2 This file is part of GNUnet.
3 Copyright (C) 2016, 2017 GNUnet e.V.
5 GNUnet is free software: you can redistribute it and/or modify it
6 under the terms of the GNU Affero General Public License as published
7 by the Free Software Foundation, either version 3 of the License,
8 or (at your option) any later version.
10 GNUnet is distributed in the hope that it will be useful, but
11 WITHOUT ANY WARRANTY; without even the implied warranty of
12 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
13 Affero General Public License for more details.
15 You should have received a copy of the GNU Affero General Public License
16 along with this program. If not, see <http://www.gnu.org/licenses/>.
18 SPDX-License-Identifier: AGPL3.0-or-later
22 * @file nat/gnunet-service-nat.c
23 * @brief network address translation traversal service
24 * @author Christian Grothoff
26 * The purpose of this service is to enable transports to
27 * traverse NAT routers, by providing traversal options and
28 * knowledge about the local network topology.
31 * - migrate test cases to new NAT service
32 * - add new traceroute-based logic for external IP detection
34 * - implement & test STUN processing to classify NAT;
35 * basically, open port & try different methods.
39 #include "gnunet_util_lib.h"
40 #include "gnunet_protocols.h"
41 #include "gnunet_signatures.h"
42 #include "gnunet_statistics_service.h"
43 #include "gnunet_resolver_service.h"
44 #include "gnunet_nat_service.h"
45 #include "gnunet-service-nat.h"
46 #include "gnunet-service-nat_externalip.h"
47 #include "gnunet-service-nat_stun.h"
48 #include "gnunet-service-nat_mini.h"
49 #include "gnunet-service-nat_helper.h"
55 * How often should we ask the OS about a list of active
58 #define SCAN_FREQ GNUNET_TIME_relative_multiply (GNUNET_TIME_UNIT_SECONDS, 15)
61 * How long do we wait until we forcefully terminate autoconfiguration?
63 #define AUTOCONFIG_TIMEOUT GNUNET_TIME_relative_multiply ( \
64 GNUNET_TIME_UNIT_SECONDS, 5)
67 * How often do we scan for changes in how our external (dyndns) hostname resolves?
69 #define DYNDNS_FREQUENCY GNUNET_TIME_relative_multiply ( \
70 GNUNET_TIME_UNIT_MINUTES, 7)
74 * Information we track per client address.
79 * Network address used by the client.
81 struct sockaddr_storage ss;
84 * Handle to active UPnP request where we asked upnpc to open
85 * a port at the NAT. NULL if we do not have such a request
88 struct GNUNET_NAT_MiniHandle *mh;
93 * List of local addresses this system has.
95 struct LocalAddressList
98 * This is a linked list.
100 struct LocalAddressList *next;
105 struct LocalAddressList *prev;
108 * Context for a gnunet-helper-nat-server used to listen
109 * for ICMP messages to this client for connection reversal.
111 struct HelperContext *hc;
114 * The address itself (i.e. `struct sockaddr_in` or `struct
115 * sockaddr_in6`, in the respective byte order).
117 struct sockaddr_storage addr;
120 * Address family. (FIXME: redundant, addr.ss_family! Remove!?)
125 * #GNUNET_YES if we saw this one in the previous iteration,
126 * but not in the current iteration and thus might need to
127 * remove it at the end.
132 * What type of address is this?
134 enum GNUNET_NAT_AddressClass ac;
139 * Internal data structure we track for each of our clients.
146 struct ClientHandle *next;
151 struct ClientHandle *prev;
154 * Underlying handle for this client with the service.
156 struct GNUNET_SERVICE_Client *client;
159 * Message queue for communicating with the client.
161 struct GNUNET_MQ_Handle *mq;
164 * Array of addresses used by the service.
166 struct ClientAddress *caddrs;
169 * External DNS name and port given by user due to manual
170 * hole punching. Special DNS name 'AUTO' is used to indicate
171 * desire for automatic determination of the external IP
172 * (instead of DNS or manual configuration, i.e. to be used
173 * if the IP keeps changing and we have no DynDNS, but we do
174 * have a hole punched).
179 * Name of the configuration section this client cares about.
184 * Task for periodically re-running the @e ext_dns DNS lookup.
186 struct GNUNET_SCHEDULER_Task *ext_dns_task;
189 * Handle for (DYN)DNS lookup of our external IP as given in
192 struct GNUNET_RESOLVER_RequestHandle *ext_dns;
195 * Handle for monitoring external IP changes.
197 struct GN_ExternalIPMonitor *external_monitor;
200 * DLL of external IP addresses as given in @e hole_external.
202 struct LocalAddressList *ext_addr_head;
205 * DLL of external IP addresses as given in @e hole_external.
207 struct LocalAddressList *ext_addr_tail;
210 * Port number we found in @e hole_external.
212 uint16_t ext_dns_port;
215 * What does this client care about?
217 enum GNUNET_NAT_RegisterFlags flags;
220 * Is any of the @e caddrs in a reserved subnet for NAT?
225 * Number of addresses that this service is bound to.
226 * Length of the @e caddrs array.
231 * Client's IPPROTO, e.g. IPPROTO_UDP or IPPROTO_TCP.
238 * External IP address as given to us via some STUN server.
240 struct StunExternalIP
245 struct StunExternalIP *next;
250 struct StunExternalIP *prev;
253 * Task we run to remove this entry when it is stale.
255 struct GNUNET_SCHEDULER_Task *timeout_task;
258 * Our external IP address as reported by the
261 struct sockaddr_in external_addr;
264 * Address of the reporting STUN server. Used to
265 * detect when a STUN server changes its opinion
266 * to more quickly remove stale results.
268 struct sockaddr_storage stun_server_addr;
271 * Number of bytes used in @e stun_server_addr.
273 size_t stun_server_addr_len;
278 * Timeout to use when STUN data is considered stale.
280 static struct GNUNET_TIME_Relative stun_stale_timeout;
283 * How often do we scan for changes in how our external (dyndns) hostname resolves?
285 static struct GNUNET_TIME_Relative dyndns_frequency;
288 * Handle to our current configuration.
290 static const struct GNUNET_CONFIGURATION_Handle *cfg;
293 * Handle to the statistics service.
295 static struct GNUNET_STATISTICS_Handle *stats;
298 * Task scheduled to periodically scan our network interfaces.
300 static struct GNUNET_SCHEDULER_Task *scan_task;
303 * Head of client DLL.
