1
0
mirror of https://github.com/systemd/systemd synced 2026-04-09 16:44:51 +02:00

Compare commits

..

6 Commits

Author SHA1 Message Date
Yu Watanabe
8feb9fa4f8
Merge pull request #21584 from yuwata/network-wireguard-cleanups
network: cleanups for wireguard
2021-12-02 15:53:57 +09:00
Yu Watanabe
4a410adae6 Revert "network: address: drop deprecated temporary address"
This reverts commit 528da64a0c734bd45e953b5c57d82e2a727435ef.

The commit is a bad way to fix #19838, and introduces #21593.

Fixes #21593.
2021-12-02 15:41:45 +09:00
Yu Watanabe
38ef464e41 network/wireguard: search valid address of the endpoint from all struct addrinfo entries 2021-12-02 08:39:37 +09:00
Yu Watanabe
8bf7e3b61c network/wireguard: cleanups for resolving endpoints
This makes
- drop peers_with_unresolved_endpoint and peers_with_failed_endpoint,
- drop destroy handler for sd_resolve_query, and manage each query by peer,
- add random fluctuation to the timeout for retry handler,
- retry timer event source is now managed by peer,
- use sd_event_source_disable_unref().
2021-12-02 08:39:32 +09:00
Yu Watanabe
4a897d29f1 network/wireguard: do not resolve Endpoint= if an IP address is specified
Also verify the domain name and port.
2021-12-02 08:36:22 +09:00
Yu Watanabe
4c9bb70854 parse-util: refuse leading white space in port number
When parse_ip_port() is directly used in a conf parser, then that's
fine, as the rvalue is already truncated.

When parse_ip_port() is used when e.g. parsing IP address with port,
then we should really refuse white space after colon.
2021-12-02 08:36:22 +09:00
4 changed files with 177 additions and 162 deletions

View File

@ -644,7 +644,7 @@ int parse_ip_port(const char *s, uint16_t *ret) {
uint16_t l; uint16_t l;
int r; int r;
r = safe_atou16(s, &l); r = safe_atou16_full(s, SAFE_ATO_REFUSE_LEADING_WHITESPACE, &l);
if (r < 0) if (r < 0)
return r; return r;

