ppp.c 59 KB

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273747576777879808182838485868788899091929394959697989910010110210310410510610710810911011111211311411511611711811912012112212312412512612712812913013113213313413513613713813914014114214314414514614714814915015115215315415515615715815916016116216316416516616716816917017117217317417517617717817918018118218318418518618718818919019119219319419519619719819920020120220320420520620720820921021121221321421521621721821922022122222322422522622722822923023123223323423523623723823924024124224324424524624724824925025125225325425525625725825926026126226326426526626726826927027127227327427527627727827928028128228328428528628728828929029129229329429529629729829930030130230330430530630730830931031131231331431531631731831932032132232332432532632732832933033133233333433533633733833934034134234334434534634734834935035135235335435535635735835936036136236336436536636736836937037137237337437537637737837938038138238338438538638738838939039139239339439539639739839940040140240340440540640740840941041141241341441541641741841942042142242342442542642742842943043143243343443543643743843944044144244344444544644744844945045145245345445545645745845946046146246346446546646746846947047147247347447547647747847948048148248348448548648748848949049149249349449549649749849950050150250350450550650750850951051151251351451551651751851952052152252352452552652752852953053153253353453553653753853954054154254354454554654754854955055155255355455555655755855956056156256356456556656756856957057157257357457557657757857958058158258358458558658758858959059159259359459559659759859960060160260360460560660760860961061161261361461561661761861962062162262362462562662762862963063163263363463563663763863964064164264364464564664764864965065165265365465565665765865966066166266366466566666766866967067167267367467567667767867968068168268368468568668768868969069169269369469569669769869970070170270370470570670770870971071171271371471571671771871972072172272372472572672772872973073173273373473573673773873974074174274374474574674774874975075175275375475575675775875976076176276376476576676776876977077177277377477577677777877978078178278378478578678778878979079179279379479579679779879980080180280380480580680780880981081181281381481581681781881982082182282382482582682782882983083183283383483583683783883984084184284384484584684784884985085185285385485585685785885986086186286386486586686786886987087187287387487587687787887988088188288388488588688788888989089189289389489589689789889990090190290390490590690790890991091191291391491591691791891992092192292392492592692792892993093193293393493593693793893994094194294394494594694794894995095195295395495595695795895996096196296396496596696796896997097197297397497597697797897998098198298398498598698798898999099199299399499599699799899910001001100210031004100510061007100810091010101110121013101410151016101710181019102010211022102310241025102610271028102910301031103210331034103510361037103810391040104110421043104410451046104710481049105010511052105310541055105610571058105910601061106210631064106510661067106810691070107110721073107410751076107710781079108010811082108310841085108610871088108910901091109210931094109510961097109810991100110111021103110411051106110711081109111011111112111311141115111611171118111911201121112211231124112511261127112811291130113111321133113411351136113711381139114011411142114311441145114611471148114911501151115211531154115511561157115811591160116111621163116411651166116711681169117011711172117311741175117611771178117911801181118211831184118511861187118811891190119111921193119411951196119711981199120012011202120312041205120612071208120912101211121212131214121512161217121812191220122112221223122412251226122712281229123012311232123312341235123612371238123912401241124212431244124512461247124812491250125112521253125412551256125712581259126012611262126312641265126612671268126912701271127212731274127512761277127812791280128112821283128412851286128712881289129012911292129312941295129612971298129913001301130213031304130513061307130813091310131113121313131413151316131713181319132013211322132313241325132613271328132913301331133213331334133513361337133813391340134113421343134413451346134713481349135013511352135313541355135613571358135913601361136213631364136513661367136813691370137113721373137413751376137713781379138013811382138313841385138613871388138913901391139213931394139513961397139813991400140114021403140414051406140714081409141014111412141314141415141614171418141914201421142214231424142514261427142814291430143114321433143414351436143714381439144014411442144314441445144614471448144914501451145214531454145514561457145814591460146114621463146414651466146714681469147014711472147314741475147614771478147914801481148214831484148514861487148814891490149114921493149414951496149714981499150015011502150315041505150615071508150915101511151215131514151515161517151815191520152115221523152415251526152715281529153015311532153315341535153615371538153915401541154215431544154515461547154815491550155115521553155415551556155715581559156015611562156315641565156615671568156915701571157215731574157515761577157815791580158115821583158415851586158715881589159015911592159315941595159615971598159916001601160216031604160516061607160816091610161116121613161416151616161716181619162016211622162316241625162616271628162916301631163216331634163516361637163816391640164116421643164416451646164716481649165016511652165316541655165616571658165916601661166216631664166516661667166816691670167116721673167416751676167716781679168016811682168316841685168616871688168916901691169216931694169516961697169816991700170117021703170417051706170717081709171017111712171317141715171617171718171917201721172217231724172517261727172817291730173117321733173417351736173717381739174017411742174317441745174617471748174917501751175217531754175517561757175817591760176117621763176417651766176717681769177017711772177317741775177617771778177917801781178217831784178517861787178817891790179117921793179417951796179717981799180018011802180318041805180618071808180918101811181218131814181518161817181818191820182118221823182418251826182718281829183018311832183318341835183618371838183918401841184218431844184518461847184818491850185118521853185418551856185718581859186018611862186318641865186618671868186918701871187218731874187518761877187818791880188118821883188418851886188718881889189018911892189318941895189618971898189919001901190219031904190519061907190819091910191119121913191419151916191719181919192019211922192319241925192619271928192919301931193219331934193519361937193819391940194119421943194419451946194719481949195019511952195319541955195619571958195919601961196219631964196519661967196819691970197119721973197419751976197719781979198019811982198319841985198619871988198919901991199219931994199519961997199819992000200120022003200420052006200720082009201020112012201320142015201620172018201920202021202220232024202520262027202820292030203120322033203420352036203720382039204020412042204320442045204620472048204920502051205220532054205520562057205820592060206120622063206420652066206720682069207020712072207320742075207620772078207920802081208220832084208520862087208820892090209120922093209420952096209720982099210021012102210321042105210621072108210921102111211221132114211521162117211821192120212121222123212421252126212721282129213021312132213321342135213621372138213921402141214221432144214521462147214821492150215121522153215421552156215721582159216021612162216321642165216621672168216921702171217221732174217521762177217821792180218121822183218421852186218721882189219021912192219321942195219621972198219922002201220222032204220522062207220822092210221122122213221422152216221722182219222022212222222322242225222622272228222922302231223222332234223522362237223822392240224122422243224422452246224722482249225022512252225322542255225622572258225922602261226222632264226522662267226822692270227122722273227422752276227722782279228022812282228322842285228622872288228922902291229222932294229522962297229822992300230123022303230423052306230723082309231023112312231323142315231623172318231923202321232223232324232523262327232823292330233123322333233423352336233723382339234023412342234323442345234623472348234923502351235223532354235523562357235823592360236123622363236423652366236723682369237023712372237323742375237623772378237923802381238223832384238523862387238823892390239123922393239423952396239723982399240024012402240324042405240624072408240924102411241224132414241524162417241824192420242124222423242424252426242724282429243024312432243324342435243624372438243924402441244224432444244524462447244824492450245124522453245424552456245724582459246024612462246324642465246624672468246924702471247224732474247524762477247824792480248124822483248424852486248724882489249024912492249324942495249624972498249925002501250225032504250525062507250825092510251125122513251425152516251725182519252025212522252325242525252625272528252925302531253225332534253525362537253825392540254125422543254425452546254725482549255025512552255325542555255625572558255925602561256225632564256525662567256825692570257125722573257425752576257725782579258025812582258325842585258625872588258925902591259225932594259525962597259825992600260126022603260426052606260726082609261026112612261326142615261626172618261926202621262226232624262526262627262826292630263126322633263426352636263726382639264026412642264326442645264626472648264926502651265226532654265526562657265826592660266126622663266426652666266726682669267026712672267326742675267626772678267926802681268226832684268526862687268826892690269126922693269426952696269726982699270027012702270327042705270627072708270927102711271227132714271527162717271827192720272127222723272427252726272727282729273027312732273327342735273627372738273927402741274227432744274527462747274827492750275127522753275427552756275727582759276027612762276327642765276627672768276927702771277227732774277527762777277827792780278127822783278427852786278727882789279027912792279327942795279627972798279928002801280228032804280528062807280828092810281128122813281428152816281728182819282028212822282328242825282628272828282928302831283228332834283528362837283828392840284128422843284428452846284728482849285028512852285328542855285628572858285928602861286228632864286528662867286828692870287128722873287428752876287728782879288028812882288328842885288628872888288928902891289228932894289528962897289828992900290129022903290429052906290729082909291029112912291329142915291629172918291929202921292229232924292529262927292829292930293129322933293429352936293729382939294029412942294329442945294629472948294929502951295229532954
  1. /*
  2. * This file is part of the UCB release of Plan 9. It is subject to the license
  3. * terms in the LICENSE file found in the top-level directory of this
  4. * distribution and at http://akaros.cs.berkeley.edu/files/Plan9License. No
  5. * part of the UCB release of Plan 9, including this file, may be copied,
  6. * modified, propagated, or distributed except according to the terms contained
  7. * in the LICENSE file.
  8. */
  9. /*
  10. * ppp - point-to-point protocol, rfc1331
  11. */
  12. #include <u.h>
  13. #include <libc.h>
  14. #include <auth.h>
  15. #include <bio.h>
  16. #include <ip.h>
  17. #include <libsec.h>
  18. #include <ndb.h>
  19. #include "ppp.h"
  20. #define PATH 128
  21. static int nocompress;
  22. static int pppframing = 1;
  23. static int noipcompress;
  24. static int server;
  25. static int noauth;
  26. static int nip; /* number of ip interfaces */
  27. static int dying; /* flag to signal to all threads its time to go */
  28. static int primary; /* this is the primary IP interface */
  29. static char *chatfile;
  30. int debug;
  31. char* LOG = "ppp";
  32. char* keyspec = "";
  33. enum
  34. {
  35. Rmagic= 0x12345
  36. };
  37. /*
  38. * Calculate FCS - rfc 1331
  39. */
  40. uint16_t fcstab[256] =
  41. {
  42. 0x0000, 0x1189, 0x2312, 0x329b, 0x4624, 0x57ad, 0x6536, 0x74bf,
