mirror of
https://github.com/servalproject/serval-dna.git
synced 2024-12-30 09:58:55 +00:00
71cbe86566
This introduces a new way of linking Serval executables and dynamic libraries from static libraries like libservald.a -- called "feature-driven" linking. The Makefile now links servald and serval-tests from libservald.a, rather than from an explicit list of object (.o) files. Thanks to the section-based method for registering functions such as HTTP handlers, CLI commands and MDP handlers, these object files had become "stand-alone" and hence were no longer included in the link because there was no unresolved reference that required them to be linked in. The new "feature.h" provides the DECLARE_FEATURE(name) macro that each stand-alone source file uses to declare the named feature(s) it provides. Each executable can call the USE_FEATURE(name) macro in any of its explicitly-linked source files to cause the corresponding object(s) to be included in the link, eg, servald_features.c. The DEFINE_BINDING() macro has been extended so that every individual MDP binding is given a feature name based on its port number macro, eg, "mdp_binding_MDP_PORT_ECHO". Some features have been factored into their own separate source files so they can be omitted or included in a build independently of each other: - the MDP bindings for MDP_PORT_DNALOOKUP, MDP_PORT_ECHO, MDP_PORT_TRACE, MDP_PORT_KEYMAPREQUEST, MDP_PORT_RHIZOME_xxx, MDP_PORT_PROBE, MDP_PORT_STUN, MDP_PORT_STUNREQ - the CLI "log" and "echo" commands - the CLI "rhizome direct" command The JNI source files are only compiled if the <jni.h> header is present, otherwise they are omitted from libservald.so.
257 lines
8.6 KiB
C
257 lines
8.6 KiB
C
/*
|
|
Serval DNA MDP overlay network link tracking
|
|
Copyright (C) 2016 Flinders University
|
|
Copyright (C) 2012-2013 Serval Project Inc.
|
|
Copyright (C) 2010-2012 Paul Gardner-Stephen
|
|
|
|
This program is free software; you can redistribute it and/or
|
|
modify it under the terms of the GNU General Public License
|
|
as published by the Free Software Foundation; either version 2
|
|
of the License, or (at your option) any later version.
|
|
|
|
This program is distributed in the hope that it will be useful,
|
|
but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
GNU General Public License for more details.
|
|
|
|
You should have received a copy of the GNU General Public License
|
|
along with this program; if not, write to the Free Software
|
|
Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA.
|
|
*/
|
|
|
|
#include "serval.h"
|
|
#include "conf.h"
|
|
#include "str.h"
|
|
#include "overlay_address.h"
|
|
#include "overlay_buffer.h"
|
|
#include "overlay_interface.h"
|
|
#include "overlay_packet.h"
|
|
#include "keyring.h"
|
|
#include "strbuf_helpers.h"
|
|
#include "route_link.h"
|
|
|
|
int set_reachable(struct subscriber *subscriber,
|
|
struct network_destination *destination, struct subscriber *next_hop,
|
|
int hop_count, struct subscriber *prior_hop){
|
|
|
|
int reachable = REACHABLE_NONE;
|
|
if (destination)
|
|
reachable = destination->unicast?REACHABLE_UNICAST:REACHABLE_BROADCAST;
|
|
else if(next_hop)
|
|
reachable = REACHABLE_INDIRECT;
|
|
|
|
subscriber->hop_count = hop_count;
|
|
subscriber->prior_hop = prior_hop;
|
|
|
|
if (subscriber->reachable==reachable
|
|
&& subscriber->next_hop==next_hop
|
|
&& subscriber->destination == destination)
|
|
return 0;
|
|
|
|
int old_value = subscriber->reachable;
|
|
subscriber->reachable = reachable;
|
|
set_destination_ref(&subscriber->destination, destination);
|
|
subscriber->next_hop = next_hop;
|
|
|
|
// These log messages are for use in tests. Changing them may break test scripts.
