Home | History | Annotate | Line # | Download | only in faithd
faithd.c revision 1.24
      1 /*	$NetBSD: faithd.c,v 1.24 2002/04/24 12:14:42 itojun Exp $	*/
      2 /*	$KAME: faithd.c,v 1.47 2002/04/24 12:06:15 itojun Exp $	*/
      3 
      4 /*
      5  * Copyright (C) 1997 and 1998 WIDE Project.
      6  * All rights reserved.
      7  *
      8  * Redistribution and use in source and binary forms, with or without
      9  * modification, are permitted provided that the following conditions
     10  * are met:
     11  * 1. Redistributions of source code must retain the above copyright
     12  *    notice, this list of conditions and the following disclaimer.
     13  * 2. Redistributions in binary form must reproduce the above copyright
     14  *    notice, this list of conditions and the following disclaimer in the
     15  *    documentation and/or other materials provided with the distribution.
     16  * 3. Neither the name of the project nor the names of its contributors
     17  *    may be used to endorse or promote products derived from this software
     18  *    without specific prior written permission.
     19  *
     20  * THIS SOFTWARE IS PROVIDED BY THE PROJECT AND CONTRIBUTORS ``AS IS'' AND
     21  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
     22  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
     23  * ARE DISCLAIMED.  IN NO EVENT SHALL THE PROJECT OR CONTRIBUTORS BE LIABLE
     24  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
     25  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
     26  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
     27  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
     28  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
     29  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
     30  * SUCH DAMAGE.
     31  */
     32 
     33 /*
     34  * User level translator from IPv6 to IPv4.
     35  *
     36  * Usage: faithd [<port> <progpath> <arg1(progname)> <arg2> ...]
     37  *   e.g. faithd telnet /usr/local/v6/sbin/telnetd telnetd
     38  */
     39 
     40 #include <sys/param.h>
     41 #include <sys/types.h>
     42 #include <sys/sysctl.h>
     43 #include <sys/socket.h>
     44 #include <sys/wait.h>
     45 #include <sys/stat.h>
     46 #include <sys/time.h>
     47 #include <sys/ioctl.h>
     48 #ifdef __FreeBSD__
     49 #include <libutil.h>
     50 #endif
     51 
     52 #include <stdio.h>
     53 #include <stdlib.h>
     54 #include <stdarg.h>
     55 #include <string.h>
     56 #include <syslog.h>
     57 #include <unistd.h>
     58 #include <errno.h>
     59 #include <signal.h>
     60 #include <fcntl.h>
     61 #include <termios.h>
     62 
     63 #include <net/if_types.h>
     64 #ifdef IFT_FAITH
     65 # define USE_ROUTE
     66 # include <net/if.h>
     67 # include <net/route.h>
     68 # include <net/if_dl.h>
     69 #endif
     70 
     71 #include <netinet/in.h>
     72 #include <arpa/inet.h>
     73 #include <netdb.h>
     74 #include <ifaddrs.h>
     75 
     76 #ifdef FAITH4
     77 #include <resolv.h>
     78 #include <arpa/nameser.h>
     79 #ifndef FAITH_NS
     80 #define FAITH_NS "FAITH_NS"
     81 #endif
     82 #endif
     83 
     84 #include "faithd.h"
     85 #include "prefix.h"
     86 
     87 char *serverpath = NULL;
     88 char *serverarg[MAXARGV + 1];
     89 static char *faithdname = NULL;
     90 char logname[BUFSIZ];
     91 char procname[BUFSIZ];
     92 struct myaddrs {
     93 	struct myaddrs *next;
     94 	struct sockaddr *addr;
     95 };
     96 struct myaddrs *myaddrs = NULL;
     97 static const char *service;
     98 #ifdef USE_ROUTE
     99 static int sockfd = 0;
    100 #endif
    101 int dflag = 0;
    102 static int pflag = 0;
    103 static int inetd = 0;
    104 static char *configfile = NULL;
    105 
    106 int main __P((int, char **));
    107 static int inetd_main __P((int, char **));
    108 static int daemon_main __P((int, char **));
    109 static void play_service __P((int));
    110 static void play_child __P((int, struct sockaddr *));
    111 static int faith_prefix __P((struct sockaddr *));
    112 static int map6to4 __P((struct sockaddr_in6 *, struct sockaddr_in *));
    113 #ifdef FAITH4
    114 static int map4to6 __P((struct sockaddr_in *, struct sockaddr_in6 *));
    115 #endif
    116 static void sig_child __P((int));
    117 static void sig_terminate __P((int));
    118 static void start_daemon __P((void));
    119 static void exit_stderr __P((const char *, ...))
