arp.c revision 203919
1139804Simp/*
265534Salfred * Copyright (c) 1984, 1993
3143427Srwatson *	The Regents of the University of California.  All rights reserved.
465534Salfred *
561837Salfred * This code is derived from software contributed to Berkeley by
661837Salfred * Sun Microsystems, Inc.
761837Salfred *
861837Salfred * Redistribution and use in source and binary forms, with or without
961837Salfred * modification, are permitted provided that the following conditions
1061837Salfred * are met:
1161837Salfred * 1. Redistributions of source code must retain the above copyright
1261837Salfred *    notice, this list of conditions and the following disclaimer.
1361837Salfred * 2. Redistributions in binary form must reproduce the above copyright
1461837Salfred *    notice, this list of conditions and the following disclaimer in the
1561837Salfred *    documentation and/or other materials provided with the distribution.
1661837Salfred * 4. Neither the name of the University nor the names of its contributors
1761837Salfred *    may be used to endorse or promote products derived from this software
1861837Salfred *    without specific prior written permission.
1961837Salfred *
2061837Salfred * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
2161837Salfred * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
2261837Salfred * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
2361837Salfred * ARE DISCLAIMED.  IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
2461837Salfred * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
2561837Salfred * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
2661837Salfred * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
2761837Salfred * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
2861837Salfred * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
29116182Sobrien * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
30116182Sobrien * SUCH DAMAGE.
31116182Sobrien */
3261837Salfred
3361837Salfred#if 0
3477598Sjesper#ifndef lint
3561837Salfredstatic char const copyright[] =
3661837Salfred"@(#) Copyright (c) 1984, 1993\n\
3761837Salfred	The Regents of the University of California.  All rights reserved.\n";
3861837Salfred#endif /* not lint */
39129920Srwatson
4061837Salfred#ifndef lint
4161837Salfredstatic char const sccsid[] = "@(#)from: arp.c	8.2 (Berkeley) 1/2/94";
42129876Sphk#endif /* not lint */
43129920Srwatson#endif
4461837Salfred#include <sys/cdefs.h>
4565534Salfred__FBSDID("$FreeBSD: head/usr.sbin/arp/arp.c 203919 2010-02-15 14:29:17Z ru $");
4661837Salfred
4761837Salfred/*
4861837Salfred * arp - display, set, and delete arp table entries
4961837Salfred */
50129920Srwatson
51129920Srwatson
52129920Srwatson#include <sys/param.h>
53129920Srwatson#include <sys/file.h>
54129920Srwatson#include <sys/socket.h>
55129920Srwatson#include <sys/sockio.h>
5661837Salfred#include <sys/sysctl.h>
5761837Salfred#include <sys/ioctl.h>
5861837Salfred#include <sys/time.h>
5961837Salfred
6061837Salfred#include <net/if.h>
6165534Salfred#include <net/if_dl.h>
6265534Salfred#include <net/if_types.h>
6365534Salfred#include <net/route.h>
6465534Salfred#include <net/iso88025.h>
6565534Salfred
6665534Salfred#include <netinet/in.h>
6765534Salfred#include <netinet/if_ether.h>
6861837Salfred
69142056Srwatson#include <arpa/inet.h>
70142056Srwatson
71142056Srwatson#include <ctype.h>
7261837Salfred#include <err.h>
7361837Salfred#include <errno.h>
7461837Salfred#include <netdb.h>
7561837Salfred#include <nlist.h>
7661837Salfred#include <paths.h>
7761837Salfred#include <stdio.h>
78129920Srwatson#include <stdlib.h>
