/* vim: set expandtab ts=4 sw=4: */
/*
* You may redistribute this program and/or modify it under the terms of
* the GNU General Public License as published by the Free Software Foundation,
* either version 3 of the License, or (at your option) any later version.
*
* This program is distributed in the hope that it will be useful,
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
* GNU General Public License for more details.
*
* You should have received a copy of the GNU General Public License
* along with this program. If not, see .
*/
#include "benc/String.h"
#include "benc/Dict.h"
#include "benc/List.h"
#include "benc/Int.h"
#include "benc/serialization/standard/BencMessageWriter.h"
#include "benc/serialization/standard/BencMessageReader.h"
#include "crypto/AddressCalc.h"
#include "crypto/random/Random.h"
#include "interface/tuntap/TUNMessageType.h"
#include "memory/Allocator.h"
#include "tunnel/IpTunnel.h"
#include "tunnel/RouteGen.h"
#include "crypto/AddressCalc.h"
#include "util/platform/netdev/NetDev.h"
#include "util/Checksum.h"
#include "util/AddrTools.h"
#include "util/events/EventBase.h"
#include "util/Identity.h"
#include "util/events/Timeout.h"
#include "util/Defined.h"
#include "util/Escape.h"
#include "wire/Error.h"
#include "wire/Headers.h"
#include "wire/Ethernet.h"
#include "wire/DataHeader.h"
#include
struct IpTunnel_pvt
{
struct IpTunnel pub;
struct Allocator* allocator;
struct Log* logger;
struct RouteGen* rg;
uint32_t connectionCapacity;
/** An always incrementing number which represents the connections. */
uint32_t nextConnectionNumber;
/** To get the name of the TUN interface so that ip addresses can be added. */
struct GlobalConfig* globalConf;
/**
* Every 10 seconds check for connections which the other end has
* not provided ip addresses and send more requests.
*/
struct Timeout* timeout;
struct Random* rand;
/** For verifying the integrity of the structure. */
Identity
};
static struct IpTunnel_Connection* newConnection(bool isOutgoing, struct IpTunnel_pvt* context)
{
if (context->pub.connectionList.count == context->connectionCapacity) {
uint32_t newSize = (context->connectionCapacity + 4) * sizeof(struct IpTunnel_Connection);
context->pub.connectionList.connections =
Allocator_realloc(context->allocator, context->pub.connectionList.connections, newSize);
context->connectionCapacity += 4;
}
struct IpTunnel_Connection* conn =
&context->pub.connectionList.connections[context->pub.connectionList.count];
// If it's an incoming connection, it must be lower on the list than any outgoing connections.
if (!isOutgoing) {
for (int i = (int)context->pub.connectionList.count - 1; i >= 0; i--) {
if (!context->pub.connectionList.connections[i].isOutgoing
&& conn != &context->pub.connectionList.connections[i + 1])
{
Bits_memcpy(conn,
&context->pub.connectionList.connections[i + 1],
sizeof(struct IpTunnel_Connection));
conn = &context->pub.connectionList.connections[i + 1];
}
}
}
context->pub.connectionList.count++;
Bits_memset(conn, 0, sizeof(struct IpTunnel_Connection));
conn->number = context->nextConnectionNumber++;
conn->isOutgoing = isOutgoing;
// if there are 2 billion calls, die.
