2 * Copyright (C) 2013 Steven Barth <steven@midlink.org>
3 * Copyright (C) 2016 Hans Dedecker <dedeckeh@gmail.com>
5 * This program is free software; you can redistribute it and/or modify
6 * it under the terms of the GNU General Public License v2 as published by
7 * the Free Software Foundation.
9 * This program is distributed in the hope that it will be useful,
10 * but WITHOUT ANY WARRANTY; without even the implied warranty of
11 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
12 * GNU General Public License for more details.
32 #include <arpa/inet.h>
33 #include <sys/timerfd.h>
35 #include <libubox/md5.h>
36 #include <libubox/usock.h>
38 #define ADDR_ENTRY_VALID_IA_ADDR(iface, i, m, addrs) \
39 ((iface)->dhcpv6_assignall || (i) == (m) || \
40 (addrs)[(i)].prefix > 64)
42 static void dhcpv6_netevent_cb(unsigned long event
, struct netevent_handler_info
*info
);
43 static void free_dhcpv6_assignment(struct dhcpv6_assignment
*c
);
44 static void set_border_assignment_size(struct interface
*iface
, struct dhcpv6_assignment
*b
);
45 static void handle_addrlist_change(struct netevent_handler_info
*info
);
46 static void start_reconf(struct dhcpv6_assignment
*a
);
47 static void stop_reconf(struct dhcpv6_assignment
*a
);
48 static void valid_until_cb(struct uloop_timeout
*event
);
50 static struct netevent_handler dhcpv6_netevent_handler
= { .cb
= dhcpv6_netevent_cb
, };
51 static struct uloop_timeout valid_until_timeout
= {.cb
= valid_until_cb
};
52 static uint32_t serial
= 0;
53 static uint8_t statemd5
[16];
55 int dhcpv6_ia_init(void)
57 uloop_timeout_set(&valid_until_timeout
, 1000);
59 netlink_add_netevent_handler(&dhcpv6_netevent_handler
);
64 int dhcpv6_setup_ia_interface(struct interface
*iface
, bool enable
)
66 if (!enable
&& iface
->ia_assignments
.next
) {
67 struct dhcpv6_assignment
*c
;
69 while (!list_empty(&iface
->ia_assignments
)) {
70 c
= list_first_entry(&iface
->ia_assignments
, struct dhcpv6_assignment
, head
);
71 free_dhcpv6_assignment(c
);
75 if (enable
&& iface
->dhcpv6
== MODE_SERVER
) {
76 struct dhcpv6_assignment
*border
;
79 if (!iface
->ia_assignments
.next
)
80 INIT_LIST_HEAD(&iface
->ia_assignments
);
82 if (list_empty(&iface
->ia_assignments
)) {
83 border
= calloc(1, sizeof(*border
));
86 syslog(LOG_ERR
, "Calloc failed for border on interface %s", iface
->ifname
);
91 list_add(&border
->head
, &iface
->ia_assignments
);
93 border
= list_last_entry(&iface
->ia_assignments
, struct dhcpv6_assignment
, head
);
95 set_border_assignment_size(iface
, border
);
97 /* Parse static entries */
98 list_for_each_entry(lease
, &leases
, head
) {
100 size_t duid_len
= lease
->duid_len
? lease
->duid_len
: 14;
101 struct dhcpv6_assignment
*a
= calloc(1, sizeof(*a
) + duid_len
);
103 syslog(LOG_ERR
, "Calloc failed for static lease assignment on interface %s",
108 a
->leasetime
= lease
->dhcpv4_leasetime
;
110 a
->clid_len
= duid_len
;
113 a
->assigned
= lease
->hostid
;
115 uint32_t i4a
= ntohl(lease
->ipaddr
.s_addr
) & 0xff;
116 a
->assigned
= ((i4a
/ 100) << 8) | (((i4a
% 100) / 10) << 4) | (i4a
% 10);
119 odhcpd_urandom(a
->key
, sizeof(a
->key
));
120 memcpy(a
->clid_data
, lease
->duid
, lease
->duid_len
);
121 memcpy(a
->mac
, lease
->mac
.ether_addr_octet
, sizeof(a
->mac
));
122 /* Static assignment */
123 a
->flags
|= OAF_STATIC
;
127 /* Assign to all interfaces */
128 struct dhcpv6_assignment
*c
;
129 list_for_each_entry(c
, &iface
->ia_assignments
, head
) {
130 if (c
->length
!= 128 || c
->assigned
> a
->assigned
) {
131 list_add_tail(&a
->head
, &c
->head
);
133 } else if (c
->assigned
== a
->assigned
)
134 /* Already an assignment with that number */
140 if (lease
->hostname
[0]) {
142 a
->hostname
= strdup(lease
->hostname
);
145 free_dhcpv6_assignment(a
);
152 static void dhcpv6_netevent_cb(unsigned long event
, struct netevent_handler_info
*info
)
154 struct interface
*iface
= info
->iface
;
156 if (!iface
|| iface
->dhcpv6
!= MODE_SERVER
)
160 case NETEV_ADDR6LIST_CHANGE
:
161 handle_addrlist_change(info
);
169 static void free_dhcpv6_assignment(struct dhcpv6_assignment
*c
)
171 if (c
->managed_sock
.fd
.registered
) {
172 ustream_free(&c
->managed_sock
.stream
);
173 close(c
->managed_sock
.fd
.fd
);
187 static inline bool valid_prefix_length(const struct dhcpv6_assignment
*a
, const uint8_t prefix_length
)
189 return (a
->managed_size
|| a
->length
> prefix_length
);
192 static inline bool valid_addr(const struct odhcpd_ipaddr
*addr
, time_t now
)
194 return (addr
->prefix
<= 96 && addr
->preferred
> (uint32_t)now
);
197 static size_t get_preferred_addr(const struct odhcpd_ipaddr
*addrs
, const size_t addrlen
)
201 for (i
= 0, m
= 0; i
< addrlen
; ++i
) {
202 if (addrs
[i
].preferred
> addrs
[m
].preferred
||
203 (addrs
[i
].preferred
== addrs
[m
].preferred
&&
204 memcmp(&addrs
[i
].addr
, &addrs
[m
].addr
, 16) > 0))
211 static int send_reconf(struct dhcpv6_assignment
