ppp.c 59 KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586878889909192939495969798991001011021031041051061071081091101111121131141151161171181191201211221231241251261271281291301311321331341351361371381391401411421431441451461471481491501511521531541551561571581591601611621631641651661671681691701711721731741751761771781791801811821831841851861871881891901911921931941951961971981992002012022032042052062072082092102112122132142152162172182192202212222232242252262272282292302312322332342352362372382392402412422432442452462472482492502512522532542552562572582592602612622632642652662672682692702712722732742752762772782792802812822832842852862872882892902912922932942952962972982993003013023033043053063073083093103113123133143153163173183193203213223233243253263273283293303313323333343353363373383393403413423433443453463473483493503513523533543553563573583593603613623633643653663673683693703713723733743753763773783793803813823833843853863873883893903913923933943953963973983994004014024034044054064074084094104114124134144154164174184194204214224234244254264274284294304314324334344354364374384394404414424434444454464474484494504514524534544554564574584594604614624634644654664674684694704714724734744754764774784794804814824834844854864874884894904914924934944954964974984995005015025035045055065075085095105115125135145155165175185195205215225235245255265275285295305315325335345355365375385395405415425435445455465475485495505515525535545555565575585595605615625635645655665675685695705715725735745755765775785795805815825835845855865875885895905915925935945955965975985996006016026036046056066076086096106116126136146156166176186196206216226236246256266276286296306316326336346356366376386396406416426436446456466476486496506516526536546556566576586596606616626636646656666676686696706716726736746756766776786796806816826836846856866876886896906916926936946956966976986997007017027037047057067077087097107117127137147157167177187197207217227237247257267277287297307317327337347357367377387397407417427437447457467477487497507517527537547557567577587597607617627637647657667677687697707717727737747757767777787797807817827837847857867877887897907917927937947957967977987998008018028038048058068078088098108118128138148158168178188198208218228238248258268278288298308318328338348358368378388398408418428438448458468478488498508518528538548558568578588598608618628638648658668678688698708718728738748758768778788798808818828838848858868878888898908918928938948958968978988999009019029039049059069079089099109119129139149159169179189199209219229239249259269279289299309319329339349359369379389399409419429439449459469479489499509519529539549559569579589599609619629639649659669679689699709719729739749759769779789799809819829839849859869879889899909919929939949959969979989991000100110021003100410051006100710081009101010111012101310141015101610171018101910201021102210231024102510261027102810291030103110321033103410351036103710381039104010411042104310441045104610471048104910501051105210531054105510561057105810591060106110621063106410651066106710681069107010711072107310741075107610771078107910801081108210831084108510861087108810891090109110921093109410951096109710981099110011011102110311041105110611071108110911101111111211131114111511161117111811191120112111221123112411251126112711281129113011311132113311341135113611371138113911401141114211431144114511461147114811491150115111521153115411551156115711581159116011611162116311641165116611671168116911701171117211731174117511761177117811791180118111821183118411851186118711881189119011911192119311941195119611971198119912001201120212031204120512061207120812091210121112121213121412151216121712181219122012211222122312241225122612271228122912301231123212331234123512361237123812391240124112421243124412451246124712481249125012511252125312541255125612571258125912601261126212631264126512661267126812691270127112721273127412751276127712781279128012811282128312841285128612871288128912901291129212931294129512961297129812991300130113021303130413051306130713081309131013111312131313141315131613171318131913201321132213231324132513261327132813291330133113321333133413351336133713381339134013411342134313441345134613471348134913501351135213531354135513561357135813591360136113621363136413651366136713681369137013711372137313741375137613771378137913801381138213831384138513861387138813891390139113921393139413951396139713981399140014011402140314041405140614071408140914101411141214131414141514161417141814191420142114221423142414251426142714281429143014311432143314341435143614371438143914401441144214431444144514461447144814491450145114521453145414551456145714581459146014611462146314641465146614671468146914701471147214731474147514761477147814791480148114821483148414851486148714881489149014911492149314941495149614971498149915001501150215031504150515061507150815091510151115121513151415151516151715181519152015211522152315241525152615271528152915301531153215331534153515361537153815391540154115421543154415451546154715481549155015511552155315541555155615571558155915601561156215631564156515661567156815691570157115721573157415751576157715781579158015811582158315841585158615871588158915901591159215931594159515961597159815991600160116021603160416051606160716081609161016111612161316141615161616171618161916201621162216231624162516261627162816291630163116321633163416351636163716381639164016411642164316441645164616471648164916501651165216531654165516561657165816591660166116621663166416651666166716681669167016711672167316741675167616771678167916801681168216831684168516861687168816891690169116921693169416951696169716981699170017011702170317041705170617071708170917101711171217131714171517161717171817191720172117221723172417251726172717281729173017311732173317341735173617371738173917401741174217431744174517461747174817491750175117521753175417551756175717581759176017611762176317641765176617671768176917701771177217731774177517761777177817791780178117821783178417851786178717881789179017911792179317941795179617971798179918001801180218031804180518061807180818091810181118121813181418151816181718181819182018211822182318241825182618271828182918301831183218331834183518361837183818391840184118421843184418451846184718481849185018511852185318541855185618571858185918601861186218631864186518661867186818691870187118721873187418751876187718781879188018811882188318841885188618871888188918901891189218931894189518961897189818991900190119021903190419051906190719081909191019111912191319141915191619171918191919201921192219231924192519261927192819291930193119321933193419351936193719381939194019411942194319441945194619471948194919501951195219531954195519561957195819591960196119621963196419651966196719681969197019711972197319741975197619771978197919801981198219831984198519861987198819891990199119921993199419951996199719981999200020012002200320042005200620072008200920102011201220132014201520162017201820192020202120222023202420252026202720282029203020312032203320342035203620372038203920402041204220432044204520462047204820492050205120522053205420552056205720582059206020612062206320642065206620672068206920702071207220732074207520762077207820792080208120822083208420852086208720882089209020912092209320942095209620972098209921002101210221032104210521062107210821092110211121122113211421152116211721182119212021212122212321242125212621272128212921302131213221332134213521362137213821392140214121422143214421452146214721482149215021512152215321542155215621572158215921602161216221632164216521662167216821692170217121722173217421752176217721782179218021812182218321842185218621872188218921902191219221932194219521962197219821992200220122022203220422052206220722082209221022112212221322142215221622172218221922202221222222232224222522262227222822292230223122322233223422352236223722382239224022412242224322442245224622472248224922502251225222532254225522562257225822592260226122622263226422652266226722682269227022712272227322742275227622772278227922802281228222832284228522862287228822892290229122922293229422952296229722982299230023012302230323042305230623072308230923102311231223132314231523162317231823192320232123222323232423252326232723282329233023312332233323342335233623372338233923402341234223432344234523462347234823492350235123522353235423552356235723582359236023612362236323642365236623672368236923702371237223732374237523762377237823792380238123822383238423852386238723882389239023912392239323942395239623972398239924002401240224032404240524062407240824092410241124122413241424152416241724182419242024212422242324242425242624272428242924302431243224332434243524362437243824392440244124422443244424452446244724482449245024512452245324542455245624572458245924602461246224632464246524662467246824692470247124722473247424752476247724782479248024812482248324842485248624872488248924902491249224932494249524962497249824992500250125022503250425052506250725082509251025112512251325142515251625172518251925202521252225232524252525262527252825292530253125322533253425352536253725382539254025412542254325442545254625472548254925502551255225532554255525562557255825592560256125622563256425652566256725682569257025712572257325742575257625772578257925802581258225832584258525862587258825892590259125922593259425952596259725982599260026012602260326042605260626072608260926102611261226132614261526162617261826192620262126222623262426252626262726282629263026312632263326342635263626372638263926402641264226432644264526462647264826492650265126522653265426552656265726582659266026612662266326642665266626672668266926702671267226732674267526762677267826792680268126822683268426852686268726882689269026912692269326942695269626972698269927002701270227032704270527062707270827092710271127122713271427152716271727182719272027212722272327242725272627272728272927302731273227332734273527362737273827392740274127422743274427452746274727482749275027512752275327542755275627572758275927602761276227632764276527662767276827692770277127722773277427752776277727782779278027812782278327842785278627872788278927902791279227932794279527962797279827992800280128022803280428052806280728082809281028112812281328142815281628172818281928202821282228232824282528262827282828292830283128322833283428352836283728382839284028412842284328442845284628472848284928502851285228532854285528562857285828592860286128622863286428652866286728682869287028712872287328742875287628772878287928802881288228832884288528862887288828892890289128922893289428952896289728982899290029012902290329042905290629072908290929102911291229132914291529162917291829192920292129222923292429252926292729282929293029312932293329342935293629372938
  1. /*
  2. * ppp - point-to-point protocol, rfc1331
  3. */
  4. #include <u.h>
  5. #include <libc.h>
  6. #include <auth.h>
  7. #include <bio.h>
  8. #include <ip.h>
  9. #include <libsec.h>
  10. #include <ndb.h>
  11. #include "ppp.h"
  12. #define PATH 128
  13. static int baud;
  14. static int nocompress;
  15. static int pppframing = 1;
  16. static int noipcompress;
  17. static int server;
  18. static int nip; /* number of ip interfaces */
  19. static int dying; /* flag to signal to all threads its time to go */
  20. static int primary; /* this is the primary IP interface */
  21. static char *chatfile;
  22. int debug;
  23. char* LOG = "ppp";
  24. char* keyspec = "";
  25. enum
  26. {
  27. Rmagic= 0x12345
  28. };
  29. /*
  30. * Calculate FCS - rfc 1331
  31. */
  32. ushort fcstab[256] =
  33. {
  34. 0x0000, 0x1189, 0x2312, 0x329b, 0x4624, 0x57ad, 0x6536, 0x74bf,
  35. 0x8c48, 0x9dc1, 0xaf5a, 0xbed3, 0xca6c, 0xdbe5, 0xe97e, 0xf8f7,
  36. 0x1081, 0x0108, 0x3393, 0x221a, 0x56a5, 0x472c, 0x75b7, 0x643e,
  37. 0x9cc9, 0x8d40, 0xbfdb, 0xae52, 0xdaed, 0xcb64, 0xf9ff, 0xe876,
  38. 0x2102, 0x308b, 0x0210, 0x1399, 0x6726, 0x76af, 0x4434, 0x55bd,
  39. 0xad4a, 0xbcc3, 0x8e58, 0x9fd1, 0xeb6e, 0xfae7, 0xc87c, 0xd9f5,
