2017-07-01 23:29:22 +02:00
|
|
|
package main
|
|
|
|
|
|
|
|
import (
|
|
|
|
"bytes"
|
|
|
|
"encoding/binary"
|
|
|
|
"golang.org/x/crypto/chacha20poly1305"
|
|
|
|
"net"
|
|
|
|
"sync"
|
|
|
|
"sync/atomic"
|
|
|
|
"time"
|
|
|
|
)
|
|
|
|
|
|
|
|
type QueueHandshakeElement struct {
|
|
|
|
msgType uint32
|
|
|
|
packet []byte
|
|
|
|
source *net.UDPAddr
|
|
|
|
}
|
|
|
|
|
|
|
|
type QueueInboundElement struct {
|
2017-07-08 23:51:26 +02:00
|
|
|
dropped int32
|
2017-07-01 23:29:22 +02:00
|
|
|
mutex sync.Mutex
|
|
|
|
packet []byte
|
|
|
|
counter uint64
|
|
|
|
keyPair *KeyPair
|
|
|
|
}
|
|
|
|
|
|
|
|
func (elem *QueueInboundElement) Drop() {
|
2017-07-08 23:51:26 +02:00
|
|
|
atomic.StoreInt32(&elem.dropped, AtomicTrue)
|
2017-07-06 15:43:55 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
func (elem *QueueInboundElement) IsDropped() bool {
|
2017-07-08 23:51:26 +02:00
|
|
|
return atomic.LoadInt32(&elem.dropped) == AtomicTrue
|
2017-07-06 15:43:55 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
func addToInboundQueue(
|
|
|
|
queue chan *QueueInboundElement,
|
|
|
|
element *QueueInboundElement,
|
|
|
|
) {
|
|
|
|
for {
|
|
|
|
select {
|
|
|
|
case queue <- element:
|
|
|
|
return
|
|
|
|
default:
|
|
|
|
select {
|
|
|
|
case old := <-queue:
|
|
|
|
old.Drop()
|
|
|
|
default:
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
2017-07-01 23:29:22 +02:00
|
|
|
}
|
|
|
|
|
2017-07-07 13:47:09 +02:00
|
|
|
func addToHandshakeQueue(
|
|
|
|
queue chan QueueHandshakeElement,
|
|
|
|
element QueueHandshakeElement,
|
|
|
|
) {
|
|
|
|
for {
|
|
|
|
select {
|
|
|
|
case queue <- element:
|
|
|
|
return
|
|
|
|
default:
|
|
|
|
select {
|
|
|
|
case <-queue:
|
|
|
|
default:
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2017-07-08 09:23:10 +02:00
|
|
|
/* Routine determining the busy state of the interface
|
|
|
|
*
|
|
|
|
* TODO: prehaps nicer to do this in response to events
|
|
|
|
* TODO: more well reasoned definition of "busy"
|
|
|
|
*/
|
|
|
|
func (device *Device) RoutineBusyMonitor() {
|
|
|
|
samples := 0
|
|
|
|
interval := time.Second
|
|
|
|
for timer := time.NewTimer(interval); ; {
|
|
|
|
|
|
|
|
select {
|
|
|
|
case <-device.signal.stop:
|
|
|
|
return
|
|
|
|
case <-timer.C:
|
|
|
|
}
|
|
|
|
|
|
|
|
// compute busy heuristic
|
|
|
|
|
|
|
|
if len(device.queue.handshake) > QueueHandshakeBusySize {
|
|
|
|
samples += 1
|
|
|
|
} else if samples > 0 {
|
|
|
|
samples -= 1
|
|
|
|
}
|
|
|
|
samples %= 30
|
|
|
|
busy := samples > 5
|
|
|
|
|
|
|
|
// update busy state
|
|
|
|
|
|
|
|
if busy {
|
2017-07-08 23:51:26 +02:00
|
|
|
atomic.StoreInt32(&device.underLoad, AtomicTrue)
|
2017-07-08 09:23:10 +02:00
|
|
|
} else {
|
2017-07-08 23:51:26 +02:00
|
|
|
atomic.StoreInt32(&device.underLoad, AtomicFalse)
|
