blob: a70875862b944894edba14bc0cd8ec976a84a5b5 [file] [log] [blame]
Simon Kelley61744352013-01-31 14:34:40 +00001/* dnsmasq is Copyright (c) 2000-2013 Simon Kelley
Simon Kelleyc5ad4e72012-02-24 16:06:20 +00002
3 This program is free software; you can redistribute it and/or modify
4 it under the terms of the GNU General Public License as published by
5 the Free Software Foundation; version 2 dated June, 1991, or
6 (at your option) version 3 dated 29 June, 2007.
7
8 This program is distributed in the hope that it will be useful,
9 but WITHOUT ANY WARRANTY; without even the implied warranty of
10 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
11 GNU General Public License for more details.
12
13 You should have received a copy of the GNU General Public License
14 along with this program. If not, see <http://www.gnu.org/licenses/>.
15*/
16
17
Simon Kelley843c96b2012-02-27 17:42:38 +000018/* NB. This code may be called during a DHCPv4 or transaction which is in ping-wait
Simon Kelleyc5ad4e72012-02-24 16:06:20 +000019 It therefore cannot use any DHCP buffer resources except outpacket, which is
Simon Kelley843c96b2012-02-27 17:42:38 +000020 not used by DHCPv4 code. This code may also be called when DHCP 4 or 6 isn't
21 active, so we ensure that outpacket is allocated here too */
Simon Kelleyc5ad4e72012-02-24 16:06:20 +000022
23#include "dnsmasq.h"
Simon Kelleyc5ad4e72012-02-24 16:06:20 +000024
25#ifdef HAVE_DHCP6
26
Simon Kelley22d904d2012-02-26 20:13:45 +000027#include <netinet/icmp6.h>
28
Simon Kelleyc5ad4e72012-02-24 16:06:20 +000029struct ra_param {
Simon Kelley1f776932012-12-16 19:46:08 +000030 time_t now;
Simon Kelley30cd9662012-03-25 20:44:38 +010031 int ind, managed, other, found_context, first;
Simon Kelleyc5ad4e72012-02-24 16:06:20 +000032 char *if_name;
Simon Kelley18f0fb02012-03-31 21:18:55 +010033 struct dhcp_netid *tags;
Simon Kelley55b42f62012-12-21 16:53:15 +000034 struct in6_addr link_local, link_global;
35 unsigned int pref_time;
Simon Kelleyc5ad4e72012-02-24 16:06:20 +000036};
37
38struct search_param {
39 time_t now; int iface;
40};
41
Simon Kelley1f776932012-12-16 19:46:08 +000042static void send_ra(time_t now, int iface, char *iface_name, struct in6_addr *dest);
Simon Kelleyc5ad4e72012-02-24 16:06:20 +000043static int add_prefixes(struct in6_addr *local, int prefix,
Simon Kelleybad7b872012-12-20 22:00:39 +000044 int scope, int if_index, int flags,
Simon Kelley55b42f62012-12-21 16:53:15 +000045 unsigned int preferred, unsigned int valid, void *vparam);
Simon Kelleyc5ad4e72012-02-24 16:06:20 +000046static int iface_search(struct in6_addr *local, int prefix,
Simon Kelleybad7b872012-12-20 22:00:39 +000047 int scope, int if_index, int flags,
Simon Kelley1f776932012-12-16 19:46:08 +000048 int prefered, int valid, void *vparam);
Simon Kelleyc5ad4e72012-02-24 16:06:20 +000049static int add_lla(int index, unsigned int type, char *mac, size_t maclen, void *parm);
50
Simon Kelleyc5379c12012-02-24 20:05:52 +000051static int hop_limit;
Simon Kelleyc5ad4e72012-02-24 16:06:20 +000052
53void ra_init(time_t now)
54{
Simon Kelleyc5ad4e72012-02-24 16:06:20 +000055 struct icmp6_filter filter;
56 int fd;
Simon Kelley0e88d532012-03-28 22:22:05 +010057#if defined(IPV6_TCLASS) && defined(IPTOS_CLASS_CS6)
