2 This file is part of GNUnet.
3 (C) 2010 Christian Grothoff
5 GNUnet is free software; you can redistribute it and/or modify
6 it under the terms of the GNU General Public License as published
7 by the Free Software Foundation; either version 3, or (at your
8 option) any later version.
10 GNUnet is distributed in the hope that it will be useful, but
11 WITHOUT ANY WARRANTY; without even the implied warranty of
12 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
13 General Public License for more details.
15 You should have received a copy of the GNU General Public License
16 along with GNUnet; see the file COPYING. If not, write to the
17 Free Software Foundation, Inc., 59 Temple Place - Suite 330,
18 Boston, MA 02111-1307, USA.
22 * @file vpn/gnunet-daemon-exit.c
24 * @author Philipp Toelke
27 #include <gnunet_common.h>
28 #include <gnunet_program_lib.h>
29 #include <gnunet_protocols.h>
30 #include <gnunet_applications.h>
31 #include <gnunet_mesh_service.h>
32 #include <gnunet_constants.h>
35 #include "gnunet-vpn-packet.h"
36 #include "gnunet-helper-vpn-api.h"
37 #include "gnunet-vpn-checksum.h"
40 * The handle to the configuration used throughout the process
42 static const struct GNUNET_CONFIGURATION_Handle *cfg;
45 * The handle to the service-configuration
47 static struct GNUNET_CONFIGURATION_Handle *servicecfg;
50 * The handle to the helper
52 struct GNUNET_VPN_HELPER_Handle *helper_handle;
62 static struct GNUNET_MESH_Handle *mesh_handle;
65 * This hashmaps contains the mapping from peer, service-descriptor,
66 * source-port and destination-port to a struct redirect_state
68 static struct GNUNET_CONTAINER_MultiHashMap *udp_connections;
69 static struct GNUNET_CONTAINER_Heap *udp_connections_heap;
70 static struct GNUNET_CONTAINER_MultiHashMap *tcp_connections;
71 static struct GNUNET_CONTAINER_Heap *tcp_connections_heap;
74 * If there are at least this many udp-Connections, old ones will be removed
76 static long long unsigned int max_udp_connections = 200;
79 * If there are at least this many tcp-Connections, old ones will be removed
81 static long long unsigned int max_tcp_connections = 200;
86 unsigned char addr[16];
91 * This struct is saved into the services-hashmap
93 struct redirect_service
100 uint16_t remote_port;
118 * The source-address of this connection. When a packet to this address is
119 * received, this tunnel is used to forward it. ipv4-addresses will be put
120 * here left-aligned */
123 * The source-port of this connection
129 * This struct is saved into {tcp,udp}_connections;
131 struct redirect_state
133 struct GNUNET_MESH_Tunnel *tunnel;
134 GNUNET_HashCode desc;
135 struct redirect_service *serv;
136 struct remote_addr remote;
138 struct GNUNET_CONTAINER_HeapNode* heap_node;
139 struct GNUNET_CONTAINER_MultiHashMap *hashmap;
140 GNUNET_HashCode hash;
142 enum { SERVICE, REMOTE } type;
145 * The source-address and -port of this connection
147 struct redirect_info redirect_info;
151 * This hashmaps saves interesting things about the configured services
153 static struct GNUNET_CONTAINER_MultiHashMap *udp_services;
154 static struct GNUNET_CONTAINER_MultiHashMap *tcp_services;
157 * Function that frees everything from a hashmap
160 free_iterate(void* cls, const GNUNET_HashCode* hash, void* value)
167 * Function scheduled as very last function, cleans up after us
170 cleanup(void* cls, const struct GNUNET_SCHEDULER_TaskContext* tskctx) {
171 GNUNET_assert (0 != (tskctx->reason & GNUNET_SCHEDULER_REASON_SHUTDOWN));
173 GNUNET_CONTAINER_multihashmap_iterate(udp_connections,
177 GNUNET_CONTAINER_multihashmap_iterate(tcp_connections,
181 if (mesh_handle != NULL)
183 GNUNET_MESH_disconnect(mesh_handle);
189 collect_connections(void* cls, const struct GNUNET_SCHEDULER_TaskContext* tc) {
190 if ( (tc->reason & GNUNET_SCHEDULER_REASON_SHUTDOWN) != 0)
194 struct GNUNET_CONTAINER_Heap *heap = cls;
196 struct redirect_state* state = GNUNET_CONTAINER_heap_remove_root(heap);
198 /* This is free()ed memory! */
199 state->heap_node = NULL;
201 /* FIXME! GNUNET_MESH_close_tunnel(state->tunnel); */
203 GNUNET_CONTAINER_multihashmap_remove(state->hashmap, &state->hash, state);
209 hash_redirect_info(GNUNET_HashCode* hash, struct redirect_info* u_i, size_t addrlen)
212 /* the gnunet hashmap only uses the first sizeof(unsigned int) of the hash
214 * build the hash out of the last bytes of the address and the 2 bytes of
217 memcpy(hash, &u_i->pt, sizeof(u_i->pt));
218 memcpy(((unsigned char*)hash)+2, u_i->addr+(addrlen-(sizeof(unsigned int) - 2)), (sizeof(unsigned int) - 2));
219 memset(((unsigned char*)hash)+sizeof(unsigned int), 0, sizeof(GNUNET_HashCode) - sizeof(unsigned int));
223 * cls is the pointer to a GNUNET_MessageHeader that is
224 * followed by the service-descriptor and the udp-packet that should be sent;
227 send_udp_to_peer_notify_callback (void *cls, size_t size, void *buf)
229 struct GNUNET_MessageHeader *hdr = cls;
230 GNUNET_assert (size >= ntohs (hdr->size));
231 memcpy (buf, hdr, ntohs (hdr->size));
232 size = ntohs(hdr->size);
238 * @brief Handles an UDP-Packet received from the helper.
