2019-11-19 10:00:20 -07:00
|
|
|
package nebula
|
|
|
|
|
|
|
|
import (
|
2020-06-30 16:53:30 -06:00
|
|
|
"bytes"
|
2019-11-19 10:00:20 -07:00
|
|
|
"sync/atomic"
|
|
|
|
"time"
|
|
|
|
|
|
|
|
"github.com/flynn/noise"
|
|
|
|
"github.com/golang/protobuf/proto"
|
|
|
|
)
|
|
|
|
|
|
|
|
// NOISE IX Handshakes
|
|
|
|
|
|
|
|
// This function constructs a handshake packet, but does not actually send it
|
|
|
|
// Sending is done by the handshake manager
|
|
|
|
func ixHandshakeStage0(f *Interface, vpnIp uint32, hostinfo *HostInfo) {
|
|
|
|
// This queries the lighthouse if we don't know a remote for the host
|
|
|
|
if hostinfo.remote == nil {
|
|
|
|
ips, err := f.lightHouse.Query(vpnIp, f)
|
|
|
|
if err != nil {
|
|
|
|
//l.Debugln(err)
|
|
|
|
}
|
|
|
|
for _, ip := range ips {
|
|
|
|
hostinfo.AddRemote(ip)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2021-03-12 12:16:25 -07:00
|
|
|
err := f.handshakeManager.AddIndexHostInfo(hostinfo)
|
2019-11-19 10:00:20 -07:00
|
|
|
if err != nil {
|
|
|
|
l.WithError(err).WithField("vpnIp", IntIp(vpnIp)).
|
|
|
|
WithField("handshake", m{"stage": 0, "style": "ix_psk0"}).Error("Failed to generate index")
|
|
|
|
return
|
|
|
|
}
|
2021-03-12 12:16:25 -07:00
|
|
|
|
2019-11-19 10:00:20 -07:00
|
|
|
ci := hostinfo.ConnectionState
|
|
|
|
|
|
|
|
hsProto := &NebulaHandshakeDetails{
|
2021-03-12 12:16:25 -07:00
|
|
|
InitiatorIndex: hostinfo.localIndexId,
|
2019-11-19 10:00:20 -07:00
|
|
|
Time: uint64(time.Now().Unix()),
|
|
|
|
Cert: ci.certState.rawCertificateNoKey,
|
|
|
|
}
|
|
|
|
|
2019-11-23 09:50:36 -07:00
|
|
|
hsBytes := []byte{}
|
|
|
|
|
2019-11-19 10:00:20 -07:00
|
|
|
hs := &NebulaHandshake{
|
|
|
|
Details: hsProto,
|
|
|
|
}
|
2019-11-23 09:50:36 -07:00
|
|
|
hsBytes, err = proto.Marshal(hs)
|
2019-11-19 10:00:20 -07:00
|
|
|
|
|
|
|
if err != nil {
|
|
|
|
l.WithError(err).WithField("vpnIp", IntIp(vpnIp)).
|
|
|
|
WithField("handshake", m{"stage": 0, "style": "ix_psk0"}).Error("Failed to marshal handshake message")
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
header := HeaderEncode(make([]byte, HeaderLen), Version, uint8(handshake), handshakeIXPSK0, 0, 1)
|
2021-03-05 19:18:33 -07:00
|
|
|
atomic.AddUint64(&ci.atomicMessageCounter, 1)
|
2019-11-19 10:00:20 -07:00
|
|
|
|
|
|
|
msg, _, _, err := ci.H.WriteMessage(header, hsBytes)
|
|
|
|
if err != nil {
|
|
|
|
l.WithError(err).WithField("vpnIp", IntIp(vpnIp)).