  40. 0x3183, 0x200a, 0x1291, 0x0318, 0x77a7, 0x662e, 0x54b5, 0x453c,
  41. 0xbdcb, 0xac42, 0x9ed9, 0x8f50, 0xfbef, 0xea66, 0xd8fd, 0xc974,
  42. 0x4204, 0x538d, 0x6116, 0x709f, 0x0420, 0x15a9, 0x2732, 0x36bb,
  43. 0xce4c, 0xdfc5, 0xed5e, 0xfcd7, 0x8868, 0x99e1, 0xab7a, 0xbaf3,
  44. 0x5285, 0x430c, 0x7197, 0x601e, 0x14a1, 0x0528, 0x37b3, 0x263a,
  45. 0xdecd, 0xcf44, 0xfddf, 0xec56, 0x98e9, 0x8960, 0xbbfb, 0xaa72,
  46. 0x6306, 0x728f, 0x4014, 0x519d, 0x2522, 0x34ab, 0x0630, 0x17b9,
  47. 0xef4e, 0xfec7, 0xcc5c, 0xddd5, 0xa96a, 0xb8e3, 0x8a78, 0x9bf1,
  48. 0x7387, 0x620e, 0x5095, 0x411c, 0x35a3, 0x242a, 0x16b1, 0x0738,
  49. 0xffcf, 0xee46, 0xdcdd, 0xcd54, 0xb9eb, 0xa862, 0x9af9, 0x8b70,
  50. 0x8408, 0x9581, 0xa71a, 0xb693, 0xc22c, 0xd3a5, 0xe13e, 0xf0b7,
  51. 0x0840, 0x19c9, 0x2b52, 0x3adb, 0x4e64, 0x5fed, 0x6d76, 0x7cff,
  52. 0x9489, 0x8500, 0xb79b, 0xa612, 0xd2ad, 0xc324, 0xf1bf, 0xe036,
  53. 0x18c1, 0x0948, 0x3bd3, 0x2a5a, 0x5ee5, 0x4f6c, 0x7df7, 0x6c7e,
  54. 0xa50a, 0xb483, 0x8618, 0x9791, 0xe32e, 0xf2a7, 0xc03c, 0xd1b5,
  55. 0x2942, 0x38cb, 0x0a50, 0x1bd9, 0x6f66, 0x7eef, 0x4c74, 0x5dfd,
  56. 0xb58b, 0xa402, 0x9699, 0x8710, 0xf3af, 0xe226, 0xd0bd, 0xc134,
  57. 0x39c3, 0x284a, 0x1ad1, 0x0b58, 0x7fe7, 0x6e6e, 0x5cf5, 0x4d7c,
  58. 0xc60c, 0xd785, 0xe51e, 0xf497, 0x8028, 0x91a1, 0xa33a, 0xb2b3,
  59. 0x4a44, 0x5bcd, 0x6956, 0x78df, 0x0c60, 0x1de9, 0x2f72, 0x3efb,
  60. 0xd68d, 0xc704, 0xf59f, 0xe416, 0x90a9, 0x8120, 0xb3bb, 0xa232,
  61. 0x5ac5, 0x4b4c, 0x79d7, 0x685e, 0x1ce1, 0x0d68, 0x3ff3, 0x2e7a,
  62. 0xe70e, 0xf687, 0xc41c, 0xd595, 0xa12a, 0xb0a3, 0x8238, 0x93b1,
  63. 0x6b46, 0x7acf, 0x4854, 0x59dd, 0x2d62, 0x3ceb, 0x0e70, 0x1ff9,
  64. 0xf78f, 0xe606, 0xd49d, 0xc514, 0xb1ab, 0xa022, 0x92b9, 0x8330,
  65. 0x7bc7, 0x6a4e, 0x58d5, 0x495c, 0x3de3, 0x2c6a, 0x1ef1, 0x0f78
  66. };
  67. static char *snames[] =
  68. {
  69. "Sclosed",
  70. "Sclosing",
  71. "Sreqsent",
  72. "Sackrcvd",
  73. "Sacksent",
  74. "Sopened",
  75. };
  76. static void authtimer(PPP*);
  77. static void chapinit(PPP*);
  78. static void config(PPP*, Pstate*, int);
  79. static uchar* escapeuchar(PPP*, ulong, uchar*, ushort*);
  80. static void getchap(PPP*, Block*);
  81. static Block* getframe(PPP*, int*);
  82. static void getlqm(PPP*, Block*);
  83. static int getopts(PPP*, Pstate*, Block*);
  84. static void getpap(PPP*, Block*);
  85. static void init(PPP*);
  86. static void invalidate(Ipaddr);
  87. static void ipinproc(PPP*);
  88. static char* ipopen(PPP*);
  89. static void mediainproc(PPP*);
  90. static void newstate(PPP*, Pstate*, int);
  91. static int nipifcs(char*);
  92. static void papinit(PPP*);
  93. static void pinit(PPP*, Pstate*);
  94. static void ppptimer(PPP*);
  95. static void printopts(Pstate*, Block*, int);
  96. static void ptimer(PPP*, Pstate*);
  97. static int putframe(PPP*, int, Block*);
  98. static void putlqm(PPP*);
  99. static void putndb(PPP*, char*);
  100. static void putpaprequest(PPP*);
  101. static void rcv(PPP*, Pstate*, Block*);
  102. static void rejopts(PPP*, Pstate*, Block*, int);
  103. static void sendechoreq(PPP*, Pstate*);
  104. static void sendtermreq(PPP*, Pstate*);
  105. static void setphase(PPP*, int);
  106. static void terminate(PPP*, int);
  107. static int validv4(Ipaddr);
  108. static void dmppkt(char *s, uchar *a, int na);
  109. static void getauth(PPP*);
  110. void
  111. pppopen(PPP *ppp, int mediain, int mediaout, char *net,
  112. Ipaddr ipaddr, Ipaddr remip,
  113. int mtu, int framing)
  114. {
  115. ppp->ipfd = -1;
  116. ppp->ipcfd = -1;
  117. invalidate(ppp->remote);
  118. invalidate(ppp->local);
  119. invalidate(ppp->curremote);
  120. invalidate(ppp->curlocal);
  121. invalidate(ppp->dns[0]);
  122. invalidate(ppp->dns[1]);
  123. invalidate(ppp->wins[0]);
  124. invalidate(ppp->wins[1]);
  125. ppp->mediain = mediain;
  126. ppp->mediaout = mediaout;
  127. if(validv4(remip)){
  128. ipmove(ppp->remote, remip);
  129. ppp->remotefrozen = 1;
  130. }
  131. if(validv4(ipaddr)){
  132. ipmove(ppp->local, ipaddr);
  133. ppp->localfrozen = 1;
  134. }
  135. ppp->mtu = Defmtu;
  136. ppp->mru = mtu;
  137. ppp->framing = framing;
  138. ppp->net = net;
  139. init(ppp);
  140. switch(rfork(RFPROC|RFMEM|RFNOWAIT)){
  141. case -1:
  142. sysfatal("forking mediainproc");
  143. case 0:
  144. mediainproc(ppp);
  145. terminate(ppp, 1);
  146. _exits(0);
  147. }
  148. }
  149. static void
  150. init(PPP* ppp)
  151. {
  152. if(ppp->inbuf == nil){
  153. ppp->inbuf = allocb(4096);
  154. if(ppp->inbuf == nil)
  155. abort();
  156. ppp->outbuf = allocb(4096);
  157. if(ppp->outbuf == nil)
  158. abort();
  159. ppp->lcp = mallocz(sizeof(*ppp->lcp), 1);
  160. if(ppp->lcp == nil)
  161. abort();
  162. ppp->lcp->proto = Plcp;
  163. ppp->lcp->state = Sclosed;
  164. ppp->ccp = mallocz(sizeof(*ppp->ccp), 1);
  165. if(ppp->ccp == nil)
  166. abort();
  167. ppp->ccp->proto = Pccp;
  168. ppp->ccp->state = Sclosed;
  169. ppp->ipcp = mallocz(sizeof(*ppp->ipcp), 1);
  170. if(ppp->ipcp == nil)
  171. abort();
  172. ppp->ipcp->proto = Pipcp;
  173. ppp->ipcp->state = Sclosed;
  174. ppp->chap = mallocz(sizeof(*ppp->chap), 1);
  175. if(ppp->chap == nil)
  176. abort();
  177. ppp->chap->proto = APmschap;
  178. ppp->chap->state = Cunauth;
  179. auth_freechal(ppp->chap->cs);
  180. ppp->chap->cs = nil;
  181. switch(rfork(RFPROC|RFMEM|RFNOWAIT)){
  182. case -1:
  183. sysfatal("forking ppptimer");
  184. case 0:
  185. ppptimer(ppp);
  186. _exits(0);
  187. }
  188. }
  189. ppp->ctcp = compress_init(ppp->ctcp);
  190. pinit(ppp, ppp->lcp);
  191. setphase(ppp, Plink);
  192. }
  193. static void
  194. setphase(PPP *ppp, int phase)
  195. {
  196. int oldphase;
  197. oldphase = ppp->phase;
  198. ppp->phase = phase;
  199. switch(phase){
  200. default:
  201. sysfatal("ppp: unknown phase %d", phase);
  202. case Pdead:
  203. /* restart or exit? */
  204. pinit(ppp, ppp->lcp);
  205. setphase(ppp, Plink);
  206. break;
  207. case Plink:
  208. /* link down */
  209. switch(oldphase) {
  210. case Pauth:
  211. auth_freechal(ppp->chap->cs);
  212. ppp->chap->cs = nil;
  213. ppp->chap->state = Cunauth;
  214. break;
  215. case Pnet:
  216. auth_freechal(ppp->chap->cs);
  217. ppp->chap->cs = nil;
  218. ppp->chap->state = Cunauth;
  219. newstate(ppp, ppp->ccp, Sclosed);
  220. newstate(ppp, ppp->ipcp, Sclosed);
  221. }
  222. break;
  223. case Pauth:
  224. if(server)
  225. chapinit(ppp);
  226. else if(ppp->chap->proto == APpasswd)
  227. papinit(ppp);
  228. else
  229. setphase(ppp, Pnet);
  230. break;
  231. case Pnet:
  232. pinit(ppp, ppp->ccp);
  233. pinit(ppp, ppp->ipcp);
  234. break;
  235. case Pterm:
  236. /* what? */
  237. break;
  238. }
  239. }
  240. static void
  241. pinit(PPP *ppp, Pstate *p)
  242. {
  243. p->timeout = 0;
  244. switch(p->proto){
  245. case Plcp:
  246. ppp->magic = truerand();
  247. ppp->xctlmap = 0xffffffff;
  248. ppp->period = 0;
  249. p->optmask = 0xffffffff;
  250. if(!server)
  251. p->optmask &= ~(Fauth|Fmtu);
  252. ppp->rctlmap = 0;
  253. ppp->ipcp->state = Sclosed;
  254. ppp->ipcp->optmask = 0xffffffff;
  255. p->echotimeout = 0;
  256. /* quality goo */
  257. ppp->timeout = 0;
  258. memset(&ppp->in, 0, sizeof(ppp->in));
  259. memset(&ppp->out, 0, sizeof(ppp->out));
  260. memset(&ppp->pin, 0, sizeof(ppp->pin));
  261. memset(&ppp->pout, 0, sizeof(ppp->pout));
  262. memset(&ppp->sin, 0, sizeof(ppp->sin));
  263. break;
  264. case Pccp:
  265. if(nocompress)
  266. p->optmask = 0;
  267. else
  268. p->optmask = Fcmppc;
  269. if(ppp->ctype != nil)
  270. (*ppp->ctype->fini)(ppp->cstate);
  271. ppp->ctype = nil;
  272. ppp->ctries = 0;
  273. ppp->cstate = nil;
  274. if(ppp->unctype)
  275. (*ppp->unctype->fini)(ppp->uncstate);
  276. ppp->unctype = nil;
  277. ppp->uncstate = nil;
  278. break;
  279. case Pipcp:
  280. p->optmask = 0xffffffff;
  281. ppp->ctcp = compress_init(ppp->ctcp);
  282. break;
  283. }
  284. p->confid = p->rcvdconfid = -1;
  285. config(ppp, p, 1);
  286. newstate(ppp, p, Sreqsent);
  287. }
  288. /*
  289. * change protocol to a new state.
  290. */
  291. static void
  292. newstate(PPP *ppp, Pstate *p, int state)
  293. {
  294. char *err;
  295. netlog("ppp: %ux %s->%s ctlmap %lux/%lux flags %lux mtu %ld mru %ld\n",
  296. p->proto, snames[p->state], snames[state], ppp->rctlmap,
  297. ppp->xctlmap, p->flags,
  298. ppp->mtu, ppp->mru);
  299. syslog(0, "ppp", "%ux %s->%s ctlmap %lux/%lux flags %lux mtu %ld mru %ld",
  300. p->proto, snames[p->state], snames[state], ppp->rctlmap,
  301. ppp->xctlmap, p->flags,
  302. ppp->mtu, ppp->mru);
  303. if(p->proto == Plcp) {
  304. if(state == Sopened)
  305. setphase(ppp, Pauth);
  306. else if(state == Sclosed)
  307. setphase(ppp, Pdead);
  308. else if(p->state == Sopened)
  309. setphase(ppp, Plink);
  310. }
  311. if(p->proto == Pccp && state == Sopened) {
  312. if(ppp->unctype)
  313. (*ppp->unctype->fini)(ppp->uncstate);
  314. ppp->unctype = nil;
  315. ppp->uncstate = nil;
  316. if(p->optmask & Fcmppc) {
  317. ppp->unctype = &uncmppc;
  318. ppp->uncstate = (*uncmppc.init)(ppp);
  319. }
  320. if(p->optmask & Fcthwack){
  321. ppp->unctype = &uncthwack;
  322. ppp->uncstate = (*uncthwack.init)(ppp);
  323. }
  324. }
  325. if(p->proto == Pipcp && state == Sopened) {
  326. if(server && ppp->chap->state != Cauthok)
  327. abort();
  328. err = ipopen(ppp);
  329. if(err != nil)
  330. sysfatal("%s", err);
  331. }
  332. p->state = state;
  333. }
  334. /* returns (protocol, information) */
  335. static Block*
  336. getframe(PPP *ppp, int *protop)
  337. {
  338. uchar *p, *from, *to;
  339. int n, len, proto;
  340. ulong c;
  341. ushort fcs;
  342. Block *buf, *b;
  343. *protop = 0;
  344. if(ppp->framing == 0) {
  345. /* assume data is already framed */
  346. b = allocb(2000);
  347. len = b->lim - b->wptr;
  348. n = read(ppp->mediain, b->wptr, len);
  349. dmppkt("RX", b->wptr, n);
  350. if(n <= 0 || n == len){
  351. freeb(b);
  352. return nil;
  353. }
  354. b->wptr += n;
  355. /* should probably copy to another block if small */
  356. if(pppframing && b->rptr[0] == PPP_addr && b->rptr[1] == PPP_ctl)
  357. b->rptr += 2;
  358. proto = *b->rptr++;
  359. if((proto & 0x1) == 0)
  360. proto = (proto<<8) | *b->rptr++;
  361. if(b->rptr >= b->wptr){
  362. freeb(b);
  363. return nil;
  364. }
  365. ppp->in.uchars += n;
  366. ppp->in.packets++;
  367. *protop = proto;
  368. netlog("getframe 0x%x\n", proto);
  369. return b;
  370. }
  371. buf = ppp->inbuf;
  372. for(;;){
  373. /* read till we hit a frame uchar or run out of room */
  374. for(p = buf->rptr; buf->wptr < buf->lim;){
  375. for(; p < buf->wptr; p++)
  376. if(*p == HDLC_frame)
  377. break;
  378. if(p != buf->wptr)
  379. break;
  380. len = buf->lim - buf->wptr;
  381. n = read(ppp->mediain, buf->wptr, len);
  382. if(n <= 0){
  383. syslog(0, LOG, "medium read returns %d: %r", n);
  384. buf->wptr = buf->rptr;
  385. return nil;
  386. }
  387. dmppkt("RX", buf->wptr, n);
  388. buf->wptr += n;
  389. }
  390. /* copy into block, undoing escapes, and caculating fcs */
  391. fcs = PPP_initfcs;
  392. b = allocb(p - buf->rptr);
  393. to = b->wptr;
  394. for(from = buf->rptr; from != p;){
  395. c = *from++;
  396. if(c == HDLC_esc){
  397. if(from == p)
  398. break;
  399. c = *from++ ^ 0x20;
  400. } else if((c < 0x20) && (ppp->rctlmap & (1 << c)))
  401. continue;
  402. *to++ = c;
  403. fcs = (fcs >> 8) ^ fcstab[(fcs ^ c) & 0xff];
  404. }
  405. /* copy down what's left in buffer */
  406. p++;
  407. memmove(buf->rptr, p, buf->wptr - p);
  408. n = p - buf->rptr;
  409. buf->wptr -= n;
  410. b->wptr = to - 2;
