mirror of
https://github.com/netbirdio/netbird.git
synced 2024-12-03 05:24:56 +01:00
4fec709bb1
* compile client under freebsd (#1620) Compile netbird client under freebsd and now support netstack and userspace modes. Refactoring linux specific code to share same code with FreeBSD, move to *_unix.go files. Not implemented yet: Kernel mode not supported DNS probably does not work yet Routing also probably does not work yet SSH support did not tested yet Lack of test environment for freebsd (dedicated VM for github runners under FreeBSD required) Lack of tests for freebsd specific code info reporting need to review and also implement, for example OS reported as GENERIC instead of FreeBSD (lack of FreeBSD icon in management interface) Lack of proper client setup under FreeBSD Lack of FreeBSD port/package * Add DNS routes (#1943) Given domains are resolved periodically and resolved IPs are replaced with the new ones. Unless the flag keep_route is set to true, then only new ones are added. This option is helpful if there are long-running connections that might still point to old IP addresses from changed DNS records. * Add process posture check (#1693) Introduces a process posture check to validate the existence and active status of specific binaries on peer systems. The check ensures that files are present at specified paths, and that corresponding processes are running. This check supports Linux, Windows, and macOS systems. Co-authored-by: Evgenii <mail@skillcoder.com> Co-authored-by: Pascal Fischer <pascal@netbird.io> Co-authored-by: Zoltan Papp <zoltan.pmail@gmail.com> Co-authored-by: Viktor Liu <17948409+lixmal@users.noreply.github.com> Co-authored-by: Bethuel Mmbaga <bethuelmbaga12@gmail.com>
505 lines
15 KiB
Go
505 lines
15 KiB
Go
//go:build !android
|
|
|
|
package systemops
|
|
|
|
import (
|
|
"bufio"
|
|
"errors"
|
|
"fmt"
|
|
"net"
|
|
"net/netip"
|
|
"os"
|
|
"syscall"
|
|
|
|
"github.com/hashicorp/go-multierror"
|
|
log "github.com/sirupsen/logrus"
|
|
"github.com/vishvananda/netlink"
|
|
|
|
nberrors "github.com/netbirdio/netbird/client/errors"
|
|
"github.com/netbirdio/netbird/client/internal/peer"
|
|
"github.com/netbirdio/netbird/client/internal/routemanager/sysctl"
|
|
"github.com/netbirdio/netbird/client/internal/routemanager/vars"
|
|
nbnet "github.com/netbirdio/netbird/util/net"
|
|
)
|
|
|
|
const (
|
|
// NetbirdVPNTableID is the ID of the custom routing table used by Netbird.
|
|
NetbirdVPNTableID = 0x1BD0
|
|
// NetbirdVPNTableName is the name of the custom routing table used by Netbird.
|
|
NetbirdVPNTableName = "netbird"
|
|
|
|
// rtTablesPath is the path to the file containing the routing table names.
|
|
rtTablesPath = "/etc/iproute2/rt_tables"
|
|
|
|
// ipv4ForwardingPath is the path to the file containing the IP forwarding setting.
