NetworkManager.cs 53 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929930931932933934935936937938939940941942943944945946947948949950951952953954955956957958959960961962963964965966967968969970971972973974975976977978979980981982983984985986987988989990991992993994995996997998999100010011002100310041005100610071008100910101011101210131014101510161017101810191020102110221023102410251026102710281029103010311032103310341035103610371038103910401041104210431044104510461047104810491050105110521053105410551056105710581059106010611062106310641065106610671068106910701071107210731074107510761077107810791080108110821083108410851086108710881089109010911092109310941095109610971098109911001101110211031104110511061107110811091110111111121113111411151116111711181119112011211122112311241125112611271128112911301131113211331134113511361137113811391140114111421143114411451146114711481149115011511152115311541155115611571158115911601161116211631164116511661167116811691170117111721173117411751176117711781179118011811182118311841185118611871188118911901191119211931194119511961197119811991200120112021203120412051206120712081209121012111212121312141215121612171218121912201221122212231224122512261227122812291230123112321233123412351236123712381239124012411242124312441245124612471248124912501251125212531254125512561257125812591260126112621263126412651266126712681269127012711272127312741275127612771278127912801281128212831284128512861287128812891290129112921293129412951296129712981299130013011302130313041305130613071308130913101311131213131314131513161317131813191320132113221323132413251326132713281329133013311332133313341335133613371338133913401341134213431344134513461347134813491350135113521353135413551356135713581359
  1. using System;
  2. using System.Collections.Generic;
  3. using System.Collections.ObjectModel;
  4. using System.Diagnostics.CodeAnalysis;
  5. using System.Globalization;
  6. using System.Linq;
  7. using System.Net;
  8. using System.Net.NetworkInformation;
  9. using System.Net.Sockets;
  10. using System.Threading.Tasks;
  11. using Jellyfin.Networking.Configuration;
  12. using MediaBrowser.Common.Configuration;
  13. using MediaBrowser.Common.Net;
  14. using Microsoft.AspNetCore.Http;
  15. using Microsoft.Extensions.Logging;
  16. namespace Jellyfin.Networking.Manager
  17. {
  18. /// <summary>
  19. /// Class to take care of network interface management.
  20. /// Note: The normal collection methods and properties will not work with Collection{IPObject}. <see cref="MediaBrowser.Common.Net.NetworkExtensions"/>.
  21. /// </summary>
  22. public class NetworkManager : INetworkManager, IDisposable
  23. {
  24. /// <summary>
  25. /// Contains the description of the interface along with its index.
  26. /// </summary>
  27. private readonly Dictionary<string, int> _interfaceNames;
  28. /// <summary>
  29. /// Threading lock for network properties.
  30. /// </summary>
  31. private readonly object _intLock = new object();
  32. /// <summary>
  33. /// List of all interface addresses and masks.
  34. /// </summary>
  35. private readonly Collection<IPObject> _interfaceAddresses;
  36. /// <summary>
  37. /// List of all interface MAC addresses.
  38. /// </summary>
  39. private readonly List<PhysicalAddress> _macAddresses;
  40. private readonly ILogger<NetworkManager> _logger;
  41. private readonly IConfigurationManager _configurationManager;
  42. private readonly object _eventFireLock;
  43. /// <summary>
  44. /// Holds the bind address overrides.
  45. /// </summary>
  46. private readonly Dictionary<IPNetAddress, string> _publishedServerUrls;
  47. /// <summary>
  48. /// Used to stop "event-racing conditions".
  49. /// </summary>
  50. private bool _eventfire;
  51. /// <summary>
  52. /// Unfiltered user defined LAN subnets. (<see cref="NetworkConfiguration.LocalNetworkSubnets"/>)
  53. /// or internal interface network subnets if undefined by user.
  54. /// </summary>
  55. private Collection<IPObject> _lanSubnets;
  56. /// <summary>
  57. /// User defined list of subnets to excluded from the LAN.
  58. /// </summary>
  59. private Collection<IPObject> _excludedSubnets;
  60. /// <summary>
  61. /// List of interface addresses to bind the WS.
  62. /// </summary>
  63. private Collection<IPObject> _bindAddresses;
  64. /// <summary>
  65. /// List of interface addresses to exclude from bind.
  66. /// </summary>
  67. private Collection<IPObject> _bindExclusions;
  68. /// <summary>
  69. /// Caches list of all internal filtered interface addresses and masks.
  70. /// </summary>
  71. private Collection<IPObject> _internalInterfaces;
  72. /// <summary>
  73. /// Flag set when no custom LAN has been defined in the configuration.
  74. /// </summary>
  75. private bool _usingPrivateAddresses;
  76. /// <summary>
  77. /// True if this object is disposed.
  78. /// </summary>
  79. private bool _disposed;
  80. /// <summary>
  81. /// Initializes a new instance of the <see cref="NetworkManager"/> class.
  82. /// </summary>
  83. /// <param name="configurationManager">IServerConfigurationManager instance.</param>
  84. /// <param name="logger">Logger to use for messages.</param>
  85. #pragma warning disable CS8618 // Non-nullable field is uninitialized. : Values are set in UpdateSettings function. Compiler doesn't yet recognise this.
  86. public NetworkManager(IConfigurationManager configurationManager, ILogger<NetworkManager> logger)
  87. {
  88. _logger = logger ?? throw new ArgumentNullException(nameof(logger));
  89. _configurationManager = configurationManager ?? throw new ArgumentNullException(nameof(configurationManager));
  90. _interfaceAddresses = new Collection<IPObject>();
  91. _macAddresses = new List<PhysicalAddress>();
  92. _interfaceNames = new Dictionary<string, int>();
  93. _publishedServerUrls = new Dictionary<IPNetAddress, string>();
  94. _eventFireLock = new object();
  95. UpdateSettings(_configurationManager.GetNetworkConfiguration());
  96. NetworkChange.NetworkAddressChanged += OnNetworkAddressChanged;
  97. NetworkChange.NetworkAvailabilityChanged += OnNetworkAvailabilityChanged;
  98. _configurationManager.NamedConfigurationUpdated += ConfigurationUpdated;
  99. }
  100. #pragma warning restore CS8618 // Non-nullable field is uninitialized.
  101. /// <summary>
  102. /// Event triggered on network changes.
  103. /// </summary>
  104. public event EventHandler? NetworkChanged;
  105. /// <summary>
  106. /// Gets or sets a value indicating whether testing is taking place.
