2 This file is part of GNUnet.
3 Copyright (C) 2016, 2017 GNUnet e.V.
5 GNUnet is free software: you can redistribute it and/or modify it
6 under the terms of the GNU Affero General Public License as published
7 by the Free Software Foundation, either version 3 of the License,
8 or (at your option) any later version.
10 GNUnet is distributed in the hope that it will be useful, but
11 WITHOUT ANY WARRANTY; without even the implied warranty of
12 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
13 Affero General Public License for more details.
15 You should have received a copy of the GNU Affero General Public License
16 along with this program. If not, see <http://www.gnu.org/licenses/>.
18 SPDX-License-Identifier: AGPL3.0-or-later
22 * @file nat/gnunet-service-nat.c
23 * @brief network address translation traversal service
24 * @author Christian Grothoff
26 * The purpose of this service is to enable transports to
27 * traverse NAT routers, by providing traversal options and
28 * knowledge about the local network topology.
31 * - migrate test cases to new NAT service
32 * - add new traceroute-based logic for external IP detection
34 * - implement & test STUN processing to classify NAT;
35 * basically, open port & try different methods.
39 #include "gnunet_util_lib.h"
40 #include "gnunet_protocols.h"
41 #include "gnunet_signatures.h"
42 #include "gnunet_statistics_service.h"
43 #include "gnunet_resolver_service.h"
44 #include "gnunet_nat_service.h"
45 #include "gnunet-service-nat.h"
46 #include "gnunet-service-nat_externalip.h"
47 #include "gnunet-service-nat_stun.h"
48 #include "gnunet-service-nat_mini.h"
49 #include "gnunet-service-nat_helper.h"
55 * How often should we ask the OS about a list of active
58 #define SCAN_FREQ GNUNET_TIME_relative_multiply (GNUNET_TIME_UNIT_SECONDS, 15)
61 * How long do we wait until we forcefully terminate autoconfiguration?
63 #define AUTOCONFIG_TIMEOUT GNUNET_TIME_relative_multiply (GNUNET_TIME_UNIT_SECONDS, 5)
66 * How often do we scan for changes in how our external (dyndns) hostname resolves?
68 #define DYNDNS_FREQUENCY GNUNET_TIME_relative_multiply (GNUNET_TIME_UNIT_MINUTES, 7)
72 * Information we track per client address.
77 * Network address used by the client.
79 struct sockaddr_storage ss;
82 * Handle to active UPnP request where we asked upnpc to open
83 * a port at the NAT. NULL if we do not have such a request
86 struct GNUNET_NAT_MiniHandle *mh;
92 * List of local addresses this system has.
94 struct LocalAddressList
97 * This is a linked list.
99 struct LocalAddressList *next;
104 struct LocalAddressList *prev;
107 * Context for a gnunet-helper-nat-server used to listen
108 * for ICMP messages to this client for connection reversal.
110 struct HelperContext *hc;
113 * The address itself (i.e. `struct sockaddr_in` or `struct
114 * sockaddr_in6`, in the respective byte order).
116 struct sockaddr_storage addr;
119 * Address family. (FIXME: redundant, addr.ss_family! Remove!?)
124 * #GNUNET_YES if we saw this one in the previous iteration,
125 * but not in the current iteration and thus might need to
126 * remove it at the end.
131 * What type of address is this?
133 enum GNUNET_NAT_AddressClass ac;
139 * Internal data structure we track for each of our clients.
147 struct ClientHandle *next;
152 struct ClientHandle *prev;
155 * Underlying handle for this client with the service.
157 struct GNUNET_SERVICE_Client *client;
160 * Message queue for communicating with the client.
162 struct GNUNET_MQ_Handle *mq;
165 * Array of addresses used by the service.
167 struct ClientAddress *caddrs;
170 * External DNS name and port given by user due to manual
171 * hole punching. Special DNS name 'AUTO' is used to indicate
172 * desire for automatic determination of the external IP
173 * (instead of DNS or manual configuration, i.e. to be used
174 * if the IP keeps changing and we have no DynDNS, but we do
175 * have a hole punched).
180 * Name of the configuration section this client cares about.
185 * Task for periodically re-running the @e ext_dns DNS lookup.
187 struct GNUNET_SCHEDULER_Task *ext_dns_task;
190 * Handle for (DYN)DNS lookup of our external IP as given in
193 struct GNUNET_RESOLVER_RequestHandle *ext_dns;
196 * Handle for monitoring external IP changes.
198 struct GN_ExternalIPMonitor *external_monitor;
201 * DLL of external IP addresses as given in @e hole_external.
203 struct LocalAddressList *ext_addr_head;
206 * DLL of external IP addresses as given in @e hole_external.
208 struct LocalAddressList *ext_addr_tail;
211 * Port number we found in @e hole_external.
213 uint16_t ext_dns_port;
216 * What does this client care about?
218 enum GNUNET_NAT_RegisterFlags flags;
221 * Is any of the @e caddrs in a reserved subnet for NAT?
226 * Number of addresses that this service is bound to.
227 * Length of the @e caddrs array.
232 * Client's IPPROTO, e.g. IPPROTO_UDP or IPPROTO_TCP.
240 * External IP address as given to us via some STUN server.
242 struct StunExternalIP
247 struct StunExternalIP *next;
252 struct StunExternalIP *prev;
255 * Task we run to remove this entry when it is stale.
257 struct GNUNET_SCHEDULER_Task *timeout_task;
260 * Our external IP address as reported by the
263 struct sockaddr_in external_addr;
266 * Address of the reporting STUN server. Used to
267 * detect when a STUN server changes its opinion
268 * to more quickly remove stale results.
270 struct sockaddr_storage stun_server_addr;
273 * Number of bytes used in @e stun_server_addr.
275 size_t stun_server_addr_len;
280 * Timeout to use when STUN data is considered stale.
282 static struct GNUNET_TIME_Relative stun_stale_timeout;
285 * How often do we scan for changes in how our external (dyndns) hostname resolves?
287 static struct GNUNET_TIME_Relative dyndns_frequency;
290 * Handle to our current configuration.
292 static const struct GNUNET_CONFIGURATION_Handle *cfg;
295 * Handle to the statistics service.
297 static struct GNUNET_STATISTICS_Handle *stats;
300 * Task scheduled to periodically scan our network interfaces.
302 static struct GNUNET_SCHEDULER_Task *scan_task;
305 * Head of client DLL.