Simon Kelleyc5ad4e72012-02-24 16:06:20 +000058 int class = IPTOS_CLASS_CS6;
59#endif
60 int val = 255; /* radvd uses this value */
Simon Kelley7b6dd882012-03-01 10:26:16 +000061 socklen_t len = sizeof(int);
Simon Kelley353ae4d2012-03-19 20:07:51 +000062 struct dhcp_context *context;
63
Simon Kelley843c96b2012-02-27 17:42:38 +000064 /* ensure this is around even if we're not doing DHCPv6 */
65 expand_buf(&daemon->outpacket, sizeof(struct dhcp_packet));
Simon Kelley353ae4d2012-03-19 20:07:51 +000066
67 /* See if we're guessing SLAAC addresses, if so we need to recieve ping replies */
Simon Kelley1f776932012-12-16 19:46:08 +000068 for (context = daemon->dhcp6; context; context = context->next)
Simon Kelley353ae4d2012-03-19 20:07:51 +000069 if ((context->flags & CONTEXT_RA_NAME))
70 break;
71
Simon Kelleyc5ad4e72012-02-24 16:06:20 +000072 ICMP6_FILTER_SETBLOCKALL(&filter);
73 ICMP6_FILTER_SETPASS(ND_ROUTER_SOLICIT, &filter);
Simon Kelley353ae4d2012-03-19 20:07:51 +000074 if (context)
75 ICMP6_FILTER_SETPASS(ICMP6_ECHO_REPLY, &filter);
Simon Kelleyc5ad4e72012-02-24 16:06:20 +000076
77 if ((fd = socket(PF_INET6, SOCK_RAW, IPPROTO_ICMPV6)) == -1 ||
Simon Kelleyc5379c12012-02-24 20:05:52 +000078 getsockopt(fd, IPPROTO_IPV6, IPV6_UNICAST_HOPS, &hop_limit, &len) ||
Simon Kelley0e88d532012-03-28 22:22:05 +010079#if defined(IPV6_TCLASS) && defined(IPTOS_CLASS_CS6)
Simon Kelleyc5ad4e72012-02-24 16:06:20 +000080 setsockopt(fd, IPPROTO_IPV6, IPV6_TCLASS, &class, sizeof(class)) == -1 ||
81#endif
82 !fix_fd(fd) ||
83 !set_ipv6pktinfo(fd) ||
84 setsockopt(fd, IPPROTO_IPV6, IPV6_UNICAST_HOPS, &val, sizeof(val)) ||
85 setsockopt(fd, IPPROTO_IPV6, IPV6_MULTICAST_HOPS, &val, sizeof(val)) ||
86 setsockopt(fd, IPPROTO_ICMPV6, ICMP6_FILTER, &filter, sizeof(filter)) == -1)
87 die (_("cannot create ICMPv6 socket: %s"), NULL, EC_BADNET);
88
89 daemon->icmp6fd = fd;
90
Simon Kelley353ae4d2012-03-19 20:07:51 +000091 ra_start_unsolicted(now, NULL);
Simon Kelleyc5ad4e72012-02-24 16:06:20 +000092}
93
Simon Kelley353ae4d2012-03-19 20:07:51 +000094void ra_start_unsolicted(time_t now, struct dhcp_context *context)
Simon Kelleyc5ad4e72012-02-24 16:06:20 +000095{
Simon Kelley353ae4d2012-03-19 20:07:51 +000096 /* init timers so that we do ra's for some/all soon. some ra_times will end up zeroed
Simon Kelleyc5ad4e72012-02-24 16:06:20 +000097 if it's not appropriate to advertise those contexts.
98 This gets re-called on a netlink route-change to re-do the advertisement
99 and pick up new interfaces */
Simon Kelley6e3dba32012-12-16 21:52:45 +0000100
Simon Kelley353ae4d2012-03-19 20:07:51 +0000101 if (context)
Simon Kelley1b75c1e2012-12-18 19:55:25 +0000102 context->ra_short_period_start = context->ra_time = now;
Simon Kelley353ae4d2012-03-19 20:07:51 +0000103 else
Simon Kelley1f776932012-12-16 19:46:08 +0000104 for (context = daemon->dhcp6; context; context = context->next)
Simon Kelley6e3dba32012-12-16 21:52:45 +0000105 if (!(context->flags & CONTEXT_TEMPLATE))
Simon Kelley1b75c1e2012-12-18 19:55:25 +0000106 {
107 context->ra_time = now + (rand16()/13000); /* range 0 - 5 */
108 /* re-do frequently for a minute or so, in case the first gets lost. */
109 context->ra_short_period_start = now;
110 }
Simon Kelleyc5ad4e72012-02-24 16:06:20 +0000111}