|
|
|
|
WithField("handshake", m{"stage": 0, "style": "ix_psk0"}).Error("Failed to call noise.WriteMessage")
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2020-11-16 12:03:08 -07:00
|
|
|
// We are sending handshake packet 1, so we don't expect to receive
|
|
|
|
// handshake packet 1 from the responder
|
|
|
|
ci.window.Update(1)
|
|
|
|
|
2019-11-19 10:00:20 -07:00
|
|
|
hostinfo.HandshakePacket[0] = msg
|
|
|
|
hostinfo.HandshakeReady = true
|
|
|
|
hostinfo.handshakeStart = time.Now()
|
|
|
|
|
|
|
|
}
|
|
|
|
|
2021-03-12 12:16:25 -07:00
|
|
|
func ixHandshakeStage1(f *Interface, addr *udpAddr, packet []byte, h *Header) {
|
|
|
|
ci := f.newConnectionState(false, noise.HandshakeIX, []byte{}, 0)
|
|
|
|
// Mark packet 1 as seen so it doesn't show up as missed
|
|
|
|
ci.window.Update(1)
|
2019-11-19 10:00:20 -07:00
|
|
|
|
2021-03-12 12:16:25 -07:00
|
|
|
msg, _, _, err := ci.H.ReadMessage(nil, packet[HeaderLen:])
|
|
|
|
if err != nil {
|
|
|
|
l.WithError(err).WithField("udpAddr", addr).
|
|
|
|
WithField("handshake", m{"stage": 1, "style": "ix_psk0"}).Error("Failed to call noise.ReadMessage")
|
|
|
|
return
|
|
|
|
}
|
2019-11-19 10:00:20 -07:00
|
|
|
|
2021-03-12 12:16:25 -07:00
|
|
|
hs := &NebulaHandshake{}
|
|
|
|
err = proto.Unmarshal(msg, hs)
|
|
|
|
/*
|
|
|
|
l.Debugln("GOT INDEX: ", hs.Details.InitiatorIndex)
|
|
|
|
*/
|
|
|
|
if err != nil || hs.Details == nil {
|
|
|
|
l.WithError(err).WithField("udpAddr", addr).
|
|
|
|
WithField("handshake", m{"stage": 1, "style": "ix_psk0"}).Error("Failed unmarshal handshake message")
|
|
|
|
return
|
|
|
|
}
|
2019-11-19 10:00:20 -07:00
|
|
|
|
2021-03-12 12:16:25 -07:00
|
|
|
remoteCert, err := RecombineCertAndValidate(ci.H, hs.Details.Cert)
|
|
|
|
if err != nil {
|
|
|
|
l.WithError(err).WithField("udpAddr", addr).
|
|
|
|
WithField("handshake", m{"stage": 1, "style": "ix_psk0"}).WithField("cert", remoteCert).
|
|
|
|
Info("Invalid certificate from host")
|
|
|
|
return
|
|
|
|
}
|
|
|
|
vpnIP := ip2int(remoteCert.Details.Ips[0].IP)
|
|
|
|
certName := remoteCert.Details.Name
|
|
|
|
fingerprint, _ := remoteCert.Sha256Sum()
|
2019-11-19 10:00:20 -07:00
|
|
|
|
2021-03-15 13:58:23 -06:00
|
|
|
if vpnIP == ip2int(f.certState.certificate.Details.Ips[0].IP) {
|
|
|
|
l.WithField("vpnIp", IntIp(vpnIP)).WithField("udpAddr", addr).
|
|
|
|
WithField("certName", certName).
|
|
|
|
WithField("fingerprint", fingerprint).
|
|
|
|
WithField("handshake", m{"stage": 1, "style": "ix_psk0"}).Error("Refusing to handshake with myself")
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2021-03-12 12:16:25 -07:00
|
|
|
myIndex, err := generateIndex()
|
|
|
|
if err != nil {
|
|
|
|
l.WithError(err).WithField("vpnIp", IntIp(vpnIP)).WithField("udpAddr", addr).
|
|
|
|
WithField("certName", certName).
|
|
|
|
WithField("fingerprint", fingerprint).
