odhcpd: detect broken hostnames
[oweals/odhcpd.git] / src / dhcpv6-ia.c
1 /**
2  * Copyright (C) 2013 Steven Barth <steven@midlink.org>
3  * Copyright (C) 2016 Hans Dedecker <dedeckeh@gmail.com>
4  *
5  * This program is free software; you can redistribute it and/or modify
6  * it under the terms of the GNU General Public License v2 as published by
7  * the Free Software Foundation.
8  *
9  * This program is distributed in the hope that it will be useful,
10  * but WITHOUT ANY WARRANTY; without even the implied warranty of
11  * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
12  * GNU General Public License for more details.
13  *
14  */
15
16 #include "odhcpd.h"
17 #include "dhcpv6.h"
18 #include "dhcpv4.h"
19
20 #include <time.h>
21 #include <errno.h>
22 #include <fcntl.h>
23 #include <stdio.h>
24 #include <poll.h>
25 #include <alloca.h>
26 #include <resolv.h>
27 #include <limits.h>
28 #include <stdlib.h>
29 #include <string.h>
30 #include <unistd.h>
31 #include <stdbool.h>
32 #include <arpa/inet.h>
33 #include <sys/timerfd.h>
34
35 #include <libubox/md5.h>
36 #include <libubox/usock.h>
37
38 #define ADDR_ENTRY_VALID_IA_ADDR(iface, i, m, addrs) \
39     ((iface)->dhcpv6_assignall || (i) == (m) || \
40      (addrs)[(i)].prefix > 64)
41
42 static void dhcpv6_netevent_cb(unsigned long event, struct netevent_handler_info *info);
43 static void free_dhcpv6_assignment(struct dhcpv6_assignment *c);
44 static void set_border_assignment_size(struct interface *iface, struct dhcpv6_assignment *b);
45 static void handle_addrlist_change(struct netevent_handler_info *info);
46 static void start_reconf(struct dhcpv6_assignment *a);
47 static void stop_reconf(struct dhcpv6_assignment *a);
48 static void valid_until_cb(struct uloop_timeout *event);
49
50 static struct netevent_handler dhcpv6_netevent_handler = { .cb = dhcpv6_netevent_cb, };
51 static struct uloop_timeout valid_until_timeout = {.cb = valid_until_cb};
52 static uint32_t serial = 0;
53 static uint8_t statemd5[16];
54
55 int dhcpv6_ia_init(void)
56 {
57         uloop_timeout_set(&valid_until_timeout, 1000);
58
59         netlink_add_netevent_handler(&dhcpv6_netevent_handler);
60
61         return 0;
62 }
63
64 int dhcpv6_setup_ia_interface(struct interface *iface, bool enable)
65 {
66         if (!enable && iface->ia_assignments.next) {
67                 struct dhcpv6_assignment *c;
68
69                 while (!list_empty(&iface->ia_assignments)) {
70                         c = list_first_entry(&iface->ia_assignments, struct dhcpv6_assignment, head);
71                         free_dhcpv6_assignment(c);
72                 }
73         }
74
75         if (enable && iface->dhcpv6 == MODE_SERVER) {
76                 struct dhcpv6_assignment *border;
77                 struct lease *lease;
78
79                 if (!iface->ia_assignments.next)
80                         INIT_LIST_HEAD(&iface->ia_assignments);
81
82                 if (list_empty(&iface->ia_assignments)) {
83                         border = calloc(1, sizeof(*border));
84
85                         if (!border) {
86                                 syslog(LOG_ERR, "Calloc failed for border on interface %s", iface->ifname);
87                                 return -1;
88                         }
89
90                         border->length = 64;
91                         list_add(&border->head, &iface->ia_assignments);
92                 } else
93                         border = list_last_entry(&iface->ia_assignments, struct dhcpv6_assignment, head);
94
95                 set_border_assignment_size(iface, border);
96
97                 /* Parse static entries */
98                 list_for_each_entry(lease, &leases, head) {
99                         /* Construct entry */
100                         size_t duid_len = lease->duid_len ? lease->duid_len : 14;
101                         struct dhcpv6_assignment *a = calloc(1, sizeof(*a) + duid_len);
102                         if (!a) {
103                                 syslog(LOG_ERR, "Calloc failed for static lease assignment on interface %s",
104                                         iface->ifname);
105                                 return -1;
106                         }
107
108                         a->leasetime = lease->dhcpv4_leasetime;
109
110                         a->clid_len = duid_len;
111                         a->length = 128;
112                         if (lease->hostid) {
113                                 a->assigned = lease->hostid;
114                         } else {
115                                 uint32_t i4a = ntohl(lease->ipaddr.s_addr) & 0xff;
116                                 a->assigned = ((i4a / 100) << 8) | (((i4a % 100) / 10) << 4) | (i4a % 10);
117                         }
118
119                         odhcpd_urandom(a->key, sizeof(a->key));
120                         memcpy(a->clid_data, lease->duid, lease->duid_len);
121                         memcpy(a->mac, lease->mac.ether_addr_octet, sizeof(a->mac));
122                         /* Static assignment */
123                         a->flags |= OAF_STATIC;
124                         /* Infinite valid */
125                         a->valid_until = 0;
126
127                         /* Assign to all interfaces */
128                         struct dhcpv6_assignment *c;
129                         list_for_each_entry(c, &iface->ia_assignments, head) {
130                                 if (c->length != 128 || c->assigned > a->assigned) {
131                                         list_add_tail(&a->head, &c->head);
132                                         break;
133                                 } else if (c->assigned == a->assigned)
134                                         /* Already an assignment with that number */
135                                         break;
136                         }
137
138                         if (a->head.next) {
139                                 a->iface = iface;
140                                 if (lease->hostname[0]) {
141                                         free(a->hostname);
142                                         a->hostname = strdup(lease->hostname);
143                                 }
144                         } else
145                                 free_dhcpv6_assignment(a);
146                 }
147         }
148         return 0;
149 }
150
151
152 static void dhcpv6_netevent_cb(unsigned long event, struct netevent_handler_info *info)
153 {
154         struct interface *iface = info->iface;
155
156         if (!iface || iface->dhcpv6 != MODE_SERVER)
157                 return;
158
159         switch (event) {
160         case NETEV_ADDR6LIST_CHANGE:
161                 handle_addrlist_change(info);
162                 break;
163         default:
164                 break;
165         }
166 }
167
168
169 static void free_dhcpv6_assignment(struct dhcpv6_assignment *c)
170 {
171         if (c->managed_sock.fd.registered) {
172                 ustream_free(&c->managed_sock.stream);
173                 close(c->managed_sock.fd.fd);
174         }
175
176         if (c->head.next)
177                 list_del(&c->head);
178
179         if (c->reconf_cnt)
180                 stop_reconf(c);
181
182         free(c->managed);
183         free(c->hostname);
184         free(c);
185 }
186
187 static inline bool valid_prefix_length(const struct dhcpv6_assignment *a, const uint8_t prefix_length)
188 {
189         return (a->managed_size || a->length > prefix_length);
190 }
191
192 static inline bool valid_addr(const struct odhcpd_ipaddr *addr, time_t now)
193 {
194         return (addr->prefix <= 96 && addr->preferred > (uint32_t)now);
195 }
196
197 static size_t get_preferred_addr(const struct odhcpd_ipaddr *addrs, const size_t addrlen)
198 {
199         size_t i, m;
200
201         for (i = 0, m = 0; i < addrlen; ++i) {
202                 if (addrs[i].preferred > addrs[m].preferred ||
203                                 (addrs[i].preferred == addrs[m].preferred &&
204                                 memcmp(&addrs[i].addr, &addrs[m].addr, 16) > 0))
205                         m = i;
206         }
207
208         return m;
209 }
210
211 static int send_reconf(struct dhcpv6_assignment *assign)
212 {
213         struct {
