CertificateOfMembership.hpp 11 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373
  1. /*
  2. * ZeroTier One - Network Virtualization Everywhere
  3. * Copyright (C) 2011-2018 ZeroTier, Inc. https://www.zerotier.com/
  4. *
  5. * This program is free software: you can redistribute it and/or modify
  6. * it under the terms of the GNU General Public License as published by
  7. * the Free Software Foundation, either version 3 of the License, or
  8. * (at your option) any later version.
  9. *
  10. * This program is distributed in the hope that it will be useful,
  11. * but WITHOUT ANY WARRANTY; without even the implied warranty of
  12. * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
  13. * GNU General Public License for more details.
  14. *
  15. * You should have received a copy of the GNU General Public License
  16. * along with this program. If not, see <http://www.gnu.org/licenses/>.
  17. *
  18. * --
  19. *
  20. * You can be released from the requirements of the license by purchasing
  21. * a commercial license. Buying such a license is mandatory as soon as you
  22. * develop commercial closed-source software that incorporates or links
  23. * directly against ZeroTier software without disclosing the source code
  24. * of your own application.
  25. */
  26. #ifndef ZT_CERTIFICATEOFMEMBERSHIP_HPP
  27. #define ZT_CERTIFICATEOFMEMBERSHIP_HPP
  28. #include <stdint.h>
  29. #include <string.h>
  30. #include <string>
  31. #include <stdexcept>
  32. #include <algorithm>
  33. #include "Constants.hpp"
  34. #include "Credential.hpp"
  35. #include "Buffer.hpp"
  36. #include "Address.hpp"
  37. #include "C25519.hpp"
  38. #include "Identity.hpp"
  39. #include "Utils.hpp"
  40. /**
  41. * Maximum number of qualifiers allowed in a COM (absolute max: 65535)
  42. */
  43. #define ZT_NETWORK_COM_MAX_QUALIFIERS 8
  44. namespace ZeroTier {
  45. class RuntimeEnvironment;
  46. /**
  47. * Certificate of network membership
  48. *
  49. * The COM contains a sorted set of three-element tuples called qualifiers.
  50. * These contain an id, a value, and a maximum delta.
  51. *
  52. * The ID is arbitrary and should be assigned using a scheme that makes
  53. * every ID globally unique. IDs beneath 65536 are reserved for global
  54. * assignment by ZeroTier Networks.
  55. *
  56. * The value's meaning is ID-specific and isn't important here. What's
  57. * important is the value and the third member of the tuple: the maximum
  58. * delta. The maximum delta is the maximum difference permitted between
  59. * values for a given ID between certificates for the two certificates to
  60. * themselves agree.
  61. *
  62. * Network membership is checked by checking whether a peer's certificate
  63. * agrees with your own. The timestamp provides the fundamental criterion--
  64. * each member of a private network must constantly obtain new certificates
  65. * often enough to stay within the max delta for this qualifier. But other
  66. * criteria could be added in the future for very special behaviors, things
  67. * like latitude and longitude for instance.
  68. *
  69. * This is a memcpy()'able structure and is safe (in a crash sense) to modify
  70. * without locks.
  71. */
  72. class CertificateOfMembership : public Credential
  73. {
  74. public:
  75. static inline Credential::Type credentialType() { return Credential::CREDENTIAL_TYPE_COM; }
  76. /**
  77. * Reserved qualifier IDs
  78. *
  79. * IDs below 1024 are reserved for use as standard IDs. Others are available
  80. * for user-defined use.
  81. *
  82. * Addition of new required fields requires that code in hasRequiredFields
  83. * be updated as well.
