rtsol.c revision 66776
1258065Spjd/* $KAME$ */ 2258065Spjd 3258065Spjd/* 4258065Spjd * Copyright (C) 1995, 1996, 1997, and 1998 WIDE Project. 5258065Spjd * All rights reserved. 6258065Spjd * 7258065Spjd * Redistribution and use in source and binary forms, with or without 8258065Spjd * modification, are permitted provided that the following conditions 9258065Spjd * are met: 10258065Spjd * 1. Redistributions of source code must retain the above copyright 11258065Spjd * notice, this list of conditions and the following disclaimer. 12258065Spjd * 2. Redistributions in binary form must reproduce the above copyright 13258065Spjd * notice, this list of conditions and the following disclaimer in the 14258065Spjd * documentation and/or other materials provided with the distribution. 15258065Spjd * 3. Neither the name of the project nor the names of its contributors 16258065Spjd * may be used to endorse or promote products derived from this software 17258065Spjd * without specific prior written permission. 18258065Spjd * 19258065Spjd * THIS SOFTWARE IS PROVIDED BY THE PROJECT AND CONTRIBUTORS ``AS IS'' AND 20258065Spjd * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 21258065Spjd * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 22258065Spjd * ARE DISCLAIMED. IN NO EVENT SHALL THE PROJECT OR CONTRIBUTORS BE LIABLE 23258065Spjd * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 24258065Spjd * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 25258065Spjd * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 26258065Spjd * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 27258065Spjd * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 28258065Spjd * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 29258065Spjd * SUCH DAMAGE. 30258065Spjd * 31258065Spjd * $FreeBSD: head/usr.sbin/rtsold/rtsol.c 66776 2000-10-06 23:46:52Z kris $ 32258065Spjd */ 33258065Spjd 34258065Spjd#include <sys/param.h> 35258065Spjd#include <sys/socket.h> 36258065Spjd#include <sys/uio.h> 37258065Spjd#include <sys/time.h> 38258065Spjd#include <sys/queue.h> 39258065Spjd 40258065Spjd#include <net/if.h> 41258065Spjd#include <net/route.h> 42258065Spjd#include <net/if_dl.h> 43258065Spjd 44258065Spjd#include <netinet/in.h> 45258065Spjd#include <netinet/ip6.h> 46258065Spjd#include <netinet6/ip6_var.h> 47258065Spjd#include <netinet/icmp6.h> 48258065Spjd 49258065Spjd#include <arpa/inet.h> 50258065Spjd 51258065Spjd#include <time.h> 52258065Spjd#include <unistd.h> 53258065Spjd#include <stdio.h> 54258065Spjd#include <err.h> 55258065Spjd#include <errno.h> 56258065Spjd#include <string.h> 57258065Spjd#include <stdlib.h> 58258065Spjd#include <syslog.h> 59258065Spjd#include "rtsold.h" 60258065Spjd 61258065Spjd#define ALLROUTER "ff02::2" 62258065Spjd 63258065Spjdstatic struct msghdr rcvmhdr; 64258065Spjdstatic struct msghdr sndmhdr; 65258065Spjdstatic struct iovec rcviov[2]; 66258065Spjdstatic struct iovec sndiov[2]; 67258065Spjdstatic struct sockaddr_in6 from; 68258065Spjd 69258065Spjdint rssock; 70258065Spjd 71258065Spjdstatic struct sockaddr_in6 sin6_allrouters = {sizeof(sin6_allrouters), AF_INET6}; 72258065Spjd 73258065Spjdint 74258065Spjdsockopen() 75258065Spjd{ 76271579Spjd int on; 77271579Spjd struct icmp6_filter filt; 78271579Spjd static u_char answer[1500]; 79271579Spjd int rcvcmsglen, sndcmsglen; 80271579Spjd static u_char *rcvcmsgbuf = NULL, *sndcmsgbuf = NULL; 81258065Spjd 82258065Spjd sndcmsglen = rcvcmsglen = CMSG_SPACE(sizeof(struct in6_pktinfo)) + 83258065Spjd CMSG_SPACE(sizeof(int)); 84258065Spjd if (rcvcmsgbuf == NULL && (rcvcmsgbuf = malloc(rcvcmsglen)) == NULL) { 85258065Spjd warnmsg(LOG_ERR, __FUNCTION__, 86258065Spjd "malloc for receive msghdr failed"); 87258065Spjd return(-1); 88258065Spjd } 89258065Spjd if (sndcmsgbuf == NULL && (sndcmsgbuf = malloc(sndcmsglen)) == NULL) { 90258065Spjd warnmsg(LOG_ERR, __FUNCTION__, 91258065Spjd "malloc for send msghdr failed"); 92258065Spjd return(-1); 93258065Spjd } 94258065Spjd memset(&sin6_allrouters, 0, sizeof(struct sockaddr_in6)); 95258065Spjd if (inet_pton(AF_INET6, ALLROUTER, 96258065Spjd &sin6_allrouters.sin6_addr.s6_addr) != 1) { 97258065Spjd warnmsg(LOG_ERR, __FUNCTION__, "inet_pton failed for %s", 98258065Spjd ALLROUTER); 99258065Spjd return(-1); 100258065Spjd } 101258065Spjd 102258065Spjd if ((rssock = socket(AF_INET6, SOCK_RAW, IPPROTO_ICMPV6)) < 0) { 103258065Spjd warnmsg(LOG_ERR, __FUNCTION__, "socket: %s", strerror(errno)); 104258065Spjd return(-1); 105258065Spjd } 106258065Spjd 107258065Spjd /* specify to tell receiving interface */ 108258065Spjd on = 1; 109258065Spjd#ifdef IPV6_RECVPKTINFO 110271579Spjd if (setsockopt(rssock, IPPROTO_IPV6, IPV6_RECVPKTINFO, &on, 111258065Spjd sizeof(on)) < 0) { 112258065Spjd warnmsg(LOG_ERR, __FUNCTION__, "IPV6_RECVPKTINFO: %s", 113258065Spjd strerror(errno)); 114258065Spjd exit(1); 115258065Spjd } 116258065Spjd#else /* old adv. API */ 117258065Spjd if (setsockopt(rssock, IPPROTO_IPV6, IPV6_PKTINFO, &on, 118258065Spjd sizeof(on)) < 0) { 119258065Spjd warnmsg(LOG_ERR, __FUNCTION__, "IPV6_PKTINFO: %s", 120258065Spjd strerror(errno)); 121258065Spjd exit(1); 122258065Spjd } 123258065Spjd#endif 124258065Spjd 125258065Spjd on = 1; 126258065Spjd /* specify to tell value of hoplimit field of received IP6 hdr */ 127258065Spjd#ifdef IPV6_RECVHOPLIMIT 128258065Spjd if (setsockopt(rssock, IPPROTO_IPV6, IPV6_RECVHOPLIMIT, &on, 129258065Spjd sizeof(on)) < 0) { 130260222Spjd warnmsg(LOG_ERR, __FUNCTION__, "IPV6_RECVHOPLIMIT: %s", 131258065Spjd strerror(errno)); 132260222Spjd exit(1); 133260222Spjd } 134258065Spjd#else /* old adv. API */ 135258065Spjd if (setsockopt(rssock, IPPROTO_IPV6, IPV6_HOPLIMIT, &on, 136258065Spjd sizeof(on)) < 0) { 137258065Spjd warnmsg(LOG_ERR, __FUNCTION__, "IPV6_HOPLIMIT: %s", 138258065Spjd strerror(errno)); 139258065Spjd exit(1); 140258065Spjd } 141258065Spjd#endif 142258065Spjd 143258065Spjd /* specfiy to accept only router advertisements on the socket */ 144258065Spjd ICMP6_FILTER_SETBLOCKALL(&filt); 145258065Spjd ICMP6_FILTER_SETPASS(ND_ROUTER_ADVERT, &filt); 146258065Spjd if (setsockopt(rssock, IPPROTO_ICMPV6, ICMP6_FILTER, &filt, 147258065Spjd sizeof(filt)) == -1) { 148258065Spjd warnmsg(LOG_ERR, __FUNCTION__, "setsockopt(ICMP6_FILTER): %s", 149258065Spjd strerror(errno)); 150258065Spjd return(-1); 151258065Spjd } 152271579Spjd 153271579Spjd /* initialize msghdr for receiving packets */ 154271579Spjd rcviov[0].iov_base = (caddr_t)answer; 155271579Spjd rcviov[0].iov_len = sizeof(answer); 156271579Spjd rcvmhdr.msg_name = (caddr_t)&from; 157271579Spjd rcvmhdr.msg_namelen = sizeof(from); 158271579Spjd rcvmhdr.msg_iov = rcviov; 159271579Spjd rcvmhdr.msg_iovlen = 1; 160271579Spjd rcvmhdr.msg_control = (caddr_t) rcvcmsgbuf; 161271579Spjd rcvmhdr.msg_controllen = rcvcmsglen; 162277921Spjd 163271579Spjd /* initialize msghdr for sending packets */ 164277921Spjd sndmhdr.msg_namelen = sizeof(struct sockaddr_in6); 165271579Spjd sndmhdr.msg_iov = sndiov; 166271579Spjd sndmhdr.msg_iovlen = 1; 167271579Spjd sndmhdr.msg_control = (caddr_t)sndcmsgbuf; 168277921Spjd sndmhdr.msg_controllen = sndcmsglen; 169277921Spjd 170277921Spjd return(rssock); 171277921Spjd} 172271579Spjd 173271579Spjdvoid 174277921Spjdsendpacket(struct ifinfo *ifinfo) 175271579Spjd{ 176271579Spjd int i; 177271579Spjd struct cmsghdr *cm; 178271579Spjd struct in6_pktinfo *pi; 179271579Spjd 180271579Spjd sndmhdr.msg_name = (caddr_t)&sin6_allrouters; 181271579Spjd sndmhdr.msg_iov[0].iov_base = (caddr_t)ifinfo->rs_data; 182271579Spjd sndmhdr.msg_iov[0].iov_len = ifinfo->rs_datalen; 183271579Spjd 184271579Spjd cm = CMSG_FIRSTHDR(&sndmhdr); 185271579Spjd /* specify the outgoing interface */ 186258065Spjd cm->cmsg_level = IPPROTO_IPV6; 187258065Spjd cm->cmsg_type = IPV6_PKTINFO; 188258065Spjd cm->cmsg_len = CMSG_LEN(sizeof(struct in6_pktinfo)); 189258065Spjd pi = (struct in6_pktinfo *)CMSG_DATA(cm); 190258065Spjd memset(&pi->ipi6_addr, 0, sizeof(pi->ipi6_addr)); /*XXX*/ 191258065Spjd pi->ipi6_ifindex = ifinfo->sdl->sdl_index; 192258065Spjd 193258065Spjd /* specify the hop limit of the packet */ 194258065Spjd { 195258065Spjd int hoplimit = 255; 196258065Spjd 197258065Spjd cm = CMSG_NXTHDR(&sndmhdr, cm); 198258065Spjd cm->cmsg_level = IPPROTO_IPV6; 199258065Spjd cm->cmsg_type = IPV6_HOPLIMIT; 200258065Spjd cm->cmsg_len = CMSG_LEN(sizeof(int)); 201258065Spjd memcpy(CMSG_DATA(cm), &hoplimit, sizeof(int)); 202258065Spjd } 203258065Spjd 204258065Spjd warnmsg(LOG_DEBUG, 205258065Spjd __FUNCTION__, "send RS on %s, whose state is %d", 206258065Spjd ifinfo->ifname, ifinfo->state); 207258065Spjd 208258065Spjd i = sendmsg(rssock, &sndmhdr, 0); 209258065Spjd 210258065Spjd if (i < 0 || i != ifinfo->rs_datalen) { 211258065Spjd /* 212258065Spjd * ENETDOWN is not so serious, especially when using several 213258065Spjd * network cards on a mobile node. We ignore it. 214258065Spjd */ 215258065Spjd if (errno != ENETDOWN || dflag > 0) 216258065Spjd warnmsg(LOG_ERR, __FUNCTION__, "sendmsg on %s: %s", 217258065Spjd ifinfo->ifname, strerror(errno)); 218258065Spjd } 219258065Spjd 220258065Spjd /* update counter */ 221258065Spjd ifinfo->probes++; 222258065Spjd} 223258065Spjd 224258065Spjdvoid 225258065Spjdrtsol_input(int s) 226258065Spjd{ 227258065Spjd int i; 228258065Spjd int *hlimp = NULL; 229258065Spjd struct icmp6_hdr *icp; 230258065Spjd int ifindex = 0; 231258065Spjd struct cmsghdr *cm; 232258065Spjd struct in6_pktinfo *pi = NULL; 233258065Spjd struct ifinfo *ifi = NULL; 234258065Spjd u_char ntopbuf[INET6_ADDRSTRLEN], ifnamebuf[IFNAMSIZ]; 235258065Spjd 236258065Spjd /* get message */ 237258065Spjd if ((i = recvmsg(s, &rcvmhdr, 0)) < 0) { 238258065Spjd warnmsg(LOG_ERR, __FUNCTION__, "recvmsg: %s", strerror(errno)); 239258065Spjd return; 240258065Spjd } 241258065Spjd 242258065Spjd /* extract optional information via Advanced API */ 243258065Spjd for (cm = (struct cmsghdr *)CMSG_FIRSTHDR(&rcvmhdr); 244258065Spjd cm; 245258065Spjd cm = (struct cmsghdr *)CMSG_NXTHDR(&rcvmhdr, cm)) { 246258065Spjd if (cm->cmsg_level == IPPROTO_IPV6 && 247258065Spjd cm->cmsg_type == IPV6_PKTINFO && 248258065Spjd cm->cmsg_len == CMSG_LEN(sizeof(struct in6_pktinfo))) { 249258065Spjd pi = (struct in6_pktinfo *)(CMSG_DATA(cm)); 250258065Spjd ifindex = pi->ipi6_ifindex; 251258065Spjd } 252258065Spjd if (cm->cmsg_level == IPPROTO_IPV6 && 253258065Spjd cm->cmsg_type == IPV6_HOPLIMIT && 254258065Spjd cm->cmsg_len == CMSG_LEN(sizeof(int))) 255258065Spjd hlimp = (int *)CMSG_DATA(cm); 256258065Spjd } 257258065Spjd 258258065Spjd if (ifindex == 0) { 259258065Spjd warnmsg(LOG_ERR, 260258065Spjd __FUNCTION__, "failed to get receiving interface"); 261258065Spjd return; 262258065Spjd } 263258065Spjd if (hlimp == NULL) { 264258065Spjd warnmsg(LOG_ERR, 265258065Spjd __FUNCTION__, "failed to get receiving hop limit"); 266258065Spjd return; 267258065Spjd } 268258065Spjd 269258065Spjd if (i < sizeof(struct nd_router_advert)) { 270258065Spjd warnmsg(LOG_ERR, 271258065Spjd __FUNCTION__, "packet