  43. 0x8c48, 0x9dc1, 0xaf5a, 0xbed3, 0xca6c, 0xdbe5, 0xe97e, 0xf8f7,
  44. 0x1081, 0x0108, 0x3393, 0x221a, 0x56a5, 0x472c, 0x75b7, 0x643e,
  45. 0x9cc9, 0x8d40, 0xbfdb, 0xae52, 0xdaed, 0xcb64, 0xf9ff, 0xe876,
  46. 0x2102, 0x308b, 0x0210, 0x1399, 0x6726, 0x76af, 0x4434, 0x55bd,
  47. 0xad4a, 0xbcc3, 0x8e58, 0x9fd1, 0xeb6e, 0xfae7, 0xc87c, 0xd9f5,
  48. 0x3183, 0x200a, 0x1291, 0x0318, 0x77a7, 0x662e, 0x54b5, 0x453c,
  49. 0xbdcb, 0xac42, 0x9ed9, 0x8f50, 0xfbef, 0xea66, 0xd8fd, 0xc974,
  50. 0x4204, 0x538d, 0x6116, 0x709f, 0x0420, 0x15a9, 0x2732, 0x36bb,
  51. 0xce4c, 0xdfc5, 0xed5e, 0xfcd7, 0x8868, 0x99e1, 0xab7a, 0xbaf3,
  52. 0x5285, 0x430c, 0x7197, 0x601e, 0x14a1, 0x0528, 0x37b3, 0x263a,
  53. 0xdecd, 0xcf44, 0xfddf, 0xec56, 0x98e9, 0x8960, 0xbbfb, 0xaa72,
  54. 0x6306, 0x728f, 0x4014, 0x519d, 0x2522, 0x34ab, 0x0630, 0x17b9,
  55. 0xef4e, 0xfec7, 0xcc5c, 0xddd5, 0xa96a, 0xb8e3, 0x8a78, 0x9bf1,
  56. 0x7387, 0x620e, 0x5095, 0x411c, 0x35a3, 0x242a, 0x16b1, 0x0738,
  57. 0xffcf, 0xee46, 0xdcdd, 0xcd54, 0xb9eb, 0xa862, 0x9af9, 0x8b70,
  58. 0x8408, 0x9581, 0xa71a, 0xb693, 0xc22c, 0xd3a5, 0xe13e, 0xf0b7,
  59. 0x0840, 0x19c9, 0x2b52, 0x3adb, 0x4e64, 0x5fed, 0x6d76, 0x7cff,
  60. 0x9489, 0x8500, 0xb79b, 0xa612, 0xd2ad, 0xc324, 0xf1bf, 0xe036,
  61. 0x18c1, 0x0948, 0x3bd3, 0x2a5a, 0x5ee5, 0x4f6c, 0x7df7, 0x6c7e,
  62. 0xa50a, 0xb483, 0x8618, 0x9791, 0xe32e, 0xf2a7, 0xc03c, 0xd1b5,
  63. 0x2942, 0x38cb, 0x0a50, 0x1bd9, 0x6f66, 0x7eef, 0x4c74, 0x5dfd,
  64. 0xb58b, 0xa402, 0x9699, 0x8710, 0xf3af, 0xe226, 0xd0bd, 0xc134,
  65. 0x39c3, 0x284a, 0x1ad1, 0x0b58, 0x7fe7, 0x6e6e, 0x5cf5, 0x4d7c,
  66. 0xc60c, 0xd785, 0xe51e, 0xf497, 0x8028, 0x91a1, 0xa33a, 0xb2b3,
  67. 0x4a44, 0x5bcd, 0x6956, 0x78df, 0x0c60, 0x1de9, 0x2f72, 0x3efb,
  68. 0xd68d, 0xc704, 0xf59f, 0xe416, 0x90a9, 0x8120, 0xb3bb, 0xa232,
  69. 0x5ac5, 0x4b4c, 0x79d7, 0x685e, 0x1ce1, 0x0d68, 0x3ff3, 0x2e7a,
  70. 0xe70e, 0xf687, 0xc41c, 0xd595, 0xa12a, 0xb0a3, 0x8238, 0x93b1,
  71. 0x6b46, 0x7acf, 0x4854, 0x59dd, 0x2d62, 0x3ceb, 0x0e70, 0x1ff9,
  72. 0xf78f, 0xe606, 0xd49d, 0xc514, 0xb1ab, 0xa022, 0x92b9, 0x8330,
  73. 0x7bc7, 0x6a4e, 0x58d5, 0x495c, 0x3de3, 0x2c6a, 0x1ef1, 0x0f78
  74. };
  75. static char *snames[] =
  76. {
  77. "Sclosed",
  78. "Sclosing",
  79. "Sreqsent",
  80. "Sackrcvd",
  81. "Sacksent",
  82. "Sopened",
  83. };
  84. static void authtimer(PPP*);
  85. static void chapinit(PPP*);
  86. static void config(PPP*, Pstate*, int);
  87. static uint8_t* escapeuint8_t(PPP*, uint32_t, uint8_t*,
  88. uint16_t*);
  89. static void getchap(PPP*, Block*);
  90. static Block* getframe(PPP*, int*);
  91. static void getlqm(PPP*, Block*);
  92. static int getopts(PPP*, Pstate*, Block*);
  93. static void getpap(PPP*, Block*);
  94. static void init(PPP*);
  95. static void invalidate(Ipaddr);
  96. static void ipinproc(PPP*);
  97. static char* ipopen(PPP*);
  98. static void mediainproc(PPP*);
  99. static void newstate(PPP*, Pstate*, int);
  100. static int nipifcs(char*);
  101. static void papinit(PPP*);
  102. static void pinit(PPP*, Pstate*);
  103. static void ppptimer(PPP*);
  104. static void printopts(Pstate*, Block*, int);
  105. static void ptimer(PPP*, Pstate*);
  106. static int putframe(PPP*, int, Block*);
  107. static void putlqm(PPP*);
  108. static void putndb(PPP*, char*);
  109. static void putpaprequest(PPP*);
  110. static void rcv(PPP*, Pstate*, Block*);
  111. static void rejopts(PPP*, Pstate*, Block*, int);
  112. static void sendechoreq(PPP*, Pstate*);
  113. static void sendtermreq(PPP*, Pstate*);
  114. static void setphase(PPP*, int);
  115. static void terminate(PPP*, int);
  116. static int validv4(Ipaddr);
  117. static void dmppkt(char *s, uint8_t *a, int na);
  118. static void getauth(PPP*);
  119. void
  120. pppopen(PPP *ppp, int mediain, int mediaout, char *net,
  121. Ipaddr ipaddr, Ipaddr remip,
  122. int mtu, int framing)
  123. {
  124. ppp->ipfd = -1;
  125. ppp->ipcfd = -1;
  126. invalidate(ppp->remote);
  127. invalidate(ppp->local);
  128. invalidate(ppp->curremote);
  129. invalidate(ppp->curlocal);
  130. invalidate(ppp->dns[0]);
  131. invalidate(ppp->dns[1]);
  132. invalidate(ppp->wins[0]);
  133. invalidate(ppp->wins[1]);
  134. ppp->mediain = mediain;
  135. ppp->mediaout = mediaout;
  136. if(validv4(remip)){
  137. ipmove(ppp->remote, remip);
  138. ppp->remotefrozen = 1;
  139. }
  140. if(validv4(ipaddr)){
  141. ipmove(ppp->local, ipaddr);
  142. ppp->localfrozen = 1;
  143. }
  144. ppp->mtu = Defmtu;
  145. ppp->mru = mtu;
  146. ppp->framing = framing;
  147. ppp->net = net;
  148. init(ppp);
  149. switch(rfork(RFPROC|RFMEM|RFNOWAIT)){
  150. case -1:
  151. sysfatal("forking mediainproc");
  152. case 0:
  153. mediainproc(ppp);
  154. terminate(ppp, 1);
  155. _exits(0);
  156. }
  157. }
  158. static void
  159. init(PPP* ppp)
  160. {
  161. if(ppp->inbuf == nil){
  162. ppp->inbuf = allocb(4096);
  163. if(ppp->inbuf == nil)
  164. abort();
  165. ppp->outbuf = allocb(4096);
  166. if(ppp->outbuf == nil)
  167. abort();
  168. ppp->lcp = mallocz(sizeof(*ppp->lcp), 1);
  169. if(ppp->lcp == nil)
  170. abort();
  171. ppp->lcp->proto = Plcp;
  172. ppp->lcp->state = Sclosed;
  173. ppp->ccp = mallocz(sizeof(*ppp->ccp), 1);
  174. if(ppp->ccp == nil)
  175. abort();
  176. ppp->ccp->proto = Pccp;
  177. ppp->ccp->state = Sclosed;
  178. ppp->ipcp = mallocz(sizeof(*ppp->ipcp), 1);
  179. if(ppp->ipcp == nil)
  180. abort();
  181. ppp->ipcp->proto = Pipcp;
  182. ppp->ipcp->state = Sclosed;
  183. ppp->chap = mallocz(sizeof(*ppp->chap), 1);
  184. if(ppp->chap == nil)
  185. abort();
  186. ppp->chap->proto = APmschap;
  187. ppp->chap->state = Cunauth;
  188. auth_freechal(ppp->chap->cs);
  189. ppp->chap->cs = nil;
  190. switch(rfork(RFPROC|RFMEM|RFNOWAIT)){
  191. case -1:
  192. sysfatal("forking ppptimer");
  193. case 0:
  194. ppptimer(ppp);
  195. _exits(0);
  196. }
  197. }
  198. ppp->ctcp = compress_init(ppp->ctcp);
  199. pinit(ppp, ppp->lcp);
  200. setphase(ppp, Plink);
  201. }
  202. static void
  203. setphase(PPP *ppp, int phase)
  204. {
  205. int oldphase;
  206. oldphase = ppp->phase;
  207. ppp->phase = phase;
  208. switch(phase){
  209. default:
  210. sysfatal("ppp: unknown phase %d", phase);
  211. case Pdead:
  212. /* restart or exit? */
  213. pinit(ppp, ppp->lcp);
  214. setphase(ppp, Plink);
  215. break;
  216. case Plink:
  217. /* link down */
  218. switch(oldphase) {
  219. case Pauth:
  220. auth_freechal(ppp->chap->cs);
  221. ppp->chap->cs = nil;
  222. ppp->chap->state = Cunauth;
  223. break;
  224. case Pnet:
  225. auth_freechal(ppp->chap->cs);
  226. ppp->chap->cs = nil;
  227. ppp->chap->state = Cunauth;
  228. newstate(ppp, ppp->ccp, Sclosed);
  229. newstate(ppp, ppp->ipcp, Sclosed);
  230. }
  231. break;
  232. case Pauth:
  233. if(server)
  234. chapinit(ppp);
  235. else if(ppp->chap->proto == APpasswd)
  236. papinit(ppp);
  237. else
  238. setphase(ppp, Pnet);
  239. break;
  240. case Pnet:
  241. pinit(ppp, ppp->ccp);
  242. pinit(ppp, ppp->ipcp);
  243. break;
  244. case Pterm:
  245. /* what? */
  246. break;
  247. }
  248. }
  249. static void
  250. pinit(PPP *ppp, Pstate *p)
  251. {
  252. p->timeout = 0;
  253. switch(p->proto){
  254. case Plcp:
  255. ppp->magic = truerand();
  256. ppp->xctlmap = 0xffffffff;
  257. ppp->period = 0;
  258. p->optmask = 0xffffffff;
  259. if(!server)
  260. p->optmask &= ~(Fauth|Fmtu);
  261. ppp->rctlmap = 0;
  262. ppp->ipcp->state = Sclosed;
  263. ppp->ipcp->optmask = 0xffffffff;
  264. p->echotimeout = 0;
  265. /* quality goo */
  266. ppp->timeout = 0;
  267. memset(&ppp->in, 0, sizeof(ppp->in));
  268. memset(&ppp->out, 0, sizeof(ppp->out));
  269. memset(&ppp->pin, 0, sizeof(ppp->pin));
  270. memset(&ppp->pout, 0, sizeof(ppp->pout));
  271. memset(&ppp->sin, 0, sizeof(ppp->sin));
  272. break;
  273. case Pccp:
  274. if(nocompress)
  275. p->optmask = 0;
  276. else
  277. p->optmask = Fcmppc;
  278. if(ppp->ctype != nil)
  279. (*ppp->ctype->fini)(ppp->cstate);
  280. ppp->ctype = nil;
  281. ppp->ctries = 0;
  282. ppp->cstate = nil;
  283. if(ppp->unctype)
  284. (*ppp->unctype->fini)(ppp->uncstate);
  285. ppp->unctype = nil;
  286. ppp->uncstate = nil;
  287. break;
  288. case Pipcp:
  289. p->optmask = 0xffffffff;
  290. ppp->ctcp = compress_init(ppp->ctcp);
  291. break;
  292. }
  293. p->confid = p->rcvdconfid = -1;
  294. config(ppp, p, 1);
  295. newstate(ppp, p, Sreqsent);
  296. }
  297. /*
  298. * change protocol to a new state.
  299. */
  300. static void
  301. newstate(PPP *ppp, Pstate *p, int state)
  302. {
  303. char *err;
  304. netlog("ppp: %ux %s->%s ctlmap %lux/%lux flags %lux mtu %ld mru %ld\n",
  305. p->proto, snames[p->state], snames[state], ppp->rctlmap,
  306. ppp->xctlmap, p->flags,
  307. ppp->mtu, ppp->mru);
  308. syslog(0, "ppp", "%ux %s->%s ctlmap %lux/%lux flags %lux mtu %ld mru %ld",
  309. p->proto, snames[p->state], snames[state], ppp->rctlmap,
  310. ppp->xctlmap, p->flags,
  311. ppp->mtu, ppp->mru);
  312. if(p->proto == Plcp) {
  313. if(state == Sopened)
  314. setphase(ppp, noauth? Pnet : Pauth);
  315. else if(state == Sclosed)
  316. setphase(ppp, Pdead);
  317. else if(p->state == Sopened)
  318. setphase(ppp, Plink);
  319. }
  320. if(p->proto == Pccp && state == Sopened) {
  321. if(ppp->unctype)
  322. (*ppp->unctype->fini)(ppp->uncstate);
  323. ppp->unctype = nil;
  324. ppp->uncstate = nil;
  325. if(p->optmask & Fcmppc) {
  326. ppp->unctype = &uncmppc;
  327. ppp->uncstate = (*uncmppc.init)(ppp);
  328. }
  329. if(p->optmask & Fcthwack){
  330. ppp->unctype = &uncthwack;
  331. ppp->uncstate = (*uncthwack.init)(ppp);
  332. }
  333. }
  334. if(p->proto == Pipcp && state == Sopened) {
  335. if(server && !noauth && ppp->chap->state != Cauthok)
  336. abort();
  337. err = ipopen(ppp);
  338. if(err != nil)
  339. sysfatal("%s", err);
  340. }
  341. p->state = state;
  342. }
  343. /* returns (protocol, information) */
  344. static Block*
  345. getframe(PPP *ppp, int *protop)
  346. {
  347. uint8_t *p, *from, *to;
  348. int n, len, proto;
  349. uint32_t c;
  350. uint16_t fcs;
  351. Block *buf, *b;
  352. *protop = 0;
  353. if(ppp->framing == 0) {
  354. /* assume data is already framed */
  355. b = allocb(2000);
  356. len = b->lim - b->wptr;
  357. n = read(ppp->mediain, b->wptr, len);
  358. dmppkt("RX", b->wptr, n);
  359. if(n <= 0 || n == len){
  360. freeb(b);
  361. return nil;
  362. }
  363. b->wptr += n;
  364. /* should probably copy to another block if small */
  365. if(pppframing && b->rptr[0] == PPP_addr && b->rptr[1] == PPP_ctl)
  366. b->rptr += 2;
  367. proto = *b->rptr++;
  368. if((proto & 0x1) == 0)
  369. proto = (proto<<8) | *b->rptr++;
  370. if(b->rptr >= b->wptr){
  371. freeb(b);
  372. return nil;
  373. }
  374. ppp->in.uint8_ts += n;
  375. ppp->in.packets++;
  376. *protop = proto;
  377. netlog("getframe 0x%x\n", proto);
  378. return b;
  379. }
  380. buf = ppp->inbuf;
  381. for(;;){
  382. /* read till we hit a frame uint8_t or run out of room */
  383. for(p = buf->rptr; buf->wptr < buf->lim;){
  384. for(; p < buf->wptr; p++)
  385. if(*p == HDLC_frame)
  386. break;
  387. if(p != buf->wptr)
  388. break;
  389. len = buf->lim - buf->wptr;
  390. n = read(ppp->mediain, buf->wptr, len);
  391. if(n <= 0){
  392. syslog(0, LOG, "medium read returns %d: %r", n);
  393. buf->wptr = buf->rptr;
  394. return nil;
  395. }
  396. dmppkt("RX", buf->wptr, n);
  397. buf->wptr += n;
  398. }
  399. /* copy into block, undoing escapes, and caculating fcs */
  400. fcs = PPP_initfcs;
  401. b = allocb(p - buf->rptr);
  402. to = b->wptr;
  403. for(from = buf->rptr; from != p;){
  404. c = *from++;
  405. if(c == HDLC_esc){
  406. if(from == p)
  407. break;
  408. c = *from++ ^ 0x20;
  409. } else if((c < 0x20) && (ppp->rctlmap & (1 << c)))
  410. continue;
  411. *to++ = c;
  412. fcs = (fcs >> 8) ^ fcstab[(fcs ^ c) & 0xff];
