mirror of
				https://github.com/tailscale/tailscale.git
				synced 2025-11-04 02:01:14 +01:00 
			
		
		
		
	Updates #11874 Updates #4136 Change-Id: I414470f71d90be9889d44c3afd53956d9f26cd61 Signed-off-by: Brad Fitzpatrick <bradfitz@tailscale.com>
		
			
				
	
	
		
			428 lines
		
	
	
		
			14 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
			
		
		
	
	
			428 lines
		
	
	
		
			14 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
// Copyright (c) Tailscale Inc & AUTHORS
 | 
						|
// SPDX-License-Identifier: BSD-3-Clause
 | 
						|
 | 
						|
package dns
 | 
						|
 | 
						|
import (
 | 
						|
	"bytes"
 | 
						|
	"context"
 | 
						|
	"errors"
 | 
						|
	"fmt"
 | 
						|
	"os"
 | 
						|
	"strings"
 | 
						|
	"sync"
 | 
						|
	"time"
 | 
						|
 | 
						|
	"github.com/godbus/dbus/v5"
 | 
						|
	"tailscale.com/health"
 | 
						|
	"tailscale.com/net/netaddr"
 | 
						|
	"tailscale.com/types/logger"
 | 
						|
	"tailscale.com/util/clientmetric"
 | 
						|
	"tailscale.com/util/cmpver"
 | 
						|
)
 | 
						|
 | 
						|
type kv struct {
 | 
						|
	k, v string
 | 
						|
}
 | 
						|
 | 
						|
func (kv kv) String() string {
 | 
						|
	return fmt.Sprintf("%s=%s", kv.k, kv.v)
 | 
						|
}
 | 
						|
 | 
						|
var publishOnce sync.Once
 | 
						|
 | 
						|
func NewOSConfigurator(logf logger.Logf, health *health.Tracker, interfaceName string) (ret OSConfigurator, err error) {
 | 
						|
	env := newOSConfigEnv{
 | 
						|
		fs:                directFS{},
 | 
						|
		dbusPing:          dbusPing,
 | 
						|
		dbusReadString:    dbusReadString,
 | 
						|
		nmIsUsingResolved: nmIsUsingResolved,
 | 
						|
		nmVersionBetween:  nmVersionBetween,
 | 
						|
		resolvconfStyle:   resolvconfStyle,
 | 
						|
	}
 | 
						|
	mode, err := dnsMode(logf, health, env)
 | 
						|
	if err != nil {
 | 
						|
		return nil, err
 | 
						|
	}
 | 
						|
	publishOnce.Do(func() {
 | 
						|
		sanitizedMode := strings.ReplaceAll(mode, "-", "_")
 | 
						|
		m := clientmetric.NewGauge(fmt.Sprintf("dns_manager_linux_mode_%s", sanitizedMode))
 | 
						|
		m.Set(1)
 | 
						|
	})
 | 
						|
	logf("dns: using %q mode", mode)
 | 
						|
	switch mode {
 | 
						|
	case "direct":
 | 
						|
		return newDirectManagerOnFS(logf, health, env.fs), nil
 | 
						|
	case "systemd-resolved":
 | 
						|
		return newResolvedManager(logf, health, interfaceName)
 | 
						|
	case "network-manager":
 | 
						|
		return newNMManager(interfaceName)
 | 
						|
	case "debian-resolvconf":
 | 
						|
		return newDebianResolvconfManager(logf)
 | 
						|
	case "openresolv":
 | 
						|
		return newOpenresolvManager(logf)
 | 
						|
	default:
 | 
						|
		logf("[unexpected] detected unknown DNS mode %q, using direct manager as last resort", mode)
 | 
						|
		return newDirectManagerOnFS(logf, health, env.fs), nil
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
// newOSConfigEnv are the funcs newOSConfigurator needs, pulled out for testing.
 | 
						|
type newOSConfigEnv struct {
 | 
						|
	fs                wholeFileFS
 | 
						|
	dbusPing          func(string, string) error
 | 
						|
	dbusReadString    func(string, string, string, string) (string, error)
 | 
						|
