mirror of
				https://github.com/yggdrasil-network/yggdrasil-go.git
				synced 2025-11-04 11:15:07 +03:00 
			
		
		
		
	remove ckr
This commit is contained in:
		
							parent
							
								
									cd4144f22b
								
							
						
					
					
						commit
						e83b5d08a8
					
				
					 3 changed files with 4 additions and 493 deletions
				
			
		| 
						 | 
					@ -1,10 +1,10 @@
 | 
				
			||||||
package tuntap
 | 
					package tuntap
 | 
				
			||||||
 | 
					
 | 
				
			||||||
import (
 | 
					import (
 | 
				
			||||||
	"encoding/hex"
 | 
						//"encoding/hex"
 | 
				
			||||||
	"errors"
 | 
						//"errors"
 | 
				
			||||||
	"fmt"
 | 
						//"fmt"
 | 
				
			||||||
	"net"
 | 
						//"net"
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	"github.com/yggdrasil-network/yggdrasil-go/src/admin"
 | 
						"github.com/yggdrasil-network/yggdrasil-go/src/admin"
 | 
				
			||||||
)
 | 
					)
 | 
				
			||||||
| 
						 | 
					@ -54,61 +54,4 @@ func (t *TunAdapter) SetupAdminHandlers(a *admin.AdminSocket) {
 | 
				
			||||||
		    }
 | 
							    }
 | 
				
			||||||
		  })
 | 
							  })
 | 
				
			||||||
	*/
 | 
						*/
 | 
				
			||||||
	a.AddHandler("getTunnelRouting", []string{}, func(in admin.Info) (admin.Info, error) {
 | 
					 | 
				
			||||||
		return admin.Info{"enabled": t.ckr.isEnabled()}, nil
 | 
					 | 
				
			||||||
	})
 | 
					 | 
				
			||||||
	a.AddHandler("setTunnelRouting", []string{"enabled"}, func(in admin.Info) (admin.Info, error) {
 | 
					 | 
				
			||||||
		enabled := false
 | 
					 | 
				
			||||||
		if e, ok := in["enabled"].(bool); ok {
 | 
					 | 
				
			||||||
			enabled = e
 | 
					 | 
				
			||||||
		}
 | 
					 | 
				
			||||||
		t.ckr.setEnabled(enabled)
 | 
					 | 
				
			||||||
		return admin.Info{"enabled": enabled}, nil
 | 
					 | 
				
			||||||
	})
 | 
					 | 
				
			||||||
	a.AddHandler("addLocalSubnet", []string{"subnet"}, func(in admin.Info) (admin.Info, error) {
 | 
					 | 
				
			||||||
		if err := t.ckr.addLocalSubnet(in["subnet"].(string)); err == nil {
 | 
					 | 
				
			||||||
			return admin.Info{"added": []string{in["subnet"].(string)}}, nil
 | 
					 | 
				
			||||||
		}
 | 
					 | 
				
			||||||
		return admin.Info{"not_added": []string{in["subnet"].(string)}}, errors.New("Failed to add source subnet")
 | 
					 | 
				
			||||||
	})
 | 
					 | 
				
			||||||
	a.AddHandler("addRemoteSubnet", []string{"subnet", "box_pub_key"}, func(in admin.Info) (admin.Info, error) {
 | 
					 | 
				
			||||||
		if err := t.ckr.addRemoteSubnet(in["subnet"].(string), in["box_pub_key"].(string)); err == nil {
 | 
					 | 
				
			||||||
			return admin.Info{"added": []string{fmt.Sprintf("%s via %s", in["subnet"].(string), in["box_pub_key"].(string))}}, nil
 | 
					 | 
				
			||||||
		}
 | 
					 | 
				
			||||||
		return admin.Info{"not_added": []string{fmt.Sprintf("%s via %s", in["subnet"].(string), in["box_pub_key"].(string))}}, errors.New("Failed to add route")
 | 
					 | 
				
			||||||
	})
 | 
					 | 
				
			||||||
	a.AddHandler("getSourceSubnets", []string{}, func(in admin.Info) (admin.Info, error) {
 | 
					 | 
				
