tun_darwin.go 13 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565
  1. //go:build !ios && !e2e_testing
  2. // +build !ios,!e2e_testing
  3. package overlay
  4. import (
  5. "errors"
  6. "fmt"
  7. "io"
  8. "net"
  9. "net/netip"
  10. "os"
  11. "sync/atomic"
  12. "syscall"
  13. "unsafe"
  14. "github.com/gaissmai/bart"
  15. "github.com/sirupsen/logrus"
  16. "github.com/slackhq/nebula/config"
  17. "github.com/slackhq/nebula/util"
  18. netroute "golang.org/x/net/route"
  19. "golang.org/x/sys/unix"
  20. )
  21. type tun struct {
  22. io.ReadWriteCloser
  23. Device string
  24. vpnNetworks []netip.Prefix
  25. DefaultMTU int
  26. Routes atomic.Pointer[[]Route]
  27. routeTree atomic.Pointer[bart.Table[netip.Addr]]
  28. linkAddr *netroute.LinkAddr
  29. l *logrus.Logger
  30. // cache out buffer since we need to prepend 4 bytes for tun metadata
  31. out []byte
  32. }
  33. type ifReq struct {
  34. Name [unix.IFNAMSIZ]byte
  35. Flags uint16
  36. pad [8]byte
  37. }
  38. const (
  39. _SIOCAIFADDR_IN6 = 2155899162
  40. _UTUN_OPT_IFNAME = 2
  41. _IN6_IFF_NODAD = 0x0020
  42. _IN6_IFF_SECURED = 0x0400
  43. utunControlName = "com.apple.net.utun_control"
  44. )
  45. type ifreqMTU struct {
  46. Name [16]byte
  47. MTU int32
  48. pad [8]byte
  49. }
  50. type addrLifetime struct {
  51. Expire float64
  52. Preferred float64
  53. Vltime uint32
  54. Pltime uint32
  55. }
  56. type ifreqAlias4 struct {
  57. Name [unix.IFNAMSIZ]byte
  58. Addr unix.RawSockaddrInet4
  59. DstAddr unix.RawSockaddrInet4
  60. MaskAddr unix.RawSockaddrInet4
  61. }
  62. type ifreqAlias6 struct {
  63. Name [unix.IFNAMSIZ]byte
  64. Addr unix.RawSockaddrInet6
  65. DstAddr unix.RawSockaddrInet6
  66. PrefixMask unix.RawSockaddrInet6
  67. Flags uint32
  68. Lifetime addrLifetime
  69. }
  70. func newTun(c *config.C, l *logrus.Logger, vpnNetworks []netip.Prefix, _ bool) (*tun, error) {
  71. name := c.GetString("tun.dev", "")
  72. ifIndex := -1
  73. if name != "" && name != "utun" {
  74. _, err := fmt.Sscanf(name, "utun%d", &ifIndex)
  75. if err != nil || ifIndex < 0 {
  76. // NOTE: we don't make this error so we don't break existing
  77. // configs that set a name before it was used.