112
Simon Kelley1f776932012-12-16 19:46:08 +0000113void icmp6_packet(time_t now)
Simon Kelleyc5ad4e72012-02-24 16:06:20 +0000114{
115 char interface[IF_NAMESIZE+1];
116 ssize_t sz;
117 int if_index = 0;
118 struct cmsghdr *cmptr;
119 struct msghdr msg;
120 union {
121 struct cmsghdr align; /* this ensures alignment */
122 char control6[CMSG_SPACE(sizeof(struct in6_pktinfo))];
123 } control_u;
124 struct sockaddr_in6 from;
Simon Kelley5ef33272012-03-30 15:10:28 +0100125 unsigned char *packet;
Simon Kelleyc5ad4e72012-02-24 16:06:20 +0000126 struct iname *tmp;
Simon Kelleyc5ad4e72012-02-24 16:06:20 +0000127
128 /* Note: use outpacket for input buffer */
129 msg.msg_control = control_u.control6;
130 msg.msg_controllen = sizeof(control_u);
131 msg.msg_flags = 0;
132 msg.msg_name = &from;
133 msg.msg_namelen = sizeof(from);
134 msg.msg_iov = &daemon->outpacket;
135 msg.msg_iovlen = 1;
136
137 if ((sz = recv_dhcp_packet(daemon->icmp6fd, &msg)) == -1 || sz < 8)
138 return;
Simon Kelley5ef33272012-03-30 15:10:28 +0100139
140 packet = (unsigned char *)daemon->outpacket.iov_base;
Simon Kelleyc5ad4e72012-02-24 16:06:20 +0000141
142 for (cmptr = CMSG_FIRSTHDR(&msg); cmptr; cmptr = CMSG_NXTHDR(&msg, cmptr))
143 if (cmptr->cmsg_level == IPPROTO_IPV6 && cmptr->cmsg_type == daemon->v6pktinfo)
144 {
145 union {
146 unsigned char *c;
147 struct in6_pktinfo *p;
148 } p;
149 p.c = CMSG_DATA(cmptr);
150
151 if_index = p.p->ipi6_ifindex;
152 }
153
154 if (!indextoname(daemon->icmp6fd, if_index, interface))
155 return;
156
Simon Kelley4f7b3042012-11-28 21:27:02 +0000157 if (!iface_check(AF_LOCAL, NULL, interface, NULL))
Simon Kelleyc5ad4e72012-02-24 16:06:20 +0000158 return;
159
160 for (tmp = daemon->dhcp_except; tmp; tmp = tmp->next)
Simon Kelley49333cb2013-03-15 20:30:51 +0000161 if (tmp->name && wildcard_match(tmp->name, interface))
Simon Kelleyc5ad4e72012-02-24 16:06:20 +0000162 return;
163
Simon Kelley8bc4cec2012-07-03 21:04:11 +0100164 if (packet[1] != 0)
Simon Kelleyc5ad4e72012-02-24 16:06:20 +0000165 return;
Simon Kelley8bc4cec2012-07-03 21:04:11 +0100166
Simon Kelley5ef33272012-03-30 15:10:28 +0100167 if (packet[0] == ICMP6_ECHO_REPLY)
168 lease_ping_reply(&from.sin6_addr, packet, interface);
169 else if (packet[0] == ND_ROUTER_SOLICIT)
Simon Kelley353ae4d2012-03-19 20:07:51 +0000170 {
Simon Kelley5ef33272012-03-30 15:10:28 +0100171 char *mac = "";
172
173 /* look for link-layer address option for logging */
174 if (sz >= 16 && packet[8] == ICMP6_OPT_SOURCE_MAC && (packet[9] * 8) + 8 <= sz)
175 {
176 print_mac(daemon->namebuff, &packet[10], (packet[9] * 8) - 2);
177 mac = daemon->namebuff;
178 }
179
180 my_syslog(MS_DHCP | LOG_INFO, "RTR-SOLICIT(%s) %s", interface, mac);
Simon Kelleyf632e562012-05-12 15:05:34 +0100181 /* source address may not be valid in solicit request. */
Simon Kelley1f776932012-12-16 19:46:08 +0000182 send_ra(now, if_index, interface, !IN6_IS_ADDR_UNSPECIFIED(&from.sin6_addr) ? &from.sin6_addr : NULL);
Simon Kelley353ae4d2012-03-19 20:07:51 +0000183 }
Simon Kelleyc5ad4e72012-02-24 16:06:20 +0000184}
185
Simon Kelley1f776932012-12-16 19:46:08 +0000186static void send_ra(time_t now, int iface, char *iface_name, struct in6_addr *dest)
Simon Kelleyc5ad4e72012-02-24 16:06:20 +0000187{
