/*
This file is part of GNUnet.
Copyright (C) 2010, 2011, 2012 Christian Grothoff
GNUnet is free software: you can redistribute it and/or modify it
under the terms of the GNU Affero General Public License as published
by the Free Software Foundation, either version 3 of the License,
or (at your option) any later version.
GNUnet is distributed in the hope that it will be useful, but
WITHOUT ANY WARRANTY; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
Affero General Public License for more details.
You should have received a copy of the GNU Affero General Public License
along with this program. If not, see .
*/
/**
* @file exit/gnunet-helper-exit.c
*
* @brief the helper for exit nodes. Opens a virtual
* network-interface, sends data received on the if to stdout, sends
* data received on stdin to the interface. The code also enables
* IPv4/IPv6 forwarding and NAT on the current system (the latter on
* an interface specified on the command-line); these changes to the
* network configuration are NOT automatically undone when the program
* is stopped (this is because we cannot be sure that some other
* application didn't enable them before or after us; also, these
* changes should be mostly harmless as it simply turns the system
* into a router).
*
* @author Philipp Tölke
* @author Christian Grothoff
*
* The following list of people have reviewed this code and considered
* it safe since the last modification (if you reviewed it, please
* have your name added to the list):
*
* - Philipp Tölke
*/
#include "platform.h"
#include
/**
* Need 'struct GNUNET_MessageHeader'.
*/
#include "gnunet_crypto_lib.h"
#include "gnunet_common.h"
/**
* Need VPN message types.
*/
#include "gnunet_protocols.h"
/**
* Should we print (interesting|debug) messages that can happen during
* normal operation?
*/
#define DEBUG GNUNET_NO
/**
* Maximum size of a GNUnet message (GNUNET_MAX_MESSAGE_SIZE)
*/
#define MAX_SIZE 65536
/**
* Path to 'sysctl' binary.
*/
static const char *sbin_sysctl;
/**
* Path to 'iptables' binary.
*/
static const char *sbin_iptables;
#ifndef _LINUX_IN6_H
/**
* This is in linux/include/net/ipv6.h, but not always exported...
*/
struct in6_ifreq
{
struct in6_addr ifr6_addr;
uint32_t ifr6_prefixlen; /* __u32 in the original */
int ifr6_ifindex;
};
#endif
/**
* Open '/dev/null' and make the result the given
* file descriptor.
*
* @param target_fd desired FD to point to /dev/null
* @param flags open flags (O_RDONLY, O_WRONLY)
*/
static void
open_dev_null (int target_fd,
int flags)
{
int fd;
fd = open ("/dev/null", flags);
if (-1 == fd)
abort ();
if (fd == target_fd)
return;
if (-1 == dup2 (fd, target_fd))
{
(void) close (fd);
abort ();
}
(void) close (fd);
}
/**
* Run the given command and wait for it to complete.
*
* @param file name of the binary to run
* @param cmd command line arguments (as given to 'execv')
* @return 0 on success, 1 on any error
*/
static int
fork_and_exec (const char *file,
char *const cmd[])
{
int status;
pid_t pid;
pid_t ret;
pid = fork ();
if (-1 == pid)
{
fprintf (stderr,
"fork failed: %s\n",
strerror (errno));
return 1;
}
if (0 == pid)
{
/* we are the child process */
/* close stdin/stdout to not cause interference