Assert_true(context->nextConnectionNumber < (UINT32_MAX >> 1));
return conn;
}
static void deleteConnection(struct IpTunnel_Connection* conn, struct IpTunnel_pvt* context)
{
// Delete connection and shift the list elements following the removed connection
int i = (((char *)conn)-((char *)&context->pub.connectionList.connections[0]))
/ sizeof(struct IpTunnel_Connection);
// Sanity check
Assert_true(i >= 0 && i < (signed int)context->pub.connectionList.count);
for (; (unsigned int)i < context->pub.connectionList.count-1; ++i) {
Bits_memcpy(&context->pub.connectionList.connections[i],
&context->pub.connectionList.connections[i + 1],
sizeof(struct IpTunnel_Connection));
}
int last = context->pub.connectionList.count-1;
if (last > 0) {
Bits_memset(&context->pub.connectionList.connections[last], 0,
sizeof(struct IpTunnel_Connection));
}
context->pub.connectionList.count--;
}
static struct IpTunnel_Connection* connectionByPubKey(uint8_t pubKey[32],
struct IpTunnel_pvt* context)
{
for (int i = 0; i < (int)context->pub.connectionList.count; i++) {
struct IpTunnel_Connection* conn = &context->pub.connectionList.connections[i];
if (!Bits_memcmp(pubKey, conn->routeHeader.publicKey, 32)) {
return conn;
}
}
return NULL;
}
/**
* Allow another node to tunnel IPv4 and/or ICANN IPv6 through this node.
*
* @param publicKeyOfAuthorizedNode the key for the node which will be allowed to connect.
* @param ip6Addr the IPv6 address which the node will be issued or NULL.
* @param ip6Prefix the IPv6 netmask/prefix length.
* @param ip4Addr the IPv4 address which the node will be issued or NULL.
* @param ip4Prefix the IPv4 netmask/prefix length.
* @param tunnel the IpTunnel.
* @return an connection number which is usable with IpTunnel_remove().
*/
int IpTunnel_allowConnection(uint8_t publicKeyOfAuthorizedNode[32],
struct Sockaddr* ip6Addr,
uint8_t ip6Prefix,
uint8_t ip6Alloc,
struct Sockaddr* ip4Addr,
uint8_t ip4Prefix,
uint8_t ip4Alloc,
struct IpTunnel* tunnel)
{
struct IpTunnel_pvt* context = Identity_check((struct IpTunnel_pvt*)tunnel);
Log_debug(context->logger, "IPv4 Prefix to allow: %d", ip4Prefix);
uint8_t* ip6Address = NULL;
uint8_t* ip4Address = NULL;
if (ip6Addr) {
Sockaddr_getAddress(ip6Addr, &ip6Address);
}
if (ip4Addr) {
Sockaddr_getAddress(ip4Addr, &ip4Address);
}
struct IpTunnel_Connection* conn = newConnection(false, context);
Bits_memcpy(conn->routeHeader.publicKey, publicKeyOfAuthorizedNode, 32);
AddressCalc_addressForPublicKey(conn->routeHeader.ip6, publicKeyOfAuthorizedNode);
if (ip4Address) {
Bits_memcpy(conn->connectionIp4, ip4Address, 4);
conn->connectionIp4Prefix = ip4Prefix;
conn->connectionIp4Alloc = ip4Alloc;
Assert_true(ip4Alloc);
}
if (ip6Address) {
Bits_memcpy(conn->connectionIp6, ip6Address, 16);
conn->connectionIp6Prefix = ip6Prefix;
conn->connectionIp6Alloc = ip6Alloc;
Assert_true(ip6Alloc);
}
return conn->number;
}
static Iface_DEFUN sendToNode(struct Message* message,
struct IpTunnel_Connection* connection,
struct IpTunnel_pvt* context)
{
Er_assert(Message_epush(message, NULL, DataHeader_SIZE));
struct DataHeader* dh = (struct DataHeader*) message->bytes;
DataHeader_setContentType(dh, ContentType_IPTUN);
DataHeader_setVersion(dh, DataHeader_CURRENT_VERSION);
Er_assert(Message_epush(message, &connection->routeHeader, RouteHeader_SIZE));
return Iface_next(&context->pub.nodeInterface, message);
}
static void sendControlMessage(Dict* dict,
struct IpTunnel_Connection* connection,
struct Allocator* requestAlloc,
struct IpTunnel_pvt* context)
{
struct Message* msg = Message_new(0, 1024, requestAlloc);
Er_assert(BencMessageWriter_write(dict, msg));
int length = msg->length;
// do UDP header.
