]> Cypherpunks.ru repositories - govpn.git/blob - src/govpn/cmd/govpn-server/main.go
Ability to use EGD-compatible PRNGs
[govpn.git] / src / govpn / cmd / govpn-server / main.go
1 /*
2 GoVPN -- simple secure free software virtual private network daemon
3 Copyright (C) 2014-2015 Sergey Matveev <stargrave@stargrave.org>
4
5 This program is free software: you can redistribute it and/or modify
6 it under the terms of the GNU General Public License as published by
7 the Free Software Foundation, either version 3 of the License, or
8 (at your option) any later version.
9
10 This program is distributed in the hope that it will be useful,
11 but WITHOUT ANY WARRANTY; without even the implied warranty of
12 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
13 GNU General Public License for more details.
14
15 You should have received a copy of the GNU General Public License
16 along with this program.  If not, see <http://www.gnu.org/licenses/>.
17 */
18
19 // Simple secure free software virtual private network daemon.
20 package main
21
22 import (
23         "bytes"
24         "flag"
25         "log"
26         "net"
27         "os"
28         "os/signal"
29         "path"
30         "time"
31
32         "govpn"
33 )
34
35 var (
36         bindAddr  = flag.String("bind", "[::]:1194", "Bind to address")
37         peersPath = flag.String("peers", "peers", "Path to peers keys directory")
38         stats     = flag.String("stats", "", "Enable stats retrieving on host:port")
39         mtu       = flag.Int("mtu", 1452, "MTU for outgoing packets")
40         egdPath   = flag.String("egd", "", "Optional path to EGD socket")
41 )
42
43 type PeerReadyEvent struct {
44         peer  *govpn.Peer
45         iface string
46 }
47
48 type PeerState struct {
49         peer      *govpn.Peer
50         tap       *govpn.TAP
51         sink      chan []byte
52         ready     chan struct{}
53         terminate chan struct{}
54 }
55
56 func NewPeerState(peer *govpn.Peer, iface string) *PeerState {
57         tap, sink, ready, terminate, err := govpn.TAPListen(iface, peer.Timeout, peer.CPR)
58         if err != nil {
59                 log.Println("Unable to create Eth", err)
60                 return nil
61         }
62         state := PeerState{
63                 peer:      peer,
64                 tap:       tap,
65                 sink:      sink,
66                 ready:     ready,
67                 terminate: terminate,
68         }
69         return &state
70 }
71
72 type EthEvent struct {
73         peer  *govpn.Peer
74         data  []byte
75         ready chan struct{}
76 }
77
78 func main() {
79         flag.Parse()
80         timeout := time.Second * time.Duration(govpn.TimeoutDefault)
81         var err error
82         log.SetFlags(log.Ldate | log.Lmicroseconds | log.Lshortfile)
83
84         govpn.MTU = *mtu
85         govpn.PeersInit(*peersPath)
86
87         if *egdPath != "" {
88                 log.Println("Using", *egdPath, "EGD")
89                 govpn.EGDInit(*egdPath)
90         }
91
92         bind, err := net.ResolveUDPAddr("udp", *bindAddr)
93         if err != nil {
94                 log.Fatalln("Can not resolve bind address:", err)
95         }
96         conn, err := net.ListenUDP("udp", bind)
97         if err != nil {
98                 log.Fatalln("Can listen on UDP:", err)
99         }
100         udpSink, udpBuf, udpReady := govpn.ConnListen(conn)
101
102         termSignal := make(chan os.Signal, 1)
103         signal.Notify(termSignal, os.Interrupt, os.Kill)
104
105         hsHeartbeat := time.Tick(timeout)
106         go func() { <-hsHeartbeat }()
107
108         var addr string
109         var state *govpn.Handshake
110         var peerState *PeerState
111         var peer *govpn.Peer
112         var exists bool
113         states := make(map[string]*govpn.Handshake)
114         peers := make(map[string]*PeerState)
115         peerReadySink := make(chan PeerReadyEvent)
116         knownPeers := govpn.KnownPeers(make(map[string]**govpn.Peer))
117         var peerReady PeerReadyEvent
118         var udpPkt govpn.UDPPkt
119         var udpPktData []byte
120         var ethEvent EthEvent
121         var peerId *govpn.PeerId
122         var peerConf *govpn.PeerConf
123         var handshakeProcessForce bool
124         ethSink := make(chan EthEvent)
125
126         log.Println(govpn.VersionGet())
127         log.Println("Max MTU on TAP interface:", govpn.TAPMaxMTU())
128         if *stats != "" {
129                 log.Println("Stats are going to listen on", *stats)
130                 statsPort, err := net.Listen("tcp", *stats)
131                 if err != nil {
132                         log.Fatalln("Can not listen on stats port:", err)
133                 }
134                 go govpn.StatsProcessor(statsPort, &knownPeers)
135         }
136         log.Println("Server started")
137
138 MainCycle:
139         for {
140                 select {
141                 case <-termSignal:
142                         break MainCycle
143                 case <-hsHeartbeat:
144                         now := time.Now()
145                         for addr, hs := range states {
146                                 if hs.LastPing.Add(timeout).Before(now) {
147                                         log.Println("Deleting handshake state", addr)
148                                         hs.Zero()
149                                         delete(states, addr)
150                                 }
151                         }
152                         for addr, state := range peers {
153                                 if state.peer.LastPing.Add(timeout).Before(now) {
154                                         log.Println("Deleting peer", state.peer)
155                                         delete(peers, addr)
156                                         delete(knownPeers, addr)
157                                         downPath := path.Join(
158                                                 govpn.PeersPath,
159                                                 state.peer.Id.String(),
160                                                 "down.sh",
161                                         )
162                                         go govpn.ScriptCall(downPath, state.tap.Name)
163                                         state.terminate <- struct{}{}