2017-07-08 09:23:10 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
timer.Reset(interval)
|
|
|
|
}
|
|
|
|
}
|
2017-07-01 23:29:22 +02:00
|
|
|
|
2017-07-08 09:23:10 +02:00
|
|
|
func (device *Device) RoutineReceiveIncomming() {
|
2017-07-01 23:29:22 +02:00
|
|
|
|
2017-07-08 09:23:10 +02:00
|
|
|
logDebug := device.log.Debug
|
|
|
|
logDebug.Println("Routine, receive incomming, started")
|
2017-07-01 23:29:22 +02:00
|
|
|
|
2017-07-07 13:47:09 +02:00
|
|
|
var buffer []byte
|
2017-07-06 15:43:55 +02:00
|
|
|
|
2017-07-01 23:29:22 +02:00
|
|
|
for {
|
|
|
|
|
|
|
|
// check if stopped
|
|
|
|
|
|
|
|
select {
|
|
|
|
case <-device.signal.stop:
|
|
|
|
return
|
|
|
|
default:
|
|
|
|
}
|
|
|
|
|
|
|
|
// read next datagram
|
|
|
|
|
2017-07-06 15:43:55 +02:00
|
|
|
if buffer == nil {
|
|
|
|
buffer = make([]byte, MaxMessageSize)
|
2017-07-01 23:29:22 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
device.net.mutex.RLock()
|
|
|
|
conn := device.net.conn
|
|
|
|
device.net.mutex.RUnlock()
|
2017-07-06 15:43:55 +02:00
|
|
|
if conn == nil {
|
|
|
|
time.Sleep(time.Second)
|
|
|
|
continue
|
|
|
|
}
|
2017-07-01 23:29:22 +02:00
|
|
|
|
|
|
|
conn.SetReadDeadline(time.Now().Add(time.Second))
|
|
|
|
|
2017-07-06 15:43:55 +02:00
|
|
|
size, raddr, err := conn.ReadFromUDP(buffer)
|
|
|
|
if err != nil || size < MinMessageSize {
|
2017-07-01 23:29:22 +02:00
|
|
|
continue
|
|
|
|
}
|
|
|
|
|
|
|
|
// handle packet
|
|
|
|
|
2017-07-06 15:43:55 +02:00
|
|
|
packet := buffer[:size]
|
2017-07-01 23:29:22 +02:00
|
|
|
msgType := binary.LittleEndian.Uint32(packet[:4])
|
|
|
|
|
|
|
|
func() {
|
|
|
|
switch msgType {
|
|
|
|
|
|
|
|
case MessageInitiationType, MessageResponseType:
|
|
|
|
|
|
|
|
// add to handshake queue
|
|
|
|
|
2017-07-07 13:47:09 +02:00
|
|
|
addToHandshakeQueue(
|
|
|
|
device.queue.handshake,
|
|
|
|
QueueHandshakeElement{
|
|
|
|
msgType: msgType,
|
|
|
|
packet: packet,
|
|
|
|
source: raddr,
|
|
|
|
},
|
|
|
|
)
|
2017-07-06 15:43:55 +02:00
|
|
|
buffer = nil
|
2017-07-01 23:29:22 +02:00
|
|
|
|
|
|
|
case MessageCookieReplyType:
|
|
|
|
|
|
|
|
// verify and update peer cookie state
|
|
|
|
|
|
|
|
if len(packet) != MessageCookieReplySize {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
var reply MessageCookieReply
|
|
|
|
reader := bytes.NewReader(packet)
|
|
|
|
err := binary.Read(reader, binary.LittleEndian, &reply)
|
|
|
|
if err != nil {
|
2017-07-08 09:23:10 +02:00
|
|
|
logDebug.Println("Failed to decode cookie reply")
|
2017-07-01 23:29:22 +02:00
|
|
|
return
|
|
|
|
}
|
|
|
|
device.ConsumeMessageCookieReply(&reply)
|
|
|
|
|
|
|
|
case MessageTransportType:
|
|
|
|
|
|
|
|
// lookup key pair
|
|
|
|
|
|
|
|
if len(packet) < MessageTransportSize {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
receiver := binary.LittleEndian.Uint32(
|
|
|
|
