1*4882a593Smuzhiyun // SPDX-License-Identifier: GPL-2.0
2*4882a593Smuzhiyun /*
3*4882a593Smuzhiyun * Copyright (C) 2015-2019 Jason A. Donenfeld <Jason@zx2c4.com>. All Rights Reserved.
4*4882a593Smuzhiyun */
5*4882a593Smuzhiyun
6*4882a593Smuzhiyun #include "timers.h"
7*4882a593Smuzhiyun #include "device.h"
8*4882a593Smuzhiyun #include "peer.h"
9*4882a593Smuzhiyun #include "queueing.h"
10*4882a593Smuzhiyun #include "socket.h"
11*4882a593Smuzhiyun
12*4882a593Smuzhiyun /*
13*4882a593Smuzhiyun * - Timer for retransmitting the handshake if we don't hear back after
14*4882a593Smuzhiyun * `REKEY_TIMEOUT + jitter` ms.
15*4882a593Smuzhiyun *
16*4882a593Smuzhiyun * - Timer for sending empty packet if we have received a packet but after have
17*4882a593Smuzhiyun * not sent one for `KEEPALIVE_TIMEOUT` ms.
18*4882a593Smuzhiyun *
19*4882a593Smuzhiyun * - Timer for initiating new handshake if we have sent a packet but after have
20*4882a593Smuzhiyun * not received one (even empty) for `(KEEPALIVE_TIMEOUT + REKEY_TIMEOUT) +
21*4882a593Smuzhiyun * jitter` ms.
22*4882a593Smuzhiyun *
23*4882a593Smuzhiyun * - Timer for zeroing out all ephemeral keys after `(REJECT_AFTER_TIME * 3)` ms
24*4882a593Smuzhiyun * if no new keys have been received.
25*4882a593Smuzhiyun *
26*4882a593Smuzhiyun * - Timer for, if enabled, sending an empty authenticated packet every user-
27*4882a593Smuzhiyun * specified seconds.
28*4882a593Smuzhiyun */
29*4882a593Smuzhiyun
mod_peer_timer(struct wg_peer * peer,struct timer_list * timer,unsigned long expires)30*4882a593Smuzhiyun static inline void mod_peer_timer(struct wg_peer *peer,
31*4882a593Smuzhiyun struct timer_list *timer,
32*4882a593Smuzhiyun unsigned long expires)
33*4882a593Smuzhiyun {
34*4882a593Smuzhiyun rcu_read_lock_bh();
35*4882a593Smuzhiyun if (likely(netif_running(peer->device->dev) &&
36*4882a593Smuzhiyun !READ_ONCE(peer->is_dead)))
37*4882a593Smuzhiyun mod_timer(timer, expires);
38*4882a593Smuzhiyun rcu_read_unlock_bh();
39*4882a593Smuzhiyun }
40*4882a593Smuzhiyun
wg_expired_retransmit_handshake(struct timer_list * timer)41*4882a593Smuzhiyun static void wg_expired_retransmit_handshake(struct timer_list *timer)
42*4882a593Smuzhiyun {
43*4882a593Smuzhiyun struct wg_peer *peer = from_timer(peer, timer,
44*4882a593Smuzhiyun timer_retransmit_handshake);
45*4882a593Smuzhiyun
46*4882a593Smuzhiyun if (peer->timer_handshake_attempts > MAX_TIMER_HANDSHAKES) {
47*4882a593Smuzhiyun pr_debug("%s: Handshake for peer %llu (%pISpfsc) did not complete after %d attempts, giving up\n",
48*4882a593Smuzhiyun peer->device->dev->name, peer->internal_id,
49*4882a593Smuzhiyun &peer->endpoint.addr, MAX_TIMER_HANDSHAKES + 2);
50*4882a593Smuzhiyun
51*4882a593Smuzhiyun del_timer(&peer->timer_send_keepalive);
52*4882a593Smuzhiyun /* We drop all packets without a keypair and don't try again,
53*4882a593Smuzhiyun * if we try unsuccessfully for too long to make a handshake.
54*4882a593Smuzhiyun */
55*4882a593Smuzhiyun wg_packet_purge_staged_packets(peer);
56*4882a593Smuzhiyun
57*4882a593Smuzhiyun /* We set a timer for destroying any residue that might be left
58*4882a593Smuzhiyun * of a partial exchange.