|
|
ipv4ForwardingPath = "net.ipv4.ip_forward"
|
|
)
|
|
|
|
var ErrTableIDExists = errors.New("ID exists with different name")
|
|
|
|
// originalSysctl stores the original sysctl values before they are modified
|
|
var originalSysctl map[string]int
|
|
|
|
// sysctlFailed is used as an indicator to emit a warning when default routes are configured
|
|
var sysctlFailed bool
|
|
|
|
type ruleParams struct {
|
|
priority int
|
|
fwmark int
|
|
tableID int
|
|
family int
|
|
invert bool
|
|
suppressPrefix int
|
|
description string
|
|
}
|
|
|
|
// isLegacy determines whether to use the legacy routing setup
|
|
func isLegacy() bool {
|
|
return os.Getenv("NB_USE_LEGACY_ROUTING") == "true" || nbnet.CustomRoutingDisabled()
|
|
}
|
|
|
|
// setIsLegacy sets the legacy routing setup
|
|
func setIsLegacy(b bool) {
|
|
if b {
|
|
os.Setenv("NB_USE_LEGACY_ROUTING", "true")
|
|
} else {
|
|
os.Unsetenv("NB_USE_LEGACY_ROUTING")
|
|
}
|
|
}
|
|
|
|
func getSetupRules() []ruleParams {
|
|
return []ruleParams{
|
|
{100, -1, syscall.RT_TABLE_MAIN, netlink.FAMILY_V4, false, 0, "rule with suppress prefixlen v4"},
|
|
{100, -1, syscall.RT_TABLE_MAIN, netlink.FAMILY_V6, false, 0, "rule with suppress prefixlen v6"},
|
|
{110, nbnet.NetbirdFwmark, NetbirdVPNTableID, netlink.FAMILY_V4, true, -1, "rule v4 netbird"},
|
|
{110, nbnet.NetbirdFwmark, NetbirdVPNTableID, netlink.FAMILY_V6, true, -1, "rule v6 netbird"},
|
|
}
|
|
}
|
|
|
|
// SetupRouting establishes the routing configuration for the VPN, including essential rules
|
|
// to ensure proper traffic flow for management, locally configured routes, and VPN traffic.
|
|
//
|
|
// Rule 1 (Main Route Precedence): Safeguards locally installed routes by giving them precedence over
|
|
// potential routes received and configured for the VPN. This rule is skipped for the default route and routes
|
|
// that are not in the main table.
|
|
//
|
|
// Rule 2 (VPN Traffic Routing): Directs all remaining traffic to the 'NetbirdVPNTableID' custom routing table.
|
|
// This table is where a default route or other specific routes received from the management server are configured,
|
|
// enabling VPN connectivity.
|
|
func (r *SysOps) SetupRouting(initAddresses []net.IP) (_ peer.BeforeAddPeerHookFunc, _ peer.AfterRemovePeerHookFunc, err error) {
|
|
if isLegacy() {
|
|
log.Infof("Using legacy routing setup")
|
|
return r.setupRefCounter(initAddresses)
|
|
}
|
|
|
|
if err = addRoutingTableName(); err != nil {
|
|
log.Errorf("Error adding routing table name: %v", err)
|
|
}
|
|
|
|
originalValues, err := sysctl.Setup(r.wgInterface)
|
|
if err != nil {
|
|
log.Errorf("Error setting up sysctl: %v", err)
|
|
sysctlFailed = true
|
|
}
|
|
originalSysctl = originalValues
|
|
|
|
defer func() {
|
|
if err != nil {
|
|
if cleanErr := r.CleanupRouting(); cleanErr != nil {
|
|
log.Errorf("Error cleaning up routing: %v", cleanErr)
|
|
}
|
|
}
|
|
}()
|
|
|
|
rules := getSetupRules()
|
|
for _, rule := range rules {
|
|
if err := addRule(rule); err != nil {
|
|
if errors.Is(err, syscall.EOPNOTSUPP) {
|
|
log.Warnf("Rule operations are not supported, falling back to the legacy routing setup")
|
|
setIsLegacy(true)
|
|
return r.setupRefCounter(initAddresses)
|
|
}
|
|
return nil, nil, fmt.Errorf("%s: %w", rule.description, err)
|
|
}
|
|
}
|
|
|
|
return nil, nil, nil
|
|
}
|
|
|
|
// CleanupRouting performs a thorough cleanup of the routing configuration established by 'setupRouting'.
|
|
// It systematically removes the three rules and any associated routing table entries to ensure a clean state.
|
|
// The function uses error aggregation to report any errors encountered during the cleanup process.
