diff options
Diffstat (limited to 'osdep/MacEthernetTapAgent.c')
-rw-r--r-- | osdep/MacEthernetTapAgent.c | 404 |
1 files changed, 404 insertions, 0 deletions
diff --git a/osdep/MacEthernetTapAgent.c b/osdep/MacEthernetTapAgent.c new file mode 100644 index 00000000..fe601dbf --- /dev/null +++ b/osdep/MacEthernetTapAgent.c @@ -0,0 +1,404 @@ +/* + * ZeroTier One - Network Virtualization Everywhere + * Copyright (C) 2011-2018 ZeroTier, Inc. https://www.zerotier.com/ + * + * This program is free software: you can redistribute it and/or modify + * it under the terms of the GNU General Public License as published by + * the Free Software Foundation, either version 3 of the License, or + * (at your option) any later version. + * + * This program is distributed in the hope that it will be useful, + * but WITHOUT ANY WARRANTY; without even the implied warranty of + * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the + * GNU General Public License for more details. + * + * You should have received a copy of the GNU General Public License + * along with this program. If not, see <http://www.gnu.org/licenses/>. + * + * -- + * + * You can be released from the requirements of the license by purchasing + * a commercial license. Buying such a license is mandatory as soon as you + * develop commercial closed-source software that incorporates or links + * directly against ZeroTier software without disclosing the source code + * of your own application. + */ + +/* This is the agent program that is executed with setuid privileges to + * actually manage feth pairs. Its execution in this manner allows ZT + * itself to drop privileges on Mac. */ + +#include <stdio.h> +#include <stdlib.h> +#include <string.h> +#include <stdarg.h> +#include <unistd.h> +#include <signal.h> +#include <fcntl.h> +#include <errno.h> +#include <sys/signal.h> +#include <sys/types.h> +#include <sys/stat.h> +#include <sys/ioctl.h> +#include <sys/wait.h> +#include <sys/select.h> +#include <sys/cdefs.h> +#include <sys/uio.h> +#include <sys/param.h> +#include <sys/ioctl.h> +#include <sys/socket.h> +#include <sys/sysctl.h> +#include <netinet/in.h> +#include <arpa/inet.h> +#include <net/bpf.h> +#include <net/route.h> +#include <net/if.h> +#include <net/if_arp.h> +#include <net/if_dl.h> +#include <net/if_media.h> +#include <net/ndrv.h> +#include <netinet/in_var.h> +#include <netinet/icmp6.h> +#include <netinet6/in6_var.h> +#include <netinet6/nd6.h> +#include <ifaddrs.h> + +#include "../version.h" +#include "MacEthernetTapAgent.h" + +#ifndef SIOCAUTOCONF_START +#define SIOCAUTOCONF_START _IOWR('i', 132, struct in6_ifreq) /* accept rtadvd on this interface */ +#endif +#ifndef SIOCAUTOCONF_STOP +#define SIOCAUTOCONF_STOP _IOWR('i', 133, struct in6_ifreq) /* stop accepting rtadv for this interface */ +#endif + +#define P_IFCONFIG "/sbin/ifconfig" + +static unsigned char s_pktReadBuf[262144] __attribute__ ((__aligned__(16))); +static unsigned char