2000-03-26 00:33:07 +00:00
|
|
|
/*
|
|
|
|
net.c -- most of the network code
|
2000-05-29 22:20:04 +00:00
|
|
|
Copyright (C) 1998,1999,2000 Ivo Timmermans <itimmermans@bigfoot.com>,
|
|
|
|
2000 Guus Sliepen <guus@sliepen.warande.net>
|
2000-03-26 00:33:07 +00:00
|
|
|
|
|
|
|
This program is free software; you can redistribute it and/or modify
|
|
|
|
it under the terms of the GNU General Public License as published by
|
|
|
|
the Free Software Foundation; either version 2 of the License, or
|
|
|
|
(at your option) any later version.
|
|
|
|
|
|
|
|
This program is distributed in the hope that it will be useful,
|
|
|
|
but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
GNU General Public License for more details.
|
|
|
|
|
|
|
|
You should have received a copy of the GNU General Public License
|
|
|
|
along with this program; if not, write to the Free Software
|
|
|
|
Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
|
2000-05-29 22:20:04 +00:00
|
|
|
|
2000-08-09 09:34:21 +00:00
|
|
|
$Id: net.c,v 1.35.4.25 2000/08/09 09:34:21 guus Exp $
|
2000-03-26 00:33:07 +00:00
|
|
|
*/
|
|
|
|
|
|
|
|
#include "config.h"
|
|
|
|
|
|
|
|
#include <arpa/inet.h>
|
|
|
|
#include <errno.h>
|
|
|
|
#include <fcntl.h>
|
|
|
|
#include <netdb.h>
|
|
|
|
#include <netinet/in.h>
|
|
|
|
#include <stdio.h>
|
|
|
|
#include <stdlib.h>
|
|
|
|
#include <string.h>
|
|
|
|
#include <sys/signal.h>
|
|
|
|
#include <sys/socket.h>
|
|
|
|
#include <sys/time.h>
|
|
|
|
#include <sys/types.h>
|
|
|
|
#include <syslog.h>
|
|
|
|
#include <unistd.h>
|
|
|
|
|
|
|
|
#include <cipher.h>
|
|
|
|
#include <utils.h>
|
|
|
|
#include <xalloc.h>
|
|
|
|
|
|
|
|
#include "conf.h"
|
|
|
|
#include "encr.h"
|
|
|
|
#include "net.h"
|
|
|
|
#include "netutl.h"
|
|
|
|
#include "protocol.h"
|
|
|
|
|
2000-05-29 21:01:26 +00:00
|
|
|
#include "system.h"
|
|
|
|
|
2000-03-26 00:33:07 +00:00
|
|
|
int tap_fd = -1;
|
|
|
|
|
|
|
|
int total_tap_in = 0;
|
|
|
|
int total_tap_out = 0;
|
|
|
|
int total_socket_in = 0;
|
|
|
|
int total_socket_out = 0;
|
|
|
|
|
2000-06-27 20:10:48 +00:00
|
|
|
int upstreamindex = 0;
|
2000-05-27 19:44:04 +00:00
|
|
|
static int seconds_till_retry;
|
|
|
|
|
2000-03-26 00:33:07 +00:00
|
|
|
/* The global list of existing connections */
|
|
|
|
conn_list_t *conn_list = NULL;
|
|
|
|
conn_list_t *myself = NULL;
|
|
|
|
|
|
|
|
/*
|
|
|
|
strip off the MAC adresses of an ethernet frame
|
|
|
|
*/
|
|
|
|
void strip_mac_addresses(vpn_packet_t *p)
|
|
|
|
{
|
|
|
|
unsigned char tmp[MAXSIZE];
|
2000-04-25 18:57:23 +00:00
|
|
|
cp
|
2000-03-26 00:33:07 +00:00
|
|
|
memcpy(tmp, p->data, p->len);
|
|
|
|
p->len -= 12;
|
|
|
|
memcpy(p->data, &tmp[12], p->len);
|
2000-04-25 18:57:23 +00:00
|
|
|
cp
|
2000-03-26 00:33:07 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
reassemble MAC addresses
|
|
|
|
*/
|
|
|
|
void add_mac_addresses(vpn_packet_t *p)
|
|
|
|
{
|
|
|
|
unsigned char tmp[MAXSIZE];
|
2000-04-25 18:57:23 +00:00
|
|
|
cp
|
2000-03-26 00:33:07 +00:00
|
|
|
memcpy(&tmp[12], p->data, p->len);
|
|
|
|
p->len += 12;
|
|
|
|
tmp[0] = tmp[6] = 0xfe;
|
|
|
|
tmp[1] = tmp[7] = 0xfd;
|
|
|
|
*((ip_t*)(&tmp[2])) = (ip_t)(htonl(myself->vpn_ip));
|
|
|
|
*((ip_t*)(&tmp[8])) = *((ip_t*)(&tmp[26]));
|
|
|
|
memcpy(p->data, &tmp[0], p->len);
|
2000-04-25 18:57:23 +00:00
|
|
|
cp
|
2000-03-26 00:33:07 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
int xsend(conn_list_t *cl, void *packet)
|
|
|
|
{
|
|
|
|
real_packet_t rp;
|
2000-04-25 18:57:23 +00:00
|
|
|
cp
|
2000-03-26 00:33:07 +00:00
|
|
|
do_encrypt((vpn_packet_t*)packet, &rp, cl->key);
|
2000-05-03 15:37:32 +00:00
|
|
|
rp.from = htonl(myself->vpn_ip);
|
2000-05-03 17:59:07 +00:00
|
|
|
rp.data.len = htons(rp.data.len);
|
|
|
|
rp.len = htons(rp.len);
|
2000-03-26 00:33:07 +00:00
|
|
|
|
|
|
|
if(debug_lvl > 3)
|
2000-06-29 13:04:15 +00:00
|
|
|
syslog(LOG_ERR, _("Sending packet of %d bytes to %s (%s)"),
|
|
|
|
ntohs(rp.len), cl->vpn_hostname, cl->real_hostname);
|
2000-03-26 00:33:07 +00:00
|
|
|
|
2000-08-07 16:27:29 +00:00
|
|
|
total_socket_out += ntohs(rp.len);
|
2000-08-07 14:52:16 +00:00
|
|
|
|
|
|
|
cl->want_ping = 1;
|
|
|
|
|
|
|
|
if((cl->flags | myself->flags) & TCPONLY)
|
2000-08-07 16:27:29 +00:00
|
|
|
return send_tcppacket(cl, (void*)&rp, ntohs(rp.len));
|
2000-08-07 14:52:16 +00:00
|
|
|
|
2000-08-07 16:27:29 +00:00
|
|
|
if((send(cl->socket, (char*)&rp, ntohs(rp.len), 0)) < 0)
|
2000-03-26 00:33:07 +00:00
|
|
|
{
|
2000-06-29 13:04:15 +00:00
|
|
|
syslog(LOG_ERR, _("Error sending packet to %s (%s): %m"),
|
|
|
|
cl->vpn_hostname, cl->real_hostname);
|
2000-03-26 00:33:07 +00:00
|
|
|
return -1;
|
|
|
|
}
|
2000-04-25 18:57:23 +00:00
|
|
|
cp
|
2000-03-26 00:33:07 +00:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2000-05-03 18:02:15 +00:00
|
|
|
int xrecv(conn_list_t *cl, void *packet)
|
2000-03-26 00:33:07 +00:00
|
|
|
{
|
|
|
|
vpn_packet_t vp;
|
|
|
|
int lenin;
|
2000-04-25 18:57:23 +00:00
|
|
|
cp
|
2000-03-26 00:33:07 +00:00
|
|
|
do_decrypt((real_packet_t*)packet, &vp, cl->key);
|
|
|
|
add_mac_addresses(&vp);
|
2000-08-08 13:47:57 +00:00
|
|
|
|
2000-06-26 19:39:34 +00:00
|
|
|
if(debug_lvl > 3)
|
2000-06-29 13:04:15 +00:00
|
|
|
syslog(LOG_ERR, _("Receiving packet of %d bytes from %s (%s)"),
|
|
|
|
((real_packet_t*)packet)->len, cl->vpn_hostname, cl->real_hostname);
|
2000-08-08 13:47:57 +00:00
|
|
|
|
2000-04-28 11:33:25 +00:00
|
|
|
if((lenin = write(tap_fd, &vp, vp.len + sizeof(vp.len))) < 0)
|
2000-05-29 21:01:26 +00:00
|
|
|
syslog(LOG_ERR, _("Can't write to tap device: %m"));
|
2000-03-26 00:33:07 +00:00
|
|
|
else
|
|
|
|
total_tap_out += lenin;
|
2000-08-08 13:47:57 +00:00
|
|
|
|
2000-05-14 13:02:20 +00:00
|
|
|
cl->want_ping = 0;
|
|
|
|
cl->last_ping_time = time(NULL);
|
2000-04-25 18:57:23 +00:00
|
|
|
cp
|
2000-03-26 00:33:07 +00:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2000-08-08 17:07:48 +00:00
|
|
|
int tcprecv(conn_list_t *cl, real_packet_t *rp)
|
|
|
|
{
|
|
|
|
vpn_packet_t vp;
|
|
|
|
int lenin;
|
|
|
|
conn_list_t *f;
|
|
|
|
cp
|
|
|
|
rp->data.len = ntohs(rp->data.len);
|
|
|
|
rp->len = ntohs(rp->len);
|
|
|
|
rp->from = ntohl(rp->from);
|
|
|
|
|
|
|
|
total_socket_in += rp->len;
|
|
|
|
|
|
|
|
if(rp->len >= 0)
|
|
|
|
{
|
|
|
|
f = lookup_conn(rp->from);
|
|
|
|
if(!f)
|
|
|
|
{
|
|
|
|
syslog(LOG_ERR, _("Got packet from %s (%s) with unknown origin %d.%d.%d.%d?"),
|
|
|
|
cl->vpn_hostname, cl->real_hostname, IP_ADDR_V(rp->from));
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
if(f->status.validkey)
|
|
|
|
{
|
|
|
|
do_decrypt(rp, &vp, cl->key);
|
|
|
|
add_mac_addresses(&vp);
|
|
|
|
|
|
|
|
if(debug_lvl > 3)
|
|
|
|
syslog(LOG_ERR, _("Receiving packet of %d bytes from %s (%s)"),
|
|
|
|
