Home | History | Annotate | Line # | Download | only in tftp-proxy
tftp-proxy.c revision 1.1.2.1
      1  1.1.2.1  peter /* $NetBSD: tftp-proxy.c,v 1.1.2.1 2008/05/25 18:11:08 peter Exp $ */
      2  1.1.2.1  peter /* $OpenBSD: tftp-proxy.c,v 1.2 2006/12/20 03:33:38 joel Exp $
      3  1.1.2.1  peter  *
      4  1.1.2.1  peter  * Copyright (c) 2005 DLS Internet Services
      5  1.1.2.1  peter  * Copyright (c) 2004, 2005 Camiel Dobbelaar, <cd (at) sentia.nl>
      6  1.1.2.1  peter  *
      7  1.1.2.1  peter  * Redistribution and use in source and binary forms, with or without
      8  1.1.2.1  peter  * modification, are permitted provided that the following conditions
      9  1.1.2.1  peter  * are met:
     10  1.1.2.1  peter  *
     11  1.1.2.1  peter  * 1. Redistributions of source code must retain the above copyright
     12  1.1.2.1  peter  *    notice, this list of conditions and the following disclaimer.
     13  1.1.2.1  peter  * 2. Redistributions in binary form must reproduce the above copyright
     14  1.1.2.1  peter  *    notice, this list of conditions and the following disclaimer in the
     15  1.1.2.1  peter  *    documentation and/or other materials provided with the distribution.
     16  1.1.2.1  peter  * 3. The name of the author may not be used to endorse or promote products
     17  1.1.2.1  peter  *    derived from this software without specific prior written permission.
     18  1.1.2.1  peter  *
     19  1.1.2.1  peter  * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
     20  1.1.2.1  peter  * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
     21  1.1.2.1  peter  * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
     22  1.1.2.1  peter  * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
     23  1.1.2.1  peter  * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
     24  1.1.2.1  peter  * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
     25  1.1.2.1  peter  * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
     26  1.1.2.1  peter  * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
     27  1.1.2.1  peter  * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
     28  1.1.2.1  peter  * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
     29  1.1.2.1  peter  */
     30  1.1.2.1  peter 
     31  1.1.2.1  peter #include <sys/types.h>
     32  1.1.2.1  peter #include <sys/ioctl.h>
     33  1.1.2.1  peter #include <sys/uio.h>
     34  1.1.2.1  peter #include <unistd.h>
     35  1.1.2.1  peter 
     36  1.1.2.1  peter #include <netinet/in.h>
     37  1.1.2.1  peter #include <arpa/inet.h>
     38  1.1.2.1  peter #include <arpa/tftp.h>
     39  1.1.2.1  peter #include <sys/socket.h>
     40  1.1.2.1  peter #include <net/if.h>
     41  1.1.2.1  peter #include <net/pfvar.h>
     42  1.1.2.1  peter 
     43  1.1.2.1  peter #include <errno.h>
     44  1.1.2.1  peter #include <pwd.h>
     45  1.1.2.1  peter #include <stdio.h>
     46  1.1.2.1  peter #include <syslog.h>
