mirror of
https://github.com/qdm12/gluetun.git
synced 2026-05-07 04:20:12 +02:00
4a78989d9d
- main reason being it's a burden to always define sentinel errors at global scope, wrap them with `%w` instead of using a string directly - only use sentinel errors when it has to be checked using `errors.Is` - replace all usage of these sentinel errors in `fmt.Errorf` with direct strings that were in the sentinel error - exclude the sentinel error definition requirement from .golangci.yml - update unit tests to use ContainersError instead of ErrorIs so it stays as a "not a change detector test" without requiring a sentinel error
136 lines
4.0 KiB
Go
136 lines
4.0 KiB
Go
package icmp
|
|
|
|
import (
|
|
"context"
|
|
"errors"
|
|
"fmt"
|
|
"net"
|
|
"net/netip"
|
|
"strings"
|
|
"syscall"
|
|
"time"
|
|
|
|
"github.com/qdm12/gluetun/internal/pmtud/constants"
|
|
"golang.org/x/net/icmp"
|
|
"golang.org/x/net/ipv6"
|
|
)
|
|
|
|
const (
|
|
icmpv6Protocol = 58
|
|
)
|
|
|
|
func listenICMPv6(ctx context.Context) (conn net.PacketConn, err error) {
|
|
var listenConfig net.ListenConfig
|
|
listenConfig.Control = func(_, _ string, rawConn syscall.RawConn) error {
|
|
var setDFErr error
|
|
err := rawConn.Control(func(fd uintptr) {
|
|
const ipv4 = false
|
|
setDFErr = setDontFragment(fd, ipv4) // runs when calling ListenPacket
|
|
})
|
|
if err == nil {
|
|
err = setDFErr
|
|
}
|
|
return err
|
|
}
|
|
const listenAddress = ""
|
|
packetConn, err := listenConfig.ListenPacket(ctx, "ip6:ipv6-icmp", listenAddress)
|
|
if err != nil {
|
|
if strings.HasSuffix(err.Error(), "socket: operation not permitted") {
|
|
err = fmt.Errorf("%w: you can try adding NET_RAW capability to resolve this", ErrNotPermitted)
|
|
}
|
|
return nil, err
|
|
}
|
|
return packetConn, nil
|
|
}
|
|
|
|
func getIPv6PacketTooBig(ctx context.Context, ip netip.Addr,
|
|
physicalLinkMTU uint32, pingTimeout time.Duration, logger Logger,
|
|
) (mtu uint32, err error) {
|
|
if ip.Is4() {
|
|
panic("IP address is not v6")
|
|
}
|
|
conn, err := listenICMPv6(ctx)
|
|
if err != nil {
|
|
return 0, fmt.Errorf("listening for ICMP packets: %w", err)
|
|
}
|
|
ctx, cancel := context.WithTimeout(ctx, pingTimeout)
|
|
defer cancel()
|
|
go func() {
|
|
<-ctx.Done()
|
|
conn.Close()
|
|
}()
|
|
|
|
// First try to send a packet which is too big to get the maximum MTU
|
|
// directly.
|
|
outboundID, outboundMessage := buildMessageToSend("v6", physicalLinkMTU)
|
|
encodedMessage, err := outboundMessage.Marshal(nil)
|
|
if err != nil {
|
|
return 0, fmt.Errorf("encoding ICMP message: %w", err)
|
|
}
|
|
|
|
_, err = conn.WriteTo(encodedMessage, &net.IPAddr{IP: ip.AsSlice(), Zone: ip.Zone()})
|
|
if err != nil {
|
|
err = wrapConnErr(err, ctx, pingTimeout)
|
|
return 0, fmt.Errorf("writing ICMP message: %w", err)
|
|
}
|
|
|
|
buffer := make([]byte, physicalLinkMTU)
|
|
|
|
for { // for loop if we encounter another ICMP packet with an unknown id.
|
|
// Note we need to read the whole packet in one call to ReadFrom, so the buffer
|
|
// must be large enough to read the entire reply packet. See:
|
|
// https://groups.google.com/g/golang-nuts/c/5dy2Q4nPs08/m/KmuSQAGEtG4J
|
|
bytesRead, _, err := conn.ReadFrom(buffer)
|
|
if err != nil {
|
|
err = wrapConnErr(err, ctx, pingTimeout)
|
|
return 0, fmt.Errorf("reading from ICMP connection: %w", err)
|
|
}
|
|
packetBytes := buffer[:bytesRead]
|
|
|
|
packetBytes = packetBytes[ipv6.HeaderLen:]
|
|
|
|
inboundMessage, err := icmp.ParseMessage(icmpv6Protocol, packetBytes)
|
|
if err != nil {
|
|
return 0, fmt.Errorf("parsing message: %w", err)
|
|
}
|
|
|
|
switch typedBody := inboundMessage.Body.(type) {
|
|
case *icmp.PacketTooBig:
|
|
// https://datatracker.ietf.org/doc/html/rfc1885#section-3.2
|
|
mtu = uint32(typedBody.MTU) //nolint:gosec
|
|
err = checkMTU(mtu, constants.MinIPv6MTU, physicalLinkMTU)
|
|
if err != nil {
|
|
return 0, fmt.Errorf("checking MTU: %w", err)
|
|
}
|
|
|
|
// Sanity checks
|
|
const truncatedBody = true
|
|
err = checkEchoReply(icmpv6Protocol, typedBody.Data, outboundMessage, truncatedBody)
|
|
if err != nil {
|
|
return 0, fmt.Errorf("checking invoking message: %w", err)
|
|
}
|
|
return uint32(typedBody.MTU), nil //nolint:gosec
|
|
case *icmp.DstUnreach:
|
|
// https://datatracker.ietf.org/doc/html/rfc1885#section-3.1
|
|
idMatch, err := checkInvokingReplyIDMatch(icmpv6Protocol, packetBytes, outboundMessage)
|
|
if err != nil {
|
|
return 0, fmt.Errorf("checking invoking message id: %w", err)
|
|
} else if idMatch {
|
|
return 0, errors.New("ICMP destination unreachable")
|
|
}
|
|
logger.Debug("discarding received ICMP destination unreachable reply with an unknown id")
|
|
continue
|
|
case *icmp.Echo:
|
|
inboundID := uint16(typedBody.ID) //nolint:gosec
|
|
if inboundID == outboundID {
|
|
return physicalLinkMTU, nil
|
|
}
|
|
logger.Debugf("discarding received ICMP echo reply with id %d mismatching sent id %d",
|
|
inboundID, outboundID)
|
|
continue
|
|
default:
|
|
return 0, fmt.Errorf("ICMP body type %T is not supported", typedBody)
|
|
}
|
|
}
|
|
}
|