307 static struct ClientHandle *ch_head;
310 * Tail of client DLL.
312 static struct ClientHandle *ch_tail;
315 * Head of DLL of local addresses.
317 static struct LocalAddressList *lal_head;
320 * Tail of DLL of local addresses.
322 static struct LocalAddressList *lal_tail;
327 static struct StunExternalIP *se_head;
332 static struct StunExternalIP *se_tail;
335 * Is UPnP enabled? #GNUNET_YES if enabled, #GNUNET_NO if disabled,
336 * #GNUNET_SYSERR if configuration enabled but binary is unavailable.
342 * Remove and free an entry from the #lal_head DLL.
344 * @param lal entry to free
347 free_lal (struct LocalAddressList *lal)
349 GNUNET_CONTAINER_DLL_remove (lal_head,
354 GNUNET_log (GNUNET_ERROR_TYPE_MESSAGE,
355 "Lost NATed local address %s, stopping NAT server\n",
356 GNUNET_a2s ((const struct sockaddr *) &lal->addr,
357 sizeof (struct sockaddr_in)));
359 GN_stop_gnunet_nat_server_ (lal->hc);
367 * Free the DLL starting at #lal_head.
372 struct LocalAddressList *lal;
374 while (NULL != (lal = lal_head))
380 * Check validity of #GNUNET_MESSAGE_TYPE_NAT_REGISTER message from
383 * @param cls client who sent the message
384 * @param message the message received
385 * @return #GNUNET_OK if message is well-formed
388 check_register (void *cls,
389 const struct GNUNET_NAT_RegisterMessage *message)
391 uint16_t num_addrs = ntohs (message->num_addrs);
392 const char *off = (const char *) &message[1];
393 size_t left = ntohs (message->header.size) - sizeof (*message);
395 for (unsigned int i=0;i<num_addrs;i++)
398 const struct sockaddr *sa = (const struct sockaddr *) off;
400 if (sizeof (sa_family_t) > left)
403 return GNUNET_SYSERR;
405 switch (sa->sa_family)
408 alen = sizeof (struct sockaddr_in);
411 alen = sizeof (struct sockaddr_in6);
415 alen = sizeof (struct sockaddr_un);
420 return GNUNET_SYSERR;
425 return GNUNET_SYSERR;
430 if (left != ntohs (message->str_len))
433 return GNUNET_SYSERR;
440 * Check if @a ip is in @a network with @a bits netmask.
442 * @param network to test
443 * @param ip IP address to test
444 * @param bits bitmask for the network
445 * @return #GNUNET_YES if @a ip is in @a network
448 match_ipv4 (const char *network,
449 const struct in_addr *ip,
458 GNUNET_assert (1 == inet_pton (AF_INET,
461 return ! ((ip->s_addr ^ net.s_addr) & htonl (0xFFFFFFFFu << (32 - bits)));
466 * Check if @a ip is in @a network with @a bits netmask.
468 * @param network to test
469 * @param ip IP address to test
470 * @param bits bitmask for the network
471 * @return #GNUNET_YES if @a ip is in @a network
474 match_ipv6 (const char *network,
475 const struct in6_addr *ip,
479 struct in6_addr mask;
484 GNUNET_assert (1 == inet_pton (AF_INET6,
487 memset (&mask, 0, sizeof (mask));
488 if (0 == GNUNET_memcmp (&mask,
494 mask.s6_addr[off++] = 0xFF;
499 mask.s6_addr[off] = (mask.s6_addr[off] >> 1) + 0x80;
502 for (unsigned j = 0; j < sizeof (struct in6_addr) / sizeof (uint32_t); j++)
503 if (((((uint32_t *) ip)[j] & ((uint32_t *) &mask)[j])) !=
504 (((uint32_t *) &net)[j] & ((int *) &mask)[j]))
511 * Test if the given IPv4 address is in a known range
512 * for private networks.
514 * @param ip address to test
515 * @return #GNUNET_YES if @a ip is in a NAT range
518 is_nat_v4 (const struct in_addr *ip)
521 match_ipv4 ("10.0.0.0", ip, 8) || /* RFC 1918 */
522 match_ipv4 ("100.64.0.0", ip, 10) || /* CG-NAT, RFC 6598 */
523 match_ipv4 ("192.168.0.0", ip, 12) || /* RFC 1918 */
524 match_ipv4 ("169.254.0.0", ip, 16) || /* AUTO, RFC 3927 */
525 match_ipv4 ("172.16.0.0", ip, 16); /* RFC 1918 */
530 * Test if the given IPv6 address is in a known range
531 * for private networks.
533 * @param ip address to test
534 * @return #GNUNET_YES if @a ip is in a NAT range
537 is_nat_v6 (const struct in6_addr *ip)
540 match_ipv6 ("fc00::", ip, 7) || /* RFC 4193 */
541 match_ipv6 ("fec0::", ip, 10) || /* RFC 3879 */
542 match_ipv6 ("fe80::", ip, 10); /* RFC 4291, link-local */
547 * Closure for #ifc_proc.
549 struct IfcProcContext
553 * Head of DLL of local addresses.
555 struct LocalAddressList *lal_head;
558 * Tail of DLL of local addresses.
560 struct LocalAddressList *lal_tail;
566 * Callback function invoked for each interface found. Adds them
567 * to our new address list.
