1
0

controller.go 11 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389
  1. // Copyright 2023 The frp Authors
  2. //
  3. // Licensed under the Apache License, Version 2.0 (the "License");
  4. // you may not use this file except in compliance with the License.
  5. // You may obtain a copy of the License at
  6. //
  7. // http://www.apache.org/licenses/LICENSE-2.0
  8. //
  9. // Unless required by applicable law or agreed to in writing, software
  10. // distributed under the License is distributed on an "AS IS" BASIS,
  11. // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  12. // See the License for the specific language governing permissions and
  13. // limitations under the License.
  14. package nathole
  15. import (
  16. "context"
  17. "crypto/md5"
  18. "encoding/hex"
  19. "fmt"
  20. "net"
  21. "strconv"
  22. "sync"
  23. "time"
  24. "github.com/fatedier/golib/errors"
  25. "github.com/samber/lo"
  26. "golang.org/x/sync/errgroup"
  27. "github.com/fatedier/frp/pkg/msg"
  28. "github.com/fatedier/frp/pkg/transport"
  29. "github.com/fatedier/frp/pkg/util/log"
  30. "github.com/fatedier/frp/pkg/util/util"
  31. )
  32. // NatHoleTimeout seconds.
  33. var NatHoleTimeout int64 = 10
  34. func NewTransactionID() string {
  35. id, _ := util.RandID()
  36. return fmt.Sprintf("%d%s", time.Now().Unix(), id)
  37. }
  38. type ClientCfg struct {
  39. name string
  40. sk string
  41. allowUsers []string
  42. sidCh chan string
  43. }
  44. type Session struct {
  45. sid string
  46. analysisKey string
  47. recommandMode int
  48. recommandIndex int
  49. visitorMsg *msg.NatHoleVisitor
  50. visitorTransporter transport.MessageTransporter
  51. vResp *msg.NatHoleResp
  52. vNatFeature *NatFeature
  53. vBehavior RecommandBehavior
  54. clientMsg *msg.NatHoleClient
  55. clientTransporter transport.MessageTransporter
  56. cResp *msg.NatHoleResp
  57. cNatFeature *NatFeature
  58. cBehavior RecommandBehavior
  59. notifyCh chan struct{}
  60. }
  61. func (s *Session) genAnalysisKey() {
  62. hash := md5.New()
  63. vIPs := lo.Uniq(parseIPs(s.visitorMsg.MappedAddrs))
  64. if len(vIPs) > 0 {
  65. hash.Write([]byte(vIPs[0]))
  66. }
  67. hash.Write([]byte(s.vNatFeature.NatType))
  68. hash.Write([]byte(s.vNatFeature.Behavior))
  69. hash.Write([]byte(strconv.FormatBool(s.vNatFeature.RegularPortsChange)))
  70. cIPs := lo.Uniq(parseIPs(s.clientMsg.MappedAddrs))
  71. if len(cIPs) > 0 {
  72. hash.Write([]byte(cIPs[0]))
  73. }
  74. hash.Write([]byte(s.cNatFeature.NatType))
  75. hash.Write([]byte(s.cNatFeature.Behavior))
  76. hash.Write([]byte(strconv.FormatBool(s.cNatFeature.RegularPortsChange)))
  77. s.analysisKey = hex.EncodeToString(hash.Sum(nil))
  78. }
  79. type Controller struct {
  80. clientCfgs map[string]*ClientCfg
  81. sessions map[string]*Session
  82. analyzer *Analyzer
  83. mu sync.RWMutex
  84. }
  85. func NewController(analysisDataReserveDuration time.Duration) (*Controller, error) {
  86. return &Controller{
  87. clientCfgs: make(map[string]*ClientCfg),
  88. sessions: make(map[string]*Session),
  89. analyzer: NewAnalyzer(analysisDataReserveDuration),
  90. }, nil
  91. }
  92. func (c *Controller) CleanWorker(ctx context.Context) {
  93. ticker := time.NewTicker(time.Hour)
