Mercurial > pidgin.yaz
comparison libpurple/stun.c @ 15374:5fe8042783c1
Rename gtk/ and libgaim/ to pidgin/ and libpurple/
author | Sean Egan <seanegan@gmail.com> |
---|---|
date | Sat, 20 Jan 2007 02:32:10 +0000 |
parents | |
children | 32c366eeeb99 |
comparison
equal
deleted
inserted
replaced
15373:f79e0f4df793 | 15374:5fe8042783c1 |
---|---|
1 /** | |
2 * @file stun.c STUN (RFC3489) Implementation | |
3 * @ingroup core | |
4 * | |
5 * gaim | |
6 * | |
7 * STUN implementation inspired by jstun [http://jstun.javawi.de/] | |
8 * | |
9 * Gaim is the legal property of its developers, whose names are too numerous | |
10 * to list here. Please refer to the COPYRIGHT file distributed with this | |
11 * source distribution. | |
12 * | |
13 * This program is free software; you can redistribute it and/or modify | |
14 * it under the terms of the GNU General Public License as published by | |
15 * the Free Software Foundation; either version 2 of the License, or | |
16 * (at your option) any later version. | |
17 * | |
18 * This program is distributed in the hope that it will be useful, | |
19 * but WITHOUT ANY WARRANTY; without even the implied warranty of | |
20 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the | |
21 * GNU General Public License for more details. | |
22 * | |
23 * You should have received a copy of the GNU General Public License | |
24 * along with this program; if not, write to the Free Software | |
25 * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA | |
26 * | |
27 */ | |
28 | |
29 #include "internal.h" | |
30 | |
31 #ifndef _WIN32 | |
32 #include <net/if.h> | |
33 #include <sys/ioctl.h> | |
34 #endif | |
35 | |
36 /* Solaris */ | |
37 #if defined (__SVR4) && defined (__sun) | |
38 #include <sys/sockio.h> | |
39 #endif | |
40 | |
41 #include "debug.h" | |
42 #include "account.h" | |
43 #include "dnsquery.h" | |
44 #include "dnssrv.h" | |
45 #include "network.h" | |
46 #include "proxy.h" | |
47 #include "stun.h" | |
48 #include "prefs.h" | |
49 | |
50 #define MSGTYPE_BINDINGREQUEST 0x0001 | |
51 #define MSGTYPE_BINDINGRESPONSE 0x0101 | |
52 | |
53 #define ATTRIB_MAPPEDADDRESS 0x0001 | |
54 | |
55 struct stun_header { | |
56 guint16 type; | |
57 guint16 len; | |
58 guint32 transid[4]; | |
59 }; | |
60 | |
61 struct stun_attrib { | |
62 guint16 type; | |
63 guint16 len; | |
64 }; | |
65 | |
66 #ifdef NOTYET | |
67 struct stun_change { | |
68 struct stun_header hdr; | |
69 struct stun_attrib attrib; | |
70 char value[4]; | |
71 }; | |
72 #endif | |
73 | |
74 struct stun_conn { | |
75 int fd; | |
76 struct sockaddr_in addr; | |
77 int test; | |
78 int retry; | |
79 guint incb; | |
80 guint timeout; | |
81 struct stun_header *packet; | |
82 size_t packetsize; | |
83 }; | |
84 | |
85 static GaimStunNatDiscovery nattype = { | |
86 GAIM_STUN_STATUS_UNDISCOVERED, | |
87 GAIM_STUN_NAT_TYPE_PUBLIC_IP, | |
88 "\0", NULL, 0}; | |
89 | |
90 static GSList *callbacks = NULL; | |
91 | |
92 static void close_stun_conn(struct stun_conn *sc) { | |
93 | |
94 if (sc->incb) | |
95 gaim_input_remove(sc->incb); | |
96 | |
97 if (sc->timeout) | |
98 gaim_timeout_remove(sc->timeout); | |
99 | |
100 if (sc->fd) | |
101 close(sc->fd); | |
102 | |
103 g_free(sc); | |
104 } | |
105 | |
106 static void do_callbacks() { | |
107 while(callbacks) { | |
108 StunCallback cb = callbacks->data; | |
109 if(cb) | |
110 cb(&nattype); | |
111 callbacks = g_slist_remove(callbacks, cb); | |
112 } | |
113 } | |
114 | |
