/*
* Copyright (c) 2017, Psiphon Inc.
* All rights reserved.
*
* This program is free software: you can redistribute it and/or modify
* it under the terms of the GNU General Public License as published by
* the Free Software Foundation, either version 3 of the License, or
* (at your option) any later version.
*
* This program is distributed in the hope that it will be useful,
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
* GNU General Public License for more details.
*
* You should have received a copy of the GNU General Public License
* along with this program. If not, see .
*
*/
// Darwin utun code based on https://github.com/songgao/water:
/*
Copyright (c) 2016, Song Gao
All rights reserved.
Redistribution and use in source and binary forms, with or without
modification, are permitted provided that the following conditions are met:
* Redistributions of source code must retain the above copyright notice, this
list of conditions and the following disclaimer.
* Redistributions in binary form must reproduce the above copyright notice,
this list of conditions and the following disclaimer in the documentation
and/or other materials provided with the distribution.
* Neither the name of water nor the names of its contributors may be used to
endorse or promote products derived from this software without specific prior
written permission.
THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS"
AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE
FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR
SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER
CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY,
OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
*/
package tun
import (
std_errors "errors"
"fmt"
"io/ioutil"
"net"
"os"
"strconv"
"syscall"
"unsafe"
"github.com/Psiphon-Labs/psiphon-tunnel-core/psiphon/common"
"github.com/Psiphon-Labs/psiphon-tunnel-core/psiphon/common/errors"
)
const (
DEFAULT_PUBLIC_INTERFACE_NAME = "en0"
)
func IsSupported() bool {
return true
}
func makeDeviceInboundBuffer(MTU int) []byte {
// 4 extra bytes to read a utun packet header
return make([]byte, 4+MTU)
}
func makeDeviceOutboundBuffer(MTU int) []byte {
// 4 extra bytes to write a utun packet header
return make([]byte, 4+MTU)
}
// OpenTunDevice opens a file for performing device I/O with
// either a specified tun device, or a new tun device (when
// name is "").
func OpenTunDevice(name string) (*os.File, string, error) {
// Prevent fork between creating fd and setting CLOEXEC
syscall.ForkLock.RLock()
defer syscall.ForkLock.RUnlock()
unit := uint32(0)
if name != "" {
n, err := fmt.Sscanf(name, "utun%d", &unit)
if err == nil && n != 1 {
err = std_errors.New("failed to scan device name")
}
if err != nil {
return nil, "", errors.Trace(err)
}
}
// Darwin utun code based on:
// https://github.com/songgao/water/blob/70591d249921d075889cc49aaef072987e6b354a/syscalls_darwin.go
// Definitions from , ,
const (
TUN_CONTROL_NAME = "com.apple.net.utun_control"
CTLIOCGINFO = (0x40000000 | 0x80000000) | ((100 & 0x1fff) << 16) | uint32(byte('N'))<<8 | 3
TUNSIFMODE = (0x80000000) | ((4 & 0x1fff) << 16) | uint32(byte('t'))<<8 | 94
PF_SYSTEM = syscall.AF_SYSTEM
SYSPROTO_CONTROL = 2
AF_SYS_CONTROL = 2
UTUN_OPT_IFNAME = 2
)
fd, err := syscall.Socket(
PF_SYSTEM,
syscall.SOCK_DGRAM,
SYSPROTO_CONTROL)
if err != nil {
return nil, "", errors.Trace(err)
}
// Set CLOEXEC so file descriptor not leaked to network config command subprocesses
syscall.CloseOnExec(fd)
var tunControlName [96]byte
copy(tunControlName[:], TUN_CONTROL_NAME)
ctlInfo := struct {
ctlID uint32
ctlName [96]byte
}{
0,
tunControlName,
}
_, _, errno := syscall.Syscall(
syscall.SYS_IOCTL,
uintptr(fd),
uintptr(CTLIOCGINFO),
uintptr(unsafe.Pointer(&ctlInfo)))
