// VpnCloud - Peer-to-Peer VPN // Copyright (C) 2015-2021 Dennis Schwerdel // This software is licensed under GPL-3 or newer (see LICENSE.md) #[macro_use] extern crate log; #[macro_use] extern crate serde; #[cfg(test)] extern crate tempfile; #[macro_use] pub mod util; #[cfg(test)] #[macro_use] mod tests; pub mod beacon; pub mod engine; pub mod config; pub mod crypto; pub mod device; pub mod error; pub mod messages; pub mod net; pub mod oldconfig; pub mod payload; pub mod poll; pub mod port_forwarding; pub mod table; pub mod traffic; pub mod types; #[cfg(feature = "wizard")] pub mod wizard; #[cfg(feature = "websocket")] pub mod wsproxy; #[cfg(feature = "installer")] pub mod installer; use structopt::StructOpt; use std::{ fs::{self, File, Permissions}, io::{self, Write}, net::{Ipv4Addr}, os::unix::fs::PermissionsExt, path::Path, process, str::FromStr, sync::Mutex, thread }; use crate::{ engine::GenericCloud, config::{Args, Command, Config, DEFAULT_PORT}, crypto::Crypto, device::{Device, TunTapDevice, Type}, net::{Socket, NetSocket}, oldconfig::OldConfigFile, payload::Protocol, util::SystemTimeSource, }; #[cfg(feature = "websocket")] use crate::wsproxy::ProxyConnection; struct DualLogger { file: Option> } impl DualLogger { pub fn new>(path: Option

) -> Result { if let Some(path) = path { let path = path.as_ref(); if path.exists() { fs::remove_file(path)? } let file = File::create(path)?; Ok(DualLogger { file: Some(Mutex::new(file)) }) } else { Ok(DualLogger { file: None }) } } } impl log::Log for DualLogger { #[inline] fn enabled(&self, _metadata: &log::Metadata) -> bool { true } #[inline] fn log(&self, record: &log::Record) { if self.enabled(record.metadata()) { println!("{} - {}", record.level(), record.args()); if let Some(ref file) = self.file { let mut file = file.lock().expect("Lock poisoned"); let time = time::OffsetDateTime::now_local().format("%F %H:%M:%S"); writeln!(file, "{} - {} - {}", time, record.level(), record.args()) .expect("Failed to write to logfile"); } } } #[inline] fn flush(&self) { if let Some(ref file) = self.file { let mut file = file.lock().expect("Lock poisoned"); try_fail!(file.flush(), "Logging error: {}"); } } } fn run_script(script: &str, ifname: &str) { let mut cmd = process::Command::new("sh"); cmd.arg("-c").arg(&script).env("IFNAME", ifname); debug!("Running script: {:?}", cmd); match cmd.status() { Ok(status) => { if !status.success() { error!("Script returned with error: {:?}", status.code()) } } Err(e) => error!("Failed to execute script {:?}: {}", script, e) } } fn parse_ip_netmask(addr: &str) -> Result<(Ipv4Addr, Ipv4Addr), String> { let (ip_str, len_str) = match addr.find('/') { Some(pos) => (&addr[..pos], &addr[pos + 1..]), None => (addr, "24") }; let prefix_len = u8::from_str(len_str).map_err(|_| format!("Invalid prefix length: {}", len_str))?; if prefix_len > 32 { return Err(format!("Invalid prefix length: {}", prefix_len)) } let ip = Ipv4Addr::from_str(ip_str).map_err(|_| format!("Invalid ip address: {}", ip_str))?; let netmask = Ipv4Addr::from(u32::max_value().checked_shl(32 - prefix_len as u32).unwrap()); Ok((ip, netmask)) } fn setup_device(config: &Config) -> TunTapDevice { let device = try_fail!( TunTapDevice::new(&config.device_name, config.device_type, config.device_path.as_ref().map(|s| s as &str)), "Failed to open virtual {} interface {}: {}", config.device_type, config.device_name ); info!("Opened device {}", device.ifname()); config.call_hook("device_setup", vec![("IFNAME", device.ifname())], true); if let Err(err) = device.set_mtu(None) { error!("Error setting optimal MTU on {}: {}", device.ifname(), err); } if let Some(ip) = &config.ip { let (ip, netmask) = try_fail!(parse_ip_netmask(ip), "Invalid ip address given: {}"); info!("Configuring device with ip {}, netmask {}", ip, netmask); try_fail!(device.configure(ip, netmask), "Failed to configure device: {}"); } if let Some(script) = &config.ifup { run_script(script, device.ifname()); } if config.fix_rp_filter { try_fail!(device.fix_rp_filter(), "Failed to change rp_filter settings: {}"); } if let Ok(val) = device.get_rp_filter() { if val != 1 { warn!("Your networking configuration might be affected by a vulnerability (https://vpncloud.ddswd.de/docs/security/cve-2019-14899/), please change your rp_filter setting to 1 (currently {}).", val); } } config.call_hook("device_configured", vec![("IFNAME", device.ifname())], true); device } #[allow(clippy::cognitive_complexity)] fn run(config: Config, socket: S) { let device = setup_device(&config); let port_forwarding = if config.port_forwarding { socket.create_port_forwarding() } else { None }; let stats_file = match config.stats_file { None => None, Some(ref name) => { let path = Path::new(name); if path.exists() { try_fail!(fs::remove_file(path), "Failed to remove file {}: {}", name); } let file = try_fail!(File::create(name), "Failed to create stats file: {}"); try_fail!( fs::set_permissions(name, Permissions::from_mode(0o644)), "Failed to set permissions on stats file: {}" ); Some(file) } }; let mut cloud = GenericCloud::::new(&config, socket, device, port_forwarding, stats_file); for mut addr in config.peers { if addr.find(':').unwrap_or(0) <= addr.find(']').unwrap_or(0) { // : not present or only in IPv6 address addr = format!