123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166 |
- /*
- * ZeroTier One - Network Virtualization Everywhere
- * Copyright (C) 2011-2015 ZeroTier, Inc.
- *
- * This program is free software: you can redistribute it and/or modify
- * it under the terms of the GNU General Public License as published by
- * the Free Software Foundation, either version 3 of the License, or
- * (at your option) any later version.
- *
- * This program is distributed in the hope that it will be useful,
- * but WITHOUT ANY WARRANTY; without even the implied warranty of
- * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
- * GNU General Public License for more details.
- *
- * You should have received a copy of the GNU General Public License
- * along with this program. If not, see <http://www.gnu.org/licenses/>.
- *
- * --
- *
- * ZeroTier may be used and distributed under the terms of the GPLv3, which
- * are available at: http://www.gnu.org/licenses/gpl-3.0.html
- *
- * If you would like to embed ZeroTier into a commercial application or
- * redistribute it in a modified binary form, please contact ZeroTier Networks
- * LLC. Start here: http://www.zerotier.com/
- */
- #ifndef ZT_PATH_HPP
- #define ZT_PATH_HPP
- #include "Constants.hpp"
- #include "InetAddress.hpp"
- #include "Utils.hpp"
- namespace ZeroTier {
- /**
- * Base class for paths
- *
- * The base Path class is an immutable value.
- */
- class Path
- {
- public:
- /**
- * Path trust category
- *
- * Note that this is NOT peer trust and has nothing to do with root server
- * designations or other trust metrics. This indicates how much we trust
- * this path to be secure and/or private. A trust level of normal means
- * encrypt and authenticate all traffic. Privacy trust means we can send
- * traffic in the clear. Ultimate trust means we don't even need
- * authentication. Generally a private path would be a hard-wired local
- * LAN, while an ultimate trust path would be a physically isolated private
- * server backplane.
- *
- * Nearly all paths will be normal trust. The other levels are for high
- * performance local SDN use only.
- *
- * These values MUST match ZT_LocalInterfaceAddressTrust in ZeroTierOne.h
- */
- enum Trust // NOTE: max 255
- {
- TRUST_NORMAL = 0,
- TRUST_PRIVACY = 10,
- TRUST_ULTIMATE = 20
- };
- Path() :
- _addr(),
- _ipScope(InetAddress::IP_SCOPE_NONE),
- _trust(TRUST_NORMAL)
- {
- }
- Path(const InetAddress &addr,int metric,Trust trust) :
- _addr(addr),
- _ipScope(addr.ipScope()),
- _trust(trust)
- {
- }
- /**
- * @return Physical address
- */
- inline const InetAddress &address() const throw() { return _addr; }
- /**
- * @return IP scope -- faster shortcut for address().ipScope()
- */
- inline InetAddress::IpScope ipScope() const throw() { return _ipScope; }
- /**
- * @return Preference rank, higher == better
- */
- inline int preferenceRank() const throw()
- {
- // First, since the scope enum values in InetAddress.hpp are in order of
- // use preference rank, we take that. Then we multiple by two, yielding
- // a sequence like 0, 2, 4, 6, etc. Then if it's IPv6 we add one. This
- // makes IPv6 addresses of a given scope outrank IPv4 addresses of the
- // same scope -- e.g. 1 outranks 0. This makes us prefer IPv6, but not
- // if the address scope/class is of a fundamentally lower rank.
- return ( ((int)_ipScope * 2) + ((_addr.ss_family == AF_INET6) ? 1 : 0) );
- }
- /**
- * @return Path trust level
- */
- inline Trust trust() const throw() { return _trust; }
- /**
- * @return True if path is considered reliable (no NAT keepalives etc. are needed)
- */
- inline bool reliable() const throw()
- {
- return ( (_addr.ss_family == AF_INET6) || ((_ipScope != InetAddress::IP_SCOPE_GLOBAL)&&(_ipScope != InetAddress::IP_SCOPE_PSEUDOPRIVATE)) );
- }
- /**
- * @return True if address is non-NULL
- */
- inline operator bool() const throw() { return (_addr); }
- /**
- * Check whether this address is valid for a ZeroTier path
- *
- * This checks the address type and scope against address types and scopes
- * that we currently support for ZeroTier communication.
- *
- * @param a Address to check
- * @return True if address is good for ZeroTier path use
- */
- static inline bool isAddressValidForPath(const InetAddress &a)
- throw()
- {
- if ((a.ss_family == AF_INET)||(a.ss_family == AF_INET6)) {
- switch(a.ipScope()) {
- /* Note: we don't do link-local at the moment. Unfortunately these
- * cause several issues. The first is that they usually require a
- * device qualifier, which we don't handle yet and can't portably
- * push in PUSH_DIRECT_PATHS. The second is that some OSes assign
- * these very ephemerally or otherwise strangely. So we'll use
- * private, pseudo-private, shared (e.g. carrier grade NAT), or
- * global IP addresses. */
- case InetAddress::IP_SCOPE_PRIVATE:
- case InetAddress::IP_SCOPE_PSEUDOPRIVATE:
- case InetAddress::IP_SCOPE_SHARED:
- case InetAddress::IP_SCOPE_GLOBAL:
- return true;
- default:
- return false;
- }
- }
- return false;
- }
- protected:
- InetAddress _addr;
- InetAddress::IpScope _ipScope; // memoize this since it's a computed value checked often
- Trust _trust;
- };
- } // namespace ZeroTier
- #endif
|