2 This file is part of GNUnet.
3 (C) 2010 Christian Grothoff
5 GNUnet is free software; you can redistribute it and/or modify
6 it under the terms of the GNU General Public License as published
7 by the Free Software Foundation; either version 3, or (at your
8 option) any later version.
10 GNUnet is distributed in the hope that it will be useful, but
11 WITHOUT ANY WARRANTY; without even the implied warranty of
12 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
13 General Public License for more details.
15 You should have received a copy of the GNU General Public License
16 along with GNUnet; see the file COPYING. If not, write to the
17 Free Software Foundation, Inc., 59 Temple Place - Suite 330,
18 Boston, MA 02111-1307, USA.
22 * @file vpn/gnunet-daemon-vpn.c
24 * @author Philipp Toelke
27 #include "gnunet_getopt_lib.h"
28 #include "gnunet_program_lib.h"
29 #include "gnunet-vpn-packet.h"
30 #include "gnunet_common.h"
31 #include "gnunet_protocols.h"
32 #include "gnunet_applications.h"
33 #include <gnunet_mesh_service.h>
34 #include "gnunet_client_lib.h"
35 #include "gnunet_container_lib.h"
36 #include "gnunet_constants.h"
37 #include <block_dns.h>
38 #include "gnunet-daemon-vpn-helper.h"
39 #include "gnunet-daemon-vpn-dns.h"
40 #include "gnunet-daemon-vpn.h"
41 #include "gnunet-vpn-checksum.h"
43 const struct GNUNET_CONFIGURATION_Handle *cfg;
44 struct GNUNET_MESH_Handle *mesh_handle;
45 struct GNUNET_CONTAINER_MultiHashMap *hashmap;
46 static struct GNUNET_CONTAINER_Heap *heap;
48 struct tunnel_notify_queue
50 struct tunnel_notify_queue *next;
51 struct tunnel_notify_queue *prev;
57 * If there are at least this many address-mappings, old ones will be removed
59 static long long unsigned int max_mappings = 200;
67 * This hashmap contains the mapping from peer, service-descriptor,
68 * source-port and destination-port to a socket
70 static struct GNUNET_CONTAINER_MultiHashMap *udp_connections;
72 GNUNET_SCHEDULER_TaskIdentifier conn_task;
74 GNUNET_SCHEDULER_TaskIdentifier shs_task;
77 * Function scheduled as very last function, cleans up after us
82 __attribute__ ((unused)),
83 const struct GNUNET_SCHEDULER_TaskContext *tskctx)
85 GNUNET_assert (0 != (tskctx->reason & GNUNET_SCHEDULER_REASON_SHUTDOWN));
88 cleanup_helper (helper_handle);
90 /* close the connection to the service-dns */
91 if (dns_connection != NULL)
93 GNUNET_CLIENT_disconnect (dns_connection, GNUNET_NO);
94 dns_connection = NULL;
97 if (mesh_handle != NULL)
99 GNUNET_MESH_disconnect (mesh_handle);
102 if (GNUNET_SCHEDULER_NO_TASK != shs_task)
104 GNUNET_SCHEDULER_cancel (shs_task);
105 shs_task = GNUNET_SCHEDULER_NO_TASK;
107 if (GNUNET_SCHEDULER_NO_TASK != conn_task)
109 GNUNET_SCHEDULER_cancel (conn_task);
110 conn_task = GNUNET_SCHEDULER_NO_TASK;
117 * @return the hash of the IP-Address if a mapping exists, NULL otherwise
120 address6_mapping_exists (unsigned char addr[])
122 GNUNET_HashCode *key = GNUNET_malloc (sizeof (GNUNET_HashCode));
123 unsigned char *k = (unsigned char *) key;
125 memset (key, 0, sizeof (GNUNET_HashCode));
128 for (i = 0; i < 16; i++)
131 if (GNUNET_YES == GNUNET_CONTAINER_multihashmap_contains (hashmap, key))
141 * @return the hash of the IP-Address if a mapping exists, NULL otherwise
144 address4_mapping_exists (uint32_t addr)
146 GNUNET_HashCode *key = GNUNET_malloc (sizeof (GNUNET_HashCode));
148 memset (key, 0, sizeof (GNUNET_HashCode));
149 unsigned char *c = (unsigned char *) &addr;
150 unsigned char *k = (unsigned char *) key;
153 for (i = 0; i < 4; i++)
156 GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
157 "a4_m_e: getting with key %08x, addr is %08x, %d.%d.%d.%d\n",
158 *((uint32_t *) (key)), addr, c[0], c[1], c[2], c[3]);
160 if (GNUNET_YES == GNUNET_CONTAINER_multihashmap_contains (hashmap, key))
165 GNUNET_log (GNUNET_ERROR_TYPE_DEBUG, "Mapping not found!\n");
