1 #include <connection.h>
6 #include <sys/utsname.h>
12 extern std::vector<Module*> modules;
13 extern std::vector<ircd_module*> factory;
18 #define STATE_WAIT_FOR_ACK 2
30 connection::connection()
39 bool connection::CreateListener(char* host, int p)
41 sockaddr_in host_address;
45 struct linger linger = { 0 };
47 fd = socket(AF_INET, SOCK_DGRAM, IPPROTO_UDP);
53 memset((void*)&host_address, 0, sizeof(host_address));
55 host_address.sin_family = AF_INET;
59 host_address.sin_addr.s_addr = htonl(INADDR_ANY);
63 inet_aton(host,&addy);
64 host_address.sin_addr = addy;
67 host_address.sin_port = htons(p);
69 if (bind(fd,(sockaddr*)&host_address,sizeof(host_address))<0)
74 // make the socket non-blocking
75 flags = fcntl(fd, F_GETFL, 0);
76 fcntl(fd, F_SETFL, flags | O_NONBLOCK);
80 setsockopt(fd,SOL_SOCKET,SO_REUSEADDR,(const char*)&on,sizeof(on));
83 setsockopt(fd,SOL_SOCKET,SO_LINGER,(const char*)&linger,sizeof(linger));
90 bool connection::BeginLink(char* targethost, int port, char* password)
96 sprintf(connect,"S %s %s :%s",getservername().c_str(),password,getserverdesc().c_str());
97 this->haspassed = false;
98 return this->SendPacket(connect, targethost, port, 0);
103 // targethost: in dot notation a.b.c.d
104 void connection::TerminateLink(char* targethost)
108 // host: in dot notation a.b.c.d
109 // port: host byte order
110 bool connection::SendPacket(char *message, char* host, int port, long ourkey)
112 sockaddr_in host_address;
116 memset((void*)&host_address, 0, sizeof(host_address));
118 host_address.sin_family = AF_INET;
119 inet_aton(host,&addy);
120 host_address.sin_addr = addy;
122 host_address.sin_port = htons(port);
124 strcpy(p.data,message);
125 p.type = PT_SYN_WITH_DATA;
129 FOREACH_MOD OnPacketTransmit(p.data);
131 log(DEBUG,"main: Connection::SendPacket() sent '%s' to %s:%d",p.data,host,port);
133 // returns false if the packet could not be sent (e.g. target host down)
134 if (sendto(this->fd,&p,sizeof(p),0,(sockaddr*)&host_address,sizeof(host_address))<0)
136 log(DEBUG,"sendto() failed for Connection::SendPacket() with a packet of size %d: %s",sizeof(p),strerror(errno));
139 this->state = STATE_WAIT_FOR_ACK;
142 // host_address remains unchanged. we only want to receive from where we just sent the packet to.
144 // retry the packet up to 5 times
145 for (int retries = 0; retries < 5; retries++)
147 socklen_t host_address_size;
148 host_address.sin_family=AF_INET;
149 host_address_size=sizeof(host_address);
151 // wait for ack, or timeout.
152 // if reached a timeout, send again.
153 // the packet id in the ack must match that in the original packet
154 // this MUST operate in lock/step fashion!!!
165 int res = select(65535, &sfd, NULL, NULL, &tval);
168 while ((recvfrom(fd,&p2,sizeof(p2),0,(sockaddr*)&host_address,&host_address_size)<0) && (cycles < 10));
172 log(DEFAULT,"ERROR! connection::SendPacket() waited >10000 nanosecs for an ACK. Will resend up to 5 times");
176 if (p2.type != PT_ACK_ONLY)
182 strcpy(pb.host,inet_ntoa(host_address.sin_addr));
183 pb.port = ntohs(host_address.sin_port);
184 this->buffer.push_back(pb);
186 log(DEFAULT,"ERROR! connection::SendPacket() received a data response and was expecting an ACK!!!");
187 this->state = STATE_CLEAR;
193 log(DEFAULT,"ERROR! connection::SendPacket() received an ack for a packet it didnt send!");
194 this->state = STATE_CLEAR;
199 log(DEFAULT,"Successfully received ACK");
200 this->state = STATE_CLEAR;
206 log(DEFAULT,"We never received an ack. Something fishy going on, host is dead.");
207 this->state = STATE_CLEAR;
212 bool connection::SendSYN(char* host, int port)
214 sockaddr_in host_address;
218 memset((void*)&host_address, 0, sizeof(host_address));
220 host_address.sin_family = AF_INET;
221 inet_aton(host,&addy);
222 host_address.sin_addr = addy;
224 host_address.sin_port = htons(port);
226 p.type = PT_SYN_ONLY;
230 if (sendto(fd,&p,sizeof(p),0,(sockaddr*)&host_address,sizeof(host_address))<0)
238 bool connection::SendACK(char* host, int port, int reply_id)
240 sockaddr_in host_address;
244 memset((void*)&host_address, 0, sizeof(host_address));
246 host_address.sin_family = AF_INET;
247 inet_aton(host,&addy);
248 host_address.sin_addr = addy;
250 host_address.sin_port = htons(port);
252 p.type = PT_ACK_ONLY;
257 if (sendto(fd,&p,sizeof(p),0,(sockaddr*)&host_address,sizeof(host_address))<0)
265 // Generates a server key. This is pseudo-random.