("{}:{}", addr, DEFAULT_PORT) } try_fail!(cloud.connect(&addr as &str), "Failed to send message to {}: {}", &addr); cloud.add_reconnect_peer(addr); } if config.daemonize { info!("Running process as daemon"); let mut daemonize = daemonize::Daemonize::new(); if let Some(user) = config.user { daemonize = daemonize.user(&user as &str); } if let Some(group) = config.group { daemonize = daemonize.group(&group as &str); } if let Some(pid_file) = config.pid_file { daemonize = daemonize.pid_file(pid_file).chown_pid_file(true); // Give child process some time to write PID file daemonize = daemonize.exit_action(|| thread::sleep(std::time::Duration::from_millis(10))); } try_fail!(daemonize.start(), "Failed to daemonize: {}"); } else if config.user.is_some() || config.group.is_some() { info!("Dropping privileges"); let mut pd = privdrop::PrivDrop::default(); if let Some(user) = config.user { pd = pd.user(user); } if let Some(group) = config.group { pd = pd.group(group); } try_fail!(pd.apply(), "Failed to drop privileges: {}"); } cloud.run(); if let Some(script) = config.ifdown { run_script(&script, cloud.ifname()); } } fn main() { let args: Args = Args::from_args(); if args.version { println!("VpnCloud v{}", env!("CARGO_PKG_VERSION")); return } let logger = try_fail!(DualLogger::new(args.log_file.as_ref()), "Failed to open logfile: {}"); log::set_boxed_logger(Box::new(logger)).unwrap(); assert!(!args.verbose || !args.quiet); log::set_max_level(if args.verbose { log::LevelFilter::Debug } else if args.quiet { log::LevelFilter::Error } else { log::LevelFilter::Info }); if let Some(cmd) = args.cmd { match cmd { Command::GenKey { password } => { let (privkey, pubkey) = Crypto::generate_keypair(password.as_deref()); println!("Private key: {}\nPublic key: {}\n", privkey, pubkey); println!( "Attention: Keep the private key secret and use only the public key on other nodes to establish trust." ); } Command::MigrateConfig { config_file } => { info!("Trying to convert from old config format"); let f = try_fail!(File::open(&config_file), "Failed to open config file: {:?}"); let config_file_old: OldConfigFile = try_fail!(serde_yaml::from_reader(f), "Config file not valid for version 1: {:?}"); let new_config = config_file_old.convert(); info!("Successfully converted from old format"); info!("Renaming original file to {}.orig", config_file); try_fail!( fs::rename(&config_file, format!("{}.orig", config_file)), "Failed to rename original file: {:?}" ); info!("Writing new config back into {}", config_file); let f = try_fail!(File::create(&config_file), "Failed to open config file: {:?}"); try_fail!( fs::set_permissions(&config_file, fs::Permissions::from_mode(0o600)), "Failed to set permissions on file: {:?}" ); try_fail!(serde_yaml::to_writer(f, &new_config), "Failed to write converted config: {:?}"); } Command::Completion { shell } => { Args::clap().gen_completions_to(env!("CARGO_PKG_NAME"), shell, &mut io::stdout()); } #[cfg(feature = "websocket")] Command::WsProxy { listen } => { try_fail!(wsproxy::run_proxy(&listen), "Failed to run websocket proxy: {:?}"); } #[cfg(feature = "wizard")] Command::Config { name } => { try_fail!(wizard::configure(name), "Wizard failed: {}"); } #[cfg(feature = "installer")] Command::Install { uninstall } => { if uninstall { try_fail!(installer::uninstall(), "Uninstall failed: {}"); } else { try_fail!(installer::install(), "Install failed: {}"); } } } return } let mut config = Config::default(); if let Some(ref file) = args.config { info!("Reading config file '{}'", file); let f = try_fail!(File::open(file), "Failed to open config file: {:?}"); let config_file = match serde_yaml::from_reader(f) { Ok(config) => config, Err(err) => { error!("Failed to read config file: {}", err); info!("Trying to convert from old config format"); let f = try_fail!(File::open(file), "Failed to open config file: {:?}"); let config_file_old: OldConfigFile = try_fail!(serde_yaml::from_reader(f), "Config file is neither version 2 nor version 1: {:?}"); let new_config = config_file_old.convert(); info!("Successfully converted from old format, please migrate your config using migrate-config"); new_config } }; config.merge_file(config_file) } config.merge_args(args); debug!("Config: {:?}", config); if config.crypto.password.is_none() && config.crypto.private_key.is_none() { error!("Either password or private key must be set in config or given as parameter"); return } #[cfg(feature = "websocket")] if config.listen.starts_with("ws://") { let socket = try_fail!(ProxyConnection::listen(&config.listen), "Failed to open socket {}: {}", config.listen); match config.device_type { Type::Tap => run::(config, socket), Type::Tun => run::(config, socket) } return } let socket = try_fail!(NetSocket::listen(&config.listen), "Failed to open socket {}: {}", config.listen); match config.device_type { Type::Tap => run::(config, socket), Type::Tun => run::(config, socket) } }