305 static struct ClientHandle *ch_head;
308 * Tail of client DLL.
310 static struct ClientHandle *ch_tail;
313 * Head of DLL of local addresses.
315 static struct LocalAddressList *lal_head;
318 * Tail of DLL of local addresses.
320 static struct LocalAddressList *lal_tail;
325 static struct StunExternalIP *se_head;
330 static struct StunExternalIP *se_tail;
333 * Is UPnP enabled? #GNUNET_YES if enabled, #GNUNET_NO if disabled,
334 * #GNUNET_SYSERR if configuration enabled but binary is unavailable.
340 * Remove and free an entry from the #lal_head DLL.
342 * @param lal entry to free
345 free_lal (struct LocalAddressList *lal)
347 GNUNET_CONTAINER_DLL_remove (lal_head,
352 GNUNET_log (GNUNET_ERROR_TYPE_MESSAGE,
353 "Lost NATed local address %s, stopping NAT server\n",
354 GNUNET_a2s ((const struct sockaddr *) &lal->addr,
355 sizeof(struct sockaddr_in)));
357 GN_stop_gnunet_nat_server_ (lal->hc);
365 * Free the DLL starting at #lal_head.
370 struct LocalAddressList *lal;
372 while (NULL != (lal = lal_head))
378 * Check validity of #GNUNET_MESSAGE_TYPE_NAT_REGISTER message from
381 * @param cls client who sent the message
382 * @param message the message received
383 * @return #GNUNET_OK if message is well-formed
386 check_register (void *cls,
387 const struct GNUNET_NAT_RegisterMessage *message)
389 uint16_t num_addrs = ntohs (message->num_addrs);
390 const char *off = (const char *) &message[1];
391 size_t left = ntohs (message->header.size) - sizeof(*message);
393 for (unsigned int i = 0; i < num_addrs; i++)
396 const struct sockaddr *sa = (const struct sockaddr *) off;
398 if (sizeof(sa_family_t) > left)
401 return GNUNET_SYSERR;
403 switch (sa->sa_family)
406 alen = sizeof(struct sockaddr_in);
410 alen = sizeof(struct sockaddr_in6);
415 alen = sizeof(struct sockaddr_un);
420 return GNUNET_SYSERR;
425 return GNUNET_SYSERR;
430 if (left != ntohs (message->str_len))
433 return GNUNET_SYSERR;
440 * Check if @a ip is in @a network with @a bits netmask.
442 * @param network to test
443 * @param ip IP address to test
444 * @param bits bitmask for the network
445 * @return #GNUNET_YES if @a ip is in @a network
448 match_ipv4 (const char *network,
449 const struct in_addr *ip,
458 GNUNET_assert (1 == inet_pton (AF_INET,
461 return ! ((ip->s_addr ^ net.s_addr) & htonl (0xFFFFFFFFu << (32 - bits)));
466 * Check if @a ip is in @a network with @a bits netmask.
468 * @param network to test
469 * @param ip IP address to test
470 * @param bits bitmask for the network
471 * @return #GNUNET_YES if @a ip is in @a network
474 match_ipv6 (const char *network,
475 const struct in6_addr *ip,
479 struct in6_addr mask;
484 GNUNET_assert (1 == inet_pton (AF_INET6,
487 memset (&mask, 0, sizeof(mask));
488 if (0 == GNUNET_memcmp (&mask,
494 mask.s6_addr[off++] = 0xFF;
499 mask.s6_addr[off] = (mask.s6_addr[off] >> 1) + 0x80;
502 for (unsigned j = 0; j < sizeof(struct in6_addr) / sizeof(uint32_t); j++)
503 if (((((uint32_t *) ip)[j] & ((uint32_t *) &mask)[j])) !=
504 (((uint32_t *) &net)[j] & ((int *) &mask)[j]))
511 * Test if the given IPv4 address is in a known range
512 * for private networks.
514 * @param ip address to test
515 * @return #GNUNET_YES if @a ip is in a NAT range
518 is_nat_v4 (const struct in_addr *ip)
521 match_ipv4 ("10.0.0.0", ip, 8) || /* RFC 1918 */
522 match_ipv4 ("100.64.0.0", ip, 10) || /* CG-NAT, RFC 6598 */
523 match_ipv4 ("192.168.0.0", ip, 12) || /* RFC 1918 */
524 match_ipv4 ("169.254.0.0", ip, 16) || /* AUTO, RFC 3927 */
525 match_ipv4 ("172.16.0.0", ip, 16); /* RFC 1918 */
530 * Test if the given IPv6 address is in a known range
531 * for private networks.
533 * @param ip address to test
534 * @return #GNUNET_YES if @a ip is in a NAT range
537 is_nat_v6 (const struct in6_addr *ip)
540 match_ipv6 ("fc00::", ip, 7) || /* RFC 4193 */
541 match_ipv6 ("fec0::", ip, 10) || /* RFC 3879 */
542 match_ipv6 ("fe80::", ip, 10); /* RFC 4291, link-local */
547 * Closure for #ifc_proc.
549 struct IfcProcContext
552 * Head of DLL of local addresses.
554 struct LocalAddressList *lal_head;
557 * Tail of DLL of local addresses.
559 struct LocalAddressList *lal_tail;
564 * Callback function invoked for each interface found. Adds them
565 * to our new address list.
