tinc/src/net.c

1121 lines
23 KiB
C

/*
net.c -- most of the network code
Copyright (C) 1998,99 Ivo Timmermans <zarq@iname.com>
This program is free software; you can redistribute it and/or modify
it under the terms of the GNU General Public License as published by
the Free Software Foundation; either version 2 of the License, or
(at your option) any later version.
This program is distributed in the hope that it will be useful,
but WITHOUT ANY WARRANTY; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
GNU General Public License for more details.
You should have received a copy of the GNU General Public License
along with this program; if not, write to the Free Software
Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
*/
#include "config.h"
#include <arpa/inet.h>
#include <errno.h>
#include <fcntl.h>
#include <netdb.h>
#include <netinet/in.h>
#include <stdio.h>
#include <stdlib.h>
#include <string.h>
#include <sys/signal.h>
#include <sys/socket.h>
#include <sys/time.h>
#include <sys/types.h>
#include <syslog.h>
#include <unistd.h>
#include <cipher.h>
#include <utils.h>
#include <xalloc.h>
#include "conf.h"
#include "encr.h"
#include "net.h"
#include "netutl.h"
#include "protocol.h"
int tap_fd = -1;
int total_tap_in = 0;
int total_tap_out = 0;
int total_socket_in = 0;
int total_socket_out = 0;
time_t last_ping_time = 0;
/* The global list of existing connections */
conn_list_t *conn_list = NULL;
conn_list_t *myself = NULL;
/*
strip off the MAC adresses of an ethernet frame
*/
void strip_mac_addresses(vpn_packet_t *p)
{
unsigned char tmp[MAXSIZE];
cp
memcpy(tmp, p->data, p->len);
p->len -= 12;
memcpy(p->data, &tmp[12], p->len);
cp
}
/*
reassemble MAC addresses
*/
void add_mac_addresses(vpn_packet_t *p)
{
unsigned char tmp[MAXSIZE];
cp
memcpy(&tmp[12], p->data, p->len);
p->len += 12;
tmp[0] = tmp[6] = 0xfe;
tmp[1] = tmp[7] = 0xfd;
*((ip_t*)(&tmp[2])) = (ip_t)(htonl(myself->vpn_ip));
*((ip_t*)(&tmp[8])) = *((ip_t*)(&tmp[26]));
memcpy(p->data, &tmp[0], p->len);
cp
}
int xsend(conn_list_t *cl, void *packet)
{
int r;
real_packet_t rp;
cp
do_encrypt((vpn_packet_t*)packet, &rp, cl->key);
rp.from = myself->vpn_ip;
if(debug_lvl > 3)
syslog(LOG_ERR, "Sent %d bytes to %lx", rp.len, cl->vpn_ip);
if((r = send(cl->socket, (char*)&rp, rp.len, 0)) < 0)
{
syslog(LOG_ERR, "Error sending data: %m");
return -1;
}
total_socket_out += r;
cp
return 0;
}
/*
write as many bytes as possible to the tap
device, possibly in multiple turns.