  107. /// </summary>
  108. public static string MockNetworkSettings { get; set; } = string.Empty;
  109. /// <summary>
  110. /// Gets or sets a value indicating whether IP6 is enabled.
  111. /// </summary>
  112. public bool IsIP6Enabled { get; set; }
  113. /// <summary>
  114. /// Gets or sets a value indicating whether IP4 is enabled.
  115. /// </summary>
  116. public bool IsIP4Enabled { get; set; }
  117. /// <inheritdoc/>
  118. public Collection<IPObject> RemoteAddressFilter { get; private set; }
  119. /// <summary>
  120. /// Gets a value indicating whether is all IPv6 interfaces are trusted as internal.
  121. /// </summary>
  122. public bool TrustAllIP6Interfaces { get; internal set; }
  123. /// <summary>
  124. /// Gets the Published server override list.
  125. /// </summary>
  126. public Dictionary<IPNetAddress, string> PublishedServerUrls => _publishedServerUrls;
  127. /// <summary>
  128. /// Creates a new network collection.
  129. /// </summary>
  130. /// <param name="source">Items to assign the collection, or null.</param>
  131. /// <returns>The collection created.</returns>
  132. public static Collection<IPObject> CreateCollection(IEnumerable<IPObject>? source = null)
  133. {
  134. var result = new Collection<IPObject>();
  135. if (source != null)
  136. {
  137. foreach (var item in source)
  138. {
  139. result.AddItem(item);
  140. }
  141. }
  142. return result;
  143. }
  144. /// <inheritdoc/>
  145. public void Dispose()
  146. {
  147. Dispose(true);
  148. GC.SuppressFinalize(this);
  149. }
  150. /// <inheritdoc/>
  151. public IReadOnlyCollection<PhysicalAddress> GetMacAddresses()
  152. {
  153. // Populated in construction - so always has values.
  154. return _macAddresses;
  155. }
  156. /// <inheritdoc/>
  157. public bool IsGatewayInterface(IPObject? addressObj)
  158. {
  159. var address = addressObj?.Address ?? IPAddress.None;
  160. return _internalInterfaces.Any(i => i.Address.Equals(address) && i.Tag < 0);
  161. }
  162. /// <inheritdoc/>
  163. public bool IsGatewayInterface(IPAddress? addressObj)
  164. {
  165. return _internalInterfaces.Any(i => i.Address.Equals(addressObj ?? IPAddress.None) && i.Tag < 0);
  166. }
  167. /// <inheritdoc/>
  168. public Collection<IPObject> GetLoopbacks()
  169. {
  170. Collection<IPObject> nc = new Collection<IPObject>();
  171. if (IsIP4Enabled)
  172. {
  173. nc.AddItem(IPAddress.Loopback);
  174. }
  175. if (IsIP6Enabled)
  176. {
  177. nc.AddItem(IPAddress.IPv6Loopback);
  178. }
  179. return nc;
  180. }
  181. /// <inheritdoc/>
  182. public bool IsExcluded(IPAddress ip)
  183. {
  184. return _excludedSubnets.ContainsAddress(ip);
  185. }
  186. /// <inheritdoc/>
  187. public bool IsExcluded(EndPoint ip)
  188. {
  189. return ip != null && IsExcluded(((IPEndPoint)ip).Address);
  190. }
  191. /// <inheritdoc/>
  192. public Collection<IPObject> CreateIPCollection(string[] values, bool negated = false)
  193. {
  194. Collection<IPObject> col = new Collection<IPObject>();
  195. if (values == null)
  196. {
  197. return col;
  198. }
  199. for (int a = 0; a < values.Length; a++)
  200. {
  201. string v = values[a].Trim();
  202. try
  203. {
  204. if (v.StartsWith('!'))
  205. {
  206. if (negated)
  207. {
  208. AddToCollection(col, v[1..]);
  209. }
  210. }
  211. else if (!negated)
  212. {
  213. AddToCollection(col, v);
  214. }
  215. }
  216. catch (ArgumentException e)
  217. {
  218. _logger.LogWarning(e, "Ignoring LAN value {Value}.", v);
  219. }
  220. }
  221. return col;
  222. }
  223. /// <inheritdoc/>
  224. public Collection<IPObject> GetAllBindInterfaces(bool individualInterfaces = false)
  225. {
  226. int count = _bindAddresses.Count;
  227. if (count == 0)
  228. {
  229. if (_bindExclusions.Count > 0)
  230. {
  231. // Return all the interfaces except the ones specifically excluded.
  232. return _interfaceAddresses.Exclude(_bindExclusions);
  233. }
  234. if (individualInterfaces)
  235. {
  236. return new Collection<IPObject>(_interfaceAddresses);
  237. }
  238. // No bind address and no exclusions, so listen on all interfaces.
  239. Collection<IPObject> result = new Collection<IPObject>();
  240. if (IsIP6Enabled && IsIP4Enabled)
  241. {
  242. // Kestrel source code shows it uses Sockets.DualMode - so this also covers IPAddress.Any
  243. result.AddItem(IPAddress.IPv6Any);
  244. }
  245. else if (IsIP4Enabled)
  246. {
  247. result.AddItem(IPAddress.Any);
  248. }
  249. else if (IsIP6Enabled)
  250. {
  251. // Cannot use IPv6Any as Kestrel will bind to IPv4 addresses.
  252. foreach (var iface in _interfaceAddresses)
  253. {
  254. if (iface.AddressFamily == AddressFamily.InterNetworkV6)
  255. {
  256. result.AddItem(iface.Address);
  257. }
  258. }
  259. }
  260. return result;
  261. }
  262. // Remove any excluded bind interfaces.
  263. return _bindAddresses.Exclude(_bindExclusions);
  264. }
  265. /// <inheritdoc/>
  266. public string GetBindInterface(string source, out int? port)
  267. {
  268. if (!string.IsNullOrEmpty(source) && IPHost.TryParse(source, out IPHost host))
  269. {
  270. return GetBindInterface(host, out port);
  271. }
  272. return GetBindInterface(IPHost.None, out port);
  273. }
  274. /// <inheritdoc/>
  275. public string GetBindInterface(IPAddress source, out int? port)
  276. {
  277. return GetBindInterface(new IPNetAddress(source), out port);
  278. }
  279. /// <inheritdoc/>
  280. public string GetBindInterface(HttpRequest source, out int? port)
  281. {
  282. string result;
  283. if (source != null && IPHost.TryParse(source.Host.Host, out IPHost host))
  284. {
  285. result = GetBindInterface(host, out port);
  286. port ??= source.Host.Port;
  287. }
  288. else
  289. {
  290. result = GetBindInterface(IPNetAddress.None, out port);
  291. port ??= source?.Host.Port;
  292. }
  293. return result;
  294. }
  295. /// <inheritdoc/>
  296. public string GetBindInterface(IPObject source, out int? port)
  297. {
  298. port = null;
  299. if (source == null)
  300. {
  301. throw new ArgumentNullException(nameof(source));
  302. }
  303. // Do we have a source?