240 * @param udp A pointer to the Packet
241 * @param dadr The IP-Destination-address
242 * @param addrlen The length of the address
243 * @param version 4 or 6
246 udp_from_helper (struct udp_pkt *udp, unsigned char *dadr, size_t addrlen,
247 unsigned int version)
249 struct redirect_info u_i;
250 struct GNUNET_MESH_Tunnel *tunnel;
252 struct GNUNET_MessageHeader *msg;
254 memset (&u_i, 0, sizeof (struct redirect_info));
256 memcpy (&u_i.addr, dadr, addrlen);
260 /* get tunnel and service-descriptor from this */
261 GNUNET_HashCode hash;
262 hash_redirect_info(&hash, &u_i, addrlen);
264 struct redirect_state *state =
265 GNUNET_CONTAINER_multihashmap_get (udp_connections, &hash);
267 /* Mark this connection as freshly used */
268 GNUNET_CONTAINER_heap_update_cost (udp_connections_heap, state->heap_node,
269 GNUNET_TIME_absolute_get ().abs_value);
271 tunnel = state->tunnel;
273 if (state->type == SERVICE)
275 /* check if spt == serv.remote if yes: set spt = serv.myport ("nat") */
276 if (ntohs (udp->spt) == state->serv->remote_port)
278 udp->spt = htons (state->serv->my_port);
282 /* otherwise the answer came from a different port (tftp does this)
283 * add this new port to the list of all services, so that the packets
284 * coming back from the client to this new port will be routed correctly
286 struct redirect_service *serv =
287 GNUNET_malloc (sizeof (struct redirect_service));
288 memcpy (serv, state->serv, sizeof (struct redirect_service));
289 serv->my_port = ntohs (udp->spt);
290 serv->remote_port = ntohs (udp->spt);
291 uint16_t *desc = alloca (sizeof (GNUNET_HashCode) + 2);
292 memcpy ((GNUNET_HashCode *) (desc + 1), &state->desc,
293 sizeof (GNUNET_HashCode));
294 *desc = ntohs (udp->spt);
295 GNUNET_assert (GNUNET_OK ==
296 GNUNET_CONTAINER_multihashmap_put (udp_services,
297 (GNUNET_HashCode*)desc, serv,
298 GNUNET_CONTAINER_MULTIHASHMAPOPTION_UNIQUE_ONLY));
304 /* send udp-packet back */
306 sizeof (struct GNUNET_MessageHeader) + sizeof (GNUNET_HashCode) +
308 msg = GNUNET_malloc (len);
309 msg->size = htons (len);
310 msg->type = htons (state->type == SERVICE ? GNUNET_MESSAGE_TYPE_SERVICE_UDP_BACK : GNUNET_MESSAGE_TYPE_REMOTE_UDP_BACK);
311 GNUNET_HashCode *desc = (GNUNET_HashCode *) (msg + 1);
312 if (state->type == SERVICE)
313 memcpy (desc, &state->desc, sizeof (GNUNET_HashCode));
315 memcpy (desc, &state->remote, sizeof (struct remote_addr));
316 void *_udp = desc + 1;
317 memcpy (_udp, udp, ntohs (udp->len));
319 GNUNET_MESH_notify_transmit_ready (tunnel,
322 GNUNET_TIME_relative_divide
323 (GNUNET_CONSTANTS_MAX_CORK_DELAY, 2),
324 (const struct GNUNET_PeerIdentity *)
326 send_udp_to_peer_notify_callback, msg);
330 * @brief Handles a TCP-Packet received from the helper.
332 * @param tcp A pointer to the Packet
333 * @param dadr The IP-Destination-address
334 * @param addrlen The length of the address
335 * @param version 4 or 6
336 * @param pktlen the length of the packet, including its header
339 tcp_from_helper (struct tcp_pkt *tcp, unsigned char *dadr, size_t addrlen,
340 unsigned int version, size_t pktlen)
342 struct redirect_info u_i;
343 struct GNUNET_MESH_Tunnel *tunnel;
345 struct GNUNET_MessageHeader *msg;
347 memset (&u_i, 0, sizeof (struct redirect_info));
349 memcpy (&u_i.addr, dadr, addrlen);
352 /* get tunnel and service-descriptor from this */
353 GNUNET_HashCode hash;
354 hash_redirect_info(&hash, &u_i, addrlen);
356 struct redirect_state *state =
357 GNUNET_CONTAINER_multihashmap_get (tcp_connections, &hash);
359 if (state == NULL) return;
361 /* Mark this connection as freshly used */
362 GNUNET_CONTAINER_heap_update_cost (tcp_connections_heap, state->heap_node,
363 GNUNET_TIME_absolute_get ().abs_value);
365 tunnel = state->tunnel;
367 if (state->type == SERVICE)
369 /* check if spt == serv.remote if yes: set spt = serv.myport ("nat") */
370 if (ntohs (tcp->spt) == state->serv->remote_port)
372 tcp->spt = htons (state->serv->my_port);
376 // This is an illegal packet.
