tun_openbsd.go 11 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469
  1. //go:build !e2e_testing
  2. // +build !e2e_testing
  3. package overlay
  4. import (
  5. "errors"
  6. "fmt"
  7. "io"
  8. "net/netip"
  9. "os"
  10. "regexp"
  11. "sync/atomic"
  12. "syscall"
  13. "unsafe"
  14. "github.com/gaissmai/bart"
  15. "github.com/sirupsen/logrus"
  16. "github.com/slackhq/nebula/config"
  17. "github.com/slackhq/nebula/routing"
  18. "github.com/slackhq/nebula/util"
  19. netroute "golang.org/x/net/route"
  20. "golang.org/x/sys/unix"
  21. )
  22. const (
  23. SIOCAIFADDR_IN6 = 0x8080691a
  24. )
  25. type ifreqAlias4 struct {
  26. Name [unix.IFNAMSIZ]byte
  27. Addr unix.RawSockaddrInet4
  28. DstAddr unix.RawSockaddrInet4
  29. MaskAddr unix.RawSockaddrInet4
  30. }
  31. type ifreqAlias6 struct {
  32. Name [unix.IFNAMSIZ]byte
  33. Addr unix.RawSockaddrInet6
  34. DstAddr unix.RawSockaddrInet6
  35. PrefixMask unix.RawSockaddrInet6
  36. Flags uint32
  37. Lifetime [2]uint32
  38. }
  39. type ifreq struct {
  40. Name [unix.IFNAMSIZ]byte
  41. data int
  42. }
  43. type tun struct {
  44. Device string
  45. vpnNetworks []netip.Prefix
  46. MTU int
  47. Routes atomic.Pointer[[]Route]
  48. routeTree atomic.Pointer[bart.Table[routing.Gateways]]
  49. l *logrus.Logger
  50. f *os.File
  51. fd int
  52. // cache out buffer since we need to prepend 4 bytes for tun metadata
  53. out []byte
  54. }
  55. var deviceNameRE = regexp.MustCompile(`^tun[0-9]+$`)
  56. func newTunFromFd(_ *config.C, _ *logrus.Logger, _ int, _ []netip.Prefix) (*tun, error) {
  57. return nil, fmt.Errorf("newTunFromFd not supported in openbsd")
  58. }
  59. func newTun(c *config.C, l *logrus.Logger, vpnNetworks []netip.Prefix, _ bool) (*tun, error) {
  60. // Try to open tun device
  61. var err error
  62. deviceName := c.GetString("tun.dev", "")
  63. if deviceName == "" {
  64. return nil, fmt.Errorf("a device name in the format of /dev/tunN must be specified")
  65. }
  66. if !deviceNameRE.MatchString(deviceName) {
  67. return nil, fmt.Errorf("a device name in the format of /dev/tunN must be specified")
  68. }
  69. fd, err := unix.Open("/dev/"+deviceName, os.O_RDWR, 0)
  70. if err != nil {
  71. return nil, err
  72. }
  73. err = unix.SetNonblock(fd, true)
  74. if err != nil {
  75. l.WithError(err).Warn("Failed to set the tun device as nonblocking")
  76. }
  77. t := &tun{
  78. f: os.NewFile(uintptr(fd), ""),
  79. fd: fd,
  80. Device: deviceName,
  81. vpnNetworks: vpnNetworks,
  82. MTU: c.GetInt("tun.mtu", DefaultMTU),
  83. l: l,
  84. }
  85. err = t.reload(c, true)
  86. if err != nil {
  87. return nil, err
  88. }
  89. c.RegisterReloadCallback(func(c *config.C) {
  90. err := t.reload(c, false)
  91. if err != nil {
  92. util.LogWithContextIfNeeded("failed to reload tun device", err, t.l)
  93. }
  94. })
  95. return t, nil
  96. }
  97. func (t *tun) Close() error {
  98. if t.f != nil {
  99. if err := t.f.Close(); err != nil {
  100. return fmt.Errorf("error closing tun file: %w", err)
  101. }
  102. // t.f.Close should have handled it for us but let's be extra sure
  103. _ = unix.Close(t.fd)
  104. }
  105. return nil
  106. }
  107. func (t *tun) Read(to []byte) (int, error) {
