ppp.c 58 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929930931932933934935936937938939940941942943944945946947948949950951952953954955956957958959960961962963964965966967968969970971972973974975976977978979980981982983984985986987988989990991992993994995996997998999100010011002100310041005100610071008100910101011101210131014101510161017101810191020102110221023102410251026102710281029103010311032103310341035103610371038103910401041104210431044104510461047104810491050105110521053105410551056105710581059106010611062106310641065106610671068106910701071107210731074107510761077107810791080108110821083108410851086108710881089109010911092109310941095109610971098109911001101110211031104110511061107110811091110111111121113111411151116111711181119112011211122112311241125112611271128112911301131113211331134113511361137113811391140114111421143114411451146114711481149115011511152115311541155115611571158115911601161116211631164116511661167116811691170117111721173117411751176117711781179118011811182118311841185118611871188118911901191119211931194119511961197119811991200120112021203120412051206120712081209121012111212121312141215121612171218121912201221122212231224122512261227122812291230123112321233123412351236123712381239124012411242124312441245124612471248124912501251125212531254125512561257125812591260126112621263126412651266126712681269127012711272127312741275127612771278127912801281128212831284128512861287128812891290129112921293129412951296129712981299130013011302130313041305130613071308130913101311131213131314131513161317131813191320132113221323132413251326132713281329133013311332133313341335133613371338133913401341134213431344134513461347134813491350135113521353135413551356135713581359136013611362136313641365136613671368136913701371137213731374137513761377137813791380138113821383138413851386138713881389139013911392139313941395139613971398139914001401140214031404140514061407140814091410141114121413141414151416141714181419142014211422142314241425142614271428142914301431143214331434143514361437143814391440144114421443144414451446144714481449145014511452145314541455145614571458145914601461146214631464146514661467146814691470147114721473147414751476147714781479148014811482148314841485148614871488148914901491149214931494149514961497149814991500150115021503150415051506150715081509151015111512151315141515151615171518151915201521152215231524152515261527152815291530153115321533153415351536153715381539154015411542154315441545154615471548154915501551155215531554155515561557155815591560156115621563156415651566156715681569157015711572157315741575157615771578157915801581158215831584158515861587158815891590159115921593159415951596159715981599160016011602160316041605160616071608160916101611161216131614161516161617161816191620162116221623162416251626162716281629163016311632163316341635163616371638163916401641164216431644164516461647164816491650165116521653165416551656165716581659166016611662166316641665166616671668166916701671167216731674167516761677167816791680168116821683168416851686168716881689169016911692169316941695169616971698169917001701170217031704170517061707170817091710171117121713171417151716171717181719172017211722172317241725172617271728172917301731173217331734173517361737173817391740174117421743174417451746174717481749175017511752175317541755175617571758175917601761176217631764176517661767176817691770177117721773177417751776177717781779178017811782178317841785178617871788178917901791179217931794179517961797179817991800180118021803180418051806180718081809181018111812181318141815181618171818181918201821182218231824182518261827182818291830183118321833183418351836183718381839184018411842184318441845184618471848184918501851185218531854185518561857185818591860186118621863186418651866186718681869187018711872187318741875187618771878187918801881188218831884188518861887188818891890189118921893189418951896189718981899190019011902190319041905190619071908190919101911191219131914191519161917191819191920192119221923192419251926192719281929193019311932193319341935193619371938193919401941194219431944194519461947194819491950195119521953195419551956195719581959196019611962196319641965196619671968196919701971197219731974197519761977197819791980198119821983198419851986198719881989199019911992199319941995199619971998199920002001200220032004200520062007200820092010201120122013201420152016201720182019202020212022202320242025202620272028202920302031203220332034203520362037203820392040204120422043204420452046204720482049205020512052205320542055205620572058205920602061206220632064206520662067206820692070207120722073207420752076207720782079208020812082208320842085208620872088208920902091209220932094209520962097209820992100210121022103210421052106210721082109211021112112211321142115211621172118211921202121212221232124212521262127212821292130213121322133213421352136213721382139214021412142214321442145214621472148214921502151215221532154215521562157215821592160216121622163216421652166216721682169217021712172217321742175217621772178217921802181218221832184218521862187218821892190219121922193219421952196219721982199220022012202220322042205220622072208220922102211221222132214221522162217221822192220222122222223222422252226222722282229223022312232223322342235223622372238223922402241224222432244224522462247224822492250225122522253225422552256225722582259226022612262226322642265226622672268226922702271227222732274227522762277227822792280228122822283228422852286228722882289229022912292229322942295229622972298229923002301230223032304230523062307230823092310231123122313231423152316231723182319232023212322232323242325232623272328232923302331233223332334233523362337233823392340234123422343234423452346234723482349235023512352235323542355235623572358235923602361236223632364236523662367236823692370237123722373237423752376237723782379238023812382238323842385238623872388238923902391239223932394239523962397239823992400240124022403240424052406240724082409241024112412241324142415241624172418241924202421242224232424242524262427242824292430243124322433243424352436243724382439244024412442244324442445244624472448244924502451245224532454245524562457245824592460246124622463246424652466246724682469247024712472247324742475247624772478247924802481248224832484248524862487248824892490249124922493249424952496249724982499250025012502250325042505250625072508250925102511251225132514251525162517251825192520252125222523252425252526252725282529253025312532253325342535253625372538253925402541254225432544254525462547254825492550255125522553255425552556255725582559256025612562256325642565256625672568256925702571257225732574257525762577257825792580258125822583258425852586258725882589259025912592259325942595259625972598259926002601260226032604260526062607260826092610261126122613261426152616261726182619262026212622262326242625262626272628262926302631263226332634263526362637263826392640264126422643264426452646264726482649265026512652265326542655265626572658265926602661266226632664266526662667266826692670267126722673267426752676267726782679268026812682268326842685268626872688268926902691269226932694269526962697269826992700270127022703270427052706270727082709271027112712271327142715271627172718271927202721272227232724272527262727272827292730273127322733273427352736273727382739274027412742274327442745274627472748274927502751275227532754275527562757275827592760276127622763276427652766276727682769277027712772277327742775277627772778277927802781278227832784278527862787278827892790279127922793279427952796279727982799280028012802280328042805280628072808280928102811281228132814281528162817281828192820282128222823282428252826282728282829283028312832283328342835283628372838283928402841284228432844284528462847284828492850285128522853285428552856285728582859286028612862286328642865286628672868286928702871287228732874287528762877287828792880288128822883288428852886288728882889289028912892289328942895289628972898289929002901290229032904290529062907290829092910291129122913291429152916291729182919292029212922292329242925292629272928292929302931
  1. #include <u.h>
  2. #include <libc.h>
  3. #include <auth.h>
  4. #include <bio.h>
  5. #include <ip.h>
  6. #include <libsec.h>
  7. #include <ndb.h>
  8. #include "ppp.h"
  9. #define PATH 128
  10. static int baud;
  11. static int nocompress;
  12. static int pppframing = 1;
  13. static int noipcompress;
  14. static int server;
  15. static int nip; /* number of ip interfaces */
  16. static int dying; /* flag to signal to all threads its time to go */
  17. static int primary; /* this is the primary IP interface */
  18. static char *chatfile;
  19. int debug;
  20. char* LOG = "ppp";
  21. char* keyspec = "";
  22. enum
  23. {
  24. Rmagic= 0x12345
  25. };
  26. /*
  27. * Calculate FCS - rfc 1331
  28. */
  29. ushort fcstab[256] =
  30. {
  31. 0x0000, 0x1189, 0x2312, 0x329b, 0x4624, 0x57ad, 0x6536, 0x74bf,
  32. 0x8c48, 0x9dc1, 0xaf5a, 0xbed3, 0xca6c, 0xdbe5, 0xe97e, 0xf8f7,
  33. 0x1081, 0x0108, 0x3393, 0x221a, 0x56a5, 0x472c, 0x75b7, 0x643e,
  34. 0x9cc9, 0x8d40, 0xbfdb, 0xae52, 0xdaed, 0xcb64, 0xf9ff, 0xe876,
  35. 0x2102, 0x308b, 0x0210, 0x1399, 0x6726, 0x76af, 0x4434, 0x55bd,
  36. 0xad4a, 0xbcc3, 0x8e58, 0x9fd1, 0xeb6e, 0xfae7, 0xc87c, 0xd9f5,
  37. 0x3183, 0x200a, 0x1291, 0x0318, 0x77a7, 0x662e, 0x54b5, 0x453c,
  38. 0xbdcb, 0xac42, 0x9ed9, 0x8f50, 0xfbef, 0xea66, 0xd8fd, 0xc974,
  39. 0x4204, 0x538d, 0x6116, 0x709f, 0x0420, 0x15a9, 0x2732, 0x36bb,
  40. 0xce4c, 0xdfc5, 0xed5e, 0xfcd7, 0x8868, 0x99e1, 0xab7a, 0xbaf3,
  41. 0x5285, 0x430c, 0x7197, 0x601e, 0x14a1, 0x0528, 0x37b3, 0x263a,
  42. 0xdecd, 0xcf44, 0xfddf, 0xec56, 0x98e9, 0x8960, 0xbbfb, 0xaa72,
  43. 0x6306, 0x728f, 0x4014, 0x519d, 0x2522, 0x34ab, 0x0630, 0x17b9,
  44. 0xef4e, 0xfec7, 0xcc5c, 0xddd5, 0xa96a, 0xb8e3, 0x8a78, 0x9bf1,
  45. 0x7387, 0x620e, 0x5095, 0x411c, 0x35a3, 0x242a, 0x16b1, 0x0738,
  46. 0xffcf, 0xee46, 0xdcdd, 0xcd54, 0xb9eb, 0xa862, 0x9af9, 0x8b70,
  47. 0x8408, 0x9581, 0xa71a, 0xb693, 0xc22c, 0xd3a5, 0xe13e, 0xf0b7,
  48. 0x0840, 0x19c9, 0x2b52, 0x3adb, 0x4e64, 0x5fed, 0x6d76, 0x7cff,
  49. 0x9489, 0x8500, 0xb79b, 0xa612, 0xd2ad, 0xc324, 0xf1bf, 0xe036,
  50. 0x18c1, 0x0948, 0x3bd3, 0x2a5a, 0x5ee5, 0x4f6c, 0x7df7, 0x6c7e,
  51. 0xa50a, 0xb483, 0x8618, 0x9791, 0xe32e, 0xf2a7, 0xc03c, 0xd1b5,
  52. 0x2942, 0x38cb, 0x0a50, 0x1bd9, 0x6f66, 0x7eef, 0x4c74, 0x5dfd,
  53. 0xb58b, 0xa402, 0x9699, 0x8710, 0xf3af, 0xe226, 0xd0bd, 0xc134,
  54. 0x39c3, 0x284a, 0x1ad1, 0x0b58, 0x7fe7, 0x6e6e, 0x5cf5, 0x4d7c,
  55. 0xc60c, 0xd785, 0xe51e, 0xf497, 0x8028, 0x91a1, 0xa33a, 0xb2b3,
  56. 0x4a44, 0x5bcd, 0x6956, 0x78df, 0x0c60, 0x1de9, 0x2f72, 0x3efb,
  57. 0xd68d, 0xc704, 0xf59f, 0xe416, 0x90a9, 0x8120, 0xb3bb, 0xa232,
  58. 0x5ac5, 0x4b4c, 0x79d7, 0x685e, 0x1ce1, 0x0d68, 0x3ff3, 0x2e7a,
  59. 0xe70e, 0xf687, 0xc41c, 0xd595, 0xa12a, 0xb0a3, 0x8238, 0x93b1,
  60. 0x6b46, 0x7acf, 0x4854, 0x59dd, 0x2d62, 0x3ceb, 0x0e70, 0x1ff9,
  61. 0xf78f, 0xe606, 0xd49d, 0xc514, 0xb1ab, 0xa022, 0x92b9, 0x8330,
