123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376 |
- /* vi: set sw=4 ts=4: */
- /* Port to Busybox Copyright (C) 2006 Jesse Dutton <jessedutton@gmail.com>
- *
- * Licensed under GPLv2, see file LICENSE in this source tree.
- *
- * DHCP Relay for 'DHCPv4 Configuration of IPSec Tunnel Mode' support
- * Copyright (C) 2002 Mario Strasser <mast@gmx.net>,
- * Zuercher Hochschule Winterthur,
- * Netbeat AG
- * Upstream has GPL v2 or later
- */
- //usage:#define dhcprelay_trivial_usage
- //usage: "CLIENT_IFACE[,CLIENT_IFACE2]... SERVER_IFACE [SERVER_IP]"
- //usage:#define dhcprelay_full_usage "\n\n"
- //usage: "Relay DHCP requests between clients and server"
- #include "common.h"
- #define SERVER_PORT 67
- /* lifetime of an xid entry in sec. */
- #define MAX_LIFETIME 2*60
- /* select timeout in sec. */
- #define SELECT_TIMEOUT (MAX_LIFETIME / 8)
- /* This list holds information about clients. The xid_* functions manipulate this list. */
- struct xid_item {
- unsigned timestamp;
- int client;
- uint32_t xid;
- struct sockaddr_in ip;
- struct xid_item *next;
- } FIX_ALIASING;
- #define dhcprelay_xid_list (*(struct xid_item*)bb_common_bufsiz1)
- #define INIT_G() do { setup_common_bufsiz(); } while (0)
- static struct xid_item *xid_add(uint32_t xid, struct sockaddr_in *ip, int client)
- {
- struct xid_item *item;
- /* create new xid entry */
- item = xmalloc(sizeof(struct xid_item));
- /* add xid entry */
- item->ip = *ip;
- item->xid = xid;
- item->client = client;
- item->timestamp = monotonic_sec();
- item->next = dhcprelay_xid_list.next;
- dhcprelay_xid_list.next = item;
- return item;
- }
- static void xid_expire(void)
- {
- struct xid_item *item = dhcprelay_xid_list.next;
- struct xid_item *last = &dhcprelay_xid_list;
- unsigned current_time = monotonic_sec();
- while (item != NULL) {
- if ((current_time - item->timestamp) > MAX_LIFETIME) {
- last->next = item->next;
- free(item);
- item = last->next;
- } else {
- last = item;
- item = item->next;
- }
- }
- }
- static struct xid_item *xid_find(uint32_t xid)
- {
- struct xid_item *item = dhcprelay_xid_list.next;
- while (item != NULL) {
- if (item->xid == xid) {
- break;
- }
- item = item->next;
- }
- return item;
- }
- static void xid_del(uint32_t xid)
- {
- struct xid_item *item = dhcprelay_xid_list.next;
- struct xid_item *last = &dhcprelay_xid_list;
- while (item != NULL) {
- if (item->xid == xid) {
- last->next = item->next;
- free(item);
- item = last->next;
- } else {
- last = item;
- item = item->next;
- }
- }
- }
- /**
- * get_dhcp_packet_type - gets the message type of a dhcp packet
- * p - pointer to the dhcp packet
- * returns the message type on success, -1 otherwise
- */
- static int get_dhcp_packet_type(struct dhcp_packet *p)
- {
- uint8_t *op;
- /* it must be either a BOOTREQUEST or a BOOTREPLY */
- if (p->op != BOOTREQUEST && p->op != BOOTREPLY)
- return -1;
- /* get message type option */
- op = udhcp_get_option(p, DHCP_MESSAGE_TYPE);
- if (op != NULL)
- return op[0];
- return -1;
- }
- /**
- * make_iface_list - parses client/server interface names
- * returns array
- */
- static char **make_iface_list(char **client_and_server_ifaces, int *client_number)
- {
- char *s, **iface_list;
- int i, cn;
- /* get number of items */
- cn = 2; /* 1 server iface + at least 1 client one */
- s = client_and_server_ifaces[0]; /* list of client ifaces */
- while (*s) {
- if (*s == ',')
- cn++;
- s++;
- }
- *client_number = cn;
- /* create vector of pointers */
- iface_list = xzalloc(cn * sizeof(iface_list[0]));
- iface_list[0] = client_and_server_ifaces[1]; /* server iface */
- i = 1;
- s = xstrdup(client_and_server_ifaces[0]); /* list of client ifaces */
- goto store_client_iface_name;
- while (i < cn) {
- if (*s++ == ',') {
- s[-1] = '\0';
- store_client_iface_name:
- iface_list[i++] = s;
- }
- }
- return iface_list;
- }
- /* Creates listen sockets (in fds) bound to client and server ifaces,
- * and returns numerically max fd.