569 * @param cls a `struct IfcProcContext *`
570 * @param name name of the interface (can be NULL for unknown)
571 * @param isDefault is this presumably the default interface
572 * @param addr address of this interface (can be NULL for unknown or unassigned)
573 * @param broadcast_addr the broadcast address (can be NULL for unknown or unassigned)
574 * @param netmask the network mask (can be NULL for unknown or unassigned)
575 * @param addrlen length of the address
576 * @return #GNUNET_OK to continue iteration, #GNUNET_SYSERR to abort
582 const struct sockaddr *addr,
583 const struct sockaddr *broadcast_addr,
584 const struct sockaddr *netmask,
587 struct IfcProcContext *ifc_ctx = cls;
588 struct LocalAddressList *lal;
590 const struct in_addr *ip4;
591 const struct in6_addr *ip6;
592 enum GNUNET_NAT_AddressClass ac;
594 switch (addr->sa_family)
597 alen = sizeof (struct sockaddr_in);
598 ip4 = &((const struct sockaddr_in *) addr)->sin_addr;
599 if (match_ipv4 ("127.0.0.0", ip4, 8))
600 ac = GNUNET_NAT_AC_LOOPBACK;
601 else if (is_nat_v4 (ip4))
602 ac = GNUNET_NAT_AC_LAN;
604 ac = GNUNET_NAT_AC_GLOBAL;
607 alen = sizeof (struct sockaddr_in6);
608 ip6 = &((const struct sockaddr_in6 *) addr)->sin6_addr;
609 if (match_ipv6 ("::1", ip6, 128))
610 ac = GNUNET_NAT_AC_LOOPBACK;
611 else if (is_nat_v6 (ip6))
612 ac = GNUNET_NAT_AC_LAN;
614 ac = GNUNET_NAT_AC_GLOBAL;
615 if ( (ip6->s6_addr[11] == 0xFF) &&
616 (ip6->s6_addr[12] == 0xFE) )
618 /* contains a MAC, be extra careful! */
619 ac |= GNUNET_NAT_AC_PRIVATE;
631 lal = GNUNET_malloc (sizeof (*lal));
632 lal->af = addr->sa_family;
634 GNUNET_memcpy (&lal->addr,
637 GNUNET_CONTAINER_DLL_insert (ifc_ctx->lal_head,
645 * Notify client about a change in the list of addresses this peer
648 * @param ac address class of the entry in the list that changed
649 * @param ch client to contact
650 * @param add #GNUNET_YES to add, #GNUNET_NO to remove
651 * @param addr the address that changed
652 * @param addr_len number of bytes in @a addr
655 notify_client (enum GNUNET_NAT_AddressClass ac,
656 struct ClientHandle *ch,
661 struct GNUNET_MQ_Envelope *env;
662 struct GNUNET_NAT_AddressChangeNotificationMessage *msg;
664 GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
665 "Notifying client about %s of IP %s\n",
666 add ? "addition" : "removal",
669 env = GNUNET_MQ_msg_extra (msg,
671 GNUNET_MESSAGE_TYPE_NAT_ADDRESS_CHANGE);
672 msg->add_remove = htonl (add);
673 msg->addr_class = htonl (ac);
674 GNUNET_memcpy (&msg[1],
677 GNUNET_MQ_send (ch->mq,
683 * Check if we should bother to notify this client about this
684 * address change, and if so, do it.
686 * @param delta the entry in the list that changed
687 * @param ch client to check
688 * @param add #GNUNET_YES to add, #GNUNET_NO to remove
691 check_notify_client (struct LocalAddressList *delta,
692 struct ClientHandle *ch,
696 struct sockaddr_in v4;
697 struct sockaddr_in6 v6;
699 if (0 == (ch->flags & GNUNET_NAT_RF_ADDRESSES))
701 GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
702 "Not notifying client as it does not care about addresses\n");
708 alen = sizeof (struct sockaddr_in);
713 /* Check for client notifications */
714 for (unsigned int i=0;i<ch->num_caddrs;i++)
716 const struct sockaddr_in *c4;
718 if (AF_INET != ch->caddrs[i].ss.ss_family)
719 continue; /* IPv4 not relevant */
720 c4 = (const struct sockaddr_in *) &ch->caddrs[i].ss;
721 if ( match_ipv4 ("127.0.0.1", &c4->sin_addr, 8) &&
722 (0 != c4->sin_addr.s_addr) &&
723 (! match_ipv4 ("127.0.0.1", &v4.sin_addr, 8)) )
724 continue; /* bound to loopback, but this is not loopback */
725 if ( (! match_ipv4 ("127.0.0.1", &c4->sin_addr, 8) ) &&
726 match_ipv4 ("127.0.0.1", &v4.sin_addr, 8) )
727 continue; /* bound to non-loopback, but this is loopback */
728 if ( (0 != (delta->ac & GNUNET_NAT_AC_EXTERN)) &&
729 (0 != c4->sin_addr.s_addr) &&
730 (! is_nat_v4 (&v4.sin_addr)) )
731 continue; /* based on external-IP, but this IP is not
732 from private address range. */
733 if ( (0 != GNUNET_memcmp (&v4.sin_addr,
735 (0 != c4->sin_addr.s_addr) &&
736 (! is_nat_v4 (&c4->sin_addr)) )
737 continue; /* this IP is not from private address range,
738 and IP does not match. */
740 /* OK, IP seems relevant, notify client */
741 if (0 == htons (v4.sin_port))
742 v4.sin_port = c4->sin_port;
743 notify_client (delta->ac,
751 alen = sizeof (struct sockaddr_in6);
755 for (unsigned int i=0;i<ch->num_caddrs;i++)
757 const struct sockaddr_in6 *c6;
759 if (AF_INET6 != ch->caddrs[i].ss.ss_family)
760 continue; /* IPv4 not relevant */
761 c6 = (const struct sockaddr_in6 *) &ch->caddrs[i].ss;
762 if ( match_ipv6 ("::1", &c6->sin6_addr, 128) &&
763 (0 != GNUNET_memcmp (&c6->sin6_addr,
765 (! match_ipv6 ("::1", &v6.sin6_addr, 128)) )
766 continue; /* bound to loopback, but this is not loopback */
767 if ( (! match_ipv6 ("::1", &c6->sin6_addr, 128) ) &&
768 match_ipv6 ("::1", &v6.sin6_addr, 128) )
769 continue; /* bound to non-loopback, but this is loopback */
770 if ( (0 != (delta->ac & GNUNET_NAT_AC_EXTERN)) &&
771 (0 != GNUNET_memcmp (&c6->sin6_addr,
773 (! is_nat_v6 (&v6.sin6_addr)) )
774 continue; /* based on external-IP, but this IP is not
775 from private address range. */
776 if ( (0 != GNUNET_memcmp (&v6.sin6_addr,
778 (0 != GNUNET_memcmp (&c6->sin6_addr,
780 (! is_nat_v6 (&c6->sin6_addr)) )
781 continue; /* this IP is not from private address range,
782 and IP does not match. */
783 if ( (match_ipv6 ("fe80::", &c6->sin6_addr, 10)) &&
784 (0 != GNUNET_memcmp (&c6->sin6_addr,
786 (0 != GNUNET_memcmp (&v6.sin6_addr,
788 (0 == (delta->ac & GNUNET_NAT_AC_EXTERN)) )
789 continue; /* client bound to link-local, and the other address
790 does not match and is not an external IP */
792 /* OK, IP seems relevant, notify client */
793 if (0 == htons (v6.sin6_port))
794 v6.sin6_port = c6->sin6_port;
795 notify_client (delta->ac,
810 * Notify all clients about a change in the list
811 * of addresses this peer has.
