2 * Copyright (C) 1997 and 1998 WIDE Project.
5 * Redistribution and use in source and binary forms, with or without
6 * modification, are permitted provided that the following conditions
8 * 1. Redistributions of source code must retain the above copyright
9 * notice, this list of conditions and the following disclaimer.
10 * 2. Redistributions in binary form must reproduce the above copyright
11 * notice, this list of conditions and the following disclaimer in the
12 * documentation and/or other materials provided with the distribution.
13 * 3. Neither the name of the project nor the names of its contributors
14 * may be used to endorse or promote products derived from this software
15 * without specific prior written permission.
17 * THIS SOFTWARE IS PROVIDED BY THE PROJECT AND CONTRIBUTORS ``AS IS'' AND
18 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
19 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
20 * ARE DISCLAIMED. IN NO EVENT SHALL THE PROJECT OR CONTRIBUTORS BE LIABLE
21 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
22 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
23 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
24 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
25 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
26 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
33 * User level translator from IPv6 to IPv4.
35 * Usage: faithd [<port> <progpath> <arg1(progname)> <arg2> ...]
36 * e.g. faithd telnet /usr/local/v6/sbin/telnetd telnetd
39 #include <sys/param.h>
40 #include <sys/types.h>
41 #include <sys/sysctl.h>
42 #include <sys/socket.h>
46 #include <sys/ioctl.h>
60 #include <net/if_types.h>
64 # include <net/route.h>
65 # include <net/if_dl.h>
68 #include <netinet/in.h>
69 #include <arpa/inet.h>
74 #include <arpa/nameser.h>
76 #define FAITH_NS "FAITH_NS"
82 char *serverpath = NULL;
83 char *serverarg[MAXARGV + 1];
84 static char *faithdname = NULL;
86 char procname[BUFSIZ];
89 struct sockaddr *addr;
91 struct myaddrs *myaddrs = NULL;
94 static int sockfd = 0;
99 int main __P((int, char **));
100 static void play_service __P((int));
101 static void play_child __P((int, struct sockaddr *));
102 static int faith_prefix __P((struct sockaddr *));
103 static int map6to4 __P((struct sockaddr_in6 *, struct sockaddr_in *));
105 static int map4to6 __P((struct sockaddr_in *, struct sockaddr_in6 *));
107 static void sig_child __P((int));
108 static void sig_terminate __P((int));
109 static void start_daemon __P((void));
110 static unsigned int if_maxindex __P((void));
111 static void grab_myaddrs __P((void));
112 static void free_myaddrs __P((void));
113 static void update_myaddrs __P((void));
114 static void usage __P((void));
117 main(int argc, char *argv[])
119 struct addrinfo hints, *res;
120 int s_wld, error, i, serverargc, on = 1;
121 int family = AF_INET6;
125 #endif /* FAITH_NS */
133 faithdname = strrchr(argv[0], '/');
137 faithdname = argv[0];
139 while ((c = getopt(argc, argv, "dp46")) != -1) {
164 if ((ns = getenv(FAITH_NS)) != NULL) {
165 struct sockaddr_storage ss;
166 struct addrinfo hints, *res;
167 char serv[NI_MAXSERV];
169 memset(&ss, 0, sizeof(ss));
170 memset(&hints, 0, sizeof(hints));
171 snprintf(serv, sizeof(serv), "%u", NAMESERVER_PORT);
172 hints.ai_flags = AI_NUMERICHOST;
173 if (getaddrinfo(ns, serv, &hints, &res) == 0) {
175 memcpy(&_res_ext.nsaddr, res->ai_addr, res->ai_addrlen);
179 #endif /* FAITH_NS */
187 serverpath = DEFAULT_PATH;
188 serverarg[0] = DEFAULT_NAME;
190 service = DEFAULT_PORT_NAME;
193 serverargc = argc - NUMARG;
194 if (serverargc > MAXARGV)
195 exit_error("too many augments");
197 serverpath = malloc(strlen(argv[NUMPRG]));
198 strcpy(serverpath, argv[NUMPRG]);
199 for (i = 0; i < serverargc; i++) {
200 serverarg[i] = malloc(strlen(argv[i + NUMARG]));
201 strcpy(serverarg[i], argv[i + NUMARG]);
205 case 1: /* no local service */
206 service = argv[NUMPRT];
211 * Opening wild card socket for this service.
