/* dhcpd.c - DHCP server for dynamic network configuration.
*
* Copyright 2013 Madhur Verma <mad.flexi@gmail.com>
* Copyright 2013 Kyungwan Han <asura321@gamil.com>
* Copyright 2015 Yeongdeok Suh <skyducks111@gmail.com>
*
* No Standard
USE_DHCPD(NEWTOY(dhcpd, ">1P#<0>65535fi:S46[!46]", TOYFLAG_SBIN|TOYFLAG_ROOTONLY))
config DHCPD
bool "dhcpd"
default n
help
usage: dhcpd [-46fS] [-i IFACE] [-P N] [CONFFILE]
-f Run in foreground
-i Interface to use
-S Log to syslog too
-P N Use port N (default ipv4 67, ipv6 547)
-4, -6 Run as a DHCPv4 or DHCPv6 server
config DEBUG_DHCP
bool "debugging messeges ON/OFF"
default n
depends on DHCPD
*/
/*
* TODO
* - Working as an relay agent
* - Rapid commit option support
* - Additional packet options (commented on the middle of sources)
* - Create common modules
*/
#define FOR_dhcpd
#include "toys.h"
#include <linux/sockios.h>
#include <linux/if_ether.h>
// Todo: headers not in posix
#include <netinet/ip.h>
#include <netinet/ip6.h>
#include <netinet/udp.h>
#include <netpacket/packet.h>
#if CFG_DEBUG_DHCP==1
# define dbg(fmt, arg...) printf(fmt, ##arg)
#else
# define dbg(fmt, arg...)
#endif
#define LOG_SILENT 0x0
#define LOG_CONSOLE 0x1
#define LOG_SYSTEM 0x2
#define DHCP_MAGIC 0x63825363
#define DHCPDISCOVER 1
#define DHCPOFFER 2
#define DHCPREQUEST 3
#define DHCPDECLINE 4
#define DHCPACK 5
#define DHCPNAK 6
#define DHCPRELEASE 7
#define DHCPINFORM 8
#define DHCP6SOLICIT 1
#define DHCP6ADVERTISE 2 // server -> client
#define DHCP6REQUEST 3
#define DHCP6CONFIRM 4
#define DHCP6RENEW 5
#define DHCP6REBIND 6
#define DHCP6REPLY 7 // server -> client
#define DHCP6RELEASE 8
#define DHCP6DECLINE 9
#define DHCP6RECONFIGURE 10 // server -> client
#define DHCP6INFOREQUEST 11
#define DHCP6RELAYFLOW 12 // relay -> relay/server
#define DHCP6RELAYREPLY 13 // server/relay -> relay
#define DHCP_NUM8 (1<<8)
#define DHCP_NUM16 (1<<9)
#define DHCP_NUM32 DHCP_NUM16 | DHCP_NUM8
#define DHCP_STRING (1<<10)
#define DHCP_STRLST (1<<11)
#define DHCP_IP (1<<12)
#define DHCP_IPLIST (1<<13)
#define DHCP_IPPLST (1<<14)
#define DHCP_STCRTS (1<<15)
// DHCP option codes (partial list). See RFC 2132 and
#define DHCP_OPT_PADDING 0x00
#define DHCP_OPT_HOST_NAME DHCP_STRING | 0x0c // either client informs server or server gives name to client
#define DHCP_OPT_REQUESTED_IP DHCP_IP | 0x32 // sent by client if specific IP is wanted
#define DHCP_OPT_LEASE_TIME DHCP_NUM32 | 0x33
#define DHCP_OPT_OPTION_OVERLOAD 0x34
#define DHCP_OPT_MESSAGE_TYPE DHCP_NUM8 | 0x35
#define DHCP_OPT_SERVER_ID DHCP_IP | 0x36 // by default server's IP
#define DHCP_OPT_PARAM_REQ DHCP_STRING | 0x37 // list of options client wants
#define DHCP_OPT_END 0xff
// DHCPv6 option codes (partial). See RFC 3315
#define DHCP6_OPT_CLIENTID 1
#define DHCP6_OPT_SERVERID 2
#define DHCP6_OPT_IA_NA 3
#define DHCP6_OPT_IA_ADDR 5
#define DHCP6_OPT_ORO 6
#define DHCP6_OPT_PREFERENCE 7
#define DHCP6_OPT_ELAPSED_TIME 8
#define DHCP6_OPT_RELAY_MSG 9
#define DHCP6_OPT_STATUS_CODE 13
#define DHCP6_OPT_IA_PD 25
#define DHCP6_OPT_IA_PREFIX 26
#define DHCP6_STATUS_SUCCESS 0
#define DHCP6_STATUS_NOADDRSAVAIL 2
#define DHCP6_DUID_LLT 1
#define DHCP6_DUID_EN 2
#define DHCP6_DUID_LL 3
#define DHCP6_DUID_UUID 4
GLOBALS(
char *iface;
long port;
);
struct config_keyword {
char *keyword;
int (*handler)(const char *str, void *var);
void *var;
char *def;
};
typedef struct __attribute__((packed)) dhcp_msg_s {
uint8_t op;
uint8_t htype;
uint8_t hlen;
uint8_t hops;
uint32_t xid;
uint16_t secs;
uint16_t flags;
uint32_t ciaddr;
uint32_t yiaddr;
uint32_t nsiaddr;
uint32_t ngiaddr;
uint8_t chaddr[16];
uint8_t sname[64];
uint8_t file[128];
uint32_t cookie;
uint8_t options[308];
} dhcp_msg_t;
typedef struct __attribute__((packed)) dhcp6_msg_s {
uint8_t msgtype;
uint8_t transaction_id[3];
uint8_t options[524];
} dhcp6_msg_t;
typedef struct __attribute__((packed)) dhcp_raw_s {
struct iphdr iph;
struct udphdr udph;
dhcp_msg_t dhcp;
} dhcp_raw_t;
typedef struct __attribute__((packed)) dhcp6_raw_s {
struct ip6_hdr iph;
struct udphdr udph;
dhcp6_msg_t dhcp6;
} dhcp6_raw_t;
typedef struct static_lease_s {
struct static_lease_s *next;
uint32_t nip;
int mac[6];
} static_lease;
typedef struct static_lease6_s {
struct static_lease6_s *next;
uint16_t duid_len;
uint16_t ia_type;
uint32_t iaid;
uint8_t nip6[16];
uint8_t duid[20];
} static_lease6;
typedef struct {
uint32_t expires;
uint32_t lease_nip;
uint8_t lease_mac[6];
char hostname[20];
uint8_t pad[2];
} dyn_lease;
typedef struct {
uint16_t duid_len;
uint16_t ia_type;
uint32_t expires;
uint32_t iaid;
uint8_t lease_nip6[16];
uint8_t duid[20];
} dyn_lease6;
typedef struct option_val_s {
char *key;
uint16_t code;
void *val;
size_t len;
} option_val_t;
struct __attribute__((packed)) optval_duid_llt {
uint16_t type;
uint16_t hwtype;
uint32_t time;
uint8_t lladdr[]; //flexible
};
struct __attribute__((packed)) optval_ia_na {
uint32_t iaid;
uint32_t t1, t2;
uint8_t optval[]; //flexible
};
struct __attribute__((packed)) optval_ia_addr {
uint8_t ipv6_addr[16];
uint32_t pref_lifetime;
uint32_t valid_lifetime;
};
struct __attribute__((packed)) optval_status_code {
uint16_t status_code;
uint8_t status_msg[]; //flexible
};
typedef struct __attribute__((__may_alias__)) server_config_s {
char *interface; // interface to use
int ifindex;
uint8_t server_nip6[16];
uint32_t server_nip;
uint32_t port;
uint8_t server_mac[6]; // our MAC address (used only for ARP probing)
void *options[256]; // list of DHCP options loaded from the config file
/* start,end are in host order: we need to compare start <= ip <= end*/
uint32_t start_ip; // start address of leases, in host order
uint32_t end_ip; // end of leases, in host order
uint8_t start_ip6[16]; // start address of leases, in IPv6 mode
uint8_t end_ip6[16]; // end of leases, in IPv6 mode
uint32_t max_lease_sec; // maximum lease time (host order)
uint32_t min_lease_sec; // minimum lease time a client can request
uint32_t max_leases; // maximum number of leases (including reserved addresses)
uint32_t auto_time; // how long should dhcpd wait before writing a config file.