567 * @param cls a `struct IfcProcContext *`
568 * @param name name of the interface (can be NULL for unknown)
569 * @param isDefault is this presumably the default interface
570 * @param addr address of this interface (can be NULL for unknown or unassigned)
571 * @param broadcast_addr the broadcast address (can be NULL for unknown or unassigned)
572 * @param netmask the network mask (can be NULL for unknown or unassigned)
573 * @param addrlen length of the address
574 * @return #GNUNET_OK to continue iteration, #GNUNET_SYSERR to abort
580 const struct sockaddr *addr,
581 const struct sockaddr *broadcast_addr,
582 const struct sockaddr *netmask,
585 struct IfcProcContext *ifc_ctx = cls;
586 struct LocalAddressList *lal;
588 const struct in_addr *ip4;
589 const struct in6_addr *ip6;
590 enum GNUNET_NAT_AddressClass ac;
592 switch (addr->sa_family)
595 alen = sizeof(struct sockaddr_in);
596 ip4 = &((const struct sockaddr_in *) addr)->sin_addr;
597 if (match_ipv4 ("127.0.0.0", ip4, 8))
598 ac = GNUNET_NAT_AC_LOOPBACK;
599 else if (is_nat_v4 (ip4))
600 ac = GNUNET_NAT_AC_LAN;
602 ac = GNUNET_NAT_AC_GLOBAL;
606 alen = sizeof(struct sockaddr_in6);
607 ip6 = &((const struct sockaddr_in6 *) addr)->sin6_addr;
608 if (match_ipv6 ("::1", ip6, 128))
609 ac = GNUNET_NAT_AC_LOOPBACK;
610 else if (is_nat_v6 (ip6))
611 ac = GNUNET_NAT_AC_LAN;
613 ac = GNUNET_NAT_AC_GLOBAL;
614 if ((ip6->s6_addr[11] == 0xFF) &&
615 (ip6->s6_addr[12] == 0xFE))
617 /* contains a MAC, be extra careful! */
618 ac |= GNUNET_NAT_AC_PRIVATE;
631 lal = GNUNET_malloc (sizeof(*lal));
632 lal->af = addr->sa_family;
634 GNUNET_memcpy (&lal->addr,
637 GNUNET_CONTAINER_DLL_insert (ifc_ctx->lal_head,
645 * Notify client about a change in the list of addresses this peer
648 * @param ac address class of the entry in the list that changed
649 * @param ch client to contact
650 * @param add #GNUNET_YES to add, #GNUNET_NO to remove
651 * @param addr the address that changed
652 * @param addr_len number of bytes in @a addr
655 notify_client (enum GNUNET_NAT_AddressClass ac,
656 struct ClientHandle *ch,
661 struct GNUNET_MQ_Envelope *env;
662 struct GNUNET_NAT_AddressChangeNotificationMessage *msg;
664 GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
665 "Notifying client about %s of IP %s\n",
666 add ? "addition" : "removal",
669 env = GNUNET_MQ_msg_extra (msg,
671 GNUNET_MESSAGE_TYPE_NAT_ADDRESS_CHANGE);
672 msg->add_remove = htonl (add);
673 msg->addr_class = htonl (ac);
674 GNUNET_memcpy (&msg[1],
677 GNUNET_MQ_send (ch->mq,
683 * Check if we should bother to notify this client about this
684 * address change, and if so, do it.
686 * @param delta the entry in the list that changed
687 * @param ch client to check
688 * @param add #GNUNET_YES to add, #GNUNET_NO to remove
691 check_notify_client (struct LocalAddressList *delta,
692 struct ClientHandle *ch,
696 struct sockaddr_in v4;
697 struct sockaddr_in6 v6;
699 if (0 == (ch->flags & GNUNET_NAT_RF_ADDRESSES))
701 GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
702 "Not notifying client as it does not care about addresses\n");
708 alen = sizeof(struct sockaddr_in);
713 /* Check for client notifications */
714 for (unsigned int i = 0; i < ch->num_caddrs; i++)
716 const struct sockaddr_in *c4;
718 if (AF_INET != ch->caddrs[i].ss.ss_family)
719 continue; /* IPv4 not relevant */
720 c4 = (const struct sockaddr_in *) &ch->caddrs[i].ss;
721 if (match_ipv4 ("127.0.0.1", &c4->sin_addr, 8) &&
722 (0 != c4->sin_addr.s_addr) &&
723 (! match_ipv4 ("127.0.0.1", &v4.sin_addr, 8)))
724 continue; /* bound to loopback, but this is not loopback */
725 if ((! match_ipv4 ("127.0.0.1", &c4->sin_addr, 8)) &&
726 match_ipv4 ("127.0.0.1", &v4.sin_addr, 8))
727 continue; /* bound to non-loopback, but this is loopback */
728 if ((0 != (delta->ac & GNUNET_NAT_AC_EXTERN)) &&
729 (0 != c4->sin_addr.s_addr) &&
730 (! is_nat_v4 (&v4.sin_addr)))
731 continue; /* based on external-IP, but this IP is not
732 from private address range. */
733 if ((0 != GNUNET_memcmp (&v4.sin_addr,
735 (0 != c4->sin_addr.s_addr) &&
736 (! is_nat_v4 (&c4->sin_addr)))
737 continue; /* this IP is not from private address range,
738 and IP does not match. */
740 /* OK, IP seems relevant, notify client */
741 if (0 == htons (v4.sin_port))
742 v4.sin_port = c4->sin_port;
743 notify_client (delta->ac,
752 alen = sizeof(struct sockaddr_in6);
756 for (unsigned int i = 0; i < ch->num_caddrs; i++)
758 const struct sockaddr_in6 *c6;
760 if (AF_INET6 != ch->caddrs[i].ss.ss_family)
761 continue; /* IPv4 not relevant */
762 c6 = (const struct sockaddr_in6 *) &ch->caddrs[i].ss;
763 if (match_ipv6 ("::1", &c6->sin6_addr, 128) &&
764 (0 != GNUNET_memcmp (&c6->sin6_addr,
766 (! match_ipv6 ("::1", &v6.sin6_addr, 128)))
767 continue; /* bound to loopback, but this is not loopback */
768 if ((! match_ipv6 ("::1", &c6->sin6_addr, 128)) &&
769 match_ipv6 ("::1", &v6.sin6_addr, 128))
770 continue; /* bound to non-loopback, but this is loopback */
771 if ((0 != (delta->ac & GNUNET_NAT_AC_EXTERN)) &&
772 (0 != GNUNET_memcmp (&c6->sin6_addr,
774 (! is_nat_v6 (&v6.sin6_addr)))
775 continue; /* based on external-IP, but this IP is not
776 from private address range. */
777 if ((0 != GNUNET_memcmp (&v6.sin6_addr,
779 (0 != GNUNET_memcmp (&c6->sin6_addr,
781 (! is_nat_v6 (&c6->sin6_addr)))
782 continue; /* this IP is not from private address range,
783 and IP does not match. */
784 if ((match_ipv6 ("fe80::", &c6->sin6_addr, 10)) &&
785 (0 != GNUNET_memcmp (&c6->sin6_addr,
787 (0 != GNUNET_memcmp (&v6.sin6_addr,
789 (0 == (delta->ac & GNUNET_NAT_AC_EXTERN)))
790 continue; /* client bound to link-local, and the other address
791 does not match and is not an external IP */
793 /* OK, IP seems relevant, notify client */
794 if (0 == htons (v6.sin6_port))
795 v6.sin6_port = c6->sin6_port;
796 notify_client (delta->ac,
812 * Notify all clients about a change in the list
813 * of addresses this peer has.
