2022-10-12 18:57:13 +00:00
|
|
|
// Copyright (c) 2022 Tailscale Inc & AUTHORS All rights reserved.
|
|
|
|
// Use of this source code is governed by a BSD-style
|
|
|
|
// license that can be found in the LICENSE file.
|
|
|
|
|
|
|
|
// Package netlog provides a logger that monitors a TUN device and
|
|
|
|
// periodically records any traffic into a log stream.
|
|
|
|
package netlog
|
|
|
|
|
|
|
|
import (
|
|
|
|
"context"
|
|
|
|
"encoding/json"
|
|
|
|
"fmt"
|
|
|
|
"io"
|
|
|
|
"log"
|
|
|
|
"net/http"
|
|
|
|
"net/netip"
|
|
|
|
"sync"
|
|
|
|
"time"
|
|
|
|
|
|
|
|
"golang.org/x/sync/errgroup"
|
|
|
|
"tailscale.com/logpolicy"
|
|
|
|
"tailscale.com/logtail"
|
|
|
|
"tailscale.com/net/tsaddr"
|
|
|
|
"tailscale.com/smallzstd"
|
2022-10-28 17:09:30 +00:00
|
|
|
"tailscale.com/tailcfg"
|
2022-10-27 21:14:18 +00:00
|
|
|
"tailscale.com/types/netlogtype"
|
2022-10-12 18:57:13 +00:00
|
|
|
"tailscale.com/wgengine/router"
|
|
|
|
)
|
|
|
|
|
|
|
|
// pollPeriod specifies how often to poll for network traffic.
|
|
|
|
const pollPeriod = 5 * time.Second
|
|
|
|
|
2022-10-13 17:46:29 +00:00
|
|
|
// Device is an abstraction over a tunnel device or a magic socket.
|
2022-10-12 18:57:13 +00:00
|
|
|
// *tstun.Wrapper implements this interface.
|
2022-10-27 23:26:52 +00:00
|
|
|
// *magicsock.Conn implements this interface.
|
2022-10-12 18:57:13 +00:00
|
|
|
type Device interface {
|
|
|
|
SetStatisticsEnabled(bool)
|
2022-10-27 21:14:18 +00:00
|
|
|
ExtractStatistics() map[netlogtype.Connection]netlogtype.Counts
|
2022-10-12 18:57:13 +00:00
|
|
|
}
|
|
|
|
|
2022-10-13 17:46:29 +00:00
|
|
|
type noopDevice struct{}
|
|
|
|
|
2022-10-27 21:14:18 +00:00
|
|
|
func (noopDevice) SetStatisticsEnabled(bool) {}
|
|
|
|
func (noopDevice) ExtractStatistics() map[netlogtype.Connection]netlogtype.Counts { return nil }
|
2022-10-13 17:46:29 +00:00
|
|
|
|
2022-10-12 18:57:13 +00:00
|
|
|
// Logger logs statistics about every connection.
|
|
|
|
// At present, it only logs connections within a tailscale network.
|
|
|
|
// Exit node traffic is not logged for privacy reasons.
|
|
|
|
// The zero value is ready for use.
|
|
|
|
type Logger struct {
|
|
|
|
mu sync.Mutex
|
|
|
|
|
2022-10-12 22:05:21 +00:00
|
|
|
logger *logtail.Logger
|
2022-10-12 18:57:13 +00:00
|
|
|
|
|
|
|
addrs map[netip.Addr]bool
|
|
|
|
prefixes map[netip.Prefix]bool
|
|
|
|
|
|
|
|
group errgroup.Group
|
|
|
|
cancel context.CancelFunc
|
|
|
|
}
|
|
|
|
|
|
|
|
// Running reports whether the logger is running.