  304. bool haveSource = !source.Address.Equals(IPAddress.None);
  305. bool isExternal = false;
  306. if (haveSource)
  307. {
  308. if (!IsIP6Enabled && source.AddressFamily == AddressFamily.InterNetworkV6)
  309. {
  310. _logger.LogWarning("IPv6 is disabled in Jellyfin, but enabled in the OS. This may affect how the interface is selected.");
  311. }
  312. if (!IsIP4Enabled && source.AddressFamily == AddressFamily.InterNetwork)
  313. {
  314. _logger.LogWarning("IPv4 is disabled in Jellyfin, but enabled in the OS. This may affect how the interface is selected.");
  315. }
  316. isExternal = !IsInLocalNetwork(source);
  317. if (MatchesPublishedServerUrl(source, isExternal, out string res, out port))
  318. {
  319. _logger.LogInformation("{Source}: Using BindAddress {Address}:{Port}", source, res, port);
  320. return res;
  321. }
  322. }
  323. _logger.LogDebug("GetBindInterface: Source: {HaveSource}, External: {IsExternal}:", haveSource, isExternal);
  324. // No preference given, so move on to bind addresses.
  325. if (MatchesBindInterface(source, isExternal, out string result))
  326. {
  327. return result;
  328. }
  329. if (isExternal && MatchesExternalInterface(source, out result))
  330. {
  331. return result;
  332. }
  333. // Get the first LAN interface address that isn't a loopback.
  334. var interfaces = CreateCollection(_interfaceAddresses
  335. .Exclude(_bindExclusions)
  336. .Where(IsInLocalNetwork)
  337. .OrderBy(p => p.Tag));
  338. if (interfaces.Count > 0)
  339. {
  340. if (haveSource)
  341. {
  342. // Does the request originate in one of the interface subnets?
  343. // (For systems with multiple internal network cards, and multiple subnets)
  344. foreach (var intf in interfaces)
  345. {
  346. if (intf.Contains(source))
  347. {
  348. result = FormatIP6String(intf.Address);
  349. _logger.LogDebug("{Source}: GetBindInterface: Has source, matched best internal interface on range. {Result}", source, result);
  350. return result;
  351. }
  352. }
  353. }
  354. result = FormatIP6String(interfaces.First().Address);
  355. _logger.LogDebug("{Source}: GetBindInterface: Matched first internal interface. {Result}", source, result);
  356. return result;
  357. }
  358. // There isn't any others, so we'll use the loopback.
  359. result = IsIP6Enabled ? "::1" : "127.0.0.1";
  360. _logger.LogWarning("{Source}: GetBindInterface: Loopback {Result} returned.", source, result);
  361. return result;
  362. }
  363. /// <inheritdoc/>
  364. public Collection<IPObject> GetInternalBindAddresses()
  365. {
  366. int count = _bindAddresses.Count;
  367. if (count == 0)
  368. {
  369. if (_bindExclusions.Count > 0)
  370. {
  371. // Return all the internal interfaces except the ones excluded.
  372. return CreateCollection(_internalInterfaces.Where(p => !_bindExclusions.ContainsAddress(p)));
  373. }
  374. // No bind address, so return all internal interfaces.
  375. return CreateCollection(_internalInterfaces.Where(p => !p.IsLoopback()));
  376. }
  377. return new Collection<IPObject>(_bindAddresses);
  378. }
  379. /// <inheritdoc/>
  380. public bool IsInLocalNetwork(IPObject address)
  381. {
  382. if (address == null)
  383. {
  384. throw new ArgumentNullException(nameof(address));
  385. }
  386. if (address.Equals(IPAddress.None))
  387. {
  388. return false;
  389. }
  390. // See conversation at https://github.com/jellyfin/jellyfin/pull/3515.
  391. if (TrustAllIP6Interfaces && address.AddressFamily == AddressFamily.InterNetworkV6)
  392. {
  393. return true;
  394. }
  395. // As private addresses can be redefined by Configuration.LocalNetworkAddresses
  396. return _lanSubnets.ContainsAddress(address) && !_excludedSubnets.ContainsAddress(address);
  397. }
  398. /// <inheritdoc/>
  399. public bool IsInLocalNetwork(string address)
  400. {
  401. if (IPHost.TryParse(address, out IPHost ep))
  402. {
  403. return _lanSubnets.ContainsAddress(ep) && !_excludedSubnets.ContainsAddress(ep);
  404. }
  405. return false;
  406. }
  407. /// <inheritdoc/>
  408. public bool IsInLocalNetwork(IPAddress address)
  409. {
  410. if (address == null)
  411. {
  412. throw new ArgumentNullException(nameof(address));
  413. }
  414. // See conversation at https://github.com/jellyfin/jellyfin/pull/3515.
  415. if (TrustAllIP6Interfaces && address.AddressFamily == AddressFamily.InterNetworkV6)
  416. {
  417. return true;
  418. }
  419. // As private addresses can be redefined by Configuration.LocalNetworkAddresses
  420. return _lanSubnets.ContainsAddress(address) && !_excludedSubnets.ContainsAddress(address);
  421. }
  422. /// <inheritdoc/>
  423. public bool IsPrivateAddressRange(IPObject address)
  424. {
  425. if (address == null)
  426. {
  427. throw new ArgumentNullException(nameof(address));
  428. }
  429. // See conversation at https://github.com/jellyfin/jellyfin/pull/3515.