s_stdinReadBuf[262144] __attribute__ ((__aligned__(16))); +static char s_deviceName[IFNAMSIZ]; +static char s_peerDeviceName[IFNAMSIZ]; +static int s_bpffd = -1; +static pid_t s_parentPid; + +static void configureIpv6Parameters(const char *ifname,int performNUD,int acceptRouterAdverts) +{ + struct in6_ndireq nd; + struct in6_ifreq ifr; + + int s = socket(AF_INET6,SOCK_DGRAM,0); + if (s <= 0) + return; + + memset(&nd,0,sizeof(nd)); + strncpy(nd.ifname,ifname,sizeof(nd.ifname)); + + if (ioctl(s,SIOCGIFINFO_IN6,&nd)) { + close(s); + return; + } + + unsigned long oldFlags = (unsigned long)nd.ndi.flags; + + if (performNUD) + nd.ndi.flags |= ND6_IFF_PERFORMNUD; + else nd.ndi.flags &= ~ND6_IFF_PERFORMNUD; + + if (oldFlags != (unsigned long)nd.ndi.flags) { + if (ioctl(s,SIOCSIFINFO_FLAGS,&nd)) { + close(s); + return; + } + } + + memset(&ifr,0,sizeof(ifr)); + strncpy(ifr.ifr_name,ifname,sizeof(ifr.ifr_name)); + if (ioctl(s,acceptRouterAdverts ? SIOCAUTOCONF_START : SIOCAUTOCONF_STOP,&ifr)) { + close(s); + return; + } + + close(s); +} + +static int run(const char *path,...) +{ + va_list ap; + char *args[16]; + int argNo = 1; + + va_start(ap,path); + args[0] = (char *)path; + for(;argNo<15;++argNo) { + args[argNo] = va_arg(ap,char *); + if (!args[argNo]) { + break; + } + } + args[argNo++] = (char *)0; + va_end(ap); + + pid_t pid = vfork(); + if (pid < 0) { + return -1; + } else if (pid == 0) { + dup2(STDERR_FILENO,STDOUT_FILENO); + execv(args[0],args); + exit(-1); + } + int rv = 0; + waitpid(pid,&rv,0); + return rv; +} + +static void die() +{ + if (s_bpffd >= 0) + close(s_bpffd); + if (s_deviceName[0]) + run("/sbin/ifconfig",s_deviceName,"destroy",(char *)0); + if (s_peerDeviceName[0]) + run("/sbin/ifconfig",s_peerDeviceName,"destroy",(char *)0); +} + +int main(int argc,char **argv) +{ + char buf[128]; + struct ifreq ifr; + u_int fl; + fd_set rfds,wfds,efds; + struct iovec iov[2]; + + s_deviceName[0] = 0; + s_peerDeviceName[0] = 0; + s_parentPid = getppid(); + + atexit(&die); + signal(SIGIO,SIG_IGN); + signal(SIGCHLD,SIG_IGN); + signal(SIGPIPE,SIG_IGN); + signal(SIGUSR1,SIG_IGN); + signal(SIGUSR2,SIG_IGN); + signal(SIGALRM,SIG_IGN); + signal(SIGQUIT,&exit); + signal(SIGTERM,&exit); + signal(SIGKILL,&exit); + signal(SIGINT,&exit); + signal(SIGPIPE,&exit); + + if (getuid() != 0) { + if (setuid(0) != 0) { + fprintf(stderr,"E must be run as root or with root setuid bit on executable\n"); + return ZT_MACETHERNETTAPAGENT_EXIT_CODE_INVALID_REQUEST; + } + } + + if (argc < 5) { + fprintf(stderr,"E invalid or missing argument(s) (usage: MacEthernetTapAgent <0-4999> <mac> <mtu> <metric>)\n"); + return ZT_MACETHERNETTAPAGENT_EXIT_CODE_INVALID_REQUEST; + } + const int deviceNo = atoi(argv[1]); + if ((deviceNo < 0)||(deviceNo > 4999)) { + fprintf(stderr,"E invalid or missing argument(s) (usage: MacEthernetTapAgent <0-4999> <mac> <mtu> <metric>)\n"); + return ZT_MACETHERNETTAPAGENT_EXIT_CODE_INVALID_REQUEST; + } + const