Project import
diff --git a/6tunnel.url b/6tunnel.url
new file mode 100644
index 0000000..558ad14
--- /dev/null
+++ b/6tunnel.url
@@ -0,0 +1 @@
+git@github.com:wojtekka/6tunnel.git
\ No newline at end of file
diff --git a/6tunnel.version b/6tunnel.version
new file mode 100644
index 0000000..1e4f4c3
--- /dev/null
+++ b/6tunnel.version
@@ -0,0 +1 @@
+2d3346169da8eb89088fc5ff4d5d13e2ad8ae9f6
\ No newline at end of file
diff --git a/6tunnel/6tunnel.1 b/6tunnel/6tunnel.1
new file mode 100644
index 0000000..4cf2a30
--- /dev/null
+++ b/6tunnel/6tunnel.1
@@ -0,0 +1,168 @@
+.\"
+.\" 6tunnel v0.11
+.\" (C) Copyright 2000-2005,2013 by Wojtek Kaniewski <wojtekka@toxygen.net>
+.\"
+.TH 6TUNNEL 1 "May 25, 2013"
+.SH NAME
+6tunnel \- tunnelling for application that don't speak IPv6
+.SH SYNOPSIS
+.B 6tunnel
+[
+.B \-146dhHfv
+] [
+.BI \-u
+.IR username
+] [
+.BI \-i
+.IR password
+] [
+.BI \-I
+.IR password
+] [
+.BI \-l
+.IR local\_host
+] [
+.BI \-L
+.IR limit
+] [
+.BI \-p
+.IR pid\_file
+] [
+.BI \-m
+.IR map\_file
+]
+.IR local\_port
+.IR remote\_host
+[
+.IR remote\_port
+]
+.SH DESCRIPTION
+.B 6tunnel
+allows you to use services provided by IPv6 hosts with IPv4-only
+applications and vice-versa. It can bind to any of your IPv4 (default) or
+IPv6 addresses and forward all data to IPv4 or IPv6 (default) host. For
+example
+.IP
+.BI 6tunnel "\ " \-1 "\ " 6668 "\ " irc6.net "\ " 6667
+.LP
+will be enough to connect to IPv6 irc server with
+.IP
+.BI irc "\ " foobar "\ " localhost:6668
+.LP
+If you don't wish to run
+.B 6tunnel
+every time you want to show your :c001: or :dead: IPv6 address on IRC,
+you can use
+.B \-i
+parameter, which makes
+.B 6tunnel
+ask your client for specified password. Just run
+.IP
+.BI 6tunnel "\ " \-i "\ " dupa.8 "\ " 31337 "\ " irc6.net "\ " 6667
+.LP
+and then type
+.IP
+.BI irc "\ " foobar "\ " localhost:31337:dupa.8
+.LP
+If your IRC server requires you to send password, specify it with
+.B \-I
+parameter -- after successful proxy authentication
+.B 6tunnel
+will send it to the server.
+
+.B 6tunnel
+can also be used as a tunnel for all other combinations of IPv4 and IPv6
+endpoints. If remote host doesn't have any IPv6 addresses,
+.B 6tunnel
+will use the IPv4 one. In other cases, use
+.B \-4
+parameter which makes IPv4 address the preffered one. For IPv6-to-any tunnels
+use
+.B \-6
+which makes
+.B 6tunnel
+bind to IPv6 address.
+.SH OPTIONS
+.TP
+.B \-1
+Exit after first connection.
+.TP
+.B \-4
+Preffer IPv4 endpoint if the machine has both address types.
+.TP
+.B \-6
+Listen on IPv6 address (IPv4 is default).
+.TP
+.B \-d
+Don't detach.
+.TP
+.B \-f
+Force tunneling even if remote host is not resolvable at the execution time.
+.TP
+.B \-h
+Print hex dump of every packet received or sent (hu-huh, Beavis, he said
+hex dump!)
+.TP
+.B \-H
+Don't ignore IPv4/IPv6 resolver hints. Original versions allowed only IPv4 to IPv6
+or IPv6 to IPv4 tunnels, so this option revert such behaviour.
+.TP
+.BI \-u "\ " username
+Change UID and GID after bind().
+.TP
+.BI \-i "\ " password
+Act as an IRC proxy and require user to authenticate.
+.TP
+.BI \-I "\ " password
+If you are using
+.B 6tunnel
+as an IRC proxy and the IRC server requires you to send password, place
+it right here.
+.TP
+.BI \-l "\ " local_host
+Listen on specified address (IPv4, or IPv6 if
+.B \-6
+used).
+.TP
+.BI \-L "\ " limit
+Limit simultaneous connections.
+.TP
+.BI \-p "\ " pid_file
+Write down pid to specified file.
+.TP
+.BI \-s "\ " source_host
+Connect to the remote host using specified source address.
+.TP
+.BI \-m "\ " map_file
+Binds to specified IPv6 addresses on basis of source IPv4 address. The file
+contains one mapping per line with IPv4 source address and corresponding IPv6
+address. Only listed hosts are allowed to connect. If you want to allow any
+host, add mapping for
+.BI default
+or
+.BI 0.0.0.0
+address. Example:
+.IP
+.nf
+.ta +3i
+192.168.0.2 3ffe:8010:18::1000:2
+192.168.0.3 3ffe:8010:18::1000:3
+.fi
+.TP
+.B \-v
+Be verbose and don't detach.
+.SH SIGNALS
+Sending SIGHUP forces map file reload.
+.SH THANKS
+#ipv6 crew, Lam.
+.SH BUGS
+Terrible man page. Hex dump doesn't include IRC proxy authentication.
+IRC proxy requires your client to send password first (don't worry ircii,
+EPIC, BitchX, mIRC and many more will work). No logging except debug output.
+.SH AUTHORS
+Wojtek Kaniewski (wojtekka@toxygen.net),
+Dariusz Jackowski (ascent@linux.pl),
+Ramunas Lukosevicus (lukoramu@parok.lt),
+Roland Stigge (stigge@antcom.de)
+.SH "SEE ALSO"
+.BR ssh (1)
diff --git a/6tunnel/6tunnel.c b/6tunnel/6tunnel.c
new file mode 100644
index 0000000..1d3e70c
--- /dev/null
+++ b/6tunnel/6tunnel.c
@@ -0,0 +1,812 @@
+/*
+ * 6tunnel v0.11
+ * (C) Copyright 2000-2005,2013 by Wojtek Kaniewski <wojtekka@toxygen.net>
+ *
+ * Contributions by:
+ * - Dariusz Jackowski <ascent@linux.pl>
+ * - Ramunas Lukosevicius <lukoramu@parok.lt>
+ * - Roland Stigge <stigge@antcom.de>
+ *
+ * This program is free software; you can redistribute it and/or modify
+ * it under the terms of the GNU General Public License Version 2 as
+ * published by the Free Software Foundation.
+ *
+ * This program is distributed in the hope that it will be useful,
+ * but WITHOUT ANY WARRANTY; without even the implied warranty of
+ * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+ * GNU General Public License for more details.