*assign
)
214 struct dhcpv6_client_header hdr
;
218 uint16_t hardware_type
;
223 struct dhcpv6_auth_reconfigure auth
;
226 uint8_t clid_data
[128];
227 } __attribute__((packed
)) reconf_msg
= {
228 .hdr
= {DHCPV6_MSG_RECONFIGURE
, {0, 0, 0}},
229 .srvid_type
= htons(DHCPV6_OPT_SERVERID
),
230 .srvid_len
= htons(10),
231 .duid_type
= htons(3),
232 .hardware_type
= htons(1),
233 .msg_type
= htons(DHCPV6_OPT_RECONF_MSG
),
235 .msg_id
= DHCPV6_MSG_RENEW
,
236 .auth
= {htons(DHCPV6_OPT_AUTH
),
237 htons(sizeof(reconf_msg
.auth
) - 4), 3, 1, 0,
238 {htonl(time(NULL
)), htonl(++serial
)}, 2, {0}},
239 .clid_type
= htons(DHCPV6_OPT_CLIENTID
),
240 .clid_len
= htons(assign
->clid_len
),
243 struct interface
*iface
= assign
->iface
;
245 odhcpd_get_mac(iface
, reconf_msg
.mac
);
246 memcpy(reconf_msg
.clid_data
, assign
->clid_data
, assign
->clid_len
);
247 struct iovec iov
= {&reconf_msg
, sizeof(reconf_msg
) - 128 + assign
->clid_len
};
250 uint8_t secretbytes
[64];
251 memset(secretbytes
, 0, sizeof(secretbytes
));
252 memcpy(secretbytes
, assign
->key
, sizeof(assign
->key
));
254 for (size_t i
= 0; i
< sizeof(secretbytes
); ++i
)
255 secretbytes
[i
] ^= 0x36;
258 md5_hash(secretbytes
, sizeof(secretbytes
), &md5
);
259 md5_hash(iov
.iov_base
, iov
.iov_len
, &md5
);
260 md5_end(reconf_msg
.auth
.key
, &md5
);
262 for (size_t i
= 0; i
< sizeof(secretbytes
); ++i
) {
263 secretbytes
[i
] ^= 0x36;
264 secretbytes
[i
] ^= 0x5c;
268 md5_hash(secretbytes
, sizeof(secretbytes
), &md5
);
269 md5_hash(reconf_msg
.auth
.key
, 16, &md5
);
270 md5_end(reconf_msg
.auth
.key
, &md5
);
272 return odhcpd_send(iface
->dhcpv6_event
.uloop
.fd
, &assign
->peer
, &iov
, 1, iface
);
275 void dhcpv6_enum_ia_addrs(struct interface
*iface
, struct dhcpv6_assignment
*c
,
276 time_t now
, dhcpv6_binding_cb_handler_t func
, void *arg
)
278 struct odhcpd_ipaddr
*addrs
= (c
->managed
) ? c
->managed
: iface
->addr6
;
279 size_t addrlen
= (c
->managed
) ? (size_t)c
->managed_size
: iface
->addr6_len
;
280 size_t m
= get_preferred_addr(addrs
, addrlen
);
282 for (size_t i
= 0; i
< addrlen
; ++i
) {
283 struct in6_addr addr
;
284 uint32_t pref
, valid
;
285 int prefix
= c
->managed
? addrs
[i
].prefix
: c
->length
;
287 if (!valid_addr(&addrs
[i
], now
))
290 addr
= addrs
[i
].addr
.in6
;
291 pref
= addrs
[i
].preferred
;
292 valid
= addrs
[i
].valid
;
294 if (!ADDR_ENTRY_VALID_IA_ADDR(iface
, i
, m
, addrs
))
297 addr
.s6_addr32
[3] = htonl(c
->assigned
);
299 if (!valid_prefix_length(c
, addrs
[i
].prefix
))
302 addr
.s6_addr32
[1] |= htonl(c
->assigned
);
303 addr
.s6_addr32
[2] = addr
.s6_addr32
[3] = 0;
306 if (pref
!= UINT32_MAX
)
309 if (valid
!= UINT32_MAX
)
312 func(&addr
, prefix
, pref
, valid
, arg
);
319 struct dhcpv6_assignment
*c
;
320 struct interface
*iface
;
326 void dhcpv6_write_ia_addr(struct in6_addr
*addr
, int prefix
, _unused
uint32_t pref
,
327 _unused
uint32_t valid
, void *arg
)
329 struct write_ctxt
*ctxt
= (struct write_ctxt
*)arg
;
330 char ipbuf
[INET6_ADDRSTRLEN
];
332 inet_ntop(AF_INET6
, addr
, ipbuf
, sizeof(ipbuf
) - 1);
334 if (ctxt
->c
->length
== 128 && ctxt
->c
->hostname
) {
335 fputs(ipbuf
, ctxt
->fp
);
338 if (dn_expand(ctxt
->iface
->search
, ctxt
->iface
->search
+ ctxt
->iface
->search_len
,
339 ctxt
->iface
->search
, b
, sizeof(b
)) > 0)
340 fprintf(ctxt
->fp
, "\t%s.%s", ctxt
->c
->hostname
, b
);
342 fprintf(ctxt
->fp
, "\t%s\n", ctxt
->c
->hostname
);
343 md5_hash(ipbuf
, strlen(ipbuf
), &ctxt
->md5
);
344 md5_hash(ctxt
->c
->hostname
, strlen(ctxt
->c
->hostname
), &ctxt
->md5
);
347 ctxt
->buf_idx
+= snprintf(ctxt
->buf
+ ctxt
->buf_idx
,ctxt
->buf_len
- ctxt
->buf_idx
,
348 "%s/%d ", ipbuf
, prefix
);
351 void dhcpv6_write_statefile(void)
353 struct write_ctxt ctxt
;
355 md5_begin(&ctxt
.md5
);
357 if (config
.dhcp_statefile
) {
358 time_t now
= odhcpd_time(), wall_time
= time(NULL
);
359 int fd
= open(config
.dhcp_statefile
, O_CREAT
| O_WRONLY
| O_CLOEXEC
, 0644);
365 ret
= lockf(fd
, F_LOCK
, 0);
370 if (ftruncate(fd
, 0) < 0) {}
372 ctxt
.fp
= fdopen(fd
, "w");
379 ctxt
.buf_len
= sizeof(leasebuf
);
381 list_for_each_entry(ctxt
.iface
, &interfaces
, head
) {
382 if (ctxt
.iface
->dhcpv6
!= MODE_SERVER
&&
383 ctxt
.iface
->dhcpv4
!= MODE_SERVER
)
386 if (ctxt
.iface
->dhcpv6
== MODE_SERVER
&&
387 ctxt
.iface
->ia_assignments
.next
) {
388 list_for_each_entry(ctxt
.c
, &ctxt
.iface
->ia_assignments
, head
) {
389 if (!(ctxt
.c
->flags
& OAF_BOUND
) || ctxt
.c
->managed_size
< 0)
394 odhcpd_hexlify(duidbuf
, ctxt
.c
->clid_data
, ctxt
.c
->clid_len
);
396 /* iface DUID iaid hostname lifetime assigned length [addrs...] */
397 ctxt
.buf_idx
= snprintf(ctxt
.buf
, ctxt
.buf_len
, "# %s %s %x %s %ld %x %u ",
398 ctxt
.iface
->ifname
, duidbuf
, ntohl(ctxt
.c
->iaid
),
399 (ctxt
.c
->hostname
? ctxt
.c
->hostname
: "-"),
400 (ctxt
.c
->valid_until
> now
?
