]> Cypherpunks.ru repositories - govpn.git/blob - src/govpn/cmd/govpn-server/main.go
Server can listen on all network protocols at once
[govpn.git] / src / govpn / cmd / govpn-server / main.go
1 /*
2 GoVPN -- simple secure free software virtual private network daemon
3 Copyright (C) 2014-2015 Sergey Matveev <stargrave@stargrave.org>
4
5 This program is free software: you can redistribute it and/or modify
6 it under the terms of the GNU General Public License as published by
7 the Free Software Foundation, either version 3 of the License, or
8 (at your option) any later version.
9
10 This program is distributed in the hope that it will be useful,
11 but WITHOUT ANY WARRANTY; without even the implied warranty of
12 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
13 GNU General Public License for more details.
14
15 You should have received a copy of the GNU General Public License
16 along with this program.  If not, see <http://www.gnu.org/licenses/>.
17 */
18
19 // Simple secure free software virtual private network daemon.
20 package main
21
22 import (
23         "bytes"
24         "flag"
25         "io"
26         "log"
27         "net"
28         "os"
29         "os/signal"
30         "path"
31         "time"
32
33         "govpn"
34 )
35
36 var (
37         bindAddr  = flag.String("bind", "[::]:1194", "Bind to address")
38         proto     = flag.String("proto", "udp", "Protocol to use: udp, tcp or all")
39         peersPath = flag.String("peers", "peers", "Path to peers keys directory")
40         stats     = flag.String("stats", "", "Enable stats retrieving on host:port")
41         mtu       = flag.Int("mtu", 1452, "MTU for outgoing packets")
42         egdPath   = flag.String("egd", "", "Optional path to EGD socket")
43 )
44
45 type Pkt struct {
46         addr  string
47         conn  io.Writer
48         data  []byte
49         ready chan struct{}
50 }
51
52 type PeerReadyEvent struct {
53         peer  *govpn.Peer
54         iface string
55 }
56
57 type PeerState struct {
58         peer      *govpn.Peer
59         tap       *govpn.TAP
60         sink      chan []byte
61         ready     chan struct{}
62         terminate chan struct{}
63 }
64
65 func NewPeerState(peer *govpn.Peer, iface string) *PeerState {
66         tap, sink, ready, terminate, err := govpn.TAPListen(iface, peer.Timeout, peer.CPR)
67         if err != nil {
68                 log.Println("Unable to create Eth", err)
69                 return nil
70         }
71         state := PeerState{
72                 peer:      peer,
73                 tap:       tap,
74                 sink:      sink,
75                 ready:     ready,
76                 terminate: terminate,
77         }
78         return &state
79 }
80
81 type EthEvent struct {
82         peer  *govpn.Peer
83         data  []byte
84         ready chan struct{}
85 }
86
87 func main() {
88         flag.Parse()
89         timeout := time.Second * time.Duration(govpn.TimeoutDefault)
90         log.SetFlags(log.Ldate | log.Lmicroseconds | log.Lshortfile)
91         log.Println(govpn.VersionGet())
92
93         govpn.MTU = *mtu
94         govpn.PeersInit(*peersPath)
95
96         if *egdPath != "" {
97                 log.Println("Using", *egdPath, "EGD")
98                 govpn.EGDInit(*egdPath)
99         }
100
101         sink := make(chan Pkt)
102         switch *proto {
103         case "udp":
104                 startUDP(&sink)
105         case "tcp":
106                 startTCP(&sink)
107         case "all":
108                 startUDP(&sink)
109                 startTCP(&sink)
110         default:
111                 log.Fatalln("Unknown protocol specified")
112         }
113
114         termSignal := make(chan os.Signal, 1)
115         signal.Notify(termSignal, os.Interrupt, os.Kill)
116
117         hsHeartbeat := time.Tick(timeout)
118         go func() { <-hsHeartbeat }()
119
120         var state *govpn.Handshake
121         var peerState *PeerState
122         var peer *govpn.Peer
123         var exists bool
124         states := make(map[string]*govpn.Handshake)
125         peers := make(map[string]*PeerState)
126         peerReadySink := make(chan PeerReadyEvent)
127         knownPeers := govpn.KnownPeers(make(map[string]**govpn.Peer))
128         var peerReady PeerReadyEvent
129         var pkt Pkt
130         var ethEvent EthEvent
131         var peerId *govpn.PeerId
132         var peerConf *govpn.PeerConf
133         var handshakeProcessForce bool
134         ethSink := make(chan EthEvent)
135
136         log.Println("Max MTU on TAP interface:", govpn.TAPMaxMTU())
137         if *stats != "" {
138                 log.Println("Stats are going to listen on", *stats)
139                 statsPort, err := net.Listen("tcp", *stats)
140                 if err != nil {
141                         log.Fatalln("Can not listen on stats port:", err)
142                 }
143                 go govpn.StatsProcessor(statsPort, &knownPeers)
144         }
145         log.Println("Server started")
146
147 MainCycle:
148         for {
149                 select {
150                 case <-termSignal:
151                         break MainCycle
152                 case <-hsHeartbeat:
153                         now := time.Now()
154                         for addr, hs := range states {
155                                 if hs.LastPing.Add(timeout).Before(now) {
156                                         log.Println("Deleting handshake state", addr)
157                                         hs.Zero()
158                                         delete(states, addr)
159                                 }
160                         }
161                         for addr, state := range peers {
162                                 if state.peer.LastPing.Add(timeout).Before(now) {
163                                         log.Println("Deleting peer", state.peer)
164                                         delete(peers, addr)
165                                         delete(knownPeers, addr)
166                                         downPath := path.Join(
167                                                 govpn.PeersPath,
168                                                 state.peer.Id.String(),
169                                                 "down.sh",
170                                         )
171                                         go govpn.ScriptCall(downPath, state.tap.Name)
