Home | History | Annotate | Line # | Download | only in faithd
faithd.c revision 1.30
      1 /*	$NetBSD: faithd.c,v 1.30 2003/09/02 22:57:29 itojun Exp $	*/
      2 /*	$KAME: faithd.c,v 1.62 2003/08/19 21:20:33 itojun Exp $	*/
      3 
      4 /*
      5  * Copyright (C) 1997 and 1998 WIDE Project.
      6  * All rights reserved.
      7  *
      8  * Redistribution and use in source and binary forms, with or without
      9  * modification, are permitted provided that the following conditions
     10  * are met:
     11  * 1. Redistributions of source code must retain the above copyright
     12  *    notice, this list of conditions and the following disclaimer.
     13  * 2. Redistributions in binary form must reproduce the above copyright
     14  *    notice, this list of conditions and the following disclaimer in the
     15  *    documentation and/or other materials provided with the distribution.
     16  * 3. Neither the name of the project nor the names of its contributors
     17  *    may be used to endorse or promote products derived from this software
     18  *    without specific prior written permission.
     19  *
     20  * THIS SOFTWARE IS PROVIDED BY THE PROJECT AND CONTRIBUTORS ``AS IS'' AND
     21  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
     22  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
     23  * ARE DISCLAIMED.  IN NO EVENT SHALL THE PROJECT OR CONTRIBUTORS BE LIABLE
     24  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
     25  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
     26  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
     27  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
     28  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
     29  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
     30  * SUCH DAMAGE.
     31  */
     32 
     33 /*
     34  * User level translator from IPv6 to IPv4.
     35  *
     36  * Usage: faithd [<port> <progpath> <arg1(progname)> <arg2> ...]
     37  *   e.g. faithd telnet /usr/local/v6/sbin/telnetd telnetd
     38  */
     39 
     40 #include <sys/param.h>
     41 #include <sys/types.h>
     42 #include <sys/sysctl.h>
     43 #include <sys/socket.h>
     44 #include <sys/wait.h>
     45 #include <sys/stat.h>
     46 #include <sys/time.h>
     47 #include <sys/ioctl.h>
     48 
     49 #include <poll.h>
     50 #include <stdio.h>
     51 #include <stdlib.h>
     52 #include <stdarg.h>
     53 #include <string.h>
     54 #include <syslog.h>
     55 #include <unistd.h>
     56 #include <errno.h>
     57 #include <signal.h>
     58 #include <fcntl.h>
     59 #include <termios.h>
     60 
     61 #include <net/if_types.h>
     62 #ifdef IFT_FAITH
     63 # define USE_ROUTE
     64 # include <net/if.h>
     65 # include <net/route.h>
     66 # include <net/if_dl.h>
     67 #endif
     68 
     69 #include <netinet/in.h>
     70 #include <arpa/inet.h>
     71 #include <netdb.h>
     72 #include <ifaddrs.h>
     73 
     74 #include "faithd.h"
     75 #include "prefix.h"
     76 
     77 char *serverpath = NULL;
     78 char *serverarg[MAXARGV + 1];
     79 static char *faithdname = NULL;
     80 char logname[BUFSIZ];
     81 char procname[BUFSIZ];
     82 struct myaddrs {
     83 	struct myaddrs *next;
     84 	struct sockaddr *addr;
     85 };
     86 struct myaddrs *myaddrs = NULL;
     87 static const char *service;
     88 #ifdef USE_ROUTE
     89 static int sockfd = 0;
     90 #endif
     91 int dflag = 0;
     92 static int pflag = 0;
     93 static int inetd = 0;
     94 static char *configfile = NULL;
     95 
     96 int main __P((int, char **));
     97 static int inetd_main __P((int, char **));
     98 static int daemon_main __P((int, char **));
     99 static void play_service __P((int));
    100 static void play_child __P((int, struct sockaddr *));
    101 static int faith_prefix __P((struct sockaddr *));
    102 static int map6to4 __P((struct sockaddr_in6 *, struct sockaddr_in *));
    103 static void sig_child __P((int));
    104 static void sig_terminate __P((int));
    105 static void start_daemon __P((void));
    106 static void exit_stderr __P((const char *, ...))