  84. */
  85. enum ReservedId
  86. {
  87. /**
  88. * Timestamp of certificate
  89. */
  90. COM_RESERVED_ID_TIMESTAMP = 0,
  91. /**
  92. * Network ID for which certificate was issued
  93. */
  94. COM_RESERVED_ID_NETWORK_ID = 1,
  95. /**
  96. * ZeroTier address to whom certificate was issued
  97. */
  98. COM_RESERVED_ID_ISSUED_TO = 2
  99. };
  100. /**
  101. * Create an empty certificate of membership
  102. */
  103. CertificateOfMembership()
  104. {
  105. memset(this,0,sizeof(CertificateOfMembership));
  106. }
  107. CertificateOfMembership(const CertificateOfMembership &c)
  108. {
  109. ZT_FAST_MEMCPY(this,&c,sizeof(CertificateOfMembership));
  110. }
  111. /**
  112. * Create from required fields common to all networks
  113. *
  114. * @param timestamp Timestamp of certificate
  115. * @param timestampMaxDelta Maximum variation between timestamps on this net
  116. * @param nwid Network ID
  117. * @param issuedTo Certificate recipient
  118. */
  119. CertificateOfMembership(uint64_t timestamp,uint64_t timestampMaxDelta,uint64_t nwid,const Address &issuedTo)
  120. {
  121. _qualifiers[0].id = COM_RESERVED_ID_TIMESTAMP;
  122. _qualifiers[0].value = timestamp;
  123. _qualifiers[0].maxDelta = timestampMaxDelta;
  124. _qualifiers[1].id = COM_RESERVED_ID_NETWORK_ID;
  125. _qualifiers[1].value = nwid;
  126. _qualifiers[1].maxDelta = 0;
  127. _qualifiers[2].id = COM_RESERVED_ID_ISSUED_TO;
  128. _qualifiers[2].value = issuedTo.toInt();
  129. _qualifiers[2].maxDelta = 0xffffffffffffffffULL;
  130. _qualifierCount = 3;
  131. memset(_signature.data,0,ZT_C25519_SIGNATURE_LEN);
  132. }
  133. inline CertificateOfMembership &operator=(const CertificateOfMembership &c)
  134. {
  135. ZT_FAST_MEMCPY(this,&c,sizeof(CertificateOfMembership));
  136. return *this;
  137. }
  138. /**
  139. * Create from binary-serialized COM in buffer
  140. *
  141. * @param b Buffer to deserialize from
  142. * @param startAt Position to start in buffer
  143. */
  144. template<unsigned int C>
  145. CertificateOfMembership(const Buffer<C> &b,unsigned int startAt = 0)
  146. {
  147. deserialize(b,startAt);
  148. }
  149. /**
  150. * @return True if there's something here
  151. */
  152. inline operator bool() const { return (_qualifierCount != 0); }
  153. /**
  154. * @return Credential ID, always 0 for COMs
  155. */
  156. inline uint32_t id() const { return 0; }
  157. /**
  158. * @return Timestamp for this cert and maximum delta for timestamp
  159. */
  160. inline int64_t timestamp() const
  161. {
  162. for(unsigned int i=0;i<_qualifierCount;++i) {
  163. if (_qualifiers[i].id == COM_RESERVED_ID_TIMESTAMP)
  164. return _qualifiers[i].value;
  165. }
  166. return 0;
  167. }
  168. /**
  169. * @return Address to which this cert was issued
  170. */
  171. inline Address issuedTo() const
  172. {
  173. for(unsigned int i=0;i<_qualifierCount;++i) {
  174. if (_qualifiers[i].id == COM_RESERVED_ID_ISSUED_TO)
  175. return Address(_qualifiers[i].value);
  176. }
  177. return Address();
  178. }
  179. /**
  180. * @return Network ID for which this cert was issued
  181. */
  182. inline uint64_t networkId() const
  183. {
  184. for(unsigned int i=0;i<_qualifierCount;++i) {
  185. if (_qualifiers[i].id == COM_RESERVED_ID_NETWORK_ID)
  186. return _qualifiers[i].value;
  187. }
  188. return 0ULL;
  189. }
  190. /**
  191. * Add or update a qualifier in this certificate
  192. *
  193. * Any signature is invalidated and signedBy is set to null.
  194. *
  195. * @param id Qualifier ID
  196. * @param value Qualifier value
  197. * @param maxDelta Qualifier maximum allowed difference (absolute value of difference)
  198. */
  199. void setQualifier(uint64_t id,uint64_t value,uint64_t maxDelta);
  200. inline void setQualifier(ReservedId id,uint64_t value,uint64_t maxDelta) { setQualifier((uint64_t)id,value,maxDelta); }
  201. #ifdef ZT_SUPPORT_OLD_STYLE_NETCONF
  202. /**
  203. * @return String-serialized representation of this certificate
  204. */
  205. std::string toString() const;
  206. /**
  207. * Set this certificate equal to the hex-serialized string
  208. *
  209. * Invalid strings will result in invalid or undefined certificate
  210. * contents. These will subsequently fail validation and comparison.
  211. * Empty strings will result in an empty certificate.
  212. *
  213. * @param s String to deserialize
  214. */
  215. void fromString(const char *s);
  216. #endif // ZT_SUPPORT_OLD_STYLE_NETCONF
  217. /**
  218. * Compare two certificates for parameter agreement
  219. *
  220. * This compares this certificate with the other and returns true if all
  221. * paramters in this cert are present in the other and if they agree to
  222. * within this cert's max delta value for each given parameter.
  223. *
  224. * Tuples present in other but not in this cert are ignored, but any
  225. * tuples present in this cert but not in other result in 'false'.