  108. buf := make([]byte, len(to)+4)
  109. n, err := t.f.Read(buf)
  110. copy(to, buf[4:])
  111. return n - 4, err
  112. }
  113. // Write is only valid for single threaded use
  114. func (t *tun) Write(from []byte) (int, error) {
  115. buf := t.out
  116. if cap(buf) < len(from)+4 {
  117. buf = make([]byte, len(from)+4)
  118. t.out = buf
  119. }
  120. buf = buf[:len(from)+4]
  121. if len(from) == 0 {
  122. return 0, syscall.EIO
  123. }
  124. // Determine the IP Family for the NULL L2 Header
  125. ipVer := from[0] >> 4
  126. if ipVer == 4 {
  127. buf[3] = syscall.AF_INET
  128. } else if ipVer == 6 {
  129. buf[3] = syscall.AF_INET6
  130. } else {
  131. return 0, fmt.Errorf("unable to determine IP version from packet")
  132. }
  133. copy(buf[4:], from)
  134. n, err := t.f.Write(buf)
  135. return n - 4, err
  136. }
  137. func (t *tun) addIp(cidr netip.Prefix) error {
  138. if cidr.Addr().Is4() {
  139. var req ifreqAlias4
  140. req.Name = t.deviceBytes()
  141. req.Addr = unix.RawSockaddrInet4{
  142. Len: unix.SizeofSockaddrInet4,
  143. Family: unix.AF_INET,
  144. Addr: cidr.Addr().As4(),
  145. }
  146. req.DstAddr = unix.RawSockaddrInet4{
  147. Len: unix.SizeofSockaddrInet4,
  148. Family: unix.AF_INET,
  149. Addr: cidr.Addr().As4(),
  150. }
  151. req.MaskAddr = unix.RawSockaddrInet4{
  152. Len: unix.SizeofSockaddrInet4,
  153. Family: unix.AF_INET,
  154. Addr: prefixToMask(cidr).As4(),
  155. }
  156. s, err := unix.Socket(unix.AF_INET, unix.SOCK_DGRAM, unix.IPPROTO_IP)
  157. if err != nil {
  158. return err
  159. }
  160. defer syscall.Close(s)
  161. if err := ioctl(uintptr(s), unix.SIOCAIFADDR, uintptr(unsafe.Pointer(&req))); err != nil {
  162. return fmt.Errorf("failed to set tun address %s: %s", cidr.Addr(), err)
  163. }
  164. err = addRoute(cidr, t.vpnNetworks)
  165. if err != nil {
  166. return fmt.Errorf("failed to set route for vpn network %v: %w", cidr, err)
  167. }
  168. return nil
  169. }
  170. if cidr.Addr().Is6() {
  171. var req ifreqAlias6
  172. req.Name = t.deviceBytes()
  173. req.Addr = unix.RawSockaddrInet6{
  174. Len: unix.SizeofSockaddrInet6,
  175. Family: unix.AF_INET6,
  176. Addr: cidr.Addr().As16(),
  177. }
  178. req.PrefixMask = unix.RawSockaddrInet6{
  179. Len: unix.SizeofSockaddrInet6,
  180. Family: unix.AF_INET6,
  181. Addr: prefixToMask(cidr).As16(),
  182. }
  183. req.Lifetime[0] = 0xffffffff
  184. req.Lifetime[1] = 0xffffffff
  185. s, err := unix.Socket(unix.AF_INET6, unix.SOCK_DGRAM, unix.IPPROTO_IP)
  186. if err != nil {
  187. return err
  188. }
  189. defer syscall.Close(s)
  190. if err := ioctl(uintptr(s), SIOCAIFADDR_IN6, uintptr(unsafe.Pointer(&req))); err != nil {
  191. return fmt.Errorf("failed to set tun address %s: %s", cidr.Addr().String(), err)
  192. }
  193. return nil
  194. }
  195. return fmt.Errorf("unknown address type %v", cidr)
  196. }
  197. func (t *tun) Activate() error {
  198. err := t.doIoctlByName(unix.SIOCSIFMTU, uint32(t.MTU))
  199. if err != nil {
  200. return fmt.Errorf("failed to set tun mtu: %w", err)
  201. }
  202. for i := range t.vpnNetworks {
  203. err = t.addIp(t.vpnNetworks[i])
  204. if err != nil {
  205. return err
  206. }
  207. }
  208. return t.addRoutes(false)