7961837Salfred#include <string.h>
8061837Salfred#include <strings.h>
8161837Salfred#include <unistd.h>
82129920Srwatson
8361837Salfredtypedef void (action_fn)(struct sockaddr_dl *sdl,
8461837Salfred	struct sockaddr_inarp *s_in, struct rt_msghdr *rtm);
8561837Salfred
86129920Srwatsonstatic int search(u_long addr, action_fn *action);
87184205Sdesstatic action_fn print_entry;
8861837Salfredstatic action_fn nuke_entry;
8961837Salfred
9061837Salfredstatic int delete(char *host, int do_proxy);
9161837Salfredstatic void usage(void);
9261837Salfredstatic int set(int argc, char **argv);
9361837Salfredstatic int get(char *host);
94129920Srwatsonstatic int file(char *name);
9561837Salfredstatic struct rt_msghdr *rtmsg(int cmd,
9661837Salfred    struct sockaddr_inarp *dst, struct sockaddr_dl *sdl);
9761837Salfredstatic int get_ether_addr(in_addr_t ipaddr, struct ether_addr *hwaddr);
9861837Salfredstatic struct sockaddr_inarp *getaddr(char *host);
9961837Salfredstatic int valid_type(int type);
10061837Salfred
10161837Salfredstatic int nflag;	/* no reverse dns lookups */
10261837Salfredstatic char *rifname;
10361837Salfred
10461837Salfredstatic time_t	expire_time;
10561837Salfredstatic int	flags, doing_proxy, proxy_only;
10661837Salfred
10761837Salfred/* which function we're supposed to do */
10861837Salfred#define F_GET		1
10961837Salfred#define F_SET		2
11061837Salfred#define F_FILESET	3
11161837Salfred#define F_REPLACE	4
11261837Salfred#define F_DELETE	5
11361837Salfred
11461837Salfred#define SETFUNC(f)	{ if (func) usage(); func = (f); }
11561837Salfred
116129920Srwatsonint
11761837Salfredmain(int argc, char *argv[])
11861837Salfred{
119129920Srwatson	int ch, func = 0;
120129920Srwatson	int rtn = 0;
12161837Salfred	int aflag = 0;	/* do it for all entries */
122129920Srwatson
12361837Salfred	while ((ch = getopt(argc, argv, "andfsSi:")) != -1)
12461837Salfred		switch(ch) {
12561837Salfred		case 'a':
12661837Salfred			aflag = 1;
12761837Salfred			break;
12861837Salfred		case 'd':
12961837Salfred			SETFUNC(F_DELETE);
130142060Srwatson			break;
13161837Salfred		case 'n':
13261837Salfred			nflag = 1;
13361837Salfred			break;
134184205Sdes		case 'S':
135142056Srwatson			SETFUNC(F_REPLACE);
13661837Salfred			break;
13761837Salfred		case 's':
13861837Salfred			SETFUNC(F_SET);
13961837Salfred			break;
14061837Salfred		case 'f' :
14163645Salfred			SETFUNC(F_FILESET);
142142056Srwatson			break;
143142056Srwatson		case 'i':
144142056Srwatson			rifname = optarg;
145142056Srwatson			break;
14663645Salfred		case '?':
14765534Salfred		default:
14865534Salfred			usage();
14965534Salfred		}
15065534Salfred	argc -= optind;
15161837Salfred	argv += optind;
15261837Salfred
15361837Salfred	if (!func)
15461837Salfred		func = F_GET;
15561837Salfred	if (rifname) {
15661837Salfred		if (func != F_GET && !(func == F_DELETE && aflag))
15761837Salfred			errx(1, "-i not applicable to this operation");
15861837Salfred		if (if_nametoindex(rifname) == 0) {
15961837Salfred			if (errno == ENXIO)
16061837Salfred				errx(1, "interface %s does not exist", rifname);
16161837Salfred			else
16261837Salfred				err(1, "if_nametoindex(%s)", rifname);
16361837Salfred		}
164142058Srwatson	}
165142058Srwatson	switch (func) {
166143463Srwatson	case F_GET:
167143463Srwatson		if (aflag) {
168143463Srwatson			if (argc != 0)
169143463Srwatson				usage();
170143463Srwatson			search(0, print_entry);
171143463Srwatson		} else {
172184205Sdes			if (argc != 1)
173143463Srwatson				usage();
174143463Srwatson			rtn = get(argv[0]);
175143463Srwatson		}
176143463Srwatson		break;
177143463Srwatson	case F_SET:
178143463Srwatson	case F_REPLACE:
179147300Smaxim		if (argc < 2 || argc > 6)
180147300Smaxim			usage();
181143463Srwatson		if (func == F_REPLACE)
182147300Smaxim			(void)delete(argv[0], 0);
183143463Srwatson		rtn = set(argc, argv) ? 1 : 0;
184143463Srwatson		break;
185143463Srwatson	case F_DELETE:
186143463Srwatson		if (aflag) {
187143463Srwatson			if (argc != 0)
188143463Srwatson				usage();
189143463Srwatson			search(0, nuke_entry);
190184205Sdes		} else {
191143463Srwatson			if (argc == 2 && strncmp(argv[1], "pub", 3) == 0)
192143463Srwatson				ch = SIN_PROXY;
193143463Srwatson			else if (argc == 1)
194143463Srwatson				ch = 0;
195142060Srwatson			else
196142058Srwatson				usage();
197142060Srwatson			rtn = delete(argv[0], ch);
198142060Srwatson		}
199142060Srwatson		break;
200142060Srwatson	case F_FILESET:
201142058Srwatson		if (argc != 1)
202142058Srwatson			usage();
203143427Srwatson		rtn = file(argv[0]);
204142058Srwatson		break;
205147300Smaxim	}
206143427Srwatson
207143427Srwatson	return (rtn);
208143427Srwatson}
209143427Srwatson
210143427Srwatson/*
211142058Srwatson * Process a file to set standard arp entries
212142058Srwatson */
213142058Srwatsonstatic int
214142058Srwatsonfile(char *name)
215142058Srwatson{
216142058Srwatson	FILE *fp;
217143427Srwatson	int i, retval;
218184205Sdes	char line[100], arg[5][50], *args[5], *p;
219184205Sdes
220142058Srwatson	if ((fp = fopen(name, "r")) == NULL)
221142058Srwatson		err(1, "cannot open %s", name);
222142058Srwatson	args[0] = &arg[0][0];
223142058Srwatson	args[1] = &arg[1][0];
224142058Srwatson	args[2] = &arg[2][0];
225142058Srwatson	args[3] = &arg[3][0];
226143427Srwatson	args[4] = &arg[4][0];
227143427Srwatson	retval = 0;
228143461Srwatson	while(fgets(line, sizeof(line), fp) != NULL) {
229143461Srwatson		if ((p = strchr(line, '#')) != NULL)
230143427Srwatson			*p = '\0';
231184205Sdes		for (p = line; isblank(*p); p++);
232142058Srwatson		if (*p == '\n' || *p == '\0')
233142058Srwatson			continue;
234142058Srwatson		i = sscanf(p, "%49s %49s %49s %49s %49s", arg[0], arg[1],
235142058Srwatson		    arg[2], arg[3], arg[4]);
236142058Srwatson		if (i < 2) {
237184205Sdes			warnx("bad line: %s", line);
238142058Srwatson			retval = 1;
239142058Srwatson			continue;
240142058Srwatson		}
241142058Srwatson		if (set(i, args))
242184205Sdes			retval = 1;
243142058Srwatson	}
244142058Srwatson	fclose(fp);
245142058Srwatson	return (retval);
246143461Srwatson}
247143461Srwatson
248143461Srwatson/*
249143461Srwatson * Given a hostname, fills up a (static) struct sockaddr_inarp with
250142058Srwatson * the address of the host and returns a pointer to the
251184205Sdes * structure.
252142058Srwatson */
253142058Srwatsonstatic struct sockaddr_inarp *
254142058Srwatsongetaddr(char *host)
255184205Sdes{
256142058Srwatson	struct hostent *hp;
257142058Srwatson	static struct sockaddr_inarp reply;
258142058Srwatson
259142058Srwatson	bzero(&reply, sizeof(reply));
260143461Srwatson	reply.sin_len = sizeof(reply);
261143461Srwatson	reply.sin_family = AF_INET;
262143461Srwatson	reply.sin_addr.s_addr = inet_addr(host);
263143461Srwatson	if (reply.sin_addr.s_addr == INADDR_NONE) {
264142058Srwatson		if (!(hp = gethostbyname(host))) {
265143461Srwatson			warnx("%s: %s", host, hstrerror(h_errno));
266143461Srwatson			return (NULL);
267142058Srwatson		}
268142058Srwatson		bcopy((char *)hp->h_addr, (char *)&reply.sin_addr,
269142058Srwatson			sizeof reply.sin_addr);
270143461Srwatson	}
271142058Srwatson	return (&reply);
272143461Srwatson}
273143461Srwatson
274143461Srwatson/*
275142058Srwatson * Returns true if the type is a valid one for ARP.