214 memset(&hints, 0, sizeof(hints));
215 hints.ai_flags = AI_PASSIVE;
216 hints.ai_family = family;
217 hints.ai_socktype = SOCK_STREAM;
218 hints.ai_protocol = 0;
219 error = getaddrinfo(NULL, service, &hints, &res);
221 fprintf(stderr, "getaddrinfo: %s\n", gai_strerror(error));
222 if (error == EAI_SYSTEM)
223 exit_error("getaddrinfo: %s\n", strerror(errno));
227 s_wld = socket(res->ai_family, res->ai_socktype, res->ai_protocol);
229 exit_error("socket: %s", ERRSTR);
232 if (res->ai_family == AF_INET6) {
233 error = setsockopt(s_wld, IPPROTO_IPV6, IPV6_FAITH, &on, sizeof(on));
235 exit_error("setsockopt(IPV6_FAITH): %s", ERRSTR);
240 if (res->ai_family == AF_INET) {
241 error = setsockopt(s_wld, IPPROTO_IP, IP_FAITH, &on, sizeof(on));
243 exit_error("setsockopt(IP_FAITH): %s", ERRSTR);
248 error = setsockopt(s_wld, SOL_SOCKET, SO_REUSEADDR, &on, sizeof(on));
250 exit_error("setsockopt(SO_REUSEADDR): %s", ERRSTR);
252 error = setsockopt(s_wld, SOL_SOCKET, SO_OOBINLINE, &on, sizeof(on));
254 exit_error("setsockopt(SO_OOBINLINE): %s", ERRSTR);
256 error = bind(s_wld, (struct sockaddr *)res->ai_addr, res->ai_addrlen);
258 exit_error("bind: %s", ERRSTR);
260 error = listen(s_wld, 5);
262 exit_error("listen: %s", ERRSTR);
265 sockfd = socket(PF_ROUTE, SOCK_RAW, PF_UNSPEC);
267 exit_error("socket(PF_ROUTE): %s", ERRSTR);
278 snprintf(logname, sizeof(logname), "faithd %s", service);
279 snprintf(procname, sizeof(procname), "accepting port %s", service);
280 openlog(logname, LOG_PID | LOG_NOWAIT, LOG_DAEMON);
281 syslog(LOG_INFO, "Staring faith daemon for %s port", service);
285 exit(1); /*pacify gcc*/
289 play_service(int s_wld)
291 struct sockaddr_storage srcaddr;
300 * Wait, accept, fork, faith....
303 setproctitle(procname);
306 FD_SET(s_wld, &rfds);
310 FD_SET(sockfd, &rfds);
311 maxfd = (maxfd < sockfd) ? sockfd : maxfd;
315 error = select(maxfd + 1, &rfds, NULL, NULL, NULL);
319 exit_failure("select: %s", ERRSTR);
324 if (FD_ISSET(sockfd, &rfds)) {
328 if (FD_ISSET(s_wld, &rfds)) {
329 len = sizeof(srcaddr);
330 s_src = accept(s_wld, (struct sockaddr *)&srcaddr,
333 exit_failure("socket: %s", ERRSTR);
337 if (child_pid == 0) {
341 openlog(logname, LOG_PID | LOG_NOWAIT, LOG_DAEMON);
342 play_child(s_src, (struct sockaddr *)&srcaddr);
343 exit_failure("should never reach here");
348 syslog(LOG_ERR, "can't fork");
355 play_child(int s_src, struct sockaddr *srcaddr)
357 struct sockaddr_storage dstaddr6;
358 struct sockaddr_storage dstaddr4;
359 char src[MAXHOSTNAMELEN];
360 char dst6[MAXHOSTNAMELEN];
361 char dst4[MAXHOSTNAMELEN];
362 int len = sizeof(dstaddr6);
363 int s_dst, error, hport, nresvport, on = 1;
365 struct sockaddr *sa4;
370 getnameinfo(srcaddr, srcaddr->sa_len,
