mirror of
https://github.com/SoftEtherVPN/SoftEtherVPN.git
synced 2024-11-23 18:09:53 +03:00
ac865f04fc
* spelling: accepts * spelling: account * spelling: accept * spelling: accumulate * spelling: adapter * spelling: address * spelling: additional * spelling: aggressive * spelling: adhered * spelling: allowed * spelling: ambiguous * spelling: amount * spelling: anonymous * spelling: acquisition * spelling: assemble * spelling: associated * spelling: assigns * spelling: attach * spelling: attempt * spelling: attribute * spelling: authenticate * spelling: authentication * spelling: available * spelling: bridging * spelling: cascade * spelling: cancel * spelling: check * spelling: challenge * spelling: changing * spelling: characters * spelling: cloud * spelling: compare * spelling: communication * spelling: compatible * spelling: compatibility * spelling: completion * spelling: complete * spelling: computers * spelling: configure * spelling: configuration * spelling: conformant * spelling: connection * spelling: contains * spelling: continuously * spelling: continue * spelling: convert * spelling: counters * spelling: create * spelling: created * spelling: cumulate * spelling: currently * spelling: debugging * spelling: decryption * spelling: description * spelling: default * spelling: driver * spelling: delete * spelling: destination * spelling: disabled * spelling: different * spelling: dynamically * spelling: directory * spelling: disappeared * spelling: disable * spelling: doesn't * spelling: download * spelling: dropped * spelling: enable * spelling: established * spelling: ether * spelling: except * spelling: expired * spelling: field * spelling: following * spelling: forever * spelling: firewall * spelling: first * spelling: fragment * spelling: function * spelling: gateway * spelling: identifier * spelling: identify * spelling: incoming * spelling: information * spelling: initialize * spelling: injection * spelling: inner * spelling: instead * spelling: installation * spelling: inserted * spelling: integer * spelling: interrupt * spelling: intuitive * spelling: interval * spelling: january * spelling: keybytes * spelling: know * spelling: language * spelling: length * spelling: library * spelling: listener * spelling: maintain * spelling: modified * spelling: necessary * spelling: number * spelling: obsoleted * spelling: occurred * spelling: occurring * spelling: occur * spelling: original * spelling: omittable * spelling: omit * spelling: opening * spelling: operation * spelling: packet * spelling: parameters * spelling: pointed * spelling: popupmenuopen * spelling: privilege * spelling: product * spelling: protection * spelling: promiscuous * spelling: prompt * spelling: query * spelling: random * spelling: reconnection * spelling: revocation * spelling: received * spelling: red hat * spelling: registry * spelling: release * spelling: retrieve
1050 lines
26 KiB
C
1050 lines
26 KiB
C
// SoftEther VPN Source Code - Developer Edition Master Branch
|
|
// Cedar Communication Module
|
|
//
|
|
// SoftEther VPN Server, Client and Bridge are free software under GPLv2.
|
|
//
|
|
// Copyright (c) Daiyuu Nobori.
|
|
// Copyright (c) SoftEther VPN Project, University of Tsukuba, Japan.
|
|
// Copyright (c) SoftEther Corporation.
|
|
//
|
|
// All Rights Reserved.
|
|
//
|
|
// http://www.softether.org/
|
|
//
|
|
// Author: Daiyuu Nobori, Ph.D.
|
|
// Comments: Tetsuo Sugiyama, Ph.D.
|
|
//
|
|
// This program is free software; you can redistribute it and/or
|
|
// modify it under the terms of the GNU General Public License
|
|
// version 2 as published by the Free Software Foundation.
|
|
//
|
|
// This program is distributed in the hope that it will be useful,
|
|
// but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
// GNU General Public License for more details.
|
|
//
|
|
// You should have received a copy of the GNU General Public License version 2
|
|
// along with this program; if not, write to the Free Software
|
|
// Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA.
|
|
//
|
|
// THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND,
|
|
// EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF
|
|
// MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT.
|
|
// IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY
|
|
// CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT,
|
|
// TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE
|
|
// SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.
|
|
//
|
|
// THE LICENSE AGREEMENT IS ATTACHED ON THE SOURCE-CODE PACKAGE
|
|
// AS "LICENSE.TXT" FILE. READ THE TEXT FILE IN ADVANCE TO USE THE SOFTWARE.
|
|
//
|
|
//
|
|
// THIS SOFTWARE IS DEVELOPED IN JAPAN, AND DISTRIBUTED FROM JAPAN,
|
|
// UNDER JAPANESE LAWS. YOU MUST AGREE IN ADVANCE TO USE, COPY, MODIFY,
|
|
// MERGE, PUBLISH, DISTRIBUTE, SUBLICENSE, AND/OR SELL COPIES OF THIS
|
|
// SOFTWARE, THAT ANY JURIDICAL DISPUTES WHICH ARE CONCERNED TO THIS
|
|
// SOFTWARE OR ITS CONTENTS, AGAINST US (SOFTETHER PROJECT, SOFTETHER
|
|
// CORPORATION, DAIYUU NOBORI OR OTHER SUPPLIERS), OR ANY JURIDICAL
|
|
// DISPUTES AGAINST US WHICH ARE CAUSED BY ANY KIND OF USING, COPYING,
|
|
// MODIFYING, MERGING, PUBLISHING, DISTRIBUTING, SUBLICENSING, AND/OR
|
|
// SELLING COPIES OF THIS SOFTWARE SHALL BE REGARDED AS BE CONSTRUED AND
|
|
// CONTROLLED BY JAPANESE LAWS, AND YOU MUST FURTHER CONSENT TO
|
|
// EXCLUSIVE JURISDICTION AND VENUE IN THE COURTS SITTING IN TOKYO,
|
|
// JAPAN. YOU MUST WAIVE ALL DEFENSES OF LACK OF PERSONAL JURISDICTION
|
|
// AND FORUM NON CONVENIENS. PROCESS MAY BE SERVED ON EITHER PARTY IN
|
|
// THE MANNER AUTHORIZED BY APPLICABLE LAW OR COURT RULE.