  411. /* return to caller if checksum matches */
  412. if(fcs == PPP_goodfcs){
  413. if(b->rptr[0] == PPP_addr && b->rptr[1] == PPP_ctl)
  414. b->rptr += 2;
  415. proto = *b->rptr++;
  416. if((proto & 0x1) == 0)
  417. proto = (proto<<8) | *b->rptr++;
  418. if(b->rptr < b->wptr){
  419. ppp->in.uchars += n;
  420. ppp->in.packets++;
  421. *protop = proto;
  422. netlog("getframe 0x%x\n", proto);
  423. return b;
  424. }
  425. } else if(BLEN(b) > 0){
  426. if(ppp->ctcp)
  427. compress_error(ppp->ctcp);
  428. ppp->in.discards++;
  429. netlog("ppp: discard len %ld/%ld cksum %ux (%ux %ux %ux %ux)\n",
  430. BLEN(b), BLEN(buf), fcs, b->rptr[0],
  431. b->rptr[1], b->rptr[2], b->rptr[3]);
  432. }
  433. freeb(b);
  434. }
  435. }
  436. /* send a PPP frame */
  437. static int
  438. putframe(PPP *ppp, int proto, Block *b)
  439. {
  440. Block *buf;
  441. uchar *to, *from;
  442. ushort fcs;
  443. ulong ctlmap;
  444. uchar c;
  445. Block *bp;
  446. ppp->out.packets++;
  447. if(proto == Plcp)
  448. ctlmap = 0xffffffff;
  449. else
  450. ctlmap = ppp->xctlmap;
  451. /* make sure we have head room */
  452. if(b->rptr - b->base < 4){
  453. b = padb(b, 4);
  454. b->rptr += 4;
  455. }
  456. netlog("ppp: putframe 0x%ux %ld\n", proto, b->wptr-b->rptr);
  457. /* add in the protocol and address, we'd better have left room */
  458. from = b->rptr;
  459. *--from = proto;
  460. if(!(ppp->lcp->flags&Fpc) || proto > 0x100 || proto == Plcp)
  461. *--from = proto>>8;
  462. if(pppframing && (!(ppp->lcp->flags&Fac) || proto == Plcp)){
  463. *--from = PPP_ctl;
  464. *--from = PPP_addr;
  465. }
  466. qlock(&ppp->outlock);
  467. buf = ppp->outbuf;
  468. if(ppp->framing == 0) {
  469. to = buf->rptr;
  470. for(bp = b; bp; bp = bp->next){
  471. if(bp != b)
  472. from = bp->rptr;
  473. memmove(to, from, bp->wptr-from);
  474. to += bp->wptr-from;
  475. }
  476. } else {
  477. /* escape and checksum the body */
  478. fcs = PPP_initfcs;
  479. to = buf->rptr;
  480. /* add frame marker */
  481. *to++ = HDLC_frame;
  482. for(bp = b; bp; bp = bp->next){
  483. if(bp != b)
  484. from = bp->rptr;
  485. for(; from < bp->wptr; from++){
  486. c = *from;
  487. if(c == HDLC_frame || c == HDLC_esc
  488. || (c < 0x20 && ((1<<c) & ctlmap))){
  489. *to++ = HDLC_esc;
  490. *to++ = c ^ 0x20;
  491. } else
  492. *to++ = c;
  493. fcs = (fcs >> 8) ^ fcstab[(fcs ^ c) & 0xff];
  494. }
  495. }
  496. /* add on and escape the checksum */
  497. fcs = ~fcs;
  498. c = fcs;
  499. if(c == HDLC_frame || c == HDLC_esc
  500. || (c < 0x20 && ((1<<c) & ctlmap))){
  501. *to++ = HDLC_esc;
  502. *to++ = c ^ 0x20;
  503. } else
  504. *to++ = c;
  505. c = fcs>>8;
  506. if(c == HDLC_frame || c == HDLC_esc
  507. || (c < 0x20 && ((1<<c) & ctlmap))){
  508. *to++ = HDLC_esc;
  509. *to++ = c ^ 0x20;
  510. } else
  511. *to++ = c;
  512. /* add frame marker */
  513. *to++ = HDLC_frame;
  514. }
  515. /* send */
  516. buf->wptr = to;
  517. dmppkt("TX", buf->rptr, BLEN(buf));
  518. if(write(ppp->mediaout, buf->rptr, BLEN(buf)) < 0){
  519. qunlock(&ppp->outlock);
  520. return -1;
  521. }
  522. ppp->out.uchars += BLEN(buf);
  523. qunlock(&ppp->outlock);
  524. return 0;
  525. }
  526. Block*
  527. alloclcp(int code, int id, int len, Lcpmsg **mp)
  528. {
  529. Block *b;
  530. Lcpmsg *m;
  531. /*
  532. * leave room for header
  533. */
  534. b = allocb(len);
  535. m = (Lcpmsg*)b->wptr;
  536. m->code = code;
  537. m->id = id;
  538. b->wptr += 4;
  539. *mp = m;
  540. return b;
  541. }
  542. static void
  543. putlo(Block *b, int type, ulong val)
  544. {
  545. *b->wptr++ = type;
  546. *b->wptr++ = 6;
  547. hnputl(b->wptr, val);
  548. b->wptr += 4;
  549. }
  550. static void
  551. putv4o(Block *b, int type, Ipaddr val)
  552. {
  553. *b->wptr++ = type;
  554. *b->wptr++ = 6;
  555. v6tov4(b->wptr, val);
  556. b->wptr += 4;
  557. }
  558. static void
  559. putso(Block *b, int type, ulong val)
  560. {
  561. *b->wptr++ = type;
  562. *b->wptr++ = 4;
  563. hnputs(b->wptr, val);
  564. b->wptr += 2;
  565. }
  566. static void
  567. puto(Block *b, int type)
  568. {
  569. *b->wptr++ = type;
  570. *b->wptr++ = 2;
  571. }
  572. /*
  573. * send configuration request
  574. */
  575. static void
  576. config(PPP *ppp, Pstate *p, int newid)
  577. {
  578. Block *b;
  579. Lcpmsg *m;
  580. int id;
  581. if(newid){
  582. id = p->id++;
  583. p->confid = id;
  584. p->timeout = Timeout;
  585. } else
  586. id = p->confid;
  587. b = alloclcp(Lconfreq, id, 256, &m);
  588. USED(m);
  589. switch(p->proto){
  590. case Plcp:
  591. if(p->optmask & Fctlmap)
  592. putlo(b, Octlmap, 0); /* we don't want anything escaped */
  593. if(p->optmask & Fmagic)
  594. putlo(b, Omagic, ppp->magic);
  595. if(p->optmask & Fmtu)
  596. putso(b, Omtu, ppp->mru);
  597. if(p->optmask & Fauth) {
  598. *b->wptr++ = Oauth;
  599. *b->wptr++ = 5;
  600. hnputs(b->wptr, Pchap);
  601. b->wptr += 2;
  602. *b->wptr++ = ppp->chap->proto;
  603. }
  604. if(p->optmask & Fpc)
  605. puto(b, Opc);
  606. if(p->optmask & Fac)
  607. puto(b, Oac);
  608. break;
  609. case Pccp:
  610. if(p->optmask & Fcthwack)
  611. puto(b, Octhwack);
  612. else if(p->optmask & Fcmppc) {
  613. *b->wptr++ = Ocmppc;
  614. *b->wptr++ = 6;
  615. *b->wptr++ = 0;
  616. *b->wptr++ = 0;
  617. *b->wptr++ = 0;
  618. *b->wptr++ = 0x41;
  619. }
  620. break;
  621. case Pipcp:
  622. if(p->optmask & Fipaddr)
  623. {syslog(0, "ppp", "requesting %I", ppp->local);
  624. putv4o(b, Oipaddr, ppp->local);
  625. }
  626. if(primary && (p->optmask & Fipdns))
  627. putv4o(b, Oipdns, ppp->dns[0]);
  628. if(primary && (p->optmask & Fipdns2))
  629. putv4o(b, Oipdns2, ppp->dns[1]);
  630. if(primary && (p->optmask & Fipwins))
  631. putv4o(b, Oipwins, ppp->wins[0]);
  632. if(primary && (p->optmask & Fipwins2))
  633. putv4o(b, Oipwins2, ppp->wins[1]);
  634. /*
  635. * don't ask for header compression while data compression is still pending.
  636. * perhaps we should restart ipcp negotiation if compression negotiation fails.
  637. */
  638. if(!noipcompress && !ppp->ccp->optmask && (p->optmask & Fipcompress)) {
  639. *b->wptr++ = Oipcompress;
  640. *b->wptr++ = 6;
  641. hnputs(b->wptr, Pvjctcp);
  642. b->wptr += 2;
  643. *b->wptr++ = MAX_STATES-1;
  644. *b->wptr++ = 1;
  645. }
  646. break;
  647. }
  648. hnputs(m->len, BLEN(b));
  649. printopts(p, b, 1);
  650. putframe(ppp, p->proto, b);
  651. freeb(b);
  652. }
  653. static void
  654. getipinfo(PPP *ppp)
  655. {
  656. char *av[3];
  657. int ndns, nwins;
  658. char ip[64];
  659. Ndbtuple *t, *nt;
  660. if(!validv4(ppp->local))
  661. return;
  662. av[0] = "dns";
  663. av[1] = "wins";
  664. sprint(ip, "%I", ppp->local);
  665. t = csipinfo(ppp->net, "ip", ip, av, 2);
  666. ndns = nwins = 0;
  667. for(nt = t; nt != nil; nt = nt->entry){
  668. if(strcmp(nt->attr, "dns") == 0){
  669. if(ndns < 2)
  670. parseip(ppp->dns[ndns++], nt->val);
  671. } else if(strcmp(nt->attr, "wins") == 0){
  672. if(nwins < 2)
  673. parseip(ppp->wins[nwins++], nt->val);
  674. }
  675. }
  676. if(t != nil)
  677. ndbfree(t);
  678. }
  679. /*
  680. * parse configuration request, sends an ack or reject packet
  681. *
  682. * returns: -1 if request was syntacticly incorrect
  683. * 0 if packet was accepted
  684. * 1 if packet was rejected
  685. */
  686. static int
  687. getopts(PPP *ppp, Pstate *p, Block *b)
  688. {
  689. Lcpmsg *m, *repm;
  690. Lcpopt *o;
  691. uchar *cp, *ap;
  692. ulong rejecting, nacking, flags, proto, chapproto;
  693. ulong mtu, ctlmap, period;
  694. ulong x;
  695. Block *repb;
  696. Comptype *ctype;
  697. Ipaddr ipaddr;
  698. rejecting = 0;
  699. nacking = 0;
  700. flags = 0;
  701. /* defaults */
  702. invalidate(ipaddr);
  703. mtu = ppp->mtu;
  704. ctlmap = 0xffffffff;
  705. period = 0;
  706. ctype = nil;
  707. chapproto = 0;
  708. m = (Lcpmsg*)b->rptr;
  709. repb = alloclcp(Lconfack, m->id, BLEN(b), &repm);
  710. /* copy options into ack packet */
  711. memmove(repm->data, m->data, b->wptr - m->data);
  712. repb->wptr += b->wptr - m->data;
  713. /* look for options we don't recognize or like */
  714. for(cp = m->data; cp < b->wptr; cp += o->len){
  715. o = (Lcpopt*)cp;
  716. if(cp + o->len > b->wptr || o->len==0){
  717. freeb(repb);
  718. netlog("ppp: bad option length %ux\n", o->type);
  719. return -1;
  720. }
  721. switch(p->proto){
  722. case Plcp:
  723. switch(o->type){
  724. case Oac:
  725. flags |= Fac;
  726. continue;
  727. case Opc:
  728. flags |= Fpc;
  729. continue;
  730. case Omtu:
  731. mtu = nhgets(o->data);
  732. continue;
  733. case Omagic:
  734. if(ppp->magic == nhgetl(o->data))
  735. netlog("ppp: possible loop\n");
  736. continue;
  737. case Octlmap:
  738. ctlmap = nhgetl(o->data);
  739. continue;
  740. case Oquality:
  741. proto = nhgets(o->data);
  742. if(proto != Plqm)
  743. break;
  744. x = nhgetl(o->data+2)*10;
  745. period = (x+Period-1)/Period;
  746. continue;
  747. case Oauth:
  748. proto = nhgets(o->data);
  749. if(proto == Ppasswd && !server){
  750. chapproto = APpasswd;
  751. continue;
  752. }
  753. if(proto != Pchap)
  754. break;
  755. if(o->data[2] != APmd5 && o->data[2] != APmschap)
  756. break;
  757. chapproto = o->data[2];
  758. continue;
  759. }
  760. break;
  761. case Pccp:
  762. if(nocompress)
  763. break;
  764. switch(o->type){
  765. case Octhwack:
  766. break;
  767. /*
  768. if(o->len == 2){
  769. ctype = &cthwack;
  770. continue;
  771. }
  772. if(!nacking){
  773. nacking = 1;
  774. repb->wptr = repm->data;
  775. repm->code = Lconfnak;
  776. }
  777. puto(repb, Octhwack);
  778. continue;
  779. */
  780. case Ocmppc:
  781. x = nhgetl(o->data);
  782. // hack for Mac
  783. // if(x == 0)
  784. // continue;
  785. /* stop ppp loops */
  786. if((x&0x41) == 0 || ppp->ctries++ > 5) {
  787. /*
  788. * turn off requests as well - I don't think this
  789. * is needed in the standard
  790. */
  791. p->optmask &= ~Fcmppc;
  792. break;
  793. }
  794. if(rejecting)
  795. continue;
  796. if(x & 1) {
  797. ctype = &cmppc;
  798. ppp->sendencrypted = (o->data[3]&0x40) == 0x40;
  799. continue;
  800. }
  801. if(!nacking){
  802. nacking = 1;
  803. repb->wptr = repm->data;
  804. repm->code = Lconfnak;
  805. }
  806. *repb->wptr++ = Ocmppc;
  807. *repb->wptr++ = 6;
  808. *repb->wptr++ = 0;
  809. *repb->wptr++ = 0;
  810. *repb->wptr++ = 0;
  811. *repb->wptr++ = 0x41;
  812. continue;
  813. }
  814. break;
  815. case Pipcp:
  816. switch(o->type){
  817. case Oipaddr:
  818. v4tov6(ipaddr, o->data);
  819. if(!validv4(ppp->remote))
  820. continue;
  821. if(!validv4(ipaddr) && !rejecting){
  822. /* other side requesting an address */
  823. if(!nacking){
  824. nacking = 1;
  825. repb->wptr = repm->data;
  826. repm->code = Lconfnak;
  827. }
  828. putv4o(repb, Oipaddr, ppp->remote);
  829. }
  830. continue;
  831. case Oipdns:
  832. ap = ppp->dns[0];
  833. goto ipinfo;
  834. case Oipdns2:
  835. ap = ppp->dns[1];
  836. goto ipinfo;
  837. case Oipwins:
  838. ap = ppp->wins[0];
  839. goto ipinfo;
  840. case Oipwins2:
  841. ap = ppp->wins[1];
  842. goto ipinfo;
  843. ipinfo:
  844. if(!validv4(ap))
  845. getipinfo(ppp);
  846. if(!validv4(ap))
  847. break;
  848. v4tov6(ipaddr, o->data);
  849. if(!validv4(ipaddr) && !rejecting){
  850. /* other side requesting an address */
  851. if(!nacking){
  852. nacking = 1;
  853. repb->wptr = repm->data;
  854. repm->code = Lconfnak;
  855. }
  856. putv4o(repb, o->type, ap);
  857. }
  858. continue;
  859. case Oipcompress:
  860. /*
  861. * don't compress tcp header if we've negotiated data compression.