  430. if (TrustAllIP6Interfaces && address.AddressFamily == AddressFamily.InterNetworkV6)
  431. {
  432. return true;
  433. }
  434. else
  435. {
  436. return address.IsPrivateAddressRange();
  437. }
  438. }
  439. /// <inheritdoc/>
  440. public bool IsExcludedInterface(IPAddress address)
  441. {
  442. return _bindExclusions.ContainsAddress(address);
  443. }
  444. /// <inheritdoc/>
  445. public Collection<IPObject> GetFilteredLANSubnets(Collection<IPObject>? filter = null)
  446. {
  447. if (filter == null)
  448. {
  449. return _lanSubnets.Exclude(_excludedSubnets).AsNetworks();
  450. }
  451. return _lanSubnets.Exclude(filter);
  452. }
  453. /// <inheritdoc/>
  454. public bool IsValidInterfaceAddress(IPAddress address)
  455. {
  456. return _interfaceAddresses.ContainsAddress(address);
  457. }
  458. /// <inheritdoc/>
  459. public bool TryParseInterface(string token, out Collection<IPObject>? result)
  460. {
  461. result = null;
  462. if (string.IsNullOrEmpty(token))
  463. {
  464. return false;
  465. }
  466. if (_interfaceNames != null && _interfaceNames.TryGetValue(token.ToLower(CultureInfo.InvariantCulture), out int index))
  467. {
  468. result = new Collection<IPObject>();
  469. _logger.LogInformation("Interface {Token} used in settings. Using its interface addresses.", token);
  470. // Replace interface tags with the interface IP's.
  471. foreach (IPNetAddress iface in _interfaceAddresses)
  472. {
  473. if (Math.Abs(iface.Tag) == index
  474. && ((IsIP4Enabled && iface.Address.AddressFamily == AddressFamily.InterNetwork)
  475. || (IsIP6Enabled && iface.Address.AddressFamily == AddressFamily.InterNetworkV6)))
  476. {
  477. result.AddItem(iface);
  478. }
  479. }
  480. return true;
  481. }
  482. return false;
  483. }
  484. /// <summary>
  485. /// Checks to see if <paramref name="remoteIp"/> has access.
  486. /// </summary>
  487. /// <param name="remoteIp">IP Address of client.</param>
  488. /// <returns><b>True</b> if has access, otherwise <b>false</b>.</returns>
  489. public bool HasRemoteAccess(IPAddress remoteIp)
  490. {
  491. var config = _configurationManager.GetNetworkConfiguration();
  492. if (config.EnableRemoteAccess)
  493. {
  494. // Comma separated list of IP addresses or IP/netmask entries for networks that will be allowed to connect remotely.
  495. // If left blank, all remote addresses will be allowed.
  496. if (RemoteAddressFilter.Count > 0 && !IsInLocalNetwork(remoteIp))
  497. {
  498. // remoteAddressFilter is a whitelist or blacklist.
  499. return RemoteAddressFilter.ContainsAddress(remoteIp) == !config.IsRemoteIPFilterBlacklist;
  500. }
  501. }
  502. else if (!IsInLocalNetwork(remoteIp))
  503. {
  504. // Remote not enabled. So everyone should be LAN.
  505. return false;
  506. }
  507. return true;
  508. }
  509. /// <summary>
  510. /// Reloads all settings and re-initialises the instance.
  511. /// </summary>
  512. /// <param name="configuration">The <see cref="NetworkConfiguration"/> to use.</param>
  513. public void UpdateSettings(object configuration)
  514. {
  515. NetworkConfiguration config = (NetworkConfiguration)configuration ?? throw new ArgumentNullException(nameof(configuration));
  516. IsIP4Enabled = Socket.OSSupportsIPv4 && config.EnableIPV4;
  517. IsIP6Enabled = Socket.OSSupportsIPv6 && config.EnableIPV6;
  518. if (!IsIP6Enabled && !IsIP4Enabled)
  519. {
  520. _logger.LogError("IPv4 and IPv6 cannot both be disabled.");
  521. IsIP4Enabled = true;
  522. }
  523. TrustAllIP6Interfaces = config.TrustAllIP6Interfaces;
  524. // UdpHelper.EnableMultiSocketBinding = config.EnableMultiSocketBinding;
  525. if (string.IsNullOrEmpty(MockNetworkSettings))
  526. {
  527. InitialiseInterfaces();
  528. }
  529. else // Used in testing only.
  530. {
  531. // Format is <IPAddress>,<Index>,<Name>: <next interface>. Set index to -ve to simulate a gateway.
  532. var interfaceList = MockNetworkSettings.Split('|');
  533. foreach (var details in interfaceList)
  534. {
  535. var parts = details.Split(',');
  536. var address = IPNetAddress.Parse(parts[0]);
  537. var index = int.Parse(parts[1], CultureInfo.InvariantCulture);
  538. address.Tag = index;
  539. _interfaceAddresses.AddItem(address);
  540. _interfaceNames.Add(parts[2], Math.Abs(index));
  541. }
  542. }
  543. InitialiseLAN(config);
  544. InitialiseBind(config);
  545. InitialiseRemote(config);
  546. InitialiseOverrides(config);
  547. }
  548. /// <summary>
  549. /// Protected implementation of Dispose pattern.
  550. /// </summary>
  551. /// <param name="disposing"><c>True</c> to dispose the managed state.</param>
  552. protected virtual void Dispose(bool disposing)
  553. {
  554. if (!_disposed)
  555. {
  556. if (disposing)
  557. {
  558. _configurationManager.NamedConfigurationUpdated -= ConfigurationUpdated;
  559. NetworkChange.NetworkAddressChanged -= OnNetworkAddressChanged;
  560. NetworkChange.NetworkAvailabilityChanged -= OnNetworkAvailabilityChanged;
  561. }
  562. _disposed = true;
  563. }
  564. }
  565. /// <summary>
  566. /// Tries to identify the string and return an object of that class.
  567. /// </summary>
  568. /// <param name="addr">String to parse.</param>
  569. /// <param name="result">IPObject to return.</param>
  570. /// <returns><c>true</c> if the value parsed successfully, <c>false</c> otherwise.</returns>
  571. private static bool TryParse(string addr, out IPObject result)
  572. {
  573. if (!string.IsNullOrEmpty(addr))
  574. {
  575. // Is it an IP address
  576. if (IPNetAddress.TryParse(addr, out IPNetAddress nw))
  577. {
  578. result = nw;
  579. return true;
  580. }
  581. if (IPHost.TryParse(addr, out IPHost h))
  582. {
  583. result = h;
  584. return true;
  585. }
  586. }
  587. result = IPNetAddress.None;
  588. return false;
  589. }
  590. /// <summary>
  591. /// Converts an IPAddress into a string.
  592. /// Ipv6 addresses are returned in [ ], with their scope removed.
