1 /* $KAME: tcp.c,v 1.13 2003/09/02 22:49:21 itojun Exp $ */
4 * Copyright (C) 1997 and 1998 WIDE Project.
7 * Redistribution and use in source and binary forms, with or without
8 * modification, are permitted provided that the following conditions
10 * 1. Redistributions of source code must retain the above copyright
11 * notice, this list of conditions and the following disclaimer.
12 * 2. Redistributions in binary form must reproduce the above copyright
13 * notice, this list of conditions and the following disclaimer in the
14 * documentation and/or other materials provided with the distribution.
15 * 3. Neither the name of the project nor the names of its contributors
16 * may be used to endorse or promote products derived from this software
17 * without specific prior written permission.
19 * THIS SOFTWARE IS PROVIDED BY THE PROJECT AND CONTRIBUTORS ``AS IS'' AND
20 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
21 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
22 * ARE DISCLAIMED. IN NO EVENT SHALL THE PROJECT OR CONTRIBUTORS BE LIABLE
23 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
24 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
25 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
26 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
27 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
28 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
34 #include <sys/param.h>
35 #include <sys/types.h>
36 #include <sys/socket.h>
37 #include <sys/ioctl.h>
50 #include <netinet/in.h>
51 #include <arpa/inet.h>
56 static char tcpbuf[16*1024];
57 /* bigger than MSS and may be lesser than window size */
58 static int tblen, tboff, oob_exists;
59 static fd_set readfds, writefds, exceptfds;
60 static char atmark_buf[2];
61 static pid_t cpid = (pid_t)0;
62 static pid_t ppid = (pid_t)0;
63 volatile time_t child_lastactive = (time_t)0;
64 static time_t parent_lastactive = (time_t)0;
66 static void sig_ctimeout __P((int));
67 static void sig_child __P((int));
68 static void notify_inactive __P((void));
69 static void notify_active __P((void));
70 static void send_data __P((int, int, const char *, int));
71 static void relay __P((int, int, const char *, int));
75 * - child side (ppid != 0) will send SIGUSR1 to parent every (FAITH_TIMEOUT/4)
76 * second if traffic is active. if traffic is inactive, don't send SIGUSR1.
77 * - parent side (ppid == 0) will check the last SIGUSR1 it have seen.
82 /* parent side: record notification from the child */
84 syslog(LOG_DEBUG, "activity timer from child");
85 child_lastactive = time(NULL);
88 /* parent will terminate if child dies. */
95 pid = wait3(&status, WNOHANG, (struct rusage *)0);
96 if (pid > 0 && WEXITSTATUS(status))
97 syslog(LOG_WARNING, "child %ld exit status 0x%x",
99 exit_success("terminate connection due to child termination");
107 /* only on parent side... */
111 /* parent side should check for timeout. */
114 syslog(LOG_DEBUG, "parent side %sactive, child side %sactive",
115 (FAITH_TIMEOUT < t - parent_lastactive) ? "in" : "",
116 (FAITH_TIMEOUT < t - child_lastactive) ? "in" : "");
119 if (FAITH_TIMEOUT < t - child_lastactive
120 && FAITH_TIMEOUT < t - parent_lastactive) {
121 /* both side timeouted */
122 signal(SIGCHLD, SIG_DFL);
125 exit_failure("connection timeout");
134 /* child side: notify parent of active traffic */
