|
|
@@ -48,12 +48,13 @@ func main() {
|
|
|
// Parse flags
|
|
|
fs := flag.NewFlagSet("natc", flag.ExitOnError)
|
|
|
var (
|
|
|
- debugPort = fs.Int("debug-port", 8893, "Listening port for debug/metrics endpoint")
|
|
|
- hostname = fs.String("hostname", "", "Hostname to register the service under")
|
|
|
- siteID = fs.Uint("site-id", 1, "an integer site ID to use for the ULA prefix which allows for multiple proxies to act in a HA configuration")
|
|
|
- v4PfxStr = fs.String("v4-pfx", "100.64.1.0/24", "comma-separated list of IPv4 prefixes to advertise")
|
|
|
- verboseTSNet = fs.Bool("verbose-tsnet", false, "enable verbose logging in tsnet")
|
|
|
- printULA = fs.Bool("print-ula", false, "print the ULA prefix and exit")
|
|
|
+ debugPort = fs.Int("debug-port", 8893, "Listening port for debug/metrics endpoint")
|
|
|
+ hostname = fs.String("hostname", "", "Hostname to register the service under")
|
|
|
+ siteID = fs.Uint("site-id", 1, "an integer site ID to use for the ULA prefix which allows for multiple proxies to act in a HA configuration")
|
|
|
+ v4PfxStr = fs.String("v4-pfx", "100.64.1.0/24", "comma-separated list of IPv4 prefixes to advertise")
|
|
|
+ verboseTSNet = fs.Bool("verbose-tsnet", false, "enable verbose logging in tsnet")
|
|
|
+ printULA = fs.Bool("print-ula", false, "print the ULA prefix and exit")
|
|
|
+ ignoreDstPfxStr = fs.String("ignore-destinations", "", "comma-separated list of prefixes to ignore")
|
|
|
)
|
|
|
ff.Parse(fs, os.Args[1:], ff.WithEnvVarPrefix("TS_NATC"))
|
|
|
|
|
|
@@ -70,6 +71,24 @@ func main() {
|
|
|
log.Fatalf("site-id must be in the range [0, 65535]")
|
|
|
}
|
|
|
|
|
|
+ var ignoreDstTable *bart.Table[bool]
|
|
|
+ for _, s := range strings.Split(*ignoreDstPfxStr, ",") {
|
|
|
+ s := strings.TrimSpace(s)
|
|
|
+ if s == "" {
|
|
|
+ continue
|
|
|
+ }
|
|
|
+ if ignoreDstTable == nil {
|
|
|
+ ignoreDstTable = &bart.Table[bool]{}
|
|
|
+ }
|
|
|
+ pfx, err := netip.ParsePrefix(s)
|
|
|
+ if err != nil {
|
|
|
+ log.Fatalf("unable to parse prefix: %v", err)
|
|
|
+ }
|
|
|
+ if pfx.Masked() != pfx {
|
|
|
+ log.Fatalf("prefix %v is not normalized (bits are set outside the mask)", pfx)
|
|
|
+ }
|
|
|
+ ignoreDstTable.Insert(pfx, true)
|
|
|
+ }
|
|
|
var v4Prefixes []netip.Prefix
|
|
|
for _, s := range strings.Split(*v4PfxStr, ",") {
|
|
|
p := netip.MustParsePrefix(strings.TrimSpace(s))
|
|
|
@@ -112,11 +131,12 @@ func main() {
|
|
|
}
|
|
|
|
|
|
c := &connector{
|
|
|
- ts: ts,
|
|
|
- lc: lc,
|
|
|
- dnsAddr: dnsAddr,
|
|
|
- v4Ranges: v4Prefixes,
|
|
|
- v6ULA: ula(uint16(*siteID)),
|
|
|
+ ts: ts,
|
|
|
+ lc: lc,
|
|
|
+ dnsAddr: dnsAddr,
|
|
|
+ v4Ranges: v4Prefixes,
|
|
|
+ v6ULA: ula(uint16(*siteID)),
|
|
|
+ ignoreDsts: ignoreDstTable,
|
|
|
}
|
|
|
c.run(ctx)
|
|
|
}
|
|
|
@@ -139,6 +159,15 @@ type connector struct {
|
|
|
v6ULA netip.Prefix
|
|
|
|
|
|
perPeerMap syncs.Map[tailcfg.NodeID, *perPeerState]
|
|
|
+
|
|
|
+ // ignoreDsts is initialized at start up with the contents of --ignore-destinations (if none it is nil)
|
|
|
+ // It is never mutated, only used for lookups.
