2020-02-05 22:16:58 +00:00
|
|
|
// Copyright (c) 2020 Tailscale Inc & AUTHORS All rights reserved.
|
|
|
|
// Use of this source code is governed by a BSD-style
|
|
|
|
// license that can be found in the LICENSE file.
|
|
|
|
|
2020-04-30 20:20:09 +00:00
|
|
|
package router
|
2020-02-05 22:16:58 +00:00
|
|
|
|
|
|
|
import (
|
|
|
|
"bytes"
|
|
|
|
"fmt"
|
|
|
|
"io/ioutil"
|
|
|
|
"os"
|
|
|
|
"os/exec"
|
|
|
|
"path/filepath"
|
|
|
|
"strings"
|
|
|
|
|
2020-03-03 20:38:51 +00:00
|
|
|
"github.com/coreos/go-iptables/iptables"
|
2020-02-05 22:16:58 +00:00
|
|
|
"github.com/tailscale/wireguard-go/device"
|
|
|
|
"github.com/tailscale/wireguard-go/tun"
|
2020-05-08 05:17:30 +00:00
|
|
|
"inet.af/netaddr"
|
2020-02-05 22:16:58 +00:00
|
|
|
"tailscale.com/atomicfile"
|
2020-07-07 05:33:29 +00:00
|
|
|
"tailscale.com/net/tsaddr"
|
2020-02-15 03:23:16 +00:00
|
|
|
"tailscale.com/types/logger"
|
2020-02-05 22:16:58 +00:00
|
|
|
)
|
|
|
|
|
2020-05-02 01:55:38 +00:00
|
|
|
// The following bits are added to packet marks for Tailscale use.
|
|
|
|
//
|
|
|
|
// We tried to pick bits sufficiently out of the way that it's
|
2020-05-07 18:01:46 +00:00
|
|
|
// unlikely to collide with existing uses. We have 4 bytes of mark
|
|
|
|
// bits to play with. We leave the lower byte alone on the assumption
|
|
|
|
// that sysadmins would use those. Kubernetes uses a few bits in the
|
|
|
|
// second byte, so we steer clear of that too.
|
2020-05-02 01:55:38 +00:00
|
|
|
//
|
|
|
|
// Empirically, most of the documentation on packet marks on the
|
|
|
|
// internet gives the impression that the marks are 16 bits
|
|
|
|
// wide. Based on this, we theorize that the upper two bytes are
|
|
|
|
// relatively unused in the wild, and so we consume bits starting at
|
|
|
|
// the 17th.
|
|
|
|
//
|
|
|
|
// The constants are in the iptables/iproute2 string format for
|
|
|
|
// matching and setting the bits, so they can be directly embedded in
|
|
|
|
// commands.
|
|
|
|
const (
|
|
|
|
// Packet is from Tailscale and to a subnet route destination, so
|
|
|
|
// is allowed to be routed through this machine.
|
2020-05-28 07:44:09 +00:00
|
|
|
tailscaleSubnetRouteMark = "0x10000"
|
2020-05-02 01:55:38 +00:00
|
|
|
// Packet was originated by tailscaled itself, and must not be
|
|
|
|
// routed over the Tailscale network.
|
2020-05-29 00:43:15 +00:00
|
|
|
//
|
|
|
|
// Keep this in sync with tailscaleBypassMark in
|
|
|
|
// net/netns/netns_linux.go.
|
2020-05-28 07:44:09 +00:00
|
|
|
tailscaleBypassMark = "0x20000"
|
2020-05-02 01:55:38 +00:00
|
|
|
)
|
|
|
|
|
2020-05-15 02:58:22 +00:00
|
|
|
// netfilterRunner abstracts helpers to run netfilter commands. It
|
|
|
|
// exists purely to swap out go-iptables for a fake implementation in
|
|
|
|
// tests.
|
2020-05-14 02:17:19 +00:00
|
|
|
type netfilterRunner interface {
|
|
|
|
Insert(table, chain string, pos int, args ...string) error
|
|
|
|
Append(table, chain string, args ...string) error
|
|
|
|
Exists(table, chain string, args ...string) (bool, error)
|
|
|
|
Delete(table, chain string, args ...string) error
|
|
|
|
ClearChain(table, chain string) error
|
|
|
|
NewChain(table, chain string) error
|
|
|
|
DeleteChain(table, chain string) error
|
|
|
|
}
|
|
|
|
|
2020-02-05 22:16:58 +00:00
|
|
|
type linuxRouter struct {
|
2020-05-13 22:35:22 +00:00
|
|
|
logf func(fmt string, args ...interface{})
|
2020-05-31 08:31:01 +00:00
|
|
|
ipRuleAvailable bool
|
2020-05-13 22:35:22 +00:00
|
|
|
tunname string
|
|
|
|
addrs map[netaddr.IPPrefix]bool
|
|
|
|
routes map[netaddr.IPPrefix]bool
|
|
|
|
snatSubnetRoutes bool
|
|
|
|
netfilterMode NetfilterMode
|
2020-03-03 20:38:51 +00:00
|
|
|
|
2020-05-14 02:17:19 +00:00
|
|
|
ipt4 netfilterRunner
|
|
|
|
cmd commandRunner
|
2020-02-05 22:16:58 +00:00
|
|
|
}
|
|
|
|
|
2020-02-17 17:00:38 +00:00
|
|
|
func newUserspaceRouter(logf logger.Logf, _ *device.Device, tunDev tun.Device) (Router, error) {
|
2020-02-14 23:03:25 +00:00
|
|
|
tunname, err := tunDev.Name()
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
2020-03-03 20:38:51 +00:00
|
|
|
ipt4, err := iptables.NewWithProtocol(iptables.ProtocolIPv4)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
2020-05-14 02:17:19 +00:00
|
|
|
return newUserspaceRouterAdvanced(logf, tunname, ipt4, osCommandRunner{})
|
|
|
|
}
|
|
|
|
|
|
|
|
func newUserspaceRouterAdvanced(logf logger.Logf, tunname string, netfilter netfilterRunner, cmd commandRunner) (Router, error) {
|
2020-05-31 08:31:01 +00:00
|
|
|
_, err := exec.Command("ip", "rule").Output()
|
|
|
|
ipRuleAvailable := (err == nil)
|
|
|
|
|
2020-02-14 23:03:25 +00:00
|
|
|
return &linuxRouter{
|
2020-05-31 08:31:01 +00:00
|
|
|
logf: logf,
|
|
|
|
ipRuleAvailable: ipRuleAvailable,
|
|
|
|
tunname: tunname,
|
|
|
|
netfilterMode: NetfilterOff,
|
|
|
|
ipt4: netfilter,
|
|
|
|
cmd: cmd,
|
2020-02-14 23:03:25 +00:00
|
|
|
}, nil
|
2020-02-05 22:16:58 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