    107 	__attribute__((__format__(__printf__, 1, 2)));
    108 static void grab_myaddrs __P((void));
    109 static void free_myaddrs __P((void));
    110 static void update_myaddrs __P((void));
    111 static void usage __P((void));
    112 
    113 int
    114 main(int argc, char **argv)
    115 {
    116 
    117 	/*
    118 	 * Initializing stuff
    119 	 */
    120 
    121 	faithdname = strrchr(argv[0], '/');
    122 	if (faithdname)
    123 		faithdname++;
    124 	else
    125 		faithdname = argv[0];
    126 
    127 	if (strcmp(faithdname, "faithd") != 0) {
    128 		inetd = 1;
    129 		return inetd_main(argc, argv);
    130 	} else
    131 		return daemon_main(argc, argv);
    132 }
    133 
    134 static int
    135 inetd_main(int argc, char **argv)
    136 {
    137 	char path[MAXPATHLEN];
    138 	struct sockaddr_storage me;
    139 	struct sockaddr_storage from;
    140 	socklen_t melen, fromlen;
    141 	int i;
    142 	int error;
    143 	const int on = 1;
    144 	char sbuf[NI_MAXSERV], snum[NI_MAXSERV];
    145 
    146 	if (config_load(configfile) < 0 && configfile) {
    147 		exit_failure("could not load config file");
    148 		/*NOTREACHED*/
    149 	}
    150 
    151 	if (strrchr(argv[0], '/') == NULL)
    152 		snprintf(path, sizeof(path), "%s/%s", DEFAULT_DIR, argv[0]);
    153 	else
    154 		snprintf(path, sizeof(path), "%s", argv[0]);
    155 
    156 #ifdef USE_ROUTE
    157 	grab_myaddrs();
    158 
    159 	sockfd = socket(PF_ROUTE, SOCK_RAW, PF_UNSPEC);
    160 	if (sockfd < 0) {
    161 		exit_failure("socket(PF_ROUTE): %s", strerror(errno));
    162 		/*NOTREACHED*/
    163 	}
    164 #endif
    165 
    166 	melen = sizeof(me);
    167 	if (getsockname(STDIN_FILENO, (struct sockaddr *)&me, &melen) < 0) {
    168 		exit_failure("getsockname: %s", strerror(errno));
    169 		/*NOTREACHED*/
    170 	}
    171 	fromlen = sizeof(from);
    172 	if (getpeername(STDIN_FILENO, (struct sockaddr *)&from, &fromlen) < 0) {
    173 		exit_failure("getpeername: %s", strerror(errno));
    174 		/*NOTREACHED*/
    175 	}
    176 	if (getnameinfo((struct sockaddr *)&me, melen, NULL, 0,
    177 	    sbuf, sizeof(sbuf), NI_NUMERICHOST) == 0)
    178 		service = sbuf;
    179 	else
    180 		service = DEFAULT_PORT_NAME;
    181 	if (getnameinfo((struct sockaddr *)&me, melen, NULL, 0,
    182 	    snum, sizeof(snum), NI_NUMERICHOST) != 0)
    183 		snprintf(snum, sizeof(snum), "?");
    184 
    185 	snprintf(logname, sizeof(logname), "faithd %s", snum);
    186 	snprintf(procname, sizeof(procname), "accepting port %s", snum);
    187 	openlog(logname, LOG_PID | LOG_NOWAIT, LOG_DAEMON);
    188 
    189 	if (argc >= MAXARGV) {
    190 		exit_failure("too many arguments");
    191 		/*NOTREACHED*/
    192 	}
    193 	serverarg[0] = serverpath = path;
    194 	for (i = 1; i < argc; i++)
    195 		serverarg[i] = argv[i];
    196 	serverarg[i] = NULL;
    197 
    198 	error = setsockopt(STDIN_FILENO, SOL_SOCKET, SO_OOBINLINE, &on,
    199 	    sizeof(on));
    200 	if (error < 0) {
    201 		exit_failure("setsockopt(SO_OOBINLINE): %s", strerror(errno));
    202 		/*NOTREACHED*/
    203 	}
    204 
    205 	play_child(STDIN_FILENO, (struct sockaddr *)&from);
    206 	exit_failure("should not reach here");
    207 	return 0;	/*dummy!*/
    208 }
    209 
    210 static int
    211 daemon_main(int argc, char **argv)
    212 {
    213 	struct addrinfo hints, *res;
    214 	int s_wld, error, i, serverargc, on = 1;
    215 	int family = AF_INET6;
