gnunet-svn
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[GNUnet-SVN] r37046 - gnunet/src/dns


From: gnunet
Subject: [GNUnet-SVN] r37046 - gnunet/src/dns
Date: Mon, 18 Apr 2016 14:08:38 +0200

Author: daniel
Date: 2016-04-18 14:08:38 +0200 (Mon, 18 Apr 2016)
New Revision: 37046

Modified:
   gnunet/src/dns/gnunet-helper-dns.c
   gnunet/src/dns/gnunet-service-dns.c
Log:
dns: add support for skipping the routing setup

Modified: gnunet/src/dns/gnunet-helper-dns.c
===================================================================
--- gnunet/src/dns/gnunet-helper-dns.c  2016-04-17 15:17:28 UTC (rev 37045)
+++ gnunet/src/dns/gnunet-helper-dns.c  2016-04-18 12:08:38 UTC (rev 37046)
@@ -709,6 +709,7 @@
  *             3: IPv6 netmask length in bits ("64")
  *             4: IPv4 address for the tunnel ("1.2.3.4")
  *             5: IPv4 netmask ("255.255.0.0")
+ *             6: skip sysctl, routing and iptables setup ("0")
  * @return 0 on success, otherwise code indicating type of error:
  *         1 wrong number of arguments
  *         2 invalid arguments (i.e. port number / prefix length wrong)
@@ -733,8 +734,9 @@
   char mygid[32];
   int fd_tun;
   uid_t uid;
+  int nortsetup = 0;
 
-  if (6 != argc)
+  if (7 != argc)
   {
     fprintf (stderr, "Fatal: must supply 6 arguments!\n");
     return 1;
@@ -755,41 +757,46 @@
     return 254;
   }
 #endif
+  if (0 == strncmp(argv[6], "1", 2))
+    nortsetup = 1;
 
-  /* verify that the binaries were care about are executable */
-  if (0 == access ("/sbin/iptables", X_OK))
-    sbin_iptables = "/sbin/iptables";
-  else if (0 == access ("/usr/sbin/iptables", X_OK))
-    sbin_iptables = "/usr/sbin/iptables";
-  else
+  if (0 == nortsetup)
   {
-    fprintf (stderr,
-            "Fatal: executable iptables not found in approved directories: 
%s\n",
-            strerror (errno));
-    return 3;
+    /* verify that the binaries we care about are executable */
+    if (0 == access ("/sbin/iptables", X_OK))
+      sbin_iptables = "/sbin/iptables";
+    else if (0 == access ("/usr/sbin/iptables", X_OK))
+      sbin_iptables = "/usr/sbin/iptables";
+    else
+    {
+      fprintf (stderr,
+              "Fatal: executable iptables not found in approved directories: 
%s\n",
+              strerror (errno));
+      return 3;
+    }
+    if (0 == access ("/sbin/ip", X_OK))
+      sbin_ip = "/sbin/ip";
+    else if (0 == access ("/usr/sbin/ip", X_OK))
+      sbin_ip = "/usr/sbin/ip";
+    else
+    {
+      fprintf (stderr,
+              "Fatal: executable ip not found in approved directories: %s\n",
+              strerror (errno));
+      return 4;
+    }
+    if (0 == access ("/sbin/sysctl", X_OK))
+      sbin_sysctl = "/sbin/sysctl";
+    else if (0 == access ("/usr/sbin/sysctl", X_OK))
+      sbin_sysctl = "/usr/sbin/sysctl";
+    else
+    {
+      fprintf (stderr,
+               "Fatal: executable sysctl not found in approved directories: 
%s\n",
+               strerror (errno));
+      return 5;
+    }
   }
-  if (0 == access ("/sbin/ip", X_OK))
-    sbin_ip = "/sbin/ip";
-  else if (0 == access ("/usr/sbin/ip", X_OK))
-    sbin_ip = "/usr/sbin/ip";
-  else
-  {
-    fprintf (stderr,
-            "Fatal: executable ip not found in approved directories: %s\n",
-            strerror (errno));
-    return 4;
-  }
-  if (0 == access ("/sbin/sysctl", X_OK))
-    sbin_sysctl = "/sbin/sysctl";
-  else if (0 == access ("/usr/sbin/sysctl", X_OK))
-    sbin_sysctl = "/usr/sbin/sysctl";
-  else
-  {
-    fprintf (stderr,
-             "Fatal: executable sysctl not found in approved directories: 
%s\n",
-             strerror (errno));
-    return 5;
-  }
 
   /* setup 'mygid' string */
   snprintf (mygid, sizeof (mygid), "%d", (int) getegid());
@@ -858,6 +865,7 @@
   dev[IFNAMSIZ - 1] = '\0';
 
