xref: /freebsd/contrib/pf/tftp-proxy/tftp-proxy.c (revision 67ecd4f3a477a0ca5b76a1694f89755df27a8679)
167ecd4f3SMax Laier /* $OpenBSD: tftp-proxy.c,v 1.2 2006/12/20 03:33:38 joel Exp $
267ecd4f3SMax Laier  *
367ecd4f3SMax Laier  * Copyright (c) 2005 DLS Internet Services
467ecd4f3SMax Laier  * Copyright (c) 2004, 2005 Camiel Dobbelaar, <cd@sentia.nl>
567ecd4f3SMax Laier  *
667ecd4f3SMax Laier  * Redistribution and use in source and binary forms, with or without
767ecd4f3SMax Laier  * modification, are permitted provided that the following conditions
867ecd4f3SMax Laier  * are met:
967ecd4f3SMax Laier  *
1067ecd4f3SMax Laier  * 1. Redistributions of source code must retain the above copyright
1167ecd4f3SMax Laier  *    notice, this list of conditions and the following disclaimer.
1267ecd4f3SMax Laier  * 2. Redistributions in binary form must reproduce the above copyright
1367ecd4f3SMax Laier  *    notice, this list of conditions and the following disclaimer in the
1467ecd4f3SMax Laier  *    documentation and/or other materials provided with the distribution.
1567ecd4f3SMax Laier  * 3. The name of the author may not be used to endorse or promote products
1667ecd4f3SMax Laier  *    derived from this software without specific prior written permission.
1767ecd4f3SMax Laier  *
1867ecd4f3SMax Laier  * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
1967ecd4f3SMax Laier  * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
2067ecd4f3SMax Laier  * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
2167ecd4f3SMax Laier  * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
2267ecd4f3SMax Laier  * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
2367ecd4f3SMax Laier  * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
2467ecd4f3SMax Laier  * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
2567ecd4f3SMax Laier  * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
2667ecd4f3SMax Laier  * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
2767ecd4f3SMax Laier  * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
2867ecd4f3SMax Laier  */
2967ecd4f3SMax Laier 
3067ecd4f3SMax Laier #include <sys/types.h>
3167ecd4f3SMax Laier #include <sys/ioctl.h>
3267ecd4f3SMax Laier #include <sys/uio.h>
3367ecd4f3SMax Laier #include <unistd.h>
3467ecd4f3SMax Laier 
3567ecd4f3SMax Laier #include <netinet/in.h>
3667ecd4f3SMax Laier #include <arpa/inet.h>
3767ecd4f3SMax Laier #include <arpa/tftp.h>
3867ecd4f3SMax Laier #include <sys/socket.h>
3967ecd4f3SMax Laier #include <net/if.h>
4067ecd4f3SMax Laier #include <net/pfvar.h>
4167ecd4f3SMax Laier 
4267ecd4f3SMax Laier #include <errno.h>
4367ecd4f3SMax Laier #include <pwd.h>
4467ecd4f3SMax Laier #include <stdio.h>
