2
0

outside.go 27 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817
  1. package nebula
  2. import (
  3. "encoding/binary"
  4. "errors"
  5. "net/netip"
  6. "time"
  7. "github.com/google/gopacket/layers"
  8. "github.com/slackhq/nebula/packet"
  9. "golang.org/x/net/ipv6"
  10. "github.com/sirupsen/logrus"
  11. "github.com/slackhq/nebula/firewall"
  12. "github.com/slackhq/nebula/header"
  13. "golang.org/x/net/ipv4"
  14. )
  15. const (
  16. minFwPacketLen = 4
  17. )
  18. func (f *Interface) readOutsidePackets(via ViaSender, out []byte, packet []byte, h *header.H, fwPacket *firewall.Packet, lhf *LightHouseHandler, nb []byte, q int, localCache firewall.ConntrackCache, now time.Time) {
  19. err := h.Parse(packet)
  20. if err != nil {
  21. // Hole punch packets are 0 or 1 byte big, so lets ignore printing those errors
  22. if len(packet) > 1 {
  23. f.l.WithField("packet", packet).Infof("Error while parsing inbound packet from %s: %s", via, err)
  24. }
  25. return
  26. }
  27. //l.Error("in packet ", header, packet[HeaderLen:])
  28. if !via.IsRelayed {
  29. if f.myVpnNetworksTable.Contains(via.UdpAddr.Addr()) {
  30. if f.l.Level >= logrus.DebugLevel {
  31. f.l.WithField("from", via).Debug("Refusing to process double encrypted packet")
  32. }
  33. return
  34. }
  35. }
  36. var hostinfo *HostInfo
  37. // verify if we've seen this index before, otherwise respond to the handshake initiation
  38. if h.Type == header.Message && h.Subtype == header.MessageRelay {
  39. hostinfo = f.hostMap.QueryRelayIndex(h.RemoteIndex)
  40. } else {
  41. hostinfo = f.hostMap.QueryIndex(h.RemoteIndex)
  42. }
  43. var ci *ConnectionState
  44. if hostinfo != nil {
  45. ci = hostinfo.ConnectionState
  46. }
  47. switch h.Type {
  48. case header.Message:
  49. if !f.handleEncrypted(ci, via, h) {
  50. return
  51. }
  52. switch h.Subtype {
  53. case header.MessageNone:
  54. if !f.decryptToTun(hostinfo, h.MessageCounter, out, packet, fwPacket, nb, q, localCache, now) {
  55. return
  56. }
  57. case header.MessageRelay:
  58. // The entire body is sent as AD, not encrypted.
  59. // The packet consists of a 16-byte parsed Nebula header, Associated Data-protected payload, and a trailing 16-byte AEAD signature value.
  60. // The packet is guaranteed to be at least 16 bytes at this point, b/c it got past the h.Parse() call above. If it's
  61. // otherwise malformed (meaning, there is no trailing 16 byte AEAD value), then this will result in at worst a 0-length slice
  62. // which will gracefully fail in the DecryptDanger call.
  63. signedPayload := packet[:len(packet)-hostinfo.ConnectionState.dKey.Overhead()]
  64. signatureValue := packet[len(packet)-hostinfo.ConnectionState.dKey.Overhead():]
  65. out, err = hostinfo.ConnectionState.dKey.DecryptDanger(out, signedPayload, signatureValue, h.MessageCounter, nb)
  66. if err != nil {
  67. return
  68. }
  69. // Successfully validated the thing. Get rid of the Relay header.
  70. signedPayload = signedPayload[header.Len:]
  71. // Pull the Roaming parts up here, and return in all call paths.
  72. f.handleHostRoaming(hostinfo, via)
  73. // Track usage of both the HostInfo and the Relay for the received & authenticated packet
  74. f.connectionManager.In(hostinfo)
  75. f.connectionManager.RelayUsed(h.RemoteIndex)
  76. relay, ok := hostinfo.relayState.QueryRelayForByIdx(h.RemoteIndex)
  77. if !ok {
  78. // The only way this happens is if hostmap has an index to the correct HostInfo, but the HostInfo is missing
  79. // its internal mapping. This should never happen.
  80. hostinfo.logger(f.l).WithFields(logrus.Fields{"vpnAddrs": hostinfo.vpnAddrs, "remoteIndex": h.RemoteIndex}).Error("HostInfo missing remote relay index")
  81. return
  82. }
  83. switch relay.Type {
  84. case TerminalType:
  85. // If I am the target of this relay, process the unwrapped packet
  86. // From this recursive point, all these variables are 'burned'. We shouldn't rely on them again.
