ppp.c 58 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929930931932933934935936937938939940941942943944945946947948949950951952953954955956957958959960961962963964965966967968969970971972973974975976977978979980981982983984985986987988989990991992993994995996997998999100010011002100310041005100610071008100910101011101210131014101510161017101810191020102110221023102410251026102710281029103010311032103310341035103610371038103910401041104210431044104510461047104810491050105110521053105410551056105710581059106010611062106310641065106610671068106910701071107210731074107510761077107810791080108110821083108410851086108710881089109010911092109310941095109610971098109911001101110211031104110511061107110811091110111111121113111411151116111711181119112011211122112311241125112611271128112911301131113211331134113511361137113811391140114111421143114411451146114711481149115011511152115311541155115611571158115911601161116211631164116511661167116811691170117111721173117411751176117711781179118011811182118311841185118611871188118911901191119211931194119511961197119811991200120112021203120412051206120712081209121012111212121312141215121612171218121912201221122212231224122512261227122812291230123112321233123412351236123712381239124012411242124312441245124612471248124912501251125212531254125512561257125812591260126112621263126412651266126712681269127012711272127312741275127612771278127912801281128212831284128512861287128812891290129112921293129412951296129712981299130013011302130313041305130613071308130913101311131213131314131513161317131813191320132113221323132413251326132713281329133013311332133313341335133613371338133913401341134213431344134513461347134813491350135113521353135413551356135713581359136013611362136313641365136613671368136913701371137213731374137513761377137813791380138113821383138413851386138713881389139013911392139313941395139613971398139914001401140214031404140514061407140814091410141114121413141414151416141714181419142014211422142314241425142614271428142914301431143214331434143514361437143814391440144114421443144414451446144714481449145014511452145314541455145614571458145914601461146214631464146514661467146814691470147114721473147414751476147714781479148014811482148314841485148614871488148914901491149214931494149514961497149814991500150115021503150415051506150715081509151015111512151315141515151615171518151915201521152215231524152515261527152815291530153115321533153415351536153715381539154015411542154315441545154615471548154915501551155215531554155515561557155815591560156115621563156415651566156715681569157015711572157315741575157615771578157915801581158215831584158515861587158815891590159115921593159415951596159715981599160016011602160316041605160616071608160916101611161216131614161516161617161816191620162116221623162416251626162716281629163016311632163316341635163616371638163916401641164216431644164516461647164816491650165116521653165416551656165716581659166016611662166316641665166616671668166916701671167216731674167516761677167816791680168116821683168416851686168716881689169016911692169316941695169616971698169917001701170217031704170517061707170817091710171117121713171417151716171717181719172017211722172317241725172617271728172917301731173217331734173517361737173817391740174117421743174417451746174717481749175017511752175317541755175617571758175917601761176217631764176517661767176817691770177117721773177417751776177717781779178017811782178317841785178617871788178917901791179217931794179517961797179817991800180118021803180418051806180718081809181018111812181318141815181618171818181918201821182218231824182518261827182818291830183118321833183418351836183718381839184018411842184318441845184618471848184918501851185218531854185518561857185818591860186118621863186418651866186718681869187018711872187318741875187618771878187918801881188218831884188518861887188818891890189118921893189418951896189718981899190019011902190319041905190619071908190919101911191219131914191519161917191819191920192119221923192419251926192719281929193019311932193319341935193619371938193919401941194219431944194519461947194819491950195119521953195419551956195719581959196019611962196319641965196619671968196919701971197219731974197519761977197819791980198119821983198419851986198719881989199019911992199319941995199619971998199920002001200220032004200520062007200820092010201120122013201420152016201720182019202020212022202320242025202620272028202920302031203220332034203520362037203820392040204120422043204420452046204720482049205020512052205320542055205620572058205920602061206220632064206520662067206820692070207120722073207420752076207720782079208020812082208320842085208620872088208920902091209220932094209520962097209820992100210121022103210421052106210721082109211021112112211321142115211621172118211921202121212221232124212521262127212821292130213121322133213421352136213721382139214021412142214321442145214621472148214921502151215221532154215521562157215821592160216121622163216421652166216721682169217021712172217321742175217621772178217921802181218221832184218521862187218821892190219121922193219421952196219721982199220022012202220322042205220622072208220922102211221222132214221522162217221822192220222122222223222422252226222722282229223022312232223322342235223622372238223922402241224222432244224522462247224822492250225122522253225422552256225722582259226022612262226322642265226622672268226922702271227222732274227522762277227822792280228122822283228422852286228722882289229022912292229322942295229622972298229923002301230223032304230523062307230823092310231123122313231423152316231723182319232023212322232323242325232623272328232923302331233223332334233523362337233823392340234123422343234423452346234723482349235023512352235323542355235623572358235923602361236223632364236523662367236823692370237123722373237423752376237723782379238023812382238323842385238623872388238923902391239223932394239523962397239823992400240124022403240424052406240724082409241024112412241324142415241624172418241924202421242224232424242524262427242824292430243124322433243424352436243724382439244024412442244324442445244624472448244924502451245224532454245524562457245824592460246124622463246424652466246724682469247024712472247324742475247624772478247924802481248224832484248524862487248824892490249124922493249424952496249724982499250025012502250325042505250625072508250925102511251225132514251525162517251825192520252125222523252425252526252725282529253025312532253325342535253625372538253925402541254225432544254525462547254825492550255125522553255425552556255725582559256025612562256325642565256625672568256925702571257225732574257525762577257825792580258125822583258425852586258725882589259025912592259325942595259625972598259926002601260226032604260526062607260826092610261126122613261426152616261726182619262026212622262326242625262626272628262926302631263226332634263526362637263826392640264126422643264426452646264726482649265026512652265326542655265626572658265926602661266226632664266526662667266826692670267126722673267426752676267726782679268026812682268326842685268626872688268926902691269226932694269526962697269826992700270127022703270427052706270727082709271027112712271327142715271627172718271927202721272227232724272527262727272827292730273127322733273427352736273727382739274027412742274327442745274627472748274927502751275227532754275527562757275827592760276127622763276427652766276727682769277027712772277327742775277627772778277927802781278227832784278527862787278827892790279127922793279427952796279727982799280028012802280328042805280628072808280928102811281228132814281528162817281828192820282128222823282428252826282728282829283028312832283328342835283628372838283928402841284228432844284528462847284828492850285128522853285428552856285728582859286028612862286328642865286628672868286928702871287228732874287528762877287828792880288128822883288428852886288728882889289028912892289328942895289628972898289929002901290229032904290529062907290829092910291129122913291429152916291729182919
  1. #include <u.h>
  2. #include <libc.h>
  3. #include <auth.h>
  4. #include <bio.h>
  5. #include <ip.h>
  6. #include <libsec.h>
  7. #include <ndb.h>
  8. #include "ppp.h"
  9. #define PATH 128
  10. static int baud;
  11. static int nocompress;
  12. static int pppframing = 1;
  13. static int noipcompress;
  14. static int server;
  15. static int nip; /* number of ip interfaces */
  16. static int dying; /* flag to signal to all threads its time to go */
  17. static int primary; /* this is the primary IP interface */
  18. static char *chatfile;
  19. int debug;
  20. char* LOG = "ppp";
  21. char* keyspec = "";
  22. enum
  23. {
  24. Rmagic= 0x12345
  25. };
  26. /*
  27. * Calculate FCS - rfc 1331
  28. */
  29. ushort fcstab[256] =
  30. {
  31. 0x0000, 0x1189, 0x2312, 0x329b, 0x4624, 0x57ad, 0x6536, 0x74bf,
  32. 0x8c48, 0x9dc1, 0xaf5a, 0xbed3, 0xca6c, 0xdbe5, 0xe97e, 0xf8f7,
  33. 0x1081, 0x0108, 0x3393, 0x221a, 0x56a5, 0x472c, 0x75b7, 0x643e,
  34. 0x9cc9, 0x8d40, 0xbfdb, 0xae52, 0xdaed, 0xcb64, 0xf9ff, 0xe876,
  35. 0x2102, 0x308b, 0x0210, 0x1399, 0x6726, 0x76af, 0x4434, 0x55bd,
  36. 0xad4a, 0xbcc3, 0x8e58, 0x9fd1, 0xeb6e, 0xfae7, 0xc87c, 0xd9f5,
  37. 0x3183, 0x200a, 0x1291, 0x0318, 0x77a7, 0x662e, 0x54b5, 0x453c,
  38. 0xbdcb, 0xac42, 0x9ed9, 0x8f50, 0xfbef, 0xea66, 0xd8fd, 0xc974,
  39. 0x4204, 0x538d, 0x6116, 0x709f, 0x0420, 0x15a9, 0x2732, 0x36bb,
  40. 0xce4c, 0xdfc5, 0xed5e, 0xfcd7, 0x8868, 0x99e1, 0xab7a, 0xbaf3,
  41. 0x5285, 0x430c, 0x7197, 0x601e, 0x14a1, 0x0528, 0x37b3, 0x263a,
  42. 0xdecd, 0xcf44, 0xfddf, 0xec56, 0x98e9, 0x8960, 0xbbfb, 0xaa72,
  43. 0x6306, 0x728f, 0x4014, 0x519d, 0x2522, 0x34ab, 0x0630, 0x17b9,
  44. 0xef4e, 0xfec7, 0xcc5c, 0xddd5, 0xa96a, 0xb8e3, 0x8a78, 0x9bf1,
  45. 0x7387, 0x620e, 0x5095, 0x411c, 0x35a3, 0x242a, 0x16b1, 0x0738,
  46. 0xffcf, 0xee46, 0xdcdd, 0xcd54, 0xb9eb, 0xa862, 0x9af9, 0x8b70,
  47. 0x8408, 0x9581, 0xa71a, 0xb693, 0xc22c, 0xd3a5, 0xe13e, 0xf0b7,
  48. 0x0840, 0x19c9, 0x2b52, 0x3adb, 0x4e64, 0x5fed, 0x6d76, 0x7cff,
  49. 0x9489, 0x8500, 0xb79b, 0xa612, 0xd2ad, 0xc324, 0xf1bf, 0xe036,
  50. 0x18c1, 0x0948, 0x3bd3, 0x2a5a, 0x5ee5, 0x4f6c, 0x7df7, 0x6c7e,
  51. 0xa50a, 0xb483, 0x8618, 0x9791, 0xe32e, 0xf2a7, 0xc03c, 0xd1b5,
  52. 0x2942, 0x38cb, 0x0a50, 0x1bd9, 0x6f66, 0x7eef, 0x4c74, 0x5dfd,
  53. 0xb58b, 0xa402, 0x9699, 0x8710, 0xf3af, 0xe226, 0xd0bd, 0xc134,
  54. 0x39c3, 0x284a, 0x1ad1, 0x0b58, 0x7fe7, 0x6e6e, 0x5cf5, 0x4d7c,
  55. 0xc60c, 0xd785, 0xe51e, 0xf497, 0x8028, 0x91a1, 0xa33a, 0xb2b3,
  56. 0x4a44, 0x5bcd, 0x6956, 0x78df, 0x0c60, 0x1de9, 0x2f72, 0x3efb,
  57. 0xd68d, 0xc704, 0xf59f, 0xe416, 0x90a9, 0x8120, 0xb3bb, 0xa232,
  58. 0x5ac5, 0x4b4c, 0x79d7, 0x685e, 0x1ce1, 0x0d68, 0x3ff3, 0x2e7a,
  59. 0xe70e, 0xf687, 0xc41c, 0xd595, 0xa12a, 0xb0a3, 0x8238, 0x93b1,
  60. 0x6b46, 0x7acf, 0x4854, 0x59dd, 0x2d62, 0x3ceb, 0x0e70, 0x1ff9,
  61. 0xf78f, 0xe606, 0xd49d, 0xc514, 0xb1ab, 0xa022, 0x92b9, 0x8330,
