1
1
mirror of https://git.sr.ht/~emersion/tlstunnel synced 2024-11-19 15:53:50 +01:00
tlstunnel/server.go

507 lines
12 KiB
Go
Raw Normal View History

package tlstunnel
2020-09-08 17:13:39 +02:00
import (
2020-09-09 14:08:20 +02:00
"context"
2020-09-08 18:24:16 +02:00
"crypto/tls"
2022-07-07 10:55:25 +02:00
"errors"
2020-09-08 17:13:39 +02:00
"fmt"
"io"
2020-09-08 18:24:16 +02:00
"log"
2020-09-08 17:13:39 +02:00
"net"
"strings"
"sync/atomic"
2021-02-18 17:49:52 +01:00
"time"
2020-09-08 18:24:16 +02:00
"git.sr.ht/~emersion/go-scfg"
2020-09-08 18:24:16 +02:00
"github.com/caddyserver/certmagic"
2020-09-09 14:52:41 +02:00
"github.com/pires/go-proxyproto"
2020-10-09 14:45:55 +02:00
"github.com/pires/go-proxyproto/tlvparse"
2020-09-08 17:13:39 +02:00
)
const tlsHandshakeTimeout = 20 * time.Second
2021-02-18 17:49:52 +01:00
type acmeCache struct {
config atomic.Value
cache *certmagic.Cache
}
func newACMECache() *acmeCache {
cache := &acmeCache{}
cache.cache = certmagic.NewCache(certmagic.CacheOptions{
GetConfigForCert: func(certmagic.Certificate) (*certmagic.Config, error) {
return cache.config.Load().(*certmagic.Config), nil
},
})
return cache
}
2020-09-08 17:13:39 +02:00
type Server struct {
2020-10-19 17:27:29 +02:00
Listeners map[string]*Listener // indexed by listening address
Frontends []*Frontend
Debug bool
2020-10-19 17:27:29 +02:00
ManagedNames []string
UnmanagedCerts []tls.Certificate
2022-07-07 10:49:10 +02:00
ACMEIssuer *certmagic.ACMEIssuer
ACMEConfig *certmagic.Config
acmeCache *acmeCache
cancelACME context.CancelFunc
unmanagedHashes []string
2020-09-08 18:24:16 +02:00
}
func NewServer() *Server {
// Make a copy of the defaults
acmeConfig := certmagic.Default
acmeManager := certmagic.DefaultACME
2020-09-08 18:24:16 +02:00
acmeManager.Agreed = true
// We're a TLS server, we don't speak HTTP
acmeManager.DisableHTTPChallenge = true
2020-09-08 18:24:16 +02:00
return &Server{
2022-07-07 10:49:10 +02:00
Listeners: make(map[string]*Listener),
ACMEIssuer: &acmeManager,
ACMEConfig: &acmeConfig,
}
2020-09-08 17:13:39 +02:00
}
func (srv *Server) Load(cfg scfg.Block) error {
return parseConfig(srv, cfg)
}
func (srv *Server) RegisterListener(addr string) *Listener {
// TODO: normalize addr with net.LookupPort
ln, ok := srv.Listeners[addr]
if !ok {
ln = newListener(srv, addr)
srv.Listeners[addr] = ln
}
return ln
}
func (srv *Server) startACME() error {
var ctx context.Context
ctx, srv.cancelACME = context.WithCancel(context.Background())
srv.ACMEConfig = certmagic.New(srv.acmeCache.cache, *srv.ACMEConfig)
2022-07-07 10:49:10 +02:00
srv.ACMEIssuer = certmagic.NewACMEIssuer(srv.ACMEConfig, *srv.ACMEIssuer)
2022-07-07 10:49:10 +02:00
srv.ACMEConfig.Issuers = []certmagic.Issuer{srv.ACMEIssuer}
srv.acmeCache.config.Store(srv.ACMEConfig)
2020-10-19 17:27:29 +02:00
for _, cert := range srv.UnmanagedCerts {
hash, err := srv.ACMEConfig.CacheUnmanagedTLSCertificate(ctx, cert, nil)
2023-11-20 15:34:03 +01:00
if err != nil {
2021-02-18 16:02:45 +01:00
return fmt.Errorf("failed to cache unmanaged TLS certificate: %v", err)
2020-10-19 17:27:29 +02:00
}
srv.unmanagedHashes = append(srv.unmanagedHashes, hash)
2020-10-19 17:27:29 +02:00
}
if err := srv.ACMEConfig.ManageAsync(ctx, srv.ManagedNames); err != nil {
2020-09-09 14:08:20 +02:00
return fmt.Errorf("failed to manage TLS certificates: %v", err)
}
return nil
}
func (srv *Server) Start() error {
srv.acmeCache = newACMECache()
if err := srv.startACME(); err != nil {
return err
}
for _, ln := range srv.Listeners {
if err := ln.Start(); err != nil {
2021-02-18 16:02:45 +01:00
return fmt.Errorf("failed to start listener: %v", err)
}
}
return nil
}
func (srv *Server) Stop() {
srv.cancelACME()
2022-02-03 10:42:06 +01:00
for addr, ln := range srv.Listeners {
if err := ln.Stop(); err != nil {
log.Printf("listener %q: failed to stop: %v", addr, err)
}
}
2021-02-17 18:45:14 +01:00
srv.acmeCache.cache.Stop()
}
// Replace starts the server but takes over existing listeners from an old
// Server instance. The old instance keeps running unchanged if Replace
// returns an error.
