1e7096c13SJason A. Donenfeld // SPDX-License-Identifier: GPL-2.0
2e7096c13SJason A. Donenfeld /*
3e7096c13SJason A. Donenfeld * Copyright (C) 2015-2019 Jason A. Donenfeld <Jason@zx2c4.com>. All Rights Reserved.
4e7096c13SJason A. Donenfeld */
5e7096c13SJason A. Donenfeld
6e7096c13SJason A. Donenfeld #include "timers.h"
7e7096c13SJason A. Donenfeld #include "device.h"
8e7096c13SJason A. Donenfeld #include "peer.h"
9e7096c13SJason A. Donenfeld #include "queueing.h"
10e7096c13SJason A. Donenfeld #include "socket.h"
11e7096c13SJason A. Donenfeld
12e7096c13SJason A. Donenfeld /*
13e7096c13SJason A. Donenfeld * - Timer for retransmitting the handshake if we don't hear back after
14e7096c13SJason A. Donenfeld * `REKEY_TIMEOUT + jitter` ms.
15e7096c13SJason A. Donenfeld *
16e7096c13SJason A. Donenfeld * - Timer for sending empty packet if we have received a packet but after have
17e7096c13SJason A. Donenfeld * not sent one for `KEEPALIVE_TIMEOUT` ms.
18e7096c13SJason A. Donenfeld *
19e7096c13SJason A. Donenfeld * - Timer for initiating new handshake if we have sent a packet but after have
20e7096c13SJason A. Donenfeld * not received one (even empty) for `(KEEPALIVE_TIMEOUT + REKEY_TIMEOUT) +
21e7096c13SJason A. Donenfeld * jitter` ms.
22e7096c13SJason A. Donenfeld *
23e7096c13SJason A. Donenfeld * - Timer for zeroing out all ephemeral keys after `(REJECT_AFTER_TIME * 3)` ms
24e7096c13SJason A. Donenfeld * if no new keys have been received.
25e7096c13SJason A. Donenfeld *
26e7096c13SJason A. Donenfeld * - Timer for, if enabled, sending an empty authenticated packet every user-
27e7096c13SJason A. Donenfeld * specified seconds.
28e7096c13SJason A. Donenfeld */
29e7096c13SJason A. Donenfeld
mod_peer_timer(struct wg_peer * peer,struct timer_list * timer,unsigned long expires)30e7096c13SJason A. Donenfeld static inline void mod_peer_timer(struct wg_peer *peer,
31e7096c13SJason A. Donenfeld struct timer_list *timer,
32e7096c13SJason A. Donenfeld unsigned long expires)
33e7096c13SJason A. Donenfeld {
34e7096c13SJason A. Donenfeld rcu_read_lock_bh();
35e7096c13SJason A. Donenfeld if (likely(netif_running(peer->device->dev) &&
36e7096c13SJason A. Donenfeld !READ_ONCE(peer->is_dead)))
37e7096c13SJason A. Donenfeld mod_timer(timer, expires);
38e7096c13SJason A. Donenfeld rcu_read_unlock_bh();
39e7096c13SJason A. Donenfeld }
40e7096c13SJason A. Donenfeld
wg_expired_retransmit_handshake(struct timer_list * timer)41e7096c13SJason A. Donenfeld static void wg_expired_retransmit_handshake(struct timer_list *timer)
42e7096c13SJason A. Donenfeld {
43e7096c13SJason A. Donenfeld struct wg_peer *peer = from_timer(peer, timer,
44e7096c13SJason A. Donenfeld timer_retransmit_handshake);
45e7096c13SJason A. Donenfeld
46e7096c13SJason A. Donenfeld if (peer->timer_handshake_attempts > MAX_TIMER_HANDSHAKES) {
47e7096c13SJason A. Donenfeld pr_debug("%s: Handshake for peer %llu (%pISpfsc) did not complete after %d attempts, giving up\n",
48e7096c13SJason A. Donenfeld peer->device->dev->name, peer->internal_id,
492d4ee16dSJiri Slaby (SUSE) &peer->endpoint.addr, (int)MAX_TIMER_HANDSHAKES + 2);
50e7096c13SJason A. Donenfeld
51e7096c13SJason A. Donenfeld del_timer(&peer->timer_send_keepalive);
52e7096c13SJason A. Donenfeld /* We drop all packets without a keypair and don't try again,
53e7096c13SJason A. Donenfeld * if we try unsuccessfully for too long to make a handshake.
