2 GoVPN -- simple secure free software virtual private network daemon
3 Copyright (C) 2014-2016 Sergey Matveev <stargrave@stargrave.org>
5 This program is free software: you can redistribute it and/or modify
6 it under the terms of the GNU General Public License as published by
7 the Free Software Foundation, either version 3 of the License, or
8 (at your option) any later version.
10 This program is distributed in the hope that it will be useful,
11 but WITHOUT ANY WARRANTY; without even the implied warranty of
12 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
13 GNU General Public License for more details.
15 You should have received a copy of the GNU General Public License
16 along with this program. If not, see <http://www.gnu.org/licenses/>.
19 // Simple secure, DPI/censorship-resistant free software VPN daemon.
31 "cypherpunks.ru/govpn"
35 bindAddr = flag.String("bind", "[::]:1194", "Bind to address")
36 proto = flag.String("proto", "udp", "Protocol to use: udp, tcp or all")
37 confPath = flag.String("conf", "peers.yaml", "Path to configuration YAML")
38 stats = flag.String("stats", "", "Enable stats retrieving on host:port")
39 proxy = flag.String("proxy", "", "Enable HTTP proxy on host:port")
40 egdPath = flag.String("egd", "", "Optional path to EGD socket")
41 syslog = flag.Bool("syslog", false, "Enable logging to syslog")
42 version = flag.Bool("version", false, "Print version information")
43 warranty = flag.Bool("warranty", false, "Print warranty information")
49 fmt.Println(govpn.Warranty)
53 fmt.Println(govpn.VersionGet())
56 timeout := time.Second * time.Duration(govpn.TimeoutDefault)
57 log.SetFlags(log.Ldate | log.Lmicroseconds | log.Lshortfile)
58 log.Println(govpn.VersionGet())
61 knownPeers = govpn.KnownPeers(make(map[string]**govpn.Peer))
64 log.Println("Using", *egdPath, "EGD")
65 govpn.EGDInit(*egdPath)
81 log.Fatalln("Unknown protocol specified")
84 termSignal := make(chan os.Signal, 1)
85 signal.Notify(termSignal, os.Interrupt, os.Kill)
87 hsHeartbeat := time.Tick(timeout)
88 go func() { <-hsHeartbeat }()
91 log.Println("Stats are going to listen on", *stats)
92 statsPort, err := net.Listen("tcp", *stats)
94 log.Fatalln("Can not listen on stats port:", err)
96 go govpn.StatsProcessor(statsPort, &knownPeers)
101 govpn.BothPrintf(`[started bind="%s"]`, *bindAddr)
103 var needsDeletion bool
108 govpn.BothPrintf(`[terminating bind="%s"]`, *bindAddr)
109 for _, ps := range peers {
111 confs[*ps.peer.Id].Down,
120 for addr, hs := range handshakes {
121 if hs.LastPing.Add(timeout).Before(now) {
122 govpn.Printf(`[handshake-delete bind="%s" addr="%s"]`, *bindAddr, addr)
124 delete(handshakes, addr)
130 for addr, ps := range peers {
132 needsDeletion = ps.peer.LastPing.Add(timeout).Before(now)
133 ps.peer.BusyR.Unlock()
135 govpn.Printf(`[peer-delete bind="%s" peer="%s"]`, *bindAddr, ps.peer)
137 delete(knownPeers, addr)
138 delete(peersById, *ps.peer.Id)
140 confs[*ps.peer.Id].Down,
144 ps.terminator <- struct{}{}
149 peersByIdLock.Unlock()