115 static gboolean timeoutfunc(gpointer data) { | |
116 struct stun_conn *sc = data; | |
117 if(sc->retry >= 2) { | |
118 gaim_debug_info("stun", "request timed out, giving up.\n"); | |
119 if(sc->test == 2) | |
120 nattype.type = GAIM_STUN_NAT_TYPE_SYMMETRIC; | |
121 | |
122 /* set unknown */ | |
123 nattype.status = GAIM_STUN_STATUS_UNKNOWN; | |
124 | |
125 nattype.lookup_time = time(NULL); | |
126 | |
127 /* callbacks */ | |
128 do_callbacks(); | |
129 | |
130 /* we don't need to remove the timeout (returning FALSE) */ | |
131 sc->timeout = 0; | |
132 close_stun_conn(sc); | |
133 | |
134 return FALSE; | |
135 } | |
136 gaim_debug_info("stun", "request timed out, retrying.\n"); | |
137 sc->retry++; | |
138 sendto(sc->fd, sc->packet, sc->packetsize, 0, | |
139 (struct sockaddr *)&(sc->addr), sizeof(struct sockaddr_in)); | |
140 return TRUE; | |
141 } | |
142 | |
143 #ifdef NOTYET | |
144 static void do_test2(struct stun_conn *sc) { | |
145 struct stun_change data; | |
146 data.hdr.type = htons(0x0001); | |
147 data.hdr.len = 0; | |
148 data.hdr.transid[0] = rand(); | |
149 data.hdr.transid[1] = ntohl(((int)'g' << 24) + ((int)'a' << 16) + ((int)'i' << 8) + (int)'m'); | |
150 data.hdr.transid[2] = rand(); | |
151 data.hdr.transid[3] = rand(); | |
152 data.attrib.type = htons(0x003); | |
153 data.attrib.len = htons(4); | |
154 data.value[3] = 6; | |
155 sc->packet = (struct stun_header*)&data; | |
156 sc->packetsize = sizeof(struct stun_change); | |
157 sc->retry = 0; | |
158 sc->test = 2; | |
159 sendto(sc->fd, sc->packet, sc->packetsize, 0, (struct sockaddr *)&(sc->addr), sizeof(struct sockaddr_in)); | |
160 sc->timeout = gaim_timeout_add(500, (GSourceFunc) timeoutfunc, sc); | |
161 } | |
162 #endif | |
163 | |
164 static void reply_cb(gpointer data, gint source, GaimInputCondition cond) { | |
165 struct stun_conn *sc = data; | |
166 char buffer[65536]; | |
167 char *tmp; | |
168 int len; | |
169 struct in_addr in; | |
170 struct stun_attrib *attrib; | |
171 struct stun_header *hdr; | |
172 struct ifconf ifc; | |
173 struct ifreq *ifr; | |
174 struct sockaddr_in *sinptr; | |
175 | |
176 len = recv(source, buffer, sizeof(buffer) - 1, 0); | |
177 if (!len) { | |
178 gaim_debug_info("stun", "unable to read stun response\n"); | |
179 return; | |
180 } | |
181 buffer[len] = '\0'; | |
182 | |
183 if (len < sizeof(struct stun_header)) { | |
184 gaim_debug_info("stun", "got invalid response\n"); | |
185 return; | |
186 } | |
187 | |
188 hdr = (struct stun_header*) buffer; | |
189 if (len != (ntohs(hdr->len) + sizeof(struct stun_header))) { | |
190 gaim_debug_info("stun", "got incomplete response\n"); | |
191 return; | |
192 } | |
193 | |
194 /* wrong transaction */ | |
195 if(hdr->transid[0] != sc->packet->transid[0] | |
196 || hdr->transid[1] != sc->packet->transid[1] | |
197 || hdr->transid[2] != sc->packet->transid[2] | |
198 || hdr->transid[3] != sc->packet->transid[3]) { | |
199 gaim_debug_info("stun", "got wrong transid\n"); | |
200 return; | |
201 } | |
202 | |
203 if(sc->test==1) { | |
204 if (hdr->type != MSGTYPE_BINDINGRESPONSE) { | |
205 gaim_debug_info("stun", | |
206 "Expected Binding Response, got %d\n", | |
207 hdr->type); | |
208 return; | |
209 } | |
210 | |
211 tmp = buffer + sizeof(struct stun_header); | |
212 while((buffer + len) > (tmp + sizeof(struct stun_attrib))) { | |
213 attrib = (struct stun_attrib*) tmp; | |
214 tmp += sizeof(struct stun_attrib); | |
215 | |
216 if (!((buffer + len) > (tmp + ntohs(attrib->len)))) | |
