check
[oweals/gnunet.git] / src / vpn / gnunet-daemon-vpn.c
index be62724eec073ab6a25e46d6356d1d40fb606699..72f52eccc767c677abe31ff48aacd8ad23451036 100644 (file)
 #include "gnunet_getopt_lib.h"
 #include "gnunet_program_lib.h"
 #include "gnunet-vpn-packet.h"
-#include "gnunet-vpn-helper-p.h"
-#include "gnunet-vpn-pretty-print.h"
 #include "gnunet_common.h"
-#include <gnunet_os_lib.h>
 #include "gnunet_protocols.h"
 #include <gnunet_mesh_service.h>
 #include "gnunet_client_lib.h"
 #include <block_dns.h>
 #include "gnunet-daemon-vpn-helper.h"
 #include "gnunet-daemon-vpn-dns.h"
-
 #include "gnunet-daemon-vpn.h"
+#include "gnunet-vpn-checksum.h"
+
+const struct GNUNET_CONFIGURATION_Handle *cfg;
+struct GNUNET_MESH_Handle *mesh_handle;
+struct GNUNET_CONTAINER_MultiHashMap* hashmap;
+static struct GNUNET_CONTAINER_Heap *heap;
+
+/**
+ * If there are at least this many address-mappings, old ones will be removed
+ */
+static long long unsigned int max_mappings = 200;
 
 /**
  * Final status code.
@@ -62,14 +69,7 @@ cleanup(void* cls, const struct GNUNET_SCHEDULER_TaskContext* tskctx) {
     GNUNET_assert (0 != (tskctx->reason & GNUNET_SCHEDULER_REASON_SHUTDOWN));
 
     /* stop the helper */
-    if (helper_proc != NULL)
-      {
-       if (0 != GNUNET_OS_process_kill (helper_proc, SIGTERM))
-         GNUNET_log_strerror(GNUNET_ERROR_TYPE_WARNING, "kill");
-       GNUNET_OS_process_wait (helper_proc);
-       GNUNET_OS_process_close (helper_proc);
-       helper_proc = NULL;
-      }
+    cleanup_helper(helper_handle);
 
     /* close the connection to the service-dns */
     if (dns_connection != NULL)
@@ -86,30 +86,6 @@ cleanup(void* cls, const struct GNUNET_SCHEDULER_TaskContext* tskctx) {
 }
 /*}}}*/
 
-static uint32_t calculate_checksum_update(uint32_t sum, uint16_t *hdr, short len) {
-    for(; len >= 2; len -= 2)
-      sum += *(hdr++);
-    if (len == 1)
-      sum += *((unsigned char*)hdr);
-    return sum;
-}
-
-static uint16_t calculate_checksum_end(uint32_t sum) {
-    while (sum >> 16)
-      sum = (sum >> 16) + (sum & 0xFFFF);
-
-    return ~sum;
-}
-
-/**
- * Calculate the checksum of an IPv4-Header
- */
-uint16_t
-calculate_ip_checksum(uint16_t* hdr, short len) {
-    uint32_t sum = calculate_checksum_update(0, hdr, len);
-    return calculate_checksum_end(sum);
-}
-
 /**
  * @return the hash of the IP-Address if a mapping exists, NULL otherwise
  */
@@ -131,6 +107,23 @@ address_mapping_exists(unsigned char addr[]) {
       }
 }
 
+static void
+collect_mappings(void* cls, const struct GNUNET_SCHEDULER_TaskContext* tc) {
+    if ( (tc->reason & GNUNET_SCHEDULER_REASON_SHUTDOWN) != 0)
+      return;
+
+    struct map_entry* me = GNUNET_CONTAINER_heap_remove_root(heap);
+
+    /* This is free()ed memory! */
+    me->heap_node = NULL;
+
+    /* FIXME! GNUNET_MESH_close_tunnel(state->tunnel); */
+
+    GNUNET_CONTAINER_multihashmap_remove(hashmap, &me->hash, me);
+
+    GNUNET_free(me);
+}
+
 void
 send_icmp_response(void* cls, const struct GNUNET_SCHEDULER_TaskContext *tc) {
     struct ip6_icmp* request = cls;
@@ -168,20 +161,15 @@ send_icmp_response(void* cls, const struct GNUNET_SCHEDULER_TaskContext *tc) {
 