*/
int write_n(int fd, void *buf, size_t len)
{
int r, done = 0;
cp
do
{
if((r = write(fd, buf, len)) < 0)
return -1;
len -= r;
buf += r;
done += r;
} while(len > 0);
return done;
cp
}
int xrecv(conn_list_t *cl, void *packet)
{
vpn_packet_t vp;
int lenin;
cp
do_decrypt((real_packet_t*)packet, &vp, cl->key);
add_mac_addresses(&vp);
if((lenin = write_n(tap_fd, &vp, vp.len + 2)) < 0)
syslog(LOG_ERR, "Can't write to tap device: %m");
else
total_tap_out += lenin;
cp
return 0;
}
/*
add the given packet of size s to the
queue q, be it the send or receive queue
*/
void add_queue(packet_queue_t **q, void *packet, size_t s)
{
queue_element_t *e;
cp
if(debug_lvl > 3)
syslog(LOG_DEBUG, "packet to queue: %d", s);
e = xmalloc(sizeof(queue_element_t));
e->packet = xmalloc(s);
memcpy(e->packet, packet, s);
if(!*q)
{
*q = xmalloc(sizeof(packet_queue_t));
(*q)->head = (*q)->tail = NULL;
}
e->next = NULL; /* We insert at the tail */
if((*q)->tail) /* Do we have a tail? */
{
(*q)->tail->next = e;
e->prev = (*q)->tail;
}
else /* No tail -> no head too */
{
(*q)->head = e;
e->prev = NULL;
}
(*q)->tail = e;
cp
}
/* Remove a queue element */
void del_queue(packet_queue_t **q, queue_element_t *e)
{
cp
free(e->packet);
if(e->next) /* There is a successor, so we are not tail */
{
if(e->prev) /* There is a predecessor, so we are not head */
{
e->next->prev = e->prev;
e->prev->next = e->next;
}
else /* We are head */
{
e->next->prev = NULL;
(*q)->head = e->next;
}
}
else /* We are tail (or all alone!) */
{
if(e->prev) /* We are not alone :) */
{
e->prev->next = NULL;
(*q)->tail = e->prev;
}
else /* Adieu */
{
free(*q);
*q = NULL;
}
}
free(e);
cp
}
/*
flush a queue by calling function for
each packet, and removing it when that
returned a zero exit code
*/
void flush_queue(conn_list_t *cl, packet_queue_t **pq,
int (*function)(conn_list_t*,void*))
{
queue_element_t *p, *next = NULL;
cp
for(p = (*pq)->head; p != NULL; )
{
next = p->next;
if(!function(cl, p->packet))
del_queue(pq, p);
p = next;
}
if(debug_lvl > 3)
syslog(LOG_DEBUG, "queue flushed");
cp
}
/*
flush the send&recv queues
void because nothing goes wrong here, packets
remain in the queue if something goes wrong
*/
void flush_queues(conn_list_t *cl)
{
cp
if(cl->sq)
{
if(debug_lvl > 1)
syslog(LOG_DEBUG, "Flushing send queue for " IP_ADDR_S,
IP_ADDR_V(cl->vpn_ip));
flush_queue(cl, &(cl->sq), xsend);
}
if(cl->rq)
{
if(debug_lvl > 1)
syslog(LOG_DEBUG, "Flushing receive queue for " IP_ADDR_S,
IP_ADDR_V(cl->vpn_ip));
flush_queue(cl, &(cl->rq), xrecv);
}
cp
}
/*
send a packet to the given vpn ip.
*/
int send_packet(ip_t to, vpn_packet_t *packet)
{
conn_list_t *cl;
cp
if((cl = lookup_conn(to)) == NULL)
{
if(debug_lvl > 2)
{
syslog(LOG_NOTICE, "trying to look up " IP_ADDR_S " in connection list failed.",
IP_ADDR_V(to));
}
for(cl = conn_list; cl != NULL && !cl->status.outgoing; cl = cl->next);
if(!cl)
{ /* No open outgoing connection has been found. */
if(debug_lvl > 2)
syslog(LOG_NOTICE, "There is no remote host I can send this packet to.");
return -1;
}
}
if(my_key_expiry <= time(NULL))
regenerate_keys();
if(!cl->status.dataopen)
if(setup_vpn_connection(cl) < 0)
return -1;
if(!cl->status.validkey)
{
add_queue(&(cl->sq), packet, packet->len + 2);
if(!cl->status.waitingforkey)
send_key_request(to);
return 0;
}
if(!cl->status.active)
{
add_queue(&(cl->sq), packet, packet->len + 2);
if(debug_lvl > 1)
syslog(LOG_INFO, IP_ADDR_S " is not ready, queueing packet.", IP_ADDR_V(cl->vpn_ip));
return 0; /* We don't want to mess up, do we? */
}
/* can we send it? can we? can we? huh? */