  862. * tcp header compression has very poor performance if there is an error.
  863. */
  864. proto = nhgets(o->data);
  865. if(noipcompress || proto != Pvjctcp || ppp->ctype != nil)
  866. break;
  867. if(compress_negotiate(ppp->ctcp, o->data+2) < 0)
  868. break;
  869. flags |= Fipcompress;
  870. continue;
  871. }
  872. break;
  873. }
  874. /* come here if option is not recognized */
  875. if(!rejecting){
  876. rejecting = 1;
  877. repb->wptr = repm->data;
  878. repm->code = Lconfrej;
  879. }
  880. netlog("ppp: bad %ux option %d\n", p->proto, o->type);
  881. memmove(repb->wptr, o, o->len);
  882. repb->wptr += o->len;
  883. }
  884. /* permanent changes only after we know that we liked the packet */
  885. if(!rejecting && !nacking){
  886. switch(p->proto){
  887. case Plcp:
  888. ppp->period = period;
  889. ppp->xctlmap = ctlmap;
  890. if(mtu > Maxmtu)
  891. mtu = Maxmtu;
  892. if(mtu < Minmtu)
  893. mtu = Minmtu;
  894. ppp->mtu = mtu;
  895. if(chapproto)
  896. ppp->chap->proto = chapproto;
  897. break;
  898. case Pccp:
  899. if(ppp->ctype != nil){
  900. (*ppp->ctype->fini)(ppp->cstate);
  901. ppp->cstate = nil;
  902. }
  903. ppp->ctype = ctype;
  904. if(ctype)
  905. ppp->cstate = (*ctype->init)(ppp);
  906. break;
  907. case Pipcp:
  908. if(validv4(ipaddr) && ppp->remotefrozen == 0)
  909. ipmove(ppp->remote, ipaddr);
  910. break;
  911. }
  912. p->flags = flags;
  913. }
  914. hnputs(repm->len, BLEN(repb));
  915. printopts(p, repb, 1);
  916. putframe(ppp, p->proto, repb);
  917. freeb(repb);
  918. return rejecting || nacking;
  919. }
  920. static void
  921. dmppkt(char *s, uchar *a, int na)
  922. {
  923. int i;
  924. if (debug < 3)
  925. return;
  926. fprint(2, "%s", s);
  927. for(i = 0; i < na; i++)
  928. fprint(2, " %.2ux", a[i]);
  929. fprint(2, "\n");
  930. }
  931. static void
  932. dropoption(Pstate *p, Lcpopt *o)
  933. {
  934. unsigned n = o->type;
  935. switch(n){
  936. case Oipaddr:
  937. break;
  938. case Oipdns:
  939. p->optmask &= ~Fipdns;
  940. break;
  941. case Oipwins:
  942. p->optmask &= ~Fipwins;
  943. break;
  944. case Oipdns2:
  945. p->optmask &= ~Fipdns2;
  946. break;
  947. case Oipwins2:
  948. p->optmask &= ~Fipwins2;
  949. break;
  950. default:
  951. if(o->type < 8*sizeof(p->optmask))
  952. p->optmask &= ~(1<<o->type);
  953. break;
  954. }
  955. }
  956. /*
  957. * parse configuration rejection, just stop sending anything that they
  958. * don't like (except for ipcp address nak).
  959. */
  960. static void
  961. rejopts(PPP *ppp, Pstate *p, Block *b, int code)
  962. {
  963. Lcpmsg *m;
  964. Lcpopt *o;
  965. uchar newip[IPaddrlen];
  966. /* just give up trying what the other side doesn't like */
  967. m = (Lcpmsg*)b->rptr;
  968. for(b->rptr = m->data; b->rptr < b->wptr; b->rptr += o->len){
  969. o = (Lcpopt*)b->rptr;
  970. if(b->rptr + o->len > b->wptr){
  971. netlog("ppp: bad roption length %ux\n", o->type);
  972. return;
  973. }
  974. if(code == Lconfrej){
  975. dropoption(p, o);
  976. netlog("ppp: %ux rejecting %d\n",
  977. p->proto, o->type);
  978. continue;
  979. }
  980. switch(p->proto){
  981. case Plcp:
  982. switch(o->type){
  983. case Octlmap:
  984. ppp->rctlmap = nhgetl(o->data);
  985. break;
  986. case Oauth:
  987. /* don't allow client to request no auth */
  988. /* could try different auth protocol here */
  989. fprint(2, "ppp: can not reject CHAP\n");
  990. exits("ppp: CHAP");
  991. break;
  992. default:
  993. if(o->type < 8*sizeof(p->optmask))
  994. p->optmask &= ~(1<<o->type);
  995. break;
  996. };
  997. break;
  998. case Pccp:
  999. switch(o->type){
  1000. default:
  1001. dropoption(p, o);
  1002. break;
  1003. }
  1004. break;
  1005. case Pipcp:
  1006. switch(o->type){
  1007. case Oipaddr:
  1008. syslog(0, "ppp", "rejected addr %I with %V", ppp->local, o->data);
  1009. /* if we're a server, don't let other end change our addr */
  1010. if(ppp->localfrozen){
  1011. dropoption(p, o);
  1012. break;
  1013. }
  1014. /* accept whatever server tells us */
  1015. if(!validv4(ppp->local)){
  1016. v4tov6(ppp->local, o->data);
  1017. dropoption(p, o);
  1018. break;
  1019. }
  1020. /* if he didn't like our addr, ask for a generic one */
  1021. v4tov6(newip, o->data);
  1022. if(!validv4(newip)){
  1023. invalidate(ppp->local);
  1024. break;
  1025. }
  1026. /* if he gives us something different, use it anyways */
  1027. v4tov6(ppp->local, o->data);
  1028. dropoption(p, o);
  1029. break;
  1030. case Oipdns:
  1031. if (!validv4(ppp->dns[0])){
  1032. v4tov6(ppp->dns[0], o->data);
  1033. dropoption(p, o);
  1034. break;
  1035. }
  1036. v4tov6(newip, o->data);
  1037. if(!validv4(newip)){
  1038. invalidate(ppp->dns[0]);
  1039. break;
  1040. }
  1041. v4tov6(ppp->dns[0], o->data);
  1042. dropoption(p, o);
  1043. break;
  1044. case Oipwins:
  1045. if (!validv4(ppp->wins[0])){
  1046. v4tov6(ppp->wins[0], o->data);
  1047. dropoption(p, o);
  1048. break;
  1049. }
  1050. v4tov6(newip, o->data);
  1051. if(!validv4(newip)){
  1052. invalidate(ppp->wins[0]);
  1053. break;
  1054. }
  1055. v4tov6(ppp->wins[0], o->data);
  1056. dropoption(p, o);
  1057. break;
  1058. case Oipdns2:
  1059. if (!validv4(ppp->dns[1])){
  1060. v4tov6(ppp->dns[1], o->data);
  1061. dropoption(p, o);
  1062. break;
  1063. }
  1064. v4tov6(newip, o->data);
  1065. if(!validv4(newip)){
  1066. invalidate(ppp->dns[1]);
  1067. break;
  1068. }
  1069. v4tov6(ppp->dns[1], o->data);
  1070. dropoption(p, o);
  1071. break;
  1072. case Oipwins2:
  1073. if (!validv4(ppp->wins[1])){
  1074. v4tov6(ppp->wins[1], o->data);
  1075. dropoption(p, o);
  1076. break;
  1077. }
  1078. v4tov6(newip, o->data);
  1079. if(!validv4(newip)){
  1080. invalidate(ppp->wins[1]);
  1081. break;
  1082. }
  1083. v4tov6(ppp->wins[1], o->data);
  1084. dropoption(p, o);
  1085. break;
  1086. default:
  1087. dropoption(p, o);
  1088. break;
  1089. }
  1090. break;
  1091. }
  1092. }
  1093. }
  1094. /*
  1095. * put a messages through the lcp or ipcp state machine. They are
  1096. * very similar.
  1097. */
  1098. static void
  1099. rcv(PPP *ppp, Pstate *p, Block *b)
  1100. {
  1101. ulong len;
  1102. int err;
  1103. Lcpmsg *m;
  1104. int proto;
  1105. if(BLEN(b) < 4){
  1106. netlog("ppp: short lcp message\n");
  1107. freeb(b);
  1108. return;
  1109. }
  1110. m = (Lcpmsg*)b->rptr;
  1111. len = nhgets(m->len);
  1112. if(BLEN(b) < len){
  1113. netlog("ppp: short lcp message\n");
  1114. freeb(b);
  1115. return;
  1116. }
  1117. netlog("ppp: %ux rcv %d len %ld id %d/%d/%d\n",
  1118. p->proto, m->code, len, m->id, p->confid, p->id);
  1119. if(p->proto != Plcp && ppp->lcp->state != Sopened){
  1120. netlog("ppp: non-lcp with lcp not open\n");
  1121. freeb(b);
  1122. return;
  1123. }
  1124. qlock(ppp);
  1125. switch(m->code){
  1126. case Lconfreq:
  1127. printopts(p, b, 0);
  1128. err = getopts(ppp, p, b);
  1129. if(err < 0)
  1130. break;
  1131. if(m->id == p->rcvdconfid)
  1132. break; /* don't change state for duplicates */
  1133. switch(p->state){
  1134. case Sackrcvd:
  1135. if(err)
  1136. break;
  1137. newstate(ppp, p, Sopened);
  1138. break;
  1139. case Sclosed:
  1140. case Sopened:
  1141. config(ppp, p, 1);
  1142. if(err == 0)
  1143. newstate(ppp, p, Sacksent);
  1144. else
  1145. newstate(ppp, p, Sreqsent);
  1146. break;
  1147. case Sreqsent:
  1148. case Sacksent:
  1149. if(err == 0)
  1150. newstate(ppp, p, Sacksent);
  1151. else
  1152. newstate(ppp, p, Sreqsent);
  1153. break;
  1154. }
  1155. break;
  1156. case Lconfack:
  1157. if(p->confid != m->id){
  1158. /* ignore if it isn't the message we're sending */
  1159. netlog("ppp: dropping confack\n");
  1160. break;
  1161. }
  1162. p->confid = -1; /* ignore duplicates */
  1163. p->id++; /* avoid sending duplicates */
  1164. netlog("ppp: recv confack\n");
  1165. switch(p->state){
  1166. case Sopened:
  1167. case Sackrcvd:
  1168. config(ppp, p, 1);
  1169. newstate(ppp, p, Sreqsent);
  1170. break;
  1171. case Sreqsent:
  1172. newstate(ppp, p, Sackrcvd);
  1173. break;
  1174. case Sacksent:
  1175. newstate(ppp, p, Sopened);
  1176. break;
  1177. }
  1178. break;
  1179. case Lconfrej:
  1180. case Lconfnak:
  1181. if(p->confid != m->id) {
  1182. /* ignore if it isn't the message we're sending */
  1183. netlog("ppp: dropping confrej or confnak\n");
  1184. break;
  1185. }
  1186. p->confid = -1; /* ignore duplicates */
  1187. p->id++; /* avoid sending duplicates */
  1188. switch(p->state){
  1189. case Sopened:
  1190. case Sackrcvd:
  1191. config(ppp, p, 1);
  1192. newstate(ppp, p, Sreqsent);
  1193. break;
  1194. case Sreqsent:
  1195. case Sacksent:
  1196. printopts(p, b, 0);
  1197. rejopts(ppp, p, b, m->code);
  1198. config(ppp, p, 1);
  1199. break;
  1200. }
  1201. break;
  1202. case Ltermreq:
  1203. m->code = Ltermack;
  1204. putframe(ppp, p->proto, b);
  1205. switch(p->state){
  1206. case Sackrcvd:
  1207. case Sacksent:
  1208. newstate(ppp, p, Sreqsent);
  1209. break;
  1210. case Sopened:
  1211. newstate(ppp, p, Sclosing);
  1212. break;
  1213. }
  1214. break;
  1215. case Ltermack:
  1216. if(p->termid != m->id) /* ignore if it isn't the message we're sending */
  1217. break;
  1218. if(p->proto == Plcp)
  1219. ppp->ipcp->state = Sclosed;
  1220. switch(p->state){
  1221. case Sclosing:
  1222. newstate(ppp, p, Sclosed);
  1223. break;
  1224. case Sackrcvd:
  1225. newstate(ppp, p, Sreqsent);
  1226. break;
  1227. case Sopened:
  1228. config(ppp, p, 0);
  1229. newstate(ppp, p, Sreqsent);
  1230. break;
  1231. }
  1232. break;
  1233. case Lcoderej:
  1234. //newstate(ppp, p, Sclosed);
  1235. syslog(0, LOG, "code reject %d\n", m->data[0]);
  1236. break;
  1237. case Lprotorej:
  1238. proto = nhgets(m->data);
  1239. netlog("ppp: proto reject %ux\n", proto);
  1240. if(proto == Pccp)
  1241. newstate(ppp, ppp->ccp, Sclosed);
  1242. break;
  1243. case Lechoreq:
  1244. if(BLEN(b) < 8){
  1245. netlog("ppp: short lcp echo request\n");
  1246. freeb(b);
  1247. return;
  1248. }
  1249. m->code = Lechoack;
  1250. hnputl(m->data, ppp->magic);
  1251. putframe(ppp, p->proto, b);
  1252. break;
  1253. case Lechoack:
  1254. p->echoack = 1;
  1255. break;
  1256. case Ldiscard:
  1257. /* nothing to do */
  1258. break;
  1259. case Lresetreq:
  1260. if(p->proto != Pccp)
  1261. break;
  1262. ppp->stat.compreset++;
  1263. if(ppp->ctype != nil)
  1264. b = (*ppp->ctype->resetreq)(ppp->cstate, b);
  1265. if(b != nil) {
  1266. m = (Lcpmsg*)b->rptr;
  1267. m->code = Lresetack;
  1268. putframe(ppp, p->proto, b);
  1269. }
  1270. break;
  1271. case Lresetack:
  1272. if(p->proto != Pccp)
  1273. break;
  1274. if(ppp->unctype != nil)
  1275. (*ppp->unctype->resetack)(ppp->uncstate, b);
  1276. break;
  1277. }
  1278. qunlock(ppp);
  1279. freeb(b);
  1280. }
  1281. /*
  1282. * timer for protocol state machine
  1283. */
  1284. static void
  1285. ptimer(PPP *ppp, Pstate *p)
  1286. {
  1287. if(p->state == Sopened || p->state == Sclosed)
  1288. return;
  1289. p->timeout--;
  1290. switch(p->state){
  1291. case Sclosing:
  1292. sendtermreq(ppp, p);
  1293. break;
  1294. case Sreqsent:
  1295. case Sacksent:
  1296. if(p->timeout <= 0)
  1297. newstate(ppp, p, Sclosed);
  1298. else {
  1299. config(ppp, p, 0);
  1300. }
  1301. break;
  1302. case Sackrcvd:
  1303. if(p->timeout <= 0)
  1304. newstate(ppp, p, Sclosed);
  1305. else {
  1306. config(ppp, p, 0);
  1307. newstate(ppp, p, Sreqsent);
  1308. }
  1309. break;
  1310. }
  1311. }
  1312. /* paptimer -- pap timer event handler
  1313. *
  1314. * If PAP authorization hasn't come through, resend an authreqst. If
  1315. * the maximum number of requests have been sent (~ 30 seconds), give
  1316. * up.