59*4882a593Smuzhiyun */
60*4882a593Smuzhiyun if (!timer_pending(&peer->timer_zero_key_material))
61*4882a593Smuzhiyun mod_peer_timer(peer, &peer->timer_zero_key_material,
62*4882a593Smuzhiyun jiffies + REJECT_AFTER_TIME * 3 * HZ);
63*4882a593Smuzhiyun } else {
64*4882a593Smuzhiyun ++peer->timer_handshake_attempts;
65*4882a593Smuzhiyun pr_debug("%s: Handshake for peer %llu (%pISpfsc) did not complete after %d seconds, retrying (try %d)\n",
66*4882a593Smuzhiyun peer->device->dev->name, peer->internal_id,
67*4882a593Smuzhiyun &peer->endpoint.addr, REKEY_TIMEOUT,
68*4882a593Smuzhiyun peer->timer_handshake_attempts + 1);
69*4882a593Smuzhiyun
70*4882a593Smuzhiyun /* We clear the endpoint address src address, in case this is
71*4882a593Smuzhiyun * the cause of trouble.
72*4882a593Smuzhiyun */
73*4882a593Smuzhiyun wg_socket_clear_peer_endpoint_src(peer);
74*4882a593Smuzhiyun
75*4882a593Smuzhiyun wg_packet_send_queued_handshake_initiation(peer, true);
76*4882a593Smuzhiyun }
77*4882a593Smuzhiyun }
78*4882a593Smuzhiyun
wg_expired_send_keepalive(struct timer_list * timer)79*4882a593Smuzhiyun static void wg_expired_send_keepalive(struct timer_list *timer)
80*4882a593Smuzhiyun {
81*4882a593Smuzhiyun struct wg_peer *peer = from_timer(peer, timer, timer_send_keepalive);
82*4882a593Smuzhiyun
83*4882a593Smuzhiyun wg_packet_send_keepalive(peer);
84*4882a593Smuzhiyun if (peer->timer_need_another_keepalive) {
85*4882a593Smuzhiyun peer->timer_need_another_keepalive = false;
86*4882a593Smuzhiyun mod_peer_timer(peer, &peer->timer_send_keepalive,
87*4882a593Smuzhiyun jiffies + KEEPALIVE_TIMEOUT * HZ);
88*4882a593Smuzhiyun }
89*4882a593Smuzhiyun }
90*4882a593Smuzhiyun
wg_expired_new_handshake(struct timer_list * timer)91*4882a593Smuzhiyun static void wg_expired_new_handshake(struct timer_list *timer)
92*4882a593Smuzhiyun {
93*4882a593Smuzhiyun struct wg_peer *peer = from_timer(peer, timer, timer_new_handshake);
94*4882a593Smuzhiyun
95*4882a593Smuzhiyun pr_debug("%s: Retrying handshake with peer %llu (%pISpfsc) because we stopped hearing back after %d seconds\n",
96*4882a593Smuzhiyun peer->device->dev->name, peer->internal_id,
97*4882a593Smuzhiyun &peer->endpoint.addr, KEEPALIVE_TIMEOUT + REKEY_TIMEOUT);
98*4882a593Smuzhiyun /* We clear the endpoint address src address, in case this is the cause
99*4882a593Smuzhiyun * of trouble.
100*4882a593Smuzhiyun */
101*4882a593Smuzhiyun wg_socket_clear_peer_endpoint_src(peer);
102*4882a593Smuzhiyun wg_packet_send_queued_handshake_initiation(peer, false);
103*4882a593Smuzhiyun }
104*4882a593Smuzhiyun
wg_expired_zero_key_material(struct timer_list * timer)105*4882a593Smuzhiyun static void wg_expired_zero_key_material(struct timer_list *timer)
106*4882a593Smuzhiyun {
107*4882a593Smuzhiyun struct wg_peer *peer = from_timer(peer, timer, timer_zero_key_material);
108*4882a593Smuzhiyun
109*4882a593Smuzhiyun rcu_read_lock_bh();
110*4882a593Smuzhiyun if (!READ_ONCE(peer->is_dead)) {
111*4882a593Smuzhiyun wg_peer_get(peer);
112*4882a593Smuzhiyun if (!queue_work(peer->device->handshake_send_wq,
113*4882a593Smuzhiyun &peer->clear_peer_work))
114*4882a593Smuzhiyun /* If the work was already on the queue, we want to drop
115*4882a593Smuzhiyun * the extra reference.
