blob: 096e2e1719d701da0112377bdb5659870b1eeb4c [file] [log] [blame]
Simon Kelley2a8710a2020-01-05 16:40:06 +00001/* dnsmasq is Copyright (c) 2000-2020 Simon Kelley
Simon Kelleyc72daea2012-01-05 21:33:27 +00002
3 This program is free software; you can redistribute it and/or modify
4 it under the terms of the GNU General Public License as published by
5 the Free Software Foundation; version 2 dated June, 1991, or
6 (at your option) version 3 dated 29 June, 2007.
7
8 This program is distributed in the hope that it will be useful,
9 but WITHOUT ANY WARRANTY; without even the implied warranty of
10 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
11 GNU General Public License for more details.
12
13 You should have received a copy of the GNU General Public License
14 along with this program. If not, see <http://www.gnu.org/licenses/>.
15*/
16
17#include "dnsmasq.h"
18
19#ifdef HAVE_DHCP6
20
Simon Kelley89500e32013-09-20 16:29:20 +010021#include <netinet/icmp6.h>
22
Simon Kelleyc72daea2012-01-05 21:33:27 +000023struct iface_param {
24 struct dhcp_context *current;
Simon Kelleyff7eea22013-09-04 18:01:38 +010025 struct dhcp_relay *relay;
Simon Kelleyc3a04082014-01-11 22:18:19 +000026 struct in6_addr fallback, relay_local, ll_addr, ula_addr;
Simon Kelleybe6cfb42012-10-16 20:38:31 +010027 int ind, addr_match;
Simon Kelleyc72daea2012-01-05 21:33:27 +000028};
29
Simon Kelley89500e32013-09-20 16:29:20 +010030
Simon Kelleyc72daea2012-01-05 21:33:27 +000031static int complete_context6(struct in6_addr *local, int prefix,
Simon Kelleybad7b872012-12-20 22:00:39 +000032 int scope, int if_index, int flags,
Simon Kelley3bc0d932012-12-28 11:31:44 +000033 unsigned int preferred, unsigned int valid, void *vparam);
Simon Kelleyc5ad4e72012-02-24 16:06:20 +000034static int make_duid1(int index, unsigned int type, char *mac, size_t maclen, void *parm);
Simon Kelley4cb1b322012-02-06 14:30:41 +000035
Simon Kelleyc72daea2012-01-05 21:33:27 +000036void dhcp6_init(void)
37{
38 int fd;
39 struct sockaddr_in6 saddr;
Simon Kelley0e88d532012-03-28 22:22:05 +010040#if defined(IPV6_TCLASS) && defined(IPTOS_CLASS_CS6)
Simon Kelleyc72daea2012-01-05 21:33:27 +000041 int class = IPTOS_CLASS_CS6;
Simon Kelley4cb1b322012-02-06 14:30:41 +000042#endif
Simon Kelley20223102012-10-15 10:41:17 +010043 int oneopt = 1;
44
Simon Kelleyc72daea2012-01-05 21:33:27 +000045 if ((fd = socket(PF_INET6, SOCK_DGRAM, IPPROTO_UDP)) == -1 ||
Simon Kelley0e88d532012-03-28 22:22:05 +010046#if defined(IPV6_TCLASS) && defined(IPTOS_CLASS_CS6)
Simon Kelleyc72daea2012-01-05 21:33:27 +000047 setsockopt(fd, IPPROTO_IPV6, IPV6_TCLASS, &class, sizeof(class)) == -1 ||
Simon Kelley4cb1b322012-02-06 14:30:41 +000048#endif
Simon Kelley20223102012-10-15 10:41:17 +010049 setsockopt(fd, IPPROTO_IPV6, IPV6_V6ONLY, &oneopt, sizeof(oneopt)) == -1 ||
Simon Kelleyc72daea2012-01-05 21:33:27 +000050 !fix_fd(fd) ||
51 !set_ipv6pktinfo(fd))
52 die (_("cannot create DHCPv6 socket: %s"), NULL, EC_BADNET);
53
Josh Soref730c6742017-02-06 16:14:04 +000054 /* When bind-interfaces is set, there might be more than one dnsmasq
Simon Kelley20223102012-10-15 10:41:17 +010055 instance binding port 547. That's OK if they serve different networks.
Josh Soref730c6742017-02-06 16:14:04 +000056 Need to set REUSEADDR|REUSEPORT to make this possible.