  413. }
  414. /* copy down what's left in buffer */
  415. p++;
  416. memmove(buf->rptr, p, buf->wptr - p);
  417. n = p - buf->rptr;
  418. buf->wptr -= n;
  419. b->wptr = to - 2;
  420. /* return to caller if checksum matches */
  421. if(fcs == PPP_goodfcs){
  422. if(b->rptr[0] == PPP_addr && b->rptr[1] == PPP_ctl)
  423. b->rptr += 2;
  424. proto = *b->rptr++;
  425. if((proto & 0x1) == 0)
  426. proto = (proto<<8) | *b->rptr++;
  427. if(b->rptr < b->wptr){
  428. ppp->in.uint8_ts += n;
  429. ppp->in.packets++;
  430. *protop = proto;
  431. netlog("getframe 0x%x\n", proto);
  432. return b;
  433. }
  434. } else if(BLEN(b) > 0){
  435. if(ppp->ctcp)
  436. compress_error(ppp->ctcp);
  437. ppp->in.discards++;
  438. netlog("ppp: discard len %ld/%ld cksum %ux (%ux %ux %ux %ux)\n",
  439. BLEN(b), BLEN(buf), fcs, b->rptr[0],
  440. b->rptr[1], b->rptr[2], b->rptr[3]);
  441. }
  442. freeb(b);
  443. }
  444. }
  445. /* send a PPP frame */
  446. static int
  447. putframe(PPP *ppp, int proto, Block *b)
  448. {
  449. Block *buf;
  450. uint8_t *to, *from;
  451. uint16_t fcs;
  452. uint32_t ctlmap;
  453. uint8_t c;
  454. Block *bp;
  455. ppp->out.packets++;
  456. if(proto == Plcp)
  457. ctlmap = 0xffffffff;
  458. else
  459. ctlmap = ppp->xctlmap;
  460. /* make sure we have head room */
  461. if(b->rptr - b->base < 4){
  462. b = padb(b, 4);
  463. b->rptr += 4;
  464. }
  465. netlog("ppp: putframe 0x%ux %ld\n", proto, b->wptr-b->rptr);
  466. /* add in the protocol and address, we'd better have left room */
  467. from = b->rptr;
  468. *--from = proto;
  469. if(!(ppp->lcp->flags&Fpc) || proto > 0x100 || proto == Plcp)
  470. *--from = proto>>8;
  471. if(pppframing && (!(ppp->lcp->flags&Fac) || proto == Plcp)){
  472. *--from = PPP_ctl;
  473. *--from = PPP_addr;
  474. }
  475. qlock(&ppp->outlock);
  476. buf = ppp->outbuf;
  477. if(ppp->framing == 0) {
  478. to = buf->rptr;
  479. for(bp = b; bp; bp = bp->next){
  480. if(bp != b)
  481. from = bp->rptr;
  482. memmove(to, from, bp->wptr-from);
  483. to += bp->wptr-from;
  484. }
  485. } else {
  486. /* escape and checksum the body */
  487. fcs = PPP_initfcs;
  488. to = buf->rptr;
  489. /* add frame marker */
  490. *to++ = HDLC_frame;
  491. for(bp = b; bp; bp = bp->next){
  492. if(bp != b)
  493. from = bp->rptr;
  494. for(; from < bp->wptr; from++){
  495. c = *from;
  496. if(c == HDLC_frame || c == HDLC_esc
  497. || (c < 0x20 && ((1<<c) & ctlmap))){
  498. *to++ = HDLC_esc;
  499. *to++ = c ^ 0x20;
  500. } else
  501. *to++ = c;
  502. fcs = (fcs >> 8) ^ fcstab[(fcs ^ c) & 0xff];
  503. }
  504. }
  505. /* add on and escape the checksum */
  506. fcs = ~fcs;
  507. c = fcs;
  508. if(c == HDLC_frame || c == HDLC_esc
  509. || (c < 0x20 && ((1<<c) & ctlmap))){
  510. *to++ = HDLC_esc;
  511. *to++ = c ^ 0x20;
  512. } else
  513. *to++ = c;
  514. c = fcs>>8;
  515. if(c == HDLC_frame || c == HDLC_esc
  516. || (c < 0x20 && ((1<<c) & ctlmap))){
  517. *to++ = HDLC_esc;
  518. *to++ = c ^ 0x20;
  519. } else
  520. *to++ = c;
  521. /* add frame marker */
  522. *to++ = HDLC_frame;
  523. }
  524. /* send */
  525. buf->wptr = to;
  526. dmppkt("TX", buf->rptr, BLEN(buf));
  527. if(write(ppp->mediaout, buf->rptr, BLEN(buf)) < 0){
  528. qunlock(&ppp->outlock);
  529. return -1;
  530. }
  531. ppp->out.uint8_ts += BLEN(buf);
  532. qunlock(&ppp->outlock);
  533. return 0;
  534. }
  535. Block*
  536. alloclcp(int code, int id, int len, Lcpmsg **mp)
  537. {
  538. Block *b;
  539. Lcpmsg *m;
  540. /*
  541. * leave room for header
  542. */
  543. b = allocb(len);
  544. m = (Lcpmsg*)b->wptr;
  545. m->code = code;
  546. m->id = id;
  547. b->wptr += 4;
  548. *mp = m;
  549. return b;
  550. }
  551. static void
  552. putlo(Block *b, int type, uint32_t val)
  553. {
  554. *b->wptr++ = type;
  555. *b->wptr++ = 6;
  556. hnputl(b->wptr, val);
  557. b->wptr += 4;
  558. }
  559. static void
  560. putv4o(Block *b, int type, Ipaddr val)
  561. {
  562. *b->wptr++ = type;
  563. *b->wptr++ = 6;
  564. v6tov4(b->wptr, val);
  565. b->wptr += 4;
  566. }
  567. static void
  568. putso(Block *b, int type, uint32_t val)
  569. {
  570. *b->wptr++ = type;
  571. *b->wptr++ = 4;
  572. hnputs(b->wptr, val);
  573. b->wptr += 2;
  574. }
  575. static void
  576. puto(Block *b, int type)
  577. {
  578. *b->wptr++ = type;
  579. *b->wptr++ = 2;
  580. }
  581. /*
  582. * send configuration request
  583. */
  584. static void
  585. config(PPP *ppp, Pstate *p, int newid)
  586. {
  587. Block *b;
  588. Lcpmsg *m;
  589. int id;
  590. if(newid){
  591. id = p->id++;
  592. p->confid = id;
  593. p->timeout = Timeout;
  594. } else
  595. id = p->confid;
  596. b = alloclcp(Lconfreq, id, 256, &m);
  597. USED(m);
  598. switch(p->proto){
  599. case Plcp:
  600. if(p->optmask & Fctlmap)
  601. putlo(b, Octlmap, 0); /* we don't want anything escaped */
  602. if(p->optmask & Fmagic)
  603. putlo(b, Omagic, ppp->magic);
  604. if(p->optmask & Fmtu)
  605. putso(b, Omtu, ppp->mru);
  606. if(p->optmask & Fauth) {
  607. *b->wptr++ = Oauth;
  608. *b->wptr++ = 5;
  609. hnputs(b->wptr, Pchap);
  610. b->wptr += 2;
  611. *b->wptr++ = ppp->chap->proto;
  612. }
  613. if(p->optmask & Fpc)
  614. puto(b, Opc);
  615. if(p->optmask & Fac)
  616. puto(b, Oac);
  617. break;
  618. case Pccp:
  619. if(p->optmask & Fcthwack)
  620. puto(b, Octhwack);
  621. else if(p->optmask & Fcmppc) {
  622. *b->wptr++ = Ocmppc;
  623. *b->wptr++ = 6;
  624. *b->wptr++ = 0;
  625. *b->wptr++ = 0;
  626. *b->wptr++ = 0;
  627. *b->wptr++ = 0x41;
  628. }
  629. break;
  630. case Pipcp:
  631. if(p->optmask & Fipaddr)
  632. {syslog(0, "ppp", "requesting %I", ppp->local);
  633. putv4o(b, Oipaddr, ppp->local);
  634. }
  635. if(primary && (p->optmask & Fipdns))
  636. putv4o(b, Oipdns, ppp->dns[0]);
  637. if(primary && (p->optmask & Fipdns2))
  638. putv4o(b, Oipdns2, ppp->dns[1]);
  639. if(primary && (p->optmask & Fipwins))
  640. putv4o(b, Oipwins, ppp->wins[0]);
  641. if(primary && (p->optmask & Fipwins2))
  642. putv4o(b, Oipwins2, ppp->wins[1]);
  643. /*
  644. * don't ask for header compression while data compression is still pending.
  645. * perhaps we should restart ipcp negotiation if compression negotiation fails.
  646. */
  647. if(!noipcompress && !ppp->ccp->optmask && (p->optmask & Fipcompress)) {
  648. *b->wptr++ = Oipcompress;
  649. *b->wptr++ = 6;
  650. hnputs(b->wptr, Pvjctcp);
  651. b->wptr += 2;
  652. *b->wptr++ = MAX_STATES-1;
  653. *b->wptr++ = 1;
  654. }
  655. break;
  656. }
  657. hnputs(m->len, BLEN(b));
  658. printopts(p, b, 1);
  659. putframe(ppp, p->proto, b);
  660. freeb(b);
  661. }
  662. static void
  663. getipinfo(PPP *ppp)
  664. {
  665. char *av[3];
  666. int ndns, nwins;
  667. char ip[64];
  668. Ndbtuple *t, *nt;
  669. if(!validv4(ppp->local))
  670. return;
  671. av[0] = "dns";
  672. av[1] = "wins";
  673. sprint(ip, "%I", ppp->local);
  674. t = csipinfo(ppp->net, "ip", ip, av, 2);
  675. ndns = nwins = 0;
  676. for(nt = t; nt != nil; nt = nt->entry){
  677. if(strcmp(nt->attr, "dns") == 0){
  678. if(ndns < 2)
  679. parseip(ppp->dns[ndns++], nt->val);
  680. } else if(strcmp(nt->attr, "wins") == 0){
  681. if(nwins < 2)
  682. parseip(ppp->wins[nwins++], nt->val);
  683. }
  684. }
  685. if(t != nil)
  686. ndbfree(t);
  687. }
  688. /*
  689. * parse configuration request, sends an ack or reject packet
  690. *
  691. * returns: -1 if request was syntacticly incorrect
  692. * 0 if packet was accepted
  693. * 1 if packet was rejected
  694. */
  695. static int
  696. getopts(PPP *ppp, Pstate *p, Block *b)
  697. {
  698. Lcpmsg *m, *repm;
  699. Lcpopt *o;
  700. uint8_t *cp, *ap;
  701. uint32_t rejecting, nacking, flags, proto, chapproto;
  702. uint32_t mtu, ctlmap, period;
  703. uint32_t x;
  704. Block *repb;
  705. Comptype *ctype;
  706. Ipaddr ipaddr;
  707. rejecting = 0;
  708. nacking = 0;
  709. flags = 0;
  710. /* defaults */
  711. invalidate(ipaddr);
  712. mtu = ppp->mtu;
  713. ctlmap = 0xffffffff;
  714. period = 0;
  715. ctype = nil;
  716. chapproto = 0;
  717. m = (Lcpmsg*)b->rptr;
  718. repb = alloclcp(Lconfack, m->id, BLEN(b), &repm);
  719. /* copy options into ack packet */
  720. memmove(repm->data, m->data, b->wptr - m->data);
  721. repb->wptr += b->wptr - m->data;
  722. /* look for options we don't recognize or like */
  723. for(cp = m->data; cp < b->wptr; cp += o->len){
  724. o = (Lcpopt*)cp;
  725. if(cp + o->len > b->wptr || o->len==0){
  726. freeb(repb);
  727. netlog("ppp: bad option length %ux\n", o->type);
  728. return -1;
  729. }
  730. switch(p->proto){
  731. case Plcp:
  732. switch(o->type){
  733. case Oac:
  734. flags |= Fac;
  735. continue;
  736. case Opc:
  737. flags |= Fpc;
  738. continue;
  739. case Omtu:
  740. mtu = nhgets(o->data);
  741. continue;
  742. case Omagic:
  743. if(ppp->magic == nhgetl(o->data))
  744. netlog("ppp: possible loop\n");
  745. continue;
  746. case Octlmap:
  747. ctlmap = nhgetl(o->data);
  748. continue;
  749. case Oquality:
  750. proto = nhgets(o->data);
  751. if(proto != Plqm)
  752. break;
  753. x = nhgetl(o->data+2)*10;
  754. period = (x+Period-1)/Period;
  755. continue;
  756. case Oauth:
  757. proto = nhgets(o->data);
  758. if(proto == Ppasswd && !server){
  759. chapproto = APpasswd;
  760. continue;
  761. }
  762. if(proto != Pchap)
  763. break;
  764. if(o->data[2] != APmd5 && o->data[2] != APmschap)
  765. break;
  766. chapproto = o->data[2];
  767. continue;
  768. }
  769. break;
  770. case Pccp:
  771. if(nocompress)
  772. break;
  773. switch(o->type){
  774. case Octhwack:
  775. break;
  776. /*
  777. if(o->len == 2){
  778. ctype = &cthwack;
  779. continue;
  780. }
  781. if(!nacking){
  782. nacking = 1;
  783. repb->wptr = repm->data;
  784. repm->code = Lconfnak;
  785. }
  786. puto(repb, Octhwack);
  787. continue;
  788. */
  789. case Ocmppc:
  790. x = nhgetl(o->data);
  791. // hack for Mac
  792. // if(x == 0)
  793. // continue;
  794. /* stop ppp loops */
  795. if((x&0x41) == 0 || ppp->ctries++ > 5) {
  796. /*
  797. * turn off requests as well - I don't think this
  798. * is needed in the standard
  799. */
  800. p->optmask &= ~Fcmppc;
  801. break;
  802. }
  803. if(rejecting)
  804. continue;
  805. if(x & 1) {
  806. ctype = &cmppc;
  807. ppp->sendencrypted = (o->data[3]&0x40) == 0x40;
  808. continue;
  809. }
  810. if(!nacking){
  811. nacking = 1;
  812. repb->wptr = repm->data;
  813. repm->code = Lconfnak;
  814. }
  815. *repb->wptr++ = Ocmppc;
  816. *repb->wptr++ = 6;
  817. *repb->wptr++ = 0;
  818. *repb->wptr++ = 0;
  819. *repb->wptr++ = 0;
  820. *repb->wptr++ = 0x41;
  821. continue;
  822. }
  823. break;
  824. case Pipcp:
  825. switch(o->type){
  826. case Oipaddr:
  827. v4tov6(ipaddr, o->data);
  828. if(!validv4(ppp->remote))
  829. continue;
  830. if(!validv4(ipaddr) && !rejecting){
  831. /* other side requesting an address */
  832. if(!nacking){
  833. nacking = 1;
  834. repb->wptr = repm->data;
  835. repm->code = Lconfnak;
  836. }
  837. putv4o(repb, Oipaddr, ppp->remote);
  838. }
  839. continue;
  840. case Oipdns:
  841. ap = ppp->dns[0];
  842. goto ipinfo;
  843. case Oipdns2:
  844. ap = ppp->dns[1];
  845. goto ipinfo;
  846. case Oipwins:
  847. ap = ppp->wins[0];
  848. goto ipinfo;
  849. case Oipwins2:
  850. ap = ppp->wins[1];
  851. goto ipinfo;
  852. ipinfo:
  853. if(!validv4(ap))
  854. getipinfo(ppp);
  855. if(!validv4(ap))
  856. break;
  857. v4tov6(ipaddr, o->data);
  858. if(!validv4(ipaddr) && !rejecting){
  859. /* other side requesting an address */
  860. if(!nacking){
  861. nacking = 1;
  862. repb->wptr = repm->data;
  863. repm->code = Lconfnak;
  864. }
  865. putv4o(repb, o->type, ap);
  866. }
  867. continue;
  868. case Oipcompress:
  869. /*
  870. * don't compress tcp header if we've negotiated data compression.
