| File: | src/usr.sbin/dhcrelay6/dhcrelay6.c |
| Warning: | line 378, column 8 Access to field 'ipv6' results in a dereference of a null pointer (loaded from field 'intf') |
Press '?' to see keyboard shortcuts
Keyboard shortcuts:
| 1 | /* $OpenBSD: dhcrelay6.c,v 1.4 2021/10/24 21:24:18 deraadt Exp $ */ | |||
| 2 | ||||
| 3 | /* | |||
| 4 | * Copyright (c) 2017 Rafael Zalamena <rzalamena@openbsd.org> | |||
| 5 | * Copyright (c) 2004 Henning Brauer <henning@cvs.openbsd.org> | |||
| 6 | * Copyright (c) 1997, 1998, 1999 The Internet Software Consortium. | |||
| 7 | * All rights reserved. | |||
| 8 | * | |||
| 9 | * Redistribution and use in source and binary forms, with or without | |||
| 10 | * modification, are permitted provided that the following conditions | |||
| 11 | * are met: | |||
| 12 | * | |||
| 13 | * 1. Redistributions of source code must retain the above copyright | |||
| 14 | * notice, this list of conditions and the following disclaimer. | |||
| 15 | * 2. Redistributions in binary form must reproduce the above copyright | |||
| 16 | * notice, this list of conditions and the following disclaimer in the | |||
| 17 | * documentation and/or other materials provided with the distribution. | |||
| 18 | * 3. Neither the name of The Internet Software Consortium nor the names | |||
| 19 | * of its contributors may be used to endorse or promote products derived | |||
| 20 | * from this software without specific prior written permission. | |||
| 21 | * | |||
| 22 | * THIS SOFTWARE IS PROVIDED BY THE INTERNET SOFTWARE CONSORTIUM AND | |||
| 23 | * CONTRIBUTORS ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, | |||
| 24 | * INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF | |||
| 25 | * MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE | |||
| 26 | * DISCLAIMED. IN NO EVENT SHALL THE INTERNET SOFTWARE CONSORTIUM OR | |||
| 27 | * CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, | |||
| 28 | * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT | |||
| 29 | * LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF | |||
| 30 | * USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND | |||
| 31 | * ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, | |||
| 32 | * OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT | |||
| 33 | * OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF | |||
| 34 | * SUCH DAMAGE. | |||
| 35 | * | |||
| 36 | * This software has been written for the Internet Software Consortium | |||
| 37 | * by Ted Lemon <mellon@fugue.com> in cooperation with Vixie | |||
| 38 | * Enterprises. To learn more about the Internet Software Consortium, | |||
| 39 | * see ``http://www.vix.com/isc''. To learn more about Vixie | |||
| 40 | * Enterprises, see ``http://www.vix.com''. | |||
| 41 | */ | |||
| 42 | ||||
| 43 | #include <sys/socket.h> | |||
| 44 | ||||
| 45 | #include <arpa/inet.h> | |||
| 46 | ||||
| 47 | #include <net/if.h> | |||
| 48 | #include <netinet/in.h> | |||
| 49 | #include <netinet/ip.h> | |||
| 50 | #include <netinet/ip6.h> | |||
| 51 | #include <netinet/udp.h> | |||
| 52 | #include <netinet/if_ether.h> | |||
| 53 | ||||
| 54 | #include <errno(*__errno()).h> | |||
| 55 | #include <fcntl.h> | |||
| 56 | #include <netdb.h> | |||
| 57 | #include <paths.h> | |||
| 58 | #include <pwd.h> | |||
| 59 | #include <stdarg.h> | |||
| 60 | #include <stdlib.h> | |||
| 61 | #include <stdio.h> | |||
| 62 | #include <stdint.h> | |||
| 63 | #include <string.h> | |||
| 64 | #include <syslog.h> | |||
| 65 | #include <time.h> | |||
| 66 | #include <unistd.h> | |||
| 67 | ||||
| 68 | #include "dhcp.h" | |||
| 69 | #include "dhcpd.h" | |||
| 70 | #include "log.h" | |||
| 71 | ||||
| 72 | /* | |||
| 73 | * RFC 3315 Section 5.1 Multicast Addresses: | |||
| 74 | * All_DHCP_Relay_Agents_and_Servers: FF02::1:2 | |||
| 75 | * All_DHCP_Servers: FF05::1:3 | |||
| 76 | */ | |||
| 77 | struct in6_addr in6alldhcprelay = { | |||
| 78 | {{ 0xff, 0x02, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0x01, 0, 0x02 }} | |||
| 79 | }; | |||
| 80 | struct in6_addr in6alldhcp = { | |||
| 81 | {{ 0xff, 0x05, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0x01, 0, 0x03 }} | |||
| 82 | }; | |||
| 83 | ||||
| 84 | __dead__attribute__((__noreturn__)) void usage(void); | |||
| 85 | struct server_list *parse_destination(const char *); | |||
| 86 | int rdaemon(int); | |||
| 87 | void relay6_setup(void); | |||
| 88 | int s6fromaddr(struct sockaddr_in6 *, const char *, const char *, int); | |||
| 89 | char *print_hw_addr(int, int, unsigned char *); | |||
| 90 | const char *dhcp6type2str(uint8_t); | |||
| 91 | int relay6_pushrelaymsg(struct packet_ctx *, struct interface_info *, | |||
| 92 | uint8_t *, size_t *, size_t); | |||
| 93 | int relay6_poprelaymsg(struct packet_ctx *, struct interface_info **, | |||
| 94 | uint8_t *, size_t *); | |||
| 95 | void rai_configure(struct packet_ctx *, struct interface_info *); | |||
| 96 | void relay6_logsrcaddr(struct packet_ctx *, struct interface_info *, | |||
| 97 | uint8_t); | |||
| 98 | void relay6(struct interface_info *, void *, size_t, | |||
| 99 | struct packet_ctx *); | |||
| 100 | void mcast6_recv(struct protocol *); | |||
| 101 | ||||
| 102 | /* Shared variables */ | |||
| 103 | int clientsd; | |||
| 104 | int serversd; | |||
| 105 | int oflag; | |||
| 106 | time_t cur_time; | |||
| 107 | ||||
| 108 | struct intfq intflist; | |||