371 src, sizeof(src), NULL, 0, NI_NUMERICHOST);
372 syslog(LOG_INFO, "accepted a client from %s", src);
374 error = getsockname(s_src, (struct sockaddr *)&dstaddr6, &len);
376 exit_failure("getsockname: %s", ERRSTR);
378 getnameinfo((struct sockaddr *)&dstaddr6, len,
379 dst6, sizeof(dst6), NULL, 0, NI_NUMERICHOST);
380 syslog(LOG_INFO, "the client is connecting to %s", dst6);
382 if (!faith_prefix((struct sockaddr *)&dstaddr6)) {
387 syslog(LOG_INFO, "executing local %s", serverpath);
392 execv(serverpath, serverarg);
393 syslog(LOG_ERR, "execv %s: %s", serverpath, ERRSTR);
397 exit_success("no local service for %s", service);
402 * Act as a translator
405 switch (((struct sockaddr *)&dstaddr6)->sa_family) {
407 if (!map6to4((struct sockaddr_in6 *)&dstaddr6,
408 (struct sockaddr_in *)&dstaddr4)) {
410 exit_error("map6to4 failed");
412 syslog(LOG_INFO, "translating from v6 to v4");
416 if (!map4to6((struct sockaddr_in *)&dstaddr6,
417 (struct sockaddr_in6 *)&dstaddr4)) {
419 exit_error("map4to6 failed");
421 syslog(LOG_INFO, "translating from v4 to v6");
426 exit_error("family not supported");
430 sa4 = (struct sockaddr *)&dstaddr4;
431 getnameinfo(sa4, sa4->sa_len,
432 dst4, sizeof(dst4), NULL, 0, NI_NUMERICHOST);
433 syslog(LOG_INFO, "the translator is connecting to %s", dst4);
435 setproctitle("port %s, %s -> %s", service, src, dst4);
437 if (sa4->sa_family == AF_INET6)
438 hport = ntohs(((struct sockaddr_in6 *)&dstaddr4)->sin6_port);
440 hport = ntohs(((struct sockaddr_in *)&dstaddr4)->sin_port);
445 s_dst = rresvport_af(&nresvport, sa4->sa_family);
449 s_dst = rresvport_af(&nresvport, sa4->sa_family);
451 s_dst = socket(sa4->sa_family, SOCK_STREAM, 0);
455 exit_failure("socket: %s", ERRSTR);
457 error = setsockopt(s_dst, SOL_SOCKET, SO_OOBINLINE, &on, sizeof(on));
459 exit_error("setsockopt(SO_OOBINLINE): %s", ERRSTR);
461 error = setsockopt(s_src, SOL_SOCKET, SO_SNDTIMEO, &tv, sizeof(tv));
463 exit_error("setsockopt(SO_SNDTIMEO): %s", ERRSTR);
464 error = setsockopt(s_dst, SOL_SOCKET, SO_SNDTIMEO, &tv, sizeof(tv));
466 exit_error("setsockopt(SO_SNDTIMEO): %s", ERRSTR);
468 error = connect(s_dst, sa4, sa4->sa_len);
470 exit_failure("connect: %s", ERRSTR);
474 ftp_relay(s_src, s_dst);
477 rsh_relay(s_src, s_dst);
480 tcp_relay(s_src, s_dst, service);
487 /* 0: non faith, 1: faith */
489 faith_prefix(struct sockaddr *dst)
493 struct in6_addr faith_prefix;
494 struct sockaddr_in6 *dst6 = (struct sockaddr_in *)dst;
496 if (dst->sa_family != AF_INET6)
501 mib[2] = IPPROTO_IPV6;
502 mib[3] = IPV6CTL_FAITH_PREFIX;
503 size = sizeof(struct in6_addr);
504 if (sysctl(mib, 4, &faith_prefix, &size, NULL, 0) < 0)
505 exit_error("sysctl: %s", ERRSTR);
507 if (memcmp(dst, &faith_prefix,
