netbase.cpp 30 KB

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273747576777879808182838485868788899091929394959697989910010110210310410510610710810911011111211311411511611711811912012112212312412512612712812913013113213313413513613713813914014114214314414514614714814915015115215315415515615715815916016116216316416516616716816917017117217317417517617717817918018118218318418518618718818919019119219319419519619719819920020120220320420520620720820921021121221321421521621721821922022122222322422522622722822923023123223323423523623723823924024124224324424524624724824925025125225325425525625725825926026126226326426526626726826927027127227327427527627727827928028128228328428528628728828929029129229329429529629729829930030130230330430530630730830931031131231331431531631731831932032132232332432532632732832933033133233333433533633733833934034134234334434534634734834935035135235335435535635735835936036136236336436536636736836937037137237337437537637737837938038138238338438538638738838939039139239339439539639739839940040140240340440540640740840941041141241341441541641741841942042142242342442542642742842943043143243343443543643743843944044144244344444544644744844945045145245345445545645745845946046146246346446546646746846947047147247347447547647747847948048148248348448548648748848949049149249349449549649749849950050150250350450550650750850951051151251351451551651751851952052152252352452552652752852953053153253353453553653753853954054154254354454554654754854955055155255355455555655755855956056156256356456556656756856957057157257357457557657757857958058158258358458558658758858959059159259359459559659759859960060160260360460560660760860961061161261361461561661761861962062162262362462562662762862963063163263363463563663763863964064164264364464564664764864965065165265365465565665765865966066166266366466566666766866967067167267367467567667767867968068168268368468568668768868969069169269369469569669769869970070170270370470570670770870971071171271371471571671771871972072172272372472572672772872973073173273373473573673773873974074174274374474574674774874975075175275375475575675775875976076176276376476576676776876977077177277377477577677777877978078178278378478578678778878979079179279379479579679779879980080180280380480580680780880981081181281381481581681781881982082182282382482582682782882983083183283383483583683783883984084184284384484584684784884985085185285385485585685785885986086186286386486586686786886987087187287387487587687787887988088188288388488588688788888989089189289389489589689789889990090190290390490590690790890991091191291391491591691791891992092192292392492592692792892993093193293393493593693793893994094194294394494594694794894995095195295395495595695795895996096196296396496596696796896997097197297397497597697797897998098198298398498598698798898999099199299399499599699799899910001001100210031004100510061007100810091010101110121013101410151016101710181019102010211022102310241025102610271028102910301031103210331034103510361037103810391040104110421043104410451046104710481049105010511052105310541055105610571058105910601061106210631064106510661067106810691070107110721073107410751076107710781079108010811082108310841085108610871088108910901091109210931094109510961097109810991100110111021103110411051106110711081109111011111112111311141115111611171118111911201121112211231124112511261127112811291130113111321133113411351136113711381139114011411142114311441145114611471148114911501151115211531154
  1. // ECOin - Copyright (c) - 2014/2022 - GPLv3 - epsylon@riseup.net (https://03c8.net)
  2. #include "netbase.h"
  3. #include "util.h"
  4. #include "sync.h"
  5. #ifndef WIN32
  6. #include <sys/fcntl.h>
  7. #endif
  8. #include "strlcpy.h"
  9. #include <boost/algorithm/string/case_conv.hpp> // for to_lower()
  10. using namespace std;
  11. static proxyType proxyInfo[NET_MAX];
  12. static proxyType nameproxyInfo;
  13. static CCriticalSection cs_proxyInfos;
  14. int nConnectTimeout = 5000;
  15. bool fNameLookup = false;
  16. static const unsigned char pchIPv4[12] = { 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0xff, 0xff };
  17. enum Network ParseNetwork(std::string net) {
  18. boost::to_lower(net);
  19. if (net == "ipv4") return NET_IPV4;
  20. if (net == "ipv6") return NET_IPV6;
  21. if (net == "tor") return NET_TOR;
  22. if (net == "i2p") return NET_I2P;
  23. return NET_UNROUTABLE;
  24. }
  25. void SplitHostPort(std::string in, int &portOut, std::string &hostOut) {
  26. size_t colon = in.find_last_of(':');
  27. bool fHaveColon = colon != in.npos;
