/*- * Copyright (c) 2015, Babak Farrokhi * All rights reserved. * * Redistribution and use in source and binary forms, with or without * modification, are permitted provided that the following conditions are met: * * * Redistributions of source code must retain the above copyright notice, this * list of conditions and the following disclaimer. * * * Redistributions in binary form must reproduce the above copyright notice, * this list of conditions and the following disclaimer in the documentation * and/or other materials provided with the distribution. * * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" * AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE * DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR * SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER * CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, * OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE * OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. */ #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include "logfile.h" #define PORT 5060 #define BACKLOG 1024 /* * Globals */ log_t *lfh; struct pidfh *pfh; struct sockaddr_in t_sa, u_sa; int t_sockfd, u_sockfd; #ifdef PF_INET6 struct sockaddr_in6 t6_sa, u6_sa; int t6_sockfd, u6_sockfd; #endif /* PF_INET6 */ /* * trim string from whitespace characters */ size_t chomp(char *restrict s) { int i; /* trim leading spaces */ while (isspace(*s)) s++; /* All spaces? */ if (*s == 0) return 0; /* trim trailing spaces */ i = strlen(s); while ((i > 0) && (isspace(s[i - 1]))) i--; s[i] = '\0'; return i; } /* * Prepare for a clean shutdown */ void daemon_shutdown() { pidfile_remove(pfh); log_close(lfh); } /* * Act upon receiving signals */ void signal_handler(int sig) { switch (sig) { case SIGHUP: log_reopen(&lfh); break; case SIGINT: case SIGTERM: daemon_shutdown(); exit(EXIT_SUCCESS); break; default: break; } } void process_request(int af, struct sockaddr *restrict src, int proto, char *str) { char *p_names[] = {"TCP", "UDP", "RAW", "UNKNOWN"}; char *pname; u_int port; char addr_str[46]; struct sockaddr_in *s_in; #ifdef PF_INET6 struct sockaddr_in6 *s_in6; #endif /* PF_INET6 */ switch (proto) { case SOCK_STREAM: pname = p_names[0]; break; case SOCK_DGRAM: pname = p_names[1]; break; case SOCK_RAW: pname = p_names[2]; break; default: pname = p_names[3];; } chomp(str); #ifdef PF_INET6 switch (af) { case AF_INET6: s_in6 = (struct sockaddr_in6 *)src; inet_ntop(af, &s_in6->sin6_addr, addr_str, sizeof(addr_str)); port = ntohs(s_in6->sin6_port); log_printf(lfh, "%ld,%s6,%s,%d,\"%s\"", time(NULL), pname, addr_str, port, str); break; case AF_INET: s_in = (struct sockaddr_in *)src; log_printf(lfh, "%ld,%s4,%s,%d,\"%s\"", time(NULL), pname, inet_ntoa(s_in->sin_addr), ntohs(s_in->sin_port), str); break; } #else s_in = (struct sockaddr_in *)src; log_printf(lfh, "%ld,%s4,%s,%d,\"%s\"", time(NULL), pname, inet_ntoa(s_in->sin_addr), ntohs(s_in->sin_port), str); #endif } /* * setup TCP listener socket */ inline int init_tcp() { #ifdef PF_INET6 /* Setup TCP6 Listener */ bzero(&t6_sa, sizeof(t6_sa)); t6_sa.sin6_port = htons(PORT); t6_sa.sin6_family = AF_INET6; t6_sa.sin6_addr = in6addr_any; t6_sa.sin6_scope_id = 0; if ((t6_sockfd = socket(PF_INET6, SOCK_STREAM, 0)) < 0) { perror("tcp6 socket()"); return (EXIT_FAILURE); } int on = 1; setsockopt(t6_sockfd, IPPROTO_IPV6, IPV6_BINDV6ONLY, (char *)&on, sizeof(on)); if (bind(t6_sockfd, (struct sockaddr *)&t6_sa, sizeof(t6_sa)) < 0) { perror("tcp6 bind()"); return (EXIT_FAILURE); } #endif /* PF6_INET */ /* Setup TCP4 Listener */ bzero(&t_sa, sizeof(t_sa)); t_sa.sin_port = htons(PORT); t_sa.sin_family = AF_INET; t_sa.sin_addr.s_addr = htonl(INADDR_ANY); if ((t_sockfd = socket(PF_INET, SOCK_STREAM, 0)) < 0) { perror("tcp4 socket()"); return (EXIT_FAILURE); } if (bind(t_sockfd, (struct sockaddr *)&t_sa, sizeof(t_sa)) < 0) { perror("tcp4 bind()"); return (EXIT_FAILURE); } return (EXIT_SUCCESS); } /* * setup UDP listener socket */ inline int init_udp() { #ifdef PF_INET6 /* Setup UDP6 Listener */ bzero(&u6_sa, sizeof(u6_sa)); u6_sa.sin6_port = htons(PORT); u6_sa.sin6_family = AF_INET6; u6_sa.sin6_addr = in6addr_any; u6_sa.sin6_scope_id = 0; if ((u6_sockfd = socket(PF_INET6, SOCK_DGRAM, 0)) < 0) { perror("udp6 socket()"); return (EXIT_FAILURE); } int on = 1; setsockopt(u6_sockfd, IPPROTO_IPV6, IPV6_BINDV6ONLY, (char *)&on, sizeof(on)); if (bind(u6_sockfd, (struct sockaddr *)&u6_sa, sizeof(u6_sa)) < 0) { perror("udp6 bind()"); return (EXIT_FAILURE); } #endif /* PF_INET6 */ /* Setup UDP4 Listener */ bzero(&u_sa, sizeof(u_sa)); u_sa.sin_port = htons(PORT); u_sa.sin_family = AF_INET; u_sa.sin_addr.s_addr = htonl(INADDR_ANY); if ((u_sockfd = socket(PF_INET, SOCK_DGRAM, 0)) < 0) { perror("udp4 socket()"); return (EXIT_FAILURE); } if (bind(u_sockfd, (struct sockaddr *)&u_sa, sizeof(u_sa)) < 0) { perror("udp4 bind()"); return (EXIT_FAILURE); } return (EXIT_SUCCESS); } void * tcp4_handler(void *args) { int c; struct sockaddr_in t_other; FILE *client; char str[8192]; socklen_t sa_len; listen(t_sockfd, BACKLOG); while (1) { sa_len = sizeof(t_sa); if ((c = accept(t_sockfd, (struct sockaddr *)&t_other, &sa_len)) < 0) { perror("tcp accept()"); pthread_exit(NULL); } if ((client = fdopen(c, "r")) == NULL) { perror("tcp fdopen()"); pthread_exit(NULL); } bzero(str, sizeof(str));/* just in case */ fgets(str, sizeof(str), client); process_request(t_other.sin_family, (struct sockaddr *)&t_other, SOCK_STREAM, str); fclose(client); } return (args); /* suppress compiler warning */ } void * udp4_handler(void *args) { char str[8192]; struct sockaddr_in u_other; socklen_t sa_len; ssize_t len; sa_len = sizeof(u_other); while (1) { if ((len = recvfrom(u_sockfd, str, sizeof(str), 0, (struct sockaddr *)&u_other, &sa_len)) > 0) { process_request(u_other.sin_family, (struct sockaddr *)&u_other, SOCK_DGRAM, str); } } return (args); /* suppress compiler warning */ } #ifdef PF_INET6 void * tcp6_handler(void *args) { int c; struct sockaddr_in6 t_other; FILE *client; char str[8192]; socklen_t sa_len; listen(t6_sockfd, BACKLOG); while (1) { sa_len = sizeof(t6_sa); if ((c = accept(t6_sockfd, (struct sockaddr *)&t_other, &sa_len)) < 0) { perror("tcp6 accept()"); pthread_exit(NULL); } if ((client = fdopen(c, "r")) == NULL) { perror("tcp6 