401 (ctxt
.c
->valid_until
- now
+ wall_time
) :
402 (INFINITE_VALID(ctxt
.c
->valid_until
) ? -1 : 0)),
403 ctxt
.c
->assigned
, (unsigned)ctxt
.c
->length
);
405 if (INFINITE_VALID(ctxt
.c
->valid_until
) || ctxt
.c
->valid_until
> now
)
406 dhcpv6_enum_ia_addrs(ctxt
.iface
, ctxt
.c
, now
,
407 dhcpv6_write_ia_addr
, &ctxt
);
409 ctxt
.buf
[ctxt
.buf_idx
- 1] = '\n';
410 fwrite(ctxt
.buf
, 1, ctxt
.buf_idx
, ctxt
.fp
);
414 if (ctxt
.iface
->dhcpv4
== MODE_SERVER
&&
415 ctxt
.iface
->dhcpv4_assignments
.next
) {
416 struct dhcpv4_assignment
*c
;
417 list_for_each_entry(c
, &ctxt
.iface
->dhcpv4_assignments
, head
) {
418 if (!(c
->flags
& OAF_BOUND
))
421 char ipbuf
[INET6_ADDRSTRLEN
];
423 odhcpd_hexlify(duidbuf
, c
->hwaddr
, sizeof(c
->hwaddr
));
425 /* iface DUID iaid hostname lifetime assigned length [addrs...] */
426 ctxt
.buf_idx
= snprintf(ctxt
.buf
, ctxt
.buf_len
, "# %s %s ipv4 %s %ld %x 32 ",
427 ctxt
.iface
->ifname
, duidbuf
,
428 (c
->hostname
? c
->hostname
: "-"),
429 (c
->valid_until
> now
?
430 (c
->valid_until
- now
+ wall_time
) :
431 (INFINITE_VALID(c
->valid_until
) ? -1 : 0)),
434 struct in_addr addr
= {.s_addr
= c
->addr
};
435 inet_ntop(AF_INET
, &addr
, ipbuf
, sizeof(ipbuf
) - 1);
438 fputs(ipbuf
, ctxt
.fp
);
441 if (dn_expand(ctxt
.iface
->search
,
442 ctxt
.iface
->search
+ ctxt
.iface
->search_len
,
443 ctxt
.iface
->search
, b
, sizeof(b
)) > 0)
444 fprintf(ctxt
.fp
, "\t%s.%s", c
->hostname
, b
);
446 fprintf(ctxt
.fp
, "\t%s\n", c
->hostname
);
447 md5_hash(ipbuf
, strlen(ipbuf
), &ctxt
.md5
);
448 md5_hash(c
->hostname
, strlen(c
->hostname
), &ctxt
.md5
);
451 ctxt
.buf_idx
+= snprintf(ctxt
.buf
+ ctxt
.buf_idx
,
452 ctxt
.buf_len
- ctxt
.buf_idx
,
454 ctxt
.buf
[ctxt
.buf_idx
- 1] = '\n';
455 fwrite(ctxt
.buf
, 1, ctxt
.buf_idx
, ctxt
.fp
);
464 md5_end(newmd5
, &ctxt
.md5
);
466 if (config
.dhcp_cb
&& memcmp(newmd5
, statemd5
, sizeof(newmd5
))) {
467 memcpy(statemd5
, newmd5
, sizeof(statemd5
));
468 char *argv
[2] = {config
.dhcp_cb
, NULL
};
470 execv(argv
[0], argv
);
476 static void __apply_lease(struct interface
*iface
, struct dhcpv6_assignment
*a
,
477 struct odhcpd_ipaddr
*addrs
, ssize_t addr_len
, bool add
)
482 for (ssize_t i
= 0; i
< addr_len
; ++i
) {
483 struct in6_addr prefix
= addrs
[i
].addr
.in6
;
484 prefix
.s6_addr32
[1] |= htonl(a
->assigned
);
485 prefix
.s6_addr32
[2] = prefix
.s6_addr32
[3] = 0;
486 netlink_setup_route(&prefix
, (a
->managed_size
) ? addrs
[i
].prefix
: a
->length
,
487 iface
->ifindex
, &a
->peer
.sin6_addr
, 1024, add
);
491 static void apply_lease(struct interface
*iface
, struct dhcpv6_assignment
*a
, bool add
)
493 struct odhcpd_ipaddr
*addrs
= (a
->managed
) ? a
->managed
: iface
->addr6
;
494 ssize_t addrlen
= (a
->managed
) ? a
->managed_size
: (ssize_t
)iface
->addr6_len
;
496 __apply_lease(iface
, a
, addrs
, addrlen
, add
);
499 /* Set border assignment size based on the IPv6 address prefixes */
500 static void set_border_assignment_size(struct interface
*iface
, struct dhcpv6_assignment
*b
)
502 time_t now
= odhcpd_time();
505 for (size_t i
= 0; i
< iface
->addr6_len
; ++i
) {
506 if (iface
->addr6
[i
].preferred
> (uint32_t)now
&&
507 iface
->addr6
[i
].prefix
< 64 &&
508 iface
->addr6
[i
].prefix
> minprefix
)
509 minprefix
= iface
->addr6
[i
].prefix
;
512 if (minprefix
> 32 && minprefix
<= 64)
513 b
->assigned
= 1U << (64 - minprefix
);
518 /* More data was received from TCP connection */
519 static void managed_handle_pd_data(struct ustream
*s
, _unused
int bytes_new
)
521 struct dhcpv6_assignment
*c
= container_of(s
, struct dhcpv6_assignment
, managed_sock
);
522 time_t now
= odhcpd_time();
523 bool first
= c
->managed_size
< 0;
527 char *data
= ustream_get_read_buf(s
, &pending
);
528 char *end
= memmem(data
, pending
, "\n\n", 2);
537 if (c
->accept_reconf
)
541 for (char *line
= strtok_r(data
, "\n", &saveptr
); line
; line
= strtok_r(NULL
, "\n", &saveptr
)) {
542 c
->managed
= realloc(c
->managed
, (c
->managed_size
+ 1) * sizeof(*c
->managed
));
543 struct odhcpd_ipaddr
*n
= &c
->managed
[c
->managed_size
];
545 char *saveptr2
, *x
= strtok_r(line
, "/", &saveptr2
);
546 if (!x
|| inet_pton(AF_INET6
, x
, &n
->addr
) < 1)
549 x
= strtok_r(NULL
, ",", &saveptr2
);
550 if (sscanf(x
, "%hhu", &n
->prefix
) < 1)
553 x
= strtok_r(NULL
, ",", &saveptr2
);
554 if (sscanf(x
, "%u", &n
->preferred
