feat(linux): compute device ID from /etc/machine-id (#10805)

All of our Linux applications have a soft-dependency on systemd. That
is, in the default configuration, we expect systemd to be present on the
machine. The only exception here are the docker containers for Headless
Client and Gateway.

For the GUI client in particular, systemd is a hard-dependency in order
to control DNS on the system which we do via `systemd-resolved`. To
secure the communication between the GUI client and its tunnel process,
we automatically create a group called `firezone-client` to which the
user gets added. All members of the group are allowed to access the unix
socket which is used for IPC between the two processes. Membership in
this group is also a prerequisite for accessing any of the configuration
files.

On the first launch of the GUI client on a Linux system, this presents a
problem. For group membership changes to take the effect, the user needs
to reboot. We say that in the documentation but it is unclear whether
all users will read that thoroughly enough. To help the user, the GUI
client checks for membership of the current user in the group and alerts
the user via a dialog box if that isn't the case. This would all be fine
if it would actually work. Unfortunately, that check ends up being too
late in the process. If we aren't a member of the group, we cannot read
the device ID and bail early, thus never reaching the check and
terminating the process without any dialog box or user-visible error.

We could attempt to fix this by shuffling around some of the startup
init code. That is a sub-optimal solution however because it a) may get
broken again in the future and b) it means we have to delay
initialisation of telemetry until a much later point.

Given that this is only a problem on Linux, a better solution is to
simply not rely on the disk-based device ID at all. Instead, we can
integrate with systemd and deterministically derive a device ID from the
unique machine ID and a randomly chosen "app ID".

For backwards-compatibility reasons, the disk-based device ID is still
prioritised. For all new installs however, we will use the one based on
`/etc/machine-id`.
This commit is contained in:
Thomas Eizinger
2025-11-10 13:29:52 +11:00
committed by GitHub
parent 8651413a95
commit 166b0d1573
9 changed files with 132 additions and 52 deletions

1
rust/Cargo.lock generated
View File

@@ -2361,6 +2361,7 @@ dependencies = [
"gat-lending-iterator",
"hex",
"hex-literal",
"hmac",
"ip-packet",
"ip_network",
"ipconfig",

View File

@@ -95,6 +95,7 @@ hex = "0.4.3"
hex-display = "0.3.0"
hex-literal = "1.0.0"
hickory-resolver = "0.25.2"
hmac = "0.12.1"
http = "1.3.1"
http-body-util = "0.1.3"
http-client = { path = "connlib/http-client" }

View File

@@ -34,6 +34,7 @@ uuid = { workspace = true, features = ["v4"] }
[target.'cfg(target_os = "linux")'.dependencies]
atomicwrites = { workspace = true }
dirs = { workspace = true }
hmac = { workspace = true }
libc = { workspace = true }
netlink-packet-core = { workspace = true }
netlink-packet-route = { workspace = true }
@@ -80,7 +81,7 @@ features = [
bufferpool = { workspace = true }
bytes = { workspace = true }
tempfile = { workspace = true }
tokio = { workspace = true, features = ["macros", "rt-multi-thread"] }
tokio = { workspace = true, features = ["macros", "rt-multi-thread", "fs"] }
[target.'cfg(target_os = "linux")'.dev-dependencies]
mutants = "0.0.3" # Needed to mark functions as exempt from `cargo-mutants` testing

