1 // VoRS -- Vo(IP) Really Simple
2 // Copyright (C) 2024 Sergey Matveev <stargrave@stargrave.org>
4 // This program is free software: you can redistribute it and/or modify
5 // it under the terms of the GNU Affero General Public License as
6 // published by the Free Software Foundation, version 3 of the License.
8 // This program is distributed in the hope that it will be useful,
9 // but WITHOUT ANY WARRANTY; without even the implied warranty of
10 // MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
11 // GNU Affero General Public License for more details.
13 // You should have received a copy of the GNU Affero General Public License
14 // along with this program. If not, see <http://www.gnu.org/licenses/>.
36 "github.com/flynn/noise"
37 "github.com/jroimartin/gocui"
38 vors "go.stargrave.org/vors/internal"
39 "golang.org/x/crypto/blake2s"
40 "golang.org/x/crypto/chacha20"
41 "golang.org/x/crypto/poly1305"
46 MinVersion: tls.VersionTLS13,
47 CurvePreferences: []tls.CurveID{tls.X25519},
50 Cookies = map[vors.Cookie]chan *net.UDPAddr{}
53 func newPeer(conn *net.TCPConn) {
54 logger := slog.With("remote", conn.RemoteAddr().String())
55 logger.Info("connected")
57 err := conn.SetNoDelay(true)
59 log.Fatalln("nodelay:", err)
61 buf := make([]byte, len(vors.NoisePrologue))
63 if _, err = io.ReadFull(conn, buf); err != nil {
64 logger.Error("handshake: read prologue", "err", err)
67 if string(buf) != vors.NoisePrologue {
68 logger.Error("handshake: wrong prologue", "err", err)
72 hs, err := noise.NewHandshakeState(noise.Config{
73 CipherSuite: vors.NoiseCipherSuite,
74 Pattern: noise.HandshakeNK,
76 StaticKeypair: noise.DHKey{Private: Prv, Public: Pub},
77 Prologue: []byte(vors.NoisePrologue),
80 log.Fatalln("noise.NewHandshakeState:", err)
82 buf, err = vors.PktRead(conn)
84 logger.Error("read handshake", "err", err)
91 rx: make(chan []byte),
92 tx: make(chan []byte, 10),
93 alive: make(chan struct{}),
97 nameAndRoom, _, _, err := hs.ReadMessage(nil, buf)
99 logger.Error("handshake: decrypt", "err", err)
102 cols := strings.SplitN(string(nameAndRoom), " ", 3)
111 peer.name = string(cols[0])
112 logger = logger.With("name", peer.name, "room", roomName)
114 room = Rooms[roomName]
119 peers: make(map[byte]*Peer),
120 alive: make(chan struct{}),
122 Rooms[roomName] = room
127 tick := time.Tick(vors.ScreenRefresh)
133 GUI.DeleteView(room.name)
136 v, err = GUI.View(room.name)
139 v.Write([]byte(strings.Join(room.Stats(now), "\n")))
147 logger.Error("wrong password")
148 buf, _, _, err = hs.WriteMessage(nil, []byte("wrong password"))
152 vors.PktWrite(conn, buf)
158 for _, p := range room.peers {
159 if p.name != peer.name {
162 logger.Error("name already taken")
163 buf, _, _, err = hs.WriteMessage(nil, []byte("name already taken"))
167 vors.PktWrite(conn, buf)
176 for i = 0; i <= (1<<8)-1; i++ {
177 if _, ok = Peers[i]; !ok {
184 Peers[peer.sid] = peer
189 buf, _, _, err = hs.WriteMessage(nil, []byte("too many users"))
193 vors.PktWrite(conn, buf)
197 logger = logger.With("sid", peer.sid)
198 room.peers[peer.sid] = peer
199 logger.Info("logged in")
202 logger.Info("removing")
204 delete(Peers, peer.sid)
205 delete(room.peers, peer.sid)
207 s := []byte(fmt.Sprintf("%s %d", vors.CmdDel, peer.sid))
208 for _, p := range room.peers {
209 go func(tx chan []byte) { tx <- s }(p.tx)
214 var cookie vors.Cookie
215 if _, err = io.ReadFull(rand.Reader, cookie[:]); err != nil {
216 log.Fatalln("cookie:", err)
218 gotCookie := make(chan *net.UDPAddr)
219 Cookies[cookie] = gotCookie
221 var txCS, rxCS *noise.CipherState
222 buf, txCS, rxCS, err := hs.WriteMessage(nil,
223 []byte(fmt.Sprintf("OK %s", hex.EncodeToString(cookie[:]))))
225 log.Fatalln("hs.WriteMessage:", err)