) < 1)
557 x
= strtok_r(NULL
, ",", &saveptr2
);
558 if (sscanf(x
, "%u", &n
->valid
) < 1)
561 if (n
->preferred
> n
->valid
)
564 if (UINT32_MAX
- now
< n
->preferred
)
565 n
->preferred
= UINT32_MAX
;
569 if (UINT32_MAX
- now
< n
->valid
)
570 n
->valid
= UINT32_MAX
;
579 ustream_consume(s
, end
- data
);
582 if (first
&& c
->managed_size
== 0)
583 free_dhcpv6_assignment(c
);
584 else if (first
&& !(c
->flags
& OAF_STATIC
))
585 c
->valid_until
= now
+ 150;
589 /* TCP transmission has ended, either because of success or timeout or other error */
590 static void managed_handle_pd_done(struct ustream
*s
)
592 struct dhcpv6_assignment
*c
= container_of(s
, struct dhcpv6_assignment
, managed_sock
);
594 if (!(c
->flags
& OAF_STATIC
))
595 c
->valid_until
= odhcpd_time() + 15;
599 if (c
->accept_reconf
)
603 static bool assign_pd(struct interface
*iface
, struct dhcpv6_assignment
*assign
)
605 struct dhcpv6_assignment
*c
;
607 if (iface
->dhcpv6_pd_manager
[0]) {
608 int fd
= usock(USOCK_UNIX
| USOCK_TCP
, iface
->dhcpv6_pd_manager
, NULL
);
610 struct pollfd pfd
= { .fd
= fd
, .events
= POLLIN
};
613 odhcpd_hexlify(iaidbuf
, assign
->clid_data
, assign
->clid_len
);
615 assign
->managed_sock
.stream
.notify_read
= managed_handle_pd_data
;
616 assign
->managed_sock
.stream
.notify_state
= managed_handle_pd_done
;
617 ustream_fd_init(&assign
->managed_sock
, fd
);
618 ustream_printf(&assign
->managed_sock
.stream
, "%s,%x\n::/%d,0,0\n\n",
619 iaidbuf
, assign
->iaid
, assign
->length
);
620 ustream_write_pending(&assign
->managed_sock
.stream
);
621 assign
->managed_size
= -1;
623 if (!(assign
->flags
& OAF_STATIC
))
624 assign
->valid_until
= odhcpd_time() + 15;
626 list_add(&assign
->head
, &iface
->ia_assignments
);
628 /* Wait initial period of up to 250ms for immediate assignment */
629 if (poll(&pfd
, 1, 250) < 0) {
630 syslog(LOG_ERR
, "poll(): %m");
634 managed_handle_pd_data(&assign
->managed_sock
.stream
, 0);
636 if (fcntl(fd
, F_GETFL
) >= 0 && assign
->managed_size
> 0)
641 } else if (iface
->addr6_len
< 1)
644 /* Try honoring the hint first */
645 uint32_t current
= 1, asize
= (1 << (64 - assign
->length
)) - 1;
646 if (assign
->assigned
) {
647 list_for_each_entry(c
, &iface
->ia_assignments
, head
) {
648 if (c
->length
== 128 || c
->length
== 0)
651 if (assign
->assigned
>= current
&& assign
->assigned
+ asize
< c
->assigned
) {
652 list_add_tail(&assign
->head
, &c
->head
);
654 if (assign
->flags
& OAF_BOUND
)
655 apply_lease(iface
, assign
, true);
660 if (c
->assigned
!= 0)
661 current
= (c
->assigned
+ (1 << (64 - c
->length
)));
665 /* Fallback to a variable assignment */
667 list_for_each_entry(c
, &iface
->ia_assignments
, head
) {
668 if (c
->length
== 128 || c
->length
== 0)
671 current
= (current
+ asize
) & (~asize
);
672 if (current
+ asize
< c
->assigned
) {
673 assign
->assigned
= current
;
674 list_add_tail(&assign
->head
, &c
->head
);
676 if (assign
->flags
& OAF_BOUND
)
677 apply_lease(iface
, assign
, true);
682 if (c
->assigned
!= 0)
683 current
= (c
->assigned
+ (1 << (64 - c
->length
)));
689 static bool assign_na(struct interface
*iface
, struct dhcpv6_assignment
*assign
)
691 /* Seed RNG with checksum of DUID */
693 for (size_t i
= 0; i
< assign
->clid_len
; ++i
)
694 seed
+= assign
->clid_data
[i
];
697 /* Try to assign up to 100x */
698 for (size_t i
= 0; i
< 100; ++i
) {
700 do try = ((uint32_t)rand()) % 0x0fff; while (try < 0x100);
702 struct dhcpv6_assignment
*c
;
703 list_for_each_entry(c
, &iface
->ia_assignments
, head
) {
707 if (c
->assigned
> try || c
->length
!= 128) {
708 assign
->assigned
= try;
709 list_add_tail(&assign
->head
, &c
->head
);
711 } else if (c
->assigned
== try)
719 static void handle_addrlist_change(struct netevent_handler_info
*info
)
721 struct interface
*iface
= info
->iface
;
722 struct dhcpv6_assignment
*c
, *d
, *border
= list_last_entry(
723 &iface
->ia_assignments
, struct dhcpv6_assignment
, head
);
724 struct list_head reassign
= LIST_HEAD_INIT(reassign
);
725 time_t now
= odhcpd_time();
727 list_for_each_entry(c
, &iface
->ia_assignments
, head
) {
728 if (c
!= border
&& iface
->ra_managed
== RA_MANAGED_NO_MFLAG
729 && (c
->flags
& OAF_BOUND
))
730 __apply_lease(iface
, c
, info
->addrs_old
.addrs
,
731 info
->addrs_old
.len
, false);
734 set_border_assignment_size(iface
, border
);
736 list_for_each_entry_safe(c
, d