|
|
|
|
WithField("handshake", m{"stage": 1, "style": "ix_psk0"}).Error("Failed to generate index")
|
|
|
|
return
|
|
|
|
}
|
2019-11-19 10:00:20 -07:00
|
|
|
|
2021-03-12 12:16:25 -07:00
|
|
|
hostinfo := &HostInfo{
|
|
|
|
ConnectionState: ci,
|
|
|
|
Remotes: []*HostInfoDest{},
|
|
|
|
localIndexId: myIndex,
|
|
|
|
remoteIndexId: hs.Details.InitiatorIndex,
|
|
|
|
hostId: vpnIP,
|
|
|
|
HandshakePacket: make(map[uint8][]byte, 0),
|
|
|
|
}
|
2019-11-19 10:00:20 -07:00
|
|
|
|
2021-03-12 12:16:25 -07:00
|
|
|
l.WithField("vpnIp", IntIp(vpnIP)).WithField("udpAddr", addr).
|
|
|
|
WithField("certName", certName).
|
|
|
|
WithField("fingerprint", fingerprint).
|
|
|
|
WithField("initiatorIndex", hs.Details.InitiatorIndex).WithField("responderIndex", hs.Details.ResponderIndex).
|
|
|
|
WithField("remoteIndex", h.RemoteIndex).WithField("handshake", m{"stage": 1, "style": "ix_psk0"}).
|
|
|
|
Info("Handshake message received")
|
2019-11-19 10:00:20 -07:00
|
|
|
|
2021-03-12 12:16:25 -07:00
|
|
|
hs.Details.ResponderIndex = myIndex
|
|
|
|
hs.Details.Cert = ci.certState.rawCertificateNoKey
|
2021-03-05 19:18:33 -07:00
|
|
|
|
2021-03-12 12:16:25 -07:00
|
|
|
hsBytes, err := proto.Marshal(hs)
|
|
|
|
if err != nil {
|
|
|
|
l.WithError(err).WithField("vpnIp", IntIp(hostinfo.hostId)).WithField("udpAddr", addr).
|
2020-04-06 12:34:00 -06:00
|
|
|
WithField("certName", certName).
|
2020-07-31 16:54:51 -06:00
|
|
|
WithField("fingerprint", fingerprint).
|
2021-03-12 12:16:25 -07:00
|
|
|
WithField("handshake", m{"stage": 1, "style": "ix_psk0"}).Error("Failed to marshal handshake message")
|
|
|
|
return
|
|
|
|
}
|
2019-11-19 10:00:20 -07:00
|
|
|
|
2021-03-12 12:16:25 -07:00
|
|
|
header := HeaderEncode(make([]byte, HeaderLen), Version, uint8(handshake), handshakeIXPSK0, hs.Details.InitiatorIndex, 2)
|
|
|
|
msg, dKey, eKey, err := ci.H.WriteMessage(header, hsBytes)
|
|
|
|
if err != nil {
|
|
|
|
l.WithError(err).WithField("vpnIp", IntIp(hostinfo.hostId)).WithField("udpAddr", addr).
|
|
|
|
WithField("certName", certName).
|
|
|
|
WithField("fingerprint", fingerprint).
|
|
|
|
WithField("handshake", m{"stage": 1, "style": "ix_psk0"}).Error("Failed to call noise.WriteMessage")
|
|
|
|
return
|
|
|
|
} else if dKey == nil || eKey == nil {
|
|
|
|
l.WithField("vpnIp", IntIp(hostinfo.hostId)).WithField("udpAddr", addr).
|
|
|
|
WithField("certName", certName).
|
|
|
|
WithField("fingerprint", fingerprint).
