mirror of
https://gitlab.com/openconnect/ocserv.git
synced 2026-02-10 00:37:00 +08:00
separated tun handling code from main worker code.
This commit is contained in:
@@ -14,7 +14,7 @@ CCAN_SOURCES = ccan/build_assert/build_assert.h ccan/check_type/check_type.h \
|
||||
|
||||
|
||||
ocserv_SOURCES = main.c main-auth.c worker-vpn.c worker-auth.c tlslib.c \
|
||||
http-parser/http_parser.c ipc.h cookies.c \
|
||||
http-parser/http_parser.c ipc.h cookies.c worker-tun.c \
|
||||
vpn.h cookies.h tlslib.h http-parser/http_parser.h log.c tun.c tun.h \
|
||||
config.c pam.c pam.h worker-resume.c worker.h main-resume.c main.h \
|
||||
main-user.c cookies-gdbm.c cookies-hash.c $(CCAN_SOURCES)
|
||||
|
||||
238
src/worker-tun.c
Normal file
238
src/worker-tun.c
Normal file
@@ -0,0 +1,238 @@
|
||||
/*
|
||||
* Copyright (C) 2012, 2013 David Woodhouse
|
||||
* Copyright (C) 2013 Nikos Mavrogiannopoulos
|
||||
*
|
||||
* This program is free software; you can redistribute it and/or modify
|
||||
* it under the terms of the GNU General Public License as published by
|
||||
* the Free Software Foundation; either version 2 of the License, or
|
||||
* (at your option) any later version.
|
||||
*
|
||||
* This program is distributed in the hope that it will be useful,
|
||||
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
||||
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
||||
* GNU General Public License for more details.
|
||||
*
|
||||
* You should have received a copy of the GNU General Public License
|
||||
* along with this program; if not, write to the Free Software
|
||||
* Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
|
||||
*/
|
||||
|
||||
#include <config.h>
|
||||
|
||||
#include <gnutls/gnutls.h>
|
||||
#include <gnutls/dtls.h>
|
||||
#include <gnutls/crypto.h>
|
||||
#include <errno.h>
|
||||
#include <stdlib.h>
|
||||
#include <stdarg.h>
|
||||
#include <stdio.h>
|
||||
#include <string.h>
|
||||
#include <sys/types.h>
|
||||
#include <sys/stat.h>
|
||||
#include <fcntl.h>
|
||||
#include <unistd.h>
|
||||
#include <limits.h>
|
||||
#include <net/if.h>
|
||||
#include <netinet/in.h>
|
||||
#include <sys/types.h>
|
||||
#include <sys/ioctl.h>
|
||||
#include <sys/socket.h>
|
||||
#include <arpa/inet.h>
|
||||
#include <signal.h>
|
||||
#include <time.h>
|
||||
|
||||
#include <vpn.h>
|
||||
#include <worker.h>
|
||||
#include <tlslib.h>
|
||||
|
||||
#include <http-parser/http_parser.h>
|
||||
|
||||
int set_tun_mtu(struct worker_st* ws, unsigned mtu)
|
||||
{
|
||||
int fd, ret, e;
|
||||
struct ifreq ifr;
|
||||
|
||||