// if this is zero, it will only write one on SIGUSR1
uint32_t decline_time; // how long an address is reserved if a client returns a
// decline message
uint32_t conflict_time; // how long an arp conflict offender is leased for
uint32_t offer_time; // how long an offered address is reserved
uint32_t siaddr_nip; // "next server" bootp option
char *lease_file;
char *lease6_file;
char *pidfile;
char *notify_file; // what to run whenever leases are written
char *sname; // bootp server name
char *boot_file; // bootp boot file option
uint32_t pref_lifetime;
uint32_t valid_lifetime;
uint32_t t1,t2;
struct static_lease *static_leases; // List of ip/mac pairs to assign static leases
} server_config_t;
typedef struct __attribute__((__may_alias__)) server_state_s {
uint8_t client_nip6[16];
uint32_t client_port;
uint8_t rqcode;
int listensock;
union {
dhcp_msg_t rcvd_pkt;
dhcp6_msg_t rcvd_pkt6;
} rcvd;
uint8_t* rqopt;
union {
dhcp_msg_t send_pkt;
dhcp6_msg_t send_pkt6;
} send;
union {
static_lease *sleases;
static_lease6 *sleases6;
} leases;
struct arg_list *dleases;
} server_state_t;
static option_val_t options_list[] = {
{"lease" , DHCP_NUM32 | 0x33, NULL, 0},
{"subnet" , DHCP_IP | 0x01, NULL, 0},
{"broadcast" , DHCP_IP | 0x1c, NULL, 0},
{"router" , DHCP_IP | 0x03, NULL, 0},
{"ipttl" , DHCP_NUM8 | 0x17, NULL, 0},
{"mtu" , DHCP_NUM16 | 0x1a, NULL, 0},
{"hostname" , DHCP_STRING | 0x0c, NULL, 0},
{"domain" , DHCP_STRING | 0x0f, NULL, 0},
{"search" , DHCP_STRLST | 0x77, NULL, 0},
{"nisdomain" , DHCP_STRING | 0x28, NULL, 0},
{"timezone" , DHCP_NUM32 | 0x02, NULL, 0},
{"tftp" , DHCP_STRING | 0x42, NULL, 0},
{"bootfile" , DHCP_STRING | 0x43, NULL, 0},
{"bootsize" , DHCP_NUM16 | 0x0d, NULL, 0},
{"rootpath" , DHCP_STRING | 0x11, NULL, 0},
{"wpad" , DHCP_STRING | 0xfc, NULL, 0},
{"serverid" , DHCP_IP | 0x36, NULL, 0},
{"message" , DHCP_STRING | 0x38, NULL, 0},
{"vlanid" , DHCP_NUM32 | 0x84, NULL, 0},
{"vlanpriority" , DHCP_NUM32 | 0x85, NULL, 0},
{"dns" , DHCP_IPLIST | 0x06, NULL, 0},
{"wins" , DHCP_IPLIST | 0x2c, NULL, 0},
{"nissrv" , DHCP_IPLIST | 0x29, NULL, 0},
{"ntpsrv" , DHCP_IPLIST | 0x2a, NULL, 0},
{"lprsrv" , DHCP_IPLIST | 0x09, NULL, 0},
{"swapsrv" , DHCP_IP | 0x10, NULL, 0},
{"routes" , DHCP_STCRTS | 0x21, NULL, 0},
{"staticroutes" , DHCP_STCRTS | 0x79, NULL, 0},
{"msstaticroutes" , DHCP_STCRTS | 0xf9, NULL, 0},
};
struct fd_pair { int rd; int wr; };
static server_config_t gconfig;
static server_state_t gstate;
static uint8_t infomode;
static struct fd_pair sigfd;
static int constone = 1;
static sa_family_t addr_version = AF_INET;
// calculate options size.
static int dhcp_opt_size(uint8_t *optionptr)
{
int i = 0;
for(;optionptr[i] != 0xff; i++)
if(optionptr[i] != 0x00) i += optionptr[i + 1] + 2 -1;
return i;
}
// calculates checksum for dhcp messeges.
static uint16_t dhcp_checksum(void *addr, int count)
{
int32_t sum = 0;
uint16_t tmp = 0, *source = (uint16_t *)addr;
while (count > 1) {
sum += *source++;
count -= 2;
}
if (count > 0) {
*(uint8_t*)&tmp = *(uint8_t*)source;
sum += tmp;
}
while (sum >> 16) sum = (sum & 0xffff) + (sum >> 16);
return ~sum;
}
// gets information of INTERFACE and updates IFINDEX, MAC and IP
static int get_interface(const char *interface, int *ifindex, void *oip,
uint8_t *mac)
{
struct ifreq req;
struct sockaddr_in *ip;
struct sockaddr_in6 ip6;
int fd = xsocket(addr_version, SOCK_RAW, IPPROTO_RAW);
char ipv6_addr[40] = {0,};
req.ifr_addr.sa_family = addr_version;
xstrncpy(req.ifr_name, (char *)interface, IFNAMSIZ);
xioctl(fd, SIOCGIFFLAGS, &req);
if (!(req.ifr_flags & IFF_UP)) return -1;
if (addr_version == AF_INET6) {
FILE *fd6 = fopen("/proc/net/if_inet6", "r");
uint8_t *oip6 = (uint8_t*)oip;
int i;
while(fgets(toybuf, sizeof(toybuf), fd6)) {
if (!strstr(toybuf, interface))
continue;
if (sscanf(toybuf, "%32s \n", ipv6_addr) == 1)
break;
}
fclose(fd6);
if (oip6) {
char *ptr = ipv6_addr+sizeof(ipv6_addr)-1;
// convert giant hex string into colon-spearated ipv6 address by
// inserting ':' every 4 characters.
for (i = 32; i; i--)
if ((*(ptr--) = ipv6_addr[i])) if (!(i&3)) *(ptr--) = ':';
dbg("ipv6 %s\n", ipv6_addr);
if(inet_pton(AF_INET6, ipv6_addr, &ip6.sin6_addr) <= 0)
error_msg("inet : the ipv6 address is not proper");
else
memcpy(oip6, ip6.sin6_addr.s6_addr32, sizeof(uint32_t)*4);
}
} else {
uint32_t *oip4 = (uint32_t*)oip;
if (oip4) {
xioctl(fd, SIOCGIFADDR, &req);
ip = (struct sockaddr_in*) &req.ifr_addr;
dbg("IP %s\n", inet_ntoa(ip->sin_addr));
*oip4 = ntohl(ip->sin_addr.s_addr);
}
}
if (ifindex) {
xioctl(fd, SIOCGIFINDEX, &req);
dbg("Adapter index %d\n", req.ifr_ifindex);
*ifindex = req.ifr_ifindex;
}
if (mac) {
xioctl(fd, SIOCGIFHWADDR, &req);
memcpy(mac, req.ifr_hwaddr.sa_data, 6);
dbg("MAC %02x:%02x:%02x:%02x:%02x:%02x\n", mac[0], mac[1], mac[2], mac[3], mac[4], mac[5]);
}
close(fd);
return 0;
}
/*
*logs messeges to syslog or console
*opening the log is still left with applet.
*FIXME: move to more relevent lib. probably libc.c
*/
static void infomsg(uint8_t infomode, char *s, ...)
{
int used;
char *msg;
va_list p, t;
if (infomode == LOG_SILENT) return;
va_start(p, s);
va_copy(t, p);
used = vsnprintf(NULL, 0, s, t);
used++;
va_end(t);
msg = xmalloc(used);
vsnprintf(msg, used, s, p);
va_end(p);
if (infomode & LOG_SYSTEM) syslog(LOG_INFO, "%s", msg);
if (infomode & LOG_CONSOLE) printf("%s\n", msg);
free(msg);
}
/*
* Writes self PID in file PATH
* FIXME: libc implementation only writes in /var/run
* this is more generic as some implemenation may provide
* arguments to write in specific file. as dhcpd does.
*/
static void write_pid(char *path)
{
int pidfile = open(path, O_CREAT | O_WRONLY | O_TRUNC, 0666);
if (pidfile > 0) {
char pidbuf[12];
sprintf(pidbuf, "%u", (unsigned)getpid());
write(pidfile, pidbuf, strlen(pidbuf));
close(pidfile);
}
}
// Generic signal handler real handling is done in main funcrion.
static void signal_handler(int sig)
{
unsigned char ch = sig;
if (write(sigfd.wr, &ch, 1) != 1) dbg("can't send signal\n");
}
// signal setup for SIGUSR1 SIGTERM
static int setup_signal()
{
if (pipe((int *)&sigfd) < 0) {
dbg("signal pipe failed\n");
return -1;
}
fcntl(sigfd.wr , F_SETFD, FD_CLOEXEC);
fcntl(sigfd.rd , F_SETFD, FD_CLOEXEC);
int flags = fcntl(sigfd.wr, F_GETFL);
fcntl(sigfd.wr, F_SETFL, flags | O_NONBLOCK);
signal(SIGUSR1, signal_handler);
signal(SIGTERM, signal_handler);
return 0;
}
// String STR to UINT32 conversion strored in VAR
static int strtou32(const char *str, void *var)
{
char *endptr = NULL;
int base = 10;
errno=0;
*((uint32_t*)(var)) = 0;
if (str[0]=='0' && (str[1]=='x' || str[1]=='X')) {
base = 16;
str+=2;
}
long ret_val = strtol(str, &endptr, base);
if (errno) infomsg(infomode, "config : Invalid num %s",str);
else if (endptr && (*endptr!='\0'||endptr == str))
infomsg(infomode, "config : Not a valid num %s",str);
else *((uint32_t*)(var)) = (uint32_t)ret_val;
return 0;
}
// copy string STR in variable VAR
static int strinvar(const char *str, void *var)
{
char **dest = var;
if (*dest) free(*dest);
*dest = strdup(str);
return 0;
}
// IP String STR to binary data.