     47  1.1.2.1  peter #include <string.h>
     48  1.1.2.1  peter #include <stdlib.h>
     49  1.1.2.1  peter 
     50  1.1.2.1  peter #include "filter.h"
     51  1.1.2.1  peter 
     52  1.1.2.1  peter #define CHROOT_DIR	"/var/chroot/tftp-proxy"
     53  1.1.2.1  peter #define NOPRIV_USER	"_proxy"
     54  1.1.2.1  peter 
     55  1.1.2.1  peter #define PF_NAT_PROXY_PORT_LOW	50001
     56  1.1.2.1  peter #define PF_NAT_PROXY_PORT_HIGH	65535
     57  1.1.2.1  peter 
     58  1.1.2.1  peter #define DEFTRANSWAIT	2
     59  1.1.2.1  peter #define NTOP_BUFS	4
     60  1.1.2.1  peter #ifndef PKTSIZE
     61  1.1.2.1  peter #define PKTSIZE		SEGSIZE+4
     62  1.1.2.1  peter #endif /* !PKTSIZE */
     63  1.1.2.1  peter 
     64  1.1.2.1  peter #ifndef IPPORT_HIFIRSTAUTO
     65  1.1.2.1  peter #define IPPORT_HIFIRSTAUTO	IPPORT_ANONMIN
     66  1.1.2.1  peter #endif /* IPPORT_HIFIRSTAUTO */
     67  1.1.2.1  peter 
     68  1.1.2.1  peter #ifndef IPPORT_HILASTAUTO
     69  1.1.2.1  peter #define IPPORT_HILASTAUTO	IPPORT_ANONMAX
     70  1.1.2.1  peter #endif /* IPPORT_HILASTAUTO */
     71  1.1.2.1  peter 
     72  1.1.2.1  peter const char *opcode(int);
     73  1.1.2.1  peter const char *sock_ntop(struct sockaddr *);
     74  1.1.2.1  peter u_int16_t pick_proxy_port(void);
     75  1.1.2.1  peter static void usage(void);
     76  1.1.2.1  peter 
     77  1.1.2.1  peter extern	char *__progname;
     78  1.1.2.1  peter char	ntop_buf[NTOP_BUFS][INET6_ADDRSTRLEN];
     79  1.1.2.1  peter int	verbose = 0;
     80  1.1.2.1  peter 
     81  1.1.2.1  peter int
     82  1.1.2.1  peter main(int argc, char *argv[])
     83  1.1.2.1  peter {
     84  1.1.2.1  peter 	int c, fd = 0, on = 1, out_fd = 0, peer, reqsize = 0;
     85  1.1.2.1  peter 	int transwait = DEFTRANSWAIT;
     86  1.1.2.1  peter 	char *p;
     87  1.1.2.1  peter 	struct tftphdr *tp;
     88  1.1.2.1  peter 	struct passwd *pw;
     89  1.1.2.1  peter 	size_t cbuflen;
     90  1.1.2.1  peter 	char *cbuf;
     91  1.1.2.1  peter 	char req[PKTSIZE];
     92  1.1.2.1  peter 	struct cmsghdr *cmsg;
     93  1.1.2.1  peter 	struct msghdr msg;
     94  1.1.2.1  peter 	struct iovec iov;
     95  1.1.2.1  peter 
     96  1.1.2.1  peter 	struct sockaddr_storage from, proxy, server, proxy_to_server, s_in;
     97  1.1.2.1  peter 	struct sockaddr_in sock_out;
     98  1.1.2.1  peter 	socklen_t j;
     99  1.1.2.1  peter 	in_port_t bindport;
    100  1.1.2.1  peter 
    101  1.1.2.1  peter 	openlog(__progname, LOG_PID | LOG_NDELAY, LOG_DAEMON);
    102  1.1.2.1  peter 
    103  1.1.2.1  peter 	while ((c = getopt(argc, argv, "vw:")) != -1)
    104  1.1.2.1  peter 		switch (c) {
    105  1.1.2.1  peter 		case 'v':
    106  1.1.2.1  peter 			verbose++;
    107  1.1.2.1  peter 			break;
    108  1.1.2.1  peter 		case 'w':
    109  1.1.2.1  peter 			transwait = strtoll(optarg, &p, 10);
    110  1.1.2.1  peter 			if (transwait < 1) {
    111  1.1.2.1  peter 				syslog(LOG_ERR, "invalid -w value");
    112  1.1.2.1  peter 				exit(1);