  1317. *
  1318. */
  1319. static void
  1320. authtimer(PPP* ppp)
  1321. {
  1322. if(ppp->chap->proto != APpasswd)
  1323. return;
  1324. if(ppp->chap->id < 21)
  1325. putpaprequest(ppp);
  1326. else {
  1327. terminate(ppp, 0);
  1328. netlog("ppp: pap timed out--not authorized\n");
  1329. }
  1330. }
  1331. /*
  1332. * timer for ppp
  1333. */
  1334. static void
  1335. ppptimer(PPP *ppp)
  1336. {
  1337. while(!dying){
  1338. sleep(Period);
  1339. qlock(ppp);
  1340. netlog("ppp: ppptimer\n");
  1341. ptimer(ppp, ppp->lcp);
  1342. if(ppp->lcp->state == Sopened) {
  1343. switch(ppp->phase){
  1344. case Pnet:
  1345. ptimer(ppp, ppp->ccp);
  1346. ptimer(ppp, ppp->ipcp);
  1347. break;
  1348. case Pauth:
  1349. authtimer(ppp);
  1350. break;
  1351. }
  1352. }
  1353. /* link quality measurement */
  1354. if(ppp->period && --(ppp->timeout) <= 0){
  1355. ppp->timeout = ppp->period;
  1356. putlqm(ppp);
  1357. }
  1358. qunlock(ppp);
  1359. }
  1360. }
  1361. static void
  1362. setdefroute(char *net, Ipaddr gate)
  1363. {
  1364. int fd;
  1365. char path[128];
  1366. snprint(path, sizeof path, "%s/iproute", net);
  1367. fd = open(path, ORDWR);
  1368. if(fd < 0)
  1369. return;
  1370. fprint(fd, "add 0 0 %I", gate);
  1371. close(fd);
  1372. }
  1373. enum
  1374. {
  1375. Mofd= 32,
  1376. };
  1377. struct
  1378. {
  1379. Lock;
  1380. int fd[Mofd];
  1381. int cfd[Mofd];
  1382. int n;
  1383. } old;
  1384. static char*
  1385. ipopen(PPP *ppp)
  1386. {
  1387. static int ipinprocpid;
  1388. int n, cfd, fd;
  1389. char path[128];
  1390. char buf[128];
  1391. if(ipinprocpid <= 0){
  1392. snprint(path, sizeof path, "%s/ipifc/clone", ppp->net);
  1393. cfd = open(path, ORDWR);
  1394. if(cfd < 0)
  1395. return "can't open ip interface";
  1396. n = read(cfd, buf, sizeof(buf) - 1);
  1397. if(n <= 0){
  1398. close(cfd);
  1399. return "can't open ip interface";
  1400. }
  1401. buf[n] = 0;
  1402. netlog("ppp: setting up IP interface local %I remote %I (valid %d)\n",
  1403. ppp->local, ppp->remote, validv4(ppp->remote));
  1404. if(!validv4(ppp->remote))
  1405. ipmove(ppp->remote, ppp->local);
  1406. snprint(path, sizeof path, "%s/ipifc/%s/data", ppp->net, buf);
  1407. fd = open(path, ORDWR);
  1408. if(fd < 0){
  1409. close(cfd);
  1410. return "can't open ip interface";
  1411. }
  1412. if(fprint(cfd, "bind pkt") < 0)
  1413. return "binding pkt to ip interface";
  1414. if(fprint(cfd, "add %I 255.255.255.255 %I %lud proxy", ppp->local,
  1415. ppp->remote, ppp->mtu-10) < 0){
  1416. close(cfd);
  1417. return "can't set addresses";
  1418. }
  1419. if(primary)
  1420. setdefroute(ppp->net, ppp->remote);
  1421. ppp->ipfd = fd;
  1422. ppp->ipcfd = cfd;
  1423. /* signal main() that ip is configured */
  1424. rendezvous((void*)Rmagic, 0);
  1425. switch(ipinprocpid = rfork(RFPROC|RFMEM|RFNOWAIT)){
  1426. case -1:
  1427. sysfatal("forking ipinproc");
  1428. case 0:
  1429. ipinproc(ppp);
  1430. terminate(ppp, 1);
  1431. _exits(0);
  1432. }
  1433. } else {
  1434. /* we may have changed addresses */
  1435. if(ipcmp(ppp->local, ppp->curlocal) != 0 ||
  1436. ipcmp(ppp->remote, ppp->curremote) != 0){
  1437. snprint(buf, sizeof buf, "remove %I 255.255.255.255 %I",
  1438. ppp->curlocal, ppp->curremote);
  1439. if(fprint(ppp->ipcfd, "%s", buf) < 0)
  1440. syslog(0, "ppp", "can't %s: %r", buf);
  1441. snprint(buf, sizeof buf, "add %I 255.255.255.255 %I %lud proxy",
  1442. ppp->local, ppp->remote, ppp->mtu-10);
  1443. if(fprint(ppp->ipcfd, "%s", buf) < 0)
  1444. syslog(0, "ppp", "can't %s: %r", buf);
  1445. }
  1446. syslog(0, "ppp", "%I/%I -> %I/%I", ppp->curlocal, ppp->curremote,
  1447. ppp->local, ppp->remote);
  1448. }
  1449. ipmove(ppp->curlocal, ppp->local);
  1450. ipmove(ppp->curremote, ppp->remote);
  1451. return nil;
  1452. }
  1453. /* return next input IP packet */
  1454. Block*
  1455. pppread(PPP *ppp)
  1456. {
  1457. Block *b, *reply;
  1458. int proto, len;
  1459. Lcpmsg *m;
  1460. while(!dying){
  1461. b = getframe(ppp, &proto);
  1462. if(b == nil)
  1463. return nil;
  1464. Again:
  1465. switch(proto){
  1466. case Plcp:
  1467. rcv(ppp, ppp->lcp, b);
  1468. break;
  1469. case Pccp:
  1470. rcv(ppp, ppp->ccp, b);
  1471. break;
  1472. case Pipcp:
  1473. rcv(ppp, ppp->ipcp, b);
  1474. break;
  1475. case Pip:
  1476. if(ppp->ipcp->state == Sopened)
  1477. return b;
  1478. netlog("ppp: IP recved: link not up\n");
  1479. freeb(b);
  1480. break;
  1481. case Plqm:
  1482. getlqm(ppp, b);
  1483. break;
  1484. case Pchap:
  1485. getchap(ppp, b);
  1486. break;
  1487. case Ppasswd:
  1488. getpap(ppp, b);
  1489. break;
  1490. case Pvjctcp:
  1491. case Pvjutcp:
  1492. if(ppp->ipcp->state != Sopened){
  1493. netlog("ppp: VJ tcp recved: link not up\n");
  1494. freeb(b);
  1495. break;
  1496. }
  1497. ppp->stat.vjin++;
  1498. b = tcpuncompress(ppp->ctcp, b, proto);
  1499. if(b != nil)
  1500. return b;
  1501. ppp->stat.vjfail++;
  1502. break;
  1503. case Pcdata:
  1504. ppp->stat.uncomp++;
  1505. if(ppp->ccp->state != Sopened){
  1506. netlog("ppp: compressed data recved: link not up\n");
  1507. freeb(b);
  1508. break;
  1509. }
  1510. if(ppp->unctype == nil) {
  1511. netlog("ppp: compressed data recved: no compression\n");
  1512. freeb(b);
  1513. break;
  1514. }
  1515. len = BLEN(b);
  1516. b = (*ppp->unctype->uncompress)(ppp, b, &proto, &reply);
  1517. if(reply != nil){
  1518. /* send resetreq */
  1519. ppp->stat.uncompreset++;
  1520. putframe(ppp, Pccp, reply);
  1521. freeb(reply);
  1522. }
  1523. if(b == nil)
  1524. break;
  1525. ppp->stat.uncompin += len;
  1526. ppp->stat.uncompout += BLEN(b);
  1527. /* netlog("ppp: uncompressed frame %ux %d %d (%d uchars)\n", proto, b->rptr[0], b->rptr[1], BLEN(b)); /* */
  1528. goto Again;
  1529. default:
  1530. syslog(0, LOG, "unknown proto %ux", proto);
  1531. if(ppp->lcp->state == Sopened){
  1532. /* reject the protocol */
  1533. b->rptr -= 6;
  1534. m = (Lcpmsg*)b->rptr;
  1535. m->code = Lprotorej;
  1536. m->id = ++ppp->lcp->id;
  1537. hnputs(m->data, proto);
  1538. hnputs(m->len, BLEN(b));
  1539. putframe(ppp, Plcp, b);
  1540. }
  1541. freeb(b);
  1542. break;
  1543. }
  1544. }
  1545. return nil;
  1546. }
  1547. /* transmit an IP packet */
  1548. int
  1549. pppwrite(PPP *ppp, Block *b)
  1550. {
  1551. int proto;
  1552. int len;
  1553. qlock(ppp);
  1554. /* can't send ip packets till we're established */
  1555. if(ppp->ipcp->state != Sopened) {
  1556. qunlock(ppp);
  1557. syslog(0, LOG, "IP write: link not up");
  1558. len = blen(b);
  1559. freeb(b);
  1560. return len;
  1561. }
  1562. proto = Pip;
  1563. ppp->stat.ipsend++;
  1564. if(ppp->ipcp->flags & Fipcompress){
  1565. b = compress(ppp->ctcp, b, &proto);
  1566. if(b == nil){
  1567. qunlock(ppp);
  1568. return 0;
  1569. }
  1570. if(proto != Pip)
  1571. ppp->stat.vjout++;
  1572. }
  1573. if(ppp->ctype != nil) {
  1574. len = blen(b);
  1575. b = (*ppp->ctype->compress)(ppp, proto, b, &proto);
  1576. if(proto == Pcdata) {
  1577. ppp->stat.comp++;
  1578. ppp->stat.compin += len;
  1579. ppp->stat.compout += blen(b);
  1580. }
  1581. }
  1582. if(putframe(ppp, proto, b) < 0) {
  1583. qunlock(ppp);
  1584. freeb(b);
  1585. return -1;
  1586. }
  1587. qunlock(ppp);
  1588. len = blen(b);
  1589. freeb(b);
  1590. return len;
  1591. }
  1592. static void
  1593. terminate(PPP *ppp, int kill)
  1594. {
  1595. close(ppp->ipfd);
  1596. ppp->ipfd = -1;
  1597. close(ppp->ipcfd);
  1598. ppp->ipcfd = -1;
  1599. close(ppp->mediain);
  1600. close(ppp->mediaout);
  1601. ppp->mediain = -1;
  1602. ppp->mediaout = -1;
  1603. dying = 1;
  1604. if(kill)
  1605. postnote(PNGROUP, getpid(), "die");
  1606. }
  1607. typedef struct Iphdr Iphdr;
  1608. struct Iphdr
  1609. {
  1610. uchar vihl; /* Version and header length */
  1611. uchar tos; /* Type of service */
  1612. uchar length[2]; /* packet length */
  1613. uchar id[2]; /* Identification */
  1614. uchar frag[2]; /* Fragment information */
  1615. uchar ttl; /* Time to live */
  1616. uchar proto; /* Protocol */
  1617. uchar cksum[2]; /* Header checksum */
  1618. uchar src[4]; /* Ip source (uchar ordering unimportant) */
  1619. uchar dst[4]; /* Ip destination (uchar ordering unimportant) */
  1620. };
  1621. static void
  1622. ipinproc(PPP *ppp)
  1623. {
  1624. Block *b;
  1625. int m, n;
  1626. Iphdr *ip;
  1627. while(!dying){
  1628. b = allocb(Buflen);
  1629. n = read(ppp->ipfd, b->wptr, b->lim-b->wptr);
  1630. if(n < 0)
  1631. break;
  1632. /* trim packet if there's padding (e.g. from ether) */
  1633. ip = (Iphdr*)b->rptr;
  1634. m = nhgets(ip->length);
  1635. if(m < n && m > 0)
  1636. n = m;
  1637. b->wptr += n;
  1638. if(pppwrite(ppp, b) < 0)
  1639. break;
  1640. }
  1641. }
  1642. static void
  1643. catchdie(void*, char *msg)
  1644. {
  1645. if(strstr(msg, "die") != nil)
  1646. noted(NCONT);
  1647. else
  1648. noted(NDFLT);
  1649. }
  1650. static void
  1651. hexdump(uchar *a, int na)
  1652. {
  1653. int i;
  1654. char buf[80];
  1655. fprint(2, "dump %p %d\n", a, na);
  1656. buf[0] = '\0';
  1657. for(i=0; i<na; i++){
  1658. sprint(buf+strlen(buf), " %.2ux", a[i]);
  1659. if(i%16 == 7)
  1660. sprint(buf+strlen(buf), " --");
  1661. if(i%16==15){