54e7096c13SJason A. Donenfeld */
55e7096c13SJason A. Donenfeld wg_packet_purge_staged_packets(peer);
56e7096c13SJason A. Donenfeld
57e7096c13SJason A. Donenfeld /* We set a timer for destroying any residue that might be left
58e7096c13SJason A. Donenfeld * of a partial exchange.
59e7096c13SJason A. Donenfeld */
60e7096c13SJason A. Donenfeld if (!timer_pending(&peer->timer_zero_key_material))
61e7096c13SJason A. Donenfeld mod_peer_timer(peer, &peer->timer_zero_key_material,
62e7096c13SJason A. Donenfeld jiffies + REJECT_AFTER_TIME * 3 * HZ);
63e7096c13SJason A. Donenfeld } else {
64e7096c13SJason A. Donenfeld ++peer->timer_handshake_attempts;
65e7096c13SJason A. Donenfeld pr_debug("%s: Handshake for peer %llu (%pISpfsc) did not complete after %d seconds, retrying (try %d)\n",
66e7096c13SJason A. Donenfeld peer->device->dev->name, peer->internal_id,
672d4ee16dSJiri Slaby (SUSE) &peer->endpoint.addr, (int)REKEY_TIMEOUT,
68e7096c13SJason A. Donenfeld peer->timer_handshake_attempts + 1);
69e7096c13SJason A. Donenfeld
70e7096c13SJason A. Donenfeld /* We clear the endpoint address src address, in case this is
71e7096c13SJason A. Donenfeld * the cause of trouble.
72e7096c13SJason A. Donenfeld */
73e7096c13SJason A. Donenfeld wg_socket_clear_peer_endpoint_src(peer);
74e7096c13SJason A. Donenfeld
75e7096c13SJason A. Donenfeld wg_packet_send_queued_handshake_initiation(peer, true);
76e7096c13SJason A. Donenfeld }
77e7096c13SJason A. Donenfeld }
78e7096c13SJason A. Donenfeld
wg_expired_send_keepalive(struct timer_list * timer)79e7096c13SJason A. Donenfeld static void wg_expired_send_keepalive(struct timer_list *timer)
80e7096c13SJason A. Donenfeld {
81e7096c13SJason A. Donenfeld struct wg_peer *peer = from_timer(peer, timer, timer_send_keepalive);
82e7096c13SJason A. Donenfeld
83e7096c13SJason A. Donenfeld wg_packet_send_keepalive(peer);
84e7096c13SJason A. Donenfeld if (peer->timer_need_another_keepalive) {
85e7096c13SJason A. Donenfeld peer->timer_need_another_keepalive = false;
86e7096c13SJason A. Donenfeld mod_peer_timer(peer, &peer->timer_send_keepalive,
87e7096c13SJason A. Donenfeld jiffies + KEEPALIVE_TIMEOUT * HZ);
88e7096c13SJason A. Donenfeld }
89e7096c13SJason A. Donenfeld }
90e7096c13SJason A. Donenfeld
wg_expired_new_handshake(struct timer_list * timer)91e7096c13SJason A. Donenfeld static void wg_expired_new_handshake(struct timer_list *timer)
92e7096c13SJason A. Donenfeld {
93e7096c13SJason A. Donenfeld struct wg_peer *peer = from_timer(peer, timer, timer_new_handshake);
94e7096c13SJason A. Donenfeld
95e7096c13SJason A. Donenfeld pr_debug("%s: Retrying handshake with peer %llu (%pISpfsc) because we stopped hearing back after %d seconds\n",
96e7096c13SJason A. Donenfeld peer->device->dev->name, peer->internal_id,
972d4ee16dSJiri Slaby (SUSE) &peer->endpoint.addr, (int)(KEEPALIVE_TIMEOUT + REKEY_TIMEOUT));
98e7096c13SJason A. Donenfeld /* We clear the endpoint address src address, in case this is the cause
99e7096c13SJason A. Donenfeld * of trouble.
