Bring head revision up to date with cabal (try #3)
This commit is contained in:
parent
d3ea434b36
commit
30df5e95db
35 changed files with 3091 additions and 2267 deletions
2
AUTHORS
2
AUTHORS
|
@ -5,5 +5,3 @@ Ivo Timmermans <itimmermans@bigfoot.com>
|
|||
These files are from other sources:
|
||||
* lib/pidfile.h and lib/pidfile.c are by Martin Schulze, taken from
|
||||
the syslog 1.3 sources.
|
||||
* The files in cipher/blowfish/ are from the SSLeay package by
|
||||
Eric Young.
|
||||
|
|
10
Makefile.am
10
Makefile.am
|
@ -2,7 +2,7 @@
|
|||
|
||||
AUTOMAKE_OPTIONS = gnu
|
||||
|
||||
SUBDIRS = m4 intl lib cipher src doc po redhat debian
|
||||
SUBDIRS = m4 intl lib src doc po redhat debian
|
||||
|
||||
ACLOCAL_AMFLAGS =
|
||||
|
||||
|
@ -16,7 +16,7 @@ ChangeLog:
|
|||
rm -f ChangeLog
|
||||
rcs2log -u "zarq Ivo Timmermans itimmermans@bigfoot.com" \
|
||||
-u "guus Guus Sliepen guus@sliepen.warande.net" | \
|
||||
sed -e 's,/home/CVS/tinc/cabal/,,g' > $@
|
||||
sed -e 's,/home/CVS/tinc/,,g' > $@
|
||||
|
||||
cvs-clean: maintainer-clean
|
||||
for f in $(CVS_CREATED) `find -name Makefile.in` ; do\
|
||||
|
@ -25,3 +25,9 @@ cvs-clean: maintainer-clean
|
|||
|
||||
deb:
|
||||
dpkg-buildpackage -rfakeroot
|
||||
|
||||
rpm: dist
|
||||
cp $(distdir).tar.gz /usr/src/redhat/SOURCES/
|
||||
cp redhat/tinc.spec /usr/src/redhat/SOURCES/
|
||||
cd /usr/src/redhat/SOURCES/
|
||||
rpm -bi tinc.spec
|
||||
|
|
21
README
21
README
|
@ -4,17 +4,26 @@ Installation instructions may be found in the INSTALL file.
|
|||
tinc is Copyright (C) 1998,1999,2000 Ivo Timmermans
|
||||
<itimmermans@bigfoot.com>, Guus Sliepen <guus@sliepen.warande.net> and
|
||||
others. For a complete list of authors see the AUTHORS file.
|
||||
This product includes software developed by Eric Young (eay@mincom.oz.au)
|
||||
|
||||
This program is free software; you can redistribute it and/or modify
|
||||
it under the terms of the GNU General Public License as published by
|
||||
the Free Software Foundation; either version 2 of the License, or (at
|
||||
your option) any later version. See the file COPYING for more details.
|
||||
|
||||
This version of tinc relies on the GNU Multi-Precision Library
|
||||
(gmp). This library is available from your nearest GNU mirror. Please
|
||||
install this first even before trying to run configure. If you don't
|
||||
do this, configure will (hopefully) mention it to you.
|
||||
|
||||
Requirements
|
||||
------------
|
||||
|
||||
Since 1.0pre3, we use OpenSSL for all cryptographic functions. So you
|
||||
need to install this library first; grab it from
|
||||
http://www.openssl.org/. We recommend version 0.9.5 or better. If
|
||||
this library is not installed on you system, configure will fail. The
|
||||
manual in doc/tinc.texi contains more detailed information on how to
|
||||
install this library.
|
||||
|
||||
|
||||
Features
|
||||
--------
|
||||
|
||||
This version of tinc supports multiple virtual networks at once. To
|
||||
use this feature, you may supply a netname via the -n or --net
|
||||
|
@ -29,7 +38,7 @@ In this version, MAC addresses are stripped off before encoding and
|
|||
sending a packet. When the packet reaches its destination, the MAC
|
||||
addresses are rebuilt again. They then have the form
|
||||
FE:FD:aa:bb:cc:dd. aa, bb, cc and dd are taken from the destination
|
||||
and source IP address.
|
||||
and source IP address. See the manual for more detailed information.
|
||||
|
||||
tincd regenerates its encryption key pairs. It does this on the first
|
||||
activity after the keys have expired. This period is adjustable in the
|
||||
|
|
18
THANKS
18
THANKS
|
@ -2,19 +2,19 @@ I would like to thank
|
|||
|
||||
* Hans Bayle (for making some useful coding suggestions and fixing a
|
||||
bug or two)
|
||||
* Lubomír Bulej (for the Redhat system init script)
|
||||
* Wessel Dankers (for the name `tinc' and various suggestions)
|
||||
* Mads Kiilerich (for finding some bugs and some errors in the
|
||||
documentation, and for making several suggestions to make it all
|
||||
more userfriendly)
|
||||
* James B. MacLean (for fixing several mission critical bugs, and for
|
||||
more userfriendly, and the Redhat package)
|
||||
* James MacLean (for fixing several mission critical bugs, and for
|
||||
giving me a few good ideas, and, most of all, for the wonderful
|
||||
testing and debugging)
|
||||
* Cris van Pelt
|
||||
* Robert van der Meulen
|
||||
* Sander Smeenk
|
||||
* Tijs van Bakel
|
||||
* Wessel Dankers (for the name `tinc' and being a royal pain in the
|
||||
ass (je hebt erom gevraagd))
|
||||
* Robert van der Meulen (early configuration code)
|
||||
* Cris van Pelt (small fixes)
|
||||
* Enrique Zanardi (for the Spanish translation)
|
||||
* Matias Carrasco (for the Spanish translation of the manual)
|
||||
|
||||
for their help, support and ideas. Thank you guys!
|
||||
for their help, support and ideas. Thank you guys!
|
||||
|
||||
And especially Guus Sliepen, for starting this whole project...
|
||||
|
|
2
TODO
2
TODO
|
@ -5,3 +5,5 @@ Things left to do to make cabal superstable:
|
|||
tree property.
|
||||
* Redundancy: multiple ConnectTo lines, if
|
||||
one fails others might be tried.
|
||||
* Allow connects to hosts that use
|
||||
nodirectdata.
|
||||
|
|
10
acconfig.h
10
acconfig.h
|
@ -43,3 +43,13 @@
|
|||
# include <stdlib.h>
|
||||
# undef getopt
|
||||
#endif
|
||||
|
||||
|
||||
/* Define to the location of the kernel sources */
|
||||
#undef CONFIG_TINC_KERNELDIR
|
||||
|
||||
/* Define to 1 if tun/tap support is enabled and found */
|
||||
#undef HAVE_TUNTAP
|
||||
|
||||
/* Define to the location of if_tun.h */
|
||||
#undef LINUX_IF_TUN_H
|
||||
|
|
61
configure.in
61
configure.in
|
@ -1,6 +1,6 @@
|
|||
dnl Process this file with autoconf to produce a configure script.
|
||||
|
||||
dnl $Id: configure.in,v 1.14 2000/06/25 15:42:40 zarq Exp $
|
||||
dnl $Id: configure.in,v 1.15 2000/10/18 20:12:06 zarq Exp $
|
||||
|
||||
AC_INIT(src/tincd.c)
|
||||
AM_INIT_AUTOMAKE(tinc, 1.0pre3)
|
||||
|
@ -14,7 +14,7 @@ AM_ACLOCAL_INCLUDE(m4)
|
|||
# in the latter don't make it into the configure-time tests.
|
||||
AC_DEFINE([_GNU_SOURCE], [__USE_BSD])
|
||||
|
||||
ALL_LINGUAS="nl"
|
||||
ALL_LINGUAS="es nl"
|
||||
|
||||
dnl Checks for programs.
|
||||
AC_PROG_CC
|
||||
|
@ -33,8 +33,7 @@ dnl Checks for libraries.
|
|||
|
||||
dnl Checks for header files.
|
||||
AC_HEADER_STDC
|
||||
AC_CHECK_HEADERS(fcntl.h limits.h sys/ioctl.h syslog.h unistd.h gmp.h gmp2/gmp.h \
|
||||
sys/time.h)
|
||||
AC_CHECK_HEADERS(fcntl.h limits.h sys/ioctl.h syslog.h unistd.h sys/time.h linux/if_tun.h)
|
||||
|
||||
dnl Checks for typedefs, structures, and compiler characteristics.
|
||||
AC_C_CONST
|
||||
|
@ -53,32 +52,38 @@ jm_FUNC_REALLOC
|
|||
|
||||
AM_GNU_GETTEXT
|
||||
|
||||
# Check for the GNU Multi Precision Library
|
||||
libgmp=none
|
||||
AC_CHECK_LIB(gmp, mpz_powm, [
|
||||
libgmp=gmp
|
||||
])
|
||||
AC_CHECK_LIB(gmp2, mpz_powm, [
|
||||
libgmp=gmp2
|
||||
])
|
||||
AC_CHECK_LIB(gmp3, __gmpz_powm, [
|
||||
libgmp=gmp3
|
||||
])
|
||||
AC_CHECK_LIB(gmp, __gmpz_powm, [
|
||||
libgmp=gmp
|
||||
])
|
||||
|
||||
if test $libgmp = none; then
|
||||
AC_MSG_ERROR(libgmp is not installed. Please grab it from your
|
||||
nearest GNU mirror and install it (see README))
|
||||
else
|
||||
LIBS="$LIBS -l$libgmp"
|
||||
fi
|
||||
|
||||
AC_CHECK_LIB(dl, dlopen, [
|
||||
LIBS="$LIBS -ldl"
|
||||
])
|
||||
|
||||
AC_OUTPUT([Makefile src/Makefile cipher/Makefile
|
||||
cipher/blowfish/Makefile doc/Makefile intl/Makefile lib/Makefile
|
||||
|
||||
dnl Crypto stuff
|
||||
|
||||
libcrypto=none
|
||||
AC_CHECK_LIB(crypto, SHA1_version, [
|
||||
libcrypto=yes
|
||||
])
|
||||
|
||||
if test $libcrypto = none; then
|
||||
AC_MSG_ERROR(It seems like OpenSSL is not installed on this system.)
|
||||
else
|
||||
LIBS="$LIBS -lcrypto"
|
||||
fi
|
||||
|
||||
|
||||
dnl Support for SunOS
|
||||
|
||||
AC_CHECK_FUNC(socket, [], [
|
||||
AC_CHECK_LIB(socket, connect)
|
||||
])
|
||||
AC_CHECK_FUNC(gethostbyname, [], [
|
||||
AC_CHECK_LIB(nsl, gethostbyname)
|
||||
])
|
||||
|
||||
|
||||
dnl Check for TUN/TAP support in the kernel
|
||||
tinc_TUNTAP
|
||||
|
||||
AC_OUTPUT([Makefile src/Makefile
|
||||
doc/Makefile doc/es/Makefile intl/Makefile lib/Makefile
|
||||
m4/Makefile po/Makefile.in redhat/Makefile debian/Makefile])
|
||||
|
|
6
debian/changelog
vendored
6
debian/changelog
vendored
|
@ -1,3 +1,9 @@
|
|||
tinc (1.0pre3-0.1) unstable; urgency=low
|
||||
|
||||
* upgraded to upstream version 1.0pre3
|
||||
|
||||
-- Ivo Timmermans <itimmermans@bigfoot.com> Sun, 25 Jun 2000 00:00:00 +0200
|
||||
|
||||
tinc (1.0pre2-1) unstable; urgency=low
|
||||
|
||||
* postinst creates a file /etc/tinc/nets.boot, containing all networks
|
||||
|
|
4
debian/control
vendored
4
debian/control
vendored
|
@ -3,11 +3,11 @@ Section: non-US/main
|
|||
Priority: optional
|
||||
Maintainer: Ivo Timmermans <itimmermans@bigfoot.com>
|
||||
Standards-Version: 3.0.1
|
||||
Build-Depends: libc6-dev, libgmp2-dev
|
||||
Build-Depends: libc6-dev, libssl095a-dev, autoconf (>= 2.12), automake,
|
||||
|
||||
Package: tinc
|
||||
Architecture: i386
|
||||
Depends: ${shlibs:Depends}, libgmp2, perl5
|
||||
Depends: ${shlibs:Depends}, (libssl095a|libssl09), perl5
|
||||
Description: Virtual Private Network daemon
|
||||
tinc is a daemon with which you can create a virtual private network
|
||||
(VPN). One daemon can handle multiple connections, so you can
|
||||
|
|
7
debian/init.d
vendored
7
debian/init.d
vendored
|
@ -1,7 +1,7 @@
|
|||
#! /usr/bin/perl -w
|
||||
#
|
||||
# System startup script for tinc
|
||||
# $Id: init.d,v 1.14 2000/06/01 20:21:27 guus Exp $
|
||||
# $Id: init.d,v 1.15 2000/10/18 20:12:06 zarq Exp $
|
||||
#
|
||||
# Based on Lubomir Bulej's Redhat init script.
|
||||
#
|
||||
|
@ -68,6 +68,7 @@ sub vpn_load {
|
|||
chomp($VPN);
|
||||
} elsif ( /^[ ]*VpnMask[ =]+([^ \#]+)/i ) {
|
||||
$VPNMASK=$1;
|
||||
chomp($VPNMASK);
|
||||
}
|
||||
}
|
||||
if(!defined($DEV)) {
|
||||
|
@ -108,10 +109,8 @@ sub vpn_load {
|
|||
|
||||
if(!defined($VPNMASK)) {
|
||||
$VPNMASK = $MSK;
|
||||
$VPNMASK = join(".", unpack('C4', $VPNMASK));
|
||||
}
|
||||
|
||||
$VPNMASK = pack('C4', split(/\./, $VPNMASK));
|
||||
$VPNMASK = join(".", unpack('C4', $VPNMASK));
|
||||
$ADR = join(".", unpack('C4', $ADR));
|
||||
$MSK = join(".", unpack('C4', $MSK));
|
||||
|
||||
|
|
2
debian/rules
vendored
2
debian/rules
vendored
|
@ -32,7 +32,7 @@ install: build
|
|||
dh_clean -k
|
||||
dh_installdirs
|
||||
|
||||
$(MAKE) install prefix=`pwd`/debian/tmp/usr
|
||||
$(MAKE) install DESTDIR=`pwd`/debian/tmp
|
||||
mkdir -p `pwd`/debian/tmp/etc/tinc/example
|
||||
cp doc/tinc.conf.sample `pwd`/debian/tmp/etc/tinc/example/tinc.conf
|
||||
ln -s /usr/share/doc/tinc/README.Debian `pwd`/debian/tmp/etc/tinc/example/README
|
||||
|
|
|
@ -1,11 +1,13 @@
|
|||
## Process this file with automake to get Makefile.in
|
||||
|
||||
SUBDIRS = es
|
||||
|
||||
info_TEXINFOS = tinc.texi
|
||||
|
||||
dyn_MANS = tincd.8
|
||||
dyn_MANS =
|
||||
man_aux = $(dyn_MANS:.8=.x)
|
||||
|
||||
man_MANS = tinc.conf.5 genauth.8 $(dyn_MANS)
|
||||
man_MANS = tincd.8 tinc.conf.5 genauth.8 $(dyn_MANS)
|
||||
|
||||
PERL = @PERL@
|
||||
HELP2MAN = help2man
|
||||
|
|
121
doc/tinc.conf.5
121
doc/tinc.conf.5
|
@ -59,67 +59,104 @@ one space character.
|
|||
.PP
|
||||
.SH "VARIABLES"
|
||||
.PP
|
||||
Here are all valid variables, listed in alphabetical order:
|
||||
Here are all valid variables, listed in alphabetical order. The default
|
||||
value, required or optional is given between parentheses.
|
||||
.TP
|
||||
\fBConnectPort = \fIport\fR
|
||||
Connect to the upstream host (given with the \fBConnectTo\fR
|
||||
directive) on port \fIport\fR. \fIport\fR may be given in decimal
|
||||
(default), octal (when preceded by a single zero) or hexadecimal
|
||||
(prefixed with \fB0x\fR). \fIport\fR is the port number for both the
|
||||
UDP and the TCP (meta) connections.
|
||||
\fBConnectPort\fR = <\fIport\fR> (655)
|
||||
Connect to the upstream host (given with the \fBConnectTo\fR directive) on
|
||||
port \fIport\fR. port may be given in decimal (default), octal (when preceded
|
||||
by a single zero) or hexadecimal (prefixed with 0x). \fIport\fR is the port
|
||||
number for both the UDP and the TCP (meta) connections.
|
||||
.TP
|
||||
\fBConnectTo = \fB(\fIIP address\fB|\fIhostname\fB)\fR
|
||||
Specifies which host to connect to on startup. If the
|
||||
\fBConnectPort\fR variable is omitted, then tinc will try to connect
|
||||
to port 655.
|
||||
\fBConnectTo\fR = <\fIIP address|hostname\fR> (optional)
|
||||
Specifies which host to connect to on startup. Multiple \fBConnectTo\fR variables
|
||||
may be specified, if connecting to the first one fails then tinc will try
|
||||
the next one, and so on. It is possible to specify hostnames for dynamic IP
|
||||
addresses (like those given on dyndns.org), tinc will not cache the resolved
|
||||
IP address.