char *mac = argv[2]; + const char *mtu = argv[3]; + const char *metric = argv[4]; + + int ndrvSocket = socket(AF_NDRV,SOCK_RAW,0); + if (ndrvSocket < 0) { + fprintf(stderr,"E unable to open AF_NDRV socket\n"); + return ZT_MACETHERNETTAPAGENT_EXIT_CODE_UNABLE_TO_CREATE; + } + + snprintf(s_peerDeviceName,sizeof(s_peerDeviceName),"feth%d",deviceNo+5000); + if (run(P_IFCONFIG,s_peerDeviceName,"create",(char *)0) != 0) { + fprintf(stderr,"E unable to create %s\n",s_deviceName); + return ZT_MACETHERNETTAPAGENT_EXIT_CODE_UNABLE_TO_CREATE; + } + usleep(10); + snprintf(s_deviceName,sizeof(s_deviceName),"feth%d",deviceNo); + if (run(P_IFCONFIG,s_deviceName,"create",(char *)0) != 0) { + fprintf(stderr,"E unable to create %s\n",s_deviceName); + return ZT_MACETHERNETTAPAGENT_EXIT_CODE_UNABLE_TO_CREATE; + } + run(P_IFCONFIG,s_deviceName,"lladdr",mac,(char *)0); + usleep(10); + run(P_IFCONFIG,s_peerDeviceName,"peer",s_deviceName,(char *)0); + usleep(10); + run(P_IFCONFIG,s_peerDeviceName,"mtu","10000","up",(char *)0); + usleep(10); + run(P_IFCONFIG,s_deviceName,"mtu",mtu,"metric",metric,"up",(char *)0); + usleep(10); + configureIpv6Parameters(s_deviceName,1,0); + usleep(10); + + struct sockaddr_ndrv nd; + nd.snd_len = sizeof(struct sockaddr_ndrv); + nd.snd_family = AF_NDRV; + memcpy(nd.snd_name,s_peerDeviceName,sizeof(nd.snd_name)); + if (bind(ndrvSocket,(struct sockaddr *)&nd,sizeof(nd)) != 0) { + fprintf(stderr,"E unable to bind AF_NDRV socket\n"); + return ZT_MACETHERNETTAPAGENT_EXIT_CODE_UNABLE_TO_CREATE; + } + if (connect(ndrvSocket,(struct sockaddr *)&nd,sizeof(nd)) != 0) { + fprintf(stderr,"E unable to connect AF_NDRV socket\n"); + return ZT_MACETHERNETTAPAGENT_EXIT_CODE_UNABLE_TO_CREATE; + } + + /* Start at /dev/bpf1 since some simple bpf-using net utilities hard-code /dev/bpf0. + * Things like libpcap are smart enough to search. */ + for(int bpfno=1;bpfno<5000;++bpfno) { + char tmp[32]; + snprintf(tmp,sizeof(tmp),"/dev/bpf%d",bpfno); + s_bpffd = open(tmp,O_RDWR); + if (s_bpffd >= 0) { + break; + } + } + if (s_bpffd < 0) { + fprintf(stderr,"E unable to open bpf device\n"); + return ZT_MACETHERNETTAPAGENT_EXIT_CODE_UNABLE_TO_CREATE; + } + + fl = sizeof(s_pktReadBuf); + if (ioctl(s_bpffd,BIOCSBLEN,&fl) != 0) { + return ZT_MACETHERNETTAPAGENT_EXIT_CODE_UNABLE_TO_CREATE; + } + const size_t readPktSize = (size_t)fl; + fl = 1; + if (ioctl(s_bpffd,BIOCIMMEDIATE,&fl) != 0) { + return ZT_MACETHERNETTAPAGENT_EXIT_CODE_UNABLE_TO_CREATE; + } + fl = 0; + if (ioctl(s_bpffd,BIOCSSEESENT,&fl) != 0) { + return ZT_MACETHERNETTAPAGENT_EXIT_CODE_UNABLE_TO_CREATE; + } + memset(&ifr,0,sizeof(ifr)); + memcpy(ifr.ifr_name,s_peerDeviceName,IFNAMSIZ); + if (ioctl(s_bpffd,BIOCSETIF,&ifr) != 0) { + return ZT_MACETHERNETTAPAGENT_EXIT_CODE_UNABLE_TO_CREATE; + } + fl = 1; + if (ioctl(s_bpffd,BIOCSHDRCMPLT,&fl) != 0) { + return ZT_MACETHERNETTAPAGENT_EXIT_CODE_UNABLE_TO_CREATE; + } + fl = 1; + if (ioctl(s_bpffd,BIOCPROMISC,&fl) != 0) { + return ZT_MACETHERNETTAPAGENT_EXIT_CODE_UNABLE_TO_CREATE; + } + + fcntl(STDIN_FILENO,F_SETFL,fcntl(STDIN_FILENO,F_GETFL)|O_NONBLOCK); + fcntl(ndrvSocket,F_SETFL,fcntl(ndrvSocket,F_GETFL)|O_NONBLOCK); + fcntl(s_bpffd,F_SETFL,fcntl(s_bpffd,F_GETFL)|O_NONBLOCK); + + fprintf(stderr,"I %s %s %d.