… | |
… | |
335 | |
335 | |
336 | return true; |
336 | return true; |
337 | } |
337 | } |
338 | |
338 | |
339 | void |
339 | void |
|
|
340 | vpn::inject_data_packet (tap_packet *pkt, int dst) |
|
|
341 | { |
|
|
342 | if (dst) |
|
|
343 | { |
|
|
344 | // unicast |
|
|
345 | if (dst != THISNODE->id) |
|
|
346 | conns[dst - 1]->inject_data_packet (pkt); |
|
|
347 | } |
|
|
348 | else |
|
|
349 | { |
|
|
350 | // broadcast, this is ugly, but due to the security policy |
|
|
351 | // we have to connect to all hosts... |
|
|
352 | for (conns_vector::iterator c = conns.begin (); c != conns.end (); ++c) |
|
|
353 | if ((*c)->conf != THISNODE) |
|
|
354 | (*c)->inject_data_packet (pkt, true); |
|
|
355 | } |
|
|
356 | } |
|
|
357 | |
|
|
358 | void |
340 | vpn::recv_vpn_packet (vpn_packet *pkt, const sockinfo &rsi) |
359 | vpn::recv_vpn_packet (vpn_packet *pkt, const sockinfo &rsi) |
341 | { |
360 | { |
342 | unsigned int src = pkt->src (); |
361 | unsigned int src = pkt->src (); |
343 | unsigned int dst = pkt->dst (); |
362 | unsigned int dst = pkt->dst (); |
344 | |
363 | |
… | |
… | |
358 | connection *c = conns[src - 1]; |
377 | connection *c = conns[src - 1]; |
359 | |
378 | |
360 | if (dst == 0) |
379 | if (dst == 0) |
361 | slog (L_WARN, _("%s(%s): received broadcast (protocol violation)"), |
380 | slog (L_WARN, _("%s(%s): received broadcast (protocol violation)"), |
362 | c->conf->nodename, (const char *)rsi); |
381 | c->conf->nodename, (const char *)rsi); |
363 | else if (dst != 0 && dst != THISNODE->id) |
382 | else if (dst != THISNODE->id) |
364 | { |
383 | { |
365 | if (THISNODE->routerprio) |
384 | if (THISNODE->routerprio) |
366 | // the tos setting gets lost here. who cares. |
385 | // the tos setting gets lost here. who cares. |
367 | conns[dst - 1]->inject_vpn_packet (pkt); |
386 | conns[dst - 1]->inject_vpn_packet (pkt); |
368 | else |
387 | else |
… | |
… | |
529 | /* process data */ |
548 | /* process data */ |
530 | tap_packet *pkt; |
549 | tap_packet *pkt; |
531 | |
550 | |
532 | pkt = tap->recv (); |
551 | pkt = tap->recv (); |
533 | |
552 | |
|
|
553 | if (!pkt) |
|
|
554 | return; |
|
|
555 | |
|
|
556 | if (pkt->len > 14) |
|
|
557 | { |
534 | int dst = mac2id (pkt->dst); |
558 | int dst = mac2id (pkt->dst); |
535 | int src = mac2id (pkt->src); |
559 | int src = mac2id (pkt->src); |
536 | |
560 | |
537 | if (src != THISNODE->id) |
561 | if (src != THISNODE->id) |
538 | { |
|
|
539 | slog (L_ERR, _("FATAL: tap packet not originating on current node received, exiting.")); |
|
|
540 | exit (1); |
|
|
541 | } |
|
|
542 | |
|
|
543 | if (dst == THISNODE->id) |
|
|
544 | { |
|
|
545 | slog (L_ERR, _("FATAL: tap packet destined for current node received, exiting.")); |
|
|
546 | exit (1); |
|
|
547 | } |
|
|
548 | |
|
|
549 | if (dst > conns.size ()) |
|
|
550 | slog (L_ERR, _("tap packet for unknown node %d received, ignoring."), dst); |
|
|
551 | else |
|
|
552 | { |
|
|
553 | if (dst) |
|
|
554 | { |
562 | { |
555 | // unicast |
563 | slog (L_ERR, _("FATAL: tap packet not originating on current node received, exiting.")); |
556 | if (dst != THISNODE->id) |
564 | exit (1); |
557 | conns[dst - 1]->inject_data_packet (pkt); |
|
|
558 | } |
565 | } |
|
|
566 | |
|
|
567 | if (dst == THISNODE->id) |
|
|
568 | { |
|
|
569 | slog (L_ERR, _("FATAL: tap packet destined for current node received, exiting.")); |
|
|
570 | exit (1); |
|
|
571 | } |
|
|
572 | |
|
|
573 | if (dst > conns.size ()) |
|
|
574 | slog (L_ERR, _("tap packet for unknown node %d received, ignoring."), dst); |
559 | else |
575 | else |
560 | { |
|
|
561 | // broadcast, this is ugly, but due to the security policy |
|
|
562 | // we have to connect to all hosts... |
|
|
563 | for (conns_vector::iterator c = conns.begin (); c != conns.end (); ++c) |
|
|
564 | if ((*c)->conf != THISNODE) |
|
|
565 | (*c)->inject_data_packet (pkt); |
576 | inject_data_packet (pkt, dst); |
566 | } |
|
|
567 | } |
577 | } |
568 | |
578 | |
569 | delete pkt; |
579 | delete pkt; |
570 | } |
580 | } |
571 | else if (revents & (POLLHUP | POLLERR)) |
581 | else if (revents & (POLLHUP | POLLERR)) |