1 /* vi: set sw=4 ts=4: */
2 /* Port to Busybox Copyright (C) 2006 Jesse Dutton <jessedutton@gmail.com>
4 * Licensed under GPLv2, see file LICENSE in this source tree.
6 * DHCP Relay for 'DHCPv4 Configuration of IPSec Tunnel Mode' support
7 * Copyright (C) 2002 Mario Strasser <mast@gmx.net>,
8 * Zuercher Hochschule Winterthur,
10 * Upstream has GPL v2 or later
14 #define SERVER_PORT 67
16 /* lifetime of an xid entry in sec. */
17 #define MAX_LIFETIME 2*60
18 /* select timeout in sec. */
19 #define SELECT_TIMEOUT (MAX_LIFETIME / 8)
21 /* This list holds information about clients. The xid_* functions manipulate this list. */
26 struct sockaddr_in ip;
27 struct xid_item *next;
30 #define dhcprelay_xid_list (*(struct xid_item*)&bb_common_bufsiz1)
32 static struct xid_item *xid_add(uint32_t xid, struct sockaddr_in *ip, int client)
34 struct xid_item *item;
36 /* create new xid entry */
37 item = xmalloc(sizeof(struct xid_item));
42 item->client = client;
43 item->timestamp = monotonic_sec();
44 item->next = dhcprelay_xid_list.next;
45 dhcprelay_xid_list.next = item;
50 static void xid_expire(void)
52 struct xid_item *item = dhcprelay_xid_list.next;
53 struct xid_item *last = &dhcprelay_xid_list;
54 unsigned current_time = monotonic_sec();
56 while (item != NULL) {
57 if ((current_time - item->timestamp) > MAX_LIFETIME) {
58 last->next = item->next;
68 static struct xid_item *xid_find(uint32_t xid)
70 struct xid_item *item = dhcprelay_xid_list.next;
71 while (item != NULL) {
72 if (item->xid == xid) {
80 static void xid_del(uint32_t xid)
82 struct xid_item *item = dhcprelay_xid_list.next;
83 struct xid_item *last = &dhcprelay_xid_list;
84 while (item != NULL) {
85 if (item->xid == xid) {
86 last->next = item->next;
97 * get_dhcp_packet_type - gets the message type of a dhcp packet
98 * p - pointer to the dhcp packet
99 * returns the message type on success, -1 otherwise
101 static int get_dhcp_packet_type(struct dhcp_packet *p)
105 /* it must be either a BOOTREQUEST or a BOOTREPLY */
106 if (p->op != BOOTREQUEST && p->op != BOOTREPLY)
108 /* get message type option */
109 op = udhcp_get_option(p, DHCP_MESSAGE_TYPE);
116 * make_iface_list - parses client/server interface names
119 static char **make_iface_list(char **client_and_server_ifaces, int *client_number)
121 char *s, **iface_list;
124 /* get number of items */
125 cn = 2; /* 1 server iface + at least 1 client one */
126 s = client_and_server_ifaces[0]; /* list of client ifaces */
134 /* create vector of pointers */
135 iface_list = xzalloc(cn * sizeof(iface_list[0]));
137 iface_list[0] = client_and_server_ifaces[1]; /* server iface */
140 s = xstrdup(client_and_server_ifaces[0]); /* list of client ifaces */
141 goto store_client_iface_name;
146 store_client_iface_name:
154 /* Creates listen sockets (in fds) bound to client and server ifaces,
155 * and returns numerically max fd.
157 static int init_sockets(char **iface_list, int num_clients, int *fds)
162 for (i = 0; i < num_clients; i++) {
163 fds[i] = udhcp_listen_socket(/*INADDR_ANY,*/ SERVER_PORT, iface_list[i]);
170 static int sendto_ip4(int sock, const void *msg, int msg_len, struct sockaddr_in *to)
175 err = sendto(sock, msg, msg_len, 0, (struct sockaddr*) to, sizeof(*to));
178 bb_perror_msg("sendto");
183 * pass_to_server() - forwards dhcp packets from client to server
185 * client - number of the client
187 static void pass_to_server(struct dhcp_packet *p, int packet_len, int client, int *fds,
188 struct sockaddr_in *client_addr, struct sockaddr_in *server_addr)
192 /* check packet_type */
193 type = get_dhcp_packet_type(p);
194 if (type != DHCPDISCOVER && type != DHCPREQUEST
195 && type != DHCPDECLINE && type != DHCPRELEASE
196 && type != DHCPINFORM
201 /* create new xid entry */
202 xid_add(p->xid, client_addr, client);
204 /* forward request to server */
205 /* note that we send from fds[0] which is bound to SERVER_PORT (67).
206 * IOW: we send _from_ SERVER_PORT! Although this may look strange,
207 * RFC 1542 not only allows, but prescribes this for BOOTP relays.
209 sendto_ip4(fds[0], p, packet_len, server_addr);
213 * pass_to_client() - forwards dhcp packets from server to client
216 static void pass_to_client(struct dhcp_packet *p, int packet_len, int *fds)
219 struct xid_item *item;
222 item = xid_find(p->xid);
227 /* check packet type */
228 type = get_dhcp_packet_type(p);
229 if (type != DHCPOFFER && type != DHCPACK && type != DHCPNAK) {
233 //TODO: also do it if (p->flags & htons(BROADCAST_FLAG)) is set!
