lokinet/llarp/handlers/tun.hpp

330 lines
8.4 KiB
C++
Raw Normal View History

#pragma once
#include <llarp/dns/server.hpp>
#include <llarp/ev/ev.hpp>
#include <llarp/net/ip.hpp>
#include <llarp/net/ip_packet.hpp>
#include <llarp/net/net.hpp>
#include <llarp/service/endpoint.hpp>
#include <llarp/service/protocol_type.hpp>
#include <llarp/util/priority_queue.hpp>
#include <llarp/util/thread/threading.hpp>
#include <llarp/vpn/packet_router.hpp>
#include <llarp/vpn/platform.hpp>
#include <future>
#include <type_traits>
#include <variant>
2022-04-05 00:12:27 +02:00
namespace llarp
{
namespace handlers
{
2019-04-23 18:13:22 +02:00
struct TunEndpoint : public service::Endpoint,
public dns::Resolver_Base,
public std::enable_shared_from_this<TunEndpoint>
{
TunEndpoint(AbstractRouter* r, llarp::service::Context* parent);
2019-07-31 01:42:13 +02:00
~TunEndpoint() override;
2018-08-16 16:34:15 +02:00
vpn::NetworkInterface*
GetVPNInterface() override
{
return m_NetIf.get();
}
int
Rank() const override
{
return 0;
}
std::string_view
ResolverName() const override
{
return "lokinet";
}
bool
MaybeHookDNS(
std::shared_ptr<dns::PacketSource_Base> source,
const dns::Message& query,
const SockAddr& to,
const SockAddr& from) override;
2019-04-23 18:13:22 +02:00
path::PathSet_ptr
GetSelf() override
{
return shared_from_this();
}
std::weak_ptr<path::PathSet>
GetWeak() override
{
return weak_from_this();
}
void
Thaw() override;
// Reconfigures DNS servers and restarts libunbound with the new servers. Returns the old set
// of configured dns servers.
std::vector<SockAddr>
ReconfigureDNS(std::vector<SockAddr> servers);
2019-07-31 01:42:13 +02:00
bool
Configure(const NetworkConfig& conf, const DnsConfig& dnsConf) override;
2018-08-16 16:34:15 +02:00
2020-05-21 16:18:23 +02:00
void
SendPacketToRemote(const llarp_buffer_t&, service::ProtocolType) override{};
2020-05-21 16:18:23 +02:00
2020-08-21 17:07:37 +02:00
std::string
GetIfName() const override;
2019-07-31 01:42:13 +02:00
void
2018-12-05 00:45:08 +01:00
Tick(llarp_time_t now) override;
2018-08-16 16:34:15 +02:00
2019-02-11 18:14:43 +01:00
util::StatusObject
ExtractStatus() const override;
2019-02-08 20:43:25 +01:00
std::unordered_map<std::string, std::string>
2019-04-22 16:00:59 +02:00
NotifyParams() const override;
2019-06-11 18:44:05 +02:00
bool
SupportsV6() const override;
2018-12-03 23:22:59 +01:00
bool
ShouldHookDNSMessage(const dns::Message& msg) const;
2018-12-03 23:22:59 +01:00
bool
HandleHookedDNSMessage(dns::Message query, std::function<void(dns::Message)> sendreply);
2018-12-03 23:22:59 +01:00
2018-08-16 16:34:15 +02:00
void
TickTun(llarp_time_t now);
2018-08-22 17:52:10 +02:00
bool
2019-06-11 18:44:05 +02:00
MapAddress(const service::Address& remote, huint128_t ip, bool SNode);
2018-08-22 17:52:10 +02:00
2018-08-16 16:34:15 +02:00
bool
2018-12-05 00:45:08 +01:00
Start() override;
2018-08-16 16:34:15 +02:00
bool
Stop() override;
bool
IsSNode() const;
2018-08-16 16:34:15 +02:00
/// set up tun interface, blocking
bool
SetupTun();
void
SetupDNS();
/// overrides Endpoint
std::shared_ptr<dns::Server>
DNS() const override
{