static int striptovar(const char *str, void *var)
{
*((uint32_t*)(var)) = 0;
if(!str) {
error_msg("config : NULL address string \n");
return -1;
}
if((inet_pton(AF_INET6, str, var)<=0) && (inet_pton(AF_INET, str, var)<=0)) {
error_msg("config : wrong address %s \n", str);
return -1;
}
return 0;
}
// String to dhcp option conversion
static int strtoopt(const char *str, void *var)
{
char *option, *valstr, *grp, *tp;
uint32_t optcode = 0, inf = infomode, convtmp, mask, nip, router;
uint16_t flag = 0;
int count, size = ARRAY_LEN(options_list);
if (!*str) return 0;
if (!(option = strtok((char*)str, " \t="))) return -1;
infomode = LOG_SILENT;
strtou32(option, (uint32_t*)&optcode);
infomode = inf;
if (optcode > 0 && optcode < 256) { // raw option
for (count = 0; count < size; count++) {
if ((options_list[count].code & 0X00FF) == optcode) {
flag = (options_list[count].code & 0XFF00);
break;
}
}
} else { //string option
for (count = 0; count < size; count++) {
if (!strncmp(options_list[count].key, option, strlen(options_list[count].key))) {
flag = (options_list[count].code & 0XFF00);
optcode = (options_list[count].code & 0X00FF);
break;
}
}
}
if (count == size) {
infomsg(inf, "config : Obsolete OR Unknown Option : %s", option);
return -1;
}
if (!flag || !optcode) return -1;
if (!(valstr = strtok(NULL, " \t"))) {
dbg("config : option %s has no value defined.\n", option);
return -1;
}
dbg(" value : %-20s : ", valstr);
switch (flag) {
case DHCP_NUM32:
options_list[count].len = sizeof(uint32_t);
options_list[count].val = xmalloc(sizeof(uint32_t));
strtou32(valstr, &convtmp);
memcpy(options_list[count].val, &convtmp, sizeof(uint32_t));
break;
case DHCP_NUM16:
options_list[count].len = sizeof(uint16_t);
options_list[count].val = xmalloc(sizeof(uint16_t));
strtou32(valstr, &convtmp);
memcpy(options_list[count].val, &convtmp, sizeof(uint16_t));
break;
case DHCP_NUM8:
options_list[count].len = sizeof(uint8_t);
options_list[count].val = xmalloc(sizeof(uint8_t));
strtou32(valstr, &convtmp);
memcpy(options_list[count].val, &convtmp, sizeof(uint8_t));
break;
case DHCP_IP:
options_list[count].len = sizeof(uint32_t);
options_list[count].val = xmalloc(sizeof(uint32_t));
striptovar(valstr, options_list[count].val);
break;
case DHCP_STRING:
options_list[count].len = strlen(valstr);
options_list[count].val = strdup(valstr);
break;
case DHCP_IPLIST:
while(valstr){
options_list[count].val = xrealloc(options_list[count].val, options_list[count].len + sizeof(uint32_t));
striptovar(valstr, ((uint8_t*)options_list[count].val)+options_list[count].len);
options_list[count].len += sizeof(uint32_t);
valstr = strtok(NULL," \t");
}
break;
case DHCP_IPPLST:
break;
case DHCP_STCRTS:
/* Option binary format:
* mask [one byte, 0..32]
* ip [0..4 bytes depending on mask]
* router [4 bytes]
* may be repeated
* staticroutes 10.0.0.0/8 10.127.0.1, 10.11.12.0/24 10.11.12.1
*/
grp = strtok(valstr, ",");;
while(grp){
while(*grp == ' ' || *grp == '\t') grp++;
tp = strchr(grp, '/');
if (!tp) error_exit("wrong formated static route option");
*tp = '\0';
mask = strtol(++tp, &tp, 10);
if (striptovar(grp, (uint8_t*)&nip)<0) error_exit("wrong formated static route option");
while(*tp == ' ' || *tp == '\t' || *tp == '-') tp++;
if (striptovar(tp, (uint8_t*)&router)<0) error_exit("wrong formated static route option");
options_list[count].val = xrealloc(options_list[count].val, options_list[count].len + 1 + mask/8 + 4);
memcpy(((uint8_t*)options_list[count].val)+options_list[count].len, &mask, 1);
options_list[count].len += 1;
memcpy(((uint8_t*)options_list[count].val)+options_list[count].len, &nip, mask/8);
options_list[count].len += mask/8;
memcpy(((uint8_t*)options_list[count].val)+options_list[count].len, &router, 4);
options_list[count].len += 4;
tp = NULL;
grp = strtok(NULL, ",");
}
break;
}
return 0;
}
// Reads Static leases from STR and updates inner structures.
static int get_staticlease(const char *str, void *var)
{
struct static_lease_s *sltmp;
char *tkmac, *tkip;
int count;
if (!*str) return 0;
if (!(tkmac = strtok((char*)str, " \t"))) {
infomsg(infomode, "config : static lease : mac not found");
return 0;
}
if (!(tkip = strtok(NULL, " \t"))) {
infomsg(infomode, "config : static lease : no ip bind to mac %s", tkmac);
return 0;
}
sltmp = xzalloc(sizeof(struct static_lease_s));
for (count = 0; count < 6; count++, tkmac++) {
errno = 0;
sltmp->mac[count] = strtol(tkmac, &tkmac, 16);
if (sltmp->mac[count]>255 || sltmp->mac[count]<0 || (*tkmac && *tkmac!=':') || errno) {
infomsg(infomode, "config : static lease : mac address wrong format");
free(sltmp);
return 0;
}
}
striptovar(tkip, &sltmp->nip);
sltmp->next = gstate.leases.sleases;
gstate.leases.sleases = sltmp;
return 0;
}
static struct config_keyword keywords[] = {
// keyword handler variable address default
{"start" , striptovar , (void*)&gconfig.start_ip , "192.168.0.20"},
{"end" , striptovar , (void*)&gconfig.end_ip , "192.168.0.254"},
{"interface" , strinvar , (void*)&gconfig.interface , "eth0"},
{"port" , strtou32 , (void*)&gconfig.port , "67"},
{"min_lease" , strtou32 , (void*)&gconfig.min_lease_sec, "60"},
{"max_leases" , strtou32 , (void*)&gconfig.max_leases , "235"},
{"auto_time" , strtou32 , (void*)&gconfig.auto_time , "7200"},
{"decline_time" , strtou32 , (void*)&gconfig.decline_time , "3600"},
{"conflict_time", strtou32 , (void*)&gconfig.conflict_time, "3600"},
{"offer_time" , strtou32 , (void*)&gconfig.offer_time , "60"},
{"lease_file" , strinvar , (void*)&gconfig.lease_file , "/var/lib/misc/dhcpd.leases"}, //LEASES_FILE
{"lease6_file" , strinvar , (void*)&gconfig.lease6_file , "/var/lib/misc/dhcpd6.leases"}, //LEASES_FILE
{"pidfile" , strinvar , (void*)&gconfig.pidfile , "/var/run/dhcpd.pid"}, //DPID_FILE
{"siaddr" , striptovar , (void*)&gconfig.siaddr_nip , "0.0.0.0"},
{"option" , strtoopt , (void*)&gconfig.options , ""},
{"opt" , strtoopt , (void*)&gconfig.options , ""},
{"notify_file" , strinvar , (void*)&gconfig.notify_file , ""},
{"sname" , strinvar , (void*)&gconfig.sname , ""},
{"boot_file" , strinvar , (void*)&gconfig.boot_file , ""},
{"static_lease" , get_staticlease , (void*)&gconfig.static_leases, ""},
{"start6" , striptovar , (void*)&gconfig.start_ip6 , "2001:620:40b:555::100"},
{"end6" , striptovar , (void*)&gconfig.end_ip6 , "2001:620:40b:555::200"},
{"preferred_lifetime" , strtou32 , (void*)&gconfig.pref_lifetime, "3600"},
{"valid_lifetime" , strtou32 , (void*)&gconfig.valid_lifetime, "7200"},
{"t1" , strtou32 , (void*)&gconfig.t1 , "3600"},
{"t2" , strtou32 , (void*)&gconfig.t2 , "5400"},
};
// Parses the server config file and updates the global server config accordingly.
static int parse_server_config(char *config_file, struct config_keyword *confkey)
{
FILE *fs = NULL;
char *confline_temp = NULL,*confline = NULL, *tk = NULL, *tokens[2] = {NULL, NULL};
int len, linelen, tcount, count, size = ARRAY_LEN(keywords);
for (count = 0; count < size; count++)
if (confkey[count].handler)
confkey[count].handler(confkey[count].def, confkey[count].var);
if (!(fs = fopen(config_file, "r"))) perror_msg("%s", config_file);
for (len = 0, linelen = 0; fs;) {
len = getline(&confline_temp, (size_t*) &linelen, fs);
confline = confline_temp;
if (len <= 0) break;
for (; *confline == ' '; confline++, len--);
if ((confline[0] == '#') || (confline[0] == '\n')) goto free_conf_continue;
tk = strchr(confline, '#');
if (tk) {
for (; *(tk-1)==' ' || *(tk-1)=='\t'; tk--);
*tk = '\0';
}
tk = strchr(confline, '\n');
if (tk) {
for (; *(tk-1)==' ' || *(tk-1)=='\t'; tk--);
*tk = '\0';
}
for (tcount=0, tk=strtok(confline, " \t"); tk && (tcount < 2);
tcount++, tk=strtok(NULL,(tcount==1)?"":" \t")) {
while ((*tk == '\t') || (*tk == ' ')) tk++;
tokens[tcount] = xstrdup(tk);
}
if (tcount<=1) goto free_tk0_continue;
for (count = 0; count < size; count++) {
if (!strcmp(confkey[count].keyword,tokens[0])) {
dbg("got config : %15s : ", confkey[count].keyword);
if (confkey[count].handler(tokens[1], confkey[count].var) == 0)
dbg("%s \n", tokens[1]);
break;
}
}
if (tokens[1]) { free(tokens[1]); tokens[1] = NULL; }
free_tk0_continue:
if (tokens[0]) { free(tokens[0]); tokens[0] = NULL; }
free_conf_continue:
free(confline_temp);
confline_temp = NULL;
}
if (fs) fclose(fs);