packet[MessageTransportOffsetReceiver:MessageTransportOffsetCounter],
|
|
|
|
)
|
|
|
|
value := device.indices.Lookup(receiver)
|
|
|
|
keyPair := value.keyPair
|
|
|
|
if keyPair == nil {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
// check key-pair expiry
|
|
|
|
|
|
|
|
if keyPair.created.Add(RejectAfterTime).Before(time.Now()) {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
// add to peer queue
|
|
|
|
|
|
|
|
peer := value.peer
|
|
|
|
work := new(QueueInboundElement)
|
|
|
|
work.packet = packet
|
|
|
|
work.keyPair = keyPair
|
2017-07-08 23:51:26 +02:00
|
|
|
work.dropped = AtomicFalse
|
2017-07-01 23:29:22 +02:00
|
|
|
work.mutex.Lock()
|
|
|
|
|
2017-07-06 15:43:55 +02:00
|
|
|
// add to decryption queues
|
|
|
|
|
|
|
|
addToInboundQueue(device.queue.decryption, work)
|
|
|
|
addToInboundQueue(peer.queue.inbound, work)
|
|
|
|
buffer = nil
|
2017-07-01 23:29:22 +02:00
|
|
|
|
|
|
|
default:
|
|
|
|
// unknown message type
|
2017-07-08 09:23:10 +02:00
|
|
|
logDebug.Println("Got unknown message from:", raddr)
|
2017-07-01 23:29:22 +02:00
|
|
|
}
|
|
|
|
}()
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func (device *Device) RoutineDecryption() {
|
|
|
|
var elem *QueueInboundElement
|
|
|
|
var nonce [chacha20poly1305.NonceSize]byte
|
|
|
|
|
2017-07-06 15:43:55 +02:00
|
|
|
logDebug := device.log.Debug
|
|
|
|
logDebug.Println("Routine, decryption, started for device")
|
|
|
|
|
2017-07-01 23:29:22 +02:00
|
|
|
for {
|
|
|
|
select {
|
|
|
|
case elem = <-device.queue.decryption:
|
|
|
|
case <-device.signal.stop:
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
// check if dropped
|
|
|
|
|
2017-07-06 15:43:55 +02:00
|
|
|
if elem.IsDropped() {
|
|
|
|
elem.mutex.Unlock()
|
2017-07-01 23:29:22 +02:00
|
|
|
continue
|
|
|
|
}
|
|
|
|
|
|
|
|
// split message into fields
|
|
|
|
|
2017-07-06 15:43:55 +02:00
|
|
|
counter := elem.packet[MessageTransportOffsetCounter:MessageTransportOffsetContent]
|
2017-07-01 23:29:22 +02:00
|
|
|
content := elem.packet[MessageTransportOffsetContent:]
|
|
|
|
|
|
|
|
// decrypt with key-pair
|
|
|
|
|
|
|
|
var err error
|
2017-07-06 15:43:55 +02:00
|
|
|
copy(nonce[4:], counter)
|
|
|
|
elem.counter = binary.LittleEndian.Uint64(counter)
|
|
|
|
elem.packet, err = elem.keyPair.receive.Open(elem.packet[:0], nonce[:], content, nil)
|
2017-07-01 23:29:22 +02:00
|
|
|
if err != nil {
|
|
|
|
elem.Drop()
|
|
|
|
}
|
|
|
|
elem.mutex.Unlock()
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Handles incomming packets related to handshake
|
|
|
|
*
|
|
|
|
*
|
|
|
|
*/
|
|
|
|
func (device *Device) RoutineHandshake() {
|
|
|
|
|
|
|
|
logInfo := device.log.Info
|
|
|
|
logError := device.log.Error
|
|
|
|
logDebug := device.log.Debug
|
2017-07-06 15:43:55 +02:00
|
|
|
logDebug.Println("Routine, handshake routine, started for device")
|