| 109 | struct serverq svlist; | |||
| 110 | struct interface_info *interfaces; | |||
| 111 | char *rai_data; | |||
| 112 | size_t rai_datalen; | |||
| 113 | uint32_t enterpriseno = OPENBSD_ENTERPRISENO30155; | |||
| 114 | char *remote_data; | |||
| 115 | size_t remote_datalen; | |||
| 116 | enum dhcp_relay_mode drm = DRM_LAYER3; | |||
| 117 | ||||
| 118 | __dead__attribute__((__noreturn__)) void | |||
| 119 | usage(void) | |||
| 120 | { | |||
| 121 | extern char *__progname; | |||
| 122 | ||||
| 123 | fprintf(stderr(&__sF[2]), "usage: %s [-dlov] [-E enterprise-number] " | |||
| 124 | "[-I interface-id] [-R remote-id]\n" | |||
| 125 | "\t-i interface destination ...\n", | |||
| 126 | __progname); | |||
| 127 | exit(1); | |||
| 128 | } | |||
| 129 | ||||
| 130 | struct server_list * | |||
| 131 | parse_destination(const char *dest) | |||
| 132 | { | |||
| 133 | struct server_list *sp; | |||
| 134 | const char *ifname; | |||
| 135 | char buf[128]; | |||
| 136 | ||||
| 137 | if ((sp = calloc(1, sizeof(*sp))) == NULL((void *)0)) | |||
| 138 | fatal("calloc"); | |||
| 139 | TAILQ_INSERT_HEAD(&svlist, sp, entry)do { if (((sp)->entry.tqe_next = (&svlist)->tqh_first ) != ((void *)0)) (&svlist)->tqh_first->entry.tqe_prev = &(sp)->entry.tqe_next; else (&svlist)->tqh_last = &(sp)->entry.tqe_next; (&svlist)->tqh_first = (sp); (sp)->entry.tqe_prev = &(&svlist)->tqh_first ; } while (0); | |||
| 140 | ||||
| 141 | /* Detect interface only destinations. */ | |||
| 142 | if ((sp->intf = iflist_getbyname(dest)) != NULL((void *)0)) | |||
| 143 | return sp; | |||
| 144 | ||||
| 145 | /* Split address from interface and save it. */ | |||
| 146 | ifname = strchr(dest, '%'); | |||
| 147 | if (ifname == NULL((void *)0)) | |||
| 148 | fatalx("%s doesn't specify an output interface", dest); | |||
| 149 | ||||
| 150 | if (strlcpy(buf, dest, sizeof(buf)) >= sizeof(buf)) | |||
| 151 | fatalx("%s is an invalid IPv6 address", dest); | |||
| 152 | ||||
| 153 | /* Remove '%' from the address string. */ | |||
| 154 | buf[ifname - dest] = 0; | |||
| 155 | if ((sp->intf = iflist_getbyname(ifname + 1)) == NULL((void *)0)) | |||
| 156 | fatalx("interface '%s' not found", ifname); | |||
| 157 | if (s6fromaddr(ss2sin6(&sp->to), buf, | |||
| 158 | DHCP6_SERVER_PORT_STR"547", 1) == -1) | |||
| 159 | fatalx("%s: unknown host", buf); | |||
| 160 | ||||
| 161 | /* | |||
| 162 | * User configured a non-local address, we must require a | |||
| 163 | * proper address to route this. | |||
| 164 | */ | |||
| 165 | if (!IN6_IS_ADDR_LINKLOCAL(&ss2sin6(&sp->to)->sin6_addr)(((&ss2sin6(&sp->to)->sin6_addr)->__u6_addr. __u6_addr8[0] == 0xfe) && (((&ss2sin6(&sp-> to)->sin6_addr)->__u6_addr.__u6_addr8[1] & 0xc0) == 0x80))) | |||
| 166 | sp->siteglobaladdr = 1; | |||
| 167 | ||||
| 168 | return sp; | |||
| 169 | } | |||
| 170 | ||||
| 171 | int | |||
| 172 | main(int argc, char *argv[]) | |||
| 173 | { | |||
| 174 | int devnull = -1, daemonize = 1, debug = 0; | |||
| 175 | const char *errp; | |||
| 176 | struct passwd *pw; | |||
| 177 | int ch; | |||
| 178 | ||||
| 179 | log_init(1, LOG_DAEMON(3<<3)); /* log to stderr until daemonized */ | |||
| 180 | log_setverbose(1); | |||
| 181 | ||||
| 182 | setup_iflist(); | |||
| 183 | ||||
| 184 | while ((ch = getopt(argc, argv, "dE:I:i:loR:v")) != -1) { | |||
| ||||
| 185 | switch (ch) { | |||
| 186 | case 'd': | |||
| 187 | daemonize = 0; | |||
| 188 | break; | |||
| 189 | case 'E': | |||
| 190 | enterpriseno = strtonum(optarg, 1, UINT32_MAX0xffffffffU, &errp); | |||
| 191 | if (errp != NULL((void *)0)) | |||
| 192 | fatalx("invalid enterprise number: %s", errp); | |||
| 193 | break; | |||
| 194 | case 'I': | |||
| 195 | rai_data = optarg; | |||
| 196 | rai_datalen = strlen(optarg); | |||
| 197 | if (rai_datalen == 0) | |||
| 198 | fatalx("can't use empty Interface-ID"); | |||
| 199 | break; | |||
| 200 | case 'i': | |||
| 201 | if (interfaces != NULL((void *)0)) | |||
| 202 | usage(); | |||
| 203 | ||||
| 204 | interfaces = iflist_getbyname(optarg); | |||
| 205 | if (interfaces == NULL((void *)0)) | |||
| 206 | fatalx("interface '%s' not found", optarg); | |||
| 207 | break; | |||
| 208 | case 'l': | |||
| 209 | drm = DRM_LAYER2; | |||
| 210 | break; | |||
| 211 | case 'o': | |||
| 212 | oflag = 1; | |||
| 213 | break; | |||
| 214 | case 'R': | |||
| 215 | remote_data = optarg; | |||
| 216 | remote_datalen = strlen(remote_data); | |||
| 217 | if (remote_datalen == 0) | |||
| 218 | fatalx("can't use empty Remote-ID"); | |||
| 219 | break; | |||
| 220 | case 'v': | |||
| 221 | daemonize = 0; | |||
| 222 | debug = 1; | |||
| 223 | break; | |||
| 224 | ||||
| 225 | default: | |||
| 226 | usage(); | |||
| 227 | } | |||
| 228 | } | |||
| 229 | ||||
| 230 | argc -= optind; | |||
| 231 | argv += optind; | |||
| 232 | while (argc > 0) { | |||
| 233 | parse_destination(argv[0]); | |||
| 234 | argc--; | |||
| 235 | argv++; | |||
| 236 | } | |||
| 237 | ||||
| 238 | if (daemonize
| |||
| 239 | devnull = open(_PATH_DEVNULL"/dev/null", O_RDWR0x0002); | |||
| 240 | if (devnull == -1) | |||
| 241 | fatal("open(%s)", _PATH_DEVNULL"/dev/null"); | |||
| 242 | } | |||
| 243 | if (interfaces == NULL((void *)0)) | |||
| 244 | fatalx("no interface given"); | |||
| 245 | if (TAILQ_EMPTY(&svlist)(((&svlist)->tqh_first) == ((void *)0))) | |||
| 246 | fatalx("no destination selected"); | |||
| 247 | ||||
| 248 | relay6_setup(); | |||
| 249 | bootp_packet_handler = relay6; | |||