  62. 0x7bc7, 0x6a4e, 0x58d5, 0x495c, 0x3de3, 0x2c6a, 0x1ef1, 0x0f78
  63. };
  64. static char *snames[] =
  65. {
  66. "Sclosed",
  67. "Sclosing",
  68. "Sreqsent",
  69. "Sackrcvd",
  70. "Sacksent",
  71. "Sopened",
  72. };
  73. static void authtimer(PPP*);
  74. static void chapinit(PPP*);
  75. static void config(PPP*, Pstate*, int);
  76. static uchar* escapeuchar(PPP*, ulong, uchar*, ushort*);
  77. static void getchap(PPP*, Block*);
  78. static Block* getframe(PPP*, int*);
  79. static void getlqm(PPP*, Block*);
  80. static int getopts(PPP*, Pstate*, Block*);
  81. static void getpap(PPP*, Block*);
  82. static void init(PPP*);
  83. static void invalidate(Ipaddr);
  84. static void ipinproc(PPP*);
  85. static char* ipopen(PPP*);
  86. static void mediainproc(PPP*);
  87. static void newstate(PPP*, Pstate*, int);
  88. static int nipifcs(char*);
  89. static void papinit(PPP*);
  90. static void pinit(PPP*, Pstate*);
  91. static void ppptimer(PPP*);
  92. static void printopts(Pstate*, Block*, int);
  93. static void ptimer(PPP*, Pstate*);
  94. static int putframe(PPP*, int, Block*);
  95. static void putlqm(PPP*);
  96. static void putndb(PPP*, char*);
  97. static void putpaprequest(PPP*);
  98. static void rcv(PPP*, Pstate*, Block*);
  99. static void rejopts(PPP*, Pstate*, Block*, int);
  100. static void sendechoreq(PPP*, Pstate*);
  101. static void sendtermreq(PPP*, Pstate*);
  102. static void setphase(PPP*, int);
  103. static void terminate(PPP*, int);
  104. static int validv4(Ipaddr);
  105. static void dmppkt(char *s, uchar *a, int na);
  106. static void getauth(PPP*);
  107. void
  108. pppopen(PPP *ppp, int mediain, int mediaout, char *net,
  109. Ipaddr ipaddr, Ipaddr remip,
  110. int mtu, int framing)
  111. {
  112. ppp->ipfd = -1;
  113. ppp->ipcfd = -1;
  114. invalidate(ppp->remote);
  115. invalidate(ppp->local);
  116. invalidate(ppp->curremote);
  117. invalidate(ppp->curlocal);
  118. invalidate(ppp->dns[0]);
  119. invalidate(ppp->dns[1]);
  120. invalidate(ppp->wins[0]);
  121. invalidate(ppp->wins[1]);
  122. ppp->mediain = mediain;
  123. ppp->mediaout = mediaout;
  124. if(validv4(remip)){
  125. ipmove(ppp->remote, remip);
  126. ppp->remotefrozen = 1;
  127. }
  128. if(validv4(ipaddr)){
  129. ipmove(ppp->local, ipaddr);
  130. ppp->localfrozen = 1;
  131. }
  132. ppp->mtu = Defmtu;
  133. ppp->mru = mtu;
  134. ppp->framing = framing;
  135. ppp->net = net;
  136. init(ppp);
  137. switch(rfork(RFPROC|RFMEM|RFNOWAIT)){
  138. case -1:
  139. sysfatal("forking mediainproc");
  140. case 0:
  141. mediainproc(ppp);
  142. terminate(ppp, 1);
  143. _exits(0);
  144. }
  145. }
  146. static void
  147. init(PPP* ppp)
  148. {
  149. if(ppp->inbuf == nil){
  150. ppp->inbuf = allocb(4096);
  151. if(ppp->inbuf == nil)
  152. abort();
  153. ppp->outbuf = allocb(4096);
  154. if(ppp->outbuf == nil)
  155. abort();
  156. ppp->lcp = mallocz(sizeof(*ppp->lcp), 1);
  157. if(ppp->lcp == nil)
  158. abort();
  159. ppp->lcp->proto = Plcp;
  160. ppp->lcp->state = Sclosed;
  161. ppp->ccp = mallocz(sizeof(*ppp->ccp), 1);
  162. if(ppp->ccp == nil)
  163. abort();
  164. ppp->ccp->proto = Pccp;
  165. ppp->ccp->state = Sclosed;
  166. ppp->ipcp = mallocz(sizeof(*ppp->ipcp), 1);
  167. if(ppp->ipcp == nil)
  168. abort();
  169. ppp->ipcp->proto = Pipcp;
  170. ppp->ipcp->state = Sclosed;
  171. ppp->chap = mallocz(sizeof(*ppp->chap), 1);
  172. if(ppp->chap == nil)
  173. abort();
  174. ppp->chap->proto = APmschap;
  175. ppp->chap->state = Cunauth;
  176. auth_freechal(ppp->chap->cs);
  177. ppp->chap->cs = nil;
  178. switch(rfork(RFPROC|RFMEM|RFNOWAIT)){
  179. case -1:
  180. sysfatal("forking ppptimer");
  181. case 0:
  182. ppptimer(ppp);
  183. _exits(0);
  184. }
  185. }
  186. ppp->ctcp = compress_init(ppp->ctcp);
  187. pinit(ppp, ppp->lcp);
  188. setphase(ppp, Plink);
  189. }
  190. static void
  191. setphase(PPP *ppp, int phase)
  192. {
  193. int oldphase;
  194. oldphase = ppp->phase;
  195. ppp->phase = phase;
  196. switch(phase){
  197. default:
  198. sysfatal("ppp: unknown phase %d", phase);
  199. case Pdead:
  200. /* restart or exit? */
  201. pinit(ppp, ppp->lcp);
  202. setphase(ppp, Plink);
  203. break;
  204. case Plink:
  205. /* link down */
  206. switch(oldphase) {
  207. case Pauth:
  208. auth_freechal(ppp->chap->cs);
  209. ppp->chap->cs = nil;
  210. ppp->chap->state = Cunauth;
  211. break;
  212. case Pnet:
  213. auth_freechal(ppp->chap->cs);
  214. ppp->chap->cs = nil;
  215. ppp->chap->state = Cunauth;
  216. newstate(ppp, ppp->ccp, Sclosed);
  217. newstate(ppp, ppp->ipcp, Sclosed);
  218. }
  219. break;
  220. case Pauth:
  221. if(server)
  222. chapinit(ppp);
  223. else if(ppp->chap->proto == APpasswd)
  224. papinit(ppp);
  225. else
  226. setphase(ppp, Pnet);
  227. break;
  228. case Pnet:
  229. pinit(ppp, ppp->ccp);
  230. pinit(ppp, ppp->ipcp);
  231. break;
  232. case Pterm:
  233. /* what? */
  234. break;
  235. }
  236. }
  237. static void
  238. pinit(PPP *ppp, Pstate *p)
  239. {
  240. p->timeout = 0;
  241. switch(p->proto){
  242. case Plcp:
  243. ppp->magic = truerand();
  244. ppp->xctlmap = 0xffffffff;
  245. ppp->period = 0;
  246. p->optmask = 0xffffffff;
  247. if(!server)
  248. p->optmask &= ~(Fauth|Fmtu);
  249. ppp->rctlmap = 0;
  250. ppp->ipcp->state = Sclosed;
  251. ppp->ipcp->optmask = 0xffffffff;
  252. p->echotimeout = 0;
  253. /* quality goo */
  254. ppp->timeout = 0;
  255. memset(&ppp->in, 0, sizeof(ppp->in));
  256. memset(&ppp->out, 0, sizeof(ppp->out));
  257. memset(&ppp->pin, 0, sizeof(ppp->pin));
  258. memset(&ppp->pout, 0, sizeof(ppp->pout));
  259. memset(&ppp->sin, 0, sizeof(ppp->sin));
  260. break;
  261. case Pccp:
  262. if(nocompress)
  263. p->optmask = 0;
  264. else
  265. p->optmask = Fcmppc;
  266. if(ppp->ctype != nil)
  267. (*ppp->ctype->fini)(ppp->cstate);
  268. ppp->ctype = nil;
  269. ppp->ctries = 0;
  270. ppp->cstate = nil;
  271. if(ppp->unctype)
  272. (*ppp->unctype->fini)(ppp->uncstate);
  273. ppp->unctype = nil;
  274. ppp->uncstate = nil;
  275. break;
  276. case Pipcp:
  277. p->optmask = 0xffffffff;
  278. ppp->ctcp = compress_init(ppp->ctcp);
  279. break;
  280. }
  281. p->confid = p->rcvdconfid = -1;
  282. config(ppp, p, 1);
  283. newstate(ppp, p, Sreqsent);
  284. }
  285. /*
  286. * change protocol to a new state.
  287. */
  288. static void
  289. newstate(PPP *ppp, Pstate *p, int state)
  290. {
  291. char *err;
  292. netlog("ppp: %ux %s->%s ctlmap %lux/%lux flags %lux mtu %ld mru %ld\n",
  293. p->proto, snames[p->state], snames[state], ppp->rctlmap,
  294. ppp->xctlmap, p->flags,
  295. ppp->mtu, ppp->mru);
  296. syslog(0, "ppp", "%ux %s->%s ctlmap %lux/%lux flags %lux mtu %ld mru %ld",
  297. p->proto, snames[p->state], snames[state], ppp->rctlmap,
  298. ppp->xctlmap, p->flags,
  299. ppp->mtu, ppp->mru);
  300. if(p->proto == Plcp) {
  301. if(state == Sopened)
  302. setphase(ppp, Pauth);
  303. else if(state == Sclosed)
  304. setphase(ppp, Pdead);
  305. else if(p->state == Sopened)
  306. setphase(ppp, Plink);
  307. }
  308. if(p->proto == Pccp && state == Sopened) {
  309. if(ppp->unctype)
  310. (*ppp->unctype->fini)(ppp->uncstate);
  311. ppp->unctype = nil;
  312. ppp->uncstate = nil;
  313. if(p->optmask & Fcmppc) {
  314. ppp->unctype = &uncmppc;
  315. ppp->uncstate = (*uncmppc.init)(ppp);
  316. }
  317. if(p->optmask & Fcthwack){
  318. ppp->unctype = &uncthwack;
  319. ppp->uncstate = (*uncthwack.init)(ppp);
  320. }
  321. }
  322. if(p->proto == Pipcp && state == Sopened) {
  323. if(server && ppp->chap->state != Cauthok)
  324. abort();
  325. err = ipopen(ppp);
  326. if(err != nil)
  327. sysfatal("%s", err);
  328. }
  329. p->state = state;
  330. }
  331. /* returns (protocol, information) */
  332. static Block*
  333. getframe(PPP *ppp, int *protop)
  334. {
  335. uchar *p, *from, *to;
  336. int n, len, proto;
  337. ulong c;
  338. ushort fcs;
  339. Block *buf, *b;
  340. *protop = 0;
  341. if(ppp->framing == 0) {
  342. /* assume data is already framed */
  343. b = allocb(2000);
  344. len = b->lim - b->wptr;
  345. n = read(ppp->mediain, b->wptr, len);
  346. dmppkt("RX", b->wptr, n);
  347. if(n <= 0 || n == len){
  348. freeb(b);
  349. return nil;
  350. }
  351. b->wptr += n;
  352. /* should probably copy to another block if small */
  353. if(pppframing && b->rptr[0] == PPP_addr && b->rptr[1] == PPP_ctl)
  354. b->rptr += 2;
  355. proto = *b->rptr++;
  356. if((proto & 0x1) == 0)
  357. proto = (proto<<8) | *b->rptr++;
  358. if(b->rptr >= b->wptr){
  359. freeb(b);
  360. return nil;
  361. }
  362. ppp->in.uchars += n;
  363. ppp->in.packets++;
  364. *protop = proto;
  365. netlog("getframe 0x%x\n", proto);
  366. return b;
  367. }
  368. buf = ppp->inbuf;
  369. for(;;){
  370. /* read till we hit a frame uchar or run out of room */
  371. for(p = buf->rptr; buf->wptr < buf->lim;){
  372. for(; p < buf->wptr; p++)
  373. if(*p == HDLC_frame)
  374. break;
  375. if(p != buf->wptr)
  376. break;
  377. len = buf->lim - buf->wptr;
  378. n = read(ppp->mediain, buf->wptr, len);
  379. if(n <= 0){
  380. syslog(0, LOG, "medium read returns %d: %r", n);
  381. buf->wptr = buf->rptr;
  382. return nil;
  383. }
  384. dmppkt("RX", buf->wptr, n);
  385. buf->wptr += n;
  386. }
  387. /* copy into block, undoing escapes, and caculating fcs */
  388. fcs = PPP_initfcs;
  389. b = allocb(p - buf->rptr);
  390. to = b->wptr;
  391. for(from = buf->rptr; from != p;){
  392. c = *from++;
  393. if(c == HDLC_esc){
  394. if(from == p)
  395. break;
  396. c = *from++ ^ 0x20;
  397. } else if((c < 0x20) && (ppp->rctlmap & (1 << c)))
  398. continue;
  399. *to++ = c;
  400. fcs = (fcs >> 8) ^ fcstab[(fcs ^ c) & 0xff];
  401. }
  402. /* copy down what's left in buffer */
  403. p++;
  404. memmove(buf->rptr, p, buf->wptr - p);
  405. n = p - buf->rptr;
  406. buf->wptr -= n;
  407. b->wptr = to - 2;
  408. /* return to caller if checksum matches */
  409. if(fcs == PPP_goodfcs){
  410. if(b->rptr[0] == PPP_addr && b->rptr[1] == PPP_ctl)
  411. b->rptr += 2;
  412. proto = *b->rptr++;
  413. if((proto & 0x1) == 0)
  414. proto = (proto<<8) | *b->rptr++;
  415. if(b->rptr < b->wptr){
  416. ppp->in.uchars += n;
  417. ppp->in.packets++;
  418. *protop = proto;
  419. netlog("getframe 0x%x\n", proto);
  420. return b;
  421. }
  422. } else if(BLEN(b) > 0){
  423. ppp->in.discards++;
  424. netlog("ppp: discard len %ld/%ld cksum %ux (%ux %ux %ux %ux)\n",
  425. BLEN(b), BLEN(buf), fcs, b->rptr[0],
  426. b->rptr[1], b->rptr[2], b->rptr[3]);
  427. }
  428. freeb(b);
  429. }
  430. return nil;
  431. }
  432. /* send a PPP frame */
  433. static int
  434. putframe(PPP *ppp, int proto, Block *b)
  435. {
  436. Block *buf;
  437. uchar *to, *from;