  87. via = ViaSender{
  88. UdpAddr: via.UdpAddr,
  89. relayHI: hostinfo,
  90. remoteIdx: relay.RemoteIndex,
  91. relay: relay,
  92. IsRelayed: true,
  93. }
  94. f.readOutsidePackets(via, out[:0], signedPayload, h, fwPacket, lhf, nb, q, localCache, now)
  95. return
  96. case ForwardingType:
  97. // Find the target HostInfo relay object
  98. targetHI, targetRelay, err := f.hostMap.QueryVpnAddrsRelayFor(hostinfo.vpnAddrs, relay.PeerAddr)
  99. if err != nil {
  100. hostinfo.logger(f.l).WithField("relayTo", relay.PeerAddr).WithError(err).WithField("hostinfo.vpnAddrs", hostinfo.vpnAddrs).Info("Failed to find target host info by ip")
  101. return
  102. }
  103. // If that relay is Established, forward the payload through it
  104. if targetRelay.State == Established {
  105. switch targetRelay.Type {
  106. case ForwardingType:
  107. // Forward this packet through the relay tunnel
  108. // Find the target HostInfo
  109. f.SendVia(targetHI, targetRelay, signedPayload, nb, out, false)
  110. return
  111. case TerminalType:
  112. hostinfo.logger(f.l).Error("Unexpected Relay Type of Terminal")
  113. }
  114. } else {
  115. hostinfo.logger(f.l).WithFields(logrus.Fields{"relayTo": relay.PeerAddr, "relayFrom": hostinfo.vpnAddrs[0], "targetRelayState": targetRelay.State}).Info("Unexpected target relay state")
  116. return
  117. }
  118. }
  119. }
  120. case header.LightHouse:
  121. f.messageMetrics.Rx(h.Type, h.Subtype, 1)
  122. if !f.handleEncrypted(ci, via, h) {
  123. return
  124. }
  125. d, err := f.decrypt(hostinfo, h.MessageCounter, out, packet, h, nb)
  126. if err != nil {
  127. hostinfo.logger(f.l).WithError(err).WithField("from", via).
  128. WithField("packet", packet).
  129. Error("Failed to decrypt lighthouse packet")
  130. return
  131. }
  132. //TODO: assert via is not relayed
  133. lhf.HandleRequest(via.UdpAddr, hostinfo.vpnAddrs, d, f)
  134. // Fallthrough to the bottom to record incoming traffic
  135. case header.Test:
  136. f.messageMetrics.Rx(h.Type, h.Subtype, 1)
  137. if !f.handleEncrypted(ci, via, h) {
  138. return
  139. }
  140. d, err := f.decrypt(hostinfo, h.MessageCounter, out, packet, h, nb)
  141. if err != nil {
  142. hostinfo.logger(f.l).WithError(err).WithField("from", via).
  143. WithField("packet", packet).
  144. Error("Failed to decrypt test packet")
  145. return
  146. }
  147. if h.Subtype == header.TestRequest {
  148. // This testRequest might be from TryPromoteBest, so we should roam
  149. // to the new IP address before responding
  150. f.handleHostRoaming(hostinfo, via)
  151. f.send(header.Test, header.TestReply, ci, hostinfo, d, nb, out)
  152. }
  153. // Fallthrough to the bottom to record incoming traffic
  154. // Non encrypted messages below here, they should not fall through to avoid tracking incoming traffic since they
  155. // are unauthenticated
  156. case header.Handshake:
  157. f.messageMetrics.Rx(h.Type, h.Subtype, 1)
  158. f.handshakeManager.HandleIncoming(via, packet, h)
  159. return
  160. case header.RecvError:
  161. f.messageMetrics.Rx(h.Type, h.Subtype, 1)
  162. f.handleRecvError(via.UdpAddr, h)
  163. return
  164. case header.CloseTunnel:
  165. f.messageMetrics.Rx(h.Type, h.Subtype, 1)
  166. if !f.handleEncrypted(ci, via, h) {
  167. return
  168. }
  169. hostinfo.logger(f.l).WithField("from", via).
  170. Info("Close tunnel received, tearing down.")
  171. f.closeTunnel(hostinfo)
  172. return
  173. case header.Control:
  174. if !f.handleEncrypted(ci, via, h) {
  175. return
  176. }
  177. d, err := f.decrypt(hostinfo, h.MessageCounter, out, packet, h, nb)
  178. if err != nil {
  179. hostinfo.logger(f.l).WithError(err).WithField("from", via).