188 struct ra_packet *ra;
189 struct ra_param parm;
190 struct ifreq ifr;
191 struct sockaddr_in6 addr;
192 struct dhcp_context *context;
Simon Kelley18f0fb02012-03-31 21:18:55 +0100193 struct dhcp_netid iface_id;
194 struct dhcp_opt *opt_cfg;
195 int done_dns = 0;
Simon Kelley3b436462012-12-28 11:55:45 +0000196#ifdef HAVE_LINUX_NETWORK
197 FILE *f;
198#endif
199
Simon Kelleyc5ad4e72012-02-24 16:06:20 +0000200 save_counter(0);
201 ra = expand(sizeof(struct ra_packet));
202
Simon Kelley353ae4d2012-03-19 20:07:51 +0000203 ra->type = ND_ROUTER_ADVERT;
Simon Kelleyc5ad4e72012-02-24 16:06:20 +0000204 ra->code = 0;
Simon Kelleyc5379c12012-02-24 20:05:52 +0000205 ra->hop_limit = hop_limit;
Simon Kelley884a6df2012-03-20 16:20:22 +0000206 ra->flags = 0x00;
Simon Kelleydc9476b2012-12-29 22:08:26 +0000207 ra->lifetime = htons(RA_INTERVAL * 3); /* AdvDefaultLifetime * 3 */
Simon Kelleyc5ad4e72012-02-24 16:06:20 +0000208 ra->reachable_time = 0;
209 ra->retrans_time = 0;
210
211 parm.ind = iface;
212 parm.managed = 0;
Simon Kelley30cd9662012-03-25 20:44:38 +0100213 parm.other = 0;
Simon Kelleyc5ad4e72012-02-24 16:06:20 +0000214 parm.found_context = 0;
215 parm.if_name = iface_name;
216 parm.first = 1;
Simon Kelley1f776932012-12-16 19:46:08 +0000217 parm.now = now;
Simon Kelley55b42f62012-12-21 16:53:15 +0000218 parm.pref_time = 0;
Simon Kelley1f776932012-12-16 19:46:08 +0000219
Simon Kelley18f0fb02012-03-31 21:18:55 +0100220 /* set tag with name == interface */
221 iface_id.net = iface_name;
222 iface_id.next = NULL;
223 parm.tags = &iface_id;
Simon Kelleyc5ad4e72012-02-24 16:06:20 +0000224
Simon Kelley1f776932012-12-16 19:46:08 +0000225 for (context = daemon->dhcp6; context; context = context->next)
Simon Kelley18f0fb02012-03-31 21:18:55 +0100226 {
227 context->flags &= ~CONTEXT_RA_DONE;
228 context->netid.next = &context->netid;
229 }
230
Simon Kelleyc5ad4e72012-02-24 16:06:20 +0000231 if (!iface_enumerate(AF_INET6, &parm, add_prefixes) ||
232 !parm.found_context)
233 return;
234
235 strncpy(ifr.ifr_name, iface_name, IF_NAMESIZE);
Simon Kelley3b436462012-12-28 11:55:45 +0000236
237#ifdef HAVE_LINUX_NETWORK
238 /* Note that IPv6 MTU is not necessarilly the same as the IPv4 MTU
239 available from SIOCGIFMTU */
240 sprintf(daemon->namebuff, "/proc/sys/net/ipv6/conf/%s/mtu", iface_name);
241 if ((f = fopen(daemon->namebuff, "r")))
Simon Kelleyc5ad4e72012-02-24 16:06:20 +0000242 {
Simon Kelley3b436462012-12-28 11:55:45 +0000243 if (fgets(daemon->namebuff, MAXDNAME, f))
244 {
245 put_opt6_char(ICMP6_OPT_MTU);
246 put_opt6_char(1);
247 put_opt6_short(0);
248 put_opt6_long(atoi(daemon->namebuff));
249 }
250 fclose(f);
Simon Kelleyc5ad4e72012-02-24 16:06:20 +0000251 }
Simon Kelley3b436462012-12-28 11:55:45 +0000252#endif
Simon Kelleyc5ad4e72012-02-24 16:06:20 +0000253
254 iface_enumerate(AF_LOCAL, &iface, add_lla);
Simon Kelley18f0fb02012-03-31 21:18:55 +0100255
256 /* RDNSS, RFC 6106, use relevant DHCP6 options */
257 (void)option_filter(parm.tags, NULL, daemon->dhcp_opts6);
Simon Kelleyc5ad4e72012-02-24 16:06:20 +0000258
Simon Kelley18f0fb02012-03-31 21:18:55 +0100259 for (opt_cfg = daemon->dhcp_opts6; opt_cfg; opt_cfg = opt_cfg->next)
260 {
261 int i;
262
263 /* netids match and not encapsulated? */
264 if (!(opt_cfg->flags & DHOPT_TAGOK))
