2 * Copyright (C) 2012-2013 Steven Barth <steven@midlink.org>
4 * This program is free software; you can redistribute it and/or modify
5 * it under the terms of the GNU General Public License v2 as published by
6 * the Free Software Foundation.
8 * This program is distributed in the hope that it will be useful,
9 * but WITHOUT ANY WARRANTY; without even the implied warranty of
10 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
11 * GNU General Public License for more details.
23 #include <net/route.h>
29 static void forward_router_solicitation(const struct interface *iface);
30 static void forward_router_advertisement(uint8_t *data, size_t len);
32 static void handle_icmpv6(void *addr, void *data, size_t len,
33 struct interface *iface);
34 static void send_router_advert(struct uloop_timeout *event);
35 static void sigusr1_refresh(int signal);
37 static struct odhcpd_event router_event = {{.fd = -1}, handle_icmpv6};
39 static FILE *fp_route = NULL;
45 int sock = socket(AF_INET6, SOCK_RAW | SOCK_CLOEXEC, IPPROTO_ICMPV6);
46 if (sock < 0 && errno != EAFNOSUPPORT) {
47 syslog(LOG_ERR, "Failed to open RAW-socket: %s", strerror(errno));
51 // Let the kernel compute our checksums
53 setsockopt(sock, IPPROTO_RAW, IPV6_CHECKSUM, &val, sizeof(val));
55 // This is required by RFC 4861
57 setsockopt(sock, IPPROTO_IPV6, IPV6_MULTICAST_HOPS, &val, sizeof(val));
58 setsockopt(sock, IPPROTO_IPV6, IPV6_UNICAST_HOPS, &val, sizeof(val));
60 // We need to know the source interface
62 setsockopt(sock, IPPROTO_IPV6, IPV6_RECVPKTINFO, &val, sizeof(val));
63 setsockopt(sock, IPPROTO_IPV6, IPV6_RECVHOPLIMIT, &val, sizeof(val));
67 setsockopt(sock, IPPROTO_IPV6, IPV6_MULTICAST_LOOP, &val, sizeof(val));
69 // Filter ICMPv6 package types
70 struct icmp6_filter filt;
71 ICMP6_FILTER_SETBLOCKALL(&filt);
72 ICMP6_FILTER_SETPASS(ND_ROUTER_ADVERT, &filt);
73 ICMP6_FILTER_SETPASS(ND_ROUTER_SOLICIT, &filt);
74 setsockopt(sock, IPPROTO_ICMPV6, ICMP6_FILTER, &filt, sizeof(filt));
77 router_event.uloop.fd = sock;
78 odhcpd_register(&router_event);
80 if (!(fp_route = fopen("/proc/net/ipv6_route", "r")))
81 syslog(LOG_ERR, "Failed to open routing table: %s",
84 signal(SIGUSR1, sigusr1_refresh);
89 int setup_router_interface(struct interface *iface, bool enable)
91 struct ipv6_mreq all_nodes = {ALL_IPV6_NODES, iface->ifindex};
92 struct ipv6_mreq all_routers = {ALL_IPV6_ROUTERS, iface->ifindex};
94 uloop_timeout_cancel(&iface->timer_rs);
95 iface->timer_rs.cb = NULL;
97 setsockopt(router_event.uloop.fd, IPPROTO_IPV6, IPV6_DROP_MEMBERSHIP,
98 &all_nodes, sizeof(all_nodes));
99 setsockopt(router_event.uloop.fd, IPPROTO_IPV6, IPV6_DROP_MEMBERSHIP,
100 &all_routers, sizeof(all_routers));
104 send_router_advert(&iface->timer_rs);
106 void *mreq = &all_routers;
108 if (iface->ra == RELAYD_RELAY && iface->master) {
110 forward_router_solicitation(iface);
111 } else if (iface->ra == RELAYD_SERVER && !iface->master) {
112 iface->timer_rs.cb = send_router_advert;
113 send_router_advert(&iface->timer_rs);
116 if (iface->ra == RELAYD_RELAY || (iface->ra == RELAYD_SERVER && !iface->master))
117 setsockopt(router_event.uloop.fd, IPPROTO_IPV6,
118 IPV6_ADD_MEMBERSHIP, mreq, sizeof(all_nodes));
124 // Signal handler to resend all RDs
125 static void sigusr1_refresh(_unused int signal)
127 struct interface *iface;
128 list_for_each_entry(iface, &interfaces, head)
129 if (iface->ra == RELAYD_SERVER && !iface->master)
