123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472 |
- package bridge
- import (
- "context"
- "errors"
- "fmt"
- "net"
- "github.com/containerd/containerd/log"
- "github.com/docker/docker/libnetwork/iptables"
- "github.com/docker/docker/libnetwork/types"
- "github.com/vishvananda/netlink"
- )
- // DockerChain: DOCKER iptable chain name
- const (
- DockerChain = "DOCKER"
- // Isolation between bridge networks is achieved in two stages by means
- // of the following two chains in the filter table. The first chain matches
- // on the source interface being a bridge network's bridge and the
- // destination being a different interface. A positive match leads to the
- // second isolation chain. No match returns to the parent chain. The second
- // isolation chain matches on destination interface being a bridge network's
- // bridge. A positive match identifies a packet originated from one bridge
- // network's bridge destined to another bridge network's bridge and will
- // result in the packet being dropped. No match returns to the parent chain.
- IsolationChain1 = "DOCKER-ISOLATION-STAGE-1"
- IsolationChain2 = "DOCKER-ISOLATION-STAGE-2"
- )
- func setupIPChains(config configuration, version iptables.IPVersion) (natChain *iptables.ChainInfo, filterChain *iptables.ChainInfo, isolationChain1 *iptables.ChainInfo, isolationChain2 *iptables.ChainInfo, retErr error) {
- // Sanity check.
- if !config.EnableIPTables {
- return nil, nil, nil, nil, errors.New("cannot create new chains, EnableIPTable is disabled")
- }
- hairpinMode := !config.EnableUserlandProxy
- iptable := iptables.GetIptable(version)
- natChain, err := iptable.NewChain(DockerChain, iptables.Nat, hairpinMode)
- if err != nil {
- return nil, nil, nil, nil, fmt.Errorf("failed to create NAT chain %s: %v", DockerChain, err)
- }
- defer func() {
- if retErr != nil {
- if err := iptable.RemoveExistingChain(DockerChain, iptables.Nat); err != nil {
- log.G(context.TODO()).Warnf("failed on removing iptables NAT chain %s on cleanup: %v", DockerChain, err)
- }
- }
- }()
- filterChain, err = iptable.NewChain(DockerChain, iptables.Filter, false)
- if err != nil {
- return nil, nil, nil, nil, fmt.Errorf("failed to create FILTER chain %s: %v", DockerChain, err)
- }
- defer func() {
- if err != nil {
- if err := iptable.RemoveExistingChain(DockerChain, iptables.Filter); err != nil {
- log.G(context.TODO()).Warnf("failed on removing iptables FILTER chain %s on cleanup: %v", DockerChain, err)
- }
- }
- }()
- isolationChain1, err = iptable.NewChain(IsolationChain1, iptables.Filter, false)
- if err != nil {
- return nil, nil, nil, nil, fmt.Errorf("failed to create FILTER isolation chain: %v", err)
- }
- defer func() {
- if retErr != nil {
- if err := iptable.RemoveExistingChain(IsolationChain1, iptables.Filter); err != nil {
- log.G(context.TODO()).Warnf("failed on removing iptables FILTER chain %s on cleanup: %v", IsolationChain1, err)
- }
- }
- }()
- isolationChain2, err = iptable.NewChain(IsolationChain2, iptables.Filter, false)
- if err != nil {
- return nil, nil, nil, nil, fmt.Errorf("failed to create FILTER isolation chain: %v", err)
- }
- defer func() {
- if retErr != nil {
- if err := iptable.RemoveExistingChain(IsolationChain2, iptables.Filter); err != nil {
- log.G(context.TODO()).Warnf("failed on removing iptables FILTER chain %s on cleanup: %v", IsolationChain2, err)
- }
- }
- }()
- if err := iptable.AddReturnRule(IsolationChain1); err != nil {
- return nil, nil, nil, nil, err
- }
- if err := iptable.AddReturnRule(IsolationChain2); err != nil {
- return nil, nil, nil, nil, err
- }
- return natChain, filterChain, isolationChain1, isolationChain2, nil
- }
- func (n *bridgeNetwork) setupIP4Tables(config *networkConfiguration, i *bridgeInterface) error {
- d := n.driver
- d.Lock()
- driverConfig := d.config
- d.Unlock()
- // Sanity check.
- if !driverConfig.EnableIPTables {
- return errors.New("Cannot program chains, EnableIPTable is disabled")
- }
- maskedAddrv4 := &net.IPNet{
- IP: i.bridgeIPv4.IP.Mask(i.bridgeIPv4.Mask),
- Mask: i.bridgeIPv4.Mask,
- }
- return n.setupIPTables(iptables.IPv4, maskedAddrv4, config, i)
- }
- func (n *bridgeNetwork) setupIP6Tables(config *networkConfiguration, i *bridgeInterface) error {
- d := n.driver
- d.Lock()
- driverConfig := d.config
- d.Unlock()
- // Sanity check.