  438. ushort fcs;
  439. ulong ctlmap;
  440. uchar c;
  441. Block *bp;
  442. ppp->out.packets++;
  443. if(proto == Plcp)
  444. ctlmap = 0xffffffff;
  445. else
  446. ctlmap = ppp->xctlmap;
  447. /* make sure we have head room */
  448. if(b->rptr - b->base < 4){
  449. b = padb(b, 4);
  450. b->rptr += 4;
  451. }
  452. netlog("ppp: putframe 0x%ux %ld\n", proto, b->wptr-b->rptr);
  453. /* add in the protocol and address, we'd better have left room */
  454. from = b->rptr;
  455. *--from = proto;
  456. if(!(ppp->lcp->flags&Fpc) || proto > 0x100 || proto == Plcp)
  457. *--from = proto>>8;
  458. if(pppframing && (!(ppp->lcp->flags&Fac) || proto == Plcp)){
  459. *--from = PPP_ctl;
  460. *--from = PPP_addr;
  461. }
  462. qlock(&ppp->outlock);
  463. buf = ppp->outbuf;
  464. if(ppp->framing == 0) {
  465. to = buf->rptr;
  466. for(bp = b; bp; bp = bp->next){
  467. if(bp != b)
  468. from = bp->rptr;
  469. memmove(to, from, bp->wptr-from);
  470. to += bp->wptr-from;
  471. }
  472. } else {
  473. /* escape and checksum the body */
  474. fcs = PPP_initfcs;
  475. to = buf->rptr;
  476. /* add frame marker */
  477. *to++ = HDLC_frame;
  478. for(bp = b; bp; bp = bp->next){
  479. if(bp != b)
  480. from = bp->rptr;
  481. for(; from < bp->wptr; from++){
  482. c = *from;
  483. if(c == HDLC_frame || c == HDLC_esc
  484. || (c < 0x20 && ((1<<c) & ctlmap))){
  485. *to++ = HDLC_esc;
  486. *to++ = c ^ 0x20;
  487. } else
  488. *to++ = c;
  489. fcs = (fcs >> 8) ^ fcstab[(fcs ^ c) & 0xff];
  490. }
  491. }
  492. /* add on and escape the checksum */
  493. fcs = ~fcs;
  494. c = fcs;
  495. if(c == HDLC_frame || c == HDLC_esc
  496. || (c < 0x20 && ((1<<c) & ctlmap))){
  497. *to++ = HDLC_esc;
  498. *to++ = c ^ 0x20;
  499. } else
  500. *to++ = c;
  501. c = fcs>>8;
  502. if(c == HDLC_frame || c == HDLC_esc
  503. || (c < 0x20 && ((1<<c) & ctlmap))){
  504. *to++ = HDLC_esc;
  505. *to++ = c ^ 0x20;
  506. } else
  507. *to++ = c;
  508. /* add frame marker */
  509. *to++ = HDLC_frame;
  510. }
  511. /* send */
  512. buf->wptr = to;
  513. dmppkt("TX", buf->rptr, BLEN(buf));
  514. if(write(ppp->mediaout, buf->rptr, BLEN(buf)) < 0){
  515. qunlock(&ppp->outlock);
  516. return -1;
  517. }
  518. ppp->out.uchars += BLEN(buf);
  519. qunlock(&ppp->outlock);
  520. return 0;
  521. }
  522. Block*
  523. alloclcp(int code, int id, int len, Lcpmsg **mp)
  524. {
  525. Block *b;
  526. Lcpmsg *m;
  527. /*
  528. * leave room for header
  529. */
  530. b = allocb(len);
  531. m = (Lcpmsg*)b->wptr;
  532. m->code = code;
  533. m->id = id;
  534. b->wptr += 4;
  535. *mp = m;
  536. return b;
  537. }
  538. static void
  539. putlo(Block *b, int type, ulong val)
  540. {
  541. *b->wptr++ = type;
  542. *b->wptr++ = 6;
  543. hnputl(b->wptr, val);
  544. b->wptr += 4;
  545. }
  546. static void
  547. putv4o(Block *b, int type, Ipaddr val)
  548. {
  549. *b->wptr++ = type;
  550. *b->wptr++ = 6;
  551. v6tov4(b->wptr, val);
  552. b->wptr += 4;
  553. }
  554. static void
  555. putso(Block *b, int type, ulong val)
  556. {
  557. *b->wptr++ = type;
  558. *b->wptr++ = 4;
  559. hnputs(b->wptr, val);
  560. b->wptr += 2;
  561. }
  562. static void
  563. puto(Block *b, int type)
  564. {
  565. *b->wptr++ = type;
  566. *b->wptr++ = 2;
  567. }
  568. /*
  569. * send configuration request
  570. */
  571. static void
  572. config(PPP *ppp, Pstate *p, int newid)
  573. {
  574. Block *b;
  575. Lcpmsg *m;
  576. int id;
  577. if(newid){
  578. id = p->id++;
  579. p->confid = id;
  580. p->timeout = Timeout;
  581. } else
  582. id = p->confid;
  583. b = alloclcp(Lconfreq, id, 256, &m);
  584. USED(m);
  585. switch(p->proto){
  586. case Plcp:
  587. if(p->optmask & Fctlmap)
  588. putlo(b, Octlmap, 0); /* we don't want anything escaped */
  589. if(p->optmask & Fmagic)
  590. putlo(b, Omagic, ppp->magic);
  591. if(p->optmask & Fmtu)
  592. putso(b, Omtu, ppp->mru);
  593. if(p->optmask & Fauth) {
  594. *b->wptr++ = Oauth;
  595. *b->wptr++ = 5;
  596. hnputs(b->wptr, Pchap);
  597. b->wptr += 2;
  598. *b->wptr++ = ppp->chap->proto;
  599. }
  600. if(p->optmask & Fpc)
  601. puto(b, Opc);
  602. if(p->optmask & Fac)
  603. puto(b, Oac);
  604. break;
  605. case Pccp:
  606. if(p->optmask & Fcthwack)
  607. puto(b, Octhwack);
  608. else if(p->optmask & Fcmppc) {
  609. *b->wptr++ = Ocmppc;
  610. *b->wptr++ = 6;
  611. *b->wptr++ = 0;
  612. *b->wptr++ = 0;
  613. *b->wptr++ = 0;
  614. *b->wptr++ = 0x41;
  615. }
  616. break;
  617. case Pipcp:
  618. if(p->optmask & Fipaddr)
  619. {syslog(0, "ppp", "requesting %I", ppp->local);
  620. putv4o(b, Oipaddr, ppp->local);
  621. }
  622. if(primary && (p->optmask & Fipdns))
  623. putv4o(b, Oipdns, ppp->dns[0]);
  624. if(primary && (p->optmask & Fipdns2))
  625. putv4o(b, Oipdns2, ppp->dns[1]);
  626. if(primary && (p->optmask & Fipwins))
  627. putv4o(b, Oipwins, ppp->wins[0]);
  628. if(primary && (p->optmask & Fipwins2))
  629. putv4o(b, Oipwins2, ppp->wins[1]);
  630. /*
  631. * don't ask for header compression while data compression is still pending.
  632. * perhaps we should restart ipcp negotiation if compression negotiation fails.
  633. */
  634. if(!noipcompress && !ppp->ccp->optmask && (p->optmask & Fipcompress)) {
  635. *b->wptr++ = Oipcompress;
  636. *b->wptr++ = 6;
  637. hnputs(b->wptr, Pvjctcp);
  638. b->wptr += 2;
  639. *b->wptr++ = MAX_STATES-1;
  640. *b->wptr++ = 1;
  641. }
  642. break;
  643. }
  644. hnputs(m->len, BLEN(b));
  645. printopts(p, b, 1);
  646. putframe(ppp, p->proto, b);
  647. freeb(b);
  648. }
  649. static void
  650. getipinfo(PPP *ppp)
  651. {
  652. char *av[3];
  653. int ndns, nwins;
  654. char ip[64];
  655. Ndbtuple *t, *nt;
  656. if(!validv4(ppp->local))
  657. return;
  658. av[0] = "dns";
  659. av[1] = "wins";
  660. sprint(ip, "%I", ppp->local);
  661. t = csipinfo(ppp->net, "ip", ip, av, 2);
  662. ndns = nwins = 0;
  663. for(nt = t; nt != nil; nt = nt->entry){
  664. if(strcmp(nt->attr, "dns") == 0){
  665. if(ndns < 2)
  666. parseip(ppp->dns[ndns++], nt->val);
  667. } else if(strcmp(nt->attr, "wins") == 0){
  668. if(nwins < 2)
  669. parseip(ppp->wins[nwins++], nt->val);
  670. }
  671. }
  672. if(t != nil)
  673. ndbfree(t);
  674. }
  675. /*
  676. * parse configuration request, sends an ack or reject packet
  677. *
  678. * returns: -1 if request was syntacticly incorrect
  679. * 0 if packet was accepted
  680. * 1 if packet was rejected
  681. */
  682. static int
  683. getopts(PPP *ppp, Pstate *p, Block *b)
  684. {
  685. Lcpmsg *m, *repm;
  686. Lcpopt *o;
  687. uchar *cp, *ap;
  688. ulong rejecting, nacking, flags, proto, chapproto;
  689. ulong mtu, ctlmap, period;
  690. ulong x;
  691. Block *repb;
  692. Comptype *ctype;
  693. Ipaddr ipaddr;
  694. rejecting = 0;
  695. nacking = 0;
  696. flags = 0;
  697. /* defaults */
  698. invalidate(ipaddr);
  699. mtu = ppp->mtu;
  700. ctlmap = 0xffffffff;
  701. period = 0;
  702. ctype = nil;
  703. chapproto = 0;
  704. m = (Lcpmsg*)b->rptr;
  705. repb = alloclcp(Lconfack, m->id, BLEN(b), &repm);
  706. /* copy options into ack packet */
  707. memmove(repm->data, m->data, b->wptr - m->data);
  708. repb->wptr += b->wptr - m->data;
  709. /* look for options we don't recognize or like */
  710. for(cp = m->data; cp < b->wptr; cp += o->len){
  711. o = (Lcpopt*)cp;
  712. if(cp + o->len > b->wptr || o->len==0){
  713. freeb(repb);
  714. netlog("ppp: bad option length %ux\n", o->type);
  715. return -1;
  716. }
  717. switch(p->proto){
  718. case Plcp:
  719. switch(o->type){
  720. case Oac:
  721. flags |= Fac;
  722. continue;
  723. case Opc:
  724. flags |= Fpc;
  725. continue;
  726. case Omtu:
  727. mtu = nhgets(o->data);
  728. continue;
  729. case Omagic:
  730. if(ppp->magic == nhgetl(o->data))
  731. netlog("ppp: possible loop\n");
  732. continue;
  733. case Octlmap:
  734. ctlmap = nhgetl(o->data);
  735. continue;
  736. case Oquality:
  737. proto = nhgets(o->data);
  738. if(proto != Plqm)
  739. break;
  740. x = nhgetl(o->data+2)*10;
  741. period = (x+Period-1)/Period;
  742. continue;
  743. case Oauth:
  744. proto = nhgets(o->data);
  745. if(proto == Ppasswd && !server){
  746. chapproto = APpasswd;
  747. continue;
  748. }
  749. if(proto != Pchap)
  750. break;
  751. if(o->data[2] != APmd5 && o->data[2] != APmschap)
  752. break;
  753. chapproto = o->data[2];
  754. continue;
  755. }
  756. break;
  757. case Pccp:
  758. if(nocompress)
  759. break;
  760. switch(o->type){
  761. case Octhwack:
  762. break;
  763. if(o->len == 2){
  764. ctype = &cthwack;
  765. continue;
  766. }
  767. if(!nacking){
  768. nacking = 1;
  769. repb->wptr = repm->data;
  770. repm->code = Lconfnak;
  771. }
  772. puto(repb, Octhwack);
  773. continue;
  774. case Ocmppc:
  775. x = nhgetl(o->data);
  776. // hack for Mac
  777. // if(x == 0)
  778. // continue;
  779. /* stop ppp loops */
  780. if((x&0x41) == 0 || ppp->ctries++ > 5) {
  781. /*
  782. * turn off requests as well - I don't think this
  783. * is needed in the standard
  784. */
  785. p->optmask &= ~Fcmppc;
  786. break;
  787. }
  788. if(rejecting)
  789. continue;
  790. if(x & 1) {
  791. ctype = &cmppc;
  792. ppp->sendencrypted = (o->data[3]&0x40) == 0x40;
  793. continue;
  794. }
  795. if(!nacking){
  796. nacking = 1;
  797. repb->wptr = repm->data;
  798. repm->code = Lconfnak;
  799. }
  800. *repb->wptr++ = Ocmppc;
  801. *repb->wptr++ = 6;
  802. *repb->wptr++ = 0;
  803. *repb->wptr++ = 0;
  804. *repb->wptr++ = 0;
  805. *repb->wptr++ = 0x41;
  806. continue;
  807. }
  808. break;
  809. case Pipcp:
  810. switch(o->type){
  811. case Oipaddr:
  812. v4tov6(ipaddr, o->data);
  813. if(!validv4(ppp->remote))
  814. continue;
  815. if(!validv4(ipaddr) && !rejecting){
  816. /* other side requesting an address */
  817. if(!nacking){
  818. nacking = 1;
  819. repb->wptr = repm->data;
  820. repm->code = Lconfnak;
  821. }
  822. putv4o(repb, Oipaddr, ppp->remote);
  823. }
  824. continue;
  825. case Oipdns:
  826. ap = ppp->dns[0];
  827. goto ipinfo;
  828. case Oipdns2:
  829. ap = ppp->dns[1];
  830. goto ipinfo;
  831. case Oipwins:
  832. ap = ppp->wins[0];
  833. goto ipinfo;
  834. case Oipwins2:
  835. ap = ppp->wins[1];
  836. goto ipinfo;
  837. ipinfo:
  838. if(!validv4(ap))
  839. getipinfo(ppp);
  840. if(!validv4(ap))
  841. break;
  842. v4tov6(ipaddr, o->data);
  843. if(!validv4(ipaddr) && !rejecting){
  844. /* other side requesting an address */
  845. if(!nacking){
  846. nacking = 1;
  847. repb->wptr = repm->data;
  848. repm->code = Lconfnak;
  849. }
  850. putv4o(repb, o->type, ap);
  851. }
  852. continue;
  853. case Oipcompress:
  854. /*
  855. * don't compress tcp header if we've negotiated data compression.