    216 	int c;
    217 
    218 	while ((c = getopt(argc, argv, "df:p")) != -1) {
    219 		switch (c) {
    220 		case 'd':
    221 			dflag++;
    222 			break;
    223 		case 'f':
    224 			configfile = optarg;
    225 			break;
    226 		case 'p':
    227 			pflag++;
    228 			break;
    229 		default:
    230 			usage();
    231 			/*NOTREACHED*/
    232 		}
    233 	}
    234 	argc -= optind;
    235 	argv += optind;
    236 
    237 	if (config_load(configfile) < 0 && configfile) {
    238 		exit_failure("could not load config file");
    239 		/*NOTREACHED*/
    240 	}
    241 
    242 
    243 #ifdef USE_ROUTE
    244 	grab_myaddrs();
    245 #endif
    246 
    247 	switch (argc) {
    248 	case 0:
    249 		usage();
    250 		/*NOTREACHED*/
    251 	default:
    252 		serverargc = argc - NUMARG;
    253 		if (serverargc >= MAXARGV)
    254 			exit_stderr("too many arguments");
    255 
    256 		serverpath = strdup(argv[NUMPRG]);
    257 		if (!serverpath)
    258 			exit_stderr("not enough core");
    259 		for (i = 0; i < serverargc; i++) {
    260 			serverarg[i] = strdup(argv[i + NUMARG]);
    261 			if (!serverarg[i])
    262 				exit_stderr("not enough core");
    263 		}
    264 		serverarg[i] = NULL;
    265 		/* fall throuth */
    266 	case 1:	/* no local service */
    267 		service = argv[NUMPRT];
    268 		break;
    269 	}
    270 
    271 	start_daemon();
    272 
    273 	/*
    274 	 * Opening wild card socket for this service.
    275 	 */
    276 
    277 	memset(&hints, 0, sizeof(hints));
    278 	hints.ai_flags = AI_PASSIVE;
    279 	hints.ai_family = family;
    280 	hints.ai_socktype = SOCK_STREAM;
    281 	hints.ai_protocol = IPPROTO_TCP;	/* SCTP? */
    282 	error = getaddrinfo(NULL, service, &hints, &res);
    283 	if (error)
    284 		exit_failure("getaddrinfo: %s", gai_strerror(error));
    285 
    286 	s_wld = socket(res->ai_family, res->ai_socktype, res->ai_protocol);
    287 	if (s_wld == -1)
    288 		exit_failure("socket: %s", strerror(errno));
    289 
    290 #ifdef IPV6_FAITH
    291 	if (res->ai_family == AF_INET6) {
    292 		error = setsockopt(s_wld, IPPROTO_IPV6, IPV6_FAITH, &on, sizeof(on));
    293 		if (error == -1)
    294 			exit_failure("setsockopt(IPV6_FAITH): %s",
    295 			    strerror(errno));
    296 	}
    297 #endif
    298 
    299 	error = setsockopt(s_wld, SOL_SOCKET, SO_REUSEADDR, &on, sizeof(on));
    300 	if (error == -1)
    301 		exit_failure("setsockopt(SO_REUSEADDR): %s", strerror(errno));
    302 
    303 	error = setsockopt(s_wld, SOL_SOCKET, SO_OOBINLINE, &on, sizeof(on));
    304 	if (error == -1)
    305 		exit_failure("setsockopt(SO_OOBINLINE): %s", strerror(errno));
    306 
    307 #ifdef IPV6_V6ONLY
    308 	error = setsockopt(s_wld, IPPROTO_IPV6, IPV6_V6ONLY, &on, sizeof(on));
    309 	if (error == -1)
    310 		exit_failure("setsockopt(IPV6_V6ONLY): %s", strerror(errno));
    311 #endif
    312 
    313 	error = bind(s_wld, (struct sockaddr *)res->ai_addr, res->ai_addrlen);
    314 	if (error == -1)
    315 		exit_failure("bind: %s", strerror(errno));
    316 
    317 	error = listen(s_wld, 5);
    318 	if (error == -1)
    319 		exit_failure("listen: %s", strerror(errno));
    320 
    321 #ifdef USE_ROUTE
    322 	sockfd = socket(PF_ROUTE, SOCK_RAW, PF_UNSPEC);
    323 	if (sockfd < 0) {
    324 		exit_failure("socket(PF_ROUTE): %s", strerror(errno));
    325 		/*NOTREACHED*/
    326 	}
    327 #endif
    328 
    329 	/*
    330 	 * Everything is OK.
