2000-10-23 13:52:54 +00:00
|
|
|
/*
|
|
|
|
route.c -- routing
|
2001-01-07 17:09:07 +00:00
|
|
|
Copyright (C) 2000,2001 Ivo Timmermans <itimmermans@bigfoot.com>,
|
|
|
|
2000,2001 Guus Sliepen <guus@sliepen.warande.net>
|
2000-10-23 13:52:54 +00:00
|
|
|
|
|
|
|
This program is free software; you can redistribute it and/or modify
|
|
|
|
it under the terms of the GNU General Public License as published by
|
|
|
|
the Free Software Foundation; either version 2 of the License, or
|
|
|
|
(at your option) any later version.
|
|
|
|
|
|
|
|
This program is distributed in the hope that it will be useful,
|
|
|
|
but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
GNU General Public License for more details.
|
|
|
|
|
|
|
|
You should have received a copy of the GNU General Public License
|
|
|
|
along with this program; if not, write to the Free Software
|
|
|
|
Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
|
|
|
|
|
2001-06-05 16:09:55 +00:00
|
|
|
$Id: route.c,v 1.1.2.11 2001/06/05 16:09:55 guus Exp $
|
2000-10-23 13:52:54 +00:00
|
|
|
*/
|
|
|
|
|
|
|
|
#include "config.h"
|
|
|
|
|
2001-05-28 08:21:43 +00:00
|
|
|
#ifdef HAVE_FREEBSD
|
|
|
|
#include <sys/param.h>
|
|
|
|
#endif
|
2001-06-04 11:14:35 +00:00
|
|
|
#include <sys/socket.h>
|
|
|
|
#include <netinet/in.h>
|
|
|
|
#include <net/ethernet.h>
|
|
|
|
#include <netinet/if_ether.h>
|
2000-10-23 13:52:54 +00:00
|
|
|
#include <utils.h>
|
|
|
|
#include <xalloc.h>
|
2001-01-05 23:53:53 +00:00
|
|
|
#include <syslog.h>
|
2000-10-23 13:52:54 +00:00
|
|
|
|
|
|
|
#include "net.h"
|
2001-06-04 11:14:35 +00:00
|
|
|
#include "net/ethernet.h"
|
|
|
|
#include "netinet/if_ether.h"
|
2000-11-20 19:12:17 +00:00
|
|
|
#include "connection.h"
|
2001-01-05 23:53:53 +00:00
|
|
|
#include "subnet.h"
|
|
|
|
#include "route.h"
|
2000-10-23 13:52:54 +00:00
|
|
|
|
|
|
|
#include "system.h"
|
|
|
|
|
2001-01-07 15:25:49 +00:00
|
|
|
int routing_mode = RMODE_ROUTER;
|
2001-03-04 13:59:32 +00:00
|
|
|
subnet_t mymac;
|
2000-10-23 13:52:54 +00:00
|
|
|
|
2001-01-07 15:25:49 +00:00
|
|
|
void learn_mac(connection_t *source, mac_t *address)
|
2000-10-23 13:52:54 +00:00
|
|
|
{
|
2001-01-05 23:53:53 +00:00
|
|
|
subnet_t *subnet;
|
2000-10-23 13:52:54 +00:00
|
|
|
cp
|
2001-03-04 13:59:32 +00:00
|
|
|
subnet = lookup_subnet_mac(address);
|
2001-01-05 23:53:53 +00:00
|
|
|
|
2001-03-04 13:59:32 +00:00
|
|
|
if(!subnet)
|
2000-11-04 22:57:33 +00:00
|
|
|
{
|
2001-01-05 23:53:53 +00:00
|
|
|
subnet = new_subnet();
|
|
|
|
subnet->type = SUBNET_MAC;
|
2001-01-07 15:25:49 +00:00
|
|
|
// subnet->lasttime = gettimeofday();
|
|
|
|
memcpy(&subnet->net.mac.address, address, sizeof(mac_t));
|
2001-01-05 23:53:53 +00:00
|
|
|
subnet_add(source, subnet);
|
2001-01-07 15:25:49 +00:00
|
|
|
|
2001-03-04 13:59:32 +00:00
|