 /**
  * cls is the pointer to a GNUNET_MessageHeader that is
- * followed by the service-descriptor and the udp-packet that should be sent;
+ * followed by the service-descriptor and the packet that should be sent;
  */
 static size_t
-send_udp_to_peer_notify_callback (void *cls, size_t size, void *buf)
+send_pkt_to_peer_notify_callback (void *cls, size_t size, void *buf)
 {
   struct GNUNET_MESH_Tunnel **tunnel = cls;
   struct GNUNET_MessageHeader *hdr =
     (struct GNUNET_MessageHeader *) (tunnel + 1);
-  GNUNET_HashCode *hc = (GNUNET_HashCode *) (hdr + 1);
-  struct udp_pkt *udp = (struct udp_pkt *) (hc + 1);
-  hdr->size = htons (sizeof (struct GNUNET_MessageHeader) +
-                    sizeof (GNUNET_HashCode) + ntohs (udp->len));
-  hdr->type = ntohs (GNUNET_MESSAGE_TYPE_SERVICE_UDP);
-  GNUNET_log(GNUNET_ERROR_TYPE_DEBUG, "send_udp_to_peer_notify_callback: buf = %x; size = %u;\n", buf, size);
+  GNUNET_log(GNUNET_ERROR_TYPE_DEBUG, "send_pkt_to_peer_notify_callback: buf = %x; size = %u;\n", buf, size);
   GNUNET_assert (size >= ntohs (hdr->size));
   memcpy (buf, hdr, ntohs (hdr->size));
   size = ntohs(hdr->size);
@@ -198,7 +186,7 @@ port_in_ports (uint64_t ports, uint16_t port)
 }
 
 void
-send_udp_to_peer (void *cls, 
+send_pkt_to_peer (void *cls, 
                  const struct GNUNET_PeerIdentity *peer,
                  const struct GNUNET_TRANSPORT_ATS_Information *atsi)
 {
@@ -206,17 +194,17 @@ send_udp_to_peer (void *cls,
   struct GNUNET_MESH_Tunnel **tunnel = cls;
   struct GNUNET_MessageHeader *hdr =
     (struct GNUNET_MessageHeader *) (tunnel + 1);
-  GNUNET_HashCode *hc = (GNUNET_HashCode *) (hdr + 1);
-  struct udp_pkt *udp = (struct udp_pkt *) (hc + 1);
+
+  GNUNET_assert(NULL != tunnel);
+  GNUNET_assert(NULL != *tunnel);
+
   GNUNET_MESH_notify_transmit_ready (*tunnel,
                                     GNUNET_NO,
                                     42,
                                     GNUNET_TIME_relative_divide(GNUNET_CONSTANTS_MAX_CORK_DELAY, 2),
-                                    htons (sizeof
-                                           (struct GNUNET_MessageHeader) +
-                                           sizeof (GNUNET_HashCode) +
-                                           ntohs (udp->len)),
-                                    send_udp_to_peer_notify_callback,
+                                     (const struct GNUNET_PeerIdentity *)NULL,
+                                     ntohs(hdr->size),
+                                    send_pkt_to_peer_notify_callback,
                                     cls);
 }
 
