tun_darwin.go 13 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566
  1. //go:build !ios && !e2e_testing
  2. // +build !ios,!e2e_testing
  3. package overlay
  4. import (
  5. "errors"
  6. "fmt"
  7. "io"
  8. "net"
  9. "net/netip"
  10. "os"
  11. "sync/atomic"
  12. "syscall"
  13. "unsafe"
  14. "github.com/gaissmai/bart"
  15. "github.com/sirupsen/logrus"
  16. "github.com/slackhq/nebula/config"
  17. "github.com/slackhq/nebula/routing"
  18. "github.com/slackhq/nebula/util"
  19. netroute "golang.org/x/net/route"
  20. "golang.org/x/sys/unix"
  21. )
  22. type tun struct {
  23. io.ReadWriteCloser
  24. Device string
  25. vpnNetworks []netip.Prefix
  26. DefaultMTU int
  27. Routes atomic.Pointer[[]Route]
  28. routeTree atomic.Pointer[bart.Table[routing.Gateways]]
  29. linkAddr *netroute.LinkAddr
  30. l *logrus.Logger
  31. // cache out buffer since we need to prepend 4 bytes for tun metadata
  32. out []byte
  33. }
  34. type ifReq struct {
  35. Name [unix.IFNAMSIZ]byte
  36. Flags uint16
  37. pad [8]byte
  38. }
  39. const (
  40. _SIOCAIFADDR_IN6 = 2155899162
  41. _UTUN_OPT_IFNAME = 2
  42. _IN6_IFF_NODAD = 0x0020
  43. _IN6_IFF_SECURED = 0x0400
  44. utunControlName = "com.apple.net.utun_control"
  45. )
  46. type ifreqMTU struct {
  47. Name [16]byte
  48. MTU int32
  49. pad [8]byte
  50. }
  51. type addrLifetime struct {
  52. Expire float64
  53. Preferred float64
  54. Vltime uint32
  55. Pltime uint32
  56. }
  57. type ifreqAlias4 struct {
  58. Name [unix.IFNAMSIZ]byte
  59. Addr unix.RawSockaddrInet4
  60. DstAddr unix.RawSockaddrInet4
  61. MaskAddr unix.RawSockaddrInet4
  62. }
  63. type ifreqAlias6 struct {
  64. Name [unix.IFNAMSIZ]byte
  65. Addr unix.RawSockaddrInet6
  66. DstAddr unix.RawSockaddrInet6
  67. PrefixMask unix.RawSockaddrInet6
  68. Flags uint32
  69. Lifetime addrLifetime
  70. }
  71. func newTun(c *config.C, l *logrus.Logger, vpnNetworks []netip.Prefix, _ bool) (*tun, error) {
  72. name := c.GetString("tun.dev", "")
  73. ifIndex := -1
  74. if name != "" && name != "utun" {
  75. _, err := fmt.Sscanf(name, "utun%d", &ifIndex)
  76. if err != nil || ifIndex < 0 {
  77. // NOTE: we don't make this error so we don't break existing
  78. // configs that set a name before it was used.