, &iface
->ia_assignments
, head
) {
737 if (c
->clid_len
== 0 || (!INFINITE_VALID(c
->valid_until
) && c
->valid_until
< now
) ||
741 if (c
->length
< 128 && c
->assigned
>= border
->assigned
&& c
!= border
)
742 list_move(&c
->head
, &reassign
);
743 else if (c
!= border
&& (c
->flags
& OAF_BOUND
))
744 apply_lease(iface
, c
, true);
746 if (c
->accept_reconf
&& c
->reconf_cnt
== 0) {
747 struct dhcpv6_assignment
*a
;
751 /* Leave all other assignments of that client alone */
752 list_for_each_entry(a
, &iface
->ia_assignments
, head
)
753 if (a
!= c
&& a
->clid_len
== c
->clid_len
&&
754 !memcmp(a
->clid_data
, c
->clid_data
, a
->clid_len
))
755 a
->reconf_cnt
= INT_MAX
;
759 while (!list_empty(&reassign
)) {
760 c
= list_first_entry(&reassign
, struct dhcpv6_assignment
, head
);
762 if (!assign_pd(iface
, c
)) {
764 list_add(&c
->head
, &iface
->ia_assignments
);
768 dhcpv6_write_statefile();
771 static void reconf_timeout_cb(struct uloop_timeout
*event
)
773 struct dhcpv6_assignment
*a
= container_of(event
, struct dhcpv6_assignment
, reconf_timer
);
775 if (a
->reconf_cnt
> 0 && a
->reconf_cnt
< DHCPV6_REC_MAX_RC
) {
777 uloop_timeout_set(&a
->reconf_timer
,
778 DHCPV6_REC_TIMEOUT
<< a
->reconf_cnt
);
784 static void start_reconf(struct dhcpv6_assignment
*a
)
786 uloop_timeout_set(&a
->reconf_timer
,
787 DHCPV6_REC_TIMEOUT
<< a
->reconf_cnt
);
788 a
->reconf_timer
.cb
= reconf_timeout_cb
;
794 static void stop_reconf(struct dhcpv6_assignment
*a
)
796 uloop_timeout_cancel(&a
->reconf_timer
);
798 a
->reconf_timer
.cb
= NULL
;
801 static void valid_until_cb(struct uloop_timeout
*event
)
803 time_t now
= odhcpd_time();
804 struct interface
*iface
;
805 list_for_each_entry(iface
, &interfaces
, head
) {
806 if (iface
->dhcpv6
!= MODE_SERVER
|| iface
->ia_assignments
.next
== NULL
)
809 struct dhcpv6_assignment
*a
, *n
;
810 list_for_each_entry_safe(a
, n
, &iface
->ia_assignments
, head
) {
811 if (!INFINITE_VALID(a
->valid_until
) && a
->valid_until
< now
) {
812 if ((a
->length
< 128 && a
->clid_len
> 0) ||
813 (a
->length
== 128 && a
->clid_len
== 0))
814 free_dhcpv6_assignment(a
);
819 uloop_timeout_set(event
, 1000);
822 static size_t append_reply(uint8_t *buf
, size_t buflen
, uint16_t status
,
823 const struct dhcpv6_ia_hdr
*ia
, struct dhcpv6_assignment
*a
,
824 struct interface
*iface
, bool request
)
826 if (buflen
< sizeof(*ia
) + sizeof(struct dhcpv6_ia_prefix
))
829 struct dhcpv6_ia_hdr out
= {ia
->type
, 0, ia
->iaid
, 0, 0};
830 size_t datalen
= sizeof(out
);
831 time_t now
= odhcpd_time();
834 struct __attribute__((packed
)) {
838 } stat
= {htons(DHCPV6_OPT_STATUS
), htons(sizeof(stat
) - 4),
841 memcpy(buf
+ datalen
, &stat
, sizeof(stat
));
842 datalen
+= sizeof(stat
);
847 leasetime
= a
->leasetime
;
849 leasetime
= iface
->dhcpv4_leasetime
;
851 uint32_t pref
= leasetime
;
852 uint32_t valid
= leasetime
;
854 struct odhcpd_ipaddr
*addrs
= (a
->managed
) ? a
->managed
: iface
->addr6
;
855 size_t addrlen
= (a
->managed
) ? (size_t)a
->managed_size
: iface
->addr6_len
;
856 size_t m
= get_preferred_addr(addrs
, addrlen
);
858 for (size_t i
= 0; i
< addrlen
; ++i
) {
859 uint32_t prefix_pref
= addrs
[i
].preferred
;
860 uint32_t prefix_valid
= addrs
[i
].valid
;
862 if (!valid_addr(&addrs
[i
], now
))
865 if (prefix_pref
!= UINT32_MAX
)
868 if (prefix_valid
!= UINT32_MAX
)
871 if (a
->length
< 128) {
872 struct dhcpv6_ia_prefix p
= {
873 .type
= htons(DHCPV6_OPT_IA_PREFIX
),
874 .len
= htons(sizeof(p
) - 4),
875 .preferred
= htonl(prefix_pref
),
876 .valid
= htonl(prefix_valid
),
877 .prefix
= (a
->managed_size
) ? addrs
[i
].prefix
: a
->length
,
878 .addr
= addrs
[i
].addr
.in6
,
880 p
.addr
.s6_addr32
[1] |= htonl(a
->assigned
);
881 p
.addr
.s6_addr32
[2] = p
.addr
.s6_addr32
[3] = 0;
883 size_t entrlen
= sizeof(p
) - 4;
885 if (datalen
+ entrlen
+ 4 > buflen
||
886 (a
->assigned
== 0 && a
->managed_size
== 0) ||
887 !valid_prefix_length(a
, addrs
[i
].prefix
))
890 memcpy(buf
+ datalen
, &p
, sizeof(p
));
891 datalen
+= entrlen
+ 4;
893 struct dhcpv6_ia_addr n
= {
894 .type
= htons(DHCPV6_OPT_IA_ADDR
),
895 .len
= htons(sizeof(n
) - 4),
896 .addr
= addrs
[i
].addr
.in6
,
897 .preferred
= htonl(prefix_pref
),
898 .valid
= htonl(prefix_valid
)
900 n
.addr
.s6_addr32
[3] = htonl(a
->assigned
);
901 size_t entrlen
= sizeof(n
) - 4;
903 if (!ADDR_ENTRY_VALID_IA_ADDR(iface
, i
, m