func (srv *Server) Replace(old *Server) error {
// Try to start new listeners
for addr, ln := range srv.Listeners {
if _, ok := old.Listeners[addr]; ok {
continue
}
if err := ln.Start(); err != nil {
for _, ln2 := range srv.Listeners {
ln2.Stop()
}
2021-02-18 16:02:45 +01:00
return fmt.Errorf("failed to start listener: %v", err)
}
}
// Steal the old server's ACME cache
srv.acmeCache = old.acmeCache
// Restart ACME
old.cancelACME()
if err := srv.startACME(); err != nil {
2021-02-18 16:02:45 +01:00
for _, ln := range srv.Listeners {
ln.Stop()
}
2021-02-18 16:02:45 +01:00
return fmt.Errorf("failed to start ACME: %v", err)
}
// Take over existing listeners and terminate old ones
for addr, oldLn := range old.Listeners {
if ln, ok := srv.Listeners[addr]; ok {
srv.Listeners[addr] = oldLn.UpdateFrom(ln)
} else {
2022-02-03 10:42:06 +01:00
if err := oldLn.Stop(); err != nil {
log.Printf("listener %q: failed to stop: %v", addr, err)
}
}
}
// Cleanup managed certs which are no longer used
managed := make(map[string]struct{}, len(srv.ManagedNames))
for _, name := range srv.ManagedNames {
managed[name] = struct{}{}
}
2023-11-20 15:34:03 +01:00
removeManaged := make([]string, 0, len(old.ManagedNames))
for _, name := range old.ManagedNames {
if _, ok := managed[name]; !ok {
2023-11-20 15:34:03 +01:00
removeManaged = append(removeManaged, name)
}
}
2023-11-20 15:34:03 +01:00
srv.acmeCache.cache.RemoveManaged(removeManaged)
// Cleanup unmanaged certs which are no longer used
unmanaged := make(map[string]struct{}, len(srv.unmanagedHashes))
for _, hash := range srv.unmanagedHashes {
unmanaged[hash] = struct{}{}
}
removeUnmanaged := make([]string, 0, len(old.unmanagedHashes))
for _, hash := range old.unmanagedHashes {
if _, ok := unmanaged[hash]; !ok {
removeUnmanaged = append(removeUnmanaged, hash)
}
}
srv.acmeCache.cache.Remove(removeUnmanaged)
return nil
}
type clientError struct {
error
}
type listenerHandles struct {
Server *Server
Frontends map[string]*Frontend // indexed by server name
2020-09-08 17:13:39 +02:00
}
type Listener struct {
Address string
netLn net.Listener
atomic atomic.Value
}
func newListener(srv *Server, addr string) *Listener {
ln := &Listener{
Address: addr,
}
ln.atomic.Store(&listenerHandles{
Server: srv,
Frontends: make(map[string]*Frontend),
})
return ln
}
func (ln *Listener) RegisterFrontend(name string, fe *Frontend) error {
fes := ln.atomic.Load().(*listenerHandles).Frontends
if _, ok := fes[name]; ok {
return fmt.Errorf("listener %q: duplicate frontends for server name %q", ln.Address, name)
}
fes[name] = fe
return nil
}
func (ln *Listener) Start() error {
var err error
ln.netLn, err = net.Listen("tcp", ln.Address)
if err != nil {
return err
}
log.Printf("listening on %q", ln.Address)
ln.netLn = &retryListener{Listener: ln.netLn}