    331 	 */
    332 
    333 	snprintf(logname, sizeof(logname), "faithd %s", service);
    334 	snprintf(procname, sizeof(procname), "accepting port %s", service);
    335 	openlog(logname, LOG_PID | LOG_NOWAIT, LOG_DAEMON);
    336 	syslog(LOG_INFO, "Staring faith daemon for %s port", service);
    337 
    338 	play_service(s_wld);
    339 	/* NOTREACHED */
    340 	exit(1);	/*pacify gcc*/
    341 }
    342 
    343 static void
    344 play_service(int s_wld)
    345 {
    346 	struct sockaddr_storage srcaddr;
    347 	socklen_t len;
    348 	int s_src;
    349 	pid_t child_pid;
    350 	struct pollfd pfd[2];
    351 	int error;
    352 
    353 	/*
    354 	 * Wait, accept, fork, faith....
    355 	 */
    356 again:
    357 	setproctitle("%s", procname);
    358 
    359 	pfd[0].fd = s_wld;
    360 	pfd[0].events = POLLIN;
    361 	pfd[1].fd = -1;
    362 	pfd[1].revents = 0;
    363 #ifdef USE_ROUTE
    364 	if (sockfd) {
    365 		pfd[1].fd = sockfd;
    366 		pfd[1].events = POLLIN;
    367 	}
    368 #endif
    369 
    370 	error = poll(pfd, sizeof(pfd)/sizeof(pfd[0]), 0);
    371 	if (error < 0) {
    372 		if (errno == EINTR)
    373 			goto again;
    374 		exit_failure("select: %s", strerror(errno));
    375 		/*NOTREACHED*/
    376 	}
    377 
    378 #ifdef USE_ROUTE
    379 	if (pfd[1].revents & POLLIN)
    380 	{
    381 		update_myaddrs();
    382 	}
    383 #endif
    384 	if (pfd[0].revents & POLLIN)
    385 	{
    386 		len = sizeof(srcaddr);
    387 		s_src = accept(s_wld, (struct sockaddr *)&srcaddr, &len);
    388 		if (s_src < 0) {
    389 			if (errno == ECONNABORTED)
    390 				goto again;
    391 			exit_failure("socket: %s", strerror(errno));
    392 			/*NOTREACHED*/
    393 		}
    394 		if (srcaddr.ss_family == AF_INET6 &&
    395 		    IN6_IS_ADDR_V4MAPPED(&((struct sockaddr_in6 *)&srcaddr)->sin6_addr)) {
    396 			close(s_src);
    397 			syslog(LOG_ERR, "connection from IPv4 mapped address?");
    398 			goto again;
    399 		}
    400 
    401 		child_pid = fork();
    402 
    403 		if (child_pid == 0) {
    404 			/* child process */
    405 			close(s_wld);
    406 			closelog();
    407 			openlog(logname, LOG_PID | LOG_NOWAIT, LOG_DAEMON);
    408 			play_child(s_src, (struct sockaddr *)&srcaddr);
    409 			exit_failure("should never reach here");
    410 			/*NOTREACHED*/
    411 		} else {
    412 			/* parent process */
    413 			close(s_src);
    414 			if (child_pid == -1)
    415 				syslog(LOG_ERR, "can't fork");
    416 		}
    417 	}
    418 	goto again;
    419 }
    420 
    421 static void
    422 play_child(int s_src, struct sockaddr *srcaddr)
    423 {
    424 	struct sockaddr_storage dstaddr6;
    425 	struct sockaddr_storage dstaddr4;
    426 	char src[NI_MAXHOST];
    427 	char dst6[NI_MAXHOST];
    428 	char dst4[NI_MAXHOST];
    429 	socklen_t len = sizeof(dstaddr6);
    430 	int s_dst, error, hport, nresvport, on = 1;
    431 	struct timeval tv;
    432 	struct sockaddr *sa4;
    433 	const struct config *conf;
    434 
    435 	tv.tv_sec = 1;
    436 	tv.tv_usec = 0;
    437 