    113  1.1.2.1  peter 			}
    114  1.1.2.1  peter 			break;
    115  1.1.2.1  peter 		default:
    116  1.1.2.1  peter 			usage();
    117  1.1.2.1  peter 			break;
    118  1.1.2.1  peter 		}
    119  1.1.2.1  peter 
    120  1.1.2.1  peter 	/* open /dev/pf */
    121  1.1.2.1  peter 	init_filter(NULL, verbose);
    122  1.1.2.1  peter 
    123  1.1.2.1  peter 	tzset();
    124  1.1.2.1  peter 
    125  1.1.2.1  peter 	pw = getpwnam(NOPRIV_USER);
    126  1.1.2.1  peter 	if (!pw) {
    127  1.1.2.1  peter 		syslog(LOG_ERR, "no such user %s: %m", NOPRIV_USER);
    128  1.1.2.1  peter 		exit(1);
    129  1.1.2.1  peter 	}
    130  1.1.2.1  peter 	if (chroot(CHROOT_DIR) || chdir("/")) {
    131  1.1.2.1  peter 		syslog(LOG_ERR, "chroot %s: %m", CHROOT_DIR);
    132  1.1.2.1  peter 		exit(1);
    133  1.1.2.1  peter 	}
    134  1.1.2.1  peter #ifdef __NetBSD__
    135  1.1.2.1  peter 	if (setgroups(1, &pw->pw_gid) ||
    136  1.1.2.1  peter 	    setgid(pw->pw_gid) ||
    137  1.1.2.1  peter 	    setuid(pw->pw_uid)) {
    138  1.1.2.1  peter 		syslog(LOG_ERR, "can't revoke privs: %m");
    139  1.1.2.1  peter 		exit(1);
    140  1.1.2.1  peter 	}
    141  1.1.2.1  peter #else
    142  1.1.2.1  peter 	if (setgroups(1, &pw->pw_gid) ||
    143  1.1.2.1  peter 	    setresgid(pw->pw_gid, pw->pw_gid, pw->pw_gid) ||
    144  1.1.2.1  peter 	    setresuid(pw->pw_uid, pw->pw_uid, pw->pw_uid)) {
    145  1.1.2.1  peter 		syslog(LOG_ERR, "can't revoke privs: %m");
    146  1.1.2.1  peter 		exit(1);
    147  1.1.2.1  peter 	}
    148  1.1.2.1  peter #endif /* !__NetBSD__ */
    149  1.1.2.1  peter 
    150  1.1.2.1  peter 	/* non-blocking io */
    151  1.1.2.1  peter 	if (ioctl(fd, FIONBIO, &on) < 0) {
    152  1.1.2.1  peter 		syslog(LOG_ERR, "ioctl(FIONBIO): %m");
    153  1.1.2.1  peter 		exit(1);
    154  1.1.2.1  peter 	}
    155  1.1.2.1  peter 
    156  1.1.2.1  peter 	if (setsockopt(fd, IPPROTO_IP, IP_RECVDSTADDR, &on, sizeof(on)) == -1) {
    157  1.1.2.1  peter 		syslog(LOG_ERR, "setsockopt(IP_RECVDSTADDR): %m");
    158  1.1.2.1  peter 		exit(1);
    159  1.1.2.1  peter 	}
    160  1.1.2.1  peter 
    161  1.1.2.1  peter 	j = sizeof(s_in);
    162  1.1.2.1  peter 	if (getsockname(fd, (struct sockaddr *)&s_in, &j) == -1) {
    163  1.1.2.1  peter 		syslog(LOG_ERR, "getsockname: %m");
    164  1.1.2.1  peter 		exit(1);
    165  1.1.2.1  peter 	}
    166  1.1.2.1  peter 
    167  1.1.2.1  peter 	bindport = ((struct sockaddr_in *)&s_in)->sin_port;
    168  1.1.2.1  peter 
    169  1.1.2.1  peter 	/* req will be pushed back out at the end, unchanged */
    170  1.1.2.1  peter 	j = sizeof(from);
    171  1.1.2.1  peter 	if ((reqsize = recvfrom(fd, req, sizeof(req), MSG_PEEK,
    172  1.1.2.1  peter 	    (struct sockaddr *)&from, &j)) < 0) {
    173  1.1.2.1  peter 		syslog(LOG_ERR, "recvfrom: %m");
    174  1.1.2.1  peter 		exit(1);
    175  1.1.2.1  peter 	}
    176  1.1.2.1  peter 
    177  1.1.2.1  peter 
    178  1.1.2.1  peter 	bzero(&msg, sizeof(msg));
