b[:])
|
|
|
|
w, err = tun.iface.Write(b[:n])
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
w, err = tun.iface.Write(b[:n])
|
|
|
|
}
|
2019-04-20 15:32:27 +00:00
|
|
|
if err != nil {
|
2019-04-22 14:00:19 +00:00
|
|
|
tun.log.Errorln(conn.String(), "TUN/TAP iface write error:", err)
|
2019-04-20 15:32:27 +00:00
|
|
|
continue
|
|
|
|
}
|
|
|
|
if w != n {
|
2019-04-22 14:00:19 +00:00
|
|
|
tun.log.Errorln(conn.String(), "TUN/TAP iface write mismatch:", w, "bytes written vs", n, "bytes given")
|
2019-04-20 15:32:27 +00:00
|
|
|
continue
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func (tun *TunAdapter) ifaceReader() error {
|
|
|
|
bs := make([]byte, 65535)
|
|
|
|
for {
|
2019-04-22 14:00:19 +00:00
|
|
|
// Wait for a packet to be delivered to us through the TUN/TAP adapter
|
2019-04-20 15:32:27 +00:00
|
|
|
n, err := tun.iface.Read(bs)
|
|
|
|
if err != nil {
|
2019-04-22 10:20:35 +00:00
|
|
|
continue
|
2019-04-20 15:32:27 +00:00
|
|
|
}
|
2019-04-23 09:43:07 +00:00
|
|
|
// If it's a TAP adapter, update the buffer slice so that we no longer
|
|
|
|
// include the ethernet headers
|
|
|
|
if tun.iface.IsTAP() {
|
|
|
|
bs = bs[tun_ETHER_HEADER_LENGTH:]
|
|
|
|
}
|
|
|
|
// If we detect an ICMP packet then hand it to the ICMPv6 module
|
|
|
|
if bs[6] == 58 {
|
|
|
|
if tun.iface.IsTAP() {
|
|
|
|
// Found an ICMPv6 packet
|
|
|
|
b := make([]byte, n)
|
|
|
|
copy(b, bs)
|
|
|
|
go tun.icmpv6.ParsePacket(b)
|
|
|
|
}
|
|
|
|
}
|
2019-04-22 14:00:19 +00:00
|
|
|
// From the IP header, work out what our source and destination addresses
|
|
|
|
// and node IDs are. We will need these in order to work out where to send
|
|
|
|
// the packet
|
2019-04-20 15:32:27 +00:00
|
|
|
var srcAddr address.Address
|
|
|
|
var dstAddr address.Address
|
|
|
|
var dstNodeID *crypto.NodeID
|
|
|
|
var dstNodeIDMask *crypto.NodeID
|
|
|
|
var dstSnet address.Subnet
|
|
|
|
var addrlen int
|
2019-04-22 14:00:19 +00:00
|
|
|
// Check the IP protocol - if it doesn't match then we drop the packet and
|
|
|
|
// do nothing with it
|
2019-04-20 15:32:27 +00:00
|
|
|
if bs[0]&0xf0 == 0x60 {
|
2019-04-22 14:00:19 +00:00
|
|
|
// Check if we have a fully-sized IPv6 header
|
2019-04-20 15:32:27 +00:00
|
|
|
if len(bs) < 40 {
|
2019-04-21 11:28:46 +00:00
|
|
|
continue
|
2019-04-20 15:32:27 +00:00
|
|
|
}
|
2019-04-23 09:43:07 +00:00
|
|
|
// Check the packet size
|
|
|
|
if n != 256*int(bs[4])+int(bs[5])+tun_IPv6_HEADER_LENGTH {
|
|
|
|
continue
|
|
|
|
}
|
2019-04-20 15:32:27 +00:00
|
|
|
// IPv6 address
|
|
|
|
addrlen = 16
|
|
|
|
copy(srcAddr[:addrlen], bs[8:])
|
|
|
|
copy(dstAddr[:addrlen], bs[24:])
|
|
|
|
copy(dstSnet[:addrlen/2], bs[24:])
|
|
|
|
} else if bs[0]&0xf0 == 0x40 {
|
2019-04-22 14:00:19 +00:00
|
|
|
// Check if we have a fully-sized IPv4 header
|
2019-04-20 15:32:27 +00:00
|
|
|
if len(bs) < 20 {
|
2019-04-21 11:28:46 +00:00
|
|
|
continue
|
2019-04-20 15:32:27 +00:00
|
|
|
}
|
2019-04-23 09:43:07 +00:00
|
|
|
// Check the packet size
|
|
|
|
if bs[0]&0xf0 == 0x40 && n != 256*int(bs[2])+int(bs[3]) {
|
|
|
|
continue
|
|
|
|
}
|
2019-04-20 15:32:27 +00:00
|
|
|
// IPv4 address
|
|
|
|
addrlen = 4
|
|
|
|
copy(srcAddr[:addrlen], bs[12:])
|
|
|
|
copy(dstAddr[:addrlen], bs[16:])
|
|
|
|
} else {
|
2019-04-22 14:00:19 +00:00
|
|
|
// Unknown address length or protocol, so drop the packet and ignore it
|
2019-04-20 15:32:27 +00:00
|
|
|
continue
|
|
|
|
}
|
2019-04-22 10:20:35 +00:00
|
|
|
if !dstAddr.IsValid() && !dstSnet.IsValid() {
|
|
|
|
// For now don't deal with any non-Yggdrasil ranges
|
|
|
|
continue
|
|
|
|
}
|
2019-04-22 19:06:39 +00:00
|
|
|
// Do we have an active connection for this node address?
