mirror of https://github.com/slackhq/nebula.git
511 lines
19 KiB
Go
511 lines
19 KiB
Go
package nebula
|
|
|
|
import (
|
|
"net/netip"
|
|
"time"
|
|
|
|
"github.com/flynn/noise"
|
|
"github.com/sirupsen/logrus"
|
|
"github.com/slackhq/nebula/header"
|
|
)
|
|
|
|
// NOISE IX Handshakes
|
|
|
|
// This function constructs a handshake packet, but does not actually send it
|
|
// Sending is done by the handshake manager
|
|
func ixHandshakeStage0(f *Interface, hh *HandshakeHostInfo) bool {
|
|
err := f.handshakeManager.allocateIndex(hh)
|
|
if err != nil {
|
|
f.l.WithError(err).WithField("vpnIp", hh.hostinfo.vpnIp).
|
|
WithField("handshake", m{"stage": 0, "style": "ix_psk0"}).Error("Failed to generate index")
|
|
return false
|
|
}
|
|
|
|
certState := f.pki.GetCertState()
|
|
ci := NewConnectionState(f.l, f.cipher, certState, true, noise.HandshakeIX, []byte{}, 0)
|
|
hh.hostinfo.ConnectionState = ci
|
|
|
|
hsProto := &NebulaHandshakeDetails{
|
|
InitiatorIndex: hh.hostinfo.localIndexId,
|
|
Time: uint64(time.Now().UnixNano()),
|
|
Cert: certState.RawCertificateNoKey,
|
|
}
|
|
|
|
hsBytes := []byte{}
|
|
|
|
hs := &NebulaHandshake{
|
|
Details: hsProto,
|
|
}
|
|
hsBytes, err = hs.Marshal()
|
|
|
|
if err != nil {
|
|
f.l.WithError(err).WithField("vpnIp", hh.hostinfo.vpnIp).
|
|
WithField("handshake", m{"stage": 0, "style": "ix_psk0"}).Error("Failed to marshal handshake message")
|
|
return false
|
|
}
|
|
|
|
h := header.Encode(make([]byte, header.Len), header.Version, header.Handshake, header.HandshakeIXPSK0, 0, 1)
|
|
|
|
msg, _, _, err := ci.H.WriteMessage(h, hsBytes)
|
|
if err != nil {
|
|
f.l.WithError(err).WithField("vpnIp", hh.hostinfo.vpnIp).
|
|
WithField("handshake", m{"stage": 0, "style": "ix_psk0"}).Error("Failed to call noise.WriteMessage")
|
|
return false
|
|
}
|
|
|
|
// We are sending handshake packet 1, so we don't expect to receive
|
|
// handshake packet 1 from the responder
|
|
ci.window.Update(f.l, 1)
|
|
|
|
hh.hostinfo.HandshakePacket[0] = msg
|
|
hh.ready = true
|
|
return true
|
|
}
|
|
|
|
func ixHandshakeStage1(f *Interface, addr netip.AddrPort, via *ViaSender, packet []byte, h *header.H) {
|
|
certState := f.pki.GetCertState()
|
|
ci := NewConnectionState(f.l, f.cipher, certState, false, noise.HandshakeIX, []byte{}, 0)
|
|
// Mark packet 1 as seen so it doesn't show up as missed
|
|
ci.window.Update(f.l, 1)
|
|
|
|
msg, _, _, err := ci.H.ReadMessage(nil, packet[header.Len:])
|
|
if err != nil {
|
|
f.l.WithError(err).WithField("udpAddr", addr).
|
|
WithField("handshake", m{"stage": 1, "style": "ix_psk0"}).Error("Failed to call noise.ReadMessage")
|
|
return
|
|
}
|
|
|
|
hs := &NebulaHandshake{}
|
|
err = hs.Unmarshal(msg)
|
|
/*
|
|
l.Debugln("GOT INDEX: ", hs.Details.InitiatorIndex)
|
|
*/
|
|
if err != nil || hs.Details == nil {
|
|
f.l.WithError(err).WithField("udpAddr", addr).
