github.com/tailscale/wireguard-go@v0.0.20201119-0.20210522003738-46b531feb08a/device/receive.go (about) 1 /* SPDX-License-Identifier: MIT 2 * 3 * Copyright (C) 2017-2021 WireGuard LLC. All Rights Reserved. 4 */ 5 6 package device 7 8 import ( 9 "bytes" 10 "encoding/binary" 11 "errors" 12 "net" 13 "sync" 14 "sync/atomic" 15 "time" 16 17 "github.com/tailscale/wireguard-go/conn" 18 "golang.org/x/crypto/chacha20poly1305" 19 "golang.org/x/net/ipv4" 20 "golang.org/x/net/ipv6" 21 ) 22 23 type QueueHandshakeElement struct { 24 msgType uint32 25 packet []byte 26 endpoint conn.Endpoint 27 buffer *[MaxMessageSize]byte 28 } 29 30 type QueueInboundElement struct { 31 sync.Mutex 32 buffer *[MaxMessageSize]byte 33 packet []byte 34 counter uint64 35 keypair *Keypair 36 endpoint conn.Endpoint 37 } 38 39 // clearPointers clears elem fields that contain pointers. 40 // This makes the garbage collector's life easier and 41 // avoids accidentally keeping other objects around unnecessarily. 42 // It also reduces the possible collateral damage from use-after-free bugs. 43 func (elem *QueueInboundElement) clearPointers() { 44 elem.buffer = nil 45 elem.packet = nil 46 elem.keypair = nil 47 elem.endpoint = nil 48 } 49 50 /* Called when a new authenticated message has been received 51 * 52 * NOTE: Not thread safe, but called by sequential receiver! 53 */ 54 func (peer *Peer) keepKeyFreshReceiving() { 55 if peer.timers.sentLastMinuteHandshake.Get() { 56 return 57 } 58 keypair := peer.keypairs.Current() 59 if keypair != nil && keypair.isInitiator && time.Since(keypair.created) > (RejectAfterTime-KeepaliveTimeout-RekeyTimeout) { 60 peer.timers.sentLastMinuteHandshake.Set(true) 61 peer.SendHandshakeInitiation(false) 62 } 63 } 64 65 /* Receives incoming datagrams for the device 66 * 67 * Every time the bind is updated a new routine is started for 68 * IPv4 and IPv6 (separately) 69 */ 70 func (device *Device) RoutineReceiveIncoming(recv conn.ReceiveFunc) { 71 recvName := recv.PrettyName() 72 defer func() { 73 device.log.Verbosef("Routine: receive incoming %s - stopped", recvName) 74 device.queue.decryption.wg.Done() 75 device.queue.handshake.wg.Done() 76 device.net.stopping.Done() 77 }() 78 79 device.log.Verbosef("Routine: receive incoming %s - started", recvName) 80 81 // receive datagrams until conn is closed 82 83 buffer := device.GetMessageBuffer() 84 85 var ( 86 err error 87 size int 88 endpoint conn.Endpoint 89 deathSpiral int 90 ) 91 92 for { 93 size, endpoint, err = recv(buffer[:]) 94 95 if err != nil { 96 device.PutMessageBuffer(buffer) 97 if errors.Is(err, net.ErrClosed) { 98 return 99 } 100 device.log.Verbosef("Failed to receive %s packet: %v", recvName, err) 101 if neterr, ok := err.(net.Error); ok && !neterr.Temporary() { 102 return 103 } 104 if deathSpiral < 10 { 105 deathSpiral++ 106 time.Sleep(time.Second / 3) 107 buffer = device.GetMessageBuffer() 108 continue 109 } 110 return 111 } 112 deathSpiral = 0 113 114 if size < MinMessageSize { 115 continue 116 } 117 118 // check size of packet 119 120 packet := buffer[:size] 121 msgType := binary.LittleEndian.Uint32(packet[:4]) 122 123 var okay bool 124 125 switch msgType { 126 127 // check if transport 128 129 case MessageTransportType: 130 131 // check size 132 133 if len(packet) < MessageTransportSize { 134 continue 135 } 136 137 // lookup key pair 138 139 receiver := binary.LittleEndian.Uint32( 140 packet[MessageTransportOffsetReceiver:MessageTransportOffsetCounter], 141 ) 142 value := device.indexTable.Lookup(receiver) 143 keypair := value.keypair 144 if keypair == nil { 145 continue 146 } 147 148 // check keypair expiry 149 150 if keypair.created.Add(RejectAfterTime).Before(time.Now()) { 151 continue 152 } 153 154 // create work element 155 peer := value.peer 156 elem := device.GetInboundElement() 157 elem.packet = packet 158 elem.buffer = buffer 159 elem.keypair = keypair 160 elem.endpoint = endpoint 161 elem.counter = 0 162 elem.Mutex = sync.Mutex{} 163 elem.Lock() 164 165 // add to decryption queues 166 if peer.isRunning.Get() { 167 peer.queue.inbound.c <- elem 168 device.queue.decryption.c <- elem 169 buffer = device.GetMessageBuffer() 170 } else { 171 device.PutInboundElement(elem) 172 } 173 continue 174 175 // otherwise it is a fixed size & handshake