    120 	__attribute__((__format__(__printf__, 1, 2)));
    121 static void grab_myaddrs __P((void));
    122 static void free_myaddrs __P((void));
    123 static void update_myaddrs __P((void));
    124 static void usage __P((void));
    125 
    126 int
    127 main(int argc, char **argv)
    128 {
    129 
    130 	/*
    131 	 * Initializing stuff
    132 	 */
    133 
    134 	faithdname = strrchr(argv[0], '/');
    135 	if (faithdname)
    136 		faithdname++;
    137 	else
    138 		faithdname = argv[0];
    139 
    140 	if (strcmp(faithdname, "faithd") != 0) {
    141 		inetd = 1;
    142 		return inetd_main(argc, argv);
    143 	} else
    144 		return daemon_main(argc, argv);
    145 }
    146 
    147 static int
    148 inetd_main(int argc, char **argv)
    149 {
    150 	char path[MAXPATHLEN];
    151 	struct sockaddr_storage me;
    152 	struct sockaddr_storage from;
    153 	int melen, fromlen;
    154 	int i;
    155 	int error;
    156 	const int on = 1;
    157 	char sbuf[NI_MAXSERV], snum[NI_MAXSERV];
    158 
    159 	if (config_load(configfile) < 0 && configfile) {
    160 		exit_failure("could not load config file");
    161 		/*NOTREACHED*/
    162 	}
    163 
    164 	if (strrchr(argv[0], '/') == NULL)
    165 		snprintf(path, sizeof(path), "%s/%s", DEFAULT_DIR, argv[0]);
    166 	else
    167 		snprintf(path, sizeof(path), "%s", argv[0]);
    168 
    169 #ifdef USE_ROUTE
    170 	grab_myaddrs();
    171 
    172 	sockfd = socket(PF_ROUTE, SOCK_RAW, PF_UNSPEC);
    173 	if (sockfd < 0) {
    174 		exit_failure("socket(PF_ROUTE): %s", strerror(errno));
    175 		/*NOTREACHED*/
    176 	}
    177 #endif
    178 
    179 	melen = sizeof(me);
    180 	if (getsockname(STDIN_FILENO, (struct sockaddr *)&me, &melen) < 0) {
    181 		exit_failure("getsockname: %s", strerror(errno));
    182 		/*NOTREACHED*/
    183 	}
    184 	fromlen = sizeof(from);
    185 	if (getpeername(STDIN_FILENO, (struct sockaddr *)&from, &fromlen) < 0) {
    186 		exit_failure("getpeername: %s", strerror(errno));
    187 		/*NOTREACHED*/
    188 	}
    189 	if (getnameinfo((struct sockaddr *)&me, melen, NULL, 0,
    190 	    sbuf, sizeof(sbuf), NI_NUMERICHOST) == 0)
    191 		service = sbuf;
    192 	else
    193 		service = DEFAULT_PORT_NAME;
    194 	if (getnameinfo((struct sockaddr *)&me, melen, NULL, 0,
    195 	    snum, sizeof(snum), NI_NUMERICHOST) != 0)
    196 		snprintf(snum, sizeof(snum), "?");
    197 
    198 	snprintf(logname, sizeof(logname), "faithd %s", snum);
    199 	snprintf(procname, sizeof(procname), "accepting port %s", snum);
    200 	openlog(logname, LOG_PID | LOG_NOWAIT, LOG_DAEMON);
    201 
    202 	if (argc >= MAXARGV) {
    203 		exit_failure("too many arguments");
    204 		/*NOTREACHED*/
    205 	}
    206 	serverarg[0] = serverpath = path;
    207 	for (i = 1; i < argc; i++)
    208 		serverarg[i] = argv[i];
    209 	serverarg[i] = NULL;
    210 
    211 	error = setsockopt(STDIN_FILENO, SOL_SOCKET, SO_OOBINLINE, &on,
    212 	    sizeof(on));
    213 	if (error < 0) {
    214 		exit_failure("setsockopt(SO_OOBINLINE): %s", strerror(errno));
    215 		/*NOTREACHED*/
    216 	}
    217 
    218 	play_child(STDIN_FILENO, (struct sockaddr *)&from);
    219 	exit_failure("should not reach here");
    220 	return 0;	/*dummy!*/
    221 }
    222 
    223 static int
    224 daemon_main(int argc, char **argv)
    225 {
    226 	struct addrinfo hints, *res;
    227 	int s_wld, error, i, serverargc, on = 1;
    228 	int family = AF_INET6;
    229 	int c;
    230 #ifdef FAITH_NS
    231 	char *ns;
    232 #endif /* FAITH_NS */
    233 
    234 	while ((c = getopt(argc, argv, "df:p46")) != -1) {
    235 		switch (c) {
    236 		case 'd':
    237 			dflag++;
    238 			break;
    239 		case 'f':
    240 			configfile = optarg;
    241 			break;
    242 		case 'p':
    243 			pflag++;
    244 			break;
    245 #ifdef FAITH4
    246 		case '4':
    247 			family = AF_INET;
    248 			break;
    249 		case '6':
    250 			family = AF_INET6;
    251 			break;