381 /* send tcp-packet back */
383 sizeof (struct GNUNET_MessageHeader) + sizeof (GNUNET_HashCode) + pktlen;
384 GNUNET_log(GNUNET_ERROR_TYPE_DEBUG, "len: %d\n", pktlen);
385 msg = GNUNET_malloc (len);
386 msg->size = htons (len);
387 msg->type = htons (state->type == SERVICE ? GNUNET_MESSAGE_TYPE_SERVICE_TCP_BACK : GNUNET_MESSAGE_TYPE_REMOTE_TCP_BACK);
388 GNUNET_HashCode *desc = (GNUNET_HashCode *) (msg + 1);
389 if (state->type == SERVICE)
390 memcpy (desc, &state->desc, sizeof (GNUNET_HashCode));
392 memcpy (desc, &state->remote, sizeof (struct remote_addr));
393 void *_tcp = desc + 1;
394 memcpy (_tcp, tcp, pktlen);
396 GNUNET_MESH_notify_transmit_ready (tunnel,
399 GNUNET_TIME_relative_divide
400 (GNUNET_CONSTANTS_MAX_CORK_DELAY, 2),
401 (const struct GNUNET_PeerIdentity *)NULL,
402 len, send_udp_to_peer_notify_callback,
408 * Receive packets from the helper-process
411 message_token (void *cls,
412 void *client, const struct GNUNET_MessageHeader *message)
414 GNUNET_assert (ntohs (message->type) == GNUNET_MESSAGE_TYPE_VPN_HELPER);
416 struct tun_pkt *pkt_tun = (struct tun_pkt *) message;
418 /* ethertype is ipv6 */
419 if (ntohs (pkt_tun->tun.type) == 0x86dd)
421 struct ip6_pkt *pkt6 = (struct ip6_pkt *) pkt_tun;
422 if (0x11 == pkt6->ip6_hdr.nxthdr)
423 udp_from_helper (&((struct ip6_udp *) pkt6)->udp_hdr,
424 (unsigned char *) &pkt6->ip6_hdr.dadr, 16, 6);
425 else if (0x06 == pkt6->ip6_hdr.nxthdr)
426 tcp_from_helper (&((struct ip6_tcp *) pkt6)->tcp_hdr,
427 (unsigned char *) &pkt6->ip6_hdr.dadr, 16, 6,
428 ntohs (pkt6->ip6_hdr.paylgth));
430 else if (ntohs (pkt_tun->tun.type) == 0x0800)
432 struct ip_pkt *pkt4 = (struct ip_pkt *) pkt_tun;
433 uint32_t tmp = pkt4->ip_hdr.dadr;
434 if (0x11 == pkt4->ip_hdr.proto)
435 udp_from_helper (&((struct ip_udp *) pkt4)->udp_hdr,
436 (unsigned char *) &tmp, 4, 4);
437 else if (0x06 == pkt4->ip_hdr.proto)
439 size_t pktlen = ntohs(pkt4->ip_hdr.tot_lngth);
440 GNUNET_log(GNUNET_ERROR_TYPE_DEBUG, "tot: %d\n", pktlen);
441 pktlen -= 4*pkt4->ip_hdr.hdr_lngth;
442 GNUNET_log(GNUNET_ERROR_TYPE_DEBUG, "-hdr: %d\n", pktlen);
443 tcp_from_helper (&((struct ip_tcp *) pkt4)->tcp_hdr,
444 (unsigned char *) &tmp, 4, 4, pktlen);
454 * Reads the configuration servicecfg and populates udp_services
457 * @param section name of section in config, equal to hostname
458 * @param option type of redirect
459 * @param value specification of services, format is
460 * "OFFERED-PORT:HOSTNAME:HOST-PORT" (SPACE <more of those>)*
463 read_service_conf (void *cls, const char *section, const char *option,
470 GNUNET_HashCode hash;
471 uint16_t *desc = alloca (sizeof (GNUNET_HashCode) + 2);
472 GNUNET_CRYPTO_hash (section, strlen (section) + 1,
473 (GNUNET_HashCode *) (desc + 1));
479 if (0 == strcmp ("UDP_REDIRECTS", option))
481 else if (0 == strcmp ("TCP_REDIRECTS", option))
488 cpy = GNUNET_strdup (value);
489 for (redirect = strtok (cpy, " "); redirect != NULL; redirect = strtok
492 if (NULL == (hostname = strstr (redirect, ":")))
494 GNUNET_log (GNUNET_ERROR_TYPE_WARNING, "Warning: option %s is not formatted correctly!\n",
500 if (NULL == (hostport = strstr (hostname, ":")))
502 GNUNET_log (GNUNET_ERROR_TYPE_WARNING, "Warning: option %s is not formatted correctly!\n",
509 int local_port = atoi (redirect);
510 if (!((local_port > 0) && (local_port < 65536)))
511 GNUNET_log (GNUNET_ERROR_TYPE_WARNING, "Warning: %s is not a correct port.",
516 struct redirect_service *serv =
517 GNUNET_malloc (sizeof (struct redirect_service));
518 memset (serv, 0, sizeof (struct redirect_service));
519 serv->my_port = local_port;
521 if (0 == strcmp ("localhost4", hostname))
526 GNUNET_assert (GNUNET_OK ==
527 GNUNET_CONFIGURATION_get_value_string (cfg,
532 inet_pton (AF_INET, ip4addr,
533 serv->v4.ip4address));
534 GNUNET_free (ip4addr);
536 else if (0 == strcmp ("localhost6", hostname))
541 GNUNET_assert (GNUNET_OK ==
542 GNUNET_CONFIGURATION_get_value_string (cfg,
547 inet_pton (AF_INET6, ip6addr,
548 serv->v6.ip6address));
549 GNUNET_free (ip6addr);
553 // TODO Lookup, yadayadayada
556 serv->remote_port = atoi (hostport);
557 GNUNET_log (GNUNET_ERROR_TYPE_DEBUG, "Store with key1 %x\n",
558 *((unsigned long long *) (desc + 1)));
559 GNUNET_log (GNUNET_ERROR_TYPE_DEBUG, "Store with key2 %x\n",
560 *((unsigned long long *) &hash));
562 GNUNET_assert (GNUNET_OK ==
563 GNUNET_CONTAINER_multihashmap_put (udp_services,
564 (GNUNET_HashCode*)desc, serv,
565 GNUNET_CONTAINER_MULTIHASHMAPOPTION_UNIQUE_ONLY));
567 GNUNET_assert (GNUNET_OK ==
568 GNUNET_CONTAINER_multihashmap_put (tcp_services,
569 (GNUNET_HashCode*)desc, serv,
570 GNUNET_CONTAINER_MULTIHASHMAPOPTION_UNIQUE_ONLY));
578 * Start the helper-process
580 * If cls != NULL it is assumed that this function is called as a result of a dying
581 * helper. cls is then taken as handle to the old helper and is cleaned up.
