2000-03-26 00:33:07 +00:00
|
|
|
/*
|
|
|
|
netutl.c -- some supporting network utility code
|
2000-05-30 11:18:12 +00:00
|
|
|
Copyright (C) 1998,1999,2000 Ivo Timmermans <itimmermans@bigfoot.com>
|
2000-03-26 00:33:07 +00:00
|
|
|
|
|
|
|
This program is free software; you can redistribute it and/or modify
|
|
|
|
it under the terms of the GNU General Public License as published by
|
|
|
|
the Free Software Foundation; either version 2 of the License, or
|
|
|
|
(at your option) any later version.
|
|
|
|
|
|
|
|
This program is distributed in the hope that it will be useful,
|
|
|
|
but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
GNU General Public License for more details.
|
|
|
|
|
|
|
|
You should have received a copy of the GNU General Public License
|
|
|
|
along with this program; if not, write to the Free Software
|
|
|
|
Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
|
2000-05-30 11:18:12 +00:00
|
|
|
|
|
|
|
$Id: netutl.c,v 1.11 2000/05/30 11:18:12 zarq Exp $
|
2000-03-26 00:33:07 +00:00
|
|
|
*/
|
|
|
|
|
|
|
|
#include "config.h"
|
|
|
|
|
|
|
|
#include <arpa/inet.h>
|
|
|
|
#include <netdb.h>
|
|
|
|
#include <netinet/in.h>
|
|
|
|
#include <stdio.h>
|
|
|
|
#include <stdlib.h>
|
|
|
|
#include <string.h>
|
|
|
|
#include <sys/socket.h>
|
|
|
|
#include <syslog.h>
|
|
|
|
|
|
|
|
#include <utils.h>
|
|
|
|
#include <xalloc.h>
|
|
|
|
|
2000-05-30 11:18:12 +00:00
|
|
|
#include "conf.h"
|
2000-03-26 00:33:07 +00:00
|
|
|
#include "encr.h"
|
|
|
|
#include "net.h"
|
|
|
|
#include "netutl.h"
|
|
|
|
|
2000-05-29 21:01:26 +00:00
|
|
|
#include "system.h"
|
|
|
|
|
2000-03-26 00:33:07 +00:00
|
|
|
/*
|
|
|
|
look for a connection associated with the given vpn ip,
|
2000-05-27 19:04:12 +00:00
|
|
|
return its connection structure.
|
|
|
|
Skips connections that are not activated!
|
2000-03-26 00:33:07 +00:00
|
|
|
*/
|
|
|
|
conn_list_t *lookup_conn(ip_t ip)
|
|
|
|
{
|
|
|
|
conn_list_t *p = conn_list;
|
2000-05-14 12:22:42 +00:00
|
|
|
cp
|
2000-03-26 00:33:07 +00:00
|
|
|
/* Exact match suggested by James B. MacLean */
|
|
|
|
for(p = conn_list; p != NULL; p = p->next)
|
2000-05-27 19:23:20 +00:00
|
|
|
if((ip == p->vpn_ip) && p->status.active)
|
2000-03-26 00:33:07 +00:00
|
|
|
return p;
|
|
|
|
for(p = conn_list; p != NULL; p = p->next)
|
2000-05-27 19:23:20 +00:00
|
|
|
if(((ip & p->vpn_mask) == (p->vpn_ip & p->vpn_mask)) && p->status.active)
|
2000-03-26 00:33:07 +00:00
|
|
|
return p;
|
2000-04-25 18:57:23 +00:00
|
|
|
cp
|
2000-03-26 00:33:07 +00:00
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
free a queue and all of its elements
|
|
|
|
*/
|
|
|
|
void destroy_queue(packet_queue_t *pq)
|
|
|
|
{
|
|
|
|
queue_element_t *p, *q;
|
2000-04-25 18:57:23 +00:00
|
|
|
cp
|
2000-03-26 00:33:07 +00:00
|
|
|