815 * @param delta the entry in the list that changed
816 * @param add #GNUNET_YES to add, #GNUNET_NO to remove
819 notify_clients (struct LocalAddressList *delta,
822 for (struct ClientHandle *ch = ch_head;
825 check_notify_client (delta,
832 * Tell relevant client about a change in our external
835 * @param cls client to check if it cares and possibly notify
836 * @param v4 the external address that changed
837 * @param add #GNUNET_YES to add, #GNUNET_NO to remove
840 notify_client_external_ipv4_change (void *cls,
841 const struct in_addr *v4,
844 struct ClientHandle *ch = cls;
845 struct sockaddr_in sa;
848 /* (0) check if this impacts 'hole_external' */
849 if ((NULL != ch->hole_external) &&
850 (0 == strcasecmp (ch->hole_external,
853 struct LocalAddressList lal;
854 struct sockaddr_in *s4;
856 GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
857 "Detected eternal IP, can now back-fill AUTO:%u in hole punching specification of `%s'\n",
858 (unsigned int) ch->ext_dns_port,
860 memset (&lal, 0, sizeof(lal));
861 s4 = (struct sockaddr_in *) &lal.addr;
862 s4->sin_family = AF_INET;
863 s4->sin_port = htons (ch->ext_dns_port);
866 lal.ac = GNUNET_NAT_AC_GLOBAL | GNUNET_NAT_AC_MANUAL;
867 check_notify_client (&lal,
872 /* (1) check if client cares. */
873 if (! ch->natted_address)
876 for (unsigned int i = 0; i < ch->num_caddrs; i++)
878 const struct sockaddr_storage *ss = &ch->caddrs[i].ss;
880 if (AF_INET != ss->ss_family)
882 have_v4 = GNUNET_YES;
885 if (GNUNET_NO == have_v4)
886 return; /* IPv6-only */
888 /* (2) build address info */
892 sa.sin_family = AF_INET;
894 sa.sin_port = htons (0);
896 GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
897 "Detected eternal IP %s, notifying client of external IP (without port)\n",
898 GNUNET_a2s ((const struct sockaddr *) &sa,
900 /* (3) notify client of change */
901 notify_client (is_nat_v4 (v4)
902 ? GNUNET_NAT_AC_EXTERN | GNUNET_NAT_AC_LAN
903 : GNUNET_NAT_AC_EXTERN | GNUNET_NAT_AC_GLOBAL,
912 * We got a connection reversal request from another peer.
913 * Notify applicable clients.
915 * @param cls closure with the `struct LocalAddressList`
916 * @param ra IP address of the peer who wants us to connect to it
919 reversal_callback (void *cls,
920 const struct sockaddr_in *ra)
922 struct LocalAddressList *lal = cls;
923 const struct sockaddr_in *l4;
925 GNUNET_assert (AF_INET == lal->af);
926 l4 = (const struct sockaddr_in *) &lal->addr;
927 for (struct ClientHandle *ch = ch_head;
931 struct GNUNET_NAT_ConnectionReversalRequestedMessage *crrm;
932 struct GNUNET_MQ_Envelope *env;
935 /* Check if client is in applicable range for ICMP NAT traversal
936 for this local address */
937 if (! ch->natted_address)
940 for (unsigned int i = 0; i < ch->num_caddrs; i++)
942 struct ClientAddress *ca = &ch->caddrs[i];
943 const struct sockaddr_in *c4;
945 if (AF_INET != ca->ss.ss_family)
947 c4 = (const struct sockaddr_in *) &ca->ss;
948 if ((0 != c4->sin_addr.s_addr) &&
949 (l4->sin_addr.s_addr != c4->sin_addr.s_addr))
957 /* Notify applicable client about connection reversal request */
958 env = GNUNET_MQ_msg_extra (crrm,
959 sizeof(struct sockaddr_in),
960 GNUNET_MESSAGE_TYPE_NAT_CONNECTION_REVERSAL_REQUESTED);
961 GNUNET_memcpy (&crrm[1],
963 sizeof(struct sockaddr_in));
964 GNUNET_MQ_send (ch->mq,
971 * Task we run periodically to scan for network interfaces.
978 struct IfcProcContext ifc_ctx;
981 struct LocalAddressList *lnext;
983 scan_task = GNUNET_SCHEDULER_add_delayed (SCAN_FREQ,
989 GNUNET_OS_network_interfaces_list (&ifc_proc,
991 /* remove addresses that disappeared */
992 for (struct LocalAddressList *lal = lal_head;
998 for (struct LocalAddressList *pos = ifc_ctx.lal_head;
1002 if ((pos->af == lal->af) &&
1003 (0 == memcmp (&lal->addr,
1005 (AF_INET == lal->af)
1006 ? sizeof(struct sockaddr_in)
1007 : sizeof(struct sockaddr_in6))))
1012 if (GNUNET_NO == found)
1014 notify_clients (lal,
1020 /* add addresses that appeared */
1021 have_nat = GNUNET_NO;
1022 for (struct LocalAddressList *pos = ifc_ctx.lal_head;
1024 pos = ifc_ctx.lal_head)
1027 if (GNUNET_NAT_AC_LAN == (GNUNET_NAT_AC_LAN & pos->ac))
1028 have_nat = GNUNET_YES;
1029 for (struct LocalAddressList *lal = lal_head;
1033 if ((pos->af == lal->af) &&
1034 (0 == memcmp (&lal->addr,
1036 (AF_INET == lal->af)
1037 ? sizeof(struct sockaddr_in)
1038 : sizeof(struct sockaddr_in6))))
1041 GNUNET_CONTAINER_DLL_remove (ifc_ctx.lal_head,
1044 if (GNUNET_YES == found)
1050 notify_clients (pos,
1052 GNUNET_CONTAINER_DLL_insert (lal_head,
1055 if ((AF_INET == pos->af) &&
1056 (NULL == pos->hc) &&
1057 (0 != (GNUNET_NAT_AC_LAN & pos->ac)))
1059 const struct sockaddr_in *s4
1060 = (const struct sockaddr_in *) &pos->addr;
1062 GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
1063 "Found NATed local address %s, starting NAT server\n",
1064 GNUNET_a2s ((const struct sockaddr *) &pos->addr,
1066 pos->hc = GN_start_gnunet_nat_server_ (&s4->sin_addr,
1073 GN_nat_status_changed (have_nat);
1078 * Function called whenever our set of external addresses
1079 * as created by `upnpc` changes.