View File

@@ -9,16 +9,33 @@ use std::{
path::{Path, PathBuf},
};
/// Randomly generated, hex-encoded 128bit identifier for Clients.
///
/// Together with a unique hardware ID, like `/etc/machine-id`, this can be used to deterministically compute a device ID.
const CLIENT_APP_ID: &str = "e1e465ce763e4759945c650ac334501f";
/// Randomly generated, hex-encoded 128bit identifier for Gateways.
///
/// Together with a unique hardware ID, like `/etc/machine-id`, this can be used to deterministically compute a device ID.
const GATEWAY_APP_ID: &str = "753b38f9f96947ef8083802d5909a372";
#[derive(Debug, Clone, PartialEq)]
pub struct DeviceId {
pub id: String,
pub source: Source,
}
#[derive(Debug, Clone, PartialEq)]
pub enum Source {
Disk,
HardwareId,
}
/// Returns the path of the randomly-generated Firezone device ID
///
/// e.g. `C:\ProgramData\dev.firezone.client/firezone-id.json` or
/// `/var/lib/dev.firezone.client/config/firezone-id.json`.
pub fn path() -> Result<PathBuf> {
pub fn client_path() -> Result<PathBuf> {
let path = crate::known_dirs::tunnel_service_config()
.context("Failed to compute path for firezone-id file")?
.join("firezone-id.json");
@@ -26,23 +43,13 @@ pub fn path() -> Result<PathBuf> {
}
/// Returns the device ID without generating it
pub fn get() -> Result<DeviceId> {
let path = path()?;
let id = get_at(&path)?;
pub fn get_client() -> Result<DeviceId> {
let path = client_path()?;
let id = get_at_or_compute(&path, CLIENT_APP_ID)?;
Ok(id)
}
fn get_at(path: &Path) -> Result<DeviceId> {
let content = fs::read_to_string(path).context("Failed to read file")?;
let device_id_json = serde_json::from_str::<DeviceIdJson>(&content)
.context("Failed to deserialize content as JSON")?;
Ok(DeviceId {
id: device_id_json.id,
})
}
/// Returns the device ID, generating it and saving it to disk if needed.
///
/// Per <https://github.com/firezone/firezone/issues/2697> and <https://github.com/firezone/firezone/issues/2711>,
@@ -51,14 +58,22 @@ fn get_at(path: &Path) -> Result<DeviceId> {
/// Returns: The UUID as a String, suitable for sending verbatim to `client_shared::Session::connect`.
///
/// Errors: If the disk is unwritable when initially generating the ID, or unwritable when re-generating an invalid ID.
pub fn get_or_create() -> Result<DeviceId> {
let path = path()?;
let id = get_or_create_at(&path)?;
pub fn get_or_create_client() -> Result<DeviceId> {
let path = client_path()?;
let id = get_or_create_at(&path, CLIENT_APP_ID)?;
Ok(id)
}
pub fn get_or_create_at(path: &Path) -> Result<DeviceId> {
pub fn get_or_create_gateway() -> Result<DeviceId> {
const ID_PATH: &str = "/var/lib/firezone/gateway_id";
let id = get_or_create_at(Path::new(ID_PATH), GATEWAY_APP_ID)?;
Ok(id)
}
fn get_or_create_at(path: &Path, app_id: &str) -> Result<DeviceId> {
let dir = path
.parent()
.context("Device ID path should always have a parent")?;
@@ -73,14 +88,8 @@ pub fn get_or_create_at(path: &Path) -> Result<DeviceId> {
})?;
// Try to read it from the disk
if let Some(j) = fs::read_to_string(path)
.ok()
.and_then(|s| serde_json::from_str::<DeviceIdJson>(&s).ok())
{
tracing::debug!(id = %j.id, "Loaded device ID from disk");
// Correct permissions for #6989
set_id_permissions(path).context("Couldn't set permissions on Firezone ID file")?;
return Ok(DeviceId { id: j.id });
if let Ok(id) = get_at_or_compute(path, app_id) {
return Ok(id);
}
// Couldn't read, it's missing or invalid, generate a new one and save it.
@@ -96,7 +105,38 @@ pub fn get_or_create_at(path: &Path) -> Result<DeviceId> {
tracing::debug!(%id, "Saved device ID to disk");
set_id_permissions(path).context("Couldn't set permissions on Firezone ID file")?;
Ok(DeviceId { id })
Ok(DeviceId {
id: j.id,
source: Source::Disk,
})
}
/// Reads the device ID from the given path, or if that fails, attempts to compute it from a hardware ID.
fn get_at_or_compute(path: &Path, app_id: &str) -> Result<DeviceId> {
match (get_at(path), compute_from_hardware_id(app_id)) {
(Ok(fs_id), _) => Ok(fs_id),
(Err(_), Ok(derived_id)) => Ok(derived_id),
(Err(fs_err), Err(derive_err)) => {
anyhow::bail!("Failed to read ({fs_err:#}) and derive ({derive_err:#}) device ID")
}
}
}
fn get_at(path: &Path) -> Result<DeviceId> {
let content = fs::read_to_string(path).context("Failed to read file")?;
let j = serde_json::from_str::<DeviceIdJson>(&content)
.context("Failed to deserialize content as JSON")?;
tracing::debug!(id = %j.id, "Loaded device ID from disk");
// Correct permissions for #6989
set_id_permissions(path).context("Couldn't set permissions on Firezone ID file")?;
Ok(DeviceId {
id: j.id,
source: Source::Disk,
})
}
#[cfg(target_os = "linux")]
@@ -132,6 +172,35 @@ fn set_id_permissions(_: &Path) -> Result<()> {
Ok(())
}
#[cfg(target_os = "linux")]
fn compute_from_hardware_id(app_id: &str) -> Result<DeviceId> {
use hmac::Mac;
let machine_id =
fs::read_to_string("/etc/machine-id").context("Failed to read `/etc/machine-id`")?;
let bytes = hmac::Hmac::<sha2::Sha256>::new_from_slice(app_id.as_bytes())
.context("Failed to create HMAC instance")?
.chain_update(&machine_id)
.finalize()
.into_bytes()
.to_vec();
let id = hex::encode(bytes);
tracing::debug!(%id, "Derived device ID from /etc/machine-id");
Ok(DeviceId {
id,
source: Source::HardwareId,
})
}
#[cfg(not(target_os = "linux"))]
fn compute_from_hardware_id(_: &str) -> Result<DeviceId> {
anyhow::bail!("Not implemented")
}
#[derive(serde::Deserialize, serde::Serialize)]
struct DeviceIdJson {
id: String,
@@ -149,8 +218,8 @@ mod tests {
let dir = tempdir().unwrap();
let path = dir.path().join("id.json");
let created_device_id = get_or_create_at(&path).unwrap();
let read_device_id = get_at(&path).unwrap();
let created_device_id = get_or_create_at(&path, CLIENT_APP_ID).unwrap();
let read_device_id = get_at_or_compute(&path, CLIENT_APP_ID).unwrap();
assert_eq!(created_device_id, read_device_id);
}
@@ -168,8 +237,18 @@ mod tests {
.unwrap();
std::fs::write(&path, json).unwrap();
let read_device_id = get_or_create_at(&path).unwrap();
let read_device_id = get_or_create_at(&path, CLIENT_APP_ID).unwrap();
assert_eq!(read_device_id.id, plain_id.to_string());
}
#[test]
#[cfg(target_os = "linux")]
fn compute_device_id_hardware_id() {
let _guard = firezone_logging::test("debug");
let id = compute_from_hardware_id(CLIENT_APP_ID).unwrap();
assert!(!id.id.is_empty())
}
}

