2015-05-01 08:28:01 +02:00
|
|
|
// Copyright (c) 2013-2014 The btcsuite developers
|
2014-07-06 15:47:42 +02:00
|
|
|
// Use of this source code is governed by an ISC
|
|
|
|
// license that can be found in the LICENSE file.
|
|
|
|
|
|
|
|
package addrmgr
|
|
|
|
|
|
|
|
import (
|
|
|
|
"fmt"
|
|
|
|
"net"
|
|
|
|
|
2015-02-05 22:16:39 +01:00
|
|
|
"github.com/btcsuite/btcd/wire"
|
2014-07-06 15:47:42 +02:00
|
|
|
)
|
|
|
|
|
|
|
|
var (
|
2014-09-08 21:19:47 +02:00
|
|
|
// rfc1918Nets specifies the IPv4 private address blocks as defined by
|
2014-07-06 15:47:42 +02:00
|
|
|
// by RFC1918 (10.0.0.0/8, 172.16.0.0/12, and 192.168.0.0/16).
|
|
|
|
rfc1918Nets = []net.IPNet{
|
|
|
|
ipNet("10.0.0.0", 8, 32),
|
|
|
|
ipNet("172.16.0.0", 12, 32),
|
|
|
|
ipNet("192.168.0.0", 16, 32),
|
|
|
|
}
|
|
|
|
|
2014-12-16 19:02:39 +01:00
|
|
|
// rfc2544Net specifies the the IPv4 block as defined by RFC2544
|
|
|
|
// (198.18.0.0/15)
|
|
|
|
rfc2544Net = ipNet("198.18.0.0", 15, 32)
|
|
|
|
|
2014-07-06 15:47:42 +02:00
|
|
|
// rfc3849Net specifies the IPv6 documentation address block as defined
|
|
|
|
// by RFC3849 (2001:DB8::/32).
|
|
|
|
rfc3849Net = ipNet("2001:DB8::", 32, 128)
|
|
|
|
|
|
|
|
// rfc3927Net specifies the IPv4 auto configuration address block as
|
|
|
|
// defined by RFC3927 (169.254.0.0/16).
|
|
|
|
rfc3927Net = ipNet("169.254.0.0", 16, 32)
|
|
|
|
|
|
|
|
// rfc3964Net specifies the IPv6 to IPv4 encapsulation address block as
|
|
|
|
// defined by RFC3964 (2002::/16).
|
|
|
|
rfc3964Net = ipNet("2002::", 16, 128)
|
|
|
|
|
|
|
|
// rfc4193Net specifies the IPv6 unique local address block as defined
|
|
|
|
// by RFC4193 (FC00::/7).
|
|
|
|
rfc4193Net = ipNet("FC00::", 7, 128)
|
|
|
|
|
|
|
|
// rfc4380Net specifies the IPv6 teredo tunneling over UDP address block
|
|
|
|
// as defined by RFC4380 (2001::/32).
|
|
|
|
rfc4380Net = ipNet("2001::", 32, 128)
|
|
|
|
|
|
|
|
// rfc4843Net specifies the IPv6 ORCHID address block as defined by
|
|
|
|
// RFC4843 (2001:10::/28).
|
|
|
|
rfc4843Net = ipNet("2001:10::", 28, 128)
|
|
|
|
|
|
|
|
// rfc4862Net specifies the IPv6 stateless address autoconfiguration
|
|
|
|
// address block as defined by RFC4862 (FE80::/64).
|
|
|
|
rfc4862Net = ipNet("FE80::", 64, 128)
|
|
|
|
|
2014-12-16 19:02:39 +01:00
|
|
|
// rfc5737Net specifies the IPv4 documentation address blocks as defined
|
|
|
|
// by RFC5737 (192.0.2.0/24, 198.51.100.0/24, 203.0.113.0/24)
|
|
|
|
rfc5737Net = []net.IPNet{
|
|
|
|
ipNet("192.0.2.0", 24, 32),
|
|
|
|
ipNet("198.51.100.0", 24, 32),
|
|
|
|
ipNet("203.0.113.0", 24, 32),
|
|
|
|
}
|
|
|
|
|
2014-07-06 15:47:42 +02:00
|
|
|
// rfc6052Net specifies the IPv6 well-known prefix address block as
|
|
|
|
// defined by RFC6052 (64:FF9B::/96).