|
|
if(debug_lvl >= DEBUG_TRAFFIC)
|
2001-01-07 15:25:49 +00:00
|
|
|
{
|
|
|
|
syslog(LOG_DEBUG, _("Learned new MAC address %x:%x:%x:%x:%x:%x from %s (%s)"),
|
2001-03-04 13:59:32 +00:00
|
|
|
address->x[0],
|
|
|
|
address->x[1],
|
|
|
|
address->x[2],
|
|
|
|
address->x[3],
|
|
|
|
address->x[4],
|
|
|
|
address->x[5],
|
|
|
|
source->name, source->hostname);
|
2001-01-07 15:25:49 +00:00
|
|
|
}
|
2000-11-04 22:57:33 +00:00
|
|
|
}
|
2001-01-07 15:25:49 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
connection_t *route_mac(connection_t *source, vpn_packet_t *packet)
|
|
|
|
{
|
|
|
|
subnet_t *subnet;
|
|
|
|
cp
|
|
|
|
/* Learn source address */
|
2000-11-04 22:57:33 +00:00
|
|
|
|
2001-06-05 16:09:55 +00:00
|
|
|
learn_mac(source, (mac_t *)(&packet->data[6]));
|
2001-01-05 23:53:53 +00:00
|
|
|
|
|
|
|
/* Lookup destination address */
|
|
|
|
|
2001-06-05 16:09:55 +00:00
|
|
|
subnet = lookup_subnet_mac((mac_t *)(&packet->data[0]));
|
2001-03-04 13:59:32 +00:00
|
|
|
|
2001-06-05 16:09:55 +00:00
|
|
|
if(subnet)
|
|
|
|
return subnet->owner;
|
|
|
|
else
|
|
|
|
return NULL;
|
2000-11-04 22:57:33 +00:00
|
|
|
}
|
|
|
|
|
2000-11-20 19:12:17 +00:00
|
|
|
connection_t *route_ipv4(vpn_packet_t *packet)
|
2000-10-23 13:52:54 +00:00
|
|
|
{
|
|
|
|
ipv4_t dest;
|
2001-03-04 13:59:32 +00:00
|
|
|
subnet_t *subnet;
|
2000-10-23 13:52:54 +00:00
|
|
|
cp
|
2001-01-05 23:53:53 +00:00
|
|
|
dest = ntohl(*((unsigned long*)(&packet->data[30])));
|
2000-10-23 13:52:54 +00:00
|
|
|
|
2001-03-04 13:59:32 +00:00
|
|
|
subnet = lookup_subnet_ipv4(&dest);
|
|
|
|
|
|
|
|
if(!subnet)
|
|
|
|
{
|
|
|
|
if(debug_lvl >= DEBUG_TRAFFIC)
|
|
|
|
{
|
|
|
|
syslog(LOG_WARNING, _("Cannot route packet: unknown destination address %d.%d.%d.%d"),
|
|
|
|
packet->data[30], packet->data[31], packet->data[32], packet->data[33]);
|
|
|
|
}
|
|
|
|
|
|
|
|
return NULL;
|
|
|
|
}
|
2000-10-23 13:52:54 +00:00
|
|
|
cp
|
2001-03-04 13:59:32 +00:00
|
|
|
return subnet->owner;
|
2000-10-23 13:52:54 +00:00
|
|
|
}
|
|
|
|
|
2000-11-20 19:12:17 +00:00
|
|
|
connection_t *route_ipv6(vpn_packet_t *packet)
|
2000-10-23 13:52:54 +00:00
|
|
|
{
|
|
|
|
cp
|
2001-01-05 23:53:53 +00:00
|
|
|
if(debug_lvl > DEBUG_NOTHING)
|
|
|
|
{
|
2001-01-07 15:25:49 +00:00
|
|
|
syslog(LOG_WARNING, _("Cannot route packet: IPv6 routing not yet implemented"));
|
2001-01-05 23:53:53 +00:00
|
|
|
}
|
2000-10-23 13:52:54 +00:00
|
|
|
cp
|
2000-11-04 22:57:33 +00:00
|
|
|
return NULL;
|
2000-10-23 13:52:54 +00:00
|
|
|
}
|
2001-01-05 23:53:53 +00:00
|
|
|
|
2001-06-04 11:14:35 +00:00
|
|
|
void route_arp(vpn_packet_t *packet)
|
|
|
|
{
|
|
|
|
struct ether_arp *arp;
|
|
|
|
subnet_t *subnet;
|
|
|
|
unsigned char ipbuf[4];
|
|
|
|
ipv4_t dest;
|
|
|
|
cp
|
|
|
|
/* This routine generates replies to ARP requests.
