From owner-freebsd-bugs Mon Apr 22 02:50:03 1996 Return-Path: owner-bugs Received: (from root@localhost) by freefall.freebsd.org (8.7.3/8.7.3) id CAA25780 for bugs-outgoing; Mon, 22 Apr 1996 02:50:03 -0700 (PDT) Received: (from gnats@localhost) by freefall.freebsd.org (8.7.3/8.7.3) id CAA25774 Mon, 22 Apr 1996 02:50:01 -0700 (PDT) Resent-Date: Mon, 22 Apr 1996 02:50:01 -0700 (PDT) Resent-Message-Id: <199604220950.CAA25774@freefall.freebsd.org> Resent-From: gnats (GNATS Management) Resent-To: freebsd-bugs Resent-Reply-To: FreeBSD-gnats@freefall.FreeBSD.org, nnd@itfs.nsk.su Received: from info.itfs.nsk.su (info.itfs.nsk.su [193.124.36.46]) by freefall.freebsd.org (8.7.3/8.7.3) with ESMTP id CAA25628 for ; Mon, 22 Apr 1996 02:45:00 -0700 (PDT) Received: (from root@localhost) by info.itfs.nsk.su (8.7.5/8.7.3) id QAA02625; Mon, 22 Apr 1996 16:44:35 +0700 (NSD) Message-Id: <199604220944.QAA02625@info.itfs.nsk.su> Date: Mon, 22 Apr 1996 16:44:35 +0700 (NSD) From: nnd@itfs.nsk.su Reply-To: nnd@itfs.nsk.su To: FreeBSD-gnats-submit@freebsd.org X-Send-Pr-Version: 3.2 Subject: bin/1154: Ip-over-ip tunneling (program for) Sender: owner-bugs@freebsd.org X-Loop: FreeBSD.org Precedence: bulk >Number: 1154 >Category: bin >Synopsis: Configure tunN device for ip-over-ip tunnelling >Confidential: no >Severity: non-critical >Priority: medium >Responsible: freebsd-bugs >State: open >Class: change-request >Submitter-Id: current-users >Arrival-Date: Mon Apr 22 02:50:01 PDT 1996 >Last-Modified: >Originator: Nickolay N. Dudorov >Organization: Infoteka Ltd. >Release: FreeBSD 2.2-CURRENT i386 >Environment: Networked FreeBSD system with 'tunN' devices. >Description: Some times it is required to provide a 'tunnel' between two hosts on network and establish 'direct' interface between them regardless of real network topology. One of possible solutions can be using ip-over-ip encapsulation. Such feature exists in CISCO-routers in form of 'tunnel' interaces. >How-To-Repeat: There is no standard FreeBSD utilities for ip-over-ip encapsulation and tunneling. >Fix: The next program can be used to 'solve the problem'. ============================================================== /* * Copyright (c) 1996, Nickolay Dudorov * All rights reserved. * * Redistribution and use in source and binary forms, with or without * modification, are permitted provided that the following conditions * are met: * 1. Redistributions of source code must retain the above copyright * notice unmodified, this list of conditions, and the following * disclaimer. * 2. Redistributions in binary form must reproduce the above copyright * notice, this list of conditions and the following disclaimer in the * documentation and/or other materials provided with the distribution. * * THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF * SUCH DAMAGE. * */ /* * 'tunnel' program configure tunN interface as a point-to-point * connection with two "pseudo"-addresses between this host and * 'target'. * * It uses Ip-over-Ip incapsulation ( protocol number 94 - IPIP) * (known as NOS-incapsulation in CISCO-routers' terminology). * * 'tunnel' can works with itself and CISCO-routers. * (It may also work with Linux 'tunnel's, but * I have no Linux system here to test with). * * BUGS (or features ?): * - you must specify ONE of the target host's addresses * ( tunnel sends and accepts packets only to/from this * address ) * - there can be only ONE tunnel between two hosts, * more precisely - between given host and (one of) * target hosts' address(es) * (and why do you want more ?) */ #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include /* Tunnel interface configuration stuff */ static struct ifaliasreq ifra; static struct ifreq ifrq; /* Global descriptors */ int net; /* socket descriptor */ int tun; /* tunnel descriptor */ int Set_address(char *addr, struct sockaddr_in *sin) { struct hostent *hp; bzero((char *)sin, sizeof(struct sockaddr)); sin->sin_family = AF_INET; if((sin->sin_addr.s_addr = inet_addr(addr)) == (u_long)-1) { hp = gethostbyname(addr); if (!hp) { syslog(LOG_ERR,"Unknown host %s\n", addr); return 1; } sin->sin_family = hp->h_addrtype; bcopy(hp->h_addr, (caddr_t)&sin->sin_addr, hp->h_length); } return 0; } int tun_open(char *devname, struct sockaddr *ouraddr, char *theiraddr) { int s; struct sockaddr_in *sin; /* Open tun device */ tun = open (devname, O_RDWR); if (tun < 0) { syslog(LOG_ERR,"Can't open %s - %m",devname); return(1); } /* * At first, name the interface. */ bzero((char *)&ifra, sizeof(ifra)); bzero((char *)&ifrq, sizeof(ifrq)); strncpy(ifrq.ifr_name, devname+5, IFNAMSIZ); strncpy(ifra.ifra_name, devname+5, IFNAMSIZ); s = socket(AF_INET, SOCK_DGRAM, 0); if (s < 0) { syslog(LOG_ERR,"Can't open socket - %m"); goto tunc_return; } /* * Delete (previous) adresses for interface * * !!!! * On FreeBSD this ioctl returns error * when tunN have no addresses, so - log and ignore it. * */ if (ioctl(s, SIOCDIFADDR, &ifra) < 0) { syslog(LOG_ERR,"SIOCDIFADDR - %m"); } /* * Set interface address */ sin = (struct sockaddr_in *)&(ifra.ifra_addr); bcopy(ouraddr, sin, sizeof(struct sockaddr_in)); sin->sin_len = sizeof(*sin); /* * Set destination address */ sin = (struct sockaddr_in *)&(ifra.ifra_broadaddr); if(Set_address(theiraddr,sin)) { syslog(LOG_ERR,"Bad destination address:%s\n",theiraddr); goto stunc_return; } sin->sin_len = sizeof(*sin); if (ioctl(s, SIOCAIFADDR, &ifra) < 0) { syslog(LOG_ERR,"Can't set interface address - %m"); goto stunc_return; } /* * Now, bring up the interface. */ if (ioctl(s, SIOCGIFFLAGS, &ifrq) < 0) { syslog(LOG_ERR,"Can't get interface flags - %m"); goto stunc_return; } ifrq.ifr_flags |= IFF_UP; if (!(ioctl(s, SIOCSIFFLAGS, &ifrq) < 0)) { close(s); return(0); } syslog(LOG_ERR,"Can't set interface UP - %m"); stunc_return: close(s); tunc_return: close(tun); return(1); } void Finish(int signum) { int s; syslog(LOG_INFO,"Exiting"); close(net); s = socket(AF_INET, SOCK_DGRAM, 0); if (s < 0) { syslog(LOG_ERR,"Can't open socket - %m"); goto closing_tun; } /* * Shut down interface. */ if (ioctl(s, SIOCGIFFLAGS, &ifrq) < 0) { syslog(LOG_ERR,"Can't get interface flags - %m"); goto closing_fds; } ifrq.ifr_flags &= ~(IFF_UP|IFF_RUNNING); if (ioctl(s, SIOCSIFFLAGS, &ifrq) < 0) { syslog(LOG_ERR,"Can't set interface DOWN - %m"); goto closing_fds; } /* * Delete adresses for interface */ bzero(&ifra.ifra_addr, sizeof(ifra.ifra_addr)); bzero(&ifra.ifra_broadaddr, sizeof(ifra.ifra_addr)); bzero(&ifra.ifra_mask, sizeof(ifra.ifra_addr)); if (ioctl(s, SIOCDIFADDR, &ifra) < 0) { syslog(LOG_ERR,"Can't delete interface's addresses - %m"); } closing_fds: close(s); closing_tun: close(tun); closelog(); exit(signum); } int main (int argc, char **argv) { int c, len, ipoff; char *devname = NULL; char *point_to = NULL; char *to_point = NULL; char *target; struct sockaddr t_laddr; /* Source address of tunnel */ struct sockaddr whereto; /* Destination of tunnel */ struct sockaddr_in *to; char buf[0x2000]; /* Packets buffer */ struct ip *ip = (struct ip *)buf; fd_set rfds, wfds, efds; /* File descriptors for select() */ int nfds; /* Return from select() */ while ((c = getopt(argc, argv, "d:s:t:")) != EOF) { switch (c) { case 'd': to_point = optarg; break; case 's': point_to = optarg; break; case 't': devname = optarg; break; } } argc -= optind; argv += optind; if (argc != 1 || (devname == NULL) || (point_to == NULL) || (to_point == NULL)) { fprintf(stderr, "Usage: tunnel -t -s -d \n"); exit(1); } target = *argv; /* Establish logging through 'syslog' */ openlog("tunnel", LOG_PID, LOG_DAEMON); if(Set_address(point_to, (struct sockaddr_in *)&t_laddr)) { closelog(); exit(2); } if(tun_open(devname, &t_laddr, to_point)) { closelog(); exit(3); } to = (struct sockaddr_in *)&whereto; if(Set_address(target, to)) Finish(4); if ((net = socket(AF_INET, SOCK_RAW, 94)) < 0) { syslog(LOG_ERR,"Can't open socket - %m"); Finish(5); } if (connect(net,&whereto,sizeof(struct sockaddr_in)) < 0 ) { syslog(LOG_ERR,"Can't connect to target - %m"); close(net); Finish(6); } /* Demonize it */ daemon(0,0); /* Install signal handlers */ (void)signal(SIGHUP,Finish); (void)signal(SIGINT,Finish); (void)signal(SIGTERM,Finish); for (;;) { /* Set file descriptors for select() */ FD_ZERO(&rfds); FD_ZERO(&wfds); FD_ZERO(&efds); FD_SET(tun,&rfds); FD_SET(net,&rfds); nfds = select(net+10,&rfds,&wfds,&efds,NULL); if(nfds < 0) { syslog(LOG_ERR,"Interrupted select"); close(net); Finish(7); } if(nfds == 0) { /* Impossible ? */ syslog(LOG_ERR,"Timeout in select"); close(net); Finish(8); } if(FD_ISSET(net,&rfds)) { /* Read from socket ... */ len = read(net, buf, sizeof(buf)); /* Check if this is "our" packet */ if((ip->ip_src).s_addr == (to->sin_addr).s_addr) { /* ... skip encapsulation headers ... */ ipoff = (ip->ip_hl << 2); /* ... and write to tun-device */ write(tun,buf+ipoff,len-ipoff); } } if(FD_ISSET(tun,&rfds)) { /* Read from tun ... */ len = read(tun, buf, sizeof(buf)); /* ... and send to network */ if(send(net, buf, len,0) <= 0) { syslog(LOG_ERR,"Can't send - %m"); } } } } >Audit-Trail: >Unformatted: