faithd.c revision 1.24 1 /* $NetBSD: faithd.c,v 1.24 2002/04/24 12:14:42 itojun Exp $ */
2 /* $KAME: faithd.c,v 1.47 2002/04/24 12:06:15 itojun Exp $ */
3
4 /*
5 * Copyright (C) 1997 and 1998 WIDE Project.
6 * All rights reserved.
7 *
8 * Redistribution and use in source and binary forms, with or without
9 * modification, are permitted provided that the following conditions
10 * are met:
11 * 1. Redistributions of source code must retain the above copyright
12 * notice, this list of conditions and the following disclaimer.
13 * 2. Redistributions in binary form must reproduce the above copyright
14 * notice, this list of conditions and the following disclaimer in the
15 * documentation and/or other materials provided with the distribution.
16 * 3. Neither the name of the project nor the names of its contributors
17 * may be used to endorse or promote products derived from this software
18 * without specific prior written permission.
19 *
20 * THIS SOFTWARE IS PROVIDED BY THE PROJECT AND CONTRIBUTORS ``AS IS'' AND
21 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
22 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
23 * ARE DISCLAIMED. IN NO EVENT SHALL THE PROJECT OR CONTRIBUTORS BE LIABLE
24 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
25 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
26 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
27 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
28 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
29 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
30 * SUCH DAMAGE.
31 */
32
33 /*
34 * User level translator from IPv6 to IPv4.
35 *
36 * Usage: faithd [<port> <progpath> <arg1(progname)> <arg2> ...]
37 * e.g. faithd telnet /usr/local/v6/sbin/telnetd telnetd
38 */
39
40 #include <sys/param.h>
41 #include <sys/types.h>
42 #include <sys/sysctl.h>
43 #include <sys/socket.h>
44 #include <sys/wait.h>
45 #include <sys/stat.h>
46 #include <sys/time.h>
47 #include <sys/ioctl.h>
48 #ifdef __FreeBSD__
49 #include <libutil.h>
50 #endif
51
52 #include <stdio.h>
53 #include <stdlib.h>
54 #include <stdarg.h>
55 #include <string.h>
56 #include <syslog.h>
57 #include <unistd.h>
58 #include <errno.h>
59 #include <signal.h>
60 #include <fcntl.h>
61 #include <termios.h>
62
63 #include <net/if_types.h>
64 #ifdef IFT_FAITH
65 # define USE_ROUTE
66 # include <net/if.h>
67 # include <net/route.h>
68 # include <net/if_dl.h>
69 #endif
70
71 #include <netinet/in.h>
72 #include <arpa/inet.h>
73 #include <netdb.h>
74 #include <ifaddrs.h>
75
76 #ifdef FAITH4
77 #include <resolv.h>
78 #include <arpa/nameser.h>
79 #ifndef FAITH_NS
80 #define FAITH_NS "FAITH_NS"
81 #endif
82 #endif
83
84 #include "faithd.h"
85 #include "prefix.h"
86
87 char *serverpath = NULL;
88 char *serverarg[MAXARGV + 1];
89 static char *faithdname = NULL;
90 char logname[BUFSIZ];
91 char procname[BUFSIZ];
92 struct myaddrs {
93 struct myaddrs *next;
94 struct sockaddr *addr;
95 };
96 struct myaddrs *myaddrs = NULL;
97 static const char *service;
98 #ifdef USE_ROUTE
99 static int sockfd = 0;
100 #endif
101 int dflag = 0;
102 static int pflag = 0;
103 static int inetd = 0;
104 static char *configfile = NULL;
105
106 int main __P((int, char **));
107 static int inetd_main __P((int, char **));
108 static int daemon_main __P((int, char **));
109 static void play_service __P((int));
110 static void play_child __P((int, struct sockaddr *));
111 static int faith_prefix __P((struct sockaddr *));
112 static int map6to4 __P((struct sockaddr_in6 *, struct sockaddr_in *));
113 #ifdef FAITH4
114 static int map4to6 __P((struct sockaddr_in *, struct sockaddr_in6 *));
115 #endif
116 static void sig_child __P((int));
117 static void sig_terminate __P((int));
118 static void start_daemon __P((void));
119 static void exit_stderr __P((const char *, ...))
