2 This file is part of GNUnet.
3 (C) 2010 Christian Grothoff
5 GNUnet is free software; you can redistribute it and/or modify
6 it under the terms of the GNU General Public License as published
7 by the Free Software Foundation; either version 3, or (at your
8 option) any later version.
10 GNUnet is distributed in the hope that it will be useful, but
11 WITHOUT ANY WARRANTY; without even the implied warranty of
12 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
13 General Public License for more details.
15 You should have received a copy of the GNU General Public License
16 along with GNUnet; see the file COPYING. If not, write to the
17 Free Software Foundation, Inc., 59 Temple Place - Suite 330,
18 Boston, MA 02111-1307, USA.
22 * @file vpn/gnunet-daemon-vpn.c
24 * @author Philipp Toelke
27 #include "gnunet_getopt_lib.h"
28 #include "gnunet_program_lib.h"
29 #include "gnunet-vpn-packet.h"
30 #include "gnunet_common.h"
31 #include "gnunet_protocols.h"
32 #include "gnunet_applications.h"
33 #include <gnunet_mesh_service.h>
34 #include "gnunet_client_lib.h"
35 #include "gnunet_container_lib.h"
36 #include "gnunet_constants.h"
37 #include <block_dns.h>
38 #include "gnunet-daemon-vpn-helper.h"
39 #include "gnunet-daemon-vpn-dns.h"
40 #include "gnunet-daemon-vpn.h"
41 #include "gnunet-vpn-checksum.h"
43 const struct GNUNET_CONFIGURATION_Handle *cfg;
44 struct GNUNET_MESH_Handle *mesh_handle;
45 struct GNUNET_CONTAINER_MultiHashMap *hashmap;
46 static struct GNUNET_CONTAINER_Heap *heap;
48 struct tunnel_notify_queue
50 struct tunnel_notify_queue *next;
51 struct tunnel_notify_queue *prev;
57 * If there are at least this many address-mappings, old ones will be removed
59 static long long unsigned int max_mappings = 200;
67 * This hashmap contains the mapping from peer, service-descriptor,
68 * source-port and destination-port to a socket
70 static struct GNUNET_CONTAINER_MultiHashMap *udp_connections;
72 GNUNET_SCHEDULER_TaskIdentifier conn_task;
74 GNUNET_SCHEDULER_TaskIdentifier shs_task;
77 * Function scheduled as very last function, cleans up after us
82 __attribute__ ((unused)),
83 const struct GNUNET_SCHEDULER_TaskContext *tskctx)
85 GNUNET_assert (0 != (tskctx->reason & GNUNET_SCHEDULER_REASON_SHUTDOWN));
88 cleanup_helper (helper_handle);
90 /* close the connection to the service-dns */
91 if (dns_connection != NULL)
93 GNUNET_CLIENT_disconnect (dns_connection, GNUNET_NO);
94 dns_connection = NULL;
97 if (mesh_handle != NULL)
99 GNUNET_MESH_disconnect (mesh_handle);
102 if (GNUNET_SCHEDULER_NO_TASK != shs_task)
104 GNUNET_SCHEDULER_cancel (shs_task);
105 shs_task = GNUNET_SCHEDULER_NO_TASK;
107 if (GNUNET_SCHEDULER_NO_TASK != conn_task)
109 GNUNET_SCHEDULER_cancel (conn_task);
110 conn_task = GNUNET_SCHEDULER_NO_TASK;
117 * @return the hash of the IP-Address if a mapping exists, NULL otherwise
120 address6_mapping_exists (unsigned char addr[])
122 GNUNET_HashCode *key = GNUNET_malloc (sizeof (GNUNET_HashCode));
123 unsigned char *k = (unsigned char *) key;
125 memset (key, 0, sizeof (GNUNET_HashCode));
128 for (i = 0; i < 16; i++)
131 if (GNUNET_YES == GNUNET_CONTAINER_multihashmap_contains (hashmap, key))
141 * @return the hash of the IP-Address if a mapping exists, NULL otherwise
144 address4_mapping_exists (uint32_t addr)
146 GNUNET_HashCode *key = GNUNET_malloc (sizeof (GNUNET_HashCode));
148 memset (key, 0, sizeof (GNUNET_HashCode));
149 unsigned char *c = (unsigned char *) &addr;
150 unsigned char *k = (unsigned char *) key;
153 for (i = 0; i < 4; i++)
156 GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
157 "a4_m_e: getting with key %08x, addr is %08x, %d.%d.%d.%d\n",
158 *((uint32_t *) (key)), addr, c[0], c[1], c[2], c[3]);
160 if (GNUNET_YES == GNUNET_CONTAINER_multihashmap_contains (hashmap, key))