4567ecd4f3SMax Laier #include <syslog.h>
4667ecd4f3SMax Laier #include <string.h>
4767ecd4f3SMax Laier #include <stdlib.h>
4867ecd4f3SMax Laier 
4967ecd4f3SMax Laier #include "filter.h"
5067ecd4f3SMax Laier 
5167ecd4f3SMax Laier #define CHROOT_DIR	"/var/empty"
5267ecd4f3SMax Laier #define NOPRIV_USER	"proxy"
5367ecd4f3SMax Laier 
5467ecd4f3SMax Laier #define PF_NAT_PROXY_PORT_LOW	50001
5567ecd4f3SMax Laier #define PF_NAT_PROXY_PORT_HIGH	65535
5667ecd4f3SMax Laier 
5767ecd4f3SMax Laier #define DEFTRANSWAIT	2
5867ecd4f3SMax Laier #define NTOP_BUFS	4
5967ecd4f3SMax Laier #define PKTSIZE		SEGSIZE+4
6067ecd4f3SMax Laier 
6167ecd4f3SMax Laier const char *opcode(int);
6267ecd4f3SMax Laier const char *sock_ntop(struct sockaddr *);
6367ecd4f3SMax Laier u_int16_t pick_proxy_port(void);
6467ecd4f3SMax Laier static void usage(void);
6567ecd4f3SMax Laier 
6667ecd4f3SMax Laier extern	char *__progname;
6767ecd4f3SMax Laier char	ntop_buf[NTOP_BUFS][INET6_ADDRSTRLEN];
6867ecd4f3SMax Laier int	verbose = 0;
6967ecd4f3SMax Laier 
7067ecd4f3SMax Laier int
main(int argc,char * argv[])7167ecd4f3SMax Laier main(int argc, char *argv[])
7267ecd4f3SMax Laier {
7367ecd4f3SMax Laier 	int c, fd = 0, on = 1, out_fd = 0, peer, reqsize = 0;
7467ecd4f3SMax Laier 	int transwait = DEFTRANSWAIT;
7567ecd4f3SMax Laier 	char *p;
7667ecd4f3SMax Laier 	struct tftphdr *tp;
7767ecd4f3SMax Laier 	struct passwd *pw;
7867ecd4f3SMax Laier 
7967ecd4f3SMax Laier 	char cbuf[CMSG_SPACE(sizeof(struct sockaddr_storage))];
8067ecd4f3SMax Laier 	char req[PKTSIZE];
8167ecd4f3SMax Laier 	struct cmsghdr *cmsg;
8267ecd4f3SMax Laier 	struct msghdr msg;
8367ecd4f3SMax Laier 	struct iovec iov;
8467ecd4f3SMax Laier 
8567ecd4f3SMax Laier 	struct sockaddr_storage from, proxy, server, proxy_to_server, s_in;
8667ecd4f3SMax Laier 	struct sockaddr_in sock_out;
8767ecd4f3SMax Laier 	socklen_t j;
8867ecd4f3SMax Laier 	in_port_t bindport;
8967ecd4f3SMax Laier 
9067ecd4f3SMax Laier 	openlog(__progname, LOG_PID | LOG_NDELAY, LOG_DAEMON);
9167ecd4f3SMax Laier 
9267ecd4f3SMax Laier 	while ((c = getopt(argc, argv, "vw:")) != -1)
9367ecd4f3SMax Laier 		switch (c) {
9467ecd4f3SMax Laier 		case 'v':
9567ecd4f3SMax Laier 			verbose++;
9667ecd4f3SMax Laier 			break;
9767ecd4f3SMax Laier 		case 'w':
9867ecd4f3SMax Laier 			transwait = strtoll(optarg, &p, 10);
9967ecd4f3SMax Laier 			if (transwait < 1) {
10067ecd4f3SMax Laier 				syslog(LOG_ERR, "invalid -w value");
10167ecd4f3SMax Laier 				exit(1);
10267ecd4f3SMax Laier 			}
10367ecd4f3SMax Laier 			break;
10467ecd4f3SMax Laier 		default:
10567ecd4f3SMax Laier 			usage();
10667ecd4f3SMax Laier 			break;
10767ecd4f3SMax Laier 		}
10867ecd4f3SMax Laier 
10967ecd4f3SMax Laier 	/* open /dev/pf */