214                 struct dhcpv6_client_header hdr;
215                 uint16_t srvid_type;
216                 uint16_t srvid_len;
217                 uint16_t duid_type;
218                 uint16_t hardware_type;
219                 uint8_t mac[6];
220                 uint16_t msg_type;
221                 uint16_t msg_len;
222                 uint8_t msg_id;
223                 struct dhcpv6_auth_reconfigure auth;
224                 uint16_t clid_type;
225                 uint16_t clid_len;
226                 uint8_t clid_data[128];
227         } __attribute__((packed)) reconf_msg = {
228                 .hdr = {DHCPV6_MSG_RECONFIGURE, {0, 0, 0}},
229                 .srvid_type = htons(DHCPV6_OPT_SERVERID),
230                 .srvid_len = htons(10),
231                 .duid_type = htons(3),
232                 .hardware_type = htons(1),
233                 .msg_type = htons(DHCPV6_OPT_RECONF_MSG),
234                 .msg_len = htons(1),
235                 .msg_id = DHCPV6_MSG_RENEW,
236                 .auth = {htons(DHCPV6_OPT_AUTH),
237                                 htons(sizeof(reconf_msg.auth) - 4), 3, 1, 0,
238                                 {htonl(time(NULL)), htonl(++serial)}, 2, {0}},
239                 .clid_type = htons(DHCPV6_OPT_CLIENTID),
240                 .clid_len = htons(assign->clid_len),
241                 .clid_data = {0},
242         };
243         struct interface *iface = assign->iface;
244
245         odhcpd_get_mac(iface, reconf_msg.mac);
246         memcpy(reconf_msg.clid_data, assign->clid_data, assign->clid_len);
247         struct iovec iov = {&reconf_msg, sizeof(reconf_msg) - 128 + assign->clid_len};
248
249         md5_ctx_t md5;
250         uint8_t secretbytes[64];
251         memset(secretbytes, 0, sizeof(secretbytes));
252         memcpy(secretbytes, assign->key, sizeof(assign->key));
253
254         for (size_t i = 0; i < sizeof(secretbytes); ++i)
255                 secretbytes[i] ^= 0x36;
256
257         md5_begin(&md5);
258         md5_hash(secretbytes, sizeof(secretbytes), &md5);
259         md5_hash(iov.iov_base, iov.iov_len, &md5);
260         md5_end(reconf_msg.auth.key, &md5);
261
262         for (size_t i = 0; i < sizeof(secretbytes); ++i) {
263                 secretbytes[i] ^= 0x36;
264                 secretbytes[i] ^= 0x5c;
265         }
266
267         md5_begin(&md5);
268         md5_hash(secretbytes, sizeof(secretbytes), &md5);
269         md5_hash(reconf_msg.auth.key, 16, &md5);
270         md5_end(reconf_msg.auth.key, &md5);
271
272         return odhcpd_send(iface->dhcpv6_event.uloop.fd, &assign->peer, &iov, 1, iface);
273 }
274
275 void dhcpv6_enum_ia_addrs(struct interface *iface, struct dhcpv6_assignment *c,
276                                 time_t now, dhcpv6_binding_cb_handler_t func, void *arg)
277 {
278         struct odhcpd_ipaddr *addrs = (c->managed) ? c->managed : iface->addr6;
279         size_t addrlen = (c->managed) ? (size_t)c->managed_size : iface->addr6_len;
280         size_t m = get_preferred_addr(addrs, addrlen);
281
282         for (size_t i = 0; i < addrlen; ++i) {
283                 struct in6_addr addr;
284                 uint32_t pref, valid;
285                 int prefix = c->managed ? addrs[i].prefix : c->length;
286
287                 if (!valid_addr(&addrs[i], now))
288                         continue;
289
290                 addr = addrs[i].addr.in6;
291                 pref = addrs[i].preferred;
292                 valid = addrs[i].valid;
293                 if (prefix == 128) {
294                         if (!ADDR_ENTRY_VALID_IA_ADDR(iface, i, m, addrs))
295                                 continue;
296
297                         addr.s6_addr32[3] = htonl(c->assigned);
298                 } else {
299                         if (!valid_prefix_length(c, addrs[i].prefix))
300                                 continue;
301
302                         addr.s6_addr32[1] |= htonl(c->assigned);
303                         addr.s6_addr32[2] = addr.s6_addr32[3] = 0;
304                 }
305
306                 if (pref != UINT32_MAX)
307                         pref -= now;
308
309                 if (valid != UINT32_MAX)
310                         valid -= now;
311
312                 func(&addr, prefix, pref, valid, arg);
313         }
314 }
315
316 struct write_ctxt {
317         FILE *fp;
318         md5_ctx_t md5;
319         struct dhcpv6_assignment *c;
320         struct interface *iface;
321         char *buf;
322         int buf_len;
323         int buf_idx;
324 };
325
326 void dhcpv6_write_ia_addr(struct in6_addr *addr, int prefix, _unused uint32_t pref,
327                                 _unused uint32_t valid, void *arg)
328 {
329         struct write_ctxt *ctxt = (struct write_ctxt *)arg;
330         char ipbuf[INET6_ADDRSTRLEN];
331
332         inet_ntop(AF_INET6, addr, ipbuf, sizeof(ipbuf) - 1);
333
334         if (ctxt->c->length == 128 && ctxt->c->hostname &&
335             !(ctxt->c->flags & OAF_BROKEN_HOSTNAME)) {
336                 fputs(ipbuf, ctxt->fp);
337
338                 char b[256];
339                 if (dn_expand(ctxt->iface->search, ctxt->iface->search + ctxt->iface->search_len,
340                                 ctxt->iface->search, b, sizeof(b)) > 0)
341                         fprintf(ctxt->fp, "\t%s.%s", ctxt->c->hostname, b);
342
343                 fprintf(ctxt->fp, "\t%s\n", ctxt->c->hostname);
344                 md5_hash(ipbuf, strlen(ipbuf), &ctxt->md5);
345                 md5_hash(ctxt->c->hostname, strlen(ctxt->c->hostname), &ctxt->md5);
346         }
347
348         ctxt->buf_idx += snprintf(ctxt->buf + ctxt->buf_idx,ctxt->buf_len - ctxt->buf_idx,
349                                         "%s/%d ", ipbuf, prefix);
350 }
351
352 void dhcpv6_write_statefile(void)
353 {
354         struct write_ctxt ctxt;
355
356         md5_begin(&ctxt.md5);
357
358         if (config.dhcp_statefile) {
359                 time_t now = odhcpd_time(), wall_time = time(NULL);
360                 int fd = open(config.dhcp_statefile, O_CREAT | O_WRONLY | O_CLOEXEC, 0644);
361                 char leasebuf[512];
362
363                 if (fd < 0)
364                         return;
365                 int ret;
366                 ret = lockf(fd, F_LOCK, 0);
367                 if (ret < 0) {
368                         close(fd);
369                         return;
370                 }
371                 if (ftruncate(fd, 0) < 0) {}
372
373                 ctxt.fp = fdopen(fd, "w");
374                 if (!ctxt.fp) {
375                         close(fd);
376                         return;
377                 }
378
379                 ctxt.buf = leasebuf;
380                 ctxt.buf_len = sizeof(leasebuf);
381
382                 list_for_each_entry(ctxt.iface, &interfaces, head) {
383                         if (ctxt.iface->dhcpv6 != MODE_SERVER &&
384                                         ctxt.iface->dhcpv4 != MODE_SERVER)
385                                 continue;
386
387                         if (ctxt.iface->dhcpv6 == MODE_SERVER &&
388                                         ctxt.iface->ia_assignments.next) {
389                                 list_for_each_entry(ctxt.c, &ctxt.iface->ia_assignments, head) {
390                                         if (!(ctxt.c->flags & OAF_BOUND) || ctxt.c->managed_size < 0)
391                                                 continue;
392
393                                         char duidbuf[264];
394
395                                         odhcpd_hexlify(duidbuf, ctxt.c->clid_data, ctxt.c->clid_len);
396
397                                         /* iface DUID iaid hostname lifetime assigned length [addrs...] */
398                                         ctxt.buf_idx = snprintf(ctxt.buf, ctxt.buf_len, "# %s %s %x %s%s %ld %x %u ",
399                                                                 ctxt.iface->ifname, duidbuf, ntohl(ctxt.c->iaid),
400                                                                 (ctxt.c->flags & OAF_BROKEN_HOSTNAME) ? "broken\\x20" : "",
401                                                                 (ctxt.c->hostname ? ctxt.c->hostname : "-"),
402                                                                 (ctxt.c->valid_until > now ?