2017-07-01 23:29:22 +02:00
|
|
|
|
|
|
|
var elem QueueHandshakeElement
|
|
|
|
|
|
|
|
for {
|
|
|
|
select {
|
|
|
|
case elem = <-device.queue.handshake:
|
|
|
|
case <-device.signal.stop:
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
func() {
|
|
|
|
|
2017-07-08 09:23:10 +02:00
|
|
|
// verify mac1
|
|
|
|
|
|
|
|
if !device.mac.CheckMAC1(elem.packet) {
|
|
|
|
logDebug.Println("Received packet with invalid mac1")
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
// verify mac2
|
|
|
|
|
2017-07-08 23:51:26 +02:00
|
|
|
busy := atomic.LoadInt32(&device.underLoad) == AtomicTrue
|
2017-07-08 09:23:10 +02:00
|
|
|
|
|
|
|
if busy && !device.mac.CheckMAC2(elem.packet, elem.source) {
|
|
|
|
sender := binary.LittleEndian.Uint32(elem.packet[4:8]) // "sender" always follows "type"
|
|
|
|
reply, err := device.CreateMessageCookieReply(elem.packet, sender, elem.source)
|
|
|
|
if err != nil {
|
|
|
|
logError.Println("Failed to create cookie reply:", err)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
writer := bytes.NewBuffer(elem.packet[:0])
|
|
|
|
binary.Write(writer, binary.LittleEndian, reply)
|
|
|
|
elem.packet = writer.Bytes()
|
|
|
|
_, err = device.net.conn.WriteToUDP(elem.packet, elem.source)
|
|
|
|
if err != nil {
|
|
|
|
logDebug.Println("Failed to send cookie reply:", err)
|
|
|
|
}
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
// ratelimit
|
|
|
|
|
|
|
|
// handle messages
|
|
|
|
|
2017-07-01 23:29:22 +02:00
|
|
|
switch elem.msgType {
|
|
|
|
case MessageInitiationType:
|
|
|
|
|
|
|
|
// unmarshal
|
|
|
|
|
|
|
|
if len(elem.packet) != MessageInitiationSize {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
var msg MessageInitiation
|
|
|
|
reader := bytes.NewReader(elem.packet)
|
|
|
|
err := binary.Read(reader, binary.LittleEndian, &msg)
|
|
|
|
if err != nil {
|
|
|
|
logError.Println("Failed to decode initiation message")
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
// consume initiation
|
|
|
|
|
|
|
|
peer := device.ConsumeMessageInitiation(&msg)
|
|
|
|
if peer == nil {
|
|
|
|
logInfo.Println(
|
|
|
|
"Recieved invalid initiation message from",
|
|
|
|
elem.source.IP.String(),
|
|
|
|
elem.source.Port,
|
|
|
|
)
|
|
|
|
return
|
|
|
|
}
|
2017-07-07 13:47:09 +02:00
|
|
|
|
|
|
|
// create response
|
|
|
|
|
|
|
|
response, err := device.CreateMessageResponse(peer)
|
|
|
|
if err != nil {
|
|
|
|
logError.Println("Failed to create response message:", err)
|
|
|
|
return
|
|
|
|
}
|
2017-07-08 09:23:10 +02:00
|
|
|
|
2017-07-07 13:47:09 +02:00
|
|
|
outElem := device.NewOutboundElement()
|
|
|
|
writer := bytes.NewBuffer(outElem.data[:0])
|
|
|
|
binary.Write(writer, binary.LittleEndian, response)
|
|
|
|
elem.packet = writer.Bytes()
|
|
|
|
peer.mac.AddMacs(elem.packet)
|
|
|
|
addToOutboundQueue(peer.queue.outbound, outElem)