+ *
+ * You should have received a copy of the GNU General Public License
+ * along with this program; if not, write to the Free Software
+ * Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
+ */
+
+#include <stdio.h>
+#include <stdlib.h>
+#include <unistd.h>
+#include <netdb.h>
+#include <string.h>
+#include <sys/types.h>
+#include <netinet/in.h>
+#include <sys/socket.h>
+#include <arpa/inet.h>
+#include <sys/wait.h>
+#include <fcntl.h>
+#include <signal.h>
+#include <errno.h>
+#include <ctype.h>
+#include <pwd.h>
+#include <time.h>
+
+#define debug(x...) do { \
+ if (verbose) \
+ printf(x); \
+} while(0)
+
+int verbose = 0, conn_count = 0;
+int remote_port, verbose, hexdump = 0;
+int remote_hint = AF_INET6;
+int local_hint = AF_INET;
+int hint_optional = 0;
+char *remote_host, *ircpass = NULL;
+char *ircsendpass = NULL, remote[128];
+char *pid_file = NULL;
+const char *source_host;
+
+typedef struct map {
+ char *ipv4;
+ char *ipv6;
+ struct map *next;
+} map_t;
+
+map_t *map_list = NULL;
+char *map_file = NULL;
+
+char *xmalloc(int size)
+{
+ char *tmp;
+
+ if (!(tmp = malloc(size))) {
+ perror("malloc");
+ exit(1);
+ }
+
+ return tmp;
+}
+
+char *xrealloc(char *ptr, int size)
+{
+ char *tmp;
+
+ if (!(tmp = realloc(ptr, size))) {
+ perror("realloc");
+ exit(1);
+ }
+
+ return tmp;
+}
+
+char *xstrdup(const char *str)
+{
+ char *tmp;
+
+ if (!(tmp = strdup(str))) {
+ perror("strdup");
+ exit(1);
+ }
+
+ return tmp;
+}
+
+struct sockaddr *resolve_host(const char *name, int hint)
+{
+ struct addrinfo *ai = NULL, hints;
+
+ memset(&hints, 0, sizeof(hints));
+ hints.ai_family = hint;
+
+ if (getaddrinfo(name, NULL, &hints, &ai) == 0 && ai != NULL) {
+ char *tmp;
+
+ tmp = xmalloc(ai->ai_addrlen);
+ memcpy(tmp, ai->ai_addr, ai->ai_addrlen);
+
+ freeaddrinfo(ai);
+
+ return (struct sockaddr*) tmp;
+ }
+
+ /* If hints are optional, try again without them. */
+ if (hint_optional && hint != 0) {
+ struct sockaddr *res;
+
+ res = resolve_host(name, 0);
+
+ if (res != NULL) {
+ debug("warning: %s resolved ignoring hints\n", name);
+ return res;
+ }
+ }
+
+ return NULL;
+}
+
+void print_hexdump(const char *buf, int len)
+{
+ int i, j;
+
+ for (i = 0; i < ((len / 16) + ((len % 16) ? 1 : 0)); i++) {
+ printf("%.4x: ", i * 16);
+
+ for (j = 0; j < 16; j++) {
+ if (i * 16 + j < len)
+ printf("%.2x ", buf[i*16+j]);
+ else
+ printf(" ");
+ if (j == 7)
+ printf(" ");
+ }
+
+ printf(" ");
+
+ for (j = 0; j < 16; j++) {
+ if (i * 16 + j < len) {
+ char ch = buf[i * 16 + j];
+
+ printf("%c", (isprint(ch)) ? ch : '.');
+ }
+ }
+
+ printf("\n");
+ }
+}
+
+const char *map_find(const char *ipv4)
+{
+ map_t *m;
+
+ for (m = map_list; m; m = m->next) {
+ if (!strcmp(m->ipv4, ipv4))
+ return m->ipv6;
+ }
+
+ for (m = map_list; m; m = m->next) {
+ if (!strcmp(m->ipv4, "0.0.0.0") || !strcmp(m->ipv4, "default"))
+ return m->ipv6;
+ }
+
+ return source_host;
+}
+
+void make_tunnel(int rsock, const char *remote)
+{
+ char buf[4096], *outbuf = NULL, *inbuf = NULL;
+ int sock = -1, outlen = 0, inlen = 0;
+ struct sockaddr *sa = NULL;
+ const char *source;
+
+ if (map_list) {
+ if (!(source = map_find(remote))) {
+ debug("<%d> connection from unmapped address (%s), disconnecting\n", rsock, remote);
+ goto cleanup;
+ }
+
+ debug("<%d> mapped to %s\n", rsock, source);
+ } else
+ source = source_host;
+
+ if (ircpass) {
+ int i, ret;
+
+ for (i = 0; i < sizeof(buf) - 1; i++) {
+ if ((ret = read(rsock, buf + i, 1)) < 1)
+ goto cleanup;
+ if (buf[i] == '\n')
+ break;
+ }
+
+ buf[i] = 0;
+
+ if (i > 0 && buf[i - 1] == '\r')
+ buf[i - 1] = 0;
+
+ if (i == 4095 || strncasecmp(buf, "PASS ", 5)) {
+ char *tmp;
+
+ debug("<%d> irc proxy auth failed - junk\n", rsock);
+
+ tmp = "ERROR :Closing link: Make your client send password first\r\n";
+ if (write(rsock, tmp, strlen(tmp)) != strlen(tmp)) {
+ // Do nothing. We're failing anyway.
+ }
+
+ goto cleanup;
+ }
+
+ if (strcmp(buf + 5, ircpass)) {
+ char *tmp;
+
+ debug("<%d> irc proxy auth failed - password incorrect\n", rsock);
+ tmp = ":6tunnel 464 * :Password incorrect\r\nERROR :Closing link: Password incorrect\r\n";
+ if (write(rsock, tmp, strlen(tmp)) != strlen(tmp)) {
+ // Do nothing. We're failing anyway.
+ }
+
+ goto cleanup;
+ }
+
+ debug("<%d> irc proxy auth succeded\n", rsock);
+ }
+
+ if (!(sa = resolve_host(remote_host, remote_hint))) {
+ debug("<%d> unable to resolve %s\n", rsock, remote_host);
+ goto cleanup;
+ }
+
+ if ((sock = socket(sa->sa_family, SOCK_STREAM, 0)) == -1) {
+ debug("<%d> unable to create socket (%s)\n", rsock, strerror(errno));
+ goto cleanup;
+ }
+
+ free(sa);
+ sa = NULL;
+
+ if (source) {
+ if (!(sa = resolve_host(source, local_hint))) {
+ debug("<%d> unable to resolve source host (%s)\n", rsock, source);
+ goto cleanup;
+ }
+
+ if (bind(sock, sa, (local_hint == AF_INET) ? sizeof(struct sockaddr_in) : sizeof(struct sockaddr_in6))) {
+ debug("<%d> unable to bind to source host (%s)\n", rsock, source);
+ goto cleanup;
+ }
+
+ free(sa);
+ sa = NULL;
+ }
+
+ sa = resolve_host(remote_host, remote_hint);
+
+ ((struct sockaddr_in*) sa)->sin_port = htons(remote_port);
+
+ if (connect(sock, sa, (sa->sa_family == AF_INET) ? sizeof(struct sockaddr_in) : sizeof(struct sockaddr_in6))) {
+ debug("<%d> connection refused (%s,%d)\n", rsock, remote_host, remote_port);
+ goto cleanup;
+ }
+
+ free(sa);
+ sa = NULL;
+
+ debug("<%d> connected to %s,%d\n", rsock, remote_host, remote_port);
+
+ if (ircsendpass) {
+ snprintf(buf, 4096, "PASS %s\r\n", ircsendpass);
+ if (write(sock, buf, strlen(buf)) != strlen(buf))
+ goto cleanup;
+ }
+
+ for (;;) {
+ fd_set rds, wds;
+ int ret, sent;
+
+ FD_ZERO(&rds);
+ FD_SET(sock, &rds);
+ FD_SET(rsock, &rds);
+
+ FD_ZERO(&wds);
+ if (outbuf && outlen)
+ FD_SET(rsock, &wds);
+ if (inbuf && inlen)
+ FD_SET(sock, &wds);
+
+ ret = select((sock > rsock) ? (sock + 1) : (rsock + 1), &rds, &wds, NULL, NULL);
+
+ if (FD_ISSET(rsock, &wds)) {
+ sent = write(rsock, outbuf, outlen);
+
+ if (sent < 1)
+ goto cleanup;
+
+ if (sent == outlen) {
+ free(outbuf);
+ outbuf = NULL;
+ outlen = 0;
+ } else {
+ memmove(outbuf, outbuf + sent, outlen - sent);
+ outlen -= sent;
+ }
+ }
+
+ if (FD_ISSET(sock, &wds)) {
+ sent = write(sock, inbuf, inlen);
+
+ if (sent < 1)
+ goto cleanup;
+
+ if (sent == inlen) {
+ free(inbuf);
+ inbuf = NULL;
+ inlen = 0;
+ } else {
+ memmove(inbuf, inbuf + sent, inlen - sent);
+ inlen -= sent;
+ }
+ }
+
+ if (FD_ISSET(sock, &rds)) {
+ if ((ret = read(sock, buf, 4096)) < 1)
+ goto cleanup;
+
