Compare commits

...

15 Commits

Author SHA1 Message Date
angt
2f290dbf85 Update mud and merge from master 2016-04-26 06:54:30 +00:00
angt
39e3f53139 Add v{4,6}only option 2016-04-25 16:29:20 +00:00
angt
babe14d544 Quit on tun error 2016-04-25 10:24:42 +00:00
angt
278fc69789 Update mud 2016-04-21 15:35:35 +00:00
angt
99262777fc Update mud 2016-04-17 10:16:13 +00:00
angt
b0f60caab2 Update mud 2016-04-14 20:12:45 +00:00
angt
efd5e0bb36 Remove down-timeout and use timeout for send-timeout 2016-04-08 14:38:07 +00:00
angt
ade4617d53 Update mud 2016-04-08 13:00:52 +00:00
angt
64a5fd8227 Update mud 2016-04-05 14:23:45 +00:00
angt
eba968797c Add {down,send,pong}-timeout and time-tolerance option 2016-04-05 14:17:07 +00:00
angt
d60f28a7fe Update mud 2016-04-05 06:42:03 +00:00
angt
32069eb104 Print tun device on STARTED and STOPPED too 2016-04-04 20:05:33 +00:00
angt
a6adcefc25 Update mud 2016-04-04 16:48:11 +00:00
angt
743b0ee0da Don't check AES-NI 2016-04-01 16:50:04 +00:00
angt
ba06a6fc10 Update mud 2016-04-01 16:37:02 +00:00
4 changed files with 100 additions and 73 deletions

2
mud

Submodule mud updated: 1b58401095...7e5c487951

View File

@@ -20,8 +20,6 @@
#include <arpa/inet.h>
#include <netdb.h>
#include <sodium.h>
#include "mud.h"
#ifndef O_CLOEXEC
@@ -29,10 +27,10 @@
#endif
static struct {
int timeout;
volatile sig_atomic_t quit;
volatile sig_atomic_t info;
uint8_t key[crypto_generichash_KEYBYTES];
int timeout;
int state_fd;
} gt;
static void fd_set_nonblock (int fd)
@@ -185,16 +183,16 @@ static size_t fd_write_all (int fd, const void *data, size_t size)
return done;
}
static int gt_setup_secretkey (char *keyfile)
static int gt_setup_secretkey (struct mud *mud, char *keyfile)
{
const size_t size = sizeof(gt.key);
unsigned char key[32];
if (str_empty(keyfile)) {
char buf[2*size+1];
char buf[2*sizeof(key)+1];
randombytes_buf(gt.key, size);
gt_tohex(buf, sizeof(buf), gt.key, size);
state("SECRETKEY", buf);
mud_get_key(mud, key, sizeof(key));
gt_tohex(buf, sizeof(buf), key, sizeof(key));
state_send(gt.state_fd, "SECRETKEY", buf);
return 0;
}
@@ -210,21 +208,23 @@ static int gt_setup_secretkey (char *keyfile)
return -1;
}
char key[2*size];
size_t r = fd_read_all(fd, key, sizeof(key));
char buf[2*sizeof(key)];
size_t r = fd_read_all(fd, buf, sizeof(buf));
close(fd);
if (r!=sizeof(key)) {
if (r!=sizeof(buf)) {
gt_log("unable to read secret key\n");
return -1;
}
if (gt_fromhex(gt.key, size, key, sizeof(key))) {
if (gt_fromhex(key, sizeof(key), buf, sizeof(buf))) {
gt_log("secret key is not valid\n");
return -1;
}
mud_set_key(mud, key, sizeof(key));
return 0;
}
@@ -242,17 +242,25 @@ int main (int argc, char **argv)
gt.timeout = 5000;
long time_tolerance = 0;
int v4 = 1;
int v6 = 1;
struct option opts[] = {
{ "host", &host, option_str },
{ "port", &port, option_str },
{ "bind", &bind_list, option_str },
{ "bind-port", &bind_port, option_str },
{ "dev", &dev, option_str },
{ "keyfile", &keyfile, option_str },
{ "multiqueue", NULL, option_option },
{ "statefile", &statefile, option_str },
{ "timeout", &gt.timeout, option_long },
{ "version", NULL, option_option },
{ "host", &host, option_str },
{ "port", &port, option_str },
{ "bind", &bind_list, option_str },
{ "bind-port", &bind_port, option_str },
{ "dev", &dev, option_str },
{ "keyfile", &keyfile, option_str },
{ "multiqueue", NULL, option_option },
{ "statefile", &statefile, option_str },
{ "timeout", &gt.timeout, option_long },
{ "time-tolerance", &time_tolerance, option_long },
{ "v4only", NULL, option_option },
{ "v6only", NULL, option_option },
{ "version", NULL, option_option },
{ NULL },
};
@@ -264,7 +272,18 @@ int main (int argc, char **argv)
return 0;
}
if (!option_is_set(opts, "keyfile")) {
if (option_is_set(opts, "v4only"))
v6 = 0;
if (option_is_set(opts, "v6only"))
v4 = 0;
if (!v4 && !v6) {
gt_log("v4only and v6only are both set\n");
return 1;
}
if (host && !option_is_set(opts, "keyfile")) {
gt_log("keyfile option must be set\n");
return 1;
}
@@ -274,17 +293,9 @@ int main (int argc, char **argv)
return 1;
}
if (sodium_init()==-1) {
gt_log("libsodium initialization has failed\n");
return 1;
}
gt.state_fd = state_create(statefile);
if (!crypto_aead_aes256gcm_is_available()) {
gt_na("AES-256-GCM");
return 1;
}
if (state_init(statefile))
if (statefile && gt.state_fd==-1)
return 1;
char *tun_name = NULL;
@@ -298,17 +309,20 @@ int main (int argc, char **argv)
fd_set_nonblock(tun_fd);
if (gt_setup_secretkey(keyfile))
return 1;
struct mud *mud = mud_create(bind_port);
struct mud *mud = mud_create(bind_port, v4, v6);
if (!mud) {
gt_log("couldn't create mud\n");
return 1;
}
mud_set_key(mud, gt.key, sizeof(gt.key));
if (gt_setup_secretkey(mud, keyfile))
return 1;
mud_set_send_timeout_msec(mud, gt.timeout);
if (time_tolerance > 0)
mud_set_time_tolerance_sec(mud, time_tolerance);
if (bind_list) {
char tmp[1024];
@@ -337,7 +351,7 @@ int main (int argc, char **argv)
int mud_fd = mud_get_fd(mud);
state("INITIALIZED", tun_name);
state_send(gt.state_fd, "INITIALIZED", tun_name);
fd_set rfds;
FD_ZERO(&rfds);
@@ -355,9 +369,12 @@ int main (int argc, char **argv)
}
struct timeval timeout = {
.tv_usec = 1000,
.tv_usec = 100000,
};
if (mud_can_push(mud))
timeout.tv_usec = 1000;
if _0_(select(mud_fd+1, &rfds, NULL, NULL, &timeout)==-1) {
if (errno==EINTR)
continue;
@@ -367,20 +384,24 @@ int main (int argc, char **argv)
if (mud_is_up(mud)) {
if (!started) {
state("STARTED", NULL);
state_send(gt.state_fd, "STARTED", tun_name);
started = 1;
}
} else if (started) {
state("STOPPED", NULL);
started = 0;
} else {
if (started) {
state_send(gt.state_fd, "STOPPED", tun_name);
started = 0;
}
}
if (FD_ISSET(tun_fd, &rfds)) {
while (1) {
const ssize_t r = tun_read(tun_fd, buf, sizeof(buf));
if (r<=0)
if (r<=0) {
gt.quit |= !r;
break;
}
struct ip_common ic;
@@ -395,12 +416,17 @@ int main (int argc, char **argv)
mud_pull(mud);
while (1) {
const int r = mud_recv(mud, buf, sizeof(buf));
const int size = mud_recv(mud, buf, sizeof(buf));
if (r<=0)
if (size<=0)
break;
tun_write(tun_fd, buf, r);
const ssize_t r = tun_write(tun_fd, buf, size);
if (r<=0) {
gt.quit |= !r;
break;
}
}
}