  209. }
  210. func (t *tun) doIoctlByName(ctl uintptr, value uint32) error {
  211. s, err := unix.Socket(unix.AF_INET, unix.SOCK_DGRAM, unix.IPPROTO_IP)
  212. if err != nil {
  213. return err
  214. }
  215. defer syscall.Close(s)
  216. ir := ifreq{Name: t.deviceBytes(), data: int(value)}
  217. err = ioctl(uintptr(s), ctl, uintptr(unsafe.Pointer(&ir)))
  218. return err
  219. }
  220. func (t *tun) reload(c *config.C, initial bool) error {
  221. change, routes, err := getAllRoutesFromConfig(c, t.vpnNetworks, initial)
  222. if err != nil {
  223. return err
  224. }
  225. if !initial && !change {
  226. return nil
  227. }
  228. routeTree, err := makeRouteTree(t.l, routes, false)
  229. if err != nil {
  230. return err
  231. }
  232. // Teach nebula how to handle the routes before establishing them in the system table
  233. oldRoutes := t.Routes.Swap(&routes)
  234. t.routeTree.Store(routeTree)
  235. if !initial {
  236. // Remove first, if the system removes a wanted route hopefully it will be re-added next
  237. err := t.removeRoutes(findRemovedRoutes(routes, *oldRoutes))
  238. if err != nil {
  239. util.LogWithContextIfNeeded("Failed to remove routes", err, t.l)
  240. }
  241. // Ensure any routes we actually want are installed
  242. err = t.addRoutes(true)
  243. if err != nil {
  244. // Catch any stray logs
  245. util.LogWithContextIfNeeded("Failed to add routes", err, t.l)
  246. }
  247. }
  248. return nil
  249. }
  250. func (t *tun) RoutesFor(ip netip.Addr) routing.Gateways {
  251. r, _ := t.routeTree.Load().Lookup(ip)
  252. return r
  253. }
  254. func (t *tun) Networks() []netip.Prefix {
  255. return t.vpnNetworks
  256. }
  257. func (t *tun) Name() string {
  258. return t.Device
  259. }
  260. func (t *tun) NewMultiQueueReader() (io.ReadWriteCloser, error) {
  261. return nil, fmt.Errorf("TODO: multiqueue not implemented for openbsd")
  262. }
  263. func (t *tun) addRoutes(logErrors bool) error {
  264. routes := *t.Routes.Load()
  265. for _, r := range routes {
  266. if len(r.Via) == 0 || !r.Install {
  267. // We don't allow route MTUs so only install routes with a via
  268. continue
  269. }
  270. err := addRoute(r.Cidr, t.vpnNetworks)
  271. if err != nil {
  272. retErr := util.NewContextualError("Failed to add route", map[string]any{"route": r}, err)
  273. if logErrors {
  274. retErr.Log(t.l)
  275. } else {
  276. return retErr
  277. }
  278. } else {
  279. t.l.WithField("route", r).Info("Added route")
  280. }
  281. }
  282. return nil
  283. }
  284. func (t *tun) removeRoutes(routes []Route) error {
  285. for _, r := range routes {
  286. if !r.Install {
  287. continue
  288. }
  289. err := delRoute(r.Cidr, t.vpnNetworks)
  290. if err != nil {
  291. t.l.WithError(err).WithField("route", r).Error("Failed to remove route")
  292. } else {
  293. t.l.WithField("route", r).Info("Removed route")
  294. }
  295. }
  296. return nil
  297. }
  298. func (t *tun) deviceBytes() (o [16]byte) {
  299. for i, c := range t.Device {
  300. o[i] = byte(c)
  301. }
  302. return
  303. }
  304. func addRoute(prefix netip.Prefix, gateways []netip.Prefix) error {
  305. sock, err := unix.Socket(unix.AF_ROUTE, unix.SOCK_RAW, unix.AF_UNSPEC)
  306. if err != nil {
