2007-12-08 19:34:15 +00:00
|
|
|
/*
|
2008-01-01 17:20:20 +00:00
|
|
|
* This file Copyright (C) 2007-2008 Charles Kerr <charles@rebelbase.com>
|
2006-09-25 18:37:45 +00:00
|
|
|
*
|
2007-12-08 19:34:15 +00:00
|
|
|
* This file is licensed by the GPL version 2. Works owned by the
|
|
|
|
* Transmission project are granted a special exemption to clause 2(b)
|
|
|
|
* so that the bulk of its code can remain under the MIT license.
|
|
|
|
* This exemption does not extend to derived works not owned by
|
|
|
|
* the Transmission project.
|
2006-09-25 18:37:45 +00:00
|
|
|
*
|
2007-12-13 01:20:16 +00:00
|
|
|
* $Id$
|
2007-12-08 19:34:15 +00:00
|
|
|
*/
|
2006-09-25 18:37:45 +00:00
|
|
|
|
2007-11-09 20:07:52 +00:00
|
|
|
#include <assert.h>
|
2007-07-29 18:11:21 +00:00
|
|
|
#include <errno.h>
|
|
|
|
#include <time.h>
|
2007-12-08 19:34:15 +00:00
|
|
|
#include <inttypes.h>
|
2007-07-29 18:11:21 +00:00
|
|
|
|
2008-01-10 19:27:13 +00:00
|
|
|
#ifdef WIN32
|
|
|
|
#include <winsock2.h> /* inet_ntoa */
|
|
|
|
#else
|
|
|
|
#include <arpa/inet.h> /* inet_ntoa */
|
|
|
|
#endif
|
2007-08-04 02:55:06 +00:00
|
|
|
|
2007-12-08 19:34:15 +00:00
|
|
|
#include <libnatpmp/natpmp.h>
|
2007-07-14 16:29:21 +00:00
|
|
|
|
2006-09-25 18:37:45 +00:00
|
|
|
#include "transmission.h"
|
2007-07-09 20:10:42 +00:00
|
|
|
#include "natpmp.h"
|
2007-12-08 19:34:15 +00:00
|
|
|
#include "shared.h"
|
2007-07-30 18:04:10 +00:00
|
|
|
#include "utils.h"
|
2006-09-25 18:37:45 +00:00
|
|
|
|
2007-12-08 19:34:15 +00:00
|
|
|
#define LIFETIME_SECS 3600
|
2007-12-13 19:28:51 +00:00
|
|
|
#define COMMAND_WAIT_SECS 8
|
2006-09-25 18:37:45 +00:00
|
|
|
|
2007-12-08 19:34:15 +00:00
|
|
|
#define KEY "Port Mapping (NAT-PMP): "
|
2006-09-25 18:37:45 +00:00
|
|
|
|
2007-12-08 19:34:15 +00:00
|
|
|
typedef enum
|
2006-09-25 18:37:45 +00:00
|
|
|
{
|
2007-12-08 19:34:15 +00:00
|
|
|
TR_NATPMP_IDLE,
|
|
|
|
TR_NATPMP_ERR,
|
2007-12-13 18:56:22 +00:00
|
|
|
TR_NATPMP_DISCOVER,
|
2007-12-08 19:34:15 +00:00
|
|
|
TR_NATPMP_RECV_PUB,
|
|
|
|
TR_NATPMP_SEND_MAP,
|
|
|
|
TR_NATPMP_RECV_MAP,
|
|
|
|
TR_NATPMP_SEND_UNMAP,
|
|
|
|
TR_NATPMP_RECV_UNMAP
|
|
|
|
}
|
|
|
|
tr_natpmp_state;
|
|
|
|
|
2007-11-06 16:02:50 +00:00
|
|
|
struct tr_natpmp
|
2006-09-25 18:37:45 +00:00
|
|
|
{
|
2007-12-08 19:34:15 +00:00
|
|
|
int port;
|
2007-12-13 18:56:22 +00:00
|
|
|
unsigned int isMapped : 1;
|
|
|
|
unsigned int hasDiscovered : 1;
|
2007-12-08 19:34:15 +00:00
|
|
|
time_t renewTime;
|
2007-12-13 19:28:51 +00:00
|
|
|
time_t commandTime;
|
2007-12-08 19:34:15 +00:00
|
|
|
tr_natpmp_state state;
|
|
|
|
natpmp_t natpmp;
|
2006-09-25 18:37:45 +00:00
|
|
|
};
|
