123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258 |
- /*
- * Copyright (c)2013-2020 ZeroTier, Inc.
- *
- * Use of this software is governed by the Business Source License included
- * in the LICENSE.TXT file in the project's root directory.
- *
- * Change Date: 2024-01-01
- *
- * On the date above, in accordance with the Business Source License, use
- * of this software will be governed by version 2.0 of the Apache License.
- */
- /****/
- package zerotier
- import (
- "encoding/base32"
- "encoding/binary"
- "math/rand"
- "net"
- "sync"
- "time"
- "unsafe"
- )
- // LogoChar is the unicode character that is ZeroTier's logo
- const LogoChar = "⏁"
- // Base32StdLowerCase is a base32 encoder/decoder using a lower-case standard alphabet and no padding.
- var Base32StdLowerCase = base32.NewEncoding("abcdefghijklmnopqrstuvwxyz234567").WithPadding(base32.NoPadding)
- // unassignedPrivilegedPorts are ports below 1024 that do not appear to be assigned by IANA.
- // The new 2.0+ ZeroTier default is 793, which we will eventually seek to have assigned. These
- // are searched as backups if this port is already in use on a system.
- var unassignedPrivilegedPorts = []int{
- 4,
- 6,
- 8,
- 10,
- 12,
- 14,
- 15,
- 16,
- 26,
- 28,
- 30,
- 32,
- 34,
- 36,
- 40,
- 60,
- 269, 270, 271, 272, 273, 274, 275, 276, 277, 278, 279,
- 285,
- 288, 289, 290, 291, 292, 293, 294, 295, 296, 297, 298, 299, 300, 301, 302, 303, 304, 305, 306, 307,
- 323, 324, 325, 326, 327, 328, 329, 330, 331, 332,
- 334, 335, 336, 337, 338, 339, 340, 341, 342, 343,
- 703,
- 708,
- 713, 714, 715, 716, 717, 718, 719, 720, 721, 722, 723, 724, 725, 726, 727, 728,
- 732, 733, 734, 735, 736, 737, 738, 739, 740,
- 743,
- 745, 746,
- 755, 756,
- 766,
- 768,
- 778, 779,
- 781, 782, 783, 784, 785, 786, 787, 788, 789, 790, 791, 792, 793, 794, 795, 796, 797, 798, 799,
- 802, 803, 804, 805, 806, 807, 808, 809,
- 811, 812, 813, 814, 815, 816, 817, 818, 819, 820, 821, 822, 823, 824, 825, 826, 827,
- 834, 835, 836, 837, 838, 839, 840, 841, 842, 843, 844, 845, 846,
- 849, 850, 851, 852, 853, 854, 855, 856, 857, 858, 859,
- 862, 863, 864, 865, 866, 867, 868, 869, 870, 871, 872,
- 874, 875, 876, 877, 878, 879, 880, 881, 882, 883, 884, 885,
- 889, 890, 891, 892, 893, 894, 895, 896, 897, 898, 899,
- 904, 905, 906, 907, 908, 909, 910, 911,
- 914, 915, 916, 917, 918, 919, 920, 921, 922, 923, 924, 925, 926, 927, 928, 929, 930, 931, 932, 933, 934, 935, 936, 937, 938, 939, 940, 941, 942, 943, 944, 945, 946, 947, 948, 949, 950, 951, 952, 953, 954, 955, 956, 957, 958, 959, 960, 961, 962, 963, 964, 965, 966, 967, 968, 969, 970, 971, 972, 973, 974, 975, 976, 977, 978, 979, 980, 981, 982, 983, 984, 985, 986, 987, 988,
- 1001, 1002, 1003, 1004, 1005, 1006, 1007, 1008, 1009,
- 1023,
- }
- var prng = rand.NewSource(time.Now().UnixNano())
- var prngLock sync.Mutex
- func randomUInt() uint {
- prngLock.Lock()
- i := prng.Int63()
- prngLock.Unlock()
- return uint(i)
- }
- // TimeMs returns the time in milliseconds since epoch.
- func TimeMs() int64 { return int64(time.Now().UnixNano()) / int64(1000000) }
- // ipNetToKey creates a key that can be used in a map[] from a net.IPNet
- func ipNetToKey(ipn *net.IPNet) (k [3]uint64) {
- copy(((*[16]byte)(unsafe.Pointer(&k[0])))[:], ipn.IP)
- ones, bits := ipn.Mask.Size()
- k[2] = (uint64(ones) << 32) | uint64(bits)
- return
- }
- func allZero(b []byte) bool {
- for _, bb := range b {
- if bb != 0 {
- return false
- }
- }
- return true
- }
- // checkPort does trial binding to a port using both UDP and TCP and returns false if any bindings fail.
