diff options
Diffstat (limited to 'src/op/op.c')
-rw-r--r-- | src/op/op.c | 916 |
1 files changed, 916 insertions, 0 deletions
diff --git a/src/op/op.c b/src/op/op.c new file mode 100644 index 000000000..06ae99950 --- /dev/null +++ b/src/op/op.c @@ -0,0 +1,916 @@ +/** + * op.c + * Onion Proxy + * + * Matej Pfajfar <mp292@cam.ac.uk> + */ + +/* + * Changes : + * $Log$ + * Revision 1.1 2002/06/26 22:45:50 arma + * Initial revision + * + * Revision 1.37 2002/06/14 20:45:56 mp292 + * *** empty log message *** + * + * Revision 1.36 2002/04/02 14:28:01 badbytes + * Final finishes. + * + * Revision 1.35 2002/04/02 10:21:07 badbytes + * *** empty log message *** + * + * Revision 1.34 2002/03/29 08:35:12 badbytes + * Link encryption is now done on the entire cell header for simplicity. + * + * Revision 1.33 2002/03/28 17:57:59 badbytes + * Bug fix. + * + * Revision 1.32 2002/03/28 11:01:43 badbytes + * Now does link-encryption and link-padding. + * + * Revision 1.31 2002/03/12 23:40:32 mp292 + * Started on op<->router connection padding. + * + * Revision 1.30 2002/01/29 02:22:58 mp292 + * Put a timeout on all network I/O. + * + * Revision 1.29 2002/01/26 23:01:55 mp292 + * Reviewed according to Secure-Programs-HOWTO. + * + * Revision 1.28 2002/01/18 20:42:06 mp292 + * Reflects changes to common/onion.c:new_route() + * + * Revision 1.27 2002/01/17 23:49:15 mp292 + * Added size of public key to one of the debugging messages. + * + * Revision 1.26 2002/01/16 23:01:58 mp292 + * First phase of system testing completed (main functionality). + * + * Revision 1.25 2002/01/16 17:01:56 mp292 + * There was a bug in checking whether the incoming connection is local or not. + * + * Revision 1.24 2002/01/16 16:09:32 mp292 + * A pointer cast was missing. Fixed. + * + * Revision 1.23 2002/01/14 13:05:39 badbytes + * System testing in progress. + * + * Revision 1.22 2002/01/11 15:47:25 badbytes + * *** empty log message *** + * + * Revision 1.21 2002/01/09 09:18:35 badbytes + * Now handles EINTR error from accept(). + * + * Revision 1.20 2002/01/09 07:57:18 badbytes + * Ciphers got out of sync, hopefully fixed. + * + * Revision 1.19 2001/12/19 11:15:41 badbytes + * Corrected AF_INET to PF_INET in socket() calls. + * + * Revision 1.18 2001/12/19 08:38:38 badbytes + * Zombie problems hopefully fixed. + * + * Revision 1.17 2001/12/19 08:29:29 badbytes + * Tested. Still some problems with zombies in both op and smtpap. + * + * Revision 1.16 2001/12/18 15:51:58 badbytes + * Connection with onion router established. Will continue testing tomorrow. + * + * Revision 1.15 2001/12/18 14:12:05 badbytes + * Tested up to connect() to onion router. + * + * Revision 1.14 2001/12/18 12:21:11 badbytes + * Forgot to convert port to network order :-) + * + * Revision 1.13 2001/12/18 11:52:27 badbytes + * Coding completed. Proceeding to test. + * + * Revision 1.12 2001/12/17 13:36:15 badbytes + * Writing handle_connection() + * + * Revision 1.11 2001/12/17 08:42:44 badbytes + * getrouters() now returns an array of routers and also writes the length of the array to an int*. + * + * Revision 1.10 2001/12/14 14:45:13 badbytes + * Added range checking for CoinWeight. + * + * Revision 1.9 2001/12/14 14:08:50 badbytes + * getrouters() now returns an array of pointers rather than a linked list + * + * Revision 1.8 2001/12/14 13:31:20 badbytes + * *** empty log message *** + * + * Revision 1.7 2001/12/14 13:17:12 badbytes + * Corrected references to types.h + * + * Revision 1.6 2001/12/14 13:00:30 badbytes + * Changed my mind, routers.c and routers.h stay where they are :-) + * + * Revision 1.5 2001/12/14 12:56:55 badbytes + * Moved routers* to common/ + * + * Revision 1.4 2001/12/14 12:42:50 badbytes + * References to onion.h and onion.o now point to the common/ directory. + * + * Revision 1.3 2001/12/14 12:40:26 badbytes + * Was being stupid - op doesn't need a private key!! Have removed ... + * + * Revision 1.2 2001/12/14 11:27:16 badbytes + * Configuration and server setup completed. + * + * Revision 1.1 2001/12/13 15:15:11 badbytes + * Started coding the onion proxy. + * + */ + +#include <sys/types.h> +#include <sys/socket.h> +#include <sys/time.h> +#include <sys/resource.h> +#include <netinet/in.h> +#include <netdb.h> +#include <arpa/inet.h> +#include <errno.h> +#include <ctype.h> +#include <stdio.h> +#include <unistd.h> +#include <signal.h> +#include <wait.h> + +#include <openssl/err.h> +#include <openssl/rsa.h> +#include <openssl/pem.h> +#include <openssl/evp.h> +#include <openssl/rand.h> + +#include "../common/log.h" +#include "../common/version.h" +#include "../common/onion.h" +#include "../common/utils.h" +#include "../common/cell.h" +#include "../common/scheduler.h" + +#include "config.h" +#include "routers.h" +#include "args.h" +#include "auth.h" +#include "op.h" +#include "ss.h" +#include "crypto.h" +#include "buffers.h" + +/* global variables */ + +/* default logging threshold */ +int loglevel = LOG_ERR; +struct timeval conn_tout; +struct timeval *conn_toutp = &conn_tout; + +/* valid command-line options */ +static char *args = "hf:p:l:"; + +/* valid config file options */ +static config_opt_t options[] = +{ + {"RouterFile", CONFIG_TYPE_STRING, {0}, 0}, + {"CoinWeight", CONFIG_TYPE_DOUBLE, {0}, 0}, + {"MaxConn", CONFIG_TYPE_INT, {0}, 0}, + {"ConnTimeout", CONFIG_TYPE_INT, {0}, 0}, + {"Bandwidth", CONFIG_TYPE_INT, {0}, 0}, + {0} +}; +enum opts { + RouterFile=0, CoinWeight, MaxConn, ConnTimeout, Bandwidth +}; + +int connections = 0; /* number of active connections */ + +/* local host info */ +struct hostent *local_host; +char local_hostname[512]; + +struct sockaddr_in local, remote; /* local and remote address info */ +struct sockaddr_in or_addr; /* onion router address */ + +int request_sock; /* where we listen for connections */ +int new_sock; /* for accepted connections */ +int or_sock; /* for connecting to the first onion router */ + +/* router array */ +routent_t **routerarray = NULL; +int rarray_len = 0; + +/* end of global variables */ + +void send_to_router(int s,unsigned char **outbuf, size_t *outbuflen, size_t *outbuf_dataoffset, size_t *outbuf_datalen, struct timeval *lastsend, struct timeval *interval, sched_t *scheduler, EVP_CIPHER_CTX *ctx) +{ + int retval; + int cells; + int datacells; + int paddingcells; + int i; + int x; + char *px; + struct timeval now; + cell_t cipher; + cell_t *padding; + int cipherlen; + unsigned long elapsed; + + /* calculate the number of cells that need to be sent */ + retval = gettimeofday(&now,NULL); + if (retval == -1) + { + log(LOG_ERR,"Could not get current time!"); + return; + } + + elapsed = 1000000*(now.tv_sec-lastsend->tv_sec) + now.tv_usec-lastsend->tv_usec; + + if (elapsed < 1000000) + { + cells = ((options[Bandwidth].r.i) * 512) / /* number of bytes per second, divided by two */ + (1000000/elapsed); /* fractions of second since last send */ + } + else + { + cells = ((options[Bandwidth].r.i) * 512) * /* number of bytes per second, divided by two */ + (elapsed/1000000); /* 1/fractions of second since last send */ + } + cells /= sizeof(cell_t); + + datacells = (*outbuf_datalen)/sizeof(cell_t); /* number of data cells available */ + if (datacells > cells) + datacells = cells; + paddingcells = cells - datacells; + + /* send the data cells first */ + for (i=0; i<datacells; i++) + { + /* link-encrypt the cell header */ + printf("Cell header plaintext: "); + for(x=0;x<8;x++) { + printf("%u ",*(char *)(*outbuf+*outbuf_dataoffset+x)); + } + printf("\n"); + retval = EVP_EncryptUpdate(ctx, (unsigned char *)&cipher, &cipherlen, *outbuf+*outbuf_dataoffset, 8); + if (!retval) + { + log(LOG_ERR,"Link encryption failed. Exiting."); + exit(-1); + } + printf("Cell header crypttext: "); + px = (char *)&cipher; + for(x=0;x<8;x++) { + printf("%u ",px[x]); + } + printf("\n"); + + /* copy the payload */ + memcpy((void *)cipher.payload, (void *)(*outbuf+*outbuf_dataoffset+8), CELL_PAYLOAD_SIZE); + + /* send the cell */ + log(LOG_DEBUG,"send_to_router(): Trying to send a data/create cell to router."); + retval = write_tout(s,(unsigned char *)&cipher, sizeof(cell_t), conn_toutp); + if (retval < sizeof(cell_t)) + { + log(LOG_ERR,"Connection to the router seems to be lost. Exiting."); + exit(-1); + } + *outbuf_dataoffset += sizeof(cell_t); + *outbuf_datalen -= sizeof(cell_t); + + } + + /* send padding */ + for (i=0; i<cells-datacells; i++) + { + padding = new_padding_cell(); + if (!padding) + { + log(LOG_ERR,"Memory allocation error. Exiting."); + exit(-1); + } + + /* link encrypt the cell header */ + retval = EVP_EncryptUpdate(ctx, (unsigned char *)&cipher, &cipherlen, (unsigned char *)padding, 8); + if (!retval) + { + log(LOG_ERR,"Link encryption failed. Exiting."); + exit(-1); + } + + /* copy the payload */ + memcpy((void *)cipher.payload, (void *)((unsigned char *)padding+8), CELL_PAYLOAD_SIZE); + + /* send the cell */ + log(LOG_DEBUG,"send_to_router(): Trying to send a padding cell to router."); + retval = write_tout(s, (unsigned char *)&cipher, sizeof(cell_t), conn_toutp); + if (retval < sizeof(cell_t)) + { + log(LOG_ERR,"Connection to the router seems to be lost. Exiting."); + exit(-1); + } + + free((void *)padding); + } + + /* update scheduler state, if we've sent anything to the router */ + if (cells) + { + retval = update_sched_entry(scheduler, *lastsend, *interval, now, *interval); + if (retval == -1) + { + log(LOG_ERR,"Scheduler error. Exiting."); + exit(-1); + } + memcpy((void *)lastsend,(void *)&now, sizeof(struct timeval)); + } + +} + +/* deal with a client */ +int handle_connection() +{ + int retval = 0; + int routelen = 0; /* length of the route */ + unsigned int *route = NULL; /* hops in the route as an array of indexes into rarray */ + routent_t *firsthop = NULL; + + uint32_t aci; /* ACI for this connection */ + + unsigned char *onion = NULL; /* holds the onion */ + int onionlen = 0; /* onion length in host order */ + + crypt_path_t **cpath = NULL; /* defines the crypt operations that need to be performed on incoming/outgoing data */ + char *dest_addr = NULL; /* destination address in ASCII format */ + + int dest_addrlen = 0; + char *dest_port = NULL; /* destination port in ASCII format */ + int dest_portlen = 0; + ss_t *ss; /* standard structure */ + + uint32_t router_addr_net; /* address of the first onion router in network order */ + + unsigned char inbuf[1024]; /* buffer for forwarding data between ap and or */ + + unsigned char *outbuf = NULL; /* buffer for cells which are to be transmitted to the first core onion router in the route */ + size_t outbuflen = 0; + size_t outbuf_dataoffset = 0; /* offset to the beginning of the data */ + size_t outbuf_datalen = 0; /* length of the data stored in the buffer */ + + cell_t cellbuf; + int cellbuflen = 0; + + struct timeval lastsend; /* time of last transmission to the onion router */ + struct timeval interval; /* transmission interval */ + + /* link encryption */ + unsigned char f_session_key[8]; + unsigned char f_session_iv[8] = {0,0,0,0,0,0,0,0}; + unsigned char b_session_key[8]; + unsigned char b_session_iv[8] = {0,0,0,0,0,0,0,0}; + EVP_CIPHER_CTX f_ctx; + EVP_CIPHER_CTX b_ctx; + + /* scheduler */ + sched_t *scheduler; + + /* for use with select() */ + fd_set rmask, mask; + int maxfd; + struct timeval *timeout; + + /* get the standard structure */ + retval = process_ss(new_sock, conn_toutp, &ss,&dest_addr, &dest_addrlen, &dest_port, &dest_portlen); + if (retval == -1) + { + log(LOG_ERR,"Error processing the standard structure."); + return -1; + } + log(LOG_DEBUG,"handle_connection() : Destination = %s:%s",dest_addr,dest_port); + + /* choose a route */ + route = (unsigned int *)new_route(options[CoinWeight].r.d, routerarray,rarray_len, &routelen); + if (!route) + { + log(LOG_ERR,"Error choosing a route through the OR network."); + return -1; + } + log(LOG_DEBUG,"handle_connection() : Chosen a route of length %u : ",routelen); + for (retval=routelen-1;retval>=0;retval--) + { + log(LOG_DEBUG,"handle_connection() : %u : %s:%u, %u",routelen-retval,(routerarray[route[retval]])->address,ntohs((routerarray[route[retval]])->port),RSA_size((routerarray[route[retval]])->pkey)); + } + + /* allocate memory for the crypt path */ + cpath = malloc(routelen * sizeof(crypt_path_t *)); + if (!cpath) + { + log(LOG_ERR,"Error allocating memory."); + free(route); + return -1; + } + /* create an onion and calculate crypto keys */ + onion = create_onion(routerarray,rarray_len,route,routelen,&onionlen,cpath); + if (!onion) + { + log(LOG_ERR,"Error creating an onion."); + free(route); + return -1; + } + log(LOG_DEBUG,"handle_connection() : Created an onion of size %u bytes.",onionlen); + log(LOG_DEBUG,"handle_connection() : Crypt path :"); + for (retval=0;retval<routelen;retval++) + { + log(LOG_DEBUG,"handle_connection() : %u/%u",(cpath[retval])->forwf, (cpath[retval])->backf); + } + + /* connect to first onion router */ + or_sock = socket(PF_INET,SOCK_STREAM,IPPROTO_TCP); + if (or_sock < 0) + { + free(route); + free(onion); + free(cpath); + close(new_sock); + log(LOG_ERR,"Error creating socket."); + return -1; + } + log(LOG_DEBUG,"handle_connection() : Socket created."); + + firsthop = routerarray[route[routelen-1]]; + memset((void *)&or_addr,0,sizeof(or_addr)); + or_addr.sin_family=AF_INET; + or_addr.sin_port=firsthop->entry_port; + router_addr_net = firsthop->addr; + memcpy(&or_addr.sin_addr,&router_addr_net,sizeof(struct