+ if (hexdump) {
+ printf("<%d> recvfrom %s,%d\n", rsock, remote_host, remote_port);
+ print_hexdump(buf, ret);
+ }
+
+ sent = write(rsock, buf, ret);
+
+ if (sent < 1)
+ goto cleanup;
+
+ if (sent < ret) {
+ outbuf = xrealloc(outbuf, outlen + ret - sent);
+ memcpy(outbuf + outlen, buf + sent, ret - sent);
+ outlen = ret - sent;
+ }
+ }
+
+ if (FD_ISSET(rsock, &rds)) {
+ if ((ret = read(rsock, buf, 4096)) < 1)
+ goto cleanup;
+
+ if (hexdump) {
+ printf("<%d> sendto %s,%d\n", rsock, remote_host, remote_port);
+ print_hexdump(buf, ret);
+ }
+
+ sent = write(sock, buf, ret);
+
+ if (sent < 1)
+ goto cleanup;
+
+ if (sent < ret) {
+ inbuf = xrealloc(inbuf, inlen + ret - sent);
+ memcpy(inbuf + inlen, buf + sent, ret - sent);
+ inlen = ret - sent;
+ }
+ }
+ }
+
+
+cleanup:
+ if (sa)
+ free(sa);
+
+ close(rsock);
+
+ if (sock != -1)
+ close(sock);
+}
+
+void usage(const char *arg0)
+{
+ fprintf(stderr,
+
+"usage: %s [-146dvhH] [-s sourcehost] [-l localhost] [-i pass]\n"
+" [-I pass] [-L limit] [-A filename] [-p pidfile]\n"
+" [-m mapfile] localport remotehost [remoteport]\n"
+"\n"
+" -1 allow only one connection and quit\n"
+" -4 prefer IPv4 endpoints\n"
+" -6 bind to IPv6 address\n"
+" -d don't detach\n"
+" -f force tunneling (even if remotehost isn't resolvable)\n"
+" -h print hex dump of packets\n"
+" -H make IPv4/IPv6 resolver hints optional\n"
+" -i act like irc proxy and ask for password\n"
+" -I send specified password to the irc server\n"
+" -l bind to specified address\n"
+" -L limit simultanous connections\n"
+" -p write down pid to specified file\n"
+" -s connect using specified address\n"
+" -m read specified IPv4-to-IPv6 map file\n"
+" -v be verbose\n"
+"\n", arg0);
+}
+
+void clear_argv(char *argv)
+{
+ int x;
+
+ for (x = 0; x < strlen(argv); x++)
+ argv[x] = 'x';
+
+ return;
+}
+
+void map_destroy(void)
+{
+ map_t *m;
+
+ debug("map_destroy()\n");
+
+ for (m = map_list; m; ) {
+ map_t *n;
+
+ free(m->ipv4);
+ free(m->ipv6);
+ n = m;
+ m = m->next;
+ free(n);
+ }
+
+ map_list = NULL;
+}
+
+void map_read(void)
+{
+ char buf[256];
+ FILE *f;
+
+ if (!map_file)
+ return;
+
+ debug("reading map from %s\n", map_file);
+
+ if (!(f = fopen(map_file, "r"))) {
+ debug("unable to read map file, ignoring\n");
+ return;
+ }
+
+ while (fgets(buf, sizeof(buf), f)) {
+ char *p, *ipv4, *ipv6;
+ map_t *m;
+
+ for (p = buf; *p == ' ' || *p == '\t'; p++);
+
+ if (!*p)
+ continue;
+
+ ipv4 = p;
+
+ for (; *p && *p != ' ' && *p != '\t'; p++);
+
+ if (!*p)
+ continue;
+
+ *p = 0;
+ p++;
+
+ for (; *p == ' ' || *p == '\t'; p++);
+
+ if (!*p)
+ continue;
+
+ ipv6 = p;
+
+ for (; *p && *p != ' ' && *p != '\t' && *p != '\r' && *p != '\n'; p++);
+
+ *p = 0;
+
+ debug("[%s] mapped to [%s]\n", ipv4, ipv6);
+
+ m = (map_t*) xmalloc(sizeof(map_t));
+ m->ipv4 = xstrdup(ipv4);
+ m->ipv6 = xstrdup(ipv6);
+ m->next = map_list;
+ map_list = m;
+ }
+
+ fclose(f);
+}
+
+void sighup()
+{
+ map_destroy();
+ map_read();
+
+ signal(SIGHUP, sighup);
+}
+
+void sigchld()
+{
+ while (waitpid(-1, NULL, WNOHANG) > 0) {
+ debug("child process exited\n");
+ conn_count--;
+ }
+
+ signal(SIGCHLD, sigchld);
+}
+
+void sigterm()
+{
+ if (pid_file)
+ unlink(pid_file);
+
+ exit(0);
+}
+
+int main(int argc, char **argv)
+{
+ int force = 0, lsock, csock, one = 0, jeden = 1, local_port;
+ int detach = 1, sa_len, conn_limit = 0, optc;
+ char *username = NULL, *bind_host = NULL;
+ struct sockaddr *sa;
+ struct sockaddr_in laddr, caddr;
+ struct sockaddr_in6 laddr6;
+ unsigned int caddrlen = sizeof(caddr);
+ struct passwd *pw = NULL;
+
+ while ((optc = getopt(argc, argv, "1dv46fHs:l:I:i:hu:m:L:A:p:")) != -1) {
+ switch (optc) {
+ case '1':
+ one = 1;
+ break;
+ case 'd':
+ detach = 0;
+ break;
+ case 'v':
+ verbose = 1;
+ break;
+ case '4':
+ break;
+ case '6':
+ remote_hint = AF_INET;
+ local_hint = AF_INET6;
+ break;
+ case 's':
+ source_host = xstrdup(optarg);
+ break;
+ case 'l':
+ bind_host = xstrdup(optarg);
+ break;
+ case 'r':
+ force = 1;
+ break;
+ case 'i':
+ ircpass = xstrdup(optarg);
+ clear_argv(argv[optind - 1]);
+ break;
+ case 'I':
+ ircsendpass = xstrdup(optarg);
+ clear_argv(argv[optind - 1]);
+ break;
+ case 'h':
+ hexdump = 1;
+ break;
+ case 'u':
+ username = xstrdup(optarg);
+ break;
+ case 'm':
+ map_file = xstrdup(optarg);
+ break;
+ case 'L':
+ conn_limit = atoi(optarg);
+ break;
+ case 'p':
+ pid_file = xstrdup(optarg);
+ break;
+ case 'H':
+ hint_optional = 1;
+ break;
+ default:
+ return 1;
+ }
+ }
+
+ if (hexdump)
+ verbose = 1;
+
+ if (verbose)
+ detach = 0;
+
+ if (detach)
+ verbose = 0;
+
+ if (argc - optind < 2) {
+ usage(argv[0]);
+ exit(1);
+ }
+
+ if (username && !(pw = getpwnam(username))) {
+ fprintf(stderr, "%s: unknown user %s\n", argv[0], username);
+ exit(1);
+ }
+
+ if (map_file)
+ map_read();
+
+ local_port = atoi(argv[optind++]);
+ remote_host = argv[optind++];
+ remote_port = (argc == optind) ? local_port : atoi(argv[optind]);
+
+ debug("resolving %s\n", remote_host);
+
+ if (!(sa = resolve_host(remote_host, remote_hint)) && !force) {
+ fprintf(stderr, "%s: unable to resolve host %s\n", argv[0], remote_host);
+ exit(1);
+ }
+
+ free(sa);
+ sa = NULL;
+
+ if (bind_host) {
+ debug("resolving %s\n", bind_host);
+
+ if (!(sa = resolve_host(bind_host, local_hint))) {
+ fprintf(stderr, "%s: unable to resolve host %s\n", argv[0], remote_host);
+ exit(1);
+ }
+ }
+
+ debug("local: %s,%d; ", (bind_host) ? bind_host : "default", local_port);
+ debug("remote: %s,%d; ", remote_host, remote_port);
+
+ if (map_file)
+ debug("source: mapped\n");
+ else
+ debug("source: %s\n", (source_host) ? source_host : "default");
+
+ if (local_hint == AF_INET) {
+ lsock = socket(PF_INET, SOCK_STREAM, 0);
+
+ memset(&laddr, 0, (sa_len = sizeof(laddr)));
+ laddr.sin_family = AF_INET;
+ laddr.sin_port = htons(local_port);
+
+ if (sa) {
+ memcpy(&laddr.sin_addr, &((struct sockaddr_in*) sa)->sin_addr, sizeof(struct in_addr));
+ free(sa);
+ }
+
+ sa = (struct sockaddr*) &laddr;
+ } else {
+ lsock = socket(PF_INET6, SOCK_STREAM, 0);
+
+ memset(&laddr6, 0, (sa_len = sizeof(laddr6)));
+ laddr6.sin6_family = AF_INET6;
+ laddr6.sin6_port = htons(local_port);
+
+ if (sa) {
+ memcpy(&laddr6.sin6_addr, &((struct sockaddr_in6*) sa)->sin6_addr, sizeof(struct in6_addr));
+ free(sa);
+ }
+
+ sa = (struct sockaddr*) &laddr6;
+ }
+
+ if (setsockopt(lsock, SOL_SOCKET, SO_REUSEADDR, &jeden, sizeof(jeden)) == -1) {
+ perror("setsockopt");
+ exit(1);
+ }
+
+ // Reuse port wasn't working when only Weave set it.