584 start_helper_and_schedule(void *cls,
585 const struct GNUNET_SCHEDULER_TaskContext *tc) {
586 if (0 != (tc->reason & GNUNET_SCHEDULER_REASON_SHUTDOWN))
599 if (GNUNET_SYSERR == GNUNET_CONFIGURATION_get_value_string(cfg, "exit", "IFNAME", &ifname))
601 GNUNET_log(GNUNET_ERROR_TYPE_ERROR, "No entry 'IFNAME' in configuration!\n");
605 if (GNUNET_SYSERR == GNUNET_CONFIGURATION_get_value_string(cfg, "exit", "IPV6ADDR", &ipv6addr))
607 GNUNET_log(GNUNET_ERROR_TYPE_ERROR, "No entry 'IPV6ADDR' in configuration!\n");
611 if (GNUNET_SYSERR == GNUNET_CONFIGURATION_get_value_string(cfg, "exit", "IPV6PREFIX", &ipv6prefix))
613 GNUNET_log(GNUNET_ERROR_TYPE_ERROR, "No entry 'IPV6PREFIX' in configuration!\n");
617 if (GNUNET_SYSERR == GNUNET_CONFIGURATION_get_value_string(cfg, "exit", "IPV4ADDR", &ipv4addr))
619 GNUNET_log(GNUNET_ERROR_TYPE_ERROR, "No entry 'IPV4ADDR' in configuration!\n");
623 if (GNUNET_SYSERR == GNUNET_CONFIGURATION_get_value_string(cfg, "exit", "IPV4MASK", &ipv4mask))
625 GNUNET_log(GNUNET_ERROR_TYPE_ERROR, "No entry 'IPV4MASK' in configuration!\n");
630 * Messages get passed to the function message_token
631 * When the helper dies, this function will be called again with the
632 * helper_handle as cls.
634 helper_handle = start_helper(ifname,
640 start_helper_and_schedule,
645 GNUNET_free(ipv6addr);
646 GNUNET_free(ipv6prefix);
647 GNUNET_free(ipv4addr);
648 GNUNET_free(ipv4mask);
653 prepare_ipv4_packet (ssize_t len, ssize_t pktlen, void *payload,
654 uint16_t protocol, void *ipaddress, void *tunnel,
655 struct redirect_state *state, struct ip_pkt *pkt4)
659 pkt4->shdr.type = htons (GNUNET_MESSAGE_TYPE_VPN_HELPER);
660 pkt4->shdr.size = htons (len);
662 pkt4->tun.type = htons (0x0800);
664 memcpy (&pkt4->data, payload, pktlen);
666 pkt4->ip_hdr.version = 4;
667 pkt4->ip_hdr.hdr_lngth = 5;
668 pkt4->ip_hdr.diff_serv = 0;
669 pkt4->ip_hdr.tot_lngth = htons (20 + pktlen);
670 pkt4->ip_hdr.ident = 0;
671 pkt4->ip_hdr.flags = 0;
672 pkt4->ip_hdr.frag_off = 0;
673 pkt4->ip_hdr.ttl = 255;
674 pkt4->ip_hdr.proto = protocol;
675 pkt4->ip_hdr.chks = 0; /* Will be calculated later */
677 memcpy (&tmp, ipaddress, 4);
678 pkt4->ip_hdr.dadr = tmp;
680 /* Generate a new src-address */
683 GNUNET_assert (GNUNET_OK ==
684 GNUNET_CONFIGURATION_get_value_string (cfg, "exit",
687 GNUNET_assert (GNUNET_OK ==
688 GNUNET_CONFIGURATION_get_value_string (cfg, "exit",
691 inet_pton (AF_INET, ipv4addr, &tmp);
692 inet_pton (AF_INET, ipv4mask, &tmp2);
693 GNUNET_free (ipv4addr);
694 GNUNET_free (ipv4mask);
696 /* This should be a noop */
699 tmp |= ntohl (*((uint32_t *) tunnel)) & (~tmp2);
701 pkt4->ip_hdr.sadr = tmp;
703 memcpy (&state->redirect_info.addr, &tmp, 4);
704 if (0x11 == protocol)
706 struct ip_udp* pkt4_udp = (struct ip_udp*)pkt4;
707 state->redirect_info.pt = pkt4_udp->udp_hdr.spt;
709 pkt4_udp->udp_hdr.crc = 0; /* Optional for IPv4 */
711 else if (0x06 == protocol)
713 struct ip_tcp* pkt4_tcp = (struct ip_tcp*)pkt4;
714 state->redirect_info.pt = pkt4_tcp->tcp_hdr.spt;
716 pkt4_tcp->tcp_hdr.crc = 0;
718 tmp = pkt4->ip_hdr.sadr;
720 calculate_checksum_update (sum, (uint16_t *) & tmp, 4);
721 tmp = pkt4->ip_hdr.dadr;
723 calculate_checksum_update (sum, (uint16_t *) & tmp, 4);
725 tmp = (protocol << 16) | (0xffff & pktlen);
727 GNUNET_log(GNUNET_ERROR_TYPE_DEBUG, "line: %08x, %x \n", tmp, (0xffff & pktlen));
731 sum = calculate_checksum_update (sum, (uint16_t *) & tmp, 4);
734 calculate_checksum_update (sum, (uint16_t *) & pkt4_tcp->tcp_hdr, pktlen);
735 pkt4_tcp->tcp_hdr.crc = calculate_checksum_end (sum);