|
2019-04-22 10:49:47 +00:00
|
|
|
tun.mutex.RLock()
|
2019-04-22 19:06:39 +00:00
|
|
|
conn, isIn := tun.addrToConn[dstAddr]
|
|
|
|
if !isIn || conn == nil {
|
|
|
|
conn, isIn = tun.subnetToConn[dstSnet]
|
|
|
|
if !isIn || conn == nil {
|
|
|
|
// Neither an address nor a subnet mapping matched, therefore populate
|
|
|
|
// the node ID and mask to commence a search
|
|
|
|
dstNodeID, dstNodeIDMask = dstAddr.GetNodeIDandMask()
|
|
|
|
}
|
|
|
|
}
|
2019-04-22 14:00:19 +00:00
|
|
|
tun.mutex.RUnlock()
|
|
|
|
// If we don't have a connection then we should open one
|
2019-04-22 19:06:39 +00:00
|
|
|
if !isIn || conn == nil {
|
|
|
|
// Check we haven't been given empty node ID, really this shouldn't ever
|
|
|
|
// happen but just to be sure...
|
|
|
|
if dstNodeID == nil || dstNodeIDMask == nil {
|
|
|
|
panic("Given empty dstNodeID and dstNodeIDMask - this shouldn't happen")
|
|
|
|
}
|
2019-04-22 14:00:19 +00:00
|
|
|
// Dial to the remote node
|
|
|
|
if c, err := tun.dialer.DialByNodeIDandMask(dstNodeID, dstNodeIDMask); err == nil {
|
2019-04-22 19:06:39 +00:00
|
|
|
// We've been given a connection so start the connection reader goroutine
|
2019-04-22 14:00:19 +00:00
|
|
|
go tun.connReader(&c)
|
|
|
|
// Then update our reference to the connection
|
|
|
|
conn, isIn = &c, true
|
|
|
|
} else {
|
|
|
|
// We weren't able to dial for some reason so there's no point in
|
|
|
|
// continuing this iteration - skip to the next one
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
}
|
2019-04-22 19:06:39 +00:00
|
|
|
// If we have a connection now, try writing to it
|
2019-04-22 22:12:13 +00:00
|
|
|
if isIn && conn != nil {
|
2019-04-22 19:06:39 +00:00
|
|
|
// If we have an open connection, either because we already had one or
|
|
|
|
// because we opened one above, try writing the packet to it
|
2019-04-22 10:22:40 +00:00
|
|
|
w, err := conn.Write(bs[:n])
|
2019-04-20 15:32:27 +00:00
|
|
|
if err != nil {
|
2019-04-22 14:00:19 +00:00
|
|
|
tun.log.Errorln(conn.String(), "TUN/TAP conn write error:", err)
|
2019-04-20 15:32:27 +00:00
|
|
|
continue
|
|
|
|
}
|
|
|
|
if w != n {
|
2019-04-22 14:00:19 +00:00
|
|
|
tun.log.Errorln(conn.String(), "TUN/TAP conn write mismatch:", w, "bytes written vs", n, "bytes given")
|
2019-04-20 15:32:27 +00:00
|
|
|
continue
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/*if !r.cryptokey.isValidSource(srcAddr, addrlen) {
|
|
|
|
// The packet had a src address that doesn't belong to us or our
|
|
|
|
// configured crypto-key routing src subnets
|
|
|
|
return
|
|
|
|
}
|
|
|
|
if !dstAddr.IsValid() && !dstSnet.IsValid() {
|
|
|
|
// The addresses didn't match valid Yggdrasil node addresses so let's see
|
|
|
|
// whether it matches a crypto-key routing range instead
|
|
|
|
if key, err := r.cryptokey.getPublicKeyForAddress(dstAddr, addrlen); err == nil {
|
|
|
|
// A public key was found, get the node ID for the search
|
|
|
|
dstPubKey = &key
|
|
|
|
dstNodeID = crypto.GetNodeID(dstPubKey)
|
|
|
|
// Do a quick check to ensure that the node ID refers to a vaild Yggdrasil
|
|
|
|
// address or subnet - this might be superfluous
|
|
|
|
addr := *address.AddrForNodeID(dstNodeID)
|
|
|
|
copy(dstAddr[:], addr[:])
|
|
|
|
copy(dstSnet[:], addr[:])
|
|
|
|
if !dstAddr.IsValid() && !dstSnet.IsValid() {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
// No public key was found in the CKR table so we've exhausted our options
|
|
|
|
return
|
|
|
|
}
|
|
|
|
}*/
|
|
|
|
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2018-06-12 21:45:53 +00:00
|
|
|
// Writes a packet to the TUN/TAP adapter. If the adapter is running in TAP
|
|
|
|
// mode then additional ethernet encapsulation is added for the benefit of the
|
|
|
|
// host operating system.