1081 * @param cls closure with our `struct ClientHandle *`
1082 * @param add_remove #GNUNET_YES to mean the new public IP address, #GNUNET_NO to mean
1083 * the previous (now invalid) one, #GNUNET_SYSERR indicates an error
1084 * @param addr either the previous or the new public IP address
1085 * @param addrlen actual length of the @a addr
1086 * @param result #GNUNET_NAT_ERROR_SUCCESS on success, otherwise the specific error code
1089 upnp_addr_change_cb (void *cls,
1091 const struct sockaddr *addr,
1093 enum GNUNET_NAT_StatusCode result)
1095 struct ClientHandle *ch = cls;
1096 enum GNUNET_NAT_AddressClass ac;
1100 case GNUNET_NAT_ERROR_SUCCESS:
1101 GNUNET_assert (NULL != addr);
1104 case GNUNET_NAT_ERROR_UPNPC_FAILED:
1105 case GNUNET_NAT_ERROR_UPNPC_TIMEOUT:
1106 case GNUNET_NAT_ERROR_IPC_FAILURE:
1107 GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
1108 "Running upnpc failed: %d\n",
1112 case GNUNET_NAT_ERROR_EXTERNAL_IP_UTILITY_NOT_FOUND:
1113 GNUNET_log (GNUNET_ERROR_TYPE_INFO,
1114 "external-ip binary not found\n");
1117 case GNUNET_NAT_ERROR_UPNPC_NOT_FOUND:
1118 GNUNET_log (GNUNET_ERROR_TYPE_INFO,
1119 "upnpc binary not found\n");
1122 case GNUNET_NAT_ERROR_EXTERNAL_IP_UTILITY_FAILED:
1123 GNUNET_log (GNUNET_ERROR_TYPE_WARNING,
1124 "external-ip binary could not be run\n");
1127 case GNUNET_NAT_ERROR_UPNPC_PORTMAP_FAILED:
1128 GNUNET_log (GNUNET_ERROR_TYPE_WARNING,
1129 "upnpc failed to create port mapping\n");
1132 case GNUNET_NAT_ERROR_EXTERNAL_IP_UTILITY_OUTPUT_INVALID:
1133 GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
1134 "Invalid output from upnpc\n");
1137 case GNUNET_NAT_ERROR_EXTERNAL_IP_ADDRESS_INVALID:
1138 GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
1139 "Invalid address returned by upnpc\n");
1143 GNUNET_break (0); /* should not be possible */
1146 switch (addr->sa_family)
1149 ac = is_nat_v4 (&((const struct sockaddr_in *) addr)->sin_addr)
1151 : GNUNET_NAT_AC_EXTERN;
1155 ac = is_nat_v6 (&((const struct sockaddr_in6 *) addr)->sin6_addr)
1157 : GNUNET_NAT_AC_EXTERN;
1164 GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
1165 "upnp external address %s: %s\n",
1166 add_remove ? "added" : "removed",
1178 * Resolve the `hole_external` name to figure out our
1179 * external address from a manually punched hole. The
1180 * port number has already been parsed, this task is
1181 * responsible for periodically doing a DNS lookup.
1183 * @param ch client handle to act upon
1186 dyndns_lookup (void *cls);
1190 * Our (external) hostname was resolved. Update lists of
1191 * current external IPs (note that DNS may return multiple
1192 * addresses!) and notify client accordingly.
1194 * @param cls the `struct ClientHandle`
1195 * @param addr NULL on error, otherwise result of DNS lookup
1196 * @param addrlen number of bytes in @a addr
1199 process_external_ip (void *cls,
1200 const struct sockaddr *addr,
1203 struct ClientHandle *ch = cls;
1204 struct LocalAddressList *lal;
1205 struct sockaddr_storage ss;
1206 struct sockaddr_in *v4;
1207 struct sockaddr_in6 *v6;
1211 struct LocalAddressList *laln;
1215 = GNUNET_SCHEDULER_add_delayed (dyndns_frequency,
1218 /* Current iteration is over, remove 'old' IPs now */
1219 for (lal = ch->ext_addr_head; NULL != lal; lal = laln)
1222 if (GNUNET_YES == lal->old)
1224 GNUNET_CONTAINER_DLL_remove (ch->ext_addr_head,
1227 check_notify_client (lal,
1235 GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
1236 "Got IP `%s' for external address `%s'\n",
1241 /* build sockaddr storage with port number */
1248 switch (addr->sa_family)
1251 v4 = (struct sockaddr_in *) &ss;
1252 v4->sin_port = htons (ch->ext_dns_port);
1256 v6 = (struct sockaddr_in6 *) &ss;
1257 v6->sin6_port = htons (ch->ext_dns_port);
1264 /* See if 'ss' matches any of our known addresses */
1265 for (lal = ch->ext_addr_head; NULL != lal; lal = lal->next)
1267 if (GNUNET_NO == lal->old)
1268 continue; /* already processed, skip */
1269 if ((addr->sa_family == lal->addr.ss_family) &&
1274 /* Address unchanged, remember so we do not remove */
1275 lal->old = GNUNET_NO;
1276 return; /* done here */
1279 /* notify client, and remember IP for later removal! */
1280 lal = GNUNET_new (struct LocalAddressList);
1282 lal->af = ss.ss_family;
1283 lal->ac = GNUNET_NAT_AC_GLOBAL | GNUNET_NAT_AC_MANUAL;
1284 GNUNET_CONTAINER_DLL_insert (ch->ext_addr_head,
1287 check_notify_client (lal,
1294 * Resolve the `hole_external` name to figure out our
1295 * external address from a manually punched hole. The
1296 * port number has already been parsed, this task is
1297 * responsible for periodically doing a DNS lookup.
1299 * @param ch client handle to act upon
1302 dyndns_lookup (void *cls)
1304 struct ClientHandle *ch = cls;
1305 struct LocalAddressList *lal;
1307 GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
1308 "Performing DNS lookup for punched hole given for `%s' as `%s:%u'\n",
1311 (unsigned int) ch->ext_dns_port);
1312 for (lal = ch->ext_addr_head; NULL != lal; lal = lal->next)
1313 lal->old = GNUNET_YES;
1314 ch->ext_dns_task = NULL;
1315 ch->ext_dns = GNUNET_RESOLVER_ip_get (ch->hole_external,
1317 GNUNET_TIME_UNIT_MINUTES,
1318 &process_external_ip,
1324 * Resolve the `hole_external` name to figure out our
1325 * external address from a manually punched hole. The
1326 * given name may be "AUTO" in which case we should use
1327 * the IP address(es) we have from upnpc or other methods.