  62. 0x7bc7, 0x6a4e, 0x58d5, 0x495c, 0x3de3, 0x2c6a, 0x1ef1, 0x0f78
  63. };
  64. static char *snames[] =
  65. {
  66. "Sclosed",
  67. "Sclosing",
  68. "Sreqsent",
  69. "Sackrcvd",
  70. "Sacksent",
  71. "Sopened",
  72. };
  73. static void authtimer(PPP*);
  74. static void chapinit(PPP*);
  75. static void config(PPP*, Pstate*, int);
  76. static uchar* escapeuchar(PPP*, ulong, uchar*, ushort*);
  77. static void getchap(PPP*, Block*);
  78. static Block* getframe(PPP*, int*);
  79. static void getlqm(PPP*, Block*);
  80. static int getopts(PPP*, Pstate*, Block*);
  81. static void getpap(PPP*, Block*);
  82. static void init(PPP*);
  83. static void invalidate(Ipaddr);
  84. static void ipinproc(PPP*);
  85. static char* ipopen(PPP*);
  86. static void mediainproc(PPP*);
  87. static void newstate(PPP*, Pstate*, int);
  88. static int nipifcs(char*);
  89. static void papinit(PPP*);
  90. static void pinit(PPP*, Pstate*);
  91. static void ppptimer(PPP*);
  92. static void printopts(Pstate*, Block*, int);
  93. static void ptimer(PPP*, Pstate*);
  94. static int putframe(PPP*, int, Block*);
  95. static void putlqm(PPP*);
  96. static void putndb(PPP*, char*);
  97. static void putpaprequest(PPP*);
  98. static void rcv(PPP*, Pstate*, Block*);
  99. static void rejopts(PPP*, Pstate*, Block*, int);
  100. static void sendechoreq(PPP*, Pstate*);
  101. static void sendtermreq(PPP*, Pstate*);
  102. static void setphase(PPP*, int);
  103. static void terminate(PPP*, int);
  104. static int validv4(Ipaddr);
  105. static void dmppkt(char *s, uchar *a, int na);
  106. static void getauth(PPP*);
  107. void
  108. pppopen(PPP *ppp, int mediain, int mediaout, char *net,
  109. Ipaddr ipaddr, Ipaddr remip,
  110. int mtu, int framing)
  111. {
  112. ppp->ipfd = -1;
  113. ppp->ipcfd = -1;
  114. invalidate(ppp->remote);
  115. invalidate(ppp->local);
  116. invalidate(ppp->curremote);
  117. invalidate(ppp->curlocal);
  118. invalidate(ppp->dns[0]);
  119. invalidate(ppp->dns[1]);
  120. invalidate(ppp->wins[0]);
  121. invalidate(ppp->wins[1]);
  122. ppp->mediain = mediain;
  123. ppp->mediaout = mediaout;
  124. if(validv4(remip)){
  125. ipmove(ppp->remote, remip);
  126. ppp->remotefrozen = 1;
  127. }
  128. if(validv4(ipaddr)){
  129. ipmove(ppp->local, ipaddr);
  130. ppp->localfrozen = 1;
  131. }
  132. ppp->mtu = Defmtu;
  133. ppp->mru = mtu;
  134. ppp->framing = framing;
  135. ppp->net = net;
  136. init(ppp);
  137. switch(rfork(RFPROC|RFMEM|RFNOWAIT)){
  138. case -1:
  139. sysfatal("forking mediainproc");
  140. case 0:
  141. mediainproc(ppp);
  142. terminate(ppp, 1);
  143. _exits(0);
  144. }
  145. }
  146. static void
  147. init(PPP* ppp)
  148. {
  149. if(ppp->inbuf == nil){
  150. ppp->inbuf = allocb(4096);
  151. if(ppp->inbuf == nil)
  152. abort();
  153. ppp->outbuf = allocb(4096);
  154. if(ppp->outbuf == nil)
  155. abort();
  156. ppp->lcp = mallocz(sizeof(*ppp->lcp), 1);
  157. if(ppp->lcp == nil)
  158. abort();
  159. ppp->lcp->proto = Plcp;
  160. ppp->lcp->state = Sclosed;
  161. ppp->ccp = mallocz(sizeof(*ppp->ccp), 1);
  162. if(ppp->ccp == nil)
  163. abort();
  164. ppp->ccp->proto = Pccp;
  165. ppp->ccp->state = Sclosed;
  166. ppp->ipcp = mallocz(sizeof(*ppp->ipcp), 1);
  167. if(ppp->ipcp == nil)
  168. abort();
  169. ppp->ipcp->proto = Pipcp;
  170. ppp->ipcp->state = Sclosed;
  171. ppp->chap = mallocz(sizeof(*ppp->chap), 1);
  172. if(ppp->chap == nil)
  173. abort();
  174. ppp->chap->proto = APmschap;
  175. ppp->chap->state = Cunauth;
  176. auth_freechal(ppp->chap->cs);
  177. ppp->chap->cs = nil;
  178. switch(rfork(RFPROC|RFMEM|RFNOWAIT)){
  179. case -1:
  180. sysfatal("forking ppptimer");
  181. case 0:
  182. ppptimer(ppp);
  183. _exits(0);
  184. }
  185. }
  186. ppp->ctcp = compress_init(ppp->ctcp);
  187. pinit(ppp, ppp->lcp);
  188. setphase(ppp, Plink);
  189. }
  190. static void
  191. setphase(PPP *ppp, int phase)
  192. {
  193. int oldphase;
  194. oldphase = ppp->phase;
  195. ppp->phase = phase;
  196. switch(phase){
  197. default:
  198. sysfatal("ppp: unknown phase %d", phase);
  199. case Pdead:
  200. /* restart or exit? */
  201. pinit(ppp, ppp->lcp);
  202. setphase(ppp, Plink);
  203. break;
  204. case Plink:
  205. /* link down */
  206. switch(oldphase) {
  207. case Pauth:
  208. auth_freechal(ppp->chap->cs);
  209. ppp->chap->cs = nil;
  210. ppp->chap->state = Cunauth;
  211. break;
  212. case Pnet:
  213. auth_freechal(ppp->chap->cs);
  214. ppp->chap->cs = nil;
  215. ppp->chap->state = Cunauth;
  216. newstate(ppp, ppp->ccp, Sclosed);
  217. newstate(ppp, ppp->ipcp, Sclosed);
  218. }
  219. break;
  220. case Pauth:
  221. if(server)
  222. chapinit(ppp);
  223. else if(ppp->chap->proto == APpasswd)
  224. papinit(ppp);
  225. else
  226. setphase(ppp, Pnet);
  227. break;
  228. case Pnet:
  229. pinit(ppp, ppp->ccp);
  230. pinit(ppp, ppp->ipcp);
  231. break;
  232. case Pterm:
  233. /* what? */
  234. break;
  235. }
  236. }
  237. static void
  238. pinit(PPP *ppp, Pstate *p)
  239. {
  240. p->timeout = 0;
  241. switch(p->proto){
  242. case Plcp:
  243. ppp->magic = truerand();
  244. ppp->xctlmap = 0xffffffff;
  245. ppp->period = 0;
  246. p->optmask = 0xffffffff;
  247. if(!server)
  248. p->optmask &= ~(Fauth|Fmtu);
  249. ppp->rctlmap = 0;
  250. ppp->ipcp->state = Sclosed;
  251. ppp->ipcp->optmask = 0xffffffff;
  252. p->echotimeout = 0;
  253. /* quality goo */
  254. ppp->timeout = 0;
  255. memset(&ppp->in, 0, sizeof(ppp->in));
  256. memset(&ppp->out, 0, sizeof(ppp->out));
  257. memset(&ppp->pin, 0, sizeof(ppp->pin));
  258. memset(&ppp->pout, 0, sizeof(ppp->pout));
  259. memset(&ppp->sin, 0, sizeof(ppp->sin));
  260. break;
  261. case Pccp:
  262. if(nocompress)
  263. p->optmask = 0;
  264. else
  265. p->optmask = Fcmppc;
  266. if(ppp->ctype != nil)
  267. (*ppp->ctype->fini)(ppp->cstate);
  268. ppp->ctype = nil;
  269. ppp->ctries = 0;
  270. ppp->cstate = nil;
  271. if(ppp->unctype)
  272. (*ppp->unctype->fini)(ppp->uncstate);
  273. ppp->unctype = nil;
  274. ppp->uncstate = nil;
  275. break;
  276. case Pipcp:
  277. p->optmask = 0xffffffff;
  278. ppp->ctcp = compress_init(ppp->ctcp);
  279. break;
  280. }
  281. p->confid = p->rcvdconfid = -1;
  282. config(ppp, p, 1);
  283. newstate(ppp, p, Sreqsent);
  284. }
  285. /*
  286. * change protocol to a new state.
  287. */
  288. static void
  289. newstate(PPP *ppp, Pstate *p, int state)
  290. {
  291. char *err;
  292. netlog("ppp: %ux %s->%s ctlmap %lux/%lux flags %lux mtu %ld mru %ld\n",
  293. p->proto, snames[p->state], snames[state], ppp->rctlmap,
  294. ppp->xctlmap, p->flags,
  295. ppp->mtu, ppp->mru);
  296. syslog(0, "ppp", "%ux %s->%s ctlmap %lux/%lux flags %lux mtu %ld mru %ld",
  297. p->proto, snames[p->state], snames[state], ppp->rctlmap,
  298. ppp->xctlmap, p->flags,
  299. ppp->mtu, ppp->mru);
  300. if(p->proto == Plcp) {
  301. if(state == Sopened)
  302. setphase(ppp, Pauth);
  303. else if(state == Sclosed)
  304. setphase(ppp, Pdead);
  305. else if(p->state == Sopened)
  306. setphase(ppp, Plink);
  307. }
  308. if(p->proto == Pccp && state == Sopened) {
  309. if(ppp->unctype)
  310. (*ppp->unctype->fini)(ppp->uncstate);
  311. ppp->unctype = nil;
  312. ppp->uncstate = nil;
  313. if(p->optmask & Fcmppc) {
  314. ppp->unctype = &uncmppc;
  315. ppp->uncstate = (*uncmppc.init)(ppp);
  316. }
  317. if(p->optmask & Fcthwack){
  318. ppp->unctype = &uncthwack;
  319. ppp->uncstate = (*uncthwack.init)(ppp);
  320. }
  321. }
  322. if(p->proto == Pipcp && state == Sopened) {
  323. if(server && ppp->chap->state != Cauthok)
  324. abort();
  325. err = ipopen(ppp);
  326. if(err != nil)
  327. sysfatal("%s", err);
  328. }
  329. p->state = state;
  330. }
  331. /* returns (protocol, information) */
  332. static Block*
  333. getframe(PPP *ppp, int *protop)
  334. {
  335. uchar *p, *from, *to;
  336. int n, len, proto;
  337. ulong c;
  338. ushort fcs;
  339. Block *buf, *b;
  340. *protop = 0;
  341. if(ppp->framing == 0) {
  342. /* assume data is already framed */
  343. b = allocb(2000);
  344. len = b->lim - b->wptr;
  345. n = read(ppp->mediain, b->wptr, len);
  346. dmppkt("RX", b->wptr, n);
  347. if(n <= 0 || n == len){
  348. freeb(b);
  349. return nil;
  350. }
  351. b->wptr += n;
  352. /* should probably copy to another block if small */
  353. if(pppframing && b->rptr[0] == PPP_addr && b->rptr[1] == PPP_ctl)
  354. b->rptr += 2;
  355. proto = *b->rptr++;
  356. if((proto & 0x1) == 0)
  357. proto = (proto<<8) | *b->rptr++;
  358. if(b->rptr >= b->wptr){
  359. freeb(b);
  360. return nil;
  361. }
  362. ppp->in.uchars += n;
  363. ppp->in.packets++;
  364. *protop = proto;
  365. netlog("getframe 0x%x\n", proto);
  366. return b;
  367. }
  368. buf = ppp->inbuf;
  369. for(;;){
  370. /* read till we hit a frame uchar or run out of room */
  371. for(p = buf->rptr; buf->wptr < buf->lim;){
  372. for(; p < buf->wptr; p++)
  373. if(*p == HDLC_frame)
  374. break;
  375. if(p != buf->wptr)
  376. break;
  377. len = buf->lim - buf->wptr;
  378. n = read(ppp->mediain, buf->wptr, len);
  379. if(n <= 0){
  380. syslog(0, LOG, "medium read returns %d: %r", n);
  381. buf->wptr = buf->rptr;
  382. return nil;
  383. }
  384. dmppkt("RX", buf->wptr, n);
  385. buf->wptr += n;
  386. }
  387. /* copy into block, undoing escapes, and caculating fcs */
  388. fcs = PPP_initfcs;
  389. b = allocb(p - buf->rptr);
  390. to = b->wptr;
  391. for(from = buf->rptr; from != p;){
  392. c = *from++;
  393. if(c == HDLC_esc){
  394. if(from == p)
  395. break;
  396. c = *from++ ^ 0x20;
  397. } else if((c < 0x20) && (ppp->rctlmap & (1 << c)))
  398. continue;
  399. *to++ = c;
  400. fcs = (fcs >> 8) ^ fcstab[(fcs ^ c) & 0xff];
  401. }
  402. /* copy down what's left in buffer */
  403. p++;
  404. memmove(buf->rptr, p, buf->wptr - p);
  405. n = p - buf->rptr;
  406. buf->wptr -= n;
  407. b->wptr = to - 2;
  408. /* return to caller if checksum matches */
  409. if(fcs == PPP_goodfcs){
  410. if(b->rptr[0] == PPP_addr && b->rptr[1] == PPP_ctl)
  411. b->rptr += 2;
  412. proto = *b->rptr++;
  413. if((proto & 0x1) == 0)
  414. proto = (proto<<8) | *b->rptr++;
  415. if(b->rptr < b->wptr){
  416. ppp->in.uchars += n;
  417. ppp->in.packets++;
  418. *protop = proto;
  419. netlog("getframe 0x%x\n", proto);
  420. return b;
  421. }
  422. } else if(BLEN(b) > 0){
  423. if(ppp->ctcp)
  424. compress_error(ppp->ctcp);
  425. ppp->in.discards++;
  426. netlog("ppp: discard len %ld/%ld cksum %ux (%ux %ux %ux %ux)\n",
  427. BLEN(b), BLEN(buf), fcs, b->rptr[0],
  428. b->rptr[1], b->rptr[2], b->rptr[3]);
  429. }
  430. freeb(b);
  431. }
  432. }
  433. /* send a PPP frame */
  434. static int
  435. putframe(PPP *ppp, int proto, Block *b)
  436. {
  437. Block *buf;