with the helper's main protocol! */
(void) close (0);
open_dev_null (0, O_RDONLY);
(void) close (1);
open_dev_null (1, O_WRONLY);
(void) execv (file, cmd);
/* can only get here on error */
fprintf (stderr,
"exec `%s' failed: %s\n",
file,
strerror (errno));
_exit (1);
}
/* keep running waitpid as long as the only error we get is 'EINTR' */
while ( (-1 == (ret = waitpid (pid, &status, 0))) &&
(errno == EINTR) );
if (-1 == ret)
{
fprintf (stderr,
"waitpid failed: %s\n",
strerror (errno));
return 1;
}
if (! (WIFEXITED (status) && (0 == WEXITSTATUS (status))))
return 1;
/* child process completed and returned success, we're happy */
return 0;
}
/**
* Creates a tun-interface called dev;
*
* @param dev is asumed to point to a char[IFNAMSIZ]
* if *dev == '\\0', uses the name supplied by the kernel;
* @return the fd to the tun or -1 on error
*/
static int
init_tun (char *dev)
{
struct ifreq ifr;
int fd;
if (NULL == dev)
{
errno = EINVAL;
return -1;
}
if (-1 == (fd = open ("/dev/net/tun", O_RDWR)))
{
fprintf (stderr, "Error opening `%s': %s\n", "/dev/net/tun",
strerror (errno));
return -1;
}
if (fd >= FD_SETSIZE)
{
fprintf (stderr, "File descriptor to large: %d", fd);
(void) close (fd);
return -1;
}
memset (&ifr, 0, sizeof (ifr));
ifr.ifr_flags = IFF_TUN;
if ('\0' != *dev)
strncpy (ifr.ifr_name, dev, IFNAMSIZ);
if (-1 == ioctl (fd, TUNSETIFF, (void *) &ifr))
{
fprintf (stderr,
"Error with ioctl on `%s': %s\n", "/dev/net/tun",
strerror (errno));
(void) close (fd);
return -1;
}
strcpy (dev, ifr.ifr_name);
return fd;
}
/**
* @brief Sets the IPv6-Address given in address on the interface dev
*
* @param dev the interface to configure
* @param address the IPv6-Address
* @param prefix_len the length of the network-prefix
*/
static void
set_address6 (const char *dev, const char *address, unsigned long prefix_len)
{
struct ifreq ifr;
struct sockaddr_in6 sa6;
int fd;
struct in6_ifreq ifr6;
/*
* parse the new address
*/
memset (&sa6, 0, sizeof (struct sockaddr_in6));
sa6.sin6_family = AF_INET6;
if (1 != inet_pton (AF_INET6, address, &sa6.sin6_addr))
{
fprintf (stderr, "Failed to parse address `%s': %s\n", address,
strerror (errno));
exit (1);
}
if (-1 == (fd = socket (PF_INET6, SOCK_DGRAM, 0)))
{
fprintf (stderr, "Error creating socket: %s\n", strerror (errno));
exit (1);
}
memset (&ifr, 0, sizeof (struct ifreq));
/*
* Get the index of the if
*/
strncpy (ifr.ifr_name, dev, IFNAMSIZ);
if (-1 == ioctl (fd, SIOGIFINDEX, &ifr))
{
fprintf (stderr, "ioctl failed at %d: %s\n", __LINE__, strerror (errno));
(void) close (fd);
exit (1);
}
memset (&ifr6, 0, sizeof (struct in6_ifreq));
ifr6.ifr6_addr = sa6.sin6_addr;
ifr6.ifr6_ifindex = ifr.ifr_ifindex;
ifr6.ifr6_prefixlen = prefix_len;
/*
* Set the address
*/
if (-1 == ioctl (fd, SIOCSIFADDR, &ifr6))
{
fprintf (stderr, "ioctl failed at line %d: %s\n", __LINE__,
strerror (errno));
(void) close (fd);
exit (1);
}
/*
* Get the flags
*/
if (-1 == ioctl (fd, SIOCGIFFLAGS, &ifr))
{
fprintf (stderr, "ioctl failed at line %d: %s\n", __LINE__,
strerror (errno));
(void) close (fd);
exit (1);
}
/*
* Add the UP and RUNNING flags
*/
ifr.ifr_flags |= IFF_UP | IFF_RUNNING;