1328 * The name can also be an IP address, in which case we
1329 * do not need to do DNS resolution. Finally, we also
1330 * need to parse the port number.
1332 * @param ch client handle to act upon
1335 lookup_hole_external (struct ClientHandle *ch)
1339 struct sockaddr_in *s4;
1340 struct LocalAddressList *lal;
1342 port = strrchr (ch->hole_external, ':');
1345 GNUNET_log (GNUNET_ERROR_TYPE_WARNING,
1346 _ ("Malformed punched hole specification `%s' (lacks port)\n"),
1350 if ((1 != sscanf (port + 1,
1355 GNUNET_log (GNUNET_ERROR_TYPE_WARNING,
1357 "Invalid port number in punched hole specification `%s' (lacks port)\n"),
1361 ch->ext_dns_port = (uint16_t) pnum;
1364 lal = GNUNET_new (struct LocalAddressList);
1365 if ('[' == *ch->hole_external)
1367 struct sockaddr_in6 *s6 = (struct sockaddr_in6 *) &lal->addr;
1369 s6->sin6_family = AF_INET6;
1370 if (']' != (ch->hole_external[strlen (ch->hole_external) - 1]))
1372 GNUNET_log (GNUNET_ERROR_TYPE_WARNING,
1373 _ ("Malformed punched hole specification `%s' (lacks `]')\n"),
1378 ch->hole_external[strlen (ch->hole_external) - 1] = '\0';
1379 if (1 != inet_pton (AF_INET6,
1380 ch->hole_external + 1,
1383 GNUNET_log (GNUNET_ERROR_TYPE_WARNING,
1385 "Malformed punched hole specification `%s' (IPv6 address invalid)"),
1386 ch->hole_external + 1);
1390 s6->sin6_port = htons (ch->ext_dns_port);
1392 lal->ac = GNUNET_NAT_AC_GLOBAL | GNUNET_NAT_AC_MANUAL;
1393 GNUNET_CONTAINER_DLL_insert (ch->ext_addr_head,
1396 check_notify_client (lal,
1402 s4 = (struct sockaddr_in *) &lal->addr;
1403 s4->sin_family = AF_INET;
1404 if (1 == inet_pton (AF_INET,
1408 GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
1409 "IPv4 punched hole given for `%s' via `%s:%u'\n",
1412 (unsigned int) ch->ext_dns_port);
1413 s4->sin_port = htons (ch->ext_dns_port);
1415 lal->ac = GNUNET_NAT_AC_GLOBAL | GNUNET_NAT_AC_MANUAL;
1416 GNUNET_CONTAINER_DLL_insert (ch->ext_addr_head,
1419 check_notify_client (lal,
1424 if (0 == strcasecmp (ch->hole_external,
1427 /* handled in #notify_client_external_ipv4_change() */
1431 /* got a DNS name, trigger lookup! */
1434 = GNUNET_SCHEDULER_add_now (&dyndns_lookup,
1440 * Handler for #GNUNET_MESSAGE_TYPE_NAT_REGISTER message from client.
1441 * We remember the client for updates upon future NAT events.
1443 * @param cls client who sent the message
1444 * @param message the message received
1447 handle_register (void *cls,
1448 const struct GNUNET_NAT_RegisterMessage *message)
1450 struct ClientHandle *ch = cls;
1454 if ((0 != ch->proto) ||
1455 (NULL != ch->caddrs))
1457 /* double registration not allowed */
1459 GNUNET_SERVICE_client_drop (ch->client);
1462 ch->flags = message->flags;
1463 ch->proto = message->proto;
1464 ch->num_caddrs = ntohs (message->num_addrs);
1465 ch->caddrs = GNUNET_new_array (ch->num_caddrs,
1466 struct ClientAddress);
1467 left = ntohs (message->header.size) - sizeof(*message);
1468 off = (const char *) &message[1];
1469 for (unsigned int i = 0; i < ch->num_caddrs; i++)
1471 const struct sockaddr *sa = (const struct sockaddr *) off;
1476 if (sizeof(sa_family_t) > left)
1479 GNUNET_SERVICE_client_drop (ch->client);
1483 switch (sa->sa_family)
1487 struct sockaddr_in s4;
1491 sizeof(struct sockaddr_in));
1492 alen = sizeof(struct sockaddr_in);
1493 if (is_nat_v4 (&s4.sin_addr))
1494 is_nat = GNUNET_YES;
1495 port = ntohs (s4.sin_port);
1501 struct sockaddr_in6 s6;
1505 sizeof(struct sockaddr_in6));
1506 alen = sizeof(struct sockaddr_in6);
1507 if (is_nat_v6 (&s6.sin6_addr))
1508 is_nat = GNUNET_YES;
1509 port = ntohs (s6.sin6_port);
1515 alen = sizeof(struct sockaddr_un);
1521 GNUNET_SERVICE_client_drop (ch->client);
1525 GNUNET_assert (alen <= left);
1526 GNUNET_assert (alen <= sizeof(struct sockaddr_storage));
1527 GNUNET_memcpy (&ch->caddrs[i].ss,
1531 /* If applicable, try UPNPC NAT punching */
1534 ((IPPROTO_TCP == ch->proto) ||
1535 (IPPROTO_UDP == ch->proto)))
1537 ch->natted_address = GNUNET_YES;
1539 = GNUNET_NAT_mini_map_start (port,
1540 IPPROTO_TCP == ch->proto,
1541 &upnp_addr_change_cb,
1549 = GNUNET_strndup (off,
1550 ntohs (message->str_len));
1551 GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
1552 "Received REGISTER message from client for subsystem `%s'\n",
1555 GNUNET_CONFIGURATION_get_value_string (cfg,
1558 &ch->hole_external))
1559 lookup_hole_external (ch);
1561 /* Actually send IP address list to client */
1562 for (struct LocalAddressList *lal = lal_head;
1566 check_notify_client (lal,
1570 /* Also consider IPv4 determined by `external-ip` */
1571 ch->external_monitor
1572 = GN_external_ipv4_monitor_start (¬ify_client_external_ipv4_change,
1574 GNUNET_SERVICE_client_continue (ch->client);
1579 * Check validity of #GNUNET_MESSAGE_TYPE_NAT_HANDLE_STUN message from
1582 * @param cls client who sent the message
1583 * @param message the message received
1584 * @return #GNUNET_OK if message is well-formed
1587 check_stun (void *cls,
1588 const struct GNUNET_NAT_HandleStunMessage *message)
1590 size_t sa_len = ntohs (message->sender_addr_size);
1591 size_t expect = sa_len + ntohs (message->payload_size);
1593 if (ntohs (message->header.size) - sizeof(*message) != expect)
1596 return GNUNET_SYSERR;
1598 if (sa_len < sizeof(sa_family_t))
1601 return GNUNET_SYSERR;
1608 * Notify all clients about our external IP address
1609 * as reported by the STUN server.