return 0;
}
// opens UDP socket for listen ipv6 packets
static int open_listensock6(void)
{
struct sockaddr_in6 addr6;
struct ipv6_mreq mreq;
if (gstate.listensock > 0) close(gstate.listensock);
dbg("Opening listen socket on *:%d %s\n", gconfig.port, gconfig.interface);
gstate.listensock = xsocket(PF_INET6, SOCK_DGRAM, 0);
setsockopt(gstate.listensock, SOL_SOCKET, SO_REUSEADDR, &constone, sizeof(constone));
setsockopt(gstate.listensock, IPPROTO_IPV6, IPV6_CHECKSUM, &constone, sizeof(constone));
if (setsockopt(gstate.listensock, IPPROTO_IPV6, IPV6_RECVPKTINFO, &constone,
sizeof(constone)) == -1) {
error_msg("failed to receive ipv6 packets.\n");
close(gstate.listensock);
return -1;
}
setsockopt(gstate.listensock, SOL_SOCKET, SO_BINDTODEVICE, gconfig.interface, strlen(gconfig.interface)+1);
memset(&addr6, 0, sizeof(addr6));
addr6.sin6_family = AF_INET6;
addr6.sin6_port = htons(gconfig.port); //SERVER_PORT
addr6.sin6_scope_id = if_nametoindex(gconfig.interface);
//Listening for multicast packet
inet_pton(AF_INET6, "ff02::1:2", &addr6.sin6_addr);
if (bind(gstate.listensock, (struct sockaddr *) &addr6, sizeof(addr6)) == -1) {
close(gstate.listensock);
perror_exit("bind failed");
}
memset(&mreq, 0, sizeof(mreq));
mreq.ipv6mr_interface = if_nametoindex(gconfig.interface);
memcpy(&mreq.ipv6mr_multiaddr, &addr6.sin6_addr, sizeof(addr6.sin6_addr));
if(setsockopt(gstate.listensock, IPPROTO_IPV6, IPV6_JOIN_GROUP, &mreq, sizeof(mreq)) == -1) {
error_msg("failed to join a multicast group.\n");
close(gstate.listensock);
return -1;
}
dbg("OPEN : success\n");
return 0;
}
// opens UDP socket for listen
static int open_listensock(void)
{
struct sockaddr_in addr;
struct ifreq ifr;
if (gstate.listensock > 0) close(gstate.listensock);
dbg("Opening listen socket on *:%d %s\n", gconfig.port, gconfig.interface);
gstate.listensock = xsocket(PF_INET, SOCK_DGRAM, IPPROTO_UDP);
setsockopt(gstate.listensock, SOL_SOCKET, SO_REUSEADDR, &constone, sizeof(constone));
if (setsockopt(gstate.listensock, SOL_SOCKET, SO_BROADCAST, &constone, sizeof(constone)) == -1) {
error_msg("failed to receive brodcast packets.\n");
close(gstate.listensock);
return -1;
}
memset(&ifr, 0, sizeof(ifr));
xstrncpy(ifr.ifr_name, gconfig.interface, IFNAMSIZ);
setsockopt(gstate.listensock, SOL_SOCKET, SO_BINDTODEVICE, &ifr, sizeof(ifr));
memset(&addr, 0, sizeof(addr));
addr.sin_family = AF_INET;
addr.sin_port = htons(gconfig.port); //SERVER_PORT
addr.sin_addr.s_addr = INADDR_ANY ;
if (bind(gstate.listensock, (struct sockaddr *) &addr, sizeof(addr))) {
close(gstate.listensock);
perror_exit("bind failed");
}
dbg("OPEN : success\n");
return 0;
}
static int send_packet6(uint8_t relay, uint8_t *client_lla, uint16_t optlen)
{
struct sockaddr_ll dest_sll;
dhcp6_raw_t packet;
unsigned padding;
int fd, result = -1;
memset(&packet, 0, sizeof(dhcp6_raw_t));
memcpy(&packet.dhcp6, &gstate.send.send_pkt6, sizeof(dhcp6_msg_t));
padding = sizeof(packet.dhcp6.options) - optlen;
if ((fd = socket(PF_PACKET, SOCK_DGRAM, htons(ETH_P_IPV6))) < 0) {
dbg("SEND : ipv6 socket failed\n");
return -1;
}
memset(&dest_sll, 0, sizeof(dest_sll));
dest_sll.sll_family = AF_PACKET;
dest_sll.sll_protocol = htons(ETH_P_IPV6);
dest_sll.sll_ifindex = gconfig.ifindex;
dest_sll.sll_halen = ETH_ALEN;
memcpy(dest_sll.sll_addr, client_lla, sizeof(uint8_t)*6);
if (bind(fd, (struct sockaddr *) &dest_sll, sizeof(dest_sll)) < 0) {
dbg("SEND : bind failed\n");
close(fd);
return -1;
}
memcpy(&packet.iph.ip6_src, &gconfig.server_nip6, sizeof(uint32_t)*4);
memcpy(&packet.iph.ip6_dst, &gstate.client_nip6, sizeof(uint32_t)*4);
packet.udph.source = htons(gconfig.port); //SERVER_PORT
packet.udph.dest = gstate.client_port; //CLIENT_PORT
packet.udph.len = htons(sizeof(dhcp6_raw_t) - sizeof(struct ip6_hdr) - padding);
packet.iph.ip6_ctlun.ip6_un1.ip6_un1_plen = htons(ntohs(packet.udph.len) + 0x11);
packet.udph.check = dhcp_checksum(&packet, sizeof(dhcp6_raw_t) - padding);
packet.iph.ip6_ctlun.ip6_un1.ip6_un1_flow = htonl(0x60000000);
packet.iph.ip6_ctlun.ip6_un1.ip6_un1_plen = packet.udph.len;
packet.iph.ip6_ctlun.ip6_un1.ip6_un1_nxt = IPPROTO_UDP;
packet.iph.ip6_ctlun.ip6_un1.ip6_un1_hlim = 0x64;
result = sendto(fd, &packet, sizeof(dhcp6_raw_t)-padding,
0, (struct sockaddr *) &dest_sll, sizeof(dest_sll));
dbg("sendto %d\n", result);
close(fd);
if (result < 0) dbg("PACKET send error\n");
return result;
}
// Sends data through raw socket.
static int send_packet(uint8_t broadcast)
{
struct sockaddr_ll dest_sll;
dhcp_raw_t packet;
unsigned padding;
int fd, result = -1;
uint8_t bmacaddr[6] = {0xff, 0xff, 0xff, 0xff, 0xff, 0xff};
memset(&packet, 0, sizeof(dhcp_raw_t));
memcpy(&packet.dhcp, &gstate.send.send_pkt, sizeof(dhcp_msg_t));
if ((fd = socket(PF_PACKET, SOCK_DGRAM, htons(ETH_P_IP))) < 0) {
dbg("SEND : socket failed\n");
return -1;
}
memset(&dest_sll, 0, sizeof(dest_sll));
dest_sll.sll_family = AF_PACKET;
dest_sll.sll_protocol = htons(ETH_P_IP);
dest_sll.sll_ifindex = gconfig.ifindex;
dest_sll.sll_halen = 6;
memcpy(dest_sll.sll_addr, (broadcast)?bmacaddr:gstate.rcvd.rcvd_pkt.chaddr , 6);
if (bind(fd, (struct sockaddr *) &dest_sll, sizeof(dest_sll)) < 0) {
dbg("SEND : bind failed\n");
close(fd);
return -1;
}
padding = 308 - 1 - dhcp_opt_size(gstate.send.send_pkt.options);
packet.iph.protocol = IPPROTO_UDP;
packet.iph.saddr = gconfig.server_nip;
packet.iph.daddr = (broadcast || (gstate.rcvd.rcvd_pkt.ciaddr == 0))?
INADDR_BROADCAST : gstate.rcvd.rcvd_pkt.ciaddr;
packet.udph.source = htons(gconfig.port);//SERVER_PORT
packet.udph.dest = gstate.client_port; //CLIENT_PORT
packet.udph.len = htons(sizeof(dhcp_raw_t) - sizeof(struct iphdr) - padding);
packet.iph.tot_len = packet.udph.len;
packet.udph.check = dhcp_checksum(&packet, sizeof(dhcp_raw_t) - padding);
packet.iph.tot_len = htons(sizeof(dhcp_raw_t) - padding);
packet.iph.ihl = sizeof(packet.iph) >> 2;
packet.iph.version = IPVERSION;
packet.iph.ttl = IPDEFTTL;
packet.iph.check = dhcp_checksum(&packet.iph, sizeof(packet.iph));
result = sendto(fd, &packet, sizeof(dhcp_raw_t) - padding, 0,
(struct sockaddr *) &dest_sll, sizeof(dest_sll));
dbg("sendto %d\n", result);
close(fd);
if (result < 0) dbg("PACKET send error\n");
return result;
}
static int read_packet6(void)
{
int ret;
struct sockaddr_in6 c_addr;
socklen_t c_addr_size = sizeof(c_addr);
memset(&gstate.rcvd.rcvd_pkt6, 0, sizeof(dhcp6_msg_t));
ret = recvfrom(gstate.listensock, &gstate.rcvd.rcvd_pkt6, sizeof(dhcp6_msg_t),
0, (struct sockaddr*) &c_addr, &c_addr_size);
memcpy(gstate.client_nip6, &c_addr.sin6_addr, sizeof(uint32_t)*4);
memcpy(&gstate.client_port, &c_addr.sin6_port, sizeof(uint32_t));
if (ret < 0) {
dbg("Packet read error, ignoring. \n");
return ret; // returns -1
}
if (gstate.rcvd.rcvd_pkt6.msgtype < 1) {
dbg("Bad message type, igroning. \n");
return -2;
}
dbg("Received an ipv6 packet. Size : %d \n", ret);
return ret;
}
// Reads from UDP socket
static int read_packet(void)
{
int ret;
struct sockaddr_in c_addr;
socklen_t c_addr_size = sizeof(c_addr);
memset(&gstate.rcvd.rcvd_pkt, 0, sizeof(dhcp_msg_t));
ret = recvfrom(gstate.listensock, &gstate.rcvd.rcvd_pkt, sizeof(dhcp_msg_t),
0, (struct sockaddr*) &c_addr, &c_addr_size);
memcpy(&gstate.client_port, &c_addr.sin_port, sizeof(uint32_t));
/*ret = read(gstate.listensock, &gstate.rcvd.rcvd_pkt, sizeof(dhcp_msg_t));*/
if (ret < 0) {
dbg("Packet read error, ignoring. \n");
return ret; // returns -1
}
if (gstate.rcvd.rcvd_pkt.cookie != htonl(DHCP_MAGIC)) {
dbg("Packet with bad magic, ignoring. \n");
return -2;
}
if (gstate.rcvd.rcvd_pkt.op != 1) { //BOOTPREQUEST
dbg("Not a BOOT REQUEST ignoring. \n");
return -2;
}
if (gstate.rcvd.rcvd_pkt.hlen != 6) {
dbg("hlen != 6 ignoring. \n");
return -2;
}
dbg("Received a packet. Size : %d \n", ret);
return ret;
}
// Preapres a dhcp packet with defaults and configs
static uint8_t* prepare_send_pkt(void)
{
memset((void*)&gstate.send.send_pkt, 0, sizeof(gstate.send.send_pkt));
gstate.send.send_pkt.op = 2; //BOOTPREPLY
gstate.send.send_pkt.htype = 1;
gstate.send.send_pkt.hlen = 6;
gstate.send.send_pkt.xid = gstate.rcvd.rcvd_pkt.xid;
gstate.send.send_pkt.cookie = htonl(DHCP_MAGIC);
gstate.send.send_pkt.nsiaddr = gconfig.server_nip;
memcpy(gstate.send.send_pkt.chaddr, gstate.rcvd.rcvd_pkt.chaddr, 16);
