tun_windows.go 6.9 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291
  1. //go:build !e2e_testing
  2. // +build !e2e_testing
  3. package overlay
  4. import (
  5. "crypto"
  6. "fmt"
  7. "io"
  8. "net/netip"
  9. "os"
  10. "path/filepath"
  11. "runtime"
  12. "sync/atomic"
  13. "syscall"
  14. "unsafe"
  15. "github.com/gaissmai/bart"
  16. "github.com/sirupsen/logrus"
  17. "github.com/slackhq/nebula/config"
  18. "github.com/slackhq/nebula/routing"
  19. "github.com/slackhq/nebula/util"
  20. "github.com/slackhq/nebula/wintun"
  21. "golang.org/x/sys/windows"
  22. "golang.zx2c4.com/wireguard/windows/tunnel/winipcfg"
  23. )
  24. const tunGUIDLabel = "Fixed Nebula Windows GUID v1"
  25. type winTun struct {
  26. Device string
  27. vpnNetworks []netip.Prefix
  28. MTU int
  29. Routes atomic.Pointer[[]Route]
  30. routeTree atomic.Pointer[bart.Table[routing.Gateways]]
  31. l *logrus.Logger
  32. tun *wintun.NativeTun
  33. }
  34. func newTunFromFd(_ *config.C, _ *logrus.Logger, _ int, _ []netip.Prefix) (Device, error) {
  35. return nil, fmt.Errorf("newTunFromFd not supported in Windows")
  36. }
  37. func newTun(c *config.C, l *logrus.Logger, vpnNetworks []netip.Prefix, _ bool) (*winTun, error) {
  38. err := checkWinTunExists()
  39. if err != nil {
  40. return nil, fmt.Errorf("can not load the wintun driver: %w", err)
  41. }
  42. deviceName := c.GetString("tun.dev", "")
  43. guid, err := generateGUIDByDeviceName(deviceName)
  44. if err != nil {
  45. return nil, fmt.Errorf("generate GUID failed: %w", err)
  46. }
  47. t := &winTun{
  48. Device: deviceName,
  49. vpnNetworks: vpnNetworks,
  50. MTU: c.GetInt("tun.mtu", DefaultMTU),
  51. l: l,
  52. }
  53. err = t.reload(c, true)
  54. if err != nil {
  55. return nil, err
  56. }
  57. var tunDevice wintun.Device
  58. tunDevice, err = wintun.CreateTUNWithRequestedGUID(deviceName, guid, t.MTU)
  59. if err != nil {
  60. // Windows 10 has an issue with unclean shutdowns not fully cleaning up the wintun device.
  61. // Trying a second time resolves the issue.
  62. l.WithError(err).Debug("Failed to create wintun device, retrying")
  63. tunDevice, err = wintun.CreateTUNWithRequestedGUID(deviceName, guid, t.MTU)
  64. if err != nil {
  65. return nil, fmt.Errorf("create TUN device failed: %w", err)
  66. }
  67. }
  68. t.tun = tunDevice.(*wintun.NativeTun)
  69. c.RegisterReloadCallback(func(c *config.C) {
  70. err := t.reload(c, false)
  71. if err != nil {
  72. util.LogWithContextIfNeeded("failed to reload tun device", err, t.l)
  73. }
  74. })
  75. return t, nil
  76. }
  77. func (t *winTun) reload(c *config.C, initial bool) error {
  78. change, routes, err := getAllRoutesFromConfig(c, t.vpnNetworks, initial)
  79. if err != nil {
  80. return err
  81. }
  82. if !initial && !change {
  83. return nil
  84. }
  85. routeTree, err := makeRouteTree(t.l, routes, false)
  86. if err != nil {
  87. return err
  88. }
  89. // Teach nebula how to handle the routes before establishing them in the system table
  90. oldRoutes := t.Routes.Swap(&routes)
  91. t.routeTree.Store(routeTree)
  92. if !initial {
  93. // Remove first, if the system removes a wanted route hopefully it will be re-added next
  94. err := t.removeRoutes(findRemovedRoutes(routes, *oldRoutes))
  95. if err != nil {
  96. util.LogWithContextIfNeeded("Failed to remove routes", err, t.l)
  97. }
  98. // Ensure any routes we actually want are installed
  99. err = t.addRoutes(true)
  100. if err != nil {
  101. // Catch any stray logs
  102. util.LogWithContextIfNeeded("Failed to add routes", err, t.l)
  103. }
  104. }
  105. return nil
  106. }
  107. func (t *winTun) Activate() error {
  108. luid := winipcfg.LUID(t.tun.LUID())
  109. err := luid.SetIPAddresses(t.vpnNetworks)
  110. if err != nil {
  111. return fmt.Errorf("failed to set address: %w", err)
  112. }
  113. err = t.addRoutes(false)
  114. if err != nil {
  115. return err
  116. }
  117. return nil
  118. }
  119. func (t *winTun) addRoutes(logErrors bool) error {
  120. luid := winipcfg.LUID(t.tun.LUID())
  121. routes := *t.Routes.Load()
  122. foundDefault4 := false
  123. for _, r := range routes {
  124. if len(r.Via) == 0 || !r.Install {
  125. // We don't allow route MTUs so only install routes with a via
  126. continue
  127. }
  128. // Add our unsafe route
  129. // Windows does not support multipath routes natively, so we install only a single route.