rp->len, cl->vpn_hostname, cl->real_hostname);
|
|
|
|
|
|
|
|
if((lenin = write(tap_fd, &vp, vp.len + sizeof(vp.len))) < 0)
|
|
|
|
syslog(LOG_ERR, _("Can't write to tap device: %m"));
|
|
|
|
else
|
|
|
|
total_tap_out += lenin;
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
2000-08-09 09:34:21 +00:00
|
|
|
add_queue(&(cl->sq), rp, rp->len + 2);
|
2000-08-08 17:07:48 +00:00
|
|
|
if(!cl->status.waitingforkey)
|
|
|
|
send_key_request(rp->from);
|
|
|
|
}
|
|
|
|
|
|
|
|
if(my_key_expiry <= time(NULL))
|
|
|
|
regenerate_keys();
|
|
|
|
}
|
|
|
|
|
|
|
|
cl->want_ping = 0;
|
|
|
|
cl->last_ping_time = time(NULL);
|
|
|
|
cp
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2000-03-26 00:33:07 +00:00
|
|
|
/*
|
|
|
|
add the given packet of size s to the
|
|
|
|
queue q, be it the send or receive queue
|
|
|
|
*/
|
|
|
|
void add_queue(packet_queue_t **q, void *packet, size_t s)
|
|
|
|
{
|
2000-04-25 20:10:37 +00:00
|
|
|
queue_element_t *e;
|
2000-04-25 18:57:23 +00:00
|
|
|
cp
|
2000-04-26 17:42:55 +00:00
|
|
|
e = xmalloc(sizeof(*e));
|
2000-03-26 00:33:07 +00:00
|
|
|
e->packet = xmalloc(s);
|
|
|
|
memcpy(e->packet, packet, s);
|
2000-04-25 20:10:37 +00:00
|
|
|
|
2000-03-26 00:33:07 +00:00
|
|
|
if(!*q)
|
|
|
|
{
|
2000-04-26 17:42:55 +00:00
|
|
|
*q = xmalloc(sizeof(**q));
|
2000-03-26 00:33:07 +00:00
|
|
|
(*q)->head = (*q)->tail = NULL;
|
|
|
|
}
|
|
|
|
|
2000-04-25 20:10:37 +00:00
|
|
|
e->next = NULL; /* We insert at the tail */
|
2000-03-26 00:33:07 +00:00
|
|
|
|
2000-04-25 20:10:37 +00:00
|
|
|
if((*q)->tail) /* Do we have a tail? */
|
|
|
|
{
|
|
|
|
(*q)->tail->next = e;
|
|
|
|
e->prev = (*q)->tail;
|
|
|
|
}
|
|
|
|
else /* No tail -> no head too */
|
|
|
|
{
|
|
|
|
(*q)->head = e;
|
|
|
|
e->prev = NULL;
|
|
|
|
}
|
2000-03-26 00:33:07 +00:00
|
|
|
|
|
|
|
(*q)->tail = e;
|
2000-04-25 20:10:37 +00:00
|
|
|
cp
|
|
|
|
}
|
2000-03-26 00:33:07 +00:00
|
|
|
|
2000-04-25 20:10:37 +00:00
|
|
|
/* Remove a queue element */
|
2000-04-25 20:17:44 +00:00
|
|
|
void del_queue(packet_queue_t **q, queue_element_t *e)
|
2000-04-25 20:10:37 +00:00
|
|
|
{
|
|
|
|
cp
|
|
|
|
free(e->packet);
|
|
|
|
|
|
|
|
if(e->next) /* There is a successor, so we are not tail */
|
|
|
|
{
|
|
|
|
if(e->prev) /* There is a predecessor, so we are not head */
|
|
|
|
{
|
|
|
|
e->next->prev = e->prev;
|
|
|
|
e->prev->next = e->next;
|
|
|
|
}
|
|
|
|
else /* We are head */
|
|
|
|
{
|
|
|
|
e->next->prev = NULL;
|
|
|
|
(*q)->head = e->next;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
else /* We are tail (or all alone!) */
|
|
|
|
{
|
|
|
|
if(e->prev) /* We are not alone :) */
|
|
|
|
{
|
|
|
|
e->prev->next = NULL;
|
|
|
|
(*q)->tail = e->prev;
|
|
|
|
}
|
|
|
|
else /* Adieu */
|
|
|
|
{
|
|
|
|
free(*q);
|
|
|
|
*q = NULL;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
free(e);
|
2000-04-25 18:57:23 +00:00
|
|
|
cp
|
2000-03-26 00:33:07 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
flush a queue by calling function for
|
|
|
|
each packet, and removing it when that
|
|
|
|
returned a zero exit code
|
|
|
|
*/
|
2000-04-25 20:10:37 +00:00
|
|
|
void flush_queue(conn_list_t *cl, packet_queue_t **pq,
|
2000-03-26 00:33:07 +00:00
|
|
|
int (*function)(conn_list_t*,void*))
|
|
|
|
{
|
2000-04-25 20:17:44 +00:00
|
|
|
queue_element_t *p, *next = NULL;
|
2000-04-25 18:57:23 +00:00
|
|
|
cp
|
2000-04-25 20:10:37 +00:00
|
|
|
for(p = (*pq)->head; p != NULL; )
|
2000-03-26 00:33:07 +00:00
|
|
|
{
|
|
|
|
next = p->next;
|
|
|
|
|
|
|
|
if(!function(cl, p->packet))
|
2000-04-25 20:10:37 +00:00
|
|
|
del_queue(pq, p);
|
|
|
|
|
2000-03-26 00:33:07 +00:00
|
|
|
p = next;
|
|
|
|
}
|
|
|
|
|
|
|
|
if(debug_lvl > 3)
|
2000-06-26 19:39:34 +00:00
|
|
|
syslog(LOG_DEBUG, _("Queue flushed"));
|
2000-04-25 18:57:23 +00:00
|
|
|
cp
|
2000-03-26 00:33:07 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
flush the send&recv queues
|
|
|
|
void because nothing goes wrong here, packets
|
|
|
|
remain in the queue if something goes wrong
|
|
|
|
*/
|
|
|
|
void flush_queues(conn_list_t *cl)
|
|
|
|
{
|
|
|
|
cp
|
|
|
|
if(cl->sq)
|
|
|
|
{
|
2000-06-25 15:16:12 +00:00
|
|
|
if(debug_lvl > 3)
|
2000-06-29 13:04:15 +00:00
|
|
|
syslog(LOG_DEBUG, _("Flushing send queue for %s (%s)"),
|
|
|
|
cl->vpn_hostname, cl->real_hostname);
|
2000-04-25 20:10:37 +00:00
|
|
|
flush_queue(cl, &(cl->sq), xsend);
|
2000-03-26 00:33:07 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
if(cl->rq)
|
|
|
|
{
|
2000-06-25 15:16:12 +00:00
|
|
|
if(debug_lvl > 3)
|
2000-06-29 13:04:15 +00:00
|
|
|
syslog(LOG_DEBUG, _("Flushing receive queue for %s (%s)"),
|
|
|
|
cl->vpn_hostname, cl->real_hostname);
|
2000-04-25 20:10:37 +00:00
|
|
|
flush_queue(cl, &(cl->rq), xrecv);
|
2000-03-26 00:33:07 +00:00
|
|
|
}
|
|
|
|
cp
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
send a packet to the given vpn ip.
|
|
|
|
*/
|
|
|
|
int send_packet(ip_t to, vpn_packet_t *packet)
|
|
|
|
{
|
|
|
|
conn_list_t *cl;
|
2000-04-25 18:57:23 +00:00
|
|
|
cp
|
2000-03-26 00:33:07 +00:00
|
|
|
if((cl = lookup_conn(to)) == NULL)
|
|
|
|
{
|
2000-06-25 15:16:12 +00:00
|
|
|
if(debug_lvl > 3)
|
2000-03-26 00:33:07 +00:00
|
|
|
{
|
2000-06-29 13:04:15 +00:00
|
|
|
syslog(LOG_NOTICE, _("Trying to look up %d.%d.%d.%d in connection list failed!"),
|
2000-03-26 00:33:07 +00:00
|
|
|
IP_ADDR_V(to));
|
|
|
|
}
|
2000-06-23 19:27:03 +00:00
|
|
|
|
|
|
|
/* Is this really necessary? If we can't find "to", then neither should any uplink. (GS) */
|
|
|
|
|
|
|
|
return -1;
|
|
|
|
|
2000-03-26 00:33:07 +00:00
|
|
|
for(cl = conn_list; cl != NULL && !cl->status.outgoing; cl = cl->next);
|
|
|
|
if(!cl)
|
2000-03-27 22:30:27 +00:00
|
|
|
{ /* No open outgoing connection has been found. */
|
2000-06-25 15:16:12 +00:00
|
|
|
if(debug_lvl > 3)
|
|
|
|
syslog(LOG_NOTICE, _("There is no remote host I can send this packet to!"));
|
2000-03-26 00:33:07 +00:00
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
}
|
2000-06-26 19:39:34 +00:00
|
|
|
|
2000-06-24 12:35:42 +00:00
|
|
|
/* If we ourselves have indirectdata flag set, we should send only to our uplink! */
|
|
|
|
|
|
|
|
if(myself->flags & EXPORTINDIRECTDATA)
|
|
|
|
{
|
|
|
|
for(cl = conn_list; cl != NULL && !cl->status.outgoing; cl = cl->next);
|
|
|
|
if(!cl)
|
|
|
|
{ /* No open outgoing connection has been found. */
|
2000-06-25 15:16:12 +00:00
|
|
|
if(debug_lvl > 3)
|
|
|
|
syslog(LOG_NOTICE, _("There is no remote host I can send this packet to!"));
|
2000-06-24 12:35:42 +00:00
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
else
|
|
|
|
|
|
|
|
/* If indirectdata flag is set for the destination we just looked up,
|
|
|
|
* then real_ip is actually the vpn_ip of the gateway tincd
|
2000-06-23 19:27:03 +00:00
|
|
|
* it is behind.