  180. WithField("packet", packet).
  181. Error("Failed to decrypt Control packet")
  182. return
  183. }
  184. f.relayManager.HandleControlMsg(hostinfo, d, f)
  185. default:
  186. f.messageMetrics.Rx(h.Type, h.Subtype, 1)
  187. hostinfo.logger(f.l).Debugf("Unexpected packet received from %s", via)
  188. return
  189. }
  190. f.handleHostRoaming(hostinfo, via)
  191. f.connectionManager.In(hostinfo)
  192. }
  193. func (f *Interface) readOutsidePacketsMany(packets []*packet.Packet, out []*packet.OutPacket, h *header.H, fwPacket *firewall.Packet, lhf *LightHouseHandler, nb []byte, q int, localCache firewall.ConntrackCache, now time.Time) {
  194. for i, pkt := range packets {
  195. out[i].Scratch = out[i].Scratch[:0]
  196. via := ViaSender{UdpAddr: pkt.AddrPort()}
  197. //l.Error("in packet ", header, packet[HeaderLen:])
  198. if !via.IsRelayed {
  199. if f.myVpnNetworksTable.Contains(via.UdpAddr.Addr()) {
  200. if f.l.Level >= logrus.DebugLevel {
  201. f.l.WithField("from", via).Debug("Refusing to process double encrypted packet")
  202. }
  203. return
  204. }
  205. }
  206. //todo per-segment!
  207. for segment := range pkt.Segments() {
  208. err := h.Parse(segment)
  209. if err != nil {
  210. // Hole punch packets are 0 or 1 byte big, so lets ignore printing those errors
  211. if len(segment) > 1 {
  212. f.l.WithField("packet", pkt).Infof("Error while parsing inbound packet from %s: %s", via, err)
  213. }
  214. return
  215. }
  216. var hostinfo *HostInfo
  217. // verify if we've seen this index before, otherwise respond to the handshake initiation
  218. if h.Type == header.Message && h.Subtype == header.MessageRelay {
  219. hostinfo = f.hostMap.QueryRelayIndex(h.RemoteIndex)
  220. } else {
  221. hostinfo = f.hostMap.QueryIndex(h.RemoteIndex)
  222. }
  223. var ci *ConnectionState
  224. if hostinfo != nil {
  225. ci = hostinfo.ConnectionState
  226. }
  227. switch h.Type {
  228. case header.Message:
  229. // TODO handleEncrypted sends directly to addr on error. Handle this in the tunneling case.
  230. if !f.handleEncrypted(ci, via, h) {
  231. return
  232. }
  233. switch h.Subtype {
  234. case header.MessageNone:
  235. if !f.decryptToTunDelayWrite(hostinfo, h.MessageCounter, out[i], pkt, segment, fwPacket, nb, q, localCache, now) {
  236. return
  237. }
  238. case header.MessageRelay:
  239. // The entire body is sent as AD, not encrypted.
  240. // The packet consists of a 16-byte parsed Nebula header, Associated Data-protected payload, and a trailing 16-byte AEAD signature value.
  241. // The packet is guaranteed to be at least 16 bytes at this point, b/c it got past the h.Parse() call above. If it's
  242. // otherwise malformed (meaning, there is no trailing 16 byte AEAD value), then this will result in at worst a 0-length slice
  243. // which will gracefully fail in the DecryptDanger call.
  244. signedPayload := segment[:len(segment)-hostinfo.ConnectionState.dKey.Overhead()]
  245. signatureValue := segment[len(segment)-hostinfo.ConnectionState.dKey.Overhead():]
  246. out[i].Scratch, err = hostinfo.ConnectionState.dKey.DecryptDanger(out[i].Scratch, signedPayload, signatureValue, h.MessageCounter, nb)
  247. if err != nil {
  248. return
  249. }
  250. // Successfully validated the thing. Get rid of the Relay header.
  251. signedPayload = signedPayload[header.Len:]
  252. // Pull the Roaming parts up here, and return in all call paths.
  253. f.handleHostRoaming(hostinfo, via)
  254. // Track usage of both the HostInfo and the Relay for the received & authenticated packet
  255. f.connectionManager.In(hostinfo)
  256. f.connectionManager.RelayUsed(h.RemoteIndex)
  257. relay, ok := hostinfo.relayState.QueryRelayForByIdx(h.RemoteIndex)
  258. if !ok {
  259. // The only way this happens is if hostmap has an index to the correct HostInfo, but the HostInfo is missing
  260. // its internal mapping. This should never happen.
