controller.go 11 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388
  1. // Copyright 2023 The frp Authors
  2. //
  3. // Licensed under the Apache License, Version 2.0 (the "License");
  4. // you may not use this file except in compliance with the License.
  5. // You may obtain a copy of the License at
  6. //
  7. // http://www.apache.org/licenses/LICENSE-2.0
  8. //
  9. // Unless required by applicable law or agreed to in writing, software
  10. // distributed under the License is distributed on an "AS IS" BASIS,
  11. // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  12. // See the License for the specific language governing permissions and
  13. // limitations under the License.
  14. package nathole
  15. import (
  16. "context"
  17. "crypto/md5"
  18. "encoding/hex"
  19. "fmt"
  20. "net"
  21. "strconv"
  22. "sync"
  23. "time"
  24. "github.com/fatedier/golib/errors"
  25. "github.com/samber/lo"
  26. "golang.org/x/sync/errgroup"
  27. "github.com/fatedier/frp/pkg/msg"
  28. "github.com/fatedier/frp/pkg/transport"
  29. "github.com/fatedier/frp/pkg/util/log"
  30. "github.com/fatedier/frp/pkg/util/util"
  31. )
  32. // NatHoleTimeout seconds.
  33. var NatHoleTimeout int64 = 10
  34. func NewTransactionID() string {
  35. id, _ := util.RandID()
  36. return fmt.Sprintf("%d%s", time.Now().Unix(), id)
  37. }
  38. type ClientCfg struct {
  39. name string
  40. sk string
  41. allowUsers []string
  42. sidCh chan string
  43. }
  44. type Session struct {
  45. sid string
  46. analysisKey string
  47. recommandMode int
  48. recommandIndex int
  49. visitorMsg *msg.NatHoleVisitor
  50. visitorTransporter transport.MessageTransporter
  51. vResp *msg.NatHoleResp
  52. vNatFeature *NatFeature
  53. vBehavior RecommandBehavior
  54. clientMsg *msg.NatHoleClient
  55. clientTransporter transport.MessageTransporter
  56. cResp *msg.NatHoleResp
  57. cNatFeature *NatFeature
  58. cBehavior RecommandBehavior
  59. notifyCh chan struct{}
  60. }
  61. func (s *Session) genAnalysisKey() {
  62. hash := md5.New()
  63. vIPs := lo.Uniq(parseIPs(s.visitorMsg.MappedAddrs))
  64. if len(vIPs) > 0 {
  65. hash.Write([]byte(vIPs[0]))
  66. }
  67. hash.Write([]byte(s.vNatFeature.NatType))
  68. hash.Write([]byte(s.vNatFeature.Behavior))
  69. hash.Write([]byte(strconv.FormatBool(s.vNatFeature.RegularPortsChange)))
  70. cIPs := lo.Uniq(parseIPs(s.clientMsg.MappedAddrs))
  71. if len(cIPs) > 0 {
  72. hash.Write([]byte(cIPs[0]))
  73. }
  74. hash.Write([]byte(s.cNatFeature.NatType))
  75. hash.Write([]byte(s.cNatFeature.Behavior))
  76. hash.Write([]byte(strconv.FormatBool(s.cNatFeature.RegularPortsChange)))
  77. s.analysisKey = hex.EncodeToString(hash.Sum(nil))
  78. }
  79. type Controller struct {
  80. clientCfgs map[string]*ClientCfg
  81. sessions map[string]*Session
  82. analyzer *Analyzer
  83. mu sync.RWMutex
  84. }
  85. func NewController(analysisDataReserveDuration time.Duration) (*Controller, error) {
  86. return &Controller{
  87. clientCfgs: make(map[string]*ClientCfg),
  88. sessions: make(map[string]*Session),
  89. analyzer: NewAnalyzer(analysisDataReserveDuration),
  90. }, nil
  91. }
  92. func (c *Controller) CleanWorker(ctx context.Context) {