|
|
|
|
*/
|
|
|
|
|
|
|
|
if(cl->flags & INDIRECTDATA)
|
|
|
|
{
|
2000-06-26 19:39:34 +00:00
|
|
|
if(debug_lvl > 3)
|
2000-06-29 13:04:15 +00:00
|
|
|
syslog(LOG_NOTICE, _("Indirect packet to %s via %s"),
|
|
|
|
cl->vpn_hostname, cl->real_hostname);
|
2000-06-26 19:39:34 +00:00
|
|
|
if((cl = lookup_conn(cl->real_ip)) == NULL)
|
2000-06-23 19:27:03 +00:00
|
|
|
{
|
2000-06-25 15:16:12 +00:00
|
|
|
if(debug_lvl > 3)
|
2000-06-29 13:04:15 +00:00
|
|
|
syslog(LOG_NOTICE, _("Indirect look up %d.%d.%d.%d in connection list failed!"),
|
2000-06-23 19:27:03 +00:00
|
|
|
IP_ADDR_V(to));
|
|
|
|
|
|
|
|
/* Gateway tincd dead? Should we kill it? (GS) */
|
|
|
|
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
if(cl->flags & INDIRECTDATA) /* This should not happen */
|
2000-06-26 19:39:34 +00:00
|
|
|
{
|
|
|
|
if(debug_lvl > 3)
|
2000-06-29 13:04:15 +00:00
|
|
|
syslog(LOG_NOTICE, _("Double indirection for %d.%d.%d.%d"),
|
2000-06-26 19:39:34 +00:00
|
|
|
IP_ADDR_V(to));
|
|
|
|
return -1;
|
|
|
|
}
|
2000-06-23 19:27:03 +00:00
|
|
|
}
|
|
|
|
|
2000-03-26 00:33:07 +00:00
|
|
|
if(my_key_expiry <= time(NULL))
|
|
|
|
regenerate_keys();
|
|
|
|
|
|
|
|
if(!cl->status.dataopen)
|
|
|
|
if(setup_vpn_connection(cl) < 0)
|
2000-06-26 19:39:34 +00:00
|
|
|
{
|
2000-06-29 13:04:15 +00:00
|
|
|
syslog(LOG_ERR, _("Could not open UDP connection to %s (%s)"), cl->vpn_hostname, cl->real_hostname);
|
2000-06-26 19:39:34 +00:00
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
2000-03-26 00:33:07 +00:00
|
|
|
if(!cl->status.validkey)
|
|
|
|
{
|
2000-06-26 19:39:34 +00:00
|
|
|
if(debug_lvl > 3)
|
2000-06-29 13:04:15 +00:00
|
|
|
syslog(LOG_INFO, _("%s (%s) has no valid key, queueing packet"), cl->vpn_hostname, cl->real_hostname);
|
2000-03-26 00:33:07 +00:00
|
|
|
add_queue(&(cl->sq), packet, packet->len + 2);
|
|
|
|
if(!cl->status.waitingforkey)
|
2000-04-25 20:50:59 +00:00
|
|
|
send_key_request(cl->vpn_ip); /* Keys should be sent to the host running the tincd */
|
2000-03-26 00:33:07 +00:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
if(!cl->status.active)
|
|
|
|
{
|
2000-06-25 15:16:12 +00:00
|
|
|
if(debug_lvl > 3)
|
2000-06-29 13:04:15 +00:00
|
|
|
syslog(LOG_INFO, _("%s (%s) is not ready, queueing packet"), cl->vpn_hostname, cl->real_hostname);
|
2000-06-26 19:39:34 +00:00
|
|
|
add_queue(&(cl->sq), packet, packet->len + 2);
|
2000-03-26 00:33:07 +00:00
|
|
|
return 0; /* We don't want to mess up, do we? */
|
|
|
|
}
|
|
|
|
|
|
|
|
/* can we send it? can we? can we? huh? */
|
|
|
|
cp
|
|
|
|
return xsend(cl, packet);
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
open the local ethertap device
|
|
|
|
*/
|
|
|
|
int setup_tap_fd(void)
|
|
|
|
{
|
|
|
|
int nfd;
|
|
|
|
const char *tapfname;
|
|
|
|
config_t const *cfg;
|
2000-04-25 18:57:23 +00:00
|
|
|
cp
|
2000-03-26 00:33:07 +00:00
|
|
|
if((cfg = get_config_val(tapdevice)) == NULL)
|
|
|
|
tapfname = "/dev/tap0";
|
|
|
|
else
|
|
|
|
tapfname = cfg->data.ptr;
|
|
|
|
|
|
|
|
if((nfd = open(tapfname, O_RDWR | O_NONBLOCK)) < 0)
|
|
|
|
{
|
2000-05-29 21:01:26 +00:00
|
|
|
syslog(LOG_ERR, _("Could not open %s: %m"), tapfname);
|
2000-03-26 00:33:07 +00:00
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
tap_fd = nfd;
|
2000-04-25 18:57:23 +00:00
|
|
|
cp
|
2000-03-26 00:33:07 +00:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
set up the socket that we listen on for incoming
|
|
|
|
(tcp) connections
|
|
|
|
*/
|
|
|
|
int setup_listen_meta_socket(int port)
|
|
|
|
{
|
|
|
|
int nfd, flags;
|
|
|
|
struct sockaddr_in a;
|
|
|
|
const int one = 1;
|
2000-04-25 18:57:23 +00:00
|
|
|
cp
|
2000-03-26 00:33:07 +00:00
|
|
|
if((nfd = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP)) < 0)
|
|
|
|
{
|
2000-05-29 21:01:26 +00:00
|
|
|
syslog(LOG_ERR, _("Creating metasocket failed: %m"));
|
2000-03-26 00:33:07 +00:00
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
if(setsockopt(nfd, SOL_SOCKET, SO_REUSEADDR, &one, sizeof(one)))
|
|
|
|
{
|
2000-05-29 21:01:26 +00:00
|
|
|
syslog(LOG_ERR, _("setsockopt: %m"));
|
2000-03-26 00:33:07 +00:00
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
2000-08-09 09:34:21 +00:00
|
|
|
if(setsockopt(nfd, SOL_SOCKET, SO_KEEPALIVE, &one, sizeof(one)))
|
|
|
|
{
|
|
|
|
syslog(LOG_ERR, _("setsockopt: %m"));
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
2000-03-26 00:33:07 +00:00
|
|
|
flags = fcntl(nfd, F_GETFL);
|
|
|
|
if(fcntl(nfd, F_SETFL, flags | O_NONBLOCK) < 0)
|
|
|
|
{
|
2000-05-29 21:01:26 +00:00
|
|
|
syslog(LOG_ERR, _("fcntl: %m"));
|
2000-03-26 00:33:07 +00:00
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
memset(&a, 0, sizeof(a));
|
|
|
|
a.sin_family = AF_INET;
|
|
|
|
a.sin_port = htons(port);
|
|
|
|
a.sin_addr.s_addr = htonl(INADDR_ANY);
|
|
|
|
|
|
|
|
if(bind(nfd, (struct sockaddr *)&a, sizeof(struct sockaddr)))
|
|
|
|
{
|
2000-05-29 21:01:26 +00:00
|
|
|
syslog(LOG_ERR, _("Can't bind to port %hd/tcp: %m"), port);
|
2000-03-26 00:33:07 +00:00
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
if(listen(nfd, 3))
|
|
|
|
{
|
2000-05-29 21:01:26 +00:00
|
|
|
syslog(LOG_ERR, _("listen: %m"));
|
2000-03-26 00:33:07 +00:00
|
|
|
return -1;
|
|
|
|
}
|
2000-04-25 18:57:23 +00:00
|
|
|
cp
|
2000-03-26 00:33:07 +00:00
|
|
|
return nfd;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
setup the socket for incoming encrypted
|
|
|
|
data (the udp part)
|
|
|
|
*/
|
|
|
|
int setup_vpn_in_socket(int port)
|
|
|
|
{
|
|
|
|
int nfd, flags;
|
|
|
|
struct sockaddr_in a;
|
|
|
|
const int one = 1;
|
2000-04-25 18:57:23 +00:00
|
|
|
cp
|
2000-03-26 00:33:07 +00:00
|
|
|
if((nfd = socket(AF_INET, SOCK_DGRAM, IPPROTO_UDP)) < 0)
|
|
|
|
{
|
2000-05-29 21:01:26 +00:00
|
|
|
syslog(LOG_ERR, _("Creating socket failed: %m"));
|
2000-03-26 00:33:07 +00:00
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
if(setsockopt(nfd, SOL_SOCKET, SO_REUSEADDR, &one, sizeof(one)))
|
|
|
|
{
|
2000-05-29 21:01:26 +00:00
|
|
|
syslog(LOG_ERR, _("setsockopt: %m"));
|
2000-03-26 00:33:07 +00:00
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