171 collect_mappings (void *cls
172 __attribute__ ((unused)),
173 const struct GNUNET_SCHEDULER_TaskContext *tc)
175 if ((tc->reason & GNUNET_SCHEDULER_REASON_SHUTDOWN) != 0)
178 struct map_entry *me = GNUNET_CONTAINER_heap_remove_root (heap);
180 /* This is free()ed memory! */
181 me->heap_node = NULL;
183 /* FIXME! GNUNET_MESH_close_tunnel(me->tunnel); */
185 GNUNET_assert (GNUNET_YES ==
186 GNUNET_CONTAINER_multihashmap_remove (hashmap, &me->hash, me));
192 send_icmp4_response (void *cls, const struct GNUNET_SCHEDULER_TaskContext *tc)
194 if ((tc->reason & GNUNET_SCHEDULER_REASON_SHUTDOWN) != 0)
197 struct ip_icmp *request = cls;
199 struct ip_icmp *response = alloca (ntohs (request->shdr.size));
201 GNUNET_assert (response != NULL);
202 memset (response, 0, ntohs (request->shdr.size));
204 response->shdr.size = request->shdr.size;
205 response->shdr.type = htons (GNUNET_MESSAGE_TYPE_VPN_HELPER);
207 response->tun.flags = 0;
208 response->tun.type = htons (0x0800);
210 response->ip_hdr.hdr_lngth = 5;
211 response->ip_hdr.version = 4;
212 response->ip_hdr.proto = 0x01;
213 response->ip_hdr.dadr = request->ip_hdr.sadr;
214 response->ip_hdr.sadr = request->ip_hdr.dadr;
215 response->ip_hdr.tot_lngth = request->ip_hdr.tot_lngth;
217 response->ip_hdr.chks =
218 calculate_ip_checksum ((uint16_t *) & response->ip_hdr, 20);
220 response->icmp_hdr.code = 0;
221 response->icmp_hdr.type = 0x0;
223 /* Magic, more Magic! */
224 response->icmp_hdr.chks = request->icmp_hdr.chks + 0x8;
226 /* Copy the rest of the packet */
227 memcpy (response + 1, request + 1,
228 ntohs (request->shdr.size) - sizeof (struct ip_icmp));
230 write_to_helper (response, ntohs (response->shdr.size));
232 GNUNET_free (request);
236 send_icmp6_response (void *cls, const struct GNUNET_SCHEDULER_TaskContext *tc)
238 if ((tc->reason & GNUNET_SCHEDULER_REASON_SHUTDOWN) != 0)
241 struct ip6_icmp *request = cls;
243 struct ip6_icmp *response = alloca (ntohs (request->shdr.size));
245 GNUNET_assert (response != NULL);
246 memset (response, 0, ntohs (request->shdr.size));
248 response->shdr.size = request->shdr.size;
249 response->shdr.type = htons (GNUNET_MESSAGE_TYPE_VPN_HELPER);
251 response->tun.flags = 0;
252 response->tun.type = htons (0x86dd);
254 response->ip6_hdr.hoplmt = 255;
255 response->ip6_hdr.paylgth = request->ip6_hdr.paylgth;
256 response->ip6_hdr.nxthdr = 0x3a;
257 response->ip6_hdr.version = 6;
258 memcpy (&response->ip6_hdr.sadr, &request->ip6_hdr.dadr, 16);
259 memcpy (&response->ip6_hdr.dadr, &request->ip6_hdr.sadr, 16);
261 response->icmp_hdr.code = 0;
262 response->icmp_hdr.type = 0x81;
264 /* Magic, more Magic! */
265 response->icmp_hdr.chks = request->icmp_hdr.chks - 0x1;
267 /* Copy the rest of the packet */
268 memcpy (response + 1, request + 1,
269 ntohs (request->shdr.size) - sizeof (struct ip6_icmp));
271 write_to_helper (response, ntohs (response->shdr.size));
273 GNUNET_free (request);
277 * cls is the pointer to a GNUNET_MessageHeader that is
278 * followed by the service-descriptor and the packet that should be sent;
281 send_pkt_to_peer_notify_callback (void *cls, size_t size, void *buf)
283 struct GNUNET_MESH_Tunnel **tunnel = cls;
285 struct tunnel_state *ts = GNUNET_MESH_tunnel_get_data(*tunnel);
290 struct GNUNET_MessageHeader *hdr =
291 (struct GNUNET_MessageHeader *) (tunnel + 1);
292 GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
293 "send_pkt_to_peer_notify_callback: buf = %x; size = %u;\n", buf,
295 GNUNET_assert (size >= ntohs (hdr->size));
296 memcpy (buf, hdr, ntohs (hdr->size));
297 size = ntohs (hdr->size);
298 GNUNET_log (GNUNET_ERROR_TYPE_DEBUG, "Sent!\n");
303 if (NULL != ts->head)
305 struct tunnel_notify_queue *element = ts->head;
306 struct tunnel_notify_queue *head = ts->head;
307 struct tunnel_notify_queue *tail = ts->tail;
309 GNUNET_CONTAINER_DLL_remove (head, tail, element);
