2 net_socket.c -- Handle various kinds of sockets.
3 Copyright (C) 1998-2005 Ivo Timmermans,
4 2000-2009 Guus Sliepen <guus@tinc-vpn.org>
6 This program is free software; you can redistribute it and/or modify
7 it under the terms of the GNU General Public License as published by
8 the Free Software Foundation; either version 2 of the License, or
9 (at your option) any later version.
11 This program is distributed in the hope that it will be useful,
12 but WITHOUT ANY WARRANTY; without even the implied warranty of
13 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
14 GNU General Public License for more details.
16 You should have received a copy of the GNU General Public License
17 along with this program; if not, write to the Free Software
18 Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
25 #include "splay_tree.h"
27 #include "connection.h"
39 #define EINPROGRESS WSAEINPROGRESS
42 /* Needed on Mac OS/X */
44 #define SOL_TCP IPPROTO_TCP
47 int addressfamily = AF_UNSPEC;
49 int seconds_till_retry = 5;
51 listen_socket_t listen_socket[MAXSOCKETS];
53 list_t *outgoing_list = NULL;
57 static void configure_tcp(connection_t *c) {
61 int flags = fcntl(c->socket, F_GETFL);
63 if(fcntl(c->socket, F_SETFL, flags | O_NONBLOCK) < 0) {
64 logger(LOG_ERR, _("fcntl for %s: %s"), c->hostname, strerror(errno));
67 unsigned long arg = 1;
69 if(ioctlsocket(c->socket, FIONBIO, &arg) != 0) {
70 logger(LOG_ERR, _("ioctlsocket for %s: WSA error %d"), c->hostname, WSAGetLastError());
74 #if defined(SOL_TCP) && defined(TCP_NODELAY)
76 setsockopt(c->socket, SOL_TCP, TCP_NODELAY, &option, sizeof option);
79 #if defined(SOL_IP) && defined(IP_TOS) && defined(IPTOS_LOWDELAY)
80 option = IPTOS_LOWDELAY;
81 setsockopt(c->socket, SOL_IP, IP_TOS, &option, sizeof option);
85 static bool bind_to_interface(int sd) { /* {{{ */
88 #if defined(SOL_SOCKET) && defined(SO_BINDTODEVICE)
91 #endif /* defined(SOL_SOCKET) && defined(SO_BINDTODEVICE) */
93 if(!get_config_string (lookup_config (config_tree, "BindToInterface"), &iface))
96 #if defined(SOL_SOCKET) && defined(SO_BINDTODEVICE)
97 memset(&ifr, 0, sizeof(ifr));
98 strncpy(ifr.ifr_ifrn.ifrn_name, iface, IFNAMSIZ);
99 ifr.ifr_ifrn.ifrn_name[IFNAMSIZ - 1] = 0;
101 status = setsockopt(sd, SOL_SOCKET, SO_BINDTODEVICE, &ifr, sizeof(ifr));
103 logger(LOG_ERR, _("Can't bind to interface %s: %s"), iface,
107 #else /* if !defined(SOL_SOCKET) || !defined(SO_BINDTODEVICE) */
108 logger(LOG_WARNING, _("%s not supported on this platform"), "BindToInterface");
112 } /* }}} bool bind_to_interface */
114 static bool bind_to_address(connection_t *c) { /* {{{ */
116 struct addrinfo *ai_list;
117 struct addrinfo *ai_ptr;
118 struct addrinfo ai_hints;
122 assert(c->socket >= 0);
125 if(!get_config_string(lookup_config(config_tree, "BindToAddress"),
129 assert(node != NULL);
131 memset(&ai_hints, 0, sizeof(ai_hints));
132 ai_hints.ai_family = c->address.sa.sa_family;
133 /* We're called from `do_outgoing_connection' only. */
134 ai_hints.ai_socktype = SOCK_STREAM;
135 ai_hints.ai_protocol = IPPROTO_TCP;
