New package: minichecker

This commit is contained in:
nemunaire 2021-03-24 04:21:51 +01:00
parent 5d8bcd55ce
commit ae3b2e6f3b
9 changed files with 852 additions and 0 deletions

View File

@ -0,0 +1,23 @@
FROM golang:alpine as gobuild
ENV GOOS linux
ENV GOARCH amd64
RUN apk add --no-cache git gcc
WORKDIR /go/src/minichecker
ADD cmd ./
RUN GO111MODULE=off go get -d -v
RUN GO111MODULE=off go build -v -tags netgo
FROM alpine
MAINTAINER Pierre-Olivier Mercier <nemunaire@nemunai.re>
COPY --from=gobuild /go/src/minichecker/minichecker /bin/minichecker
RUN mkdir /etc/wireguard && touch /etc/wireguard/.wireguard
ENTRYPOINT ["/bin/minichecker"]

View File

@ -0,0 +1,2 @@
image: minichecker
network: true

View File

@ -0,0 +1,12 @@
[Interface]
PrivateKey = AKZx4pYq2Do2j/OOFFJ6eA/O7DiAkr6aINJRHdMnkVU=
[Peer]
PublicKey = uSpqyYovvP4OG6wDxZ0Qkq45MfyK58PMUuPaLesY8FI=
Endpoint = 82.64.31.248:42912
AllowedIPs = ::/0
PersistentKeepalive = 5
# MyIPv6=2a01:e0a:2b:2252:1::2a/64
# MyNetwork=2a01:e0a:2b:2252:1::/80
# GWIPv6=2a01:e0a:2b:2252::1
# MyLogin=nemunaire
# KeySign=lcUxw+Gw+m9q21yvAL5BJJ9xpACTefeyR6qBsBFPyO9lqtrq/qqWAvf/gITtXdNmRne4FU72pw9pzL2J8SVeAw==

View File

@ -0,0 +1 @@
QMzkCN3PPg

View File

@ -0,0 +1,169 @@
package main
import (
"encoding/json"
"errors"
"fmt"
"io/ioutil"
"log"
"net"
"net/http"
"strings"
"time"
"github.com/miekg/dns"
"github.com/sparrc/go-ping"
)
const (
DEFAULT_RESOLVER = "2a01:e0a:2b:2250::1"
)
var (
verbose = false
test_name = ""
)
// ICMP
func check_ping(ip string, cb func(pkt *ping.Packet)) (err error) {
var pinger *ping.Pinger
pinger, err = ping.NewPinger(ip)
if err != nil {
return
}
defer pinger.Stop()
pinger.Timeout = time.Second * 5
pinger.Count = 1
pinger.OnRecv = cb
pinger.SetPrivileged(true)
pinger.Run()
return
}
func check_dns(domain, ip string) (aaaa net.IP, err error) {
client := dns.Client{Timeout: time.Second * 5}
m := new(dns.Msg)
m.SetQuestion(domain, dns.TypeAAAA)
var r *dns.Msg
r, _, err = client.Exchange(m, fmt.Sprintf("[%s]:53", ip))
if err != nil {
return
}
if r == nil {
err = errors.New("response is nil")
return
}
if r.Rcode != dns.RcodeSuccess {
err = errors.New("failed to get a valid answer")
return
}
for _, answer := range r.Answer {
if t, ok := answer.(*dns.AAAA); ok {
aaaa = t.AAAA
}
}
return
}
// PORT 80
func check_http(ip, dn string) (err error) {
client := &http.Client{
CheckRedirect: func(req *http.Request, via []*http.Request) error {
return http.ErrUseLastResponse
},
}
req, errr := http.NewRequest("GET", fmt.Sprintf("http://[%s]/", ip), nil)
if errr != nil {
return errr
}
if dn != "" {
req.Header.Add("Host", strings.TrimSuffix(dn, "."))
}
var resp *http.Response
resp, err = client.Do(req)
if err != nil {
return
}
defer resp.Body.Close()
if dn != "" && resp.StatusCode >= 400 {
return fmt.Errorf("Bad status, got: %d (%s)", resp.StatusCode, resp.Status)
}
_, err = ioutil.ReadAll(resp.Body)
return
}
// PORT 443
func check_https(domain, ip string) (err error) {
var resp *http.Response
resp, err = http.Get(fmt.Sprintf("https://%s/", strings.TrimSuffix(domain, ".")))
if err != nil {
return
}
defer resp.Body.Close()
if resp.StatusCode >= 300 && resp.StatusCode < 400 {
loc := resp.Header.Get("Location")
if loc != "" && strings.HasSuffix(dns.Fqdn(loc), domain) {
if dns.Fqdn(loc) == domain {
return fmt.Errorf("Redirection loop %s redirect to %s", domain, loc)
} else if err = check_https(dns.Fqdn(loc), ip); err != nil {
return fmt.Errorf("Error after following redirection to %s: %w", loc, err)
} else {
return
}
}
}
if resp.StatusCode >= 300 {
return fmt.Errorf("Bad status, got: %d (%s)", resp.StatusCode, resp.Status)
}
_, err = ioutil.ReadAll(resp.Body)
return
}
func wksChecker() {
if collectorpubkey == nil {
var err error
if collectorpubkey, err = getCollectorPublicKey(); err != nil {
log.Println("Contact collector:", err)
return
}
}
data, err := encodeData(SendMeta{Login: Login}, map[string]*string{
test_name: nil,
})
if err != nil {
log.Println("Unable to encode message:", err)
return
}
err = sendData(data)
if err != nil {
log.Println("Unable to send message:", err)
return
}
v, _ := json.Marshal(data)
if verbose {
log.Printf("sent %s", v)
}
return
}