View File

@ -12,6 +12,7 @@
#include "sd-resolve.h" #include "sd-resolve.h"
#include "alloc-util.h" #include "alloc-util.h"
#include "dns-domain.h"
#include "event-util.h" #include "event-util.h"
#include "fd-util.h" #include "fd-util.h"
#include "fileio.h" #include "fileio.h"
@ -24,12 +25,14 @@
#include "networkd-util.h" #include "networkd-util.h"
#include "parse-util.h" #include "parse-util.h"
#include "path-util.h" #include "path-util.h"
#include "random-util.h"
#include "resolve-private.h" #include "resolve-private.h"
#include "string-util.h" #include "string-util.h"
#include "strv.h" #include "strv.h"
#include "wireguard.h" #include "wireguard.h"
static void resolve_endpoints(NetDev *netdev); static void wireguard_resolve_endpoints(NetDev *netdev);
static int peer_resolve_endpoint(WireguardPeer *peer);
static WireguardPeer* wireguard_peer_free(WireguardPeer *peer) { static WireguardPeer* wireguard_peer_free(WireguardPeer *peer) {
WireguardIPmask *mask; WireguardIPmask *mask;
@ -40,9 +43,6 @@ static WireguardPeer* wireguard_peer_free(WireguardPeer *peer) {
if (peer->wireguard) { if (peer->wireguard) {
LIST_REMOVE(peers, peer->wireguard->peers, peer); LIST_REMOVE(peers, peer->wireguard->peers, peer);
set_remove(peer->wireguard->peers_with_unresolved_endpoint, peer);
set_remove(peer->wireguard->peers_with_failed_endpoint, peer);
if (peer->section) if (peer->section)
hashmap_remove(peer->wireguard->peers_by_section, peer->section); hashmap_remove(peer->wireguard->peers_by_section, peer->section);
} }
@ -59,6 +59,9 @@ static WireguardPeer* wireguard_peer_free(WireguardPeer *peer) {
free(peer->preshared_key_file); free(peer->preshared_key_file);
explicit_bzero_safe(peer->preshared_key, WG_KEY_LEN); explicit_bzero_safe(peer->preshared_key, WG_KEY_LEN);
sd_event_source_disable_unref(peer->resolve_retry_event_source);
sd_resolve_query_unref(peer->resolve_query);
return mfree(peer); return mfree(peer);
} }
@ -287,7 +290,8 @@ static int wireguard_set_interface(NetDev *netdev) {
return 0; return 0;
} }
static void wireguard_peer_destroy_callback(WireguardPeer *peer) { static int on_resolve_retry(sd_event_source *s, usec_t usec, void *userdata) {
WireguardPeer *peer = userdata;
NetDev *netdev; NetDev *netdev;
assert(peer); assert(peer);
@ -295,134 +299,142 @@ static void wireguard_peer_destroy_callback(WireguardPeer *peer) {
netdev = NETDEV(peer->wireguard); netdev = NETDEV(peer->wireguard);
if (section_is_invalid(peer->section))
wireguard_peer_free(peer);
netdev_unref(netdev);
}
static int on_resolve_retry(sd_event_source *s, usec_t usec, void *userdata) {
NetDev *netdev = userdata;
Wireguard *w;
assert(netdev);
w = WIREGUARD(netdev);
assert(w);
if (!netdev_is_managed(netdev)) if (!netdev_is_managed(netdev))
return 0; return 0;
assert(set_isempty(w->peers_with_unresolved_endpoint)); peer->resolve_query = sd_resolve_query_unref(peer->resolve_query);
SWAP_TWO(w->peers_with_unresolved_endpoint, w->peers_with_failed_endpoint);
resolve_endpoints(netdev);
(void) peer_resolve_endpoint(peer);
return 0; return 0;
} }
/* static usec_t peer_next_resolve_usec(WireguardPeer *peer) {
* Given the number of retries this function will return will an exponential usec_t usec;
* increasing time in milliseconds to wait starting at 200ms and capped at 25 seconds.
*/ /* Given the number of retries this function will return an exponential increasing amount of
static int exponential_backoff_milliseconds(unsigned n_retries) { * milliseconds to wait starting at 200ms and capped at 25 seconds. */
return (2 << MIN(n_retries, 7U)) * 100 * USEC_PER_MSEC;
assert(peer);
usec = (2 << MIN(peer->n_retries, 7U)) * 100 * USEC_PER_MSEC;
return random_u64_range(usec / 10) + usec * 9 / 10;
} }
static int wireguard_resolve_handler(sd_resolve_query *q, static int wireguard_peer_resolve_handler(
int ret, sd_resolve_query *q,
const struct addrinfo *ai, int ret,
WireguardPeer *peer) { const struct addrinfo *ai,
void *userdata) {
WireguardPeer *peer = userdata;
NetDev *netdev; NetDev *netdev;
Wireguard *w;
int r; int r;
assert(peer); assert(peer);
assert(peer->wireguard); assert(peer->wireguard);
w = peer->wireguard; netdev = NETDEV(peer->wireguard);
netdev = NETDEV(w);
if (!netdev_is_managed(netdev)) if (!netdev_is_managed(netdev))
return 0; return 0;
if (ret != 0) { if (ret != 0) {
