rust-nex/prudpv0/src/server.rs

505 lines
16 KiB
Rust
Raw Normal View History

2026-01-20 20:26:44 +01:00
use std::{
collections::HashMap,
hash::Hash,
net::{Ipv4Addr, SocketAddr, SocketAddrV4},
sync::{
2026-02-01 21:10:03 +01:00
Arc, LazyLock, Weak,
2026-01-20 20:26:44 +01:00
atomic::{AtomicBool, AtomicU32},
},
2026-01-27 14:44:10 +01:00
thread::sleep,
time::Duration,
2026-01-20 20:26:44 +01:00
};
use log::{error, info, warn};
use proxy_common::{ProxyStartupParam, new_backend_connection};
use rnex_core::{
executables::common::{OWN_IP_PRIVATE, SERVER_PORT},
prudp::{
socket_addr::PRUDPSockAddr,
types_flags::{
TypesFlags,
2026-01-27 14:44:10 +01:00
flags::{ACK, HAS_SIZE, NEED_ACK, RELIABLE},
2026-01-31 20:57:19 +01:00
types::{CONNECT, DATA, DISCONNECT, PING, SYN},
2026-01-20 20:26:44 +01:00
},
virtual_port::VirtualPort,
},
rnex_proxy_common::ConnectionInitData,
util::{SendingBufferConnection, SplittableBufferConnection},
};
use tokio::{
net::{TcpSocket, UdpSocket},
spawn,
sync::{Mutex, RwLock},
time::Instant,
};
use crate::{
crypto::{Crypto, CryptoInstance},
2026-01-27 14:44:10 +01:00
packet::{
2026-01-31 20:57:19 +01:00
PRUDPV0Header, PRUDPV0Packet, new_connect_packet, new_data_packet, new_disconnect_packet,
new_ping_packet, new_syn_packet, precalc_size,
2026-01-27 14:44:10 +01:00
},
2026-01-20 20:26:44 +01:00
};
pub struct InternalConnection<C: CryptoInstance> {
last_action: Instant,
crypto_instance: C,
server_packet_counter: u16,
client_packet_counter: u16,
unacknowledged_packets: HashMap<u16, Arc<Vec<u8>>>,
2026-01-27 14:44:10 +01:00
packet_queue: HashMap<u16, (Instant, PRUDPV0Packet<Vec<u8>>)>,
2026-01-20 20:26:44 +01:00
}
pub struct Connection<C: CryptoInstance> {
alive: AtomicBool,
session_id: u8,
target: SendingBufferConnection,
self_signat: [u8; 4],
remote_signat: [u8; 4],
addr: PRUDPSockAddr,
inner: Mutex<InternalConnection<C>>,
}
impl<C: CryptoInstance> InternalConnection<C> {
fn next_server_count(&mut self) -> u16 {
let prev_val = self.server_packet_counter;
let (val, _) = self.server_packet_counter.overflowing_add(1);
self.server_packet_counter = val;
prev_val
}
}
pub struct Server<C: Crypto> {
param: ProxyStartupParam,
socket: UdpSocket,
crypto: C,
connections: RwLock<HashMap<PRUDPSockAddr, Arc<Connection<C::Instance>>>>,
}
impl<C: Crypto> Server<C> {
2026-01-27 14:44:10 +01:00
async fn send_data_packet(self: Arc<Self>, conn: Arc<Connection<C::Instance>>, data: &[u8]) {
/*let type_flags = TypesFlags::default().types(DATA).flags(HAS_SIZE | NEED_ACK);
2026-01-20 20:26:44 +01:00
let vec = vec![0; precalc_size(type_flags, data.len())];
let mut packet = PRUDPV0Packet::new(vec);
let payload = packet.payload_mut().expect("packet malformed in creation");
payload.copy_from_slice(data);
let mut inner = conn.inner.lock().await;
inner.crypto_instance.encrypt_outgoing(payload);
let packet_signat = inner.crypto_instance.generate_signature(payload);
let seq = inner.next_server_count();
*packet.header_mut().expect("packet malformed in creation") = PRUDPV0Header {
source: self.param.virtual_port,
destination: conn.addr.virtual_port,
type_flags,
session_id: conn.session_id,
packet_signature: packet_signat,
sequence_id: seq,
};
/* we leave the sequence id as is for now as it defaults to 0 */
2026-03-24 15:48:56 +01:00
packet.checksum_mut().expect("packet malformed in creation") =
2026-01-20 20:26:44 +01:00
self.crypto.calculate_checksum(
packet
.checksummed_data()
.expect("packet malformed in creation"),
2026-01-27 14:44:10 +01:00
);*/
let mut inner = conn.inner.lock().await;
let seq = inner.server_packet_counter;
let packet = new_data_packet(
2026-01-31 20:41:37 +01:00
NEED_ACK | RELIABLE,
2026-01-27 14:44:10 +01:00
self.param.virtual_port,
conn.addr.virtual_port,
data,
