2019-08-26 11:44:36 +00:00
|
|
|
/*
|
|
|
|
net.c -- most of the network code
|
2019-08-26 11:44:37 +00:00
|
|
|
Copyright (C) 1998-2005 Ivo Timmermans,
|
2019-08-26 11:44:52 +00:00
|
|
|
2000-2017 Guus Sliepen <guus@tinc-vpn.org>
|
2019-08-26 11:44:38 +00:00
|
|
|
2006 Scott Lamb <slamb@slamb.org>
|
2019-08-26 11:44:49 +00:00
|
|
|
2011 Loïc Grenié <loic.grenie@gmail.com>
|
2019-08-26 11:44:36 +00:00
|
|
|
|
|
|
|
This program is free software; you can redistribute it and/or modify
|
|
|
|
it under the terms of the GNU General Public License as published by
|
|
|
|
the Free Software Foundation; either version 2 of the License, or
|
|
|
|
(at your option) any later version.
|
|
|
|
|
|
|
|
This program is distributed in the hope that it will be useful,
|
|
|
|
but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
GNU General Public License for more details.
|
|
|
|
|
2019-08-26 11:44:38 +00:00
|
|
|
You should have received a copy of the GNU General Public License along
|
|
|
|
with this program; if not, write to the Free Software Foundation, Inc.,
|
|
|
|
51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA.
|
2019-08-26 11:44:36 +00:00
|
|
|
*/
|
|
|
|
|
2019-08-26 11:44:36 +00:00
|
|
|
#include "system.h"
|
2019-08-26 11:44:36 +00:00
|
|
|
|
2019-08-26 11:44:52 +00:00
|
|
|
#include "autoconnect.h"
|
2019-08-26 11:44:36 +00:00
|
|
|
#include "conf.h"
|
|
|
|
#include "connection.h"
|
2019-08-26 11:44:36 +00:00
|
|
|
#include "device.h"
|
|
|
|
#include "graph.h"
|
|
|
|
#include "logger.h"
|
2019-08-26 11:44:36 +00:00
|
|
|
#include "meta.h"
|
2019-08-26 11:44:50 +00:00
|
|
|
#include "names.h"
|
2019-08-26 11:44:36 +00:00
|
|
|
#include "net.h"
|
|
|
|
#include "netutl.h"
|
|
|
|
#include "protocol.h"
|
2019-08-26 11:44:36 +00:00
|
|
|
#include "subnet.h"
|
2019-08-26 11:44:52 +00:00
|
|
|
#include "utils.h"
|
2019-08-26 11:44:36 +00:00
|
|
|
#include "xalloc.h"
|
2019-08-26 11:44:36 +00:00
|
|
|
|
2019-08-26 11:44:40 +00:00
|
|
|
int contradicting_add_edge = 0;
|
|
|
|
int contradicting_del_edge = 0;
|
2019-08-26 11:44:41 +00:00
|
|
|
static int sleeptime = 10;
|
2019-08-26 11:44:49 +00:00
|
|
|
time_t last_config_check = 0;
|
2019-08-26 11:44:51 +00:00
|
|
|
static timeout_t pingtimer;
|
|
|
|
static timeout_t periodictimer;
|
2019-08-26 11:44:52 +00:00
|
|
|
static struct timeval last_periodic_run_time;
|
2019-08-26 11:44:36 +00:00
|
|
|
|
|
|
|
/* Purge edges and subnets of unreachable nodes. Use carefully. */
|
|
|
|
|
2019-08-26 11:44:49 +00:00
|
|
|
void purge(void) {
|
2019-08-26 11:44:49 +00:00
|
|
|
logger(DEBUG_PROTOCOL, LOG_DEBUG, "Purging unreachable nodes");
|
2019-08-26 11:44:36 +00:00
|
|
|
|
|
|
|
/* Remove all edges and subnets owned by unreachable nodes. */
|
|
|
|
|
2019-08-26 11:44:49 +00:00
|
|
|
for splay_each(node_t, n, node_tree) {
|
2019-08-26 11:44:36 +00:00
|
|
|
if(!n->status.reachable) {
|
2019-08-26 11:44:49 +00:00
|
|
|
logger(DEBUG_SCARY_THINGS, LOG_DEBUG, "Purging node %s (%s)", n->name, n->hostname);
|
2019-08-26 11:44:36 +00:00
|
|
|
|
2019-08-26 11:44:49 +00:00
|
|
|
for splay_each(subnet_t, s, n->subnet_tree) {
|
|
|
|
send_del_subnet(everyone, s);
|
2019-08-26 11:44:53 +00:00
|
|
|
|
|
|
|