100e7096c13SJason A. Donenfeld */
101e7096c13SJason A. Donenfeld wg_socket_clear_peer_endpoint_src(peer);
102e7096c13SJason A. Donenfeld wg_packet_send_queued_handshake_initiation(peer, false);
103e7096c13SJason A. Donenfeld }
104e7096c13SJason A. Donenfeld
wg_expired_zero_key_material(struct timer_list * timer)105e7096c13SJason A. Donenfeld static void wg_expired_zero_key_material(struct timer_list *timer)
106e7096c13SJason A. Donenfeld {
107e7096c13SJason A. Donenfeld struct wg_peer *peer = from_timer(peer, timer, timer_zero_key_material);
108e7096c13SJason A. Donenfeld
109e7096c13SJason A. Donenfeld rcu_read_lock_bh();
110e7096c13SJason A. Donenfeld if (!READ_ONCE(peer->is_dead)) {
111e7096c13SJason A. Donenfeld wg_peer_get(peer);
112e7096c13SJason A. Donenfeld if (!queue_work(peer->device->handshake_send_wq,
113e7096c13SJason A. Donenfeld &peer->clear_peer_work))
114e7096c13SJason A. Donenfeld /* If the work was already on the queue, we want to drop
115e7096c13SJason A. Donenfeld * the extra reference.
116e7096c13SJason A. Donenfeld */
117e7096c13SJason A. Donenfeld wg_peer_put(peer);
118e7096c13SJason A. Donenfeld }
119e7096c13SJason A. Donenfeld rcu_read_unlock_bh();
120e7096c13SJason A. Donenfeld }
121e7096c13SJason A. Donenfeld
wg_queued_expired_zero_key_material(struct work_struct * work)122e7096c13SJason A. Donenfeld static void wg_queued_expired_zero_key_material(struct work_struct *work)
123e7096c13SJason A. Donenfeld {
124e7096c13SJason A. Donenfeld struct wg_peer *peer = container_of(work, struct wg_peer,
125e7096c13SJason A. Donenfeld clear_peer_work);
126e7096c13SJason A. Donenfeld
127e7096c13SJason A. Donenfeld pr_debug("%s: Zeroing out all keys for peer %llu (%pISpfsc), since we haven't received a new one in %d seconds\n",
128e7096c13SJason A. Donenfeld peer->device->dev->name, peer->internal_id,
1292d4ee16dSJiri Slaby (SUSE) &peer->endpoint.addr, (int)REJECT_AFTER_TIME * 3);
130e7096c13SJason A. Donenfeld wg_noise_handshake_clear(&peer->handshake);
131e7096c13SJason A. Donenfeld wg_noise_keypairs_clear(&peer->keypairs);
132e7096c13SJason A. Donenfeld wg_peer_put(peer);
133e7096c13SJason A. Donenfeld }
134e7096c13SJason A. Donenfeld
wg_expired_send_persistent_keepalive(struct timer_list * timer)135e7096c13SJason A. Donenfeld static void wg_expired_send_persistent_keepalive(struct timer_list *timer)
136e7096c13SJason A. Donenfeld {
137e7096c13SJason A. Donenfeld struct wg_peer *peer = from_timer(peer, timer,
138e7096c13SJason A. Donenfeld timer_persistent_keepalive);
139e7096c13SJason A. Donenfeld
140e7096c13SJason A. Donenfeld if (likely(peer->persistent_keepalive_interval))
141e7096c13SJason A. Donenfeld wg_packet_send_keepalive(peer);
142e7096c13SJason A. Donenfeld }
143e7096c13SJason A. Donenfeld
144e7096c13SJason A. Donenfeld /* Should be called after an authenticated data packet is sent. */
wg_timers_data_sent(struct wg_peer * peer)145e7096c13SJason A. Donenfeld void wg_timers_data_sent(struct wg_peer *peer)
146e7096c13SJason A. Donenfeld {
147e7096c13SJason A. Donenfeld if (!timer_pending(&peer->timer_new_handshake))
148e7096c13SJason A. Donenfeld mod_peer_timer(peer, &peer->timer_new_handshake,
149e7096c13SJason A. Donenfeld jiffies + (KEEPALIVE_TIMEOUT + REKEY_TIMEOUT) * HZ +
1508032bf12SJason A. Donenfeld get_random_u32_below(REKEY_TIMEOUT_JITTER_MAX_JIFFIES));
151e7096c13SJason A. Donenfeld }
152e7096c13SJason A. Donenfeld