116*4882a593Smuzhiyun */
117*4882a593Smuzhiyun wg_peer_put(peer);
118*4882a593Smuzhiyun }
119*4882a593Smuzhiyun rcu_read_unlock_bh();
120*4882a593Smuzhiyun }
121*4882a593Smuzhiyun
wg_queued_expired_zero_key_material(struct work_struct * work)122*4882a593Smuzhiyun static void wg_queued_expired_zero_key_material(struct work_struct *work)
123*4882a593Smuzhiyun {
124*4882a593Smuzhiyun struct wg_peer *peer = container_of(work, struct wg_peer,
125*4882a593Smuzhiyun clear_peer_work);
126*4882a593Smuzhiyun
127*4882a593Smuzhiyun pr_debug("%s: Zeroing out all keys for peer %llu (%pISpfsc), since we haven't received a new one in %d seconds\n",
128*4882a593Smuzhiyun peer->device->dev->name, peer->internal_id,
129*4882a593Smuzhiyun &peer->endpoint.addr, REJECT_AFTER_TIME * 3);
130*4882a593Smuzhiyun wg_noise_handshake_clear(&peer->handshake);
131*4882a593Smuzhiyun wg_noise_keypairs_clear(&peer->keypairs);
132*4882a593Smuzhiyun wg_peer_put(peer);
133*4882a593Smuzhiyun }
134*4882a593Smuzhiyun
wg_expired_send_persistent_keepalive(struct timer_list * timer)135*4882a593Smuzhiyun static void wg_expired_send_persistent_keepalive(struct timer_list *timer)
136*4882a593Smuzhiyun {
137*4882a593Smuzhiyun struct wg_peer *peer = from_timer(peer, timer,
138*4882a593Smuzhiyun timer_persistent_keepalive);
139*4882a593Smuzhiyun
140*4882a593Smuzhiyun if (likely(peer->persistent_keepalive_interval))
141*4882a593Smuzhiyun wg_packet_send_keepalive(peer);
142*4882a593Smuzhiyun }
143*4882a593Smuzhiyun
144*4882a593Smuzhiyun /* Should be called after an authenticated data packet is sent. */
wg_timers_data_sent(struct wg_peer * peer)145*4882a593Smuzhiyun void wg_timers_data_sent(struct wg_peer *peer)
146*4882a593Smuzhiyun {
147*4882a593Smuzhiyun if (!timer_pending(&peer->timer_new_handshake))
148*4882a593Smuzhiyun mod_peer_timer(peer, &peer->timer_new_handshake,
149*4882a593Smuzhiyun jiffies + (KEEPALIVE_TIMEOUT + REKEY_TIMEOUT) * HZ +
150*4882a593Smuzhiyun prandom_u32_max(REKEY_TIMEOUT_JITTER_MAX_JIFFIES));
151*4882a593Smuzhiyun }
152*4882a593Smuzhiyun
153*4882a593Smuzhiyun /* Should be called after an authenticated data packet is received. */
wg_timers_data_received(struct wg_peer * peer)154*4882a593Smuzhiyun void wg_timers_data_received(struct wg_peer *peer)
155*4882a593Smuzhiyun {
156*4882a593Smuzhiyun if (likely(netif_running(peer->device->dev))) {
157*4882a593Smuzhiyun if (!timer_pending(&peer->timer_send_keepalive))
158*4882a593Smuzhiyun mod_peer_timer(peer, &peer->timer_send_keepalive,
159*4882a593Smuzhiyun jiffies + KEEPALIVE_TIMEOUT * HZ);
160*4882a593Smuzhiyun else
161*4882a593Smuzhiyun peer->timer_need_another_keepalive = true;
162*4882a593Smuzhiyun }
163*4882a593Smuzhiyun }
164*4882a593Smuzhiyun
165*4882a593Smuzhiyun /* Should be called after any type of authenticated packet is sent, whether
166*4882a593Smuzhiyun * keepalive, data, or handshake.
167*4882a593Smuzhiyun */
wg_timers_any_authenticated_packet_sent(struct wg_peer * peer)168*4882a593Smuzhiyun void wg_timers_any_authenticated_packet_sent(struct wg_peer *peer)
169*4882a593Smuzhiyun {
170*4882a593Smuzhiyun del_timer(&peer->timer_send_keepalive);
171*4882a593Smuzhiyun }
172*4882a593Smuzhiyun
173*4882a593Smuzhiyun /* Should be called after any type of authenticated packet is received, whether
174*4882a593Smuzhiyun * keepalive, data, or handshake.
175*4882a593Smuzhiyun */
wg_timers_any_authenticated_packet_received(struct wg_peer * peer)176*4882a593Smuzhiyun void wg_timers_any_authenticated_packet_received(struct wg_peer *peer)
177*4882a593Smuzhiyun {
178*4882a593Smuzhiyun del_timer(&peer->timer_new_handshake);
179*4882a593Smuzhiyun }
180*4882a593Smuzhiyun
181*4882a593Smuzhiyun /* Should be called after a handshake initiation message is sent. */
wg_timers_handshake_initiated(struct wg_peer * peer)182*4882a593Smuzhiyun void wg_timers_handshake_initiated(struct wg_peer *peer)
183*4882a593Smuzhiyun {
184*4882a593Smuzhiyun mod_peer_timer(peer, &peer->timer_retransmit_handshake,
185*4882a593Smuzhiyun jiffies + REKEY_TIMEOUT * HZ +
186*4882a593Smuzhiyun prandom_u32_max(REKEY_TIMEOUT_JITTER_MAX_JIFFIES));
187*4882a593Smuzhiyun }
188*4882a593Smuzhiyun
189*4882a593Smuzhiyun /* Should be called after a handshake response message is received and processed
190*4882a593Smuzhiyun * or when getting key confirmation via the first data message.