739 calculate_ip_checksum ((uint16_t *) & pkt4->ip_hdr, 5 * 4);
743 prepare_ipv6_packet (ssize_t len, ssize_t pktlen, void *payload,
744 uint16_t protocol, void *ipaddress, void *tunnel,
745 struct redirect_state *state, struct ip6_pkt *pkt6)
749 pkt6->shdr.type = htons (GNUNET_MESSAGE_TYPE_VPN_HELPER);
750 pkt6->shdr.size = htons (len);
753 pkt6->tun.type = htons (0x86dd);
755 memcpy (&pkt6->data, payload, pktlen);
757 pkt6->ip6_hdr.version = 6;
758 pkt6->ip6_hdr.nxthdr = protocol;
759 pkt6->ip6_hdr.paylgth = htons (pktlen);
760 pkt6->ip6_hdr.hoplmt = 64;
762 memcpy (pkt6->ip6_hdr.dadr, ipaddress, 16);
764 /* Generate a new src-address
765 * This takes as much from the address of the tunnel as fits into
768 unsigned long long ipv6prefix;
769 GNUNET_assert (GNUNET_OK ==
770 GNUNET_CONFIGURATION_get_value_string (cfg, "exit",
773 GNUNET_assert (GNUNET_OK ==
774 GNUNET_CONFIGURATION_get_value_number (cfg, "exit",
777 GNUNET_assert (ipv6prefix < 127);
778 ipv6prefix = (ipv6prefix + 7) / 8;
780 inet_pton (AF_INET6, ipv6addr, &pkt6->ip6_hdr.sadr);
781 GNUNET_free (ipv6addr);
783 if (ipv6prefix < (16 - sizeof (void *)))
784 ipv6prefix = 16 - sizeof (void *);
786 unsigned int offset = ipv6prefix - (16 - sizeof (void *));
787 memcpy ((((char *) &pkt6->ip6_hdr.sadr)) + ipv6prefix,
788 ((char *) &tunnel) + offset, 16 - ipv6prefix);
790 /* copy the needed information into the state */
791 memcpy (&state->redirect_info.addr, &pkt6->ip6_hdr.sadr, 16);
793 if (0x11 == protocol)
795 struct ip6_udp* pkt6_udp = (struct ip6_udp*)pkt6;
796 state->redirect_info.pt = pkt6_udp->udp_hdr.spt;
798 pkt6_udp->udp_hdr.crc = 0;
801 calculate_checksum_update (sum, (uint16_t *) & pkt6_udp->ip6_hdr.sadr, 16);
803 calculate_checksum_update (sum, (uint16_t *) & pkt6_udp->ip6_hdr.dadr, 16);
804 tmp = (htons (pktlen) & 0xffff);
805 sum = calculate_checksum_update (sum, (uint16_t *) & tmp, 4);
806 tmp = htons (((pkt6_udp->ip6_hdr.nxthdr & 0x00ff)));
807 sum = calculate_checksum_update (sum, (uint16_t *) & tmp, 4);
810 calculate_checksum_update (sum, (uint16_t *) & pkt6_udp->udp_hdr,
811 ntohs (pkt6_udp->udp_hdr.len));
812 pkt6_udp->udp_hdr.crc = calculate_checksum_end (sum);
814 else if (0x06 == protocol)
816 struct ip6_tcp* pkt6_tcp = (struct ip6_tcp*)pkt6;
817 state->redirect_info.pt = pkt6_tcp->tcp_hdr.spt;
819 pkt6_tcp->tcp_hdr.crc = 0;
822 calculate_checksum_update (sum, (uint16_t *) & pkt6->ip6_hdr.sadr, 16);
824 calculate_checksum_update (sum, (uint16_t *) & pkt6->ip6_hdr.dadr, 16);
826 sum = calculate_checksum_update (sum, (uint16_t *) & tmp, 4);
827 tmp = htonl (((pkt6->ip6_hdr.nxthdr & 0x000000ff)));
828 sum = calculate_checksum_update (sum, (uint16_t *) & tmp, 4);
831 calculate_checksum_update (sum, (uint16_t *) & pkt6_tcp->tcp_hdr,
832 ntohs (pkt6->ip6_hdr.paylgth));
833 pkt6_tcp->tcp_hdr.crc = calculate_checksum_end (sum);
838 * The messages are one GNUNET_HashCode for the service followed by a struct tcp_pkt
841 receive_tcp_service (void *cls,
842 struct GNUNET_MESH_Tunnel *tunnel,
844 const struct GNUNET_PeerIdentity *sender,
845 const struct GNUNET_MessageHeader *message,
846 const struct GNUNET_TRANSPORT_ATS_Information *atsi)
848 GNUNET_log (GNUNET_ERROR_TYPE_DEBUG, "Received TCP-Packet\n");
849 GNUNET_HashCode *desc = (GNUNET_HashCode *) (message + 1);
850 struct tcp_pkt *pkt = (struct tcp_pkt *) (desc + 1);
851 unsigned int pkt_len = ntohs (message->size) - sizeof (struct
852 GNUNET_MessageHeader)
853 - sizeof (GNUNET_HashCode);
855 /** Get the configuration from the services-hashmap.
