File: vpnservnetblock.hpp

package info (click to toggle)
openvpn3-client 25%2Bdfsg-3
  • links: PTS, VCS
  • area: main
  • in suites: forky, sid
  • size: 19,276 kB
  • sloc: cpp: 190,085; python: 7,218; ansic: 1,866; sh: 1,361; java: 402; lisp: 81; makefile: 17
file content (257 lines) | stat: -rw-r--r-- 7,170 bytes parent folder | download
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
//    OpenVPN -- An application to securely tunnel IP networks
//               over a single port, with support for SSL/TLS-based
//               session authentication and key exchange,
//               packet encryption, packet authentication, and
//               packet compression.
//
//    Copyright (C) 2012- OpenVPN Inc.
//
//    SPDX-License-Identifier: MPL-2.0 OR AGPL-3.0-only WITH openvpn3-openssl-exception
//

#ifndef OPENVPN_SERVER_VPNSERVNETBLOCK_H
#define OPENVPN_SERVER_VPNSERVNETBLOCK_H

#include <sstream>

#include <openvpn/common/size.hpp>
#include <openvpn/common/exception.hpp>
#include <openvpn/common/options.hpp>
#include <openvpn/addr/route.hpp>
#include <openvpn/addr/range.hpp>

namespace openvpn {

class VPNServerNetblock
{
  public:
    OPENVPN_EXCEPTION(vpn_serv_netblock);

    struct Netblock
    {
        Netblock()
        {
        }

        Netblock(const IP::Route &route)
        {
            if (!route.is_canonical())
                throw vpn_serv_netblock("not canonical");
            if (route.host_bits() < 2)
                throw vpn_serv_netblock("need at least 4 addresses in netblock");
            net = route.addr;
            server_gw = net + 1;
            prefix_len = route.prefix_len;
        }

        // The Netblock constructor already sets the server
        // gateway to the .1 address of the subnet, but call
        // here to override that selection.
        void override_server_gw(const IP::Addr &gw)
        {
            if (!contains(gw))
                throw vpn_serv_netblock("override_server_gw: server gateway address is not contained by netblock");
            server_gw = gw;
        }

        bool defined() const
        {
            return net.defined();
        }

        IP::Addr netmask() const
        {
            return IP::Addr::netmask_from_prefix_len(net.version(), prefix_len);
        }

        bool contains(const IP::Addr &a) const
        {
            if (net.defined() && net.version() == a.version())
                return (a & netmask()) == net;
            else
                return false;
        }

        IP::Route route() const
        {
            return IP::Route(server_gw, prefix_len);
        }

        std::string to_string() const
        {
            return '[' + net.to_string() + '/' + std::to_string(prefix_len) + ',' + server_gw.to_string() + ']';
        }

        IP::Addr net;
        IP::Addr server_gw;
        unsigned int prefix_len = 0;
    };

    struct ClientNetblock : public Netblock
    {
        ClientNetblock()
        {
        }

        ClientNetblock(const IP::Route &route)
            : Netblock(route)
        {
            const size_t extent = route.extent();
            bcast = net + (extent - 1);
            clients = IP::Range(net + 2, extent - 3);
        }

        std::string to_string() const
        {
            return '[' + Netblock::to_string() + ','
                   + clients.to_string() + ','
                   + bcast.to_string() + ']';
        }

        IP::Range clients;
        IP::Addr bcast;
    };

    class PerThread
    {
        friend class VPNServerNetblock;

      public:
        const IP::Range &range4() const
        {
            return range4_;
        }

        bool range6_defined() const
        {
            return range6_.defined();
        }
        const IP::Range &range6() const
        {
            return range6_;
        }

      private:
        IP::Range range4_;
        IP::Range range6_;
    };

    VPNServerNetblock()
    {
    }

    VPNServerNetblock(const OptionList &opt,
                      const std::string &opt_name,
                      const bool ipv4_optional,
                      const unsigned int n_threads)
    {
        // ifconfig
        if (!ipv4_optional || opt.exists(opt_name))
        {
            const Option &o = opt.get(opt_name);
            const IP::Addr gw(o.get(1, 64), opt_name + " gateway");
            const IP::Addr nm(o.get(2, 64), opt_name + " netmask");
            IP::Route rt(gw, nm.prefix_len());
            if (rt.version() != IP::Addr::V4)
                throw vpn_serv_netblock(opt_name + " address is not IPv4");
            rt.force_canonical();
            snb4 = ClientNetblock(rt);
            if (snb4.server_gw != gw)
                throw vpn_serv_netblock(opt_name + " local gateway must be first usable address of subnet");
        }

        // ifconfig-ipv6
        {
            const Option *o = opt.get_ptr(opt_name + "-ipv6");
            if (o)
            {
                IP::Route rt(o->get(1, 64), opt_name + "-ipv6 network");
                if (rt.version() != IP::Addr::V6)
                    throw vpn_serv_netblock(opt_name + "-ipv6 network is not IPv6");
                if (!rt.is_canonical())
                    throw vpn_serv_netblock(opt_name + "-ipv6 network is not canonical");
                snb6 = ClientNetblock(rt);
            }
        }

        if (n_threads)
        {
            // IPv4 per-thread partition
            {
                IP::RangePartition rp(snb4.clients, n_threads);
                IP::Range crange;
                for (unsigned int i = 0; i < n_threads; ++i)
                {
                    if (!rp.next(crange))
                        throw vpn_serv_netblock(opt_name + " : unexpected ServerNetblock4 partition fail");
                    PerThread pt;
                    pt.range4_ = crange;
                    thr.push_back(pt);
                }
            }

            // IPv6 per-thread partition
            if (snb6.defined())
            {
                IP::RangePartition rp(snb6.clients, n_threads);
                IP::Range crange;
                for (unsigned int i = 0; i < n_threads; ++i)
                {
                    if (!rp.next(crange))
                        throw vpn_serv_netblock(opt_name + " : unexpected ServerNetblock6 partition fail");
                    thr[i].range6_ = crange;
                }
            }
        }
    }

    const ClientNetblock &netblock4() const
    {
        return snb4;
    }
    const ClientNetblock &netblock6() const
    {
        return snb6;
    }

    bool netblock_contains(const IP::Addr &a) const
    {
        return snb4.contains(a) || snb6.contains(a);
    }

    size_t size() const
    {
        return thr.size();
    }

    const PerThread &per_thread(const size_t index) const
    {
        return thr[index];
    }

    std::string to_string() const
    {
        std::ostringstream os;
        os << "IPv4: " << snb4.to_string() << std::endl;
        if (snb6.defined())
            os << "IPv6: " << snb6.to_string() << std::endl;
        for (size_t i = 0; i < thr.size(); ++i)
        {
            const PerThread &pt = thr[i];
            os << '[' << i << ']';
            os << " v4=" << pt.range4().to_string();
            if (pt.range6_defined())
                os << " v6=" << pt.range6().to_string();
            os << std::endl;
        }
        return os.str();
    }

  private:
    ClientNetblock snb4;
    ClientNetblock snb6;
    std::vector<PerThread> thr;
};
} // namespace openvpn

#endif