  78. l.Warn("interface name must be utun[0-9]+ on Darwin, ignoring")
  79. ifIndex = -1
  80. }
  81. }
  82. fd, err := unix.Socket(unix.AF_SYSTEM, unix.SOCK_DGRAM, unix.AF_SYS_CONTROL)
  83. if err != nil {
  84. return nil, fmt.Errorf("system socket: %v", err)
  85. }
  86. var ctlInfo = &unix.CtlInfo{}
  87. copy(ctlInfo.Name[:], utunControlName)
  88. err = unix.IoctlCtlInfo(fd, ctlInfo)
  89. if err != nil {
  90. return nil, fmt.Errorf("CTLIOCGINFO: %v", err)
  91. }
  92. err = unix.Connect(fd, &unix.SockaddrCtl{
  93. ID: ctlInfo.Id,
  94. Unit: uint32(ifIndex) + 1,
  95. })
  96. if err != nil {
  97. return nil, fmt.Errorf("SYS_CONNECT: %v", err)
  98. }
  99. name, err = unix.GetsockoptString(fd, unix.AF_SYS_CONTROL, _UTUN_OPT_IFNAME)
  100. if err != nil {
  101. return nil, fmt.Errorf("failed to retrieve tun name: %w", err)
  102. }
  103. err = unix.SetNonblock(fd, true)
  104. if err != nil {
  105. return nil, fmt.Errorf("SetNonblock: %v", err)
  106. }
  107. t := &tun{
  108. ReadWriteCloser: os.NewFile(uintptr(fd), ""),
  109. Device: name,
  110. vpnNetworks: vpnNetworks,
  111. DefaultMTU: c.GetInt("tun.mtu", DefaultMTU),
  112. l: l,
  113. }
  114. err = t.reload(c, true)
  115. if err != nil {
  116. return nil, err
  117. }
  118. c.RegisterReloadCallback(func(c *config.C) {
  119. err := t.reload(c, false)
  120. if err != nil {
  121. util.LogWithContextIfNeeded("failed to reload tun device", err, t.l)
  122. }
  123. })
  124. return t, nil
  125. }
  126. func (t *tun) deviceBytes() (o [16]byte) {
  127. for i, c := range t.Device {
  128. o[i] = byte(c)
  129. }
  130. return
  131. }
  132. func newTunFromFd(_ *config.C, _ *logrus.Logger, _ int, _ []netip.Prefix) (*tun, error) {
  133. return nil, fmt.Errorf("newTunFromFd not supported in Darwin")
  134. }
  135. func (t *tun) Close() error {
  136. if t.ReadWriteCloser != nil {
  137. return t.ReadWriteCloser.Close()
  138. }
  139. return nil
  140. }
  141. func (t *tun) Activate() error {
  142. devName := t.deviceBytes()
  143. s, err := unix.Socket(
  144. unix.AF_INET,
  145. unix.SOCK_DGRAM,
  146. unix.IPPROTO_IP,
  147. )
  148. if err != nil {
  149. return err
  150. }
  151. defer unix.Close(s)
  152. fd := uintptr(s)
  153. // Set the MTU on the device
  154. ifm := ifreqMTU{Name: devName, MTU: int32(t.DefaultMTU)}
  155. if err = ioctl(fd, unix.SIOCSIFMTU, uintptr(unsafe.Pointer(&ifm))); err != nil {
  156. return fmt.Errorf("failed to set tun mtu: %v", err)
  157. }
  158. // Get the device flags
  159. ifrf := ifReq{Name: devName}
  160. if err = ioctl(fd, unix.SIOCGIFFLAGS, uintptr(unsafe.Pointer(&ifrf))); err != nil {
  161. return fmt.Errorf("failed to get tun flags: %s", err)
  162. }
  163. linkAddr, err := getLinkAddr(t.Device)
  164. if err != nil {
  165. return err
  166. }
  167. if linkAddr == nil {
  168. return fmt.Errorf("unable to discover link_addr for tun interface")
  169. }
  170. t.linkAddr = linkAddr
  171. for _, network := range t.vpnNetworks {
  172. if network.Addr().Is4() {
  173. err = t.activate4(network)
  174. if err != nil {
  175. return err
  176. }
  177. } else {
  178. err = t.activate6(network)
  179. if err != nil {
  180. return err
  181. }
  182. }
  183. }
  184. // Run the interface
  185. ifrf.Flags = ifrf.Flags | unix.IFF_UP | unix.IFF_RUNNING
  186. if err = ioctl(fd, unix.SIOCSIFFLAGS, uintptr(unsafe.Pointer(&ifrf))); err != nil {
  187. return fmt.Errorf("failed to run tun device: %s", err)
  188. }
  189. // Unsafe path routes
  190. return t.addRoutes(false)