  28. bool fBracketed = fHaveColon && (in[0]=='[' && in[colon-1]==']'); // if there is a colon, and in[0]=='[', colon is not 0, so in[colon-1] is safe
  29. bool fMultiColon = fHaveColon && (in.find_last_of(':',colon-1) != in.npos);
  30. if (fHaveColon && (colon==0 || fBracketed || !fMultiColon)) {
  31. char *endp = NULL;
  32. int n = strtol(in.c_str() + colon + 1, &endp, 10);
  33. if (endp && *endp == 0 && n >= 0) {
  34. in = in.substr(0, colon);
  35. if (n > 0 && n < 0x10000)
  36. portOut = n;
  37. }
  38. }
  39. if (in.size()>0 && in[0] == '[' && in[in.size()-1] == ']')
  40. hostOut = in.substr(1, in.size()-2);
  41. else
  42. hostOut = in;
  43. }
  44. bool static LookupIntern(const char *pszName, std::vector<CNetAddr>& vIP, unsigned int nMaxSolutions, bool fAllowLookup)
  45. {
  46. vIP.clear();
  47. {
  48. CNetAddr addr;
  49. if (addr.SetSpecial(std::string(pszName))) {
  50. vIP.push_back(addr);
  51. return true;
  52. }
  53. }
  54. struct addrinfo aiHint;
  55. memset(&aiHint, 0, sizeof(struct addrinfo));
  56. aiHint.ai_socktype = SOCK_STREAM;
  57. aiHint.ai_protocol = IPPROTO_TCP;
  58. #ifdef WIN32
  59. # ifdef USE_IPV6
  60. aiHint.ai_family = AF_UNSPEC;
  61. # else
  62. aiHint.ai_family = AF_INET;
  63. # endif
  64. aiHint.ai_flags = fAllowLookup ? 0 : AI_NUMERICHOST;
  65. #else
  66. # ifdef USE_IPV6
  67. aiHint.ai_family = AF_UNSPEC;
  68. # else
  69. aiHint.ai_family = AF_INET;
  70. # endif
  71. aiHint.ai_flags = fAllowLookup ? AI_ADDRCONFIG : AI_NUMERICHOST;
  72. #endif
  73. struct addrinfo *aiRes = NULL;
  74. int nErr = getaddrinfo(pszName, NULL, &aiHint, &aiRes);
  75. if (nErr)
  76. return false;
  77. struct addrinfo *aiTrav = aiRes;
  78. while (aiTrav != NULL && (nMaxSolutions == 0 || vIP.size() < nMaxSolutions))
  79. {
  80. if (aiTrav->ai_family == AF_INET)
  81. {
  82. assert(aiTrav->ai_addrlen >= sizeof(sockaddr_in));
  83. vIP.push_back(CNetAddr(((struct sockaddr_in*)(aiTrav->ai_addr))->sin_addr));
  84. }
  85. #ifdef USE_IPV6
  86. if (aiTrav->ai_family == AF_INET6)
  87. {
  88. assert(aiTrav->ai_addrlen >= sizeof(sockaddr_in6));
  89. vIP.push_back(CNetAddr(((struct sockaddr_in6*)(aiTrav->ai_addr))->sin6_addr));
  90. }
  91. #endif
  92. aiTrav = aiTrav->ai_next;
  93. }
  94. freeaddrinfo(aiRes);
  95. return (vIP.size() > 0);
  96. }
  97. bool LookupHost(const char *pszName, std::vector<CNetAddr>& vIP, unsigned int nMaxSolutions, bool fAllowLookup)
  98. {
  99. if (pszName[0] == 0)
  100. return false;
  101. char psz[256];
  102. char *pszHost = psz;
  103. strlcpy(psz, pszName, sizeof(psz));
  104. if (psz[0] == '[' && psz[strlen(psz)-1] == ']')
  105. {
  106. pszHost = psz+1;
  107. psz[strlen(psz)-1] = 0;
  108. }
  109. return LookupIntern(pszHost, vIP, nMaxSolutions, fAllowLookup);
  110. }
  111. bool LookupHostNumeric(const char *pszName, std::vector<CNetAddr>& vIP, unsigned int nMaxSolutions)
  112. {
  113. return LookupHost(pszName, vIP, nMaxSolutions, false);
  114. }
  115. bool Lookup(const char *pszName, std::vector<CService>& vAddr, int portDefault, bool fAllowLookup, unsigned int nMaxSolutions)
  116. {
  117. if (pszName[0] == 0)
  118. return false;
  119. int port = portDefault;
  120. std::string hostname = "";
  121. SplitHostPort(std::string(pszName), port, hostname);
  122. std::vector<CNetAddr> vIP;
  123. bool fRet = LookupIntern(hostname.c_str(), vIP, nMaxSolutions, fAllowLookup);
  124. if (!fRet)
  125. return false;
  126. vAddr.resize(vIP.size());
  127. for (unsigned int i = 0; i < vIP.size(); i++)
  128. vAddr[i] = CService(vIP[i], port);
  129. return true;
  130. }
  131. bool Lookup(const char *pszName, CService& addr, int portDefault, bool fAllowLookup)
  132. {
  133. std::vector<CService> vService;
  134. bool fRet = Lookup(pszName, vService, portDefault, fAllowLookup, 1);
  135. if (!fRet)
  136. return false;
  137. addr = vService[0];
  138. return true;
  139. }
  140. bool LookupNumeric(const char *pszName, CService& addr, int portDefault)
  141. {
  142. return Lookup(pszName, addr, portDefault, false);
  143. }
  144. bool static Socks4(const CService &addrDest, SOCKET& hSocket)
  145. {
  146. printf("SOCKS4 connecting %s\n", addrDest.ToString().c_str());
  147. if (!addrDest.IsIPv4())
  148. {
  149. closesocket(hSocket);
  150. return error("Proxy destination is not IPv4");
  151. }
  152. char pszSocks4IP[] = "\4\1\0\0\0\0\0\0user";
  153. struct sockaddr_in addr;
  154. socklen_t len = sizeof(addr);
  155. if (!addrDest.GetSockAddr((struct sockaddr*)&addr, &len) || addr.sin_family != AF_INET)
  156. {
  157. closesocket(hSocket);