|
|
|
+ // Users who want to natc a DNS wildcard but not every address record in that domain can supply the
|
|
|
+ // exceptions in --ignore-destinations. When we receive a dns request we will look up the fqdn
|
|
|
+ // and if any of the ip addresses in response to the lookup match any 'ignore destinations' prefix we will
|
|
|
+ // return a dns response that contains the ip addresses we discovered with the lookup (ie not the
|
|
|
+ // natc behavior, which would return a dummy ip address pointing at natc).
|
|
|
+ ignoreDsts *bart.Table[bool]
|
|
|
}
|
|
|
|
|
|
// v6ULA is the ULA prefix used by the app connector to assign IPv6 addresses.
|
|
|
@@ -192,6 +221,26 @@ func (c *connector) serveDNS() {
|
|
|
}
|
|
|
}
|
|
|
|
|
|
+func lookupDestinationIP(domain string) ([]netip.Addr, error) {
|
|
|
+ netIPs, err := net.LookupIP(domain)
|
|
|
+ if err != nil {
|
|
|
+ var dnsError *net.DNSError
|
|
|
+ if errors.As(err, &dnsError) && dnsError.IsNotFound {
|
|
|
+ return nil, nil
|
|
|
+ } else {
|
|
|
+ return nil, err
|
|
|
+ }
|
|
|
+ }
|
|
|
+ var addrs []netip.Addr
|
|
|
+ for _, ip := range netIPs {
|
|
|
+ a, ok := netip.AddrFromSlice(ip)
|
|
|
+ if ok {
|
|
|
+ addrs = append(addrs, a)
|
|
|
+ }
|
|
|
+ }
|
|
|
+ return addrs, nil
|
|
|
+}
|
|
|
+
|
|
|
// handleDNS handles a DNS request to the app connector.
|
|
|
// It generates a response based on the request and the node that sent it.
|
|
|
//
|
|
|
@@ -219,11 +268,44 @@ func (c *connector) handleDNS(pc net.PacketConn, buf []byte, remoteAddr *net.UDP
|
|
|
return
|
|
|
}
|
|
|
|
|
|
+ // If there are destination ips that we don't want to route, we
|
|
|
+ // have to do a dns lookup here to find the destination ip.
|
|
|
+ if c.ignoreDsts != nil {
|
|
|
+ if len(msg.Questions) > 0 {
|
|
|
+ q := msg.Questions[0]
|
|
|
+ switch q.Type {
|
|
|
+ case dnsmessage.TypeAAAA, dnsmessage.TypeA:
|
|
|
+ dstAddrs, err := lookupDestinationIP(q.Name.String())
|
|
|
+ if err != nil {
|
|
|
+ log.Printf("HandleDNS: lookup destination failed: %v\n ", err)
|
|
|
+ return
|
|
|
+ }
|
|
|
+ if c.ignoreDestination(dstAddrs) {
|
|
|
+ bs, err := dnsResponse(&msg, dstAddrs)
|
|
|
+ // TODO (fran): treat as SERVFAIL
|
|
|
+ if err != nil {
|
|
|
+ log.Printf("HandleDNS: generate ignore response failed: %v\n", err)
|
|
|
+ return
|
|
|
+ }
|
|
|
+ _, err = pc.WriteTo(bs, remoteAddr)
|
|
|
+ if err != nil {
|
|
|
+ log.Printf("HandleDNS: write failed: %v\n", err)
|
|
|
+ }
|
|
|
+ return
|
|
|
+ }
|
|
|
+ }
|
|
|
+ }
|
|
|
+ }
|
|
|
+ // None of the destination IP addresses match an ignore destination prefix, do
|
|
|
+ // the natc thing.
|
|
|
+
|
|
|
resp, err := c.generateDNSResponse(&msg, who.Node.ID)
|
|
|
+ // TODO (fran): treat as SERVFAIL
|
|
|
if err != nil {
|
|
|
log.Printf("HandleDNS: connector handling failed: %v\n", err)
|
|
|
return
|
|
|
}
|
|
|
+ // TODO (fran): treat as NXDOMAIN
|
|
|
if len(resp) == 0 {
|
|
|
return
|
|
|
}
|
|
|
@@ -244,6 +326,23 @@ var tsMBox = dnsmessage.MustNewName("support.tailscale.com.")
|
|
|
// argument is the NodeID of the node that sent the request.
|
|
|
func (c *connector) generateDNSResponse(req *dnsmessage.Message, from tailcfg.NodeID) ([]byte, error) {
|
|
|
pm, _ := c.perPeerMap.LoadOrStore(from, &perPeerState{c: c})
|
|
|
+ var addrs []netip.Addr
|
|
|
+ if len(req.Questions) > 0 {
|
|
|
+ switch req.Questions[0].Type {
|
|
|
+ case dnsmessage.TypeAAAA, dnsmessage.TypeA:
|
|
|
+ var err error
|
|
|
+ addrs, err = pm.ipForDomain(req.Questions[0].Name.String())
|
|
|
+ if err != nil {
|
|
|
+ return nil, err
|
|
|
+ }
|
|
|
+ }
|
|
|
+ }
|
|
|
+ return dnsResponse(req, addrs)
|
|
|
+}
|
|
|
+
|
|
|
+// dnsResponse makes a DNS response for the natc. If the dnsmessage is requesting TypeAAAA
|
|
|
+// or TypeA the provided addrs of the requested type will be used.