857 * Which service is needed only depends on the service-descriptor and the
860 uint16_t *tcp_desc = alloca (sizeof (GNUNET_HashCode) + 2);
862 memcpy (tcp_desc + 1, desc, sizeof (GNUNET_HashCode));
863 *tcp_desc = ntohs (pkt->dpt);
864 struct redirect_service *serv =
865 GNUNET_CONTAINER_multihashmap_get (tcp_services, (GNUNET_HashCode*)tcp_desc);
868 GNUNET_log (GNUNET_ERROR_TYPE_INFO,
869 "No service found for TCP dpt %d!\n", *tcp_desc);
873 pkt->dpt = htons (serv->remote_port);
876 * At this point it would be possible to check against some kind of ACL.
882 /* Prepare the state.
883 * This will be saved in the hashmap, so that the receiving procedure knows
884 * through which tunnel this connection has to be routed.
886 struct redirect_state *state =
887 GNUNET_malloc (sizeof (struct redirect_state));
888 memset (state, 0, sizeof (struct redirect_state));
889 state->tunnel = tunnel;
891 state->type = SERVICE;
892 state->hashmap = tcp_connections;
893 memcpy (&state->desc, desc, sizeof (GNUNET_HashCode));
895 len = sizeof (struct GNUNET_MessageHeader) + sizeof (struct pkt_tun) +
896 sizeof (struct ip6_hdr) + pkt_len;
899 memset (buf, 0, len);
901 switch (serv->version)
904 prepare_ipv4_packet (len, pkt_len, pkt, 0x06, /* TCP */
905 &serv->v4.ip4address,
906 tunnel, state, (struct ip_pkt *) buf);
909 prepare_ipv6_packet (len, pkt_len, pkt, 0x06, /* TCP */
910 &serv->v6.ip6address,
911 tunnel, state, (struct ip6_pkt *) buf);
919 hash_redirect_info(&state->hash, &state->redirect_info, serv->version == 4 ? 4 : 16);
922 GNUNET_CONTAINER_multihashmap_contains (tcp_connections, &state->hash))
924 GNUNET_CONTAINER_multihashmap_put (tcp_connections, &state->hash, state,
925 GNUNET_CONTAINER_MULTIHASHMAPOPTION_UNIQUE_ONLY);
928 GNUNET_CONTAINER_heap_insert (tcp_connections_heap, state,
929 GNUNET_TIME_absolute_get ().abs_value);
931 if (GNUNET_CONTAINER_heap_get_size(tcp_connections_heap) > max_tcp_connections)
932 GNUNET_SCHEDULER_add_now(collect_connections, tcp_connections_heap);
937 (void) GNUNET_DISK_file_write (helper_handle->fh_to_helper, buf, len);
942 receive_tcp_remote (void *cls,
943 struct GNUNET_MESH_Tunnel *tunnel,
945 const struct GNUNET_PeerIdentity *sender,
946 const struct GNUNET_MessageHeader *message,
947 const struct GNUNET_TRANSPORT_ATS_Information *atsi)
949 GNUNET_HashCode *desc = (GNUNET_HashCode *) (message + 1);
950 struct udp_pkt *pkt = (struct udp_pkt *) (desc + 1);
951 struct remote_addr *s = (struct remote_addr *) desc;
954 unsigned int pkt_len = ntohs (message->size) - sizeof (struct GNUNET_MessageHeader) - sizeof (GNUNET_HashCode);
956 struct redirect_state *state =
957 GNUNET_malloc (sizeof (struct redirect_state));
958 memset (state, 0, sizeof (struct redirect_state));
959 state->tunnel = tunnel;
960 state->type = REMOTE;
961 state->hashmap = tcp_connections;
962 memcpy (&state->remote, s, sizeof (struct remote_addr));
964 len = sizeof (struct GNUNET_MessageHeader) + sizeof (struct pkt_tun) +
965 sizeof (struct ip6_hdr) + pkt_len;
968 memset (buf, 0, len);
973 prepare_ipv4_packet (len, ntohs (pkt->len), pkt, 0x06, /* TCP */
974 &s->addr, tunnel, state, (struct ip_pkt *) buf);
977 prepare_ipv6_packet (len, ntohs (pkt->len), pkt, 0x06, /* TCP */
978 &s->addr, tunnel, state, (struct ip6_pkt *) buf);
985 hash_redirect_info (&state->hash, &state->redirect_info, s->addrlen);
988 GNUNET_CONTAINER_multihashmap_contains (udp_connections, &state->hash))
990 GNUNET_CONTAINER_multihashmap_put (udp_connections, &state->hash, state,
991 GNUNET_CONTAINER_MULTIHASHMAPOPTION_UNIQUE_ONLY);
994 GNUNET_CONTAINER_heap_insert (udp_connections_heap, state,
995 GNUNET_TIME_absolute_get ().abs_value);