    252 #endif
    253 		default:
    254 			usage();
    255 			/*NOTREACHED*/
    256 		}
    257 	}
    258 	argc -= optind;
    259 	argv += optind;
    260 
    261 	if (config_load(configfile) < 0 && configfile) {
    262 		exit_failure("could not load config file");
    263 		/*NOTREACHED*/
    264 	}
    265 
    266 #ifdef FAITH_NS
    267 	if ((ns = getenv(FAITH_NS)) != NULL) {
    268 		struct sockaddr_storage ss;
    269 		struct addrinfo hints, *res;
    270 		char serv[NI_MAXSERV];
    271 
    272 		memset(&ss, 0, sizeof(ss));
    273 		memset(&hints, 0, sizeof(hints));
    274 		snprintf(serv, sizeof(serv), "%u", NAMESERVER_PORT);
    275 		hints.ai_flags = AI_NUMERICHOST;
    276 		if (getaddrinfo(ns, serv, &hints, &res) ==  0) {
    277 			res_init();
    278 			memcpy(&_res_ext.nsaddr, res->ai_addr, res->ai_addrlen);
    279 			_res.nscount = 1;
    280 		}
    281 	}
    282 #endif /* FAITH_NS */
    283 
    284 #ifdef USE_ROUTE
    285 	grab_myaddrs();
    286 #endif
    287 
    288 	switch (argc) {
    289 	case 0:
    290 		usage();
    291 		/*NOTREACHED*/
    292 	default:
    293 		serverargc = argc - NUMARG;
    294 		if (serverargc >= MAXARGV)
    295 			exit_stderr("too many arguments");
    296 
    297 		serverpath = malloc(strlen(argv[NUMPRG]) + 1);
    298 		if (!serverpath)
    299 			exit_stderr("not enough core");
    300 		strcpy(serverpath, argv[NUMPRG]);
    301 		for (i = 0; i < serverargc; i++) {
    302 			serverarg[i] = malloc(strlen(argv[i + NUMARG]) + 1);
    303 			if (!serverarg[i])
    304 				exit_stderr("not enough core");
    305 			strcpy(serverarg[i], argv[i + NUMARG]);
    306 		}
    307 		serverarg[i] = NULL;
    308 		/* fall throuth */
    309 	case 1:	/* no local service */
    310 		service = argv[NUMPRT];
    311 		break;
    312 	}
    313 
    314 	start_daemon();
    315 
    316 	/*
    317 	 * Opening wild card socket for this service.
    318 	 */
    319 
    320 	memset(&hints, 0, sizeof(hints));
    321 	hints.ai_flags = AI_PASSIVE;
    322 	hints.ai_family = family;
    323 	hints.ai_socktype = SOCK_STREAM;
    324 	hints.ai_protocol = 0;
    325 	error = getaddrinfo(NULL, service, &hints, &res);
    326 	if (error)
    327 		exit_failure("getaddrinfo: %s", gai_strerror(error));
    328 
    329 	s_wld = socket(res->ai_family, res->ai_socktype, res->ai_protocol);
    330 	if (s_wld == -1)
    331 		exit_failure("socket: %s", strerror(errno));
    332 
    333 #ifdef IPV6_FAITH
    334 	if (res->ai_family == AF_INET6) {
    335 		error = setsockopt(s_wld, IPPROTO_IPV6, IPV6_FAITH, &on, sizeof(on));
    336 		if (error == -1)
    337 			exit_failure("setsockopt(IPV6_FAITH): %s",
    338 			    strerror(errno));
    339 	}
    340 #endif
    341 #ifdef FAITH4
    342 #ifdef IP_FAITH
    343 	if (res->ai_family == AF_INET) {
    344 		error = setsockopt(s_wld, IPPROTO_IP, IP_FAITH, &on, sizeof(on));
    345 		if (error == -1)
    346 			exit_failure("setsockopt(IP_FAITH): %s",
    347 			    strerror(errno));
    348 	}
    349 #endif
    350 #endif /* FAITH4 */
    351 
    352 	error = setsockopt(s_wld, SOL_SOCKET, SO_REUSEADDR, &on, sizeof(on));
    353 	if (error == -1)
    354 		exit_failure("setsockopt(SO_REUSEADDR): %s", strerror(errno));
    355 
    356 	error = setsockopt(s_wld, SOL_SOCKET, SO_OOBINLINE, &on, sizeof(on));
    357 	if (error == -1)
    358 		exit_failure("setsockopt(SO_OOBINLINE): %s", strerror(errno));
    359 
    360 	error = bind(s_wld, (struct sockaddr *)res->ai_addr, res->ai_addrlen);
    361 	if (error == -1)
    362 		exit_failure("bind: %s", strerror(errno));
    363 
    364 	error = listen(s_wld, 5);
    365 	if (error == -1)
    366 		exit_failure("listen: %s", strerror(errno));
    367 
    368 #ifdef USE_ROUTE
    369 	sockfd = socket(PF_ROUTE, SOCK_RAW, PF_UNSPEC);
    370 	if (sockfd < 0) {
    371 		exit_failure("socket(PF_ROUTE): %s", strerror(errno));
    372 		/*NOTREACHED*/
    373 	}
    374 #endif
    375 
    376 	/*
    377 	 * Everything is OK.