|
|
//
|
|
// USE ONLY IN JAPAN. DO NOT USE THIS SOFTWARE IN ANOTHER COUNTRY UNLESS
|
|
// YOU HAVE A CONFIRMATION THAT THIS SOFTWARE DOES NOT VIOLATE ANY
|
|
// CRIMINAL LAWS OR CIVIL RIGHTS IN THAT PARTICULAR COUNTRY. USING THIS
|
|
// SOFTWARE IN OTHER COUNTRIES IS COMPLETELY AT YOUR OWN RISK. THE
|
|
// SOFTETHER VPN PROJECT HAS DEVELOPED AND DISTRIBUTED THIS SOFTWARE TO
|
|
// COMPLY ONLY WITH THE JAPANESE LAWS AND EXISTING CIVIL RIGHTS INCLUDING
|
|
// PATENTS WHICH ARE SUBJECTS APPLY IN JAPAN. OTHER COUNTRIES' LAWS OR
|
|
// CIVIL RIGHTS ARE NONE OF OUR CONCERNS NOR RESPONSIBILITIES. WE HAVE
|
|
// NEVER INVESTIGATED ANY CRIMINAL REGULATIONS, CIVIL LAWS OR
|
|
// INTELLECTUAL PROPERTY RIGHTS INCLUDING PATENTS IN ANY OF OTHER 200+
|
|
// COUNTRIES AND TERRITORIES. BY NATURE, THERE ARE 200+ REGIONS IN THE
|
|
// WORLD, WITH DIFFERENT LAWS. IT IS IMPOSSIBLE TO VERIFY EVERY
|
|
// COUNTRIES' LAWS, REGULATIONS AND CIVIL RIGHTS TO MAKE THE SOFTWARE
|
|
// COMPLY WITH ALL COUNTRIES' LAWS BY THE PROJECT. EVEN IF YOU WILL BE
|
|
// SUED BY A PRIVATE ENTITY OR BE DAMAGED BY A PUBLIC SERVANT IN YOUR
|
|
// COUNTRY, THE DEVELOPERS OF THIS SOFTWARE WILL NEVER BE LIABLE TO
|
|
// RECOVER OR COMPENSATE SUCH DAMAGES, CRIMINAL OR CIVIL
|
|
// RESPONSIBILITIES. NOTE THAT THIS LINE IS NOT LICENSE RESTRICTION BUT
|
|
// JUST A STATEMENT FOR WARNING AND DISCLAIMER.
|
|
//
|
|
//
|
|
// SOURCE CODE CONTRIBUTION
|
|
// ------------------------
|
|
//
|
|
// Your contribution to SoftEther VPN Project is much appreciated.
|
|
// Please send patches to us through GitHub.
|
|
// Read the SoftEther VPN Patch Acceptance Policy in advance:
|
|
// http://www.softether.org/5-download/src/9.patch
|
|
//
|
|
//
|
|
// DEAR SECURITY EXPERTS
|
|
// ---------------------
|
|
//
|
|
// If you find a bug or a security vulnerability please kindly inform us
|
|
// about the problem immediately so that we can fix the security problem
|
|
// to protect a lot of users around the world as soon as possible.
|
|
//
|
|
// Our e-mail address for security reports is:
|
|
// softether-vpn-security [at] softether.org
|
|
//
|
|
// Please note that the above e-mail address is not a technical support
|
|
// inquiry address. If you need technical assistance, please visit
|
|
// http://www.softether.org/ and ask your question on the users forum.
|
|
//
|
|
// Thank you for your cooperation.
|
|
//
|
|
//
|
|
// NO MEMORY OR RESOURCE LEAKS
|
|
// ---------------------------
|
|
//
|
|
// The memory-leaks and resource-leaks verification under the stress
|
|
// test has been passed before release this source code.
|
|
|
|
|
|
// DDNS.c
|
|
// Dynamic DNS Client
|
|
|
|
#include "CedarPch.h"
|
|
|
|
// Get the current status of the DDNS client
|
|
void DCGetStatus(DDNS_CLIENT *c, DDNS_CLIENT_STATUS *st)
|
|
{
|
|
// Validate arguments
|
|
if (c == NULL || st == NULL)
|
|
{
|
|
return;
|
|
}
|
|
|
|
Zero(st, sizeof(DDNS_CLIENT_STATUS));
|
|
|
|
Lock(c->Lock);
|
|
{
|
|
st->Err_IPv4 = c->Err_IPv4;
|
|
st->Err_IPv6 = c->Err_IPv6;
|
|
|
|
StrCpy(st->CurrentHostName, sizeof(st->CurrentHostName), c->CurrentHostName);
|
|
StrCpy(st->CurrentFqdn, sizeof(st->CurrentFqdn), c->CurrentFqdn);
|
|
StrCpy(st->DnsSuffix, sizeof(st->DnsSuffix), c->DnsSuffix);
|
|
StrCpy(st->CurrentIPv4, sizeof(st->CurrentIPv4), c->CurrentIPv4);
|
|
StrCpy(st->CurrentIPv6, sizeof(st->CurrentIPv6), c->CurrentIPv6);
|
|
|
|
StrCpy(st->CurrentAzureIp, sizeof(st->CurrentAzureIp), c->CurrentAzureIp);
|
|
st->CurrentAzureTimestamp = c->CurrentAzureTimestamp;
|
|
StrCpy(st->CurrentAzureSignature, sizeof(st->CurrentAzureSignature), c->CurrentAzureSignature);