if(!strictsubnets) {
|
2019-08-26 11:44:40 +00:00
|
|
|
subnet_del(n, s);
|
2019-08-26 11:44:53 +00:00
|
|
|
}
|
2019-08-26 11:44:36 +00:00
|
|
|
}
|
|
|
|
|
2019-08-26 11:44:49 +00:00
|
|
|
for splay_each(edge_t, e, n->edge_tree) {
|
2019-08-26 11:44:53 +00:00
|
|
|
if(!tunnelserver) {
|
2019-08-26 11:44:49 +00:00
|
|
|
send_del_edge(everyone, e);
|
2019-08-26 11:44:53 +00:00
|
|
|
}
|
|
|
|
|
2019-08-26 11:44:36 +00:00
|
|
|
edge_del(e);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Check if anyone else claims to have an edge to an unreachable node. If not, delete node. */
|
|
|
|
|
2019-08-26 11:44:49 +00:00
|
|
|
for splay_each(node_t, n, node_tree) {
|
2019-08-26 11:44:36 +00:00
|
|
|
if(!n->status.reachable) {
|
2019-08-26 11:44:49 +00:00
|
|
|
for splay_each(edge_t, e, edge_weight_tree)
|
2019-08-26 11:44:53 +00:00
|
|
|
if(e->to == n) {
|
2019-08-26 11:44:49 +00:00
|
|
|
return;
|
2019-08-26 11:44:53 +00:00
|
|
|
}
|
2019-08-26 11:44:36 +00:00
|
|
|
|
2019-08-26 11:44:50 +00:00
|
|
|
if(!autoconnect && (!strictsubnets || !n->subnet_tree->head))
|
2019-08-26 11:44:40 +00:00
|
|
|
/* in strictsubnets mode do not delete nodes with subnets */
|
2019-08-26 11:44:53 +00:00
|
|
|
{
|
2019-08-26 11:44:36 +00:00
|
|
|
node_del(n);
|
2019-08-26 11:44:53 +00:00
|
|
|
}
|
2019-08-26 11:44:48 +00:00
|
|
|
}
|
2019-08-26 11:44:36 +00:00
|
|
|
}
|
2019-08-26 11:44:49 +00:00
|
|
|
}
|
|
|
|
|
2019-08-26 11:44:53 +00:00
|
|
|
/* Put a misbehaving connection in the tarpit */
|
|
|
|
void tarpit(int fd) {
|
|
|
|
static int pits[10] = {-1, -1, -1, -1, -1, -1, -1, -1, -1, -1};
|
|
|
|
static unsigned int next_pit = 0;
|
|
|
|
|
|
|
|
if(pits[next_pit] != -1) {
|
|
|
|
closesocket(pits[next_pit]);
|
|
|
|
}
|
|
|
|
|
|
|
|
pits[next_pit++] = fd;
|
|
|
|
|
|
|
|
if(next_pit >= sizeof pits / sizeof pits[0]) {
|
|
|
|
next_pit = 0;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-08-26 11:44:36 +00:00
|
|
|
/*
|
|
|
|
Terminate a connection:
|
2019-08-26 11:44:49 +00:00
|
|
|
- Mark it as inactive
|
|
|
|
- Remove the edge representing this connection
|
|
|
|
- Kill it with fire
|
2019-08-26 11:44:36 +00:00
|
|
|
- Check if we need to retry making an outgoing connection
|
|
|
|
*/
|
2019-08-26 11:44:38 +00:00
|
|
|
void terminate_connection(connection_t *c, bool report) {
|
2019-08-26 11:44:49 +00:00
|
|
|
logger(DEBUG_CONNECTIONS, LOG_NOTICE, "Closing connection with %s (%s)", c->name, c->hostname);
|
2019-08-26 11:44:36 +00:00
|
|
|
|
2019-08-26 11:44:52 +00:00
|
|
|
if(c->node) {
|
2019-08-26 11:44:53 +00:00
|
|
|
if(c->node->connection == c) {
|
2019-08-26 11:44:52 +00:00
|
|
|
c->node->connection = NULL;
|
2019-08-26 11:44:53 +00:00
|
|
|
}
|
2019-08-26 11:44:36 +00:00
|
|
|
|
2019-08-26 11:44:52 +00:00
|
|
|
if(c->edge) {
|
2019-08-26 11:44:53 +00:00
|
|
|
if(report && !tunnelserver) {
|
2019-08-26 11:44:52 +00:00
|
|
|
send_del_edge(everyone, c->edge);
|
2019-08-26 11:44:53 +00:00
|
|
|
}
|
2019-08-26 11:44:36 +00:00
|
|
|
|
2019-08-26 11:44:52 +00:00
|
|
|
edge_del(c->edge);
|
|
|
|
c->edge = NULL;
|
2019-08-26 11:44:36 +00:00
|
|
|
|
2019-08-26 11:44:52 +00:00
|
|
|
/* Run MST and SSSP algorithms */
|
2019-08-26 11:44:36 +00:00
|
|
|
|
2019-08-26 11:44:52 +00:00