|
||||
|
||||
If you don't specify a host with \fBConnectTo\fR, tinc won't connect
|
||||
at all, and will instead just listen for incoming connections. Only
|
||||
the initiator of a tinc VPN should need this.
|
||||
If you don't specify a host with \fBConnectTo\fR, regardless of whether a
|
||||
value for \fBConnectPort\fR is given, tinc won't connect at all, and will
|
||||
instead just listen for incoming connections.
|
||||
.TP
|
||||
\fBKeyExpire = \fIs\fR
|
||||
The secret (and public) key expires after \fIs\fR seconds. The default
|
||||
is 3600 seconds, or one hour.
|
||||
\fBHostnames\fR = <\fIyes|no\fR> (no)
|
||||
This option selects whether IP addresses (both real and on the VPN) should
|
||||
be resolved. Since DNS lookups are blocking, it might affect tinc's
|
||||
efficiency, even stopping the daemon for a few seconds everytime it does
|
||||
a lookup if your DNS server is not responding.
|
||||
|
||||
If you make it shorter, a lot of time and bandwidth is spent
|
||||
negotiating over the new keys. If you make it longer, you make
|
||||
yourself more vulnerable to crackers, because they have more data to
|
||||
work with. The best value depends on the speed of the link, and the
|
||||
amount of data that goes over it.
|
||||
This does not affect resolving hostnames to IP addresses from the configuration
|
||||
file.
|
||||
.TP
|
||||
\fBListenPort = \fIport\fR
|
||||
Listen on local port \fIport\fR. The computer connecting to this
|
||||
daemon should use this number as the argument for his
|
||||
\fBConnectPort\fR. Again, the default is 655.
|
||||
\fBIndirectData\fR = <\fIyes|no\fR> (no)
|
||||
This option specifies whether other tinc daemons besides the one you
|
||||
specified with \fBConnectTo\fR can make a direct connection to you. This is
|
||||
especially useful if you are behind a firewall and it is impossible
|
||||
to make a connection from the outside to your tinc daemon. Otherwise,
|
||||
it is best to leave this option out or set it to no.
|
||||
.TP
|
||||
\fBMyOwnVPNIP = \fInetwork address\fR[\fB/\fImaskbits\fR]
|
||||
The \fInetwork address\fR is the number that the daemon will propagate
|
||||
to other daemons on the network when it is identifying itself. Hence
|
||||
this will be the file name of the passphrase file that the other end
|
||||
expects to find the passphrase in.
|
||||
\fBInterface\fR = <\fIdevice\fR> (optional)
|
||||
If you have more than one network interface in your computer, tinc will by
|
||||
default listen on all of them for incoming connections. It is possible to
|
||||
bind tinc to a single interface like eth0 or ppp0 with this variable.
|
||||
.TP
|
||||
\fBInterfaceIP\fR = <\fIlocal address\fR> (optional)
|
||||
If your computer has more than one IP address on a single interface (for example
|
||||
if you are running virtual hosts), tinc will by default listen on all of them for
|
||||
incoming connections. It is possible to bind tinc to a single IP address with
|
||||
this variable. It is still possible to listen on several interfaces at the same
|
||||
time though, if they share the same IP address.
|
||||
.TP
|
||||
\fBKeyExpire\fR = <\fIseconds\fR> (3600)
|
||||
This option controls the time the encryption keys used to encrypt the data
|
||||
are valid. It is common practice to change keys at regular intervals to
|
||||
make it even harder for crackers, even though it is thought to be nearly
|
||||
impossible to crack a single key.
|
||||
.TP
|
||||
\fBListenPort\fR = <\fIport\fR> (655)
|
||||
Listen on local port \fIport\fR. The computer connecting to this daemon should
|
||||
use this number as the argument for his \fBConnectPort\fR.
|
||||
.TP
|
||||
\fBMyOwnVPNIP\fR = <\fIlocal address[/maskbits]\fR> (required)
|
||||
The \fIlocal address\fR is the number that the daemon will propagate to
|
||||
other daemons on the network when it is identifying itself. Hence this
|
||||
will be the file name of the passphrase file that the other end expects
|
||||
to find the passphrase in.
|
||||
|
||||
The local address is the IP address of the tap device, not the real IP
|
||||
address of the host running tincd. Due to changes in recent kernels, it
|
||||
is also necessary that you make the ethernet (also known as MAC) address
|
||||
equal to the IP address (see the example).
|
||||
|
||||
\fImaskbits\fR is the number of bits set to 1 in the netmask part.
|
||||
.TP
|
||||
\fBMyVirtualIP = \fInetwork address\fR[\fB/\fImaskbits\fR]
|
||||
\fBMyVirtualIP\fR = <\fIlocal address[/maskbits]>
|
||||
This is an alias for \fBMyOwnVPNIP\fR.
|
||||
.TP
|
||||
\fBPassphrases = \fIdirectory\fR
|
||||
The directory where tinc will look for passphrases when someone tries
|
||||
to cennect. Please see the manpage for \fBgenauth\fR(8) for more
|
||||
information about passphrases as used by tinc.
|
||||
\fBPassphrases\fR = <\fIdirectory\fR> (/etc/tinc/NETNAME/passphrases)
|
||||
The directory where tinc will look for passphrases when someone tries to
|
||||
connect. Please see the manpage for genauth(8) for more information
|
||||
about passphrases as used by tinc.
|
||||
.TP
|
||||
\fBPingTimeout = \fInumber\fR
|
||||
The number of seconds of inactivity that tinc will wait before sending
|
||||
a probe to the other end. If that other end doesn't answer within that
|
||||
\fBPingTimeout\fR = <\fIseconds\fR> (5)
|
||||
The number of seconds of inactivity that tinc will wait before sending a
|
||||
probe to the other end. If that other end doesn't answer within that
|
||||
same amount of seconds, the connection is terminated, and the others
|
||||
will be notified of this.
|
||||
.TP
|
||||
\fBTapDevice = \fIdevice\fR
|
||||
\fBTapDevice\fR = <\fIdevice\fR> (/dev/tap0)
|
||||
The ethertap device to use. Note that you can only use one device per
|
||||
daemon. The info pages of the tinc package contain more information
|
||||
about configuring an ethertap device for linux.
|
||||
about configuring an ethertap device for Linux.
|
||||
.TP
|
||||
\fBNetMask = \fImask\fR
|
||||
\fBTCPonly\fR = <\fIyes|no\fR> (no, experimental)
|
||||
If this variable is set to yes, then the packets are tunnelled over a TCP
|
||||
connection instead of a UDP connection. This is especially useful for those
|
||||
who want to run a tinc daemon from behind a masquerading firewall, or if
|
||||
UDP packet routing is disabled somehow. This is experimental code,
|
||||
try this at your own risk.
|
||||
.TP
|
||||
\fBVpnMask\fR = <\fImask\fR> (optional)
|
||||
The mask that defines the scope of the entire VPN. This option is not used
|
||||
by the tinc daemon itself, but can be used by startup scripts to configure
|
||||
the ethertap devices correctly.
|
||||
|
|
585
doc/tinc.texi
585
doc/tinc.texi
|
@ -1,4 +1,5 @@
|
|||
\input texinfo @c -*-texinfo-*-
|
||||
@c $Id: tinc.texi,v 1.9 2000/10/18 20:12:06 zarq Exp $
|
||||
@c %**start of header
|
||||
@setfilename tinc.info
|
||||
@settitle tinc Manual
|
||||
|
@ -12,40 +13,45 @@
|
|||
|
||||
This is the info manual for tinc, a Virtual Private Network daemon.
|
||||
|
||||
Copyright 1998,199,2000 Ivo Timmermans <itimmermans@@bigfoot.com>
|
||||
Copyright @copyright{} 1998,199,2000 Ivo Timmermans
|
||||
<itimmermans@@bigfoot.com>, Guus Sliepen <guus@@sliepen.warande.net> and
|
||||
Wessel Dankers <wsl@@nl.linux.org>.
|
||||
|
||||
Permission is granted to make and distribute verbatim
|
||||
copies of this manual provided the copyright notice and
|
||||
this permission notice are preserved on all copies.
|
||||
$Id: tinc.texi,v 1.9 2000/10/18 20:12:06 zarq Exp $
|
||||
|
||||
Permission is granted to copy and distribute modified
|
||||
versions of this manual under the conditions for
|
||||
verbatim copying, provided
|
||||
that the entire resulting derived work is distributed
|
||||
under the terms of a permission notice identical to this
|
||||
one.
|
||||
Permission is granted to make and distribute verbatim copies of this
|
||||
manual provided the copyright notice and this permission notice are
|
||||
preserved on all copies.
|
||||
|
||||
Permission is granted to copy and distribute modified versions of this
|
||||
manual under the conditions for verbatim copying, provided that the
|
||||
entire resulting derived work is distributed under the terms of a
|
||||
permission notice identical to this one.
|
||||
|
||||
@end ifinfo
|
||||
|
||||
@titlepage
|
||||
@title tinc Manual
|
||||
@subtitle Setting up a Virtual Private Network with tinc
|
||||
@author Ivo Timmermans <itimmermans@@bigfoot.com>
|
||||
@author Ivo Timmermans and Guus Sliepen
|
||||
|
||||
@page
|
||||
@vskip 0pt plus 1filll
|
||||
Copyright @copyright{} 1998,1999,2000 Ivo Timmermans <itimmermans@@bigfoot.com>
|
||||
@cindex copyright
|
||||
Copyright @copyright{} 1998,1999,2000 Ivo Timmermans
|
||||
<itimmermans@@bigfoot.com>, Guus Sliepen <guus@@sliepen.warande.net> and
|
||||
Wessel Dankers <wsl@@nl.linux.org>.
|
||||
|
||||
Permission is granted to make and distribute verbatim
|
||||
copies of this manual provided the copyright notice and
|
||||
this permission notice are preserved on all copies.
|
||||
$Id: tinc.texi,v 1.9 2000/10/18 20:12:06 zarq Exp $
|
||||
|
||||
Permission is granted to copy and distribute modified
|
||||
versions of this manual under the conditions for
|
||||
verbatim copying, provided
|
||||
that the entire resulting derived work is distributed
|
||||
under the terms of a permission notice identical to this
|
||||
one.
|
||||
Permission is granted to make and distribute verbatim copies of this
|
||||
manual provided the copyright notice and this permission notice are
|
||||
preserved on all copies.
|
||||
|
||||
Permission is granted to copy and distribute modified versions of this
|
||||
manual under the conditions for verbatim copying, provided that the
|
||||
entire resulting derived work is distributed under the terms of a
|
||||
permission notice identical to this one.
|
||||
|
||||
@end titlepage
|
||||
|
||||
|
@ -54,8 +60,8 @@ Copyright @copyright{} 1998,1999,2000 Ivo Timmermans <itimmermans@@bigfoot.com>
|
|||
|
||||
@menu
|
||||
* Introduction:: Introduction
|
||||
* Configuring a Linux system:: Before compiling tinc
|
||||
* Installing tinc::
|
||||
* Installing tinc - preparations::
|
||||
* Installing tinc - installation::
|
||||
* Configuring tinc::
|
||||
* Running tinc::
|
||||
* Technical information::
|
||||
|
@ -63,12 +69,14 @@ Copyright @copyright{} 1998,1999,2000 Ivo Timmermans <itimmermans@@bigfoot.com>
|
|||
* Concept Index:: All used terms explained
|
||||
@end menu
|
||||
|
||||
|
||||
@contents
|
||||
|
||||
@c ==================================================================
|
||||
@node Introduction, Configuring a Linux system, Top, Top
|
||||
@node Introduction, Installing tinc - preparations, Top, Top
|
||||
@chapter Introduction
|
||||
|
||||
@c straight from the www page
|
||||
|
||||
@cindex tinc
|
||||
tinc is a Virtual Private Network (VPN) daemon that uses tunneling and
|
||||
encryption to create a secure private network between hosts on the
|
||||
Internet.
|
||||
|
@ -86,12 +94,14 @@ process of tinc itself.
|
|||
@menu
|
||||
* VPNs:: Virtual Private Networks in general
|
||||
* tinc:: about tinc
|
||||
* Supported platforms::
|
||||
@end menu
|
||||
|
||||
@c ==================================================================
|
||||
@node VPNs, tinc, Introduction, Introduction
|
||||
@section Virtual Private Networks
|
||||
|
||||
@cindex VPN
|
||||
A Virtual Private Network or VPN is a network that can only be accessed
|
||||
by a few elected computers that participate. This goal is achievable in
|
||||
more than just one way.
|
||||
|
@ -100,7 +110,7 @@ more than just one way.
|
|||
Private networks can consist of a single stand-alone ethernet LAN. Or
|
||||
even two computers hooked up using a null-modem cable. In these cases,
|
||||
it is
|
||||
obvious that the network is @emph{private}, noone can access it from the
|
||||
obvious that the network is @emph{private}, no one can access it from the
|
||||
outside. But if your computers are linked to the internet, the network
|
||||
is not private anymore, unless one uses firewalls to block all private
|
||||
traffic. But then, there is no way to send private data to trusted
|
||||
|
@ -131,9 +141,11 @@ that flows over the network.
|
|||
|
||||
|
||||
@c ==================================================================
|
||||
@node tinc, , VPNs, Introduction
|
||||
@node tinc, Supported platforms, VPNs, Introduction
|
||||
@section tinc
|
||||
|
||||
@cindex vpnd
|
||||
@cindex ethertap
|
||||
I really don't quite remember what got us started, but it must have been
|
||||
Guus' idea. He wrote a simple implementation (about 50 lines of C) that
|
||||
used the @emph{ethertap} device that Linux knows of since somewhere
|
||||
|
@ -158,23 +170,101 @@ available too.
|
|||
|
||||
|
||||
@c ==================================================================
|
||||
@node Configuring a Linux system, Installing tinc, Introduction, Top
|
||||
@chapter Configuring a Linux system
|
||||
@node Supported platforms, , tinc, Introduction
|
||||
@section Supported platforms
|
||||
|
||||
This chapter contains information on how a Linux system is configured
|
||||
for the use of tinc.
|
||||
tinc works on Linux, FreeBSD and Solaris. These are the three platforms
|
||||
that are supported by the universial TUN/TAP device driver, so if
|
||||
support for other operating systems is added to this driver, perhaps
|
||||
tinc will run on them as well. Without this driver, tinc will most
|
||||
likely compile and run, but it will not be able to send or receive data
|
||||
packets.
|
||||
|
||||
@c ==================================================================
|
||||
@subsection Linux
|
||||
|
||||
tinc was first written for Linux running on an intel x86 processor, so
|
||||
this is the best supported platform. The protocol however, and actually
|
||||
anything about tinc, has been rewritten to support random byte ordering
|
||||
and arbitrary word length. So in theory it should run on other
|
||||
processors that Linux runs on. Take care however, we haven't been able
|
||||
to really test it yet. If you want to run tinc on another platform than
|
||||
x86, and want to tell us how it went, please do so.
|
||||
|
||||
tinc uses the ethertap device that is provided in the standard kernel
|
||||
since version 2.1.60, so anything above that (2.2.x, 2.3.x, and the
|
||||
2.4.0-testx (which is current at the time of this writing) kernel
|
||||
versions) is able to support tinc.
|
||||
|
||||
|
||||
@c ==================================================================
|
||||
@subsection FreeBSD
|
||||
|
||||
tinc on FreeBSD relies on the universial TUN/TAP driver for its data
|
||||
acquisition from the kernel. Therefore, tinc suports the same platforms
|
||||
as this driver. These are: FreeBSD 3.x, 4.x, 5.x.
|
||||
|
||||
|
||||
@c ==================================================================
|
||||
@subsection Solaris
|
||||
|
||||
tinc on Solaris relies on the universial TUN/TAP driver for its data
|
||||
acquisition from the kernel. Therefore, tinc suports the same platforms
|
||||
as this driver. These are: Solaris, 2.1.x.
|
||||
|
||||
|
||||
@c
|
||||
@c
|
||||
@c
|
||||
@c
|
||||
@c
|
||||
@c
|
||||
@c Preparing your system
|
||||
@c
|
||||
@c
|
||||
@c
|
||||
@c
|
||||
@c
|
||||
|
||||
@c ==================================================================
|
||||
@node Installing tinc - preparations, Installing tinc - installation, Introduction, Top
|
||||
@chapter Installing tinc: preparations
|
||||
|
||||
This chapter contains information on how to prepare your system to
|
||||
support tinc.
|
||||
|
||||
@menu
|
||||
* Configuring the kernel::
|
||||
* Files Needed::
|
||||
* Setting up the devices::
|
||||
* Libraries::
|
||||
@end menu
|
||||
|
||||
|
||||
@c ==================================================================
|
||||
@node Configuring the kernel, Files Needed, Configuring a Linux system, Configuring a Linux system
|
||||
@node Configuring the kernel, Libraries, Installing tinc - preparations, Installing tinc - preparations
|
||||
@section Configuring the kernel
|
||||
|
||||
If you are running Linux, chances are good that your kernel already
|
||||
supports all the devices that tinc needs for proper operation. For
|
||||
example, the standard kernel from Redhat Linux already has support for
|
||||
ethertap and netlink compiled in. Debian users can use the modconf
|
||||
utility to select the modules. If your Linux distribution supports this
|
||||
method of selecting devices, look out for something called `ethertap',
|
||||
and `netlink_dev'. You need both these devices.