- */
- static int init_sockets(char **iface_list, int num_clients, int *fds)
- {
- int i, n;
- n = 0;
- for (i = 0; i < num_clients; i++) {
- fds[i] = udhcp_listen_socket(/*INADDR_ANY,*/ SERVER_PORT, iface_list[i]);
- if (n < fds[i])
- n = fds[i];
- }
- return n;
- }
- static int sendto_ip4(int sock, const void *msg, int msg_len, struct sockaddr_in *to)
- {
- int err;
- errno = 0;
- err = sendto(sock, msg, msg_len, 0, (struct sockaddr*) to, sizeof(*to));
- err -= msg_len;
- if (err)
- bb_perror_msg("sendto");
- return err;
- }
- /**
- * pass_to_server() - forwards dhcp packets from client to server
- * p - packet to send
- * client - number of the client
- */
- static void pass_to_server(struct dhcp_packet *p, int packet_len, int client, int *fds,
- struct sockaddr_in *client_addr, struct sockaddr_in *server_addr)
- {
- int type;
- /* check packet_type */
- type = get_dhcp_packet_type(p);
- if (type != DHCPDISCOVER && type != DHCPREQUEST
- && type != DHCPDECLINE && type != DHCPRELEASE
- && type != DHCPINFORM
- ) {
- return;
- }
- /* create new xid entry */
- xid_add(p->xid, client_addr, client);
- /* forward request to server */
- /* note that we send from fds[0] which is bound to SERVER_PORT (67).
- * IOW: we send _from_ SERVER_PORT! Although this may look strange,
- * RFC 1542 not only allows, but prescribes this for BOOTP relays.
- */
- sendto_ip4(fds[0], p, packet_len, server_addr);
- }
- /**
- * pass_to_client() - forwards dhcp packets from server to client
- * p - packet to send
- */
- static void pass_to_client(struct dhcp_packet *p, int packet_len, int *fds)
- {
- int type;
- struct xid_item *item;
- /* check xid */
- item = xid_find(p->xid);
- if (!item) {
- return;
- }
- /* check packet type */
- type = get_dhcp_packet_type(p);
- if (type != DHCPOFFER && type != DHCPACK && type != DHCPNAK) {
- return;
- }
- //TODO: also do it if (p->flags & htons(BROADCAST_FLAG)) is set!
- if (item->ip.sin_addr.s_addr == htonl(INADDR_ANY))
- item->ip.sin_addr.s_addr = htonl(INADDR_BROADCAST);
- if (sendto_ip4(fds[item->client], p, packet_len, &item->ip) != 0) {
- return; /* send error occurred */
- }
- /* remove xid entry */
- xid_del(p->xid);
- }
- int dhcprelay_main(int argc, char **argv) MAIN_EXTERNALLY_VISIBLE;
- int dhcprelay_main(int argc, char **argv)
- {
- struct sockaddr_in server_addr;
- char **iface_list;
- int *fds;
- int num_sockets, max_socket;
- uint32_t our_nip;
- INIT_G();
- server_addr.sin_family = AF_INET;
- server_addr.sin_addr.s_addr = htonl(INADDR_BROADCAST);
- server_addr.sin_port = htons(SERVER_PORT);
- /* dhcprelay CLIENT_IFACE1[,CLIENT_IFACE2...] SERVER_IFACE [SERVER_IP] */
- if (argc == 4) {
- if (!inet_aton(argv[3], &server_addr.sin_addr))
- bb_perror_msg_and_die("bad server IP");
- } else if (argc != 3) {
- bb_show_usage();
- }
- iface_list = make_iface_list(argv + 1, &num_sockets);
- fds = xmalloc(num_sockets * sizeof(fds[0]));
- /* Create sockets and bind one to every iface */
- max_socket = init_sockets(iface_list, num_sockets, fds);
- /* Get our IP on server_iface */
- if (udhcp_read_interface(argv[2], NULL, &our_nip, NULL))
- return 1;
- /* Main loop */
- while (1) {
- // reinit stuff from time to time? go back to make_iface_list
- // every N minutes?