  79. l.Warn("interface name must be utun[0-9]+ on Darwin, ignoring")
  80. ifIndex = -1
  81. }
  82. }
  83. fd, err := unix.Socket(unix.AF_SYSTEM, unix.SOCK_DGRAM, unix.AF_SYS_CONTROL)
  84. if err != nil {
  85. return nil, fmt.Errorf("system socket: %v", err)
  86. }
  87. var ctlInfo = &unix.CtlInfo{}
  88. copy(ctlInfo.Name[:], utunControlName)
  89. err = unix.IoctlCtlInfo(fd, ctlInfo)
  90. if err != nil {
  91. return nil, fmt.Errorf("CTLIOCGINFO: %v", err)
  92. }
  93. err = unix.Connect(fd, &unix.SockaddrCtl{
  94. ID: ctlInfo.Id,
  95. Unit: uint32(ifIndex) + 1,
  96. })
  97. if err != nil {
  98. return nil, fmt.Errorf("SYS_CONNECT: %v", err)
  99. }
  100. name, err = unix.GetsockoptString(fd, unix.AF_SYS_CONTROL, _UTUN_OPT_IFNAME)
  101. if err != nil {
  102. return nil, fmt.Errorf("failed to retrieve tun name: %w", err)
  103. }
  104. err = unix.SetNonblock(fd, true)
  105. if err != nil {
  106. return nil, fmt.Errorf("SetNonblock: %v", err)
  107. }
  108. t := &tun{
  109. ReadWriteCloser: os.NewFile(uintptr(fd), ""),
  110. Device: name,
  111. vpnNetworks: vpnNetworks,
  112. DefaultMTU: c.GetInt("tun.mtu", DefaultMTU),
  113. l: l,
  114. }
  115. err = t.reload(c, true)
  116. if err != nil {
  117. return nil, err
  118. }
  119. c.RegisterReloadCallback(func(c *config.C) {
  120. err := t.reload(c, false)
  121. if err != nil {
  122. util.LogWithContextIfNeeded("failed to reload tun device", err, t.l)
  123. }
  124. })
  125. return t, nil
  126. }
  127. func (t *tun) deviceBytes() (o [16]byte) {
  128. for i, c := range t.Device {
  129. o[i] = byte(c)
  130. }
  131. return
  132. }
  133. func newTunFromFd(_ *config.C, _ *logrus.Logger, _ int, _ []netip.Prefix) (*tun, error) {
  134. return nil, fmt.Errorf("newTunFromFd not supported in Darwin")
  135. }
  136. func (t *tun) Close() error {
  137. if t.ReadWriteCloser != nil {
  138. return t.ReadWriteCloser.Close()
  139. }
  140. return nil
  141. }
  142. func (t *tun) Activate() error {
  143. devName := t.deviceBytes()
  144. s, err := unix.Socket(
  145. unix.AF_INET,
  146. unix.SOCK_DGRAM,
  147. unix.IPPROTO_IP,
  148. )
  149. if err != nil {
  150. return err
  151. }
  152. defer unix.Close(s)
  153. fd := uintptr(s)
  154. // Set the MTU on the device
  155. ifm := ifreqMTU{Name: devName, MTU: int32(t.DefaultMTU)}
  156. if err = ioctl(fd, unix.SIOCSIFMTU, uintptr(unsafe.Pointer(&ifm))); err != nil {
  157. return fmt.Errorf("failed to set tun mtu: %v", err)
  158. }
  159. // Get the device flags
  160. ifrf := ifReq{Name: devName}
  161. if err = ioctl(fd, unix.SIOCGIFFLAGS, uintptr(unsafe.Pointer(&ifrf))); err != nil {
  162. return fmt.Errorf("failed to get tun flags: %s", err)
  163. }
  164. linkAddr, err := getLinkAddr(t.Device)
  165. if err != nil {
  166. return err
  167. }
  168. if linkAddr == nil {
  169. return fmt.Errorf("unable to discover link_addr for tun interface")
  170. }
  171. t.linkAddr = linkAddr
  172. for _, network := range t.vpnNetworks {
  173. if network.Addr().Is4() {
  174. err = t.activate4(network)
  175. if err != nil {
  176. return err
  177. }
  178. } else {
  179. err = t.activate6(network)
  180. if err != nil {
  181. return err
  182. }
  183. }
  184. }
  185. // Run the interface
  186. ifrf.Flags = ifrf.Flags | unix.IFF_UP | unix.IFF_RUNNING
  187. if err = ioctl(fd, unix.SIOCSIFFLAGS, uintptr(unsafe.Pointer(&ifrf))); err != nil {
  188. return fmt.Errorf("failed to run tun device: %s", err)
  189. }
  190. // Unsafe path routes
  191. return t.addRoutes(false)
