sym-encryption #1
| @@ -1,20 +0,0 @@ | |||||||
| package fasttime |  | ||||||
|  |  | ||||||
| import ( |  | ||||||
| 	"sync/atomic" |  | ||||||
| 	"time" |  | ||||||
| ) |  | ||||||
|  |  | ||||||
| var _timestamp int64 = time.Now().Unix() |  | ||||||
|  |  | ||||||
| func init() { |  | ||||||
| 	go func() { |  | ||||||
| 		for range time.Tick(1100 * time.Millisecond) { |  | ||||||
| 			atomic.StoreInt64(&_timestamp, time.Now().Unix()) |  | ||||||
| 		} |  | ||||||
| 	}() |  | ||||||
| } |  | ||||||
|  |  | ||||||
| func Now() int64 { |  | ||||||
| 	return atomic.LoadInt64(&_timestamp) |  | ||||||
| } |  | ||||||
| @@ -1,18 +0,0 @@ | |||||||
| package fasttime |  | ||||||
|  |  | ||||||
| import ( |  | ||||||
| 	"testing" |  | ||||||
| 	"time" |  | ||||||
| ) |  | ||||||
|  |  | ||||||
| func BenchmarkNow(b *testing.B) { |  | ||||||
| 	for i := 0; i < b.N; i++ { |  | ||||||
| 		Now() |  | ||||||
| 	} |  | ||||||
| } |  | ||||||
|  |  | ||||||
| func BenchmarkTimeUnix(b *testing.B) { |  | ||||||
| 	for i := 0; i < b.N; i++ { |  | ||||||
| 		time.Now().Unix() |  | ||||||
| 	} |  | ||||||
| } |  | ||||||
| @@ -1,12 +1,12 @@ | |||||||
| package db | package db | ||||||
|  |  | ||||||
| import "vppn/fasttime" | import "time" | ||||||
|  |  | ||||||
| func Session_UpdateLastSeenAt( | func Session_UpdateLastSeenAt( | ||||||
| 	tx TX, | 	tx TX, | ||||||
| 	id string, | 	id string, | ||||||
| ) (err error) { | ) (err error) { | ||||||
| 	_, err = tx.Exec("UPDATE sessions SET LastSeenAt=? WHERE SessionID=?", fasttime.Now(), id) | 	_, err = tx.Exec("UPDATE sessions SET LastSeenAt=? WHERE SessionID=?", time.Now().Unix(), id) | ||||||
| 	return err | 	return err | ||||||
| } | } | ||||||
|  |  | ||||||
|   | |||||||
							
								
								
									
										71
									
								
								node/addrdiscovery.go
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										71
									
								
								node/addrdiscovery.go
									
									
									
									
									
