/* * ľAnytun * * ľAnytun is a tiny implementation of SATP. Unlike Anytun which is a full * featured implementation ľAnytun has no support for multiple connections * or synchronisation. It is a small single threaded implementation intended * to act as a client on small platforms. * The secure anycast tunneling protocol (satp) defines a protocol used * for communication between any combination of unicast and anycast * tunnel endpoints. It has less protocol overhead than IPSec in Tunnel * mode and allows tunneling of every ETHER TYPE protocol (e.g. * ethernet, ip, arp ...). satp directly includes cryptography and * message authentication based on the methodes used by SRTP. It is * intended to deliver a generic, scaleable and secure solution for * tunneling and relaying of packets of any protocol. * * * Copyright (C) 2007-2008 Christian Pointner * * This file is part of ľAnytun. * * ľAnytun is free software: you can redistribute it and/or modify * it under the terms of the GNU General Public License version 3 as * published by the Free Software Foundation. * * ľAnytun is distributed in the hope that it will be useful, * but WITHOUT ANY WARRANTY; without even the implied warranty of * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the * GNU General Public License for more details. * * You should have received a copy of the GNU General Public License * along with ľAnytun. If not, see . */ #include "datatypes.h" #include #include #include #include "log.h" #include "signal.h" #include "options.h" #include "tun.h" #include "udp.h" #include "plain_packet.h" #include "encrypted_packet.h" #include "daemon.h" #include "sysexec.h" void main_loop(tun_device_t* dev, udp_socket_t* sock) { log_printf(INFO, "entering main loop"); plain_packet_t plain_packet; plain_packet_init(&plain_packet); encrypted_packet_t encrypted_packet; encrypted_packet_init(&encrypted_packet); u_int32_t len = 0; udp_endpoint_t remote; while(1) { plain_packet_set_payload_length(&plain_packet, -1); encrypted_packet_set_length(&encrypted_packet, -1); /* len = tun_read(dev, plain_packet_get_payload(&plain_packet), plain_packet_get_payload_length(&plain_packet)); */ /* plain_packet_set_payload_length(&plain_packet, len); */ /* udp_write(sock, encrypted_packet_get_packet(&encrypted_packet), encrypted_packet_get_length(&encrypted_packet)); */ /* len = udp_read(sock, encrypted_packet_get_packet(&encrypted_packet), encrypted_packet_get_length(&encrypted_packet), &remote); */ /* encrypted_packet_set_length(&encrypted_packet, len); */ /* if(memcmp(&remote, &(sock->remote_end_), sizeof(remote))) { */ /* memcpy(&(sock->remote_end_), &remote, sizeof(remote)); */ /* char* addrstring = udp_endpoint_to_string(remote); */ /* log_printf(NOTICE, "autodetected remote host changed %s", addrstring); */ /* free(addrstring); */ /* } */ /* tun_write(dev, plain_packet_get_payload(&plain_packet), plain_packet_get_payload_length(&plain_packet)); */ } } void print_hex_dump(const u_int8_t* buf, u_int32_t len) { u_int32_t i; for(i=0; i < len; i++) { printf("%02X ", buf[i]); if(!((i+1)%8)) printf(" "); if(!((i+1)%16)) printf("\n"); } printf("\n"); } int main(int argc, char* argv[]) { log_init("uanytun", DAEMON); signal_init(); options_t* opt; int ret = options_parse(&opt, argc, argv); if(ret) exit(ret); options_print(opt); // chrootAndDrop("/var/run/", "nobody"); // daemonize(); // log_printf(INFO, "running in background now"); /* tun_device_t* dev; */ /* tun_init(&dev, NULL, "tun", "192.168.23.1", "192.168.23.2"); */ /* if(!dev) { */ /* log_printf(ERR, "error on tun_init"); */ /* exit(-1); */ /* } */ /* int ret = exec_script("post-up.sh", dev->actual_name_); */ /* log_printf(NOTICE, "post-up script returned %d", ret); */ /* udp_socket_t* sock; */ /* udp_init(&sock, NULL, "4444"); */ /* if(!sock) { */ /* log_printf(ERR, "error on udp_init"); */ /* exit(-1); */ /* } */ /* char* local_string = udp_get_local_end_string(sock); */ /* log_printf(INFO, "listening on: %s", local_string); */ /* free(local_string); */ /* udp_set_remote(sock, "1.2.3.4", "4444"); */ /* char* remote_string = udp_get_remote_end_string(sock); */ /* log_printf(INFO, "set remote end to: %s", remote_string); */ /* free(remote_string); */ /* main_loop(dev, sock); */ /* tun_close(&dev); */ /* udp_close(&sock); */ options_clear(&opt); return 0; }