39struct port_share *port_share = NULL;
42#define PROXY_CONNECTION_BUFFER_SIZE 1500
45#define COMMAND_REDIRECT 10
46#define COMMAND_EXIT 11
49#define RESPONSE_INIT_SUCCEEDED 20
50#define RESPONSE_INIT_FAILED 21
56#define IOSTAT_EAGAIN_ON_READ 0
57#define IOSTAT_EAGAIN_ON_WRITE 1
58#define IOSTAT_READ_ERROR 2
59#define IOSTAT_WRITE_ERROR 3
66struct proxy_connection
69 struct proxy_connection *next;
70 struct proxy_connection *counterpart;
113 for (
i = 3;
i <= 100; ++
i)
147 if (size ==
sizeof(
c))
162 if (size ==
sizeof(
c))
199 head ?
BLEN(head) : -1);
205 iov[0].iov_base = &cmd;
206 iov[0].iov_len =
sizeof(cmd);
211 iov[1].iov_base =
BPTR(head);
212 iov[1].iov_len =
BLEN(head);
218 mesg.msg_controllen = cmsg_size();
219 mesg.msg_control = (
char *)malloc(mesg.msg_controllen);
223 h = CMSG_FIRSTHDR(&mesg);
224 h->cmsg_level = SOL_SOCKET;
225 h->cmsg_type = SCM_RIGHTS;
230 memcpy(CMSG_DATA(h), &sd_send,
sizeof(sd_send));
234 socketpair(PF_UNIX, SOCK_DGRAM, 0, sd_null);
235 memcpy(CMSG_DATA(h), &sd_null[0],
sizeof(sd_null[0]));
242 "PORT SHARE: sendmsg failed -- unable to communicate with background process (%d,%d,%d,%d)",
243 sd, sd_send, sd_null[0], sd_null[1]);
246 close_socket_if_defined(sd_null[0]);
247 close_socket_if_defined(sd_null[1]);
248 free(mesg.msg_control);
253proxy_entry_close_sd(
struct proxy_connection *pc,
struct event_set *
es)
271proxy_entry_mark_for_close(
struct proxy_connection *pc,
struct event_set *
es)
275 struct proxy_connection *cp = pc->counterpart;
276 proxy_entry_close_sd(pc,
es);
278 pc->buffer_initial =
false;
287 if (cp && cp->defined && cp->counterpart == pc)
289 proxy_entry_mark_for_close(cp,
es);
299proxy_list_housekeeping(
struct proxy_connection **list)
303 struct proxy_connection *prev = NULL;
304 struct proxy_connection *pc = *list;
308 struct proxy_connection *next = pc->next;
335journal_add(
const char *journal_dir,
struct proxy_connection *pc,
struct proxy_connection *cp)
339 socklen_t slen, dlen;
344 slen =
sizeof(from.addr);
345 dlen =
sizeof(to.addr);
346 if (!getpeername(pc->sd, (
struct sockaddr *)&from.addr.sa, &slen)
347 && !getsockname(cp->sd, (
struct sockaddr *)&to.addr.sa, &dlen))
351 fnlen = strlen(journal_dir) + strlen(t) + 2;
352 jfn = (
char *)malloc(fnlen);
354 snprintf(jfn, fnlen,
"%s/%s", journal_dir, t);
356 fd =
platform_open(jfn, O_CREAT | O_TRUNC | O_WRONLY, S_IRUSR | S_IWUSR | S_IRGRP);
359 if (
write(fd, f, strlen(f)) != strlen(f))
361 msg(
M_WARN,
"PORT SHARE: writing to journal file (%s) failed", jfn);
368 msg(
M_WARN |
M_ERRNO,
"PORT SHARE: unable to write journal file in %s", jfn);
379proxy_list_close(
struct proxy_connection **list)
383 struct proxy_connection *pc = *list;
386 proxy_entry_mark_for_close(pc, NULL);
389 proxy_list_housekeeping(list);
394proxy_connection_io_requeue(
struct proxy_connection *pc,
const int rwflags_new,
402 pc->rwflags = rwflags_new;
414proxy_entry_new(
struct proxy_connection **list,
struct event_set *
es,
416 struct buffer *initial_data,
const char *journal_dir)
420 struct proxy_connection *pc;
421 struct proxy_connection *cp;
424 if ((sd_server = socket(server_addr.
addr.