Simon Kelley56a11422013-04-02 17:02:58 +010057 Handle the case that REUSEPORT is defined, but the kernel doesn't
58 support it. This handles the introduction of REUSEPORT on Linux. */
Simon Kelley20223102012-10-15 10:41:17 +010059 if (option_bool(OPT_NOWILD) || option_bool(OPT_CLEVERBIND))
60 {
Simon Kelleyffbad342013-08-14 15:53:57 +010061 int rc = 0;
Simon Kelley56a11422013-04-02 17:02:58 +010062
Simon Kelley20223102012-10-15 10:41:17 +010063#ifdef SO_REUSEPORT
Simon Kelley56a11422013-04-02 17:02:58 +010064 if ((rc = setsockopt(fd, SOL_SOCKET, SO_REUSEPORT, &oneopt, sizeof(oneopt))) == -1 &&
Simon Kelleyffbad342013-08-14 15:53:57 +010065 errno == ENOPROTOOPT)
66 rc = 0;
Simon Kelley20223102012-10-15 10:41:17 +010067#endif
Simon Kelley56a11422013-04-02 17:02:58 +010068
Simon Kelleyffbad342013-08-14 15:53:57 +010069 if (rc != -1)
Simon Kelley56a11422013-04-02 17:02:58 +010070 rc = setsockopt(fd, SOL_SOCKET, SO_REUSEADDR, &oneopt, sizeof(oneopt));
71
Simon Kelley20223102012-10-15 10:41:17 +010072 if (rc == -1)
73 die(_("failed to set SO_REUSE{ADDR|PORT} on DHCPv6 socket: %s"), NULL, EC_BADNET);
74 }
75
Simon Kelleyc72daea2012-01-05 21:33:27 +000076 memset(&saddr, 0, sizeof(saddr));
77#ifdef HAVE_SOCKADDR_SA_LEN
Simon Kelley4cb1b322012-02-06 14:30:41 +000078 saddr.sin6_len = sizeof(struct sockaddr_in6);
Simon Kelleyc72daea2012-01-05 21:33:27 +000079#endif
80 saddr.sin6_family = AF_INET6;
81 saddr.sin6_addr = in6addr_any;
82 saddr.sin6_port = htons(DHCPV6_SERVER_PORT);
83
84 if (bind(fd, (struct sockaddr *)&saddr, sizeof(struct sockaddr_in6)))
85 die(_("failed to bind DHCPv6 server socket: %s"), NULL, EC_BADNET);
86
Simon Kelleyc72daea2012-01-05 21:33:27 +000087 daemon->dhcp6fd = fd;
Simon Kelleyc72daea2012-01-05 21:33:27 +000088}
89
Simon Kelleyc72daea2012-01-05 21:33:27 +000090void dhcp6_packet(time_t now)
91{
92 struct dhcp_context *context;
Simon Kelleyff7eea22013-09-04 18:01:38 +010093 struct dhcp_relay *relay;
Simon Kelleyc72daea2012-01-05 21:33:27 +000094 struct iface_param parm;
95 struct cmsghdr *cmptr;
96 struct msghdr msg;
97 int if_index = 0;
98 union {
99 struct cmsghdr align; /* this ensures alignment */
100 char control6[CMSG_SPACE(sizeof(struct in6_pktinfo))];
101 } control_u;
Simon Kelleyc5ad4e72012-02-24 16:06:20 +0000102 struct sockaddr_in6 from;
Simon Kelleyc72daea2012-01-05 21:33:27 +0000103 ssize_t sz;
104 struct ifreq ifr;
105 struct iname *tmp;
Simon Kelley1d0f91c2012-03-12 11:56:22 +0000106 unsigned short port;
Simon Kelley89500e32013-09-20 16:29:20 +0100107 struct in6_addr dst_addr;
Simon Kelleyc72daea2012-01-05 21:33:27 +0000108
Simon Kelley8f51a292013-09-21 14:07:12 +0100109 memset(&dst_addr, 0, sizeof(dst_addr));
110
Simon Kelleyc72daea2012-01-05 21:33:27 +0000111 msg.msg_control = control_u.control6;
112 msg.msg_controllen = sizeof(control_u);
113 msg.msg_flags = 0;
114 msg.msg_name = &from;
115 msg.msg_namelen = sizeof(from);
116 msg.msg_iov = &daemon->dhcp_packet;
117 msg.msg_iovlen = 1;
118
Simon Kelley1d0f91c2012-03-12 11:56:22 +0000119 if ((sz = recv_dhcp_packet(daemon->dhcp6fd, &msg)) == -1)
Simon Kelleyc72daea2012-01-05 21:33:27 +0000120 return;
121
122 for (cmptr = CMSG_FIRSTHDR(&msg); cmptr; cmptr = CMSG_NXTHDR(&msg, cmptr))
123 if (cmptr->cmsg_level == IPPROTO_IPV6 && cmptr->cmsg_type == daemon->v6pktinfo)
124 {
125 union {
126 unsigned char *c;
127 struct in6_pktinfo *p;
128 } p;
129 p.c = CMSG_DATA(cmptr);
130
131 if_index = p.p->ipi6_ifindex;
Simon Kelley89500e32013-09-20 16:29:20 +0100132 dst_addr = p.p->ipi6_addr;
Simon Kelleyc72daea2012-01-05 21:33:27 +0000133 }
134
135 if (!indextoname(daemon->dhcp6fd, if_index, ifr.ifr_name))
136 return;
Simon Kelleybe6cfb42012-10-16 20:38:31 +0100137
Simon Kelley18a6bdd2019-12-20 18:19:20 +0000138 if ((port = relay_reply6(&from, sz, ifr.ifr_name)) != 0)
139 {
140 from.sin6_port = htons(port);
141 while (retry_send(sendto(daemon->dhcp6fd, daemon->outpacket.iov_base,
142 save_counter(-1), 0, (struct sockaddr *)&from,
143 sizeof(from))));
144 }
145 else
Simon Kelleybe6cfb42012-10-16 20:38:31 +0100146 {
Neil Jerram0ddb8762015-06-10 22:11:06 +0100147 struct dhcp_bridge *bridge, *alias;
148
Simon Kelleyff7eea22013-09-04 18:01:38 +0100149 for (tmp = daemon->if_except; tmp; tmp = tmp->next)
Simon Kelley49333cb2013-03-15 20:30:51 +0000150 if (tmp->name && wildcard_match(tmp->name, ifr.ifr_name))
Simon Kelleyff7eea22013-09-04 18:01:38 +0100151 return;
152
153 for (tmp = daemon->dhcp_except; tmp; tmp = tmp->next)
154 if (tmp->name && wildcard_match(tmp->name, ifr.ifr_name))
155 return;
156
157 parm.current = NULL;
158 parm.relay = NULL;
159 memset(&parm.relay_local, 0, IN6ADDRSZ);