  158. return error("Cannot get proxy destination address");
  159. }
  160. memcpy(pszSocks4IP + 2, &addr.sin_port, 2);
  161. memcpy(pszSocks4IP + 4, &addr.sin_addr, 4);
  162. char* pszSocks4 = pszSocks4IP;
  163. int nSize = sizeof(pszSocks4IP);
  164. int ret = send(hSocket, pszSocks4, nSize, MSG_NOSIGNAL);
  165. if (ret != nSize)
  166. {
  167. closesocket(hSocket);
  168. return error("Error sending to proxy");
  169. }
  170. char pchRet[8];
  171. if (recv(hSocket, pchRet, 8, 0) != 8)
  172. {
  173. closesocket(hSocket);
  174. return error("Error reading proxy response");
  175. }
  176. if (pchRet[1] != 0x5a)
  177. {
  178. closesocket(hSocket);
  179. if (pchRet[1] != 0x5b)
  180. printf("ERROR: Proxy returned error %d\n", pchRet[1]);
  181. return false;
  182. }
  183. printf("SOCKS4 connected %s\n", addrDest.ToString().c_str());
  184. return true;
  185. }
  186. bool static Socks5(string strDest, int port, SOCKET& hSocket)
  187. {
  188. printf("SOCKS5 connecting %s\n", strDest.c_str());
  189. if (strDest.size() > 255)
  190. {
  191. closesocket(hSocket);
  192. return error("Hostname too long");
  193. }
  194. char pszSocks5Init[] = "\5\1\0";
  195. char *pszSocks5 = pszSocks5Init;
  196. ssize_t nSize = sizeof(pszSocks5Init) - 1;
  197. ssize_t ret = send(hSocket, pszSocks5, nSize, MSG_NOSIGNAL);
  198. if (ret != nSize)
  199. {
  200. closesocket(hSocket);
  201. return error("Error sending to proxy");
  202. }
  203. char pchRet1[2];
  204. if (recv(hSocket, pchRet1, 2, 0) != 2)
  205. {
  206. closesocket(hSocket);
  207. return error("Error reading proxy response");
  208. }
  209. if (pchRet1[0] != 0x05 || pchRet1[1] != 0x00)
  210. {
  211. closesocket(hSocket);
  212. return error("Proxy failed to initialize");
  213. }
  214. string strSocks5("\5\1");
  215. strSocks5 += '\000'; strSocks5 += '\003';
  216. strSocks5 += static_cast<char>(std::min((int)strDest.size(), 255));
  217. strSocks5 += strDest;
  218. strSocks5 += static_cast<char>((port >> 8) & 0xFF);
  219. strSocks5 += static_cast<char>((port >> 0) & 0xFF);
  220. ret = send(hSocket, strSocks5.c_str(), strSocks5.size(), MSG_NOSIGNAL);
  221. if (ret != (ssize_t)strSocks5.size())
  222. {
  223. closesocket(hSocket);
  224. return error("Error sending to proxy");
  225. }
  226. char pchRet2[4];
  227. if (recv(hSocket, pchRet2, 4, 0) != 4)
  228. {
  229. closesocket(hSocket);
  230. return error("Error reading proxy response");
  231. }
  232. if (pchRet2[0] != 0x05)
  233. {
  234. closesocket(hSocket);
  235. return error("Proxy failed to accept request");
  236. }
  237. if (pchRet2[1] != 0x00)
  238. {
  239. closesocket(hSocket);
  240. switch (pchRet2[1])
  241. {
  242. case 0x01: return error("Proxy error: general failure");
  243. case 0x02: return error("Proxy error: connection not allowed");
  244. case 0x03: return error("Proxy error: network unreachable");
  245. case 0x04: return error("Proxy error: host unreachable");
  246. case 0x05: return error("Proxy error: connection refused");
  247. case 0x06: return error("Proxy error: TTL expired");
  248. case 0x07: return error("Proxy error: protocol error");
  249. case 0x08: return error("Proxy error: address type not supported");
  250. default: return error("Proxy error: unknown");
  251. }
  252. }
  253. if (pchRet2[2] != 0x00)
  254. {
  255. closesocket(hSocket);
  256. return error("Error: malformed proxy response");
  257. }
  258. char pchRet3[256];
  259. switch (pchRet2[3])
  260. {
  261. case 0x01: ret = recv(hSocket, pchRet3, 4, 0) != 4; break;
  262. case 0x04: ret = recv(hSocket, pchRet3, 16, 0) != 16; break;
  263. case 0x03:
  264. {
  265. ret = recv(hSocket, pchRet3, 1, 0) != 1;
  266. if (ret)
  267. return error("Error reading from proxy");
  268. int nRecv = pchRet3[0];
  269. ret = recv(hSocket, pchRet3, nRecv, 0) != nRecv;
  270. break;
  271. }
  272. default: closesocket(hSocket); return error("Error: malformed proxy response");
  273. }
  274. if (ret)
  275. {
  276. closesocket(hSocket);
  277. return error("Error reading from proxy");
  278. }
  279. if (recv(hSocket, pchRet3, 2, 0) != 2)
  280. {
  281. closesocket(hSocket);
  282. return error("Error reading from proxy");
  283. }
  284. printf("SOCKS5 connected %s\n", strDest.c_str());
  285. return true;
  286. }
  287. bool static ConnectSocketDirectly(const CService &addrConnect, SOCKET& hSocketRet, int nTimeout)
  288. {
  289. hSocketRet = INVALID_SOCKET;
  290. #ifdef USE_IPV6
  291. struct sockaddr_storage sockaddr;
  292. #else
  293. struct sockaddr sockaddr;
  294. #endif
  295. socklen_t len = sizeof(sockaddr);