276142058Srwatson */
277142058Srwatsonstatic int
278142058Srwatsonvalid_type(int type)
279142058Srwatson{
280142058Srwatson
281142058Srwatson	switch (type) {
282142058Srwatson	case IFT_ETHER:
283142058Srwatson	case IFT_FDDI:
284142058Srwatson	case IFT_ISO88023:
285142058Srwatson	case IFT_ISO88024:
286142058Srwatson	case IFT_ISO88025:
287142058Srwatson	case IFT_L2VLAN:
288142058Srwatson	case IFT_BRIDGE:
289142058Srwatson		return (1);
290142058Srwatson	default:
291142058Srwatson		return (0);
292184205Sdes	}
293184205Sdes}
294142058Srwatson
295142058Srwatson/*
296184205Sdes * Set an individual arp entry
297142058Srwatson */
298142058Srwatsonstatic int
299set(int argc, char **argv)
300{
301	struct sockaddr_inarp *addr;
302	struct sockaddr_inarp *dst;	/* what are we looking for */
303	struct sockaddr_dl *sdl;
304	struct rt_msghdr *rtm;
305	struct ether_addr *ea;
306	char *host = argv[0], *eaddr = argv[1];
307	struct sockaddr_dl sdl_m;
308
309	argc -= 2;
310	argv += 2;
311
312	bzero(&sdl_m, sizeof(sdl_m));
313	sdl_m.sdl_len = sizeof(sdl_m);
314	sdl_m.sdl_family = AF_LINK;
315
316	dst = getaddr(host);
317	if (dst == NULL)
318		return (1);
319	doing_proxy = flags = proxy_only = expire_time = 0;
320	while (argc-- > 0) {
321		if (strncmp(argv[0], "temp", 4) == 0) {
322			struct timeval tv;
323			gettimeofday(&tv, 0);
324			expire_time = tv.tv_sec + 20 * 60;
325		} else if (strncmp(argv[0], "pub", 3) == 0) {
326			flags |= RTF_ANNOUNCE;
327			doing_proxy = 1;
328			if (argc && strncmp(argv[1], "only", 3) == 0) {
329				proxy_only = 1;
330				argc--; argv++;
331			}
332		} else if (strncmp(argv[0], "blackhole", 9) == 0) {
333			if (flags & RTF_REJECT) {
334				printf("Choose one of blackhole or reject, not both.\n");
335			}
336			flags |= RTF_BLACKHOLE;
337		} else if (strncmp(argv[0], "reject", 6) == 0) {
338			if (flags & RTF_BLACKHOLE) {
339				printf("Choose one of blackhole or reject, not both.\n");
340			}
341			flags |= RTF_REJECT;
342		} else if (strncmp(argv[0], "trail", 5) == 0) {
343			/* XXX deprecated and undocumented feature */
344			printf("%s: Sending trailers is no longer supported\n",
345				host);
346		}
347		argv++;
348	}
349	ea = (struct ether_addr *)LLADDR(&sdl_m);
350	if (doing_proxy && !strcmp(eaddr, "auto")) {
351		if (!get_ether_addr(dst->sin_addr.s_addr, ea)) {
352			printf("no interface found for %s\n",
353			       inet_ntoa(dst->sin_addr));
354			return (1);
355		}
356		sdl_m.sdl_alen = ETHER_ADDR_LEN;
357	} else {
358		struct ether_addr *ea1 = ether_aton(eaddr);
359
360		if (ea1 == NULL) {
361			warnx("invalid Ethernet address '%s'", eaddr);
362			return (1);
363		} else {
364			*ea = *ea1;
365			sdl_m.sdl_alen = ETHER_ADDR_LEN;
366		}
367	}
368
369	/*
370	 * In the case a proxy-arp entry is being added for
371	 * a remote end point, the RTF_ANNOUNCE flag in the
372	 * RTM_GET command is an indication to the kernel
373	 * routing code that the interface associated with
374	 * the prefix route covering the local end of the
375	 * PPP link should be returned, on which ARP applies.