flags = fcntl(nfd, F_GETFL);
|
|
|
|
if(fcntl(nfd, F_SETFL, flags | O_NONBLOCK) < 0)
|
|
|
|
{
|
2000-05-29 21:01:26 +00:00
|
|
|
syslog(LOG_ERR, _("fcntl: %m"));
|
2000-03-26 00:33:07 +00:00
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
memset(&a, 0, sizeof(a));
|
|
|
|
a.sin_family = AF_INET;
|
|
|
|
a.sin_port = htons(port);
|
|
|
|
a.sin_addr.s_addr = htonl(INADDR_ANY);
|
|
|
|
|
|
|
|
if(bind(nfd, (struct sockaddr *)&a, sizeof(struct sockaddr)))
|
|
|
|
{
|
2000-05-29 21:01:26 +00:00
|
|
|
syslog(LOG_ERR, _("Can't bind to port %hd/udp: %m"), port);
|
2000-03-26 00:33:07 +00:00
|
|
|
return -1;
|
|
|
|
}
|
2000-04-25 18:57:23 +00:00
|
|
|
cp
|
2000-03-26 00:33:07 +00:00
|
|
|
return nfd;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
setup an outgoing meta (tcp) socket
|
|
|
|
*/
|
|
|
|
int setup_outgoing_meta_socket(conn_list_t *cl)
|
|
|
|
{
|
|
|
|
int flags;
|
|
|
|
struct sockaddr_in a;
|
|
|
|
config_t const *cfg;
|
2000-04-25 18:57:23 +00:00
|
|
|
cp
|
2000-06-27 20:10:48 +00:00
|
|
|
if(debug_lvl > 0)
|
2000-06-29 13:04:15 +00:00
|
|
|
syslog(LOG_INFO, _("Trying to connect to %s"), cl->real_hostname);
|
2000-06-27 20:10:48 +00:00
|
|
|
|
2000-03-26 00:33:07 +00:00
|
|
|
if((cfg = get_config_val(upstreamport)) == NULL)
|
|
|
|
cl->port = 655;
|
|
|
|
else
|
|
|
|
cl->port = cfg->data.val;
|
|
|
|
|
|
|
|
cl->meta_socket = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP);
|
|
|
|
if(cl->meta_socket == -1)
|
|
|
|
{
|
2000-06-30 12:41:06 +00:00
|
|
|
syslog(LOG_ERR, _("Creating socket for %s port %d failed: %m"),
|
|
|
|
cl->real_hostname, cl->port);
|
2000-03-26 00:33:07 +00:00
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
a.sin_family = AF_INET;
|
|
|
|
a.sin_port = htons(cl->port);
|
|
|
|
a.sin_addr.s_addr = htonl(cl->real_ip);
|
|
|
|
|
|
|
|
if(connect(cl->meta_socket, (struct sockaddr *)&a, sizeof(a)) == -1)
|
|
|
|
{
|
2000-06-29 13:04:15 +00:00
|
|
|
syslog(LOG_ERR, _("%s port %hd: %m"), cl->real_hostname, cl->port);
|
2000-03-26 00:33:07 +00:00
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
flags = fcntl(cl->meta_socket, F_GETFL);
|
2000-08-09 09:34:21 +00:00
|
|
|
if(fcntl(cl->meta_socket, F_SETFL, flags | O_NONBLOCK) < 0)
|
2000-03-26 00:33:07 +00:00
|
|
|
{
|
2000-06-30 12:41:06 +00:00
|
|
|
syslog(LOG_ERR, _("fcntl for %s port %d: %m"),
|
|
|
|
cl->real_hostname, cl->port);
|
2000-03-26 00:33:07 +00:00
|
|
|
return -1;
|
|
|
|
}
|
2000-08-09 09:34:21 +00:00
|
|
|
|
2000-06-30 21:03:51 +00:00
|
|
|
if(debug_lvl > 0)
|
|
|
|
syslog(LOG_INFO, _("Connected to %s port %hd"),
|
2000-06-29 13:04:15 +00:00
|
|
|
cl->real_hostname, cl->port);
|
2000-04-25 18:57:23 +00:00
|
|
|
cp
|
2000-03-26 00:33:07 +00:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
setup an outgoing connection. It's not
|
|
|
|
necessary to also open an udp socket as
|
|
|
|
well, because the other host will initiate
|
|
|
|
an authentication sequence during which
|
|
|
|
we will do just that.
|
|
|
|
*/
|
2000-07-02 13:36:18 +00:00
|
|
|
int setup_outgoing_connection(char *hostname)
|
2000-03-26 00:33:07 +00:00
|
|
|
{
|
|
|
|
conn_list_t *ncn;
|
2000-07-02 13:36:18 +00:00
|
|
|
struct hostent *h;
|
2000-04-25 18:57:23 +00:00
|
|
|
cp
|
2000-07-02 13:36:18 +00:00
|
|
|
if(!(h = gethostbyname(hostname)))
|
|
|
|
{
|
|
|
|
syslog(LOG_ERR, _("Error looking up `%s': %m"), hostname);
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
2000-03-26 00:33:07 +00:00
|
|
|
ncn = new_conn_list();
|
2000-07-02 13:36:18 +00:00
|
|
|
ncn->real_ip = ntohl(*((ip_t*)(h->h_addr_list[0])));
|
2000-07-02 13:40:57 +00:00
|
|
|
ncn->real_hostname = hostlookup(htonl(ncn->real_ip));
|
2000-06-26 17:20:58 +00:00
|
|
|
|
2000-03-26 00:33:07 +00:00
|
|
|
if(setup_outgoing_meta_socket(ncn) < 0)
|
|
|
|
{
|
2000-06-27 15:08:58 +00:00
|
|
|
syslog(LOG_ERR, _("Could not set up a meta connection to %s"),
|
2000-06-29 13:04:15 +00:00
|
|
|
ncn->real_hostname);
|
2000-03-26 00:33:07 +00:00
|
|
|
free_conn_element(ncn);
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
ncn->status.meta = 1;
|
|
|
|
ncn->status.outgoing = 1;
|
|
|
|
ncn->next = conn_list;
|
|
|
|
conn_list = ncn;
|
2000-04-25 18:57:23 +00:00
|
|
|
cp
|
2000-03-26 00:33:07 +00:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
set up the local sockets (listen only)
|
|
|
|
*/
|
|
|
|
int setup_myself(void)
|
|
|
|
{
|
|
|
|
config_t const *cfg;
|
2000-04-25 18:57:23 +00:00
|
|
|
cp
|
2000-03-26 00:33:07 +00:00
|
|
|
myself = new_conn_list();
|
|
|
|
|
|
|
|
if(!(cfg = get_config_val(myvpnip)))
|
|
|
|
{
|
2000-05-29 21:01:26 +00:00
|
|
|
syslog(LOG_ERR, _("No value for my VPN IP given"));
|
2000-03-26 00:33:07 +00:00
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
myself->vpn_ip = cfg->data.ip->ip;
|
2000-06-29 13:04:15 +00:00
|
|
|
myself->vpn_hostname = hostlookup(htonl(myself->vpn_ip));
|
|
|
|
myself->real_hostname = hostlookup(htonl(myself->vpn_ip));
|
2000-03-26 00:33:07 +00:00
|
|
|
myself->vpn_mask = cfg->data.ip->mask;
|
2000-06-23 19:27:03 +00:00
|
|
|
myself->flags = 0;
|
2000-03-26 00:33:07 +00:00
|
|
|
|
|
|
|
if(!(cfg = get_config_val(listenport)))
|
|
|
|
myself->port = 655;
|
|
|
|
else
|
|
|
|
myself->port = cfg->data.val;
|
|
|
|
|
2000-08-07 16:27:29 +00:00
|
|
|
if((cfg = get_config_val(indirectdata)))
|
2000-06-27 15:08:58 +00:00
|
|
|
if(cfg->data.val == stupid_true)
|
2000-06-23 19:27:03 +00:00
|
|
|
myself->flags |= EXPORTINDIRECTDATA;
|
|
|
|
|
2000-08-07 16:27:29 +00:00
|
|
|
if((cfg = get_config_val(tcponly)))
|
2000-08-07 14:52:16 +00:00
|
|
|
if(cfg->data.val == stupid_true)
|
|
|
|
myself->flags |= TCPONLY;
|
|
|
|
|
2000-03-26 00:33:07 +00:00
|
|
|
if((myself->meta_socket = setup_listen_meta_socket(myself->port)) < 0)
|
|
|
|
{
|
2000-05-29 21:01:26 +00:00
|
|
|
syslog(LOG_ERR, _("Unable to set up a listening socket"));
|
2000-03-26 00:33:07 +00:00
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
if((myself->socket = setup_vpn_in_socket(myself->port)) < 0)
|
|
|
|
{
|
2000-05-29 21:01:26 +00:00
|
|
|
syslog(LOG_ERR, _("Unable to set up an incoming vpn data socket"));
|
