123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515 |
- package nebula
- import (
- "net/netip"
- "time"
- "github.com/flynn/noise"
- "github.com/sirupsen/logrus"
- "github.com/slackhq/nebula/header"
- )
- // NOISE IX Handshakes
- // This function constructs a handshake packet, but does not actually send it
- // Sending is done by the handshake manager
- func ixHandshakeStage0(f *Interface, hh *HandshakeHostInfo) bool {
- err := f.handshakeManager.allocateIndex(hh)
- if err != nil {
- f.l.WithError(err).WithField("vpnIp", hh.hostinfo.vpnIp).
- WithField("handshake", m{"stage": 0, "style": "ix_psk0"}).Error("Failed to generate index")
- return false
- }
- certState := f.pki.GetCertState()
- ci := NewConnectionState(f.l, f.cipher, certState, true, noise.HandshakeIX, []byte{}, 0)
- hh.hostinfo.ConnectionState = ci
- hsProto := &NebulaHandshakeDetails{
- InitiatorIndex: hh.hostinfo.localIndexId,
- Time: uint64(time.Now().UnixNano()),
- Cert: certState.RawCertificateNoKey,
- }
- hsBytes := []byte{}
- hs := &NebulaHandshake{
- Details: hsProto,
- }
- hsBytes, err = hs.Marshal()
- if err != nil {
- f.l.WithError(err).WithField("vpnIp", hh.hostinfo.vpnIp).
- WithField("handshake", m{"stage": 0, "style": "ix_psk0"}).Error("Failed to marshal handshake message")
- return false
- }
- h := header.Encode(make([]byte, header.Len), header.Version, header.Handshake, header.HandshakeIXPSK0, 0, 1)
- msg, _, _, err := ci.H.WriteMessage(h, hsBytes)
- if err != nil {
- f.l.WithError(err).WithField("vpnIp", hh.hostinfo.vpnIp).
- WithField("handshake", m{"stage": 0, "style": "ix_psk0"}).Error("Failed to call noise.WriteMessage")
- return false
- }
- // We are sending handshake packet 1, so we don't expect to receive
- // handshake packet 1 from the responder
- ci.window.Update(f.l, 1)
- hh.hostinfo.HandshakePacket[0] = msg
- hh.ready = true
- return true
- }
- func ixHandshakeStage1(f *Interface, addr netip.AddrPort, via *ViaSender, packet []byte, h *header.H) {
- certState := f.pki.GetCertState()
- ci := NewConnectionState(f.l, f.cipher, certState, false, noise.HandshakeIX, []byte{}, 0)
- // Mark packet 1 as seen so it doesn't show up as missed
- ci.window.Update(f.l, 1)
- msg, _, _, err := ci.H.ReadMessage(nil, packet[header.Len:])
- if err != nil {
- f.l.WithError(err).WithField("udpAddr", addr).
- WithField("handshake", m{"stage": 1, "style": "ix_psk0"}).Error("Failed to call noise.ReadMessage")
- return
- }
- hs := &NebulaHandshake{}
- err = hs.Unmarshal(msg)
- /*
- l.Debugln("GOT INDEX: ", hs.Details.InitiatorIndex)
- */
- if err != nil || hs.Details == nil {
- f.l.WithError(err).WithField("udpAddr", addr).
- WithField("handshake", m{"stage": 1, "style": "ix_psk0"}).Error("Failed unmarshal handshake message")
- return
- }
- remoteCert, err := RecombineCertAndValidate(ci.H, hs.Details.Cert, f.pki.GetCAPool())
- if err != nil {
- e := f.l.WithError(err).WithField("udpAddr", addr).
- WithField("handshake", m{"stage": 1, "style": "ix_psk0"})
- if f.l.Level > logrus.DebugLevel {
- e = e.WithField("cert", remoteCert)
- }
- e.Info("Invalid certificate from host")
- return
- }
- vpnIp, ok := netip.AddrFromSlice(remoteCert.Details.Ips[0].IP)
- if !ok {
- e := f.l.WithError(err).WithField("udpAddr", addr).
