freebsd-dev/usr.sbin/IPXrouted/main.c
John Hay 3333e32aa0 Add an option to disable responses to SAP_GETNEAREST_SERVER requests.
Submitted by:	Boris Popov <bp@butya.kz>
1999-04-24 09:18:49 +00:00

401 lines
9.8 KiB
C

/*
* Copyright (c) 1985, 1993
* The Regents of the University of California. All rights reserved.
*
* Copyright (c) 1995 John Hay. All rights reserved.
*
* This file includes significant work done at Cornell University by
* Bill Nesheim. That work included by permission.
*
* Redistribution and use in source and binary forms, with or without
* modification, are permitted provided that the following conditions
* are met:
* 1. Redistributions of source code must retain the above copyright
* notice, this list of conditions and the following disclaimer.
* 2. Redistributions in binary form must reproduce the above copyright
* notice, this list of conditions and the following disclaimer in the
* documentation and/or other materials provided with the distribution.
* 3. All advertising materials mentioning features or use of this software
* must display the following acknowledgement:
* This product includes software developed by the University of
* California, Berkeley and its contributors.
* 4. Neither the name of the University nor the names of its contributors
* may be used to endorse or promote products derived from this software
* without specific prior written permission.
*
* THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
* ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
* ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
* FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
* DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
* OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
* LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
* SUCH DAMAGE.
*
* $Id: main.c,v 1.7 1997/07/06 07:38:30 jhay Exp $
*/
#ifndef lint
static char copyright[] =
"@(#) Copyright (c) 1985, 1993\n\
The Regents of the University of California. All rights reserved.\n";
#endif /* not lint */
#ifndef lint
static char sccsid[] = "@(#)main.c 8.1 (Berkeley) 6/5/93";
#endif /* not lint */
/*
* IPX Routing Information Protocol Daemon
*/
#include "defs.h"
#include <sys/time.h>
#include <net/if.h>
#include <errno.h>
#include <nlist.h>
#include <signal.h>
#include <paths.h>
#include <stdlib.h>
#include <unistd.h>
#define SAP_PKT 0
#define RIP_PKT 1
struct sockaddr_ipx addr; /* Daemon's Address */
int ripsock; /* RIP Socket to listen on */
int sapsock; /* SAP Socket to listen on */
int kmem;
int install; /* if 1 call kernel */
int lookforinterfaces; /* if 1 probe kernel for new up interfaces */
int performnlist; /* if 1 check if /kernel has changed */
int externalinterfaces; /* # of remote and local interfaces */
int timeval; /* local idea of time */
int noteremoterequests; /* squawk on requests from non-local nets */
int r; /* Routing socket to install updates with */
struct sockaddr_ipx ipx_netmask; /* Used in installing routes */
char packet[MAXRXPACKETSIZE+1];
char **argv0;
int supplier = -1; /* process should supply updates */
