mirror of
https://github.com/netbirdio/netbird.git
synced 2026-04-20 17:26:40 +00:00
* Feat add basic support for IPv6 networks Newly generated networks automatically generate an IPv6 prefix of size 64 within the ULA address range, devices obtain a randomly generated address within this prefix. Currently, this is Linux only and does not yet support all features (routes currently cause an error). * Fix firewall configuration for IPv6 networks * Fix routing configuration for IPv6 networks * Feat provide info on IPv6 support for specific client to mgmt server * Feat allow configuration of IPv6 support through API, improve stability * Feat add IPv6 support to new firewall implementation * Fix peer list item response not containing IPv6 address * Fix nftables breaking on IPv6 address change * Fix build issues for non-linux systems * Fix intermittent disconnections when IPv6 is enabled * Fix test issues and make some minor revisions * Fix some more testing issues * Fix more CI issues due to IPv6 * Fix more testing issues * Add inheritance of IPv6 enablement status from groups * Fix IPv6 events not having associated messages * Address first review comments regarding IPv6 support * Fix IPv6 table being created even when IPv6 is disabled Also improved stability of IPv6 route and firewall handling on client side * Fix IPv6 routes not being removed * Fix DNS IPv6 issues, limit IPv6 nameservers to IPv6 peers * Improve code for IPv6 DNS server selection, add AAAA custom records * Ensure IPv6 routes can only exist for IPv6 routing peers * Fix IPv6 network generation randomness * Fix a bunch of compilation issues and test failures * Replace method calls that are unavailable in Go 1.21 * Fix nil dereference in cleanUpDefaultForwardRules6 * Fix nil pointer dereference when persisting IPv6 network in sqlite * Clean up of client-side code changes for IPv6 * Fix nil dereference in rule mangling and compilation issues * Add a bunch of client-side test cases for IPv6 * Fix IPv6 tests running on unsupported environments * Fix import cycle in tests * Add missing method SupportsIPv6() for windows * Require IPv6 default route for IPv6 tests * Fix panics in routemanager tests on non-linux * Fix some more route manager tests concerning IPv6 * Add some final client-side tests * Add IPv6 tests for management code, small fixes * Fix linting issues * Fix small test suite issues * Fix linter issues and builds on macOS and Windows again * fix builds for iOS because of IPv6 breakage
158 lines
4.7 KiB
Go
158 lines
4.7 KiB
Go
//go:build !android
|
|
|
|
package firewall
|
|
|
|
import (
|
|
"context"
|
|
"fmt"
|
|
"os"
|
|
|
|
"github.com/coreos/go-iptables/iptables"
|
|
"github.com/google/nftables"
|
|
log "github.com/sirupsen/logrus"
|
|
|
|
nbiptables "github.com/netbirdio/netbird/client/firewall/iptables"
|
|
firewall "github.com/netbirdio/netbird/client/firewall/manager"
|
|
nbnftables "github.com/netbirdio/netbird/client/firewall/nftables"
|
|
"github.com/netbirdio/netbird/client/firewall/uspfilter"
|
|
)
|
|
|
|
const (
|
|
// UNKNOWN is the default value for the firewall type for unknown firewall type
|
|
UNKNOWN FWType = iota
|
|
// IPTABLES is the value for the iptables firewall type
|
|
IPTABLES
|
|
// NFTABLES is the value for the nftables firewall type
|
|
NFTABLES
|
|
)
|
|
|
|
// SKIP_NFTABLES_ENV is the environment variable to skip nftables check
|
|
const SKIP_NFTABLES_ENV = "NB_SKIP_NFTABLES_CHECK"
|
|
|
|
// FWType is the type for the firewall type
|
|
type FWType int
|
|
|
|
func NewFirewall(context context.Context, iface IFaceMapper) (firewall.Manager, error) {
|
|
// on the linux system we try to user nftables or iptables
|
|
// in any case, because we need to allow netbird interface traffic
|
|
// so we use AllowNetbird traffic from these firewall managers
|
|
// for the userspace packet filtering firewall
|
|
var fm firewall.Manager
|
|
var errFw error
|
|
|
|
switch check() {
|
|
case IPTABLES:
|
|
log.Info("creating an iptables firewall manager")
|
|
fm, errFw = nbiptables.Create(context, iface)
|
|
if errFw != nil {
|
|
log.Errorf("failed to create iptables manager: %s", errFw)
|
|
}
|
|
case NFTABLES:
|
|
log.Info("creating an nftables firewall manager")
|
|
fm, errFw = nbnftables.Create(context, iface)
|
|
if errFw != nil {
|
|
log.Errorf("failed to create nftables manager: %s", errFw)
|
|
}
|
|
default:
|
|
errFw = fmt.Errorf("no firewall manager found")
|
|
log.Info("no firewall manager found, trying to use userspace packet filtering firewall")
|
|
}
|
|
|
|
if iface.IsUserspaceBind() {
|
|
var errUsp error
|
|
if errFw == nil {
|
|
fm, errUsp = uspfilter.CreateWithNativeFirewall(iface, fm)
|
|
} else {
|
|
fm, errUsp = uspfilter.Create(iface)
|
|
}
|
|
if errUsp != nil {
|
|
log.Debugf("failed to create userspace filtering firewall: %s", errUsp)
|
|
return nil, errUsp
|
|
}
|
|
|
|
// Note for devs: When adding IPv6 support to userspace bind, the implementation of AllowNetbird() has to be
|
|
// adjusted accordingly.
