X-Git-Url: https://tinc-vpn.org/git/browse?a=blobdiff_plain;f=src%2Fprotocol_subnet.c;h=65ab6e13948cc922f3d8230da495d0f74741f5a0;hb=103543aa2c15d9f1e2aa313a2e593a7524cce484;hp=c284622485120fa1717b08510954ae12e5954313;hpb=5038964032ef55913b2d4741c67bf191b2208abb;p=tinc diff --git a/src/protocol_subnet.c b/src/protocol_subnet.c index c2846224..65ab6e13 100644 --- a/src/protocol_subnet.c +++ b/src/protocol_subnet.c @@ -41,13 +41,13 @@ bool send_add_subnet(connection_t *c, const subnet_t *subnet) { return send_request(c, "%d %x %s %s", ADD_SUBNET, rand(), subnet->owner->name, netstr); } -bool add_subnet_h(connection_t *c) { +bool add_subnet_h(connection_t *c, char *request) { char subnetstr[MAX_STRING_SIZE]; char name[MAX_STRING_SIZE]; node_t *owner; subnet_t s = {0}, *new, *old; - if(sscanf(c->buffer, "%*d %*x " MAX_STRING " " MAX_STRING, name, subnetstr) != 2) { + if(sscanf(request, "%*d %*x " MAX_STRING " " MAX_STRING, name, subnetstr) != 2) { logger(LOG_ERR, "Got bad %s from %s (%s)", "ADD_SUBNET", c->name, c->hostname); return false; @@ -69,7 +69,7 @@ bool add_subnet_h(connection_t *c) { return false; } - if(seen_request(c->buffer)) + if(seen_request(request)) return true; /* Check if the owner of the new subnet is in the connection list */ @@ -115,6 +115,8 @@ bool add_subnet_h(connection_t *c) { /* Ignore if strictsubnets is true, but forward it to others */ if(strictsubnets) { + logger(LOG_WARNING, "Ignoring unauthorized %s from %s (%s): %s", + "ADD_SUBNET", c->name, c->hostname, subnetstr); forward_request(c); return true; } @@ -129,12 +131,13 @@ bool add_subnet_h(connection_t *c) { /* Tell the rest */ - forward_request(c); + if(!tunnelserver) + forward_request(c, request); /* Fast handoff of roaming MAC addresses */ if(s.type == SUBNET_MAC && owner != myself && (old = lookup_subnet(myself, &s)) && old->expires) - old->expires = now; + old->expires = 1; return true; } @@ -148,13 +151,13 @@ bool send_del_subnet(connection_t *c, const subnet_t *s) { return send_request(c, "%d %x %s %s", DEL_SUBNET, rand(), s->owner->name, netstr); } -bool del_subnet_h(connection_t *c) { +bool del_subnet_h(connection_t *c, char *request) { char subnetstr[MAX_STRING_SIZE]; char name[MAX_STRING_SIZE]; node_t *owner; subnet_t s = {0}, *find; - if(sscanf(c->buffer, "%*d %*x " MAX_STRING " " MAX_STRING, name, subnetstr) != 2) { + if(sscanf(request, "%*d %*x " MAX_STRING " " MAX_STRING, name, subnetstr) != 2) { logger(LOG_ERR, "Got bad %s from %s (%s)", "DEL_SUBNET", c->name, c->hostname); return false; @@ -176,7 +179,7 @@ bool del_subnet_h(connection_t *c) { return false; } - if(seen_request(c->buffer)) + if(seen_request(request)) return true; /* Check if the owner of the subnet being deleted is in the connection list */ @@ -224,7 +227,8 @@ bool del_subnet_h(connection_t *c) { /* Tell the rest */ - forward_request(c); + if(!tunnelserver) + forward_request(c, request); if(strictsubnets) return true;