										Normal file
									
								
							| @@ -0,0 +1,71 @@ | |||||||
|  | package node | ||||||
|  |  | ||||||
|  | import ( | ||||||
|  | 	"log" | ||||||
|  | 	"net/netip" | ||||||
|  | 	"time" | ||||||
|  | ) | ||||||
|  |  | ||||||
|  | func addrDiscoveryServer() { | ||||||
|  | 	var ( | ||||||
|  | 		buf1 = make([]byte, bufferSize) | ||||||
|  | 		buf2 = make([]byte, bufferSize) | ||||||
|  | 	) | ||||||
|  |  | ||||||
|  | 	for { | ||||||
|  | 		pkt := <-discoveryPackets | ||||||
|  |  | ||||||
|  | 		p, ok := pkt.Payload.(addrDiscoveryPacket) | ||||||
|  | 		if !ok { | ||||||
|  | 			continue | ||||||
|  | 		} | ||||||
|  |  | ||||||
|  | 		route := routingTable[pkt.SrcIP].Load() | ||||||
|  | 		if route == nil || !route.RemoteAddr.IsValid() { | ||||||
|  | 			continue | ||||||
|  | 		} | ||||||
|  |  | ||||||
|  | 		_sendControlPacket(addrDiscoveryPacket{ | ||||||
|  | 			TraceID: p.TraceID, | ||||||
|  | 			ToAddr:  pkt.SrcAddr, | ||||||
|  | 		}, *route, buf1, buf2) | ||||||
|  | 	} | ||||||
|  | } | ||||||
|  |  | ||||||
|  | func addrDiscoveryClient() { | ||||||
|  | 	var ( | ||||||
|  | 		checkInterval = 8 * time.Second | ||||||
|  | 		timer         = time.NewTimer(4 * time.Second) | ||||||
|  |  | ||||||
|  | 		buf1 = make([]byte, bufferSize) | ||||||
|  | 		buf2 = make([]byte, bufferSize) | ||||||
|  |  | ||||||
|  | 		addrPacket addrDiscoveryPacket | ||||||
|  | 		lAddr      netip.AddrPort | ||||||
|  | 	) | ||||||
|  |  | ||||||
|  | 	for { | ||||||
|  | 		select { | ||||||
|  | 		case pkt := <-discoveryPackets: | ||||||
|  | 			p, ok := pkt.Payload.(addrDiscoveryPacket) | ||||||
|  | 			if !ok || p.TraceID != addrPacket.TraceID || !p.ToAddr.IsValid() || p.ToAddr == lAddr { | ||||||
|  | 				continue | ||||||
|  | 			} | ||||||
|  |  | ||||||
|  | 			log.Printf("Discovered local address: %v", p.ToAddr) | ||||||
|  | 			lAddr = p.ToAddr | ||||||
|  | 			localAddr.Store(&p.ToAddr) | ||||||
|  |  | ||||||
|  | 		case <-timer.C: | ||||||
|  | 			timer.Reset(checkInterval) | ||||||
|  |  | ||||||
|  | 			route := getRelayRoute() | ||||||
|  | 			if route == nil { | ||||||
|  | 				continue | ||||||
|  | 			} | ||||||
|  |  | ||||||
|  | 			addrPacket.TraceID = newTraceID() | ||||||
|  | 			_sendControlPacket(addrPacket, *route, buf1, buf2) | ||||||
|  | 		} | ||||||
|  | 	} | ||||||
|  | } | ||||||
| @@ -1,8 +0,0 @@ | |||||||
| package node |  | ||||||
|  |  | ||||||
| import "net/netip" |  | ||||||
|  |  | ||||||
| func addrIsValid(in []byte) bool { |  | ||||||
| 	_, ok := netip.AddrFromSlice(in) |  | ||||||
| 	return ok |  | ||||||
| } |  | ||||||
| @@ -1,10 +1,24 @@ | |||||||
| package node | package node | ||||||
|  |  | ||||||
| import ( | import ( | ||||||
| 	"log" | 	"net/netip" | ||||||
| 	"sync/atomic" | 	"sync/atomic" | ||||||
| ) | ) | ||||||
|  |  | ||||||
|  | func getRelayRoute() *peerRoute { | ||||||
|  | 	if ip := relayIP.Load(); ip != nil { | ||||||
|  | 		return routingTable[*ip].Load() | ||||||
|  | 	} | ||||||
|  | 	return nil | ||||||
|  | } | ||||||
|  |  | ||||||
|  | func getLocalAddr() netip.AddrPort { | ||||||
|  | 	if a := localAddr.Load(); a != nil { | ||||||
|  | 		return *a | ||||||
|  | 	} | ||||||
|  | 	return netip.AddrPort{} | ||||||
|  | } | ||||||
|  |  | ||||||
| func _sendControlPacket(pkt interface{ Marshal([]byte) []byte }, route peerRoute, buf1, buf2 []byte) { | func _sendControlPacket(pkt interface{ Marshal([]byte) []byte }, route peerRoute, buf1, buf2 []byte) { | ||||||
| 	buf := pkt.Marshal(buf2) | 	buf := pkt.Marshal(buf2) | ||||||
| 	h := header{ | 	h := header{ | ||||||
| @@ -15,12 +29,12 @@ func _sendControlPacket(pkt interface{ Marshal([]byte) []byte }, route peerRoute | |||||||
| 	} | 	} | ||||||
| 	buf = route.ControlCipher.Encrypt(h, buf, buf1) | 	buf = route.ControlCipher.Encrypt(h, buf, buf1) | ||||||
|  |  | ||||||
| 	if route.RelayIP == 0 { | 	if route.Direct { | ||||||
| 		_conn.WriteTo(buf, route.RemoteAddr) | 		_conn.WriteTo(buf, route.RemoteAddr) | ||||||
| 		return | 		return | ||||||
| 	} | 	} | ||||||
|  |  | ||||||
| 	_relayPacket(route.RelayIP, route.IP, buf, buf2) | 	_relayPacket(route.IP, buf, buf2) | ||||||
| } | } | ||||||
|  |  | ||||||
| func _sendDataPacket(route *peerRoute, pkt, buf1, buf2 []byte) { | func _sendDataPacket(route *peerRoute, pkt, buf1, buf2 []byte) { | ||||||
| @@ -33,18 +47,17 @@ func _sendDataPacket(route *peerRoute, pkt, buf1, buf2 []byte) { | |||||||
|  |  | ||||||
| 	enc := route.DataCipher.Encrypt(h, pkt, buf1) | 	enc := route.DataCipher.Encrypt(h, pkt, buf1) | ||||||
|  |  | ||||||
| 	if route.RelayIP == 0 { | 	if route.Direct { | ||||||
| 		_conn.WriteTo(enc, route.RemoteAddr) | 		_conn.WriteTo(enc, route.RemoteAddr) | ||||||
| 		return | 		return | ||||||
| 	} | 	} | ||||||
|  |  | ||||||
| 	_relayPacket(route.RelayIP, route.IP, enc, buf2) | 	_relayPacket(route.IP, enc, buf2) | ||||||
| } | } | ||||||
|  |  | ||||||
| func _relayPacket(relayIP, destIP byte, data, buf []byte) { | func _relayPacket(destIP byte, data, buf []byte) { | ||||||
| 	relayRoute := routingTable[relayIP].Load() | 	relayRoute := getRelayRoute() | ||||||
| 	if !relayRoute.Up || !relayRoute.Relay { | 	if relayRoute == nil || !relayRoute.Up || !relayRoute.Relay { | ||||||
| 		log.Print("Failed to send data packet: relay not available.") |  | ||||||
| 		return | 		return | ||||||
| 	} | 	} | ||||||
|  |  | ||||||
|   | |||||||
| @@ -3,11 +3,10 @@ package node | |||||||
| import ( | import ( | ||||||
| 	"net/netip" | 	"net/netip" | ||||||
| 	"sync/atomic" | 	"sync/atomic" | ||||||
|  | 	"time" | ||||||
| 	"vppn/m" | 	"vppn/m" | ||||||
| ) | ) | ||||||
|  |  | ||||||
| var zeroAddrPort = netip.AddrPort{} |  | ||||||
|  |  | ||||||
| const ( | const ( | ||||||
| 	bufferSize            = 1536 | 	bufferSize            = 1536 | ||||||
| 	if_mtu                = 1200 | 	if_mtu                = 1200 | ||||||
| @@ -20,13 +19,10 @@ type peerRoute struct { | |||||||
| 	IP            byte | 	IP            byte | ||||||
| 	Up            bool // True if data can be sent on the route. | 	Up            bool // True if data can be sent on the route. | ||||||
| 	Relay         bool // True if the peer is a relay. | 	Relay         bool // True if the peer is a relay. | ||||||
|  | 	Direct        bool // True if this is a direct connection. | ||||||
| 	ControlCipher *controlCipher | 	ControlCipher *controlCipher | ||||||
| 	DataCipher    *dataCipher | 	DataCipher    *dataCipher | ||||||
| 	RemoteAddr    netip.AddrPort // Remote address if directly connected. | 	RemoteAddr    netip.AddrPort // Remote address if directly connected. | ||||||
| 	// TODO: Remove this and use global localAddr and relayIP. |  | ||||||
| 	// Replace w/ a Direct boolean. |  | ||||||
| 	LocalAddr netip.AddrPort // Local address as seen by the remote. |  | ||||||
| 	RelayIP   byte           // Non-zero if we should relay. |  | ||||||
| } | } | ||||||
|  |  | ||||||
| var ( | var ( | ||||||
| @@ -34,7 +30,6 @@ var ( | |||||||
| 	netName    string | 	netName    string | ||||||
| 	localIP    byte | 	localIP    byte | ||||||
| 	localPub   bool | 	localPub   bool | ||||||
| 	localAddr  netip.AddrPort |  | ||||||
| 	privateKey []byte | 	privateKey []byte | ||||||
|  |  | ||||||
| 	// Shared interface for writing. | 	// Shared interface for writing. | ||||||
| @@ -44,22 +39,48 @@ var ( | |||||||
| 	_conn *connWriter | 	_conn *connWriter | ||||||
|  |  | ||||||
| 	// Counters for sending to each peer. | 	// Counters for sending to each peer. | ||||||
| 	sendCounters [256]uint64 | 	sendCounters [256]uint64 = func() (out [256]uint64) { | ||||||
|  | 		for i := range out { | ||||||
|  | 			out[i] = uint64(time.Now().Unix()<<30 + 1) | ||||||
|  | 		} | ||||||
|  | 		return | ||||||
|  | 	}() | ||||||
|  |  | ||||||
| 	// Duplicate checkers for incoming packets. | 	// Duplicate checkers for incoming packets. | ||||||
| 	dupChecks [256]*dupCheck | 	dupChecks [256]*dupCheck = func() (out [256]*dupCheck) { | ||||||
|  | 		for i := range out { | ||||||
|  | 			out[i] = newDupCheck(0) | ||||||
|  | 		} | ||||||
|  | 		return | ||||||
|  | 	}() | ||||||
|  |  | ||||||
| 	// Channels for incoming control packets. | 	// Channels for incoming control packets. | ||||||
| 	controlPackets [256]chan controlPacket | 	controlPackets [256]chan controlPacket = func() (out [256]chan controlPacket) { | ||||||
|  | 		for i := range out { | ||||||
|  | 			out[i] = make(chan controlPacket, 256) | ||||||
|  | 		} | ||||||
|  | 		return | ||||||
|  | 	}() | ||||||
|  |  | ||||||
| 	// Channels for incoming peer updates from the hub. | 	// Channels for incoming peer updates from the hub. | ||||||
| 	peerUpdates [256]chan *m.Peer | 	peerUpdates [256]chan *m.Peer = func() (out [256]chan *m.Peer) { | ||||||
|  | 		for i := range out { | ||||||
|  | 			out[i] = make(chan *m.Peer) | ||||||
|  | 		} | ||||||
|  | 		return | ||||||
|  | 	}() | ||||||
|  |  | ||||||
| 	// Global routing table. | 	// Global routing table. | ||||||
| 	routingTable [256]*atomic.Pointer[peerRoute] | 	routingTable [256]*atomic.Pointer[peerRoute] = func() (out [256]*atomic.Pointer[peerRoute]) { | ||||||
|  | 		for i := range out { | ||||||
|  | 			out[i] = &atomic.Pointer[peerRoute]{} | ||||||
|  | 			out[i].Store(&peerRoute{}) | ||||||
|  | 		} | ||||||
|  | 		return | ||||||
|  | 	}() | ||||||
|  |  | ||||||
| 	// TODO: use relay for local address discovery. This should be new stream ID, | 	// Managed by the relayManager. | ||||||
| 	// managed by a single thread. | 	discoveryPackets chan controlPacket | ||||||
| 	// localAddr *atomic.Pointer[netip.AddrPort] | 	localAddr        *atomic.Pointer[netip.AddrPort] // May be nil. | ||||||
| 	// relayIP *atomic.Pointer[byte] | 	relayIP          *atomic.Pointer[byte]           // May be nil. | ||||||
| ) | ) | ||||||
|   | |||||||
| @@ -14,7 +14,7 @@ const ( | |||||||
|  |  | ||||||
| type header struct { | type header struct { | ||||||
| 	StreamID byte | 	StreamID byte | ||||||
| 	Counter  uint64 // Init with fasttime.Now() << 30 to ensure monotonic. | 	Counter  uint64 // Init with time.Now().Unix << 30 to ensure monotonic. | ||||||
| 	SourceIP byte | 	SourceIP byte | ||||||
| 	DestIP   byte | 	DestIP   byte | ||||||
| } | } | ||||||
|   | |||||||
							