- fd_set rfds;
- struct timeval tv;
- int i;
- FD_ZERO(&rfds);
- for (i = 0; i < num_sockets; i++)
- FD_SET(fds[i], &rfds);
- tv.tv_sec = SELECT_TIMEOUT;
- tv.tv_usec = 0;
- if (select(max_socket + 1, &rfds, NULL, NULL, &tv) > 0) {
- int packlen;
- struct dhcp_packet dhcp_msg;
- /* server */
- if (FD_ISSET(fds[0], &rfds)) {
- packlen = udhcp_recv_kernel_packet(&dhcp_msg, fds[0]);
- if (packlen > 0) {
- pass_to_client(&dhcp_msg, packlen, fds);
- }
- }
- /* clients */
- for (i = 1; i < num_sockets; i++) {
- struct sockaddr_in client_addr;
- socklen_t addr_size;
- if (!FD_ISSET(fds[i], &rfds))
- continue;
- addr_size = sizeof(client_addr);
- packlen = recvfrom(fds[i], &dhcp_msg, sizeof(dhcp_msg), 0,
- (struct sockaddr *)(&client_addr), &addr_size);
- if (packlen <= 0)
- continue;
- /* Get our IP on corresponding client_iface */
- // RFC 1542
- // 4.1 General BOOTP Processing for Relay Agents
- // 4.1.1 BOOTREQUEST Messages
- // If the relay agent does decide to relay the request, it MUST examine
- // the 'giaddr' ("gateway" IP address) field. If this field is zero,
- // the relay agent MUST fill this field with the IP address of the
- // interface on which the request was received. If the interface has
- // more than one IP address logically associated with it, the relay
- // agent SHOULD choose one IP address associated with that interface and
- // use it consistently for all BOOTP messages it relays. If the
- // 'giaddr' field contains some non-zero value, the 'giaddr' field MUST
- // NOT be modified. The relay agent MUST NOT, under any circumstances,
- // fill the 'giaddr' field with a broadcast address as is suggested in
- // [1] (Section 8, sixth paragraph).
- // but why? what if server can't route such IP? Client ifaces may be, say, NATed!
- // 4.1.2 BOOTREPLY Messages
- // BOOTP relay agents relay BOOTREPLY messages only to BOOTP clients.
- // It is the responsibility of BOOTP servers to send BOOTREPLY messages
- // directly to the relay agent identified in the 'giaddr' field.
- // (yeah right, unless it is impossible... see comment above)
- // Therefore, a relay agent may assume that all BOOTREPLY messages it
- // receives are intended for BOOTP clients on its directly-connected
- // networks.
- //
- // When a relay agent receives a BOOTREPLY message, it should examine
- // the BOOTP 'giaddr', 'yiaddr', 'chaddr', 'htype', and 'hlen' fields.
- // These fields should provide adequate information for the relay agent
- // to deliver the BOOTREPLY message to the client.
- //
- // The 'giaddr' field can be used to identify the logical interface from
- // which the reply must be sent (i.e., the host or router interface
- // connected to the same network as the BOOTP client). If the content
- // of the 'giaddr' field does not match one of the relay agent's
- // directly-connected logical interfaces, the BOOTREPLY messsage MUST be
- // silently discarded.
- if (udhcp_read_interface(iface_list[i], NULL, &dhcp_msg.gateway_nip, NULL)) {
- /* Fall back to our IP on server iface */
- // this makes more sense!
- dhcp_msg.gateway_nip = our_nip;
- }
- // maybe dhcp_msg.hops++? drop packets with too many hops (RFC 1542 says 4 or 16)?
- pass_to_server(&dhcp_msg, packlen, i, fds, &client_addr, &server_addr);
- }
- }
- xid_expire();
- } /* while (1) */
- /* return 0; - not reached */
- }
|