oclog(ws, LOG_DEBUG, "setting tun MTU to %u", mtu);
|
||||
fd = socket(AF_INET, SOCK_STREAM, 0);
|
||||
if (fd == -1)
|
||||
return -1;
|
||||
|
||||
memset(&ifr, 0, sizeof(ifr));
|
||||
snprintf(ifr.ifr_name, IFNAMSIZ, "%s", ws->tun_name);
|
||||
ifr.ifr_mtu = mtu;
|
||||
|
||||
ret = ioctl(fd, SIOCSIFMTU, &ifr);
|
||||
if (ret != 0) {
|
||||
e = errno;
|
||||
oclog(ws, LOG_INFO, "ioctl SIOCSIFMTU error: %s", strerror(e));
|
||||
ret = -1;
|
||||
goto fail;
|
||||
}
|
||||
|
||||
ret = 0;
|
||||
fail:
|
||||
close(fd);
|
||||
return ret;
|
||||
}
|
||||
|
||||
/* if local is non zero it returns the local, otherwise the remote */
|
||||
static
|
||||
int get_ip(struct worker_st* ws, int fd, int family, unsigned int local,
|
||||
struct vpn_st* vinfo, char** buffer, size_t* buffer_size)
|
||||
{
|
||||
void* ptr;
|
||||
const void* p;
|
||||
struct ifreq ifr;
|
||||
unsigned int flags;
|
||||
int ret, e;
|
||||
|
||||
memset(&ifr, 0, sizeof(ifr));
|
||||
ifr.ifr_addr.sa_family = family;
|
||||
snprintf(ifr.ifr_name, IFNAMSIZ, "%s", vinfo->name);
|
||||
|
||||
if (local != 0)
|
||||
flags = SIOCGIFDSTADDR;
|
||||
else
|
||||
flags = SIOCGIFADDR;
|
||||
|
||||
ret = ioctl(fd, flags, &ifr);
|
||||
if (ret != 0) {
|
||||
e = errno;
|
||||
oclog(ws, LOG_DEBUG, "ioctl error: %s", strerror(e));
|
||||
goto fail;
|
||||
}
|
||||
|
||||
if (family == AF_INET) {
|
||||
ptr = SA_IN_P(&ifr.ifr_addr);
|
||||
} else if (family == AF_INET6) {
|
||||
ptr = SA_IN6_P(&ifr.ifr_addr);
|
||||
} else {
|
||||
oclog(ws, LOG_DEBUG, "Unknown family!");
|
||||
return -1;
|
||||
}
|
||||
|
||||
p = inet_ntop(family, ptr, *buffer, *buffer_size);
|
||||
if (p == NULL) {
|
||||
e = errno;
|
||||
oclog(ws, LOG_DEBUG, "inet_ntop error: %s", strerror(e));
|
||||
goto fail;
|
||||
}
|
||||
|
||||
ret = strlen(p) + 1;
|
||||
*buffer += ret;
|
||||
*buffer_size -= ret;
|
||||
|
||||
if (family == AF_INET) {
|
||||
if (strcmp(p, "0.0.0.0")==0)
|
||||
p = NULL;
|
||||
vinfo->ipv4 = p;
|
||||
} else {
|
||||
if (strcmp(p, "::")==0)
|
||||
p = NULL;
|
||||
vinfo->ipv6 = p;
|
||||
}
|
||||
|
||||
return 0;
|
||||
fail:
|
||||
return -1;
|
||||
}
|
||||
|
||||
/* Returns information based on an VPN network stored in worker_st but
|
||||
* using real time information for many fields. Nothing is allocated,
|
||||
* the provided buffer is used.
|
||||
*
|
||||
* Returns 0 on success.
|
||||
*/
|
||||
int get_rt_vpn_info(worker_st * ws,
|
||||
struct vpn_st* vinfo, char* buffer, size_t buffer_size)
|
||||
{
|
||||
int fd, ret;
|
||||
struct ifreq ifr;
|
||||
|
||||
memset(vinfo, 0, sizeof(*vinfo));
|
||||
vinfo->name = ws->tun_name;