|
|
WithField("handshake", m{"stage": 1, "style": "ix_psk0"}).Error("Failed unmarshal handshake message")
|
|
return
|
|
}
|
|
|
|
remoteCert, err := RecombineCertAndValidate(ci.H, hs.Details.Cert, f.pki.GetCAPool())
|
|
if err != nil {
|
|
e := f.l.WithError(err).WithField("udpAddr", addr).
|
|
WithField("handshake", m{"stage": 1, "style": "ix_psk0"})
|
|
|
|
if f.l.Level > logrus.DebugLevel {
|
|
e = e.WithField("cert", remoteCert)
|
|
}
|
|
|
|
e.Info("Invalid certificate from host")
|
|
return
|
|
}
|
|
|
|
if len(remoteCert.Certificate.Networks()) == 0 {
|
|
e := f.l.WithError(err).WithField("udpAddr", addr).
|
|
WithField("handshake", m{"stage": 1, "style": "ix_psk0"})
|
|
|
|
if f.l.Level > logrus.DebugLevel {
|
|
e = e.WithField("cert", remoteCert)
|
|
}
|
|
|
|
e.Info("Invalid vpn ip from host")
|
|
return
|
|
}
|
|
|
|
vpnIp := remoteCert.Certificate.Networks()[0].Addr().Unmap()
|
|
certName := remoteCert.Certificate.Name()
|
|
fingerprint := remoteCert.Fingerprint
|
|
issuer := remoteCert.Certificate.Issuer()
|
|
|
|
if vpnIp == f.myVpnNet.Addr() {
|
|
f.l.WithField("vpnIp", vpnIp).WithField("udpAddr", addr).
|
|
WithField("certName", certName).
|
|
WithField("fingerprint", fingerprint).
|
|
WithField("issuer", issuer).
|
|
WithField("handshake", m{"stage": 1, "style": "ix_psk0"}).Error("Refusing to handshake with myself")
|
|
return
|
|
}
|
|
|
|
if addr.IsValid() {
|
|
if !f.lightHouse.GetRemoteAllowList().Allow(vpnIp, addr.Addr()) {
|
|
f.l.WithField("vpnIp", vpnIp).WithField("udpAddr", addr).Debug("lighthouse.remote_allow_list denied incoming handshake")
|
|
return
|
|
}
|
|
}
|
|
|
|
myIndex, err := generateIndex(f.l)
|
|
if err != nil {
|
|
f.l.WithError(err).WithField("vpnIp", vpnIp).WithField("udpAddr", addr).
|
|
WithField("certName", certName).
|
|
WithField("fingerprint", fingerprint).
|
|
WithField("issuer", issuer).
|
|
WithField("handshake", m{"stage": 1, "style": "ix_psk0"}).Error("Failed to generate index")
|
|
return
|
|
}
|
|
|
|
hostinfo := &HostInfo{
|
|
ConnectionState: ci,
|
|
localIndexId: myIndex,
|
|
remoteIndexId: hs.Details.InitiatorIndex,
|
|
vpnIp: vpnIp,
|
|
HandshakePacket: make(map[uint8][]byte, 0),
|
|
lastHandshakeTime: hs.Details.Time,
|
|
relayState: RelayState{
|
|
relays: map[netip.Addr]struct{}{},
|
|
relayForByIp: map[netip.Addr]*Relay{},
|
|
relayForByIdx: map[uint32]*Relay{},
|
|
},
|
|
}
|
|
|
|
f.l.WithField("vpnIp", vpnIp).WithField("udpAddr", addr).
|
|
WithField("certName", certName).
|
|
WithField("fingerprint", fingerprint).
|
|
WithField("issuer", issuer).
|
|
WithField("initiatorIndex", hs.Details.InitiatorIndex).WithField("responderIndex", hs.Details.ResponderIndex).
