encryption.go 17 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701
  1. //go:build linux
  2. package overlay
  3. import (
  4. "bytes"
  5. "context"
  6. "encoding/binary"
  7. "encoding/hex"
  8. "fmt"
  9. "hash/fnv"
  10. "net"
  11. "strconv"
  12. "sync"
  13. "syscall"
  14. "github.com/containerd/log"
  15. "github.com/docker/docker/libnetwork/drivers/overlay/overlayutils"
  16. "github.com/docker/docker/libnetwork/iptables"
  17. "github.com/docker/docker/libnetwork/ns"
  18. "github.com/docker/docker/libnetwork/types"
  19. "github.com/vishvananda/netlink"
  20. )
  21. /*
  22. Encrypted overlay networks use IPsec in transport mode to encrypt and
  23. authenticate the VXLAN UDP datagrams. This driver implements a bespoke control
  24. plane which negotiates the security parameters for each peer-to-peer tunnel.
  25. IPsec Terminology
  26. - ESP: IPSec Encapsulating Security Payload
  27. - SPI: Security Parameter Index
  28. - ICV: Integrity Check Value
  29. - SA: Security Association https://en.wikipedia.org/wiki/IPsec#Security_association
  30. Developer documentation for Linux IPsec is rather sparse online. The following
  31. slide deck provides a decent overview.
  32. https://libreswan.org/wiki/images/e/e0/Netdev-0x12-ipsec-flow.pdf
  33. The Linux IPsec stack is part of XFRM, the netlink packet transformation
  34. interface.
  35. https://man7.org/linux/man-pages/man8/ip-xfrm.8.html
  36. */
  37. const (
  38. // Value used to mark outgoing packets which should have our IPsec
  39. // processing applied. It is also used as a label to identify XFRM
  40. // states (Security Associations) and policies (Security Policies)
  41. // programmed by us so we know which ones we can clean up without
  42. // disrupting other VPN connections on the system.
  43. mark = 0xD0C4E3
  44. pktExpansion = 26 // SPI(4) + SeqN(4) + IV(8) + PadLength(1) + NextHeader(1) + ICV(8)
  45. )
  46. const (
  47. forward = iota + 1
  48. reverse
  49. bidir
  50. )
  51. // Mark value for matching packets which should have our IPsec security policy
  52. // applied.
  53. var spMark = netlink.XfrmMark{Value: mark, Mask: 0xffffffff}
  54. type key struct {
  55. value []byte
  56. tag uint32
  57. }
  58. func (k *key) String() string {
  59. if k != nil {
  60. return fmt.Sprintf("(key: %s, tag: 0x%x)", hex.EncodeToString(k.value)[0:5], k.tag)
  61. }
  62. return ""
  63. }
  64. // Security Parameter Indices for the IPsec flows between local node and a
  65. // remote peer, which identify the Security Associations (XFRM states) to be
  66. // applied when encrypting and decrypting packets.
  67. type spi struct {
  68. forward int
  69. reverse int
  70. }
  71. func (s *spi) String() string {
  72. return fmt.Sprintf("SPI(FWD: 0x%x, REV: 0x%x)", uint32(s.forward), uint32(s.reverse))
  73. }
  74. type encrMap struct {
  75. nodes map[string][]*spi
  76. sync.Mutex
  77. }
  78. func (e *encrMap) String() string {
  79. e.Lock()
  80. defer e.Unlock()
  81. b := new(bytes.Buffer)
  82. for k, v := range e.nodes {
  83. b.WriteString("\n")
  84. b.WriteString(k)
  85. b.WriteString(":")
  86. b.WriteString("[")
  87. for _, s := range v {
  88. b.WriteString(s.String())
  89. b.WriteString(",")
  90. }
  91. b.WriteString("]")
  92. }
  93. return b.String()
  94. }
  95. func (d *driver) checkEncryption(nid string, rIP net.IP, isLocal, add bool) error {
  96. log.G(context.TODO()).Debugf("checkEncryption(%.7s, %v, %t)", nid, rIP, isLocal)
  97. n := d.network(nid)
  98. if n == nil || !n.secure {
  99. return nil
  100. }
  101. if len(d.keys) == 0 {
  102. return types.ForbiddenErrorf("encryption key is not present")