130 uloop_timeout_set(&iface->timer_rs, 1000);
134 // Event handler for incoming ICMPv6 packets
135 static void handle_icmpv6(_unused void *addr, void *data, size_t len,
136 struct interface *iface)
138 struct icmp6_hdr *hdr = data;
139 if ((iface->ra == RELAYD_SERVER && !iface->master)) { // Server mode
140 if (hdr->icmp6_type == ND_ROUTER_SOLICIT)
141 send_router_advert(&iface->timer_rs);
142 } else if (iface->ra == RELAYD_RELAY) { // Relay mode
143 if (hdr->icmp6_type == ND_ROUTER_ADVERT && iface->master)
144 forward_router_advertisement(data, len);
145 else if (hdr->icmp6_type == ND_ROUTER_SOLICIT && !iface->master)
146 forward_router_solicitation(odhcpd_get_master_interface());
151 static bool match_route(const struct odhcpd_ipaddr *n, const struct in6_addr *addr)
154 return ntohl(n->addr.s6_addr32[0]) >> (32 - n->prefix) ==
155 ntohl(addr->s6_addr32[0]) >> (32 - n->prefix);
157 if (n->addr.s6_addr32[0] != addr->s6_addr32[0])
160 return ntohl(n->addr.s6_addr32[1]) >> (64 - n->prefix) ==
161 ntohl(addr->s6_addr32[1]) >> (64 - n->prefix);
165 // Detect whether a default route exists, also find the source prefixes
166 static bool parse_routes(struct odhcpd_ipaddr *n, ssize_t len)
170 char line[512], ifname[16];
171 bool found_default = false;
172 struct odhcpd_ipaddr p = {IN6ADDR_ANY_INIT, 0, 0, 0};
173 while (fgets(line, sizeof(line), fp_route)) {
175 if (sscanf(line, "00000000000000000000000000000000 00 "
176 "%*s %*s %*s %*s %*s %*s %*s %15s", ifname) &&
177 strcmp(ifname, "lo")) {
178 found_default = true;
179 } else if (sscanf(line, "%8" SCNx32 "%8" SCNx32 "%*8" SCNx32 "%*8" SCNx32 " %hhx %*s "
180 "%*s 00000000000000000000000000000000 %*s %*s %*s %" SCNx32 " lo",
181 &p.addr.s6_addr32[0], &p.addr.s6_addr32[1], &p.prefix, &rflags) &&
182 p.prefix > 0 && (rflags & RTF_NONEXTHOP) && (rflags & RTF_REJECT)) {
183 // Find source prefixes by scanning through unreachable-routes
184 p.addr.s6_addr32[0] = htonl(p.addr.s6_addr32[0]);
185 p.addr.s6_addr32[1] = htonl(p.addr.s6_addr32[1]);
187 for (ssize_t i = 0; i < len; ++i) {
188 if (n[i].prefix <= 64 && n[i].prefix >= p.prefix &&
189 match_route(&p, &n[i].addr)) {
190 n[i].prefix = p.prefix;
198 return found_default;
202 // Router Advert server mode
203 static void send_router_advert(struct uloop_timeout *event)
205 struct interface *iface =
206 container_of(event, struct interface, timer_rs);
208 int mtu = odhcpd_get_interface_mtu(iface->ifname);
213 struct nd_router_advert h;
214 struct icmpv6_opt lladdr;
215 struct nd_opt_mtu mtu;
216 struct nd_opt_prefix_info prefix[RELAYD_MAX_PREFIXES];
218 .h = {{.icmp6_type = ND_ROUTER_ADVERT, .icmp6_code = 0}, 0, 0},
219 .lladdr = {ND_OPT_SOURCE_LINKADDR, 1, {0}},
220 .mtu = {ND_OPT_MTU, 1, 0, htonl(mtu)},
222 adv.h.nd_ra_flags_reserved = ND_RA_FLAG_OTHER;
223 if (iface->managed >= RELAYD_MANAGED_MFLAG)
224 adv.h.nd_ra_flags_reserved |= ND_RA_FLAG_MANAGED;
226 if (iface->route_preference < 0)
227 adv.h.nd_ra_flags_reserved |= ND_RA_PREF_LOW;
228 else if (iface->route_preference > 0)
229 adv.h.nd_ra_flags_reserved |= ND_RA_PREF_HIGH;
230 odhcpd_get_mac(iface, adv.lladdr.data);
232 // If not currently shutting down
233 struct odhcpd_ipaddr addrs[RELAYD_MAX_PREFIXES];
238 ipcnt = odhcpd_get_interface_addresses(iface->ifindex,
239 addrs, ARRAY_SIZE(addrs));
241 // Check default route
242 if (parse_routes(addrs, ipcnt) || iface->default_router > 1)
