1 // VoRS -- Vo(IP) Really Simple
2 // Copyright (C) 2024 Sergey Matveev <stargrave@stargrave.org>
4 // This program is free software: you can redistribute it and/or modify
5 // it under the terms of the GNU Affero General Public License as
6 // published by the Free Software Foundation, version 3 of the License.
8 // This program is distributed in the hope that it will be useful,
9 // but WITHOUT ANY WARRANTY; without even the implied warranty of
10 // MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
11 // GNU Affero General Public License for more details.
13 // You should have received a copy of the GNU Affero General Public License
14 // along with this program. If not, see <http://www.gnu.org/licenses/>.
35 "github.com/dchest/siphash"
36 "github.com/flynn/noise"
37 "github.com/jroimartin/gocui"
38 "go.stargrave.org/opus/v2"
39 vors "go.stargrave.org/vors/v3/internal"
40 "golang.org/x/crypto/blake2s"
41 "golang.org/x/crypto/chacha20"
52 Streams = map[byte]*Stream{}
53 Finish = make(chan struct{})
54 OurStats = &Stats{dead: make(chan struct{})}
55 Name = flag.String("name", "test", "username")
56 Room = flag.String("room", "/", "room name")
60 func parseSID(s string) byte {
61 n, err := strconv.Atoi(s)
66 log.Fatal("too big stream num")
71 func incr(data []byte) {
72 for i := len(data) - 1; i >= 0; i-- {
82 srvAddr := flag.String("srv", "vors.home.arpa:"+strconv.Itoa(vors.DefaultPort),
83 "host:TCP/UDP port to connect to")
84 srvPubB64 := flag.String("pub", "", "server's public key, Base64")
85 recCmd := flag.String("rec", "rec "+vors.SoxParams, "rec command")
86 playCmd := flag.String("play", "play "+vors.SoxParams, "play command")
87 vadRaw := flag.Uint("vad", 0, "VAD threshold")
88 passwd := flag.String("passwd", "", "protected room's password")
89 muteToggle := flag.String("mute-toggle", "", "path to FIFO to toggle mute")
90 prefer4 := flag.Bool("4", false,
91 "Prefer obsolete legacy IPv4 address during name resolution")
92 version := flag.Bool("version", false, "print version")
93 warranty := flag.Bool("warranty", false, "print warranty information")
95 log.SetFlags(log.Lmicroseconds | log.Lshortfile)
98 fmt.Println(vors.Warranty)
102 fmt.Println(vors.GetVersion())
106 srvPub, err := base64.RawURLEncoding.DecodeString(*srvPubB64)
110 *Name = strings.ReplaceAll(*Name, " ", "-")
113 if *muteToggle == "" {
117 fd, err := os.OpenFile(*muteToggle, os.O_WRONLY, os.FileMode(0666))
128 fd.WriteString(reply + "\n")
130 time.Sleep(time.Second)
134 vad := uint64(*vadRaw)
135 opusEnc := newOpusEnc()
136 var mic io.ReadCloser
138 cmd := vors.MakeCmd(*recCmd)
139 mic, err = cmd.StdoutPipe()
149 vors.PreferIPv4 = *prefer4
150 ctrl, err := net.DialTCP("tcp", nil, vors.MustResolveTCP(*srvAddr))
152 log.Fatalln("dial server:", err)
155 if err = ctrl.SetNoDelay(true); err != nil {
156 log.Fatalln("nodelay:", err)
159 hs, err := noise.NewHandshakeState(noise.Config{
160 CipherSuite: vors.NoiseCipherSuite,
161 Pattern: noise.HandshakeNK,
164 Prologue: []byte(vors.NoisePrologue),
167 log.Fatalln("noise.NewHandshakeState:", err)
169 buf, _, _, err := hs.WriteMessage(nil, []byte(*Name+" "+*Room+" "+*passwd))
171 log.Fatalln("handshake encrypt:", err)
175 []byte(vors.NoisePrologue),
176 byte((len(buf)&0xFF00)>>8),
177 byte((len(buf)&0x00FF)>>0),
181 _, err = io.Copy(ctrl, bytes.NewReader(buf))