1611 * @param ip the external IP
1612 * @param add #GNUNET_YES to add, #GNUNET_NO to remove
1615 notify_clients_stun_change (const struct sockaddr_in *ip,
1618 for (struct ClientHandle *ch = ch_head;
1622 struct sockaddr_in v4;
1623 struct GNUNET_NAT_AddressChangeNotificationMessage *msg;
1624 struct GNUNET_MQ_Envelope *env;
1626 if (! ch->natted_address)
1629 v4.sin_port = htons (0);
1630 env = GNUNET_MQ_msg_extra (msg,
1632 GNUNET_MESSAGE_TYPE_NAT_ADDRESS_CHANGE);
1633 msg->add_remove = htonl ((int32_t) add);
1634 msg->addr_class = htonl (GNUNET_NAT_AC_EXTERN
1635 | GNUNET_NAT_AC_GLOBAL);
1636 GNUNET_memcpy (&msg[1],
1639 GNUNET_MQ_send (ch->mq,
1646 * Function to be called when we decide that an
1647 * external IP address as told to us by a STUN
1648 * server has gone stale.
1650 * @param cls the `struct StunExternalIP` to drop
1653 stun_ip_timeout (void *cls)
1655 struct StunExternalIP *se = cls;
1657 se->timeout_task = NULL;
1658 notify_clients_stun_change (&se->external_addr,
1660 GNUNET_CONTAINER_DLL_remove (se_head,
1668 * Handler for #GNUNET_MESSAGE_TYPE_NAT_HANDLE_STUN message from
1671 * @param cls client who sent the message
1672 * @param message the message received
1675 handle_stun (void *cls,
1676 const struct GNUNET_NAT_HandleStunMessage *message)
1678 struct ClientHandle *ch = cls;
1679 const char *buf = (const char *) &message[1];
1680 const struct sockaddr *sa;
1681 const void *payload;
1683 size_t payload_size;
1684 struct sockaddr_in external_addr;
1686 sa_len = ntohs (message->sender_addr_size);
1687 payload_size = ntohs (message->payload_size);
1688 sa = (const struct sockaddr *) &buf[0];
1689 payload = (const struct sockaddr *) &buf[sa_len];
1690 switch (sa->sa_family)
1693 if (sa_len != sizeof(struct sockaddr_in))
1696 GNUNET_SERVICE_client_drop (ch->client);
1702 if (sa_len != sizeof(struct sockaddr_in6))
1705 GNUNET_SERVICE_client_drop (ch->client);
1710 GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
1711 "Received HANDLE_STUN message from client\n");
1713 GNUNET_NAT_stun_handle_packet_ (payload,
1717 /* We now know that a server at "sa" claims that
1718 we are visible at IP "external_addr".
1720 We should (for some fixed period of time) tell
1721 all of our clients that listen to a NAT'ed address
1722 that they might want to consider the given 'external_ip'
1723 as their public IP address (this includes TCP and UDP
1724 clients, even if only UDP sends STUN requests).
1726 If we do not get a renewal, the "external_addr" should be
1727 removed again. The timeout frequency should be configurable
1728 (with a sane default), so that the UDP plugin can tell how
1729 often to re-request STUN.
1731 struct StunExternalIP *se;
1733 /* Check if we had a prior response from this STUN server */
1734 for (se = se_head; NULL != se; se = se->next)
1736 if ((se->stun_server_addr_len != sa_len) ||
1738 &se->stun_server_addr,
1740 continue; /* different STUN server */
1741 if (0 != GNUNET_memcmp (&external_addr,
1742 &se->external_addr))
1744 /* external IP changed, update! */
1745 notify_clients_stun_change (&se->external_addr,
1747 se->external_addr = external_addr;
1748 notify_clients_stun_change (&se->external_addr,
1751 /* update timeout */
1752 GNUNET_SCHEDULER_cancel (se->timeout_task);
1754 = GNUNET_SCHEDULER_add_delayed (stun_stale_timeout,
1759 /* STUN server is completely new, create fresh entry */
1760 se = GNUNET_new (struct StunExternalIP);
1761 se->external_addr = external_addr;
1762 GNUNET_memcpy (&se->stun_server_addr,
1765 se->stun_server_addr_len = sa_len;
1766 se->timeout_task = GNUNET_SCHEDULER_add_delayed (stun_stale_timeout,
1769 GNUNET_CONTAINER_DLL_insert (se_head,
1772 notify_clients_stun_change (&se->external_addr,
1775 GNUNET_SERVICE_client_continue (ch->client);
1781 * #GNUNET_MESSAGE_TYPE_NAT_REQUEST_CONNECTION_REVERSAL message from
1784 * @param cls client who sent the message
1785 * @param message the message received
1786 * @return #GNUNET_OK if message is well-formed
1789 check_request_connection_reversal (void *cls,
1791 GNUNET_NAT_RequestConnectionReversalMessage *
1796 expect = ntohs (message->local_addr_size)
1797 + ntohs (message->remote_addr_size);
1798 if (ntohs (message->header.size) - sizeof(*message) != expect)
1801 return GNUNET_SYSERR;
1808 * Handler for #GNUNET_MESSAGE_TYPE_NAT_REQUEST_CONNECTION_REVERSAL
1809 * message from client.
