NetworkConfig.hpp 11 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391
  1. /*
  2. * Copyright (c)2013-2020 ZeroTier, Inc.
  3. *
  4. * Use of this software is governed by the Business Source License included
  5. * in the LICENSE.TXT file in the project's root directory.
  6. *
  7. * Change Date: 2024-01-01
  8. *
  9. * On the date above, in accordance with the Business Source License, use
  10. * of this software will be governed by version 2.0 of the Apache License.
  11. */
  12. /****/
  13. #ifndef ZT_NETWORKCONFIG_HPP
  14. #define ZT_NETWORKCONFIG_HPP
  15. #include <cstdint>
  16. #include <cstring>
  17. #include <cstdlib>
  18. #include <vector>
  19. #include <stdexcept>
  20. #include <algorithm>
  21. #include "Constants.hpp"
  22. #include "InetAddress.hpp"
  23. #include "MulticastGroup.hpp"
  24. #include "Address.hpp"
  25. #include "CertificateOfMembership.hpp"
  26. #include "CertificateOfOwnership.hpp"
  27. #include "Capability.hpp"
  28. #include "Tag.hpp"
  29. #include "Dictionary.hpp"
  30. #include "Hashtable.hpp"
  31. #include "Identity.hpp"
  32. #include "Utils.hpp"
  33. #include "Trace.hpp"
  34. #include "TriviallyCopyable.hpp"
  35. namespace ZeroTier {
  36. /**
  37. * Default maximum time delta for COMs, tags, and capabilities
  38. *
  39. * The current value is two hours, providing ample time for a controller to
  40. * experience fail-over, etc.
  41. */
  42. #define ZT_NETWORKCONFIG_DEFAULT_CREDENTIAL_TIME_MAX_MAX_DELTA 7200000ULL
  43. /**
  44. * Default minimum credential TTL and maxDelta for COM timestamps
  45. *
  46. * This is just slightly over three minutes and provides three retries for
  47. * all currently online members to refresh.
  48. */
  49. #define ZT_NETWORKCONFIG_DEFAULT_CREDENTIAL_TIME_MIN_MAX_DELTA 185000ULL
  50. /**
  51. * Flag: enable broadcast
  52. */
  53. #define ZT_NETWORKCONFIG_FLAG_ENABLE_BROADCAST 0x0000000000000002ULL
  54. /**
  55. * Flag: enable IPv6 NDP emulation for certain V6 address patterns
  56. */
  57. #define ZT_NETWORKCONFIG_FLAG_ENABLE_IPV6_NDP_EMULATION 0x0000000000000004ULL
  58. /**
  59. * Flag: result of unrecognized MATCH entries in a rules table: match if set, no-match if clear
  60. */
  61. #define ZT_NETWORKCONFIG_FLAG_RULES_RESULT_OF_UNSUPPORTED_MATCH 0x0000000000000008ULL
  62. /**
  63. * Device can bridge to other Ethernet networks and gets unknown recipient multicasts
  64. */
  65. #define ZT_NETWORKCONFIG_SPECIALIST_TYPE_ACTIVE_BRIDGE 0x0000020000000000ULL
  66. /**
  67. * Device that replicates multicasts
  68. */
  69. #define ZT_NETWORKCONFIG_SPECIALIST_TYPE_MULTICAST_REPLICATOR 0x0000040000000000ULL
  70. /**
  71. * Device that is allowed to remotely debug this network and query other peers for e.g. remote trace data
  72. */
  73. #define ZT_NETWORKCONFIG_SPECIALIST_TYPE_DIAGNOSTICIAN 0x0000080000000000ULL
  74. // Fields for meta-data sent with network config requests
  75. // Protocol version (see Packet.hpp)
  76. #define ZT_NETWORKCONFIG_REQUEST_METADATA_KEY_PROTOCOL_VERSION "pv"
  77. // Software vendor
  78. #define ZT_NETWORKCONFIG_REQUEST_METADATA_KEY_NODE_VENDOR "vend"
  79. // Software major version
  80. #define ZT_NETWORKCONFIG_REQUEST_METADATA_KEY_NODE_MAJOR_VERSION "majv"
