Check for local addr more often
[project/odhcp6c.git] / src / ra.c
1 /**
2 * Copyright (C) 2012-2013 Steven Barth <steven@midlink.org>
3 *
4 * This program is free software; you can redistribute it and/or modify
5 * it under the terms of the GNU General Public License v2 as published by
6 * the Free Software Foundation.
7 *
8 * This program is distributed in the hope that it will be useful,
9 * but WITHOUT ANY WARRANTY; without even the implied warranty of
10 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
11 * GNU General Public License for more details.
12 *
13 */
14
15 #include <fcntl.h>
16 #include <stdio.h>
17 #include <signal.h>
18 #include <string.h>
19 #include <stddef.h>
20 #include <stdbool.h>
21 #include <syslog.h>
22 #include <unistd.h>
23
24 #include <net/if.h>
25 #include <arpa/inet.h>
26 #include <sys/socket.h>
27 #include <netinet/in.h>
28 #include <netinet/icmp6.h>
29
30 #include <linux/rtnetlink.h>
31
32
33 #include "odhcp6c.h"
34 #include "ra.h"
35
36
37 static int sock = -1;
38 static unsigned if_index = 0;
39 static char if_name[IF_NAMESIZE] = {0};
40 static volatile int rs_attempt = 0;
41 static struct in6_addr lladdr = IN6ADDR_ANY_INIT;
42
43 static void ra_send_rs(int signal __attribute__((unused)));
44
45 int ra_init(const char *ifname, const struct in6_addr *ifid)
46 {
47 sock = socket(AF_INET6, SOCK_RAW | SOCK_CLOEXEC, IPPROTO_ICMPV6);
48 if_index = if_nametoindex(ifname);
49 strncpy(if_name, ifname, sizeof(if_name) - 1);
50 lladdr = *ifid;
51
52 // Filter ICMPv6 package types
53 struct icmp6_filter filt;
54 ICMP6_FILTER_SETBLOCKALL(&filt);
55 ICMP6_FILTER_SETPASS(ND_ROUTER_ADVERT, &filt);
56 setsockopt(sock, IPPROTO_ICMPV6, ICMP6_FILTER, &filt, sizeof(filt));
57
58 // Bind to all-nodes
59 struct ipv6_mreq an = {ALL_IPV6_NODES, if_index};
60 setsockopt(sock, IPPROTO_IPV6, IPV6_ADD_MEMBERSHIP, &an, sizeof(an));
61
62 // Let the kernel compute our checksums
63 int val = 2;
64 setsockopt(sock, IPPROTO_RAW, IPV6_CHECKSUM, &val, sizeof(val));
65
66 // This is required by RFC 4861
67 val = 255;
68 setsockopt(sock, IPPROTO_IPV6, IPV6_MULTICAST_HOPS, &val, sizeof(val));
69
70 // Receive multicast hops
71 val = 1;
72 setsockopt(sock, IPPROTO_IPV6, IPV6_RECVHOPLIMIT, &val, sizeof(val));
73
74 // Bind to one device
75 setsockopt(sock, SOL_SOCKET, SO_BINDTODEVICE, ifname, strlen(ifname));
76
77 // Add async-mode
78 const pid_t ourpid = getpid();
79 fcntl(sock, F_SETOWN, ourpid);
80 fcntl(sock, F_SETFL, fcntl(sock, F_GETFL) | O_ASYNC);
81
82 // Send RS
83 signal(SIGALRM, ra_send_rs);
84 ra_send_rs(SIGALRM);
85
86 return 0;
87 }
88
89
90 static void ra_send_rs(int signal __attribute__((unused)))
91 {
92 const struct icmp6_hdr rs = {ND_ROUTER_SOLICIT, 0, 0, {{0}}};
93 const struct sockaddr_in6 dest = {AF_INET6, 0, 0, ALL_IPV6_ROUTERS, if_index};
94 sendto(sock, &rs, sizeof(rs), MSG_DONTWAIT, (struct sockaddr*)&dest, sizeof(dest));
95
96 if (++rs_attempt <= 3)
97 alarm(4);
98 }
99
100
101 static int16_t pref_to_priority(uint8_t flags)
102 {
103 flags = (flags >> 3) & 0x03;
104 return (flags == 0x0) ? 1024 : (flags == 0x1) ? 512 :
105 (flags == 0x3) ? 2048 : -1;
106 }
107
108
109 static void update_proc(const char *sect, const char *opt, uint32_t value)
110 {
111 char buf[64];
112 snprintf(buf, sizeof(buf), "/proc/sys/net/ipv6/%s/%s/%s", sect, if_name, opt);
113
114 int fd = open(buf, O_WRONLY);
115 write(fd, buf, snprintf(buf, sizeof(buf), "%u", value));
116 close(fd);
117 }
118
119
120 bool ra_process(void)
121 {
122 bool found = false;
123 uint8_t buf[1500], cmsg_buf[128];
124 struct nd_router_advert *adv = (struct nd_router_advert*)buf;
125 struct odhcp6c_entry entry = {IN6ADDR_ANY_INIT, 0, 0, IN6ADDR_ANY_INIT, 0, 0, 0};
126 const struct in6_addr any = IN6ADDR_ANY_INIT;
127
128 if (IN6_IS_ADDR_UNSPECIFIED(&lladdr)) {
129 // Autodetect interface-id if not specified
130 FILE *fp = fopen("/proc/net/if_inet6", "r");
131 if (fp) {
132 char addrbuf[33], ifbuf[16];
133 while (fscanf(fp, "%32s %*x %*x %*x %*x %15s", addrbuf, ifbuf) == 2) {
134 if (!strcmp(ifbuf, if_name)) {
135 script_unhexlify((uint8_t*)&lladdr, sizeof(lladdr), addrbuf);
136 break;
137 }
138 }
139 fclose(fp);
140 }
141 }
142
143 while (true) {
144 struct sockaddr_in6 from;
145 struct iovec iov = {buf, sizeof(buf)};
146 struct msghdr msg = {&from, sizeof(from), &iov, 1,
147 cmsg_buf, sizeof(cmsg_buf), 0};
148
149 ssize_t len = recvmsg(sock, &msg, MSG_DONTWAIT);
150 if (len < 0)
151 break;
152 else if (len < (ssize_t)sizeof(*adv))
153 continue;
154
155 int hlim = 0;
156 for (struct cmsghdr *ch = CMSG_FIRSTHDR(&msg); ch != NULL;
157 ch = CMSG_NXTHDR(&msg, ch))
158 if (ch->cmsg_level == IPPROTO_IPV6 &&
159 ch->cmsg_type == IPV6_HOPLIMIT)
160 memcpy(&hlim, CMSG_DATA(ch), sizeof(hlim));
161
162 if (hlim != 255)
163 continue;
164
165 // Stop sending solicits
166 if (rs_attempt > 0) {
167 alarm(0);
168 rs_attempt = 0;
169 }
170
171 if (!found) {
172 odhcp6c_expire();
173 found = true;
174 }
175 uint32_t router_valid = ntohs(adv->nd_ra_router_lifetime);
176
177 // Parse default route
178 entry.target = any;
179 entry.length = 0;
180 entry.router = from.sin6_addr;
181 entry.priority = pref_to_priority(adv->nd_ra_flags_reserved);
182 if (entry.priority < 0)
183 entry.priority = pref_to_priority(0);
184 entry.valid = router_valid;
185 entry.preferred = entry.valid;
186 odhcp6c_update_entry(STATE_RA_ROUTE, &entry);
187
188 // Parse ND parameters
189 if (ntohl(adv->nd_ra_reachable) <= 3600000)
190 update_proc("neigh", "base_reachable_time_ms", ntohl(adv->nd_ra_reachable));
191
192 if (ntohl(adv->nd_ra_retransmit) <= 60000)
193 update_proc("neigh", "retrans_time_ms", ntohl(adv->nd_ra_retransmit));