  1662. sprint(buf+strlen(buf), "\n");
  1663. write(2, buf, strlen(buf));
  1664. buf[0] = '\0';
  1665. }
  1666. }
  1667. if(i%16){
  1668. sprint(buf+strlen(buf), "\n");
  1669. write(2, buf, strlen(buf));
  1670. }
  1671. }
  1672. static void
  1673. mediainproc(PPP *ppp)
  1674. {
  1675. Block *b;
  1676. Ipaddr remote;
  1677. notify(catchdie);
  1678. while(!dying){
  1679. b = pppread(ppp);
  1680. if(b == nil){
  1681. syslog(0, LOG, "pppread return nil");
  1682. break;
  1683. }
  1684. ppp->stat.iprecv++;
  1685. if(ppp->ipcp->state != Sopened) {
  1686. ppp->stat.iprecvnotup++;
  1687. freeb(b);
  1688. continue;
  1689. }
  1690. if(server) {
  1691. v4tov6(remote, b->rptr+12);
  1692. if(ipcmp(remote, ppp->remote) != 0) {
  1693. ppp->stat.iprecvbadsrc++;
  1694. freeb(b);
  1695. continue;
  1696. }
  1697. }
  1698. if(debug > 1){
  1699. netlog("ip write pkt %p %d\n", b->rptr, blen(b));
  1700. hexdump(b->rptr, blen(b));
  1701. }
  1702. if(write(ppp->ipfd, b->rptr, blen(b)) < 0) {
  1703. syslog(0, LOG, "error writing to pktifc");
  1704. freeb(b);
  1705. break;
  1706. }
  1707. freeb(b);
  1708. }
  1709. netlog(": remote=%I: ppp shutting down\n", ppp->remote);
  1710. syslog(0, LOG, ": remote=%I: ppp shutting down", ppp->remote);
  1711. syslog(0, LOG, "\t\tppp send = %lud/%lud recv= %lud/%lud",
  1712. ppp->out.packets, ppp->out.uchars,
  1713. ppp->in.packets, ppp->in.uchars);
  1714. syslog(0, LOG, "\t\tip send=%lud", ppp->stat.ipsend);
  1715. syslog(0, LOG, "\t\tip recv=%lud notup=%lud badsrc=%lud",
  1716. ppp->stat.iprecv, ppp->stat.iprecvnotup, ppp->stat.iprecvbadsrc);
  1717. syslog(0, LOG, "\t\tcompress=%lud in=%lud out=%lud reset=%lud",
  1718. ppp->stat.comp, ppp->stat.compin, ppp->stat.compout, ppp->stat.compreset);
  1719. syslog(0, LOG, "\t\tuncompress=%lud in=%lud out=%lud reset=%lud",
  1720. ppp->stat.uncomp, ppp->stat.uncompin, ppp->stat.uncompout,
  1721. ppp->stat.uncompreset);
  1722. syslog(0, LOG, "\t\tvjin=%lud vjout=%lud vjfail=%lud",
  1723. ppp->stat.vjin, ppp->stat.vjout, ppp->stat.vjfail);
  1724. }
  1725. /*
  1726. * link quality management
  1727. */
  1728. static void
  1729. getlqm(PPP *ppp, Block *b)
  1730. {
  1731. Qualpkt *p;
  1732. p = (Qualpkt*)b->rptr;
  1733. if(BLEN(b) == sizeof(Qualpkt)){
  1734. ppp->in.reports++;
  1735. ppp->pout.reports = nhgetl(p->peeroutreports);
  1736. ppp->pout.packets = nhgetl(p->peeroutpackets);
  1737. ppp->pout.uchars = nhgetl(p->peeroutuchars);
  1738. ppp->pin.reports = nhgetl(p->peerinreports);
  1739. ppp->pin.packets = nhgetl(p->peerinpackets);
  1740. ppp->pin.discards = nhgetl(p->peerindiscards);
  1741. ppp->pin.errors = nhgetl(p->peerinerrors);
  1742. ppp->pin.uchars = nhgetl(p->peerinuchars);
  1743. /* save our numbers at time of reception */
  1744. memmove(&ppp->sin, &ppp->in, sizeof(Qualstats));
  1745. }
  1746. freeb(b);
  1747. if(ppp->period == 0)
  1748. putlqm(ppp);
  1749. }
  1750. static void
  1751. putlqm(PPP *ppp)
  1752. {
  1753. Qualpkt *p;
  1754. Block *b;
  1755. b = allocb(sizeof(Qualpkt));
  1756. b->wptr += sizeof(Qualpkt);
  1757. p = (Qualpkt*)b->rptr;
  1758. hnputl(p->magic, 0);
  1759. /* heresay (what he last told us) */
  1760. hnputl(p->lastoutreports, ppp->pout.reports);
  1761. hnputl(p->lastoutpackets, ppp->pout.packets);
  1762. hnputl(p->lastoutuchars, ppp->pout.uchars);
  1763. /* our numbers at time of last reception */
  1764. hnputl(p->peerinreports, ppp->sin.reports);
  1765. hnputl(p->peerinpackets, ppp->sin.packets);
  1766. hnputl(p->peerindiscards, ppp->sin.discards);
  1767. hnputl(p->peerinerrors, ppp->sin.errors);
  1768. hnputl(p->peerinuchars, ppp->sin.uchars);
  1769. /* our numbers now */
  1770. hnputl(p->peeroutreports, ppp->out.reports+1);
  1771. hnputl(p->peeroutpackets, ppp->out.packets+1);
  1772. hnputl(p->peeroutuchars, ppp->out.uchars+53/*hack*/);
  1773. putframe(ppp, Plqm, b);
  1774. freeb(b);
  1775. ppp->out.reports++;
  1776. }
  1777. /*
  1778. * init challenge response dialog
  1779. */
  1780. static void
  1781. chapinit(PPP *ppp)
  1782. {
  1783. Block *b;
  1784. Lcpmsg *m;
  1785. Chap *c;
  1786. int len;
  1787. char *aproto;
  1788. getauth(ppp);
  1789. c = ppp->chap;
  1790. c->id++;
  1791. switch(c->proto){
  1792. default:
  1793. abort();
  1794. case APmd5:
  1795. aproto = "chap";
  1796. break;
  1797. case APmschap:
  1798. aproto = "mschap";
  1799. break;
  1800. }
  1801. if((c->cs = auth_challenge("proto=%q role=server", aproto)) == nil)
  1802. sysfatal("auth_challenge: %r");
  1803. syslog(0, LOG, ": remote=%I: sending %d byte challenge", ppp->remote, c->cs->nchal);
  1804. len = 4 + 1 + c->cs->nchal + strlen(ppp->chapname);
  1805. b = alloclcp(Cchallenge, c->id, len, &m);
  1806. *b->wptr++ = c->cs->nchal;
  1807. memmove(b->wptr, c->cs->chal, c->cs->nchal);
  1808. b->wptr += c->cs->nchal;
  1809. memmove(b->wptr, ppp->chapname, strlen(ppp->chapname));
  1810. b->wptr += strlen(ppp->chapname);
  1811. hnputs(m->len, len);
  1812. putframe(ppp, Pchap, b);
  1813. freeb(b);
  1814. c->state = Cchalsent;
  1815. }
  1816. /*
  1817. * BUG factotum should do this
  1818. */
  1819. enum {
  1820. MShashlen = 16,
  1821. MSresplen = 24,
  1822. MSchallen = 8,
  1823. };
  1824. void
  1825. desencrypt(uchar data[8], uchar key[7])
  1826. {
  1827. ulong ekey[32];
  1828. key_setup(key, ekey);
  1829. block_cipher(ekey, data, 0);
  1830. }
  1831. void
  1832. nthash(uchar hash[MShashlen], char *passwd)
  1833. {
  1834. uchar buf[512];
  1835. int i;
  1836. for(i=0; *passwd && i<sizeof(buf); passwd++) {
  1837. buf[i++] = *passwd;
  1838. buf[i++] = 0;
  1839. }
  1840. memset(hash, 0, 16);
  1841. md4(buf, i, hash, 0);
  1842. }
  1843. void
  1844. mschalresp(uchar resp[MSresplen], uchar hash[MShashlen], uchar chal[MSchallen])
  1845. {
  1846. int i;
  1847. uchar buf[21];
  1848. memset(buf, 0, sizeof(buf));
  1849. memcpy(buf, hash, MShashlen);
  1850. for(i=0; i<3; i++) {
  1851. memmove(resp+i*MSchallen, chal, MSchallen);
  1852. desencrypt(resp+i*MSchallen, buf+i*7);
  1853. }
  1854. }
  1855. /*
  1856. * challenge response dialog
  1857. */
  1858. extern int _asrdresp(int, uchar*, int);
  1859. static void
  1860. getchap(PPP *ppp, Block *b)
  1861. {
  1862. AuthInfo *ai;
  1863. Lcpmsg *m;
  1864. int len, vlen, i, id, n, nresp;
  1865. char md5buf[512], code;
  1866. Chap *c;
  1867. Chapreply cr;
  1868. MSchapreply mscr;
  1869. char uid[PATH];
  1870. uchar digest[16], *p, *resp, sdigest[SHA1dlen];
  1871. uchar mshash[MShashlen], mshash2[MShashlen];
  1872. DigestState *s;
  1873. uchar msresp[2*MSresplen+1];
  1874. m = (Lcpmsg*)b->rptr;
  1875. len = nhgets(m->len);
  1876. if(BLEN(b) < len){
  1877. syslog(0, LOG, "short chap message");
  1878. freeb(b);
  1879. return;
  1880. }
  1881. qlock(ppp);
  1882. switch(m->code){
  1883. case Cchallenge:
  1884. getauth(ppp);
  1885. vlen = m->data[0];
  1886. if(vlen > len - 5) {
  1887. netlog("PPP: chap: bad challenge len\n");
  1888. break;
  1889. }
  1890. id = m->id;
  1891. switch(ppp->chap->proto){
  1892. default:
  1893. abort();
  1894. case APmd5:
  1895. md5buf[0] = m->id;
  1896. strcpy(md5buf+1, ppp->secret);
  1897. n = strlen(ppp->secret) + 1;
  1898. memmove(md5buf+n, m->data+1, vlen);
  1899. n += vlen;
  1900. md5((uchar*)md5buf, n, digest, nil);
  1901. resp = digest;
  1902. nresp = 16;
  1903. break;
  1904. case APmschap:
  1905. nthash(mshash, ppp->secret);
  1906. memset(msresp, 0, sizeof msresp);
  1907. mschalresp(msresp+MSresplen, mshash, m->data+1);
  1908. resp = msresp;
  1909. nresp = sizeof msresp;
  1910. nthash(mshash, ppp->secret);
  1911. md4(mshash, 16, mshash2, 0);
  1912. s = sha1(mshash2, 16, 0, 0);
  1913. sha1(mshash2, 16, 0, s);
  1914. sha1(m->data+1, 8, sdigest, s);
  1915. memmove(ppp->key, sdigest, 16);
  1916. break;
  1917. }
  1918. len = 4 + 1 + nresp + strlen(ppp->chapname);
  1919. freeb(b);
  1920. b = alloclcp(Cresponse, id, len, &m);
  1921. *b->wptr++ = nresp;
  1922. memmove(b->wptr, resp, nresp);
  1923. b->wptr += nresp;
  1924. memmove(b->wptr, ppp->chapname, strlen(ppp->chapname));
  1925. b->wptr += strlen(ppp->chapname);
  1926. hnputs(m->len, len);
  1927. netlog("PPP: sending response len %d\n", len);
  1928. putframe(ppp, Pchap, b);
  1929. break;
  1930. case Cresponse:
  1931. c = ppp->chap;
  1932. vlen = m->data[0];
  1933. if(m->id != c->id) {
  1934. netlog("PPP: chap: bad response id\n");
  1935. break;
  1936. }
  1937. switch(c->proto) {
  1938. default:
  1939. sysfatal("unknown chap protocol: %d", c->proto);
  1940. case APmd5:
  1941. if(vlen > len - 5 || vlen != 16) {
  1942. netlog("PPP: chap: bad response len\n");
  1943. break;
  1944. }
  1945. cr.id = m->id;
  1946. memmove(cr.resp, m->data+1, 16);
  1947. memset(uid, 0, sizeof(uid));
  1948. n = len-5-vlen;
  1949. if(n >= PATH)
  1950. n = PATH-1;
  1951. memmove(uid, m->data+1+vlen, n);
  1952. c->cs->user = uid;
  1953. c->cs->resp = &cr;
  1954. c->cs->nresp = sizeof cr;
  1955. break;
  1956. case APmschap:
  1957. if(vlen > len - 5 || vlen != 49) {
  1958. netlog("PPP: chap: bad response len\n");
  1959. break;
  1960. }
  1961. memset(&mscr, 0, sizeof(mscr));
  1962. memmove(mscr.LMresp, m->data+1, 24);
  1963. memmove(mscr.NTresp, m->data+24+1, 24);
  1964. n = len-5-vlen;
  1965. p = m->data+1+vlen;