|
|
|
|
func (nl *Logger) Running() bool {
|
|
|
|
nl.mu.Lock()
|
|
|
|
defer nl.mu.Unlock()
|
|
|
|
return nl.logger != nil
|
|
|
|
}
|
|
|
|
|
|
|
|
var testClient *http.Client
|
|
|
|
|
|
|
|
// Startup starts an asynchronous network logger that monitors
|
2022-10-13 17:46:29 +00:00
|
|
|
// statistics for the provided tun and/or sock device.
|
|
|
|
//
|
|
|
|
// The tun Device captures packets within the tailscale network,
|
|
|
|
// where at least one address is a tailscale IP address.
|
|
|
|
// The source is always from the perspective of the current node.
|
|
|
|
// If one of the other endpoint is not a tailscale IP address,
|
|
|
|
// then it suggests the use of a subnet router or exit node.
|
|
|
|
// For example, when using a subnet router, the source address is
|
|
|
|
// the tailscale IP address of the current node, and
|
|
|
|
// the destination address is an IP address within the subnet range.
|
|
|
|
// In contrast, when acting as a subnet router, the source address is
|
|
|
|
// an IP address within the subnet range, and the destination is a
|
|
|
|
// tailscale IP address that initiated the subnet proxy connection.
|
|
|
|
// In this case, the node acting as a subnet router is acting on behalf
|
|
|
|
// of some remote endpoint within the subnet range.
|
|
|
|
// The tun is used to populate the VirtualTraffic, SubnetTraffic,
|
|
|
|
// and ExitTraffic fields in Message.
|
|
|
|
//
|
|
|
|
// The sock Device captures packets at the magicsock layer.
|
|
|
|
// The source is always a tailscale IP address and the destination
|
|
|
|
// is a non-tailscale IP address to contact for that particular tailscale node.
|
|
|
|
// The IP protocol and source port are always zero.
|
|
|
|
// The sock is used to populated the PhysicalTraffic field in Message.
|
2022-10-28 17:09:30 +00:00
|
|
|
func (nl *Logger) Startup(nodeID tailcfg.StableNodeID, nodeLogID, domainLogID logtail.PrivateID, tun, sock Device) error {
|
2022-10-12 18:57:13 +00:00
|
|
|
nl.mu.Lock()
|
|
|
|
defer nl.mu.Unlock()
|
|
|
|
if nl.logger != nil {
|
2022-10-12 22:05:21 +00:00
|
|
|
return fmt.Errorf("network logger already running for %v", nl.logger.PrivateID().Public())
|
2022-10-12 18:57:13 +00:00
|
|
|
}
|
2022-10-13 17:46:29 +00:00
|
|
|
if tun == nil {
|
|
|
|
tun = noopDevice{}
|
|
|
|
}
|
|
|
|
if sock == nil {
|
|
|
|
sock = noopDevice{}
|
|
|
|
}
|
2022-10-12 18:57:13 +00:00
|
|
|
|
|
|
|
httpc := &http.Client{Transport: logpolicy.NewLogtailTransport(logtail.DefaultHost)}
|
|
|
|
if testClient != nil {
|
|
|
|
httpc = testClient
|
|
|
|
}
|
|
|
|
logger := logtail.NewLogger(logtail.Config{
|
|
|
|
Collection: "tailtraffic.log.tailscale.io",
|
2022-10-28 17:09:30 +00:00
|
|
|
PrivateID: nodeLogID,
|
|
|
|
CopyPrivateID: domainLogID,
|
2022-10-12 18:57:13 +00:00
|
|
|
Stderr: io.Discard,
|
|
|
|
// TODO(joetsai): Set Buffer? Use an in-memory buffer for now.
|
|
|
|
NewZstdEncoder: func() logtail.Encoder {
|
|
|
|
w, err := smallzstd.NewEncoder(nil)
|
|
|
|
if err != nil {
|
|
|
|
panic(err)
|
|
|
|
}
|
|
|
|
return w
|
|
|
|
},
|
|
|
|
HTTPC: httpc,
|
|
|
|
|
|
|
|
// Include process sequence numbers to identify missing samples.