160 parm.ind = if_index;
161 parm.addr_match = 0;
162 memset(&parm.fallback, 0, IN6ADDRSZ);
Simon Kelleyc3a04082014-01-11 22:18:19 +0000163 memset(&parm.ll_addr, 0, IN6ADDRSZ);
164 memset(&parm.ula_addr, 0, IN6ADDRSZ);
Neil Jerram0ddb8762015-06-10 22:11:06 +0100165
166 /* If the interface on which the DHCPv6 request was received is
167 an alias of some other interface (as specified by the
Neil Jerram4918bd52015-06-10 22:23:20 +0100168 --bridge-interface option), change parm.ind so that we look
Neil Jerram0ddb8762015-06-10 22:11:06 +0100169 for DHCPv6 contexts associated with the aliased interface
170 instead of with the aliasing one. */
171 for (bridge = daemon->bridges; bridge; bridge = bridge->next)
172 {
173 for (alias = bridge->alias; alias; alias = alias->next)
174 if (wildcard_matchn(alias->iface, ifr.ifr_name, IF_NAMESIZE))
175 {
176 parm.ind = if_nametoindex(bridge->iface);
177 if (!parm.ind)
178 {
179 my_syslog(MS_DHCP | LOG_WARNING,
180 _("unknown interface %s in bridge-interface"),
181 bridge->iface);
182 return;
183 }
184 break;
185 }
186 if (alias)
187 break;
188 }
Simon Kelleyff7eea22013-09-04 18:01:38 +0100189
190 for (context = daemon->dhcp6; context; context = context->next)
191 if (IN6_IS_ADDR_UNSPECIFIED(&context->start6) && context->prefix == 0)
192 {
193 /* wildcard context for DHCP-stateless only */
194 parm.current = context;
195 context->current = NULL;
196 }
197 else
198 {
199 /* unlinked contexts are marked by context->current == context */
200 context->current = context;
201 memset(&context->local6, 0, IN6ADDRSZ);
202 }
Simon Kelleybe6cfb42012-10-16 20:38:31 +0100203
Simon Kelleyff7eea22013-09-04 18:01:38 +0100204 for (relay = daemon->relay6; relay; relay = relay->next)
205 relay->current = relay;
206
207 if (!iface_enumerate(AF_INET6, &parm, complete_context6))
Simon Kelleybe6cfb42012-10-16 20:38:31 +0100208 return;
Simon Kelley89500e32013-09-20 16:29:20 +0100209
Simon Kelleyff7eea22013-09-04 18:01:38 +0100210 if (daemon->if_names || daemon->if_addrs)
211 {
212
213 for (tmp = daemon->if_names; tmp; tmp = tmp->next)
214 if (tmp->name && wildcard_match(tmp->name, ifr.ifr_name))
215 break;
216
217 if (!tmp && !parm.addr_match)
218 return;
219 }
220
221 if (parm.relay)
222 {
Simon Kelley89500e32013-09-20 16:29:20 +0100223 /* Ignore requests sent to the ALL_SERVERS multicast address for relay when
224 we're listening there for DHCPv6 server reasons. */
225 struct in6_addr all_servers;
226
227 inet_pton(AF_INET6, ALL_SERVERS, &all_servers);
228
229 if (!IN6_ARE_ADDR_EQUAL(&dst_addr, &all_servers))
Simon Kelley33702ab2015-12-28 23:17:15 +0000230 relay_upstream6(parm.relay, sz, &from.sin6_addr, from.sin6_scope_id, now);
Simon Kelleyff7eea22013-09-04 18:01:38 +0100231 return;
232 }
233
234 /* May have configured relay, but not DHCP server */
235 if (!daemon->doing_dhcp6)
236 return;
Neil Jerram0ddb8762015-06-10 22:11:06 +0100237
Simon Kelleyff7eea22013-09-04 18:01:38 +0100238 lease_prune(NULL, now); /* lose any expired leases */
239
240 port = dhcp6_reply(parm.current, if_index, ifr.ifr_name, &parm.fallback,
Simon Kelleyc3a04082014-01-11 22:18:19 +0000241 &parm.ll_addr, &parm.ula_addr, sz, &from.sin6_addr, now);
Simon Kelleyff7eea22013-09-04 18:01:38 +0100242
Simon Kelley18a6bdd2019-12-20 18:19:20 +0000243 /* The port in the source address of the original request should
244 be correct, but at least once client sends from the server port,
245 so we explicitly send to the client port to a client, and the
246 server port to a relay. */
247 if (port != 0)
248 {
249 from.sin6_port = htons(port);
250 while (retry_send(sendto(daemon->dhcp6fd, daemon->outpacket.iov_base,
251 save_counter(-1), 0, (struct sockaddr *)&from,
252 sizeof(from))));
253 }
254
255 /* These need to be called _after_ we send DHCPv6 packet, since lease_update_file()
256 may trigger sending an RA packet, which overwrites our buffer. */
Simon Kelleyff7eea22013-09-04 18:01:38 +0100257 lease_update_file(now);
258 lease_update_dns(0);
Simon Kelleybe6cfb42012-10-16 20:38:31 +0100259 }
Simon Kelleyc72daea2012-01-05 21:33:27 +0000260}
261
Simon Kelley33702ab2015-12-28 23:17:15 +0000262void get_client_mac(struct in6_addr *client, int iface, unsigned char *mac, unsigned int *maclenp, unsigned int *mactypep, time_t now)
Simon Kelley8939c952013-09-25 11:49:34 +0100263{
Josh Soref730c6742017-02-06 16:14:04 +0000264 /* Receiving a packet from a host does not populate the neighbour
Simon Kelley8939c952013-09-25 11:49:34 +0100265 cache, so we send a neighbour discovery request if we can't
266 find the sender. Repeat a few times in case of packet loss. */
267