265 continue;
266
267 if (opt_cfg->opt == OPTION6_DNS_SERVER)
268 {
269 struct in6_addr *a = (struct in6_addr *)opt_cfg->val;
Simon Kelleyc5ad4e72012-02-24 16:06:20 +0000270
Simon Kelley18f0fb02012-03-31 21:18:55 +0100271 done_dns = 1;
272 if (opt_cfg->len == 0)
273 continue;
274
275 put_opt6_char(ICMP6_OPT_RDNSS);
276 put_opt6_char((opt_cfg->len/8) + 1);
277 put_opt6_short(0);
Simon Kelleydc9476b2012-12-29 22:08:26 +0000278 put_opt6_long(RA_INTERVAL * 2); /* lifetime - twice RA retransmit */
Simon Kelley18f0fb02012-03-31 21:18:55 +0100279 /* zero means "self" */
280 for (i = 0; i < opt_cfg->len; i += IN6ADDRSZ, a++)
281 if (IN6_IS_ADDR_UNSPECIFIED(a))
Simon Kelley55b42f62012-12-21 16:53:15 +0000282 put_opt6(&parm.link_global, IN6ADDRSZ);
Simon Kelley18f0fb02012-03-31 21:18:55 +0100283 else
284 put_opt6(a, IN6ADDRSZ);
285 }
286
287 if (opt_cfg->opt == OPTION6_DOMAIN_SEARCH && opt_cfg->len != 0)
288 {
289 int len = ((opt_cfg->len+7)/8);
290
291 put_opt6_char(ICMP6_OPT_DNSSL);
292 put_opt6_char(len + 1);
293 put_opt6_short(0);
294 put_opt6_long(1800); /* lifetime - twice RA retransmit */
295 put_opt6(opt_cfg->val, opt_cfg->len);
296
297 /* pad */
298 for (i = opt_cfg->len; i < len * 8; i++)
299 put_opt6_char(0);
300 }
301 }
302
303 if (!done_dns)
304 {
305 /* default == us. */
306 put_opt6_char(ICMP6_OPT_RDNSS);
307 put_opt6_char(3);
308 put_opt6_short(0);
Simon Kelleydc9476b2012-12-29 22:08:26 +0000309 put_opt6_long(RA_INTERVAL * 2); /* lifetime - twice RA retransmit */
Simon Kelley55b42f62012-12-21 16:53:15 +0000310 put_opt6(&parm.link_global, IN6ADDRSZ);
Simon Kelley18f0fb02012-03-31 21:18:55 +0100311 }
Simon Kelleyc5ad4e72012-02-24 16:06:20 +0000312
313 /* set managed bits unless we're providing only RA on this link */
314 if (parm.managed)
Simon Kelley30cd9662012-03-25 20:44:38 +0100315 ra->flags |= 0x80; /* M flag, managed, */
316 if (parm.other)
317 ra->flags |= 0x40; /* O flag, other */
318
Simon Kelleyc5ad4e72012-02-24 16:06:20 +0000319 /* decide where we're sending */
320 memset(&addr, 0, sizeof(addr));
Simon Kelley22d904d2012-02-26 20:13:45 +0000321#ifdef HAVE_SOCKADDR_SA_LEN
322 addr.sin6_len = sizeof(struct sockaddr_in6);
323#endif
Simon Kelleyc5ad4e72012-02-24 16:06:20 +0000324 addr.sin6_family = AF_INET6;
325 addr.sin6_port = htons(IPPROTO_ICMPV6);
326 if (dest)
327 {
Simon Kelley353ae4d2012-03-19 20:07:51 +0000328 addr.sin6_addr = *dest;
Simon Kelleyc5ad4e72012-02-24 16:06:20 +0000329 if (IN6_IS_ADDR_LINKLOCAL(dest) ||
330 IN6_IS_ADDR_MC_LINKLOCAL(dest))
331 addr.sin6_scope_id = iface;
332 }
333 else
Simon Kelleyf632e562012-05-12 15:05:34 +0100334 inet_pton(AF_INET6, ALL_NODES, &addr.sin6_addr);
Simon Kelley22d904d2012-02-26 20:13:45 +0000335
Simon Kelleyc5ad4e72012-02-24 16:06:20 +0000336 send_from(daemon->icmp6fd, 0, daemon->outpacket.iov_base, save_counter(0),
Simon Kelley50303b12012-04-04 22:13:17 +0100337 (union mysockaddr *)&addr, (struct all_addr *)&parm.link_local, iface);
Simon Kelleyc5ad4e72012-02-24 16:06:20 +0000338
339}
340
341static int add_prefixes(struct in6_addr *local, int prefix,
Simon Kelleybad7b872012-12-20 22:00:39 +0000342 int scope, int if_index, int flags,
Simon Kelley55b42f62012-12-21 16:53:15 +0000343 unsigned int preferred, unsigned int valid, void *vparam)