|
|
WithField("remoteIndex", h.RemoteIndex).WithField("handshake", m{"stage": 1, "style": "ix_psk0"}).
|
|
Info("Handshake message received")
|
|
|
|
hs.Details.ResponderIndex = myIndex
|
|
hs.Details.Cert = certState.RawCertificateNoKey
|
|
// Update the time in case their clock is way off from ours
|
|
hs.Details.Time = uint64(time.Now().UnixNano())
|
|
|
|
hsBytes, err := hs.Marshal()
|
|
if err != nil {
|
|
f.l.WithError(err).WithField("vpnIp", hostinfo.vpnIp).WithField("udpAddr", addr).
|
|
WithField("certName", certName).
|
|
WithField("fingerprint", fingerprint).
|
|
WithField("issuer", issuer).
|
|
WithField("handshake", m{"stage": 1, "style": "ix_psk0"}).Error("Failed to marshal handshake message")
|
|
return
|
|
}
|
|
|
|
nh := header.Encode(make([]byte, header.Len), header.Version, header.Handshake, header.HandshakeIXPSK0, hs.Details.InitiatorIndex, 2)
|
|
msg, dKey, eKey, err := ci.H.WriteMessage(nh, hsBytes)
|
|
if err != nil {
|
|
f.l.WithError(err).WithField("vpnIp", hostinfo.vpnIp).WithField("udpAddr", addr).
|
|
WithField("certName", certName).
|
|
WithField("fingerprint", fingerprint).
|
|
WithField("issuer", issuer).
|
|
WithField("handshake", m{"stage": 1, "style": "ix_psk0"}).Error("Failed to call noise.WriteMessage")
|
|
return
|
|
} else if dKey == nil || eKey == nil {
|
|
f.l.WithField("vpnIp", hostinfo.vpnIp).WithField("udpAddr", addr).
|
|
WithField("certName", certName).
|
|
WithField("fingerprint", fingerprint).
|
|
WithField("issuer", issuer).
|
|
WithField("handshake", m{"stage": 1, "style": "ix_psk0"}).Error("Noise did not arrive at a key")
|
|
return
|
|
}
|
|
|
|
hostinfo.HandshakePacket[0] = make([]byte, len(packet[header.Len:]))
|
|
copy(hostinfo.HandshakePacket[0], packet[header.Len:])
|
|
|
|
// Regardless of whether you are the sender or receiver, you should arrive here
|
|
// and complete standing up the connection.
|
|
hostinfo.HandshakePacket[2] = make([]byte, len(msg))
|
|
copy(hostinfo.HandshakePacket[2], msg)
|
|
|
|
// We are sending handshake packet 2, so we don't expect to receive
|
|
// handshake packet 2 from the initiator.
|
|
ci.window.Update(f.l, 2)
|
|
|
|
ci.peerCert = remoteCert
|
|
ci.dKey = NewNebulaCipherState(dKey)
|
|
ci.eKey = NewNebulaCipherState(eKey)
|
|
|
|
hostinfo.remotes = f.lightHouse.QueryCache(vpnIp)
|
|
hostinfo.SetRemote(addr)
|
|
hostinfo.CreateRemoteCIDR(remoteCert.Certificate)
|
|
|
|
existing, err := f.handshakeManager.CheckAndComplete(hostinfo, 0, f)
|
|
if err != nil {
|
|
switch err {
|
|
case ErrAlreadySeen:
|
|
// Update remote if preferred
|
|
if existing.SetRemoteIfPreferred(f.hostMap, addr) {
|
|
// Send a test packet to ensure the other side has also switched to
|
|
// the preferred remote
|
|
f.SendMessageToVpnIp(header.Test, header.TestRequest, vpnIp, []byte(""), make([]byte, 12, 12), make([]byte, mtu))
|
|
}
|
|
|
|
msg = existing.HandshakePacket[2]
|
|
f.messageMetrics.Tx(header.Handshake, header.MessageSubType(msg[1]), 1)
|
|
if addr.IsValid() {
|
|
err := f.outside.WriteTo(msg, addr)
|
|
if err != nil {
|
|
f.l.WithField("vpnIp", existing.vpnIp).WithField("udpAddr", addr).