gstate.send.send_pkt.options[0] = DHCP_OPT_END;
return gstate.send.send_pkt.options;
}
static uint8_t* prepare_send_pkt6(uint16_t opt)
{
memset((void*)&gstate.send.send_pkt6, 0, sizeof(gstate.send.send_pkt6));
gstate.send.send_pkt6.msgtype = opt;
memcpy(gstate.send.send_pkt6.transaction_id, gstate.rcvd.rcvd_pkt6.transaction_id, 3);
return gstate.send.send_pkt6.options;
}
// Sets a option value in dhcp packet's option field
static uint8_t* set_optval(uint8_t *optptr, uint16_t opt, void *var, size_t len)
{
while (*optptr != DHCP_OPT_END) optptr++;
*optptr++ = (uint8_t)(opt & 0x00FF);
*optptr++ = (uint8_t) len;
memcpy(optptr, var, len);
optptr += len;
*optptr = DHCP_OPT_END;
return optptr;
}
static uint8_t* set_optval6(uint8_t *optptr, uint16_t opt, void *var, size_t len)
{
*((uint16_t*)optptr) = htons(opt);
*(uint16_t*)(optptr+2) = htons(len);
memcpy(optptr+4, var, len);
optptr += len+4;
return optptr;
}
// Gets a option value from dhcp packet's option field
static uint8_t* get_optval(uint8_t *optptr, uint16_t opt, void *var)
{
size_t len;
uint8_t overloaded = 0;
while (1) {
while (*optptr == DHCP_OPT_PADDING) optptr++;
if ((*optptr & 0x00FF) == DHCP_OPT_END) break;
if ((*optptr & 0x00FF) == DHCP_OPT_OPTION_OVERLOAD) {
overloaded = optptr[2];
optptr += optptr[1] + 2;
}
len = optptr[1];
if (*optptr == (opt & 0x00FF))
switch (opt & 0xFF00) {
case DHCP_NUM32: // FALLTHROUGH
case DHCP_IP:
memcpy(var, optptr+2, sizeof(uint32_t));
optptr += len + 2;
return optptr;
break;
case DHCP_NUM16:
memcpy(var, optptr+2, sizeof(uint16_t));
optptr += len + 2;
return optptr;
break;
case DHCP_NUM8:
memcpy(var, optptr+2, sizeof(uint8_t));
optptr += len + 2;
return optptr;
break;
case DHCP_STRING:
var = xstrndup((char*) optptr, len);
optptr += len + 2;
return optptr;
break;
}
optptr += len + 2;
}
if ((overloaded == 1) | (overloaded == 3)) get_optval((uint8_t*)&gstate.rcvd.rcvd_pkt.file, opt, var);
if ((overloaded == 2) | (overloaded == 3)) get_optval((uint8_t*)&gstate.rcvd.rcvd_pkt.sname, opt, var);
return optptr;
}
static uint8_t* get_optval6(uint8_t *optptr, uint16_t opt, uint16_t *datalen, void **var)
{
uint16_t optcode;
uint16_t len;
memcpy(&optcode, optptr, sizeof(uint16_t));
memcpy(&len, optptr+2, sizeof(uint16_t));
if(!optcode) {
dbg("Option %d is not exist.\n", opt);
return optptr;
}
optcode = ntohs(optcode);
len = ntohs(len);
if (opt == optcode) {
*var = xmalloc(len);
memcpy(*var, optptr+4, len);
optptr = optptr + len + 4;
memcpy(datalen, &len, sizeof(uint16_t));
}
else {
optptr = get_optval6(optptr+len+4, opt, datalen, var);
}
return optptr;
}
// Retrives Requested Parameter list from dhcp req packet.
static uint8_t get_reqparam(uint8_t **list)
{
uint8_t len, *optptr;
if(*list) free(*list);
for (optptr = gstate.rcvd.rcvd_pkt.options;
*optptr && *optptr!=((DHCP_OPT_PARAM_REQ) & 0x00FF); optptr+=optptr[1]+2);
len = *++optptr;
*list = xzalloc(len+1);
memcpy(*list, ++optptr, len);
return len;
}
// Sets values of req param in dhcp offer packet.
static uint8_t* set_reqparam(uint8_t *optptr, uint8_t *list)
{
uint8_t reqcode;
int count, size = ARRAY_LEN(options_list);
while (*list) {
reqcode = *list++;
for (count = 0; count < size; count++) {
if ((options_list[count].code & 0X00FF)==reqcode) {
if (!(options_list[count].len) || !(options_list[count].val)) break;
for (; *optptr && *optptr!=DHCP_OPT_END; optptr+=optptr[1]+2);
*optptr++ = (uint8_t) (options_list[count].code & 0x00FF);
*optptr++ = (uint8_t) options_list[count].len;
memcpy(optptr, options_list[count].val, options_list[count].len);
optptr += options_list[count].len;
*optptr = DHCP_OPT_END;
break;
}
}
}
return optptr;
}
static void run_notify(char **argv)
{
struct stat sts;
volatile int error = 0;
pid_t pid;
if (stat(argv[0], &sts) == -1 && errno == ENOENT) {
infomsg(infomode, "notify file: %s : not exist.", argv[0]);
return;
}
fflush(NULL);
pid = vfork();
if (pid < 0) {
dbg("Fork failed.\n");
return;
}
if (!pid) {
execvp(argv[0], argv);
error = errno;
_exit(111);
}
if (error) {
waitpid(pid, NULL, 0);
errno = error;
}
dbg("script complete.\n");
}
static void write_leasefile(void)
{
int fd;
uint32_t curr, tmp_time;
int64_t timestamp;
struct arg_list *listdls = gstate.dleases;
dyn_lease *dls;
if ((fd = open(gconfig.lease_file, O_WRONLY | O_CREAT | O_TRUNC, 0600)) < 0) {
perror_msg("can't open %s ", gconfig.lease_file);
} else {
curr = timestamp = time(NULL);
timestamp = SWAP_BE64(timestamp);
writeall(fd, ×tamp, sizeof(timestamp));
while (listdls) {
dls = (dyn_lease*)listdls->arg;
tmp_time = dls->expires;
dls->expires -= curr;
if ((int32_t) dls->expires < 0) goto skip;
dls->expires = htonl(dls->expires);
writeall(fd, dls, sizeof(dyn_lease));
skip:
dls->expires = tmp_time;
listdls = listdls->next;
}
close(fd);
if (gconfig.notify_file) {
char *argv[3];
argv[0] = gconfig.notify_file;
argv[1] = gconfig.lease_file;
argv[2] = NULL;
run_notify(argv);
}
}
}
static void write_lease6file(void)
{
int fd;
uint32_t curr, tmp_time;
int64_t timestamp;
struct arg_list *listdls = gstate.dleases;
dyn_lease6 *dls6;
if ((fd = open(gconfig.lease6_file, O_WRONLY | O_CREAT | O_TRUNC, 0600)) < 0) {
perror_msg("can't open %s ", gconfig.lease6_file);
} else {
curr = timestamp = time(NULL);
timestamp = SWAP_BE64(timestamp);
writeall(fd, ×tamp, sizeof(timestamp));
while (listdls) {
dls6 = (dyn_lease6*)listdls->arg;
tmp_time = dls6->expires;
dls6->expires -= curr;
if ((int32_t) dls6->expires < 0) goto skip;
dls6->expires = htonl(dls6->expires);
writeall(fd, dls6, sizeof(dyn_lease6));
skip:
dls6->expires = tmp_time;
listdls = listdls->next;
}
close(fd);
if (gconfig.notify_file) {
char *argv[3];
argv[0] = gconfig.notify_file;
argv[1] = gconfig.lease6_file;
argv[2] = NULL;
run_notify(argv);
}
}
}
// Update max lease time from options.
static void set_maxlease(void)
{
int count, size = ARRAY_LEN(options_list);
for (count = 0; count < size; count++)
if (options_list[count].val && options_list[count].code == (DHCP_OPT_LEASE_TIME)) {
gconfig.max_lease_sec = *((uint32_t*)options_list[count].val);
break;
}
if (!gconfig.max_lease_sec) gconfig.max_lease_sec = (60*60*24*10);// DEFAULT_LEASE_TIME;
}
// Returns lease time for client.
static uint32_t get_lease(uint32_t req_exp)
{
uint32_t now = time(NULL);
req_exp = req_exp - now;
if(addr_version == AF_INET6) {
if ((req_exp <= 0) || req_exp > gconfig.pref_lifetime ||
req_exp > gconfig.valid_lifetime) {
if ((gconfig.pref_lifetime > gconfig.valid_lifetime)) {
error_msg("The valid lifetime must be greater than the preferred lifetime, \
setting to valid lifetime", gconfig.valid_lifetime);
return gconfig.valid_lifetime;
}
return gconfig.pref_lifetime;
}
} else {
if ((req_exp <= 0) || (req_exp > gconfig.max_lease_sec))
return gconfig.max_lease_sec;
if (req_exp < gconfig.min_lease_sec)
return gconfig.min_lease_sec;
}
return req_exp;
}
static int verifyip6_in_lease(uint8_t *nip6, uint8_t *duid, uint16_t ia_type, uint32_t iaid)
{
static_lease6 *sls6;
struct arg_list *listdls;
for (listdls = gstate.dleases; listdls; listdls = listdls->next) {
if (!memcmp(((dyn_lease6*) listdls->arg)->lease_nip6, nip6, sizeof(uint32_t)*4))
return -1;
if (!memcmp(((dyn_lease6*) listdls->arg)->duid, duid, ((dyn_lease6*) listdls->arg)->duid_len)
&& ((dyn_lease6*) listdls->arg)->ia_type == ia_type)
return -1;
}
for (sls6 = gstate.leases.sleases6; sls6; sls6 = sls6->next)
if (memcmp(sls6->nip6, nip6, sizeof(uint32_t)*4)==0) return -2;
if (memcmp(nip6, gconfig.start_ip6, sizeof(uint32_t)*4) < 0 ||
memcmp(nip6, gconfig.end_ip6, sizeof(uint32_t)*4) > 0)
return -3;
return 0;
}
// Verify ip NIP in current leases ( assigned or not)
static int verifyip_in_lease(uint32_t nip, uint8_t mac[6])
{
static_lease *sls;
struct arg_list *listdls;
for (listdls = gstate.dleases; listdls; listdls = listdls->next) {
if (((dyn_lease*) listdls->arg)->lease_nip == nip) {
if (((int32_t)(((dyn_lease*) listdls->arg)->expires) - time(NULL)) < 0)
return 0;
return -1;
}
if (!memcmp(((dyn_lease*) listdls->arg)->lease_mac, mac, 6)) return -1;
}
for (sls = gstate.leases.sleases; sls; sls = sls->next)
if (sls->nip == nip) return -2;
if ((ntohl(nip) < gconfig.start_ip) || (ntohl(nip) > gconfig.end_ip))
return -3;
return 0;
}
// add ip assigned_nip to dynamic lease.