|
|
if (IF_DEBUG(overlayrouting) || IF_DEBUG(linkstate)) {
|
|
switch (reachable) {
|
|
case REACHABLE_NONE:
|
|
_DEBUGF("NOT REACHABLE sid=%s", alloca_tohex_sid_t(subscriber->sid));
|
|
break;
|
|
case REACHABLE_INDIRECT:
|
|
_DEBUGF("REACHABLE INDIRECTLY sid=%s, via %s", alloca_tohex_sid_t(subscriber->sid), alloca_tohex_sid_t(next_hop->sid));
|
|
break;
|
|
case REACHABLE_UNICAST:
|
|
_DEBUGF("REACHABLE VIA UNICAST sid=%s, on %s ", alloca_tohex_sid_t(subscriber->sid), destination->interface->name);
|
|
break;
|
|
case REACHABLE_BROADCAST:
|
|
_DEBUGF("REACHABLE VIA BROADCAST sid=%s, on %s ", alloca_tohex_sid_t(subscriber->sid), destination->interface->name);
|
|
break;
|
|
}
|
|
}
|
|
|
|
/* Pre-emptively send a public signing key request */
|
|
if (!subscriber->id_valid && reachable&REACHABLE)
|
|
keyring_send_identity_request(subscriber);
|
|
|
|
CALL_TRIGGER(link_change, subscriber, old_value);
|
|
|
|
return 1;
|
|
}
|
|
|
|
static int resolve_name(const char *name, struct in_addr *addr){
|
|
// TODO this can block, move to worker thread.
|
|
IN();
|
|
int ret=0;
|
|
struct addrinfo hint={
|
|
.ai_family=AF_INET,
|
|
};
|
|
struct addrinfo *addresses=NULL;
|
|
if (getaddrinfo(name, NULL, &hint, &addresses))
|
|
RETURN(WHYF("Failed to resolve %s",name));
|
|
|
|
if (addresses->ai_addr->sa_family==AF_INET){
|
|
*addr = ((struct sockaddr_in *)addresses->ai_addr)->sin_addr;
|
|
DEBUGF(overlayrouting, "Resolved %s into %s", name, inet_ntoa(*addr));
|
|
|
|
}else
|
|
ret=WHY("Ignoring non IPv4 address");
|
|
|
|
freeaddrinfo(addresses);
|
|
RETURN(ret);
|
|
OUT();
|
|
}
|
|
|
|
// load a unicast address from configuration
|
|
struct network_destination *load_subscriber_address(struct subscriber *subscriber)
|
|
{
|
|
if (!subscriber || subscriber->reachable != REACHABLE_NONE)
|
|
return NULL;
|
|
int i = config_host_list__get(&config.hosts, &subscriber->sid);
|
|
// No unicast configuration? just return.
|
|
if (i == -1)
|
|
return NULL;
|
|
const struct config_host *hostc = &config.hosts.av[i].value;
|
|
overlay_interface *interface = NULL;
|
|
if (*hostc->interface){
|
|
interface = overlay_interface_find_name_addr(hostc->interface, NULL);
|
|
if (!interface){
|
|
WARNF("Can't find configured interface %s", hostc->interface);
|
|
return NULL;
|
|
}
|
|
}
|
|
struct socket_address addr;
|
|
bzero(&addr, sizeof(addr));
|
|
addr.addrlen = sizeof(addr.inet);
|
|
addr.inet.sin_family = AF_INET;
|
|
addr.inet.sin_addr = hostc->address;
|
|
addr.inet.sin_port = htons(hostc->port);
|
|
if (addr.inet.sin_addr.s_addr==INADDR_NONE){
|
|
if (interface || overlay_interface_get_default()){
|
|
if (resolve_name(hostc->host, &addr.inet.sin_addr))
|
|
return NULL;
|
|
}else{
|
|
// interface isnt up yet
|
|
return NULL;
|
|
}
|
|
}
|
|
DEBUGF(overlayrouting, "Loaded address %s for %s", alloca_socket_address(&addr), alloca_tohex_sid_t(subscriber->sid));
|
|
return create_unicast_destination(&addr, interface);
|
|
}
|
|
|
|
|
|
int overlay_send_probe(struct subscriber *peer, struct network_destination *destination, int queue){
|
|
time_ms_t now = gettime_ms();
|
|
// though unicast probes don't typically re-use the same network destination,
|
|
// we should still try to throttle when we can
|
|
if (destination->last_tx + destination->ifconfig.tick_ms > now)
|
|
return WHY("Throttling probe packet");
|
|
|
|
// TODO enhance overlay_send_frame to support pre-supplied network destinations
|
|
|
|
struct overlay_frame *frame=malloc(sizeof(struct overlay_frame));
|
|
