2 GoVPN -- simple secure free software virtual private network daemon
3 Copyright (C) 2014-2015 Sergey Matveev <stargrave@stargrave.org>
5 This program is free software: you can redistribute it and/or modify
6 it under the terms of the GNU General Public License as published by
7 the Free Software Foundation, either version 3 of the License, or
8 (at your option) any later version.
10 This program is distributed in the hope that it will be useful,
11 but WITHOUT ANY WARRANTY; without even the implied warranty of
12 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
13 GNU General Public License for more details.
15 You should have received a copy of the GNU General Public License
16 along with this program. If not, see <http://www.gnu.org/licenses/>.
19 // Simple secure free software virtual private network daemon.
37 bindAddr = flag.String("bind", "[::]:1194", "Bind to address")
38 peersPath = flag.String("peers", "peers", "Path to peers keys directory")
39 stats = flag.String("stats", "", "Enable stats retrieving on host:port")
40 mtu = flag.Int("mtu", 1452, "MTU for outgoing packets")
41 egdPath = flag.String("egd", "", "Optional path to EGD socket")
50 type UDPSender struct {
55 func (c UDPSender) Write(data []byte) (int, error) {
56 return c.conn.WriteToUDP(data, c.addr)
59 type PeerReadyEvent struct {
64 type PeerState struct {
69 terminate chan struct{}
72 func NewPeerState(peer *govpn.Peer, iface string) *PeerState {
73 tap, sink, ready, terminate, err := govpn.TAPListen(iface, peer.Timeout, peer.CPR)
75 log.Println("Unable to create Eth", err)
88 type EthEvent struct {
96 timeout := time.Second * time.Duration(govpn.TimeoutDefault)
98 log.SetFlags(log.Ldate | log.Lmicroseconds | log.Lshortfile)
101 govpn.PeersInit(*peersPath)
104 log.Println("Using", *egdPath, "EGD")
105 govpn.EGDInit(*egdPath)
108 bind, err := net.ResolveUDPAddr("udp", *bindAddr)
110 log.Fatalln("Can not resolve bind address:", err)
112 lconn, err := net.ListenUDP("udp", bind)
114 log.Fatalln("Can listen on UDP:", err)
117 sink := make(chan Pkt)
118 ready := make(chan struct{})
120 buf := make([]byte, govpn.MTU)
122 var raddr *net.UDPAddr
126 lconn.SetReadDeadline(time.Now().Add(time.Second))
127 n, raddr, err = lconn.ReadFromUDP(buf)
129 // This is needed for ticking the timeouts counter outside
133 sink <- Pkt{raddr.String(), UDPSender{lconn, raddr}, buf[:n]}
138 termSignal := make(chan os.Signal, 1)
139 signal.Notify(termSignal, os.Interrupt, os.Kill)
141 hsHeartbeat := time.Tick(timeout)
142 go func() { <-hsHeartbeat }()
144 var state *govpn.Handshake
145 var peerState *PeerState
148 states := make(map[string]*govpn.Handshake)
149 peers := make(map[string]*PeerState)
150 peerReadySink := make(chan PeerReadyEvent)
151 knownPeers := govpn.KnownPeers(make(map[string]**govpn.Peer))
152 var peerReady PeerReadyEvent
154 var ethEvent EthEvent
155 var peerId *govpn.PeerId
156 var peerConf *govpn.PeerConf
157 var handshakeProcessForce bool
158 ethSink := make(chan EthEvent)
160 log.Println(govpn.VersionGet())
161 log.Println("Max MTU on TAP interface:", govpn.TAPMaxMTU())
163 log.Println("Stats are going to listen on", *stats)
164 statsPort, err := net.Listen("tcp", *stats)
166 log.Fatalln("Can not listen on stats port:", err)
168 go govpn.StatsProcessor(statsPort, &knownPeers)
170 log.Println("Server started")
179 for addr, hs := range states {
180 if hs.LastPing.Add(timeout).Before(now) {
181 log.Println("Deleting handshake state", addr)
186 for addr, state := range peers {
187 if state.peer.LastPing.Add(timeout).Before(now) {
188 log.Println("Deleting peer", state.peer)
190 delete(knownPeers, addr)
191 downPath := path.Join(
193 state.peer.Id.String(),
196 go govpn.ScriptCall(downPath, state.tap.Name)
197 state.terminate <- struct{}{}
201 case peerReady = <-peerReadySink:
202 for addr, state := range peers {
203 if state.tap.Name != peerReady.iface {
207 delete(knownPeers, addr)
208 state.terminate <- struct{}{}
212 state := NewPeerState(peerReady.peer, peerReady.iface)
216 peers[peerReady.peer.Addr] = state
217 knownPeers[peerReady.peer.Addr] = &peerReady.peer
218 states[peerReady.peer.Addr].Zero()
219 delete(states, peerReady.peer.Addr)
220 log.Println("Registered interface", peerReady.iface, "with peer", peer)
221 go func(state *PeerState) {
222 for data := range state.sink {
230 case ethEvent = <-ethSink:
231 if s, exists := peers[ethEvent.peer.Addr]; !exists || s.peer != ethEvent.peer {
234 ethEvent.peer.EthProcess(ethEvent.data, ethEvent.ready)
240 handshakeProcessForce = false
242 if _, exists = peers[pkt.addr]; handshakeProcessForce || !exists {
243 peerId = govpn.IDsCache.Find(pkt.data)
245 log.Println("Unknown identity from", pkt.addr)
249 peerConf = peerId.Conf()
251 log.Println("Can not get peer configuration", peerId.String())
255 state, exists = states[pkt.addr]
257 state = govpn.HandshakeNew(pkt.addr, pkt.conn, peerConf)
258 states[pkt.addr] = state
260 peer = state.Server(pkt.data)
262 log.Println("Peer handshake finished", peer)
263 if _, exists = peers[pkt.addr]; exists {
265 peerReadySink <- PeerReadyEvent{
266 peer, peers[pkt.addr].tap.Name,
271 upPath := path.Join(govpn.PeersPath, peer.Id.String(), "up.sh")
272 result, err := govpn.ScriptCall(upPath, "")
276 sepIndex := bytes.Index(result, []byte{'\n'})
278 sepIndex = len(result)
280 ifaceName := string(result[:sepIndex])
281 peerReadySink <- PeerReadyEvent{peer, ifaceName}
285 if !handshakeProcessForce {
290 peerState, exists = peers[pkt.addr]
295 // If it fails during processing, then try to work with it
296 // as with handshake packet
297 if !peerState.peer.PktProcess(pkt.data, peerState.tap, ready) {
298 handshakeProcessForce = true
299 goto HandshakeProcess