  130. // This is not a problem as traffic will always be sent to Nebula which handles the multipath routing internally.
  131. // In effect this provides multipath routing support to windows supporting loadbalancing and redundancy.
  132. err := luid.AddRoute(r.Cidr, r.Via[0].Addr(), uint32(r.Metric))
  133. if err != nil {
  134. retErr := util.NewContextualError("Failed to add route", map[string]interface{}{"route": r}, err)
  135. if logErrors {
  136. retErr.Log(t.l)
  137. continue
  138. } else {
  139. return retErr
  140. }
  141. } else {
  142. t.l.WithField("route", r).Info("Added route")
  143. }
  144. if !foundDefault4 {
  145. if r.Cidr.Bits() == 0 && r.Cidr.Addr().BitLen() == 32 {
  146. foundDefault4 = true
  147. }
  148. }
  149. }
  150. ipif, err := luid.IPInterface(windows.AF_INET)
  151. if err != nil {
  152. return fmt.Errorf("failed to get ip interface: %w", err)
  153. }
  154. ipif.NLMTU = uint32(t.MTU)
  155. if foundDefault4 {
  156. ipif.UseAutomaticMetric = false
  157. ipif.Metric = 0
  158. }
  159. if err := ipif.Set(); err != nil {
  160. return fmt.Errorf("failed to set ip interface: %w", err)
  161. }
  162. return nil
  163. }
  164. func (t *winTun) removeRoutes(routes []Route) error {
  165. luid := winipcfg.LUID(t.tun.LUID())
  166. for _, r := range routes {
  167. if !r.Install {
  168. continue
  169. }
  170. // See comment on luid.AddRoute
  171. err := luid.DeleteRoute(r.Cidr, r.Via[0].Addr())
  172. if err != nil {
  173. t.l.WithError(err).WithField("route", r).Error("Failed to remove route")
  174. } else {
  175. t.l.WithField("route", r).Info("Removed route")
  176. }
  177. }
  178. return nil
  179. }
  180. func (t *winTun) RoutesFor(ip netip.Addr) routing.Gateways {
  181. r, _ := t.routeTree.Load().Lookup(ip)
  182. return r
  183. }
  184. func (t *winTun) Networks() []netip.Prefix {
  185. return t.vpnNetworks
  186. }
  187. func (t *winTun) Name() string {
  188. return t.Device
  189. }
  190. func (t *winTun) Read(b []byte) (int, error) {
  191. return t.tun.Read(b, 0)
  192. }
  193. func (t *winTun) Write(b []byte) (int, error) {
  194. return t.tun.Write(b, 0)
  195. }
  196. func (t *winTun) NewMultiQueueReader() (io.ReadWriteCloser, error) {
  197. return nil, fmt.Errorf("TODO: multiqueue not implemented for windows")
  198. }
  199. func (t *winTun) Close() error {
  200. // It seems that the Windows networking stack doesn't like it when we destroy interfaces that have active routes,
  201. // so to be certain, just remove everything before destroying.
  202. luid := winipcfg.LUID(t.tun.LUID())
  203. _ = luid.FlushRoutes(windows.AF_INET)
  204. _ = luid.FlushIPAddresses(windows.AF_INET)
  205. _ = luid.FlushRoutes(windows.AF_INET6)
  206. _ = luid.FlushIPAddresses(windows.AF_INET6)
  207. _ = luid.FlushDNS(windows.AF_INET)
  208. _ = luid.FlushDNS(windows.AF_INET6)
  209. return t.tun.Close()
  210. }
  211. func generateGUIDByDeviceName(name string) (*windows.GUID, error) {
  212. // GUID is 128 bit
  213. hash := crypto.MD5.New()
  214. _, err := hash.Write([]byte(tunGUIDLabel))
  215. if err != nil {
  216. return nil, err
  217. }
  218. _, err = hash.Write([]byte(name))
  219. if err != nil {
  220. return nil, err
  221. }
  222. sum := hash.Sum(nil)
  223. return (*windows.GUID)(unsafe.Pointer(&sum[0])), nil
  224. }
  225. func checkWinTunExists() error {
  226. myPath, err := os.Executable()
  227. if err != nil {
  228. return err
  229. }
  230. arch := runtime.GOARCH
  231. switch arch {
  232. case "386":
  233. //NOTE: wintun bundles 386 as x86
  234. arch = "x86"
  235. }
  236. _, err = syscall.LoadDLL(filepath.Join(filepath.Dir(myPath), "dist", "windows", "wintun", "bin", arch, "wintun.dll"))
  237. return err
  238. }