  438. uchar *to, *from;
  439. ushort fcs;
  440. ulong ctlmap;
  441. uchar c;
  442. Block *bp;
  443. ppp->out.packets++;
  444. if(proto == Plcp)
  445. ctlmap = 0xffffffff;
  446. else
  447. ctlmap = ppp->xctlmap;
  448. /* make sure we have head room */
  449. if(b->rptr - b->base < 4){
  450. b = padb(b, 4);
  451. b->rptr += 4;
  452. }
  453. netlog("ppp: putframe 0x%ux %ld\n", proto, b->wptr-b->rptr);
  454. /* add in the protocol and address, we'd better have left room */
  455. from = b->rptr;
  456. *--from = proto;
  457. if(!(ppp->lcp->flags&Fpc) || proto > 0x100 || proto == Plcp)
  458. *--from = proto>>8;
  459. if(pppframing && (!(ppp->lcp->flags&Fac) || proto == Plcp)){
  460. *--from = PPP_ctl;
  461. *--from = PPP_addr;
  462. }
  463. qlock(&ppp->outlock);
  464. buf = ppp->outbuf;
  465. if(ppp->framing == 0) {
  466. to = buf->rptr;
  467. for(bp = b; bp; bp = bp->next){
  468. if(bp != b)
  469. from = bp->rptr;
  470. memmove(to, from, bp->wptr-from);
  471. to += bp->wptr-from;
  472. }
  473. } else {
  474. /* escape and checksum the body */
  475. fcs = PPP_initfcs;
  476. to = buf->rptr;
  477. /* add frame marker */
  478. *to++ = HDLC_frame;
  479. for(bp = b; bp; bp = bp->next){
  480. if(bp != b)
  481. from = bp->rptr;
  482. for(; from < bp->wptr; from++){
  483. c = *from;
  484. if(c == HDLC_frame || c == HDLC_esc
  485. || (c < 0x20 && ((1<<c) & ctlmap))){
  486. *to++ = HDLC_esc;
  487. *to++ = c ^ 0x20;
  488. } else
  489. *to++ = c;
  490. fcs = (fcs >> 8) ^ fcstab[(fcs ^ c) & 0xff];
  491. }
  492. }
  493. /* add on and escape the checksum */
  494. fcs = ~fcs;
  495. c = fcs;
  496. if(c == HDLC_frame || c == HDLC_esc
  497. || (c < 0x20 && ((1<<c) & ctlmap))){
  498. *to++ = HDLC_esc;
  499. *to++ = c ^ 0x20;
  500. } else
  501. *to++ = c;
  502. c = fcs>>8;
  503. if(c == HDLC_frame || c == HDLC_esc
  504. || (c < 0x20 && ((1<<c) & ctlmap))){
  505. *to++ = HDLC_esc;
  506. *to++ = c ^ 0x20;
  507. } else
  508. *to++ = c;
  509. /* add frame marker */
  510. *to++ = HDLC_frame;
  511. }
  512. /* send */
  513. buf->wptr = to;
  514. dmppkt("TX", buf->rptr, BLEN(buf));
  515. if(write(ppp->mediaout, buf->rptr, BLEN(buf)) < 0){
  516. qunlock(&ppp->outlock);
  517. return -1;
  518. }
  519. ppp->out.uchars += BLEN(buf);
  520. qunlock(&ppp->outlock);
  521. return 0;
  522. }
  523. Block*
  524. alloclcp(int code, int id, int len, Lcpmsg **mp)
  525. {
  526. Block *b;
  527. Lcpmsg *m;
  528. /*
  529. * leave room for header
  530. */
  531. b = allocb(len);
  532. m = (Lcpmsg*)b->wptr;
  533. m->code = code;
  534. m->id = id;
  535. b->wptr += 4;
  536. *mp = m;
  537. return b;
  538. }
  539. static void
  540. putlo(Block *b, int type, ulong val)
  541. {
  542. *b->wptr++ = type;
  543. *b->wptr++ = 6;
  544. hnputl(b->wptr, val);
  545. b->wptr += 4;
  546. }
  547. static void
  548. putv4o(Block *b, int type, Ipaddr val)
  549. {
  550. *b->wptr++ = type;
  551. *b->wptr++ = 6;
  552. v6tov4(b->wptr, val);
  553. b->wptr += 4;
  554. }
  555. static void
  556. putso(Block *b, int type, ulong val)
  557. {
  558. *b->wptr++ = type;
  559. *b->wptr++ = 4;
  560. hnputs(b->wptr, val);
  561. b->wptr += 2;
  562. }
  563. static void
  564. puto(Block *b, int type)
  565. {
  566. *b->wptr++ = type;
  567. *b->wptr++ = 2;
  568. }
  569. /*
  570. * send configuration request
  571. */
  572. static void
  573. config(PPP *ppp, Pstate *p, int newid)
  574. {
  575. Block *b;
  576. Lcpmsg *m;
  577. int id;
  578. if(newid){
  579. id = p->id++;
  580. p->confid = id;
  581. p->timeout = Timeout;
  582. } else
  583. id = p->confid;
  584. b = alloclcp(Lconfreq, id, 256, &m);
  585. USED(m);
  586. switch(p->proto){
  587. case Plcp:
  588. if(p->optmask & Fctlmap)
  589. putlo(b, Octlmap, 0); /* we don't want anything escaped */
  590. if(p->optmask & Fmagic)
  591. putlo(b, Omagic, ppp->magic);
  592. if(p->optmask & Fmtu)
  593. putso(b, Omtu, ppp->mru);
  594. if(p->optmask & Fauth) {
  595. *b->wptr++ = Oauth;
  596. *b->wptr++ = 5;
  597. hnputs(b->wptr, Pchap);
  598. b->wptr += 2;
  599. *b->wptr++ = ppp->chap->proto;
  600. }
  601. if(p->optmask & Fpc)
  602. puto(b, Opc);
  603. if(p->optmask & Fac)
  604. puto(b, Oac);
  605. break;
  606. case Pccp:
  607. if(p->optmask & Fcthwack)
  608. puto(b, Octhwack);
  609. else if(p->optmask & Fcmppc) {
  610. *b->wptr++ = Ocmppc;
  611. *b->wptr++ = 6;
  612. *b->wptr++ = 0;
  613. *b->wptr++ = 0;
  614. *b->wptr++ = 0;
  615. *b->wptr++ = 0x41;
  616. }
  617. break;
  618. case Pipcp:
  619. if(p->optmask & Fipaddr)
  620. {syslog(0, "ppp", "requesting %I", ppp->local);
  621. putv4o(b, Oipaddr, ppp->local);
  622. }
  623. if(primary && (p->optmask & Fipdns))
  624. putv4o(b, Oipdns, ppp->dns[0]);
  625. if(primary && (p->optmask & Fipdns2))
  626. putv4o(b, Oipdns2, ppp->dns[1]);
  627. if(primary && (p->optmask & Fipwins))
  628. putv4o(b, Oipwins, ppp->wins[0]);
  629. if(primary && (p->optmask & Fipwins2))
  630. putv4o(b, Oipwins2, ppp->wins[1]);
  631. /*
  632. * don't ask for header compression while data compression is still pending.
  633. * perhaps we should restart ipcp negotiation if compression negotiation fails.
  634. */
  635. if(!noipcompress && !ppp->ccp->optmask && (p->optmask & Fipcompress)) {
  636. *b->wptr++ = Oipcompress;
  637. *b->wptr++ = 6;
  638. hnputs(b->wptr, Pvjctcp);
  639. b->wptr += 2;
  640. *b->wptr++ = MAX_STATES-1;
  641. *b->wptr++ = 1;
  642. }
  643. break;
  644. }
  645. hnputs(m->len, BLEN(b));
  646. printopts(p, b, 1);
  647. putframe(ppp, p->proto, b);
  648. freeb(b);
  649. }
  650. static void
  651. getipinfo(PPP *ppp)
  652. {
  653. char *av[3];
  654. int ndns, nwins;
  655. char ip[64];
  656. Ndbtuple *t, *nt;
  657. if(!validv4(ppp->local))
  658. return;
  659. av[0] = "dns";
  660. av[1] = "wins";
  661. sprint(ip, "%I", ppp->local);
  662. t = csipinfo(ppp->net, "ip", ip, av, 2);
  663. ndns = nwins = 0;
  664. for(nt = t; nt != nil; nt = nt->entry){
  665. if(strcmp(nt->attr, "dns") == 0){
  666. if(ndns < 2)
  667. parseip(ppp->dns[ndns++], nt->val);
  668. } else if(strcmp(nt->attr, "wins") == 0){
  669. if(nwins < 2)
  670. parseip(ppp->wins[nwins++], nt->val);
  671. }
  672. }
  673. if(t != nil)
  674. ndbfree(t);
  675. }
  676. /*
  677. * parse configuration request, sends an ack or reject packet
  678. *
  679. * returns: -1 if request was syntacticly incorrect
  680. * 0 if packet was accepted
  681. * 1 if packet was rejected
  682. */
  683. static int
  684. getopts(PPP *ppp, Pstate *p, Block *b)
  685. {
  686. Lcpmsg *m, *repm;
  687. Lcpopt *o;
  688. uchar *cp, *ap;
  689. ulong rejecting, nacking, flags, proto, chapproto;
  690. ulong mtu, ctlmap, period;
  691. ulong x;
  692. Block *repb;
  693. Comptype *ctype;
  694. Ipaddr ipaddr;
  695. rejecting = 0;
  696. nacking = 0;
  697. flags = 0;
  698. /* defaults */
  699. invalidate(ipaddr);
  700. mtu = ppp->mtu;
  701. ctlmap = 0xffffffff;
  702. period = 0;
  703. ctype = nil;
  704. chapproto = 0;
  705. m = (Lcpmsg*)b->rptr;
  706. repb = alloclcp(Lconfack, m->id, BLEN(b), &repm);
  707. /* copy options into ack packet */
  708. memmove(repm->data, m->data, b->wptr - m->data);
  709. repb->wptr += b->wptr - m->data;
  710. /* look for options we don't recognize or like */
  711. for(cp = m->data; cp < b->wptr; cp += o->len){
  712. o = (Lcpopt*)cp;
  713. if(cp + o->len > b->wptr || o->len==0){
  714. freeb(repb);
  715. netlog("ppp: bad option length %ux\n", o->type);
  716. return -1;
  717. }
  718. switch(p->proto){
  719. case Plcp:
  720. switch(o->type){
  721. case Oac:
  722. flags |= Fac;
  723. continue;
  724. case Opc:
  725. flags |= Fpc;
  726. continue;
  727. case Omtu:
  728. mtu = nhgets(o->data);
  729. continue;
  730. case Omagic:
  731. if(ppp->magic == nhgetl(o->data))
  732. netlog("ppp: possible loop\n");
  733. continue;
  734. case Octlmap:
  735. ctlmap = nhgetl(o->data);
  736. continue;
  737. case Oquality:
  738. proto = nhgets(o->data);
  739. if(proto != Plqm)
  740. break;
  741. x = nhgetl(o->data+2)*10;
  742. period = (x+Period-1)/Period;
  743. continue;
  744. case Oauth:
  745. proto = nhgets(o->data);
  746. if(proto == Ppasswd && !server){
  747. chapproto = APpasswd;
  748. continue;
  749. }
  750. if(proto != Pchap)
  751. break;
  752. if(o->data[2] != APmd5 && o->data[2] != APmschap)
  753. break;
  754. chapproto = o->data[2];
  755. continue;
  756. }
  757. break;
  758. case Pccp:
  759. if(nocompress)
  760. break;
  761. switch(o->type){
  762. case Octhwack:
  763. break;
  764. /*
  765. if(o->len == 2){
  766. ctype = &cthwack;
  767. continue;
  768. }
  769. if(!nacking){
  770. nacking = 1;
  771. repb->wptr = repm->data;
  772. repm->code = Lconfnak;
  773. }
  774. puto(repb, Octhwack);
  775. continue;
  776. */
  777. case Ocmppc:
  778. x = nhgetl(o->data);
  779. // hack for Mac
  780. // if(x == 0)
  781. // continue;
  782. /* stop ppp loops */
  783. if((x&0x41) == 0 || ppp->ctries++ > 5) {
  784. /*
  785. * turn off requests as well - I don't think this
  786. * is needed in the standard
  787. */
  788. p->optmask &= ~Fcmppc;
  789. break;
  790. }
  791. if(rejecting)
  792. continue;
  793. if(x & 1) {
  794. ctype = &cmppc;
  795. ppp->sendencrypted = (o->data[3]&0x40) == 0x40;
  796. continue;
  797. }
  798. if(!nacking){
  799. nacking = 1;
  800. repb->wptr = repm->data;
  801. repm->code = Lconfnak;
  802. }
  803. *repb->wptr++ = Ocmppc;
  804. *repb->wptr++ = 6;
  805. *repb->wptr++ = 0;
  806. *repb->wptr++ = 0;
  807. *repb->wptr++ = 0;
  808. *repb->wptr++ = 0x41;
  809. continue;
  810. }
  811. break;
  812. case Pipcp:
  813. switch(o->type){
  814. case Oipaddr:
  815. v4tov6(ipaddr, o->data);
  816. if(!validv4(ppp->remote))
  817. continue;
  818. if(!validv4(ipaddr) && !rejecting){
  819. /* other side requesting an address */
  820. if(!nacking){
  821. nacking = 1;
  822. repb->wptr = repm->data;
  823. repm->code = Lconfnak;
  824. }
  825. putv4o(repb, Oipaddr, ppp->remote);
  826. }
  827. continue;
  828. case Oipdns:
  829. ap = ppp->dns[0];
  830. goto ipinfo;
  831. case Oipdns2:
  832. ap = ppp->dns[1];
  833. goto ipinfo;
  834. case Oipwins:
  835. ap = ppp->wins[0];
  836. goto ipinfo;
  837. case Oipwins2:
  838. ap = ppp->wins[1];
  839. goto ipinfo;
  840. ipinfo:
  841. if(!validv4(ap))
  842. getipinfo(ppp);
  843. if(!validv4(ap))
  844. break;
  845. v4tov6(ipaddr, o->data);
  846. if(!validv4(ipaddr) && !rejecting){
  847. /* other side requesting an address */
  848. if(!nacking){
  849. nacking = 1;
  850. repb->wptr = repm->data;
  851. repm->code = Lconfnak;
  852. }
  853. putv4o(repb, o->type, ap);
  854. }
  855. continue;
  856. case Oipcompress:
  857. /*
  858. * don't compress tcp header if we've negotiated data compression.