813 * @param delta the entry in the list that changed
814 * @param add #GNUNET_YES to add, #GNUNET_NO to remove
817 notify_clients (struct LocalAddressList *delta,
820 for (struct ClientHandle *ch = ch_head;
823 check_notify_client (delta,
830 * Tell relevant client about a change in our external
833 * @param cls client to check if it cares and possibly notify
834 * @param v4 the external address that changed
835 * @param add #GNUNET_YES to add, #GNUNET_NO to remove
838 notify_client_external_ipv4_change (void *cls,
839 const struct in_addr *v4,
842 struct ClientHandle *ch = cls;
843 struct sockaddr_in sa;
846 /* (0) check if this impacts 'hole_external' */
847 if ( (NULL != ch->hole_external) &&
848 (0 == strcasecmp (ch->hole_external,
851 struct LocalAddressList lal;
852 struct sockaddr_in *s4;
854 GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
855 "Detected eternal IP, can now back-fill AUTO:%u in hole punching specification of `%s'\n",
856 (unsigned int) ch->ext_dns_port,
858 memset (&lal, 0, sizeof (lal));
859 s4 = (struct sockaddr_in *) &lal.addr;
860 s4->sin_family = AF_INET;
861 s4->sin_port = htons (ch->ext_dns_port);
864 lal.ac = GNUNET_NAT_AC_GLOBAL | GNUNET_NAT_AC_MANUAL;
865 check_notify_client (&lal,
870 /* (1) check if client cares. */
871 if (! ch->natted_address)
874 for (unsigned int i=0;i<ch->num_caddrs;i++)
876 const struct sockaddr_storage *ss = &ch->caddrs[i].ss;
878 if (AF_INET != ss->ss_family)
880 have_v4 = GNUNET_YES;
883 if (GNUNET_NO == have_v4)
884 return; /* IPv6-only */
886 /* (2) build address info */
890 sa.sin_family = AF_INET;
892 sa.sin_port = htons (0);
894 GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
895 "Detected eternal IP %s, notifying client of external IP (without port)\n",
896 GNUNET_a2s ((const struct sockaddr *) &sa,
898 /* (3) notify client of change */
899 notify_client (is_nat_v4 (v4)
900 ? GNUNET_NAT_AC_EXTERN | GNUNET_NAT_AC_LAN
901 : GNUNET_NAT_AC_EXTERN | GNUNET_NAT_AC_GLOBAL,
910 * We got a connection reversal request from another peer.
911 * Notify applicable clients.
913 * @param cls closure with the `struct LocalAddressList`
914 * @param ra IP address of the peer who wants us to connect to it
917 reversal_callback (void *cls,
918 const struct sockaddr_in *ra)
920 struct LocalAddressList *lal = cls;
921 const struct sockaddr_in *l4;
923 GNUNET_assert (AF_INET == lal->af);
924 l4 = (const struct sockaddr_in *) &lal->addr;
925 for (struct ClientHandle *ch = ch_head;
929 struct GNUNET_NAT_ConnectionReversalRequestedMessage *crrm;
930 struct GNUNET_MQ_Envelope *env;
933 /* Check if client is in applicable range for ICMP NAT traversal
934 for this local address */
935 if (! ch->natted_address)
938 for (unsigned int i=0;i<ch->num_caddrs;i++)
940 struct ClientAddress *ca = &ch->caddrs[i];
941 const struct sockaddr_in *c4;
943 if (AF_INET != ca->ss.ss_family)
945 c4 = (const struct sockaddr_in *) &ca->ss;
946 if ( (0 != c4->sin_addr.s_addr) &&
947 (l4->sin_addr.s_addr != c4->sin_addr.s_addr) )
955 /* Notify applicable client about connection reversal request */
956 env = GNUNET_MQ_msg_extra (crrm,
957 sizeof (struct sockaddr_in),
958 GNUNET_MESSAGE_TYPE_NAT_CONNECTION_REVERSAL_REQUESTED);
959 GNUNET_memcpy (&crrm[1],
961 sizeof (struct sockaddr_in));
962 GNUNET_MQ_send (ch->mq,
969 * Task we run periodically to scan for network interfaces.
976 struct IfcProcContext ifc_ctx;
979 struct LocalAddressList *lnext;
981 scan_task = GNUNET_SCHEDULER_add_delayed (SCAN_FREQ,
987 GNUNET_OS_network_interfaces_list (&ifc_proc,
989 /* remove addresses that disappeared */
990 for (struct LocalAddressList *lal = lal_head;
996 for (struct LocalAddressList *pos = ifc_ctx.lal_head;
1000 if ( (pos->af == lal->af) &&
1001 (0 == memcmp (&lal->addr,
1003 (AF_INET == lal->af)
1004 ? sizeof (struct sockaddr_in)
1005 : sizeof (struct sockaddr_in6))) )
1010 if (GNUNET_NO == found)
1012 notify_clients (lal,
1018 /* add addresses that appeared */
1019 have_nat = GNUNET_NO;
1020 for (struct LocalAddressList *pos = ifc_ctx.lal_head;
1022 pos = ifc_ctx.lal_head)
1025 if (GNUNET_NAT_AC_LAN == (GNUNET_NAT_AC_LAN & pos->ac))
1026 have_nat = GNUNET_YES;
1027 for (struct LocalAddressList *lal = lal_head;
1031 if ( (pos->af == lal->af) &&
1032 (0 == memcmp (&lal->addr,
1034 (AF_INET == lal->af)
1035 ? sizeof (struct sockaddr_in)
1036 : sizeof (struct sockaddr_in6))) )
1039 GNUNET_CONTAINER_DLL_remove (ifc_ctx.lal_head,
1042 if (GNUNET_YES == found)
1048 notify_clients (pos,
1050 GNUNET_CONTAINER_DLL_insert (lal_head,
1053 if ( (AF_INET == pos->af) &&
1054 (NULL == pos->hc) &&
1055 (0 != (GNUNET_NAT_AC_LAN & pos->ac)) )
1057 const struct sockaddr_in *s4
1058 = (const struct sockaddr_in *) &pos->addr;
1060 GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
1061 "Found NATed local address %s, starting NAT server\n",
1062 GNUNET_a2s ((const struct sockaddr *) &pos->addr,
1064 pos->hc = GN_start_gnunet_nat_server_ (&s4->sin_addr,
1070 GN_nat_status_changed (have_nat);
1075 * Function called whenever our set of external addresses
1076 * as created by `upnpc` changes.