    179  1.1.2.1  peter 	iov.iov_base = req;
    180  1.1.2.1  peter 	iov.iov_len = sizeof(req);
    181  1.1.2.1  peter 	msg.msg_name = &from;
    182  1.1.2.1  peter 	msg.msg_namelen = sizeof(from);
    183  1.1.2.1  peter 	msg.msg_iov = &iov;
    184  1.1.2.1  peter 	msg.msg_iovlen = 1;
    185  1.1.2.1  peter 
    186  1.1.2.1  peter 	cbuflen = CMSG_SPACE(sizeof(struct sockaddr_storage));
    187  1.1.2.1  peter 	if ((cbuf = malloc(cbuflen)) == NULL) {
    188  1.1.2.1  peter 		syslog(LOG_ERR, "malloc: %m");
    189  1.1.2.1  peter 		exit(1);
    190  1.1.2.1  peter 	}
    191  1.1.2.1  peter 
    192  1.1.2.1  peter 	msg.msg_control = cbuf;
    193  1.1.2.1  peter 	msg.msg_controllen = cbuflen;
    194  1.1.2.1  peter 
    195  1.1.2.1  peter 	if (recvmsg(fd, &msg, 0) < 0) {
    196  1.1.2.1  peter 		syslog(LOG_ERR, "recvmsg: %m");
    197  1.1.2.1  peter 		exit(1);
    198  1.1.2.1  peter 	}
    199  1.1.2.1  peter 
    200  1.1.2.1  peter 	close(fd);
    201  1.1.2.1  peter 	close(1);
    202  1.1.2.1  peter 
    203  1.1.2.1  peter 	peer = socket(from.ss_family, SOCK_DGRAM, 0);
    204  1.1.2.1  peter 	if (peer < 0) {
    205  1.1.2.1  peter 		syslog(LOG_ERR, "socket: %m");
    206  1.1.2.1  peter 		exit(1);
    207  1.1.2.1  peter 	}
    208  1.1.2.1  peter 	memset(&s_in, 0, sizeof(s_in));
    209  1.1.2.1  peter 	s_in.ss_family = from.ss_family;
    210  1.1.2.1  peter 	s_in.ss_len = from.ss_len;
    211  1.1.2.1  peter 
    212  1.1.2.1  peter 	/* get local address if possible */
    213  1.1.2.1  peter 	for (cmsg = CMSG_FIRSTHDR(&msg); cmsg != NULL;
    214  1.1.2.1  peter 	    cmsg = CMSG_NXTHDR(&msg, cmsg)) {
    215  1.1.2.1  peter 		if (cmsg->cmsg_level == IPPROTO_IP &&
    216  1.1.2.1  peter 		    cmsg->cmsg_type == IP_RECVDSTADDR) {
    217  1.1.2.1  peter 			memcpy(&((struct sockaddr_in *)&s_in)->sin_addr,
    218  1.1.2.1  peter 			    CMSG_DATA(cmsg), sizeof(struct in_addr));
    219  1.1.2.1  peter 			break;
    220  1.1.2.1  peter 		}
    221  1.1.2.1  peter 	}
    222  1.1.2.1  peter 
    223  1.1.2.1  peter 	if (bind(peer, (struct sockaddr *)&s_in, s_in.ss_len) < 0) {
    224  1.1.2.1  peter 		syslog(LOG_ERR, "bind: %m");
    225  1.1.2.1  peter 		exit(1);
    226  1.1.2.1  peter 	}
    227  1.1.2.1  peter 	if (connect(peer, (struct sockaddr *)&from, from.ss_len) < 0) {
    228  1.1.2.1  peter 		syslog(LOG_ERR, "connect: %m");
    229  1.1.2.1  peter 		exit(1);
    230  1.1.2.1  peter 	}
    231  1.1.2.1  peter 
    232  1.1.2.1  peter 	tp = (struct tftphdr *)req;
    233  1.1.2.1  peter 	if (!(ntohs(tp->th_opcode) == RRQ || ntohs(tp->th_opcode) == WRQ)) {
    234  1.1.2.1  peter 		/* not a tftp request, bail */
    235  1.1.2.1  peter 		if (verbose) {
    236  1.1.2.1  peter 			syslog(LOG_WARNING, "not a valid tftp request");
    237  1.1.2.1  peter 			exit(1);
    238  1.1.2.1  peter 		} else
    239  1.1.2.1  peter 			/* exit 0 so inetd doesn't log anything */
    240  1.1.2.1  peter 			exit(0);
    241  1.1.2.1  peter 	}
