2 protocol_misc.c -- handle the meta-protocol, miscellaneous functions
3 Copyright (C) 1999-2005 Ivo Timmermans,
4 2000-2013 Guus Sliepen <guus@tinc-vpn.org>
6 This program is free software; you can redistribute it and/or modify
7 it under the terms of the GNU General Public License as published by
8 the Free Software Foundation; either version 2 of the License, or
9 (at your option) any later version.
11 This program is distributed in the hope that it will be useful,
12 but WITHOUT ANY WARRANTY; without even the implied warranty of
13 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
14 GNU General Public License for more details.
16 You should have received a copy of the GNU General Public License along
17 with this program; if not, write to the Free Software Foundation, Inc.,
18 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA.
23 #include "address_cache.h"
25 #include "connection.h"
35 #define MIN(x, y) (((x)<(y))?(x):(y))
38 int maxoutbufsize = 0;
39 int mtu_info_interval = 5;
40 int udp_info_interval = 5;
42 bool send_termreq(connection_t *c) {
43 return send_request(c, "%d", TERMREQ);
46 bool termreq_h(connection_t *c, const char *request) {
52 bool send_ping(connection_t *c) {
53 c->status.pinged = true;
54 c->last_ping_time = now.tv_sec;
56 return send_request(c, "%d", PING);
59 bool ping_h(connection_t *c, const char *request) {
64 bool send_pong(connection_t *c) {
65 return send_request(c, "%d", PONG);
68 bool pong_h(connection_t *c, const char *request) {
70 c->status.pinged = false;
72 /* Successful connection, reset timeout if this is an outgoing connection. */
75 c->outgoing->timeout = 0;
76 reset_address_cache(c->outgoing->address_cache, &c->address);
82 /* Sending and receiving packets via TCP */
84 bool send_tcppacket(connection_t *c, const vpn_packet_t *packet) {
85 /* If there already is a lot of data in the outbuf buffer, discard this packet.
86 We use a very simple Random Early Drop algorithm. */
88 if(2.0 * c->outbuf.len / (float)maxoutbufsize - 1 > (float)rand() / (float)RAND_MAX) {
92 if(!send_request(c, "%d %d", PACKET, packet->len)) {
96 return send_meta(c, (char *)DATA(packet), packet->len);
99 bool tcppacket_h(connection_t *c, const char *request) {
102 if(sscanf(request, "%*d %hd", &len) != 1) {
103 logger(DEBUG_ALWAYS, LOG_ERR, "Got bad %s from %s (%s)", "PACKET", c->name,
108 /* Set reqlen to len, this will tell receive_meta() that a tcppacket is coming. */
115 bool send_sptps_tcppacket(connection_t *c, const char *packet, int len) {
116 /* If there already is a lot of data in the outbuf buffer, discard this packet.
117 We use a very simple Random Early Drop algorithm. */
119 if(2.0 * c->outbuf.len / (float)maxoutbufsize - 1 > (float)rand() / (float)RAND_MAX) {
123 if(!send_request(c, "%d %d", SPTPS_PACKET, len)) {
127 send_meta_raw(c, packet, len);
131 bool sptps_tcppacket_h(connection_t *c, const char *request) {
134 if(sscanf(request, "%*d %hd", &len) != 1) {
135 logger(DEBUG_ALWAYS, LOG_ERR, "Got bad %s from %s (%s)", "SPTPS_PACKET", c->name,
140 /* Set sptpslen to len, this will tell receive_meta() that a SPTPS packet is coming. */
147 /* Transmitting UDP information */
149 bool send_udp_info(node_t *from, node_t *to) {
150 /* If there's a static relay in the path, there's no point in sending the message
151 farther than the static relay. */
152 to = (to->via == myself) ? to->nexthop : to->via;
155 logger(DEBUG_ALWAYS, LOG_ERR, "Something went wrong when selecting relay - possible fake UDP_INFO");
159 /* Skip cases where sending UDP info messages doesn't make sense.
160 This is done here in order to avoid repeating the same logic in multiple callsites. */
166 if(!to->status.reachable) {
175 struct timeval elapsed;
177 timersub(&now, &to->udp_info_sent, &elapsed);
179 if(elapsed.tv_sec < udp_info_interval) {
184 if((myself->options | from->options | to->options) & OPTION_TCPONLY) {
188 if((to->nexthop->options >> 24) < 5) {
192 char *from_address, *from_port;
193 /* If we're the originator, the address we use is irrelevant
194 because the first intermediate node will ignore it.