								
								
									
										63
									
								
								node/main.go
									
									
									
									
									
								
							
							
						
						
									
										63
									
								
								node/main.go
									
									
									
									
									
								
							| @@ -12,7 +12,6 @@ import ( | |||||||
| 	"os" | 	"os" | ||||||
| 	"runtime/debug" | 	"runtime/debug" | ||||||
| 	"sync/atomic" | 	"sync/atomic" | ||||||
| 	"time" |  | ||||||
| 	"vppn/m" | 	"vppn/m" | ||||||
| ) | ) | ||||||
|  |  | ||||||
| @@ -104,36 +103,34 @@ func main(listenIP string, port uint16) { | |||||||
| 	} | 	} | ||||||
|  |  | ||||||
| 	// Intialize globals. | 	// Intialize globals. | ||||||
|  | 	_iface = newIFWriter(iface) | ||||||
|  | 	_conn = newConnWriter(conn) | ||||||
|  |  | ||||||
| 	localIP = config.PeerIP | 	localIP = config.PeerIP | ||||||
|  | 	discoveryPackets = make(chan controlPacket, 256) | ||||||
|  | 	localAddr = &atomic.Pointer[netip.AddrPort]{} | ||||||
|  | 	relayIP = &atomic.Pointer[byte]{} | ||||||
|  |  | ||||||
| 	ip, ok := netip.AddrFromSlice(config.PublicIP) | 	ip, ok := netip.AddrFromSlice(config.PublicIP) | ||||||
| 	if ok { | 	if ok { | ||||||
| 		localPub = true | 		localPub = true | ||||||
| 		localAddr = netip.AddrPortFrom(ip, config.Port) | 		addr := netip.AddrPortFrom(ip, config.Port) | ||||||
|  | 		localAddr.Store(&addr) | ||||||
| 	} | 	} | ||||||
|  |  | ||||||
| 	privateKey = config.PrivKey | 	privateKey = config.PrivKey | ||||||
|  |  | ||||||
| 	_iface = newIFWriter(iface) |  | ||||||
| 	_conn = newConnWriter(conn) |  | ||||||
|  |  | ||||||
| 	for i := range 256 { |  | ||||||
| 		sendCounters[i] = uint64(time.Now().Unix()<<30) + 1 |  | ||||||
| 		dupChecks[i] = newDupCheck(0) |  | ||||||
| 		controlPackets[i] = make(chan controlPacket, 256) |  | ||||||
| 		peerUpdates[i] = make(chan *m.Peer) |  | ||||||
| 		routingTable[i] = &atomic.Pointer[peerRoute]{} |  | ||||||
| 		route := peerRoute{IP: byte(i)} |  | ||||||
| 		routingTable[i].Store(&route) |  | ||||||
| 	} |  | ||||||
|  |  | ||||||
| 	// Start supervisors. | 	// Start supervisors. | ||||||
| 	for i := range 256 { | 	for i := range 256 { | ||||||
| 		go newPeerSupervisor(i).Run() | 		go newPeerSupervisor(i).Run() | ||||||
| 	} | 	} | ||||||
|  |  | ||||||
| 	// -------------------- | 	if localPub { | ||||||
|  | 		go addrDiscoveryServer() | ||||||
|  | 	} else { | ||||||
|  | 		go addrDiscoveryClient() | ||||||
|  | 		go relayManager() | ||||||
|  | 	} | ||||||
| 	go newHubPoller(config).Run() | 	go newHubPoller(config).Run() | ||||||
| 	go readFromConn(conn) | 	go readFromConn(conn) | ||||||
| 	readFromIFace(iface) | 	readFromIFace(iface) | ||||||
| @@ -173,6 +170,8 @@ func readFromConn(conn *net.UDPConn) { | |||||||
| 			log.Fatalf("Failed to read from UDP port: %v", err) | 			log.Fatalf("Failed to read from UDP port: %v", err) | ||||||
| 		} | 		} | ||||||
|  |  | ||||||
|  | 		remoteAddr = netip.AddrPortFrom(remoteAddr.Addr().Unmap(), remoteAddr.Port()) | ||||||
|  |  | ||||||
| 		data = buf[:n] | 		data = buf[:n] | ||||||
|  |  | ||||||
| 		if n < headerSize { | 		if n < headerSize { | ||||||
| @@ -184,8 +183,6 @@ func readFromConn(conn *net.UDPConn) { | |||||||
| 		case controlStreamID: | 		case controlStreamID: | ||||||
| 			handleControlPacket(remoteAddr, h, data, decBuf) | 			handleControlPacket(remoteAddr, h, data, decBuf) | ||||||
|  |  | ||||||
| 			// TODO: discoveryStreamID |  | ||||||
|  |  | ||||||
| 		case dataStreamID: | 		case dataStreamID: | ||||||
| 			handleDataPacket(h, data, decBuf) | 			handleDataPacket(h, data, decBuf) | ||||||
|  |  | ||||||
| @@ -198,7 +195,7 @@ func readFromConn(conn *net.UDPConn) { | |||||||
| func handleControlPacket(addr netip.AddrPort, h header, data, decBuf []byte) { | func handleControlPacket(addr netip.AddrPort, h header, data, decBuf []byte) { | ||||||
| 	route := routingTable[h.SourceIP].Load() | 	route := routingTable[h.SourceIP].Load() | ||||||
| 	if route.ControlCipher == nil { | 	if route.ControlCipher == nil { | ||||||
| 		log.Printf("Not connected (control).") | 		//log.Printf("Not connected (control).") | ||||||
| 		return | 		return | ||||||
| 	} | 	} | ||||||
|  |  | ||||||
| @@ -209,17 +206,17 @@ func handleControlPacket(addr netip.AddrPort, h header, data, decBuf []byte) { | |||||||
|  |  | ||||||
| 	out, ok := route.ControlCipher.Decrypt(data, decBuf) | 	out, ok := route.ControlCipher.Decrypt(data, decBuf) | ||||||
| 	if !ok { | 	if !ok { | ||||||
| 		log.Printf("Failed to decrypt control packet.") | 		//log.Printf("Failed to decrypt control packet.") | ||||||
| 		return | 		return | ||||||
| 	} | 	} | ||||||
|  |  | ||||||
| 	if len(out) == 0 { | 	if len(out) == 0 { | ||||||
| 		log.Printf("Empty control packet from: %d", h.SourceIP) | 		//log.Printf("Empty control packet from: %d", h.SourceIP) | ||||||
| 		return | 		return | ||||||
| 	} | 	} | ||||||
|  |  | ||||||
| 	if dupChecks[h.SourceIP].IsDup(h.Counter) { | 	if dupChecks[h.SourceIP].IsDup(h.Counter) { | ||||||
| 		log.Printf("[%03d] Duplicate control packet: %d", h.SourceIP, h.Counter) | 		//log.Printf("[%03d] Duplicate control packet: %d", h.SourceIP, h.Counter) | ||||||
| 		return | 		return | ||||||
| 	} | 	} | ||||||
|  |  | ||||||
| @@ -233,17 +230,29 @@ func handleControlPacket(addr netip.AddrPort, h header, data, decBuf []byte) { | |||||||
| 		return | 		return | ||||||
| 	} | 	} | ||||||
|  |  | ||||||
|  | 	switch pkt.Payload.(type) { | ||||||
|  |  | ||||||
|  | 	case addrDiscoveryPacket: | ||||||
|  | 		select { | ||||||
|  | 		case discoveryPackets <- pkt: | ||||||
|  | 		default: | ||||||
|  | 			log.Printf("Dropping discovery packet.") | ||||||
|  | 		} | ||||||
|  |  | ||||||
|  | 	default: | ||||||
| 		select { | 		select { | ||||||
| 		case controlPackets[h.SourceIP] <- pkt: | 		case controlPackets[h.SourceIP] <- pkt: | ||||||
| 		default: | 		default: | ||||||
| 			log.Printf("Dropping control packet.") | 			log.Printf("Dropping control packet.") | ||||||