inner.server_packet_counter,
conn.session_id,
0,
&mut inner.crypto_instance,
&self.crypto,
);
inner.server_packet_counter += 1;
2026-01-20 20:26:44 +01:00
2026-01-27 14:44:10 +01:00
let packet = Arc::new(packet);
2026-01-20 20:26:44 +01:00
let packet_ref = Arc::downgrade(&packet);
inner.unacknowledged_packets.insert(seq, packet);
drop(inner);
2026-02-01 21:10:03 +01:00
let conn = Arc::downgrade(&conn);
let this = Arc::downgrade(&self);
2026-01-20 20:26:44 +01:00
spawn(async move {
for n in 0..5 {
let Some(data) = packet_ref.upgrade() else {
return;
};
2026-01-27 14:44:10 +01:00
let Some(conn) = conn.upgrade() else {
return;
};
let Some(this) = this.upgrade() else {
return;
};
2026-01-20 20:26:44 +01:00
info!("send attempt {}", n);
2026-01-27 14:44:10 +01:00
self.socket
.send_to(&data, conn.addr.regular_socket_addr)
.await;
break;
2026-01-20 20:26:44 +01:00
}
});
}
async fn connection_thread(
self: Arc<Self>,
2026-02-01 21:10:03 +01:00
conn: Weak<Connection<C::Instance>>,
2026-01-20 20:26:44 +01:00
mut recv: SplittableBufferConnection,
) {
2026-01-27 14:44:10 +01:00
while let Some(data) = recv.recv().await {
2026-02-01 21:10:03 +01:00
let Some(conn) = conn.upgrade() else { break };
2026-01-27 14:44:10 +01:00
if &data[..] == &[0, 0, 0, 0, 0] {
info!("got keepalive");
continue;
}
info!("got data from server: {:?}", data);
self.clone().send_data_packet(conn.clone(), &data).await;
}
2026-01-20 20:26:44 +01:00
}
async fn timeout_thread(self: Arc<Self>, conn: Arc<Connection<C::Instance>>) {
loop {
2026-01-31 20:22:11 +01:00
sleep(Duration::from_secs(3));
let mut inner = conn.inner.lock().await;
2026-02-01 21:10:03 +01:00
2026-01-31 20:22:11 +01:00
if (Instant::now() - inner.last_action).as_secs() > 5 {
2026-01-31 20:57:19 +01:00
warn!("connection exceeded silence limit, sending ping");
2026-01-31 20:22:11 +01:00
let packet = new_ping_packet(
NEED_ACK,
self.param.virtual_port,
conn.addr.virtual_port,
0,
conn.session_id,
&mut inner.crypto_instance,
&self.crypto,
);
self.socket
.send_to(&packet, conn.addr.regular_socket_addr)
.await;
}
2026-02-01 21:10:03 +01:00
if (Instant::now() - inner.last_action).as_secs() > 15 {
2026-01-31 20:57:19 +01:00
warn!("client timed out...");
let packet = new_disconnect_packet(
2026-02-01 21:10:03 +01:00
NEED_ACK,
2026-01-31 20:57:19 +01:00
self.param.virtual_port,
conn.addr.virtual_port,
0,
conn.session_id,
&mut inner.crypto_instance,
&self.crypto,
);
self.socket
.send_to(&packet, conn.addr.regular_socket_addr)
.await;
self.socket
.send_to(&packet, conn.addr.regular_socket_addr)
.await;
self.socket
.send_to(&packet, conn.addr.regular_socket_addr)
.await;
2026-02-01 21:10:03 +01:00
drop(inner);
2026-01-31 20:22:11 +01:00
let mut conns = self.connections.write().await;
conns.remove(&conn.addr);
drop(conns);
2026-02-01 21:10:03 +01:00
break;
2026-01-31 20:22:11 +01:00
}
drop(inner);
2026-01-20 20:26:44 +01:00
}
}
2026-01-27 14:44:10 +01:00
async fn handle_syn(self: Arc<Self>, packet: PRUDPV0Packet<Vec<u8>>, addr: PRUDPSockAddr) {
2026-01-20 20:26:44 +01:00
info!("got syn");
let header = packet.header().unwrap();
let signat = addr.calculate_connection_signature();
let signat = [signat[0], signat[1], signat[2], signat[3]];
let packet = new_syn_packet(ACK, header.destination, header.source, signat, &self.crypto);
self.socket.send_to(&packet, addr.regular_socket_addr).await;
}
2026-01-27 14:44:10 +01:00
async fn handle_connect(self: Arc<Self>, packet: PRUDPV0Packet<Vec<u8>>, addr: PRUDPSockAddr) {
2026-01-20 20:26:44 +01:00
let Some(data) = packet.payload() else {
warn!("malformed packet from: {:?}", addr.regular_socket_addr);
return;
};
let Some(self_signat) = packet.connection_signature().copied() else {
warn!(
"malformed packet(unable to find connection signature) from: {:?}",