Simon Kelleyc5ad4e72012-02-24 16:06:20 +0000344{
Simon Kelleyc5ad4e72012-02-24 16:06:20 +0000345 struct ra_param *param = vparam;
Simon Kelleyc5ad4e72012-02-24 16:06:20 +0000346
347 (void)scope; /* warning */
Simon Kelleyed8b68a2012-12-21 16:23:26 +0000348
Simon Kelleyc5ad4e72012-02-24 16:06:20 +0000349 if (if_index == param->ind)
350 {
351 if (IN6_IS_ADDR_LINKLOCAL(local))
352 param->link_local = *local;
353 else if (!IN6_IS_ADDR_LOOPBACK(local) &&
Simon Kelleyc5ad4e72012-02-24 16:06:20 +0000354 !IN6_IS_ADDR_MULTICAST(local))
355 {
Simon Kelley1e02a852012-03-29 11:07:25 +0100356 int do_prefix = 0;
Simon Kelleyc8257542012-03-28 21:15:41 +0100357 int do_slaac = 0;
358 int deprecate = 0;
Simon Kelley3bc0d932012-12-28 11:31:44 +0000359 int constructed = 0;
Simon Kelleyc8257542012-03-28 21:15:41 +0100360 unsigned int time = 0xffffffff;
Simon Kelley1e02a852012-03-29 11:07:25 +0100361 struct dhcp_context *context;
362
Simon Kelley1f776932012-12-16 19:46:08 +0000363 for (context = daemon->dhcp6; context; context = context->next)
Simon Kelley6e3dba32012-12-16 21:52:45 +0000364 if (!(context->flags & CONTEXT_TEMPLATE) &&
365 prefix == context->prefix &&
Simon Kelleyc5ad4e72012-02-24 16:06:20 +0000366 is_same_net6(local, &context->start6, prefix) &&
367 is_same_net6(local, &context->end6, prefix))
368 {
Simon Kelley30cd9662012-03-25 20:44:38 +0100369 if ((context->flags &
370 (CONTEXT_RA_ONLY | CONTEXT_RA_NAME | CONTEXT_RA_STATELESS)))
371 {
372 do_slaac = 1;
Simon Kelley4723d492012-03-30 21:04:17 +0100373 if (context->flags & CONTEXT_DHCP)
Simon Kelley05e92e52012-03-30 22:24:15 +0100374 {
375 param->other = 1;
376 if (!(context->flags & CONTEXT_RA_STATELESS))
377 param->managed = 1;
378 }
Simon Kelley30cd9662012-03-25 20:44:38 +0100379 }
Simon Kelley884a6df2012-03-20 16:20:22 +0000380 else
Simon Kelley0010b472012-02-29 12:18:30 +0000381 {
382 /* don't do RA for non-ra-only unless --enable-ra is set */
383 if (!option_bool(OPT_RA))
384 continue;
385 param->managed = 1;
Simon Kelley30cd9662012-03-25 20:44:38 +0100386 param->other = 1;
Simon Kelley0010b472012-02-29 12:18:30 +0000387 }
Simon Kelley1f776932012-12-16 19:46:08 +0000388
Simon Kelley7f035f52012-12-22 21:27:08 +0000389 /* find floor time, don't reduce below RA interval. */
Simon Kelleyc8257542012-03-28 21:15:41 +0100390 if (time > context->lease_time)
Simon Kelley7f035f52012-12-22 21:27:08 +0000391 {
392 time = context->lease_time;
Simon Kelley55b548a2012-12-29 17:13:04 +0000393 if (time < ((unsigned int)RA_INTERVAL))
394 time = RA_INTERVAL;
Simon Kelley7f035f52012-12-22 21:27:08 +0000395 }
396
Simon Kelleyc8257542012-03-28 21:15:41 +0100397 if (context->flags & CONTEXT_DEPRECATE)
398 deprecate = 1;
Simon Kelley3bc0d932012-12-28 11:31:44 +0000399
400 if (context->flags & CONTEXT_CONSTRUCTED)
401 constructed = 1;
402
Simon Kelleyc8257542012-03-28 21:15:41 +0100403
Simon Kelley18f0fb02012-03-31 21:18:55 +0100404 /* collect dhcp-range tags */
405 if (context->netid.next == &context->netid && context->netid.net)
406 {
407 context->netid.next = param->tags;
408 param->tags = &context->netid;
409 }
410
Simon Kelley5ae34bf2012-06-04 21:14:03 +0100411 /* subsequent prefixes on the same interface
412 and subsequent instances of this prefix don't need timers.