403                                                                         (ctxt.c->valid_until - now + wall_time) :
404                                                                         (INFINITE_VALID(ctxt.c->valid_until) ? -1 : 0)),
405                                                                 ctxt.c->assigned, (unsigned)ctxt.c->length);
406
407                                         if (INFINITE_VALID(ctxt.c->valid_until) || ctxt.c->valid_until > now)
408                                                 dhcpv6_enum_ia_addrs(ctxt.iface, ctxt.c, now,
409                                                                         dhcpv6_write_ia_addr, &ctxt);
410
411                                         ctxt.buf[ctxt.buf_idx - 1] = '\n';
412                                         fwrite(ctxt.buf, 1, ctxt.buf_idx, ctxt.fp);
413                                 }
414                         }
415
416                         if (ctxt.iface->dhcpv4 == MODE_SERVER &&
417                                         ctxt.iface->dhcpv4_assignments.next) {
418                                 struct dhcpv4_assignment *c;
419                                 list_for_each_entry(c, &ctxt.iface->dhcpv4_assignments, head) {
420                                         if (!(c->flags & OAF_BOUND))
421                                                 continue;
422
423                                         char ipbuf[INET6_ADDRSTRLEN];
424                                         char duidbuf[16];
425                                         odhcpd_hexlify(duidbuf, c->hwaddr, sizeof(c->hwaddr));
426
427                                         /* iface DUID iaid hostname lifetime assigned length [addrs...] */
428                                         ctxt.buf_idx = snprintf(ctxt.buf, ctxt.buf_len, "# %s %s ipv4 %s%s %ld %x 32 ",
429                                                                 ctxt.iface->ifname, duidbuf,
430                                                                 (c->flags & OAF_BROKEN_HOSTNAME) ? "broken\\x20" : "",
431                                                                 (c->hostname ? c->hostname : "-"),
432                                                                 (c->valid_until > now ?
433                                                                         (c->valid_until - now + wall_time) :
434                                                                         (INFINITE_VALID(c->valid_until) ? -1 : 0)),
435                                                                 ntohl(c->addr));
436
437                                         struct in_addr addr = {.s_addr = c->addr};
438                                         inet_ntop(AF_INET, &addr, ipbuf, sizeof(ipbuf) - 1);
439
440                                         if (c->hostname && !(c->flags & OAF_BROKEN_HOSTNAME)) {
441                                                 fputs(ipbuf, ctxt.fp);
442
443                                                 char b[256];
444                                                 if (dn_expand(ctxt.iface->search,
445                                                                 ctxt.iface->search + ctxt.iface->search_len,
446                                                                 ctxt.iface->search, b, sizeof(b)) > 0)
447                                                         fprintf(ctxt.fp, "\t%s.%s", c->hostname, b);
448
449                                                 fprintf(ctxt.fp, "\t%s\n", c->hostname);
450                                                 md5_hash(ipbuf, strlen(ipbuf), &ctxt.md5);
451                                                 md5_hash(c->hostname, strlen(c->hostname), &ctxt.md5);
452                                         }
453
454                                         ctxt.buf_idx += snprintf(ctxt.buf + ctxt.buf_idx,
455                                                                         ctxt.buf_len - ctxt.buf_idx,
456                                                                         "%s/32 ", ipbuf);
457                                         ctxt.buf[ctxt.buf_idx - 1] = '\n';
458                                         fwrite(ctxt.buf, 1, ctxt.buf_idx, ctxt.fp);
459                                 }
460                         }
461                 }
462
463                 fclose(ctxt.fp);
464         }
465
466         uint8_t newmd5[16];
467         md5_end(newmd5, &ctxt.md5);
468
469         if (config.dhcp_cb && memcmp(newmd5, statemd5, sizeof(newmd5))) {
470                 memcpy(statemd5, newmd5, sizeof(statemd5));
471                 char *argv[2] = {config.dhcp_cb, NULL};
472                 if (!vfork()) {
473                         execv(argv[0], argv);
474                         _exit(128);
475                 }
476         }
477 }
478
479 static void __apply_lease(struct interface *iface, struct dhcpv6_assignment *a,
480                 struct odhcpd_ipaddr *addrs, ssize_t addr_len, bool add)
481 {
482         if (a->length > 64)
483                 return;
484
485         for (ssize_t i = 0; i < addr_len; ++i) {
486                 struct in6_addr prefix = addrs[i].addr.in6;
487                 prefix.s6_addr32[1] |= htonl(a->assigned);
488                 prefix.s6_addr32[2] = prefix.s6_addr32[3] = 0;
489                 netlink_setup_route(&prefix, (a->managed_size) ? addrs[i].prefix : a->length,
490                                 iface->ifindex, &a->peer.sin6_addr, 1024, add);
491         }
492 }
493
494 static void apply_lease(struct interface *iface, struct dhcpv6_assignment *a, bool add)
495 {
496         struct odhcpd_ipaddr *addrs = (a->managed) ? a->managed : iface->addr6;
497         ssize_t addrlen = (a->managed) ? a->managed_size : (ssize_t)iface->addr6_len;
498
499         __apply_lease(iface, a, addrs, addrlen, add);
500 }
501
502 /* Set border assignment size based on the IPv6 address prefixes */
503 static void set_border_assignment_size(struct interface *iface, struct dhcpv6_assignment *b)
504 {
505         time_t now = odhcpd_time();
506         int minprefix = -1;
507
508         for (size_t i = 0; i < iface->addr6_len; ++i) {
509                 if (iface->addr6[i].preferred > (uint32_t)now &&
510                                 iface->addr6[i].prefix < 64 &&
511                                 iface->addr6[i].prefix > minprefix)
512                         minprefix = iface->addr6[i].prefix;
513         }
514
515         if (minprefix > 32 && minprefix <= 64)
516                 b->assigned = 1U << (64 - minprefix);
517         else
518                 b->assigned = 0;
519 }
520
521 /* More data was received from TCP connection */
522 static void managed_handle_pd_data(struct ustream *s, _unused int bytes_new)
523 {
524         struct dhcpv6_assignment *c = container_of(s, struct dhcpv6_assignment, managed_sock);
525         time_t now = odhcpd_time();
526         bool first = c->managed_size < 0;
527
528         for (;;) {
529                 int pending;
530                 char *data = ustream_get_read_buf(s, &pending);
531                 char *end = memmem(data, pending, "\n\n", 2);
532
533                 if (!end)
534                         break;
535
536                 end += 2;
537                 end[-1] = 0;
538
539                 c->managed_size = 0;
540                 if (c->accept_reconf)
541                         c->reconf_cnt = 1;
542
543                 char *saveptr;
544                 for (char *line = strtok_r(data, "\n", &saveptr); line; line = strtok_r(NULL, "\n", &saveptr)) {
545                         c->managed = realloc(c->managed, (c->managed_size + 1) * sizeof(*c->managed));
546                         struct odhcpd_ipaddr *n = &c->managed[c->managed_size];
547
548                         char *saveptr2, *x = strtok_r(line, "/", &saveptr2);
549                         if (!x || inet_pton(AF_INET6, x, &n->addr) < 1)
550                                 continue;
551
552                         x = strtok_r(NULL, ",", &saveptr2);
553                         if (sscanf(x, "%hhu", &n->prefix) < 1)
554                                 continue;
555
556                         x = strtok_r(NULL, ",", &saveptr2);
557                         if (sscanf(x, "%u", &n->preferred) < 1)
558                                 continue;
559
560                         x = strtok_r(NULL, ",", &saveptr2);
561                         if (sscanf(x, "%u", &n->valid) < 1)
562                                 continue;
563
564                         if (n->preferred > n->valid)