addr
);
return;
};
let remote_signat = addr.calculate_connection_signature();
let remote_signat = [
remote_signat[0],
remote_signat[1],
remote_signat[2],
remote_signat[3],
];
2026-02-01 21:10:03 +01:00
let Some((ci, data)) = self.crypto.instantiate(&data, self_signat, remote_signat) else {
warn!("unable to instantiate crypto instance");
return;
};
2026-01-27 14:44:10 +01:00
let pid = ci.get_user_id();
let buf_conn = new_backend_connection(&self.param, addr, pid).await;
let Some(buf_conn) = buf_conn else {
error!("unable to connect to backend");
return;
};
2026-01-20 20:26:44 +01:00
let header = packet.header().expect("header should be validated by now");
let conn = Arc::new(Connection {
2026-01-27 14:44:10 +01:00
target: buf_conn.duplicate_sender(),
2026-01-20 20:26:44 +01:00
remote_signat,
self_signat,
addr,
session_id: header.session_id,
alive: AtomicBool::new(true),
inner: Mutex::new(InternalConnection {
last_action: Instant::now(),
crypto_instance: ci,
client_packet_counter: 2,
server_packet_counter: 1,
unacknowledged_packets: HashMap::new(),
2026-01-27 14:44:10 +01:00
packet_queue: HashMap::new(),
2026-01-20 20:26:44 +01:00
}),
});
2026-01-27 14:44:10 +01:00
let mut conns = self.connections.write().await;
conns.insert(addr, conn.clone());
drop(conns);
spawn({
let this = self.clone();
2026-02-01 21:10:03 +01:00
let conn = Arc::downgrade(&conn);
2026-01-27 14:44:10 +01:00
this.connection_thread(conn, buf_conn)
});
spawn({
let this = self.clone();
let conn = conn.clone();
this.timeout_thread(conn)
});
let packet = new_connect_packet(
2026-01-31 20:41:37 +01:00
ACK,
2026-01-27 14:44:10 +01:00
header.destination,
header.source,
2026-01-31 13:48:06 +01:00
self_signat,
2026-01-27 14:44:10 +01:00
remote_signat,
2026-01-31 13:48:06 +01:00
packet.header().unwrap().session_id,
2026-02-01 21:10:03 +01:00
&data,
2026-01-27 14:44:10 +01:00
&self.crypto,
);
info!("sending back connection accept");
self.socket.send_to(&packet, addr.regular_socket_addr).await;
}
async fn handle_data(self: Arc<Self>, mut packet: PRUDPV0Packet<Vec<u8>>, addr: PRUDPSockAddr) {
let Some(frag_id) = packet.fragment_id() else {
warn!("invalid packet from: {:?}", addr);
return;
};
let Some(header) = packet.header() else {
warn!("invalid packet from: {:?}", addr);
return;
};
2026-02-01 21:10:03 +01:00
let Some(res) = self.get_connection(addr).await else {
2026-01-27 14:44:10 +01:00
warn!("data packet on inactive connection from: {:?}", addr);
return;
};
info!("frag: {}", frag_id);
let mut conn = res.inner.lock().await;
let ack = new_data_packet(
2026-01-31 13:48:06 +01:00
ACK,
2026-01-27 14:44:10 +01:00
self.param.virtual_port,
res.addr.virtual_port,
&[],
header.sequence_id,
header.session_id,
*frag_id,
&mut conn.crypto_instance,
&self.crypto,
);
self.socket.send_to(&ack, addr.regular_socket_addr).await;
conn.packet_queue.insert(
packet.header().unwrap().sequence_id,
(Instant::now(), packet),
);
while let Some((_, mut packet)) = {
let ctr = conn.client_packet_counter;
conn.packet_queue.remove(&ctr)
} {
info!("processing packet: {}", conn.client_packet_counter);
let Some(payload) = packet.payload_mut() else {
//todo: at this point the stream would have been broken, we should probably disconnect the client
warn!("invalid packet from: {:?}", addr);
return;
};
conn.crypto_instance.decrypt_incoming(payload);
res.target.send(payload.to_owned()).await;
conn.client_packet_counter += 1;
}
2026-02-01 21:10:03 +01:00
info!("finished handeling packets, dropping inner connection");
2026-01-27 14:44:10 +01:00
drop(conn);
2026-01-20 20:26:44 +01:00
}
2026-01-31 20:22:11 +01:00
async fn handle_ping(self: Arc<Self>, mut packet: PRUDPV0Packet<Vec<u8>>, addr: PRUDPSockAddr) {
info!("got ping");
2026-01-31 20:22:11 +01:00
