wireguard.go 6.6 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231
  1. package proxy
  2. import (
  3. "context"
  4. "errors"
  5. "fmt"
  6. "log"
  7. "net"
  8. "runtime"
  9. "strings"
  10. "github.com/c-robinson/iplib"
  11. "github.com/gravitl/netmaker/nm-proxy/common"
  12. "github.com/gravitl/netmaker/nm-proxy/models"
  13. "github.com/gravitl/netmaker/nm-proxy/packet"
  14. "github.com/gravitl/netmaker/nm-proxy/server"
  15. "github.com/gravitl/netmaker/nm-proxy/wg"
  16. )
  17. func NewProxy(config Config) *Proxy {
  18. p := &Proxy{Config: config}
  19. p.Ctx, p.Cancel = context.WithCancel(context.Background())
  20. return p
  21. }
  22. // proxyToRemote proxies everything from Wireguard to the RemoteKey peer
  23. func (p *Proxy) ProxyToRemote() {
  24. go func() {
  25. <-p.Ctx.Done()
  26. log.Println("Closing connection for: ", p.LocalConn.LocalAddr().String())
  27. p.LocalConn.Close()
  28. }()
  29. buf := make([]byte, 65000)
  30. for {
  31. select {
  32. case <-p.Ctx.Done():
  33. log.Printf("----------> stopped proxying to remote peer %s due to closed connection\n", p.Config.RemoteKey)
  34. if runtime.GOOS == "darwin" {
  35. host, _, err := net.SplitHostPort(p.LocalConn.LocalAddr().String())
  36. if err != nil {
  37. log.Println("Failed to split host: ", p.LocalConn.LocalAddr().String(), err)
  38. return
  39. }
  40. if host != "127.0.0.1" {
  41. _, err = common.RunCmd(fmt.Sprintf("ifconfig lo0 -alias %s 255.255.255.255", host), true)
  42. if err != nil {
  43. log.Println("Failed to add alias: ", err)
  44. }
  45. }
  46. }
  47. return
  48. default:
  49. n, err := p.LocalConn.Read(buf)
  50. if err != nil {
  51. log.Println("ERRR READ: ", err)
  52. continue
  53. }
  54. //go func(buf []byte, n int) {
  55. ifaceConf := common.WgIFaceMap[p.Config.WgInterface.Name]
  56. if peerI, ok := ifaceConf.PeerMap[p.Config.RemoteKey]; ok {
  57. var srcPeerKeyHash, dstPeerKeyHash string
  58. if !p.Config.IsExtClient {
  59. buf, n, srcPeerKeyHash, dstPeerKeyHash = packet.ProcessPacketBeforeSending(buf, n, ifaceConf.Iface.PublicKey.String(), peerI.Key)
  60. if err != nil {
  61. log.Println("failed to process pkt before sending: ", err)
  62. }
  63. } else {
  64. // unknown peer to proxy -> check if extclient and handle it
  65. // consume handshake message for ext clients
  66. // msgType := binary.LittleEndian.Uint32(buf[:n])
  67. // switch msgType {
  68. // case models.MessageInitiationType:
  69. // devPriv, devPubkey, err := packet.GetDeviceKeys(common.InterfaceName)
  70. // if err == nil {
  71. // err := packet.ConsumeHandshakeInitiationMsg(true, buf[:n], p.RemoteConn, devPubkey, devPriv)
  72. // if err != nil {
  73. // log.Println("---------> @@@ failed to decode HS: ", err)
  74. // }
  75. // } else {
  76. // log.Println("failed to get device keys: ", err)
  77. // }
  78. // case models.MessageResponseType:
  79. // devPriv, devPubkey, err := packet.GetDeviceKeys(common.InterfaceName)
  80. // if err == nil {
  81. // err := packet.ConsumeMessageResponse(true, buf[:n], p.RemoteConn, devPubkey, devPriv)
  82. // if err != nil {
  83. // log.Println("---------> @@@ failed to decode HS: ", err)
  84. // }
  85. // } else {
  86. // log.Println("failed to get device keys: ", err)
  87. // }
  88. // }
  89. }
  90. log.Printf("PROXING TO REMOTE!!!---> %s >>>>> %s >>>>> %s [[ SrcPeerHash: %s, DstPeerHash: %s ]]\n",
  91. p.LocalConn.LocalAddr(), server.NmProxyServer.Server.LocalAddr().String(), p.RemoteConn.String(), srcPeerKeyHash, dstPeerKeyHash)
  92. } else {
  93. log.Printf("Peer: %s not found in config\n", p.Config.RemoteKey)
  94. p.Cancel()
  95. return
  96. }
  97. //test(n, buf)
  98. _, err = server.NmProxyServer.Server.WriteToUDP(buf[:n], p.RemoteConn)