@@ -224,10 +212,61 @@ send_udp_to_peer (void *cls,
  * Create a new Address from an answer-packet
  */
 void
-new_ip6addr(char* buf, const GNUNET_HashCode *peer, const GNUNET_HashCode *service_desc) { /* {{{ */
-       memcpy(buf+14, (int[]){htons(0x3412)}, 2);
-       memcpy(buf+8, service_desc, 6);
-       memcpy(buf, peer, 8);
+new_ip6addr(unsigned char* buf, const GNUNET_HashCode *peer, const GNUNET_HashCode *service_desc) { /* {{{ */
+    char* ipv6addr;
+    unsigned long long ipv6prefix;
+    GNUNET_assert(GNUNET_OK == GNUNET_CONFIGURATION_get_value_string(cfg, "vpn", "IPV6ADDR", &ipv6addr));
+    GNUNET_assert(GNUNET_OK == GNUNET_CONFIGURATION_get_value_number(cfg, "vpn", "IPV6PREFIX", &ipv6prefix));
+    GNUNET_assert(ipv6prefix < 127);
+    ipv6prefix = (ipv6prefix + 7)/8;
+
+    inet_pton (AF_INET6, ipv6addr, buf);
+    GNUNET_free(ipv6addr);
+
+    int peer_length = 16 - ipv6prefix - 6;
+    if (peer_length <= 0)
+      peer_length = 0;
+
+    int service_length = 16 - ipv6prefix - peer_length;
+    if (service_length <= 0)
+      service_length = 0;
+
+    memcpy(buf+ipv6prefix, service_desc, service_length);
+    memcpy(buf+ipv6prefix+service_length, peer, peer_length);
+}
+/*}}}*/
+
+char
+max (char a, char b)
+{
+  return a > b ? a : b;
+}
+
+/**
+ * Create a new Address from an answer-packet
+ */
+void
+new_ip6addr_remote (unsigned char *buf, unsigned char *addr, char addrlen)
+{                               /* {{{ */
+  char *ipv6addr;
+  unsigned long long ipv6prefix;
+  GNUNET_assert (GNUNET_OK ==
+                 GNUNET_CONFIGURATION_get_value_string (cfg, "vpn",
+                                                        "IPV6ADDR",
+                                                        &ipv6addr));
+  GNUNET_assert (GNUNET_OK ==
+                 GNUNET_CONFIGURATION_get_value_number (cfg, "vpn",
+                                                        "IPV6PREFIX",
+                                                        &ipv6prefix));
+  GNUNET_assert (ipv6prefix < 127);
+  ipv6prefix = (ipv6prefix + 7) / 8;
+
+  inet_pton (AF_INET6, ipv6addr, buf);
+  GNUNET_free (ipv6addr);
+
+  int local_length = 16 - ipv6prefix;
+
+  memcpy (buf + ipv6prefix, addr, max (addrlen, local_length));
 }
 /*}}}*/
 
@@ -248,14 +287,22 @@ process_answer(void* cls, const struct GNUNET_SCHEDULER_TaskContext* tc) {
      * It contains an almost complete DNS-Response, we have to fill in the ip
      * at the offset pkt->addroffset
      */
-    //FIXME htons?
     if (pkt->subtype == GNUNET_DNS_ANSWER_TYPE_SERVICE)
       {
        pkt->subtype = GNUNET_DNS_ANSWER_TYPE_IP;
 
        GNUNET_HashCode key;
        memset(&key, 0, sizeof(GNUNET_HashCode));
-       new_ip6addr((char*)&key, &pkt->service_descr.peer, &pkt->service_descr.service_descriptor);
+
+       unsigned char* c = ((unsigned char*)pkt)+ntohs(pkt->addroffset);
+       unsigned char* k = (unsigned char*)&key;
+       new_ip6addr(c, &pkt->service_descr.peer, &pkt->service_descr.service_descriptor);
+       /*
+        * Copy the newly generated ip-address to the key backwarts (as only the first part is hashed)
+        */
+       unsigned int i;
+       for (i = 0; i < 16; i++)
+           k[15-i] = c[i];
 
        uint16_t namelen = strlen((char*)pkt->data+12)+1;
 
@@ -267,24 +314,24 @@ process_answer(void* cls, const struct GNUNET_SCHEDULER_TaskContext* tc) {
 
        memcpy(&value->desc, &pkt->service_descr, sizeof(struct GNUNET_vpn_service_descriptor));
 
-       value->additional_ports = 0;
+        memset(value->additional_ports, 0, 8192);
 
-       if (GNUNET_OK != GNUNET_CONTAINER_multihashmap_put(hashmap,
-                                                          &key,
-                                                          value,
-                                                          GNUNET_CONTAINER_MULTIHASHMAPOPTION_UNIQUE_ONLY))
-         {
-           GNUNET_log(GNUNET_ERROR_TYPE_ERROR, "Could not store to hashmap\n");
-         }
+        memcpy(&value->hash, &key, sizeof(GNUNET_HashCode));
+
+        if (GNUNET_NO ==
+            GNUNET_CONTAINER_multihashmap_contains (hashmap, &key))
+          {
+            GNUNET_CONTAINER_multihashmap_put (hashmap, &key, value,
+                                               GNUNET_CONTAINER_MULTIHASHMAPOPTION_UNIQUE_ONLY);
+
+            value->heap_node = GNUNET_CONTAINER_heap_insert (heap, value,
+                                                             GNUNET_TIME_absolute_get ().abs_value);
+            if (GNUNET_CONTAINER_heap_get_size(heap) > max_mappings)
+              GNUNET_SCHEDULER_add_now(collect_mappings, NULL);
+          }
+        else
+          GNUNET_free(value);
 