    438 	getnameinfo(srcaddr, srcaddr->sa_len,
    439 		src, sizeof(src), NULL, 0, NI_NUMERICHOST);
    440 	syslog(LOG_INFO, "accepted a client from %s", src);
    441 
    442 	error = getsockname(s_src, (struct sockaddr *)&dstaddr6, &len);
    443 	if (error == -1) {
    444 		exit_failure("getsockname: %s", strerror(errno));
    445 		/*NOTREACHED*/
    446 	}
    447 
    448 	getnameinfo((struct sockaddr *)&dstaddr6, len,
    449 		dst6, sizeof(dst6), NULL, 0, NI_NUMERICHOST);
    450 	syslog(LOG_INFO, "the client is connecting to %s", dst6);
    451 
    452 	if (!faith_prefix((struct sockaddr *)&dstaddr6)) {
    453 		if (serverpath) {
    454 			/*
    455 			 * Local service
    456 			 */
    457 			syslog(LOG_INFO, "executing local %s", serverpath);
    458 			if (!inetd) {
    459 				dup2(s_src, 0);
    460 				close(s_src);
    461 				dup2(0, 1);
    462 				dup2(0, 2);
    463 			}
    464 			execv(serverpath, serverarg);
    465 			syslog(LOG_ERR, "execv %s: %s", serverpath,
    466 			    strerror(errno));
    467 			_exit(EXIT_FAILURE);
    468 		} else {
    469 			close(s_src);
    470 			exit_success("no local service for %s", service);
    471 		}
    472 	}
    473 
    474 	/*
    475 	 * Act as a translator
    476 	 */
    477 
    478 	switch (((struct sockaddr *)&dstaddr6)->sa_family) {
    479 	case AF_INET6:
    480 		if (!map6to4((struct sockaddr_in6 *)&dstaddr6,
    481 		    (struct sockaddr_in *)&dstaddr4)) {
    482 			close(s_src);
    483 			exit_failure("map6to4 failed");
    484 			/*NOTREACHED*/
    485 		}
    486 		syslog(LOG_INFO, "translating from v6 to v4");
    487 		break;
    488 	default:
    489 		close(s_src);
    490 		exit_failure("family not supported");
    491 		/*NOTREACHED*/
    492 	}
    493 
    494 	sa4 = (struct sockaddr *)&dstaddr4;
    495 	getnameinfo(sa4, sa4->sa_len,
    496 		dst4, sizeof(dst4), NULL, 0, NI_NUMERICHOST);
    497 
    498 	conf = config_match(srcaddr, sa4);
    499 	if (!conf || !conf->permit) {
    500 		close(s_src);
    501 		if (conf) {
    502 			exit_failure("translation to %s not permitted for %s",
    503 			    dst4, prefix_string(&conf->match));
    504 			/*NOTREACHED*/
    505 		} else {
    506 			exit_failure("translation to %s not permitted", dst4);
    507 			/*NOTREACHED*/
    508 		}
    509 	}
    510 
    511 	syslog(LOG_INFO, "the translator is connecting to %s", dst4);
    512 
    513 	setproctitle("port %s, %s -> %s", service, src, dst4);
    514 
    515 	if (sa4->sa_family == AF_INET6)
    516 		hport = ntohs(((struct sockaddr_in6 *)&dstaddr4)->sin6_port);
    517 	else /* AF_INET */
    518 		hport = ntohs(((struct sockaddr_in *)&dstaddr4)->sin_port);
    519 
    520 	if (pflag)
    521 		s_dst = rresvport_af(&nresvport, sa4->sa_family);
    522 	else
    523 		s_dst = socket(sa4->sa_family, SOCK_STREAM, 0);
    524 	if (s_dst < 0) {
    525 		exit_failure("socket: %s", strerror(errno));
    526 		/*NOTREACHED*/
    527 	}
    528 
    529 	if (conf->src.a.ss_family) {
    530 		if (bind(s_dst, (const struct sockaddr *)&conf->src.a,