	nmIsUsingResolved func() error
 | 
						|
	nmVersionBetween  func(v1, v2 string) (safe bool, err error)
 | 
						|
	resolvconfStyle   func() string
 | 
						|
}
 | 
						|
 | 
						|
func dnsMode(logf logger.Logf, health *health.Tracker, env newOSConfigEnv) (ret string, err error) {
 | 
						|
	var debug []kv
 | 
						|
	dbg := func(k, v string) {
 | 
						|
		debug = append(debug, kv{k, v})
 | 
						|
	}
 | 
						|
	defer func() {
 | 
						|
		if ret != "" {
 | 
						|
			dbg("ret", ret)
 | 
						|
		}
 | 
						|
		logf("dns: %v", debug)
 | 
						|
	}()
 | 
						|
 | 
						|
	// In all cases that we detect systemd-resolved, try asking it what it
 | 
						|
	// thinks the current resolv.conf mode is so we can add it to our logs.
 | 
						|
	defer func() {
 | 
						|
		if ret != "systemd-resolved" {
 | 
						|
			return
 | 
						|
		}
 | 
						|
 | 
						|
		// Try to ask systemd-resolved what it thinks the current
 | 
						|
		// status of resolv.conf is. This is documented at:
 | 
						|
		//    https://www.freedesktop.org/software/systemd/man/org.freedesktop.resolve1.html
 | 
						|
		mode, err := env.dbusReadString("org.freedesktop.resolve1", "/org/freedesktop/resolve1", "org.freedesktop.resolve1.Manager", "ResolvConfMode")
 | 
						|
		if err != nil {
 | 
						|
			logf("dns: ResolvConfMode error: %v", err)
 | 
						|
			dbg("resolv-conf-mode", "error")
 | 
						|
		} else {
 | 
						|
			dbg("resolv-conf-mode", mode)
 | 
						|
		}
 | 
						|
	}()
 | 
						|
 | 
						|
	// Before we read /etc/resolv.conf (which might be in a broken
 | 
						|
	// or symlink-dangling state), try to ping the D-Bus service
 | 
						|
	// for systemd-resolved. If it's active on the machine, this
 | 
						|
	// will make it start up and write the /etc/resolv.conf file
 | 
						|
	// before it replies to the ping. (see how systemd's
 | 
						|
	// src/resolve/resolved.c calls manager_write_resolv_conf
 | 
						|
	// before the sd_event_loop starts)
 | 
						|
	resolvedUp := env.dbusPing("org.freedesktop.resolve1", "/org/freedesktop/resolve1") == nil
 | 
						|
	if resolvedUp {
 | 
						|
		dbg("resolved-ping", "yes")
 | 
						|
	}
 | 
						|
 | 
						|
	bs, err := env.fs.ReadFile(resolvConf)
 | 
						|
	if os.IsNotExist(err) {
 | 
						|
		dbg("rc", "missing")
 | 
						|
		return "direct", nil
 | 
						|
	}
 | 
						|
	if err != nil {
 | 
						|
		return "", fmt.Errorf("reading /etc/resolv.conf: %w", err)
 | 
						|
	}
 | 
						|
 | 
						|
	switch resolvOwner(bs) {
 | 
						|
	case "systemd-resolved":
 | 
						|
		dbg("rc", "resolved")
 | 
						|
 | 
						|
		// Some systems, for reasons known only to them, have a
 | 
						|
		// resolv.conf that has the word "systemd-resolved" in its
 | 
						|
		// header, but doesn't actually point to resolved. We mustn't
 | 
						|
		// try to program resolved in that case.
 | 
						|
		// https://github.com/tailscale/tailscale/issues/2136
 | 
						|
		if err := resolvedIsActuallyResolver(logf, env, dbg, bs); err != nil {
 | 
						|
			logf("dns: resolvedIsActuallyResolver error: %v", err)
 | 
						|
			dbg("resolved", "not-in-use")
 | 
						|
			return "direct", nil
 | 
						|
		}
 | 
						|