  93. ticker := time.NewTicker(time.Hour)
  94. defer ticker.Stop()
  95. for {
  96. select {
  97. case <-ticker.C:
  98. start := time.Now()
  99. count, total := c.analyzer.Clean()
  100. log.Trace("clean %d/%d nathole analysis data, cost %v", count, total, time.Since(start))
  101. case <-ctx.Done():
  102. return
  103. }
  104. }
  105. }
  106. func (c *Controller) ListenClient(name string, sk string, allowUsers []string) chan string {
  107. cfg := &ClientCfg{
  108. name: name,
  109. sk: sk,
  110. allowUsers: allowUsers,
  111. sidCh: make(chan string),
  112. }
  113. c.mu.Lock()
  114. defer c.mu.Unlock()
  115. c.clientCfgs[name] = cfg
  116. return cfg.sidCh
  117. }
  118. func (c *Controller) CloseClient(name string) {
  119. c.mu.Lock()
  120. defer c.mu.Unlock()
  121. delete(c.clientCfgs, name)
  122. }
  123. func (c *Controller) GenSid() string {
  124. t := time.Now().Unix()
  125. id, _ := util.RandID()
  126. return fmt.Sprintf("%d%s", t, id)
  127. }
  128. func (c *Controller) HandleVisitor(m *msg.NatHoleVisitor, transporter transport.MessageTransporter, visitorUser string) {
  129. if m.PreCheck {
  130. cfg, ok := c.clientCfgs[m.ProxyName]
  131. if !ok {
  132. _ = transporter.Send(c.GenNatHoleResponse(m.TransactionID, nil, fmt.Sprintf("xtcp server for [%s] doesn't exist", m.ProxyName)))
  133. return
  134. }
  135. if !lo.Contains(cfg.allowUsers, visitorUser) && !lo.Contains(cfg.allowUsers, "*") {
  136. _ = transporter.Send(c.GenNatHoleResponse(m.TransactionID, nil, fmt.Sprintf("xtcp visitor user [%s] not allowed for [%s]", visitorUser, m.ProxyName)))
  137. return
  138. }
  139. _ = transporter.Send(c.GenNatHoleResponse(m.TransactionID, nil, ""))
  140. return
  141. }
  142. sid := c.GenSid()
  143. session := &Session{
  144. sid: sid,
  145. visitorMsg: m,
  146. visitorTransporter: transporter,
  147. notifyCh: make(chan struct{}, 1),
  148. }
  149. var (
  150. clientCfg *ClientCfg
  151. ok bool
  152. )
  153. err := func() error {
  154. c.mu.Lock()
  155. defer c.mu.Unlock()
  156. clientCfg, ok = c.clientCfgs[m.ProxyName]
  157. if !ok {
  158. return fmt.Errorf("xtcp server for [%s] doesn't exist", m.ProxyName)
  159. }
  160. if !util.ConstantTimeEqString(m.SignKey, util.GetAuthKey(clientCfg.sk, m.Timestamp)) {
  161. return fmt.Errorf("xtcp connection of [%s] auth failed", m.ProxyName)
  162. }
  163. c.sessions[sid] = session
  164. return nil
  165. }()
  166. if err != nil {
  167. log.Warn("handle visitorMsg error: %v", err)
  168. _ = transporter.Send(c.GenNatHoleResponse(m.TransactionID, nil, err.Error()))
  169. return
  170. }
  171. log.Trace("handle visitor message, sid [%s]", sid)
  172. defer func() {
  173. c.mu.Lock()
  174. defer c.mu.Unlock()
  175. delete(c.sessions, sid)
  176. }()
  177. if err := errors.PanicToError(func() {
  178. clientCfg.sidCh <- sid
  179. }); err != nil {
  180. return
  181. }
  182. // wait for NatHoleClient message
  183. select {
  184. case <-session.notifyCh:
  185. case <-time.After(time.Duration(NatHoleTimeout) * time.Second):
  186. log.Debug("wait for NatHoleClient message timeout, sid [%s]", sid)
  187. return
  188. }
  189. // Make hole-punching decisions based on the NAT information of the client and visitor.
