]> Cypherpunks.ru repositories - govpn.git/blob - src/cypherpunks.ru/govpn/client/tcp.go
Split too long lines
[govpn.git] / src / cypherpunks.ru / govpn / client / tcp.go
1 /*
2 GoVPN -- simple secure free software virtual private network daemon
3 Copyright (C) 2014-2017 Sergey Matveev <stargrave@stargrave.org>
4
5 This program is free software: you can redistribute it and/or modify
6 it under the terms of the GNU General Public License as published by
7 the Free Software Foundation, either version 3 of the License, or
8 (at your option) any later version.
9
10 This program is distributed in the hope that it will be useful,
11 but WITHOUT ANY WARRANTY; without even the implied warranty of
12 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
13 GNU General Public License for more details.
14
15 You should have received a copy of the GNU General Public License
16 along with this program.  If not, see <http://www.gnu.org/licenses/>.
17 */
18
19 package client
20
21 import (
22         "bytes"
23         "fmt"
24         "net"
25         "os"
26         "sync/atomic"
27         "time"
28
29         "github.com/Sirupsen/logrus"
30         "github.com/pkg/errors"
31
32         "cypherpunks.ru/govpn"
33 )
34
35 func (c *Client) startTCP() {
36         var conn net.Conn
37         l := c.logger.WithField("func", logFuncPrefix+"Client.startTCP")
38         // initialize using a file descriptor
39         if c.config.FileDescriptor > 0 {
40                 l.WithField("fd", c.config.FileDescriptor).Debug("Connect using file descriptor")
41                 var err error
42                 conn, err = net.FileConn(os.NewFile(
43                         uintptr(c.config.FileDescriptor),
44                         fmt.Sprintf("fd[%s]", c.config.RemoteAddress),
45                 ))
46                 if err != nil {
47                         c.Error <- errors.Wrapf(err, "net.FileConn fd:%d", c.config.FileDescriptor)
48                         return
49                 }
50         } else {
51                 // TODO move resolution into the loop, as the name might change over time
52                 l.WithField("fd", c.config.RemoteAddress).Debug("Connect using TCP")
53                 remote, err := net.ResolveTCPAddr("tcp", c.config.RemoteAddress)
54                 if err != nil {
55                         c.Error <- errors.Wrapf(err, "net.ResolveTCPAdd %s", c.config.RemoteAddress)
56                         return
57                 }
58                 l.WithField("remote", remote.String()).Debug("dial")
59                 conn, err = net.DialTCP("tcp", nil, remote)
60                 if err != nil {
61                         c.Error <- errors.Wrapf(err, "net.DialTCP: %s", remote.String())
62                         return
63                 }
64         }
65         l.WithFields(c.config.LogFields()).Info("Connected")
66         c.handleTCP(conn)
67 }
68
69 func (c *Client) handleTCP(conn net.Conn) {
70         hs, err := govpn.HandshakeStart(c.config.RemoteAddress, conn, c.config.Peer)
71         if err != nil {
72                 govpn.CloseLog(conn, c.logger, c.LogFields())
73                 c.Error <- errors.Wrap(err, "govpn.HandshakeStart")
74                 return
75         }
76         buf := make([]byte, 2*(govpn.EnclessEnlargeSize+c.config.Peer.MTU)+c.config.Peer.MTU)
77
78         var n int
79         var prev int
80         var peer *govpn.Peer
81         var deadLine time.Time
82         var terminator chan struct{}
83         fields := logrus.Fields{"func": logFuncPrefix + "Client.handleTCP"}
84 HandshakeCycle:
85         for {
86                 select {
87                 case <-c.termination:
88                         break HandshakeCycle
89                 default:
90                 }
91                 if prev == len(buf) {
92                         c.logger.WithFields(fields).WithFields(
93                                 c.LogFields(),
94                         ).Debug("Packet timeouted")
95                         c.timeouted <- struct{}{}
96                         break HandshakeCycle
97                 }
98
99                 deadLine = time.Now().Add(c.config.Peer.Timeout)
100                 if err = conn.SetReadDeadline(deadLine); err != nil {
101                         c.Error <- errors.Wrapf(err, "conn.SetReadDeadline %s", deadLine.String())
102                         break HandshakeCycle
103                 }
104                 n, err = conn.Read(buf[prev:])
105                 if err != nil {