View File

@@ -7,16 +7,14 @@
#include <fcntl.h>
#include <sys/stat.h>
static int state_fd = -1;
int state_init (const char *filename)
int state_create (const char *filename)
{
if (str_empty(filename))
return 0;
return -1;
state_fd = open(filename, O_WRONLY);
int fd = open(filename, O_WRONLY);
if (state_fd==-1) {
if (fd==-1) {
if (errno!=EINTR)
perror("open");
return -1;
@@ -24,38 +22,41 @@ int state_init (const char *filename)
struct stat st = {0};
if (fstat(state_fd, &st)==-1) {
if (fstat(fd, &st)==-1) {
perror("fstat");
close(state_fd);
state_fd = -1;
close(fd);
return -1;
}
if (!S_ISFIFO(st.st_mode)) {
gt_log("`%s' is not a fifo\n", filename);
close(state_fd);
state_fd = -1;
close(fd);
return -1;
}
return 0;
return fd;
}
void state (const char *state, const char *info)
void state_send (int fd, const char *state, const char *info)
{
if (str_empty(state))
return;
if (fd==-1) {
gt_print("%s %s\n", state, info);
return;
}
const char *strs[] = { state, " ", info, "\n" };
char *str = str_cat(strs, COUNT(strs));
if (!str)
if (!str) {
perror("str_cat");
return;
if (state_fd==-1) {
gt_print("%s", str);
} else {
if (write(state_fd, str, str_len(str))==-1 && errno!=EINTR)
perror("write");
}
if (write(fd, str, str_len(str))==-1 && errno!=EINTR)
perror("write");
free(str);
}

View File

@@ -1,4 +1,4 @@
#pragma once
int state_init (const char *);
void state (const char *, const char *);
int state_create (const char *);
void state_send (int, const char *, const char *);