| 250 | ||||
| 251 | tzset(); | |||
| 252 | time(&cur_time); | |||
| 253 | ||||
| 254 | if ((pw = getpwnam(DHCRELAY6_USER"_dhcp")) == NULL((void *)0)) | |||
| 255 | fatalx("user \"%s\" not found", DHCRELAY6_USER"_dhcp"); | |||
| 256 | if (chroot(pw->pw_dir) == -1) | |||
| 257 | fatal("chroot"); | |||
| 258 | if (chdir("/") == -1) | |||
| 259 | fatal("chdir(\"/\")"); | |||
| 260 | if (setgroups(1, &pw->pw_gid) || | |||
| 261 | setresgid(pw->pw_gid, pw->pw_gid, pw->pw_gid) || | |||
| 262 | setresuid(pw->pw_uid, pw->pw_uid, pw->pw_uid)) | |||
| 263 | fatal("can't drop privileges"); | |||
| 264 | ||||
| 265 | if (daemonize) { | |||
| 266 | if (rdaemon(devnull) == -1) | |||
| 267 | fatal("rdaemon"); | |||
| 268 | } | |||
| 269 | log_init(daemonize == 0, LOG_DAEMON(3<<3)); /* stop loggoing to stderr */ | |||
| 270 | log_setverbose(debug); | |||
| 271 | ||||
| 272 | if (pledge("inet stdio route", NULL((void *)0)) == -1) | |||
| 273 | fatalx("pledge"); | |||
| 274 | ||||
| 275 | dispatch(); | |||
| 276 | /* not reached */ | |||
| 277 | ||||
| 278 | exit(0); | |||
| 279 | } | |||
| 280 | ||||
| 281 | int | |||
| 282 | rdaemon(int devnull) | |||
| 283 | { | |||
| 284 | if (devnull == -1) { | |||
| 285 | errno(*__errno()) = EBADF9; | |||
| 286 | return (-1); | |||
| 287 | } | |||
| 288 | if (fcntl(devnull, F_GETFL3) == -1) | |||
| 289 | return (-1); | |||
| 290 | ||||
| 291 | switch (fork()) { | |||
| 292 | case -1: | |||
| 293 | return (-1); | |||
| 294 | case 0: | |||
| 295 | break; | |||
| 296 | default: | |||
| 297 | _exit(0); | |||
| 298 | } | |||
| 299 | ||||
| 300 | if (setsid() == -1) | |||
| 301 | return (-1); | |||
| 302 | ||||
| 303 | (void)dup2(devnull, STDIN_FILENO0); | |||
| 304 | (void)dup2(devnull, STDOUT_FILENO1); | |||
| 305 | (void)dup2(devnull, STDERR_FILENO2); | |||
| 306 | if (devnull > 2) | |||
| 307 | (void)close(devnull); | |||
| 308 | ||||
| 309 | return (0); | |||
| 310 | } | |||
| 311 | ||||
| 312 | int | |||
| 313 | s6fromaddr(struct sockaddr_in6 *sin6, const char *addr, const char *serv, | |||
| 314 | int passive) | |||
| 315 | { | |||
| 316 | struct sockaddr_in6 *sin6p; | |||
| 317 | struct addrinfo *aip; | |||
| 318 | struct addrinfo ai; | |||
| 319 | int rv; | |||
| 320 | ||||
| 321 | memset(&ai, 0, sizeof(ai)); | |||
| 322 | ai.ai_family = PF_INET624; | |||
| 323 | ai.ai_socktype = SOCK_DGRAM2; | |||
| 324 | ai.ai_protocol = IPPROTO_UDP17; | |||
| 325 | ai.ai_flags = (passive) ? AI_PASSIVE1 : 0; | |||
| 326 | if ((rv = getaddrinfo(addr, serv, &ai, &aip)) != 0) { | |||
| 327 | log_debug("getaddrinfo: %s", gai_strerror(rv)); | |||
| 328 | return -1; | |||
| 329 | } | |||
| 330 | ||||
| 331 | sin6p = (struct sockaddr_in6 *)aip->ai_addr; | |||
| 332 | *sin6 = *sin6p; | |||
| 333 | ||||
| 334 | freeaddrinfo(aip); | |||
| 335 | ||||
| 336 | return 0; | |||
| 337 | } | |||
| 338 | ||||
| 339 | void | |||
| 340 | relay6_setup(void) | |||
| 341 | { | |||
| 342 | struct interface_info *intf; | |||
| 343 | struct server_list *sp; | |||
| 344 | int flag = 1; | |||
| 345 | struct sockaddr_in6 sin6; | |||
| 346 | struct ipv6_mreq mreq6; | |||
| 347 | ||||
| 348 | /* Don't allow disabled interfaces. */ | |||
| 349 | TAILQ_FOREACH(sp, &svlist, entry)for((sp) = ((&svlist)->tqh_first); (sp) != ((void *)0) ; (sp) = ((sp)->entry.tqe_next)) { | |||
| 350 | if (sp->intf == NULL((void *)0)) | |||
| 351 | continue; | |||
| 352 | ||||
| 353 | if (sp->intf->dead) | |||
| 354 | fatalx("interface '%s' is down", sp->intf->name); | |||
| 355 | } | |||
| 356 | ||||
| 357 | /* Check for layer 2 dependencies. */ | |||
| 358 | if (drm
| |||
| 359 | TAILQ_FOREACH(sp, &svlist, entry)for((sp) = ((&svlist)->tqh_first); (sp) != ((void *)0) ; (sp) = ((sp)->entry.tqe_next)) { | |||
| 360 | sp->intf = register_interface(sp->intf->name, | |||
| 361 | got_one); | |||
| 362 | if (sp->intf == NULL((void *)0)) | |||
| 363 | fatalx("destination interface " | |||
| 364 | "registration failed"); | |||
| 365 | } | |||
| 366 | interfaces = register_interface(interfaces->name, got_one); | |||
| 367 | if (interfaces == NULL((void *)0)) | |||
| 368 | fatalx("input interface not configured"); | |||
| 369 | ||||
| 370 | return; | |||
| 371 | } | |||
| 372 | ||||
| 373 | /* | |||
| 374 | * Layer 3 requires at least one IPv6 address on all configured | |||
| 375 | * interfaces. | |||
| 376 | */ | |||
| 377 | TAILQ_FOREACH(sp, &svlist, entry)for((sp) = ((&svlist)->tqh_first); (sp) != ((void *)0) ; (sp) = ((sp)->entry.tqe_next)) { | |||
| 378 | if (!sp->intf->ipv6) | |||
| ||||
| 379 | fatalx("%s: no IPv6 address configured", | |||
| 380 | sp->intf->name); | |||
| 381 | ||||
| 382 | if (sp->siteglobaladdr && !sp->intf->gipv6) | |||
| 383 | fatalx("%s: no IPv6 site/global address configured", | |||
| 384 | sp->intf->name); | |||
| 385 | } | |||
| 386 | if (!interfaces->ipv6) | |||
| 387 | fatalx("%s: no IPv6 address configured", interfaces->name); | |||
| 388 | ||||
| 389 | /* Setup the client side socket. */ | |||
| 390 | clientsd = socket(AF_INET624, SOCK_DGRAM2, IPPROTO_UDP17); | |||
| 391 | if (clientsd == -1) | |||
| 392 | fatal("socket"); | |||
| 393 | ||||
| 394 | if (setsockopt(clientsd, SOL_SOCKET0xffff, SO_REUSEPORT0x0200, &flag, | |||
| 395 | sizeof(flag)) == -1) | |||
| 396 | fatal("setsockopt(SO_REUSEPORT)"); | |||
| 397 | ||||
| 398 | if (s6fromaddr(&sin6, NULL((void *)0), DHCP6_SERVER_PORT_STR"547", 1) == -1) | |||
| 399 | fatalx("s6fromaddr"); | |||