if errno != 0 {
return nil, "", errors.Trace(errno)
}
sockaddrCtlSize := 32
sockaddrCtl := struct {
scLen uint8
scFamily uint8
ssSysaddr uint16
scID uint32
scUnit uint32
scReserved [5]uint32
}{
uint8(sockaddrCtlSize),
syscall.AF_SYSTEM,
AF_SYS_CONTROL,
ctlInfo.ctlID,
unit,
[5]uint32{},
}
_, _, errno = syscall.RawSyscall(
syscall.SYS_CONNECT,
uintptr(fd),
uintptr(unsafe.Pointer(&sockaddrCtl)),
uintptr(sockaddrCtlSize))
if errno != 0 {
return nil, "", errors.Trace(errno)
}
ifNameSize := uintptr(16)
ifName := struct {
name [16]byte
}{}
_, _, errno = syscall.Syscall6(
syscall.SYS_GETSOCKOPT,
uintptr(fd),
SYSPROTO_CONTROL,
UTUN_OPT_IFNAME,
uintptr(unsafe.Pointer(&ifName)),
uintptr(unsafe.Pointer(&ifNameSize)),
0)
if errno != 0 {
return nil, "", errors.Trace(errno)
}
deviceName := string(ifName.name[:ifNameSize-1])
file := os.NewFile(uintptr(fd), deviceName)
return file, deviceName, nil
}
func (device *Device) readTunPacket() (int, int, error) {
// Assumes MTU passed to makeDeviceInboundBuffer is actual MTU and
// so buffer is sufficiently large to always read a complete packet,
// along with the 4 byte utun header.
n, err := device.deviceIO.Read(device.inboundBuffer)
if err != nil {
return 0, 0, errors.Trace(err)
}
if n < 4 {
return 0, 0, errors.TraceNew("missing packet prefix")
}
return 4, n - 4, nil
}
func (device *Device) writeTunPacket(packet []byte) error {
// Note: can't use writev via net.Buffers. os.File isn't
// a net.Conn and can't wrap with net.FileConn due to
// fd type. So writes use an intermediate buffer to add
// the header.
// Assumes:
// - device.outboundBuffer[0..2] will be 0, the zero value
// - packet already validated as 4 or 6
// - max len(packet) won't exceed MTU, prellocated size of
// outboundBuffer.
// Write utun header
if len(packet) > 0 && packet[0]>>4 == 4 {
device.outboundBuffer[3] = syscall.AF_INET
} else { // IPv6
device.outboundBuffer[3] = syscall.AF_INET6
}
copy(device.outboundBuffer[4:], packet)
size := 4 + len(packet)
_, err := device.deviceIO.Write(device.outboundBuffer[:size])
if err != nil {
return errors.Trace(err)
}
return nil
}
func resetNATTables(_ *ServerConfig, _ net.IP) error {
// Not supported on Darwin
// TODO: could use pfctl -K?
return nil
}
func configureServerInterface(
config *ServerConfig,
tunDeviceName string) error {
// TODO: fix or remove the following broken code
return errors.Trace(errUnsupported)
// Set tun device network addresses and MTU
IPv4Address, IPv4Netmask, err := splitIPMask(serverIPv4AddressCIDR)
if err != nil {
return errors.Trace(err)
}
err = common.RunNetworkConfigCommand(
config.Logger,
config.SudoNetworkConfigCommands,
"ifconfig",
tunDeviceName,
IPv4Address, IPv4Address, IPv4Netmask,
"mtu", strconv.Itoa(getMTU(config.MTU)),
"up")
if err != nil {
return errors.Trace(err)
}
IPv6Address, IPv6Prefixlen, err := splitIPPrefixLen(serverIPv6AddressCIDR)
if err != nil {
return errors.Trace(err)
}
err = common.RunNetworkConfigCommand(
config.Logger,
config.SudoNetworkConfigCommands,
"ifconfig",
tunDeviceName,
"inet6", IPv6Address, "prefixlen", IPv6Prefixlen)
if err != nil {
return errors.Trace(err)
}
// NAT tun device to external interface
//
// Uses configuration described here:
// https://discussions.apple.com/thread/5538749
egressInterface := config.EgressInterface
if egressInterface == "" {
egressInterface = DEFAULT_PUBLIC_INTERFACE_NAME
}
err = common.RunNetworkConfigCommand(
config.Logger,
config.SudoNetworkConfigCommands,
"sysctl",
"net.inet.ip.forwarding=1")
if err != nil {
return errors.Trace(err)
}
err = common.RunNetworkConfigCommand(
config.Logger,
config.SudoNetworkConfigCommands,
"sysctl",
"net.inet6.ip6.forwarding=1")
if err != nil {
return errors.Trace(err)
}
// TODO:
// - should use -E and preserve existing pf state?