  856. * tcp header compression has very poor performance if there is an error.
  857. */
  858. proto = nhgets(o->data);
  859. if(noipcompress || proto != Pvjctcp || ppp->ctype != nil)
  860. break;
  861. if(compress_negotiate(ppp->ctcp, o->data+2) < 0)
  862. break;
  863. flags |= Fipcompress;
  864. continue;
  865. }
  866. break;
  867. }
  868. /* come here if option is not recognized */
  869. if(!rejecting){
  870. rejecting = 1;
  871. repb->wptr = repm->data;
  872. repm->code = Lconfrej;
  873. }
  874. netlog("ppp: bad %ux option %d\n", p->proto, o->type);
  875. memmove(repb->wptr, o, o->len);
  876. repb->wptr += o->len;
  877. }
  878. /* permanent changes only after we know that we liked the packet */
  879. if(!rejecting && !nacking){
  880. switch(p->proto){
  881. case Plcp:
  882. ppp->period = period;
  883. ppp->xctlmap = ctlmap;
  884. if(mtu > Maxmtu)
  885. mtu = Maxmtu;
  886. if(mtu < Minmtu)
  887. mtu = Minmtu;
  888. ppp->mtu = mtu;
  889. if(chapproto)
  890. ppp->chap->proto = chapproto;
  891. break;
  892. case Pccp:
  893. if(ppp->ctype != nil){
  894. (*ppp->ctype->fini)(ppp->cstate);
  895. ppp->cstate = nil;
  896. }
  897. ppp->ctype = ctype;
  898. if(ctype)
  899. ppp->cstate = (*ctype->init)(ppp);
  900. break;
  901. case Pipcp:
  902. if(validv4(ipaddr) && ppp->remotefrozen == 0)
  903. ipmove(ppp->remote, ipaddr);
  904. break;
  905. }
  906. p->flags = flags;
  907. }
  908. hnputs(repm->len, BLEN(repb));
  909. printopts(p, repb, 1);
  910. putframe(ppp, p->proto, repb);
  911. freeb(repb);
  912. return rejecting || nacking;
  913. }
  914. static void
  915. dmppkt(char *s, uchar *a, int na)
  916. {
  917. int i;
  918. if (debug < 3)
  919. return;
  920. fprint(2, "%s", s);
  921. for(i = 0; i < na; i++)
  922. fprint(2, " %.2ux", a[i]);
  923. fprint(2, "\n");
  924. }
  925. static void
  926. dropoption(Pstate *p, Lcpopt *o)
  927. {
  928. unsigned n = o->type;
  929. switch(n){
  930. case Oipdns:
  931. p->optmask &= ~Fipdns;
  932. break;
  933. case Oipwins:
  934. p->optmask &= ~Fipwins;
  935. break;
  936. case Oipdns2:
  937. p->optmask &= ~Fipdns2;
  938. break;
  939. case Oipwins2:
  940. p->optmask &= ~Fipwins2;
  941. break;
  942. default:
  943. if(o->type < 8*sizeof(p->optmask))
  944. p->optmask &= ~(1<<o->type);
  945. break;
  946. }
  947. }
  948. /*
  949. * parse configuration rejection, just stop sending anything that they
  950. * don't like (except for ipcp address nak).
  951. */
  952. static void
  953. rejopts(PPP *ppp, Pstate *p, Block *b, int code)
  954. {
  955. Lcpmsg *m;
  956. Lcpopt *o;
  957. uchar newip[IPaddrlen];
  958. /* just give up trying what the other side doesn't like */
  959. m = (Lcpmsg*)b->rptr;
  960. for(b->rptr = m->data; b->rptr < b->wptr; b->rptr += o->len){
  961. o = (Lcpopt*)b->rptr;
  962. if(b->rptr + o->len > b->wptr){
  963. netlog("ppp: bad roption length %ux\n", o->type);
  964. return;
  965. }
  966. if(code == Lconfrej){
  967. dropoption(p, o);
  968. netlog("ppp: %ux rejecting %d\n",
  969. p->proto, o->type);
  970. continue;
  971. }
  972. switch(p->proto){
  973. case Plcp:
  974. switch(o->type){
  975. case Octlmap:
  976. ppp->rctlmap = nhgetl(o->data);
  977. break;
  978. case Oauth:
  979. /* don't allow client to request no auth */
  980. /* could try different auth protocol here */
  981. fprint(2, "ppp: can not reject CHAP\n");
  982. exits("ppp: CHAP");
  983. break;
  984. default:
  985. if(o->type < 8*sizeof(p->optmask))
  986. p->optmask &= ~(1<<o->type);
  987. break;
  988. };
  989. break;
  990. case Pccp:
  991. switch(o->type){
  992. default:
  993. dropoption(p, o);
  994. break;
  995. }
  996. break;
  997. case Pipcp:
  998. switch(o->type){
  999. case Oipaddr:
  1000. syslog(0, "ppp", "rejected addr %I with %V", ppp->local, o->data);
  1001. /* if we're a server, don't let other end change our addr */
  1002. v4tov6(ppp->local, o->data);
  1003. if(ppp->localfrozen){
  1004. dropoption(p, o);
  1005. break;
  1006. }
  1007. /* accept whatever server tells us */
  1008. if(!validv4(ppp->local)){
  1009. v4tov6(ppp->local, o->data);
  1010. dropoption(p, o);
  1011. break;
  1012. }
  1013. /* if he didn't like our addr, ask for a generic one */
  1014. v4tov6(newip, o->data);
  1015. if(!validv4(newip)){
  1016. invalidate(ppp->local);
  1017. break;
  1018. }
  1019. /* if he gives us something different, use it anyways */
  1020. v4tov6(ppp->local, o->data);
  1021. dropoption(p, o);
  1022. break;
  1023. case Oipdns:
  1024. if (!validv4(ppp->dns[0])){
  1025. v4tov6(ppp->dns[0], o->data);
  1026. dropoption(p, o);
  1027. break;
  1028. }
  1029. v4tov6(newip, o->data);
  1030. if(!validv4(newip)){
  1031. invalidate(ppp->dns[0]);
  1032. break;
  1033. }
  1034. v4tov6(ppp->dns[0], o->data);
  1035. dropoption(p, o);
  1036. break;
  1037. case Oipwins:
  1038. if (!validv4(ppp->wins[0])){
  1039. v4tov6(ppp->wins[0], o->data);
  1040. dropoption(p, o);
  1041. break;
  1042. }
  1043. v4tov6(newip, o->data);
  1044. if(!validv4(newip)){
  1045. invalidate(ppp->wins[0]);
  1046. break;
  1047. }
  1048. v4tov6(ppp->wins[0], o->data);
  1049. dropoption(p, o);
  1050. break;
  1051. case Oipdns2:
  1052. if (!validv4(ppp->dns[1])){
  1053. v4tov6(ppp->dns[1], o->data);
  1054. dropoption(p, o);
  1055. break;
  1056. }
  1057. v4tov6(newip, o->data);
  1058. if(!validv4(newip)){
  1059. invalidate(ppp->dns[1]);
  1060. break;
  1061. }
  1062. v4tov6(ppp->dns[1], o->data);
  1063. dropoption(p, o);
  1064. break;
  1065. case Oipwins2:
  1066. if (!validv4(ppp->wins[1])){
  1067. v4tov6(ppp->wins[1], o->data);
  1068. dropoption(p, o);
  1069. break;
  1070. }
  1071. v4tov6(newip, o->data);
  1072. if(!validv4(newip)){
  1073. invalidate(ppp->wins[1]);
  1074. break;
  1075. }
  1076. v4tov6(ppp->wins[1], o->data);
  1077. dropoption(p, o);
  1078. break;
  1079. default:
  1080. dropoption(p, o);
  1081. break;
  1082. }
  1083. break;
  1084. }
  1085. }
  1086. }
  1087. /*
  1088. * put a messages through the lcp or ipcp state machine. They are
  1089. * very similar.
  1090. */
  1091. static void
  1092. rcv(PPP *ppp, Pstate *p, Block *b)
  1093. {
  1094. ulong len;
  1095. int err;
  1096. Lcpmsg *m;
  1097. int proto;
  1098. if(BLEN(b) < 4){
  1099. netlog("ppp: short lcp message\n");
  1100. freeb(b);
  1101. return;
  1102. }
  1103. m = (Lcpmsg*)b->rptr;
  1104. len = nhgets(m->len);
  1105. if(BLEN(b) < len){
  1106. netlog("ppp: short lcp message\n");
  1107. freeb(b);
  1108. return;
  1109. }
  1110. netlog("ppp: %ux rcv %d len %ld id %d/%d/%d\n",
  1111. p->proto, m->code, len, m->id, p->confid, p->id);
  1112. if(p->proto != Plcp && ppp->lcp->state != Sopened){
  1113. netlog("ppp: non-lcp with lcp not open\n");
  1114. freeb(b);
  1115. return;
  1116. }
  1117. qlock(ppp);
  1118. switch(m->code){
  1119. case Lconfreq:
  1120. printopts(p, b, 0);
  1121. err = getopts(ppp, p, b);
  1122. if(err < 0)
  1123. break;
  1124. if(m->id == p->rcvdconfid)
  1125. break; /* don't change state for duplicates */
  1126. switch(p->state){
  1127. case Sackrcvd:
  1128. if(err)
  1129. break;
  1130. newstate(ppp, p, Sopened);
  1131. break;
  1132. case Sclosed:
  1133. case Sopened:
  1134. config(ppp, p, 1);
  1135. if(err == 0)
  1136. newstate(ppp, p, Sacksent);
  1137. else
  1138. newstate(ppp, p, Sreqsent);
  1139. break;
  1140. case Sreqsent:
  1141. case Sacksent:
  1142. if(err == 0)
  1143. newstate(ppp, p, Sacksent);
  1144. else
  1145. newstate(ppp, p, Sreqsent);
  1146. break;
  1147. }
  1148. break;
  1149. case Lconfack:
  1150. if(p->confid != m->id){
  1151. /* ignore if it isn't the message we're sending */
  1152. netlog("ppp: dropping confack\n");
  1153. break;
  1154. }
  1155. p->confid = -1; /* ignore duplicates */
  1156. p->id++; /* avoid sending duplicates */
  1157. netlog("ppp: recv confack\n");
  1158. switch(p->state){
  1159. case Sopened:
  1160. case Sackrcvd:
  1161. config(ppp, p, 1);
  1162. newstate(ppp, p, Sreqsent);
  1163. break;
  1164. case Sreqsent:
  1165. newstate(ppp, p, Sackrcvd);
  1166. break;
  1167. case Sacksent:
  1168. newstate(ppp, p, Sopened);
  1169. break;
  1170. }
  1171. break;
  1172. case Lconfrej:
  1173. case Lconfnak:
  1174. if(p->confid != m->id) {
  1175. /* ignore if it isn't the message we're sending */
  1176. netlog("ppp: dropping confrej or confnak\n");
  1177. break;
  1178. }
  1179. p->confid = -1; /* ignore duplicates */
  1180. p->id++; /* avoid sending duplicates */
  1181. switch(p->state){
  1182. case Sopened:
  1183. case Sackrcvd:
  1184. config(ppp, p, 1);
  1185. newstate(ppp, p, Sreqsent);
  1186. break;
  1187. case Sreqsent:
  1188. case Sacksent:
  1189. printopts(p, b, 0);
  1190. rejopts(ppp, p, b, m->code);
  1191. config(ppp, p, 1);
  1192. break;
  1193. }
  1194. break;
  1195. case Ltermreq:
  1196. fprint(2, "remreq\n");
  1197. m->code = Ltermack;
  1198. putframe(ppp, p->proto, b);
  1199. switch(p->state){
  1200. case Sackrcvd:
  1201. case Sacksent:
  1202. newstate(ppp, p, Sreqsent);
  1203. break;
  1204. case Sopened:
  1205. newstate(ppp, p, Sclosing);
  1206. break;
  1207. }
  1208. break;
  1209. case Ltermack:
  1210. if(p->termid != m->id) /* ignore if it isn't the message we're sending */
  1211. break;
  1212. fprint(2, "remack\n");
  1213. if(p->proto == Plcp)
  1214. ppp->ipcp->state = Sclosed;
  1215. switch(p->state){
  1216. case Sclosing:
  1217. newstate(ppp, p, Sclosed);
  1218. break;
  1219. case Sackrcvd:
  1220. newstate(ppp, p, Sreqsent);
  1221. break;
  1222. case Sopened:
  1223. config(ppp, p, 0);
  1224. newstate(ppp, p, Sreqsent);
  1225. break;
  1226. }
  1227. break;
  1228. case Lcoderej:
  1229. //newstate(ppp, p, Sclosed);
  1230. syslog(0, LOG, "code reject %d\n", m->data[0]);
  1231. break;
  1232. case Lprotorej:
  1233. proto = nhgets(m->data);
  1234. netlog("ppp: proto reject %ux\n", proto);
  1235. if(proto == Pccp)
  1236. newstate(ppp, ppp->ccp, Sclosed);
  1237. break;
  1238. case Lechoreq:
  1239. if(BLEN(b) < 8){
  1240. netlog("ppp: short lcp echo request\n");
  1241. freeb(b);
  1242. return;
  1243. }
  1244. m->code = Lechoack;
  1245. hnputl(m->data, ppp->magic);
  1246. putframe(ppp, p->proto, b);
  1247. break;
  1248. case Lechoack:
  1249. p->echoack = 1;
  1250. break;
  1251. case Ldiscard:
  1252. /* nothing to do */
  1253. break;
  1254. case Lresetreq:
  1255. if(p->proto != Pccp)
  1256. break;
  1257. ppp->stat.compreset++;
  1258. if(ppp->ctype != nil)
  1259. b = (*ppp->ctype->resetreq)(ppp->cstate, b);
  1260. if(b != nil) {
  1261. m = (Lcpmsg*)b->rptr;
  1262. m->code = Lresetack;
  1263. putframe(ppp, p->proto, b);
  1264. }
  1265. break;
  1266. case Lresetack:
  1267. if(p->proto != Pccp)
  1268. break;
  1269. if(ppp->unctype != nil)
  1270. (*ppp->unctype->resetack)(ppp->uncstate, b);
  1271. break;
  1272. }
  1273. qunlock(ppp);
  1274. freeb(b);
  1275. }
  1276. /*
  1277. * timer for protocol state machine
  1278. */
  1279. static void
  1280. ptimer(PPP *ppp, Pstate *p)
  1281. {
  1282. if(p->state == Sopened || p->state == Sclosed)
  1283. return;
  1284. p->timeout--;
  1285. switch(p->state){
  1286. case Sclosing:
  1287. sendtermreq(ppp, p);
  1288. break;
  1289. case Sreqsent:
  1290. case Sacksent:
  1291. if(p->timeout <= 0)
  1292. newstate(ppp, p, Sclosed);
  1293. else {
  1294. config(ppp, p, 0);
  1295. }
  1296. break;
  1297. case Sackrcvd:
  1298. if(p->timeout <= 0)
  1299. newstate(ppp, p, Sclosed);
  1300. else {
  1301. config(ppp, p, 0);
  1302. newstate(ppp, p, Sreqsent);
  1303. }
  1304. break;
  1305. }
  1306. }
  1307. /* paptimer -- pap timer event handler
  1308. *
  1309. * If PAP authorization hasn't come through, resend an authreqst. If
  1310. * the maximum number of requests have been sent (~ 30 seconds), give
  1311. * up.
