Skip to content
Snippets Groups Projects
openvpn.go 12.7 KiB
Newer Older
  • Learn to ignore specific revisions
  • // Copyright (C) 2018-2021 LEAP
    
    meskio's avatar
    meskio committed
    //
    // This program is free software: you can redistribute it and/or modify
    // it under the terms of the GNU General Public License as published by
    // the Free Software Foundation, either version 3 of the License, or
    // (at your option) any later version.
    //
    // This program is distributed in the hope that it will be useful,
    // but WITHOUT ANY WARRANTY; without even the implied warranty of
    // MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
    // GNU General Public License for more details.
    //
    // You should have received a copy of the GNU General Public License
    // along with this program.  If not, see <http://www.gnu.org/licenses/>.
    
    
    package vpn
    
    meskio's avatar
    meskio committed
    import (
    
    	"crypto/rand"
    	"encoding/base64"
    
    Kali Kaneko's avatar
    Kali Kaneko committed
    	"errors"
    
    meskio's avatar
    meskio committed
    	"fmt"
    
    meskio's avatar
    meskio committed
    	"io/ioutil"
    
    meskio's avatar
    meskio committed
    	"log"
    
    meskio's avatar
    meskio committed
    	"os"
    
    meskio's avatar
    meskio committed
    	"strconv"
    	"strings"
    
    
    	"0xacab.org/leap/bitmask-vpn/pkg/config"
    
    	"0xacab.org/leap/bitmask-vpn/pkg/vpn/bonafide"
    
    Kali Kaneko's avatar
    Kali Kaneko committed
    	obfsvpn "0xacab.org/leap/obfsvpn/client"
    
    const (
    	openvpnManagementAddr = "127.0.0.1"
    	openvpnManagementPort = "6061"
    )
    
    
    // StartVPN for provider
    func (b *Bitmask) StartVPN(provider string) error {
    
    Kali Kaneko's avatar
    Kali Kaneko committed
    	if !b.CanStartVPN() {
    
    		log.Println("BUG cannot start")
    
    Kali Kaneko's avatar
    Kali Kaneko committed
    		return errors.New("BUG: cannot start vpn")
    	}
    
    
    	var err error
    	b.certPemPath, err = b.getCert()
    	if err != nil {
    		return err
    	}
    	b.openvpnArgs, err = b.bonafide.GetOpenvpnArgs()
    	if err != nil {
    		return err
    	}
    
    	return b.startOpenVPN()
    
    Kali Kaneko's avatar
    Kali Kaneko committed
    func (b *Bitmask) CanStartVPN() bool {
    
    kali's avatar
    kali committed
    	/* FIXME this is not enough. We should check, if provider needs
    	* credentials, if we have a valid token, otherwise remove it and
    	make sure that we're asking for the credentials input */
    
    	return !b.bonafide.NeedsCredentials()
    
    func (b *Bitmask) startTransportForPrivateBridge(gw bonafide.Gateway) (proxy string, err error) {
    	proxyAddr := "127.0.0.1:8080"
    	kcpMode := false
    	if os.Getenv("LEAP_KCP") == "1" {
    		kcpMode = true
    	}
    	b.obfsvpnProxy = obfsvpn.NewClient(kcpMode, proxyAddr, gw.Options["cert"])
    	go func() {
    		_, err = b.obfsvpnProxy.Start()
    		if err != nil {
    			log.Printf("Can't connect to transport %s: %v", b.transport, err)
    		}
    		log.Println("Connected via obfs4 to", gw.IPAddress, "(", gw.Host, ")")
    	}()
    
    	return proxyAddr, nil
    }
    
    
    func (b *Bitmask) startTransport(host string) (proxy string, err error) {
    
    Kali Kaneko's avatar
    Kali Kaneko committed
    	// TODO configure socks port if not available
    	// TODO get port from UI/config file
    	proxyAddr := "127.0.0.1:8080"
    