376	 */
377	rtm = rtmsg(RTM_GET, dst, &sdl_m);
378	if (rtm == NULL) {
379		warn("%s", host);
380		return (1);
381	}
382	addr = (struct sockaddr_inarp *)(rtm + 1);
383	sdl = (struct sockaddr_dl *)(SA_SIZE(addr) + (char *)addr);
384	if (addr->sin_addr.s_addr == dst->sin_addr.s_addr) {
385		printf("set: proxy entry exists for non 802 device\n");
386		return (1);
387	}
388
389	if ((sdl->sdl_family != AF_LINK) ||
390	    (rtm->rtm_flags & RTF_GATEWAY) ||
391	    !valid_type(sdl->sdl_type)) {
392		printf("cannot intuit interface index and type for %s\n", host);
393		return (1);
394	}
395	sdl_m.sdl_type = sdl->sdl_type;
396	sdl_m.sdl_index = sdl->sdl_index;
397	return (rtmsg(RTM_ADD, dst, &sdl_m) == NULL);
398}
399
400/*
401 * Display an individual arp entry
402 */
403static int
404get(char *host)
405{
406	struct sockaddr_inarp *addr;
407
408	addr = getaddr(host);
409	if (addr == NULL)
410		return (1);
411	if (0 == search(addr->sin_addr.s_addr, print_entry)) {
412		printf("%s (%s) -- no entry",
413		    host, inet_ntoa(addr->sin_addr));
414		if (rifname)
415			printf(" on %s", rifname);
416		printf("\n");
417		return (1);
418	}
419	return (0);
420}
421
422/*
423 * Delete an arp entry
424 */
425static int
426delete(char *host, int do_proxy)
427{
428	struct sockaddr_inarp *addr, *dst;
429	struct rt_msghdr *rtm;
430	struct sockaddr_dl *sdl;
431	struct sockaddr_dl sdl_m;
432
433	dst = getaddr(host);
434	if (dst == NULL)
435		return (1);
436
437	/*
438	 * Perform a regular entry delete first.
439	 */
440	flags &= ~RTF_ANNOUNCE;
441
442	/*
443	 * setup the data structure to notify the kernel
444	 * it is the ARP entry the RTM_GET is interested
445	 * in
446	 */
447	bzero(&sdl_m, sizeof(sdl_m));
448	sdl_m.sdl_len = sizeof(sdl_m);
449	sdl_m.sdl_family = AF_LINK;
450
451	for (;;) {	/* try twice */
452		rtm = rtmsg(RTM_GET, dst, &sdl_m);
453		if (rtm == NULL) {
454			warn("%s", host);
455			return (1);
456		}
457		addr = (struct sockaddr_inarp *)(rtm + 1);
458		sdl = (struct sockaddr_dl *)(SA_SIZE(addr) + (char *)addr);
459
460		/*
461		 * With the new L2/L3 restructure, the route
462		 * returned is a prefix route. The important
463		 * piece of information from the previous
464		 * RTM_GET is the interface index. In the
465		 * case of ECMP, the kernel will traverse
466		 * the route group for the given entry.
467		 */
468		if (sdl->sdl_family == AF_LINK &&
469		    !(rtm->rtm_flags & RTF_GATEWAY) &&
470		    valid_type(sdl->sdl_type) ) {
471			addr->sin_addr.s_addr = dst->sin_addr.s_addr;
472			break;
473		}
474
475		/*
476		 * Regualar entry delete failed, now check if there
477		 * is a proxy-arp entry to remove.
478		 */
479		if (flags & RTF_ANNOUNCE) {
480			fprintf(stderr, "delete: cannot locate %s\n",host);
481			return (1);
482		}
483
484		flags |= RTF_ANNOUNCE;
485	}
486	rtm->rtm_flags |= RTF_LLDATA;
487	if (rtmsg(RTM_DELETE, dst, NULL) != NULL) {
488		printf("%s (%s) deleted\n", host, inet_ntoa(addr->sin_addr));
489		return (0);
490	}
491	return (1);
492}
493
494
495/*
496 * Search the arp table and do some action on matching entries
497 */
498static int
499search(u_long addr, action_fn *action)
500{
501	int mib[6];
502	size_t needed;
503	char *lim, *buf, *next;
504	struct rt_msghdr *rtm;
505	struct sockaddr_inarp *sin2;
506	struct sockaddr_dl *sdl;
507	char ifname[IF_NAMESIZE];
508	int st, found_entry = 0;
509
510	mib[0] = CTL_NET;
511	mib[1] = PF_ROUTE;
512	mib[2] = 0;