Er_assert(Message_eshift(msg, Headers_UDPHeader_SIZE));
struct Headers_UDPHeader* uh = (struct Headers_UDPHeader*) msg->bytes;
uh->srcPort_be = 0;
uh->destPort_be = 0;
uh->length_be = Endian_hostToBigEndian16(length);
uh->checksum_be = 0;
uint16_t payloadLength = msg->length;
Er_assert(Message_eshift(msg, Headers_IP6Header_SIZE));
struct Headers_IP6Header* header = (struct Headers_IP6Header*) msg->bytes;
header->versionClassAndFlowLabel = 0;
header->flowLabelLow_be = 0;
header->nextHeader = 17;
header->hopLimit = 0;
header->payloadLength_be = Endian_hostToBigEndian16(payloadLength);
Headers_setIpVersion(header);
// zero the source and dest addresses.
Bits_memset(header->sourceAddr, 0, 32);
uh->checksum_be = Checksum_udpIp6(header->sourceAddr,
(uint8_t*) uh,
msg->length - Headers_IP6Header_SIZE);
Iface_CALL(sendToNode, msg, connection, context);
}
static void requestAddresses(struct IpTunnel_Connection* conn, struct IpTunnel_pvt* context)
{
if (Defined(Log_DEBUG)) {
uint8_t addr[40];
AddrTools_printIp(addr, conn->routeHeader.ip6);
Log_debug(context->logger, "Requesting addresses from [%s] for connection [%d]",
addr, conn->number);
}
int number = conn->number;
Dict d = Dict_CONST(
String_CONST("q"), String_OBJ(String_CONST("IpTunnel_getAddresses")), Dict_CONST(
String_CONST("txid"), String_OBJ((&(String){ .len = 4, .bytes = (char*)&number })),
NULL
));
struct Allocator* msgAlloc = Allocator_child(context->allocator);
sendControlMessage(&d, conn, msgAlloc, context);
Allocator_free(msgAlloc);
}
/**
* Connect to another node and get IPv4 and/or IPv6 addresses from it.
*
* @param publicKeyOfNodeToConnectTo the key for the node to connect to.
* @param tunnel the IpTunnel.
* @return an connection number which is usable with IpTunnel_remove().
*/
int IpTunnel_connectTo(uint8_t publicKeyOfNodeToConnectTo[32], struct IpTunnel* tunnel)
{
struct IpTunnel_pvt* context = Identity_check((struct IpTunnel_pvt*)tunnel);
struct IpTunnel_Connection* conn = newConnection(true, context);
Bits_memcpy(conn->routeHeader.publicKey, publicKeyOfNodeToConnectTo, 32);
AddressCalc_addressForPublicKey(conn->routeHeader.ip6, publicKeyOfNodeToConnectTo);
if (Defined(Log_DEBUG)) {
uint8_t addr[40];
AddrTools_printIp(addr, conn->routeHeader.ip6);
Log_debug(context->logger, "Trying to connect to [%s]", addr);
}
requestAddresses(conn, context);
return conn->number;
}
/**
* Disconnect from a node or remove authorization to connect.
*
* @param connection the connection to remove.
* @param tunnel the IpTunnel.