    	if b.obfsvpnProxy != nil {
    		return proxyAddr, nil
    
    meskio's avatar
    meskio committed
    	}
    
    	gateways, err := b.bonafide.GetGateways(b.transport)
    
    meskio's avatar
    meskio committed
    	if err != nil {
    
    meskio's avatar
    meskio committed
    		return "", err
    	}
    	if len(gateways) == 0 {
    		log.Printf("No gateway for transport %s in provider", b.transport)
    		return "", nil
    	}
    
    	for _, gw := range gateways {
    
    		if gw.Host != host {
    			continue
    		}
    
    meskio's avatar
    meskio committed
    		if _, ok := gw.Options["cert"]; !ok {
    			continue
    		}
    
    		log.Println("Selected Gateway:", gw.Host, gw.IPAddress)
    
    Kali Kaneko's avatar
    Kali Kaneko committed
    
    		kcpMode := false
    		if os.Getenv("LEAP_KCP") == "1" {
    			kcpMode = true
    
    meskio's avatar
    meskio committed
    		}
    
    Kali Kaneko's avatar
    Kali Kaneko committed
    
    		log.Println("connecting with cert:", gw.Options["cert"])
    
    		b.obfsvpnProxy = obfsvpn.NewClient(kcpMode, proxyAddr, gw.Options["cert"])
    		go func() {
    			_, err = b.obfsvpnProxy.Start()
    
    meskio's avatar
    meskio committed
    			if err != nil {
    
    Kali Kaneko's avatar
    Kali Kaneko committed
    				log.Printf("Can't connect to transport %s: %v", b.transport, err)
    
    meskio's avatar
    meskio committed
    			}
    
    Kali Kaneko's avatar
    Kali Kaneko committed
    			log.Println("Connected via obfs4 to", gw.IPAddress, "(", gw.Host, ")")
    		}()
    
    Kali Kaneko's avatar
    Kali Kaneko committed
    		return proxyAddr, nil
    
    Kali Kaneko's avatar
    Kali Kaneko committed
    	return "", fmt.Errorf("No working gateway for transport %s: %v", b.transport, err)
    
    func maybeGetPrivateGateway() (bonafide.Gateway, bool) {
    	gw := bonafide.Gateway{}
    	privateBridge := os.Getenv("LEAP_PRIVATE_BRIDGE")
    	if privateBridge == "" {
    		return gw, false
    	}
    	obfs4Cert := os.Getenv("LEAP_PRIVATE_BRIDGE_CERT")
    	if privateBridge == "" {
    		return gw, false
    	}
    	bridgeArgs := strings.Split(privateBridge, ":")
    	gw.Host = bridgeArgs[0]
    	gw.Ports = []string{bridgeArgs[1]}
    	opt := make(map[string]string)
    	opt["cert"] = obfs4Cert
    	gw.Options = opt
    	return gw, true
    }
    
    
    // generates a password and returns the path for a temporary file where this password is written
    func (b *Bitmask) generateManagementPassword() string {
    	pass := getRandomPass(12)
    	tmpFile, err := ioutil.TempFile(b.tempdir, "leap-vpn-")
    	if err != nil {
    		log.Fatal("Cannot create temporary file", err)
    	}
    	tmpFile.Write([]byte(pass))
    	b.launch.mngPass = pass
    	return tmpFile.Name()
    }
    
    
    func (b *Bitmask) startOpenVPN() error {
    
    	arg := b.openvpnArgs
    
    	/*
    		XXX has this changed??
    		 arg, err := b.bonafide.GetOpenvpnArgs()
    		 if err != nil {
    		 	return err
    		 }
    	*/
    	/*
    		XXX and this??
    		 certPemPath, err := b.getCert()
    		 if err != nil {
    		 	return err
    		 }
    	*/
    
    	b.statusCh <- Starting
    
    	if b.GetTransport() == "obfs4" {
    
    		var gw bonafide.Gateway
    		var gateways []bonafide.Gateway
    		var proxy string
    