fdopen()"); pthread_exit(NULL); } bzero(str, sizeof(str));/* just in case */ fgets(str, sizeof(str), client); process_request(t_other.sin6_family, (struct sockaddr *)&t_other, SOCK_STREAM, str); fclose(client); } return (args); /* suppress compiler warning */ } void * udp6_handler(void *args) { char str[8192]; struct sockaddr_in6 u_other; socklen_t sa_len; ssize_t len; sa_len = sizeof(u_other); while (1) { if ((len = recvfrom(u6_sockfd, str, sizeof(str), 0, (struct sockaddr *)&u_other, &sa_len)) > 0) { process_request(u_other.sin6_family, (struct sockaddr *)&u_other, SOCK_DGRAM, str); } } return (args); /* suppress compiler warning */ } #endif /* PF_INET6 */ /* * Daemonize and persist pid */ int daemon_start() { struct sigaction sig_action; sigset_t sig_set; pid_t otherpid; int curPID; pthread_t tcp4_thread, udp4_thread; pthread_t tcp6_thread, udp6_thread; /* Check if we can acquire the pid file */ pfh = pidfile_open(NULL, 0600, &otherpid); if (pfh == NULL) { if (errno == EEXIST) { errx(EXIT_FAILURE, "Daemon already running, pid: %jd.", (intmax_t)otherpid); } err(EXIT_FAILURE, "Cannot open or create pidfile"); } /* open a log file in current directory */ if ((lfh = log_open("fsipd.log", 0644)) == NULL) { err(EXIT_FAILURE, "Cannot open log file"); } /* Initialize TCP46 and UDP46 sockets */ if (init_tcp() == EXIT_FAILURE) return (EXIT_FAILURE); if (init_udp() == EXIT_FAILURE) return (EXIT_FAILURE); /* start daemonizing */ curPID = fork(); switch (curPID) { case 0: /* This process is the child */ break; case -1: /* fork() failed, should exit */ perror("fork"); return (EXIT_FAILURE); default: /* fork() successful, should exit * (parent) */ return (EXIT_SUCCESS); } /* we are the child, complete the daemonization */ /* Close standard IO */ fclose(stdin); fclose(stdout); fclose(stderr); /* Block unnecessary signals */ sigemptyset(&sig_set); sigaddset(&sig_set, SIGCHLD); /* ignore child - i.e. we don't need * to wait for it */ sigaddset(&sig_set, SIGTSTP); /* ignore tty stop signals */ sigaddset(&sig_set, SIGTTOU); /* ignore tty background writes */ sigaddset(&sig_set, SIGTTIN); /* ignore tty background reads */ sigprocmask(SIG_BLOCK, &sig_set, NULL); /* Block the above specified * signals */ /* Catch necessary signals */ sig_action.sa_handler = signal_handler; sigemptyset(&sig_action.sa_mask); sig_action.sa_flags = 0; sigaction(SIGTERM, &sig_action, NULL); sigaction(SIGHUP, &sig_action, NULL); sigaction(SIGINT, &sig_action, NULL); /* create new session and process group */ setsid(); /* persist pid */ pidfile_write(pfh); /* Create TCP and UDP listener threads */ pthread_create(&tcp4_thread, NULL, tcp4_handler, NULL); pthread_create(&udp4_thread, NULL, udp4_handler, NULL); #ifdef PF_INET6 pthread_create(&tcp6_thread, NULL, tcp6_handler, NULL); pthread_create(&udp6_thread, NULL, udp6_handler, NULL); #endif /* * Wait for threads to terminate, which * normally shouldn't ever happen */ pthread_join(tcp4_thread, NULL); pthread_join(udp4_thread, NULL); #ifdef PF_INET6 pthread_join(tcp6_thread, NULL); pthread_join(udp6_thread, NULL); #endif return (EXIT_SUCCESS); } int main(void) { return (daemon_start()); }