cp
return xsend(cl, packet);
}
int send_broadcast(conn_list_t *cl, vpn_packet_t *packet)
{
conn_list_t *p;
cp
for(p = cl; p != NULL; p = p->next)
if(send_packet(p->real_ip, packet) < 0)
{
syslog(LOG_ERR, "Could not send a broadcast packet to %08lx (%08lx): %m",
p->vpn_ip, p->real_ip);
break; /* FIXME: should retry later, and send a ping over the metaconnection. */
}
cp
return 0;
}
/*
open the local ethertap device
*/
int setup_tap_fd(void)
{
int nfd;
const char *tapfname;
config_t const *cfg;
cp
if((cfg = get_config_val(tapdevice)) == NULL)
tapfname = "/dev/tap0";
else
tapfname = cfg->data.ptr;
if((nfd = open(tapfname, O_RDWR | O_NONBLOCK)) < 0)
{
syslog(LOG_ERR, "Could not open %s: %m", tapfname);
return -1;
}
tap_fd = nfd;
cp
return 0;
}
/*
set up the socket that we listen on for incoming
(tcp) connections
*/
int setup_listen_meta_socket(int port)
{
int nfd, flags;
struct sockaddr_in a;
const int one = 1;
cp
if((nfd = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP)) < 0)
{
syslog(LOG_ERR, "Creating metasocket failed: %m");
return -1;
}
if(setsockopt(nfd, SOL_SOCKET, SO_REUSEADDR, &one, sizeof(one)))
{
syslog(LOG_ERR, "setsockopt: %m");
return -1;
}
flags = fcntl(nfd, F_GETFL);
if(fcntl(nfd, F_SETFL, flags | O_NONBLOCK) < 0)
{
syslog(LOG_ERR, "fcntl: %m");
return -1;
}
memset(&a, 0, sizeof(a));
a.sin_family = AF_INET;
a.sin_port = htons(port);
a.sin_addr.s_addr = htonl(INADDR_ANY);
if(bind(nfd, (struct sockaddr *)&a, sizeof(struct sockaddr)))
{
syslog(LOG_ERR, "Can't bind to port %hd/tcp: %m", port);
return -1;
}
if(listen(nfd, 3))
{
syslog(LOG_ERR, "listen: %m");
return -1;
}
cp
return nfd;
}
/*
setup the socket for incoming encrypted
data (the udp part)
*/
int setup_vpn_in_socket(int port)
{
int nfd, flags;
struct sockaddr_in a;
const int one = 1;
cp
if((nfd = socket(AF_INET, SOCK_DGRAM, IPPROTO_UDP)) < 0)
{
syslog(LOG_ERR, "Creating socket failed: %m");
return -1;
}
if(setsockopt(nfd, SOL_SOCKET, SO_REUSEADDR, &one, sizeof(one)))
{
syslog(LOG_ERR, "setsockopt: %m");
return -1;
}
flags = fcntl(nfd, F_GETFL);
if(fcntl(nfd, F_SETFL, flags | O_NONBLOCK) < 0)
{
syslog(LOG_ERR, "fcntl: %m");
return -1;
}
memset(&a, 0, sizeof(a));
a.sin_family = AF_INET;
a.sin_port = htons(port);
a.sin_addr.s_addr = htonl(INADDR_ANY);
if(bind(nfd, (struct sockaddr *)&a, sizeof(struct sockaddr)))
{
syslog(LOG_ERR, "Can't bind to port %hd/udp: %m", port);
return -1;
}
cp
return nfd;
}
/*
setup an outgoing meta (tcp) socket
*/
int setup_outgoing_meta_socket(conn_list_t *cl)
{
int flags;
struct sockaddr_in a;
config_t const *cfg;
cp
if((cfg = get_config_val(upstreamport)) == NULL)
cl->port = 655;
else
cl->port = cfg->data.val;
cl->meta_socket = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP);
if(cl->meta_socket == -1)
{
syslog(LOG_ERR, "Creating socket failed: %m");
return -1;
}
a.sin_family = AF_INET;
a.sin_port = htons(cl->port);
a.sin_addr.s_addr = htonl(cl->real_ip);
if(connect(cl->meta_socket, (struct sockaddr *)&a, sizeof(a)) == -1)
{
syslog(LOG_ERR, IP_ADDR_S ":%d: %m", IP_ADDR_V(cl->real_ip), cl->port);
return -1;
}
flags = fcntl(cl->meta_socket, F_GETFL);
if(fcntl(cl->meta_socket, F_SETFL, flags | O_NONBLOCK) < 0)
{
syslog(LOG_ERR, "fcntl: %m");
return -1;
}
cl->hostname = hostlookup(htonl(cl->real_ip));
syslog(LOG_INFO, "Connected to %s:%hd" , cl->hostname, cl->port);
cp
return 0;
}
/*
setup an outgoing connection. It's not
necessary to also open an udp socket as
well, because the other host will initiate
an authentication sequence during which
we will do just that.