| 400 | if (bind(clientsd, (struct sockaddr *)&sin6, sizeof(sin6)) == -1) | |||
| 401 | fatal("bind"); | |||
| 402 | ||||
| 403 | if (setsockopt(clientsd, IPPROTO_IPV641, IPV6_RECVPKTINFO36, &flag, | |||
| 404 | sizeof(flag)) == -1) | |||
| 405 | fatal("setsockopt(IPV6_RECVPKTINFO)"); | |||
| 406 | ||||
| 407 | memset(&mreq6, 0, sizeof(mreq6)); | |||
| 408 | if (s6fromaddr(&sin6, DHCP6_ADDR_RELAYSERVER"FF02::1:2", NULL((void *)0), 0) == -1) | |||
| 409 | fatalx("s6fromaddr"); | |||
| 410 | memcpy(&mreq6.ipv6mr_multiaddr, &sin6.sin6_addr, | |||
| 411 | sizeof(mreq6.ipv6mr_multiaddr)); | |||
| 412 | TAILQ_FOREACH(intf, &intflist, entry)for((intf) = ((&intflist)->tqh_first); (intf) != ((void *)0); (intf) = ((intf)->entry.tqe_next)) { | |||
| 413 | /* Skip interfaces without IPv6. */ | |||
| 414 | if (!intf->ipv6) | |||
| 415 | continue; | |||
| 416 | ||||
| 417 | mreq6.ipv6mr_interface = intf->index; | |||
| 418 | if (setsockopt(clientsd, IPPROTO_IPV641, IPV6_JOIN_GROUP12, | |||
| 419 | &mreq6, sizeof(mreq6)) == -1) | |||
| 420 | fatal("setsockopt(IPV6_JOIN_GROUP)"); | |||
| 421 | } | |||
| 422 | ||||
| 423 | add_protocol("clientsd", clientsd, mcast6_recv, &clientsd); | |||
| 424 | ||||
| 425 | /* Setup the server side socket. */ | |||
| 426 | serversd = socket(AF_INET624, SOCK_DGRAM2, IPPROTO_UDP17); | |||
| 427 | if (serversd == -1) | |||
| 428 | fatal("socket"); | |||
| 429 | ||||
| 430 | if (setsockopt(serversd, SOL_SOCKET0xffff, SO_REUSEPORT0x0200, &flag, | |||
| 431 | sizeof(flag)) == -1) | |||
| 432 | fatal("setsockopt(SO_REUSEPORT)"); | |||
| 433 | ||||
| 434 | if (s6fromaddr(&sin6, NULL((void *)0), DHCP6_SERVER_PORT_STR"547", 1) == -1) | |||
| 435 | fatalx("s6fromaddr"); | |||
| 436 | if (bind(serversd, (struct sockaddr *)&sin6, sizeof(sin6)) == -1) | |||
| 437 | fatal("bind"); | |||
| 438 | ||||
| 439 | if (setsockopt(serversd, IPPROTO_IPV641, IPV6_RECVPKTINFO36, &flag, | |||
| 440 | sizeof(flag)) == -1) | |||
| 441 | fatal("setsockopt(IPV6_RECVPKTINFO)"); | |||
| 442 | ||||
| 443 | add_protocol("serversd", serversd, mcast6_recv, &serversd); | |||
| 444 | } | |||
| 445 | ||||
| 446 | char * | |||
| 447 | print_hw_addr(int htype, int hlen, unsigned char *data) | |||
| 448 | { | |||
| 449 | static char habuf[49]; | |||
| 450 | char *s = habuf; | |||
| 451 | int i, j, slen = sizeof(habuf); | |||
| 452 | ||||
| 453 | if (htype == 0 || hlen == 0) { | |||
| 454 | bad: | |||
| 455 | strlcpy(habuf, "<null>", sizeof habuf); | |||
| 456 | return habuf; | |||
| 457 | } | |||
| 458 | ||||
| 459 | for (i = 0; i < hlen; i++) { | |||
| 460 | j = snprintf(s, slen, "%02x", data[i]); | |||
| 461 | if (j <= 0 || j >= slen) | |||
| 462 | goto bad; | |||
| 463 | j = strlen (s); | |||
| 464 | s += j; | |||
| 465 | slen -= (j + 1); | |||
| 466 | *s++ = ':'; | |||
| 467 | } | |||
| 468 | *--s = '\0'; | |||
| 469 | return habuf; | |||
| 470 | } | |||
| 471 | ||||
| 472 | const char * | |||
| 473 | v6addr2str(struct in6_addr *addr) | |||
| 474 | { | |||
| 475 | static int bufpos = 0; | |||
| 476 | static char buf[3][256]; | |||
| 477 | ||||
| 478 | bufpos = (bufpos + 1) % 3; | |||
| 479 | buf[bufpos][0] = '['; | |||
| 480 | if (inet_ntop(AF_INET624, addr, &buf[bufpos][1], | |||
| 481 | sizeof(buf[bufpos])) == NULL((void *)0)) | |||
| 482 | return "[unknown]"; | |||
| 483 | ||||
| 484 | strlcat(buf[bufpos], "]", sizeof(buf[bufpos])); | |||
| 485 | ||||
| 486 | return buf[bufpos]; | |||
| 487 | } | |||
| 488 | ||||
| 489 | const char * | |||
| 490 | dhcp6type2str(uint8_t msgtype) | |||
| 491 | { | |||
| 492 | switch (msgtype) { | |||
| 493 | case DHCP6_MT_REQUEST3: | |||
| 494 | return "REQUEST"; | |||
| 495 | case DHCP6_MT_RENEW5: | |||
| 496 | return "RENEW"; | |||
| 497 | case DHCP6_MT_REBIND6: | |||
| 498 | return "REBIND"; | |||
| 499 | case DHCP6_MT_RELEASE8: | |||
| 500 | return "RELEASE"; | |||
| 501 | case DHCP6_MT_DECLINE9: | |||
| 502 | return "DECLINE"; | |||
| 503 | case DHCP6_MT_INFORMATIONREQUEST11: | |||
| 504 | return "INFORMATION-REQUEST"; | |||
| 505 | case DHCP6_MT_SOLICIT1: | |||
| 506 | return "SOLICIT"; | |||
| 507 | case DHCP6_MT_ADVERTISE2: | |||
| 508 | return "ADVERTISE"; | |||
| 509 | case DHCP6_MT_CONFIRM4: | |||
| 510 | return "CONFIRM"; | |||
| 511 | case DHCP6_MT_REPLY7: | |||
| 512 | return "REPLY"; | |||
| 513 | case DHCP6_MT_RECONFIGURE10: | |||
| 514 | return "RECONFIGURE"; | |||
| 515 | case DHCP6_MT_RELAYREPL13: | |||
| 516 | return "RELAY-REPLY"; | |||
| 517 | case DHCP6_MT_RELAYFORW12: | |||
| 518 | return "RELAY-FORWARD"; | |||
| 519 | default: | |||
| 520 | return "UNKNOWN"; | |||
| 521 | } | |||
| 522 | } | |||
| 523 | ||||
| 524 | int | |||
| 525 | relay6_pushrelaymsg(struct packet_ctx *pc, struct interface_info *intf, | |||
| 526 | uint8_t *p, size_t *plen, size_t ptotal) | |||
| 527 | { | |||
| 528 | struct dhcp6_relay_packet *dsr; | |||
| 529 | struct dhcp6_option *dso; | |||
| 530 | size_t rmlen, dhcplen, optoff; | |||
| 531 | size_t railen, remotelen; | |||
| 532 | ||||
| 533 | if (pc->pc_raidata != NULL((void *)0)) | |||
| 534 | railen = sizeof(*dso) + pc->pc_raidatalen; | |||
| 535 | else | |||
| 536 | railen = 0; | |||
| 537 | ||||
| 538 | if (pc->pc_remote) | |||
| 539 | remotelen = sizeof(*dso) + ENTERPRISENO_LENsizeof(uint32_t) + | |||
| 540 | pc->pc_remotelen; | |||
| 541 | else | |||
| 542 | remotelen = 0; | |||
| 543 | ||||
| 544 | /* | |||