  296. if (!addrConnect.GetSockAddr((struct sockaddr*)&sockaddr, &len)) {
  297. printf("Cannot connect to %s: unsupported network\n", addrConnect.ToString().c_str());
  298. return false;
  299. }
  300. SOCKET hSocket = socket(((struct sockaddr*)&sockaddr)->sa_family, SOCK_STREAM, IPPROTO_TCP);
  301. if (hSocket == INVALID_SOCKET)
  302. return false;
  303. #ifdef SO_NOSIGPIPE
  304. int set = 1;
  305. setsockopt(hSocket, SOL_SOCKET, SO_NOSIGPIPE, (void*)&set, sizeof(int));
  306. #endif
  307. #ifdef WIN32
  308. u_long fNonblock = 1;
  309. if (ioctlsocket(hSocket, FIONBIO, &fNonblock) == SOCKET_ERROR)
  310. #else
  311. int fFlags = fcntl(hSocket, F_GETFL, 0);
  312. if (fcntl(hSocket, F_SETFL, fFlags | O_NONBLOCK) == -1)
  313. #endif
  314. {
  315. closesocket(hSocket);
  316. return false;
  317. }
  318. if (connect(hSocket, (struct sockaddr*)&sockaddr, len) == SOCKET_ERROR)
  319. {
  320. // WSAEINVAL is here because some legacy version of winsock uses it
  321. if (WSAGetLastError() == WSAEINPROGRESS || WSAGetLastError() == WSAEWOULDBLOCK || WSAGetLastError() == WSAEINVAL)
  322. {
  323. struct timeval timeout;
  324. timeout.tv_sec = nTimeout / 1000;
  325. timeout.tv_usec = (nTimeout % 1000) * 1000;
  326. fd_set fdset;
  327. FD_ZERO(&fdset);
  328. FD_SET(hSocket, &fdset);
  329. int nRet = select(hSocket + 1, NULL, &fdset, NULL, &timeout);
  330. if (nRet == 0)
  331. {
  332. printf("connection timeout\n");
  333. closesocket(hSocket);
  334. return false;
  335. }
  336. if (nRet == SOCKET_ERROR)
  337. {
  338. printf("select() for connection failed: %i\n",WSAGetLastError());
  339. closesocket(hSocket);
  340. return false;
  341. }
  342. socklen_t nRetSize = sizeof(nRet);
  343. #ifdef WIN32
  344. if (getsockopt(hSocket, SOL_SOCKET, SO_ERROR, (char*)(&nRet), &nRetSize) == SOCKET_ERROR)
  345. #else
  346. if (getsockopt(hSocket, SOL_SOCKET, SO_ERROR, &nRet, &nRetSize) == SOCKET_ERROR)
  347. #endif
  348. {
  349. printf("getsockopt() for connection failed: %i\n",WSAGetLastError());
  350. closesocket(hSocket);
  351. return false;
  352. }
  353. if (nRet != 0)
  354. {
  355. printf("connect() failed after select(): %s\n",strerror(nRet));
  356. closesocket(hSocket);
  357. return false;
  358. }
  359. }
  360. #ifdef WIN32
  361. else if (WSAGetLastError() != WSAEISCONN)
  362. #else
  363. else
  364. #endif
  365. {
  366. printf("connect() failed: %i\n",WSAGetLastError());
  367. closesocket(hSocket);
  368. return false;
  369. }
  370. }
  371. #ifdef WIN32
  372. fNonblock = 0;
  373. if (ioctlsocket(hSocket, FIONBIO, &fNonblock) == SOCKET_ERROR)
  374. #else
  375. fFlags = fcntl(hSocket, F_GETFL, 0);
  376. if (fcntl(hSocket, F_SETFL, fFlags & !O_NONBLOCK) == SOCKET_ERROR)
  377. #endif
  378. {
  379. closesocket(hSocket);
  380. return false;
  381. }
  382. hSocketRet = hSocket;
  383. return true;
  384. }
  385. bool SetProxy(enum Network net, CService addrProxy, int nSocksVersion) {
  386. assert(net >= 0 && net < NET_MAX);
  387. if (nSocksVersion != 0 && nSocksVersion != 4 && nSocksVersion != 5)
  388. return false;
  389. if (nSocksVersion != 0 && !addrProxy.IsValid())
  390. return false;
  391. LOCK(cs_proxyInfos);
  392. proxyInfo[net] = std::make_pair(addrProxy, nSocksVersion);
  393. return true;
  394. }
  395. bool GetProxy(enum Network net, proxyType &proxyInfoOut) {
  396. assert(net >= 0 && net < NET_MAX);
  397. LOCK(cs_proxyInfos);
  398. if (!proxyInfo[net].second)
  399. return false;
  400. proxyInfoOut = proxyInfo[net];
  401. return true;
  402. }
  403. bool SetNameProxy(CService addrProxy, int nSocksVersion) {
  404. if (nSocksVersion != 0 && nSocksVersion != 5)
  405. return false;
  406. if (nSocksVersion != 0 && !addrProxy.IsValid())
  407. return false;
  408. LOCK(cs_proxyInfos);
  409. nameproxyInfo = std::make_pair(addrProxy, nSocksVersion);
  410. return true;
  411. }
  412. bool GetNameProxy(proxyType &nameproxyInfoOut) {
  413. LOCK(cs_proxyInfos);
  414. if (!nameproxyInfo.second)
  415. return false;
  416. nameproxyInfoOut = nameproxyInfo;
  417. return true;
  418. }
  419. bool HaveNameProxy() {
  420. LOCK(cs_proxyInfos);
  421. return nameproxyInfo.second != 0;
  422. }
  423. bool IsProxy(const CNetAddr &addr) {
  424. LOCK(cs_proxyInfos);
  425. for (int i = 0; i < NET_MAX; i++) {
  426. if (proxyInfo[i].second && (addr == (CNetAddr)proxyInfo[i].first))
  427. return true;
  428. }
  429. return false;
  430. }
  431. bool ConnectSocket(const CService &addrDest, SOCKET& hSocketRet, int nTimeout)
  432. {
