feat: resolve peer endpoint with dot

master
Shengjing Zhu 2022-03-09 22:04:08 +08:00
parent f77617f529
commit f388039b6d
2 changed files with 135 additions and 57 deletions

158
conf.go
View File

@ -1,69 +1,147 @@
package main package main
import ( import (
"context"
"crypto/tls"
"encoding/base64" "encoding/base64"
"encoding/hex" "encoding/hex"
"fmt" "fmt"
"math/rand"
"net" "net"
"time" "time"
"golang.zx2c4.com/wireguard/device" "golang.zx2c4.com/wireguard/device"
) )
const (
resolvePeerInterval = time.Second * 10
keepaliveInterval = "10"
)
type peer struct {
dialer *net.Dialer
pubKey string
keepalive bool
addr string
ipPort string
}
func newPeerEndpoint(opts options) (*peer, error) {
pubKey, err := base64.StdEncoding.DecodeString(opts.PeerKey)
if err != nil {
return nil, fmt.Errorf("parse peer key: %w", err)
}
p := &peer{
dialer: &net.Dialer{
Resolver: &net.Resolver{
PreferGo: true,
Dial: func(ctx context.Context, network, address string) (net.Conn, error) {
if len(opts.DNS) > 0 {
host := opts.DNS[rand.Intn(len(opts.DNS))]
port := "53"
if opts.DoT != "" {
port = opts.DoT
}
address = net.JoinHostPort(host, port)
}
logger.Verbosef("Using %s to resolve peer endpoint", address)
if opts.DoT == "" {
var d net.Dialer
return d.DialContext(ctx, network, address)
}
d := tls.Dialer{
Config: &tls.Config{
InsecureSkipVerify: true,
},
}
return d.DialContext(ctx, "tcp", address)
},
},
},
pubKey: hex.EncodeToString(pubKey),
keepalive: opts.ExitMode == "local",
addr: opts.PeerEndpoint,
}
p.ipPort, err = p.resolveAddr()
return p, err
}
func (p *peer) initConf() string {
conf := "public_key=" + p.pubKey + "\n"
conf += "endpoint=" + p.ipPort + "\n"
conf += "allowed_ip=0.0.0.0/0\n"
conf += "allowed_ip=::/0\n"
if p.keepalive {
conf += "persistent_keepalive_interval=" + keepaliveInterval + "\n"
}
return conf
}
func (p *peer) updateConf() (string, bool) {
newIPPort, err := p.resolveAddr()
if err != nil {
logger.Verbosef("Resolve peer endpoint: %v", err)
return "", false
}
if p.ipPort == newIPPort {
return "", false
}
p.ipPort = newIPPort
logger.Verbosef("PeerEndpoint is changed to: %s", p.ipPort)
conf := "public_key=" + p.pubKey + "\n"
conf += "update_only=true\n"
conf += "endpoint=" + p.ipPort + "\n"
return conf, true
}
func (p *peer) resolveAddr() (string, error) {
c, err := p.dialer.Dial("udp", p.addr)
if err != nil {
return "", fmt.Errorf("dial %s: %w", p.addr, err)
}
defer c.Close()
return c.RemoteAddr().String(), nil
}
func ipcSet(dev *device.Device, opts options) error { func ipcSet(dev *device.Device, opts options) error {
privateKey, err := base64.StdEncoding.DecodeString(opts.PrivateKey) privateKey, err := base64.StdEncoding.DecodeString(opts.PrivateKey)
if err != nil { if err != nil {
return fmt.Errorf("parse private key: %w", err) return fmt.Errorf("parse private key: %w", err)
} }
peerKey, err := base64.StdEncoding.DecodeString(opts.PeerKey)
if err != nil {
return fmt.Errorf("parse peer key: %w", err)
}
conf := "private_key=" + hex.EncodeToString(privateKey) + "\n" conf := "private_key=" + hex.EncodeToString(privateKey) + "\n"
conf += "public_key=" + hex.EncodeToString(peerKey) + "\n"
peerAddr, err := net.ResolveUDPAddr("udp", opts.PeerEndpoint) peer, err := newPeerEndpoint(opts)
if err != nil { if err != nil {
return fmt.Errorf("resolve peer endpoint: %w", err) return err
}
conf += "endpoint=" + peerAddr.String() + "\n"
conf += "allowed_ip=0.0.0.0/0\n"
conf += "allowed_ip=::/0\n"
if opts.ExitMode == "local" {
conf += "persistent_keepalive_interval=10\n"
} }
conf += peer.initConf()
if err := dev.IpcSet(conf); err != nil { if err := dev.IpcSet(conf); err != nil {
return fmt.Errorf("set device config: %w", err) return fmt.Errorf("set device config: %w", err)
} }
if peerAddr.String() != opts.PeerEndpoint { if peer.addr != peer.ipPort {
go refreshEndpoint(dev, peerKey, peerAddr.String(), opts.PeerEndpoint) go func() {
c := time.Tick(resolvePeerInterval)
for range c {
conf, needUpdate := peer.updateConf()
if !needUpdate {
continue
}
if err := dev.IpcSet(conf); err != nil {
logger.Errorf("Set device config: %v", err)
}
}
}()
} }
return nil return nil
} }
func refreshEndpoint(dev *device.Device, peerKey []byte, currentPeerAddr, peerEndpoint string) {
c := time.Tick(10 * time.Second)
for range c {
addr, err := net.ResolveUDPAddr("udp", peerEndpoint)
if err != nil {
logger.Errorf("Resolve peer endpoint: %v", err)
continue
}
if currentPeerAddr == addr.String() {
continue
}
currentPeerAddr = addr.String()
logger.Verbosef("Endpoint is changed to: %s", addr)
conf := "public_key=" + hex.EncodeToString(peerKey) + "\n"
conf += "update_only=true\n"
conf += "endpoint=" + addr.String() + "\n"
if err := dev.IpcSet(conf); err != nil {
logger.Errorf("Set device config: %v", err)
}
}
}