165 GNUNET_log (GNUNET_ERROR_TYPE_DEBUG, "Mapping not found!\n");
171 collect_mappings (void *cls
172 __attribute__ ((unused)),
173 const struct GNUNET_SCHEDULER_TaskContext *tc)
175 if ((tc->reason & GNUNET_SCHEDULER_REASON_SHUTDOWN) != 0)
178 struct map_entry *me = GNUNET_CONTAINER_heap_remove_root (heap);
180 /* This is free()ed memory! */
181 me->heap_node = NULL;
183 /* FIXME! GNUNET_MESH_close_tunnel(me->tunnel); */
185 GNUNET_assert (GNUNET_YES ==
186 GNUNET_CONTAINER_multihashmap_remove (hashmap, &me->hash, me));
192 send_icmp4_response (void *cls, const struct GNUNET_SCHEDULER_TaskContext *tc)
194 if ((tc->reason & GNUNET_SCHEDULER_REASON_SHUTDOWN) != 0)
197 struct ip_icmp *request = cls;
199 struct ip_icmp *response = alloca (ntohs (request->shdr.size));
201 GNUNET_assert (response != NULL);
202 memset (response, 0, ntohs (request->shdr.size));
204 response->shdr.size = request->shdr.size;
205 response->shdr.type = htons (GNUNET_MESSAGE_TYPE_VPN_HELPER);
207 response->tun.flags = 0;
208 response->tun.type = htons (0x0800);
210 response->ip_hdr.hdr_lngth = 5;
211 response->ip_hdr.version = 4;
212 response->ip_hdr.proto = 0x01;
213 response->ip_hdr.dadr = request->ip_hdr.sadr;
214 response->ip_hdr.sadr = request->ip_hdr.dadr;
215 response->ip_hdr.tot_lngth = request->ip_hdr.tot_lngth;
217 response->ip_hdr.chks =
218 calculate_ip_checksum ((uint16_t *) & response->ip_hdr, 20);
220 response->icmp_hdr.code = 0;
221 response->icmp_hdr.type = 0x0;
223 /* Magic, more Magic! */
224 response->icmp_hdr.chks = request->icmp_hdr.chks + 0x8;
226 /* Copy the rest of the packet */
227 memcpy (response + 1, request + 1,
228 ntohs (request->shdr.size) - sizeof (struct ip_icmp));
230 write_to_helper (response, ntohs (response->shdr.size));
232 GNUNET_free (request);
236 send_icmp6_response (void *cls, const struct GNUNET_SCHEDULER_TaskContext *tc)
238 if ((tc->reason & GNUNET_SCHEDULER_REASON_SHUTDOWN) != 0)
241 struct ip6_icmp *request = cls;
243 struct ip6_icmp *response = alloca (ntohs (request->shdr.size));
245 GNUNET_assert (response != NULL);
246 memset (response, 0, ntohs (request->shdr.size));
248 response->shdr.size = request->shdr.size;
249 response->shdr.type = htons (GNUNET_MESSAGE_TYPE_VPN_HELPER);
251 response->tun.flags = 0;
252 response->tun.type = htons (0x86dd);
254 response->ip6_hdr.hoplmt = 255;
255 response->ip6_hdr.paylgth = request->ip6_hdr.paylgth;
256 response->ip6_hdr.nxthdr = 0x3a;
257 response->ip6_hdr.version = 6;
258 memcpy (&response->ip6_hdr.sadr, &request->ip6_hdr.dadr, 16);
259 memcpy (&response->ip6_hdr.dadr, &request->ip6_hdr.sadr, 16);
261 response->icmp_hdr.code = 0;
262 response->icmp_hdr.type = 0x81;
264 /* Magic, more Magic! */
265 response->icmp_hdr.chks = request->icmp_hdr.chks - 0x1;
267 /* Copy the rest of the packet */
268 memcpy (response + 1, request + 1,
269 ntohs (request->shdr.size) - sizeof (struct ip6_icmp));
271 write_to_helper (response, ntohs (response->shdr.size));
273 GNUNET_free (request);
277 * cls is the pointer to a GNUNET_MessageHeader that is
278 * followed by the service-descriptor and the packet that should be sent;
281 send_pkt_to_peer_notify_callback (void *cls, size_t size, void *buf)
283 struct GNUNET_MESH_Tunnel **tunnel = cls;
285 struct tunnel_state *ts = GNUNET_MESH_tunnel_get_data (*tunnel);
291 struct GNUNET_MessageHeader *hdr =
292 (struct GNUNET_MessageHeader *) (tunnel + 1);
293 GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
294 "send_pkt_to_peer_notify_callback: buf = %x; size = %u;\n", buf,
296 GNUNET_assert (size >= ntohs (hdr->size));
297 memcpy (buf, hdr, ntohs (hdr->size));
298 size = ntohs (hdr->size);
299 GNUNET_log (GNUNET_ERROR_TYPE_DEBUG, "Sent!\n");
304 if (NULL != ts->head)
306 struct tunnel_notify_queue *element = ts->head;
308 GNUNET_CONTAINER_DLL_remove (ts->head, ts->tail, element);