, addrs
) ||
905 datalen
+ entrlen
+ 4 > buflen
)
908 memcpy(buf
+ datalen
, &n
, sizeof(n
));
909 datalen
+= entrlen
+ 4;
912 /* Calculate T1 / T2 based on non-deprecated addresses */
913 if (prefix_pref
> 0) {
914 if (prefix_pref
< pref
)
917 if (prefix_valid
< valid
)
918 valid
= prefix_valid
;
922 if (!INFINITE_VALID(a
->valid_until
))
923 /* UINT32_MAX is considered as infinite leasetime */
924 a
->valid_until
= (valid
== UINT32_MAX
) ? 0 : valid
+ now
;
926 out
.t1
= htonl((pref
== UINT32_MAX
) ? pref
: pref
* 5 / 10);
927 out
.t2
= htonl((pref
== UINT32_MAX
) ? pref
: pref
* 8 / 10);
937 uint8_t *odata
, *end
= ((uint8_t*)ia
) + htons(ia
->len
) + 4;
938 uint16_t otype
, olen
;
940 dhcpv6_for_each_option((uint8_t*)&ia
[1], end
, otype
, olen
, odata
) {
941 struct dhcpv6_ia_prefix
*p
= (struct dhcpv6_ia_prefix
*)&odata
[-4];
942 struct dhcpv6_ia_addr
*n
= (struct dhcpv6_ia_addr
*)&odata
[-4];
945 if ((otype
!= DHCPV6_OPT_IA_PREFIX
|| olen
< sizeof(*p
) - 4) &&
946 (otype
!= DHCPV6_OPT_IA_ADDR
|| olen
< sizeof(*n
) - 4))
950 struct odhcpd_ipaddr
*addrs
= (a
->managed
) ? a
->managed
: iface
->addr6
;
951 size_t addrlen
= (a
->managed
) ? (size_t)a
->managed_size
: iface
->addr6_len
;
953 for (size_t i
= 0; i
< addrlen
; ++i
) {
954 if (!valid_addr(&addrs
[i
], now
))
957 struct in6_addr addr
= addrs
[i
].addr
.in6
;
958 if (ia
->type
== htons(DHCPV6_OPT_IA_PD
)) {
959 addr
.s6_addr32
[1] |= htonl(a
->assigned
);
960 addr
.s6_addr32
[2] = addr
.s6_addr32
[3] = 0;
962 if (!memcmp(&p
->addr
, &addr
, sizeof(addr
)) &&
963 p
->prefix
== ((a
->managed
) ? addrs
[i
].prefix
: a
->length
))
966 addr
.s6_addr32
[3] = htonl(a
->assigned
);
968 if (!memcmp(&n
->addr
, &addr
, sizeof(addr
)))
975 if (otype
== DHCPV6_OPT_IA_PREFIX
) {
976 struct dhcpv6_ia_prefix inv
= {
977 .type
= htons(DHCPV6_OPT_IA_PREFIX
),
978 .len
= htons(sizeof(inv
) - 4),
985 if (datalen
+ sizeof(inv
) > buflen
)
988 memcpy(buf
+ datalen
, &inv
, sizeof(inv
));
989 datalen
+= sizeof(inv
);
991 struct dhcpv6_ia_addr inv
= {
992 .type
= htons(DHCPV6_OPT_IA_ADDR
),
993 .len
= htons(sizeof(inv
) - 4),
999 if (datalen
+ sizeof(inv
) > buflen
)
1002 memcpy(buf
+ datalen
, &inv
, sizeof(inv
));
1003 datalen
+= sizeof(inv
);
1010 out
.len
= htons(datalen
- 4);
1011 memcpy(buf
, &out
, sizeof(out
));
1021 static void dhcpv6_log_ia_addr(struct in6_addr
*addr
, int prefix
, _unused
uint32_t pref
,
1022 _unused
uint32_t valid
, void *arg
)
1024 struct log_ctxt
*ctxt
= (struct log_ctxt
*)arg
;
1025 char addrbuf
[INET6_ADDRSTRLEN
];
1027 inet_ntop(AF_INET6
, addr
, addrbuf
, sizeof(addrbuf
));
1028 ctxt
->buf_idx
+= snprintf(ctxt
->buf
+ ctxt
->buf_idx
, ctxt
->buf_len
- ctxt
->buf_idx
,
1029 "%s/%d ", addrbuf
, prefix
);
1032 static void dhcpv6_log(uint8_t msgtype
, struct interface
*iface
, time_t now
,
1033 const char *duidbuf
, bool is_pd
, struct dhcpv6_assignment
*a
, int code
)
1035 const char *type
= "UNKNOWN";
1036 const char *status
= "UNKNOWN";
1039 case DHCPV6_MSG_SOLICIT
:
1042 case DHCPV6_MSG_REQUEST
:
1045 case DHCPV6_MSG_CONFIRM
:
1048 case DHCPV6_MSG_RENEW
:
1051 case DHCPV6_MSG_REBIND
:
1054 case DHCPV6_MSG_RELEASE
:
1057 case DHCPV6_MSG_DECLINE
:
1063 case DHCPV6_STATUS_OK
:
1066 case DHCPV6_STATUS_NOADDRSAVAIL
:
1067 status
= "no addresses available";
1069 case DHCPV6_STATUS_NOBINDING
:
1070 status
= "no binding";
1072 case DHCPV6_STATUS_NOTONLINK
:
1073 status
= "not on-link";
1075 case DHCPV6_STATUS_NOPREFIXAVAIL
:
1076 status
= "no prefix available";
1080 char leasebuf
[256] = "";
1083 struct log_ctxt ctxt
= {.buf
= leasebuf
,
1084 .buf_len
= sizeof(leasebuf
),
1087 dhcpv6_enum_ia_addrs(iface
, a
, now
, dhcpv6_log_ia_addr
, &ctxt
);
1090 syslog(LOG_WARNING
, "DHCPV6 %s %s from %s on %s: %s %s", type
, (is_pd
) ? "IA_PD" : "IA_NA",
1091 duidbuf
, iface
->ifname
, status
, leasebuf
);
1094 static bool dhcpv6_ia_on_link(const struct dhcpv6_ia_hdr
*ia
, struct dhcpv6_assignment
*a
,
1095 struct interface
*iface
)
1097 struct odhcpd_ipaddr
*addrs
= (a
->managed
) ? a
->managed
: iface
->addr6
;
1098 size_t addrlen
= (a
->managed
) ? (size_t)a
->managed_size
: iface
->addr6_len
;
1099 time_t now
= odhcpd_time();
1100 uint8_t *odata
, *end
= ((uint8_t*)ia
) + htons(ia
->len
) + 4;
1101 uint16_t otype
, olen
;
1102 bool onlink
= false;
1104 dhcpv6_for_each_option((uint8_t*)&ia
[1], end
, otype
, olen
, odata
) {
1105 struct dhcpv6_ia_prefix