  1966. /* remove domain name */
  1967. for(i=0; i<n; i++) {
  1968. if(p[i] == '\\') {
  1969. p += i+1;
  1970. n -= i+1;
  1971. break;
  1972. }
  1973. }
  1974. if(n >= PATH)
  1975. n = PATH-1;
  1976. memset(uid, 0, sizeof(uid));
  1977. memmove(uid, p, n);
  1978. c->cs->user = uid;
  1979. c->cs->resp = &mscr;
  1980. c->cs->nresp = sizeof mscr;
  1981. break;
  1982. }
  1983. syslog(0, LOG, ": remote=%I vlen %d proto %d response user %s nresp %d", ppp->remote, vlen, c->proto, c->cs->user, c->cs->nresp);
  1984. if((ai = auth_response(c->cs)) == nil || auth_chuid(ai, nil) < 0){
  1985. c->state = Cunauth;
  1986. code = Cfailure;
  1987. syslog(0, LOG, ": remote=%I: auth failed: %r, uid=%s", ppp->remote, uid);
  1988. }else{
  1989. c->state = Cauthok;
  1990. code = Csuccess;
  1991. syslog(0, LOG, ": remote=%I: auth ok: uid=%s nsecret=%d", ppp->remote, uid, ai->nsecret);
  1992. if(c->proto == APmschap){
  1993. if(ai->nsecret != sizeof(ppp->key))
  1994. sysfatal("could not get the encryption key");
  1995. memmove(ppp->key, ai->secret, sizeof(ppp->key));
  1996. }
  1997. }
  1998. auth_freeAI(ai);
  1999. auth_freechal(c->cs);
  2000. c->cs = nil;
  2001. freeb(b);
  2002. /* send reply */
  2003. len = 4;
  2004. b = alloclcp(code, c->id, len, &m);
  2005. hnputs(m->len, len);
  2006. putframe(ppp, Pchap, b);
  2007. if(c->state == Cauthok) {
  2008. setphase(ppp, Pnet);
  2009. } else {
  2010. /* restart chapp negotiation */
  2011. chapinit(ppp);
  2012. }
  2013. break;
  2014. case Csuccess:
  2015. netlog("ppp: chap succeeded\n");
  2016. break;
  2017. case Cfailure:
  2018. netlog("ppp: chap failed\n");
  2019. break;
  2020. default:
  2021. syslog(0, LOG, "chap code %d?\n", m->code);
  2022. break;
  2023. }
  2024. qunlock(ppp);
  2025. freeb(b);
  2026. }
  2027. static void
  2028. putpaprequest(PPP *ppp)
  2029. {
  2030. Block *b;
  2031. Lcpmsg *m;
  2032. Chap *c;
  2033. int len, nlen, slen;
  2034. getauth(ppp);
  2035. c = ppp->chap;
  2036. c->id++;
  2037. netlog("PPP: pap: send authreq %d %s %s\n", c->id, ppp->chapname, "****");
  2038. nlen = strlen(ppp->chapname);
  2039. slen = strlen(ppp->secret);
  2040. len = 4 + 1 + nlen + 1 + slen;
  2041. b = alloclcp(Pauthreq, c->id, len, &m);
  2042. *b->wptr++ = nlen;
  2043. memmove(b->wptr, ppp->chapname, nlen);
  2044. b->wptr += nlen;
  2045. *b->wptr++ = slen;
  2046. memmove(b->wptr, ppp->secret, slen);
  2047. b->wptr += slen;
  2048. hnputs(m->len, len);
  2049. putframe(ppp, Ppasswd, b);
  2050. freeb(b);
  2051. }
  2052. static void
  2053. papinit(PPP *ppp)
  2054. {
  2055. ppp->chap->id = 0;
  2056. putpaprequest(ppp);
  2057. }
  2058. static void
  2059. getpap(PPP *ppp, Block *b)
  2060. {
  2061. Lcpmsg *m;
  2062. int len;
  2063. m = (Lcpmsg*)b->rptr;
  2064. len = 4;
  2065. if(BLEN(b) < 4 || BLEN(b) < (len = nhgets(m->len))){
  2066. syslog(0, LOG, "short pap message (%ld < %d)", BLEN(b), len);
  2067. freeb(b);
  2068. return;
  2069. }
  2070. if(len < sizeof(Lcpmsg))
  2071. m->data[0] = 0;
  2072. qlock(ppp);
  2073. switch(m->code){
  2074. case Pauthreq:
  2075. netlog("PPP: pap auth request, not supported\n");
  2076. break;
  2077. case Pauthack:
  2078. if(ppp->phase == Pauth
  2079. && ppp->chap->proto == APpasswd
  2080. && m->id <= ppp-> chap->id){
  2081. netlog("PPP: pap succeeded\n");
  2082. setphase(ppp, Pnet);
  2083. }
  2084. break;
  2085. case Pauthnak:
  2086. if(ppp->phase == Pauth
  2087. && ppp->chap->proto == APpasswd
  2088. && m->id <= ppp-> chap->id){
  2089. netlog("PPP: pap failed (%d:%.*s)\n",
  2090. m->data[0], m->data[0], (char*)m->data+1);
  2091. terminate(ppp, 0);
  2092. }
  2093. break;
  2094. default:
  2095. netlog("PPP: unknown pap messsage %d\n", m->code);
  2096. }
  2097. qunlock(ppp);
  2098. freeb(b);
  2099. }
  2100. static void
  2101. printopts(Pstate *p, Block *b, int send)
  2102. {
  2103. Lcpmsg *m;
  2104. Lcpopt *o;
  2105. int proto, x, period;
  2106. uchar *cp;
  2107. char *code, *dir;
  2108. m = (Lcpmsg*)b->rptr;
  2109. switch(m->code) {
  2110. default: code = "<unknown>"; break;
  2111. case Lconfreq: code = "confrequest"; break;
  2112. case Lconfack: code = "confack"; break;
  2113. case Lconfnak: code = "confnak"; break;
  2114. case Lconfrej: code = "confreject"; break;
  2115. }
  2116. if(send)
  2117. dir = "send";
  2118. else
  2119. dir = "recv";
  2120. netlog("ppp: %s %s: id=%d\n", dir, code, m->id);
  2121. for(cp = m->data; cp < b->wptr; cp += o->len){
  2122. o = (Lcpopt*)cp;
  2123. if(cp + o->len > b->wptr){
  2124. netlog("\tbad option length %ux\n", o->type);
  2125. return;
  2126. }
  2127. switch(p->proto){
  2128. case Plcp:
  2129. switch(o->type){
  2130. default:
  2131. netlog("\tunknown %d len=%d\n", o->type, o->len);
  2132. break;
  2133. case Omtu:
  2134. netlog("\tmtu = %d\n", nhgets(o->data));
  2135. break;
  2136. case Octlmap:
  2137. netlog("\tctlmap = %ux\n", nhgetl(o->data));
  2138. break;
  2139. case Oauth:
  2140. netlog("\tauth = %ux", nhgetl(o->data));
  2141. proto = nhgets(o->data);
  2142. switch(proto) {
  2143. default:
  2144. netlog("unknown auth proto %d\n", proto);
  2145. break;
  2146. case Ppasswd:
  2147. netlog("password\n");
  2148. break;
  2149. case Pchap:
  2150. netlog("chap %ux\n", o->data[2]);
  2151. break;
  2152. }
  2153. break;
  2154. case Oquality:
  2155. proto = nhgets(o->data);
  2156. switch(proto) {
  2157. default:
  2158. netlog("\tunknown quality proto %d\n", proto);
  2159. break;
  2160. case Plqm:
  2161. x = nhgetl(o->data+2)*10;
  2162. period = (x+Period-1)/Period;
  2163. netlog("\tlqm period = %d\n", period);
  2164. break;
  2165. }
  2166. case Omagic:
  2167. netlog("\tmagic = %ux\n", nhgetl(o->data));
  2168. break;
  2169. case Opc:
  2170. netlog("\tprotocol compress\n");
  2171. break;
  2172. case Oac:
  2173. netlog("\taddr compress\n");
  2174. break;
  2175. }
  2176. break;
  2177. case Pccp:
  2178. switch(o->type){
  2179. default:
  2180. netlog("\tunknown %d len=%d\n", o->type, o->len);
  2181. break;
  2182. case Ocoui:
  2183. netlog("\tOUI\n");
  2184. break;
  2185. case Ocstac:
  2186. netlog("\tstac LZS\n");
  2187. break;
  2188. case Ocmppc:
  2189. netlog("\tMicrosoft PPC len=%d %ux\n", o->len, nhgetl(o->data));
  2190. break;
  2191. case Octhwack:
  2192. netlog("\tThwack\n");
  2193. break;
  2194. }
  2195. break;
  2196. case Pecp:
  2197. switch(o->type){
  2198. default:
  2199. netlog("\tunknown %d len=%d\n", o->type, o->len);
  2200. break;
  2201. case Oeoui:
  2202. netlog("\tOUI\n");
  2203. break;
  2204. case Oedese:
  2205. netlog("\tDES\n");
  2206. break;
  2207. }
  2208. break;
  2209. case Pipcp:
  2210. switch(o->type){
  2211. default:
  2212. netlog("\tunknown %d len=%d\n", o->type, o->len);
  2213. break;
  2214. case Oipaddrs:
  2215. netlog("\tip addrs - deprecated\n");
  2216. break;
  2217. case Oipcompress:
  2218. netlog("\tip compress\n");
  2219. break;
  2220. case Oipaddr:
  2221. netlog("\tip addr %V\n", o->data);
  2222. break;
  2223. case Oipdns:
  2224. netlog("\tdns addr %V\n", o->data);
  2225. break;
  2226. case Oipwins:
  2227. netlog("\twins addr %V\n", o->data);
  2228. break;
  2229. case Oipdns2:
  2230. netlog("\tdns2 addr %V\n", o->data);
  2231. break;
  2232. case Oipwins2:
  2233. netlog("\twins2 addr %V\n", o->data);
  2234. break;
  2235. }
  2236. break;
  2237. }
  2238. }
  2239. }
  2240. static void
  2241. sendtermreq(PPP *ppp, Pstate *p)
  2242. {
  2243. Block *b;
  2244. Lcpmsg *m;
  2245. p->termid = ++(p->id);
  2246. b = alloclcp(Ltermreq, p->termid, 4, &m);
  2247. hnputs(m->len, 4);
  2248. putframe(ppp, p->proto, b);
  2249. freeb(b);
  2250. newstate(ppp, p, Sclosing);
  2251. }
  2252. static void
  2253. sendechoreq(PPP *ppp, Pstate *p)
  2254. {
  2255. Block *b;
  2256. Lcpmsg *m;
  2257. p->termid = ++(p->id);
  2258. b = alloclcp(Lechoreq, p->id, 4, &m);
  2259. hnputs(m->len, 4);
  2260. putframe(ppp, p->proto, b);
  2261. freeb(b);
  2262. }
  2263. enum
  2264. {
  2265. CtrlD = 0x4,
  2266. CtrlE = 0x5,
  2267. CtrlO = 0xf,
  2268. Cr = 13,
  2269. View = 0x80,
  2270. };
  2271. int conndone;
  2272. static void
  2273. xfer(int fd)
  2274. {
  2275. int i, n;
  2276. uchar xbuf[128];
  2277. for(;;) {
  2278. n = read(fd, xbuf, sizeof(xbuf));
  2279. if(n < 0)
  2280. break;
  2281. if(conndone)
  2282. break;
  2283. for(i = 0; i < n; i++)
  2284. if(xbuf[i] == Cr)
  2285. xbuf[i] = ' ';
  2286. write(1, xbuf, n);
  2287. }
  2288. close(fd);
  2289. }
  2290. static int
  2291. readcr(int fd, char *buf, int nbuf)
  2292. {
  2293. char c;
  2294. int n, tot;
  2295. tot = 0;
  2296. while((n=read(fd, &c, 1)) == 1){
  2297. if(c == '\n'){
  2298. buf[tot] = 0;
  2299. return tot;
  2300. }
  2301. buf[tot++] = c;
  2302. if(tot == nbuf)
  2303. sysfatal("line too long in readcr");
  2304. }
  2305. return n;
  2306. }
  2307. static void
  2308. connect(int fd, int cfd)
  2309. {
  2310. int n, ctl;
  2311. char xbuf[128];
  2312. if (chatfile) {
  2313. int chatfd, lineno, nb;
  2314. char *buf, *p, *s, response[128];
  2315. Dir *dir;
  2316. if ((chatfd = open(chatfile, OREAD)) < 0)
  2317. sysfatal("cannot open %s: %r", chatfile);
  2318. if ((dir = dirfstat(chatfd)) == nil)
  2319. sysfatal("cannot fstat %s: %r",chatfile);
  2320. buf = (char *)malloc(dir->length + 1);