if (-1 == ioctl (fd, SIOCSIFFLAGS, &ifr))
{
fprintf (stderr, "ioctl failed at line %d: %s\n", __LINE__,
strerror (errno));
(void) close (fd);
exit (1);
}
if (0 != close (fd))
{
fprintf (stderr, "close failed: %s\n", strerror (errno));
exit (1);
}
}
/**
* @brief Sets the IPv4-Address given in address on the interface dev
*
* @param dev the interface to configure
* @param address the IPv4-Address
* @param mask the netmask
*/
static void
set_address4 (const char *dev, const char *address, const char *mask)
{
int fd;
struct sockaddr_in *addr;
struct ifreq ifr;
memset (&ifr, 0, sizeof (struct ifreq));
addr = (struct sockaddr_in *) &(ifr.ifr_addr);
addr->sin_family = AF_INET;
/*
* Parse the address
*/
if (1 != inet_pton (AF_INET, address, &addr->sin_addr.s_addr))
{
fprintf (stderr, "Failed to parse address `%s': %s\n", address,
strerror (errno));
exit (1);
}
if (-1 == (fd = socket (PF_INET, SOCK_DGRAM, 0)))
{
fprintf (stderr, "Error creating socket: %s\n", strerror (errno));
exit (1);
}
strncpy (ifr.ifr_name, dev, IFNAMSIZ);
/*
* Set the address
*/
if (-1 == ioctl (fd, SIOCSIFADDR, &ifr))
{
fprintf (stderr, "ioctl failed at %d: %s\n", __LINE__, strerror (errno));
(void) close (fd);
exit (1);
}
/*
* Parse the netmask
*/
addr = (struct sockaddr_in *) &(ifr.ifr_netmask);
if (1 != inet_pton (AF_INET, mask, &addr->sin_addr.s_addr))
{
fprintf (stderr, "Failed to parse address `%s': %s\n", mask,
strerror (errno));
(void) close (fd);
exit (1);
}
/*
* Set the netmask
*/
if (-1 == ioctl (fd, SIOCSIFNETMASK, &ifr))
{
fprintf (stderr, "ioctl failed at line %d: %s\n", __LINE__,
strerror (errno));
(void) close (fd);
exit (1);
}
/*
* Get the flags
*/
if (-1 == ioctl (fd, SIOCGIFFLAGS, &ifr))
{
fprintf (stderr, "ioctl failed at line %d: %s\n", __LINE__,
strerror (errno));
(void) close (fd);
exit (1);
}
/*
* Add the UP and RUNNING flags
*/
ifr.ifr_flags |= IFF_UP | IFF_RUNNING;
if (-1 == ioctl (fd, SIOCSIFFLAGS, &ifr))
{
fprintf (stderr, "ioctl failed at line %d: %s\n", __LINE__,
strerror (errno));
(void) close (fd);
exit (1);
}
if (0 != close (fd))
{
fprintf (stderr, "close failed: %s\n", strerror (errno));
(void) close (fd);
exit (1);
}
}
/**
* Start forwarding to and from the tunnel.
*
* @param fd_tun tunnel FD
*/
static void
run (int fd_tun)
{
/*
* The buffer filled by reading from fd_tun
*/
unsigned char buftun[MAX_SIZE];
ssize_t buftun_size = 0;
unsigned char *buftun_read = NULL;
/*
* The buffer filled by reading from stdin
*/
unsigned char bufin[MAX_SIZE];
ssize_t bufin_size = 0;
size_t bufin_rpos = 0;
unsigned char *bufin_read = NULL;
fd_set fds_w;
fd_set fds_r;
/* read refers to reading from fd_tun, writing to stdout */
int read_open = 1;
/* write refers to reading from stdin, writing to fd_tun */
int write_open = 1;
while ((1 == read_open) && (1 == write_open))
{
FD_ZERO (&fds_w);
FD_ZERO (&fds_r);
/*
* We are supposed to read and the buffer is empty
* -> select on read from tun
*/
if (read_open && (0 == buftun_size))
FD_SET (fd_tun, &fds_r);
/*
* We are supposed to read and the buffer is not empty
* -> select on write to stdout
*/
if (read_open && (0 != buftun_size))
FD_SET (1, &fds_w);
/*
* We are supposed to write and the buffer is empty
