mirror of
https://github.com/XTLS/Xray-core.git
synced 2024-11-14 16:59:19 +02:00
0ac7da2fc8
* feat: wireguard inbound * feat(command): generate wireguard compatible keypair * feat(wireguard): connection idle timeout * fix(wireguard): close endpoint after connection closed * fix(wireguard): resolve conflicts * feat(wireguard): set cubic as default cc algorithm in gVisor TUN * chore(wireguard): resolve conflict * chore(wireguard): remove redurant code * chore(wireguard): remove redurant code * feat: rework server for gvisor tun * feat: keep user-space tun as an option * fix: exclude android from native tun build * feat: auto kernel tun * fix: build * fix: regulate function name & fix test
238 lines
5.7 KiB
Go
238 lines
5.7 KiB
Go
//go:build linux && !android
|
|
|
|
package wireguard
|
|
|
|
import (
|
|
"context"
|
|
"errors"
|
|
"fmt"
|
|
"net"
|
|
"net/netip"
|
|
"os"
|
|
|
|
"golang.org/x/sys/unix"
|
|
|
|
"github.com/sagernet/sing/common/control"
|
|
"github.com/vishvananda/netlink"
|
|
wgtun "golang.zx2c4.com/wireguard/tun"
|
|
)
|
|
|
|
type deviceNet struct {
|
|
tunnel
|
|
dialer net.Dialer
|
|
|
|
handle *netlink.Handle
|
|
linkAddrs []netlink.Addr
|
|
routes []*netlink.Route
|
|
rules []*netlink.Rule
|
|
}
|
|
|
|
func newDeviceNet(interfaceName string) *deviceNet {
|
|
var dialer net.Dialer
|
|
bindControl := control.BindToInterface(control.DefaultInterfaceFinder(), interfaceName, -1)
|
|
dialer.Control = control.Append(dialer.Control, bindControl)
|
|
return &deviceNet{dialer: dialer}
|
|
}
|
|
|
|
func (d *deviceNet) DialContextTCPAddrPort(ctx context.Context, addr netip.AddrPort) (
|
|
net.Conn, error,
|
|
) {
|
|
return d.dialer.DialContext(ctx, "tcp", addr.String())
|
|
}
|
|
|
|
func (d *deviceNet) DialUDPAddrPort(laddr, raddr netip.AddrPort) (net.Conn, error) {
|
|
dialer := d.dialer
|
|
dialer.LocalAddr = &net.UDPAddr{IP: laddr.Addr().AsSlice(), Port: int(laddr.Port())}
|
|
return dialer.DialContext(context.Background(), "udp", raddr.String())
|
|
}
|
|
|
|
func (d *deviceNet) Close() (err error) {
|
|
var errs []error
|
|
for _, rule := range d.rules {
|
|
if err = d.handle.RuleDel(rule); err != nil {
|
|
errs = append(errs, fmt.Errorf("failed to delete rule: %w", err))
|
|
}
|
|
}
|
|
for _, route := range d.routes {
|
|
if err = d.handle.RouteDel(route); err != nil {
|
|
errs = append(errs, fmt.Errorf("failed to delete route: %w", err))
|
|
}
|
|
}
|
|
if err = d.tunnel.Close(); err != nil {
|
|
errs = append(errs, fmt.Errorf("failed to close tunnel: %w", err))
|
|
}
|
|
if d.handle != nil {
|
|
d.handle.Close()
|
|
d.handle = nil
|
|
}
|
|
if len(errs) == 0 {
|
|
return nil
|
|
}
|
|
return errors.Join(errs...)
|
|
}
|
|
|
|
func createKernelTun(localAddresses []netip.Addr, mtu int, handler promiscuousModeHandler) (t Tunnel, err error) {
|
|
if handler != nil {
|
|
return nil, newError("TODO: support promiscuous mode")
|
|
}
|
|
|
|
var v4, v6 *netip.Addr
|
|
for _, prefixes := range localAddresses {
|
|
if v4 == nil && prefixes.Is4() {
|
|
x := prefixes
|
|
v4 = &x
|
|
}
|
|
if v6 == nil && prefixes.Is6() {
|
|
x := prefixes
|
|
v6 = &x
|
|
}
|
|
}
|
|
|
|
writeSysctlZero := func(path string) error {
|
|
_, err := os.Stat(path)
|
|
if os.IsNotExist(err) {
|
|
return nil
|
|
}
|
|
if err != nil {
|
|
return err
|
|
}
|
|
return os.WriteFile(path, []byte("0"), 0o644)
|
|
}
|
|
|
|
// system configs.