%d.%d.%d\n",s_deviceName,s_peerDeviceName,ZEROTIER_ONE_VERSION_MAJOR,ZEROTIER_ONE_VERSION_MINOR,ZEROTIER_ONE_VERSION_REVISION,ZEROTIER_ONE_VERSION_BUILD); + + FD_ZERO(&rfds); + FD_ZERO(&wfds); + FD_ZERO(&efds); + long stdinReadPtr = 0; + for(;;) { + FD_SET(STDIN_FILENO,&rfds); + FD_SET(s_bpffd,&rfds); + if (select(s_bpffd+1,&rfds,&wfds,&efds,(struct timeval *)0) < 0) { + return ZT_MACETHERNETTAPAGENT_EXIT_CODE_READ_ERROR; + } + + if (FD_ISSET(s_bpffd,&rfds)) { + long n = (long)read(s_bpffd,s_pktReadBuf,readPktSize); + if (n > 0) { + for(unsigned char *p=s_pktReadBuf,*eof=p+n;p<eof;) { + struct bpf_hdr *h = (struct bpf_hdr *)p; + if ((h->bh_caplen > 0)&&((p + h->bh_hdrlen + h->bh_caplen) <= eof)) { + uint16_t len = (uint16_t)h->bh_caplen; + iov[0].iov_base = &len; + iov[0].iov_len = 2; + iov[1].iov_base = p + h->bh_hdrlen; + iov[1].iov_len = h->bh_caplen; + writev(STDOUT_FILENO,iov,2); + } + p += BPF_WORDALIGN(h->bh_hdrlen + h->bh_caplen); + } + } else { + return ZT_MACETHERNETTAPAGENT_EXIT_CODE_READ_ERROR; + } + } + + if (FD_ISSET(STDIN_FILENO,&rfds)) { + long n = (long)read(STDIN_FILENO,s_stdinReadBuf + stdinReadPtr,sizeof(s_stdinReadBuf) - stdinReadPtr); + if (n > 0) { + stdinReadPtr += n; + while (stdinReadPtr >= 2) { + long len = *((uint16_t *)s_stdinReadBuf); + if (stdinReadPtr >= (len + 2)) { + if (len > 0) { + unsigned char *msg = s_stdinReadBuf + 2; + + switch(msg[0]) { + case ZT_MACETHERNETTAPAGENT_STDIN_CMD_PACKET: + if (len > 1) { + if (write(ndrvSocket,msg+1,len-1) < 0) { + fprintf(stderr,"E inject failed size==%ld errno==%d\n",len-1,errno); + } + } + break; + case ZT_MACETHERNETTAPAGENT_STDIN_CMD_IFCONFIG: { + char *args[16]; + args[0] = P_IFCONFIG; + args[1] = s_deviceName; + int argNo = 2; + for(int argPtr=0,k=1,l=(int)len;k<l;++k) { + if (!msg[k]) { + if (argPtr > 0) { + argPtr = 0; + ++argNo; + if (argNo >= 15) { + break; + } + } + } else { + if (argPtr == 0) { + args[argNo] = (char *)(msg + k); + } + argPtr++; + } + } + args[argNo] = (char *)0; + if (argNo > 2) { + pid_t pid = vfork(); + if (pid < 0) { + return -1; + } else if (pid == 0) { + dup2(STDERR_FILENO,STDOUT_FILENO); + execv(args[0],args); + exit(-1); + } + int rv = 0; + waitpid(pid,&rv,0); + } + } break; + case ZT_MACETHERNETTAPAGENT_STDIN_CMD_EXIT: + return ZT_MACETHERNETTAPAGENT_EXIT_CODE_SUCCESS; + } + } + + if (stdinReadPtr > (len + 2)) { + memmove(s_stdinReadBuf,s_stdinReadBuf + len + 2,stdinReadPtr -= (len + 2)); + } else { + stdinReadPtr = 0; + } + } else { + break; + } + } + } else { + return ZT_MACETHERNETTAPAGENT_EXIT_CODE_READ_ERROR; + } + } + } + + return ZT_MACETHERNETTAPAGENT_EXIT_CODE_SUCCESS; +} |