		if err := env.dbusPing("org.freedesktop.NetworkManager", "/org/freedesktop/NetworkManager/DnsManager"); err != nil {
 | 
						|
			dbg("nm", "no")
 | 
						|
			return "systemd-resolved", nil
 | 
						|
		}
 | 
						|
		dbg("nm", "yes")
 | 
						|
		if err := env.nmIsUsingResolved(); err != nil {
 | 
						|
			dbg("nm-resolved", "no")
 | 
						|
			return "systemd-resolved", nil
 | 
						|
		}
 | 
						|
		dbg("nm-resolved", "yes")
 | 
						|
 | 
						|
		// Version of NetworkManager before 1.26.6 programmed resolved
 | 
						|
		// incorrectly, such that NM's settings would always take
 | 
						|
		// precedence over other settings set by other resolved
 | 
						|
		// clients.
 | 
						|
		//
 | 
						|
		// If we're dealing with such a version, we have to set our
 | 
						|
		// DNS settings through NM to have them take.
 | 
						|
		//
 | 
						|
		// However, versions 1.26.6 later both fixed the resolved
 | 
						|
		// programming issue _and_ started ignoring DNS settings for
 | 
						|
		// "unmanaged" interfaces - meaning NM 1.26.6 and later
 | 
						|
		// actively ignore DNS configuration we give it. So, for those
 | 
						|
		// NM versions, we can and must use resolved directly.
 | 
						|
		//
 | 
						|
		// Even more fun, even-older versions of NM won't let us set
 | 
						|
		// DNS settings if the interface isn't managed by NM, with a
 | 
						|
		// hard failure on DBus requests. Empirically, NM 1.22 does
 | 
						|
		// this. Based on the versions popular distros shipped, we
 | 
						|
		// conservatively decree that only 1.26.0 through 1.26.5 are
 | 
						|
		// "safe" to use for our purposes. This roughly matches
 | 
						|
		// distros released in the latter half of 2020.
 | 
						|
		//
 | 
						|
		// In a perfect world, we'd avoid this by replacing
 | 
						|
		// configuration out from under NM entirely (e.g. using
 | 
						|
		// directManager to overwrite resolv.conf), but in a world
 | 
						|
		// where resolved runs, we need to get correct configuration
 | 
						|
		// into resolved regardless of what's in resolv.conf (because
 | 
						|
		// resolved can also be queried over dbus, or via an NSS
 | 
						|
		// module that bypasses /etc/resolv.conf). Given that we must
 | 
						|
		// get correct configuration into resolved, we have no choice
 | 
						|
		// but to use NM, and accept the loss of IPv6 configuration
 | 
						|
		// that comes with it (see
 | 
						|
		// https://github.com/tailscale/tailscale/issues/1699,
 | 
						|
		// https://github.com/tailscale/tailscale/pull/1945)
 | 
						|
		safe, err := env.nmVersionBetween("1.26.0", "1.26.5")
 | 
						|
		if err != nil {
 | 
						|
			// Failed to figure out NM's version, can't make a correct
 | 
						|
			// decision.
 | 
						|
			return "", fmt.Errorf("checking NetworkManager version: %v", err)
 | 
						|
		}
 | 
						|
		if safe {
 | 
						|
			dbg("nm-safe", "yes")
 | 
						|
			return "network-manager", nil
 | 
						|
		}
 | 
						|
		dbg("nm-safe", "no")
 | 
						|
		return "systemd-resolved", nil
 | 
						|
	case "resolvconf":
 | 
						|
		dbg("rc", "resolvconf")
 | 
						|
		style := env.resolvconfStyle()
 | 
						|
		switch style {
 | 
						|
		case "":
 | 
						|
			dbg("resolvconf", "no")
 | 