|
||||
|
||||
fd = socket(AF_INET, SOCK_STREAM, 0);
|
||||
if (fd == -1)
|
||||
return -1;
|
||||
|
||||
/* get the remote IPs */
|
||||
ret = get_ip(ws, fd, AF_INET6, 0, vinfo, &buffer, &buffer_size);
|
||||
if (ret < 0)
|
||||
oclog(ws, LOG_DEBUG, "Cannot obtain IPv6 remote IP for %s\n", vinfo->name);
|
||||
|
||||
ret = get_ip(ws, fd, AF_INET, 0, vinfo, &buffer, &buffer_size);
|
||||
if (ret < 0)
|
||||
oclog(ws, LOG_DEBUG, "Cannot obtain IPv4 remote IP for %s\n", vinfo->name);
|
||||
|
||||
if (vinfo->ipv4 == NULL && vinfo->ipv6 == NULL) {
|
||||
ret = -1;
|
||||
goto fail;
|
||||
}
|
||||
|
||||
/* get the local IPs */
|
||||
ret = get_ip(ws, fd, AF_INET6, 1, vinfo, &buffer, &buffer_size);
|
||||
if (ret < 0)
|
||||
oclog(ws, LOG_DEBUG, "Cannot obtain IPv6 local IP for %s\n", vinfo->name);
|
||||
|
||||
ret = get_ip(ws, fd, AF_INET, 1, vinfo, &buffer, &buffer_size);
|
||||
if (ret < 0)
|
||||
oclog(ws, LOG_DEBUG, "Cannot obtain IPv4 local IP for %s\n", vinfo->name);
|
||||
|
||||
|
||||
if (vinfo->ipv4_dns && strcmp(vinfo->ipv4_dns, "local") == 0)
|
||||
vinfo->ipv4_dns = vinfo->ipv4_local;
|
||||
else
|
||||
vinfo->ipv4_dns = ws->config->network.ipv4_dns;
|
||||
|
||||
if (vinfo->ipv6_dns && strcmp(vinfo->ipv6_dns, "local") == 0)
|
||||
vinfo->ipv6_dns = vinfo->ipv6_local;
|
||||
else
|
||||
vinfo->ipv6_dns = ws->config->network.ipv6_dns;
|
||||
|
||||
vinfo->routes_size = ws->config->network.routes_size;
|
||||
if (ws->config->network.routes_size > 0)
|
||||
vinfo->routes = ws->config->network.routes;
|
||||
|
||||
vinfo->ipv4_netmask = ws->config->network.ipv4_netmask;
|
||||
vinfo->ipv6_netmask = ws->config->network.ipv6_netmask;
|
||||
|
||||
memset(&ifr, 0, sizeof(ifr));
|
||||
ifr.ifr_addr.sa_family = AF_INET;
|
||||
snprintf(ifr.ifr_name, IFNAMSIZ, "%s", vinfo->name);
|
||||
ret = ioctl(fd, SIOCGIFMTU, (caddr_t)&ifr);
|
||||
if (ret < 0) {
|
||||
oclog(ws, LOG_ERR, "Cannot obtain MTU for %s. Assuming 1500", vinfo->name);
|
||||
vinfo->mtu = 1500;
|
||||
} else {
|
||||
vinfo->mtu = ifr.ifr_mtu;
|
||||
}
|
||||
|
||||
ret = 0;
|
||||
fail:
|
||||
close(fd);
|
||||
return ret;
|
||||
}
|
||||
|
||||
ssize_t tun_write(int sockfd, const void *buf, size_t len)
|
||||
{
|
||||
int left = len;
|
||||
int ret;
|
||||
const uint8_t * p = buf;
|
||||
|
||||
while(left > 0) {
|
||||
ret = write(sockfd, p, left);
|
||||
if (ret == -1) {
|
||||
if (errno != EAGAIN && errno != EINTR)
|
||||
return ret;
|
||||
}
|
||||
|
||||
if (ret > 0) {
|
||||
left -= ret;
|
||||
p += ret;
|
||||
}
|
||||
}
|
||||
|
||||
return len;
|
||||
}
|
||||
|
||||
188
src/worker-vpn.c