  593. /// </summary>
  594. /// <param name="address">Address to convert.</param>
  595. /// <returns>URI safe conversion of the address.</returns>
  596. private static string FormatIP6String(IPAddress address)
  597. {
  598. var str = address.ToString();
  599. if (address.AddressFamily == AddressFamily.InterNetworkV6)
  600. {
  601. int i = str.IndexOf("%", StringComparison.OrdinalIgnoreCase);
  602. if (i != -1)
  603. {
  604. str = str.Substring(0, i);
  605. }
  606. return $"[{str}]";
  607. }
  608. return str;
  609. }
  610. private void ConfigurationUpdated(object? sender, ConfigurationUpdateEventArgs evt)
  611. {
  612. if (evt.Key.Equals("network", StringComparison.Ordinal))
  613. {
  614. UpdateSettings((NetworkConfiguration)evt.NewConfiguration);
  615. }
  616. }
  617. /// <summary>
  618. /// Checks the string to see if it matches any interface names.
  619. /// </summary>
  620. /// <param name="token">String to check.</param>
  621. /// <param name="index">Interface index numbers that match.</param>
  622. /// <returns><c>true</c> if an interface name matches the token, <c>False</c> otherwise.</returns>
  623. private bool TryGetInterfaces(string token, [NotNullWhen(true)] out List<int>? index)
  624. {
  625. index = null;
  626. // Is it the name of an interface (windows) eg, Wireless LAN adapter Wireless Network Connection 1.
  627. // Null check required here for automated testing.
  628. if (_interfaceNames != null && token.Length > 1)
  629. {
  630. bool partial = token[^1] == '*';
  631. if (partial)
  632. {
  633. token = token[0..^1];
  634. }
  635. foreach ((string interfc, int interfcIndex) in _interfaceNames)
  636. {
  637. if ((!partial && string.Equals(interfc, token, StringComparison.OrdinalIgnoreCase))
  638. || (partial && interfc.StartsWith(token, true, CultureInfo.InvariantCulture)))
  639. {
  640. index ??= new List<int>();
  641. index.Add(interfcIndex);
  642. }
  643. }
  644. }
  645. return index != null;
  646. }
  647. /// <summary>
  648. /// Parses a string and adds it into the collection, replacing any interface references.
  649. /// </summary>
  650. /// <param name="col"><see cref="Collection{IPObject}"/>Collection.</param>
  651. /// <param name="token">String value to parse.</param>
  652. private void AddToCollection(Collection<IPObject> col, string token)
  653. {
  654. // Is it the name of an interface (windows) eg, Wireless LAN adapter Wireless Network Connection 1.
  655. // Null check required here for automated testing.
  656. if (TryGetInterfaces(token, out var indices))
  657. {
  658. _logger.LogInformation("Interface {Token} used in settings. Using its interface addresses.", token);
  659. // Replace all the interface tags with the interface IP's.
  660. foreach (IPNetAddress iface in _interfaceAddresses)
  661. {
  662. if (indices.Contains(Math.Abs(iface.Tag))
  663. && ((IsIP4Enabled && iface.Address.AddressFamily == AddressFamily.InterNetwork)
  664. || (IsIP6Enabled && iface.Address.AddressFamily == AddressFamily.InterNetworkV6)))
  665. {
  666. col.AddItem(iface);
  667. }
  668. }
  669. }
  670. else if (TryParse(token, out IPObject obj))
  671. {
  672. // Expand if the ip address is "any".
  673. if ((obj.Address.Equals(IPAddress.Any) && IsIP4Enabled)
  674. || (obj.Address.Equals(IPAddress.IPv6Any) && IsIP6Enabled))
  675. {
  676. foreach (IPNetAddress iface in _interfaceAddresses)
  677. {
  678. if (obj.AddressFamily == iface.AddressFamily)
  679. {
  680. col.AddItem(iface);
  681. }
  682. }
  683. }
  684. else if (!IsIP6Enabled)
  685. {
  686. // Remove IP6 addresses from multi-homed IPHosts.
  687. obj.Remove(AddressFamily.InterNetworkV6);
  688. if (!obj.IsIP6())
  689. {
  690. col.AddItem(obj);
  691. }
  692. }
  693. else if (!IsIP4Enabled)
  694. {
  695. // Remove IP4 addresses from multi-homed IPHosts.
  696. obj.Remove(AddressFamily.InterNetwork);
  697. if (obj.IsIP6())
  698. {
  699. col.AddItem(obj);
  700. }
  701. }
  702. else
  703. {
  704. col.AddItem(obj);
  705. }
  706. }
  707. else
  708. {
  709. _logger.LogDebug("Invalid or unknown object {Token}.", token);
  710. }
  711. }
  712. /// <summary>
  713. /// Handler for network change events.
  714. /// </summary>
  715. /// <param name="sender">Sender.</param>
  716. /// <param name="e">A <see cref="NetworkAvailabilityEventArgs"/> containing network availability information.</param>
  717. private void OnNetworkAvailabilityChanged(object? sender, NetworkAvailabilityEventArgs e)
  718. {
  719. _logger.LogDebug("Network availability changed.");
  720. OnNetworkChanged();
  721. }
  722. /// <summary>
  723. /// Handler for network change events.
  724. /// </summary>
  725. /// <param name="sender">Sender.</param>
  726. /// <param name="e">An <see cref="EventArgs"/>.</param>
  727. private void OnNetworkAddressChanged(object? sender, EventArgs e)
  728. {
  729. _logger.LogDebug("Network address change detected.");
  730. OnNetworkChanged();
  731. }
  732. /// <summary>
  733. /// Async task that waits for 2 seconds before re-initialising the settings, as typically these events fire multiple times in succession.
  734. /// </summary>
  735. /// <returns>A <see cref="Task"/> representing the asynchronous operation.</returns>
  736. private async Task OnNetworkChangeAsync()
  737. {
  738. try
  739. {
  740. await Task.Delay(2000).ConfigureAwait(false);
  741. InitialiseInterfaces();
  742. // Recalculate LAN caches.
  743. InitialiseLAN(_configurationManager.GetNetworkConfiguration());
  744. NetworkChanged?.Invoke(this, EventArgs.Empty);
  745. }
  746. finally
  747. {
  748. _eventfire = false;
  749. }
  750. }
  751. /// <summary>
  752. /// Triggers our event, and re-loads interface information.