sockaddr_in)); + log(LOG_DEBUG,"handle_connection() : Trying to connect to %s:%u",inet_ntoa(or_addr.sin_addr), ntohs(or_addr.sin_port)); + retval = connect(or_sock,(struct sockaddr *)&or_addr, sizeof(or_addr)); + if (retval == -1) + { + log(LOG_ERR,"Could not connect to onion router."); + free(route); + free(onion); + free(cpath); + close(or_sock); + close(new_sock); + return -1; + } + log(LOG_DEBUG,"handle_connection() : Connected to first onion router."); + + /* send session key and bandwidth info */ + retval = send_auth(or_sock, options[Bandwidth].r.i, firsthop->pkey, f_session_key, b_session_key); + if (retval == -1) + { + close(or_sock); + close(new_sock); + log(LOG_ERR,"Lost connection to an onion router. Exiting."); + return -1; + } + /* initialize crypto engines */ + EVP_CIPHER_CTX_init(&f_ctx); + EVP_CIPHER_CTX_init(&b_ctx); + EVP_EncryptInit(&f_ctx, EVP_des_ofb(), f_session_key, f_session_iv); + EVP_DecryptInit(&b_ctx, EVP_des_ofb(), b_session_key, b_session_iv); + + /* chose an ACI */ + do + { + retval = RAND_pseudo_bytes((unsigned char *)&aci, 2); + if (retval==-1) + { + log(LOG_ERR,"Random data generator doesn't seem to work. Exiting."); + return -1; + } + } while(!aci); /* don't allow zero ACIs */ + log(LOG_DEBUG,"handle_connection() : ACI %u chosen.",aci); + + /* initialize last time of transmission to now */ + retval = gettimeofday(&lastsend, NULL); + if (retval == -1) + { + log(LOG_ERR,"Could not get current time."); + return -1; + } + /* calculate the transmission interval */ + interval.tv_sec = 0; + interval.tv_usec = 250000/options[Bandwidth].r.i; + /* initialize the scheduler */ + scheduler = new_sched(); + if (!scheduler) + { + log(LOG_ERR,"Could not initialize scheduler."); + return -1; + } + retval = add_sched_entry(scheduler, lastsend, interval); + if (retval == -1) + { + log(LOG_ERR,"Could not initialize scheduler."); + return -1; + } + timeout = NULL; + + /* write the onion into the output buffer */ + retval = buffer_create(aci, (unsigned char *)onion, onionlen, &outbuf, &outbuflen, &outbuf_dataoffset, &outbuf_datalen, cpath, routelen); + if (retval == -1) + { + log(LOG_DEBUG,"handle_connection() : Could not buffer the onion."); + close(or_sock); + return -1; + } + log(LOG_DEBUG,"handle_connection() : Onion buffered for output."); + + /* send standard structure */ + log(LOG_DEBUG,"handle_connection() : Calling send_crypt ... routelen=%u, sizeof(SS) = %u",routelen,sizeof(ss_t)); + retval = buffer_data(aci, (unsigned char *)ss, sizeof(ss_t), &outbuf, &outbuflen, &outbuf_dataoffset, &outbuf_datalen, cpath, routelen); + if (retval == -1) + { + log(LOG_DEBUG,"handle_connection() : Could not buffer the standard structure for output."); + close(or_sock); + return -1; + } + log(LOG_DEBUG,"handle_connection() : Buffered the standard structure header."); + retval = buffer_data(aci, dest_addr,dest_addrlen, &outbuf, &outbuflen, &outbuf_dataoffset, &outbuf_datalen, cpath, routelen); + if (retval == -1) + { + log(LOG_DEBUG,"handle_connection() : Could not buffer the standard structure (dest. address) for output."); + close(or_sock); + return -1; + } + log(LOG_DEBUG,"handle_connection() : Buffered the destination address."); + retval = buffer_data(aci, dest_port, dest_portlen, &outbuf, &outbuflen, &outbuf_dataoffset, &outbuf_datalen, cpath, routelen); + if (retval == -1) + { + log(LOG_DEBUG,"handle_connection() : Could not buffer the standard structure (dest. port) for output."); + close(or_sock); + return -1; + } + log(LOG_DEBUG,"handle_connection() : Buffered the destination port."); + + + /* forward data in both directions, crypt as necessary */ + /* use select() */ + + FD_ZERO(&mask); + FD_SET(new_sock, &mask); + FD_SET(or_sock, &mask); + if (new_sock > or_sock) + maxfd = new_sock; + else + maxfd = or_sock; + + while(1) + { + rmask = mask; + + /* delete old timeout */ + if (timeout) + free((void *)timeout); + /* get the new one */ + retval = sched_trigger(scheduler, &timeout); + if (retval == -1) + { + log(LOG_DEBUG,"Scheduler error."); + break; + } + retval = select(maxfd+1,&rmask,NULL,NULL,timeout); + if (retval < 0) + { + log(LOG_DEBUG,"handle_connection() : select() returned negative integer"); + break; + } + + if (FD_ISSET(new_sock,&rmask)) + { + log(LOG_DEBUG,"handle_connection() : FD_ISSET(new_sock)"); + retval = read_tout(new_sock, inbuf, 1024, 0, conn_toutp); + if (retval <= 0) + { + log(LOG_DEBUG,"handle_connection() : Received EOF on new_sock."); + break; + } + log(LOG_DEBUG,"handle_connection() : Received %u bytes from client.",retval); + retval = buffer_data(aci, inbuf, retval, &outbuf, &outbuflen, &outbuf_dataoffset, &outbuf_datalen, cpath, routelen); + + if (retval < 0) + { + log(LOG_DEBUG,"handle_connection() : Could not buffer data for output to OR."); + break; + } + log(LOG_DEBUG,"handle_connection() : Buffered %u bytes for output to the OR.",retval); + } + + if (FD_ISSET(or_sock, &rmask)) + { + log(LOG_DEBUG,"handle_connection() : FD_ISSET(or_sock)"); + /* read the remainder of the cell (or whatever we can get) */ + retval = read_tout(or_sock, ((unsigned char *)&cellbuf)+cellbuflen, sizeof(cell_t) - cellbuflen, 0, conn_toutp); + if (retval <= 0) + { + log(LOG_DEBUG,"handle_connection() : Received EOF on or_sock."); + break; + } + log(LOG_DEBUG,"handle_connection() : Received %u bytes from router.",retval); + cellbuflen += retval; + + if (cellbuflen == sizeof(cell_t)) /* received an entire cell */ + { + /* link decrypt the cell header */ + retval = EVP_DecryptUpdate(&b_ctx, (unsigned char *)inbuf, &cellbuflen, (unsigned char *)&cellbuf, 8); + if (!retval) + { + log(LOG_ERR,"Decryption error. Closing the connection and exiting."); + break; + } + + if (((cell_t *)inbuf)->command == CELL_PADDING) /* padding, discard */ + { + log(LOG_DEBUG,"Received a PADDING cell. Discarding."); + ; /* discard */ + } + else if (((cell_t *)inbuf)->command == CELL_DATA) /* only process DATA cells , discard otherwise */ + { + /* decrypt the payload length */ + retval = crypt_b((unsigned char *)&((cell_t *)inbuf)->length, 1, cpath, routelen); + if (retval == -1) + { + log(LOG_ERR,"Decryption error. Closing the connection and exiting."); + break; + } + + /* decrypt the payload */ + retval = crypt_b((unsigned char *)cellbuf.payload, CELL_PAYLOAD_SIZE, cpath, routelen); + if (retval == -1) + { + log(LOG_ERR,"Decryption error. Closing the connection and exiting."); + break; + } + + /* send the payload to the application proxy */ + retval = write_tout(new_sock, (unsigned char *)cellbuf.payload, ((cell_t *)inbuf)->length, conn_toutp); + if (retval < ((cell_t *)inbuf)->length) + { + log(LOG_ERR,"Connection to the application proxy seems to be