11067ecd4f3SMax Laier 	init_filter(NULL, verbose);
11167ecd4f3SMax Laier 
11267ecd4f3SMax Laier 	tzset();
11367ecd4f3SMax Laier 
11467ecd4f3SMax Laier 	pw = getpwnam(NOPRIV_USER);
11567ecd4f3SMax Laier 	if (!pw) {
11667ecd4f3SMax Laier 		syslog(LOG_ERR, "no such user %s: %m", NOPRIV_USER);
11767ecd4f3SMax Laier 		exit(1);
11867ecd4f3SMax Laier 	}
11967ecd4f3SMax Laier 	if (chroot(CHROOT_DIR) || chdir("/")) {
12067ecd4f3SMax Laier 		syslog(LOG_ERR, "chroot %s: %m", CHROOT_DIR);
12167ecd4f3SMax Laier 		exit(1);
12267ecd4f3SMax Laier 	}
12367ecd4f3SMax Laier 	if (setgroups(1, &pw->pw_gid) ||
12467ecd4f3SMax Laier 	    setresgid(pw->pw_gid, pw->pw_gid, pw->pw_gid) ||
12567ecd4f3SMax Laier 	    setresuid(pw->pw_uid, pw->pw_uid, pw->pw_uid)) {
12667ecd4f3SMax Laier 		syslog(LOG_ERR, "can't revoke privs: %m");
12767ecd4f3SMax Laier 		exit(1);
12867ecd4f3SMax Laier 	}
12967ecd4f3SMax Laier 
13067ecd4f3SMax Laier 	/* non-blocking io */
13167ecd4f3SMax Laier 	if (ioctl(fd, FIONBIO, &on) < 0) {
13267ecd4f3SMax Laier 		syslog(LOG_ERR, "ioctl(FIONBIO): %m");
13367ecd4f3SMax Laier 		exit(1);
13467ecd4f3SMax Laier 	}
13567ecd4f3SMax Laier 
13667ecd4f3SMax Laier 	if (setsockopt(fd, IPPROTO_IP, IP_RECVDSTADDR, &on, sizeof(on)) == -1) {
13767ecd4f3SMax Laier 		syslog(LOG_ERR, "setsockopt(IP_RECVDSTADDR): %m");
13867ecd4f3SMax Laier 		exit(1);
13967ecd4f3SMax Laier 	}
14067ecd4f3SMax Laier 
14167ecd4f3SMax Laier 	j = sizeof(s_in);
14267ecd4f3SMax Laier 	if (getsockname(fd, (struct sockaddr *)&s_in, &j) == -1) {
14367ecd4f3SMax Laier 		syslog(LOG_ERR, "getsockname: %m");
14467ecd4f3SMax Laier 		exit(1);
14567ecd4f3SMax Laier 	}
14667ecd4f3SMax Laier 
14767ecd4f3SMax Laier 	bindport = ((struct sockaddr_in *)&s_in)->sin_port;
14867ecd4f3SMax Laier 
14967ecd4f3SMax Laier 	/* req will be pushed back out at the end, unchanged */
15067ecd4f3SMax Laier 	j = sizeof(from);
15167ecd4f3SMax Laier 	if ((reqsize = recvfrom(fd, req, sizeof(req), MSG_PEEK,
15267ecd4f3SMax Laier 	    (struct sockaddr *)&from, &j)) < 0) {
15367ecd4f3SMax Laier 		syslog(LOG_ERR, "recvfrom: %m");
15467ecd4f3SMax Laier 		exit(1);
15567ecd4f3SMax Laier 	}
15667ecd4f3SMax Laier 
15767ecd4f3SMax Laier 	bzero(&msg, sizeof(msg));
15867ecd4f3SMax Laier 	iov.iov_base = req;
15967ecd4f3SMax Laier 	iov.iov_len = sizeof(req);
16067ecd4f3SMax Laier 	msg.msg_name = &from;
16167ecd4f3SMax Laier 	msg.msg_namelen = sizeof(from);
16267ecd4f3SMax Laier 	msg.msg_iov = &iov;
16367ecd4f3SMax Laier 	msg.msg_iovlen = 1;
16467ecd4f3SMax Laier 	msg.msg_control = cbuf;
16567ecd4f3SMax Laier 	msg.msg_controllen = CMSG_LEN(sizeof(struct sockaddr_storage));
16667ecd4f3SMax Laier 
16767ecd4f3SMax Laier 	if (recvmsg(fd, &msg, 0) < 0) {
