aboutgitcodebugslistschat
path: root/ndp.c
diff options
context:
space:
mode:
Diffstat (limited to 'ndp.c')
-rw-r--r--ndp.c455
1 files changed, 345 insertions, 110 deletions
diff --git a/ndp.c b/ndp.c
index c58f4b2..7ee44b2 100644
--- a/ndp.c
+++ b/ndp.c
@@ -33,161 +33,396 @@
#include "tap.h"
#include "log.h"
+#define RT_LIFETIME 65535
+
#define RS 133
#define RA 134
#define NS 135
#define NA 136
+enum ndp_option_types {
+ OPT_SRC_L2_ADDR = 1,
+ OPT_TARGET_L2_ADDR = 2,
+ OPT_PREFIX_INFO = 3,
+ OPT_MTU = 5,
+ OPT_RDNSS_TYPE = 25,
+ OPT_DNSSL_TYPE = 31,
+};
+
/**
- * ndp() - Check for NDP solicitations, reply as needed
+ * struct opt_header - Option header
+ * @type: Option type
+ * @len: Option length, in units of 8 bytes
+*/
+struct opt_header {
+ uint8_t type;
+ uint8_t len;
+} __attribute__((packed));
+
+/**
+ * struct opt_l2_addr - Link-layer address
+ * @header: Option header
+ * @mac: MAC address
+ */
+struct opt_l2_addr {
+ struct opt_header header;
+ unsigned char mac[ETH_ALEN];
+} __attribute__((packed));
+
+/**
+ * struct ndp_na - NDP Neighbor Advertisement (NA) message
+ * @ih: ICMPv6 header
+ * @target_addr: Target IPv6 address
+ * @target_l2_addr: Target link-layer address
+ */
+struct ndp_na {
+ struct icmp6hdr ih;
+ struct in6_addr target_addr;
+ struct opt_l2_addr target_l2_addr;
+} __attribute__((packed));
+
+/**
+ * struct opt_prefix_info - Prefix Information option
+ * @header: Option header
+ * @prefix_len: The number of leading bits in the Prefix that are valid
+ * @prefix_flags: Flags associated with the prefix
+ * @valid_lifetime: Valid lifetime (ms)
+ * @pref_lifetime: Preferred lifetime (ms)
+ * @reserved: Unused
+ */
+struct opt_prefix_info {
+ struct opt_header header;
+ uint8_t prefix_len;
+ uint8_t prefix_flags;
+ uint32_t valid_lifetime;
+ uint32_t pref_lifetime;
+ uint32_t reserved;
+} __attribute__((packed));
+
+/**
+ * struct opt_mtu - Maximum transmission unit (MTU) option
+ * @header: Option header
+ * @reserved: Unused
+ * @value: MTU value, network order
+ */
+struct opt_mtu {
+ struct opt_header header;
+ uint16_t reserved;
+ uint32_t value;
+} __attribute__((packed));
+
+/**
+ * struct rdnss - Recursive DNS Server (RDNSS) option
+ * @header: Option header
+ * @reserved: Unused
+ * @lifetime: Validity time (s)
+ * @dns: List of DNS server addresses
+ */
+struct opt_rdnss {
+ struct opt_header header;
+ uint16_t reserved;
+ uint32_t lifetime;
+ struct in6_addr dns[MAXNS + 1];
+} __attribute__((packed));
+
+/**
+ * struct dnssl - DNS Search List (DNSSL) option
+ * @header: Option header
+ * @reserved: Unused
+ * @lifetime: Validity time (s)
+ * @domains: List of NULL-seperated search domains
+ */
+struct opt_dnssl {
+ struct opt_header header;
+ uint16_t reserved;
+ uint32_t lifetime;
+ unsigned char domains[MAXDNSRCH * NS_MAXDNAME];
+} __attribute__((packed));
+
+/**
+ * struct ndp_ra - NDP Router Advertisement (RA) message
+ * @ih: ICMPv6 header
+ * @reachable: Reachability time, after confirmation (ms)
+ * @retrans: Time between retransmitted NS messages (ms)
+ * @prefix_info: Prefix Information option
+ * @prefix: IPv6 prefix
+ * @mtu: MTU option
+ * @source_ll: Target link-layer address
+ * @var: Variable fields
+ */
+struct ndp_ra {
+ struct icmp6hdr ih;
+ uint32_t reachable;
+ uint32_t retrans;
+ struct opt_prefix_info prefix_info;
+ struct in6_addr prefix;
+ struct opt_l2_addr source_ll;
+
+ unsigned char var[sizeof(struct opt_mtu) + sizeof(struct opt_rdnss) +
+ sizeof(struct opt_dnssl)];
+} __attribute__((packed, aligned(__alignof__(struct in6_addr))));
+
+/**
+ * struct ndp_ns - NDP Neighbor Solicitation (NS) message
+ * @ih: ICMPv6 header
+ * @target_addr: Target IPv6 address
+ */
+struct ndp_ns {
+ struct icmp6hdr ih;
+ struct in6_addr target_addr;
+} __attribute__((packed, aligned(__alignof__(struct in6_addr))));