  871. * tcp header compression has very poor performance if there is an error.
  872. */
  873. proto = nhgets(o->data);
  874. if(noipcompress || proto != Pvjctcp || ppp->ctype != nil)
  875. break;
  876. if(compress_negotiate(ppp->ctcp, o->data+2) < 0)
  877. break;
  878. flags |= Fipcompress;
  879. continue;
  880. }
  881. break;
  882. }
  883. /* come here if option is not recognized */
  884. if(!rejecting){
  885. rejecting = 1;
  886. repb->wptr = repm->data;
  887. repm->code = Lconfrej;
  888. }
  889. netlog("ppp: bad %ux option %d\n", p->proto, o->type);
  890. memmove(repb->wptr, o, o->len);
  891. repb->wptr += o->len;
  892. }
  893. /* permanent changes only after we know that we liked the packet */
  894. if(!rejecting && !nacking){
  895. switch(p->proto){
  896. case Plcp:
  897. ppp->period = period;
  898. ppp->xctlmap = ctlmap;
  899. if(mtu > Maxmtu)
  900. mtu = Maxmtu;
  901. if(mtu < Minmtu)
  902. mtu = Minmtu;
  903. ppp->mtu = mtu;
  904. if(chapproto)
  905. ppp->chap->proto = chapproto;
  906. break;
  907. case Pccp:
  908. if(ppp->ctype != nil){
  909. (*ppp->ctype->fini)(ppp->cstate);
  910. ppp->cstate = nil;
  911. }
  912. ppp->ctype = ctype;
  913. if(ctype)
  914. ppp->cstate = (*ctype->init)(ppp);
  915. break;
  916. case Pipcp:
  917. if(validv4(ipaddr) && ppp->remotefrozen == 0)
  918. ipmove(ppp->remote, ipaddr);
  919. break;
  920. }
  921. p->flags = flags;
  922. }
  923. hnputs(repm->len, BLEN(repb));
  924. printopts(p, repb, 1);
  925. putframe(ppp, p->proto, repb);
  926. freeb(repb);
  927. return rejecting || nacking;
  928. }
  929. static void
  930. dmppkt(char *s, uint8_t *a, int na)
  931. {
  932. int i;
  933. if (debug < 3)
  934. return;
  935. fprint(2, "%s", s);
  936. for(i = 0; i < na; i++)
  937. fprint(2, " %.2ux", a[i]);
  938. fprint(2, "\n");
  939. }
  940. static void
  941. dropoption(Pstate *p, Lcpopt *o)
  942. {
  943. unsigned n = o->type;
  944. switch(n){
  945. case Oipaddr:
  946. break;
  947. case Oipdns:
  948. p->optmask &= ~Fipdns;
  949. break;
  950. case Oipwins:
  951. p->optmask &= ~Fipwins;
  952. break;
  953. case Oipdns2:
  954. p->optmask &= ~Fipdns2;
  955. break;
  956. case Oipwins2:
  957. p->optmask &= ~Fipwins2;
  958. break;
  959. default:
  960. if(o->type < 8*sizeof(p->optmask))
  961. p->optmask &= ~(1<<o->type);
  962. break;
  963. }
  964. }
  965. /*
  966. * parse configuration rejection, just stop sending anything that they
  967. * don't like (except for ipcp address nak).
  968. */
  969. static void
  970. rejopts(PPP *ppp, Pstate *p, Block *b, int code)
  971. {
  972. Lcpmsg *m;
  973. Lcpopt *o;
  974. uint8_t newip[IPaddrlen];
  975. /* just give up trying what the other side doesn't like */
  976. m = (Lcpmsg*)b->rptr;
  977. for(b->rptr = m->data; b->rptr < b->wptr; b->rptr += o->len){
  978. o = (Lcpopt*)b->rptr;
  979. if(b->rptr + o->len > b->wptr){
  980. netlog("ppp: bad roption length %ux\n", o->type);
  981. return;
  982. }
  983. if(code == Lconfrej){
  984. dropoption(p, o);
  985. netlog("ppp: %ux rejecting %d\n",
  986. p->proto, o->type);
  987. continue;
  988. }
  989. switch(p->proto){
  990. case Plcp:
  991. switch(o->type){
  992. case Octlmap:
  993. ppp->rctlmap = nhgetl(o->data);
  994. break;
  995. case Oauth:
  996. /* don't allow client to request no auth */
  997. /* could try different auth protocol here */
  998. fprint(2, "ppp: can not reject CHAP\n");
  999. exits("ppp: CHAP");
  1000. break;
  1001. default:
  1002. if(o->type < 8*sizeof(p->optmask))
  1003. p->optmask &= ~(1<<o->type);
  1004. break;
  1005. };
  1006. break;
  1007. case Pccp:
  1008. switch(o->type){
  1009. default:
  1010. dropoption(p, o);
  1011. break;
  1012. }
  1013. break;
  1014. case Pipcp:
  1015. switch(o->type){
  1016. case Oipaddr:
  1017. syslog(0, "ppp", "rejected addr %I with %V", ppp->local, o->data);
  1018. /* if we're a server, don't let other end change our addr */
  1019. if(ppp->localfrozen){
  1020. dropoption(p, o);
  1021. break;
  1022. }
  1023. /* accept whatever server tells us */
  1024. if(!validv4(ppp->local)){
  1025. v4tov6(ppp->local, o->data);
  1026. dropoption(p, o);
  1027. break;
  1028. }
  1029. /* if he didn't like our addr, ask for a generic one */
  1030. v4tov6(newip, o->data);
  1031. if(!validv4(newip)){
  1032. invalidate(ppp->local);
  1033. break;
  1034. }
  1035. /* if he gives us something different, use it anyways */
  1036. v4tov6(ppp->local, o->data);
  1037. dropoption(p, o);
  1038. break;
  1039. case Oipdns:
  1040. if (!validv4(ppp->dns[0])){
  1041. v4tov6(ppp->dns[0], o->data);
  1042. dropoption(p, o);
  1043. break;
  1044. }
  1045. v4tov6(newip, o->data);
  1046. if(!validv4(newip)){
  1047. invalidate(ppp->dns[0]);
  1048. break;
  1049. }
  1050. v4tov6(ppp->dns[0], o->data);
  1051. dropoption(p, o);
  1052. break;
  1053. case Oipwins:
  1054. if (!validv4(ppp->wins[0])){
  1055. v4tov6(ppp->wins[0], o->data);
  1056. dropoption(p, o);
  1057. break;
  1058. }
  1059. v4tov6(newip, o->data);
  1060. if(!validv4(newip)){
  1061. invalidate(ppp->wins[0]);
  1062. break;
  1063. }
  1064. v4tov6(ppp->wins[0], o->data);
  1065. dropoption(p, o);
  1066. break;
  1067. case Oipdns2:
  1068. if (!validv4(ppp->dns[1])){
  1069. v4tov6(ppp->dns[1], o->data);
  1070. dropoption(p, o);
  1071. break;
  1072. }
  1073. v4tov6(newip, o->data);
  1074. if(!validv4(newip)){
  1075. invalidate(ppp->dns[1]);
  1076. break;
  1077. }
  1078. v4tov6(ppp->dns[1], o->data);
  1079. dropoption(p, o);
  1080. break;
  1081. case Oipwins2:
  1082. if (!validv4(ppp->wins[1])){
  1083. v4tov6(ppp->wins[1], o->data);
  1084. dropoption(p, o);
  1085. break;
  1086. }
  1087. v4tov6(newip, o->data);
  1088. if(!validv4(newip)){
  1089. invalidate(ppp->wins[1]);
  1090. break;
  1091. }
  1092. v4tov6(ppp->wins[1], o->data);
  1093. dropoption(p, o);
  1094. break;
  1095. default:
  1096. dropoption(p, o);
  1097. break;
  1098. }
  1099. break;
  1100. }
  1101. }
  1102. }
  1103. /*
  1104. * put a messages through the lcp or ipcp state machine. They are
  1105. * very similar.