1078 * @param cls closure with our `struct ClientHandle *`
1079 * @param add_remove #GNUNET_YES to mean the new public IP address, #GNUNET_NO to mean
1080 * the previous (now invalid) one, #GNUNET_SYSERR indicates an error
1081 * @param addr either the previous or the new public IP address
1082 * @param addrlen actual length of the @a addr
1083 * @param result #GNUNET_NAT_ERROR_SUCCESS on success, otherwise the specific error code
1086 upnp_addr_change_cb (void *cls,
1088 const struct sockaddr *addr,
1090 enum GNUNET_NAT_StatusCode result)
1092 struct ClientHandle *ch = cls;
1093 enum GNUNET_NAT_AddressClass ac;
1097 case GNUNET_NAT_ERROR_SUCCESS:
1098 GNUNET_assert (NULL != addr);
1100 case GNUNET_NAT_ERROR_UPNPC_FAILED:
1101 case GNUNET_NAT_ERROR_UPNPC_TIMEOUT:
1102 case GNUNET_NAT_ERROR_IPC_FAILURE:
1103 GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
1104 "Running upnpc failed: %d\n",
1107 case GNUNET_NAT_ERROR_EXTERNAL_IP_UTILITY_NOT_FOUND:
1108 GNUNET_log (GNUNET_ERROR_TYPE_INFO,
1109 "external-ip binary not found\n");
1111 case GNUNET_NAT_ERROR_UPNPC_NOT_FOUND:
1112 GNUNET_log (GNUNET_ERROR_TYPE_INFO,
1113 "upnpc binary not found\n");
1115 case GNUNET_NAT_ERROR_EXTERNAL_IP_UTILITY_FAILED:
1116 GNUNET_log (GNUNET_ERROR_TYPE_WARNING,
1117 "external-ip binary could not be run\n");
1119 case GNUNET_NAT_ERROR_UPNPC_PORTMAP_FAILED:
1120 GNUNET_log (GNUNET_ERROR_TYPE_WARNING,
1121 "upnpc failed to create port mapping\n");
1123 case GNUNET_NAT_ERROR_EXTERNAL_IP_UTILITY_OUTPUT_INVALID:
1124 GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
1125 "Invalid output from upnpc\n");
1127 case GNUNET_NAT_ERROR_EXTERNAL_IP_ADDRESS_INVALID:
1128 GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
1129 "Invalid address returned by upnpc\n");
1132 GNUNET_break (0); /* should not be possible */
1135 switch (addr->sa_family)
1138 ac = is_nat_v4 (&((const struct sockaddr_in *) addr)->sin_addr)
1140 : GNUNET_NAT_AC_EXTERN;
1143 ac = is_nat_v6 (&((const struct sockaddr_in6 *) addr)->sin6_addr)
1145 : GNUNET_NAT_AC_EXTERN;
1151 GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
1152 "upnp external address %s: %s\n",
1153 add_remove ? "added" : "removed",
1165 * Resolve the `hole_external` name to figure out our
1166 * external address from a manually punched hole. The
1167 * port number has already been parsed, this task is
1168 * responsible for periodically doing a DNS lookup.
1170 * @param ch client handle to act upon
1173 dyndns_lookup (void *cls);
1177 * Our (external) hostname was resolved. Update lists of
1178 * current external IPs (note that DNS may return multiple
1179 * addresses!) and notify client accordingly.
1181 * @param cls the `struct ClientHandle`
1182 * @param addr NULL on error, otherwise result of DNS lookup
1183 * @param addrlen number of bytes in @a addr
1186 process_external_ip (void *cls,
1187 const struct sockaddr *addr,
1190 struct ClientHandle *ch = cls;
1191 struct LocalAddressList *lal;
1192 struct sockaddr_storage ss;
1193 struct sockaddr_in *v4;
1194 struct sockaddr_in6 *v6;
1198 struct LocalAddressList *laln;
1202 = GNUNET_SCHEDULER_add_delayed (dyndns_frequency,
1205 /* Current iteration is over, remove 'old' IPs now */
1206 for (lal = ch->ext_addr_head; NULL != lal; lal = laln)
1209 if (GNUNET_YES == lal->old)
1211 GNUNET_CONTAINER_DLL_remove (ch->ext_addr_head,
1214 check_notify_client (lal,
1222 GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
1223 "Got IP `%s' for external address `%s'\n",
1228 /* build sockaddr storage with port number */
1235 switch (addr->sa_family)
1238 v4 = (struct sockaddr_in *) &ss;
1239 v4->sin_port = htons (ch->ext_dns_port);
1242 v6 = (struct sockaddr_in6 *) &ss;
1243 v6->sin6_port = htons (ch->ext_dns_port);
1249 /* See if 'ss' matches any of our known addresses */
1250 for (lal = ch->ext_addr_head; NULL != lal; lal = lal->next)
1252 if (GNUNET_NO == lal->old)
1253 continue; /* already processed, skip */
1254 if ( (addr->sa_family == lal->addr.ss_family) &&
1259 /* Address unchanged, remember so we do not remove */
1260 lal->old = GNUNET_NO;
1261 return; /* done here */
1264 /* notify client, and remember IP for later removal! */
1265 lal = GNUNET_new (struct LocalAddressList);
1267 lal->af = ss.ss_family;
1268 lal->ac = GNUNET_NAT_AC_GLOBAL | GNUNET_NAT_AC_MANUAL;
1269 GNUNET_CONTAINER_DLL_insert (ch->ext_addr_head,
1272 check_notify_client (lal,
1279 * Resolve the `hole_external` name to figure out our
1280 * external address from a manually punched hole. The
1281 * port number has already been parsed, this task is
1282 * responsible for periodically doing a DNS lookup.
1284 * @param ch client handle to act upon
1287 dyndns_lookup (void *cls)
1289 struct ClientHandle *ch = cls;
1290 struct LocalAddressList *lal;
1292 GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
1293 "Performing DNS lookup for punched hole given for `%s' as `%s:%u'\n",
1296 (unsigned int) ch->ext_dns_port);
1297 for (lal = ch->ext_addr_head; NULL != lal; lal = lal->next)
1298 lal->old = GNUNET_YES;
1299 ch->ext_dns_task = NULL;
1300 ch->ext_dns = GNUNET_RESOLVER_ip_get (ch->hole_external,
1302 GNUNET_TIME_UNIT_MINUTES,
1303 &process_external_ip,
1309 * Resolve the `hole_external` name to figure out our
1310 * external address from a manually punched hole. The
1311 * given name may be "AUTO" in which case we should use
1312 * the IP address(es) we have from upnpc or other methods.