  859. * tcp header compression has very poor performance if there is an error.
  860. */
  861. proto = nhgets(o->data);
  862. if(noipcompress || proto != Pvjctcp || ppp->ctype != nil)
  863. break;
  864. if(compress_negotiate(ppp->ctcp, o->data+2) < 0)
  865. break;
  866. flags |= Fipcompress;
  867. continue;
  868. }
  869. break;
  870. }
  871. /* come here if option is not recognized */
  872. if(!rejecting){
  873. rejecting = 1;
  874. repb->wptr = repm->data;
  875. repm->code = Lconfrej;
  876. }
  877. netlog("ppp: bad %ux option %d\n", p->proto, o->type);
  878. memmove(repb->wptr, o, o->len);
  879. repb->wptr += o->len;
  880. }
  881. /* permanent changes only after we know that we liked the packet */
  882. if(!rejecting && !nacking){
  883. switch(p->proto){
  884. case Plcp:
  885. ppp->period = period;
  886. ppp->xctlmap = ctlmap;
  887. if(mtu > Maxmtu)
  888. mtu = Maxmtu;
  889. if(mtu < Minmtu)
  890. mtu = Minmtu;
  891. ppp->mtu = mtu;
  892. if(chapproto)
  893. ppp->chap->proto = chapproto;
  894. break;
  895. case Pccp:
  896. if(ppp->ctype != nil){
  897. (*ppp->ctype->fini)(ppp->cstate);
  898. ppp->cstate = nil;
  899. }
  900. ppp->ctype = ctype;
  901. if(ctype)
  902. ppp->cstate = (*ctype->init)(ppp);
  903. break;
  904. case Pipcp:
  905. if(validv4(ipaddr) && ppp->remotefrozen == 0)
  906. ipmove(ppp->remote, ipaddr);
  907. break;
  908. }
  909. p->flags = flags;
  910. }
  911. hnputs(repm->len, BLEN(repb));
  912. printopts(p, repb, 1);
  913. putframe(ppp, p->proto, repb);
  914. freeb(repb);
  915. return rejecting || nacking;
  916. }
  917. static void
  918. dmppkt(char *s, uchar *a, int na)
  919. {
  920. int i;
  921. if (debug < 3)
  922. return;
  923. fprint(2, "%s", s);
  924. for(i = 0; i < na; i++)
  925. fprint(2, " %.2ux", a[i]);
  926. fprint(2, "\n");
  927. }
  928. static void
  929. dropoption(Pstate *p, Lcpopt *o)
  930. {
  931. unsigned n = o->type;
  932. switch(n){
  933. case Oipdns:
  934. p->optmask &= ~Fipdns;
  935. break;
  936. case Oipwins:
  937. p->optmask &= ~Fipwins;
  938. break;
  939. case Oipdns2:
  940. p->optmask &= ~Fipdns2;
  941. break;
  942. case Oipwins2:
  943. p->optmask &= ~Fipwins2;
  944. break;
  945. default:
  946. if(o->type < 8*sizeof(p->optmask))
  947. p->optmask &= ~(1<<o->type);
  948. break;
  949. }
  950. }
  951. /*
  952. * parse configuration rejection, just stop sending anything that they
  953. * don't like (except for ipcp address nak).
  954. */
  955. static void
  956. rejopts(PPP *ppp, Pstate *p, Block *b, int code)
  957. {
  958. Lcpmsg *m;
  959. Lcpopt *o;
  960. uchar newip[IPaddrlen];
  961. /* just give up trying what the other side doesn't like */
  962. m = (Lcpmsg*)b->rptr;
  963. for(b->rptr = m->data; b->rptr < b->wptr; b->rptr += o->len){
  964. o = (Lcpopt*)b->rptr;
  965. if(b->rptr + o->len > b->wptr){
  966. netlog("ppp: bad roption length %ux\n", o->type);
  967. return;
  968. }
  969. if(code == Lconfrej){
  970. dropoption(p, o);
  971. netlog("ppp: %ux rejecting %d\n",
  972. p->proto, o->type);
  973. continue;
  974. }
  975. switch(p->proto){
  976. case Plcp:
  977. switch(o->type){
  978. case Octlmap:
  979. ppp->rctlmap = nhgetl(o->data);
  980. break;
  981. case Oauth:
  982. /* don't allow client to request no auth */
  983. /* could try different auth protocol here */
  984. fprint(2, "ppp: can not reject CHAP\n");
  985. exits("ppp: CHAP");
  986. break;
  987. default:
  988. if(o->type < 8*sizeof(p->optmask))
  989. p->optmask &= ~(1<<o->type);
  990. break;
  991. };
  992. break;
  993. case Pccp:
  994. switch(o->type){
  995. default:
  996. dropoption(p, o);
  997. break;
  998. }
  999. break;
  1000. case Pipcp:
  1001. switch(o->type){
  1002. case Oipaddr:
  1003. syslog(0, "ppp", "rejected addr %I with %V", ppp->local, o->data);
  1004. /* if we're a server, don't let other end change our addr */
  1005. if(ppp->localfrozen){
  1006. dropoption(p, o);
  1007. break;
  1008. }
  1009. /* accept whatever server tells us */
  1010. if(!validv4(ppp->local)){
  1011. v4tov6(ppp->local, o->data);
  1012. dropoption(p, o);
  1013. break;
  1014. }
  1015. /* if he didn't like our addr, ask for a generic one */
  1016. v4tov6(newip, o->data);
  1017. if(!validv4(newip)){
  1018. invalidate(ppp->local);
  1019. break;
  1020. }
  1021. /* if he gives us something different, use it anyways */
  1022. v4tov6(ppp->local, o->data);
  1023. dropoption(p, o);
  1024. break;
  1025. case Oipdns:
  1026. if (!validv4(ppp->dns[0])){
  1027. v4tov6(ppp->dns[0], o->data);
  1028. dropoption(p, o);
  1029. break;
  1030. }
  1031. v4tov6(newip, o->data);
  1032. if(!validv4(newip)){
  1033. invalidate(ppp->dns[0]);
  1034. break;
  1035. }
  1036. v4tov6(ppp->dns[0], o->data);
  1037. dropoption(p, o);
  1038. break;
  1039. case Oipwins:
  1040. if (!validv4(ppp->wins[0])){
  1041. v4tov6(ppp->wins[0], o->data);
  1042. dropoption(p, o);
  1043. break;
  1044. }
  1045. v4tov6(newip, o->data);
  1046. if(!validv4(newip)){
  1047. invalidate(ppp->wins[0]);
  1048. break;
  1049. }
  1050. v4tov6(ppp->wins[0], o->data);
  1051. dropoption(p, o);
  1052. break;
  1053. case Oipdns2:
  1054. if (!validv4(ppp->dns[1])){
  1055. v4tov6(ppp->dns[1], o->data);
  1056. dropoption(p, o);
  1057. break;
  1058. }
  1059. v4tov6(newip, o->data);
  1060. if(!validv4(newip)){
  1061. invalidate(ppp->dns[1]);
  1062. break;
  1063. }
  1064. v4tov6(ppp->dns[1], o->data);
  1065. dropoption(p, o);
  1066. break;
  1067. case Oipwins2:
  1068. if (!validv4(ppp->wins[1])){
  1069. v4tov6(ppp->wins[1], o->data);
  1070. dropoption(p, o);
  1071. break;
  1072. }
  1073. v4tov6(newip, o->data);
  1074. if(!validv4(newip)){
  1075. invalidate(ppp->wins[1]);
  1076. break;
  1077. }
  1078. v4tov6(ppp->wins[1], o->data);
  1079. dropoption(p, o);
  1080. break;
  1081. default:
  1082. dropoption(p, o);
  1083. break;
  1084. }
  1085. break;
  1086. }
  1087. }
  1088. }
  1089. /*
  1090. * put a messages through the lcp or ipcp state machine. They are
  1091. * very similar.
  1092. */
  1093. static void
  1094. rcv(PPP *ppp, Pstate *p, Block *b)
  1095. {
  1096. ulong len;
  1097. int err;
  1098. Lcpmsg *m;
  1099. int proto;
  1100. if(BLEN(b) < 4){
  1101. netlog("ppp: short lcp message\n");
  1102. freeb(b);
  1103. return;
  1104. }
  1105. m = (Lcpmsg*)b->rptr;
  1106. len = nhgets(m->len);
  1107. if(BLEN(b) < len){
  1108. netlog("ppp: short lcp message\n");
  1109. freeb(b);
  1110. return;
  1111. }
  1112. netlog("ppp: %ux rcv %d len %ld id %d/%d/%d\n",
  1113. p->proto, m->code, len, m->id, p->confid, p->id);
  1114. if(p->proto != Plcp && ppp->lcp->state != Sopened){
  1115. netlog("ppp: non-lcp with lcp not open\n");
  1116. freeb(b);
  1117. return;
  1118. }
  1119. qlock(ppp);
  1120. switch(m->code){
  1121. case Lconfreq:
  1122. printopts(p, b, 0);
  1123. err = getopts(ppp, p, b);
  1124. if(err < 0)
  1125. break;
  1126. if(m->id == p->rcvdconfid)
  1127. break; /* don't change state for duplicates */
  1128. switch(p->state){
  1129. case Sackrcvd:
  1130. if(err)
  1131. break;
  1132. newstate(ppp, p, Sopened);
  1133. break;
  1134. case Sclosed:
  1135. case Sopened:
  1136. config(ppp, p, 1);
  1137. if(err == 0)
  1138. newstate(ppp, p, Sacksent);
  1139. else
  1140. newstate(ppp, p, Sreqsent);
  1141. break;
  1142. case Sreqsent:
  1143. case Sacksent:
  1144. if(err == 0)
  1145. newstate(ppp, p, Sacksent);
  1146. else
  1147. newstate(ppp, p, Sreqsent);
  1148. break;
  1149. }
  1150. break;
  1151. case Lconfack:
  1152. if(p->confid != m->id){
  1153. /* ignore if it isn't the message we're sending */
  1154. netlog("ppp: dropping confack\n");
  1155. break;
  1156. }
  1157. p->confid = -1; /* ignore duplicates */
  1158. p->id++; /* avoid sending duplicates */
  1159. netlog("ppp: recv confack\n");
  1160. switch(p->state){
  1161. case Sopened:
  1162. case Sackrcvd:
  1163. config(ppp, p, 1);
  1164. newstate(ppp, p, Sreqsent);
  1165. break;
  1166. case Sreqsent:
  1167. newstate(ppp, p, Sackrcvd);
  1168. break;
  1169. case Sacksent:
  1170. newstate(ppp, p, Sopened);
  1171. break;
  1172. }
  1173. break;
  1174. case Lconfrej:
  1175. case Lconfnak:
  1176. if(p->confid != m->id) {
  1177. /* ignore if it isn't the message we're sending */
  1178. netlog("ppp: dropping confrej or confnak\n");
  1179. break;
  1180. }
  1181. p->confid = -1; /* ignore duplicates */
  1182. p->id++; /* avoid sending duplicates */
  1183. switch(p->state){
  1184. case Sopened:
  1185. case Sackrcvd:
  1186. config(ppp, p, 1);
  1187. newstate(ppp, p, Sreqsent);
  1188. break;
  1189. case Sreqsent:
  1190. case Sacksent:
  1191. printopts(p, b, 0);
  1192. rejopts(ppp, p, b, m->code);
  1193. config(ppp, p, 1);
  1194. break;
  1195. }
  1196. break;
  1197. case Ltermreq:
  1198. m->code = Ltermack;
  1199. putframe(ppp, p->proto, b);
  1200. switch(p->state){
  1201. case Sackrcvd:
  1202. case Sacksent:
  1203. newstate(ppp, p, Sreqsent);
  1204. break;
  1205. case Sopened:
  1206. newstate(ppp, p, Sclosing);
  1207. break;
  1208. }
  1209. break;
  1210. case Ltermack:
  1211. if(p->termid != m->id) /* ignore if it isn't the message we're sending */
  1212. break;
  1213. if(p->proto == Plcp)
  1214. ppp->ipcp->state = Sclosed;
  1215. switch(p->state){
  1216. case Sclosing:
  1217. newstate(ppp, p, Sclosed);
  1218. break;
  1219. case Sackrcvd:
  1220. newstate(ppp, p, Sreqsent);
  1221. break;
  1222. case Sopened:
  1223. config(ppp, p, 0);
  1224. newstate(ppp, p, Sreqsent);
  1225. break;
  1226. }
  1227. break;
  1228. case Lcoderej:
  1229. //newstate(ppp, p, Sclosed);
  1230. syslog(0, LOG, "code reject %d\n", m->data[0]);
  1231. break;
  1232. case Lprotorej:
  1233. proto = nhgets(m->data);
  1234. netlog("ppp: proto reject %ux\n", proto);
  1235. if(proto == Pccp)
  1236. newstate(ppp, ppp->ccp, Sclosed);
  1237. break;
  1238. case Lechoreq:
  1239. if(BLEN(b) < 8){
  1240. netlog("ppp: short lcp echo request\n");
  1241. freeb(b);
  1242. return;
  1243. }
  1244. m->code = Lechoack;
  1245. hnputl(m->data, ppp->magic);
  1246. putframe(ppp, p->proto, b);
  1247. break;
  1248. case Lechoack:
  1249. p->echoack = 1;
  1250. break;
  1251. case Ldiscard:
  1252. /* nothing to do */
  1253. break;
  1254. case Lresetreq:
  1255. if(p->proto != Pccp)
  1256. break;
  1257. ppp->stat.compreset++;
  1258. if(ppp->ctype != nil)
  1259. b = (*ppp->ctype->resetreq)(ppp->cstate, b);
  1260. if(b != nil) {
  1261. m = (Lcpmsg*)b->rptr;
  1262. m->code = Lresetack;
  1263. putframe(ppp, p->proto, b);
  1264. }
  1265. break;
  1266. case Lresetack:
  1267. if(p->proto != Pccp)
  1268. break;
  1269. if(ppp->unctype != nil)
  1270. (*ppp->unctype->resetack)(ppp->uncstate, b);
  1271. break;
  1272. }
  1273. qunlock(ppp);
  1274. freeb(b);
  1275. }
  1276. /*
  1277. * timer for protocol state machine
  1278. */
  1279. static void
  1280. ptimer(PPP *ppp, Pstate *p)
  1281. {
  1282. if(p->state == Sopened || p->state == Sclosed)
  1283. return;
  1284. p->timeout--;
  1285. switch(p->state){
  1286. case Sclosing:
  1287. sendtermreq(ppp, p);
  1288. break;
  1289. case Sreqsent:
  1290. case Sacksent:
  1291. if(p->timeout <= 0)
  1292. newstate(ppp, p, Sclosed);
  1293. else {
  1294. config(ppp, p, 0);
  1295. }
  1296. break;
  1297. case Sackrcvd:
  1298. if(p->timeout <= 0)
  1299. newstate(ppp, p, Sclosed);
  1300. else {
  1301. config(ppp, p, 0);
  1302. newstate(ppp, p, Sreqsent);
  1303. }
  1304. break;
  1305. }
  1306. }
  1307. /* paptimer -- pap timer event handler
  1308. *
  1309. * If PAP authorization hasn't come through, resend an authreqst. If
  1310. * the maximum number of requests have been sent (~ 30 seconds), give
  1311. * up.