|
|
|
|
WithField("handshake", m{"stage": 1, "style": "ix_psk0"}).Error("Noise did not arrive at a key")
|
|
|
|
return
|
|
|
|
}
|
2019-11-19 10:00:20 -07:00
|
|
|
|
2021-03-12 12:16:25 -07:00
|
|
|
hostinfo.HandshakePacket[0] = make([]byte, len(packet[HeaderLen:]))
|
|
|
|
copy(hostinfo.HandshakePacket[0], packet[HeaderLen:])
|
2019-11-19 10:00:20 -07:00
|
|
|
|
2021-03-12 12:16:25 -07:00
|
|
|
// Regardless of whether you are the sender or receiver, you should arrive here
|
|
|
|
// and complete standing up the connection.
|
|
|
|
hostinfo.HandshakePacket[2] = make([]byte, len(msg))
|
|
|
|
copy(hostinfo.HandshakePacket[2], msg)
|
2019-11-19 10:00:20 -07:00
|
|
|
|
2021-03-12 12:16:25 -07:00
|
|
|
// We are sending handshake packet 2, so we don't expect to receive
|
|
|
|
// handshake packet 2 from the initiator.
|
|
|
|
ci.window.Update(2)
|
2019-11-19 10:00:20 -07:00
|
|
|
|
2021-03-12 12:16:25 -07:00
|
|
|
ci.peerCert = remoteCert
|
|
|
|
ci.dKey = NewNebulaCipherState(dKey)
|
|
|
|
ci.eKey = NewNebulaCipherState(eKey)
|
|
|
|
//l.Debugln("got symmetric pairs")
|
2019-11-19 10:00:20 -07:00
|
|
|
|
2021-03-12 12:16:25 -07:00
|
|
|
//hostinfo.ClearRemotes()
|
2021-03-18 19:37:24 -06:00
|
|
|
hostinfo.AddRemote(addr)
|
2021-03-12 12:16:25 -07:00
|
|
|
hostinfo.ForcePromoteBest(f.hostMap.preferredRanges)
|
|
|
|
hostinfo.CreateRemoteCIDR(remoteCert)
|
2019-11-19 10:00:20 -07:00
|
|
|
|
2021-03-12 12:16:25 -07:00
|
|
|
hostinfo.Lock()
|
|
|
|
defer hostinfo.Unlock()
|
2020-11-16 12:03:08 -07:00
|
|
|
|
2021-03-12 12:16:25 -07:00
|
|
|
// Only overwrite existing record if we should win the handshake race
|
|
|
|
overwrite := vpnIP > ip2int(f.certState.certificate.Details.Ips[0].IP)
|
|
|
|
existing, err := f.handshakeManager.CheckAndComplete(hostinfo, 0, overwrite, f)
|
|
|
|
if err != nil {
|
|
|
|
switch err {
|
|
|
|
case ErrAlreadySeen:
|
|
|
|
msg = existing.HandshakePacket[2]
|
2020-06-26 11:45:48 -06:00
|
|
|
f.messageMetrics.Tx(handshake, NebulaMessageSubType(msg[1]), 1)
|
2019-11-19 10:00:20 -07:00
|
|
|
err := f.outside.WriteTo(msg, addr)
|
|
|
|
if err != nil {
|
2021-03-12 12:16:25 -07:00
|
|
|
l.WithField("vpnIp", IntIp(existing.hostId)).WithField("udpAddr", addr).
|
|
|
|
WithField("handshake", m{"stage": 2, "style": "ix_psk0"}).WithField("cached", true).
|
|
|
|
WithError(err).Error("Failed to send handshake message")
|
2019-11-19 10:00:20 -07:00
|
|
|
} else {
|
2021-03-12 12:16:25 -07:00
|
|
|
l.WithField("vpnIp", IntIp(existing.hostId)).WithField("udpAddr", addr).
|
|
|
|
WithField("handshake", m{"stage": 2, "style": "ix_psk0"}).WithField("cached", true).
|
2019-11-19 10:00:20 -07:00
|
|
|
Info("Handshake message sent")
|
|
|
|
}
|
2021-03-12 12:16:25 -07:00
|
|
|
return
|
|
|
|
case ErrExistingHostInfo:
|
|
|
|
// This means there was an existing tunnel and we didn't win
|
|
|
|
// handshake avoidance
|
|
|
|
l.WithField("vpnIp", IntIp(vpnIP)).WithField("udpAddr", addr).
