5
0
mirror of https://github.com/cwinfo/yggdrasil-network.github.io.git synced 2024-11-09 16:50:31 +00:00

Add blog post

This commit is contained in:
Neil Alexander 2018-11-06 23:56:10 +00:00
parent e9b0672ad1
commit b20934dc18
No known key found for this signature in database
GPG Key ID: A02A2019A2BB0944

View File

@ -0,0 +1,102 @@
---
layout: post
title: "Crypto-Key Routing"
date: 2018-11-06 23:00:00 -0000
author: Neil Alexander
---
### Tunnelling over Yggdrasil
Up until now, Yggdrasil has worked entirely using internal addressing from the
`0200::/7` range. These addresses are cryptographically bound and allow
end-to-end communication between any two given nodes. However, this approach is
somewhat limiting in that it assumes an Yggdrasil node is, at most, a gateway
for a single /64 IPv6 subnet. This therefore meant that it is very difficult
to route between or bridge two networks without using another encapsulation
protocol such as GRE. It also meant that it was very difficult to provide access
to networks like the Internet internally.
Today I created a pull request which implements Crypto-Key Routing (CKR), which
you may already be familiar with if you have used Wireguard. The premise behind
CKR is that it allows you to define routes stating that specific subnets should
be routed to a given node on the network, identified by their public encryption
key. The traffic is encrypted end-to-end, as normal, and sent to the specified
node, otherwise completely unmodified. This gives us effectively the ability to
run VPNs over the Yggdrasil network without the need for additional software.
### Configuration
The new CKR module proposes the addition of some new configuration options. They
are summarised below, although may be subject to change at the point that v0.3
is released:
```
TunnelRouting:
{
Enable: false
IPv6Destinations: {}
IPv6Sources: []
IPv4Destinations: {}
IPv4Sources: []
}
```
The `IPv6Destinations` and `IPv4Destinations` options are used to specify
crypto-key routes. The subnet refers to an encryption public key of another
node, for example:
```
IPv6Destinations: {
"fd64:642b:1a20::/48": "ef78da7fc983c6c210609529921a701ca3e43fa5cfd79f5f20cc67bf66e45c1a",
"fd25:8a33:9311:a53b::/64": "417fd0a66a104f050ae3544b3bc03eeb3648dded4a8c1fb085d65ffa25e83d6e"
}
```
As with a typical routing table, more specific routes are preferred.
The `IPv6Sources` and `IPv4Sources` options are used to specify which source
addresses are eligible to be routed across a tunnel. For IPv6, this is optional
as each Yggdrasil node already has an address and a routed subnet, and these are
always allowed as source addresses. Specifying additional source addresses means
that you can use the tunnel to route between networks. For IPv4, this is
mandatory as Yggdrasil nodes do not have IPv4 addresses by default.
### Bridging networks
Assume that node A is `a.a.a.a/24` and `aaaa:aaaa:aaaa:aaaa::/64` and node B is `b.b.b.b/24` and `bbbb:bbbb:bbbb:bbbb::/64`. On node A, use the following `TunnelRouting` configuration:
```
Enable: true
IPv6Destinations: {
"bbbb:bbbb:bbbb:bbbb::/64": "xxxxxxxxxxxxxx"
}
IPv6Sources: {
aaaa:aaaa:aaaa:aaaa::/64
}
IPv4Destinations: {
"b.b.b.b/24": "xxxxxxxxxxxxxx"
}
IPv4Sources: {
a.a.a.a/24
}
```
On node B, use the reverse `TunnelRouting` configuration:
```
Enable: true
IPv6Destinations: {
"aaaa:aaaa:aaaa:aaaa::/64": "xxxxxxxxxxxxxx"
}
IPv6Sources: {
bbbb:bbbb:bbbb:bbbb::/64
}
IPv4Destinations: {
"a.a.a.a/24": "xxxxxxxxxxxxxx"
}
IPv4Sources: {
b.b.b.b/24
}
```
The Yggdrasil TUN/TAP adapters on each side can now be used to tunnel between `a.a.a.a/24` and `b.b.b.b/24` in IPv4 and `aaaa:aaaa:aaaa:aaaa::/64` and `bbbb:bbbb:bbbb:bbbb/64` in IPv6.
### Conclusion
It is my hope that this will be merged into the `develop` branch soon, and will
be a feature targeted for general release in v0.3. With this, Yggdrasil is able
to take on more advanced routing tasks and will hopefully be more useful in a
wider range of scenarios.