lost."); + break; + } + log(LOG_DEBUG,"handle_connection() : Sent %u bytes to client.",retval); + } + else + log(LOG_DEBUG,"handle_connection() : Recived cell has incorrect command or ACI. Discarding."); + + cellbuflen = 0; /* get ready for the next cell */ + } + } + + /* send cells to the router */ + send_to_router(or_sock,&outbuf, &outbuflen, &outbuf_dataoffset, &outbuf_datalen, &lastsend, &interval, scheduler, &f_ctx); + } + + /* clean up */ + log(LOG_DEBUG,"handle_connection() : handle_connection() exiting."); + close(or_sock); + + return 0; +} + +/* used for reaping zombie processes */ +void sigchld_handler(int s) +{ + while (wait(NULL) > 0); + connections--; +} + +int main(int argc, char *argv[]) +{ + int one = 1; + int retval = 0; + + char *cp; /* temporary storage */ + int i=0; /* iteration counter */ + + char *conf_filename = NULL; /* configuration file */ + + size_t sin_size; /* for accept() calls */ + + u_short p; /* onion proxy port */ + + /* used for reaping zombie processes */ + struct sigaction sa; + + int islocal = 0; /* is the incoming connection local? */ + + struct rlimit cd_limit; /* resource limit to prevent core dumps */ + + /* prevent core dump */ + retval = getrlimit(RLIMIT_CORE, &cd_limit); + if (retval == -1) + { + log(LOG_ERR,"Could not tell the OS to prevent core dumps for the process."); + return -1; + } + cd_limit.rlim_cur = 0; + retval = setrlimit(RLIMIT_CORE, &cd_limit); + if (retval == -1) + { + log(LOG_ERR,"Could not tell the OS to prevent core dumps for the process."); + return -1; + } + + /* get command-line arguments */ + retval = getargs(argc,argv,args,&p,&conf_filename,&loglevel); + if (retval == -1) + { + log(LOG_ERR,"Error processing command-line arguments."); + exit(1); + } + + /* load config file */ + retval = getconfig(conf_filename,options); + if (retval == -1) + { + log(LOG_ERR,"Error loading configuration file."); + exit(1); + } + + if (options[RouterFile].err != 1) + { + log(LOG_ERR,"RouterFile option required, but not found."); + exit(1); + } + + if (options[CoinWeight].err == -1) + { + log(LOG_ERR,"Error reading the CoinWeight option."); + exit(1); + } + + if (options[CoinWeight].err == 0) + { + /* this is optional, so if not found, set default value */ + options[CoinWeight].r.d = OP_DEFAULT_COIN_WEIGHT; + } + else if ((options[CoinWeight].r.d < 0) || (options[CoinWeight].r.d >= 1)) + { + /* must be a value in [0,1) */ + log(LOG_ERR,"CoinWeight option must be >= 0 and < 1."); + exit(1); + } + + if (options[Bandwidth].err == 0) + { + /* optional, set to default */ + options[Bandwidth].r.i = OP_DEFAULT_BANDWIDTH; + } + else if (options[Bandwidth].r.i <= 0) + { + log(LOG_ERR,"The Bandwidth option must be an integer greater than zero."); + exit(1); + } + + if (options[ConnTimeout].err != 1) + { + conn_tout.tv_sec = OP_DEFAULT_CONN_TIMEOUT; + conn_tout.tv_usec = 0; + } + else + { + if (!options[ConnTimeout].r.i) + conn_toutp = NULL; + else + conn_tout.tv_sec = options[ConnTimeout].r.i; + conn_tout.tv_usec = 0; + } + + /* load the routers file */ + routerarray = getrouters(options[RouterFile].r.str,&rarray_len); + if (!routerarray) + { + log(LOG_ERR,"Error loading router list."); + exit(1); + } + + /* get local address so that we know where to allow connections from*/ + retval = gethostname(local_hostname, (size_t)512); + if (retval < 0) + { + log(LOG_ERR,"Error getting