Welcome to mirror list, hosted at ThFree Co, Russian Federation.

github.com/SoftEtherVPN/SoftEtherVPN_Stable.git - Unnamed repository; edit this file 'description' to name the repository.
summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
Diffstat (limited to 'src/Cedar/DDNS.c')
-rw-r--r--src/Cedar/DDNS.c984
1 files changed, 984 insertions, 0 deletions
diff --git a/src/Cedar/DDNS.c b/src/Cedar/DDNS.c
new file mode 100644
index 00000000..a74bb7a3
--- /dev/null
+++ b/src/Cedar/DDNS.c
@@ -0,0 +1,984 @@
+// SoftEther VPN Source Code
+// Cedar Communication Module
+//
+// SoftEther VPN Server, Client and Bridge are free software under GPLv2.
+//
+// Copyright (c) 2012-2014 Daiyuu Nobori.
+// Copyright (c) 2012-2014 SoftEther VPN Project, University of Tsukuba, Japan.
+// Copyright (c) 2012-2014 SoftEther Corporation.
+//
+// All Rights Reserved.
+//
+// http://www.softether.org/
+//
+// Author: Daiyuu Nobori
+// Comments: Tetsuo Sugiyama, Ph.D.
+//
+//
+// This program is free software; you can redistribute it and/or
+// modify it under the terms of the GNU General Public License
+// version 2 as published by the Free Software Foundation.
+//
+// This program is distributed in the hope that it will be useful,
+// but WITHOUT ANY WARRANTY; without even the implied warranty of
+// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+// GNU General Public License for more details.
+//
+// You should have received a copy of the GNU General Public License version 2
+// along with this program; if not, write to the Free Software
+// Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA.
+//
+// THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND,
+// EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF
+// MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT.
+// IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY
+// CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT,
+// TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE
+// SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.
+//
+// THE LICENSE AGREEMENT IS ATTACHED ON THE SOURCE-CODE PACKAGE
+// AS "LICENSE.TXT" FILE. READ THE TEXT FILE IN ADVANCE TO USE THE SOFTWARE.
+//
+//
+// THIS SOFTWARE IS DEVELOPED IN JAPAN, AND DISTRIBUTED FROM JAPAN,
+// UNDER JAPANESE LAWS. YOU MUST AGREE IN ADVANCE TO USE, COPY, MODIFY,
+// MERGE, PUBLISH, DISTRIBUTE, SUBLICENSE, AND/OR SELL COPIES OF THIS
+// SOFTWARE, THAT ANY JURIDICAL DISPUTES WHICH ARE CONCERNED TO THIS
+// SOFTWARE OR ITS CONTENTS, AGAINST US (SOFTETHER PROJECT, SOFTETHER
+// CORPORATION, DAIYUU NOBORI OR OTHER SUPPLIERS), OR ANY JURIDICAL
+// DISPUTES AGAINST US WHICH ARE CAUSED BY ANY KIND OF USING, COPYING,
+// MODIFYING, MERGING, PUBLISHING, DISTRIBUTING, SUBLICENSING, AND/OR
+// SELLING COPIES OF THIS SOFTWARE SHALL BE REGARDED AS BE CONSTRUED AND
+// CONTROLLED BY JAPANESE LAWS, AND YOU MUST FURTHER CONSENT TO
+// EXCLUSIVE JURISDICTION AND VENUE IN THE COURTS SITTING IN TOKYO,
+// JAPAN. YOU MUST WAIVE ALL DEFENSES OF LACK OF PERSONAL JURISDICTION
+// AND FORUM NON CONVENIENS. PROCESS MAY BE SERVED ON EITHER PARTY IN
+// THE MANNER AUTHORIZED BY APPLICABLE LAW OR COURT RULE.
+//
+// USE ONLY IN JAPAN. DO NOT USE IT IN OTHER COUNTRIES. IMPORTING THIS
+// SOFTWARE INTO OTHER COUNTRIES IS AT YOUR OWN RISK. SOME COUNTRIES
+// PROHIBIT ENCRYPTED COMMUNICATIONS. USING THIS SOFTWARE IN OTHER
+// COUNTRIES MIGHT BE RESTRICTED.
+//
+//
+// DEAR SECURITY EXPERTS
+// ---------------------
+//
+// If you find a bug or a security vulnerability please kindly inform us
+// about the problem immediately so that we can fix the security problem
+// to protect a lot of users around the world as soon as possible.
+//
+// Our e-mail address for security reports is:
+// softether-vpn-security [at] softether.org
+//
+// Please note that the above e-mail address is not a technical support
+// inquiry address. If you need technical assistance, please visit
+// http://www.softether.org/ and ask your question on the users forum.