| 		} | 		} | ||||||
|  | 	} | ||||||
|  |  | ||||||
| } | } | ||||||
|  |  | ||||||
| func handleDataPacket(h header, data []byte, decBuf []byte) { | func handleDataPacket(h header, data []byte, decBuf []byte) { | ||||||
| 	route := routingTable[h.SourceIP].Load() | 	route := routingTable[h.SourceIP].Load() | ||||||
| 	if !route.Up { | 	if !route.Up { | ||||||
| 		log.Printf("Not connected (recv).") | 		//log.Printf("Not connected (recv).") | ||||||
| 		return | 		return | ||||||
| 	} | 	} | ||||||
|  |  | ||||||
| @@ -254,7 +263,7 @@ func handleDataPacket(h header, data []byte, decBuf []byte) { | |||||||
| 	} | 	} | ||||||
|  |  | ||||||
| 	if dupChecks[h.SourceIP].IsDup(h.Counter) { | 	if dupChecks[h.SourceIP].IsDup(h.Counter) { | ||||||
| 		log.Printf("[%03d] Duplicate data packet: %d", h.SourceIP, h.Counter) | 		//log.Printf("[%03d] Duplicate data packet: %d", h.SourceIP, h.Counter) | ||||||
| 		return | 		return | ||||||
| 	} | 	} | ||||||
|  |  | ||||||
| @@ -264,8 +273,8 @@ func handleDataPacket(h header, data []byte, decBuf []byte) { | |||||||
| 	} | 	} | ||||||
|  |  | ||||||
| 	destRoute := routingTable[h.DestIP].Load() | 	destRoute := routingTable[h.DestIP].Load() | ||||||
| 	if !destRoute.Up || destRoute.RelayIP != 0 { | 	if !destRoute.Up { | ||||||
| 		log.Printf("Not connected (relay)") | 		log.Printf("Not connected (relay): %v", destRoute) | ||||||
| 		return | 		return | ||||||
| 	} | 	} | ||||||
|  |  | ||||||
|   | |||||||
| @@ -3,16 +3,14 @@ package node | |||||||
| import ( | import ( | ||||||
| 	"net/netip" | 	"net/netip" | ||||||
| 	"sync/atomic" | 	"sync/atomic" | ||||||
|  | 	"time" | ||||||
| 	"unsafe" | 	"unsafe" | ||||||
| 	"vppn/fasttime" |  | ||||||
| ) | ) | ||||||
|  |  | ||||||
| var ( | var traceIDCounter uint64 = uint64(time.Now().Unix()<<30) + 1 | ||||||
| 	traceIDCounter uint64 |  | ||||||
| ) |  | ||||||
|  |  | ||||||
| func newTraceID() uint64 { | func newTraceID() uint64 { | ||||||
| 	return uint64(fasttime.Now()<<30) + atomic.AddUint64(&traceIDCounter, 1) | 	return atomic.AddUint64(&traceIDCounter, 1) | ||||||
| } | } | ||||||
|  |  | ||||||
| // ---------------------------------------------------------------------------- | // ---------------------------------------------------------------------------- | ||||||
| @@ -151,9 +149,9 @@ func (r *binReader) AddrPort(x *netip.AddrPort) *binReader { | |||||||
| 	if !r.hasBytes(18) { | 	if !r.hasBytes(18) { | ||||||
| 		return r | 		return r | ||||||
| 	} | 	} | ||||||
| 	addr := netip.AddrFrom16(([16]byte)(r.b[r.i : r.i+16])) | 	addr := netip.AddrFrom16(([16]byte)(r.b[r.i : r.i+16])).Unmap() | ||||||
| 	addr = addr.Unmap() |  | ||||||
| 	r.i += 16 | 	r.i += 16 | ||||||
|  |  | ||||||
| 	var port uint16 | 	var port uint16 | ||||||
| 	r.Uint16(&port) | 	r.Uint16(&port) | ||||||
| 	*x = netip.AddrPortFrom(addr, port) | 	*x = netip.AddrPortFrom(addr, port) | ||||||
|   | |||||||
| @@ -2,7 +2,6 @@ package node | |||||||
|  |  | ||||||
| import ( | import ( | ||||||
| 	"errors" | 	"errors" | ||||||
| 	"log" |  | ||||||
| 	"net/netip" | 	"net/netip" | ||||||
| ) | ) | ||||||
|  |  | ||||||
| @@ -16,6 +15,7 @@ const ( | |||||||
| 	packetTypeSynAck | 	packetTypeSynAck | ||||||
| 	packetTypeAck | 	packetTypeAck | ||||||
| 	packetTypeProbe | 	packetTypeProbe | ||||||
|  | 	packetTypeAddrDiscovery | ||||||
| ) | ) | ||||||
|  |  | ||||||
| // ---------------------------------------------------------------------------- | // ---------------------------------------------------------------------------- | ||||||
| @@ -33,8 +33,9 @@ func (p *controlPacket) ParsePayload(buf []byte) (err error) { | |||||||
| 	case packetTypeSynAck: | 	case packetTypeSynAck: | ||||||
| 		p.Payload, err = parseSynAckPacket(buf) | 		p.Payload, err = parseSynAckPacket(buf) | ||||||
| 	case packetTypeProbe: | 	case packetTypeProbe: | ||||||
| 		log.Printf("Got probe...") |  | ||||||
| 		p.Payload, err = parseProbePacket(buf) | 		p.Payload, err = parseProbePacket(buf) | ||||||
|  | 	case packetTypeAddrDiscovery: | ||||||
|  | 		p.Payload, err = parseAddrDiscoveryPacket(buf) | ||||||
| 	default: | 	default: | ||||||
| 		return errUnknownPacketType | 		return errUnknownPacketType | ||||||
| 	} | 	} | ||||||
| @@ -46,7 +47,7 @@ func (p *controlPacket) ParsePayload(buf []byte) (err error) { | |||||||
| type synPacket struct { | type synPacket struct { | ||||||
| 	TraceID   uint64   // TraceID to match response w/ request. | 	TraceID   uint64   // TraceID to match response w/ request. | ||||||
| 	SharedKey [32]byte // Our shared key. | 	SharedKey [32]byte // Our shared key. | ||||||
| 	RelayIP   byte | 	Direct    bool | ||||||
| 	FromAddr  netip.AddrPort // The client's sending address. | 	FromAddr  netip.AddrPort // The client's sending address. | ||||||
| } | } | ||||||
|  |  | ||||||
| @@ -55,7 +56,7 @@ func (p synPacket) Marshal(buf []byte) []byte { | |||||||
| 		Byte(packetTypeSyn). | 		Byte(packetTypeSyn). | ||||||
| 		Uint64(p.TraceID). | 		Uint64(p.TraceID). | ||||||
| 		SharedKey(p.SharedKey). | 		SharedKey(p.SharedKey). | ||||||
| 		Byte(p.RelayIP). | 		Bool(p.Direct). | ||||||
| 		AddrPort(p.FromAddr). | 		AddrPort(p.FromAddr). | ||||||
| 		Build() | 		Build() | ||||||
| } | } | ||||||
| @@ -64,7 +65,7 @@ func parseSynPacket(buf []byte) (p synPacket, err error) { | |||||||
| 	err = newBinReader(buf[1:]). | 	err = newBinReader(buf[1:]). | ||||||
| 		Uint64(&p.TraceID). | 		Uint64(&p.TraceID). | ||||||
| 		SharedKey(&p.SharedKey). | 		SharedKey(&p.SharedKey). | ||||||
| 		Byte(&p.RelayIP). | 		Bool(&p.Direct). | ||||||
| 		AddrPort(&p.FromAddr). | 		AddrPort(&p.FromAddr). | ||||||
| 		Error() | 		Error() | ||||||
| 	return | 	return | ||||||
| @@ -75,7 +76,6 @@ func parseSynPacket(buf []byte) (p synPacket, err error) { | |||||||
| type synAckPacket struct { | type synAckPacket struct { | ||||||
| 	TraceID  uint64 | 	TraceID  uint64 | ||||||
| 	FromAddr netip.AddrPort | 	FromAddr netip.AddrPort | ||||||
| 	ToAddr   netip.AddrPort |  | ||||||