  261. hostinfo.logger(f.l).WithFields(logrus.Fields{"vpnAddrs": hostinfo.vpnAddrs, "remoteIndex": h.RemoteIndex}).Error("HostInfo missing remote relay index")
  262. return
  263. }
  264. switch relay.Type {
  265. case TerminalType:
  266. // If I am the target of this relay, process the unwrapped packet
  267. // From this recursive point, all these variables are 'burned'. We shouldn't rely on them again.
  268. f.readOutsidePackets(ViaSender{relayHI: hostinfo, remoteIdx: relay.RemoteIndex, relay: relay}, out[i].Scratch[:0], signedPayload, h, fwPacket, lhf, nb, q, localCache, now)
  269. return
  270. case ForwardingType:
  271. // Find the target HostInfo relay object
  272. targetHI, targetRelay, err := f.hostMap.QueryVpnAddrsRelayFor(hostinfo.vpnAddrs, relay.PeerAddr)
  273. if err != nil {
  274. hostinfo.logger(f.l).WithField("relayTo", relay.PeerAddr).WithError(err).WithField("hostinfo.vpnAddrs", hostinfo.vpnAddrs).Info("Failed to find target host info by ip")
  275. return
  276. }
  277. // If that relay is Established, forward the payload through it
  278. if targetRelay.State == Established {
  279. switch targetRelay.Type {
  280. case ForwardingType:
  281. // Forward this packet through the relay tunnel
  282. // Find the target HostInfo
  283. f.SendVia(targetHI, targetRelay, signedPayload, nb, out[i].Scratch, false)
  284. return
  285. case TerminalType:
  286. hostinfo.logger(f.l).Error("Unexpected Relay Type of Terminal")
  287. }
  288. } else {
  289. hostinfo.logger(f.l).WithFields(logrus.Fields{"relayTo": relay.PeerAddr, "relayFrom": hostinfo.vpnAddrs[0], "targetRelayState": targetRelay.State}).Info("Unexpected target relay state")
  290. return
  291. }
  292. }
  293. }
  294. case header.LightHouse:
  295. f.messageMetrics.Rx(h.Type, h.Subtype, 1)
  296. if !f.handleEncrypted(ci, via, h) {
  297. return
  298. }
  299. d, err := f.decrypt(hostinfo, h.MessageCounter, out[i].Scratch, segment, h, nb)
  300. if err != nil {
  301. hostinfo.logger(f.l).WithError(err).WithField("udpAddr", via.UdpAddr).
  302. WithField("packet", segment).
  303. Error("Failed to decrypt lighthouse packet")
  304. return
  305. }
  306. lhf.HandleRequest(via.UdpAddr, hostinfo.vpnAddrs, d, f)
  307. // Fallthrough to the bottom to record incoming traffic
  308. case header.Test:
  309. f.messageMetrics.Rx(h.Type, h.Subtype, 1)
  310. if !f.handleEncrypted(ci, via, h) {
  311. return
  312. }
  313. d, err := f.decrypt(hostinfo, h.MessageCounter, out[i].Scratch, segment, h, nb)
  314. if err != nil {
  315. hostinfo.logger(f.l).WithError(err).WithField("udpAddr", via).
  316. WithField("packet", segment).
  317. Error("Failed to decrypt test packet")
  318. return
  319. }
  320. if h.Subtype == header.TestRequest {
  321. // This testRequest might be from TryPromoteBest, so we should roam
  322. // to the new IP address before responding
  323. f.handleHostRoaming(hostinfo, via)
  324. f.send(header.Test, header.TestReply, ci, hostinfo, d, nb, out[i].Scratch)
  325. }
  326. // Fallthrough to the bottom to record incoming traffic
  327. // Non encrypted messages below here, they should not fall through to avoid tracking incoming traffic since they
  328. // are unauthenticated
  329. case header.Handshake:
  330. f.messageMetrics.Rx(h.Type, h.Subtype, 1)
  331. f.handshakeManager.HandleIncoming(via, segment, h)
  332. return
  333. case header.RecvError:
  334. f.messageMetrics.Rx(h.Type, h.Subtype, 1)
  335. f.handleRecvError(via.UdpAddr, h)
  336. return
  337. case header.CloseTunnel:
  338. f.messageMetrics.Rx(h.Type, h.Subtype, 1)
  339. if !f.handleEncrypted(ci, via, h) {
  340. return
  341. }
  342. hostinfo.logger(f.l).WithField("udpAddr", via).