  81. // Software minor version
  82. #define ZT_NETWORKCONFIG_REQUEST_METADATA_KEY_NODE_MINOR_VERSION "minv"
  83. // Software revision
  84. #define ZT_NETWORKCONFIG_REQUEST_METADATA_KEY_NODE_REVISION "revv"
  85. // Rules engine revision
  86. #define ZT_NETWORKCONFIG_REQUEST_METADATA_KEY_RULES_ENGINE_REV "revr"
  87. // Maximum number of rules per network this node can accept
  88. #define ZT_NETWORKCONFIG_REQUEST_METADATA_KEY_MAX_NETWORK_RULES "mr"
  89. // Maximum number of capabilities this node can accept
  90. #define ZT_NETWORKCONFIG_REQUEST_METADATA_KEY_MAX_NETWORK_CAPABILITIES "mc"
  91. // Maximum number of rules per capability this node can accept
  92. #define ZT_NETWORKCONFIG_REQUEST_METADATA_KEY_MAX_CAPABILITY_RULES "mcr"
  93. // Maximum number of tags this node can accept
  94. #define ZT_NETWORKCONFIG_REQUEST_METADATA_KEY_MAX_NETWORK_TAGS "mt"
  95. // Network join authorization token (if any)
  96. #define ZT_NETWORKCONFIG_REQUEST_METADATA_KEY_AUTH "a"
  97. // Network configuration meta-data flags
  98. #define ZT_NETWORKCONFIG_REQUEST_METADATA_KEY_FLAGS "f"
  99. // These dictionary keys are short so they don't take up much room.
  100. // By convention we use upper case for binary blobs, but it doesn't really matter.
  101. // network config version
  102. #define ZT_NETWORKCONFIG_DICT_KEY_VERSION "v"
  103. // network ID
  104. #define ZT_NETWORKCONFIG_DICT_KEY_NETWORK_ID "nwid"
  105. // integer(hex)
  106. #define ZT_NETWORKCONFIG_DICT_KEY_TIMESTAMP "ts"
  107. // integer(hex)
  108. #define ZT_NETWORKCONFIG_DICT_KEY_REVISION "r"
  109. // address of member
  110. #define ZT_NETWORKCONFIG_DICT_KEY_ISSUED_TO "id"
  111. // full identity hash of member
  112. #define ZT_NETWORKCONFIG_DICT_KEY_ISSUED_TO_IDENTITY_HASH "IDH"
  113. // flags(hex)
  114. #define ZT_NETWORKCONFIG_DICT_KEY_FLAGS "f"
  115. // integer(hex)
  116. #define ZT_NETWORKCONFIG_DICT_KEY_MULTICAST_LIMIT "ml"
  117. // network type (hex)
  118. #define ZT_NETWORKCONFIG_DICT_KEY_TYPE "t"
  119. // text
  120. #define ZT_NETWORKCONFIG_DICT_KEY_NAME "n"
  121. // network MTU
  122. #define ZT_NETWORKCONFIG_DICT_KEY_MTU "mtu"
  123. // credential time max delta in ms
  124. #define ZT_NETWORKCONFIG_DICT_KEY_CREDENTIAL_TIME_MAX_DELTA "ctmd"
  125. // binary serialized certificate of membership
  126. #define ZT_NETWORKCONFIG_DICT_KEY_COM "C"
  127. // specialists (binary array of uint64_t)
  128. #define ZT_NETWORKCONFIG_DICT_KEY_SPECIALISTS "S"
  129. // routes (binary blob)
  130. #define ZT_NETWORKCONFIG_DICT_KEY_ROUTES "RT"
  131. // static IPs (binary blob)
  132. #define ZT_NETWORKCONFIG_DICT_KEY_STATIC_IPS "I"
  133. // rules (binary blob)
  134. #define ZT_NETWORKCONFIG_DICT_KEY_RULES "R"
  135. // capabilities (binary blobs)
  136. #define ZT_NETWORKCONFIG_DICT_KEY_CAPABILITIES "CAP"
  137. // tags (binary blobs)
  138. #define ZT_NETWORKCONFIG_DICT_KEY_TAGS "TAG"
  139. // tags (binary blobs)
  140. #define ZT_NETWORKCONFIG_DICT_KEY_CERTIFICATES_OF_OWNERSHIP "COO"
  141. /**
  142. * Network configuration received from network controller nodes
  143. *
  144. * This is a memcpy()'able structure and is safe (in a crash sense) to modify
  145. * without locks.