1313 * The name can also be an IP address, in which case we
1314 * do not need to do DNS resolution. Finally, we also
1315 * need to parse the port number.
1317 * @param ch client handle to act upon
1320 lookup_hole_external (struct ClientHandle *ch)
1324 struct sockaddr_in *s4;
1325 struct LocalAddressList *lal;
1327 port = strrchr (ch->hole_external, ':');
1330 GNUNET_log (GNUNET_ERROR_TYPE_WARNING,
1331 _("Malformed punched hole specification `%s' (lacks port)\n"),
1335 if ( (1 != sscanf (port + 1,
1340 GNUNET_log (GNUNET_ERROR_TYPE_WARNING,
1341 _("Invalid port number in punched hole specification `%s' (lacks port)\n"),
1345 ch->ext_dns_port = (uint16_t) pnum;
1348 lal = GNUNET_new (struct LocalAddressList);
1349 if ('[' == *ch->hole_external)
1351 struct sockaddr_in6 *s6 = (struct sockaddr_in6 *) &lal->addr;
1353 s6->sin6_family = AF_INET6;
1354 if (']' != (ch->hole_external[strlen(ch->hole_external)-1]))
1356 GNUNET_log (GNUNET_ERROR_TYPE_WARNING,
1357 _("Malformed punched hole specification `%s' (lacks `]')\n"),
1362 ch->hole_external[strlen(ch->hole_external)-1] = '\0';
1363 if (1 != inet_pton (AF_INET6,
1364 ch->hole_external + 1,
1367 GNUNET_log (GNUNET_ERROR_TYPE_WARNING,
1368 _("Malformed punched hole specification `%s' (IPv6 address invalid)"),
1369 ch->hole_external + 1);
1373 s6->sin6_port = htons (ch->ext_dns_port);
1375 lal->ac = GNUNET_NAT_AC_GLOBAL | GNUNET_NAT_AC_MANUAL;
1376 GNUNET_CONTAINER_DLL_insert (ch->ext_addr_head,
1379 check_notify_client (lal,
1385 s4 = (struct sockaddr_in *) &lal->addr;
1386 s4->sin_family = AF_INET;
1387 if (1 == inet_pton (AF_INET,
1391 GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
1392 "IPv4 punched hole given for `%s' via `%s:%u'\n",
1395 (unsigned int) ch->ext_dns_port);
1396 s4->sin_port = htons (ch->ext_dns_port);
1398 lal->ac = GNUNET_NAT_AC_GLOBAL | GNUNET_NAT_AC_MANUAL;
1399 GNUNET_CONTAINER_DLL_insert (ch->ext_addr_head,
1402 check_notify_client (lal,
1407 if (0 == strcasecmp (ch->hole_external,
1410 /* handled in #notify_client_external_ipv4_change() */
1414 /* got a DNS name, trigger lookup! */
1417 = GNUNET_SCHEDULER_add_now (&dyndns_lookup,
1423 * Handler for #GNUNET_MESSAGE_TYPE_NAT_REGISTER message from client.
1424 * We remember the client for updates upon future NAT events.
1426 * @param cls client who sent the message
1427 * @param message the message received
1430 handle_register (void *cls,
1431 const struct GNUNET_NAT_RegisterMessage *message)
1433 struct ClientHandle *ch = cls;
1437 if ( (0 != ch->proto) ||
1438 (NULL != ch->caddrs) )
1440 /* double registration not allowed */
1442 GNUNET_SERVICE_client_drop (ch->client);
1445 ch->flags = message->flags;
1446 ch->proto = message->proto;
1447 ch->num_caddrs = ntohs (message->num_addrs);
1448 ch->caddrs = GNUNET_new_array (ch->num_caddrs,
1449 struct ClientAddress);
1450 left = ntohs (message->header.size) - sizeof (*message);
1451 off = (const char *) &message[1];
1452 for (unsigned int i=0;i<ch->num_caddrs;i++)
1454 const struct sockaddr *sa = (const struct sockaddr *) off;
1459 if (sizeof (sa_family_t) > left)
1462 GNUNET_SERVICE_client_drop (ch->client);
1466 switch (sa->sa_family)
1470 struct sockaddr_in s4;
1474 sizeof (struct sockaddr_in));
1475 alen = sizeof (struct sockaddr_in);
1476 if (is_nat_v4 (&s4.sin_addr))
1477 is_nat = GNUNET_YES;
1478 port = ntohs (s4.sin_port);
1483 struct sockaddr_in6 s6;
1487 sizeof (struct sockaddr_in6));
1488 alen = sizeof (struct sockaddr_in6);
1489 if (is_nat_v6 (&s6.sin6_addr))
1490 is_nat = GNUNET_YES;
1491 port = ntohs (s6.sin6_port);
1496 alen = sizeof (struct sockaddr_un);
1502 GNUNET_SERVICE_client_drop (ch->client);
1506 GNUNET_assert (alen <= left);
1507 GNUNET_assert (alen <= sizeof (struct sockaddr_storage));
1508 GNUNET_memcpy (&ch->caddrs[i].ss,
1512 /* If applicable, try UPNPC NAT punching */
1515 ( (IPPROTO_TCP == ch->proto) ||
1516 (IPPROTO_UDP == ch->proto) ) )
1518 ch->natted_address = GNUNET_YES;
1520 = GNUNET_NAT_mini_map_start (port,
1521 IPPROTO_TCP == ch->proto,
1522 &upnp_addr_change_cb,
1530 = GNUNET_strndup (off,
1531 ntohs (message->str_len));
1532 GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
1533 "Received REGISTER message from client for subsystem `%s'\n",
1536 GNUNET_CONFIGURATION_get_value_string (cfg,
1539 &ch->hole_external))
1540 lookup_hole_external (ch);
1542 /* Actually send IP address list to client */
1543 for (struct LocalAddressList *lal = lal_head;
1547 check_notify_client (lal,
1551 /* Also consider IPv4 determined by `external-ip` */
1552 ch->external_monitor
1553 = GN_external_ipv4_monitor_start (¬ify_client_external_ipv4_change,
1555 GNUNET_SERVICE_client_continue (ch->client);
1560 * Check validity of #GNUNET_MESSAGE_TYPE_NAT_HANDLE_STUN message from
1563 * @param cls client who sent the message
1564 * @param message the message received
1565 * @return #GNUNET_OK if message is well-formed
1568 check_stun (void *cls,
1569 const struct GNUNET_NAT_HandleStunMessage *message)
1571 size_t sa_len = ntohs (message->sender_addr_size);
1572 size_t expect = sa_len + ntohs (message->payload_size);
1574 if (ntohs (message->header.size) - sizeof (*message) != expect)
1577 return GNUNET_SYSERR;
1579 if (sa_len < sizeof (sa_family_t))
1582 return GNUNET_SYSERR;
1589 * Notify all clients about our external IP address
1590 * as reported by the STUN server.