137 if (FAITH_TIMEOUT / 4 < t - child_lastactive) {
138 if (kill(ppid, SIGUSR1) < 0) {
139 exit_failure("terminate connection due to parent termination");
142 child_lastactive = t;
146 parent_lastactive = time(NULL);
151 send_data(int s_rcv, int s_snd, const char *service, int direction)
156 cc = send(s_snd, atmark_buf, 1, MSG_OOB);
160 if (s_rcv >= FD_SETSIZE)
161 exit_failure("descriptor too big");
162 FD_SET(s_rcv, &exceptfds);
165 for (; tboff < tblen; tboff += cc) {
166 cc = write(s_snd, tcpbuf + tboff, tblen - tboff);
172 if (tblen >= sizeof(tcpbuf))
173 tblen = sizeof(tcpbuf) - 1;
174 tcpbuf[tblen] = '\0';
175 syslog(LOG_DEBUG, "from %s (%dbytes): %s",
176 direction == 1 ? "client" : "server", tblen, tcpbuf);
179 tblen = 0; tboff = 0;
180 if (s_snd >= FD_SETSIZE)
181 exit_failure("descriptor too big");
182 FD_CLR(s_snd, &writefds);
183 if (s_rcv >= FD_SETSIZE)
184 exit_failure("descriptor too big");
185 FD_SET(s_rcv, &readfds);
189 exit_failure("writing relay data failed: %s", strerror(errno));
190 if (s_snd >= FD_SETSIZE)
191 exit_failure("descriptor too big");
192 FD_SET(s_snd, &writefds);
196 relay(int s_rcv, int s_snd, const char *service, int direction)
198 int atmark, error, maxfd;
200 fd_set oreadfds, owritefds, oexceptfds;
205 fcntl(s_snd, F_SETFD, O_NONBLOCK);
206 oreadfds = readfds; owritefds = writefds; oexceptfds = exceptfds;
207 if (s_rcv >= FD_SETSIZE)
208 exit_failure("descriptor too big");
209 FD_SET(s_rcv, &readfds);
210 FD_SET(s_rcv, &exceptfds);
212 maxfd = (s_rcv > s_snd) ? s_rcv : s_snd;
215 tv.tv_sec = FAITH_TIMEOUT / 4;
218 owritefds = writefds;
219 oexceptfds = exceptfds;
220 error = select(maxfd + 1, &readfds, &writefds, &exceptfds, &tv);
224 exit_failure("select: %s", strerror(errno));
225 } else if (error == 0) {
227 writefds = owritefds;
228 exceptfds = oexceptfds;
233 /* activity notification */
236 if (FD_ISSET(s_rcv, &exceptfds)) {
237 error = ioctl(s_rcv, SIOCATMARK, &atmark);
238 if (error != -1 && atmark == 1) {
241 cc = read(s_rcv, atmark_buf, 1);
243 if (s_rcv >= FD_SETSIZE)
244 exit_failure("descriptor too big");
245 FD_CLR(s_rcv, &exceptfds);
246 if (s_snd >= FD_SETSIZE)
247 exit_failure("descriptor too big");
248 FD_SET(s_snd, &writefds);
250 } else if (cc == -1) {
253 exit_failure("reading oob data failed"
259 if (FD_ISSET(s_rcv, &readfds)) {
260 relaydata_read_retry:
261 tblen = read(s_rcv, tcpbuf, sizeof(tcpbuf));
267 goto relaydata_read_retry;
268 exit_failure("reading relay data failed: %s",
272 /* to close opposite-direction relay process */
277 exit_success("terminating %s relay", service);
280 if (s_rcv >= FD_SETSIZE)
281 exit_failure("descriptor too big");
282 FD_CLR(s_rcv, &readfds);
283 if (s_snd >= FD_SETSIZE)
284 exit_failure("descriptor too big");
285 FD_SET(s_snd, &writefds);
289 if (FD_ISSET(s_snd, &writefds))
290 send_data(s_rcv, s_snd, service, direction);
295 tcp_relay(int s_src, int s_dst, const char *service)
297 syslog(LOG_INFO, "starting %s relay", service);
299 child_lastactive = parent_lastactive = time(NULL);
304 exit_failure("tcp_relay: can't fork grand child: %s",
308 /* child process: relay going traffic */
310 /* this is child so reopen log */
312 openlog(logname, LOG_PID | LOG_NOWAIT, LOG_DAEMON);
313 relay(s_src, s_dst, service, 1);
316 /* parent process: relay coming traffic */
318 signal(SIGUSR1, sig_ctimeout);
319 signal(SIGCHLD, sig_child);
320 relay(s_dst, s_src, service, 0);