|
|
StrCpy(st->AzureCertHash, sizeof(st->AzureCertHash), c->AzureCertHash);
|
|
|
|
Copy(&st->InternetSetting, &c->InternetSetting, sizeof(INTERNET_SETTING));
|
|
}
|
|
Unlock(c->Lock);
|
|
}
|
|
|
|
// Set the Internet settings
|
|
void DCSetInternetSetting(DDNS_CLIENT *c, INTERNET_SETTING *t)
|
|
{
|
|
// Validate arguments
|
|
if (c == NULL || t == NULL)
|
|
{
|
|
return;
|
|
}
|
|
|
|
Copy(&c->InternetSetting, t, sizeof(INTERNET_SETTING));
|
|
}
|
|
|
|
// Get the Internet settings
|
|
void DCGetInternetSetting(DDNS_CLIENT *c, INTERNET_SETTING *t)
|
|
{
|
|
// Validate arguments
|
|
if (c == NULL || t == NULL)
|
|
{
|
|
return;
|
|
}
|
|
|
|
Copy(t, &c->InternetSetting, sizeof(INTERNET_SETTING));
|
|
}
|
|
|
|
// Changing the host name
|
|
UINT DCChangeHostName(DDNS_CLIENT *c, char *hostname)
|
|
{
|
|
UINT ret;
|
|
DDNS_REGISTER_PARAM p;
|
|
// Validate arguments
|
|
if (c == NULL || hostname == NULL)
|
|
{
|
|
return ERR_INTERNAL_ERROR;
|
|
}
|
|
|
|
if (StrLen(hostname) > 32)
|
|
{
|
|
// The host name is too long
|
|
return ERR_DDNS_HOSTNAME_TOO_LONG;
|
|
}
|
|
|
|
Zero(&p, sizeof(p));
|
|
|
|
StrCpy(p.NewHostname, sizeof(p.NewHostname), hostname);
|
|
|
|
// Use one of IPv4 or IPv6 if it seems to be communication
|
|
if (c->Err_IPv4 == ERR_NO_ERROR)
|
|
{
|
|
// IPv4
|
|
ret = DCRegister(c, false, &p, NULL);
|
|
}
|
|
else if (c->Err_IPv6 == ERR_NO_ERROR)
|
|
{
|
|
// IPv6
|
|
ret = DCRegister(c, true, &p, NULL);
|
|
}
|
|
else
|
|
{
|
|
// Try both
|
|
ret = DCRegister(c, true, &p, NULL);
|
|
if (ret != ERR_NO_ERROR)
|
|
{
|
|
ret = DCRegister(c, false, &p, NULL);
|
|
}
|
|
}
|
|
|
|
if (ret == ERR_NO_ERROR)
|
|
{
|
|
DDNS_CLIENT_STATUS st;
|
|
|
|
DCGetStatus(c, &st);
|
|
|
|
SiApplyAzureConfig(c->Cedar->Server, &st);
|
|
}
|
|
|
|
return ret;
|
|
}
|
|
|
|
// DDNS client thread
|
|
void DCThread(THREAD *thread, void *param)
|
|
{
|
|
DDNS_CLIENT *c;
|
|
INTERRUPT_MANAGER *interrupt;
|
|
UINT last_ip_hash = 0;
|
|
void *route_change_poller = NULL;
|
|
bool last_time_ip_changed = false;
|
|
UINT last_azure_ddns_trigger_int = 0;
|
|
UINT last_vgs_ddns_trigger_int = 0;
|
|
UINT n;
|
|
INTERNET_SETTING last_t;
|
|
// Validate arguments
|
|
if (thread == NULL || param == NULL)
|
|
{
|
|
return;
|
|
}
|
|
|
|
c = (DDNS_CLIENT *)param;
|
|
|
|
interrupt = NewInterruptManager();
|
|
|
|
route_change_poller = NewRouteChange();
|
|
IsRouteChanged(route_change_poller);
|
|
|
|
Zero(&last_t, sizeof(last_t));
|
|
|
|
n = 0;
|
|
|
|
while (c->Halt == false)
|
|
{
|
|
UINT ip_hash = GetHostIPAddressHash32();
|
|
UINT interval;
|
|
UINT64 now = Tick64();
|
|
bool ip_changed = false;
|
|
bool azure_client_triggered = false;
|
|
bool internet_setting_changed = false;
|
|
bool vgs_server_triggered = false;
|
|
|
|
|
|
if (c->Cedar->Server != NULL && c->Cedar->Server->AzureClient != NULL)
|
|
{
|
|
if (c->Cedar->Server->AzureClient->DDnsTriggerInt != last_azure_ddns_trigger_int)
|
|
{
|
|
azure_client_triggered = true;
|
|
last_azure_ddns_trigger_int = c->Cedar->Server->AzureClient->DDnsTriggerInt;
|
|
last_time_ip_changed = false;
|
|
Debug("DDNS Thread Triggered by AzureClient.\n");
|
|
}
|
|
}
|
|
|
|
if (Cmp(&last_t, &c->InternetSetting, sizeof(INTERNET_SETTING)) != 0)
|
|
{
|
|
Copy(&last_t, &c->InternetSetting, sizeof(INTERNET_SETTING));
|
|
internet_setting_changed = true;
|
|
last_time_ip_changed = false;
|
|
}
|
|
|
|
if (ip_hash != last_ip_hash)
|
|
{
|
|
last_time_ip_changed = false;
|
|
Debug("DDNS Thread Triggered by IP Hash Changed.\n");
|
|
}
|
|
|
|