311 GNUNET_MESH_notify_transmit_ready (*tunnel, GNUNET_NO, 42,
312 GNUNET_TIME_relative_divide
313 (GNUNET_CONSTANTS_MAX_CORK_DELAY, 2),
314 (const struct GNUNET_PeerIdentity *)
316 send_pkt_to_peer_notify_callback,
319 /* save the handle */
320 GNUNET_free (element);
328 port_in_ports (uint64_t ports, uint16_t port)
330 uint16_t *ps = (uint16_t *) & ports;
332 return ports == 0 || ps[0] == port || ps[1] == port || ps[2] == port ||
337 send_pkt_to_peer (void *cls, const struct GNUNET_PeerIdentity *peer,
338 const struct GNUNET_ATS_Information *atsi
339 __attribute__ ((unused)))
341 /* peer == NULL means that all peers in this request are connected */
344 struct GNUNET_MESH_Tunnel **tunnel = cls;
345 struct GNUNET_MessageHeader *hdr =
346 (struct GNUNET_MessageHeader *) (tunnel + 1);
348 GNUNET_assert (NULL != tunnel);
349 GNUNET_assert (NULL != *tunnel);
351 struct tunnel_state *ts = GNUNET_MESH_tunnel_get_data (*tunnel);
356 GNUNET_MESH_notify_transmit_ready (*tunnel, GNUNET_NO, 42,
357 GNUNET_TIME_relative_divide
358 (GNUNET_CONSTANTS_MAX_CORK_DELAY, 2),
359 (const struct GNUNET_PeerIdentity *)
360 NULL, ntohs (hdr->size),
361 send_pkt_to_peer_notify_callback,
366 struct tunnel_notify_queue *element = GNUNET_malloc (sizeof *element);
369 element->len = ntohs (hdr->size);
371 GNUNET_CONTAINER_DLL_insert_tail (ts->head, ts->tail, element);
376 * Create a new Address from an answer-packet
379 new_ip6addr (unsigned char *buf, const GNUNET_HashCode * peer,
380 const GNUNET_HashCode * service_desc)
383 unsigned long long ipv6prefix;
385 GNUNET_assert (GNUNET_OK ==
386 GNUNET_CONFIGURATION_get_value_string (cfg, "vpn", "IPV6ADDR",
388 GNUNET_assert (GNUNET_OK ==
389 GNUNET_CONFIGURATION_get_value_number (cfg, "vpn",
392 GNUNET_assert (ipv6prefix < 127);
393 ipv6prefix = (ipv6prefix + 7) / 8;
395 inet_pton (AF_INET6, ipv6addr, buf);
396 GNUNET_free (ipv6addr);
398 int peer_length = 16 - ipv6prefix - 6;
400 if (peer_length <= 0)
403 int service_length = 16 - ipv6prefix - peer_length;
405 if (service_length <= 0)
408 memcpy (buf + ipv6prefix, service_desc, service_length);
409 memcpy (buf + ipv6prefix + service_length, peer, peer_length);
416 * Create a new Address from an answer-packet
419 new_ip6addr_remote (unsigned char *buf, unsigned char *addr, char addrlen)
422 unsigned long long ipv6prefix;
424 GNUNET_assert (GNUNET_OK ==
425 GNUNET_CONFIGURATION_get_value_string (cfg, "vpn", "IPV6ADDR",
427 GNUNET_assert (GNUNET_OK ==
428 GNUNET_CONFIGURATION_get_value_number (cfg, "vpn",
431 GNUNET_assert (ipv6prefix < 127);
432 ipv6prefix = (ipv6prefix + 7) / 8;
434 inet_pton (AF_INET6, ipv6addr, buf);
435 GNUNET_free (ipv6addr);
437 int local_length = 16 - ipv6prefix;
439 memcpy (buf + ipv6prefix, addr, GNUNET_MIN (addrlen, local_length));
445 * Create a new Address from an answer-packet
448 new_ip4addr_remote (unsigned char *buf, unsigned char *addr, char addrlen)
453 GNUNET_assert (GNUNET_OK ==
454 GNUNET_CONFIGURATION_get_value_string (cfg, "vpn", "IPV4ADDR",
456 GNUNET_assert (GNUNET_OK ==
457 GNUNET_CONFIGURATION_get_value_string (cfg, "vpn", "IPV4MASK",
461 inet_pton (AF_INET, ipv4addr, buf);
462 int r = inet_pton (AF_INET, ipv4mask, &mask);
465 GNUNET_log (GNUNET_ERROR_TYPE_DEBUG, "inet_pton: %d; %m; mask: %08x\n", r,
468 GNUNET_free (ipv4addr);
474 mask = (mask ^ (mask - 1)) >> 1;
475 for (c = 0; mask; c++)
482 c = CHAR_BIT * sizeof (mask);
486 GNUNET_log (GNUNET_ERROR_TYPE_DEBUG, "The mask %s has %d leading 1s.\n",
489 GNUNET_free (ipv4mask);
496 memcpy (buf + c, addr, GNUNET_MIN (addrlen, 4 - c));
502 * This gets scheduled with cls pointing to an answer_packet and does everything
503 * needed in order to send it to the helper.
505 * At the moment this means "inventing" and IPv6-Address for .gnunet-services and
506 * doing nothing for "real" services.