- if !driverConfig.EnableIP6Tables {
- return errors.New("Cannot program chains, EnableIP6Tables is disabled")
- }
- maskedAddrv6 := &net.IPNet{
- IP: i.bridgeIPv6.IP.Mask(i.bridgeIPv6.Mask),
- Mask: i.bridgeIPv6.Mask,
- }
- return n.setupIPTables(iptables.IPv6, maskedAddrv6, config, i)
- }
- func (n *bridgeNetwork) setupIPTables(ipVersion iptables.IPVersion, maskedAddr *net.IPNet, config *networkConfiguration, i *bridgeInterface) error {
- var err error
- d := n.driver
- d.Lock()
- driverConfig := d.config
- d.Unlock()
- // Pickup this configuration option from driver
- hairpinMode := !driverConfig.EnableUserlandProxy
- iptable := iptables.GetIptable(ipVersion)
- if config.Internal {
- if err = setupInternalNetworkRules(config.BridgeName, maskedAddr, config.EnableICC, true); err != nil {
- return fmt.Errorf("Failed to Setup IP tables: %s", err.Error())
- }
- n.registerIptCleanFunc(func() error {
- return setupInternalNetworkRules(config.BridgeName, maskedAddr, config.EnableICC, false)
- })
- } else {
- hostIP := config.HostIP
- if ipVersion != iptables.IPv4 {
- hostIP = nil
- }
- if err = setupIPTablesInternal(hostIP, config.BridgeName, maskedAddr, config.EnableICC, config.EnableIPMasquerade, hairpinMode, true); err != nil {
- return fmt.Errorf("Failed to Setup IP tables: %s", err.Error())
- }
- n.registerIptCleanFunc(func() error {
- return setupIPTablesInternal(hostIP, config.BridgeName, maskedAddr, config.EnableICC, config.EnableIPMasquerade, hairpinMode, false)
- })
- natChain, filterChain, _, _, err := n.getDriverChains(ipVersion)
- if err != nil {
- return fmt.Errorf("Failed to setup IP tables, cannot acquire chain info %s", err.Error())
- }
- err = iptable.ProgramChain(natChain, config.BridgeName, hairpinMode, true)
- if err != nil {
- return fmt.Errorf("Failed to program NAT chain: %s", err.Error())
- }
- err = iptable.ProgramChain(filterChain, config.BridgeName, hairpinMode, true)
- if err != nil {
- return fmt.Errorf("Failed to program FILTER chain: %s", err.Error())
- }
- n.registerIptCleanFunc(func() error {
- return iptable.ProgramChain(filterChain, config.BridgeName, hairpinMode, false)
- })
- if ipVersion == iptables.IPv4 {
- n.portMapper.SetIptablesChain(natChain, n.getNetworkBridgeName())
- } else {
- n.portMapperV6.SetIptablesChain(natChain, n.getNetworkBridgeName())
- }
- }
- d.Lock()
- err = iptable.EnsureJumpRule("FORWARD", IsolationChain1)
- d.Unlock()
- return err
- }
- type iptRule struct {
- table iptables.Table
- chain string
- preArgs []string
- args []string
- }
- func setupIPTablesInternal(hostIP net.IP, bridgeIface string, addr *net.IPNet, icc, ipmasq, hairpin, enable bool) error {
- var (
- address = addr.String()
- skipDNAT = iptRule{table: iptables.Nat, chain: DockerChain, preArgs: []string{"-t", "nat"}, args: []string{"-i", bridgeIface, "-j", "RETURN"}}
- outRule = iptRule{table: iptables.Filter, chain: "FORWARD", args: []string{"-i", bridgeIface, "!", "-o", bridgeIface, "-j", "ACCEPT"}}
- natArgs []string
- hpNatArgs []string
- )
- // if hostIP is set use this address as the src-ip during SNAT
- if hostIP != nil {
- hostAddr := hostIP.String()
- natArgs = []string{"-s", address, "!", "-o", bridgeIface, "-j", "SNAT", "--to-source", hostAddr}
- hpNatArgs = []string{"-m", "addrtype", "--src-type", "LOCAL", "-o", bridgeIface, "-j", "SNAT", "--to-source", hostAddr}
- // Else use MASQUERADE which picks the src-ip based on NH from the route table
- } else {
- natArgs = []string{"-s", address, "!", "-o", bridgeIface, "-j", "MASQUERADE"}
- hpNatArgs = []string{"-m", "addrtype", "--src-type", "LOCAL", "-o", bridgeIface, "-j", "MASQUERADE"}
- }
- natRule := iptRule{table: iptables.Nat, chain: "POSTROUTING", preArgs: []string{"-t", "nat"}, args: natArgs}
- hpNatRule := iptRule{table: iptables.Nat, chain: "POSTROUTING", preArgs: []string{"-t", "nat"}, args: hpNatArgs}
- ipVer := iptables.IPv4
- if addr.IP.To4() == nil {
- ipVer = iptables.IPv6
- }
- // Set NAT.