  103. }
  104. lIP := d.bindAddress
  105. aIP := d.advertiseAddress
  106. nodes := map[string]net.IP{}
  107. switch {
  108. case isLocal:
  109. if err := d.peerDbNetworkWalk(nid, func(pKey *peerKey, pEntry *peerEntry) bool {
  110. if !aIP.Equal(pEntry.vtep) {
  111. nodes[pEntry.vtep.String()] = pEntry.vtep
  112. }
  113. return false
  114. }); err != nil {
  115. log.G(context.TODO()).Warnf("Failed to retrieve list of participating nodes in overlay network %.5s: %v", nid, err)
  116. }
  117. default:
  118. if len(d.network(nid).endpoints) > 0 {
  119. nodes[rIP.String()] = rIP
  120. }
  121. }
  122. log.G(context.TODO()).Debugf("List of nodes: %s", nodes)
  123. if add {
  124. for _, rIP := range nodes {
  125. if err := setupEncryption(lIP, aIP, rIP, d.secMap, d.keys); err != nil {
  126. log.G(context.TODO()).Warnf("Failed to program network encryption between %s and %s: %v", lIP, rIP, err)
  127. }
  128. }
  129. } else {
  130. if len(nodes) == 0 {
  131. if err := removeEncryption(lIP, rIP, d.secMap); err != nil {
  132. log.G(context.TODO()).Warnf("Failed to remove network encryption between %s and %s: %v", lIP, rIP, err)
  133. }
  134. }
  135. }
  136. return nil
  137. }
  138. // setupEncryption programs the encryption parameters for secure communication
  139. // between the local node and a remote node.
  140. func setupEncryption(localIP, advIP, remoteIP net.IP, em *encrMap, keys []*key) error {
  141. log.G(context.TODO()).Debugf("Programming encryption between %s and %s", localIP, remoteIP)
  142. rIPs := remoteIP.String()
  143. indices := make([]*spi, 0, len(keys))
  144. for i, k := range keys {
  145. spis := &spi{buildSPI(advIP, remoteIP, k.tag), buildSPI(remoteIP, advIP, k.tag)}
  146. dir := reverse
  147. if i == 0 {
  148. dir = bidir
  149. }
  150. fSA, rSA, err := programSA(localIP, remoteIP, spis, k, dir, true)
  151. if err != nil {
  152. log.G(context.TODO()).Warn(err)
  153. }
  154. indices = append(indices, spis)
  155. if i != 0 {
  156. continue
  157. }
  158. err = programSP(fSA, rSA, true)
  159. if err != nil {
  160. log.G(context.TODO()).Warn(err)
  161. }
  162. }
  163. em.Lock()
  164. em.nodes[rIPs] = indices
  165. em.Unlock()
  166. return nil
  167. }
  168. func removeEncryption(localIP, remoteIP net.IP, em *encrMap) error {
  169. em.Lock()
  170. indices, ok := em.nodes[remoteIP.String()]
  171. em.Unlock()
  172. if !ok {
  173. return nil
  174. }
  175. for i, idxs := range indices {
  176. dir := reverse
  177. if i == 0 {
  178. dir = bidir
  179. }
  180. fSA, rSA, err := programSA(localIP, remoteIP, idxs, nil, dir, false)
  181. if err != nil {
  182. log.G(context.TODO()).Warn(err)
  183. }
  184. if i != 0 {
  185. continue
  186. }
  187. err = programSP(fSA, rSA, false)
  188. if err != nil {
  189. log.G(context.TODO()).Warn(err)
  190. }
  191. }
  192. return nil
  193. }
  194. func (d *driver) transportIPTable() (*iptables.IPTable, error) {
  195. v6, err := d.isIPv6Transport()
  196. if err != nil {
  197. return nil, err
  198. }
  199. version := iptables.IPv4
  200. if v6 {
  201. version = iptables.IPv6
  202. }
  203. return iptables.GetIptable(version), nil
  204. }
  205. func (d *driver) programMangle(vni uint32, add bool) error {
  206. var (
  207. m = strconv.FormatUint(mark, 10)
  208. chain = "OUTPUT"
  209. rule = append(matchVXLAN(overlayutils.VXLANUDPPort(), vni), "-j", "MARK", "--set-mark", m)
  210. a = iptables.Append
  211. action = "install"
  212. )
  213. iptable, err := d.transportIPTable()
  214. if err != nil {
  215. // Fail closed if unsure. Better safe than cleartext.