|
||||
|
||||
If you can install these devices in a similar manner, you may skip this
|
||||
section.
|
||||
|
||||
@menu
|
||||
* Configuration of the Linux kernel::
|
||||
* Configuration of the FreeBSD kernel::
|
||||
* Configuration of the Solaris kernel::
|
||||
@end menu
|
||||
|
||||
|
||||
@c ==================================================================
|
||||
@node Configuration of the Linux kernel, Configuration of the FreeBSD kernel, Configuring the kernel, Configuring the kernel
|
||||
@subsection Configuring the Linux kernel
|
||||
|
||||
Since this particular implementation only runs on 2.1 or higher Linux
|
||||
kernels, you should grab one (2.2 is current at this time). A 2.0 port
|
||||
is not really possible, unless someone tells me someone ported the
|
||||
|
@ -185,9 +275,11 @@ new kernel, you should read the
|
|||
@uref{http://howto.linuxberg.com/LDP/HOWTO/Kernel-HOWTO.html, Kernel
|
||||
HOWTO} first. Do that now!
|
||||
|
||||
Here are the options you have to turn on/off when configuring a new
|
||||
Here are the options you have to turn on when configuring a new
|
||||
kernel.
|
||||
|
||||
For kernel 2.2.x:
|
||||
|
||||
@example
|
||||
Code maturity level options
|
||||
[*] Prompt for development and/or incomplete code/drivers
|
||||
|
@ -198,6 +290,19 @@ Network device support
|
|||
<*> Ethertap network tap
|
||||
@end example
|
||||
|
||||
For kernel 2.3.x and 2.4.x:
|
||||
|
||||
@example
|
||||
Code maturity level options
|
||||
[*] Prompt for development and/or incomplete code/drivers
|
||||
Networking options
|
||||
[*] Kernel/User netlink socket
|
||||
<*> Netlink device emulation
|
||||
Network device support
|
||||
<*> Universal TUN/TAP device driver support
|
||||
@end example
|
||||
|
||||
|
||||
Any other options not mentioned here are not relevant to tinc. If you
|
||||
decide to build any of these as dynamic kernel modules, it's a good idea
|
||||
to add these lines to @file{/etc/modules.conf}.
|
||||
|
@ -207,34 +312,179 @@ alias tap0 ethertap
|
|||
alias char-major-36 netlink_dev
|
||||
@end example
|
||||
|
||||
If you have a 2.4 kernel, you can also choose to use the `Ethertap
|
||||
network tap' device. This is marked obsolete, because the universal
|
||||
TUN/TAP driver is a newer implementation that is supposed to be used in
|
||||
favor of ethertap. For tinc, it doesn't really matter which one you
|
||||
choose; based on the device file name, tinc will make the right choice
|
||||
about what protocol to use.
|
||||
|
||||
Finally, after having set up other options, build the kernel and boot
|
||||
it. Unfortunately it's not possible to insert these modules in a running
|
||||
kernel.
|
||||
it. Unfortunately it's not possible to insert these modules in a
|
||||
running kernel.
|
||||
|
||||
|
||||
@c ==================================================================
|
||||
@node Files Needed, Setting up the devices, Configuring the kernel, Configuring a Linux system
|
||||
@section Files Needed
|
||||
@node Configuration of the FreeBSD kernel, Configuration of the Solaris kernel, Configuration of the Linux kernel, Configuring the kernel
|
||||
@subsection Configuring the FreeBSD kernel
|
||||
|
||||
@subsubheading Device files
|
||||
This section will contain information on how to configure your FreeBSD
|
||||
kernel to support the universal TUN/TAP device. For 5.0 and 4.1
|
||||
systems, this is included in the kernel configuration, for earlier
|
||||
systems (4.0 and 3.x), you need to install the universal TUN/TAP driver
|
||||
yourself.
|
||||
|
||||
Unfortunately somebody still has to write the text.
|
||||
|
||||
|
||||
@c ==================================================================
|
||||
@node Configuration of the Solaris kernel, , Configuration of the FreeBSD kernel, Configuring the kernel
|
||||
@subsection Configuring the Solaris kernel
|
||||
|
||||
This section will contain information on how to configure your Solaris
|
||||
kernel to support the universal TUN/TAP device. You need to install
|
||||
this driver yourself.
|
||||
|
||||
Unfortunately somebody still has to write the text.
|
||||
|
||||
|
||||
@c ==================================================================
|
||||
@node Libraries, , Configuring the kernel, Installing tinc - preparations
|
||||
@section Libraries
|
||||
|
||||
@cindex requirements
|
||||
Before you can configure or build tinc, you need to have the OpenSSL
|
||||
library installed on your system. If you try to configure tinc without
|
||||
having installed it, configure will give you an error message, and stop.
|
||||
|
||||
@menu
|
||||
* OpenSSL::
|
||||
@end menu
|
||||
|
||||
|
||||
@c ==================================================================
|
||||
@node OpenSSL, , Libraries, Libraries
|
||||
@subsection OpenSSL
|
||||
|
||||
@cindex OpenSSL
|
||||
For all cryptography-related functions, tinc uses the functions provided
|
||||
by the OpenSSL library. We recommend using version 0.9.5 or 0.9.6 of
|
||||
this library. Other versions may also work, but we can guarantee
|
||||
nothing.
|
||||
|
||||
If this library is not installed, you wil get an error when configuring
|
||||
tinc for build. Support for running tinc without having OpenSSL
|
||||
installed @emph{may} be added in the future.
|
||||
|
||||
You can use your operating system's package manager to install this if
|
||||
available. Make sure you install the development AND runtime versions
|
||||
of this package.
|
||||
|
||||
If you have to install OpenSSL manually, you can get the source code
|
||||
from @url{http://www.openssl.org/}. Instructions on how to configure,
|
||||
build and install this package are included within the package. Please
|
||||
make sure you build development and runtime libraries (which is the
|
||||
default).
|
||||
|
||||
|
||||
@c
|
||||
@c
|
||||
@c
|
||||
@c Installing tinc
|
||||
@c
|
||||
@c
|
||||
@c
|
||||
@c
|
||||
|
||||
@c ==================================================================
|
||||
@node Installing tinc - installation, Configuring tinc, Installing tinc - preparations, Top
|
||||
@chapter Installing tinc: installation
|
||||
|
||||
If you use Redhat or Debian, you may want to install one of the
|
||||
precompiled packages for your system. These packages are equipped with
|
||||
system startup scripts and sample configurations.
|
||||
|
||||
If you don't run either of these systems, or you want to compile tinc
|
||||
for yourself, you can use the source. The source is distributed under
|
||||
the GNU General Public License (GPL). Download the source from the
|
||||
@uref{http://tinc.nl.linux.org/download.html, download page}, which has
|
||||
the checksums of these files listed; you may wish to check these with
|
||||
md5sum before continuing.
|
||||
|
||||
tinc comes in a handy autoconf/automake package, which you can just
|
||||
treat the same as any other package. Which is just untar it, type
|
||||
`configure' and then `make'.
|
||||
|
||||
More detailed instructions are in the file @file{INSTALL}, which is
|
||||
included in the source distribution.
|
||||
|
||||
@menu
|
||||
* Building tinc::
|
||||
* System files::
|
||||
* Interfaces::
|
||||
@end menu
|
||||
|
||||
|
||||
@c ==================================================================
|
||||
@node Building tinc, System files, Installing tinc - installation, Installing tinc - installation
|
||||
@section Building tinc
|
||||
|
||||
Detailed instructions on configuring the source and building tinc can be
|
||||
found in the file called @file{INSTALL}.
|
||||
|
||||
|
||||
@c ==================================================================
|
||||
@node System files, Interfaces, Building tinc, Installing tinc - installation
|
||||
@section System files
|
||||
|
||||
Before you can run tinc, you
|
||||
|
||||
@menu
|
||||
* Device files::
|
||||
* Other files::
|
||||
@end menu
|
||||
|
||||
|
||||
@c ==================================================================
|
||||
@node Device files, Other files, System files, System files
|
||||
@subsection Device files
|
||||
|
||||
First, you'll need the special device file(s) that form the interface
|
||||
between the kernel and the daemon.
|
||||
|
||||
The permissions for these files have to be such that only the super user
|
||||
may read/write to this file. You'd want this, because otherwise
|
||||
eavesdropping would become a bit too easy. This does, however, imply
|
||||
that you'd have to run tincd as root.
|
||||
|
||||
If you use the universal TUN/TAP driver, you have to create the
|
||||
following device files (unless they already exist):
|
||||
|
||||
@example
|
||||
mknod -m 600 /dev/... c .. ..
|
||||
chown 0.0 /dev/...
|
||||
@end example
|
||||
|
||||
If you want to have more devices, the device numbers will be .. .. ...
|
||||
|
||||
If you use Linux, and you run the new 2.4 kernel using the devfs
|
||||
filesystem, then the tap device will be automatically generated as
|
||||
@file{/dev/netlink/tap0}.
|
||||
|
||||
If you use Linux and have kernel 2.2.x, you have to make the ethertap
|
||||
devices:
|
||||
|
||||
@example
|
||||
mknod -m 600 /dev/tap0 c 36 16
|
||||
chown 0.0 /dev/tap0
|
||||
@end example
|
||||
|
||||
The permissions now will be such that only the super user may read/write
|
||||
to this file. You'd want this, because otherwise eavesdropping would
|
||||
become a bit too easy. This does, however, imply that you'd have to run
|
||||
tincd as root.
|
||||
Any further ethertap devices have minor device number 16 through 31.
|
||||
|
||||
If you want to, you may also create more device files, which would be
|
||||
numbered 0...15, with minor device numbers 16...31. They all should be
|
||||
owned by root and have permission 600.
|
||||
|
||||
@c ==================================================================
|
||||
@node Other files, , Device files, System files
|
||||
@subsection Other files
|
||||
|
||||
@subsubheading @file{/etc/networks}
|
||||
|
||||
|
@ -245,6 +495,9 @@ symbolic name. For example:
|
|||
myvpn 10.0.0.0
|
||||
@end example
|
||||
|
||||
This has nothing to do with the MyVPNIP configuration variable that will be
|
||||
discussed later, it is only to make the output of the route command more
|
||||
legible.
|
||||
|
||||
@subsubheading @file{/etc/services}
|
||||
|
||||
|
@ -260,15 +513,15 @@ tinc 655/udp TINC
|
|||
|
||||
|
||||
@c ==================================================================
|
||||
@node Setting up the devices, , Files Needed, Configuring a Linux system
|
||||
@section Setting up the devices
|
||||
@node Interfaces, , System files, Installing tinc - installation
|
||||
@section Interfaces
|
||||
|
||||
Before you can start transmitting data over the tinc tunnel, you must
|
||||
set up the ethertap network devices.
|
||||
|
||||
First, decide which IP addresses you want to have associated with these
|
||||
devices, and what network mask they must have. You also need these
|
||||
numbers when you are going to configure tinc itself. @xref{Configuring
|
||||
devices, and what network mask they must have. You also need these
|
||||
numbers when you are going to configure tinc itself. @xref{Configuring
|
||||
tinc}.
|
||||
|
||||
It doesn't matter much which part you do first, setting up the network
|
||||
|
@ -282,42 +535,52 @@ after me:
|
|||
ifconfig tap@emph{n} hw ether fe:fd:@emph{xx}:@emph{xx}:@emph{xx}:@emph{xx}
|
||||
@end example
|
||||
|
||||
The @emph{n} here is the number of the ethertap device you want to
|
||||
use. It should be the same @emph{n} as the one you use for
|
||||
@file{/dev/tap@emph{n}}. The @emph{xx}s are four hexadecimal numbers
|
||||
The @emph{n} here is the number of the ethertap device you want to use.
|
||||
It should be the same @emph{n} as the one you use for
|
||||
@file{/dev/tap@emph{n}}. The @emph{xx}s are four hexadecimal numbers
|
||||
(0--ff). With previous versions of tincd, it didn't matter what they
|
||||
were. But newer kernels require properly set up ethernet addresses.
|
||||
In fact, the old behavior was wrong. It is required that the @emph{xx}s
|
||||
match MyOwnVPNIP.
|
||||
were. But newer kernels require properly set up ethernet addresses. In
|
||||
fact, the old behavior was wrong. It is required that the @emph{xx}s
|
||||
match the numbers of the IP address you will give to the tap device and
|
||||
to the MyOwnVPNIP configuration (which will be discussed later).
|
||||
|
||||
@cindex MAC address
|
||||
@cindex hardware address
|
||||
@strong{Tip}: for finding out what the MAC address of the tap interface
|
||||
should be, you can use the following command:
|
||||
|
||||
@example
|
||||
ifconfig tap@emph{n} @emph{IP} netmask @emph{mask}
|
||||
$ printf 'fe:fd:%02x:%02x:%02x:%02x' 10 1 54 1
|
||||
fe:fd:0a:01:36:01
|
||||
@end example
|
||||
|
||||
This will activate the device with an IP address @emph{IP} with network
|
||||
mask @emph{mask}.
|
||||
@cindex ifconfig
|
||||
To activate the device, you have to assign an IP address to it. To set
|
||||
an IP address @emph{IP} with network mask @emph{mask}, do the following:
|
||||
|
||||
@example
|
||||
ifconfig tap@emph{n} @emph{xx}.@emph{xx}.@emph{xx}.@emph{xx} netmask @emph{mask}
|
||||
@end example
|
||||
|
||||
@cindex netmask
|
||||
The netmask is the mask of the @emph{entire} VPN network, not just your
|
||||
own subnet. It is the same netmask you will have to specify with the
|
||||
VpnMask configuration variable.
|
||||
|
||||
|
||||
|
||||
@c ==================================================================
|
||||
@node Installing tinc, Configuring tinc, Configuring a Linux system, Top
|
||||
@chapter Installing tinc
|
||||
|
||||
First download it. This is the
|
||||
@uref{http://tinc.nl.linux.org/download.html, download
|
||||
page}, which has the checksums of these files listed; you may wish to
|
||||
check these with md5sum before continuing.
|
||||
|
||||
tinc comes in a handy autoconf/automake package, which you can just
|
||||
treat the same as any other package. Which is just untar it, type
|
||||
`configure' and then `make'.
|
||||
|
||||
More detailed instructions are in the file @file{INSTALL}, which is
|
||||
included in the source distribution.
|
||||
@c
|
||||
@c
|
||||
@c
|
||||
@c
|
||||
@c Configuring tinc
|
||||
@c
|
||||
@c
|
||||
@c
|
||||
@c
|
||||
|
||||
|
||||
@c ==================================================================
|
||||
@node Configuring tinc, Running tinc, Installing tinc, Top
|
||||
@node Configuring tinc, Running tinc, Installing tinc - installation, Top
|
||||
@chapter Configuring tinc
|
||||
|
||||
@menu
|
||||
|
@ -327,7 +590,6 @@ included in the source distribution.
|
|||
* Example::
|
||||
@end menu
|
||||
|
||||
|
||||
@c ==================================================================
|
||||
@node Multiple networks, How connections work, Configuring tinc, Configuring tinc
|
||||
@section Multiple networks
|
||||
|
@ -395,31 +657,67 @@ out, remember to replace it with at least one space character.
|
|||
@node Variables, , Configuration file, Configuration file
|
||||
@subsection Variables
|
||||
|
||||
Here are all valid variables, listed in alphabetical order:
|
||||
Here are all valid variables, listed in alphabetical order. The default
|
||||
value, required or optional is given between parentheses.
|
||||
|
||||
@c straight from the manpage
|
||||
@table @asis
|
||||
@item ConnectPort = port
|
||||
@item ConnectPort = <port> (655)
|
||||
Connect to the upstream host (given with the ConnectTo directive) on
|
||||
port port. port may be given in decimal (default), octal (when preceded
|
||||
by a single zero) or hexadecimal (prefixed with 0x). port is the port
|
||||
number for both the UDP and the TCP (meta) connections.
|
||||
|
||||
@item ConnectTo = (IP address|hostname)
|
||||
Specifies which host to connect to on startup. If the ConnectPort
|
||||
variable is omitted, then tinc will try to connect to port 655.
|
||||
@item ConnectTo = <IP address|hostname> (optional)
|
||||
Specifies which host to connect to on startup. Multiple ConnectTo variables
|
||||
may be specified, if connecting to the first one fails then tinc will try
|
||||
the next one, and so on. It is possible to specify hostnames for dynamic IP
|
||||
addresses (like those given on dyndns.org), tinc will not cache the resolved
|
||||
IP address.
|
||||
|
||||
If you don't specify a host with ConnectTo, regardless of whether a
|
||||
value for ConnectPort is given, tinc won't connect at all, and will
|
||||
instead just listen for incoming connections. Only the initiator of a
|
||||
tinc VPN should need this.
|
||||
instead just listen for incoming connections.