2000-03-26 00:33:07 +00:00
|
|
|
close(myself->meta_socket);
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
myself->status.active = 1;
|
|
|
|
|
2000-06-29 13:04:15 +00:00
|
|
|
syslog(LOG_NOTICE, _("Ready: listening on port %hd"), myself->port);
|
2000-04-25 18:57:23 +00:00
|
|
|
cp
|
2000-03-26 00:33:07 +00:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2000-05-27 19:44:04 +00:00
|
|
|
RETSIGTYPE
|
|
|
|
sigalrm_handler(int a)
|
|
|
|
{
|
|
|
|
config_t const *cfg;
|
|
|
|
cp
|
2000-06-27 20:10:48 +00:00
|
|
|
cfg = get_next_config_val(upstreamip, upstreamindex++);
|
2000-05-27 19:44:04 +00:00
|
|
|
|
2000-06-27 15:08:58 +00:00
|
|
|
while(cfg)
|
2000-05-27 19:44:04 +00:00
|
|
|
{
|
2000-07-02 13:36:18 +00:00
|
|
|
if(!setup_outgoing_connection(cfg->data.ptr)) /* function returns 0 when there are no problems */
|
2000-06-27 15:08:58 +00:00
|
|
|
{
|
|
|
|
signal(SIGALRM, SIG_IGN);
|
|
|
|
return;
|
|
|
|
}
|
2000-06-27 20:10:48 +00:00
|
|
|
cfg = get_next_config_val(upstreamip, upstreamindex++); /* Or else we try the next ConnectTo line */
|
2000-05-27 19:44:04 +00:00
|
|
|
}
|
2000-06-27 15:08:58 +00:00
|
|
|
|
|
|
|
signal(SIGALRM, sigalrm_handler);
|
2000-06-27 20:10:48 +00:00
|
|
|
upstreamindex = 0;
|
2000-06-27 15:08:58 +00:00
|
|
|
seconds_till_retry += 5;
|
2000-06-30 11:45:16 +00:00
|
|
|
if(seconds_till_retry > MAXTIMEOUT) /* Don't wait more than MAXTIMEOUT seconds. */
|
|
|
|
seconds_till_retry = MAXTIMEOUT;
|
2000-06-27 15:08:58 +00:00
|
|
|
syslog(LOG_ERR, _("Still failed to connect to other, will retry in %d seconds"),
|
|
|
|
seconds_till_retry);
|
2000-06-30 11:45:16 +00:00
|
|
|
alarm(seconds_till_retry);
|
2000-05-27 19:44:04 +00:00
|
|
|
cp
|
|
|
|
}
|
|
|
|
|
2000-03-26 00:33:07 +00:00
|
|
|
/*
|
|
|
|
setup all initial network connections
|
|
|
|
*/
|
|
|
|
int setup_network_connections(void)
|
|
|
|
{
|
|
|
|
config_t const *cfg;
|
2000-04-25 18:57:23 +00:00
|
|
|
cp
|
2000-03-26 00:33:07 +00:00
|
|
|
if((cfg = get_config_val(pingtimeout)) == NULL)
|
2000-05-14 13:02:20 +00:00
|
|
|
timeout = 5;
|
2000-03-26 00:33:07 +00:00
|
|
|
else
|
|
|
|
timeout = cfg->data.val;
|
|
|
|
|
|
|
|
if(setup_tap_fd() < 0)
|
|
|
|
return -1;
|
|
|
|
|
|
|
|
if(setup_myself() < 0)
|
|
|
|
return -1;
|
|
|
|
|
2000-06-27 20:10:48 +00:00
|
|
|
if((cfg = get_next_config_val(upstreamip, upstreamindex++)) == NULL)
|
2000-03-26 00:33:07 +00:00
|
|
|
/* No upstream IP given, we're listen only. */
|
|
|
|
return 0;
|
|
|
|
|
2000-06-27 15:08:58 +00:00
|
|
|
while(cfg)
|
2000-03-26 00:33:07 +00:00
|
|
|
{
|
2000-07-02 13:36:18 +00:00
|
|
|
if(!setup_outgoing_connection(cfg->data.ptr)) /* function returns 0 when there are no problems */
|
2000-06-27 15:08:58 +00:00
|
|
|
return 0;
|
2000-06-27 20:10:48 +00:00
|
|
|
cfg = get_next_config_val(upstreamip, upstreamindex++); /* Or else we try the next ConnectTo line */
|
2000-03-26 00:33:07 +00:00
|
|
|
}
|
2000-06-27 15:08:58 +00:00
|
|
|
|
|
|
|
signal(SIGALRM, sigalrm_handler);
|
2000-06-27 20:10:48 +00:00
|
|
|
upstreamindex = 0;
|
2000-06-30 11:45:16 +00:00
|
|
|
seconds_till_retry = MAXTIMEOUT;
|
|
|
|
syslog(LOG_NOTICE, _("Trying to re-establish outgoing connection in %d seconds"), seconds_till_retry);
|
2000-06-27 15:08:58 +00:00
|
|
|
alarm(seconds_till_retry);
|
2000-04-25 18:57:23 +00:00
|
|
|
cp
|
2000-05-27 19:44:04 +00:00
|
|
|
return 0;
|
2000-03-26 00:33:07 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
close all open network connections
|
|
|
|
*/
|
|
|
|
void close_network_connections(void)
|
|
|
|
{
|
|
|
|
conn_list_t *p;
|
2000-04-25 18:57:23 +00:00
|
|
|
cp
|
2000-03-26 00:33:07 +00:00
|
|
|
for(p = conn_list; p != NULL; p = p->next)
|
|
|
|
{
|
|
|
|
if(p->status.dataopen)
|
|
|
|
{
|
|
|
|
shutdown(p->socket, 0); /* No more receptions */
|
|
|
|
close(p->socket);
|
|
|
|
}
|
|
|
|
if(p->status.meta)
|
|
|
|
{
|
|
|
|
send_termreq(p);
|
|
|
|
shutdown(p->meta_socket, 0); /* No more receptions */
|
|
|
|
close(p->meta_socket);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if(myself)
|
|
|
|
if(myself->status.active)
|
|
|
|
{
|
|
|
|
close(myself->meta_socket);
|
|
|
|
close(myself->socket);
|
|
|
|
}
|
|
|
|
|
|
|
|
close(tap_fd);
|
|
|
|
destroy_conn_list();
|
|
|
|
|
2000-06-25 15:16:12 +00:00
|
|
|
syslog(LOG_NOTICE, _("Terminating"));
|
2000-04-25 18:57:23 +00:00
|
|
|
cp
|
2000-03-26 00:33:07 +00:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
create a data (udp) socket
|
|
|
|
*/
|
|
|
|
int setup_vpn_connection(conn_list_t *cl)
|
|
|
|
{
|
|
|
|
int nfd, flags;
|
|
|
|
struct sockaddr_in a;
|
2000-04-25 18:57:23 +00:00
|
|
|
cp
|
2000-06-25 15:16:12 +00:00
|
|
|
if(debug_lvl > 0)
|
2000-06-29 13:04:15 +00:00
|
|
|
syslog(LOG_DEBUG, _("Opening UDP socket to %s"), cl->real_hostname);
|
2000-03-26 00:33:07 +00:00
|
|
|
|
|
|
|
nfd = socket(AF_INET, SOCK_DGRAM, IPPROTO_UDP);
|
|
|
|
if(nfd == -1)
|
|
|
|
{
|
2000-06-26 19:39:34 +00:00
|
|
|
syslog(LOG_ERR, _("Creating UDP socket failed: %m"));
|
2000-03-26 00:33:07 +00:00
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
a.sin_family = AF_INET;
|
|
|
|
a.sin_port = htons(cl->port);
|
|
|
|
a.sin_addr.s_addr = htonl(cl->real_ip);
|
|
|
|
|
|
|
|
if(connect(nfd, (struct sockaddr *)&a, sizeof(a)) == -1)
|
|
|
|
{
|
2000-06-26 19:39:34 +00:00
|
|
|
syslog(LOG_ERR, _("Connecting to %s port %d failed: %m"),
|
2000-06-29 13:04:15 +00:00
|
|
|
cl->real_hostname, cl->port);
|
2000-03-26 00:33:07 +00:00
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
flags = fcntl(nfd, F_GETFL);
|
|
|
|
if(fcntl(nfd, F_SETFL, flags | O_NONBLOCK) < 0)
|
|
|
|
{
|
2000-06-30 12:41:06 +00:00
|
|
|
syslog(LOG_ERR, _("This is a bug: %s:%d: %d:%m %s (%s)"), __FILE__, __LINE__, nfd,
|
|
|
|
cl->vpn_hostname, cl->real_hostname);
|
2000-03-26 00:33:07 +00:00
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
cl->socket = nfd;
|
|
|
|
cl->status.dataopen = 1;
|
2000-04-25 18:57:23 +00:00
|
|
|
cp
|
2000-03-26 00:33:07 +00:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
handle an incoming tcp connect call and open
|
|
|
|
a connection to it.