  216. return err
  217. }
  218. if !add {
  219. a = iptables.Delete
  220. action = "remove"
  221. }
  222. if err := iptable.ProgramRule(iptables.Mangle, chain, a, rule); err != nil {
  223. return fmt.Errorf("could not %s mangle rule: %w", action, err)
  224. }
  225. return nil
  226. }
  227. func (d *driver) programInput(vni uint32, add bool) error {
  228. var (
  229. plainVxlan = matchVXLAN(overlayutils.VXLANUDPPort(), vni)
  230. chain = "INPUT"
  231. msg = "add"
  232. )
  233. rule := func(policy, jump string) []string {
  234. args := append([]string{"-m", "policy", "--dir", "in", "--pol", policy}, plainVxlan...)
  235. return append(args, "-j", jump)
  236. }
  237. iptable, err := d.transportIPTable()
  238. if err != nil {
  239. // Fail closed if unsure. Better safe than cleartext.
  240. return err
  241. }
  242. if !add {
  243. msg = "remove"
  244. }
  245. action := func(a iptables.Action) iptables.Action {
  246. if !add {
  247. return iptables.Delete
  248. }
  249. return a
  250. }
  251. // Drop incoming VXLAN datagrams for the VNI which were received in cleartext.
  252. // Insert at the top of the chain so the packets are dropped even if an
  253. // administrator-configured rule exists which would otherwise unconditionally
  254. // accept incoming VXLAN traffic.
  255. if err := iptable.ProgramRule(iptables.Filter, chain, action(iptables.Insert), rule("none", "DROP")); err != nil {
  256. return fmt.Errorf("could not %s input drop rule: %w", msg, err)
  257. }
  258. return nil
  259. }
  260. func programSA(localIP, remoteIP net.IP, spi *spi, k *key, dir int, add bool) (fSA *netlink.XfrmState, rSA *netlink.XfrmState, err error) {
  261. var (
  262. action = "Removing"
  263. xfrmProgram = ns.NlHandle().XfrmStateDel
  264. )
  265. if add {
  266. action = "Adding"
  267. xfrmProgram = ns.NlHandle().XfrmStateAdd
  268. }
  269. if dir&reverse > 0 {
  270. rSA = &netlink.XfrmState{
  271. Src: remoteIP,
  272. Dst: localIP,
  273. Proto: netlink.XFRM_PROTO_ESP,
  274. Spi: spi.reverse,
  275. Mode: netlink.XFRM_MODE_TRANSPORT,
  276. Reqid: mark,
  277. }
  278. if add {
  279. rSA.Aead = buildAeadAlgo(k, spi.reverse)
  280. }
  281. exists, err := saExists(rSA)
  282. if err != nil {
  283. exists = !add
  284. }
  285. if add != exists {
  286. log.G(context.TODO()).Debugf("%s: rSA{%s}", action, rSA)
  287. if err := xfrmProgram(rSA); err != nil {
  288. log.G(context.TODO()).Warnf("Failed %s rSA{%s}: %v", action, rSA, err)
  289. }
  290. }
  291. }
  292. if dir&forward > 0 {
  293. fSA = &netlink.XfrmState{
  294. Src: localIP,
  295. Dst: remoteIP,
  296. Proto: netlink.XFRM_PROTO_ESP,
  297. Spi: spi.forward,
  298. Mode: netlink.XFRM_MODE_TRANSPORT,
  299. Reqid: mark,
  300. }
  301. if add {
  302. fSA.Aead = buildAeadAlgo(k, spi.forward)
  303. }
  304. exists, err := saExists(fSA)
  305. if err != nil {
  306. exists = !add
  307. }
  308. if add != exists {
  309. log.G(context.TODO()).Debugf("%s fSA{%s}", action, fSA)
  310. if err := xfrmProgram(fSA); err != nil {
  311. log.G(context.TODO()).Warnf("Failed %s fSA{%s}: %v.", action, fSA, err)
  312. }
  313. }
  314. }
  315. return
  316. }
  317. // getMinimalIP returns the address in its shortest form
  318. // If ip contains an IPv4-mapped IPv6 address, the 4-octet form of the IPv4 address will be returned.