|
||||
|
||||
@item ListenPort = port
|
||||
@item Hostnames = <yes|no> (no)
|
||||
This option selects whether IP addresses (both real and on the VPN) should
|
||||
be resolved. Since DNS lookups are blocking, it might affect tinc's
|
||||
efficiency, even stopping the daemon for a few seconds everytime it does
|
||||
a lookup if your DNS server is not responding.
|
||||
|
||||
This does not affect resolving hostnames to IP addresses from the configuration
|
||||
file.
|
||||
|
||||
@item IndirectData = <yes|no> (no)
|
||||
This option specifies whether other tinc daemons besides the one you
|
||||
specified with ConnectTo can make a direct connection to you. This is
|
||||
especially useful if you are behind a firewall and it is impossible
|
||||
to make a connection from the outside to your tinc daemon. Otherwise,
|
||||
it is best to leave this option out or set it to no.
|
||||
|
||||
@item Interface = <device> (optional)
|
||||
If you have more than one network interface in your computer, tinc will by
|
||||
default listen on all of them for incoming connections. It is possible to
|
||||
bind tinc to a single interface like eth0 or ppp0 with this variable.
|
||||
|
||||
@item InterfaceIP = <local address> (optional)
|
||||
If your computer has more than one IP address on a single interface (for example
|
||||
if you are running virtual hosts), tinc will by default listen on all of them for
|
||||
incoming connections. It is possible to bind tinc to a single IP address with
|
||||
this variable. It is still possible to listen on several interfaces at the same
|
||||
time though, if they share the same IP address.
|
||||
|
||||
@item KeyExpire = <seconds> (3600)
|
||||
This option controls the time the encryption keys used to encrypt the data
|
||||
are valid. It is common practice to change keys at regular intervals to
|
||||
make it even harder for crackers, even though it is thought to be nearly
|
||||
impossible to crack a single key.
|
||||
|
||||
@item ListenPort = <port> (655)
|
||||
Listen on local port port. The computer connecting to this daemon should
|
||||
use this number as the argument for his ConnectPort. Again, the
|
||||
default is 655.
|
||||
use this number as the argument for his ConnectPort.
|
||||
|
||||
@item MyOwnVPNIP = local address[/maskbits]
|
||||
@item MyOwnVPNIP = <local address[/maskbits]> (required)
|
||||
The local address is the number that the daemon will propagate to
|
||||
other daemons on the network when it is identifying itself. Hence this
|
||||
will be the file name of the passphrase file that the other end expects
|
||||
|
@ -432,36 +730,45 @@ equal to the IP address (see the example).
|
|||
|
||||
maskbits is the number of bits set to 1 in the netmask part.
|
||||
|
||||
@item MyVirtualIP = local address[/maskbits]
|
||||
@item MyVirtualIP = <local address[/maskbits]>
|
||||
This is an alias for MyOwnVPNIP.
|
||||
|
||||
@item Passphrases = directory
|
||||
@item Passphrases = <directory> (/etc/tinc/NETNAME/passphrases)
|
||||
The directory where tinc will look for passphrases when someone tries to
|
||||
connect. Please see the manpage for genauth(8) for more information
|
||||
about passphrases as used by tinc.
|
||||
|
||||
@item PingTimeout = number
|
||||
@item PingTimeout = <seconds> (5)
|
||||
The number of seconds of inactivity that tinc will wait before sending a
|
||||
probe to the other end. If that other end doesn't answer within that
|
||||
same amount of seconds, the connection is terminated, and the others
|
||||
will be notified of this.
|
||||
|
||||
@item TapDevice = device
|
||||
@item TapDevice = <device> (/dev/tap0)
|
||||
The ethertap device to use. Note that you can only use one device per
|
||||
daemon. The info pages of the tinc package contain more information
|
||||
about configuring an ethertap device for Linux.
|
||||
|
||||
@item VpnMask = mask
|
||||
@item TCPonly = <yes|no> (no, experimental)
|
||||
If this variable is set to yes, then the packets are tunnelled over a TCP
|
||||
connection instead of a UDP connection. This is especially useful for those
|
||||
who want to run a tinc daemon from behind a masquerading firewall, or if
|
||||
UDP packet routing is disabled somehow. This is experimental code,
|
||||
try this at your own risk.
|
||||
|
||||
@item VpnMask = <mask> (optional)
|
||||
The mask that defines the scope of the entire VPN. This option is not used
|
||||
by the tinc daemon itself, but can be used by startup scripts to configure
|
||||
the ethertap devices correctly.
|
||||
@end table
|
||||
|
||||
|
||||
|
||||
@c ==================================================================
|
||||
@node Example, , Configuration file, Configuring tinc
|
||||
@section Example
|
||||
|
||||
|
||||
Imagine the following situation. An A-based company wants to connect
|
||||
three branch offices in B, C and D using the internet. All four offices
|
||||
have a 24/7 connection to the internet.
|
||||
|
@ -483,17 +790,19 @@ need to run tincd, but it must do a port forwarding of TCP&UDP on port
|
|||
655 (unless otherwise configured).
|
||||
|
||||
In this example, it is assumed that eth0 is the interface that points to
|
||||
the inner LAN of the office. This could be the same as the interface
|
||||
that leads to the internet.
|
||||
the inner LAN of the office, although this could also be the same as the
|
||||
interface that leads to the internet. The configuration of the real
|
||||
interface is also shown as a comment, to give you an idea of how these
|
||||
example host is set up.
|
||||
|
||||
@subsubheading For A
|
||||
|
||||
@emph{A} would be configured like this:
|
||||
|
||||
@example
|
||||
#ifconfig eth0 10.1.54.1 netmask 255.255.0.0 broadcast 10.1.255.255
|
||||
ifconfig tap0 hw ether fe:fd:0a:01:36:01
|
||||
ifconfig tap0 10.1.54.1 netmask 255.0.0.0
|
||||
ifconfig eth0 10.1.54.1 netmask 255.255.0.0 broadcast 10.1.255.255
|
||||
@end example
|
||||
|
||||
and in /etc/tinc/tinc.conf:
|
||||
|
@ -507,9 +816,9 @@ VpnMask = 255.0.0.0
|
|||
@subsubheading For B
|
||||
|
||||
@example
|
||||
#ifconfig eth0 10.2.43.8 netmask 255.255.0.0 broadcast 10.2.255.255
|
||||
ifconfig tap0 hw ether fe:fd:0a:02:01:0c
|
||||
ifconfig tap0 10.2.1.12 netmask 255.0.0.0
|
||||
ifconfig eth0 10.2.43.8 netmask 255.255.0.0 broadcast 10.2.255.255
|
||||
@end example
|
||||
|
||||
and in /etc/tinc/tinc.conf:
|
||||
|
@ -528,30 +837,33 @@ connect to this node.
|
|||
@subsubheading For C
|
||||
|
||||
@example
|
||||
#ifconfig eth0 10.3.69.254 netmask 255.255.0.0 broadcast 10.3.255.255
|
||||
ifconfig tap0 hw ether fe:fd:0a:03:45:fe
|
||||
ifconfig tap0 10.3.69.254 netmask 255.0.0.0
|
||||
ifconfig eth0 10.3.69.254 netmask 255.255.0.0 broadcast 10.3.255.255
|
||||
@end example
|
||||
|
||||
and in /etc/tinc/A/tinc.conf:
|
||||
|
||||
@example
|
||||
MyVirtualIP = 10.3.69.254/16
|
||||
TapDevice = /dev/tap1
|
||||
ConnectTo = 1.2.3.4
|
||||
ListenPort = 2000
|
||||
VpnMask = 255.0.0.0
|
||||
@end example
|
||||
|
||||
C already has another daemon that runs on port 655, so they have to
|
||||
reserve another port for tinc. They also use the netname to distinguish
|
||||
reserve another port for tinc. It can connect to other tinc daemons on
|
||||
the regular port though, so no ConnectPort variable is needed.
|
||||
They also use the netname to distinguish
|
||||
between the two. tinc is started with `tincd -n A'.
|
||||
|
||||
@subsubheading For D
|
||||
|
||||
@example
|
||||
#ifconfig tap0 10.4.3.32 netmask 255.255.0.0 broadcast 10.4.255.255
|
||||
ifconfig tap0 hw ether fe:fd:0a:04:03:20
|
||||
ifconfig tap0 10.4.3.32 netmask 255.0.0.0
|
||||
ifconfig tap0 10.4.3.32 netmask 255.255.0.0 broadcast 10.4.255.255
|
||||
@end example
|
||||
|
||||
and in /etc/tinc/tinc.conf:
|
||||
|
@ -564,7 +876,8 @@ VpnMask=255.0.0.0
|
|||
@end example
|
||||
|
||||
D will be connecting to C, which has a tincd running for this network on
|
||||
port 2000. Hence they need to put in a ConnectPort.
|
||||
port 2000. Hence they need to put in a ConnectPort, but it doesn't need
|
||||
to have a different ListenPort.
|
||||
|
||||
@subsubheading Authentication
|
||||
|
||||
|
@ -572,17 +885,17 @@ A, B, C and D all generate a passphrase with genauth 2048, the output is
|
|||
stored in /etc/tinc/passphrases/local, except for C, where it should be
|
||||
/etc/tinc/A/passphrases/local.
|
||||
|
||||
A stores a copy of B's passphrase in /etc/tinc/passphrases/10.2.0.0
|
||||
A stores a copy of B's passphrase in /etc/tinc/passphrases/10.2.1.12
|
||||
|
||||
A stores a copy of C's passphrase in /etc/tinc/passphrases/10.3.0.0
|
||||
A stores a copy of C's passphrase in /etc/tinc/passphrases/10.3.69.254
|
||||
|
||||
B stores a copy of A's passphrase in /etc/tinc/passphrases/10.1.0.0
|
||||
B stores a copy of A's passphrase in /etc/tinc/passphrases/10.1.54.1
|
||||
|
||||
C stores a copy of A's passphrase in /etc/tinc/A/passphrases/10.1.0.0
|
||||
C stores a copy of A's passphrase in /etc/tinc/A/passphrases/10.1.54.1
|
||||
|
||||
C stores a copy of D's passphrase in /etc/tinc/A/passphrases/10.4.0.0
|
||||
C stores a copy of D's passphrase in /etc/tinc/A/passphrases/10.4.3.32
|
||||
|
||||
D stores a copy of C's passphrase in /etc/tinc/passphrases/10.3.0.0
|
||||
D stores a copy of C's passphrase in /etc/tinc/passphrases/10.3.69.254
|
||||
|
||||
@subsubheading Starting
|
||||
|
||||
|
@ -810,16 +1123,47 @@ This chapter is a mixture of ideas, reasoning and explanation, please
|
|||
don't take it too serious.
|
||||
|
||||
@menu
|
||||
* Key Types::
|
||||
* Key Management::
|
||||
* Authentication::
|
||||
* Protection::
|
||||
@end menu
|
||||
|
||||
@c ==================================================================
|
||||
@node Key Types, Key Management, Security, Security
|
||||
@subsection Key Types
|
||||
@c FIXME: check if I'm not talking nonsense
|
||||
|
||||
There are several types of encryption keys. Tinc uses two of them,
|
||||
symmetric private keypairs and public/private keypairs.
|
||||
|
||||
Public/private keypairs are used in public key cryptography. It enables
|
||||
someone to send out a public key with which other people can encrypt their
|
||||
data. The encrypted data now can only be decrypted by the person who has
|
||||
the private key that matches the public key. So, a public key only allows
|
||||
@emph{other} people to send encrypted messages to you. This is very useful
|
||||
in setting up private communications channels. Just send out your public key
|
||||
and other people can talk to you in a secure way. But how can you know
|
||||
the other person is who he says he is?
|
||||
|
||||
For authentication itself tinc uses symmetric private keypairs, referred
|
||||
to as a passphrase. The identity of each tinc daemon is defined by it's
|
||||
passphrase (like you can be identified by your social security number).
|
||||
Every tinc daemon that is allowed to connect to you has a copy of your
|
||||
passphrase (hence symmetrical).
|
||||
|
||||
It would also be possible to use public/private keypairs for authentication,
|
||||
so that you could shout out your public key and don't need to keep it
|
||||
secret (like the passphrase you would have to send to someone else). Also,
|
||||
no one else has to know a private key from you.
|
||||
Both forms have their pros and cons, and at the moment tinc just uses passphrases
|
||||
(which are computationaly more efficient and perhaps in some way more
|
||||
secure).
|
||||
|
||||
@c ==================================================================
|
||||
@node Key Management, Authentication, Security, Security
|
||||
@node Key Management, Authentication, Key Types, Security
|
||||
@subsection Key Management
|
||||
@c FIXME: recheck
|
||||
@c FIXME change for the current protocol
|
||||
|
||||
@cindex Diffie-Hellman
|
||||
You can't just send a private encryption key to your peer, because
|
||||
|
@ -840,10 +1184,6 @@ mod p. This is then sent to B; while B computes g^b mod p, and transmits
|
|||
this to A, b being generated by B. Both a and b must be smaller than
|
||||
p-1.
|
||||
|
||||
These private keys are generated upon startup, and they are not changed
|
||||
while the connection exists. A possible feature in the future is to
|
||||
dynamically change the keys, every hour for example.
|
||||
|
||||
Both parties then calculate g^ab mod p = k. k is the new, shared, but
|
||||
still secret key.
|
||||
|
||||
|
@ -864,17 +1204,25 @@ system.
|
|||
We will let A transmit a passphrase that is also known to B encrypted
|
||||
with g^a, before A sends this to B. This way, B can check whether A is
|
||||
really A or just someone else.
|
||||
B will never receive the real passphrase though, because it was
|
||||
encrypted using public/private keypairs. This way there is no way an
|
||||
imposter could steal A's passphrase.
|
||||
|
||||
@cindex passphrase
|
||||
@c ehrmz... but we only use 1024 bits passphrases ourselves? [guus]
|
||||
This passphrase should be 2304 bits for a symmetric encryption
|
||||
system. But since an asymmetric system is more secure, we could do with
|
||||
2048 bits. This only holds if the passphrase is very random.
|
||||
|
||||
These passphrases could be stored in a file that is non-readable by
|
||||
anyone else but root; e.g. @file{/etc/vpn/passphrases}.
|
||||
anyone else but root; e.g. @file{/etc/tinc/passphrases} with UID 0
|
||||
and permissions mode 700.
|
||||
|
||||
The only thing that needs to be taken care of is how A announces its
|
||||
passphrase to B.
|
||||
The only thing that needs to be taken care of is how A can securely send
|
||||
a copy of it's passphrase to B if B doesn't have it yet. This could be
|
||||
done via mail with PGP, but you should be really convinced of the
|
||||
identity of the person who owns the email address you are sending this to.
|
||||
Swapping floppy disks in real life might be the best way to do this!
|
||||
|
||||
|
||||
@c ==================================================================
|
||||
|
@ -884,6 +1232,7 @@ passphrase to B.
|
|||
Now we have securely hidden our data. But a malicious cracker may still
|
||||
bother you by randomly altering the encrypted data he intercepts.