View File

@@ -22,7 +22,7 @@ use phoenix_channel::get_user_agent;
use phoenix_channel::PhoenixChannel;
use secrecy::{ExposeSecret, SecretBox, SecretString};
use std::{collections::BTreeSet, fmt, path::Path};
use std::{collections::BTreeSet, fmt};
use std::{path::PathBuf, process::ExitCode};
use std::{sync::Arc, time::Duration};
use tracing_subscriber::layer;
@@ -31,7 +31,6 @@ use url::Url;
mod eventloop;
const ID_PATH: &str = "/var/lib/firezone/gateway_id";
const RELEASE: &str = concat!("gateway@", env!("CARGO_PKG_VERSION"));
fn main() -> ExitCode {
@@ -124,7 +123,7 @@ async fn try_main(cli: Cli, telemetry: &mut Telemetry) -> Result<()> {
};
}
let firezone_id = get_firezone_id(cli.firezone_id.clone()).await
let firezone_id = get_firezone_id(cli.firezone_id.clone())
.context("Couldn't read FIREZONE_ID or write it to disk: Please provide it through the env variable or provide rw access to /var/lib/firezone/")?;
let token = match cli.token.clone() {
@@ -251,20 +250,14 @@ fn tonic_otlp_exporter(
Ok(metric_exporter)
}
async fn get_firezone_id(env_id: Option<String>) -> Result<String> {
fn get_firezone_id(env_id: Option<String>) -> Result<String> {
if let Some(id) = env_id
&& !id.is_empty()
{
return Ok(id);
}
if let Ok(id) = tokio::fs::read_to_string(ID_PATH).await
&& !id.is_empty()
{
return Ok(id);
}
let device_id = device_id::get_or_create_at(Path::new(ID_PATH))?;
let device_id = device_id::get_or_create_gateway()?;
Ok(device_id.id)
}