- WithField("handshake", m{"stage": 1, "style": "ix_psk0"})
- if f.l.Level > logrus.DebugLevel {
- e = e.WithField("cert", remoteCert)
- }
- e.Info("Invalid vpn ip from host")
- return
- }
- vpnIp = vpnIp.Unmap()
- certName := remoteCert.Details.Name
- fingerprint, _ := remoteCert.Sha256Sum()
- issuer := remoteCert.Details.Issuer
- if vpnIp == f.myVpnNet.Addr() {
- f.l.WithField("vpnIp", vpnIp).WithField("udpAddr", addr).
- WithField("certName", certName).
- WithField("fingerprint", fingerprint).
- WithField("issuer", issuer).
- WithField("handshake", m{"stage": 1, "style": "ix_psk0"}).Error("Refusing to handshake with myself")
- return
- }
- if addr.IsValid() {
- if !f.lightHouse.GetRemoteAllowList().Allow(vpnIp, addr.Addr()) {
- f.l.WithField("vpnIp", vpnIp).WithField("udpAddr", addr).Debug("lighthouse.remote_allow_list denied incoming handshake")
- return
- }
- }
- myIndex, err := generateIndex(f.l)
- if err != nil {
- f.l.WithError(err).WithField("vpnIp", vpnIp).WithField("udpAddr", addr).
- WithField("certName", certName).
- WithField("fingerprint", fingerprint).
- WithField("issuer", issuer).
- WithField("handshake", m{"stage": 1, "style": "ix_psk0"}).Error("Failed to generate index")
- return
- }
- hostinfo := &HostInfo{
- ConnectionState: ci,
- localIndexId: myIndex,
- remoteIndexId: hs.Details.InitiatorIndex,
- vpnIp: vpnIp,
- HandshakePacket: make(map[uint8][]byte, 0),
- lastHandshakeTime: hs.Details.Time,
- relayState: RelayState{
- relays: nil,
- relayForByIp: map[netip.Addr]*Relay{},
- relayForByIdx: map[uint32]*Relay{},
- },
- }
- f.l.WithField("vpnIp", vpnIp).WithField("udpAddr", addr).
- WithField("certName", certName).
- WithField("fingerprint", fingerprint).
- WithField("issuer", issuer).
- WithField("initiatorIndex", hs.Details.InitiatorIndex).WithField("responderIndex", hs.Details.ResponderIndex).
- WithField("remoteIndex", h.RemoteIndex).WithField("handshake", m{"stage": 1, "style": "ix_psk0"}).
- Info("Handshake message received")
- hs.Details.ResponderIndex = myIndex
- hs.Details.Cert = certState.RawCertificateNoKey
- // Update the time in case their clock is way off from ours
- hs.Details.Time = uint64(time.Now().UnixNano())
- hsBytes, err := hs.Marshal()
- if err != nil {
- f.l.WithError(err).WithField("vpnIp", hostinfo.vpnIp).WithField("udpAddr", addr).
- WithField("certName", certName).
- WithField("fingerprint", fingerprint).
- WithField("issuer", issuer).
- WithField("handshake", m{"stage": 1, "style": "ix_psk0"}).Error("Failed to marshal handshake message")
- return
- }
- nh := header.Encode(make([]byte, header.Len), header.Version, header.Handshake, header.HandshakeIXPSK0, hs.Details.InitiatorIndex, 2)
- msg, dKey, eKey, err := ci.H.WriteMessage(nh, hsBytes)
- if err != nil {
- f.l.WithError(err).WithField("vpnIp", hostinfo.vpnIp).WithField("udpAddr", addr).
- WithField("certName", certName).
- WithField("fingerprint", fingerprint).
- WithField("issuer", issuer).
