CertificateOfMembership.hpp 11 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372
  1. /*
  2. * ZeroTier One - Network Virtualization Everywhere
  3. * Copyright (C) 2011-2019 ZeroTier, Inc. https://www.zerotier.com/
  4. *
  5. * This program is free software: you can redistribute it and/or modify
  6. * it under the terms of the GNU General Public License as published by
  7. * the Free Software Foundation, either version 3 of the License, or
  8. * (at your option) any later version.
  9. *
  10. * This program is distributed in the hope that it will be useful,
  11. * but WITHOUT ANY WARRANTY; without even the implied warranty of
  12. * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
  13. * GNU General Public License for more details.
  14. *
  15. * You should have received a copy of the GNU General Public License
  16. * along with this program. If not, see <http://www.gnu.org/licenses/>.
  17. *
  18. * --
  19. *
  20. * You can be released from the requirements of the license by purchasing
  21. * a commercial license. Buying such a license is mandatory as soon as you
  22. * develop commercial closed-source software that incorporates or links
  23. * directly against ZeroTier software without disclosing the source code
  24. * of your own application.
  25. */
  26. #ifndef ZT_CERTIFICATEOFMEMBERSHIP_HPP
  27. #define ZT_CERTIFICATEOFMEMBERSHIP_HPP
  28. #include <stdint.h>
  29. #include <string.h>
  30. #include <string>
  31. #include <stdexcept>
  32. #include <algorithm>
  33. #include "Constants.hpp"
  34. #include "Credential.hpp"
  35. #include "Buffer.hpp"
  36. #include "Address.hpp"
  37. #include "C25519.hpp"
  38. #include "Identity.hpp"
  39. #include "Utils.hpp"
  40. /**
  41. * Maximum number of qualifiers allowed in a COM (absolute max: 65535)
  42. */
  43. #define ZT_NETWORK_COM_MAX_QUALIFIERS 8
  44. namespace ZeroTier {
  45. class RuntimeEnvironment;
  46. /**
  47. * Certificate of network membership
  48. *
  49. * The COM contains a sorted set of three-element tuples called qualifiers.
  50. * These contain an id, a value, and a maximum delta.
  51. *
  52. * The ID is arbitrary and should be assigned using a scheme that makes
  53. * every ID globally unique. IDs beneath 65536 are reserved for global
  54. * assignment by ZeroTier Networks.
  55. *
  56. * The value's meaning is ID-specific and isn't important here. What's
  57. * important is the value and the third member of the tuple: the maximum
  58. * delta. The maximum delta is the maximum difference permitted between
  59. * values for a given ID between certificates for the two certificates to
  60. * themselves agree.
  61. *
  62. * Network membership is checked by checking whether a peer's certificate
  63. * agrees with your own. The timestamp provides the fundamental criterion--
  64. * each member of a private network must constantly obtain new certificates
  65. * often enough to stay within the max delta for this qualifier. But other
  66. * criteria could be added in the future for very special behaviors, things
  67. * like latitude and longitude for instance.
  68. *
  69. * This is a memcpy()'able structure and is safe (in a crash sense) to modify
  70. * without locks.
  71. */
  72. class CertificateOfMembership : public Credential
  73. {
  74. public:
  75. static inline Credential::Type credentialType() { return Credential::CREDENTIAL_TYPE_COM; }
  76. /**
  77. * Reserved qualifier IDs
  78. *
  79. * IDs below 1024 are reserved for use as standard IDs. Others are available
  80. * for user-defined use.
  81. *
  82. * Addition of new required fields requires that code in hasRequiredFields
  83. * be updated as well.