120 __attribute__((__format__(__printf__, 1, 2)));
121 static void grab_myaddrs __P((void));
122 static void free_myaddrs __P((void));
123 static void update_myaddrs __P((void));
124 static void usage __P((void));
125
126 int
127 main(int argc, char **argv)
128 {
129
130 /*
131 * Initializing stuff
132 */
133
134 faithdname = strrchr(argv[0], '/');
135 if (faithdname)
136 faithdname++;
137 else
138 faithdname = argv[0];
139
140 if (strcmp(faithdname, "faithd") != 0) {
141 inetd = 1;
142 return inetd_main(argc, argv);
143 } else
144 return daemon_main(argc, argv);
145 }
146
147 static int
148 inetd_main(int argc, char **argv)
149 {
150 char path[MAXPATHLEN];
151 struct sockaddr_storage me;
152 struct sockaddr_storage from;
153 int melen, fromlen;
154 int i;
155 int error;
156 const int on = 1;
157 char sbuf[NI_MAXSERV], snum[NI_MAXSERV];
158
159 if (config_load(configfile) < 0 && configfile) {
160 exit_failure("could not load config file");
161 /*NOTREACHED*/
162 }
163
164 if (strrchr(argv[0], '/') == NULL)
165 snprintf(path, sizeof(path), "%s/%s", DEFAULT_DIR, argv[0]);
166 else
167 snprintf(path, sizeof(path), "%s", argv[0]);
168
169 #ifdef USE_ROUTE
170 grab_myaddrs();
171
172 sockfd = socket(PF_ROUTE, SOCK_RAW, PF_UNSPEC);
173 if (sockfd < 0) {
174 exit_failure("socket(PF_ROUTE): %s", strerror(errno));
175 /*NOTREACHED*/
176 }
177 #endif
178
179 melen = sizeof(me);
180 if (getsockname(STDIN_FILENO, (struct sockaddr *)&me, &melen) < 0) {
181 exit_failure("getsockname: %s", strerror(errno));
182 /*NOTREACHED*/
183 }
184 fromlen = sizeof(from);
185 if (getpeername(STDIN_FILENO, (struct sockaddr *)&from, &fromlen) < 0) {
186 exit_failure("getpeername: %s", strerror(errno));
187 /*NOTREACHED*/
188 }
189 if (getnameinfo((struct sockaddr *)&me, melen, NULL, 0,
190 sbuf, sizeof(sbuf), NI_NUMERICHOST) == 0)
191 service = sbuf;
192 else
193 service = DEFAULT_PORT_NAME;
194 if (getnameinfo((struct sockaddr *)&me, melen, NULL, 0,
195 snum, sizeof(snum), NI_NUMERICHOST) != 0)
196 snprintf(snum, sizeof(snum), "?");
197
198 snprintf(logname, sizeof(logname), "faithd %s", snum);
199 snprintf(procname, sizeof(procname), "accepting port %s", snum);
200 openlog(logname, LOG_PID | LOG_NOWAIT, LOG_DAEMON);
201
202 if (argc >= MAXARGV) {
203 exit_failure("too many arguments");
204 /*NOTREACHED*/
205 }
206 serverarg[0] = serverpath = path;
207 for (i = 1; i < argc; i++)
208 serverarg[i] = argv[i];
209 serverarg[i] = NULL;
210
211 error = setsockopt(STDIN_FILENO, SOL_SOCKET, SO_OOBINLINE, &on,
212 sizeof(on));
213 if (error < 0) {
214 exit_failure("setsockopt(SO_OOBINLINE): %s", strerror(errno));
215 /*NOTREACHED*/
216 }
217
218 play_child(STDIN_FILENO, (struct sockaddr *)&from);
219 exit_failure("should not reach here");
220 return 0; /*dummy!*/
221 }
222
223 static int
224 daemon_main(int argc, char **argv)
225 {
226 struct addrinfo hints, *res;
227 int s_wld, error, i, serverargc, on = 1;
228 int family = AF_INET6;
229 int c;
230 #ifdef FAITH_NS
231 char *ns;
232 #endif /* FAITH_NS */
233
234 while ((c = getopt(argc, argv, "df:p46")) != -1) {
235 switch (c) {
236 case 'd':
237 dflag++;
238 break;
239 case 'f':
240 configfile = optarg;
241 break;
242 case 'p':
243 pflag++;
244 break;
245 #ifdef FAITH4
246 case '4':
247 family = AF_INET;
248 break;
249 case '6':
250 family = AF_INET6;
251 break;