194
195
196 // Evaluate options
197 struct icmpv6_opt *opt;
198 icmpv6_for_each_option(opt, &adv[1], &buf[len]) {
199 if (opt->type == ND_OPT_MTU) {
200 uint32_t *mtu = (uint32_t*)&opt->data[2];
201 if (ntohl(*mtu) >= 1280 && ntohl(*mtu) <= 65535)
202 update_proc("conf", "mtu", ntohl(*mtu));
203 } else if (opt->type == ND_OPT_ROUTE_INFORMATION && opt->len <= 3) {
204 entry.router = from.sin6_addr;
205 entry.target = any;
206 entry.priority = pref_to_priority(opt->data[1]);
207 entry.length = opt->data[0];
208 uint32_t *valid = (uint32_t*)&opt->data[2];
209 entry.valid = ntohl(*valid);
210 memcpy(&entry.target, &opt->data[6], (opt->len - 1) * 8);
211
212 if (entry.length > 128 || IN6_IS_ADDR_LINKLOCAL(&entry.target)
213 || IN6_IS_ADDR_LOOPBACK(&entry.target)
214 || IN6_IS_ADDR_MULTICAST(&entry.target))
215 continue;
216
217 if (entry.priority > 0)
218 odhcp6c_update_entry(STATE_RA_ROUTE, &entry);
219 } else if (opt->type == ND_OPT_PREFIX_INFORMATION && opt->len == 4) {
220 struct nd_opt_prefix_info *pinfo = (struct nd_opt_prefix_info*)opt;
221 entry.router = any;
222 entry.target = pinfo->nd_opt_pi_prefix;
223 entry.priority = 256;
224 entry.length = pinfo->nd_opt_pi_prefix_len;
225 entry.valid = ntohl(pinfo->nd_opt_pi_valid_time);
226 entry.preferred = ntohl(pinfo->nd_opt_pi_preferred_time);
227
228 if (entry.length > 128 || IN6_IS_ADDR_LINKLOCAL(&entry.target)
229 || IN6_IS_ADDR_LOOPBACK(&entry.target)
230 || IN6_IS_ADDR_MULTICAST(&entry.target)
231 || entry.valid < entry.preferred)
232 continue;
233
234 if (pinfo->nd_opt_pi_flags_reserved & ND_OPT_PI_FLAG_ONLINK)
235 odhcp6c_update_entry_safe(STATE_RA_ROUTE, &entry, 7200);
236
237 if (!(pinfo->nd_opt_pi_flags_reserved & ND_OPT_PI_FLAG_AUTO) ||
238 pinfo->nd_opt_pi_prefix_len != 64)
239 continue;
240
241 entry.target.s6_addr32[2] = lladdr.s6_addr32[2];
242 entry.target.s6_addr32[3] = lladdr.s6_addr32[3];
243
244 odhcp6c_update_entry_safe(STATE_RA_PREFIX, &entry, 7200);
245 } else if (opt->type == ND_OPT_RECURSIVE_DNS && opt->len > 2) {
246 entry.router = from.sin6_addr;
247 entry.priority = 0;
248 entry.length = 128;
249 uint32_t *valid = (uint32_t*)&opt->data[2];
250 entry.valid = ntohl(*valid);
251 entry.preferred = 0;
252
253 for (ssize_t i = 0; i < (opt->len - 1) / 2; ++i) {
254 memcpy(&entry.target, &opt->data[6 + i * sizeof(entry.target)],
255 sizeof(entry.target));
256 odhcp6c_update_entry(STATE_RA_DNS, &entry);
257 }
258 }
259 }
260
261 size_t ra_dns_len;
262 struct odhcp6c_entry *entry = odhcp6c_get_state(STATE_RA_DNS, &ra_dns_len);
263 for (size_t i = 0; i < ra_dns_len / sizeof(*entry); ++i)
264 if (IN6_ARE_ADDR_EQUAL(&entry[i].router, &from.sin6_addr) &&
265 entry[i].valid > router_valid)
266 entry[i].valid = router_valid;
267 }
268
269 if (found)
270 odhcp6c_expire();
271
272 return found;
273 }