    531 		    conf->src.a.ss_len) < 0) {
    532 			exit_failure("bind: %s", strerror(errno));
    533 			/*NOTREACHED*/
    534 		}
    535 	}
    536 
    537 	error = setsockopt(s_dst, SOL_SOCKET, SO_OOBINLINE, &on, sizeof(on));
    538 	if (error < 0) {
    539 		exit_failure("setsockopt(SO_OOBINLINE): %s", strerror(errno));
    540 		/*NOTREACHED*/
    541 	}
    542 
    543 	error = setsockopt(s_src, SOL_SOCKET, SO_SNDTIMEO, &tv, sizeof(tv));
    544 	if (error < 0) {
    545 		exit_failure("setsockopt(SO_SNDTIMEO): %s", strerror(errno));
    546 		/*NOTREACHED*/
    547 	}
    548 	error = setsockopt(s_dst, SOL_SOCKET, SO_SNDTIMEO, &tv, sizeof(tv));
    549 	if (error < 0) {
    550 		exit_failure("setsockopt(SO_SNDTIMEO): %s", strerror(errno));
    551 		/*NOTREACHED*/
    552 	}
    553 
    554 	error = connect(s_dst, sa4, sa4->sa_len);
    555 	if (error < 0) {
    556 		exit_failure("connect: %s", strerror(errno));
    557 		/*NOTREACHED*/
    558 	}
    559 
    560 	switch (hport) {
    561 	case FTP_PORT:
    562 		ftp_relay(s_src, s_dst);
    563 		break;
    564 	default:
    565 		tcp_relay(s_src, s_dst, service);
    566 		break;
    567 	}
    568 
    569 	/* NOTREACHED */
    570 }
    571 
    572 /* 0: non faith, 1: faith */
    573 static int
    574 faith_prefix(struct sockaddr *dst)
    575 {
    576 #ifndef USE_ROUTE
    577 	int mib[4], size;
    578 	struct in6_addr faith_prefix;
    579 	struct sockaddr_in6 *dst6 = (struct sockaddr_in *)dst;
    580 
    581 	if (dst->sa_family != AF_INET6)
    582 		return 0;
    583 
    584 	mib[0] = CTL_NET;
    585 	mib[1] = PF_INET6;
    586 	mib[2] = IPPROTO_IPV6;
    587 	mib[3] = IPV6CTL_FAITH_PREFIX;
    588 	size = sizeof(struct in6_addr);
    589 	if (sysctl(mib, 4, &faith_prefix, &size, NULL, 0) < 0) {
    590 		exit_failure("sysctl: %s", strerror(errno));
    591 		/*NOTREACHED*/
    592 	}
    593 
    594 	if (memcmp(dst, &faith_prefix,
    595 			sizeof(struct in6_addr) - sizeof(struct in_addr) == 0) {
    596 		return 1;
    597 	}
    598 	return 0;
    599 #else
    600 	struct myaddrs *p;
    601 	struct sockaddr_in6 *sin6;
    602 	struct sockaddr_in *sin4;
    603 	struct sockaddr_in6 *dst6;
    604 	struct sockaddr_in *dst4;
    605 	struct sockaddr_in dstmap;
    606 
    607 	dst6 = (struct sockaddr_in6 *)dst;
    608 	if (dst->sa_family == AF_INET6
    609 	 && IN6_IS_ADDR_V4MAPPED(&dst6->sin6_addr)) {
    610 		/* ugly... */
    611 		memset(&dstmap, 0, sizeof(dstmap));
    612 		dstmap.sin_family = AF_INET;
    613 		dstmap.sin_len = sizeof(dstmap);
    614 		memcpy(&dstmap.sin_addr, &dst6->sin6_addr.s6_addr[12],
    615 			sizeof(dstmap.sin_addr));
    616 		dst = (struct sockaddr *)&dstmap;
    617 	}
    618 
    619 	dst6 = (struct sockaddr_in6 *)dst;
    620 	dst4 = (struct sockaddr_in *)dst;
    621 
    622 	for (p = myaddrs; p; p = p->next) {
    623 		sin6 = (struct sockaddr_in6 *)p->addr;
    624 		sin4 = (struct sockaddr_in *)p->addr;
    625 
    626 		if (p->addr->sa_len != dst->sa_len
    627 		 || p->addr->sa_family != dst->sa_family)