*p
= (struct dhcpv6_ia_prefix
*)&odata
[-4];
1106 struct dhcpv6_ia_addr
*n
= (struct dhcpv6_ia_addr
*)&odata
[-4];
1108 if ((otype
!= DHCPV6_OPT_IA_PREFIX
|| olen
< sizeof(*p
) - 4) &&
1109 (otype
!= DHCPV6_OPT_IA_ADDR
|| olen
< sizeof(*n
) - 4))
1112 for (size_t i
= 0; i
< addrlen
; ++i
) {
1113 struct in6_addr addr
= addrs
[i
].addr
.in6
;
1115 if (!valid_addr(&addrs
[i
], now
))
1118 if (ia
->type
== htons(DHCPV6_OPT_IA_PD
)) {
1119 addr
.s6_addr32
[1] |= htonl(a
->assigned
);
1120 addr
.s6_addr32
[2] = addr
.s6_addr32
[3] = 0;
1122 if (memcmp(&p
->addr
, &addr
, sizeof(addr
)) ||
1123 p
->prefix
!= ((a
->managed
) ? addrs
[i
].prefix
: a
->length
))
1126 addr
.s6_addr32
[3] = htonl(a
->assigned
);
1128 if (memcmp(&n
->addr
, &addr
, sizeof(addr
)))
1141 ssize_t
dhcpv6_handle_ia(uint8_t *buf
, size_t buflen
, struct interface
*iface
,
1142 const struct sockaddr_in6
*addr
, const void *data
, const uint8_t *end
)
1144 time_t now
= odhcpd_time();
1145 size_t response_len
= 0;
1146 const struct dhcpv6_client_header
*hdr
= data
;
1147 uint8_t *start
= (uint8_t*)&hdr
[1], *odata
;
1148 uint16_t otype
, olen
;
1149 /* Find and parse client-id and hostname */
1150 bool accept_reconf
= false;
1151 uint8_t *clid_data
= NULL
, clid_len
= 0, mac
[6] = {0xff, 0xff, 0xff, 0xff, 0xff, 0xff};
1153 size_t hostname_len
= 0;
1154 bool notonlink
= false;
1157 dhcpv6_for_each_option(start
, end
, otype
, olen
, odata
) {
1158 if (otype
== DHCPV6_OPT_CLIENTID
) {
1162 if (olen
== 14 && odata
[0] == 0 && odata
[1] == 1)
1163 memcpy(mac
, &odata
[8], sizeof(mac
));
1164 else if (olen
== 10 && odata
[0] == 0 && odata
[1] == 3)
1165 memcpy(mac
, &odata
[4], sizeof(mac
));
1168 odhcpd_hexlify(duidbuf
, odata
, olen
);
1169 } else if (otype
== DHCPV6_OPT_FQDN
&& olen
>= 2 && olen
<= 255) {
1170 uint8_t fqdn_buf
[256];
1171 memcpy(fqdn_buf
, odata
, olen
);
1172 fqdn_buf
[olen
++] = 0;
1174 if (dn_expand(&fqdn_buf
[1], &fqdn_buf
[olen
], &fqdn_buf
[1], hostname
, sizeof(hostname
)) > 0)
1175 hostname_len
= strcspn(hostname
, ".");
1176 } else if (otype
== DHCPV6_OPT_RECONF_ACCEPT
)
1177 accept_reconf
= true;
1180 if (!clid_data
|| !clid_len
|| clid_len
> 130)
1183 struct dhcpv6_assignment
*first
= NULL
;
1184 dhcpv6_for_each_option(start
, end
, otype
, olen
, odata
) {
1185 bool is_pd
= (otype
== DHCPV6_OPT_IA_PD
);
1186 bool is_na
= (otype
== DHCPV6_OPT_IA_NA
);
1187 bool ia_addr_present
= false;
1188 if (!is_pd
&& !is_na
)
1191 struct dhcpv6_ia_hdr
*ia
= (struct dhcpv6_ia_hdr
*)&odata
[-4];
1192 size_t ia_response_len
= 0;
1193 uint8_t reqlen
= (is_pd
) ? 62 : 128;
1194 uint32_t reqhint
= 0;
1196 /* Parse request hint for IA-PD */
1199 uint16_t stype
, slen
;
1200 dhcpv6_for_each_option(&ia
[1], odata
+ olen
, stype
, slen
, sdata
) {
1201 if (stype
!= DHCPV6_OPT_IA_PREFIX
|| slen
< sizeof(struct dhcpv6_ia_prefix
) - 4)
1204 struct dhcpv6_ia_prefix
*p
= (struct dhcpv6_ia_prefix
*)&sdata
[-4];
1207 reqhint
= ntohl(p
->addr
.s6_addr32
[1]);
1208 if (reqlen
> 32 && reqlen
<= 64)
1209 reqhint
&= (1U << (64 - reqlen
)) - 1;
1217 uint16_t stype
, slen
;
1218 dhcpv6_for_each_option(&ia
[1], odata
+ olen
, stype
, slen
, sdata
) {
1219 if (stype
!= DHCPV6_OPT_IA_ADDR
|| slen
< sizeof(struct dhcpv6_ia_addr
) - 4)
1222 ia_addr_present
= true;
1226 /* Find assignment */
1227 struct dhcpv6_assignment
*c
, *a
= NULL
;
1228 list_for_each_entry(c
, &iface
->ia_assignments
, head
) {
1229 if (((c
->clid_len
== clid_len
&& !memcmp(c
->clid_data
, clid_data
, clid_len
)) ||
1230 (c
->clid_len
>= clid_len
&& !c
->clid_data
[0] && !c
->clid_data
[1]
1231 && !memcmp(c
->mac
, mac
, sizeof(mac
)))) &&
1232 (!(c
->flags
& (OAF_BOUND
|OAF_TENTATIVE
)) || c
->iaid
== ia
->iaid
) &&
1233 (INFINITE_VALID(c
->valid_until
) || now
< c
->valid_until
) &&
1234 ((is_pd
&& c
->length
<= 64) || (is_na
&& c
->length
== 128))) {
1238 if (a
->flags
& OAF_BOUND
)
1239 apply_lease(iface
, a
, false);
1241 memcpy(a
->clid_data
, clid_data
, clid_len
);
1242 a
->clid_len
= clid_len
;
1250 /* Generic message handling */
1251 uint16_t status
= DHCPV6_STATUS_OK
;
1252 if (a
&& a
->managed_size
< 0)
1255 if (hdr
->msg_type
== DHCPV6_MSG_SOLICIT
||
1256 hdr
->msg_type
== DHCPV6_MSG_REQUEST
||
1257 (hdr
->msg_type
== DHCPV6_MSG_REBIND
&& !a
)) {
1258 bool assigned
= !!a
;
1260 if (!a
&& !iface
->no_dynamic_dhcp
) {
1261 /* Create new binding */
1262 a