  343. Info("Close tunnel received, tearing down.")
  344. f.closeTunnel(hostinfo)
  345. return
  346. case header.Control:
  347. if !f.handleEncrypted(ci, via, h) {
  348. return
  349. }
  350. d, err := f.decrypt(hostinfo, h.MessageCounter, out[i].Scratch, segment, h, nb)
  351. if err != nil {
  352. hostinfo.logger(f.l).WithError(err).WithField("udpAddr", via).
  353. WithField("packet", segment).
  354. Error("Failed to decrypt Control packet")
  355. return
  356. }
  357. f.relayManager.HandleControlMsg(hostinfo, d, f)
  358. default:
  359. f.messageMetrics.Rx(h.Type, h.Subtype, 1)
  360. hostinfo.logger(f.l).Debugf("Unexpected packet received from %s", via)
  361. return
  362. }
  363. f.handleHostRoaming(hostinfo, via)
  364. f.connectionManager.In(hostinfo)
  365. }
  366. _, err := f.readers[q].WriteOne(out[i], false, q)
  367. if err != nil {
  368. f.l.WithError(err).Error("Failed to write packet")
  369. }
  370. }
  371. }
  372. // closeTunnel closes a tunnel locally, it does not send a closeTunnel packet to the remote
  373. func (f *Interface) closeTunnel(hostInfo *HostInfo) {
  374. final := f.hostMap.DeleteHostInfo(hostInfo)
  375. if final {
  376. // We no longer have any tunnels with this vpn addr, clear learned lighthouse state to lower memory usage
  377. f.lightHouse.DeleteVpnAddrs(hostInfo.vpnAddrs)
  378. }
  379. }
  380. // sendCloseTunnel is a helper function to send a proper close tunnel packet to a remote
  381. func (f *Interface) sendCloseTunnel(h *HostInfo) {
  382. f.send(header.CloseTunnel, 0, h.ConnectionState, h, []byte{}, make([]byte, 12, 12), make([]byte, mtu))
  383. }
  384. func (f *Interface) handleHostRoaming(hostinfo *HostInfo, via ViaSender) {
  385. if !via.IsRelayed && hostinfo.remote != via.UdpAddr {
  386. if !f.lightHouse.GetRemoteAllowList().AllowAll(hostinfo.vpnAddrs, via.UdpAddr.Addr()) {
  387. hostinfo.logger(f.l).WithField("newAddr", via.UdpAddr).Debug("lighthouse.remote_allow_list denied roaming")
  388. return
  389. }
  390. if !hostinfo.lastRoam.IsZero() && via.UdpAddr == hostinfo.lastRoamRemote && time.Since(hostinfo.lastRoam) < RoamingSuppressSeconds*time.Second {
  391. if f.l.Level >= logrus.DebugLevel {
  392. hostinfo.logger(f.l).WithField("udpAddr", hostinfo.remote).WithField("newAddr", via.UdpAddr).
  393. Debugf("Suppressing roam back to previous remote for %d seconds", RoamingSuppressSeconds)
  394. }
  395. return
  396. }
  397. hostinfo.logger(f.l).WithField("udpAddr", hostinfo.remote).WithField("newAddr", via.UdpAddr).
  398. Info("Host roamed to new udp ip/port.")
  399. hostinfo.lastRoam = time.Now()
  400. hostinfo.lastRoamRemote = hostinfo.remote
  401. hostinfo.SetRemote(via.UdpAddr)
  402. }
  403. }
  404. // handleEncrypted returns true if a packet should be processed, false otherwise
  405. func (f *Interface) handleEncrypted(ci *ConnectionState, via ViaSender, h *header.H) bool {
  406. // If connectionstate does not exist, send a recv error, if possible, to encourage a fast reconnect
  407. if ci == nil {
  408. if !via.IsRelayed {
  409. f.maybeSendRecvError(via.UdpAddr, h.RemoteIndex)
  410. }
  411. return false
  412. }
  413. // If the window check fails, refuse to process the packet, but don't send a recv error
  414. if !ci.window.Check(f.l, h.MessageCounter) {
  415. return false
  416. }
  417. return true
  418. }
  419. var (
  420. ErrPacketTooShort = errors.New("packet is too short")
  421. ErrUnknownIPVersion = errors.New("packet is an unknown ip version")
  422. ErrIPv4InvalidHeaderLength = errors.New("invalid ipv4 header length")
  423. ErrIPv4PacketTooShort = errors.New("ipv4 packet is too short")
  424. ErrIPv6PacketTooShort = errors.New("ipv6 packet is too short")
  425. ErrIPv6CouldNotFindPayload = errors.New("could not find payload in ipv6 packet")