|
|
|
|
2007-12-08 19:34:15 +00:00
|
|
|
/**
|
|
|
|
***
|
|
|
|
**/
|
2007-02-06 03:24:55 +00:00
|
|
|
|
2007-04-15 07:36:24 +00:00
|
|
|
static void
|
2007-12-08 19:34:15 +00:00
|
|
|
logVal( const char * func, int ret )
|
2006-09-25 18:37:45 +00:00
|
|
|
{
|
2007-12-08 19:34:15 +00:00
|
|
|
if( ret==NATPMP_TRYAGAIN )
|
2008-03-04 02:02:25 +00:00
|
|
|
tr_dbg( _( KEY "%s returned 'try again'" ), func );
|
2007-12-08 19:34:15 +00:00
|
|
|
else if( ret >= 0 )
|
2008-03-04 02:02:25 +00:00
|
|
|
tr_dbg( _( KEY "%s returned success (%d)" ), func, ret );
|
2006-09-25 18:37:45 +00:00
|
|
|
else
|
2008-03-04 02:02:25 +00:00
|
|
|
tr_err( _( KEY "%s returned error %d, errno is %d (%s)" ), func, ret, errno, tr_strerror(errno) );
|
2006-09-25 18:37:45 +00:00
|
|
|
}
|
|
|
|
|
2007-12-08 19:34:15 +00:00
|
|
|
struct tr_natpmp*
|
|
|
|
tr_natpmpInit( void )
|
2007-04-15 07:36:24 +00:00
|
|
|
{
|
2007-12-13 18:56:22 +00:00
|
|
|
struct tr_natpmp * nat;
|
|
|
|
nat = tr_new0( struct tr_natpmp, 1 );
|
|
|
|
nat->state = TR_NATPMP_DISCOVER;
|
2007-12-08 19:34:15 +00:00
|
|
|
nat->port = -1;
|
|
|
|
return nat;
|
2006-09-25 18:37:45 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
void
|
2007-12-08 19:34:15 +00:00
|
|
|
tr_natpmpClose( tr_natpmp * nat )
|
2006-09-25 18:37:45 +00:00
|
|
|
{
|
2007-12-08 19:34:15 +00:00
|
|
|
assert( !nat->isMapped );
|
2007-12-13 20:19:52 +00:00
|
|
|
assert( ( nat->state == TR_NATPMP_IDLE )
|
|
|
|
|| ( nat->state == TR_NATPMP_ERR )
|
|
|
|
|| ( nat->state == TR_NATPMP_DISCOVER ) );
|
2007-04-17 02:35:14 +00:00
|
|
|
|
2007-12-08 19:34:15 +00:00
|
|
|
closenatpmp( &nat->natpmp );
|
|
|
|
tr_free( nat );
|
2006-09-25 18:37:45 +00:00
|
|
|
}
|
|
|
|
|
2007-12-13 19:28:51 +00:00
|
|
|
static int
|
|
|
|
canSendCommand( const struct tr_natpmp * nat )
|
|
|
|
{
|
|
|
|
return time(NULL) >= nat->commandTime;
|
|
|
|
}
|
|
|
|
|
|
|
|
static void
|
|
|
|
setCommandTime( struct tr_natpmp * nat )
|
|
|
|
{
|
|
|
|
nat->commandTime = time(NULL) + COMMAND_WAIT_SECS;
|
|
|
|
}
|
|
|
|
|
2007-12-15 06:10:24 +00:00
|
|
|
static void
|
|
|
|
setErrorState( struct tr_natpmp * nat )
|
|
|
|
{
|
2008-03-04 02:02:25 +00:00
|
|
|
tr_err( _( KEY "If your router supports NAT-PMP, please make sure NAT-PMP is enabled!" ) );
|
|
|
|
tr_err( _( KEY "NAT-PMP port forwarding unsuccessful, trying UPnP next" ) );
|
2007-12-15 06:10:24 +00:00
|
|
|
nat->state = TR_NATPMP_ERR;
|
|
|
|
}
|
|
|
|
|
2007-12-08 19:34:15 +00:00
|
|
|
int
|
|
|
|
tr_natpmpPulse( struct tr_natpmp * nat, int port, int isEnabled )
|
2006-09-25 18:37:45 +00:00
|
|
|
{
|
2007-12-08 19:34:15 +00:00
|
|
|
int ret;
|
2006-09-25 18:37:45 +00:00