if ((ip_hash != last_ip_hash) || (IsRouteChanged(route_change_poller)) || azure_client_triggered || internet_setting_changed || vgs_server_triggered)
|
|
{
|
|
if (last_time_ip_changed == false)
|
|
{
|
|
// Call all getting functions from the beginning if the routing
|
|
// table or the IP address of this host has changed
|
|
c->NextRegisterTick_IPv4 = 0;
|
|
c->NextRegisterTick_IPv6 = 0;
|
|
c->NextGetMyIpTick_IPv4 = 0;
|
|
c->NextGetMyIpTick_IPv6 = 0;
|
|
|
|
last_ip_hash = ip_hash;
|
|
|
|
last_time_ip_changed = true;
|
|
|
|
ip_changed = true;
|
|
|
|
Debug("DDNS Internet Condition Changed.\n");
|
|
}
|
|
}
|
|
else
|
|
{
|
|
last_time_ip_changed = false;
|
|
}
|
|
|
|
if ((n++) >= 1)
|
|
{
|
|
// Self IPv4 address acquisition
|
|
if (c->NextGetMyIpTick_IPv4 == 0 || now >= c->NextGetMyIpTick_IPv4)
|
|
{
|
|
UINT next_interval;
|
|
char ip[MAX_SIZE];
|
|
|
|
Zero(ip, sizeof(ip));
|
|
c->Err_IPv4_GetMyIp = DCGetMyIp(c, false, ip, sizeof(ip), NULL);
|
|
|
|
if (c->Err_IPv4_GetMyIp == ERR_NO_ERROR)
|
|
{
|
|
if (StrCmpi(c->LastMyIPv4, ip) != 0)
|
|
{
|
|
ip_changed = true;
|
|
StrCpy(c->LastMyIPv4, sizeof(c->LastMyIPv4), ip);
|
|
}
|
|
|
|
next_interval = GenRandInterval(DDNS_GETMYIP_INTERVAL_OK_MIN, DDNS_GETMYIP_INTERVAL_OK_MAX);
|
|
}
|
|
else
|
|
{
|
|
if (IsEmptyStr(c->LastMyIPv4) == false)
|
|
{
|
|
ip_changed = true;
|
|
}
|
|
|
|
Zero(c->LastMyIPv4, sizeof(c->LastMyIPv4));
|
|
next_interval = GenRandInterval(DDNS_GETMYIP_INTERVAL_NG_MIN, DDNS_GETMYIP_INTERVAL_NG_MAX);
|
|
}
|
|
|
|
c->NextGetMyIpTick_IPv4 = Tick64() + (UINT64)next_interval;
|
|
|
|
AddInterrupt(interrupt, c->NextGetMyIpTick_IPv4);
|
|
}
|
|
|
|
// Self IPv6 address acquisition
|
|
if (c->NextGetMyIpTick_IPv6 == 0 || now >= c->NextGetMyIpTick_IPv6)
|
|
{
|
|
UINT next_interval;
|
|
char ip[MAX_SIZE];
|
|
|
|
Zero(ip, sizeof(ip));
|
|
c->Err_IPv6_GetMyIp = DCGetMyIp(c, true, ip, sizeof(ip), NULL);
|
|
|
|
if (c->Err_IPv6_GetMyIp == ERR_NO_ERROR)
|
|
{
|
|
if (StrCmpi(c->LastMyIPv6, ip) != 0)
|
|
{
|
|
ip_changed = true;
|
|
StrCpy(c->LastMyIPv6, sizeof(c->LastMyIPv6), ip);
|
|
}
|
|
|
|
next_interval = GenRandInterval(DDNS_GETMYIP_INTERVAL_OK_MIN, DDNS_GETMYIP_INTERVAL_OK_MAX);
|
|
}
|
|
else
|
|
{
|
|
if (IsEmptyStr(c->LastMyIPv6) == false)
|
|
{
|
|
ip_changed = true;
|
|
}
|
|
|
|
Zero(c->LastMyIPv6, sizeof(c->LastMyIPv6));
|
|
next_interval = GenRandInterval(DDNS_GETMYIP_INTERVAL_NG_MIN, DDNS_GETMYIP_INTERVAL_NG_MAX);
|
|
}
|
|
|
|
c->NextGetMyIpTick_IPv6 = Tick64() + (UINT64)next_interval;
|
|
|
|
AddInterrupt(interrupt, c->NextGetMyIpTick_IPv6);
|
|
}
|
|
}
|
|
|
|
if (ip_changed)
|
|
{
|
|
c->NextRegisterTick_IPv4 = 0;
|
|
c->NextRegisterTick_IPv6 = 0;
|
|
}
|
|
|
|
// IPv4 host registration
|
|
if (c->NextRegisterTick_IPv4 == 0 || now >= c->NextRegisterTick_IPv4)
|
|
{
|
|
UINT next_interval;
|
|
|
|
c->Err_IPv4 = DCRegister(c, false, NULL, NULL);
|
|
|
|
if (c->Err_IPv4 == ERR_NO_ERROR)
|
|
{
|
|
next_interval = GenRandInterval(DDNS_REGISTER_INTERVAL_OK_MIN, DDNS_REGISTER_INTERVAL_OK_MAX);
|
|
}
|
|
else
|
|
{
|
|
next_interval = GenRandInterval(DDNS_REGISTER_INTERVAL_NG_MIN, DDNS_REGISTER_INTERVAL_NG_MAX);
|
|
}
|
|
//next_interval = 0;
|
|
|
|
c->NextRegisterTick_IPv4 = Tick64() + (UINT64)next_interval;
|
|
|
|
if (true)
|
|
{
|
|
DDNS_CLIENT_STATUS st;
|
|
|
|
DCGetStatus(c, &st);
|
|
|
|
SiApplyAzureConfig(c->Cedar->Server, &st);
|
|
}
|
|
|
|
AddInterrupt(interrupt, c->NextRegisterTick_IPv4);
|
|
}
|
|
|
|
if (c->Halt)
|
|
{
|
|
break;
|
|
}
|
|
|
|
// IPv6 host registration
|
|
if (c->NextRegisterTick_IPv6 == 0 || now >= c->NextRegisterTick_IPv6)
|
|
{
|
|
UINT next_interval;
|
|
|
|
c->Err_IPv6 = DCRegister(c, true, NULL, NULL);
|
|
|
|
if (c->Err_IPv6 == ERR_NO_ERROR)
|
|
{
|
|
next_interval = GenRandInterval(DDNS_REGISTER_INTERVAL_OK_MIN, DDNS_REGISTER_INTERVAL_OK_MAX);
|
|
}
|
|
else
|
|
{
|
|
next_interval = GenRandInterval(DDNS_REGISTER_INTERVAL_NG_MIN, DDNS_REGISTER_INTERVAL_NG_MAX);
|
|
}
|
|
|
|
c->NextRegisterTick_IPv6 = Tick64() + (UINT64)next_interval;
|
|
|
|
if (true)
|
|
{
|
|
DDNS_CLIENT_STATUS st;
|
|
|
|
DCGetStatus(c, &st);
|
|
|
|
SiApplyAzureConfig(c->Cedar->Server, &st);
|
|
}
|
|
|
|
AddInterrupt(interrupt, c->NextRegisterTick_IPv6);
|
|
}
|
|
|
|
interval = GetNextIntervalForInterrupt(interrupt);
|
|
interval = MIN(interval, 1234);
|
|
|
|
if (n == 1)
|
|
{
|
|
interval = MIN(interval, 0);
|
|
}
|
|
|
|
if (c->Halt)
|
|
{
|
|
break;
|
|
}
|
|
|
|
if (c->KeyChanged)
|
|
{
|
|
c->KeyChanged = false;
|
|
c->NextRegisterTick_IPv4 = c->NextRegisterTick_IPv6 = 0;
|
|
|
|
interval = 0;
|
|
}
|
|
|
|
if (last_time_ip_changed)
|
|
{
|
|
if (c->Cedar->Server != NULL && c->Cedar->Server->AzureClient != NULL)
|
|
{
|
|
c->Cedar->Server->AzureClient->IpStatusRevision++;
|
|
}
|
|
}
|
|
|
|
Wait(c->Event, interval);
|
|
}
|
|
|
|
FreeRouteChange(route_change_poller);
|
|
FreeInterruptManager(interrupt);
|
|
}
|
|
|
|
// Command to update immediately
|
|
void DCUpdateNow(DDNS_CLIENT *c)
|
|
{
|
|
// Validate arguments
|
|
if (c == NULL)
|
|
{
|
|
return;
|
|
}
|
|
|
|
c->NextRegisterTick_IPv4 = c->NextRegisterTick_IPv6 = 0;
|
|
|
|
Set(c->Event);
|
|
}
|
|
|
|
// Execution of registration
|
|
UINT DCRegister(DDNS_CLIENT *c, bool ipv6, DDNS_REGISTER_PARAM *p, char *replace_v6)
|
|
{
|
|
char *url;
|
|
char url2[MAX_SIZE];
|
|
char url3[MAX_SIZE];
|
|
PACK *req, *ret;
|
|
char key_str[MAX_SIZE];
|
|
UCHAR machine_key[SHA1_SIZE];
|
|
char machine_key_str[MAX_SIZE];
|
|
char machine_name[MAX_SIZE];
|
|
BUF *cert_hash = NULL;
|
|
UINT err = ERR_INTERNAL_ERROR;
|
|
UCHAR key_hash[SHA1_SIZE];
|
|
char key_hash_str[MAX_SIZE];
|
|
bool use_azure = false;
|
|
char current_azure_ip[MAX_SIZE];
|
|
INTERNET_SETTING t;
|
|
UINT build = 0;
|
|
bool use_https = false;
|
|
bool use_vgs = false;
|
|
bool no_cert_verify = false;
|
|
char add_header_name[64];
|
|
char add_header_value[64];
|
|
// Validate arguments
|
|
if (c == NULL)
|
|
{
|
|
return ERR_INTERNAL_ERROR;
|
|
}
|
|
|
|
Zero(add_header_name, sizeof(add_header_name));
|
|
Zero(add_header_value, sizeof(add_header_value));
|
|
|
|
Zero(current_azure_ip, sizeof(current_azure_ip));
|
|
|
|
GetCurrentMachineIpProcessHash(machine_key);
|
|
BinToStr(machine_key_str, sizeof(machine_key_str), machine_key, sizeof(machine_key));
|
|
|
|
GetMachineHostName(machine_name, sizeof(machine_name));
|
|
StrLower(machine_name);
|
|
|
|
if (ipv6 == false)
|
|
{
|
|
url = DDNS_URL_V4_GLOBAL;
|
|
|
|
if (IsUseAlternativeHostname())
|
|
{
|
|
url = DDNS_URL_V4_ALT;
|
|
}
|
|
}
|
|
else
|
|
{
|
|
url = DDNS_URL_V6_GLOBAL;
|
|
|
|
if (IsUseAlternativeHostname())
|
|
{
|
|
url = DDNS_URL_V6_ALT;
|
|
}
|
|
|
|
if (replace_v6)
|
|
{
|
|
url = replace_v6;
|
|
}
|
|
}
|
|
|
|
Zero(&t, sizeof(t));
|
|
if (ipv6 == false)
|
|
{
|
|
// Proxy Setting
|
|
Copy(&t, &c->InternetSetting, sizeof(INTERNET_SETTING));
|
|
}
|
|
|
|
if (ipv6 == false)
|
|
{
|
|
// Get the current status of the VPN Azure Client
|
|
if (c->Cedar->Server != NULL)
|
|
{
|
|
AZURE_CLIENT *ac = c->Cedar->Server->AzureClient;
|
|
|
|
if (ac != NULL)
|
|
{
|
|
use_azure = SiIsAzureEnabled(c->Cedar->Server);
|
|
|
|
if (use_azure)
|
|
{
|
|
Lock(ac->Lock);
|
|
{
|
|
StrCpy(current_azure_ip, sizeof(current_azure_ip), ac->ConnectingAzureIp);
|
|
}
|
|
Unlock(ac->Lock);