509 process_answer (void *cls, const struct GNUNET_SCHEDULER_TaskContext *tc)
511 if ((tc->reason & GNUNET_SCHEDULER_REASON_SHUTDOWN) != 0)
514 struct answer_packet *pkt = cls;
515 struct answer_packet_list *list;
517 /* This answer is about a .gnunet-service
519 * It contains an almost complete DNS-Response, we have to fill in the ip
520 * at the offset pkt->addroffset
522 if (pkt->subtype == GNUNET_DNS_ANSWER_TYPE_SERVICE)
524 pkt->subtype = GNUNET_DNS_ANSWER_TYPE_IP;
528 memset (&key, 0, sizeof (GNUNET_HashCode));
530 unsigned char *c = ((unsigned char *) pkt) + ntohs (pkt->addroffset);
531 unsigned char *k = (unsigned char *) &key;
533 new_ip6addr (c, &pkt->service_descr.peer,
534 &pkt->service_descr.service_descriptor);
536 * Copy the newly generated ip-address to the key backwarts (as only the first part is hashed)
540 for (i = 0; i < 16; i++)
543 uint16_t namelen = strlen ((char *) pkt->data + 12) + 1;
545 struct map_entry *value =
546 GNUNET_malloc (sizeof (struct map_entry) + namelen);
547 char *name = (char *) (value + 1);
549 value->namelen = namelen;
550 memcpy (name, pkt->data + 12, namelen);
552 memcpy (&value->desc, &pkt->service_descr,
553 sizeof (struct GNUNET_vpn_service_descriptor));
555 memset (value->additional_ports, 0, 8192);
557 memcpy (&value->hash, &key, sizeof (GNUNET_HashCode));
559 if (GNUNET_NO == GNUNET_CONTAINER_multihashmap_contains (hashmap, &key))
561 GNUNET_CONTAINER_multihashmap_put (hashmap, &key, value,
562 GNUNET_CONTAINER_MULTIHASHMAPOPTION_UNIQUE_ONLY);
565 GNUNET_CONTAINER_heap_insert (heap, value,
566 GNUNET_TIME_absolute_get ().abs_value);
567 if (GNUNET_CONTAINER_heap_get_size (heap) > max_mappings)
568 GNUNET_SCHEDULER_add_now (collect_mappings, NULL);
575 GNUNET_malloc (htons (pkt->hdr.size) +
576 sizeof (struct answer_packet_list) -
577 sizeof (struct answer_packet));
579 memcpy (&list->pkt, pkt, htons (pkt->hdr.size));
582 else if (pkt->subtype == GNUNET_DNS_ANSWER_TYPE_REV)
586 memset (&key, 0, sizeof key);
587 unsigned char *k = (unsigned char *) &key;
588 unsigned char *s = pkt->data + 12;
591 /* Whoever designed the reverse IPv6-lookup is batshit insane */
592 for (i = 0; i < 16; i++)
594 unsigned char c1 = s[(4 * i) + 1];
595 unsigned char c2 = s[(4 * i) + 3];
600 k[i] = c1 - 87; /* 87 is the difference between 'a' and 10 */
602 k[i] += 16 * (c2 - '0');
604 k[i] += 16 * (c2 - 87);
607 struct map_entry *map_entry =
608 GNUNET_CONTAINER_multihashmap_get (hashmap, &key);
609 uint16_t offset = ntohs (pkt->addroffset);
611 if (map_entry == NULL)
617 GNUNET_CONTAINER_heap_update_cost (heap, map_entry->heap_node,
618 GNUNET_TIME_absolute_get ().abs_value);
621 unsigned short namelen = htons (map_entry->namelen);
622 char *name = (char *) (map_entry + 1);
625 GNUNET_malloc (sizeof (struct answer_packet_list) -
626 sizeof (struct answer_packet) + offset + 2 +
629 struct answer_packet *rpkt = &list->pkt;
631 /* The offset points to the first byte belonging to the address */
632 memcpy (rpkt, pkt, offset - 1);
634 rpkt->subtype = GNUNET_DNS_ANSWER_TYPE_IP;
635 rpkt->hdr.size = ntohs (offset + 2 + ntohs (namelen));
637 memcpy (((char *) rpkt) + offset, &namelen, 2);
638 memcpy (((char *) rpkt) + offset + 2, name, ntohs (namelen));
641 else if (pkt->subtype == GNUNET_DNS_ANSWER_TYPE_IP)
644 GNUNET_malloc (htons (pkt->hdr.size) +
645 sizeof (struct answer_packet_list) -
646 sizeof (struct answer_packet));
647 memcpy (&list->pkt, pkt, htons (pkt->hdr.size));
649 else if (pkt->subtype == GNUNET_DNS_ANSWER_TYPE_REMOTE_AAAA)
651 pkt->subtype = GNUNET_DNS_ANSWER_TYPE_IP;
655 memset (&key, 0, sizeof (GNUNET_HashCode));
657 unsigned char *c = ((unsigned char *) pkt) + ntohs (pkt->addroffset);
659 new_ip6addr_remote (c, pkt->addr, pkt->addrsize);
660 GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
661 "New mapping to %02x%02x:%02x%02x:%02x%02x:%02x%02x:%02x%02x:%02x%02x:%02x%02x:%02x%02x\n",
662 c[0], c[1], c[2], c[3], c[4], c[5], c[6], c[7], c[8], c[9],
663 c[10], c[11], c[12], c[13], c[14], c[15]);
664 unsigned char *k = (unsigned char *) &key;