+//
+// Thank you for your cooperation.
+
+
+// DDNS.c
+// Dynamic DNS Client
+
+#include "CedarPch.h"
+
+// Get the current status of the DDNS client
+void DCGetStatus(DDNS_CLIENT *c, DDNS_CLIENT_STATUS *st)
+{
+ // Validate arguments
+ if (c == NULL || st == NULL)
+ {
+ return;
+ }
+
+ Zero(st, sizeof(DDNS_CLIENT_STATUS));
+
+ Lock(c->Lock);
+ {
+ st->Err_IPv4 = c->Err_IPv4;
+ st->Err_IPv6 = c->Err_IPv6;
+
+ StrCpy(st->CurrentHostName, sizeof(st->CurrentHostName), c->CurrentHostName);
+ StrCpy(st->CurrentFqdn, sizeof(st->CurrentFqdn), c->CurrentFqdn);
+ StrCpy(st->DnsSuffix, sizeof(st->DnsSuffix), c->DnsSuffix);
+ StrCpy(st->CurrentIPv4, sizeof(st->CurrentIPv4), c->CurrentIPv4);
+ StrCpy(st->CurrentIPv6, sizeof(st->CurrentIPv6), c->CurrentIPv6);
+
+ StrCpy(st->CurrentAzureIp, sizeof(st->CurrentAzureIp), c->CurrentAzureIp);
+ st->CurrentAzureTimestamp = c->CurrentAzureTimestamp;
+ StrCpy(st->CurrentAzureSignature, sizeof(st->CurrentAzureSignature), c->CurrentAzureSignature);
+ StrCpy(st->AzureCertHash, sizeof(st->AzureCertHash), c->AzureCertHash);
+
+ Copy(&st->InternetSetting, &c->InternetSetting, sizeof(INTERNET_SETTING));
+ }
+ Unlock(c->Lock);
+}
+
+// Set the Internet settings
+void DCSetInternetSetting(DDNS_CLIENT *c, INTERNET_SETTING *t)
+{
+ // Validate arguments
+ if (c == NULL || t == NULL)
+ {
+ return;
+ }
+
+ Copy(&c->InternetSetting, t, sizeof(INTERNET_SETTING));
+}
+
+// Get the Internet settings
+void DCGetInternetSetting(DDNS_CLIENT *c, INTERNET_SETTING *t)
+{
+ // Validate arguments
+ if (c == NULL || t == NULL)
+ {
+ return;
+ }
+
+ Copy(t, &c->InternetSetting, sizeof(INTERNET_SETTING));
+}
+
+// Changing the host name
+UINT DCChangeHostName(DDNS_CLIENT *c, char *hostname)
+{
+ UINT ret;
+ DDNS_REGISTER_PARAM p;
+ // Validate arguments
+ if (c == NULL || hostname == NULL)
+ {
+ return ERR_INTERNAL_ERROR;
+ }
+
+ if (StrLen(hostname) > 32)
+ {
+ // The host name is too long
+ return ERR_DDNS_HOSTNAME_TOO_LONG;
+ }
+
+ Zero(&p, sizeof(p));
+
+ StrCpy(p.NewHostname, sizeof(p.NewHostname), hostname);
+
+ // Use one of IPv4 or IPv6 if it seems to be communication
+ if (c->Err_IPv4 == ERR_NO_ERROR)
+ {
+ // IPv4
+ ret = DCRegister(c, false, &p, NULL);
+ }
+ else if (c->Err_IPv6 == ERR_NO_ERROR)
+ {
+ // IPv6
+ ret = DCRegister(c, true, &p, NULL);
+ }
+ else
+ {
+ // Try both
+ ret = DCRegister(c, true, &p, NULL);
+ if (ret != ERR_NO_ERROR)
+ {
+ ret = DCRegister(c, false, &p, NULL);
+ }
+ }
+
+ if (ret == ERR_NO_ERROR)
+ {
+ DDNS_CLIENT_STATUS st;
+
+ DCGetStatus(c, &st);
+
+ SiApplyAzureConfig(c->Cedar->Server, &st);
+ }
+
+ return ret;
+}
+
+// DDNS client thread
+void DCThread(THREAD *thread, void *param)
+{
+ DDNS_CLIENT *c;
+ INTERRUPT_MANAGER *interrput;
+ UINT last_ip_hash = 0;
+ void *route_change_poller = NULL;
+ bool last_time_ip_changed = false;
+ UINT last_azure_ddns_trigger_int = 0;