139 status = getaddrinfo(node, /* service = */ NULL,
140 &ai_hints, &ai_list);
143 logger(LOG_WARNING, _("Error looking up %s port %s: %s"),
144 node, _("any"), gai_strerror(status));
147 assert(ai_list != NULL);
150 for(ai_ptr = ai_list; ai_ptr != NULL; ai_ptr = ai_ptr->ai_next) {
151 status = bind(c->socket,
152 ai_list->ai_addr, ai_list->ai_addrlen);
159 logger(LOG_ERR, _("Can't bind to %s/tcp: %s"), node,
161 } else ifdebug(CONNECTIONS) {
162 logger(LOG_DEBUG, "Successfully bound outgoing "
163 "TCP socket to %s", node);
167 freeaddrinfo(ai_list);
169 return status ? false : true;
170 } /* }}} bool bind_to_address */
172 int setup_listen_socket(const sockaddr_t *sa)
181 nfd = socket(sa->sa.sa_family, SOCK_STREAM, IPPROTO_TCP);
184 ifdebug(STATUS) logger(LOG_ERR, _("Creating metasocket failed: %s"), strerror(errno));
188 /* Optimize TCP settings */
191 setsockopt(nfd, SOL_SOCKET, SO_REUSEADDR, &option, sizeof option);
193 #if defined(SOL_IPV6) && defined(IPV6_V6ONLY)
194 if(sa->sa.sa_family == AF_INET6)
195 setsockopt(nfd, SOL_IPV6, IPV6_V6ONLY, &option, sizeof option);
199 (lookup_config(config_tree, "BindToInterface"), &iface)) {
200 #if defined(SOL_SOCKET) && defined(SO_BINDTODEVICE)
203 memset(&ifr, 0, sizeof ifr);
204 strncpy(ifr.ifr_ifrn.ifrn_name, iface, IFNAMSIZ);
206 if(setsockopt(nfd, SOL_SOCKET, SO_BINDTODEVICE, &ifr, sizeof ifr)) {
208 logger(LOG_ERR, _("Can't bind to interface %s: %s"), iface,
213 logger(LOG_WARNING, _("%s not supported on this platform"), "BindToInterface");
217 if(bind(nfd, &sa->sa, SALEN(sa->sa))) {
219 addrstr = sockaddr2hostname(sa);
220 logger(LOG_ERR, _("Can't bind to %s/tcp: %s"), addrstr,
228 logger(LOG_ERR, _("System call `%s' failed: %s"), "listen",
236 int setup_vpn_in_socket(const sockaddr_t *sa) {
243 nfd = socket(sa->sa.sa_family, SOCK_DGRAM, IPPROTO_UDP);
246 logger(LOG_ERR, _("Creating UDP socket failed: %s"), strerror(errno));
252 int flags = fcntl(nfd, F_GETFL);
254 if(fcntl(nfd, F_SETFL, flags | O_NONBLOCK) < 0) {
256 logger(LOG_ERR, _("System call `%s' failed: %s"), "fcntl",
263 unsigned long arg = 1;
264 if(ioctlsocket(nfd, FIONBIO, &arg) != 0) {
266 logger(LOG_ERR, _("Call to `%s' failed: WSA error %d"), "ioctlsocket",
274 setsockopt(nfd, SOL_SOCKET, SO_REUSEADDR, &option, sizeof option);
276 #if defined(SOL_IPV6) && defined(IPV6_V6ONLY)
277 if(sa->sa.sa_family == AF_INET6)
278 setsockopt(nfd, SOL_IPV6, IPV6_V6ONLY, &option, sizeof option);
281 #if defined(SOL_IP) && defined(IP_MTU_DISCOVER) && defined(IP_PMTUDISC_DO)
282 if(myself->options & OPTION_PMTU_DISCOVERY) {
283 option = IP_PMTUDISC_DO;
284 setsockopt(nfd, SOL_IP, IP_MTU_DISCOVER, &option, sizeof(option));
288 #if defined(SOL_IPV6) && defined(IPV6_MTU_DISCOVER) && defined(IPV6_PMTUDISC_DO)
289 if(myself->options & OPTION_PMTU_DISCOVERY) {
290 option = IPV6_PMTUDISC_DO;
291 setsockopt(nfd, SOL_IPV6, IPV6_MTU_DISCOVER, &option, sizeof(option));
295 if (!bind_to_interface(nfd)) {
300 if(bind(nfd, &sa->sa, SALEN(sa->sa))) {
302 addrstr = sockaddr2hostname(sa);