252 #endif
253 default:
254 usage();
255 /*NOTREACHED*/
256 }
257 }
258 argc -= optind;
259 argv += optind;
260
261 if (config_load(configfile) < 0 && configfile) {
262 exit_failure("could not load config file");
263 /*NOTREACHED*/
264 }
265
266 #ifdef FAITH_NS
267 if ((ns = getenv(FAITH_NS)) != NULL) {
268 struct sockaddr_storage ss;
269 struct addrinfo hints, *res;
270 char serv[NI_MAXSERV];
271
272 memset(&ss, 0, sizeof(ss));
273 memset(&hints, 0, sizeof(hints));
274 snprintf(serv, sizeof(serv), "%u", NAMESERVER_PORT);
275 hints.ai_flags = AI_NUMERICHOST;
276 if (getaddrinfo(ns, serv, &hints, &res) == 0) {
277 res_init();
278 memcpy(&_res_ext.nsaddr, res->ai_addr, res->ai_addrlen);
279 _res.nscount = 1;
280 }
281 }
282 #endif /* FAITH_NS */
283
284 #ifdef USE_ROUTE
285 grab_myaddrs();
286 #endif
287
288 switch (argc) {
289 case 0:
290 usage();
291 /*NOTREACHED*/
292 default:
293 serverargc = argc - NUMARG;
294 if (serverargc >= MAXARGV)
295 exit_stderr("too many arguments");
296
297 serverpath = malloc(strlen(argv[NUMPRG]) + 1);
298 if (!serverpath)
299 exit_stderr("not enough core");
300 strcpy(serverpath, argv[NUMPRG]);
301 for (i = 0; i < serverargc; i++) {
302 serverarg[i] = malloc(strlen(argv[i + NUMARG]) + 1);
303 if (!serverarg[i])
304 exit_stderr("not enough core");
305 strcpy(serverarg[i], argv[i + NUMARG]);
306 }
307 serverarg[i] = NULL;
308 /* fall throuth */
309 case 1: /* no local service */
310 service = argv[NUMPRT];
311 break;
312 }
313
314 start_daemon();
315
316 /*
317 * Opening wild card socket for this service.
318 */
319
320 memset(&hints, 0, sizeof(hints));
321 hints.ai_flags = AI_PASSIVE;
322 hints.ai_family = family;
323 hints.ai_socktype = SOCK_STREAM;
324 hints.ai_protocol = 0;
325 error = getaddrinfo(NULL, service, &hints, &res);
326 if (error)
327 exit_failure("getaddrinfo: %s", gai_strerror(error));
328
329 s_wld = socket(res->ai_family, res->ai_socktype, res->ai_protocol);
330 if (s_wld == -1)
331 exit_failure("socket: %s", strerror(errno));
332
333 #ifdef IPV6_FAITH
334 if (res->ai_family == AF_INET6) {
335 error = setsockopt(s_wld, IPPROTO_IPV6, IPV6_FAITH, &on, sizeof(on));
336 if (error == -1)
337 exit_failure("setsockopt(IPV6_FAITH): %s",
338 strerror(errno));
339 }
340 #endif
341 #ifdef FAITH4
342 #ifdef IP_FAITH
343 if (res->ai_family == AF_INET) {
344 error = setsockopt(s_wld, IPPROTO_IP, IP_FAITH, &on, sizeof(on));
345 if (error == -1)
346 exit_failure("setsockopt(IP_FAITH): %s",
347 strerror(errno));
348 }
349 #endif
350 #endif /* FAITH4 */
351
352 error = setsockopt(s_wld, SOL_SOCKET, SO_REUSEADDR, &on, sizeof(on));
353 if (error == -1)
354 exit_failure("setsockopt(SO_REUSEADDR): %s", strerror(errno));
355
356 error = setsockopt(s_wld, SOL_SOCKET, SO_OOBINLINE, &on, sizeof(on));
357 if (error == -1)
358 exit_failure("setsockopt(SO_OOBINLINE): %s", strerror(errno));
359
360 error = bind(s_wld, (struct sockaddr *)res->ai_addr, res->ai_addrlen);
361 if (error == -1)
362 exit_failure("bind: %s", strerror(errno));
363
364 error = listen(s_wld, 5);
365 if (error == -1)
366 exit_failure("listen: %s", strerror(errno));
367
368 #ifdef USE_ROUTE
369 sockfd = socket(PF_ROUTE, SOCK_RAW, PF_UNSPEC);
370 if (sockfd < 0) {
371 exit_failure("socket(PF_ROUTE): %s", strerror(errno));
372 /*NOTREACHED*/
373 }
374 #endif
375
376 /*
377 * Everything is OK.