- if ipmasq {
- if err := programChainRule(ipVer, natRule, "NAT", enable); err != nil {
- return err
- }
- }
- if ipmasq && !hairpin {
- if err := programChainRule(ipVer, skipDNAT, "SKIP DNAT", enable); err != nil {
- return err
- }
- }
- // In hairpin mode, masquerade traffic from localhost. If hairpin is disabled or if we're tearing down
- // that bridge, make sure the iptables rule isn't lying around.
- if err := programChainRule(ipVer, hpNatRule, "MASQ LOCAL HOST", enable && hairpin); err != nil {
- return err
- }
- // Set Inter Container Communication.
- if err := setIcc(ipVer, bridgeIface, icc, enable); err != nil {
- return err
- }
- // Set Accept on all non-intercontainer outgoing packets.
- return programChainRule(ipVer, outRule, "ACCEPT NON_ICC OUTGOING", enable)
- }
- func programChainRule(version iptables.IPVersion, rule iptRule, ruleDescr string, insert bool) error {
- iptable := iptables.GetIptable(version)
- var (
- prefix []string
- operation string
- condition bool
- doesExist = iptable.Exists(rule.table, rule.chain, rule.args...)
- )
- if insert {
- condition = !doesExist
- prefix = []string{"-I", rule.chain}
- operation = "enable"
- } else {
- condition = doesExist
- prefix = []string{"-D", rule.chain}
- operation = "disable"
- }
- if rule.preArgs != nil {
- prefix = append(rule.preArgs, prefix...)
- }
- if condition {
- if err := iptable.RawCombinedOutput(append(prefix, rule.args...)...); err != nil {
- return fmt.Errorf("Unable to %s %s rule: %s", operation, ruleDescr, err.Error())
- }
- }
- return nil
- }
- func setIcc(version iptables.IPVersion, bridgeIface string, iccEnable, insert bool) error {
- iptable := iptables.GetIptable(version)
- var (
- table = iptables.Filter
- chain = "FORWARD"
- args = []string{"-i", bridgeIface, "-o", bridgeIface, "-j"}
- acceptArgs = append(args, "ACCEPT")
- dropArgs = append(args, "DROP")
- )
- if insert {
- if !iccEnable {
- iptable.Raw(append([]string{"-D", chain}, acceptArgs...)...)
- if !iptable.Exists(table, chain, dropArgs...) {
- if err := iptable.RawCombinedOutput(append([]string{"-A", chain}, dropArgs...)...); err != nil {
- return fmt.Errorf("Unable to prevent intercontainer communication: %s", err.Error())
- }
- }
- } else {
- iptable.Raw(append([]string{"-D", chain}, dropArgs...)...)
- if !iptable.Exists(table, chain, acceptArgs...) {
- if err := iptable.RawCombinedOutput(append([]string{"-I", chain}, acceptArgs...)...); err != nil {
- return fmt.Errorf("Unable to allow intercontainer communication: %s", err.Error())
- }
- }
- }
- } else {
- // Remove any ICC rule.
- if !iccEnable {
- if iptable.Exists(table, chain, dropArgs...) {
- iptable.Raw(append([]string{"-D", chain}, dropArgs...)...)
- }
- } else {
- if iptable.Exists(table, chain, acceptArgs...) {
- iptable.Raw(append([]string{"-D", chain}, acceptArgs...)...)
- }
- }
- }
- return nil
- }
- // Control Inter Network Communication. Install[Remove] only if it is [not] present.