  1312. *
  1313. */
  1314. static void
  1315. authtimer(PPP* ppp)
  1316. {
  1317. if(ppp->chap->proto != APpasswd)
  1318. return;
  1319. if(ppp->chap->id < 21)
  1320. putpaprequest(ppp);
  1321. else {
  1322. terminate(ppp, 0);
  1323. netlog("ppp: pap timed out--not authorized\n");
  1324. }
  1325. }
  1326. /*
  1327. * timer for ppp
  1328. */
  1329. static void
  1330. ppptimer(PPP *ppp)
  1331. {
  1332. while(!dying){
  1333. sleep(Period);
  1334. qlock(ppp);
  1335. netlog("ppp: ppptimer\n");
  1336. ptimer(ppp, ppp->lcp);
  1337. if(ppp->lcp->state == Sopened) {
  1338. switch(ppp->phase){
  1339. case Pnet:
  1340. ptimer(ppp, ppp->ccp);
  1341. ptimer(ppp, ppp->ipcp);
  1342. break;
  1343. case Pauth:
  1344. authtimer(ppp);
  1345. break;
  1346. }
  1347. }
  1348. /* link quality measurement */
  1349. if(ppp->period && --(ppp->timeout) <= 0){
  1350. ppp->timeout = ppp->period;
  1351. putlqm(ppp);
  1352. }
  1353. qunlock(ppp);
  1354. }
  1355. }
  1356. static void
  1357. setdefroute(char *net, Ipaddr gate)
  1358. {
  1359. int fd;
  1360. char path[128];
  1361. snprint(path, sizeof path, "%s/iproute", net);
  1362. fd = open(path, ORDWR);
  1363. if(fd < 0)
  1364. return;
  1365. fprint(fd, "add 0 0 %I", gate);
  1366. close(fd);
  1367. }
  1368. enum
  1369. {
  1370. Mofd= 32,
  1371. };
  1372. struct
  1373. {
  1374. Lock;
  1375. int fd[Mofd];
  1376. int cfd[Mofd];
  1377. int n;
  1378. } old;
  1379. static char*
  1380. ipopen(PPP *ppp)
  1381. {
  1382. static int ipinprocpid;
  1383. int n, cfd, fd;
  1384. char path[128];
  1385. char buf[128];
  1386. if(ipinprocpid <= 0){
  1387. snprint(path, sizeof path, "%s/ipifc/clone", ppp->net);
  1388. cfd = open(path, ORDWR);
  1389. if(cfd < 0)
  1390. return "can't open ip interface";
  1391. n = read(cfd, buf, sizeof(buf) - 1);
  1392. if(n <= 0){
  1393. close(cfd);
  1394. return "can't open ip interface";
  1395. }
  1396. buf[n] = 0;
  1397. snprint(path, sizeof path, "%s/ipifc/%s/data", ppp->net, buf);
  1398. fd = open(path, ORDWR);
  1399. if(fd < 0){
  1400. close(cfd);
  1401. return "can't open ip interface";
  1402. }
  1403. if(fprint(cfd, "bind pkt") < 0)
  1404. return "binding pkt to ip interface";
  1405. if(fprint(cfd, "add %I 255.255.255.255 %I %lud proxy", ppp->local,
  1406. ppp->remote, ppp->mtu-10) < 0){
  1407. close(cfd);
  1408. return "can't set addresses";
  1409. }
  1410. if(primary)
  1411. setdefroute(ppp->net, ppp->remote);
  1412. ppp->ipfd = fd;
  1413. ppp->ipcfd = cfd;
  1414. /* signal main() that ip is configured */
  1415. rendezvous(Rmagic, 0);
  1416. switch(ipinprocpid = rfork(RFPROC|RFMEM|RFNOWAIT)){
  1417. case -1:
  1418. sysfatal("forking ipinproc");
  1419. case 0:
  1420. ipinproc(ppp);
  1421. terminate(ppp, 1);
  1422. _exits(0);
  1423. }
  1424. } else {
  1425. /* we may have changed addresses */
  1426. if(ipcmp(ppp->local, ppp->curlocal) != 0 ||
  1427. ipcmp(ppp->remote, ppp->curremote) != 0){
  1428. snprint(buf, sizeof buf, "remove %I 255.255.255.255 %I",
  1429. ppp->curlocal, ppp->curremote);
  1430. if(fprint(ppp->ipcfd, "%s", buf) < 0)
  1431. syslog(0, "ppp", "can't %s: %r", buf);
  1432. snprint(buf, sizeof buf, "add %I 255.255.255.255 %I %lud proxy",
  1433. ppp->local, ppp->remote, ppp->mtu-10);
  1434. if(fprint(ppp->ipcfd, "%s", buf) < 0)
  1435. syslog(0, "ppp", "can't %s: %r", buf);
  1436. }
  1437. syslog(0, "ppp", "%I/%I -> %I/%I", ppp->curlocal, ppp->curremote,
  1438. ppp->local, ppp->remote);
  1439. }
  1440. ipmove(ppp->curlocal, ppp->local);
  1441. ipmove(ppp->curremote, ppp->remote);
  1442. return nil;
  1443. }
  1444. /* return next input IP packet */
  1445. Block*
  1446. pppread(PPP *ppp)
  1447. {
  1448. Block *b, *reply;
  1449. int proto, len;
  1450. Lcpmsg *m;
  1451. while(!dying){
  1452. b = getframe(ppp, &proto);
  1453. if(b == nil)
  1454. return nil;
  1455. Again:
  1456. switch(proto){
  1457. case Plcp:
  1458. rcv(ppp, ppp->lcp, b);
  1459. break;
  1460. case Pccp:
  1461. rcv(ppp, ppp->ccp, b);
  1462. break;
  1463. case Pipcp:
  1464. rcv(ppp, ppp->ipcp, b);
  1465. break;
  1466. case Pip:
  1467. if(ppp->ipcp->state == Sopened)
  1468. return b;
  1469. netlog("ppp: IP recved: link not up\n");
  1470. freeb(b);
  1471. break;
  1472. case Plqm:
  1473. getlqm(ppp, b);
  1474. break;
  1475. case Pchap:
  1476. getchap(ppp, b);
  1477. break;
  1478. case Ppasswd:
  1479. getpap(ppp, b);
  1480. break;
  1481. case Pvjctcp:
  1482. case Pvjutcp:
  1483. if(ppp->ipcp->state != Sopened){
  1484. netlog("ppp: VJ tcp recved: link not up\n");
  1485. freeb(b);
  1486. break;
  1487. }
  1488. ppp->stat.vjin++;
  1489. b = tcpuncompress(ppp->ctcp, b, proto);
  1490. if(b != nil)
  1491. return b;
  1492. ppp->stat.vjfail++;
  1493. break;
  1494. case Pcdata:
  1495. ppp->stat.uncomp++;
  1496. if(ppp->ccp->state != Sopened){
  1497. netlog("ppp: compressed data recved: link not up\n");
  1498. freeb(b);
  1499. break;
  1500. }
  1501. if(ppp->unctype == nil) {
  1502. netlog("ppp: compressed data recved: no compression\n");
  1503. freeb(b);
  1504. break;
  1505. }
  1506. len = BLEN(b);
  1507. b = (*ppp->unctype->uncompress)(ppp, b, &proto, &reply);
  1508. if(reply != nil){
  1509. /* send resetreq */
  1510. ppp->stat.uncompreset++;
  1511. putframe(ppp, Pccp, reply);
  1512. freeb(reply);
  1513. }
  1514. if(b == nil)
  1515. break;
  1516. ppp->stat.uncompin += len;
  1517. ppp->stat.uncompout += BLEN(b);
  1518. /* netlog("ppp: uncompressed frame %ux %d %d (%d uchars)\n", proto, b->rptr[0], b->rptr[1], BLEN(b)); /* */
  1519. goto Again;
  1520. break;
  1521. default:
  1522. syslog(0, LOG, "unknown proto %ux", proto);
  1523. if(ppp->lcp->state == Sopened){
  1524. /* reject the protocol */
  1525. b->rptr -= 6;
  1526. m = (Lcpmsg*)b->rptr;
  1527. m->code = Lprotorej;
  1528. m->id = ++ppp->lcp->id;
  1529. hnputs(m->data, proto);
  1530. hnputs(m->len, BLEN(b));
  1531. putframe(ppp, Plcp, b);
  1532. }
  1533. freeb(b);
  1534. break;
  1535. }
  1536. }
  1537. return nil;
  1538. }
  1539. /* transmit an IP packet */
  1540. int
  1541. pppwrite(PPP *ppp, Block *b)
  1542. {
  1543. int proto;
  1544. int len;
  1545. qlock(ppp);
  1546. /* can't send ip packets till we're established */
  1547. if(ppp->ipcp->state != Sopened) {
  1548. qunlock(ppp);
  1549. syslog(0, LOG, "IP write: link not up");
  1550. len = blen(b);
  1551. freeb(b);
  1552. return len;
  1553. }
  1554. proto = Pip;
  1555. ppp->stat.ipsend++;
  1556. if(ppp->ipcp->flags & Fipcompress){
  1557. b = compress(ppp->ctcp, b, &proto);
  1558. if(b == nil){
  1559. qunlock(ppp);
  1560. return 0;
  1561. }
  1562. if(proto != Pip)
  1563. ppp->stat.vjout++;
  1564. }
  1565. if(ppp->ctype != nil) {
  1566. len = blen(b);
  1567. b = (*ppp->ctype->compress)(ppp, proto, b, &proto);
  1568. if(proto == Pcdata) {
  1569. ppp->stat.comp++;
  1570. ppp->stat.compin += len;
  1571. ppp->stat.compout += blen(b);
  1572. }
  1573. }
  1574. if(putframe(ppp, proto, b) < 0) {
  1575. qunlock(ppp);
  1576. freeb(b);
  1577. return -1;
  1578. }
  1579. qunlock(ppp);
  1580. len = blen(b);
  1581. freeb(b);
  1582. return len;
  1583. }
  1584. static void
  1585. terminate(PPP *ppp, int kill)
  1586. {
  1587. close(ppp->ipfd);
  1588. ppp->ipfd = -1;
  1589. close(ppp->ipcfd);
  1590. ppp->ipcfd = -1;
  1591. close(ppp->mediain);
  1592. close(ppp->mediaout);
  1593. ppp->mediain = -1;
  1594. ppp->mediaout = -1;
  1595. dying = 1;
  1596. if(kill)
  1597. postnote(PNGROUP, getpid(), "die");
  1598. }
  1599. typedef struct Iphdr Iphdr;
  1600. struct Iphdr
  1601. {
  1602. uchar vihl; /* Version and header length */
  1603. uchar tos; /* Type of service */
  1604. uchar length[2]; /* packet length */
  1605. uchar id[2]; /* Identification */
  1606. uchar frag[2]; /* Fragment information */
  1607. uchar ttl; /* Time to live */
  1608. uchar proto; /* Protocol */
  1609. uchar cksum[2]; /* Header checksum */
  1610. uchar src[4]; /* Ip source (uchar ordering unimportant) */
  1611. uchar dst[4]; /* Ip destination (uchar ordering unimportant) */
  1612. };
  1613. static void
  1614. ipinproc(PPP *ppp)
  1615. {
  1616. Block *b;
  1617. int m, n;
  1618. Iphdr *ip;
  1619. while(!dying){
  1620. b = allocb(Buflen);
  1621. n = read(ppp->ipfd, b->wptr, b->lim-b->wptr);
  1622. if(n < 0)
  1623. break;
  1624. /* trim packet if there's padding (e.g. from ether) */
  1625. ip = (Iphdr*)b->rptr;
  1626. m = nhgets(ip->length);
  1627. if(m < n && m > 0)
  1628. n = m;
  1629. b->wptr += n;
  1630. if(pppwrite(ppp, b) < 0)
  1631. break;
  1632. }
  1633. }
  1634. static void
  1635. catchdie(void*, char *msg)
  1636. {
  1637. if(strstr(msg, "die") != nil)
  1638. noted(NCONT);
  1639. else
  1640. noted(NDFLT);
  1641. }
  1642. static void
  1643. hexdump(uchar *a, int na)
  1644. {
  1645. int i;
  1646. char buf[80];
  1647. fprint(2, "dump %p %d\n", a, na);
  1648. buf[0] = '\0';
  1649. for(i=0; i<na; i++){
  1650. sprint(buf+strlen(buf), " %.2ux", a[i]);
  1651. if(i%16 == 7)
  1652. sprint(buf+strlen(buf), " --");
  1653. if(i%16==15){
  1654. sprint(buf+strlen(buf), "\n");
  1655. write(2, buf, strlen(buf));