243 adv.h.nd_ra_router_lifetime =
244 htons(3 * MaxRtrAdvInterval);
247 // Construct Prefix Information options
248 bool have_public = false;
251 struct in6_addr *dns_addr = NULL;
252 uint32_t dns_time = 0;
255 for (ssize_t i = 0; i < ipcnt; ++i) {
256 struct odhcpd_ipaddr *addr = &addrs[i];
257 if (addr->prefix > 64)
258 continue; // Address not suitable
260 if (addr->preferred > MaxPreferredTime)
261 addr->preferred = MaxPreferredTime;
263 if (addr->valid > MaxValidTime)
264 addr->valid = MaxValidTime;
266 struct nd_opt_prefix_info *p = NULL;
267 for (size_t i = 0; i < cnt; ++i) {
268 if (!memcmp(&adv.prefix[i].nd_opt_pi_prefix,
274 if (cnt >= ARRAY_SIZE(adv.prefix))
277 p = &adv.prefix[cnt++];
280 if ((addr->addr.s6_addr[0] & 0xfe) != 0xfc && addr->preferred > 0)
283 memcpy(&p->nd_opt_pi_prefix, &addr->addr, 8);
284 p->nd_opt_pi_type = ND_OPT_PREFIX_INFORMATION;
285 p->nd_opt_pi_len = 4;
286 p->nd_opt_pi_prefix_len = 64;
287 p->nd_opt_pi_flags_reserved = 0;
288 if (!iface->ra_not_onlink)
289 p->nd_opt_pi_flags_reserved |= ND_OPT_PI_FLAG_ONLINK;
290 if (iface->managed < RELAYD_MANAGED_NO_AFLAG)
291 p->nd_opt_pi_flags_reserved |= ND_OPT_PI_FLAG_AUTO;
292 p->nd_opt_pi_valid_time = htonl(addr->valid);
293 p->nd_opt_pi_preferred_time = htonl(addr->preferred);
295 if (addr->preferred > dns_time) {
296 dns_time = addr->preferred;
297 dns_addr = &addr->addr;
301 if (!have_public && !iface->default_router && adv.h.nd_ra_router_lifetime) {
302 syslog(LOG_WARNING, "A default route is present but there is no public prefix "
303 "on %s thus we don't announce a default route!", iface->ifname);
304 adv.h.nd_ra_router_lifetime = 0;
307 if (have_public && iface->deprecate_ula_if_public_avail)
308 for (size_t i = 0; i < cnt; ++i)
309 if ((adv.prefix[i].nd_opt_pi_prefix.s6_addr[0] & 0xfe) == 0xfc)
310 adv.prefix[i].nd_opt_pi_preferred_time = 0;
313 if (iface->dns_cnt > 0) {
314 dns_addr = iface->dns;
315 dns_cnt = iface->dns_cnt;
316 dns_time = 2 * MaxRtrAdvInterval;
328 } dns = {ND_OPT_RECURSIVE_DNS, (1 + (2 * dns_cnt)), 0, 0, htonl(dns_time)};
332 // DNS Search options
333 uint8_t search_buf[256], *search_domain = iface->search;
334 size_t search_len = iface->search_len, search_padded = 0;
336 if (!search_domain && !res_init() && _res.dnsrch[0] && _res.dnsrch[0][0]) {
337 int len = dn_comp(_res.dnsrch[0], search_buf,
338 sizeof(search_buf), NULL, NULL);
340 search_domain = search_buf;
346 search_padded = ((search_len + 7) & (~7)) + 8;
355 } *search = malloc(sizeof(*search) + search_padded);
356 search->type = ND_OPT_DNS_SEARCH;
357 search->len = search_len ? ((sizeof(*search) + search_padded) / 8) : 0;
360 search->lifetime = htonl(2 * MaxRtrAdvInterval);;
361 memcpy(search->name, search_domain, search_len);
362 memset(&search->name[search_len], 0, search_padded - search_len);
365 size_t routes_cnt = 0;
373 } routes[RELAYD_MAX_PREFIXES];
375 for (ssize_t i = 0; i < ipcnt; ++i) {
376 struct odhcpd_ipaddr *addr = &addrs[i];
377 if (addr->prefix > 64 || addr->prefix == 0) {
378 continue; // Address not suitable
379 } else if (addr->prefix > 32) {
380 addr->addr.s6_addr32[1] &= htonl(~((1U << (64 - addr->prefix)) - 1));
381 } else if (addr->prefix <= 32) {
382 addr->addr.s6_addr32[0] &= htonl(~((1U << (32 - addr->prefix)) - 1));
383 addr->addr.s6_addr32[1] = 0;
386 routes[routes_cnt].type = ND_OPT_ROUTE_INFO;
387 routes[routes_cnt].len = sizeof(*routes) / 8;