153e7096c13SJason A. Donenfeld /* Should be called after an authenticated data packet is received. */
wg_timers_data_received(struct wg_peer * peer)154e7096c13SJason A. Donenfeld void wg_timers_data_received(struct wg_peer *peer)
155e7096c13SJason A. Donenfeld {
156e7096c13SJason A. Donenfeld if (likely(netif_running(peer->device->dev))) {
157e7096c13SJason A. Donenfeld if (!timer_pending(&peer->timer_send_keepalive))
158e7096c13SJason A. Donenfeld mod_peer_timer(peer, &peer->timer_send_keepalive,
159e7096c13SJason A. Donenfeld jiffies + KEEPALIVE_TIMEOUT * HZ);
160e7096c13SJason A. Donenfeld else
161e7096c13SJason A. Donenfeld peer->timer_need_another_keepalive = true;
162e7096c13SJason A. Donenfeld }
163e7096c13SJason A. Donenfeld }
164e7096c13SJason A. Donenfeld
165e7096c13SJason A. Donenfeld /* Should be called after any type of authenticated packet is sent, whether
166e7096c13SJason A. Donenfeld * keepalive, data, or handshake.
167e7096c13SJason A. Donenfeld */
wg_timers_any_authenticated_packet_sent(struct wg_peer * peer)168e7096c13SJason A. Donenfeld void wg_timers_any_authenticated_packet_sent(struct wg_peer *peer)
169e7096c13SJason A. Donenfeld {
170e7096c13SJason A. Donenfeld del_timer(&peer->timer_send_keepalive);
171e7096c13SJason A. Donenfeld }
172e7096c13SJason A. Donenfeld
173e7096c13SJason A. Donenfeld /* Should be called after any type of authenticated packet is received, whether
174e7096c13SJason A. Donenfeld * keepalive, data, or handshake.
175e7096c13SJason A. Donenfeld */
wg_timers_any_authenticated_packet_received(struct wg_peer * peer)176e7096c13SJason A. Donenfeld void wg_timers_any_authenticated_packet_received(struct wg_peer *peer)
177e7096c13SJason A. Donenfeld {
178e7096c13SJason A. Donenfeld del_timer(&peer->timer_new_handshake);
179e7096c13SJason A. Donenfeld }
180e7096c13SJason A. Donenfeld
181e7096c13SJason A. Donenfeld /* Should be called after a handshake initiation message is sent. */
wg_timers_handshake_initiated(struct wg_peer * peer)182e7096c13SJason A. Donenfeld void wg_timers_handshake_initiated(struct wg_peer *peer)
183e7096c13SJason A. Donenfeld {
184e7096c13SJason A. Donenfeld mod_peer_timer(peer, &peer->timer_retransmit_handshake,
185e7096c13SJason A. Donenfeld jiffies + REKEY_TIMEOUT * HZ +
1868032bf12SJason A. Donenfeld get_random_u32_below(REKEY_TIMEOUT_JITTER_MAX_JIFFIES));
187e7096c13SJason A. Donenfeld }
188e7096c13SJason A. Donenfeld
189e7096c13SJason A. Donenfeld /* Should be called after a handshake response message is received and processed
190e7096c13SJason A. Donenfeld * or when getting key confirmation via the first data message.
191e7096c13SJason A. Donenfeld */
wg_timers_handshake_complete(struct wg_peer * peer)192e7096c13SJason A. Donenfeld void wg_timers_handshake_complete(struct wg_peer *peer)
193e7096c13SJason A. Donenfeld {
194e7096c13SJason A. Donenfeld del_timer(&peer->timer_retransmit_handshake);
195e7096c13SJason A. Donenfeld peer->timer_handshake_attempts = 0;
196e7096c13SJason A. Donenfeld peer->sent_lastminute_handshake = false;
197e7096c13SJason A. Donenfeld ktime_get_real_ts64(&peer->walltime_last_handshake);
198e7096c13SJason A. Donenfeld }
199e7096c13SJason A. Donenfeld
200e7096c13SJason A. Donenfeld /* Should be called after an ephemeral key is created, which is before sending a
201e7096c13SJason A. Donenfeld * handshake response or after receiving a handshake response.