- func setINC(version iptables.IPVersion, iface string, enable bool) error {
- iptable := iptables.GetIptable(version)
- var (
- action = iptables.Insert
- actionMsg = "add"
- chains = []string{IsolationChain1, IsolationChain2}
- rules = [][]string{
- {"-i", iface, "!", "-o", iface, "-j", IsolationChain2},
- {"-o", iface, "-j", "DROP"},
- }
- )
- if !enable {
- action = iptables.Delete
- actionMsg = "remove"
- }
- for i, chain := range chains {
- if err := iptable.ProgramRule(iptables.Filter, chain, action, rules[i]); err != nil {
- msg := fmt.Sprintf("unable to %s inter-network communication rule: %v", actionMsg, err)
- if enable {
- if i == 1 {
- // Rollback the rule installed on first chain
- if err2 := iptable.ProgramRule(iptables.Filter, chains[0], iptables.Delete, rules[0]); err2 != nil {
- log.G(context.TODO()).Warnf("Failed to rollback iptables rule after failure (%v): %v", err, err2)
- }
- }
- return fmt.Errorf(msg)
- }
- log.G(context.TODO()).Warn(msg)
- }
- }
- return nil
- }
- // Obsolete chain from previous docker versions
- const oldIsolationChain = "DOCKER-ISOLATION"
- func removeIPChains(version iptables.IPVersion) {
- ipt := iptables.GetIptable(version)
- // Remove obsolete rules from default chains
- ipt.ProgramRule(iptables.Filter, "FORWARD", iptables.Delete, []string{"-j", oldIsolationChain})
- // Remove chains
- for _, chainInfo := range []iptables.ChainInfo{
- {Name: DockerChain, Table: iptables.Nat, IPVersion: version},
- {Name: DockerChain, Table: iptables.Filter, IPVersion: version},
- {Name: IsolationChain1, Table: iptables.Filter, IPVersion: version},
- {Name: IsolationChain2, Table: iptables.Filter, IPVersion: version},
- {Name: oldIsolationChain, Table: iptables.Filter, IPVersion: version},
- } {
- if err := chainInfo.Remove(); err != nil {
- log.G(context.TODO()).Warnf("Failed to remove existing iptables entries in table %s chain %s : %v", chainInfo.Table, chainInfo.Name, err)
- }
- }
- }
- func setupInternalNetworkRules(bridgeIface string, addr *net.IPNet, icc, insert bool) error {
- var version iptables.IPVersion
- var inDropRule, outDropRule iptRule
- if addr.IP.To4() != nil {
- version = iptables.IPv4
- inDropRule = iptRule{
- table: iptables.Filter,
- chain: IsolationChain1,
- args: []string{"-i", bridgeIface, "!", "-d", addr.String(), "-j", "DROP"},
- }
- outDropRule = iptRule{
- table: iptables.Filter,
- chain: IsolationChain1,
- args: []string{"-o", bridgeIface, "!", "-s", addr.String(), "-j", "DROP"},
- }
- } else {
- version = iptables.IPv6
- inDropRule = iptRule{
- table: iptables.Filter,
- chain: IsolationChain1,
- args: []string{"-i", bridgeIface, "!", "-o", bridgeIface, "!", "-d", addr.String(), "-j", "DROP"},
- }
- outDropRule = iptRule{
- table: iptables.Filter,
- chain: IsolationChain1,
- args: []string{"!", "-i", bridgeIface, "-o", bridgeIface, "!", "-s", addr.String(), "-j", "DROP"},
- }
- }
- if err := programChainRule(version, inDropRule, "DROP INCOMING", insert); err != nil {
- return err
- }
- if err := programChainRule(version, outDropRule, "DROP OUTGOING", insert); err != nil {
- return err
- }
- // Set Inter Container Communication.
- return setIcc(version, bridgeIface, icc, insert)
- }
- // clearConntrackEntries flushes conntrack entries matching endpoint IP address
- // or matching one of the exposed UDP port.
- // In the first case, this could happen if packets were received by the host
- // between userland proxy startup and iptables setup.
- // In the latter case, this could happen if packets were received whereas there
- // were nowhere to route them, as netfilter creates entries in such case.
- // This is required because iptables NAT rules are evaluated by netfilter only
- // when creating a new conntrack entry. When Docker latter adds NAT rules,
- // netfilter ignore them for any packet matching a pre-existing conntrack entry.
- // As such, we need to flush all those conntrack entries to make sure NAT rules
- // are correctly applied to all packets.
- // See: #8795, #44688 & #44742.
- func clearConntrackEntries(nlh *netlink.Handle, ep *bridgeEndpoint) {
- var ipv4List []net.IP
- var ipv6List []net.IP
- var udpPorts []uint16
- if ep.addr != nil {
- ipv4List = append(ipv4List, ep.addr.IP)
- }
- if ep.addrv6 != nil {
- ipv6List = append(ipv6List, ep.addrv6.IP)
- }
- for _, pb := range ep.portMapping {
- if pb.Proto == types.UDP {
- udpPorts = append(udpPorts, pb.HostPort)
- }
- }
- iptables.DeleteConntrackEntries(nlh, ipv4List, ipv6List)
- iptables.DeleteConntrackEntriesByPort(nlh, types.UDP, udpPorts)
- }
|