+ if (setsockopt(lsock, SOL_SOCKET, SO_REUSEPORT, &jeden, sizeof(jeden)) == -1) {
+ perror("setsockopt");
+ exit(1);
+ }
+
+ if (bind(lsock, sa, sa_len)) {
+ perror("bind");
+ exit(1);
+ }
+
+ if (listen(lsock, 100)) {
+ perror("listen");
+ exit(1);
+ }
+
+ if (detach) {
+ int i, ret;
+
+ signal(SIGHUP, sighup);
+
+ for (i = 0; i < 3; i++)
+ close(i);
+
+ ret = fork();
+
+ if (ret == -1) {
+ perror("fork");
+ exit(1);
+ }
+
+ if (ret)
+ exit(0);
+ }
+
+ if (pid_file) {
+ FILE *f = fopen(pid_file, "w");
+
+ if (!f)
+ debug("warning: cannot write to pidfile (%s)\n", strerror(errno));
+ else {
+ fprintf(f, "%d", getpid());
+ fclose(f);
+ }
+ }
+
+ if (username && ((setgid(pw->pw_gid) == -1) || (setuid(pw->pw_uid) == -1))) {
+ perror("setuid/setgid");
+ exit(1);
+ }
+
+ setsid();
+ signal(SIGCHLD, sigchld);
+ signal(SIGTERM, sigterm);
+ signal(SIGINT, sigterm);
+ signal(SIGHUP, sighup);
+
+ for (;;) {
+ int ret;
+ fd_set rds;
+
+ FD_ZERO(&rds);
+ FD_SET(lsock, &rds);
+
+ if (select(lsock + 1, &rds, NULL, NULL, NULL) == -1) {
+ if (errno == EINTR)
+ continue;
+
+ perror("select");
+ break;
+ }
+
+ if ((csock = accept(lsock, (struct sockaddr*) &caddr, &caddrlen)) == -1) {
+ perror("accept");
+ break;
+ }
+
+ inet_ntop(caddr.sin_family, (caddr.sin_family == AF_INET) ?
+ &caddr.sin_addr :
+ (void*) &(((struct sockaddr_in6*)&caddr)->sin6_addr),
+ remote, sizeof(remote));
+
+ debug("<%d> connection from %s,%d", csock, remote, ntohs(caddr.sin_port));
+
+ if (conn_limit && (conn_count >= conn_limit)) {
+ debug(" -- rejected due to limit.\n");
+ shutdown(csock, 2);
+ close(csock);
+ continue;
+ }
+
+ if (conn_limit) {
+ conn_count++;
+ debug(" (no. %d)", conn_count);
+ }
+
+ fflush(stdout);
+
+ if ((ret = fork()) == -1) {
+ debug(" -- fork() failed.\n");
+ shutdown(csock, 2);
+ close(csock);
+ continue;
+ }
+
+ if (!ret) {
+ signal(SIGHUP, SIG_IGN);
+ close(lsock);
+ debug("\n");
+ make_tunnel(csock, remote);
+ debug("<%d> connection closed\n", csock);
+ exit(0);
+ }
+
+ close(csock);
+
+ if (one) {
+ shutdown(lsock, 2);
+ close(lsock);
+ exit(0);
+ }
+
+ }
+
+ close(lsock);
+
+ exit(1);
+}
+
+
diff --git a/6tunnel/COPYING b/6tunnel/COPYING
new file mode 100644
index 0000000..5b6e7c6
--- /dev/null
+++ b/6tunnel/COPYING
@@ -0,0 +1,340 @@
+ GNU GENERAL PUBLIC LICENSE
+ Version 2, June 1991
+
+ Copyright (C) 1989, 1991 Free Software Foundation, Inc.
+ 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
+ Everyone is permitted to copy and distribute verbatim copies
+ of this license document, but changing it is not allowed.
+
+ Preamble
+
+ The licenses for most software are designed to take away your
+freedom to share and change it. By contrast, the GNU General Public
+License is intended to guarantee your freedom to share and change free
+software--to make sure the software is free for all its users. This
+General Public License applies to most of the Free Software
+Foundation's software and to any other program whose authors commit to
+using it. (Some other Free Software Foundation software is covered by
+the GNU Library General Public License instead.) You can apply it to
+your programs, too.
+
+ When we speak of free software, we are referring to freedom, not
+price. Our General Public Licenses are designed to make sure that you
+have the freedom to distribute copies of free software (and charge for
+this service if you wish), that you receive source code or can get it
+if you want it, that you can change the software or use pieces of it
+in new free programs; and that you know you can do these things.
+
+ To protect your rights, we need to make restrictions that forbid
+anyone to deny you these rights or to ask you to surrender the rights.
+These restrictions translate to certain responsibilities for you if you
+distribute copies of the software, or if you modify it.
+
+ For example, if you distribute copies of such a program, whether
+gratis or for a fee, you must give the recipients all the rights that
+you have. You must make sure that they, too, receive or can get the
+source code. And you must show them these terms so they know their
+rights.
+
+ We protect your rights with two steps: (1) copyright the software, and
+(2) offer you this license which gives you legal permission to copy,
+distribute and/or modify the software.
+
+ Also, for each author's protection and ours, we want to make certain
+that everyone understands that there is no warranty for this free
+software. If the software is modified by someone else and passed on, we
+want its recipients to know that what they have is not the original, so
+that any problems introduced by others will not reflect on the original
+authors' reputations.
+
+ Finally, any free program is threatened constantly by software
+patents. We wish to avoid the danger that redistributors of a free
+program will individually obtain patent licenses, in effect making the
+program proprietary. To prevent this, we have made it clear that any
+patent must be licensed for everyone's free use or not licensed at all.
+
+ The precise terms and conditions for copying, distribution and
+modification follow.