268 struct neigh_packet neigh;
Simon Kelley11867dc2015-12-23 16:15:58 +0000269 union mysockaddr addr;
270 int i, maclen;
Simon Kelley8939c952013-09-25 11:49:34 +0100271
272 neigh.type = ND_NEIGHBOR_SOLICIT;
273 neigh.code = 0;
274 neigh.reserved = 0;
275 neigh.target = *client;
Tomas Hozza0705a7e2015-02-23 21:26:26 +0000276 /* RFC4443 section-2.3: checksum has to be zero to be calculated */
277 neigh.checksum = 0;
278
Simon Kelley8939c952013-09-25 11:49:34 +0100279 memset(&addr, 0, sizeof(addr));
280#ifdef HAVE_SOCKADDR_SA_LEN
Simon Kelley11867dc2015-12-23 16:15:58 +0000281 addr.in6.sin6_len = sizeof(struct sockaddr_in6);
Simon Kelley8939c952013-09-25 11:49:34 +0100282#endif
Simon Kelley11867dc2015-12-23 16:15:58 +0000283 addr.in6.sin6_family = AF_INET6;
284 addr.in6.sin6_port = htons(IPPROTO_ICMPV6);
285 addr.in6.sin6_addr = *client;
286 addr.in6.sin6_scope_id = iface;
Simon Kelley8939c952013-09-25 11:49:34 +0100287
288 for (i = 0; i < 5; i++)
289 {
290 struct timespec ts;
291
Simon Kelley33702ab2015-12-28 23:17:15 +0000292 if ((maclen = find_mac(&addr, mac, 0, now)) != 0)
Simon Kelley8939c952013-09-25 11:49:34 +0100293 break;
Simon Kelley11867dc2015-12-23 16:15:58 +0000294
295 sendto(daemon->icmp6fd, &neigh, sizeof(neigh), 0, &addr.sa, sizeof(addr));
Simon Kelley8939c952013-09-25 11:49:34 +0100296
297 ts.tv_sec = 0;
298 ts.tv_nsec = 100000000; /* 100ms */
299 nanosleep(&ts, NULL);
300 }
301
Simon Kelley11867dc2015-12-23 16:15:58 +0000302 *maclenp = maclen;
Simon Kelley8939c952013-09-25 11:49:34 +0100303 *mactypep = ARPHRD_ETHER;
304}
305
Simon Kelleyc72daea2012-01-05 21:33:27 +0000306static int complete_context6(struct in6_addr *local, int prefix,
Simon Kelley3bc0d932012-12-28 11:31:44 +0000307 int scope, int if_index, int flags, unsigned int preferred,
308 unsigned int valid, void *vparam)
Simon Kelleyc72daea2012-01-05 21:33:27 +0000309{
310 struct dhcp_context *context;
Simon Kelleyae5b7e02019-03-27 22:33:28 +0000311 struct shared_network *share;
Simon Kelleyff7eea22013-09-04 18:01:38 +0100312 struct dhcp_relay *relay;
Simon Kelleyc72daea2012-01-05 21:33:27 +0000313 struct iface_param *param = vparam;
Simon Kelleybe6cfb42012-10-16 20:38:31 +0100314 struct iname *tmp;
315
Simon Kelley52b92f42012-01-22 16:05:15 +0000316 (void)scope; /* warning */
Simon Kelley3bc0d932012-12-28 11:31:44 +0000317
Simon Kelleyae5b7e02019-03-27 22:33:28 +0000318 if (if_index != param->ind)
319 return 1;
320
321 if (IN6_IS_ADDR_LINKLOCAL(local))
322 param->ll_addr = *local;
323 else if (IN6_IS_ADDR_ULA(local))
324 param->ula_addr = *local;
Simon Kelleyff7eea22013-09-04 18:01:38 +0100325
Simon Kelleyae5b7e02019-03-27 22:33:28 +0000326 if (IN6_IS_ADDR_LOOPBACK(local) ||
327 IN6_IS_ADDR_LINKLOCAL(local) ||
328 IN6_IS_ADDR_MULTICAST(local))
329 return 1;
330
331 /* if we have --listen-address config, see if the
332 arrival interface has a matching address. */
333 for (tmp = daemon->if_addrs; tmp; tmp = tmp->next)
334 if (tmp->addr.sa.sa_family == AF_INET6 &&
335 IN6_ARE_ADDR_EQUAL(&tmp->addr.in6.sin6_addr, local))
336 param->addr_match = 1;
337
338 /* Determine a globally address on the arrival interface, even
339 if we have no matching dhcp-context, because we're only
340 allocating on remote subnets via relays. This
341 is used as a default for the DNS server option. */
342 param->fallback = *local;
343
344 for (context = daemon->dhcp6; context; context = context->next)
345 if ((context->flags & CONTEXT_DHCP) &&
346 !(context->flags & (CONTEXT_TEMPLATE | CONTEXT_OLD)) &&
347 prefix <= context->prefix &&
348 context->current == context)
349 {
350 if (is_same_net6(local, &context->start6, context->prefix) &&
351 is_same_net6(local, &context->end6, context->prefix))
352 {
353 struct dhcp_context *tmp, **up;
354
355 /* use interface values only for constructed contexts */
356 if (!(context->flags & CONTEXT_CONSTRUCTED))
357 preferred = valid = 0xffffffff;
358 else if (flags & IFACE_DEPRECATED)
359 preferred = 0;
360
361 if (context->flags & CONTEXT_DEPRECATE)
362 preferred = 0;
363
364 /* order chain, longest preferred time first */
365 for (up = &param->current, tmp = param->current; tmp; tmp = tmp->current)
366 if (tmp->preferred <= preferred)
367 break;
368 else
369 up = &tmp->current;
370
371 context->current = *up;
372 *up = context;
373 context->local6 = *local;
374 context->preferred = preferred;
375 context->valid = valid;
376 }
377 else
378 {
379 for (share = daemon->shared_networks; share; share = share->next)
380 {
381 /* IPv4 shared_address - ignore */
382 if (share->shared_addr.s_addr != 0)
383 continue;
384
385 if (share->if_index != 0)
386 {
387 if (share->if_index != if_index)