|
|
|
graph();
|
2019-08-26 11:44:36 +00:00
|
|
|
|
2019-08-26 11:44:52 +00:00
|
|
|
/* If the node is not reachable anymore but we remember it had an edge to us, clean it up */
|
2019-08-26 11:44:36 +00:00
|
|
|
|
2019-08-26 11:44:52 +00:00
|
|
|
if(report && !c->node->status.reachable) {
|
|
|
|
edge_t *e;
|
|
|
|
e = lookup_edge(c->node, myself);
|
2019-08-26 11:44:53 +00:00
|
|
|
|
2019-08-26 11:44:52 +00:00
|
|
|
if(e) {
|
2019-08-26 11:44:53 +00:00
|
|
|
if(!tunnelserver) {
|
2019-08-26 11:44:52 +00:00
|
|
|
send_del_edge(everyone, e);
|
2019-08-26 11:44:53 +00:00
|
|
|
}
|
|
|
|
|
2019-08-26 11:44:52 +00:00
|
|
|
edge_del(e);
|
|
|
|
}
|
2019-08-26 11:44:36 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-08-26 11:44:49 +00:00
|
|
|
outgoing_t *outgoing = c->outgoing;
|
|
|
|
connection_del(c);
|
2019-08-26 11:44:36 +00:00
|
|
|
|
2019-08-26 11:44:49 +00:00
|
|
|
/* Check if this was our outgoing connection */
|
2019-08-26 11:44:44 +00:00
|
|
|
|
2019-08-26 11:44:53 +00:00
|
|
|
if(outgoing) {
|
2019-08-26 11:44:49 +00:00
|
|
|
do_outgoing_connection(outgoing);
|
2019-08-26 11:44:53 +00:00
|
|
|
}
|
2019-08-26 11:44:51 +00:00
|
|
|
|
|
|
|
#ifndef HAVE_MINGW
|
|
|
|
/* Clean up dead proxy processes */
|
|
|
|
|
|
|
|
while(waitpid(-1, NULL, WNOHANG) > 0);
|
2019-08-26 11:44:53 +00:00
|
|
|
|
2019-08-26 11:44:51 +00:00
|
|
|
#endif
|
2019-08-26 11:44:36 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
Check if the other end is active.
|
|
|
|
If we have sent packets, but didn't receive any,
|
|
|
|
then possibly the other end is dead. We send a
|
|
|
|
PING request over the meta connection. If the other
|
|
|
|
end does not reply in time, we consider them dead
|
|
|
|
and close the connection.
|
|
|
|
*/
|
2019-08-26 11:44:50 +00:00
|
|
|
static void timeout_handler(void *data) {
|
2019-08-26 11:44:52 +00:00
|
|
|
|
|
|
|
bool close_all_connections = false;
|
|
|
|
|
|
|
|
/*
|
2019-08-26 11:44:53 +00:00
|
|
|
timeout_handler will start after 30 seconds from start of tincd
|
|
|
|
hold information about the elapsed time since last time the handler
|
|
|
|
has been run
|
2019-08-26 11:44:52 +00:00
|
|
|
*/
|
|
|
|
long sleep_time = now.tv_sec - last_periodic_run_time.tv_sec;
|
2019-08-26 11:44:53 +00:00
|
|
|
|
2019-08-26 11:44:52 +00:00
|
|
|
/*
|
2019-08-26 11:44:53 +00:00
|
|
|
It seems that finding sane default value is harder than expected
|
|
|
|
Since we send every second a UDP packet to make holepunching work
|
|
|
|
And default UDP state expire on firewalls is between 15-30 seconds
|
|
|
|
we drop all connections after 60 Seconds - UDPDiscoveryTimeout=30
|
|
|
|
by default
|
2019-08-26 11:44:52 +00:00
|
|
|
*/
|
2019-08-26 11:44:53 +00:00
|
|
|
if(sleep_time > 2 * udp_discovery_timeout) {
|
2019-08-26 11:44:52 +00:00
|
|
|
logger(DEBUG_ALWAYS, LOG_ERR, "Awaking from dead after %ld seconds of sleep", sleep_time);
|
|
|
|
/*
|
2019-08-26 11:44:53 +00:00
|
|
|
Do not send any packets to tinc after we wake up.
|
|
|
|
The other node probably closed our connection but we still
|
|
|
|
are holding context information to them. This may happen on
|
|
|
|
laptops or any other hardware which can be suspended for some time.