217 break; | |
218 | |
219 if(attrib->type == htons(ATTRIB_MAPPEDADDRESS) | |
220 && ntohs(attrib->len) == 8) { | |
221 char *ip; | |
222 /* Skip the first unused byte, | |
223 * the family(1 byte), and the port(2 bytes); | |
224 * then read the 4 byte IPv4 address */ | |
225 memcpy(&in.s_addr, tmp + 4, 4); | |
226 ip = inet_ntoa(in); | |
227 if(ip) | |
228 strcpy(nattype.publicip, ip); | |
229 } | |
230 | |
231 tmp += ntohs(attrib->len); | |
232 } | |
233 gaim_debug_info("stun", "got public ip %s\n", nattype.publicip); | |
234 nattype.status = GAIM_STUN_STATUS_DISCOVERED; | |
235 nattype.type = GAIM_STUN_NAT_TYPE_UNKNOWN_NAT; | |
236 nattype.lookup_time = time(NULL); | |
237 | |
238 /* is it a NAT? */ | |
239 | |
240 ifc.ifc_len = sizeof(buffer); | |
241 ifc.ifc_req = (struct ifreq *) buffer; | |
242 ioctl(source, SIOCGIFCONF, &ifc); | |
243 | |
244 tmp = buffer; | |
245 while(tmp < buffer + ifc.ifc_len) { | |
246 ifr = (struct ifreq *) tmp; | |
247 | |
248 tmp += sizeof(struct ifreq); | |
249 | |
250 if(ifr->ifr_addr.sa_family == AF_INET) { | |
251 /* we only care about ipv4 interfaces */ | |
252 sinptr = (struct sockaddr_in *) &ifr->ifr_addr; | |
253 if(sinptr->sin_addr.s_addr == in.s_addr) { | |
254 /* no NAT */ | |
255 gaim_debug_info("stun", "no nat"); | |
256 nattype.type = GAIM_STUN_NAT_TYPE_PUBLIC_IP; | |
257 } | |
258 } | |
259 } | |
260 | |
261 #ifndef NOTYET | |
262 close_stun_conn(sc); | |
263 do_callbacks(); | |
264 #else | |
265 gaim_timeout_remove(sc->timeout); | |
266 sc->timeout = 0; | |
267 | |
268 do_test2(sc); | |
269 } else if(sc->test == 2) { | |
270 close_stun_conn(sc); | |
271 nattype.type = GAIM_STUN_NAT_TYPE_FULL_CONE; | |
272 do_callbacks(); | |
273 #endif | |
274 } | |
275 } | |
276 | |
277 | |
278 static void hbn_listen_cb(int fd, gpointer data) { | |
279 GSList *hosts = data; | |
280 struct stun_conn *sc; | |
281 static struct stun_header hdr_data; | |
282 int ret; | |
283 | |
284 if(fd < 0) { | |
285 nattype.status = GAIM_STUN_STATUS_UNKNOWN; | |
286 nattype.lookup_time = time(NULL); | |
287 do_callbacks(); | |
288 return; | |
289 } | |
290 | |
291 sc = g_new0(struct stun_conn, 1); | |
292 sc->fd = fd; | |
293 | |
294 sc->addr.sin_family = AF_INET; | |
295 sc->addr.sin_port = htons(gaim_network_get_port_from_fd(fd)); | |
296 sc->addr.sin_addr.s_addr = INADDR_ANY; | |
297 | |
298 sc->incb = gaim_input_add(fd, GAIM_INPUT_READ, reply_cb, sc); | |
299 | |
300 ret = GPOINTER_TO_INT(hosts->data); | |
301 hosts = g_slist_remove(hosts, hosts->data); | |
302 memcpy(&(sc->addr), hosts->data, sizeof(struct sockaddr_in)); | |
303 g_free(hosts->data); | |
304 hosts = g_slist_remove(hosts, hosts->data); | |
305 while(hosts) { | |
306 hosts = g_slist_remove(hosts, hosts->data); | |
307 g_free(hosts->data); | |
308 hosts = g_slist_remove(hosts, hosts->data); | |
309 } | |
310 | |
311 hdr_data.type = htons(MSGTYPE_BINDINGREQUEST); | |
312 hdr_data.len = 0; | |
313 hdr_data.transid[0] = rand(); | |
314 hdr_data.transid[1] = ntohl(((int)'g' << 24) + ((int)'a' << 16) + ((int)'i' << 8) + (int)'m'); | |
315 hdr_data.transid[2] = rand(); | |
316 hdr_data.transid[3] = rand(); | |
317 | |
318 if(sendto(sc->fd, &hdr_data, sizeof(struct stun_header), 0, | |
319 (struct sockaddr *)&(sc->addr), | |
320 sizeof(struct sockaddr_in)) < sizeof(struct stun_header)) { | |
321 nattype.status = GAIM_STUN_STATUS_UNKNOWN; | |
322 nattype.lookup_time = time(NULL); | |
323 do_callbacks(); | |
