Skip to content

microsoft/proxy_wifi

Repository files navigation

Proxy_wifi

This project enables proxying the Wi-Fi functionnality from a Windows host machine to a VM.

It allows the VM to:

  • schedule scans and access the Wi-Fi networks visible by the host
  • request connections and disconnections to WPA2PSK and Open networks that will be honored by the host
  • request connections to any Wi-Fi network the host is currently connected to ("connection mirroring")
  • be notified in case of disconnection and signal quality changes

Networks can be also emulated by proxy_wifi, letting a VM connect to a fake Wi-Fi network.

VM driver

This repository contains only the Windows host component. A driver must run on the VM and communicate with the host component. Such a driver has currently been implemented from Linux only, under the name of proxy_wifi.

Building

Requirements:

The project generates a MSBuild project and solution for each target. These can be used directly by MSBuild tools, Microsoft Visual Studio, or with CMake directly. There are two targets defined:

  1. proxy-wifi: This is a static library containing the core logic.
  2. proxy-wifi-cmdline: This is a commandline utility allowing to test the proxy_wifi for basic scenarios.

Step 1: Configure the project

In the project root:

md build && cd build
cmake ..

Note that the build type is set to DEBUG by default. Make sure to set the CMAKE_BUILD_TYPE variable appropriately for the desired build flavor. For example, to create a release configuration:

cmake -DCMAKE_BUILD_TYPE=RelWithDebInfo ..

Step 2: Build the project

With CMake

cmake --build ..

With Visual Studio

Open proxy-wifi.sln which contains a project for each build target:

  • proxy-wifi
  • proxy-wifi-cmdline
  • ALL_BUILD
  • INSTALL

With Visual Studio Build Tools

Point msbuild.exe to the project to build:

msbuild.exe proxy-wifi.vcxproj

Step 3: Run unit tests

Using the test executable

.\test\Debug\proxy-wifi-test.exe

With CTest

ctest -T test

Basic usage

The public interface of Proxy_wifi is present in ProxyWifiService.hpp. It lets client build a ProxyWifiService object through the function BuildProxyWifiService. This functions allows to configure the transport layer and to register to Proxy_wifi notifications.

You can additionnaly setup a logger to chose where logs will be output.

    // Tell the ProxyWifiService to output logs to a tracelogging provider
    Log::AddLogger(std::make_unique<Log::TraceLoggingLogger>());

    class MyObserver: public ProxyWifiObserver
    {
        Authorization AuthorizeGuestConnectionRequest(OperationType type, const ConnectRequestArgs& connectionInfo) noexcept override
        {
            std::cout << "The guest requested a connection" << std::endl;
            return Authorization::Approve;
        }
    };

    // Must be kept alive until the proxy is destroyed
    auto observer = MyObserver{};

    // Callback providing a list of networks that will be simulated by the Wi-Fi proxy
    auto provideFakeNetworks = [this]() -> std::vector<WifiNetworkInfo> { return {}; /* Return simulated network SSID + BSSID */ };

    auto wifiProxy = BuildProxyWifiService(
        ProxyWifiHyperVSettings{vmId},
        std::move(provideFakeNetworks),
        &observer);
    wifiProxy->Start();

Architecture overview

Proxy_wifi is constituted of a service component (proxy_wifi service) meant to run on a Windows host, and a driver component (proxy_wifi driver) meant to run on a guest virtual machine. This repository contains the implementation of proxy_wifi service for Windows. Currently, an implementation of proxy_wifi driver exists only for Linux.

General architecture

Proxy_wifi driver role is to intercept Wi-Fi control path related operations from the guest and forward them to proxy_wifi service. Communication between proxy_wifi driver and proxy_wifi service relies on two Hyper-V sockets (hvsockets): one allows proxy_wifi driver to make a request to proxy_wifi service and wait for the answer ; the other one allows proxy_wifi service to send spontaneous notifications to proxy_wifi driver.

Proxy_wifi service is a library, its code will be running inside your application process. It uses the Windows Wlan API to perform any Wi-Fi related operation in the host. It can also emulate operations on fake networks if requested by the client application.

Proxy_wifi service present an observer interface (ProxyWifiObserver) that client application should implement to be notified when an operation is request by the guest or a network change is detected on the host. It is expected the client application will monitor these events to synchronize proxy_wifi with other component virtualizing the data path or L3 layer properties.

Proxy_wifi service architecture

Proxy_wifi service architecture

Proxy_wifi is composed of two main layers: the transport (Transport.hpp) and the operation handler (OperationHandler.hpp).

The concrete implementations of ProxyWifiService initialize these two layers and expose a clean API to client applications.

The transport is responsible for communications with the proxy_wifi driver on the guest VM. The operation handler is responsible of honoring these requests and notifying the client application.

Transport layer

The transport layer communicate with the guest proxy_wifi driver over two channels:

  • a request channel: it handles commands from the proxy_wifi driver and their responses, such as connection or scan requests.
  • a notification channel: it handles spontaneous notification from the host, such as network disconnection, signal quality changes and scanned bss updates.

The transport layers deals with Message (Messages.hpp) and isn't aware of their content or structure beside the header + body layout.