312 GNUNET_MESH_notify_transmit_ready (*tunnel,
315 GNUNET_TIME_relative_divide
316 (GNUNET_CONSTANTS_MAX_CORK_DELAY, 2),
317 (const struct GNUNET_PeerIdentity *)
319 send_pkt_to_peer_notify_callback,
322 /* save the handle */
323 GNUNET_free (element);
331 port_in_ports (uint64_t ports, uint16_t port)
333 uint16_t *ps = (uint16_t *) & ports;
335 return ports == 0 || ps[0] == port || ps[1] == port || ps[2] == port || ps[3] == port;
339 send_pkt_to_peer (void *cls, const struct GNUNET_PeerIdentity *peer,
340 const struct GNUNET_ATS_Information *atsi __attribute__ ((unused)))
342 /* peer == NULL means that all peers in this request are connected */
345 struct GNUNET_MESH_Tunnel **tunnel = cls;
346 struct GNUNET_MessageHeader *hdr =
347 (struct GNUNET_MessageHeader *) (tunnel + 1);
349 GNUNET_assert (NULL != tunnel);
350 GNUNET_assert (NULL != *tunnel);
352 struct tunnel_state *ts = GNUNET_MESH_tunnel_get_data(*tunnel);
356 GNUNET_MESH_notify_transmit_ready (*tunnel,
359 GNUNET_TIME_relative_divide
360 (GNUNET_CONSTANTS_MAX_CORK_DELAY, 2),
361 (const struct GNUNET_PeerIdentity *)
364 send_pkt_to_peer_notify_callback,
369 struct tunnel_notify_queue *head = ts->head;
370 struct tunnel_notify_queue *tail = ts->tail;
371 struct tunnel_notify_queue *element = GNUNET_malloc (sizeof *element);
374 element->len = ntohs (hdr->size);
376 GNUNET_CONTAINER_DLL_insert_tail (head, tail, element);
381 * Create a new Address from an answer-packet
384 new_ip6addr (unsigned char *buf, const GNUNET_HashCode * peer,
385 const GNUNET_HashCode * service_desc)
388 unsigned long long ipv6prefix;
390 GNUNET_assert (GNUNET_OK ==
391 GNUNET_CONFIGURATION_get_value_string (cfg, "vpn", "IPV6ADDR",
393 GNUNET_assert (GNUNET_OK ==
394 GNUNET_CONFIGURATION_get_value_number (cfg, "vpn",
397 GNUNET_assert (ipv6prefix < 127);
398 ipv6prefix = (ipv6prefix + 7) / 8;
400 inet_pton (AF_INET6, ipv6addr, buf);
401 GNUNET_free (ipv6addr);
403 int peer_length = 16 - ipv6prefix - 6;
405 if (peer_length <= 0)
408 int service_length = 16 - ipv6prefix - peer_length;
410 if (service_length <= 0)
413 memcpy (buf + ipv6prefix, service_desc, service_length);
414 memcpy (buf + ipv6prefix + service_length, peer, peer_length);
421 * Create a new Address from an answer-packet
424 new_ip6addr_remote (unsigned char *buf, unsigned char *addr, char addrlen)
427 unsigned long long ipv6prefix;
429 GNUNET_assert (GNUNET_OK ==
430 GNUNET_CONFIGURATION_get_value_string (cfg, "vpn", "IPV6ADDR",
432 GNUNET_assert (GNUNET_OK ==
433 GNUNET_CONFIGURATION_get_value_number (cfg, "vpn",
436 GNUNET_assert (ipv6prefix < 127);
437 ipv6prefix = (ipv6prefix + 7) / 8;
439 inet_pton (AF_INET6, ipv6addr, buf);
440 GNUNET_free (ipv6addr);
442 int local_length = 16 - ipv6prefix;
444 memcpy (buf + ipv6prefix, addr, GNUNET_MIN (addrlen, local_length));
450 * Create a new Address from an answer-packet
453 new_ip4addr_remote (unsigned char *buf, unsigned char *addr, char addrlen)
458 GNUNET_assert (GNUNET_OK ==
459 GNUNET_CONFIGURATION_get_value_string (cfg, "vpn", "IPV4ADDR",
461 GNUNET_assert (GNUNET_OK ==
462 GNUNET_CONFIGURATION_get_value_string (cfg, "vpn", "IPV4MASK",
466 inet_pton (AF_INET, ipv4addr, buf);
467 int r = inet_pton (AF_INET, ipv4mask, &mask);
470 GNUNET_log (GNUNET_ERROR_TYPE_DEBUG, "inet_pton: %d; %m; mask: %08x\n", r,
473 GNUNET_free (ipv4addr);
479 mask = (mask ^ (mask - 1)) >> 1;
480 for (c = 0; mask; c++)
487 c = CHAR_BIT * sizeof (mask);
491 GNUNET_log (GNUNET_ERROR_TYPE_DEBUG, "The mask %s has %d leading 1s.\n",
494 GNUNET_free (ipv4mask);
501 memcpy (buf + c, addr, GNUNET_MIN (addrlen, 4 - c));
507 * This gets scheduled with cls pointing to an answer_packet and does everything
508 * needed in order to send it to the helper.
510 * At the moment this means "inventing" and IPv6-Address for .gnunet-services and
511 * doing nothing for "real" services.