| 545 | * Check if message bigger than MTU and log (RFC 6221 | |||
| 546 | * Section 5.3.1). | |||
| 547 | */ | |||
| 548 | dhcplen = sizeof(*dsr) + railen + remotelen + sizeof(*dso) + *plen; | |||
| 549 | rmlen = sizeof(struct ether_header) + sizeof(struct ip6_hdr) + | |||
| 550 | sizeof(struct udphdr) + dhcplen; | |||
| 551 | if (rmlen > ptotal) { | |||
| 552 | log_info("Relay message too big"); | |||
| 553 | return -1; | |||
| 554 | } | |||
| 555 | ||||
| 556 | /* Move the DHCP payload to option. */ | |||
| 557 | optoff = sizeof(*dsr) + railen + remotelen + sizeof(*dso); | |||
| 558 | memmove(p + optoff, p, *plen); | |||
| 559 | ||||
| 560 | /* Write the new DHCP packet header for relay-message. */ | |||
| 561 | dsr = (struct dhcp6_relay_packet *)p; | |||
| 562 | dsr->dsr_msgtype = DHCP6_MT_RELAYFORW12; | |||
| 563 | ||||
| 564 | /* | |||
| 565 | * When the destination is All_DHCP_Relay_Agents_and_Servers we | |||
| 566 | * start the hop count from zero, otherwise set it to | |||
| 567 | * DHCP6_HOP_LIMIT to limit the packet to a single network. | |||
| 568 | */ | |||
| 569 | if (memcmp(&ss2sin6(&pc->pc_dst)->sin6_addr, | |||
| 570 | &in6alldhcprelay, sizeof(in6alldhcprelay)) == 0) | |||
| 571 | dsr->dsr_hopcount = 0; | |||
| 572 | else | |||
| 573 | dsr->dsr_hopcount = DHCP6_HOP_LIMIT32; | |||
| 574 | ||||
| 575 | /* | |||
| 576 | * XXX RFC 6221 Section 6.1: layer 2 mode does not set | |||
| 577 | * linkaddr, but we'll use our link-local always to identify the | |||
| 578 | * interface where the packet came in so we don't need to keep | |||
| 579 | * the interface addresses updated. | |||
| 580 | */ | |||
| 581 | dsr->dsr_linkaddr = intf->linklocal; | |||
| 582 | ||||
| 583 | memcpy(&dsr->dsr_peer, &ss2sin6(&pc->pc_src)->sin6_addr, | |||
| 584 | sizeof(dsr->dsr_peer)); | |||
| 585 | ||||
| 586 | /* Append Interface-ID DHCP option to identify this segment. */ | |||
| 587 | if (railen > 0) { | |||
| 588 | dso = dsr->dsr_options; | |||
| 589 | dso->dso_code = htons(DHCP6_OPT_INTERFACEID)(__uint16_t)(__builtin_constant_p(18) ? (__uint16_t)(((__uint16_t )(18) & 0xffU) << 8 | ((__uint16_t)(18) & 0xff00U ) >> 8) : __swap16md(18)); | |||
| 590 | dso->dso_length = htons(pc->pc_raidatalen)(__uint16_t)(__builtin_constant_p(pc->pc_raidatalen) ? (__uint16_t )(((__uint16_t)(pc->pc_raidatalen) & 0xffU) << 8 | ((__uint16_t)(pc->pc_raidatalen) & 0xff00U) >> 8) : __swap16md(pc->pc_raidatalen)); | |||
| 591 | memcpy(dso->dso_data, pc->pc_raidata, pc->pc_raidatalen); | |||
| 592 | } | |||
| 593 | ||||
| 594 | /* Append the Remote-ID DHCP option to identify this segment. */ | |||
| 595 | if (remotelen > 0) { | |||
| 596 | dso = (struct dhcp6_option *) | |||
| 597 | ((uint8_t *)dsr->dsr_options + railen); | |||
| 598 | dso->dso_code = htons(DHCP6_OPT_REMOTEID)(__uint16_t)(__builtin_constant_p(37) ? (__uint16_t)(((__uint16_t )(37) & 0xffU) << 8 | ((__uint16_t)(37) & 0xff00U ) >> 8) : __swap16md(37)); | |||
| 599 | dso->dso_length = | |||
| 600 | htons(sizeof(pc->pc_enterpriseno) + pc->pc_remotelen)(__uint16_t)(__builtin_constant_p(sizeof(pc->pc_enterpriseno ) + pc->pc_remotelen) ? (__uint16_t)(((__uint16_t)(sizeof( pc->pc_enterpriseno) + pc->pc_remotelen) & 0xffU) << 8 | ((__uint16_t)(sizeof(pc->pc_enterpriseno) + pc->pc_remotelen ) & 0xff00U) >> 8) : __swap16md(sizeof(pc->pc_enterpriseno ) + pc->pc_remotelen)); | |||
| 601 | memcpy(dso->dso_data, &pc->pc_enterpriseno, | |||
| 602 | sizeof(pc->pc_enterpriseno)); | |||
| 603 | memcpy(dso->dso_data + sizeof(pc->pc_enterpriseno), | |||
| 604 | pc->pc_remote, pc->pc_remotelen); | |||
| 605 | } | |||
| 606 | ||||
| 607 | /* Write the Relay-Message option header. */ | |||
| 608 | dso = (struct dhcp6_option *) | |||
| 609 | ((uint8_t *)dsr->dsr_options + railen + remotelen); | |||
| 610 | dso->dso_code = htons(DHCP6_OPT_RELAY_MSG)(__uint16_t)(__builtin_constant_p(9) ? (__uint16_t)(((__uint16_t )(9) & 0xffU) << 8 | ((__uint16_t)(9) & 0xff00U ) >> 8) : __swap16md(9)); | |||
| 611 | dso->dso_length = htons(*plen)(__uint16_t)(__builtin_constant_p(*plen) ? (__uint16_t)(((__uint16_t )(*plen) & 0xffU) << 8 | ((__uint16_t)(*plen) & 0xff00U) >> 8) : __swap16md(*plen)); | |||
| 612 | ||||
| 613 | /* Update the packet length. */ | |||
| 614 | *plen = dhcplen; | |||
| 615 | ||||
| 616 | return 0; | |||
| 617 | } | |||
| 618 | ||||
| 619 | int | |||
| 620 | relay6_poprelaymsg(struct packet_ctx *pc, struct interface_info **intf, | |||
| 621 | uint8_t *p, size_t *plen) | |||
| 622 | { | |||
| 623 | struct dhcp6_relay_packet *dsr = (struct dhcp6_relay_packet *)p; | |||
| 624 | struct dhcp6_packet *ds = NULL((void *)0); | |||
| 625 | struct dhcp6_option *dso; | |||
| 626 | struct in6_addr linkaddr; | |||
| 627 | size_t pleft = *plen, ifnamelen = 0; | |||
| 628 | size_t dsolen, dhcplen = 0; | |||
| 629 | uint16_t optcode; | |||
| 630 | char ifname[64]; | |||
| 631 | ||||
| 632 | *intf = NULL((void *)0); | |||
| 633 | ||||
| 634 | /* Sanity check: this is a relay message of the right type. */ | |||
| 635 | if (dsr->dsr_msgtype != DHCP6_MT_RELAYREPL13) { | |||
| 636 | log_debug("Invalid relay-message (%s) to pop", | |||
| 637 | dhcp6type2str(dsr->dsr_msgtype)); | |||
| 638 | return -1; | |||
| 639 | } | |||
| 640 | ||||
| 641 | /* Set the client address based on relay message. */ | |||
| 642 | ss2sin6(&pc->pc_dst)->sin6_addr = dsr->dsr_peer; | |||
| 643 | linkaddr = dsr->dsr_linkaddr; | |||
| 644 | ||||
| 645 | dso = dsr->dsr_options; | |||