+ UINT last_vgs_ddns_trigger_int = 0;
+ UINT n;
+ INTERNET_SETTING last_t;
+ // Validate arguments
+ if (thread == NULL || param == NULL)
+ {
+ return;
+ }
+
+ c = (DDNS_CLIENT *)param;
+
+ interrput = NewInterruptManager();
+
+ route_change_poller = NewRouteChange();
+ IsRouteChanged(route_change_poller);
+
+ Zero(&last_t, sizeof(last_t));
+
+ n = 0;
+
+ while (c->Halt == false)
+ {
+ UINT ip_hash = GetHostIPAddressHash32();
+ UINT interval;
+ UINT64 now = Tick64();
+ bool ip_changed = false;
+ bool azure_client_triggered = false;
+ bool internet_setting_changed = false;
+ bool vgs_server_triggered = false;
+
+
+ if (c->Cedar->Server != NULL && c->Cedar->Server->AzureClient != NULL)
+ {
+ if (c->Cedar->Server->AzureClient->DDnsTriggerInt != last_azure_ddns_trigger_int)
+ {
+ azure_client_triggered = true;
+ last_azure_ddns_trigger_int = c->Cedar->Server->AzureClient->DDnsTriggerInt;
+ last_time_ip_changed = false;
+ Debug("DDNS Thread Triggered by AzureClient.\n");
+ }
+ }
+
+ if (Cmp(&last_t, &c->InternetSetting, sizeof(INTERNET_SETTING)) != 0)
+ {
+ Copy(&last_t, &c->InternetSetting, sizeof(INTERNET_SETTING));
+ internet_setting_changed = true;
+ last_time_ip_changed = false;
+ }
+
+ if (ip_hash != last_ip_hash)
+ {
+ last_time_ip_changed = false;
+ Debug("DDNS Thread Triggered by IP Hash Changed.\n");
+ }
+
+ if ((ip_hash != last_ip_hash) || (IsRouteChanged(route_change_poller)) || azure_client_triggered || internet_setting_changed || vgs_server_triggered)
+ {
+ if (last_time_ip_changed == false)
+ {
+ // Call all getting functions from the beginning if the routing
+ // table or the IP address of this host has changed
+ c->NextRegisterTick_IPv4 = 0;
+ c->NextRegisterTick_IPv6 = 0;
+ c->NextGetMyIpTick_IPv4 = 0;
+ c->NextGetMyIpTick_IPv6 = 0;
+
+ last_ip_hash = ip_hash;
+
+ last_time_ip_changed = true;
+
+ ip_changed = true;
+
+ Debug("DDNS Internet Condition Changed.\n");
+ }
+ }
+ else
+ {
+ last_time_ip_changed = false;
+ }
+
+ if ((n++) >= 1)
+ {
+ // Self IPv4 address acquisition
+ if (c->NextGetMyIpTick_IPv4 == 0 || now >= c->NextGetMyIpTick_IPv4)
+ {
+ UINT next_interval;
+ char ip[MAX_SIZE];
+
+ Zero(ip, sizeof(ip));
+ c->Err_IPv4_GetMyIp = DCGetMyIp(c, false, ip, sizeof(ip), NULL);
+
+ if (c->Err_IPv4_GetMyIp == ERR_NO_ERROR)
+ {
+ if (StrCmpi(c->LastMyIPv4, ip) != 0)
+ {
+ ip_changed = true;
+ StrCpy(c->LastMyIPv4, sizeof(c->LastMyIPv4), ip);
+ }
+
+ next_interval = GenRandInterval(DDNS_GETMYIP_INTERVAL_OK_MIN, DDNS_GETMYIP_INTERVAL_OK_MAX);
+ }
+ else
+ {
+ if (IsEmptyStr(c->LastMyIPv4) == false)
+ {
+ ip_changed = true;
+ }
+
+ Zero(c->LastMyIPv4, sizeof(c->LastMyIPv4));
+ next_interval = GenRandInterval(DDNS_GETMYIP_INTERVAL_NG_MIN, DDNS_GETMYIP_INTERVAL_NG_MAX);
+ }
+
+ c->NextGetMyIpTick_IPv4 = Tick64() + (UINT64)next_interval;
+
+ AddInterrupt(interrput, c->NextGetMyIpTick_IPv4);