						|
			return "direct", nil
 | 
						|
		case "debian":
 | 
						|
			dbg("resolvconf", "debian")
 | 
						|
			return "debian-resolvconf", nil
 | 
						|
		case "openresolv":
 | 
						|
			dbg("resolvconf", "openresolv")
 | 
						|
			return "openresolv", nil
 | 
						|
		default:
 | 
						|
			// Shouldn't happen, that means we updated flavors of
 | 
						|
			// resolvconf without updating here.
 | 
						|
			dbg("resolvconf", style)
 | 
						|
			logf("[unexpected] got unknown flavor of resolvconf %q, falling back to direct manager", env.resolvconfStyle())
 | 
						|
			return "direct", nil
 | 
						|
		}
 | 
						|
	case "NetworkManager":
 | 
						|
		dbg("rc", "nm")
 | 
						|
		// Sometimes, NetworkManager owns the configuration but points
 | 
						|
		// it at systemd-resolved.
 | 
						|
		if err := resolvedIsActuallyResolver(logf, env, dbg, bs); err != nil {
 | 
						|
			logf("dns: resolvedIsActuallyResolver error: %v", err)
 | 
						|
			dbg("resolved", "not-in-use")
 | 
						|
			// You'd think we would use newNMManager here. However, as
 | 
						|
			// explained in
 | 
						|
			// https://github.com/tailscale/tailscale/issues/1699 ,
 | 
						|
			// using NetworkManager for DNS configuration carries with
 | 
						|
			// it the cost of losing IPv6 configuration on the
 | 
						|
			// Tailscale network interface. So, when we can avoid it,
 | 
						|
			// we bypass NetworkManager by replacing resolv.conf
 | 
						|
			// directly.
 | 
						|
			//
 | 
						|
			// If you ever try to put NMManager back here, keep in mind
 | 
						|
			// that versions >=1.26.6 will ignore DNS configuration
 | 
						|
			// anyway, so you still need a fallback path that uses
 | 
						|
			// directManager.
 | 
						|
			return "direct", nil
 | 
						|
		}
 | 
						|
		dbg("nm-resolved", "yes")
 | 
						|
 | 
						|
		// See large comment above for reasons we'd use NM rather than
 | 
						|
		// resolved. systemd-resolved is actually in charge of DNS
 | 
						|
		// configuration, but in some cases we might need to configure
 | 
						|
		// it via NetworkManager. All the logic below is probing for
 | 
						|
		// that case: is NetworkManager running? If so, is it one of
 | 
						|
		// the versions that requires direct interaction with it?
 | 
						|
		if err := env.dbusPing("org.freedesktop.NetworkManager", "/org/freedesktop/NetworkManager/DnsManager"); err != nil {
 | 
						|
			dbg("nm", "no")
 | 
						|
			return "systemd-resolved", nil
 | 
						|
		}
 | 
						|
		safe, err := env.nmVersionBetween("1.26.0", "1.26.5")
 | 
						|
		if err != nil {
 | 
						|
			// Failed to figure out NM's version, can't make a correct
 | 
						|
			// decision.
 | 
						|
			return "", fmt.Errorf("checking NetworkManager version: %v", err)
 | 
						|
		}
 | 
						|
		if safe {
 | 
						|
			dbg("nm-safe", "yes")
 | 
						|
			return "network-manager", nil
 | 
						|
		}
 | 
						|
		if err := env.nmIsUsingResolved(); err != nil {
 | 
						|
			// If systemd-resolved is not running at all, then we don't have any
 | 
						|
			// other choice: we take direct control of DNS.
 | 
						|
			dbg("nm-resolved", "no")
 | 
						|
			return "direct", nil
 | 
						|
		}
 | 