514 process_answer (void *cls, const struct GNUNET_SCHEDULER_TaskContext *tc)
516 if ((tc->reason & GNUNET_SCHEDULER_REASON_SHUTDOWN) != 0)
519 struct answer_packet *pkt = cls;
520 struct answer_packet_list *list;
522 /* This answer is about a .gnunet-service
524 * It contains an almost complete DNS-Response, we have to fill in the ip
525 * at the offset pkt->addroffset
527 if (pkt->subtype == GNUNET_DNS_ANSWER_TYPE_SERVICE)
529 pkt->subtype = GNUNET_DNS_ANSWER_TYPE_IP;
533 memset (&key, 0, sizeof (GNUNET_HashCode));
535 unsigned char *c = ((unsigned char *) pkt) + ntohs (pkt->addroffset);
536 unsigned char *k = (unsigned char *) &key;
538 new_ip6addr (c, &pkt->service_descr.peer,
539 &pkt->service_descr.service_descriptor);
541 * Copy the newly generated ip-address to the key backwarts (as only the first part is hashed)
545 for (i = 0; i < 16; i++)
548 uint16_t namelen = strlen ((char *) pkt->data + 12) + 1;
550 struct map_entry *value =
551 GNUNET_malloc (sizeof (struct map_entry) + namelen);
552 char *name = (char *) (value + 1);
554 value->namelen = namelen;
555 memcpy (name, pkt->data + 12, namelen);
557 memcpy (&value->desc, &pkt->service_descr,
558 sizeof (struct GNUNET_vpn_service_descriptor));
560 memset (value->additional_ports, 0, 8192);
562 memcpy (&value->hash, &key, sizeof (GNUNET_HashCode));
564 if (GNUNET_NO == GNUNET_CONTAINER_multihashmap_contains (hashmap, &key))
566 GNUNET_CONTAINER_multihashmap_put (hashmap, &key, value,
567 GNUNET_CONTAINER_MULTIHASHMAPOPTION_UNIQUE_ONLY);
570 GNUNET_CONTAINER_heap_insert (heap, value,
571 GNUNET_TIME_absolute_get ().abs_value);
572 if (GNUNET_CONTAINER_heap_get_size (heap) > max_mappings)
573 GNUNET_SCHEDULER_add_now (collect_mappings, NULL);
580 GNUNET_malloc (htons (pkt->hdr.size) +
581 2 * sizeof (struct answer_packet_list *));
583 memcpy (&list->pkt, pkt, htons (pkt->hdr.size));
586 else if (pkt->subtype == GNUNET_DNS_ANSWER_TYPE_REV)
590 memset (&key, 0, sizeof key);
591 unsigned char *k = (unsigned char *) &key;
592 unsigned char *s = pkt->data + 12;
595 /* Whoever designed the reverse IPv6-lookup is batshit insane */
596 for (i = 0; i < 16; i++)
598 unsigned char c1 = s[(4 * i) + 1];
599 unsigned char c2 = s[(4 * i) + 3];
604 k[i] = c1 - 87; /* 87 is the difference between 'a' and 10 */
606 k[i] += 16 * (c2 - '0');
608 k[i] += 16 * (c2 - 87);
611 struct map_entry *map_entry =
612 GNUNET_CONTAINER_multihashmap_get (hashmap, &key);
613 uint16_t offset = ntohs (pkt->addroffset);
615 if (map_entry == NULL)
621 GNUNET_CONTAINER_heap_update_cost (heap, map_entry->heap_node,
622 GNUNET_TIME_absolute_get ().abs_value);
625 unsigned short namelen = htons (map_entry->namelen);
626 char *name = (char *) (map_entry + 1);
629 GNUNET_malloc (2 * sizeof (struct answer_packet_list *) + offset + 2 +
632 struct answer_packet *rpkt = &list->pkt;
634 /* The offset points to the first byte belonging to the address */
635 memcpy (rpkt, pkt, offset - 1);
637 rpkt->subtype = GNUNET_DNS_ANSWER_TYPE_IP;
638 rpkt->hdr.size = ntohs (offset + 2 + ntohs (namelen));
640 memcpy (((char *) rpkt) + offset, &namelen, 2);
641 memcpy (((char *) rpkt) + offset + 2, name, ntohs (namelen));
644 else if (pkt->subtype == GNUNET_DNS_ANSWER_TYPE_IP)
647 GNUNET_malloc (htons (pkt->hdr.size) +
648 2 * sizeof (struct answer_packet_list *));
649 memcpy (&list->pkt, pkt, htons (pkt->hdr.size));
651 else if (pkt->subtype == GNUNET_DNS_ANSWER_TYPE_REMOTE_AAAA)
653 pkt->subtype = GNUNET_DNS_ANSWER_TYPE_IP;
657 memset (&key, 0, sizeof (GNUNET_HashCode));
659 unsigned char *c = ((unsigned char *) pkt) + ntohs (pkt->addroffset);
661 new_ip6addr_remote (c, pkt->addr, pkt->addrsize);
662 GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
663 "New mapping to %02x%02x:%02x%02x:%02x%02x:%02x%02x:%02x%02x:%02x%02x:%02x%02x:%02x%02x\n",
664 c[0], c[1], c[2], c[3], c[4], c[5], c[6], c[7], c[8], c[9],
665 c[10], c[11], c[12], c[13], c[14], c[15]);
666 unsigned char *k = (unsigned char *) &key;
669 * Copy the newly generated ip-address to the key backwards (as only the first part is used in the hash-table)