|
2017-07-01 23:29:22 +02:00
|
|
|
|
|
|
|
case MessageResponseType:
|
|
|
|
|
|
|
|
// unmarshal
|
|
|
|
|
|
|
|
if len(elem.packet) != MessageResponseSize {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
var msg MessageResponse
|
|
|
|
reader := bytes.NewReader(elem.packet)
|
|
|
|
err := binary.Read(reader, binary.LittleEndian, &msg)
|
|
|
|
if err != nil {
|
|
|
|
logError.Println("Failed to decode response message")
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
// consume response
|
|
|
|
|
|
|
|
peer := device.ConsumeMessageResponse(&msg)
|
|
|
|
if peer == nil {
|
|
|
|
logInfo.Println(
|
|
|
|
"Recieved invalid response message from",
|
|
|
|
elem.source.IP.String(),
|
|
|
|
elem.source.Port,
|
|
|
|
)
|
|
|
|
return
|
|
|
|
}
|
2017-07-06 15:43:55 +02:00
|
|
|
kp := peer.NewKeyPair()
|
|
|
|
if kp == nil {
|
|
|
|
logDebug.Println("Failed to derieve key-pair")
|
|
|
|
}
|
2017-07-01 23:29:22 +02:00
|
|
|
peer.SendKeepAlive()
|
2017-07-08 23:51:26 +02:00
|
|
|
peer.EventHandshakeComplete()
|
2017-07-01 23:29:22 +02:00
|
|
|
|
|
|
|
default:
|
|
|
|
device.log.Error.Println("Invalid message type in handshake queue")
|
|
|
|
}
|
|
|
|
}()
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func (peer *Peer) RoutineSequentialReceiver() {
|
|
|
|
var elem *QueueInboundElement
|
|
|
|
|
|
|
|
device := peer.device
|
|
|
|
logDebug := device.log.Debug
|
|
|
|
logDebug.Println("Routine, sequential receiver, started for peer", peer.id)
|
|
|
|
|
|
|
|
for {
|
|
|
|
// wait for decryption
|
|
|
|
|
|
|
|
select {
|
|
|
|
case <-peer.signal.stop:
|
|
|
|
return
|
|
|
|
case elem = <-peer.queue.inbound:
|
|
|
|
}
|
2017-07-06 15:43:55 +02:00
|
|
|
elem.mutex.Lock()
|
2017-07-01 23:29:22 +02:00
|
|
|
|
2017-07-08 09:23:10 +02:00
|
|
|
// process packet
|
2017-07-07 13:47:09 +02:00
|
|
|
|
|
|
|
func() {
|
|
|
|
if elem.IsDropped() {
|
|
|
|
return
|
|
|
|
}
|
2017-07-01 23:29:22 +02:00
|
|
|
|
2017-07-07 13:47:09 +02:00
|
|
|
// check for replay
|
2017-07-02 15:28:38 +02:00
|
|
|
|
2017-07-08 23:51:26 +02:00
|
|
|
// time (passive) keep-alive
|
|
|
|
|
|
|
|
peer.TimerStartKeepalive()
|
|
|
|
|
|
|
|
// refresh key material (rekey)
|
2017-07-01 23:29:22 +02:00
|
|
|
|
2017-07-08 23:51:26 +02:00
|
|
|
peer.KeepKeyFreshReceiving()
|
|
|
|
|
|
|
|
// check if confirming handshake
|
|
|
|
|
|
|
|
kp := &peer.keyPairs
|
|
|
|
kp.mutex.Lock()
|
|
|
|
if kp.next == elem.keyPair {
|
|
|
|
peer.EventHandshakeComplete()
|
|
|
|
kp.previous = kp.current
|
|
|
|
kp.current = kp.next
|
|
|
|
kp.next = nil
|
|
|
|
}
|
|
|
|
kp.mutex.Unlock()
|
2017-07-01 23:29:22 +02:00
|
|
|
|
2017-07-07 13:47:09 +02:00
|
|
|
// check for keep-alive
|
2017-07-06 15:43:55 +02:00
|
|
|
|
2017-07-07 13:47:09 +02:00
|
|
|
if len(elem.packet) == 0 {
|
|
|
|
return
|
|
|
|
}
|
2017-07-01 23:29:22 +02:00