388 continue;
389 }
390 else
391 {
392 if (!IN6_ARE_ADDR_EQUAL(&share->match_addr6, local))
393 continue;
394 }
395
396 if (is_same_net6(&share->shared_addr6, &context->start6, context->prefix) &&
397 is_same_net6(&share->shared_addr6, &context->end6, context->prefix))
398 {
399 context->current = param->current;
400 param->current = context;
401 context->local6 = *local;
402 context->preferred = context->flags & CONTEXT_DEPRECATE ? 0 :0xffffffff;
403 context->valid = 0xffffffff;
404 }
405 }
406 }
407 }
408
409 for (relay = daemon->relay6; relay; relay = relay->next)
410 if (IN6_ARE_ADDR_EQUAL(local, &relay->local.addr6) && relay->current == relay &&
411 (IN6_IS_ADDR_UNSPECIFIED(&param->relay_local) || IN6_ARE_ADDR_EQUAL(local, &param->relay_local)))
412 {
413 relay->current = param->relay;
414 param->relay = relay;
415 param->relay_local = *local;
416 }
417
418 return 1;
Simon Kelleyc72daea2012-01-05 21:33:27 +0000419}
Simon Kelley52b92f42012-01-22 16:05:15 +0000420
Simon Kelley79aba0f2020-02-03 23:58:45 +0000421struct dhcp_config *config_find_by_address6(struct dhcp_config *configs, struct in6_addr *net, int prefix, struct in6_addr *addr)
Simon Kelley52b92f42012-01-22 16:05:15 +0000422{
423 struct dhcp_config *config;
424
425 for (config = configs; config; config = config->next)
Simon Kelley137286e2020-02-06 22:09:30 +0000426 if (config->flags & CONFIG_ADDR6)
427 {
428 struct addrlist *addr_list;
429
430 for (addr_list = config->addr6; addr_list; addr_list = addr_list->next)
431 if ((!net || is_same_net6(&addr_list->addr.addr6, net, prefix) || ((addr_list->flags & ADDRLIST_WILDCARD) && prefix == 64)) &&
432 is_same_net6(&addr_list->addr.addr6, addr, (addr_list->flags & ADDRLIST_PREFIX) ? addr_list->prefixlen : 128))
433 return config;
434 }
Simon Kelley52b92f42012-01-22 16:05:15 +0000435
436 return NULL;
437}
438
Simon Kelley6586e832013-11-07 14:20:13 +0000439struct dhcp_context *address6_allocate(struct dhcp_context *context, unsigned char *clid, int clid_len, int temp_addr,
Dominik DL6ER456a3192019-10-20 18:51:52 +0200440 unsigned int iaid, int serial, struct dhcp_netid *netids, int plain_range, struct in6_addr *ans)
Simon Kelley52b92f42012-01-22 16:05:15 +0000441{
442 /* Find a free address: exclude anything in use and anything allocated to
443 a particular hwaddr/clientid/hostname in our configuration.
444 Try to return from contexts which match netids first.
445
446 Note that we assume the address prefix lengths are 64 or greater, so we can
447 get by with 64 bit arithmetic.
448*/
449
450 u64 start, addr;
451 struct dhcp_context *c, *d;
452 int i, pass;
453 u64 j;
454
455 /* hash hwaddr: use the SDBM hashing algorithm. This works
Simon Kelley6586e832013-11-07 14:20:13 +0000456 for MAC addresses, let's see how it manages with client-ids!
457 For temporary addresses, we generate a new random one each time. */
458 if (temp_addr)
459 j = rand64();
460 else
461 for (j = iaid, i = 0; i < clid_len; i++)
Simon Kelleyd6b749a2016-04-25 17:05:15 +0100462 j = clid[i] + (j << 6) + (j << 16) - j;
Simon Kelley52b92f42012-01-22 16:05:15 +0000463
Simon Kelleyc6309242013-03-07 20:59:28 +0000464 for (pass = 0; pass <= plain_range ? 1 : 0; pass++)
Simon Kelley52b92f42012-01-22 16:05:15 +0000465 for (c = context; c; c = c->current)
Simon Kelleya6ebfac2013-03-06 20:52:35 +0000466 if (c->flags & (CONTEXT_DEPRECATE | CONTEXT_STATIC | CONTEXT_RA_STATELESS | CONTEXT_USED))
Simon Kelley52b92f42012-01-22 16:05:15 +0000467 continue;
468 else if (!match_netid(c->filter, netids, pass))
469 continue;
470 else
Simon Kelley07933802012-02-14 20:55:25 +0000471 {
Simon Kelley6586e832013-11-07 14:20:13 +0000472 if (!temp_addr && option_bool(OPT_CONSEC_ADDR))
Simon Kelleye7bfd552018-12-31 20:51:15 +0000473 {
474 /* seed is largest extant lease addr in this context,
475 skip addresses equal to the number of addresses rejected
476 by clients. This should avoid the same client being offered the same
477 address after it has rjected it. */
Simon Kelley9c0d4452019-01-09 17:57:56 +0000478 start = lease_find_max_addr6(c) + 1 + serial + c->addr_epoch;
Simon Kelleye7bfd552018-12-31 20:51:15 +0000479 if (c->addr_epoch)
480 c->addr_epoch--;
481 }
Simon Kelley07933802012-02-14 20:55:25 +0000482 else
Simon Kelleyfdc97e12016-02-13 17:47:17 +0000483 {
484 u64 range = 1 + addr6part(&c->end6) - addr6part(&c->start6);
485 u64 offset = j + c->addr_epoch;
486
487 /* don't divide by zero if range is whole 2^64 */
488 if (range != 0)
489 offset = offset % range;
490
491 start = addr6part(&c->start6) + offset;
492 }
Simon Kelley52b92f42012-01-22 16:05:15 +0000493