413 Be careful not to find the same prefix twice with different
414 addresses. */
Simon Kelley1e02a852012-03-29 11:07:25 +0100415 if (!(context->flags & CONTEXT_RA_DONE))
416 {
Simon Kelley5ae34bf2012-06-04 21:14:03 +0100417 if (!param->first)
418 context->ra_time = 0;
Simon Kelley1e02a852012-03-29 11:07:25 +0100419 context->flags |= CONTEXT_RA_DONE;
420 do_prefix = 1;
421 }
Simon Kelley5ae34bf2012-06-04 21:14:03 +0100422
423 param->first = 0;
424 param->found_context = 1;
Simon Kelleyc5ad4e72012-02-24 16:06:20 +0000425 }
Simon Kelley1f776932012-12-16 19:46:08 +0000426
Simon Kelleyed8b68a2012-12-21 16:23:26 +0000427 /* configured time is ceiling */
Simon Kelley3bc0d932012-12-28 11:31:44 +0000428 if (!constructed || valid > time)
Simon Kelleyed8b68a2012-12-21 16:23:26 +0000429 valid = time;
430
Simon Kelley3bc0d932012-12-28 11:31:44 +0000431 if (flags & IFACE_DEPRECATED)
Simon Kelleyed8b68a2012-12-21 16:23:26 +0000432 preferred = 0;
Simon Kelley1e02a852012-03-29 11:07:25 +0100433
Simon Kelley3bc0d932012-12-28 11:31:44 +0000434 if (deprecate)
435 time = 0;
436
437 /* configured time is ceiling */
438 if (!constructed || preferred > time)
439 preferred = time;
440
Simon Kelley55b42f62012-12-21 16:53:15 +0000441 if (preferred > param->pref_time)
442 {
443 param->pref_time = preferred;
444 param->link_global = *local;
445 }
446
Simon Kelley1e02a852012-03-29 11:07:25 +0100447 if (do_prefix)
Simon Kelleyc8257542012-03-28 21:15:41 +0100448 {
Simon Kelley1e02a852012-03-29 11:07:25 +0100449 struct prefix_opt *opt;
450
451 if ((opt = expand(sizeof(struct prefix_opt))))
452 {
Simon Kelley5ef33272012-03-30 15:10:28 +0100453 /* zero net part of address */
454 setaddr6part(local, addr6part(local) & ~((prefix == 64) ? (u64)-1LL : (1LLU << (128 - prefix)) - 1LLU));
455
Simon Kelley1e02a852012-03-29 11:07:25 +0100456 opt->type = ICMP6_OPT_PREFIX;
457 opt->len = 4;
458 opt->prefix_len = prefix;
Simon Kelleyfd05f122012-08-12 17:48:50 +0100459 /* autonomous only if we're not doing dhcp, always set "on-link" */
460 opt->flags = do_slaac ? 0xC0 : 0x80;
Simon Kelleyed8b68a2012-12-21 16:23:26 +0000461 opt->valid_lifetime = htonl(valid);
462 opt->preferred_lifetime = htonl(preferred);
Simon Kelley5ef33272012-03-30 15:10:28 +0100463 opt->reserved = 0;
Simon Kelley1e02a852012-03-29 11:07:25 +0100464 opt->prefix = *local;
Simon Kelley1e02a852012-03-29 11:07:25 +0100465
Simon Kelley5ef33272012-03-30 15:10:28 +0100466 inet_ntop(AF_INET6, local, daemon->addrbuff, ADDRSTRLEN);
Simon Kelley1e02a852012-03-29 11:07:25 +0100467 my_syslog(MS_DHCP | LOG_INFO, "RTR-ADVERT(%s) %s", param->if_name, daemon->addrbuff);
468 }
Simon Kelleyc8257542012-03-28 21:15:41 +0100469 }
Simon Kelleyc5ad4e72012-02-24 16:06:20 +0000470 }
471 }
472 return 1;
473}
474
475static int add_lla(int index, unsigned int type, char *mac, size_t maclen, void *parm)
476{
477 (void)type;
478
479 if (index == *((int *)parm))
480 {
481 /* size is in units of 8 octets and includes type and length (2 bytes)
482 add 7 to round up */
483 int len = (maclen + 9) >> 3;
484 unsigned char *p = expand(len << 3);
485 memset(p, 0, len << 3);
486 *p++ = ICMP6_OPT_SOURCE_MAC;
487 *p++ = len;
488 memcpy(p, mac, maclen);
489
490 return 0;
491 }
492
493 return 1;
494}
495
496time_t periodic_ra(time_t now)
497{
498 struct search_param param;
499 struct dhcp_context *context;
500 time_t next_event;
501 char interface[IF_NAMESIZE+1];
502
503 param.now = now;
Simon Kelley29d28dd2012-12-03 14:05:59 +0000504 param.iface = 0;
Simon Kelleyc5ad4e72012-02-24 16:06:20 +0000505
506 while (1)
507 {
508 /* find overdue events, and time of first future event */
Simon Kelley1f776932012-12-16 19:46:08 +0000509 for (next_event = 0, context = daemon->dhcp6; context; context = context->next)
Simon Kelleyc5ad4e72012-02-24 16:06:20 +0000510 if (context->ra_time != 0)
511 {
Simon Kelley7dbe9812012-03-25 14:49:54 +0100512 if (difftime(context->ra_time, now) <= 0.0)
Simon Kelleyc5ad4e72012-02-24 16:06:20 +0000513 break; /* overdue */