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
req = NewPack();
|
|
BinToStr(key_str, sizeof(key_str), c->Key, sizeof(c->Key));
|
|
StrUpper(key_str);
|
|
PackAddStr(req, "key", key_str);
|
|
|
|
// Build Number
|
|
build = c->Cedar->Build;
|
|
|
|
|
|
PackAddInt(req, "build", build);
|
|
PackAddInt(req, "osinfo", GetOsInfo()->OsType);
|
|
PackAddInt(req, "is_64bit", Is64());
|
|
#ifdef OS_WIN32
|
|
PackAddInt(req, "is_windows_64bit", MsIs64BitWindows());
|
|
#endif // OS_WIN32
|
|
PackAddBool(req, "is_softether", true);
|
|
PackAddBool(req, "is_packetix", false);
|
|
PackAddStr(req, "machine_key", machine_key_str);
|
|
PackAddStr(req, "machine_name", machine_name);
|
|
PackAddInt(req, "lasterror_ipv4", c->Err_IPv4_GetMyIp);
|
|
PackAddInt(req, "lasterror_ipv6", c->Err_IPv6_GetMyIp);
|
|
PackAddBool(req, "use_azure", use_azure);
|
|
PackAddStr(req, "product_str", "SoftEther OSS");
|
|
PackAddInt(req, "ddns_protocol_version", DDNS_VERSION);
|
|
PackAddInt(req, "ddns_oss", 1);
|
|
|
|
|
|
if (use_azure)
|
|
{
|
|
Debug("current_azure_ip = %s\n", current_azure_ip);
|
|
PackAddStr(req, "current_azure_ip", current_azure_ip);
|
|
}
|
|
|
|
HashSha1(key_hash, key_str, StrLen(key_str));
|
|
BinToStr(key_hash_str, sizeof(key_hash_str), key_hash, sizeof(key_hash));
|
|
StrLower(key_hash_str);
|
|
|
|
if (p != NULL)
|
|
{
|
|
if (IsEmptyStr(p->NewHostname) == false)
|
|
{
|
|
PackAddStr(req, "new_hostname", p->NewHostname);
|
|
}
|
|
}
|
|
|
|
|
|
|
|
Format(url2, sizeof(url2), "%s?v=%I64u", url, Rand64());
|
|
Format(url3, sizeof(url3), url2, key_hash_str[2], key_hash_str[3]);
|
|
|
|
if (use_https == false)
|
|
{
|
|
ReplaceStr(url3, sizeof(url3), url3, "https://", "http://");
|
|
}
|
|
|
|
ReplaceStr(url3, sizeof(url3), url3, ".servers", ".open.servers");
|
|
|
|
|
|
if (no_cert_verify == false)
|
|
{
|
|
cert_hash = StrToBin(DDNS_CERT_HASH);
|
|
}
|
|
|
|
ret = NULL;
|
|
|
|
|
|
if (ret == NULL)
|
|
{
|
|
Debug("WpcCall: %s\n", url3);
|
|
ret = WpcCallEx2(url3, &t, DDNS_CONNECT_TIMEOUT, DDNS_COMM_TIMEOUT, "register", req,
|
|
NULL, NULL, ((cert_hash != NULL && ((cert_hash->Size % SHA1_SIZE) == 0)) ? cert_hash->Buf : NULL),
|
|
(cert_hash != NULL ? cert_hash->Size / SHA1_SIZE : 0),
|
|
NULL, DDNS_RPC_MAX_RECV_SIZE,
|
|
add_header_name, add_header_value,
|
|
DDNS_SNI_VER_STRING);
|
|
Debug("WpcCall Ret: %u\n", ret);
|
|
}
|
|
|
|
FreeBuf(cert_hash);
|
|
|
|
FreePack(req);
|
|
|
|
err = GetErrorFromPack(ret);
|
|
|
|
ExtractAndApplyDynList(ret);
|
|
|
|
// Status update
|
|
Lock(c->Lock);
|
|
{
|
|
if (err == ERR_NO_ERROR)
|
|
{
|
|
char snat_t[MAX_SIZE];
|
|
char current_region[128];
|
|
|
|
// Current host name
|
|
PackGetStr(ret, "current_hostname", c->CurrentHostName, sizeof(c->CurrentHostName));
|
|
PackGetStr(ret, "current_fqdn", c->CurrentFqdn, sizeof(c->CurrentFqdn));
|
|
PackGetStr(ret, "current_ipv4", c->CurrentIPv4, sizeof(c->CurrentIPv4));
|
|
PackGetStr(ret, "current_ipv6", c->CurrentIPv6, sizeof(c->CurrentIPv6));
|
|
PackGetStr(ret, "dns_suffix", c->DnsSuffix, sizeof(c->DnsSuffix));
|
|
PackGetStr(ret, "current_region", current_region, sizeof(current_region));
|
|
|
|
// SecureNAT connectivity check parameters
|
|
Zero(snat_t, sizeof(snat_t));
|
|
PackGetStr(ret, "snat_t", snat_t, sizeof(snat_t));
|
|
NnSetSecureNatTargetHostname(snat_t);
|
|
|
|
if (ipv6 == false)
|
|
{
|
|
char cert_hash[MAX_SIZE];
|
|
|
|
PackGetStr(ret, "current_azure_ip", c->CurrentAzureIp, sizeof(c->CurrentAzureIp));
|
|
c->CurrentAzureTimestamp = PackGetInt64(ret, "current_azure_timestamp");
|
|
PackGetStr(ret, "current_azure_signature", c->CurrentAzureSignature, sizeof(c->CurrentAzureSignature));