func (r *linuxRouter) Up() error {
|
2020-05-13 22:35:22 +00:00
|
|
|
if err := r.delLegacyNetfilter(); err != nil {
|
2020-05-01 05:34:49 +00:00
|
|
|
return err
|
2020-02-05 22:16:58 +00:00
|
|
|
}
|
2020-05-31 08:31:01 +00:00
|
|
|
if err := r.addIPRules(); err != nil {
|
2020-05-02 01:55:38 +00:00
|
|
|
return err
|
|
|
|
}
|
2020-05-31 08:31:01 +00:00
|
|
|
if err := r.setNetfilterMode(NetfilterOff); err != nil {
|
2020-05-01 05:34:49 +00:00
|
|
|
return err
|
2020-02-05 22:16:58 +00:00
|
|
|
}
|
2020-05-02 01:55:38 +00:00
|
|
|
if err := r.upInterface(); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|
2020-05-01 05:34:49 +00:00
|
|
|
|
2020-05-02 01:55:38 +00:00
|
|
|
func (r *linuxRouter) down() error {
|
|
|
|
if err := r.downInterface(); err != nil {
|
2020-05-01 05:34:49 +00:00
|
|
|
return err
|
2020-02-05 22:16:58 +00:00
|
|
|
}
|
2020-05-31 08:31:01 +00:00
|
|
|
if err := r.delIPRules(); err != nil {
|
2020-05-02 01:55:38 +00:00
|
|
|
return err
|
|
|
|
}
|
2020-05-28 09:52:33 +00:00
|
|
|
if err := r.setNetfilterMode(NetfilterOff); err != nil {
|
2020-05-02 01:55:38 +00:00
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
2020-05-08 00:18:18 +00:00
|
|
|
r.addrs = nil
|
|
|
|
r.routes = nil
|
2020-05-02 01:55:38 +00:00
|
|
|
|
2020-02-05 22:16:58 +00:00
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2020-05-02 01:55:38 +00:00
|
|
|
func (r *linuxRouter) Close() error {
|
|
|
|
var ret error
|
|
|
|
if ret = r.restoreResolvConf(); ret != nil {
|
|
|
|
r.logf("failed to restore system resolv.conf: %v", ret)
|
|
|
|
}
|
|
|
|
if err := r.down(); err != nil {
|
|
|
|
if ret == nil {
|
|
|
|
ret = err
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return ret
|
|
|
|
}
|
|
|
|
|
2020-05-08 01:07:13 +00:00
|
|
|
// Set implements the Router interface.
|
2020-05-12 07:08:52 +00:00
|
|
|
func (r *linuxRouter) Set(cfg *Config) error {
|
|
|
|
if cfg == nil {
|
|
|
|
cfg = &shutdownConfig
|
|
|
|
}
|
|
|
|
|
2020-05-13 22:35:22 +00:00
|
|
|
if err := r.setNetfilterMode(cfg.NetfilterMode); err != nil {
|
|
|
|
return err
|
2020-05-02 01:55:38 +00:00
|
|
|
}
|
|
|
|
|
2020-05-13 22:35:22 +00:00
|
|
|
newAddrs, err := cidrDiff("addr", r.addrs, cfg.LocalAddrs, r.addAddress, r.delAddress, r.logf)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
2020-05-02 01:55:38 +00:00
|
|
|
}
|
2020-05-13 22:35:22 +00:00
|
|
|
r.addrs = newAddrs
|
|
|
|
|
|
|
|
newRoutes, err := cidrDiff("route", r.routes, cfg.Routes, r.addRoute, r.delRoute, r.logf)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
2020-05-02 01:55:38 +00:00
|
|
|
}
|
2020-05-13 22:35:22 +00:00
|
|
|
r.routes = newRoutes
|
|
|
|
|
2020-05-11 20:16:52 +00:00
|
|
|
switch {
|
2020-05-13 22:35:22 +00:00
|
|
|
case cfg.SNATSubnetRoutes == r.snatSubnetRoutes:
|
2020-05-11 20:16:52 +00:00
|
|
|
// state already correct, nothing to do.
|
2020-05-13 22:35:22 +00:00
|
|
|
case cfg.SNATSubnetRoutes:
|
|
|
|
if err := r.addSNATRule(); err != nil {
|
|
|
|
return err
|
2020-05-11 20:16:52 +00:00
|
|
|
}
|
|
|
|
default:
|
2020-05-13 22:35:22 +00:00
|
|
|
if err := r.delSNATRule(); err != nil {
|
|
|
|
return err
|
2020-05-11 20:16:52 +00:00
|
|
|
}
|
|
|
|
}
|
2020-05-13 22:35:22 +00:00
|
|
|
r.snatSubnetRoutes = cfg.SNATSubnetRoutes
|
2020-02-05 22:16:58 +00:00
|
|
|
|
2020-02-11 23:21:24 +00:00
|
|
|
// TODO: this:
|
2020-02-05 22:16:58 +00:00
|
|
|
if false {
|
2020-05-12 07:08:52 +00:00
|
|
|
if err := r.replaceResolvConf(cfg.DNS, cfg.DNSDomains); err != nil {
|
2020-05-28 09:44:44 +00:00
|
|
|
return fmt.Errorf("replacing resolv.conf failed: %w", err)
|
2020-02-05 22:16:58 +00:00
|
|
|
}
|
|
|
|
}
|
2020-05-13 22:35:22 +00:00
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// setNetfilterMode switches the router to the given netfilter
|
|
|
|
// mode. Netfilter state is created or deleted appropriately to
|
|
|
|
// reflect the new mode, and r.snatSubnetRoutes is updated to reflect
|
|
|
|
// the current state of subnet SNATing.
|
|
|
|
func (r *linuxRouter) setNetfilterMode(mode NetfilterMode) error {
|
|
|
|
if r.netfilterMode == mode {
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// Depending on the netfilter mode we switch from and to, we may
|
|
|
|
// have created the Tailscale netfilter chains. If so, we have to
|
|
|
|
// go back through existing router state, and add the netfilter
|
|
|
|
// rules for that state.
|
|
|
|
//
|
|
|
|
// This bool keeps track of whether the current state transition
|
|
|
|
// is one that requires adding rules of existing state.
|
|
|
|
reprocess := false
|
|
|
|
|
|
|
|
switch mode {
|
|
|
|
case NetfilterOff:
|
2020-05-28 09:52:33 +00:00
|
|
|
switch r.netfilterMode {
|
|
|
|
case NetfilterNoDivert:
|
|
|
|
if err := r.delNetfilterBase(); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
2020-05-28 10:59:16 +00:00
|
|
|
if err := r.delNetfilterChains(); err != nil {
|
|
|
|
r.logf("note: %v", err)
|
|
|
|
// harmless, continue.
