blob: 759a4ba0343f48d1c20826f05b3e7198d9fea984 [file] [log] [blame]
Denis Vlasenko736230e2006-11-20 19:40:36 +00001/* vi: set sw=4 ts=4: */
2/* Port to Busybox Copyright (C) 2006 Jesse Dutton <jessedutton@gmail.com>
3 *
Denys Vlasenko0ef64bd2010-08-16 20:14:46 +02004 * Licensed under GPLv2, see file LICENSE in this source tree.
Denis Vlasenko736230e2006-11-20 19:40:36 +00005 *
Bernhard Reutner-Fischera8381942006-11-21 11:23:11 +00006 * DHCP Relay for 'DHCPv4 Configuration of IPSec Tunnel Mode' support
7 * Copyright (C) 2002 Mario Strasser <mast@gmx.net>,
Denis Vlasenko736230e2006-11-20 19:40:36 +00008 * Zuercher Hochschule Winterthur,
Bernhard Reutner-Fischera8381942006-11-21 11:23:11 +00009 * Netbeat AG
Denis Vlasenko736230e2006-11-20 19:40:36 +000010 * Upstream has GPL v2 or later
11 */
Denis Vlasenko736230e2006-11-20 19:40:36 +000012#include "common.h"
Denis Vlasenko736230e2006-11-20 19:40:36 +000013
Denys Vlasenkoc0f39b02010-10-06 01:45:24 +020014#define SERVER_PORT 67
15
16/* lifetime of an xid entry in sec. */
17#define MAX_LIFETIME 2*60
18/* select timeout in sec. */
19#define SELECT_TIMEOUT (MAX_LIFETIME / 8)
Denis Vlasenko736230e2006-11-20 19:40:36 +000020
Denis Vlasenko736230e2006-11-20 19:40:36 +000021/* This list holds information about clients. The xid_* functions manipulate this list. */
Denis Vlasenkob9256052007-09-28 10:29:17 +000022struct xid_item {
Denis Vlasenkod7b33502007-09-30 17:54:10 +000023 unsigned timestamp;
Denis Vlasenkob9256052007-09-28 10:29:17 +000024 int client;
Denis Vlasenko35d4da02007-01-22 14:04:27 +000025 uint32_t xid;
Denis Vlasenko736230e2006-11-20 19:40:36 +000026 struct sockaddr_in ip;
Denis Vlasenko736230e2006-11-20 19:40:36 +000027 struct xid_item *next;
Denis Vlasenkob9256052007-09-28 10:29:17 +000028};
Denis Vlasenko736230e2006-11-20 19:40:36 +000029
Denis Vlasenkob9256052007-09-28 10:29:17 +000030#define dhcprelay_xid_list (*(struct xid_item*)&bb_common_bufsiz1)
Denis Vlasenko736230e2006-11-20 19:40:36 +000031
Denis Vlasenko80edead2007-08-02 22:31:05 +000032static struct xid_item *xid_add(uint32_t xid, struct sockaddr_in *ip, int client)
Denis Vlasenko736230e2006-11-20 19:40:36 +000033{
34 struct xid_item *item;
Bernhard Reutner-Fischera8381942006-11-21 11:23:11 +000035
Denis Vlasenko736230e2006-11-20 19:40:36 +000036 /* create new xid entry */
37 item = xmalloc(sizeof(struct xid_item));
Bernhard Reutner-Fischera8381942006-11-21 11:23:11 +000038
Denis Vlasenko736230e2006-11-20 19:40:36 +000039 /* add xid entry */
40 item->ip = *ip;
41 item->xid = xid;
42 item->client = client;
Denis Vlasenkod7b33502007-09-30 17:54:10 +000043 item->timestamp = monotonic_sec();
Denis Vlasenko736230e2006-11-20 19:40:36 +000044 item->next = dhcprelay_xid_list.next;
45 dhcprelay_xid_list.next = item;
46
47 return item;
48}
49
Denis Vlasenko736230e2006-11-20 19:40:36 +000050static void xid_expire(void)
51{
52 struct xid_item *item = dhcprelay_xid_list.next;
53 struct xid_item *last = &dhcprelay_xid_list;
Denis Vlasenkod7b33502007-09-30 17:54:10 +000054 unsigned current_time = monotonic_sec();
Denis Vlasenko736230e2006-11-20 19:40:36 +000055
56 while (item != NULL) {
