using System; using System.Collections.Generic; using System.Globalization; using System.Linq; using System.Net; using System.Net.NetworkInformation; using System.Net.Sockets; using System.Threading.Tasks; using MediaBrowser.Common.Configuration; using MediaBrowser.Common.Net; using MediaBrowser.Model.Configuration; using Microsoft.AspNetCore.Http; using Microsoft.Extensions.Logging; using NetworkCollection; namespace Jellyfin.Networking.Manager { /// /// Class to take care of network interface management. /// public class NetworkManager : INetworkManager, IDisposable { /// /// Contains the description of the interface along with its index. /// private readonly SortedList _interfaceNames; /// /// Threading lock for network interfaces. /// private readonly object _intLock = new object(); /// /// List of all interface addresses and masks. /// private readonly NetCollection _interfaceAddresses; /// /// List of all interface MAC addresses. /// private readonly List _macAddresses; private readonly ILogger _logger; private readonly IConfigurationManager _configurationManager; /// /// Holds the bind address overrides. /// private readonly Dictionary _publishedServerUrls; /// /// Used to stop "event-racing conditions". /// private bool _eventfire; /// /// Unfiltered user defined LAN subnets. (Configuration.LocalNetworkSubnets). /// or internal interface network subnets if undefined by user. /// private NetCollection _lanSubnets; /// /// User defined list of subnets to excluded from the LAN. /// private NetCollection _excludedSubnets; /// /// List of interface addresses to bind the WS. /// private NetCollection _bindAddresses; /// /// List of interface addresses to exclude from bind. /// private NetCollection _bindExclusions; /// /// Caches list of all internal filtered interface addresses and masks. /// private NetCollection _internalInterfaces; /// /// Flag set when no custom LAN has been defined in the config. /// private bool _usingPrivateAddresses; /// /// True if this object is disposed. /// private bool _disposed; /// /// Initializes a new instance of the class. /// /// IServerConfigurationManager instance. /// Logger to use for messages. #pragma warning disable CS8618 // Non-nullable field is uninitialized. : Values are set in InitialiseLAN function. Compiler doesn't yet recognise this. public NetworkManager(IConfigurationManager configurationManager, ILogger logger) { _logger = logger ?? throw new ArgumentNullException(nameof(logger)); _configurationManager = configurationManager ?? throw new ArgumentNullException(nameof(configurationManager)); _interfaceAddresses = new NetCollection(unique: false); _macAddresses = new List(); _interfaceNames = new SortedList(); _publishedServerUrls = new Dictionary(); UpdateSettings((ServerConfiguration)_configurationManager.CommonConfiguration); if (!IsIP6Enabled && !IsIP4Enabled) { throw new ApplicationException("IPv4 and IPv6 cannot both be disabled."); } NetworkChange.NetworkAddressChanged += OnNetworkAddressChanged; NetworkChange.NetworkAvailabilityChanged += OnNetworkAvailabilityChanged; _configurationManager.ConfigurationUpdated += ConfigurationUpdated; } #pragma warning restore CS8618 // Non-nullable field is uninitialized. /// /// Event triggered on network changes. /// public event EventHandler? NetworkChanged; /// /// Gets the unique network location signature, which is updated on every network change. /// public static string NetworkLocationSignature { get; internal set; } = Guid.NewGuid().ToString(); /// /// Gets a value indicating whether IP6 is enabled. /// public static bool IsIP6Enabled { get; internal set; } /// /// Gets a value indicating whether IP4 is enabled. /// public static bool IsIP4Enabled { get; internal