513	mib[3] = AF_INET;
514	mib[4] = NET_RT_FLAGS;
515#ifdef RTF_LLINFO
516	mib[5] = RTF_LLINFO;
517#else
518	mib[5] = 0;
519#endif
520	if (sysctl(mib, 6, NULL, &needed, NULL, 0) < 0)
521		err(1, "route-sysctl-estimate");
522	if (needed == 0)	/* empty table */
523		return 0;
524	buf = NULL;
525	for (;;) {
526		buf = reallocf(buf, needed);
527		if (buf == NULL)
528			errx(1, "could not reallocate memory");
529		st = sysctl(mib, 6, buf, &needed, NULL, 0);
530		if (st == 0 || errno != ENOMEM)
531			break;
532		needed += needed / 8;
533	}
534	if (st == -1)
535		err(1, "actual retrieval of routing table");
536	lim = buf + needed;
537	for (next = buf; next < lim; next += rtm->rtm_msglen) {
538		rtm = (struct rt_msghdr *)next;
539		sin2 = (struct sockaddr_inarp *)(rtm + 1);
540		sdl = (struct sockaddr_dl *)((char *)sin2 + SA_SIZE(sin2));
541		if (rifname && if_indextoname(sdl->sdl_index, ifname) &&
542		    strcmp(ifname, rifname))
543			continue;
544		if (addr) {
545			if (addr != sin2->sin_addr.s_addr)
546				continue;
547			found_entry = 1;
548		}
549		(*action)(sdl, sin2, rtm);
550	}
551	free(buf);
552	return (found_entry);
553}
554
555/*
556 * Display an arp entry
557 */
558static void
559print_entry(struct sockaddr_dl *sdl,
560	struct sockaddr_inarp *addr, struct rt_msghdr *rtm)
561{
562	const char *host;
563	struct hostent *hp;
564	struct iso88025_sockaddr_dl_data *trld;
565	char ifname[IF_NAMESIZE];
566	int seg;
567
568	if (nflag == 0)
569		hp = gethostbyaddr((caddr_t)&(addr->sin_addr),
570		    sizeof addr->sin_addr, AF_INET);
571	else
572		hp = 0;
573	if (hp)
574		host = hp->h_name;
575	else {
576		host = "?";
577		if (h_errno == TRY_AGAIN)
578			nflag = 1;
579	}
580	printf("%s (%s) at ", host, inet_ntoa(addr->sin_addr));
581	if (sdl->sdl_alen) {
582		if ((sdl->sdl_type == IFT_ETHER ||
583		    sdl->sdl_type == IFT_L2VLAN ||
584		    sdl->sdl_type == IFT_BRIDGE) &&
585		    sdl->sdl_alen == ETHER_ADDR_LEN)
586			printf("%s", ether_ntoa((struct ether_addr *)LLADDR(sdl)));
587		else {
588			int n = sdl->sdl_nlen > 0 ? sdl->sdl_nlen + 1 : 0;
589
590			printf("%s", link_ntoa(sdl) + n);
591		}
592	} else
593		printf("(incomplete)");
594	if (if_indextoname(sdl->sdl_index, ifname) != NULL)
595		printf(" on %s", ifname);
596	if (rtm->rtm_rmx.rmx_expire == 0)
597		printf(" permanent");
598	else {
599		static struct timeval tv;
600		if (tv.tv_sec == 0)
601			gettimeofday(&tv, 0);
602		if ((expire_time = rtm->rtm_rmx.rmx_expire - tv.tv_sec) > 0)
603			printf(" expires in %d seconds", (int)expire_time);
604		else
605			printf(" expired");
606	}
607	if (addr->sin_other & SIN_PROXY)
608		printf(" published (proxy only)");
609	if (rtm->rtm_flags & RTF_ANNOUNCE)
610		printf(" published");
611	switch(sdl->sdl_type) {
612	case IFT_ETHER:
613                printf(" [ethernet]");
614                break;
615	case IFT_ISO88025:
616                printf(" [token-ring]");
617		trld = SDL_ISO88025(sdl);
618		if (trld->trld_rcf != 0) {
619			printf(" rt=%x", ntohs(trld->trld_rcf));
620			for (seg = 0;
621			     seg < ((TR_RCF_RIFLEN(trld->trld_rcf) - 2 ) / 2);
622			     seg++)
623				printf(":%x", ntohs(*(trld->trld_route[seg])));
624		}
625                break;
626	case IFT_FDDI:
627                printf(" [fddi]");
628                break;
629	case IFT_ATM:
630                printf(" [atm]");
631                break;
632	case IFT_L2VLAN:
633		printf(" [vlan]");
634		break;