494 /* iterate until we find a free address. */
495 addr = start;
496
497 do {
498 /* eliminate addresses in use by the server. */
499 for (d = context; d; d = d->current)
Simon Kelleye44ddca2012-02-18 17:08:50 +0000500 if (addr == addr6part(&d->local6))
Simon Kelley52b92f42012-01-22 16:05:15 +0000501 break;
Simon Kelley79aba0f2020-02-03 23:58:45 +0000502
503 *ans = c->start6;
504 setaddr6part (ans, addr);
Simon Kelley52b92f42012-01-22 16:05:15 +0000505
506 if (!d &&
507 !lease6_find_by_addr(&c->start6, c->prefix, addr) &&
Simon Kelley79aba0f2020-02-03 23:58:45 +0000508 !config_find_by_address6(daemon->dhcp_conf, &c->start6, c->prefix, ans))
509 return c;
510
Simon Kelley52b92f42012-01-22 16:05:15 +0000511 addr++;
512
513 if (addr == addr6part(&c->end6) + 1)
514 addr = addr6part(&c->start6);
515
516 } while (addr != start);
517 }
Simon Kelleya6ebfac2013-03-06 20:52:35 +0000518
Simon Kelley5b37aa82013-04-02 16:32:25 +0100519 return NULL;
Simon Kelley52b92f42012-01-22 16:05:15 +0000520}
521
Simon Kelley37c9cce2013-01-09 19:51:04 +0000522/* can dynamically allocate addr */
Simon Kelley52b92f42012-01-22 16:05:15 +0000523struct dhcp_context *address6_available(struct dhcp_context *context,
524 struct in6_addr *taddr,
Simon Kelleyc6309242013-03-07 20:59:28 +0000525 struct dhcp_netid *netids,
526 int plain_range)
Simon Kelley52b92f42012-01-22 16:05:15 +0000527{
528 u64 start, end, addr = addr6part(taddr);
529 struct dhcp_context *tmp;
530
531 for (tmp = context; tmp; tmp = tmp->current)
532 {
533 start = addr6part(&tmp->start6);
534 end = addr6part(&tmp->end6);
535
Simon Kelleyc8257542012-03-28 21:15:41 +0100536 if (!(tmp->flags & (CONTEXT_STATIC | CONTEXT_RA_STATELESS)) &&
537 is_same_net6(&tmp->start6, taddr, tmp->prefix) &&
538 is_same_net6(&tmp->end6, taddr, tmp->prefix) &&
Simon Kelley52b92f42012-01-22 16:05:15 +0000539 addr >= start &&
540 addr <= end &&
Simon Kelleyc6309242013-03-07 20:59:28 +0000541 match_netid(tmp->filter, netids, plain_range))
Simon Kelley52b92f42012-01-22 16:05:15 +0000542 return tmp;
543 }
544
545 return NULL;
546}
547
Simon Kelley37c9cce2013-01-09 19:51:04 +0000548/* address OK if configured */
549struct dhcp_context *address6_valid(struct dhcp_context *context,
Simon Kelleyc6309242013-03-07 20:59:28 +0000550 struct in6_addr *taddr,
551 struct dhcp_netid *netids,
552 int plain_range)
Simon Kelley37c9cce2013-01-09 19:51:04 +0000553{
554 struct dhcp_context *tmp;
555
556 for (tmp = context; tmp; tmp = tmp->current)
Simon Kelleybaeb3ad2013-01-10 11:47:38 +0000557 if (is_same_net6(&tmp->start6, taddr, tmp->prefix) &&
Simon Kelleyc6309242013-03-07 20:59:28 +0000558 match_netid(tmp->filter, netids, plain_range))
Simon Kelley37c9cce2013-01-09 19:51:04 +0000559 return tmp;
560
561 return NULL;
562}
563
Simon Kelley4cb1b322012-02-06 14:30:41 +0000564void make_duid(time_t now)
565{
Simon Kelley3511a922013-11-07 10:28:11 +0000566 (void)now;
567
Simon Kelley8b372702012-03-09 17:45:10 +0000568 if (daemon->duid_config)
569 {
570 unsigned char *p;
571
572 daemon->duid = p = safe_malloc(daemon->duid_config_len + 6);
573 daemon->duid_len = daemon->duid_config_len + 6;
574 PUTSHORT(2, p); /* DUID_EN */
575 PUTLONG(daemon->duid_enterprise, p);
576 memcpy(p, daemon->duid_config, daemon->duid_config_len);
577 }
578 else
579 {
Simon Kelley3511a922013-11-07 10:28:11 +0000580 time_t newnow = 0;
581
582 /* If we have no persistent lease database, or a non-stable RTC, use DUID_LL (newnow == 0) */
583#ifndef HAVE_BROKEN_RTC
Simon Kelley8b372702012-03-09 17:45:10 +0000584 /* rebase epoch to 1/1/2000 */
Simon Kelley3511a922013-11-07 10:28:11 +0000585 if (!option_bool(OPT_LEASE_RO) || daemon->lease_change_command)
586 newnow = now - 946684800;
587#endif
Simon Kelley8b372702012-03-09 17:45:10 +0000588
589 iface_enumerate(AF_LOCAL, &newnow, make_duid1);
590
591 if(!daemon->duid)
592 die("Cannot create DHCPv6 server DUID: %s", NULL, EC_MISC);
593 }
Simon Kelley4cb1b322012-02-06 14:30:41 +0000594}
595
Simon Kelleyc5ad4e72012-02-24 16:06:20 +0000596static int make_duid1(int index, unsigned int type, char *mac, size_t maclen, void *parm)
Simon Kelley4cb1b322012-02-06 14:30:41 +0000597{
598 /* create DUID as specified in RFC3315. We use the MAC of the
Simon Kelley0f089832012-03-01 13:43:39 +0000599 first interface we find that isn't loopback or P-to-P and
600 has address-type < 256. Address types above 256 are things like
601 tunnels which don't have usable MAC addresses. */
Simon Kelley4cb1b322012-02-06 14:30:41 +0000602
603 unsigned char *p;
Simon Kelleyc5ad4e72012-02-24 16:06:20 +0000604 (void)index;
Vladislav Grishenko408c3682013-09-24 16:18:49 +0100605 (void)parm;