*/
int IpTunnel_removeConnection(int connectionNumber, struct IpTunnel* tunnel)
{
struct IpTunnel_pvt* context = Identity_check((struct IpTunnel_pvt*)tunnel);
for (int i = 0; i < (int)tunnel->connectionList.count; ++i)
{
if (tunnel->connectionList.connections[i].number==connectionNumber)
{
deleteConnection(&tunnel->connectionList.connections[i], context);
return 0;
}
}
return IpTunnel_removeConnection_NOT_FOUND;
}
static bool isControlMessageInvalid(struct Message* message, struct IpTunnel_pvt* context)
{
struct Headers_IP6Header* header = (struct Headers_IP6Header*) message->bytes;
uint16_t length = Endian_bigEndianToHost16(header->payloadLength_be);
if (header->nextHeader != 17 || message->length < length + Headers_IP6Header_SIZE) {
Log_warn(context->logger, "Invalid IPv6 packet (not UDP or length field too big)");
return true;
}
Er_assert(Message_eshift(message, -Headers_IP6Header_SIZE));
struct Headers_UDPHeader* udp = (struct Headers_UDPHeader*) message->bytes;
if (Checksum_udpIp6(header->sourceAddr, message->bytes, length)) {
Log_warn(context->logger, "Checksum mismatch");
return true;
}
length -= Headers_UDPHeader_SIZE;
if (Endian_bigEndianToHost16(udp->length_be) != length
|| udp->srcPort_be != 0
|| udp->destPort_be != 0)
{
Log_warn(context->logger, "Invalid UDP packet (length mismatch or wrong ports)");
return true;
}
Er_assert(Message_eshift(message, -Headers_UDPHeader_SIZE));
message->length = length;
return false;
}
static Iface_DEFUN requestForAddresses(Dict* request,
struct IpTunnel_Connection* conn,
struct Allocator* requestAlloc,
struct IpTunnel_pvt* context)
{
if (Defined(Log_DEBUG)) {
uint8_t addr[40];
AddrTools_printIp(addr, conn->routeHeader.ip6);
Log_debug(context->logger, "Got request for addresses from [%s]", addr);
}
if (conn->isOutgoing) {
Log_warn(context->logger, "got request for addresses from outgoing connection");
return 0;
}
Dict* addresses = Dict_new(requestAlloc);
bool noAddresses = true;
if (!Bits_isZero(conn->connectionIp6, 16)) {
Dict_putStringC(addresses,
"ip6",
String_newBinary((char*)conn->connectionIp6, 16, requestAlloc),
requestAlloc);
Dict_putIntC(addresses,
"ip6Prefix", (int64_t)conn->connectionIp6Prefix,
requestAlloc);
Dict_putIntC(addresses,
"ip6Alloc", (int64_t)conn->connectionIp6Alloc,
requestAlloc);
noAddresses = false;
}
if (!Bits_isZero(conn->connectionIp4, 4)) {
Dict_putStringC(addresses,
"ip4",
String_newBinary((char*)conn->connectionIp4, 4, requestAlloc),
requestAlloc);
Dict_putIntC(addresses,
"ip4Prefix", (int64_t)conn->connectionIp4Prefix,
requestAlloc);
Dict_putIntC(addresses,
"ip4Alloc", (int64_t)conn->connectionIp4Alloc,
requestAlloc);
noAddresses = false;
}
if (noAddresses) {
Log_warn(context->logger, "no addresses to provide");
return 0;
}
Dict* msg = Dict_new(requestAlloc);
Dict_putDictC(msg, "addresses", addresses, requestAlloc);
String* txid = Dict_getStringC(request, "txid");
if (txid) {
Dict_putStringC(msg, "txid", txid, requestAlloc);
}
sendControlMessage(msg, conn, requestAlloc, context);
return 0;
}
static void addAddress(char* printedAddr, uint8_t prefixLen,
uint8_t allocSize, struct IpTunnel_pvt* ctx,
struct Allocator* tempAlloc)
{
String* tunName = GlobalConfig_getTunName(ctx->globalConf);
if (!tunName) {
Log_error(ctx->logger, "Failed to set IP address because TUN interface is not setup");