  1106. */
  1107. static void
  1108. rcv(PPP *ppp, Pstate *p, Block *b)
  1109. {
  1110. uint32_t len;
  1111. int err;
  1112. Lcpmsg *m;
  1113. int proto;
  1114. if(BLEN(b) < 4){
  1115. netlog("ppp: short lcp message\n");
  1116. freeb(b);
  1117. return;
  1118. }
  1119. m = (Lcpmsg*)b->rptr;
  1120. len = nhgets(m->len);
  1121. if(BLEN(b) < len){
  1122. netlog("ppp: short lcp message\n");
  1123. freeb(b);
  1124. return;
  1125. }
  1126. netlog("ppp: %ux rcv %d len %ld id %d/%d/%d\n",
  1127. p->proto, m->code, len, m->id, p->confid, p->id);
  1128. if(p->proto != Plcp && ppp->lcp->state != Sopened){
  1129. netlog("ppp: non-lcp with lcp not open\n");
  1130. freeb(b);
  1131. return;
  1132. }
  1133. qlock(ppp);
  1134. switch(m->code){
  1135. case Lconfreq:
  1136. printopts(p, b, 0);
  1137. err = getopts(ppp, p, b);
  1138. if(err < 0)
  1139. break;
  1140. if(m->id == p->rcvdconfid)
  1141. break; /* don't change state for duplicates */
  1142. switch(p->state){
  1143. case Sackrcvd:
  1144. if(err)
  1145. break;
  1146. newstate(ppp, p, Sopened);
  1147. break;
  1148. case Sclosed:
  1149. case Sopened:
  1150. config(ppp, p, 1);
  1151. if(err == 0)
  1152. newstate(ppp, p, Sacksent);
  1153. else
  1154. newstate(ppp, p, Sreqsent);
  1155. break;
  1156. case Sreqsent:
  1157. case Sacksent:
  1158. if(err == 0)
  1159. newstate(ppp, p, Sacksent);
  1160. else
  1161. newstate(ppp, p, Sreqsent);
  1162. break;
  1163. }
  1164. break;
  1165. case Lconfack:
  1166. if(p->confid != m->id){
  1167. /* ignore if it isn't the message we're sending */
  1168. netlog("ppp: dropping confack\n");
  1169. break;
  1170. }
  1171. p->confid = -1; /* ignore duplicates */
  1172. p->id++; /* avoid sending duplicates */
  1173. netlog("ppp: recv confack\n");
  1174. switch(p->state){
  1175. case Sopened:
  1176. case Sackrcvd:
  1177. config(ppp, p, 1);
  1178. newstate(ppp, p, Sreqsent);
  1179. break;
  1180. case Sreqsent:
  1181. newstate(ppp, p, Sackrcvd);
  1182. break;
  1183. case Sacksent:
  1184. newstate(ppp, p, Sopened);
  1185. break;
  1186. }
  1187. break;
  1188. case Lconfrej:
  1189. case Lconfnak:
  1190. if(p->confid != m->id) {
  1191. /* ignore if it isn't the message we're sending */
  1192. netlog("ppp: dropping confrej or confnak\n");
  1193. break;
  1194. }
  1195. p->confid = -1; /* ignore duplicates */
  1196. p->id++; /* avoid sending duplicates */
  1197. switch(p->state){
  1198. case Sopened:
  1199. case Sackrcvd:
  1200. config(ppp, p, 1);
  1201. newstate(ppp, p, Sreqsent);
  1202. break;
  1203. case Sreqsent:
  1204. case Sacksent:
  1205. printopts(p, b, 0);
  1206. rejopts(ppp, p, b, m->code);
  1207. config(ppp, p, 1);
  1208. break;
  1209. }
  1210. break;
  1211. case Ltermreq:
  1212. m->code = Ltermack;
  1213. putframe(ppp, p->proto, b);
  1214. switch(p->state){
  1215. case Sackrcvd:
  1216. case Sacksent:
  1217. newstate(ppp, p, Sreqsent);
  1218. break;
  1219. case Sopened:
  1220. newstate(ppp, p, Sclosing);
  1221. break;
  1222. }
  1223. break;
  1224. case Ltermack:
  1225. if(p->termid != m->id) /* ignore if it isn't the message we're sending */
  1226. break;
  1227. if(p->proto == Plcp)
  1228. ppp->ipcp->state = Sclosed;
  1229. switch(p->state){
  1230. case Sclosing:
  1231. newstate(ppp, p, Sclosed);
  1232. break;
  1233. case Sackrcvd:
  1234. newstate(ppp, p, Sreqsent);
  1235. break;
  1236. case Sopened:
  1237. config(ppp, p, 0);
  1238. newstate(ppp, p, Sreqsent);
  1239. break;
  1240. }
  1241. break;
  1242. case Lcoderej:
  1243. //newstate(ppp, p, Sclosed);
  1244. syslog(0, LOG, "code reject %d\n", m->data[0]);
  1245. break;
  1246. case Lprotorej:
  1247. proto = nhgets(m->data);
  1248. netlog("ppp: proto reject %ux\n", proto);
  1249. if(proto == Pccp)
  1250. newstate(ppp, ppp->ccp, Sclosed);
  1251. break;
  1252. case Lechoreq:
  1253. if(BLEN(b) < 8){
  1254. netlog("ppp: short lcp echo request\n");
  1255. freeb(b);
  1256. return;
  1257. }
  1258. m->code = Lechoack;
  1259. hnputl(m->data, ppp->magic);
  1260. putframe(ppp, p->proto, b);
  1261. break;
  1262. case Lechoack:
  1263. p->echoack = 1;
  1264. break;
  1265. case Ldiscard:
  1266. /* nothing to do */
  1267. break;
  1268. case Lresetreq:
  1269. if(p->proto != Pccp)
  1270. break;
  1271. ppp->stat.compreset++;
  1272. if(ppp->ctype != nil)
  1273. b = (*ppp->ctype->resetreq)(ppp->cstate, b);
  1274. if(b != nil) {
  1275. m = (Lcpmsg*)b->rptr;
  1276. m->code = Lresetack;
  1277. putframe(ppp, p->proto, b);
  1278. }
  1279. break;
  1280. case Lresetack:
  1281. if(p->proto != Pccp)
  1282. break;
  1283. if(ppp->unctype != nil)
  1284. (*ppp->unctype->resetack)(ppp->uncstate, b);
  1285. break;
  1286. }
  1287. qunlock(ppp);
  1288. freeb(b);
  1289. }
  1290. /*
  1291. * timer for protocol state machine
  1292. */
  1293. static void
  1294. ptimer(PPP *ppp, Pstate *p)
  1295. {
  1296. if(p->state == Sopened || p->state == Sclosed)
  1297. return;
  1298. p->timeout--;
  1299. switch(p->state){
  1300. case Sclosing:
  1301. sendtermreq(ppp, p);
  1302. break;
  1303. case Sreqsent:
  1304. case Sacksent:
  1305. if(p->timeout <= 0)
  1306. newstate(ppp, p, Sclosed);
  1307. else {
  1308. config(ppp, p, 0);
  1309. }
  1310. break;
  1311. case Sackrcvd:
  1312. if(p->timeout <= 0)
  1313. newstate(ppp, p, Sclosed);
  1314. else {
  1315. config(ppp, p, 0);
  1316. newstate(ppp, p, Sreqsent);
  1317. }
  1318. break;
  1319. }
  1320. }
  1321. /* paptimer -- pap timer event handler
  1322. *
  1323. * If PAP authorization hasn't come through, resend an authreqst. If
  1324. * the maximum number of requests have been sent (~ 30 seconds), give
  1325. * up.
  1326. *
  1327. */
  1328. static void
  1329. authtimer(PPP* ppp)
  1330. {
  1331. if(ppp->chap->proto != APpasswd)
  1332. return;
  1333. if(ppp->chap->id < 21)
  1334. putpaprequest(ppp);
  1335. else {
  1336. terminate(ppp, 0);
  1337. netlog("ppp: pap timed out--not authorized\n");
  1338. }
  1339. }
  1340. /*
  1341. * timer for ppp
  1342. */
  1343. static void
  1344. ppptimer(PPP *ppp)
  1345. {
  1346. while(!dying){
  1347. sleep(Period);
  1348. qlock(ppp);
  1349. netlog("ppp: ppptimer\n");
  1350. ptimer(ppp, ppp->lcp);
  1351. if(ppp->lcp->state == Sopened) {
  1352. switch(ppp->phase){
  1353. case Pnet:
  1354. ptimer(ppp, ppp->ccp);
  1355. ptimer(ppp, ppp->ipcp);
  1356. break;
  1357. case Pauth:
  1358. authtimer(ppp);
  1359. break;
  1360. }
  1361. }
  1362. /* link quality measurement */
  1363. if(ppp->period && --(ppp->timeout) <= 0){
  1364. ppp->timeout = ppp->period;
  1365. putlqm(ppp);
  1366. }
  1367. qunlock(ppp);
  1368. }
  1369. }
  1370. static void
  1371. setdefroute(char *net, Ipaddr gate)
  1372. {
  1373. int fd;
  1374. char path[128];
  1375. snprint(path, sizeof path, "%s/iproute", net);
  1376. fd = open(path, ORDWR);
  1377. if(fd < 0)
  1378. return;
  1379. fprint(fd, "add 0 0 %I", gate);
  1380. close(fd);
  1381. }
  1382. enum
  1383. {
  1384. Mofd= 32,
  1385. };
  1386. struct
  1387. {
  1388. Lock;
  1389. int fd[Mofd];
  1390. int cfd[Mofd];
  1391. int n;
  1392. } old;
  1393. static char*
  1394. ipopen(PPP *ppp)
  1395. {
  1396. static int ipinprocpid;
  1397. int n, cfd, fd;
  1398. char path[128];
  1399. char buf[128];
  1400. if(ipinprocpid <= 0){
  1401. snprint(path, sizeof path, "%s/ipifc/clone", ppp->net);
  1402. cfd = open(path, ORDWR);
  1403. if(cfd < 0)
  1404. return "can't open ip interface";
  1405. n = read(cfd, buf, sizeof(buf) - 1);
  1406. if(n <= 0){
  1407. close(cfd);
  1408. return "can't open ip interface";
  1409. }
  1410. buf[n] = 0;
  1411. netlog("ppp: setting up IP interface local %I remote %I (valid %d)\n",
  1412. ppp->local, ppp->remote, validv4(ppp->remote));
  1413. if(!validv4(ppp->remote))
  1414. ipmove(ppp->remote, ppp->local);
  1415. snprint(path, sizeof path, "%s/ipifc/%s/data", ppp->net, buf);
  1416. fd = open(path, ORDWR);
  1417. if(fd < 0){
  1418. close(cfd);
  1419. return "can't open ip interface";
  1420. }
  1421. if(fprint(cfd, "bind pkt") < 0)
  1422. return "binding pkt to ip interface";
  1423. if(fprint(cfd, "add %I 255.255.255.255 %I %lud proxy", ppp->local,
  1424. ppp->remote, ppp->mtu-10) < 0){
  1425. close(cfd);
  1426. return "can't set addresses";
  1427. }
  1428. if(primary)
  1429. setdefroute(ppp->net, ppp->remote);
  1430. ppp->ipfd = fd;
  1431. ppp->ipcfd = cfd;
  1432. /* signal main() that ip is configured */
  1433. rendezvous((void*)Rmagic, 0);
  1434. switch(ipinprocpid = rfork(RFPROC|RFMEM|RFNOWAIT)){
  1435. case -1:
  1436. sysfatal("forking ipinproc");
  1437. case 0:
  1438. ipinproc(ppp);
  1439. terminate(ppp, 1);
  1440. _exits(0);
  1441. }
  1442. } else {
  1443. /* we may have changed addresses */
  1444. if(ipcmp(ppp->local, ppp->curlocal) != 0 ||
  1445. ipcmp(ppp->remote, ppp->curremote) != 0){
  1446. snprint(buf, sizeof buf, "remove %I 255.255.255.255 %I",
  1447. ppp->curlocal, ppp->curremote);
  1448. if(fprint(ppp->ipcfd, "%s", buf) < 0)
  1449. syslog(0, "ppp", "can't %s: %r", buf);
  1450. snprint(buf, sizeof buf, "add %I 255.255.255.255 %I %lud proxy",
  1451. ppp->local, ppp->remote, ppp->mtu-10);
  1452. if(fprint(ppp->ipcfd, "%s", buf) < 0)
  1453. syslog(0, "ppp", "can't %s: %r", buf);
  1454. }
  1455. syslog(0, "ppp", "%I/%I -> %I/%I", ppp->curlocal, ppp->curremote,
  1456. ppp->local, ppp->remote);
  1457. }
  1458. ipmove(ppp->curlocal, ppp->local);
  1459. ipmove(ppp->curremote, ppp->remote);
  1460. return nil;
  1461. }
  1462. /* return next input IP packet */
  1463. Block*
  1464. pppread(PPP *ppp)
  1465. {
  1466. Block *b, *reply;
  1467. int proto, len;
  1468. Lcpmsg *m;
  1469. while(!dying){
  1470. b = getframe(ppp, &proto);
  1471. if(b == nil)
  1472. return nil;
  1473. Again:
  1474. switch(proto){
  1475. case Plcp:
  1476. rcv(ppp, ppp->lcp, b);
  1477. break;
  1478. case Pccp:
  1479. rcv(ppp, ppp->ccp, b);
  1480. break;
  1481. case Pipcp:
  1482. rcv(ppp, ppp->ipcp, b);
  1483. break;
  1484. case Pip:
  1485. if(ppp->ipcp->state == Sopened)
  1486. return b;
  1487. netlog("ppp: IP recved: link not up\n");
  1488. freeb(b);
  1489. break;
  1490. case Plqm:
  1491. getlqm(ppp, b);
  1492. break;
  1493. case Pchap:
  1494. getchap(ppp, b);
  1495. break;
  1496. case Ppasswd:
  1497. getpap(ppp, b);
  1498. break;
  1499. case Pvjctcp:
  1500. case Pvjutcp:
  1501. if(ppp->ipcp->state != Sopened){
  1502. netlog("ppp: VJ tcp recved: link not up\n");
  1503. freeb(b);
  1504. break;
  1505. }
  1506. ppp->stat.vjin++;
  1507. b = tcpuncompress(ppp->ctcp, b, proto);
  1508. if(b != nil)
  1509. return b;
  1510. ppp->stat.vjfail++;
  1511. break;
  1512. case Pcdata:
  1513. ppp->stat.uncomp++;
  1514. if(ppp->ccp->state != Sopened){