+
+ GNU GENERAL PUBLIC LICENSE
+ TERMS AND CONDITIONS FOR COPYING, DISTRIBUTION AND MODIFICATION
+
+ 0. This License applies to any program or other work which contains
+a notice placed by the copyright holder saying it may be distributed
+under the terms of this General Public License. The "Program", below,
+refers to any such program or work, and a "work based on the Program"
+means either the Program or any derivative work under copyright law:
+that is to say, a work containing the Program or a portion of it,
+either verbatim or with modifications and/or translated into another
+language. (Hereinafter, translation is included without limitation in
+the term "modification".) Each licensee is addressed as "you".
+
+Activities other than copying, distribution and modification are not
+covered by this License; they are outside its scope. The act of
+running the Program is not restricted, and the output from the Program
+is covered only if its contents constitute a work based on the
+Program (independent of having been made by running the Program).
+Whether that is true depends on what the Program does.
+
+ 1. You may copy and distribute verbatim copies of the Program's
+source code as you receive it, in any medium, provided that you
+conspicuously and appropriately publish on each copy an appropriate
+copyright notice and disclaimer of warranty; keep intact all the
+notices that refer to this License and to the absence of any warranty;
+and give any other recipients of the Program a copy of this License
+along with the Program.
+
+You may charge a fee for the physical act of transferring a copy, and
+you may at your option offer warranty protection in exchange for a fee.
+
+ 2. You may modify your copy or copies of the Program or any portion
+of it, thus forming a work based on the Program, and copy and
+distribute such modifications or work under the terms of Section 1
+above, provided that you also meet all of these conditions:
+
+ a) You must cause the modified files to carry prominent notices
+ stating that you changed the files and the date of any change.
+
+ b) You must cause any work that you distribute or publish, that in
+ whole or in part contains or is derived from the Program or any
+ part thereof, to be licensed as a whole at no charge to all third
+ parties under the terms of this License.
+
+ c) If the modified program normally reads commands interactively
+ when run, you must cause it, when started running for such
+ interactive use in the most ordinary way, to print or display an
+ announcement including an appropriate copyright notice and a
+ notice that there is no warranty (or else, saying that you provide
+ a warranty) and that users may redistribute the program under
+ these conditions, and telling the user how to view a copy of this
+ License. (Exception: if the Program itself is interactive but
+ does not normally print such an announcement, your work based on
+ the Program is not required to print an announcement.)
+
+These requirements apply to the modified work as a whole. If
+identifiable sections of that work are not derived from the Program,
+and can be reasonably considered independent and separate works in
+themselves, then this License, and its terms, do not apply to those
+sections when you distribute them as separate works. But when you
+distribute the same sections as part of a whole which is a work based
+on the Program, the distribution of the whole must be on the terms of
+this License, whose permissions for other licensees extend to the
+entire whole, and thus to each and every part regardless of who wrote it.
+
+Thus, it is not the intent of this section to claim rights or contest
+your rights to work written entirely by you; rather, the intent is to
+exercise the right to control the distribution of derivative or
+collective works based on the Program.
+
+In addition, mere aggregation of another work not based on the Program
+with the Program (or with a work based on the Program) on a volume of
+a storage or distribution medium does not bring the other work under
+the scope of this License.
+
+ 3. You may copy and distribute the Program (or a work based on it,
+under Section 2) in object code or executable form under the terms of
+Sections 1 and 2 above provided that you also do one of the following:
+
+ a) Accompany it with the complete corresponding machine-readable
+ source code, which must be distributed under the terms of Sections
+ 1 and 2 above on a medium customarily used for software interchange; or,
+
+ b) Accompany it with a written offer, valid for at least three
+ years, to give any third party, for a charge no more than your
+ cost of physically performing source distribution, a complete
+ machine-readable copy of the corresponding source code, to be
+ distributed under the terms of Sections 1 and 2 above on a medium
+ customarily used for software interchange; or,
+
+ c) Accompany it with the information you received as to the offer
+ to distribute corresponding source code. (This alternative is
+ allowed only for noncommercial distribution and only if you
+ received the program in object code or executable form with such
+ an offer, in accord with Subsection b above.)
+
+The source code for a work means the preferred form of the work for
+making modifications to it. For an executable work, complete source
+code means all the source code for all modules it contains, plus any
+associated interface definition files, plus the scripts used to
+control compilation and installation of the executable. However, as a
+special exception, the source code distributed need not include
+anything that is normally distributed (in either source or binary
+form) with the major components (compiler, kernel, and so on) of the
+operating system on which the executable runs, unless that component
+itself accompanies the executable.
+
+If distribution of executable or object code is made by offering
+access to copy from a designated place, then offering equivalent
+access to copy the source code from the same place counts as
+distribution of the source code, even though third parties are not
+compelled to copy the source along with the object code.
+
+ 4. You may not copy, modify, sublicense, or distribute the Program
+except as expressly provided under this License. Any attempt
+otherwise to copy, modify, sublicense or distribute the Program is
+void, and will automatically terminate your rights under this License.
+However, parties who have received copies, or rights, from you under
+this License will not have their licenses terminated so long as such
+parties remain in full compliance.
+
+ 5. You are not required to accept this License, since you have not
+signed it. However, nothing else grants you permission to modify or
+distribute the Program or its derivative works. These actions are
+prohibited by law if you do not accept this License. Therefore, by
+modifying or distributing the Program (or any work based on the
+Program), you indicate your acceptance of this License to do so, and
+all its terms and conditions for copying, distributing or modifying
+the Program or works based on it.
+
+ 6. Each time you redistribute the Program (or any work based on the
+Program), the recipient automatically receives a license from the
+original licensor to copy, distribute or modify the Program subject to
+these terms and conditions. You may not impose any further
+restrictions on the recipients' exercise of the rights granted herein.
+You are not responsible for enforcing compliance by third parties to
+this License.
+
+ 7. If, as a consequence of a court judgment or allegation of patent
+infringement or for any other reason (not limited to patent issues),
+conditions are imposed on you (whether by court order, agreement or
+otherwise) that contradict the conditions of this License, they do not
+excuse you from the conditions of this License. If you cannot
+distribute so as to satisfy simultaneously your obligations under this
+License and any other pertinent obligations, then as a consequence you
+may not distribute the Program at all. For example, if a patent
+license would not permit royalty-free redistribution of the Program by
+all those who receive copies directly or indirectly through you, then
+the only way you could satisfy both it and this License would be to
+refrain entirely from distribution of the Program.
+
+If any portion of this section is held invalid or unenforceable under
+any particular circumstance, the balance of the section is intended to
+apply and the section as a whole is intended to apply in other
+circumstances.
+
+It is not the purpose of this section to induce you to infringe any
+patents or other property right claims or to contest validity of any
+such claims; this section has the sole purpose of protecting the
+integrity of the free software distribution system, which is
+implemented by public license practices. Many people have made
+generous contributions to the wide range of software distributed
+through that system in reliance on consistent application of that
+system; it is up to the author/donor to decide if he or she is willing
+to distribute software through any other system and a licensee cannot
+impose that choice.
+
+This section is intended to make thoroughly clear what is believed to
+be a consequence of the rest of this License.
+
+ 8. If the distribution and/or use of the Program is restricted in
+certain countries either by patents or by copyrighted interfaces, the
+original copyright holder who places the Program under this License
+may add an explicit geographical distribution limitation excluding
+those countries, so that distribution is permitted only in or among
+countries not thus excluded. In such case, this License incorporates
+the limitation as if written in the body of this License.
+
+ 9. The Free Software Foundation may publish revised and/or new versions
+of the General Public License from time to time. Such new versions will
+be similar in spirit to the present version, but may differ in detail to
+address new problems or concerns.
+
+Each version is given a distinguishing version number. If the Program
+specifies a version number of this License which applies to it and "any
+later version", you have the option of following the terms and conditions
+either of that version or of any later version published by the Free
+Software Foundation. If the Program does not specify a version number of
+this License, you may choose any version ever published by the Free Software
+Foundation.