|
|
|
|
Sending any data to node that wasn't expecting it will produce
|
|
|
|
annoying and misleading errors on the other side about failed signature
|
|
|
|
verification and or about missing sptps context
|
2019-08-26 11:44:52 +00:00
|
|
|
*/
|
|
|
|
close_all_connections = true;
|
|
|
|
}
|
2019-08-26 11:44:53 +00:00
|
|
|
|
2019-08-26 11:44:52 +00:00
|
|
|
last_periodic_run_time = now;
|
|
|
|
|
2019-08-26 11:44:49 +00:00
|
|
|
for list_each(connection_t, c, connection_list) {
|
2019-08-26 11:44:52 +00:00
|
|
|
// control connections (eg. tinc ctl) do not have any timeout
|
2019-08-26 11:44:53 +00:00
|
|
|
if(c->status.control) {
|
2019-08-26 11:44:49 +00:00
|
|
|
continue;
|
2019-08-26 11:44:53 +00:00
|
|
|
}
|
2019-08-26 11:44:36 +00:00
|
|
|
|
2019-08-26 11:44:52 +00:00
|
|
|
if(close_all_connections) {
|
|
|
|
logger(DEBUG_ALWAYS, LOG_ERR, "Forcing connection close after sleep time %s (%s)", c->name, c->hostname);
|
2019-08-26 11:44:51 +00:00
|
|
|
terminate_connection(c, c->edge);
|
2019-08-26 11:44:52 +00:00
|
|
|
continue;
|
2019-08-26 11:44:36 +00:00
|
|
|
}
|
2019-08-26 11:44:52 +00:00
|
|
|
|
2019-08-26 11:44:52 +00:00
|
|
|
// Bail out early if we haven't reached the ping timeout for this node yet
|
2019-08-26 11:44:53 +00:00
|
|
|
if(c->last_ping_time + pingtimeout > now.tv_sec) {
|
2019-08-26 11:44:52 +00:00
|
|
|
continue;
|
2019-08-26 11:44:53 +00:00
|
|
|
}
|
2019-08-26 11:44:52 +00:00
|
|
|
|
|
|
|
// timeout during connection establishing
|
|
|
|
if(!c->edge) {
|
2019-08-26 11:44:53 +00:00
|
|
|
if(c->status.connecting) {
|
2019-08-26 11:44:52 +00:00
|
|
|
logger(DEBUG_CONNECTIONS, LOG_WARNING, "Timeout while connecting to %s (%s)", c->name, c->hostname);
|
2019-08-26 11:44:53 +00:00
|
|
|
} else {
|
2019-08-26 11:44:52 +00:00
|
|
|
logger(DEBUG_CONNECTIONS, LOG_WARNING, "Timeout from %s (%s) during authentication", c->name, c->hostname);
|
2019-08-26 11:44:53 +00:00
|
|
|
c->status.tarpit = true;
|
|
|
|
}
|
2019-08-26 11:44:52 +00:00
|
|
|
|
|
|
|
terminate_connection(c, c->edge);
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
|
|
|
|
// helps in UDP holepunching
|
|
|
|
try_tx(c->node, false);
|
|
|
|
|
|
|
|
// timeout during ping
|
|
|
|
if(c->status.pinged) {
|
2019-08-26 11:44:52 +00:00
|
|
|
logger(DEBUG_CONNECTIONS, LOG_INFO, "%s (%s) didn't respond to PING in %ld seconds", c->name, c->hostname, (long)(now.tv_sec - c->last_ping_time));
|
2019-08-26 11:44:52 +00:00
|
|
|
terminate_connection(c, c->edge);
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
|
|
|
|
// check whether we need to send a new ping
|
2019-08-26 11:44:53 +00:00
|
|
|
if(c->last_ping_time + pinginterval <= now.tv_sec) {
|
2019-08-26 11:44:52 +00:00
|
|
|
send_ping(c);
|
2019-08-26 11:44:53 +00:00
|
|
|
}
|
2019-08-26 11:44:36 +00:00
|
|
|
}
|
2019-08-26 11:44:48 +00:00
|
|
|
|
2019-08-26 11:44:53 +00:00
|
|
|
timeout_set(data, &(struct timeval) {
|
|
|
|
1, rand() % 100000
|
|
|
|
});
|
2019-08-26 11:44:50 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
static void periodic_handler(void *data) {
|
|
|
|
/* Check if there are too many contradicting ADD_EDGE and DEL_EDGE messages.
|
|
|
|
This usually only happens when another node has the same Name as this node.
|
|
|
|
If so, sleep for a short while to prevent a storm of contradicting messages.