*/
int setup_outgoing_connection(ip_t ip)
{
conn_list_t *ncn;
cp
ncn = new_conn_list();
ncn->real_ip = ip;
if(setup_outgoing_meta_socket(ncn) < 0)
{
syslog(LOG_ERR, "Could not set up a meta connection.");
free_conn_element(ncn);
return -1;
}
ncn->status.meta = 1;
ncn->status.outgoing = 1;
ncn->next = conn_list;
conn_list = ncn;
cp
return 0;
}
/*
set up the local sockets (listen only)
*/
int setup_myself(void)
{
config_t const *cfg;
cp
myself = new_conn_list();
if(!(cfg = get_config_val(myvpnip)))
{
syslog(LOG_ERR, "No value for my VPN IP given");
return -1;
}
myself->vpn_ip = cfg->data.ip->ip;
myself->vpn_mask = cfg->data.ip->mask;
if(!(cfg = get_config_val(listenport)))
myself->port = 655;
else
myself->port = cfg->data.val;
if((myself->meta_socket = setup_listen_meta_socket(myself->port)) < 0)
{
syslog(LOG_ERR, "Unable to set up a listening socket");
return -1;
}
if((myself->socket = setup_vpn_in_socket(myself->port)) < 0)
{
syslog(LOG_ERR, "Unable to set up an incoming vpn data socket");
close(myself->meta_socket);
return -1;
}
myself->status.active = 1;
syslog(LOG_NOTICE, "Ready: listening on port %d.", myself->port);
cp
return 0;
}
/*
setup all initial network connections
*/
int setup_network_connections(void)
{
config_t const *cfg;
cp
if((cfg = get_config_val(pingtimeout)) == NULL)
timeout = 10;
else
timeout = cfg->data.val;
if(setup_tap_fd() < 0)
return -1;
if(setup_myself() < 0)
return -1;
if((cfg = get_config_val(upstreamip)) == NULL)
/* No upstream IP given, we're listen only. */
return 0;
if(setup_outgoing_connection(cfg->data.ip->ip))
return -1;
cp
return 0;
}
RETSIGTYPE
sigalrm_handler(int a)
{
config_t const *cfg;
static int seconds_till_retry;
cp
cfg = get_config_val(upstreamip);
if(!setup_outgoing_connection(cfg->data.ip->ip))
{
signal(SIGALRM, SIG_IGN);
seconds_till_retry = 5;
}
else
{
signal(SIGALRM, sigalrm_handler);
seconds_till_retry += 5;
alarm(seconds_till_retry);
syslog(LOG_ERR, "Still failed to connect to other. Will retry in %d seconds.",
seconds_till_retry);
}
cp
}
/*
close all open network connections
*/
void close_network_connections(void)
{
conn_list_t *p;
cp
for(p = conn_list; p != NULL; p = p->next)
{
if(p->status.dataopen)
{
shutdown(p->socket, 0); /* No more receptions */
close(p->socket);
}
if(p->status.meta)
{
send_termreq(p);
shutdown(p->meta_socket, 0); /* No more receptions */
close(p->meta_socket);
}
}
if(myself)
if(myself->status.active)
{
close(myself->meta_socket);
close(myself->socket);
}
close(tap_fd);
destroy_conn_list();
syslog(LOG_NOTICE, "Terminating.");
cp
return;
}
/*
create a data (udp) socket
*/
int setup_vpn_connection(conn_list_t *cl)
{
int nfd, flags;
struct sockaddr_in a;
cp
if(debug_lvl > 1)
syslog(LOG_DEBUG, "Opening UDP socket to " IP_ADDR_S, IP_ADDR_V(cl->real_ip));
nfd = socket(AF_INET, SOCK_DGRAM, IPPROTO_UDP);
if(nfd == -1)
{