34
main.go
View File

@ -29,9 +29,10 @@ type options struct {
PeerKey string `long:"peer-key" env:"PEER_KEY" required:"true" description:"WireGuard server public key in base64 format"` PeerKey string `long:"peer-key" env:"PEER_KEY" required:"true" description:"WireGuard server public key in base64 format"`
PrivateKey string `long:"private-key" env:"PRIVATE_KEY" required:"true" description:"WireGuard client private key in base64 format"` PrivateKey string `long:"private-key" env:"PRIVATE_KEY" required:"true" description:"WireGuard client private key in base64 format"`
ClientIPs []string `long:"client-ip" env:"CLIENT_IP" env-delim:"," required:"true" description:"WireGuard client IP address"` ClientIPs []string `long:"client-ip" env:"CLIENT_IP" env-delim:"," required:"true" description:"WireGuard client IP address"`
DNS []string `long:"dns" env:"DNS" env-delim:"," description:"DNS servers for WireGuard network and resolving server address"`
DoT string `long:"dot" env:"DOT" description:"Port for DNS over TLS, used to resolve WireGuard server address if available"`
MTU int `long:"mtu" env:"MTU" default:"1280" description:"MTU for WireGuard network"`
Listen string `long:"listen" env:"LISTEN" default:"localhost:8080" description:"HTTP & SOCKS5 server address"` Listen string `long:"listen" env:"LISTEN" default:"localhost:8080" description:"HTTP & SOCKS5 server address"`
DNS []string `long:"dns" env:"DNS" env-delim:"," description:"DNS server IP address, only used in WireGuard"`
MTU int `long:"mtu" env:"MTU" default:"1280" description:"MTU"`
ExitMode string `long:"exit-mode" env:"EXIT_MODE" default:"remote" choice:"remote" choice:"local" description:"Exit mode"` ExitMode string `long:"exit-mode" env:"EXIT_MODE" default:"remote" choice:"remote" choice:"local" description:"Exit mode"`
Verbose bool `short:"v" long:"verbose" description:"Show verbose debug information"` Verbose bool `short:"v" long:"verbose" description:"Show verbose debug information"`
@ -70,14 +71,14 @@ Description:`
os.Exit(1) os.Exit(1)
} }
listener, err := netListener(opts, tnet) listener, err := proxyListener(opts, tnet)
if err != nil { if err != nil {
logger.Errorf("Create net listener: %v", err) logger.Errorf("Create net listener: %v", err)
os.Exit(1) os.Exit(1)
} }
socksListener, httpListener := proxymux.SplitSOCKSAndHTTP(listener) socksListener, httpListener := proxymux.SplitSOCKSAndHTTP(listener)
dialer := netDialer(opts, tnet) dialer := proxyDialer(opts, tnet)
httpProxy := &http.Server{Handler: statsHandler(httpproxy.Handler(dialer), dev)} httpProxy := &http.Server{Handler: statsHandler(httpproxy.Handler(dialer), dev)}
socksProxy := &socks5.Server{Dialer: dialer} socksProxy := &socks5.Server{Dialer: dialer}
@ -99,7 +100,18 @@ Description:`
os.Exit(1) os.Exit(1)
} }
func netListener(opts options, tnet *netstack.Net) (net.Listener, error) { func proxyDialer(opts options, tnet *netstack.Net) (dialer func(ctx context.Context, network, address string) (net.Conn, error)) {
switch opts.ExitMode {
case "local":
d := net.Dialer{}
dialer = d.DialContext
case "remote":
dialer = tnet.DialContext
}
return
}
func proxyListener(opts options, tnet *netstack.Net) (net.Listener, error) {
var tcpListener net.Listener var tcpListener net.Listener
tcpAddr, err := net.ResolveTCPAddr("tcp", opts.Listen) tcpAddr, err := net.ResolveTCPAddr("tcp", opts.Listen)
@ -123,17 +135,6 @@ func netListener(opts options, tnet *netstack.Net) (net.Listener, error) {
return tcpListener, nil return tcpListener, nil
} }
func netDialer(opts options, tnet *netstack.Net) (dialer func(ctx context.Context, network, address string) (net.Conn, error)) {
switch opts.ExitMode {
case "local":
var d net.Dialer
dialer = d.DialContext
case "remote":
dialer = tnet.DialContext
}
return
}
func setupNet(opts options) (*device.Device, *netstack.Net, error) { func setupNet(opts options) (*device.Device, *netstack.Net, error) {
ips := []net.IP{} ips := []net.IP{}
for _, s := range opts.ClientIPs { for _, s := range opts.ClientIPs {
@ -150,7 +151,6 @@ func setupNet(opts options) (*device.Device, *netstack.Net, error) {
return nil, nil, fmt.Errorf("invalid dns ip: %s", s) return nil, nil, fmt.Errorf("invalid dns ip: %s", s)
} }
dnsServers = append(dnsServers, ip) dnsServers = append(dnsServers, ip)
} }
tun, tnet, err := netstack.CreateNetTUN(ips, dnsServers, opts.MTU) tun, tnet, err := netstack.CreateNetTUN(ips, dnsServers, opts.MTU)
if err != nil { if err != nil {