    628 			continue;
    629 
    630 		switch (dst->sa_family) {
    631 		case AF_INET6:
    632 			if (sin6->sin6_scope_id == dst6->sin6_scope_id
    633 			 && IN6_ARE_ADDR_EQUAL(&sin6->sin6_addr, &dst6->sin6_addr))
    634 				return 0;
    635 			break;
    636 		case AF_INET:
    637 			if (sin4->sin_addr.s_addr == dst4->sin_addr.s_addr)
    638 				return 0;
    639 			break;
    640 		}
    641 	}
    642 	return 1;
    643 #endif
    644 }
    645 
    646 /* 0: non faith, 1: faith */
    647 static int
    648 map6to4(struct sockaddr_in6 *dst6, struct sockaddr_in *dst4)
    649 {
    650 	memset(dst4, 0, sizeof(*dst4));
    651 	dst4->sin_len = sizeof(*dst4);
    652 	dst4->sin_family = AF_INET;
    653 	dst4->sin_port = dst6->sin6_port;
    654 	memcpy(&dst4->sin_addr, &dst6->sin6_addr.s6_addr[12],
    655 		sizeof(dst4->sin_addr));
    656 
    657 	if (dst4->sin_addr.s_addr == INADDR_ANY
    658 	 || dst4->sin_addr.s_addr == INADDR_BROADCAST
    659 	 || IN_MULTICAST(ntohl(dst4->sin_addr.s_addr)))
    660 		return 0;
    661 
    662 	return 1;
    663 }
    664 
    665 
    666 static void
    667 sig_child(int sig)
    668 {
    669 	int status;
    670 	pid_t pid;
    671 
    672 	while ((pid = wait3(&status, WNOHANG, (struct rusage *)0)) > 0)
    673 		if (WEXITSTATUS(status))
    674 			syslog(LOG_WARNING, "child %ld exit status 0x%x",
    675 			    (long)pid, status);
    676 }
    677 
    678 void
    679 sig_terminate(int sig)
    680 {
    681 	syslog(LOG_INFO, "Terminating faith daemon");
    682 	exit(EXIT_SUCCESS);
    683 }
    684 
    685 static void
    686 start_daemon(void)
    687 {
    688 #ifdef SA_NOCLDWAIT
    689 	struct sigaction sa;
    690 #endif
    691 
    692 	if (daemon(0, 0) == -1)
    693 		exit_stderr("daemon: %s", strerror(errno));
    694 
    695 #ifdef SA_NOCLDWAIT
    696 	memset(&sa, 0, sizeof(sa));
    697 	sa.sa_handler = sig_child;
    698 	sa.sa_flags = SA_NOCLDWAIT;
    699 	sigemptyset(&sa.sa_mask);
    700 	sigaction(SIGCHLD, &sa, (struct sigaction *)0);
    701 #else
    702 	if (signal(SIGCHLD, sig_child) == SIG_ERR) {
    703 		exit_failure("signal CHLD: %s", strerror(errno));
    704 		/*NOTREACHED*/
    705 	}
    706 #endif
    707 
    708 	if (signal(SIGTERM, sig_terminate) == SIG_ERR) {
    709 		exit_failure("signal TERM: %s", strerror(errno));
    710 		/*NOTREACHED*/
    711 	}
    712 }
    713 
    714 static void
    715 exit_stderr(const char *fmt, ...)
    716 {
    717 	va_list ap;
    718 	char buf[BUFSIZ];
    719 
    720 	va_start(ap, fmt);
    721 	vsnprintf(buf, sizeof(buf), fmt, ap);
    722 	va_end(ap);
    723 	fprintf(stderr, "%s\n", buf);
    724 	exit(EXIT_FAILURE);
    725 }
    726 
    727 void
    728 exit_failure(const char *fmt, ...)
    729 {
    730 	va_list ap;
    731 	char buf[BUFSIZ];
    732 
    733 	va_start(ap, fmt);
    734 	vsnprintf(buf, sizeof(buf), fmt, ap);
    735 	va_end(ap);
    736 	syslog(LOG_ERR, "%s", buf);
    737 	exit(EXIT_FAILURE);
    738 }
    739 
    740 void
    741 exit_success(const char *fmt, ...)