  2321. assert(buf);
  2322. if ((nb = read(chatfd, buf, dir->length)) < 0)
  2323. sysfatal("cannot read chatfile %s: %r", chatfile);
  2324. assert(nb == dir->length);
  2325. buf[dir->length] = '\0';
  2326. free(dir);
  2327. close(chatfd);
  2328. p = buf;
  2329. lineno = 0;
  2330. for(;;) {
  2331. char *_args[3];
  2332. if ((s = strchr(p, '\n')) == nil)
  2333. break;
  2334. *s++ = '\0';
  2335. lineno++;
  2336. if (*p == '#') {
  2337. p = s;
  2338. continue;
  2339. }
  2340. if (tokenize(p, _args, 3) != 2)
  2341. sysfatal("invalid line %d (line expected: 'send' 'expect')",
  2342. lineno);
  2343. if (debug)
  2344. print("sending %s, expecting %s\n", _args[0], _args[1]);
  2345. if(strlen(_args[0])){
  2346. nb = fprint(fd, "%s\r", _args[0]);
  2347. assert(nb > 0);
  2348. }
  2349. if (strlen(_args[1]) > 0) {
  2350. if ((nb = readcr(fd, response, sizeof response-1)) < 0)
  2351. sysfatal("cannot read response from: %r");
  2352. if (debug)
  2353. print("response %s\n", response);
  2354. if (nb == 0)
  2355. sysfatal("eof on input?\n");
  2356. if (cistrstr(response, _args[1]) == nil)
  2357. sysfatal("expected %s, got %s\n", _args[1], response);
  2358. }
  2359. p = s;
  2360. }
  2361. free(buf);
  2362. return;
  2363. }
  2364. print("Connect to file system now, type ctrl-d when done.\n");
  2365. print("...(Use the view or down arrow key to send a break)\n");
  2366. print("...(Use ctrl-e to set even parity or ctrl-o for odd)\n");
  2367. ctl = open("/dev/consctl", OWRITE);
  2368. if(ctl < 0)
  2369. sysfatal("opening consctl");
  2370. fprint(ctl, "rawon");
  2371. fd = dup(fd, -1);
  2372. conndone = 0;
  2373. switch(rfork(RFPROC|RFMEM|RFNOWAIT)){
  2374. case -1:
  2375. sysfatal("forking xfer");
  2376. case 0:
  2377. xfer(fd);
  2378. _exits(nil);
  2379. }
  2380. for(;;){
  2381. read(0, xbuf, 1);
  2382. switch(xbuf[0]&0xff) {
  2383. case CtrlD: /* done */
  2384. conndone = 1;
  2385. close(ctl);
  2386. print("\n");
  2387. return;
  2388. case CtrlE: /* set even parity */
  2389. fprint(cfd, "pe");
  2390. break;
  2391. case CtrlO: /* set odd parity */
  2392. fprint(cfd, "po");
  2393. break;
  2394. case View: /* send a break */
  2395. fprint(cfd, "k500");
  2396. break;
  2397. default:
  2398. n = write(fd, xbuf, 1);
  2399. if(n < 0) {
  2400. errstr(xbuf, sizeof(xbuf));
  2401. conndone = 1;
  2402. close(ctl);
  2403. print("[remote write error (%s)]\n", xbuf);
  2404. return;
  2405. }
  2406. }
  2407. }
  2408. }
  2409. int interactive;
  2410. void
  2411. usage(void)
  2412. {
  2413. fprint(2, "usage: ppp [-cCdfPSu] [-b baud] [-k keyspec] [-m mtu] [-p dev] [-s username] [-x netmntpt] [-t modemcmd] [local-addr [remote-addr]]\n");
  2414. exits("usage");
  2415. }
  2416. void
  2417. main(int argc, char **argv)
  2418. {
  2419. int mtu, baud, framing, user, mediain, mediaout, cfd;
  2420. Ipaddr ipaddr, remip;
  2421. char *dev, *modemcmd;
  2422. char net[128];
  2423. PPP *ppp;
  2424. char buf[128];
  2425. rfork(RFREND|RFNOTEG|RFNAMEG);
  2426. fmtinstall('I', eipfmt);
  2427. fmtinstall('V', eipfmt);
  2428. fmtinstall('E', eipfmt);
  2429. dev = nil;
  2430. invalidate(ipaddr);
  2431. invalidate(remip);
  2432. mtu = Defmtu;
  2433. baud = 0;
  2434. framing = 0;
  2435. setnetmtpt(net, sizeof(net), nil);
  2436. user = 0;
  2437. modemcmd = nil;
  2438. ARGBEGIN{
  2439. case 'b':
  2440. baud = atoi(EARGF(usage()));
  2441. if(baud < 0)
  2442. baud = 0;
  2443. break;
  2444. case 'c':
  2445. nocompress = 1;
  2446. break;
  2447. case 'C':
  2448. noipcompress = 1;
  2449. break;
  2450. case 'd':
  2451. debug++;
  2452. break;
  2453. case 'f':
  2454. framing = 1;
  2455. break;
  2456. case 'F':
  2457. pppframing = 0;
  2458. break;
  2459. case 'k':
  2460. keyspec = EARGF(usage());
  2461. break;
  2462. case 'm':
  2463. mtu = atoi(EARGF(usage()));
  2464. if(mtu < Minmtu)
  2465. mtu = Minmtu;
  2466. if(mtu > Maxmtu)
  2467. mtu = Maxmtu;
  2468. break;
  2469. case 'M':
  2470. chatfile = EARGF(usage());
  2471. break;
  2472. case 'p':
  2473. dev = EARGF(usage());
  2474. break;
  2475. case 'P':
  2476. primary = 1;
  2477. break;
  2478. case 'S':
  2479. server = 1;
  2480. break;
  2481. case 't':
  2482. modemcmd = EARGF(usage());
  2483. break;
  2484. case 'u':
  2485. user = 1;
  2486. break;
  2487. case 'x':
  2488. setnetmtpt(net, sizeof net, EARGF(usage()));
  2489. break;
  2490. default:
  2491. fprint(2, "unknown option %c\n", ARGC());
  2492. usage();
  2493. }ARGEND;
  2494. switch(argc){
  2495. case 2:
  2496. if (parseip(remip, argv[1]) == -1)
  2497. sysfatal("bad remote ip %s", argv[1]);
  2498. case 1:
  2499. if (parseip(ipaddr, argv[0]) == -1)
  2500. sysfatal("bad ip %s", argv[0]);
  2501. case 0:
  2502. break;
  2503. default:
  2504. usage();
  2505. }
  2506. nip = nipifcs(net);
  2507. if(nip == 0 && !server)
  2508. primary = 1;
  2509. if(dev != nil){
  2510. mediain = open(dev, ORDWR);
  2511. if(mediain < 0){
  2512. if(strchr(dev, '!')){
  2513. if((mediain = dial(dev, 0, 0, &cfd)) == -1){
  2514. fprint(2, "ppp: couldn't dial %s: %r\n", dev);
  2515. exits(dev);
  2516. }
  2517. } else {
  2518. fprint(2, "ppp: couldn't open %s\n", dev);
  2519. exits(dev);
  2520. }
  2521. } else {
  2522. snprint(buf, sizeof buf, "%sctl", dev);
  2523. cfd = open(buf, ORDWR);
  2524. }
  2525. if(cfd > 0){
  2526. if(baud)
  2527. fprint(cfd, "b%d", baud);
  2528. fprint(cfd, "m1"); /* cts/rts flow control (and fifo's) on */
  2529. fprint(cfd, "q64000"); /* increase q size to 64k */
  2530. fprint(cfd, "n1"); /* nonblocking writes on */
  2531. fprint(cfd, "r1"); /* rts on */
  2532. fprint(cfd, "d1"); /* dtr on */
  2533. fprint(cfd, "c1"); /* dcdhup on */
  2534. if(user || chatfile)
  2535. connect(mediain, cfd);
  2536. close(cfd);
  2537. } else {
  2538. if(user || chatfile)
  2539. connect(mediain, -1);
  2540. }
  2541. mediaout = mediain;
  2542. } else {
  2543. mediain = open("/fd/0", OREAD);
  2544. if(mediain < 0){
  2545. fprint(2, "ppp: couldn't open /fd/0\n");
  2546. exits("/fd/0");
  2547. }
  2548. mediaout = open("/fd/1", OWRITE);
  2549. if(mediaout < 0){
  2550. fprint(2, "ppp: couldn't open /fd/0\n");
  2551. exits("/fd/1");
  2552. }
  2553. }
  2554. if(modemcmd != nil && mediaout >= 0)
  2555. fprint(mediaout, "%s\r", modemcmd);
  2556. ppp = mallocz(sizeof(*ppp), 1);
  2557. pppopen(ppp, mediain, mediaout, net, ipaddr, remip, mtu, framing);
  2558. /* wait until ip is configured */
  2559. rendezvous((void*)Rmagic, 0);
  2560. if(primary){
  2561. /* create a /net/ndb entry */
  2562. putndb(ppp, net);
  2563. }
  2564. exits(0);
  2565. }
  2566. void
  2567. netlog(char *fmt, ...)
  2568. {
  2569. va_list arg;
  2570. char *m;
  2571. static long start;
  2572. long now;
  2573. if(debug == 0)
  2574. return;
  2575. now = time(0);
  2576. if(start == 0)
  2577. start = now;
  2578. va_start(arg, fmt);
  2579. m = vsmprint(fmt, arg);
  2580. fprint(2, "%ld %s", now-start, m);
  2581. free(m);
  2582. va_end(arg);
  2583. }
  2584. /*
  2585. * return non-zero if this is a valid v4 address
  2586. */
  2587. static int
  2588. validv4(Ipaddr addr)
  2589. {
  2590. return memcmp(addr, v4prefix, IPv4off) == 0 && memcmp(addr, v4prefix, IPaddrlen) != 0;
  2591. }
  2592. static void
  2593. invalidate(Ipaddr addr)
  2594. {
  2595. ipmove(addr, IPnoaddr);
  2596. }
  2597. /*
  2598. * return number of networks
  2599. */
  2600. static int
  2601. nipifcs(char *net)
  2602. {
  2603. static Ipifc *ifc;
  2604. Ipifc *nifc;
  2605. Iplifc *lifc;
  2606. int n;
  2607. n = 0;
  2608. ifc = readipifc(net, ifc, -1);
  2609. for(nifc = ifc; nifc != nil; nifc = nifc->next)
  2610. for(lifc = ifc->lifc; lifc != nil; lifc = lifc->next)
  2611. n++;
  2612. return n;
  2613. }
  2614. /*
  2615. * make an ndb entry and put it into /net/ndb for the servers to see
  2616. */
  2617. static void
  2618. putndb(PPP *ppp, char *net)
  2619. {
  2620. char buf[1024];
  2621. char file[64];
  2622. char *p, *e;
  2623. int fd;
  2624. e = buf + sizeof(buf);
  2625. p = buf;
  2626. p = seprint(p, e, "ip=%I ipmask=255.255.255.255 ipgw=%I\n", ppp->local,
  2627. ppp->remote);
  2628. if(validv4(ppp->dns[0]))
  2629. p = seprint(p, e, "\tdns=%I\n", ppp->dns[0]);
  2630. if(validv4(ppp->dns[1]))
  2631. p = seprint(p, e, "\tdns=%I\n", ppp->dns[1]);
  2632. if(validv4(ppp->wins[0]))
  2633. p = seprint(p, e, "\twins=%I\n", ppp->wins[0]);
  2634. if(validv4(ppp->wins[1]))
  2635. p = seprint(p, e, "\twins=%I\n", ppp->wins[1]);
  2636. seprint(file, file+sizeof file, "%s/ndb", net);
  2637. fd = open(file, OWRITE);
  2638. if(fd < 0)
  2639. return;
  2640. write(fd, buf, p-buf);
  2641. close(fd);
  2642. seprint(file, file+sizeof file, "%s/cs", net);
  2643. fd = open(file, OWRITE);
  2644. write(fd, "refresh", 7);
  2645. close(fd);
  2646. seprint(file, file+sizeof file, "%s/dns", net);
  2647. fd = open(file, OWRITE);
  2648. write(fd, "refresh", 7);
  2649. close(fd);
  2650. }
  2651. static void
  2652. getauth(PPP *ppp)
  2653. {
  2654. UserPasswd *up;
  2655. if(*ppp->chapname)
  2656. return;
  2657. up = auth_getuserpasswd(auth_getkey,"proto=pass service=ppp %s", keyspec);
  2658. if(up != nil){
  2659. strcpy(ppp->chapname, up->user);
  2660. strcpy(ppp->secret, up->passwd);
  2661. }
  2662. }