			||||||
		var subnets []string
 | 
					 | 
				
			||||||
		getSourceSubnets := func(snets []net.IPNet) {
 | 
					 | 
				
			||||||
			for _, subnet := range snets {
 | 
					 | 
				
			||||||
				subnets = append(subnets, subnet.String())
 | 
					 | 
				
			||||||
			}
 | 
					 | 
				
			||||||
		}
 | 
					 | 
				
			||||||
		getSourceSubnets(t.ckr.ipv4locals)
 | 
					 | 
				
			||||||
		getSourceSubnets(t.ckr.ipv6locals)
 | 
					 | 
				
			||||||
		return admin.Info{"source_subnets": subnets}, nil
 | 
					 | 
				
			||||||
	})
 | 
					 | 
				
			||||||
	a.AddHandler("getRoutes", []string{}, func(in admin.Info) (admin.Info, error) {
 | 
					 | 
				
			||||||
		routes := make(admin.Info)
 | 
					 | 
				
			||||||
		getRoutes := func(ckrs []cryptokey_route) {
 | 
					 | 
				
			||||||
			for _, ckr := range ckrs {
 | 
					 | 
				
			||||||
				routes[ckr.subnet.String()] = hex.EncodeToString(ckr.destination[:])
 | 
					 | 
				
			||||||
			}
 | 
					 | 
				
			||||||
		}
 | 
					 | 
				
			||||||
		getRoutes(t.ckr.ipv4remotes)
 | 
					 | 
				
			||||||
		getRoutes(t.ckr.ipv6remotes)
 | 
					 | 
				
			||||||
		return admin.Info{"routes": routes}, nil
 | 
					 | 
				
			||||||
	})
 | 
					 | 
				
			||||||
	a.AddHandler("removeLocalSubnet", []string{"subnet"}, func(in admin.Info) (admin.Info, error) {
 | 
					 | 
				
			||||||
		if err := t.ckr.removeLocalSubnet(in["subnet"].(string)); err == nil {
 | 
					 | 
				
			||||||
			return admin.Info{"removed": []string{in["subnet"].(string)}}, nil
 | 
					 | 
				
			||||||
		}
 | 
					 | 
				
			||||||
		return admin.Info{"not_removed": []string{in["subnet"].(string)}}, errors.New("Failed to remove source subnet")
 | 
					 | 
				
			||||||
	})
 | 
					 | 
				
			||||||
	a.AddHandler("removeRemoteSubnet", []string{"subnet", "box_pub_key"}, func(in admin.Info) (admin.Info, error) {
 | 
					 | 
				
			||||||
		if err := t.ckr.removeRemoteSubnet(in["subnet"].(string), in["box_pub_key"].(string)); err == nil {
 | 
					 | 
				
			||||||
			return admin.Info{"removed": []string{fmt.Sprintf("%s via %s", in["subnet"].(string), in["box_pub_key"].(string))}}, nil
 | 
					 | 
				
			||||||
		}
 | 
					 | 
				
			||||||
		return admin.Info{"not_removed": []string{fmt.Sprintf("%s via %s", in["subnet"].(string), in["box_pub_key"].(string))}}, errors.New("Failed to remove route")
 | 
					 | 
				
			||||||
	})
 | 
					 | 
				
			||||||
}
 | 
					}
 | 
				
			||||||
| 
						 | 
					
 | 
				
			||||||
| 
						 | 
					@ -1,430 +0,0 @@
 | 
				
			||||||
package tuntap
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
import (
 | 
					 | 
				
			||||||
	"bytes"
 | 
					 | 
				
			||||||
	"encoding/hex"
 | 
					 | 
				
			||||||
	"errors"
 | 
					 | 
				
			||||||
	"fmt"
 | 
					 | 
				
			||||||
	"net"
 | 
					 | 
				
			||||||
	"sort"
 | 
					 | 
				
			||||||
	"sync"
 | 
					 | 
				
			||||||
	"sync/atomic"
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	"github.com/yggdrasil-network/yggdrasil-go/src/address"
 | 
					 | 
				
			||||||
	"github.com/yggdrasil-network/yggdrasil-go/src/crypto"
 | 
					 | 
				
			||||||
)
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
// This module implements crypto-key routing, similar to Wireguard, where we
 | 
					 | 
				
			||||||
// allow traffic for non-Yggdrasil ranges to be routed over Yggdrasil.
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
type cryptokey struct {
 | 
					 | 
				