+ }
+
+ // Self IPv6 address acquisition
+ if (c->NextGetMyIpTick_IPv6 == 0 || now >= c->NextGetMyIpTick_IPv6)
+ {
+ UINT next_interval;
+ char ip[MAX_SIZE];
+
+ Zero(ip, sizeof(ip));
+ c->Err_IPv6_GetMyIp = DCGetMyIp(c, true, ip, sizeof(ip), NULL);
+
+ if (c->Err_IPv6_GetMyIp == ERR_NO_ERROR)
+ {
+ if (StrCmpi(c->LastMyIPv6, ip) != 0)
+ {
+ ip_changed = true;
+ StrCpy(c->LastMyIPv6, sizeof(c->LastMyIPv6), ip);
+ }
+
+ next_interval = GenRandInterval(DDNS_GETMYIP_INTERVAL_OK_MIN, DDNS_GETMYIP_INTERVAL_OK_MAX);
+ }
+ else
+ {
+ if (IsEmptyStr(c->LastMyIPv6) == false)
+ {
+ ip_changed = true;
+ }
+
+ Zero(c->LastMyIPv6, sizeof(c->LastMyIPv6));
+ next_interval = GenRandInterval(DDNS_GETMYIP_INTERVAL_NG_MIN, DDNS_GETMYIP_INTERVAL_NG_MAX);
+ }
+
+ c->NextGetMyIpTick_IPv6 = Tick64() + (UINT64)next_interval;
+
+ AddInterrupt(interrput, c->NextGetMyIpTick_IPv6);
+ }
+ }
+
+ if (ip_changed)
+ {
+ c->NextRegisterTick_IPv4 = 0;
+ c->NextRegisterTick_IPv6 = 0;
+ }
+
+ // IPv4 host registration
+ if (c->NextRegisterTick_IPv4 == 0 || now >= c->NextRegisterTick_IPv4)
+ {
+ UINT next_interval;
+
+ c->Err_IPv4 = DCRegister(c, false, NULL, NULL);
+
+ if (c->Err_IPv4 == ERR_NO_ERROR)
+ {
+ next_interval = GenRandInterval(DDNS_REGISTER_INTERVAL_OK_MIN, DDNS_REGISTER_INTERVAL_OK_MAX);
+ }
+ else
+ {
+ next_interval = GenRandInterval(DDNS_REGISTER_INTERVAL_NG_MIN, DDNS_REGISTER_INTERVAL_NG_MAX);
+ }
+ //next_interval = 0;
+
+ c->NextRegisterTick_IPv4 = Tick64() + (UINT64)next_interval;
+
+ if (true)
+ {
+ DDNS_CLIENT_STATUS st;
+
+ DCGetStatus(c, &st);
+
+ SiApplyAzureConfig(c->Cedar->Server, &st);
+ }
+
+ AddInterrupt(interrput, c->NextRegisterTick_IPv4);
+ }
+
+ if (c->Halt)
+ {
+ break;
+ }
+
+ // IPv6 host registration
+ if (c->NextRegisterTick_IPv6 == 0 || now >= c->NextRegisterTick_IPv6)
+ {
+ UINT next_interval;
+
+ c->Err_IPv6 = DCRegister(c, true, NULL, NULL);
+
+ if (c->Err_IPv6 == ERR_NO_ERROR)
+ {
+ next_interval = GenRandInterval(DDNS_REGISTER_INTERVAL_OK_MIN, DDNS_REGISTER_INTERVAL_OK_MAX);
+ }
+ else
+ {
+ next_interval = GenRandInterval(DDNS_REGISTER_INTERVAL_NG_MIN, DDNS_REGISTER_INTERVAL_NG_MAX);
+ }
+
+ c->NextRegisterTick_IPv6 = Tick64() + (UINT64)next_interval;
+
+ if (true)
+ {
+ DDNS_CLIENT_STATUS st;
+
+ DCGetStatus(c, &st);
+
+ SiApplyAzureConfig(c->Cedar->Server, &st);
+ }
+
+ AddInterrupt(interrput, c->NextRegisterTick_IPv6);
+ }
+
+ interval = GetNextIntervalForInterrupt(interrput);
+ interval = MIN(interval, 1234);
+
+ if (n == 1)
+ {
+ interval = MIN(interval, 0);
+ }
+
+ if (c->Halt)
+ {
+ break;
+ }
+
+ if (c->KeyChanged)
+ {
+ c->KeyChanged = false;
+ c->NextRegisterTick_IPv4 = c->NextRegisterTick_IPv6 = 0;
+
+ interval = 0;
+ }
+
+ if (last_time_ip_changed)
+ {
+ if (c->Cedar->Server != NULL && c->Cedar->Server->AzureClient != NULL)
+ {
+ c->Cedar->Server->AzureClient->IpStatusRevision++;
+ }
