protocol.c 5.9 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231
  1. /*
  2. protocol.c -- handle the meta-protocol, basic functions
  3. Copyright (C) 1999-2005 Ivo Timmermans,
  4. 2000-2016 Guus Sliepen <guus@tinc-vpn.org>
  5. This program is free software; you can redistribute it and/or modify
  6. it under the terms of the GNU General Public License as published by
  7. the Free Software Foundation; either version 2 of the License, or
  8. (at your option) any later version.
  9. This program is distributed in the hope that it will be useful,
  10. but WITHOUT ANY WARRANTY; without even the implied warranty of
  11. MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
  12. GNU General Public License for more details.
  13. You should have received a copy of the GNU General Public License along
  14. with this program; if not, write to the Free Software Foundation, Inc.,
  15. 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA.
  16. */
  17. #include "system.h"
  18. #include "conf.h"
  19. #include "connection.h"
  20. #include "logger.h"
  21. #include "meta.h"
  22. #include "protocol.h"
  23. #include "utils.h"
  24. #include "xalloc.h"
  25. bool tunnelserver = false;
  26. bool strictsubnets = false;
  27. /* Jumptable for the request handlers */
  28. static bool (*request_handlers[])(connection_t *) = {
  29. id_h, metakey_h, challenge_h, chal_reply_h, ack_h,
  30. NULL, NULL, NULL,
  31. ping_h, pong_h,
  32. add_subnet_h, del_subnet_h,
  33. add_edge_h, del_edge_h,
  34. key_changed_h, req_key_h, ans_key_h, tcppacket_h,
  35. };
  36. /* Request names */
  37. static char (*request_name[]) = {
  38. "ID", "METAKEY", "CHALLENGE", "CHAL_REPLY", "ACK",
  39. "STATUS", "ERROR", "TERMREQ",
  40. "PING", "PONG",
  41. "ADD_SUBNET", "DEL_SUBNET",
  42. "ADD_EDGE", "DEL_EDGE", "KEY_CHANGED", "REQ_KEY", "ANS_KEY", "PACKET",
  43. };
  44. static avl_tree_t *past_request_tree;
  45. bool check_id(const char *id) {
  46. for(; *id; id++)
  47. if(!isalnum(*id) && *id != '_') {
  48. return false;
  49. }
  50. return true;
  51. }
  52. /* Generic request routines - takes care of logging and error
  53. detection as well */
  54. bool send_request(connection_t *c, const char *format, ...) {
  55. va_list args;
  56. char buffer[MAXBUFSIZE];
  57. int len, request = 0;
  58. /* Use vsnprintf instead of vxasprintf: faster, no memory
  59. fragmentation, cleanup is automatic, and there is a limit on the
  60. input buffer anyway */
  61. va_start(args, format);
  62. len = vsnprintf(buffer, sizeof(buffer), format, args);
  63. buffer[sizeof(buffer) - 1] = 0;
  64. va_end(args);
  65. if(len < 0 || (size_t)len > sizeof(buffer) - 1) {
  66. logger(LOG_ERR, "Output buffer overflow while sending request to %s (%s)",
  67. c->name, c->hostname);
  68. return false;
  69. }
  70. ifdebug(PROTOCOL) {
  71. sscanf(buffer, "%d", &request);
  72. ifdebug(META)
  73. logger(LOG_DEBUG, "Sending %s to %s (%s): %s",
  74. request_name[request], c->name, c->hostname, buffer);
  75. else
  76. logger(LOG_DEBUG, "Sending %s to %s (%s)", request_name[request],
  77. c->name, c->hostname);
  78. }
  79. buffer[len++] = '\n';
  80. if(c == everyone) {
  81. broadcast_meta(NULL, buffer, len);
  82. return true;
  83. } else {
  84. return send_meta(c, buffer, len);
  85. }
  86. }
  87. void forward_request(connection_t *from) {