  146. */
  147. struct NetworkConfig : TriviallyCopyable
  148. {
  149. ZT_ALWAYS_INLINE NetworkConfig() noexcept { memoryZero(this); }
  150. /**
  151. * Write this network config to a dictionary for transport
  152. *
  153. * @param d Dictionary
  154. * @param includeLegacy If true, include legacy fields for old node versions
  155. * @return True if dictionary was successfully created, false if e.g. overflow
  156. */
  157. bool toDictionary(Dictionary &d,bool includeLegacy) const;
  158. /**
  159. * Read this network config from a dictionary
  160. *
  161. * @param d Dictionary (non-const since it might be modified during parse, should not be used after call)
  162. * @return True if dictionary was valid and network config successfully initialized
  163. */
  164. bool fromDictionary(const Dictionary &d);
  165. /**
  166. * @return True if broadcast (ff:ff:ff:ff:ff:ff) address should work on this network
  167. */
  168. ZT_ALWAYS_INLINE bool enableBroadcast() const noexcept { return ((this->flags & ZT_NETWORKCONFIG_FLAG_ENABLE_BROADCAST) != 0); }
  169. /**
  170. * @return True if IPv6 NDP emulation should be allowed for certain "magic" IPv6 address patterns
  171. */
  172. ZT_ALWAYS_INLINE bool ndpEmulation() const noexcept { return ((this->flags & ZT_NETWORKCONFIG_FLAG_ENABLE_IPV6_NDP_EMULATION) != 0); }
  173. /**
  174. * @return Network type is public (no access control)
  175. */
  176. ZT_ALWAYS_INLINE bool isPublic() const noexcept { return (this->type == ZT_NETWORK_TYPE_PUBLIC); }
  177. /**
  178. * @return Network type is private (certificate access control)
  179. */
  180. ZT_ALWAYS_INLINE bool isPrivate() const noexcept { return (this->type == ZT_NETWORK_TYPE_PRIVATE); }
  181. /**
  182. * @param fromPeer Peer attempting to bridge other Ethernet peers onto network
  183. * @return True if this network allows bridging
  184. */
  185. ZT_ALWAYS_INLINE bool permitsBridging(const Address &fromPeer) const noexcept
  186. {
  187. for(unsigned int i=0;i<specialistCount;++i) {
  188. if ((fromPeer == specialists[i])&&((specialists[i] & ZT_NETWORKCONFIG_SPECIALIST_TYPE_ACTIVE_BRIDGE) != 0))
  189. return true;
  190. }
  191. return false;
  192. }
  193. ZT_ALWAYS_INLINE operator bool() const noexcept { return (networkId != 0); }
  194. ZT_ALWAYS_INLINE bool operator==(const NetworkConfig &nc) const noexcept { return (memcmp(this,&nc,sizeof(NetworkConfig)) == 0); }
  195. ZT_ALWAYS_INLINE bool operator!=(const NetworkConfig &nc) const noexcept { return (!(*this == nc)); }
  196. /**
  197. * Add a specialist or mask flags if already present
  198. *
  199. * This masks the existing flags if the specialist is already here or adds
  200. * it otherwise.