Messages coming over the request channel are handled as synchronous transactions: once a request is accepted in Transport::AcceptConnections (Transport.hpp), no other request will be handled until the transaction is completed by sending an answer.

On the other hand, messages sent over the notification channel are handled in a fire and forget fashion: the transport send notification asynchronously through a queue and doesn't expect any answer from proxy_wifi driver.

Two implementations of the transport layers are available: over HV sockets or over TCP sockets. Only the HV socket implementation is supported by the current proxy_wifi driver on the guest. The TCP implementation is mostly available for testing.

The operation handler

The operation handler manage a list of interfaces. It dispatches request received by the transport and aggregate results produced by each interfaces. It is also responsible to send notification both to proxy_wifi driver on the guest and to the client application.

The operation handler uses typed requests and responses, parsed from the Messages used by the transport (Messages.hpp). Interface management, requests processing and notifications targetting the guest are serialized through a work queue (m_serializedRunner).

Another work queue (m_clientNotificationQueue) serialize notifications sent to the client application.

The operation handler maintain a list of WlanInterface (WlanInterface.hpp) that represent actual Wi-Fi interfaces on the host or fake interfaces to simulate networks.

Requests are dispatched to interfaces, either serialized or running concurrently depending on the operation type.

In particular:

  • "Scan" operations are ran on all available interfaces concurrently, and the scan results are aggregated
  • "Connect" operations are ran successively on each interface until one succeeds
  • "Disconnect" operations target only the previously connected interface

Each interface handles the command depending on its concrete implementation, using simulated data or fowarding the operation through the host Wlan API.

Simulated interface

If the client application provide a FakeNetworkProvider callback when instantiating proxy_wifi service, a simulated (or "fake" interface will be created). It allows to simulate Wi-Fi networks in the guest.

At any point in time, the simulated interface consider that all networks returned by the FakeNetworkProvider callback are visible and connected. Connection and disconnection request to these networks will always succeed as long as they are returned by the callback and they will correspond to no-op.

The simulated interface is always considered first when dispatching operations, effectively giving it priority.

Real interfaces

Real interfaces correspond to the actual wlan STA interfaces on the host. Proxy_wifi service add and remove these interfaces dynamically following their state on the system.

Operation on real interfaces are implemented through calls to the Win32 Wlan APIs. However, the operations requested from the guest are not mapped directly to the equivalent host operation, since those operation can be time-consuming or impact the host network connectivity.

In particular:

  • a host interface will be connected at the guest request only if no other interface was already connected to the requested network.
  • a host interface will be disconnected at the guest request only if it was connected because of the guest.
  • a host interface will always schedule a scan on the host at the guest request, but will return cached results immediately, unless a previous scan request still hasn't completed. Whenever a scan completes on the host, the visible network are spontaneously sent to the guest to limit the number of scan necessary.

Capabilities and limitations

Proxy_wifi currently fully support connections from the guest to WPA2PSK and Open networks only. This is due to Linux allowing only these two authentication algorithms to be offloaded to the driver.

In addition, Proxy_wifi allows the guest VM to "mirror" a connection on the host, for any network type. Since the host is already connected, no authentication is actually needed, which make the operation straighforward. However, in order to allow this, the authentication algorithm for any non-supported network is faked in scan results and showed as WPA2-PSK.

Contributing

This project welcomes contributions and suggestions. Most contributions require you to agree to a Contributor License Agreement (CLA) declaring that you have the right to, and actually do, grant us the rights to use your contribution. For details, visit https://cla.opensource.microsoft.com.

When you submit a pull request, a CLA bot will automatically determine whether you need to provide a CLA and decorate the PR appropriately (e.g., status check, comment). Simply follow the instructions provided by the bot. You will only need to do this once across all repos using our CLA.

This project has adopted the Microsoft Open Source Code of Conduct. For more information see the Code of Conduct FAQ or contact [email protected] with any additional questions or comments.

Data Collection

The software may collect information about you and your use of the software and send it to Microsoft. Microsoft may use this information to provide services and improve our products and services. You may turn off the telemetry by setting the CMake cache variable MICROSOFT_TELEMETRY to OFF:

cmake -DMICROSOFT_TELEMETRY=OFF ..

There are also some features in the software that may enable you and Microsoft to collect data from users of your applications. If you use these features, you must comply with applicable law, including providing appropriate notices to users of your applications together with a copy of Microsoft’s privacy statement. Our privacy statement is located at https://go.microsoft.com/fwlink/?LinkID=824704. You can learn more about data collection and use in the help documentation and our privacy statement. Your use of the software operates as your consent to these practices.

Trademarks

This project may contain trademarks or logos for projects, products, or services. Authorized use of Microsoft trademarks or logos is subject to and must follow Microsoft's Trademark & Brand Guidelines. Use of Microsoft trademarks or logos in modified versions of this project must not cause confusion or imply Microsoft sponsorship. Any use of third-party trademarks or logos are subject to those third-party's policies.

About

Windows host component to virtualize Wi-Fi in Linux VMs

Resources

License

Code of conduct

Security policy

Stars

Watchers

Forks

Packages

No packages published