related packet 176 177 case MessageInitiationType: 178 okay = len(packet) == MessageInitiationSize 179 180 case MessageResponseType: 181 okay = len(packet) == MessageResponseSize 182 183 case MessageCookieReplyType: 184 okay = len(packet) == MessageCookieReplySize 185 186 default: 187 device.log.Verbosef("Received message with unknown type") 188 } 189 190 if okay { 191 select { 192 case device.queue.handshake.c <- QueueHandshakeElement{ 193 msgType: msgType, 194 buffer: buffer, 195 packet: packet, 196 endpoint: endpoint, 197 }: 198 buffer = device.GetMessageBuffer() 199 default: 200 } 201 } 202 } 203 } 204 205 func (device *Device) RoutineDecryption(id int) { 206 var nonce [chacha20poly1305.NonceSize]byte 207 208 defer device.log.Verbosef("Routine: decryption worker %d - stopped", id) 209 device.log.Verbosef("Routine: decryption worker %d - started", id) 210 211 for elem := range device.queue.decryption.c { 212 // split message into fields 213 counter := elem.packet[MessageTransportOffsetCounter:MessageTransportOffsetContent] 214 content := elem.packet[MessageTransportOffsetContent:] 215 216 // decrypt and release to consumer 217 var err error 218 elem.counter = binary.LittleEndian.Uint64(counter) 219 // copy counter to nonce 220 binary.LittleEndian.PutUint64(nonce[0x4:0xc], elem.counter) 221 elem.packet, err = elem.keypair.receive.Open( 222 content[:0], 223 nonce[:], 224 content, 225 nil, 226 ) 227 if err != nil { 228 elem.packet = nil 229 } 230 elem.Unlock() 231 } 232 } 233 234 /* Handles incoming packets related to handshake 235 */ 236 func (device *Device) RoutineHandshake(id int) { 237 defer func() { 238 device.log.Verbosef("Routine: handshake worker %d - stopped", id) 239 device.queue.encryption.wg.Done() 240 }() 241 device.log.Verbosef("Routine: handshake worker %d - started", id) 242 243 for elem := range device.queue.handshake.c { 244 245 // handle cookie fields and ratelimiting 246 247 switch elem.msgType { 248 249 case MessageCookieReplyType: 250 251 // unmarshal packet 252 253 var reply MessageCookieReply 254 reader := bytes.NewReader(elem.packet) 255 err := binary.Read(reader, binary.LittleEndian, &reply) 256 if err != nil { 257 device.log.Verbosef("Failed to decode cookie reply") 258 goto skip 259 } 260 261 // lookup peer from index 262 263 entry := device.indexTable.Lookup(reply.Receiver) 264 265 if entry.peer == nil { 266 goto skip 267 } 268 269 // consume reply 270 271 if peer := entry.peer; peer.isRunning.Get() { 272 device.log.Verbosef("Receiving cookie response from %s", elem.endpoint.DstToString()) 273 if !peer.cookieGenerator.ConsumeReply(&reply) { 274 device.log.Verbosef("Could not decrypt invalid cookie response") 275 } 276 } 277 278 goto skip 279 280 case MessageInitiationType, MessageResponseType: 281 282 // check mac fields and maybe ratelimit 283 284 if !device.cookieChecker.CheckMAC1(elem.packet) { 285 device.log.Verbosef("Received packet with invalid mac1") 286 goto skip 287 } 288 289 // endpoints destination address is the source of the datagram 290 291 if device.IsUnderLoad() { 292 293 // verify MAC2 field 294 295 if !device.cookieChecker.CheckMAC2(elem.packet, elem.endpoint.DstToBytes()) { 296 device.SendHandshakeCookie(&elem) 297 goto skip 298 } 299 300 // check ratelimiter 301 302 if !device.rate.limiter.Allow(elem.endpoint.DstIP()) { 303 goto skip 304 } 305 } 306 307 default: 308 device.log.Errorf("Invalid packet ended up in the handshake queue") 309 goto skip 310 } 311 312 // handle handshake initiation/response content 313 314 switch elem.msgType { 315 case MessageInitiationType: 316 317 // unmarshal 318 319 var msg MessageInitiation 320 reader := bytes.NewReader(elem.packet) 321 err := binary.Read(reader, binary.LittleEndian, &msg) 322 if err != nil { 323 device.log.Errorf("Failed to decode initiation message") 324 goto skip 325 } 326 327 // consume initiation 328 329 peer := device.ConsumeMessageInitiation(&msg) 330 if peer == nil { 331 device.log.Verbosef("Received invalid initiation message from %s", elem.endpoint.DstToString()) 332 goto skip 333 } 334 335 // update timers 336 337 peer.timersAnyAuthenticatedPacketTraversal() 338 peer.timersAnyAuthenticatedPacketReceived() 339 340 // update endpoint 341 peer.SetEndpointFromPacket(elem.endpoint) 342 343 