|
|
|
|
// This can happen if someone left a ref to
|
|
|
|
// this table somewhere else.
|
|
|
|
}
|
2020-05-28 09:52:33 +00:00
|
|
|
case NetfilterOn:
|
|
|
|
if err := r.delNetfilterHooks(); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
if err := r.delNetfilterBase(); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
2020-05-28 10:59:16 +00:00
|
|
|
if err := r.delNetfilterChains(); err != nil {
|
|
|
|
r.logf("note: %v", err)
|
|
|
|
// harmless, continue.
|
|
|
|
// This can happen if someone left a ref to
|
|
|
|
// this table somewhere else.
|
|
|
|
}
|
2020-05-13 22:35:22 +00:00
|
|
|
}
|
|
|
|
r.snatSubnetRoutes = false
|
|
|
|
case NetfilterNoDivert:
|
|
|
|
switch r.netfilterMode {
|
|
|
|
case NetfilterOff:
|
|
|
|
reprocess = true
|
2020-05-28 10:59:16 +00:00
|
|
|
if err := r.addNetfilterChains(); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
2020-05-13 22:35:22 +00:00
|
|
|
if err := r.addNetfilterBase(); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
r.snatSubnetRoutes = false
|
|
|
|
case NetfilterOn:
|
|
|
|
if err := r.delNetfilterHooks(); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
}
|
|
|
|
case NetfilterOn:
|
2020-05-28 10:59:16 +00:00
|
|
|
// Because of bugs in old version of iptables-compat,
|
|
|
|
// we can't add a "-j ts-forward" rule to FORWARD
|
|
|
|
// while ts-forward contains an "-m mark" rule. But
|
|
|
|
// we can add the row *before* populating ts-forward.
|
|
|
|
// So we have to delNetFilterBase, then add the hooks,
|
|
|
|
// then re-addNetFilterBase, just in case.
|
2020-05-13 22:35:22 +00:00
|
|
|
switch r.netfilterMode {
|
|
|
|
case NetfilterOff:
|
|
|
|
reprocess = true
|
2020-05-28 10:59:16 +00:00
|
|
|
if err := r.addNetfilterChains(); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
if err := r.delNetfilterBase(); err != nil {
|
2020-05-13 22:35:22 +00:00
|
|
|
return err
|
|
|
|
}
|
|
|
|
if err := r.addNetfilterHooks(); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
2020-05-28 10:59:16 +00:00
|
|
|
if err := r.addNetfilterBase(); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
2020-05-13 22:35:22 +00:00
|
|
|
r.snatSubnetRoutes = false
|
|
|
|
case NetfilterNoDivert:
|
2020-05-28 10:59:16 +00:00
|
|
|
reprocess = true
|
|
|
|
if err := r.delNetfilterBase(); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
2020-05-13 22:35:22 +00:00
|
|
|
if err := r.addNetfilterHooks(); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
2020-05-28 10:59:16 +00:00
|
|
|
if err := r.addNetfilterBase(); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
r.snatSubnetRoutes = false
|
2020-05-13 22:35:22 +00:00
|
|
|
}
|
|
|
|
default:
|
|
|
|
panic("unhandled netfilter mode")
|
|
|
|
}
|
|
|
|
|
|
|
|
r.netfilterMode = mode
|
|
|
|
|
|
|
|
if !reprocess {
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
for cidr := range r.addrs {
|
|
|
|
if err := r.addLoopbackRule(cidr.IP); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return nil
|
2020-02-05 22:16:58 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
const (
|
|
|
|
tsConf = "/etc/resolv.tailscale.conf"
|
|
|
|
backupConf = "/etc/resolv.pre-tailscale-backup.conf"
|
|
|
|
resolvConf = "/etc/resolv.conf"
|
|
|
|
)
|
|
|
|
|
2020-05-08 05:17:30 +00:00
|
|
|
func (r *linuxRouter) replaceResolvConf(servers []netaddr.IP, domains []string) error {
|
2020-02-05 22:16:58 +00:00
|
|
|
if len(servers) == 0 {
|
|
|
|
return r.restoreResolvConf()
|
|
|
|
}
|
|
|
|
|
|
|
|
// First write the tsConf file.
|
|
|
|
buf := new(bytes.Buffer)
|
|
|
|
fmt.Fprintf(buf, "# resolv.conf(5) file generated by tailscale\n")
|
|
|
|
fmt.Fprintf(buf, "# DO NOT EDIT THIS FILE BY HAND -- CHANGES WILL BE OVERWRITTEN\n\n")
|
|
|
|
for _, ns := range servers {
|
|
|
|
fmt.Fprintf(buf, "nameserver %s\n", ns)
|
|
|
|
}
|
|
|
|
if len(domains) > 0 {
|
|
|
|
fmt.Fprintf(buf, "search "+strings.Join(domains, " ")+"\n")
|
|
|
|
}
|
|
|
|
f, err := ioutil.TempFile(filepath.Dir(tsConf), filepath.Base(tsConf)+".*")
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
f.Close()
|
|
|
|
if err := atomicfile.WriteFile(f.Name(), buf.Bytes(), 0644); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
os.Chmod(f.Name(), 0644) // ioutil.TempFile creates the file with 0600
|
|
|
|
if err := os.Rename(f.Name(), tsConf); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
if linkPath, err := os.Readlink(resolvConf); err != nil {
|
|
|
|
// Remove any old backup that may exist.
|
|
|
|
os.Remove(backupConf)
|
|
|
|
|
|
|
|
// Backup the existing /etc/resolv.conf file.
|
|
|
|
contents, err := ioutil.ReadFile(resolvConf)
|
|
|
|
if os.IsNotExist(err) {
|
2020-02-21 23:27:21 +00:00
|
|
|
// No existing /etc/resolv.conf file to backup.
|
2020-02-05 22:16:58 +00:00
|
|
|
// Nothing to do.
|
|
|
|
return nil
|
|
|
|
} else if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
if err := atomicfile.WriteFile(backupConf, contents, 0644); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
} else if linkPath != tsConf {
|
|
|
|
// Backup the existing symlink.
|
|
|
|
os.Remove(backupConf)
|
|
|
|
if err := os.Symlink(linkPath, backupConf); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
// Nothing to do, resolvConf already points to tsConf.