|
||||
|
||||
@c FIXME what the hell is this all about? remove? IT
|
||||
|
||||
@c ==================================================================
|
||||
@node About us, Concept Index, Technical information, Top
|
||||
|
|
|
@ -1,8 +1,9 @@
|
|||
## Process this file with automake to produce Makefile.in
|
||||
# $Id: Makefile.am,v 1.3 2000/10/18 20:12:07 zarq Exp $
|
||||
|
||||
noinst_LIBRARIES = libvpn.a
|
||||
|
||||
INCLUDES = -I. -I$(top_builddir)
|
||||
INCLUDES = -I. -I$(top_builddir) -I$(top_srcdir)/intl
|
||||
|
||||
libvpn_a_SOURCES = xmalloc.c pidfile.c utils.c getopt.c getopt1.c
|
||||
|
||||
|
|
54
lib/utils.c
54
lib/utils.c
|
@ -1,6 +1,7 @@
|
|||
/*
|
||||
utils.c -- gathering of some stupid small functions
|
||||
Copyright (C) 1999 Ivo Timmermans <zarq@iname.com>
|
||||
Copyright (C) 1999,2000 Ivo Timmermans <zarq@iname.com>
|
||||
2000 Guus Sliepen <guus@sliepen.warande.net>
|
||||
|
||||
This program is free software; you can redistribute it and/or modify
|
||||
it under the terms of the GNU General Public License as published by
|
||||
|
@ -17,10 +18,57 @@
|
|||
Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
|
||||
*/
|
||||
|
||||
#include <sys/types.h>
|
||||
#include <ctype.h>
|
||||
#include <string.h>
|
||||
|
||||
#include "config.h"
|
||||
|
||||
#include <utils.h>
|
||||
#include <syslog.h>
|
||||
|
||||
volatile int cp_line;
|
||||
volatile char *cp_file;
|
||||
volatile int (cp_line[]) = {0, 0, 0, 0, 0, 0, 0, 0};
|
||||
volatile char (*cp_file[]) = {"?", "?", "?", "?", "?", "?", "?", "?"};
|
||||
volatile int cp_index = 0;
|
||||
|
||||
char *hexadecimals = "0123456789ABCDEF";
|
||||
|
||||
int charhex2bin(char c)
|
||||
{
|
||||
if(isdigit(c))
|
||||
return c - '0';
|
||||
else
|
||||
return toupper(c) - 'A' + 10;
|
||||
}
|
||||
|
||||
|
||||
void hex2bin(char *src, char *dst, int length)
|
||||
{
|
||||
int i;
|
||||
for(i=0; i<length; i++)
|
||||
dst[i] = charhex2bin(src[i*2])*16 + charhex2bin(src[i*2+1]);
|
||||
}
|
||||
|
||||
void bin2hex(char *src, char *dst, int length)
|
||||
{
|
||||
int i;
|
||||
for(i=length-1; i>=0; i--)
|
||||
{
|
||||
dst[i*2+1] = hexadecimals[(unsigned char)src[i] & 15];
|
||||
dst[i*2] = hexadecimals[(unsigned char)src[i]>>4];
|
||||
}
|
||||
}
|
||||
|
||||
char *cp_trace()
|
||||
{
|
||||
syslog(LOG_DEBUG, "Checkpoint trace: %s:%d <- %s:%d <- %s:%d <- %s:%d <- %s:%d <- %s:%d <- %s:%d <- %s:%d ...",
|
||||
cp_file[(cp_index+7)%8], cp_line[(cp_index+7)%8],
|
||||
cp_file[(cp_index+6)%8], cp_line[(cp_index+6)%8],
|
||||
cp_file[(cp_index+5)%8], cp_line[(cp_index+5)%8],
|
||||
cp_file[(cp_index+4)%8], cp_line[(cp_index+4)%8],
|
||||
cp_file[(cp_index+3)%8], cp_line[(cp_index+3)%8],
|
||||
cp_file[(cp_index+2)%8], cp_line[(cp_index+2)%8],
|
||||
cp_file[(cp_index+1)%8], cp_line[(cp_index+1)%8],
|
||||
cp_file[cp_index], cp_line[cp_index]
|
||||
);
|
||||
}
|
||||
|
|
25
lib/utils.h
25
lib/utils.h
|
@ -1,6 +1,7 @@
|
|||
/*
|
||||
utils.h -- header file for utils.c
|
||||
Copyright (C) 1999 Ivo Timmermans <zarq@iname.com>
|
||||
Copyright (C) 1999,2000 Ivo Timmermans <zarq@iname.com>
|
||||
2000 Guus Sliepen <guus@sliepen.warande.net>
|
||||
|
||||
This program is free software; you can redistribute it and/or modify
|
||||
it under the terms of the GNU General Public License as published by
|
||||
|
@ -20,11 +21,27 @@
|
|||
#ifndef __TINC_UTILS_H__
|
||||
#define __TINC_UTILS_H__
|
||||
|
||||
#include <ctype.h>
|
||||
|
||||
enum {
|
||||
DEBUG_CONNECTIONS = 0,
|
||||
DEBUG_PROTOCOL,
|
||||
DEBUG_STATUS,
|
||||
DEBUG_ERROR,
|
||||
DEBUG_META
|
||||
};
|
||||
|
||||
#define min(a,b) (((a)<(b))?(a):(b))
|
||||
|
||||
#define cp { cp_line = __LINE__; cp_file = __FILE__; }
|
||||
extern volatile int cp_line[];
|
||||
extern volatile char *cp_file[];
|
||||
extern volatile int cp_index;
|
||||
|
||||
extern volatile int cp_line;
|
||||
extern volatile char *cp_file;
|
||||
#define cp { cp_line[cp_index] = __LINE__; cp_file[cp_index] = __FILE__; cp_index++; cp_index %= 8; }
|
||||
#define ecp { fprintf(stderr, "Explicit checkpoint in %s line %d\n", __FILE__, __LINE__); }
|
||||
|
||||
extern void hex2bin(char *src, char *dst, int length);
|
||||
extern void bin2hex(char *src, char *dst, int length);
|
||||
extern char *cp_trace(void);
|
||||
|
||||
#endif /* __TINC_UTILS_H__ */
|
||||
|
|
|
@ -1,3 +1,5 @@
|
|||
#include <sys/types.h>
|
||||
|
||||
#ifndef PARAMS
|
||||
# if defined PROTOTYPES || (defined __STDC__ && __STDC__)
|
||||
# define PARAMS(Args) Args
|
||||
|
|
|
@ -87,8 +87,6 @@ xmalloc (n)
|
|||
size_t n;
|
||||
{
|
||||
void *p;
|
||||
extern char*cp_file;
|
||||
extern int cp_line;
|
||||
|
||||
p = malloc (n);
|
||||
if (p == 0)
|
||||
|
|
|
@ -4,10 +4,12 @@
|
|||
# Package source files
|
||||
|
||||
lib/pidfile.c
|
||||
lib/utils.c
|
||||
src/conf.c
|
||||
src/encr.c
|
||||
src/genauth.c
|
||||
src/meta.c
|
||||
src/net.c
|
||||
src/netutl.c
|
||||
src/protocol.c
|
||||
src/subnet.c
|
||||
src/tincd.c
|
||||
|
|
|
@ -1,6 +1,6 @@
|
|||
Summary: tinc Virtual Private Network daemon
|
||||
Name: tinc
|
||||
Version: 1.0pre2
|
||||
Version: 1.0pre3
|
||||
Release: 1
|
||||
Copyright: GPL
|
||||
Group: System Environment/Daemons
|
||||
|
|
|
@ -1,17 +1,18 @@
|
|||
## Produce this file with automake to get Makefile.in
|
||||
# $Id: Makefile.am,v 1.5 2000/10/18 20:12:08 zarq Exp $
|
||||
|
||||
sbin_PROGRAMS = tincd genauth
|
||||
|
||||
genauth_SOURCES = genauth.c
|
||||
tincd_SOURCES = conf.c encr.c net.c netutl.c protocol.c tincd.c
|
||||
tincd_SOURCES = conf.c connlist.c meta.c net.c netutl.c protocol.c subnet.c tincd.c
|
||||
|
||||
INCLUDES = -I$(top_builddir) -I$(top_srcdir)/cipher -I$(top_srcdir)/lib
|
||||
INCLUDES = -I$(top_builddir) -I$(top_srcdir)/cipher -I$(top_srcdir)/lib -I$(top_srcdir)/intl
|
||||
|
||||
noinst_HEADERS = conf.h encr.h net.h netutl.h protocol.h
|
||||
noinst_HEADERS = conf.h connlist.h meta.h net.h netutl.h protocol.h subnet.h
|
||||
|
||||
LIBS = @LIBS@
|
||||
LIBS = @LIBS@ @INTLLIBS@
|
||||
|
||||
tincd_LDADD = $(top_builddir)/cipher/libcipher.la \
|
||||
tincd_LDADD = \
|
||||
$(top_builddir)/lib/libvpn.a
|
||||
|
||||
genauth_LDADD = $(top_builddir)/lib/libvpn.a
|
||||
|
|
204
src/conf.c
204
src/conf.c
|
@ -19,52 +19,63 @@
|
|||
along with this program; if not, write to the Free Software
|
||||
Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
|
||||
|
||||
$Id: conf.c,v 1.9 2000/05/30 11:18:12 zarq Exp $
|
||||
$Id: conf.c,v 1.10 2000/10/18 20:12:08 zarq Exp $
|
||||
*/
|
||||
|
||||
|
||||
#include "config.h"
|
||||
|
||||
#include <ctype.h>
|
||||
#include <errno.h>
|
||||
#include <netdb.h>
|
||||
#include <stdio.h>
|
||||
#include <stdlib.h>
|
||||
#include <string.h>
|
||||
#include <syslog.h>
|
||||
|
||||
#include <xalloc.h>
|
||||
|
||||
#include "conf.h"
|
||||
#include "netutl.h" /* for strtoip */
|
||||
#include <utils.h> /* for cp */
|
||||
|
||||
#include "config.h"
|
||||
#include "connlist.h"
|
||||
#include "system.h"
|
||||
|
||||
config_t *config;
|
||||
config_t *config = NULL;
|
||||
int debug_lvl = 0;
|
||||
int timeout = 0; /* seconds before timeout */
|
||||
char *confbase = NULL; /* directory in which all config files are */
|
||||
char *netname = NULL; /* name of the vpn network */
|
||||
|
||||
typedef struct internal_config_t {
|
||||
char *name;
|
||||
enum which_t which;
|
||||
int argtype;
|
||||
} internal_config_t;
|
||||
/* Will be set if HUP signal is received. It will be processed when it is safe. */
|
||||
int sighup = 0;
|
||||
|
||||
/*
|
||||
These are all the possible configurable values
|
||||
*/
|
||||
static internal_config_t hazahaza[] = {
|
||||
{ "AllowConnect", allowconnect, TYPE_BOOL }, /* Is not used anywhere. Remove? */
|
||||
{ "ConnectTo", upstreamip, TYPE_IP },
|
||||
{ "ConnectPort", upstreamport, TYPE_INT },
|
||||
{ "ListenPort", listenport, TYPE_INT },
|
||||
{ "MyOwnVPNIP", myvpnip, TYPE_IP },
|
||||
{ "MyVirtualIP", myvpnip, TYPE_IP }, /* an alias */
|
||||
{ "Passphrases", passphrasesdir, TYPE_NAME },
|
||||
/* Main configuration file keywords */
|
||||
{ "Name", tincname, TYPE_NAME },
|
||||
{ "ConnectTo", connectto, TYPE_NAME },
|
||||
{ "PingTimeout", pingtimeout, TYPE_INT },
|
||||
{ "TapDevice", tapdevice, TYPE_NAME },
|
||||
{ "TapSubnet", tapsubnet, TYPE_IP },
|
||||
{ "PrivateKey", privatekey, TYPE_NAME },
|
||||
{ "KeyExpire", keyexpire, TYPE_INT },
|
||||
{ "VpnMask", vpnmask, TYPE_IP },
|
||||
{ "Hostnames", resolve_dns, TYPE_BOOL },
|
||||
{ "Interface", interface, TYPE_NAME },
|
||||
{ "InterfaceIP", interfaceip, TYPE_IP },
|
||||
/* Host configuration file keywords */
|
||||
{ "Address", address, TYPE_NAME },
|
||||
{ "Port", port, TYPE_INT },
|
||||
{ "PublicKey", publickey, TYPE_NAME },
|
||||
{ "Subnet", subnet, TYPE_NAME },
|
||||
{ "RestrictHosts", restricthosts, TYPE_BOOL },
|
||||
{ "RestrictSubnets", restrictsubnets, TYPE_BOOL },
|
||||
{ "RestrictAddress", restrictaddress, TYPE_BOOL },
|
||||
{ "RestrictPort", restrictport, TYPE_BOOL },
|
||||
{ "IndirectData", indirectdata, TYPE_BOOL },
|
||||
{ "TCPonly", tcponly, TYPE_BOOL },
|
||||
{ NULL, 0, 0 }
|
||||
};
|
||||
|
||||
|
@ -74,12 +85,12 @@ static internal_config_t hazahaza[] = {
|
|||
config_t *
|
||||
add_config_val(config_t **cfg, int argtype, char *val)
|
||||
{
|
||||
config_t *p;
|
||||
config_t *p, *r;
|
||||
char *q;
|
||||
|
||||
cp
|
||||
p = (config_t*)xmalloc(sizeof(*p));
|
||||
p->data.val = 0;
|
||||
|
||||
|
||||
switch(argtype)
|
||||
{
|
||||
case TYPE_INT:
|
||||
|
@ -103,46 +114,57 @@ add_config_val(config_t **cfg, int argtype, char *val)
|
|||
p->data.val = 0;
|
||||
}
|
||||
|
||||
p->argtype = argtype;
|
||||
|
||||
if(p->data.val)
|
||||
{
|
||||
p->next = *cfg;
|
||||
*cfg = p;
|
||||
cp
|
||||
return p;
|
||||
}
|
||||
|
||||
free(p);
|
||||
return NULL;
|
||||
else
|
||||
{
|
||||
free(p);
|
||||
cp
|
||||
return NULL;
|
||||
}
|
||||
}
|
||||
|
||||
/*
|
||||
Get variable from a section in a configfile. returns -1 on failure.
|
||||
Parse a configuration file and put the results in the configuration tree
|
||||
starting at *base.
|
||||
*/
|
||||
int
|
||||
readconfig(const char *fname, FILE *fp)
|
||||
int read_config_file(config_t **base, const char *fname)
|
||||
{
|
||||
char *line, *temp_buf;
|
||||
int err = -1;
|
||||
FILE *fp;
|
||||
char line[MAXBUFSIZE]; /* There really should not be any line longer than this... */
|
||||
char *p, *q;
|
||||
int i, lineno = 0;
|
||||
config_t *cfg;
|
||||
cp
|
||||
if((fp = fopen (fname, "r")) == NULL)
|
||||
{
|
||||
return -1;
|
||||
}
|
||||
|
||||
line = (char *)xmalloc(80 * sizeof(char));
|
||||
temp_buf = (char *)xmalloc(80 * sizeof(char));
|
||||
|
||||
for(;;)
|
||||
{
|
||||
if(fgets(line, 80, fp) == NULL)
|
||||
return 0;
|
||||
|
||||
while(!index(line, '\n'))
|
||||
if(fgets(line, MAXBUFSIZE, fp) == NULL)
|
||||
{
|
||||
fgets(temp_buf, (strlen(line)+1) * 80, fp);
|
||||
if(!temp_buf)
|
||||
break;
|
||||
strcat(line, temp_buf);
|
||||
line = (char *)xrealloc(line, (strlen(line)+1) * sizeof(char));
|
||||
}
|
||||
err = 0;
|
||||
break;
|
||||
}
|
||||
|
||||
lineno++;
|
||||
|
||||
if(!index(line, '\n'))
|
||||
{
|
||||
syslog(LOG_ERR, _("Line %d too long while reading config file %s"), lineno, fname);
|
||||
break;
|
||||
}
|
||||
|
||||
if((p = strtok(line, "\t\n\r =")) == NULL)
|
||||
continue; /* no tokens on this line */
|
||||
|
||||
|
@ -155,66 +177,92 @@ readconfig(const char *fname, FILE *fp)
|
|||
|
||||
if(!hazahaza[i].name)
|
||||
{
|
||||
fprintf(stderr, _("%s: %d: Invalid variable name `%s'.\n"),
|
||||
fname, lineno, p);
|
||||
return -1;
|
||||
syslog(LOG_ERR, _("Invalid variable name on line %d while reading config file %s"),
|
||||
lineno, fname);
|
||||
break;
|
||||
}
|
||||
|
||||
if(((q = strtok(NULL, "\t\n\r =")) == NULL) || q[0] == '#')
|
||||
{
|
||||
fprintf(stderr, _("%s: %d: No value given for `%s'.\n"),
|
||||
fname, lineno, hazahaza[i].name);
|
||||
return -1;
|
||||
fprintf(stderr, _("No value for variable on line %d while reading config file %s"),
|
||||
lineno, fname);
|
||||
break;
|
||||
}
|
||||
|
||||
cfg = add_config_val(&config, hazahaza[i].argtype, q);
|
||||
cfg = add_config_val(base, hazahaza[i].argtype, q);
|
||||
if(cfg == NULL)
|
||||
{
|
||||
fprintf(stderr, _("%s: %d: Invalid value `%s' for variable `%s'.\n"),
|
||||
fname, lineno, q, hazahaza[i].name);
|
||||
return -1;
|
||||
fprintf(stderr, _("Invalid value for variable on line %d while reading config file %s"),
|
||||
lineno, fname);
|
||||
break;
|
||||
}
|
||||
|
||||
cfg->which = hazahaza[i].which;
|
||||
if(!config)
|
||||
config = cfg;
|
||||
}
|
||||
}
|
||||
|
||||
/*
|
||||
wrapper function for readconfig
|
||||
*/
|
||||
int
|
||||
read_config_file(const char *fname)
|
||||
{
|
||||
FILE *fp;
|
||||
|
||||
if((fp = fopen (fname, "r")) == NULL)
|
||||
{
|
||||
fprintf(stderr, _("Could not open %s: %s\n"), fname, sys_errlist[errno]);
|
||||
return 1;
|
||||
}
|
||||
|
||||
if(readconfig(fname, fp))
|
||||
return -1;
|
||||
|
||||
fclose (fp);
|
||||
cp
|
||||
return err;
|
||||
}
|
||||
|
||||
return 0;
|
||||
int read_server_config()
|
||||
{
|
||||
char *fname;
|
||||
int x;
|
||||
cp
|
||||
asprintf(&fname, "%s/tinc.conf", confbase);
|
||||
x = read_config_file(&config, fname);
|
||||
free(fname);
|
||||
cp
|
||||
return x;
|
||||
}
|
||||
|
||||
/*
|
||||
Look up the value of the config option type
|
||||
*/
|
||||
const config_t *
|
||||
get_config_val(which_t type)
|
||||
const config_t *get_config_val(config_t *p, which_t type)
|
||||
{
|
||||
config_t *p;
|
||||
|
||||
for(p = config; p != NULL; p = p->next)
|
||||
cp
|
||||
for(; p != NULL; p = p->next)
|
||||
if(p->which == type)
|
||||
return p;
|
||||
|
||||
/* Not found */
|
||||
return NULL;
|
||||
break;
|
||||
cp
|
||||
return p;
|
||||
}
|
||||
|
||||
/*
|
||||
Support for multiple config lines.