  84. */
  85. enum ReservedId
  86. {
  87. /**
  88. * Timestamp of certificate
  89. */
  90. COM_RESERVED_ID_TIMESTAMP = 0,
  91. /**
  92. * Network ID for which certificate was issued
  93. */
  94. COM_RESERVED_ID_NETWORK_ID = 1,
  95. /**
  96. * ZeroTier address to whom certificate was issued
  97. */
  98. COM_RESERVED_ID_ISSUED_TO = 2
  99. };
  100. /**
  101. * Create an empty certificate of membership
  102. */
  103. CertificateOfMembership() :
  104. _qualifierCount(0),
  105. _signatureLength(0) {}
  106. /**
  107. * Create from required fields common to all networks
  108. *
  109. * @param timestamp Timestamp of certificate
  110. * @param timestampMaxDelta Maximum variation between timestamps on this net
  111. * @param nwid Network ID
  112. * @param issuedTo Certificate recipient
  113. */
  114. CertificateOfMembership(uint64_t timestamp,uint64_t timestampMaxDelta,uint64_t nwid,const Address &issuedTo)
  115. {
  116. _qualifiers[0].id = COM_RESERVED_ID_TIMESTAMP;
  117. _qualifiers[0].value = timestamp;
  118. _qualifiers[0].maxDelta = timestampMaxDelta;
  119. _qualifiers[1].id = COM_RESERVED_ID_NETWORK_ID;
  120. _qualifiers[1].value = nwid;
  121. _qualifiers[1].maxDelta = 0;
  122. _qualifiers[2].id = COM_RESERVED_ID_ISSUED_TO;
  123. _qualifiers[2].value = issuedTo.toInt();
  124. _qualifiers[2].maxDelta = 0xffffffffffffffffULL;
  125. _qualifierCount = 3;
  126. _signatureLength = 0;
  127. }
  128. /**
  129. * Create from binary-serialized COM in buffer
  130. *
  131. * @param b Buffer to deserialize from
  132. * @param startAt Position to start in buffer
  133. */
  134. template<unsigned int C>
  135. CertificateOfMembership(const Buffer<C> &b,unsigned int startAt = 0)
  136. {
  137. deserialize(b,startAt);
  138. }
  139. /**
  140. * @return True if there's something here
  141. */
  142. inline operator bool() const { return (_qualifierCount != 0); }
  143. /**
  144. * @return Credential ID, always 0 for COMs
  145. */
  146. inline uint32_t id() const { return 0; }
  147. /**
  148. * @return Timestamp for this cert and maximum delta for timestamp
  149. */
  150. inline int64_t timestamp() const
  151. {
  152. for(unsigned int i=0;i<_qualifierCount;++i) {
  153. if (_qualifiers[i].id == COM_RESERVED_ID_TIMESTAMP)
  154. return _qualifiers[i].value;
  155. }
  156. return 0;
  157. }
  158. /**
  159. * @return Address to which this cert was issued
  160. */
  161. inline Address issuedTo() const
  162. {
  163. for(unsigned int i=0;i<_qualifierCount;++i) {
  164. if (_qualifiers[i].id == COM_RESERVED_ID_ISSUED_TO)
  165. return Address(_qualifiers[i].value);
  166. }
  167. return Address();
  168. }
  169. /**
  170. * @return Network ID for which this cert was issued
  171. */
  172. inline uint64_t networkId() const
  173. {
  174. for(unsigned int i=0;i<_qualifierCount;++i) {
  175. if (_qualifiers[i].id == COM_RESERVED_ID_NETWORK_ID)
  176. return _qualifiers[i].value;
  177. }
  178. return 0ULL;
  179. }
  180. /**
  181. * Add or update a qualifier in this certificate
  182. *
  183. * Any signature is invalidated and signedBy is set to null.
  184. *
  185. * @param id Qualifier ID
  186. * @param value Qualifier value
  187. * @param maxDelta Qualifier maximum allowed difference (absolute value of difference)
  188. */
  189. void setQualifier(uint64_t id,uint64_t value,uint64_t maxDelta);
  190. inline void setQualifier(ReservedId id,uint64_t value,uint64_t maxDelta) { setQualifier((uint64_t)id,value,maxDelta); }
  191. #ifdef ZT_SUPPORT_OLD_STYLE_NETCONF
  192. /**
  193. * @return String-serialized representation of this certificate
  194. */
  195. std::string toString() const;
  196. /**
  197. * Set this certificate equal to the hex-serialized string
  198. *
  199. * Invalid strings will result in invalid or undefined certificate
  200. * contents. These will subsequently fail validation and comparison.
  201. * Empty strings will result in an empty certificate.
  202. *
  203. * @param s String to deserialize
  204. */
  205. void fromString(const char *s);
  206. #endif // ZT_SUPPORT_OLD_STYLE_NETCONF
  207. /**
  208. * Compare two certificates for parameter agreement
  209. *
  210. * This compares this certificate with the other and returns true if all
  211. * parameters in this cert are present in the other and if they agree to
  212. * within this cert's max delta value for each given parameter.
  213. *
  214. * Tuples present in other but not in this cert are ignored, but any
  215. * tuples present in this cert but not in other result in 'false'.