  433. proxyType proxy;
  434. // no proxy needed
  435. if (!GetProxy(addrDest.GetNetwork(), proxy))
  436. return ConnectSocketDirectly(addrDest, hSocketRet, nTimeout);
  437. SOCKET hSocket = INVALID_SOCKET;
  438. // first connect to proxy server
  439. if (!ConnectSocketDirectly(proxy.first, hSocket, nTimeout))
  440. return false;
  441. // do socks negotiation
  442. switch (proxy.second) {
  443. case 4:
  444. if (!Socks4(addrDest, hSocket))
  445. return false;
  446. break;
  447. case 5:
  448. if (!Socks5(addrDest.ToStringIP(), addrDest.GetPort(), hSocket))
  449. return false;
  450. break;
  451. default:
  452. return false;
  453. }
  454. hSocketRet = hSocket;
  455. return true;
  456. }
  457. bool ConnectSocketByName(CService &addr, SOCKET& hSocketRet, const char *pszDest, int portDefault, int nTimeout)
  458. {
  459. string strDest;
  460. int port = portDefault;
  461. SplitHostPort(string(pszDest), port, strDest);
  462. SOCKET hSocket = INVALID_SOCKET;
  463. proxyType nameproxy;
  464. GetNameProxy(nameproxy);
  465. CService addrResolved(CNetAddr(strDest, fNameLookup && !nameproxy.second), port);
  466. if (addrResolved.IsValid()) {
  467. addr = addrResolved;
  468. return ConnectSocket(addr, hSocketRet, nTimeout);
  469. }
  470. addr = CService("0.0.0.0:0");
  471. if (!nameproxy.second)
  472. return false;
  473. if (!ConnectSocketDirectly(nameproxy.first, hSocket, nTimeout))
  474. return false;
  475. switch(nameproxy.second) {
  476. default:
  477. case 4: return false;
  478. case 5:
  479. if (!Socks5(strDest, port, hSocket))
  480. return false;
  481. break;
  482. }
  483. hSocketRet = hSocket;
  484. return true;
  485. }
  486. void CNetAddr::Init()
  487. {
  488. memset(ip, 0, 16);
  489. }
  490. void CNetAddr::SetIP(const CNetAddr& ipIn)
  491. {
  492. memcpy(ip, ipIn.ip, sizeof(ip));
  493. }
  494. static const unsigned char pchOnionCat[] = {0xFD,0x87,0xD8,0x7E,0xEB,0x43};
  495. static const unsigned char pchGarliCat[] = {0xFD,0x60,0xDB,0x4D,0xDD,0xB5};
  496. bool CNetAddr::SetSpecial(const std::string &strName)
  497. {
  498. if (strName.size()>6 && strName.substr(strName.size() - 6, 6) == ".onion") {
  499. std::vector<unsigned char> vchAddr = DecodeBase32(strName.substr(0, strName.size() - 6).c_str());
  500. if (vchAddr.size() != 16-sizeof(pchOnionCat))
  501. return false;
  502. memcpy(ip, pchOnionCat, sizeof(pchOnionCat));
  503. for (unsigned int i=0; i<16-sizeof(pchOnionCat); i++)
  504. ip[i + sizeof(pchOnionCat)] = vchAddr[i];
  505. return true;
  506. }
  507. if (strName.size()>11 && strName.substr(strName.size() - 11, 11) == ".oc.b32.i2p") {
  508. std::vector<unsigned char> vchAddr = DecodeBase32(strName.substr(0, strName.size() - 11).c_str());
  509. if (vchAddr.size() != 16-sizeof(pchGarliCat))
  510. return false;
  511. memcpy(ip, pchOnionCat, sizeof(pchGarliCat));
  512. for (unsigned int i=0; i<16-sizeof(pchGarliCat); i++)
  513. ip[i + sizeof(pchGarliCat)] = vchAddr[i];
  514. return true;
  515. }
  516. return false;
  517. }
  518. CNetAddr::CNetAddr()
  519. {
  520. Init();
  521. }
  522. CNetAddr::CNetAddr(const struct in_addr& ipv4Addr)
  523. {
  524. memcpy(ip, pchIPv4, 12);
  525. memcpy(ip+12, &ipv4Addr, 4);
  526. }
  527. #ifdef USE_IPV6
  528. CNetAddr::CNetAddr(const struct in6_addr& ipv6Addr)
  529. {
  530. memcpy(ip, &ipv6Addr, 16);
  531. }
  532. #endif
  533. CNetAddr::CNetAddr(const char *pszIp, bool fAllowLookup)
  534. {
  535. Init();
  536. std::vector<CNetAddr> vIP;
  537. if (LookupHost(pszIp, vIP, 1, fAllowLookup))
  538. *this = vIP[0];
  539. }
  540. CNetAddr::CNetAddr(const std::string &strIp, bool fAllowLookup)
  541. {
  542. Init();
  543. std::vector<CNetAddr> vIP;
  544. if (LookupHost(strIp.c_str(), vIP, 1, fAllowLookup))
  545. *this = vIP[0];
  546. }
  547. unsigned int CNetAddr::GetByte(int n) const
  548. {
  549. return ip[15-n];
  550. }
  551. bool CNetAddr::IsIPv4() const
  552. {
  553. return (memcmp(ip, pchIPv4, sizeof(pchIPv4)) == 0);
  554. }
  555. bool CNetAddr::IsIPv6() const
  556. {
  557. return (!IsIPv4() && !IsTor() && !IsI2P());
  558. }
  559. bool CNetAddr::IsRFC1918() const
  560. {
  561. return IsIPv4() && (
  562. GetByte(3) == 10 ||
  563. (GetByte(3) == 192 && GetByte(2) == 168) ||
  564. (GetByte(3) == 172 && (GetByte(2) >= 16 && GetByte(2) <= 31)));
  565. }
  566. bool CNetAddr::IsRFC3927() const
  567. {
  568. return IsIPv4() && (GetByte(3) == 169 && GetByte(2) == 254);
  569. }
  570. bool CNetAddr::IsRFC3849() const
  571. {
  572. return GetByte(15) == 0x20 && GetByte(14) == 0x01 && GetByte(13) == 0x0D && GetByte(12) == 0xB8;