16867ecd4f3SMax Laier 		syslog(LOG_ERR, "recvmsg: %m");
16967ecd4f3SMax Laier 		exit(1);
17067ecd4f3SMax Laier 	}
17167ecd4f3SMax Laier 
17267ecd4f3SMax Laier 	close(fd);
17367ecd4f3SMax Laier 	close(1);
17467ecd4f3SMax Laier 
17567ecd4f3SMax Laier 	peer = socket(from.ss_family, SOCK_DGRAM, 0);
17667ecd4f3SMax Laier 	if (peer < 0) {
17767ecd4f3SMax Laier 		syslog(LOG_ERR, "socket: %m");
17867ecd4f3SMax Laier 		exit(1);
17967ecd4f3SMax Laier 	}
18067ecd4f3SMax Laier 	memset(&s_in, 0, sizeof(s_in));
18167ecd4f3SMax Laier 	s_in.ss_family = from.ss_family;
18267ecd4f3SMax Laier 	s_in.ss_len = from.ss_len;
18367ecd4f3SMax Laier 
18467ecd4f3SMax Laier 	/* get local address if possible */
18567ecd4f3SMax Laier 	for (cmsg = CMSG_FIRSTHDR(&msg); cmsg != NULL;
18667ecd4f3SMax Laier 	    cmsg = CMSG_NXTHDR(&msg, cmsg)) {
18767ecd4f3SMax Laier 		if (cmsg->cmsg_level == IPPROTO_IP &&
18867ecd4f3SMax Laier 		    cmsg->cmsg_type == IP_RECVDSTADDR) {
18967ecd4f3SMax Laier 			memcpy(&((struct sockaddr_in *)&s_in)->sin_addr,
19067ecd4f3SMax Laier 			    CMSG_DATA(cmsg), sizeof(struct in_addr));
19167ecd4f3SMax Laier 			break;
19267ecd4f3SMax Laier 		}
19367ecd4f3SMax Laier 	}
19467ecd4f3SMax Laier 
19567ecd4f3SMax Laier 	if (bind(peer, (struct sockaddr *)&s_in, s_in.ss_len) < 0) {
19667ecd4f3SMax Laier 		syslog(LOG_ERR, "bind: %m");
19767ecd4f3SMax Laier 		exit(1);
19867ecd4f3SMax Laier 	}
19967ecd4f3SMax Laier 	if (connect(peer, (struct sockaddr *)&from, from.ss_len) < 0) {
20067ecd4f3SMax Laier 		syslog(LOG_ERR, "connect: %m");
20167ecd4f3SMax Laier 		exit(1);
20267ecd4f3SMax Laier 	}
20367ecd4f3SMax Laier 
20467ecd4f3SMax Laier 	tp = (struct tftphdr *)req;
20567ecd4f3SMax Laier 	if (!(ntohs(tp->th_opcode) == RRQ || ntohs(tp->th_opcode) == WRQ)) {
20667ecd4f3SMax Laier 		/* not a tftp request, bail */
20767ecd4f3SMax Laier 		if (verbose) {
20867ecd4f3SMax Laier 			syslog(LOG_WARNING, "not a valid tftp request");
20967ecd4f3SMax Laier 			exit(1);
21067ecd4f3SMax Laier 		} else
21167ecd4f3SMax Laier 			/* exit 0 so inetd doesn't log anything */
21267ecd4f3SMax Laier 			exit(0);
21367ecd4f3SMax Laier 	}
21467ecd4f3SMax Laier 
21567ecd4f3SMax Laier 	j = sizeof(struct sockaddr_storage);
21667ecd4f3SMax Laier 	if (getsockname(fd, (struct sockaddr *)&proxy, &j) == -1) {
21767ecd4f3SMax Laier 		syslog(LOG_ERR, "getsockname: %m");
21867ecd4f3SMax Laier 		exit(1);
21967ecd4f3SMax Laier 	}
22067ecd4f3SMax Laier 
22167ecd4f3SMax Laier 	((struct sockaddr_in *)&proxy)->sin_port = bindport;
22267ecd4f3SMax Laier 
22367ecd4f3SMax Laier 	/* find the un-rdr'd server and port the client wanted */
22467ecd4f3SMax Laier 	if (server_lookup((struct sockaddr *)&from,