191*4882a593Smuzhiyun */
wg_timers_handshake_complete(struct wg_peer * peer)192*4882a593Smuzhiyun void wg_timers_handshake_complete(struct wg_peer *peer)
193*4882a593Smuzhiyun {
194*4882a593Smuzhiyun del_timer(&peer->timer_retransmit_handshake);
195*4882a593Smuzhiyun peer->timer_handshake_attempts = 0;
196*4882a593Smuzhiyun peer->sent_lastminute_handshake = false;
197*4882a593Smuzhiyun ktime_get_real_ts64(&peer->walltime_last_handshake);
198*4882a593Smuzhiyun }
199*4882a593Smuzhiyun
200*4882a593Smuzhiyun /* Should be called after an ephemeral key is created, which is before sending a
201*4882a593Smuzhiyun * handshake response or after receiving a handshake response.
202*4882a593Smuzhiyun */
wg_timers_session_derived(struct wg_peer * peer)203*4882a593Smuzhiyun void wg_timers_session_derived(struct wg_peer *peer)
204*4882a593Smuzhiyun {
205*4882a593Smuzhiyun mod_peer_timer(peer, &peer->timer_zero_key_material,
206*4882a593Smuzhiyun jiffies + REJECT_AFTER_TIME * 3 * HZ);
207*4882a593Smuzhiyun }
208*4882a593Smuzhiyun
209*4882a593Smuzhiyun /* Should be called before a packet with authentication, whether
210*4882a593Smuzhiyun * keepalive, data, or handshakem is sent, or after one is received.
211*4882a593Smuzhiyun */
wg_timers_any_authenticated_packet_traversal(struct wg_peer * peer)212*4882a593Smuzhiyun void wg_timers_any_authenticated_packet_traversal(struct wg_peer *peer)
213*4882a593Smuzhiyun {
214*4882a593Smuzhiyun if (peer->persistent_keepalive_interval)
215*4882a593Smuzhiyun mod_peer_timer(peer, &peer->timer_persistent_keepalive,
216*4882a593Smuzhiyun jiffies + peer->persistent_keepalive_interval * HZ);
217*4882a593Smuzhiyun }
218*4882a593Smuzhiyun
wg_timers_init(struct wg_peer * peer)219*4882a593Smuzhiyun void wg_timers_init(struct wg_peer *peer)
220*4882a593Smuzhiyun {
221*4882a593Smuzhiyun timer_setup(&peer->timer_retransmit_handshake,
222*4882a593Smuzhiyun wg_expired_retransmit_handshake, 0);
223*4882a593Smuzhiyun timer_setup(&peer->timer_send_keepalive, wg_expired_send_keepalive, 0);
224*4882a593Smuzhiyun timer_setup(&peer->timer_new_handshake, wg_expired_new_handshake, 0);
225*4882a593Smuzhiyun timer_setup(&peer->timer_zero_key_material,
226*4882a593Smuzhiyun wg_expired_zero_key_material, 0);
227*4882a593Smuzhiyun timer_setup(&peer->timer_persistent_keepalive,
228*4882a593Smuzhiyun wg_expired_send_persistent_keepalive, 0);
229*4882a593Smuzhiyun INIT_WORK(&peer->clear_peer_work, wg_queued_expired_zero_key_material);
230*4882a593Smuzhiyun peer->timer_handshake_attempts = 0;
231*4882a593Smuzhiyun peer->sent_lastminute_handshake = false;
232*4882a593Smuzhiyun peer->timer_need_another_keepalive = false;
233*4882a593Smuzhiyun }
234*4882a593Smuzhiyun
wg_timers_stop(struct wg_peer * peer)235*4882a593Smuzhiyun void wg_timers_stop(struct wg_peer *peer)
236*4882a593Smuzhiyun {
237*4882a593Smuzhiyun del_timer_sync(&peer->timer_retransmit_handshake);
238*4882a593Smuzhiyun del_timer_sync(&peer->timer_send_keepalive);
239*4882a593Smuzhiyun del_timer_sync(&peer->timer_new_handshake);
240*4882a593Smuzhiyun del_timer_sync(&peer->timer_zero_key_material);
241*4882a593Smuzhiyun del_timer_sync(&peer->timer_persistent_keepalive);
242*4882a593Smuzhiyun flush_work(&peer->clear_peer_work);
243*4882a593Smuzhiyun }
244