  99. if err != nil {
  100. log.Println("Failed to send to remote: ", err)
  101. }
  102. //}(buf, n)
  103. }
  104. }
  105. }
  106. func test(n int, buffer []byte) {
  107. data := buffer[:n]
  108. srcKeyHash := data[n-32 : n-16]
  109. dstKeyHash := data[n-16:]
  110. log.Printf("--------> TEST PACKET [ SRCKEYHASH: %x ], [ DSTKEYHASH: %x ] \n", srcKeyHash, dstKeyHash)
  111. }
  112. func (p *Proxy) updateEndpoint() error {
  113. udpAddr, err := net.ResolveUDPAddr("udp", p.LocalConn.LocalAddr().String())
  114. if err != nil {
  115. return err
  116. }
  117. // add local proxy connection as a Wireguard peer
  118. log.Printf("---> ####### Updating Peer: %+v\n", p.Config.PeerConf)
  119. err = p.Config.WgInterface.UpdatePeer(p.Config.RemoteKey, p.Config.PeerConf.AllowedIPs, wg.DefaultWgKeepAlive,
  120. udpAddr, p.Config.PeerConf.PresharedKey)
  121. if err != nil {
  122. return err
  123. }
  124. return nil
  125. }
  126. func (p *Proxy) Start(remoteConn *net.UDPAddr) error {
  127. p.RemoteConn = remoteConn
  128. var err error
  129. //log.Printf("----> WGIFACE: %+v\n", p.Config.WgInterface)
  130. addr, err := GetFreeIp(models.DefaultCIDR, p.Config.WgInterface.Port)
  131. if err != nil {
  132. log.Println("Failed to get freeIp: ", err)
  133. return err
  134. }
  135. wgListenAddr, err := GetInterfaceListenAddr(p.Config.WgInterface.Port)
  136. if err != nil {
  137. log.Println("failed to get wg listen addr: ", err)
  138. return err
  139. }
  140. if runtime.GOOS == "darwin" {
  141. wgListenAddr.IP = net.ParseIP(addr)
  142. }
  143. //log.Println("--------->#### Wg Listen Addr: ", wgListenAddr.String())
  144. p.LocalConn, err = net.DialUDP("udp", &net.UDPAddr{
  145. IP: net.ParseIP(addr),
  146. Port: models.NmProxyPort,
  147. }, wgListenAddr)
  148. if err != nil {
  149. log.Printf("failed dialing to local Wireguard port,Err: %v\n", err)
  150. return err
  151. }
  152. log.Printf("Dialing to local Wireguard port %s --> %s\n", p.LocalConn.LocalAddr().String(), p.LocalConn.RemoteAddr().String())
  153. err = p.updateEndpoint()
  154. if err != nil {
  155. log.Printf("error while updating Wireguard peer endpoint [%s] %v\n", p.Config.RemoteKey, err)
  156. return err
  157. }
  158. go p.ProxyToRemote()
  159. return nil
  160. }
  161. func GetFreeIp(cidrAddr string, dstPort int) (string, error) {
  162. //ensure AddressRange is valid
  163. if dstPort == 0 {
  164. return "", errors.New("dst port should be set")
  165. }
  166. if _, _, err := net.ParseCIDR(cidrAddr); err != nil {
  167. log.Println("UniqueAddress encountered an error")
  168. return "", err
  169. }
  170. net4 := iplib.Net4FromStr(cidrAddr)
  171. newAddrs := net4.FirstAddress()
  172. log.Println("COUNT: ", net4.Count())
  173. for {
  174. if runtime.GOOS == "darwin" {
  175. _, err := common.RunCmd(fmt.Sprintf("ifconfig lo0 alias %s 255.255.255.255", newAddrs.String()), true)
  176. if err != nil {
  177. log.Println("Failed to add alias: ", err)
  178. }
  179. }
  180. conn, err := net.DialUDP("udp", &net.UDPAddr{
  181. IP: net.ParseIP(newAddrs.String()),
  182. Port: models.NmProxyPort,
  183. }, &net.UDPAddr{
  184. IP: net.ParseIP("127.0.0.1"),
  185. Port: dstPort,
  186. })
  187. if err != nil {
  188. log.Println("----> GetFreeIP ERR: ", err)
  189. if strings.Contains(err.Error(), "can't assign requested address") ||
  190. strings.Contains(err.Error(), "address already in use") || strings.Contains(err.Error(), "cannot assign requested address") {
  191. var nErr error
  192. newAddrs, nErr = net4.NextIP(newAddrs)
  193. if nErr != nil {
  194. return "", nErr
  195. }
  196. } else {
  197. return "", err
  198. }
  199. }
  200. if err == nil {
  201. conn.Close()
  202. return newAddrs.String(), nil
  203. }
  204. }
  205. }