|
|
|
|
WithField("certName", certName).
|
|
|
|
WithField("fingerprint", fingerprint).
|
|
|
|
WithField("initiatorIndex", hs.Details.InitiatorIndex).WithField("responderIndex", hs.Details.ResponderIndex).
|
|
|
|
WithField("remoteIndex", h.RemoteIndex).WithField("handshake", m{"stage": 1, "style": "ix_psk0"}).
|
|
|
|
Info("Prevented a handshake race")
|
2019-11-19 10:00:20 -07:00
|
|
|
|
2021-03-12 12:16:25 -07:00
|
|
|
// Send a test packet to trigger an authenticated tunnel test, this should suss out any lingering tunnel issues
|
|
|
|
f.SendMessageToVpnIp(test, testRequest, vpnIP, []byte(""), make([]byte, 12, 12), make([]byte, mtu))
|
|
|
|
return
|
|
|
|
case ErrLocalIndexCollision:
|
|
|
|
// This means we failed to insert because of collision on localIndexId. Just let the next handshake packet retry
|
|
|
|
l.WithField("vpnIp", IntIp(vpnIP)).WithField("udpAddr", addr).
|
|
|
|
WithField("certName", certName).
|
|
|
|
WithField("fingerprint", fingerprint).
|
|
|
|
WithField("initiatorIndex", hs.Details.InitiatorIndex).WithField("responderIndex", hs.Details.ResponderIndex).
|
|
|
|
WithField("remoteIndex", h.RemoteIndex).WithField("handshake", m{"stage": 1, "style": "ix_psk0"}).
|
|
|
|
WithField("localIndex", hostinfo.localIndexId).WithField("collision", IntIp(existing.hostId)).
|
|
|
|
Error("Failed to add HostInfo due to localIndex collision")
|
|
|
|
return
|
|
|
|
default:
|
|
|
|
// Shouldn't happen, but just in case someone adds a new error type to CheckAndComplete
|
|
|
|
// And we forget to update it here
|
|
|
|
l.WithError(err).WithField("vpnIp", IntIp(vpnIP)).WithField("udpAddr", addr).
|
2020-04-06 12:34:00 -06:00
|
|
|
WithField("certName", certName).
|
2020-07-31 16:54:51 -06:00
|
|
|
WithField("fingerprint", fingerprint).
|
2021-03-12 12:16:25 -07:00
|
|
|
WithField("initiatorIndex", hs.Details.InitiatorIndex).WithField("responderIndex", hs.Details.ResponderIndex).
|
|
|
|
WithField("remoteIndex", h.RemoteIndex).WithField("handshake", m{"stage": 1, "style": "ix_psk0"}).
|
|
|
|
Error("Failed to add HostInfo to HostMap")
|
|
|
|
return
|
2019-11-19 10:00:20 -07:00
|
|
|
}
|
2021-03-12 12:16:25 -07:00
|
|
|
}
|
2019-11-19 10:00:20 -07:00
|
|
|
|
2021-03-12 12:16:25 -07:00
|
|
|
// Do the send
|
|
|
|
f.messageMetrics.Tx(handshake, NebulaMessageSubType(msg[1]), 1)
|
|
|
|
err = f.outside.WriteTo(msg, addr)
|
|
|
|
if err != nil {
|
|
|
|
l.WithField("vpnIp", IntIp(vpnIP)).WithField("udpAddr", addr).
|
|
|
|
WithField("certName", certName).
|
|
|
|
WithField("fingerprint", fingerprint).
|
|
|
|
WithField("initiatorIndex", hs.Details.InitiatorIndex).WithField("responderIndex", hs.Details.ResponderIndex).
|
|
|
|
WithField("remoteIndex", h.RemoteIndex).WithField("handshake", m{"stage": 2, "style": "ix_psk0"}).