  190. vResp, cResp, err := c.analysis(session)
  191. if err != nil {
  192. log.Debug("sid [%s] analysis error: %v", err)
  193. vResp = c.GenNatHoleResponse(session.visitorMsg.TransactionID, nil, err.Error())
  194. cResp = c.GenNatHoleResponse(session.clientMsg.TransactionID, nil, err.Error())
  195. }
  196. session.cResp = cResp
  197. session.vResp = vResp
  198. // send response to visitor and client
  199. var g errgroup.Group
  200. g.Go(func() error {
  201. // if it's sender, wait for a while to make sure the client has send the detect messages
  202. if vResp.DetectBehavior.Role == "sender" {
  203. time.Sleep(1 * time.Second)
  204. }
  205. _ = session.visitorTransporter.Send(vResp)
  206. return nil
  207. })
  208. g.Go(func() error {
  209. // if it's sender, wait for a while to make sure the client has send the detect messages
  210. if cResp.DetectBehavior.Role == "sender" {
  211. time.Sleep(1 * time.Second)
  212. }
  213. _ = session.clientTransporter.Send(cResp)
  214. return nil
  215. })
  216. _ = g.Wait()
  217. time.Sleep(time.Duration(cResp.DetectBehavior.ReadTimeoutMs+30000) * time.Millisecond)
  218. }
  219. func (c *Controller) HandleClient(m *msg.NatHoleClient, transporter transport.MessageTransporter) {
  220. c.mu.RLock()
  221. session, ok := c.sessions[m.Sid]
  222. c.mu.RUnlock()
  223. if !ok {
  224. return
  225. }
  226. log.Trace("handle client message, sid [%s]", session.sid)
  227. session.clientMsg = m
  228. session.clientTransporter = transporter
  229. select {
  230. case session.notifyCh <- struct{}{}:
  231. default:
  232. }
  233. }
  234. func (c *Controller) HandleReport(m *msg.NatHoleReport) {
  235. c.mu.RLock()
  236. session, ok := c.sessions[m.Sid]
  237. c.mu.RUnlock()
  238. if !ok {
  239. log.Trace("sid [%s] report make hole success: %v, but session not found", m.Sid, m.Success)
  240. return
  241. }
  242. if m.Success {
  243. c.analyzer.ReportSuccess(session.analysisKey, session.recommandMode, session.recommandIndex)
  244. }
  245. log.Info("sid [%s] report make hole success: %v, mode %v, index %v",
  246. m.Sid, m.Success, session.recommandMode, session.recommandIndex)
  247. }
  248. func (c *Controller) GenNatHoleResponse(transactionID string, session *Session, errInfo string) *msg.NatHoleResp {
  249. var sid string
  250. if session != nil {
  251. sid = session.sid
  252. }
  253. return &msg.NatHoleResp{
  254. TransactionID: transactionID,
  255. Sid: sid,
  256. Error: errInfo,
  257. }
  258. }
  259. // analysis analyzes the NAT type and behavior of the visitor and client, then makes hole-punching decisions.
  260. // return the response to the visitor and client.