View File

@ -0,0 +1,83 @@
package main
import (
"bytes"
"crypto/ed25519"
"encoding/base64"
"encoding/json"
"io/ioutil"
"net/http"
"time"
)
var (
Login string
KeySign string
target string
)
func getCollectorPublicKey() (key []byte, err error) {
var resp *http.Response
resp, err = http.Get(target + "/api/collector_info")
if err != nil {
return
}
defer resp.Body.Close()
rd := base64.NewDecoder(base64.StdEncoding, json.NewDecoder(resp.Body).Buffered())
return ioutil.ReadAll(rd)
}
type SendMeta struct {
Time time.Time `json:"time"`
Login string `json:"login"`
Test string `json:"test,omitempty"`
}
type SendContent struct {
Meta []byte `json:"meta"`
Data []byte `json:"data"`
Sign []byte `json:"sign"`
Key []byte `json:"key"`
KeySign string `json:"keysign"`
}
func encodeData(meta SendMeta, v interface{}) (data SendContent, err error) {
if meta.Time.IsZero() {
meta.Time = time.Now()
}
var b []byte
b, err = json.Marshal(meta)
if err != nil {
return
}
data.Meta = []byte(base64.StdEncoding.EncodeToString(b))
b, err = json.Marshal(v)
if err != nil {
return
}
data.Data = []byte(base64.StdEncoding.EncodeToString(b))
data.Sign = ed25519.Sign(myprivkey, append(data.Meta, data.Data...))
data.Key = myprivkey.Public().(ed25519.PublicKey)
data.KeySign = KeySign
return
}
func sendData(data SendContent) (err error) {
b := new(bytes.Buffer)
json.NewEncoder(b).Encode(data)
var resp *http.Response
resp, err = http.Post(target+"/remote", "application/json", b)
if err != nil {
return
}
resp.Body.Close()
return
}