  216. *
  217. * @param other Cert to compare with
  218. * @return True if certs agree and 'other' may be communicated with
  219. */
  220. bool agreesWith(const CertificateOfMembership &other) const;
  221. /**
  222. * Sign this certificate
  223. *
  224. * @param with Identity to sign with, must include private key
  225. * @return True if signature was successful
  226. */
  227. bool sign(const Identity &with);
  228. /**
  229. * Verify this COM and its signature
  230. *
  231. * @param RR Runtime environment for looking up peers
  232. * @param tPtr Thread pointer to be handed through to any callbacks called as a result of this call
  233. * @return 0 == OK, 1 == waiting for WHOIS, -1 == BAD signature or credential
  234. */
  235. int verify(const RuntimeEnvironment *RR,void *tPtr) const;
  236. /**
  237. * @return True if signed
  238. */
  239. inline bool isSigned() const { return (_signedBy); }
  240. /**
  241. * @return Address that signed this certificate or null address if none
  242. */
  243. inline const Address &signedBy() const { return _signedBy; }
  244. template<unsigned int C>
  245. inline void serialize(Buffer<C> &b) const
  246. {
  247. b.append((uint8_t)1);
  248. b.append((uint16_t)_qualifierCount);
  249. for(unsigned int i=0;i<_qualifierCount;++i) {
  250. b.append(_qualifiers[i].id);
  251. b.append(_qualifiers[i].value);
  252. b.append(_qualifiers[i].maxDelta);
  253. }
  254. _signedBy.appendTo(b);
  255. if ((_signedBy)&&(_signatureLength == 96)) {
  256. // UGLY: Ed25519 signatures in ZT are 96 bytes (64 + 32 bytes of hash).
  257. // P-384 signatures are also 96 bytes, praise the horned one. That means
  258. // we don't need to include a length. If we ever do we will need a new
  259. // serialized object version, but only for those with length != 96.
  260. b.append(_signature,96);
  261. }
  262. }
  263. template<unsigned int C>
  264. inline unsigned int deserialize(const Buffer<C> &b,unsigned int startAt = 0)
  265. {
  266. unsigned int p = startAt;
  267. _signedBy.zero();
  268. _qualifierCount = 0;
  269. _signatureLength = 0;
  270. if (b[p++] != 1)
  271. throw ZT_EXCEPTION_INVALID_SERIALIZED_DATA_INVALID_TYPE;
  272. unsigned int numq = b.template at<uint16_t>(p); p += sizeof(uint16_t);
  273. uint64_t lastId = 0;
  274. for(unsigned int i=0;i<numq;++i) {
  275. const uint64_t qid = b.template at<uint64_t>(p);
  276. if (qid < lastId)
  277. throw ZT_EXCEPTION_INVALID_SERIALIZED_DATA_BAD_ENCODING;
  278. else lastId = qid;
  279. if (_qualifierCount < ZT_NETWORK_COM_MAX_QUALIFIERS) {
  280. _qualifiers[_qualifierCount].id = qid;
  281. _qualifiers[_qualifierCount].value = b.template at<uint64_t>(p + 8);
  282. _qualifiers[_qualifierCount].maxDelta = b.template at<uint64_t>(p + 16);
  283. p += 24;
  284. ++_qualifierCount;
  285. } else {
  286. throw ZT_EXCEPTION_INVALID_SERIALIZED_DATA_OVERFLOW;
  287. }
  288. }
  289. _signedBy.setTo(b.field(p,ZT_ADDRESS_LENGTH),ZT_ADDRESS_LENGTH);
  290. p += ZT_ADDRESS_LENGTH;
  291. if (_signedBy) {
  292. // See "UGLY" comment in serialize()...
  293. _signatureLength = 96;
  294. memcpy(_signature,b.field(p,96),96);
  295. p += 96;
  296. }
  297. return (p - startAt);
  298. }
  299. inline bool operator==(const CertificateOfMembership &c) const
  300. {
  301. if (_signedBy != c._signedBy)
  302. return false;
  303. if (_qualifierCount != c._qualifierCount)
  304. return false;
  305. if (_signatureLength != c._signatureLength)
  306. return false;
  307. for(unsigned int i=0;i<_qualifierCount;++i) {
  308. const _Qualifier &a = _qualifiers[i];
  309. const _Qualifier &b = c._qualifiers[i];
  310. if ((a.id != b.id)||(a.value != b.value)||(a.maxDelta != b.maxDelta))
  311. return false;
  312. }
  313. return (memcmp(_signature,c._signature,_signatureLength) == 0);
  314. }
  315. inline bool operator!=(const CertificateOfMembership &c) const { return (!(*this == c)); }
  316. private:
  317. struct _Qualifier
  318. {
  319. _Qualifier() : id(0),value(0),maxDelta(0) {}
  320. uint64_t id;
  321. uint64_t value;
  322. uint64_t maxDelta;
  323. inline bool operator<(const _Qualifier &q) const { return (id < q.id); } // sort order
  324. };
  325. Address _signedBy;
  326. _Qualifier _qualifiers[ZT_NETWORK_COM_MAX_QUALIFIERS];
  327. unsigned int _qualifierCount;
  328. unsigned int _signatureLength;
  329. uint8_t _signature[ZT_SIGNATURE_BUFFER_SIZE];
  330. };
  331. } // namespace ZeroTier
  332. #endif