			||||||
	tun          *TunAdapter
 | 
					 | 
				
			||||||
	enabled      atomic.Value // bool
 | 
					 | 
				
			||||||
	ipv4remotes  []cryptokey_route
 | 
					 | 
				
			||||||
	ipv6remotes  []cryptokey_route
 | 
					 | 
				
			||||||
	ipv4cache    map[address.Address]cryptokey_route
 | 
					 | 
				
			||||||
	ipv6cache    map[address.Address]cryptokey_route
 | 
					 | 
				
			||||||
	ipv4locals   []net.IPNet
 | 
					 | 
				
			||||||
	ipv6locals   []net.IPNet
 | 
					 | 
				
			||||||
	mutexremotes sync.RWMutex
 | 
					 | 
				
			||||||
	mutexcaches  sync.RWMutex
 | 
					 | 
				
			||||||
	mutexlocals  sync.RWMutex
 | 
					 | 
				
			||||||
}
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
type cryptokey_route struct {
 | 
					 | 
				
			||||||
	subnet      net.IPNet
 | 
					 | 
				
			||||||
	destination crypto.BoxPubKey
 | 
					 | 
				
			||||||
}
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
// Initialise crypto-key routing. This must be done before any other CKR calls.
 | 
					 | 
				
			||||||
func (c *cryptokey) init(tun *TunAdapter) {
 | 
					 | 
				
			||||||
	c.tun = tun
 | 
					 | 
				
			||||||
	c.configure()
 | 
					 | 
				
			||||||
}
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
// Configure the CKR routes. This should only ever be ran by the TUN/TAP actor.
 | 
					 | 
				
			||||||
func (c *cryptokey) configure() {
 | 
					 | 
				
			||||||
	current := c.tun.config.GetCurrent()
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	// Set enabled/disabled state
 | 
					 | 
				
			||||||
	c.setEnabled(current.TunnelRouting.Enable)
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	// Clear out existing routes
 | 
					 | 
				
			||||||
	c.mutexremotes.Lock()
 | 
					 | 
				
			||||||
	c.ipv6remotes = make([]cryptokey_route, 0)
 | 
					 | 
				
			||||||
	c.ipv4remotes = make([]cryptokey_route, 0)
 | 
					 | 
				
			||||||
	c.mutexremotes.Unlock()
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	// Add IPv6 routes
 | 
					 | 
				
			||||||
	for ipv6, pubkey := range current.TunnelRouting.IPv6RemoteSubnets {
 | 
					 | 
				
			||||||
		if err := c.addRemoteSubnet(ipv6, pubkey); err != nil {
 | 
					 | 
				
			||||||
			c.tun.log.Errorln("Error adding CKR IPv6 remote subnet:", err)
 | 
					 | 
				
			||||||
		}
 | 
					 | 
				
			||||||
	}
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	// Add IPv4 routes
 | 
					 | 
				
			||||||
	for ipv4, pubkey := range current.TunnelRouting.IPv4RemoteSubnets {
 | 
					 | 
				
			||||||
		if err := c.addRemoteSubnet(ipv4, pubkey); err != nil {
 | 
					 | 
				
			||||||
			c.tun.log.Errorln("Error adding CKR IPv4 remote subnet:", err)
 | 
					 | 
				
			||||||
		}
 | 
					 | 
				
			||||||
	}
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	// Clear out existing sources
 | 
					 | 
				
			||||||
	c.mutexlocals.Lock()
 | 
					 | 
				
			||||||
	c.ipv6locals = make([]net.IPNet, 0)
 | 
					 | 
				
			||||||
	c.ipv4locals = make([]net.IPNet, 0)
 | 
					 | 
				
			||||||
	c.mutexlocals.Unlock()
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	// Add IPv6 sources
 | 
					 | 
				
			||||||
	c.ipv6locals = make([]net.IPNet, 0)
 | 
					 | 
				
			||||||
	for _, source := range current.TunnelRouting.IPv6LocalSubnets {
 | 
					 | 
				
			||||||
		if err := c.addLocalSubnet(source); err != nil {
 | 
					 | 
				
			||||||
			c.tun.log.Errorln("Error adding CKR IPv6 local subnet:", err)
 | 
					 | 
				
			||||||
		}
 | 
					 | 
				
			||||||
	}
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	// Add IPv4 sources
 | 
					 | 
				
			||||||
	c.ipv4locals = make([]net.IPNet, 0)
 | 
					 | 
				
			||||||
	for _, source := range current.TunnelRouting.IPv4LocalSubnets {
 | 
					 | 
				
			||||||
		if err := c.addLocalSubnet(source); err != nil {
 | 
					 | 
				
			||||||
			c.tun.log.Errorln("Error adding CKR IPv4 local subnet:", err)
 | 
					 | 
				
			||||||
		}
 | 
					 | 
				
			||||||
	}
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	// Wipe the caches
 | 
					 | 
				
