tun_wintun_windows.go 4.2 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190
  1. package overlay
  2. import (
  3. "crypto"
  4. "fmt"
  5. "io"
  6. "net"
  7. "net/netip"
  8. "unsafe"
  9. "github.com/sirupsen/logrus"
  10. "github.com/slackhq/nebula/cidr"
  11. "github.com/slackhq/nebula/iputil"
  12. "github.com/slackhq/nebula/wintun"
  13. "golang.org/x/sys/windows"
  14. "golang.zx2c4.com/wireguard/windows/tunnel/winipcfg"
  15. )
  16. const tunGUIDLabel = "Fixed Nebula Windows GUID v1"
  17. type winTun struct {
  18. Device string
  19. cidr *net.IPNet
  20. prefix netip.Prefix
  21. MTU int
  22. Routes []Route
  23. routeTree *cidr.Tree4
  24. tun *wintun.NativeTun
  25. }
  26. func generateGUIDByDeviceName(name string) (*windows.GUID, error) {
  27. // GUID is 128 bit
  28. hash := crypto.MD5.New()
  29. _, err := hash.Write([]byte(tunGUIDLabel))
  30. if err != nil {
  31. return nil, err
  32. }
  33. _, err = hash.Write([]byte(name))
  34. if err != nil {
  35. return nil, err
  36. }
  37. sum := hash.Sum(nil)
  38. return (*windows.GUID)(unsafe.Pointer(&sum[0])), nil
  39. }
  40. func newWinTun(l *logrus.Logger, deviceName string, cidr *net.IPNet, defaultMTU int, routes []Route) (*winTun, error) {
  41. guid, err := generateGUIDByDeviceName(deviceName)
  42. if err != nil {
  43. return nil, fmt.Errorf("generate GUID failed: %w", err)
  44. }
  45. var tunDevice wintun.Device
  46. tunDevice, err = wintun.CreateTUNWithRequestedGUID(deviceName, guid, defaultMTU)
  47. if err != nil {
  48. // Windows 10 has an issue with unclean shutdowns not fully cleaning up the wintun device.
  49. // Trying a second time resolves the issue.
  50. l.WithError(err).Debug("Failed to create wintun device, retrying")
  51. tunDevice, err = wintun.CreateTUNWithRequestedGUID(deviceName, guid, defaultMTU)
  52. if err != nil {
  53. return nil, fmt.Errorf("create TUN device failed: %w", err)
  54. }
  55. }
  56. routeTree, err := makeRouteTree(l, routes, false)
  57. if err != nil {
  58. return nil, err
  59. }
  60. prefix, err := iputil.ToNetIpPrefix(*cidr)
  61. if err != nil {
  62. return nil, err
  63. }
  64. return &winTun{
  65. Device: deviceName,
  66. cidr: cidr,
  67. prefix: prefix,
  68. MTU: defaultMTU,
  69. Routes: routes,
  70. routeTree: routeTree,
  71. tun: tunDevice.(*wintun.NativeTun),
  72. }, nil
  73. }
  74. func (t *winTun) Activate() error {
  75. luid := winipcfg.LUID(t.tun.LUID())
  76. if err := luid.SetIPAddresses([]netip.Prefix{t.prefix}); err != nil {
  77. return fmt.Errorf("failed to set address: %w", err)
  78. }
  79. foundDefault4 := false
  80. routes := make([]*winipcfg.RouteData, 0, len(t.Routes)+1)
  81. for _, r := range t.Routes {
  82. if r.Via == nil || !r.Install {
  83. // We don't allow route MTUs so only install routes with a via
  84. continue
  85. }
  86. if !foundDefault4 {
  87. if ones, bits := r.Cidr.Mask.Size(); ones == 0 && bits != 0 {
  88. foundDefault4 = true
  89. }
  90. }
  91. prefix, err := iputil.ToNetIpPrefix(*r.Cidr)
  92. if err != nil {
  93. return err
  94. }
  95. // Add our unsafe route
  96. routes = append(routes, &winipcfg.RouteData{
  97. Destination: prefix,
  98. NextHop: r.Via.ToNetIpAddr(),
  99. Metric: uint32(r.Metric),
  100. })
  101. }
  102. if err := luid.AddRoutes(routes); err != nil {
  103. return fmt.Errorf("failed to add routes: %w", err)
  104. }
  105. ipif, err := luid.IPInterface(windows.AF_INET)
  106. if err != nil {
  107. return fmt.Errorf("failed to get ip interface: %w", err)
  108. }
  109. ipif.NLMTU = uint32(t.MTU)
  110. if foundDefault4 {
  111. ipif.UseAutomaticMetric = false
  112. ipif.Metric = 0
  113. }
  114. if err := ipif.Set(); err != nil {
  115. return fmt.Errorf("failed to set ip interface: %w", err)
  116. }
  117. return nil
  118. }
  119. func (t *winTun) RouteFor(ip iputil.VpnIp) iputil.VpnIp {
  120. r := t.routeTree.MostSpecificContains(ip)
  121. if r != nil {
  122. return r.(iputil.VpnIp)
  123. }
  124. return 0
  125. }
  126. func (t *winTun) Cidr() *net.IPNet {
  127. return t.cidr
  128. }
  129. func (t *winTun) Name() string {
  130. return t.Device
  131. }
  132. func (t *winTun) Read(b []byte) (int, error) {
  133. return t.tun.Read(b, 0)
  134. }
  135. func (t *winTun) Write(b []byte) (int, error) {
  136. return t.tun.Write(b, 0)
  137. }
  138. func (t *winTun) NewMultiQueueReader() (io.ReadWriteCloser, error) {
  139. return nil, fmt.Errorf("TODO: multiqueue not implemented for windows")
  140. }
  141. func (t *winTun) Close() error {
  142. // It seems that the Windows networking stack doesn't like it when we destroy interfaces that have active routes,
  143. // so to be certain, just remove everything before destroying.
  144. luid := winipcfg.LUID(t.tun.LUID())
  145. _ = luid.FlushRoutes(windows.AF_INET)
  146. _ = luid.FlushIPAddresses(windows.AF_INET)
  147. /* We don't support IPV6 yet
  148. _ = luid.FlushRoutes(windows.AF_INET6)
  149. _ = luid.FlushIPAddresses(windows.AF_INET6)
  150. */
  151. _ = luid.FlushDNS(windows.AF_INET)
  152. return t.tun.Close()
  153. }