183 log.Fatalln("write handshake:", err)
186 buf, err = vors.PktRead(ctrl)
188 log.Fatalln("read handshake:", err)
190 buf, txCS, rxCS, err := hs.ReadMessage(nil, buf)
192 log.Fatalln("handshake decrypt:", err)
195 rx := make(chan []byte)
198 buf, err := vors.PktRead(ctrl)
200 log.Println("rx", err)
203 buf, err = rxCS.Decrypt(buf[:0], nil, buf)
205 log.Println("rx decrypt", err)
213 srvAddrUDP := vors.MustResolveUDP(*srvAddr)
214 conn, err := net.DialUDP("udp", nil, srvAddrUDP)
216 log.Fatalln("connect:", err)
220 cols := strings.Fields(string(buf))
221 if cols[0] != "OK" || len(cols) != 2 {
222 log.Fatalln("handshake failed:", cols)
224 var cookie vors.Cookie
225 cookieRaw, err := hex.DecodeString(cols[1])
229 copy(cookie[:], cookieRaw)
230 timeout := time.NewTimer(vors.PingTime)
236 ticker := time.NewTicker(time.Second)
237 if _, err = conn.Write(cookie[:]); err != nil {
238 log.Fatalln("write:", err)
240 WaitForCookieAcceptance:
244 log.Fatalln("cookie acceptance timeout")
246 if _, err = conn.Write(cookie[:]); err != nil {
247 log.Fatalln("write:", err)
250 cols = strings.Fields(string(buf))
251 if cols[0] != "SID" || len(cols) != 2 {
252 log.Fatalln("cookie acceptance failed:", string(buf))
254 sid = parseSID(cols[1])
255 Streams[sid] = &Stream{name: *Name, stats: OurStats}
256 break WaitForCookieAcceptance
264 var keyCiphOur []byte
267 xof, err := blake2s.NewXOF(chacha20.KeySize+16, nil)
271 xof.Write([]byte(vors.NoisePrologue))
272 xof.Write(hs.ChannelBinding())
273 buf := make([]byte, chacha20.KeySize+16)
274 if _, err = io.ReadFull(xof, buf); err != nil {
277 keyCiphOur, keyMACOur = buf[:chacha20.KeySize], buf[chacha20.KeySize:]
282 LoggerReady := make(chan struct{})
283 GUI, err = gocui.NewGui(gocui.OutputNormal)
288 GUI.SelFgColor = gocui.ColorCyan
290 GUI.SetManagerFunc(guiLayout)
291 if err := GUI.SetKeybinding("", 'q', gocui.ModNone, guiQuit); err != nil {
294 if err := GUI.SetKeybinding("", gocui.KeyEnter, gocui.ModNone, mute); err != nil {
300 v, err := GUI.View("logs")
305 log.Println("connected", "sid:", sid,
306 "addr:", conn.LocalAddr().String())
309 time.Sleep(vors.ScreenRefresh)
310 GUI.Update(func(gui *gocui.Gui) error {
319 time.Sleep(100 * time.Millisecond)
325 time.Sleep(vors.PingTime)
326 buf, err := txCS.Encrypt(nil, nil, []byte(vors.CmdPing))
328 log.Fatalln("tx encrypt:", err)
330 if err = vors.PktWrite(ctrl, buf); err != nil {
331 log.Fatalln("tx:", err)
336 go func(seen *time.Time) {
338 for buf := range rx {
339 if string(buf) == vors.CmdPong {
344 cols := strings.Fields(string(buf))
347 sidRaw, name, keyHex := cols[1], cols[2], cols[3]
348 log.Println("add", name, "sid:", sidRaw)
349 sid := parseSID(sidRaw)
350 key, err := hex.DecodeString(keyHex)
354 keyCiph, keyMAC := key[:chacha20.KeySize], key[chacha20.KeySize:]
357 in: make(chan []byte, 1<<10),
358 stats: &Stats{dead: make(chan struct{})},
361 dec, err := opus.NewDecoder(vors.Rate, 1)
365 if err = dec.SetComplexity(10); err != nil {
369 var player io.WriteCloser
370 playerTx := make(chan []byte, 5)
373 cmd = vors.MakeCmd(*playCmd)
374 player, err = cmd.StdinPipe()
387 for len(playerTx) > vors.MaxLost {
389 stream.stats.reorder++
391 pcmbuf, ok = <-playerTx
395 if _, err = io.Copy(player,
396 bytes.NewReader(pcmbuf)); err != nil {
397 log.Println("play:", err)
404 var ciph *chacha20.Cipher
