1 | /* |
1 | /* |
2 | connection.h -- header for connection.C |
2 | connection.h -- header for connection.C |
|
|
3 | Copyright (C) 2003-2005 Marc Lehmann <gvpe@schmorp.de> |
3 | |
4 | |
|
|
5 | This file is part of GVPE. |
|
|
6 | |
4 | This program is free software; you can redistribute it and/or modify |
7 | GVPE is free software; you can redistribute it and/or modify |
5 | it under the terms of the GNU General Public License as published by |
8 | it under the terms of the GNU General Public License as published by |
6 | the Free Software Foundation; either version 2 of the License, or |
9 | the Free Software Foundation; either version 2 of the License, or |
7 | (at your option) any later version. |
10 | (at your option) any later version. |
8 | |
11 | |
9 | This program is distributed in the hope that it will be useful, |
12 | This program is distributed in the hope that it will be useful, |
10 | but WITHOUT ANY WARRANTY; without even the implied warranty of |
13 | but WITHOUT ANY WARRANTY; without even the implied warranty of |
11 | MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the |
14 | MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the |
12 | GNU General Public License for more details. |
15 | GNU General Public License for more details. |
13 | |
16 | |
14 | You should have received a copy of the GNU General Public License |
17 | You should have received a copy of the GNU General Public License |
15 | along with this program; if not, write to the Free Software |
18 | along with gvpe; if not, write to the Free Software |
16 | Foundation, Inc. 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA |
19 | Foundation, Inc. 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA |
17 | */ |
20 | */ |
18 | |
21 | |
19 | #ifndef VPE_CONNECTION_H__ |
22 | #ifndef GVPE_CONNECTION_H__ |
20 | #define VPE_CONNECTION_H__ |
23 | #define GVPE_CONNECTION_H__ |
21 | |
24 | |
22 | #include <netinet/ip.h> // for tos etc. |
|
|
23 | |
|
|
24 | #include <openssl/rand.h> |
|
|
25 | #include <openssl/hmac.h> |
25 | #include <openssl/hmac.h> |
26 | #include <openssl/evp.h> |
|
|
27 | #include <openssl/rsa.h> |
|
|
28 | #include <openssl/err.h> |
|
|
29 | |
26 | |
30 | #include "global.h" |
27 | #include "global.h" |
31 | #include "conf.h" |
28 | #include "conf.h" |
32 | #include "sockinfo.h" |
29 | #include "sockinfo.h" |
33 | #include "util.h" |
30 | #include "util.h" |
… | |
… | |
40 | |
37 | |
41 | struct rsaid { |
38 | struct rsaid { |
42 | u8 id[RSA_IDLEN]; // the challenge id |
39 | u8 id[RSA_IDLEN]; // the challenge id |
43 | }; |
40 | }; |
44 | |
41 | |
45 | typedef u8 rsachallenge[RSA_KEYLEN - RSA_OVERHEAD]; // challenge data; |
42 | typedef rsaclear rsachallenge; // challenge data; |
46 | typedef u8 rsaencrdata[RSA_KEYLEN]; // encrypted challenge |
43 | typedef rsacrypt rsaencrdata; // encrypted challenge |
47 | typedef u8 rsaresponse[RSA_RESLEN]; // the encrypted ripemd160 hash |
44 | typedef u8 rsaresponse[RSA_RESLEN]; // the encrypted ripemd160 hash |
48 | |
45 | |
49 | //////////////////////////////////////////////////////////////////////////////////////// |
46 | //////////////////////////////////////////////////////////////////////////////////////// |
50 | |
47 | |
51 | struct crypto_ctx; |
48 | struct crypto_ctx; |
52 | |
49 | |
53 | struct hmac_packet:net_packet |