  1312. *
  1313. */
  1314. static void
  1315. authtimer(PPP* ppp)
  1316. {
  1317. if(ppp->chap->proto != APpasswd)
  1318. return;
  1319. if(ppp->chap->id < 21)
  1320. putpaprequest(ppp);
  1321. else {
  1322. terminate(ppp, 0);
  1323. netlog("ppp: pap timed out--not authorized\n");
  1324. }
  1325. }
  1326. /*
  1327. * timer for ppp
  1328. */
  1329. static void
  1330. ppptimer(PPP *ppp)
  1331. {
  1332. while(!dying){
  1333. sleep(Period);
  1334. qlock(ppp);
  1335. netlog("ppp: ppptimer\n");
  1336. ptimer(ppp, ppp->lcp);
  1337. if(ppp->lcp->state == Sopened) {
  1338. switch(ppp->phase){
  1339. case Pnet:
  1340. ptimer(ppp, ppp->ccp);
  1341. ptimer(ppp, ppp->ipcp);
  1342. break;
  1343. case Pauth:
  1344. authtimer(ppp);
  1345. break;
  1346. }
  1347. }
  1348. /* link quality measurement */
  1349. if(ppp->period && --(ppp->timeout) <= 0){
  1350. ppp->timeout = ppp->period;
  1351. putlqm(ppp);
  1352. }
  1353. qunlock(ppp);
  1354. }
  1355. }
  1356. static void
  1357. setdefroute(char *net, Ipaddr gate)
  1358. {
  1359. int fd;
  1360. char path[128];
  1361. snprint(path, sizeof path, "%s/iproute", net);
  1362. fd = open(path, ORDWR);
  1363. if(fd < 0)
  1364. return;
  1365. fprint(fd, "add 0 0 %I", gate);
  1366. close(fd);
  1367. }
  1368. enum
  1369. {
  1370. Mofd= 32,
  1371. };
  1372. struct
  1373. {
  1374. Lock;
  1375. int fd[Mofd];
  1376. int cfd[Mofd];
  1377. int n;
  1378. } old;
  1379. static char*
  1380. ipopen(PPP *ppp)
  1381. {
  1382. static int ipinprocpid;
  1383. int n, cfd, fd;
  1384. char path[128];
  1385. char buf[128];
  1386. if(ipinprocpid <= 0){
  1387. snprint(path, sizeof path, "%s/ipifc/clone", ppp->net);
  1388. cfd = open(path, ORDWR);
  1389. if(cfd < 0)
  1390. return "can't open ip interface";
  1391. n = read(cfd, buf, sizeof(buf) - 1);
  1392. if(n <= 0){
  1393. close(cfd);
  1394. return "can't open ip interface";
  1395. }
  1396. buf[n] = 0;
  1397. netlog("ppp: setting up IP interface local %I remote %I (valid %d)\n",
  1398. ppp->local, ppp->remote, validv4(ppp->remote));
  1399. if(!validv4(ppp->remote))
  1400. ipmove(ppp->remote, ppp->local);
  1401. snprint(path, sizeof path, "%s/ipifc/%s/data", ppp->net, buf);
  1402. fd = open(path, ORDWR);
  1403. if(fd < 0){
  1404. close(cfd);
  1405. return "can't open ip interface";
  1406. }
  1407. if(fprint(cfd, "bind pkt") < 0)
  1408. return "binding pkt to ip interface";
  1409. if(fprint(cfd, "add %I 255.255.255.255 %I %lud proxy", ppp->local,
  1410. ppp->remote, ppp->mtu-10) < 0){
  1411. close(cfd);
  1412. return "can't set addresses";
  1413. }
  1414. if(primary)
  1415. setdefroute(ppp->net, ppp->remote);
  1416. ppp->ipfd = fd;
  1417. ppp->ipcfd = cfd;
  1418. /* signal main() that ip is configured */
  1419. rendezvous((void*)Rmagic, 0);
  1420. switch(ipinprocpid = rfork(RFPROC|RFMEM|RFNOWAIT)){
  1421. case -1:
  1422. sysfatal("forking ipinproc");
  1423. case 0:
  1424. ipinproc(ppp);
  1425. terminate(ppp, 1);
  1426. _exits(0);
  1427. }
  1428. } else {
  1429. /* we may have changed addresses */
  1430. if(ipcmp(ppp->local, ppp->curlocal) != 0 ||
  1431. ipcmp(ppp->remote, ppp->curremote) != 0){
  1432. snprint(buf, sizeof buf, "remove %I 255.255.255.255 %I",
  1433. ppp->curlocal, ppp->curremote);
  1434. if(fprint(ppp->ipcfd, "%s", buf) < 0)
  1435. syslog(0, "ppp", "can't %s: %r", buf);
  1436. snprint(buf, sizeof buf, "add %I 255.255.255.255 %I %lud proxy",
  1437. ppp->local, ppp->remote, ppp->mtu-10);
  1438. if(fprint(ppp->ipcfd, "%s", buf) < 0)
  1439. syslog(0, "ppp", "can't %s: %r", buf);
  1440. }
  1441. syslog(0, "ppp", "%I/%I -> %I/%I", ppp->curlocal, ppp->curremote,
  1442. ppp->local, ppp->remote);
  1443. }
  1444. ipmove(ppp->curlocal, ppp->local);
  1445. ipmove(ppp->curremote, ppp->remote);
  1446. return nil;
  1447. }
  1448. /* return next input IP packet */
  1449. Block*
  1450. pppread(PPP *ppp)
  1451. {
  1452. Block *b, *reply;
  1453. int proto, len;
  1454. Lcpmsg *m;
  1455. while(!dying){
  1456. b = getframe(ppp, &proto);
  1457. if(b == nil)
  1458. return nil;
  1459. Again:
  1460. switch(proto){
  1461. case Plcp:
  1462. rcv(ppp, ppp->lcp, b);
  1463. break;
  1464. case Pccp:
  1465. rcv(ppp, ppp->ccp, b);
  1466. break;
  1467. case Pipcp:
  1468. rcv(ppp, ppp->ipcp, b);
  1469. break;
  1470. case Pip:
  1471. if(ppp->ipcp->state == Sopened)
  1472. return b;
  1473. netlog("ppp: IP recved: link not up\n");
  1474. freeb(b);
  1475. break;
  1476. case Plqm:
  1477. getlqm(ppp, b);
  1478. break;
  1479. case Pchap:
  1480. getchap(ppp, b);
  1481. break;
  1482. case Ppasswd:
  1483. getpap(ppp, b);
  1484. break;
  1485. case Pvjctcp:
  1486. case Pvjutcp:
  1487. if(ppp->ipcp->state != Sopened){
  1488. netlog("ppp: VJ tcp recved: link not up\n");
  1489. freeb(b);
  1490. break;
  1491. }
  1492. ppp->stat.vjin++;
  1493. b = tcpuncompress(ppp->ctcp, b, proto);
  1494. if(b != nil)
  1495. return b;
  1496. ppp->stat.vjfail++;
  1497. break;
  1498. case Pcdata:
  1499. ppp->stat.uncomp++;
  1500. if(ppp->ccp->state != Sopened){
  1501. netlog("ppp: compressed data recved: link not up\n");
  1502. freeb(b);
  1503. break;
  1504. }
  1505. if(ppp->unctype == nil) {
  1506. netlog("ppp: compressed data recved: no compression\n");
  1507. freeb(b);
  1508. break;
  1509. }
  1510. len = BLEN(b);
  1511. b = (*ppp->unctype->uncompress)(ppp, b, &proto, &reply);
  1512. if(reply != nil){
  1513. /* send resetreq */
  1514. ppp->stat.uncompreset++;
  1515. putframe(ppp, Pccp, reply);
  1516. freeb(reply);
  1517. }
  1518. if(b == nil)
  1519. break;
  1520. ppp->stat.uncompin += len;
  1521. ppp->stat.uncompout += BLEN(b);
  1522. /* netlog("ppp: uncompressed frame %ux %d %d (%d uchars)\n", proto, b->rptr[0], b->rptr[1], BLEN(b)); /* */
  1523. goto Again;
  1524. default:
  1525. syslog(0, LOG, "unknown proto %ux", proto);
  1526. if(ppp->lcp->state == Sopened){
  1527. /* reject the protocol */
  1528. b->rptr -= 6;
  1529. m = (Lcpmsg*)b->rptr;
  1530. m->code = Lprotorej;
  1531. m->id = ++ppp->lcp->id;
  1532. hnputs(m->data, proto);
  1533. hnputs(m->len, BLEN(b));
  1534. putframe(ppp, Plcp, b);
  1535. }
  1536. freeb(b);
  1537. break;
  1538. }
  1539. }
  1540. return nil;
  1541. }
  1542. /* transmit an IP packet */
  1543. int
  1544. pppwrite(PPP *ppp, Block *b)
  1545. {
  1546. int proto;
  1547. int len;
  1548. qlock(ppp);
  1549. /* can't send ip packets till we're established */
  1550. if(ppp->ipcp->state != Sopened) {
  1551. qunlock(ppp);
  1552. syslog(0, LOG, "IP write: link not up");
  1553. len = blen(b);
  1554. freeb(b);
  1555. return len;
  1556. }
  1557. proto = Pip;
  1558. ppp->stat.ipsend++;
  1559. if(ppp->ipcp->flags & Fipcompress){
  1560. b = compress(ppp->ctcp, b, &proto);
  1561. if(b == nil){
  1562. qunlock(ppp);
  1563. return 0;
  1564. }
  1565. if(proto != Pip)
  1566. ppp->stat.vjout++;
  1567. }
  1568. if(ppp->ctype != nil) {
  1569. len = blen(b);
  1570. b = (*ppp->ctype->compress)(ppp, proto, b, &proto);
  1571. if(proto == Pcdata) {
  1572. ppp->stat.comp++;
  1573. ppp->stat.compin += len;
  1574. ppp->stat.compout += blen(b);
  1575. }
  1576. }
  1577. if(putframe(ppp, proto, b) < 0) {
  1578. qunlock(ppp);
  1579. freeb(b);
  1580. return -1;
  1581. }
  1582. qunlock(ppp);
  1583. len = blen(b);
  1584. freeb(b);
  1585. return len;
  1586. }
  1587. static void
  1588. terminate(PPP *ppp, int kill)
  1589. {
  1590. close(ppp->ipfd);
  1591. ppp->ipfd = -1;
  1592. close(ppp->ipcfd);
  1593. ppp->ipcfd = -1;
  1594. close(ppp->mediain);
  1595. close(ppp->mediaout);
  1596. ppp->mediain = -1;
  1597. ppp->mediaout = -1;
  1598. dying = 1;
  1599. if(kill)
  1600. postnote(PNGROUP, getpid(), "die");
  1601. }
  1602. typedef struct Iphdr Iphdr;
  1603. struct Iphdr
  1604. {
  1605. uchar vihl; /* Version and header length */
  1606. uchar tos; /* Type of service */
  1607. uchar length[2]; /* packet length */
  1608. uchar id[2]; /* Identification */
  1609. uchar frag[2]; /* Fragment information */
  1610. uchar ttl; /* Time to live */
  1611. uchar proto; /* Protocol */
  1612. uchar cksum[2]; /* Header checksum */
  1613. uchar src[4]; /* Ip source (uchar ordering unimportant) */
  1614. uchar dst[4]; /* Ip destination (uchar ordering unimportant) */
  1615. };
  1616. static void
  1617. ipinproc(PPP *ppp)
  1618. {
  1619. Block *b;
  1620. int m, n;
  1621. Iphdr *ip;
  1622. while(!dying){
  1623. b = allocb(Buflen);
  1624. n = read(ppp->ipfd, b->wptr, b->lim-b->wptr);
  1625. if(n < 0)
  1626. break;
  1627. /* trim packet if there's padding (e.g. from ether) */
  1628. ip = (Iphdr*)b->rptr;
  1629. m = nhgets(ip->length);
  1630. if(m < n && m > 0)
  1631. n = m;
  1632. b->wptr += n;
  1633. if(pppwrite(ppp, b) < 0)
  1634. break;
  1635. }
  1636. }
  1637. static void
  1638. catchdie(void*, char *msg)
  1639. {
  1640. if(strstr(msg, "die") != nil)
  1641. noted(NCONT);
  1642. else
  1643. noted(NDFLT);
  1644. }
  1645. static void
  1646. hexdump(uchar *a, int na)
  1647. {
  1648. int i;
  1649. char buf[80];
  1650. fprint(2, "dump %p %d\n", a, na);
  1651. buf[0] = '\0';
  1652. for(i=0; i<na; i++){
  1653. sprint(buf+strlen(buf), " %.2ux", a[i]);
  1654. if(i%16 == 7)
  1655. sprint(buf+strlen(buf), " --");