- WithField("handshake", m{"stage": 1, "style": "ix_psk0"}).Error("Failed to call noise.WriteMessage")
- return
- } else if dKey == nil || eKey == nil {
- f.l.WithField("vpnIp", hostinfo.vpnIp).WithField("udpAddr", addr).
- WithField("certName", certName).
- WithField("fingerprint", fingerprint).
- WithField("issuer", issuer).
- WithField("handshake", m{"stage": 1, "style": "ix_psk0"}).Error("Noise did not arrive at a key")
- return
- }
- hostinfo.HandshakePacket[0] = make([]byte, len(packet[header.Len:]))
- copy(hostinfo.HandshakePacket[0], packet[header.Len:])
- // Regardless of whether you are the sender or receiver, you should arrive here
- // and complete standing up the connection.
- hostinfo.HandshakePacket[2] = make([]byte, len(msg))
- copy(hostinfo.HandshakePacket[2], msg)
- // We are sending handshake packet 2, so we don't expect to receive
- // handshake packet 2 from the initiator.
- ci.window.Update(f.l, 2)
- ci.peerCert = remoteCert
- ci.dKey = NewNebulaCipherState(dKey)
- ci.eKey = NewNebulaCipherState(eKey)
- hostinfo.remotes = f.lightHouse.QueryCache(vpnIp)
- hostinfo.SetRemote(addr)
- hostinfo.CreateRemoteCIDR(remoteCert)
- existing, err := f.handshakeManager.CheckAndComplete(hostinfo, 0, f)
- if err != nil {
- switch err {
- case ErrAlreadySeen:
- // Update remote if preferred
- if existing.SetRemoteIfPreferred(f.hostMap, addr) {
- // Send a test packet to ensure the other side has also switched to
- // the preferred remote
- f.SendMessageToVpnIp(header.Test, header.TestRequest, vpnIp, []byte(""), make([]byte, 12, 12), make([]byte, mtu))
- }
- msg = existing.HandshakePacket[2]
- f.messageMetrics.Tx(header.Handshake, header.MessageSubType(msg[1]), 1)
- if addr.IsValid() {
- err := f.outside.WriteTo(msg, addr)
- if err != nil {
- f.l.WithField("vpnIp", existing.vpnIp).WithField("udpAddr", addr).
- WithField("handshake", m{"stage": 2, "style": "ix_psk0"}).WithField("cached", true).
- WithError(err).Error("Failed to send handshake message")
- } else {
- f.l.WithField("vpnIp", existing.vpnIp).WithField("udpAddr", addr).
- WithField("handshake", m{"stage": 2, "style": "ix_psk0"}).WithField("cached", true).
- Info("Handshake message sent")
- }
- return
- } else {
- if via == nil {
- f.l.Error("Handshake send failed: both addr and via are nil.")
- return
- }
- hostinfo.relayState.InsertRelayTo(via.relayHI.vpnIp)
- f.SendVia(via.relayHI, via.relay, msg, make([]byte, 12), make([]byte, mtu), false)
- f.l.WithField("vpnIp", existing.vpnIp).WithField("relay", via.relayHI.vpnIp).
- WithField("handshake", m{"stage": 2, "style": "ix_psk0"}).WithField("cached", true).
- Info("Handshake message sent")
- return
- }
- case ErrExistingHostInfo:
- // This means there was an existing tunnel and this handshake was older than the one we are currently based on
- f.l.WithField("vpnIp", vpnIp).WithField("udpAddr", addr).
- WithField("certName", certName).
- WithField("oldHandshakeTime", existing.lastHandshakeTime).
- WithField("newHandshakeTime", hostinfo.lastHandshakeTime).
- WithField("fingerprint", fingerprint).
- WithField("issuer", issuer).
- WithField("initiatorIndex", hs.Details.InitiatorIndex).WithField("responderIndex", hs.Details.ResponderIndex).
- WithField("remoteIndex", h.RemoteIndex).WithField("handshake", m{"stage": 1, "style": "ix_psk0"}).