View File

@ -0,0 +1 @@
module example.com/mod

152
pkg/minichecker/cmd/main.go Normal file
View File

@ -0,0 +1,152 @@
package main
import (
"bytes"
"crypto/ed25519"
"crypto/sha512"
"flag"
"io/ioutil"
"log"
"math/rand"
"os"
"os/signal"
"path"
"syscall"
"time"
"gopkg.in/fsnotify.v1"
)
var (
myprivkey ed25519.PrivateKey
collectorpubkey ed25519.PublicKey
)
func main() {
var tokenfile = flag.String("token-file", "/etc/wireguard/adlin.token", "Path to your token file")
var wgfile = flag.String("wg-file", "/etc/wireguard/adlin.conf", "Path to your wireguard configuration file")
var interval = flag.Duration("check-interval", 30*time.Second, "Interval between two checks")
flag.StringVar(&test_name, "test-name", "", "Name of the test to report")
flag.StringVar(&target, "target", "https://adlin.nemunai.re", "HTTP server to contact")
flag.BoolVar(&verbose, "verbose", verbose, "Enable verbose mode")
flag.Parse()
if test_name == "" {
test_name, _ = os.Hostname()
}
// First load token if it exists
if _, err := os.Stat(*tokenfile); !os.IsNotExist(err) {
if err := loadToken(*tokenfile); err != nil {
log.Fatal("ERROR: Unable to read token file:", err)
}
} else {
log.Fatal("Unable to find token file:", err)
}
// Load of configuration if it exists
if _, err := os.Stat(*wgfile); !os.IsNotExist(err) {
if err := loadSettings(*wgfile); err != nil {
log.Println("ERROR: Unable to read wg settings:", err)
}
}
// Register SIGHUP
c := make(chan os.Signal, 1)
signal.Notify(c, syscall.SIGHUP)
go func() {
for range c {
log.Println("SIGHUP received, reloading settings...")
if err := loadSettings(*wgfile); err != nil {
log.Println("ERROR: Unable to read wg settings:", err)
}
}
}()
// Watch the configuration file
if watcher, err := fsnotify.NewWatcher(); err != nil {
log.Fatal(err)
} else {
if err := watcher.Add(path.Dir(*wgfile)); err != nil {
log.Fatal("Unable to watch: ", path.Dir(*wgfile), ": ", err)
}
go func() {
defer watcher.Close()
for {
select {
case ev := <-watcher.Events:
if path.Base(ev.Name) == *wgfile && ev.Op&(fsnotify.Write|fsnotify.Create) != 0 {
log.Println("Settings file changes, reloading it!")
if err := loadSettings(*wgfile); err != nil {
log.Println("ERROR: Unable to read wg settings:", err)
}
}
case err := <-watcher.Errors:
log.Println("watcher error:", err)
}
}
}()
}
// Prepare graceful shutdown
interrupt := make(chan os.Signal, 1)
signal.Notify(interrupt, os.Interrupt, syscall.SIGTERM)
// Delay first check randomly
rand.Seed(time.Now().UnixNano())
n := rand.Intn(10)
time.Sleep(time.Duration(n) * time.Second)
ticker := time.NewTicker(*interval)
defer ticker.Stop()
// Launch checker
//wksChecker()
loop:
for {
select {
case <-interrupt:
break loop
case <-ticker.C:
wksChecker()
}
}
}
func loadToken(filename string) error {
if fd, err := os.Open(filename); err != nil {
return err
} else {
defer fd.Close()
if b, err := ioutil.ReadAll(fd); err != nil {
return err
} else {
seed := sha512.Sum512(bytes.TrimSpace(b))
myprivkey = ed25519.NewKeyFromSeed(seed[:ed25519.SeedSize])
}
return nil
}
}
func loadSettings(filename string) error {
if fd, err := os.Open(filename); err != nil {
return err
} else {
defer fd.Close()
if b, err := ioutil.ReadAll(fd); err != nil {
return err
} else if wgConf, err := FromWgQuick(string(b), "wg0"); err != nil {
return err
} else {
Login = wgConf.Interface.MyLogin
KeySign = wgConf.Interface.KeySign
}
return nil
}
}