  1656. buf[0] = '\0';
  1657. }
  1658. }
  1659. if(i%16){
  1660. sprint(buf+strlen(buf), "\n");
  1661. write(2, buf, strlen(buf));
  1662. }
  1663. }
  1664. static void
  1665. mediainproc(PPP *ppp)
  1666. {
  1667. Block *b;
  1668. Ipaddr remote;
  1669. notify(catchdie);
  1670. while(!dying){
  1671. b = pppread(ppp);
  1672. if(b == nil){
  1673. syslog(0, LOG, "pppread return nil");
  1674. break;
  1675. }
  1676. ppp->stat.iprecv++;
  1677. if(ppp->ipcp->state != Sopened) {
  1678. ppp->stat.iprecvnotup++;
  1679. freeb(b);
  1680. continue;
  1681. }
  1682. if(server) {
  1683. v4tov6(remote, b->rptr+12);
  1684. if(ipcmp(remote, ppp->remote) != 0) {
  1685. ppp->stat.iprecvbadsrc++;
  1686. freeb(b);
  1687. continue;
  1688. }
  1689. }
  1690. if(debug > 1){
  1691. netlog("ip write pkt %p %d\n", b->rptr, blen(b));
  1692. hexdump(b->rptr, blen(b));
  1693. }
  1694. if(write(ppp->ipfd, b->rptr, blen(b)) < 0) {
  1695. syslog(0, LOG, "error writing to pktifc");
  1696. freeb(b);
  1697. break;
  1698. }
  1699. freeb(b);
  1700. }
  1701. netlog(": remote=%I: ppp shutting down\n", ppp->remote);
  1702. syslog(0, LOG, ": remote=%I: ppp shutting down", ppp->remote);
  1703. syslog(0, LOG, "\t\tppp send = %lud/%lud recv= %lud/%lud",
  1704. ppp->out.packets, ppp->out.uchars,
  1705. ppp->in.packets, ppp->in.uchars);
  1706. syslog(0, LOG, "\t\tip send=%lud", ppp->stat.ipsend);
  1707. syslog(0, LOG, "\t\tip recv=%lud notup=%lud badsrc=%lud",
  1708. ppp->stat.iprecv, ppp->stat.iprecvnotup, ppp->stat.iprecvbadsrc);
  1709. syslog(0, LOG, "\t\tcompress=%lud in=%lud out=%lud reset=%lud",
  1710. ppp->stat.comp, ppp->stat.compin, ppp->stat.compout, ppp->stat.compreset);
  1711. syslog(0, LOG, "\t\tuncompress=%lud in=%lud out=%lud reset=%lud",
  1712. ppp->stat.uncomp, ppp->stat.uncompin, ppp->stat.uncompout,
  1713. ppp->stat.uncompreset);
  1714. syslog(0, LOG, "\t\tvjin=%lud vjout=%lud vjfail=%lud",
  1715. ppp->stat.vjin, ppp->stat.vjout, ppp->stat.vjfail);
  1716. }
  1717. /*
  1718. * link quality management
  1719. */
  1720. static void
  1721. getlqm(PPP *ppp, Block *b)
  1722. {
  1723. Qualpkt *p;
  1724. p = (Qualpkt*)b->rptr;
  1725. if(BLEN(b) == sizeof(Qualpkt)){
  1726. ppp->in.reports++;
  1727. ppp->pout.reports = nhgetl(p->peeroutreports);
  1728. ppp->pout.packets = nhgetl(p->peeroutpackets);
  1729. ppp->pout.uchars = nhgetl(p->peeroutuchars);
  1730. ppp->pin.reports = nhgetl(p->peerinreports);
  1731. ppp->pin.packets = nhgetl(p->peerinpackets);
  1732. ppp->pin.discards = nhgetl(p->peerindiscards);
  1733. ppp->pin.errors = nhgetl(p->peerinerrors);
  1734. ppp->pin.uchars = nhgetl(p->peerinuchars);
  1735. /* save our numbers at time of reception */
  1736. memmove(&ppp->sin, &ppp->in, sizeof(Qualstats));
  1737. }
  1738. freeb(b);
  1739. if(ppp->period == 0)
  1740. putlqm(ppp);
  1741. }
  1742. static void
  1743. putlqm(PPP *ppp)
  1744. {
  1745. Qualpkt *p;
  1746. Block *b;
  1747. b = allocb(sizeof(Qualpkt));
  1748. b->wptr += sizeof(Qualpkt);
  1749. p = (Qualpkt*)b->rptr;
  1750. hnputl(p->magic, 0);
  1751. /* heresay (what he last told us) */
  1752. hnputl(p->lastoutreports, ppp->pout.reports);
  1753. hnputl(p->lastoutpackets, ppp->pout.packets);
  1754. hnputl(p->lastoutuchars, ppp->pout.uchars);
  1755. /* our numbers at time of last reception */
  1756. hnputl(p->peerinreports, ppp->sin.reports);
  1757. hnputl(p->peerinpackets, ppp->sin.packets);
  1758. hnputl(p->peerindiscards, ppp->sin.discards);
  1759. hnputl(p->peerinerrors, ppp->sin.errors);
  1760. hnputl(p->peerinuchars, ppp->sin.uchars);
  1761. /* our numbers now */
  1762. hnputl(p->peeroutreports, ppp->out.reports+1);
  1763. hnputl(p->peeroutpackets, ppp->out.packets+1);
  1764. hnputl(p->peeroutuchars, ppp->out.uchars+53/*hack*/);
  1765. putframe(ppp, Plqm, b);
  1766. freeb(b);
  1767. ppp->out.reports++;
  1768. }
  1769. /*
  1770. * init challenge response dialog
  1771. */
  1772. static void
  1773. chapinit(PPP *ppp)
  1774. {
  1775. Block *b;
  1776. Lcpmsg *m;
  1777. Chap *c;
  1778. int len;
  1779. char *aproto;
  1780. getauth(ppp);
  1781. c = ppp->chap;
  1782. c->id++;
  1783. switch(c->proto){
  1784. default:
  1785. abort();
  1786. case APmd5:
  1787. aproto = "chap";
  1788. break;
  1789. case APmschap:
  1790. aproto = "mschap";
  1791. break;
  1792. }
  1793. if((c->cs = auth_challenge("proto=%q role=server", aproto)) == nil)
  1794. sysfatal("auth_challenge: %r");
  1795. syslog(0, LOG, ": remote=%I: sending %d byte challenge", ppp->remote, c->cs->nchal);
  1796. len = 4 + 1 + c->cs->nchal + strlen(ppp->chapname);
  1797. b = alloclcp(Cchallenge, c->id, len, &m);
  1798. *b->wptr++ = c->cs->nchal;
  1799. memmove(b->wptr, c->cs->chal, c->cs->nchal);
  1800. b->wptr += c->cs->nchal;
  1801. memmove(b->wptr, ppp->chapname, strlen(ppp->chapname));
  1802. b->wptr += strlen(ppp->chapname);
  1803. hnputs(m->len, len);
  1804. putframe(ppp, Pchap, b);
  1805. freeb(b);
  1806. c->state = Cchalsent;
  1807. }
  1808. /*
  1809. * BUG factotum should do this
  1810. */
  1811. enum {
  1812. MShashlen = 16,
  1813. MSresplen = 24,
  1814. MSchallen = 8,
  1815. };
  1816. void
  1817. desencrypt(uchar data[8], uchar key[7])
  1818. {
  1819. ulong ekey[32];
  1820. key_setup(key, ekey);
  1821. block_cipher(ekey, data, 0);
  1822. }
  1823. void
  1824. nthash(uchar hash[MShashlen], char *passwd)
  1825. {
  1826. uchar buf[512];
  1827. int i;
  1828. for(i=0; *passwd && i<sizeof(buf); passwd++) {
  1829. buf[i++] = *passwd;
  1830. buf[i++] = 0;
  1831. }
  1832. memset(hash, 0, 16);
  1833. md4(buf, i, hash, 0);
  1834. }
  1835. void
  1836. mschalresp(uchar resp[MSresplen], uchar hash[MShashlen], uchar chal[MSchallen])
  1837. {
  1838. int i;
  1839. uchar buf[21];
  1840. memset(buf, 0, sizeof(buf));
  1841. memcpy(buf, hash, MShashlen);
  1842. for(i=0; i<3; i++) {
  1843. memmove(resp+i*MSchallen, chal, MSchallen);
  1844. desencrypt(resp+i*MSchallen, buf+i*7);
  1845. }
  1846. }
  1847. /*
  1848. * challenge response dialog
  1849. */
  1850. extern int _asrdresp(int, uchar*, int);
  1851. static void
  1852. getchap(PPP *ppp, Block *b)
  1853. {
  1854. AuthInfo *ai;
  1855. Lcpmsg *m;
  1856. int len, vlen, i, id, n, nresp;
  1857. char md5buf[512], code;
  1858. Chap *c;
  1859. Chapreply cr;
  1860. MSchapreply mscr;
  1861. char uid[PATH];
  1862. uchar digest[16], *p, *resp, sdigest[SHA1dlen];
  1863. uchar mshash[MShashlen], mshash2[MShashlen];
  1864. DigestState *s;
  1865. uchar msresp[2*MSresplen+1];
  1866. m = (Lcpmsg*)b->rptr;
  1867. len = nhgets(m->len);
  1868. if(BLEN(b) < len){
  1869. syslog(0, LOG, "short chap message");
  1870. freeb(b);
  1871. return;
  1872. }
  1873. qlock(ppp);
  1874. switch(m->code){
  1875. case Cchallenge:
  1876. getauth(ppp);
  1877. vlen = m->data[0];
  1878. if(vlen > len - 5) {
  1879. netlog("PPP: chap: bad challenge len\n");
  1880. break;
  1881. }
  1882. id = m->id;
  1883. switch(ppp->chap->proto){
  1884. default:
  1885. abort();
  1886. case APmd5:
  1887. md5buf[0] = m->id;
  1888. strcpy(md5buf+1, ppp->secret);
  1889. n = strlen(ppp->secret) + 1;
  1890. memmove(md5buf+n, m->data+1, vlen);
  1891. n += vlen;
  1892. md5((uchar*)md5buf, n, digest, nil);
  1893. resp = digest;
  1894. nresp = 16;
  1895. break;
  1896. case APmschap:
  1897. nthash(mshash, ppp->secret);
  1898. memset(msresp, 0, sizeof msresp);
  1899. mschalresp(msresp+MSresplen, mshash, m->data+1);
  1900. resp = msresp;
  1901. nresp = sizeof msresp;
  1902. nthash(mshash, ppp->secret);
  1903. md4(mshash, 16, mshash2, 0);
  1904. s = sha1(mshash2, 16, 0, 0);
  1905. sha1(mshash2, 16, 0, s);
  1906. sha1(m->data+1, 8, sdigest, s);
  1907. memmove(ppp->key, sdigest, 16);
  1908. break;
  1909. }
  1910. len = 4 + 1 + nresp + strlen(ppp->chapname);
  1911. freeb(b);
  1912. b = alloclcp(Cresponse, id, len, &m);
  1913. *b->wptr++ = nresp;
  1914. memmove(b->wptr, resp, nresp);
  1915. b->wptr += nresp;
  1916. memmove(b->wptr, ppp->chapname, strlen(ppp->chapname));
  1917. b->wptr += strlen(ppp->chapname);
  1918. hnputs(m->len, len);
  1919. netlog("PPP: sending response len %d\n", len);
  1920. putframe(ppp, Pchap, b);
  1921. break;
  1922. case Cresponse:
  1923. c = ppp->chap;
  1924. vlen = m->data[0];
  1925. if(m->id != c->id) {
  1926. netlog("PPP: chap: bad response id\n");
  1927. break;
  1928. }
  1929. switch(c->proto) {
  1930. default:
  1931. sysfatal("unknown chap protocol: %d", c->proto);
  1932. case APmd5:
  1933. if(vlen > len - 5 || vlen != 16) {
  1934. netlog("PPP: chap: bad response len\n");
  1935. break;
  1936. }
  1937. cr.id = m->id;
  1938. memmove(cr.resp, m->data+1, 16);
  1939. memset(uid, 0, sizeof(uid));
  1940. n = len-5-vlen;
  1941. if(n >= PATH)
  1942. n = PATH-1;
  1943. memmove(uid, m->data+1+vlen, n);
  1944. c->cs->user = uid;
  1945. c->cs->resp = &cr;
  1946. c->cs->nresp = sizeof cr;
  1947. break;
  1948. case APmschap:
  1949. if(vlen > len - 5 || vlen != 49) {
  1950. netlog("PPP: chap: bad response len\n");
  1951. break;
  1952. }
  1953. memset(&mscr, 0, sizeof(mscr));
  1954. memmove(mscr.LMresp, m->data+1, 24);