303 logger(LOG_ERR, _("Can't bind to %s/udp: %s"), addrstr,
310 } /* int setup_vpn_in_socket */
312 static void retry_outgoing_handler(int fd, short events, void *data) {
313 setup_outgoing_connection(data);
316 void retry_outgoing(outgoing_t *outgoing) {
319 outgoing->timeout += 5;
321 if(outgoing->timeout > maxtimeout)
322 outgoing->timeout = maxtimeout;
324 timeout_set(&outgoing->ev, retry_outgoing_handler, outgoing);
325 event_add(&outgoing->ev, &(struct timeval){outgoing->timeout, 0});
327 ifdebug(CONNECTIONS) logger(LOG_NOTICE,
328 _("Trying to re-establish outgoing connection in %d seconds"),
332 void finish_connecting(connection_t *c) {
335 ifdebug(CONNECTIONS) logger(LOG_INFO, _("Connected to %s (%s)"), c->name, c->hostname);
339 c->last_ping_time = time(NULL);
340 c->status.connecting = false;
345 void do_outgoing_connection(connection_t *c) {
346 char *address, *port;
352 if(!c->outgoing->ai) {
353 if(!c->outgoing->cfg) {
354 ifdebug(CONNECTIONS) logger(LOG_ERR, _("Could not set up a meta connection to %s"),
356 retry_outgoing(c->outgoing);
362 get_config_string(c->outgoing->cfg, &address);
364 if(!get_config_string(lookup_config(c->config_tree, "Port"), &port))
365 asprintf(&port, "655");
367 c->outgoing->ai = str2addrinfo(address, port, SOCK_STREAM);
371 c->outgoing->aip = c->outgoing->ai;
372 c->outgoing->cfg = lookup_config_next(c->config_tree, c->outgoing->cfg);
375 if(!c->outgoing->aip) {
377 freeaddrinfo(c->outgoing->ai);
378 c->outgoing->ai = NULL;
382 memcpy(&c->address, c->outgoing->aip->ai_addr, c->outgoing->aip->ai_addrlen);
383 c->outgoing->aip = c->outgoing->aip->ai_next;
388 c->hostname = sockaddr2hostname(&c->address);
390 ifdebug(CONNECTIONS) logger(LOG_INFO, _("Trying to connect to %s (%s)"), c->name,
393 c->socket = socket(c->address.sa.sa_family, SOCK_STREAM, IPPROTO_TCP);
395 if(c->socket == -1) {
396 ifdebug(CONNECTIONS) logger(LOG_ERR, _("Creating socket for %s failed: %s"), c->hostname,
402 #if defined(SOL_IPV6) && defined(IPV6_V6ONLY)
404 if(c->address.sa.sa_family == AF_INET6)
405 setsockopt(c->socket, SOL_IPV6, IPV6_V6ONLY, &option, sizeof option);
408 bind_to_interface(c->socket);
411 /* Optimize TCP settings */
417 result = connect(c->socket, &c->address.sa, SALEN(c->address.sa));
420 if(errno == EINPROGRESS
421 #if defined(WIN32) && !defined(O_NONBLOCK)
422 || WSAGetLastError() == WSAEWOULDBLOCK
425 c->status.connecting = true;
429 closesocket(c->socket);
431 ifdebug(CONNECTIONS) logger(LOG_ERR, _("%s: %s"), c->hostname, strerror(errno));
436 finish_connecting(c);
441 void handle_meta_read(struct bufferevent *event, void *data) {
442 logger(LOG_EMERG, _("handle_meta_read() called"));
446 void handle_meta_write(struct bufferevent *event, void *data) {
447 ifdebug(META) logger(LOG_DEBUG, _("handle_meta_write() called"));
450 void handle_meta_connection_error(struct bufferevent *event, short what, void *data) {
451 connection_t *c = data;
452 logger(LOG_EMERG, _("handle_meta_connection_error() called: %d: %s"), what, strerror(errno));
453 terminate_connection(c, c->status.active);