|
|
WithField("handshake", m{"stage": 2, "style": "ix_psk0"}).WithField("cached", true).
|
|
WithError(err).Error("Failed to send handshake message")
|
|
} else {
|
|
f.l.WithField("vpnIp", existing.vpnIp).WithField("udpAddr", addr).
|
|
WithField("handshake", m{"stage": 2, "style": "ix_psk0"}).WithField("cached", true).
|
|
Info("Handshake message sent")
|
|
}
|
|
return
|
|
} else {
|
|
if via == nil {
|
|
f.l.Error("Handshake send failed: both addr and via are nil.")
|
|
return
|
|
}
|
|
hostinfo.relayState.InsertRelayTo(via.relayHI.vpnIp)
|
|
f.SendVia(via.relayHI, via.relay, msg, make([]byte, 12), make([]byte, mtu), false)
|
|
f.l.WithField("vpnIp", existing.vpnIp).WithField("relay", via.relayHI.vpnIp).
|
|
WithField("handshake", m{"stage": 2, "style": "ix_psk0"}).WithField("cached", true).
|
|
Info("Handshake message sent")
|
|
return
|
|
}
|
|
case ErrExistingHostInfo:
|
|
// This means there was an existing tunnel and this handshake was older than the one we are currently based on
|
|
f.l.WithField("vpnIp", vpnIp).WithField("udpAddr", addr).
|
|
WithField("certName", certName).
|
|
WithField("oldHandshakeTime", existing.lastHandshakeTime).
|
|
WithField("newHandshakeTime", hostinfo.lastHandshakeTime).
|
|
WithField("fingerprint", fingerprint).
|
|
WithField("issuer", issuer).
|
|
WithField("initiatorIndex", hs.Details.InitiatorIndex).WithField("responderIndex", hs.Details.ResponderIndex).
|
|
WithField("remoteIndex", h.RemoteIndex).WithField("handshake", m{"stage": 1, "style": "ix_psk0"}).
|
|
Info("Handshake too old")
|
|
|
|
// Send a test packet to trigger an authenticated tunnel test, this should suss out any lingering tunnel issues
|
|
f.SendMessageToVpnIp(header.Test, header.TestRequest, vpnIp, []byte(""), make([]byte, 12, 12), make([]byte, mtu))
|
|
return
|
|
case ErrLocalIndexCollision:
|
|
// This means we failed to insert because of collision on localIndexId. Just let the next handshake packet retry
|
|
f.l.WithField("vpnIp", vpnIp).WithField("udpAddr", addr).
|
|
WithField("certName", certName).
|
|
WithField("fingerprint", fingerprint).
|
|
WithField("issuer", issuer).
|
|
WithField("initiatorIndex", hs.Details.InitiatorIndex).WithField("responderIndex", hs.Details.ResponderIndex).
|
|
WithField("remoteIndex", h.RemoteIndex).WithField("handshake", m{"stage": 1, "style": "ix_psk0"}).
|
|
WithField("localIndex", hostinfo.localIndexId).WithField("collision", existing.vpnIp).
|
|
Error("Failed to add HostInfo due to localIndex collision")
|
|
return
|
|
default:
|
|
// Shouldn't happen, but just in case someone adds a new error type to CheckAndComplete
|
|
// And we forget to update it here
|
|
f.l.WithError(err).WithField("vpnIp", vpnIp).WithField("udpAddr", addr).
|
|
WithField("certName", certName).
|
|
WithField("fingerprint", fingerprint).
|
|
WithField("issuer", issuer).
|
|
WithField("initiatorIndex", hs.Details.InitiatorIndex).WithField("responderIndex", hs.Details.ResponderIndex).