|
|
|
|
You don't need to set NOARP flag on the interface anymore (which is broken on FreeBSD).
|
|
|
|
Most of the code here is taken from choparp.c by Takamichi Tateoka (tree@mma.club.uec.ac.jp)
|
|
|
|
*/
|
|
|
|
|
|
|
|
arp = (struct ether_arp *)(packet->data + 14);
|
|
|
|
|
|
|
|
/* Check if this is a valid ARP request */
|
|
|
|
|
|
|
|
if(ntohs(arp->arp_hrd) != ARPHRD_ETHER ||
|
|
|
|
ntohs(arp->arp_pro) != ETHERTYPE_IP ||
|
|
|
|
(int) (arp->arp_hln) != ETHER_ADDR_LEN ||
|
|
|
|
(int) (arp->arp_pln) != 4 ||
|
|
|
|
ntohs(arp->arp_op) != ARPOP_REQUEST )
|
|
|
|
{
|
|
|
|
if(debug_lvl > DEBUG_TRAFFIC)
|
|
|
|
{
|
|
|
|
syslog(LOG_WARNING, _("Cannot route packet: received unknown type ARP request"));
|
|
|
|
}
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Check if the IP address exists on the VPN */
|
|
|
|
|
|
|
|
dest = ntohl(*((unsigned long*)(arp->arp_tpa)));
|
|
|
|
subnet = lookup_subnet_ipv4(&dest);
|
|
|
|
|
|
|
|
if(!subnet)
|
|
|
|
{
|
|
|
|
if(debug_lvl >= DEBUG_TRAFFIC)
|
|
|
|
{
|
|
|
|
syslog(LOG_WARNING, _("Cannot route packet: ARP request for unknown address %d.%d.%d.%d"),
|
|
|
|
arp->arp_tpa[0], arp->arp_tpa[1], arp->arp_tpa[2], arp->arp_tpa[3]);
|
|
|
|
}
|
|
|
|
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Check if it is for our own subnet */
|
|
|
|
|
|
|
|
if(subnet->owner == myself)
|
|
|
|
return; /* silently ignore */
|
|
|
|
|
|
|
|
memcpy(packet->data, packet->data + ETHER_ADDR_LEN, ETHER_ADDR_LEN); /* copy destination address */
|
|
|
|
packet->data[ETHER_ADDR_LEN*2 - 1] ^= 0xFF; /* mangle source address so it looks like it's not from us */
|
|
|
|
|
|
|
|
memcpy(ipbuf, arp->arp_tpa, 4); /* save protocol addr */
|
|
|
|
memcpy(arp->arp_tpa, arp->arp_spa, 4); /* swap destination and source protocol address */
|
|
|
|
memcpy(arp->arp_spa, ipbuf, 4); /* ... */
|
|
|
|
|
|
|
|
memcpy(arp->arp_tha, arp->arp_sha, 10); /* set target hard/proto addr */
|
|
|
|
memcpy(arp->arp_sha, packet->data + ETHER_ADDR_LEN, ETHER_ADDR_LEN); /* add fake source hard addr */
|
|
|
|
arp->arp_op = htons(ARPOP_REPLY);
|
|
|
|
|
|
|
|
accept_packet(packet);
|
|
|
|
cp
|
|
|
|
}
|
|
|
|
|
2001-01-07 15:25:49 +00:00
|
|
|
void route_outgoing(vpn_packet_t *packet)
|
2001-01-05 23:53:53 +00:00
|
|
|
{
|
|
|
|
unsigned short int type;
|
2001-01-07 15:25:49 +00:00
|
|
|