|
|
|
|
*/
|
|
|
|
|
2019-08-26 11:44:49 +00:00
|
|
|
if(contradicting_del_edge > 100 && contradicting_add_edge > 100) {
|
2019-08-26 11:44:49 +00:00
|
|
|
logger(DEBUG_ALWAYS, LOG_WARNING, "Possible node with same Name as us! Sleeping %d seconds.", sleeptime);
|
2019-08-26 11:44:53 +00:00
|
|
|
nanosleep(&(struct timespec) {
|
|
|
|
sleeptime, 0
|
|
|
|
}, NULL);
|
2019-08-26 11:44:49 +00:00
|
|
|
sleeptime *= 2;
|
2019-08-26 11:44:53 +00:00
|
|
|
|
|
|
|
if(sleeptime < 0) {
|
2019-08-26 11:44:49 +00:00
|
|
|
sleeptime = 3600;
|
2019-08-26 11:44:53 +00:00
|
|
|
}
|
2019-08-26 11:44:49 +00:00
|
|
|
} else {
|
|
|
|
sleeptime /= 2;
|
2019-08-26 11:44:53 +00:00
|
|
|
|
|
|
|
if(sleeptime < 10) {
|
2019-08-26 11:44:49 +00:00
|
|
|
sleeptime = 10;
|
2019-08-26 11:44:53 +00:00
|
|
|
}
|
2019-08-26 11:44:36 +00:00
|
|
|
}
|
|
|
|
|
2019-08-26 11:44:49 +00:00
|
|
|
contradicting_add_edge = 0;
|
|
|
|
contradicting_del_edge = 0;
|
2019-08-26 11:44:36 +00:00
|
|
|
|
2019-08-26 11:44:50 +00:00
|
|
|
/* If AutoConnect is set, check if we need to make or break connections. */
|
|
|
|
|
2019-08-26 11:44:53 +00:00
|
|
|
if(autoconnect && node_tree->count > 1) {
|
2019-08-26 11:44:52 +00:00
|
|
|
do_autoconnect();
|
2019-08-26 11:44:53 +00:00
|
|
|
}
|
2019-08-26 11:44:50 +00:00
|
|
|
|
2019-08-26 11:44:53 +00:00
|
|
|
timeout_set(data, &(struct timeval) {
|
|
|
|
5, rand() % 100000
|
|
|
|
});
|
2019-08-26 11:44:49 +00:00
|
|
|
}
|
2019-08-26 11:44:36 +00:00
|
|
|
|
2019-08-26 11:44:50 +00:00
|
|
|
void handle_meta_connection_data(connection_t *c) {
|
2019-08-26 11:44:53 +00:00
|
|
|
if(!receive_meta(c)) {
|
|
|
|
if(!c->status.control) {
|
|
|
|
c->status.tarpit = true;
|
|
|
|
}
|
|
|
|
|
2019-08-26 11:44:51 +00:00
|
|
|
terminate_connection(c, c->edge);
|
2019-08-26 11:44:49 +00:00
|
|
|
return;
|
2019-08-26 11:44:36 +00:00
|
|
|
}
|
2019-08-26 11:44:36 +00:00
|
|
|
}
|
|
|
|
|
2019-08-26 11:44:50 +00:00
|
|
|
#ifndef HAVE_MINGW
|
2019-08-26 11:44:50 +00:00
|
|
|
static void sigterm_handler(void *data) {
|
|
|
|
logger(DEBUG_ALWAYS, LOG_NOTICE, "Got %s signal", strsignal(((signal_t *)data)->signum));
|
|
|
|
event_exit();
|
2019-08-26 11:44:49 +00:00
|
|
|
}
|
2019-08-26 11:44:48 +00:00
|
|
|
|
2019-08-26 11:44:50 +00:00
|
|
|
static void sighup_handler(void *data) {
|
|
|
|
logger(DEBUG_ALWAYS, LOG_NOTICE, "Got %s signal", strsignal(((signal_t *)data)->signum));
|
2019-08-26 11:44:49 +00:00
|
|
|
reopenlogger();
|
2019-08-26 11:44:53 +00:00
|
|
|
|
|
|
|
if(reload_configuration()) {
|
2019-08-26 11:44:51 +00:00
|
|
|
exit(1);
|
2019-08-26 11:44:53 +00:00
|
|
|
}
|
2019-08-26 11:44:49 +00:00
|
|
|
}
|
2019-08-26 11:44:48 +00:00
|
|
|
|
2019-08-26 11:44:50 +00:00
|
|
|
static void sigalrm_handler(void *data) {
|
|
|
|
logger(DEBUG_ALWAYS, LOG_NOTICE, "Got %s signal", strsignal(((signal_t *)data)->signum));
|
2019-08-26 11:44:49 +00:00
|
|
|
retry();
|
|
|
|
}
|
2019-08-26 11:44:50 +00:00
|
|
|
#endif
|
2019-08-26 11:44:41 +00:00
|
|
|
|
2019-08-26 11:44:49 +00:00