set; } = true; /// /// Gets a value indicating whether is multi-socket binding available. /// public static bool EnableMultiSocketBinding { get; internal set; } = true; /// /// Gets the number of times the network address has changed. /// public static int NetworkChangeCount { get; internal set; } = 1; /// public NetCollection RemoteAddressFilter { get; private set; } /// /// Gets a value indicating whether is all IPv6 interfaces are trusted as internal. /// public bool TrustAllIP6Interfaces { get; internal set; } /// /// Gets the Published server override list. /// public Dictionary PublishedServerUrls => _publishedServerUrls; /// public void Dispose() { Dispose(true); GC.SuppressFinalize(this); } /// public List GetMacAddresses() { // Populated in construction - so always has values. lock (_intLock) { return _macAddresses.ToList(); } } /// public bool IsGatewayInterface(object? addressObj) { var address = addressObj switch { IPAddress addressIp => addressIp, IPObject addressIpObj => addressIpObj.Address, _ => IPAddress.None }; lock (_intLock) { return _internalInterfaces.Where(i => i.Address.Equals(address) && (i.Tag < 0)).Any(); } } /// public NetCollection GetLoopbacks() { NetCollection nc = new NetCollection(); if (IsIP4Enabled) { nc.Add(IPAddress.Loopback); } if (IsIP6Enabled) { nc.Add(IPAddress.IPv6Loopback); } return nc; } /// public bool IsExcluded(IPAddress ip) { return _excludedSubnets.Contains(ip); } /// public bool IsExcluded(EndPoint ip) { if (ip != null) { return _excludedSubnets.Contains(((IPEndPoint)ip).Address); } return false; } /// public NetCollection CreateIPCollection(string[] values, bool bracketed = false) { NetCollection col = new NetCollection(); if (values != null) { for (int a = 0; a < values.Length; a++) { string v = values[a].Trim(); try { if (v.StartsWith("[", StringComparison.OrdinalIgnoreCase) && v.EndsWith("]", StringComparison.OrdinalIgnoreCase)) { if (bracketed) { AddToCollection(col, v.Remove(v.Length - 1).Substring(1)); } } else if (v.StartsWith("!", StringComparison.OrdinalIgnoreCase)) { if (bracketed) { AddToCollection(col, v.Substring(1)); } } else if (!bracketed) { AddToCollection(col, v); } } catch (ArgumentException e) { _logger.LogInformation("Ignoring LAN value {value}. Reason : {reason}", v, e.Message); } } } return col; } /// public NetCollection GetAllBindInterfaces() { lock (_intLock) { int count = _bindAddresses.Count; if (count == 0) { if (_bindExclusions.Count > 0) { // Return all the interfaces except the ones specifically excluded. return _interfaceAddresses.Exclude(_bindExclusions); } // No bind address and no exclusions, so listen on all interfaces. NetCollection result = new NetCollection(); if (IsIP4Enabled) { result.Add(IPAddress.Any); } if (IsIP6Enabled) { result.Add(IPAddress.IPv6Any); } return result; } // Remove any excluded bind interfaces. return _bindAddresses.Exclude(_bindExclusions); } } /// public string GetBindInterface(string source, out int? port) { if (!string.IsNullOrEmpty(source)) { if (string.Equals(source, "chromecast", StringComparison.OrdinalIgnoreCase)) { // Just assign a variable so has source = true; return GetBindInterface(IPNetAddress.IP4Loopback, out port); } if (IPHost.TryParse(source, out IPHost host)) { return GetBindInterface(host, out port); } } return GetBindInterface(IPHost.None, out port); } /// public string GetBindInterface(IPAddress source, out int? port) { return GetBindInterface(new IPNetAddress(source), out port); } /// public string GetBindInterface(HttpRequest source, out int? port) { string result; if (source != null && IPHost.TryParse(source.Host.Host, out IPHost host)) { result = GetBindInterface(host, out port); port ??= source.Host.Port; } else { result = GetBindInterface(IPNetAddress.None, out port); port ??