456 void setup_outgoing_connection(outgoing_t *outgoing) {
462 n = lookup_node(outgoing->name);
466 ifdebug(CONNECTIONS) logger(LOG_INFO, _("Already connected to %s"), outgoing->name);
468 n->connection->outgoing = outgoing;
472 c = new_connection();
473 c->name = xstrdup(outgoing->name);
474 c->outcipher = myself->connection->outcipher;
475 c->outdigest = myself->connection->outdigest;
476 c->outmaclength = myself->connection->outmaclength;
477 c->outcompression = myself->connection->outcompression;
479 init_configuration(&c->config_tree);
480 read_connection_config(c);
482 outgoing->cfg = lookup_config(c->config_tree, "Address");
485 logger(LOG_ERR, _("No address specified for %s"), c->name);
490 c->outgoing = outgoing;
491 c->last_ping_time = time(NULL);
495 do_outgoing_connection(c);
497 event_set(&c->inevent, c->socket, EV_READ | EV_PERSIST, handle_meta_connection_data, c);
498 event_add(&c->inevent, NULL);
499 c->buffer = bufferevent_new(c->socket, handle_meta_read, handle_meta_write, handle_meta_connection_error, c);
501 logger(LOG_EMERG, _("bufferevent_new() failed: %s"), strerror(errno));
504 bufferevent_disable(c->buffer, EV_READ);
508 accept a new tcp connect and create a
511 void handle_new_meta_connection(int sock, short events, void *data) {
515 socklen_t len = sizeof sa;
519 fd = accept(sock, &sa.sa, &len);
522 logger(LOG_ERR, _("Accepting a new connection failed: %s"), strerror(errno));
528 c = new_connection();
529 c->name = xstrdup("<unknown>");
530 c->outcipher = myself->connection->outcipher;
531 c->outdigest = myself->connection->outdigest;
532 c->outmaclength = myself->connection->outmaclength;
533 c->outcompression = myself->connection->outcompression;
536 c->hostname = sockaddr2hostname(&sa);
538 c->last_ping_time = time(NULL);
540 ifdebug(CONNECTIONS) logger(LOG_NOTICE, _("Connection from %s"), c->hostname);
542 event_set(&c->inevent, c->socket, EV_READ | EV_PERSIST, handle_meta_connection_data, c);
543 event_add(&c->inevent, NULL);
544 c->buffer = bufferevent_new(c->socket, NULL, handle_meta_write, handle_meta_connection_error, c);
546 logger(LOG_EMERG, _("bufferevent_new() failed: %s"), strerror(errno));
549 bufferevent_disable(c->buffer, EV_READ);
555 c->allow_request = ID;
559 void free_outgoing(outgoing_t *outgoing) {
561 freeaddrinfo(outgoing->ai);
564 free(outgoing->name);
569 void try_outgoing_connections(void)
571 static config_t *cfg = NULL;
573 outgoing_t *outgoing;
580 for(node = connection_tree->head; node; node = node->next) {
585 list_delete_list(outgoing_list);
588 outgoing_list = list_alloc((list_action_t)free_outgoing);
590 for(cfg = lookup_config(config_tree, "ConnectTo"); cfg; cfg = lookup_config_next(config_tree, cfg)) {
591 get_config_string(cfg, &name);
593 if(!check_id(name)) {
595 _("Invalid name for outgoing connection in %s line %d"),
596 cfg->file, cfg->line);
601 outgoing = xmalloc_and_zero(sizeof *outgoing);
602 outgoing->name = name;
603 list_insert_tail(outgoing_list, outgoing);
604 setup_outgoing_connection(outgoing);