|
|
WithField("remoteIndex", h.RemoteIndex).WithField("handshake", m{"stage": 1, "style": "ix_psk0"}).
|
|
Error("Failed to add HostInfo to HostMap")
|
|
return
|
|
}
|
|
}
|
|
|
|
// Do the send
|
|
f.messageMetrics.Tx(header.Handshake, header.MessageSubType(msg[1]), 1)
|
|
if addr.IsValid() {
|
|
err = f.outside.WriteTo(msg, addr)
|
|
if err != nil {
|
|
f.l.WithField("vpnIp", vpnIp).WithField("udpAddr", addr).
|
|
WithField("certName", certName).
|
|
WithField("fingerprint", fingerprint).
|
|
WithField("issuer", issuer).
|
|
WithField("initiatorIndex", hs.Details.InitiatorIndex).WithField("responderIndex", hs.Details.ResponderIndex).
|
|
WithField("remoteIndex", h.RemoteIndex).WithField("handshake", m{"stage": 2, "style": "ix_psk0"}).
|
|
WithError(err).Error("Failed to send handshake")
|
|
} else {
|
|
f.l.WithField("vpnIp", vpnIp).WithField("udpAddr", addr).
|
|
WithField("certName", certName).
|
|
WithField("fingerprint", fingerprint).
|
|
WithField("issuer", issuer).
|
|
WithField("initiatorIndex", hs.Details.InitiatorIndex).WithField("responderIndex", hs.Details.ResponderIndex).
|
|
WithField("remoteIndex", h.RemoteIndex).WithField("handshake", m{"stage": 2, "style": "ix_psk0"}).
|
|
Info("Handshake message sent")
|
|
}
|
|
} else {
|
|
if via == nil {
|
|
f.l.Error("Handshake send failed: both addr and via are nil.")
|
|
return
|
|
}
|
|
hostinfo.relayState.InsertRelayTo(via.relayHI.vpnIp)
|
|
f.SendVia(via.relayHI, via.relay, msg, make([]byte, 12), make([]byte, mtu), false)
|
|
f.l.WithField("vpnIp", vpnIp).WithField("relay", via.relayHI.vpnIp).
|
|
WithField("certName", certName).
|
|
WithField("fingerprint", fingerprint).
|
|
WithField("issuer", issuer).
|
|
WithField("initiatorIndex", hs.Details.InitiatorIndex).WithField("responderIndex", hs.Details.ResponderIndex).
|
|
WithField("remoteIndex", h.RemoteIndex).WithField("handshake", m{"stage": 2, "style": "ix_psk0"}).
|
|
Info("Handshake message sent")
|
|
}
|
|
|
|
f.connectionManager.AddTrafficWatch(hostinfo.localIndexId)
|
|
|
|
hostinfo.remotes.ResetBlockedRemotes()
|
|
|
|
return
|
|
}
|
|
|
|
func ixHandshakeStage2(f *Interface, addr netip.AddrPort, via *ViaSender, hh *HandshakeHostInfo, packet []byte, h *header.H) bool {
|
|
if hh == nil {
|
|
// Nothing here to tear down, got a bogus stage 2 packet
|
|
return true
|
|
}
|
|
|
|
hh.Lock()
|
|
defer hh.Unlock()
|
|
|
|
hostinfo := hh.hostinfo
|
|
if addr.IsValid() {
|
|
if !f.lightHouse.GetRemoteAllowList().Allow(hostinfo.vpnIp, addr.Addr()) {
|
|
f.l.WithField("vpnIp", hostinfo.vpnIp).WithField("udpAddr", addr).Debug("lighthouse.remote_allow_list denied incoming handshake")
|
|
return false
|
|
}
|
|
}
|
|
|
|
ci := hostinfo.ConnectionState
|
|
msg, eKey, dKey, err := ci.H.ReadMessage(nil, packet[header.Len:])
|
|
if err != nil {
|
|
f.l.WithError(err).WithField("vpnIp", hostinfo.vpnIp).WithField("udpAddr", addr).