1592 * @param ip the external IP
1593 * @param add #GNUNET_YES to add, #GNUNET_NO to remove
1596 notify_clients_stun_change (const struct sockaddr_in *ip,
1599 for (struct ClientHandle *ch = ch_head;
1603 struct sockaddr_in v4;
1604 struct GNUNET_NAT_AddressChangeNotificationMessage *msg;
1605 struct GNUNET_MQ_Envelope *env;
1607 if (! ch->natted_address)
1610 v4.sin_port = htons (0);
1611 env = GNUNET_MQ_msg_extra (msg,
1613 GNUNET_MESSAGE_TYPE_NAT_ADDRESS_CHANGE);
1614 msg->add_remove = htonl ((int32_t) add);
1615 msg->addr_class = htonl (GNUNET_NAT_AC_EXTERN |
1616 GNUNET_NAT_AC_GLOBAL);
1617 GNUNET_memcpy (&msg[1],
1620 GNUNET_MQ_send (ch->mq,
1627 * Function to be called when we decide that an
1628 * external IP address as told to us by a STUN
1629 * server has gone stale.
1631 * @param cls the `struct StunExternalIP` to drop
1634 stun_ip_timeout (void *cls)
1636 struct StunExternalIP *se = cls;
1638 se->timeout_task = NULL;
1639 notify_clients_stun_change (&se->external_addr,
1641 GNUNET_CONTAINER_DLL_remove (se_head,
1649 * Handler for #GNUNET_MESSAGE_TYPE_NAT_HANDLE_STUN message from
1652 * @param cls client who sent the message
1653 * @param message the message received
1656 handle_stun (void *cls,
1657 const struct GNUNET_NAT_HandleStunMessage *message)
1659 struct ClientHandle *ch = cls;
1660 const char *buf = (const char *) &message[1];
1661 const struct sockaddr *sa;
1662 const void *payload;
1664 size_t payload_size;
1665 struct sockaddr_in external_addr;
1667 sa_len = ntohs (message->sender_addr_size);
1668 payload_size = ntohs (message->payload_size);
1669 sa = (const struct sockaddr *) &buf[0];
1670 payload = (const struct sockaddr *) &buf[sa_len];
1671 switch (sa->sa_family)
1674 if (sa_len != sizeof (struct sockaddr_in))
1677 GNUNET_SERVICE_client_drop (ch->client);
1682 if (sa_len != sizeof (struct sockaddr_in6))
1685 GNUNET_SERVICE_client_drop (ch->client);
1690 GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
1691 "Received HANDLE_STUN message from client\n");
1693 GNUNET_NAT_stun_handle_packet_ (payload,
1697 /* We now know that a server at "sa" claims that
1698 we are visible at IP "external_addr".
1700 We should (for some fixed period of time) tell
1701 all of our clients that listen to a NAT'ed address
1702 that they might want to consider the given 'external_ip'
1703 as their public IP address (this includes TCP and UDP
1704 clients, even if only UDP sends STUN requests).
1706 If we do not get a renewal, the "external_addr" should be
1707 removed again. The timeout frequency should be configurable
1708 (with a sane default), so that the UDP plugin can tell how
1709 often to re-request STUN.
1711 struct StunExternalIP *se;
1713 /* Check if we had a prior response from this STUN server */
1714 for (se = se_head; NULL != se; se = se->next)
1716 if ( (se->stun_server_addr_len != sa_len) ||
1718 &se->stun_server_addr,
1720 continue; /* different STUN server */
1721 if (0 != GNUNET_memcmp (&external_addr,
1722 &se->external_addr))
1724 /* external IP changed, update! */
1725 notify_clients_stun_change (&se->external_addr,
1727 se->external_addr = external_addr;
1728 notify_clients_stun_change (&se->external_addr,
1731 /* update timeout */
1732 GNUNET_SCHEDULER_cancel (se->timeout_task);
1734 = GNUNET_SCHEDULER_add_delayed (stun_stale_timeout,
1739 /* STUN server is completely new, create fresh entry */
1740 se = GNUNET_new (struct StunExternalIP);
1741 se->external_addr = external_addr;
1742 GNUNET_memcpy (&se->stun_server_addr,
1745 se->stun_server_addr_len = sa_len;
1746 se->timeout_task = GNUNET_SCHEDULER_add_delayed (stun_stale_timeout,
1749 GNUNET_CONTAINER_DLL_insert (se_head,
1752 notify_clients_stun_change (&se->external_addr,
1755 GNUNET_SERVICE_client_continue (ch->client);
1761 * #GNUNET_MESSAGE_TYPE_NAT_REQUEST_CONNECTION_REVERSAL message from
1764 * @param cls client who sent the message
1765 * @param message the message received
1766 * @return #GNUNET_OK if message is well-formed
1769 check_request_connection_reversal (void *cls,
1770 const struct GNUNET_NAT_RequestConnectionReversalMessage *message)
1774 expect = ntohs (message->local_addr_size)
1775 + ntohs (message->remote_addr_size);
1776 if (ntohs (message->header.size) - sizeof (*message) != expect)
1779 return GNUNET_SYSERR;
1786 * Handler for #GNUNET_MESSAGE_TYPE_NAT_REQUEST_CONNECTION_REVERSAL
1787 * message from client.