667 * Copy the newly generated ip-address to the key backwards (as only the first part is used in the hash-table)
671 for (i = 0; i < 16; i++)
674 uint16_t namelen = strlen ((char *) pkt->data + 12) + 1;
676 struct map_entry *value =
677 GNUNET_malloc (sizeof (struct map_entry) + namelen);
678 char *name = (char *) (value + 1);
680 value->namelen = namelen;
681 memcpy (name, pkt->data + 12, namelen);
683 GNUNET_log (GNUNET_ERROR_TYPE_DEBUG, "Setting addrlen to %d\n",
685 value->addrlen = pkt->addrsize;
686 memcpy (&value->addr, &pkt->addr, pkt->addrsize);
687 memset (value->additional_ports, 0, 8192);
689 memcpy (&value->hash, &key, sizeof (GNUNET_HashCode));
691 if (GNUNET_NO == GNUNET_CONTAINER_multihashmap_contains (hashmap, &key))
693 GNUNET_CONTAINER_multihashmap_put (hashmap, &key, value,
694 GNUNET_CONTAINER_MULTIHASHMAPOPTION_UNIQUE_ONLY);
696 GNUNET_CONTAINER_heap_insert (heap, value,
697 GNUNET_TIME_absolute_get ().abs_value);
698 if (GNUNET_CONTAINER_heap_get_size (heap) > max_mappings)
699 GNUNET_SCHEDULER_add_now (collect_mappings, NULL);
705 GNUNET_malloc (htons (pkt->hdr.size) +
706 sizeof (struct answer_packet_list) -
707 sizeof (struct answer_packet));
709 memcpy (&list->pkt, pkt, htons (pkt->hdr.size));
711 else if (pkt->subtype == GNUNET_DNS_ANSWER_TYPE_REMOTE_A)
713 pkt->subtype = GNUNET_DNS_ANSWER_TYPE_IP;
717 memset (&key, 0, sizeof (GNUNET_HashCode));
719 unsigned char *c = ((unsigned char *) pkt) + ntohs (pkt->addroffset);
721 new_ip4addr_remote (c, pkt->addr, pkt->addrsize);
722 GNUNET_log (GNUNET_ERROR_TYPE_DEBUG, "New mapping to %d.%d.%d.%d\n", c[0],
724 unsigned char *k = (unsigned char *) &key;
727 * Copy the newly generated ip-address to the key backwards (as only the first part is used in the hash-table)
731 for (i = 0; i < 4; i++)
734 uint16_t namelen = strlen ((char *) pkt->data + 12) + 1;
736 struct map_entry *value =
737 GNUNET_malloc (sizeof (struct map_entry) + namelen);
738 char *name = (char *) (value + 1);
740 value->namelen = namelen;
741 memcpy (name, pkt->data + 12, namelen);
743 GNUNET_log (GNUNET_ERROR_TYPE_DEBUG, "Setting addrlen to %d\n",
745 value->addrlen = pkt->addrsize;
746 memcpy (&value->addr, &pkt->addr, pkt->addrsize);
747 memset (value->additional_ports, 0, 8192);
749 memcpy (&value->hash, &key, sizeof (GNUNET_HashCode));
751 if (GNUNET_NO == GNUNET_CONTAINER_multihashmap_contains (hashmap, &key))
753 GNUNET_CONTAINER_multihashmap_put (hashmap, &key, value,
754 GNUNET_CONTAINER_MULTIHASHMAPOPTION_UNIQUE_ONLY);
756 GNUNET_CONTAINER_heap_insert (heap, value,
757 GNUNET_TIME_absolute_get ().abs_value);
758 GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
759 "Mapping is saved in the hashmap with key %08x.\n",
760 *((uint32_t *) (&key)));
761 if (GNUNET_CONTAINER_heap_get_size (heap) > max_mappings)
762 GNUNET_SCHEDULER_add_now (collect_mappings, NULL);
768 GNUNET_malloc (htons (pkt->hdr.size) +
769 sizeof (struct answer_packet_list) -
770 sizeof (struct answer_packet));
772 memcpy (&list->pkt, pkt, htons (pkt->hdr.size));
783 GNUNET_CONTAINER_DLL_insert_after (answer_proc_head, answer_proc_tail,
784 answer_proc_tail, list);
786 schedule_helper_write (GNUNET_TIME_UNIT_FOREVER_REL, NULL);
792 * Sets a bit active in a bitArray.
794 * @param bitArray memory area to set the bit in
795 * @param bitIdx which bit to set
798 setBit (char *bitArray, unsigned int bitIdx)
801 unsigned int targetBit;
803 arraySlot = bitIdx / 8;
804 targetBit = (1L << (bitIdx % 8));
805 bitArray[arraySlot] |= targetBit;
809 * Clears a bit from bitArray.
811 * @param bitArray memory area to set the bit in
812 * @param bitIdx which bit to unset
815 clearBit (char *bitArray, unsigned int bitIdx)
818 unsigned int targetBit;
821 targetBit = (1L << (bitIdx % 8));
822 bitArray[slot] = bitArray[slot] & (~targetBit);
826 * Checks if a bit is active in the bitArray
828 * @param bitArray memory area to set the bit in
829 * @param bitIdx which bit to test
830 * @return GNUNET_YES if the bit is set, GNUNET_NO if not.
833 testBit (char *bitArray, unsigned int bitIdx)
836 unsigned int targetBit;
839 targetBit = (1L << (bitIdx % 8));