- Info("Handshake too old")
- // Send a test packet to trigger an authenticated tunnel test, this should suss out any lingering tunnel issues
- f.SendMessageToVpnIp(header.Test, header.TestRequest, vpnIp, []byte(""), make([]byte, 12, 12), make([]byte, mtu))
- return
- case ErrLocalIndexCollision:
- // This means we failed to insert because of collision on localIndexId. Just let the next handshake packet retry
- f.l.WithField("vpnIp", vpnIp).WithField("udpAddr", addr).
- WithField("certName", certName).
- WithField("fingerprint", fingerprint).
- WithField("issuer", issuer).
- WithField("initiatorIndex", hs.Details.InitiatorIndex).WithField("responderIndex", hs.Details.ResponderIndex).
- WithField("remoteIndex", h.RemoteIndex).WithField("handshake", m{"stage": 1, "style": "ix_psk0"}).
- WithField("localIndex", hostinfo.localIndexId).WithField("collision", existing.vpnIp).
- Error("Failed to add HostInfo due to localIndex collision")
- return
- default:
- // Shouldn't happen, but just in case someone adds a new error type to CheckAndComplete
- // And we forget to update it here
- f.l.WithError(err).WithField("vpnIp", vpnIp).WithField("udpAddr", addr).
- WithField("certName", certName).
- WithField("fingerprint", fingerprint).
- WithField("issuer", issuer).
- WithField("initiatorIndex", hs.Details.InitiatorIndex).WithField("responderIndex", hs.Details.ResponderIndex).
- WithField("remoteIndex", h.RemoteIndex).WithField("handshake", m{"stage": 1, "style": "ix_psk0"}).
- Error("Failed to add HostInfo to HostMap")
- return
- }
- }
- // Do the send
- f.messageMetrics.Tx(header.Handshake, header.MessageSubType(msg[1]), 1)
- if addr.IsValid() {
- err = f.outside.WriteTo(msg, addr)
- if err != nil {
- f.l.WithField("vpnIp", vpnIp).WithField("udpAddr", addr).
- WithField("certName", certName).
- WithField("fingerprint", fingerprint).
- WithField("issuer", issuer).
- WithField("initiatorIndex", hs.Details.InitiatorIndex).WithField("responderIndex", hs.Details.ResponderIndex).
- WithField("remoteIndex", h.RemoteIndex).WithField("handshake", m{"stage": 2, "style": "ix_psk0"}).
- WithError(err).Error("Failed to send handshake")
- } else {
- f.l.WithField("vpnIp", vpnIp).WithField("udpAddr", addr).
- WithField("certName", certName).
- WithField("fingerprint", fingerprint).
- WithField("issuer", issuer).
- WithField("initiatorIndex", hs.Details.InitiatorIndex).WithField("responderIndex", hs.Details.ResponderIndex).
- WithField("remoteIndex", h.RemoteIndex).WithField("handshake", m{"stage": 2, "style": "ix_psk0"}).
- Info("Handshake message sent")
- }
- } else {
- if via == nil {
- f.l.Error("Handshake send failed: both addr and via are nil.")
- return
- }
- hostinfo.relayState.InsertRelayTo(via.relayHI.vpnIp)
- // I successfully received a handshake. Just in case I marked this tunnel as 'Disestablished', ensure
- // it's correctly marked as working.
- via.relayHI.relayState.UpdateRelayForByIdxState(via.remoteIdx, Established)
- f.SendVia(via.relayHI, via.relay, msg, make([]byte, 12), make([]byte, mtu), false)
- f.l.WithField("vpnIp", vpnIp).WithField("relay", via.relayHI.vpnIp).
- WithField("certName", certName).
- WithField("fingerprint", fingerprint).
- WithField("issuer", issuer).
- WithField("initiatorIndex", hs.Details.InitiatorIndex).WithField("responderIndex", hs.Details.ResponderIndex).