  319. // Otherwise ip is returned unchanged.
  320. func getMinimalIP(ip net.IP) net.IP {
  321. if ip != nil && ip.To4() != nil {
  322. return ip.To4()
  323. }
  324. return ip
  325. }
  326. func programSP(fSA *netlink.XfrmState, rSA *netlink.XfrmState, add bool) error {
  327. action := "Removing"
  328. xfrmProgram := ns.NlHandle().XfrmPolicyDel
  329. if add {
  330. action = "Adding"
  331. xfrmProgram = ns.NlHandle().XfrmPolicyAdd
  332. }
  333. // Create a congruent cidr
  334. s := getMinimalIP(fSA.Src)
  335. d := getMinimalIP(fSA.Dst)
  336. fullMask := net.CIDRMask(8*len(s), 8*len(s))
  337. fPol := &netlink.XfrmPolicy{
  338. Src: &net.IPNet{IP: s, Mask: fullMask},
  339. Dst: &net.IPNet{IP: d, Mask: fullMask},
  340. Dir: netlink.XFRM_DIR_OUT,
  341. Proto: syscall.IPPROTO_UDP,
  342. DstPort: int(overlayutils.VXLANUDPPort()),
  343. Mark: &spMark,
  344. Tmpls: []netlink.XfrmPolicyTmpl{
  345. {
  346. Src: fSA.Src,
  347. Dst: fSA.Dst,
  348. Proto: netlink.XFRM_PROTO_ESP,
  349. Mode: netlink.XFRM_MODE_TRANSPORT,
  350. Spi: fSA.Spi,
  351. Reqid: mark,
  352. },
  353. },
  354. }
  355. exists, err := spExists(fPol)
  356. if err != nil {
  357. exists = !add
  358. }
  359. if add != exists {
  360. log.G(context.TODO()).Debugf("%s fSP{%s}", action, fPol)
  361. if err := xfrmProgram(fPol); err != nil {
  362. log.G(context.TODO()).Warnf("%s fSP{%s}: %v", action, fPol, err)
  363. }
  364. }
  365. return nil
  366. }
  367. func saExists(sa *netlink.XfrmState) (bool, error) {
  368. _, err := ns.NlHandle().XfrmStateGet(sa)
  369. switch err {
  370. case nil:
  371. return true, nil
  372. case syscall.ESRCH:
  373. return false, nil
  374. default:
  375. err = fmt.Errorf("Error while checking for SA existence: %v", err)
  376. log.G(context.TODO()).Warn(err)
  377. return false, err
  378. }
  379. }
  380. func spExists(sp *netlink.XfrmPolicy) (bool, error) {
  381. _, err := ns.NlHandle().XfrmPolicyGet(sp)
  382. switch err {
  383. case nil:
  384. return true, nil
  385. case syscall.ENOENT:
  386. return false, nil
  387. default:
  388. err = fmt.Errorf("Error while checking for SP existence: %v", err)
  389. log.G(context.TODO()).Warn(err)
  390. return false, err
  391. }
  392. }
  393. func buildSPI(src, dst net.IP, st uint32) int {
  394. b := make([]byte, 4)
  395. binary.BigEndian.PutUint32(b, st)
  396. h := fnv.New32a()
  397. h.Write(src)
  398. h.Write(b)
  399. h.Write(dst)
  400. return int(binary.BigEndian.Uint32(h.Sum(nil)))
  401. }
  402. func buildAeadAlgo(k *key, s int) *netlink.XfrmStateAlgo {
  403. salt := make([]byte, 4)
  404. binary.BigEndian.PutUint32(salt, uint32(s))
  405. return &netlink.XfrmStateAlgo{
  406. Name: "rfc4106(gcm(aes))",
  407. Key: append(k.value, salt...),
  408. ICVLen: 64,
  409. }
  410. }
  411. func (d *driver) secMapWalk(f func(string, []*spi) ([]*spi, bool)) error {
  412. d.secMap.Lock()
  413. for node, indices := range d.secMap.nodes {
  414. idxs, stop := f(node, indices)
  415. if idxs != nil {
  416. d.secMap.nodes[node] = idxs
  417. }
  418. if stop {
  419. break
  420. }
  421. }
  422. d.secMap.Unlock()
  423. return nil
  424. }
  425. func (d *driver) setKeys(keys []*key) error {
  426. // Remove any stale policy, state
  427. clearEncryptionStates()
  428. // Accept the encryption keys and clear any stale encryption map
  429. d.Lock()
  430. d.keys = keys
  431. d.secMap = &encrMap{nodes: map[string][]*spi{}}
  432. d.Unlock()
  433. log.G(context.TODO()).Debugf("Initial encryption keys: %v", keys)
  434. return nil
  435. }
  436. // updateKeys allows to add a new key and/or change the primary key and/or prune an existing key
  437. // The primary key is the key used in transmission and will go in first position in the list.