  426. )
  427. // newPacket validates and parses the interesting bits for the firewall out of the ip and sub protocol headers
  428. func newPacket(data []byte, incoming bool, fp *firewall.Packet) error {
  429. if len(data) < 1 {
  430. return ErrPacketTooShort
  431. }
  432. version := int((data[0] >> 4) & 0x0f)
  433. switch version {
  434. case ipv4.Version:
  435. return parseV4(data, incoming, fp)
  436. case ipv6.Version:
  437. return parseV6(data, incoming, fp)
  438. }
  439. return ErrUnknownIPVersion
  440. }
  441. func parseV6(data []byte, incoming bool, fp *firewall.Packet) error {
  442. dataLen := len(data)
  443. if dataLen < ipv6.HeaderLen {
  444. return ErrIPv6PacketTooShort
  445. }
  446. if incoming {
  447. fp.RemoteAddr, _ = netip.AddrFromSlice(data[8:24])
  448. fp.LocalAddr, _ = netip.AddrFromSlice(data[24:40])
  449. } else {
  450. fp.LocalAddr, _ = netip.AddrFromSlice(data[8:24])
  451. fp.RemoteAddr, _ = netip.AddrFromSlice(data[24:40])
  452. }
  453. protoAt := 6 // NextHeader is at 6 bytes into the ipv6 header
  454. offset := ipv6.HeaderLen // Start at the end of the ipv6 header
  455. next := 0
  456. for {
  457. if protoAt >= dataLen {
  458. break
  459. }
  460. proto := layers.IPProtocol(data[protoAt])
  461. switch proto {
  462. case layers.IPProtocolICMPv6, layers.IPProtocolESP, layers.IPProtocolNoNextHeader:
  463. fp.Protocol = uint8(proto)
  464. fp.RemotePort = 0
  465. fp.LocalPort = 0
  466. fp.Fragment = false
  467. return nil
  468. case layers.IPProtocolTCP, layers.IPProtocolUDP:
  469. if dataLen < offset+4 {
  470. return ErrIPv6PacketTooShort
  471. }
  472. fp.Protocol = uint8(proto)
  473. if incoming {
  474. fp.RemotePort = binary.BigEndian.Uint16(data[offset : offset+2])
  475. fp.LocalPort = binary.BigEndian.Uint16(data[offset+2 : offset+4])
  476. } else {
  477. fp.LocalPort = binary.BigEndian.Uint16(data[offset : offset+2])
  478. fp.RemotePort = binary.BigEndian.Uint16(data[offset+2 : offset+4])
  479. }
  480. fp.Fragment = false
  481. return nil
  482. case layers.IPProtocolIPv6Fragment:
  483. // Fragment header is 8 bytes, need at least offset+4 to read the offset field
  484. if dataLen < offset+8 {
  485. return ErrIPv6PacketTooShort
  486. }
  487. // Check if this is the first fragment
  488. fragmentOffset := binary.BigEndian.Uint16(data[offset+2:offset+4]) &^ uint16(0x7) // Remove the reserved and M flag bits
  489. if fragmentOffset != 0 {
  490. // Non-first fragment, use what we have now and stop processing
  491. fp.Protocol = data[offset]
  492. fp.Fragment = true
  493. fp.RemotePort = 0
  494. fp.LocalPort = 0
  495. return nil
  496. }
  497. // The next loop should be the transport layer since we are the first fragment
  498. next = 8 // Fragment headers are always 8 bytes
  499. case layers.IPProtocolAH:
  500. // Auth headers, used by IPSec, have a different meaning for header length
  501. if dataLen <= offset+1 {
  502. break
  503. }
  504. next = int(data[offset+1]+2) << 2
  505. default:
  506. // Normal ipv6 header length processing
  507. if dataLen <= offset+1 {
  508. break
  509. }
  510. next = int(data[offset+1]+1) << 3
  511. }
  512. if next <= 0 {
  513. // Safety check, each ipv6 header has to be at least 8 bytes
  514. next = 8
  515. }
  516. protoAt = offset
  517. offset = offset + next
  518. }
  519. return ErrIPv6CouldNotFindPayload
  520. }
  521. func parseV4(data []byte, incoming bool, fp *firewall.Packet) error {
  522. // Do we at least have an ipv4 header worth of data?
  523. if len(data) < ipv4.HeaderLen {
  524. return ErrIPv4PacketTooShort
  525. }
  526. // Adjust our start position based on the advertised ip header length
  527. ihl := int(data[0]&0x0f) << 2
  528. // Well-formed ip header length?