Simon Kelley3511a922013-11-07 10:28:11 +0000606 time_t newnow = *((time_t *)parm);
607
Simon Kelley0f089832012-03-01 13:43:39 +0000608 if (type >= 256)
609 return 1;
610
Simon Kelley3511a922013-11-07 10:28:11 +0000611 if (newnow == 0)
612 {
613 daemon->duid = p = safe_malloc(maclen + 4);
614 daemon->duid_len = maclen + 4;
615 PUTSHORT(3, p); /* DUID_LL */
616 PUTSHORT(type, p); /* address type */
617 }
618 else
619 {
620 daemon->duid = p = safe_malloc(maclen + 8);
621 daemon->duid_len = maclen + 8;
622 PUTSHORT(1, p); /* DUID_LLT */
623 PUTSHORT(type, p); /* address type */
624 PUTLONG(*((time_t *)parm), p); /* time */
625 }
626
Simon Kelley4cb1b322012-02-06 14:30:41 +0000627 memcpy(p, mac, maclen);
628
629 return 0;
630}
Simon Kelley1f776932012-12-16 19:46:08 +0000631
632struct cparam {
633 time_t now;
Simon Kelley0c050242012-12-22 22:13:19 +0000634 int newone, newname;
Simon Kelley1f776932012-12-16 19:46:08 +0000635};
636
637static int construct_worker(struct in6_addr *local, int prefix,
Simon Kelleybad7b872012-12-20 22:00:39 +0000638 int scope, int if_index, int flags,
Simon Kelley1f776932012-12-16 19:46:08 +0000639 int preferred, int valid, void *vparam)
640{
641 char ifrn_name[IFNAMSIZ];
642 struct in6_addr start6, end6;
643 struct dhcp_context *template, *context;
Simon Kelley515ba972020-01-27 23:30:10 +0000644 struct iname *tmp;
645
Simon Kelley1f776932012-12-16 19:46:08 +0000646 (void)scope;
Simon Kelleybad7b872012-12-20 22:00:39 +0000647 (void)flags;
Simon Kelleyed8b68a2012-12-21 16:23:26 +0000648 (void)valid;
649 (void)preferred;
Simon Kelley1f776932012-12-16 19:46:08 +0000650
651 struct cparam *param = vparam;
652
653 if (IN6_IS_ADDR_LOOPBACK(local) ||
654 IN6_IS_ADDR_LINKLOCAL(local) ||
655 IN6_IS_ADDR_MULTICAST(local))
656 return 1;
657
Simon Kelley861c8912013-09-25 15:30:30 +0100658 if (!(flags & IFACE_PERMANENT))
659 return 1;
660
661 if (flags & IFACE_DEPRECATED)
662 return 1;
663
Simon Kelley515ba972020-01-27 23:30:10 +0000664 /* Ignore interfaces where we're not doing RA/DHCP6 */
665 if (!indextoname(daemon->icmp6fd, if_index, ifrn_name) ||
666 !iface_check(AF_LOCAL, NULL, ifrn_name, NULL))
667 return 1;
Simon Kelley1f776932012-12-16 19:46:08 +0000668
Simon Kelley515ba972020-01-27 23:30:10 +0000669 for (tmp = daemon->dhcp_except; tmp; tmp = tmp->next)
670 if (tmp->name && wildcard_match(tmp->name, ifrn_name))
671 return 1;
672
Simon Kelley1f776932012-12-16 19:46:08 +0000673 for (template = daemon->dhcp6; template; template = template->next)
Simon Kelleydb0f4882018-06-07 21:37:02 +0100674 if (!(template->flags & (CONTEXT_TEMPLATE | CONTEXT_CONSTRUCTED)))
Simon Kelley1f776932012-12-16 19:46:08 +0000675 {
676 /* non-template entries, just fill in interface and local addresses */
Vladislav Grishenko4c82efc2013-12-03 16:05:30 +0000677 if (prefix <= template->prefix &&
678 is_same_net6(local, &template->start6, template->prefix) &&
679 is_same_net6(local, &template->end6, template->prefix))
Simon Kelley1f776932012-12-16 19:46:08 +0000680 {
Maarten de Vries0a496f02018-05-11 23:20:58 +0100681 /* First time found, do fast RA. */
Simon Kelley515ba972020-01-27 23:30:10 +0000682 if (template->if_index == 0)
Maarten de Vries0a496f02018-05-11 23:20:58 +0100683 {
684 ra_start_unsolicited(param->now, template);
685 param->newone = 1;
686 }
687
Simon Kelley1f776932012-12-16 19:46:08 +0000688 template->if_index = if_index;
689 template->local6 = *local;
690 }
691
692 }
Simon Kelley486479e2013-10-14 17:18:03 +0100693 else if (wildcard_match(template->template_interface, ifrn_name) &&
Vladislav Grishenko4c82efc2013-12-03 16:05:30 +0000694 template->prefix >= prefix)
Simon Kelley1f776932012-12-16 19:46:08 +0000695 {
696 start6 = *local;
697 setaddr6part(&start6, addr6part(&template->start6));
698 end6 = *local;
699 setaddr6part(&end6, addr6part(&template->end6));
700
701 for (context = daemon->dhcp6; context; context = context->next)
Simon Kelleyc488b682018-06-02 13:06:00 +0100702 if (!(context->flags & CONTEXT_TEMPLATE) &&
Simon Kelley1f776932012-12-16 19:46:08 +0000703 IN6_ARE_ADDR_EQUAL(&start6, &context->start6) &&
704 IN6_ARE_ADDR_EQUAL(&end6, &context->end6))
705 {
Simon Kelleydb0f4882018-06-07 21:37:02 +0100706 /* If there's an absolute address context covering this address
707 then don't construct one as well. */
708 if (!(context->flags & CONTEXT_CONSTRUCTED))
709 break;
710
711 if (context->if_index == if_index)
Simon Kelleyf7a40ec2013-07-27 13:36:08 +0100712 {
Simon Kelleyc488b682018-06-02 13:06:00 +0100713 int cflags = context->flags;
714 context->flags &= ~(CONTEXT_GC | CONTEXT_OLD);
715 if (cflags & CONTEXT_OLD)
716 {