|
|
|
int reload_configuration(void) {
|
2019-08-26 11:44:52 +00:00
|
|
|
char fname[PATH_MAX];
|
2019-08-26 11:44:36 +00:00
|
|
|
|
2019-08-26 11:44:49 +00:00
|
|
|
/* Reread our own configuration file */
|
2019-08-26 11:44:48 +00:00
|
|
|
|
2019-08-26 11:44:49 +00:00
|
|
|
exit_configuration(&config_tree);
|
|
|
|
init_configuration(&config_tree);
|
2019-08-26 11:44:41 +00:00
|
|
|
|
2019-08-26 11:44:49 +00:00
|
|
|
if(!read_server_config()) {
|
2019-08-26 11:44:51 +00:00
|
|
|
logger(DEBUG_ALWAYS, LOG_ERR, "Unable to reread configuration file.");
|
2019-08-26 11:44:49 +00:00
|
|
|
return EINVAL;
|
|
|
|
}
|
2019-08-26 11:44:41 +00:00
|
|
|
|
2019-08-26 11:44:49 +00:00
|
|
|
read_config_options(config_tree, NULL);
|
2019-08-26 11:44:48 +00:00
|
|
|
|
2019-08-26 11:44:53 +00:00
|
|
|
snprintf(fname, sizeof(fname), "%s" SLASH "hosts" SLASH "%s", confbase, myself->name);
|
|
|
|
read_config_file(config_tree, fname, true);
|
2019-08-26 11:44:36 +00:00
|
|
|
|
2019-08-26 11:44:49 +00:00
|
|
|
/* Parse some options that are allowed to be changed while tinc is running */
|
2019-08-26 11:44:36 +00:00
|
|
|
|
2019-08-26 11:44:49 +00:00
|
|
|
setup_myself_reloadable();
|
2019-08-26 11:44:36 +00:00
|
|
|
|
2019-08-26 11:44:49 +00:00
|
|
|
/* If StrictSubnet is set, expire deleted Subnets and read new ones in */
|
2019-08-26 11:44:36 +00:00
|
|
|
|
2019-08-26 11:44:49 +00:00
|
|
|
if(strictsubnets) {
|
|
|
|
for splay_each(subnet_t, subnet, subnet_tree)
|
2019-08-26 11:44:53 +00:00
|
|
|
if(subnet->owner) {
|
2019-08-26 11:44:51 +00:00
|
|
|
subnet->expires = 1;
|
2019-08-26 11:44:53 +00:00
|
|
|
}
|
2019-08-26 11:44:52 +00:00
|
|
|
}
|
2019-08-26 11:44:36 +00:00
|
|
|
|
2019-08-26 11:44:53 +00:00
|
|
|
for splay_each(node_t, n, node_tree) {
|
2019-08-26 11:44:52 +00:00
|
|
|
n->status.has_address = false;
|
2019-08-26 11:44:53 +00:00
|
|
|
}
|
2019-08-26 11:44:49 +00:00
|
|
|
|
2019-08-26 11:44:52 +00:00
|
|
|
load_all_nodes();
|
|
|
|
|
|
|
|
if(strictsubnets) {
|
2019-08-26 11:44:49 +00:00
|
|
|
for splay_each(subnet_t, subnet, subnet_tree) {
|
2019-08-26 11:44:53 +00:00
|
|
|
if(!subnet->owner) {
|
2019-08-26 11:44:51 +00:00
|
|
|
continue;
|
2019-08-26 11:44:53 +00:00
|
|
|
}
|
|
|
|
|
2019-08-26 11:44:49 +00:00
|
|
|
if(subnet->expires == 1) {
|
2019-08-26 11:44:49 +00:00
|
|
|
send_del_subnet(everyone, subnet);
|
2019-08-26 11:44:53 +00:00
|
|
|
|
|
|
|
if(subnet->owner->status.reachable) {
|
2019-08-26 11:44:49 +00:00
|
|
|
subnet_update(subnet->owner, subnet, false);
|
2019-08-26 11:44:53 +00:00
|
|
|
}
|
|
|
|
|
2019-08-26 11:44:49 +00:00
|
|
|
subnet_del(subnet->owner, subnet);
|
|
|
|
} else if(subnet->expires == -1) {
|
|
|
|
subnet->expires = 0;
|
2019-08-26 11:44:41 +00:00
|
|
|
} else {
|
2019-08-26 11:44:49 +00:00
|
|
|
send_add_subnet(everyone, subnet);
|
2019-08-26 11:44:53 +00:00
|
|
|
|
|
|
|
if(subnet->owner->status.reachable) {
|
2019-08-26 11:44:49 +00:00
|
|
|
subnet_update(subnet->owner, subnet, true);
|
2019-08-26 11:44:53 +00:00
|