|
|
|
|
rfc6052Net = ipNet("64:FF9B::", 96, 128)
|
|
|
|
|
|
|
|
// rfc6145Net specifies the IPv6 to IPv4 translated address range as
|
|
|
|
// defined by RFC6145 (::FFFF:0:0:0/96).
|
|
|
|
rfc6145Net = ipNet("::FFFF:0:0:0", 96, 128)
|
|
|
|
|
2014-12-16 19:02:39 +01:00
|
|
|
// rfc6598Net specifies the IPv4 block as defined by RFC6598 (100.64.0.0/10)
|
|
|
|
rfc6598Net = ipNet("100.64.0.0", 10, 32)
|
|
|
|
|
2014-07-06 15:47:42 +02:00
|
|
|
// onionCatNet defines the IPv6 address block used to support Tor.
|
|
|
|
// bitcoind encodes a .onion address as a 16 byte number by decoding the
|
|
|
|
// address prior to the .onion (i.e. the key hash) base32 into a ten
|
|
|
|
// byte number. It then stores the first 6 bytes of the address as
|
|
|
|
// 0xfd, 0x87, 0xd8, 0x7e, 0xeb, 0x43.
|
|
|
|
//
|
|
|
|
// This is the same range used by OnionCat, which is part part of the
|
|
|
|
// RFC4193 unique local IPv6 range.
|
|
|
|
//
|
|
|
|
// In summary the format is:
|
|
|
|
// { magic 6 bytes, 10 bytes base32 decode of key hash }
|
|
|
|
onionCatNet = ipNet("fd87:d87e:eb43::", 48, 128)
|
|
|
|
|
|
|
|
// zero4Net defines the IPv4 address block for address staring with 0
|
|
|
|
// (0.0.0.0/8).
|
|
|
|
zero4Net = ipNet("0.0.0.0", 8, 32)
|
|
|
|
|
|
|
|
// heNet defines the Hurricane Electric IPv6 address block.
|
|
|
|
heNet = ipNet("2001:470::", 32, 128)
|
|
|
|
)
|
|
|
|
|
|
|
|
// ipNet returns a net.IPNet struct given the passed IP address string, number
|
|
|
|
// of one bits to include at the start of the mask, and the total number of bits
|
|
|
|
// for the mask.
|
|
|
|
func ipNet(ip string, ones, bits int) net.IPNet {
|
|
|
|
return net.IPNet{IP: net.ParseIP(ip), Mask: net.CIDRMask(ones, bits)}
|
|
|
|
}
|
|
|
|
|
|
|
|
// IsIPv4 returns whether or not the given address is an IPv4 address.
|
2015-02-05 22:16:39 +01:00
|
|
|
func IsIPv4(na *wire.NetAddress) bool {
|
2014-07-06 15:47:42 +02:00
|
|
|
return na.IP.To4() != nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// IsLocal returns whether or not the given address is a local address.
|
2015-02-05 22:16:39 +01:00
|
|
|
func IsLocal(na *wire.NetAddress) bool {
|
2014-07-06 15:47:42 +02:00
|
|
|
return na.IP.IsLoopback() || zero4Net.Contains(na.IP)
|
|
|
|
}
|
|
|
|
|
|
|
|
// IsOnionCatTor returns whether or not the passed address is in the IPv6 range
|
|
|
|
// used by bitcoin to support Tor (fd87:d87e:eb43::/48). Note that this range
|
|
|
|
// is the same range used by OnionCat, which is part of the RFC4193 unique local
|
|
|
|
// IPv6 range.