device.log.Verbosef("%v - Received handshake initiation", peer) 344 atomic.AddUint64(&peer.stats.rxBytes, uint64(len(elem.packet))) 345 346 peer.SendHandshakeResponse() 347 348 case MessageResponseType: 349 350 // unmarshal 351 352 var msg MessageResponse 353 reader := bytes.NewReader(elem.packet) 354 err := binary.Read(reader, binary.LittleEndian, &msg) 355 if err != nil { 356 device.log.Errorf("Failed to decode response message") 357 goto skip 358 } 359 360 // consume response 361 362 peer := device.ConsumeMessageResponse(&msg) 363 if peer == nil { 364 device.log.Verbosef("Received invalid response message from %s", elem.endpoint.DstToString()) 365 goto skip 366 } 367 368 // update endpoint 369 peer.SetEndpointFromPacket(elem.endpoint) 370 371 device.log.Verbosef("%v - Received handshake response", peer) 372 atomic.AddUint64(&peer.stats.rxBytes, uint64(len(elem.packet))) 373 374 // update timers 375 376 peer.timersAnyAuthenticatedPacketTraversal() 377 peer.timersAnyAuthenticatedPacketReceived() 378 379 // derive keypair 380 381 err = peer.BeginSymmetricSession() 382 383 if err != nil { 384 device.log.Errorf("%v - Failed to derive keypair: %v", peer, err) 385 goto skip 386 } 387 388 peer.timersSessionDerived() 389 peer.timersHandshakeComplete() 390 peer.SendKeepalive() 391 } 392 skip: 393 device.PutMessageBuffer(elem.buffer) 394 } 395 } 396 397 func (peer *Peer) RoutineSequentialReceiver() { 398 device := peer.device 399 defer func() { 400 device.log.Verbosef("%v - Routine: sequential receiver - stopped", peer) 401 peer.stopping.Done() 402 }() 403 device.log.Verbosef("%v - Routine: sequential receiver - started", peer) 404 405 for elem := range peer.queue.inbound.c { 406 if elem == nil { 407 return 408 } 409 var err error 410 elem.Lock() 411 if elem.packet == nil { 412 // decryption failed 413 goto skip 414 } 415 416 if !elem.keypair.replayFilter.ValidateCounter(elem.counter, RejectAfterMessages) { 417 goto skip 418 } 419 420 peer.SetEndpointFromPacket(elem.endpoint) 421 if peer.ReceivedWithKeypair(elem.keypair) { 422 peer.timersHandshakeComplete() 423 peer.SendStagedPackets() 424 } 425 426 peer.keepKeyFreshReceiving() 427 peer.timersAnyAuthenticatedPacketTraversal() 428 peer.timersAnyAuthenticatedPacketReceived() 429 atomic.AddUint64(&peer.stats.rxBytes, uint64(len(elem.packet)+MinMessageSize)) 430 431 if len(elem.packet) == 0 { 432 device.log.Verbosef("%v - Receiving keepalive packet", peer) 433 goto skip 434 } 435 peer.timersDataReceived() 436 437 switch elem.packet[0] >> 4 { 438 case ipv4.Version: 439 if len(elem.packet) < ipv4.HeaderLen { 440 goto skip 441 } 442 field := elem.packet[IPv4offsetTotalLength : IPv4offsetTotalLength+2] 443 length := binary.BigEndian.Uint16(field) 444 if int(length) > len(elem.packet) || int(length) < ipv4.HeaderLen { 445 goto skip 446 } 447 elem.packet = elem.packet[:length] 448 src := elem.packet[IPv4offsetSrc : IPv4offsetSrc+net.IPv4len] 449 if device.allowedips.LookupIPv4(src) != peer { 450 device.log.Verbosef("IPv4 packet with disallowed source address from %v", peer) 451 goto skip 452 } 453 454 case ipv6.Version: 455 if len(elem.packet) < ipv6.HeaderLen { 456 goto skip 457 } 458 field := elem.packet[IPv6offsetPayloadLength : IPv6offsetPayloadLength+2] 459 length := binary.BigEndian.Uint16(field) 460 length += ipv6.HeaderLen 461 if int(length) > len(elem.packet) { 462 goto skip 463 } 464 elem.packet = elem.packet[:length] 465 src := elem.packet[IPv6offsetSrc : IPv6offsetSrc+net.IPv6len] 466 if device.allowedips.LookupIPv6(src) != peer { 467 device.log.Verbosef("IPv6 packet with disallowed source address from %v", peer) 468 goto skip 469 } 470 471 default: 472 device.log.Verbosef("Packet with invalid IP version from %v", peer) 473 goto skip 474 } 475 476 _, err = device.tun.device.Write(elem.buffer[:MessageTransportOffsetContent+len(elem.packet)], MessageTransportOffsetContent) 477 if err != nil && !device.isClosed() { 478 device.log.Errorf("Failed to write packet to TUN device: %v", err) 479 } 480 if len(peer.queue.inbound.c) == 0 { 481 err = device.tun.device.Flush() 482 if err != nil { 483 peer.device.log.Errorf("Unable to flush packets: %v", err) 484 } 485 } 486 skip: 487 device.PutMessageBuffer(elem.buffer) 488 device.PutInboundElement(elem) 489 } 490 }