						|
 | 
						|
		health.SetDNSManagerHealth(errors.New("systemd-resolved and NetworkManager are wired together incorrectly; MagicDNS will probably not work. For more info, see https://tailscale.com/s/resolved-nm"))
 | 
						|
		dbg("nm-safe", "no")
 | 
						|
		return "systemd-resolved", nil
 | 
						|
	default:
 | 
						|
		dbg("rc", "unknown")
 | 
						|
		return "direct", nil
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
func nmVersionBetween(first, last string) (bool, error) {
 | 
						|
	conn, err := dbus.SystemBus()
 | 
						|
	if err != nil {
 | 
						|
		// DBus probably not running.
 | 
						|
		return false, err
 | 
						|
	}
 | 
						|
 | 
						|
	nm := conn.Object("org.freedesktop.NetworkManager", dbus.ObjectPath("/org/freedesktop/NetworkManager"))
 | 
						|
	v, err := nm.GetProperty("org.freedesktop.NetworkManager.Version")
 | 
						|
	if err != nil {
 | 
						|
		return false, err
 | 
						|
	}
 | 
						|
 | 
						|
	version, ok := v.Value().(string)
 | 
						|
	if !ok {
 | 
						|
		return false, fmt.Errorf("unexpected type %T for NM version", v.Value())
 | 
						|
	}
 | 
						|
 | 
						|
	outside := cmpver.Compare(version, first) < 0 || cmpver.Compare(version, last) > 0
 | 
						|
	return !outside, nil
 | 
						|
}
 | 
						|
 | 
						|
func nmIsUsingResolved() error {
 | 
						|
	conn, err := dbus.SystemBus()
 | 
						|
	if err != nil {
 | 
						|
		// DBus probably not running.
 | 
						|
		return err
 | 
						|
	}
 | 
						|
 | 
						|
	nm := conn.Object("org.freedesktop.NetworkManager", dbus.ObjectPath("/org/freedesktop/NetworkManager/DnsManager"))
 | 
						|
	v, err := nm.GetProperty("org.freedesktop.NetworkManager.DnsManager.Mode")
 | 
						|
	if err != nil {
 | 
						|
		return fmt.Errorf("getting NM mode: %w", err)
 | 
						|
	}
 | 
						|
	mode, ok := v.Value().(string)
 | 
						|
	if !ok {
 | 
						|
		return fmt.Errorf("unexpected type %T for NM DNS mode", v.Value())
 | 
						|
	}
 | 
						|
	if mode != "systemd-resolved" {
 | 
						|
		return errors.New("NetworkManager is not using systemd-resolved for DNS")
 | 
						|
	}
 | 
						|
	return nil
 | 
						|
}
 | 
						|
 | 
						|
// resolvedIsActuallyResolver reports whether the system is using
 | 
						|
// systemd-resolved as the resolver. There are two different ways to
 | 
						|
// use systemd-resolved:
 | 
						|
//   - libnss_resolve, which requires adding `resolve` to the "hosts:"
 | 
						|
//     line in /etc/nsswitch.conf
 | 
						|
//   - setting the only nameserver configured in `resolv.conf` to
 | 
						|
//     systemd-resolved IP (127.0.0.53)
 | 
						|
//
 | 
						|
// Returns an error if the configuration is something other than
 | 
						|
// exclusively systemd-resolved, or nil if the config is only
 | 
						|
// systemd-resolved.
 | 
						|
func resolvedIsActuallyResolver(logf logger.Logf, env newOSConfigEnv, dbg func(k, v string), bs []byte) error {
 | 
						|
	if err := isLibnssResolveUsed(env); err == nil {
 | 
						|
		dbg("resolved", "nss")
 | 
						|
		return nil
 | 
						|
	}
 | 
						|
 | 
						|
	cfg, err := readResolv(bytes.NewBuffer(bs))
 | 
						|
	if err != nil {
 | 
						|
		return err
 | 
						|
	}
 | 
						|