+
+ 10. If you wish to incorporate parts of the Program into other free
+programs whose distribution conditions are different, write to the author
+to ask for permission. For software which is copyrighted by the Free
+Software Foundation, write to the Free Software Foundation; we sometimes
+make exceptions for this. Our decision will be guided by the two goals
+of preserving the free status of all derivatives of our free software and
+of promoting the sharing and reuse of software generally.
+
+ NO WARRANTY
+
+ 11. BECAUSE THE PROGRAM IS LICENSED FREE OF CHARGE, THERE IS NO WARRANTY
+FOR THE PROGRAM, TO THE EXTENT PERMITTED BY APPLICABLE LAW. EXCEPT WHEN
+OTHERWISE STATED IN WRITING THE COPYRIGHT HOLDERS AND/OR OTHER PARTIES
+PROVIDE THE PROGRAM "AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESSED
+OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
+MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. THE ENTIRE RISK AS
+TO THE QUALITY AND PERFORMANCE OF THE PROGRAM IS WITH YOU. SHOULD THE
+PROGRAM PROVE DEFECTIVE, YOU ASSUME THE COST OF ALL NECESSARY SERVICING,
+REPAIR OR CORRECTION.
+
+ 12. IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING
+WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MAY MODIFY AND/OR
+REDISTRIBUTE THE PROGRAM AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES,
+INCLUDING ANY GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING
+OUT OF THE USE OR INABILITY TO USE THE PROGRAM (INCLUDING BUT NOT LIMITED
+TO LOSS OF DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY
+YOU OR THIRD PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITH ANY OTHER
+PROGRAMS), EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE
+POSSIBILITY OF SUCH DAMAGES.
+
+ END OF TERMS AND CONDITIONS
+
+ How to Apply These Terms to Your New Programs
+
+ If you develop a new program, and you want it to be of the greatest
+possible use to the public, the best way to achieve this is to make it
+free software which everyone can redistribute and change under these terms.
+
+ To do so, attach the following notices to the program. It is safest
+to attach them to the start of each source file to most effectively
+convey the exclusion of warranty; and each file should have at least
+the "copyright" line and a pointer to where the full notice is found.
+
+ <one line to give the program's name and a brief idea of what it does.>
+ Copyright (C) <year> <name of author>
+
+ This program is free software; you can redistribute it and/or modify
+ it under the terms of the GNU General Public License as published by
+ the Free Software Foundation; either version 2 of the License, or
+ (at your option) any later version.
+
+ This program is distributed in the hope that it will be useful,
+ but WITHOUT ANY WARRANTY; without even the implied warranty of
+ MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+ GNU General Public License for more details.
+
+ You should have received a copy of the GNU General Public License
+ along with this program; if not, write to the Free Software
+ Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
+
+
+Also add information on how to contact you by electronic and paper mail.
+
+If the program is interactive, make it output a short notice like this
+when it starts in an interactive mode:
+
+ Gnomovision version 69, Copyright (C) year name of author
+ Gnomovision comes with ABSOLUTELY NO WARRANTY; for details type `show w'.
+ This is free software, and you are welcome to redistribute it
+ under certain conditions; type `show c' for details.
+
+The hypothetical commands `show w' and `show c' should show the appropriate
+parts of the General Public License. Of course, the commands you use may
+be called something other than `show w' and `show c'; they could even be
+mouse-clicks or menu items--whatever suits your program.
+
+You should also get your employer (if you work as a programmer) or your
+school, if any, to sign a "copyright disclaimer" for the program, if
+necessary. Here is a sample; alter the names:
+
+ Yoyodyne, Inc., hereby disclaims all copyright interest in the program
+ `Gnomovision' (which makes passes at compilers) written by James Hacker.
+
+ <signature of Ty Coon>, 1 April 1989
+ Ty Coon, President of Vice
+
+This General Public License does not permit incorporating your program into
+proprietary programs. If your program is a subroutine library, you may
+consider it more useful to permit linking proprietary applications with the
+library. If this is what you want to do, use the GNU Library General
+Public License instead of this License.
diff --git a/6tunnel/ChangeLog b/6tunnel/ChangeLog
new file mode 100644
index 0000000..1eedadb
--- /dev/null
+++ b/6tunnel/ChangeLog
@@ -0,0 +1,93 @@
+0.11 (2013-05-25)
+
+Changes by Wojtek Kaniewski <wojtekka@toxygen.net>:
+- changed license to GPL version 2. There was no license information before
+ which caused confusion. Code by Tomasz Lipski <lemur@irc.pl> and awayzzz
+ <awayzzz@digibel.org> had to be removed, because their e-mail addresses
+ were dead and googling for them gave no useful information. The missing
+ features have been rewritten from scratch. If any offending code is still
+ here, please let me know. I've done my best, but I haven't used any
+ version control 5 years ago,
+- changed e-mail address,
+- ignore IPv4/IPv6 address hints when option -H is present.
+
+Changes by Ramunas Lukosevicius <lukoramu@parok.lt>
+- fixed source mapping bug,
+- SIGHUP reloads map file.
+
+Changes by Roland Stigge <stigge@antcom.de>
+- fix an error in the "hints" handling of the host resolver which confused
+ local/source and remote hint (AF_INET/AF_INET6).
+
+0.10 (2003-06-12)
+
+Changes by Wojtek Kaniewski <wojtekka@irc.pl>:
+- major code cleanup,
+- select() before accept(), so 6tunnel won't hang on sys_socketcall.
+- fixed losing data under heavy load, when write() didn't send all
+ data. unsent data is stored in a buffer,
+- autoconf,
+- supports pid file (idea by misio <monster@qm.pl>).
+
+0.09 (2001-10-18)
+
+Changes by Wojtek Kaniewski <wojtekka@irc.pl>:
+- included patch from OpenBSD port by Patroklos Argyroudis <argp@bsd.gr>.
+- fixing the fix - patch by awayzzz <awayzzz@digibel.org>.
+
+0.08 (2001-10-13)
+
+Changes by Dariusz Jackowski <ascent@linux.pl>:
+- modified IPv4 to IPv6 mapping -- better memory managing.
+
+Changes by Wojtek Kaniewski <wojtekka@irc.pl>:
+- some memory leaks fixed thanks to Sorrow The Prince <s0tp@libero.it>.
+- fixed dos condition thanks to awayzzz <awayzzz@digibel.org>.
+
+0.07 (2000-11-19)
+
+Changes by Tomasz Lipski <lemur@irc.pl>:
+- added IPv4 to IPv6 mapping table for binding to different IPv6 addresses,
+- fixed multiple connections handling for BSD,
+- fixed manpage installation path.
+
+Changes by Wojtek Kaniewski <wojtekka@irc.pl>:
+- fixed some typos,
+- connection limit (-L),
+- changes installation prefix from /usr to /usr/local.
+
+0.06 (2000-09-11)
+
+Changes by Wojtek Kaniewski <wojtekka@irc.pl>:
+- added -u, quick patch.
+
+0.05 (2000-06-25)
+
+Changes by Wojtek Kaniewski <wojtekka@irc.pl>:
+- added shadowing of args which store -i or -I passwords,
+- added changelog (huh, that was the most difficult part ;)),
+- fixed Makefile to compile propertly on BSD with native IPv6 support
+ (FreeBSD 4.0 for example).
+
+0.04 (2000-02-24)
+
+Changes by Wojtek Kaniewski <wojtekka@irc.pl>:
+- added irc proxy,
+- added hexdump of forwaded packets.
+
+0.03 (2000-02-01)
+
+Changes by Wojtek Kaniewski <wojtekka@irc.pl>:
+- added listening on IPv4 address,
+- added man page,
+- almost complete rewrite.