|
|
|
|
IncludeProcID: true,
|
|
|
|
IncludeProcSequence: true,
|
|
|
|
}, log.Printf)
|
|
|
|
nl.logger = logger
|
|
|
|
|
|
|
|
ctx, cancel := context.WithCancel(context.Background())
|
|
|
|
nl.cancel = cancel
|
|
|
|
nl.group.Go(func() error {
|
|
|
|
tun.SetStatisticsEnabled(true)
|
|
|
|
defer tun.SetStatisticsEnabled(false)
|
|
|
|
tun.ExtractStatistics() // clear out any stale statistics
|
|
|
|
|
2022-10-13 17:46:29 +00:00
|
|
|
sock.SetStatisticsEnabled(true)
|
|
|
|
defer sock.SetStatisticsEnabled(false)
|
|
|
|
sock.ExtractStatistics() // clear out any stale statistics
|
|
|
|
|
2022-10-12 18:57:13 +00:00
|
|
|
start := time.Now()
|
|
|
|
ticker := time.NewTicker(pollPeriod)
|
|
|
|
for {
|
|
|
|
var end time.Time
|
|
|
|
select {
|
|
|
|
case <-ctx.Done():
|
|
|
|
tun.SetStatisticsEnabled(false)
|
|
|
|
end = time.Now()
|
|
|
|
case end = <-ticker.C:
|
|
|
|
}
|
|
|
|
|
2022-10-13 17:46:29 +00:00
|
|
|
// NOTE: tunStats and sockStats will always be slightly out-of-sync.
|
|
|
|
// It is impossible to have an atomic snapshot of statistics
|
|
|
|
// at both layers without a global mutex that spans all layers.
|
2022-10-12 18:57:13 +00:00
|
|
|
tunStats := tun.ExtractStatistics()
|
2022-10-13 17:46:29 +00:00
|
|
|
sockStats := sock.ExtractStatistics()
|
|
|
|
if len(tunStats)+len(sockStats) > 0 {
|
2022-10-12 18:57:13 +00:00
|
|
|
nl.mu.Lock()
|
|
|
|
addrs := nl.addrs
|
|
|
|
prefixes := nl.prefixes
|
|
|
|
nl.mu.Unlock()
|
2022-10-28 17:09:30 +00:00
|
|
|
recordStatistics(logger, nodeID, start, end, tunStats, sockStats, addrs, prefixes)
|
2022-10-12 18:57:13 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
if ctx.Err() != nil {
|
|
|
|
break
|
|
|
|
}
|
|
|
|
start = end.Add(time.Nanosecond)
|
|
|
|
}
|
|
|
|
return nil
|
|
|
|
})
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2022-10-28 17:09:30 +00:00
|
|
|
func recordStatistics(logger *logtail.Logger, nodeID tailcfg.StableNodeID, start, end time.Time, tunStats, sockStats map[netlogtype.Connection]netlogtype.Counts, addrs map[netip.Addr]bool, prefixes map[netip.Prefix]bool) {
|
|
|
|
m := netlogtype.Message{NodeID: nodeID, Start: start.UTC(), End: end.UTC()}
|
2022-10-13 17:46:29 +00:00
|
|
|
|
2022-10-12 18:57:13 +00:00
|
|
|
classifyAddr := func(a netip.Addr) (isTailscale, withinRoute bool) {
|
|
|
|
// NOTE: There could be mis-classifications where an address is treated
|
|
|
|
// as a Tailscale IP address because the subnet range overlaps with
|
|
|
|
// the subnet range that Tailscale IP addresses are allocated from.
|
2022-10-13 17:46:29 +00:00
|
|
|
// This should never happen for IPv6, but could happen for IPv4.