|
|
|
|
WithError(err).Error("Failed to send handshake")
|
|
|
|
} else {
|
|
|
|
l.WithField("vpnIp", IntIp(vpnIP)).WithField("udpAddr", addr).
|
|
|
|
WithField("certName", certName).
|
|
|
|
WithField("fingerprint", fingerprint).
|
|
|
|
WithField("initiatorIndex", hs.Details.InitiatorIndex).WithField("responderIndex", hs.Details.ResponderIndex).
|
|
|
|
WithField("remoteIndex", h.RemoteIndex).WithField("handshake", m{"stage": 2, "style": "ix_psk0"}).
|
|
|
|
Info("Handshake message sent")
|
2019-11-19 10:00:20 -07:00
|
|
|
}
|
|
|
|
|
2021-03-12 12:16:25 -07:00
|
|
|
hostinfo.handshakeComplete()
|
|
|
|
|
|
|
|
return
|
2019-11-19 10:00:20 -07:00
|
|
|
}
|
|
|
|
|
|
|
|
func ixHandshakeStage2(f *Interface, addr *udpAddr, hostinfo *HostInfo, packet []byte, h *Header) bool {
|
|
|
|
if hostinfo == nil {
|
|
|
|
return true
|
|
|
|
}
|
2021-03-05 19:18:33 -07:00
|
|
|
hostinfo.Lock()
|
|
|
|
defer hostinfo.Unlock()
|
2019-11-19 10:00:20 -07:00
|
|
|
|
|
|
|
if bytes.Equal(hostinfo.HandshakePacket[2], packet[HeaderLen:]) {
|
|
|
|
l.WithField("vpnIp", IntIp(hostinfo.hostId)).WithField("udpAddr", addr).
|
|
|
|
WithField("handshake", m{"stage": 2, "style": "ix_psk0"}).WithField("header", h).
|
2021-03-12 12:16:25 -07:00
|
|
|
Info("Already seen this handshake packet")
|
2019-11-19 10:00:20 -07:00
|
|
|
return false
|
|
|
|
}
|
|
|
|
|
|
|
|
ci := hostinfo.ConnectionState
|
|
|
|
// Mark packet 2 as seen so it doesn't show up as missed
|
|
|
|
ci.window.Update(2)
|
|
|
|
|
|
|
|
hostinfo.HandshakePacket[2] = make([]byte, len(packet[HeaderLen:]))
|
|
|
|
copy(hostinfo.HandshakePacket[2], packet[HeaderLen:])
|
|
|
|
|
|
|
|
msg, eKey, dKey, err := ci.H.ReadMessage(nil, packet[HeaderLen:])
|
|
|
|
if err != nil {
|
|
|
|
l.WithError(err).WithField("vpnIp", IntIp(hostinfo.hostId)).WithField("udpAddr", addr).
|
|
|
|
WithField("handshake", m{"stage": 2, "style": "ix_psk0"}).WithField("header", h).
|
|
|
|
Error("Failed to call noise.ReadMessage")
|
|
|
|
|
|
|
|
// We don't want to tear down the connection on a bad ReadMessage because it could be an attacker trying
|
|
|
|
// to DOS us. Every other error condition after should to allow a possible good handshake to complete in the
|
|
|
|
// near future
|
|
|
|
return false
|
2021-03-12 12:16:25 -07:00
|
|
|
} else if dKey == nil || eKey == nil {
|
|
|
|
l.WithField("vpnIp", IntIp(hostinfo.hostId)).WithField("udpAddr", addr).
|
|
|
|
WithField("handshake", m{"stage": 2, "style": "ix_psk0"}).
|
|
|
|
Error("Noise did not arrive at a key")
|
|
|
|
return true
|
2019-11-19 10:00:20 -07:00
|
|
|
}
|
|
|
|
|
|
|
|
hs := &NebulaHandshake{}
|
|
|
|
err = proto.Unmarshal(msg, hs)
|
|
|
|
if err != nil || hs.Details == nil {
|
|
|
|
l.WithError(err).WithField("vpnIp", IntIp(hostinfo.hostId)).WithField("udpAddr", addr).