connection_t *cl;
|
2001-01-05 23:53:53 +00:00
|
|
|
cp
|
|
|
|
/* FIXME: multicast? */
|
|
|
|
|
|
|
|
switch(routing_mode)
|
|
|
|
{
|
|
|
|
case RMODE_ROUTER:
|
|
|
|
type = ntohs(*((unsigned short*)(&packet->data[12])));
|
|
|
|
switch(type)
|
|
|
|
{
|
|
|
|
case 0x0800:
|
2001-01-07 15:25:49 +00:00
|
|
|
cl = route_ipv4(packet);
|
|
|
|
break;
|
2001-01-05 23:53:53 +00:00
|
|
|
case 0x86DD:
|
2001-01-07 15:25:49 +00:00
|
|
|
cl = route_ipv6(packet);
|
|
|
|
break;
|
2001-06-04 11:14:35 +00:00
|
|
|
case 0x0806:
|
|
|
|
route_arp(packet);
|
|
|
|
return;
|
2001-01-05 23:53:53 +00:00
|
|
|
default:
|
|
|
|
if(debug_lvl >= DEBUG_TRAFFIC)
|
|
|
|
{
|
|
|
|
syslog(LOG_WARNING, _("Cannot route packet: unknown type %hx"), type);
|
|
|
|
}
|
2001-01-07 15:25:49 +00:00
|
|
|
return;
|
2001-01-05 23:53:53 +00:00
|
|
|
}
|
2001-03-04 13:59:32 +00:00
|
|
|
if(cl)
|
|
|
|
send_packet(cl, packet);
|
2001-01-07 15:25:49 +00:00
|
|
|
break;
|
|
|
|
|
|
|
|
case RMODE_SWITCH:
|
2001-03-04 13:59:32 +00:00
|
|
|
cl = route_mac(myself, packet);
|
2001-01-07 15:25:49 +00:00
|
|
|
if(cl)
|
|
|
|
send_packet(cl, packet);
|
2001-06-05 16:09:55 +00:00
|
|
|
else
|
|
|
|
broadcast_packet(myself, packet);
|
2001-01-07 15:25:49 +00:00
|
|
|
break;
|
|
|
|
|
|
|
|
case RMODE_HUB:
|
2001-06-05 16:09:55 +00:00
|
|
|
broadcast_packet(myself, packet);
|
2001-01-07 15:25:49 +00:00
|
|
|
break;
|
2001-01-05 23:53:53 +00:00
|
|
|
}
|
|
|
|
}
|
2001-01-07 15:25:49 +00:00
|
|
|
|
|
|
|
void route_incoming(connection_t *source, vpn_packet_t *packet)
|
|
|
|
{
|
|
|
|
switch(routing_mode)
|
|
|
|
{
|
2001-05-25 11:54:28 +00:00
|
|
|
case RMODE_ROUTER:
|
2001-06-05 16:09:55 +00:00
|
|
|
memcpy(packet->data, mymac.net.mac.address.x, 6); /* Override destination address to make the kernel accept it */
|
2001-05-25 11:54:28 +00:00
|
|
|
break;
|
2001-01-07 15:25:49 +00:00
|
|
|
case RMODE_SWITCH:
|
2001-06-05 16:09:55 +00:00
|
|
|
if((packet->data[0] & packet->data[1]) == 0xFF) /* Broadcast? */
|
|
|
|
broadcast_packet(source, packet); /* If yes, spread it on */
|
|
|
|
else
|
|
|
|
learn_mac(source, (mac_t *)(&packet->data[6]));
|
|
|
|
break;
|
|
|
|
case RMODE_HUB:
|
|
|
|
broadcast_packet(source,packet); /* Spread it on */
|
2001-01-07 15:25:49 +00:00
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
accept_packet(packet);
|
|
|
|
}
|