  201. *
  202. * @param a Address of specialist
  203. * @param f Flags (OR of specialist role/type flags)
  204. * @return True if successfully masked or added
  205. */
  206. bool addSpecialist(const Address &a,uint64_t f) noexcept;
  207. ZT_ALWAYS_INLINE const Capability *capability(const uint32_t id) const
  208. {
  209. for(unsigned int i=0;i<capabilityCount;++i) {
  210. if (capabilities[i].id() == id)
  211. return &(capabilities[i]);
  212. }
  213. return (Capability *)0;
  214. }
  215. ZT_ALWAYS_INLINE const Tag *tag(const uint32_t id) const
  216. {
  217. for(unsigned int i=0;i<tagCount;++i) {
  218. if (tags[i].id() == id)
  219. return &(tags[i]);
  220. }
  221. return (Tag *)0;
  222. }
  223. /**
  224. * Network ID that this configuration applies to
  225. */
  226. uint64_t networkId;
  227. /**
  228. * Controller-side time of config generation/issue
  229. */
  230. int64_t timestamp;
  231. /**
  232. * Max difference between timestamp and tag/capability timestamp
  233. */
  234. int64_t credentialTimeMaxDelta;
  235. /**
  236. * Controller-side revision counter for this configuration
  237. */
  238. uint64_t revision;
  239. /**
  240. * Address of device to which this config is issued
  241. */
  242. Address issuedTo;
  243. /**
  244. * Hash of identity public key(s) of node to whom this is issued
  245. *
  246. * If this field is all zero it is treated as undefined since old controllers
  247. * do not set it.
  248. */
  249. uint8_t issuedToFingerprintHash[ZT_IDENTITY_HASH_SIZE];
  250. /**
  251. * Flags (64-bit)
  252. */
  253. uint64_t flags;
  254. /**
  255. * Network MTU
  256. */
  257. unsigned int mtu;
  258. /**
  259. * Maximum number of recipients per multicast (not including active bridges)
  260. */
  261. unsigned int multicastLimit;
  262. /**
  263. * Number of specialists
  264. */
  265. unsigned int specialistCount;
  266. /**
  267. * Number of routes
  268. */
  269. unsigned int routeCount;
  270. /**
  271. * Number of ZT-managed static IP assignments
  272. */
  273. unsigned int staticIpCount;
  274. /**
  275. * Number of rule table entries
  276. */
  277. unsigned int ruleCount;
  278. /**
  279. * Number of capabilities
  280. */
  281. unsigned int capabilityCount;
  282. /**
  283. * Number of tags
  284. */
  285. unsigned int tagCount;
  286. /**
  287. * Number of certificates of ownership
  288. */
  289. unsigned int certificateOfOwnershipCount;
  290. /**
  291. * Specialist devices
  292. *
  293. * For each entry the least significant 40 bits are the device's ZeroTier
  294. * address and the most significant 24 bits are flags indicating its role.
  295. */
  296. uint64_t specialists[ZT_MAX_NETWORK_SPECIALISTS];
  297. /**
  298. * Statically defined "pushed" routes (including default gateways)
  299. */
  300. ZT_VirtualNetworkRoute routes[ZT_MAX_NETWORK_ROUTES];
  301. /**
  302. * Static IP assignments
  303. */
  304. InetAddress staticIps[ZT_MAX_ZT_ASSIGNED_ADDRESSES];
  305. /**
  306. * Base network rules
  307. */
  308. ZT_VirtualNetworkRule rules[ZT_MAX_NETWORK_RULES];
  309. /**
  310. * Capabilities for this node on this network, in ascending order of capability ID
  311. */
  312. Capability capabilities[ZT_MAX_NETWORK_CAPABILITIES];
  313. /**
  314. * Tags for this node on this network, in ascending order of tag ID
  315. */
  316. Tag tags[ZT_MAX_NETWORK_TAGS];
  317. /**
  318. * Certificates of ownership for this network member
  319. */
  320. CertificateOfOwnership certificatesOfOwnership[ZT_MAX_CERTIFICATES_OF_OWNERSHIP];
  321. /**
  322. * Network type (currently just public or private)
  323. */
  324. ZT_VirtualNetworkType type;
  325. /**
  326. * Network short name or empty string if not defined
  327. */
  328. char name[ZT_MAX_NETWORK_SHORT_NAME_LENGTH + 1];
  329. /**
  330. * Certificate of membership (for private networks)
  331. */
  332. CertificateOfMembership com;
  333. };
  334. } // namespace ZeroTier
  335. #endif