|
||||
Index is used to get a specific value, 0 being the first, 1 the second etc.
|
||||
*/
|
||||
const config_t *get_next_config_val(config_t *p, which_t type, int index)
|
||||
{
|
||||
cp
|
||||
for(; p != NULL; p = p->next)
|
||||
if(p->which == type)
|
||||
if(--index < 0)
|
||||
break;
|
||||
cp
|
||||
return p;
|
||||
}
|
||||
|
||||
/*
|
||||
Remove the complete configuration tree.
|
||||
*/
|
||||
void clear_config(config_t **base)
|
||||
{
|
||||
config_t *p, *next;
|
||||
cp
|
||||
for(p = *base; p != NULL; p = next)
|
||||
{
|
||||
next = p->next;
|
||||
if(p->data.ptr && (p->argtype == TYPE_NAME))
|
||||
{
|
||||
free(p->data.ptr);
|
||||
}
|
||||
free(p);
|
||||
}
|
||||
*base = NULL;
|
||||
cp
|
||||
}
|
||||
|
|
62
src/conf.h
62
src/conf.h
|
@ -17,43 +17,60 @@
|
|||
along with this program; if not, write to the Free Software
|
||||
Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
|
||||
|
||||
$Id: conf.h,v 1.6 2000/05/30 11:18:12 zarq Exp $
|
||||
$Id: conf.h,v 1.7 2000/10/18 20:12:08 zarq Exp $
|
||||
*/
|
||||
|
||||
#ifndef __TINC_CONF_H__
|
||||
#define __TINC_CONF_H__
|
||||
|
||||
#define MAXTIMEOUT 900 /* Maximum timeout value for retries. Should this be a configuration option? */
|
||||
|
||||
typedef struct ip_mask_t {
|
||||
unsigned long ip;
|
||||
unsigned long mask;
|
||||
} ip_mask_t;
|
||||
|
||||
typedef union data_t {
|
||||
unsigned long val;
|
||||
void *ptr;
|
||||
ip_mask_t *ip;
|
||||
} data_t;
|
||||
|
||||
typedef enum which_t {
|
||||
passphrasesdir = 1,
|
||||
upstreamip,
|
||||
upstreamport,
|
||||
listenport,
|
||||
myvpnip,
|
||||
tapdevice,
|
||||
allowconnect,
|
||||
tincname = 1,
|
||||
connectto,
|
||||
pingtimeout,
|
||||
tapdevice,
|
||||
tapsubnet,
|
||||
privatekey,
|
||||
keyexpire,
|
||||
vpnmask,
|
||||
resolve_dns
|
||||
resolve_dns,
|
||||
interface,
|
||||
interfaceip,
|
||||
address,
|
||||
port,
|
||||
publickey,
|
||||
subnet,
|
||||
restricthosts,
|
||||
restrictsubnets,
|
||||
restrictaddress,
|
||||
restrictport,
|
||||
indirectdata,
|
||||
tcponly,
|
||||
} which_t;
|
||||
|
||||
typedef struct config_t {
|
||||
struct config_t *next;
|
||||
which_t which;
|
||||
data_t data;
|
||||
int argtype;
|
||||
union data {
|
||||
unsigned long val;
|
||||
void *ptr;
|
||||
ip_mask_t *ip;
|
||||
struct config_t *next; /* For nested configs! */
|
||||
} data;
|
||||
} config_t;
|
||||
|
||||
typedef struct internal_config_t {
|
||||
char *name;
|
||||
enum which_t which;
|
||||
int argtype;
|
||||
} internal_config_t;
|
||||
|
||||
enum {
|
||||
stupid_false = 1,
|
||||
stupid_true
|
||||
|
@ -69,9 +86,16 @@ enum {
|
|||
extern config_t *config;
|
||||
extern int debug_lvl;
|
||||
extern int timeout;
|
||||
extern int upstreamindex;
|
||||
extern int sighup;
|
||||
extern char *confbase;
|
||||
extern char *netname;
|
||||
|
||||
extern config_t *add_config_val(config_t **, int, char *);
|
||||
extern int read_config_file(const char *);
|
||||
extern const config_t *get_config_val(which_t type);
|
||||
extern int read_config_file(config_t **, const char *);
|
||||
extern const config_t *get_config_val(config_t *, which_t type);
|
||||
extern const config_t *get_next_config_val(config_t *, which_t type, int);
|
||||
extern void clear_config();
|
||||
extern int read_server_config(void);
|
||||
|
||||
#endif /* __TINC_CONF_H__ */
|
||||
|
|
44
src/encr.c
44
src/encr.c
|
@ -17,7 +17,7 @@
|
|||
along with this program; if not, write to the Free Software
|
||||
Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
|
||||
|
||||
$Id: encr.c,v 1.12 2000/05/31 18:23:06 zarq Exp $
|
||||
$Id: encr.c,v 1.13 2000/10/18 20:12:08 zarq Exp $
|
||||
*/
|
||||
|
||||
#include "config.h"
|
||||
|
@ -61,8 +61,8 @@ int key_inited = 0, encryption_keylen;
|
|||
mpz_t my_private_key, my_public_key, generator, shared_prime;
|
||||
int my_key_expiry = (time_t)(-1);
|
||||
|
||||
static char* mypassphrase;
|
||||
static int mypassphraselen;
|
||||
char* mypassphrase;
|
||||
int mypassphraselen;
|
||||
|
||||
int char_hex_to_bin(int c)
|
||||
{
|
||||
|
@ -98,18 +98,17 @@ int read_passphrase(char *which, char **out)
|
|||
cp
|
||||
if((cfg = get_config_val(passphrasesdir)) == NULL)
|
||||
{
|
||||
filename = xmalloc(strlen(confbase)+13+strlen(which));
|
||||
sprintf(filename, "%spassphrases/%s", confbase, which);
|
||||
asprintf(&filename, "%spassphrases/%s", confbase, which);
|
||||
}
|
||||
else
|
||||
{
|
||||
filename = xmalloc(strlen(cfg->data.ptr)+2+strlen(which));
|
||||
sprintf(filename, "%s/%s", (char*)cfg->data.ptr, which);
|
||||
asprintf(&filename, "%s/%s", (char*)cfg->data.ptr, which);
|
||||
}
|
||||
|
||||
if((f = fopen(filename, "rb")) == NULL)
|
||||
{
|
||||
syslog(LOG_ERR, _("Could not open %s: %m"), filename);
|
||||
if(debug_lvl > 1)
|
||||
syslog(LOG_ERR, _("Could not open %s: %m"), filename);
|
||||
return -1;
|
||||
}
|
||||
|
||||
|
@ -119,12 +118,14 @@ cp
|
|||
syslog(LOG_ERR, _("Illegal passphrase in %s; size would be %d"), filename, size);
|
||||
return -1;
|
||||
}
|
||||
size >>= 2; /* bits->nibbles */
|
||||
pp = xmalloc(size+2);
|
||||
fgets(pp, size+1, f);
|
||||
|
||||
/* Hmz... hackish... strange +1 and +2 stuff... I really like more comments on those alignment thingies! */
|
||||
|
||||
pp = xmalloc(size/4 + 1); /* Allocate enough for fgets */
|
||||
fgets(pp, size/4 + 1, f); /* Read passhrase and reserve one byte for end-of-string */
|
||||
fclose(f);
|
||||
|
||||
*out = xmalloc(size);
|
||||
*out = xmalloc(size/8 + 2); /* Allocate enough bytes, +1 for rounding if bits%8 != 0, +1 for 2-byte alignment */
|
||||
cp
|
||||
return str_hex_to_bin(*out, pp);
|
||||
}
|
||||
|
@ -150,7 +151,8 @@ cp
|
|||
else
|
||||
my_key_expiry = (time_t)(time(NULL) + cfg->data.val);
|
||||
|
||||
syslog(LOG_NOTICE, _("Generating %d bits keys."), PRIVATE_KEY_BITS);
|
||||
if(debug_lvl > 1)
|
||||
syslog(LOG_NOTICE, _("Generating %d bits keys"), PRIVATE_KEY_BITS);
|
||||
|
||||
if((f = fopen("/dev/urandom", "r")) == NULL)
|
||||
{
|
||||
|
@ -266,7 +268,7 @@ int verify_passphrase(conn_list_t *cl, unsigned char *his_pubkey)
|
|||
mpz_t pk;
|
||||
unsigned char *out;
|
||||
BF_KEY bf_key;
|
||||
char which[sizeof("123.123.123.123")+1];
|
||||
char *which;
|
||||
char *meuk;
|
||||
cp
|
||||
mpz_init_set_str(pk, his_pubkey, 36);
|
||||
|
@ -280,7 +282,7 @@ cp
|
|||
if(key_inited)
|
||||
cipher_set_key(&encryption_key, encryption_keylen, text_key);
|
||||
|
||||
sprintf(which, IP_ADDR_S, IP_ADDR_V(cl->vpn_ip));
|
||||
asprintf(&which, IP_ADDR_S, IP_ADDR_V(cl->vpn_ip));
|
||||
if((pplen = read_passphrase(which, &meuk)) < 0)
|
||||
return -1;
|
||||
|
||||
|
@ -335,12 +337,12 @@ cp
|
|||
/* We haven't received a key from this host (yet). */
|
||||
continue;
|
||||
ek = make_shared_key(p->public_key->key);
|
||||
free_key(p->key);
|
||||
p->key = xmalloc(sizeof(*p->key));
|
||||
p->key->length = strlen(ek);
|
||||
p->key->expiry = p->public_key->expiry;
|
||||
p->key->key = xmalloc(strlen(ek) + 1);
|
||||
strcpy(p->key->key, ek);
|
||||
free_key(p->datakey);
|
||||
p->datakey = xmalloc(sizeof(*p->datakey));
|
||||
p->datakey->length = strlen(ek);
|
||||
p->datakey->expiry = p->public_key->expiry;
|
||||
p->datakey->key = xmalloc(strlen(ek) + 1);
|
||||
strcpy(p->datakey->key, ek);
|
||||
}
|
||||
cp
|
||||
}
|
||||
|
|
|
@ -15,6 +15,8 @@
|
|||
You should have received a copy of the GNU General Public License
|
||||
along with this program; if not, write to the Free Software
|
||||
Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
|
||||
|
||||
$Id: encr.h,v 1.3 2000/10/18 20:12:08 zarq Exp $
|
||||
*/
|
||||
|
||||
#ifndef __TINC_ENCR_H__
|
||||
|
@ -30,9 +32,6 @@ extern int my_key_expiry;
|
|||
|
||||
extern int security_init(void);
|
||||
|
||||
extern void do_bf_encrypt(vpn_packet_t *, real_packet_t *);
|
||||
extern void do_bf_decrypt(real_packet_t *, vpn_packet_t *);
|
||||
|
||||
extern int send_portnumbers(int);
|
||||
extern void set_shared_key(char *);
|
||||
extern int send_passphrase(conn_list_t *);
|
||||
|
|
|
@ -1,6 +1,7 @@
|
|||
/*
|
||||
genauth.c -- generate a random passphrase
|
||||
genauth.c -- generate public/private keypairs
|
||||
Copyright (C) 1998,1999,2000 Ivo Timmermans <zarq@iname.com>
|
||||
2000 Guus Sliepen <guus@sliepen.warande.net>
|
||||
|
||||
This program is free software; you can redistribute it and/or modify
|
||||
it under the terms of the GNU General Public License as published by
|
||||
|
@ -16,7 +17,7 @@
|
|||
along with this program; if not, write to the Free Software
|
||||
Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
|
||||
|
||||
$Id: genauth.c,v 1.7 2000/05/31 18:21:27 zarq Exp $
|
||||
$Id: genauth.c,v 1.8 2000/10/18 20:12:08 zarq Exp $
|
||||
*/
|
||||
|
||||
#include "config.h"
|
||||
|
@ -24,20 +25,49 @@
|
|||
#include <stdio.h>
|
||||
#include <stdlib.h>
|
||||
#include <time.h>
|
||||
#include <openssl/rsa.h>
|
||||
|
||||
#include <xalloc.h>
|
||||
|
||||
#include "encr.h"
|
||||
|
||||
#include "system.h"
|
||||
|
||||
unsigned char initvec[] = { 0x22, 0x7b, 0xad, 0x55, 0x41, 0xf4, 0x3e, 0xf3 };
|
||||
#define RSA_PUBLIC_EXPONENT 65535
|
||||
|
||||
void indicator(int a, int b, void *p)
|
||||
{
|
||||
switch(a)
|
||||
{
|
||||
case 0:
|
||||
fprintf(stderr, ".");
|
||||
break;
|
||||
case 1:
|
||||
fprintf(stderr, "+");
|
||||
break;
|
||||
case 2:
|
||||
fprintf(stderr, "-");
|
||||
break;
|
||||
case 3:
|
||||
switch(b)
|
||||
{
|
||||
case 0:
|
||||
fprintf(stderr, " p\n");
|
||||
break;
|
||||
case 1:
|
||||
fprintf(stderr, " q\n");
|
||||
break;
|
||||
default:
|
||||
fprintf(stderr, "?");
|
||||
}
|
||||
break;
|
||||
default:
|
||||
fprintf(stderr, "?");
|
||||
}
|
||||
}
|
||||
|
||||
int main(int argc, char **argv)
|
||||
{
|
||||
FILE *fp;
|
||||
int bits, c, i, bytes;
|
||||
unsigned char *p;
|
||||
int bits;
|
||||
RSA *key;
|
||||
|
||||
setlocale (LC_ALL, "");
|
||||
bindtextdomain (PACKAGE, LOCALEDIR);
|
||||
|
@ -51,54 +81,25 @@ int main(int argc, char **argv)
|
|||
|
||||
if(!argv[1])
|
||||
argv[1] = "1024";
|
||||
|
||||
if(!(bits = atol(argv[1])))
|
||||
|
||||
bits = atol(argv[1]);
|
||||
|
||||
if(bits<32)
|
||||
{
|
||||
fprintf(stderr, _("Illegal number: %s\n"), argv[1]);
|
||||
return 1;
|
||||
}
|
||||
|
||||
bits = ((bits - 1) | 7) + 1; /* Align to bytes for easy mallocing and reading */
|
||||
|
||||
bits = ((bits - 1) | 63) + 1;
|
||||
fprintf(stderr, _("Generating %d bits number"), bits);
|
||||
bytes = bits >> 3;
|
||||
fprintf(stderr, _("Generating %d bits keys:\n"), bits);
|
||||
|
||||
if((fp = fopen("/dev/urandom", "r")) == NULL)
|
||||
{
|
||||
perror(_("Opening /dev/urandom"));
|
||||
return 1;
|
||||
}
|
||||
key = RSA_generate_key(bits, RSA_PUBLIC_EXPONENT, indicator, NULL);
|
||||
|
||||
p = xmalloc(bytes);
|
||||
fprintf(stderr, _("Done.\n"));
|
||||
|
||||
setbuf(stdout, NULL);
|
||||
for(i = 0; i < bytes; i++)
|
||||
{
|
||||
c = fgetc(fp);
|
||||
if(feof(fp))
|
||||
{
|
||||
puts("");
|
||||
fprintf(stderr, _("File was empty!\n"));
|
||||
}
|
||||
p[i] = c;
|
||||
}
|
||||
fclose(fp);
|
||||
|
||||
if(isatty(1))
|
||||
{
|
||||
fprintf(stderr, _(": done.\nThe following line should be ENTIRELY copied into a passphrase file:\n"));
|
||||
printf("%d ", bits);
|
||||
for(i = 0; i < bytes; i++)
|
||||
printf("%02x", p[i]);
|
||||
puts("");
|
||||
}
|
||||
else
|
||||
{
|
||||
printf("%d ", bits);
|
||||
for(i = 0; i < bytes; i++)
|
||||
printf("%02x", p[i]);
|
||||
puts("");
|
||||
fprintf(stderr, _(": done.\n"));
|
||||
}
|
||||
printf(_("Public key: %s\n"), BN_bn2hex(key->n));
|
||||
printf(_("Private key: %s\n"), BN_bn2hex(key->d));
|
||||
|
||||
return 0;
|
||||
}
|
||||
|
|
80
src/net.h
80
src/net.h
|
@ -15,6 +15,8 @@
|
|||
You should have received a copy of the GNU General Public License
|
||||
along with this program; if not, write to the Free Software
|
||||
Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
|
||||
|
||||