50 | struct hmac_packet : net_packet |
54 | { |
51 | { |
55 | u8 hmac[HMACLENGTH]; // each and every packet has a hmac field, but that is not (yet) checked everywhere |
52 | u8 hmac[HMACLENGTH]; // each and every packet has a hmac field, but that is not (yet) checked everywhere |
56 | |
53 | |
57 | void hmac_set (crypto_ctx * ctx); |
54 | void hmac_set (crypto_ctx * ctx); |
58 | bool hmac_chk (crypto_ctx * ctx); |
55 | bool hmac_chk (crypto_ctx * ctx); |
… | |
… | |
71 | PT_DATA_UNCOMPRESSED, |
68 | PT_DATA_UNCOMPRESSED, |
72 | PT_DATA_COMPRESSED, |
69 | PT_DATA_COMPRESSED, |
73 | PT_PING, PT_PONG, // wasting namespace space? ;) |
70 | PT_PING, PT_PONG, // wasting namespace space? ;) |
74 | PT_AUTH_REQ, // authentification request |
71 | PT_AUTH_REQ, // authentification request |
75 | PT_AUTH_RES, // authentification response |
72 | PT_AUTH_RES, // authentification response |
76 | PT_CONNECT_REQ, // want other host to contact me |
73 | PT_CONNECT_REQ, // want other node to contact me |
77 | PT_CONNECT_INFO, // request connection to some node |
74 | PT_CONNECT_INFO, // request connection to some node |
|
|
75 | PT_DATA_BRIDGED, // uncompressed packet with foreign mac pot. larger than path mtu |
78 | PT_MAX |
76 | PT_MAX |
79 | }; |
77 | }; |
80 | |
78 | |
81 | u8 type; |
79 | u8 type; |
82 | u8 srcdst, src1, dst1; |
80 | u8 srcdst, src1, dst1; |
83 | |
81 | |
84 | void set_hdr (ptype type, unsigned int dst); |
82 | void set_hdr (ptype type_, unsigned int dst); |
85 | |
83 | |
86 | unsigned int src () const |
84 | unsigned int src () const |
87 | { |
85 | { |
88 | return src1 | ((srcdst >> 4) << 8); |
86 | return src1 | ((srcdst >> 4) << 8); |
89 | } |
87 | } |
… | |
… | |
102 | //////////////////////////////////////////////////////////////////////////////////////// |
100 | //////////////////////////////////////////////////////////////////////////////////////// |
103 | |
101 | |
104 | // a very simple fifo pkt-queue |
102 | // a very simple fifo pkt-queue |
105 | class pkt_queue |
103 | class pkt_queue |
106 | { |
104 | { |
107 | tap_packet *queue[QUEUEDEPTH]; |
105 | net_packet *queue[QUEUEDEPTH]; |
108 | int i, j; |
106 | int i, j; |
109 | |
107 | |
110 | public: |
108 | public: |
111 | |
109 | |
112 | void put (tap_packet *p); |
110 | void put (net_packet *p); |
113 | tap_packet *get (); |
111 | net_packet *get (); |
114 | |
112 | |
115 | pkt_queue (); |
113 | pkt_queue (); |
116 | ~pkt_queue (); |
114 | ~pkt_queue (); |
|
|
115 | }; |
|
|
116 | |
|
|
117 | enum |
|
|
118 | { |
|
|
119 | FEATURE_COMPRESSION = 0x01, |
|
|
120 | FEATURE_ROHC = 0x02, |
|
|
121 | FEATURE_BRIDGING = 0x04, |
117 | }; |
122 | }; |
118 | |
123 | |
119 | struct connection |
124 | struct connection |
120 | { |
125 | { |
121 | conf_node *conf; |
126 | conf_node *conf; |
… | |
… | |
128 | |
133 | |
129 | u32 oseqno; |
134 | u32 oseqno; |
130 | sliding_window iseqno; |
135 | sliding_window iseqno; |
131 | |
136 | |
132 | u8 protocol; |
137 | u8 protocol; |
|
|
138 | u8 features; |
133 | |
139 | |
134 | pkt_queue queue; |
140 | pkt_queue data_queue, vpn_queue; |
135 | |
141 | |
136 | crypto_ctx *octx, *ictx; |
142 | crypto_ctx *octx, *ictx; |
|
|
143 | |
|
|
144 | #if ENABLE_DNS |
|
|
145 | struct dns_connection *dns; |
|
|
146 | |
|
|
147 | void dnsv4_reset_connection (); |
|
|