| } | } | ||||||
|  |  | ||||||
| func (p synAckPacket) Marshal(buf []byte) []byte { | func (p synAckPacket) Marshal(buf []byte) []byte { | ||||||
| @@ -83,7 +83,6 @@ func (p synAckPacket) Marshal(buf []byte) []byte { | |||||||
| 		Byte(packetTypeSynAck). | 		Byte(packetTypeSynAck). | ||||||
| 		Uint64(p.TraceID). | 		Uint64(p.TraceID). | ||||||
| 		AddrPort(p.FromAddr). | 		AddrPort(p.FromAddr). | ||||||
| 		AddrPort(p.ToAddr). |  | ||||||
| 		Build() | 		Build() | ||||||
| } | } | ||||||
|  |  | ||||||
| @@ -91,7 +90,6 @@ func parseSynAckPacket(buf []byte) (p synAckPacket, err error) { | |||||||
| 	err = newBinReader(buf[1:]). | 	err = newBinReader(buf[1:]). | ||||||
| 		Uint64(&p.TraceID). | 		Uint64(&p.TraceID). | ||||||
| 		AddrPort(&p.FromAddr). | 		AddrPort(&p.FromAddr). | ||||||
| 		AddrPort(&p.ToAddr). |  | ||||||
| 		Error() | 		Error() | ||||||
| 	return | 	return | ||||||
| } | } | ||||||
| @@ -100,10 +98,25 @@ func parseSynAckPacket(buf []byte) (p synAckPacket, err error) { | |||||||
|  |  | ||||||
| type addrDiscoveryPacket struct { | type addrDiscoveryPacket struct { | ||||||
| 	TraceID uint64 | 	TraceID uint64 | ||||||
| 	FromAddr netip.AddrPort |  | ||||||
| 	ToAddr  netip.AddrPort | 	ToAddr  netip.AddrPort | ||||||
| } | } | ||||||
|  |  | ||||||
|  | func (p addrDiscoveryPacket) Marshal(buf []byte) []byte { | ||||||
|  | 	return newBinWriter(buf). | ||||||
|  | 		Byte(packetTypeAddrDiscovery). | ||||||
|  | 		Uint64(p.TraceID). | ||||||
|  | 		AddrPort(p.ToAddr). | ||||||
|  | 		Build() | ||||||
|  | } | ||||||
|  |  | ||||||
|  | func parseAddrDiscoveryPacket(buf []byte) (p addrDiscoveryPacket, err error) { | ||||||
|  | 	err = newBinReader(buf[1:]). | ||||||
|  | 		Uint64(&p.TraceID). | ||||||
|  | 		AddrPort(&p.ToAddr). | ||||||
|  | 		Error() | ||||||
|  | 	return | ||||||
|  | } | ||||||
|  |  | ||||||
| // ---------------------------------------------------------------------------- | // ---------------------------------------------------------------------------- | ||||||
|  |  | ||||||
| // A probeReqPacket is sent from a client to a server to determine if direct | // A probeReqPacket is sent from a client to a server to determine if direct | ||||||
|   | |||||||
| @@ -10,6 +10,8 @@ import ( | |||||||
| func TestPacketSyn(t *testing.T) { | func TestPacketSyn(t *testing.T) { | ||||||
| 	in := synPacket{ | 	in := synPacket{ | ||||||
| 		TraceID:  newTraceID(), | 		TraceID:  newTraceID(), | ||||||
|  | 		RelayIP:  4, | ||||||
|  | 		FromAddr: netip.AddrPortFrom(netip.AddrFrom4([4]byte{4, 5, 6, 7}), 22), | ||||||
| 	} | 	} | ||||||
| 	rand.Read(in.SharedKey[:]) | 	rand.Read(in.SharedKey[:]) | ||||||
|  |  | ||||||
| @@ -26,7 +28,7 @@ func TestPacketSyn(t *testing.T) { | |||||||
| func TestPacketSynAck(t *testing.T) { | func TestPacketSynAck(t *testing.T) { | ||||||
| 	in := synAckPacket{ | 	in := synAckPacket{ | ||||||
| 		TraceID:  newTraceID(), | 		TraceID:  newTraceID(), | ||||||
| 		RecvAddr: netip.AddrPort{}, | 		FromAddr: netip.AddrPortFrom(netip.AddrFrom4([4]byte{4, 5, 6, 7}), 22), | ||||||
| 	} | 	} | ||||||
|  |  | ||||||
| 	out, err := parseSynAckPacket(in.Marshal(make([]byte, bufferSize))) | 	out, err := parseSynAckPacket(in.Marshal(make([]byte, bufferSize))) | ||||||
| @@ -38,18 +40,3 @@ func TestPacketSynAck(t *testing.T) { | |||||||
| 		t.Fatal("\n", in, "\n", out) | 		t.Fatal("\n", in, "\n", out) | ||||||
| 	} | 	} | ||||||
| } | } | ||||||
|  |  | ||||||
| func TestPacketAck(t *testing.T) { |  | ||||||
| 	in := ackPacket{ |  | ||||||
| 		TraceID: newTraceID(), |  | ||||||
| 	} |  | ||||||
|  |  | ||||||
| 	out, err := parseAckPacket(in.Marshal(make([]byte, bufferSize))) |  | ||||||
| 	if err != nil { |  | ||||||
| 		t.Fatal(err) |  | ||||||
| 	} |  | ||||||
|  |  | ||||||
| 	if !reflect.DeepEqual(in, out) { |  | ||||||
| 		t.Fatal("\n", in, "\n", out) |  | ||||||
| 	} |  | ||||||
| } |  | ||||||
|   | |||||||
| @@ -3,7 +3,6 @@ package node | |||||||
| import ( | import ( | ||||||
| 	"fmt" | 	"fmt" | ||||||
| 	"log" | 	"log" | ||||||
| 	"math/rand" |  | ||||||
| 	"net/netip" | 	"net/netip" | ||||||
| 	"sync/atomic" | 	"sync/atomic" | ||||||
| 	"time" | 	"time" | ||||||
| @@ -11,10 +10,8 @@ import ( | |||||||
| ) | ) | ||||||
|  |  | ||||||
| const ( | const ( | ||||||
| 	dialTimeout     = 8 * time.Second | 	pingInterval    = 8 * time.Second | ||||||
| 	connectTimeout  = 6 * time.Second | 	timeoutInterval = 25 * time.Second | ||||||
| 	pingInterval    = 6 * time.Second |  | ||||||
| 	timeoutInterval = 20 * time.Second |  | ||||||
| ) | ) | ||||||
|  |  | ||||||
| // ---------------------------------------------------------------------------- | // ---------------------------------------------------------------------------- | ||||||
| @@ -64,6 +61,7 @@ func (s *peerSupervisor) Run() { | |||||||
|  |  | ||||||
| func (s *peerSupervisor) sendControlPacket(pkt interface{ Marshal([]byte) []byte }) { | func (s *peerSupervisor) sendControlPacket(pkt interface{ Marshal([]byte) []byte }) { | ||||||
| 	_sendControlPacket(pkt, s.staged, s.buf1, s.buf2) | 	_sendControlPacket(pkt, s.staged, s.buf1, s.buf2) | ||||||
|  | 	time.Sleep(500 * time.Millisecond) // Rate limit packets. | ||||||
| } | } | ||||||
|  |  | ||||||
| func (s *peerSupervisor) sendControlPacketTo( | func (s *peerSupervisor) sendControlPacketTo( | ||||||
| @@ -75,25 +73,10 @@ func (s *peerSupervisor) sendControlPacketTo( | |||||||
| 		return | 		return | ||||||
| 	} | 	} | ||||||
| 	route := s.staged | 	route := s.staged | ||||||
| 	route.RelayIP = 0 | 	route.Direct = true | ||||||
| 	route.RemoteAddr = addr | 	route.RemoteAddr = addr | ||||||
| 	_sendControlPacket(pkt, route, s.buf1, s.buf2) | 	_sendControlPacket(pkt, route, s.buf1, s.buf2) | ||||||
| } | 	time.Sleep(500 * time.Millisecond) // Rate limit packets. | ||||||
|  |  | ||||||
| // ---------------------------------------------------------------------------- |  | ||||||
|  |  | ||||||
| func (s *peerSupervisor) getLocalAddr() netip.AddrPort { |  | ||||||