+ }
+
+ Wait(c->Event, interval);
+ }
+
+ FreeRouteChange(route_change_poller);
+ FreeInterruptManager(interrput);
+}
+
+// Command to update immediately
+void DCUpdateNow(DDNS_CLIENT *c)
+{
+ // Validate arguments
+ if (c == NULL)
+ {
+ return;
+ }
+
+ c->NextRegisterTick_IPv4 = c->NextRegisterTick_IPv6 = 0;
+
+ Set(c->Event);
+}
+
+// Execution of registration
+UINT DCRegister(DDNS_CLIENT *c, bool ipv6, DDNS_REGISTER_PARAM *p, char *replace_v6)
+{
+ char *url;
+ char url2[MAX_SIZE];
+ char url3[MAX_SIZE];
+ PACK *req, *ret;
+ char key_str[MAX_SIZE];
+ UCHAR machine_key[SHA1_SIZE];
+ char machine_key_str[MAX_SIZE];
+ char machine_name[MAX_SIZE];
+ BUF *cert_hash;
+ UINT err = ERR_INTERNAL_ERROR;
+ UCHAR key_hash[SHA1_SIZE];
+ char key_hash_str[MAX_SIZE];
+ bool use_azure = false;
+ char current_azure_ip[MAX_SIZE];
+ INTERNET_SETTING t;
+ UINT build = 0;
+ bool use_https = false;
+ bool use_vgs = false;
+ // Validate arguments
+ if (c == NULL)
+ {
+ return ERR_INTERNAL_ERROR;
+ }
+
+ Zero(current_azure_ip, sizeof(current_azure_ip));
+
+ GetCurrentMachineIpProcessHash(machine_key);
+ BinToStr(machine_key_str, sizeof(machine_key_str), machine_key, sizeof(machine_key));
+
+ GetMachineHostName(machine_name, sizeof(machine_name));
+ StrLower(machine_name);
+
+ if (ipv6 == false)
+ {
+ url = DDNS_URL_V4_GLOBAL;
+
+ if (IsUseAlternativeHostname())
+ {
+ url = DDNS_URL_V4_ALT;
+ }
+ }
+ else
+ {
+ url = DDNS_URL_V6_GLOBAL;
+
+ if (IsUseAlternativeHostname())
+ {
+ url = DDNS_URL_V6_ALT;
+ }
+
+ if (replace_v6)
+ {
+ url = replace_v6;
+ }
+ }
+
+ Zero(&t, sizeof(t));
+ if (ipv6 == false)
+ {
+ // Proxy Setting
+ Copy(&t, &c->InternetSetting, sizeof(INTERNET_SETTING));
+ }
+
+ if (ipv6 == false)
+ {
+ // Get the current status of the VPN Azure Client
+ if (c->Cedar->Server != NULL)
+ {
+ AZURE_CLIENT *ac = c->Cedar->Server->AzureClient;
+
+ if (ac != NULL)
+ {
+ use_azure = SiIsAzureEnabled(c->Cedar->Server);
+
+ if (use_azure)
+ {
+ Lock(ac->Lock);
+ {
+ StrCpy(current_azure_ip, sizeof(current_azure_ip), ac->ConnectingAzureIp);
+ }
+ Unlock(ac->Lock);
+ }
+ }
+ }
+ }
+
+ req = NewPack();
+ BinToStr(key_str, sizeof(key_str), c->Key, sizeof(c->Key));
+ StrUpper(key_str);
+ PackAddStr(req, "key", key_str);
+
+ // Build Number
+ build = c->Cedar->Build;
+
+
+ PackAddInt(req, "build", build);
+ PackAddInt(req, "osinfo", GetOsInfo()->OsType);
+ PackAddInt(req, "is_64bit", Is64());
+#ifdef OS_WIN32
+ PackAddInt(req, "is_windows_64bit", MsIs64BitWindows());
+#endif // OS_WIN32
+ PackAddBool(req, "is_softether", true);
+ PackAddBool(req, "is_packetix", false);
+ PackAddStr(req, "machine_key", machine_key_str);
+ PackAddStr(req, "machine_name", machine_name);
+ PackAddInt(req, "lasterror_ipv4", c->Err_IPv4_GetMyIp);
+ PackAddInt(req, "lasterror_ipv6", c->Err_IPv6_GetMyIp);
+ PackAddBool(req, "use_azure", use_azure);