|
|
WithField("handshake", m{"stage": 2, "style": "ix_psk0"}).WithField("header", h).
|
|
Error("Failed to call noise.ReadMessage")
|
|
|
|
// We don't want to tear down the connection on a bad ReadMessage because it could be an attacker trying
|
|
// to DOS us. Every other error condition after should to allow a possible good handshake to complete in the
|
|
// near future
|
|
return false
|
|
} else if dKey == nil || eKey == nil {
|
|
f.l.WithField("vpnIp", hostinfo.vpnIp).WithField("udpAddr", addr).
|
|
WithField("handshake", m{"stage": 2, "style": "ix_psk0"}).
|
|
Error("Noise did not arrive at a key")
|
|
|
|
// This should be impossible in IX but just in case, if we get here then there is no chance to recover
|
|
// the handshake state machine. Tear it down
|
|
return true
|
|
}
|
|
|
|
hs := &NebulaHandshake{}
|
|
err = hs.Unmarshal(msg)
|
|
if err != nil || hs.Details == nil {
|
|
f.l.WithError(err).WithField("vpnIp", hostinfo.vpnIp).WithField("udpAddr", addr).
|
|
WithField("handshake", m{"stage": 2, "style": "ix_psk0"}).Error("Failed unmarshal handshake message")
|
|
|
|
// The handshake state machine is complete, if things break now there is no chance to recover. Tear down and start again
|
|
return true
|
|
}
|
|
|
|
remoteCert, err := RecombineCertAndValidate(ci.H, hs.Details.Cert, f.pki.GetCAPool())
|
|
if err != nil {
|
|
e := f.l.WithError(err).WithField("vpnIp", hostinfo.vpnIp).WithField("udpAddr", addr).
|
|
WithField("handshake", m{"stage": 2, "style": "ix_psk0"})
|
|
|
|
if f.l.Level > logrus.DebugLevel {
|
|
e = e.WithField("cert", remoteCert)
|
|
}
|
|
|
|
e.Error("Invalid certificate from host")
|
|
|
|
// The handshake state machine is complete, if things break now there is no chance to recover. Tear down and start again
|
|
return true
|
|
}
|
|
|
|
if len(remoteCert.Certificate.Networks()) == 0 {
|
|
e := f.l.WithError(err).WithField("udpAddr", addr).
|
|
WithField("handshake", m{"stage": 2, "style": "ix_psk0"})
|
|
|
|
if f.l.Level > logrus.DebugLevel {
|
|
e = e.WithField("cert", remoteCert)
|
|
}
|
|
|
|
e.Info("Invalid vpn ip from host")
|
|
return true
|
|
}
|
|
|
|
vpnIp := remoteCert.Certificate.Networks()[0].Addr().Unmap()
|
|
certName := remoteCert.Certificate.Name()
|
|
fingerprint := remoteCert.Fingerprint
|
|
issuer := remoteCert.Certificate.Issuer()
|
|
|
|
// Ensure the right host responded
|
|
if vpnIp != hostinfo.vpnIp {
|
|
f.l.WithField("intendedVpnIp", hostinfo.vpnIp).WithField("haveVpnIp", vpnIp).
|
|
WithField("udpAddr", addr).WithField("certName", certName).
|
|
WithField("handshake", m{"stage": 2, "style": "ix_psk0"}).
|
|
Info("Incorrect host responded to handshake")
|
|
|
|
// Release our old handshake from pending, it should not continue
|
|
f.handshakeManager.DeleteHostInfo(hostinfo)
|
|
|
|
// Create a new hostinfo/handshake for the intended vpn ip
|
|
f.handshakeManager.StartHandshake(hostinfo.vpnIp, func(newHH *HandshakeHostInfo) {
|
|
//TODO: this doesnt know if its being added or is being used for caching a packet
|
|
// Block the current used address
|
|
newHH.hostinfo.remotes = hostinfo.remotes
|
|
newHH.hostinfo.remotes.BlockRemote(addr)
|
|
|
|
// Get the correct remote list for the host we did handshake with
|
|
hostinfo.remotes = f.lightHouse.QueryCache(vpnIp)
|
|
|
|
f.l.WithField("blockedUdpAddrs", newHH.hostinfo.remotes.CopyBlockedRemotes()).WithField("vpnIp", vpnIp).