$Id: net.h,v 1.10 2000/10/18 20:12:09 zarq Exp $
|
||||
*/
|
||||
|
||||
#ifndef __TINC_NET_H__
|
||||
|
@ -23,7 +25,6 @@
|
|||
#include <sys/time.h>
|
||||
|
||||
#include "config.h"
|
||||
#include "conf.h"
|
||||
|
||||
#define MAXSIZE 1700 /* should be a bit more than the MTU for the tapdevice */
|
||||
#define MTU 1600
|
||||
|
@ -43,9 +44,29 @@
|
|||
((unsigned char*)&(x))[1],((unsigned char*)&(x))[0]
|
||||
#endif
|
||||
|
||||
#define MAXBUFSIZE 2048 /* Probably way too much, but it must fit every possible request. */
|
||||
#define MAXBUFSIZE 4096 /* Probably way too much, but it must fit every possible request. */
|
||||
|
||||
/* flags */
|
||||
#define INDIRECTDATA 0x0001 /* Used to indicate that this host has to be reached indirect */
|
||||
#define EXPORTINDIRECTDATA 0x0002 /* Used to indicate uplink that it has to tell others to do INDIRECTDATA */
|
||||
#define TCPONLY 0x0004 /* Tells sender to send packets over TCP instead of UDP (for firewalls) */
|
||||
|
||||
typedef struct mac_t
|
||||
{
|
||||
unsigned char x[6];
|
||||
} mac_t;
|
||||
|
||||
typedef unsigned long ipv4_t;
|
||||
|
||||
typedef ipv4_t ip_t; /* alias for ipv4_t */
|
||||
|
||||
typedef struct ipv6_t
|
||||
{
|
||||
unsigned short x[8];
|
||||
} ipv6_t;
|
||||
|
||||
typedef unsigned short port_t;
|
||||
|
||||
typedef unsigned long ip_t;
|
||||
typedef short length_t;
|
||||
|
||||
typedef struct vpn_packet_t {
|
||||
|
@ -53,12 +74,6 @@ typedef struct vpn_packet_t {
|
|||
unsigned char data[MAXSIZE];
|
||||
} vpn_packet_t;
|
||||
|
||||
typedef struct real_packet_t {
|
||||
length_t len; /* the length of the entire packet */
|
||||
ip_t from; /* where the packet came from */
|
||||
vpn_packet_t data; /* encrypted vpn_packet_t */
|
||||
} real_packet_t;
|
||||
|
||||
typedef struct passphrase_t {
|
||||
unsigned short len;
|
||||
unsigned char *phrase;
|
||||
|
@ -76,9 +91,15 @@ typedef struct status_bits_t {
|
|||
int validkey:1; /* 1 if we currently have a valid key for him */
|
||||
int waitingforkey:1; /* 1 if we already sent out a request */
|
||||
int dataopen:1; /* 1 if we have a valid UDP connection open */
|
||||
int unused:22;
|
||||
int encryptout:1; /* 1 if we can encrypt outgoing traffic */
|
||||
int decryptin:1; /* 1 if we have to decrypt incoming traffic */
|
||||
int unused:18;
|
||||
} status_bits_t;
|
||||
|
||||
typedef struct option_bits_t {
|
||||
int unused:32;
|
||||
} option_bits_t;
|
||||
|
||||
typedef struct queue_element_t {
|
||||
void *packet;
|
||||
struct queue_element_t *prev;
|
||||
|
@ -96,31 +117,6 @@ typedef struct enc_key_t {
|
|||
time_t expiry;
|
||||
} enc_key_t;
|
||||
|
||||
typedef struct conn_list_t {
|
||||
ip_t vpn_ip; /* his vpn ip */
|
||||
ip_t vpn_mask; /* his vpn network address */
|
||||
ip_t real_ip; /* his real (internet) ip */
|
||||
char *hostname; /* the hostname of its real ip */
|
||||
short unsigned int port; /* his portnumber */
|
||||
int socket; /* our udp vpn socket */
|
||||
int meta_socket; /* our tcp meta socket */
|
||||
int protocol_version; /* used protocol */
|
||||
status_bits_t status; /* status info */
|
||||
passphrase_t *pp; /* encoded passphrase */
|
||||
packet_queue_t *sq; /* pending outgoing packets */
|
||||
packet_queue_t *rq; /* pending incoming packets (they have no
|
||||
valid key to be decrypted with) */
|
||||
enc_key_t *public_key; /* the other party's public key */
|
||||
enc_key_t *key; /* encrypt with this key */
|
||||
char buffer[MAXBUFSIZE+1]; /* metadata input buffer */
|
||||
int buflen; /* bytes read into buffer */
|
||||
int reqlen; /* length of first request in buffer */
|
||||
time_t last_ping_time; /* last time we saw some activity from the other end */
|
||||
int want_ping; /* 0 if there's no need to check for activity */
|
||||
struct conn_list_t *nexthop; /* nearest meta-hop in this direction */
|
||||
struct conn_list_t *next; /* after all, it's a list of connections */
|
||||
} conn_list_t;
|
||||
|
||||
extern int tap_fd;
|
||||
|
||||
extern int total_tap_in;
|
||||
|
@ -128,15 +124,23 @@ extern int total_tap_out;
|
|||
extern int total_socket_in;
|
||||
extern int total_socket_out;
|
||||
|
||||
extern conn_list_t *conn_list;
|
||||
extern conn_list_t *myself;
|
||||
extern char *unknown;
|
||||
|
||||
extern char *request_name[256];
|
||||
extern char *status_text[10];
|
||||
|
||||
#include "connlist.h" /* Yes, very strange placement indeed, but otherwise the typedefs get all tangled up */
|
||||
|
||||
extern int str2opt(const char *);
|
||||
extern char *opt2str(int);
|
||||
extern int send_packet(ip_t, vpn_packet_t *);
|
||||
extern int setup_network_connections(void);
|
||||
extern void close_network_connections(void);
|
||||
extern void main_loop(void);
|
||||
extern int setup_vpn_connection(conn_list_t *);
|
||||
extern void terminate_connection(conn_list_t *);
|
||||
extern void flush_queues(conn_list_t*);
|
||||
extern void flush_queues(conn_list_t *);
|
||||
extern int xrecv(vpn_packet_t *);
|
||||
extern void add_queue(packet_queue_t **, void *, size_t);
|
||||
|
||||
#endif /* __TINC_NET_H__ */
|
||||
|
|
130
src/netutl.c
130
src/netutl.c
|
@ -16,7 +16,7 @@
|
|||
along with this program; if not, write to the Free Software
|
||||
Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
|
||||
|
||||
$Id: netutl.c,v 1.12 2000/05/31 18:23:06 zarq Exp $
|
||||
$Id: netutl.c,v 1.13 2000/10/18 20:12:09 zarq Exp $
|
||||
*/
|
||||
|
||||
#include "config.h"
|
||||
|
@ -33,6 +33,7 @@
|
|||
#include <utils.h>
|
||||
#include <xalloc.h>
|
||||
|
||||
#include "errno.h"
|
||||
#include "conf.h"
|
||||
#include "encr.h"
|
||||
#include "net.h"
|
||||
|
@ -40,25 +41,6 @@
|
|||
|
||||
#include "system.h"
|
||||
|
||||
/*
|
||||
look for a connection associated with the given vpn ip,
|
||||
return its connection structure.
|
||||
Skips connections that are not activated!
|
||||
*/
|
||||
conn_list_t *lookup_conn(ip_t ip)
|
||||
{
|
||||
conn_list_t *p = conn_list;
|
||||
cp
|
||||
/* Exact match suggested by James B. MacLean */
|
||||
for(p = conn_list; p != NULL; p = p->next)
|
||||
if((ip == p->vpn_ip) && p->status.active)
|
||||
return p;
|
||||
for(p = conn_list; p != NULL; p = p->next)
|
||||
if(((ip & p->vpn_mask) == (p->vpn_ip & p->vpn_mask)) && p->status.active)
|
||||
return p;
|
||||
cp
|
||||
return NULL;
|
||||
}
|
||||
|
||||
/*
|
||||
free a queue and all of its elements
|
||||
|
@ -79,91 +61,7 @@ cp
|
|||
cp
|
||||
}
|
||||
|
||||
/*
|
||||
free a conn_list_t element and all its pointers
|
||||
*/
|
||||
void free_conn_element(conn_list_t *p)
|
||||
{
|
||||
cp
|
||||
if(p->hostname)
|
||||
free(p->hostname);
|
||||
if(p->sq)
|
||||
destroy_queue(p->sq);
|
||||
if(p->rq)
|
||||
destroy_queue(p->rq);
|
||||
free_key(p->public_key);
|
||||
free_key(p->key);
|
||||
free(p);
|
||||
cp
|
||||
}
|
||||
|
||||
/*
|
||||
remove all marked connections
|
||||
*/
|
||||
void prune_conn_list(void)
|
||||
{
|
||||
conn_list_t *p, *prev = NULL, *next = NULL;
|
||||
cp
|
||||
for(p = conn_list; p != NULL; )
|
||||
{
|
||||
next = p->next;
|
||||
|
||||
if(p->status.remove)
|
||||
{
|
||||
if(prev)
|
||||
prev->next = next;
|
||||
else
|
||||
conn_list = next;
|
||||
|
||||
free_conn_element(p);
|
||||
}
|
||||
else
|
||||
prev = p;
|
||||
|
||||
p = next;
|
||||
}
|
||||
cp
|
||||
}
|
||||
|
||||
/*
|
||||
creates new conn_list element, and initializes it
|
||||
*/
|
||||
conn_list_t *new_conn_list(void)
|
||||
{
|
||||
conn_list_t *p = xmalloc(sizeof(*p));
|
||||
cp
|
||||
/* initialise all those stupid pointers at once */
|
||||
memset(p, '\0', sizeof(*p));
|
||||
p->vpn_mask = (ip_t)(~0L); /* If this isn't done, it would be a
|
||||
wastebucket for all packets with
|
||||
unknown destination. */
|
||||
p->nexthop = p;
|
||||
cp
|
||||
return p;
|
||||
}
|
||||
|
||||
/*
|
||||
free all elements of conn_list
|
||||
*/
|
||||
void destroy_conn_list(void)
|
||||
{
|
||||
conn_list_t *p, *next;
|
||||
cp
|
||||
for(p = conn_list; p != NULL; )
|
||||
{
|
||||
next = p->next;
|
||||
free_conn_element(p);
|
||||
p = next;
|
||||
}
|
||||
|
||||
conn_list = NULL;
|
||||
cp
|
||||
}
|
||||
|
||||
/*
|
||||
look up the name associated with the ip
|
||||
address `addr'
|
||||
*/
|
||||
char *hostlookup(unsigned long addr)
|
||||
{
|
||||
char *name;
|
||||
|
@ -175,7 +73,7 @@ cp
|
|||
in.s_addr = addr;
|
||||
|
||||
lookup_hostname = 0;
|
||||
if((cfg = get_config_val(resolve_dns)) != NULL)
|
||||
if((cfg = get_config_val(config, resolve_dns)) != NULL)
|
||||
if(cfg->data.val == stupid_true)
|
||||
lookup_hostname = 1;
|
||||
|
||||
|
@ -184,13 +82,11 @@ cp
|
|||
|
||||
if(!lookup_hostname || !host)
|
||||
{
|
||||
name = xmalloc(20);
|
||||
sprintf(name, "%s", inet_ntoa(in));
|
||||
asprintf(&name, "%s", inet_ntoa(in));
|
||||
}
|
||||
else
|
||||
{
|
||||
name = xmalloc(strlen(host->h_name)+20);
|
||||
sprintf(name, "%s (%s)", host->h_name, inet_ntoa(in));
|
||||
asprintf(&name, "%s", host->h_name);
|
||||
}
|
||||
cp
|
||||
return name;
|
||||
|
@ -216,7 +112,7 @@ cp
|
|||
|
||||
if(!(h = gethostbyname(p)))
|
||||
{
|
||||
fprintf(stderr, _("Error looking up `%s': %s\n"), p, sys_errlist[h_errno]);
|
||||
fprintf(stderr, _("Error looking up `%s': %s\n"), p, strerror(errno));
|
||||
return NULL;
|
||||
}
|
||||
|
||||
|
@ -236,17 +132,3 @@ cp
|
|||
return ip;
|
||||
}
|
||||
|
||||
void dump_conn_list(void)
|
||||
{
|
||||
conn_list_t *p;
|
||||
cp
|
||||
syslog(LOG_DEBUG, _("Connection list:"));
|
||||
|
||||
for(p = conn_list; p != NULL; p = p->next)
|
||||
{
|
||||
syslog(LOG_DEBUG, " " IP_ADDR_S "/" IP_ADDR_S ": %04x (%d|%d)",
|
||||
IP_ADDR_V(p->vpn_ip), IP_ADDR_V(p->vpn_mask), p->status,
|
||||
p->socket, p->meta_socket);
|
||||
}
|
||||
cp
|
||||
}
|
||||
|
|
10
src/netutl.h
10
src/netutl.h
|
@ -15,21 +15,17 @@
|
|||
You should have received a copy of the GNU General Public License
|
||||
along with this program; if not, write to the Free Software
|
||||
Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
|
||||
|
||||
$Id: netutl.h,v 1.3 2000/10/18 20:12:09 zarq Exp $
|
||||
*/
|
||||
|
||||
#ifndef __TINC_NETUTL_H__
|
||||
#define __TINC_NETUTL_H__
|
||||
|
||||
#include "net.h"
|
||||
#include "conf.h"
|
||||
|
||||
extern conn_list_t *lookup_conn(ip_t);
|
||||
extern void free_conn_element(conn_list_t *);
|
||||
extern void free_conn_list(conn_list_t*);
|
||||
extern void prune_conn_list(void);
|
||||
extern conn_list_t *new_conn_list(void);
|
||||
extern void destroy_conn_list(void);
|
||||
extern char *hostlookup(unsigned long);
|
||||
extern ip_mask_t *strtoip(char*);
|
||||
extern void dump_conn_list(void);
|
||||
|
||||
#endif /* __TINC_NETUTL_H__ */
|
||||
|
|
1647
src/protocol.c
1647
src/protocol.c
File diff suppressed because it is too large
Load diff
|
@ -1,6 +1,7 @@
|
|||
/*
|
||||
protocol.h -- header for protocol.c
|
||||
Copyright (C) 1999,2000 Ivo Timmermans <zarq@iname.com>
|
||||
Copyright (C) 1999,2000 Ivo Timmermans <itimmermans@bigfoot.com>,
|
||||
2000 Guus Sliepen <guus@sliepen.warande.net>
|
||||
|
||||
This program is free software; you can redistribute it and/or modify
|
||||
it under the terms of the GNU General Public License as published by
|
||||
|
@ -15,60 +16,64 @@
|
|||
You should have received a copy of the GNU General Public License
|
||||
along with this program; if not, write to the Free Software
|
||||
Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
|
||||
|
||||
$Id: protocol.h,v 1.6 2000/10/18 20:12:09 zarq Exp $
|
||||
*/
|
||||
|
||||
#ifndef __TINC_PROTOCOL_H__
|
||||
#define __TINC_PROTOCOL_H__
|
||||
|
||||
#include "net.h"
|
||||
#include "subnet.h"
|
||||
|
||||
/* Protocol version. Different versions are incompatible,
|
||||
incompatible version have different protocols.
|
||||
*/
|
||||
|
||||
#define PROT_CURRENT 8
|
||||
|
||||
/* Length of the challenge. Since the challenge will also
|
||||
contain the key for the symmetric cipher, it must be
|
||||
quite large.