-       /*
-        * Copy the newly generated backward ip-address to the packet
-        */
-       char* c = ((char*)pkt)+ntohs(pkt->addroffset);
-       char* k = (char*)&key;
-       unsigned int i;
-       for (i = 0; i < 16; i++)
-           c[15-i] = k[i];
 
        list = GNUNET_malloc(htons(pkt->hdr.size) + 2*sizeof(struct answer_packet_list*));
 
@@ -314,7 +361,10 @@ process_answer(void* cls, const struct GNUNET_SCHEDULER_TaskContext* tc) {
          }
 
        struct map_entry* map_entry = GNUNET_CONTAINER_multihashmap_get(hashmap, &key);
-       unsigned short offset = ntohs(pkt->addroffset);
+        GNUNET_CONTAINER_heap_update_cost (heap, map_entry->heap_node,
+                                           GNUNET_TIME_absolute_get ().abs_value);
+
+       uint16_t offset = ntohs(pkt->addroffset);
 
        if (map_entry == NULL)
          {
@@ -342,6 +392,54 @@ process_answer(void* cls, const struct GNUNET_SCHEDULER_TaskContext* tc) {
     else if (pkt->subtype == GNUNET_DNS_ANSWER_TYPE_IP)
       {
        list = GNUNET_malloc(htons(pkt->hdr.size) + 2*sizeof(struct answer_packet_list*));
+       memcpy(&list->pkt, pkt, htons(pkt->hdr.size));
+      }
+    else if (pkt->subtype == GNUNET_DNS_ANSWER_TYPE_REMOTE)
+      {
+       pkt->subtype = GNUNET_DNS_ANSWER_TYPE_IP;
+
+       GNUNET_HashCode key;
+       memset(&key, 0, sizeof(GNUNET_HashCode));
+
+       unsigned char* c = ((unsigned char*)pkt)+ntohs(pkt->addroffset);
+        new_ip6addr_remote(c, pkt->addr, pkt->addrsize);
+       unsigned char* k = (unsigned char*)&key;
+       /*
+        * Copy the newly generated ip-address to the key backwards (as only the first part is used in the hash-table)
+        */
+       unsigned int i;
+       for (i = 0; i < 16; i++)
+           k[15-i] = c[i];
+
+       uint16_t namelen = strlen((char*)pkt->data+12)+1;
+
+       struct map_entry* value = GNUNET_malloc(sizeof(struct map_entry) + namelen);
+       char* name = (char*)(value +1);
+
+       value->namelen = namelen;
+       memcpy(name, pkt->data+12, namelen);
+
+        value->addrlen = pkt->addrsize;
+        memcpy(&value->addr, &pkt->addr, pkt->addrsize);
+        memset(value->additional_ports, 0, 8192);
+
+        memcpy(&value->hash, &key, sizeof(GNUNET_HashCode));
+
+        if (GNUNET_NO ==
+            GNUNET_CONTAINER_multihashmap_contains (hashmap, &key))
+          {
+            GNUNET_CONTAINER_multihashmap_put (hashmap, &key, value,
+                                               GNUNET_CONTAINER_MULTIHASHMAPOPTION_UNIQUE_ONLY);
+            value->heap_node = GNUNET_CONTAINER_heap_insert (heap, value,
+                                                             GNUNET_TIME_absolute_get ().abs_value);
+            if (GNUNET_CONTAINER_heap_get_size(heap) > max_mappings)
+              GNUNET_SCHEDULER_add_now(collect_mappings, NULL);
+          }
+        else
+          GNUNET_free(value);
+
+       list = GNUNET_malloc(htons(pkt->hdr.size) + 2*sizeof(struct answer_packet_list*));
+
        memcpy(&list->pkt, pkt, htons(pkt->hdr.size));
       }
     else
@@ -360,40 +458,92 @@ process_answer(void* cls, const struct GNUNET_SCHEDULER_TaskContext* tc) {
     return;
 }
 