  1955. memmove(mscr.NTresp, m->data+24+1, 24);
  1956. n = len-5-vlen;
  1957. p = m->data+1+vlen;
  1958. /* remove domain name */
  1959. for(i=0; i<n; i++) {
  1960. if(p[i] == '\\') {
  1961. p += i+1;
  1962. n -= i+1;
  1963. break;
  1964. }
  1965. }
  1966. if(n >= PATH)
  1967. n = PATH-1;
  1968. memset(uid, 0, sizeof(uid));
  1969. memmove(uid, p, n);
  1970. c->cs->user = uid;
  1971. c->cs->resp = &mscr;
  1972. c->cs->nresp = sizeof mscr;
  1973. break;
  1974. }
  1975. syslog(0, LOG, ": remote=%I vlen %d proto %d response user %s nresp %d", ppp->remote, vlen, c->proto, c->cs->user, c->cs->nresp);
  1976. if((ai = auth_response(c->cs)) == nil || auth_chuid(ai, nil) < 0){
  1977. c->state = Cunauth;
  1978. code = Cfailure;
  1979. syslog(0, LOG, ": remote=%I: auth failed: %r, uid=%s", ppp->remote, uid);
  1980. }else{
  1981. c->state = Cauthok;
  1982. code = Csuccess;
  1983. syslog(0, LOG, ": remote=%I: auth ok: uid=%s nsecret=%d", ppp->remote, uid, ai->nsecret);
  1984. if(c->proto == APmschap){
  1985. if(ai->nsecret != sizeof(ppp->key))
  1986. sysfatal("could not get the encryption key");
  1987. memmove(ppp->key, ai->secret, sizeof(ppp->key));
  1988. }
  1989. }
  1990. auth_freeAI(ai);
  1991. auth_freechal(c->cs);
  1992. c->cs = nil;
  1993. freeb(b);
  1994. /* send reply */
  1995. len = 4;
  1996. b = alloclcp(code, c->id, len, &m);
  1997. hnputs(m->len, len);
  1998. putframe(ppp, Pchap, b);
  1999. if(c->state == Cauthok) {
  2000. setphase(ppp, Pnet);
  2001. } else {
  2002. /* restart chapp negotiation */
  2003. chapinit(ppp);
  2004. }
  2005. break;
  2006. case Csuccess:
  2007. netlog("ppp: chap succeeded\n");
  2008. break;
  2009. case Cfailure:
  2010. netlog("ppp: chap failed\n");
  2011. break;
  2012. default:
  2013. syslog(0, LOG, "chap code %d?\n", m->code);
  2014. break;
  2015. }
  2016. qunlock(ppp);
  2017. freeb(b);
  2018. }
  2019. static void
  2020. putpaprequest(PPP *ppp)
  2021. {
  2022. Block *b;
  2023. Lcpmsg *m;
  2024. Chap *c;
  2025. int len, nlen, slen;
  2026. getauth(ppp);
  2027. c = ppp->chap;
  2028. c->id++;
  2029. netlog("PPP: pap: send authreq %d %s %s\n", c->id, ppp->chapname, "****");
  2030. nlen = strlen(ppp->chapname);
  2031. slen = strlen(ppp->secret);
  2032. len = 4 + 1 + nlen + 1 + slen;
  2033. b = alloclcp(Pauthreq, c->id, len, &m);
  2034. *b->wptr++ = nlen;
  2035. memmove(b->wptr, ppp->chapname, nlen);
  2036. b->wptr += nlen;
  2037. *b->wptr++ = slen;
  2038. memmove(b->wptr, ppp->secret, slen);
  2039. b->wptr += slen;
  2040. hnputs(m->len, len);
  2041. putframe(ppp, Ppasswd, b);
  2042. freeb(b);
  2043. }
  2044. static void
  2045. papinit(PPP *ppp)
  2046. {
  2047. ppp->chap->id = 0;
  2048. putpaprequest(ppp);
  2049. }
  2050. static void
  2051. getpap(PPP *ppp, Block *b)
  2052. {
  2053. Lcpmsg *m;
  2054. int len;
  2055. m = (Lcpmsg*)b->rptr;
  2056. len = 4;
  2057. if(BLEN(b) < 4 || BLEN(b) < (len = nhgets(m->len))){
  2058. syslog(0, LOG, "short pap message (%ld < %d)", BLEN(b), len);
  2059. freeb(b);
  2060. return;
  2061. }
  2062. if(len < sizeof(Lcpmsg))
  2063. m->data[0] = 0;
  2064. qlock(ppp);
  2065. switch(m->code){
  2066. case Pauthreq:
  2067. netlog("PPP: pap auth request, not supported\n");
  2068. break;
  2069. case Pauthack:
  2070. if(ppp->phase == Pauth
  2071. && ppp->chap->proto == APpasswd
  2072. && m->id <= ppp-> chap->id){
  2073. netlog("PPP: pap succeeded\n");
  2074. setphase(ppp, Pnet);
  2075. }
  2076. break;
  2077. case Pauthnak:
  2078. if(ppp->phase == Pauth
  2079. && ppp->chap->proto == APpasswd
  2080. && m->id <= ppp-> chap->id){
  2081. netlog("PPP: pap failed (%d:%.*s)\n",
  2082. m->data[0], m->data[0], (char*)m->data+1);
  2083. terminate(ppp, 0);
  2084. }
  2085. break;
  2086. default:
  2087. netlog("PPP: unknown pap messsage %d\n", m->code);
  2088. }
  2089. qunlock(ppp);
  2090. freeb(b);
  2091. }
  2092. static void
  2093. printopts(Pstate *p, Block *b, int send)
  2094. {
  2095. Lcpmsg *m;
  2096. Lcpopt *o;
  2097. int proto, x, period;
  2098. uchar *cp;
  2099. char *code, *dir;
  2100. m = (Lcpmsg*)b->rptr;
  2101. switch(m->code) {
  2102. default: code = "<unknown>"; break;
  2103. case Lconfreq: code = "confrequest"; break;
  2104. case Lconfack: code = "confack"; break;
  2105. case Lconfnak: code = "confnak"; break;
  2106. case Lconfrej: code = "confreject"; break;
  2107. }
  2108. if(send)
  2109. dir = "send";
  2110. else
  2111. dir = "recv";
  2112. netlog("ppp: %s %s: id=%d\n", dir, code, m->id);
  2113. for(cp = m->data; cp < b->wptr; cp += o->len){
  2114. o = (Lcpopt*)cp;
  2115. if(cp + o->len > b->wptr){
  2116. netlog("\tbad option length %ux\n", o->type);
  2117. return;
  2118. }
  2119. switch(p->proto){
  2120. case Plcp:
  2121. switch(o->type){
  2122. default:
  2123. netlog("\tunknown %d len=%d\n", o->type, o->len);
  2124. break;
  2125. case Omtu:
  2126. netlog("\tmtu = %d\n", nhgets(o->data));
  2127. break;
  2128. case Octlmap:
  2129. netlog("\tctlmap = %ux\n", nhgetl(o->data));
  2130. break;
  2131. case Oauth:
  2132. netlog("\tauth = %ux", nhgetl(o->data));
  2133. proto = nhgets(o->data);
  2134. switch(proto) {
  2135. default:
  2136. netlog("unknown auth proto %d\n", proto);
  2137. break;
  2138. case Ppasswd:
  2139. netlog("password\n");
  2140. break;
  2141. case Pchap:
  2142. netlog("chap %ux\n", o->data[2]);
  2143. break;
  2144. }
  2145. break;
  2146. case Oquality:
  2147. proto = nhgets(o->data);
  2148. switch(proto) {
  2149. default:
  2150. netlog("\tunknown quality proto %d\n", proto);
  2151. break;
  2152. case Plqm:
  2153. x = nhgetl(o->data+2)*10;
  2154. period = (x+Period-1)/Period;
  2155. netlog("\tlqm period = %d\n", period);
  2156. break;
  2157. }
  2158. case Omagic:
  2159. netlog("\tmagic = %ux\n", nhgetl(o->data));
  2160. break;
  2161. case Opc:
  2162. netlog("\tprotocol compress\n");
  2163. break;
  2164. case Oac:
  2165. netlog("\taddr compress\n");
  2166. break;
  2167. }
  2168. break;
  2169. case Pccp:
  2170. switch(o->type){
  2171. default:
  2172. netlog("\tunknown %d len=%d\n", o->type, o->len);
  2173. break;
  2174. case Ocoui:
  2175. netlog("\tOUI\n");
  2176. break;
  2177. case Ocstac:
  2178. netlog("\tstac LZS\n");
  2179. break;
  2180. case Ocmppc:
  2181. netlog("\tMicrosoft PPC len=%d %ux\n", o->len, nhgetl(o->data));
  2182. break;
  2183. case Octhwack:
  2184. netlog("\tThwack\n");
  2185. break;
  2186. }
  2187. break;
  2188. case Pecp:
  2189. switch(o->type){
  2190. default:
  2191. netlog("\tunknown %d len=%d\n", o->type, o->len);
  2192. break;
  2193. case Oeoui:
  2194. netlog("\tOUI\n");
  2195. break;
  2196. case Oedese:
  2197. netlog("\tDES\n");
  2198. break;
  2199. }
  2200. break;
  2201. case Pipcp:
  2202. switch(o->type){
  2203. default:
  2204. netlog("\tunknown %d len=%d\n", o->type, o->len);
  2205. break;
  2206. case Oipaddrs:
  2207. netlog("\tip addrs - deprecated\n");
  2208. break;
  2209. case Oipcompress:
  2210. netlog("\tip compress\n");
  2211. break;
  2212. case Oipaddr:
  2213. netlog("\tip addr %V\n", o->data);
  2214. break;
  2215. case Oipdns:
  2216. netlog("\tdns addr %V\n", o->data);
  2217. break;
  2218. case Oipwins:
  2219. netlog("\twins addr %V\n", o->data);
  2220. break;
  2221. case Oipdns2:
  2222. netlog("\tdns2 addr %V\n", o->data);
  2223. break;
  2224. case Oipwins2:
  2225. netlog("\twins2 addr %V\n", o->data);
  2226. break;
  2227. }
  2228. break;
  2229. }
  2230. }
  2231. }
  2232. static void
  2233. sendtermreq(PPP *ppp, Pstate *p)
  2234. {
  2235. Block *b;
  2236. Lcpmsg *m;
  2237. p->termid = ++(p->id);
  2238. b = alloclcp(Ltermreq, p->termid, 4, &m);
  2239. hnputs(m->len, 4);
  2240. putframe(ppp, p->proto, b);
  2241. freeb(b);
  2242. newstate(ppp, p, Sclosing);
  2243. }
  2244. static void
  2245. sendechoreq(PPP *ppp, Pstate *p)
  2246. {
  2247. Block *b;
  2248. Lcpmsg *m;
  2249. p->termid = ++(p->id);
  2250. b = alloclcp(Lechoreq, p->id, 4, &m);
  2251. hnputs(m->len, 4);
  2252. putframe(ppp, p->proto, b);
  2253. freeb(b);
  2254. }
  2255. enum
  2256. {
  2257. CtrlD = 0x4,
  2258. CtrlE = 0x5,
  2259. CtrlO = 0xf,
  2260. Cr = 13,
  2261. View = 0x80,
  2262. };
  2263. int conndone;
  2264. static void
  2265. xfer(int fd)
  2266. {
  2267. int i, n;
  2268. uchar xbuf[128];
  2269. for(;;) {
  2270. n = read(fd, xbuf, sizeof(xbuf));
  2271. if(n < 0)
  2272. break;
  2273. if(conndone)
  2274. break;
  2275. for(i = 0; i < n; i++)
  2276. if(xbuf[i] == Cr)
  2277. xbuf[i] = ' ';
  2278. write(1, xbuf, n);
  2279. }
  2280. close(fd);
  2281. }
  2282. static int
  2283. readcr(int fd, char *buf, int nbuf)
  2284. {
  2285. char c;
  2286. int n, tot;
  2287. tot = 0;
  2288. while((n=read(fd, &c, 1)) == 1){
  2289. if(c == '\n'){
  2290. buf[tot] = 0;
  2291. return tot;
  2292. }
  2293. buf[tot++] = c;
  2294. if(tot == nbuf)
  2295. sysfatal("line too long in readcr");
  2296. }
  2297. return n;
  2298. }
  2299. static void
  2300. connect(int fd, int cfd)
  2301. {
  2302. int n, ctl;
  2303. char xbuf[128];
  2304. if (chatfile) {
  2305. int chatfd, lineno, nb;
  2306. char *buf, *p, *s, response[128];
