mirror of
https://github.com/superseriousbusiness/gotosocial.git
synced 2024-12-27 17:46:31 +00:00
558b448ab2
In the previous changes that expanded the IPv4 and IPv6 deny lists based on the IANA registries we inadvertently added a number of duplicates. This is unnecessary as they're already caught by larger prefixes and means there's less entries to scan. This change removes all prefixes that are subnets of other prefixes.
104 lines
4 KiB
Go
104 lines
4 KiB
Go
/*
|
|
GoToSocial
|
|
Copyright (C) 2021-2022 GoToSocial Authors admin@gotosocial.org
|
|
|
|
This program is free software: you can redistribute it and/or modify
|
|
it under the terms of the GNU Affero General Public License as published by
|
|
the Free Software Foundation, either version 3 of the License, or
|
|
(at your option) any later version.
|
|
|
|
This program is distributed in the hope that it will be useful,
|
|
but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
GNU Affero General Public License for more details.
|
|
|
|
You should have received a copy of the GNU Affero General Public License
|
|
along with this program. If not, see <http://www.gnu.org/licenses/>.
|
|
*/
|
|
|
|
package netutil
|
|
|
|
import (
|
|
"net/netip"
|
|
)
|
|
|
|
var (
|
|
// IPv6Reserved contains IPv6 reserved IP prefixes.
|
|
// https://www.iana.org/assignments/iana-ipv6-special-registry/iana-ipv6-special-registry.xhtml
|
|
IPv6Reserved = [...]netip.Prefix{
|
|
netip.MustParsePrefix("::1/128"), // Loopback
|
|
netip.MustParsePrefix("::/128"), // Unspecified address
|
|
netip.MustParsePrefix("::ffff:0:0/96"), // IPv4-mapped address
|
|
netip.MustParsePrefix("64:ff9b::/96"), // IPv4/IPv6 translation, RFC 6052
|
|
netip.MustParsePrefix("64:ff9b:1::/48"), // IPv4/IPv6 translation, RFC 8215
|
|
netip.MustParsePrefix("100::/64"), // Discard prefix, RFC 6666
|
|
netip.MustParsePrefix("2001::/23"), // IETF Protocol Assignments, RFC 2928
|
|
netip.MustParsePrefix("2001:db8::/32"), // Test, doc, examples
|
|
netip.MustParsePrefix("2002::/16"), // 6to4
|
|
netip.MustParsePrefix("2620:4f:8000::/48"), // Direct Delegation AS112 Service, RFC 7534
|
|
netip.MustParsePrefix("fc00::/7"), // Unique Local
|
|
netip.MustParsePrefix("fe80::/10"), // Link-local
|
|
netip.MustParsePrefix("fec0::/10"), // Site-local, deprecated
|
|
netip.MustParsePrefix("ff00::/8"), // Multicast
|
|
}
|
|
|
|
// IPv4Reserved contains IPv4 reserved IP prefixes.
|
|
// https://www.iana.org/assignments/iana-ipv4-special-registry/iana-ipv4-special-registry.xhtml
|
|
IPv4Reserved = [...]netip.Prefix{
|
|
netip.MustParsePrefix("0.0.0.0/8"), // Current network
|
|
netip.MustParsePrefix("10.0.0.0/8"), // Private
|
|
netip.MustParsePrefix("100.64.0.0/10"), // RFC6598
|
|
netip.MustParsePrefix("127.0.0.0/8"), // Loopback
|
|
netip.MustParsePrefix("169.254.0.0/16"), // Link-local
|
|
netip.MustParsePrefix("172.16.0.0/12"), // Private
|
|
netip.MustParsePrefix("192.0.0.0/24"), // RFC6890
|
|
netip.MustParsePrefix("192.0.2.0/24"), // Test, doc, examples
|
|
netip.MustParsePrefix("192.31.196.0/24"), // AS112-v4, RFC 7535
|
|
netip.MustParsePrefix("192.52.193.0/24"), // AMT, RFC 7450
|
|
netip.MustParsePrefix("192.88.99.0/24"), // IPv6 to IPv4 relay
|
|
netip.MustParsePrefix("192.168.0.0/16"), // Private
|
|
netip.MustParsePrefix("192.175.48.0/24"), // Direct Delegation AS112 Service, RFC 7534
|
|
netip.MustParsePrefix("198.18.0.0/15"), // Benchmarking tests
|
|
netip.MustParsePrefix("198.51.100.0/24"), // Test, doc, examples
|
|
netip.MustParsePrefix("203.0.113.0/24"), // Test, doc, examples
|
|
netip.MustParsePrefix("224.0.0.0/4"), // Multicast
|
|
netip.MustParsePrefix("240.0.0.0/4"), // Reserved (includes broadcast / 255.255.255.255)
|
|
}
|
|
)
|
|
|
|
// ValidateAddr will parse a netip.AddrPort from string, and return the result of ValidateIP() on addr.
|
|
func ValidateAddr(s string) bool {
|
|
ipport, err := netip.ParseAddrPort(s)
|
|
if err != nil {
|
|
return false
|
|
}
|
|
return ValidateIP(ipport.Addr())
|
|
}
|
|
|
|
// ValidateIP returns whether IP is an IPv4/6 address in non-reserved, public ranges.
|
|
func ValidateIP(ip netip.Addr) bool {
|
|
switch {
|
|
// IPv4: check if IPv4 in reserved nets
|
|
case ip.Is4():
|
|
for _, reserved := range IPv4Reserved {
|
|
if reserved.Contains(ip) {
|
|
return false
|
|
}
|
|
}
|
|
return true
|
|
|
|
// IPv6: check if IP in IPv6 reserved nets
|
|
case ip.Is6():
|
|
for _, reserved := range IPv6Reserved {
|
|
if reserved.Contains(ip) {
|
|
return false
|
|
}
|
|
}
|
|
return true
|
|
|
|
// Assume malicious by default
|
|
default:
|
|
return false
|
|
}
|
|
}
|