565                                 continue;
566
567                         if (UINT32_MAX - now < n->preferred)
568                                 n->preferred = UINT32_MAX;
569                         else
570                                 n->preferred += now;
571
572                         if (UINT32_MAX - now < n->valid)
573                                 n->valid = UINT32_MAX;
574                         else
575                                 n->valid += now;
576
577                         n->dprefix = 0;
578
579                         ++c->managed_size;
580                 }
581
582                 ustream_consume(s, end - data);
583         }
584
585         if (first && c->managed_size == 0)
586                 free_dhcpv6_assignment(c);
587         else if (first && !(c->flags & OAF_STATIC))
588                 c->valid_until = now + 150;
589 }
590
591
592 /* TCP transmission has ended, either because of success or timeout or other error */
593 static void managed_handle_pd_done(struct ustream *s)
594 {
595         struct dhcpv6_assignment *c = container_of(s, struct dhcpv6_assignment, managed_sock);
596
597         if (!(c->flags & OAF_STATIC))
598                 c->valid_until = odhcpd_time() + 15;
599
600         c->managed_size = 0;
601
602         if (c->accept_reconf)
603                 c->reconf_cnt = 1;
604 }
605
606 static bool assign_pd(struct interface *iface, struct dhcpv6_assignment *assign)
607 {
608         struct dhcpv6_assignment *c;
609
610         if (iface->dhcpv6_pd_manager[0]) {
611                 int fd = usock(USOCK_UNIX | USOCK_TCP, iface->dhcpv6_pd_manager, NULL);
612                 if (fd >= 0) {
613                         struct pollfd pfd = { .fd = fd, .events = POLLIN };
614                         char iaidbuf[298];
615
616                         odhcpd_hexlify(iaidbuf, assign->clid_data, assign->clid_len);
617
618                         assign->managed_sock.stream.notify_read = managed_handle_pd_data;
619                         assign->managed_sock.stream.notify_state = managed_handle_pd_done;
620                         ustream_fd_init(&assign->managed_sock, fd);
621                         ustream_printf(&assign->managed_sock.stream, "%s,%x\n::/%d,0,0\n\n",
622                                         iaidbuf, assign->iaid, assign->length);
623                         ustream_write_pending(&assign->managed_sock.stream);
624                         assign->managed_size = -1;
625
626                         if (!(assign->flags & OAF_STATIC))
627                                 assign->valid_until = odhcpd_time() + 15;
628
629                         list_add(&assign->head, &iface->ia_assignments);
630
631                         /* Wait initial period of up to 250ms for immediate assignment */
632                         if (poll(&pfd, 1, 250) < 0) {
633                                 syslog(LOG_ERR, "poll(): %m");
634                                 return false;
635                         }
636
637                         managed_handle_pd_data(&assign->managed_sock.stream, 0);
638
639                         if (fcntl(fd, F_GETFL) >= 0 && assign->managed_size > 0)
640                                 return true;
641                 }
642
643                 return false;
644         } else if (iface->addr6_len < 1)
645                 return false;
646
647         /* Try honoring the hint first */
648         uint32_t current = 1, asize = (1 << (64 - assign->length)) - 1;
649         if (assign->assigned) {
650                 list_for_each_entry(c, &iface->ia_assignments, head) {
651                         if (c->length == 128 || c->length == 0)
652                                 continue;
653
654                         if (assign->assigned >= current && assign->assigned + asize < c->assigned) {
655                                 list_add_tail(&assign->head, &c->head);
656
657                                 if (assign->flags & OAF_BOUND)
658                                         apply_lease(iface, assign, true);
659
660                                 return true;
661                         }
662
663                         if (c->assigned != 0)
664                                 current = (c->assigned + (1 << (64 - c->length)));
665                 }
666         }
667
668         /* Fallback to a variable assignment */
669         current = 1;
670         list_for_each_entry(c, &iface->ia_assignments, head) {
671                 if (c->length == 128 || c->length == 0)
672                         continue;
673
674                 current = (current + asize) & (~asize);
675                 if (current + asize < c->assigned) {
676                         assign->assigned = current;
677                         list_add_tail(&assign->head, &c->head);
678
679                         if (assign->flags & OAF_BOUND)
680                                 apply_lease(iface, assign, true);
681
682                         return true;
683                 }
684
685                 if (c->assigned != 0)
686                         current = (c->assigned + (1 << (64 - c->length)));
687         }
688
689         return false;
690 }
691
692 static bool assign_na(struct interface *iface, struct dhcpv6_assignment *assign)
693 {
694         /* Seed RNG with checksum of DUID */
695         uint32_t seed = 0;
696         for (size_t i = 0; i < assign->clid_len; ++i)
697                 seed += assign->clid_data[i];
698         srand(seed);
699
700         /* Try to assign up to 100x */
701         for (size_t i = 0; i < 100; ++i) {
702                 uint32_t try;
703                 do try = ((uint32_t)rand()) % 0x0fff; while (try < 0x100);
704
705                 struct dhcpv6_assignment *c;
706                 list_for_each_entry(c, &iface->ia_assignments, head) {
707                         if (c->length == 0)
708                                 continue;
709
710                         if (c->assigned > try || c->length != 128) {
711                                 assign->assigned = try;
712                                 list_add_tail(&assign->head, &c->head);
713                                 return true;
714                         } else if (c->assigned == try)
715                                 break;
716                 }
717         }
718
719         return false;
720 }
721
722 static void handle_addrlist_change(struct netevent_handler_info *info)
723 {
724         struct interface *iface = info->iface;
725         struct dhcpv6_assignment *c, *d, *border = list_last_entry(
726                         &iface->ia_assignments, struct dhcpv6_assignment, head);
727         struct list_head reassign = LIST_HEAD_INIT(reassign);
728         time_t now = odhcpd_time();
729
730         list_for_each_entry(c, &iface->ia_assignments, head) {
731                 if (c != border && iface->ra_managed == RA_MANAGED_NO_MFLAG
732                                 && (c->flags & OAF_BOUND))
733                         __apply_lease(iface, c, info->addrs_old.addrs,
734                                         info->addrs_old.len, false);
735         }
736
737         set_border_assignment_size(iface, border);
738
739         list_for_each_entry_safe(c, d, &iface->ia_assignments, head) {
740                 if (c->clid_len == 0 || (!INFINITE_VALID(c->valid_until) && c->valid_until < now) ||
741                                 c->managed_size)
742                         continue;
743
744                 if (c->length < 128 && c->assigned >= border->assigned && c != border)
745                         list_move(&c->head, &reassign);
746                 else if (c != border && (c->flags & OAF_BOUND))
747                         apply_lease(iface, c, true);
748
749                 if (c->accept_reconf && c->reconf_cnt == 0) {
750                         struct dhcpv6_assignment *a;
751
752                         start_reconf(c);
753
754                         /* Leave all other assignments of that client alone */
755                         list_for_each_entry(a, &iface->ia_assignments, head)
756                                 if (a != c && a->clid_len == c->clid_len &&
757                                                 !memcmp(a->clid_data, c->clid_data, a->clid_len))
758                                         a->reconf_cnt = INT_MAX;
759                 }
760         }
761
762         while (!list_empty(&reassign)) {
763                 c = list_first_entry(&reassign, struct dhcpv6_assignment, head);
764                 list_del(&c->head);
765                 if (!assign_pd(iface, c)) {
766                         c->assigned = 0;