673 for (i = 0; i < 16; i++)
676 uint16_t namelen = strlen ((char *) pkt->data + 12) + 1;
678 struct map_entry *value =
679 GNUNET_malloc (sizeof (struct map_entry) + namelen);
680 char *name = (char *) (value + 1);
682 value->namelen = namelen;
683 memcpy (name, pkt->data + 12, namelen);
685 GNUNET_log (GNUNET_ERROR_TYPE_DEBUG, "Setting addrlen to %d\n",
687 value->addrlen = pkt->addrsize;
688 memcpy (&value->addr, &pkt->addr, pkt->addrsize);
689 memset (value->additional_ports, 0, 8192);
691 memcpy (&value->hash, &key, sizeof (GNUNET_HashCode));
693 if (GNUNET_NO == GNUNET_CONTAINER_multihashmap_contains (hashmap, &key))
695 GNUNET_CONTAINER_multihashmap_put (hashmap, &key, value,
696 GNUNET_CONTAINER_MULTIHASHMAPOPTION_UNIQUE_ONLY);
698 GNUNET_CONTAINER_heap_insert (heap, value,
699 GNUNET_TIME_absolute_get ().abs_value);
700 if (GNUNET_CONTAINER_heap_get_size (heap) > max_mappings)
701 GNUNET_SCHEDULER_add_now (collect_mappings, NULL);
707 GNUNET_malloc (htons (pkt->hdr.size) +
708 2 * sizeof (struct answer_packet_list *));
710 memcpy (&list->pkt, pkt, htons (pkt->hdr.size));
712 else if (pkt->subtype == GNUNET_DNS_ANSWER_TYPE_REMOTE_A)
714 pkt->subtype = GNUNET_DNS_ANSWER_TYPE_IP;
718 memset (&key, 0, sizeof (GNUNET_HashCode));
720 unsigned char *c = ((unsigned char *) pkt) + ntohs (pkt->addroffset);
722 new_ip4addr_remote (c, pkt->addr, pkt->addrsize);
723 GNUNET_log (GNUNET_ERROR_TYPE_DEBUG, "New mapping to %d.%d.%d.%d\n", c[0],
725 unsigned char *k = (unsigned char *) &key;
728 * Copy the newly generated ip-address to the key backwards (as only the first part is used in the hash-table)
732 for (i = 0; i < 4; i++)
735 uint16_t namelen = strlen ((char *) pkt->data + 12) + 1;
737 struct map_entry *value =
738 GNUNET_malloc (sizeof (struct map_entry) + namelen);
739 char *name = (char *) (value + 1);
741 value->namelen = namelen;
742 memcpy (name, pkt->data + 12, namelen);
744 GNUNET_log (GNUNET_ERROR_TYPE_DEBUG, "Setting addrlen to %d\n",
746 value->addrlen = pkt->addrsize;
747 memcpy (&value->addr, &pkt->addr, pkt->addrsize);
748 memset (value->additional_ports, 0, 8192);
750 memcpy (&value->hash, &key, sizeof (GNUNET_HashCode));
752 if (GNUNET_NO == GNUNET_CONTAINER_multihashmap_contains (hashmap, &key))
754 GNUNET_CONTAINER_multihashmap_put (hashmap, &key, value,
755 GNUNET_CONTAINER_MULTIHASHMAPOPTION_UNIQUE_ONLY);
757 GNUNET_CONTAINER_heap_insert (heap, value,
758 GNUNET_TIME_absolute_get ().abs_value);
759 GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
760 "Mapping is saved in the hashmap with key %08x.\n",
761 *((uint32_t *) (&key)));
762 if (GNUNET_CONTAINER_heap_get_size (heap) > max_mappings)
763 GNUNET_SCHEDULER_add_now (collect_mappings, NULL);
769 GNUNET_malloc (htons (pkt->hdr.size) +
770 2 * sizeof (struct answer_packet_list *));
772 memcpy (&list->pkt, pkt, htons (pkt->hdr.size));
783 GNUNET_CONTAINER_DLL_insert_after (answer_proc_head, answer_proc_tail,
784 answer_proc_tail, list);
786 schedule_helper_write (GNUNET_TIME_UNIT_FOREVER_REL, NULL);
792 * Sets a bit active in a bitArray.
794 * @param bitArray memory area to set the bit in
795 * @param bitIdx which bit to set
798 setBit (char *bitArray, unsigned int bitIdx)
801 unsigned int targetBit;
803 arraySlot = bitIdx / 8;
804 targetBit = (1L << (bitIdx % 8));
805 bitArray[arraySlot] |= targetBit;
809 * Clears a bit from bitArray.
811 * @param bitArray memory area to set the bit in
812 * @param bitIdx which bit to unset
815 clearBit (char *bitArray, unsigned int bitIdx)
818 unsigned int targetBit;
821 targetBit = (1L << (bitIdx % 8));
822 bitArray[slot] = bitArray[slot] & (~targetBit);
826 * Checks if a bit is active in the bitArray
828 * @param bitArray memory area to set the bit in
829 * @param bitIdx which bit to test
830 * @return GNUNET_YES if the bit is set, GNUNET_NO if not.
833 testBit (char *bitArray, unsigned int bitIdx)
836 unsigned int targetBit;
839 targetBit = (1L << (bitIdx % 8));
840 if (bitArray[slot] & targetBit)
847 * @brief Add the port to the list of additional ports in the map_entry