| 646 | pleft -= sizeof(*dsr); | |||
| 647 | while (pleft > sizeof(*dso)) { | |||
| 648 | optcode = ntohs(dso->dso_code)(__uint16_t)(__builtin_constant_p(dso->dso_code) ? (__uint16_t )(((__uint16_t)(dso->dso_code) & 0xffU) << 8 | ( (__uint16_t)(dso->dso_code) & 0xff00U) >> 8) : __swap16md (dso->dso_code)); | |||
| 649 | dsolen = sizeof(*dso) + ntohs(dso->dso_length)(__uint16_t)(__builtin_constant_p(dso->dso_length) ? (__uint16_t )(((__uint16_t)(dso->dso_length) & 0xffU) << 8 | ((__uint16_t)(dso->dso_length) & 0xff00U) >> 8) : __swap16md(dso->dso_length)); | |||
| 650 | ||||
| 651 | /* Sanity check: do we have the payload? */ | |||
| 652 | if (dsolen > pleft) { | |||
| 653 | log_debug("invalid packet: payload greater than " | |||
| 654 | "packet content (%ld, bytes left %ld)", | |||
| 655 | dsolen, pleft); | |||
| 656 | return -1; | |||
| 657 | } | |||
| 658 | ||||
| 659 | /* Use the interface suggested by the packet. */ | |||
| 660 | if (optcode == DHCP6_OPT_INTERFACEID18) { | |||
| 661 | ifnamelen = dsolen - sizeof(*dso); | |||
| 662 | if (ifnamelen >= sizeof(ifname)) { | |||
| 663 | log_info("received interface id with " | |||
| 664 | "truncated interface name"); | |||
| 665 | ifnamelen = sizeof(ifname) - 1; | |||
| 666 | } | |||
| 667 | ||||
| 668 | memcpy(ifname, dso->dso_data, ifnamelen); | |||
| 669 | ifname[ifnamelen] = 0; | |||
| 670 | ||||
| 671 | dso = (struct dhcp6_option *) | |||
| 672 | ((uint8_t *)dso + dsolen); | |||
| 673 | pleft -= dsolen; | |||
| 674 | continue; | |||
| 675 | } | |||
| 676 | ||||
| 677 | /* Ignore unsupported options. */ | |||
| 678 | if (optcode != DHCP6_OPT_RELAY_MSG9) { | |||
| 679 | log_debug("ignoring option type %d", optcode); | |||
| 680 | dso = (struct dhcp6_option *) | |||
| 681 | ((uint8_t *)dso + dsolen); | |||
| 682 | pleft -= dsolen; | |||
| 683 | continue; | |||
| 684 | } | |||
| 685 | ||||
| 686 | /* Save the pointer for the DHCP payload. */ | |||
| 687 | ds = (struct dhcp6_packet *)dso->dso_data; | |||
| 688 | dhcplen = ntohs(dso->dso_length)(__uint16_t)(__builtin_constant_p(dso->dso_length) ? (__uint16_t )(((__uint16_t)(dso->dso_length) & 0xffU) << 8 | ((__uint16_t)(dso->dso_length) & 0xff00U) >> 8) : __swap16md(dso->dso_length)); | |||
| 689 | ||||
| 690 | dso = (struct dhcp6_option *)((uint8_t *)dso + dsolen); | |||
| 691 | pleft -= dsolen; | |||
| 692 | } | |||
| 693 | if (ds == NULL((void *)0) || dhcplen == 0) { | |||
| 694 | log_debug("Could not find relay-message option"); | |||
| 695 | return -1; | |||
| 696 | } | |||
| 697 | ||||
| 698 | /* Move the encapsulated DHCP payload. */ | |||
| 699 | memmove(p, ds, dhcplen); | |||
| 700 | *plen = dhcplen; | |||
| 701 | ||||
| 702 | /* | |||
| 703 | * If the new message is for the client, we must change the | |||
| 704 | * destination port to the client's, otherwise keep the port | |||
| 705 | * for the next relay. | |||
| 706 | */ | |||
| 707 | ds = (struct dhcp6_packet *)p; | |||
| 708 | if (ds->ds_msgtype != DHCP6_MT_RELAYREPL13) | |||
| 709 | ss2sin6(&pc->pc_dst)->sin6_port = | |||
| 710 | htons(DHCP6_CLIENT_PORT)(__uint16_t)(__builtin_constant_p(546) ? (__uint16_t)(((__uint16_t )(546) & 0xffU) << 8 | ((__uint16_t)(546) & 0xff00U ) >> 8) : __swap16md(546)); | |||
| 711 | ||||
| 712 | /* No Interface-ID specified. */ | |||
| 713 | if (ifnamelen == 0) | |||
| 714 | goto use_linkaddr; | |||
| 715 | ||||
| 716 | /* Look out for the specified interface, */ | |||
| 717 | if ((*intf = iflist_getbyname(ifname)) == NULL((void *)0)) { | |||
| 718 | log_debug(" Interface-ID found, but no interface matches."); | |||
| 719 | ||||
| 720 | /* | |||
| 721 | * Use client interface as fallback, but try | |||
| 722 | * link-address (if any) before giving up. | |||
| 723 | */ | |||
| 724 | *intf = interfaces; | |||
| 725 | } | |||
| 726 | ||||
| 727 | use_linkaddr: | |||
| 728 | /* Use link-addr to determine output interface if present. */ | |||
| 729 | if (memcmp(&linkaddr, &in6addr_any, sizeof(linkaddr)) != 0) { | |||
| 730 | if ((*intf = iflist_getbyaddr6(&linkaddr)) != NULL((void *)0)) | |||
| 731 | return 0; | |||
| 732 | ||||
| 733 | log_debug("Could not find interface using " | |||
| 734 | "address %s", v6addr2str(&linkaddr)); | |||
| 735 | } | |||
| 736 | ||||
| 737 | return 0; | |||
| 738 | } | |||
| 739 | ||||
| 740 | void | |||
| 741 | rai_configure(struct packet_ctx *pc, struct interface_info *intf) | |||
| 742 | { | |||
| 743 | if (remote_data != NULL((void *)0)) { | |||
| 744 | pc->pc_remote = remote_data; | |||
| 745 | pc->pc_remotelen = remote_datalen; | |||
| 746 | pc->pc_enterpriseno = htonl(enterpriseno)(__uint32_t)(__builtin_constant_p(enterpriseno) ? (__uint32_t )(((__uint32_t)(enterpriseno) & 0xff) << 24 | ((__uint32_t )(enterpriseno) & 0xff00) << 8 | ((__uint32_t)(enterpriseno ) & 0xff0000) >> 8 | ((__uint32_t)(enterpriseno) & 0xff000000) >> 24) : __swap32md(enterpriseno)); | |||
| 747 | } | |||
| 748 | ||||
| 749 | /* Layer-2 must include Interface-ID (Option 18). */ | |||
| 750 | if (drm == DRM_LAYER2) | |||
| 751 | goto select_rai; | |||
| 752 | ||||
| 753 | /* User did not configure Interface-ID. */ | |||
| 754 | if (oflag == 0) | |||
| 755 | return; | |||
| 756 | ||||
| 757 | select_rai: | |||
| 758 | if (rai_data == NULL((void *)0)) { | |||
| 759 | pc->pc_raidata = intf->name; | |||
| 760 | pc->pc_raidatalen = strlen(intf->name); | |||
| 761 | } else { | |||
| 762 | pc->pc_raidata = rai_data; | |||