767                         list_add(&c->head, &iface->ia_assignments);
768                 }
769         }
770
771         dhcpv6_write_statefile();
772 }
773
774 static void reconf_timeout_cb(struct uloop_timeout *event)
775 {
776         struct dhcpv6_assignment *a = container_of(event, struct dhcpv6_assignment, reconf_timer);
777
778         if (a->reconf_cnt > 0 && a->reconf_cnt < DHCPV6_REC_MAX_RC) {
779                 send_reconf(a);
780                 uloop_timeout_set(&a->reconf_timer,
781                                         DHCPV6_REC_TIMEOUT << a->reconf_cnt);
782                 a->reconf_cnt++;
783         } else
784                 stop_reconf(a);
785 }
786
787 static void start_reconf(struct dhcpv6_assignment *a)
788 {
789         uloop_timeout_set(&a->reconf_timer,
790                                 DHCPV6_REC_TIMEOUT << a->reconf_cnt);
791         a->reconf_timer.cb = reconf_timeout_cb;
792         a->reconf_cnt++;
793
794         send_reconf(a);
795 }
796
797 static void stop_reconf(struct dhcpv6_assignment *a)
798 {
799         uloop_timeout_cancel(&a->reconf_timer);
800         a->reconf_cnt = 0;
801         a->reconf_timer.cb = NULL;
802 }
803
804 static void valid_until_cb(struct uloop_timeout *event)
805 {
806         time_t now = odhcpd_time();
807         struct interface *iface;
808         list_for_each_entry(iface, &interfaces, head) {
809                 if (iface->dhcpv6 != MODE_SERVER || iface->ia_assignments.next == NULL)
810                         continue;
811
812                 struct dhcpv6_assignment *a, *n;
813                 list_for_each_entry_safe(a, n, &iface->ia_assignments, head) {
814                         if (!INFINITE_VALID(a->valid_until) && a->valid_until < now) {
815                                 if ((a->length < 128 && a->clid_len > 0) ||
816                                                 (a->length == 128 && a->clid_len == 0))
817                                         free_dhcpv6_assignment(a);
818
819                         }
820                 }
821         }
822         uloop_timeout_set(event, 1000);
823 }
824
825 static size_t append_reply(uint8_t *buf, size_t buflen, uint16_t status,
826                 const struct dhcpv6_ia_hdr *ia, struct dhcpv6_assignment *a,
827                 struct interface *iface, bool request)
828 {
829         if (buflen < sizeof(*ia) + sizeof(struct dhcpv6_ia_prefix))
830                 return 0;
831
832         struct dhcpv6_ia_hdr out = {ia->type, 0, ia->iaid, 0, 0};
833         size_t datalen = sizeof(out);
834         time_t now = odhcpd_time();
835
836         if (status) {
837                 struct __attribute__((packed)) {
838                         uint16_t type;
839                         uint16_t len;
840                         uint16_t value;
841                 } stat = {htons(DHCPV6_OPT_STATUS), htons(sizeof(stat) - 4),
842                                 htons(status)};
843
844                 memcpy(buf + datalen, &stat, sizeof(stat));
845                 datalen += sizeof(stat);
846         } else {
847                 if (a) {
848                         uint32_t leasetime;
849                         if (a->leasetime)
850                                 leasetime = a->leasetime;
851                         else
852                                 leasetime = iface->dhcpv4_leasetime;
853
854                         uint32_t pref = leasetime;
855                         uint32_t valid = leasetime;
856
857                         struct odhcpd_ipaddr *addrs = (a->managed) ? a->managed : iface->addr6;
858                         size_t addrlen = (a->managed) ? (size_t)a->managed_size : iface->addr6_len;
859                         size_t m = get_preferred_addr(addrs, addrlen);
860
861                         for (size_t i = 0; i < addrlen; ++i) {
862                                 uint32_t prefix_pref = addrs[i].preferred;
863                                 uint32_t prefix_valid = addrs[i].valid;
864
865                                 if (!valid_addr(&addrs[i], now))
866                                         continue;
867
868                                 if (prefix_pref != UINT32_MAX)
869                                         prefix_pref -= now;
870
871                                 if (prefix_valid != UINT32_MAX)
872                                         prefix_valid -= now;
873
874                                 if (a->length < 128) {
875                                         struct dhcpv6_ia_prefix p = {
876                                                 .type = htons(DHCPV6_OPT_IA_PREFIX),
877                                                 .len = htons(sizeof(p) - 4),
878                                                 .preferred = htonl(prefix_pref),
879                                                 .valid = htonl(prefix_valid),
880                                                 .prefix = (a->managed_size) ? addrs[i].prefix : a->length,
881                                                 .addr = addrs[i].addr.in6,
882                                         };
883                                         p.addr.s6_addr32[1] |= htonl(a->assigned);
884                                         p.addr.s6_addr32[2] = p.addr.s6_addr32[3] = 0;
885
886                                         size_t entrlen = sizeof(p) - 4;
887
888                                         if (datalen + entrlen + 4 > buflen ||
889                                                         (a->assigned == 0 && a->managed_size == 0) ||
890                                                         !valid_prefix_length(a, addrs[i].prefix))
891                                                 continue;
892
893                                         memcpy(buf + datalen, &p, sizeof(p));
894                                         datalen += entrlen + 4;
895                                 } else {
896                                         struct dhcpv6_ia_addr n = {
897                                                 .type = htons(DHCPV6_OPT_IA_ADDR),
898                                                 .len = htons(sizeof(n) - 4),
899                                                 .addr = addrs[i].addr.in6,
900                                                 .preferred = htonl(prefix_pref),
901                                                 .valid = htonl(prefix_valid)
902                                         };
903                                         n.addr.s6_addr32[3] = htonl(a->assigned);
904                                         size_t entrlen = sizeof(n) - 4;
905
906                                         if (!ADDR_ENTRY_VALID_IA_ADDR(iface, i, m, addrs) ||
907                                                         a->assigned == 0 ||
908                                                         datalen + entrlen + 4 > buflen)
909                                                 continue;
910
911                                         memcpy(buf + datalen, &n, sizeof(n));
912                                         datalen += entrlen + 4;
913                                 }
914
915                                 /* Calculate T1 / T2 based on non-deprecated addresses */
916                                 if (prefix_pref > 0) {
917                                         if (prefix_pref < pref)
918                                                 pref = prefix_pref;
919
920                                         if (prefix_valid < valid)
921                                                 valid = prefix_valid;
922                                 }
923                         }
924
925                         if (!INFINITE_VALID(a->valid_until))
926                                 /* UINT32_MAX is considered as infinite leasetime */
927                                 a->valid_until = (valid == UINT32_MAX) ? 0 : valid + now;
928
929                         out.t1 = htonl((pref == UINT32_MAX) ? pref : pref * 5 / 10);
930                         out.t2 = htonl((pref == UINT32_MAX) ? pref : pref * 8 / 10);
931
932                         if (!out.t1)
933                                 out.t1 = htonl(1);
934
935                         if (!out.t2)
936                                 out.t2 = htonl(1);
937                 }
938
939                 if (!request) {
940                         uint8_t *odata, *end = ((uint8_t*)ia) + htons(ia->len) + 4;
941                         uint16_t otype, olen;
942
943                         dhcpv6_for_each_option((uint8_t*)&ia[1], end, otype, olen, odata) {