static int addip_to_lease(uint32_t assigned_nip, uint8_t mac[6], uint32_t *req_exp, char *hostname, uint8_t update)
{
dyn_lease *dls;
struct arg_list *listdls = gstate.dleases;
uint32_t now = time(NULL);
while (listdls) {
if (!memcmp(((dyn_lease*) listdls->arg)->lease_mac, mac, 6)) {
if (update) *req_exp = get_lease(*req_exp + ((dyn_lease*) listdls->arg)->expires);
((dyn_lease*) listdls->arg)->expires = *req_exp + now;
return 0;
}
listdls = listdls->next;
}
dls = xzalloc(sizeof(dyn_lease));
memcpy(dls->lease_mac, mac, 6);
dls->lease_nip = assigned_nip;
if (hostname) memcpy(dls->hostname, hostname, 20);
if (update) *req_exp = get_lease(*req_exp + now);
dls->expires = *req_exp + now;
listdls = xzalloc(sizeof(struct arg_list));
listdls->next = gstate.dleases;
listdls->arg = (char*)dls;
gstate.dleases = listdls;
return 0;
}
static int addip6_to_lease(uint8_t *assigned_nip, uint8_t *duid, uint16_t duid_len, uint16_t ia_type, uint32_t iaid, uint32_t *lifetime, uint8_t update)
{
dyn_lease6 *dls6;
struct arg_list *listdls = gstate.dleases;
uint32_t now = time(NULL);
while (listdls) {
if (!memcmp(((dyn_lease6*) listdls->arg)->duid, duid, ((dyn_lease6*) listdls->arg)->duid_len)) {
if (update) *lifetime = get_lease(*lifetime + ((dyn_lease6*) listdls->arg)->expires);
((dyn_lease6*) listdls->arg)->expires = *lifetime + now;
return 0;
}
listdls = listdls->next;
}
dls6 = xzalloc(sizeof(dyn_lease6));
dls6->duid_len = duid_len;
memcpy(dls6->duid, duid, duid_len);
dls6->ia_type = ia_type;
dls6->iaid = iaid;
memcpy(dls6->lease_nip6, assigned_nip, sizeof(uint32_t)*4);
if (update) *lifetime = get_lease(*lifetime + now);
dls6->expires = *lifetime + now;
listdls = xzalloc(sizeof(struct arg_list));
listdls->next = gstate.dleases;
listdls->arg = (char*)dls6;
gstate.dleases = listdls;
return 0;
}
// delete ip assigned_nip from dynamic lease.
static int delip_from_lease(uint32_t assigned_nip, uint8_t mac[6], uint32_t del_time)
{
struct arg_list *listdls = gstate.dleases;
while (listdls) {
if (!memcmp(((dyn_lease*) listdls->arg)->lease_mac, mac, 6)) {
((dyn_lease*) listdls->arg)->expires = del_time + time(NULL);
return 0;
}
listdls = listdls->next;
}
return -1;
}
// returns a IP from static, dynamic leases or free ip pool, 0 otherwise.
static uint32_t getip_from_pool(uint32_t req_nip, uint8_t mac[6], uint32_t *req_exp, char *hostname)
{
uint32_t nip = 0;
static_lease *sls = gstate.leases.sleases;
struct arg_list *listdls = gstate.dleases, *tmp = NULL;
if (req_nip && (!verifyip_in_lease(req_nip, mac))) nip = req_nip;
if (!nip) {
while (listdls) {
if (!memcmp(((dyn_lease*)listdls->arg)->lease_mac, mac, 6)) {
nip = ((dyn_lease*)listdls->arg)->lease_nip;
if (tmp) tmp->next = listdls->next;
else gstate.dleases = listdls->next;
free(listdls->arg);
free(listdls);
if (verifyip_in_lease(nip, mac) < 0) nip = 0;
break;
}
tmp = listdls;
listdls = listdls->next;
}
}
if (!nip) {
while (sls) {
if (memcmp(sls->mac, mac, 6) == 0) {
nip = sls->nip;
break;
}
sls = sls->next;
}
}
if (!nip) {
for (nip = htonl(gconfig.start_ip); ntohl(nip) <= gconfig.end_ip; ) {
if (!verifyip_in_lease(nip, mac)) break;
nip = ntohl(nip);
nip = htonl(++nip);
}
if (ntohl(nip) > gconfig.end_ip) {
nip = 0;
infomsg(infomode, "can't find free IP in IP Pool.");
}
}
if (nip) addip_to_lease(nip, mac, req_exp, hostname, 1);
return nip;
}
static uint8_t *getip6_from_pool(uint8_t *duid, uint16_t duid_len, uint16_t ia_type, uint32_t iaid, uint32_t *lifetime)
{
static uint8_t nip6[16] = {0, };
static_lease6 *sls6 = gstate.leases.sleases6;
struct arg_list *listdls6 = gstate.dleases, *tmp = NULL;
while(listdls6) {
if (!memcmp(((dyn_lease6*)listdls6->arg)->duid, duid, duid_len)) {
memcpy(nip6, ((dyn_lease6*)listdls6->arg)->lease_nip6, sizeof(nip6));
if(tmp) tmp->next = listdls6->next;
else gstate.dleases = listdls6->next;
free(listdls6->arg);
free(listdls6);
if(verifyip6_in_lease(nip6, duid, ia_type, iaid) < 0)
memset(nip6, 0, sizeof(nip6));
break;
}
tmp = listdls6;
listdls6 = listdls6->next;
}
if(!memcmp(nip6, (uint8_t[16]){0}, sizeof(uint32_t)*4)) {
while(sls6) {
if(!memcmp(sls6->duid, duid, 6)) {
memcpy(nip6, sls6->nip6, sizeof(nip6));
break;
}
sls6 = sls6->next;
}
}
if(!memcmp(nip6, (uint8_t[16]){0}, sizeof(uint32_t)*4)) {
memcpy(nip6, gconfig.start_ip6, sizeof(nip6));
while(memcmp(nip6, gconfig.end_ip6, sizeof(nip6)) < 0) {
if(!verifyip6_in_lease(nip6, duid, ia_type, iaid)) break;
int i=sizeof(nip6);
while(i--) {
++nip6[i];
if (!nip6[i]) {
if(i==(sizeof(nip6)-1)) ++nip6[i];
++nip6[i-1];
} else
break;
}
}
if (memcmp(nip6, gconfig.end_ip6, sizeof(nip6)) > 0) {
memset(nip6, 0, sizeof(nip6));
infomsg(infomode, "can't find free IP in IPv6 Pool.");
}
}
if(memcmp(nip6, (uint8_t[16]){0}, sizeof(uint32_t)*4)) {
addip6_to_lease(nip6, duid, duid_len, ia_type, iaid, lifetime, 1);
infomsg(infomode, "Assigned IPv6 %02X%02X:%02X%02X:%02X%02X:%02X%02X:%02X%02X:%02X%02X:%02X%02X:%02X%02X",
nip6[0], nip6[1], nip6[2], nip6[3], nip6[4], nip6[5], nip6[6], nip6[7], nip6[8],
nip6[9], nip6[10], nip6[11], nip6[12], nip6[13], nip6[14], nip6[15]);
}
return nip6;
}
static void read_leasefile(void)
{
uint32_t passed, ip;
int32_t tmp_time;
int64_t timestamp;
dyn_lease *dls;
int fd = open(gconfig.lease_file, O_RDONLY);
dls = xzalloc(sizeof(dyn_lease));
if (read(fd, ×tamp, sizeof(timestamp)) != sizeof(timestamp))
goto lease_error_exit;
timestamp = SWAP_BE64(timestamp);
passed = time(NULL) - timestamp;
if ((uint64_t)passed > 12 * 60 * 60) goto lease_error_exit;
while (read(fd, dls, sizeof(dyn_lease)) == sizeof(dyn_lease)) {
ip = ntohl(dls->lease_nip);
if (ip >= gconfig.start_ip && ip <= gconfig.end_ip) {
tmp_time = ntohl(dls->expires) - passed;
if (tmp_time < 0) continue;
addip_to_lease(dls->lease_nip, dls->lease_mac,
(uint32_t*)&tmp_time, dls->hostname, 0);
}
}
lease_error_exit:
free(dls);
close(fd);
}
static void read_lease6file(void)
{
uint32_t passed;
uint32_t tmp_time;
int64_t timestamp;
dyn_lease6 *dls6;
int fd = open(gconfig.lease6_file, O_RDONLY);
dls6 = xzalloc(sizeof(dyn_lease6));
if (read(fd, ×tamp, sizeof(timestamp)) != sizeof(timestamp))
goto lease6_error_exit;
timestamp = SWAP_BE64(timestamp);
passed = time(NULL) - timestamp;
if ((uint64_t)passed > 12 * 60 * 60) goto lease6_error_exit;
while (read(fd, dls6, sizeof(dyn_lease6)) == sizeof(dyn_lease6)) {
if (memcmp(dls6->lease_nip6, gconfig.start_ip6, sizeof(uint32_t)*4) > 0 &&
memcmp(dls6->lease_nip6, gconfig.end_ip6, sizeof(uint32_t)*4) < 0) {
tmp_time = ntohl(dls6->expires) - passed;
if (tmp_time < 0U) continue;
addip6_to_lease(dls6->lease_nip6, dls6->duid, dls6->duid_len, dls6->ia_type, dls6->iaid,
(uint32_t*)&tmp_time, 0);
}
}
lease6_error_exit:
free(dls6);
close(fd);
}
void dhcpd_main(void)
{
struct timeval tv;
int retval, i;
uint8_t *optptr, msgtype = 0;
uint16_t optlen = 0;
uint32_t waited = 0, serverid = 0, requested_nip = 0;
uint8_t transactionid[3] = {0,};
uint32_t reqested_lease = 0, ip_pool_size = 0;
char *hstname = NULL;
fd_set rfds;
infomode = LOG_CONSOLE;
if (!(toys.optflags & FLAG_f)) {
daemon(0,0);
infomode = LOG_SILENT;
}
if (toys.optflags & FLAG_S) {
openlog("UDHCPD :", LOG_PID, LOG_DAEMON);
infomode |= LOG_SYSTEM;