148 | #endif |
137 | |
149 | |
138 | enum conf_node::connectmode connectmode; |
150 | enum conf_node::connectmode connectmode; |
139 | u8 prot_minor; // minor number of other side |
151 | u8 prot_minor; // minor number of other side |
140 | |
152 | |
141 | void reset_dstaddr (); |
153 | void reset_si (); |
|
|
154 | const sockinfo &forward_si (const sockinfo &si) const; |
142 | |
155 | |
143 | void shutdown (); |
156 | void shutdown (); |
|
|
157 | void connection_established (); |
144 | void reset_connection (); |
158 | void reset_connection (); |
145 | void establish_connection_cb (tstamp &ts); time_watcher establish_connection; |
|
|
146 | void rekey_cb (tstamp &ts); time_watcher rekey; // next rekying (actually current reset + reestablishing) |
|
|
147 | void keepalive_cb (tstamp &ts); time_watcher keepalive; // next keepalive probe |
|
|
148 | |
159 | |
|
|
160 | void establish_connection_cb (ev::timer &w, int revents); ev::timer establish_connection; |
|
|
161 | void rekey_cb (ev::timer &w, int revents); ev::timer rekey; // next rekying (actually current reset + reestablishing) |
|
|
162 | void keepalive_cb (ev::timer &w, int revents); ev::timer keepalive; // next keepalive probe |
|
|
163 | |
|
|
164 | void send_connect_request (int id); |
149 | void send_auth_request (const sockinfo &si, bool initiate); |
165 | void send_auth_request (const sockinfo &si, bool initiate); |
150 | void send_auth_response (const sockinfo &si, const rsaid &id, const rsachallenge &chg); |
166 | void send_auth_response (const sockinfo &si, const rsaid &id, const rsachallenge &chg); |
151 | void send_connect_info (int rid, const sockinfo &rsi, u8 rprotocols); |
167 | void send_connect_info (int rid, const sockinfo &rsi, u8 rprotocols); |
152 | void send_reset (const sockinfo &dsi); |
168 | void send_reset (const sockinfo &dsi); |
153 | void send_ping (const sockinfo &dsi, u8 pong = 0); |
169 | void send_ping (const sockinfo &dsi, u8 pong = 0); |
154 | void send_data_packet (tap_packet *pkt, bool broadcast = false); |
170 | void send_data_packet (tap_packet *pkt); |
|
|
171 | |
155 | void inject_data_packet (tap_packet *pkt, bool broadcast = false); |
172 | void inject_data_packet (tap_packet *pkt, bool broadcast = false); |
156 | void connect_request (int id); |
173 | void inject_vpn_packet (vpn_packet *pkt, int tos = 0); // for forwarding |
157 | |
174 | |
158 | void send_vpn_packet (vpn_packet *pkt, const sockinfo &si, int tos = IPTOS_RELIABILITY); |
|
|
159 | void recv_vpn_packet (vpn_packet *pkt, const sockinfo &rsi); |
175 | void recv_vpn_packet (vpn_packet *pkt, const sockinfo &rsi); |
|
|
176 | void send_vpn_packet (vpn_packet *pkt, const sockinfo &si, int tos = 0); |
160 | |
177 | |
|
|
178 | void script_init_env (const char *ext); |
161 | void script_node (); |
179 | void script_init_connect_env (); |
162 | const char *script_node_up (int); |
180 | const char *script_node_up (); |
163 | const char *script_node_down (int); |
181 | const char *script_node_down (); |
164 | |
182 | |
165 | void dump_status (); |
183 | void dump_status (); |
166 | |
184 | |
167 | connection(struct vpn *vpn_); |
185 | connection (struct vpn *vpn, conf_node *conf); |
168 | ~connection (); |
186 | ~connection (); |
169 | }; |
187 | }; |
170 | |
188 | |
171 | #endif |
189 | #endif |
172 | |
190 | |