+ PackAddStr(req, "product_str", CEDAR_PRODUCT_STR);
+ PackAddInt(req, "ddns_protocol_version", DDNS_VERSION);
+
+
+ if (use_azure)
+ {
+ Debug("current_azure_ip = %s\n", current_azure_ip);
+ PackAddStr(req, "current_azure_ip", current_azure_ip);
+ }
+
+ HashSha1(key_hash, key_str, StrLen(key_str));
+ BinToStr(key_hash_str, sizeof(key_hash_str), key_hash, sizeof(key_hash));
+ StrLower(key_hash_str);
+
+ if (p != NULL)
+ {
+ if (IsEmptyStr(p->NewHostname) == false)
+ {
+ PackAddStr(req, "new_hostname", p->NewHostname);
+ }
+ }
+
+
+
+ cert_hash = StrToBin(DDNS_CERT_HASH);
+
+ Format(url2, sizeof(url2), "%s?v=%I64u", url, Rand64());
+ Format(url3, sizeof(url3), url2, key_hash_str[0], key_hash_str[1], key_hash_str[2], key_hash_str[3]);
+
+ if (use_https == false)
+ {
+ ReplaceStr(url3, sizeof(url3), url3, "https://", "http://");
+ }
+
+ ReplaceStr(url3, sizeof(url3), url3, ".servers", ".open.servers");
+
+ Debug("WpcCall: %s\n", url3);
+ ret = WpcCallEx(url3, &t, DDNS_CONNECT_TIMEOUT, DDNS_COMM_TIMEOUT, "register", req,
+ NULL, NULL, ((cert_hash != NULL && cert_hash->Size == SHA1_SIZE) ? cert_hash->Buf : NULL), NULL, DDNS_RPC_MAX_RECV_SIZE);
+ Debug("WpcCall Ret: %u\n", ret);
+
+ FreeBuf(cert_hash);
+
+ FreePack(req);
+
+ err = GetErrorFromPack(ret);
+
+ ExtractAndApplyDynList(ret);
+
+ // Status update
+ Lock(c->Lock);
+ {
+ if (err == ERR_NO_ERROR)
+ {
+ char snat_t[MAX_SIZE];
+
+ // Current host name
+ PackGetStr(ret, "current_hostname", c->CurrentHostName, sizeof(c->CurrentHostName));
+ PackGetStr(ret, "current_fqdn", c->CurrentFqdn, sizeof(c->CurrentFqdn));
+ PackGetStr(ret, "current_ipv4", c->CurrentIPv4, sizeof(c->CurrentIPv4));
+ PackGetStr(ret, "current_ipv6", c->CurrentIPv6, sizeof(c->CurrentIPv6));
+ PackGetStr(ret, "dns_suffix", c->DnsSuffix, sizeof(c->DnsSuffix));
+
+ // SecureNAT connectivity check parameters
+ Zero(snat_t, sizeof(snat_t));
+ PackGetStr(ret, "snat_t", snat_t, sizeof(snat_t));
+ NnSetSecureNatTargetHostname(snat_t);
+
+ if (ipv6 == false)
+ {
+ char cert_hash[MAX_SIZE];
+
+ PackGetStr(ret, "current_azure_ip", c->CurrentAzureIp, sizeof(c->CurrentAzureIp));
+ c->CurrentAzureTimestamp = PackGetInt64(ret, "current_azure_timestamp");
+ PackGetStr(ret, "current_azure_signature", c->CurrentAzureSignature, sizeof(c->CurrentAzureSignature));
+
+ Zero(cert_hash, sizeof(cert_hash));
+ PackGetStr(ret, "azure_cert_hash", cert_hash, sizeof(cert_hash));
+
+ if (IsEmptyStr(cert_hash) == false)
+ {
+ StrCpy(c->AzureCertHash, sizeof(c->AzureCertHash), cert_hash);
+ }
+ }
+
+ StrCpy(c->Cedar->CurrentDDnsFqdn, sizeof(c->Cedar->CurrentDDnsFqdn), c->CurrentFqdn);
+
+ Debug("current_hostname=%s, current_fqdn=%s, current_ipv4=%s, current_ipv6=%s, current_azure_ip=%s, CurrentAzureTimestamp=%I64u, CurrentAzureSignature=%s, CertHash=%s\n",
+ c->CurrentHostName, c->CurrentFqdn,
+ c->CurrentIPv4, c->CurrentIPv6,