	// We've encountered at least one system where the line
 | 
						|
	// "nameserver 127.0.0.53" appears twice, so we look exhaustively
 | 
						|
	// through all of them and allow any number of repeated mentions
 | 
						|
	// of the systemd-resolved stub IP.
 | 
						|
	if len(cfg.Nameservers) == 0 {
 | 
						|
		return errors.New("resolv.conf has no nameservers")
 | 
						|
	}
 | 
						|
	for _, ns := range cfg.Nameservers {
 | 
						|
		if ns != netaddr.IPv4(127, 0, 0, 53) {
 | 
						|
			return fmt.Errorf("resolv.conf doesn't point to systemd-resolved; points to %v", cfg.Nameservers)
 | 
						|
		}
 | 
						|
	}
 | 
						|
	dbg("resolved", "file")
 | 
						|
	return nil
 | 
						|
}
 | 
						|
 | 
						|
// isLibnssResolveUsed reports whether libnss_resolve is used
 | 
						|
// for resolving names. Returns nil if it is, and an error otherwise.
 | 
						|
func isLibnssResolveUsed(env newOSConfigEnv) error {
 | 
						|
	bs, err := env.fs.ReadFile("/etc/nsswitch.conf")
 | 
						|
	if err != nil {
 | 
						|
		return fmt.Errorf("reading /etc/resolv.conf: %w", err)
 | 
						|
	}
 | 
						|
	for _, line := range strings.Split(string(bs), "\n") {
 | 
						|
		fields := strings.Fields(line)
 | 
						|
		if len(fields) < 2 || fields[0] != "hosts:" {
 | 
						|
			continue
 | 
						|
		}
 | 
						|
		for _, module := range fields[1:] {
 | 
						|
			if module == "dns" {
 | 
						|
				return fmt.Errorf("dns with a higher priority than libnss_resolve")
 | 
						|
			}
 | 
						|
			if module == "resolve" {
 | 
						|
				return nil
 | 
						|
			}
 | 
						|
		}
 | 
						|
	}
 | 
						|
	return fmt.Errorf("libnss_resolve not used")
 | 
						|
}
 | 
						|
 | 
						|
func dbusPing(name, objectPath string) error {
 | 
						|
	conn, err := dbus.SystemBus()
 | 
						|
	if err != nil {
 | 
						|
		// DBus probably not running.
 | 
						|
		return err
 | 
						|
	}
 | 
						|
 | 
						|
	ctx, cancel := context.WithTimeout(context.Background(), time.Second)
 | 
						|
	defer cancel()
 | 
						|
 | 
						|
	obj := conn.Object(name, dbus.ObjectPath(objectPath))
 | 
						|
	call := obj.CallWithContext(ctx, "org.freedesktop.DBus.Peer.Ping", 0)
 | 
						|
	return call.Err
 | 
						|
}
 | 
						|
 | 
						|
// dbusReadString reads a string property from the provided name and object
 | 
						|
// path. property must be in "interface.member" notation.
 | 
						|
func dbusReadString(name, objectPath, iface, member string) (string, error) {
 | 
						|
	conn, err := dbus.SystemBus()
 | 
						|
	if err != nil {
 | 
						|
		// DBus probably not running.
 | 
						|
		return "", err
 | 
						|
	}
 | 
						|
 | 
						|
	ctx, cancel := context.WithTimeout(context.Background(), time.Second)
 | 
						|
	defer cancel()
 | 
						|
 | 
						|
	obj := conn.Object(name, dbus.ObjectPath(objectPath))
 | 
						|
 | 
						|
	var result dbus.Variant
 | 
						|
	err = obj.CallWithContext(ctx, "org.freedesktop.DBus.Properties.Get", 0, iface, member).Store(&result)
 | 
						|
	if err != nil {
 | 
						|
		return "", err
 | 
						|
	}
 | 
						|
 | 
						|
	if s, ok := result.Value().(string); ok {
 | 
						|
		return s, nil
 | 
						|
	}
 | 
						|
	return result.String(), nil
 | 
						|
}
 |