    378 	 */
    379 
    380 	snprintf(logname, sizeof(logname), "faithd %s", service);
    381 	snprintf(procname, sizeof(procname), "accepting port %s", service);
    382 	openlog(logname, LOG_PID | LOG_NOWAIT, LOG_DAEMON);
    383 	syslog(LOG_INFO, "Staring faith daemon for %s port", service);
    384 
    385 	play_service(s_wld);
    386 	/* NOTREACHED */
    387 	exit(1);	/*pacify gcc*/
    388 }
    389 
    390 static void
    391 play_service(int s_wld)
    392 {
    393 	struct sockaddr_storage srcaddr;
    394 	int len;
    395 	int s_src;
    396 	pid_t child_pid;
    397 	fd_set rfds;
    398 	int error;
    399 	int maxfd;
    400 
    401 	/*
    402 	 * Wait, accept, fork, faith....
    403 	 */
    404 again:
    405 	setproctitle("%s", procname);
    406 
    407 	FD_ZERO(&rfds);
    408 	FD_SET(s_wld, &rfds);
    409 	maxfd = s_wld;
    410 #ifdef USE_ROUTE
    411 	if (sockfd) {
    412 		FD_SET(sockfd, &rfds);
    413 		maxfd = (maxfd < sockfd) ? sockfd : maxfd;
    414 	}
    415 #endif
    416 
    417 	error = select(maxfd + 1, &rfds, NULL, NULL, NULL);
    418 	if (error < 0) {
    419 		if (errno == EINTR)
    420 			goto again;
    421 		exit_failure("select: %s", strerror(errno));
    422 		/*NOTREACHED*/
    423 	}
    424 
    425 #ifdef USE_ROUTE
    426 	if (FD_ISSET(sockfd, &rfds)) {
    427 		update_myaddrs();
    428 	}
    429 #endif
    430 	if (FD_ISSET(s_wld, &rfds)) {
    431 		len = sizeof(srcaddr);
    432 		s_src = accept(s_wld, (struct sockaddr *)&srcaddr,
    433 			&len);
    434 		if (s_src < 0) {
    435 			if (errno == ECONNABORTED)
    436 				goto again;
    437 			exit_failure("socket: %s", strerror(errno));
    438 			/*NOTREACHED*/
    439 		}
    440 
    441 		child_pid = fork();
    442 
    443 		if (child_pid == 0) {
    444 			/* child process */
    445 			close(s_wld);
    446 			closelog();
    447 			openlog(logname, LOG_PID | LOG_NOWAIT, LOG_DAEMON);
    448 			play_child(s_src, (struct sockaddr *)&srcaddr);
    449 			exit_failure("should never reach here");
    450 			/*NOTREACHED*/
    451 		} else {
    452 			/* parent process */
    453 			close(s_src);
    454 			if (child_pid == -1)
    455 				syslog(LOG_ERR, "can't fork");
    456 		}
    457 	}
    458 	goto again;
    459 }
    460 
    461 static void
    462 play_child(int s_src, struct sockaddr *srcaddr)
    463 {
    464 	struct sockaddr_storage dstaddr6;
    465 	struct sockaddr_storage dstaddr4;
    466 	char src[NI_MAXHOST];
    467 	char dst6[NI_MAXHOST];
    468 	char dst4[NI_MAXHOST];
    469 	int len = sizeof(dstaddr6);
    470 	int s_dst, error, hport, nresvport, on = 1;
    471 	struct timeval tv;
    472 	struct sockaddr *sa4;
    473 	const struct config *conf;
    474 
    475 	tv.tv_sec = 1;
    476 	tv.tv_usec = 0;
    477 
    478 	getnameinfo(srcaddr, srcaddr->sa_len,
    479 		src, sizeof(src), NULL, 0, NI_NUMERICHOST);
    480 	syslog(LOG_INFO, "accepted a client from %s", src);
    481 
    482 	error = getsockname(s_src, (struct sockaddr *)&dstaddr6, &len);
    483 	if (error == -1) {
    484 		exit_failure("getsockname: %s", strerror(errno));
    485 		/*NOTREACHED*/
    486 	}
    487 
    488 	getnameinfo((struct sockaddr *)&dstaddr6, len,
    489 		dst6, sizeof(dst6), NULL, 0, NI_NUMERICHOST);
    490 	syslog(LOG_INFO, "the client is connecting to %s", dst6);
    491 
    492 	if (!faith_prefix((struct sockaddr *)&dstaddr6)) {
    493 		if (serverpath) {
    494 			/*