return;
}
struct Sockaddr_storage ss;
if (Sockaddr_parse(printedAddr, &ss)) {
Log_error(ctx->logger, "Invalid ip, setting ip address on TUN");
return;
}
ss.addr.flags |= Sockaddr_flags_PREFIX;
ss.addr.prefix = allocSize;
struct Er_Ret* er = NULL;
Er_check(&er, NetDev_addAddress(tunName->bytes, &ss.addr, ctx->logger, tempAlloc));
if (er) {
Log_error(ctx->logger, "Error setting ip address on TUN [%s]", er->message);
return;
}
ss.addr.prefix = prefixLen;
bool installRoute = false;
if (Sockaddr_getFamily(&ss.addr) == Sockaddr_AF_INET) {
installRoute = (prefixLen < 32);
} else if (Sockaddr_getFamily(&ss.addr) == Sockaddr_AF_INET6) {
installRoute = (prefixLen < 128);
} else {
Assert_failure("bad address family");
}
if (installRoute) {
RouteGen_addPrefix(ctx->rg, &ss.addr);
}
}
static Iface_DEFUN incomingAddresses(Dict* d,
struct IpTunnel_Connection* conn,
struct Allocator* alloc,
struct IpTunnel_pvt* context)
{
if (!conn->isOutgoing) {
Log_warn(context->logger, "got offer of addresses from incoming connection");
return 0;
}
String* txid = Dict_getStringC(d, "txid");
if (!txid || txid->len != 4) {
Log_info(context->logger, "missing or wrong length txid");
return 0;
}
int number;
Bits_memcpy(&number, txid->bytes, 4);
if (number < 0 || number >= (int)context->nextConnectionNumber) {
Log_info(context->logger, "txid out of range");
return 0;
}
if (number != conn->number) {
for (int i = 0; i < (int)context->pub.connectionList.count; i++) {
if (context->pub.connectionList.connections[i].number == number) {
if (Bits_memcmp(conn->routeHeader.publicKey,
context->pub.connectionList.connections[i].routeHeader.publicKey,
32))
{
Log_info(context->logger, "txid doesn't match origin");
return 0;
} else {
conn = &context->pub.connectionList.connections[i];
}
}
}
}
Dict* addresses = Dict_getDictC(d, "addresses");
String* ip4 = Dict_getStringC(addresses, "ip4");
int64_t* ip4Prefix = Dict_getIntC(addresses, "ip4Prefix");
int64_t* ip4Alloc = Dict_getIntC(addresses, "ip4Alloc");
if (ip4 && ip4->len == 4) {
Bits_memcpy(conn->connectionIp4, ip4->bytes, 4);
if (ip4Prefix && *ip4Prefix >= 0 && *ip4Prefix <= 32) {
conn->connectionIp4Prefix = (uint8_t) *ip4Prefix;
} else {
conn->connectionIp4Prefix = 32;
}
if (ip4Alloc && *ip4Alloc >= 0 && *ip4Alloc <= 32) {
conn->connectionIp4Alloc = (uint8_t) *ip4Alloc;
} else {
conn->connectionIp4Alloc = 32;
}
struct Sockaddr* sa = Sockaddr_clone(Sockaddr_LOOPBACK, alloc);
uint8_t* addrBytes = NULL;
Sockaddr_getAddress(sa, &addrBytes);
Bits_memcpy(addrBytes, ip4->bytes, 4);
char* printedAddr = Sockaddr_print(sa, alloc);
Log_info(context->logger, "Got issued address [%s/%d:%d] for connection [%d]",
printedAddr, conn->connectionIp4Alloc, conn->connectionIp4Prefix, conn->number);
addAddress(printedAddr,
conn->connectionIp4Prefix, conn->connectionIp4Alloc, context, alloc);
}
String* ip6 = Dict_getStringC(addresses, "ip6");
int64_t* ip6Prefix = Dict_getIntC(addresses, "ip6Prefix");
int64_t* ip6Alloc = Dict_getIntC(addresses, "ip6Alloc");
if (ip6 && ip6->len == 16) {
Bits_memcpy(conn->connectionIp6, ip6->bytes, 16);
if (ip6Prefix && *ip6Prefix >= 0 && *ip6Prefix <= 128) {
conn->connectionIp6Prefix = (uint8_t) *ip6Prefix;
} else {
conn->connectionIp6Prefix = 128;
}
if (ip6Alloc && *ip6Alloc >= 0 && *ip6Alloc <= 128) {
conn->connectionIp6Alloc = (uint8_t) *ip6Alloc;