172                                         state.terminate <- struct{}{}
173                                         state.peer.Zero()
174                                 }
175                         }
176                 case peerReady = <-peerReadySink:
177                         for addr, state := range peers {
178                                 if state.tap.Name != peerReady.iface {
179                                         continue
180                                 }
181                                 delete(peers, addr)
182                                 delete(knownPeers, addr)
183                                 state.terminate <- struct{}{}
184                                 state.peer.Zero()
185                                 break
186                         }
187                         state := NewPeerState(peerReady.peer, peerReady.iface)
188                         if state == nil {
189                                 continue
190                         }
191                         peers[peerReady.peer.Addr] = state
192                         knownPeers[peerReady.peer.Addr] = &peerReady.peer
193                         states[peerReady.peer.Addr].Zero()
194                         delete(states, peerReady.peer.Addr)
195                         log.Println("Registered interface", peerReady.iface, "with peer", peer)
196                         go func(state *PeerState) {
197                                 for data := range state.sink {
198                                         ethSink <- EthEvent{
199                                                 peer:  state.peer,
200                                                 data:  data,
201                                                 ready: state.ready,
202                                         }
203                                 }
204                         }(state)
205                 case ethEvent = <-ethSink:
206                         if s, exists := peers[ethEvent.peer.Addr]; !exists || s.peer != ethEvent.peer {
207                                 continue
208                         }
209                         ethEvent.peer.EthProcess(ethEvent.data, ethEvent.ready)
210                 case pkt = <-sink:
211                         if pkt.data == nil {
212                                 pkt.ready <- struct{}{}
213                                 continue
214                         }
215                         handshakeProcessForce = false
216                 HandshakeProcess:
217                         if _, exists = peers[pkt.addr]; handshakeProcessForce || !exists {
218                                 peerId = govpn.IDsCache.Find(pkt.data)
219                                 if peerId == nil {
220                                         log.Println("Unknown identity from", pkt.addr)
221                                         pkt.ready <- struct{}{}
222                                         continue
223                                 }
224                                 peerConf = peerId.Conf()
225                                 if peerConf == nil {
226                                         log.Println("Can not get peer configuration", peerId.String())
227                                         pkt.ready <- struct{}{}
228                                         continue
229                                 }
230                                 state, exists = states[pkt.addr]
231                                 if !exists {
232                                         state = govpn.HandshakeNew(pkt.addr, pkt.conn, peerConf)
233                                         states[pkt.addr] = state
234                                 }
235                                 peer = state.Server(pkt.data)
236                                 if peer != nil {
237                                         log.Println("Peer handshake finished", peer)
238                                         if _, exists = peers[pkt.addr]; exists {
239                                                 go func() {
240                                                         peerReadySink <- PeerReadyEvent{
241                                                                 peer, peers[pkt.addr].tap.Name,
242                                                         }
243                                                 }()
244                                         } else {
245                                                 go func() {
246                                                         upPath := path.Join(govpn.PeersPath, peer.Id.String(), "up.sh")
247                                                         result, err := govpn.ScriptCall(upPath, "")
248                                                         if err != nil {
249                                                                 return
250                                                         }
251                                                         sepIndex := bytes.Index(result, []byte{'\n'})
252                                                         if sepIndex < 0 {
253                                                                 sepIndex = len(result)
254                                                         }
255                                                         ifaceName := string(result[:sepIndex])
256                                                         peerReadySink <- PeerReadyEvent{peer, ifaceName}
257                                                 }()
258                                         }
259                                 }
260                                 if !handshakeProcessForce {
261                                         pkt.ready <- struct{}{}
262                                 }
263                                 continue
264                         }
265                         peerState, exists = peers[pkt.addr]
266                         if !exists {
267                                 pkt.ready <- struct{}{}
268                                 continue
269                         }
270                         // If it fails during processing, then try to work with it
271                         // as with handshake packet
272                         if !peerState.peer.PktProcess(pkt.data, peerState.tap, pkt.ready) {
273                                 handshakeProcessForce = true
274                                 goto HandshakeProcess
275                         }
276                 }
277         }
278 }