  529. if ihl < ipv4.HeaderLen {
  530. return ErrIPv4InvalidHeaderLength
  531. }
  532. // Check if this is the second or further fragment of a fragmented packet.
  533. flagsfrags := binary.BigEndian.Uint16(data[6:8])
  534. fp.Fragment = (flagsfrags & 0x1FFF) != 0
  535. // Firewall handles protocol checks
  536. fp.Protocol = data[9]
  537. // Accounting for a variable header length, do we have enough data for our src/dst tuples?
  538. minLen := ihl
  539. if !fp.Fragment && fp.Protocol != firewall.ProtoICMP {
  540. minLen += minFwPacketLen
  541. }
  542. if len(data) < minLen {
  543. return ErrIPv4InvalidHeaderLength
  544. }
  545. // Firewall packets are locally oriented
  546. if incoming {
  547. fp.RemoteAddr, _ = netip.AddrFromSlice(data[12:16])
  548. fp.LocalAddr, _ = netip.AddrFromSlice(data[16:20])
  549. if fp.Fragment || fp.Protocol == firewall.ProtoICMP {
  550. fp.RemotePort = 0
  551. fp.LocalPort = 0
  552. } else {
  553. fp.RemotePort = binary.BigEndian.Uint16(data[ihl : ihl+2])
  554. fp.LocalPort = binary.BigEndian.Uint16(data[ihl+2 : ihl+4])
  555. }
  556. } else {
  557. fp.LocalAddr, _ = netip.AddrFromSlice(data[12:16])
  558. fp.RemoteAddr, _ = netip.AddrFromSlice(data[16:20])
  559. if fp.Fragment || fp.Protocol == firewall.ProtoICMP {
  560. fp.RemotePort = 0
  561. fp.LocalPort = 0
  562. } else {
  563. fp.LocalPort = binary.BigEndian.Uint16(data[ihl : ihl+2])
  564. fp.RemotePort = binary.BigEndian.Uint16(data[ihl+2 : ihl+4])
  565. }
  566. }
  567. return nil
  568. }
  569. func (f *Interface) decrypt(hostinfo *HostInfo, mc uint64, out []byte, packet []byte, h *header.H, nb []byte) ([]byte, error) {
  570. var err error
  571. out, err = hostinfo.ConnectionState.dKey.DecryptDanger(out, packet[:header.Len], packet[header.Len:], mc, nb)
  572. if err != nil {
  573. return nil, err
  574. }
  575. if !hostinfo.ConnectionState.window.Update(f.l, mc) {
  576. hostinfo.logger(f.l).WithField("header", h).
  577. Debugln("dropping out of window packet")
  578. return nil, errors.New("out of window packet")
  579. }
  580. return out, nil
  581. }
  582. func (f *Interface) decryptToTunDelayWrite(hostinfo *HostInfo, messageCounter uint64, out *packet.OutPacket, pkt *packet.Packet, inSegment []byte, fwPacket *firewall.Packet, nb []byte, q int, localCache firewall.ConntrackCache, now time.Time) bool {
  583. var err error
  584. seg, err := f.readers[q].AllocSeg(out, q)
  585. if err != nil {
  586. f.l.WithError(err).Errorln("decryptToTunDelayWrite: failed to allocate segment")
  587. return false
  588. }
  589. out.SegmentPayloads[seg] = out.SegmentPayloads[seg][:0]
  590. out.SegmentPayloads[seg], err = hostinfo.ConnectionState.dKey.DecryptDanger(out.SegmentPayloads[seg], inSegment[:header.Len], inSegment[header.Len:], messageCounter, nb)
  591. if err != nil {
  592. hostinfo.logger(f.l).WithError(err).Error("Failed to decrypt packet")
  593. return false
  594. }
  595. err = newPacket(out.SegmentPayloads[seg], true, fwPacket)
  596. if err != nil {
  597. hostinfo.logger(f.l).WithError(err).WithField("packet", out).
  598. Warnf("Error while validating inbound packet")
  599. return false
  600. }
  601. if !hostinfo.ConnectionState.window.Update(f.l, messageCounter) {
  602. hostinfo.logger(f.l).WithField("fwPacket", fwPacket).