944                                 struct dhcpv6_ia_prefix *p = (struct dhcpv6_ia_prefix*)&odata[-4];
945                                 struct dhcpv6_ia_addr *n = (struct dhcpv6_ia_addr*)&odata[-4];
946                                 bool found = false;
947
948                                 if ((otype != DHCPV6_OPT_IA_PREFIX || olen < sizeof(*p) - 4) &&
949                                                 (otype != DHCPV6_OPT_IA_ADDR || olen < sizeof(*n) - 4))
950                                         continue;
951
952                                 if (a) {
953                                         struct odhcpd_ipaddr *addrs = (a->managed) ? a->managed : iface->addr6;
954                                         size_t addrlen = (a->managed) ? (size_t)a->managed_size : iface->addr6_len;
955
956                                         for (size_t i = 0; i < addrlen; ++i) {
957                                                 if (!valid_addr(&addrs[i], now))
958                                                         continue;
959
960                                                 struct in6_addr addr = addrs[i].addr.in6;
961                                                 if (ia->type == htons(DHCPV6_OPT_IA_PD)) {
962                                                         addr.s6_addr32[1] |= htonl(a->assigned);
963                                                         addr.s6_addr32[2] = addr.s6_addr32[3] = 0;
964
965                                                         if (!memcmp(&p->addr, &addr, sizeof(addr)) &&
966                                                                         p->prefix == ((a->managed) ? addrs[i].prefix : a->length))
967                                                                 found = true;
968                                                 } else {
969                                                         addr.s6_addr32[3] = htonl(a->assigned);
970
971                                                         if (!memcmp(&n->addr, &addr, sizeof(addr)))
972                                                                 found = true;
973                                                 }
974                                         }
975                                 }
976
977                                 if (!found) {
978                                         if (otype == DHCPV6_OPT_IA_PREFIX) {
979                                                 struct dhcpv6_ia_prefix inv = {
980                                                         .type = htons(DHCPV6_OPT_IA_PREFIX),
981                                                         .len = htons(sizeof(inv) - 4),
982                                                         .preferred = 0,
983                                                         .valid = 0,
984                                                         .prefix = p->prefix,
985                                                         .addr = p->addr
986                                                 };
987
988                                                 if (datalen + sizeof(inv) > buflen)
989                                                         continue;
990
991                                                 memcpy(buf + datalen, &inv, sizeof(inv));
992                                                 datalen += sizeof(inv);
993                                         } else {
994                                                 struct dhcpv6_ia_addr inv = {
995                                                         .type = htons(DHCPV6_OPT_IA_ADDR),
996                                                         .len = htons(sizeof(inv) - 4),
997                                                         .addr = n->addr,
998                                                         .preferred = 0,
999                                                         .valid = 0
1000                                                 };
1001
1002                                                 if (datalen + sizeof(inv) > buflen)
1003                                                         continue;
1004
1005                                                 memcpy(buf + datalen, &inv, sizeof(inv));
1006                                                 datalen += sizeof(inv);
1007                                         }
1008                                 }
1009                         }
1010                 }
1011         }
1012
1013         out.len = htons(datalen - 4);
1014         memcpy(buf, &out, sizeof(out));
1015         return datalen;
1016 }
1017
1018 struct log_ctxt {
1019         char *buf;
1020         int buf_len;
1021         int buf_idx;
1022 };
1023
1024 static void dhcpv6_log_ia_addr(struct in6_addr *addr, int prefix, _unused uint32_t pref,
1025                                 _unused uint32_t valid, void *arg)
1026 {
1027         struct log_ctxt *ctxt = (struct log_ctxt *)arg;
1028         char addrbuf[INET6_ADDRSTRLEN];
1029
1030         inet_ntop(AF_INET6, addr, addrbuf, sizeof(addrbuf));
1031         ctxt->buf_idx += snprintf(ctxt->buf + ctxt->buf_idx, ctxt->buf_len - ctxt->buf_idx,
1032                                         "%s/%d ", addrbuf, prefix);
1033 }
1034
1035 static void dhcpv6_log(uint8_t msgtype, struct interface *iface, time_t now,
1036                 const char *duidbuf, bool is_pd, struct dhcpv6_assignment *a, int code)
1037 {
1038         const char *type = "UNKNOWN";
1039         const char *status = "UNKNOWN";
1040
1041         switch (msgtype) {
1042         case DHCPV6_MSG_SOLICIT:
1043                 type = "SOLICIT";
1044                 break;
1045         case DHCPV6_MSG_REQUEST:
1046                 type = "REQUEST";
1047                 break;
1048         case DHCPV6_MSG_CONFIRM:
1049                 type = "CONFIRM";
1050                 break;
1051         case DHCPV6_MSG_RENEW:
1052                 type = "RENEW";
1053                 break;
1054         case DHCPV6_MSG_REBIND:
1055                 type = "REBIND";
1056                 break;
1057         case DHCPV6_MSG_RELEASE:
1058                 type = "RELEASE";
1059                 break;
1060         case DHCPV6_MSG_DECLINE:
1061                 type = "DECLINE";
1062                 break;
1063         }
1064
1065         switch (code) {
1066         case DHCPV6_STATUS_OK:
1067                 status = "ok";
1068                 break;
1069         case DHCPV6_STATUS_NOADDRSAVAIL:
1070                 status = "no addresses available";
1071                 break;
1072         case DHCPV6_STATUS_NOBINDING:
1073                 status = "no binding";
1074                 break;
1075         case DHCPV6_STATUS_NOTONLINK:
1076                 status = "not on-link";
1077                 break;
1078         case DHCPV6_STATUS_NOPREFIXAVAIL:
1079                 status = "no prefix available";
1080                 break;
1081         }
1082
1083         char leasebuf[256] = "";
1084
1085         if (a) {
1086                 struct log_ctxt ctxt = {.buf = leasebuf,
1087                                         .buf_len = sizeof(leasebuf),
1088                                         .buf_idx = 0 };
1089
1090                 dhcpv6_enum_ia_addrs(iface, a, now, dhcpv6_log_ia_addr, &ctxt);
1091         }
1092
1093         syslog(LOG_WARNING, "DHCPV6 %s %s from %s on %s: %s %s", type, (is_pd) ? "IA_PD" : "IA_NA",
1094                         duidbuf, iface->ifname, status, leasebuf);
1095 }
1096
1097 static bool dhcpv6_ia_on_link(const struct dhcpv6_ia_hdr *ia, struct dhcpv6_assignment *a,
1098                 struct interface *iface)
1099 {
1100         struct odhcpd_ipaddr *addrs = (a->managed) ? a->managed : iface->addr6;
1101         size_t addrlen = (a->managed) ? (size_t)a->managed_size : iface->addr6_len;
1102         time_t now = odhcpd_time();
1103         uint8_t *odata, *end = ((uint8_t*)ia) + htons(ia->len) + 4;
1104         uint16_t otype, olen;
1105         bool onlink = false;
1106
1107         dhcpv6_for_each_option((uint8_t*)&ia[1], end, otype, olen, odata) {
1108                 struct dhcpv6_ia_prefix *p = (struct dhcpv6_ia_prefix*)&odata[-4];
1109                 struct dhcpv6_ia_addr *n = (struct dhcpv6_ia_addr*)&odata[-4];
1110
1111                 if ((otype != DHCPV6_OPT_IA_PREFIX || olen < sizeof(*p) - 4) &&
1112                                 (otype != DHCPV6_OPT_IA_ADDR || olen < sizeof(*n) - 4))
1113                         continue;
1114
1115                 for (size_t i = 0; i < addrlen; ++i) {
1116                         struct in6_addr addr = addrs[i].addr.in6;
