Allow setting IfName to 'none' to run without TUN/TAP
Yggdrasil
What is it?
This is a toy implementation of an encrypted IPv6 network, with many good ideas stolen from cjdns, which was written to test a particular routing scheme that I cobbled together one random Wednesday afternoon. It's notably not a shortest path routing scheme, with the goal of scalable name-independent routing on dynamic networks with an internet-like topology. It's named Yggdrasil after the world tree from Norse mythology, because that seemed like the obvious name given how it works. For a longer, rambling version of this readme with more information, see: doc. A very early incomplete draft of a whitepaper describing the protocol is also available.
This is a toy / proof-of-principle, so it's not even alpha quality software--any nontrivial update is likely to break backwards compatibility with no possibility for a clean upgrade path. You're encouraged to play with it, but I strongly advise against using it for anything mission critical.
Building
- Install Go (tested on 1.9, I use godeb).
- Clone this repository.
./build
Note that you can cross-compile for other platforms and architectures by specifying the $GOOS
and $GOARCH
environment variables, for example, GOOS=windows ./build
or GOOS=linux GOARCH=mipsle ./build
.
The build script sets its own $GOPATH
, so the build environment is self-contained.
Running
To run the program, you'll need permission to create a tun
device and configure it using ip
.
If you don't want to mess with capabilities for the tun
device, then using sudo
should work, with the usual security caveats about running a program as root.
To run with default settings:
./yggdrasil --autoconf
That will generate a new set of keys (and an IP address) each time the program is run. The program will bind to all addresses on a random port and listen for incoming connections. It will send announcements over IPv6 link-local multicast, and it will attempt to start a connection if it hears an announcement from another device.
In practice, you probably want to run this instead:
./yggdrasil --genconf > conf.json
./yggdrasil --useconf < conf.json
This keeps a persistent set of keys (and by extension, IP address) and gives you the option of editing the configuration file.
If you want to use it as an overlay network on top of e.g. the internet, then you can do so by adding the remote devices domain/address and port (as a string, e.g. "1.2.3.4:5678"
) to the list of Peers
in the configuration file.
You can control whether or not it peers over TCP or UDP by adding tcp:
or udp:
to the start of the string, i.e. "udp:1.2.3.4:5678"
.
It is currently configured to accept incoming TCP and UDP connections.
In the interest of testing the TCP machinery, it's set to create TCP connections for auto-peering (over link-local IPv6), and to use TCP by default if no transport is specified for a manually configured peer.
Platforms
Linux
- Should work out of the box on most Linux distributions with
iproute2
installed.
macOS
- Tested and working out of the box on macOS 10.13 High Sierra.
- May work in theory on any macOS version with
utun
support (which was added in macOS 10.7 Lion), although this is untested at present.
Windows
- Tested and working on Windows 7 and Windows 10, and should work on any recent versions of Windows, but it depends on the OpenVPN TAP driver being installed first.
- Has been proven to work with both the NDIS 5 (
tap-windows-9.9.2_3
) driver and the NDIS 6 (tap-windows-9.21.2
) driver, however there are substantial performance issues with the NDIS 6 driver therefore it is recommended to use the NDIS 5 driver instead. - Be aware that connectivity issues can occur on Windows if multiple IPv6 addresses from the
fd00::/8
prefix are assigned to the TAP interface. If this happens, then you may need to manually remove the old/unused addresses from the interface (though the code has a workaround in place to do this automatically in some cases).
EdgeRouter
- Tested and working on the EdgeRouter X, using the vyatta-yggdrasil wrapper package.
Optional: advertise a prefix locally
Suppose a node has generated the address: fd00:1111:2222:3333:4444:5555:6666:7777
Then the node may also use addresses from the prefix: fd80:1111:2222:3333::/64
(note the fd00
changed to fd80
, a separate /9
is used for prefixes, but the rest of the first 64 bits are the same).
To advertise this prefix and a route to fd00::/8
, the following seems to work for me:
-
Enable IPv6 forwarding (e.g.
sysctl -w net.ipv6.conf.all.forwarding=1
or add it to sysctl.conf). -
ip addr add fd80:1111:2222:3333::1/64 dev eth0
or similar, to assign an address for the router to use in that prefix, where the LAN is reachable througheth0
. -
Install/run
radvd
with something like the following in/etc/radvd.conf
:
interface eth0
{
AdvSendAdvert on;
prefix fd80:1111:2222:3333::/64 {
AdvOnLink on;
AdvAutonomous on;
};
route fd00::/8 {};
};
This is enough to give unsupported devices on my LAN access to the network, with a few security and performance cautions outlined in the doc file.
How does it work?
I'd rather not try to explain in the readme, but I describe it further in the doc file or the very draft of a whitepaper, so you can check there if you're interested. Be warned that it's still not a very good explanation, but it at least gives a high-level overview and links to some relevant work by other people.
Obligatory performance propaganda
A simplified model of this routing scheme has been tested in simulation on the 9204-node skitter network topology dataset from caida, and compared with results in arxiv:0708.2309. Using the routing scheme as implemented in this code, I observe an average multiplicative stretch of 1.08, with an average routing table size of 6 for a name-dependent scheme, and approximately 30 additional (but smaller) entries needed for the name-independent routing table. The number of name-dependent routing table entries needed is proportional to node degree, so that 6 is the mean of a distribution with a long tail, but I believe this is an acceptable tradeoff. The size of name-dependent routing table entries is relatively large, due to cryptographic signatures associated with routing table updates, but in the absence of cryptographic overhead I believe each entry is otherwise comparable to the BC routing scheme described in the above paper. A modified version of this scheme, with the same resource requirements, achieves a multiplicative stretch of 1.02, which drops to 1.01 if source routing is used. Both of these optimizations are not present in the current implementation, as the former depends on network state information that I haven't found a way to cryptographically secure, and the latter optimization is both tedious to implement and would make debugging other aspects of the implementation more difficult.
License
This code is released under the terms of the LGPLv3, but with an added exception that was shamelessly taken from godeb. Under certain circumstances, this exception permits distribution of binaries that are (statically or dynamically) linked with this code, without requiring the distribution of Minimal Corresponding Source or Minimal Application Code. For more details, see: LICENSE.