} else {
conn->connectionIp6Alloc = 128;
}
struct Sockaddr* sa = Sockaddr_clone(Sockaddr_LOOPBACK6, alloc);
uint8_t* addrBytes = NULL;
Sockaddr_getAddress(sa, &addrBytes);
Bits_memcpy(addrBytes, ip6->bytes, 16);
char* printedAddr = Sockaddr_print(sa, alloc);
Log_info(context->logger, "Got issued address block [%s/%d:%d] for connection [%d]",
printedAddr, conn->connectionIp6Alloc, conn->connectionIp6Prefix, conn->number);
addAddress(printedAddr,
conn->connectionIp6Prefix, conn->connectionIp6Alloc, context, alloc);
}
if (context->rg->hasUncommittedChanges) {
String* tunName = GlobalConfig_getTunName(context->globalConf);
if (!tunName) {
Log_error(context->logger, "Failed to set routes because TUN interface is not setup");
return 0;
}
struct Er_Ret* er = NULL;
Er_check(&er, RouteGen_commit(context->rg, tunName->bytes, alloc));
if (er) {
Log_error(context->logger, "Error setting routes for TUN [%s]", er->message);
return 0;
}
}
return 0;
}
static Iface_DEFUN incomingControlMessage(struct Message* message,
struct IpTunnel_Connection* conn,
struct IpTunnel_pvt* context)
{
if (Defined(Log_DEBUG)) {
uint8_t addr[40];
AddrTools_printIp(addr, conn->routeHeader.ip6);
Log_debug(context->logger, "Got incoming message from [%s]", addr);
}
// This aligns the message on the content.
if (isControlMessageInvalid(message, context)) {
return 0;
}
Log_debug(context->logger, "Message content [%s]",
Escape_getEscaped(message->bytes, message->length, message->alloc));
struct Allocator* alloc = Allocator_child(message->alloc);
Dict* d = NULL;
const char* err = BencMessageReader_readNoExcept(message, alloc, &d);
if (err) {
Log_info(context->logger, "Failed to parse message [%s]", err);
return 0;
}
if (Dict_getDictC(d, "addresses")) {
return incomingAddresses(d, conn, alloc, context);
}
if (String_equals(String_CONST("IpTunnel_getAddresses"),
Dict_getStringC(d, "q")))
{
return requestForAddresses(d, conn, alloc, context);
}
Log_warn(context->logger, "Message which is unhandled");
return 0;
}
#define GET64(buffer) \
(__extension__ ({ \
Assert_true(!((long)(buffer) % 4)); \
uint64_t x = (uint64_t) (((uint32_t*)(buffer))[0]); \
x |= (( (uint64_t) ((uint32_t*)(buffer))[1]) << 32); \
Endian_bigEndianToHost64(x); \
}))
#define GET32(buffer) \
(__extension__ ({ \
Assert_true(!((long)(buffer) % 4)); \
uint32_t x = (((uint32_t*)(buffer))[0]); \
Endian_bigEndianToHost32(x); \
}))
static bool prefixMatches6(uint8_t* addressA, uint8_t* refAddr, uint8_t prefixLen)
{
if (!prefixLen) {
Assert_true(Bits_isZero(refAddr, 16));
return false;
}
Assert_true(prefixLen && prefixLen <= 128);
uint64_t a0 = GET64(addressA);
uint64_t b0 = GET64(refAddr);
if (prefixLen <= 64) {
return !( (a0 ^ b0) >> (64 - prefixLen) );
}
uint64_t a1 = GET64(addressA + 8);
uint64_t b1 = GET64(refAddr + 8);
return !( (a0 ^ b0) | ((a1 ^ b1) >> (128 - prefixLen)) );
}
static bool prefixMatches4(uint8_t* addressA, uint8_t* refAddr, uint32_t prefixLen)
{
if (!prefixLen) {
Assert_true(Bits_isZero(refAddr, 4));
return false;
}
Assert_true(prefixLen && prefixLen <= 32);
uint32_t a = GET32(addressA);
uint32_t b = GET32(refAddr);
return !((a ^ b) >> (32 - prefixLen));
}
static bool isValidAddress4(uint8_t sourceAndDestIp4[8],
bool isFromTun,
struct IpTunnel_Connection* conn)
{
uint8_t* compareAddr = (isFromTun)