Denis Vlasenko80edead2007-08-02 22:31:05 +000057 if ((current_time - item->timestamp) > MAX_LIFETIME) {
Denis Vlasenko736230e2006-11-20 19:40:36 +000058 last->next = item->next;
59 free(item);
60 item = last->next;
61 } else {
62 last = item;
63 item = item->next;
64 }
65 }
66}
67
Denis Vlasenko80edead2007-08-02 22:31:05 +000068static struct xid_item *xid_find(uint32_t xid)
Denis Vlasenko736230e2006-11-20 19:40:36 +000069{
70 struct xid_item *item = dhcprelay_xid_list.next;
71 while (item != NULL) {
72 if (item->xid == xid) {
Denys Vlasenkoc0f39b02010-10-06 01:45:24 +020073 break;
Denis Vlasenko736230e2006-11-20 19:40:36 +000074 }
75 item = item->next;
76 }
Denys Vlasenkoc0f39b02010-10-06 01:45:24 +020077 return item;
Denis Vlasenko736230e2006-11-20 19:40:36 +000078}
79
Denis Vlasenko35d4da02007-01-22 14:04:27 +000080static void xid_del(uint32_t xid)
Denis Vlasenko736230e2006-11-20 19:40:36 +000081{
82 struct xid_item *item = dhcprelay_xid_list.next;
83 struct xid_item *last = &dhcprelay_xid_list;
84 while (item != NULL) {
85 if (item->xid == xid) {
86 last->next = item->next;
87 free(item);
88 item = last->next;
89 } else {
90 last = item;
91 item = item->next;
92 }
93 }
94}
95
Denis Vlasenko736230e2006-11-20 19:40:36 +000096/**
97 * get_dhcp_packet_type - gets the message type of a dhcp packet
98 * p - pointer to the dhcp packet
99 * returns the message type on success, -1 otherwise
100 */
Denys Vlasenko31af3d52009-06-17 11:57:09 +0200101static int get_dhcp_packet_type(struct dhcp_packet *p)
Denis Vlasenko736230e2006-11-20 19:40:36 +0000102{
Denis Vlasenko28703012006-12-19 20:32:02 +0000103 uint8_t *op;
Denis Vlasenko736230e2006-11-20 19:40:36 +0000104
105 /* it must be either a BOOTREQUEST or a BOOTREPLY */
106 if (p->op != BOOTREQUEST && p->op != BOOTREPLY)
107 return -1;
108 /* get message type option */
Denys Vlasenkodde8bdc2010-03-22 14:29:13 +0100109 op = udhcp_get_option(p, DHCP_MESSAGE_TYPE);
Denis Vlasenko736230e2006-11-20 19:40:36 +0000110 if (op != NULL)
111 return op[0];
112 return -1;
113}
114
115/**
Denys Vlasenkoc0f39b02010-10-06 01:45:24 +0200116 * make_iface_list - parses client/server interface names
Denis Vlasenko736230e2006-11-20 19:40:36 +0000117 * returns array
118 */
Denys Vlasenkoc0f39b02010-10-06 01:45:24 +0200119static char **make_iface_list(char **client_and_server_ifaces, int *client_number)
Denis Vlasenko736230e2006-11-20 19:40:36 +0000120{
Denys Vlasenkoc0f39b02010-10-06 01:45:24 +0200121 char *s, **iface_list;
Bernhard Reutner-Fischera8381942006-11-21 11:23:11 +0000122 int i, cn;
Denis Vlasenko736230e2006-11-20 19:40:36 +0000123
Denys Vlasenkoc0f39b02010-10-06 01:45:24 +0200124 /* get number of items */
125 cn = 2; /* 1 server iface + at least 1 client one */
126 s = client_and_server_ifaces[0]; /* list of client ifaces */
Denis Vlasenkod7b33502007-09-30 17:54:10 +0000127 while (*s) {
Denys Vlasenkoc0f39b02010-10-06 01:45:24 +0200128 if (*s == ',')
Bernhard Reutner-Fischera8381942006-11-21 11:23:11 +0000129 cn++;
Denis Vlasenkod7b33502007-09-30 17:54:10 +0000130 s++;
Denis Vlasenko736230e2006-11-20 19:40:36 +0000131 }
Denis Vlasenko736230e2006-11-20 19:40:36 +0000132 *client_number = cn;