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
os.Remove(resolvConf)
|
|
|
|
if err := os.Symlink(tsConf, resolvConf); err != nil {
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
out, _ := exec.Command("service", "systemd-resolved", "restart").CombinedOutput()
|
|
|
|
if len(out) > 0 {
|
|
|
|
r.logf("service systemd-resolved restart: %s", out)
|
|
|
|
}
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func (r *linuxRouter) restoreResolvConf() error {
|
|
|
|
if _, err := os.Stat(backupConf); err != nil {
|
|
|
|
if os.IsNotExist(err) {
|
2020-02-21 23:27:21 +00:00
|
|
|
return nil // no backup resolv.conf to restore
|
2020-02-05 22:16:58 +00:00
|
|
|
}
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
if ln, err := os.Readlink(resolvConf); err != nil {
|
|
|
|
return err
|
|
|
|
} else if ln != tsConf {
|
2020-02-21 23:27:21 +00:00
|
|
|
return fmt.Errorf("resolv.conf is not a symlink to %s", tsConf)
|
2020-02-05 22:16:58 +00:00
|
|
|
}
|
|
|
|
if err := os.Rename(backupConf, resolvConf); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
os.Remove(tsConf) // best effort removal of tsConf file
|
|
|
|
out, _ := exec.Command("service", "systemd-resolved", "restart").CombinedOutput()
|
|
|
|
if len(out) > 0 {
|
|
|
|
r.logf("service systemd-resolved restart: %s", out)
|
|
|
|
}
|
|
|
|
return nil
|
|
|
|
}
|
2020-05-02 01:55:38 +00:00
|
|
|
|
2020-05-13 22:35:22 +00:00
|
|
|
// addAddress adds an IP/mask to the tunnel interface. Fails if the
|
|
|
|
// address is already assigned to the interface, or if the addition
|
|
|
|
// fails.
|
2020-05-08 05:17:30 +00:00
|
|
|
func (r *linuxRouter) addAddress(addr netaddr.IPPrefix) error {
|
2020-05-14 02:17:19 +00:00
|
|
|
if err := r.cmd.run("ip", "addr", "add", addr.String(), "dev", r.tunname); err != nil {
|
2020-05-28 09:44:44 +00:00
|
|
|
return fmt.Errorf("adding address %q to tunnel interface: %w", addr, err)
|
2020-05-11 23:41:29 +00:00
|
|
|
}
|
2020-05-13 22:35:22 +00:00
|
|
|
if err := r.addLoopbackRule(addr.IP); err != nil {
|
2020-05-11 23:41:29 +00:00
|
|
|
return err
|
|
|
|
}
|
|
|
|
return nil
|
2020-05-02 01:55:38 +00:00
|
|
|
}
|
|
|
|
|
2020-05-13 22:35:22 +00:00
|
|
|
// delAddress removes an IP/mask from the tunnel interface. Fails if
|
|
|
|
// the address is not assigned to the interface, or if the removal
|
|
|
|
// fails.
|
2020-05-08 05:17:30 +00:00
|
|
|
func (r *linuxRouter) delAddress(addr netaddr.IPPrefix) error {
|
2020-05-13 22:35:22 +00:00
|
|
|
if err := r.delLoopbackRule(addr.IP); err != nil {
|
2020-05-11 23:41:29 +00:00
|
|
|
return err
|
|
|
|
}
|
2020-05-14 02:17:19 +00:00
|
|
|
if err := r.cmd.run("ip", "addr", "del", addr.String(), "dev", r.tunname); err != nil {
|
2020-05-28 09:44:44 +00:00
|
|
|
return fmt.Errorf("deleting address %q from tunnel interface: %w", addr, err)
|
2020-05-11 23:41:29 +00:00
|
|
|
}
|
|
|
|
return nil
|
2020-05-02 01:55:38 +00:00
|
|
|
}
|
|
|
|
|
2020-05-13 22:35:22 +00:00
|
|
|
// addLoopbackRule adds a firewall rule to permit loopback traffic to
|
|
|
|
// a local Tailscale IP.
|
|
|
|
func (r *linuxRouter) addLoopbackRule(addr netaddr.IP) error {
|
|
|
|
if r.netfilterMode == NetfilterOff {
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
if err := r.ipt4.Insert("filter", "ts-input", 1, "-i", "lo", "-s", addr.String(), "-j", "ACCEPT"); err != nil {
|
2020-05-28 09:44:44 +00:00
|
|
|
return fmt.Errorf("adding loopback allow rule for %q: %w", addr, err)
|
2020-05-13 22:35:22 +00:00
|
|
|
}
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// delLoopbackRule removes the firewall rule permitting loopback
|
|
|
|
// traffic to a Tailscale IP.
|
|
|
|
func (r *linuxRouter) delLoopbackRule(addr netaddr.IP) error {
|
|
|
|
if r.netfilterMode == NetfilterOff {
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
if err := r.ipt4.Delete("filter", "ts-input", "-i", "lo", "-s", addr.String(), "-j", "ACCEPT"); err != nil {
|
2020-05-28 09:44:44 +00:00
|
|
|
return fmt.Errorf("deleting loopback allow rule for %q: %w", addr, err)
|
2020-05-13 22:35:22 +00:00
|
|
|
}
|
|
|
|
return nil
|
2020-05-02 01:55:38 +00:00
|
|
|
}
|
|
|
|
|
2020-05-07 19:22:50 +00:00
|
|
|
// addRoute adds a route for cidr, pointing to the tunnel
|
|
|
|
// interface. Fails if the route already exists, or if adding the
|
2020-05-02 01:55:38 +00:00
|
|
|
// route fails.
|
2020-05-08 05:17:30 +00:00
|
|
|
func (r *linuxRouter) addRoute(cidr netaddr.IPPrefix) error {
|
2020-05-31 08:31:01 +00:00
|
|
|
args := []string{
|
2020-05-28 07:44:09 +00:00
|
|
|
"ip", "route", "add",
|
|
|
|
normalizeCIDR(cidr),
|
|
|
|
"dev", r.tunname,
|
2020-05-31 08:31:01 +00:00
|
|
|
}
|
|
|
|
if r.ipRuleAvailable {
|
|
|
|
args = append(args, "table", "88")
|
|
|
|
}
|
|
|
|
return r.cmd.run(args...)
|
2020-05-02 01:55:38 +00:00
|
|
|
}
|
|
|
|
|
2020-05-07 19:22:50 +00:00
|
|
|
// delRoute removes the route for cidr pointing to the tunnel
|
|
|
|
// interface. Fails if the route doesn't exist, or if removing the
|
|
|
|
// route fails.
|
2020-05-08 05:17:30 +00:00
|
|
|
func (r *linuxRouter) delRoute(cidr netaddr.IPPrefix) error {
|
2020-05-31 08:31:01 +00:00
|
|
|
args := []string{
|
2020-05-28 07:44:09 +00:00
|
|
|
"ip", "route", "del",
|
|
|
|
normalizeCIDR(cidr),
|
|
|
|
"dev", r.tunname,
|
2020-05-31 08:31:01 +00:00
|
|
|
}
|
|
|
|
if r.ipRuleAvailable {
|
|
|
|
args = append(args, "table", "88")
|
|
|
|
}
|
|
|
|
return r.cmd.run(args...)