			||||||
	c.mutexcaches.Lock()
 | 
					 | 
				
			||||||
	c.ipv4cache = make(map[address.Address]cryptokey_route, 0)
 | 
					 | 
				
			||||||
	c.ipv6cache = make(map[address.Address]cryptokey_route, 0)
 | 
					 | 
				
			||||||
	c.mutexcaches.Unlock()
 | 
					 | 
				
			||||||
}
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
// Enable or disable crypto-key routing.
 | 
					 | 
				
			||||||
func (c *cryptokey) setEnabled(enabled bool) {
 | 
					 | 
				
			||||||
	c.enabled.Store(enabled)
 | 
					 | 
				
			||||||
}
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
// Check if crypto-key routing is enabled.
 | 
					 | 
				
			||||||
func (c *cryptokey) isEnabled() bool {
 | 
					 | 
				
			||||||
	enabled, ok := c.enabled.Load().(bool)
 | 
					 | 
				
			||||||
	return ok && enabled
 | 
					 | 
				
			||||||
}
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
// Check whether the given address (with the address length specified in bytes)
 | 
					 | 
				
			||||||
// matches either the current node's address, the node's routed subnet or the
 | 
					 | 
				
			||||||
// list of subnets specified in ipv4locals/ipv6locals.
 | 
					 | 
				
			||||||
func (c *cryptokey) isValidLocalAddress(addr address.Address, addrlen int) bool {
 | 
					 | 
				
			||||||
	c.mutexlocals.RLock()
 | 
					 | 
				
			||||||
	defer c.mutexlocals.RUnlock()
 | 
					 | 
				
			||||||
	// Does it match a configured CKR source?
 | 
					 | 
				
			||||||
	if c.isEnabled() {
 | 
					 | 
				
			||||||
		ip := net.IP(addr[:addrlen])
 | 
					 | 
				
			||||||
		// Build our references to the routing sources
 | 
					 | 
				
			||||||
		var routingsources *[]net.IPNet
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
		// Check if the prefix is IPv4 or IPv6
 | 
					 | 
				
			||||||
		if addrlen == net.IPv6len {
 | 
					 | 
				
			||||||
			routingsources = &c.ipv6locals
 | 
					 | 
				
			||||||
		} else if addrlen == net.IPv4len {
 | 
					 | 
				
			||||||
			routingsources = &c.ipv4locals
 | 
					 | 
				
			||||||
		} else {
 | 
					 | 
				
			||||||
			return false
 | 
					 | 
				
			||||||
		}
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
		for _, subnet := range *routingsources {
 | 
					 | 
				
			||||||
			if subnet.Contains(ip) {
 | 
					 | 
				
			||||||
				return true
 | 
					 | 
				
			||||||
			}
 | 
					 | 
				
			||||||
		}
 | 
					 | 
				
			||||||
	}
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	// Doesn't match any of the above
 | 
					 | 
				
			||||||
	return false
 | 
					 | 
				
			||||||
}
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
// Adds a source subnet, which allows traffic with these source addresses to
 | 
					 | 
				
			||||||
// be tunnelled using crypto-key routing.
 | 
					 | 
				
			||||||
func (c *cryptokey) addLocalSubnet(cidr string) error {
 | 
					 | 
				
			||||||
	c.mutexlocals.Lock()
 | 
					 | 
				
			||||||
	defer c.mutexlocals.Unlock()
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	// Is the CIDR we've been given valid?
 | 
					 | 
				
			||||||
	_, ipnet, err := net.ParseCIDR(cidr)
 | 
					 | 
				
			||||||
	if err != nil {
 | 
					 | 
				
			||||||
		return err
 | 
					 | 
				
			||||||
	}
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	// Get the prefix length and size
 | 
					 | 
				
			||||||
	_, prefixsize := ipnet.Mask.Size()
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	// Build our references to the routing sources
 | 
					 | 
				
			||||||
	var routingsources *[]net.IPNet
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	// Check if the prefix is IPv4 or IPv6
 | 
					 | 
				
			||||||
	if prefixsize == net.IPv6len*8 {
 | 
					 | 
				
			||||||
		routingsources = &c.ipv6locals
 | 
					 | 
				
			||||||
	} else if prefixsize == net.IPv4len*8 {
 | 
					 | 
				
			||||||
		routingsources = &c.ipv4locals
 | 
					 | 
				
			||||||
	} else {
 | 
					 | 
				
			||||||
		return errors.New("unexpected prefix size")
 | 
					 | 
				
			||||||
	}
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	// Check if we already have this CIDR
 | 
					 | 
				