188
src/worker-vpn.c
@@ -440,194 +440,6 @@ finish:
|
||||
tls_close(session);
|
||||
}
|
||||
|
||||
static int set_tun_mtu(struct worker_st* ws, unsigned mtu)
|
||||
{
|
||||
int fd, ret, e;
|
||||
struct ifreq ifr;
|
||||
|
||||
oclog(ws, LOG_DEBUG, "setting tun MTU to %u", mtu);
|
||||
fd = socket(AF_INET, SOCK_STREAM, 0);
|
||||
if (fd == -1)
|
||||
return -1;
|
||||
|
||||
memset(&ifr, 0, sizeof(ifr));
|
||||
snprintf(ifr.ifr_name, IFNAMSIZ, "%s", ws->tun_name);
|
||||
ifr.ifr_mtu = mtu;
|
||||
|
||||
ret = ioctl(fd, SIOCSIFMTU, &ifr);
|
||||
if (ret != 0) {
|
||||
e = errno;
|
||||
oclog(ws, LOG_INFO, "ioctl SIOCSIFMTU error: %s", strerror(e));
|
||||
ret = -1;
|
||||
goto fail;
|
||||
}
|
||||
|
||||
ret = 0;
|
||||
fail:
|
||||
close(fd);
|
||||
return ret;
|
||||
}
|
||||
|
||||
/* if local is non zero it returns the local, otherwise the remote */
|
||||
static int get_ip(struct worker_st* ws, int fd, int family, unsigned int local,
|
||||
struct vpn_st* vinfo, char** buffer, size_t* buffer_size)
|
||||
{
|
||||
void* ptr;
|
||||
const void* p;
|
||||
struct ifreq ifr;
|
||||
unsigned int flags;
|
||||
int ret, e;
|
||||
|
||||
memset(&ifr, 0, sizeof(ifr));
|
||||
ifr.ifr_addr.sa_family = family;
|
||||
snprintf(ifr.ifr_name, IFNAMSIZ, "%s", vinfo->name);
|
||||
|
||||
if (local != 0)
|
||||
flags = SIOCGIFDSTADDR;
|
||||
else
|
||||
flags = SIOCGIFADDR;
|
||||
|
||||
ret = ioctl(fd, flags, &ifr);
|
||||
if (ret != 0) {
|
||||
e = errno;
|
||||
oclog(ws, LOG_DEBUG, "ioctl error: %s", strerror(e));
|
||||
goto fail;
|
||||
}
|
||||
|
||||
if (family == AF_INET) {
|
||||
ptr = SA_IN_P(&ifr.ifr_addr);
|
||||
} else if (family == AF_INET6) {
|
||||
ptr = SA_IN6_P(&ifr.ifr_addr);
|
||||
} else {
|
||||
oclog(ws, LOG_DEBUG, "Unknown family!");
|
||||
return -1;
|
||||
}
|
||||
|
||||
p = inet_ntop(family, ptr, *buffer, *buffer_size);
|
||||
if (p == NULL) {
|
||||
e = errno;
|
||||
oclog(ws, LOG_DEBUG, "inet_ntop error: %s", strerror(e));
|
||||
goto fail;
|
||||
}
|
||||
|
||||
ret = strlen(p) + 1;
|
||||
*buffer += ret;
|
||||
*buffer_size -= ret;
|
||||
|
||||
if (family == AF_INET) {
|
||||
if (strcmp(p, "0.0.0.0")==0)
|
||||
p = NULL;
|
||||
vinfo->ipv4 = p;
|
||||
} else {
|
||||
if (strcmp(p, "::")==0)
|
||||
p = NULL;
|
||||
vinfo->ipv6 = p;
|
||||
}
|
||||
|
||||
return 0;
|
||||
fail:
|
||||
return -1;
|
||||
}
|
||||
|
||||
/* Returns information based on an VPN network stored in worker_st but
|
||||
* using real time information for many fields. Nothing is allocated,
|
||||
* the provided buffer is used.
|
||||
*
|
||||
* Returns 0 on success.