  94. defer ticker.Stop()
  95. for {
  96. select {
  97. case <-ticker.C:
  98. start := time.Now()
  99. count, total := c.analyzer.Clean()
  100. log.Trace("clean %d/%d nathole analysis data, cost %v", count, total, time.Since(start))
  101. case <-ctx.Done():
  102. return
  103. }
  104. }
  105. }
  106. func (c *Controller) ListenClient(name string, sk string, allowUsers []string) chan string {
  107. cfg := &ClientCfg{
  108. name: name,
  109. sk: sk,
  110. allowUsers: allowUsers,
  111. sidCh: make(chan string),
  112. }
  113. c.mu.Lock()
  114. defer c.mu.Unlock()
  115. // TODO(fatedier): return error if name already exists
  116. c.clientCfgs[name] = cfg
  117. return cfg.sidCh
  118. }
  119. func (c *Controller) CloseClient(name string) {
  120. c.mu.Lock()
  121. defer c.mu.Unlock()
  122. delete(c.clientCfgs, name)
  123. }
  124. func (c *Controller) GenSid() string {
  125. t := time.Now().Unix()
  126. id, _ := util.RandID()
  127. return fmt.Sprintf("%d%s", t, id)
  128. }
  129. func (c *Controller) HandleVisitor(m *msg.NatHoleVisitor, transporter transport.MessageTransporter, visitorUser string) {
  130. if m.PreCheck {
  131. cfg, ok := c.clientCfgs[m.ProxyName]
  132. if !ok {
  133. _ = transporter.Send(c.GenNatHoleResponse(m.TransactionID, nil, fmt.Sprintf("xtcp server for [%s] doesn't exist", m.ProxyName)))
  134. return
  135. }
  136. if !lo.Contains(cfg.allowUsers, visitorUser) && !lo.Contains(cfg.allowUsers, "*") {
  137. _ = transporter.Send(c.GenNatHoleResponse(m.TransactionID, nil, fmt.Sprintf("xtcp visitor user [%s] not allowed for [%s]", visitorUser, m.ProxyName)))
  138. return
  139. }
  140. _ = transporter.Send(c.GenNatHoleResponse(m.TransactionID, nil, ""))
  141. return
  142. }
  143. sid := c.GenSid()
  144. session := &Session{
  145. sid: sid,
  146. visitorMsg: m,
  147. visitorTransporter: transporter,
  148. notifyCh: make(chan struct{}, 1),
  149. }
  150. var (
  151. clientCfg *ClientCfg
  152. ok bool
  153. )
  154. err := func() error {
  155. c.mu.Lock()
  156. defer c.mu.Unlock()
  157. clientCfg, ok = c.clientCfgs[m.ProxyName]
  158. if !ok {
  159. return fmt.Errorf("xtcp server for [%s] doesn't exist", m.ProxyName)
  160. }
  161. if !util.ConstantTimeEqString(m.SignKey, util.GetAuthKey(clientCfg.sk, m.Timestamp)) {
  162. return fmt.Errorf("xtcp connection of [%s] auth failed", m.ProxyName)
  163. }
  164. c.sessions[sid] = session
  165. return nil
  166. }()
  167. if err != nil {
  168. log.Warn("handle visitorMsg error: %v", err)
  169. _ = transporter.Send(c.GenNatHoleResponse(m.TransactionID, nil, err.Error()))
  170. return
  171. }
  172. log.Trace("handle visitor message, sid [%s]", sid)
  173. defer func() {
  174. c.mu.Lock()
  175. defer c.mu.Unlock()
  176. delete(c.sessions, sid)
  177. }()
  178. if err := errors.PanicToError(func() {
  179. clientCfg.sidCh <- sid
  180. }); err != nil {
  181. return
  182. }
  183. // wait for NatHoleClient message
  184. select {
  185. case <-session.notifyCh:
  186. case <-time.After(time.Duration(NatHoleTimeout) * time.Second):
  187. log.Debug("wait for NatHoleClient message timeout, sid [%s]", sid)
  188. return
  189. }
  190. // Make hole-punching decisions based on the NAT information of the client and visitor.