= source?.Host.Port; } return result; } /// public string GetBindInterface(IPObject source, out int? port) { port = null; bool isChromeCast = source == IPNetAddress.IP4Loopback; // Do we have a source? bool haveSource = !source.Address.Equals(IPAddress.None); bool isExternal = false; if (haveSource) { if (!IsIP6Enabled && source.AddressFamily == AddressFamily.InterNetworkV6) { _logger.LogWarning("IPv6 is disabled in JellyFin, but enabled in the OS. This may affect how the interface is selected."); } if (!IsIP4Enabled && source.AddressFamily == AddressFamily.InterNetwork) { _logger.LogWarning("IPv4 is disabled in JellyFin, but enabled in the OS. This may affect how the interface is selected."); } isExternal = !IsInLocalNetwork(source); if (MatchesPublishedServerUrl(source, isExternal, isChromeCast, out string result, out port)) { _logger.LogInformation("{0}: Using BindAddress {1}:{2}", source, result, port); return result; } } _logger.LogDebug("GetBindInterface: Souce: {0}, External: {1}:", haveSource, isExternal); // No preference given, so move on to bind addresses. lock (_intLock) { if (MatchesBindInterface(source, isExternal, out string result)) { return result; } if (isExternal && MatchesExternalInterface(source, out result)) { return result; } // Get the first LAN interface address that isn't a loopback. var interfaces = new NetCollection(_interfaceAddresses .Exclude(_bindExclusions) .Where(p => IsInLocalNetwork(p)) .OrderBy(p => p.Tag)); if (interfaces.Count > 0) { if (haveSource) { // Does the request originate in one of the interface subnets? // (For systems with multiple internal network cards, and multiple subnets) foreach (var intf in interfaces) { if (intf.Contains(source)) { result = FormatIP6String(intf.Address); _logger.LogDebug("{0}: GetBindInterface: Has source, matched best internal interface on range. {1}", source, result); return result; } } } result = FormatIP6String(interfaces.First().Address); _logger.LogDebug("{0}: GetBindInterface: Matched first internal interface. {1}", source, result); return result; } // There isn't any others, so we'll use the loopback. result = IsIP6Enabled ? "::" : "127.0.0.1"; _logger.LogWarning("{0}: GetBindInterface: Loopback return.", source, result); return result; } } /// public NetCollection GetInternalBindAddresses() { lock (_intLock) { int count = _bindAddresses.Count; if (count == 0) { if (_bindExclusions.Count > 0) { // Return all the internal interfaces except the ones excluded. return new NetCollection(_internalInterfaces.Where(p => !_bindExclusions.Contains(p))); } // No bind address, so return all internal interfaces. return new NetCollection(_internalInterfaces.Where(p => !p.IsLoopback())); } return new NetCollection(_bindAddresses); } } /// public bool IsInLocalNetwork(IPObject address) { if (address == null) { throw new ArgumentNullException(nameof(address)); } if (address.Equals(IPAddress.None)) { return false; } // See conversation at https://github.com/jellyfin/jellyfin/pull/3515. if (TrustAllIP6Interfaces && address.AddressFamily == AddressFamily.InterNetworkV6) { return true; } lock (_intLock) { // As private addresses can be redefined by Configuration.LocalNetworkAddresses return _lanSubnets.Contains(address) && !_excludedSubnets.Contains(address); } } /// public bool IsInLocalNetwork(string address) { if (IPHost.TryParse(address, out IPHost ep)) { lock (_intLock) { return _lanSubnets.Contains(ep) && !_excludedSubnets.Contains(ep); } } return false; } /// public bool IsInLocalNetwork(IPAddress address) { if (address == null) { throw new ArgumentNullException(nameof(address)); } // See conversation at https://github.com/jellyfin/jellyfin/pull/3515. if (TrustAllIP6Interfaces && address.AddressFamily == AddressFamily.InterNetworkV6) { return true; } lock (_intLock) { // As private addresses can be redefined by Configuration.LocalNetworkAddresses return _lanSubnets.Contains(address) && !