1789 * @param cls client who sent the message
1790 * @param message the message received
1793 handle_request_connection_reversal (void *cls,
1794 const struct GNUNET_NAT_RequestConnectionReversalMessage *message)
1796 struct ClientHandle *ch = cls;
1797 const char *buf = (const char *) &message[1];
1798 size_t local_sa_len = ntohs (message->local_addr_size);
1799 size_t remote_sa_len = ntohs (message->remote_addr_size);
1800 struct sockaddr_in l4;
1801 struct sockaddr_in r4;
1804 GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
1805 "Received REQUEST CONNECTION REVERSAL message from client\n");
1806 if (local_sa_len != sizeof (struct sockaddr_in))
1808 GNUNET_break_op (0);
1809 GNUNET_SERVICE_client_drop (ch->client);
1812 if (remote_sa_len != sizeof (struct sockaddr_in))
1814 GNUNET_break_op (0);
1815 GNUNET_SERVICE_client_drop (ch->client);
1820 sizeof (struct sockaddr_in));
1821 GNUNET_break_op (AF_INET == l4.sin_family);
1822 buf += sizeof (struct sockaddr_in);
1825 sizeof (struct sockaddr_in));
1826 GNUNET_break_op (AF_INET == r4.sin_family);
1827 ret = GN_request_connection_reversal (&l4.sin_addr,
1828 ntohs (l4.sin_port),
1830 if (GNUNET_OK != ret)
1831 GNUNET_log (GNUNET_ERROR_TYPE_WARNING,
1832 _("Connection reversal request failed\n"));
1833 GNUNET_SERVICE_client_continue (ch->client);
1838 * Task run during shutdown.
1843 shutdown_task (void *cls)
1845 struct StunExternalIP *se;
1847 while (NULL != (se = se_head))
1849 GNUNET_CONTAINER_DLL_remove (se_head,
1852 GNUNET_SCHEDULER_cancel (se->timeout_task);
1855 GN_nat_status_changed (GNUNET_NO);
1856 if (NULL != scan_task)
1858 GNUNET_SCHEDULER_cancel (scan_task);
1863 GNUNET_STATISTICS_destroy (stats,
1872 * Setup NAT service.
1874 * @param cls closure
1875 * @param c configuration to use
1876 * @param service the initialized service
1880 const struct GNUNET_CONFIGURATION_Handle *c,
1881 struct GNUNET_SERVICE_Handle *service)
1885 GNUNET_CONFIGURATION_get_value_time (cfg,
1888 &stun_stale_timeout))
1889 stun_stale_timeout = GNUNET_TIME_UNIT_HOURS;
1891 /* Check for UPnP */
1893 = GNUNET_CONFIGURATION_get_value_yesno (cfg,
1896 if (GNUNET_YES == enable_upnp)
1898 /* check if it works */
1899 if (GNUNET_SYSERR ==
1900 GNUNET_OS_check_helper_binary ("upnpc",
1904 GNUNET_log (GNUNET_ERROR_TYPE_ERROR,
1905 _("UPnP enabled in configuration, but UPnP client `upnpc` command not found, disabling UPnP\n"));
1906 enable_upnp = GNUNET_SYSERR;
1910 GNUNET_CONFIGURATION_get_value_time (cfg,
1914 dyndns_frequency = DYNDNS_FREQUENCY;
1916 GNUNET_SCHEDULER_add_shutdown (&shutdown_task,
1918 stats = GNUNET_STATISTICS_create ("nat",
1920 scan_task = GNUNET_SCHEDULER_add_now (&run_scan,
1926 * Callback called when a client connects to the service.
1928 * @param cls closure for the service
1929 * @param c the new client that connected to the service
1930 * @param mq the message queue used to send messages to the client
1931 * @return a `struct ClientHandle`
1934 client_connect_cb (void *cls,
1935 struct GNUNET_SERVICE_Client *c,
1936 struct GNUNET_MQ_Handle *mq)
1938 struct ClientHandle *ch;
1940 ch = GNUNET_new (struct ClientHandle);
1943 GNUNET_CONTAINER_DLL_insert (ch_head,
1951 * Callback called when a client disconnected from the service
1953 * @param cls closure for the service
1954 * @param c the client that disconnected
1955 * @param internal_cls a `struct ClientHandle *`
1958 client_disconnect_cb (void *cls,
1959 struct GNUNET_SERVICE_Client *c,
1962 struct ClientHandle *ch = internal_cls;
1963 struct LocalAddressList *lal;
1965 GNUNET_CONTAINER_DLL_remove (ch_head,
1968 for (unsigned int i=0;i<ch->num_caddrs;i++)
1970 if (NULL != ch->caddrs[i].mh)
1972 GNUNET_NAT_mini_map_stop (ch->caddrs[i].mh);
1973 ch->caddrs[i].mh = NULL;
1976 GNUNET_free_non_null (ch->caddrs);
1977 while (NULL != (lal = ch->ext_addr_head))
1979 GNUNET_CONTAINER_DLL_remove (ch->ext_addr_head,
1984 if (NULL != ch->ext_dns_task)
1986 GNUNET_SCHEDULER_cancel (ch->ext_dns_task);
1987 ch->ext_dns_task = NULL;
1989 if (NULL != ch->external_monitor)
1991 GN_external_ipv4_monitor_stop (ch->external_monitor);
1992 ch->external_monitor = NULL;
1994 if (NULL != ch->ext_dns)
1996 GNUNET_RESOLVER_request_cancel (ch->ext_dns);
1999 GNUNET_free_non_null (ch->hole_external);
2000 GNUNET_free_non_null (ch->section_name);
2006 * Define "main" method using service macro.
2010 GNUNET_SERVICE_OPTION_NONE,
2013 &client_disconnect_cb,
2015 GNUNET_MQ_hd_var_size (register,
2016 GNUNET_MESSAGE_TYPE_NAT_REGISTER,
2017 struct GNUNET_NAT_RegisterMessage,
2019 GNUNET_MQ_hd_var_size (stun,
2020 GNUNET_MESSAGE_TYPE_NAT_HANDLE_STUN,
2021 struct GNUNET_NAT_HandleStunMessage,
2023 GNUNET_MQ_hd_var_size (request_connection_reversal,
2024 GNUNET_MESSAGE_TYPE_NAT_REQUEST_CONNECTION_REVERSAL,
2025 struct GNUNET_NAT_RequestConnectionReversalMessage,
2027 GNUNET_MQ_handler_end ());
2030 #if defined(LINUX) && defined(__GLIBC__)
2034 * MINIMIZE heap size (way below 128k) since this process doesn't need much.
2036 void __attribute__ ((constructor))
2037 GNUNET_ARM_memory_init ()
2039 mallopt (M_TRIM_THRESHOLD, 4 * 1024);
2040 mallopt (M_TOP_PAD, 1 * 1024);
2045 /* end of gnunet-service-nat.c */