  191. vResp, cResp, err := c.analysis(session)
  192. if err != nil {
  193. log.Debug("sid [%s] analysis error: %v", err)
  194. vResp = c.GenNatHoleResponse(session.visitorMsg.TransactionID, nil, err.Error())
  195. cResp = c.GenNatHoleResponse(session.clientMsg.TransactionID, nil, err.Error())
  196. }
  197. session.cResp = cResp
  198. session.vResp = vResp
  199. // send response to visitor and client
  200. var g errgroup.Group
  201. g.Go(func() error {
  202. // if it's sender, wait for a while to make sure the client has send the detect messages
  203. if vResp.DetectBehavior.Role == "sender" {
  204. time.Sleep(1 * time.Second)
  205. }
  206. _ = session.visitorTransporter.Send(vResp)
  207. return nil
  208. })
  209. g.Go(func() error {
  210. // if it's sender, wait for a while to make sure the client has send the detect messages
  211. if cResp.DetectBehavior.Role == "sender" {
  212. time.Sleep(1 * time.Second)
  213. }
  214. _ = session.clientTransporter.Send(cResp)
  215. return nil
  216. })
  217. _ = g.Wait()
  218. time.Sleep(time.Duration(cResp.DetectBehavior.ReadTimeoutMs+30000) * time.Millisecond)
  219. }
  220. func (c *Controller) HandleClient(m *msg.NatHoleClient, transporter transport.MessageTransporter) {
  221. c.mu.RLock()
  222. session, ok := c.sessions[m.Sid]
  223. c.mu.RUnlock()
  224. if !ok {
  225. return
  226. }
  227. log.Trace("handle client message, sid [%s]", session.sid)
  228. session.clientMsg = m
  229. session.clientTransporter = transporter
  230. select {
  231. case session.notifyCh <- struct{}{}:
  232. default:
  233. }
  234. }
  235. func (c *Controller) HandleReport(m *msg.NatHoleReport) {
  236. c.mu.RLock()
  237. session, ok := c.sessions[m.Sid]
  238. c.mu.RUnlock()
  239. if !ok {
  240. log.Trace("sid [%s] report make hole success: %v, but session not found", m.Sid, m.Success)
  241. return
  242. }
  243. if m.Success {
  244. c.analyzer.ReportSuccess(session.analysisKey, session.recommandMode, session.recommandIndex)
  245. }
  246. log.Info("sid [%s] report make hole success: %v, mode %v, index %v",
  247. m.Sid, m.Success, session.recommandMode, session.recommandIndex)
  248. }
  249. func (c *Controller) GenNatHoleResponse(transactionID string, session *Session, errInfo string) *msg.NatHoleResp {
  250. var sid string
  251. if session != nil {
  252. sid = session.sid
  253. }
  254. return &msg.NatHoleResp{
  255. TransactionID: transactionID,
  256. Sid: sid,
  257. Error: errInfo,
  258. }
  259. }
  260. // analysis analyzes the NAT type and behavior of the visitor and client, then makes hole-punching decisions.
  261. // return the response to the visitor and client.