    242  1.1.2.1  peter 
    243  1.1.2.1  peter 	j = sizeof(struct sockaddr_storage);
    244  1.1.2.1  peter 	if (getsockname(fd, (struct sockaddr *)&proxy, &j) == -1) {
    245  1.1.2.1  peter 		syslog(LOG_ERR, "getsockname: %m");
    246  1.1.2.1  peter 		exit(1);
    247  1.1.2.1  peter 	}
    248  1.1.2.1  peter 
    249  1.1.2.1  peter 	((struct sockaddr_in *)&proxy)->sin_port = bindport;
    250  1.1.2.1  peter 
    251  1.1.2.1  peter 	/* find the un-rdr'd server and port the client wanted */
    252  1.1.2.1  peter 	if (server_lookup((struct sockaddr *)&from,
    253  1.1.2.1  peter 	    (struct sockaddr *)&proxy, (struct sockaddr *)&server,
    254  1.1.2.1  peter 	    IPPROTO_UDP) != 0) {
    255  1.1.2.1  peter 		syslog(LOG_ERR, "pf connection lookup failed (no rdr?)");
    256  1.1.2.1  peter 		exit(1);
    257  1.1.2.1  peter 	}
    258  1.1.2.1  peter 
    259  1.1.2.1  peter 	/* establish a new outbound connection to the remote server */
    260  1.1.2.1  peter 	if ((out_fd = socket(((struct sockaddr *)&from)->sa_family,
    261  1.1.2.1  peter 	    SOCK_DGRAM, IPPROTO_UDP)) < 0) {
    262  1.1.2.1  peter 		syslog(LOG_ERR, "couldn't create new socket");
    263  1.1.2.1  peter 		exit(1);
    264  1.1.2.1  peter 	}
    265  1.1.2.1  peter 
    266  1.1.2.1  peter 	bzero((char *)&sock_out, sizeof(sock_out));
    267  1.1.2.1  peter 	sock_out.sin_family = from.ss_family;
    268  1.1.2.1  peter 	sock_out.sin_port = htons(pick_proxy_port());
    269  1.1.2.1  peter 	if (bind(out_fd, (struct sockaddr *)&sock_out, sizeof(sock_out)) < 0) {
    270  1.1.2.1  peter 		syslog(LOG_ERR, "couldn't bind to new socket: %m");
    271  1.1.2.1  peter 		exit(1);
    272  1.1.2.1  peter 	}
    273  1.1.2.1  peter 
    274  1.1.2.1  peter 	if (connect(out_fd, (struct sockaddr *)&server,
    275  1.1.2.1  peter 	    ((struct sockaddr *)&server)->sa_len) < 0 && errno != EINPROGRESS) {
    276  1.1.2.1  peter 		syslog(LOG_ERR, "couldn't connect to remote server: %m");
    277  1.1.2.1  peter 		exit(1);
    278  1.1.2.1  peter 	}
    279  1.1.2.1  peter 
    280  1.1.2.1  peter 	j = sizeof(struct sockaddr_storage);
    281  1.1.2.1  peter 	if ((getsockname(out_fd, (struct sockaddr *)&proxy_to_server,
    282  1.1.2.1  peter 	    &j)) < 0) {
    283  1.1.2.1  peter 		syslog(LOG_ERR, "getsockname: %m");
    284  1.1.2.1  peter 		exit(1);
    285  1.1.2.1  peter 	}
    286  1.1.2.1  peter 
    287  1.1.2.1  peter 	if (verbose)
    288  1.1.2.1  peter 		syslog(LOG_INFO, "%s:%d -> %s:%d/%s:%d -> %s:%d \"%s %s\"",
    289  1.1.2.1  peter 			sock_ntop((struct sockaddr *)&from),
    290  1.1.2.1  peter 			ntohs(((struct sockaddr_in *)&from)->sin_port),
    291  1.1.2.1  peter 			sock_ntop((struct sockaddr *)&proxy),
    292  1.1.2.1  peter 			ntohs(((struct sockaddr_in *)&proxy)->sin_port),
    293  1.1.2.1  peter 			sock_ntop((struct sockaddr *)&proxy_to_server),
    294  1.1.2.1  peter 			ntohs(((struct sockaddr_in *)&proxy_to_server)->sin_port),