|
2022-10-12 18:57:13 +00:00
|
|
|
withinRoute = addrs[a]
|
|
|
|
for p := range prefixes {
|
|
|
|
if p.Contains(a) && p.Bits() > 0 {
|
|
|
|
withinRoute = true
|
2022-11-02 21:25:31 +00:00
|
|
|
break
|
2022-10-12 18:57:13 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
return withinRoute && tsaddr.IsTailscaleIP(a), withinRoute && !tsaddr.IsTailscaleIP(a)
|
|
|
|
}
|
|
|
|
|
2022-11-02 21:25:31 +00:00
|
|
|
exitTraffic := make(map[netlogtype.Connection]netlogtype.Counts)
|
2022-10-12 18:57:13 +00:00
|
|
|
for conn, cnts := range tunStats {
|
|
|
|
srcIsTailscaleIP, srcWithinSubnet := classifyAddr(conn.Src.Addr())
|
|
|
|
dstIsTailscaleIP, dstWithinSubnet := classifyAddr(conn.Dst.Addr())
|
|
|
|
switch {
|
|
|
|
case srcIsTailscaleIP && dstIsTailscaleIP:
|
2022-10-27 21:14:18 +00:00
|
|
|
m.VirtualTraffic = append(m.VirtualTraffic, netlogtype.ConnectionCounts{Connection: conn, Counts: cnts})
|
2022-10-12 18:57:13 +00:00
|
|
|
case srcWithinSubnet || dstWithinSubnet:
|
2022-10-27 21:14:18 +00:00
|
|
|
m.SubnetTraffic = append(m.SubnetTraffic, netlogtype.ConnectionCounts{Connection: conn, Counts: cnts})
|
2022-10-12 18:57:13 +00:00
|
|
|
default:
|
|
|
|
const anonymize = true
|
|
|
|
if anonymize {
|
2022-11-02 21:25:31 +00:00
|
|
|
// Only preserve the address if it is a Tailscale IP address.
|
|
|
|
srcOrig, dstOrig := conn.Src, conn.Dst
|
|
|
|
conn = netlogtype.Connection{} // scrub everything by default
|
|
|
|
if srcIsTailscaleIP {
|
|
|
|
conn.Src = netip.AddrPortFrom(srcOrig.Addr(), 0)
|
|
|
|
}
|
|
|
|
if dstIsTailscaleIP {
|
|
|
|
conn.Dst = netip.AddrPortFrom(dstOrig.Addr(), 0)
|
2022-10-12 18:57:13 +00:00
|
|
|
}
|
|
|
|
}
|
2022-11-02 21:25:31 +00:00
|
|
|
exitTraffic[conn] = exitTraffic[conn].Add(cnts)
|
2022-10-12 18:57:13 +00:00
|
|
|
}
|
|
|
|
}
|
2022-11-02 21:25:31 +00:00
|
|
|
for conn, cnts := range exitTraffic {
|
|
|
|
m.ExitTraffic = append(m.ExitTraffic, netlogtype.ConnectionCounts{Connection: conn, Counts: cnts})
|
|
|
|
}
|
2022-10-13 17:46:29 +00:00
|
|
|
for conn, cnts := range sockStats {
|
2022-10-27 21:14:18 +00:00
|
|
|
m.PhysicalTraffic = append(m.PhysicalTraffic, netlogtype.ConnectionCounts{Connection: conn, Counts: cnts})
|
2022-10-12 18:57:13 +00:00
|
|
|
}
|
2022-10-13 17:46:29 +00:00
|
|
|
|
|
|
|
if len(m.VirtualTraffic)+len(m.SubnetTraffic)+len(m.ExitTraffic)+len(m.PhysicalTraffic) > 0 {
|
2022-10-28 17:13:35 +00:00
|
|
|
// TODO(joetsai): Place a hard limit on the size of a network log message.
|
|
|
|
// The log server rejects any payloads above a certain size, so logging
|
|
|
|
// a message that large would cause logtail to be stuck forever trying
|
|
|
|
// and failing to upload the same excessively large payload.