234 if (item->ip.sin_addr.s_addr == htonl(INADDR_ANY))
235 item->ip.sin_addr.s_addr = htonl(INADDR_BROADCAST);
237 if (sendto_ip4(fds[item->client], p, packet_len, &item->ip) != 0) {
238 return; /* send error occurred */
241 /* remove xid entry */
245 int dhcprelay_main(int argc, char **argv) MAIN_EXTERNALLY_VISIBLE;
246 int dhcprelay_main(int argc, char **argv)
248 struct sockaddr_in server_addr;
251 int num_sockets, max_socket;
254 server_addr.sin_family = AF_INET;
255 server_addr.sin_addr.s_addr = htonl(INADDR_BROADCAST);
256 server_addr.sin_port = htons(SERVER_PORT);
258 /* dhcprelay CLIENT_IFACE1[,CLIENT_IFACE2...] SERVER_IFACE [SERVER_IP] */
260 if (!inet_aton(argv[3], &server_addr.sin_addr))
261 bb_perror_msg_and_die("bad server IP");
262 } else if (argc != 3) {
266 iface_list = make_iface_list(argv + 1, &num_sockets);
268 fds = xmalloc(num_sockets * sizeof(fds[0]));
270 /* Create sockets and bind one to every iface */
271 max_socket = init_sockets(iface_list, num_sockets, fds);
273 /* Get our IP on server_iface */
274 if (udhcp_read_interface(argv[2], NULL, &our_nip, NULL))
279 // reinit stuff from time to time? go back to make_iface_list
286 for (i = 0; i < num_sockets; i++)
287 FD_SET(fds[i], &rfds);
288 tv.tv_sec = SELECT_TIMEOUT;
290 if (select(max_socket + 1, &rfds, NULL, NULL, &tv) > 0) {
292 struct dhcp_packet dhcp_msg;
295 if (FD_ISSET(fds[0], &rfds)) {
296 packlen = udhcp_recv_kernel_packet(&dhcp_msg, fds[0]);
298 pass_to_client(&dhcp_msg, packlen, fds);
303 for (i = 1; i < num_sockets; i++) {
304 struct sockaddr_in client_addr;
307 if (!FD_ISSET(fds[i], &rfds))
310 addr_size = sizeof(client_addr);
311 packlen = recvfrom(fds[i], &dhcp_msg, sizeof(dhcp_msg), 0,
312 (struct sockaddr *)(&client_addr), &addr_size);
316 /* Get our IP on corresponding client_iface */
318 // 4.1 General BOOTP Processing for Relay Agents
319 // 4.1.1 BOOTREQUEST Messages
320 // If the relay agent does decide to relay the request, it MUST examine
321 // the 'giaddr' ("gateway" IP address) field. If this field is zero,
322 // the relay agent MUST fill this field with the IP address of the
323 // interface on which the request was received. If the interface has
324 // more than one IP address logically associated with it, the relay
325 // agent SHOULD choose one IP address associated with that interface and
326 // use it consistently for all BOOTP messages it relays. If the
327 // 'giaddr' field contains some non-zero value, the 'giaddr' field MUST
328 // NOT be modified. The relay agent MUST NOT, under any circumstances,
329 // fill the 'giaddr' field with a broadcast address as is suggested in
330 // [1] (Section 8, sixth paragraph).
332 // but why? what if server can't route such IP? Client ifaces may be, say, NATed!
334 // 4.1.2 BOOTREPLY Messages
335 // BOOTP relay agents relay BOOTREPLY messages only to BOOTP clients.
336 // It is the responsibility of BOOTP servers to send BOOTREPLY messages
337 // directly to the relay agent identified in the 'giaddr' field.
338 // (yeah right, unless it is impossible... see comment above)
339 // Therefore, a relay agent may assume that all BOOTREPLY messages it
340 // receives are intended for BOOTP clients on its directly-connected
343 // When a relay agent receives a BOOTREPLY message, it should examine
344 // the BOOTP 'giaddr', 'yiaddr', 'chaddr', 'htype', and 'hlen' fields.
345 // These fields should provide adequate information for the relay agent
346 // to deliver the BOOTREPLY message to the client.
348 // The 'giaddr' field can be used to identify the logical interface from
349 // which the reply must be sent (i.e., the host or router interface
350 // connected to the same network as the BOOTP client). If the content
351 // of the 'giaddr' field does not match one of the relay agent's
352 // directly-connected logical interfaces, the BOOTREPLY messsage MUST be
353 // silently discarded.
354 if (udhcp_read_interface(iface_list[i], NULL, &dhcp_msg.gateway_nip, NULL)) {
355 /* Fall back to our IP on server iface */
356 // this makes more sense!
357 dhcp_msg.gateway_nip = our_nip;
359 // maybe dhcp_msg.hops++? drop packets with too many hops (RFC 1542 says 4 or 16)?
360 pass_to_server(&dhcp_msg, packlen, i, fds, &client_addr, &server_addr);
366 /* return 0; - not reached */