syslog(LOG_ERR, "Creating data socket failed: %m");
return -1;
}
a.sin_family = AF_INET;
a.sin_port = htons(cl->port);
a.sin_addr.s_addr = htonl(cl->real_ip);
if(connect(nfd, (struct sockaddr *)&a, sizeof(a)) == -1)
{
syslog(LOG_ERR, "Create connection to %08lx:%d failed: %m", ntohs(cl->real_ip),
cl->port);
return -1;
}
flags = fcntl(nfd, F_GETFL);
if(fcntl(nfd, F_SETFL, flags | O_NONBLOCK) < 0)
{
syslog(LOG_ERR, "This is a bug: %s:%d: %d:%m", __FILE__, __LINE__, nfd);
return -1;
}
cl->socket = nfd;
cl->status.dataopen = 1;
cp
return 0;
}
/*
handle an incoming tcp connect call and open
a connection to it.
*/
conn_list_t *create_new_connection(int sfd)
{
conn_list_t *p;
struct sockaddr_in ci;
int len = sizeof(ci);
cp
p = new_conn_list();
if(getpeername(sfd, &ci, &len) < 0)
{
syslog(LOG_ERR, "Error: getpeername: %m");
return NULL;
}
p->hostname = hostlookup(ci.sin_addr.s_addr);
p->real_ip = ntohl(ci.sin_addr.s_addr);
p->meta_socket = sfd;
p->status.meta = 1;
syslog(LOG_NOTICE, "Connection from %s:%d", p->hostname, htons(ci.sin_port));
if(send_basic_info(p) < 0)
{
free(p);
return NULL;
}
cp
return p;
}
/*
put all file descriptors in an fd_set array
*/
void build_fdset(fd_set *fs)
{
conn_list_t *p;
cp
FD_ZERO(fs);
for(p = conn_list; p != NULL; p = p->next)
{
if(p->status.meta)
FD_SET(p->meta_socket, fs);
if(p->status.dataopen)
FD_SET(p->socket, fs);
}
FD_SET(myself->meta_socket, fs);
FD_SET(myself->socket, fs);
FD_SET(tap_fd, fs);
cp
}
/*
receive incoming data from the listening
udp socket and write it to the ethertap
device after being decrypted
*/
int handle_incoming_vpn_data(conn_list_t *cl)
{
real_packet_t rp;
int lenin;
int x, l = sizeof(x);
conn_list_t *f;
cp
if(getsockopt(cl->socket, SOL_SOCKET, SO_ERROR, &x, &l) < 0)
{
syslog(LOG_ERR, "This is a bug: %s:%d: %d:%m", __FILE__, __LINE__, cl->socket);
return -1;
}
if(x)
{
syslog(LOG_ERR, "Incoming data socket error: %s", sys_errlist[x]);
return -1;
}
rp.len = -1;
lenin = recvfrom(cl->socket, &rp, MTU, 0, NULL, NULL);
if(lenin <= 0)
{
syslog(LOG_ERR, "Receiving data failed: %m");
return -1;
}
total_socket_in += lenin;
if(rp.len >= 0)
{
f = lookup_conn(rp.from);
if(debug_lvl > 2)
syslog(LOG_DEBUG, "packet from " IP_ADDR_S " (len %d)",
IP_ADDR_V(rp.from), rp.len);
if(!f)
{
syslog(LOG_ERR, "Got packet from unknown source " IP_ADDR_S,
IP_ADDR_V(rp.from));
return -1;
}
if(f->status.validkey)
xrecv(f, &rp);
else
{
add_queue(&(f->rq), &rp, rp.len);
if(!cl->status.waitingforkey)
send_key_request(rp.from);
}
if(my_key_expiry <= time(NULL))
regenerate_keys();
}
cp
return 0;
}
/*
terminate a connection and notify the other
end before closing the sockets
*/
void terminate_connection(conn_list_t *cl)
{
cp
if(cl->status.remove)
return;
if(debug_lvl > 0)
syslog(LOG_NOTICE, "Closing connection with %s.", cl->hostname);
if(cl->status.timeout)
send_timeout(cl);