log_netdev_error(netdev, "Failed to resolve host '%s:%s': %s", peer->endpoint_host, peer->endpoint_port, gai_strerror(ret)); log_netdev_warning(netdev, "Failed to resolve host '%s:%s', ignoring: %s",
peer->endpoint_host, peer->endpoint_port, gai_strerror(ret));
peer->n_retries++;
r = set_ensure_put(&w->peers_with_failed_endpoint, NULL, peer); } else {
if (r < 0) { bool found = false;
log_netdev_error(netdev, "Failed to save a peer, dropping the peer: %m"); for (; ai; ai = ai->ai_next) {
peer->section->invalid = true; if (!IN_SET(ai->ai_family, AF_INET, AF_INET6))
goto resolve_next; continue;
if (ai->ai_addrlen != (ai->ai_family == AF_INET ? sizeof(struct sockaddr_in) : sizeof(struct sockaddr_in6)))
continue;
memcpy(&peer->endpoint, ai->ai_addr, ai->ai_addrlen);
(void) wireguard_set_interface(netdev);
peer->n_retries = 0;
found = true;
break;
} }
} else if ((ai->ai_family == AF_INET && ai->ai_addrlen == sizeof(struct sockaddr_in)) || if (!found) {
(ai->ai_family == AF_INET6 && ai->ai_addrlen == sizeof(struct sockaddr_in6))) log_netdev_warning(netdev, "Neither IPv4 nor IPv6 address found for peer endpoint %s:%s, ignoring the endpoint.",
memcpy(&peer->endpoint, ai->ai_addr, ai->ai_addrlen); peer->endpoint_host, peer->endpoint_port);
else peer->n_retries++;
log_netdev_error(netdev, "Neither IPv4 nor IPv6 address found for peer endpoint %s:%s, ignoring the address.",
peer->endpoint_host, peer->endpoint_port);
resolve_next:
if (!set_isempty(w->peers_with_unresolved_endpoint)) {
resolve_endpoints(netdev);
return 0;
}
(void) wireguard_set_interface(netdev);
if (!set_isempty(w->peers_with_failed_endpoint)) {
usec_t usec;
w->n_retries++;
usec = usec_add(now(CLOCK_MONOTONIC), exponential_backoff_milliseconds(w->n_retries));
r = event_reset_time(netdev->manager->event, &w->resolve_retry_event_source,
CLOCK_MONOTONIC, usec, 0, on_resolve_retry, netdev,
0, "wireguard-resolve-retry", true);
if (r < 0) {
log_netdev_warning_errno(netdev, r, "Could not arm resolve retry handler: %m");
return 0;
} }
} }
if (peer->n_retries > 0) {
r = event_reset_time_relative(netdev->manager->event,
&peer->resolve_retry_event_source,
clock_boottime_or_monotonic(),
peer_next_resolve_usec(peer), 0,
on_resolve_retry, peer, 0, "wireguard-resolve-retry", true);
if (r < 0)
log_netdev_warning_errno(netdev, r, "Could not arm resolve retry handler for endpoint %s:%s, ignoring: %m",
peer->endpoint_host, peer->endpoint_port);
}
wireguard_resolve_endpoints(netdev);
return 0; return 0;
} }
static void resolve_endpoints(NetDev *netdev) { static int peer_resolve_endpoint(WireguardPeer *peer) {
static const struct addrinfo hints = { static const struct addrinfo hints = {
.ai_family = AF_UNSPEC, .ai_family = AF_UNSPEC,
.ai_socktype = SOCK_DGRAM, .ai_socktype = SOCK_DGRAM,
.ai_protocol = IPPROTO_UDP .ai_protocol = IPPROTO_UDP
}; };
NetDev *netdev;
int r;
assert(peer);
assert(peer->wireguard);
netdev = NETDEV(peer->wireguard);
if (!peer->endpoint_host || !peer->endpoint_port)
/* Not necessary to resolve the endpoint. */
return 0;
if (event_source_is_enabled(peer->resolve_retry_event_source) > 0)
/* Timer event source is enabled. The endpoint will be resolved later. */
return 0;
if (peer->resolve_query)
/* Being resolved, or already resolved. */
return 0;
r = sd_resolve_getaddrinfo(netdev->manager->resolve,
&peer->resolve_query,
peer->endpoint_host,
peer->endpoint_port,
&hints,
wireguard_peer_resolve_handler,
peer);
if (r < 0)
return log_netdev_full_errno(netdev, r == -ENOBUFS ? LOG_DEBUG : LOG_WARNING, r,
"Failed to create endpoint resolver for %s:%s, ignoring: %m",
peer->endpoint_host, peer->endpoint_port);
return 0;
}
static void wireguard_resolve_endpoints(NetDev *netdev) {
WireguardPeer *peer; WireguardPeer *peer;
Wireguard *w; Wireguard *w;
int r;
assert(netdev); assert(netdev);
w = WIREGUARD(netdev); w = WIREGUARD(netdev);
assert(w); assert(w);
SET_FOREACH(peer, w->peers_with_unresolved_endpoint) { LIST_FOREACH(peers, peer, w->peers)
r = resolve_getaddrinfo(netdev->manager->resolve, if (peer_resolve_endpoint(peer) == -ENOBUFS)
NULL, /* Too many requests. Let's resolve remaining endpoints later. */
peer->endpoint_host,
peer->endpoint_port,
&hints,
wireguard_resolve_handler,
wireguard_peer_destroy_callback,
peer);
if (r == -ENOBUFS)
break; break;
if (r < 0) {
log_netdev_error_errno(netdev, r, "Failed to create resolver: %m");
continue;
}
/* Avoid freeing netdev. It will be unrefed by the destroy callback. */