+/**
+ * Sets a bit active in a bitArray.
+ *
+ * @param bitArray memory area to set the bit in
+ * @param bitIdx which bit to set
+ */
+void
+setBit (char *bitArray, unsigned int bitIdx)
+{
+  size_t arraySlot;
+  unsigned int targetBit;
+
+  arraySlot = bitIdx / 8;
+  targetBit = (1L << (bitIdx % 8));
+  bitArray[arraySlot] |= targetBit;
+}
+
+/**
+ * Clears a bit from bitArray.
+ *
+ * @param bitArray memory area to set the bit in
+ * @param bitIdx which bit to unset
+ */
+void
+clearBit (char *bitArray, unsigned int bitIdx)
+{
+  size_t slot;
+  unsigned int targetBit;
+
+  slot = bitIdx / 8;
+  targetBit = (1L << (bitIdx % 8));
+  bitArray[slot] = bitArray[slot] & (~targetBit);
+}
+
+/**
+ * Checks if a bit is active in the bitArray
+ *
+ * @param bitArray memory area to set the bit in
+ * @param bitIdx which bit to test
+ * @return GNUNET_YES if the bit is set, GNUNET_NO if not.
+ */
+int
+testBit (char *bitArray, unsigned int bitIdx)
+{
+  size_t slot;
+  unsigned int targetBit;
+
+  slot = bitIdx / 8;
+  targetBit = (1L << (bitIdx % 8));
+  if (bitArray[slot] & targetBit)
+    return GNUNET_YES;
+  else
+    return GNUNET_NO;
+}
+
+/**
+ * @brief Add the port to the list of additional ports in the map_entry
+ *
+ * @param me the map_entry
+ * @param port the port in host-byte-order
+ */
 static void
 add_additional_port (struct map_entry *me, uint16_t port)
 {
-  uint16_t *ps = (uint16_t *) & me->additional_ports;
-  unsigned int i;
-  for (i = 0; i < 4; i++)
-    {
-      if (ps[i] == 0)
-       {
-         ps[i] = port;
-         break;
-       }
-    }
+  setBit(me->additional_ports, port);
 }
 
 static int
 receive_udp_back (void *cls, struct GNUNET_MESH_Tunnel* tunnel,
                  void **tunnel_ctx,
+                 const struct GNUNET_PeerIdentity *sender,
                  const struct GNUNET_MessageHeader *message,
                  const struct GNUNET_TRANSPORT_ATS_Information *atsi)
 {
   GNUNET_HashCode *desc = (GNUNET_HashCode *) (message + 1);
   struct udp_pkt *pkt = (struct udp_pkt *) (desc + 1);
-  char addr[16];
   const struct GNUNET_PeerIdentity* other = GNUNET_MESH_get_peer(tunnel);
 
-  new_ip6addr(addr, &other->hashPubKey, desc);
-
   size_t size = sizeof(struct ip6_udp) + ntohs(pkt->len) - 1 - sizeof(struct udp_pkt);
 
   struct ip6_udp* pkt6 = alloca(size);
 
   GNUNET_assert(pkt6 != NULL);
 
+  new_ip6addr(pkt6->ip6_hdr.sadr, &other->hashPubKey, desc);
+
   GNUNET_log(GNUNET_ERROR_TYPE_DEBUG, "Relaying calc:%d gnu:%d udp:%d bytes!\n", size, ntohs(message->size), ntohs(pkt->len));
 
   pkt6->shdr.type = htons(GNUNET_MESSAGE_TYPE_VPN_HELPER);
@@ -410,26 +560,28 @@ receive_udp_back (void *cls, struct GNUNET_MESH_Tunnel* tunnel,
   pkt6->ip6_hdr.nxthdr = 0x11;
   pkt6->ip6_hdr.hoplmt = 0xff;
 