508 sizeof(struct in6_addr) - sizeof(struct in_addr) == 0) {
514 struct sockaddr_in6 *sin6;
515 struct sockaddr_in *sin4;
516 struct sockaddr_in6 *dst6;
517 struct sockaddr_in *dst4;
518 struct sockaddr_in dstmap;
520 dst6 = (struct sockaddr_in6 *)dst;
521 if (dst->sa_family == AF_INET6
522 && IN6_IS_ADDR_V4MAPPED(&dst6->sin6_addr)) {
524 memset(&dstmap, 0, sizeof(dstmap));
525 dstmap.sin_family = AF_INET;
526 dstmap.sin_len = sizeof(dstmap);
527 memcpy(&dstmap.sin_addr, &dst6->sin6_addr.s6_addr[12],
528 sizeof(dstmap.sin_addr));
529 dst = (struct sockaddr *)&dstmap;
532 dst6 = (struct sockaddr_in6 *)dst;
533 dst4 = (struct sockaddr_in *)dst;
535 for (p = myaddrs; p; p = p->next) {
536 sin6 = (struct sockaddr_in6 *)p->addr;
537 sin4 = (struct sockaddr_in *)p->addr;
539 if (p->addr->sa_len != dst->sa_len
540 || p->addr->sa_family != dst->sa_family)
543 switch (dst->sa_family) {
545 if (sin6->sin6_scope_id == dst6->sin6_scope_id
546 && IN6_ARE_ADDR_EQUAL(&sin6->sin6_addr, &dst6->sin6_addr))
550 if (sin4->sin_addr.s_addr == dst4->sin_addr.s_addr)
559 /* 0: non faith, 1: faith */
561 map6to4(struct sockaddr_in6 *dst6, struct sockaddr_in *dst4)
563 memset(dst4, 0, sizeof(*dst4));
564 dst4->sin_len = sizeof(*dst4);
565 dst4->sin_family = AF_INET;
566 dst4->sin_port = dst6->sin6_port;
567 memcpy(&dst4->sin_addr, &dst6->sin6_addr.s6_addr[12],
568 sizeof(dst4->sin_addr));
570 if (dst4->sin_addr.s_addr == INADDR_ANY
571 || dst4->sin_addr.s_addr == INADDR_BROADCAST
572 || IN_MULTICAST(dst4->sin_addr.s_addr))
579 /* 0: non faith, 1: faith */
581 map4to6(struct sockaddr_in *dst4, struct sockaddr_in6 *dst6)
583 char host[NI_MAXHOST];
584 char serv[NI_MAXSERV];
585 struct addrinfo hints, *res;
588 if (getnameinfo((struct sockaddr *)dst4, dst4->sin_len, host, sizeof(host),
589 serv, sizeof(serv), NI_NAMEREQD|NI_NUMERICSERV) != 0)
592 memset(&hints, 0, sizeof(hints));
594 hints.ai_family = AF_INET6;
595 hints.ai_socktype = SOCK_STREAM;
596 hints.ai_protocol = 0;
598 if ((ai_errno = getaddrinfo(host, serv, &hints, &res)) != 0) {
599 syslog(LOG_INFO, "%s %s: %s", host, serv, gai_strerror(ai_errno));
600 if (ai_errno == EAI_SYSTEM)
601 syslog(LOG_INFO, "%s %s: %s", host, serv,
606 memcpy(dst6, res->ai_addr, res->ai_addrlen);
620 pid = wait3(&status, WNOHANG, (struct rusage *)0);
622 syslog(LOG_WARNING, "child %d exit status 0x%x", pid, status);
626 sig_terminate(int sig)
628 syslog(LOG_INFO, "Terminating faith daemon");
635 if (daemon(0, 0) == -1)
636 exit_error("daemon: %s", ERRSTR);
638 if (signal(SIGCHLD, sig_child) == SIG_ERR)
639 exit_failure("signal CHLD: %s", ERRSTR);
641 if (signal(SIGTERM, sig_terminate) == SIG_ERR)
642 exit_failure("signal TERM: %s", ERRSTR);
646 exit_error(const char *fmt, ...)