- WithField("remoteIndex", h.RemoteIndex).WithField("handshake", m{"stage": 2, "style": "ix_psk0"}).
- Info("Handshake message sent")
- }
- f.connectionManager.AddTrafficWatch(hostinfo)
- hostinfo.remotes.ResetBlockedRemotes()
- return
- }
- func ixHandshakeStage2(f *Interface, addr netip.AddrPort, via *ViaSender, hh *HandshakeHostInfo, packet []byte, h *header.H) bool {
- if hh == nil {
- // Nothing here to tear down, got a bogus stage 2 packet
- return true
- }
- hh.Lock()
- defer hh.Unlock()
- hostinfo := hh.hostinfo
- if addr.IsValid() {
- if !f.lightHouse.GetRemoteAllowList().Allow(hostinfo.vpnIp, addr.Addr()) {
- f.l.WithField("vpnIp", hostinfo.vpnIp).WithField("udpAddr", addr).Debug("lighthouse.remote_allow_list denied incoming handshake")
- return false
- }
- }
- ci := hostinfo.ConnectionState
- msg, eKey, dKey, err := ci.H.ReadMessage(nil, packet[header.Len:])
- if err != nil {
- f.l.WithError(err).WithField("vpnIp", hostinfo.vpnIp).WithField("udpAddr", addr).
- WithField("handshake", m{"stage": 2, "style": "ix_psk0"}).WithField("header", h).
- Error("Failed to call noise.ReadMessage")
- // We don't want to tear down the connection on a bad ReadMessage because it could be an attacker trying
- // to DOS us. Every other error condition after should to allow a possible good handshake to complete in the
- // near future
- return false
- } else if dKey == nil || eKey == nil {
- f.l.WithField("vpnIp", hostinfo.vpnIp).WithField("udpAddr", addr).
- WithField("handshake", m{"stage": 2, "style": "ix_psk0"}).
- Error("Noise did not arrive at a key")
- // This should be impossible in IX but just in case, if we get here then there is no chance to recover
- // the handshake state machine. Tear it down
- return true
- }
- hs := &NebulaHandshake{}
- err = hs.Unmarshal(msg)
- if err != nil || hs.Details == nil {
- f.l.WithError(err).WithField("vpnIp", hostinfo.vpnIp).WithField("udpAddr", addr).
- WithField("handshake", m{"stage": 2, "style": "ix_psk0"}).Error("Failed unmarshal handshake message")
- // The handshake state machine is complete, if things break now there is no chance to recover. Tear down and start again
- return true
- }
- remoteCert, err := RecombineCertAndValidate(ci.H, hs.Details.Cert, f.pki.GetCAPool())
- if err != nil {
- e := f.l.WithError(err).WithField("vpnIp", hostinfo.vpnIp).WithField("udpAddr", addr).
- WithField("handshake", m{"stage": 2, "style": "ix_psk0"})
- if f.l.Level > logrus.DebugLevel {
- e = e.WithField("cert", remoteCert)
- }
- e.Error("Invalid certificate from host")
- // The handshake state machine is complete, if things break now there is no chance to recover. Tear down and start again
- return true
- }
- vpnIp, ok := netip.AddrFromSlice(remoteCert.Details.Ips[0].IP)
- if !ok {
- e := f.l.WithError(err).WithField("udpAddr", addr).
- WithField("handshake", m{"stage": 2, "style": "ix_psk0"})
- if f.l.Level > logrus.DebugLevel {
- e = e.WithField("cert", remoteCert)
- }
- e.Info("Invalid vpn ip from host")
- return true
- }
- vpnIp = vpnIp.Unmap()
- certName := remoteCert.Details.Name
- fingerprint, _ := remoteCert.Sha256Sum()
- issuer := remoteCert.Details.Issuer
- // Ensure the right host responded
- if vpnIp != hostinfo.vpnIp {
- f.l.WithField("intendedVpnIp", hostinfo.vpnIp).WithField("haveVpnIp", vpnIp).
