mirror of
https://github.com/zerotier/ZeroTierOne.git
synced 2025-06-06 20:43:44 +02:00
commit
f33f3fcb72
2 changed files with 28 additions and 11 deletions
|
@ -1158,7 +1158,14 @@ unsigned int SqliteNetworkController::_doCPGet(
|
||||||
sqlite3_bind_text(_sGetIpAssignmentsForNode2,2,addrs,10,SQLITE_STATIC);
|
sqlite3_bind_text(_sGetIpAssignmentsForNode2,2,addrs,10,SQLITE_STATIC);
|
||||||
bool firstIp = true;
|
bool firstIp = true;
|
||||||
while (sqlite3_step(_sGetIpAssignmentsForNode2) == SQLITE_ROW) {
|
while (sqlite3_step(_sGetIpAssignmentsForNode2) == SQLITE_ROW) {
|
||||||
InetAddress ip((const void *)sqlite3_column_blob(_sGetIpAssignmentsForNode2,0),(sqlite3_column_int(_sGetIpAssignmentsForNode2,2) == 6) ? 16 : 4,(unsigned int)sqlite3_column_int(_sGetIpAssignmentPools2,1));
|
int ipversion = sqlite3_column_int(_sGetIpAssignmentsForNode2,2);
|
||||||
|
char ipBlob[16];
|
||||||
|
memcpy(ipBlob,(const void *)sqlite3_column_blob(_sGetIpAssignmentsForNode2,0),16);
|
||||||
|
InetAddress ip(
|
||||||
|
(const void *)(ipversion == 6 ? ipBlob : &ipBlob[12]),
|
||||||
|
(ipversion == 6 ? 16 : 4),
|
||||||
|
(unsigned int)sqlite3_column_int(_sGetIpAssignmentsForNode2,1)
|
||||||
|
);
|
||||||
responseBody.append(firstIp ? "\"" : ",\"");
|
responseBody.append(firstIp ? "\"" : ",\"");
|
||||||
firstIp = false;
|
firstIp = false;
|
||||||
responseBody.append(_jsonEscape(ip.toString()));
|
responseBody.append(_jsonEscape(ip.toString()));
|
||||||
|
|
|
@ -286,18 +286,28 @@ void Network::addMembershipCertificate(const CertificateOfMembership &cert,bool
|
||||||
return;
|
return;
|
||||||
}
|
}
|
||||||
|
|
||||||
SharedPtr<Peer> signer(RR->topology->getPeer(cert.signedBy()));
|
if (cert.signedBy() == RR->identity.address()) {
|
||||||
|
// We are the controller: RR->identity.address() == controller() == cert.signedBy()
|
||||||
|
// So, verify that we signed th cert ourself
|
||||||
|
if (!cert.verify(RR->identity)) {
|
||||||
|
TRACE("rejected network membership certificate for %.16llx self signed by %s: signature check failed",(unsigned long long)_id,cert.signedBy().toString().c_str());
|
||||||
|
return;
|
||||||
|
}
|
||||||
|
} else {
|
||||||
|
|
||||||
if (!signer) {
|
SharedPtr<Peer> signer(RR->topology->getPeer(cert.signedBy()));
|
||||||
// This would be rather odd, since this is our controller... could happen
|
|
||||||
// if we get packets before we've gotten config.
|
|
||||||
RR->sw->requestWhois(cert.signedBy());
|
|
||||||
return;
|
|
||||||
}
|
|
||||||
|
|
||||||
if (!cert.verify(signer->identity())) {
|
if (!signer) {
|
||||||
TRACE("rejected network membership certificate for %.16llx signed by %s: signature check failed",(unsigned long long)_id,cert.signedBy().toString().c_str());
|
// This would be rather odd, since this is our controller... could happen
|
||||||
return;
|
// if we get packets before we've gotten config.
|
||||||
|
RR->sw->requestWhois(cert.signedBy());
|
||||||
|
return;
|
||||||
|
}
|
||||||
|
|
||||||
|
if (!cert.verify(signer->identity())) {
|
||||||
|
TRACE("rejected network membership certificate for %.16llx signed by %s: signature check failed",(unsigned long long)_id,cert.signedBy().toString().c_str());
|
||||||
|
return;
|
||||||
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
Loading…
Add table
Reference in a new issue