840 if (bitArray[slot] & targetBit)
847 * @brief Add the port to the list of additional ports in the map_entry
849 * @param me the map_entry
850 * @param port the port in host-byte-order
853 add_additional_port (struct map_entry *me, uint16_t port)
855 setBit (me->additional_ports, port);
859 receive_udp_back (void *cls
860 __attribute__ ((unused)), struct GNUNET_MESH_Tunnel *tunnel,
861 void **tunnel_ctx, const struct GNUNET_PeerIdentity *sender,
862 const struct GNUNET_MessageHeader *message,
863 const struct GNUNET_ATS_Information *atsi
864 __attribute__ ((unused)))
866 GNUNET_HashCode *desc = (GNUNET_HashCode *) (message + 1);
867 struct remote_addr *s = (struct remote_addr *) desc;
868 struct udp_pkt *pkt = (struct udp_pkt *) (desc + 1);
869 const struct GNUNET_PeerIdentity *other = sender;
870 struct tunnel_state *ts = *tunnel_ctx;
872 if (16 == ts->addrlen)
875 sizeof (struct ip6_udp) + ntohs (pkt->len) - 1 -
876 sizeof (struct udp_pkt);
878 struct ip6_udp *pkt6 = alloca (size);
880 GNUNET_assert (pkt6 != NULL);
882 if (ntohs (message->type) == GNUNET_MESSAGE_TYPE_VPN_SERVICE_UDP_BACK)
883 new_ip6addr (pkt6->ip6_hdr.sadr, &other->hashPubKey, desc);
885 new_ip6addr_remote (pkt6->ip6_hdr.sadr, s->addr, s->addrlen);
887 GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
888 "Relaying calc:%d gnu:%d udp:%d bytes!\n", size,
889 ntohs (message->size), ntohs (pkt->len));
891 pkt6->shdr.type = htons (GNUNET_MESSAGE_TYPE_VPN_HELPER);
892 pkt6->shdr.size = htons (size);
895 pkt6->tun.type = htons (0x86dd);
897 pkt6->ip6_hdr.version = 6;
898 pkt6->ip6_hdr.tclass_h = 0;
899 pkt6->ip6_hdr.tclass_l = 0;
900 pkt6->ip6_hdr.flowlbl = 0;
901 pkt6->ip6_hdr.paylgth = pkt->len;
902 pkt6->ip6_hdr.nxthdr = IPPROTO_UDP;
903 pkt6->ip6_hdr.hoplmt = 0xff;
908 GNUNET_assert (GNUNET_OK ==
909 GNUNET_CONFIGURATION_get_value_string (cfg, "vpn",
912 inet_pton (AF_INET6, ipv6addr, pkt6->ip6_hdr.dadr);
913 GNUNET_free (ipv6addr);
915 memcpy (&pkt6->udp_hdr, pkt, ntohs (pkt->len));
917 GNUNET_HashCode *key = address6_mapping_exists (pkt6->ip6_hdr.sadr);
919 GNUNET_assert (key != NULL);
921 struct map_entry *me = GNUNET_CONTAINER_multihashmap_get (hashmap, key);
923 GNUNET_CONTAINER_heap_update_cost (heap, me->heap_node,
924 GNUNET_TIME_absolute_get ().abs_value);
928 GNUNET_assert (me != NULL);
929 if (ntohs (message->type) == GNUNET_MESSAGE_TYPE_VPN_SERVICE_UDP_BACK)
931 GNUNET_assert (me->desc.
932 service_type & htonl (GNUNET_DNS_SERVICE_TYPE_UDP));
933 if (!port_in_ports (me->desc.ports, pkt6->udp_hdr.spt) &&
934 !testBit (me->additional_ports, ntohs (pkt6->udp_hdr.spt)))
936 add_additional_port (me, ntohs (pkt6->udp_hdr.spt));
940 pkt6->udp_hdr.crc = 0;
944 calculate_checksum_update (sum, (uint16_t *) & pkt6->ip6_hdr.sadr, 16);
946 calculate_checksum_update (sum, (uint16_t *) & pkt6->ip6_hdr.dadr, 16);
947 uint32_t tmp = (pkt6->udp_hdr.len & 0xffff);
949 sum = calculate_checksum_update (sum, (uint16_t *) & tmp, 4);
950 tmp = htons (((pkt6->ip6_hdr.nxthdr & 0x00ff)));
951 sum = calculate_checksum_update (sum, (uint16_t *) & tmp, 4);
954 calculate_checksum_update (sum, (uint16_t *) & pkt6->udp_hdr,
956 pkt6->udp_hdr.crc = calculate_checksum_end (sum);
958 write_to_helper (pkt6, size);
963 sizeof (struct ip_udp) + ntohs (pkt->len) - 1 - sizeof (struct udp_pkt);
965 struct ip_udp *pkt4 = alloca (size);
967 GNUNET_assert (pkt4 != NULL);
969 GNUNET_assert (ntohs (message->type) ==
970 GNUNET_MESSAGE_TYPE_VPN_REMOTE_UDP_BACK);
973 new_ip4addr_remote ((unsigned char *) &sadr, s->addr, s->addrlen);
974 pkt4->ip_hdr.sadr = sadr;
976 GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
977 "Relaying calc:%d gnu:%d udp:%d bytes!\n", size,
978 ntohs (message->size), ntohs (pkt->len));
980 pkt4->shdr.type = htons (GNUNET_MESSAGE_TYPE_VPN_HELPER);
981 pkt4->shdr.size = htons (size);
984 pkt4->tun.type = htons (0x0800);
986 pkt4->ip_hdr.version = 4;
987 pkt4->ip_hdr.hdr_lngth = 5;
988 pkt4->ip_hdr.diff_serv = 0;
989 pkt4->ip_hdr.tot_lngth = htons (20 + ntohs (pkt->len));
990 pkt4->ip_hdr.ident = 0;
991 pkt4->ip_hdr.flags = 0;
992 pkt4->ip_hdr.frag_off = 0;