|
2020-05-02 01:55:38 +00:00
|
|
|
}
|
|
|
|
|
2020-05-28 07:44:09 +00:00
|
|
|
// upInterface brings up the tunnel interface.
|
2020-05-02 01:55:38 +00:00
|
|
|
func (r *linuxRouter) upInterface() error {
|
2020-05-28 07:44:09 +00:00
|
|
|
return r.cmd.run("ip", "link", "set", "dev", r.tunname, "up")
|
2020-05-02 01:55:38 +00:00
|
|
|
}
|
|
|
|
|
2020-05-28 07:44:09 +00:00
|
|
|
// downInterface sets the tunnel interface administratively down.
|
2020-05-02 01:55:38 +00:00
|
|
|
func (r *linuxRouter) downInterface() error {
|
2020-05-28 07:44:09 +00:00
|
|
|
return r.cmd.run("ip", "link", "set", "dev", r.tunname, "down")
|
2020-05-02 01:55:38 +00:00
|
|
|
}
|
|
|
|
|
2020-05-31 08:31:01 +00:00
|
|
|
// addIPRules adds the policy routing rule that avoids tailscaled
|
2020-05-02 01:55:38 +00:00
|
|
|
// routing loops. If the rule exists and appears to be a
|
|
|
|
// tailscale-managed rule, it is gracefully replaced.
|
2020-05-31 08:31:01 +00:00
|
|
|
func (r *linuxRouter) addIPRules() error {
|
|
|
|
if !r.ipRuleAvailable {
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2020-05-28 07:44:09 +00:00
|
|
|
// Clear out old rules. After that, any error adding a rule is fatal,
|
|
|
|
// because there should be no reason we add a duplicate.
|
2020-05-31 08:31:01 +00:00
|
|
|
if err := r.delIPRules(); err != nil {
|
2020-05-02 01:55:38 +00:00
|
|
|
return err
|
|
|
|
}
|
2020-05-28 07:44:09 +00:00
|
|
|
|
2020-06-03 19:36:40 +00:00
|
|
|
rg := newRunGroup(nil, r.cmd)
|
2020-05-28 07:44:09 +00:00
|
|
|
|
|
|
|
// NOTE(apenwarr): We leave spaces between each pref number.
|
|
|
|
// This is so the sysadmin can override by inserting rules in
|
|
|
|
// between if they want.
|
|
|
|
|
|
|
|
// NOTE(apenwarr): This sequence seems complicated, right?
|
|
|
|
// If we could simply have a rule that said "match packets that
|
|
|
|
// *don't* have this fwmark", then we would only need to add one
|
|
|
|
// link to table 88 and we'd be done. Unfortunately, older kernels
|
|
|
|
// and 'ip rule' implementations (including busybox), don't support
|
|
|
|
// checking for the lack of a fwmark, only the presence. The technique
|
|
|
|
// below works even on very old kernels.
|
|
|
|
|
|
|
|
// Packets from us, tagged with our fwmark, first try the kernel's
|
|
|
|
// main routing table.
|
|
|
|
rg.Run(
|
|
|
|
"ip", "rule", "add",
|
|
|
|
"pref", "8810",
|
|
|
|
"fwmark", tailscaleBypassMark,
|
|
|
|
"table", "main",
|
|
|
|
)
|
|
|
|
// ...and then we try the 'default' table, for correctness,
|
|
|
|
// even though it's been empty on every Linux system I've ever seen.
|
|
|
|
rg.Run(
|
|
|
|
"ip", "rule", "add",
|
|
|
|
"pref", "8830",
|
|
|
|
"fwmark", tailscaleBypassMark,
|
|
|
|
"table", "default",
|
|
|
|
)
|
|
|
|
// If neither of those matched (no default route on this system?)
|
|
|
|
// then packets from us should be aborted rather than falling through
|
|
|
|
// to the tailscale routes, because that would create routing loops.
|
|
|
|
rg.Run(
|
|
|
|
"ip", "rule", "add",
|
|
|
|
"pref", "8850",
|
|
|
|
"fwmark", tailscaleBypassMark,
|
|
|
|
"type", "unreachable",
|
|
|
|
)
|
|
|
|
// If we get to this point, capture all packets and send them
|
|
|
|
// through to table 88, the set of tailscale routes.
|
|
|
|
// For apps other than us (ie. with no fwmark set), this is the
|
|
|
|
// first routing table, so it takes precedence over all the others,
|
|
|
|
// ie. VPN routes always beat non-VPN routes.
|
|
|
|
//
|
|
|
|
// NOTE(apenwarr): tables >255 are not supported in busybox.
|
|
|
|
// I really wanted to use table 8888 here for symmetry, but no luck
|
|
|
|
// with busybox alas.
|
|
|
|
rg.Run(
|
|
|
|
"ip", "rule", "add",
|
|
|
|
"pref", "8888",
|
|
|
|
"table", "88",
|
|
|
|
)
|
|
|
|
// If that didn't match, then non-fwmark packets fall through to the
|
|
|
|
// usual rules (pref 32766 and 32767, ie. main and default).
|
|
|
|
|
|
|
|
return rg.ErrAcc
|
2020-05-02 01:55:38 +00:00
|
|
|
}
|
|
|
|
|
2020-05-28 07:44:09 +00:00
|
|
|
// delBypassrule removes the policy routing rules that avoid
|
2020-05-02 01:55:38 +00:00
|
|
|
// tailscaled routing loops, if it exists.
|
2020-05-31 08:31:01 +00:00
|
|
|
func (r *linuxRouter) delIPRules() error {
|
|
|
|
if !r.ipRuleAvailable {
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2020-05-28 07:44:09 +00:00
|
|
|
// Error codes: 'ip rule' returns error code 2 if the rule is a
|
|
|
|
// duplicate (add) or not found (del). It returns a different code
|
|
|
|
// for syntax errors. This is also true of busybox.
|
2020-06-03 19:36:40 +00:00
|
|
|
//
|
|
|
|
// Some older versions of iproute2 also return error code 254 for
|
|
|
|
// unknown rules during deletion.
|
|
|
|
rg := newRunGroup([]int{2, 254}, r.cmd)
|
2020-05-28 07:44:09 +00:00
|
|
|
|
|
|
|
// When deleting rules, we want to be a bit specific (mention which
|
|
|
|
// table we were routing to) but not *too* specific (fwmarks, etc).
|
|
|
|
// That leaves us some flexibility to change these values in later
|
|
|
|
// versions without having ongoing hacks for every possible
|
|
|
|
// combination.