|
|
|
|
Zero(cert_hash, sizeof(cert_hash));
|
|
PackGetStr(ret, "azure_cert_hash", cert_hash, sizeof(cert_hash));
|
|
|
|
if (IsEmptyStr(cert_hash) == false)
|
|
{
|
|
StrCpy(c->AzureCertHash, sizeof(c->AzureCertHash), cert_hash);
|
|
}
|
|
}
|
|
|
|
StrCpy(c->Cedar->CurrentDDnsFqdn, sizeof(c->Cedar->CurrentDDnsFqdn), c->CurrentFqdn);
|
|
|
|
Debug("current_hostname=%s, current_fqdn=%s, current_ipv4=%s, current_ipv6=%s, current_azure_ip=%s, CurrentAzureTimestamp=%I64u, CurrentAzureSignature=%s, CertHash=%s\n",
|
|
c->CurrentHostName, c->CurrentFqdn,
|
|
c->CurrentIPv4, c->CurrentIPv6,
|
|
c->CurrentAzureIp, c->CurrentAzureTimestamp, c->CurrentAzureSignature, c->AzureCertHash);
|
|
|
|
if (IsEmptyStr(current_region) == false)
|
|
{
|
|
// Update the current region
|
|
SiUpdateCurrentRegion(c->Cedar, current_region, false);
|
|
}
|
|
}
|
|
}
|
|
Unlock(c->Lock);
|
|
|
|
if (IsEmptyStr(c->CurrentFqdn) == false)
|
|
{
|
|
SetCurrentDDnsFqdn(c->CurrentFqdn);
|
|
}
|
|
|
|
|
|
FreePack(ret);
|
|
|
|
UniDebug(L"DCRegister Error: %s\n", _E(err));
|
|
|
|
if (err == ERR_DUPLICATE_DDNS_KEY)
|
|
{
|
|
// Key duplication
|
|
DCGenNewKey(c->Key);
|
|
c->KeyChanged = true;
|
|
}
|
|
|
|
if (err == ERR_DISCONNECTED)
|
|
{
|
|
err = ERR_DDNS_DISCONNECTED;
|
|
}
|
|
|
|
if (IsUseAlternativeHostname() == false)
|
|
{
|
|
if (err == ERR_CONNECT_FAILED)
|
|
{
|
|
if (ipv6 && replace_v6 == NULL)
|
|
{
|
|
UINT type = DetectFletsType();
|
|
|
|
if (type & FLETS_DETECT_TYPE_EAST_BFLETS_PRIVATE && err != ERR_NO_ERROR)
|
|
{
|
|
err = DCRegister(c, ipv6, p, DDNS_REPLACE_URL_FOR_EAST_BFLETS);
|
|
}
|
|
|
|
if (type & FLETS_DETECT_TYPE_EAST_NGN_PRIVATE && err != ERR_NO_ERROR)
|
|
{
|
|
err = DCRegister(c, ipv6, p, DDNS_REPLACE_URL_FOR_EAST_NGN);
|
|
}
|
|
|
|
if (type & FLETS_DETECT_TYPE_WEST_NGN_PRIVATE && err != ERR_NO_ERROR)
|
|
{
|
|
err = DCRegister(c, ipv6, p, DDNS_REPLACE_URL_FOR_WEST_NGN);
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
return err;
|
|
}
|
|
|
|
// Get the self IP address
|
|
UINT DCGetMyIp(DDNS_CLIENT *c, bool ipv6, char *dst, UINT dst_size, char *replace_v6)
|
|
{
|
|
UINT ret = ERR_INTERNAL_ERROR;
|
|
|
|
ret = DCGetMyIpMain(c, ipv6, dst, dst_size, false, replace_v6);
|
|
|
|
|
|
if (ret == ERR_NO_ERROR)
|
|
{
|
|
IP ip;
|
|
|
|
if (StrToIP(&ip, dst))
|
|
{
|
|
if (ipv6 == false && IsIP4(&ip))
|
|
{
|
|
SetCurrentGlobalIP(&ip, false);
|
|
}
|
|
else if (ipv6 && IsIP6(&ip))
|
|
{
|
|
SetCurrentGlobalIP(&ip, true);
|
|
}
|
|
}
|
|
}
|
|
|
|
return ret;
|
|
}
|
|
UINT DCGetMyIpMain(DDNS_CLIENT *c, bool ipv6, char *dst, UINT dst_size, bool use_ssl, char *replace_v6)
|
|
{
|
|
char *url;
|
|
char url2[MAX_SIZE];
|
|
UINT ret = ERR_INTERNAL_ERROR;
|
|
URL_DATA data;
|
|
BUF *recv;
|
|
BUF *cert_hash = NULL;
|
|
bool no_cert_verify = false;
|
|
// Validate arguments
|
|
if (dst == NULL || c == NULL)
|
|
{
|
|
return ERR_INTERNAL_ERROR;
|
|
}
|
|
|
|
if (ipv6 == false)
|
|
{
|
|
url = DDNS_URL2_V4_GLOBAL;
|
|
|
|
if (IsUseAlternativeHostname())
|
|
{
|
|
url = DDNS_URL2_V4_ALT;
|
|
}
|
|
}
|
|
else
|
|
{
|
|
url = DDNS_URL2_V6_GLOBAL;
|
|
|
|
if (IsUseAlternativeHostname())
|
|
{
|
|
url = DDNS_URL2_V6_ALT;
|
|
}
|
|
|
|
if (replace_v6)
|
|
{
|
|
url = replace_v6;
|
|
}
|
|
}
|
|
|
|
Format(url2, sizeof(url2), "%s?v=%I64u", url, Rand64());
|
|
|
|
if (use_ssl)
|
|
{
|
|
ReplaceStr(url2, sizeof(url2), url2, "http://", "https://");
|
|
}
|
|
|
|
|
|
if (ParseUrl(&data, url2, false, NULL) == false)
|
|
{
|
|
return ERR_INTERNAL_ERROR;
|
|
}
|
|
|
|
if (no_cert_verify == false)
|
|
{
|
|