| 	if localPub { |  | ||||||
| 		return localAddr |  | ||||||
| 	} |  | ||||||
|  |  | ||||||
| 	if s.staged.RelayIP != 0 { |  | ||||||
| 		if addr := routingTable[s.staged.RelayIP].Load().LocalAddr; addr.IsValid() { |  | ||||||
| 			return addr |  | ||||||
| 		} |  | ||||||
| 	} |  | ||||||
|  |  | ||||||
| 	return s.staged.LocalAddr |  | ||||||
| } | } | ||||||
|  |  | ||||||
| // ---------------------------------------------------------------------------- | // ---------------------------------------------------------------------------- | ||||||
| @@ -138,18 +121,21 @@ func (s *peerSupervisor) _peerUpdate(peer *m.Peer) stateFunc { | |||||||
| 	if ip, isValid := netip.AddrFromSlice(peer.PublicIP); isValid { | 	if ip, isValid := netip.AddrFromSlice(peer.PublicIP); isValid { | ||||||
| 		s.remotePub = true | 		s.remotePub = true | ||||||
| 		s.staged.Relay = peer.Relay | 		s.staged.Relay = peer.Relay | ||||||
|  | 		s.staged.Direct = true | ||||||
| 		s.staged.RemoteAddr = netip.AddrPortFrom(ip, peer.Port) | 		s.staged.RemoteAddr = netip.AddrPortFrom(ip, peer.Port) | ||||||
|  | 	} else if localPub { | ||||||
|  | 		s.staged.Direct = true | ||||||
| 	} | 	} | ||||||
|  |  | ||||||
| 	if s.remotePub == localPub { | 	if s.remotePub == localPub { | ||||||
| 		if localIP < s.remoteIP { | 		if localIP < s.remoteIP { | ||||||
| 			return s.server | 			return s.server | ||||||
| 		} | 		} | ||||||
| 		return s.clientInit | 		return s.client | ||||||
| 	} | 	} | ||||||
|  |  | ||||||
| 	if s.remotePub { | 	if s.remotePub { | ||||||
| 		return s.clientInit | 		return s.client | ||||||
| 	} | 	} | ||||||
| 	return s.server | 	return s.server | ||||||
| } | } | ||||||
| @@ -157,9 +143,14 @@ func (s *peerSupervisor) _peerUpdate(peer *m.Peer) stateFunc { | |||||||
| // ---------------------------------------------------------------------------- | // ---------------------------------------------------------------------------- | ||||||
|  |  | ||||||
| func (s *peerSupervisor) server() stateFunc { | func (s *peerSupervisor) server() stateFunc { | ||||||
| 	s.logf("STATE: server") | 	logf := func(format string, args ...any) { s.logf("SERVER "+format, args...) } | ||||||
|  |  | ||||||
| 	var syn synPacket | 	logf("DOWN") | ||||||
|  |  | ||||||
|  | 	var ( | ||||||
|  | 		syn          synPacket | ||||||
|  | 		timeoutTimer = time.NewTimer(timeoutInterval) | ||||||
|  | 	) | ||||||
|  |  | ||||||
| 	for { | 	for { | ||||||
| 		select { | 		select { | ||||||
| @@ -172,110 +163,80 @@ func (s *peerSupervisor) server() stateFunc { | |||||||
| 			case synPacket: | 			case synPacket: | ||||||
| 				// Before we can respond to this packet, we need to make sure the | 				// Before we can respond to this packet, we need to make sure the | ||||||
| 				// route is setup properly. | 				// route is setup properly. | ||||||
| 				if p.TraceID != syn.TraceID { | 				// | ||||||
|  | 				// The client will update the syn's TraceID whenever there's a change. | ||||||
|  | 				// The server will follow the client's request. | ||||||
|  | 				if p.TraceID != syn.TraceID || !s.staged.Up { | ||||||
|  | 					if p.Direct { | ||||||
|  | 						logf("UP - Direct") | ||||||
|  | 					} else { | ||||||
|  | 						logf("UP - Relayed") | ||||||
|  | 					} | ||||||
|  |  | ||||||
| 					syn = p | 					syn = p | ||||||
| 					s.staged.Up = true | 					s.staged.Up = true | ||||||
| 					s.staged.RemoteAddr = pkt.SrcAddr | 					s.staged.Direct = syn.Direct | ||||||
| 					s.staged.DataCipher = newDataCipherFromKey(syn.SharedKey) | 					s.staged.DataCipher = newDataCipherFromKey(syn.SharedKey) | ||||||
| 					s.staged.RelayIP = syn.RelayIP | 					s.staged.RemoteAddr = pkt.SrcAddr | ||||||
| 					s.staged.LocalAddr = s.getLocalAddr() |  | ||||||
| 					s.publish() | 					s.publish() | ||||||
| 				} | 				} | ||||||
|  |  | ||||||
| 				// We should always respond. | 				// We should always respond. | ||||||
| 				s.sendControlPacket(synAckPacket{ | 				ack := synAckPacket{ | ||||||
| 					TraceID:  syn.TraceID, | 					TraceID:  syn.TraceID, | ||||||
| 					FromAddr: s.staged.LocalAddr, | 					FromAddr: getLocalAddr(), | ||||||
| 					ToAddr:   pkt.SrcAddr, |  | ||||||
| 				}) |  | ||||||
|  |  | ||||||
| 				// If we're relayed, attempt to probe the client. |  | ||||||
| 				if s.staged.RelayIP != 0 && syn.FromAddr.IsValid() { |  | ||||||
| 					probe := probePacket{TraceID: newTraceID()} |  | ||||||
| 					s.logf("SERVER sending probe %v: %v", probe, syn.FromAddr) |  | ||||||
| 					s.sendControlPacketTo(probe, syn.FromAddr) |  | ||||||
| 				} | 				} | ||||||
|  | 				s.sendControlPacket(ack) | ||||||
|  |  | ||||||
| 			case probePacket: | 				if s.staged.Direct { | ||||||
| 				s.logf("SERVER got probe: %v", p) |  | ||||||
| 				s.logf("SERVER sending probe: %v", pkt.SrcAddr) |  | ||||||
| 				s.sendControlPacketTo(probePacket{TraceID: p.TraceID}, pkt.SrcAddr) |  | ||||||
| 			} |  | ||||||
| 		} |  | ||||||
| 	} |  | ||||||
| } |  | ||||||
|  |  | ||||||
| // ---------------------------------------------------------------------------- |  | ||||||
|  |  | ||||||
| func (s *peerSupervisor) clientInit() stateFunc { |  | ||||||
| 	s.logf("STATE: client-init") |  | ||||||
| 	if !s.remotePub { |  | ||||||
| 		return s.clientSelectRelay |  | ||||||
| 	} |  | ||||||
|  |  | ||||||
| 	return s.client |  | ||||||
| } |  | ||||||
|  |  | ||||||
| // ---------------------------------------------------------------------------- |  | ||||||
|  |  | ||||||
| func (s *peerSupervisor) clientSelectRelay() stateFunc { |  | ||||||
| 	s.logf("STATE: client-select-relay") |  | ||||||
|  |  | ||||||
| 	timer := time.NewTimer(0) |  | ||||||
| 	defer timer.Stop() |  | ||||||
|  |  | ||||||
| 	for { |  | ||||||
| 		select { |  | ||||||
| 		case peer := <-s.peerUpdates: |  | ||||||
| 			return s.peerUpdate(peer) |  | ||||||
|  |  | ||||||
| 		case <-timer.C: |  | ||||||
| 			relay := s.selectRelay() |  | ||||||
| 			if relay != nil { |  | ||||||