  191. }
  192. func (t *tun) activate4(network netip.Prefix) error {
  193. s, err := unix.Socket(
  194. unix.AF_INET,
  195. unix.SOCK_DGRAM,
  196. unix.IPPROTO_IP,
  197. )
  198. if err != nil {
  199. return err
  200. }
  201. defer unix.Close(s)
  202. ifr := ifreqAlias4{
  203. Name: t.deviceBytes(),
  204. Addr: unix.RawSockaddrInet4{
  205. Len: unix.SizeofSockaddrInet4,
  206. Family: unix.AF_INET,
  207. Addr: network.Addr().As4(),
  208. },
  209. DstAddr: unix.RawSockaddrInet4{
  210. Len: unix.SizeofSockaddrInet4,
  211. Family: unix.AF_INET,
  212. Addr: network.Addr().As4(),
  213. },
  214. MaskAddr: unix.RawSockaddrInet4{
  215. Len: unix.SizeofSockaddrInet4,
  216. Family: unix.AF_INET,
  217. Addr: prefixToMask(network).As4(),
  218. },
  219. }
  220. if err := ioctl(uintptr(s), unix.SIOCAIFADDR, uintptr(unsafe.Pointer(&ifr))); err != nil {
  221. return fmt.Errorf("failed to set tun v4 address: %s", err)
  222. }
  223. err = addRoute(network, t.linkAddr)
  224. if err != nil {
  225. return err
  226. }
  227. return nil
  228. }
  229. func (t *tun) activate6(network netip.Prefix) error {
  230. s, err := unix.Socket(
  231. unix.AF_INET6,
  232. unix.SOCK_DGRAM,
  233. unix.IPPROTO_IP,
  234. )
  235. if err != nil {
  236. return err
  237. }
  238. defer unix.Close(s)
  239. ifr := ifreqAlias6{
  240. Name: t.deviceBytes(),
  241. Addr: unix.RawSockaddrInet6{
  242. Len: unix.SizeofSockaddrInet6,
  243. Family: unix.AF_INET6,
  244. Addr: network.Addr().As16(),
  245. },
  246. PrefixMask: unix.RawSockaddrInet6{
  247. Len: unix.SizeofSockaddrInet6,
  248. Family: unix.AF_INET6,
  249. Addr: prefixToMask(network).As16(),
  250. },
  251. Lifetime: addrLifetime{
  252. // never expires
  253. Vltime: 0xffffffff,
  254. Pltime: 0xffffffff,
  255. },
  256. //TODO: CERT-V2 should we disable DAD (duplicate address detection) and mark this as a secured address?
  257. Flags: _IN6_IFF_NODAD,
  258. }
  259. if err := ioctl(uintptr(s), _SIOCAIFADDR_IN6, uintptr(unsafe.Pointer(&ifr))); err != nil {
  260. return fmt.Errorf("failed to set tun address: %s", err)
  261. }
  262. return nil
  263. }
  264. func (t *tun) reload(c *config.C, initial bool) error {
  265. change, routes, err := getAllRoutesFromConfig(c, t.vpnNetworks, initial)
  266. if err != nil {
  267. return err
  268. }
  269. if !initial && !change {
  270. return nil
  271. }
  272. routeTree, err := makeRouteTree(t.l, routes, false)
  273. if err != nil {
  274. return err
  275. }
  276. // Teach nebula how to handle the routes before establishing them in the system table
  277. oldRoutes := t.Routes.Swap(&routes)
  278. t.routeTree.Store(routeTree)
  279. if !initial {
  280. // Remove first, if the system removes a wanted route hopefully it will be re-added next
  281. err := t.removeRoutes(findRemovedRoutes(routes, *oldRoutes))
  282. if err != nil {
  283. util.LogWithContextIfNeeded("Failed to remove routes", err, t.l)
  284. }
  285. // Ensure any routes we actually want are installed
  286. err = t.addRoutes(true)
  287. if err != nil {
  288. // Catch any stray logs
  289. util.LogWithContextIfNeeded("Failed to add routes", err, t.l)
  290. }
  291. }
  292. return nil
  293. }
  294. func (t *tun) RouteFor(ip netip.Addr) netip.Addr {
  295. r, ok := t.routeTree.Load().Lookup(ip)
  296. if ok {
  297. return r
  298. }
  299. return netip.Addr{}
  300. }
  301. // Get the LinkAddr for the interface of the given name
  302. // Is there an easier way to fetch this when we create the interface?