+ c->CurrentAzureIp, c->CurrentAzureTimestamp, c->CurrentAzureSignature, c->AzureCertHash);
+ }
+ }
+ Unlock(c->Lock);
+
+ if (IsEmptyStr(c->CurrentFqdn) == false)
+ {
+ SetCurrentDDnsFqdn(c->CurrentFqdn);
+ }
+
+
+ FreePack(ret);
+
+ UniDebug(L"DCRegister Error: %s\n", _E(err));
+
+ if (err == ERR_DUPLICATE_DDNS_KEY)
+ {
+ // Key duplication
+ DCGenNewKey(c->Key);
+ c->KeyChanged = true;
+ }
+
+ if (err == ERR_DISCONNECTED)
+ {
+ err = ERR_DDNS_DISCONNECTED;
+ }
+
+ if (IsUseAlternativeHostname() == false)
+ {
+ if (err == ERR_CONNECT_FAILED)
+ {
+ if (ipv6 && replace_v6 == NULL)
+ {
+ UINT type = DetectFletsType();
+
+ if (type & FLETS_DETECT_TYPE_EAST_BFLETS_PRIVATE && err != ERR_NO_ERROR)
+ {
+ err = DCRegister(c, ipv6, p, DDNS_REPLACE_URL_FOR_EAST_BFLETS);
+ }
+
+ if (type & FLETS_DETECT_TYPE_EAST_NGN_PRIVATE && err != ERR_NO_ERROR)
+ {
+ err = DCRegister(c, ipv6, p, DDNS_REPLACE_URL_FOR_EAST_NGN);
+ }
+
+ if (type & FLETS_DETECT_TYPE_WEST_NGN_PRIVATE && err != ERR_NO_ERROR)
+ {
+ err = DCRegister(c, ipv6, p, DDNS_REPLACE_URL_FOR_WEST_NGN);
+ }
+ }
+ }
+ }
+
+ return err;
+}
+
+// Get the self IP address
+UINT DCGetMyIp(DDNS_CLIENT *c, bool ipv6, char *dst, UINT dst_size, char *replace_v6)
+{
+ UINT ret = ERR_INTERNAL_ERROR;
+
+ ret = DCGetMyIpMain(c, ipv6, dst, dst_size, false, replace_v6);
+
+
+ if (ret == ERR_NO_ERROR)
+ {
+ IP ip;
+
+ if (StrToIP(&ip, dst))
+ {
+ if (ipv6 == false && IsIP4(&ip))
+ {
+ SetCurrentGlobalIP(&ip, false);
+ }
+ else if (ipv6 && IsIP6(&ip))
+ {
+ SetCurrentGlobalIP(&ip, true);
+ }
+ }
+ }
+
+ return ret;
+}
+UINT DCGetMyIpMain(DDNS_CLIENT *c, bool ipv6, char *dst, UINT dst_size, bool use_ssl, char *replace_v6)
+{
+ char *url;
+ char url2[MAX_SIZE];
+ UINT ret = ERR_INTERNAL_ERROR;
+ URL_DATA data;
+ BUF *recv;
+ BUF *cert_hash;
+ // Validate arguments
+ if (dst == NULL || c == NULL)
+ {
+ return ERR_INTERNAL_ERROR;
+ }
+
+ if (ipv6 == false)
+ {
+ url = DDNS_URL2_V4_GLOBAL;
+
+ if (IsUseAlternativeHostname())
+ {
+ url = DDNS_URL2_V4_ALT;
+ }
+ }
+ else
+ {
+ url = DDNS_URL2_V6_GLOBAL;
+
+ if (IsUseAlternativeHostname())
+ {
+ url = DDNS_URL2_V6_ALT;
+ }
+
+ if (replace_v6)
+ {
+ url = replace_v6;
+ }
+ }
+
+ Format(url2, sizeof(url2), "%s?v=%I64u", url, Rand64());
+
+ if (use_ssl)
+ {
+ ReplaceStr(url2, sizeof(url2), url2, "http://", "https://");
+ }
+
+ if (ParseUrl(&data, url2, false, NULL) == false)
+ {
+ return ERR_INTERNAL_ERROR;
+ }
+
+ cert_hash = StrToBin(DDNS_CERT_HASH);
+
+ recv = HttpRequest(&data, (ipv6 ? NULL : &c->InternetSetting), DDNS_CONNECT_TIMEOUT, DDNS_COMM_TIMEOUT, &ret, false, NULL, NULL,
+ NULL, ((cert_hash != NULL && cert_hash->Size == SHA1_SIZE) ? cert_hash->Buf : NULL));
+
+ FreeBuf(cert_hash);
+
+ if (recv != NULL)
+ {
+ char *str = ZeroMalloc(recv->Size + 1);
+ Copy(str, recv->Buf, recv->Size);
+
+ if (StartWith(str, "IP=") == false)
+ {