  603. Debugln("dropping out of window packet")
  604. return false
  605. }
  606. dropReason := f.firewall.Drop(*fwPacket, true, hostinfo, f.pki.GetCAPool(), localCache, now)
  607. if dropReason != nil {
  608. // NOTE: We give `packet` as the `out` here since we already decrypted from it and we don't need it anymore
  609. // This gives us a buffer to build the reject packet in
  610. f.rejectOutside(out.SegmentPayloads[seg], hostinfo.ConnectionState, hostinfo, nb, inSegment, q)
  611. if f.l.Level >= logrus.DebugLevel {
  612. hostinfo.logger(f.l).WithField("fwPacket", fwPacket).
  613. WithField("reason", dropReason).
  614. Debugln("dropping inbound packet")
  615. }
  616. return false
  617. }
  618. f.connectionManager.In(hostinfo)
  619. pkt.OutLen += len(inSegment)
  620. out.Segments[seg] = out.Segments[seg][:len(out.SegmentHeaders[seg])+len(out.SegmentPayloads[seg])]
  621. return true
  622. }
  623. func (f *Interface) decryptToTun(hostinfo *HostInfo, messageCounter uint64, out []byte, packet []byte, fwPacket *firewall.Packet, nb []byte, q int, localCache firewall.ConntrackCache, now time.Time) bool {
  624. var err error
  625. out, err = hostinfo.ConnectionState.dKey.DecryptDanger(out, packet[:header.Len], packet[header.Len:], messageCounter, nb)
  626. if err != nil {
  627. hostinfo.logger(f.l).WithError(err).Error("Failed to decrypt packet")
  628. return false
  629. }
  630. err = newPacket(out, true, fwPacket)
  631. if err != nil {
  632. hostinfo.logger(f.l).WithError(err).WithField("packet", out).
  633. Warnf("Error while validating inbound packet")
  634. return false
  635. }
  636. if !hostinfo.ConnectionState.window.Update(f.l, messageCounter) {
  637. hostinfo.logger(f.l).WithField("fwPacket", fwPacket).
  638. Debugln("dropping out of window packet")
  639. return false
  640. }
  641. dropReason := f.firewall.Drop(*fwPacket, true, hostinfo, f.pki.GetCAPool(), localCache, now)
  642. if dropReason != nil {
  643. // NOTE: We give `packet` as the `out` here since we already decrypted from it and we don't need it anymore
  644. // This gives us a buffer to build the reject packet in
  645. f.rejectOutside(out, hostinfo.ConnectionState, hostinfo, nb, packet, q)
  646. if f.l.Level >= logrus.DebugLevel {
  647. hostinfo.logger(f.l).WithField("fwPacket", fwPacket).
  648. WithField("reason", dropReason).
  649. Debugln("dropping inbound packet")
  650. }
  651. return false
  652. }
  653. f.connectionManager.In(hostinfo)
  654. _, err = f.readers[q].Write(out)
  655. if err != nil {
  656. f.l.WithError(err).Error("Failed to write to tun")
  657. }
  658. return true
  659. }
  660. func (f *Interface) maybeSendRecvError(endpoint netip.AddrPort, index uint32) {
  661. if f.sendRecvErrorConfig.ShouldSendRecvError(endpoint) {
  662. f.sendRecvError(endpoint, index)
  663. }
  664. }
  665. func (f *Interface) sendRecvError(endpoint netip.AddrPort, index uint32) {
  666. f.messageMetrics.Tx(header.RecvError, 0, 1)
  667. b := header.Encode(make([]byte, header.Len), header.Version, header.RecvError, 0, index, 0)
  668. _ = f.outside.WriteTo(b, endpoint)
  669. if f.l.Level >= logrus.DebugLevel {
  670. f.l.WithField("index", index).
  671. WithField("udpAddr", endpoint).
  672. Debug("Recv error sent")
  673. }
  674. }
  675. func (f *Interface) handleRecvError(addr netip.AddrPort, h *header.H) {
  676. if f.l.Level >= logrus.DebugLevel {
  677. f.l.WithField("index", h.RemoteIndex).
  678. WithField("udpAddr", addr).
  679. Debug("Recv error received")
  680. }
  681. hostinfo := f.hostMap.QueryReverseIndex(h.RemoteIndex)
  682. if hostinfo == nil {
  683. f.l.WithField("remoteIndex", h.RemoteIndex).Debugln("Did not find remote index in main hostmap")
  684. return
  685. }
  686. if hostinfo.remote.IsValid() && hostinfo.remote != addr {
  687. f.l.Infoln("Someone spoofing recv_errors? ", addr, hostinfo.remote)
  688. return
  689. }
  690. f.closeTunnel(hostinfo)
  691. // We also delete it from pending hostmap to allow for fast reconnect.
  692. f.handshakeManager.DeleteHostInfo(hostinfo)
  693. }