| 				s.logf("Got relay: %d", relay.IP) |  | ||||||
| 				s.staged.RelayIP = relay.IP |  | ||||||
| 				s.staged.LocalAddr = relay.LocalAddr |  | ||||||
| 				s.publish() |  | ||||||
| 				return s.client |  | ||||||
| 			} |  | ||||||
|  |  | ||||||
| 			s.logf("No relay available.") |  | ||||||
| 			timer.Reset(pingInterval) |  | ||||||
| 		} |  | ||||||
| 	} |  | ||||||
| } |  | ||||||
|  |  | ||||||
| func (s *peerSupervisor) selectRelay() *peerRoute { |  | ||||||
| 	possible := make([]*peerRoute, 0, 8) |  | ||||||
| 	for i := range routingTable { |  | ||||||
| 		route := routingTable[i].Load() |  | ||||||
| 		if !route.Up || !route.Relay { |  | ||||||
| 					continue | 					continue | ||||||
| 				} | 				} | ||||||
| 		possible = append(possible, route) |  | ||||||
|  | 				if !syn.FromAddr.IsValid() { | ||||||
|  | 					continue | ||||||
| 				} | 				} | ||||||
|  |  | ||||||
| 	if len(possible) == 0 { | 				probe := probePacket{TraceID: newTraceID()} | ||||||
| 		return nil | 				s.sendControlPacketTo(probe, syn.FromAddr) | ||||||
|  |  | ||||||
|  | 			case probePacket: | ||||||
|  | 				if pkt.SrcAddr.IsValid() { | ||||||
|  | 					s.sendControlPacketTo(probePacket{TraceID: p.TraceID}, pkt.SrcAddr) | ||||||
|  | 				} else { | ||||||
|  | 					logf("Invalid probe address") | ||||||
|  | 				} | ||||||
|  | 			} | ||||||
|  |  | ||||||
|  | 		case <-timeoutTimer.C: | ||||||
|  | 			logf("Connection timeout") | ||||||
|  | 			s.staged.Up = false | ||||||
|  | 			s.publish() | ||||||
|  | 		} | ||||||
| 	} | 	} | ||||||
| 	return possible[rand.Intn(len(possible))] |  | ||||||
| } | } | ||||||
|  |  | ||||||
| // ---------------------------------------------------------------------------- | // ---------------------------------------------------------------------------- | ||||||
|  |  | ||||||
| func (s *peerSupervisor) client() stateFunc { | func (s *peerSupervisor) client() stateFunc { | ||||||
| 	s.logf("STATE: client") | 	logf := func(format string, args ...any) { s.logf("CLIENT "+format, args...) } | ||||||
|  |  | ||||||
|  | 	logf("DOWN") | ||||||
|  |  | ||||||
| 	var ( | 	var ( | ||||||
| 		syn = synPacket{ | 		syn = synPacket{ | ||||||
| 			TraceID:   newTraceID(), | 			TraceID:   newTraceID(), | ||||||
| 			SharedKey: s.staged.DataCipher.Key(), | 			SharedKey: s.staged.DataCipher.Key(), | ||||||
| 			RelayIP:   s.staged.RelayIP, | 			Direct:    s.staged.Direct, | ||||||
| 			FromAddr:  s.getLocalAddr(), | 			FromAddr:  getLocalAddr(), | ||||||
| 		} | 		} | ||||||
|  |  | ||||||
| 		ack synAckPacket | 		ack synAckPacket | ||||||
|  |  | ||||||
| 		probe = probePacket{TraceID: newTraceID()} | 		probe     probePacket | ||||||
|  | 		probeAddr netip.AddrPort | ||||||
|  |  | ||||||
|  | 		lAddr netip.AddrPort | ||||||
|  |  | ||||||
| 		timeoutTimer = time.NewTimer(timeoutInterval) | 		timeoutTimer = time.NewTimer(timeoutInterval) | ||||||
| 		pingTimer    = time.NewTimer(pingInterval) | 		pingTimer    = time.NewTimer(pingInterval) | ||||||
| @@ -297,33 +258,74 @@ func (s *peerSupervisor) client() stateFunc { | |||||||
|  |  | ||||||
| 			case synAckPacket: | 			case synAckPacket: | ||||||
| 				if p.TraceID != syn.TraceID { | 				if p.TraceID != syn.TraceID { | ||||||
| 					s.logf("Bad traceID?") |  | ||||||
| 					continue // Hmm... | 					continue // Hmm... | ||||||
| 				} | 				} | ||||||
|  |  | ||||||
| 				ack = p | 				ack = p | ||||||
| 				timeoutTimer.Reset(timeoutInterval) | 				timeoutTimer.Reset(timeoutInterval) | ||||||
|  |  | ||||||
| 				if !s.staged.Up { | 				if !s.staged.Up { | ||||||
|  | 					if s.staged.Direct { | ||||||
|  | 						logf("UP - Direct") | ||||||
|  | 					} else { | ||||||
|  | 						logf("UP - Relayed") | ||||||
|  | 					} | ||||||
|  |  | ||||||
| 					s.staged.Up = true | 					s.staged.Up = true | ||||||
| 					s.staged.LocalAddr = p.ToAddr |  | ||||||
| 					s.publish() | 					s.publish() | ||||||
| 				} | 				} | ||||||
|  |  | ||||||
| 			case probePacket: | 			case probePacket: | ||||||
| 				s.logf("CLIENT got probe: %v", p) | 				if s.staged.Direct { | ||||||
|  | 					continue | ||||||
|  | 				} | ||||||
|  |  | ||||||
|  | 				if p.TraceID != probe.TraceID { | ||||||
|  | 					continue | ||||||
|  | 				} | ||||||
|  |  | ||||||
|  | 				// Upgrade connection. | ||||||
|  |  | ||||||
|  | 				logf("UP - Direct") | ||||||
|  | 				s.staged.Direct = true | ||||||
|  | 				s.staged.RemoteAddr = probeAddr | ||||||
|  | 				s.publish() | ||||||
|  |  | ||||||
|  | 				syn.TraceID = newTraceID() | ||||||
|  | 				syn.Direct = true | ||||||
|  | 				syn.FromAddr = getLocalAddr() | ||||||
|  | 				s.sendControlPacket(syn) | ||||||
| 			} | 			} | ||||||
|  |  | ||||||
| 		case <-pingTimer.C: | 		case <-pingTimer.C: | ||||||
| 			s.sendControlPacket(syn) | 			// Send syn. | ||||||
| 			pingTimer.Reset(pingInterval) |  | ||||||
|  |  | ||||||
| 			if s.staged.RelayIP != 0 && ack.FromAddr.IsValid() { | 			syn.FromAddr = getLocalAddr() | ||||||
| 				s.logf("CLIENT sending probe %v: %v", probe, ack.FromAddr) | 			if syn.FromAddr != lAddr { | ||||||
| 				s.sendControlPacketTo(probe, ack.FromAddr) | 				syn.TraceID = newTraceID() | ||||||
|  | 				lAddr = syn.FromAddr | ||||||
| 			} | 			} | ||||||
|  |  | ||||||
|  | 			s.sendControlPacket(syn) | ||||||
|  |  | ||||||
|  | 			pingTimer.Reset(pingInterval) | ||||||
|  |  | ||||||
|  | 			if s.staged.Direct { | ||||||
|  | 				continue | ||||||
|  | 			} | ||||||
|  |  | ||||||
|  | 			if !ack.FromAddr.IsValid() { | ||||||
|  | 				continue | ||||||
|  | 			} | ||||||
|  |  | ||||||
|  | 			probe = probePacket{TraceID: newTraceID()} | ||||||
|  | 			probeAddr = ack.FromAddr | ||||||
|  |  | ||||||
|  | 			s.sendControlPacketTo(probe, ack.FromAddr) | ||||||
|  |  | ||||||
| 		case <-timeoutTimer.C: | 		case <-timeoutTimer.C: | ||||||
| 			return s.clientInit | 			logf("Connection timeout") | ||||||
|  | 			return s.peerUpdate(s.peer) | ||||||
| 		} | 		} | ||||||
| 	} | 	} | ||||||
| } | } | ||||||
|   | |||||||
							