405 mac := siphash.New(keyMAC)
406 tag := make([]byte, siphash.Size)
408 pcm := make([]int16, vors.FrameLen)
409 nonce := make([]byte, 12)
413 for buf := range stream.in {
414 copy(nonce[len(nonce)-4:], buf)
416 if _, err = mac.Write(buf[:len(buf)-siphash.Size]); err != nil {
420 if subtle.ConstantTimeCompare(
422 buf[len(buf)-siphash.Size:],
427 ciph, err = chacha20.NewUnauthenticatedCipher(keyCiph, nonce)
431 pkt = buf[4 : len(buf)-siphash.Size]
432 ciph.XORKeyStream(pkt, pkt)
434 ctr = binary.BigEndian.Uint32(nonce[len(nonce)-4:])
436 // ignore the very first packet in the stream
439 lost = int(ctr - (stream.ctr + 1))
442 stream.stats.lost += int64(lost)
443 if lost > vors.MaxLost {
446 for ; lost > 0; lost-- {
447 lastDur, err = dec.LastPacketDuration()
449 log.Println("PLC:", err)
452 err = dec.DecodePLC(pcm[:lastDur])
454 log.Println("PLC:", err)
457 stream.stats.AddRMS(pcm)
461 pcmbuf := make([]byte, 2*lastDur)
462 pcmConv(pcmbuf, pcm[:lastDur])
465 _, err = dec.Decode(pkt, pcm)
467 log.Println("decode:", err)
470 stream.stats.AddRMS(pcm)
471 stream.stats.last = time.Now()
475 pcmbuf := make([]byte, 2*len(pcm))
483 go statsDrawer(stream.stats, stream.name)
484 Streams[sid] = stream
486 sid := parseSID(cols[1])
489 log.Println("unknown sid:", sid)
492 log.Println("del", s.name, "sid:", cols[1])
497 log.Fatal("unknown cmd:", cols[0])
502 go func(seen *time.Time) {
503 for now := range time.Tick(vors.PingTime) {
504 if seen.Add(2 * vors.PingTime).Before(now) {
505 log.Println("timeout:", seen)
515 var from *net.UDPAddr
520 buf := make([]byte, 2*vors.FrameLen)
521 n, from, err = conn.ReadFromUDP(buf)
523 log.Println("recvfrom:", err)
527 if from.Port != srvAddrUDP.Port || !from.IP.Equal(srvAddrUDP.IP) {
528 log.Println("wrong addr:", from)
531 if n <= 4+siphash.Size {
532 log.Println("too small:", n)
535 stream = Streams[buf[0]]
537 // log.Println("unknown stream:", buf[0])
541 stream.stats.bytes += vors.IPHdrLen(from.IP) + 8 + uint64(n)
542 ctr = binary.BigEndian.Uint32(buf)
543 if ctr <= stream.ctr {
544 stream.stats.reorder++
551 go statsDrawer(OurStats, *Name)
554 for now := range time.NewTicker(time.Second).C {
555 if !OurStats.last.Add(time.Second).Before(now) {
559 OurStats.bytes += vors.IPHdrLen(srvAddrUDP.IP) + 8 + 1
560 if _, err = conn.Write([]byte{sid}); err != nil {
561 log.Println("send:", err)
570 var ciph *chacha20.Cipher
571 mac := siphash.New(keyMACOur)
572 tag := make([]byte, siphash.Size)
573 buf := make([]byte, 2*vors.FrameLen)
574 pcm := make([]int16, vors.FrameLen)
575 nonce := make([]byte, 12)
576 nonce[len(nonce)-4] = sid
580 _, err = io.ReadFull(mic, buf)
582 log.Println("mic:", err)
588 for i = 0; i < vors.FrameLen; i++ {
589 pcm[i] = int16(uint16(buf[i*2+0]) | (uint16(buf[i*2+1]) << 8))
591 if vad != 0 && vors.RMS(pcm) < vad {
594 n, err = opusEnc.Encode(pcm, buf[4:])
603 incr(nonce[len(nonce)-3:])
604 copy(buf, nonce[len(nonce)-4:])
605 ciph, err = chacha20.NewUnauthenticatedCipher(keyCiphOur, nonce)
609 ciph.XORKeyStream(buf[4:4+n], buf[4:4+n])
611 if _, err = mac.Write(buf[:4+n]); err != nil {
616 pkt = buf[:4+n+siphash.Size]
619 OurStats.bytes += vors.IPHdrLen(srvAddrUDP.IP) + 8 + uint64(len(pkt))
620 OurStats.last = time.Now()
622 if _, err = conn.Write(pkt); err != nil {
623 log.Println("send:", err)
629 if err != nil && err != gocui.ErrQuit {