|
|
|
|
*/
|
|
|
|
conn_list_t *create_new_connection(int sfd)
|
|
|
|
{
|
|
|
|
conn_list_t *p;
|
|
|
|
struct sockaddr_in ci;
|
|
|
|
int len = sizeof(ci);
|
2000-04-25 18:57:23 +00:00
|
|
|
cp
|
2000-03-26 00:33:07 +00:00
|
|
|
p = new_conn_list();
|
|
|
|
|
|
|
|
if(getpeername(sfd, &ci, &len) < 0)
|
|
|
|
{
|
2000-05-29 21:01:26 +00:00
|
|
|
syslog(LOG_ERR, _("Error: getpeername: %m"));
|
2000-03-26 00:33:07 +00:00
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
|
|
|
p->real_ip = ntohl(ci.sin_addr.s_addr);
|
2000-06-29 13:04:15 +00:00
|
|
|
p->real_hostname = hostlookup(ci.sin_addr.s_addr);
|
2000-03-26 00:33:07 +00:00
|
|
|
p->meta_socket = sfd;
|
|
|
|
p->status.meta = 1;
|
2000-05-01 18:07:12 +00:00
|
|
|
p->buflen = 0;
|
2000-05-14 13:02:20 +00:00
|
|
|
p->last_ping_time = time(NULL);
|
|
|
|
p->want_ping = 0;
|
2000-05-01 18:07:12 +00:00
|
|
|
|
2000-06-26 20:30:21 +00:00
|
|
|
if(debug_lvl > 0)
|
|
|
|
syslog(LOG_NOTICE, _("Connection from %s port %d"),
|
2000-06-29 13:04:15 +00:00
|
|
|
p->real_hostname, htons(ci.sin_port));
|
2000-03-26 00:33:07 +00:00
|
|
|
|
|
|
|
if(send_basic_info(p) < 0)
|
|
|
|
{
|
2000-06-29 19:47:04 +00:00
|
|
|
free_conn_element(p);
|
2000-03-26 00:33:07 +00:00
|
|
|
return NULL;
|
|
|
|
}
|
2000-04-25 18:57:23 +00:00
|
|
|
cp
|
2000-03-26 00:33:07 +00:00
|
|
|
return p;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
put all file descriptors in an fd_set array
|
|
|
|
*/
|
|
|
|
void build_fdset(fd_set *fs)
|
|
|
|
{
|
|
|
|
conn_list_t *p;
|
2000-04-25 18:57:23 +00:00
|
|
|
cp
|
2000-03-26 00:33:07 +00:00
|
|
|
FD_ZERO(fs);
|
|
|
|
|
|
|
|
for(p = conn_list; p != NULL; p = p->next)
|
|
|
|
{
|
|
|
|
if(p->status.meta)
|
|
|
|
FD_SET(p->meta_socket, fs);
|
|
|
|
if(p->status.dataopen)
|
|
|
|
FD_SET(p->socket, fs);
|
|
|
|
}
|
|
|
|
|
|
|
|
FD_SET(myself->meta_socket, fs);
|
|
|
|
FD_SET(myself->socket, fs);
|
|
|
|
FD_SET(tap_fd, fs);
|
2000-04-25 18:57:23 +00:00
|
|
|
cp
|
2000-03-26 00:33:07 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
receive incoming data from the listening
|
|
|
|
udp socket and write it to the ethertap
|
|
|
|
device after being decrypted
|
|
|
|
*/
|
|
|
|
int handle_incoming_vpn_data(conn_list_t *cl)
|
|
|
|
{
|
|
|
|
real_packet_t rp;
|
|
|
|
int lenin;
|
|
|
|
int x, l = sizeof(x);
|
|
|
|
conn_list_t *f;
|
2000-04-25 18:57:23 +00:00
|
|
|
cp
|
2000-03-26 00:33:07 +00:00
|
|
|
if(getsockopt(cl->socket, SOL_SOCKET, SO_ERROR, &x, &l) < 0)
|
|
|
|
{
|
2000-06-30 12:41:06 +00:00
|
|
|
syslog(LOG_ERR, _("This is a bug: %s:%d: %d:%m %s (%s)"), __FILE__, __LINE__, cl->socket,
|
|
|
|
cl->vpn_hostname, cl->real_hostname);
|
2000-03-26 00:33:07 +00:00
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
if(x)
|
|
|
|
{
|
2000-06-30 12:41:06 +00:00
|
|
|
syslog(LOG_ERR, _("Incoming data socket error for %s (%s): %s"),
|
|
|
|
cl->vpn_hostname, cl->real_hostname, sys_errlist[x]);
|
2000-03-26 00:33:07 +00:00
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
rp.len = -1;
|
|
|
|
lenin = recvfrom(cl->socket, &rp, MTU, 0, NULL, NULL);
|
|
|
|
if(lenin <= 0)
|
|
|
|
{
|
2000-06-30 12:41:06 +00:00
|
|
|
syslog(LOG_ERR, _("Receiving packet from %s (%s) failed: %m"), cl->vpn_hostname, cl->real_hostname);
|
2000-03-26 00:33:07 +00:00
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
total_socket_in += lenin;
|
2000-05-03 17:59:07 +00:00
|
|
|
|
|
|
|
rp.data.len = ntohs(rp.data.len);
|
|
|
|
rp.len = ntohs(rp.len);
|
|
|
|
rp.from = ntohl(rp.from);
|
|
|
|
|
2000-03-26 00:33:07 +00:00
|
|
|
if(rp.len >= 0)
|
|
|
|
{
|
|
|
|
f = lookup_conn(rp.from);
|
|
|
|
if(!f)
|
|
|
|
{
|
2000-06-29 13:04:15 +00:00
|
|
|
syslog(LOG_ERR, _("Got packet from %s (%s) with unknown origin %d.%d.%d.%d?"),
|
|
|
|
cl->vpn_hostname, cl->real_hostname, IP_ADDR_V(rp.from));
|
2000-03-26 00:33:07 +00:00
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
if(f->status.validkey)
|
|
|
|
xrecv(f, &rp);
|
|
|
|
else
|
|
|
|
{
|
|
|
|
add_queue(&(f->rq), &rp, rp.len);
|
|
|
|
if(!cl->status.waitingforkey)
|
|
|
|
send_key_request(rp.from);
|
|
|
|
}
|
|
|
|
|
|
|
|
if(my_key_expiry <= time(NULL))
|
|
|
|
regenerate_keys();
|
|
|
|
}
|
2000-04-25 18:57:23 +00:00
|
|
|
cp
|
2000-03-26 00:33:07 +00:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
terminate a connection and notify the other
|
|
|
|
end before closing the sockets
|
|
|
|
*/
|
|
|
|
void terminate_connection(conn_list_t *cl)
|
|
|
|
{
|
2000-08-07 16:27:29 +00:00
|
|
|
conn_list_t *p;
|
2000-05-30 12:31:41 +00:00
|
|
|
|
2000-04-25 18:57:23 +00:00
|
|
|
cp
|
2000-03-26 00:33:07 +00:00
|
|
|
if(cl->status.remove)
|
|
|
|
return;
|
|
|
|
|
|
|
|
if(debug_lvl > 0)
|
2000-06-29 13:04:15 +00:00
|
|
|
syslog(LOG_NOTICE, _("Closing connection with %s (%s)"),
|
|
|
|
cl->vpn_hostname, cl->real_hostname);
|
2000-03-26 00:33:07 +00:00
|
|
|
|
|
|
|
if(cl->status.timeout)
|
|
|
|
send_timeout(cl);
|
2000-06-29 19:47:04 +00:00
|
|
|
/* else if(!cl->status.termreq)
|
2000-03-26 00:33:07 +00:00
|
|
|
send_termreq(cl);
|
2000-06-29 19:47:04 +00:00
|
|
|
*/
|
|
|
|
|
|
|
|
if(cl->socket)
|
|
|
|
close(cl->socket);
|
2000-03-26 00:33:07 +00:00
|
|
|
if(cl->status.meta)
|
|
|
|
close(cl->meta_socket);
|
|
|
|
|
|
|
|
cl->status.remove = 1;
|
2000-05-30 12:31:41 +00:00
|
|
|
|
2000-06-29 17:09:08 +00:00
|
|
|
/* If this cl isn't active, don't send any DEL_HOSTs. */
|
2000-06-29 19:47:04 +00:00
|
|
|
if(cl->status.active)
|
|
|
|
notify_others(cl,NULL,send_del_host);
|
2000-06-26 20:30:21 +00:00
|
|
|
|
2000-05-30 12:31:41 +00:00
|
|
|
cp
|
|
|
|
/* Find all connections that were lost because they were behind cl
|
|
|
|
(the connection that was dropped). */
|
2000-06-29 17:09:08 +00:00
|
|
|
if(cl->status.meta)
|
|
|
|
for(p = conn_list; p != NULL; p = p->next)
|
2000-05-31 18:23:06 +00:00
|
|
|
{
|
2000-06-29 19:47:04 +00:00
|
|
|
if((p->nexthop == cl) && (p != cl))
|
2000-06-29 17:09:08 +00:00
|
|
|
{
|
2000-06-29 19:47:04 +00:00
|
|
|
if(cl->status.active && p->status.active)
|
2000-06-29 17:09:08 +00:00
|
|
|
notify_others(p,cl,send_del_host);
|
2000-06-29 19:47:04 +00:00
|
|
|
if(cl->socket)
|
|
|
|
close(cl->socket);
|
2000-06-29 17:09:08 +00:00
|
|
|
p->status.active = 0;
|
|
|
|
p->status.remove = 1;
|
|
|
|
}
|
2000-05-31 18:23:06 +00:00
|
|
|
}
|
2000-06-29 17:09:08 +00:00
|
|
|
|
2000-06-29 19:47:04 +00:00
|
|
|
cl->status.active = 0;
|
|
|
|
|
|
|
|
if(cl->status.outgoing)
|
|
|
|
{
|
|
|
|
signal(SIGALRM, sigalrm_handler);
|
|
|
|
seconds_till_retry = 5;
|
|
|
|
alarm(seconds_till_retry);
|
|
|
|
syslog(LOG_NOTICE, _("Trying to re-establish outgoing connection in 5 seconds"));
|
|
|
|
}
|
2000-04-25 18:57:23 +00:00
|
|
|
cp
|
2000-03-26 00:33:07 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
2000-05-14 13:02:20 +00:00
|
|
|
Check if the other end is active.