  261. func (c *Controller) analysis(session *Session) (*msg.NatHoleResp, *msg.NatHoleResp, error) {
  262. cm := session.clientMsg
  263. vm := session.visitorMsg
  264. cNatFeature, err := ClassifyNATFeature(cm.MappedAddrs, parseIPs(cm.AssistedAddrs))
  265. if err != nil {
  266. return nil, nil, fmt.Errorf("classify client nat feature error: %v", err)
  267. }
  268. vNatFeature, err := ClassifyNATFeature(vm.MappedAddrs, parseIPs(vm.AssistedAddrs))
  269. if err != nil {
  270. return nil, nil, fmt.Errorf("classify visitor nat feature error: %v", err)
  271. }
  272. session.cNatFeature = cNatFeature
  273. session.vNatFeature = vNatFeature
  274. session.genAnalysisKey()
  275. mode, index, cBehavior, vBehavior := c.analyzer.GetRecommandBehaviors(session.analysisKey, cNatFeature, vNatFeature)
  276. session.recommandMode = mode
  277. session.recommandIndex = index
  278. session.cBehavior = cBehavior
  279. session.vBehavior = vBehavior
  280. timeoutMs := lo.Max([]int{cBehavior.SendDelayMs, vBehavior.SendDelayMs}) + 5000
  281. if cBehavior.ListenRandomPorts > 0 || vBehavior.ListenRandomPorts > 0 {
  282. timeoutMs += 30000
  283. }
  284. protocol := vm.Protocol
  285. vResp := &msg.NatHoleResp{
  286. TransactionID: vm.TransactionID,
  287. Sid: session.sid,
  288. Protocol: protocol,
  289. CandidateAddrs: lo.Uniq(cm.MappedAddrs),
  290. AssistedAddrs: lo.Uniq(cm.AssistedAddrs),
  291. DetectBehavior: msg.NatHoleDetectBehavior{
  292. Mode: mode,
  293. Role: vBehavior.Role,
  294. TTL: vBehavior.TTL,
  295. SendDelayMs: vBehavior.SendDelayMs,
  296. ReadTimeoutMs: timeoutMs - vBehavior.SendDelayMs,
  297. SendRandomPorts: vBehavior.PortsRandomNumber,
  298. ListenRandomPorts: vBehavior.ListenRandomPorts,
  299. CandidatePorts: getRangePorts(cm.MappedAddrs, cNatFeature.PortsDifference, vBehavior.PortsRangeNumber),
  300. },
  301. }
  302. cResp := &msg.NatHoleResp{
  303. TransactionID: cm.TransactionID,
  304. Sid: session.sid,
  305. Protocol: protocol,
  306. CandidateAddrs: lo.Uniq(vm.MappedAddrs),
  307. AssistedAddrs: lo.Uniq(vm.AssistedAddrs),
  308. DetectBehavior: msg.NatHoleDetectBehavior{
  309. Mode: mode,
  310. Role: cBehavior.Role,
  311. TTL: cBehavior.TTL,
  312. SendDelayMs: cBehavior.SendDelayMs,
  313. ReadTimeoutMs: timeoutMs - cBehavior.SendDelayMs,
  314. SendRandomPorts: cBehavior.PortsRandomNumber,
  315. ListenRandomPorts: cBehavior.ListenRandomPorts,
  316. CandidatePorts: getRangePorts(vm.MappedAddrs, vNatFeature.PortsDifference, cBehavior.PortsRangeNumber),
  317. },
  318. }
  319. log.Debug("sid [%s] visitor nat: %+v, candidateAddrs: %v; client nat: %+v, candidateAddrs: %v, protocol: %s",
  320. session.sid, *vNatFeature, vm.MappedAddrs, *cNatFeature, cm.MappedAddrs, protocol)
  321. log.Debug("sid [%s] visitor detect behavior: %+v", session.sid, vResp.DetectBehavior)
  322. log.Debug("sid [%s] client detect behavior: %+v", session.sid, cResp.DetectBehavior)
  323. return vResp, cResp, nil
  324. }
  325. func getRangePorts(addrs []string, difference, maxNumber int) []msg.PortsRange {
  326. if maxNumber <= 0 {
  327. return nil
  328. }
  329. addr, err := lo.Last(addrs)
  330. if err != nil {
  331. return nil
  332. }
  333. var ports []msg.PortsRange
  334. _, portStr, err := net.SplitHostPort(addr)
  335. if err != nil {
  336. return nil
  337. }
  338. port, err := strconv.Atoi(portStr)
  339. if err != nil {
  340. return nil
  341. }
  342. ports = append(ports, msg.PortsRange{
  343. From: lo.Max([]int{port - difference - 5, port - maxNumber, 1}),
  344. To: lo.Min([]int{port + difference + 5, port + maxNumber, 65535}),
  345. })
  346. return ports
  347. }