2 protocol_misc.c -- handle the meta-protocol, miscellaneous functions
3 Copyright (C) 1999-2005 Ivo Timmermans,
4 2000-2013 Guus Sliepen <guus@tinc-vpn.org>
6 This program is free software; you can redistribute it and/or modify
7 it under the terms of the GNU General Public License as published by
8 the Free Software Foundation; either version 2 of the License, or
9 (at your option) any later version.
11 This program is distributed in the hope that it will be useful,
12 but WITHOUT ANY WARRANTY; without even the implied warranty of
13 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
14 GNU General Public License for more details.
16 You should have received a copy of the GNU General Public License along
17 with this program; if not, write to the Free Software Foundation, Inc.,
18 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA.
23 #include "address_cache.h"
24 #include "connection.h"
33 #define MIN(x, y) (((x)<(y))?(x):(y))
36 int maxoutbufsize = 0;
37 int mtu_info_interval = 5;
38 int udp_info_interval = 5;
40 bool send_termreq(connection_t *c) {
41 return send_request(c, "%d", TERMREQ);
44 bool termreq_h(connection_t *c, const char *request) {
50 bool send_ping(connection_t *c) {
51 c->status.pinged = true;
52 c->last_ping_time = now.tv_sec;
54 return send_request(c, "%d", PING);
57 bool ping_h(connection_t *c, const char *request) {
62 bool send_pong(connection_t *c) {
63 return send_request(c, "%d", PONG);
66 bool pong_h(connection_t *c, const char *request) {
68 c->status.pinged = false;
70 /* Successful connection, reset timeout if this is an outgoing connection. */
72 if(c->outgoing && c->outgoing->timeout) {
73 c->outgoing->timeout = 0;
74 reset_address_cache(c->outgoing->node->address_cache, &c->address);
80 /* Sending and receiving packets via TCP */
82 bool send_tcppacket(connection_t *c, const vpn_packet_t *packet) {
83 /* If there already is a lot of data in the outbuf buffer, discard this packet.
84 We use a very simple Random Early Drop algorithm. */
86 if(2.0 * c->outbuf.len / (float)maxoutbufsize - 1 > (float)rand() / (float)RAND_MAX) {
90 if(!send_request(c, "%d %d", PACKET, packet->len)) {
94 return send_meta(c, DATA(packet), packet->len);
97 bool tcppacket_h(connection_t *c, const char *request) {
100 if(sscanf(request, "%*d %hd", &len) != 1) {
101 logger(DEBUG_ALWAYS, LOG_ERR, "Got bad %s from %s (%s)", "PACKET", c->name,
106 /* Set reqlen to len, this will tell receive_meta() that a tcppacket is coming. */
113 bool send_sptps_tcppacket(connection_t *c, const void *packet, size_t len) {
114 /* If there already is a lot of data in the outbuf buffer, discard this packet.
115 We use a very simple Random Early Drop algorithm. */
117 if(2.0 * c->outbuf.len / (float)maxoutbufsize - 1 > (float)rand() / (float)RAND_MAX) {
121 if(!send_request(c, "%d %zu", SPTPS_PACKET, len)) {
125 send_meta_raw(c, packet, len);
129 bool sptps_tcppacket_h(connection_t *c, const char *request) {
132 if(sscanf(request, "%*d %hd", &len) != 1) {
133 logger(DEBUG_ALWAYS, LOG_ERR, "Got bad %s from %s (%s)", "SPTPS_PACKET", c->name,
138 /* Set sptpslen to len, this will tell receive_meta() that a SPTPS packet is coming. */
145 /* Transmitting UDP information */
147 bool send_udp_info(node_t *from, node_t *to) {
148 /* If there's a static relay in the path, there's no point in sending the message
149 farther than the static relay. */
150 to = (to->via == myself) ? to->nexthop : to->via;
153 logger(DEBUG_ALWAYS, LOG_ERR, "Something went wrong when selecting relay - possible fake UDP_INFO");
157 /* Skip cases where sending UDP info messages doesn't make sense.
158 This is done here in order to avoid repeating the same logic in multiple callsites. */
164 if(!to->status.reachable) {
173 struct timeval elapsed;
175 timersub(&now, &to->udp_info_sent, &elapsed);
177 if(elapsed.tv_sec < udp_info_interval) {
182 if((myself->options | from->options | to->options) & OPTION_TCPONLY) {
186 if((to->nexthop->options >> 24) < 5) {
190 char *from_address, *from_port;
191 /* If we're the originator, the address we use is irrelevant
192 because the first intermediate node will ignore it.