int dosap = 1; /* By default do SAP services. */
int dobcast = 1; /* A RIP/SAP broadcast is needed. */
time_t lastbcast; /* Time of last RIP/SAP broadcast */
struct rip *msg = (struct rip *) &packet[sizeof (struct ipx)];
struct sap_packet *sap_msg =
(struct sap_packet *) &packet[sizeof (struct ipx)];
void hup(), fkexit(), timer();
void process(int fd, int pkt_type);
int getsocket(int type, int proto, struct sockaddr_ipx *sipx);
void getinfo();
void catchtimer();
int
main(argc, argv)
int argc;
char *argv[];
{
int nfds;
fd_set fdvar;
time_t ttime;
struct itimerval tval;
argv0 = argv;
argv++, argc--;
while (argc > 0 && **argv == '-') {
if (strcmp(*argv, "-s") == 0) {
supplier = 1;
argv++, argc--;
continue;
}
if (strcmp(*argv, "-q") == 0) {
supplier = 0;
argv++, argc--;
continue;
}
if (strcmp(*argv, "-R") == 0) {
noteremoterequests++;
argv++, argc--;
continue;
}
if (strcmp(*argv, "-S") == 0) {
dosap = 0;
argv++, argc--;
continue;
}
if (strcmp(*argv, "-t") == 0) {
tracepackets++;
argv++, argc--;
ftrace = stderr;
tracing = 1;
continue;
}
if (strcmp(*argv, "-g") == 0) {
gateway = 1;
argv++, argc--;
continue;
}
if (strcmp(*argv, "-l") == 0) {
gateway = -1;
argv++, argc--;
continue;
}
if (strcmp(*argv, "-N") == 0) {
dognreply = 0;
argv++, argc--;
continue;
}
fprintf(stderr,
"usage: ipxrouted [ -s ] [ -q ] [ -t ] [ -g ] [ -l ] [ -N ]\n");
exit(1);
}
#ifndef DEBUG
if (!tracepackets)
daemon(0, 0);
#endif
openlog("IPXrouted", LOG_PID, LOG_DAEMON);
addr.sipx_family = AF_IPX;
addr.sipx_len = sizeof(addr);
addr.sipx_port = htons(IPXPORT_RIP);
ipx_anynet.s_net[0] = ipx_anynet.s_net[1] = -1;
ipx_netmask.sipx_addr.x_net = ipx_anynet;
ipx_netmask.sipx_len = 6;
ipx_netmask.sipx_family = AF_IPX;
r = socket(AF_ROUTE, SOCK_RAW, 0);
/* later, get smart about lookingforinterfaces */
if (r)
shutdown(r, 0); /* for now, don't want reponses */
else {
fprintf(stderr, "IPXrouted: no routing socket\n");
exit(1);
}
ripsock = getsocket(SOCK_DGRAM, 0, &addr);
if (ripsock < 0)
exit(1);
if (dosap) {
addr.sipx_port = htons(IPXPORT_SAP);
sapsock = getsocket(SOCK_DGRAM, 0, &addr);
if (sapsock < 0)
exit(1);
} else
sapsock = -1;
/*
* Any extra argument is considered
* a tracing log file.
*/
if (argc > 0)
traceon(*argv);
/*
* Collect an initial view of the world by
* snooping in the kernel. Then, send a request packet on all
* directly connected networks to find out what
* everyone else thinks.
*/
rtinit();
sapinit();
ifinit();
if (supplier < 0)
supplier = 0;
/* request the state of the world */
msg->rip_cmd = htons(RIPCMD_REQUEST);
msg->rip_nets[0].rip_dst = ipx_anynet;
msg->rip_nets[0].rip_metric = htons(HOPCNT_INFINITY);
msg->rip_nets[0].rip_ticks = htons(-1);
toall(sndmsg, NULL, 0);
if (dosap) {
sap_msg->sap_cmd = htons(SAP_REQ);
sap_msg->sap[0].ServType = htons(SAP_WILDCARD);
toall(sapsndmsg, NULL, 0);
}
signal(SIGALRM, catchtimer);
signal(SIGHUP, hup);
signal(SIGINT, hup);
signal(SIGEMT, fkexit);
signal(SIGINFO, getinfo);
tval.it_interval.tv_sec = TIMER_RATE;
tval.it_interval.tv_usec = 0;
tval.it_value.tv_sec = TIMER_RATE;
tval.it_value.tv_usec = 0;