cert_hash = StrToBin(DDNS_CERT_HASH);
|
|
}
|
|
|
|
|
|
StrCpy(data.SniString, sizeof(data.SniString), DDNS_SNI_VER_STRING);
|
|
|
|
recv = HttpRequestEx3(&data, (ipv6 ? NULL : &c->InternetSetting), DDNS_CONNECT_TIMEOUT, DDNS_COMM_TIMEOUT, &ret, false, NULL, NULL,
|
|
NULL, ((cert_hash != NULL && (cert_hash->Size % SHA1_SIZE) == 0) ? cert_hash->Buf : NULL),
|
|
(cert_hash != NULL ? cert_hash->Size / SHA1_SIZE : 0), NULL, 0, NULL, NULL);
|
|
|
|
FreeBuf(cert_hash);
|
|
|
|
if (recv != NULL)
|
|
{
|
|
char *str = ZeroMalloc(recv->Size + 1);
|
|
Copy(str, recv->Buf, recv->Size);
|
|
|
|
if (StartWith(str, "IP=") == false)
|
|
{
|
|
ret = ERR_PROTOCOL_ERROR;
|
|
}
|
|
else
|
|
{
|
|
StrCpy(dst, dst_size, str + 3);
|
|
ret = ERR_NO_ERROR;
|
|
}
|
|
|
|
Free(str);
|
|
FreeBuf(recv);
|
|
}
|
|
|
|
if (IsUseAlternativeHostname() == false)
|
|
{
|
|
if (ret == ERR_CONNECT_FAILED)
|
|
{
|
|
if (ipv6 && replace_v6 == NULL && use_ssl == false)
|
|
{
|
|
UINT type = DetectFletsType();
|
|
|
|
if (type & FLETS_DETECT_TYPE_EAST_BFLETS_PRIVATE && ret != ERR_NO_ERROR)
|
|
{
|
|
ret = DCGetMyIpMain(c, ipv6, dst, dst_size, use_ssl, DDNS_REPLACE_URL2_FOR_EAST_BFLETS);
|
|
}
|
|
|
|
if (type & FLETS_DETECT_TYPE_EAST_NGN_PRIVATE && ret != ERR_NO_ERROR)
|
|
{
|
|
ret = DCGetMyIpMain(c, ipv6, dst, dst_size, use_ssl, DDNS_REPLACE_URL2_FOR_EAST_NGN);
|
|
}
|
|
|
|
if (type & FLETS_DETECT_TYPE_WEST_NGN_PRIVATE && ret != ERR_NO_ERROR)
|
|
{
|
|
ret = DCGetMyIpMain(c, ipv6, dst, dst_size, use_ssl, DDNS_REPLACE_URL2_FOR_WEST_NGN);
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
return ret;
|
|
}
|
|
|
|
|
|
// Creating a DDNS client
|
|
DDNS_CLIENT *NewDDNSClient(CEDAR *cedar, UCHAR *key, INTERNET_SETTING *t)
|
|
{
|
|
DDNS_CLIENT *c;
|
|
UCHAR key_hash[SHA1_SIZE];
|
|
// Validate arguments
|
|
if (cedar == NULL)
|
|
{
|
|
return NULL;
|
|
}
|
|
|
|
c = ZeroMalloc(sizeof(DDNS_CLIENT));
|
|
c->Cedar = cedar;
|
|
AddRef(c->Cedar->ref);
|
|
|
|
c->Err_IPv4 = c->Err_IPv6 = ERR_TRYING_TO_CONNECT;
|
|
|
|
if (key == NULL)
|
|
{
|
|
// Create a new key
|
|
DCGenNewKey(c->Key);
|
|
}
|
|
else
|
|
{
|
|
// Set the key
|
|
Copy(c->Key, key, SHA1_SIZE);
|
|
}
|
|
|
|
HashSha1(key_hash, c->Key, sizeof(c->Key));
|
|
|
|
|
|
if (t != NULL)
|
|
{
|
|
Copy(&c->InternetSetting, t, sizeof(INTERNET_SETTING));
|
|
}
|
|
|
|
c->Lock = NewLock();
|
|
|
|
// Thread creation
|
|
c->Event = NewEvent();
|
|
c->Thread = NewThread(DCThread, c);
|
|
|
|
return c;
|
|
}
|
|
|
|
// Release of DDNS client
|
|
void FreeDDNSClient(DDNS_CLIENT *c)
|
|
{
|
|
// Validate arguments
|
|
if (c == NULL)
|
|
{
|
|
return;
|
|
}
|
|
|
|
// Stop the thread
|
|
c->Halt = true;
|
|
Set(c->Event);
|
|
|
|
WaitThread(c->Thread, INFINITE);
|
|
ReleaseThread(c->Thread);
|
|
|
|
ReleaseEvent(c->Event);
|
|
|
|
ReleaseCedar(c->Cedar);
|
|
DeleteLock(c->Lock);
|
|
|
|
Free(c);
|
|
}
|
|
|
|
// Create a new key
|
|
void DCGenNewKey(UCHAR *key)
|
|
{
|
|
BUF *b;
|
|
UINT64 tick;
|
|
UCHAR hash[SHA1_SIZE];
|
|
UCHAR rand[SHA1_SIZE];
|
|
UINT i;
|
|
// Validate arguments
|
|
if (key == NULL)
|
|
{
|
|
return;
|
|
}
|
|
|
|
b = NewBuf();
|
|
|
|
Rand(rand, sizeof(rand));
|
|
WriteBuf(b, rand, sizeof(rand));
|
|
|
|
tick = TickHighres64();
|
|
WriteBufInt64(b, tick);
|
|
|
|
tick = Tick64();
|
|
WriteBufInt64(b, tick);
|
|
|
|
tick = SystemTime64();
|
|
WriteBufInt64(b, tick);
|
|
|
|
GetCurrentMachineIpProcessHash(hash);
|
|
WriteBuf(b, hash, sizeof(hash));
|
|
|
|
HashSha1(key, b->Buf, b->Size);
|
|
Rand(rand, sizeof(rand));
|
|
|
|
for (i = 0;i < SHA1_SIZE;i++)
|
|
{
|
|
key[i] = key[i] ^ rand[i];
|
|
}
|
|
|
|
FreeBuf(b);
|
|
}
|
|
|
|
|