22567ecd4f3SMax Laier 	    (struct sockaddr *)&proxy, (struct sockaddr *)&server,
22667ecd4f3SMax Laier 	    IPPROTO_UDP) != 0) {
22767ecd4f3SMax Laier 		syslog(LOG_ERR, "pf connection lookup failed (no rdr?)");
22867ecd4f3SMax Laier 		exit(1);
22967ecd4f3SMax Laier 	}
23067ecd4f3SMax Laier 
23167ecd4f3SMax Laier 	/* establish a new outbound connection to the remote server */
23267ecd4f3SMax Laier 	if ((out_fd = socket(((struct sockaddr *)&from)->sa_family,
23367ecd4f3SMax Laier 	    SOCK_DGRAM, IPPROTO_UDP)) < 0) {
23467ecd4f3SMax Laier 		syslog(LOG_ERR, "couldn't create new socket");
23567ecd4f3SMax Laier 		exit(1);
23667ecd4f3SMax Laier 	}
23767ecd4f3SMax Laier 
23867ecd4f3SMax Laier 	bzero((char *)&sock_out, sizeof(sock_out));
23967ecd4f3SMax Laier 	sock_out.sin_family = from.ss_family;
24067ecd4f3SMax Laier 	sock_out.sin_port = htons(pick_proxy_port());
24167ecd4f3SMax Laier 	if (bind(out_fd, (struct sockaddr *)&sock_out, sizeof(sock_out)) < 0) {
24267ecd4f3SMax Laier 		syslog(LOG_ERR, "couldn't bind to new socket: %m");
24367ecd4f3SMax Laier 		exit(1);
24467ecd4f3SMax Laier 	}
24567ecd4f3SMax Laier 
24667ecd4f3SMax Laier 	if (connect(out_fd, (struct sockaddr *)&server,
24767ecd4f3SMax Laier 	    ((struct sockaddr *)&server)->sa_len) < 0 && errno != EINPROGRESS) {
24867ecd4f3SMax Laier 		syslog(LOG_ERR, "couldn't connect to remote server: %m");
24967ecd4f3SMax Laier 		exit(1);
25067ecd4f3SMax Laier 	}
25167ecd4f3SMax Laier 
25267ecd4f3SMax Laier 	j = sizeof(struct sockaddr_storage);
25367ecd4f3SMax Laier 	if ((getsockname(out_fd, (struct sockaddr *)&proxy_to_server,
25467ecd4f3SMax Laier 	    &j)) < 0) {
25567ecd4f3SMax Laier 		syslog(LOG_ERR, "getsockname: %m");
25667ecd4f3SMax Laier 		exit(1);
25767ecd4f3SMax Laier 	}
25867ecd4f3SMax Laier 
25967ecd4f3SMax Laier 	if (verbose)
26067ecd4f3SMax Laier 		syslog(LOG_INFO, "%s:%d -> %s:%d/%s:%d -> %s:%d \"%s %s\"",
26167ecd4f3SMax Laier 			sock_ntop((struct sockaddr *)&from),
26267ecd4f3SMax Laier 			ntohs(((struct sockaddr_in *)&from)->sin_port),
26367ecd4f3SMax Laier 			sock_ntop((struct sockaddr *)&proxy),
26467ecd4f3SMax Laier 			ntohs(((struct sockaddr_in *)&proxy)->sin_port),
26567ecd4f3SMax Laier 			sock_ntop((struct sockaddr *)&proxy_to_server),
26667ecd4f3SMax Laier 			ntohs(((struct sockaddr_in *)&proxy_to_server)->sin_port),
26767ecd4f3SMax Laier 			sock_ntop((struct sockaddr *)&server),
26867ecd4f3SMax Laier 			ntohs(((struct sockaddr_in *)&server)->sin_port),
26967ecd4f3SMax Laier 			opcode(ntohs(tp->th_opcode)),
27067ecd4f3SMax Laier 			tp->th_stuff);
27167ecd4f3SMax Laier 
27267ecd4f3SMax Laier 	/* get ready to add rdr and pass rules */
27367ecd4f3SMax Laier 	if (prepare_commit(1) == -1) {
27467ecd4f3SMax Laier 		syslog(LOG_ERR, "couldn't prepare pf commit");
