e->to->via = indirect ? n->via : e->to;
e->to->options = e->options;
- if(sockaddrcmp(&e->to->address, &e->address))
- update_node_address(e->to, &e->address);
+ if(sockaddrcmp(&e->to->address, &e->address)) {
+ node = avl_unlink(node_udp_tree, e->to);
+ sockaddrfree(&e->to->address);
+ sockaddrcpy(&e->to->address, &e->address);
+
+ if(e->to->hostname)
+ free(e->to->hostname);
+
+ e->to->hostname = sockaddr2hostname(&e->to->address);
+ avl_insert_node(node_udp_tree, node);
+
+ if(e->to->options & OPTION_PMTU_DISCOVERY) {
+ e->to->mtuprobes = 0;
+ e->to->minmtu = 0;
+ e->to->maxmtu = MTU;
+ if(e->to->status.validkey)
+ send_mtu_probe(e->to);
+ }
+ }
node = avl_alloc_node();
node->data = e->to;
int keylifetime = 0;
int keyexpires = 0;
-bool strictsource = true;
EVP_CIPHER_CTX packet_ctx;
static char lzo_wrkmem[LZO1X_999_MEM_COMPRESS > LZO1X_1_MEM_COMPRESS ? LZO1X_999_MEM_COMPRESS : LZO1X_1_MEM_COMPRESS];
route(n, packet);
}
-static bool authenticate_udppacket(node_t *n, vpn_packet_t *inpkt) {
- char hmac[EVP_MAX_MD_SIZE];
-
- if(inpkt->len < sizeof(inpkt->seqno) + (myself->digest ? myself->maclength : 0))
- return false;
-
- /* Check the message authentication code */
-
- if(myself->digest && myself->maclength) {
- HMAC(myself->digest, myself->key, myself->keylength,
- (char *) &inpkt->seqno, inpkt->len - myself->maclength, hmac, NULL);
-
- if(memcmp(hmac, (char *) &inpkt->seqno + inpkt->len - myself->maclength, myself->maclength))
- return false;
- }
-
- return true;
-}
-
static void receive_udppacket(node_t *n, vpn_packet_t *inpkt)
{
vpn_packet_t pkt1, pkt2;
int nextpkt = 0;
vpn_packet_t *outpkt = pkt[0];
int outlen, outpad;
+ char hmac[EVP_MAX_MD_SIZE];
int i;
cp();
- if(!authenticate_udppacket(n, inpkt)) {
- ifdebug(TRAFFIC) logger(LOG_DEBUG, _("Got unauthenticated packet from %s (%s)"),
- n->name, n->hostname);
+ /* Check packet length */
+
+ if(inpkt->len < sizeof(inpkt->seqno) + myself->maclength) {
+ ifdebug(TRAFFIC) logger(LOG_DEBUG, _("Got too short packet from %s (%s)"),
+ n->name, n->hostname);
return;
}
- inpkt->len -= myself->digest ? myself->maclength : 0;
+ /* Check the message authentication code */
+
+ if(myself->digest && myself->maclength) {
+ inpkt->len -= myself->maclength;
+ HMAC(myself->digest, myself->key, myself->keylength,
+ (char *) &inpkt->seqno, inpkt->len, hmac, NULL);
+
+ if(memcmp(hmac, (char *) &inpkt->seqno + inpkt->len, myself->maclength)) {
+ ifdebug(TRAFFIC) logger(LOG_DEBUG, _("Got unauthenticated packet from %s (%s)"),
+ n->name, n->hostname);
+ return;
+ }
+ }
/* Decrypt the packet */
sockaddr_t from;
socklen_t fromlen = sizeof(from);
node_t *n;
- static time_t lasttime = 0;
cp();
n = lookup_node_udp(&from);
- if(!n && !strictsource && myself->digest && myself->maclength && lasttime != now) {
- avl_node_t *node;
-
- lasttime = now;
-
- for(node = node_tree->head; node; node = node->next) {
- n = node->data;
-
- if(authenticate_udppacket(n, &pkt)) {
- update_node_address(n, &from);
- logger(LOG_DEBUG, _("Updated address of node %s to %s"), n->name, n->hostname);
- break;
- }
- }
- }
-
if(!n) {
hostname = sockaddr2hostname(&from);
- logger(LOG_WARNING, _("Received UDP packet from unknown source %s"), hostname);
+ logger(LOG_WARNING, _("Received UDP packet from unknown source %s"),
+ hostname);
free(hostname);
return;
}
avl_delete(node_udp_tree, n);
}
-void update_node_address(node_t *n, const sockaddr_t *address) {
- avl_node_t *node;
-
- node = avl_unlink(node_udp_tree, n);
- sockaddrfree(&n->address);
- sockaddrcpy(&n->address, address);
-
- if(n->hostname)
- free(n->hostname);
-
- n->hostname = sockaddr2hostname(&n->address);
- avl_insert_node(node_udp_tree, node);
-
- if(n->options & OPTION_PMTU_DISCOVERY) {
- n->mtuprobes = 0;
- n->minmtu = 0;
- n->maxmtu = MTU;
- if(n->status.validkey)
- send_mtu_probe(n);
- }
-}
-
node_t *lookup_node(char *name)
{
node_t n = {0};