server.go 3.1 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137
  1. package server
  2. import (
  3. "context"
  4. "fmt"
  5. "log"
  6. "net"
  7. "net/netip"
  8. "time"
  9. "github.com/Snawoot/dtlspipe/util"
  10. "github.com/pion/dtls/v2"
  11. "github.com/pion/dtls/v2/pkg/protocol"
  12. "github.com/pion/dtls/v2/pkg/protocol/recordlayer"
  13. "github.com/pion/transport/v2/udp"
  14. )
  15. const (
  16. Backlog = 1024
  17. )
  18. type Server struct {
  19. listener net.Listener
  20. dtlsConfig *dtls.Config
  21. rAddr string
  22. psk func([]byte) ([]byte, error)
  23. timeout time.Duration
  24. idleTimeout time.Duration
  25. baseCtx context.Context
  26. cancelCtx func()
  27. staleMode util.StaleMode
  28. }
  29. func New(cfg *Config) (*Server, error) {
  30. cfg = cfg.populateDefaults()
  31. baseCtx, cancelCtx := context.WithCancel(cfg.BaseContext)
  32. srv := &Server{
  33. rAddr: cfg.RemoteAddress,
  34. timeout: cfg.Timeout,
  35. psk: cfg.PSKCallback,
  36. idleTimeout: cfg.IdleTimeout,
  37. baseCtx: baseCtx,
  38. cancelCtx: cancelCtx,
  39. staleMode: cfg.StaleMode,
  40. }
  41. lAddrPort, err := netip.ParseAddrPort(cfg.BindAddress)
  42. if err != nil {
  43. cancelCtx()
  44. return nil, fmt.Errorf("can't parse bind address: %w", err)
  45. }
  46. srv.dtlsConfig = &dtls.Config{
  47. ExtendedMasterSecret: dtls.RequireExtendedMasterSecret,
  48. ConnectContextMaker: srv.contextMaker,
  49. PSK: srv.psk,
  50. MTU: cfg.MTU,
  51. InsecureSkipVerifyHello: cfg.SkipHelloVerify,
  52. CipherSuites: cfg.CipherSuites,
  53. EllipticCurves: cfg.EllipticCurves,
  54. }
  55. lc := udp.ListenConfig{
  56. AcceptFilter: func(packet []byte) bool {
  57. pkts, err := recordlayer.UnpackDatagram(packet)
  58. if err != nil || len(pkts) < 1 {
  59. return false
  60. }
  61. h := &recordlayer.Header{}
  62. if err := h.Unmarshal(pkts[0]); err != nil {
  63. return false
  64. }
  65. return h.ContentType == protocol.ContentTypeHandshake
  66. },
  67. Backlog: Backlog,
  68. }
  69. listener, err := lc.Listen("udp", net.UDPAddrFromAddrPort(lAddrPort))
  70. if err != nil {
  71. cancelCtx()
  72. return nil, fmt.Errorf("server listen failed: %w", err)
  73. }
  74. srv.listener = listener
  75. go srv.listen()
  76. return srv, nil
  77. }
  78. func (srv *Server) listen() {
  79. defer srv.Close()
  80. for srv.baseCtx.Err() == nil {
  81. conn, err := srv.listener.Accept()
  82. if err != nil {
  83. log.Printf("conn accept failed: %v", err)
  84. continue
  85. }
  86. go func(conn net.Conn) {
  87. defer conn.Close()
  88. conn, err := dtls.Server(conn, srv.dtlsConfig)
  89. if err != nil {
  90. log.Printf("DTLS accept error: %v", err)
  91. return
  92. }
  93. defer conn.Close()
  94. srv.serve(conn)
  95. }(conn)
  96. }
  97. }
  98. func (srv *Server) serve(conn net.Conn) {
  99. log.Printf("[+] conn %s <=> %s", conn.LocalAddr(), conn.RemoteAddr())
  100. defer log.Printf("[-] conn %s <=> %s", conn.LocalAddr(), conn.RemoteAddr())
  101. defer conn.Close()
  102. dialCtx, cancel := context.WithTimeout(srv.baseCtx, srv.timeout)
  103. defer cancel()
  104. remoteConn, err := (&net.Dialer{}).DialContext(dialCtx, "udp", srv.rAddr)
  105. if err != nil {
  106. log.Printf("remote dial failed: %v", err)
  107. return
  108. }
  109. defer remoteConn.Close()
  110. util.PairConn(conn, remoteConn, srv.idleTimeout, srv.staleMode)
  111. }
  112. func (srv *Server) contextMaker() (context.Context, func()) {
  113. return context.WithTimeout(srv.baseCtx, srv.timeout)
  114. }
  115. func (srv *Server) Close() error {
  116. srv.cancelCtx()
  117. return srv.listener.Close()
  118. }