997 if (GNUNET_CONTAINER_heap_get_size (udp_connections_heap) >
999 GNUNET_SCHEDULER_add_now (collect_connections, udp_connections_heap);
1002 GNUNET_free (state);
1004 (void) GNUNET_DISK_file_write (helper_handle->fh_to_helper, buf, len);
1010 receive_udp_remote (void *cls,
1011 struct GNUNET_MESH_Tunnel *tunnel,
1013 const struct GNUNET_PeerIdentity *sender,
1014 const struct GNUNET_MessageHeader *message,
1015 const struct GNUNET_TRANSPORT_ATS_Information *atsi)
1017 GNUNET_HashCode *desc = (GNUNET_HashCode *) (message + 1);
1018 struct udp_pkt *pkt = (struct udp_pkt *) (desc + 1);
1019 struct remote_addr *s = (struct remote_addr *) desc;
1023 GNUNET_assert (ntohs (pkt->len) ==
1024 ntohs (message->size) -
1025 sizeof (struct GNUNET_MessageHeader) -
1026 sizeof (GNUNET_HashCode));
1028 /* Prepare the state.
1029 * This will be saved in the hashmap, so that the receiving procedure knows
1030 * through which tunnel this connection has to be routed.
1032 struct redirect_state *state =
1033 GNUNET_malloc (sizeof (struct redirect_state));
1034 memset (state, 0, sizeof (struct redirect_state));
1035 state->tunnel = tunnel;
1036 state->hashmap = udp_connections;
1037 state->type = REMOTE;
1038 memcpy (&state->remote, s, sizeof (struct remote_addr));
1040 len = sizeof (struct GNUNET_MessageHeader) + sizeof (struct pkt_tun) +
1041 sizeof (struct ip6_hdr) + ntohs (pkt->len);
1044 memset (buf, 0, len);
1049 prepare_ipv4_packet (len, ntohs (pkt->len), pkt, 0x11, /* UDP */
1050 &s->addr, tunnel, state, (struct ip_pkt *) buf);
1053 prepare_ipv6_packet (len, ntohs (pkt->len), pkt, 0x11, /* UDP */
1054 &s->addr, tunnel, state, (struct ip6_pkt *) buf);
1061 hash_redirect_info (&state->hash, &state->redirect_info, s->addrlen);
1064 GNUNET_CONTAINER_multihashmap_contains (udp_connections, &state->hash))
1066 GNUNET_CONTAINER_multihashmap_put (udp_connections, &state->hash, state,
1067 GNUNET_CONTAINER_MULTIHASHMAPOPTION_UNIQUE_ONLY);
1070 GNUNET_CONTAINER_heap_insert (udp_connections_heap, state,
1071 GNUNET_TIME_absolute_get ().abs_value);
1073 if (GNUNET_CONTAINER_heap_get_size (udp_connections_heap) >
1074 max_udp_connections)
1075 GNUNET_SCHEDULER_add_now (collect_connections, udp_connections_heap);
1078 GNUNET_free (state);
1080 (void) GNUNET_DISK_file_write (helper_handle->fh_to_helper, buf, len);
1085 * The messages are one GNUNET_HashCode for the service, followed by a struct udp_pkt
1088 receive_udp_service (void *cls,
1089 struct GNUNET_MESH_Tunnel *tunnel,
1091 const struct GNUNET_PeerIdentity *sender,
1092 const struct GNUNET_MessageHeader *message,
1093 const struct GNUNET_TRANSPORT_ATS_Information *atsi)
1095 GNUNET_HashCode *desc = (GNUNET_HashCode *) (message + 1);
1096 struct udp_pkt *pkt = (struct udp_pkt *) (desc + 1);
1098 GNUNET_assert (ntohs (pkt->len) ==
1099 ntohs (message->size) -
1100 sizeof (struct GNUNET_MessageHeader) -
1101 sizeof (GNUNET_HashCode));
1103 /* Get the configuration from the hashmap */
1104 uint16_t *udp_desc = alloca (sizeof (GNUNET_HashCode) + 2);
1105 memcpy (udp_desc + 1, desc, sizeof (GNUNET_HashCode));
1106 *udp_desc = ntohs (pkt->dpt);
1107 struct redirect_service *serv =
1108 GNUNET_CONTAINER_multihashmap_get (udp_services, (GNUNET_HashCode*)udp_desc);
1111 GNUNET_log (GNUNET_ERROR_TYPE_INFO,
1112 "No service found for UDP dpt %d!\n", *udp_desc);
1116 pkt->dpt = htons (serv->remote_port);
1119 * At this point it would be possible to check against some kind of ACL.
1125 /* Prepare the state.
1126 * This will be saved in the hashmap, so that the receiving procedure knows
1127 * through which tunnel this connection has to be routed.