|
|
|
|
|
|
|
|
// Delete old-style tailscale rules
|
|
|
|
// (never released in a stable version, so we can drop this
|
|
|
|
// support eventually).
|
|
|
|
rg.Run(
|
|
|
|
"ip", "rule", "del",
|
|
|
|
"pref", "10000",
|
|
|
|
"table", "main",
|
|
|
|
)
|
|
|
|
|
|
|
|
// Delete new-style tailscale rules.
|
|
|
|
rg.Run(
|
|
|
|
"ip", "rule", "del",
|
|
|
|
"pref", "8810",
|
|
|
|
"table", "main",
|
|
|
|
)
|
|
|
|
rg.Run(
|
|
|
|
"ip", "rule", "del",
|
|
|
|
"pref", "8830",
|
|
|
|
"table", "default",
|
|
|
|
)
|
|
|
|
rg.Run(
|
|
|
|
"ip", "rule", "del",
|
|
|
|
"pref", "8850",
|
|
|
|
"type", "unreachable",
|
|
|
|
)
|
|
|
|
rg.Run(
|
|
|
|
"ip", "rule", "del",
|
|
|
|
"pref", "8888",
|
|
|
|
"table", "88",
|
|
|
|
)
|
|
|
|
return rg.ErrAcc
|
2020-05-02 01:55:38 +00:00
|
|
|
}
|
|
|
|
|
2020-05-28 10:59:16 +00:00
|
|
|
// addNetfilterChains creates custom Tailscale chains in netfilter.
|
|
|
|
func (r *linuxRouter) addNetfilterChains() error {
|
2020-05-13 22:35:22 +00:00
|
|
|
create := func(table, chain string) error {
|
2020-05-28 09:44:44 +00:00
|
|
|
err := r.ipt4.ClearChain(table, chain)
|
|
|
|
if errCode(err) == 1 {
|
|
|
|
// nonexistent chain. let's create it!
|
|
|
|
return r.ipt4.NewChain(table, chain)
|
2020-05-13 22:35:22 +00:00
|
|
|
}
|
|
|
|
if err != nil {
|
2020-05-28 09:44:44 +00:00
|
|
|
return fmt.Errorf("setting up %s/%s: %w", table, chain, err)
|
2020-05-13 22:35:22 +00:00
|
|
|
}
|
2020-05-02 01:55:38 +00:00
|
|
|
return nil
|
|
|
|
}
|
2020-05-13 22:35:22 +00:00
|
|
|
if err := create("filter", "ts-input"); err != nil {
|
2020-05-02 01:55:38 +00:00
|
|
|
return err
|
|
|
|
}
|
2020-05-13 22:35:22 +00:00
|
|
|
if err := create("filter", "ts-forward"); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
if err := create("nat", "ts-postrouting"); err != nil {
|
2020-05-02 01:55:38 +00:00
|
|
|
return err
|
|
|
|
}
|
2020-05-28 10:59:16 +00:00
|
|
|
return nil
|
|
|
|
}
|
2020-05-02 01:55:38 +00:00
|
|
|
|
2020-05-28 10:59:16 +00:00
|
|
|
// addNetfilterBase adds with some basic processing rules to be supplemented
|
|
|
|
// by later calls to other helpers.
|
|
|
|
func (r *linuxRouter) addNetfilterBase() error {
|
2020-05-13 22:35:22 +00:00
|
|
|
// Only allow CGNAT range traffic to come from tailscale0. There
|
|
|
|
// is an exception carved out for ranges used by ChromeOS, for
|
|
|
|
// which we fall out of the Tailscale chain.
|
|
|
|
//
|
|
|
|
// Note, this will definitely break nodes that end up using the
|
|
|
|
// CGNAT range for other purposes :(.
|
2020-07-07 05:33:29 +00:00
|
|
|
args := []string{"!", "-i", r.tunname, "-s", tsaddr.ChromeOSVMRange().String(), "-j", "RETURN"}
|
2020-05-13 22:35:22 +00:00
|
|
|
if err := r.ipt4.Append("filter", "ts-input", args...); err != nil {
|
2020-05-28 09:44:44 +00:00
|
|
|
return fmt.Errorf("adding %v in filter/ts-input: %w", args, err)
|
2020-05-13 22:35:22 +00:00
|
|
|
}
|
2020-07-07 05:33:29 +00:00
|
|
|
args = []string{"!", "-i", r.tunname, "-s", tsaddr.CGNATRange().String(), "-j", "DROP"}
|
2020-05-13 22:35:22 +00:00
|
|
|
if err := r.ipt4.Append("filter", "ts-input", args...); err != nil {
|
2020-05-28 09:44:44 +00:00
|
|
|
return fmt.Errorf("adding %v in filter/ts-input: %w", args, err)
|
2020-05-13 22:35:22 +00:00
|
|
|
}
|
|
|
|
|
2020-06-03 03:19:17 +00:00
|
|
|
// Forward all traffic from the Tailscale interface, and drop
|
|
|
|
// traffic to the tailscale interface by default. We use packet
|
|
|
|
// marks here so both filter/FORWARD and nat/POSTROUTING can match
|
|
|
|
// on these packets of interest.
|
2020-05-13 22:35:22 +00:00
|
|
|
//
|
|
|
|
// In particular, we only want to apply SNAT rules in
|
|
|
|
// nat/POSTROUTING to packets that originated from the Tailscale
|
|
|
|
// interface, but we can't match on the inbound interface in
|
2020-06-03 03:19:17 +00:00
|
|
|
// POSTROUTING. So instead, we match on the inbound interface in
|
|
|
|
// filter/FORWARD, and set a packet mark that nat/POSTROUTING can
|
|
|
|
// use to effectively run that same test again.
|
|
|
|
args = []string{"-i", r.tunname, "-j", "MARK", "--set-mark", tailscaleSubnetRouteMark}
|
|
|
|
if err := r.ipt4.Append("filter", "ts-forward", args...); err != nil {
|
|
|
|
return fmt.Errorf("adding %v in filter/ts-forward: %w", args, err)
|
|
|
|
}
|
2020-05-13 22:35:22 +00:00
|
|
|
args = []string{"-m", "mark", "--mark", tailscaleSubnetRouteMark, "-j", "ACCEPT"}
|
|
|
|
if err := r.ipt4.Append("filter", "ts-forward", args...); err != nil {
|
2020-05-28 09:44:44 +00:00
|
|
|
return fmt.Errorf("adding %v in filter/ts-forward: %w", args, err)
|
2020-05-13 22:35:22 +00:00
|
|
|
}
|
2020-07-07 05:33:29 +00:00
|
|
|
args = []string{"-o", r.tunname, "-s", tsaddr.CGNATRange().String(), "-j", "DROP"}
|
2020-06-03 03:19:17 +00:00
|
|
|
if err := r.ipt4.Append("filter", "ts-forward", args...); err != nil {
|
|
|
|
return fmt.Errorf("adding %v in filter/ts-forward: %w", args, err)
|
|
|
|
}
|
|
|
|
args = []string{"-o", r.tunname, "-j", "ACCEPT"}
|
2020-05-13 22:35:22 +00:00
|
|
|
if err := r.ipt4.Append("filter", "ts-forward", args...); err != nil {
|
2020-05-28 09:44:44 +00:00
|
|
|
return fmt.Errorf("adding %v in filter/ts-forward: %w", args, err)
|
2020-05-13 22:35:22 +00:00
|
|
|
}
|
|
|
|
|
2020-05-02 01:55:38 +00:00
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2020-05-28 10:59:16 +00:00
|
|
|
// delNetfilterChains removes the custom Tailscale chains from netfilter.
