ViewVC Help
View File | Revision Log | Show Annotations | Download File
/cvs/gvpe/src/vpn.C
(Generate patch)

Comparing gvpe/src/vpn.C (file contents):
Revision 1.3 by pcg, Wed Apr 2 21:02:25 2003 UTC vs.
Revision 1.7 by pcg, Sun Apr 6 18:12:18 2003 UTC

38 38
39#include "connection.h" 39#include "connection.h"
40#include "util.h" 40#include "util.h"
41#include "vpn.h" 41#include "vpn.h"
42 42
43#if ENABLE_TCP
44# include <map>
45# include <unistd.h>
46# include <fcntl.h>
47# include <sys/poll.h>
48#endif
49
50///////////////////////////////////////////////////////////////////////////// 43/////////////////////////////////////////////////////////////////////////////
51 44
52const char *vpn::script_if_up () 45const char *vpn::script_if_up ()
53{ 46{
54 // the tunnel device mtu should be the physical mtu - overhead 47 // the tunnel device mtu should be the physical mtu - overhead
191 reconnect_all (); 184 reconnect_all ();
192 185
193 return 0; 186 return 0;
194} 187}
195 188
196void 189// send a vpn packet out to other hosts
190bool
191vpn::send_vpn_packet (vpn_packet *pkt, const sockinfo &si, int tos)
192{
193 switch (si.prot)
194 {
195 case PROT_IPv4:
196 return send_ipv4_packet (pkt, si, tos);
197
198 case PROT_UDPv4:
199 return send_udpv4_packet (pkt, si, tos);
200
201#if ENABLE_TCP
202 case PROT_TCPv4:
203 return send_tcpv4_packet (pkt, si, tos);
204#endif
205
206 default:
207 slog (L_CRIT, _("%s: FATAL: trying to send packet with unsupported protocol"), (const char *)si);
208 return false;
209 }
210}
211
212bool
197vpn::send_ipv4_packet (vpn_packet *pkt, const sockinfo &si, int tos) 213vpn::send_ipv4_packet (vpn_packet *pkt, const sockinfo &si, int tos)
198{ 214{
199 setsockopt (ipv4_fd, SOL_IP, IP_TOS, &tos, sizeof tos); 215 setsockopt (ipv4_fd, SOL_IP, IP_TOS, &tos, sizeof tos);
200 sendto (ipv4_fd, &((*pkt)[0]), pkt->len, 0, si.sav4 (), si.salenv4 ()); 216 sendto (ipv4_fd, &((*pkt)[0]), pkt->len, 0, si.sav4 (), si.salenv4 ());
201}
202 217
203void 218 return true;
219}
220
221bool
204vpn::send_udpv4_packet (vpn_packet *pkt, const sockinfo &si, int tos) 222vpn::send_udpv4_packet (vpn_packet *pkt, const sockinfo &si, int tos)
205{ 223{
206 setsockopt (udpv4_fd, SOL_IP, IP_TOS, &tos, sizeof tos); 224 setsockopt (udpv4_fd, SOL_IP, IP_TOS, &tos, sizeof tos);
207 sendto (udpv4_fd, &((*pkt)[0]), pkt->len, 0, si.sav4 (), si.salenv4 ()); 225 sendto (udpv4_fd, &((*pkt)[0]), pkt->len, 0, si.sav4 (), si.salenv4 ());
226
227 return true;
208} 228}
209 229
210void 230void
211vpn::recv_vpn_packet (vpn_packet *pkt, const sockinfo &rsi) 231vpn::recv_vpn_packet (vpn_packet *pkt, const sockinfo &rsi)
212{ 232{
219 if (src == 0 || src > conns.size () 239 if (src == 0 || src > conns.size ()
220 || dst > conns.size () 240 || dst > conns.size ()
221 || pkt->typ () >= vpn_packet::PT_MAX) 241 || pkt->typ () >= vpn_packet::PT_MAX)
222 slog (L_WARN, _("(%s): received corrupted packet type %d (src %d, dst %d)"), 242 slog (L_WARN, _("(%s): received corrupted packet type %d (src %d, dst %d)"),
223 (const char *)rsi, pkt->typ (), pkt->src (), pkt->dst ()); 243 (const char *)rsi, pkt->typ (), pkt->src (), pkt->dst ());
244 else if (dst > conns.size ())
245 slog (L_WARN, _("(%s): received corrupted packet type %d (src %d, dst %d)"),
246 (const char *)rsi, pkt->typ (), pkt->src (), pkt->dst ());
224 else 247 else
225 { 248 {
226 connection *c = conns[src - 1]; 249 connection *c = conns[src - 1];
227 250
228 if (dst == 0 && !THISNODE->routerprio) 251 if (dst == 0 && !THISNODE->routerprio)
229 slog (L_WARN, _("%s(%s): received broadcast, but we are no router"), 252 slog (L_WARN, _("%s(%s): received broadcast, but we are no router"),
230 c->conf->nodename, (const char *)rsi); 253 c->conf->nodename, (const char *)rsi);
231 else if (dst != 0 && dst != THISNODE->id) 254 else if (dst != 0 && dst != THISNODE->id)
232 // FORWARDING NEEDED ;) 255 {
256 if (THISNODE->routerprio)
257 // the tos setting gets lost here. who cares.