_excludedSubnets.Contains(address); } } /// public bool IsPrivateAddressRange(IPObject address) { if (address == null) { throw new ArgumentNullException(nameof(address)); } // See conversation at https://github.com/jellyfin/jellyfin/pull/3515. if (TrustAllIP6Interfaces && address.AddressFamily == AddressFamily.InterNetworkV6) { return true; } else { return address.IsPrivateAddressRange(); } } /// public bool IsExcludedInterface(IPAddress address) { lock (_intLock) { if (_bindExclusions.Count > 0) { return _bindExclusions.Contains(address); } return false; } } /// public NetCollection GetFilteredLANSubnets(NetCollection? filter = null) { lock (_intLock) { if (filter == null) { return NetCollection.AsNetworks(_lanSubnets.Exclude(_excludedSubnets)); } return _lanSubnets.Exclude(filter); } } /// public bool IsValidInterfaceAddress(IPAddress address) { lock (_intLock) { return _interfaceAddresses.Contains(address); } } /// public bool TryParseInterface(string token, out IPNetAddress result) { if (string.IsNullOrEmpty(token)) { result = IPNetAddress.None; return false; } if (_interfaceNames != null && _interfaceNames.TryGetValue(token.ToLower(CultureInfo.InvariantCulture), out int index)) { _logger.LogInformation("Interface {0} used in settings. Using its interface addresses.", token); // Replace interface tags with the interface IP's. foreach (IPNetAddress iface in _interfaceAddresses) { if (Math.Abs(iface.Tag) == index && ((IsIP4Enabled && iface.Address.AddressFamily == AddressFamily.InterNetwork) || (IsIP6Enabled && iface.Address.AddressFamily == AddressFamily.InterNetworkV6))) { result = iface; return true; } } } return IPNetAddress.TryParse(token, out result); } /// /// Reloads all settings and re-initialises the instance. /// /// to use. public void UpdateSettings(ServerConfiguration config) { if (config == null) { throw new ArgumentNullException(nameof(config)); } IsIP4Enabled = Socket.OSSupportsIPv6 && config.EnableIPV4; IsIP6Enabled = Socket.OSSupportsIPv6 && config.EnableIPV6; TrustAllIP6Interfaces = config.TrustAllIP6Interfaces; EnableMultiSocketBinding = config.EnableMultiSocketBinding; InitialiseInterfaces(); InitialiseLAN(config); InitialiseBind(config); InitialiseRemote(config); InitialiseOverrides(config); } /// /// Protected implementation of Dispose pattern. /// /// True to dispose the managed state. protected virtual void Dispose(bool disposing) { if (!_disposed) { if (disposing) { _configurationManager.ConfigurationUpdated -= ConfigurationUpdated; NetworkChange.NetworkAddressChanged -= OnNetworkAddressChanged; NetworkChange.NetworkAvailabilityChanged -= OnNetworkAvailabilityChanged; } _disposed = true; } } private void ConfigurationUpdated(object? sender, EventArgs args) { UpdateSettings((ServerConfiguration)_configurationManager.CommonConfiguration); } /// /// Converts an IPAddress into a string. /// Ipv6 addresses are returned in [ ], with their scope removed. /// /// Address to convert. /// URI save conversion of the address. private string FormatIP6String(IPAddress address) { var str = address.ToString(); if (address.AddressFamily == AddressFamily.InterNetworkV6) { int i = str.IndexOf("%", StringComparison.OrdinalIgnoreCase); if (i != -1) { str = str.Substring(0, i); } return $"[{str}]"; } return str; } /// /// Parses strings into the collection, replacing any interface references. /// /// Collection. /// String to parse. private void AddToCollection(NetCollection col, string token) { // Is it the name of an interface (windows) eg, Wireless LAN adapter Wireless