    		gw, gotPrivate := maybeGetPrivateGateway()
    		if gotPrivate {
    			var err error
    			log.Println("Got a private bridge:", gw.Host, gw.Options)
    			gateways = []bonafide.Gateway{gw}
    			proxy, err = b.startTransportForPrivateBridge(gw)
    			if err != nil {
    				// TODO this is not going to return the error since it blocks
    				// we need to get an error channel from obfsvpn.
    				return err
    			}
    		} else {
    			// get a gateway from bonafide looking at the services announced in eip-service
    
    			log.Println("Getting a gateway with obfs4 transport...")
    
    Kali Kaneko's avatar
    Kali Kaneko committed
    
    
    			gateways, err := b.bonafide.GetGateways("obfs4")
    			if err != nil {
    				return err
    			}
    			if len(gateways) == 0 {
    				log.Printf("ERROR No gateway for transport %s in provider", b.transport)
    				return errors.New("ERROR: cannot find any gateway for selected transport")
    			}
    
    			gw = gateways[0]
    			b.ptGateway = gw
    
    			proxy, err = b.startTransport(gw.Host)
    			if err != nil {
    				// TODO this is not going to return the error since it blocks
    				// we need to get an error channel from obfsvpn.
    				return err
    			}
    
    meskio's avatar
    meskio committed
    		}
    
    		err := b.launch.firewallStart(gateways)
    
    meskio's avatar
    meskio committed
    		if err != nil {
    			return err
    		}
    
    		proxyArgs := strings.Split(proxy, ":")
    
    Kali Kaneko's avatar
    Kali Kaneko committed
    		arg = append(arg, "--socks-proxy", proxyArgs[0], proxyArgs[1])
    		arg = append(arg, "--remote", gw.IPAddress, gw.Ports[0], "tcp4")
    
    		arg = append(arg, "--route", gw.IPAddress, "255.255.255.255", "net_gateway")
    
    	} else {
    
    		log.Println("args passed to bitmask-root:", arg)
    
    		gateways, err := b.bonafide.GetGateways("openvpn")
    		if err != nil {
    			return err
    		}
    
    Kali Kaneko's avatar
    Kali Kaneko committed
    		if b.udp {
    			os.Setenv("UDP", "1")
    		} else {
    			os.Setenv("UDP", "0")
    		}
    
    		err = b.launch.firewallStart(gateways)
    		if err != nil {
    			return err
    		}
    
    		for _, gw := range gateways {
    			for _, port := range gw.Ports {
    
    				if port != "53" {
    
    					if b.udp {
    
    						arg = append(arg, "--remote", gw.IPAddress, port, "udp4")
    					} else {
    						arg = append(arg, "--remote", gw.IPAddress, port, "tcp4")
    					}
    
    	openvpnVerb := os.Getenv("OPENVPN_VERBOSITY")
    	verb, err := strconv.Atoi(openvpnVerb)
    	if err != nil || verb > 6 || verb < 3 {
    		openvpnVerb = "3"
    	}
    
    Kali Kaneko's avatar
    Kali Kaneko committed
    	// TODO we need to check if the openvpn options pushed by server are
    	// not overriding (or duplicating) some of the options we're adding here.
    	log.Println("VERB", verb)
    
    
    	passFile := b.generateManagementPassword()
    
    
    	arg = append(arg,
    
    		"--verb", openvpnVerb,
    
    		"--management-client",
    
    		"--management", openvpnManagementAddr, openvpnManagementPort, passFile,
    
    		"--ca", b.getTempCaCertPath(),
    
    		"--cert", b.certPemPath,
    
    Kali Kaneko's avatar
    Kali Kaneko committed
    		"--key", b.certPemPath,
    
    Kali Kaneko's avatar
    Kali Kaneko committed
    		"--persist-tun") // needed for reconnects
    	//		"--float")
    
    	if verb > 3 {
    
    Kali Kaneko's avatar
    Kali Kaneko committed
    		arg = append(
    			arg,
    			"--log", "/tmp/leap-vpn.log")
    	}
    	if os.Getenv("LEAP_DRYRUN") == "1" {
    		arg = append(
    			arg,
    			"--pull-filter", "ignore", "route")
    
    	return b.launch.openvpnStart(arg...)
    