  226. *
  227. * @param other Cert to compare with
  228. * @return True if certs agree and 'other' may be communicated with
  229. */
  230. bool agreesWith(const CertificateOfMembership &other) const;
  231. /**
  232. * Sign this certificate
  233. *
  234. * @param with Identity to sign with, must include private key
  235. * @return True if signature was successful
  236. */
  237. bool sign(const Identity &with);
  238. /**
  239. * Verify this COM and its signature
  240. *
  241. * @param RR Runtime environment for looking up peers
  242. * @param tPtr Thread pointer to be handed through to any callbacks called as a result of this call
  243. * @return 0 == OK, 1 == waiting for WHOIS, -1 == BAD signature or credential
  244. */
  245. int verify(const RuntimeEnvironment *RR,void *tPtr) const;
  246. /**
  247. * @return True if signed
  248. */
  249. inline bool isSigned() const { return (_signedBy); }
  250. /**
  251. * @return Address that signed this certificate or null address if none
  252. */
  253. inline const Address &signedBy() const { return _signedBy; }
  254. template<unsigned int C>
  255. inline void serialize(Buffer<C> &b) const
  256. {
  257. b.append((uint8_t)1);
  258. b.append((uint16_t)_qualifierCount);
  259. for(unsigned int i=0;i<_qualifierCount;++i) {
  260. b.append(_qualifiers[i].id);
  261. b.append(_qualifiers[i].value);
  262. b.append(_qualifiers[i].maxDelta);
  263. }
  264. _signedBy.appendTo(b);
  265. if (_signedBy)
  266. b.append(_signature.data,ZT_C25519_SIGNATURE_LEN);
  267. }
  268. template<unsigned int C>
  269. inline unsigned int deserialize(const Buffer<C> &b,unsigned int startAt = 0)
  270. {
  271. unsigned int p = startAt;
  272. _qualifierCount = 0;
  273. _signedBy.zero();
  274. if (b[p++] != 1)
  275. throw ZT_EXCEPTION_INVALID_SERIALIZED_DATA_INVALID_TYPE;
  276. unsigned int numq = b.template at<uint16_t>(p); p += sizeof(uint16_t);
  277. uint64_t lastId = 0;
  278. for(unsigned int i=0;i<numq;++i) {
  279. const uint64_t qid = b.template at<uint64_t>(p);
  280. if (qid < lastId)
  281. throw ZT_EXCEPTION_INVALID_SERIALIZED_DATA_BAD_ENCODING;
  282. else lastId = qid;
  283. if (_qualifierCount < ZT_NETWORK_COM_MAX_QUALIFIERS) {
  284. _qualifiers[_qualifierCount].id = qid;
  285. _qualifiers[_qualifierCount].value = b.template at<uint64_t>(p + 8);
  286. _qualifiers[_qualifierCount].maxDelta = b.template at<uint64_t>(p + 16);
  287. p += 24;
  288. ++_qualifierCount;
  289. } else {
  290. throw ZT_EXCEPTION_INVALID_SERIALIZED_DATA_OVERFLOW;
  291. }
  292. }
  293. _signedBy.setTo(b.field(p,ZT_ADDRESS_LENGTH),ZT_ADDRESS_LENGTH);
  294. p += ZT_ADDRESS_LENGTH;
  295. if (_signedBy) {
  296. ZT_FAST_MEMCPY(_signature.data,b.field(p,ZT_C25519_SIGNATURE_LEN),ZT_C25519_SIGNATURE_LEN);
  297. p += ZT_C25519_SIGNATURE_LEN;
  298. }
  299. return (p - startAt);
  300. }
  301. inline bool operator==(const CertificateOfMembership &c) const
  302. {
  303. if (_signedBy != c._signedBy)
  304. return false;
  305. if (_qualifierCount != c._qualifierCount)
  306. return false;
  307. for(unsigned int i=0;i<_qualifierCount;++i) {
  308. const _Qualifier &a = _qualifiers[i];
  309. const _Qualifier &b = c._qualifiers[i];
  310. if ((a.id != b.id)||(a.value != b.value)||(a.maxDelta != b.maxDelta))
  311. return false;
  312. }
  313. return (memcmp(_signature.data,c._signature.data,ZT_C25519_SIGNATURE_LEN) == 0);
  314. }
  315. inline bool operator!=(const CertificateOfMembership &c) const { return (!(*this == c)); }
  316. private:
  317. struct _Qualifier
  318. {
  319. _Qualifier() : id(0),value(0),maxDelta(0) {}
  320. uint64_t id;
  321. uint64_t value;
  322. uint64_t maxDelta;
  323. inline bool operator<(const _Qualifier &q) const { return (id < q.id); } // sort order
  324. };
  325. Address _signedBy;
  326. _Qualifier _qualifiers[ZT_NETWORK_COM_MAX_QUALIFIERS];
  327. unsigned int _qualifierCount;
  328. C25519::Signature _signature;
  329. };
  330. } // namespace ZeroTier
  331. #endif