193 We use our local address as it somewhat makes sense
194 and it's simpler than introducing an encoding for "null" addresses anyway. */
195 sockaddr2str((from != myself) ? &from->address : &to->nexthop->connection->edge->local_address, &from_address, &from_port);
197 bool x = send_request(to->nexthop->connection, "%d %s %s %s %s", UDP_INFO, from->name, to->name, from_address, from_port);
203 to->udp_info_sent = now;
209 bool udp_info_h(connection_t *c, const char *request) {
210 char from_name[MAX_STRING_SIZE];
211 char to_name[MAX_STRING_SIZE];
212 char from_address[MAX_STRING_SIZE];
213 char from_port[MAX_STRING_SIZE];
215 if(sscanf(request, "%*d "MAX_STRING" "MAX_STRING" "MAX_STRING" "MAX_STRING, from_name, to_name, from_address, from_port) != 4) {
216 logger(DEBUG_ALWAYS, LOG_ERR, "Got bad %s from %s (%s)", "UDP_INFO", c->name, c->hostname);
220 if(!check_id(from_name) || !check_id(to_name)) {
221 logger(DEBUG_ALWAYS, LOG_ERR, "Got bad %s from %s (%s): %s", "UDP_INFO", c->name, c->hostname, "invalid name");
225 node_t *from = lookup_node(from_name);
228 logger(DEBUG_ALWAYS, LOG_ERR, "Got %s from %s (%s) origin %s which does not exist in our connection list", "UDP_INFO", c->name, c->hostname, from_name);
232 if(from != from->via) {
233 /* Not supposed to happen, as it means the message wandered past a static relay */
234 logger(DEBUG_PROTOCOL, LOG_WARNING, "Got UDP info message from %s (%s) which we can't reach directly", from->name, from->hostname);
238 /* If we have a direct edge to "from", we are in a better position
239 to guess its address than it is itself. */
240 if(!from->connection && !from->status.udp_confirmed) {
241 sockaddr_t from_addr = str2sockaddr(from_address, from_port);
243 if(sockaddrcmp(&from_addr, &from->address)) {
244 update_node_udp(from, &from_addr);
248 node_t *to = lookup_node(to_name);
251 logger(DEBUG_ALWAYS, LOG_ERR, "Got %s from %s (%s) destination %s which does not exist in our connection list", "UDP_INFO", c->name, c->hostname, to_name);
255 /* Send our own data (which could be what we just received) up the chain. */
257 return send_udp_info(from, to);
260 /* Transmitting MTU information */
262 bool send_mtu_info(node_t *from, node_t *to, int mtu) {
263 /* Skip cases where sending MTU info messages doesn't make sense.
264 This is done here in order to avoid repeating the same logic in multiple callsites. */
270 if(!to->status.reachable) {
279 struct timeval elapsed;
281 timersub(&now, &to->mtu_info_sent, &elapsed);
283 if(elapsed.tv_sec < mtu_info_interval) {
288 if((to->nexthop->options >> 24) < 6) {
292 /* We will send the passed-in MTU value, unless we believe ours is better. */
294 node_t *via = (from->via == myself) ? from->nexthop : from->via;
296 if(from->minmtu == from->maxmtu && from->via == myself) {
297 /* We have a direct measurement. Override the value entirely.
298 Note that we only do that if we are sitting as a static relay in the path;
299 otherwise, we can't guarantee packets will flow through us, and increasing
300 MTU could therefore end up being too optimistic. */
302 } else if(via->minmtu == via->maxmtu) {
303 /* Static relay. Ensure packets will make it through the entire relay path. */
304 mtu = MIN(mtu, via->minmtu);
305 } else if(via->nexthop->minmtu == via->nexthop->maxmtu) {
306 /* Dynamic relay. Ensure packets will make it through the entire relay path. */
307 mtu = MIN(mtu, via->nexthop->minmtu);
311 to->mtu_info_sent = now;
314 /* If none of the conditions above match in the steady state, it means we're using TCP,
315 so the MTU is irrelevant. That said, it is still important to honor the MTU that was passed in,
316 because other parts of the relay path might be able to use UDP, which means they care about the MTU. */
318 return send_request(to->nexthop->connection, "%d %s %s %d", MTU_INFO, from->name, to->name, mtu);
321 bool mtu_info_h(connection_t *c, const char *request) {
322 char from_name[MAX_STRING_SIZE];
323 char to_name[MAX_STRING_SIZE];
326 if(sscanf(request, "%*d "MAX_STRING" "MAX_STRING" %d", from_name, to_name, &mtu) != 3) {
327 logger(DEBUG_ALWAYS, LOG_ERR, "Got bad %s from %s (%s)", "MTU_INFO", c->name, c->hostname);
332 logger(DEBUG_ALWAYS, LOG_ERR, "Got bad %s from %s (%s): %s", "MTU_INFO", c->name, c->hostname, "invalid MTU");
338 if(!check_id(from_name) || !check_id(to_name)) {
339 logger(DEBUG_ALWAYS, LOG_ERR, "Got bad %s from %s (%s): %s", "MTU_INFO", c->name, c->hostname, "invalid name");
343 node_t *from = lookup_node(from_name);
346 logger(DEBUG_ALWAYS, LOG_ERR, "Got %s from %s (%s) origin %s which does not exist in our connection list", "MTU_INFO", c->name, c->hostname, from_name);
350 /* If we don't know the current MTU for that node, use the one we received.
351 Even if we're about to make our own measurements, the value we got from downstream nodes should be pretty close
352 so it's a good idea to use it in the mean time. */
353 if(from->mtu != mtu && from->minmtu != from->maxmtu) {
354 logger(DEBUG_TRAFFIC, LOG_INFO, "Using provisional MTU %d for node %s (%s)", mtu, from->name, from->hostname);
358 node_t *to = lookup_node(to_name);
361 logger(DEBUG_ALWAYS, LOG_ERR, "Got %s from %s (%s) destination %s which does not exist in our connection list", "MTU_INFO", c->name, c->hostname, to_name);
365 /* Continue passing the MTU value (or a better one if we have it) up the chain. */
367 return send_mtu_info(from, to, mtu);