go func() {
if err := ln.serve(); err != nil {
log.Fatalf("listener %q: %v", ln.Address, err)
}
}()
return nil
}
2022-02-03 10:42:06 +01:00
func (ln *Listener) Stop() error {
return ln.netLn.Close()
}
func (ln *Listener) UpdateFrom(new *Listener) *Listener {
ln.atomic.Store(new.atomic.Load())
return ln
}
func (ln *Listener) serve() error {
2020-09-08 17:13:39 +02:00
for {
conn, err := ln.netLn.Accept()
2022-07-07 10:55:25 +02:00
if errors.Is(err, net.ErrClosed) {
// Listening socket has been closed by Stop()
return nil
} else if err != nil {
2020-09-08 17:13:39 +02:00
return fmt.Errorf("failed to accept connection: %v", err)
}
2020-09-08 18:24:16 +02:00
go func() {
err := ln.handle(conn)
2023-02-20 14:40:44 +01:00
if err == nil {
return
}
srv := ln.atomic.Load().(*listenerHandles).Server
var clientErr clientError
if !errors.As(err, &clientErr) || srv.Debug {
log.Printf("listener %q: connection %q: %v", ln.Address, conn.RemoteAddr(), err)
2020-09-08 18:24:16 +02:00
}
}()
2020-09-08 17:13:39 +02:00
}
}
func (ln *Listener) handle(conn net.Conn) error {
defer conn.Close()
srv := ln.atomic.Load().(*listenerHandles).Server
tlsConfig := srv.ACMEConfig.TLSConfig()
getConfigForClient := tlsConfig.GetConfigForClient
tlsConfig.GetConfigForClient = func(hello *tls.ClientHelloInfo) (*tls.Config, error) {
// Call previous GetConfigForClient function, if any
var tlsConfig *tls.Config
if getConfigForClient != nil {
var err error
tlsConfig, err = getConfigForClient(hello)
if err != nil {
return nil, err
}
} else {
tlsConfig = srv.ACMEConfig.TLSConfig()
}
fe, err := ln.matchFrontend(hello.ServerName)
if err != nil {
return nil, err
}
tlsConfig.NextProtos = append(tlsConfig.NextProtos, fe.Protocols...)
return tlsConfig, nil
}
tlsConn := tls.Server(conn, tlsConfig)
2021-02-18 17:49:52 +01:00
if err := tlsConn.SetDeadline(time.Now().Add(tlsHandshakeTimeout)); err != nil {
return fmt.Errorf("failed to set TLS handshake timeout: %v", err)
}
if err := tlsConn.Handshake(); err == io.EOF {
return nil
} else if err != nil {
return clientError{fmt.Errorf("TLS handshake failed: %v", err)}
}
2021-02-18 17:49:52 +01:00
if err := tlsConn.SetDeadline(time.Time{}); err != nil {
return fmt.Errorf("failed to reset TLS handshake timeout: %v", err)
}
// TODO: allow setting custom downstream timeouts
tlsState := tlsConn.ConnectionState()
fe, err := ln.matchFrontend(tlsState.ServerName)
if err != nil {
return err
}
return fe.handle(tlsConn, &tlsState)
}
func (ln *Listener) matchFrontend(serverName string) (*Frontend, error) {
fes := ln.atomic.Load().(*listenerHandles).Frontends
fe, ok := fes[serverName]
if !ok {
// Match wildcard certificates, allowing only a single, non-partial
// wildcard, in the left-most label
i := strings.IndexByte(serverName, '.')