27567ecd4f3SMax Laier 		exit(1);
27667ecd4f3SMax Laier 	}
27767ecd4f3SMax Laier 
27867ecd4f3SMax Laier 	/* rdr from server to us on our random port -> client on its port */
27967ecd4f3SMax Laier 	if (add_rdr(1, (struct sockaddr *)&server,
28067ecd4f3SMax Laier 	    (struct sockaddr *)&proxy_to_server, ntohs(sock_out.sin_port),
28167ecd4f3SMax Laier 	    (struct sockaddr *)&from,
28267ecd4f3SMax Laier 	    ntohs(((struct sockaddr_in *)&from)->sin_port),
28367ecd4f3SMax Laier 	    IPPROTO_UDP) == -1) {
28467ecd4f3SMax Laier 		syslog(LOG_ERR, "couldn't add rdr");
28567ecd4f3SMax Laier 		exit(1);
28667ecd4f3SMax Laier 	}
28767ecd4f3SMax Laier 
28867ecd4f3SMax Laier 	/* explicitly allow the packets to return back to the client (which pf
28967ecd4f3SMax Laier 	 * will see post-rdr) */
29067ecd4f3SMax Laier 	if (add_filter(1, PF_IN, (struct sockaddr *)&server,
29167ecd4f3SMax Laier 	    (struct sockaddr *)&from,
29267ecd4f3SMax Laier 	    ntohs(((struct sockaddr_in *)&from)->sin_port),
29367ecd4f3SMax Laier 	    IPPROTO_UDP) == -1) {
29467ecd4f3SMax Laier 		syslog(LOG_ERR, "couldn't add pass in");
29567ecd4f3SMax Laier 		exit(1);
29667ecd4f3SMax Laier 	}
29767ecd4f3SMax Laier 	if (add_filter(1, PF_OUT, (struct sockaddr *)&server,
29867ecd4f3SMax Laier 	    (struct sockaddr *)&from,
29967ecd4f3SMax Laier 	    ntohs(((struct sockaddr_in *)&from)->sin_port),
30067ecd4f3SMax Laier 	    IPPROTO_UDP) == -1) {
30167ecd4f3SMax Laier 		syslog(LOG_ERR, "couldn't add pass out");
30267ecd4f3SMax Laier 		exit(1);
30367ecd4f3SMax Laier 	}
30467ecd4f3SMax Laier 
30567ecd4f3SMax Laier 	/* and just in case, to pass out from us to the server */
30667ecd4f3SMax Laier 	if (add_filter(1, PF_OUT, (struct sockaddr *)&proxy_to_server,
30767ecd4f3SMax Laier 	    (struct sockaddr *)&server,
30867ecd4f3SMax Laier 	    ntohs(((struct sockaddr_in *)&server)->sin_port),
30967ecd4f3SMax Laier 	    IPPROTO_UDP) == -1) {
31067ecd4f3SMax Laier 		syslog(LOG_ERR, "couldn't add pass out");
31167ecd4f3SMax Laier 		exit(1);
31267ecd4f3SMax Laier 	}
31367ecd4f3SMax Laier 
31467ecd4f3SMax Laier 	if (do_commit() == -1) {
31567ecd4f3SMax Laier 		syslog(LOG_ERR, "couldn't commit pf rules");
31667ecd4f3SMax Laier 		exit(1);
31767ecd4f3SMax Laier 	}
31867ecd4f3SMax Laier 
31967ecd4f3SMax Laier 	/* forward the initial tftp request and start the insanity */
32067ecd4f3SMax Laier 	if (send(out_fd, tp, reqsize, 0) < 0) {
32167ecd4f3SMax Laier 		syslog(LOG_ERR, "couldn't forward tftp packet: %m");
32267ecd4f3SMax Laier 		exit(1);
32367ecd4f3SMax Laier 	}
32467ecd4f3SMax Laier 
32567ecd4f3SMax Laier 	/* allow the transfer to start to establish a state */
32667ecd4f3SMax Laier 	sleep(transwait);