    295  1.1.2.1  peter 			sock_ntop((struct sockaddr *)&server),
    296  1.1.2.1  peter 			ntohs(((struct sockaddr_in *)&server)->sin_port),
    297  1.1.2.1  peter 			opcode(ntohs(tp->th_opcode)),
    298  1.1.2.1  peter 			tp->th_stuff);
    299  1.1.2.1  peter 
    300  1.1.2.1  peter 	/* get ready to add rdr and pass rules */
    301  1.1.2.1  peter 	if (prepare_commit(1) == -1) {
    302  1.1.2.1  peter 		syslog(LOG_ERR, "couldn't prepare pf commit");
    303  1.1.2.1  peter 		exit(1);
    304  1.1.2.1  peter 	}
    305  1.1.2.1  peter 
    306  1.1.2.1  peter 	/* rdr from server to us on our random port -> client on its port */
    307  1.1.2.1  peter 	if (add_rdr(1, (struct sockaddr *)&server,
    308  1.1.2.1  peter 	    (struct sockaddr *)&proxy_to_server, ntohs(sock_out.sin_port),
    309  1.1.2.1  peter 	    (struct sockaddr *)&from,
    310  1.1.2.1  peter 	    ntohs(((struct sockaddr_in *)&from)->sin_port),
    311  1.1.2.1  peter 	    IPPROTO_UDP) == -1) {
    312  1.1.2.1  peter 		syslog(LOG_ERR, "couldn't add rdr");
    313  1.1.2.1  peter 		exit(1);
    314  1.1.2.1  peter 	}
    315  1.1.2.1  peter 
    316  1.1.2.1  peter 	/* explicitly allow the packets to return back to the client (which pf
    317  1.1.2.1  peter 	 * will see post-rdr) */
    318  1.1.2.1  peter 	if (add_filter(1, PF_IN, (struct sockaddr *)&server,
    319  1.1.2.1  peter 	    (struct sockaddr *)&from,
    320  1.1.2.1  peter 	    ntohs(((struct sockaddr_in *)&from)->sin_port),
    321  1.1.2.1  peter 	    IPPROTO_UDP) == -1) {
    322  1.1.2.1  peter 		syslog(LOG_ERR, "couldn't add pass in");
    323  1.1.2.1  peter 		exit(1);
    324  1.1.2.1  peter 	}
    325  1.1.2.1  peter 	if (add_filter(1, PF_OUT, (struct sockaddr *)&server,
    326  1.1.2.1  peter 	    (struct sockaddr *)&from,
    327  1.1.2.1  peter 	    ntohs(((struct sockaddr_in *)&from)->sin_port),
    328  1.1.2.1  peter 	    IPPROTO_UDP) == -1) {
    329  1.1.2.1  peter 		syslog(LOG_ERR, "couldn't add pass out");
    330  1.1.2.1  peter 		exit(1);
    331  1.1.2.1  peter 	}
    332  1.1.2.1  peter 
    333  1.1.2.1  peter 	/* and just in case, to pass out from us to the server */
    334  1.1.2.1  peter 	if (add_filter(1, PF_OUT, (struct sockaddr *)&proxy_to_server,
    335  1.1.2.1  peter 	    (struct sockaddr *)&server,
    336  1.1.2.1  peter 	    ntohs(((struct sockaddr_in *)&server)->sin_port),
    337  1.1.2.1  peter 	    IPPROTO_UDP) == -1) {
    338  1.1.2.1  peter 		syslog(LOG_ERR, "couldn't add pass out");
    339  1.1.2.1  peter 		exit(1);
    340  1.1.2.1  peter 	}
    341  1.1.2.1  peter 
    342  1.1.2.1  peter 	if (do_commit() == -1) {
    343  1.1.2.1  peter 		syslog(LOG_ERR, "couldn't commit pf rules");
    344  1.1.2.1  peter 		exit(1);
    345  1.1.2.1  peter 	}
    346  1.1.2.1  peter 
    347  1.1.2.1  peter 	/* forward the initial tftp request and start the insanity */
    348  1.1.2.1  peter 	if (send(out_fd, tp, reqsize, 0) < 0) {