return m_DNS;
};
2018-08-16 16:34:15 +02:00
/// overrides Endpoint
bool
2018-12-05 00:45:08 +01:00
SetupNetworking() override;
2018-08-16 16:34:15 +02:00
2018-09-18 19:48:26 +02:00
/// overrides Endpoint
2019-07-01 15:44:25 +02:00
bool
HandleInboundPacket(
const service::ConvoTag tag,
const llarp_buffer_t& pkt,
service::ProtocolType t,
uint64_t seqno) override;
2019-07-01 15:44:25 +02:00
/// handle inbound traffic
bool
HandleWriteIPPacket(
const llarp_buffer_t& buf, huint128_t src, huint128_t dst, uint64_t seqno);
2018-08-18 16:01:21 +02:00
/// we got a packet from the user
void
HandleGotUserPacket(llarp::net::IPPacket pkt);
2018-11-14 13:23:08 +01:00
/// get the local interface's address
2019-06-11 18:44:05 +02:00
huint128_t
2019-07-05 16:41:26 +02:00
GetIfAddr() const override;
2018-11-14 13:23:08 +01:00
2019-07-05 16:48:10 +02:00
/// we have an interface addr
bool
HasIfAddr() const override
{
return true;
}
2018-11-14 13:23:08 +01:00
bool
2019-06-11 18:44:05 +02:00
HasLocalIP(const huint128_t& ip) const;
2018-11-14 13:23:08 +01:00
2021-04-14 17:07:06 +02:00
std::optional<net::TrafficPolicy>
GetExitPolicy() const override
{
2021-04-14 21:40:57 +02:00
return m_TrafficPolicy;
}
std::set<IPRange>
GetOwnedRanges() const override
{
return m_OwnedRanges;
2021-04-14 17:07:06 +02:00
}
llarp_time_t
PathAlignmentTimeout() const override
{
return m_PathAlignmentTimeout;
}
2021-04-14 17:07:06 +02:00
/// ip packet against any exit policies we have
/// returns false if this traffic is disallowed by any of those policies
/// returns true otherwise
bool
ShouldAllowTraffic(const net::IPPacket& pkt) const;
2018-11-14 13:23:08 +01:00
/// get a key for ip address
std::optional<std::variant<service::Address, RouterID>>
ObtainAddrForIP(huint128_t ip) const override;
2019-11-29 01:37:58 +01:00
2018-10-23 20:18:00 +02:00
bool
HasAddress(const AlignedBuffer<32>& addr) const
2018-10-23 20:18:00 +02:00
{
2018-11-14 13:23:08 +01:00
return m_AddrToIP.find(addr) != m_AddrToIP.end();
2018-10-23 20:18:00 +02:00
}
2018-11-14 13:23:08 +01:00
/// get ip address for key unconditionally
2019-06-11 18:44:05 +02:00
huint128_t
ObtainIPForAddr(std::variant<service::Address, RouterID> addr) override;
2018-10-23 23:33:49 +02:00
2019-07-31 01:42:13 +02:00
void
2019-05-07 19:46:38 +02:00
ResetInternalState() override;
protected:
struct WritePacket
{
uint64_t seqno;
net::IPPacket pkt;
bool
2022-04-05 00:12:27 +02:00
operator>(const WritePacket& other) const
{
2022-04-05 00:12:27 +02:00
return seqno > other.seqno;
}
};
/// queue for sending packets to user from network
2022-04-05 00:12:27 +02:00
util::ascending_priority_queue<WritePacket> m_NetworkToUserPktQueue;
void
Pump(llarp_time_t now) override;
/// return true if we have a remote loki address for this ip address
bool
2019-06-11 18:44:05 +02:00
HasRemoteForIP(huint128_t ipv4) const;
/// mark this address as active
void
2019-06-11 18:44:05 +02:00
MarkIPActive(huint128_t ip);
2018-09-10 13:08:09 +02:00
/// mark this address as active forever
void
2019-06-11 18:44:05 +02:00
MarkIPActiveForever(huint128_t ip);
2018-09-10 13:08:09 +02:00
/// flush writing ip packets to interface