|
|
|
|
2007-12-13 18:56:22 +00:00
|
|
|
if( isEnabled && ( nat->state == TR_NATPMP_DISCOVER ) )
|
|
|
|
{
|
|
|
|
int val = initnatpmp( &nat->natpmp );
|
|
|
|
logVal( "initnatpmp", val );
|
|
|
|
val = sendpublicaddressrequest( &nat->natpmp );
|
|
|
|
logVal( "sendpublicaddressrequest", val );
|
|
|
|
nat->state = val < 0 ? TR_NATPMP_ERR : TR_NATPMP_RECV_PUB;
|
|
|
|
nat->hasDiscovered = 1;
|
2007-12-13 19:28:51 +00:00
|
|
|
setCommandTime( nat );
|
2007-12-13 18:56:22 +00:00
|
|
|
}
|
|
|
|
|
2007-12-13 19:28:51 +00:00
|
|
|
if( ( nat->state == TR_NATPMP_RECV_PUB ) && canSendCommand( nat ) )
|
2006-09-25 18:37:45 +00:00
|
|
|
{
|
2007-12-08 19:34:15 +00:00
|
|
|
natpmpresp_t response;
|
|
|
|
const int val = readnatpmpresponseorretry( &nat->natpmp, &response );
|
|
|
|
logVal( "readnatpmpresponseorretry", val );
|
|
|
|
if( val >= 0 ) {
|
2008-03-04 02:02:25 +00:00
|
|
|
tr_inf( _( KEY "found public address %s" ), inet_ntoa( response.publicaddress.addr ) );
|
2007-12-08 19:34:15 +00:00
|
|
|
nat->state = TR_NATPMP_IDLE;
|
|
|
|
} else if( val != NATPMP_TRYAGAIN ) {
|
2007-12-15 06:10:24 +00:00
|
|
|
setErrorState( nat );
|
2006-09-25 18:37:45 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2007-12-08 19:34:15 +00:00
|
|
|
if( ( nat->state == TR_NATPMP_IDLE ) || ( nat->state == TR_NATPMP_ERR ) )
|
2007-02-06 03:24:55 +00:00
|
|
|
{
|
2007-12-08 19:34:15 +00:00
|
|
|
if( nat->isMapped && ( !isEnabled || ( nat->port != port ) ) )
|
|
|
|
nat->state = TR_NATPMP_SEND_UNMAP;
|
2007-02-06 03:24:55 +00:00
|
|
|
}
|
2006-09-25 18:37:45 +00:00
|
|
|
|
2007-12-13 19:28:51 +00:00
|
|
|
if( ( nat->state == TR_NATPMP_SEND_UNMAP ) && canSendCommand( nat ) )
|
2006-09-25 18:37:45 +00:00
|
|
|
{
|
2007-12-08 19:34:15 +00:00
|
|
|
const int val = sendnewportmappingrequest( &nat->natpmp, NATPMP_PROTOCOL_TCP, nat->port, nat->port, 0 );
|
|
|
|
logVal( "sendnewportmappingrequest", val );
|
|
|
|
nat->state = val < 0 ? TR_NATPMP_ERR : TR_NATPMP_RECV_UNMAP;
|
2007-12-13 19:28:51 +00:00
|
|
|
setCommandTime( nat );
|
2006-09-25 18:37:45 +00:00
|
|
|
}
|
|
|
|
|
2007-12-08 19:34:15 +00:00
|
|
|
if( nat->state == TR_NATPMP_RECV_UNMAP )
|
2006-09-25 18:37:45 +00:00
|
|
|
{
|
2007-12-08 19:34:15 +00:00
|
|
|
natpmpresp_t resp;
|
|
|
|
const int val = readnatpmpresponseorretry( &nat->natpmp, &resp );
|
|
|
|
logVal( "readnatpmpresponseorretry", val );
|
|
|
|
if( val >= 0 ) {
|
2008-03-04 02:02:25 +00:00
|
|
|
tr_inf( _( KEY "port %d has been unmapped." ), nat->port );
|
2007-12-08 19:34:15 +00:00
|
|
|
nat->state = TR_NATPMP_IDLE;
|
|
|
|
nat->port = -1;
|
|
|
|
nat->isMapped = 0;
|
|
|
|
} else if( val != NATPMP_TRYAGAIN ) {