849 * @param me the map_entry
850 * @param port the port in host-byte-order
853 add_additional_port (struct map_entry *me, uint16_t port)
855 setBit (me->additional_ports, port);
859 receive_udp_back (void *cls __attribute__ ((unused)),
860 struct GNUNET_MESH_Tunnel *tunnel,
862 const struct GNUNET_PeerIdentity *sender,
863 const struct GNUNET_MessageHeader *message,
864 const struct GNUNET_ATS_Information *atsi __attribute__ ((unused)))
866 GNUNET_HashCode *desc = (GNUNET_HashCode *) (message + 1);
867 struct remote_addr *s = (struct remote_addr *) desc;
868 struct udp_pkt *pkt = (struct udp_pkt *) (desc + 1);
869 const struct GNUNET_PeerIdentity *other = sender;
870 struct tunnel_state *ts = *tunnel_ctx;
872 if (16 == ts->addrlen)
875 sizeof (struct ip6_udp) + ntohs (pkt->len) - 1 -
876 sizeof (struct udp_pkt);
878 struct ip6_udp *pkt6 = alloca (size);
880 GNUNET_assert (pkt6 != NULL);
882 if (ntohs (message->type) == GNUNET_MESSAGE_TYPE_VPN_SERVICE_UDP_BACK)
883 new_ip6addr (pkt6->ip6_hdr.sadr, &other->hashPubKey, desc);
885 new_ip6addr_remote (pkt6->ip6_hdr.sadr, s->addr, s->addrlen);
887 GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
888 "Relaying calc:%d gnu:%d udp:%d bytes!\n", size,
889 ntohs (message->size), ntohs (pkt->len));
891 pkt6->shdr.type = htons (GNUNET_MESSAGE_TYPE_VPN_HELPER);
892 pkt6->shdr.size = htons (size);
895 pkt6->tun.type = htons (0x86dd);
897 pkt6->ip6_hdr.version = 6;
898 pkt6->ip6_hdr.tclass_h = 0;
899 pkt6->ip6_hdr.tclass_l = 0;
900 pkt6->ip6_hdr.flowlbl = 0;
901 pkt6->ip6_hdr.paylgth = pkt->len;
902 pkt6->ip6_hdr.nxthdr = IPPROTO_UDP;
903 pkt6->ip6_hdr.hoplmt = 0xff;
908 GNUNET_assert (GNUNET_OK ==
909 GNUNET_CONFIGURATION_get_value_string (cfg, "vpn",
912 inet_pton (AF_INET6, ipv6addr, pkt6->ip6_hdr.dadr);
913 GNUNET_free (ipv6addr);
915 memcpy (&pkt6->udp_hdr, pkt, ntohs (pkt->len));
917 GNUNET_HashCode *key = address6_mapping_exists (pkt6->ip6_hdr.sadr);
919 GNUNET_assert (key != NULL);
921 struct map_entry *me = GNUNET_CONTAINER_multihashmap_get (hashmap, key);
923 GNUNET_CONTAINER_heap_update_cost (heap, me->heap_node,
924 GNUNET_TIME_absolute_get ().abs_value);
928 GNUNET_assert (me != NULL);
929 if (ntohs (message->type) == GNUNET_MESSAGE_TYPE_VPN_SERVICE_UDP_BACK)
931 GNUNET_assert (me->desc.
932 service_type & htonl (GNUNET_DNS_SERVICE_TYPE_UDP));
933 if (!port_in_ports (me->desc.ports, pkt6->udp_hdr.spt) &&
934 !testBit (me->additional_ports, ntohs (pkt6->udp_hdr.spt)))
936 add_additional_port (me, ntohs (pkt6->udp_hdr.spt));
940 pkt6->udp_hdr.crc = 0;
944 calculate_checksum_update (sum, (uint16_t *) & pkt6->ip6_hdr.sadr, 16);
946 calculate_checksum_update (sum, (uint16_t *) & pkt6->ip6_hdr.dadr, 16);
947 uint32_t tmp = (pkt6->udp_hdr.len & 0xffff);
949 sum = calculate_checksum_update (sum, (uint16_t *) & tmp, 4);
950 tmp = htons (((pkt6->ip6_hdr.nxthdr & 0x00ff)));
951 sum = calculate_checksum_update (sum, (uint16_t *) & tmp, 4);
954 calculate_checksum_update (sum, (uint16_t *) & pkt6->udp_hdr,
956 pkt6->udp_hdr.crc = calculate_checksum_end (sum);
958 write_to_helper (pkt6, size);
963 sizeof (struct ip_udp) + ntohs (pkt->len) - 1 - sizeof (struct udp_pkt);
965 struct ip_udp *pkt4 = alloca (size);
967 GNUNET_assert (pkt4 != NULL);
969 GNUNET_assert (ntohs (message->type) ==
970 GNUNET_MESSAGE_TYPE_VPN_REMOTE_UDP_BACK);
973 new_ip4addr_remote ((unsigned char *) &sadr, s->addr, s->addrlen);
974 pkt4->ip_hdr.sadr = sadr;
976 GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
977 "Relaying calc:%d gnu:%d udp:%d bytes!\n", size,
978 ntohs (message->size), ntohs (pkt->len));
980 pkt4->shdr.type = htons (GNUNET_MESSAGE_TYPE_VPN_HELPER);
981 pkt4->shdr.size = htons (size);
984 pkt4->tun.type = htons (0x0800);
986 pkt4->ip_hdr.version = 4;
987 pkt4->ip_hdr.hdr_lngth = 5;
988 pkt4->ip_hdr.diff_serv = 0;
989 pkt4->ip_hdr.tot_lngth = htons (20 + ntohs (pkt->len));
990 pkt4->ip_hdr.ident = 0;
991 pkt4->ip_hdr.flags = 0;
992 pkt4->ip_hdr.frag_off = 0;
993 pkt4->ip_hdr.ttl = 255;
994 pkt4->ip_hdr.proto = IPPROTO_UDP;