let header = packet.header().unwrap();
let Some(conn) = self.get_connection(addr).await else {
warn!("ping on inactive connection: {:?}", addr);
return;
};
let mut inner = conn.inner.lock().await;
let packet = new_ping_packet(
ACK,
self.param.virtual_port,
addr.virtual_port,
header.sequence_id,
header.session_id,
&mut inner.crypto_instance,
&self.crypto,
);
drop(inner);
self.socket.send_to(&packet, addr.regular_socket_addr).await;
}
2026-01-31 20:57:19 +01:00
async fn handle_disconnect(
self: Arc<Self>,
mut packet: PRUDPV0Packet<Vec<u8>>,
addr: PRUDPSockAddr,
) {
info!("got disconnect");
2026-01-31 20:57:19 +01:00
let header = packet.header().unwrap();
2026-01-31 20:22:11 +01:00
2026-01-31 20:57:19 +01:00
let Some(conn) = self.get_connection(addr).await else {
warn!("ping on inactive connection: {:?}", addr);
return;
};
let mut inner = conn.inner.lock().await;
let packet = new_disconnect_packet(
ACK,
self.param.virtual_port,
addr.virtual_port,
header.sequence_id,
header.session_id,
&mut inner.crypto_instance,
&self.crypto,
);
drop(inner);
self.socket.send_to(&packet, addr.regular_socket_addr).await;
self.socket.send_to(&packet, addr.regular_socket_addr).await;
self.socket.send_to(&packet, addr.regular_socket_addr).await;
}
2026-01-31 20:22:11 +01:00
async fn get_connection(&self, addr: PRUDPSockAddr) -> Option<Arc<Connection<C::Instance>>> {
let rd = self.connections.read().await;
let res = rd.get(&addr).cloned();
drop(rd);
res
}
async fn process_packet(self: Arc<Self>, packet: PRUDPV0Packet<Vec<u8>>, addr: SocketAddrV4) {
2026-01-20 20:26:44 +01:00
if !packet.check_checksum(&self.crypto) {
warn!("invalid checksum from: {}", addr);
return;
}
let Some(header) = packet.header() else {
warn!("malformatted packet from: {}", addr);
return;
};
2026-02-01 21:10:03 +01:00
info!("len: {}", packet.0.len());
2026-03-24 15:48:56 +01:00
let addr = PRUDPSockAddr::new(SocketAddr::V4(addr), header.source);
2026-01-31 13:48:06 +01:00
2026-01-31 20:22:11 +01:00
if let Some(conn) = self.get_connection(addr).await {
let mut inner = conn.inner.lock().await;
inner.last_action = Instant::now();
drop(inner);
};
2026-02-01 21:10:03 +01:00
if header.type_flags.get_flags() & ACK != 0 {
info!("got ack(acks are ignored for now)");
return;
}
2026-01-20 20:26:44 +01:00
println!("{:?}", header);
match header.type_flags.get_types() {
SYN => {
self.handle_syn(packet, addr).await;
}
CONNECT => {
self.handle_connect(packet, addr).await;
}
2026-01-27 14:44:10 +01:00
DATA => {
self.handle_data(packet, addr).await;
}
2026-01-31 20:22:11 +01:00
PING => {
self.handle_ping(packet, addr).await;
}
2026-01-31 20:57:19 +01:00
DISCONNECT => {
self.handle_disconnect(packet, addr).await;
}
2026-01-20 20:26:44 +01:00
v => {
println!("unimplemented packed type: {}", v);
}
}
}
pub async fn run_task(self: Arc<Self>) {
loop {
2026-02-01 21:10:03 +01:00
let mut vec: Vec<u8> = vec![0u8; 65507];
let (len, addr) = match self.socket.recv_from(&mut vec).await {
2026-01-20 20:26:44 +01:00
Err(e) => {
error!("unable to recv: {}", e);
break;
}
2026-02-01 21:10:03 +01:00
Ok(v) => v,
2026-01-20 20:26:44 +01:00
};
let this = self.clone();
tokio::spawn(async move {
2026-01-27 14:44:10 +01:00
let mut data = vec;
2026-02-01 21:10:03 +01:00
data.resize(len, 0);
2026-01-27 14:44:10 +01:00
let packet = PRUDPV0Packet::new(data);
2026-01-20 20:26:44 +01:00
let SocketAddr::V4(addr) = addr else {
unreachable!()
};
this.process_packet(packet, addr).await;
});
}
}
pub async fn new(param: ProxyStartupParam) -> Self {
2026-01-31 20:22:11 +01:00
let socket = UdpSocket::bind(param.self_private)
2026-01-20 20:26:44 +01:00
.await
.expect("unable to bind socket");
Self {
socket,
crypto: C::new(),
connections: RwLock::new(HashMap::new()),
param,
}
}
}