164                                         state.peer.Zero()
165                                 }
166                         }
167                 case peerReady = <-peerReadySink:
168                         for addr, state := range peers {
169                                 if state.tap.Name != peerReady.iface {
170                                         continue
171                                 }
172                                 delete(peers, addr)
173                                 delete(knownPeers, addr)
174                                 state.terminate <- struct{}{}
175                                 state.peer.Zero()
176                                 break
177                         }
178                         addr = peerReady.peer.Addr.String()
179                         state := NewPeerState(peerReady.peer, peerReady.iface)
180                         if state == nil {
181                                 continue
182                         }
183                         peers[addr] = state
184                         knownPeers[addr] = &peerReady.peer
185                         states[addr].Zero()
186                         delete(states, addr)
187                         log.Println("Registered interface", peerReady.iface, "with peer", peer)
188                         go func(state *PeerState) {
189                                 for data := range state.sink {
190                                         ethSink <- EthEvent{
191                                                 peer:  state.peer,
192                                                 data:  data,
193                                                 ready: state.ready,
194                                         }
195                                 }
196                         }(state)
197                 case ethEvent = <-ethSink:
198                         if s, exists := peers[ethEvent.peer.Addr.String()]; !exists || s.peer != ethEvent.peer {
199                                 continue
200                         }
201                         ethEvent.peer.EthProcess(ethEvent.data, conn, ethEvent.ready)
202                 case udpPkt = <-udpSink:
203                         if udpPkt.Addr == nil {
204                                 udpReady <- struct{}{}
205                                 continue
206                         }
207                         udpPktData = udpBuf[:udpPkt.Size]
208                         addr = udpPkt.Addr.String()
209                         handshakeProcessForce = false
210                 HandshakeProcess:
211                         if _, exists = peers[addr]; handshakeProcessForce || !exists {
212                                 peerId = govpn.IDsCache.Find(udpPktData)
213                                 if peerId == nil {
214                                         log.Println("Unknown identity from", addr)
215                                         udpReady <- struct{}{}
216                                         continue
217                                 }
218                                 peerConf = peerId.Conf()
219                                 if peerConf == nil {
220                                         log.Println("Can not get peer configuration", peerId.String())
221                                         udpReady <- struct{}{}
222                                         continue
223                                 }
224                                 state, exists = states[addr]
225                                 if !exists {
226                                         state = govpn.HandshakeNew(udpPkt.Addr, peerConf)
227                                         states[addr] = state
228                                 }
229                                 peer = state.Server(conn, udpPktData)
230                                 if peer != nil {
231                                         log.Println("Peer handshake finished", peer)
232                                         if _, exists = peers[addr]; exists {
233                                                 go func() {
234                                                         peerReadySink <- PeerReadyEvent{peer, peers[addr].tap.Name}
235                                                 }()
236                                         } else {
237                                                 go func() {
238                                                         upPath := path.Join(govpn.PeersPath, peer.Id.String(), "up.sh")
239                                                         result, err := govpn.ScriptCall(upPath, "")
240                                                         if err != nil {
241                                                                 return
242                                                         }
243                                                         sepIndex := bytes.Index(result, []byte{'\n'})
244                                                         if sepIndex < 0 {
245                                                                 sepIndex = len(result)
246                                                         }
247                                                         ifaceName := string(result[:sepIndex])
248                                                         peerReadySink <- PeerReadyEvent{peer, ifaceName}
249                                                 }()
250                                         }
251                                 }
252                                 if !handshakeProcessForce {
253                                         udpReady <- struct{}{}
254                                 }
255                                 continue
256                         }
257                         peerState, exists = peers[addr]
258                         if !exists {
259                                 udpReady <- struct{}{}
260                                 continue
261                         }
262                         // If it fails during processing, then try to work with it
263                         // as with handshake packet
264                         if !peerState.peer.UDPProcess(udpPktData, peerState.tap, udpReady) {
265                                 handshakeProcessForce = true
266                                 goto HandshakeProcess
267                         }
268                 }
269         }
270 }