  2307. Dir *dir;
  2308. if ((chatfd = open(chatfile, OREAD)) < 0)
  2309. sysfatal("cannot open %s: %r", chatfile);
  2310. if ((dir = dirfstat(chatfd)) == nil)
  2311. sysfatal("cannot fstat %s: %r",chatfile);
  2312. buf = (char *)malloc(dir->length + 1);
  2313. assert(buf);
  2314. if ((nb = read(chatfd, buf, dir->length)) < 0)
  2315. sysfatal("cannot read chatfile %s: %r", chatfile);
  2316. assert(nb == dir->length);
  2317. buf[dir->length] = '\0';
  2318. free(dir);
  2319. close(chatfd);
  2320. p = buf;
  2321. lineno = 0;
  2322. while (1) {
  2323. char *_args[3];
  2324. if ((s = strchr(p, '\n')) == nil)
  2325. break;
  2326. *s++ = '\0';
  2327. lineno++;
  2328. if (*p == '#') {
  2329. p = s;
  2330. continue;
  2331. }
  2332. if (tokenize(p, _args, 3) != 2)
  2333. sysfatal("invalid line %d (line expected: 'send' 'expect')",
  2334. lineno);
  2335. if (debug)
  2336. print("sending %s, expecting %s\n", _args[0], _args[1]);
  2337. if(strlen(_args[0])){
  2338. nb = fprint(fd, "%s\r", _args[0]);
  2339. assert(nb > 0);
  2340. }
  2341. if (strlen(_args[1]) > 0) {
  2342. if ((nb = readcr(fd, response, sizeof response-1)) < 0)
  2343. sysfatal("cannot read response from: %r");
  2344. if (debug)
  2345. print("response %s\n", response);
  2346. if (nb == 0)
  2347. sysfatal("eof on input?\n");
  2348. if (cistrstr(response, _args[1]) == nil)
  2349. sysfatal("expected %s, got %s\n", _args[1], response);
  2350. }
  2351. p = s;
  2352. }
  2353. free(buf);
  2354. return;
  2355. }
  2356. print("Connect to file system now, type ctrl-d when done.\n");
  2357. print("...(Use the view or down arrow key to send a break)\n");
  2358. print("...(Use ctrl-e to set even parity or ctrl-o for odd)\n");
  2359. ctl = open("/dev/consctl", OWRITE);
  2360. if(ctl < 0)
  2361. sysfatal("opening consctl");
  2362. fprint(ctl, "rawon");
  2363. fd = dup(fd, -1);
  2364. conndone = 0;
  2365. switch(rfork(RFPROC|RFMEM|RFNOWAIT)){
  2366. case -1:
  2367. sysfatal("forking xfer");
  2368. case 0:
  2369. xfer(fd);
  2370. _exits(nil);
  2371. }
  2372. for(;;){
  2373. read(0, xbuf, 1);
  2374. switch(xbuf[0]&0xff) {
  2375. case CtrlD: /* done */
  2376. conndone = 1;
  2377. close(ctl);
  2378. print("\n");
  2379. return;
  2380. case CtrlE: /* set even parity */
  2381. fprint(cfd, "pe");
  2382. break;
  2383. case CtrlO: /* set odd parity */
  2384. fprint(cfd, "po");
  2385. break;
  2386. case View: /* send a break */
  2387. fprint(cfd, "k500");
  2388. break;
  2389. default:
  2390. n = write(fd, xbuf, 1);
  2391. if(n < 0) {
  2392. errstr(xbuf, sizeof(xbuf));
  2393. conndone = 1;
  2394. close(ctl);
  2395. print("[remote write error (%s)]\n", xbuf);
  2396. return;
  2397. }
  2398. }
  2399. }
  2400. }
  2401. int interactive;
  2402. void
  2403. usage(void)
  2404. {
  2405. fprint(2, "usage: ppp [-cCdfPSu] [-b baud] [-k keyspec] [-m mtu] [-p dev] [-s username] [-x netmntpt] [-t modemcmd] [local-addr [remote-addr]]\n");
  2406. exits("usage");
  2407. }
  2408. void
  2409. main(int argc, char **argv)
  2410. {
  2411. int mtu, baud, framing, user, mediain, mediaout, cfd;
  2412. Ipaddr ipaddr, remip;
  2413. char *dev, *modemcmd;
  2414. char net[128];
  2415. PPP *ppp;
  2416. char buf[128];
  2417. rfork(RFREND|RFNOTEG|RFNAMEG);
  2418. fmtinstall('I', eipfmt);
  2419. fmtinstall('V', eipfmt);
  2420. fmtinstall('E', eipfmt);
  2421. dev = nil;
  2422. invalidate(ipaddr);
  2423. invalidate(remip);
  2424. mtu = Defmtu;
  2425. baud = 0;
  2426. framing = 0;
  2427. setnetmtpt(net, sizeof(net), nil);
  2428. user = 0;
  2429. modemcmd = nil;
  2430. ARGBEGIN{
  2431. case 'b':
  2432. baud = atoi(EARGF(usage()));
  2433. if(baud < 0)
  2434. baud = 0;
  2435. break;
  2436. case 'c':
  2437. nocompress = 1;
  2438. break;
  2439. case 'C':
  2440. noipcompress = 1;
  2441. break;
  2442. case 'd':
  2443. debug++;
  2444. break;
  2445. case 'f':
  2446. framing = 1;
  2447. break;
  2448. case 'F':
  2449. pppframing = 0;
  2450. break;
  2451. case 'k':
  2452. keyspec = EARGF(usage());
  2453. break;
  2454. case 'm':
  2455. mtu = atoi(EARGF(usage()));
  2456. if(mtu < Minmtu)
  2457. mtu = Minmtu;
  2458. if(mtu > Maxmtu)
  2459. mtu = Maxmtu;
  2460. break;
  2461. case 'M':
  2462. chatfile = EARGF(usage());
  2463. break;
  2464. case 'p':
  2465. dev = EARGF(usage());
  2466. break;
  2467. case 'P':
  2468. primary = 1;
  2469. break;
  2470. case 'S':
  2471. server = 1;
  2472. break;
  2473. case 't':
  2474. modemcmd = EARGF(usage());
  2475. break;
  2476. case 'u':
  2477. user = 1;
  2478. break;
  2479. case 'x':
  2480. setnetmtpt(net, sizeof net, EARGF(usage()));
  2481. break;
  2482. default:
  2483. fprint(2, "unknown option %c\n", ARGC());
  2484. usage();
  2485. }ARGEND;
  2486. switch(argc){
  2487. case 2:
  2488. parseip(remip, argv[1]);
  2489. case 1:
  2490. parseip(ipaddr, argv[0]);
  2491. case 0:
  2492. break;
  2493. default:
  2494. usage();
  2495. }
  2496. nip = nipifcs(net);
  2497. if(nip == 0 && !server)
  2498. primary = 1;
  2499. if(dev != nil){
  2500. mediain = open(dev, ORDWR);
  2501. if(mediain < 0){
  2502. if(strchr(dev, '!')){
  2503. if((mediain = dial(dev, 0, 0, &cfd)) == -1){
  2504. fprint(2, "ppp: couldn't dial %s: %r\n", dev);
  2505. exits(dev);
  2506. }
  2507. } else {
  2508. fprint(2, "ppp: couldn't open %s\n", dev);
  2509. exits(dev);
  2510. }
  2511. } else {
  2512. snprint(buf, sizeof buf, "%sctl", dev);
  2513. cfd = open(buf, ORDWR);
  2514. }
  2515. if(cfd > 0){
  2516. if(baud)
  2517. fprint(cfd, "b%d", baud);
  2518. fprint(cfd, "m1"); /* cts/rts flow control (and fifo's) on */
  2519. fprint(cfd, "q64000"); /* increase q size to 64k */
  2520. fprint(cfd, "n1"); /* nonblocking writes on */
  2521. fprint(cfd, "r1"); /* rts on */
  2522. fprint(cfd, "d1"); /* dtr on */
  2523. fprint(cfd, "c1"); /* dcdhup on */
  2524. if(user || chatfile)
  2525. connect(mediain, cfd);
  2526. close(cfd);
  2527. } else {
  2528. if(user || chatfile)
  2529. connect(mediain, -1);
  2530. }
  2531. mediaout = mediain;
  2532. } else {
  2533. mediain = open("/fd/0", OREAD);
  2534. if(mediain < 0){
  2535. fprint(2, "ppp: couldn't open /fd/0\n");
  2536. exits("/fd/0");
  2537. }
  2538. mediaout = open("/fd/1", OWRITE);
  2539. if(mediaout < 0){
  2540. fprint(2, "ppp: couldn't open /fd/0\n");
  2541. exits("/fd/1");
  2542. }
  2543. }
  2544. if(modemcmd != nil && mediaout >= 0)
  2545. fprint(mediaout, "%s\r", modemcmd);
  2546. ppp = mallocz(sizeof(*ppp), 1);
  2547. pppopen(ppp, mediain, mediaout, net, ipaddr, remip, mtu, framing);
  2548. /* wait until ip is configured */
  2549. rendezvous(Rmagic, 0);
  2550. if(primary){
  2551. /* create a /net/ndb entry */
  2552. putndb(ppp, net);
  2553. }
  2554. exits(0);
  2555. }
  2556. void
  2557. netlog(char *fmt, ...)
  2558. {
  2559. va_list arg;
  2560. char *m;
  2561. static long start;
  2562. long now;
  2563. if(debug == 0)
  2564. return;
  2565. now = time(0);
  2566. if(start == 0)
  2567. start = now;
  2568. va_start(arg, fmt);
  2569. m = vsmprint(fmt, arg);
  2570. fprint(2, "%ld %s", now-start, m);
  2571. free(m);
  2572. va_end(arg);
  2573. }
  2574. /*
  2575. * return non-zero if this is a valid v4 address
  2576. */
  2577. static int
  2578. validv4(Ipaddr addr)
  2579. {
  2580. return memcmp(addr, v4prefix, IPv4off) == 0 && memcmp(addr, v4prefix, IPaddrlen) != 0;
  2581. }
  2582. static void
  2583. invalidate(Ipaddr addr)
  2584. {
  2585. ipmove(addr, IPnoaddr);
  2586. }
  2587. /*
  2588. * return number of networks
  2589. */
  2590. static int
  2591. nipifcs(char *net)
  2592. {
  2593. static Ipifc *ifc;
  2594. Ipifc *nifc;
  2595. Iplifc *lifc;
  2596. int n;
  2597. n = 0;
  2598. ifc = readipifc(net, ifc, -1);
  2599. for(nifc = ifc; nifc != nil; nifc = nifc->next)
  2600. for(lifc = ifc->lifc; lifc != nil; lifc = lifc->next)
  2601. n++;
  2602. return n;
  2603. }
  2604. /*
  2605. * make an ndb entry and put it into /net/ndb for the servers to see
  2606. */
  2607. static void
  2608. putndb(PPP *ppp, char *net)
  2609. {
  2610. char buf[1024];
  2611. char file[64];
  2612. char *p, *e;
  2613. int fd;
  2614. e = buf + sizeof(buf);
  2615. p = buf;
  2616. p = seprint(p, e, "ip=%I ipmask=255.255.255.255 ipgw=%I\n", ppp->local,
  2617. ppp->remote);
  2618. if(validv4(ppp->dns[0]))
  2619. p = seprint(p, e, "\tdns=%I", ppp->dns[0]);
  2620. if(validv4(ppp->dns[1]))
  2621. p = seprint(p, e, "\tdns=%I", ppp->dns[1]);
  2622. if(validv4(ppp->wins[0]))
  2623. p = seprint(p, e, "\twins=%I", ppp->wins[0]);
  2624. if(validv4(ppp->wins[1]))
  2625. p = seprint(p, e, "\twins=%I", ppp->wins[1]);
  2626. snprint(file, sizeof file, "%s/ndb", net);
  2627. fd = open(file, OWRITE);
  2628. if(fd < 0)
  2629. return;
  2630. write(fd, buf, p-buf);
  2631. close(fd);
  2632. }
  2633. static void
  2634. getauth(PPP *ppp)
  2635. {
  2636. UserPasswd *up;
  2637. if(*ppp->chapname)
  2638. return;
  2639. up = auth_getuserpasswd(auth_getkey,"proto=pass service=ppp %s", keyspec);
  2640. if(up != nil){
  2641. strcpy(ppp->chapname, up->user);
  2642. strcpy(ppp->secret, up->passwd);
  2643. }
  2644. }