2 * Copyright (c) 2020 Doc.ai and/or its affiliates.
3 * Copyright (c) 2020 Cisco and/or its affiliates.
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at:
8 * http://www.apache.org/licenses/LICENSE-2.0
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
17 #include <vnet/adj/adj_midchain.h>
18 #include <vnet/fib/fib_table.h>
19 #include <wireguard/wireguard_peer.h>
20 #include <wireguard/wireguard_if.h>
21 #include <wireguard/wireguard_messages.h>
22 #include <wireguard/wireguard_key.h>
23 #include <wireguard/wireguard_send.h>
24 #include <wireguard/wireguard.h>
26 static fib_source_t wg_fib_source;
27 wg_peer_t *wg_peer_pool;
29 index_t *wg_peer_by_adj_index;
32 wg_peer_endpoint_reset (wg_peer_endpoint_t * ep)
34 ip46_address_reset (&ep->addr);
39 wg_peer_endpoint_init (wg_peer_endpoint_t * ep,
40 const ip46_address_t * addr, u16 port)
42 ip46_address_copy (&ep->addr, addr);
47 wg_peer_fib_flush (wg_peer_t * peer)
49 wg_peer_allowed_ip_t *allowed_ip;
51 vec_foreach (allowed_ip, peer->allowed_ips)
53 fib_table_entry_delete_index (allowed_ip->fib_entry_index, wg_fib_source);
54 allowed_ip->fib_entry_index = FIB_NODE_INDEX_INVALID;
59 wg_peer_fib_populate (wg_peer_t * peer, u32 fib_index)
61 wg_peer_allowed_ip_t *allowed_ip;
63 vec_foreach (allowed_ip, peer->allowed_ips)
65 allowed_ip->fib_entry_index =
66 fib_table_entry_path_add (fib_index,
70 fib_proto_to_dpo (allowed_ip->
72 &peer->dst.addr, peer->wg_sw_if_index, ~0, 1,
73 NULL, FIB_ROUTE_PATH_FLAG_NONE);
78 wg_peer_clear (vlib_main_t * vm, wg_peer_t * peer)
80 wg_timers_stop (peer);
81 for (int i = 0; i < WG_N_TIMERS; i++)
86 peer->last_sent_handshake = vlib_time_now (vm) - (REKEY_TIMEOUT + 1);
88 clib_memset (&peer->cookie_maker, 0, sizeof (peer->cookie_maker));
90 wg_peer_endpoint_reset (&peer->src);
91 wg_peer_endpoint_reset (&peer->dst);
93 if (INDEX_INVALID != peer->adj_index)
95 adj_unlock (peer->adj_index);
96 wg_peer_by_adj_index[peer->adj_index] = INDEX_INVALID;
98 wg_peer_fib_flush (peer);
100 peer->input_thread_index = ~0;
101 peer->output_thread_index = ~0;
102 peer->adj_index = INDEX_INVALID;
103 peer->timer_wheel = 0;
104 peer->persistent_keepalive_interval = 0;
105 peer->timer_handshake_attempts = 0;
106 peer->last_sent_packet = 0;
107 peer->last_received_packet = 0;
108 peer->session_derived = 0;
109 peer->rehandshake_started = 0;
110 peer->new_handshake_interval_tick = 0;
111 peer->rehandshake_interval_tick = 0;
112 peer->timer_need_another_keepalive = false;
113 peer->is_dead = true;
114 vec_free (peer->allowed_ips);
118 wg_peer_init (vlib_main_t * vm, wg_peer_t * peer)
120 peer->adj_index = INDEX_INVALID;
121 wg_peer_clear (vm, peer);
125 wg_peer_build_rewrite (const wg_peer_t * peer)
128 ip4_udp_header_t *hdr;
131 vec_validate (rewrite, sizeof (*hdr) - 1);
132 hdr = (ip4_udp_header_t *) rewrite;
134 hdr->ip4.ip_version_and_header_length = 0x45;
136 hdr->ip4.src_address = peer->src.addr.ip4;
137 hdr->ip4.dst_address = peer->dst.addr.ip4;
138 hdr->ip4.protocol = IP_PROTOCOL_UDP;
139 hdr->ip4.checksum = ip4_header_checksum (&hdr->ip4);
141 hdr->udp.src_port = clib_host_to_net_u16 (peer->src.port);
