X-Git-Url: http://git.meshlink.io/?a=blobdiff_plain;f=src%2Fnet_packet.c;h=953887a53d3eed52c741c76712fb7ccffb42f263;hb=529b8fab8c21e7ae5af91d742ff202eab38e51f3;hp=c816532711e8a685f597d6e4ddba1c9085bce457;hpb=cec602155ba9e3e27a7436e360c8934a1599423b;p=meshlink diff --git a/src/net_packet.c b/src/net_packet.c index c8165327..953887a5 100644 --- a/src/net_packet.c +++ b/src/net_packet.c @@ -102,6 +102,12 @@ static void send_mtu_probe_handler(event_loop_t *loop, void *data) { } if(n->mtuprobes == 31) { + if(!n->minmtu && n->status.want_udp) { + /* Send a dummy ANS_KEY to try to update the reflexive UDP address */ + send_request(mesh, n->nexthop->connection, NULL, "%d %s %s . -1 -1 -1 0", ANS_KEY, mesh->self->name, n->name); + n->status.want_udp = false; + } + timeout = mesh->dev_class_traits[n->devclass].pinginterval; goto end; } else if(n->mtuprobes == 32) { @@ -120,7 +126,7 @@ static void send_mtu_probe_handler(event_loop_t *loop, void *data) { } else if(n->maxmtu <= n->minmtu) { len = n->maxmtu; } else { - len = n->minmtu + 1 + rand() % (n->maxmtu - n->minmtu); + len = n->minmtu + 1 + prng(mesh, n->maxmtu - n->minmtu); } if(len < 64) { @@ -143,7 +149,7 @@ static void send_mtu_probe_handler(event_loop_t *loop, void *data) { end: timeout_set(&mesh->loop, &n->mtutimeout, &(struct timeval) { - timeout, rand() % 100000 + timeout, prng(mesh, TIMER_FUDGE) }); } @@ -155,6 +161,11 @@ void send_mtu_probe(meshlink_handle_t *mesh, node_t *n) { } static void mtu_probe_h(meshlink_handle_t *mesh, node_t *n, vpn_packet_t *packet, uint16_t len) { + if(len < 64) { + logger(mesh, MESHLINK_WARNING, "Got too short MTU probe length %d from %s", packet->len, n->name); + return; + } + logger(mesh, MESHLINK_DEBUG, "Got MTU probe length %d from %s", packet->len, n->name); if(!packet->data[0]) { @@ -174,7 +185,14 @@ static void mtu_probe_h(meshlink_handle_t *mesh, node_t *n, vpn_packet_t *packet is possible using the address and socket that the reply packet used. */ - n->status.udp_confirmed = true; + if(!n->status.udp_confirmed) { + char *address, *port; + sockaddr2str(&n->address, &address, &port); + send_request(mesh, n->nexthop->connection, NULL, "%d %s %s . -1 -1 -1 0 %s %s", ANS_KEY, n->name, n->name, address, port); + free(address); + free(port); + n->status.udp_confirmed = true; + } /* If we haven't established the PMTU yet, restart the discovery process. */ @@ -238,7 +256,9 @@ static void receive_udppacket(meshlink_handle_t *mesh, node_t *n, vpn_packet_t * return; } - sptps_receive_data(&n->sptps, inpkt->data, inpkt->len); + if(!sptps_receive_data(&n->sptps, inpkt->data, inpkt->len)) { + logger(mesh, MESHLINK_ERROR, "Could not process SPTPS data from %s: %s", n->name, strerror(errno)); + } } static void send_sptps_packet(meshlink_handle_t *mesh, node_t *n, vpn_packet_t *origpkt) { @@ -292,7 +312,7 @@ static void choose_udp_address(meshlink_handle_t *mesh, const node_t *n, const s So we pick a random edge and a random socket. */ int i = 0; - int j = rand() % n->edge_tree->count; + int j = prng(mesh, n->edge_tree->count); edge_t *candidate = NULL; for splay_each(edge_t, e, n->edge_tree) { @@ -304,7 +324,7 @@ static void choose_udp_address(meshlink_handle_t *mesh, const node_t *n, const s if(candidate) { *sa = &candidate->address; - *sock = rand() % mesh->listen_sockets; + *sock = prng(mesh, mesh->listen_sockets); } /* Make sure we have a suitable socket for the chosen address */ @@ -319,32 +339,16 @@ static void choose_udp_address(meshlink_handle_t *mesh, const node_t *n, const s } static void choose_broadcast_address(meshlink_handle_t *mesh, const node_t *n, const sockaddr_t **sa, int *sock) { - static sockaddr_t broadcast_ipv4 = { - .in = { - .sin_family = AF_INET, - .sin_addr.s_addr = -1, - } - }; - - static sockaddr_t broadcast_ipv6 = { - .in6 = { - .sin6_family = AF_INET6, - .sin6_addr.s6_addr[0x0] = 0xff, - .sin6_addr.s6_addr[0x1] = 0x02, - .sin6_addr.s6_addr[0xf] = 0x01, - } - }; - - *sock = rand() % mesh->listen_sockets; + *sock = prng(mesh, mesh->listen_sockets); + sockaddr_t *broadcast_sa = &mesh->listen_socket[*sock].broadcast_sa; - if(mesh->listen_socket[*sock].sa.sa.sa_family == AF_INET6) { - broadcast_ipv6.in6.sin6_port = n->prevedge->address.in.sin_port; - broadcast_ipv6.in6.sin6_scope_id = mesh->listen_socket[*sock].sa.in6.sin6_scope_id; - *sa = &broadcast_ipv6; + if(broadcast_sa->sa.sa_family == AF_INET6) { + broadcast_sa->in6.sin6_port = n->prevedge->address.in.sin_port; } else { - broadcast_ipv4.in.sin_port = n->prevedge->address.in.sin_port; - *sa = &broadcast_ipv4; + broadcast_sa->in.sin_port = n->prevedge->address.in.sin_port; } + + *sa = broadcast_sa; } static void send_udppacket(meshlink_handle_t *mesh, node_t *n, vpn_packet_t *origpkt) { @@ -357,6 +361,10 @@ static void send_udppacket(meshlink_handle_t *mesh, node_t *n, vpn_packet_t *ori } bool send_sptps_data(void *handle, uint8_t type, const void *data, size_t len) { + assert(handle); + assert(data); + assert(len); + node_t *to = handle; meshlink_handle_t *mesh = to->mesh; @@ -405,6 +413,9 @@ bool send_sptps_data(void *handle, uint8_t type, const void *data, size_t len) { } bool receive_sptps_record(void *handle, uint8_t type, const void *data, uint16_t len) { + assert(handle); + assert(!data || len); + node_t *from = handle; meshlink_handle_t *mesh = from->mesh; @@ -476,27 +487,12 @@ void send_packet(meshlink_handle_t *mesh, node_t *n, vpn_packet_t *packet) { n->out_packets++; n->out_bytes += packet->len; + n->status.want_udp = true; send_sptps_packet(mesh, n, packet); return; } -/* Broadcast a packet using the minimum spanning tree */ - -void broadcast_packet(meshlink_handle_t *mesh, const node_t *from, vpn_packet_t *packet) { - // Always give ourself a copy of the packet. - if(from != mesh->self) { - send_packet(mesh, mesh->self, packet); - } - - logger(mesh, MESHLINK_INFO, "Broadcasting packet of %d bytes from %s", packet->len, from->name); - - for list_each(connection_t, c, mesh->connections) - if(c->status.active && c->status.mst && c != from->nexthop->connection) { - send_packet(mesh, c->node, packet); - } -} - static node_t *try_harder(meshlink_handle_t *mesh, const sockaddr_t *from, const vpn_packet_t *pkt) { node_t *n = NULL; bool hard = false;