258 conns[dst - 1]->inject_vpn_packet (pkt);
259 else
233 slog (L_WARN, 260 slog (L_WARN,
234 _("received frame for node %d ('%s') from %s, but this is node %d ('%s')"), 261 _("%s(%s): forwarding request (=> %s), but we are no router"),
262 c->conf->nodename, (const char *)rsi,
235 dst, conns[dst - 1]->conf->nodename, 263 conns[dst - 1]->conf->nodename);
236 (const char *)rsi, 264 }
237 THISNODE->id, THISNODE->nodename);
238 else 265 else
239 c->recv_vpn_packet (pkt, rsi); 266 c->recv_vpn_packet (pkt, rsi);
240 } 267 }
241} 268}
242 269
250 socklen_t sa_len = sizeof (sa); 277 socklen_t sa_len = sizeof (sa);
251 int len; 278 int len;
252 279
253 len = recvfrom (w.fd, &((*pkt)[0]), MAXSIZE, 0, (sockaddr *)&sa, &sa_len); 280 len = recvfrom (w.fd, &((*pkt)[0]), MAXSIZE, 0, (sockaddr *)&sa, &sa_len);
254 281
255 sockinfo si(sa); 282 sockinfo si(sa, PROT_UDPv4);
256 283
257 if (len > 0) 284 if (len > 0)
258 { 285 {
259 pkt->len = len; 286 pkt->len = len;
260 287
261 recv_vpn_packet (pkt, si); 288 recv_vpn_packet (pkt, si);
262 } 289 }
263 else 290 else
264 { 291 {
265 // probably ECONNRESET or somesuch 292 // probably ECONNRESET or somesuch
266 slog (L_DEBUG, _("%s: %s"), (const char *)si, strerror (errno)); 293 slog (L_DEBUG, _("%s: fd %d, %s"), (const char *)si, w.fd, strerror (errno));
267 } 294 }
268 295
269 delete pkt; 296 delete pkt;
270 } 297 }
271 else if (revents & POLLHUP) 298 else if (revents & POLLHUP)
327 _("FATAL: unknown revents %08x in socket, terminating\n"), 354 _("FATAL: unknown revents %08x in socket, terminating\n"),
328 revents); 355 revents);
329 exit (1); 356 exit (1);
330 } 357 }
331} 358}
332
333#if ENABLE_TCP
334
335struct tcp_connection;
336
337struct lt_sockinfo
338{
339 bool operator()(const sockinfo *a, const sockinfo *b) const
340 {
341 return *a < *b;
342 }
343};
344
345struct tcp_si_map : public map<const sockinfo *, tcp_connection *, lt_sockinfo> {
346 void cleaner_cb (time_watcher &w); time_watcher cleaner;
347
348 tcp_si_map ()
349 : cleaner(this, &tcp_si_map::cleaner_cb)
350 {
351 cleaner.start (0);
352 }
353} tcp_si;
354
355struct tcp_connection : io_watcher {
356 tstamp last_activity;
357 const sockinfo si;
358 vpn &v;
359 bool ok;
360
361 void tcpv4_ev (io_watcher &w, short revents);
362
363 operator tcp_si_map::value_type()
364 {
365 return tcp_si_map::value_type (&si, this);
366 }
367
368 tcp_connection (int fd_, const sockinfo &si_, vpn &v_)
369 : v(v_), si(si_), io_watcher(this, &tcp_connection::tcpv4_ev), ok(false)
370 {
371 last_activity = NOW;
372 start (fd_, POLLOUT);
373 }
374
375 ~tcp_connection () { close (fd); }
376};
377
378void tcp_si_map::cleaner_cb (time_watcher &w)
379{
380 w.at = NOW + 600;
381 tstamp to = NOW - ::conf.keepalive - 30;
382
383 for (iterator i = begin (); i != end(); )
384 if (i->second->last_activity >= to)
385 ++i;
386 else
387 {
388 erase (i);
389 i = begin ();
390 }
391}
392
393void
394vpn::send_tcpv4_packet (vpn_packet *pkt, const sockinfo &si, int tos)
395{
396 tcp_si_map::iterator info = tcp_si.find (&si);
397
398 if (info == tcp_si.end ())
399 {
400 // woaw, the first lost packet ;)