1117
1118                         if (!valid_addr(&addrs[i], now))
1119                                 continue;
1120
1121                         if (ia->type == htons(DHCPV6_OPT_IA_PD)) {
1122                                 addr.s6_addr32[1] |= htonl(a->assigned);
1123                                 addr.s6_addr32[2] = addr.s6_addr32[3] = 0;
1124
1125                                 if (memcmp(&p->addr, &addr, sizeof(addr)) ||
1126                                                 p->prefix != ((a->managed) ? addrs[i].prefix : a->length))
1127                                         continue;
1128                         } else {
1129                                 addr.s6_addr32[3] = htonl(a->assigned);
1130
1131                                 if (memcmp(&n->addr, &addr, sizeof(addr)))
1132                                         continue;
1133                         }
1134                         onlink = true;
1135                 }
1136
1137                 if (!onlink)
1138                         break;
1139         }
1140
1141         return onlink;
1142 }
1143
1144 ssize_t dhcpv6_handle_ia(uint8_t *buf, size_t buflen, struct interface *iface,
1145                 const struct sockaddr_in6 *addr, const void *data, const uint8_t *end)
1146 {
1147         time_t now = odhcpd_time();
1148         size_t response_len = 0;
1149         const struct dhcpv6_client_header *hdr = data;
1150         uint8_t *start = (uint8_t*)&hdr[1], *odata;
1151         uint16_t otype, olen;
1152         /* Find and parse client-id and hostname */
1153         bool accept_reconf = false;
1154         uint8_t *clid_data = NULL, clid_len = 0, mac[6] = {0xff, 0xff, 0xff, 0xff, 0xff, 0xff};
1155         char hostname[256];
1156         size_t hostname_len = 0;
1157         bool notonlink = false;
1158         char duidbuf[261];
1159
1160         dhcpv6_for_each_option(start, end, otype, olen, odata) {
1161                 if (otype == DHCPV6_OPT_CLIENTID) {
1162                         clid_data = odata;
1163                         clid_len = olen;
1164
1165                         if (olen == 14 && odata[0] == 0 && odata[1] == 1)
1166                                 memcpy(mac, &odata[8], sizeof(mac));
1167                         else if (olen == 10 && odata[0] == 0 && odata[1] == 3)
1168                                 memcpy(mac, &odata[4], sizeof(mac));
1169
1170                         if (olen <= 130)
1171                                 odhcpd_hexlify(duidbuf, odata, olen);
1172                 } else if (otype == DHCPV6_OPT_FQDN && olen >= 2 && olen <= 255) {
1173                         uint8_t fqdn_buf[256];
1174                         memcpy(fqdn_buf, odata, olen);
1175                         fqdn_buf[olen++] = 0;
1176
1177                         if (dn_expand(&fqdn_buf[1], &fqdn_buf[olen], &fqdn_buf[1], hostname, sizeof(hostname)) > 0)
1178                                 hostname_len = strcspn(hostname, ".");
1179                 } else if (otype == DHCPV6_OPT_RECONF_ACCEPT)
1180                         accept_reconf = true;
1181         }
1182
1183         if (!clid_data || !clid_len || clid_len > 130)
1184                 goto out;
1185
1186         struct dhcpv6_assignment *first = NULL;
1187         dhcpv6_for_each_option(start, end, otype, olen, odata) {
1188                 bool is_pd = (otype == DHCPV6_OPT_IA_PD);
1189                 bool is_na = (otype == DHCPV6_OPT_IA_NA);
1190                 bool ia_addr_present = false;
1191                 if (!is_pd && !is_na)
1192                         continue;
1193
1194                 struct dhcpv6_ia_hdr *ia = (struct dhcpv6_ia_hdr*)&odata[-4];
1195                 size_t ia_response_len = 0;
1196                 uint8_t reqlen = (is_pd) ? 62 : 128;
1197                 uint32_t reqhint = 0;
1198
1199                 /* Parse request hint for IA-PD */
1200                 if (is_pd) {
1201                         uint8_t *sdata;
1202                         uint16_t stype, slen;
1203                         dhcpv6_for_each_option(&ia[1], odata + olen, stype, slen, sdata) {
1204                                 if (stype != DHCPV6_OPT_IA_PREFIX || slen < sizeof(struct dhcpv6_ia_prefix) - 4)
1205                                         continue;
1206
1207                                 struct dhcpv6_ia_prefix *p = (struct dhcpv6_ia_prefix*)&sdata[-4];
1208                                 if (p->prefix) {
1209                                         reqlen = p->prefix;
1210                                         reqhint = ntohl(p->addr.s6_addr32[1]);
1211                                         if (reqlen > 32 && reqlen <= 64)
1212                                                 reqhint &= (1U << (64 - reqlen)) - 1;
1213                                 }
1214                         }
1215
1216                         if (reqlen > 64)
1217                                 reqlen = 64;
1218                 } else if (is_na) {
1219                         uint8_t *sdata;
1220                         uint16_t stype, slen;
1221                         dhcpv6_for_each_option(&ia[1], odata + olen, stype, slen, sdata) {
1222                                 if (stype != DHCPV6_OPT_IA_ADDR || slen < sizeof(struct dhcpv6_ia_addr) - 4)
1223                                         continue;
1224
1225                                 ia_addr_present = true;
1226                         }
1227                 }
1228
1229                 /* Find assignment */
1230                 struct dhcpv6_assignment *c, *a = NULL;
1231                 list_for_each_entry(c, &iface->ia_assignments, head) {
1232                         if (((c->clid_len == clid_len && !memcmp(c->clid_data, clid_data, clid_len)) ||
1233                                         (c->clid_len >= clid_len && !c->clid_data[0] && !c->clid_data[1]
1234                                                 && !memcmp(c->mac, mac, sizeof(mac)))) &&
1235                                         (!(c->flags & (OAF_BOUND|OAF_TENTATIVE)) || c->iaid == ia->iaid) &&
1236                                         (INFINITE_VALID(c->valid_until) || now < c->valid_until) &&
1237                                         ((is_pd && c->length <= 64) || (is_na && c->length == 128))) {
1238                                 a = c;
1239
1240                                 /* Reset state */
1241                                 if (a->flags & OAF_BOUND)
1242                                         apply_lease(iface, a, false);
1243
1244                                 memcpy(a->clid_data, clid_data, clid_len);
1245                                 a->clid_len = clid_len;
1246                                 a->iaid = ia->iaid;
1247                                 a->peer = *addr;
1248                                 stop_reconf(a);
1249                                 break;
1250                         }
1251                 }
1252
1253                 /* Generic message handling */
1254                 uint16_t status = DHCPV6_STATUS_OK;
1255                 if (a && a->managed_size < 0)
1256                         return -1;
1257
1258                 if (hdr->msg_type == DHCPV6_MSG_SOLICIT ||
1259                                 hdr->msg_type == DHCPV6_MSG_REQUEST ||
1260                                 (hdr->msg_type == DHCPV6_MSG_REBIND && !a)) {
1261                         bool assigned = !!a;
1262
1263                         if (!a && !iface->no_dynamic_dhcp) {
1264                                 /* Create new binding */
1265                                 a = calloc(1, sizeof(*a) + clid_len);
1266                                 if (a) {
1267                                         a->clid_len = clid_len;
1268                                         a->iaid = ia->iaid;
1269                                         a->length = reqlen;
1270                                         a->peer = *addr;
1271                                         a->assigned = reqhint;
1272                                         /* Set valid time to current time indicating  */
1273                                         /* assignment is not having infinite lifetime */
1274                                         a->valid_until = now;
1275                                         a->iface = iface;
1276
1277                                         if (first)
1278                                                 memcpy(a->key, first->key, sizeof(a->key));
1279                                         else
1280                                                 odhcpd_urandom(a->key, sizeof(a->key));