			||||||
	for _, subnet := range *routingsources {
 | 
					 | 
				
			||||||
		if subnet.String() == ipnet.String() {
 | 
					 | 
				
			||||||
			return errors.New("local subnet already configured")
 | 
					 | 
				
			||||||
		}
 | 
					 | 
				
			||||||
	}
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	// Add the source subnet
 | 
					 | 
				
			||||||
	*routingsources = append(*routingsources, *ipnet)
 | 
					 | 
				
			||||||
	c.tun.log.Infoln("Added CKR local subnet", cidr)
 | 
					 | 
				
			||||||
	return nil
 | 
					 | 
				
			||||||
}
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
// Adds a destination route for the given CIDR to be tunnelled to the node
 | 
					 | 
				
			||||||
// with the given BoxPubKey.
 | 
					 | 
				
			||||||
func (c *cryptokey) addRemoteSubnet(cidr string, dest string) error {
 | 
					 | 
				
			||||||
	c.mutexremotes.Lock()
 | 
					 | 
				
			||||||
	c.mutexcaches.Lock()
 | 
					 | 
				
			||||||
	defer c.mutexremotes.Unlock()
 | 
					 | 
				
			||||||
	defer c.mutexcaches.Unlock()
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	// Is the CIDR we've been given valid?
 | 
					 | 
				
			||||||
	ipaddr, ipnet, err := net.ParseCIDR(cidr)
 | 
					 | 
				
			||||||
	if err != nil {
 | 
					 | 
				
			||||||
		return err
 | 
					 | 
				
			||||||
	}
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	// Get the prefix length and size
 | 
					 | 
				
			||||||
	_, prefixsize := ipnet.Mask.Size()
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	// Build our references to the routing table and cache
 | 
					 | 
				
			||||||
	var routingtable *[]cryptokey_route
 | 
					 | 
				
			||||||
	var routingcache *map[address.Address]cryptokey_route
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	// Check if the prefix is IPv4 or IPv6
 | 
					 | 
				
			||||||
	if prefixsize == net.IPv6len*8 {
 | 
					 | 
				
			||||||
		routingtable = &c.ipv6remotes
 | 
					 | 
				
			||||||
		routingcache = &c.ipv6cache
 | 
					 | 
				
			||||||
	} else if prefixsize == net.IPv4len*8 {
 | 
					 | 
				
			||||||
		routingtable = &c.ipv4remotes
 | 
					 | 
				
			||||||
		routingcache = &c.ipv4cache
 | 
					 | 
				
			||||||
	} else {
 | 
					 | 
				
			||||||
		return errors.New("unexpected prefix size")
 | 
					 | 
				
			||||||
	}
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	// Is the route an Yggdrasil destination?
 | 
					 | 
				
			||||||
	var addr address.Address
 | 
					 | 
				
			||||||
	var snet address.Subnet
 | 
					 | 
				
			||||||
	copy(addr[:], ipaddr)
 | 
					 | 
				
			||||||
	copy(snet[:], ipnet.IP)
 | 
					 | 
				
			||||||
	if addr.IsValid() || snet.IsValid() {
 | 
					 | 
				
			||||||
		return errors.New("can't specify Yggdrasil destination as crypto-key route")
 | 
					 | 
				
			||||||
	}
 | 
					 | 
				
			||||||
	// Do we already have a route for this subnet?
 | 
					 | 
				
			||||||
	for _, route := range *routingtable {
 | 
					 | 
				
			||||||
		if route.subnet.String() == ipnet.String() {
 | 
					 | 
				
			||||||
			return fmt.Errorf("remote subnet already exists for %s", cidr)
 | 
					 | 
				
			||||||
		}
 | 
					 | 
				
			||||||
	}
 | 
					 | 
				
			||||||
	// Decode the public key
 | 
					 | 
				
			||||||
	if bpk, err := hex.DecodeString(dest); err != nil {
 | 
					 | 
				
			||||||
		return err
 | 
					 | 
				
			||||||
	} else if len(bpk) != crypto.BoxPubKeyLen {
 | 
					 | 
				
			||||||
		return fmt.Errorf("incorrect key length for %s", dest)
 | 
					 | 
				
			||||||
	} else {
 | 
					 | 
				
			||||||
		// Add the new crypto-key route
 | 
					 | 
				
			||||||
		var key crypto.BoxPubKey
 | 
					 | 
				
			||||||
		copy(key[:], bpk)
 | 
					 | 
				
			||||||
		*routingtable = append(*routingtable, cryptokey_route{
 | 
					 | 
				
			||||||
			subnet:      *ipnet,
 | 
					 | 
				
			||||||
			destination: key,
 | 
					 | 
				
			||||||
		})
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
		// Sort so most specific routes are first
 | 
					 | 
				