+
+0.02 (2000-01-13)
+
+Changes by Wojtek Kaniewski <wojtekka@irc.pl>:
+- added detaching, verbose mode.
+
+0.01 (2000-01-12)
+
+Initial release.
+
diff --git a/6tunnel/Makefile.am b/6tunnel/Makefile.am
new file mode 100644
index 0000000..c24cb9d
--- /dev/null
+++ b/6tunnel/Makefile.am
@@ -0,0 +1,7 @@
+
+bin_PROGRAMS = 6tunnel
+
+6tunnel_SOURCES = 6tunnel.c
+
+
+
diff --git a/6tunnel/TODO b/6tunnel/TODO
new file mode 100644
index 0000000..90eb215
--- /dev/null
+++ b/6tunnel/TODO
@@ -0,0 +1,2 @@
+Resolve all names after startup -- Simonas Kareiva <simonas@vusa.lt>
+UDP tunneling -- Nuno Amorim <na.amorim@gmail.com>
diff --git a/6tunnel/autogen.sh b/6tunnel/autogen.sh
new file mode 100755
index 0000000..4a37ee1
--- /dev/null
+++ b/6tunnel/autogen.sh
@@ -0,0 +1,3 @@
+#!/bin/sh
+autoreconf --install
+test x$NOCONFIGURE = x && ./configure
diff --git a/6tunnel/configure.ac b/6tunnel/configure.ac
new file mode 100644
index 0000000..94fea49
--- /dev/null
+++ b/6tunnel/configure.ac
@@ -0,0 +1,36 @@
+AC_INIT([6tunnel],[0.10],[])
+AM_INIT_AUTOMAKE([foreign silent-rules subdir-objects tar-pax])
+AC_PROG_CC
+AC_PROG_INSTALL
+AC_PROG_MAKE_SET
+AC_PATH_PROG(STRIP, strip, :)
+
+test -d /usr/local/v6/lib && LIBS="$LIBS -L/usr/local/v6/lib"
+test -d /usr/inet6/lib && LIBS="$LIBS -L/usr/inet6/lib"
+test -d /usr/local/inet6/lib && LIBS="$LIBS -L/usr/local/inet6/lib"
+
+AC_CHECK_LIB(nsl, t_accept, LIBS="$LIBS -lnsl")
+AC_CHECK_LIB(socket, socket, LIBS="$LIBS -lsocket")
+AC_CHECK_LIB(inet6, main, LIBS="$LIBS -linet6")
+
+AC_STDC_HEADERS
+AC_HAVE_HEADERS(sys/socket.h netinet/in.h arpa/inet.h netdb.h, , AC_MSG_ERROR([Socket related headers missing.]))
+AC_CHECK_FUNCS(getaddrinfo, , AC_MSG_ERROR([Your system doesn't support IPv6.]))
+
+AC_MSG_CHECKING([for AF_INET6])
+AC_TRY_COMPILE([#include <netinet/in.h>], [int x = AF_INET6;], [
+ AC_MSG_RESULT(yes)
+], [
+ AC_MSG_RESULT(no)
+ AC_MSG_ERROR([Your system doesn't support IPv6.])
+])
+
+AC_SUBST(VERSION)
+VERSION=`grep '6tunnel v' 6tunnel.c | sed 's/.*v//'`
+
+AC_CONFIG_FILES([
+ Makefile
+])
+
+AC_OUTPUT
+
diff --git a/6tunnel/contrib/cron.sh b/6tunnel/contrib/cron.sh
new file mode 100755
index 0000000..57865af
--- /dev/null
+++ b/6tunnel/contrib/cron.sh
@@ -0,0 +1,48 @@
+#!/bin/sh
+#
+# This is a script for use in crontab.
+#
+# To check for your 6tunnel every 10 minutes,
+# put this line in your crontab:
+# 0,10,20,30,40,50 * * * * /home/yourdir/6tunnel/cron.sh >/dev/null 2>&1
+#
+
+### CONFIG ###
+
+# Path to 6tunnel
+T6PATH="/home/misio/6tunnel"
+
+# Real 6tunnel file name
+T6BIN="6tunnel"
+
+# Start options
+T6OPTIONS="-4 -s very.nice.host.pl -i secretpass 19999 poznan.irc.pl 6666"
+
+# Name of pidfile
+T6PIDFILE="6tunnel.pid"
+
+### CODE ###
+
+cd $T6PATH
+if test -r $T6PATH/$T6PIDFILE; then
+ MYPID=$(cat $T6PATH/$T6PIDFILE)
+ if $(kill -CHLD $MYPID >/dev/null 2>&1)
+ then
+ exit 0
+ fi
+ echo ""
+ echo "erasing old PID file"
+ rm -f $T6PATH/$T6PIDFILE
+fi
+
+echo ""
+echo "6tunnel not running, restarting..."
+echo ""
+
+if test -x $T6BIN ;then
+ $T6PATH/$T6BIN -p $T6PIDFILE $T6OPTIONS
+ exit 0
+fi
+
+echo "error restarting 6tunnel"
+
diff --git a/6tunnel/install-sh b/6tunnel/install-sh
new file mode 100755
index 0000000..e9de238
--- /dev/null
+++ b/6tunnel/install-sh
@@ -0,0 +1,251 @@
+#!/bin/sh
+#
+# install - install a program, script, or datafile
+# This comes from X11R5 (mit/util/scripts/install.sh).
+#
+# Copyright 1991 by the Massachusetts Institute of Technology
+#
+# Permission to use, copy, modify, distribute, and sell this software and its
+# documentation for any purpose is hereby granted without fee, provided that
+# the above copyright notice appear in all copies and that both that
+# copyright notice and this permission notice appear in supporting
+# documentation, and that the name of M.I.T. not be used in advertising or
+# publicity pertaining to distribution of the software without specific,
+# written prior permission. M.I.T. makes no representations about the
+# suitability of this software for any purpose. It is provided "as is"
+# without express or implied warranty.
+#
+# Calling this script install-sh is preferred over install.sh, to prevent
+# `make' implicit rules from creating a file called install from it
+# when there is no Makefile.
+#
+# This script is compatible with the BSD install script, but was written
+# from scratch. It can only install one file at a time, a restriction
+# shared with many OS's install programs.
+
+
+# set DOITPROG to echo to test this script
+
+# Don't use :- since 4.3BSD and earlier shells don't like it.
+doit="${DOITPROG-}"
+
+
+# put in absolute paths if you don't have them in your path; or use env. vars.
+
+mvprog="${MVPROG-mv}"
+cpprog="${CPPROG-cp}"
+chmodprog="${CHMODPROG-chmod}"
+chownprog="${CHOWNPROG-chown}"
+chgrpprog="${CHGRPPROG-chgrp}"
+stripprog="${STRIPPROG-strip}"
+rmprog="${RMPROG-rm}"
+mkdirprog="${MKDIRPROG-mkdir}"
+
+transformbasename=""
+transform_arg=""
+instcmd="$mvprog"
+chmodcmd="$chmodprog 0755"
+chowncmd=""
+chgrpcmd=""
+stripcmd=""
+rmcmd="$rmprog -f"
+mvcmd="$mvprog"
+src=""
+dst=""
+dir_arg=""
+
+while [ x"$1" != x ]; do
+ case $1 in
+ -c) instcmd="$cpprog"
+ shift
+ continue;;
+
+ -d) dir_arg=true
+ shift
+ continue;;
+
+ -m) chmodcmd="$chmodprog $2"
+ shift
+ shift
+ continue;;
+
+ -o) chowncmd="$chownprog $2"
+ shift
+ shift
+ continue;;
+
+ -g) chgrpcmd="$chgrpprog $2"
+ shift
+ shift
+ continue;;
+
+ -s) stripcmd="$stripprog"
+ shift
+ continue;;
+
+ -t=*) transformarg=`echo $1 | sed 's/-t=//'`
+ shift
+ continue;;
+
+ -b=*) transformbasename=`echo $1 | sed 's/-b=//'`
+ shift
+ continue;;
+
+ *) if [ x"$src" = x ]
+ then
+ src=$1
+ else
+ # this colon is to work around a 386BSD /bin/sh bug
+ :
+ dst=$1
+ fi
+ shift
+ continue;;
+ esac
+done
+
+if [ x"$src" = x ]
+then
+ echo "install: no input file specified"
+ exit 1
+else
+ true
+fi
+
+if [ x"$dir_arg" != x ]; then
+ dst=$src
+ src=""
+
+ if [ -d $dst ]; then
+ instcmd=:
+ chmodcmd=""
+ else
+ instcmd=mkdir
+ fi
+else
+
+# Waiting for this to be detected by the "$instcmd $src $dsttmp" command
+# might cause directories to be created, which would be especially bad
+# if $src (and thus $dsttmp) contains '*'.