  438. func (d *driver) updateKeys(newKey, primary, pruneKey *key) error {
  439. log.G(context.TODO()).Debugf("Updating Keys. New: %v, Primary: %v, Pruned: %v", newKey, primary, pruneKey)
  440. log.G(context.TODO()).Debugf("Current: %v", d.keys)
  441. var (
  442. newIdx = -1
  443. priIdx = -1
  444. delIdx = -1
  445. lIP = d.bindAddress
  446. aIP = d.advertiseAddress
  447. )
  448. d.Lock()
  449. defer d.Unlock()
  450. // add new
  451. if newKey != nil {
  452. d.keys = append(d.keys, newKey)
  453. newIdx += len(d.keys)
  454. }
  455. for i, k := range d.keys {
  456. if primary != nil && k.tag == primary.tag {
  457. priIdx = i
  458. }
  459. if pruneKey != nil && k.tag == pruneKey.tag {
  460. delIdx = i
  461. }
  462. }
  463. if (newKey != nil && newIdx == -1) ||
  464. (primary != nil && priIdx == -1) ||
  465. (pruneKey != nil && delIdx == -1) {
  466. return types.InvalidParameterErrorf("cannot find proper key indices while processing key update:"+
  467. "(newIdx,priIdx,delIdx):(%d, %d, %d)", newIdx, priIdx, delIdx)
  468. }
  469. if priIdx != -1 && priIdx == delIdx {
  470. return types.InvalidParameterErrorf("attempting to both make a key (index %d) primary and delete it", priIdx)
  471. }
  472. d.secMapWalk(func(rIPs string, spis []*spi) ([]*spi, bool) {
  473. rIP := net.ParseIP(rIPs)
  474. return updateNodeKey(lIP, aIP, rIP, spis, d.keys, newIdx, priIdx, delIdx), false
  475. })
  476. // swap primary
  477. if priIdx != -1 {
  478. d.keys[0], d.keys[priIdx] = d.keys[priIdx], d.keys[0]
  479. }
  480. // prune
  481. if delIdx != -1 {
  482. if delIdx == 0 {
  483. delIdx = priIdx
  484. }
  485. d.keys = append(d.keys[:delIdx], d.keys[delIdx+1:]...)
  486. }
  487. log.G(context.TODO()).Debugf("Updated: %v", d.keys)
  488. return nil
  489. }
  490. /********************************************************
  491. * Steady state: rSA0, rSA1, rSA2, fSA1, fSP1
  492. * Rotation --> -rSA0, +rSA3, +fSA2, +fSP2/-fSP1, -fSA1
  493. * Steady state: rSA1, rSA2, rSA3, fSA2, fSP2
  494. *********************************************************/
  495. // Spis and keys are sorted in such away the one in position 0 is the primary
  496. func updateNodeKey(lIP, aIP, rIP net.IP, idxs []*spi, curKeys []*key, newIdx, priIdx, delIdx int) []*spi {
  497. log.G(context.TODO()).Debugf("Updating keys for node: %s (%d,%d,%d)", rIP, newIdx, priIdx, delIdx)
  498. spis := idxs
  499. log.G(context.TODO()).Debugf("Current: %v", spis)
  500. // add new
  501. if newIdx != -1 {
  502. spis = append(spis, &spi{
  503. forward: buildSPI(aIP, rIP, curKeys[newIdx].tag),
  504. reverse: buildSPI(rIP, aIP, curKeys[newIdx].tag),
  505. })
  506. }
  507. if delIdx != -1 {
  508. // -rSA0
  509. programSA(lIP, rIP, spis[delIdx], nil, reverse, false)
  510. }
  511. if newIdx > -1 {
  512. // +rSA2
  513. programSA(lIP, rIP, spis[newIdx], curKeys[newIdx], reverse, true)