635	case IFT_IEEE1394:
636                printf(" [firewire]");
637                break;
638	case IFT_BRIDGE:
639		printf(" [bridge]");
640		break;
641	default:
642		break;
643        }
644
645	printf("\n");
646
647}
648
649/*
650 * Nuke an arp entry
651 */
652static void
653nuke_entry(struct sockaddr_dl *sdl __unused,
654	struct sockaddr_inarp *addr, struct rt_msghdr *rtm __unused)
655{
656	char ip[20];
657
658	snprintf(ip, sizeof(ip), "%s", inet_ntoa(addr->sin_addr));
659	(void)delete(ip, 0);
660}
661
662static void
663usage(void)
664{
665	fprintf(stderr, "%s\n%s\n%s\n%s\n%s\n%s\n%s\n",
666		"usage: arp [-n] [-i interface] hostname",
667		"       arp [-n] [-i interface] -a",
668		"       arp -d hostname [pub]",
669		"       arp -d [-i interface] -a",
670		"       arp -s hostname ether_addr [temp] [reject | blackhole] [pub [only]]",
671		"       arp -S hostname ether_addr [temp] [reject | blackhole] [pub [only]]",
672		"       arp -f filename");
673	exit(1);
674}
675
676static struct rt_msghdr *
677rtmsg(int cmd, struct sockaddr_inarp *dst, struct sockaddr_dl *sdl)
678{
679	static int seq;
680	int rlen;
681	int l;
682	struct sockaddr_in so_mask, *som = &so_mask;
683	static int s = -1;
684	static pid_t pid;
685
686	static struct	{
687		struct	rt_msghdr m_rtm;
688		char	m_space[512];
689	}	m_rtmsg;
690
691	struct rt_msghdr *rtm = &m_rtmsg.m_rtm;
692	char *cp = m_rtmsg.m_space;
693
694	if (s < 0) {	/* first time: open socket, get pid */
695		s = socket(PF_ROUTE, SOCK_RAW, 0);
696		if (s < 0)
697			err(1, "socket");
698		pid = getpid();
699	}
700	bzero(&so_mask, sizeof(so_mask));
701	so_mask.sin_len = 8;
702	so_mask.sin_addr.s_addr = 0xffffffff;
703
704	errno = 0;
705	/*
706	 * XXX RTM_DELETE relies on a previous RTM_GET to fill the buffer
707	 * appropriately.
708	 */
709	if (cmd == RTM_DELETE)
710		goto doit;
711	bzero((char *)&m_rtmsg, sizeof(m_rtmsg));
712	rtm->rtm_flags = flags;
713	rtm->rtm_version = RTM_VERSION;
714
715	switch (cmd) {
716	default:
717		errx(1, "internal wrong cmd");
718	case RTM_ADD:
719		rtm->rtm_addrs |= RTA_GATEWAY;
720		rtm->rtm_rmx.rmx_expire = expire_time;
721		rtm->rtm_inits = RTV_EXPIRE;
722		rtm->rtm_flags |= (RTF_HOST | RTF_STATIC | RTF_LLDATA);
723		dst->sin_other = 0;
724		if (doing_proxy) {
725			if (proxy_only)
726				dst->sin_other = SIN_PROXY;
727			else {
728				rtm->rtm_addrs |= RTA_NETMASK;
729				rtm->rtm_flags &= ~RTF_HOST;
730			}
731		}
732		/* FALLTHROUGH */
733	case RTM_GET:
734		rtm->rtm_addrs |= RTA_DST;
735	}
736#define NEXTADDR(w, s)					   \
737	do {						   \
738		if ((s) != NULL && rtm->rtm_addrs & (w)) { \
739			bcopy((s), cp, sizeof(*(s)));	   \
740			cp += SA_SIZE(s);		   \
741		}					   \
742	} while (0)
743
744	NEXTADDR(RTA_DST, dst);
745	NEXTADDR(RTA_GATEWAY, sdl);
746	NEXTADDR(RTA_NETMASK, som);
747
748	rtm->rtm_msglen = cp - (char *)&m_rtmsg;
749doit:
750	l = rtm->rtm_msglen;
751	rtm->rtm_seq = ++seq;
752	rtm->rtm_type = cmd;
753	if ((rlen = write(s, (char *)&m_rtmsg, l)) < 0) {
754		if (errno != ESRCH || cmd != RTM_DELETE) {
755			warn("writing to routing socket");
756			return (NULL);
757		}
758	}
759	do {
760		l = read(s, (char *)&m_rtmsg, sizeof(m_rtmsg));
761	} while (l > 0 && (rtm->rtm_seq != seq || rtm->rtm_pid != pid));
762	if (l < 0)
763		warn("read from routing socket");
764	return (rtm);
765}
766
767/*
768 * get_ether_addr - get the hardware address of an interface on the
769 * the same subnet as ipaddr.