  192. }
  193. func (t *tun) activate4(network netip.Prefix) error {
  194. s, err := unix.Socket(
  195. unix.AF_INET,
  196. unix.SOCK_DGRAM,
  197. unix.IPPROTO_IP,
  198. )
  199. if err != nil {
  200. return err
  201. }
  202. defer unix.Close(s)
  203. ifr := ifreqAlias4{
  204. Name: t.deviceBytes(),
  205. Addr: unix.RawSockaddrInet4{
  206. Len: unix.SizeofSockaddrInet4,
  207. Family: unix.AF_INET,
  208. Addr: network.Addr().As4(),
  209. },
  210. DstAddr: unix.RawSockaddrInet4{
  211. Len: unix.SizeofSockaddrInet4,
  212. Family: unix.AF_INET,
  213. Addr: network.Addr().As4(),
  214. },
  215. MaskAddr: unix.RawSockaddrInet4{
  216. Len: unix.SizeofSockaddrInet4,
  217. Family: unix.AF_INET,
  218. Addr: prefixToMask(network).As4(),
  219. },
  220. }
  221. if err := ioctl(uintptr(s), unix.SIOCAIFADDR, uintptr(unsafe.Pointer(&ifr))); err != nil {
  222. return fmt.Errorf("failed to set tun v4 address: %s", err)
  223. }
  224. err = addRoute(network, t.linkAddr)
  225. if err != nil {
  226. return err
  227. }
  228. return nil
  229. }
  230. func (t *tun) activate6(network netip.Prefix) error {
  231. s, err := unix.Socket(
  232. unix.AF_INET6,
  233. unix.SOCK_DGRAM,
  234. unix.IPPROTO_IP,
  235. )
  236. if err != nil {
  237. return err
  238. }
  239. defer unix.Close(s)
  240. ifr := ifreqAlias6{
  241. Name: t.deviceBytes(),
  242. Addr: unix.RawSockaddrInet6{
  243. Len: unix.SizeofSockaddrInet6,
  244. Family: unix.AF_INET6,
  245. Addr: network.Addr().As16(),
  246. },
  247. PrefixMask: unix.RawSockaddrInet6{
  248. Len: unix.SizeofSockaddrInet6,
  249. Family: unix.AF_INET6,
  250. Addr: prefixToMask(network).As16(),
  251. },
  252. Lifetime: addrLifetime{
  253. // never expires
  254. Vltime: 0xffffffff,
  255. Pltime: 0xffffffff,
  256. },
  257. //TODO: CERT-V2 should we disable DAD (duplicate address detection) and mark this as a secured address?
  258. Flags: _IN6_IFF_NODAD,
  259. }
  260. if err := ioctl(uintptr(s), _SIOCAIFADDR_IN6, uintptr(unsafe.Pointer(&ifr))); err != nil {
  261. return fmt.Errorf("failed to set tun address: %s", err)
  262. }
  263. return nil
  264. }
  265. func (t *tun) reload(c *config.C, initial bool) error {
  266. change, routes, err := getAllRoutesFromConfig(c, t.vpnNetworks, initial)
  267. if err != nil {
  268. return err
  269. }
  270. if !initial && !change {
  271. return nil
  272. }
  273. routeTree, err := makeRouteTree(t.l, routes, false)
  274. if err != nil {
  275. return err
  276. }
  277. // Teach nebula how to handle the routes before establishing them in the system table
  278. oldRoutes := t.Routes.Swap(&routes)
  279. t.routeTree.Store(routeTree)
  280. if !initial {
  281. // Remove first, if the system removes a wanted route hopefully it will be re-added next
  282. err := t.removeRoutes(findRemovedRoutes(routes, *oldRoutes))
  283. if err != nil {
  284. util.LogWithContextIfNeeded("Failed to remove routes", err, t.l)
  285. }
  286. // Ensure any routes we actually want are installed
  287. err = t.addRoutes(true)
  288. if err != nil {
  289. // Catch any stray logs
  290. util.LogWithContextIfNeeded("Failed to add routes", err, t.l)
  291. }
  292. }
  293. return nil
  294. }
  295. func (t *tun) RoutesFor(ip netip.Addr) routing.Gateways {
  296. r, ok := t.routeTree.Load().Lookup(ip)
  297. if ok {
  298. return r
  299. }
  300. return routing.Gateways{}
  301. }
  302. // Get the LinkAddr for the interface of the given name
  303. // Is there an easier way to fetch this when we create the interface?