}
setlinebuf(stdout);
//DHCPD_CONF_FILE
parse_server_config((toys.optc==1)?toys.optargs[0]:"/etc/dhcpd.conf", keywords);
infomsg(infomode, "toybox dhcpd started");
if (toys.optflags & FLAG_6){
addr_version = AF_INET6;
gconfig.t1 = ntohl(gconfig.t1);
gconfig.t2 = ntohl(gconfig.t2);
gconfig.pref_lifetime = ntohl(gconfig.pref_lifetime);
gconfig.valid_lifetime = ntohl(gconfig.valid_lifetime);
gconfig.port = 547;
for(i=0;i<4;i++)
ip_pool_size += (gconfig.end_ip6[i]-gconfig.start_ip6[i])<<((3-i)*8);
} else {
gconfig.start_ip = ntohl(gconfig.start_ip);
gconfig.end_ip = ntohl(gconfig.end_ip);
ip_pool_size = gconfig.end_ip - gconfig.start_ip + 1;
}
if (gconfig.max_leases > ip_pool_size) {
error_msg("max_leases=%u is too big, setting to %u",
(unsigned) gconfig.max_leases, ip_pool_size);
gconfig.max_leases = ip_pool_size;
}
write_pid(gconfig.pidfile);
set_maxlease();
if(TT.iface) gconfig.interface = TT.iface;
if(TT.port) gconfig.port = TT.port;
(addr_version==AF_INET6) ? read_lease6file() : read_leasefile();
if (get_interface(gconfig.interface, &gconfig.ifindex,
(addr_version==AF_INET6)? (void*)gconfig.server_nip6 :
(void*)&gconfig.server_nip, gconfig.server_mac) < 0)
perror_exit("Failed to get interface %s", gconfig.interface);
setup_signal();
if (addr_version==AF_INET6) {
open_listensock6();
} else {
gconfig.server_nip = htonl(gconfig.server_nip);
open_listensock();
}
fcntl(gstate.listensock, F_SETFD, FD_CLOEXEC);
for (;;) {
uint32_t timestmp = time(NULL);
FD_ZERO(&rfds);
FD_SET(gstate.listensock, &rfds);
FD_SET(sigfd.rd, &rfds);
tv.tv_sec = gconfig.auto_time - waited;
tv.tv_usec = 0;
retval = 0;
serverid = 0;
msgtype = 0;
int maxfd = (sigfd.rd > gstate.listensock)? sigfd.rd : gstate.listensock;
dbg("select waiting ....\n");
retval = select(maxfd + 1, &rfds, NULL, NULL, (gconfig.auto_time?&tv:NULL));
if (retval < 0) {
if (errno == EINTR) {
waited += (unsigned) time(NULL) - timestmp;
continue;
}
dbg("Error in select wait again...\n");
continue;
}
if (!retval) { // Timed out
dbg("select wait Timed Out...\n");
waited = 0;
(addr_version == AF_INET6)? write_lease6file() : write_leasefile();
if (get_interface(gconfig.interface, &gconfig.ifindex,
(addr_version==AF_INET6)? (void*)gconfig.server_nip6 :
(void*)&gconfig.server_nip, gconfig.server_mac)<0)
perror_exit("Failed to get interface %s", gconfig.interface);
if(addr_version != AF_INET6) {
gconfig.server_nip = htonl(gconfig.server_nip);
}
continue;
}
if (FD_ISSET(sigfd.rd, &rfds)) { // Some Activity on RDFDs : is signal
unsigned char sig;
if (read(sigfd.rd, &sig, 1) != 1) {
dbg("signal read failed.\n");
continue;
}
switch (sig) {
case SIGUSR1:
infomsg(infomode, "Received SIGUSR1");
(addr_version==AF_INET6)? write_lease6file() : write_leasefile();
continue;
case SIGTERM:
infomsg(infomode, "received sigterm");
(addr_version==AF_INET6)? write_lease6file() : write_leasefile();
unlink(gconfig.pidfile);
exit(0);
break;
default: break;
}
}
if (FD_ISSET(gstate.listensock, &rfds)) { // Some Activity on RDFDs : is socket
dbg("select listen sock read\n");
if(addr_version==AF_INET6) {
void *client_duid, *server_duid, *client_ia_na, *server_ia_na,
*client_ia_pd;
uint8_t client_lla[6] = {0,};
uint16_t client_duid_len = 0, server_duid_len = 0, server_ia_na_len = 0,
client_ia_na_len = 0, client_ia_pd_len = 0;
if(read_packet6() < 0) {
open_listensock6();
continue;
}
waited += time(NULL) - timestmp;
memcpy(&gstate.rqcode, &gstate.rcvd.rcvd_pkt6.msgtype, sizeof(uint8_t));
memcpy(&transactionid, &gstate.rcvd.rcvd_pkt6.transaction_id,
sizeof(transactionid));
if (!gstate.rqcode || gstate.rqcode < DHCP6SOLICIT ||
gstate.rqcode > DHCP6RELAYREPLY) {
dbg("no or bad message type option, ignoring packet.\n");
continue;
}
if (!gstate.rcvd.rcvd_pkt6.transaction_id ||
memcmp(gstate.rcvd.rcvd_pkt6.transaction_id, transactionid, 3)) {
dbg("no or bad transaction id, ignoring packet.\n");
continue;
}
waited += time(NULL) - timestmp;
switch (gstate.rqcode) {
case DHCP6SOLICIT:
dbg("Message Type: DHCP6SOLICIT\n");
optptr = prepare_send_pkt6(DHCP6ADVERTISE);
optlen = 0;
//TODO policy check
//TODO Receive: ORO check (e.g. DNS)
//Receive: Client Identifier (DUID)
get_optval6((uint8_t*)&gstate.rcvd.rcvd_pkt6.options,
DHCP6_OPT_CLIENTID, &client_duid_len, &client_duid);
//Receive: Identity Association for Non-temporary Address
if(get_optval6((uint8_t*)&gstate.rcvd.rcvd_pkt6.options,
DHCP6_OPT_IA_NA, &client_ia_na_len, &client_ia_na)) {
uint16_t ia_addr_len = sizeof(struct optval_ia_addr);
void *ia_addr, *status_code;
char *status_code_msg;
uint16_t status_code_len = 0;
server_ia_na_len = sizeof(struct optval_ia_na);
//IA Address
ia_addr = xzalloc(ia_addr_len);
struct optval_ia_addr *ia_addr_p = (struct optval_ia_addr*)ia_addr;
(*ia_addr_p).pref_lifetime = gconfig.pref_lifetime;
(*ia_addr_p).valid_lifetime = gconfig.valid_lifetime;
memcpy(&(*ia_addr_p).ipv6_addr,
getip6_from_pool(client_duid, client_duid_len,
DHCP6_OPT_IA_NA, (*(struct optval_ia_na*) client_ia_na).iaid,
&(*ia_addr_p).pref_lifetime), sizeof(uint32_t)*4);
server_ia_na_len += (ia_addr_len+4);
//Status Code
if(memcmp((*ia_addr_p).ipv6_addr, (uint8_t[16]){0}, sizeof(uint32_t)*4)) {
status_code_msg = xstrdup("Assigned an address.");
status_code_len = strlen(status_code_msg)+1;
status_code = xzalloc(status_code_len);
struct optval_status_code *status_code_p =
(struct optval_status_code*)status_code;
(*status_code_p).status_code = htons(DHCP6_STATUS_SUCCESS);
memcpy((*status_code_p).status_msg, status_code_msg,
status_code_len);
server_ia_na_len += (status_code_len+4);
free(status_code_msg);
} else {
status_code_msg = xstrdup("There's no available address.");
status_code_len = strlen(status_code_msg)+1;
status_code = xzalloc(status_code_len);
struct optval_status_code *status_code_p =
(struct optval_status_code*)status_code;
(*status_code_p).status_code = htons(DHCP6_STATUS_NOADDRSAVAIL);
memcpy((*status_code_p).status_msg, status_code_msg,
status_code_len);
server_ia_na_len += (status_code_len+4);
server_ia_na_len -= (ia_addr_len+4);
ia_addr_len = 0;
free(ia_addr);
free(status_code_msg);
//TODO send failed status code
break;
}
//combine options
server_ia_na = xzalloc(server_ia_na_len);
struct optval_ia_na *ia_na_p = (struct optval_ia_na*)server_ia_na;
(*ia_na_p).iaid = (*(struct optval_ia_na*)client_ia_na).iaid;
(*ia_na_p).t1 = gconfig.t1;
(*ia_na_p).t2 = gconfig.t2;
uint8_t* ia_na_optptr = (*ia_na_p).optval;
if(ia_addr_len) {
set_optval6(ia_na_optptr, DHCP6_OPT_IA_ADDR, ia_addr, ia_addr_len);
ia_na_optptr += (ia_addr_len + 4);
free(ia_addr);
}
if(status_code_len) {
set_optval6(ia_na_optptr, DHCP6_OPT_STATUS_CODE, status_code,
status_code_len);
ia_na_optptr += (status_code_len);
free(status_code);
}
//Response: Identity Association for Non-temporary Address
optptr = set_optval6(optptr, DHCP6_OPT_IA_NA, server_ia_na,
server_ia_na_len);
optlen += (server_ia_na_len + 4);
free(client_ia_na);free(server_ia_na);
}
//Receive: Identity Association for Prefix Delegation
else if(get_optval6((uint8_t*)&gstate.rcvd.rcvd_pkt6.options,
DHCP6_OPT_IA_PD, &client_ia_pd_len, &client_ia_pd)) {
//TODO
//Response: Identity Association for Prefix Delegation