? ((conn->isOutgoing) ? sourceAndDestIp4 : &sourceAndDestIp4[4])
: ((conn->isOutgoing) ? &sourceAndDestIp4[4] : sourceAndDestIp4);
return prefixMatches4(compareAddr, conn->connectionIp4, conn->connectionIp4Alloc);
}
static bool isValidAddress6(uint8_t sourceAndDestIp6[32],
bool isFromTun,
struct IpTunnel_Connection* conn)
{
if (AddressCalc_validAddress(sourceAndDestIp6)
|| AddressCalc_validAddress(&sourceAndDestIp6[16])) {
return false;
}
uint8_t* compareAddr = (isFromTun)
? ((conn->isOutgoing) ? sourceAndDestIp6 : &sourceAndDestIp6[16])
: ((conn->isOutgoing) ? &sourceAndDestIp6[16] : sourceAndDestIp6);
return prefixMatches6(compareAddr, conn->connectionIp6, conn->connectionIp6Alloc);
}
static struct IpTunnel_Connection* findConnection(uint8_t sourceAndDestIp6[32],
uint8_t sourceAndDestIp4[8],
bool isFromTun,
struct IpTunnel_pvt* context)
{
for (int i = 0; i < (int)context->pub.connectionList.count; i++) {
struct IpTunnel_Connection* conn = &context->pub.connectionList.connections[i];
if (sourceAndDestIp6 && isValidAddress6(sourceAndDestIp6, isFromTun, conn)) {
return conn;
}
if (sourceAndDestIp4 && isValidAddress4(sourceAndDestIp4, isFromTun, conn)) {
return conn;
}
}
return NULL;
}
static Iface_DEFUN incomingFromTun(struct Message* message, struct Iface* tunIf)
{
struct IpTunnel_pvt* context = Identity_check((struct IpTunnel_pvt*)tunIf);
if (message->length < 20) {
Log_debug(context->logger, "DROP runt");
}
struct IpTunnel_Connection* conn = NULL;
if (!context->pub.connectionList.connections) {
// No connections authorized, fall through to "unrecognized address"
} else if (message->length > 40 && Headers_getIpVersion(message->bytes) == 6) {
struct Headers_IP6Header* header = (struct Headers_IP6Header*) message->bytes;
conn = findConnection(header->sourceAddr, NULL, true, context);
} else if (message->length > 20 && Headers_getIpVersion(message->bytes) == 4) {
struct Headers_IP4Header* header = (struct Headers_IP4Header*) message->bytes;
conn = findConnection(NULL, header->sourceAddr, true, context);
} else {
Log_debug(context->logger, "Message of unknown type from TUN");
return 0;
}
if (!conn) {
Log_debug(context->logger, "Message with unrecognized address from TUN");
return 0;
}
return sendToNode(message, conn, context);
}
static Iface_DEFUN ip6FromNode(struct Message* message,
struct IpTunnel_Connection* conn,
struct IpTunnel_pvt* context)
{
struct Headers_IP6Header* header = (struct Headers_IP6Header*) message->bytes;
if (Bits_isZero(header->sourceAddr, 16) || Bits_isZero(header->destinationAddr, 16)) {
if (Bits_isZero(header->sourceAddr, 32)) {
return incomingControlMessage(message, conn, context);
}
Log_debug(context->logger, "Got message with zero address");
return 0;
}
if (!isValidAddress6(header->sourceAddr, false, conn)) {
uint8_t addr[40];
AddrTools_printIp(addr, header->sourceAddr);
Log_debug(context->logger, "Got message with wrong address for connection [%s]", addr);
return 0;
}
Er_assert(TUNMessageType_push(message, Ethernet_TYPE_IP6));
return Iface_next(&context->pub.tunInterface, message);
}
static Iface_DEFUN ip4FromNode(struct Message* message,
struct IpTunnel_Connection* conn,
struct IpTunnel_pvt* context)
{
struct Headers_IP4Header* header = (struct Headers_IP4Header*) message->bytes;
if (Bits_isZero(header->sourceAddr, 4) || Bits_isZero(header->destAddr, 4)) {
