diff options
Diffstat (limited to 'src/dhcpv6.c')
-rw-r--r-- | src/dhcpv6.c | 452 |
1 files changed, 452 insertions, 0 deletions
diff --git a/src/dhcpv6.c b/src/dhcpv6.c new file mode 100644 index 0000000..9515f40 --- /dev/null +++ b/src/dhcpv6.c @@ -0,0 +1,452 @@ +/** + * Copyright (C) 2012-2013 Steven Barth <steven@midlink.org> + * + * This program is free software; you can redistribute it and/or modify + * it under the terms of the GNU General Public License v2 as published by + * the Free Software Foundation. + * + * This program is distributed in the hope that it will be useful, + * but WITHOUT ANY WARRANTY; without even the implied warranty of + * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the + * GNU General Public License for more details. + * + * + */ + +#include <errno.h> +#include <unistd.h> +#include <stddef.h> +#include <resolv.h> +#include <sys/timerfd.h> + +#include "odhcpd.h" +#include "dhcpv6.h" + + +static void relay_client_request(struct sockaddr_in6 *source, + const void *data, size_t len, struct interface *iface); +static void relay_server_response(uint8_t *data, size_t len); + +static void handle_dhcpv6(void *addr, void *data, size_t len, + struct interface *iface); +static void handle_client_request(void *addr, void *data, size_t len, + struct interface *iface); + +static struct odhcpd_event dhcpv6_event = {{.fd = -1}, handle_dhcpv6}; + + + +// Create socket and register events +int init_dhcpv6(void) +{ + int sock = socket(AF_INET6, SOCK_DGRAM | SOCK_CLOEXEC, IPPROTO_UDP); + + // Basic IPv6 configuration + int val = 1; + setsockopt(sock, IPPROTO_IPV6, IPV6_V6ONLY, &val, sizeof(val)); + setsockopt(sock, SOL_SOCKET, SO_REUSEADDR, &val, sizeof(val)); + setsockopt(sock, IPPROTO_IPV6, IPV6_RECVPKTINFO, &val, sizeof(val)); + + val = DHCPV6_HOP_COUNT_LIMIT; + setsockopt(sock, IPPROTO_IPV6, IPV6_MULTICAST_HOPS, &val, sizeof(val)); + + val = 0; + setsockopt(sock, IPPROTO_IPV6, IPV6_MULTICAST_LOOP, &val, sizeof(val)); + + struct sockaddr_in6 bind_addr = {AF_INET6, htons(DHCPV6_SERVER_PORT), + 0, IN6ADDR_ANY_INIT, 0}; + + if (bind(sock, (struct sockaddr*)&bind_addr, sizeof(bind_addr))) { + syslog(LOG_ERR, "Failed to open DHCPv6 server socket: %s", + strerror(errno)); + return -1; + } + + dhcpv6_event.uloop.fd = sock; + odhcpd_register(&dhcpv6_event); + + dhcpv6_ia_init(dhcpv6_event.uloop.fd); + + return 0; +} + + +int setup_dhcpv6_interface(struct interface *iface, bool enable) +{ + // Configure multicast settings + struct ipv6_mreq relay = {ALL_DHCPV6_RELAYS, iface->ifindex}; + struct ipv6_mreq server = {ALL_DHCPV6_SERVERS, iface->ifindex}; + + setsockopt(dhcpv6_event.uloop.fd, IPPROTO_IPV6, + IPV6_DROP_MEMBERSHIP, &relay, sizeof(relay)); + setsockopt(dhcpv6_event.uloop.fd, IPPROTO_IPV6, + IPV6_DROP_MEMBERSHIP, &server, sizeof(server)); + + if (enable && iface->dhcpv6 && !iface->master) { + setsockopt(dhcpv6_event.uloop.fd, IPPROTO_IPV6, + IPV6_ADD_MEMBERSHIP, &relay, sizeof(relay)); + + if (iface->dhcpv6 == RELAYD_SERVER) + setsockopt(dhcpv6_event.uloop.fd, IPPROTO_IPV6, + IPV6_ADD_MEMBERSHIP, &server, sizeof(server)); + } + + setup_dhcpv6_ia_interface(iface, enable); + return 0; +} + + +static void handle_nested_message(uint8_t *data, size_t len, + uint8_t **opts, uint8_t **end, struct iovec iov[6]) +{ + struct dhcpv6_relay_header *hdr = (struct dhcpv6_relay_header*)data; + if (iov[0].iov_base == NULL) { + iov[0].iov_base = data; + iov[0].iov_len = len; + } + + if (len < sizeof(struct dhcpv6_client_header)) + return; + + if (hdr->msg_type != DHCPV6_MSG_RELAY_FORW) { + iov[0].iov_len = data - (uint8_t*)iov[0].iov_base; + struct dhcpv6_client_header *hdr = (void*)data; + *opts = (uint8_t*)&hdr[1]; + *end = data + len; + return; + } + + uint16_t otype, olen; + uint8_t *odata; + dhcpv6_for_each_option(hdr->options, data + len, otype, olen, odata) { + if (otype == DHCPV6_OPT_RELAY_MSG) { + iov[7].iov_base = odata + olen; + iov[7].iov_len = (((uint8_t*)iov[0].iov_base) + iov[0].iov_len) + - (odata + olen); + handle_nested_message(odata, olen, opts, end, iov); + return; + } + } +} + + +static void update_nested_message(uint8_t *data, size_t len, ssize_t pdiff) +{ + struct dhcpv6_relay_header *hdr = (struct dhcpv6_relay_header*)data; + if (hdr->msg_type != DHCPV6_MSG_RELAY_FORW) + return; + + hdr->msg_type = DHCPV6_MSG_RELAY_REPL; + + uint16_t otype, olen; + uint8_t *odata; + dhcpv6_for_each_option(hdr->options, data + len, otype, olen, odata) { + if (otype == DHCPV6_OPT_RELAY_MSG) { + olen += pdiff; + odata[-2] = (olen >> 8) & 0xff; + odata[-1] = olen & 0xff; + update_nested_message(odata, olen - pdiff, pdiff); + return; + } + } +} + + +// Simple DHCPv6-server for information requests +static void handle_client_request(void *addr, void *data, size_t len, + struct interface *iface) +{ + struct dhcpv6_client_header *hdr = data; + if (len < sizeof(*hdr)) + return; + + syslog(LOG_NOTICE, "Got DHCPv6 request"); + + // Construct reply message + struct __attribute__((packed)) { + uint8_t msg_type; + uint8_t tr_id[3]; + uint16_t serverid_type; + uint16_t serverid_length; + uint16_t duid_type; + uint16_t hardware_type; + uint8_t mac[6]; + uint16_t clientid_type; + uint16_t clientid_length; + uint8_t clientid_buf[130]; + } dest = { + .msg_type = DHCPV6_MSG_REPLY, + .serverid_type = htons(DHCPV6_OPT_SERVERID), + .serverid_length = htons(10), + .duid_type = htons(3), + .hardware_type = htons(1), + .clientid_type = htons(DHCPV6_OPT_CLIENTID), + .clientid_buf = {0} + }; + odhcpd_get_mac(iface, dest.mac); + + struct __attribute__((packed)) { + uint16_t type; + uint16_t len; + uint16_t value; + } stat = {htons(DHCPV6_OPT_STATUS), htons(sizeof(stat) - 4), + htons(DHCPV6_STATUS_NOADDRSAVAIL)}; + + struct __attribute__((packed)) { + uint16_t type; + uint16_t len; + uint32_t value; + } refresh = {htons(DHCPV6_OPT_INFO_REFRESH), htons(sizeof(uint32_t)), + htonl(600)}; + + struct odhcpd_ipaddr ipaddr; + struct in6_addr *dns_addr = iface->dns; + size_t dns_cnt = iface->dns_cnt; + + if (dns_cnt == 0 && odhcpd_get_interface_addresses(iface->ifindex, &ipaddr, 1) == 1) { + dns_addr = &ipaddr.addr; + dns_cnt = 1; + } + + struct { + uint16_t type; + uint16_t len; + } dns = {htons(DHCPV6_OPT_DNS_SERVERS), htons(dns_cnt * sizeof(*dns_addr))}; + + + + // DNS Search options + uint8_t search_buf[256], *search_domain = iface->search; + size_t search_len = iface->search_len; + + if (!search_domain && !res_init() && _res.dnsrch[0] && _res.dnsrch[0][0]) { + int len = dn_comp(_res.dnsrch[0], search_buf, + sizeof(search_buf), NULL, NULL); + if (len > 0) { + search_domain = search_buf; + search_len = len; + } + } + + struct { + uint16_t type; + uint16_t len; + } search = {htons(DHCPV6_OPT_DNS_DOMAIN), htons(search_len)}; + + + + uint8_t pdbuf[512]; + struct iovec iov[] = {{NULL, 0}, + {&dest, (uint8_t*)&dest.clientid_type - (uint8_t*)&dest}, + {&dns, (dns_cnt) ? sizeof(dns) : 0}, + {dns_addr, dns_cnt * sizeof(*dns_addr)}, + {&search, (search_len) ? sizeof(search) : 0}, + {search_domain, search_len}, + {pdbuf, 0}, + {NULL, 0}}; + + uint8_t *opts = (uint8_t*)&hdr[1], *opts_end = (uint8_t*)data + len; + if (hdr->msg_type == DHCPV6_MSG_RELAY_FORW) + handle_nested_message(data, len, &opts, &opts_end, iov); + + memcpy(dest.tr_id, &opts[-3], sizeof(dest.tr_id)); + + if (opts[-4] == DHCPV6_MSG_ADVERTISE || opts[-4] == DHCPV6_MSG_REPLY || opts[-4] == DHCPV6_MSG_RELAY_REPL) + return; + + if (opts[-4] == DHCPV6_MSG_SOLICIT) { + dest.msg_type = DHCPV6_MSG_ADVERTISE; + } else if (opts[-4] == DHCPV6_MSG_INFORMATION_REQUEST) { + iov[6].iov_base = &refresh; + iov[6].iov_len = sizeof(refresh); + } + + // Go through options and find what we need + uint16_t otype, olen; + uint8_t *odata; + dhcpv6_for_each_option(opts, opts_end, otype, olen, odata) { + if (otype == DHCPV6_OPT_CLIENTID && olen <= 130) { + dest.clientid_length = htons(olen); + memcpy(dest.clientid_buf, odata, olen); + iov[1].iov_len += 4 + olen; + } else if (otype == DHCPV6_OPT_SERVERID) { + if (olen != ntohs(dest.serverid_length) || + memcmp(odata, &dest.duid_type, olen)) + return; // Not for us + } + } + + if (opts[-4] != DHCPV6_MSG_INFORMATION_REQUEST) { + iov[6].iov_len = dhcpv6_handle_ia(pdbuf, sizeof(pdbuf), iface, addr, &opts[-4], opts_end); + if (iov[6].iov_len == 0 && opts[-4] == DHCPV6_MSG_REBIND) + return; + } + + if (iov[0].iov_len > 0) // Update length + update_nested_message(data, len, iov[1].iov_len + iov[2].iov_len + + iov[3].iov_len + iov[4].iov_len + iov[5].iov_len + + iov[6].iov_len - (4 + opts_end - opts)); + + odhcpd_send(dhcpv6_event.uloop.fd, addr, iov, ARRAY_SIZE(iov), iface); +} + + +// Central DHCPv6-relay handler +static void handle_dhcpv6(void *addr, void *data, size_t len, + struct interface *iface) +{ + if (iface->dhcpv6 == RELAYD_SERVER) { + handle_client_request(addr, data, len, iface); + } else if (iface->dhcpv6 == RELAYD_RELAY) { + if (iface->master) + relay_server_response(data, len); + else + relay_client_request(addr, data, len, iface); + } +} + + +// Relay server response (regular relay server handling) +static void relay_server_response(uint8_t *data, size_t len) +{ + // Information we need to gather + uint8_t *payload_data = NULL; + size_t payload_len = 0; + int32_t ifaceidx = 0; + struct sockaddr_in6 target = {AF_INET6, htons(DHCPV6_CLIENT_PORT), + 0, IN6ADDR_ANY_INIT, 0}; + + syslog(LOG_NOTICE, "Got a DHCPv6-reply"); + + int otype, olen; + uint8_t *odata, *end = data + len; + + // Relay DHCPv6 reply from server to client + struct dhcpv6_relay_header *h = (void*)data; + if (len < sizeof(*h) || h->msg_type != DHCPV6_MSG_RELAY_REPL) + return; + + memcpy(&target.sin6_addr, &h->peer_address, + sizeof(struct in6_addr)); + + // Go through options and find what we need + dhcpv6_for_each_option(h->options, end, otype, olen, odata) { + if (otype == DHCPV6_OPT_INTERFACE_ID + && olen == sizeof(ifaceidx)) { + memcpy(&ifaceidx, odata, sizeof(ifaceidx)); + } else if (otype == DHCPV6_OPT_RELAY_MSG) { + payload_data = odata; + payload_len = olen; + } + } + + // Invalid interface-id or basic payload + struct interface *iface = odhcpd_get_interface_by_index(ifaceidx); + if (!iface || iface->master || !payload_data || payload_len < 4) + return; + + bool is_authenticated = false; + struct in6_addr *dns_ptr = NULL; + size_t dns_count = 0; + + // If the payload is relay-reply we have to send to the server port + if (payload_data[0] == DHCPV6_MSG_RELAY_REPL) { + target.sin6_port = htons(DHCPV6_SERVER_PORT); + } else { // Go through the payload data + struct dhcpv6_client_header *h = (void*)payload_data; + end = payload_data + payload_len; + + dhcpv6_for_each_option(&h[1], end, otype, olen, odata) { + if (otype == DHCPV6_OPT_DNS_SERVERS && olen >= 16) { + dns_ptr = (struct in6_addr*)odata; + dns_count = olen / 16; + } else if (otype == DHCPV6_OPT_AUTH) { + is_authenticated = true; + } + } + } + + // Rewrite DNS servers if requested + if (iface->always_rewrite_dns && dns_ptr && dns_count > 0) { + if (is_authenticated) + return; // Impossible to rewrite + + struct odhcpd_ipaddr ip; + const struct in6_addr *rewrite = iface->dns; + size_t rewrite_cnt = iface->dns_cnt; + + if (rewrite_cnt == 0) { + if (odhcpd_get_interface_addresses(iface->ifindex, &ip, 1) < 1) + return; // Unable to get interface address + + rewrite = &ip.addr; + rewrite_cnt = 1; + } + + // Copy over any other addresses + for (size_t i = 0; i < dns_count; ++i) { + size_t j = (i < rewrite_cnt) ? i : rewrite_cnt - 1; + memcpy(&dns_ptr[i], &rewrite[j], sizeof(*rewrite)); + } + } + + struct iovec iov = {payload_data, payload_len}; + odhcpd_send(dhcpv6_event.uloop.fd, &target, &iov, 1, iface); +} + + +// Relay client request (regular DHCPv6-relay) +static void relay_client_request(struct sockaddr_in6 *source, + const void *data, size_t len, struct interface *iface) +{ + struct interface *master = odhcpd_get_master_interface(); + const struct dhcpv6_relay_header *h = data; + if (!master || master->dhcpv6 != RELAYD_RELAY || + h->msg_type == DHCPV6_MSG_RELAY_REPL || + h->msg_type == DHCPV6_MSG_RECONFIGURE || + h->msg_type == DHCPV6_MSG_REPLY || + h->msg_type == DHCPV6_MSG_ADVERTISE) + return; // Invalid message types for client + + syslog(LOG_NOTICE, "Got a DHCPv6-request"); + + // Construct our forwarding envelope + struct dhcpv6_relay_forward_envelope hdr = { + .msg_type = DHCPV6_MSG_RELAY_FORW, + .hop_count = 0, + .interface_id_type = htons(DHCPV6_OPT_INTERFACE_ID), + .interface_id_len = htons(sizeof(uint32_t)), + .relay_message_type = htons(DHCPV6_OPT_RELAY_MSG), + .relay_message_len = htons(len), + }; + + if (h->msg_type == DHCPV6_MSG_RELAY_FORW) { // handle relay-forward + if (h->hop_count >= DHCPV6_HOP_COUNT_LIMIT) + return; // Invalid hop count + else + hdr.hop_count = h->hop_count + 1; + } + + // use memcpy here as the destination fields are unaligned + uint32_t ifindex = iface->ifindex; + memcpy(&hdr.peer_address, &source->sin6_addr, sizeof(struct in6_addr)); + memcpy(&hdr.interface_id_data, &ifindex, sizeof(ifindex)); + + // Detect public IP of slave interface to use as link-address + struct odhcpd_ipaddr ip; + if (odhcpd_get_interface_addresses(iface->ifindex, &ip, 1) < 1) { + // No suitable address! Is the slave not configured yet? + // Detect public IP of master interface and use it instead + // This is WRONG and probably violates the RFC. However + // otherwise we have a hen and egg problem because the + // slave-interface cannot be auto-configured. + if (odhcpd_get_interface_addresses(master->ifindex, &ip, 1) < 1) + return; // Could not obtain a suitable address + } + memcpy(&hdr.link_address, &ip.addr, sizeof(hdr.link_address)); + + struct sockaddr_in6 dhcpv6_servers = {AF_INET6, + htons(DHCPV6_SERVER_PORT), 0, ALL_DHCPV6_SERVERS, 0}; + struct iovec iov[2] = {{&hdr, sizeof(hdr)}, {(void*)data, len}}; + odhcpd_send(dhcpv6_event.uloop.fd, &dhcpv6_servers, iov, 2, master); +} |