378 */
379
380 snprintf(logname, sizeof(logname), "faithd %s", service);
381 snprintf(procname, sizeof(procname), "accepting port %s", service);
382 openlog(logname, LOG_PID | LOG_NOWAIT, LOG_DAEMON);
383 syslog(LOG_INFO, "Staring faith daemon for %s port", service);
384
385 play_service(s_wld);
386 /* NOTREACHED */
387 exit(1); /*pacify gcc*/
388 }
389
390 static void
391 play_service(int s_wld)
392 {
393 struct sockaddr_storage srcaddr;
394 int len;
395 int s_src;
396 pid_t child_pid;
397 fd_set rfds;
398 int error;
399 int maxfd;
400
401 /*
402 * Wait, accept, fork, faith....
403 */
404 again:
405 setproctitle("%s", procname);
406
407 FD_ZERO(&rfds);
408 FD_SET(s_wld, &rfds);
409 maxfd = s_wld;
410 #ifdef USE_ROUTE
411 if (sockfd) {
412 FD_SET(sockfd, &rfds);
413 maxfd = (maxfd < sockfd) ? sockfd : maxfd;
414 }
415 #endif
416
417 error = select(maxfd + 1, &rfds, NULL, NULL, NULL);
418 if (error < 0) {
419 if (errno == EINTR)
420 goto again;
421 exit_failure("select: %s", strerror(errno));
422 /*NOTREACHED*/
423 }
424
425 #ifdef USE_ROUTE
426 if (FD_ISSET(sockfd, &rfds)) {
427 update_myaddrs();
428 }
429 #endif
430 if (FD_ISSET(s_wld, &rfds)) {
431 len = sizeof(srcaddr);
432 s_src = accept(s_wld, (struct sockaddr *)&srcaddr,
433 &len);
434 if (s_src < 0) {
435 if (errno == ECONNABORTED)
436 goto again;
437 exit_failure("socket: %s", strerror(errno));
438 /*NOTREACHED*/
439 }
440
441 child_pid = fork();
442
443 if (child_pid == 0) {
444 /* child process */
445 close(s_wld);
446 closelog();
447 openlog(logname, LOG_PID | LOG_NOWAIT, LOG_DAEMON);
448 play_child(s_src, (struct sockaddr *)&srcaddr);
449 exit_failure("should never reach here");
450 /*NOTREACHED*/
451 } else {
452 /* parent process */
453 close(s_src);
454 if (child_pid == -1)
455 syslog(LOG_ERR, "can't fork");
456 }
457 }
458 goto again;
459 }
460
461 static void
462 play_child(int s_src, struct sockaddr *srcaddr)
463 {
464 struct sockaddr_storage dstaddr6;
465 struct sockaddr_storage dstaddr4;
466 char src[NI_MAXHOST];
467 char dst6[NI_MAXHOST];
468 char dst4[NI_MAXHOST];
469 int len = sizeof(dstaddr6);
470 int s_dst, error, hport, nresvport, on = 1;
471 struct timeval tv;
472 struct sockaddr *sa4;
473 const struct config *conf;
474
475 tv.tv_sec = 1;
476 tv.tv_usec = 0;
477
478 getnameinfo(srcaddr, srcaddr->sa_len,
479 src, sizeof(src), NULL, 0, NI_NUMERICHOST);
480 syslog(LOG_INFO, "accepted a client from %s", src);
481
482 error = getsockname(s_src, (struct sockaddr *)&dstaddr6, &len);
483 if (error == -1) {
484 exit_failure("getsockname: %s", strerror(errno));
485 /*NOTREACHED*/
486 }
487
488 getnameinfo((struct sockaddr *)&dstaddr6, len,
489 dst6, sizeof(dst6), NULL, 0, NI_NUMERICHOST);
490 syslog(LOG_INFO, "the client is connecting to %s", dst6);
491
492 if (!faith_prefix((struct sockaddr *)&dstaddr6)) {
493 if (serverpath) {
494 /*