|
||||
*/
|
||||
static int get_rt_vpn_info(worker_st * ws,
|
||||
struct vpn_st* vinfo, char* buffer, size_t buffer_size)
|
||||
{
|
||||
int fd, ret;
|
||||
struct ifreq ifr;
|
||||
|
||||
memset(vinfo, 0, sizeof(*vinfo));
|
||||
vinfo->name = ws->tun_name;
|
||||
|
||||
fd = socket(AF_INET, SOCK_STREAM, 0);
|
||||
if (fd == -1)
|
||||
return -1;
|
||||
|
||||
/* get the remote IPs */
|
||||
ret = get_ip(ws, fd, AF_INET6, 0, vinfo, &buffer, &buffer_size);
|
||||
if (ret < 0)
|
||||
oclog(ws, LOG_DEBUG, "Cannot obtain IPv6 remote IP for %s\n", vinfo->name);
|
||||
|
||||
ret = get_ip(ws, fd, AF_INET, 0, vinfo, &buffer, &buffer_size);
|
||||
if (ret < 0)
|
||||
oclog(ws, LOG_DEBUG, "Cannot obtain IPv4 remote IP for %s\n", vinfo->name);
|
||||
|
||||
if (vinfo->ipv4 == NULL && vinfo->ipv6 == NULL) {
|
||||
ret = -1;
|
||||
goto fail;
|
||||
}
|
||||
|
||||
/* get the local IPs */
|
||||
ret = get_ip(ws, fd, AF_INET6, 1, vinfo, &buffer, &buffer_size);
|
||||
if (ret < 0)
|
||||
oclog(ws, LOG_DEBUG, "Cannot obtain IPv6 local IP for %s\n", vinfo->name);
|
||||
|
||||
ret = get_ip(ws, fd, AF_INET, 1, vinfo, &buffer, &buffer_size);
|
||||
if (ret < 0)
|
||||
oclog(ws, LOG_DEBUG, "Cannot obtain IPv4 local IP for %s\n", vinfo->name);
|
||||
|
||||
|
||||
if (vinfo->ipv4_dns && strcmp(vinfo->ipv4_dns, "local") == 0)
|
||||
vinfo->ipv4_dns = vinfo->ipv4_local;
|
||||
else
|
||||
vinfo->ipv4_dns = ws->config->network.ipv4_dns;
|
||||
|
||||
if (vinfo->ipv6_dns && strcmp(vinfo->ipv6_dns, "local") == 0)
|
||||
vinfo->ipv6_dns = vinfo->ipv6_local;
|
||||
else
|
||||
vinfo->ipv6_dns = ws->config->network.ipv6_dns;
|
||||
|
||||
vinfo->routes_size = ws->config->network.routes_size;
|
||||
if (ws->config->network.routes_size > 0)
|
||||
vinfo->routes = ws->config->network.routes;
|
||||
|
||||
vinfo->ipv4_netmask = ws->config->network.ipv4_netmask;
|
||||
vinfo->ipv6_netmask = ws->config->network.ipv6_netmask;
|
||||
|
||||
memset(&ifr, 0, sizeof(ifr));
|
||||
ifr.ifr_addr.sa_family = AF_INET;
|
||||
snprintf(ifr.ifr_name, IFNAMSIZ, "%s", vinfo->name);
|
||||
ret = ioctl(fd, SIOCGIFMTU, (caddr_t)&ifr);
|
||||
if (ret < 0) {
|
||||
oclog(ws, LOG_ERR, "Cannot obtain MTU for %s. Assuming 1500", vinfo->name);
|
||||
vinfo->mtu = 1500;
|
||||
} else {
|
||||
vinfo->mtu = ifr.ifr_mtu;
|
||||
}
|
||||
|
||||
ret = 0;
|
||||
fail:
|
||||
close(fd);
|
||||
return ret;
|
||||
}
|
||||
|
||||
static ssize_t tun_write(int sockfd, const void *buf, size_t len)
|
||||
{
|
||||
int left = len;
|
||||
int ret;
|
||||
const uint8_t * p = buf;
|
||||
|
||||
while(left > 0) {
|
||||
ret = write(sockfd, p, left);
|
||||
if (ret == -1) {
|
||||
if (errno != EAGAIN && errno != EINTR)
|
||||
return ret;
|
||||
}
|
||||
|
||||
if (ret > 0) {
|
||||
left -= ret;
|
||||
p += ret;
|
||||
}
|
||||
}
|
||||
|
||||
return len;
|
||||
}
|
||||
|
||||
/* sets the provided value of mtu as bad,
|
||||
* and returns an estimation of good.
|
||||
*
|
||||
|
||||
@@ -89,4 +89,9 @@ struct req_data_st {
|
||||
void __attribute__ ((format(printf, 3, 4)))
|
||||
oclog(const worker_st * server, int priority, const char *fmt, ...);
|
||||
|
||||
int set_tun_mtu(struct worker_st* ws, unsigned mtu);
|
||||
int get_rt_vpn_info(worker_st * ws,
|
||||
struct vpn_st* vinfo, char* buffer, size_t buffer_size);
|
||||
ssize_t tun_write(int sockfd, const void *buf, size_t len);
|
||||
|
||||
#endif
|
||||
|
||||
Reference in New Issue
Block a user