388 routes[routes_cnt].prefix = addr->prefix;
389 routes[routes_cnt].flags = 0;
390 if (iface->route_preference < 0)
391 routes[routes_cnt].flags |= ND_RA_PREF_LOW;
392 else if (iface->route_preference > 0)
393 routes[routes_cnt].flags |= ND_RA_PREF_HIGH;
394 routes[routes_cnt].lifetime = htonl(addr->valid);
395 routes[routes_cnt].addr[0] = addr->addr.s6_addr32[0];
396 routes[routes_cnt].addr[1] = addr->addr.s6_addr32[1];
397 routes[routes_cnt].addr[2] = addr->addr.s6_addr32[2];
398 routes[routes_cnt].addr[3] = addr->addr.s6_addr32[3];
404 struct iovec iov[] = {{&adv, (uint8_t*)&adv.prefix[cnt] - (uint8_t*)&adv},
405 {&routes, routes_cnt * sizeof(*routes)},
406 {&dns, (dns_cnt) ? sizeof(dns) : 0},
407 {dns_addr, dns_cnt * sizeof(*dns_addr)},
408 {search, search->len * 8}};
409 struct sockaddr_in6 all_nodes = {AF_INET6, 0, 0, ALL_IPV6_NODES, 0};
410 odhcpd_send(router_event.uloop.fd,
411 &all_nodes, iov, ARRAY_SIZE(iov), iface);
416 odhcpd_urandom(&msecs, sizeof(msecs));
417 msecs = (labs(msecs) % (1000 * (MaxRtrAdvInterval
418 - MinRtrAdvInterval))) + (MinRtrAdvInterval * 1000);
419 uloop_timeout_set(&iface->timer_rs, msecs);
423 // Forward router solicitation
424 static void forward_router_solicitation(const struct interface *iface)
429 struct icmp6_hdr rs = {ND_ROUTER_SOLICIT, 0, 0, {{0}}};
430 struct iovec iov = {&rs, sizeof(rs)};
431 struct sockaddr_in6 all_routers =
432 {AF_INET6, 0, 0, ALL_IPV6_ROUTERS, iface->ifindex};
434 syslog(LOG_NOTICE, "Sending RS to %s", iface->ifname);
435 odhcpd_send(router_event.uloop.fd, &all_routers, &iov, 1, iface);
439 // Handler for incoming router solicitations on slave interfaces
440 static void forward_router_advertisement(uint8_t *data, size_t len)
442 struct nd_router_advert *adv = (struct nd_router_advert *)data;
445 uint8_t *end = data + len;
446 uint8_t *mac_ptr = NULL;
447 struct in6_addr *dns_ptr = NULL;
448 size_t dns_count = 0;
450 struct icmpv6_opt *opt;
451 icmpv6_for_each_option(opt, &adv[1], end) {
452 if (opt->type == ND_OPT_SOURCE_LINKADDR) {
453 // Store address of source MAC-address
455 } else if (opt->type == ND_OPT_RECURSIVE_DNS && opt->len > 1) {
456 // Check if we have to rewrite DNS
457 dns_ptr = (struct in6_addr*)&opt->data[6];
458 dns_count = (opt->len - 1) / 2;
462 syslog(LOG_NOTICE, "Got a RA");
464 // Indicate a proxy, however we don't follow the rest of RFC 4389 yet
465 adv->nd_ra_flags_reserved |= ND_RA_FLAG_PROXY;
467 // Forward advertisement to all slave interfaces
468 struct sockaddr_in6 all_nodes = {AF_INET6, 0, 0, ALL_IPV6_NODES, 0};
469 struct iovec iov = {data, len};
471 struct odhcpd_ipaddr addr;
472 struct interface *iface;
473 list_for_each_entry(iface, &interfaces, head) {
474 if (iface->ra != RELAYD_RELAY || iface->master)
477 // Fixup source hardware address option
479 odhcpd_get_mac(iface, mac_ptr);
481 // If we have to rewrite DNS entries
482 if (iface->always_rewrite_dns && dns_ptr && dns_count > 0) {
483 const struct in6_addr *rewrite = iface->dns;
484 size_t rewrite_cnt = iface->dns_cnt;
486 if (rewrite_cnt == 0) {
487 if (odhcpd_get_interface_addresses(iface->ifindex, &addr, 1) < 1)
488 continue; // Unable to comply
490 rewrite = &addr.addr;
494 // Copy over any other addresses
495 for (size_t i = 0; i < dns_count; ++i) {
496 size_t j = (i < rewrite_cnt) ? i : rewrite_cnt - 1;
497 dns_ptr[i] = rewrite[j];
501 odhcpd_send(router_event.uloop.fd, &all_nodes, &iov, 1, iface);