|
|
func (r *SysOps) CleanupRouting() error {
|
|
if isLegacy() {
|
|
return r.cleanupRefCounter()
|
|
}
|
|
|
|
var result *multierror.Error
|
|
|
|
if err := flushRoutes(NetbirdVPNTableID, netlink.FAMILY_V4); err != nil {
|
|
result = multierror.Append(result, fmt.Errorf("flush routes v4: %w", err))
|
|
}
|
|
if err := flushRoutes(NetbirdVPNTableID, netlink.FAMILY_V6); err != nil {
|
|
result = multierror.Append(result, fmt.Errorf("flush routes v6: %w", err))
|
|
}
|
|
|
|
rules := getSetupRules()
|
|
for _, rule := range rules {
|
|
if err := removeRule(rule); err != nil {
|
|
result = multierror.Append(result, fmt.Errorf("%s: %w", rule.description, err))
|
|
}
|
|
}
|
|
|
|
if err := sysctl.Cleanup(originalSysctl); err != nil {
|
|
result = multierror.Append(result, fmt.Errorf("cleanup sysctl: %w", err))
|
|
}
|
|
originalSysctl = nil
|
|
sysctlFailed = false
|
|
|
|
return nberrors.FormatErrorOrNil(result)
|
|
}
|
|
|
|
func (r *SysOps) addToRouteTable(prefix netip.Prefix, nexthop Nexthop) error {
|
|
return addRoute(prefix, nexthop, syscall.RT_TABLE_MAIN)
|
|
}
|
|
|
|
func (r *SysOps) removeFromRouteTable(prefix netip.Prefix, nexthop Nexthop) error {
|
|
return removeRoute(prefix, nexthop, syscall.RT_TABLE_MAIN)
|
|
}
|
|
|
|
func (r *SysOps) AddVPNRoute(prefix netip.Prefix, intf *net.Interface) error {
|
|
if isLegacy() {
|
|
return r.genericAddVPNRoute(prefix, intf)
|
|
}
|
|
|
|
if sysctlFailed && (prefix == vars.Defaultv4 || prefix == vars.Defaultv6) {
|
|
log.Warnf("Default route is configured but sysctl operations failed, VPN traffic may not be routed correctly, consider using NB_USE_LEGACY_ROUTING=true or setting net.ipv4.conf.*.rp_filter to 2 (loose) or 0 (off)")
|
|
}
|
|
|
|
// No need to check if routes exist as main table takes precedence over the VPN table via Rule 1
|
|
|
|
// TODO remove this once we have ipv6 support
|
|
if prefix == vars.Defaultv4 {
|
|
if err := addUnreachableRoute(vars.Defaultv6, NetbirdVPNTableID); err != nil {
|
|
return fmt.Errorf("add blackhole: %w", err)
|
|
}
|
|
}
|
|
if err := addRoute(prefix, Nexthop{netip.Addr{}, intf}, NetbirdVPNTableID); err != nil {
|
|
return fmt.Errorf("add route: %w", err)
|
|
}
|
|
return nil
|
|
}
|
|
|
|
func (r *SysOps) RemoveVPNRoute(prefix netip.Prefix, intf *net.Interface) error {
|
|
if isLegacy() {
|
|
return r.genericRemoveVPNRoute(prefix, intf)
|
|
}
|
|
|
|
// TODO remove this once we have ipv6 support
|
|
if prefix == vars.Defaultv4 {
|
|
if err := removeUnreachableRoute(vars.Defaultv6, NetbirdVPNTableID); err != nil {
|
|
return fmt.Errorf("remove unreachable route: %w", err)
|
|
}
|
|
}
|
|
if err := removeRoute(prefix, Nexthop{netip.Addr{}, intf}, NetbirdVPNTableID); err != nil {
|
|
return fmt.Errorf("remove route: %w", err)
|
|
}
|
|
return nil
|
|
}
|
|
|
|
func getRoutesFromTable() ([]netip.Prefix, error) {
|
|
v4Routes, err := getRoutes(syscall.RT_TABLE_MAIN, netlink.FAMILY_V4)
|
|
if err != nil {
|
|
return nil, fmt.Errorf("get v4 routes: %w", err)
|
|
}
|
|
v6Routes, err := getRoutes(syscall.RT_TABLE_MAIN, netlink.FAMILY_V6)
|
|
if err != nil {
|
|
return nil, fmt.Errorf("get v6 routes: %w", err)
|
|
|
|
}
|
|
return append(v4Routes, v6Routes...), nil
|
|
}
|
|
|
|
// getRoutes fetches routes from a specific routing table identified by tableID.