  1656. if(i%16==15){
  1657. sprint(buf+strlen(buf), "\n");
  1658. write(2, buf, strlen(buf));
  1659. buf[0] = '\0';
  1660. }
  1661. }
  1662. if(i%16){
  1663. sprint(buf+strlen(buf), "\n");
  1664. write(2, buf, strlen(buf));
  1665. }
  1666. }
  1667. static void
  1668. mediainproc(PPP *ppp)
  1669. {
  1670. Block *b;
  1671. Ipaddr remote;
  1672. notify(catchdie);
  1673. while(!dying){
  1674. b = pppread(ppp);
  1675. if(b == nil){
  1676. syslog(0, LOG, "pppread return nil");
  1677. break;
  1678. }
  1679. ppp->stat.iprecv++;
  1680. if(ppp->ipcp->state != Sopened) {
  1681. ppp->stat.iprecvnotup++;
  1682. freeb(b);
  1683. continue;
  1684. }
  1685. if(server) {
  1686. v4tov6(remote, b->rptr+12);
  1687. if(ipcmp(remote, ppp->remote) != 0) {
  1688. ppp->stat.iprecvbadsrc++;
  1689. freeb(b);
  1690. continue;
  1691. }
  1692. }
  1693. if(debug > 1){
  1694. netlog("ip write pkt %p %d\n", b->rptr, blen(b));
  1695. hexdump(b->rptr, blen(b));
  1696. }
  1697. if(write(ppp->ipfd, b->rptr, blen(b)) < 0) {
  1698. syslog(0, LOG, "error writing to pktifc");
  1699. freeb(b);
  1700. break;
  1701. }
  1702. freeb(b);
  1703. }
  1704. netlog(": remote=%I: ppp shutting down\n", ppp->remote);
  1705. syslog(0, LOG, ": remote=%I: ppp shutting down", ppp->remote);
  1706. syslog(0, LOG, "\t\tppp send = %lud/%lud recv= %lud/%lud",
  1707. ppp->out.packets, ppp->out.uchars,
  1708. ppp->in.packets, ppp->in.uchars);
  1709. syslog(0, LOG, "\t\tip send=%lud", ppp->stat.ipsend);
  1710. syslog(0, LOG, "\t\tip recv=%lud notup=%lud badsrc=%lud",
  1711. ppp->stat.iprecv, ppp->stat.iprecvnotup, ppp->stat.iprecvbadsrc);
  1712. syslog(0, LOG, "\t\tcompress=%lud in=%lud out=%lud reset=%lud",
  1713. ppp->stat.comp, ppp->stat.compin, ppp->stat.compout, ppp->stat.compreset);
  1714. syslog(0, LOG, "\t\tuncompress=%lud in=%lud out=%lud reset=%lud",
  1715. ppp->stat.uncomp, ppp->stat.uncompin, ppp->stat.uncompout,
  1716. ppp->stat.uncompreset);
  1717. syslog(0, LOG, "\t\tvjin=%lud vjout=%lud vjfail=%lud",
  1718. ppp->stat.vjin, ppp->stat.vjout, ppp->stat.vjfail);
  1719. }
  1720. /*
  1721. * link quality management
  1722. */
  1723. static void
  1724. getlqm(PPP *ppp, Block *b)
  1725. {
  1726. Qualpkt *p;
  1727. p = (Qualpkt*)b->rptr;
  1728. if(BLEN(b) == sizeof(Qualpkt)){
  1729. ppp->in.reports++;
  1730. ppp->pout.reports = nhgetl(p->peeroutreports);
  1731. ppp->pout.packets = nhgetl(p->peeroutpackets);
  1732. ppp->pout.uchars = nhgetl(p->peeroutuchars);
  1733. ppp->pin.reports = nhgetl(p->peerinreports);
  1734. ppp->pin.packets = nhgetl(p->peerinpackets);
  1735. ppp->pin.discards = nhgetl(p->peerindiscards);
  1736. ppp->pin.errors = nhgetl(p->peerinerrors);
  1737. ppp->pin.uchars = nhgetl(p->peerinuchars);
  1738. /* save our numbers at time of reception */
  1739. memmove(&ppp->sin, &ppp->in, sizeof(Qualstats));
  1740. }
  1741. freeb(b);
  1742. if(ppp->period == 0)
  1743. putlqm(ppp);
  1744. }
  1745. static void
  1746. putlqm(PPP *ppp)
  1747. {
  1748. Qualpkt *p;
  1749. Block *b;
  1750. b = allocb(sizeof(Qualpkt));
  1751. b->wptr += sizeof(Qualpkt);
  1752. p = (Qualpkt*)b->rptr;
  1753. hnputl(p->magic, 0);
  1754. /* heresay (what he last told us) */
  1755. hnputl(p->lastoutreports, ppp->pout.reports);
  1756. hnputl(p->lastoutpackets, ppp->pout.packets);
  1757. hnputl(p->lastoutuchars, ppp->pout.uchars);
  1758. /* our numbers at time of last reception */
  1759. hnputl(p->peerinreports, ppp->sin.reports);
  1760. hnputl(p->peerinpackets, ppp->sin.packets);
  1761. hnputl(p->peerindiscards, ppp->sin.discards);
  1762. hnputl(p->peerinerrors, ppp->sin.errors);
  1763. hnputl(p->peerinuchars, ppp->sin.uchars);
  1764. /* our numbers now */
  1765. hnputl(p->peeroutreports, ppp->out.reports+1);
  1766. hnputl(p->peeroutpackets, ppp->out.packets+1);
  1767. hnputl(p->peeroutuchars, ppp->out.uchars+53/*hack*/);
  1768. putframe(ppp, Plqm, b);
  1769. freeb(b);
  1770. ppp->out.reports++;
  1771. }
  1772. /*
  1773. * init challenge response dialog
  1774. */
  1775. static void
  1776. chapinit(PPP *ppp)
  1777. {
  1778. Block *b;
  1779. Lcpmsg *m;
  1780. Chap *c;
  1781. int len;
  1782. char *aproto;
  1783. getauth(ppp);
  1784. c = ppp->chap;
  1785. c->id++;
  1786. switch(c->proto){
  1787. default:
  1788. abort();
  1789. case APmd5:
  1790. aproto = "chap";
  1791. break;
  1792. case APmschap:
  1793. aproto = "mschap";
  1794. break;
  1795. }
  1796. if((c->cs = auth_challenge("proto=%q role=server", aproto)) == nil)
  1797. sysfatal("auth_challenge: %r");
  1798. syslog(0, LOG, ": remote=%I: sending %d byte challenge", ppp->remote, c->cs->nchal);
  1799. len = 4 + 1 + c->cs->nchal + strlen(ppp->chapname);
  1800. b = alloclcp(Cchallenge, c->id, len, &m);
  1801. *b->wptr++ = c->cs->nchal;
  1802. memmove(b->wptr, c->cs->chal, c->cs->nchal);
  1803. b->wptr += c->cs->nchal;
  1804. memmove(b->wptr, ppp->chapname, strlen(ppp->chapname));
  1805. b->wptr += strlen(ppp->chapname);
  1806. hnputs(m->len, len);
  1807. putframe(ppp, Pchap, b);
  1808. freeb(b);
  1809. c->state = Cchalsent;
  1810. }
  1811. /*
  1812. * BUG factotum should do this
  1813. */
  1814. enum {
  1815. MShashlen = 16,
  1816. MSresplen = 24,
  1817. MSchallen = 8,
  1818. };
  1819. void
  1820. desencrypt(uchar data[8], uchar key[7])
  1821. {
  1822. ulong ekey[32];
  1823. key_setup(key, ekey);
  1824. block_cipher(ekey, data, 0);
  1825. }
  1826. void
  1827. nthash(uchar hash[MShashlen], char *passwd)
  1828. {
  1829. uchar buf[512];
  1830. int i;
  1831. for(i=0; *passwd && i<sizeof(buf); passwd++) {
  1832. buf[i++] = *passwd;
  1833. buf[i++] = 0;
  1834. }
  1835. memset(hash, 0, 16);
  1836. md4(buf, i, hash, 0);
  1837. }
  1838. void
  1839. mschalresp(uchar resp[MSresplen], uchar hash[MShashlen], uchar chal[MSchallen])
  1840. {
  1841. int i;
  1842. uchar buf[21];
  1843. memset(buf, 0, sizeof(buf));
  1844. memcpy(buf, hash, MShashlen);
  1845. for(i=0; i<3; i++) {
  1846. memmove(resp+i*MSchallen, chal, MSchallen);
  1847. desencrypt(resp+i*MSchallen, buf+i*7);
  1848. }
  1849. }
  1850. /*
  1851. * challenge response dialog
  1852. */
  1853. extern int _asrdresp(int, uchar*, int);
  1854. static void
  1855. getchap(PPP *ppp, Block *b)
  1856. {
  1857. AuthInfo *ai;
  1858. Lcpmsg *m;
  1859. int len, vlen, i, id, n, nresp;
  1860. char md5buf[512], code;
  1861. Chap *c;
  1862. Chapreply cr;
  1863. MSchapreply mscr;
  1864. char uid[PATH];
  1865. uchar digest[16], *p, *resp, sdigest[SHA1dlen];
  1866. uchar mshash[MShashlen], mshash2[MShashlen];
  1867. DigestState *s;
  1868. uchar msresp[2*MSresplen+1];
  1869. m = (Lcpmsg*)b->rptr;
  1870. len = nhgets(m->len);
  1871. if(BLEN(b) < len){
  1872. syslog(0, LOG, "short chap message");
  1873. freeb(b);
  1874. return;
  1875. }
  1876. qlock(ppp);
  1877. switch(m->code){
  1878. case Cchallenge:
  1879. getauth(ppp);
  1880. vlen = m->data[0];
  1881. if(vlen > len - 5) {
  1882. netlog("PPP: chap: bad challenge len\n");
  1883. break;
  1884. }
  1885. id = m->id;
  1886. switch(ppp->chap->proto){
  1887. default:
  1888. abort();
  1889. case APmd5:
  1890. md5buf[0] = m->id;
  1891. strcpy(md5buf+1, ppp->secret);
  1892. n = strlen(ppp->secret) + 1;
  1893. memmove(md5buf+n, m->data+1, vlen);
  1894. n += vlen;
  1895. md5((uchar*)md5buf, n, digest, nil);
  1896. resp = digest;
  1897. nresp = 16;
  1898. break;
  1899. case APmschap:
  1900. nthash(mshash, ppp->secret);
  1901. memset(msresp, 0, sizeof msresp);
  1902. mschalresp(msresp+MSresplen, mshash, m->data+1);
  1903. resp = msresp;
  1904. nresp = sizeof msresp;
  1905. nthash(mshash, ppp->secret);
  1906. md4(mshash, 16, mshash2, 0);
  1907. s = sha1(mshash2, 16, 0, 0);
  1908. sha1(mshash2, 16, 0, s);
  1909. sha1(m->data+1, 8, sdigest, s);
  1910. memmove(ppp->key, sdigest, 16);
  1911. break;
  1912. }
  1913. len = 4 + 1 + nresp + strlen(ppp->chapname);
  1914. freeb(b);
  1915. b = alloclcp(Cresponse, id, len, &m);
  1916. *b->wptr++ = nresp;
  1917. memmove(b->wptr, resp, nresp);
  1918. b->wptr += nresp;
  1919. memmove(b->wptr, ppp->chapname, strlen(ppp->chapname));
  1920. b->wptr += strlen(ppp->chapname);
  1921. hnputs(m->len, len);
  1922. netlog("PPP: sending response len %d\n", len);
  1923. putframe(ppp, Pchap, b);
  1924. break;
  1925. case Cresponse:
  1926. c = ppp->chap;
  1927. vlen = m->data[0];
  1928. if(m->id != c->id) {
  1929. netlog("PPP: chap: bad response id\n");
  1930. break;
  1931. }
  1932. switch(c->proto) {
  1933. default:
  1934. sysfatal("unknown chap protocol: %d", c->proto);
  1935. case APmd5:
  1936. if(vlen > len - 5 || vlen != 16) {
  1937. netlog("PPP: chap: bad response len\n");
  1938. break;
  1939. }
  1940. cr.id = m->id;
  1941. memmove(cr.resp, m->data+1, 16);
  1942. memset(uid, 0, sizeof(uid));
  1943. n = len-5-vlen;
  1944. if(n >= PATH)
  1945. n = PATH-1;
  1946. memmove(uid, m->data+1+vlen, n);
  1947. c->cs->user = uid;
  1948. c->cs->resp = &cr;
  1949. c->cs->nresp = sizeof cr;
  1950. break;
  1951. case APmschap:
  1952. if(vlen > len - 5 || vlen != 49) {
  1953. netlog("PPP: chap: bad response len\n");
  1954. break;
  1955. }
  1956. memset(&mscr, 0, sizeof(mscr));
  1957. memmove(mscr.LMresp, m->data+1, 24);
  1958. memmove(mscr.NTresp, m->data+24+1, 24);
  1959. n = len-5-vlen;