|
|
|
|
WithField("handshake", m{"stage": 2, "style": "ix_psk0"}).Error("Failed unmarshal handshake message")
|
|
|
|
return true
|
|
|
|
}
|
|
|
|
|
|
|
|
remoteCert, err := RecombineCertAndValidate(ci.H, hs.Details.Cert)
|
|
|
|
if err != nil {
|
|
|
|
l.WithError(err).WithField("vpnIp", IntIp(hostinfo.hostId)).WithField("udpAddr", addr).
|
|
|
|
WithField("cert", remoteCert).WithField("handshake", m{"stage": 2, "style": "ix_psk0"}).
|
|
|
|
Error("Invalid certificate from host")
|
|
|
|
return true
|
|
|
|
}
|
|
|
|
vpnIP := ip2int(remoteCert.Details.Ips[0].IP)
|
2020-04-06 12:34:00 -06:00
|
|
|
certName := remoteCert.Details.Name
|
2020-07-31 16:54:51 -06:00
|
|
|
fingerprint, _ := remoteCert.Sha256Sum()
|
2019-11-19 10:00:20 -07:00
|
|
|
|
|
|
|
duration := time.Since(hostinfo.handshakeStart).Nanoseconds()
|
|
|
|
l.WithField("vpnIp", IntIp(vpnIP)).WithField("udpAddr", addr).
|
2020-04-06 12:34:00 -06:00
|
|
|
WithField("certName", certName).
|
2020-07-31 16:54:51 -06:00
|
|
|
WithField("fingerprint", fingerprint).
|
2019-11-19 10:00:20 -07:00
|
|
|
WithField("initiatorIndex", hs.Details.InitiatorIndex).WithField("responderIndex", hs.Details.ResponderIndex).
|
|
|
|
WithField("remoteIndex", h.RemoteIndex).WithField("handshake", m{"stage": 2, "style": "ix_psk0"}).
|
|
|
|
WithField("durationNs", duration).
|
|
|
|
Info("Handshake message received")
|
|
|
|
|
|
|
|
//ci.remoteIndex = hs.ResponderIndex
|
|
|
|
hostinfo.remoteIndexId = hs.Details.ResponderIndex
|
|
|
|
hs.Details.Cert = ci.certState.rawCertificateNoKey
|
|
|
|
|
|
|
|
/*
|
|
|
|
hsBytes, err := proto.Marshal(hs)
|
|
|
|
if err != nil {
|
|
|
|
l.Debugln("Failed to marshal handshake: ", err)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
*/
|
|
|
|
|
|
|
|
// Regardless of whether you are the sender or receiver, you should arrive here
|
|
|
|
// and complete standing up the connection.
|
|
|
|
|
2021-03-12 12:16:25 -07:00
|
|
|
ci.peerCert = remoteCert
|
|
|
|
ci.dKey = NewNebulaCipherState(dKey)
|
|
|
|
ci.eKey = NewNebulaCipherState(eKey)
|
|
|
|
//l.Debugln("got symmetric pairs")
|
2019-11-19 10:00:20 -07:00
|
|
|
|
2021-03-18 19:37:24 -06:00
|
|
|
hostinfo.SetRemote(addr)
|
2021-03-12 12:16:25 -07:00
|
|
|
hostinfo.CreateRemoteCIDR(remoteCert)
|
2019-11-19 10:00:20 -07:00
|
|
|
|
2021-03-12 12:16:25 -07:00
|
|
|
f.handshakeManager.Complete(hostinfo, f)
|
|
|
|
hostinfo.handshakeComplete()
|
|
|
|
f.metricHandshakes.Update(duration)
|
2019-11-19 10:00:20 -07:00
|
|
|
|
|
|
|
return false
|
|
|
|
}
|