* -> select on read from stdin
*/
if (write_open && (NULL == bufin_read))
FD_SET (0, &fds_r);
/*
* We are supposed to write and the buffer is not empty
* -> select on write to tun
*/
if (write_open && (NULL != bufin_read))
FD_SET (fd_tun, &fds_w);
int r = select (fd_tun + 1, &fds_r, &fds_w, NULL, NULL);
if (-1 == r)
{
if (EINTR == errno)
continue;
fprintf (stderr, "select failed: %s\n", strerror (errno));
exit (1);
}
if (r > 0)
{
if (FD_ISSET (fd_tun, &fds_r))
{
buftun_size =
read (fd_tun, buftun + sizeof (struct GNUNET_MessageHeader),
MAX_SIZE - sizeof (struct GNUNET_MessageHeader));
if (-1 == buftun_size)
{
fprintf (stderr,
"read-error: %s\n",
strerror (errno));
shutdown (fd_tun, SHUT_RD);
shutdown (1, SHUT_WR);
read_open = 0;
buftun_size = 0;
}
else if (0 == buftun_size)
{
#if DEBUG
fprintf (stderr, "EOF on tun\n");
#endif
shutdown (fd_tun, SHUT_RD);
shutdown (1, SHUT_WR);
read_open = 0;
buftun_size = 0;
}
else
{
buftun_read = buftun;
struct GNUNET_MessageHeader *hdr =
(struct GNUNET_MessageHeader *) buftun;
buftun_size += sizeof (struct GNUNET_MessageHeader);
hdr->type = htons (GNUNET_MESSAGE_TYPE_VPN_HELPER);
hdr->size = htons (buftun_size);
}
}
else if (FD_ISSET (1, &fds_w))
{
ssize_t written = write (1, buftun_read, buftun_size);
if (-1 == written)
{
#if !DEBUG
if (errno != EPIPE)
#endif
fprintf (stderr,
"write-error to stdout: %s\n",
strerror (errno));
shutdown (fd_tun, SHUT_RD);
shutdown (1, SHUT_WR);
read_open = 0;
buftun_size = 0;
}
else if (0 == written)
{
fprintf (stderr, "write returned 0!?\n");
exit (1);
}
else
{
buftun_size -= written;
buftun_read += written;
}
}
if (FD_ISSET (0, &fds_r))
{
bufin_size = read (0, bufin + bufin_rpos, MAX_SIZE - bufin_rpos);
if (-1 == bufin_size)
{
fprintf (stderr, "read-error: %s\n", strerror (errno));
shutdown (0, SHUT_RD);
shutdown (fd_tun, SHUT_WR);
write_open = 0;
bufin_size = 0;
}
else if (0 == bufin_size)
{
#if DEBUG
fprintf (stderr, "EOF on stdin\n");
#endif
shutdown (0, SHUT_RD);
shutdown (fd_tun, SHUT_WR);
write_open = 0;
bufin_size = 0;
}
else
{
struct GNUNET_MessageHeader *hdr;
PROCESS_BUFFER:
bufin_rpos += bufin_size;
if (bufin_rpos < sizeof (struct GNUNET_MessageHeader))
continue;
hdr = (struct GNUNET_MessageHeader *) bufin;
if (ntohs (hdr->type) != GNUNET_MESSAGE_TYPE_VPN_HELPER)
{
fprintf (stderr, "protocol violation!\n");
exit (1);
}
if (ntohs (hdr->size) > bufin_rpos)
continue;
bufin_read = bufin + sizeof (struct GNUNET_MessageHeader);
bufin_size = ntohs (hdr->size) - sizeof (struct GNUNET_MessageHeader);
bufin_rpos -= bufin_size + sizeof (struct GNUNET_MessageHeader);
}
}
else if (FD_ISSET (fd_tun, &fds_w))
{
ssize_t written = write (fd_tun, bufin_read, bufin_size);
if (-1 == written)
{
fprintf (stderr, "write-error to tun: %s\n", strerror (errno));
shutdown (0, SHUT_RD);
shutdown (fd_tun, SHUT_WR);
write_open = 0;
bufin_size = 0;
}
else if (0 == written)
{
fprintf (stderr, "write returned 0!?\n");
exit (1);
}
else
{
bufin_size -= written;
bufin_read += written;
if (0 == bufin_size)
{
memmove (bufin, bufin_read, bufin_rpos);
bufin_read = NULL; /* start reading again */
bufin_size = 0;
goto PROCESS_BUFFER;
}
}
}
}
}
}
/**
* Open VPN tunnel interface.