- func checkPort(port int) bool {
- var ua net.UDPAddr
- ua.IP = net.IPv6zero
- ua.Port = port
- uc, err := net.ListenUDP("udp6", &ua)
- if uc != nil {
- _ = uc.Close()
- }
- if err != nil {
- return false
- }
- ua.IP = net.IPv4zero
- uc, err = net.ListenUDP("udp4", &ua)
- if uc != nil {
- _ = uc.Close()
- }
- if err != nil {
- return false
- }
- var ta net.TCPAddr
- ta.IP = net.IPv6zero
- ta.Port = port
- tc, err := net.ListenTCP("tcp6", &ta)
- if tc != nil {
- _ = tc.Close()
- }
- if err != nil {
- return false
- }
- ta.IP = net.IPv4zero
- tc, err = net.ListenTCP("tcp4", &ta)
- if tc != nil {
- _ = tc.Close()
- }
- if err != nil {
- return false
- }
- return true
- }
- // The ipClassify code below is based on and should produce identical results to
- // InetAddress::ipScope() in the C++ code.
- const (
- ipClassificationNone = -1
- ipClassificationLoopback = 0
- ipClassificationPseudoprivate = 1
- ipClassificationPrivate = 2
- ipClassificationLinkLocal = 3
- ipClassificationMulticast = 4
- ipClassificationGlobal = 5
- )
- var ipv4PseudoprivatePrefixes = []byte{
- 0x06, // 6.0.0.0/8 (US Army)
- 0x0b, // 11.0.0.0/8 (US DoD)
- 0x15, // 21.0.0.0/8 (US DDN-RVN)
- 0x16, // 22.0.0.0/8 (US DISA)
- 0x19, // 25.0.0.0/8 (UK Ministry of Defense)
- 0x1a, // 26.0.0.0/8 (US DISA)
- 0x1c, // 28.0.0.0/8 (US DSI-North)
- 0x1d, // 29.0.0.0/8 (US DISA)
- 0x1e, // 30.0.0.0/8 (US DISA)
- 0x33, // 51.0.0.0/8 (UK Department of Social Security)
- 0x37, // 55.0.0.0/8 (US DoD)
- 0x38, // 56.0.0.0/8 (US Postal Service)
- }
- // ipClassify determines the official or in a few cases unofficial role of an IP address
- func ipClassify(ip net.IP) int {
- if len(ip) == 16 {
- ip4 := ip.To4()
- if len(ip4) == 4 {
- ip = ip4
- }
- }
- if len(ip) == 4 {
- ip4FirstByte := ip[0]
- for _, b := range ipv4PseudoprivatePrefixes {
- if ip4FirstByte == b {
- return ipClassificationPseudoprivate
- }
- }
- ip4 := binary.BigEndian.Uint32(ip)
- switch ip4FirstByte {
- case 0x0a: // 10.0.0.0/8
- return ipClassificationPrivate
- case 0x64: // 100.64.0.0/10
- if (ip4 & 0xffc00000) == 0x64400000 {
- return ipClassificationPrivate
- }
- case 0x7f: // 127.0.0.1/8
- return ipClassificationLoopback
- case 0xa9: // 169.254.0.0/16
- if (ip4 & 0xffff0000) == 0xa9fe0000 {
- return ipClassificationLinkLocal
- }
- case 0xac: // 172.16.0.0/12
- if (ip4 & 0xfff00000) == 0xac100000 {
- return ipClassificationPrivate
- }
- case 0xc0: // 192.168.0.0/16
- if (ip4 & 0xffff0000) == 0xc0a80000 {
- return ipClassificationPrivate
- }
- }
- switch ip4 >> 28 {
- case 0xe: // 224.0.0.0/4
- return ipClassificationMulticast
- case 0xf: // 240.0.0.0/4 ("reserved," usually unusable)
- return ipClassificationNone
- }
- return ipClassificationGlobal
- }
- if len(ip) == 16 {
- if (ip[0] & 0xf0) == 0xf0 {
- if ip[0] == 0xff { // ff00::/8
- return ipClassificationMulticast
- }
- if ip[0] == 0xfe && (ip[1]&0xc0) == 0x80 {
- if allZero(ip[2:15]) {
- if ip[15] == 0x01 { // fe80::1/128
- return ipClassificationLoopback
- }
- return ipClassificationLinkLocal
- }
- }
- if (ip[0] & 0xfe) == 0xfc { // fc00::/7
- return ipClassificationPrivate
- }
- }
- if allZero(ip[0:15]) {
- if ip[15] == 0x01 { // ::1/128
- return ipClassificationLoopback
- }
- if ip[15] == 0x00 { // ::/128
- return ipClassificationNone
- }
- }
- return ipClassificationGlobal
- }
- return ipClassificationNone
- }
|