// - OR should use "-F all" to reset everything?
pfConf := fmt.Sprintf(
"nat on %s from %s to any -> (%s)\n"+
"nat on %s from %s to any -> (%s)\n"+
"pass from %s to any keep state\n"+
"pass from %s to any keep state\n\n",
egressInterface, privateSubnetIPv4.String(), egressInterface,
egressInterface, privateSubnetIPv6.String(), egressInterface,
privateSubnetIPv4.String(),
privateSubnetIPv6.String())
tempFile, err := ioutil.TempFile("", "tun_pf_conf")
if err != nil {
return errors.Trace(err)
}
defer os.Remove(tempFile.Name())
_, err = tempFile.Write([]byte(pfConf))
if err != nil {
return errors.Trace(err)
}
tempFile.Close()
config.Logger.WithTraceFields(common.LogFields{
"content": pfConf,
}).Debug("pf.conf")
// Disable first to avoid "pfctl: pf already enabled"
_ = common.RunNetworkConfigCommand(
config.Logger,
config.SudoNetworkConfigCommands,
"pfctl",
"-q",
"-d")
err = common.RunNetworkConfigCommand(
config.Logger,
config.SudoNetworkConfigCommands,
"pfctl",
"-q",
"-e",
"-f", tempFile.Name())
if err != nil {
return errors.Trace(err)
}
return nil
}
func configureClientInterface(
config *ClientConfig,
tunDeviceName string) error {
// TODO: fix or remove the following broken code
return errors.Trace(errUnsupported)
// Set tun device network addresses and MTU
IPv4Address, IPv4Netmask, err := splitIPMask(config.IPv4AddressCIDR)
if err != nil {
return errors.Trace(err)
}
err = common.RunNetworkConfigCommand(
config.Logger,
config.SudoNetworkConfigCommands,
"ifconfig",
tunDeviceName,
IPv4Address, IPv4Address,
"netmask", IPv4Netmask,
"mtu", strconv.Itoa(getMTU(config.MTU)),
"up")
if err != nil {
return errors.Trace(err)
}
IPv6Address, IPv6Prefixlen, err := splitIPPrefixLen(serverIPv6AddressCIDR)
if err != nil {
return errors.Trace(err)
}
err = common.RunNetworkConfigCommand(
config.Logger,
config.SudoNetworkConfigCommands,
"ifconfig",
tunDeviceName,
"inet6", IPv6Address, "prefixlen", IPv6Prefixlen)
if err != nil {
return errors.Trace(err)
}
// Set routing. Routes set here should automatically
// drop when the tun device is removed.
for _, destination := range config.RouteDestinations {
// TODO: IPv6
err = common.RunNetworkConfigCommand(
config.Logger,
config.SudoNetworkConfigCommands,
"route",
"add",
"-ifscope", tunDeviceName,
destination,
IPv4Address)
if err != nil {
return errors.Trace(err)
}
}
return nil
}
// BindToDevice binds a socket to the specified interface.
func BindToDevice(fd int, deviceName string) error {
netInterface, err := net.InterfaceByName(deviceName)
if err != nil {
return errors.Trace(err)
}
// IP_BOUND_IF definition from
const IP_BOUND_IF = 25
err = syscall.SetsockoptInt(fd, syscall.IPPROTO_IP, IP_BOUND_IF, netInterface.Index)
if err != nil {
return errors.Trace(err)
}
return nil
}
func fixBindToDevice(_ common.Logger, _ bool, _ string) error {
// Not required on Darwin
return nil
}