*
* @param argc must be 6
* @param argv 0: binary name ("gnunet-helper-exit")
* 1: tunnel interface name ("gnunet-exit")
* 2: "physical" interface name ("eth0"), or "-" to not setup NAT
* and routing
* 3: IPv6 address ("::1"), or "-" to skip IPv6
* 4: IPv6 netmask length in bits ("64") [ignored if #4 is "-"]
* 5: IPv4 address ("1.2.3.4"), or "-" to skip IPv4
* 6: IPv4 netmask ("255.255.0.0") [ignored if #4 is "-"]
*/
int
main (int argc, char **argv)
{
char dev[IFNAMSIZ];
int fd_tun;
int global_ret;
if (7 != argc)
{
fprintf (stderr, "Fatal: must supply 6 arguments!\n");
return 1;
}
if ( (0 == strcmp (argv[3], "-")) &&
(0 == strcmp (argv[5], "-")) )
{
fprintf (stderr, "Fatal: disabling both IPv4 and IPv6 makes no sense.\n");
return 1;
}
if (0 != strcmp (argv[2], "-"))
{
if (0 == access ("/sbin/iptables", X_OK))
sbin_iptables = "/sbin/iptables";
else if (0 == access ("/usr/sbin/iptables", X_OK))
sbin_iptables = "/usr/sbin/iptables";
else
{
fprintf (stderr,
"Fatal: executable iptables not found in approved directories: %s\n",
strerror (errno));
return 1;
}
if (0 == access ("/sbin/sysctl", X_OK))
sbin_sysctl = "/sbin/sysctl";
else if (0 == access ("/usr/sbin/sysctl", X_OK))
sbin_sysctl = "/usr/sbin/sysctl";
else
{
fprintf (stderr,
"Fatal: executable sysctl not found in approved directories: %s\n",
strerror (errno));
return 1;
}
}
strncpy (dev, argv[1], IFNAMSIZ);
dev[IFNAMSIZ - 1] = '\0';
if (-1 == (fd_tun = init_tun (dev)))
{
fprintf (stderr,
"Fatal: could not initialize tun-interface `%s' with IPv6 %s/%s and IPv4 %s/%s\n",
dev,
argv[3],
argv[4],
argv[5],
argv[6]);
return 1;
}
if (0 != strcmp (argv[3], "-"))
{
{
const char *address = argv[3];
long prefix_len = atol (argv[4]);
if ((prefix_len < 1) || (prefix_len > 127))
{
fprintf (stderr, "Fatal: prefix_len out of range\n");
return 1;
}
set_address6 (dev, address, prefix_len);
}
if (0 != strcmp (argv[2], "-"))
{
char *const sysctl_args[] =
{
"sysctl", "-w", "net.ipv6.conf.all.forwarding=1", NULL
};
if (0 != fork_and_exec (sbin_sysctl,
sysctl_args))
{
fprintf (stderr,
"Failed to enable IPv6 forwarding. Will continue anyway.\n");
}
}
}
if (0 != strcmp (argv[5], "-"))
{
{
const char *address = argv[5];
const char *mask = argv[6];
set_address4 (dev, address, mask);
}
if (0 != strcmp (argv[2], "-"))
{
{
char *const sysctl_args[] =
{
"sysctl", "-w", "net.ipv4.ip_forward=1", NULL
};
if (0 != fork_and_exec (sbin_sysctl,
sysctl_args))
{
fprintf (stderr,
"Failed to enable IPv4 forwarding. Will continue anyway.\n");
}
}
{
char *const iptables_args[] =
{
"iptables", "-t", "nat", "-A", "POSTROUTING", "-o", argv[2], "-j", "MASQUERADE", NULL
};
if (0 != fork_and_exec (sbin_iptables,
iptables_args))
{
fprintf (stderr,
"Failed to enable IPv4 masquerading (NAT). Will continue anyway.\n");
}
}
}
}
uid_t uid = getuid ();
#ifdef HAVE_SETRESUID
if (0 != setresuid (uid, uid, uid))
{
fprintf (stderr, "Failed to setresuid: %s\n", strerror (errno));
global_ret = 2;
goto cleanup;
}
#else
if (0 != (setuid (uid) | seteuid (uid)))
{
fprintf (stderr, "Failed to setuid: %s\n", strerror (errno));
global_ret = 2;
goto cleanup;
}
#endif
if (SIG_ERR == signal (SIGPIPE, SIG_IGN))
{
fprintf (stderr, "Failed to protect against SIGPIPE: %s\n",
strerror (errno));
/* no exit, we might as well die with SIGPIPE should it ever happen */
}
run (fd_tun);
global_ret = 0;
cleanup:
(void) close (fd_tun);
return global_ret;
}
/* end of gnunet-helper-exit.c */