  1515. netlog("ppp: compressed data recved: link not up\n");
  1516. freeb(b);
  1517. break;
  1518. }
  1519. if(ppp->unctype == nil) {
  1520. netlog("ppp: compressed data recved: no compression\n");
  1521. freeb(b);
  1522. break;
  1523. }
  1524. len = BLEN(b);
  1525. b = (*ppp->unctype->uncompress)(ppp, b, &proto, &reply);
  1526. if(reply != nil){
  1527. /* send resetreq */
  1528. ppp->stat.uncompreset++;
  1529. putframe(ppp, Pccp, reply);
  1530. freeb(reply);
  1531. }
  1532. if(b == nil)
  1533. break;
  1534. ppp->stat.uncompin += len;
  1535. ppp->stat.uncompout += BLEN(b);
  1536. /* netlog("ppp: uncompressed frame %ux %d %d (%d uint8_ts)\n", proto, b->rptr[0], b->rptr[1], BLEN(b)); */
  1537. goto Again;
  1538. default:
  1539. syslog(0, LOG, "unknown proto %ux", proto);
  1540. if(ppp->lcp->state == Sopened){
  1541. /* reject the protocol */
  1542. b->rptr -= 6;
  1543. m = (Lcpmsg*)b->rptr;
  1544. m->code = Lprotorej;
  1545. m->id = ++ppp->lcp->id;
  1546. hnputs(m->data, proto);
  1547. hnputs(m->len, BLEN(b));
  1548. putframe(ppp, Plcp, b);
  1549. }
  1550. freeb(b);
  1551. break;
  1552. }
  1553. }
  1554. return nil;
  1555. }
  1556. /* transmit an IP packet */
  1557. int
  1558. pppwrite(PPP *ppp, Block *b)
  1559. {
  1560. int proto;
  1561. int len;
  1562. qlock(ppp);
  1563. /* can't send ip packets till we're established */
  1564. if(ppp->ipcp->state != Sopened) {
  1565. qunlock(ppp);
  1566. syslog(0, LOG, "IP write: link not up");
  1567. len = blen(b);
  1568. freeb(b);
  1569. return len;
  1570. }
  1571. proto = Pip;
  1572. ppp->stat.ipsend++;
  1573. if(ppp->ipcp->flags & Fipcompress){
  1574. b = compress(ppp->ctcp, b, &proto);
  1575. if(b == nil){
  1576. qunlock(ppp);
  1577. return 0;
  1578. }
  1579. if(proto != Pip)
  1580. ppp->stat.vjout++;
  1581. }
  1582. if(ppp->ctype != nil) {
  1583. len = blen(b);
  1584. b = (*ppp->ctype->compress)(ppp, proto, b, &proto);
  1585. if(proto == Pcdata) {
  1586. ppp->stat.comp++;
  1587. ppp->stat.compin += len;
  1588. ppp->stat.compout += blen(b);
  1589. }
  1590. }
  1591. if(putframe(ppp, proto, b) < 0) {
  1592. qunlock(ppp);
  1593. freeb(b);
  1594. return -1;
  1595. }
  1596. qunlock(ppp);
  1597. len = blen(b);
  1598. freeb(b);
  1599. return len;
  1600. }
  1601. static void
  1602. terminate(PPP *ppp, int kill)
  1603. {
  1604. close(ppp->ipfd);
  1605. ppp->ipfd = -1;
  1606. close(ppp->ipcfd);
  1607. ppp->ipcfd = -1;
  1608. close(ppp->mediain);
  1609. close(ppp->mediaout);
  1610. ppp->mediain = -1;
  1611. ppp->mediaout = -1;
  1612. dying = 1;
  1613. if(kill)
  1614. postnote(PNGROUP, getpid(), "die");
  1615. }
  1616. typedef struct Iphdr Iphdr;
  1617. struct Iphdr
  1618. {
  1619. uint8_t vihl; /* Version and header length */
  1620. uint8_t tos; /* Type of service */
  1621. uint8_t length[2]; /* packet length */
  1622. uint8_t id[2]; /* Identification */
  1623. uint8_t frag[2]; /* Fragment information */
  1624. uint8_t ttl; /* Time to live */
  1625. uint8_t proto; /* Protocol */
  1626. uint8_t cksum[2]; /* Header checksum */
  1627. uint8_t src[4]; /* Ip source (uint8_t ordering unimportant) */
  1628. uint8_t dst[4]; /* Ip destination (uint8_t ordering unimportant) */
  1629. };
  1630. static void
  1631. ipinproc(PPP *ppp)
  1632. {
  1633. Block *b;
  1634. int m, n;
  1635. Iphdr *ip;
  1636. while(!dying){
  1637. b = allocb(Buflen);
  1638. n = read(ppp->ipfd, b->wptr, b->lim-b->wptr);
  1639. if(n < 0)
  1640. break;
  1641. /* trim packet if there's padding (e.g. from ether) */
  1642. ip = (Iphdr*)b->rptr;
  1643. m = nhgets(ip->length);
  1644. if(m < n && m > 0)
  1645. n = m;
  1646. b->wptr += n;
  1647. if(pppwrite(ppp, b) < 0)
  1648. break;
  1649. }
  1650. }
  1651. static void
  1652. catchdie(void *v, char *msg)
  1653. {
  1654. if(strstr(msg, "die") != nil)
  1655. noted(NCONT);
  1656. else
  1657. noted(NDFLT);
  1658. }
  1659. static void
  1660. hexdump(uint8_t *a, int na)
  1661. {
  1662. int i;
  1663. char buf[80];
  1664. fprint(2, "dump %p %d\n", a, na);
  1665. buf[0] = '\0';
  1666. for(i=0; i<na; i++){
  1667. sprint(buf+strlen(buf), " %.2ux", a[i]);
  1668. if(i%16 == 7)
  1669. sprint(buf+strlen(buf), " --");
  1670. if(i%16==15){
  1671. sprint(buf+strlen(buf), "\n");
  1672. write(2, buf, strlen(buf));
  1673. buf[0] = '\0';
  1674. }
  1675. }
  1676. if(i%16){
  1677. sprint(buf+strlen(buf), "\n");
  1678. write(2, buf, strlen(buf));
  1679. }
  1680. }
  1681. static void
  1682. mediainproc(PPP *ppp)
  1683. {
  1684. Block *b;
  1685. Ipaddr remote;
  1686. notify(catchdie);
  1687. while(!dying){
  1688. b = pppread(ppp);
  1689. if(b == nil){
  1690. syslog(0, LOG, "pppread return nil");
  1691. break;
  1692. }
  1693. ppp->stat.iprecv++;
  1694. if(ppp->ipcp->state != Sopened) {
  1695. ppp->stat.iprecvnotup++;
  1696. freeb(b);
  1697. continue;
  1698. }
  1699. if(server) {
  1700. v4tov6(remote, b->rptr+12);
  1701. if(ipcmp(remote, ppp->remote) != 0) {
  1702. ppp->stat.iprecvbadsrc++;
  1703. freeb(b);
  1704. continue;
  1705. }
  1706. }
  1707. if(debug > 1){
  1708. netlog("ip write pkt %p %d\n", b->rptr, blen(b));
  1709. hexdump(b->rptr, blen(b));
  1710. }
  1711. if(write(ppp->ipfd, b->rptr, blen(b)) < 0) {
  1712. syslog(0, LOG, "error writing to pktifc");
  1713. freeb(b);
  1714. break;
  1715. }
  1716. freeb(b);
  1717. }
  1718. netlog(": remote=%I: ppp shutting down\n", ppp->remote);
  1719. syslog(0, LOG, ": remote=%I: ppp shutting down", ppp->remote);
  1720. syslog(0, LOG, "\t\tppp send = %lud/%lud recv= %lud/%lud",
  1721. ppp->out.packets, ppp->out.uint8_ts,
  1722. ppp->in.packets, ppp->in.uint8_ts);
  1723. syslog(0, LOG, "\t\tip send=%lud", ppp->stat.ipsend);
  1724. syslog(0, LOG, "\t\tip recv=%lud notup=%lud badsrc=%lud",
  1725. ppp->stat.iprecv, ppp->stat.iprecvnotup, ppp->stat.iprecvbadsrc);
  1726. syslog(0, LOG, "\t\tcompress=%lud in=%lud out=%lud reset=%lud",
  1727. ppp->stat.comp, ppp->stat.compin, ppp->stat.compout, ppp->stat.compreset);
  1728. syslog(0, LOG, "\t\tuncompress=%lud in=%lud out=%lud reset=%lud",
  1729. ppp->stat.uncomp, ppp->stat.uncompin, ppp->stat.uncompout,
  1730. ppp->stat.uncompreset);
  1731. syslog(0, LOG, "\t\tvjin=%lud vjout=%lud vjfail=%lud",
  1732. ppp->stat.vjin, ppp->stat.vjout, ppp->stat.vjfail);
  1733. }
  1734. /*
  1735. * link quality management
  1736. */
  1737. static void
  1738. getlqm(PPP *ppp, Block *b)
  1739. {
  1740. Qualpkt *p;
  1741. p = (Qualpkt*)b->rptr;
  1742. if(BLEN(b) == sizeof(Qualpkt)){
  1743. ppp->in.reports++;
  1744. ppp->pout.reports = nhgetl(p->peeroutreports);
  1745. ppp->pout.packets = nhgetl(p->peeroutpackets);
  1746. ppp->pout.uint8_ts = nhgetl(p->peeroutuint8_ts);
  1747. ppp->pin.reports = nhgetl(p->peerinreports);
  1748. ppp->pin.packets = nhgetl(p->peerinpackets);
  1749. ppp->pin.discards = nhgetl(p->peerindiscards);
  1750. ppp->pin.errors = nhgetl(p->peerinerrors);
  1751. ppp->pin.uint8_ts = nhgetl(p->peerinuint8_ts);
  1752. /* save our numbers at time of reception */
  1753. memmove(&ppp->sin, &ppp->in, sizeof(Qualstats));
  1754. }
  1755. freeb(b);
  1756. if(ppp->period == 0)
  1757. putlqm(ppp);
  1758. }
  1759. static void
  1760. putlqm(PPP *ppp)
  1761. {
  1762. Qualpkt *p;
  1763. Block *b;
  1764. b = allocb(sizeof(Qualpkt));
  1765. b->wptr += sizeof(Qualpkt);
  1766. p = (Qualpkt*)b->rptr;
  1767. hnputl(p->magic, 0);
  1768. /* heresay (what he last told us) */
  1769. hnputl(p->lastoutreports, ppp->pout.reports);
  1770. hnputl(p->lastoutpackets, ppp->pout.packets);
  1771. hnputl(p->lastoutuint8_ts, ppp->pout.uint8_ts);
  1772. /* our numbers at time of last reception */
  1773. hnputl(p->peerinreports, ppp->sin.reports);
  1774. hnputl(p->peerinpackets, ppp->sin.packets);
  1775. hnputl(p->peerindiscards, ppp->sin.discards);
  1776. hnputl(p->peerinerrors, ppp->sin.errors);
  1777. hnputl(p->peerinuint8_ts, ppp->sin.uint8_ts);
  1778. /* our numbers now */
  1779. hnputl(p->peeroutreports, ppp->out.reports+1);
  1780. hnputl(p->peeroutpackets, ppp->out.packets+1);
  1781. hnputl(p->peeroutuint8_ts, ppp->out.uint8_ts+53/*hack*/);
  1782. putframe(ppp, Plqm, b);
  1783. freeb(b);
  1784. ppp->out.reports++;
  1785. }
  1786. /*
  1787. * init challenge response dialog
  1788. */
  1789. static void
  1790. chapinit(PPP *ppp)
  1791. {
  1792. Block *b;
  1793. Lcpmsg *m;
  1794. Chap *c;
  1795. int len;
  1796. char *aproto;
  1797. getauth(ppp);
  1798. c = ppp->chap;
  1799. c->id++;
  1800. switch(c->proto){
  1801. default:
  1802. abort();
  1803. case APmd5:
  1804. aproto = "chap";
  1805. break;
  1806. case APmschap:
  1807. aproto = "mschap";
  1808. break;
  1809. }
  1810. if((c->cs = auth_challenge("proto=%q role=server", aproto)) == nil)
  1811. sysfatal("auth_challenge: %r");
  1812. syslog(0, LOG, ": remote=%I: sending %d byte challenge", ppp->remote, c->cs->nchal);
  1813. len = 4 + 1 + c->cs->nchal + strlen(ppp->chapname);
  1814. b = alloclcp(Cchallenge, c->id, len, &m);
  1815. *b->wptr++ = c->cs->nchal;
  1816. memmove(b->wptr, c->cs->chal, c->cs->nchal);
  1817. b->wptr += c->cs->nchal;
  1818. memmove(b->wptr, ppp->chapname, strlen(ppp->chapname));
  1819. b->wptr += strlen(ppp->chapname);
  1820. hnputs(m->len, len);
  1821. putframe(ppp, Pchap, b);
  1822. freeb(b);
  1823. c->state = Cchalsent;
  1824. }
  1825. /*
  1826. * BUG factotum should do this
  1827. */
  1828. enum {
  1829. MShashlen = 16,
  1830. MSresplen = 24,
  1831. MSchallen = 8,
  1832. };
  1833. void
  1834. desencrypt(uint8_t data[8], uint8_t key[7])
  1835. {
  1836. uint32_t ekey[32];
  1837. key_setup(key, ekey);
  1838. block_cipher(ekey, data, 0);
  1839. }
  1840. void
  1841. nthash(uint8_t hash[MShashlen], char *passwd)
  1842. {
  1843. uint8_t buf[512];
  1844. int i;
  1845. for(i=0; *passwd && i<sizeof(buf); passwd++) {
  1846. buf[i++] = *passwd;
  1847. buf[i++] = 0;
  1848. }
  1849. memset(hash, 0, 16);
  1850. md4(buf, i, hash, 0);
  1851. }
  1852. void
  1853. mschalresp(uint8_t resp[MSresplen], uint8_t hash[MShashlen],
  1854. uint8_t chal[MSchallen])
  1855. {
  1856. int i;
  1857. uint8_t buf[21];
  1858. memset(buf, 0, sizeof(buf));
  1859. memcpy(buf, hash, MShashlen);
  1860. for(i=0; i<3; i++) {
  1861. memmove(resp+i*MSchallen, chal, MSchallen);
  1862. desencrypt(resp+i*MSchallen, buf+i*7);
  1863. }
  1864. }
  1865. /*
  1866. * challenge response dialog
  1867. */
  1868. extern int _asrdresp(int, uint8_t*, int);
  1869. static void
  1870. getchap(PPP *ppp, Block *b)
  1871. {
  1872. AuthInfo *ai;
  1873. Lcpmsg *m;
  1874. int len, vlen, i, id, n, nresp;
  1875. char md5buf[512], code;
  1876. Chap *c;
  1877. Chapreply cr;
  1878. MSchapreply mscr;
  1879. char uid[PATH];
  1880. uint8_t digest[16], *p, *resp, sdigest[SHA1dlen];