  753. /// </summary>
  754. private void OnNetworkChanged()
  755. {
  756. lock (_eventFireLock)
  757. {
  758. if (!_eventfire)
  759. {
  760. _logger.LogDebug("Network Address Change Event.");
  761. // As network events tend to fire one after the other only fire once every second.
  762. _eventfire = true;
  763. OnNetworkChangeAsync().GetAwaiter().GetResult();
  764. }
  765. }
  766. }
  767. /// <summary>
  768. /// Parses the user defined overrides into the dictionary object.
  769. /// Overrides are the equivalent of localised publishedServerUrl, enabling
  770. /// different addresses to be advertised over different subnets.
  771. /// format is subnet=ipaddress|host|uri
  772. /// when subnet = 0.0.0.0, any external address matches.
  773. /// </summary>
  774. private void InitialiseOverrides(NetworkConfiguration config)
  775. {
  776. lock (_intLock)
  777. {
  778. _publishedServerUrls.Clear();
  779. string[] overrides = config.PublishedServerUriBySubnet;
  780. if (overrides == null)
  781. {
  782. return;
  783. }
  784. foreach (var entry in overrides)
  785. {
  786. var parts = entry.Split('=');
  787. if (parts.Length != 2)
  788. {
  789. _logger.LogError("Unable to parse bind override: {Entry}", entry);
  790. }
  791. else
  792. {
  793. var replacement = parts[1].Trim();
  794. if (string.Equals(parts[0], "all", StringComparison.OrdinalIgnoreCase))
  795. {
  796. _publishedServerUrls[new IPNetAddress(IPAddress.Broadcast)] = replacement;
  797. }
  798. else if (string.Equals(parts[0], "external", StringComparison.OrdinalIgnoreCase))
  799. {
  800. _publishedServerUrls[new IPNetAddress(IPAddress.Any)] = replacement;
  801. }
  802. else if (TryParseInterface(parts[0], out Collection<IPObject>? addresses) && addresses != null)
  803. {
  804. foreach (IPNetAddress na in addresses)
  805. {
  806. _publishedServerUrls[na] = replacement;
  807. }
  808. }
  809. else if (IPNetAddress.TryParse(parts[0], out IPNetAddress result))
  810. {
  811. _publishedServerUrls[result] = replacement;
  812. }
  813. else
  814. {
  815. _logger.LogError("Unable to parse bind ip address. {Parts}", parts[1]);
  816. }
  817. }
  818. }
  819. }
  820. }
  821. /// <summary>
  822. /// Initialises the network bind addresses.
  823. /// </summary>
  824. private void InitialiseBind(NetworkConfiguration config)
  825. {
  826. lock (_intLock)
  827. {
  828. string[] lanAddresses = config.LocalNetworkAddresses;
  829. // Add virtual machine interface names to the list of bind exclusions, so that they are auto-excluded.
  830. if (config.IgnoreVirtualInterfaces)
  831. {
  832. // each virtual interface name must be pre-pended with the exclusion symbol !
  833. var virtualInterfaceNames = config.VirtualInterfaceNames.Split(',').Select(p => "!" + p).ToArray();
  834. if (lanAddresses.Length > 0)
  835. {
  836. var newList = new string[lanAddresses.Length + virtualInterfaceNames.Length];
  837. Array.Copy(lanAddresses, newList, lanAddresses.Length);
  838. Array.Copy(virtualInterfaceNames, 0, newList, lanAddresses.Length, virtualInterfaceNames.Length);
  839. lanAddresses = newList;
  840. }
  841. else
  842. {
  843. lanAddresses = virtualInterfaceNames;
  844. }
  845. }
  846. // Read and parse bind addresses and exclusions, removing ones that don't exist.
  847. _bindAddresses = CreateIPCollection(lanAddresses).Union(_interfaceAddresses);
  848. _bindExclusions = CreateIPCollection(lanAddresses, true).Union(_interfaceAddresses);
  849. _logger.LogInformation("Using bind addresses: {0}", _bindAddresses.AsString());
  850. _logger.LogInformation("Using bind exclusions: {0}", _bindExclusions.AsString());
  851. }
  852. }
  853. /// <summary>
  854. /// Initialises the remote address values.
  855. /// </summary>
  856. private void InitialiseRemote(NetworkConfiguration config)
  857. {
  858. lock (_intLock)
  859. {
  860. RemoteAddressFilter = CreateIPCollection(config.RemoteIPFilter);
  861. }
  862. }
  863. /// <summary>
  864. /// Initialises internal LAN cache settings.
  865. /// </summary>
  866. private void InitialiseLAN(NetworkConfiguration config)
  867. {
  868. lock (_intLock)
  869. {
  870. _logger.LogDebug("Refreshing LAN information.");
  871. // Get configuration options.
  872. string[] subnets = config.LocalNetworkSubnets;
  873. // Create lists from user settings.
  874. _lanSubnets = CreateIPCollection(subnets);
  875. _excludedSubnets = CreateIPCollection(subnets, true).AsNetworks();
  876. // If no LAN addresses are specified - all private subnets are deemed to be the LAN
  877. _usingPrivateAddresses = _lanSubnets.Count == 0;
  878. // NOTE: The order of the commands generating the collection in this statement matters.
  879. // Altering the order will cause the collections to be created incorrectly.
  880. if (_usingPrivateAddresses)
  881. {
  882. _logger.LogDebug("Using LAN interface addresses as user provided no LAN details.");
  883. // Internal interfaces must be private and not excluded.
  884. _internalInterfaces = CreateCollection(_interfaceAddresses.Where(i => IsPrivateAddressRange(i) && !_excludedSubnets.ContainsAddress(i)));
  885. // Subnets are the same as the calculated internal interface.
  886. _lanSubnets = new Collection<IPObject>();
  887. // We must listen on loopback for LiveTV to function regardless of the settings.
  888. if (IsIP6Enabled)
  889. {
  890. _lanSubnets.AddItem(IPNetAddress.IP6Loopback);
  891. _lanSubnets.AddItem(IPNetAddress.Parse("fc00::/7")); // ULA
  892. _lanSubnets.AddItem(IPNetAddress.Parse("fe80::/10")); // Site local
  893. }
  894. if (IsIP4Enabled)
  895. {
  896. _lanSubnets.AddItem(IPNetAddress.IP4Loopback);
  897. _lanSubnets.AddItem(IPNetAddress.Parse("10.0.0.0/8"));
  898. _lanSubnets.AddItem(IPNetAddress.Parse("172.16.0.0/12"));
  899. _lanSubnets.AddItem(IPNetAddress.Parse("192.168.0.0/16"));
  900. }
  901. }
  902. else
  903. {
  904. // We must listen on loopback for LiveTV to function regardless of the settings.