324 close_stun_conn(sc); | |
325 return; | |
326 } | |
327 sc->test = 1; | |
328 sc->packet = &hdr_data; | |
329 sc->packetsize = sizeof(struct stun_header); | |
330 sc->timeout = gaim_timeout_add(500, (GSourceFunc) timeoutfunc, sc); | |
331 } | |
332 | |
333 static void hbn_cb(GSList *hosts, gpointer data, const char *error_message) { | |
334 | |
335 if(!hosts || !hosts->data) { | |
336 nattype.status = GAIM_STUN_STATUS_UNDISCOVERED; | |
337 nattype.lookup_time = time(NULL); | |
338 do_callbacks(); | |
339 return; | |
340 } | |
341 | |
342 if (!gaim_network_listen_range(12108, 12208, SOCK_DGRAM, hbn_listen_cb, hosts)) { | |
343 nattype.status = GAIM_STUN_STATUS_UNKNOWN; | |
344 nattype.lookup_time = time(NULL); | |
345 do_callbacks(); | |
346 return; | |
347 } | |
348 | |
349 | |
350 } | |
351 | |
352 static void do_test1(GaimSrvResponse *resp, int results, gpointer sdata) { | |
353 const char *servername = sdata; | |
354 int port = 3478; | |
355 | |
356 if(results) { | |
357 servername = resp[0].hostname; | |
358 port = resp[0].port; | |
359 } | |
360 gaim_debug_info("stun", "got %d SRV responses, server: %s, port: %d\n", | |
361 results, servername, port); | |
362 | |
363 gaim_dnsquery_a(servername, port, hbn_cb, NULL); | |
364 g_free(resp); | |
365 } | |
366 | |
367 static gboolean call_callback(gpointer data) { | |
368 StunCallback cb = data; | |
369 cb(&nattype); | |
370 return FALSE; | |
371 } | |
372 | |
373 GaimStunNatDiscovery *gaim_stun_discover(StunCallback cb) { | |
374 const char *servername = gaim_prefs_get_string("/core/network/stun_server"); | |
375 | |
376 gaim_debug_info("stun", "using server %s\n", servername); | |
377 | |
378 if(nattype.status == GAIM_STUN_STATUS_DISCOVERING) { | |
379 if(cb) | |
380 callbacks = g_slist_append(callbacks, cb); | |
381 return &nattype; | |
382 } | |
383 | |
384 if(nattype.status != GAIM_STUN_STATUS_UNDISCOVERED) { | |
385 gboolean use_cached_result = TRUE; | |
386 | |
387 /** Deal with the server name having changed since we did the | |
388 lookup */ | |
389 if (servername && strlen(servername) > 1 | |
390 && ((nattype.servername | |
391 && strcmp(servername, nattype.servername)) | |
392 || !nattype.servername)) { | |
393 use_cached_result = FALSE; | |
394 } | |
395 | |
396 /* If we don't have a successful status and it has been 5 | |
397 minutes since we last did a lookup, redo the lookup */ | |
398 if (nattype.status != GAIM_STUN_STATUS_DISCOVERED | |
399 && (time(NULL) - nattype.lookup_time) > 300) { | |
400 use_cached_result = FALSE; | |
401 } | |
402 | |
403 if (use_cached_result) { | |
404 if(cb) | |
405 gaim_timeout_add(10, call_callback, cb); | |
406 return &nattype; | |
407 } | |
408 } | |
409 | |
410 if(!servername || (strlen(servername) < 2)) { | |
411 nattype.status = GAIM_STUN_STATUS_UNKNOWN; | |
412 nattype.lookup_time = time(NULL); | |
413 if(cb) | |
414 gaim_timeout_add(10, call_callback, cb); | |
415 return &nattype; | |
416 } | |
417 | |
418 nattype.status = GAIM_STUN_STATUS_DISCOVERING; | |
419 nattype.publicip[0] = '\0'; | |
420 g_free(nattype.servername); | |
421 nattype.servername = g_strdup(servername); | |
422 | |
423 callbacks = g_slist_append(callbacks, cb); | |
424 gaim_srv_resolve("stun", "udp", servername, do_test1, | |
425 (gpointer) servername); | |
426 | |
427 return &nattype; | |
428 } | |
429 | |
430 void gaim_stun_init() { | |
431 gaim_prefs_add_string("/core/network/stun_server", ""); | |
432 gaim_stun_discover(NULL); | |
433 } |