401 int fd = socket (PF_INET, SOCK_STREAM, IPPROTO_TCP);
402
403 if (fd >= 0)
404 {
405 fcntl (fd, F_SETFL, O_NONBLOCK);
406
407 if (connect (fd, si.sav4 (), si.salenv4 ()) >= 0
408 || errno == EINPROGRESS)
409 {
410 tcp_connection *i = new tcp_connection (fd, si, *this);
411
412 tcp_si.insert (*i);
413 }
414 else
415 close (fd);
416 }
417 }
418 else
419 {
420 tcp_connection *i = info->second;
421
422 i->last_activity = NOW;
423
424 if (i->ok)
425 {
426 setsockopt (i->fd, SOL_IP, IP_TOS, &tos, sizeof tos);
427
428 // we use none of the advantages of tcp
429 write (i->fd, (void *)pkt, pkt->len + sizeof (u32)) != pkt->len + sizeof (u32);
430 }
431 }
432
433#if 0
434 setsockopt (udpv4_fd, SOL_IP, IP_TOS, &tos, sizeof tos);
435 sendto (udpv4_fd, &((*pkt)[0]), pkt->len, 0, si.sav4 (), si.salenv4 ());
436#endif
437}
438
439void
440tcp_connection::tcpv4_ev (io_watcher &w, short revents)
441{
442 last_activity = NOW;
443
444 if (!ok) // just established?
445 {
446 ok = true;
447 fcntl (fd, F_SETFL, 0);
448 stop ();
449 start (fd, POLLIN);
450 }
451
452 if (revents & (POLLIN | POLLERR))
453 {
454 u32 len;
455
456 if (sizeof (len) == read (fd, &len, sizeof (len)))
457 {
458 vpn_packet *pkt = new vpn_packet;
459
460 if (len == read (fd, &((*pkt)[0]), len))
461 {
462 pkt->len = len;
463
464 v.recv_vpn_packet (pkt, si);
465 return;
466 }
467
468 delete pkt;
469 }
470
471 tcp_si.erase (&si);
472 stop ();
473 }
474}
475
476void
477vpn::tcpv4_ev (io_watcher &w, short revents)
478{
479 if (revents & (POLLIN | POLLERR))
480 {
481 struct sockaddr_in sa;
482 socklen_t sa_len = sizeof (sa);
483 int len;
484
485 int fd = accept (w.fd, (sockaddr *)&sa, &sa_len);
486
487 if (fd >= 0)
488 {
489 fcntl (fd, F_SETFL, O_NONBLOCK);
490
491 sockinfo si(sa, PROT_TCPv4);
492 tcp_connection *i = new tcp_connection (fd, si, *this);
493
494 slog (L_ERR, "accepted %d\n", fd);//D
495
496 tcp_si.insert (*i);
497 }
498 }
499}
500
501#endif
502 359
503void 360void
504vpn::tap_ev (io_watcher &w, short revents) 361vpn::tap_ev (io_watcher &w, short revents)
505{ 362{
506 if (revents & POLLIN) 363 if (revents & POLLIN)
640 } 497 }
641 498
642 return router; 499 return router;
643} 500}
644 501
645void vpn::connect_request (int id) 502void vpn::send_connect_request (int id)
646{ 503{
647 connection *c = find_router (); 504 connection *c = find_router ();
648 505
649 if (c) 506 if (c)
650 c->connect_request (id); 507 c->send_connect_request (id);
651 //else // does not work, because all others must connect to the same router 508 else
652 // // no router found, aggressively connect to all routers 509 // no router found, aggressively connect to all routers
653 // for (conns_vector::iterator i = conns.begin (); i != conns.end (); ++i) 510 for (conns_vector::iterator i = conns.begin (); i != conns.end (); ++i)
654 // if ((*i)->conf->routerprio) 511 if ((*i)->conf->routerprio)
655 // (*i)->establish_connection (); 512 (*i)->establish_connection ();
656} 513}
657 514
658void 515void
659connection::dump_status () 516connection::dump_status ()
660{ 517{

Diff Legend

Removed lines
+ Added lines
< Changed lines
> Changed lines