local hostname."); + return -1; + } + local_host = gethostbyname(local_hostname); + if (!local_host) + { + log(LOG_ERR,"Error getting local address."); + return -1; + } + log(LOG_DEBUG,"main() : Got local address : %s.",local_hostname); + + /* get the server up and running */ + request_sock = socket(PF_INET,SOCK_STREAM,IPPROTO_TCP); + if (request_sock < 0) + { + log(LOG_ERR,"Error opening socket."); + return -1; + } + setsockopt(request_sock, SOL_SOCKET, SO_REUSEADDR, &one, sizeof(one)); + log(LOG_DEBUG,"main() : Socket opened."); + + memset((void *)&local,0,sizeof(local)); /* clear the structure first */ + /* set up the sockaddr_in structure */ + local.sin_family=AF_INET; + local.sin_addr.s_addr = INADDR_ANY; + local.sin_port=htons(p); + /* bind it to the socket */ + retval = bind(request_sock,(struct sockaddr *)&local, sizeof(local)); + if (retval < 0) + { + log(LOG_ERR,"Error binding socket to local port %d.",p); + return retval; + } + log(LOG_DEBUG,"main() : Socket bound to port %d.",p); + /* listen for connections */ + retval = listen(request_sock,SOMAXCONN); + if (retval < 0) + { + log(LOG_ERR,"Could not listen for connections."); + return retval; + } + log(LOG_DEBUG,"main() : Listening for connections."); + /* server should now be up and running */ + + /* install the signal handler for making sure zombie processes are killed */ + sa.sa_handler = sigchld_handler; + sigemptyset(&sa.sa_mask); + sa.sa_flags = SA_RESTART; + retval = sigaction(SIGCHLD,&sa,NULL); + if (retval < 0) + { + log(LOG_ERR,"Could not install a signal handler."); + return -1; + } + + /* main server loop */ + /* I use a forking server technique - this isn't the most efficient way to do it, + * but it is simpler. */ + while(1) + { + sin_size = sizeof(struct sockaddr_in); + new_sock = accept(request_sock,(struct sockaddr *)&remote,&sin_size); + if (new_sock == -1) + { + if (errno != EINTR) + log(LOG_ERR,"Could not accept socket connection."); + else + log(LOG_DEBUG,"main() : Interrupt received."); + continue; + } + + if (connections == options[MaxConn].r.i) + { + close(new_sock); + log(LOG_NOTICE,"Maximum connection limit exceeded. Rejecting incoming request."); + } + connections++; + log(LOG_DEBUG,"main() : Accepted a connection from %s.",inet_ntoa(remote.sin_addr)); + + /* see if the connection is local, otherwise reject */ + /* first check that the connection is from the local host, otherwise reject */ + if (*(uint32_t *)&remote.sin_addr == inet_addr("127.0.0.1")) + islocal=1; + for (i=0; (local_host->h_addr_list[i] != NULL) && (!islocal); i++) + { + cp = local_host->h_addr_list[i]; + if (!memcmp(&remote.sin_addr, cp,sizeof(struct in_addr))) + islocal = 1; + } + + if (!islocal) + { + log(LOG_DEBUG,"main() : Incoming connection is not local. Will reject."); + close(new_sock); + } + else + { + log(LOG_DEBUG,"main() : Incoming connection seems to be local. Will accept."); + /* fork a process to deal with the customer */ + if (!fork()) /* this is the child process */ + { + close(request_sock); /* the child doesn't need the request socket anymore */ + + /* Main logic of op. */ + retval = handle_connection(); + log(LOG_DEBUG,"main() : Handle connection returned %d.",retval); + /* End main logic */ + + exit(retval); /* done, exit */ + } + + close(new_sock); /* don't need this anymore */ + } + } + + return retval; + +} + |