|
2015-02-05 22:16:39 +01:00
|
|
|
func IsOnionCatTor(na *wire.NetAddress) bool {
|
2014-07-06 15:47:42 +02:00
|
|
|
return onionCatNet.Contains(na.IP)
|
|
|
|
}
|
|
|
|
|
|
|
|
// IsRFC1918 returns whether or not the passed address is part of the IPv4
|
|
|
|
// private network address space as defined by RFC1918 (10.0.0.0/8,
|
|
|
|
// 172.16.0.0/12, or 192.168.0.0/16).
|
2015-02-05 22:16:39 +01:00
|
|
|
func IsRFC1918(na *wire.NetAddress) bool {
|
2014-07-06 15:47:42 +02:00
|
|
|
for _, rfc := range rfc1918Nets {
|
|
|
|
if rfc.Contains(na.IP) {
|
|
|
|
return true
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
|
2014-12-16 19:02:39 +01:00
|
|
|
// IsRFC2544 returns whether or not the passed address is part of the IPv4
|
|
|
|
// address space as defined by RFC2544 (198.18.0.0/15)
|
2015-02-05 22:16:39 +01:00
|
|
|
func IsRFC2544(na *wire.NetAddress) bool {
|
2014-12-16 19:02:39 +01:00
|
|
|
return rfc2544Net.Contains(na.IP)
|
|
|
|
}
|
|
|
|
|
2014-07-06 15:47:42 +02:00
|
|
|
// IsRFC3849 returns whether or not the passed address is part of the IPv6
|
|
|
|
// documentation range as defined by RFC3849 (2001:DB8::/32).
|
2015-02-05 22:16:39 +01:00
|
|
|
func IsRFC3849(na *wire.NetAddress) bool {
|
2014-07-06 15:47:42 +02:00
|
|
|
return rfc3849Net.Contains(na.IP)
|
|
|
|
}
|
|
|
|
|
|
|
|
// IsRFC3927 returns whether or not the passed address is part of the IPv4
|
|
|
|
// autoconfiguration range as defined by RFC3927 (169.254.0.0/16).
|
2015-02-05 22:16:39 +01:00
|
|
|
func IsRFC3927(na *wire.NetAddress) bool {
|
2014-07-06 15:47:42 +02:00
|
|
|
return rfc3927Net.Contains(na.IP)
|
|
|
|
}
|
|
|
|
|
|
|
|
// IsRFC3964 returns whether or not the passed address is part of the IPv6 to
|
|
|
|
// IPv4 encapsulation range as defined by RFC3964 (2002::/16).
|
2015-02-05 22:16:39 +01:00
|
|
|
func IsRFC3964(na *wire.NetAddress) bool {
|
2014-07-06 15:47:42 +02:00
|
|
|
return rfc3964Net.Contains(na.IP)
|
|
|
|
}
|
|
|
|
|
|
|
|
// IsRFC4193 returns whether or not the passed address is part of the IPv6
|
|
|
|
// unique local range as defined by RFC4193 (FC00::/7).
|
2015-02-05 22:16:39 +01:00
|
|
|
func IsRFC4193(na *wire.NetAddress) bool {
|
2014-07-06 15:47:42 +02:00
|
|
|
return rfc4193Net.Contains(na.IP)
|
|
|
|
}
|
|
|
|
|
|
|
|
// IsRFC4380 returns whether or not the passed address is part of the IPv6
|
|
|
|
// teredo tunneling over UDP range as defined by RFC4380 (2001::/32).
|
2015-02-05 22:16:39 +01:00
|
|
|
func IsRFC4380(na *wire.NetAddress) bool {
|
2014-07-06 15:47:42 +02:00
|
|
|
return rfc4380Net.Contains(na.IP)
|
|
|
|
}
|
|
|
|
|
|
|
|
// IsRFC4843 returns whether or not the passed address is part of the IPv6
|
|
|
|
// ORCHID range as defined by RFC4843 (2001:10::/28).
