--- /dev/null
+// +build !linux
+
+package main
+
+import (
+ "net"
+)
+
+func setFwmark(conn *net.UDPConn, value int) error {
+ return nil
+}
--- /dev/null
+package main
+
+import (
+ "golang.org/x/sys/unix"
+ "net"
+)
+
+func setMark(conn *net.UDPConn, value int) error {
+ if conn == nil || value == 0 {
+ return nil
+ }
+
+ file, err := conn.File()
+ if err != nil {
+ return err
+ }
+
+ return unix.SetsockoptInt(
+ int(file.Fd()),
+ unix.SOL_SOCKET,
+ unix.SO_MARK,
+ value,
+ )
+}
QueueOutboundSize = 1024
QueueInboundSize = 1024
QueueHandshakeSize = 1024
- MinMessageSize = MessageTransportSize // size of keep-alive
- MaxMessageSize = ((1 << 16) - 1) + MessageTransportHeaderSize
- MaxPeers = 1 << 16
+ MaxSegmentSize = (1 << 16) - 1 // largest possible UDP datagram
+ MinMessageSize = MessageKeepaliveSize // minimum size of transport message (keepalive)
+ MaxMessageSize = MaxSegmentSize // maximum size of transport message
+ MaxContentSize = MaxSegmentSize - MessageTransportSize // maximum size of transport message content
)
const (
UnderLoadQueueSize = QueueHandshakeSize / 8
UnderLoadAfterTime = time.Second // how long does the device remain under load after detected
+ MaxPeers = 1 << 16 // maximum number of configured peers
)
)
const (
- MessageInitiationSize = 148
- MessageResponseSize = 92
- MessageCookieReplySize = 64
- MessageTransportHeaderSize = 16
+ MessageInitiationSize = 148 // size of handshake initation message
+ MessageResponseSize = 92 // size of response message
+ MessageCookieReplySize = 64 // size of cookie reply message
+ MessageTransportHeaderSize = 16 // size of data preceeding content in transport message
MessageTransportSize = MessageTransportHeaderSize + poly1305.TagSize // size of empty transport
- MessageKeepaliveSize = MessageTransportSize
+ MessageKeepaliveSize = MessageTransportSize // size of keepalive
+ MessageHandshakeSize = MessageInitiationSize // size of largest handshake releated message
)
const (
}
}
+func (device *Device) addToDecryptionQueue(
+ queue chan *QueueInboundElement,
+ element *QueueInboundElement,
+) {
+ for {
+ select {
+ case queue <- element:
+ return
+ default:
+ select {
+ case old := <-queue:
+ // drop & release to potential consumer
+ old.Drop()
+ old.mutex.Unlock()
+ default:
+ }
+ }
+ }
+}
+
func (device *Device) addToHandshakeQueue(
queue chan QueueHandshakeElement,
element QueueHandshakeElement,
// add to decryption queues
- device.addToInboundQueue(device.queue.decryption, elem)
+ device.addToDecryptionQueue(device.queue.decryption, elem)
device.addToInboundQueue(peer.queue.inbound, elem)
buffer = device.GetMessageBuffer()
continue
// check if dropped
if elem.IsDropped() {
- elem.mutex.Unlock() // TODO: Make consistent with send
continue
}
logDebug := device.log.Debug
logDebug.Println("Routine, handshake routine, started for device")
- var temp [256]byte
+ var temp [MessageHandshakeSize]byte
var elem QueueHandshakeElement
for {
default:
select {
case old := <-queue:
+ // drop & release to potential consumer
old.Drop()
old.mutex.Unlock()
default:
*/
func (device *Device) RoutineReadFromTUN() {
- var elem *QueueOutboundElement
+ elem := device.NewOutboundElement()
logDebug := device.log.Debug
logError := device.log.Error
- logDebug.Println("Routine, TUN Reader: started")
+ logDebug.Println("Routine, TUN Reader started")
for {
- // read packet
- if elem == nil {
- elem = device.NewOutboundElement()
- }
+ // read packet
elem.packet = elem.buffer[MessageTransportHeaderSize:]
size, err := device.tun.device.Read(elem.packet)
return
}
- if size == 0 {
+ if size == 0 || size > MaxContentSize {
continue
}
continue
}
- // check if known endpoint
+ // check if known endpoint (drop early)
peer.mutex.RLock()
if peer.endpoint == nil {
signalSend(peer.signal.handshakeReset)
addToOutboundQueue(peer.queue.nonce, elem)
- elem = nil
-
+ elem = device.NewOutboundElement()
}
}