View File

@@ -85,7 +85,7 @@ fn try_main(
// Get the device ID before starting Tokio, so that all the worker threads will inherit the correct scope.
// Technically this means we can fail to get the device ID on a newly-installed system, since the Tunnel service may not have fully started up when the GUI process reaches this point, but in practice it's unlikely.
let id = firezone_bin_shared::device_id::get().context("Failed to get device ID")?;
let id = firezone_bin_shared::device_id::get_client().context("Failed to get device ID")?;
if cli.is_telemetry_allowed() {
rt.block_on(telemetry.start(

View File

@@ -36,9 +36,11 @@ mod platform {
impl Error {
pub fn user_friendly_msg(&self) -> String {
match self {
Error::UserNotInFirezoneGroup => format!(
"You are not a member of the group `{FIREZONE_CLIENT_GROUP}`. Try `sudo usermod -aG {FIREZONE_CLIENT_GROUP} $USER` and then reboot"
),
Error::UserNotInFirezoneGroup => {
format!(
"You are not a member of the group `{FIREZONE_CLIENT_GROUP}`. If you have just installed Firezone for the first time, you need to reboot your computer for membership changes to take effect."
)
}
Error::Other(e) => format!("Failed to determine group ownership: {e:#}"),
}
}

View File

@@ -113,12 +113,13 @@ async fn ipc_listen(
) -> Result<()> {
// Create the device ID and Tunnel service config dir if needed
// This also gives the GUI a safe place to put the log filter config
let device_id = device_id::get_or_create().context("Failed to read / create device ID")?;
let device_id =
device_id::get_or_create_client().context("Failed to read / create device ID")?;
// Fix up the group of the device ID file and directory so the GUI client can access it.
#[cfg(target_os = "linux")]
{
let path = device_id::path().context("Failed to access device ID path")?;
if device_id.source == device_id::Source::Disk {
let path = device_id::client_path().context("Failed to access device ID path")?;
let group_id = crate::firezone_client_group()
.context("Failed to get `firezone-client` group")?
.gid
@@ -630,7 +631,8 @@ impl<'a> Handler<'a> {
) -> Result<Session> {
let started_at = Instant::now();
let device_id = device_id::get_or_create().context("Failed to get-or-create device ID")?;
let device_id =
device_id::get_or_create_client().context("Failed to get-or-create device ID")?;
let url = LoginUrl::client(
Url::parse(api_url).context("Failed to parse URL")?,
@@ -744,7 +746,8 @@ pub fn run_smoke_test() -> Result<()> {
// Couldn't get the loop to work here yet, so SIGHUP is not implemented
rt.block_on(async {
let device_id = device_id::get_or_create().context("Failed to read / create device ID")?;
let device_id =
device_id::get_or_create_client().context("Failed to read / create device ID")?;
let mut server = ipc::Server::new(SocketId::Tunnel)?;
let _ = Handler::new(
device_id,

View File

@@ -246,7 +246,7 @@ fn try_main() -> Result<()> {
// AKA "Device ID", not the Firezone slug
let firezone_id = match cli.firezone_id.clone() {
Some(id) => id,
None => device_id::get_or_create().context("Could not get `firezone_id` from CLI, could not read it from disk, could not generate it and save it to disk")?.id,
None => device_id::get_or_create_client().context("Could not get `firezone_id` from CLI, could not read it from disk, could not generate it and save it to disk")?.id,
};
let mut telemetry = if cli.is_telemetry_allowed() {