495 * Local service
496 */
497 syslog(LOG_INFO, "executing local %s", serverpath);
498 if (!inetd) {
499 dup2(s_src, 0);
500 close(s_src);
501 dup2(0, 1);
502 dup2(0, 2);
503 }
504 execv(serverpath, serverarg);
505 syslog(LOG_ERR, "execv %s: %s", serverpath,
506 strerror(errno));
507 _exit(EXIT_FAILURE);
508 } else {
509 close(s_src);
510 exit_success("no local service for %s", service);
511 }
512 }
513
514 /*
515 * Act as a translator
516 */
517
518 switch (((struct sockaddr *)&dstaddr6)->sa_family) {
519 case AF_INET6:
520 if (!map6to4((struct sockaddr_in6 *)&dstaddr6,
521 (struct sockaddr_in *)&dstaddr4)) {
522 close(s_src);
523 exit_failure("map6to4 failed");
524 /*NOTREACHED*/
525 }
526 syslog(LOG_INFO, "translating from v6 to v4");
527 break;
528 #ifdef FAITH4
529 case AF_INET:
530 if (!map4to6((struct sockaddr_in *)&dstaddr6,
531 (struct sockaddr_in6 *)&dstaddr4)) {
532 close(s_src);
533 exit_failure("map4to6 failed");
534 /*NOTREACHED*/
535 }
536 syslog(LOG_INFO, "translating from v4 to v6");
537 break;
538 #endif
539 default:
540 close(s_src);
541 exit_failure("family not supported");
542 /*NOTREACHED*/
543 }
544
545 sa4 = (struct sockaddr *)&dstaddr4;
546 getnameinfo(sa4, sa4->sa_len,
547 dst4, sizeof(dst4), NULL, 0, NI_NUMERICHOST);
548
549 conf = config_match(srcaddr, sa4);
550 if (!conf || !conf->permit) {
551 close(s_src);
552 if (conf) {
553 exit_failure("translation to %s not permitted for %s",
554 dst4, prefix_string(&conf->match));
555 /*NOTREACHED*/
556 } else {
557 exit_failure("translation to %s not permitted", dst4);
558 /*NOTREACHED*/
559 }
560 }
561
562 syslog(LOG_INFO, "the translator is connecting to %s", dst4);
563
564 setproctitle("port %s, %s -> %s", service, src, dst4);
565
566 if (sa4->sa_family == AF_INET6)
567 hport = ntohs(((struct sockaddr_in6 *)&dstaddr4)->sin6_port);
568 else /* AF_INET */
569 hport = ntohs(((struct sockaddr_in *)&dstaddr4)->sin_port);
570
571 switch (hport) {
572 case RLOGIN_PORT:
573 case RSH_PORT:
574 s_dst = rresvport_af(&nresvport, sa4->sa_family);
575 break;
576 default:
577 if (pflag)
578 s_dst = rresvport_af(&nresvport, sa4->sa_family);
579 else
580 s_dst = socket(sa4->sa_family, SOCK_STREAM, 0);
581 break;
582 }
583 if (s_dst < 0) {
584 exit_failure("socket: %s", strerror(errno));
585 /*NOTREACHED*/
586 }
587
588 if (conf->src.a.ss_family) {
589 if (bind(s_dst, (const struct sockaddr *)&conf->src.a,
590 conf->src.a.ss_len) < 0) {
591 exit_failure("bind: %s", strerror(errno));
592 /*NOTREACHED*/
593 }
594 }
595
596 error = setsockopt(s_dst, SOL_SOCKET, SO_OOBINLINE, &on, sizeof(on));
597 if (error < 0) {
598 exit_failure("setsockopt(SO_OOBINLINE): %s", strerror(errno));
599 /*NOTREACHED*/
600 }
601
602 error = setsockopt(s_src, SOL_SOCKET, SO_SNDTIMEO, &tv, sizeof(tv));
603 if (error < 0) {
604 exit_failure("setsockopt(SO_SNDTIMEO): %s", strerror(errno));