-  unsigned int i;
-  for (i = 0; i < 16; i++)
-    pkt6->ip6_hdr.sadr[15-i] = addr[i];
-
-  memcpy(pkt6->ip6_hdr.dadr, (unsigned char[]){0x12, 0x34, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 1}, 16);
-
+  {
+    char* ipv6addr;
+    GNUNET_assert(GNUNET_OK == GNUNET_CONFIGURATION_get_value_string(cfg, "vpn", "IPV6ADDR", &ipv6addr));
+    inet_pton (AF_INET6, ipv6addr, pkt6->ip6_hdr.dadr);
+    GNUNET_free(ipv6addr);
+  }
   memcpy(&pkt6->udp_hdr, pkt, ntohs(pkt->len));
 
   GNUNET_HashCode* key = address_mapping_exists(pkt6->ip6_hdr.sadr);
   GNUNET_assert (key != NULL);
 
   struct map_entry *me = GNUNET_CONTAINER_multihashmap_get(hashmap, key);
+  GNUNET_CONTAINER_heap_update_cost (heap, me->heap_node,
+                                     GNUNET_TIME_absolute_get ().abs_value);
 
   GNUNET_free(key);
 
   GNUNET_assert (me != NULL);
   GNUNET_assert (me->desc.service_type & htonl(GNUNET_DNS_SERVICE_TYPE_UDP));
-  if (!port_in_ports(me->desc.ports, pkt6->udp_hdr.spt) ||
-      !port_in_ports(me->additional_ports, pkt6->udp_hdr.spt)) {
-      add_additional_port(me, pkt6->udp_hdr.spt);
+  if (!port_in_ports(me->desc.ports, pkt6->udp_hdr.spt) &&
+      !testBit(me->additional_ports, ntohs(pkt6->udp_hdr.spt))) {
+      add_additional_port(me, ntohs(pkt6->udp_hdr.spt));
   }
 
   pkt6->udp_hdr.crc = 0;
@@ -449,12 +601,80 @@ receive_udp_back (void *cls, struct GNUNET_MESH_Tunnel* tunnel,
   return GNUNET_OK;
 }
 
-void init_mesh (void* cls, struct GNUNET_MESH_Handle* server, const struct GNUNET_PeerIdentity* my_identity, const struct GNUNET_CRYPTO_RsaPublicKeyBinaryEncoded *pubkey) {
-  GNUNET_log(GNUNET_ERROR_TYPE_DEBUG, "Connected to MESH, I am %x\n", *((unsigned long*)my_identity));
-}
+static int
+receive_tcp_back (void *cls, struct GNUNET_MESH_Tunnel* tunnel,
+                 void **tunnel_ctx,
+                 const struct GNUNET_PeerIdentity *sender,
+                 const struct GNUNET_MessageHeader *message,
+                 const struct GNUNET_TRANSPORT_ATS_Information *atsi)
+{
+  GNUNET_HashCode *desc = (GNUNET_HashCode *) (message + 1);
+  struct tcp_pkt *pkt = (struct tcp_pkt *) (desc + 1);
+  const struct GNUNET_PeerIdentity* other = GNUNET_MESH_get_peer(tunnel);
+
+  size_t pktlen = ntohs(message->size) - sizeof(struct GNUNET_MessageHeader) - sizeof(GNUNET_HashCode);
+  size_t size = pktlen + sizeof(struct ip6_tcp) - 1;
 