void
FlushWrite();
2018-11-14 13:23:08 +01:00
/// maps ip to key (host byte order)
std::unordered_map<huint128_t, AlignedBuffer<32>> m_IPToAddr;
2018-11-14 13:23:08 +01:00
/// maps key to ip (host byte order)
std::unordered_map<AlignedBuffer<32>, huint128_t> m_AddrToIP;
2018-11-14 13:23:08 +01:00
/// maps key to true if key is a service node, maps key to false if key is
/// a hidden service
std::unordered_map<AlignedBuffer<32>, bool> m_SNodes;
2018-11-29 14:12:35 +01:00
/// maps ip address to an exit endpoint, useful when we have multiple exits on a range
std::unordered_map<huint128_t, service::Address> m_ExitIPToExitAddress;
2018-08-16 16:34:15 +02:00
private:
/// given an ip address that is not mapped locally find the address it shall be forwarded to
/// optionally provide a custom selection strategy, if none is provided it will choose a
/// random entry from the available choices
/// return std::nullopt if we cannot route this address to an exit
std::optional<service::Address>
ObtainExitAddressFor(
huint128_t ip,
std::function<service::Address(std::unordered_set<service::Address>)> exitSelectionStrat =
nullptr);
template <typename Addr_t, typename Endpoint_t>
2018-12-03 23:22:59 +01:00
void
SendDNSReply(
Addr_t addr,
Endpoint_t ctx,
std::shared_ptr<dns::Message> query,
std::function<void(dns::Message)> reply,
bool sendIPv6)
{
if (ctx)
{
huint128_t ip = ObtainIPForAddr(addr);
query->answers.clear();
query->AddINReply(ip, sendIPv6);
}
else
query->AddNXReply();
reply(*query);
}
/// dns subsystem for this endpoint
std::shared_ptr<dns::Server> m_DNS;
DnsConfig m_DnsConfig;
/// maps ip address to timestamp last active
std::unordered_map<huint128_t, llarp_time_t> m_IPActivity;
2018-09-23 18:47:18 +02:00
/// our ip address (host byte order)
2019-06-11 18:44:05 +02:00
huint128_t m_OurIP;
/// our network interface's ipv6 address
huint128_t m_OurIPv6;
2021-02-16 16:59:18 +01:00
2018-09-23 18:47:18 +02:00
/// next ip address to allocate (host byte order)
2019-06-11 18:44:05 +02:00
huint128_t m_NextIP;
2018-10-10 17:14:45 +02:00
/// highest ip address to allocate (host byte order)
2019-06-11 18:44:05 +02:00
huint128_t m_MaxIP;
2018-12-03 23:22:59 +01:00
/// our ip range we are using
llarp::IPRange m_OurRange;
/// list of strict connect addresses for hooks
2020-05-06 22:38:44 +02:00
std::vector<IpAddress> m_StrictConnectAddrs;
2019-06-11 18:44:05 +02:00
/// use v6?
bool m_UseV6;
2020-08-21 17:07:37 +02:00
std::string m_IfName;
std::optional<huint128_t> m_BaseV6Address;
std::shared_ptr<vpn::NetworkInterface> m_NetIf;
std::shared_ptr<vpn::PacketRouter> m_PacketRouter;
2021-04-14 17:07:06 +02:00
2021-04-14 21:40:57 +02:00
std::optional<net::TrafficPolicy> m_TrafficPolicy;
/// ranges we advetise as reachable
std::set<IPRange> m_OwnedRanges;
/// how long to wait for path alignment
llarp_time_t m_PathAlignmentTimeout;
/// a file to load / store the ephemeral address map to
std::optional<fs::path> m_PersistAddrMapFile;
/// for raw packet dns
std::shared_ptr<vpn::I_Packet_IO> m_RawDNS;
};
2019-11-29 01:37:58 +01:00
} // namespace handlers
} // namespace llarp