32767ecd4f3SMax Laier 
32867ecd4f3SMax Laier 	/* delete our rdr rule and clean up */
32967ecd4f3SMax Laier 	prepare_commit(1);
33067ecd4f3SMax Laier 	do_commit();
33167ecd4f3SMax Laier 
33267ecd4f3SMax Laier 	return(0);
33367ecd4f3SMax Laier }
33467ecd4f3SMax Laier 
33567ecd4f3SMax Laier const char *
opcode(int code)33667ecd4f3SMax Laier opcode(int code)
33767ecd4f3SMax Laier {
33867ecd4f3SMax Laier 	static char str[6];
33967ecd4f3SMax Laier 
34067ecd4f3SMax Laier 	switch (code) {
34167ecd4f3SMax Laier 	case 1:
34267ecd4f3SMax Laier 		(void)snprintf(str, sizeof(str), "RRQ");
34367ecd4f3SMax Laier 		break;
34467ecd4f3SMax Laier 	case 2:
34567ecd4f3SMax Laier 		(void)snprintf(str, sizeof(str), "WRQ");
34667ecd4f3SMax Laier 		break;
34767ecd4f3SMax Laier 	default:
34867ecd4f3SMax Laier 		(void)snprintf(str, sizeof(str), "(%d)", code);
34967ecd4f3SMax Laier 		break;
35067ecd4f3SMax Laier 	}
35167ecd4f3SMax Laier 
35267ecd4f3SMax Laier 	return (str);
35367ecd4f3SMax Laier }
35467ecd4f3SMax Laier 
35567ecd4f3SMax Laier const char *
sock_ntop(struct sockaddr * sa)35667ecd4f3SMax Laier sock_ntop(struct sockaddr *sa)
35767ecd4f3SMax Laier {
35867ecd4f3SMax Laier 	static int n = 0;
35967ecd4f3SMax Laier 
36067ecd4f3SMax Laier 	/* Cycle to next buffer. */
36167ecd4f3SMax Laier 	n = (n + 1) % NTOP_BUFS;
36267ecd4f3SMax Laier 	ntop_buf[n][0] = '\0';
36367ecd4f3SMax Laier 
36467ecd4f3SMax Laier 	if (sa->sa_family == AF_INET) {
36567ecd4f3SMax Laier 		struct sockaddr_in *sin = (struct sockaddr_in *)sa;
36667ecd4f3SMax Laier 
36767ecd4f3SMax Laier 		return (inet_ntop(AF_INET, &sin->sin_addr, ntop_buf[n],
36867ecd4f3SMax Laier 		    sizeof ntop_buf[0]));
36967ecd4f3SMax Laier 	}
37067ecd4f3SMax Laier 
37167ecd4f3SMax Laier 	if (sa->sa_family == AF_INET6) {
37267ecd4f3SMax Laier 		struct sockaddr_in6 *sin6 = (struct sockaddr_in6 *)sa;
37367ecd4f3SMax Laier 
37467ecd4f3SMax Laier 		return (inet_ntop(AF_INET6, &sin6->sin6_addr, ntop_buf[n],
37567ecd4f3SMax Laier 		    sizeof ntop_buf[0]));
37667ecd4f3SMax Laier 	}
37767ecd4f3SMax Laier 
37867ecd4f3SMax Laier 	return (NULL);
37967ecd4f3SMax Laier }
38067ecd4f3SMax Laier 
38167ecd4f3SMax Laier u_int16_t
pick_proxy_port(void)38267ecd4f3SMax Laier pick_proxy_port(void)
38367ecd4f3SMax Laier {
38467ecd4f3SMax Laier 	return (IPPORT_HIFIRSTAUTO + (arc4random() %
38567ecd4f3SMax Laier 	    (IPPORT_HILASTAUTO - IPPORT_HIFIRSTAUTO)));
38667ecd4f3SMax Laier }
38767ecd4f3SMax Laier 
38867ecd4f3SMax Laier static void
usage(void)38967ecd4f3SMax Laier usage(void)
39067ecd4f3SMax Laier {
39167ecd4f3SMax Laier 	syslog(LOG_ERR, "usage: %s [-v] [-w transwait]", __progname);
39267ecd4f3SMax Laier 	exit(1);
39367ecd4f3SMax Laier }
394