  1960. p = m->data+1+vlen;
  1961. /* remove domain name */
  1962. for(i=0; i<n; i++) {
  1963. if(p[i] == '\\') {
  1964. p += i+1;
  1965. n -= i+1;
  1966. break;
  1967. }
  1968. }
  1969. if(n >= PATH)
  1970. n = PATH-1;
  1971. memset(uid, 0, sizeof(uid));
  1972. memmove(uid, p, n);
  1973. c->cs->user = uid;
  1974. c->cs->resp = &mscr;
  1975. c->cs->nresp = sizeof mscr;
  1976. break;
  1977. }
  1978. syslog(0, LOG, ": remote=%I vlen %d proto %d response user %s nresp %d", ppp->remote, vlen, c->proto, c->cs->user, c->cs->nresp);
  1979. if((ai = auth_response(c->cs)) == nil || auth_chuid(ai, nil) < 0){
  1980. c->state = Cunauth;
  1981. code = Cfailure;
  1982. syslog(0, LOG, ": remote=%I: auth failed: %r, uid=%s", ppp->remote, uid);
  1983. }else{
  1984. c->state = Cauthok;
  1985. code = Csuccess;
  1986. syslog(0, LOG, ": remote=%I: auth ok: uid=%s nsecret=%d", ppp->remote, uid, ai->nsecret);
  1987. if(c->proto == APmschap){
  1988. if(ai->nsecret != sizeof(ppp->key))
  1989. sysfatal("could not get the encryption key");
  1990. memmove(ppp->key, ai->secret, sizeof(ppp->key));
  1991. }
  1992. }
  1993. auth_freeAI(ai);
  1994. auth_freechal(c->cs);
  1995. c->cs = nil;
  1996. freeb(b);
  1997. /* send reply */
  1998. len = 4;
  1999. b = alloclcp(code, c->id, len, &m);
  2000. hnputs(m->len, len);
  2001. putframe(ppp, Pchap, b);
  2002. if(c->state == Cauthok) {
  2003. setphase(ppp, Pnet);
  2004. } else {
  2005. /* restart chapp negotiation */
  2006. chapinit(ppp);
  2007. }
  2008. break;
  2009. case Csuccess:
  2010. netlog("ppp: chap succeeded\n");
  2011. break;
  2012. case Cfailure:
  2013. netlog("ppp: chap failed\n");
  2014. break;
  2015. default:
  2016. syslog(0, LOG, "chap code %d?\n", m->code);
  2017. break;
  2018. }
  2019. qunlock(ppp);
  2020. freeb(b);
  2021. }
  2022. static void
  2023. putpaprequest(PPP *ppp)
  2024. {
  2025. Block *b;
  2026. Lcpmsg *m;
  2027. Chap *c;
  2028. int len, nlen, slen;
  2029. getauth(ppp);
  2030. c = ppp->chap;
  2031. c->id++;
  2032. netlog("PPP: pap: send authreq %d %s %s\n", c->id, ppp->chapname, "****");
  2033. nlen = strlen(ppp->chapname);
  2034. slen = strlen(ppp->secret);
  2035. len = 4 + 1 + nlen + 1 + slen;
  2036. b = alloclcp(Pauthreq, c->id, len, &m);
  2037. *b->wptr++ = nlen;
  2038. memmove(b->wptr, ppp->chapname, nlen);
  2039. b->wptr += nlen;
  2040. *b->wptr++ = slen;
  2041. memmove(b->wptr, ppp->secret, slen);
  2042. b->wptr += slen;
  2043. hnputs(m->len, len);
  2044. putframe(ppp, Ppasswd, b);
  2045. freeb(b);
  2046. }
  2047. static void
  2048. papinit(PPP *ppp)
  2049. {
  2050. ppp->chap->id = 0;
  2051. putpaprequest(ppp);
  2052. }
  2053. static void
  2054. getpap(PPP *ppp, Block *b)
  2055. {
  2056. Lcpmsg *m;
  2057. int len;
  2058. m = (Lcpmsg*)b->rptr;
  2059. len = 4;
  2060. if(BLEN(b) < 4 || BLEN(b) < (len = nhgets(m->len))){
  2061. syslog(0, LOG, "short pap message (%ld < %d)", BLEN(b), len);
  2062. freeb(b);
  2063. return;
  2064. }
  2065. if(len < sizeof(Lcpmsg))
  2066. m->data[0] = 0;
  2067. qlock(ppp);
  2068. switch(m->code){
  2069. case Pauthreq:
  2070. netlog("PPP: pap auth request, not supported\n");
  2071. break;
  2072. case Pauthack:
  2073. if(ppp->phase == Pauth
  2074. && ppp->chap->proto == APpasswd
  2075. && m->id <= ppp-> chap->id){
  2076. netlog("PPP: pap succeeded\n");
  2077. setphase(ppp, Pnet);
  2078. }
  2079. break;
  2080. case Pauthnak:
  2081. if(ppp->phase == Pauth
  2082. && ppp->chap->proto == APpasswd
  2083. && m->id <= ppp-> chap->id){
  2084. netlog("PPP: pap failed (%d:%.*s)\n",
  2085. m->data[0], m->data[0], (char*)m->data+1);
  2086. terminate(ppp, 0);
  2087. }
  2088. break;
  2089. default:
  2090. netlog("PPP: unknown pap messsage %d\n", m->code);
  2091. }
  2092. qunlock(ppp);
  2093. freeb(b);
  2094. }
  2095. static void
  2096. printopts(Pstate *p, Block *b, int send)
  2097. {
  2098. Lcpmsg *m;
  2099. Lcpopt *o;
  2100. int proto, x, period;
  2101. uchar *cp;
  2102. char *code, *dir;
  2103. m = (Lcpmsg*)b->rptr;
  2104. switch(m->code) {
  2105. default: code = "<unknown>"; break;
  2106. case Lconfreq: code = "confrequest"; break;
  2107. case Lconfack: code = "confack"; break;
  2108. case Lconfnak: code = "confnak"; break;
  2109. case Lconfrej: code = "confreject"; break;
  2110. }
  2111. if(send)
  2112. dir = "send";
  2113. else
  2114. dir = "recv";
  2115. netlog("ppp: %s %s: id=%d\n", dir, code, m->id);
  2116. for(cp = m->data; cp < b->wptr; cp += o->len){
  2117. o = (Lcpopt*)cp;
  2118. if(cp + o->len > b->wptr){
  2119. netlog("\tbad option length %ux\n", o->type);
  2120. return;
  2121. }
  2122. switch(p->proto){
  2123. case Plcp:
  2124. switch(o->type){
  2125. default:
  2126. netlog("\tunknown %d len=%d\n", o->type, o->len);
  2127. break;
  2128. case Omtu:
  2129. netlog("\tmtu = %d\n", nhgets(o->data));
  2130. break;
  2131. case Octlmap:
  2132. netlog("\tctlmap = %ux\n", nhgetl(o->data));
  2133. break;
  2134. case Oauth:
  2135. netlog("\tauth = %ux", nhgetl(o->data));
  2136. proto = nhgets(o->data);
  2137. switch(proto) {
  2138. default:
  2139. netlog("unknown auth proto %d\n", proto);
  2140. break;
  2141. case Ppasswd:
  2142. netlog("password\n");
  2143. break;
  2144. case Pchap:
  2145. netlog("chap %ux\n", o->data[2]);
  2146. break;
  2147. }
  2148. break;
  2149. case Oquality:
  2150. proto = nhgets(o->data);
  2151. switch(proto) {
  2152. default:
  2153. netlog("\tunknown quality proto %d\n", proto);
  2154. break;
  2155. case Plqm:
  2156. x = nhgetl(o->data+2)*10;
  2157. period = (x+Period-1)/Period;
  2158. netlog("\tlqm period = %d\n", period);
  2159. break;
  2160. }
  2161. case Omagic:
  2162. netlog("\tmagic = %ux\n", nhgetl(o->data));
  2163. break;
  2164. case Opc:
  2165. netlog("\tprotocol compress\n");
  2166. break;
  2167. case Oac:
  2168. netlog("\taddr compress\n");
  2169. break;
  2170. }
  2171. break;
  2172. case Pccp:
  2173. switch(o->type){
  2174. default:
  2175. netlog("\tunknown %d len=%d\n", o->type, o->len);
  2176. break;
  2177. case Ocoui:
  2178. netlog("\tOUI\n");
  2179. break;
  2180. case Ocstac:
  2181. netlog("\tstac LZS\n");
  2182. break;
  2183. case Ocmppc:
  2184. netlog("\tMicrosoft PPC len=%d %ux\n", o->len, nhgetl(o->data));
  2185. break;
  2186. case Octhwack:
  2187. netlog("\tThwack\n");
  2188. break;
  2189. }
  2190. break;
  2191. case Pecp:
  2192. switch(o->type){
  2193. default:
  2194. netlog("\tunknown %d len=%d\n", o->type, o->len);
  2195. break;
  2196. case Oeoui:
  2197. netlog("\tOUI\n");
  2198. break;
  2199. case Oedese:
  2200. netlog("\tDES\n");
  2201. break;
  2202. }
  2203. break;
  2204. case Pipcp:
  2205. switch(o->type){
  2206. default:
  2207. netlog("\tunknown %d len=%d\n", o->type, o->len);
  2208. break;
  2209. case Oipaddrs:
  2210. netlog("\tip addrs - deprecated\n");
  2211. break;
  2212. case Oipcompress:
  2213. netlog("\tip compress\n");
  2214. break;
  2215. case Oipaddr:
  2216. netlog("\tip addr %V\n", o->data);
  2217. break;
  2218. case Oipdns:
  2219. netlog("\tdns addr %V\n", o->data);
  2220. break;
  2221. case Oipwins:
  2222. netlog("\twins addr %V\n", o->data);
  2223. break;
  2224. case Oipdns2:
  2225. netlog("\tdns2 addr %V\n", o->data);
  2226. break;
  2227. case Oipwins2:
  2228. netlog("\twins2 addr %V\n", o->data);
  2229. break;
  2230. }
  2231. break;
  2232. }
  2233. }
  2234. }
  2235. static void
  2236. sendtermreq(PPP *ppp, Pstate *p)
  2237. {
  2238. Block *b;
  2239. Lcpmsg *m;
  2240. p->termid = ++(p->id);
  2241. b = alloclcp(Ltermreq, p->termid, 4, &m);
  2242. hnputs(m->len, 4);
  2243. putframe(ppp, p->proto, b);
  2244. freeb(b);
  2245. newstate(ppp, p, Sclosing);
  2246. }
  2247. static void
  2248. sendechoreq(PPP *ppp, Pstate *p)
  2249. {
  2250. Block *b;
  2251. Lcpmsg *m;
  2252. p->termid = ++(p->id);
  2253. b = alloclcp(Lechoreq, p->id, 4, &m);
  2254. hnputs(m->len, 4);
  2255. putframe(ppp, p->proto, b);
  2256. freeb(b);
  2257. }
  2258. enum
  2259. {
  2260. CtrlD = 0x4,
  2261. CtrlE = 0x5,
  2262. CtrlO = 0xf,
  2263. Cr = 13,
  2264. View = 0x80,
  2265. };
  2266. int conndone;
  2267. static void
  2268. xfer(int fd)
  2269. {
  2270. int i, n;
  2271. uchar xbuf[128];
  2272. for(;;) {
  2273. n = read(fd, xbuf, sizeof(xbuf));
  2274. if(n < 0)
  2275. break;
  2276. if(conndone)
  2277. break;
  2278. for(i = 0; i < n; i++)
  2279. if(xbuf[i] == Cr)
  2280. xbuf[i] = ' ';
  2281. write(1, xbuf, n);
  2282. }
  2283. close(fd);
  2284. }
  2285. static int
  2286. readcr(int fd, char *buf, int nbuf)
  2287. {
  2288. char c;
  2289. int n, tot;
  2290. tot = 0;
  2291. while((n=read(fd, &c, 1)) == 1){
  2292. if(c == '\n'){
  2293. buf[tot] = 0;
  2294. return tot;
  2295. }
  2296. buf[tot++] = c;
  2297. if(tot == nbuf)
  2298. sysfatal("line too long in readcr");
  2299. }
  2300. return n;
  2301. }
  2302. static void
  2303. connect(int fd, int cfd)
  2304. {
  2305. int n, ctl;
  2306. char xbuf[128];
  2307. if (chatfile) {
  2308. int chatfd, lineno, nb;
  2309. char *buf, *p, *s, response[128];
  2310. Dir *dir;
  2311. if ((chatfd = open(chatfile, OREAD)) < 0)
  2312. sysfatal("cannot open %s: %r", chatfile);
  2313. if ((dir = dirfstat(chatfd)) == nil)