266 // the server always uses the same server-key in all communications
267 // across the network. All other servers must remember the server key
268 // of servers in the network, e.g.:
270 // ServerA: key=5555555555
271 // ServerB: key=6666666666
272 // I am ServerC: key=77777777777
274 // If ServerC sees a packet from ServerA, and the key stored for ServerA
275 // is 0, then cache the key as the servers key.
276 // after this point, any packet from ServerA which does not contain its key,
277 // 555555555, will be silently dropped.
278 // This should prevent blind spoofing, as to fake a server you must know its
279 // assigned key, and to do that you must receive messages that are origintated
280 // from it or hack the running executable.
282 // During the AUTH phase (when server passwords are checked, the key in any
283 // packet MUST be 0). Only the initial SERVER/PASS packets may have a key
284 // of 0 (and any ACK responses to them).
287 long connection::GenKey()
290 return (random()*time(NULL));
293 // host: in dot notation a.b.c.d
294 // port: host byte order
295 bool connection::RecvPacket(char *message, char* host, int &prt, long &theirkey)
297 // returns false if no packet waiting for receive, e.g. EAGAIN or ECONNRESET
298 sockaddr_in host_address;
299 socklen_t host_address_size;
302 memset((void*)&host_address, 0, sizeof(host_address));
304 host_address.sin_family=AF_INET;
305 host_address_size=sizeof(host_address);
307 //int recvfrom(int s, void *buf, size_t len, int flags, struct sockaddr *from, socklen_t *fromlen);
308 if (recvfrom(fd,&p,sizeof(p),0,(sockaddr*)&host_address,&host_address_size)<0)
312 log(DEBUG,"Fetching a buffered packet size %d",buffer.size());
313 strcpy(message,buffer[0].p.data);
314 theirkey = buffer[0].p.key;
315 strcpy(host,buffer[0].host);
316 prt = buffer[0].port;
325 log(DEBUG,"connection::RecvPacket(): received packet type %d '%s' from '%s'",p.type,p.data,inet_ntoa(host_address.sin_addr));
327 if (p.type == PT_SYN_ONLY)
329 strcpy(message,p.data);
330 strcpy(host,inet_ntoa(host_address.sin_addr));
331 prt = ntohs(host_address.sin_port);
332 SendACK(host,this->port,p.id);
336 if (p.type == PT_ACK_ONLY)
338 strcpy(message,p.data);
339 strcpy(host,inet_ntoa(host_address.sin_addr));
340 prt = ntohs(host_address.sin_port);
341 this->state = STATE_CLEAR;
345 if (p.type == PT_SYN_WITH_DATA)
347 strcpy(message,p.data);
348 strcpy(host,inet_ntoa(host_address.sin_addr));
350 prt = ntohs(host_address.sin_port); // the port we received it on
351 SendACK(host,prt,p.id);
355 log(DEBUG,"Fetching a buffered packet size %d",buffer.size());
360 strcpy(pb.host,inet_ntoa(host_address.sin_addr));
361 pb.port = ntohs(host_address.sin_port);
362 this->buffer.push_back(pb);
364 strcpy(message,buffer[0].p.data);
365 theirkey = buffer[0].p.key;
366 strcpy(host,buffer[0].host);
367 prt = buffer[0].port;
375 log(DEBUG,"connection::RecvPacket(): Invalid packet type %d (protocol error)",p.type);