else if(!cl->status.termreq)
send_termreq(cl);
close(cl->socket);
if(cl->status.meta)
close(cl->meta_socket);
if(cl->status.outgoing)
{
alarm(5);
signal(SIGALRM, sigalrm_handler);
syslog(LOG_NOTICE, "Try to re-establish outgoing connection in 5 seconds.");
}
cl->status.remove = 1;
cp
}
/*
send out a ping request to all active
connections
*/
int send_broadcast_ping(void)
{
conn_list_t *p;
cp
for(p = conn_list; p != NULL; p = p->next)
{
if(p->status.remove)
continue;
if(p->status.active && p->status.meta)
{
if(send_ping(p))
terminate_connection(p);
else
{
p->status.pinged = 1;
p->status.got_pong = 0;
}
}
}
last_ping_time = time(NULL);
cp
return 0;
}
/*
end all connections that did not respond
to the ping probe in time
*/
int check_dead_connections(void)
{
conn_list_t *p;
cp
for(p = conn_list; p != NULL; p = p->next)
{
if(p->status.remove)
continue;
if(p->status.active && p->status.meta && p->status.pinged && !p->status.got_pong)
{
syslog(LOG_INFO, "%s (" IP_ADDR_S ") didn't respond to ping",
p->hostname, IP_ADDR_V(p->vpn_ip));
p->status.timeout = 1;
terminate_connection(p);
}
}
cp
return 0;
}
/*
accept a new tcp connect and create a
new connection
*/
int handle_new_meta_connection(conn_list_t *cl)
{
conn_list_t *ncn;
struct sockaddr client;
int nfd, len = sizeof(struct sockaddr);
cp
if((nfd = accept(cl->meta_socket, &client, &len)) < 0)
{
syslog(LOG_ERR, "Accepting a new connection failed: %m");
return -1;
}
if((ncn = create_new_connection(nfd)) == NULL)
{
shutdown(nfd, 2);
close(nfd);
syslog(LOG_NOTICE, "Closed attempted connection.");
return 0;
}
ncn->status.meta = 1;
ncn->next = conn_list;
conn_list = ncn;
cp
return 0;
}
/*
dispatch any incoming meta requests
*/
int handle_incoming_meta_data(conn_list_t *cl)
{
int x, l = sizeof(x), lenin;
unsigned char tmp[1600];
int request;
cp
if(getsockopt(cl->meta_socket, SOL_SOCKET, SO_ERROR, &x, &l) < 0)
{
syslog(LOG_ERR, "This is a bug: %s:%d: %d:%m", __FILE__, __LINE__, cl->meta_socket);
return -1;
}
if(x)
{
syslog(LOG_ERR, "Metadata socket error: %s", sys_errlist[x]);
return -1;
}
if((lenin = recv(cl->meta_socket, &tmp, sizeof(tmp), 0)) <= 0)
{
syslog(LOG_ERR, "Receive failed: %m");
return -1;
}
request = (int)(tmp[0]);
if(debug_lvl > 3)
syslog(LOG_DEBUG, "got request %d", request);
if(request_handlers[request] == NULL)
syslog(LOG_ERR, "Unknown request %d.", request);
else
if(request_handlers[request](cl, tmp, lenin) < 0)
return -1;
cp
return 0;
}
/*
check all connections to see if anything
happened on their sockets
*/
void check_network_activity(fd_set *f)
{
conn_list_t *p;
int x, l = sizeof(x);
cp
for(p = conn_list; p != NULL; p = p->next)
{
if(p->status.remove)
continue;
if(p->status.active)
if(FD_ISSET(p->socket, f))
{
/*
The only thing that can happen to get us here is apparently an
error on this outgoing(!) UDP socket that isn't immediate (i.e.