1281                                         memcpy(a->clid_data, clid_data, clid_len);
1282
1283                                         if (is_pd)
1284                                                 while (!(assigned = assign_pd(iface, a)) &&
1285                                                                 !a->managed_size && ++a->length <= 64);
1286                                         else
1287                                                 assigned = assign_na(iface, a);
1288
1289                                         if (a->managed_size && !assigned)
1290                                                 return -1;
1291                                 }
1292                         }
1293
1294                         if (!assigned || iface->addr6_len == 0)
1295                                 /* Set error status */
1296                                 status = (is_pd) ? DHCPV6_STATUS_NOPREFIXAVAIL : DHCPV6_STATUS_NOADDRSAVAIL;
1297                         else if (hdr->msg_type == DHCPV6_MSG_REQUEST && !dhcpv6_ia_on_link(ia, a, iface)) {
1298                                 /* Send NOTONLINK staus for the IA */
1299                                 status = DHCPV6_STATUS_NOTONLINK;
1300                                 assigned = false;
1301                         } else if (accept_reconf && assigned && !first &&
1302                                         hdr->msg_type != DHCPV6_MSG_REBIND) {
1303                                 size_t handshake_len = 4;
1304                                 buf[0] = 0;
1305                                 buf[1] = DHCPV6_OPT_RECONF_ACCEPT;
1306                                 buf[2] = 0;
1307                                 buf[3] = 0;
1308
1309                                 if (hdr->msg_type == DHCPV6_MSG_REQUEST) {
1310                                         struct dhcpv6_auth_reconfigure auth = {
1311                                                 htons(DHCPV6_OPT_AUTH),
1312                                                 htons(sizeof(auth) - 4),
1313                                                 3, 1, 0,
1314                                                 {htonl(time(NULL)), htonl(++serial)},
1315                                                 1,
1316                                                 {0}
1317                                         };
1318                                         memcpy(auth.key, a->key, sizeof(a->key));
1319                                         memcpy(buf + handshake_len, &auth, sizeof(auth));
1320                                         handshake_len += sizeof(auth);
1321                                 }
1322
1323                                 buf += handshake_len;
1324                                 buflen -= handshake_len;
1325                                 response_len += handshake_len;
1326
1327                                 first = a;
1328                         }
1329
1330                         ia_response_len = append_reply(buf, buflen, status, ia, a, iface,
1331                                                         hdr->msg_type == DHCPV6_MSG_REBIND ? false : true);
1332
1333                         /* Was only a solicitation: mark binding for removal */
1334                         if (assigned && hdr->msg_type == DHCPV6_MSG_SOLICIT) {
1335                                 a->flags &= ~OAF_BOUND;
1336                                 a->flags |= OAF_TENTATIVE;
1337
1338                                 if (!(a->flags & OAF_STATIC))
1339                                         /* Keep tentative assignment around for 60 seconds */
1340                                         a->valid_until = now + 60;
1341                         } else if (assigned &&
1342                                         (hdr->msg_type == DHCPV6_MSG_REQUEST ||
1343                                          hdr->msg_type == DHCPV6_MSG_REBIND)) {
1344                                 if (hostname_len > 0) {
1345                                         a->hostname = realloc(a->hostname, hostname_len + 1);
1346                                         if (a->hostname) {
1347                                                 memcpy(a->hostname, hostname, hostname_len);
1348                                                 a->hostname[hostname_len] = 0;
1349
1350                                                 if (odhcpd_valid_hostname(a->hostname))
1351                                                         a->flags &= ~OAF_BROKEN_HOSTNAME;
1352                                                 else
1353                                                         a->flags |= OAF_BROKEN_HOSTNAME;
1354                                         }
1355                                 }
1356                                 a->accept_reconf = accept_reconf;
1357                                 a->flags &= ~OAF_TENTATIVE;
1358                                 a->flags |= OAF_BOUND;
1359                                 apply_lease(iface, a, true);
1360                         } else if (!assigned && a && a->managed_size == 0) {
1361                                 /* Cleanup failed assignment */
1362                                 free_dhcpv6_assignment(a);
1363                                 a = NULL;
1364                         }
1365                 } else if (hdr->msg_type == DHCPV6_MSG_RENEW ||
1366                                 hdr->msg_type == DHCPV6_MSG_RELEASE ||
1367                                 hdr->msg_type == DHCPV6_MSG_REBIND ||
1368                                 hdr->msg_type == DHCPV6_MSG_DECLINE) {
1369                         if (!a && hdr->msg_type != DHCPV6_MSG_REBIND) {
1370                                 status = DHCPV6_STATUS_NOBINDING;
1371                                 ia_response_len = append_reply(buf, buflen, status, ia, a, iface, false);
1372                         } else if (hdr->msg_type == DHCPV6_MSG_RENEW ||
1373                                         hdr->msg_type == DHCPV6_MSG_REBIND) {
1374                                 ia_response_len = append_reply(buf, buflen, status, ia, a, iface, false);
1375                                 if (a) {
1376                                         a->flags |= OAF_BOUND;
1377                                         apply_lease(iface, a, true);
1378                                 }
1379                         } else if (hdr->msg_type == DHCPV6_MSG_RELEASE) {
1380                                 if (!(a->flags & OAF_STATIC))
1381                                         a->valid_until = now - 1;
1382
1383                                 if (a->flags & OAF_BOUND) {
1384                                         apply_lease(iface, a, false);
1385                                         a->flags &= ~OAF_BOUND;
1386                                 }
1387                         } else if (hdr->msg_type == DHCPV6_MSG_DECLINE && a->length == 128) {
1388                                 a->flags &= ~OAF_BOUND;
1389
1390                                 if (!(a->flags & OAF_STATIC)) {
1391                                         a->clid_len = 0;
1392                                         a->valid_until = now + 3600; /* Block address for 1h */
1393                                 }
1394                         }
1395                 } else if (hdr->msg_type == DHCPV6_MSG_CONFIRM && ia_addr_present) {
1396                         /* Send NOTONLINK for CONFIRM with addr present so that clients restart connection */
1397                         status = DHCPV6_STATUS_NOTONLINK;
1398                         ia_response_len = append_reply(buf, buflen, status, ia, a, iface, true);
1399                         notonlink = true;
1400                 }
1401
1402                 buf += ia_response_len;
1403                 buflen -= ia_response_len;
1404                 response_len += ia_response_len;
1405                 dhcpv6_log(hdr->msg_type, iface, now, duidbuf, is_pd, a, status);
1406         }
1407
1408         if ((hdr->msg_type == DHCPV6_MSG_RELEASE || hdr->msg_type == DHCPV6_MSG_DECLINE || notonlink) &&
1409                         response_len + 6 < buflen) {
1410                 buf[0] = 0;
1411                 buf[1] = DHCPV6_OPT_STATUS;
1412                 buf[2] = 0;
1413                 buf[3] = 2;
1414                 buf[4] = 0;
1415                 buf[5] = (notonlink) ? DHCPV6_STATUS_NOTONLINK : DHCPV6_STATUS_OK;
1416                 response_len += 6;
1417         }
1418
1419         dhcpv6_write_statefile();
1420
1421 out:
1422         return response_len;
1423 }