409
pkg/minichecker/cmd/wg.go Normal file
View File

@ -0,0 +1,409 @@
/* SPDX-License-Identifier: MIT
*
* Copyright (C) 2019-2021 WireGuard LLC. All Rights Reserved.
*
* From https://git.zx2c4.com/wireguard-windows/conf/
*/
package main
import (
"crypto/subtle"
"encoding/base64"
"encoding/hex"
"fmt"
"net"
"strconv"
"strings"
"time"
)
const KeyLength = 32
type IPCidr struct {
IP net.IP
Cidr uint8
}
type Endpoint struct {
Host string
Port uint16
}
type Key [KeyLength]byte
type HandshakeTime time.Duration
type Bytes uint64
type Config struct {
Name string
Interface Interface
Peers []Peer
}
type Interface struct {
PrivateKey Key
MyLogin string
KeySign string
Addresses []IPCidr
ListenPort uint16
MTU uint16
DNS []net.IP
DNSSearch []string
PreUp string
PostUp string
PreDown string
PostDown string
}
type Peer struct {
PublicKey Key
PresharedKey Key
AllowedIPs []IPCidr
Endpoint Endpoint
PersistentKeepalive uint16
RxBytes Bytes
TxBytes Bytes
LastHandshakeTime HandshakeTime
}
func (k *Key) IsZero() bool {
var zeros Key
return subtle.ConstantTimeCompare(zeros[:], k[:]) == 1
}
type ParseError struct {
why string
offender string
}
func (e *ParseError) Error() string {
return fmt.Sprintf("%s: %q", e.why, e.offender)
}
func parseIPCidr(s string) (ipcidr *IPCidr, err error) {
var addrStr, cidrStr string
var cidr int
i := strings.IndexByte(s, '/')
if i < 0 {
addrStr = s
} else {
addrStr, cidrStr = s[:i], s[i+1:]
}
err = &ParseError{fmt.Sprintf("Invalid IP address"), s}
addr := net.ParseIP(addrStr)
if addr == nil {
return
}
maybeV4 := addr.To4()
if maybeV4 != nil {
addr = maybeV4
}
if len(cidrStr) > 0 {
err = &ParseError{fmt.Sprintf("Invalid network prefix length"), s}
cidr, err = strconv.Atoi(cidrStr)
if err != nil || cidr < 0 || cidr > 128 {
return
}
if cidr > 32 && maybeV4 != nil {
return
}
} else {
if maybeV4 != nil {
cidr = 32
} else {
cidr = 128
}
}
return &IPCidr{addr, uint8(cidr)}, nil
}
func parseEndpoint(s string) (*Endpoint, error) {
i := strings.LastIndexByte(s, ':')
if i < 0 {
return nil, &ParseError{fmt.Sprintf("Missing port from endpoint"), s}
}
host, portStr := s[:i], s[i+1:]
if len(host) < 1 {
return nil, &ParseError{fmt.Sprintf("Invalid endpoint host"), host}
}
port, err := parsePort(portStr)
if err != nil {
return nil, err
}
hostColon := strings.IndexByte(host, ':')
if host[0] == '[' || host[len(host)-1] == ']' || hostColon > 0 {
err := &ParseError{fmt.Sprintf("Brackets must contain an IPv6 address"), host}
if len(host) > 3 && host[0] == '[' && host[len(host)-1] == ']' && hostColon > 0 {
end := len(host) - 1
if i := strings.LastIndexByte(host, '%'); i > 1 {
end = i
}
maybeV6 := net.ParseIP(host[1:end])
if maybeV6 == nil || len(maybeV6) != net.IPv6len {
return nil, err
}
} else {
return nil, err
}
host = host[1 : len(host)-1]
}
return &Endpoint{host, uint16(port)}, nil
}
func parseMTU(s string) (uint16, error) {
m, err := strconv.Atoi(s)
if err != nil {
return 0, err
}
if m < 576 || m > 65535 {
return 0, &ParseError{fmt.Sprintf("Invalid MTU"), s}
}
return uint16(m), nil
}
func parsePort(s string) (uint16, error) {
m, err := strconv.Atoi(s)
if err != nil {
return 0, err
}
if m < 0 || m > 65535 {
return 0, &ParseError{fmt.Sprintf("Invalid port"), s}
}
return uint16(m), nil
}
func parsePersistentKeepalive(s string) (uint16, error) {
if s == "off" {
return 0, nil
}
m, err := strconv.Atoi(s)
if err != nil {
return 0, err
}
if m < 0 || m > 65535 {
return 0, &ParseError{fmt.Sprintf("Invalid persistent keepalive"), s}
}
return uint16(m), nil
}
func parseKeyBase64(s string) (*Key, error) {
k, err := base64.StdEncoding.DecodeString(s)
if err != nil {
return nil, &ParseError{fmt.Sprintf("Invalid key: %v", err), s}
}
if len(k) != KeyLength {
return nil, &ParseError{fmt.Sprintf("Keys must decode to exactly 32 bytes"), s}
}
var key Key
copy(key[:], k)
return &key, nil
}
func parseKeyHex(s string) (*Key, error) {
k, err := hex.DecodeString(s)
if err != nil {
return nil, &ParseError{fmt.Sprintf("Invalid key: %v", err), s}
}
if len(k) != KeyLength {
return nil, &ParseError{fmt.Sprintf("Keys must decode to exactly 32 bytes"), s}
}
var key Key
copy(key[:], k)
return &key, nil
}
func parseBytesOrStamp(s string) (uint64, error) {
