X-Git-Url: https://tinc-vpn.org/git/browse?p=tinc;a=blobdiff_plain;f=src%2Froute.c;h=0799c48c6e097dc0e9995223107967eab1def0b3;hp=77fb7d17e123454f66eca4245e8346a433d0a61b;hb=f219f156cf13fd30369d7cd4632c406ffd6ff628;hpb=ab90fa9bd1a653a330be7ef11293000721a0e7b4 diff --git a/src/route.c b/src/route.c index 77fb7d17..0799c48c 100644 --- a/src/route.c +++ b/src/route.c @@ -17,7 +17,7 @@ along with this program; if not, write to the Free Software Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA. - $Id: route.c,v 1.1.2.27 2002/03/01 14:25:10 guus Exp $ + $Id: route.c,v 1.1.2.32 2002/03/12 14:25:04 guus Exp $ */ #include "config.h" @@ -33,6 +33,10 @@ #else #include #endif +#ifdef NEIGHBORSOL +#include +#include +#endif #include #include #include @@ -97,6 +101,7 @@ void age_mac(void) cp for(node = myself->subnet_tree->head; node; node = next) { + next = node->next; s = (subnet_t *)node->data; if(s->type == SUBNET_MAC && s->net.mac.lastseen && s->net.mac.lastseen + macexpire < now) { @@ -183,6 +188,134 @@ cp return subnet->owner; } +#ifdef NEIGHBORSOL +unsigned short int ipv6_cksum(short int *data, int len, unsigned short int cksum) +{ + while(len--) + { + cksum += ntohs(*data++); + } + return cksum; +} + +void route_neighborsol(vpn_packet_t *packet) +{ + struct ip6_hdr *hdr; + struct nd_neighbor_solicit *ns; + struct nd_opt_hdr *opt; + subnet_t *subnet; + short int cksum; + + struct { + struct in6_addr ip6_src; /* source address */ + struct in6_addr ip6_dst; /* destination address */ + uint32_t length; + uint8_t junk[4]; + } pseudo; + +cp + hdr = (struct ip6_hdr *)(packet->data + 14); + ns = (struct nd_neighbor_solicit *)(packet->data + 14 + sizeof(struct ip6_hdr)); + opt = (struct nd_opt_hdr *)(packet->data + 14 + sizeof(struct ip6_hdr) + sizeof(struct nd_neighbor_solicit)); + + /* First, snatch the source address from the neighbor solicitation packet */ + + memcpy(mymac.net.mac.address.x, packet->data + 6, 6); + + /* Check if this is a valid neighbor solicitation request */ + + if(ns->nd_ns_hdr.icmp6_type != ND_NEIGHBOR_SOLICIT || + opt->nd_opt_type != ND_OPT_SOURCE_LINKADDR) + { + if(debug_lvl > DEBUG_TRAFFIC) + { + syslog(LOG_WARNING, _("Cannot route packet: received unknown type neighbor solicitation request")); + } + return; + } + + /* Check if the IPv6 address exists on the VPN */ +#if 0 + subnet = lookup_subnet_ipv6((ipv6_t *)&ns->nd_ns_target); + + if(!subnet) + { + if(debug_lvl >= DEBUG_TRAFFIC) + { + syslog(LOG_WARNING, _("Cannot route packet: neighbor solicitation request for unknown address %hx:%hx:%hx:%hx:%hx:%hx:%hx:%hx"), + ntohs(ns->nd_ns_target.s6_addr16[0]), ntohs(ns->nd_ns_target.s6_addr16[1]), ntohs(ns->nd_ns_target.s6_addr16[2]), ntohs(ns->nd_ns_target.s6_addr16[3]), + ntohs(ns->nd_ns_target.s6_addr16[4]), ntohs(ns->nd_ns_target.s6_addr16[5]), ntohs(ns->nd_ns_target.s6_addr16[6]), ntohs(ns->nd_ns_target.s6_addr16[7])); + } + + return; + } + + /* Check if it is for our own subnet */ + + if(subnet->owner == myself) + return; /* silently ignore */ +#endif + + syslog(LOG_DEBUG, "Neighbor solicitation request with checksum %hx", ntohs(ns->nd_ns_hdr.icmp6_cksum)); + + /* Create pseudo header */ + + memcpy(&pseudo.ip6_src, &hdr->ip6_src, 16); + memcpy(&pseudo.ip6_dst, &hdr->ip6_dst, 16); + pseudo.length = htonl(sizeof(*ns)); + pseudo.junk[0] = pseudo.junk[1] = pseudo.junk[2] = 0; + pseudo.junk[3] = IPPROTO_ICMPV6; + + /* Generate checksum */ + + ns->nd_ns_hdr.icmp6_cksum = 0; + + cksum = ipv6_cksum((short int *)&pseudo, sizeof(pseudo)/2, 0); + + syslog(LOG_DEBUG, "Our checksum %hx", cksum); + + cksum = ipv6_cksum((short int *)ns, sizeof(*ns)/2, cksum); + + syslog(LOG_DEBUG, "Our checksum %hx", cksum); + + cksum = ipv6_cksum((short int *)opt, sizeof(*opt)/2, cksum); + + syslog(LOG_DEBUG, "Our checksum %hx", cksum); + + /* Create neighbor advertation reply */ + + memcpy(packet->data, packet->data + ETHER_ADDR_LEN, ETHER_ADDR_LEN); /* copy destination address */ + packet->data[ETHER_ADDR_LEN*2 - 1] ^= 0xFF; /* mangle source address so it looks like it's not from us */ + + memcpy(&hdr->ip6_dst, &hdr->ip6_src, 16); /* swap destination and source protocol address */ + memcpy(&hdr->ip6_src, &ns->nd_ns_target, 16); /* ... */ + + memcpy((char *)opt + sizeof(*opt), packet->data + ETHER_ADDR_LEN, 6); /* add fake source hard addr */ + + ns->nd_ns_hdr.icmp6_cksum = 0; + ns->nd_ns_hdr.icmp6_type = ND_NEIGHBOR_ADVERT; + opt->nd_opt_type = ND_OPT_TARGET_LINKADDR; + + /* Create pseudo header */ + + memcpy(&pseudo.ip6_src, &hdr->ip6_src, 16); + memcpy(&pseudo.ip6_dst, &hdr->ip6_dst, 16); + pseudo.length = htonl(sizeof(struct icmp6_hdr)); + pseudo.junk[0] = pseudo.junk[1] = pseudo.junk[2] = 0; + pseudo.junk[3] = IPPROTO_ICMPV6; + + /* Generate checksum */ + + cksum = ipv6_cksum((short int *)&pseudo, sizeof(pseudo)/2, 0); + cksum = ipv6_cksum((short int *)ns, sizeof(*ns)/2, cksum); + + ns->nd_ns_hdr.icmp6_cksum = htons(cksum); + + write_packet(packet); +cp +} +#endif + void route_arp(vpn_packet_t *packet) { struct ether_arp *arp; @@ -215,7 +348,7 @@ cp return; } - /* Check if the IP address exists on the VPN */ + /* Check if the IPv4 address exists on the VPN */ subnet = lookup_subnet_ipv4((ipv4_t *)arp->arp_tpa); @@ -253,7 +386,7 @@ cp void route_outgoing(vpn_packet_t *packet) { unsigned short int type; - node_t *n; + node_t *n = NULL; cp /* FIXME: multicast? */ @@ -268,6 +401,13 @@ cp break; case 0x86DD: n = route_ipv6(packet); +#ifdef NEIGHBORSOL + if(!n && packet->data[0] == 0x33 && packet->data[1] == 0x33 && packet->data[2] == 0xff) + { + route_neighborsol(packet); + return; + } +#endif break; case 0x0806: route_arp(packet); @@ -303,9 +443,22 @@ void route_incoming(node_t *source, vpn_packet_t *packet) { case RMODE_ROUTER: { - node_t *n; + node_t *n = NULL; + unsigned short int type; - n = route_ipv4(packet); + type = ntohs(*((unsigned short*)(&packet->data[12]))); + switch(type) + { + case 0x0800: + n = route_ipv4(packet); + break; + case 0x86DD: + n = route_ipv6(packet); + break; + default: + n = myself; + break; + } if(n) {