652 vsnprintf(buf, sizeof(buf), fmt, ap);
654 fprintf(stderr, "%s\n", buf);
659 exit_failure(const char *fmt, ...)
665 vsnprintf(buf, sizeof(buf), fmt, ap);
667 syslog(LOG_ERR, buf);
672 exit_success(const char *fmt, ...)
678 vsnprintf(buf, sizeof(buf), fmt, ap);
680 syslog(LOG_INFO, buf);
688 struct if_nameindex *p, *p0;
689 unsigned int max = 0;
692 for (p = p0; p && p->if_index && p->if_name; p++) {
693 if (max < p->if_index)
696 if_freenameindex(p0);
705 struct ifreq *iflist;
706 struct ifconf ifconf;
707 struct ifreq *ifr, *ifr_end;
709 struct sockaddr_in6 *sin6;
711 maxif = if_maxindex() + 1;
712 iflist = (struct ifreq *)malloc(maxif * BUFSIZ); /* XXX */
714 exit_failure("not enough core");
718 if ((s = socket(PF_INET, SOCK_DGRAM, 0)) < 0) {
719 exit_failure("socket(SOCK_DGRAM)");
722 memset(&ifconf, 0, sizeof(ifconf));
723 ifconf.ifc_req = iflist;
724 ifconf.ifc_len = maxif * BUFSIZ; /* XXX */
725 if (ioctl(s, SIOCGIFCONF, &ifconf) < 0) {
726 exit_failure("ioctl(SIOCGIFCONF)");
731 /* Look for this interface in the list */
732 ifr_end = (struct ifreq *) (ifconf.ifc_buf + ifconf.ifc_len);
733 for (ifr = ifconf.ifc_req;
735 ifr = (struct ifreq *) ((char *) &ifr->ifr_addr
736 + ifr->ifr_addr.sa_len)) {
737 switch (ifr->ifr_addr.sa_family) {
740 p = (struct myaddrs *)malloc(sizeof(struct myaddrs)
741 + ifr->ifr_addr.sa_len);
743 exit_failure("not enough core");
746 memcpy(p + 1, &ifr->ifr_addr, ifr->ifr_addr.sa_len);
748 p->addr = (struct sockaddr *)(p + 1);
750 if (ifr->ifr_addr.sa_family == AF_INET6) {
751 sin6 = (struct sockaddr_in6 *)p->addr;
752 if (IN6_IS_ADDR_LINKLOCAL(&sin6->sin6_addr)
753 || IN6_IS_ADDR_SITELOCAL(&sin6->sin6_addr)) {
754 sin6->sin6_scope_id =
755 ntohs(*(u_int16_t *)&sin6->sin6_addr.s6_addr[2]);
756 sin6->sin6_addr.s6_addr[2] = 0;
757 sin6->sin6_addr.s6_addr[3] = 0;
763 char hbuf[NI_MAXHOST];
764 getnameinfo(p->addr, p->addr->sa_len,
765 hbuf, sizeof(hbuf), NULL, 0,
767 syslog(LOG_INFO, "my interface: %s %s", hbuf, ifr->ifr_name);
781 struct myaddrs *p, *q;
797 struct rt_msghdr *rtm;
799 len = read(sockfd, msg, sizeof(msg));
801 syslog(LOG_ERR, "read(PF_ROUTE) failed");
804 rtm = (struct rt_msghdr *)msg;
805 if (len < 4 || len < rtm->rtm_msglen) {
806 syslog(LOG_ERR, "read(PF_ROUTE) short read");
809 if (rtm->rtm_version != RTM_VERSION) {
810 syslog(LOG_ERR, "routing socket version mismatch");
815 switch (rtm->rtm_type) {
823 /* XXX more filters here? */
825 syslog(LOG_INFO, "update interface address list");
834 fprintf(stderr, "usage: %s [-dp] [service [serverpath [serverargs]]]\n",