sa.sa_family, SOCK_STREAM, IPPROTO_TCP)) < 0)
432 msg(
M_WARN,
"PORT SHARE PROXY: connect to port-share server failed");
448 pc->counterpart = cp;
449 pc->buf = *initial_data;
450 pc->buffer_initial =
true;
457 cp->counterpart = pc;
458 cp->buf =
alloc_buf(PROXY_CONNECTION_BUFFER_SIZE);
459 cp->buffer_initial =
false;
469 journal_add(journal_dir, pc, cp);
489control_message_from_parent(
const socket_descriptor_t sd_control,
struct proxy_connection **list,
491 const int max_initial_buf,
const char *journal_dir)
506 iov[0].iov_base = &command;
507 iov[0].iov_len =
sizeof(command);
508 iov[1].iov_base =
BPTR(&buf);
509 iov[1].iov_len =
BCAP(&buf);
513 mesg.msg_controllen = cmsg_size();
514 mesg.msg_control = (
char *)malloc(mesg.msg_controllen);
518 h = CMSG_FIRSTHDR(&mesg);
520 h->cmsg_level = SOL_SOCKET;
521 h->cmsg_type = SCM_RIGHTS;
523 memcpy(CMSG_DATA(h), &socket_undefined,
sizeof(socket_undefined));
529 || h->cmsg_level != SOL_SOCKET || h->cmsg_type != SCM_RIGHTS)
531 msg(
M_WARN,
"PORT SHARE PROXY: received unknown message");
536 memcpy(&received_fd, CMSG_DATA(h),
sizeof(received_fd));
539 if (
status >= 2 && command == COMMAND_REDIRECT)
542 if (proxy_entry_new(list,
es, server_addr, received_fd, &buf, journal_dir))
559 free(mesg.msg_control);
565proxy_connection_io_recv(
struct proxy_connection *pc)
571 return (errno == EAGAIN) ? IOSTAT_EAGAIN_ON_READ : IOSTAT_READ_ERROR;
577 return IOSTAT_READ_ERROR;
586proxy_connection_io_send(
struct proxy_connection *pc,
int *bytes_sent)
594 return (e == EAGAIN) ? IOSTAT_EAGAIN_ON_WRITE : IOSTAT_WRITE_ERROR;
599 if (
status != pc->buf.len)
604 return IOSTAT_EAGAIN_ON_WRITE;
615 if (pc->buffer_initial)
618 pc->buf =
alloc_buf(PROXY_CONNECTION_BUFFER_SIZE);
619 pc->buffer_initial =
false;
629proxy_connection_io_xfer(
struct proxy_connection *pc,
const int max_transfer)
632 while (transferred < max_transfer)
636 const int status = proxy_connection_io_recv(pc);
637 if (
status != IOSTAT_GOOD)
645 const int status = proxy_connection_io_send(pc, &transferred);
646 if (
status != IOSTAT_GOOD)
652 return IOSTAT_EAGAIN_ON_READ;
659proxy_connection_io_status(
const int status,
int *rwflags_pc,
int *rwflags_cp)
663 case IOSTAT_EAGAIN_ON_READ:
665 *rwflags_cp &= ~EVENT_WRITE;
668 case IOSTAT_EAGAIN_ON_WRITE:
669 *rwflags_pc &= ~EVENT_READ;
673 case IOSTAT_READ_ERROR:
676 case IOSTAT_WRITE_ERROR:
690proxy_connection_io_dispatch(
struct proxy_connection *pc,
const int rwflags,
struct event_set *
es)
692 const int max_transfer_per_iteration = 10000;
693 struct proxy_connection *cp = pc->counterpart;
694 int rwflags_pc = pc->rwflags;
695 int rwflags_cp = cp->rwflags;
697 ASSERT(pc->defined && cp->defined && cp->counterpart == pc);
701 const int status = proxy_connection_io_xfer(pc, max_transfer_per_iteration);
702 if (!proxy_connection_io_status(
status, &rwflags_pc, &rwflags_cp))
709 const int status = proxy_connection_io_xfer(cp, max_transfer_per_iteration);
710 if (!proxy_connection_io_status(
status, &rwflags_cp, &rwflags_pc))
715 proxy_connection_io_requeue(pc, rwflags_pc,
es);
716 proxy_connection_io_requeue(cp, rwflags_cp,
es);
721 proxy_entry_mark_for_close(pc,
es);
730 const int max_initial_buf,
const char *journal_dir)
734 void *sd_control_marker = (
void *)1;
738 struct proxy_connection *list = NULL;
739 time_t last_housekeeping = 0;
755 current = time(NULL);
759 for (
i = 0;
i < n_events; ++
i)
762 if (e->
arg == sd_control_marker)
764 if (!control_message_from_parent(sd_control, &list,
es, hostaddr,
765 max_initial_buf, journal_dir))
772 struct proxy_connection *pc = (
struct proxy_connection *)e->
arg;
775 proxy_connection_io_dispatch(pc, e->
rwflags,
es);
780 else if (n_events < 0)
784 if (current > last_housekeeping)
786 proxy_list_housekeeping(&list);
787 last_housekeeping = current;
792 proxy_list_close(&list);
795 msg(
M_INFO,
"PORT SHARE PROXY: proxy exiting");
803port_share_open(
const char *host,
const char *port,
const int max_initial_buf,
804 const char *journal_dir)
809 struct port_share *ps;
814 ps->foreground_fd = -1;
815 ps->background_pid = -1;
824 ASSERT(
sizeof(hostaddr.