|
|
|
|
func (r *linuxRouter) delNetfilterChains() error {
|
2020-05-02 01:55:38 +00:00
|
|
|
del := func(table, chain string) error {
|
2020-05-28 09:44:44 +00:00
|
|
|
if err := r.ipt4.ClearChain(table, chain); err != nil {
|
|
|
|
if errCode(err) == 1 {
|
|
|
|
// nonexistent chain. That's fine, since it's
|
|
|
|
// the desired state anyway.
|
2020-05-13 22:35:22 +00:00
|
|
|
return nil
|
2020-05-02 01:55:38 +00:00
|
|
|
}
|
2020-05-28 09:44:44 +00:00
|
|
|
return fmt.Errorf("flushing %s/%s: %w", table, chain, err)
|
|
|
|
}
|
|
|
|
if err := r.ipt4.DeleteChain(table, chain); err != nil {
|
|
|
|
// this shouldn't fail, because if the chain didn't
|
|
|
|
// exist, we would have returned after ClearChain.
|
|
|
|
return fmt.Errorf("deleting %s/%s: %v", table, chain, err)
|
2020-05-02 01:55:38 +00:00
|
|
|
}
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2020-05-13 22:35:22 +00:00
|
|
|
if err := del("filter", "ts-input"); err != nil {
|
2020-05-02 01:55:38 +00:00
|
|
|
return err
|
|
|
|
}
|
2020-05-13 22:35:22 +00:00
|
|
|
if err := del("filter", "ts-forward"); err != nil {
|
2020-05-02 01:55:38 +00:00
|
|
|
return err
|
|
|
|
}
|
2020-05-13 22:35:22 +00:00
|
|
|
if err := del("nat", "ts-postrouting"); err != nil {
|
2020-05-02 01:55:38 +00:00
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2020-05-28 10:59:16 +00:00
|
|
|
// delNetfilterBase empties but does not remove custom Tailscale chains from
|
|
|
|
// netfilter.
|
|
|
|
func (r *linuxRouter) delNetfilterBase() error {
|
|
|
|
del := func(table, chain string) error {
|
|
|
|
if err := r.ipt4.ClearChain(table, chain); err != nil {
|
|
|
|
if errCode(err) == 1 {
|
|
|
|
// nonexistent chain. That's fine, since it's
|
|
|
|
// the desired state anyway.
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
return fmt.Errorf("flushing %s/%s: %w", table, chain, err)
|
|
|
|
}
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
if err := del("filter", "ts-input"); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
if err := del("filter", "ts-forward"); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
if err := del("nat", "ts-postrouting"); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2020-05-13 22:35:22 +00:00
|
|
|
// addNetfilterHooks inserts calls to tailscale's netfilter chains in
|
|
|
|
// the relevant main netfilter chains. The tailscale chains must
|
|
|
|
// already exist.
|
|
|
|
func (r *linuxRouter) addNetfilterHooks() error {
|
2020-05-02 01:55:38 +00:00
|
|
|
divert := func(table, chain string) error {
|
2020-05-13 22:35:22 +00:00
|
|
|
tsChain := tsChain(chain)
|
2020-05-02 01:55:38 +00:00
|
|
|
|
|
|
|
args := []string{"-j", tsChain}
|
|
|
|
exists, err := r.ipt4.Exists(table, chain, args...)
|
|
|
|
if err != nil {
|
2020-05-28 09:44:44 +00:00
|
|
|
return fmt.Errorf("checking for %v in %s/%s: %w", args, table, chain, err)
|
2020-05-10 22:13:09 +00:00
|
|
|
}
|
|
|
|
if exists {
|
|
|
|
return nil
|
2020-05-02 01:55:38 +00:00
|
|
|
}
|
2020-05-10 22:13:09 +00:00
|
|
|
if err := r.ipt4.Insert(table, chain, 1, args...); err != nil {
|
2020-05-28 09:44:44 +00:00
|
|
|
return fmt.Errorf("adding %v in %s/%s: %w", args, table, chain, err)
|
2020-05-02 01:55:38 +00:00
|
|
|
}
|
|
|
|
return nil
|
|
|
|
}
|
2020-05-13 22:35:22 +00:00
|
|
|
|
2020-05-02 01:55:38 +00:00
|
|
|
if err := divert("filter", "INPUT"); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
if err := divert("filter", "FORWARD"); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
if err := divert("nat", "POSTROUTING"); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
2020-05-13 22:35:22 +00:00
|
|
|
return nil
|
|
|
|
}
|
2020-05-02 01:55:38 +00:00
|
|
|
|
2020-05-13 22:35:22 +00:00
|
|
|
// delNetfilterHooks deletes the calls to tailscale's netfilter chains
|
|
|
|
// in the relevant main netfilter chains.
|
|
|
|
func (r *linuxRouter) delNetfilterHooks() error {
|
|
|
|
del := func(table, chain string) error {
|
|
|
|
tsChain := tsChain(chain)
|
|
|
|
args := []string{"-j", tsChain}
|
|
|
|
if err := r.ipt4.Delete(table, chain, args...); err != nil {
|
2020-05-28 09:44:44 +00:00
|
|
|
// TODO(apenwarr): check for errCode(1) here.
|
|
|
|
// Unfortunately the error code from the iptables
|
|
|
|
// module resists unwrapping, unlike with other
|
|
|
|
// calls. So we have to assume if Delete fails,
|
|
|
|
// it's because there is no such rule.