    meskio's avatar
    meskio committed
    func (b *Bitmask) getCert() (certPath string, err error) {
    
    	log.Println("Getting certificate...")
    
    	failed := false
    
    	persistentCertFile := filepath.Join(config.Path, strings.ToLower(config.Provider)+".pem")
    	if _, err := os.Stat(persistentCertFile); !os.IsNotExist(err) && isValidCert(persistentCertFile) {
    
    		// TODO snowflake might have written a cert here
    
    		// reuse cert. for the moment we're not writing one there, this is
    		// only to allow users to get certs off-band and place them there
    		// as a last-resort fallback for circumvention.
    		certPath = persistentCertFile
    		err = nil
    	} else {
    		// download one fresh
    		certPath = b.getTempCertPemPath()
    		if _, err := os.Stat(certPath); os.IsNotExist(err) {
    			log.Println("Fetching certificate to", certPath)
    			cert, err := b.bonafide.GetPemCertificate()
    			if err != nil {
    
    				log.Println(err)
    				failed = true
    
    			}
    			err = ioutil.WriteFile(certPath, cert, 0600)
    
    			if err != nil {
    				failed = true
    			}
    		}
    	}
    	if failed || !isValidCert(certPath) {
    
    		d := config.APIURL[8 : len(config.APIURL)-1]
    		logDnsLookup(d)
    
    		cert, err := b.bonafide.GetPemCertificateNoDNS()
    		if cert != nil {
    			log.Println("Successfully did certificate bypass")
    			err = nil
    		} else {
    			err = errors.New("Cannot get vpn certificate")
    		}
    		err = ioutil.WriteFile(certPath, cert, 0600)
    		if err != nil {
    			failed = true
    
    meskio's avatar
    meskio committed
    	return certPath, err
    }
    
    
    // Explicit call to GetGateways, to be able to fetch them all before starting the vpn
    func (b *Bitmask) fetchGateways() {
    	log.Println("Fetching gateways...")
    	_, err := b.bonafide.GetAllGateways(b.transport)
    	if err != nil {
    		log.Println("ERROR Cannot fetch gateways")
    	}
    }
    
    
    // StopVPN or cancel
    func (b *Bitmask) StopVPN() error {
    
    	err := b.launch.firewallStop()
    
    	if err != nil {
    		return err
    	}
    
    Kali Kaneko's avatar
    Kali Kaneko committed
    	if b.obfsvpnProxy != nil {
    		b.obfsvpnProxy.Stop()
    		b.obfsvpnProxy = nil
    
    meskio's avatar
    meskio committed
    	}
    
    	b.tryStopFromManagement()
    
    	b.launch.openvpnStop()
    	return nil
    }
    
    
    func (b *Bitmask) tryStopFromManagement() {
    	if b.managementClient != nil {
    		b.managementClient.SendSignal("SIGTERM")
    
    // Reconnect to the VPN
    func (b *Bitmask) Reconnect() error {
    	if !b.CanStartVPN() {
    		return errors.New("BUG: cannot start vpn")
    	}
    
    	status, err := b.GetStatus()
    	if err != nil {
    		return err
    	}
    
    	log.Println("DEBUG Reconnecting")
    
    	if status != Off {
    
    		b.statusCh <- Stopping
    
    Kali Kaneko's avatar
    Kali Kaneko committed
    		if b.obfsvpnProxy != nil {
    			b.obfsvpnProxy.Stop()
    			b.obfsvpnProxy = nil
    