addr) >= ai->ai_addrlen);
825 memcpy(&hostaddr.
addr.
sa, ai->ai_addr, ai->ai_addrlen);
840 if (socketpair(PF_UNIX, SOCK_DGRAM, 0, fd) == -1)
842 msg(
M_WARN,
"PORT SHARE: socketpair call failed");
859 ps->background_pid = pid;
875 ps->foreground_fd = fd[0];
880 msg(
M_ERR,
"PORT SHARE: unexpected init recv_control status=%d",
status);
895#ifdef ENABLE_MANAGEMENT
907 port_share_proxy(hostaddr, fd[1], max_initial_buf, journal_dir);
916 port_share_close(ps);
921port_share_close(
struct port_share *ps)
925 if (ps->foreground_fd >= 0)
932 if (ps->background_pid > 0)
934 waitpid(ps->background_pid, NULL, 0);
939 ps->foreground_fd = -1;
947port_share_abort(
struct port_share *ps)
952 if (ps->foreground_fd >= 0)
956 ps->foreground_fd = -1;
967is_openvpn_protocol(
const struct buffer *buf)
969 const unsigned char *p = (
const unsigned char *)
BSTR(buf);
970 const int len =
BLEN(buf);
973 int plen = (p[0] << 8) | p[1];
991 return (plen >= 336 && plen < (1024 + 255));
997 return plen >= 14 && plen <= 255
1003 int plen = (p[0] << 8) | p[1];
1004 return plen >= 14 && plen <= 255;
1022 port_share_sendmsg(ps->foreground_fd, COMMAND_REDIRECT, head, sd);
static void set_signals(void)
#define RESPONSE_INIT_SUCCEEDED
static int recv_control(int fd)
static int send_control(int fd, int code)
static void close_fds_except(int keep)
void free_buf(struct buffer *buf)
struct buffer alloc_buf(size_t size)
static bool buf_advance(struct buffer *buf, int size)
static void check_malloc_return(void *p)
static void gc_free(struct gc_arena *a)
#define ALLOC_OBJ_CLEAR(dptr, type)
static struct gc_arena gc_new(void)
Data Channel Cryptography Module.
struct event_set * event_set_init(int *maxevents, unsigned int flags)
static void event_free(struct event_set *es)
static void event_del(struct event_set *es, event_t event)
static int event_wait(struct event_set *es, const struct timeval *tv, struct event_set_return *out, int outlen)
static void event_ctl(struct event_set *es, event_t event, unsigned int rwflags, void *arg)
void set_nonblock(socket_descriptor_t fd)
void set_cloexec(socket_descriptor_t fd)
static SERVICE_STATUS status
static bool msg_test(unsigned int flags)
Return true if flags represent an enabled, not muted log level.
int openvpn_connect(socket_descriptor_t sd, const struct sockaddr *remote, int connect_timeout, volatile int *signal_received)
#define openvpn_close_socket(s)
int openvpn_getaddrinfo(unsigned int flags, const char *hostname, const char *servname, int resolve_retry_seconds, struct signal_info *sig_info, int ai_family, struct addrinfo **res)
static const char * print_openvpn_sockaddr(const struct openvpn_sockaddr *addr, struct gc_arena *gc)
#define P_CONTROL_HARD_RESET_CLIENT_V2
#define P_CONTROL_HARD_RESET_CLIENT_V3
Wrapper structure for dynamically allocated memory.
int len
Length in bytes of the actual content within the allocated memory.
Garbage collection arena used to keep track of dynamically allocated memory.
union openvpn_sockaddr::@27 addr
SOCKET socket_descriptor_t
static int socket_defined(const socket_descriptor_t sd)