142 hdr->udp.dst_port = clib_host_to_net_u16 (peer->dst.port);
143 hdr->udp.checksum = 0;
149 wg_peer_adj_stack (wg_peer_t * peer)
155 adj = adj_get (peer->adj_index);
156 sw_if_index = adj->rewrite_header.sw_if_index;
158 wgi = wg_if_get (wg_if_find_by_sw_if_index (sw_if_index));
163 if (!vnet_sw_interface_is_admin_up (vnet_get_main (), wgi->sw_if_index))
165 adj_midchain_delegate_unstack (peer->adj_index);
172 .fp_proto = FIB_PROTOCOL_IP4,
173 .fp_addr = peer->dst.addr,
178 fib_index = fib_table_find (FIB_PROTOCOL_IP4, peer->table_id);
180 adj_midchain_delegate_stack (peer->adj_index, fib_index, &dst);
185 wg_peer_if_admin_state_change (wg_if_t * wgi, index_t peeri, void *data)
187 wg_peer_adj_stack (wg_peer_get (peeri));
189 return (WALK_CONTINUE);
193 wg_peer_if_table_change (wg_if_t * wgi, index_t peeri, void *data)
195 wg_peer_table_bind_ctx_t *ctx = data;
198 peer = wg_peer_get (peeri);
200 wg_peer_fib_flush (peer);
201 wg_peer_fib_populate (peer, ctx->new_fib_index);
203 return (WALK_CONTINUE);
207 wg_peer_fill (vlib_main_t * vm, wg_peer_t * peer,
209 const ip46_address_t * dst,
211 u16 persistent_keepalive_interval,
212 const fib_prefix_t * allowed_ips, u32 wg_sw_if_index)
214 wg_peer_endpoint_init (&peer->dst, dst, port);
216 peer->table_id = table_id;
217 peer->wg_sw_if_index = wg_sw_if_index;
218 peer->timer_wheel = &wg_main.timer_wheel;
219 peer->persistent_keepalive_interval = persistent_keepalive_interval;
220 peer->last_sent_handshake = vlib_time_now (vm) - (REKEY_TIMEOUT + 1);
221 peer->is_dead = false;
223 const wg_if_t *wgi = wg_if_get (wg_if_find_by_sw_if_index (wg_sw_if_index));
226 return (VNET_API_ERROR_INVALID_INTERFACE);
228 ip_address_to_46 (&wgi->src_ip, &peer->src.addr);
229 peer->src.port = wgi->port;
232 * and an adjacency for the endpoint address in the overlay
233 * on the wg interface
235 peer->rewrite = wg_peer_build_rewrite (peer);
237 peer->adj_index = adj_nbr_add_or_lock (FIB_PROTOCOL_IP4,
239 &peer->dst.addr, wgi->sw_if_index);
241 vec_validate_init_empty (wg_peer_by_adj_index,
242 peer->adj_index, INDEX_INVALID);
243 wg_peer_by_adj_index[peer->adj_index] = peer - wg_peer_pool;
245 adj_nbr_midchain_update_rewrite (peer->adj_index,
248 ADJ_FLAG_MIDCHAIN_IP_STACK,
249 vec_dup (peer->rewrite));
250 wg_peer_adj_stack (peer);
253 * add a route in the overlay to each of the allowed-ips
257 vec_validate (peer->allowed_ips, vec_len (allowed_ips) - 1);
259 vec_foreach_index (ii, allowed_ips)
261 peer->allowed_ips[ii].prefix = allowed_ips[ii];
264 wg_peer_fib_populate (peer,
265 fib_table_get_index_for_sw_if_index
266 (FIB_PROTOCOL_IP4, peer->wg_sw_if_index));
272 wg_peer_add (u32 tun_sw_if_index,
273 const u8 public_key[NOISE_PUBLIC_KEY_LEN],
275 const ip46_address_t * endpoint,
276 const fib_prefix_t * allowed_ips,
277 u16 port, u16 persistent_keepalive, u32 * peer_index)
283 vlib_main_t *vm = vlib_get_main ();
285 if (tun_sw_if_index == ~0)
286 return (VNET_API_ERROR_INVALID_SW_IF_INDEX);
288 wg_if = wg_if_get (wg_if_find_by_sw_if_index (tun_sw_if_index));
290 return (VNET_API_ERROR_INVALID_SW_IF_INDEX);