  88. int request;
  89. ifdebug(PROTOCOL) {
  90. sscanf(from->buffer, "%d", &request);
  91. ifdebug(META)
  92. logger(LOG_DEBUG, "Forwarding %s from %s (%s): %s",
  93. request_name[request], from->name, from->hostname,
  94. from->buffer);
  95. else
  96. logger(LOG_DEBUG, "Forwarding %s from %s (%s)",
  97. request_name[request], from->name, from->hostname);
  98. }
  99. from->buffer[from->reqlen - 1] = '\n';
  100. broadcast_meta(from, from->buffer, from->reqlen);
  101. }
  102. bool receive_request(connection_t *c) {
  103. int request;
  104. if(sscanf(c->buffer, "%d", &request) == 1) {
  105. if((request < 0) || (request >= LAST) || !request_handlers[request]) {
  106. ifdebug(META)
  107. logger(LOG_DEBUG, "Unknown request from %s (%s): %s",
  108. c->name, c->hostname, c->buffer);
  109. else
  110. logger(LOG_ERR, "Unknown request from %s (%s)",
  111. c->name, c->hostname);
  112. return false;
  113. } else {
  114. ifdebug(PROTOCOL) {
  115. ifdebug(META)
  116. logger(LOG_DEBUG, "Got %s from %s (%s): %s",
  117. request_name[request], c->name, c->hostname,
  118. c->buffer);
  119. else
  120. logger(LOG_DEBUG, "Got %s from %s (%s)",
  121. request_name[request], c->name, c->hostname);
  122. }
  123. }
  124. if((c->allow_request != ALL) && (c->allow_request != request)) {
  125. logger(LOG_ERR, "Unauthorized request from %s (%s)", c->name,
  126. c->hostname);
  127. return false;
  128. }
  129. if(!request_handlers[request](c)) {
  130. /* Something went wrong. Probably scriptkiddies. Terminate. */
  131. logger(LOG_ERR, "Error while processing %s from %s (%s)",
  132. request_name[request], c->name, c->hostname);
  133. return false;
  134. }
  135. } else {
  136. logger(LOG_ERR, "Bogus data received from %s (%s)",
  137. c->name, c->hostname);
  138. return false;
  139. }
  140. return true;
  141. }
  142. static int past_request_compare(const past_request_t *a, const past_request_t *b) {
  143. return strcmp(a->request, b->request);
  144. }
  145. static void free_past_request(past_request_t *r) {
  146. if(r->request) {
  147. free(r->request);
  148. }
  149. free(r);
  150. }
  151. void init_requests(void) {
  152. past_request_tree = avl_alloc_tree((avl_compare_t) past_request_compare, (avl_action_t) free_past_request);
  153. }
  154. void exit_requests(void) {
  155. avl_delete_tree(past_request_tree);
  156. }
  157. bool seen_request(char *request) {
  158. past_request_t *new, p = {0};
  159. p.request = request;
  160. if(avl_search(past_request_tree, &p)) {
  161. ifdebug(SCARY_THINGS) logger(LOG_DEBUG, "Already seen request");
  162. return true;
  163. } else {
  164. new = xmalloc(sizeof(*new));
  165. new->request = xstrdup(request);
  166. new->firstseen = now;
  167. avl_insert(past_request_tree, new);
  168. return false;
  169. }
  170. }
  171. void age_past_requests(void) {
  172. avl_node_t *node, *next;
  173. past_request_t *p;
  174. int left = 0, deleted = 0;
  175. for(node = past_request_tree->head; node; node = next) {
  176. next = node->next;
  177. p = node->data;
  178. if(p->firstseen + pinginterval <= now) {
  179. avl_delete_node(past_request_tree, node), deleted++;
  180. } else {
  181. left++;
  182. }
  183. }
  184. if(left || deleted)
  185. ifdebug(SCARY_THINGS) logger(LOG_DEBUG, "Aging past requests: deleted %d, left %d",
  186. deleted, left);
  187. }