Network Connection 1. // Null check required here for automated testing. if (_interfaceNames != null && _interfaceNames.TryGetValue(token.ToLower(CultureInfo.InvariantCulture), out int index)) { _logger.LogInformation("Interface {0} used in settings. Using its interface addresses.", token); // Replace interface tags with the interface IP's. foreach (IPNetAddress iface in _interfaceAddresses) { if (Math.Abs(iface.Tag) == index && ((IsIP4Enabled && iface.Address.AddressFamily == AddressFamily.InterNetwork) || (IsIP6Enabled && iface.Address.AddressFamily == AddressFamily.InterNetworkV6))) { col.Add(iface); } } } else if (NetCollection.TryParse(token, out IPObject obj)) { if (!IsIP6Enabled) { // Remove IP6 addresses from multi-homed IPHosts. obj.Remove(AddressFamily.InterNetworkV6); if (!obj.IsIP6()) { col.Add(obj); } } else if (!IsIP4Enabled) { // Remove IP4 addresses from multi-homed IPHosts. obj.Remove(AddressFamily.InterNetwork); if (obj.IsIP6()) { col.Add(obj); } } else { col.Add(obj); } } else { _logger.LogDebug("Invalid or unknown network {0}.", token); } } /// /// Handler for network change events. /// /// Sender. /// Network availablity information. private void OnNetworkAvailabilityChanged(object? sender, NetworkAvailabilityEventArgs e) { _logger.LogDebug("Network availability changed."); OnNetworkChanged(); } /// /// Handler for network change events. /// /// Sender. /// Event arguments. private void OnNetworkAddressChanged(object? sender, EventArgs e) { _logger.LogDebug("Network address change detected."); OnNetworkChanged(); } /// /// Async task that waits for 2 seconds before re-initialising the settings, as typically these events fire multiple times in succession. /// /// The network change async. private async Task OnNetworkChangeAsync() { try { await Task.Delay(2000).ConfigureAwait(false); InitialiseInterfaces(); // Recalculate LAN caches. InitialiseLAN((ServerConfiguration)_configurationManager.CommonConfiguration); NetworkChanged?.Invoke(this, EventArgs.Empty); } finally { _eventfire = false; } } /// /// Triggers our event, and re-loads interface information. /// private void OnNetworkChanged() { // As per UPnP Device Architecture v1.0 Annex A - IPv6 Support. NetworkLocationSignature = Guid.NewGuid().ToString(); NetworkChangeCount++; if (NetworkChangeCount > 99) { NetworkChangeCount = 1; } if (!_eventfire) { _logger.LogDebug("Network Address Change Event."); // As network events tend to fire one after the other only fire once every second. _eventfire = true; _ = OnNetworkChangeAsync(); } } /// /// Parses the user defined overrides into the dictionary object. /// Overrides are the equivalent of localised publishedServerUrl, enabling /// different addresses to be advertised over different subnets. /// format is subnet=ipaddress|host|uri /// when subnet = 0.0.0.0, any external address matches. /// private void InitialiseOverrides(ServerConfiguration config) { string[] overrides = config.PublishedServerUriBySubnet; if (overrides == null) { lock (_intLock) { _publishedServerUrls.Clear(); } return; } lock (_intLock) { _publishedServerUrls.Clear(); foreach (var entry in overrides) { var parts = entry.Split('='); if (parts.Length != 2) { _logger.LogError("Unable to parse bind override. {0}", entry); } else { var replacement = parts[1].Trim(); if (string.Equals(parts[0], "remaining", StringComparison.OrdinalIgnoreCase)) { _publishedServerUrls[new IPNetAddress(IPAddress.Broadcast)] = replacement; } else if (string.Equals(parts[0], "external", StringComparison.OrdinalIgnoreCase)) { _publishedServerUrls[new IPNetAddress(IPAddress.Any)] = replacement; } else if (TryParseInterface(parts[0], out IPNetAddress address)) { _publishedServerUrls[address] = replacement; } else { _logger.LogError("Unable to parse bind ip address. {0}", parts[1]); } } } } } private void InitialiseBind(ServerConfiguration config) { string[] ba = config.LocalNetworkAddresses; // TODO: remove when bug fixed: https://github.com/jellyfin/jellyfin-web/issues/1334 if (ba.Length == 1 && ba[0].IndexOf(',', StringComparison.OrdinalIgnoreCase) != -1) { ba = ba[0].Split(','); } // TODO: end fix. // Read and parse bind addresses and exclusions, removing ones that don't exist. _bindAddresses = CreateIPCollection(ba).Union(_interfaceAddresses); _bindExclusions = CreateIPCollection(ba, true).Union(_interfaceAddresses); _logger.LogInformation("Using bind addresses: {0}", _bindAddresses); _logger.LogInformation("Using bind exclusions: {0}", _bindExclusions); } private void InitialiseRemote(ServerConfiguration config) { RemoteAddressFilter = CreateIPCollection(config.RemoteIPFilter); } /// /// Initialises internal LAN cache settings. /// private void InitialiseLAN(ServerConfiguration config) { lock (_intLock) { _logger.LogDebug("Refreshing LAN information."); // Get config options. string[] subnets = config.LocalNetworkSubnets; // Create lists from user settings. _lanSubnets = CreateIPCollection(subnets); _excludedSubnets = NetCollection.AsNetworks(CreateIPCollection(subnets, true)); // If no LAN addresses are specified - all private subnets are deemed to be the LAN _usingPrivateAddresses = _lanSubnets.Count == 0; // NOTE: The order of the commands in this statement matters. if (_usingPrivateAddresses) { _logger.LogDebug("Using LAN interface addresses as user provided no LAN details."); // Internal interfaces must be private and not excluded. _internalInterfaces = new NetCollection(_interfaceAddresses.Where(i => IsPrivateAddressRange(i) && !_excludedSubnets.Contains(i))); // Subnets are the same as the calculated internal interface. _lanSubnets = new NetCollection(); // We must listen on loopback for LiveTV to function regardless of the settings. if (IsIP6Enabled) { _lanSubnets.Add(IPNetAddress.IP6Loopback); _lanSubnets.Add(IPNetAddress.Parse("fc00::/7")); // ULA _lanSubnets.Add(IPNetAddress.Parse("fe80::/10")); // Site local } if (IsIP4Enabled) { _lanSubnets.Add(IPNetAddress.IP4Loopback); _lanSubnets.Add(IPNetAddress.Parse("10.0.0.0/8")); _lanSubnets.Add(IPNetAddress.Parse("172.16.0.0/12")); _lanSubnets.Add(IPNetAddress.Parse("192.168.0.0/16")); } } else { // We must listen on loopback for LiveTV to function regardless of the settings. if (IsIP6Enabled) { _lanSubnets.Add(IPNetAddress.IP6Loopback); } if (IsIP4Enabled) { _lanSubnets.Add(IPNetAddress.IP4Loopback); } // Internal interfaces must be private, not excluded and part of the LocalNetworkSubnet. _internalInterfaces = new NetCollection(_interfaceAddresses.Where(i => IsInLocalNetwork(i) && !_excludedSubnets.Contains(i) && _lanSubnets.Contains(i))); } _logger.LogInformation("Defined LAN addresses : {0}", _lanSubnets); _logger.LogInformation("Defined LAN exclusions : {0}", _excludedSubnets); _logger.LogInformation("Using LAN addresses: {0}", NetCollection.AsNetworks(_lanSubnets.Exclude(_excludedSubnets))); } } /// /// Generate a list of all the interface ip addresses and submasks where that are in the active/unknown state. /// Generate a list of all active mac addresses that aren't loopback addreses. /// private void InitialiseInterfaces() { lock (_intLock) { _logger.LogDebug("Refreshing interfaces."); _interfaceNames.Clear(); _interfaceAddresses.Clear(); try { IEnumerable nics = NetworkInterface.GetAllNetworkInterfaces() .Where(i => i.SupportsMulticast && i.OperationalStatus == OperationalStatus.Up); foreach (NetworkInterface adapter in nics) { try { IPInterfaceProperties ipProperties = adapter.GetIPProperties(); PhysicalAddress mac = adapter.GetPhysicalAddress(); // populate mac list if (adapter.NetworkInterfaceType != NetworkInterfaceType.Loopback && mac != null && mac != PhysicalAddress.None) { _macAddresses.Add(mac); } // populate interface address list foreach (UnicastIPAddressInformation info in ipProperties.UnicastAddresses) { if (IsIP4Enabled && info.Address.AddressFamily == AddressFamily.InterNetwork) { IPNetAddress nw = new IPNetAddress(info.Address, info.IPv4Mask) { // Keep the number of gateways on this interface, along with its index. Tag = ipProperties.GetIPv4Properties().Index }; int tag = nw.Tag; /* Mono on OSX doesn't give any gateway addresses, so check DNS entries */ if ((ipProperties.GatewayAddresses.Count > 0 || ipProperties.DnsAddresses.Count > 0) && !nw.IsLoopback()) { // -ve Tags signify the interface has a gateway. nw.Tag *= -1; } _interfaceAddresses.Add(nw); // Store interface name so we can use the name in Collections. _interfaceNames[adapter.Description.ToLower(CultureInfo.InvariantCulture)] = tag; _interfaceNames["eth" + tag.ToString(CultureInfo.InvariantCulture)] = tag; } else if (IsIP6Enabled && info.Address.AddressFamily == AddressFamily.InterNetworkV6) { IPNetAddress nw = new IPNetAddress(info.Address, (byte)info.PrefixLength) { // Keep the number of gateways on this interface, along with its index. Tag = ipProperties.GetIPv6Properties().Index }; int tag = nw.Tag; /* Mono on OSX doesn't give any gateway addresses, so check DNS entries */ if ((ipProperties.GatewayAddresses.Count > 0 || ipProperties.DnsAddresses.Count > 0) && !nw.IsLoopback()) { // -ve Tags signify the interface has a gateway. nw.Tag *= -1; } _interfaceAddresses.Add(nw); // Store interface name so we can use the name in Collections. _interfaceNames[adapter.Description.ToLower(CultureInfo.InvariantCulture)] = tag; _interfaceNames["eth" + tag.ToString(CultureInfo.InvariantCulture)] = tag; } } } #pragma warning disable CA1031 // Do not catch general exception types catch { // Ignore error, and attempt to continue. } #pragma warning restore CA1031 // Do not catch general exception types } _logger.LogDebug("Discovered {0} interfaces.", _interfaceAddresses.Count); _logger.LogDebug("Interfaces addresses : {0}", _interfaceAddresses); // If for some reason we don't have an interface info, resolve our DNS name. if (_interfaceAddresses.Count == 0) { _logger.LogWarning("No interfaces information available. Using loopback."); IPHost host = new IPHost(Dns.GetHostName()); foreach (var a in host.GetAddresses()) { _interfaceAddresses.Add(a); } if (_interfaceAddresses.Count == 0) { _logger.LogError("No interfaces information available. Resolving DNS name."); // Last ditch attempt - use loopback address. _interfaceAddresses.Add(IPNetAddress.IP4Loopback); if (IsIP6Enabled) { _interfaceAddresses.Add(IPNetAddress.IP6Loopback); } } } } catch (NetworkInformationException ex) { _logger.LogError(ex, "Error in InitialiseInterfaces."); } } } /// /// Attempts to match the source against a user defined bind interface. /// /// IP source address to use. /// True if the source is in the external subnet. /// True if the request is for a chromecast device. /// The published server url that matches the source address. /// The resultant port, if one exists. /// True if a match is found. private bool MatchesPublishedServerUrl(IPObject source, bool isExternal, bool isChromeCast, out string bindPreference, out int? port) { bindPreference = string.Empty; port = null; // Check for user override. foreach (var addr in _publishedServerUrls) { // Remaining. Match anything. if (addr.Key.Equals(IPAddress.Broadcast)) { bindPreference = addr.Value; break; } else if ((addr.Key.Equals(IPAddress.Any) || addr.Key.Equals(IPAddress.IPv6Any)) && (isExternal || isChromeCast)) { // External. bindPreference = addr.Value; break; } else if (addr.Key.Contains(source)) { // Match ip address. bindPreference = addr.Value; break; } } if (!string.IsNullOrEmpty(bindPreference)) { // Has it got a port defined? var parts = bindPreference.Split(':'); if (parts.Length > 1) { if (int.TryParse(parts[1], out int p)) { bindPreference = parts[0]; port = p; } } return true; } return false; } /// /// Attempts to match the source against a user defined bind interface. /// /// IP source address to use. /// True if the source is in the external subnet. /// The result, if a match is found. /// True if a match is found. private bool MatchesBindInterface(IPObject source, bool isExternal, out string result) { result = string.Empty; var nc = _bindAddresses.Exclude(_bindExclusions); int count = nc.Count; if (count == 1 && (_bindAddresses[0].Equals(IPAddress.Any) || _bindAddresses[0].Equals(IPAddress.IPv6Any))) { // Ignore IPAny addresses. count = 0; } if (count != 0) { // Check to see if any of the bind interfaces are in the same subnet. NetCollection bindResult; IPAddress? defaultGateway = null; IPAddress? bindAddress; if (isExternal) { // Find all external bind addresses. Store the default gateway, but check to see if there is a better match first. bindResult = new NetCollection(nc .Where(p => !IsInLocalNetwork(p)) .OrderBy(p => p.Tag)); defaultGateway = bindResult.FirstOrDefault()?.Address; bindAddress = bindResult .Where(p => p.Contains(source)) .OrderBy(p => p.Tag) .FirstOrDefault()?.Address; } else { // Look for the best internal address. bindAddress = nc .Where(p => IsInLocalNetwork(p) && (p.Contains(source) || p.Equals(IPAddress.None))) .OrderBy(p => p.Tag) .FirstOrDefault()?.Address; } if (bindAddress != null) { result = FormatIP6String(bindAddress); _logger.LogDebug("{0}: GetBindInterface: Has source, found a match bind interface subnets. {1}", source, result); return true; } if (isExternal && defaultGateway != null) { result = FormatIP6String(defaultGateway); _logger.LogDebug("{0}: GetBindInterface: Using first user defined external interface. {1}", source, result); return true; } result = FormatIP6String(nc.First().Address); _logger.LogDebug("{0}: GetBindInterface: Selected first user defined interface. {1}", source, result); if (isExternal) { // TODO: remove this after testing. _logger.LogWarning("{0}: External request received, however, only an internal interface bind found.", source); } return true; } return false; } /// /// Attempts to match the source against am external interface. /// /// IP source address to use. /// The result, if a match is found. /// True if a match is found. private bool MatchesExternalInterface(IPObject source, out string result) { result = string.Empty; // Get the first WAN interface address that isn't a loopback. var extResult = new NetCollection(_interfaceAddresses .Exclude(_bindExclusions) .Where(p => !IsInLocalNetwork(p)) .OrderBy(p => p.Tag)); if (extResult.Count > 0) { // Does the request originate in one of the interface subnets? // (For systems with multiple internal network cards, and multiple subnets) foreach (var intf in extResult) { if (!IsInLocalNetwork(intf) && intf.Contains(source)) { result = FormatIP6String(intf.Address); _logger.LogDebug("{0}: GetBindInterface: Selected best external on interface on range. {1}", source, result); return true; } } result = FormatIP6String(extResult.First().Address); _logger.LogDebug("{0}: GetBindInterface: Selected first external interface. {0}", source, result); return true; } // Have to return something, so return an internal address // TODO: remove this after testing. _logger.LogWarning("{0}: External request received, however, no WAN interface found.", source); return false; } } }