|
|
}
|
2019-08-26 11:44:40 +00:00
|
|
|
}
|
2019-08-26 11:44:36 +00:00
|
|
|
}
|
2019-08-26 11:44:49 +00:00
|
|
|
} else { /* Only read our own subnets back in */
|
|
|
|
for splay_each(subnet_t, subnet, myself->subnet_tree)
|
2019-08-26 11:44:53 +00:00
|
|
|
if(!subnet->expires) {
|
2019-08-26 11:44:49 +00:00
|
|
|
subnet->expires = 1;
|
2019-08-26 11:44:53 +00:00
|
|
|
}
|
2019-08-26 11:44:49 +00:00
|
|
|
|
|
|
|
config_t *cfg = lookup_config(config_tree, "Subnet");
|
|
|
|
|
|
|
|
while(cfg) {
|
|
|
|
subnet_t *subnet, *s2;
|
|
|
|
|
2019-08-26 11:44:53 +00:00
|
|
|
if(!get_config_subnet(cfg, &subnet)) {
|
2019-08-26 11:44:49 +00:00
|
|
|
continue;
|
2019-08-26 11:44:53 +00:00
|
|
|
}
|
2019-08-26 11:44:49 +00:00
|
|
|
|
|
|
|
if((s2 = lookup_subnet(myself, subnet))) {
|
2019-08-26 11:44:53 +00:00
|
|
|
if(s2->expires == 1) {
|
2019-08-26 11:44:49 +00:00
|
|
|
s2->expires = 0;
|
2019-08-26 11:44:53 +00:00
|
|
|
}
|
2019-08-26 11:44:49 +00:00
|
|
|
|
|
|
|
free_subnet(subnet);
|
|
|
|
} else {
|
|
|
|
subnet_add(myself, subnet);
|
|
|
|
send_add_subnet(everyone, subnet);
|
|
|
|
subnet_update(myself, subnet, true);
|
|
|
|
}
|
|
|
|
|
|
|
|
cfg = lookup_config_next(config_tree, cfg);
|
|
|
|
}
|
|
|
|
|
|
|
|
for splay_each(subnet_t, subnet, myself->subnet_tree) {
|
|
|
|
if(subnet->expires == 1) {
|
|
|
|
send_del_subnet(everyone, subnet);
|
|
|
|
subnet_update(myself, subnet, false);
|
|
|
|
subnet_del(myself, subnet);
|
|
|
|
}
|
|
|
|
}
|
2019-08-26 11:44:49 +00:00
|
|
|
}
|
2019-08-26 11:44:36 +00:00
|
|
|
|
2019-08-26 11:44:49 +00:00
|
|
|
/* Try to make outgoing connections */
|
2019-08-26 11:44:49 +00:00
|
|
|
|
2019-08-26 11:44:49 +00:00
|
|
|
try_outgoing_connections();
|
2019-08-26 11:44:48 +00:00
|
|
|
|
2019-08-26 11:44:49 +00:00
|
|
|
/* Close connections to hosts that have a changed or deleted host config file */
|
|
|
|
|
|
|
|
for list_each(connection_t, c, connection_list) {
|
2019-08-26 11:44:53 +00:00
|
|
|
if(c->status.control) {
|
2019-08-26 11:44:49 +00:00
|
|
|
continue;
|
2019-08-26 11:44:53 +00:00
|
|
|
}
|
2019-08-26 11:44:49 +00:00
|
|
|
|
2019-08-26 11:44:53 +00:00
|
|
|
snprintf(fname, sizeof(fname), "%s" SLASH "hosts" SLASH "%s", confbase, c->name);
|
2019-08-26 11:44:49 +00:00
|
|
|
struct stat s;
|
2019-08-26 11:44:53 +00:00
|
|
|
|
2019-08-26 11:44:49 +00:00
|
|
|
if(stat(fname, &s) || s.st_mtime > last_config_check) {
|
|
|
|
logger(DEBUG_CONNECTIONS, LOG_INFO, "Host config file of %s has been changed", c->name);
|
2019-08-26 11:44:51 +00:00
|
|
|
terminate_connection(c, c->edge);
|
2019-08-26 11:44:49 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-08-26 11:44:50 +00:00
|
|
|
last_config_check = now.tv_sec;
|
2019-08-26 11:44:49 +00:00
|
|
|
|
2019-08-26 11:44:49 +00:00
|
|
|
return 0;
|
|
|
|
}
|
2019-08-26 11:44:48 +00:00
|
|
|
|
2019-08-26 11:44:49 +00:00
|
|
|
void retry(void) {
|
2019-08-26 11:44:51 +00:00
|
|
|
/* Reset the reconnection timers for all outgoing connections */
|
|
|
|