|
|
func getRoutes(tableID, family int) ([]netip.Prefix, error) {
|
|
var prefixList []netip.Prefix
|
|
|
|
routes, err := netlink.RouteListFiltered(family, &netlink.Route{Table: tableID}, netlink.RT_FILTER_TABLE)
|
|
if err != nil {
|
|
return nil, fmt.Errorf("list routes from table %d: %v", tableID, err)
|
|
}
|
|
|
|
for _, route := range routes {
|
|
if route.Dst != nil {
|
|
addr, ok := netip.AddrFromSlice(route.Dst.IP)
|
|
if !ok {
|
|
return nil, fmt.Errorf("parse route destination IP: %v", route.Dst.IP)
|
|
}
|
|
|
|
ones, _ := route.Dst.Mask.Size()
|
|
|
|
prefix := netip.PrefixFrom(addr, ones)
|
|
if prefix.IsValid() {
|
|
prefixList = append(prefixList, prefix)
|
|
}
|
|
}
|
|
}
|
|
|
|
return prefixList, nil
|
|
}
|
|
|
|
// addRoute adds a route to a specific routing table identified by tableID.
|
|
func addRoute(prefix netip.Prefix, nexthop Nexthop, tableID int) error {
|
|
route := &netlink.Route{
|
|
Scope: netlink.SCOPE_UNIVERSE,
|
|
Table: tableID,
|
|
Family: getAddressFamily(prefix),
|
|
}
|
|
|
|
_, ipNet, err := net.ParseCIDR(prefix.String())
|
|
if err != nil {
|
|
return fmt.Errorf("parse prefix %s: %w", prefix, err)
|
|
}
|
|
route.Dst = ipNet
|
|
|
|
if err := addNextHop(nexthop, route); err != nil {
|
|
return fmt.Errorf("add gateway and device: %w", err)
|
|
}
|
|
|
|
if err := netlink.RouteAdd(route); err != nil && !errors.Is(err, syscall.EEXIST) && !errors.Is(err, syscall.EAFNOSUPPORT) {
|
|
return fmt.Errorf("netlink add route: %w", err)
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
// addUnreachableRoute adds an unreachable route for the specified IP family and routing table.
|
|
// ipFamily should be netlink.FAMILY_V4 for IPv4 or netlink.FAMILY_V6 for IPv6.
|
|
// tableID specifies the routing table to which the unreachable route will be added.
|
|
func addUnreachableRoute(prefix netip.Prefix, tableID int) error {
|
|
_, ipNet, err := net.ParseCIDR(prefix.String())
|
|
if err != nil {
|
|
return fmt.Errorf("parse prefix %s: %w", prefix, err)
|
|
}
|
|
|
|
route := &netlink.Route{
|
|
Type: syscall.RTN_UNREACHABLE,
|
|
Table: tableID,
|
|
Family: getAddressFamily(prefix),
|
|
Dst: ipNet,
|
|
}
|
|
|
|
if err := netlink.RouteAdd(route); err != nil && !errors.Is(err, syscall.EEXIST) && !errors.Is(err, syscall.EAFNOSUPPORT) {
|
|
return fmt.Errorf("netlink add unreachable route: %w", err)
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
func removeUnreachableRoute(prefix netip.Prefix, tableID int) error {
|
|
_, ipNet, err := net.ParseCIDR(prefix.String())
|
|
if err != nil {
|
|
return fmt.Errorf("parse prefix %s: %w", prefix, err)
|
|
}
|
|
|
|
route := &netlink.Route{
|
|
Type: syscall.RTN_UNREACHABLE,
|
|
Table: tableID,
|
|
Family: getAddressFamily(prefix),
|
|
Dst: ipNet,
|
|
}
|
|
|
|
if err := netlink.RouteDel(route); err != nil &&
|
|
!errors.Is(err, syscall.ESRCH) &&
|
|
!errors.Is(err, syscall.ENOENT) &&
|
|
!errors.Is(err, syscall.EAFNOSUPPORT) {
|
|
return fmt.Errorf("netlink remove unreachable route: %w", err)
|
|
}
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
// removeRoute removes a route from a specific routing table identified by tableID.