514
Simon Kelley7dbe9812012-03-25 14:49:54 +0100515 if (next_event == 0 || difftime(next_event, context->ra_time) > 0.0)
516 next_event = context->ra_time;
Simon Kelleyc5ad4e72012-02-24 16:06:20 +0000517 }
518
519 /* none overdue */
520 if (!context)
521 break;
522
523 /* There's a context overdue, but we can't find an interface
524 associated with it, because it's for a subnet we dont
525 have an interface on. Probably we're doing DHCP on
526 a remote subnet via a relay. Zero the timer, since we won't
527 ever be able to send ra's and satistfy it. */
528 if (iface_enumerate(AF_INET6, &param, iface_search))
529 context->ra_time = 0;
Simon Kelley29d28dd2012-12-03 14:05:59 +0000530 else if (param.iface != 0 &&
531 indextoname(daemon->icmp6fd, param.iface, interface) &&
Simon Kelleyf7fe3622012-12-04 20:55:54 +0000532 iface_check(AF_LOCAL, NULL, interface, NULL))
Simon Kelley421594f2012-12-02 12:17:35 +0000533 {
534 struct iname *tmp;
535 for (tmp = daemon->dhcp_except; tmp; tmp = tmp->next)
Simon Kelley49333cb2013-03-15 20:30:51 +0000536 if (tmp->name && wildcard_match(tmp->name, interface))
Simon Kelley421594f2012-12-02 12:17:35 +0000537 break;
538 if (!tmp)
Simon Kelley1f776932012-12-16 19:46:08 +0000539 send_ra(now, param.iface, interface, NULL);
Simon Kelley421594f2012-12-02 12:17:35 +0000540 }
541 }
Simon Kelleyc5ad4e72012-02-24 16:06:20 +0000542 return next_event;
543}
Simon Kelley421594f2012-12-02 12:17:35 +0000544
Simon Kelleyc5ad4e72012-02-24 16:06:20 +0000545static int iface_search(struct in6_addr *local, int prefix,
Simon Kelleybad7b872012-12-20 22:00:39 +0000546 int scope, int if_index, int flags,
Simon Kelley1f776932012-12-16 19:46:08 +0000547 int preferred, int valid, void *vparam)
Simon Kelleyc5ad4e72012-02-24 16:06:20 +0000548{
549 struct search_param *param = vparam;
Simon Kelley741c2952012-02-25 13:09:18 +0000550 struct dhcp_context *context;
Simon Kelleyc5ad4e72012-02-24 16:06:20 +0000551
552 (void)scope;
Simon Kelley1f776932012-12-16 19:46:08 +0000553 (void)preferred;
554 (void)valid;
Simon Kelleyc5ad4e72012-02-24 16:06:20 +0000555
Simon Kelley1f776932012-12-16 19:46:08 +0000556 for (context = daemon->dhcp6; context; context = context->next)
Simon Kelley6e3dba32012-12-16 21:52:45 +0000557 if (!(context->flags & CONTEXT_TEMPLATE) &&
558 prefix == context->prefix &&
Simon Kelleyc5ad4e72012-02-24 16:06:20 +0000559 is_same_net6(local, &context->start6, prefix) &&
Simon Kelley6e3dba32012-12-16 21:52:45 +0000560 is_same_net6(local, &context->end6, prefix) &&
561 context->ra_time != 0 &&
562 difftime(context->ra_time, param->now) <= 0.0)
563 {
564 /* found an interface that's overdue for RA determine new
565 timeout value and arrange for RA to be sent unless interface is
566 still doing DAD.*/
567
Simon Kelleybad7b872012-12-20 22:00:39 +0000568 if (!(flags & IFACE_TENTATIVE))
Simon Kelley6e3dba32012-12-16 21:52:45 +0000569 param->iface = if_index;
570
Simon Kelley1b75c1e2012-12-18 19:55:25 +0000571 if (difftime(param->now, context->ra_short_period_start) < 60.0)
Simon Kelley6e3dba32012-12-16 21:52:45 +0000572 /* range 5 - 20 */
573 context->ra_time = param->now + 5 + (rand16()/4400);
574 else
Simon Kelley55b548a2012-12-29 17:13:04 +0000575 /* range 3/4 - 1 times RA_INTERVAL */
576 context->ra_time = param->now + (3 * RA_INTERVAL)/4 + ((RA_INTERVAL * (unsigned int)rand16()) >> 18);
Simon Kelley6e3dba32012-12-16 21:52:45 +0000577
578 /* zero timers for other contexts on the same subnet, so they don't timeout
579 independently */
580 for (context = context->next; context; context = context->next)
581 if (prefix == context->prefix &&
582 is_same_net6(local, &context->start6, prefix) &&
583 is_same_net6(local, &context->end6, prefix))
584 context->ra_time = 0;
585
586 return 0; /* found, abort */
587 }
Simon Kelleyc5ad4e72012-02-24 16:06:20 +0000588
589 return 1; /* keep searching */
590}
591
Simon Kelley801ca9a2012-03-06 19:30:17 +0000592
Simon Kelleyc5ad4e72012-02-24 16:06:20 +0000593#endif