2 protocol.c -- handle the meta-protocol, basic functions
3 Copyright (C) 1999-2005 Ivo Timmermans,
4 2000-2006 Guus Sliepen <guus@tinc-vpn.org>
6 This program is free software; you can redistribute it and/or modify
7 it under the terms of the GNU General Public License as published by
8 the Free Software Foundation; either version 2 of the License, or
9 (at your option) any later version.
11 This program is distributed in the hope that it will be useful,
12 but WITHOUT ANY WARRANTY; without even the implied warranty of
13 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
14 GNU General Public License for more details.
16 You should have received a copy of the GNU General Public License
17 along with this program; if not, write to the Free Software
18 Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
26 #include "connection.h"
33 bool tunnelserver = false;
35 /* Jumptable for the request handlers */
37 static bool (*request_handlers[])(connection_t *) = {
38 id_h, metakey_h, challenge_h, chal_reply_h, ack_h,
39 status_h, error_h, termreq_h,
41 add_subnet_h, del_subnet_h,
42 add_edge_h, del_edge_h,
43 key_changed_h, req_key_h, ans_key_h, tcppacket_h,
48 static char (*request_name[]) = {
49 "ID", "METAKEY", "CHALLENGE", "CHAL_REPLY", "ACK",
50 "STATUS", "ERROR", "TERMREQ",
52 "ADD_SUBNET", "DEL_SUBNET",
53 "ADD_EDGE", "DEL_EDGE", "KEY_CHANGED", "REQ_KEY", "ANS_KEY", "PACKET",
56 static splay_tree_t *past_request_tree;
58 bool check_id(const char *id) {
60 if(!isalnum(*id) && *id != '_')
66 /* Generic request routines - takes care of logging and error
69 bool send_request(connection_t *c, const char *format, ...) {
71 char buffer[MAXBUFSIZE];
76 /* Use vsnprintf instead of vasprintf: faster, no memory
77 fragmentation, cleanup is automatic, and there is a limit on the
78 input buffer anyway */
80 va_start(args, format);
81 len = vsnprintf(buffer, MAXBUFSIZE, format, args);
84 if(len < 0 || len > MAXBUFSIZE - 1) {
85 logger(LOG_ERR, _("Output buffer overflow while sending request to %s (%s)"),
86 c->name, c->hostname);
91 sscanf(buffer, "%d", &request);
93 logger(LOG_DEBUG, _("Sending %s to %s (%s): %s"),
94 request_name[request], c->name, c->hostname, buffer);
96 logger(LOG_DEBUG, _("Sending %s to %s (%s)"), request_name[request],
97 c->name, c->hostname);
100 buffer[len++] = '\n';
103 broadcast_meta(NULL, buffer, len);
106 return send_meta(c, buffer, len);
109 void forward_request(connection_t *from) {
115 sscanf(from->buffer, "%d", &request);
117 logger(LOG_DEBUG, _("Forwarding %s from %s (%s): %s"),
118 request_name[request], from->name, from->hostname,
121 logger(LOG_DEBUG, _("Forwarding %s from %s (%s)"),
122 request_name[request], from->name, from->hostname);
125 from->buffer[from->reqlen - 1] = '\n';
127 broadcast_meta(from, from->buffer, from->reqlen);
130 bool receive_request(connection_t *c) {
135 if(sscanf(c->buffer, "%d", &request) == 1) {
136 if((request < 0) || (request >= LAST) || !request_handlers[request]) {
138 logger(LOG_DEBUG, _("Unknown request from %s (%s): %s"),
139 c->name, c->hostname, c->buffer);
141 logger(LOG_ERR, _("Unknown request from %s (%s)"),
142 c->name, c->hostname);
148 logger(LOG_DEBUG, _("Got %s from %s (%s): %s"),
149 request_name[request], c->name, c->hostname,
152 logger(LOG_DEBUG, _("Got %s from %s (%s)"),
153 request_name[request], c->name, c->hostname);
157 if((c->allow_request != ALL) && (c->allow_request != request)) {
158 logger(LOG_ERR, _("Unauthorized request from %s (%s)"), c->name,
163 if(!request_handlers[request](c)) {
164 /* Something went wrong. Probably scriptkiddies. Terminate. */
166 logger(LOG_ERR, _("Error while processing %s from %s (%s)"),
167 request_name[request], c->name, c->hostname);
171 logger(LOG_ERR, _("Bogus data received from %s (%s)"),
172 c->name, c->hostname);
179 static int past_request_compare(const past_request_t *a, const past_request_t *b) {
180 return strcmp(a->request, b->request);
183 static void free_past_request(past_request_t *r) {
192 static struct event past_request_event;
194 bool seen_request(char *request) {
195 past_request_t *new, p = {0};
201 if(splay_search(past_request_tree, &p)) {
202 ifdebug(SCARY_THINGS) logger(LOG_DEBUG, _("Already seen request"));
205 new = xmalloc(sizeof(*new));
206 new->request = xstrdup(request);
207 new->firstseen = time(NULL);
208 splay_insert(past_request_tree, new);
209 event_add(&past_request_event, &(struct timeval){10, 0});
214 void age_past_requests(int fd, short events, void *data) {
215 splay_node_t *node, *next;
217 int left = 0, deleted = 0;
218 time_t now = time(NULL);
222 for(node = past_request_tree->head; node; node = next) {
226 if(p->firstseen + pinginterval < now)
227 splay_delete_node(past_request_tree, node), deleted++;
233 ifdebug(SCARY_THINGS) logger(LOG_DEBUG, _("Aging past requests: deleted %d, left %d"),
237 event_add(&past_request_event, &(struct timeval){10, 0});
240 void init_requests(void) {
243 past_request_tree = splay_alloc_tree((splay_compare_t) past_request_compare, (splay_action_t) free_past_request);
245 timeout_set(&past_request_event, age_past_requests, NULL);
248 void exit_requests(void) {
251 splay_delete_tree(past_request_tree);
253 event_del(&past_request_event);