+ ret = ERR_PROTOCOL_ERROR;
+ }
+ else
+ {
+ StrCpy(dst, dst_size, str + 3);
+ ret = ERR_NO_ERROR;
+ }
+
+ Free(str);
+ FreeBuf(recv);
+ }
+
+ if (IsUseAlternativeHostname() == false)
+ {
+ if (ret == ERR_CONNECT_FAILED)
+ {
+ if (ipv6 && replace_v6 == NULL && use_ssl == false)
+ {
+ UINT type = DetectFletsType();
+
+ if (type & FLETS_DETECT_TYPE_EAST_BFLETS_PRIVATE && ret != ERR_NO_ERROR)
+ {
+ ret = DCGetMyIpMain(c, ipv6, dst, dst_size, use_ssl, DDNS_REPLACE_URL2_FOR_EAST_BFLETS);
+ }
+
+ if (type & FLETS_DETECT_TYPE_EAST_NGN_PRIVATE && ret != ERR_NO_ERROR)
+ {
+ ret = DCGetMyIpMain(c, ipv6, dst, dst_size, use_ssl, DDNS_REPLACE_URL2_FOR_EAST_NGN);
+ }
+
+ if (type & FLETS_DETECT_TYPE_WEST_NGN_PRIVATE && ret != ERR_NO_ERROR)
+ {
+ ret = DCGetMyIpMain(c, ipv6, dst, dst_size, use_ssl, DDNS_REPLACE_URL2_FOR_WEST_NGN);
+ }
+ }
+ }
+ }
+
+ return ret;
+}
+
+// Creating a DDNS client
+DDNS_CLIENT *NewDDNSClient(CEDAR *cedar, UCHAR *key, INTERNET_SETTING *t)
+{
+ DDNS_CLIENT *c;
+ UCHAR key_hash[SHA1_SIZE];
+ // Validate arguments
+ if (cedar == NULL)
+ {
+ return NULL;
+ }
+
+ c = ZeroMalloc(sizeof(DDNS_CLIENT));
+ c->Cedar = cedar;
+ AddRef(c->Cedar->ref);
+
+ c->Err_IPv4 = c->Err_IPv6 = ERR_TRYING_TO_CONNECT;
+
+ if (key == NULL)
+ {
+ // Create a new key
+ DCGenNewKey(c->Key);
+ }
+ else
+ {
+ // Set the key
+ Copy(c->Key, key, SHA1_SIZE);
+ }
+
+ HashSha1(key_hash, c->Key, sizeof(c->Key));
+
+
+ if (t != NULL)
+ {
+ Copy(&c->InternetSetting, t, sizeof(INTERNET_SETTING));
+ }
+
+ c->Lock = NewLock();
+
+ // Thread creation
+ c->Event = NewEvent();
+ c->Thread = NewThread(DCThread, c);
+
+ return c;
+}
+
+// Release of DDNS client
+void FreeDDNSClient(DDNS_CLIENT *c)
+{
+ // Validate arguments
+ if (c == NULL)
+ {
+ return;
+ }
+
+ // Stop the thread
+ c->Halt = true;
+ Set(c->Event);
+
+ WaitThread(c->Thread, INFINITE);
+ ReleaseThread(c->Thread);
+
+ ReleaseEvent(c->Event);
+
+ ReleaseCedar(c->Cedar);
+ DeleteLock(c->Lock);
+
+ Free(c);
+}
+
+// Create a new key
+void DCGenNewKey(UCHAR *key)
+{
+ BUF *b;
+ UINT64 tick;
+ UCHAR hash[SHA1_SIZE];
+ UCHAR rand[SHA1_SIZE];
+ UINT i;
+ // Validate arguments
+ if (key == NULL)
+ {
+ return;
+ }
+
+ b = NewBuf();
+
+ Rand(rand, sizeof(rand));
+ WriteBuf(b, rand, sizeof(rand));
+
+ tick = TickHighres64();
+ WriteBufInt64(b, tick);
+
+ tick = Tick64();
+ WriteBufInt64(b, tick);
+
+ tick = SystemTime64();
+ WriteBufInt64(b, tick);
+
+ GetCurrentMachineIpProcessHash(hash);
+ WriteBuf(b, hash, sizeof(hash));
+
+ HashSha1(key, b->Buf, b->Size);
+ Rand(rand, sizeof(rand));
+
+ for (i = 0;i < SHA1_SIZE;i++)
+ {
+ key[i] = key[i] ^ rand[i];
+ }
+
+ FreeBuf(b);
+}
+
+
+
+// Developed by SoftEther VPN Project at University of Tsukuba in Japan.
+// Department of Computer Science has dozens of overly-enthusiastic geeks.
+// Join us: http://www.tsukuba.ac.jp/english/admission/