  573. }
  574. bool CNetAddr::IsRFC3964() const
  575. {
  576. return (GetByte(15) == 0x20 && GetByte(14) == 0x02);
  577. }
  578. bool CNetAddr::IsRFC6052() const
  579. {
  580. static const unsigned char pchRFC6052[] = {0,0x64,0xFF,0x9B,0,0,0,0,0,0,0,0};
  581. return (memcmp(ip, pchRFC6052, sizeof(pchRFC6052)) == 0);
  582. }
  583. bool CNetAddr::IsRFC4380() const
  584. {
  585. return (GetByte(15) == 0x20 && GetByte(14) == 0x01 && GetByte(13) == 0 && GetByte(12) == 0);
  586. }
  587. bool CNetAddr::IsRFC4862() const
  588. {
  589. static const unsigned char pchRFC4862[] = {0xFE,0x80,0,0,0,0,0,0};
  590. return (memcmp(ip, pchRFC4862, sizeof(pchRFC4862)) == 0);
  591. }
  592. bool CNetAddr::IsRFC4193() const
  593. {
  594. return ((GetByte(15) & 0xFE) == 0xFC);
  595. }
  596. bool CNetAddr::IsRFC6145() const
  597. {
  598. static const unsigned char pchRFC6145[] = {0,0,0,0,0,0,0,0,0xFF,0xFF,0,0};
  599. return (memcmp(ip, pchRFC6145, sizeof(pchRFC6145)) == 0);
  600. }
  601. bool CNetAddr::IsRFC4843() const
  602. {
  603. return (GetByte(15) == 0x20 && GetByte(14) == 0x01 && GetByte(13) == 0x00 && (GetByte(12) & 0xF0) == 0x10);
  604. }
  605. bool CNetAddr::IsTor() const
  606. {
  607. return (memcmp(ip, pchOnionCat, sizeof(pchOnionCat)) == 0);
  608. }
  609. bool CNetAddr::IsI2P() const
  610. {
  611. return (memcmp(ip, pchGarliCat, sizeof(pchGarliCat)) == 0);
  612. }
  613. bool CNetAddr::IsLocal() const
  614. {
  615. // IPv4 loopback
  616. if (IsIPv4() && (GetByte(3) == 127 || GetByte(3) == 0))
  617. return true;
  618. // IPv6 loopback (::1/128)
  619. static const unsigned char pchLocal[16] = {0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,1};
  620. if (memcmp(ip, pchLocal, 16) == 0)
  621. return true;
  622. return false;
  623. }
  624. bool CNetAddr::IsMulticast() const
  625. {
  626. return (IsIPv4() && (GetByte(3) & 0xF0) == 0xE0)
  627. || (GetByte(15) == 0xFF);
  628. }
  629. bool CNetAddr::IsValid() const
  630. {
  631. if (memcmp(ip, pchIPv4+3, sizeof(pchIPv4)-3) == 0)
  632. return false;
  633. // unspecified IPv6 address (::/128)
  634. unsigned char ipNone[16] = {};
  635. if (memcmp(ip, ipNone, 16) == 0)
  636. return false;
  637. // documentation IPv6 address
  638. if (IsRFC3849())
  639. return false;
  640. if (IsIPv4())
  641. {
  642. // INADDR_NONE
  643. uint32_t ipNone = INADDR_NONE;
  644. if (memcmp(ip+12, &ipNone, 4) == 0)
  645. return false;
  646. // 0
  647. ipNone = 0;
  648. if (memcmp(ip+12, &ipNone, 4) == 0)
  649. return false;
  650. }
  651. return true;
  652. }
  653. bool CNetAddr::IsRoutable() const
  654. {
  655. return IsValid() && !(IsRFC1918() || IsRFC3927() || IsRFC4862() || (IsRFC4193() && !IsTor() && !IsI2P()) || IsRFC4843() || IsLocal());
  656. }
  657. enum Network CNetAddr::GetNetwork() const
  658. {
  659. if (!IsRoutable())
  660. return NET_UNROUTABLE;
  661. if (IsIPv4())
  662. return NET_IPV4;
  663. if (IsTor())
  664. return NET_TOR;
  665. if (IsI2P())
  666. return NET_I2P;
  667. return NET_IPV6;
  668. }
  669. std::string CNetAddr::ToStringIP() const
  670. {
  671. if (IsTor())
  672. return EncodeBase32(&ip[6], 10) + ".onion";
  673. if (IsI2P())
  674. return EncodeBase32(&ip[6], 10) + ".oc.b32.i2p";
  675. CService serv(*this, 0);
  676. #ifdef USE_IPV6
  677. struct sockaddr_storage sockaddr;
  678. #else
  679. struct sockaddr sockaddr;
  680. #endif
  681. socklen_t socklen = sizeof(sockaddr);
  682. if (serv.GetSockAddr((struct sockaddr*)&sockaddr, &socklen)) {
  683. char name[1025] = "";
  684. if (!getnameinfo((const struct sockaddr*)&sockaddr, socklen, name, sizeof(name), NULL, 0, NI_NUMERICHOST))
  685. return std::string(name);
  686. }
  687. if (IsIPv4())
  688. return strprintf("%u.%u.%u.%u", GetByte(3), GetByte(2), GetByte(1), GetByte(0));
  689. else
  690. return strprintf("%x:%x:%x:%x:%x:%x:%x:%x",
  691. GetByte(15) << 8 | GetByte(14), GetByte(13) << 8 | GetByte(12),
  692. GetByte(11) << 8 | GetByte(10), GetByte(9) << 8 | GetByte(8),
  693. GetByte(7) << 8 | GetByte(6), GetByte(5) << 8 | GetByte(4),
  694. GetByte(3) << 8 | GetByte(2), GetByte(1) << 8 | GetByte(0));
  695. }
  696. std::string CNetAddr::ToString() const
  697. {
  698. return ToStringIP();
  699. }
  700. bool operator==(const CNetAddr& a, const CNetAddr& b)
  701. {
  702. return (memcmp(a.ip, b.ip, 16) == 0);
  703. }
  704. bool operator!=(const CNetAddr& a, const CNetAddr& b)
  705. {
  706. return (memcmp(a.ip, b.ip, 16) != 0);
  707. }
  708. bool operator<(const CNetAddr& a, const CNetAddr& b)