Denis Vlasenkod7b33502007-09-30 17:54:10 +0000133
134 /* create vector of pointers */
Denys Vlasenkoc0f39b02010-10-06 01:45:24 +0200135 iface_list = xzalloc(cn * sizeof(iface_list[0]));
136
137 iface_list[0] = client_and_server_ifaces[1]; /* server iface */
138
Denis Vlasenkod7b33502007-09-30 17:54:10 +0000139 i = 1;
Denys Vlasenkoc0f39b02010-10-06 01:45:24 +0200140 s = xstrdup(client_and_server_ifaces[0]); /* list of client ifaces */
141 goto store_client_iface_name;
142
143 while (i < cn) {
144 if (*s++ == ',') {
145 s[-1] = '\0';
146 store_client_iface_name:
147 iface_list[i++] = s;
148 }
Denis Vlasenkod7b33502007-09-30 17:54:10 +0000149 }
Denys Vlasenkoc0f39b02010-10-06 01:45:24 +0200150
151 return iface_list;
Denis Vlasenko736230e2006-11-20 19:40:36 +0000152}
153
Denis Vlasenkoe8a79682009-04-13 03:33:46 +0000154/* Creates listen sockets (in fds) bound to client and server ifaces,
155 * and returns numerically max fd.
156 */
Denys Vlasenkoc0f39b02010-10-06 01:45:24 +0200157static int init_sockets(char **iface_list, int num_clients, int *fds)
Denis Vlasenko736230e2006-11-20 19:40:36 +0000158{
Denis Vlasenkob9256052007-09-28 10:29:17 +0000159 int i, n;
Denis Vlasenko736230e2006-11-20 19:40:36 +0000160
Denys Vlasenkoc0f39b02010-10-06 01:45:24 +0200161 n = 0;
162 for (i = 0; i < num_clients; i++) {
163 fds[i] = udhcp_listen_socket(/*INADDR_ANY,*/ SERVER_PORT, iface_list[i]);
164 if (n < fds[i])
Denis Vlasenkob9256052007-09-28 10:29:17 +0000165 n = fds[i];
Denis Vlasenko736230e2006-11-20 19:40:36 +0000166 }
Denis Vlasenkob9256052007-09-28 10:29:17 +0000167 return n;
Denis Vlasenko736230e2006-11-20 19:40:36 +0000168}
169
Denys Vlasenkoc0f39b02010-10-06 01:45:24 +0200170static int sendto_ip4(int sock, const void *msg, int msg_len, struct sockaddr_in *to)
171{
172 int err;
173
174 errno = 0;
175 err = sendto(sock, msg, msg_len, 0, (struct sockaddr*) to, sizeof(*to));
176 err -= msg_len;
177 if (err)
178 bb_perror_msg("sendto");
179 return err;
180}
181
Denis Vlasenko736230e2006-11-20 19:40:36 +0000182/**
Denis Vlasenkoe8a79682009-04-13 03:33:46 +0000183 * pass_to_server() - forwards dhcp packets from client to server
Denis Vlasenko736230e2006-11-20 19:40:36 +0000184 * p - packet to send
185 * client - number of the client
186 */
Denys Vlasenko31af3d52009-06-17 11:57:09 +0200187static void pass_to_server(struct dhcp_packet *p, int packet_len, int client, int *fds,
Denis Vlasenko736230e2006-11-20 19:40:36 +0000188 struct sockaddr_in *client_addr, struct sockaddr_in *server_addr)
189{
Denys Vlasenkoc0f39b02010-10-06 01:45:24 +0200190 int type;
Denis Vlasenko736230e2006-11-20 19:40:36 +0000191
192 /* check packet_type */
193 type = get_dhcp_packet_type(p);
194 if (type != DHCPDISCOVER && type != DHCPREQUEST
195 && type != DHCPDECLINE && type != DHCPRELEASE
196 && type != DHCPINFORM
197 ) {
198 return;
199 }
200
201 /* create new xid entry */
Denys Vlasenko243d1752010-07-04 04:26:55 +0200202 xid_add(p->xid, client_addr, client);
Denis Vlasenko736230e2006-11-20 19:40:36 +0000203
Denys Vlasenkoc0f39b02010-10-06 01:45:24 +0200204 /* forward request to server */
205 /* note that we send from fds[0] which is bound to SERVER_PORT (67).