    742 {
    743 	va_list ap;
    744 	char buf[BUFSIZ];
    745 
    746 	va_start(ap, fmt);
    747 	vsnprintf(buf, sizeof(buf), fmt, ap);
    748 	va_end(ap);
    749 	syslog(LOG_INFO, "%s", buf);
    750 	exit(EXIT_SUCCESS);
    751 }
    752 
    753 #ifdef USE_ROUTE
    754 static void
    755 grab_myaddrs()
    756 {
    757 	struct ifaddrs *ifap, *ifa;
    758 	struct myaddrs *p;
    759 	struct sockaddr_in6 *sin6;
    760 
    761 	if (getifaddrs(&ifap) != 0) {
    762 		exit_failure("getifaddrs");
    763 		/*NOTREACHED*/
    764 	}
    765 
    766 	for (ifa = ifap; ifa; ifa = ifa->ifa_next) {
    767 		switch (ifa->ifa_addr->sa_family) {
    768 		case AF_INET:
    769 		case AF_INET6:
    770 			break;
    771 		default:
    772 			continue;
    773 		}
    774 
    775 		p = (struct myaddrs *)malloc(sizeof(struct myaddrs) +
    776 		    ifa->ifa_addr->sa_len);
    777 		if (!p) {
    778 			exit_failure("not enough core");
    779 			/*NOTREACHED*/
    780 		}
    781 		memcpy(p + 1, ifa->ifa_addr, ifa->ifa_addr->sa_len);
    782 		p->next = myaddrs;
    783 		p->addr = (struct sockaddr *)(p + 1);
    784 #ifdef __KAME__
    785 		if (ifa->ifa_addr->sa_family == AF_INET6) {
    786 			sin6 = (struct sockaddr_in6 *)p->addr;
    787 			if (IN6_IS_ADDR_LINKLOCAL(&sin6->sin6_addr)
    788 			 || IN6_IS_ADDR_SITELOCAL(&sin6->sin6_addr)) {
    789 				sin6->sin6_scope_id =
    790 					ntohs(*(u_int16_t *)&sin6->sin6_addr.s6_addr[2]);
    791 				sin6->sin6_addr.s6_addr[2] = 0;
    792 				sin6->sin6_addr.s6_addr[3] = 0;
    793 			}
    794 		}
    795 #endif
    796 		myaddrs = p;
    797 		if (dflag) {
    798 			char hbuf[NI_MAXHOST];
    799 			getnameinfo(p->addr, p->addr->sa_len,
    800 				hbuf, sizeof(hbuf), NULL, 0,
    801 				NI_NUMERICHOST);
    802 			syslog(LOG_INFO, "my interface: %s %s", hbuf,
    803 			    ifa->ifa_name);
    804 		}
    805 	}
    806 
    807 	freeifaddrs(ifap);
    808 }
    809 
    810 static void
    811 free_myaddrs()
    812 {
    813 	struct myaddrs *p, *q;
    814 
    815 	p = myaddrs;
    816 	while (p) {
    817 		q = p->next;
    818 		free(p);
    819 		p = q;
    820 	}
    821 	myaddrs = NULL;
    822 }
    823 
    824 static void
    825 update_myaddrs()
    826 {
    827 	char msg[BUFSIZ];
    828 	int len;
    829 	struct rt_msghdr *rtm;
    830 
    831 	len = read(sockfd, msg, sizeof(msg));
    832 	if (len < 0) {
    833 		syslog(LOG_ERR, "read(PF_ROUTE) failed");
    834 		return;
    835 	}
    836 	rtm = (struct rt_msghdr *)msg;
    837 	if (len < 4 || len < rtm->rtm_msglen) {
    838 		syslog(LOG_ERR, "read(PF_ROUTE) short read");
    839 		return;
    840 	}
    841 	if (rtm->rtm_version != RTM_VERSION) {
    842 		syslog(LOG_ERR, "routing socket version mismatch");
    843 		close(sockfd);
    844 		sockfd = 0;
    845 		return;
    846 	}
    847 	switch (rtm->rtm_type) {
    848 	case RTM_NEWADDR:
    849 	case RTM_DELADDR:
    850 	case RTM_IFINFO:
    851 		break;
    852 	default:
    853 		return;
    854 	}
    855 	/* XXX more filters here? */
    856 
    857 	syslog(LOG_INFO, "update interface address list");
    858 	free_myaddrs();
    859 	grab_myaddrs();
    860 }
    861 #endif /*USE_ROUTE*/
    862 
    863 static void
    864 usage()
    865 {
    866 	fprintf(stderr, "usage: %s [-dp] [-f conf] service [serverpath [serverargs]]\n",
    867 		faithdname);
    868 	exit(0);
    869 }
    870