|
2019-04-20 15:32:27 +00:00
|
|
|
/*
|
2019-03-30 00:09:35 +00:00
|
|
|
func (tun *TunAdapter) write() error {
|
2018-01-04 22:37:51 +00:00
|
|
|
for {
|
2019-03-28 09:50:13 +00:00
|
|
|
select {
|
|
|
|
case reject := <-tun.Reject:
|
2019-04-20 15:32:27 +00:00
|
|
|
switch reject.Reason {
|
|
|
|
case yggdrasil.PacketTooBig:
|
|
|
|
if mtu, ok := reject.Detail.(int); ok {
|
|
|
|
// Create the Packet Too Big response
|
|
|
|
ptb := &icmp.PacketTooBig{
|
|
|
|
MTU: int(mtu),
|
|
|
|
Data: reject.Packet,
|
|
|
|
}
|
2019-03-28 09:50:13 +00:00
|
|
|
|
2019-04-20 15:32:27 +00:00
|
|
|
// Create the ICMPv6 response from it
|
|
|
|
icmpv6Buf, err := CreateICMPv6(
|
|
|
|
reject.Packet[8:24], reject.Packet[24:40],
|
|
|
|
ipv6.ICMPTypePacketTooBig, 0, ptb)
|
2019-03-28 09:50:13 +00:00
|
|
|
|
2019-04-20 15:32:27 +00:00
|
|
|
// Send the ICMPv6 response back to the TUN/TAP adapter
|
|
|
|
if err == nil {
|
|
|
|
tun.iface.Write(icmpv6Buf)
|
2018-11-10 15:46:10 +00:00
|
|
|
}
|
|
|
|
}
|
2019-04-20 15:32:27 +00:00
|
|
|
fallthrough
|
|
|
|
default:
|
|
|
|
continue
|
|
|
|
}
|
2019-03-28 09:50:13 +00:00
|
|
|
case data := <-tun.Recv:
|
|
|
|
if tun.iface == nil {
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
if tun.iface.IsTAP() {
|
2019-04-20 15:32:27 +00:00
|
|
|
var dstAddr address.Address
|
2019-03-28 09:50:13 +00:00
|
|
|
if data[0]&0xf0 == 0x60 {
|
|
|
|
if len(data) < 40 {
|
|
|
|
//panic("Tried to send a packet shorter than an IPv6 header...")
|
|
|
|
util.PutBytes(data)
|
|
|
|
continue
|
2018-11-10 17:32:03 +00:00
|
|
|
}
|
2019-04-20 15:32:27 +00:00
|
|
|
copy(dstAddr[:16], data[24:])
|
2019-03-28 09:50:13 +00:00
|
|
|
} else if data[0]&0xf0 == 0x40 {
|
|
|
|
if len(data) < 20 {
|
|
|
|
//panic("Tried to send a packet shorter than an IPv4 header...")