= calloc(1, sizeof(*a
) + clid_len
);
1264 a
->clid_len
= clid_len
;
1268 a
->assigned
= reqhint
;
1269 /* Set valid time to current time indicating */
1270 /* assignment is not having infinite lifetime */
1271 a
->valid_until
= now
;
1275 memcpy(a
->key
, first
->key
, sizeof(a
->key
));
1277 odhcpd_urandom(a
->key
, sizeof(a
->key
));
1278 memcpy(a
->clid_data
, clid_data
, clid_len
);
1281 while (!(assigned
= assign_pd(iface
, a
)) &&
1282 !a
->managed_size
&& ++a
->length
<= 64);
1284 assigned
= assign_na(iface
, a
);
1286 if (a
->managed_size
&& !assigned
)
1291 if (!assigned
|| iface
->addr6_len
== 0)
1292 /* Set error status */
1293 status
= (is_pd
) ? DHCPV6_STATUS_NOPREFIXAVAIL
: DHCPV6_STATUS_NOADDRSAVAIL
;
1294 else if (hdr
->msg_type
== DHCPV6_MSG_REQUEST
&& !dhcpv6_ia_on_link(ia
, a
, iface
)) {
1295 /* Send NOTONLINK staus for the IA */
1296 status
= DHCPV6_STATUS_NOTONLINK
;
1298 } else if (accept_reconf
&& assigned
&& !first
&&
1299 hdr
->msg_type
!= DHCPV6_MSG_REBIND
) {
1300 size_t handshake_len
= 4;
1302 buf
[1] = DHCPV6_OPT_RECONF_ACCEPT
;
1306 if (hdr
->msg_type
== DHCPV6_MSG_REQUEST
) {
1307 struct dhcpv6_auth_reconfigure auth
= {
1308 htons(DHCPV6_OPT_AUTH
),
1309 htons(sizeof(auth
) - 4),
1311 {htonl(time(NULL
)), htonl(++serial
)},
1315 memcpy(auth
.key
, a
->key
, sizeof(a
->key
));
1316 memcpy(buf
+ handshake_len
, &auth
, sizeof(auth
));
1317 handshake_len
+= sizeof(auth
);
1320 buf
+= handshake_len
;
1321 buflen
-= handshake_len
;
1322 response_len
+= handshake_len
;
1327 ia_response_len
= append_reply(buf
, buflen
, status
, ia
, a
, iface
,
1328 hdr
->msg_type
== DHCPV6_MSG_REBIND
? false : true);
1330 /* Was only a solicitation: mark binding for removal */
1331 if (assigned
&& hdr
->msg_type
== DHCPV6_MSG_SOLICIT
) {
1332 a
->flags
&= ~OAF_BOUND
;
1333 a
->flags
|= OAF_TENTATIVE
;
1335 if (!(a
->flags
& OAF_STATIC
))
1336 /* Keep tentative assignment around for 60 seconds */
1337 a
->valid_until
= now
+ 60;
1338 } else if (assigned
&&
1339 (hdr
->msg_type
== DHCPV6_MSG_REQUEST
||
1340 hdr
->msg_type
== DHCPV6_MSG_REBIND
)) {
1341 if (hostname_len
> 0) {
1342 a
->hostname
= realloc(a
->hostname
, hostname_len
+ 1);
1344 memcpy(a
->hostname
, hostname
, hostname_len
);
1345 a
->hostname
[hostname_len
] = 0;
1348 a
->accept_reconf
= accept_reconf
;
1349 a
->flags
&= ~OAF_TENTATIVE
;
1350 a
->flags
|= OAF_BOUND
;
1351 apply_lease(iface
, a
, true);
1352 } else if (!assigned
&& a
&& a
->managed_size
== 0) {
1353 /* Cleanup failed assignment */
1354 free_dhcpv6_assignment(a
);
1357 } else if (hdr
->msg_type
== DHCPV6_MSG_RENEW
||
1358 hdr
->msg_type
== DHCPV6_MSG_RELEASE
||
1359 hdr
->msg_type
== DHCPV6_MSG_REBIND
||
1360 hdr
->msg_type
== DHCPV6_MSG_DECLINE
) {
1361 if (!a
&& hdr
->msg_type
!= DHCPV6_MSG_REBIND
) {
1362 status
= DHCPV6_STATUS_NOBINDING
;
1363 ia_response_len
= append_reply(buf
, buflen
, status
, ia
, a
, iface
, false);
1364 } else if (hdr
->msg_type
== DHCPV6_MSG_RENEW
||
1365 hdr
->msg_type
== DHCPV6_MSG_REBIND
) {
1366 ia_response_len
= append_reply(buf
, buflen
, status
, ia
, a
, iface
, false);
1368 a
->flags
|= OAF_BOUND
;
1369 apply_lease(iface
, a
, true);
1371 } else if (hdr
->msg_type
== DHCPV6_MSG_RELEASE
) {
1372 if (!(a
->flags
& OAF_STATIC
))
1373 a
->valid_until
= now
- 1;
1375 if (a
->flags
& OAF_BOUND
) {
1376 apply_lease(iface
, a
, false);
1377 a
->flags
&= ~OAF_BOUND
;
1379 } else if (hdr
->msg_type
== DHCPV6_MSG_DECLINE
&& a
->length
== 128) {
1380 a
->flags
&= ~OAF_BOUND
;
1382 if (!(a
->flags
& OAF_STATIC
)) {
1384 a
->valid_until
= now
+ 3600; /* Block address for 1h */
1387 } else if (hdr
->msg_type
== DHCPV6_MSG_CONFIRM
&& ia_addr_present
) {
1388 /* Send NOTONLINK for CONFIRM with addr present so that clients restart connection */
1389 status
= DHCPV6_STATUS_NOTONLINK
;
1390 ia_response_len
= append_reply(buf
, buflen
, status
, ia
, a
, iface
, true);
1394 buf
+= ia_response_len
;
1395 buflen
-= ia_response_len
;
1396 response_len
+= ia_response_len
;
1397 dhcpv6_log(hdr
->msg_type
, iface
, now
, duidbuf
, is_pd
, a
, status
);
1400 if ((hdr
->msg_type
== DHCPV6_MSG_RELEASE
|| hdr
->msg_type
== DHCPV6_MSG_DECLINE
|| notonlink
) &&
1401 response_len
+ 6 < buflen
) {
1403 buf
[1] = DHCPV6_OPT_STATUS
;
1407 buf
[5] = (notonlink
) ? DHCPV6_STATUS_NOTONLINK
: DHCPV6_STATUS_OK
;
1411 dhcpv6_write_statefile();
1414 return response_len
;