605 /*NOTREACHED*/
606 }
607 error = setsockopt(s_dst, SOL_SOCKET, SO_SNDTIMEO, &tv, sizeof(tv));
608 if (error < 0) {
609 exit_failure("setsockopt(SO_SNDTIMEO): %s", strerror(errno));
610 /*NOTREACHED*/
611 }
612
613 error = connect(s_dst, sa4, sa4->sa_len);
614 if (error < 0) {
615 exit_failure("connect: %s", strerror(errno));
616 /*NOTREACHED*/
617 }
618
619 switch (hport) {
620 case FTP_PORT:
621 ftp_relay(s_src, s_dst);
622 break;
623 case RSH_PORT:
624 syslog(LOG_WARNING,
625 "WARINNG: it is insecure to relay rsh port");
626 rsh_relay(s_src, s_dst);
627 break;
628 case RLOGIN_PORT:
629 syslog(LOG_WARNING,
630 "WARINNG: it is insecure to relay rlogin port");
631 /*FALLTHROUGH*/
632 default:
633 tcp_relay(s_src, s_dst, service);
634 break;
635 }
636
637 /* NOTREACHED */
638 }
639
640 /* 0: non faith, 1: faith */
641 static int
642 faith_prefix(struct sockaddr *dst)
643 {
644 #ifndef USE_ROUTE
645 int mib[4], size;
646 struct in6_addr faith_prefix;
647 struct sockaddr_in6 *dst6 = (struct sockaddr_in *)dst;
648
649 if (dst->sa_family != AF_INET6)
650 return 0;
651
652 mib[0] = CTL_NET;
653 mib[1] = PF_INET6;
654 mib[2] = IPPROTO_IPV6;
655 mib[3] = IPV6CTL_FAITH_PREFIX;
656 size = sizeof(struct in6_addr);
657 if (sysctl(mib, 4, &faith_prefix, &size, NULL, 0) < 0) {
658 exit_failure("sysctl: %s", strerror(errno));
659 /*NOTREACHED*/
660 }
661
662 if (memcmp(dst, &faith_prefix,
663 sizeof(struct in6_addr) - sizeof(struct in_addr) == 0) {
664 return 1;
665 }
666 return 0;
667 #else
668 struct myaddrs *p;
669 struct sockaddr_in6 *sin6;
670 struct sockaddr_in *sin4;
671 struct sockaddr_in6 *dst6;
672 struct sockaddr_in *dst4;
673 struct sockaddr_in dstmap;
674
675 dst6 = (struct sockaddr_in6 *)dst;
676 if (dst->sa_family == AF_INET6
677 && IN6_IS_ADDR_V4MAPPED(&dst6->sin6_addr)) {
678 /* ugly... */
679 memset(&dstmap, 0, sizeof(dstmap));
680 dstmap.sin_family = AF_INET;
681 dstmap.sin_len = sizeof(dstmap);
682 memcpy(&dstmap.sin_addr, &dst6->sin6_addr.s6_addr[12],
683 sizeof(dstmap.sin_addr));
684 dst = (struct sockaddr *)&dstmap;
685 }
686
687 dst6 = (struct sockaddr_in6 *)dst;
688 dst4 = (struct sockaddr_in *)dst;
689
690 for (p = myaddrs; p; p = p->next) {
691 sin6 = (struct sockaddr_in6 *)p->addr;
692 sin4 = (struct sockaddr_in *)p->addr;
693
694 if (p->addr->sa_len != dst->sa_len
695 || p->addr->sa_family != dst->sa_family)
696 continue;
697
698 switch (dst->sa_family) {
699 case AF_INET6:
700 if (sin6->sin6_scope_id == dst6->sin6_scope_id
701 && IN6_ARE_ADDR_EQUAL(&sin6->sin6_addr, &dst6->sin6_addr))
702 return 0;
703 break;
704 case AF_INET:
705 if (sin4->sin_addr.s_addr == dst4->sin_addr.s_addr)
706 return 0;
707 break;
708 }
709 }
710 return 1;
711 #endif
712 }
713
714 /* 0: non faith, 1: faith */
715 static int
716 map6to4(struct sockaddr_in6 *dst6, struct sockaddr_in *dst4)
717 {
718 memset(dst4, 0, sizeof(*dst4));