something that will not trigger an error directly on send()).
I've once got here when it said `No route to host'.
*/
getsockopt(p->socket, SOL_SOCKET, SO_ERROR, &x, &l);
syslog(LOG_ERR, "Outgoing data socket error: %s", sys_errlist[x]);
terminate_connection(p);
return;
}
if(p->status.meta)
if(FD_ISSET(p->meta_socket, f))
if(handle_incoming_meta_data(p) < 0)
{
terminate_connection(p);
return;
}
}
if(FD_ISSET(myself->socket, f))
handle_incoming_vpn_data(myself);
if(FD_ISSET(myself->meta_socket, f))
handle_new_meta_connection(myself);
cp
}
/*
read, encrypt and send data that is
available through the ethertap device
*/
void handle_tap_input(void)
{
vpn_packet_t vp;
ip_t from, to;
int ether_type, lenin;
cp
memset(&vp, 0, sizeof(vp));
if((lenin = read(tap_fd, &vp, MTU)) <= 0)
{
syslog(LOG_ERR, "Error while reading from tapdevice: %m");
return;
}
total_tap_in += lenin;
ether_type = ntohs(*((unsigned short*)(&vp.data[12])));
if(ether_type != 0x0800)
{
if(debug_lvl > 0)
syslog(LOG_INFO, "Non-IP ethernet frame %04x from " MAC_ADDR_S,
ether_type, MAC_ADDR_V(vp.data[6]));
return;
}
if(lenin < 32)
{
if(debug_lvl > 0)
syslog(LOG_INFO, "Dropping short packet");
return;
}
from = ntohl(*((unsigned long*)(&vp.data[26])));
to = ntohl(*((unsigned long*)(&vp.data[30])));
if(debug_lvl > 2)
syslog(LOG_DEBUG, "An IP packet (%04x) for " IP_ADDR_S " from " IP_ADDR_S,
ether_type, IP_ADDR_V(to), IP_ADDR_V(from));
if(debug_lvl > 3)
syslog(LOG_DEBUG, MAC_ADDR_S " to " MAC_ADDR_S,
MAC_ADDR_V(vp.data[0]), MAC_ADDR_V(vp.data[6]));
vp.len = (length_t)lenin - 2;
strip_mac_addresses(&vp);
send_packet(to, &vp);
cp
}
/*
this is where it al happens...
*/
void main_loop(void)
{
fd_set fset;
struct timeval tv;
int r;
cp
last_ping_time = time(NULL);
for(;;)
{
tv.tv_sec = timeout;
tv.tv_usec = 0;
prune_conn_list();
build_fdset(&fset);
if((r = select(FD_SETSIZE, &fset, NULL, NULL, &tv)) < 0)
{
if(errno == EINTR) /* because of alarm */
continue;
syslog(LOG_ERR, "Error while waiting for input: %m");
return;
}
if(r == 0 || last_ping_time + timeout < time(NULL))
/* Timeout... hm... something might be wrong. */
{
check_dead_connections();
send_broadcast_ping();
continue;
}
check_network_activity(&fset);
/* local tap data */
if(FD_ISSET(tap_fd, &fset))
handle_tap_input();
}
cp
}