2020-07-06 18:34:52 +01:00
|
|
|
// Copyright (c) 2020 Tailscale Inc & AUTHORS All rights reserved.
|
|
|
|
// Use of this source code is governed by a BSD-style
|
|
|
|
// license that can be found in the LICENSE file.
|
|
|
|
|
|
|
|
package interfaces
|
|
|
|
|
|
|
|
import (
|
2020-09-22 22:20:01 +01:00
|
|
|
"fmt"
|
2020-07-06 18:34:52 +01:00
|
|
|
"os/exec"
|
2020-07-15 20:43:48 +01:00
|
|
|
"syscall"
|
2020-07-06 18:34:52 +01:00
|
|
|
|
2020-09-10 19:40:02 +01:00
|
|
|
"github.com/tailscale/winipcfg-go"
|
2020-07-06 18:34:52 +01:00
|
|
|
"go4.org/mem"
|
|
|
|
"inet.af/netaddr"
|
2020-09-10 19:40:02 +01:00
|
|
|
"tailscale.com/tsconst"
|
2020-07-06 18:34:52 +01:00
|
|
|
"tailscale.com/util/lineread"
|
|
|
|
)
|
|
|
|
|
|
|
|
func init() {
|
|
|
|
likelyHomeRouterIP = likelyHomeRouterIPWindows
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
Parse out 10.0.0.1 from:
|
|
|
|
|
|
|
|
Z:\>route print -4
|
|
|
|
===========================================================================
|
|
|
|
Interface List
|
|
|
|
15...aa 15 48 ff 1c 72 ......Red Hat VirtIO Ethernet Adapter
|
|
|
|
5...........................Tailscale Tunnel
|
|
|
|
1...........................Software Loopback Interface 1
|
|
|
|
===========================================================================
|
|
|
|
|
|
|
|
IPv4 Route Table
|
|
|
|
===========================================================================
|
|
|
|
Active Routes:
|
|
|
|
Network Destination Netmask Gateway Interface Metric
|
|
|
|
0.0.0.0 0.0.0.0 10.0.0.1 10.0.28.63 5
|
|
|
|
10.0.0.0 255.255.0.0 On-link 10.0.28.63 261
|
|
|
|
10.0.28.63 255.255.255.255 On-link 10.0.28.63 261
|
|
|
|
10.0.42.0 255.255.255.0 100.103.42.106 100.103.42.106 5
|
|
|
|
10.0.255.255 255.255.255.255 On-link 10.0.28.63 261
|
|
|
|
34.193.248.174 255.255.255.255 100.103.42.106 100.103.42.106 5
|
|
|
|
|
|
|
|
*/
|
|
|
|
func likelyHomeRouterIPWindows() (ret netaddr.IP, ok bool) {
|
|
|
|
cmd := exec.Command("route", "print", "-4")
|
2020-07-15 20:43:48 +01:00
|
|
|
cmd.SysProcAttr = &syscall.SysProcAttr{HideWindow: true}
|
2020-07-06 18:34:52 +01:00
|
|
|
stdout, err := cmd.StdoutPipe()
|
|
|
|
if err != nil {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
if err := cmd.Start(); err != nil {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
defer cmd.Wait()
|
|
|
|
|
|
|
|
var f []mem.RO
|
|
|
|
lineread.Reader(stdout, func(lineb []byte) error {
|
|
|
|
line := mem.B(lineb)
|
|
|
|
if !mem.Contains(line, mem.S("0.0.0.0")) {
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
f = mem.AppendFields(f[:0], line)
|
|
|
|
if len(f) < 3 || !f[0].EqualString("0.0.0.0") || !f[1].EqualString("0.0.0.0") {
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
ipm := f[2]
|
|
|
|
ip, err := netaddr.ParseIP(string(mem.Append(nil, ipm)))
|
|
|
|
if err == nil && isPrivateIP(ip) {
|
|
|
|
ret = ip
|
|
|
|
}
|
|
|
|
return nil
|
|
|
|
})
|
|
|
|
return ret, !ret.IsZero()
|
|
|
|
}
|
2020-09-10 19:40:02 +01:00
|
|
|
|
|
|
|
// NonTailscaleMTUs returns a map of interface LUID to interface MTU,
|
|
|
|
// for all interfaces except Tailscale tunnels.
|
|
|
|
func NonTailscaleMTUs() (map[uint64]uint32, error) {
|
2020-09-22 22:20:01 +01:00
|
|
|
mtus := map[uint64]uint32{}
|
|
|
|
ifs, err := NonTailscaleInterfaces()
|
|
|
|
for luid, iface := range ifs {
|
|
|
|
mtus[luid] = iface.Mtu
|
|
|
|
}
|
|
|
|
return mtus, err
|
|
|
|
}
|
|
|
|
|
|
|
|
// NonTailscaleInterfaces returns a map of interface LUID to interface
|
|
|
|
// for all interfaces except Tailscale tunnels.
|
|
|
|
func NonTailscaleInterfaces() (map[uint64]*winipcfg.Interface, error) {
|
|
|
|
ifs, err := winipcfg.GetInterfacesEx(&winipcfg.GetAdapterAddressesFlags{
|
|
|
|
GAA_FLAG_INCLUDE_ALL_INTERFACES: true,
|
|
|
|
})
|
2020-09-10 19:40:02 +01:00
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
2020-09-22 22:20:01 +01:00
|
|
|
ret := map[uint64]*winipcfg.Interface{}
|
2020-09-10 19:40:02 +01:00
|
|
|
for _, iface := range ifs {
|
|
|
|
if iface.Description == tsconst.WintunInterfaceDesc {
|
|
|
|
continue
|
|
|
|
}
|
2020-09-22 22:20:01 +01:00
|
|
|
ret[iface.Luid] = iface
|
2020-09-10 19:40:02 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
return ret, nil
|
|
|
|
}
|
2020-09-22 22:20:01 +01:00
|
|
|
|
|
|
|
// GetWindowsDefault returns the interface that has the non-Tailscale
|
|
|
|
// default route for the given address family.
|
|
|
|
//
|
|
|
|
// It returns (nil, nil) if no interface is found.
|
|
|
|
func GetWindowsDefault(family winipcfg.AddressFamily) (*winipcfg.Interface, error) {
|
|
|
|
ifs, err := NonTailscaleInterfaces()
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
routes, err := winipcfg.GetRoutes(family)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
bestMetric := ^uint32(0)
|
|
|
|
var bestIface *winipcfg.Interface
|
|
|
|
for _, route := range routes {
|
|
|
|
iface := ifs[route.InterfaceLuid]
|
|
|
|
if route.DestinationPrefix.PrefixLength != 0 || iface == nil {
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
if iface.OperStatus == winipcfg.IfOperStatusUp && route.Metric < bestMetric {
|
|
|
|
bestMetric = route.Metric
|
|
|
|
bestIface = iface
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return bestIface, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func DefaultRouteInterface() (string, error) {
|
|
|
|
iface, err := GetWindowsDefault(winipcfg.AF_INET)
|
|
|
|
if err != nil {
|
|
|
|
return "", err
|
|
|
|
}
|
|
|
|
if iface == nil {
|
|
|
|
return "(none)", nil
|
|
|
|
}
|
|
|
|
return fmt.Sprintf("%s (%s)", iface.FriendlyName, iface.Description), nil
|
|
|
|
}
|