719 dst4->sin_len = sizeof(*dst4);
720 dst4->sin_family = AF_INET;
721 dst4->sin_port = dst6->sin6_port;
722 memcpy(&dst4->sin_addr, &dst6->sin6_addr.s6_addr[12],
723 sizeof(dst4->sin_addr));
724
725 if (dst4->sin_addr.s_addr == INADDR_ANY
726 || dst4->sin_addr.s_addr == INADDR_BROADCAST
727 || IN_MULTICAST(ntohl(dst4->sin_addr.s_addr)))
728 return 0;
729
730 return 1;
731 }
732
733 #ifdef FAITH4
734 /* 0: non faith, 1: faith */
735 static int
736 map4to6(struct sockaddr_in *dst4, struct sockaddr_in6 *dst6)
737 {
738 char host[NI_MAXHOST];
739 char serv[NI_MAXSERV];
740 struct addrinfo hints, *res;
741 int ai_errno;
742
743 if (getnameinfo((struct sockaddr *)dst4, dst4->sin_len, host, sizeof(host),
744 serv, sizeof(serv), NI_NAMEREQD|NI_NUMERICSERV) != 0)
745 return 0;
746
747 memset(&hints, 0, sizeof(hints));
748 hints.ai_flags = 0;
749 hints.ai_family = AF_INET6;
750 hints.ai_socktype = SOCK_STREAM;
751 hints.ai_protocol = 0;
752
753 if ((ai_errno = getaddrinfo(host, serv, &hints, &res)) != 0) {
754 syslog(LOG_INFO, "%s %s: %s", host, serv,
755 gai_strerror(ai_errno));
756 return 0;
757 }
758
759 memcpy(dst6, res->ai_addr, res->ai_addrlen);
760
761 freeaddrinfo(res);
762
763 return 1;
764 }
765 #endif /* FAITH4 */
766
767 static void
768 sig_child(int sig)
769 {
770 int status;
771 pid_t pid;
772
773 while ((pid = wait3(&status, WNOHANG, (struct rusage *)0)) > 0)
774 if (WEXITSTATUS(status))
775 syslog(LOG_WARNING, "child %d exit status 0x%x",
776 pid, status);
777 }
778
779 void
780 sig_terminate(int sig)
781 {
782 syslog(LOG_INFO, "Terminating faith daemon");
783 exit(EXIT_SUCCESS);
784 }
785
786 static void
787 start_daemon(void)
788 {
789 #ifdef SA_NOCLDWAIT
790 struct sigaction sa;
791 #endif
792
793 if (daemon(0, 0) == -1)
794 exit_stderr("daemon: %s", strerror(errno));
795
796 #ifdef SA_NOCLDWAIT
797 memset(&sa, 0, sizeof(sa));
798 sa.sa_handler = sig_child;
799 sa.sa_flags = SA_NOCLDWAIT;
800 sigemptyset(&sa.sa_mask);
801 sigaction(SIGCHLD, &sa, (struct sigaction *)0);
802 #else
803 if (signal(SIGCHLD, sig_child) == SIG_ERR) {
804 exit_failure("signal CHLD: %s", strerror(errno));
805 /*NOTREACHED*/
806 }
807 #endif
808
809 if (signal(SIGTERM, sig_terminate) == SIG_ERR) {
810 exit_failure("signal TERM: %s", strerror(errno));
811 /*NOTREACHED*/
812 }
813 }
814
815 static void
816 exit_stderr(const char *fmt, ...)
817 {
818 va_list ap;
819 char buf[BUFSIZ];
820
821 va_start(ap, fmt);
822 vsnprintf(buf, sizeof(buf), fmt, ap);
823 va_end(ap);
824 fprintf(stderr, "%s\n", buf);
825 exit(EXIT_FAILURE);
826 }
827
828 void
829 exit_failure(const char *fmt, ...)
830 {
831 va_list ap;
832 char buf[BUFSIZ];
833
834 va_start(ap, fmt);
835 vsnprintf(buf, sizeof(buf), fmt, ap);
836 va_end(ap);
837 syslog(LOG_ERR, "%s", buf);
838 exit(EXIT_FAILURE);
839 }
840
841 void
842 exit_success(const char *fmt, ...)