|
|
|
|
r.logf("note: deleting %v in %s/%s: %w", args, table, chain, err)
|
|
|
|
return nil
|
2020-05-13 22:35:22 +00:00
|
|
|
}
|
|
|
|
return nil
|
2020-05-02 01:55:38 +00:00
|
|
|
}
|
|
|
|
|
2020-05-13 22:35:22 +00:00
|
|
|
if err := del("filter", "INPUT"); err != nil {
|
|
|
|
return err
|
2020-05-02 01:55:38 +00:00
|
|
|
}
|
2020-05-13 22:35:22 +00:00
|
|
|
if err := del("filter", "FORWARD"); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
if err := del("nat", "POSTROUTING"); err != nil {
|
|
|
|
return err
|
2020-05-02 01:55:38 +00:00
|
|
|
}
|
2020-05-11 20:16:52 +00:00
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// addSNATRule adds a netfilter rule to SNAT traffic destined for
|
|
|
|
// local subnets.
|
|
|
|
func (r *linuxRouter) addSNATRule() error {
|
2020-05-13 22:35:22 +00:00
|
|
|
if r.netfilterMode == NetfilterOff {
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2020-05-11 20:16:52 +00:00
|
|
|
args := []string{"-m", "mark", "--mark", tailscaleSubnetRouteMark, "-j", "MASQUERADE"}
|
2020-05-10 22:13:09 +00:00
|
|
|
if err := r.ipt4.Append("nat", "ts-postrouting", args...); err != nil {
|
2020-05-28 09:44:44 +00:00
|
|
|
return fmt.Errorf("adding %v in nat/ts-postrouting: %w", args, err)
|
2020-05-02 01:55:38 +00:00
|
|
|
}
|
2020-05-11 20:16:52 +00:00
|
|
|
return nil
|
|
|
|
}
|
2020-05-02 01:55:38 +00:00
|
|
|
|
2020-05-11 20:16:52 +00:00
|
|
|
// delSNATRule removes the netfilter rule to SNAT traffic destined for
|
|
|
|
// local subnets. Fails if the rule does not exist.
|
|
|
|
func (r *linuxRouter) delSNATRule() error {
|
2020-05-13 22:35:22 +00:00
|
|
|
if r.netfilterMode == NetfilterOff {
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2020-05-11 20:16:52 +00:00
|
|
|
args := []string{"-m", "mark", "--mark", tailscaleSubnetRouteMark, "-j", "MASQUERADE"}
|
|
|
|
if err := r.ipt4.Delete("nat", "ts-postrouting", args...); err != nil {
|
2020-05-28 09:44:44 +00:00
|
|
|
return fmt.Errorf("deleting %v in nat/ts-postrouting: %w", args, err)
|
2020-05-11 20:16:52 +00:00
|
|
|
}
|
2020-05-02 01:55:38 +00:00
|
|
|
return nil
|
|
|
|
}
|
2020-05-13 22:35:22 +00:00
|
|
|
|
|
|
|
func (r *linuxRouter) delLegacyNetfilter() error {
|
|
|
|
del := func(table, chain string, args ...string) error {
|
|
|
|
exists, err := r.ipt4.Exists(table, chain, args...)
|
|
|
|
if err != nil {
|
2020-05-28 09:44:44 +00:00
|
|
|
return fmt.Errorf("checking for %v in %s/%s: %w", args, table, chain, err)
|
2020-05-13 22:35:22 +00:00
|
|
|
}
|
|
|
|
if exists {
|
|
|
|
if err := r.ipt4.Delete(table, chain, args...); err != nil {
|
2020-05-28 09:44:44 +00:00
|
|
|
return fmt.Errorf("deleting %v in %s/%s: %w", args, table, chain, err)
|
2020-05-13 22:35:22 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
if err := del("filter", "FORWARD", "-m", "comment", "--comment", "tailscale", "-i", r.tunname, "-j", "ACCEPT"); err != nil {
|
2020-05-15 06:53:03 +00:00
|
|
|
r.logf("failed to delete legacy rule, continuing anyway: %v", err)
|
2020-05-13 22:35:22 +00:00
|
|
|
}
|
|
|
|
if err := del("nat", "POSTROUTING", "-m", "comment", "--comment", "tailscale", "-o", "eth0", "-j", "MASQUERADE"); err != nil {
|
2020-05-15 06:53:03 +00:00
|
|
|
r.logf("failed to delete legacy rule, continuing anyway: %v", err)
|
2020-05-13 22:35:22 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// cidrDiff calls add and del as needed to make the set of prefixes in
|
|
|
|
// old and new match. Returns a map reflecting the actual new state
|
|
|
|
// (which may be somewhere in between old and new if some commands
|
|
|
|
// failed), and any error encountered while reconfiguring.
|
|
|
|
func cidrDiff(kind string, old map[netaddr.IPPrefix]bool, new []netaddr.IPPrefix, add, del func(netaddr.IPPrefix) error, logf logger.Logf) (map[netaddr.IPPrefix]bool, error) {
|
|
|
|
newMap := make(map[netaddr.IPPrefix]bool, len(new))
|
|
|
|
for _, cidr := range new {
|
|
|
|
newMap[cidr] = true
|
|
|
|
}
|
|
|
|
|
|
|
|
// ret starts out as a copy of old, and updates as we
|
|
|
|
// add/delete. That way we can always return it and have it be the
|
|
|
|
// true state of what we've done so far.
|
|
|
|
ret := make(map[netaddr.IPPrefix]bool, len(old))
|
|
|
|
for cidr := range old {
|
|
|
|
ret[cidr] = true
|
|
|
|
}
|
|
|
|
|
|
|
|
for cidr := range old {
|
|
|
|
if newMap[cidr] {
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
if err := del(cidr); err != nil {
|
|
|
|
logf("%s del failed: %v", kind, err)
|
|
|
|
return ret, err
|
|
|
|
}
|
|
|
|
delete(ret, cidr)
|
|
|
|
}
|
|
|
|
for cidr := range newMap {
|
|
|
|
if old[cidr] {
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
if err := add(cidr); err != nil {
|
|
|
|
logf("%s add failed: %v", kind, err)
|
|
|
|
return ret, err
|
|
|
|
}
|
|
|
|
ret[cidr] = true
|
|
|
|
}
|
|
|
|
|
|
|
|
return ret, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// tsChain returns the name of the tailscale sub-chain corresponding
|
|
|
|
// to the given "parent" chain (e.g. INPUT, FORWARD, ...).
|
|
|
|
func tsChain(chain string) string {
|
|
|
|
return "ts-" + strings.ToLower(chain)
|
|
|
|
}
|
|
|
|
|
|
|
|
// normalizeCIDR returns cidr as an ip/mask string, with the host bits
|
|
|
|
// of the IP address zeroed out.
|
|
|
|
func normalizeCIDR(cidr netaddr.IPPrefix) string {
|
|
|
|
ncidr := cidr.IPNet()
|
|
|
|
nip := ncidr.IP.Mask(ncidr.Mask)
|
|
|
|
return fmt.Sprintf("%s/%d", nip, cidr.Bits)
|
|
|
|
}
|