  709. {
  710. return (memcmp(a.ip, b.ip, 16) < 0);
  711. }
  712. bool CNetAddr::GetInAddr(struct in_addr* pipv4Addr) const
  713. {
  714. if (!IsIPv4())
  715. return false;
  716. memcpy(pipv4Addr, ip+12, 4);
  717. return true;
  718. }
  719. #ifdef USE_IPV6
  720. bool CNetAddr::GetIn6Addr(struct in6_addr* pipv6Addr) const
  721. {
  722. memcpy(pipv6Addr, ip, 16);
  723. return true;
  724. }
  725. #endif
  726. std::vector<unsigned char> CNetAddr::GetGroup() const
  727. {
  728. std::vector<unsigned char> vchRet;
  729. int nClass = NET_IPV6;
  730. int nStartByte = 0;
  731. int nBits = 16;
  732. if (IsLocal())
  733. {
  734. nClass = 255;
  735. nBits = 0;
  736. }
  737. if (!IsRoutable())
  738. {
  739. nClass = NET_UNROUTABLE;
  740. nBits = 0;
  741. }
  742. else if (IsIPv4() || IsRFC6145() || IsRFC6052())
  743. {
  744. nClass = NET_IPV4;
  745. nStartByte = 12;
  746. }
  747. else if (IsRFC3964())
  748. {
  749. nClass = NET_IPV4;
  750. nStartByte = 2;
  751. }
  752. else if (IsRFC4380())
  753. {
  754. vchRet.push_back(NET_IPV4);
  755. vchRet.push_back(GetByte(3) ^ 0xFF);
  756. vchRet.push_back(GetByte(2) ^ 0xFF);
  757. return vchRet;
  758. }
  759. else if (IsTor())
  760. {
  761. nClass = NET_TOR;
  762. nStartByte = 6;
  763. nBits = 4;
  764. }
  765. else if (IsI2P())
  766. {
  767. nClass = NET_I2P;
  768. nStartByte = 6;
  769. nBits = 4;
  770. }
  771. else if (GetByte(15) == 0x20 && GetByte(14) == 0x11 && GetByte(13) == 0x04 && GetByte(12) == 0x70)
  772. nBits = 36;
  773. else
  774. nBits = 32;
  775. vchRet.push_back(nClass);
  776. while (nBits >= 8)
  777. {
  778. vchRet.push_back(GetByte(15 - nStartByte));
  779. nStartByte++;
  780. nBits -= 8;
  781. }
  782. if (nBits > 0)
  783. vchRet.push_back(GetByte(15 - nStartByte) | ((1 << nBits) - 1));
  784. return vchRet;
  785. }
  786. uint64 CNetAddr::GetHash() const
  787. {
  788. uint256 hash = Hash(&ip[0], &ip[16]);
  789. uint64 nRet;
  790. memcpy(&nRet, &hash, sizeof(nRet));
  791. return nRet;
  792. }
  793. void CNetAddr::print() const
  794. {
  795. printf("CNetAddr(%s)\n", ToString().c_str());
  796. }
  797. static const int NET_UNKNOWN = NET_MAX + 0;
  798. static const int NET_TEREDO = NET_MAX + 1;
  799. int static GetExtNetwork(const CNetAddr *addr)
  800. {
  801. if (addr == NULL)
  802. return NET_UNKNOWN;
  803. if (addr->IsRFC4380())
  804. return NET_TEREDO;
  805. return addr->GetNetwork();
  806. }
  807. int CNetAddr::GetReachabilityFrom(const CNetAddr *paddrPartner) const
  808. {
  809. enum Reachability {
  810. REACH_UNREACHABLE,
  811. REACH_DEFAULT,
  812. REACH_TEREDO,
  813. REACH_IPV6_WEAK,
  814. REACH_IPV4,
  815. REACH_IPV6_STRONG,
  816. REACH_PRIVATE
  817. };
  818. if (!IsRoutable())
  819. return REACH_UNREACHABLE;
  820. int ourNet = GetExtNetwork(this);
  821. int theirNet = GetExtNetwork(paddrPartner);
  822. bool fTunnel = IsRFC3964() || IsRFC6052() || IsRFC6145();
  823. switch(theirNet) {
  824. case NET_IPV4:
  825. switch(ourNet) {
  826. default: return REACH_DEFAULT;
  827. case NET_IPV4: return REACH_IPV4;
  828. }
  829. case NET_IPV6:
  830. switch(ourNet) {
  831. default: return REACH_DEFAULT;
  832. case NET_TEREDO: return REACH_TEREDO;
  833. case NET_IPV4: return REACH_IPV4;
  834. case NET_IPV6: return fTunnel ? REACH_IPV6_WEAK : REACH_IPV6_STRONG; // only prefer giving our IPv6 address if it's not tunnelled
  835. }
  836. case NET_TOR:
  837. switch(ourNet) {
  838. default: return REACH_DEFAULT;
  839. case NET_IPV4: return REACH_IPV4; // Tor users can connect to IPv4 as well
  840. case NET_TOR: return REACH_PRIVATE;
  841. }
  842. case NET_I2P:
  843. switch(ourNet) {
  844. default: return REACH_DEFAULT;
  845. case NET_I2P: return REACH_PRIVATE;
  846. }
  847. case NET_TEREDO:
  848. switch(ourNet) {
  849. default: return REACH_DEFAULT;
  850. case NET_TEREDO: return REACH_TEREDO;
  851. case NET_IPV6: return REACH_IPV6_WEAK;
  852. case NET_IPV4: return REACH_IPV4;
  853. }
  854. case NET_UNKNOWN:
  855. case NET_UNROUTABLE:
  856. default:
  857. switch(ourNet) {
  858. default: return REACH_DEFAULT;
  859. case NET_TEREDO: return REACH_TEREDO;
  860. case NET_IPV6: return REACH_IPV6_WEAK;
  861. case NET_IPV4: return REACH_IPV4;
  862. case NET_I2P: return REACH_PRIVATE; // assume connections from unroutable addresses are
  863. case NET_TOR: return REACH_PRIVATE; // either from Tor/I2P, or don't care about our address
  864. }
  865. }
  866. }
  867. void CService::Init()
  868. {
  869. port = 0;
  870. }