843 {
844 va_list ap;
845 char buf[BUFSIZ];
846
847 va_start(ap, fmt);
848 vsnprintf(buf, sizeof(buf), fmt, ap);
849 va_end(ap);
850 syslog(LOG_INFO, "%s", buf);
851 exit(EXIT_SUCCESS);
852 }
853
854 #ifdef USE_ROUTE
855 static void
856 grab_myaddrs()
857 {
858 struct ifaddrs *ifap, *ifa;
859 struct myaddrs *p;
860 struct sockaddr_in6 *sin6;
861
862 if (getifaddrs(&ifap) != 0) {
863 exit_failure("getifaddrs");
864 /*NOTREACHED*/
865 }
866
867 for (ifa = ifap; ifa; ifa = ifa->ifa_next) {
868 switch (ifa->ifa_addr->sa_family) {
869 case AF_INET:
870 case AF_INET6:
871 break;
872 default:
873 continue;
874 }
875
876 p = (struct myaddrs *)malloc(sizeof(struct myaddrs) +
877 ifa->ifa_addr->sa_len);
878 if (!p) {
879 exit_failure("not enough core");
880 /*NOTREACHED*/
881 }
882 memcpy(p + 1, ifa->ifa_addr, ifa->ifa_addr->sa_len);
883 p->next = myaddrs;
884 p->addr = (struct sockaddr *)(p + 1);
885 #ifdef __KAME__
886 if (ifa->ifa_addr->sa_family == AF_INET6) {
887 sin6 = (struct sockaddr_in6 *)p->addr;
888 if (IN6_IS_ADDR_LINKLOCAL(&sin6->sin6_addr)
889 || IN6_IS_ADDR_SITELOCAL(&sin6->sin6_addr)) {
890 sin6->sin6_scope_id =
891 ntohs(*(u_int16_t *)&sin6->sin6_addr.s6_addr[2]);
892 sin6->sin6_addr.s6_addr[2] = 0;
893 sin6->sin6_addr.s6_addr[3] = 0;
894 }
895 }
896 #endif
897 myaddrs = p;
898 if (dflag) {
899 char hbuf[NI_MAXHOST];
900 getnameinfo(p->addr, p->addr->sa_len,
901 hbuf, sizeof(hbuf), NULL, 0,
902 NI_NUMERICHOST);
903 syslog(LOG_INFO, "my interface: %s %s", hbuf,
904 ifa->ifa_name);
905 }
906 }
907
908 freeifaddrs(ifap);
909 }
910
911 static void
912 free_myaddrs()
913 {
914 struct myaddrs *p, *q;
915
916 p = myaddrs;
917 while (p) {
918 q = p->next;
919 free(p);
920 p = q;
921 }
922 myaddrs = NULL;
923 }
924
925 static void
926 update_myaddrs()
927 {
928 char msg[BUFSIZ];
929 int len;
930 struct rt_msghdr *rtm;
931
932 len = read(sockfd, msg, sizeof(msg));
933 if (len < 0) {
934 syslog(LOG_ERR, "read(PF_ROUTE) failed");
935 return;
936 }
937 rtm = (struct rt_msghdr *)msg;
938 if (len < 4 || len < rtm->rtm_msglen) {
939 syslog(LOG_ERR, "read(PF_ROUTE) short read");
940 return;
941 }
942 if (rtm->rtm_version != RTM_VERSION) {
943 syslog(LOG_ERR, "routing socket version mismatch");
944 close(sockfd);
945 sockfd = 0;
946 return;
947 }
948 switch (rtm->rtm_type) {
949 case RTM_NEWADDR:
950 case RTM_DELADDR:
951 case RTM_IFINFO:
952 break;
953 default:
954 return;
955 }
956 /* XXX more filters here? */
957
958 syslog(LOG_INFO, "update interface address list");
959 free_myaddrs();
960 grab_myaddrs();
961 }
962 #endif /*USE_ROUTE*/
963
964 static void
965 usage()
966 {
967 fprintf(stderr, "usage: %s [-dp] [-f conf] service [serverpath [serverargs]]\n",
968 faithdname);
969 exit(0);
970 }
971