size(%d) is too short", i); 272258065Spjd return; 273258065Spjd } 274258065Spjd 275258065Spjd icp = (struct icmp6_hdr *)rcvmhdr.msg_iov[0].iov_base; 276258065Spjd 277258065Spjd if (icp->icmp6_type != ND_ROUTER_ADVERT) { 278258065Spjd warnmsg(LOG_ERR, __FUNCTION__, 279258065Spjd "invalid icmp type(%d) from %s on %s", icp->icmp6_type, 280258065Spjd inet_ntop(AF_INET6, &from.sin6_addr, ntopbuf, 281258065Spjd INET6_ADDRSTRLEN), 282258065Spjd if_indextoname(pi->ipi6_ifindex, ifnamebuf)); 283258065Spjd return; 284258065Spjd } 285258065Spjd 286258065Spjd if (icp->icmp6_code != 0) { 287258065Spjd warnmsg(LOG_ERR, __FUNCTION__, 288258065Spjd "invalid icmp code(%d) from %s on %s", icp->icmp6_code, 289258065Spjd inet_ntop(AF_INET6, &from.sin6_addr, ntopbuf, 290258065Spjd INET6_ADDRSTRLEN), 291258065Spjd if_indextoname(pi->ipi6_ifindex, ifnamebuf)); 292258065Spjd return; 293258065Spjd } 294258065Spjd 295258065Spjd if (*hlimp != 255) { 296258065Spjd warnmsg(LOG_NOTICE, __FUNCTION__, 297258065Spjd "invalid RA with hop limit(%d) from %s on %s", 298258065Spjd *hlimp, 299258065Spjd inet_ntop(AF_INET6, &from.sin6_addr, ntopbuf, 300258065Spjd INET6_ADDRSTRLEN), 301258065Spjd if_indextoname(pi->ipi6_ifindex, ifnamebuf)); 302258065Spjd return; 303258065Spjd } 304258065Spjd 305258065Spjd if (pi && !IN6_IS_ADDR_LINKLOCAL(&from.sin6_addr)) { 306258065Spjd warnmsg(LOG_NOTICE, __FUNCTION__, 307258065Spjd "invalid RA with non link-local source from %s on %s", 308258065Spjd inet_ntop(AF_INET6, &from.sin6_addr, ntopbuf, 309258065Spjd INET6_ADDRSTRLEN), 310258065Spjd if_indextoname(pi->ipi6_ifindex, ifnamebuf)); 311258065Spjd return; 312258065Spjd } 313258065Spjd 314258065Spjd /* xxx: more validation? */ 315258065Spjd 316258065Spjd if ((ifi = find_ifinfo(pi->ipi6_ifindex)) == NULL) { 317258065Spjd warnmsg(LOG_NOTICE, __FUNCTION__, 318258065Spjd "received RA from %s on an unexpeced IF(%s)", 319258065Spjd inet_ntop(AF_INET6, &from.sin6_addr, ntopbuf, 320258065Spjd INET6_ADDRSTRLEN), 321258065Spjd if_indextoname(pi->ipi6_ifindex, ifnamebuf)); 322258065Spjd return; 323258065Spjd } 324258065Spjd 325258065Spjd warnmsg(LOG_DEBUG, __FUNCTION__, 326258065Spjd "received RA from %s on %s, state is %d", 327258065Spjd inet_ntop(AF_INET6, &from.sin6_addr, ntopbuf, 328258065Spjd INET6_ADDRSTRLEN), 329258065Spjd ifi->ifname, ifi->state); 330258065Spjd 331258065Spjd ifi->racnt++; 332258065Spjd 333258065Spjd switch(ifi->state) { 334258065Spjd case IFS_IDLE: /* should be ignored */ 335258065Spjd case IFS_DELAY: /* right? */ 336258065Spjd break; 337258065Spjd case IFS_PROBE: 338258065Spjd ifi->state = IFS_IDLE; 339258065Spjd ifi->probes = 0; 340271579Spjd rtsol_timer_update(ifi); 341271579Spjd break; 342271579Spjd } 343271579Spjd} 344271579Spjd