|
|
if v4 != nil {
|
|
if err = writeSysctlZero("/proc/sys/net/ipv4/conf/all/rp_filter"); err != nil {
|
|
return nil, fmt.Errorf("failed to disable ipv4 rp_filter for all: %w", err)
|
|
}
|
|
}
|
|
if v6 != nil {
|
|
if err = writeSysctlZero("/proc/sys/net/ipv6/conf/all/disable_ipv6"); err != nil {
|
|
return nil, fmt.Errorf("failed to enable ipv6: %w", err)
|
|
}
|
|
if err = writeSysctlZero("/proc/sys/net/ipv6/conf/all/rp_filter"); err != nil {
|
|
return nil, fmt.Errorf("failed to disable ipv6 rp_filter for all: %w", err)
|
|
}
|
|
}
|
|
|
|
n := CalculateInterfaceName("wg")
|
|
wgt, err := wgtun.CreateTUN(n, mtu)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
defer func() {
|
|
if err != nil {
|
|
_ = wgt.Close()
|
|
}
|
|
}()
|
|
|
|
// disable linux rp_filter for tunnel device to avoid packet drop.
|
|
// the operation require root privilege on container require '--privileged' flag.
|
|
if v4 != nil {
|
|
if err = writeSysctlZero("/proc/sys/net/ipv4/conf/" + n + "/rp_filter"); err != nil {
|
|
return nil, fmt.Errorf("failed to disable ipv4 rp_filter for tunnel: %w", err)
|
|
}
|
|
}
|
|
if v6 != nil {
|
|
if err = writeSysctlZero("/proc/sys/net/ipv6/conf/" + n + "/rp_filter"); err != nil {
|
|
return nil, fmt.Errorf("failed to disable ipv6 rp_filter for tunnel: %w", err)
|
|
}
|
|
}
|
|
|
|
ipv6TableIndex := 1023
|
|
if v6 != nil {
|
|
r := &netlink.Route{Table: ipv6TableIndex}
|
|
for {
|
|
routeList, fErr := netlink.RouteListFiltered(netlink.FAMILY_V6, r, netlink.RT_FILTER_TABLE)
|
|
if len(routeList) == 0 || fErr != nil {
|
|
break
|
|
}
|
|
ipv6TableIndex--
|
|
if ipv6TableIndex < 0 {
|
|
return nil, fmt.Errorf("failed to find available ipv6 table index")
|
|
}
|
|
}
|
|
}
|
|
|
|
out := newDeviceNet(n)
|
|
out.handle, err = netlink.NewHandle()
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
defer func() {
|
|
if err != nil {
|
|
_ = out.Close()
|
|
}
|
|
}()
|
|
|
|
l, err := netlink.LinkByName(n)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
if v4 != nil {
|
|
addr := netlink.Addr{
|
|
IPNet: &net.IPNet{
|
|
IP: v4.AsSlice(),
|
|
Mask: net.CIDRMask(v4.BitLen(), v4.BitLen()),
|
|
},
|
|
}
|
|
out.linkAddrs = append(out.linkAddrs, addr)
|
|
}
|
|
if v6 != nil {
|
|
addr := netlink.Addr{
|
|
IPNet: &net.IPNet{
|
|
IP: v6.AsSlice(),
|
|
Mask: net.CIDRMask(v6.BitLen(), v6.BitLen()),
|
|
},
|
|
}
|
|
out.linkAddrs = append(out.linkAddrs, addr)
|
|
|
|
rt := &netlink.Route{
|
|
LinkIndex: l.Attrs().Index,
|
|
Dst: &net.IPNet{
|
|
IP: net.IPv6zero,
|
|
Mask: net.CIDRMask(0, 128),
|
|
},
|
|
Table: ipv6TableIndex,
|
|
}
|
|
out.routes = append(out.routes, rt)
|
|
|
|
r := netlink.NewRule()
|
|
r.Table, r.Family, r.Src = ipv6TableIndex, unix.AF_INET6, addr.IPNet
|
|
out.rules = append(out.rules, r)
|
|
}
|
|
|
|
for _, addr := range out.linkAddrs {
|
|
if err = out.handle.AddrAdd(l, &addr); err != nil {
|
|
return nil, fmt.Errorf("failed to add address %s to %s: %w", addr, n, err)
|
|
}
|
|
}
|
|
if err = out.handle.LinkSetMTU(l, mtu); err != nil {
|
|
return nil, err
|
|
}
|
|
if err = out.handle.LinkSetUp(l); err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
for _, route := range out.routes {
|
|
if err = out.handle.RouteAdd(route); err != nil {
|
|
return nil, fmt.Errorf("failed to add route %s: %w", route, err)
|
|
}
|
|
}
|
|
for _, rule := range out.rules {
|
|
if err = out.handle.RuleAdd(rule); err != nil {
|
|
return nil, fmt.Errorf("failed to add rule %s: %w", rule, err)
|
|
}
|
|
}
|
|
out.tun = wgt
|
|
return out, nil
|
|
}
|
|
|
|
func KernelTunSupported() bool {
|
|
// run a superuser permission check to check
|
|
// if the current user has the sufficient permission
|
|
// to create a tun device.
|
|
|
|
return unix.Geteuid() == 0 // 0 means root
|
|
}
|