  307. return fmt.Errorf("unable to create AF_ROUTE socket: %v", err)
  308. }
  309. defer unix.Close(sock)
  310. route := &netroute.RouteMessage{
  311. Version: unix.RTM_VERSION,
  312. Type: unix.RTM_ADD,
  313. Flags: unix.RTF_UP | unix.RTF_GATEWAY,
  314. Seq: 1,
  315. }
  316. if prefix.Addr().Is4() {
  317. gw, err := selectGateway(prefix, gateways)
  318. if err != nil {
  319. return err
  320. }
  321. route.Addrs = []netroute.Addr{
  322. unix.RTAX_DST: &netroute.Inet4Addr{IP: prefix.Masked().Addr().As4()},
  323. unix.RTAX_NETMASK: &netroute.Inet4Addr{IP: prefixToMask(prefix).As4()},
  324. unix.RTAX_GATEWAY: &netroute.Inet4Addr{IP: gw.Addr().As4()},
  325. }
  326. } else {
  327. gw, err := selectGateway(prefix, gateways)
  328. if err != nil {
  329. return err
  330. }
  331. route.Addrs = []netroute.Addr{
  332. unix.RTAX_DST: &netroute.Inet6Addr{IP: prefix.Masked().Addr().As16()},
  333. unix.RTAX_NETMASK: &netroute.Inet6Addr{IP: prefixToMask(prefix).As16()},
  334. unix.RTAX_GATEWAY: &netroute.Inet6Addr{IP: gw.Addr().As16()},
  335. }
  336. }
  337. data, err := route.Marshal()
  338. if err != nil {
  339. return fmt.Errorf("failed to create route.RouteMessage: %w", err)
  340. }
  341. _, err = unix.Write(sock, data[:])
  342. if err != nil {
  343. if errors.Is(err, unix.EEXIST) {
  344. // Try to do a change
  345. route.Type = unix.RTM_CHANGE
  346. data, err = route.Marshal()
  347. if err != nil {
  348. return fmt.Errorf("failed to create route.RouteMessage for change: %w", err)
  349. }
  350. _, err = unix.Write(sock, data[:])
  351. return err
  352. }
  353. return fmt.Errorf("failed to write route.RouteMessage to socket: %w", err)
  354. }
  355. return nil
  356. }
  357. func delRoute(prefix netip.Prefix, gateways []netip.Prefix) error {
  358. sock, err := unix.Socket(unix.AF_ROUTE, unix.SOCK_RAW, unix.AF_UNSPEC)
  359. if err != nil {
  360. return fmt.Errorf("unable to create AF_ROUTE socket: %v", err)
  361. }
  362. defer unix.Close(sock)
  363. route := netroute.RouteMessage{
  364. Version: unix.RTM_VERSION,
  365. Type: unix.RTM_DELETE,
  366. Seq: 1,
  367. }
  368. if prefix.Addr().Is4() {
  369. gw, err := selectGateway(prefix, gateways)
  370. if err != nil {
  371. return err
  372. }
  373. route.Addrs = []netroute.Addr{
  374. unix.RTAX_DST: &netroute.Inet4Addr{IP: prefix.Masked().Addr().As4()},
  375. unix.RTAX_NETMASK: &netroute.Inet4Addr{IP: prefixToMask(prefix).As4()},
  376. unix.RTAX_GATEWAY: &netroute.Inet4Addr{IP: gw.Addr().As4()},
  377. }
  378. } else {
  379. gw, err := selectGateway(prefix, gateways)
  380. if err != nil {
  381. return err
  382. }
  383. route.Addrs = []netroute.Addr{
  384. unix.RTAX_DST: &netroute.Inet6Addr{IP: prefix.Masked().Addr().As16()},
  385. unix.RTAX_NETMASK: &netroute.Inet6Addr{IP: prefixToMask(prefix).As16()},
  386. unix.RTAX_GATEWAY: &netroute.Inet6Addr{IP: gw.Addr().As16()},
  387. }
  388. }
  389. data, err := route.Marshal()
  390. if err != nil {
  391. return fmt.Errorf("failed to create route.RouteMessage: %w", err)
  392. }
  393. _, err = unix.Write(sock, data[:])
  394. if err != nil {
  395. return fmt.Errorf("failed to write route.RouteMessage to socket: %w", err)
  396. }
  397. return nil
  398. }