993 pkt4->ip_hdr.ttl = 255;
994 pkt4->ip_hdr.proto = IPPROTO_UDP;
995 pkt4->ip_hdr.chks = 0; /* Will be calculated later */
1001 GNUNET_assert (GNUNET_OK ==
1002 GNUNET_CONFIGURATION_get_value_string (cfg, "vpn",
1005 inet_pton (AF_INET, ipv4addr, &dadr);
1006 GNUNET_free (ipv4addr);
1007 pkt4->ip_hdr.dadr = dadr;
1009 memcpy (&pkt4->udp_hdr, pkt, ntohs (pkt->len));
1011 GNUNET_HashCode *key = address4_mapping_exists (pkt4->ip_hdr.sadr);
1013 GNUNET_assert (key != NULL);
1015 struct map_entry *me = GNUNET_CONTAINER_multihashmap_get (hashmap, key);
1017 GNUNET_CONTAINER_heap_update_cost (heap, me->heap_node,
1018 GNUNET_TIME_absolute_get ().abs_value);
1022 GNUNET_assert (me != NULL);
1024 pkt4->udp_hdr.crc = 0; /* Optional for IPv4 */
1027 calculate_ip_checksum ((uint16_t *) & pkt4->ip_hdr, 5 * 4);
1029 write_to_helper (pkt4, size);
1036 receive_tcp_back (void *cls
1037 __attribute__ ((unused)), struct GNUNET_MESH_Tunnel *tunnel,
1038 void **tunnel_ctx, const struct GNUNET_PeerIdentity *sender
1039 __attribute__ ((unused)),
1040 const struct GNUNET_MessageHeader *message,
1041 const struct GNUNET_ATS_Information *atsi
1042 __attribute__ ((unused)))
1044 GNUNET_HashCode *desc = (GNUNET_HashCode *) (message + 1);
1045 struct remote_addr *s = (struct remote_addr *) desc;
1046 struct tcp_pkt *pkt = (struct tcp_pkt *) (desc + 1);
1047 const struct GNUNET_PeerIdentity *other = sender;
1048 struct tunnel_state *ts = *tunnel_ctx;
1051 ntohs (message->size) - sizeof (struct GNUNET_MessageHeader) -
1052 sizeof (GNUNET_HashCode);
1054 GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
1055 "Received TCP-Packet back, addrlen = %d\n", s->addrlen);
1057 if (ntohs (message->type) == GNUNET_MESSAGE_TYPE_VPN_SERVICE_TCP_BACK ||
1060 size_t size = pktlen + sizeof (struct ip6_tcp) - 1;
1062 struct ip6_tcp *pkt6 = alloca (size);
1064 memset (pkt6, 0, size);
1066 GNUNET_assert (pkt6 != NULL);
1068 if (ntohs (message->type) == GNUNET_MESSAGE_TYPE_VPN_SERVICE_TCP_BACK)
1069 new_ip6addr (pkt6->ip6_hdr.sadr, &other->hashPubKey, desc);
1071 new_ip6addr_remote (pkt6->ip6_hdr.sadr, s->addr, s->addrlen);
1073 pkt6->shdr.type = htons (GNUNET_MESSAGE_TYPE_VPN_HELPER);
1074 pkt6->shdr.size = htons (size);
1076 pkt6->tun.flags = 0;
1077 pkt6->tun.type = htons (0x86dd);
1079 pkt6->ip6_hdr.version = 6;
1080 pkt6->ip6_hdr.tclass_h = 0;
1081 pkt6->ip6_hdr.tclass_l = 0;
1082 pkt6->ip6_hdr.flowlbl = 0;
1083 pkt6->ip6_hdr.paylgth = htons (pktlen);
1084 pkt6->ip6_hdr.nxthdr = IPPROTO_TCP;
1085 pkt6->ip6_hdr.hoplmt = 0xff;
1090 GNUNET_assert (GNUNET_OK ==
1091 GNUNET_CONFIGURATION_get_value_string (cfg, "vpn",
1094 inet_pton (AF_INET6, ipv6addr, pkt6->ip6_hdr.dadr);
1095 GNUNET_free (ipv6addr);
1097 memcpy (&pkt6->tcp_hdr, pkt, pktlen);
1099 GNUNET_HashCode *key = address6_mapping_exists (pkt6->ip6_hdr.sadr);
1101 GNUNET_assert (key != NULL);
1103 struct map_entry *me = GNUNET_CONTAINER_multihashmap_get (hashmap, key);
1105 GNUNET_CONTAINER_heap_update_cost (heap, me->heap_node,
1106 GNUNET_TIME_absolute_get ().abs_value);
1110 GNUNET_assert (me != NULL);
1111 if (ntohs (message->type) == GNUNET_MESSAGE_TYPE_VPN_SERVICE_UDP_BACK)
1112 GNUNET_assert (me->desc.
1113 service_type & htonl (GNUNET_DNS_SERVICE_TYPE_TCP));
1115 pkt6->tcp_hdr.crc = 0;
1120 calculate_checksum_update (sum, (uint16_t *) & pkt6->ip6_hdr.sadr, 16);
1122 calculate_checksum_update (sum, (uint16_t *) & pkt6->ip6_hdr.dadr, 16);
1123 tmp = htonl (pktlen);
1124 sum = calculate_checksum_update (sum, (uint16_t *) & tmp, 4);
1125 tmp = htonl (((pkt6->ip6_hdr.nxthdr & 0x000000ff)));
1126 sum = calculate_checksum_update (sum, (uint16_t *) & tmp, 4);
1129 calculate_checksum_update (sum, (uint16_t *) & pkt6->tcp_hdr,
1130 ntohs (pkt6->ip6_hdr.paylgth));
1131 pkt6->tcp_hdr.crc = calculate_checksum_end (sum);
1133 write_to_helper (pkt6, size);
1137 size_t size = pktlen + sizeof (struct ip_tcp) - 1;
1139 struct ip_tcp *pkt4 = alloca (size);
1141 GNUNET_assert (pkt4 != NULL);
1142 memset (pkt4, 0, size);
1144 GNUNET_assert (ntohs (message->type) ==
1145 GNUNET_MESSAGE_TYPE_VPN_REMOTE_TCP_BACK);