|
|
|
|
2017-07-08 09:23:10 +02:00
|
|
|
// verify source and strip padding
|
2017-07-01 23:29:22 +02:00
|
|
|
|
2017-07-07 13:47:09 +02:00
|
|
|
switch elem.packet[0] >> 4 {
|
|
|
|
case IPv4version:
|
2017-07-08 09:23:10 +02:00
|
|
|
|
|
|
|
// strip padding
|
|
|
|
|
2017-07-07 13:47:09 +02:00
|
|
|
if len(elem.packet) < IPv4headerSize {
|
|
|
|
return
|
|
|
|
}
|
2017-07-08 09:23:10 +02:00
|
|
|
|
2017-07-07 13:47:09 +02:00
|
|
|
field := elem.packet[IPv4offsetTotalLength : IPv4offsetTotalLength+2]
|
|
|
|
length := binary.BigEndian.Uint16(field)
|
|
|
|
elem.packet = elem.packet[:length]
|
|
|
|
|
2017-07-08 09:23:10 +02:00
|
|
|
// verify IPv4 source
|
|
|
|
|
|
|
|
dst := elem.packet[IPv4offsetDst : IPv4offsetDst+net.IPv4len]
|
|
|
|
if device.routingTable.LookupIPv4(dst) != peer {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2017-07-07 13:47:09 +02:00
|
|
|
case IPv6version:
|
2017-07-08 09:23:10 +02:00
|
|
|
|
|
|
|
// strip padding
|
|
|
|
|
2017-07-07 13:47:09 +02:00
|
|
|
if len(elem.packet) < IPv6headerSize {
|
|
|
|
return
|
|
|
|
}
|
2017-07-08 09:23:10 +02:00
|
|
|
|
2017-07-07 13:47:09 +02:00
|
|
|
field := elem.packet[IPv6offsetPayloadLength : IPv6offsetPayloadLength+2]
|
|
|
|
length := binary.BigEndian.Uint16(field)
|
|
|
|
length += IPv6headerSize
|
|
|
|
elem.packet = elem.packet[:length]
|
|
|
|
|
2017-07-08 09:23:10 +02:00
|
|
|
// verify IPv6 source
|
|
|
|
|
|
|
|
dst := elem.packet[IPv6offsetDst : IPv6offsetDst+net.IPv6len]
|
|
|
|
if device.routingTable.LookupIPv6(dst) != peer {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2017-07-07 13:47:09 +02:00
|
|
|
default:
|
2017-07-08 23:51:26 +02:00
|
|
|
logDebug.Println("Receieved packet with unknown IP version")
|
2017-07-07 13:47:09 +02:00
|
|
|
return
|
|
|
|
}
|
2017-07-08 09:23:10 +02:00
|
|
|
|
|
|
|
atomic.AddUint64(&peer.rxBytes, uint64(len(elem.packet)))
|
2017-07-07 13:47:09 +02:00
|
|
|
addToInboundQueue(device.queue.inbound, elem)
|
|
|
|
}()
|
2017-07-06 15:43:55 +02:00
|
|
|
}
|
2017-07-01 23:29:22 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
func (device *Device) RoutineWriteToTUN(tun TUNDevice) {
|
2017-07-06 15:43:55 +02:00
|
|
|
logError := device.log.Error
|
|
|
|
logDebug := device.log.Debug
|
|
|
|
logDebug.Println("Routine, sequential tun writer, started")
|
2017-07-01 23:29:22 +02:00
|
|
|
|
2017-07-06 15:43:55 +02:00
|
|
|
for {
|
2017-07-01 23:29:22 +02:00
|
|
|
select {
|
|
|
|
case <-device.signal.stop:
|
2017-07-06 15:43:55 +02:00
|
|
|
return
|
2017-07-07 13:47:09 +02:00
|
|
|
case elem := <-device.queue.inbound:
|
|
|
|
_, err := tun.Write(elem.packet)
|
2017-07-06 15:43:55 +02:00
|
|
|
if err != nil {
|
|
|
|
logError.Println("Failed to write packet to TUN device:", err)
|
|
|
|
}
|
2017-07-01 23:29:22 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|