  2314. sysfatal("cannot fstat %s: %r",chatfile);
  2315. buf = (char *)malloc(dir->length + 1);
  2316. assert(buf);
  2317. if ((nb = read(chatfd, buf, dir->length)) < 0)
  2318. sysfatal("cannot read chatfile %s: %r", chatfile);
  2319. assert(nb == dir->length);
  2320. buf[dir->length] = '\0';
  2321. free(dir);
  2322. close(chatfd);
  2323. p = buf;
  2324. lineno = 0;
  2325. for(;;) {
  2326. char *_args[3];
  2327. if ((s = strchr(p, '\n')) == nil)
  2328. break;
  2329. *s++ = '\0';
  2330. lineno++;
  2331. if (*p == '#') {
  2332. p = s;
  2333. continue;
  2334. }
  2335. if (tokenize(p, _args, 3) != 2)
  2336. sysfatal("invalid line %d (line expected: 'send' 'expect')",
  2337. lineno);
  2338. if (debug)
  2339. print("sending %s, expecting %s\n", _args[0], _args[1]);
  2340. if(strlen(_args[0])){
  2341. nb = fprint(fd, "%s\r", _args[0]);
  2342. assert(nb > 0);
  2343. }
  2344. if (strlen(_args[1]) > 0) {
  2345. if ((nb = readcr(fd, response, sizeof response-1)) < 0)
  2346. sysfatal("cannot read response from: %r");
  2347. if (debug)
  2348. print("response %s\n", response);
  2349. if (nb == 0)
  2350. sysfatal("eof on input?\n");
  2351. if (cistrstr(response, _args[1]) == nil)
  2352. sysfatal("expected %s, got %s\n", _args[1], response);
  2353. }
  2354. p = s;
  2355. }
  2356. free(buf);
  2357. return;
  2358. }
  2359. print("Connect to file system now, type ctrl-d when done.\n");
  2360. print("...(Use the view or down arrow key to send a break)\n");
  2361. print("...(Use ctrl-e to set even parity or ctrl-o for odd)\n");
  2362. ctl = open("/dev/consctl", OWRITE);
  2363. if(ctl < 0)
  2364. sysfatal("opening consctl");
  2365. fprint(ctl, "rawon");
  2366. fd = dup(fd, -1);
  2367. conndone = 0;
  2368. switch(rfork(RFPROC|RFMEM|RFNOWAIT)){
  2369. case -1:
  2370. sysfatal("forking xfer");
  2371. case 0:
  2372. xfer(fd);
  2373. _exits(nil);
  2374. }
  2375. for(;;){
  2376. read(0, xbuf, 1);
  2377. switch(xbuf[0]&0xff) {
  2378. case CtrlD: /* done */
  2379. conndone = 1;
  2380. close(ctl);
  2381. print("\n");
  2382. return;
  2383. case CtrlE: /* set even parity */
  2384. fprint(cfd, "pe");
  2385. break;
  2386. case CtrlO: /* set odd parity */
  2387. fprint(cfd, "po");
  2388. break;
  2389. case View: /* send a break */
  2390. fprint(cfd, "k500");
  2391. break;
  2392. default:
  2393. n = write(fd, xbuf, 1);
  2394. if(n < 0) {
  2395. errstr(xbuf, sizeof(xbuf));
  2396. conndone = 1;
  2397. close(ctl);
  2398. print("[remote write error (%s)]\n", xbuf);
  2399. return;
  2400. }
  2401. }
  2402. }
  2403. }
  2404. int interactive;
  2405. void
  2406. usage(void)
  2407. {
  2408. fprint(2, "usage: ppp [-cCdfPSu] [-b baud] [-k keyspec] [-m mtu] [-p dev] [-s username] [-x netmntpt] [-t modemcmd] [local-addr [remote-addr]]\n");
  2409. exits("usage");
  2410. }
  2411. void
  2412. main(int argc, char **argv)
  2413. {
  2414. int mtu, baud, framing, user, mediain, mediaout, cfd;
  2415. Ipaddr ipaddr, remip;
  2416. char *dev, *modemcmd;
  2417. char net[128];
  2418. PPP *ppp;
  2419. char buf[128];
  2420. rfork(RFREND|RFNOTEG|RFNAMEG);
  2421. fmtinstall('I', eipfmt);
  2422. fmtinstall('V', eipfmt);
  2423. fmtinstall('E', eipfmt);
  2424. dev = nil;
  2425. invalidate(ipaddr);
  2426. invalidate(remip);
  2427. mtu = Defmtu;
  2428. baud = 0;
  2429. framing = 0;
  2430. setnetmtpt(net, sizeof(net), nil);
  2431. user = 0;
  2432. modemcmd = nil;
  2433. ARGBEGIN{
  2434. case 'b':
  2435. baud = atoi(EARGF(usage()));
  2436. if(baud < 0)
  2437. baud = 0;
  2438. break;
  2439. case 'c':
  2440. nocompress = 1;
  2441. break;
  2442. case 'C':
  2443. noipcompress = 1;
  2444. break;
  2445. case 'd':
  2446. debug++;
  2447. break;
  2448. case 'f':
  2449. framing = 1;
  2450. break;
  2451. case 'F':
  2452. pppframing = 0;
  2453. break;
  2454. case 'k':
  2455. keyspec = EARGF(usage());
  2456. break;
  2457. case 'm':
  2458. mtu = atoi(EARGF(usage()));
  2459. if(mtu < Minmtu)
  2460. mtu = Minmtu;
  2461. if(mtu > Maxmtu)
  2462. mtu = Maxmtu;
  2463. break;
  2464. case 'M':
  2465. chatfile = EARGF(usage());
  2466. break;
  2467. case 'p':
  2468. dev = EARGF(usage());
  2469. break;
  2470. case 'P':
  2471. primary = 1;
  2472. break;
  2473. case 'S':
  2474. server = 1;
  2475. break;
  2476. case 't':
  2477. modemcmd = EARGF(usage());
  2478. break;
  2479. case 'u':
  2480. user = 1;
  2481. break;
  2482. case 'x':
  2483. setnetmtpt(net, sizeof net, EARGF(usage()));
  2484. break;
  2485. default:
  2486. fprint(2, "unknown option %c\n", ARGC());
  2487. usage();
  2488. }ARGEND;
  2489. switch(argc){
  2490. case 2:
  2491. parseip(remip, argv[1]);
  2492. case 1:
  2493. parseip(ipaddr, argv[0]);
  2494. case 0:
  2495. break;
  2496. default:
  2497. usage();
  2498. }
  2499. nip = nipifcs(net);
  2500. if(nip == 0 && !server)
  2501. primary = 1;
  2502. if(dev != nil){
  2503. mediain = open(dev, ORDWR);
  2504. if(mediain < 0){
  2505. if(strchr(dev, '!')){
  2506. if((mediain = dial(dev, 0, 0, &cfd)) == -1){
  2507. fprint(2, "ppp: couldn't dial %s: %r\n", dev);
  2508. exits(dev);
  2509. }
  2510. } else {
  2511. fprint(2, "ppp: couldn't open %s\n", dev);
  2512. exits(dev);
  2513. }
  2514. } else {
  2515. snprint(buf, sizeof buf, "%sctl", dev);
  2516. cfd = open(buf, ORDWR);
  2517. }
  2518. if(cfd > 0){
  2519. if(baud)
  2520. fprint(cfd, "b%d", baud);
  2521. fprint(cfd, "m1"); /* cts/rts flow control (and fifo's) on */
  2522. fprint(cfd, "q64000"); /* increase q size to 64k */
  2523. fprint(cfd, "n1"); /* nonblocking writes on */
  2524. fprint(cfd, "r1"); /* rts on */
  2525. fprint(cfd, "d1"); /* dtr on */
  2526. fprint(cfd, "c1"); /* dcdhup on */
  2527. if(user || chatfile)
  2528. connect(mediain, cfd);
  2529. close(cfd);
  2530. } else {
  2531. if(user || chatfile)
  2532. connect(mediain, -1);
  2533. }
  2534. mediaout = mediain;
  2535. } else {
  2536. mediain = open("/fd/0", OREAD);
  2537. if(mediain < 0){
  2538. fprint(2, "ppp: couldn't open /fd/0\n");
  2539. exits("/fd/0");
  2540. }
  2541. mediaout = open("/fd/1", OWRITE);
  2542. if(mediaout < 0){
  2543. fprint(2, "ppp: couldn't open /fd/0\n");
  2544. exits("/fd/1");
  2545. }
  2546. }
  2547. if(modemcmd != nil && mediaout >= 0)
  2548. fprint(mediaout, "%s\r", modemcmd);
  2549. ppp = mallocz(sizeof(*ppp), 1);
  2550. pppopen(ppp, mediain, mediaout, net, ipaddr, remip, mtu, framing);
  2551. /* wait until ip is configured */
  2552. rendezvous((void*)Rmagic, 0);
  2553. if(primary){
  2554. /* create a /net/ndb entry */
  2555. putndb(ppp, net);
  2556. }
  2557. exits(0);
  2558. }
  2559. void
  2560. netlog(char *fmt, ...)
  2561. {
  2562. va_list arg;
  2563. char *m;
  2564. static long start;
  2565. long now;
  2566. if(debug == 0)
  2567. return;
  2568. now = time(0);
  2569. if(start == 0)
  2570. start = now;
  2571. va_start(arg, fmt);
  2572. m = vsmprint(fmt, arg);
  2573. fprint(2, "%ld %s", now-start, m);
  2574. free(m);
  2575. va_end(arg);
  2576. }
  2577. /*
  2578. * return non-zero if this is a valid v4 address
  2579. */
  2580. static int
  2581. validv4(Ipaddr addr)
  2582. {
  2583. return memcmp(addr, v4prefix, IPv4off) == 0 && memcmp(addr, v4prefix, IPaddrlen) != 0;
  2584. }
  2585. static void
  2586. invalidate(Ipaddr addr)
  2587. {
  2588. ipmove(addr, IPnoaddr);
  2589. }
  2590. /*
  2591. * return number of networks
  2592. */
  2593. static int
  2594. nipifcs(char *net)
  2595. {
  2596. static Ipifc *ifc;
  2597. Ipifc *nifc;
  2598. Iplifc *lifc;
  2599. int n;
  2600. n = 0;
  2601. ifc = readipifc(net, ifc, -1);
  2602. for(nifc = ifc; nifc != nil; nifc = nifc->next)
  2603. for(lifc = ifc->lifc; lifc != nil; lifc = lifc->next)
  2604. n++;
  2605. return n;
  2606. }
  2607. /*
  2608. * make an ndb entry and put it into /net/ndb for the servers to see
  2609. */
  2610. static void
  2611. putndb(PPP *ppp, char *net)
  2612. {
  2613. char buf[1024];
  2614. char file[64];
  2615. char *p, *e;
  2616. int fd;
  2617. e = buf + sizeof(buf);
  2618. p = buf;
  2619. p = seprint(p, e, "ip=%I ipmask=255.255.255.255 ipgw=%I\n", ppp->local,
  2620. ppp->remote);
  2621. if(validv4(ppp->dns[0]))
  2622. p = seprint(p, e, "\tdns=%I\n", ppp->dns[0]);
  2623. if(validv4(ppp->dns[1]))
  2624. p = seprint(p, e, "\tdns=%I\n", ppp->dns[1]);
  2625. if(validv4(ppp->wins[0]))
  2626. p = seprint(p, e, "\twins=%I\n", ppp->wins[0]);
  2627. if(validv4(ppp->wins[1]))
  2628. p = seprint(p, e, "\twins=%I\n", ppp->wins[1]);
  2629. seprint(file, file+sizeof file, "%s/ndb", net);
  2630. fd = open(file, OWRITE);
  2631. if(fd < 0)
  2632. return;
  2633. write(fd, buf, p-buf);
  2634. close(fd);
  2635. seprint(file, file+sizeof file, "%s/cs", net);
  2636. fd = open(file, OWRITE);
  2637. write(fd, "refresh", 7);
  2638. close(fd);
  2639. seprint(file, file+sizeof file, "%s/dns", net);
  2640. fd = open(file, OWRITE);
  2641. write(fd, "refresh", 7);
  2642. close(fd);
  2643. }
  2644. static void
  2645. getauth(PPP *ppp)
  2646. {
  2647. UserPasswd *up;
  2648. if(*ppp->chapname)
  2649. return;
  2650. up = auth_getuserpasswd(auth_getkey,"proto=pass service=ppp %s", keyspec);
  2651. if(up != nil){
  2652. strcpy(ppp->chapname, up->user);
  2653. strcpy(ppp->secret, up->passwd);
  2654. }
  2655. }