+
+ if [ -f $src -o -d $src ]
+ then
+ true
+ else
+ echo "install: $src does not exist"
+ exit 1
+ fi
+
+ if [ x"$dst" = x ]
+ then
+ echo "install: no destination specified"
+ exit 1
+ else
+ true
+ fi
+
+# If destination is a directory, append the input filename; if your system
+# does not like double slashes in filenames, you may need to add some logic
+
+ if [ -d $dst ]
+ then
+ dst="$dst"/`basename $src`
+ else
+ true
+ fi
+fi
+
+## this sed command emulates the dirname command
+dstdir=`echo $dst | sed -e 's,[^/]*$,,;s,/$,,;s,^$,.,'`
+
+# Make sure that the destination directory exists.
+# this part is taken from Noah Friedman's mkinstalldirs script
+
+# Skip lots of stat calls in the usual case.
+if [ ! -d "$dstdir" ]; then
+defaultIFS='
+'
+IFS="${IFS-${defaultIFS}}"
+
+oIFS="${IFS}"
+# Some sh's can't handle IFS=/ for some reason.
+IFS='%'
+set - `echo ${dstdir} | sed -e 's@/@%@g' -e 's@^%@/@'`
+IFS="${oIFS}"
+
+pathcomp=''
+
+while [ $# -ne 0 ] ; do
+ pathcomp="${pathcomp}${1}"
+ shift
+
+ if [ ! -d "${pathcomp}" ] ;
+ then
+ $mkdirprog "${pathcomp}"
+ else
+ true
+ fi
+
+ pathcomp="${pathcomp}/"
+done
+fi
+
+if [ x"$dir_arg" != x ]
+then
+ $doit $instcmd $dst &&
+
+ if [ x"$chowncmd" != x ]; then $doit $chowncmd $dst; else true ; fi &&
+ if [ x"$chgrpcmd" != x ]; then $doit $chgrpcmd $dst; else true ; fi &&
+ if [ x"$stripcmd" != x ]; then $doit $stripcmd $dst; else true ; fi &&
+ if [ x"$chmodcmd" != x ]; then $doit $chmodcmd $dst; else true ; fi
+else
+
+# If we're going to rename the final executable, determine the name now.
+
+ if [ x"$transformarg" = x ]
+ then
+ dstfile=`basename $dst`
+ else
+ dstfile=`basename $dst $transformbasename |
+ sed $transformarg`$transformbasename
+ fi
+
+# don't allow the sed command to completely eliminate the filename
+
+ if [ x"$dstfile" = x ]
+ then
+ dstfile=`basename $dst`
+ else
+ true
+ fi
+
+# Make a temp file name in the proper directory.
+
+ dsttmp=$dstdir/#inst.$$#
+
+# Move or copy the file name to the temp name
+
+ $doit $instcmd $src $dsttmp &&
+
+ trap "rm -f ${dsttmp}" 0 &&
+
+# and set any options; do chmod last to preserve setuid bits
+
+# If any of these fail, we abort the whole thing. If we want to
+# ignore errors from any of these, just make sure not to ignore
+# errors from the above "$doit $instcmd $src $dsttmp" command.
+
+ if [ x"$chowncmd" != x ]; then $doit $chowncmd $dsttmp; else true;fi &&
+ if [ x"$chgrpcmd" != x ]; then $doit $chgrpcmd $dsttmp; else true;fi &&
+ if [ x"$stripcmd" != x ]; then $doit $stripcmd $dsttmp; else true;fi &&
+ if [ x"$chmodcmd" != x ]; then $doit $chmodcmd $dsttmp; else true;fi &&
+
+# Now rename the file to the real destination.
+
+ $doit $rmcmd -f $dstdir/$dstfile &&
+ $doit $mvcmd $dsttmp $dstdir/$dstfile
+
+fi &&
+
+
+exit 0
diff --git a/Makefile b/Makefile
new file mode 100644
index 0000000..c735c61
--- /dev/null
+++ b/Makefile
@@ -0,0 +1,93 @@
+#
+# Copyright (c) 2015 Nest, Inc.
+# All rights reserved.
+#
+# This document is the property of Nest. It is considered
+# confidential and proprietary information.
+#
+# This document may not be reproduced or transmitted in any form,
+# in whole or in part, without the express written permission of
+# Nest.
+#
+# Description: This file is the makefile for the 6tunnel, a utility
+# to forward TCP connections between ipv6 and ipv4
+#
+
+BuildConfigSpecialized := No
+BuildProductSpecialized := No
+
+include pre.mak
+
+PackageName := 6tunnel
+
+PackageSourceDir := $(PackageName)
+
+PackageBuildMakefile = $(call GenerateBuildPaths,Makefile)
+
+CleanPaths += $(PackageLicenseFile)
+
+all: $(PackageDefaultGoal)
+
+# Generate the package license contents.
+
+$(PackageSourceDir)/COPYING: source
+
+$(PackageLicenseFile): $(PackageSourceDir)/COPYING
+ $(copy-result)
+
+# Extract the source from the archive and apply patches, if any.
+
+$(PackageSourceDir): $(PackageArchive)
+ $(expand-and-patch-package)
+
+# Prepare the sources.
+
+.PHONY: source
+source: | $(PackageSourceDir)
+
+# Patch the sources, if necessary.
+
+.PHONY: patch
+patch: source
+
+# Generate the package build makefile.
+
+$(PackageBuildMakefile): | $(PackageSourceDir) $(BuildDirectory) $(ResultDirectory)
+ $(Verbose)pushd $(PackageSourceDir) && autoreconf --install && popd && cd $(BuildDirectory) && \
+ $(CURDIR)/$(PackageSourceDir)/configure \
+ CC="$(CC)" AR=$(AR) RANLIB=$(RANLIB) STRIP=$(STRIP) \
+ INSTALL="$(INSTALL) $(INSTALLFLAGS)" \
+ --build=$(HostTuple) \
+ --host=$(TargetTuple) \
+ --prefix=/usr \
+ --sysconfdir=/etc \
+ --localstatedir=/var \
+
+# Configure the source for building.
+
+.PHONY: configure
+configure: source $(PackageBuildMakefile)
+
+# Build the source.
+#
+# We have to unset MAKEFLAGS since they confuse the package build otherwise.
+
+.PHONY: build
+build: configure
+ $(Verbose)unset MAKEFLAGS && \
+ $(MAKE) $(JOBSFLAG) -C $(BuildDirectory) all
+
+# Stage the build to a temporary installation area.
+#
+# We have to unset MAKEFLAGS since they confuse the package build otherwise.
+
+.PHONY: stage
+stage: build | $(ResultDirectory)
+ $(Verbose)unset MAKEFLAGS && \
+ $(MAKE) $(JOBSFLAG) -C $(BuildDirectory) DESTDIR=$(ResultDirectory) install
+
+clean:
+ $(Verbose)$(RM) $(RMFLAGS) -r $(BuildDirectory)
+ $(Verbose)$(RM) $(RMFLAGS) -r $(ResultDirectory)
+
+include post.mak