206 * IOW: we send _from_ SERVER_PORT! Although this may look strange,
207 * RFC 1542 not only allows, but prescribes this for BOOTP relays.
208 */
209 sendto_ip4(fds[0], p, packet_len, server_addr);
Denis Vlasenko736230e2006-11-20 19:40:36 +0000210}
211
212/**
Denis Vlasenkoe8a79682009-04-13 03:33:46 +0000213 * pass_to_client() - forwards dhcp packets from server to client
Denis Vlasenko736230e2006-11-20 19:40:36 +0000214 * p - packet to send
215 */
Denys Vlasenko31af3d52009-06-17 11:57:09 +0200216static void pass_to_client(struct dhcp_packet *p, int packet_len, int *fds)
Denis Vlasenko736230e2006-11-20 19:40:36 +0000217{
Denys Vlasenkoc0f39b02010-10-06 01:45:24 +0200218 int type;
Denis Vlasenko736230e2006-11-20 19:40:36 +0000219 struct xid_item *item;
220
221 /* check xid */
222 item = xid_find(p->xid);
223 if (!item) {
224 return;
225 }
226
227 /* check packet type */
228 type = get_dhcp_packet_type(p);
229 if (type != DHCPOFFER && type != DHCPACK && type != DHCPNAK) {
230 return;
231 }
232
Denys Vlasenkoc0f39b02010-10-06 01:45:24 +0200233//TODO: also do it if (p->flags & htons(BROADCAST_FLAG)) is set!
Denis Vlasenko736230e2006-11-20 19:40:36 +0000234 if (item->ip.sin_addr.s_addr == htonl(INADDR_ANY))
235 item->ip.sin_addr.s_addr = htonl(INADDR_BROADCAST);
Denys Vlasenkoc0f39b02010-10-06 01:45:24 +0200236
237 if (sendto_ip4(fds[item->client], p, packet_len, &item->ip) != 0) {
238 return; /* send error occurred */
Denis Vlasenko736230e2006-11-20 19:40:36 +0000239 }
240
241 /* remove xid entry */
242 xid_del(p->xid);
243}
244
Denis Vlasenkoe8a79682009-04-13 03:33:46 +0000245int dhcprelay_main(int argc, char **argv) MAIN_EXTERNALLY_VISIBLE;
246int dhcprelay_main(int argc, char **argv)
Denis Vlasenko736230e2006-11-20 19:40:36 +0000247{
Denis Vlasenkoe8a79682009-04-13 03:33:46 +0000248 struct sockaddr_in server_addr;
Denys Vlasenkoc0f39b02010-10-06 01:45:24 +0200249 char **iface_list;
Denis Vlasenkoe8a79682009-04-13 03:33:46 +0000250 int *fds;
251 int num_sockets, max_socket;
Denys Vlasenko990a6172009-06-16 10:23:55 +0200252 uint32_t our_nip;
Denis Vlasenko736230e2006-11-20 19:40:36 +0000253
Denis Vlasenkoe8a79682009-04-13 03:33:46 +0000254 server_addr.sin_family = AF_INET;
Denys Vlasenkoc0f39b02010-10-06 01:45:24 +0200255 server_addr.sin_addr.s_addr = htonl(INADDR_BROADCAST);
Denis Vlasenkoe8a79682009-04-13 03:33:46 +0000256 server_addr.sin_port = htons(SERVER_PORT);
257
Denys Vlasenkoc0f39b02010-10-06 01:45:24 +0200258 /* dhcprelay CLIENT_IFACE1[,CLIENT_IFACE2...] SERVER_IFACE [SERVER_IP] */
Denis Vlasenkoe8a79682009-04-13 03:33:46 +0000259 if (argc == 4) {
260 if (!inet_aton(argv[3], &server_addr.sin_addr))
261 bb_perror_msg_and_die("bad server IP");
Denys Vlasenkoc0f39b02010-10-06 01:45:24 +0200262 } else if (argc != 3) {
Denis Vlasenkoe8a79682009-04-13 03:33:46 +0000263 bb_show_usage();
264 }
265