995 pkt4->ip_hdr.chks = 0; /* Will be calculated later */
1001 GNUNET_assert (GNUNET_OK ==
1002 GNUNET_CONFIGURATION_get_value_string (cfg, "vpn",
1005 inet_pton (AF_INET, ipv4addr, &dadr);
1006 GNUNET_free (ipv4addr);
1007 pkt4->ip_hdr.dadr = dadr;
1009 memcpy (&pkt4->udp_hdr, pkt, ntohs (pkt->len));
1011 GNUNET_HashCode *key = address4_mapping_exists (pkt4->ip_hdr.sadr);
1013 GNUNET_assert (key != NULL);
1015 struct map_entry *me = GNUNET_CONTAINER_multihashmap_get (hashmap, key);
1017 GNUNET_CONTAINER_heap_update_cost (heap, me->heap_node,
1018 GNUNET_TIME_absolute_get ().abs_value);
1022 GNUNET_assert (me != NULL);
1024 pkt4->udp_hdr.crc = 0; /* Optional for IPv4 */
1027 calculate_ip_checksum ((uint16_t *) & pkt4->ip_hdr, 5 * 4);
1029 write_to_helper (pkt4, size);
1036 receive_tcp_back (void *cls __attribute__ ((unused)),
1037 struct GNUNET_MESH_Tunnel *tunnel,
1039 const struct GNUNET_PeerIdentity *sender __attribute__ ((unused)),
1040 const struct GNUNET_MessageHeader *message,
1041 const struct GNUNET_ATS_Information *atsi __attribute__ ((unused)))
1043 GNUNET_HashCode *desc = (GNUNET_HashCode *) (message + 1);
1044 struct remote_addr *s = (struct remote_addr *) desc;
1045 struct tcp_pkt *pkt = (struct tcp_pkt *) (desc + 1);
1046 const struct GNUNET_PeerIdentity *other = sender;
1047 struct tunnel_state *ts = *tunnel_ctx;
1050 ntohs (message->size) - sizeof (struct GNUNET_MessageHeader) -
1051 sizeof (GNUNET_HashCode);
1053 GNUNET_log(GNUNET_ERROR_TYPE_DEBUG, "Received TCP-Packet back, addrlen = %d\n", s->addrlen);
1055 if (ntohs(message->type) == GNUNET_MESSAGE_TYPE_VPN_SERVICE_TCP_BACK ||
1058 size_t size = pktlen + sizeof (struct ip6_tcp) - 1;
1060 struct ip6_tcp *pkt6 = alloca (size);
1062 memset (pkt6, 0, size);
1064 GNUNET_assert (pkt6 != NULL);
1066 if (ntohs (message->type) == GNUNET_MESSAGE_TYPE_VPN_SERVICE_TCP_BACK)
1067 new_ip6addr (pkt6->ip6_hdr.sadr, &other->hashPubKey, desc);
1069 new_ip6addr_remote (pkt6->ip6_hdr.sadr, s->addr, s->addrlen);
1071 pkt6->shdr.type = htons (GNUNET_MESSAGE_TYPE_VPN_HELPER);
1072 pkt6->shdr.size = htons (size);
1074 pkt6->tun.flags = 0;
1075 pkt6->tun.type = htons (0x86dd);
1077 pkt6->ip6_hdr.version = 6;
1078 pkt6->ip6_hdr.tclass_h = 0;
1079 pkt6->ip6_hdr.tclass_l = 0;
1080 pkt6->ip6_hdr.flowlbl = 0;
1081 pkt6->ip6_hdr.paylgth = htons (pktlen);
1082 pkt6->ip6_hdr.nxthdr = IPPROTO_TCP;
1083 pkt6->ip6_hdr.hoplmt = 0xff;
1088 GNUNET_assert (GNUNET_OK ==
1089 GNUNET_CONFIGURATION_get_value_string (cfg, "vpn",
1092 inet_pton (AF_INET6, ipv6addr, pkt6->ip6_hdr.dadr);
1093 GNUNET_free (ipv6addr);
1095 memcpy (&pkt6->tcp_hdr, pkt, pktlen);
1097 GNUNET_HashCode *key = address6_mapping_exists (pkt6->ip6_hdr.sadr);
1099 GNUNET_assert (key != NULL);
1101 struct map_entry *me = GNUNET_CONTAINER_multihashmap_get (hashmap, key);
1103 GNUNET_CONTAINER_heap_update_cost (heap, me->heap_node,
1104 GNUNET_TIME_absolute_get ().abs_value);
1108 GNUNET_assert (me != NULL);
1109 if (ntohs (message->type) == GNUNET_MESSAGE_TYPE_VPN_SERVICE_UDP_BACK)
1110 GNUNET_assert (me->desc.
1111 service_type & htonl (GNUNET_DNS_SERVICE_TYPE_TCP));
1113 pkt6->tcp_hdr.crc = 0;
1118 calculate_checksum_update (sum, (uint16_t *) & pkt6->ip6_hdr.sadr, 16);
1120 calculate_checksum_update (sum, (uint16_t *) & pkt6->ip6_hdr.dadr, 16);
1121 tmp = htonl (pktlen);
1122 sum = calculate_checksum_update (sum, (uint16_t *) & tmp, 4);
1123 tmp = htonl (((pkt6->ip6_hdr.nxthdr & 0x000000ff)));
1124 sum = calculate_checksum_update (sum, (uint16_t *) & tmp, 4);
1127 calculate_checksum_update (sum, (uint16_t *) & pkt6->tcp_hdr,
1128 ntohs (pkt6->ip6_hdr.paylgth));
1129 pkt6->tcp_hdr.crc = calculate_checksum_end (sum);
1131 write_to_helper (pkt6, size);
1135 size_t size = pktlen + sizeof (struct ip_tcp) - 1;
1137 struct ip_tcp *pkt4 = alloca (size);
1139 GNUNET_assert (pkt4 != NULL);
1140 memset (pkt4, 0, size);
1142 GNUNET_assert (ntohs (message->type) ==
1143 GNUNET_MESSAGE_TYPE_VPN_REMOTE_TCP_BACK);
1146 new_ip4addr_remote ((unsigned char *) &sadr, s->addr, s->addrlen);