    495 			 * Local service
    496 			 */
    497 			syslog(LOG_INFO, "executing local %s", serverpath);
    498 			if (!inetd) {
    499 				dup2(s_src, 0);
    500 				close(s_src);
    501 				dup2(0, 1);
    502 				dup2(0, 2);
    503 			}
    504 			execv(serverpath, serverarg);
    505 			syslog(LOG_ERR, "execv %s: %s", serverpath,
    506 			    strerror(errno));
    507 			_exit(EXIT_FAILURE);
    508 		} else {
    509 			close(s_src);
    510 			exit_success("no local service for %s", service);
    511 		}
    512 	}
    513 
    514 	/*
    515 	 * Act as a translator
    516 	 */
    517 
    518 	switch (((struct sockaddr *)&dstaddr6)->sa_family) {
    519 	case AF_INET6:
    520 		if (!map6to4((struct sockaddr_in6 *)&dstaddr6,
    521 		    (struct sockaddr_in *)&dstaddr4)) {
    522 			close(s_src);
    523 			exit_failure("map6to4 failed");
    524 			/*NOTREACHED*/
    525 		}
    526 		syslog(LOG_INFO, "translating from v6 to v4");
    527 		break;
    528 #ifdef FAITH4
    529 	case AF_INET:
    530 		if (!map4to6((struct sockaddr_in *)&dstaddr6,
    531 		    (struct sockaddr_in6 *)&dstaddr4)) {
    532 			close(s_src);
    533 			exit_failure("map4to6 failed");
    534 			/*NOTREACHED*/
    535 		}
    536 		syslog(LOG_INFO, "translating from v4 to v6");
    537 		break;
    538 #endif
    539 	default:
    540 		close(s_src);
    541 		exit_failure("family not supported");
    542 		/*NOTREACHED*/
    543 	}
    544 
    545 	sa4 = (struct sockaddr *)&dstaddr4;
    546 	getnameinfo(sa4, sa4->sa_len,
    547 		dst4, sizeof(dst4), NULL, 0, NI_NUMERICHOST);
    548 
    549 	conf = config_match(srcaddr, sa4);
    550 	if (!conf || !conf->permit) {
    551 		close(s_src);
    552 		if (conf) {
    553 			exit_failure("translation to %s not permitted for %s",
    554 			    dst4, prefix_string(&conf->match));
    555 			/*NOTREACHED*/
    556 		} else {
    557 			exit_failure("translation to %s not permitted", dst4);
    558 			/*NOTREACHED*/
    559 		}
    560 	}
    561 
    562 	syslog(LOG_INFO, "the translator is connecting to %s", dst4);
    563 
    564 	setproctitle("port %s, %s -> %s", service, src, dst4);
    565 
    566 	if (sa4->sa_family == AF_INET6)
    567 		hport = ntohs(((struct sockaddr_in6 *)&dstaddr4)->sin6_port);
    568 	else /* AF_INET */
    569 		hport = ntohs(((struct sockaddr_in *)&dstaddr4)->sin_port);
    570 
    571 	switch (hport) {
    572 	case RLOGIN_PORT:
    573 	case RSH_PORT:
    574 		s_dst = rresvport_af(&nresvport, sa4->sa_family);
    575 		break;
    576 	default:
    577 		if (pflag)
    578 			s_dst = rresvport_af(&nresvport, sa4->sa_family);
    579 		else
    580 			s_dst = socket(sa4->sa_family, SOCK_STREAM, 0);
    581 		break;
    582 	}
    583 	if (s_dst < 0) {
    584 		exit_failure("socket: %s", strerror(errno));
    585 		/*NOTREACHED*/
    586 	}
    587 
    588 	if (conf->src.a.ss_family) {
    589 		if (bind(s_dst, (const struct sockaddr *)&conf->src.a,
    590 		    conf->src.a.ss_len) < 0) {
    591 			exit_failure("bind: %s", strerror(errno));
    592 			/*NOTREACHED*/
    593 		}
    594 	}
    595 
    596 	error = setsockopt(s_dst, SOL_SOCKET, SO_OOBINLINE, &on, sizeof(on));
    597 	if (error < 0) {
    598 		exit_failure("setsockopt(SO_OOBINLINE): %s", strerror(errno));
    599 		/*NOTREACHED*/
    600 	}
    601 
    602 	error = setsockopt(s_src, SOL_SOCKET, SO_SNDTIMEO, &tv, sizeof(tv));
    603 	if (error < 0) {
    604 		exit_failure("setsockopt(SO_SNDTIMEO): %s", strerror(errno));