Denys Vlasenkoc0f39b02010-10-06 01:45:24 +0200266 iface_list = make_iface_list(argv + 1, &num_sockets);
Denis Vlasenkoe8a79682009-04-13 03:33:46 +0000267
Denis Vlasenkoe8a79682009-04-13 03:33:46 +0000268 fds = xmalloc(num_sockets * sizeof(fds[0]));
269
270 /* Create sockets and bind one to every iface */
Denys Vlasenkoc0f39b02010-10-06 01:45:24 +0200271 max_socket = init_sockets(iface_list, num_sockets, fds);
Denis Vlasenkoe8a79682009-04-13 03:33:46 +0000272
273 /* Get our IP on server_iface */
Denys Vlasenko990a6172009-06-16 10:23:55 +0200274 if (udhcp_read_interface(argv[2], NULL, &our_nip, NULL))
Denis Vlasenkoe8a79682009-04-13 03:33:46 +0000275 return 1;
276
277 /* Main loop */
Denis Vlasenkob9256052007-09-28 10:29:17 +0000278 while (1) {
Denys Vlasenkoc0f39b02010-10-06 01:45:24 +0200279// reinit stuff from time to time? go back to make_iface_list
280// every N minutes?
281 fd_set rfds;
Denis Vlasenkoe8a79682009-04-13 03:33:46 +0000282 struct timeval tv;
Denis Vlasenkoe8a79682009-04-13 03:33:46 +0000283 int i;
284
Denis Vlasenko736230e2006-11-20 19:40:36 +0000285 FD_ZERO(&rfds);
286 for (i = 0; i < num_sockets; i++)
287 FD_SET(fds[i], &rfds);
288 tv.tv_sec = SELECT_TIMEOUT;
289 tv.tv_usec = 0;
290 if (select(max_socket + 1, &rfds, NULL, NULL, &tv) > 0) {
Denys Vlasenkoc0f39b02010-10-06 01:45:24 +0200291 int packlen;
292 struct dhcp_packet dhcp_msg;
293
Denis Vlasenko736230e2006-11-20 19:40:36 +0000294 /* server */
295 if (FD_ISSET(fds[0], &rfds)) {
Denis Vlasenko6de89942008-05-21 07:05:06 +0000296 packlen = udhcp_recv_kernel_packet(&dhcp_msg, fds[0]);
Denis Vlasenko736230e2006-11-20 19:40:36 +0000297 if (packlen > 0) {
Denis Vlasenkoe8a79682009-04-13 03:33:46 +0000298 pass_to_client(&dhcp_msg, packlen, fds);
Denis Vlasenko736230e2006-11-20 19:40:36 +0000299 }
300 }
Denys Vlasenkoc0f39b02010-10-06 01:45:24 +0200301
Denis Vlasenkoe8a79682009-04-13 03:33:46 +0000302 /* clients */
Denis Vlasenko736230e2006-11-20 19:40:36 +0000303 for (i = 1; i < num_sockets; i++) {
Denys Vlasenkoc0f39b02010-10-06 01:45:24 +0200304 struct sockaddr_in client_addr;
305 socklen_t addr_size;
306
Denis Vlasenko736230e2006-11-20 19:40:36 +0000307 if (!FD_ISSET(fds[i], &rfds))
308 continue;
Denys Vlasenkoc0f39b02010-10-06 01:45:24 +0200309
310 addr_size = sizeof(client_addr);
Denis Vlasenko736230e2006-11-20 19:40:36 +0000311 packlen = recvfrom(fds[i], &dhcp_msg, sizeof(dhcp_msg), 0,
Denis Vlasenkoe8a79682009-04-13 03:33:46 +0000312 (struct sockaddr *)(&client_addr), &addr_size);
Denis Vlasenko736230e2006-11-20 19:40:36 +0000313 if (packlen <= 0)
314 continue;
Denis Vlasenkoe8a79682009-04-13 03:33:46 +0000315
316 /* Get our IP on corresponding client_iface */
Denys Vlasenkoc0f39b02010-10-06 01:45:24 +0200317// RFC 1542
318// 4.1 General BOOTP Processing for Relay Agents
319// 4.1.1 BOOTREQUEST Messages