  871. CService::CService()
  872. {
  873. Init();
  874. }
  875. CService::CService(const CNetAddr& cip, unsigned short portIn) : CNetAddr(cip), port(portIn)
  876. {
  877. }
  878. CService::CService(const struct in_addr& ipv4Addr, unsigned short portIn) : CNetAddr(ipv4Addr), port(portIn)
  879. {
  880. }
  881. #ifdef USE_IPV6
  882. CService::CService(const struct in6_addr& ipv6Addr, unsigned short portIn) : CNetAddr(ipv6Addr), port(portIn)
  883. {
  884. }
  885. #endif
  886. CService::CService(const struct sockaddr_in& addr) : CNetAddr(addr.sin_addr), port(ntohs(addr.sin_port))
  887. {
  888. assert(addr.sin_family == AF_INET);
  889. }
  890. #ifdef USE_IPV6
  891. CService::CService(const struct sockaddr_in6 &addr) : CNetAddr(addr.sin6_addr), port(ntohs(addr.sin6_port))
  892. {
  893. assert(addr.sin6_family == AF_INET6);
  894. }
  895. #endif
  896. bool CService::SetSockAddr(const struct sockaddr *paddr)
  897. {
  898. switch (paddr->sa_family) {
  899. case AF_INET:
  900. *this = CService(*(const struct sockaddr_in*)paddr);
  901. return true;
  902. #ifdef USE_IPV6
  903. case AF_INET6:
  904. *this = CService(*(const struct sockaddr_in6*)paddr);
  905. return true;
  906. #endif
  907. default:
  908. return false;
  909. }
  910. }
  911. CService::CService(const char *pszIpPort, bool fAllowLookup)
  912. {
  913. Init();
  914. CService ip;
  915. if (Lookup(pszIpPort, ip, 0, fAllowLookup))
  916. *this = ip;
  917. }
  918. CService::CService(const char *pszIpPort, int portDefault, bool fAllowLookup)
  919. {
  920. Init();
  921. CService ip;
  922. if (Lookup(pszIpPort, ip, portDefault, fAllowLookup))
  923. *this = ip;
  924. }
  925. CService::CService(const std::string &strIpPort, bool fAllowLookup)
  926. {
  927. Init();
  928. CService ip;
  929. if (Lookup(strIpPort.c_str(), ip, 0, fAllowLookup))
  930. *this = ip;
  931. }
  932. CService::CService(const std::string &strIpPort, int portDefault, bool fAllowLookup)
  933. {
  934. Init();
  935. CService ip;
  936. if (Lookup(strIpPort.c_str(), ip, portDefault, fAllowLookup))
  937. *this = ip;
  938. }
  939. unsigned short CService::GetPort() const
  940. {
  941. return port;
  942. }
  943. bool operator==(const CService& a, const CService& b)
  944. {
  945. return (CNetAddr)a == (CNetAddr)b && a.port == b.port;
  946. }
  947. bool operator!=(const CService& a, const CService& b)
  948. {
  949. return (CNetAddr)a != (CNetAddr)b || a.port != b.port;
  950. }
  951. bool operator<(const CService& a, const CService& b)
  952. {
  953. return (CNetAddr)a < (CNetAddr)b || ((CNetAddr)a == (CNetAddr)b && a.port < b.port);
  954. }
  955. bool CService::GetSockAddr(struct sockaddr* paddr, socklen_t *addrlen) const
  956. {
  957. if (IsIPv4()) {
  958. if (*addrlen < (socklen_t)sizeof(struct sockaddr_in))
  959. return false;
  960. *addrlen = sizeof(struct sockaddr_in);
  961. struct sockaddr_in *paddrin = (struct sockaddr_in*)paddr;
  962. memset(paddrin, 0, *addrlen);
  963. if (!GetInAddr(&paddrin->sin_addr))
  964. return false;
  965. paddrin->sin_family = AF_INET;
  966. paddrin->sin_port = htons(port);
  967. return true;
  968. }
  969. #ifdef USE_IPV6
  970. if (IsIPv6()) {
  971. if (*addrlen < (socklen_t)sizeof(struct sockaddr_in6))
  972. return false;
  973. *addrlen = sizeof(struct sockaddr_in6);
  974. struct sockaddr_in6 *paddrin6 = (struct sockaddr_in6*)paddr;
  975. memset(paddrin6, 0, *addrlen);
  976. if (!GetIn6Addr(&paddrin6->sin6_addr))
  977. return false;
  978. paddrin6->sin6_family = AF_INET6;
  979. paddrin6->sin6_port = htons(port);
  980. return true;
  981. }
  982. #endif
  983. return false;
  984. }
  985. std::vector<unsigned char> CService::GetKey() const
  986. {
  987. std::vector<unsigned char> vKey;
  988. vKey.resize(18);
  989. memcpy(&vKey[0], ip, 16);
  990. vKey[16] = port / 0x100;
  991. vKey[17] = port & 0x0FF;
  992. return vKey;
  993. }
  994. std::string CService::ToStringPort() const
  995. {
  996. return strprintf("%u", port);
  997. }
  998. std::string CService::ToStringIPPort() const
  999. {
  1000. if (IsIPv4() || IsTor() || IsI2P()) {
  1001. return ToStringIP() + ":" + ToStringPort();
  1002. } else {
  1003. return "[" + ToStringIP() + "]:" + ToStringPort();
  1004. }
  1005. }
  1006. std::string CService::ToString() const
  1007. {
  1008. return ToStringIPPort();
  1009. }
  1010. void CService::print() const
  1011. {
  1012. printf("CService(%s)\n", ToString().c_str());
  1013. }
  1014. void CService::SetPort(unsigned short portIn)
  1015. {
  1016. port = portIn;
  1017. }