| 763 | pc->pc_raidatalen = rai_datalen; | |||
| 764 | } | |||
| 765 | } | |||
| 766 | ||||
| 767 | void | |||
| 768 | relay6_logsrcaddr(struct packet_ctx *pc, struct interface_info *intf, | |||
| 769 | uint8_t msgtype) | |||
| 770 | { | |||
| 771 | const char *type; | |||
| 772 | ||||
| 773 | type = (msgtype == DHCP6_MT_RELAYREPL13) ? "reply" : "forward"; | |||
| 774 | if (drm == DRM_LAYER2) | |||
| 775 | log_info("forwarded relay-%s for %s to %s", | |||
| 776 | type, print_hw_addr(pc->pc_htype, pc->pc_hlen, | |||
| 777 | pc->pc_smac), intf->name); | |||
| 778 | else | |||
| 779 | log_info("forwarded relay-%s for %s to %s%%%s", | |||
| 780 | type, | |||
| 781 | v6addr2str(&ss2sin6(&pc->pc_srcorig)->sin6_addr), | |||
| 782 | v6addr2str(&ss2sin6(&pc->pc_dst)->sin6_addr), | |||
| 783 | intf->name); | |||
| 784 | } | |||
| 785 | ||||
| 786 | void | |||
| 787 | relay6(struct interface_info *intf, void *p, size_t plen, | |||
| 788 | struct packet_ctx *pc) | |||
| 789 | { | |||
| 790 | struct dhcp6_packet *ds = (struct dhcp6_packet *)p; | |||
| 791 | struct dhcp6_relay_packet *dsr = (struct dhcp6_relay_packet *)p; | |||
| 792 | struct interface_info *dstif = NULL((void *)0); | |||
| 793 | struct server_list *sp; | |||
| 794 | size_t buflen = plen; | |||
| 795 | int clientdir = (intf != interfaces); | |||
| 796 | uint8_t msgtype, hopcount = 0; | |||
| 797 | ||||
| 798 | /* Sanity check: we have at least the DHCP header. */ | |||
| 799 | if (plen < (int)sizeof(*ds)) { | |||
| 800 | log_debug("invalid packet size"); | |||
| 801 | return; | |||
| 802 | } | |||
| 803 | ||||
| 804 | /* Set Relay Agent Information fields. */ | |||
| 805 | rai_configure(pc, intf); | |||
| 806 | ||||
| 807 | /* | |||
| 808 | * RFC 3315 section 20 relay messages: | |||
| 809 | * For client messages prepend a new DHCP payload with the | |||
| 810 | * relay-forward, otherwise update the DHCP relay header. | |||
| 811 | */ | |||
| 812 | msgtype = ds->ds_msgtype; | |||
| 813 | ||||
| 814 | log_debug("%s: received %s from %s", | |||
| 815 | intf->name, dhcp6type2str(msgtype), | |||
| 816 | v6addr2str(&ss2sin6(&pc->pc_src)->sin6_addr)); | |||
| 817 | ||||
| 818 | switch (msgtype) { | |||
| 819 | case DHCP6_MT_ADVERTISE2: | |||
| 820 | case DHCP6_MT_REPLY7: | |||
| 821 | case DHCP6_MT_RECONFIGURE10: | |||
| 822 | /* | |||
| 823 | * Don't forward reply packets coming from the client | |||
| 824 | * interface. | |||
| 825 | * | |||
| 826 | * RFC 6221 Section 6.1.1. | |||
| 827 | */ | |||
| 828 | if (clientdir == 0) { | |||
| 829 | log_debug(" dropped reply in opposite direction"); | |||
| 830 | return; | |||
| 831 | } | |||
| 832 | /* FALLTHROUGH */ | |||
| 833 | ||||
| 834 | case DHCP6_MT_REQUEST3: | |||
| 835 | case DHCP6_MT_RENEW5: | |||
| 836 | case DHCP6_MT_REBIND6: | |||
| 837 | case DHCP6_MT_RELEASE8: | |||
| 838 | case DHCP6_MT_DECLINE9: | |||
| 839 | case DHCP6_MT_INFORMATIONREQUEST11: | |||
| 840 | case DHCP6_MT_SOLICIT1: | |||
| 841 | case DHCP6_MT_CONFIRM4: | |||
| 842 | /* | |||
| 843 | * Encapsulate the client/server message with the | |||
| 844 | * relay-message header. | |||
| 845 | */ | |||
| 846 | if (relay6_pushrelaymsg(pc, intf, (uint8_t *)p, | |||
| 847 | &buflen, DHCP_MTU_MAX1500) == -1) { | |||
| 848 | log_debug(" message encapsulation failed"); | |||
| 849 | return; | |||
| 850 | } | |||
| 851 | break; | |||
| 852 | ||||
| 853 | case DHCP6_MT_RELAYREPL13: | |||
| 854 | /* | |||
| 855 | * Don't forward reply packets coming from the client | |||
| 856 | * interface. | |||
| 857 | * | |||
| 858 | * RFC 6221 Section 6.1.1. | |||
| 859 | */ | |||
| 860 | if (clientdir == 0) { | |||
| 861 | log_debug(" dropped reply in opposite direction"); | |||
| 862 | return; | |||
| 863 | } | |||
| 864 | ||||
| 865 | if (relay6_poprelaymsg(pc, &dstif, (uint8_t *)p, | |||
| 866 | &buflen) == -1) { | |||
| 867 | log_debug(" failed to pop relay-message"); | |||
| 868 | return; | |||
| 869 | } | |||
| 870 | ||||
| 871 | pc->pc_sd = clientsd; | |||
| 872 | break; | |||
| 873 | ||||
| 874 | case DHCP6_MT_RELAYFORW12: | |||
| 875 | /* | |||
| 876 | * We can only have multiple hops when the destination | |||
| 877 | * address is All_DHCP_Relay_Agents_and_Servers, otherwise | |||
| 878 | * drop it. | |||
| 879 | */ | |||
| 880 | if (memcmp(&ss2sin6(&pc->pc_dst)->sin6_addr, | |||
| 881 | &in6alldhcprelay, sizeof(in6alldhcprelay)) != 0) { | |||
| 882 | log_debug(" wrong destination"); | |||
| 883 | return; | |||
| 884 | } | |||
| 885 | ||||
| 886 | hopcount = dsr->dsr_hopcount + 1; | |||
| 887 | if (hopcount >= DHCP6_HOP_LIMIT32) { | |||
| 888 | log_debug(" hop limit reached"); | |||
| 889 | return; | |||
| 890 | } | |||
| 891 | ||||
| 892 | /* Stack into another relay-message. */ | |||
| 893 | if (relay6_pushrelaymsg(pc, intf, (uint8_t *)p, | |||
| 894 | &buflen, DHCP_MTU_MAX1500) == -1) { | |||
| 895 | log_debug(" failed to push relay message"); | |||
| 896 | return; | |||
| 897 | } | |||
| 898 | ||||
| 899 | dsr = (struct dhcp6_relay_packet *)p; | |||
| 900 | dsr->dsr_msgtype = msgtype; | |||
| 901 | dsr->dsr_peer = ss2sin6(&pc->pc_src)->sin6_addr; | |||
| 902 | dsr->dsr_hopcount = hopcount; | |||
| 903 | break; | |||
| 904 | ||||
| 905 | default: | |||
| 906 | log_debug(" unknown message type %d", ds->ds_msgtype); | |||
| 907 | return; | |||
| 908 | } | |||
| 909 | ||||
| 910 | /* We received an packet with Interface-ID, use it. */ | |||
| 911 | if (dstif != NULL((void *)0)) { | |||