|
2015-02-05 22:16:39 +01:00
|
|
|
func IsRFC4843(na *wire.NetAddress) bool {
|
2014-07-06 15:47:42 +02:00
|
|
|
return rfc4843Net.Contains(na.IP)
|
|
|
|
}
|
|
|
|
|
|
|
|
// IsRFC4862 returns whether or not the passed address is part of the IPv6
|
|
|
|
// stateless address autoconfiguration range as defined by RFC4862 (FE80::/64).
|
2015-02-05 22:16:39 +01:00
|
|
|
func IsRFC4862(na *wire.NetAddress) bool {
|
2014-07-06 15:47:42 +02:00
|
|
|
return rfc4862Net.Contains(na.IP)
|
|
|
|
}
|
|
|
|
|
2014-12-16 19:02:39 +01:00
|
|
|
// IsRFC5737 returns whether or not the passed address is part of the IPv4
|
|
|
|
// documentation address space as defined by RFC5737 (192.0.2.0/24,
|
|
|
|
// 198.51.100.0/24, 203.0.113.0/24)
|
2015-02-05 22:16:39 +01:00
|
|
|
func IsRFC5737(na *wire.NetAddress) bool {
|
2014-12-16 19:02:39 +01:00
|
|
|
for _, rfc := range rfc5737Net {
|
|
|
|
if rfc.Contains(na.IP) {
|
|
|
|
return true
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
|
2014-07-06 15:47:42 +02:00
|
|
|
// IsRFC6052 returns whether or not the passed address is part of the IPv6
|
|
|
|
// well-known prefix range as defined by RFC6052 (64:FF9B::/96).
|
2015-02-05 22:16:39 +01:00
|
|
|
func IsRFC6052(na *wire.NetAddress) bool {
|
2014-07-06 15:47:42 +02:00
|
|
|
return rfc6052Net.Contains(na.IP)
|
|
|
|
}
|
|
|
|
|
2014-12-16 19:02:39 +01:00
|
|
|
// IsRFC6145 returns whether or not the passed address is part of the IPv6 to
|
2014-07-06 15:47:42 +02:00
|
|
|
// IPv4 translated address range as defined by RFC6145 (::FFFF:0:0:0/96).
|
2015-02-05 22:16:39 +01:00
|
|
|
func IsRFC6145(na *wire.NetAddress) bool {
|
2014-07-06 15:47:42 +02:00
|
|
|
return rfc6145Net.Contains(na.IP)
|
|
|
|
}
|
|
|
|
|
2014-12-16 19:02:39 +01:00
|
|
|
// IsRFC6598 returns whether or not the passed address is part of the IPv4
|
|
|
|
// shared address space specified by RFC6598 (100.64.0.0/10)
|
2015-02-05 22:16:39 +01:00
|
|
|
func IsRFC6598(na *wire.NetAddress) bool {
|
2014-12-16 19:02:39 +01:00
|
|
|
return rfc6598Net.Contains(na.IP)
|
|
|
|
}
|
|
|
|
|
2014-07-06 15:47:42 +02:00
|
|
|
// IsValid returns whether or not the passed address is valid. The address is
|
|
|
|
// considered invalid under the following circumstances:
|
|
|
|
// IPv4: It is either a zero or all bits set address.
|
|
|
|
// IPv6: It is either a zero or RFC3849 documentation address.
|
2015-02-05 22:16:39 +01:00
|
|
|
func IsValid(na *wire.NetAddress) bool {
|
2014-07-06 15:47:42 +02:00
|
|
|
// IsUnspecified returns if address is 0, so only all bits set, and
|
|
|
|
// RFC3849 need to be explicitly checked.