// Don't allow wildcards with only a TLD (e.g. *.com)
if i >= 0 && strings.IndexByte(serverName[i+1:], '.') >= 0 {
fe, ok = fes["*"+serverName[i:]]
}
}
if !ok {
fe, ok = fes[""]
}
if !ok {
return nil, fmt.Errorf("can't find frontend for server name %q", serverName)
}
return fe, nil
}
type Frontend struct {
Backend Backend
Protocols []string
}
func (fe *Frontend) handle(downstream net.Conn, tlsState *tls.ConnectionState) error {
2020-09-08 17:13:39 +02:00
defer downstream.Close()
2021-02-18 17:49:52 +01:00
// TODO: setup upstream timeouts
2020-09-08 17:13:39 +02:00
be := &fe.Backend
upstream, err := net.Dial(be.Network, be.Address)
if err != nil {
return fmt.Errorf("failed to dial backend: %v", err)
}
if be.TLSConfig != nil {
upstream = tls.Client(upstream, be.TLSConfig)
}
2020-09-08 17:13:39 +02:00
defer upstream.Close()
2020-09-09 14:52:41 +02:00
if be.Proxy {
h := proxyproto.HeaderProxyFromAddrs(byte(be.ProxyVersion), downstream.RemoteAddr(), downstream.LocalAddr())
var tlvs []proxyproto.TLV
if tlsState.ServerName != "" {
tlvs = append(tlvs, authorityTLV(tlsState.ServerName))
}
if tlsState.NegotiatedProtocol != "" {
tlvs = append(tlvs, alpnTLV(tlsState.NegotiatedProtocol))
}
2020-10-09 14:45:55 +02:00
if tlv, err := sslTLV(tlsState); err != nil {
return fmt.Errorf("failed to set PROXY protocol header SSL TLV: %v", err)
} else {
tlvs = append(tlvs, tlv)
}
if err := h.SetTLVs(tlvs); err != nil {
return fmt.Errorf("failed to set PROXY protocol header TLVs: %v", err)
}
2020-09-09 14:52:41 +02:00
if _, err := h.WriteTo(upstream); err != nil {
return fmt.Errorf("failed to write PROXY protocol header: %v", err)
}
}
2021-02-18 16:02:45 +01:00
if err := duplexCopy(upstream, downstream); err != nil {
return clientError{fmt.Errorf("failed to copy bytes: %v", err)}
2021-02-18 16:02:45 +01:00
}
return nil
2020-09-08 17:13:39 +02:00
}
type Backend struct {
Network string
Address string
Proxy bool
ProxyVersion int
TLSConfig *tls.Config // nil if no TLS
2020-09-08 17:13:39 +02:00
}
func duplexCopy(a, b io.ReadWriter) error {
done := make(chan error, 2)
go func() {
_, err := io.Copy(a, b)
done <- err
}()
go func() {
_, err := io.Copy(b, a)
done <- err
}()
return <-done
}
2020-10-29 14:21:03 +01:00
func authorityTLV(name string) proxyproto.TLV {
return proxyproto.TLV{
2020-10-29 14:21:03 +01:00
Type: proxyproto.PP2_TYPE_AUTHORITY,
Value: []byte(name),
}
}
2020-10-09 14:45:55 +02:00
func alpnTLV(proto string) proxyproto.TLV {
return proxyproto.TLV{
2020-12-08 17:03:58 +01:00
Type: proxyproto.PP2_TYPE_ALPN,
Value: []byte(proto),
}
}
2020-10-09 14:45:55 +02:00
func sslTLV(state *tls.ConnectionState) (proxyproto.TLV, error) {
pp2ssl := tlvparse.PP2SSL{
Client: tlvparse.PP2_BITFIELD_CLIENT_SSL, // all of our connections are TLS
Verify: 1, // we haven't checked the client cert
}
var version string
switch state.Version {
case tls.VersionTLS10:
version = "TLSv1.0"
case tls.VersionTLS11:
version = "TLSv1.1"
case tls.VersionTLS12:
version = "TLSv1.2"
case tls.VersionTLS13:
version = "TLSv1.3"
}
if version != "" {
2020-10-29 14:21:03 +01:00
versionTLV := proxyproto.TLV{
Type: proxyproto.PP2_SUBTYPE_SSL_VERSION,
Value: []byte(version),
}
2020-10-09 14:45:55 +02:00
pp2ssl.TLV = append(pp2ssl.TLV, versionTLV)
}
// TODO: add PP2_SUBTYPE_SSL_CIPHER, PP2_SUBTYPE_SSL_SIG_ALG, PP2_SUBTYPE_SSL_KEY_ALG
// TODO: check client-provided cert, if any
return pp2ssl.Marshal()
}
type retryListener struct {
net.Listener
delay time.Duration
}
func (ln *retryListener) Accept() (net.Conn, error) {
for {
conn, err := ln.Listener.Accept()
if ne, ok := err.(net.Error); ok && ne.Temporary() {
if ln.delay == 0 {
ln.delay = 5 * time.Millisecond
} else {
ln.delay *= 2
}
if max := 1 * time.Second; ln.delay > max {
ln.delay = max
}
log.Printf("listener %q: accept error (retrying in %v): %v", ln.Addr(), ln.delay, err)
time.Sleep(ln.delay)
} else {
ln.delay = 0
return conn, err
}
}
}