|
|
|
+func dnsResponse(req *dnsmessage.Message, addrs []netip.Addr) ([]byte, error) {
|
|
|
b := dnsmessage.NewBuilder(nil,
|
|
|
dnsmessage.Header{
|
|
|
ID: req.Header.ID,
|
|
|
@@ -265,51 +364,44 @@ func (c *connector) generateDNSResponse(req *dnsmessage.Message, from tailcfg.No
|
|
|
if err := b.StartAnswers(); err != nil {
|
|
|
return nil, err
|
|
|
}
|
|
|
- var err error
|
|
|
switch q.Type {
|
|
|
case dnsmessage.TypeAAAA, dnsmessage.TypeA:
|
|
|
- var addrs []netip.Addr
|
|
|
- addrs, err = pm.ipForDomain(q.Name.String())
|
|
|
- if err != nil {
|
|
|
- return nil, err
|
|
|
- }
|
|
|
want6 := q.Type == dnsmessage.TypeAAAA
|
|
|
- found := false
|
|
|
for _, ip := range addrs {
|
|
|
if want6 != ip.Is6() {
|
|
|
continue
|
|
|
}
|
|
|
- found = true
|
|
|
if want6 {
|
|
|
- err = b.AAAAResource(
|
|
|
+ if err := b.AAAAResource(
|
|
|
dnsmessage.ResourceHeader{Name: q.Name, Class: q.Class, TTL: 5},
|
|
|
dnsmessage.AAAAResource{AAAA: ip.As16()},
|
|
|
- )
|
|
|
+ ); err != nil {
|
|
|
+ return nil, err
|
|
|
+ }
|
|
|
} else {
|
|
|
- err = b.AResource(
|
|
|
+ if err := b.AResource(
|
|
|
dnsmessage.ResourceHeader{Name: q.Name, Class: q.Class, TTL: 5},
|
|
|
dnsmessage.AResource{A: ip.As4()},
|
|
|
- )
|
|
|
+ ); err != nil {
|
|
|
+ return nil, err
|
|
|
+ }
|
|
|
}
|
|
|
- break
|
|
|
- }
|
|
|
- if !found {
|
|
|
- err = errors.New("no address found")
|
|
|
}
|
|
|
case dnsmessage.TypeSOA:
|
|
|
- err = b.SOAResource(
|
|
|
+ if err := b.SOAResource(
|
|
|
dnsmessage.ResourceHeader{Name: q.Name, Class: q.Class, TTL: 120},
|
|
|
dnsmessage.SOAResource{NS: q.Name, MBox: tsMBox, Serial: 2023030600,
|
|
|
Refresh: 120, Retry: 120, Expire: 120, MinTTL: 60},
|
|
|
- )
|
|
|
+ ); err != nil {
|
|
|
+ return nil, err
|
|
|
+ }
|
|
|
case dnsmessage.TypeNS:
|
|
|
- err = b.NSResource(
|
|
|
+ if err := b.NSResource(
|
|
|
dnsmessage.ResourceHeader{Name: q.Name, Class: q.Class, TTL: 120},
|
|
|
dnsmessage.NSResource{NS: tsMBox},
|
|
|
- )
|
|
|
- }
|
|
|
- if err != nil {
|
|
|
- return nil, err
|
|
|
+ ); err != nil {
|
|
|
+ return nil, err
|
|
|
+ }
|
|
|
}
|
|
|
return b.Finish()
|
|
|
}
|
|
|
@@ -345,6 +437,17 @@ func (c *connector) handleTCPFlow(src, dst netip.AddrPort) (handler func(net.Con
|
|
|
}, true
|
|
|
}
|
|
|
|
|
|
+// ignoreDestination reports whether any of the provided dstAddrs match the prefixes configured
|
|
|
+// in --ignore-destinations
|
|
|
+func (c *connector) ignoreDestination(dstAddrs []netip.Addr) bool {
|
|
|
+ for _, a := range dstAddrs {
|
|
|
+ if _, ok := c.ignoreDsts.Get(a); ok {
|
|
|
+ return true
|
|
|
+ }
|
|
|
+ }
|
|
|
+ return false
|
|
|
+}
|
|
|
+
|
|
|
func proxyTCPConn(c net.Conn, dest string) {
|
|
|
addrPortStr := c.LocalAddr().String()
|
|
|
_, port, err := net.SplitHostPort(addrPortStr)
|