netdev_ref(netdev);
(void) set_remove(w->peers_with_unresolved_endpoint, peer);
}
} }
static int netdev_wireguard_post_create(NetDev *netdev, Link *link, sd_netlink_message *m) { static int netdev_wireguard_post_create(NetDev *netdev, Link *link, sd_netlink_message *m) {
@ -430,7 +442,7 @@ static int netdev_wireguard_post_create(NetDev *netdev, Link *link, sd_netlink_m
assert(WIREGUARD(netdev)); assert(WIREGUARD(netdev));
(void) wireguard_set_interface(netdev); (void) wireguard_set_interface(netdev);
resolve_endpoints(netdev); wireguard_resolve_endpoints(netdev);
return 0; return 0;
} }
@ -723,65 +735,85 @@ int config_parse_wireguard_endpoint(
void *userdata) { void *userdata) {
_cleanup_(wireguard_peer_free_or_set_invalidp) WireguardPeer *peer = NULL; _cleanup_(wireguard_peer_free_or_set_invalidp) WireguardPeer *peer = NULL;
const char *begin, *end; _cleanup_free_ char *host = NULL;
union in_addr_union addr;
const char *p;
uint16_t port;
Wireguard *w; Wireguard *w;
size_t len; int family, r;
int r;
assert(data); assert(filename);
assert(rvalue); assert(rvalue);
assert(userdata);
w = WIREGUARD(data); w = WIREGUARD(userdata);
assert(w); assert(w);
if (rvalue[0] == '[') {
begin = &rvalue[1];
end = strchr(rvalue, ']');
if (!end) {
log_syntax(unit, LOG_WARNING, filename, line, 0,
"Unable to find matching brace of endpoint, ignoring assignment: %s",
rvalue);
return 0;
}
len = end - begin;
++end;
if (*end != ':' || !*(end + 1)) {
log_syntax(unit, LOG_WARNING, filename, line, 0,
"Unable to find port of endpoint, ignoring assignment: %s",
rvalue);
return 0;
}
++end;
} else {
begin = rvalue;
end = strrchr(rvalue, ':');
if (!end || !*(end + 1)) {
log_syntax(unit, LOG_WARNING, filename, line, 0,
"Unable to find port of endpoint, ignoring assignment: %s",
rvalue);
return 0;
}
len = end - begin;
++end;
}
r = wireguard_peer_new_static(w, filename, section_line, &peer); r = wireguard_peer_new_static(w, filename, section_line, &peer);
if (r < 0) if (r < 0)
return log_oom(); return log_oom();
r = free_and_strndup(&peer->endpoint_host, begin, len); r = in_addr_port_ifindex_name_from_string_auto(rvalue, &family, &addr, &port, NULL, NULL);
if (r >= 0) {
if (family == AF_INET)
peer->endpoint.in = (struct sockaddr_in) {
.sin_family = AF_INET,
.sin_addr = addr.in,
.sin_port = htobe16(port),
};
else if (family == AF_INET6)
peer->endpoint.in6 = (struct sockaddr_in6) {
.sin6_family = AF_INET6,
.sin6_addr = addr.in6,
.sin6_port = htobe16(port),
};
else
assert_not_reached();
peer->endpoint_host = mfree(peer->endpoint_host);
peer->endpoint_port = mfree(peer->endpoint_port);
TAKE_PTR(peer);
return 0;
}
p = strrchr(rvalue, ':');
if (!p) {
log_syntax(unit, LOG_WARNING, filename, line, 0,
"Unable to find port of endpoint, ignoring assignment: %s",
rvalue);
return 0;
}
host = strndup(rvalue, p - rvalue);
if (!host)
return log_oom();
if (!dns_name_is_valid(host)) {
log_syntax(unit, LOG_WARNING, filename, line, 0,
"Invalid domain name of endpoint, ignoring assignment: %s",
rvalue);
return 0;
}
p++;
r = parse_ip_port(p, &port);
if (r < 0) {
log_syntax(unit, LOG_WARNING, filename, line, r,
"Invalid port of endpoint, ignoring assignment: %s",
rvalue);
return 0;
}
peer->endpoint = (union sockaddr_union) {};
free_and_replace(peer->endpoint_host, host);
r = free_and_strdup(&peer->endpoint_port, p);
if (r < 0) if (r < 0)
return log_oom(); return log_oom();
r = free_and_strdup(&peer->endpoint_port, end);
if (r < 0)
return log_oom();
r = set_ensure_put(&w->peers_with_unresolved_endpoint, NULL, peer);
if (r < 0)
return log_oom();
TAKE_PTR(peer); /* The peer may already have been in the hash map, that is fine too. */ TAKE_PTR(peer); /* The peer may already have been in the hash map, that is fine too. */
return 0; return 0;
} }
@ -1028,14 +1060,10 @@ static void wireguard_done(NetDev *netdev) {
w = WIREGUARD(netdev); w = WIREGUARD(netdev);
assert(w); assert(w);
sd_event_source_unref(w->resolve_retry_event_source);
explicit_bzero_safe(w->private_key, WG_KEY_LEN); explicit_bzero_safe(w->private_key, WG_KEY_LEN);
free(w->private_key_file); free(w->private_key_file);
hashmap_free_with_destructor(w->peers_by_section, wireguard_peer_free); hashmap_free_with_destructor(w->peers_by_section, wireguard_peer_free);
set_free(w->peers_with_unresolved_endpoint);
set_free(w->peers_with_failed_endpoint);
set_free(w->routes); set_free(w->routes);
} }