for(p = pq->head; p != NULL; p = q)
|
|
|
|
{
|
|
|
|
q = p->next;
|
|
|
|
if(p->packet)
|
|
|
|
free(p->packet);
|
|
|
|
free(p);
|
|
|
|
}
|
|
|
|
|
|
|
|
free(pq);
|
2000-04-25 18:57:23 +00:00
|
|
|
cp
|
2000-03-26 00:33:07 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
free a conn_list_t element and all its pointers
|
|
|
|
*/
|
|
|
|
void free_conn_element(conn_list_t *p)
|
|
|
|
{
|
2000-04-25 18:57:23 +00:00
|
|
|
cp
|
2000-03-26 00:33:07 +00:00
|
|
|
if(p->hostname)
|
|
|
|
free(p->hostname);
|
|
|
|
if(p->sq)
|
|
|
|
destroy_queue(p->sq);
|
|
|
|
if(p->rq)
|
|
|
|
destroy_queue(p->rq);
|
|
|
|
free_key(p->public_key);
|
|
|
|
free_key(p->key);
|
|
|
|
free(p);
|
2000-04-25 18:57:23 +00:00
|
|
|
cp
|
2000-03-26 00:33:07 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
remove all marked connections
|
|
|
|
*/
|
|
|
|
void prune_conn_list(void)
|
|
|
|
{
|
|
|
|
conn_list_t *p, *prev = NULL, *next = NULL;
|
2000-04-25 18:57:23 +00:00
|
|
|
cp
|
2000-03-26 00:33:07 +00:00
|
|
|
for(p = conn_list; p != NULL; )
|
|
|
|
{
|
|
|
|
next = p->next;
|
|
|
|
|
|
|
|
if(p->status.remove)
|
|
|
|
{
|
|
|
|
if(prev)
|
|
|
|
prev->next = next;
|
|
|
|
else
|
|
|
|
conn_list = next;
|
|
|
|
|
|
|
|
free_conn_element(p);
|
|
|
|
}
|
|
|
|
else
|
|
|
|
prev = p;
|
|
|
|
|
|
|
|
p = next;
|
|
|
|
}
|
2000-04-25 18:57:23 +00:00
|
|
|
cp
|
2000-03-26 00:33:07 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
creates new conn_list element, and initializes it
|
|
|
|
*/
|
|
|
|
conn_list_t *new_conn_list(void)
|
|
|
|
{
|
2000-04-26 17:42:55 +00:00
|
|
|
conn_list_t *p = xmalloc(sizeof(*p));
|
2000-04-25 18:57:23 +00:00
|
|
|
cp
|
2000-03-26 00:33:07 +00:00
|
|
|
/* initialise all those stupid pointers at once */
|
2000-04-26 17:42:55 +00:00
|
|
|
memset(p, '\0', sizeof(*p));
|
2000-04-30 01:16:51 +00:00
|
|
|
p->vpn_mask = (ip_t)(~0L); /* If this isn't done, it would be a
|
|
|
|
wastebucket for all packets with
|
|
|
|
unknown destination. */
|
2000-03-26 00:33:07 +00:00
|
|
|
p->nexthop = p;
|
2000-04-25 18:57:23 +00:00
|
|
|
cp
|
2000-03-26 00:33:07 +00:00
|
|
|
return p;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
free all elements of conn_list
|
|
|
|
*/
|
|
|
|
void destroy_conn_list(void)
|
|
|
|
{
|
|
|
|
conn_list_t *p, *next;
|
|
|
|
cp
|
|
|
|
for(p = conn_list; p != NULL; )
|
|
|
|
{
|
|
|
|
next = p->next;
|
|
|
|
free_conn_element(p);
|
|
|
|
p = next;
|
|
|
|
}
|
|
|
|
|
|
|
|
conn_list = NULL;
|
2000-04-25 18:57:23 +00:00
|
|
|
cp
|
2000-03-26 00:33:07 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
look up the name associated with the ip
|
|
|
|
address `addr'
|
|
|
|
*/
|
|
|
|
char *hostlookup(unsigned long addr)
|
|
|
|
{
|
|
|
|
char *name;
|
|
|
|
struct hostent *host = NULL;
|
|
|
|
struct in_addr in;
|