|
|
|
|
//
|
|
|
|
// We should figure out the behavior for handling this. We could split
|
|
|
|
// the message apart so that there are multiple chunks with the same window,
|
|
|
|
// We could also consider reducing the granularity of the data
|
|
|
|
// by dropping port numbers.
|
|
|
|
const maxSize = 256 << 10
|
2022-10-13 17:46:29 +00:00
|
|
|
if b, err := json.Marshal(m); err != nil {
|
|
|
|
logger.Logf("json.Marshal error: %v", err)
|
2022-10-28 17:13:35 +00:00
|
|
|
} else if len(b) > maxSize {
|
|
|
|
logger.Logf("JSON body too large: %dB (virtual:%d subnet:%d exit:%d physical:%d)",
|
|
|
|
len(b), len(m.VirtualTraffic), len(m.SubnetTraffic), len(m.ExitTraffic), len(m.PhysicalTraffic))
|
2022-10-13 17:46:29 +00:00
|
|
|
} else {
|
|
|
|
logger.Logf("%s", b)
|
|
|
|
}
|
2022-10-12 18:57:13 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func makeRouteMaps(cfg *router.Config) (addrs map[netip.Addr]bool, prefixes map[netip.Prefix]bool) {
|
|
|
|
addrs = make(map[netip.Addr]bool)
|
|
|
|
for _, p := range cfg.LocalAddrs {
|
|
|
|
if p.IsSingleIP() {
|
|
|
|
addrs[p.Addr()] = true
|
|
|
|
}
|
|
|
|
}
|
|
|
|
prefixes = make(map[netip.Prefix]bool)
|
|
|
|
insertPrefixes := func(rs []netip.Prefix) {
|
|
|
|
for _, p := range rs {
|
|
|
|
if p.IsSingleIP() {
|
|
|
|
addrs[p.Addr()] = true
|
|
|
|
} else {
|
|
|
|
prefixes[p] = true
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
insertPrefixes(cfg.Routes)
|
|
|
|
insertPrefixes(cfg.SubnetRoutes)
|
|
|
|
return addrs, prefixes
|
|
|
|
}
|
|
|
|
|
|
|
|
// ReconfigRoutes configures the network logger with updated routes.
|
2022-10-13 17:46:29 +00:00
|
|
|
// The cfg is used to classify the types of connections captured by
|
|
|
|
// the tun Device passed to Startup.
|
2022-10-12 18:57:13 +00:00
|
|
|
func (nl *Logger) ReconfigRoutes(cfg *router.Config) {
|
|
|
|
nl.mu.Lock()
|
|
|
|
defer nl.mu.Unlock()
|
|
|
|
// TODO(joetsai): There is a race where deleted routes are not known at
|
|
|
|
// the time of extraction. We need to keep old routes around for a bit.
|
|
|
|
nl.addrs, nl.prefixes = makeRouteMaps(cfg)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Shutdown shuts down the network logger.
|
|
|
|
// This attempts to flush out all pending log messages.
|
2022-10-12 22:05:21 +00:00
|
|
|
// Even if an error is returned, the logger is still shut down.
|
2022-10-12 18:57:13 +00:00
|
|
|
func (nl *Logger) Shutdown(ctx context.Context) error {
|
|
|
|
nl.mu.Lock()
|
|
|
|
defer nl.mu.Unlock()
|
|
|
|
if nl.logger == nil {
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
nl.cancel()
|
|
|
|
nl.mu.Unlock()
|
|
|
|
nl.group.Wait() // do not hold lock while waiting
|
|
|
|
nl.mu.Lock()
|
|
|
|
err := nl.logger.Shutdown(ctx)
|
|
|
|
|
|
|
|
nl.logger = nil
|
|
|
|
nl.addrs = nil
|
|
|
|
nl.prefixes = nil
|
|
|
|
nl.cancel = nil
|
|
|
|
return err
|
|
|
|
}
|