|
|
|
|
util.PutBytes(data)
|
|
|
|
continue
|
2018-11-10 17:32:03 +00:00
|
|
|
}
|
2019-04-20 15:32:27 +00:00
|
|
|
copy(dstAddr[:4], data[16:])
|
2019-03-28 09:50:13 +00:00
|
|
|
} else {
|
|
|
|
return errors.New("Invalid address family")
|
|
|
|
}
|
2019-04-20 15:32:27 +00:00
|
|
|
sendndp := func(dstAddr address.Address) {
|
|
|
|
neigh, known := tun.icmpv6.peermacs[dstAddr]
|
2019-03-28 09:50:13 +00:00
|
|
|
known = known && (time.Since(neigh.lastsolicitation).Seconds() < 30)
|
|
|
|
if !known {
|
2019-04-20 15:32:27 +00:00
|
|
|
request, err := tun.icmpv6.CreateNDPL2(dstAddr)
|
2019-03-28 09:50:13 +00:00
|
|
|
if err != nil {
|
|
|
|
panic(err)
|
|
|
|
}
|
|
|
|
if _, err := tun.iface.Write(request); err != nil {
|
|
|
|
panic(err)
|
|
|
|
}
|
2019-04-20 15:32:27 +00:00
|
|
|
tun.icmpv6.peermacs[dstAddr] = neighbor{
|
2019-03-28 09:50:13 +00:00
|
|
|
lastsolicitation: time.Now(),
|
|
|
|
}
|
2018-11-10 17:32:03 +00:00
|
|
|
}
|
|
|
|
}
|
2019-03-28 09:50:13 +00:00
|
|
|
var peermac macAddress
|
|
|
|
var peerknown bool
|
|
|
|
if data[0]&0xf0 == 0x40 {
|
2019-04-20 15:32:27 +00:00
|
|
|
dstAddr = tun.addr
|
2019-03-28 09:50:13 +00:00
|
|
|
} else if data[0]&0xf0 == 0x60 {
|
2019-04-20 15:32:27 +00:00
|
|
|
if !bytes.Equal(tun.addr[:16], dstAddr[:16]) && !bytes.Equal(tun.subnet[:8], dstAddr[:8]) {
|
|
|
|
dstAddr = tun.addr
|
2019-03-28 09:50:13 +00:00
|
|
|
}
|
2018-11-10 18:33:52 +00:00
|
|
|
}
|
2019-04-20 15:32:27 +00:00
|
|
|
if neighbor, ok := tun.icmpv6.peermacs[dstAddr]; ok && neighbor.learned {
|
2019-03-28 09:50:13 +00:00
|
|
|
peermac = neighbor.mac
|
|
|
|
peerknown = true
|
|
|
|
} else if neighbor, ok := tun.icmpv6.peermacs[tun.addr]; ok && neighbor.learned {
|
|
|
|
peermac = neighbor.mac
|
|
|
|
peerknown = true
|
2019-04-20 15:32:27 +00:00
|
|
|
sendndp(dstAddr)
|
2019-03-28 09:50:13 +00:00
|
|
|
} else {
|
|
|
|
sendndp(tun.addr)
|
2018-11-10 18:33:52 +00:00
|
|
|
}
|
2019-03-28 09:50:13 +00:00
|
|
|
if peerknown {
|
|
|
|
var proto ethernet.Ethertype
|
|
|
|
switch {
|
|
|
|
case data[0]&0xf0 == 0x60:
|
|
|
|
proto = ethernet.IPv6
|
|
|
|
case data[0]&0xf0 == 0x40:
|
|
|
|
proto = ethernet.IPv4
|
|
|
|
}
|
|
|
|
var frame ethernet.Frame
|
|
|
|
frame.Prepare(
|
|
|
|
peermac[:6], // Destination MAC address
|
|
|
|
tun.icmpv6.mymac[:6], // Source MAC address
|
|
|
|
ethernet.NotTagged, // VLAN tagging
|
|
|
|
proto, // Ethertype
|
|
|
|
len(data)) // Payload length
|
|
|
|
copy(frame[tun_ETHER_HEADER_LENGTH:], data[:])
|
|
|
|
if _, err := tun.iface.Write(frame); err != nil {
|
|
|
|
tun.mutex.RLock()
|
|
|
|
open := tun.isOpen
|
|
|
|
tun.mutex.RUnlock()
|
|
|
|
if !open {
|
|
|
|
return nil
|
|
|
|
} else {
|
|
|
|
panic(err)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
if _, err := tun.iface.Write(data); err != nil {
|
2018-12-16 23:01:59 +00:00
|
|
|
tun.mutex.RLock()
|
|
|
|
open := tun.isOpen
|
|
|
|
tun.mutex.RUnlock()
|
|
|
|
if !open {
|
|
|
|
return nil
|
|
|
|
} else {
|
|
|
|
panic(err)
|
|
|
|
}
|
2018-11-10 15:46:10 +00:00
|
|
|
}
|
2018-01-24 10:59:01 +00:00
|
|
|
}
|
2019-03-28 09:50:13 +00:00
|
|
|
util.PutBytes(data)
|
2018-01-04 22:37:51 +00:00
|
|
|
}
|
|
|
|
}
|
2017-12-29 04:16:20 +00:00
|
|
|
}
|
|
|
|
|
2018-06-12 21:45:53 +00:00
|
|
|
// Reads any packets that are waiting on the TUN/TAP adapter. If the adapter
|
|
|
|
// is running in TAP mode then the ethernet headers will automatically be
|
|
|
|
// processed and stripped if necessary. If an ICMPv6 packet is found, then
|
|
|
|
// the relevant helper functions in icmpv6.go are called.