|
|
|
|
If we have sent packets, but didn't receive any,
|
|
|
|
then possibly the other end is dead. We send a
|
|
|
|
PING request over the meta connection. If the other
|
|
|
|
end does not reply in time, we consider them dead
|
|
|
|
and close the connection.
|
2000-03-26 00:33:07 +00:00
|
|
|
*/
|
|
|
|
int check_dead_connections(void)
|
|
|
|
{
|
|
|
|
conn_list_t *p;
|
2000-05-14 13:02:20 +00:00
|
|
|
time_t now;
|
2000-04-25 18:57:23 +00:00
|
|
|
cp
|
2000-05-14 13:02:20 +00:00
|
|
|
now = time(NULL);
|
2000-03-26 00:33:07 +00:00
|
|
|
for(p = conn_list; p != NULL; p = p->next)
|
|
|
|
{
|
|
|
|
if(p->status.remove)
|
|
|
|
continue;
|
2000-05-14 13:02:20 +00:00
|
|
|
if(p->status.active && p->status.meta)
|
2000-03-26 00:33:07 +00:00
|
|
|
{
|
2000-05-14 13:02:20 +00:00
|
|
|
if(p->last_ping_time + timeout < now)
|
2000-05-14 13:06:52 +00:00
|
|
|
{
|
|
|
|
if(p->status.pinged && !p->status.got_pong)
|
|
|
|
{
|
2000-06-25 15:16:12 +00:00
|
|
|
if(debug_lvl > 1)
|
2000-06-29 13:04:15 +00:00
|
|
|
syslog(LOG_INFO, _("%s (%s) didn't respond to PING"),
|
|
|
|
p->vpn_hostname, p->real_hostname);
|
2000-05-14 13:06:52 +00:00
|
|
|
p->status.timeout = 1;
|
|
|
|
terminate_connection(p);
|
|
|
|
}
|
|
|
|
else if(p->want_ping)
|
|
|
|
{
|
|
|
|
send_ping(p);
|
|
|
|
p->last_ping_time = now;
|
|
|
|
p->status.pinged = 1;
|
|
|
|
p->status.got_pong = 0;
|
|
|
|
}
|
|
|
|
}
|
2000-03-26 00:33:07 +00:00
|
|
|
}
|
|
|
|
}
|
2000-04-25 18:57:23 +00:00
|
|
|
cp
|
2000-03-26 00:33:07 +00:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
accept a new tcp connect and create a
|
|
|
|
new connection
|
|
|
|
*/
|
|
|
|
int handle_new_meta_connection(conn_list_t *cl)
|
|
|
|
{
|
|
|
|
conn_list_t *ncn;
|
|
|
|
struct sockaddr client;
|
2000-04-26 17:42:55 +00:00
|
|
|
int nfd, len = sizeof(client);
|
2000-04-25 18:57:23 +00:00
|
|
|
cp
|
2000-03-26 00:33:07 +00:00
|
|
|
if((nfd = accept(cl->meta_socket, &client, &len)) < 0)
|
|
|
|
{
|
2000-05-29 21:01:26 +00:00
|
|
|
syslog(LOG_ERR, _("Accepting a new connection failed: %m"));
|
2000-03-26 00:33:07 +00:00
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
2000-06-29 19:47:04 +00:00
|
|
|
if(!(ncn = create_new_connection(nfd)))
|
2000-03-26 00:33:07 +00:00
|
|
|
{
|
|
|
|
shutdown(nfd, 2);
|
|
|
|
close(nfd);
|
2000-06-25 15:16:12 +00:00
|
|
|
syslog(LOG_NOTICE, _("Closed attempted connection"));
|
2000-03-26 00:33:07 +00:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
ncn->status.meta = 1;
|
|
|
|
ncn->next = conn_list;
|
|
|
|
conn_list = ncn;
|
2000-04-25 18:57:23 +00:00
|
|
|
cp
|
2000-03-26 00:33:07 +00:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
dispatch any incoming meta requests
|
|
|
|
*/
|
|
|
|
int handle_incoming_meta_data(conn_list_t *cl)
|
|
|
|
{
|
2000-04-30 01:15:47 +00:00
|
|
|
int x, l = sizeof(x);
|
2000-05-03 17:59:07 +00:00
|
|
|
int request, oldlen, i;
|
2000-04-30 01:15:47 +00:00
|
|
|
int lenin = 0;
|
2000-04-25 18:57:23 +00:00
|
|
|
cp
|
2000-03-26 00:33:07 +00:00
|
|
|
if(getsockopt(cl->meta_socket, SOL_SOCKET, SO_ERROR, &x, &l) < 0)
|
|
|
|
{
|
2000-06-30 12:41:06 +00:00
|
|
|
syslog(LOG_ERR, _("This is a bug: %s:%d: %d:%m %s (%s)"), __FILE__, __LINE__, cl->meta_socket,
|
|
|
|
cl->vpn_hostname, cl->real_hostname);
|
2000-03-26 00:33:07 +00:00
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
if(x)
|
|
|
|
{
|
2000-06-30 12:41:06 +00:00
|
|
|
syslog(LOG_ERR, _("Metadata socket error for %s (%s): %s"),
|
|
|
|
cl->vpn_hostname, cl->real_hostname, sys_errlist[x]);
|
2000-03-26 00:33:07 +00:00
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
2000-05-01 18:07:12 +00:00
|
|
|
if(cl->buflen >= MAXBUFSIZE)
|
|
|
|
{
|
2000-06-25 15:16:12 +00:00
|
|
|
syslog(LOG_ERR, _("Metadata read buffer overflow!"));
|
2000-05-27 20:23:01 +00:00
|
|
|
return -1;
|
2000-05-01 18:07:12 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
lenin = read(cl->meta_socket, cl->buffer, MAXBUFSIZE-cl->buflen);
|
|
|
|
|
|
|
|
if(lenin<=0)
|
2000-03-26 00:33:07 +00:00
|
|
|
{
|
2000-06-28 10:11:10 +00:00
|
|
|
if(errno==EINTR)
|
|
|
|
return 0;
|
2000-06-30 12:41:06 +00:00
|
|
|
if(errno==0)
|
2000-08-07 16:27:29 +00:00
|
|
|
{
|
|
|
|
if(debug_lvl>0)
|
|
|
|
syslog(LOG_NOTICE, _("Connection closed by %s (%s)"),
|
|
|
|
cl->vpn_hostname, cl->real_hostname);
|
|
|
|
}
|
2000-06-30 12:41:06 +00:00
|
|
|
else
|
|
|
|
syslog(LOG_ERR, _("Metadata socket read error for %s (%s): %m"),
|
|
|
|
cl->vpn_hostname, cl->real_hostname);
|
2000-03-26 00:33:07 +00:00
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
2000-05-01 18:07:12 +00:00
|
|
|
oldlen = cl->buflen;
|
|
|
|
cl->buflen += lenin;
|
2000-03-26 00:33:07 +00:00
|
|
|
|
2000-05-01 18:07:12 +00:00
|
|
|
for(;;)
|
|
|
|
{
|
2000-08-08 17:07:48 +00:00
|
|
|
if(cl->tcppacket)
|
2000-05-01 18:07:12 +00:00
|
|
|
{
|
2000-08-08 17:07:48 +00:00
|
|
|
if(cl->buflen >= cl->tcppacket)
|
|
|
|
{
|
|
|
|
tcprecv(cl, (real_packet_t *)cl->buffer);
|
|
|
|
cl->buflen -= cl->tcppacket;
|
|
|
|
memmove(cl->buffer, cl->buffer + cl->tcppacket, cl->buflen);
|
|
|
|
oldlen = 0;
|
|
|
|
cl->tcppacket=0;
|
|
|
|
}
|
|
|
|
else
|
2000-05-01 18:07:12 +00:00
|
|
|
{
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
2000-08-08 17:07:48 +00:00
|
|
|
else
|
2000-05-01 18:07:12 +00:00
|
|
|
{
|
2000-08-08 17:07:48 +00:00
|
|
|
cl->reqlen = 0;
|
|
|
|
|
|
|
|
for(i = oldlen; i < cl->buflen; i++)
|
2000-05-01 18:07:12 +00:00
|
|
|
{
|
2000-08-08 17:07:48 +00:00
|
|
|
if(cl->buffer[i] == '\n')
|
2000-05-01 18:07:12 +00:00
|
|
|
{
|
2000-08-08 17:07:48 +00:00
|
|
|
cl->buffer[i] = 0; /* replace end-of-line by end-of-string so we can use sscanf */
|
|
|
|
cl->reqlen = i + 1;
|
|
|
|
break;
|
2000-05-01 18:07:12 +00:00
|
|
|
}
|
2000-08-08 17:07:48 +00:00
|
|
|
}
|
2000-05-01 18:07:12 +00:00
|
|
|
|
2000-08-08 17:07:48 +00:00
|
|
|
if(cl->reqlen)
|
|
|
|
{
|
|
|
|
if(debug_lvl > 2)
|
|
|
|
syslog(LOG_DEBUG, _("Got request from %s (%s): %s"),
|
|
|
|
cl->vpn_hostname, cl->real_hostname, cl->buffer);
|
|
|
|
if(sscanf(cl->buffer, "%d", &request) == 1)
|
|
|
|
{
|
|
|
|
if((request < 0) || (request > 255) || (request_handlers[request] == NULL))
|
|
|
|
{
|
|
|
|
syslog(LOG_ERR, _("Unknown request from %s (%s)"),
|
|
|
|
cl->vpn_hostname, cl->real_hostname);
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
if(request_handlers[request](cl)) /* Something went wrong. Probably scriptkiddies. Terminate. */
|
|
|
|
{
|
|
|
|
syslog(LOG_ERR, _("Error while processing request from %s (%s)"),
|
|
|
|
cl->vpn_hostname, cl->real_hostname);
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
else
|
2000-05-27 20:23:01 +00:00
|
|
|
{
|
2000-08-08 17:07:48 +00:00
|
|
|
syslog(LOG_ERR, _("Bogus data received from %s (%s)"),
|
|
|
|
cl->vpn_hostname, cl->real_hostname);
|
2000-05-27 20:23:01 +00:00
|
|
|
return -1;
|
|
|
|
}
|
2000-08-08 17:07:48 +00:00
|
|
|
|
|
|
|
cl->buflen -= cl->reqlen;
|
|
|
|
memmove(cl->buffer, cl->buffer + cl->reqlen, cl->buflen);
|
|
|
|
oldlen = 0;
|
2000-05-01 18:07:12 +00:00
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
2000-08-08 17:07:48 +00:00
|
|
|
break;
|
2000-05-01 18:07:12 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
2000-05-14 13:02:20 +00:00
|
|
|
|
|
|
|
cl->last_ping_time = time(NULL);
|
|
|
|
cl->want_ping = 0;
|
2000-04-25 18:57:23 +00:00
|
|
|
cp
|
2000-03-26 00:33:07 +00:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
check all connections to see if anything
|
|
|
|
happened on their sockets
|
|
|
|
*/
|
|
|
|
void check_network_activity(fd_set *f)
|
|
|
|
{
|
|
|
|
conn_list_t *p;
|
|
|
|
int x, l = sizeof(x);
|
2000-04-25 18:57:23 +00:00
|
|
|
cp
|
2000-03-26 00:33:07 +00:00
|
|
|
for(p = conn_list; p != NULL; p = p->next)
|
|
|
|
{
|
|
|
|
if(p->status.remove)
|
|
|
|
continue;
|
2000-04-25 18:57:23 +00:00
|
|
|
|
2000-04-30 13:23:53 +00:00
|
|
|
if(p->status.dataopen)
|
2000-03-26 00:33:07 +00:00
|
|
|
if(FD_ISSET(p->socket, f))
|
|
|
|
{
|
|
|
|
/*
|
|
|
|
The only thing that can happen to get us here is apparently an
|
|
|
|
error on this outgoing(!) UDP socket that isn't immediate (i.e.