  514. }
  515. if priIdx > 0 {
  516. // +fSA2
  517. fSA2, _, _ := programSA(lIP, rIP, spis[priIdx], curKeys[priIdx], forward, true)
  518. // +fSP2, -fSP1
  519. s := getMinimalIP(fSA2.Src)
  520. d := getMinimalIP(fSA2.Dst)
  521. fullMask := net.CIDRMask(8*len(s), 8*len(s))
  522. fSP1 := &netlink.XfrmPolicy{
  523. Src: &net.IPNet{IP: s, Mask: fullMask},
  524. Dst: &net.IPNet{IP: d, Mask: fullMask},
  525. Dir: netlink.XFRM_DIR_OUT,
  526. Proto: syscall.IPPROTO_UDP,
  527. DstPort: int(overlayutils.VXLANUDPPort()),
  528. Mark: &spMark,
  529. Tmpls: []netlink.XfrmPolicyTmpl{
  530. {
  531. Src: fSA2.Src,
  532. Dst: fSA2.Dst,
  533. Proto: netlink.XFRM_PROTO_ESP,
  534. Mode: netlink.XFRM_MODE_TRANSPORT,
  535. Spi: fSA2.Spi,
  536. Reqid: mark,
  537. },
  538. },
  539. }
  540. log.G(context.TODO()).Debugf("Updating fSP{%s}", fSP1)
  541. if err := ns.NlHandle().XfrmPolicyUpdate(fSP1); err != nil {
  542. log.G(context.TODO()).Warnf("Failed to update fSP{%s}: %v", fSP1, err)
  543. }
  544. // -fSA1
  545. programSA(lIP, rIP, spis[0], nil, forward, false)
  546. }
  547. // swap
  548. if priIdx > 0 {
  549. swp := spis[0]
  550. spis[0] = spis[priIdx]
  551. spis[priIdx] = swp
  552. }
  553. // prune
  554. if delIdx != -1 {
  555. if delIdx == 0 {
  556. delIdx = priIdx
  557. }
  558. spis = append(spis[:delIdx], spis[delIdx+1:]...)
  559. }
  560. log.G(context.TODO()).Debugf("Updated: %v", spis)
  561. return spis
  562. }
  563. func (n *network) maxMTU() int {
  564. mtu := 1500
  565. if n.mtu != 0 {
  566. mtu = n.mtu
  567. }
  568. mtu -= vxlanEncap
  569. if n.secure {
  570. // In case of encryption account for the
  571. // esp packet expansion and padding
  572. mtu -= pktExpansion
  573. mtu -= (mtu % 4)
  574. }
  575. return mtu
  576. }
  577. func clearEncryptionStates() {
  578. nlh := ns.NlHandle()
  579. spList, err := nlh.XfrmPolicyList(netlink.FAMILY_ALL)
  580. if err != nil {
  581. log.G(context.TODO()).Warnf("Failed to retrieve SP list for cleanup: %v", err)
  582. }
  583. saList, err := nlh.XfrmStateList(netlink.FAMILY_ALL)
  584. if err != nil {
  585. log.G(context.TODO()).Warnf("Failed to retrieve SA list for cleanup: %v", err)
  586. }
  587. for _, sp := range spList {
  588. sp := sp
  589. if sp.Mark != nil && sp.Mark.Value == spMark.Value {
  590. if err := nlh.XfrmPolicyDel(&sp); err != nil {
  591. log.G(context.TODO()).Warnf("Failed to delete stale SP %s: %v", sp, err)
  592. continue
  593. }
  594. log.G(context.TODO()).Debugf("Removed stale SP: %s", sp)
  595. }
  596. }
  597. for _, sa := range saList {
  598. sa := sa
  599. if sa.Reqid == mark {
  600. if err := nlh.XfrmStateDel(&sa); err != nil {
  601. log.G(context.TODO()).Warnf("Failed to delete stale SA %s: %v", sa, err)
  602. continue
  603. }
  604. log.G(context.TODO()).Debugf("Removed stale SA: %s", sa)
  605. }
  606. }
  607. }