View File

@ -7,6 +7,9 @@ typedef struct Wireguard Wireguard;
#include <netinet/in.h> #include <netinet/in.h>
#include <linux/wireguard.h> #include <linux/wireguard.h>
#include "sd-event.h"
#include "sd-resolve.h"
#include "in-addr-util.h" #include "in-addr-util.h"
#include "netdev.h" #include "netdev.h"
#include "socket-util.h" #include "socket-util.h"
@ -33,6 +36,10 @@ typedef struct WireguardPeer {
char *endpoint_host; char *endpoint_host;
char *endpoint_port; char *endpoint_port;
unsigned n_retries;
sd_event_source *resolve_retry_event_source;
sd_resolve_query *resolve_query;
uint32_t route_table; uint32_t route_table;
uint32_t route_priority; uint32_t route_priority;
bool route_table_set; bool route_table_set;
@ -53,14 +60,8 @@ struct Wireguard {
uint32_t fwmark; uint32_t fwmark;
Hashmap *peers_by_section; Hashmap *peers_by_section;
Set *peers_with_unresolved_endpoint;
Set *peers_with_failed_endpoint;
LIST_HEAD(WireguardPeer, peers); LIST_HEAD(WireguardPeer, peers);
unsigned n_retries;
sd_event_source *resolve_retry_event_source;
Set *routes; Set *routes;
uint32_t route_table; uint32_t route_table;
uint32_t route_priority; uint32_t route_priority;

View File

@ -1394,20 +1394,6 @@ int manager_rtnl_process_address(sd_netlink *rtnl, sd_netlink_message *message,
address->scope = tmp->scope; address->scope = tmp->scope;
address_set_lifetime(address, &cinfo); address_set_lifetime(address, &cinfo);
address_enter_configured(address); address_enter_configured(address);
if (address->family == AF_INET6 &&
address->source == NETWORK_CONFIG_SOURCE_FOREIGN &&
FLAGS_SET(address->flags, IFA_F_SECONDARY | IFA_F_DEPRECATED)) {
/* The temporary address became deprecated, i.e. preferred lifetime == 0. */
log_address_debug(address, "Received deprecated", link);
r = address_remove(address);
if (r < 0)
link_enter_failed(link);
return 0;
}
log_address_debug(address, "Received updated", link); log_address_debug(address, "Received updated", link);
} else { } else {
address_set_lifetime(tmp, &cinfo); address_set_lifetime(tmp, &cinfo);