  304. // Maybe SIOCGIFINDEX? but this doesn't appear to exist in the darwin headers.
  305. func getLinkAddr(name string) (*netroute.LinkAddr, error) {
  306. rib, err := netroute.FetchRIB(unix.AF_UNSPEC, unix.NET_RT_IFLIST, 0)
  307. if err != nil {
  308. return nil, err
  309. }
  310. msgs, err := netroute.ParseRIB(unix.NET_RT_IFLIST, rib)
  311. if err != nil {
  312. return nil, err
  313. }
  314. for _, m := range msgs {
  315. switch m := m.(type) {
  316. case *netroute.InterfaceMessage:
  317. if m.Name == name {
  318. sa, ok := m.Addrs[unix.RTAX_IFP].(*netroute.LinkAddr)
  319. if ok {
  320. return sa, nil
  321. }
  322. }
  323. }
  324. }
  325. return nil, nil
  326. }
  327. func (t *tun) addRoutes(logErrors bool) error {
  328. routes := *t.Routes.Load()
  329. for _, r := range routes {
  330. if len(r.Via) == 0 || !r.Install {
  331. // We don't allow route MTUs so only install routes with a via
  332. continue
  333. }
  334. err := addRoute(r.Cidr, t.linkAddr)
  335. if err != nil {
  336. if errors.Is(err, unix.EEXIST) {
  337. t.l.WithField("route", r.Cidr).
  338. Warnf("unable to add unsafe_route, identical route already exists")
  339. } else {
  340. retErr := util.NewContextualError("Failed to add route", map[string]any{"route": r}, err)
  341. if logErrors {
  342. retErr.Log(t.l)
  343. } else {
  344. return retErr
  345. }
  346. }
  347. } else {
  348. t.l.WithField("route", r).Info("Added route")
  349. }
  350. }
  351. return nil
  352. }
  353. func (t *tun) removeRoutes(routes []Route) error {
  354. for _, r := range routes {
  355. if !r.Install {
  356. continue
  357. }
  358. err := delRoute(r.Cidr, t.linkAddr)
  359. if err != nil {
  360. t.l.WithError(err).WithField("route", r).Error("Failed to remove route")
  361. } else {
  362. t.l.WithField("route", r).Info("Removed route")
  363. }
  364. }
  365. return nil
  366. }
  367. func addRoute(prefix netip.Prefix, gateway netroute.Addr) error {
  368. sock, err := unix.Socket(unix.AF_ROUTE, unix.SOCK_RAW, unix.AF_UNSPEC)
  369. if err != nil {
  370. return fmt.Errorf("unable to create AF_ROUTE socket: %v", err)
  371. }
  372. defer unix.Close(sock)
  373. route := &netroute.RouteMessage{
  374. Version: unix.RTM_VERSION,
  375. Type: unix.RTM_ADD,
  376. Flags: unix.RTF_UP,
  377. Seq: 1,
  378. }
  379. if prefix.Addr().Is4() {
  380. route.Addrs = []netroute.Addr{
  381. unix.RTAX_DST: &netroute.Inet4Addr{IP: prefix.Masked().Addr().As4()},
  382. unix.RTAX_NETMASK: &netroute.Inet4Addr{IP: prefixToMask(prefix).As4()},
  383. unix.RTAX_GATEWAY: gateway,
  384. }
  385. } else {
  386. route.Addrs = []netroute.Addr{
  387. unix.RTAX_DST: &netroute.Inet6Addr{IP: prefix.Masked().Addr().As16()},
  388. unix.RTAX_NETMASK: &netroute.Inet6Addr{IP: prefixToMask(prefix).As16()},
  389. unix.RTAX_GATEWAY: gateway,
  390. }
  391. }
  392. data, err := route.Marshal()
  393. if err != nil {
  394. return fmt.Errorf("failed to create route.RouteMessage: %w", err)
