The firewall provides a ProcessPacket handler, and implements an address-and-port endpoint dependent firewall that allows all traffic to egress from the trusted interface, and only allows inbound traffic if corresponding outbound traffic was previously seen. Signed-off-by: David Anderson <danderson@tailscale.com>main
parent
0ed9f62ed0
commit
5eedbcedd1
@ -0,0 +1,76 @@ |
||||
// Copyright (c) 2020 Tailscale Inc & AUTHORS All rights reserved.
|
||||
// Use of this source code is governed by a BSD-style
|
||||
// license that can be found in the LICENSE file.
|
||||
|
||||
package natlab |
||||
|
||||
import ( |
||||
"sync" |
||||
"time" |
||||
|
||||
"inet.af/netaddr" |
||||
) |
||||
|
||||
type session struct { |
||||
src netaddr.IPPort |
||||
dst netaddr.IPPort |
||||
} |
||||
|
||||
type Firewall struct { |
||||
// TrustedInterface is the interface that's allowed to send
|
||||
// anywhere. All other interfaces can only respond to traffic from
|
||||
// TrustedInterface.
|
||||
TrustedInterface *Interface |
||||
// SessionTimeout is the lifetime of idle sessions in the firewall
|
||||
// state. Packets transiting from the TrustedInterface reset the
|
||||
// session lifetime to SessionTimeout.
|
||||
SessionTimeout time.Duration |
||||
// TimeNow is a function returning the current time. If nil,
|
||||
// time.Now is used.
|
||||
TimeNow func() time.Time |
||||
|
||||
// TODO: tuple-ness pickiness: EIF, ADF, APDF
|
||||
// TODO: refresh directionality: outbound-only, both
|
||||
|
||||
mu sync.Mutex |
||||
seen map[session]time.Time // session -> deadline
|
||||
} |
||||
|
||||
func (f *Firewall) timeNow() time.Time { |
||||
if f.TimeNow != nil { |
||||
return f.TimeNow() |
||||
} |
||||
return time.Now() |
||||
} |
||||
|
||||
func (f *Firewall) HandlePacket(p []byte, inIf *Interface, dst, src netaddr.IPPort) PacketVerdict { |
||||
f.mu.Lock() |
||||
defer f.mu.Unlock() |
||||
if f.seen == nil { |
||||
f.seen = map[session]time.Time{} |
||||
} |
||||
|
||||
if inIf == f.TrustedInterface { |
||||
sess := session{ |
||||
src: src, |
||||
dst: dst, |
||||
} |
||||
f.seen[sess] = f.timeNow().Add(f.SessionTimeout) |
||||
trace(p, "mach=%s iface=%s src=%s dst=%s firewall out ok", inIf.Machine().Name, inIf.name, src, dst) |
||||
return Continue |
||||
} else { |
||||
// reverse src and dst because the session table is from the
|
||||
// POV of outbound packets.
|
||||
sess := session{ |
||||
src: dst, |
||||
dst: src, |
||||
} |
||||
now := f.timeNow() |
||||
if now.After(f.seen[sess]) { |
||||
trace(p, "mach=%s iface=%s src=%s dst=%s firewall drop", inIf.Machine().Name, inIf.name, src, dst) |
||||
return Drop |
||||
} |
||||
trace(p, "mach=%s iface=%s src=%s dst=%s firewall in ok", inIf.Machine().Name, inIf.name, src, dst) |
||||
return Continue |
||||
} |
||||
} |
||||
Loading…
Reference in new issue