|
|
|
|
something that will not trigger an error directly on send()).
|
|
|
|
I've once got here when it said `No route to host'.
|
|
|
|
*/
|
|
|
|
getsockopt(p->socket, SOL_SOCKET, SO_ERROR, &x, &l);
|
2000-06-29 17:09:08 +00:00
|
|
|
syslog(LOG_ERR, _("Outgoing data socket error for %s (%s): %s"),
|
|
|
|
p->vpn_hostname, p->real_hostname, sys_errlist[x]);
|
2000-03-26 00:33:07 +00:00
|
|
|
terminate_connection(p);
|
|
|
|
return;
|
|
|
|
}
|
2000-04-25 18:57:23 +00:00
|
|
|
|
2000-03-26 00:33:07 +00:00
|
|
|
if(p->status.meta)
|
|
|
|
if(FD_ISSET(p->meta_socket, f))
|
|
|
|
if(handle_incoming_meta_data(p) < 0)
|
|
|
|
{
|
|
|
|
terminate_connection(p);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if(FD_ISSET(myself->socket, f))
|
|
|
|
handle_incoming_vpn_data(myself);
|
2000-04-25 18:57:23 +00:00
|
|
|
|
2000-03-26 00:33:07 +00:00
|
|
|
if(FD_ISSET(myself->meta_socket, f))
|
|
|
|
handle_new_meta_connection(myself);
|
|
|
|
cp
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
read, encrypt and send data that is
|
|
|
|
available through the ethertap device
|
|
|
|
*/
|
|
|
|
void handle_tap_input(void)
|
|
|
|
{
|
|
|
|
vpn_packet_t vp;
|
|
|
|
ip_t from, to;
|
|
|
|
int ether_type, lenin;
|
2000-04-25 18:57:23 +00:00
|
|
|
cp
|
2000-03-26 00:33:07 +00:00
|
|
|
memset(&vp, 0, sizeof(vp));
|
|
|
|
if((lenin = read(tap_fd, &vp, MTU)) <= 0)
|
|
|
|
{
|
2000-05-29 21:01:26 +00:00
|
|
|
syslog(LOG_ERR, _("Error while reading from tapdevice: %m"));
|
2000-03-26 00:33:07 +00:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
total_tap_in += lenin;
|
|
|
|
|
|
|
|
ether_type = ntohs(*((unsigned short*)(&vp.data[12])));
|
|
|
|
if(ether_type != 0x0800)
|
|
|
|
{
|
2000-06-25 15:16:12 +00:00
|
|
|
if(debug_lvl > 3)
|
2000-05-29 21:01:26 +00:00
|
|
|
syslog(LOG_INFO, _("Non-IP ethernet frame %04x from " MAC_ADDR_S),
|
2000-03-26 00:33:07 +00:00
|
|
|
ether_type, MAC_ADDR_V(vp.data[6]));
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
if(lenin < 32)
|
|
|
|
{
|
2000-06-25 15:16:12 +00:00
|
|
|
if(debug_lvl > 3)
|
2000-05-29 21:01:26 +00:00
|
|
|
syslog(LOG_INFO, _("Dropping short packet"));
|
2000-03-26 00:33:07 +00:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
from = ntohl(*((unsigned long*)(&vp.data[26])));
|
|
|
|
to = ntohl(*((unsigned long*)(&vp.data[30])));
|
|
|
|
|
|
|
|
vp.len = (length_t)lenin - 2;
|
2000-04-25 18:57:23 +00:00
|
|
|
|
2000-03-26 00:33:07 +00:00
|
|
|
strip_mac_addresses(&vp);
|
2000-04-25 18:57:23 +00:00
|
|
|
|
2000-03-26 00:33:07 +00:00
|
|
|
send_packet(to, &vp);
|
|
|
|
cp
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
2000-04-30 01:15:47 +00:00
|
|
|
this is where it all happens...
|
2000-03-26 00:33:07 +00:00
|
|
|
*/
|
|
|
|
void main_loop(void)
|
|
|
|
{
|
|
|
|
fd_set fset;
|
|
|
|
struct timeval tv;
|
|
|
|
int r;
|
2000-05-14 13:02:20 +00:00
|
|
|
time_t last_ping_check;
|
2000-04-25 18:57:23 +00:00
|
|
|
cp
|
2000-05-14 13:02:20 +00:00
|
|
|
last_ping_check = time(NULL);
|
2000-03-26 00:33:07 +00:00
|
|
|
|
|
|
|
for(;;)
|
|
|
|
{
|
|
|
|
tv.tv_sec = timeout;
|
|
|
|
tv.tv_usec = 0;
|
|
|
|
|
|
|
|
prune_conn_list();
|
|
|
|
build_fdset(&fset);
|
|
|
|
|
|
|
|
if((r = select(FD_SETSIZE, &fset, NULL, NULL, &tv)) < 0)
|
|
|
|
{
|
2000-06-29 19:47:04 +00:00
|
|
|
if(errno != EINTR) /* because of alarm */
|
|
|
|
{
|
|
|
|
syslog(LOG_ERR, _("Error while waiting for input: %m"));
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if(sighup)
|
|
|
|
{
|
2000-06-30 11:45:16 +00:00
|
|
|
sighup = 0;
|
2000-06-29 19:47:04 +00:00
|
|
|
close_network_connections();
|
|
|
|
clear_config();
|
|
|
|
if(read_config_file(configfilename))
|
|
|
|
{
|
2000-06-30 11:45:16 +00:00
|
|
|
syslog(LOG_ERR, _("Unable to reread configuration file, exiting"));
|
2000-06-29 19:47:04 +00:00
|
|
|
exit(0);
|
|
|
|
}
|
2000-06-30 12:41:06 +00:00
|
|
|
sleep(5);
|
2000-06-30 11:45:16 +00:00
|
|
|
setup_network_connections();
|
2000-06-29 19:47:04 +00:00
|
|
|
continue;
|
2000-03-26 00:33:07 +00:00
|
|
|
}
|
|
|
|
|
2000-05-14 13:02:20 +00:00
|
|
|
if(last_ping_check + timeout < time(NULL))
|
|
|
|
/* Let's check if everybody is still alive */
|
2000-03-26 00:33:07 +00:00
|
|
|
{
|
|
|
|
check_dead_connections();
|
2000-05-14 13:02:20 +00:00
|
|
|
last_ping_check = time(NULL);
|
2000-03-26 00:33:07 +00:00
|
|
|
}
|
|
|
|
|
2000-06-30 11:45:16 +00:00
|
|
|
if(r > 0)
|
|
|
|
{
|
|
|
|
check_network_activity(&fset);
|
2000-03-26 00:33:07 +00:00
|
|
|
|
2000-06-30 11:45:16 +00:00
|
|
|
/* local tap data */
|
|
|
|
if(FD_ISSET(tap_fd, &fset))
|
|
|
|
handle_tap_input();
|
|
|
|
}
|
2000-03-26 00:33:07 +00:00
|
|
|
}
|
2000-04-25 18:57:23 +00:00
|
|
|
cp
|
2000-03-26 00:33:07 +00:00
|
|
|
}
|