770 */
771#define MAX_IFS		32
772
773static int
774get_ether_addr(in_addr_t ipaddr, struct ether_addr *hwaddr)
775{
776	struct ifreq *ifr, *ifend, *ifp;
777	in_addr_t ina, mask;
778	struct sockaddr_dl *dla;
779	struct ifreq ifreq;
780	struct ifconf ifc;
781	struct ifreq ifs[MAX_IFS];
782	int sock;
783	int retval = 0;
784
785	sock = socket(AF_INET, SOCK_DGRAM, 0);
786	if (sock < 0)
787		err(1, "socket");
788
789	ifc.ifc_len = sizeof(ifs);
790	ifc.ifc_req = ifs;
791	if (ioctl(sock, SIOCGIFCONF, &ifc) < 0) {
792		warnx("ioctl(SIOCGIFCONF)");
793		goto done;
794	}
795
796#define NEXTIFR(i)						\
797    ((struct ifreq *)((char *)&(i)->ifr_addr			\
798	+ MAX((i)->ifr_addr.sa_len, sizeof((i)->ifr_addr))) )
799
800	/*
801	 * Scan through looking for an interface with an Internet
802	 * address on the same subnet as `ipaddr'.
803	 */
804	ifend = (struct ifreq *)(ifc.ifc_buf + ifc.ifc_len);
805	for (ifr = ifc.ifc_req; ifr < ifend; ifr = NEXTIFR(ifr) ) {
806		if (ifr->ifr_addr.sa_family != AF_INET)
807			continue;
808		strncpy(ifreq.ifr_name, ifr->ifr_name,
809			sizeof(ifreq.ifr_name));
810		ifreq.ifr_addr = ifr->ifr_addr;
811		/*
812		 * Check that the interface is up,
813		 * and not point-to-point or loopback.
814		 */
815		if (ioctl(sock, SIOCGIFFLAGS, &ifreq) < 0)
816			continue;
817		if ((ifreq.ifr_flags &
818		     (IFF_UP|IFF_BROADCAST|IFF_POINTOPOINT|
819				IFF_LOOPBACK|IFF_NOARP))
820		     != (IFF_UP|IFF_BROADCAST))
821			continue;
822		/*
823		 * Get its netmask and check that it's on
824		 * the right subnet.
825		 */
826		if (ioctl(sock, SIOCGIFNETMASK, &ifreq) < 0)
827			continue;
828		mask = ((struct sockaddr_in *)
829			&ifreq.ifr_addr)->sin_addr.s_addr;
830		ina = ((struct sockaddr_in *)
831			&ifr->ifr_addr)->sin_addr.s_addr;
832		if ((ipaddr & mask) == (ina & mask))
833			break; /* ok, we got it! */
834	}
835
836	if (ifr >= ifend)
837		goto done;
838
839	/*
840	 * Now scan through again looking for a link-level address
841	 * for this interface.
842	 */
843	ifp = ifr;
844	for (ifr = ifc.ifc_req; ifr < ifend; ifr = NEXTIFR(ifr))
845		if (strcmp(ifp->ifr_name, ifr->ifr_name) == 0 &&
846		    ifr->ifr_addr.sa_family == AF_LINK)
847			break;
848	if (ifr >= ifend)
849		goto done;
850	/*
851	 * Found the link-level address - copy it out
852	 */
853	dla = (struct sockaddr_dl *) &ifr->ifr_addr;
854	memcpy(hwaddr,  LLADDR(dla), dla->sdl_alen);
855	printf("using interface %s for proxy with address ",
856		ifp->ifr_name);
857	printf("%s\n", ether_ntoa(hwaddr));
858	retval = dla->sdl_alen;
859done:
860	close(sock);
861	return (retval);
862}
863