  262. func (c *Controller) analysis(session *Session) (*msg.NatHoleResp, *msg.NatHoleResp, error) {
  263. cm := session.clientMsg
  264. vm := session.visitorMsg
  265. cNatFeature, err := ClassifyNATFeature(cm.MappedAddrs, parseIPs(cm.AssistedAddrs))
  266. if err != nil {
  267. return nil, nil, fmt.Errorf("classify client nat feature error: %v", err)
  268. }
  269. vNatFeature, err := ClassifyNATFeature(vm.MappedAddrs, parseIPs(vm.AssistedAddrs))
  270. if err != nil {
  271. return nil, nil, fmt.Errorf("classify visitor nat feature error: %v", err)
  272. }
  273. session.cNatFeature = cNatFeature
  274. session.vNatFeature = vNatFeature
  275. session.genAnalysisKey()
  276. mode, index, cBehavior, vBehavior := c.analyzer.GetRecommandBehaviors(session.analysisKey, cNatFeature, vNatFeature)
  277. session.recommandMode = mode
  278. session.recommandIndex = index
  279. session.cBehavior = cBehavior
  280. session.vBehavior = vBehavior
  281. timeoutMs := lo.Max([]int{cBehavior.SendDelayMs, vBehavior.SendDelayMs}) + 5000
  282. if cBehavior.ListenRandomPorts > 0 || vBehavior.ListenRandomPorts > 0 {
  283. timeoutMs += 30000
  284. }
  285. protocol := vm.Protocol
  286. vResp := &msg.NatHoleResp{
  287. TransactionID: vm.TransactionID,
  288. Sid: session.sid,
  289. Protocol: protocol,
  290. CandidateAddrs: lo.Uniq(cm.MappedAddrs),
  291. AssistedAddrs: lo.Uniq(cm.AssistedAddrs),
  292. DetectBehavior: msg.NatHoleDetectBehavior{
  293. Mode: mode,
  294. Role: vBehavior.Role,
  295. TTL: vBehavior.TTL,
  296. SendDelayMs: vBehavior.SendDelayMs,
  297. ReadTimeoutMs: timeoutMs - vBehavior.SendDelayMs,
  298. SendRandomPorts: vBehavior.PortsRandomNumber,
  299. ListenRandomPorts: vBehavior.ListenRandomPorts,
  300. CandidatePorts: getRangePorts(cm.MappedAddrs, cNatFeature.PortsDifference, vBehavior.PortsRangeNumber),
  301. },
  302. }
  303. cResp := &msg.NatHoleResp{
  304. TransactionID: cm.TransactionID,
  305. Sid: session.sid,
  306. Protocol: protocol,
  307. CandidateAddrs: lo.Uniq(vm.MappedAddrs),
  308. AssistedAddrs: lo.Uniq(vm.AssistedAddrs),
  309. DetectBehavior: msg.NatHoleDetectBehavior{
  310. Mode: mode,
  311. Role: cBehavior.Role,
  312. TTL: cBehavior.TTL,
  313. SendDelayMs: cBehavior.SendDelayMs,
  314. ReadTimeoutMs: timeoutMs - cBehavior.SendDelayMs,
  315. SendRandomPorts: cBehavior.PortsRandomNumber,
  316. ListenRandomPorts: cBehavior.ListenRandomPorts,
  317. CandidatePorts: getRangePorts(vm.MappedAddrs, vNatFeature.PortsDifference, cBehavior.PortsRangeNumber),
  318. },
  319. }
  320. log.Debug("sid [%s] visitor nat: %+v, candidateAddrs: %v; client nat: %+v, candidateAddrs: %v, protocol: %s",
  321. session.sid, *vNatFeature, vm.MappedAddrs, *cNatFeature, cm.MappedAddrs, protocol)
  322. log.Debug("sid [%s] visitor detect behavior: %+v", session.sid, vResp.DetectBehavior)
  323. log.Debug("sid [%s] client detect behavior: %+v", session.sid, cResp.DetectBehavior)
  324. return vResp, cResp, nil
  325. }
  326. func getRangePorts(addrs []string, difference, maxNumber int) []msg.PortsRange {
  327. if maxNumber <= 0 {
  328. return nil
  329. }
  330. addr, err := lo.Last(addrs)
  331. if err != nil {
  332. return nil
  333. }
  334. var ports []msg.PortsRange
  335. _, portStr, err := net.SplitHostPort(addr)
  336. if err != nil {
  337. return nil
  338. }
  339. port, err := strconv.Atoi(portStr)
  340. if err != nil {
  341. return nil
  342. }
  343. ports = append(ports, msg.PortsRange{
  344. From: lo.Max([]int{port - difference - 5, port - maxNumber, 1}),
  345. To: lo.Min([]int{port + difference + 5, port + maxNumber, 65535}),
  346. })
  347. return ports
  348. }