  905. if (IsIP6Enabled)
  906. {
  907. _lanSubnets.AddItem(IPNetAddress.IP6Loopback);
  908. }
  909. if (IsIP4Enabled)
  910. {
  911. _lanSubnets.AddItem(IPNetAddress.IP4Loopback);
  912. }
  913. // Internal interfaces must be private, not excluded and part of the LocalNetworkSubnet.
  914. _internalInterfaces = CreateCollection(_interfaceAddresses.Where(i => IsInLocalNetwork(i)));
  915. }
  916. _logger.LogInformation("Defined LAN addresses : {0}", _lanSubnets.AsString());
  917. _logger.LogInformation("Defined LAN exclusions : {0}", _excludedSubnets.AsString());
  918. _logger.LogInformation("Using LAN addresses: {0}", _lanSubnets.Exclude(_excludedSubnets).AsNetworks().AsString());
  919. }
  920. }
  921. /// <summary>
  922. /// Generate a list of all the interface ip addresses and submasks where that are in the active/unknown state.
  923. /// Generate a list of all active mac addresses that aren't loopback addresses.
  924. /// </summary>
  925. private void InitialiseInterfaces()
  926. {
  927. lock (_intLock)
  928. {
  929. _logger.LogDebug("Refreshing interfaces.");
  930. _interfaceNames.Clear();
  931. _interfaceAddresses.Clear();
  932. _macAddresses.Clear();
  933. try
  934. {
  935. IEnumerable<NetworkInterface> nics = NetworkInterface.GetAllNetworkInterfaces()
  936. .Where(i => i.SupportsMulticast && i.OperationalStatus == OperationalStatus.Up);
  937. foreach (NetworkInterface adapter in nics)
  938. {
  939. try
  940. {
  941. IPInterfaceProperties ipProperties = adapter.GetIPProperties();
  942. PhysicalAddress mac = adapter.GetPhysicalAddress();
  943. // populate mac list
  944. if (adapter.NetworkInterfaceType != NetworkInterfaceType.Loopback && mac != null && mac != PhysicalAddress.None)
  945. {
  946. _macAddresses.Add(mac);
  947. }
  948. // populate interface address list
  949. foreach (UnicastIPAddressInformation info in ipProperties.UnicastAddresses)
  950. {
  951. if (IsIP4Enabled && info.Address.AddressFamily == AddressFamily.InterNetwork)
  952. {
  953. IPNetAddress nw = new IPNetAddress(info.Address, IPObject.MaskToCidr(info.IPv4Mask))
  954. {
  955. // Keep the number of gateways on this interface, along with its index.
  956. Tag = ipProperties.GetIPv4Properties().Index
  957. };
  958. int tag = nw.Tag;
  959. if (ipProperties.GatewayAddresses.Count > 0 && !nw.IsLoopback())
  960. {
  961. // -ve Tags signify the interface has a gateway.
  962. nw.Tag *= -1;
  963. }
  964. _interfaceAddresses.AddItem(nw);
  965. // Store interface name so we can use the name in Collections.
  966. _interfaceNames[adapter.Description.ToLower(CultureInfo.InvariantCulture)] = tag;
  967. _interfaceNames["eth" + tag.ToString(CultureInfo.InvariantCulture)] = tag;
  968. }
  969. else if (IsIP6Enabled && info.Address.AddressFamily == AddressFamily.InterNetworkV6)
  970. {
  971. IPNetAddress nw = new IPNetAddress(info.Address, (byte)info.PrefixLength)
  972. {
  973. // Keep the number of gateways on this interface, along with its index.
  974. Tag = ipProperties.GetIPv6Properties().Index
  975. };
  976. int tag = nw.Tag;
  977. if (ipProperties.GatewayAddresses.Count > 0 && !nw.IsLoopback())
  978. {
  979. // -ve Tags signify the interface has a gateway.
  980. nw.Tag *= -1;
  981. }
  982. _interfaceAddresses.AddItem(nw);
  983. // Store interface name so we can use the name in Collections.
  984. _interfaceNames[adapter.Description.ToLower(CultureInfo.InvariantCulture)] = tag;
  985. _interfaceNames["eth" + tag.ToString(CultureInfo.InvariantCulture)] = tag;
  986. }
  987. }
  988. }
  989. #pragma warning disable CA1031 // Do not catch general exception types
  990. catch (Exception ex)
  991. {
  992. // Ignore error, and attempt to continue.
  993. _logger.LogError(ex, "Error encountered parsing interfaces.");
  994. }
  995. #pragma warning restore CA1031 // Do not catch general exception types
  996. }
  997. _logger.LogDebug("Discovered {0} interfaces.", _interfaceAddresses.Count);
  998. _logger.LogDebug("Interfaces addresses : {0}", _interfaceAddresses.AsString());
  999. // If for some reason we don't have an interface info, resolve our DNS name.
  1000. if (_interfaceAddresses.Count == 0)
  1001. {
  1002. _logger.LogError("No interfaces information available. Resolving DNS name.");
  1003. IPHost host = new IPHost(Dns.GetHostName());
  1004. foreach (var a in host.GetAddresses())
  1005. {
  1006. _interfaceAddresses.AddItem(a);
  1007. }
  1008. if (_interfaceAddresses.Count == 0)
  1009. {
  1010. _logger.LogWarning("No interfaces information available. Using loopback.");
  1011. // Last ditch attempt - use loopback address.
  1012. _interfaceAddresses.AddItem(IPNetAddress.IP4Loopback);
  1013. if (IsIP6Enabled)
  1014. {
  1015. _interfaceAddresses.AddItem(IPNetAddress.IP6Loopback);
  1016. }
  1017. }
  1018. }
  1019. }
  1020. catch (NetworkInformationException ex)
  1021. {
  1022. _logger.LogError(ex, "Error in InitialiseInterfaces.");
  1023. }
  1024. }
  1025. }
  1026. /// <summary>
  1027. /// Attempts to match the source against a user defined bind interface.