    605 		/*NOTREACHED*/
    606 	}
    607 	error = setsockopt(s_dst, SOL_SOCKET, SO_SNDTIMEO, &tv, sizeof(tv));
    608 	if (error < 0) {
    609 		exit_failure("setsockopt(SO_SNDTIMEO): %s", strerror(errno));
    610 		/*NOTREACHED*/
    611 	}
    612 
    613 	error = connect(s_dst, sa4, sa4->sa_len);
    614 	if (error < 0) {
    615 		exit_failure("connect: %s", strerror(errno));
    616 		/*NOTREACHED*/
    617 	}
    618 
    619 	switch (hport) {
    620 	case FTP_PORT:
    621 		ftp_relay(s_src, s_dst);
    622 		break;
    623 	case RSH_PORT:
    624 		syslog(LOG_WARNING,
    625 		    "WARINNG: it is insecure to relay rsh port");
    626 		rsh_relay(s_src, s_dst);
    627 		break;
    628 	case RLOGIN_PORT:
    629 		syslog(LOG_WARNING,
    630 		    "WARINNG: it is insecure to relay rlogin port");
    631 		/*FALLTHROUGH*/
    632 	default:
    633 		tcp_relay(s_src, s_dst, service);
    634 		break;
    635 	}
    636 
    637 	/* NOTREACHED */
    638 }
    639 
    640 /* 0: non faith, 1: faith */
    641 static int
    642 faith_prefix(struct sockaddr *dst)
    643 {
    644 #ifndef USE_ROUTE
    645 	int mib[4], size;
    646 	struct in6_addr faith_prefix;
    647 	struct sockaddr_in6 *dst6 = (struct sockaddr_in *)dst;
    648 
    649 	if (dst->sa_family != AF_INET6)
    650 		return 0;
    651 
    652 	mib[0] = CTL_NET;
    653 	mib[1] = PF_INET6;
    654 	mib[2] = IPPROTO_IPV6;
    655 	mib[3] = IPV6CTL_FAITH_PREFIX;
    656 	size = sizeof(struct in6_addr);
    657 	if (sysctl(mib, 4, &faith_prefix, &size, NULL, 0) < 0) {
    658 		exit_failure("sysctl: %s", strerror(errno));
    659 		/*NOTREACHED*/
    660 	}
    661 
    662 	if (memcmp(dst, &faith_prefix,
    663 			sizeof(struct in6_addr) - sizeof(struct in_addr) == 0) {
    664 		return 1;
    665 	}
    666 	return 0;
    667 #else
    668 	struct myaddrs *p;
    669 	struct sockaddr_in6 *sin6;
    670 	struct sockaddr_in *sin4;
    671 	struct sockaddr_in6 *dst6;
    672 	struct sockaddr_in *dst4;
    673 	struct sockaddr_in dstmap;
    674 
    675 	dst6 = (struct sockaddr_in6 *)dst;
    676 	if (dst->sa_family == AF_INET6
    677 	 && IN6_IS_ADDR_V4MAPPED(&dst6->sin6_addr)) {
    678 		/* ugly... */
    679 		memset(&dstmap, 0, sizeof(dstmap));
    680 		dstmap.sin_family = AF_INET;
    681 		dstmap.sin_len = sizeof(dstmap);
    682 		memcpy(&dstmap.sin_addr, &dst6->sin6_addr.s6_addr[12],
    683 			sizeof(dstmap.sin_addr));
    684 		dst = (struct sockaddr *)&dstmap;
    685 	}
    686 
    687 	dst6 = (struct sockaddr_in6 *)dst;
    688 	dst4 = (struct sockaddr_in *)dst;
    689 
    690 	for (p = myaddrs; p; p = p->next) {
    691 		sin6 = (struct sockaddr_in6 *)p->addr;
    692 		sin4 = (struct sockaddr_in *)p->addr;
    693 
    694 		if (p->addr->sa_len != dst->sa_len
    695 		 || p->addr->sa_family != dst->sa_family)
    696 			continue;
    697 
    698 		switch (dst->sa_family) {
    699 		case AF_INET6:
    700 			if (sin6->sin6_scope_id == dst6->sin6_scope_id
    701 			 && IN6_ARE_ADDR_EQUAL(&sin6->sin6_addr, &dst6->sin6_addr))
    702 				return 0;
    703 			break;
    704 		case AF_INET:
    705 			if (sin4->sin_addr.s_addr == dst4->sin_addr.s_addr)
    706 				return 0;
    707 			break;
    708 		}
    709 	}
    710 	return 1;
    711 #endif
    712 }
    713 
    714 /* 0: non faith, 1: faith */
    715 static int
    716 map6to4(struct sockaddr_in6 *dst6, struct sockaddr_in *dst4)
    717 {