202e7096c13SJason A. Donenfeld */
wg_timers_session_derived(struct wg_peer * peer)203e7096c13SJason A. Donenfeld void wg_timers_session_derived(struct wg_peer *peer)
204e7096c13SJason A. Donenfeld {
205e7096c13SJason A. Donenfeld mod_peer_timer(peer, &peer->timer_zero_key_material,
206e7096c13SJason A. Donenfeld jiffies + REJECT_AFTER_TIME * 3 * HZ);
207e7096c13SJason A. Donenfeld }
208e7096c13SJason A. Donenfeld
209e7096c13SJason A. Donenfeld /* Should be called before a packet with authentication, whether
210e7096c13SJason A. Donenfeld * keepalive, data, or handshakem is sent, or after one is received.
211e7096c13SJason A. Donenfeld */
wg_timers_any_authenticated_packet_traversal(struct wg_peer * peer)212e7096c13SJason A. Donenfeld void wg_timers_any_authenticated_packet_traversal(struct wg_peer *peer)
213e7096c13SJason A. Donenfeld {
214e7096c13SJason A. Donenfeld if (peer->persistent_keepalive_interval)
215e7096c13SJason A. Donenfeld mod_peer_timer(peer, &peer->timer_persistent_keepalive,
216e7096c13SJason A. Donenfeld jiffies + peer->persistent_keepalive_interval * HZ);
217e7096c13SJason A. Donenfeld }
218e7096c13SJason A. Donenfeld
wg_timers_init(struct wg_peer * peer)219e7096c13SJason A. Donenfeld void wg_timers_init(struct wg_peer *peer)
220e7096c13SJason A. Donenfeld {
221e7096c13SJason A. Donenfeld timer_setup(&peer->timer_retransmit_handshake,
222e7096c13SJason A. Donenfeld wg_expired_retransmit_handshake, 0);
223e7096c13SJason A. Donenfeld timer_setup(&peer->timer_send_keepalive, wg_expired_send_keepalive, 0);
224e7096c13SJason A. Donenfeld timer_setup(&peer->timer_new_handshake, wg_expired_new_handshake, 0);
225e7096c13SJason A. Donenfeld timer_setup(&peer->timer_zero_key_material,
226e7096c13SJason A. Donenfeld wg_expired_zero_key_material, 0);
227e7096c13SJason A. Donenfeld timer_setup(&peer->timer_persistent_keepalive,
228e7096c13SJason A. Donenfeld wg_expired_send_persistent_keepalive, 0);
229e7096c13SJason A. Donenfeld INIT_WORK(&peer->clear_peer_work, wg_queued_expired_zero_key_material);
230e7096c13SJason A. Donenfeld peer->timer_handshake_attempts = 0;
231e7096c13SJason A. Donenfeld peer->sent_lastminute_handshake = false;
232e7096c13SJason A. Donenfeld peer->timer_need_another_keepalive = false;
233e7096c13SJason A. Donenfeld }
234e7096c13SJason A. Donenfeld
wg_timers_stop(struct wg_peer * peer)235e7096c13SJason A. Donenfeld void wg_timers_stop(struct wg_peer *peer)
236e7096c13SJason A. Donenfeld {
237*326534e8SJason A. Donenfeld timer_delete_sync(&peer->timer_retransmit_handshake);
238*326534e8SJason A. Donenfeld timer_delete_sync(&peer->timer_send_keepalive);
239*326534e8SJason A. Donenfeld timer_delete_sync(&peer->timer_new_handshake);
240*326534e8SJason A. Donenfeld timer_delete_sync(&peer->timer_zero_key_material);
241*326534e8SJason A. Donenfeld timer_delete_sync(&peer->timer_persistent_keepalive);
242e7096c13SJason A. Donenfeld flush_work(&peer->clear_peer_work);
243e7096c13SJason A. Donenfeld }
244