|
|
|
|
return na.IP != nil && !(na.IP.IsUnspecified() ||
|
|
|
|
na.IP.Equal(net.IPv4bcast))
|
|
|
|
}
|
|
|
|
|
|
|
|
// IsRoutable returns whether or not the passed address is routable over
|
|
|
|
// the public internet. This is true as long as the address is valid and is not
|
|
|
|
// in any reserved ranges.
|
2015-02-05 22:16:39 +01:00
|
|
|
func IsRoutable(na *wire.NetAddress) bool {
|
2014-12-16 19:02:39 +01:00
|
|
|
return IsValid(na) && !(IsRFC1918(na) || IsRFC2544(na) ||
|
|
|
|
IsRFC3927(na) || IsRFC4862(na) || IsRFC3849(na) ||
|
|
|
|
IsRFC4843(na) || IsRFC5737(na) || IsRFC6598(na) ||
|
2014-07-06 15:47:42 +02:00
|
|
|
IsLocal(na) || (IsRFC4193(na) && !IsOnionCatTor(na)))
|
|
|
|
}
|
|
|
|
|
|
|
|
// GroupKey returns a string representing the network group an address is part
|
|
|
|
// of. This is the /16 for IPv4, the /32 (/36 for he.net) for IPv6, the string
|
|
|
|
// "local" for a local address, the string "tor:key" where key is the /4 of the
|
|
|
|
// onion address for tor address, and the string "unroutable" for an unroutable
|
|
|
|
// address.
|
2015-02-05 22:16:39 +01:00
|
|
|
func GroupKey(na *wire.NetAddress) string {
|
2014-07-06 15:47:42 +02:00
|
|
|
if IsLocal(na) {
|
|
|
|
return "local"
|
|
|
|
}
|
|
|
|
if !IsRoutable(na) {
|
|
|
|
return "unroutable"
|
|
|
|
}
|
|
|
|
if IsIPv4(na) {
|
|
|
|
return na.IP.Mask(net.CIDRMask(16, 32)).String()
|
|
|
|
}
|
|
|
|
if IsRFC6145(na) || IsRFC6052(na) {
|
|
|
|
// last four bytes are the ip address
|
2016-11-03 00:18:48 +01:00
|
|
|
ip := na.IP[12:16]
|
2014-07-06 15:47:42 +02:00
|
|
|
return ip.Mask(net.CIDRMask(16, 32)).String()
|
|
|
|
}
|
|
|
|
|
|
|
|
if IsRFC3964(na) {
|
2016-11-03 00:18:48 +01:00
|
|
|
ip := na.IP[2:6]
|
2014-07-06 15:47:42 +02:00
|
|
|
return ip.Mask(net.CIDRMask(16, 32)).String()
|
|
|
|
|
|
|
|
}
|
|
|
|
if IsRFC4380(na) {
|
|
|
|
// teredo tunnels have the last 4 bytes as the v4 address XOR
|
|
|
|
// 0xff.
|
|
|
|
ip := net.IP(make([]byte, 4))
|
|
|
|
for i, byte := range na.IP[12:16] {
|
|
|
|
ip[i] = byte ^ 0xff
|
|
|
|
}
|
|
|
|
return ip.Mask(net.CIDRMask(16, 32)).String()
|
|
|
|
}
|
|
|
|
if IsOnionCatTor(na) {
|
|
|
|
// group is keyed off the first 4 bits of the actual onion key.
|
|
|
|
return fmt.Sprintf("tor:%d", na.IP[6]&((1<<4)-1))
|
|
|
|
}
|
|
|
|
|
|
|
|
// OK, so now we know ourselves to be a IPv6 address.
|
|
|
|
// bitcoind uses /32 for everything, except for Hurricane Electric's
|
|
|
|
// (he.net) IP range, which it uses /36 for.
|
|
|
|
bits := 32
|
|
|
|
if heNet.Contains(na.IP) {
|
|
|
|
bits = 36
|
|
|
|
}
|
|
|
|
|
|
|
|
return na.IP.Mask(net.CIDRMask(bits, 128)).String()
|
|
|
|
}
|