    718 	memset(dst4, 0, sizeof(*dst4));
    719 	dst4->sin_len = sizeof(*dst4);
    720 	dst4->sin_family = AF_INET;
    721 	dst4->sin_port = dst6->sin6_port;
    722 	memcpy(&dst4->sin_addr, &dst6->sin6_addr.s6_addr[12],
    723 		sizeof(dst4->sin_addr));
    724 
    725 	if (dst4->sin_addr.s_addr == INADDR_ANY
    726 	 || dst4->sin_addr.s_addr == INADDR_BROADCAST
    727 	 || IN_MULTICAST(ntohl(dst4->sin_addr.s_addr)))
    728 		return 0;
    729 
    730 	return 1;
    731 }
    732 
    733 #ifdef FAITH4
    734 /* 0: non faith, 1: faith */
    735 static int
    736 map4to6(struct sockaddr_in *dst4, struct sockaddr_in6 *dst6)
    737 {
    738 	char host[NI_MAXHOST];
    739 	char serv[NI_MAXSERV];
    740 	struct addrinfo hints, *res;
    741 	int ai_errno;
    742 
    743 	if (getnameinfo((struct sockaddr *)dst4, dst4->sin_len, host, sizeof(host),
    744 			serv, sizeof(serv), NI_NAMEREQD|NI_NUMERICSERV) != 0)
    745 		return 0;
    746 
    747 	memset(&hints, 0, sizeof(hints));
    748 	hints.ai_flags = 0;
    749 	hints.ai_family = AF_INET6;
    750 	hints.ai_socktype = SOCK_STREAM;
    751 	hints.ai_protocol = 0;
    752 
    753 	if ((ai_errno = getaddrinfo(host, serv, &hints, &res)) != 0) {
    754 		syslog(LOG_INFO, "%s %s: %s", host, serv,
    755 		    gai_strerror(ai_errno));
    756 		return 0;
    757 	}
    758 
    759 	memcpy(dst6, res->ai_addr, res->ai_addrlen);
    760 
    761 	freeaddrinfo(res);
    762 
    763 	return 1;
    764 }
    765 #endif /* FAITH4 */
    766 
    767 static void
    768 sig_child(int sig)
    769 {
    770 	int status;
    771 	pid_t pid;
    772 
    773 	while ((pid = wait3(&status, WNOHANG, (struct rusage *)0)) > 0)
    774 		if (WEXITSTATUS(status))
    775 			syslog(LOG_WARNING, "child %d exit status 0x%x",
    776 			    pid, status);
    777 }
    778 
    779 void
    780 sig_terminate(int sig)
    781 {
    782 	syslog(LOG_INFO, "Terminating faith daemon");
    783 	exit(EXIT_SUCCESS);
    784 }
    785 
    786 static void
    787 start_daemon(void)
    788 {
    789 #ifdef SA_NOCLDWAIT
    790 	struct sigaction sa;
    791 #endif
    792 
    793 	if (daemon(0, 0) == -1)
    794 		exit_stderr("daemon: %s", strerror(errno));
    795 
    796 #ifdef SA_NOCLDWAIT
    797 	memset(&sa, 0, sizeof(sa));
    798 	sa.sa_handler = sig_child;
    799 	sa.sa_flags = SA_NOCLDWAIT;
    800 	sigemptyset(&sa.sa_mask);
    801 	sigaction(SIGCHLD, &sa, (struct sigaction *)0);
    802 #else
    803 	if (signal(SIGCHLD, sig_child) == SIG_ERR) {
    804 		exit_failure("signal CHLD: %s", strerror(errno));
    805 		/*NOTREACHED*/
    806 	}
    807 #endif
    808 
    809 	if (signal(SIGTERM, sig_terminate) == SIG_ERR) {
    810 		exit_failure("signal TERM: %s", strerror(errno));
    811 		/*NOTREACHED*/
    812 	}
    813 }
    814 
    815 static void
    816 exit_stderr(const char *fmt, ...)
    817 {
    818 	va_list ap;
    819 	char buf[BUFSIZ];
    820 
    821 	va_start(ap, fmt);
    822 	vsnprintf(buf, sizeof(buf), fmt, ap);
    823 	va_end(ap);
    824 	fprintf(stderr, "%s\n", buf);
    825 	exit(EXIT_FAILURE);
    826 }
    827 
    828 void
    829 exit_failure(const char *fmt, ...)
    830 {
    831 	va_list ap;
    832 	char buf[BUFSIZ];
    833 
    834 	va_start(ap, fmt);
    835 	vsnprintf(buf, sizeof(buf), fmt, ap);
    836 	va_end(ap);
    837 	syslog(LOG_ERR, "%s", buf);
    838 	exit(EXIT_FAILURE);
    839 }
    840 
    841 void
    842 exit_success(const char *fmt, ...)