bzero(frame,sizeof(struct overlay_frame));
|
|
frame->type=OF_TYPE_DATA;
|
|
frame->source = get_my_subscriber();
|
|
frame->destination = peer;
|
|
frame->ttl=1;
|
|
frame->queue=queue;
|
|
frame_add_destination(frame, peer, destination);
|
|
|
|
if ((frame->payload = ob_new()) == NULL) {
|
|
op_free(frame);
|
|
return -1;
|
|
}
|
|
frame->source_full = 1;
|
|
|
|
overlay_mdp_encode_ports(frame->payload, MDP_PORT_ECHO, MDP_PORT_PROBE);
|
|
|
|
ob_append_byte(frame->payload, destination->interface - overlay_interfaces);
|
|
ob_append_bytes(frame->payload, (uint8_t*)&destination->address.addr, destination->address.addrlen);
|
|
|
|
if (overlay_payload_enqueue(frame)){
|
|
op_free(frame);
|
|
return -1;
|
|
}
|
|
DEBUGF(overlayrouting, "Queued probe packet on interface %s to %s for %s",
|
|
destination->interface->name,
|
|
alloca_socket_address(&destination->address),
|
|
peer?alloca_tohex_sid_t(peer->sid):"ANY"
|
|
);
|
|
return 0;
|
|
}
|
|
|
|
int overlay_send_stun_request(struct subscriber *server, struct subscriber *request){
|
|
// don't bother with a stun request if the peer is already reachable directly
|
|
if (request->reachable&REACHABLE_DIRECT)
|
|
return -1;
|
|
|
|
time_ms_t now = gettime_ms();
|
|
if (request->last_stun_request +1000 > now)
|
|
return -1;
|
|
|
|
request->last_stun_request=now;
|
|
// If two people are behind the same NAT, but can't hear broadcast packets
|
|
// and the NAT doesn't allow internal packets to bounce back based on public addresses
|
|
// we need to tell the remote party all of our private addresses
|
|
// so we can send them an unrequested stun response to provoke a probe packet
|
|
if (request->reachable&REACHABLE || (server && server->reachable & REACHABLE)){
|
|
struct internal_mdp_header header;
|
|
bzero(&header, sizeof header);
|
|
header.source = get_my_subscriber();
|
|
header.destination = request;
|
|
header.source_port = MDP_PORT_STUNREQ;
|
|
header.destination_port = MDP_PORT_STUN;
|
|
header.qos = OQ_MESH_MANAGEMENT;
|
|
|
|
struct overlay_buffer *payload = ob_new();
|
|
ob_limitsize(payload, MDP_MTU);
|
|
|
|
unsigned i;
|
|
for (i=0;i<OVERLAY_MAX_INTERFACES;i++){
|
|
if (overlay_interfaces[i].state == INTERFACE_STATE_UP
|
|
&& overlay_interfaces[i].address.addr.sa_family == AF_INET){
|
|
|
|
overlay_address_append(NULL, payload, get_my_subscriber());
|
|
ob_append_ui32(payload, overlay_interfaces[i].address.inet.sin_addr.s_addr);
|
|
ob_append_ui16(payload, overlay_interfaces[i].address.inet.sin_port);
|
|
if (ob_overrun(payload)){
|
|
ob_rewind(payload);
|
|
break;
|
|
}
|
|
ob_checkpoint(payload);
|
|
}
|
|
}
|
|
|
|
ob_flip(payload);
|
|
DEBUGF(overlayrouting, "Sending STUN response to %s for my private addresses", alloca_tohex_sid_t(request->sid));
|
|
overlay_send_frame(&header, payload);
|
|
ob_free(payload);
|
|
}
|
|
|
|
if (server && server->reachable & REACHABLE){
|
|
struct internal_mdp_header header;
|
|
bzero(&header, sizeof header);
|
|
header.source = get_my_subscriber();
|
|
header.destination = server;
|
|
|
|
header.source_port = MDP_PORT_STUN;
|
|
header.destination_port = MDP_PORT_STUNREQ;
|
|
header.qos = OQ_MESH_MANAGEMENT;
|
|
|
|
struct overlay_buffer *payload = ob_new();
|
|
ob_limitsize(payload, MDP_MTU);
|
|
|
|
overlay_address_append(NULL, payload, request);
|
|
if (!ob_overrun(payload)) {
|
|
DEBUGF(overlayrouting, "Sending STUN request to %s", alloca_tohex_sid_t(server->sid));
|
|
|
|
ob_flip(payload);
|
|
overlay_send_frame(&header, payload);
|
|
}
|
|
ob_free(payload);
|
|
}
|
|
return 0;
|
|
}
|