- WithField("udpAddr", addr).WithField("certName", certName).
- WithField("handshake", m{"stage": 2, "style": "ix_psk0"}).
- Info("Incorrect host responded to handshake")
- // Release our old handshake from pending, it should not continue
- f.handshakeManager.DeleteHostInfo(hostinfo)
- // Create a new hostinfo/handshake for the intended vpn ip
- f.handshakeManager.StartHandshake(hostinfo.vpnIp, func(newHH *HandshakeHostInfo) {
- //TODO: this doesnt know if its being added or is being used for caching a packet
- // Block the current used address
- newHH.hostinfo.remotes = hostinfo.remotes
- newHH.hostinfo.remotes.BlockRemote(addr)
- // Get the correct remote list for the host we did handshake with
- hostinfo.remotes = f.lightHouse.QueryCache(vpnIp)
- f.l.WithField("blockedUdpAddrs", newHH.hostinfo.remotes.CopyBlockedRemotes()).WithField("vpnIp", vpnIp).
- WithField("remotes", newHH.hostinfo.remotes.CopyAddrs(f.hostMap.GetPreferredRanges())).
- Info("Blocked addresses for handshakes")
- // Swap the packet store to benefit the original intended recipient
- newHH.packetStore = hh.packetStore
- hh.packetStore = []*cachedPacket{}
- // Finally, put the correct vpn ip in the host info, tell them to close the tunnel, and return true to tear down
- hostinfo.vpnIp = vpnIp
- f.sendCloseTunnel(hostinfo)
- })
- return true
- }
- // Mark packet 2 as seen so it doesn't show up as missed
- ci.window.Update(f.l, 2)
- duration := time.Since(hh.startTime).Nanoseconds()
- f.l.WithField("vpnIp", vpnIp).WithField("udpAddr", addr).
- WithField("certName", certName).
- WithField("fingerprint", fingerprint).
- WithField("issuer", issuer).
- WithField("initiatorIndex", hs.Details.InitiatorIndex).WithField("responderIndex", hs.Details.ResponderIndex).
- WithField("remoteIndex", h.RemoteIndex).WithField("handshake", m{"stage": 2, "style": "ix_psk0"}).
- WithField("durationNs", duration).
- WithField("sentCachedPackets", len(hh.packetStore)).
- Info("Handshake message received")
- hostinfo.remoteIndexId = hs.Details.ResponderIndex
- hostinfo.lastHandshakeTime = hs.Details.Time
- // Store their cert and our symmetric keys
- ci.peerCert = remoteCert
- ci.dKey = NewNebulaCipherState(dKey)
- ci.eKey = NewNebulaCipherState(eKey)
- // Make sure the current udpAddr being used is set for responding
- if addr.IsValid() {
- hostinfo.SetRemote(addr)
- } else {
- hostinfo.relayState.InsertRelayTo(via.relayHI.vpnIp)
- }
- // Build up the radix for the firewall if we have subnets in the cert
- hostinfo.CreateRemoteCIDR(remoteCert)
- // Complete our handshake and update metrics, this will replace any existing tunnels for this vpnIp
- f.handshakeManager.Complete(hostinfo, f)
- f.connectionManager.AddTrafficWatch(hostinfo)
- if f.l.Level >= logrus.DebugLevel {
- hostinfo.logger(f.l).Debugf("Sending %d stored packets", len(hh.packetStore))
- }
- if len(hh.packetStore) > 0 {
- nb := make([]byte, 12, 12)
- out := make([]byte, mtu)
- for _, cp := range hh.packetStore {
- cp.callback(cp.messageType, cp.messageSubType, hostinfo, cp.packet, nb, out)
- }
- f.cachedPacketMetrics.sent.Inc(int64(len(hh.packetStore)))
- }
- hostinfo.remotes.ResetBlockedRemotes()
- f.metricHandshakes.Update(duration)
- return false
- }
|