			||||||
		sort.Slice(*routingtable, func(i, j int) bool {
 | 
					 | 
				
			||||||
			im, _ := (*routingtable)[i].subnet.Mask.Size()
 | 
					 | 
				
			||||||
			jm, _ := (*routingtable)[j].subnet.Mask.Size()
 | 
					 | 
				
			||||||
			return im > jm
 | 
					 | 
				
			||||||
		})
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
		// Clear the cache as this route might change future routing
 | 
					 | 
				
			||||||
		// Setting an empty slice keeps the memory whereas nil invokes GC
 | 
					 | 
				
			||||||
		for k := range *routingcache {
 | 
					 | 
				
			||||||
			delete(*routingcache, k)
 | 
					 | 
				
			||||||
		}
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
		c.tun.log.Infoln("Added CKR remote subnet", cidr)
 | 
					 | 
				
			||||||
		return nil
 | 
					 | 
				
			||||||
	}
 | 
					 | 
				
			||||||
}
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
// Looks up the most specific route for the given address (with the address
 | 
					 | 
				
			||||||
// length specified in bytes) from the crypto-key routing table. An error is
 | 
					 | 
				
			||||||
// returned if the address is not suitable or no route was found.
 | 
					 | 
				
			||||||
func (c *cryptokey) getPublicKeyForAddress(addr address.Address, addrlen int) (crypto.BoxPubKey, error) {
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	// Check if the address is a valid Yggdrasil address - if so it
 | 
					 | 
				
			||||||
	// is exempt from all CKR checking
 | 
					 | 
				
			||||||
	if addr.IsValid() {
 | 
					 | 
				
			||||||
		return crypto.BoxPubKey{}, errors.New("cannot look up CKR for Yggdrasil addresses")
 | 
					 | 
				
			||||||
	}
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	// Build our references to the routing table and cache
 | 
					 | 
				
			||||||
	var routingtable *[]cryptokey_route
 | 
					 | 
				
			||||||
	var routingcache *map[address.Address]cryptokey_route
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	// Check if the prefix is IPv4 or IPv6
 | 
					 | 
				
			||||||
	if addrlen == net.IPv6len {
 | 
					 | 
				
			||||||
		routingcache = &c.ipv6cache
 | 
					 | 
				
			||||||
	} else if addrlen == net.IPv4len {
 | 
					 | 
				
			||||||
		routingcache = &c.ipv4cache
 | 
					 | 
				
			||||||
	} else {
 | 
					 | 
				
			||||||
		return crypto.BoxPubKey{}, errors.New("unexpected prefix size")
 | 
					 | 
				
			||||||
	}
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	// Check if there's a cache entry for this addr
 | 
					 | 
				
			||||||
	c.mutexcaches.RLock()
 | 
					 | 
				
			||||||
	if route, ok := (*routingcache)[addr]; ok {
 | 
					 | 
				
			||||||
		c.mutexcaches.RUnlock()
 | 
					 | 
				
			||||||
		return route.destination, nil
 | 
					 | 
				
			||||||
	}
 | 
					 | 
				
			||||||
	c.mutexcaches.RUnlock()
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	c.mutexremotes.RLock()
 | 
					 | 
				
			||||||
	defer c.mutexremotes.RUnlock()
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	// Check if the prefix is IPv4 or IPv6
 | 
					 | 
				
			||||||
	if addrlen == net.IPv6len {
 | 
					 | 
				
			||||||
		routingtable = &c.ipv6remotes
 | 
					 | 
				
			||||||
	} else if addrlen == net.IPv4len {
 | 
					 | 
				
			||||||
		routingtable = &c.ipv4remotes
 | 
					 | 
				
			||||||
	} else {
 | 
					 | 
				
			||||||
		return crypto.BoxPubKey{}, errors.New("unexpected prefix size")
 | 
					 | 
				
			||||||
	}
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	// No cache was found - start by converting the address into a net.IP
 | 
					 | 
				
			||||||
	ip := make(net.IP, addrlen)
 | 
					 | 
				
			||||||
	copy(ip[:addrlen], addr[:])
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	// Check if we have a route. At this point c.ipv6remotes should be
 | 
					 | 
				