1129 struct redirect_state *state =
1130 GNUNET_malloc (sizeof (struct redirect_state));
1131 memset (state, 0, sizeof (struct redirect_state));
1132 state->tunnel = tunnel;
1134 state->type = SERVICE;
1135 state->hashmap = udp_connections;
1136 memcpy (&state->desc, desc, sizeof (GNUNET_HashCode));
1138 len = sizeof (struct GNUNET_MessageHeader) + sizeof (struct pkt_tun) +
1139 sizeof (struct ip6_hdr) + ntohs (pkt->len);
1142 memset (buf, 0, len);
1144 switch (serv->version)
1147 prepare_ipv4_packet (len, ntohs (pkt->len), pkt, 0x11, /* UDP */
1148 &serv->v4.ip4address,
1149 tunnel, state, (struct ip_pkt *) buf);
1152 prepare_ipv6_packet (len, ntohs (pkt->len), pkt, 0x11, /* UDP */
1153 &serv->v6.ip6address,
1154 tunnel, state, (struct ip6_pkt *) buf);
1162 hash_redirect_info(&state->hash, &state->redirect_info, serv->version == 4 ? 4 : 16);
1165 GNUNET_CONTAINER_multihashmap_contains (udp_connections, &state->hash))
1167 GNUNET_CONTAINER_multihashmap_put (udp_connections, &state->hash, state,
1168 GNUNET_CONTAINER_MULTIHASHMAPOPTION_UNIQUE_ONLY);
1171 GNUNET_CONTAINER_heap_insert (udp_connections_heap, state,
1172 GNUNET_TIME_absolute_get ().abs_value);
1174 if (GNUNET_CONTAINER_heap_get_size(udp_connections_heap) > max_udp_connections)
1175 GNUNET_SCHEDULER_add_now(collect_connections, udp_connections_heap);
1178 GNUNET_free (state);
1180 (void) GNUNET_DISK_file_write (helper_handle->fh_to_helper, buf, len);
1185 * @brief Main function that will be run by the scheduler.
1187 * @param cls closure
1188 * @param args remaining command-line arguments
1189 * @param cfgfile name of the configuration file used (for saving, can be NULL!)
1190 * @param cfg_ configuration
1195 const char *cfgfile, const struct GNUNET_CONFIGURATION_Handle *cfg_)
1197 const static struct GNUNET_MESH_MessageHandler handlers[] = {
1198 {receive_udp_service, GNUNET_MESSAGE_TYPE_SERVICE_UDP, 0},
1199 {receive_tcp_service, GNUNET_MESSAGE_TYPE_SERVICE_TCP, 0},
1200 {receive_udp_remote, GNUNET_MESSAGE_TYPE_REMOTE_UDP, 0},
1201 {receive_tcp_remote, GNUNET_MESSAGE_TYPE_REMOTE_TCP, 0},
1205 const static GNUNET_MESH_ApplicationType apptypes[] =
1207 GNUNET_APPLICATION_TYPE_INTERNET_TCP_GATEWAY,
1208 GNUNET_APPLICATION_TYPE_INTERNET_UDP_GATEWAY,
1209 GNUNET_APPLICATION_TYPE_END
1212 mesh_handle = GNUNET_MESH_connect (cfg_, NULL, NULL, handlers, apptypes);
1215 udp_connections = GNUNET_CONTAINER_multihashmap_create (65536);
1216 udp_connections_heap =
1217 GNUNET_CONTAINER_heap_create (GNUNET_CONTAINER_HEAP_ORDER_MIN);
1218 tcp_connections = GNUNET_CONTAINER_multihashmap_create (65536);
1219 tcp_connections_heap =
1220 GNUNET_CONTAINER_heap_create (GNUNET_CONTAINER_HEAP_ORDER_MIN);
1221 udp_services = GNUNET_CONTAINER_multihashmap_create (65536);
1222 tcp_services = GNUNET_CONTAINER_multihashmap_create (65536);
1224 GNUNET_CONFIGURATION_get_value_number (cfg, "exit", "MAX_UDP_CONNECTIONS",
1225 &max_udp_connections);
1226 GNUNET_CONFIGURATION_get_value_number (cfg, "exit", "MAX_TCP_CONNECTIONS",
1227 &max_tcp_connections);
1230 GNUNET_CONFIGURATION_get_value_filename (cfg, "dns", "SERVICES", &services);
1231 servicecfg = GNUNET_CONFIGURATION_create ();
1232 if (GNUNET_OK == GNUNET_CONFIGURATION_parse (servicecfg, services))
1234 GNUNET_log (GNUNET_ERROR_TYPE_INFO, "Parsing services %s\n", services);
1235 GNUNET_CONFIGURATION_iterate (servicecfg, read_service_conf, NULL);
1237 if (NULL != services)
1238 GNUNET_free (services);
1240 GNUNET_SCHEDULER_add_now (start_helper_and_schedule, NULL);
1241 GNUNET_SCHEDULER_add_delayed (GNUNET_TIME_UNIT_FOREVER_REL, &cleanup, cls);
1245 * The main function to obtain template from gnunetd.
1247 * @param argc number of arguments from the command line
1248 * @param argv command line arguments
1249 * @return 0 ok, 1 on error
1252 main (int argc, char *const *argv) {
1253 static const struct GNUNET_GETOPT_CommandLineOption options[] = {
1254 GNUNET_GETOPT_OPTION_END
1257 return (GNUNET_OK ==
1258 GNUNET_PROGRAM_run (argc,
1261 gettext_noop ("help text"),
1262 options, &run, NULL)) ? ret : 1;
1265 /* end of gnunet-daemon-exit.c */