|
|
WithField("remotes", newHH.hostinfo.remotes.CopyAddrs(f.hostMap.GetPreferredRanges())).
|
|
Info("Blocked addresses for handshakes")
|
|
|
|
// Swap the packet store to benefit the original intended recipient
|
|
newHH.packetStore = hh.packetStore
|
|
hh.packetStore = []*cachedPacket{}
|
|
|
|
// Finally, put the correct vpn ip in the host info, tell them to close the tunnel, and return true to tear down
|
|
hostinfo.vpnIp = vpnIp
|
|
f.sendCloseTunnel(hostinfo)
|
|
})
|
|
|
|
return true
|
|
}
|
|
|
|
// Mark packet 2 as seen so it doesn't show up as missed
|
|
ci.window.Update(f.l, 2)
|
|
|
|
duration := time.Since(hh.startTime).Nanoseconds()
|
|
f.l.WithField("vpnIp", vpnIp).WithField("udpAddr", addr).
|
|
WithField("certName", certName).
|
|
WithField("fingerprint", fingerprint).
|
|
WithField("issuer", issuer).
|
|
WithField("initiatorIndex", hs.Details.InitiatorIndex).WithField("responderIndex", hs.Details.ResponderIndex).
|
|
WithField("remoteIndex", h.RemoteIndex).WithField("handshake", m{"stage": 2, "style": "ix_psk0"}).
|
|
WithField("durationNs", duration).
|
|
WithField("sentCachedPackets", len(hh.packetStore)).
|
|
Info("Handshake message received")
|
|
|
|
hostinfo.remoteIndexId = hs.Details.ResponderIndex
|
|
hostinfo.lastHandshakeTime = hs.Details.Time
|
|
|
|
// Store their cert and our symmetric keys
|
|
ci.peerCert = remoteCert
|
|
ci.dKey = NewNebulaCipherState(dKey)
|
|
ci.eKey = NewNebulaCipherState(eKey)
|
|
|
|
// Make sure the current udpAddr being used is set for responding
|
|
if addr.IsValid() {
|
|
hostinfo.SetRemote(addr)
|
|
} else {
|
|
hostinfo.relayState.InsertRelayTo(via.relayHI.vpnIp)
|
|
}
|
|
|
|
// Build up the radix for the firewall if we have subnets in the cert
|
|
hostinfo.CreateRemoteCIDR(remoteCert.Certificate)
|
|
|
|
// Complete our handshake and update metrics, this will replace any existing tunnels for this vpnIp
|
|
f.handshakeManager.Complete(hostinfo, f)
|
|
f.connectionManager.AddTrafficWatch(hostinfo.localIndexId)
|
|
|
|
if f.l.Level >= logrus.DebugLevel {
|
|
hostinfo.logger(f.l).Debugf("Sending %d stored packets", len(hh.packetStore))
|
|
}
|
|
|
|
if len(hh.packetStore) > 0 {
|
|
nb := make([]byte, 12, 12)
|
|
out := make([]byte, mtu)
|
|
for _, cp := range hh.packetStore {
|
|
cp.callback(cp.messageType, cp.messageSubType, hostinfo, cp.packet, nb, out)
|
|
}
|
|
f.cachedPacketMetrics.sent.Inc(int64(len(hh.packetStore)))
|
|
}
|
|
|
|
hostinfo.remotes.ResetBlockedRemotes()
|
|
f.metricHandshakes.Update(duration)
|
|
|
|
return false
|
|
}
|