setitimer(ITIMER_REAL, &tval, NULL);
nfds = 1 + max(sapsock, ripsock);
for (;;) {
if (dobcast) {
dobcast = 0;
lastbcast = time(NULL);
timer();
}
FD_ZERO(&fdvar);
if (dosap) {
FD_SET(sapsock, &fdvar);
}
FD_SET(ripsock, &fdvar);
if(select(nfds, &fdvar, (fd_set *)NULL, (fd_set *)NULL,
(struct timeval *)NULL) < 0) {
if(errno == EINTR)
continue;
perror("during select");
exit(1);
}
if(FD_ISSET(ripsock, &fdvar))
process(ripsock, RIP_PKT);
if(dosap && FD_ISSET(sapsock, &fdvar))
process(sapsock, SAP_PKT);
ttime = time(NULL);
if (ttime > (lastbcast + TIMER_RATE + (TIMER_RATE * 2 / 3))) {
dobcast = 1;
syslog(LOG_ERR, "Missed alarm");
}
}
}
void
process(fd, pkt_type)
int fd;
int pkt_type;
{
struct sockaddr from;
int fromlen = sizeof (from), cc, omask;
struct ipx *ipxdp = (struct ipx *)packet;
cc = recvfrom(fd, packet, sizeof (packet), 0, &from, &fromlen);
if (cc <= 0) {
if (cc < 0 && errno != EINTR)
syslog(LOG_ERR, "recvfrom: %m");
return;
}
if (tracepackets > 1 && ftrace) {
fprintf(ftrace,"rcv %d bytes on %s ",
cc, ipxdp_ntoa(&ipxdp->ipx_dna));
fprintf(ftrace," from %s\n", ipxdp_ntoa(&ipxdp->ipx_sna));
}
if (noteremoterequests &&
!ipx_neteqnn(ipxdp->ipx_sna.x_net, ipx_zeronet) &&
!ipx_neteq(ipxdp->ipx_sna, ipxdp->ipx_dna))
{
syslog(LOG_ERR,
"net of interface (%s) != net on ether (%s)!\n",
ipxdp_nettoa(ipxdp->ipx_dna.x_net),
ipxdp_nettoa(ipxdp->ipx_sna.x_net));
}
/* We get the IPX header in front of the RIF packet*/
cc -= sizeof (struct ipx);
#define mask(s) (1<<((s)-1))
omask = sigblock(mask(SIGALRM));
switch(pkt_type) {
case SAP_PKT: sap_input(&from, cc);
break;
case RIP_PKT: rip_input(&from, cc);
break;
}
sigsetmask(omask);
}
int
getsocket(type, proto, sipx)
int type, proto;
struct sockaddr_ipx *sipx;
{
int domain = sipx->sipx_family;
int retry, s, on = 1;
retry = 1;
while ((s = socket(domain, type, proto)) < 0 && retry) {
syslog(LOG_ERR, "socket: %m");
sleep(5 * retry);
retry <<= 1;
}
if (retry == 0)
return (-1);
while (bind(s, (struct sockaddr *)sipx, sizeof (*sipx)) < 0 && retry) {
syslog(LOG_ERR, "bind: %m");
sleep(5 * retry);
retry <<= 1;
}
if (retry == 0)
return (-1);
if (domain==AF_IPX) {
struct ipx ipxdp;
if (setsockopt(s, 0, SO_HEADERS_ON_INPUT, &on, sizeof(on))) {
syslog(LOG_ERR, "setsockopt SEE HEADERS: %m");
exit(1);
}
if (ntohs(sipx->sipx_addr.x_port) == IPXPORT_RIP)
ipxdp.ipx_pt = IPXPROTO_RI;
else if (ntohs(sipx->sipx_addr.x_port) == IPXPORT_SAP)
#ifdef IPXPROTO_SAP
ipxdp.ipx_pt = IPXPROTO_SAP;
#else
ipxdp.ipx_pt = IPXPROTO_PXP;
#endif
else {
syslog(LOG_ERR, "port should be either RIP or SAP");
exit(1);
}
if (setsockopt(s, 0, SO_DEFAULT_HEADERS, &ipxdp, sizeof(ipxdp))) {
syslog(LOG_ERR, "setsockopt SET HEADER: %m");
exit(1);
}
}
if (setsockopt(s, SOL_SOCKET, SO_BROADCAST, &on, sizeof (on)) < 0) {
syslog(LOG_ERR, "setsockopt SO_BROADCAST: %m");
exit(1);
}
return (s);
}
/*
* Fork and exit on EMT-- for profiling.
*/
void
fkexit()
{
if (fork() == 0)
exit(0);
}
void
catchtimer()
{
dobcast = 1;
}
void
getinfo()
{
FILE *fh;
fh = fopen("/tmp/ipxrouted.dmp", "a");
if(fh == NULL)
return;
dumpriptable(fh);
dumpsaptable(fh, sap_head);
fclose(fh);
}