|
||||
*/
|
||||
|
||||
#define CHAL_LENGTH 1024 /* Okay, this is probably waaaaaaaaaaay too large */
|
||||
|
||||
/* Request numbers */
|
||||
|
||||
enum {
|
||||
PROT_RESERVED = 0, /* reserved: do not use. */
|
||||
PROT_NOT_IN_USE,
|
||||
PROT_TOO_OLD = 2,
|
||||
PROT_3,
|
||||
PROT_4,
|
||||
PROT_ECHELON,
|
||||
PROT_CURRENT, /* protocol currently in use */
|
||||
ALL = -1, /* Guardian for allow_request */
|
||||
ID = 0, CHALLENGE, CHAL_REPLY, ACK,
|
||||
STATUS, ERROR, TERMREQ,
|
||||
PING, PONG,
|
||||
ADD_HOST, DEL_HOST,
|
||||
ADD_SUBNET, DEL_SUBNET,
|
||||
KEY_CHANGED, REQ_KEY, ANS_KEY,
|
||||
LAST /* Guardian for the highest request number */
|
||||
};
|
||||
|
||||
enum {
|
||||
ACK = 1, /* acknowledged */
|
||||
AUTH_S_INIT = 10, /* initiate authentication */
|
||||
AUTH_C_INIT,
|
||||
AUTH_S_SPP, /* send passphrase */
|
||||
AUTH_C_SPP,
|
||||
AUTH_S_SKEY, /* send g^k */
|
||||
AUTH_C_SKEY,
|
||||
AUTH_S_SACK, /* send ack */
|
||||
AUTH_C_RACK, /* waiting for ack */
|
||||
TERMREQ = 30, /* terminate connection */
|
||||
PINGTIMEOUT, /* terminate due to ping t.o. */
|
||||
DEL_HOST, /* forward a termreq to others */
|
||||
PING = 40, /* ping */
|
||||
PONG,
|
||||
ADD_HOST = 60, /* Add new given host to connection list */
|
||||
BASIC_INFO, /* some basic info follows */
|
||||
PASSPHRASE, /* encrypted passphrase */
|
||||
PUBLIC_KEY, /* public key in base-36 */
|
||||
HOLD = 80, /* don't send any data */
|
||||
RESUME, /* resume dataflow with new encryption key */
|
||||
CALCULATE = 100, /* calculate the following numer^privkey and send me the result */
|
||||
CALC_RES, /* result of the above */
|
||||
ALMOST_KEY, /* this number^privkey is the shared key */
|
||||
REQ_KEY = 160, /* request public key */
|
||||
ANS_KEY, /* answer to such request */
|
||||
KEY_CHANGED, /* public key has changed */
|
||||
};
|
||||
|
||||
extern int (*request_handlers[256])(conn_list_t*);
|
||||
extern int (*request_handlers[])(conn_list_t*);
|
||||
|
||||
extern int send_id(conn_list_t*);
|
||||
extern int send_challenge(conn_list_t*);
|
||||
extern int send_chal_reply(conn_list_t*);
|
||||
extern int send_ack(conn_list_t*);
|
||||
extern int send_status(conn_list_t*, int, char*);
|
||||
extern int send_error(conn_list_t*, int, char*);
|
||||
extern int send_termreq(conn_list_t*);
|
||||
extern int send_ping(conn_list_t*);
|
||||
extern int send_basic_info(conn_list_t *);
|
||||
extern int send_termreq(conn_list_t *);
|
||||
extern int send_timeout(conn_list_t *);
|
||||
extern int send_key_request(ip_t);
|
||||
extern void send_key_changed_all(void);
|
||||
extern int send_pong(conn_list_t*);
|
||||
extern int send_add_host(conn_list_t*, conn_list_t*);
|
||||
extern int send_del_host(conn_list_t*, conn_list_t*);
|
||||
extern int send_add_subnet(conn_list_t*, conn_list_t*, subnet_t*);
|
||||
extern int send_del_subnet(conn_list_t*, conn_list_t*, subnet_t*);
|
||||
extern int send_key_changed(conn_list_t*, conn_list_t*);
|
||||
extern int send_req_key(conn_list_t*, conn_list_t*);
|
||||
extern int send_ans_key(conn_list_t*, conn_list_t*, char*);
|
||||
|
||||
/* Old functions */
|
||||
|
||||
extern int send_tcppacket(conn_list_t *, void *, int);
|
||||
extern int notify_others(conn_list_t *, conn_list_t *, int (*function)(conn_list_t*, conn_list_t*));
|
||||
|
||||
#endif /* __TINC_PROTOCOL_H__ */
|
||||
|
||||
|
|
158
src/tincd.c
158
src/tincd.c
|
@ -17,7 +17,7 @@
|
|||
along with this program; if not, write to the Free Software
|
||||
Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
|
||||
|
||||
$Id: tincd.c,v 1.10 2000/05/31 18:23:06 zarq Exp $
|
||||
$Id: tincd.c,v 1.11 2000/10/18 20:12:10 zarq Exp $
|
||||
*/
|
||||
|
||||
#include "config.h"
|
||||
|
@ -30,6 +30,7 @@
|
|||
#include <sys/types.h>
|
||||
#include <syslog.h>
|
||||
#include <unistd.h>
|
||||
#include <signal.h>
|
||||
|
||||
#ifdef HAVE_SYS_IOCTL_H
|
||||
# include <sys/ioctl.h>
|
||||
|
@ -43,6 +44,7 @@
|
|||
#include "encr.h"
|
||||
#include "net.h"
|
||||
#include "netutl.h"
|
||||
#include "protocol.h"
|
||||
|
||||
#include "system.h"
|
||||
|
||||
|
@ -61,10 +63,7 @@ static int kill_tincd = 0;
|
|||
/* If zero, don't detach from the terminal. */
|
||||
static int do_detach = 1;
|
||||
|
||||
char *confbase = NULL; /* directory in which all config files are */
|
||||
char *configfilename = NULL; /* configuration file name */
|
||||
char *identname; /* program name for syslog */
|
||||
char *netname = NULL; /* name of the vpn network */
|
||||
char *pidfilename; /* pid file location */
|
||||
static pid_t ppid; /* pid of non-detached part */
|
||||
char **g_argv; /* a copy of the cmdline arguments */
|
||||
|
@ -96,7 +95,7 @@ usage(int status)
|
|||
else
|
||||
{
|
||||
printf(_("Usage: %s [option]...\n\n"), program_name);
|
||||
printf(_(" -c, --config=FILE Read configuration options from FILE.\n"
|
||||
printf(_(" -c, --config=DIR Read configuration options from DIR.\n"
|
||||
" -D, --no-detach Don't fork and detach.\n"
|
||||
" -d Increase debug level.\n"
|
||||
" -k, --kill Attempt to kill a running tincd and exit.\n"
|
||||
|
@ -123,8 +122,8 @@ parse_options(int argc, char **argv, char **envp)
|
|||
case 0: /* long option */
|
||||
break;
|
||||
case 'c': /* config file */
|
||||
configfilename = xmalloc(strlen(optarg)+1);
|
||||
strcpy(configfilename, optarg);
|
||||
confbase = xmalloc(strlen(optarg)+1);
|
||||
strcpy(confbase, optarg);
|
||||
break;
|
||||
case 'D': /* no detach */
|
||||
do_detach = 0;
|
||||
|
@ -156,7 +155,7 @@ parse_options(int argc, char **argv, char **envp)
|
|||
|
||||
void memory_full(int size)
|
||||
{
|
||||
syslog(LOG_ERR, _("Memory exhausted (last is %s:%d) (couldn't allocate %d bytes); exiting."), cp_file, cp_line, size);
|
||||
syslog(LOG_ERR, _("Memory exhausted (last is %s:%d) (couldn't allocate %d bytes), exiting."), cp_file, cp_line, size);
|
||||
exit(1);
|
||||
}
|
||||
|
||||
|
@ -180,7 +179,7 @@ int detach(void)
|
|||
if(pid) /* parent process */
|
||||
{
|
||||
signal(SIGTERM, parent_exit);
|
||||
sleep(600); /* wait 10 minutes */
|
||||
// sleep(600); /* wait 10 minutes */
|
||||
exit(1);
|
||||
}
|
||||
}
|
||||
|
@ -210,11 +209,11 @@ int detach(void)
|
|||
|
||||
openlog(identname, LOG_CONS | LOG_PID, LOG_DAEMON);
|
||||
|
||||
if(debug_lvl > 1)
|
||||
syslog(LOG_NOTICE, _("tincd %s (%s %s) starting, debug level %d."),
|
||||
if(debug_lvl > 0)
|
||||
syslog(LOG_NOTICE, _("tincd %s (%s %s) starting, debug level %d"),
|
||||
VERSION, __DATE__, __TIME__, debug_lvl);
|
||||
else
|
||||
syslog(LOG_NOTICE, _("tincd %s starting, debug level %d."), VERSION, debug_lvl);
|
||||
syslog(LOG_NOTICE, _("tincd %s starting"), VERSION, debug_lvl);
|
||||
|
||||
xalloc_fail_func = memory_full;
|
||||
|
||||
|
@ -229,7 +228,7 @@ void cleanup_and_exit(int c)
|
|||
close_network_connections();
|
||||
|
||||
if(debug_lvl > 0)
|
||||
syslog(LOG_INFO, _("Total bytes written: tap %d, socket %d; bytes read: tap %d, socket %d."),
|
||||
syslog(LOG_INFO, _("Total bytes written: tap %d, socket %d; bytes read: tap %d, socket %d"),
|
||||
total_tap_out, total_socket_out, total_tap_in, total_socket_in);
|
||||
|
||||
closelog();
|
||||
|
@ -291,35 +290,24 @@ int kill_other(void)
|
|||
*/
|
||||
void make_names(void)
|
||||
{
|
||||
if(!configfilename)
|
||||
{
|
||||
if(netname)
|
||||
{
|
||||
configfilename = xmalloc(strlen(netname)+18+strlen(CONFDIR));
|
||||
sprintf(configfilename, "%s/tinc/%s/tinc.conf", CONFDIR, netname);
|
||||
}
|
||||
else
|
||||
{
|
||||
configfilename = xmalloc(17+strlen(CONFDIR));
|
||||
sprintf(configfilename, "%s/tinc/tinc.conf", CONFDIR);
|
||||
}
|
||||
}
|
||||
|
||||
if(netname)
|
||||
{
|
||||
pidfilename = xmalloc(strlen(netname)+20);
|
||||
sprintf(pidfilename, "/var/run/tinc.%s.pid", netname);
|
||||
confbase = xmalloc(strlen(netname)+8+strlen(CONFDIR));
|
||||
sprintf(confbase, "%s/tinc/%s/", CONFDIR, netname);
|
||||
identname = xmalloc(strlen(netname)+7);
|
||||
sprintf(identname, "tinc.%s", netname);
|
||||
if(!pidfilename)
|
||||
asprintf(&pidfilename, "/var/run/tinc.%s.pid", netname);
|
||||
if(!confbase)
|
||||
asprintf(&confbase, "%s/tinc/%s", CONFDIR, netname);
|
||||
if(!identname)
|
||||
asprintf(&identname, "tinc.%s", netname);
|
||||
}
|
||||
else
|
||||
{
|
||||
pidfilename = "/var/run/tinc.pid";
|
||||
confbase = xmalloc(7+strlen(CONFDIR));
|
||||
sprintf(confbase, "%s/tinc/", CONFDIR);
|
||||
identname = "tinc";
|
||||
netname = "bla";
|
||||
if(!pidfilename)
|
||||
pidfilename = "/var/run/tinc.pid";
|
||||
if(!confbase)
|
||||
asprintf(&confbase, "%s/tinc", CONFDIR);
|
||||
if(!identname)
|
||||
identname = "tinc";
|
||||
}
|
||||
}
|
||||
|
||||
|
@ -332,17 +320,20 @@ main(int argc, char **argv, char **envp)
|
|||
bindtextdomain (PACKAGE, LOCALEDIR);
|
||||
textdomain (PACKAGE);
|
||||
|
||||
/* Do some intl stuff right now */
|
||||
|
||||
unknown = _("unknown");
|
||||
|
||||
parse_options(argc, argv, envp);
|
||||
|
||||
if(show_version)
|
||||
{
|
||||
printf(_("%s version %s\n"), PACKAGE, VERSION);
|
||||
printf(_("Copyright (C) 1998,1999,2000 Ivo Timmermans and others,\n"
|
||||
"see the AUTHORS file for a complete list.\n\n"
|
||||
printf(_("%s version %s (built %s %s, protocol %d)\n"), PACKAGE, VERSION, __DATE__, __TIME__, PROT_CURRENT);
|
||||
printf(_("Copyright (C) 1998,1999,2000 Ivo Timmermans, Guus Sliepen and others.\n"
|
||||
"See the AUTHORS file for a complete list.\n\n"
|
||||
"tinc comes with ABSOLUTELY NO WARRANTY. This is free software,\n"
|
||||
"and you are welcome to redistribute it under certain conditions;\n"
|
||||
"see the file COPYING for details.\n\n"));
|
||||
printf(_("This product includes software developed by Eric Young (eay@mincom.oz.au)\n"));
|
||||
"see the file COPYING for details.\n"));
|
||||
|
||||
return 0;
|
||||
}
|
||||
|
@ -352,7 +343,7 @@ main(int argc, char **argv, char **envp)
|
|||
|
||||
if(geteuid())
|
||||
{
|
||||
fprintf(stderr, _("You must be root to run this program. sorry.\n"));
|
||||
fprintf(stderr, _("You must be root to run this program. Sorry.\n"));
|
||||
return 1;
|
||||
}
|
||||
|
||||
|
@ -363,7 +354,7 @@ main(int argc, char **argv, char **envp)
|
|||
if(kill_tincd)
|
||||
exit(kill_other());
|
||||
|
||||
if(read_config_file(configfilename))
|
||||
if(read_server_config())
|
||||
return 1;
|
||||
|
||||
setup_signals();
|
||||
|
@ -371,16 +362,32 @@ main(int argc, char **argv, char **envp)
|
|||
if(detach())
|
||||
exit(0);
|
||||
|
||||
/* FIXME: wt* is this suppose to do?
|
||||
if(security_init())
|
||||
return 1;
|
||||
*/
|
||||
for(;;)
|
||||
{
|
||||
if(!setup_network_connections())
|
||||
{
|
||||
main_loop();
|
||||
cleanup_and_exit(1);
|
||||
}
|
||||
|
||||
syslog(LOG_ERR, _("Unrecoverable error"));
|
||||
cp_trace();
|
||||
|
||||
if(setup_network_connections())
|
||||
cleanup_and_exit(1);
|
||||
|
||||
main_loop();
|
||||
|
||||
cleanup_and_exit(1);
|
||||
return 1;
|
||||
if(do_detach)
|
||||
{
|
||||
syslog(LOG_NOTICE, _("Restarting in %d seconds!"), MAXTIMEOUT);
|
||||
sleep(MAXTIMEOUT);
|
||||
}
|
||||
else
|
||||
{
|
||||
syslog(LOG_ERR, _("Aieee! Not restarting."));
|
||||
exit(0);
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
RETSIGTYPE
|
||||
|
@ -402,41 +409,45 @@ sigquit_handler(int a)
|
|||
RETSIGTYPE
|
||||
sigsegv_square(int a)
|
||||
{
|
||||
syslog(LOG_NOTICE, _("Got another SEGV signal: not restarting"));
|
||||
syslog(LOG_ERR, _("Got another SEGV signal: not restarting"));
|
||||
exit(0);
|
||||
}
|
||||
|
||||
RETSIGTYPE
|
||||
sigsegv_handler(int a)
|
||||
{
|
||||
if(cp_file)
|
||||
syslog(LOG_NOTICE, _("Got SEGV signal after %s line %d. Trying to re-execute."),
|
||||
cp_file, cp_line);
|
||||
syslog(LOG_ERR, _("Got SEGV signal"));
|
||||
cp_trace();
|
||||
|
||||
if(do_detach)
|
||||
{
|
||||
syslog(LOG_NOTICE, _("Trying to re-execute in 5 seconds..."));
|
||||
signal(SIGSEGV, sigsegv_square);
|
||||
close_network_connections();
|
||||
sleep(5);
|
||||
remove_pid(pidfilename);
|
||||
execvp(g_argv[0], g_argv);
|
||||
}
|
||||
else
|
||||
syslog(LOG_NOTICE, _("Got SEGV signal; trying to re-execute."));
|
||||
|
||||
signal(SIGSEGV, sigsegv_square);
|
||||
|
||||
close_network_connections();
|
||||
remove_pid(pidfilename);
|
||||
execvp(g_argv[0], g_argv);
|
||||
{
|
||||
syslog(LOG_NOTICE, _("Aieee! Not restarting."));
|
||||
exit(0);
|
||||
}
|
||||
}
|
||||
|
||||
RETSIGTYPE
|
||||
sighup_handler(int a)
|
||||
{
|
||||
if(debug_lvl > 0)
|
||||
syslog(LOG_NOTICE, _("Got HUP signal"));
|
||||
close_network_connections();
|
||||
setup_network_connections();
|
||||
/* FIXME: read config-file and re-establish network connections */
|
||||
syslog(LOG_NOTICE, _("Got HUP signal, rereading configuration and restarting"));
|
||||
sighup = 1;
|
||||
}
|
||||
|
||||
RETSIGTYPE
|
||||
sigint_handler(int a)
|
||||
{
|
||||
if(debug_lvl > 0)
|
||||
syslog(LOG_NOTICE, _("Got INT signal"));
|
||||
syslog(LOG_NOTICE, _("Got INT signal, exiting"));
|
||||
cleanup_and_exit(0);
|
||||
}
|
||||
|
||||
|
@ -450,18 +461,17 @@ RETSIGTYPE
|
|||
sigusr2_handler(int a)
|
||||
{
|
||||
if(debug_lvl > 1)
|
||||
syslog(LOG_NOTICE, _("Forcing new key generation"));
|
||||
syslog(LOG_NOTICE, _("Got USR2 signal, forcing new key generation"));
|
||||
/* FIXME: reprogram this.
|
||||
regenerate_keys();
|
||||
*/
|
||||
}
|
||||
|
||||
RETSIGTYPE
|
||||
sighuh(int a)
|
||||
{
|
||||
if(cp_file)
|
||||
syslog(LOG_NOTICE, _("Got unexpected signal (%d) after %s line %d."),
|
||||
a, cp_file, cp_line);
|
||||
else
|
||||
syslog(LOG_NOTICE, _("Got unexpected signal (%d)."), a);
|
||||
syslog(LOG_WARNING, _("Got unexpected signal %d (%s)"), a, strsignal(a));
|
||||
cp_trace();
|
||||
}
|
||||
|
||||
void
|
||||
|
@ -485,7 +495,7 @@ setup_signals(void)
|
|||
signal(SIGINT, sigint_handler);
|
||||
signal(SIGUSR1, sigusr1_handler);
|
||||
signal(SIGUSR2, sigusr2_handler);
|
||||
signal(SIGCHLD, parent_exit);
|
||||
// signal(SIGCHLD, parent_exit);
|
||||
}
|
||||
|
||||
RETSIGTYPE parent_exit(int a)
|
||||
|
|
Loading…
Reference in a new issue