320// If the relay agent does decide to relay the request, it MUST examine
321// the 'giaddr' ("gateway" IP address) field. If this field is zero,
322// the relay agent MUST fill this field with the IP address of the
323// interface on which the request was received. If the interface has
324// more than one IP address logically associated with it, the relay
325// agent SHOULD choose one IP address associated with that interface and
326// use it consistently for all BOOTP messages it relays. If the
327// 'giaddr' field contains some non-zero value, the 'giaddr' field MUST
328// NOT be modified. The relay agent MUST NOT, under any circumstances,
329// fill the 'giaddr' field with a broadcast address as is suggested in
330// [1] (Section 8, sixth paragraph).
331
332// but why? what if server can't route such IP? Client ifaces may be, say, NATed!
333
334// 4.1.2 BOOTREPLY Messages
335// BOOTP relay agents relay BOOTREPLY messages only to BOOTP clients.
336// It is the responsibility of BOOTP servers to send BOOTREPLY messages
337// directly to the relay agent identified in the 'giaddr' field.
338// (yeah right, unless it is impossible... see comment above)
339// Therefore, a relay agent may assume that all BOOTREPLY messages it
340// receives are intended for BOOTP clients on its directly-connected
341// networks.
342//
343// When a relay agent receives a BOOTREPLY message, it should examine
344// the BOOTP 'giaddr', 'yiaddr', 'chaddr', 'htype', and 'hlen' fields.
345// These fields should provide adequate information for the relay agent
346// to deliver the BOOTREPLY message to the client.
347//
348// The 'giaddr' field can be used to identify the logical interface from
349// which the reply must be sent (i.e., the host or router interface
350// connected to the same network as the BOOTP client). If the content
351// of the 'giaddr' field does not match one of the relay agent's
352// directly-connected logical interfaces, the BOOTREPLY messsage MUST be
353// silently discarded.
354 if (udhcp_read_interface(iface_list[i], NULL, &dhcp_msg.gateway_nip, NULL)) {
355 /* Fall back to our IP on server iface */
356// this makes more sense!
Denys Vlasenko990a6172009-06-16 10:23:55 +0200357 dhcp_msg.gateway_nip = our_nip;
Denis Vlasenkoe8a79682009-04-13 03:33:46 +0000358 }
Denys Vlasenkoc0f39b02010-10-06 01:45:24 +0200359// maybe dhcp_msg.hops++? drop packets with too many hops (RFC 1542 says 4 or 16)?
Denis Vlasenkoe8a79682009-04-13 03:33:46 +0000360 pass_to_server(&dhcp_msg, packlen, i, fds, &client_addr, &server_addr);
Denis Vlasenko736230e2006-11-20 19:40:36 +0000361 }
362 }
363 xid_expire();
Denis Vlasenkoe8a79682009-04-13 03:33:46 +0000364 } /* while (1) */
Denis Vlasenko736230e2006-11-20 19:40:36 +0000365
Denis Vlasenkob9256052007-09-28 10:29:17 +0000366 /* return 0; - not reached */
Denis Vlasenko736230e2006-11-20 19:40:36 +0000367}