|
2007-12-15 06:10:24 +00:00
|
|
|
setErrorState( nat );
|
2007-02-06 03:24:55 +00:00
|
|
|
}
|
2007-01-28 08:54:19 +00:00
|
|
|
}
|
2007-02-06 03:24:55 +00:00
|
|
|
|
2007-12-08 19:34:15 +00:00
|
|
|
if( nat->state == TR_NATPMP_IDLE )
|
2006-09-25 18:37:45 +00:00
|
|
|
{
|
2007-12-13 18:56:22 +00:00
|
|
|
if( isEnabled && !nat->isMapped && nat->hasDiscovered )
|
2007-12-08 19:34:15 +00:00
|
|
|
nat->state = TR_NATPMP_SEND_MAP;
|
2006-09-25 18:37:45 +00:00
|
|
|
|
2007-12-13 01:20:16 +00:00
|
|
|
else if( nat->isMapped && time(NULL) >= nat->renewTime )
|
2007-12-08 19:34:15 +00:00
|
|
|
nat->state = TR_NATPMP_SEND_MAP;
|
2006-09-25 18:37:45 +00:00
|
|
|
}
|
2007-02-06 03:24:55 +00:00
|
|
|
|
2007-12-13 19:28:51 +00:00
|
|
|
if( ( nat->state == TR_NATPMP_SEND_MAP ) && canSendCommand( nat ) )
|
2006-09-25 18:37:45 +00:00
|
|
|
{
|
2007-12-08 19:34:15 +00:00
|
|
|
const int val = sendnewportmappingrequest( &nat->natpmp, NATPMP_PROTOCOL_TCP, port, port, LIFETIME_SECS );
|
|
|
|
logVal( "sendnewportmappingrequest", val );
|
|
|
|
nat->state = val < 0 ? TR_NATPMP_ERR : TR_NATPMP_RECV_MAP;
|
2007-12-13 19:28:51 +00:00
|
|
|
setCommandTime( nat );
|
2006-09-25 18:37:45 +00:00
|
|
|
}
|
|
|
|
|
2007-12-08 19:34:15 +00:00
|
|
|
if( nat->state == TR_NATPMP_RECV_MAP )
|
2006-09-25 18:37:45 +00:00
|
|
|
{
|
2007-12-08 19:34:15 +00:00
|
|
|
natpmpresp_t resp;
|
|
|
|
const int val = readnatpmpresponseorretry( &nat->natpmp, &resp );
|
|
|
|
logVal( "readnatpmpresponseorretry", val );
|
|
|
|
if( val >= 0 ) {
|
|
|
|
nat->state = TR_NATPMP_IDLE;
|
|
|
|
nat->isMapped = 1;
|
|
|
|
nat->renewTime = time( NULL ) + LIFETIME_SECS;
|
|
|
|
nat->port = resp.newportmapping.privateport;
|
2008-03-04 02:02:25 +00:00
|
|
|
tr_inf( _( KEY "port %d mapped successfully" ), nat->port );
|
2007-12-08 19:34:15 +00:00
|
|
|
} else if( val != NATPMP_TRYAGAIN ) {
|
2007-12-15 06:10:24 +00:00
|
|
|
setErrorState( nat );
|
2006-09-25 18:37:45 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2007-12-13 18:56:22 +00:00
|
|
|
switch( nat->state ) {
|
|
|
|
case TR_NATPMP_IDLE: ret = nat->isMapped ? TR_NAT_TRAVERSAL_MAPPED : TR_NAT_TRAVERSAL_UNMAPPED; break;
|
|
|
|
case TR_NATPMP_DISCOVER: ret = TR_NAT_TRAVERSAL_UNMAPPED; break;
|
|
|
|
case TR_NATPMP_RECV_PUB:
|
|
|
|
case TR_NATPMP_SEND_MAP:
|
|
|
|
case TR_NATPMP_RECV_MAP: ret = TR_NAT_TRAVERSAL_MAPPING; break;
|
|
|
|
case TR_NATPMP_SEND_UNMAP:
|
|
|
|
case TR_NATPMP_RECV_UNMAP: ret = TR_NAT_TRAVERSAL_UNMAPPING; break;
|
|
|
|
default: ret = TR_NAT_TRAVERSAL_ERROR; break;
|
|
|
|
}
|
2007-12-08 19:34:15 +00:00
|
|
|
return ret;
|
2006-09-25 18:37:45 +00:00
|
|
|
}
|