    843 {
    844 	va_list ap;
    845 	char buf[BUFSIZ];
    846 
    847 	va_start(ap, fmt);
    848 	vsnprintf(buf, sizeof(buf), fmt, ap);
    849 	va_end(ap);
    850 	syslog(LOG_INFO, "%s", buf);
    851 	exit(EXIT_SUCCESS);
    852 }
    853 
    854 #ifdef USE_ROUTE
    855 static void
    856 grab_myaddrs()
    857 {
    858 	struct ifaddrs *ifap, *ifa;
    859 	struct myaddrs *p;
    860 	struct sockaddr_in6 *sin6;
    861 
    862 	if (getifaddrs(&ifap) != 0) {
    863 		exit_failure("getifaddrs");
    864 		/*NOTREACHED*/
    865 	}
    866 
    867 	for (ifa = ifap; ifa; ifa = ifa->ifa_next) {
    868 		switch (ifa->ifa_addr->sa_family) {
    869 		case AF_INET:
    870 		case AF_INET6:
    871 			break;
    872 		default:
    873 			continue;
    874 		}
    875 
    876 		p = (struct myaddrs *)malloc(sizeof(struct myaddrs) +
    877 		    ifa->ifa_addr->sa_len);
    878 		if (!p) {
    879 			exit_failure("not enough core");
    880 			/*NOTREACHED*/
    881 		}
    882 		memcpy(p + 1, ifa->ifa_addr, ifa->ifa_addr->sa_len);
    883 		p->next = myaddrs;
    884 		p->addr = (struct sockaddr *)(p + 1);
    885 #ifdef __KAME__
    886 		if (ifa->ifa_addr->sa_family == AF_INET6) {
    887 			sin6 = (struct sockaddr_in6 *)p->addr;
    888 			if (IN6_IS_ADDR_LINKLOCAL(&sin6->sin6_addr)
    889 			 || IN6_IS_ADDR_SITELOCAL(&sin6->sin6_addr)) {
    890 				sin6->sin6_scope_id =
    891 					ntohs(*(u_int16_t *)&sin6->sin6_addr.s6_addr[2]);
    892 				sin6->sin6_addr.s6_addr[2] = 0;
    893 				sin6->sin6_addr.s6_addr[3] = 0;
    894 			}
    895 		}
    896 #endif
    897 		myaddrs = p;
    898 		if (dflag) {
    899 			char hbuf[NI_MAXHOST];
    900 			getnameinfo(p->addr, p->addr->sa_len,
    901 				hbuf, sizeof(hbuf), NULL, 0,
    902 				NI_NUMERICHOST);
    903 			syslog(LOG_INFO, "my interface: %s %s", hbuf,
    904 			    ifa->ifa_name);
    905 		}
    906 	}
    907 
    908 	freeifaddrs(ifap);
    909 }
    910 
    911 static void
    912 free_myaddrs()
    913 {
    914 	struct myaddrs *p, *q;
    915 
    916 	p = myaddrs;
    917 	while (p) {
    918 		q = p->next;
    919 		free(p);
    920 		p = q;
    921 	}
    922 	myaddrs = NULL;
    923 }
    924 
    925 static void
    926 update_myaddrs()
    927 {
    928 	char msg[BUFSIZ];
    929 	int len;
    930 	struct rt_msghdr *rtm;
    931 
    932 	len = read(sockfd, msg, sizeof(msg));
    933 	if (len < 0) {
    934 		syslog(LOG_ERR, "read(PF_ROUTE) failed");
    935 		return;
    936 	}
    937 	rtm = (struct rt_msghdr *)msg;
    938 	if (len < 4 || len < rtm->rtm_msglen) {
    939 		syslog(LOG_ERR, "read(PF_ROUTE) short read");
    940 		return;
    941 	}
    942 	if (rtm->rtm_version != RTM_VERSION) {
    943 		syslog(LOG_ERR, "routing socket version mismatch");
    944 		close(sockfd);
    945 		sockfd = 0;
    946 		return;
    947 	}
    948 	switch (rtm->rtm_type) {
    949 	case RTM_NEWADDR:
    950 	case RTM_DELADDR:
    951 	case RTM_IFINFO:
    952 		break;
    953 	default:
    954 		return;
    955 	}
    956 	/* XXX more filters here? */
    957 
    958 	syslog(LOG_INFO, "update interface address list");
    959 	free_myaddrs();
    960 	grab_myaddrs();
    961 }
    962 #endif /*USE_ROUTE*/
    963 
    964 static void
    965 usage()
    966 {
    967 	fprintf(stderr, "usage: %s [-dp] [-f conf] service [serverpath [serverargs]]\n",
    968 		faithdname);
    969 	exit(0);
    970 }
    971