1811 * @param cls client who sent the message
1812 * @param message the message received
1815 handle_request_connection_reversal (void *cls,
1817 GNUNET_NAT_RequestConnectionReversalMessage
1820 struct ClientHandle *ch = cls;
1821 const char *buf = (const char *) &message[1];
1822 size_t local_sa_len = ntohs (message->local_addr_size);
1823 size_t remote_sa_len = ntohs (message->remote_addr_size);
1824 struct sockaddr_in l4;
1825 struct sockaddr_in r4;
1828 GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
1829 "Received REQUEST CONNECTION REVERSAL message from client\n");
1830 if (local_sa_len != sizeof(struct sockaddr_in))
1832 GNUNET_break_op (0);
1833 GNUNET_SERVICE_client_drop (ch->client);
1836 if (remote_sa_len != sizeof(struct sockaddr_in))
1838 GNUNET_break_op (0);
1839 GNUNET_SERVICE_client_drop (ch->client);
1844 sizeof(struct sockaddr_in));
1845 GNUNET_break_op (AF_INET == l4.sin_family);
1846 buf += sizeof(struct sockaddr_in);
1849 sizeof(struct sockaddr_in));
1850 GNUNET_break_op (AF_INET == r4.sin_family);
1851 ret = GN_request_connection_reversal (&l4.sin_addr,
1852 ntohs (l4.sin_port),
1855 if (GNUNET_OK != ret)
1856 GNUNET_log (GNUNET_ERROR_TYPE_WARNING,
1857 _ ("Connection reversal request failed\n"));
1858 GNUNET_SERVICE_client_continue (ch->client);
1863 * Task run during shutdown.
1868 shutdown_task (void *cls)
1870 struct StunExternalIP *se;
1872 while (NULL != (se = se_head))
1874 GNUNET_CONTAINER_DLL_remove (se_head,
1877 GNUNET_SCHEDULER_cancel (se->timeout_task);
1880 GN_nat_status_changed (GNUNET_NO);
1881 if (NULL != scan_task)
1883 GNUNET_SCHEDULER_cancel (scan_task);
1888 GNUNET_STATISTICS_destroy (stats,
1897 * Setup NAT service.
1899 * @param cls closure
1900 * @param c configuration to use
1901 * @param service the initialized service
1905 const struct GNUNET_CONFIGURATION_Handle *c,
1906 struct GNUNET_SERVICE_Handle *service)
1910 GNUNET_CONFIGURATION_get_value_time (cfg,
1913 &stun_stale_timeout))
1914 stun_stale_timeout = GNUNET_TIME_UNIT_HOURS;
1916 /* Check for UPnP */
1918 = GNUNET_CONFIGURATION_get_value_yesno (cfg,
1921 if (GNUNET_YES == enable_upnp)
1923 /* check if it works */
1924 if (GNUNET_SYSERR ==
1925 GNUNET_OS_check_helper_binary ("upnpc",
1929 GNUNET_log (GNUNET_ERROR_TYPE_ERROR,
1931 "UPnP enabled in configuration, but UPnP client `upnpc` command not found, disabling UPnP\n"));
1932 enable_upnp = GNUNET_SYSERR;
1936 GNUNET_CONFIGURATION_get_value_time (cfg,
1940 dyndns_frequency = DYNDNS_FREQUENCY;
1942 GNUNET_SCHEDULER_add_shutdown (&shutdown_task,
1944 stats = GNUNET_STATISTICS_create ("nat",
1946 scan_task = GNUNET_SCHEDULER_add_now (&run_scan,
1952 * Callback called when a client connects to the service.
1954 * @param cls closure for the service
1955 * @param c the new client that connected to the service
1956 * @param mq the message queue used to send messages to the client
1957 * @return a `struct ClientHandle`
1960 client_connect_cb (void *cls,
1961 struct GNUNET_SERVICE_Client *c,
1962 struct GNUNET_MQ_Handle *mq)
1964 struct ClientHandle *ch;
1966 ch = GNUNET_new (struct ClientHandle);
1969 GNUNET_CONTAINER_DLL_insert (ch_head,
1977 * Callback called when a client disconnected from the service
1979 * @param cls closure for the service
1980 * @param c the client that disconnected
1981 * @param internal_cls a `struct ClientHandle *`
1984 client_disconnect_cb (void *cls,
1985 struct GNUNET_SERVICE_Client *c,
1988 struct ClientHandle *ch = internal_cls;
1989 struct LocalAddressList *lal;
1991 GNUNET_CONTAINER_DLL_remove (ch_head,
1994 for (unsigned int i = 0; i < ch->num_caddrs; i++)
1996 if (NULL != ch->caddrs[i].mh)
1998 GNUNET_NAT_mini_map_stop (ch->caddrs[i].mh);
1999 ch->caddrs[i].mh = NULL;
2002 GNUNET_free_non_null (ch->caddrs);
2003 while (NULL != (lal = ch->ext_addr_head))
2005 GNUNET_CONTAINER_DLL_remove (ch->ext_addr_head,
2010 if (NULL != ch->ext_dns_task)
2012 GNUNET_SCHEDULER_cancel (ch->ext_dns_task);
2013 ch->ext_dns_task = NULL;
2015 if (NULL != ch->external_monitor)
2017 GN_external_ipv4_monitor_stop (ch->external_monitor);
2018 ch->external_monitor = NULL;
2020 if (NULL != ch->ext_dns)
2022 GNUNET_RESOLVER_request_cancel (ch->ext_dns);
2025 GNUNET_free_non_null (ch->hole_external);
2026 GNUNET_free_non_null (ch->section_name);
2032 * Define "main" method using service macro.
2036 GNUNET_SERVICE_OPTION_NONE,
2039 &client_disconnect_cb,
2041 GNUNET_MQ_hd_var_size (register,
2042 GNUNET_MESSAGE_TYPE_NAT_REGISTER,
2043 struct GNUNET_NAT_RegisterMessage,
2045 GNUNET_MQ_hd_var_size (stun,
2046 GNUNET_MESSAGE_TYPE_NAT_HANDLE_STUN,
2047 struct GNUNET_NAT_HandleStunMessage,
2049 GNUNET_MQ_hd_var_size (request_connection_reversal,
2050 GNUNET_MESSAGE_TYPE_NAT_REQUEST_CONNECTION_REVERSAL,
2051 struct GNUNET_NAT_RequestConnectionReversalMessage,
2053 GNUNET_MQ_handler_end ());
2056 #if defined(LINUX) && defined(__GLIBC__)
2060 * MINIMIZE heap size (way below 128k) since this process doesn't need much.
2062 void __attribute__ ((constructor))
2063 GNUNET_ARM_memory_init ()
2065 mallopt (M_TRIM_THRESHOLD, 4 * 1024);
2066 mallopt (M_TOP_PAD, 1 * 1024);
2071 /* end of gnunet-service-nat.c */