195 We use our local address as it somewhat makes sense
196 and it's simpler than introducing an encoding for "null" addresses anyway. */
197 sockaddr2str((from != myself) ? &from->address : &to->nexthop->connection->edge->local_address, &from_address, &from_port);
199 bool x = send_request(to->nexthop->connection, "%d %s %s %s %s", UDP_INFO, from->name, to->name, from_address, from_port);
205 to->udp_info_sent = now;
211 bool udp_info_h(connection_t *c, const char *request) {
212 char from_name[MAX_STRING_SIZE];
213 char to_name[MAX_STRING_SIZE];
214 char from_address[MAX_STRING_SIZE];
215 char from_port[MAX_STRING_SIZE];
217 if(sscanf(request, "%*d "MAX_STRING" "MAX_STRING" "MAX_STRING" "MAX_STRING, from_name, to_name, from_address, from_port) != 4) {
218 logger(DEBUG_ALWAYS, LOG_ERR, "Got bad %s from %s (%s)", "UDP_INFO", c->name, c->hostname);
222 if(!check_id(from_name) || !check_id(to_name)) {
223 logger(DEBUG_ALWAYS, LOG_ERR, "Got bad %s from %s (%s): %s", "UDP_INFO", c->name, c->hostname, "invalid name");
227 node_t *from = lookup_node(from_name);
230 logger(DEBUG_ALWAYS, LOG_ERR, "Got %s from %s (%s) origin %s which does not exist in our connection list", "UDP_INFO", c->name, c->hostname, from_name);
234 if(from != from->via) {
235 /* Not supposed to happen, as it means the message wandered past a static relay */
236 logger(DEBUG_PROTOCOL, LOG_WARNING, "Got UDP info message from %s (%s) which we can't reach directly", from->name, from->hostname);
240 /* If we have a direct edge to "from", we are in a better position
241 to guess its address than it is itself. */
242 if(!from->connection && !from->status.udp_confirmed) {
243 sockaddr_t from_addr = str2sockaddr(from_address, from_port);
245 if(sockaddrcmp(&from_addr, &from->address)) {
246 update_node_udp(from, &from_addr);
250 node_t *to = lookup_node(to_name);
253 logger(DEBUG_ALWAYS, LOG_ERR, "Got %s from %s (%s) destination %s which does not exist in our connection list", "UDP_INFO", c->name, c->hostname, to_name);
257 /* Send our own data (which could be what we just received) up the chain. */
259 return send_udp_info(from, to);
262 /* Transmitting MTU information */
264 bool send_mtu_info(node_t *from, node_t *to, int mtu) {
265 /* Skip cases where sending MTU info messages doesn't make sense.
266 This is done here in order to avoid repeating the same logic in multiple callsites. */
272 if(!to->status.reachable) {
281 struct timeval elapsed;
283 timersub(&now, &to->mtu_info_sent, &elapsed);
285 if(elapsed.tv_sec < mtu_info_interval) {
290 if((to->nexthop->options >> 24) < 6) {
294 /* We will send the passed-in MTU value, unless we believe ours is better. */
296 node_t *via = (from->via == myself) ? from->nexthop : from->via;
298 if(from->minmtu == from->maxmtu && from->via == myself) {
299 /* We have a direct measurement. Override the value entirely.
300 Note that we only do that if we are sitting as a static relay in the path;
301 otherwise, we can't guarantee packets will flow through us, and increasing
302 MTU could therefore end up being too optimistic. */
304 } else if(via->minmtu == via->maxmtu) {
305 /* Static relay. Ensure packets will make it through the entire relay path. */
306 mtu = MIN(mtu, via->minmtu);
307 } else if(via->nexthop->minmtu == via->nexthop->maxmtu) {
308 /* Dynamic relay. Ensure packets will make it through the entire relay path. */
309 mtu = MIN(mtu, via->nexthop->minmtu);
313 to->mtu_info_sent = now;
316 /* If none of the conditions above match in the steady state, it means we're using TCP,
317 so the MTU is irrelevant. That said, it is still important to honor the MTU that was passed in,
318 because other parts of the relay path might be able to use UDP, which means they care about the MTU. */
320 return send_request(to->nexthop->connection, "%d %s %s %d", MTU_INFO, from->name, to->name, mtu);
323 bool mtu_info_h(connection_t *c, const char *request) {
324 char from_name[MAX_STRING_SIZE];
325 char to_name[MAX_STRING_SIZE];
328 if(sscanf(request, "%*d "MAX_STRING" "MAX_STRING" %d", from_name, to_name, &mtu) != 3) {
329 logger(DEBUG_ALWAYS, LOG_ERR, "Got bad %s from %s (%s)", "MTU_INFO", c->name, c->hostname);
334 logger(DEBUG_ALWAYS, LOG_ERR, "Got bad %s from %s (%s): %s", "MTU_INFO", c->name, c->hostname, "invalid MTU");
340 if(!check_id(from_name) || !check_id(to_name)) {
341 logger(DEBUG_ALWAYS, LOG_ERR, "Got bad %s from %s (%s): %s", "MTU_INFO", c->name, c->hostname, "invalid name");
345 node_t *from = lookup_node(from_name);
348 logger(DEBUG_ALWAYS, LOG_ERR, "Got %s from %s (%s) origin %s which does not exist in our connection list", "MTU_INFO", c->name, c->hostname, from_name);
352 /* If we don't know the current MTU for that node, use the one we received.
353 Even if we're about to make our own measurements, the value we got from downstream nodes should be pretty close
354 so it's a good idea to use it in the mean time. */
355 if(from->mtu != mtu && from->minmtu != from->maxmtu) {
356 logger(DEBUG_TRAFFIC, LOG_INFO, "Using provisional MTU %d for node %s (%s)", mtu, from->name, from->hostname);
360 node_t *to = lookup_node(to_name);
363 logger(DEBUG_ALWAYS, LOG_ERR, "Got %s from %s (%s) destination %s which does not exist in our connection list", "MTU_INFO", c->name, c->hostname, to_name);
367 /* Continue passing the MTU value (or a better one if we have it) up the chain. */
369 return send_mtu_info(from, to, mtu);