  1028. /// </summary>
  1029. /// <param name="source">IP source address to use.</param>
  1030. /// <param name="isInExternalSubnet">True if the source is in the external subnet.</param>
  1031. /// <param name="bindPreference">The published server url that matches the source address.</param>
  1032. /// <param name="port">The resultant port, if one exists.</param>
  1033. /// <returns><c>true</c> if a match is found, <c>false</c> otherwise.</returns>
  1034. private bool MatchesPublishedServerUrl(IPObject source, bool isInExternalSubnet, out string bindPreference, out int? port)
  1035. {
  1036. bindPreference = string.Empty;
  1037. port = null;
  1038. // Check for user override.
  1039. foreach (var addr in _publishedServerUrls)
  1040. {
  1041. // Remaining. Match anything.
  1042. if (addr.Key.Address.Equals(IPAddress.Broadcast))
  1043. {
  1044. bindPreference = addr.Value;
  1045. break;
  1046. }
  1047. else if ((addr.Key.Address.Equals(IPAddress.Any) || addr.Key.Address.Equals(IPAddress.IPv6Any)) && isInExternalSubnet)
  1048. {
  1049. // External.
  1050. bindPreference = addr.Value;
  1051. break;
  1052. }
  1053. else if (addr.Key.Contains(source))
  1054. {
  1055. // Match ip address.
  1056. bindPreference = addr.Value;
  1057. break;
  1058. }
  1059. }
  1060. if (string.IsNullOrEmpty(bindPreference))
  1061. {
  1062. return false;
  1063. }
  1064. // Has it got a port defined?
  1065. var parts = bindPreference.Split(':');
  1066. if (parts.Length > 1)
  1067. {
  1068. if (int.TryParse(parts[1], out int p))
  1069. {
  1070. bindPreference = parts[0];
  1071. port = p;
  1072. }
  1073. }
  1074. return true;
  1075. }
  1076. /// <summary>
  1077. /// Attempts to match the source against a user defined bind interface.
  1078. /// </summary>
  1079. /// <param name="source">IP source address to use.</param>
  1080. /// <param name="isInExternalSubnet">True if the source is in the external subnet.</param>
  1081. /// <param name="result">The result, if a match is found.</param>
  1082. /// <returns><c>true</c> if a match is found, <c>false</c> otherwise.</returns>
  1083. private bool MatchesBindInterface(IPObject source, bool isInExternalSubnet, out string result)
  1084. {
  1085. result = string.Empty;
  1086. var addresses = _bindAddresses.Exclude(_bindExclusions);
  1087. int count = addresses.Count;
  1088. if (count == 1 && (_bindAddresses[0].Equals(IPAddress.Any) || _bindAddresses[0].Equals(IPAddress.IPv6Any)))
  1089. {
  1090. // Ignore IPAny addresses.
  1091. count = 0;
  1092. }
  1093. if (count != 0)
  1094. {
  1095. // Check to see if any of the bind interfaces are in the same subnet.
  1096. IPAddress? defaultGateway = null;
  1097. IPAddress? bindAddress = null;
  1098. if (isInExternalSubnet)
  1099. {
  1100. // Find all external bind addresses. Store the default gateway, but check to see if there is a better match first.
  1101. foreach (var addr in addresses.OrderBy(p => p.Tag))
  1102. {
  1103. if (defaultGateway == null && !IsInLocalNetwork(addr))
  1104. {
  1105. defaultGateway = addr.Address;
  1106. }
  1107. if (bindAddress == null && addr.Contains(source))
  1108. {
  1109. bindAddress = addr.Address;
  1110. }
  1111. if (defaultGateway != null && bindAddress != null)
  1112. {
  1113. break;
  1114. }
  1115. }
  1116. }
  1117. else
  1118. {
  1119. // Look for the best internal address.
  1120. bindAddress = addresses
  1121. .Where(p => IsInLocalNetwork(p) && (p.Contains(source) || p.Equals(IPAddress.None)))
  1122. .OrderBy(p => p.Tag)
  1123. .FirstOrDefault()?.Address;
  1124. }
  1125. if (bindAddress != null)
  1126. {
  1127. result = FormatIP6String(bindAddress);
  1128. _logger.LogDebug("{Source}: GetBindInterface: Has source, found a match bind interface subnets. {Result}", source, result);
  1129. return true;
  1130. }
  1131. if (isInExternalSubnet && defaultGateway != null)
  1132. {
  1133. result = FormatIP6String(defaultGateway);
  1134. _logger.LogDebug("{Source}: GetBindInterface: Using first user defined external interface. {Result}", source, result);
  1135. return true;
  1136. }
  1137. result = FormatIP6String(addresses[0].Address);
  1138. _logger.LogDebug("{Source}: GetBindInterface: Selected first user defined interface. {Result}", source, result);
  1139. if (isInExternalSubnet)
  1140. {
  1141. _logger.LogWarning("{Source}: External request received, however, only an internal interface bind found.", source);
  1142. }
  1143. return true;
  1144. }
  1145. return false;
  1146. }
  1147. /// <summary>
  1148. /// Attempts to match the source against an external interface.
  1149. /// </summary>
  1150. /// <param name="source">IP source address to use.</param>
  1151. /// <param name="result">The result, if a match is found.</param>
  1152. /// <returns><c>true</c> if a match is found, <c>false</c> otherwise.</returns>
  1153. private bool MatchesExternalInterface(IPObject source, out string result)
  1154. {
  1155. result = string.Empty;
  1156. // Get the first WAN interface address that isn't a loopback.
  1157. var extResult = _interfaceAddresses
  1158. .Exclude(_bindExclusions)
  1159. .Where(p => !IsInLocalNetwork(p))
  1160. .OrderBy(p => p.Tag);
  1161. if (extResult.Any())
  1162. {
  1163. // Does the request originate in one of the interface subnets?
  1164. // (For systems with multiple internal network cards, and multiple subnets)
  1165. foreach (var intf in extResult)
  1166. {
  1167. if (!IsInLocalNetwork(intf) && intf.Contains(source))
  1168. {
  1169. result = FormatIP6String(intf.Address);
  1170. _logger.LogDebug("{Source}: GetBindInterface: Selected best external on interface on range. {Result}", source, result);
  1171. return true;
  1172. }
  1173. }
  1174. result = FormatIP6String(extResult.First().Address);
  1175. _logger.LogDebug("{Source}: GetBindInterface: Selected first external interface. {Result}", source, result);
  1176. return true;
  1177. }
  1178. _logger.LogDebug("{Source}: External request received, but no WAN interface found. Need to route through internal network.", source);
  1179. return false;
  1180. }
  1181. }
  1182. }