  1881. uint8_t mshash[MShashlen], mshash2[MShashlen];
  1882. DigestState *s;
  1883. uint8_t msresp[2*MSresplen+1];
  1884. m = (Lcpmsg*)b->rptr;
  1885. len = nhgets(m->len);
  1886. if(BLEN(b) < len){
  1887. syslog(0, LOG, "short chap message");
  1888. freeb(b);
  1889. return;
  1890. }
  1891. qlock(ppp);
  1892. switch(m->code){
  1893. case Cchallenge:
  1894. getauth(ppp);
  1895. vlen = m->data[0];
  1896. if(vlen > len - 5) {
  1897. netlog("PPP: chap: bad challenge len\n");
  1898. break;
  1899. }
  1900. id = m->id;
  1901. switch(ppp->chap->proto){
  1902. default:
  1903. abort();
  1904. case APmd5:
  1905. md5buf[0] = m->id;
  1906. strcpy(md5buf+1, ppp->secret);
  1907. n = strlen(ppp->secret) + 1;
  1908. memmove(md5buf+n, m->data+1, vlen);
  1909. n += vlen;
  1910. md5((uint8_t*)md5buf, n, digest, nil);
  1911. resp = digest;
  1912. nresp = 16;
  1913. break;
  1914. case APmschap:
  1915. nthash(mshash, ppp->secret);
  1916. memset(msresp, 0, sizeof msresp);
  1917. mschalresp(msresp+MSresplen, mshash, m->data+1);
  1918. resp = msresp;
  1919. nresp = sizeof msresp;
  1920. nthash(mshash, ppp->secret);
  1921. md4(mshash, 16, mshash2, 0);
  1922. s = sha1(mshash2, 16, 0, 0);
  1923. sha1(mshash2, 16, 0, s);
  1924. sha1(m->data+1, 8, sdigest, s);
  1925. memmove(ppp->key, sdigest, 16);
  1926. break;
  1927. }
  1928. len = 4 + 1 + nresp + strlen(ppp->chapname);
  1929. freeb(b);
  1930. b = alloclcp(Cresponse, id, len, &m);
  1931. *b->wptr++ = nresp;
  1932. memmove(b->wptr, resp, nresp);
  1933. b->wptr += nresp;
  1934. memmove(b->wptr, ppp->chapname, strlen(ppp->chapname));
  1935. b->wptr += strlen(ppp->chapname);
  1936. hnputs(m->len, len);
  1937. netlog("PPP: sending response len %d\n", len);
  1938. putframe(ppp, Pchap, b);
  1939. break;
  1940. case Cresponse:
  1941. c = ppp->chap;
  1942. vlen = m->data[0];
  1943. if(m->id != c->id) {
  1944. netlog("PPP: chap: bad response id\n");
  1945. break;
  1946. }
  1947. switch(c->proto) {
  1948. default:
  1949. sysfatal("unknown chap protocol: %d", c->proto);
  1950. case APmd5:
  1951. if(vlen > len - 5 || vlen != 16) {
  1952. netlog("PPP: chap: bad response len\n");
  1953. break;
  1954. }
  1955. cr.id = m->id;
  1956. memmove(cr.resp, m->data+1, 16);
  1957. memset(uid, 0, sizeof(uid));
  1958. n = len-5-vlen;
  1959. if(n >= PATH)
  1960. n = PATH-1;
  1961. memmove(uid, m->data+1+vlen, n);
  1962. c->cs->user = uid;
  1963. c->cs->resp = &cr;
  1964. c->cs->nresp = sizeof cr;
  1965. break;
  1966. case APmschap:
  1967. if(vlen > len - 5 || vlen != 49) {
  1968. netlog("PPP: chap: bad response len\n");
  1969. break;
  1970. }
  1971. memset(&mscr, 0, sizeof(mscr));
  1972. memmove(mscr.LMresp, m->data+1, 24);
  1973. memmove(mscr.NTresp, m->data+24+1, 24);
  1974. n = len-5-vlen;
  1975. p = m->data+1+vlen;
  1976. /* remove domain name */
  1977. for(i=0; i<n; i++) {
  1978. if(p[i] == '\\') {
  1979. p += i+1;
  1980. n -= i+1;
  1981. break;
  1982. }
  1983. }
  1984. if(n >= PATH)
  1985. n = PATH-1;
  1986. memset(uid, 0, sizeof(uid));
  1987. memmove(uid, p, n);
  1988. c->cs->user = uid;
  1989. c->cs->resp = &mscr;
  1990. c->cs->nresp = sizeof mscr;
  1991. break;
  1992. }
  1993. syslog(0, LOG, ": remote=%I vlen %d proto %d response user %s nresp %d", ppp->remote, vlen, c->proto, c->cs->user, c->cs->nresp);
  1994. if((ai = auth_response(c->cs)) == nil || auth_chuid(ai, nil) < 0){
  1995. c->state = Cunauth;
  1996. code = Cfailure;
  1997. syslog(0, LOG, ": remote=%I: auth failed: %r, uid=%s", ppp->remote, uid);
  1998. }else{
  1999. c->state = Cauthok;
  2000. code = Csuccess;
  2001. syslog(0, LOG, ": remote=%I: auth ok: uid=%s nsecret=%d", ppp->remote, uid, ai->nsecret);
  2002. if(c->proto == APmschap){
  2003. if(ai->nsecret != sizeof(ppp->key))
  2004. sysfatal("could not get the encryption key");
  2005. memmove(ppp->key, ai->secret, sizeof(ppp->key));
  2006. }
  2007. }
  2008. auth_freeAI(ai);
  2009. auth_freechal(c->cs);
  2010. c->cs = nil;
  2011. freeb(b);
  2012. /* send reply */
  2013. len = 4;
  2014. b = alloclcp(code, c->id, len, &m);
  2015. hnputs(m->len, len);
  2016. putframe(ppp, Pchap, b);
  2017. if(c->state == Cauthok) {
  2018. setphase(ppp, Pnet);
  2019. } else {
  2020. /* restart chapp negotiation */
  2021. chapinit(ppp);
  2022. }
  2023. break;
  2024. case Csuccess:
  2025. netlog("ppp: chap succeeded\n");
  2026. break;
  2027. case Cfailure:
  2028. netlog("ppp: chap failed\n");
  2029. break;
  2030. default:
  2031. syslog(0, LOG, "chap code %d?\n", m->code);
  2032. break;
  2033. }
  2034. qunlock(ppp);
  2035. freeb(b);
  2036. }
  2037. static void
  2038. putpaprequest(PPP *ppp)
  2039. {
  2040. Block *b;
  2041. Lcpmsg *m;
  2042. Chap *c;
  2043. int len, nlen, slen;
  2044. getauth(ppp);
  2045. c = ppp->chap;
  2046. c->id++;
  2047. netlog("PPP: pap: send authreq %d %s %s\n", c->id, ppp->chapname, "****");
  2048. nlen = strlen(ppp->chapname);
  2049. slen = strlen(ppp->secret);
  2050. len = 4 + 1 + nlen + 1 + slen;
  2051. b = alloclcp(Pauthreq, c->id, len, &m);
  2052. *b->wptr++ = nlen;
  2053. memmove(b->wptr, ppp->chapname, nlen);
  2054. b->wptr += nlen;
  2055. *b->wptr++ = slen;
  2056. memmove(b->wptr, ppp->secret, slen);
  2057. b->wptr += slen;
  2058. hnputs(m->len, len);
  2059. putframe(ppp, Ppasswd, b);
  2060. freeb(b);
  2061. }
  2062. static void
  2063. papinit(PPP *ppp)
  2064. {
  2065. ppp->chap->id = 0;
  2066. putpaprequest(ppp);
  2067. }
  2068. static void
  2069. getpap(PPP *ppp, Block *b)
  2070. {
  2071. Lcpmsg *m;
  2072. int len;
  2073. m = (Lcpmsg*)b->rptr;
  2074. len = 4;
  2075. if(BLEN(b) < 4 || BLEN(b) < (len = nhgets(m->len))){
  2076. syslog(0, LOG, "short pap message (%ld < %d)", BLEN(b), len);
  2077. freeb(b);
  2078. return;
  2079. }
  2080. if(len < sizeof(Lcpmsg))
  2081. m->data[0] = 0;
  2082. qlock(ppp);
  2083. switch(m->code){
  2084. case Pauthreq:
  2085. netlog("PPP: pap auth request, not supported\n");
  2086. break;
  2087. case Pauthack:
  2088. if(ppp->phase == Pauth
  2089. && ppp->chap->proto == APpasswd
  2090. && m->id <= ppp-> chap->id){
  2091. netlog("PPP: pap succeeded\n");
  2092. setphase(ppp, Pnet);
  2093. }
  2094. break;
  2095. case Pauthnak:
  2096. if(ppp->phase == Pauth
  2097. && ppp->chap->proto == APpasswd
  2098. && m->id <= ppp-> chap->id){
  2099. netlog("PPP: pap failed (%d:%.*s)\n",
  2100. m->data[0], m->data[0], (char*)m->data+1);
  2101. terminate(ppp, 0);
  2102. }
  2103. break;
  2104. default:
  2105. netlog("PPP: unknown pap messsage %d\n", m->code);
  2106. }
  2107. qunlock(ppp);
  2108. freeb(b);
  2109. }
  2110. static void
  2111. printopts(Pstate *p, Block *b, int send)
  2112. {
  2113. Lcpmsg *m;
  2114. Lcpopt *o;
  2115. int proto, x, period;
  2116. uint8_t *cp;
  2117. char *code, *dir;
  2118. m = (Lcpmsg*)b->rptr;
  2119. switch(m->code) {
  2120. default: code = "<unknown>"; break;
  2121. case Lconfreq: code = "confrequest"; break;
  2122. case Lconfack: code = "confack"; break;
  2123. case Lconfnak: code = "confnak"; break;
  2124. case Lconfrej: code = "confreject"; break;
  2125. }
  2126. if(send)
  2127. dir = "send";
  2128. else
  2129. dir = "recv";
  2130. netlog("ppp: %s %s: id=%d\n", dir, code, m->id);
  2131. for(cp = m->data; cp < b->wptr; cp += o->len){
  2132. o = (Lcpopt*)cp;
  2133. if(cp + o->len > b->wptr){
  2134. netlog("\tbad option length %ux\n", o->type);
  2135. return;
  2136. }
  2137. switch(p->proto){
  2138. case Plcp:
  2139. switch(o->type){
  2140. default:
  2141. netlog("\tunknown %d len=%d\n", o->type, o->len);
  2142. break;
  2143. case Omtu:
  2144. netlog("\tmtu = %d\n", nhgets(o->data));
  2145. break;
  2146. case Octlmap:
  2147. netlog("\tctlmap = %ux\n", nhgetl(o->data));
  2148. break;
  2149. case Oauth:
  2150. netlog("\tauth = %ux", nhgetl(o->data));
  2151. proto = nhgets(o->data);
  2152. switch(proto) {
  2153. default:
  2154. netlog("unknown auth proto %d\n", proto);
  2155. break;
  2156. case Ppasswd:
  2157. netlog("password\n");
  2158. break;
  2159. case Pchap:
  2160. netlog("chap %ux\n", o->data[2]);
  2161. break;
  2162. }
  2163. break;
  2164. case Oquality:
  2165. proto = nhgets(o->data);
  2166. switch(proto) {
  2167. default:
  2168. netlog("\tunknown quality proto %d\n", proto);
  2169. break;
  2170. case Plqm:
  2171. x = nhgetl(o->data+2)*10;
  2172. period = (x+Period-1)/Period;
  2173. netlog("\tlqm period = %d\n", period);
  2174. break;
  2175. }
  2176. case Omagic:
  2177. netlog("\tmagic = %ux\n", nhgetl(o->data));
  2178. break;
  2179. case Opc:
  2180. netlog("\tprotocol compress\n");
  2181. break;
  2182. case Oac:
  2183. netlog("\taddr compress\n");
  2184. break;
  2185. }
  2186. break;
  2187. case Pccp:
  2188. switch(o->type){
  2189. default:
  2190. netlog("\tunknown %d len=%d\n", o->type, o->len);
  2191. break;
  2192. case Ocoui:
  2193. netlog("\tOUI\n");
  2194. break;
  2195. case Ocstac:
  2196. netlog("\tstac LZS\n");
  2197. break;
  2198. case Ocmppc:
  2199. netlog("\tMicrosoft PPC len=%d %ux\n", o->len, nhgetl(o->data));
  2200. break;
  2201. case Octhwack:
  2202. netlog("\tThwack\n");
  2203. break;
  2204. }
  2205. break;
  2206. case Pecp:
  2207. switch(o->type){
  2208. default:
  2209. netlog("\tunknown %d len=%d\n", o->type, o->len);
  2210. break;
  2211. case Oeoui:
  2212. netlog("\tOUI\n");
  2213. break;
  2214. case Oedese:
  2215. netlog("\tDES\n");
  2216. break;
  2217. }
  2218. break;
  2219. case Pipcp:
  2220. switch(o->type){
  2221. default:
  2222. netlog("\tunknown %d len=%d\n", o->type, o->len);
  2223. break;
  2224. case Oipaddrs:
  2225. netlog("\tip addrs - deprecated\n");
  2226. break;
  2227. case Oipcompress:
  2228. netlog("\tip compress\n");
  2229. break;
  2230. case Oipaddr:
  2231. netlog("\tip addr %V\n", o->data);
  2232. break;
  2233. case Oipdns:
  2234. netlog("\tdns addr %V\n", o->data);
  2235. break;
  2236. case Oipwins:
  2237. netlog("\twins addr %V\n", o->data);
  2238. break;
  2239. case Oipdns2:
  2240. netlog("\tdns2 addr %V\n", o->data);
  2241. break;
  2242. case Oipwins2:
  2243. netlog("\twins2 addr %V\n", o->data);
  2244. break;
  2245. }
  2246. break;
  2247. }
  2248. }
  2249. }
  2250. static void
  2251. sendtermreq(PPP *ppp, Pstate *p)
  2252. {
  2253. Block *b;
  2254. Lcpmsg *m;
  2255. p->termid = ++(p->id);
  2256. b = alloclcp(Ltermreq, p->termid, 4, &m);
  2257. hnputs(m->len, 4);
  2258. putframe(ppp, p->proto, b);
  2259. freeb(b);
  2260. newstate(ppp, p, Sclosing);
  2261. }
  2262. static void
  2263. sendechoreq(PPP *ppp, Pstate *p)
  2264. {
  2265. Block *b;
  2266. Lcpmsg *m;
  2267. p->termid = ++(p->id);
  2268. b = alloclcp(Lechoreq, p->id, 4, &m);
  2269. hnputs(m->len, 4);
  2270. putframe(ppp, p->proto, b);