|
|
if err := fm.AllowNetbird(); err != nil {
|
|
log.Errorf("failed to allow netbird interface traffic: %v", err)
|
|
}
|
|
return fm, nil
|
|
}
|
|
|
|
if errFw != nil {
|
|
return nil, errFw
|
|
}
|
|
|
|
return fm, nil
|
|
}
|
|
|
|
// Returns true if the current firewall implementation supports IPv6.
|
|
// Currently true if the firewall is nftables.
|
|
func SupportsIPv6() bool {
|
|
return check() == NFTABLES
|
|
}
|
|
|
|
// check returns the firewall type based on common lib checks. It returns UNKNOWN if no firewall is found.
|
|
func check() FWType {
|
|
useIPTABLES := false
|
|
var iptablesChains []string
|
|
ip, err := iptables.NewWithProtocol(iptables.ProtocolIPv4)
|
|
if err == nil && isIptablesClientAvailable(ip) {
|
|
major, minor, _ := ip.GetIptablesVersion()
|
|
// use iptables when its version is lower than 1.8.0 which doesn't work well with our nftables manager
|
|
if major < 1 || (major == 1 && minor < 8) {
|
|
return IPTABLES
|
|
}
|
|
|
|
useIPTABLES = true
|
|
|
|
iptablesChains, err = ip.ListChains("filter")
|
|
if err != nil {
|
|
log.Errorf("failed to list iptables chains: %s", err)
|
|
useIPTABLES = false
|
|
}
|
|
}
|
|
|
|
nf := nftables.Conn{}
|
|
if chains, err := nf.ListChains(); err == nil && os.Getenv(SKIP_NFTABLES_ENV) != "true" {
|
|
if !useIPTABLES {
|
|
return NFTABLES
|
|
}
|
|
|
|
// search for chains where table is filter
|
|
// if we find one, we assume that nftables manager can be used with iptables
|
|
for _, chain := range chains {
|
|
if chain.Table.Name == "filter" {
|
|
return NFTABLES
|
|
}
|
|
}
|
|
|
|
// check tables for the following constraints:
|
|
// 1. there is no chain in nftables for the filter table and there is at least one chain in iptables, we assume that nftables manager can not be used
|
|
// 2. there is no tables or more than one table, we assume that nftables manager can be used
|
|
// 3. there is only one table and its name is filter, we assume that nftables manager can not be used, since there was no chain in it
|
|
// 4. if we find an error we log and continue with iptables check
|
|
nbTablesList, err := nf.ListTables()
|
|
switch {
|
|
case err == nil && len(iptablesChains) > 0:
|
|
return IPTABLES
|
|
case err == nil && len(nbTablesList) != 1:
|
|
return NFTABLES
|
|
case err == nil && len(nbTablesList) == 1 && nbTablesList[0].Name == "filter":
|
|
return IPTABLES
|
|
case err != nil:
|
|
log.Errorf("failed to list nftables tables on fw manager discovery: %s", err)
|
|
}
|
|
}
|
|
|
|
if useIPTABLES {
|
|
return IPTABLES
|
|
}
|
|
|
|
return UNKNOWN
|
|
}
|
|
|
|
func isIptablesClientAvailable(client *iptables.IPTables) bool {
|
|
_, err := client.ListChains("filter")
|
|
return err == nil
|
|
}
|