Log_debug(context->logger, "Got message with zero address");
return 0;
} else if (!isValidAddress4(header->sourceAddr, false, conn)) {
Log_debug(context->logger, "Got message with wrong address [%d.%d.%d.%d] for connection "
"[%d.%d.%d.%d/%d:%d]",
header->sourceAddr[0], header->sourceAddr[1],
header->sourceAddr[2], header->sourceAddr[3],
conn->connectionIp4[0], conn->connectionIp4[1],
conn->connectionIp4[2], conn->connectionIp4[3],
conn->connectionIp4Alloc, conn->connectionIp4Prefix);
return 0;
}
Er_assert(TUNMessageType_push(message, Ethernet_TYPE_IP4));
return Iface_next(&context->pub.tunInterface, message);
}
static Iface_DEFUN incomingFromNode(struct Message* message, struct Iface* nodeIf)
{
struct IpTunnel_pvt* context =
Identity_containerOf(nodeIf, struct IpTunnel_pvt, pub.nodeInterface);
//Log_debug(context->logger, "Got incoming message");
Assert_true(message->length >= RouteHeader_SIZE + DataHeader_SIZE);
struct RouteHeader* rh = (struct RouteHeader*) message->bytes;
struct DataHeader* dh = (struct DataHeader*) &rh[1];
Assert_true(DataHeader_getContentType(dh) == ContentType_IPTUN);
struct IpTunnel_Connection* conn = connectionByPubKey(rh->publicKey, context);
if (!conn) {
if (Defined(Log_DEBUG)) {
uint8_t addr[40];
AddrTools_printIp(addr, rh->ip6);
Log_debug(context->logger, "Got message from unrecognized node [%s]", addr);
}
return 0;
}
Er_assert(Message_eshift(message, -(RouteHeader_SIZE + DataHeader_SIZE)));
if (message->length > 40 && Headers_getIpVersion(message->bytes) == 6) {
return ip6FromNode(message, conn, context);
}
if (message->length > 20 && Headers_getIpVersion(message->bytes) == 4) {
return ip4FromNode(message, conn, context);
}
if (Defined(Log_DEBUG)) {
uint8_t addr[40];
AddrTools_printIp(addr, rh->ip6);
Log_debug(context->logger,
"Got message of unknown type, length: [%d], IP version [%d] from [%s]",
message->length,
(message->length > 1) ? Headers_getIpVersion(message->bytes) : 0,
addr);
}
return 0;
}
static void timeout(void* vcontext)
{
struct IpTunnel_pvt* context = vcontext;
if (!context->pub.connectionList.count) {
return;
}
Log_debug(context->logger, "Checking for connections to poll. Total connections [%u]",
context->pub.connectionList.count);
uint32_t beginning = Random_uint32(context->rand) % context->pub.connectionList.count;
uint32_t i = beginning;
do {
Assert_true(i < context->pub.connectionList.count);
struct IpTunnel_Connection* conn = &context->pub.connectionList.connections[i];
if (conn->isOutgoing
&& Bits_isZero(conn->connectionIp6, 16)
&& Bits_isZero(conn->connectionIp4, 4))
{
requestAddresses(conn, context);
break;
}
i = (i + 1) % context->pub.connectionList.count;
} while (i != beginning);
}
struct IpTunnel* IpTunnel_new(struct Log* logger,
struct EventBase* eventBase,
struct Allocator* alloc,
struct Random* rand,
struct RouteGen* rg,
struct GlobalConfig* globalConf)
{
struct IpTunnel_pvt* context = Allocator_clone(alloc, (&(struct IpTunnel_pvt) {
.pub = {
.tunInterface = { .send = incomingFromTun },
.nodeInterface = { .send = incomingFromNode }
},
.allocator = alloc,
.logger = logger,
.rand = rand,
.rg = rg,
.globalConf = globalConf
}));
context->timeout = Timeout_setInterval(timeout, context, 10000, eventBase, alloc);
Identity_set(context);
return &context->pub;
}