106                         c.logger.WithFields(fields).WithFields(
107                                 c.LogFields(),
108                         ).Debug("Packet timeouted")
109                         c.timeouted <- struct{}{}
110                         break HandshakeCycle
111                 }
112
113                 prev += n
114                 _, err = c.idsCache.Find(buf[:prev])
115                 if err != nil {
116                         c.logger.WithFields(fields).WithFields(
117                                 c.LogFields(),
118                         ).WithError(err).Debug("Can't find peer in ids")
119                         continue
120                 }
121                 peer, err = hs.Client(buf[:prev])
122                 prev = 0
123                 if err != nil {
124                         c.logger.WithFields(fields).WithError(err).WithFields(
125                                 c.LogFields(),
126                         ).Debug("Can't create new peer")
127                         continue
128                 }
129                 c.logger.WithFields(fields).WithFields(c.LogFields()).Info("Handshake completed")
130                 c.knownPeers = govpn.KnownPeers(map[string]**govpn.Peer{c.config.RemoteAddress: &peer})
131                 if c.firstUpCall {
132                         if err = c.postUpAction(); err != nil {
133                                 c.Error <- errors.Wrap(err, "c.postUpAction")
134                                 break HandshakeCycle
135                         }
136                         c.firstUpCall = false
137                 }
138                 hs.Zero()
139                 terminator = make(chan struct{})
140                 go govpn.PeerTapProcessor(peer, c.tap, terminator)
141                 break HandshakeCycle
142         }
143         if hs != nil {
144                 hs.Zero()
145         }
146         if peer == nil {
147                 return
148         }
149
150         prev = 0
151         var i int
152 TransportCycle:
153         for {
154                 select {
155                 case <-c.termination:
156                         break TransportCycle
157                 default:
158                 }
159                 if prev == len(buf) {
160                         c.logger.WithFields(c.LogFields()).Debug("Packet timeouted")
161                         c.timeouted <- struct{}{}
162                         break TransportCycle
163                 }
164                 if err = conn.SetReadDeadline(time.Now().Add(c.config.Peer.Timeout)); err != nil {
165                         c.Error <- errors.Wrap(err, "conn.SetReadDeadline")
166                         break TransportCycle
167                 }
168                 n, err = conn.Read(buf[prev:])
169                 if err != nil {
170                         c.logger.WithError(err).WithFields(c.LogFields()).Debug("Connection timeouted")
171                         c.timeouted <- struct{}{}
172                         break TransportCycle
173                 }
174                 prev += n
175         CheckMore:
176                 if prev < govpn.MinPktLength {
177                         continue
178                 }
179                 i = bytes.Index(buf[:prev], peer.NonceExpect)
180                 if i == -1 {
181                         continue
182                 }
183                 if !peer.PktProcess(buf[:i+govpn.NonceSize], c.tap, false) {
184                         c.logger.WithFields(c.LogFields()).Debug("Packet unauthenticated")
185                         c.timeouted <- struct{}{}
186                         break TransportCycle
187                 }
188                 if atomic.LoadUint64(&peer.BytesIn)+atomic.LoadUint64(&peer.BytesOut) > govpn.MaxBytesPerKey {
189                         c.logger.WithFields(c.LogFields()).Debug("Rehandshake required")
190                         c.rehandshaking <- struct{}{}
191                         break TransportCycle
192                 }
193                 copy(buf, buf[i+govpn.NonceSize:prev])
194                 prev = prev - i - govpn.NonceSize
195                 goto CheckMore
196         }
197         if terminator != nil {
198                 terminator <- struct{}{}
199         }
200         peer.Zero()
201         if err = conn.Close(); err != nil {
202                 c.Error <- errors.Wrap(err, "conn.Close")
203         }
204         if err = c.tap.Close(); err != nil {
205                 c.Error <- errors.Wrap(err, logFuncPrefix+"Client.tap.Close")
206         }
207 }