    349  1.1.2.1  peter 		syslog(LOG_ERR, "couldn't forward tftp packet: %m");
    350  1.1.2.1  peter 		exit(1);
    351  1.1.2.1  peter 	}
    352  1.1.2.1  peter 
    353  1.1.2.1  peter 	/* allow the transfer to start to establish a state */
    354  1.1.2.1  peter 	sleep(transwait);
    355  1.1.2.1  peter 
    356  1.1.2.1  peter 	/* delete our rdr rule and clean up */
    357  1.1.2.1  peter 	prepare_commit(1);
    358  1.1.2.1  peter 	do_commit();
    359  1.1.2.1  peter 
    360  1.1.2.1  peter 	return(0);
    361  1.1.2.1  peter }
    362  1.1.2.1  peter 
    363  1.1.2.1  peter const char *
    364  1.1.2.1  peter opcode(int code)
    365  1.1.2.1  peter {
    366  1.1.2.1  peter 	static char str[6];
    367  1.1.2.1  peter 
    368  1.1.2.1  peter 	switch (code) {
    369  1.1.2.1  peter 	case 1:
    370  1.1.2.1  peter 		(void)snprintf(str, sizeof(str), "RRQ");
    371  1.1.2.1  peter 		break;
    372  1.1.2.1  peter 	case 2:
    373  1.1.2.1  peter 		(void)snprintf(str, sizeof(str), "WRQ");
    374  1.1.2.1  peter 		break;
    375  1.1.2.1  peter 	default:
    376  1.1.2.1  peter 		(void)snprintf(str, sizeof(str), "(%d)", code);
    377  1.1.2.1  peter 		break;
    378  1.1.2.1  peter 	}
    379  1.1.2.1  peter 
    380  1.1.2.1  peter 	return (str);
    381  1.1.2.1  peter }
    382  1.1.2.1  peter 
    383  1.1.2.1  peter const char *
    384  1.1.2.1  peter sock_ntop(struct sockaddr *sa)
    385  1.1.2.1  peter {
    386  1.1.2.1  peter 	static int n = 0;
    387  1.1.2.1  peter 
    388  1.1.2.1  peter 	/* Cycle to next buffer. */
    389  1.1.2.1  peter 	n = (n + 1) % NTOP_BUFS;
    390  1.1.2.1  peter 	ntop_buf[n][0] = '\0';
    391  1.1.2.1  peter 
    392  1.1.2.1  peter 	if (sa->sa_family == AF_INET) {
    393  1.1.2.1  peter 		struct sockaddr_in *sin = (struct sockaddr_in *)sa;
    394  1.1.2.1  peter 
    395  1.1.2.1  peter 		return (inet_ntop(AF_INET, &sin->sin_addr, ntop_buf[n],
    396  1.1.2.1  peter 		    sizeof ntop_buf[0]));
    397  1.1.2.1  peter 	}
    398  1.1.2.1  peter 
    399  1.1.2.1  peter 	if (sa->sa_family == AF_INET6) {
    400  1.1.2.1  peter 		struct sockaddr_in6 *sin6 = (struct sockaddr_in6 *)sa;
    401  1.1.2.1  peter 
    402  1.1.2.1  peter 		return (inet_ntop(AF_INET6, &sin6->sin6_addr, ntop_buf[n],
    403  1.1.2.1  peter 		    sizeof ntop_buf[0]));
    404  1.1.2.1  peter 	}
    405  1.1.2.1  peter 
    406  1.1.2.1  peter 	return (NULL);
    407  1.1.2.1  peter }
    408  1.1.2.1  peter 
    409  1.1.2.1  peter u_int16_t
    410  1.1.2.1  peter pick_proxy_port(void)
    411  1.1.2.1  peter {
    412  1.1.2.1  peter 	return (IPPORT_HIFIRSTAUTO + (arc4random() %
    413  1.1.2.1  peter 	    (IPPORT_HILASTAUTO - IPPORT_HIFIRSTAUTO)));
    414  1.1.2.1  peter }
    415  1.1.2.1  peter 
    416  1.1.2.1  peter static void
    417  1.1.2.1  peter usage(void)
    418  1.1.2.1  peter {
    419  1.1.2.1  peter 	syslog(LOG_ERR, "usage: %s [-v] [-w transwait]", __progname);
    420  1.1.2.1  peter 	exit(1);
    421  1.1.2.1  peter }
    422