}
//DUID type: link-layer address plus time
if(ntohs((*(struct optval_duid_llt*)client_duid).type) ==
DHCP6_DUID_LLT) {
server_duid_len = 8+sizeof(gconfig.server_mac);
server_duid = xzalloc(server_duid_len);
struct optval_duid_llt *server_duid_p =
(struct optval_duid_llt*)server_duid;
(*server_duid_p).type = htons(1);
(*server_duid_p).hwtype = htons(1);
(*server_duid_p).time = htonl((uint32_t)
(time(NULL) - 946684800) & 0xffffffff);
memcpy((*server_duid_p).lladdr, gconfig.server_mac,
sizeof(gconfig.server_mac));
memcpy(&client_lla, (*(struct optval_duid_llt*)client_duid).lladdr,
sizeof(client_lla));
//Response: Server Identifier (DUID)
optptr = set_optval6(optptr, DHCP6_OPT_SERVERID, server_duid,
server_duid_len);
optlen += (server_duid_len + 4);
//Response: Client Identifier
optptr = set_optval6(optptr, DHCP6_OPT_CLIENTID, client_duid,
client_duid_len);
optlen += (client_duid_len + 4);
free(client_duid);free(server_duid);
}
send_packet6(0, client_lla, optlen);
write_lease6file();
break;
case DHCP6REQUEST:
dbg("Message Type: DHCP6REQUEST\n");
optptr = prepare_send_pkt6(DHCP6REPLY);
optlen = 0;
//Receive: Client Identifier (DUID)
get_optval6((uint8_t*)&gstate.rcvd.rcvd_pkt6.options,
DHCP6_OPT_CLIENTID, &client_duid_len, &client_duid);
optptr = set_optval6(optptr, DHCP6_OPT_CLIENTID, client_duid,
client_duid_len);
optlen += (client_duid_len + 4);
memcpy(client_lla, (*(struct optval_duid_llt*)client_duid).lladdr,
sizeof(client_lla));
//Receive: Identity Association for Non-temporary Address
if(get_optval6((uint8_t*)&gstate.rcvd.rcvd_pkt6.options,
DHCP6_OPT_IA_NA, &client_ia_na_len, &client_ia_na)) {
uint16_t ia_addr_len = 0, status_code_len = 0;
void *ia_addr, *status_code;
uint16_t server_ia_na_len = sizeof(struct optval_ia_na);
char *status_code_msg;
//Check IA Address
get_optval6((uint8_t*)(*(struct optval_ia_na*)client_ia_na).optval,
DHCP6_OPT_IA_ADDR, &ia_addr_len, &ia_addr);
struct optval_ia_addr *ia_addr_p = (struct optval_ia_addr*)ia_addr;
if(verifyip6_in_lease((*ia_addr_p).ipv6_addr, client_duid,
DHCP6_OPT_IA_NA, (*(struct optval_ia_na*)client_ia_na).iaid)
== -1) {
server_ia_na_len += (ia_addr_len + 4);
//Add Status Code
status_code_msg = xstrdup("Assigned an address.");
status_code_len = strlen(status_code_msg) + 1;
status_code = xzalloc(status_code_len);
struct optval_status_code *status_code_p =
(struct optval_status_code*)status_code;
(*status_code_p).status_code = htons(DHCP6_STATUS_SUCCESS);
memcpy((*status_code_p).status_msg, status_code_msg,
status_code_len);
server_ia_na_len += (status_code_len+4);
} else {
//TODO send failed status code
break;
}
//combine options
server_ia_na = xzalloc(server_ia_na_len);
struct optval_ia_na *ia_na_p = (struct optval_ia_na*)server_ia_na;
(*ia_na_p).iaid = (*(struct optval_ia_na*)client_ia_na).iaid;
(*ia_na_p).t1 = gconfig.t1;
(*ia_na_p).t2 = gconfig.t2;
uint8_t* ia_na_optptr = (*ia_na_p).optval;
ia_na_optptr = set_optval6(ia_na_optptr, DHCP6_OPT_IA_ADDR,
ia_addr, ia_addr_len);
free(ia_addr);
if(status_code_len) {
ia_na_optptr = set_optval6(ia_na_optptr, DHCP6_OPT_STATUS_CODE,
status_code, status_code_len);
free(status_code);
}
//Response: Identity Association for Non-temporary Address
//(Status Code added)
optptr = set_optval6(optptr, DHCP6_OPT_IA_NA,
server_ia_na, server_ia_na_len);
optlen += (server_ia_na_len + 4);
free(client_ia_na);free(server_ia_na);
}
//Receive: Server Identifier (DUID)
get_optval6((uint8_t*)&gstate.rcvd.rcvd_pkt6.options,
DHCP6_OPT_SERVERID, &server_duid_len, &server_duid);
optptr = set_optval6(optptr, DHCP6_OPT_SERVERID,
server_duid, server_duid_len);
optlen += (server_duid_len + 4);
free(client_duid); free(server_duid);
send_packet6(0, client_lla, optlen);
write_lease6file();
break;
case DHCP6DECLINE: //TODO
case DHCP6RENEW: //TODO
case DHCP6REBIND: //TODO
case DHCP6RELEASE:
dbg("Message Type: DHCP6RELEASE\n");
optptr = prepare_send_pkt6(DHCP6REPLY);
break;
default:
dbg("Message Type : %u\n", gstate.rqcode);
break;
}
} else {
if(read_packet() < 0) {
open_listensock();
continue;
}
waited += time(NULL) - timestmp;
get_optval((uint8_t*)&gstate.rcvd.rcvd_pkt.options,
DHCP_OPT_MESSAGE_TYPE, &gstate.rqcode);
if (gstate.rqcode == 0 || gstate.rqcode < DHCPDISCOVER
|| gstate.rqcode > DHCPINFORM) {
dbg("no or bad message type option, ignoring packet.\n");
continue;
}
get_optval((uint8_t*) &gstate.rcvd.rcvd_pkt.options,
DHCP_OPT_SERVER_ID, &serverid);
if (serverid && (serverid != gconfig.server_nip)) {
dbg("server ID doesn't match, ignoring packet.\n");
continue;
}
waited += time(NULL) - timestmp;
switch (gstate.rqcode) {
case DHCPDISCOVER:
msgtype = DHCPOFFER;
dbg("Message Type : DHCPDISCOVER\n");
get_optval((uint8_t*) &gstate.rcvd.rcvd_pkt.options,
DHCP_OPT_REQUESTED_IP, &requested_nip);
get_optval((uint8_t*) &gstate.rcvd.rcvd_pkt.options,
DHCP_OPT_HOST_NAME, &hstname);
reqested_lease = gconfig.offer_time;
get_reqparam(&gstate.rqopt);
optptr = prepare_send_pkt();
gstate.send.send_pkt.yiaddr = getip_from_pool(requested_nip,
gstate.rcvd.rcvd_pkt.chaddr, &reqested_lease, hstname);
if(!gstate.send.send_pkt.yiaddr){
msgtype = DHCPNAK;
optptr = set_optval(optptr, DHCP_OPT_MESSAGE_TYPE, &msgtype, 1);
send_packet(1);
break;
}
get_optval((uint8_t*) &gstate.rcvd.rcvd_pkt.options,
DHCP_OPT_LEASE_TIME, &reqested_lease);
reqested_lease = htonl(get_lease(reqested_lease + time(NULL)));
optptr = set_optval(optptr, DHCP_OPT_MESSAGE_TYPE, &msgtype, 1);
optptr = set_optval(optptr, DHCP_OPT_SERVER_ID, &gconfig.server_nip, 4);
optptr = set_optval(optptr, DHCP_OPT_LEASE_TIME, &reqested_lease, 4);
optptr = set_reqparam(optptr, gstate.rqopt);
send_packet(1);
break;
case DHCPREQUEST:
msgtype = DHCPACK;
dbg("Message Type : DHCPREQUEST\n");
optptr = prepare_send_pkt();
get_optval((uint8_t*) &gstate.rcvd.rcvd_pkt.options,
DHCP_OPT_REQUESTED_IP, &requested_nip);
get_optval((uint8_t*) &gstate.rcvd.rcvd_pkt.options,
DHCP_OPT_LEASE_TIME, &reqested_lease);
get_optval((uint8_t*) &gstate.rcvd.rcvd_pkt.options,
DHCP_OPT_HOST_NAME, &hstname);
gstate.send.send_pkt.yiaddr = getip_from_pool(requested_nip,
gstate.rcvd.rcvd_pkt.chaddr, &reqested_lease, hstname);
if (!serverid) reqested_lease = gconfig.max_lease_sec;
if (!gstate.send.send_pkt.yiaddr) {
msgtype = DHCPNAK;
optptr = set_optval(optptr, DHCP_OPT_MESSAGE_TYPE, &msgtype, 1);
send_packet(1);
break;
}
optptr = set_optval(optptr, DHCP_OPT_MESSAGE_TYPE, &msgtype, 1);
optptr = set_optval(optptr, DHCP_OPT_SERVER_ID, &gconfig.server_nip, 4);
reqested_lease = htonl(reqested_lease);
optptr = set_optval(optptr, DHCP_OPT_LEASE_TIME, &reqested_lease, 4);
send_packet(1);
write_leasefile();
break;
case DHCPDECLINE:// FALL THROUGH
case DHCPRELEASE:
dbg("Message Type : DHCPDECLINE or DHCPRELEASE \n");
get_optval((uint8_t*) &gstate.rcvd.rcvd_pkt.options,
DHCP_OPT_SERVER_ID, &serverid);
if (serverid != gconfig.server_nip) break;
get_optval((uint8_t*) &gstate.rcvd.rcvd_pkt.options,
DHCP_OPT_REQUESTED_IP, &requested_nip);
delip_from_lease(requested_nip, gstate.rcvd.rcvd_pkt.chaddr,
(gstate.rqcode==DHCPRELEASE)?0:gconfig.decline_time);
break;
default:
dbg("Message Type : %u\n", gstate.rqcode);
break;
}
}
}
}
}