[tproxy] tproxy4, kernel 2.6.22, squid-2.6.stable16 and our patch with IP_FREEBIND
Andrey Luzgin
andrey at icomsw.com
Thu Dec 20 20:00:02 CET 2007
Squid with this changes is currently work in our server
diff -ru squid-2.6.STABLE16.tproxy-freebind/src/comm.c
squid-2.6.STABLE16/src/comm.c
--- squid-2.6.STABLE16.tproxy-freebind/src/comm.c 2007-12-18
09:31:55.000000000 +0200
+++ squid-2.6.STABLE16/src/comm.c 2007-04-17 12:39:56.000000000
+0300
@@ -162,7 +162,7 @@
int flags,
const char *note)
{
- return comm_openex(sock_type, proto, addr, port, flags, 0, note,0);
+ return comm_openex(sock_type, proto, addr, port, flags, 0, note);
}
@@ -175,8 +175,7 @@
u_short port,
int flags,
unsigned char TOS,
- const char *note,
- struct in_addr* tproxy)
+ const char *note)
{
int new_socket;
int tos = 0;
@@ -210,16 +209,6 @@
debug(5, 0) ("comm_open: setsockopt(IP_TOS) not supported on
this platform\n");
#endif
}
- {
- #define IP_FREEBIND 15
- int x=1;
- if (setsockopt(new_socket, SOL_IP, IP_FREEBIND, &x,
sizeof(x)) == -1) {
- debug(20, 1) ("tproxy ip ,port ERROR ASSIGN\n");
- } else if (tproxy){
- addr.s_addr = tproxy->s_addr;
- port=0;
- }
- }
/* update fdstat */
debug(5, 5) ("comm_open: FD %d is a new socket\n", new_socket);
fd_open(new_socket, FD_SOCKET, note);
diff -ru squid-2.6.STABLE16.tproxy-freebind/src/forward.c
squid-2.6.STABLE16/src/forward.c
--- squid-2.6.STABLE16.tproxy-freebind/src/forward.c 2007-12-18
14:17:42.000000000 +0200
+++ squid-2.6.STABLE16/src/forward.c 2007-09-06 00:28:34.000000000
+0300
@@ -27,7 +27,7 @@
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
* GNU General Public License for more details.
*
- * You should have received a copy of theF GNU General Public License
+ * You should have received a copy of the GNU General Public License
* along with this program; if not, write to the Free Software
* Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111,
USA.
*
@@ -556,8 +556,7 @@
0,
COMM_NONBLOCKING,
tos,
- url,
- (fwdState->request->flags.tproxy &&
strcmp(host,"127.0.0.2"))?( &( fwdState->src.sin_addr)):0);
+ url);
if (fd < 0) {
debug(50, 4) ("fwdConnectStart: %s\n", xstrerror());
err = errorCon(ERR_SOCKET_FAILURE, HTTP_INTERNAL_SERVER_ERROR,
fwdState->request);
@@ -588,6 +587,32 @@
if (fs->peer) {
hierarchyNote(&fwdState->request->hier, fs->code,
fs->peer->name);
} else {
+#if LINUX_TPROXY
+ if (fwdState->request->flags.tproxy) {
+
+ itp.v.addr.faddr.s_addr = fwdState->src.sin_addr.s_addr;
+ itp.v.addr.fport = 0;
+
+ /* If these syscalls fail then we just fallback to
connecting
+ * normally by simply ignoring the errors...
+ */
+ itp.op = TPROXY_ASSIGN;
+ if (setsockopt(fd, SOL_IP, IP_TPROXY, &itp, sizeof(itp)) ==
-1) {
+ debug(20, 1) ("tproxy ip=%s,0x%x,port=%d ERROR ASSIGN
\n",
+ inet_ntoa(itp.v.addr.faddr),
+ itp.v.addr.faddr.s_addr,
+ itp.v.addr.fport);
+ } else {
+ itp.op = TPROXY_FLAGS;
+ itp.v.flags = ITP_CONNECT;
+ if (setsockopt(fd, SOL_IP, IP_TPROXY, &itp, sizeof(itp))
== -1) {
+ debug(20, 1) ("tproxy ip=%x,port=%d ERROR CONNECT
\n",
+ itp.v.addr.faddr.s_addr,
+ itp.v.addr.fport);
+ }
+ }
+ }
+#endif
hierarchyNote(&fwdState->request->hier, fs->code,
fwdState->request->host);
}
commConnectStart(fd, host, port, fwdConnectDone, fwdState);
diff -ru squid-2.6.STABLE16.tproxy-freebind/src/main.c
squid-2.6.STABLE16/src/main.c
--- squid-2.6.STABLE16.tproxy-freebind/src/main.c 2007-12-05
14:21:51.000000000 +0200
+++ squid-2.6.STABLE16/src/main.c 2007-08-31 16:52:10.000000000
+0300
@@ -487,13 +487,13 @@
#ifdef _SQUID_OS2_
return;
#endif
-/* if (geteuid() == 0) {
+ if (geteuid() == 0) {
debug(0, 0) ("Squid is not safe to run as root! If you must
\n");
debug(0, 0) ("start Squid as root, then you must configure\n");
debug(0, 0) ("it to run as a non-priveledged user with the\n");
debug(0, 0) ("'cache_effective_user' option in the config
file.\n");
fatal("Don't run Squid as root, set 'cache_effective_user'!");
- }*/
+ }
}
static void
diff -ru squid-2.6.STABLE16.tproxy-freebind/src/protos.h
squid-2.6.STABLE16/src/protos.h
--- squid-2.6.STABLE16.tproxy-freebind/src/protos.h 2007-12-18
09:26:35.000000000 +0200
+++ squid-2.6.STABLE16/src/protos.h 2007-07-15 12:52:17.000000000
+0300
@@ -160,7 +160,7 @@
extern void comm_init(void);
extern int comm_listen(int sock);
extern int comm_open(int, int, struct in_addr, u_short port, int, const
char *note);
-extern int comm_openex(int, int, struct in_addr, u_short, int, unsigned
char TOS, const char *,struct in_addr* );
+extern int comm_openex(int, int, struct in_addr, u_short, int, unsigned
char TOS, const char *);
extern u_short comm_local_port(int fd);
extern void commDeferFD(int fd);
diff -ru squid-2.6.STABLE16.tproxy-freebind/src/ssl.c
squid-2.6.STABLE16/src/ssl.c
--- squid-2.6.STABLE16.tproxy-freebind/src/ssl.c 2007-12-18
09:27:04.000000000 +0200
+++ squid-2.6.STABLE16/src/ssl.c 2007-02-03 23:53:38.000000000
+0200
@@ -524,8 +524,7 @@
0,
COMM_NONBLOCKING,
getOutgoingTOS(request),
- url,
- 0);
+ url);
if (sock == COMM_ERROR) {
debug(26, 4) ("sslStart: Failed because we're out of
sockets.\n");
err = errorCon(ERR_SOCKET_FAILURE, HTTP_INTERNAL_SERVER_ERROR,
request);
--
Andrey Luzgin <andrey at icomsw.com>
I-com software
-------------- next part --------------
An HTML attachment was scrubbed...
URL: http://lists.balabit.hu/pipermail/tproxy/attachments/20071220/7ac7ae05/attachment.htm
More information about the tproxy
mailing list