for list_each(outgoing_t, outgoing, outgoing_list) {
|
|
|
|
outgoing->timeout = 0;
|
2019-08-26 11:44:53 +00:00
|
|
|
|
2019-08-26 11:44:51 +00:00
|
|
|
if(outgoing->ev.cb)
|
2019-08-26 11:44:53 +00:00
|
|
|
timeout_set(&outgoing->ev, &(struct timeval) {
|
|
|
|
0, 0
|
|
|
|
});
|
2019-08-26 11:44:51 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
/* Check for outgoing connections that are in progress, and reset their ping timers */
|
2019-08-26 11:44:49 +00:00
|
|
|
for list_each(connection_t, c, connection_list) {
|
2019-08-26 11:44:53 +00:00
|
|
|
if(c->outgoing && !c->node) {
|
2019-08-26 11:44:51 +00:00
|
|
|
c->last_ping_time = 0;
|
2019-08-26 11:44:53 +00:00
|
|
|
}
|
2019-08-26 11:44:49 +00:00
|
|
|
}
|
2019-08-26 11:44:51 +00:00
|
|
|
|
|
|
|
/* Kick the ping timeout handler */
|
2019-08-26 11:44:53 +00:00
|
|
|
timeout_set(&pingtimer, &(struct timeval) {
|
|
|
|
0, 0
|
|
|
|
});
|
2019-08-26 11:44:49 +00:00
|
|
|
}
|
2019-08-26 11:44:36 +00:00
|
|
|
|
2019-08-26 11:44:49 +00:00
|
|
|
/*
|
|
|
|
this is where it all happens...
|
|
|
|
*/
|
|
|
|
int main_loop(void) {
|
2019-08-26 11:44:52 +00:00
|
|
|
last_periodic_run_time = now;
|
2019-08-26 11:44:53 +00:00
|
|
|
timeout_add(&pingtimer, timeout_handler, &pingtimer, &(struct timeval) {
|
|
|
|
pingtimeout, rand() % 100000
|
|
|
|
});
|
|
|
|
timeout_add(&periodictimer, periodic_handler, &periodictimer, &(struct timeval) {
|
|
|
|
0, 0
|
|
|
|
});
|
2019-08-26 11:44:48 +00:00
|
|
|
|
2019-08-26 11:44:49 +00:00
|
|
|
#ifndef HAVE_MINGW
|
2019-08-26 11:44:50 +00:00
|
|
|
signal_t sighup = {0};
|
|
|
|
signal_t sigterm = {0};
|
|
|
|
signal_t sigquit = {0};
|
2019-08-26 11:44:50 +00:00
|
|
|
signal_t sigint = {0};
|
2019-08-26 11:44:50 +00:00
|
|
|
signal_t sigalrm = {0};
|
|
|
|
|
|
|
|
signal_add(&sighup, sighup_handler, &sighup, SIGHUP);
|
|
|
|
signal_add(&sigterm, sigterm_handler, &sigterm, SIGTERM);
|
|
|
|
signal_add(&sigquit, sigterm_handler, &sigquit, SIGQUIT);
|
2019-08-26 11:44:50 +00:00
|
|
|
signal_add(&sigint, sigterm_handler, &sigint, SIGINT);
|
2019-08-26 11:44:50 +00:00
|
|
|
signal_add(&sigalrm, sigalrm_handler, &sigalrm, SIGALRM);
|
2019-08-26 11:44:49 +00:00
|
|
|
#endif
|
2019-08-26 11:44:37 +00:00
|
|
|
|
2019-08-26 11:44:50 +00:00
|
|
|
if(!event_loop()) {
|
2019-08-26 11:44:51 +00:00
|
|
|
logger(DEBUG_ALWAYS, LOG_ERR, "Error while waiting for input: %s", sockstrerror(sockerrno));
|
2019-08-26 11:44:49 +00:00
|
|
|
return 1;
|
2019-08-26 11:44:36 +00:00
|
|
|
}
|
|
|
|
|
2019-08-26 11:44:49 +00:00
|
|
|
#ifndef HAVE_MINGW
|
2019-08-26 11:44:50 +00:00
|
|
|
signal_del(&sighup);
|
|
|
|
signal_del(&sigterm);
|
2019-08-26 11:44:51 +00:00
|
|
|
signal_del(&sigquit);
|
|
|
|
signal_del(&sigint);
|
|
|
|
signal_del(&sigalrm);
|
2019-08-26 11:44:41 +00:00
|
|
|
#endif
|
|
|
|
|
2019-08-26 11:44:50 +00:00
|
|
|
timeout_del(&periodictimer);
|
|
|
|
timeout_del(&pingtimer);
|
2019-08-26 11:44:49 +00:00
|
|
|
|
2019-08-26 11:44:36 +00:00
|
|
|
return 0;
|
2019-08-26 11:44:36 +00:00
|
|
|
}
|