1148 new_ip4addr_remote ((unsigned char *) &sadr, s->addr, s->addrlen);
1149 pkt4->ip_hdr.sadr = sadr;
1151 pkt4->shdr.type = htons (GNUNET_MESSAGE_TYPE_VPN_HELPER);
1152 pkt4->shdr.size = htons (size);
1154 pkt4->tun.flags = 0;
1155 pkt4->tun.type = htons (0x0800);
1157 pkt4->ip_hdr.version = 4;
1158 pkt4->ip_hdr.hdr_lngth = 5;
1159 pkt4->ip_hdr.diff_serv = 0;
1160 pkt4->ip_hdr.tot_lngth = htons (20 + pktlen);
1161 pkt4->ip_hdr.ident = 0;
1162 pkt4->ip_hdr.flags = 0;
1163 pkt4->ip_hdr.frag_off = 0;
1164 pkt4->ip_hdr.ttl = 255;
1165 pkt4->ip_hdr.proto = IPPROTO_TCP;
1166 pkt4->ip_hdr.chks = 0; /* Will be calculated later */
1172 GNUNET_assert (GNUNET_OK ==
1173 GNUNET_CONFIGURATION_get_value_string (cfg, "vpn",
1176 inet_pton (AF_INET, ipv4addr, &dadr);
1177 GNUNET_free (ipv4addr);
1178 pkt4->ip_hdr.dadr = dadr;
1181 memcpy (&pkt4->tcp_hdr, pkt, pktlen);
1183 GNUNET_HashCode *key = address4_mapping_exists (pkt4->ip_hdr.sadr);
1185 GNUNET_assert (key != NULL);
1187 struct map_entry *me = GNUNET_CONTAINER_multihashmap_get (hashmap, key);
1189 GNUNET_CONTAINER_heap_update_cost (heap, me->heap_node,
1190 GNUNET_TIME_absolute_get ().abs_value);
1194 GNUNET_assert (me != NULL);
1195 pkt4->tcp_hdr.crc = 0;
1199 tmp = pkt4->ip_hdr.sadr;
1200 sum = calculate_checksum_update (sum, (uint16_t *) & tmp, 4);
1201 tmp = pkt4->ip_hdr.dadr;
1202 sum = calculate_checksum_update (sum, (uint16_t *) & tmp, 4);
1204 tmp = (0x06 << 16) | (0xffff & pktlen); // 0x06 for TCP?
1208 sum = calculate_checksum_update (sum, (uint16_t *) & tmp, 4);
1210 sum = calculate_checksum_update (sum, (uint16_t *) & pkt4->tcp_hdr, pktlen);
1211 pkt4->tcp_hdr.crc = calculate_checksum_end (sum);
1214 calculate_ip_checksum ((uint16_t *) & pkt4->ip_hdr, 5 * 4);
1216 write_to_helper (pkt4, size);
1223 new_tunnel (void *cls, struct GNUNET_MESH_Tunnel *tunnel,
1224 const struct GNUNET_PeerIdentity *initiator,
1225 const struct GNUNET_ATS_Information *atsi)
1227 /* Why should anyone open an inbound tunnel to vpn? */
1233 cleaner (void *cls, const struct GNUNET_MESH_Tunnel *tunnel, void *tunnel_ctx)
1235 /* Why should anyone open an inbound tunnel to vpn? */
1240 * Main function that will be run by the scheduler.
1242 * @param cls closure
1243 * @param args remaining command-line arguments
1244 * @param cfgfile name of the configuration file used (for saving, can be NULL!)
1245 * @param cfg_ configuration
1248 run (void *cls, char *const *args __attribute__ ((unused)), const char *cfgfilep
1249 __attribute__ ((unused)), const struct GNUNET_CONFIGURATION_Handle *cfg_)
1251 static const struct GNUNET_MESH_MessageHandler handlers[] = {
1252 {receive_udp_back, GNUNET_MESSAGE_TYPE_VPN_SERVICE_UDP_BACK, 0},
1253 {receive_tcp_back, GNUNET_MESSAGE_TYPE_VPN_SERVICE_TCP_BACK, 0},
1254 {receive_udp_back, GNUNET_MESSAGE_TYPE_VPN_REMOTE_UDP_BACK, 0},
1255 {receive_tcp_back, GNUNET_MESSAGE_TYPE_VPN_REMOTE_TCP_BACK, 0},
1259 static const GNUNET_MESH_ApplicationType types[] = {
1260 GNUNET_APPLICATION_TYPE_END
1264 GNUNET_MESH_connect (cfg_, 42, NULL, new_tunnel, cleaner, handlers,
1268 hashmap = GNUNET_CONTAINER_multihashmap_create (65536);
1269 heap = GNUNET_CONTAINER_heap_create (GNUNET_CONTAINER_HEAP_ORDER_MIN);
1270 GNUNET_CONFIGURATION_get_value_number (cfg, "vpn", "MAX_MAPPINGg",
1272 udp_connections = GNUNET_CONTAINER_multihashmap_create (65536);
1273 conn_task = GNUNET_SCHEDULER_add_now (connect_to_service_dns, NULL);
1275 GNUNET_SCHEDULER_add_after (conn_task, start_helper_and_schedule, NULL);
1276 GNUNET_SCHEDULER_add_delayed (GNUNET_TIME_UNIT_FOREVER_REL, &cleanup, cls);
1280 * The main function to obtain template from gnunetd.
1282 * @param argc number of arguments from the command line
1283 * @param argv command line arguments
1284 * @return 0 ok, 1 on error
1287 main (int argc, char *const *argv)
1289 static const struct GNUNET_GETOPT_CommandLineOption options[] = {
1290 GNUNET_GETOPT_OPTION_END
1293 return (GNUNET_OK ==
1294 GNUNET_PROGRAM_run (argc, argv, "vpn", gettext_noop ("help text"),
1295 options, &run, NULL)) ? ret : 1;
1298 /* end of gnunet-daemon-vpn.c */