  303. // Maybe SIOCGIFINDEX? but this doesn't appear to exist in the darwin headers.
  304. func getLinkAddr(name string) (*netroute.LinkAddr, error) {
  305. rib, err := netroute.FetchRIB(unix.AF_UNSPEC, unix.NET_RT_IFLIST, 0)
  306. if err != nil {
  307. return nil, err
  308. }
  309. msgs, err := netroute.ParseRIB(unix.NET_RT_IFLIST, rib)
  310. if err != nil {
  311. return nil, err
  312. }
  313. for _, m := range msgs {
  314. switch m := m.(type) {
  315. case *netroute.InterfaceMessage:
  316. if m.Name == name {
  317. sa, ok := m.Addrs[unix.RTAX_IFP].(*netroute.LinkAddr)
  318. if ok {
  319. return sa, nil
  320. }
  321. }
  322. }
  323. }
  324. return nil, nil
  325. }
  326. func (t *tun) addRoutes(logErrors bool) error {
  327. routes := *t.Routes.Load()
  328. for _, r := range routes {
  329. if !r.Via.IsValid() || !r.Install {
  330. // We don't allow route MTUs so only install routes with a via
  331. continue
  332. }
  333. err := addRoute(r.Cidr, t.linkAddr)
  334. if err != nil {
  335. if errors.Is(err, unix.EEXIST) {
  336. t.l.WithField("route", r.Cidr).
  337. Warnf("unable to add unsafe_route, identical route already exists")
  338. } else {
  339. retErr := util.NewContextualError("Failed to add route", map[string]interface{}{"route": r}, err)
  340. if logErrors {
  341. retErr.Log(t.l)
  342. } else {
  343. return retErr
  344. }
  345. }
  346. } else {
  347. t.l.WithField("route", r).Info("Added route")
  348. }
  349. }
  350. return nil
  351. }
  352. func (t *tun) removeRoutes(routes []Route) error {
  353. for _, r := range routes {
  354. if !r.Install {
  355. continue
  356. }
  357. err := delRoute(r.Cidr, t.linkAddr)
  358. if err != nil {
  359. t.l.WithError(err).WithField("route", r).Error("Failed to remove route")
  360. } else {
  361. t.l.WithField("route", r).Info("Removed route")
  362. }
  363. }
  364. return nil
  365. }
  366. func addRoute(prefix netip.Prefix, gateway netroute.Addr) error {
  367. sock, err := unix.Socket(unix.AF_ROUTE, unix.SOCK_RAW, unix.AF_UNSPEC)
  368. if err != nil {
  369. return fmt.Errorf("unable to create AF_ROUTE socket: %v", err)
  370. }
  371. defer unix.Close(sock)
  372. route := &netroute.RouteMessage{
  373. Version: unix.RTM_VERSION,
  374. Type: unix.RTM_ADD,
  375. Flags: unix.RTF_UP,
  376. Seq: 1,
  377. }
  378. if prefix.Addr().Is4() {
  379. route.Addrs = []netroute.Addr{
  380. unix.RTAX_DST: &netroute.Inet4Addr{IP: prefix.Masked().Addr().As4()},
  381. unix.RTAX_NETMASK: &netroute.Inet4Addr{IP: prefixToMask(prefix).As4()},
  382. unix.RTAX_GATEWAY: gateway,
  383. }
  384. } else {
  385. route.Addrs = []netroute.Addr{
  386. unix.RTAX_DST: &netroute.Inet6Addr{IP: prefix.Masked().Addr().As16()},
  387. unix.RTAX_NETMASK: &netroute.Inet6Addr{IP: prefixToMask(prefix).As16()},
  388. unix.RTAX_GATEWAY: gateway,
  389. }
  390. }
  391. data, err := route.Marshal()
  392. if err != nil {