  395. }
  396. _, err = unix.Write(sock, data[:])
  397. if err != nil {
  398. return fmt.Errorf("failed to write route.RouteMessage to socket: %w", err)
  399. }
  400. return nil
  401. }
  402. func delRoute(prefix netip.Prefix, gateway netroute.Addr) error {
  403. sock, err := unix.Socket(unix.AF_ROUTE, unix.SOCK_RAW, unix.AF_UNSPEC)
  404. if err != nil {
  405. return fmt.Errorf("unable to create AF_ROUTE socket: %v", err)
  406. }
  407. defer unix.Close(sock)
  408. route := netroute.RouteMessage{
  409. Version: unix.RTM_VERSION,
  410. Type: unix.RTM_DELETE,
  411. Seq: 1,
  412. }
  413. if prefix.Addr().Is4() {
  414. route.Addrs = []netroute.Addr{
  415. unix.RTAX_DST: &netroute.Inet4Addr{IP: prefix.Masked().Addr().As4()},
  416. unix.RTAX_NETMASK: &netroute.Inet4Addr{IP: prefixToMask(prefix).As4()},
  417. unix.RTAX_GATEWAY: gateway,
  418. }
  419. } else {
  420. route.Addrs = []netroute.Addr{
  421. unix.RTAX_DST: &netroute.Inet6Addr{IP: prefix.Masked().Addr().As16()},
  422. unix.RTAX_NETMASK: &netroute.Inet6Addr{IP: prefixToMask(prefix).As16()},
  423. unix.RTAX_GATEWAY: gateway,
  424. }
  425. }
  426. data, err := route.Marshal()
  427. if err != nil {
  428. return fmt.Errorf("failed to create route.RouteMessage: %w", err)
  429. }
  430. _, err = unix.Write(sock, data[:])
  431. if err != nil {
  432. return fmt.Errorf("failed to write route.RouteMessage to socket: %w", err)
  433. }
  434. return nil
  435. }
  436. func (t *tun) Read(to []byte) (int, error) {
  437. buf := make([]byte, len(to)+4)
  438. n, err := t.ReadWriteCloser.Read(buf)
  439. copy(to, buf[4:])
  440. return n - 4, err
  441. }
  442. // Write is only valid for single threaded use
  443. func (t *tun) Write(from []byte) (int, error) {
  444. buf := t.out
  445. if cap(buf) < len(from)+4 {
  446. buf = make([]byte, len(from)+4)
  447. t.out = buf
  448. }
  449. buf = buf[:len(from)+4]
  450. if len(from) == 0 {
  451. return 0, syscall.EIO
  452. }
  453. // Determine the IP Family for the NULL L2 Header
  454. ipVer := from[0] >> 4
  455. if ipVer == 4 {
  456. buf[3] = syscall.AF_INET
  457. } else if ipVer == 6 {
  458. buf[3] = syscall.AF_INET6
  459. } else {
  460. return 0, fmt.Errorf("unable to determine IP version from packet")
  461. }
  462. copy(buf[4:], from)
  463. n, err := t.ReadWriteCloser.Write(buf)
  464. return n - 4, err
  465. }
  466. func (t *tun) Networks() []netip.Prefix {
  467. return t.vpnNetworks
  468. }
  469. func (t *tun) Name() string {
  470. return t.Device
  471. }
  472. func (t *tun) NewMultiQueueReader() (io.ReadWriteCloser, error) {
  473. return nil, fmt.Errorf("TODO: multiqueue not implemented for darwin")
  474. }
  475. func prefixToMask(prefix netip.Prefix) netip.Addr {
  476. pLen := 128
  477. if prefix.Addr().Is4() {
  478. pLen = 32
  479. }
  480. addr, _ := netip.AddrFromSlice(net.CIDRMask(prefix.Bits(), pLen))
  481. return addr
  482. }