Simon Kelleydb0f4882018-06-07 21:37:02 +0100717 /* address went, now it's back, and on the same interface */
Simon Kelleyc488b682018-06-02 13:06:00 +0100718 log_context(AF_INET6, context);
719 /* fast RAs for a while */
720 ra_start_unsolicited(param->now, context);
721 param->newone = 1;
722 /* Add address to name again */
723 if (context->flags & CONTEXT_RA_NAME)
724 param->newname = 1;
Simon Kelleydb0f4882018-06-07 21:37:02 +0100725
Simon Kelleyc488b682018-06-02 13:06:00 +0100726 }
Simon Kelley05ff6592018-06-12 16:03:09 +0100727 break;
Simon Kelleyf7a40ec2013-07-27 13:36:08 +0100728 }
Simon Kelley1f776932012-12-16 19:46:08 +0000729 }
730
731 if (!context && (context = whine_malloc(sizeof (struct dhcp_context))))
732 {
733 *context = *template;
734 context->start6 = start6;
735 context->end6 = end6;
736 context->flags &= ~CONTEXT_TEMPLATE;
737 context->flags |= CONTEXT_CONSTRUCTED;
738 context->if_index = if_index;
739 context->local6 = *local;
Simon Kelleyef1a94a2013-07-26 13:59:03 +0100740 context->saved_valid = 0;
Simon Kelley1f776932012-12-16 19:46:08 +0000741
742 context->next = daemon->dhcp6;
743 daemon->dhcp6 = context;
744
Josh Soref730c6742017-02-06 16:14:04 +0000745 ra_start_unsolicited(param->now, context);
Simon Kelley1f776932012-12-16 19:46:08 +0000746 /* we created a new one, need to call
747 lease_update_file to get periodic functions called */
748 param->newone = 1;
Simon Kelley0c050242012-12-22 22:13:19 +0000749
750 /* Will need to add new putative SLAAC addresses to existing leases */
751 if (context->flags & CONTEXT_RA_NAME)
752 param->newname = 1;
Simon Kelley1f776932012-12-16 19:46:08 +0000753
754 log_context(AF_INET6, context);
755 }
Simon Kelley1f776932012-12-16 19:46:08 +0000756 }
757
758 return 1;
759}
760
761void dhcp_construct_contexts(time_t now)
762{
Simon Kelleyef1a94a2013-07-26 13:59:03 +0100763 struct dhcp_context *context, *tmp, **up;
Simon Kelley1f776932012-12-16 19:46:08 +0000764 struct cparam param;
765 param.newone = 0;
Simon Kelley0c050242012-12-22 22:13:19 +0000766 param.newname = 0;
Simon Kelley1f776932012-12-16 19:46:08 +0000767 param.now = now;
768
769 for (context = daemon->dhcp6; context; context = context->next)
Simon Kelleyef1a94a2013-07-26 13:59:03 +0100770 if (context->flags & CONTEXT_CONSTRUCTED)
771 context->flags |= CONTEXT_GC;
772
Simon Kelley1f776932012-12-16 19:46:08 +0000773 iface_enumerate(AF_INET6, &param, construct_worker);
774
775 for (up = &daemon->dhcp6, context = daemon->dhcp6; context; context = tmp)
776 {
Simon Kelley1f776932012-12-16 19:46:08 +0000777
Simon Kelleyef1a94a2013-07-26 13:59:03 +0100778 tmp = context->next;
779
780 if (context->flags & CONTEXT_GC && !(context->flags & CONTEXT_OLD))
Simon Kelley1f776932012-12-16 19:46:08 +0000781 {
Simon Kelley7ea3d3f2014-04-25 22:04:05 +0100782 if ((context->flags & CONTEXT_RA) || option_bool(OPT_RA))
Simon Kelleyef1a94a2013-07-26 13:59:03 +0100783 {
784 /* previously constructed context has gone. advertise it's demise */
785 context->flags |= CONTEXT_OLD;
786 context->address_lost_time = now;
Simon Kelley9f48ffa2013-07-28 15:47:04 +0100787 /* Apply same ceiling of configured lease time as in radv.c */
788 if (context->saved_valid > context->lease_time)
789 context->saved_valid = context->lease_time;
790 /* maximum time is 2 hours, from RFC */
Simon Kelleyef1a94a2013-07-26 13:59:03 +0100791 if (context->saved_valid > 7200) /* 2 hours */
792 context->saved_valid = 7200;
Josh Soref730c6742017-02-06 16:14:04 +0000793 ra_start_unsolicited(now, context);
Simon Kelleyef1a94a2013-07-26 13:59:03 +0100794 param.newone = 1; /* include deletion */
795
796 if (context->flags & CONTEXT_RA_NAME)
797 param.newname = 1;
798
799 log_context(AF_INET6, context);
800
801 up = &context->next;
802 }
803 else
804 {
805 /* we were never doing RA for this, so free now */
806 *up = context->next;
807 free(context);
808 }
Simon Kelley1f776932012-12-16 19:46:08 +0000809 }
810 else
Simon Kelleyef1a94a2013-07-26 13:59:03 +0100811 up = &context->next;
Simon Kelley1f776932012-12-16 19:46:08 +0000812 }
813
814 if (param.newone)
Simon Kelley7558ecd2012-12-16 21:45:16 +0000815 {
816 if (daemon->dhcp || daemon->doing_dhcp6)
Simon Kelley0c050242012-12-22 22:13:19 +0000817 {
818 if (param.newname)
819 lease_update_slaac(now);
820 lease_update_file(now);
821 }
Simon Kelley7558ecd2012-12-16 21:45:16 +0000822 else
823 /* Not doing DHCP, so no lease system, manage alarms for ra only */
824 send_alarm(periodic_ra(now), now);
825 }
Simon Kelley1f776932012-12-16 19:46:08 +0000826}
Simon Kelley1f776932012-12-16 19:46:08 +0000827
Simon Kelleyc72daea2012-01-05 21:33:27 +0000828#endif
829
830