|
2019-03-30 00:09:35 +00:00
|
|
|
func (tun *TunAdapter) read() error {
|
2018-01-25 17:44:56 +00:00
|
|
|
mtu := tun.mtu
|
|
|
|
if tun.iface.IsTAP() {
|
2018-05-27 22:31:34 +00:00
|
|
|
mtu += tun_ETHER_HEADER_LENGTH
|
2018-01-25 17:44:56 +00:00
|
|
|
}
|
|
|
|
buf := make([]byte, mtu)
|
2018-01-04 22:37:51 +00:00
|
|
|
for {
|
|
|
|
n, err := tun.iface.Read(buf)
|
|
|
|
if err != nil {
|
2018-12-16 23:01:59 +00:00
|
|
|
tun.mutex.RLock()
|
|
|
|
open := tun.isOpen
|
|
|
|
tun.mutex.RUnlock()
|
|
|
|
if !open {
|
|
|
|
return nil
|
|
|
|
} else {
|
|
|
|
return err
|
|
|
|
}
|
2018-01-04 22:37:51 +00:00
|
|
|
}
|
2018-01-24 10:59:01 +00:00
|
|
|
o := 0
|
|
|
|
if tun.iface.IsTAP() {
|
2018-05-27 22:31:34 +00:00
|
|
|
o = tun_ETHER_HEADER_LENGTH
|
2018-01-24 10:59:01 +00:00
|
|
|
}
|
2018-11-06 22:35:28 +00:00
|
|
|
switch {
|
|
|
|
case buf[o]&0xf0 == 0x60 && n == 256*int(buf[o+4])+int(buf[o+5])+tun_IPv6_HEADER_LENGTH+o:
|
|
|
|
case buf[o]&0xf0 == 0x40 && n == 256*int(buf[o+2])+int(buf[o+3])+o:
|
|
|
|
default:
|
|
|
|
continue
|
2018-01-04 22:37:51 +00:00
|
|
|
}
|
2018-02-12 18:19:31 +00:00
|
|
|
if buf[o+6] == 58 {
|
2018-12-26 22:45:21 +00:00
|
|
|
if tun.iface.IsTAP() {
|
|
|
|
// Found an ICMPv6 packet
|
|
|
|
b := make([]byte, n)
|
|
|
|
copy(b, buf)
|
2019-03-28 00:30:25 +00:00
|
|
|
go tun.icmpv6.ParsePacket(b)
|
2018-12-26 22:45:21 +00:00
|
|
|
}
|
2018-02-12 18:19:31 +00:00
|
|
|
}
|
2018-12-15 02:49:18 +00:00
|
|
|
packet := append(util.GetBytes(), buf[o:n]...)
|
2019-03-28 00:30:25 +00:00
|
|
|
tun.Send <- packet
|
2018-01-04 22:37:51 +00:00
|
|
|
}
|
2017-12-29 04:16:20 +00:00
|
|
|
}
|
|
|
|
|
2018-06-12 21:45:53 +00:00
|
|
|
// Closes the TUN/TAP adapter. This is only usually called when the Yggdrasil
|
|
|
|
// process stops. Typically this operation will happen quickly, but on macOS
|
2018-06-12 22:50:08 +00:00
|
|
|
// it can block until a read operation is completed.
|
2019-03-28 00:30:25 +00:00
|
|
|
func (tun *TunAdapter) Close() error {
|
2018-12-16 23:01:59 +00:00
|
|
|
tun.mutex.Lock()
|
|
|
|
tun.isOpen = false
|
|
|
|
tun.mutex.Unlock()
|
2018-02-15 22:29:13 +00:00
|
|
|
if tun.iface == nil {
|
|
|
|
return nil
|
|
|
|
}
|
2018-01-04 22:37:51 +00:00
|
|
|
return tun.iface.Close()
|
2017-12-29 04:16:20 +00:00
|
|
|
}
|
2019-04-20 15:32:27 +00:00
|
|
|
*/
|