2000-05-30 11:18:12 +00:00
|
|
|
config_t const *cfg;
|
|
|
|
int lookup_hostname;
|
2000-04-25 18:57:23 +00:00
|
|
|
cp
|
2000-03-26 00:33:07 +00:00
|
|
|
in.s_addr = addr;
|
|
|
|
|
2000-05-30 11:18:12 +00:00
|
|
|
lookup_hostname = 0;
|
|
|
|
if((cfg = get_config_val(resolve_dns)) != NULL)
|
|
|
|
if(cfg->data.val == stupid_true)
|
|
|
|
lookup_hostname = 1;
|
|
|
|
|
|
|
|
if(lookup_hostname)
|
|
|
|
host = gethostbyaddr((char *)&in, sizeof(in), AF_INET);
|
2000-03-26 00:33:07 +00:00
|
|
|
|
2000-05-30 11:18:12 +00:00
|
|
|
if(!lookup_hostname || !host)
|
2000-03-26 00:33:07 +00:00
|
|
|
{
|
2000-05-30 11:18:12 +00:00
|
|
|
name = xmalloc(20);
|
|
|
|
sprintf(name, "%s", inet_ntoa(in));
|
2000-03-26 00:33:07 +00:00
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
2000-05-30 11:18:12 +00:00
|
|
|
name = xmalloc(strlen(host->h_name)+20);
|
|
|
|
sprintf(name, "%s (%s)", host->h_name, inet_ntoa(in));
|
2000-03-26 00:33:07 +00:00
|
|
|
}
|
2000-04-25 18:57:23 +00:00
|
|
|
cp
|
2000-03-26 00:33:07 +00:00
|
|
|
return name;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
Turn a string into an IP addy with netmask
|
|
|
|
return NULL on failure
|
|
|
|
*/
|
|
|
|
ip_mask_t *strtoip(char *str)
|
|
|
|
{
|
|
|
|
ip_mask_t *ip;
|
|
|
|
int masker;
|
|
|
|
char *q, *p;
|
|
|
|
struct hostent *h;
|
2000-04-25 18:57:23 +00:00
|
|
|
cp
|
2000-03-26 00:33:07 +00:00
|
|
|
p = str;
|
|
|
|
if((q = strchr(p, '/')))
|
|
|
|
{
|
|
|
|
*q = '\0';
|
|
|
|
q++; /* q now points to netmask part, or NULL if no mask */
|
|
|
|
}
|
|
|
|
|
|
|
|
if(!(h = gethostbyname(p)))
|
|
|
|
{
|
2000-05-29 21:01:26 +00:00
|
|
|
fprintf(stderr, _("Error looking up `%s': %s\n"), p, sys_errlist[h_errno]);
|
2000-03-26 00:33:07 +00:00
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
|
|
|
masker = 0;
|
|
|
|
if(q)
|
|
|
|
{
|
|
|
|
masker = strtol(q, &p, 10);
|
|
|
|
if(q == p || (*p))
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
2000-04-26 17:42:55 +00:00
|
|
|
ip = xmalloc(sizeof(*ip));
|
2000-03-26 00:33:07 +00:00
|
|
|
ip->ip = ntohl(*((ip_t*)(h->h_addr_list[0])));
|
|
|
|
|
|
|
|
ip->mask = masker ? ~((1 << (32 - masker)) - 1) : 0;
|
2000-04-25 18:57:23 +00:00
|
|
|
cp
|
2000-03-26 00:33:07 +00:00
|
|
|
return ip;
|
|
|
|
}
|
|
|
|
|
|
|
|
void dump_conn_list(void)
|
|
|
|
{
|
|
|
|
conn_list_t *p;
|
2000-04-25 18:57:23 +00:00
|
|
|
cp
|
2000-05-29 21:01:26 +00:00
|
|
|
syslog(LOG_DEBUG, _("Connection list:"));
|
2000-03-26 00:33:07 +00:00
|
|
|
|
|
|
|
for(p = conn_list; p != NULL; p = p->next)
|
|
|
|
{
|
|
|
|
syslog(LOG_DEBUG, " " IP_ADDR_S "/" IP_ADDR_S ": %04x (%d|%d)",
|
|
|
|
IP_ADDR_V(p->vpn_ip), IP_ADDR_V(p->vpn_mask), p->status,
|
|
|
|
p->socket, p->meta_socket);
|
|
|
|
}
|
2000-04-25 18:57:23 +00:00
|
|
|
cp
|
2000-03-26 00:33:07 +00:00
|
|
|
}
|