| 912 | relay6_logsrcaddr(pc, dstif, msgtype); | |||
| 913 | send_packet(dstif, p, buflen, pc); | |||
| 914 | return; | |||
| 915 | } | |||
| 916 | ||||
| 917 | /* Or send packet to the client. */ | |||
| 918 | if (clientdir) { | |||
| 919 | relay6_logsrcaddr(pc, interfaces, msgtype); | |||
| 920 | send_packet(interfaces, p, buflen, pc); | |||
| 921 | return; | |||
| 922 | } | |||
| 923 | ||||
| 924 | /* Otherwise broadcast it to other relays/servers. */ | |||
| 925 | TAILQ_FOREACH(sp, &svlist, entry)for((sp) = ((&svlist)->tqh_first); (sp) != ((void *)0) ; (sp) = ((sp)->entry.tqe_next)) { | |||
| 926 | /* | |||
| 927 | * Don't send in the same interface it came in if we are | |||
| 928 | * using multicast. | |||
| 929 | */ | |||
| 930 | if (sp->intf == intf && | |||
| 931 | sp->to.ss_family == 0) | |||
| 932 | continue; | |||
| 933 | ||||
| 934 | /* | |||
| 935 | * When forwarding a packet use the configured address | |||
| 936 | * (if any) instead of multicasting. | |||
| 937 | */ | |||
| 938 | if (msgtype != DHCP6_MT_REPLY7 && | |||
| 939 | sp->to.ss_family == AF_INET624) | |||
| 940 | pc->pc_dst = sp->to; | |||
| 941 | ||||
| 942 | relay6_logsrcaddr(pc, sp->intf, msgtype); | |||
| 943 | send_packet(sp->intf, p, buflen, pc); | |||
| 944 | } | |||
| 945 | } | |||
| 946 | ||||
| 947 | void | |||
| 948 | mcast6_recv(struct protocol *l) | |||
| 949 | { | |||
| 950 | struct in6_pktinfo *ipi6 = NULL((void *)0); | |||
| 951 | struct cmsghdr *cmsg; | |||
| 952 | struct interface_info *intf; | |||
| 953 | int sd = *(int *)l->local; | |||
| 954 | ssize_t recvlen; | |||
| 955 | struct packet_ctx pc; | |||
| 956 | struct msghdr msg; | |||
| 957 | struct sockaddr_storage ss; | |||
| 958 | struct iovec iov[2]; | |||
| 959 | uint8_t iovbuf[4096]; | |||
| 960 | uint8_t cmsgbuf[ | |||
| 961 | CMSG_SPACE(sizeof(struct in6_pktinfo))((((unsigned long)(sizeof(struct cmsghdr)) + (sizeof(long) - 1 )) &~(sizeof(long) - 1)) + (((unsigned long)(sizeof(struct in6_pktinfo)) + (sizeof(long) - 1)) &~(sizeof(long) - 1) )) | |||
| 962 | ]; | |||
| 963 | ||||
| 964 | memset(&pc, 0, sizeof(pc)); | |||
| 965 | ||||
| 966 | iov[0].iov_base = iovbuf; | |||
| 967 | iov[0].iov_len = sizeof(iovbuf); | |||
| 968 | ||||
| 969 | memset(&msg, 0, sizeof(msg)); | |||
| 970 | msg.msg_iov = iov; | |||
| 971 | msg.msg_iovlen = 1; | |||
| 972 | msg.msg_control = cmsgbuf; | |||
| 973 | msg.msg_controllen = sizeof(cmsgbuf); | |||
| 974 | msg.msg_name = &ss; | |||
| 975 | msg.msg_namelen = sizeof(ss); | |||
| 976 | if ((recvlen = recvmsg(sd, &msg, 0)) == -1) { | |||
| 977 | log_warn("%s: recvmsg failed", __func__); | |||
| 978 | return; | |||
| 979 | } | |||
| 980 | ||||
| 981 | /* Sanity check: this is an IPv6 packet. */ | |||
| 982 | if (ss.ss_family != AF_INET624) { | |||
| 983 | log_debug("received non IPv6 packet"); | |||
| 984 | return; | |||
| 985 | } | |||
| 986 | ||||
| 987 | /* Drop packets that we sent. */ | |||
| 988 | if (iflist_getbyaddr6(&ss2sin6(&ss)->sin6_addr) != NULL((void *)0)) | |||
| 989 | return; | |||
| 990 | ||||
| 991 | /* Save the sender address. */ | |||
| 992 | pc.pc_srcorig = pc.pc_src = ss; | |||
| 993 | ||||
| 994 | /* Pre-configure destination to the default multicast address. */ | |||
| 995 | ss2sin6(&pc.pc_dst)->sin6_family = AF_INET624; | |||
| 996 | ss2sin6(&pc.pc_dst)->sin6_len = sizeof(struct sockaddr_in6); | |||
| 997 | ss2sin6(&pc.pc_dst)->sin6_addr = in6alldhcprelay; | |||
| 998 | ss2sin6(&pc.pc_dst)->sin6_port = htons(DHCP6_SERVER_PORT)(__uint16_t)(__builtin_constant_p(547) ? (__uint16_t)(((__uint16_t )(547) & 0xffU) << 8 | ((__uint16_t)(547) & 0xff00U ) >> 8) : __swap16md(547)); | |||
| 999 | pc.pc_sd = serversd; | |||
| 1000 | ||||
| 1001 | /* Find out input interface. */ | |||
| 1002 | for (cmsg = (struct cmsghdr *)CMSG_FIRSTHDR(&msg)((&msg)->msg_controllen >= sizeof(struct cmsghdr) ? (struct cmsghdr *)(&msg)->msg_control : (struct cmsghdr *)((void *)0)); cmsg; | |||
| 1003 | cmsg = (struct cmsghdr *)CMSG_NXTHDR(&msg, cmsg)(((char *)(cmsg) + (((unsigned long)((cmsg)->cmsg_len) + ( sizeof(long) - 1)) &~(sizeof(long) - 1)) + (((unsigned long )(sizeof(struct cmsghdr)) + (sizeof(long) - 1)) &~(sizeof (long) - 1)) > ((char *)(&msg)->msg_control) + (& msg)->msg_controllen) ? (struct cmsghdr *)((void *)0) : (struct cmsghdr *)((char *)(cmsg) + (((unsigned long)((cmsg)->cmsg_len ) + (sizeof(long) - 1)) &~(sizeof(long) - 1))))) { | |||
| 1004 | if (cmsg->cmsg_level != IPPROTO_IPV641) | |||
| 1005 | continue; | |||
| 1006 | ||||
| 1007 | switch (cmsg->cmsg_type) { | |||
| 1008 | case IPV6_PKTINFO46: | |||
| 1009 | ipi6 = (struct in6_pktinfo *)CMSG_DATA(cmsg)((unsigned char *)(cmsg) + (((unsigned long)(sizeof(struct cmsghdr )) + (sizeof(long) - 1)) &~(sizeof(long) - 1))); | |||
| 1010 | break; | |||
| 1011 | } | |||
| 1012 | } | |||
| 1013 | if (ipi6 == NULL((void *)0)) { | |||
| 1014 | log_debug("failed to get packet interface"); | |||
| 1015 | return; | |||
| 1016 | } | |||
| 1017 | ||||
| 1018 | intf = iflist_getbyindex(ipi6->ipi6_ifindex); | |||
| 1019 | if (intf == NULL((void *)0)) { | |||
| 1020 | log_debug("failed to find packet interface: %u", | |||
| 1021 | ipi6->ipi6_ifindex); | |||
| 1022 | return; | |||
| 1023 | } | |||
| 1024 | ||||
| 1025 | /* Pass it to the relay routine. */ | |||
| 1026 | if (bootp_packet_handler) | |||
| 1027 | (*bootp_packet_handler)(intf, iovbuf, recvlen, &pc); | |||
| 1028 | } |