			||||||
	// pre-sorted so that the most specific routes are first
 | 
					 | 
				
			||||||
	for _, route := range *routingtable {
 | 
					 | 
				
			||||||
		// Does this subnet match the given IP?
 | 
					 | 
				
			||||||
		if route.subnet.Contains(ip) {
 | 
					 | 
				
			||||||
			c.mutexcaches.Lock()
 | 
					 | 
				
			||||||
			defer c.mutexcaches.Unlock()
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
			// Check if the routing cache is above a certain size, if it is evict
 | 
					 | 
				
			||||||
			// a random entry so we can make room for this one. We take advantage
 | 
					 | 
				
			||||||
			// of the fact that the iteration order is random here
 | 
					 | 
				
			||||||
			for k := range *routingcache {
 | 
					 | 
				
			||||||
				if len(*routingcache) < 1024 {
 | 
					 | 
				
			||||||
					break
 | 
					 | 
				
			||||||
				}
 | 
					 | 
				
			||||||
				delete(*routingcache, k)
 | 
					 | 
				
			||||||
			}
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
			// Cache the entry for future packets to get a faster lookup
 | 
					 | 
				
			||||||
			(*routingcache)[addr] = route
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
			// Return the boxPubKey
 | 
					 | 
				
			||||||
			return route.destination, nil
 | 
					 | 
				
			||||||
		}
 | 
					 | 
				
			||||||
	}
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	// No route was found if we got to this point
 | 
					 | 
				
			||||||
	return crypto.BoxPubKey{}, fmt.Errorf("no route to %s", ip.String())
 | 
					 | 
				
			||||||
}
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
// Removes a source subnet, which allows traffic with these source addresses to
 | 
					 | 
				
			||||||
// be tunnelled using crypto-key routing.
 | 
					 | 
				
			||||||
func (c *cryptokey) removeLocalSubnet(cidr string) error {
 | 
					 | 
				
			||||||
	c.mutexlocals.Lock()
 | 
					 | 
				
			||||||
	defer c.mutexlocals.Unlock()
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	// Is the CIDR we've been given valid?
 | 
					 | 
				
			||||||
	_, ipnet, err := net.ParseCIDR(cidr)
 | 
					 | 
				
			||||||
	if err != nil {
 | 
					 | 
				
			||||||
		return err
 | 
					 | 
				
			||||||
	}
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	// Get the prefix length and size
 | 
					 | 
				
			||||||
	_, prefixsize := ipnet.Mask.Size()
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	// Build our references to the routing sources
 | 
					 | 
				
			||||||
	var routingsources *[]net.IPNet
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	// Check if the prefix is IPv4 or IPv6
 | 
					 | 
				
			||||||
	if prefixsize == net.IPv6len*8 {
 | 
					 | 
				
			||||||
		routingsources = &c.ipv6locals
 | 
					 | 
				
			||||||
	} else if prefixsize == net.IPv4len*8 {
 | 
					 | 
				
			||||||
		routingsources = &c.ipv4locals
 | 
					 | 
				
			||||||
	} else {
 | 
					 | 
				
			||||||
		return errors.New("unexpected prefix size")
 | 
					 | 
				
			||||||
	}
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	// Check if we already have this CIDR
 | 
					 | 
				
			||||||
	for idx, subnet := range *routingsources {
 | 
					 | 
				
			||||||
		if subnet.String() == ipnet.String() {
 | 
					 | 
				
			||||||
			*routingsources = append((*routingsources)[:idx], (*routingsources)[idx+1:]...)
 | 
					 | 
				
			||||||
			c.tun.log.Infoln("Removed CKR local subnet", cidr)
 | 
					 | 
				
			||||||
			return nil
 | 
					 | 
				
			||||||
		}
 | 
					 | 
				
			||||||
	}
 | 
					 | 
				
			||||||
	return errors.New("local subnet not found")
 | 
					 | 
				
			||||||
}
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
// Removes a destination route for the given CIDR to be tunnelled to the node
 | 
					 | 
				
			||||||
// with the given BoxPubKey.
 | 
					 | 
				
			||||||
func (c *cryptokey) removeRemoteSubnet(cidr string, dest string) error {
 | 
					 | 
				
			||||||
	c.mutexremotes.Lock()
 | 
					 | 
				
			||||||
	c.mutexcaches.Lock()
 | 
					 | 
				
			||||||
	defer c.mutexremotes.Unlock()
 | 
					 | 
				
			||||||
	defer c.mutexcaches.Unlock()
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	// Is the CIDR we've been given valid?
 | 
					 | 
				