    		}
    		err = b.launch.openvpnStop()
    		if err != nil {
    			return err
    		}
    	}
    
    	err = b.launch.firewallStop()
    
    	// FIXME - there's a window in which we might leak traffic here!
    
    	if err != nil {
    		return err
    	}
    	return b.startOpenVPN()
    }
    
    
    // ReloadFirewall restarts the firewall
    func (b *Bitmask) ReloadFirewall() error {
    	err := b.launch.firewallStop()
    	if err != nil {
    		return err
    	}
    
    	status, err := b.GetStatus()
    	if err != nil {
    		return err
    	}
    
    	if status != Off {
    
    		gateways, err := b.bonafide.GetAllGateways("any")
    
    		if err != nil {
    			return err
    		}
    		return b.launch.firewallStart(gateways)
    	}
    	return nil
    }
    
    
    // GetStatus returns the VPN status
    func (b *Bitmask) GetStatus() (string, error) {
    
    	status := Off
    	if b.isFailed() {
    		status = Failed
    	} else {
    		status, err := b.getOpenvpnState()
    		if err != nil {
    			status = Off
    		}
    		if status == Off && b.launch.firewallIsUp() {
    			return Failed, nil
    		}
    
    	return status, nil
    
    meskio's avatar
    meskio committed
    func (b *Bitmask) InstallHelpers() error {
    
    	// TODO use pickle module from here
    
    	return nil
    
    meskio's avatar
    meskio committed
    }
    
    // VPNCheck returns if the helpers are installed and up to date and if polkit is running
    
    func (b *Bitmask) VPNCheck() (helpers bool, privilege bool, err error) {
    
    	return b.launch.check()
    
    func (b *Bitmask) ListLocationFullness(transport string) map[string]float64 {
    	return b.bonafide.ListLocationFullness(transport)
    
    func (b *Bitmask) ListLocationLabels(transport string) map[string][]string {
    	return b.bonafide.ListLocationLabels(transport)
    }
    
    
    // UseGateway selects a gateway, by label, as the default gateway
    
    func (b *Bitmask) UseGateway(label string) {
    
    	b.bonafide.SetManualGateway(label)
    
    // UseAutomaticGateway sets the gateway to be selected automatically
    // best gateway will be used
    func (b *Bitmask) UseAutomaticGateway() {
    	b.bonafide.SetAutomaticGateway()
    }
    
    
    // SetTransport selects an obfuscation transport to use
    func (b *Bitmask) SetTransport(t string) error {
    	if t != "openvpn" && t != "obfs4" {
    		return fmt.Errorf("Transport %s not implemented", t)
    	}
    	log.Println("Setting transport to", t)
    	// compare and set string looks strange, but if assigning directly
    	// we're getting some kind of corruption with the transport string.
    	// I suspect something's
    	// not quite right with the c<->go char pointers handling.
    	if t == "obfs4" {
    		b.transport = "obfs4"
    	} else if t == "openvpn" {
    		b.transport = "openvpn"
    
    meskio's avatar
    meskio committed
    	}
    	return nil
    }
    
    
    // GetTransport gets the obfuscation transport to use. Only obfs4 available for now.
    
    func (b *Bitmask) GetTransport() string {
    	if b.transport == "obfs4" {
    		return "obfs4"
    	} else {
    		return "openvpn"
    	}
    }
    
    
    func (b *Bitmask) getTempCertPemPath() string {
    
    	return path.Join(b.tempdir, "openvpn.pem")
    }
    
    
    func (b *Bitmask) getTempCaCertPath() string {
    
    	return path.Join(b.tempdir, "cacert.pem")
    
    meskio's avatar
    meskio committed
    }
    
    
    func getRandomPass(l int) string {
    	buff := make([]byte, int(math.Round(float64(l)/float64(1.33333333333))))
    	rand.Read(buff)
    	str := base64.RawURLEncoding.EncodeToString(buff)
    	return str[:l] // strip 1 extra character we get from odd length results
    }