|
|
func removeRoute(prefix netip.Prefix, nexthop Nexthop, tableID int) error {
|
|
_, ipNet, err := net.ParseCIDR(prefix.String())
|
|
if err != nil {
|
|
return fmt.Errorf("parse prefix %s: %w", prefix, err)
|
|
}
|
|
|
|
route := &netlink.Route{
|
|
Scope: netlink.SCOPE_UNIVERSE,
|
|
Table: tableID,
|
|
Family: getAddressFamily(prefix),
|
|
Dst: ipNet,
|
|
}
|
|
|
|
if err := addNextHop(nexthop, route); err != nil {
|
|
return fmt.Errorf("add gateway and device: %w", err)
|
|
}
|
|
|
|
if err := netlink.RouteDel(route); err != nil && !errors.Is(err, syscall.ESRCH) && !errors.Is(err, syscall.EAFNOSUPPORT) {
|
|
return fmt.Errorf("netlink remove route: %w", err)
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
func flushRoutes(tableID, family int) error {
|
|
routes, err := netlink.RouteListFiltered(family, &netlink.Route{Table: tableID}, netlink.RT_FILTER_TABLE)
|
|
if err != nil {
|
|
return fmt.Errorf("list routes from table %d: %w", tableID, err)
|
|
}
|
|
|
|
var result *multierror.Error
|
|
for i := range routes {
|
|
route := routes[i]
|
|
// unreachable default routes don't come back with Dst set
|
|
if route.Gw == nil && route.Src == nil && route.Dst == nil {
|
|
if family == netlink.FAMILY_V4 {
|
|
routes[i].Dst = &net.IPNet{IP: net.IPv4zero, Mask: net.CIDRMask(0, 32)}
|
|
} else {
|
|
routes[i].Dst = &net.IPNet{IP: net.IPv6zero, Mask: net.CIDRMask(0, 128)}
|
|
}
|
|
}
|
|
if err := netlink.RouteDel(&routes[i]); err != nil && !errors.Is(err, syscall.EAFNOSUPPORT) {
|
|
result = multierror.Append(result, fmt.Errorf("failed to delete route %v from table %d: %w", routes[i], tableID, err))
|
|
}
|
|
}
|
|
|
|
return nberrors.FormatErrorOrNil(result)
|
|
}
|
|
|
|
func EnableIPForwarding() error {
|
|
_, err := sysctl.Set(ipv4ForwardingPath, 1, false)
|
|
return err
|
|
}
|
|
|
|
// entryExists checks if the specified ID or name already exists in the rt_tables file
|
|
// and verifies if existing names start with "netbird_".
|
|
func entryExists(file *os.File, id int) (bool, error) {
|
|
if _, err := file.Seek(0, 0); err != nil {
|
|
return false, fmt.Errorf("seek rt_tables: %w", err)
|
|
}
|
|
scanner := bufio.NewScanner(file)
|
|
for scanner.Scan() {
|
|
line := scanner.Text()
|
|
var existingID int
|
|
var existingName string
|
|
if _, err := fmt.Sscanf(line, "%d %s\n", &existingID, &existingName); err == nil {
|
|
if existingID == id {
|
|
if existingName != NetbirdVPNTableName {
|
|
return true, ErrTableIDExists
|
|
}
|
|
return true, nil
|
|
}
|
|
}
|
|
}
|
|
if err := scanner.Err(); err != nil {
|
|
return false, fmt.Errorf("scan rt_tables: %w", err)
|
|
}
|
|
return false, nil
|
|
}
|
|
|
|
// addRoutingTableName adds human-readable names for custom routing tables.