293 pool_foreach (peer, wg_peer_pool,
295 if (!memcmp (peer->remote.r_public, public_key, NOISE_PUBLIC_KEY_LEN))
297 return (VNET_API_ERROR_ENTRY_ALREADY_EXISTS);
302 if (pool_elts (wg_peer_pool) > MAX_PEERS)
303 return (VNET_API_ERROR_LIMIT_EXCEEDED);
305 pool_get (wg_peer_pool, peer);
307 wg_peer_init (vm, peer);
309 rv = wg_peer_fill (vm, peer, table_id, endpoint, (u16) port,
310 persistent_keepalive, allowed_ips, tun_sw_if_index);
314 wg_peer_clear (vm, peer);
315 pool_put (wg_peer_pool, peer);
319 noise_remote_init (&peer->remote, peer - wg_peer_pool, public_key,
321 cookie_maker_init (&peer->cookie_maker, public_key);
323 if (peer->persistent_keepalive_interval != 0)
325 wg_send_keepalive (vm, peer);
328 *peer_index = peer - wg_peer_pool;
329 wg_if_peer_add (wg_if, *peer_index);
335 wg_peer_remove (index_t peeri)
337 wg_main_t *wmp = &wg_main;
338 wg_peer_t *peer = NULL;
341 if (pool_is_free_index (wg_peer_pool, peeri))
342 return VNET_API_ERROR_NO_SUCH_ENTRY;
344 peer = pool_elt_at_index (wg_peer_pool, peeri);
346 wgi = wg_if_get (wg_if_find_by_sw_if_index (peer->wg_sw_if_index));
347 wg_if_peer_remove (wgi, peeri);
349 vnet_feature_enable_disable ("ip4-output", "wg-output-tun",
350 peer->wg_sw_if_index, 0, 0, 0);
352 noise_remote_clear (wmp->vlib_main, &peer->remote);
353 wg_peer_clear (wmp->vlib_main, peer);
354 pool_put (wg_peer_pool, peer);
360 wg_peer_walk (wg_peer_walk_cb_t fn, void *data)
365 pool_foreach_index(peeri, wg_peer_pool,
367 if (WALK_STOP == fn(peeri, data))
371 return INDEX_INVALID;
375 format_wg_peer_endpoint (u8 * s, va_list * args)
377 wg_peer_endpoint_t *ep = va_arg (*args, wg_peer_endpoint_t *);
379 s = format (s, "%U:%d",
380 format_ip46_address, &ep->addr, IP46_TYPE_ANY, ep->port);
386 format_wg_peer (u8 * s, va_list * va)
388 index_t peeri = va_arg (*va, index_t);
389 wg_peer_allowed_ip_t *allowed_ip;
390 u8 key[NOISE_KEY_LEN_BASE64];
393 peer = wg_peer_get (peeri);
394 key_to_base64 (peer->remote.r_public, NOISE_PUBLIC_KEY_LEN, key);
396 s = format (s, "[%d] endpoint:[%U->%U] %U keep-alive:%d adj:%d",
398 format_wg_peer_endpoint, &peer->src,
399 format_wg_peer_endpoint, &peer->dst,
400 format_vnet_sw_if_index_name, vnet_get_main (),
401 peer->wg_sw_if_index,
402 peer->persistent_keepalive_interval, peer->adj_index);
403 s = format (s, "\n key:%=s %U",
404 key, format_hex_bytes, peer->remote.r_public,
405 NOISE_PUBLIC_KEY_LEN);
406 s = format (s, "\n allowed-ips:");
407 vec_foreach (allowed_ip, peer->allowed_ips)
409 s = format (s, " %U", format_fib_prefix, &allowed_ip->prefix);
415 static clib_error_t *
416 wg_peer_module_init (vlib_main_t * vm)
419 * use a priority better than interface source, so that
420 * if the same subnet is added to the wg interface and is
421 * used as an allowed IP, then the wireguard soueced prefix
422 * wins and traffic is routed to the endpoint rather than dropped
424 wg_fib_source = fib_source_allocate ("wireguard", 0x2, FIB_SOURCE_BH_API);
429 VLIB_INIT_FUNCTION (wg_peer_module_init);
432 * fd.io coding-style-patch-verification: ON
435 * eval: (c-set-style "gnu")