227 if err = vors.PktWrite(conn, buf); err != nil {
228 logger.Error("handshake write", "err", err)
229 delete(Cookies, cookie)
232 peer.rxCS, peer.txCS = txCS, rxCS
234 timeout := time.NewTimer(vors.PingTime)
236 case peer.addr = <-gotCookie:
238 logger.Error("cookie timeout")
239 delete(Cookies, cookie)
242 delete(Cookies, cookie)
243 logger.Info("got cookie", "addr", peer.addr)
249 peer.tx <- []byte(fmt.Sprintf("SID %d", peer.sid))
251 for _, p := range room.peers {
252 if p.sid == peer.sid {
255 peer.tx <- []byte(fmt.Sprintf("%s %d %s %s",
256 vors.CmdAdd, p.sid, p.name, hex.EncodeToString(p.key)))
260 h, err := blake2s.New256(hs.ChannelBinding())
264 h.Write([]byte(vors.NoisePrologue))
265 peer.key = h.Sum(nil)
269 s := []byte(fmt.Sprintf("%s %d %s %s",
270 vors.CmdAdd, peer.sid, peer.name, hex.EncodeToString(peer.key)))
271 for _, p := range room.peers {
272 if p.sid != peer.sid {
279 go func(seen *time.Time) {
280 ticker := time.Tick(vors.PingTime)
285 if seen.Add(2 * vors.PingTime).Before(now) {
286 logger.Error("timeout:", "seen", seen)
296 for buf := range peer.rx {
297 if string(buf) == vors.CmdPing {
299 peer.tx <- []byte(vors.CmdPong)
305 bind := flag.String("bind", "[::1]:"+strconv.Itoa(vors.DefaultPort),
306 "host:TCP/UDP port to listen on")
307 kpFile := flag.String("key", "key", "path to keypair file")
308 version := flag.Bool("version", false, "print version")
309 warranty := flag.Bool("warranty", false, "print warranty information")
311 log.SetFlags(log.Lmicroseconds | log.Lshortfile)
314 fmt.Println(vors.Warranty)
318 fmt.Println(vors.GetVersion())
323 data, err := os.ReadFile(*kpFile)
327 Prv, Pub = data[:len(data)/2], data[len(data)/2:]
330 lnTCP, err := net.ListenTCP("tcp",
331 net.TCPAddrFromAddrPort(netip.MustParseAddrPort(*bind)))
335 lnUDP, err := net.ListenUDP("udp",
336 net.UDPAddrFromAddrPort(netip.MustParseAddrPort(*bind)))
341 LoggerReady := make(chan struct{})
344 slog.SetDefault(slog.New(slog.NewTextHandler(os.Stderr, nil)))
347 GUI, err = gocui.NewGui(gocui.OutputNormal)
352 GUI.SetManagerFunc(guiLayout)
353 if err := GUI.SetKeybinding("", gocui.KeyF10, gocui.ModNone, guiQuit); err != nil {
359 v, err := GUI.View("logs")
363 slog.SetDefault(slog.New(slog.NewTextHandler(v, nil)))
366 time.Sleep(vors.ScreenRefresh)
367 GUI.Update(func(gui *gocui.Gui) error {
376 buf := make([]byte, 2*vors.FrameLen)
378 var from *net.UDPAddr
382 var ciph *chacha20.Cipher
384 var mac *poly1305.MAC
385 tag := make([]byte, poly1305.TagSize)
386 nonce := make([]byte, 12)
388 n, from, err = lnUDP.ReadFromUDP(buf)
390 log.Fatalln("recvfrom:", err)
393 if n == vors.CookieLen {
394 var cookie vors.Cookie
396 if c, ok := Cookies[cookie]; ok {
400 slog.Info("unknown cookie", "cookie", cookie)
408 slog.Info("unknown", "sid", sid, "from", from)
412 if from.Port != peer.addr.Port || !from.IP.Equal(peer.addr.IP) {
413 slog.Info("wrong addr",
421 peer.stats.bytesRx += vors.IPHdrLen(from.IP) + 8 + uint64(n)
425 if n <= 4+vors.TagLen {
430 copy(nonce[len(nonce)-4:], buf)
431 ciph, err = chacha20.NewUnauthenticatedCipher(peer.key, nonce)
436 ciph.XORKeyStream(macKey[:], macKey[:])
438 mac = poly1305.New(&macKey)
439 if _, err = mac.Write(buf[4 : n-vors.TagLen]); err != nil {
443 if subtle.ConstantTimeCompare(
445 buf[n-vors.TagLen:n],
451 peer.stats.last = time.Now()
452 for _, p := range peer.room.peers {
457 p.stats.bytesTx += vors.IPHdrLen(p.addr.IP) + 8 + uint64(n)
458 if _, err = lnUDP.WriteToUDP(buf[:n], p.addr); err != nil {
459 slog.Warn("sendto", "peer", peer.name, "err", err)
467 slog.Info("listening",
469 "pub", base64.RawURLEncoding.EncodeToString(Pub))
471 conn, err := lnTCP.AcceptTCP()
473 log.Fatalln("accept:", err)
480 <-make(chan struct{})
483 if err != nil && err != gocui.ErrQuit {