… | |
… | |
20 | */ |
20 | */ |
21 | |
21 | |
22 | #ifndef UTIL_H__ |
22 | #ifndef UTIL_H__ |
23 | #define UTIL_H__ |
23 | #define UTIL_H__ |
24 | |
24 | |
25 | #include <sys/socket.h> |
25 | #include "iom.h" |
26 | #include <netinet/in.h> |
|
|
27 | |
|
|
28 | #include <map> |
|
|
29 | |
|
|
30 | #include "device.h" |
26 | #include "device.h" |
31 | |
|
|
32 | #define SOCKADDR sockaddr_in // this is lame, I know |
|
|
33 | |
27 | |
34 | /* |
28 | /* |
35 | * check for an existing vped for this net, and write pid to pidfile |
29 | * check for an existing vped for this net, and write pid to pidfile |
36 | */ |
30 | */ |
37 | extern int write_pidfile (void); |
31 | extern int write_pidfile (void); |
… | |
… | |
69 | p[5] = id; |
63 | p[5] = id; |
70 | } |
64 | } |
71 | |
65 | |
72 | #define mac2id(p) (p[0] & 0x01 ? 0 : (p[4] << 8) | p[5]) |
66 | #define mac2id(p) (p[0] & 0x01 ? 0 : (p[4] << 8) | p[5]) |
73 | |
67 | |
74 | // a very simple fifo pkt-queue |
|
|
75 | class pkt_queue |
|
|
76 | { |
|
|
77 | tap_packet *queue[QUEUEDEPTH]; |
|
|
78 | int i, j; |
|
|
79 | |
|
|
80 | public: |
|
|
81 | |
|
|
82 | void put (tap_packet *p); |
|
|
83 | tap_packet *get (); |
|
|
84 | |
|
|
85 | pkt_queue (); |
|
|
86 | ~pkt_queue (); |
|
|
87 | }; |
|
|
88 | |
|
|
89 | struct sockinfo |
|
|
90 | { |
|
|
91 | u32 host; |
|
|
92 | u16 port; |
|
|
93 | |
|
|
94 | void set (const SOCKADDR *sa) |
|
|
95 | { |
|
|
96 | host = sa->sin_addr.s_addr; |
|
|
97 | port = sa->sin_port; |
|
|
98 | } |
|
|
99 | |
|
|
100 | sockinfo() |
|
|
101 | { |
|
|
102 | host = port = 0; |
|
|
103 | } |
|
|
104 | |
|
|
105 | sockinfo(const SOCKADDR &sa) |
|
|
106 | { |
|
|
107 | set (&sa); |
|
|
108 | } |
|
|
109 | |
|
|
110 | sockinfo(const SOCKADDR *sa) |
|
|
111 | { |
|
|
112 | set (sa); |
|
|
113 | } |
|
|
114 | |
|
|
115 | SOCKADDR *sa() |
|
|
116 | { |
|
|
117 | static SOCKADDR sa; |
|
|
118 | |
|
|
119 | sa.sin_family = AF_INET; |
|
|
120 | sa.sin_port = port; |
|
|
121 | sa.sin_addr.s_addr = host; |
|
|
122 | |
|
|
123 | return &sa; |
|
|
124 | } |
|
|
125 | |
|
|
126 | operator const char *(); |
|
|
127 | }; |
|
|
128 | |
|
|
129 | inline bool |
|
|
130 | operator == (const sockinfo &a, const sockinfo &b) |
|
|
131 | { |
|
|
132 | return a.host == b.host && a.port == b.port; |
|
|
133 | } |
|
|
134 | |
|
|
135 | inline bool |
|
|
136 | operator < (const sockinfo &a, const sockinfo &b) |
|
|
137 | { |
|
|
138 | return a.host < b.host |
|
|
139 | || (a.host == b.host && a.port < b.port); |
|
|
140 | } |
|
|
141 | |
|
|
142 | // only do action once every x seconds per host. |
|
|
143 | // currently this is quite a slow implementation, |
|
|
144 | // but suffices for normal operation. |
|
|
145 | struct u32_rate_limiter : private map<u32, time_t> |
|
|
146 | { |
|
|
147 | int every; |
|
|
148 | |
|
|
149 | bool can (u32 host); |
|
|
150 | |
|
|
151 | u32_rate_limiter (time_t every = 1) |
|
|
152 | { |
|
|
153 | this->every = every; |
|
|
154 | } |
|
|
155 | }; |
|
|
156 | |
|
|
157 | struct net_rate_limiter : u32_rate_limiter |
|
|
158 | { |
|
|
159 | bool can (SOCKADDR *sa) { return u32_rate_limiter::can((u32)sa->sin_addr.s_addr); } |
|
|
160 | bool can (sockinfo &si) { return u32_rate_limiter::can((u32)si.host); } |
|
|
161 | |
|
|
162 | net_rate_limiter (time_t every) : u32_rate_limiter (every) {} |
|
|
163 | }; |
|
|
164 | |
|
|
165 | struct sliding_window { |
68 | struct sliding_window { |
166 | u32 v[(WINDOWSIZE + 31) / 32]; |
69 | u32 v[(WINDOWSIZE + 31) / 32]; |
167 | u32 seq; |
70 | u32 seq; |
168 | |
71 | |
169 | void reset (u32 seqno) |
72 | void reset (u32 seqno) |
… | |
… | |
195 | |
98 | |
196 | u32 s = seqno % WINDOWSIZE; |
99 | u32 s = seqno % WINDOWSIZE; |
197 | u32 *cell = v + (s >> 5); |
100 | u32 *cell = v + (s >> 5); |
198 | u32 mask = 1 << (s & 31); |
101 | u32 mask = 1 << (s & 31); |
199 | |
102 | |
200 | //printf ("received seqno %08lx, seq %08lx, mask %08lx is %08lx\n", seqno, seq, mask, ismask); |
|
|
201 | if (*cell & mask) |
103 | if (*cell & mask) |
202 | { |
104 | { |
203 | slog (L_ERR, _("received duplicate packet (received %08lx, expected %08lx)\n" |
105 | slog (L_ERR, _("received duplicate packet (received %08lx, expected %08lx)\n" |
204 | "possible replay attack, or just packet duplication"), seqno, seq + 1);//D |
106 | "possible replay attack, or just packet duplication"), seqno, seq + 1);//D |
205 | return false; |
107 | return false; |