  2271. freeb(b);
  2272. }
  2273. enum
  2274. {
  2275. CtrlD = 0x4,
  2276. CtrlE = 0x5,
  2277. CtrlO = 0xf,
  2278. Cr = 13,
  2279. View = 0x80,
  2280. };
  2281. int conndone;
  2282. static void
  2283. xfer(int fd)
  2284. {
  2285. int i, n;
  2286. uint8_t xbuf[128];
  2287. for(;;) {
  2288. n = read(fd, xbuf, sizeof(xbuf));
  2289. if(n < 0)
  2290. break;
  2291. if(conndone)
  2292. break;
  2293. for(i = 0; i < n; i++)
  2294. if(xbuf[i] == Cr)
  2295. xbuf[i] = ' ';
  2296. write(1, xbuf, n);
  2297. }
  2298. close(fd);
  2299. }
  2300. static int
  2301. readcr(int fd, char *buf, int nbuf)
  2302. {
  2303. char c;
  2304. int n, tot;
  2305. tot = 0;
  2306. while((n=read(fd, &c, 1)) == 1){
  2307. if(c == '\n'){
  2308. buf[tot] = 0;
  2309. return tot;
  2310. }
  2311. buf[tot++] = c;
  2312. if(tot == nbuf)
  2313. sysfatal("line too long in readcr");
  2314. }
  2315. return n;
  2316. }
  2317. static void
  2318. connect(int fd, int cfd)
  2319. {
  2320. int n, ctl;
  2321. char xbuf[128];
  2322. if (chatfile) {
  2323. int chatfd, lineno, nb;
  2324. char *buf, *p, *s, response[128];
  2325. Dir *dir;
  2326. if ((chatfd = open(chatfile, OREAD)) < 0)
  2327. sysfatal("cannot open %s: %r", chatfile);
  2328. if ((dir = dirfstat(chatfd)) == nil)
  2329. sysfatal("cannot fstat %s: %r",chatfile);
  2330. buf = (char *)malloc(dir->length + 1);
  2331. assert(buf);
  2332. if ((nb = read(chatfd, buf, dir->length)) < 0)
  2333. sysfatal("cannot read chatfile %s: %r", chatfile);
  2334. assert(nb == dir->length);
  2335. buf[dir->length] = '\0';
  2336. free(dir);
  2337. close(chatfd);
  2338. p = buf;
  2339. lineno = 0;
  2340. for(;;) {
  2341. char *_args[3];
  2342. if ((s = strchr(p, '\n')) == nil)
  2343. break;
  2344. *s++ = '\0';
  2345. lineno++;
  2346. if (*p == '#') {
  2347. p = s;
  2348. continue;
  2349. }
  2350. if (tokenize(p, _args, 3) != 2)
  2351. sysfatal("invalid line %d (line expected: 'send' 'expect')",
  2352. lineno);
  2353. if (debug)
  2354. print("sending %s, expecting %s\n", _args[0], _args[1]);
  2355. if(strlen(_args[0])){
  2356. nb = fprint(fd, "%s\r", _args[0]);
  2357. assert(nb > 0);
  2358. }
  2359. if (strlen(_args[1]) > 0) {
  2360. if ((nb = readcr(fd, response, sizeof response-1)) < 0)
  2361. sysfatal("cannot read response from: %r");
  2362. if (debug)
  2363. print("response %s\n", response);
  2364. if (nb == 0)
  2365. sysfatal("eof on input?");
  2366. if (cistrstr(response, _args[1]) == nil)
  2367. sysfatal("expected %s, got %s", _args[1], response);
  2368. }
  2369. p = s;
  2370. }
  2371. free(buf);
  2372. return;
  2373. }
  2374. print("Connect to file system now, type ctrl-d when done.\n");
  2375. print("...(Use the view or down arrow key to send a break)\n");
  2376. print("...(Use ctrl-e to set even parity or ctrl-o for odd)\n");
  2377. ctl = open("/dev/consctl", OWRITE);
  2378. if(ctl < 0)
  2379. sysfatal("opening consctl");
  2380. fprint(ctl, "rawon");
  2381. fd = dup(fd, -1);
  2382. conndone = 0;
  2383. switch(rfork(RFPROC|RFMEM|RFNOWAIT)){
  2384. case -1:
  2385. sysfatal("forking xfer");
  2386. case 0:
  2387. xfer(fd);
  2388. _exits(nil);
  2389. }
  2390. for(;;){
  2391. read(0, xbuf, 1);
  2392. switch(xbuf[0]&0xff) {
  2393. case CtrlD: /* done */
  2394. conndone = 1;
  2395. close(ctl);
  2396. print("\n");
  2397. return;
  2398. case CtrlE: /* set even parity */
  2399. fprint(cfd, "pe");
  2400. break;
  2401. case CtrlO: /* set odd parity */
  2402. fprint(cfd, "po");
  2403. break;
  2404. case View: /* send a break */
  2405. fprint(cfd, "k500");
  2406. break;
  2407. default:
  2408. n = write(fd, xbuf, 1);
  2409. if(n < 0) {
  2410. errstr(xbuf, sizeof(xbuf));
  2411. conndone = 1;
  2412. close(ctl);
  2413. print("[remote write error (%s)]\n", xbuf);
  2414. return;
  2415. }
  2416. }
  2417. }
  2418. }
  2419. int interactive;
  2420. void
  2421. usage(void)
  2422. {
  2423. fprint(2, "usage: ppp [-CPSacdfu] [-b baud] [-k keyspec] [-m mtu] "
  2424. "[-M chatfile] [-p dev] [-x netmntpt] [-t modemcmd] "
  2425. "[local-addr [remote-addr]]\n");
  2426. exits("usage");
  2427. }
  2428. void
  2429. main(int argc, char **argv)
  2430. {
  2431. int mtu, baud, framing, user, mediain, mediaout, cfd;
  2432. Ipaddr ipaddr, remip;
  2433. char *dev, *modemcmd;
  2434. char net[128];
  2435. PPP *ppp;
  2436. char buf[128];
  2437. rfork(RFREND|RFNOTEG|RFNAMEG);
  2438. fmtinstall('I', eipfmt);
  2439. fmtinstall('V', eipfmt);
  2440. fmtinstall('E', eipfmt);
  2441. dev = nil;
  2442. invalidate(ipaddr);
  2443. invalidate(remip);
  2444. mtu = Defmtu;
  2445. baud = 0;
  2446. framing = 0;
  2447. setnetmtpt(net, sizeof(net), nil);
  2448. user = 0;
  2449. modemcmd = nil;
  2450. ARGBEGIN{
  2451. case 'a':
  2452. noauth = 1;
  2453. break;
  2454. case 'b':
  2455. baud = atoi(EARGF(usage()));
  2456. if(baud < 0)
  2457. baud = 0;
  2458. break;
  2459. case 'c':
  2460. nocompress = 1;
  2461. break;
  2462. case 'C':
  2463. noipcompress = 1;
  2464. break;
  2465. case 'd':
  2466. debug++;
  2467. break;
  2468. case 'f':
  2469. framing = 1;
  2470. break;
  2471. case 'F':
  2472. pppframing = 0;
  2473. break;
  2474. case 'k':
  2475. keyspec = EARGF(usage());
  2476. break;
  2477. case 'm':
  2478. mtu = atoi(EARGF(usage()));
  2479. if(mtu < Minmtu)
  2480. mtu = Minmtu;
  2481. if(mtu > Maxmtu)
  2482. mtu = Maxmtu;
  2483. break;
  2484. case 'M':
  2485. chatfile = EARGF(usage());
  2486. break;
  2487. case 'p':
  2488. dev = EARGF(usage());
  2489. break;
  2490. case 'P':
  2491. primary = 1;
  2492. break;
  2493. case 'S':
  2494. server = 1;
  2495. break;
  2496. case 't':
  2497. modemcmd = EARGF(usage());
  2498. break;
  2499. case 'u':
  2500. user = 1;
  2501. break;
  2502. case 'x':
  2503. setnetmtpt(net, sizeof net, EARGF(usage()));
  2504. break;
  2505. default:
  2506. fprint(2, "unknown option %c\n", ARGC());
  2507. usage();
  2508. }ARGEND;
  2509. switch(argc){
  2510. case 2:
  2511. if (parseip(remip, argv[1]) == -1)
  2512. sysfatal("bad remote ip %s", argv[1]);
  2513. case 1:
  2514. if (parseip(ipaddr, argv[0]) == -1)
  2515. sysfatal("bad ip %s", argv[0]);
  2516. case 0:
  2517. break;
  2518. default:
  2519. usage();
  2520. }
  2521. nip = nipifcs(net);
  2522. if(nip == 0 && !server)
  2523. primary = 1;
  2524. if(dev != nil){
  2525. mediain = open(dev, ORDWR);
  2526. if(mediain < 0){
  2527. if(strchr(dev, '!')){
  2528. if((mediain = dial(dev, 0, 0, &cfd)) == -1){
  2529. fprint(2, "ppp: couldn't dial %s: %r\n", dev);
  2530. exits(dev);
  2531. }
  2532. } else {
  2533. fprint(2, "ppp: couldn't open %s\n", dev);
  2534. exits(dev);
  2535. }
  2536. } else {
  2537. snprint(buf, sizeof buf, "%sctl", dev);
  2538. cfd = open(buf, ORDWR);
  2539. }
  2540. if(cfd > 0){
  2541. if(baud)
  2542. fprint(cfd, "b%d", baud);
  2543. fprint(cfd, "m1"); /* cts/rts flow control (and fifo's) on */
  2544. fprint(cfd, "q64000"); /* increase q size to 64k */
  2545. fprint(cfd, "n1"); /* nonblocking writes on */
  2546. fprint(cfd, "r1"); /* rts on */
  2547. fprint(cfd, "d1"); /* dtr on */
  2548. fprint(cfd, "c1"); /* dcdhup on */
  2549. if(user || chatfile)
  2550. connect(mediain, cfd);
  2551. close(cfd);
  2552. } else {
  2553. if(user || chatfile)
  2554. connect(mediain, -1);
  2555. }
  2556. mediaout = mediain;
  2557. } else {
  2558. mediain = open("/fd/0", OREAD);
  2559. if(mediain < 0){
  2560. fprint(2, "ppp: couldn't open /fd/0\n");
  2561. exits("/fd/0");
  2562. }
  2563. mediaout = open("/fd/1", OWRITE);
  2564. if(mediaout < 0){
  2565. fprint(2, "ppp: couldn't open /fd/0\n");
  2566. exits("/fd/1");
  2567. }
  2568. }
  2569. if(modemcmd != nil && mediaout >= 0)
  2570. fprint(mediaout, "%s\r", modemcmd);
  2571. ppp = mallocz(sizeof(*ppp), 1);
  2572. pppopen(ppp, mediain, mediaout, net, ipaddr, remip, mtu, framing);
  2573. /* wait until ip is configured */
  2574. rendezvous((void*)Rmagic, 0);
  2575. if(primary){
  2576. /* create a /net/ndb entry */
  2577. putndb(ppp, net);
  2578. }
  2579. exits(0);
  2580. }
  2581. void
  2582. netlog(char *fmt, ...)
  2583. {
  2584. va_list arg;
  2585. char *m;
  2586. static int32_t start;
  2587. int32_t now;
  2588. if(debug == 0)
  2589. return;
  2590. now = time(0);
  2591. if(start == 0)
  2592. start = now;
  2593. va_start(arg, fmt);
  2594. m = vsmprint(fmt, arg);
  2595. fprint(2, "%ld %s", now-start, m);
  2596. free(m);
  2597. va_end(arg);
  2598. }
  2599. /*
  2600. * return non-zero if this is a valid v4 address
  2601. */
  2602. static int
  2603. validv4(Ipaddr addr)
  2604. {
  2605. return memcmp(addr, v4prefix, IPv4off) == 0 && memcmp(addr, v4prefix, IPaddrlen) != 0;
  2606. }
  2607. static void
  2608. invalidate(Ipaddr addr)
  2609. {
  2610. ipmove(addr, IPnoaddr);
  2611. }
  2612. /*
  2613. * return number of networks
  2614. */
  2615. static int
  2616. nipifcs(char *net)
  2617. {
  2618. static Ipifc *ifc;
  2619. Ipifc *nifc;
  2620. Iplifc *lifc;
  2621. int n;
  2622. n = 0;
  2623. ifc = readipifc(net, ifc, -1);
  2624. for(nifc = ifc; nifc != nil; nifc = nifc->next)
  2625. for(lifc = ifc->lifc; lifc != nil; lifc = lifc->next)
  2626. n++;
  2627. return n;
  2628. }
  2629. /*
  2630. * make an ndb entry and put it into /net/ndb for the servers to see
  2631. */
  2632. static void
  2633. putndb(PPP *ppp, char *net)
  2634. {
  2635. char buf[1024];
  2636. char file[64];
  2637. char *p, *e;
  2638. int fd;
  2639. e = buf + sizeof(buf);
  2640. p = buf;
  2641. p = seprint(p, e, "ip=%I ipmask=255.255.255.255 ipgw=%I\n", ppp->local,
  2642. ppp->remote);
  2643. if(validv4(ppp->dns[0]))
  2644. p = seprint(p, e, "\tdns=%I\n", ppp->dns[0]);
  2645. if(validv4(ppp->dns[1]))
  2646. p = seprint(p, e, "\tdns=%I\n", ppp->dns[1]);
  2647. if(validv4(ppp->wins[0]))
  2648. p = seprint(p, e, "\twins=%I\n", ppp->wins[0]);
  2649. if(validv4(ppp->wins[1]))
  2650. p = seprint(p, e, "\twins=%I\n", ppp->wins[1]);
  2651. seprint(file, file+sizeof file, "%s/ndb", net);
  2652. fd = open(file, OWRITE);
  2653. if(fd < 0)
  2654. return;
  2655. write(fd, buf, p-buf);
  2656. close(fd);
  2657. seprint(file, file+sizeof file, "%s/cs", net);
  2658. fd = open(file, OWRITE);
  2659. write(fd, "refresh", 7);
  2660. close(fd);
  2661. seprint(file, file+sizeof file, "%s/dns", net);
  2662. fd = open(file, OWRITE);
  2663. write(fd, "refresh", 7);
  2664. close(fd);
  2665. }
  2666. static void
  2667. getauth(PPP *ppp)
  2668. {
  2669. UserPasswd *up;
  2670. if(*ppp->chapname)
  2671. return;
  2672. up = auth_getuserpasswd(auth_getkey,"proto=pass service=ppp %s", keyspec);
  2673. if(up != nil){
  2674. strcpy(ppp->chapname, up->user);
  2675. strcpy(ppp->secret, up->passwd);
  2676. }
  2677. }