  393. return fmt.Errorf("failed to create route.RouteMessage: %w", err)
  394. }
  395. _, err = unix.Write(sock, data[:])
  396. if err != nil {
  397. return fmt.Errorf("failed to write route.RouteMessage to socket: %w", err)
  398. }
  399. return nil
  400. }
  401. func delRoute(prefix netip.Prefix, gateway netroute.Addr) error {
  402. sock, err := unix.Socket(unix.AF_ROUTE, unix.SOCK_RAW, unix.AF_UNSPEC)
  403. if err != nil {
  404. return fmt.Errorf("unable to create AF_ROUTE socket: %v", err)
  405. }
  406. defer unix.Close(sock)
  407. route := netroute.RouteMessage{
  408. Version: unix.RTM_VERSION,
  409. Type: unix.RTM_DELETE,
  410. Seq: 1,
  411. }
  412. if prefix.Addr().Is4() {
  413. route.Addrs = []netroute.Addr{
  414. unix.RTAX_DST: &netroute.Inet4Addr{IP: prefix.Masked().Addr().As4()},
  415. unix.RTAX_NETMASK: &netroute.Inet4Addr{IP: prefixToMask(prefix).As4()},
  416. unix.RTAX_GATEWAY: gateway,
  417. }
  418. } else {
  419. route.Addrs = []netroute.Addr{
  420. unix.RTAX_DST: &netroute.Inet6Addr{IP: prefix.Masked().Addr().As16()},
  421. unix.RTAX_NETMASK: &netroute.Inet6Addr{IP: prefixToMask(prefix).As16()},
  422. unix.RTAX_GATEWAY: gateway,
  423. }
  424. }
  425. data, err := route.Marshal()
  426. if err != nil {
  427. return fmt.Errorf("failed to create route.RouteMessage: %w", err)
  428. }
  429. _, err = unix.Write(sock, data[:])
  430. if err != nil {
  431. return fmt.Errorf("failed to write route.RouteMessage to socket: %w", err)
  432. }
  433. return nil
  434. }
  435. func (t *tun) Read(to []byte) (int, error) {
  436. buf := make([]byte, len(to)+4)
  437. n, err := t.ReadWriteCloser.Read(buf)
  438. copy(to, buf[4:])
  439. return n - 4, err
  440. }
  441. // Write is only valid for single threaded use
  442. func (t *tun) Write(from []byte) (int, error) {
  443. buf := t.out
  444. if cap(buf) < len(from)+4 {
  445. buf = make([]byte, len(from)+4)
  446. t.out = buf
  447. }
  448. buf = buf[:len(from)+4]
  449. if len(from) == 0 {
  450. return 0, syscall.EIO
  451. }
  452. // Determine the IP Family for the NULL L2 Header
  453. ipVer := from[0] >> 4
  454. if ipVer == 4 {
  455. buf[3] = syscall.AF_INET
  456. } else if ipVer == 6 {
  457. buf[3] = syscall.AF_INET6
  458. } else {
  459. return 0, fmt.Errorf("unable to determine IP version from packet")
  460. }
  461. copy(buf[4:], from)
  462. n, err := t.ReadWriteCloser.Write(buf)
  463. return n - 4, err
  464. }
  465. func (t *tun) Networks() []netip.Prefix {
  466. return t.vpnNetworks
  467. }
  468. func (t *tun) Name() string {
  469. return t.Device
  470. }
  471. func (t *tun) NewMultiQueueReader() (io.ReadWriteCloser, error) {
  472. return nil, fmt.Errorf("TODO: multiqueue not implemented for darwin")
  473. }
  474. func prefixToMask(prefix netip.Prefix) netip.Addr {
  475. pLen := 128
  476. if prefix.Addr().Is4() {
  477. pLen = 32
  478. }
  479. addr, _ := netip.AddrFromSlice(net.CIDRMask(prefix.Bits(), pLen))
  480. return addr
  481. }