1147 pkt4->ip_hdr.sadr = sadr;
1149 pkt4->shdr.type = htons (GNUNET_MESSAGE_TYPE_VPN_HELPER);
1150 pkt4->shdr.size = htons (size);
1152 pkt4->tun.flags = 0;
1153 pkt4->tun.type = htons (0x0800);
1155 pkt4->ip_hdr.version = 4;
1156 pkt4->ip_hdr.hdr_lngth = 5;
1157 pkt4->ip_hdr.diff_serv = 0;
1158 pkt4->ip_hdr.tot_lngth = htons (20 + pktlen);
1159 pkt4->ip_hdr.ident = 0;
1160 pkt4->ip_hdr.flags = 0;
1161 pkt4->ip_hdr.frag_off = 0;
1162 pkt4->ip_hdr.ttl = 255;
1163 pkt4->ip_hdr.proto = IPPROTO_TCP;
1164 pkt4->ip_hdr.chks = 0; /* Will be calculated later */
1170 GNUNET_assert (GNUNET_OK ==
1171 GNUNET_CONFIGURATION_get_value_string (cfg, "vpn",
1174 inet_pton (AF_INET, ipv4addr, &dadr);
1175 GNUNET_free (ipv4addr);
1176 pkt4->ip_hdr.dadr = dadr;
1179 memcpy (&pkt4->tcp_hdr, pkt, pktlen);
1181 GNUNET_HashCode *key = address4_mapping_exists (pkt4->ip_hdr.sadr);
1183 GNUNET_assert (key != NULL);
1185 struct map_entry *me = GNUNET_CONTAINER_multihashmap_get (hashmap, key);
1187 GNUNET_CONTAINER_heap_update_cost (heap, me->heap_node,
1188 GNUNET_TIME_absolute_get ().abs_value);
1192 GNUNET_assert (me != NULL);
1193 pkt4->tcp_hdr.crc = 0;
1197 tmp = pkt4->ip_hdr.sadr;
1198 sum = calculate_checksum_update (sum, (uint16_t *) & tmp, 4);
1199 tmp = pkt4->ip_hdr.dadr;
1200 sum = calculate_checksum_update (sum, (uint16_t *) & tmp, 4);
1202 tmp = (0x06 << 16) | (0xffff & pktlen); // 0x06 for TCP?
1206 sum = calculate_checksum_update (sum, (uint16_t *) & tmp, 4);
1208 sum = calculate_checksum_update (sum, (uint16_t *) & pkt4->tcp_hdr, pktlen);
1209 pkt4->tcp_hdr.crc = calculate_checksum_end (sum);
1212 calculate_ip_checksum ((uint16_t *) & pkt4->ip_hdr, 5 * 4);
1214 write_to_helper (pkt4, size);
1220 static void* new_tunnel(void* cls,
1221 struct GNUNET_MESH_Tunnel *tunnel,
1222 const struct GNUNET_PeerIdentity *initiator,
1223 const struct GNUNET_ATS_Information *atsi)
1225 /* Why should anyone open an inbound tunnel to vpn? */
1230 static void cleaner(void *cls,
1231 const struct GNUNET_MESH_Tunnel *tunnel,
1234 /* Why should anyone open an inbound tunnel to vpn? */
1239 * Main function that will be run by the scheduler.
1241 * @param cls closure
1242 * @param args remaining command-line arguments
1243 * @param cfgfile name of the configuration file used (for saving, can be NULL!)
1244 * @param cfg_ configuration
1247 run (void *cls, char *const *args __attribute__ ((unused)), const char *cfgfilep
1248 __attribute__ ((unused)), const struct GNUNET_CONFIGURATION_Handle *cfg_)
1250 static const struct GNUNET_MESH_MessageHandler handlers[] = {
1251 {receive_udp_back, GNUNET_MESSAGE_TYPE_VPN_SERVICE_UDP_BACK, 0},
1252 {receive_tcp_back, GNUNET_MESSAGE_TYPE_VPN_SERVICE_TCP_BACK, 0},
1253 {receive_udp_back, GNUNET_MESSAGE_TYPE_VPN_REMOTE_UDP_BACK, 0},
1254 {receive_tcp_back, GNUNET_MESSAGE_TYPE_VPN_REMOTE_TCP_BACK, 0},
1258 static const GNUNET_MESH_ApplicationType types[] = {
1259 GNUNET_APPLICATION_TYPE_END
1262 mesh_handle = GNUNET_MESH_connect (cfg_, 42, NULL, new_tunnel, cleaner, handlers, types);
1265 hashmap = GNUNET_CONTAINER_multihashmap_create (65536);
1266 heap = GNUNET_CONTAINER_heap_create (GNUNET_CONTAINER_HEAP_ORDER_MIN);
1267 GNUNET_CONFIGURATION_get_value_number (cfg, "vpn", "MAX_MAPPINGg",
1269 udp_connections = GNUNET_CONTAINER_multihashmap_create (65536);
1270 conn_task = GNUNET_SCHEDULER_add_now (connect_to_service_dns, NULL);
1272 GNUNET_SCHEDULER_add_after (conn_task, start_helper_and_schedule, NULL);
1273 GNUNET_SCHEDULER_add_delayed (GNUNET_TIME_UNIT_FOREVER_REL, &cleanup, cls);
1277 * The main function to obtain template from gnunetd.
1279 * @param argc number of arguments from the command line
1280 * @param argv command line arguments
1281 * @return 0 ok, 1 on error
1284 main (int argc, char *const *argv)
1286 static const struct GNUNET_GETOPT_CommandLineOption options[] = {
1287 GNUNET_GETOPT_OPTION_END
1290 return (GNUNET_OK ==
1291 GNUNET_PROGRAM_run (argc, argv, "vpn", gettext_noop ("help text"),
1292 options, &run, NULL)) ? ret : 1;
1295 /* end of gnunet-daemon-vpn.c */