   /* Disable rp filtering */
+  if (0 == nortsetup)
   {
     char *const sysctl_args[] = {"sysctl", "-w",
       "net.ipv4.conf.all.rp_filter=0", NULL};
@@ -921,47 +929,50 @@
   /* Forward everything from our EGID (which should only be held
      by the 'gnunet-service-dns') and with destination
      to port 53 on UDP, without hijacking */
-  r = 8; /* failed to fully setup routing table */
+  if (0 == nortsetup)
   {
-    char *const mangle_args[] =
-      {
-       "iptables", "-m", "owner", "-t", "mangle", "-I", "OUTPUT", "1", "-p",
-       "udp", "--gid-owner", mygid, "--dport", DNS_PORT, "-j",
-       "ACCEPT", NULL
-      };
-    if (0 != fork_and_exec (sbin_iptables, mangle_args))
-      goto cleanup_rest;
+    r = 8; /* failed to fully setup routing table */
+    {
+      char *const mangle_args[] =
+        {
+        "iptables", "-m", "owner", "-t", "mangle", "-I", "OUTPUT", "1", "-p",
+        "udp", "--gid-owner", mygid, "--dport", DNS_PORT, "-j",
+        "ACCEPT", NULL
+        };
+      if (0 != fork_and_exec (sbin_iptables, mangle_args))
+        goto cleanup_rest;
+    }
+    /* Mark all of the other DNS traffic using our mark DNS_MARK */
+    {
+      char *const mark_args[] =
+        {
+        "iptables", "-t", "mangle", "-I", "OUTPUT", "2", "-p",
+        "udp", "--dport", DNS_PORT, "-j", "MARK", "--set-mark", DNS_MARK,
+        NULL
+        };
+      if (0 != fork_and_exec (sbin_iptables, mark_args))
+        goto cleanup_mangle_1;
+    }
+    /* Forward all marked DNS traffic to our DNS_TABLE */
+    {
+      char *const forward_args[] =
+        {
+        "ip", "rule", "add", "fwmark", DNS_MARK, "table", DNS_TABLE, NULL
+        };
+      if (0 != fork_and_exec (sbin_ip, forward_args))
+        goto cleanup_mark_2;
+    }
+    /* Finally, add rule in our forwarding table to pass to our virtual 
interface */
+    {
+      char *const route_args[] =
+        {
+        "ip", "route", "add", "default", "dev", dev,
+        "table", DNS_TABLE, NULL
+        };
+      if (0 != fork_and_exec (sbin_ip, route_args))
+        goto cleanup_forward_3;
+    }
   }
-  /* Mark all of the other DNS traffic using our mark DNS_MARK */
-  {
-    char *const mark_args[] =
-      {
-       "iptables", "-t", "mangle", "-I", "OUTPUT", "2", "-p",
-       "udp", "--dport", DNS_PORT, "-j", "MARK", "--set-mark", DNS_MARK,
-       NULL
-      };
-    if (0 != fork_and_exec (sbin_iptables, mark_args))
-      goto cleanup_mangle_1;
-  }
-  /* Forward all marked DNS traffic to our DNS_TABLE */
-  {
-    char *const forward_args[] =
-      {
-       "ip", "rule", "add", "fwmark", DNS_MARK, "table", DNS_TABLE, NULL
-      };
-    if (0 != fork_and_exec (sbin_ip, forward_args))
-      goto cleanup_mark_2;
-  }
-  /* Finally, add rule in our forwarding table to pass to our virtual 
interface */
-  {
-    char *const route_args[] =
-      {
-       "ip", "route", "add", "default", "dev", dev,
-       "table", DNS_TABLE, NULL
-      };
-    if (0 != fork_and_exec (sbin_ip, route_args))
-      goto cleanup_forward_3;
-  }
 
   /* drop privs *except* for the saved UID; this is not perfect, but better
      than doing nothing */
@@ -1007,6 +1018,7 @@
   /* update routing tables again -- this is why we could not fully drop privs 
*/
   /* now undo updating of routing tables; normal exit or clean-up-on-error 
case */
  cleanup_route_4:
+  if (0 == nortsetup)
   {
     char *const route_clean_args[] =
       {
@@ -1017,6 +1029,7 @@
       r += 1;
   }
  cleanup_forward_3:
+  if (0 == nortsetup)
   {
     char *const forward_clean_args[] =
       {
@@ -1026,6 +1039,7 @@
       r += 2;
   }
  cleanup_mark_2:
+  if (0 == nortsetup)
   {
     char *const mark_clean_args[] =
       {
@@ -1036,6 +1050,7 @@
       r += 4;
   }
  cleanup_mangle_1:
+  if (0 == nortsetup)
   {
     char *const mangle_clean_args[] =
       {

Modified: gnunet/src/dns/gnunet-service-dns.c
===================================================================
--- gnunet/src/dns/gnunet-service-dns.c 2016-04-17 15:17:28 UTC (rev 37045)
+++ gnunet/src/dns/gnunet-service-dns.c 2016-04-18 12:08:38 UTC (rev 37046)
@@ -219,7 +219,7 @@
 /**
  * Command-line arguments we are giving to the hijacker process.
  */
-static char *helper_argv[7];
+static char *helper_argv[8];
 
 /**
  * Head of DLL of clients we consult.
@@ -284,7 +284,7 @@
     GNUNET_HELPER_stop (hijacker, GNUNET_NO);
     hijacker = NULL;
   }
-  for (i=0;i<7;i++)
+  for (i=0;i<8;i++)
     GNUNET_free_non_null (helper_argv[i]);
   for (i=0;i<=UINT16_MAX;i++)
     cleanup_rr (&requests[i]);
@@ -1040,6 +1040,7 @@
   struct in6_addr dns_exit6;
   char *dns_exit;
   char *binary;
+  int nortsetup;
 
   cfg = cfg_;
   stats = GNUNET_STATISTICS_create ("dns", cfg);
@@ -1136,7 +1137,15 @@
     return;
   }
   helper_argv[5] = ipv4mask;
-  helper_argv[6] = NULL;
+
+  nortsetup = GNUNET_CONFIGURATION_get_value_yesno (cfg, "dns",
+                                                     "SKIP_ROUTING_SETUP");
+  if (GNUNET_YES == nortsetup)
+    helper_argv[6] = GNUNET_strdup("1");
+  else
+    helper_argv[6] = GNUNET_strdup("0");
+
+  helper_argv[7] = NULL;
   hijacker = GNUNET_HELPER_start (GNUNET_NO,
                                  "gnunet-helper-dns",
                                  helper_argv,




reply via email to

[Prev in Thread] Current Thread [Next in Thread]