			||||||
	_, ipnet, err := net.ParseCIDR(cidr)
 | 
					 | 
				
			||||||
	if err != nil {
 | 
					 | 
				
			||||||
		return err
 | 
					 | 
				
			||||||
	}
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	// Get the prefix length and size
 | 
					 | 
				
			||||||
	_, prefixsize := ipnet.Mask.Size()
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	// Build our references to the routing table and cache
 | 
					 | 
				
			||||||
	var routingtable *[]cryptokey_route
 | 
					 | 
				
			||||||
	var routingcache *map[address.Address]cryptokey_route
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	// Check if the prefix is IPv4 or IPv6
 | 
					 | 
				
			||||||
	if prefixsize == net.IPv6len*8 {
 | 
					 | 
				
			||||||
		routingtable = &c.ipv6remotes
 | 
					 | 
				
			||||||
		routingcache = &c.ipv6cache
 | 
					 | 
				
			||||||
	} else if prefixsize == net.IPv4len*8 {
 | 
					 | 
				
			||||||
		routingtable = &c.ipv4remotes
 | 
					 | 
				
			||||||
		routingcache = &c.ipv4cache
 | 
					 | 
				
			||||||
	} else {
 | 
					 | 
				
			||||||
		return errors.New("unexpected prefix size")
 | 
					 | 
				
			||||||
	}
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	// Decode the public key
 | 
					 | 
				
			||||||
	bpk, err := hex.DecodeString(dest)
 | 
					 | 
				
			||||||
	if err != nil {
 | 
					 | 
				
			||||||
		return err
 | 
					 | 
				
			||||||
	} else if len(bpk) != crypto.BoxPubKeyLen {
 | 
					 | 
				
			||||||
		return fmt.Errorf("incorrect key length for %s", dest)
 | 
					 | 
				
			||||||
	}
 | 
					 | 
				
			||||||
	netStr := ipnet.String()
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	for idx, route := range *routingtable {
 | 
					 | 
				
			||||||
		if bytes.Equal(route.destination[:], bpk) && route.subnet.String() == netStr {
 | 
					 | 
				
			||||||
			*routingtable = append((*routingtable)[:idx], (*routingtable)[idx+1:]...)
 | 
					 | 
				
			||||||
			for k := range *routingcache {
 | 
					 | 
				
			||||||
				delete(*routingcache, k)
 | 
					 | 
				
			||||||
			}
 | 
					 | 
				
			||||||
			c.tun.log.Infof("Removed CKR remote subnet %s via %s\n", cidr, dest)
 | 
					 | 
				
			||||||
			return nil
 | 
					 | 
				
			||||||
		}
 | 
					 | 
				
			||||||
	}
 | 
					 | 
				
			||||||
	return fmt.Errorf("route does not exists for %s", cidr)
 | 
					 | 
				
			||||||
}
 | 
					 | 
				
			||||||
| 
						 | 
					@ -40,7 +40,6 @@ type TunAdapter struct {
 | 
				
			||||||
	log         *log.Logger
 | 
						log         *log.Logger
 | 
				
			||||||
	addr        address.Address
 | 
						addr        address.Address
 | 
				
			||||||
	subnet      address.Subnet
 | 
						subnet      address.Subnet
 | 
				
			||||||
	ckr         cryptokey
 | 
					 | 
				
			||||||
	mtu         MTU
 | 
						mtu         MTU
 | 
				
			||||||
	iface       tun.Device
 | 
						iface       tun.Device
 | 
				
			||||||
	phony.Inbox // Currently only used for _handlePacket from the reader, TODO: all the stuff that currently needs a mutex below
 | 
						phony.Inbox // Currently only used for _handlePacket from the reader, TODO: all the stuff that currently needs a mutex below
 | 
				
			||||||
| 
						 | 
					@ -146,7 +145,6 @@ func (tun *TunAdapter) _start() error {
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
	// TODO tun.core.SetMaximumSessionMTU(tun.MTU())
 | 
						// TODO tun.core.SetMaximumSessionMTU(tun.MTU())
 | 
				
			||||||
	tun.isOpen = true
 | 
						tun.isOpen = true
 | 
				
			||||||
	tun.ckr.init(tun)
 | 
					 | 
				
			||||||
	go tun.read()
 | 
						go tun.read()
 | 
				
			||||||
	go tun.write()
 | 
						go tun.write()
 | 
				
			||||||
	return nil
 | 
						return nil
 | 
				
			||||||
| 
						 | 
					
 | 
				
			||||||
		Loading…
	
	Add table
		Add a link
		
	
		Reference in a new issue