-void connect_mesh (void* cls, const struct GNUNET_PeerIdentity* peer, const struct GNUNET_TRANSPORT_ATS_Information *atsi) {
-  GNUNET_log(GNUNET_ERROR_TYPE_DEBUG, "Connected to peer %x\n", *((unsigned long*)peer));
+  struct ip6_tcp* pkt6 = alloca(size);
+
+  GNUNET_assert(pkt6 != NULL);
+
+  new_ip6addr(pkt6->ip6_hdr.sadr, &other->hashPubKey, desc);
+
+  pkt6->shdr.type = htons(GNUNET_MESSAGE_TYPE_VPN_HELPER);
+  pkt6->shdr.size = htons(size);
+
+  pkt6->tun.flags = 0;
+  pkt6->tun.type = htons(0x86dd);
+
+  pkt6->ip6_hdr.version = 6;
+  pkt6->ip6_hdr.tclass_h = 0;
+  pkt6->ip6_hdr.tclass_l = 0;
+  pkt6->ip6_hdr.flowlbl = 0;
+  pkt6->ip6_hdr.paylgth = htons(pktlen);
+  pkt6->ip6_hdr.nxthdr = 0x06;
+  pkt6->ip6_hdr.hoplmt = 0xff;
+
+  {
+    char* ipv6addr;
+    GNUNET_assert(GNUNET_OK == GNUNET_CONFIGURATION_get_value_string(cfg, "vpn", "IPV6ADDR", &ipv6addr));
+    inet_pton (AF_INET6, ipv6addr, pkt6->ip6_hdr.dadr);
+    GNUNET_free(ipv6addr);
+  }
+  memcpy(&pkt6->tcp_hdr, pkt, pktlen);
+
+  GNUNET_HashCode* key = address_mapping_exists(pkt6->ip6_hdr.sadr);
+  GNUNET_assert (key != NULL);
+
+  struct map_entry *me = GNUNET_CONTAINER_multihashmap_get(hashmap, key);
+  GNUNET_CONTAINER_heap_update_cost (heap, me->heap_node,
+                                     GNUNET_TIME_absolute_get ().abs_value);
+
+  GNUNET_free(key);
+
+  GNUNET_assert (me != NULL);
+  GNUNET_assert (me->desc.service_type & htonl(GNUNET_DNS_SERVICE_TYPE_TCP));
+
+  pkt6->tcp_hdr.crc = 0;
+  uint32_t sum = 0;
+  uint32_t tmp;
+  sum =
+    calculate_checksum_update (sum, (uint16_t *) & pkt6->ip6_hdr.sadr, 16);
+  sum =
+    calculate_checksum_update (sum, (uint16_t *) & pkt6->ip6_hdr.dadr, 16);
+  tmp = htonl(pktlen);
+  sum = calculate_checksum_update (sum, (uint16_t *) & tmp, 4);
+  tmp = htonl (((pkt6->ip6_hdr.nxthdr & 0x000000ff)));
+  sum = calculate_checksum_update (sum, (uint16_t *) & tmp, 4);
+
+  sum =
+    calculate_checksum_update (sum, (uint16_t *) & pkt6->tcp_hdr,
+                               ntohs (pkt6->ip6_hdr.paylgth));
+  pkt6->tcp_hdr.crc = calculate_checksum_end (sum);
+
+  write_to_helper(pkt6, size);
+
+  return GNUNET_OK;
 }
 
 /**
@@ -473,19 +693,23 @@ run (void *cls,
 {
     const static struct GNUNET_MESH_MessageHandler handlers[] = {
          {receive_udp_back, GNUNET_MESSAGE_TYPE_SERVICE_UDP_BACK, 0},
+         {receive_tcp_back, GNUNET_MESSAGE_TYPE_SERVICE_TCP_BACK, 0},
          {NULL, 0, 0}
     };
     mesh_handle = GNUNET_MESH_connect(cfg_,
                                      NULL,
                                      NULL,
-                                     handlers);
-    mst = GNUNET_SERVER_mst_create(&message_token, NULL);
+                                      handlers,
+                                      NULL);
     cfg = cfg_;
     restart_hijack = 0;
     hashmap = GNUNET_CONTAINER_multihashmap_create(65536);
+    heap = GNUNET_CONTAINER_heap_create (GNUNET_CONTAINER_HEAP_ORDER_MIN);
+    GNUNET_CONFIGURATION_get_value_number (cfg, "vpn", "MAX_MAPPINGg",
+                                           &max_mappings);
     udp_connections = GNUNET_CONTAINER_multihashmap_create(65536);
-    GNUNET_SCHEDULER_add_now (connect_to_service_dns, NULL);
-    GNUNET_SCHEDULER_add_now (start_helper_and_schedule, NULL);
+    GNUNET_SCHEDULER_TaskIdentifier conn_task = GNUNET_SCHEDULER_add_now (connect_to_service_dns, NULL);
+    GNUNET_SCHEDULER_add_after (conn_task, start_helper_and_schedule, NULL);
     GNUNET_SCHEDULER_add_delayed(GNUNET_TIME_UNIT_FOREVER_REL, &cleanup, cls);
 }