|
|
func addRoutingTableName() error {
|
|
file, err := os.Open(rtTablesPath)
|
|
if err != nil {
|
|
if errors.Is(err, os.ErrNotExist) {
|
|
return nil
|
|
}
|
|
return fmt.Errorf("open rt_tables: %w", err)
|
|
}
|
|
defer func() {
|
|
if err := file.Close(); err != nil {
|
|
log.Errorf("Error closing rt_tables: %v", err)
|
|
}
|
|
}()
|
|
|
|
exists, err := entryExists(file, NetbirdVPNTableID)
|
|
if err != nil {
|
|
return fmt.Errorf("verify entry %d, %s: %w", NetbirdVPNTableID, NetbirdVPNTableName, err)
|
|
}
|
|
if exists {
|
|
return nil
|
|
}
|
|
|
|
// Reopen the file in append mode to add new entries
|
|
if err := file.Close(); err != nil {
|
|
log.Errorf("Error closing rt_tables before appending: %v", err)
|
|
}
|
|
file, err = os.OpenFile(rtTablesPath, os.O_WRONLY|os.O_APPEND|os.O_CREATE, 0644)
|
|
if err != nil {
|
|
return fmt.Errorf("open rt_tables for appending: %w", err)
|
|
}
|
|
|
|
if _, err := file.WriteString(fmt.Sprintf("\n%d\t%s\n", NetbirdVPNTableID, NetbirdVPNTableName)); err != nil {
|
|
return fmt.Errorf("append entry to rt_tables: %w", err)
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
// addRule adds a routing rule to a specific routing table identified by tableID.
|
|
func addRule(params ruleParams) error {
|
|
rule := netlink.NewRule()
|
|
rule.Table = params.tableID
|
|
rule.Mark = params.fwmark
|
|
rule.Family = params.family
|
|
rule.Priority = params.priority
|
|
rule.Invert = params.invert
|
|
rule.SuppressPrefixlen = params.suppressPrefix
|
|
|
|
if err := netlink.RuleAdd(rule); err != nil && !errors.Is(err, syscall.EEXIST) && !errors.Is(err, syscall.EAFNOSUPPORT) {
|
|
return fmt.Errorf("add routing rule: %w", err)
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
// removeRule removes a routing rule from a specific routing table identified by tableID.
|
|
func removeRule(params ruleParams) error {
|
|
rule := netlink.NewRule()
|
|
rule.Table = params.tableID
|
|
rule.Mark = params.fwmark
|
|
rule.Family = params.family
|
|
rule.Invert = params.invert
|
|
rule.Priority = params.priority
|
|
rule.SuppressPrefixlen = params.suppressPrefix
|
|
|
|
if err := netlink.RuleDel(rule); err != nil && !errors.Is(err, syscall.ENOENT) && !errors.Is(err, syscall.EAFNOSUPPORT) {
|
|
return fmt.Errorf("remove routing rule: %w", err)
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
// addNextHop adds the gateway and device to the route.
|
|
func addNextHop(nexthop Nexthop, route *netlink.Route) error {
|
|
if nexthop.Intf != nil {
|
|
route.LinkIndex = nexthop.Intf.Index
|
|
}
|
|
|
|
if nexthop.IP.IsValid() {
|
|
route.Gw = nexthop.IP.AsSlice()
|
|
|
|
// if zone is set, it means the gateway is a link-local address, so we set the link index
|
|
if nexthop.IP.Zone() != "" && nexthop.Intf == nil {
|
|
link, err := netlink.LinkByName(nexthop.IP.Zone())
|
|
if err != nil {
|
|
return fmt.Errorf("get link by name for zone %s: %w", nexthop.IP.Zone(), err)
|
|
}
|
|
route.LinkIndex = link.Attrs().Index
|
|
}
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
func getAddressFamily(prefix netip.Prefix) int {
|
|
if prefix.Addr().Is4() {
|
|
return netlink.FAMILY_V4
|
|
}
|
|
return netlink.FAMILY_V6
|
|
}
|