b, err := strconv.ParseUint(s, 10, 64)
if err != nil {
return 0, &ParseError{fmt.Sprintf("Number must be a number between 0 and 2^64-1: %v", err), s}
}
return b, nil
}
func splitList(s string) ([]string, error) {
var out []string
for _, split := range strings.Split(s, ",") {
trim := strings.TrimSpace(split)
if len(trim) == 0 {
return nil, &ParseError{fmt.Sprintf("Two commas in a row"), s}
}
out = append(out, trim)
}
return out, nil
}
type parserState int
const (
inInterfaceSection parserState = iota
inPeerSection
notInASection
)
func (c *Config) maybeAddPeer(p *Peer) {
if p != nil {
c.Peers = append(c.Peers, *p)
}
}
func FromWgQuick(s string, name string) (*Config, error) {
lines := strings.Split(s, "\n")
parserState := notInASection
conf := Config{Name: name}
sawPrivateKey := false
var peer *Peer
for _, line := range lines {
pound := strings.IndexByte(line, '#')
if pound >= 0 {
if !strings.Contains(line, "MyLogin") && !strings.Contains(line, "KeySign") {
line = line[:pound]
} else {
line = line[pound+1:]
}
}
line = strings.TrimSpace(line)
lineLower := strings.ToLower(line)
if len(line) == 0 {
continue
}
if lineLower == "[interface]" {
conf.maybeAddPeer(peer)
parserState = inInterfaceSection
continue
}
if lineLower == "[peer]" {
conf.maybeAddPeer(peer)
peer = &Peer{}
parserState = inPeerSection
continue
}
if parserState == notInASection {
return nil, &ParseError{fmt.Sprintf("Line must occur in a section"), line}
}
equals := strings.IndexByte(line, '=')
if equals < 0 {
return nil, &ParseError{fmt.Sprintf("Config key is missing an equals separator"), line}
}
key, val := strings.TrimSpace(lineLower[:equals]), strings.TrimSpace(line[equals+1:])
if len(val) == 0 {
return nil, &ParseError{fmt.Sprintf("Key must have a value"), line}
}
if parserState == inInterfaceSection {
switch key {
case "privatekey":
k, err := parseKeyBase64(val)
if err != nil {
return nil, err
}
conf.Interface.PrivateKey = *k
sawPrivateKey = true
case "listenport":
p, err := parsePort(val)
if err != nil {
return nil, err
}
conf.Interface.ListenPort = p
case "mtu":
m, err := parseMTU(val)
if err != nil {
return nil, err
}
conf.Interface.MTU = m
case "address":
addresses, err := splitList(val)
if err != nil {
return nil, err
}
for _, address := range addresses {
a, err := parseIPCidr(address)
if err != nil {
return nil, err
}
conf.Interface.Addresses = append(conf.Interface.Addresses, *a)
}
case "dns":
addresses, err := splitList(val)
if err != nil {
return nil, err
}
for _, address := range addresses {
a := net.ParseIP(address)
if a == nil {
conf.Interface.DNSSearch = append(conf.Interface.DNSSearch, address)
} else {
conf.Interface.DNS = append(conf.Interface.DNS, a)
}
}
case "preup":
conf.Interface.PreUp = val
case "postup":
conf.Interface.PostUp = val
case "predown":
conf.Interface.PreDown = val
case "postdown":
conf.Interface.PostDown = val
default:
return nil, &ParseError{fmt.Sprintf("Invalid key for [Interface] section"), key}
}
} else if parserState == inPeerSection {
switch key {
case "publickey":
k, err := parseKeyBase64(val)
if err != nil {
return nil, err
}
peer.PublicKey = *k
case "presharedkey":
k, err := parseKeyBase64(val)
if err != nil {
return nil, err
}
peer.PresharedKey = *k
case "allowedips":
addresses, err := splitList(val)
if err != nil {
return nil, err
}
for _, address := range addresses {
a, err := parseIPCidr(address)
if err != nil {
return nil, err
}
peer.AllowedIPs = append(peer.AllowedIPs, *a)
}
case "persistentkeepalive":
p, err := parsePersistentKeepalive(val)
if err != nil {
return nil, err
}
peer.PersistentKeepalive = p
case "endpoint":
e, err := parseEndpoint(val)
if err != nil {
return nil, err
}
peer.Endpoint = *e
case "mylogin":
conf.Interface.MyLogin = val
case "keysign":
conf.Interface.KeySign = val
default:
return nil, &ParseError{fmt.Sprintf("Invalid key for [Peer] section"), key}
}
}
}
conf.maybeAddPeer(peer)
if !sawPrivateKey {
return nil, &ParseError{fmt.Sprintf("An interface must have a private key"), fmt.Sprintf("[none specified]")}
}
for _, p := range conf.Peers {
if p.PublicKey.IsZero() {
return nil, &ParseError{fmt.Sprintf("All peers must have public keys"), fmt.Sprintf("[none specified]")}
}
}
return &conf, nil
}