tun_wintun_windows.go 3.9 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183
  1. package overlay
  2. import (
  3. "crypto"
  4. "fmt"
  5. "io"
  6. "net"
  7. "net/netip"
  8. "unsafe"
  9. "github.com/sirupsen/logrus"
  10. "github.com/slackhq/nebula/cidr"
  11. "github.com/slackhq/nebula/iputil"
  12. "github.com/slackhq/nebula/wintun"
  13. "golang.org/x/sys/windows"
  14. "golang.zx2c4.com/wireguard/windows/tunnel/winipcfg"
  15. )
  16. const tunGUIDLabel = "Fixed Nebula Windows GUID v1"
  17. type winTun struct {
  18. Device string
  19. cidr *net.IPNet
  20. prefix netip.Prefix
  21. MTU int
  22. Routes []Route
  23. routeTree *cidr.Tree4
  24. tun *wintun.NativeTun
  25. }
  26. func generateGUIDByDeviceName(name string) (*windows.GUID, error) {
  27. // GUID is 128 bit
  28. hash := crypto.MD5.New()
  29. _, err := hash.Write([]byte(tunGUIDLabel))
  30. if err != nil {
  31. return nil, err
  32. }
  33. _, err = hash.Write([]byte(name))
  34. if err != nil {
  35. return nil, err
  36. }
  37. sum := hash.Sum(nil)
  38. return (*windows.GUID)(unsafe.Pointer(&sum[0])), nil
  39. }
  40. func newWinTun(l *logrus.Logger, deviceName string, cidr *net.IPNet, defaultMTU int, routes []Route) (*winTun, error) {
  41. guid, err := generateGUIDByDeviceName(deviceName)
  42. if err != nil {
  43. return nil, fmt.Errorf("generate GUID failed: %w", err)
  44. }
  45. tunDevice, err := wintun.CreateTUNWithRequestedGUID(deviceName, guid, defaultMTU)
  46. if err != nil {
  47. return nil, fmt.Errorf("create TUN device failed: %w", err)
  48. }
  49. routeTree, err := makeRouteTree(l, routes, false)
  50. if err != nil {
  51. return nil, err
  52. }
  53. prefix, err := iputil.ToNetIpPrefix(*cidr)
  54. if err != nil {
  55. return nil, err
  56. }
  57. return &winTun{
  58. Device: deviceName,
  59. cidr: cidr,
  60. prefix: prefix,
  61. MTU: defaultMTU,
  62. Routes: routes,
  63. routeTree: routeTree,
  64. tun: tunDevice.(*wintun.NativeTun),
  65. }, nil
  66. }
  67. func (t *winTun) Activate() error {
  68. luid := winipcfg.LUID(t.tun.LUID())
  69. if err := luid.SetIPAddresses([]netip.Prefix{t.prefix}); err != nil {
  70. return fmt.Errorf("failed to set address: %w", err)
  71. }
  72. foundDefault4 := false
  73. routes := make([]*winipcfg.RouteData, 0, len(t.Routes)+1)
  74. for _, r := range t.Routes {
  75. if r.Via == nil {
  76. // We don't allow route MTUs so only install routes with a via
  77. continue
  78. }
  79. if !foundDefault4 {
  80. if ones, bits := r.Cidr.Mask.Size(); ones == 0 && bits != 0 {
  81. foundDefault4 = true
  82. }
  83. }
  84. prefix, err := iputil.ToNetIpPrefix(*r.Cidr)
  85. if err != nil {
  86. return err
  87. }
  88. // Add our unsafe route
  89. routes = append(routes, &winipcfg.RouteData{
  90. Destination: prefix,
  91. NextHop: r.Via.ToNetIpAddr(),
  92. Metric: uint32(r.Metric),
  93. })
  94. }
  95. if err := luid.AddRoutes(routes); err != nil {
  96. return fmt.Errorf("failed to add routes: %w", err)
  97. }
  98. ipif, err := luid.IPInterface(windows.AF_INET)
  99. if err != nil {
  100. return fmt.Errorf("failed to get ip interface: %w", err)
  101. }
  102. ipif.NLMTU = uint32(t.MTU)
  103. if foundDefault4 {
  104. ipif.UseAutomaticMetric = false
  105. ipif.Metric = 0
  106. }
  107. if err := ipif.Set(); err != nil {
  108. return fmt.Errorf("failed to set ip interface: %w", err)
  109. }
  110. return nil
  111. }
  112. func (t *winTun) RouteFor(ip iputil.VpnIp) iputil.VpnIp {
  113. r := t.routeTree.MostSpecificContains(ip)
  114. if r != nil {
  115. return r.(iputil.VpnIp)
  116. }
  117. return 0
  118. }
  119. func (t *winTun) Cidr() *net.IPNet {
  120. return t.cidr
  121. }
  122. func (t *winTun) Name() string {
  123. return t.Device
  124. }
  125. func (t *winTun) Read(b []byte) (int, error) {
  126. return t.tun.Read(b, 0)
  127. }
  128. func (t *winTun) Write(b []byte) (int, error) {
  129. return t.tun.Write(b, 0)
  130. }
  131. func (t *winTun) NewMultiQueueReader() (io.ReadWriteCloser, error) {
  132. return nil, fmt.Errorf("TODO: multiqueue not implemented for windows")
  133. }
  134. func (t *winTun) Close() error {
  135. // It seems that the Windows networking stack doesn't like it when we destroy interfaces that have active routes,
  136. // so to be certain, just remove everything before destroying.
  137. luid := winipcfg.LUID(t.tun.LUID())
  138. _ = luid.FlushRoutes(windows.AF_INET)
  139. _ = luid.FlushIPAddresses(windows.AF_INET)
  140. /* We don't support IPV6 yet
  141. _ = luid.FlushRoutes(windows.AF_INET6)
  142. _ = luid.FlushIPAddresses(windows.AF_INET6)
  143. */
  144. _ = luid.FlushDNS(windows.AF_INET)
  145. return t.tun.Close()
  146. }