								
								
									
										40
									
								
								node/relaymanager.go
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										40
									
								
								node/relaymanager.go
									
									
									
									
									
										Normal file
									
								
							| @@ -0,0 +1,40 @@ | |||||||
|  | package node | ||||||
|  |  | ||||||
|  | import ( | ||||||
|  | 	"log" | ||||||
|  | 	"math/rand" | ||||||
|  | 	"time" | ||||||
|  | ) | ||||||
|  |  | ||||||
|  | func relayManager() { | ||||||
|  | 	time.Sleep(2 * time.Second) | ||||||
|  | 	updateRelayRoute() | ||||||
|  |  | ||||||
|  | 	for range time.Tick(8 * time.Second) { | ||||||
|  | 		relay := getRelayRoute() | ||||||
|  | 		if relay == nil || !relay.Up || !relay.Relay { | ||||||
|  | 			updateRelayRoute() | ||||||
|  | 		} | ||||||
|  | 	} | ||||||
|  | } | ||||||
|  |  | ||||||
|  | func updateRelayRoute() { | ||||||
|  | 	possible := make([]*peerRoute, 0, 8) | ||||||
|  | 	for i := range routingTable { | ||||||
|  | 		route := routingTable[i].Load() | ||||||
|  | 		if !route.Up || !route.Relay { | ||||||
|  | 			continue | ||||||
|  | 		} | ||||||
|  | 		possible = append(possible, route) | ||||||
|  | 	} | ||||||
|  |  | ||||||
|  | 	if len(possible) == 0 { | ||||||
|  | 		log.Printf("No relay available.") | ||||||
|  | 		relayIP.Store(nil) | ||||||
|  | 		return | ||||||
|  | 	} | ||||||
|  |  | ||||||
|  | 	ip := possible[rand.Intn(len(possible))].IP | ||||||
|  | 	log.Printf("New relay IP: %d", ip) | ||||||
|  | 	relayIP.Store(&ip) | ||||||
|  | } | ||||||
		Reference in New Issue
	
	Block a user