+
+/**
+ * ndp_send() - Send an NDP message
* @c: Execution context
- * @ih: ICMPv6 header
- * @saddr Source IPv6 address
- *
- * Return: 0 if not handled here, 1 if handled, -1 on failure
+ * @dst: IPv6 address to send the message to
+ * @buf: ICMPv6 header + message payload
+ * @l4len: Length of message, including ICMPv6 header
*/
-int ndp(struct ctx *c, const struct icmp6hdr *ih, const struct in6_addr *saddr)
+static void ndp_send(const struct ctx *c, const struct in6_addr *dst,
+ const void *buf, size_t l4len)
{
- const struct in6_addr *rsaddr; /* src addr for reply */
- char buf[BUFSIZ] = { 0 };
- struct ipv6hdr *ip6hr;
- struct icmp6hdr *ihr;
- struct ethhdr *ehr;
- unsigned char *p;
- size_t len;
+ const struct in6_addr *src = &c->ip6.our_tap_ll;
- if (ih->icmp6_type < RS || ih->icmp6_type > NA)
- return 0;
+ tap_icmp6_send(c, src, dst, buf, l4len);
+}
- if (c->no_ndp)
- return 1;
+/**
+ * ndp_na() - Send an NDP Neighbour Advertisement (NA) message
+ * @c: Execution context
+ * @dst: IPv6 address to send the NA to
+ * @addr: IPv6 address to advertise
+ */
+static void ndp_na(const struct ctx *c, const struct in6_addr *dst,
+ const struct in6_addr *addr)
+{
+ struct ndp_na na = {
+ .ih = {
+ .icmp6_type = NA,
+ .icmp6_code = 0,
+ .icmp6_router = 1,
+ .icmp6_solicited = 1,
+ .icmp6_override = 1,
+ },
+ .target_addr = *addr,
+ .target_l2_addr = {
+ .header = {
+ .type = OPT_TARGET_L2_ADDR,
+ .len = 1,
+ },
+ }
+ };
- ehr = (struct ethhdr *)buf;
- ip6hr = (struct ipv6hdr *)(ehr + 1);
- ihr = (struct icmp6hdr *)(ip6hr + 1);
+ memcpy(na.target_l2_addr.mac, c->our_tap_mac, ETH_ALEN);
- if (ih->icmp6_type == NS) {
- if (IN6_IS_ADDR_UNSPECIFIED(saddr))
- return 1;
+ ndp_send(c, dst, &na, sizeof(na));
+}
- info("NDP: received NS, sending NA");
- ihr->icmp6_type = NA;
- ihr->icmp6_code = 0;
- ihr->icmp6_router = 1;
- ihr->icmp6_solicited = 1;
- ihr->icmp6_override = 1;
-
- p = (unsigned char *)(ihr + 1);
- memcpy(p, ih + 1, sizeof(struct in6_addr)); /* target address */
- p += 16;
- *p++ = 2; /* target ll */
- *p++ = 1; /* length */
- memcpy(p, c->mac, ETH_ALEN);
- p += 6;
- } else if (ih->icmp6_type == RS) {
- size_t dns_s_len = 0;
- int i, n;
+/**
+ * ndp_ra() - Send an NDP Router Advertisement (RA) message
+ * @c: Execution context
+ * @dst: IPv6 address to send the RA to
+ */
+static void ndp_ra(const struct ctx *c, const struct in6_addr *dst)
+{
+ struct ndp_ra ra = {
+ .ih = {
+ .icmp6_type = RA,
+ .icmp6_code = 0,
+ .icmp6_hop_limit = 255,
+ /* RFC 8319 */
+ .icmp6_rt_lifetime = htons_constant(RT_LIFETIME),
+ .icmp6_addrconf_managed = 1,
+ },
+ .prefix_info = {
+ .header = {
+ .type = OPT_PREFIX_INFO,
+ .len = 4,
+ },
+ .prefix_len = 64,
+ .prefix_flags = 0xc0, /* prefix flags: L, A */
+ .valid_lifetime = ~0U,
+ .pref_lifetime = ~0U,
+ },
+ .prefix = c->ip6.addr,
+ .source_ll = {
+ .header = {
+ .type = OPT_SRC_L2_ADDR,
+ .len = 1,
+ },
+ },
+ };
+ unsigned char *ptr = NULL;
- if (c->no_ra)
- return 1;
+ ptr = &ra.var[0];
- info("NDP: received RS, sending RA");
- ihr->icmp6_type = RA;
- ihr->icmp6_code = 0;
- ihr->icmp6_hop_limit = 255;
- ihr->icmp6_rt_lifetime = htons(65535); /* RFC 8319 */
- ihr->icmp6_addrconf_managed = 1;
-
- p = (unsigned char *)(ihr + 1);
- p += 8; /* reachable, retrans time */
- *p++ = 3; /* prefix */
- *p++ = 4; /* length */
- *p++ = 64; /* prefix length */
- *p++ = 0xc0; /* prefix flags: L, A */
- *(uint32_t *)p = (uint32_t)~0U; /* lifetime */
- p += 4;
- *(uint32_t *)p = (uint32_t)~0U; /* preferred lifetime */
- p += 8;
- memcpy(p, &c->ip6.addr, 8); /* prefix */
- p += 16;
-
- if (c->mtu != -1) {
- *p++ = 5; /* type */
- *p++ = 1; /* length */
- p += 2; /* reserved */
- *(uint32_t *)p = htonl(c->mtu); /* MTU */
- p += 4;
- }
+ if (c->mtu != -1) {
+ struct opt_mtu *mtu = (struct opt_mtu *)ptr;
+ *mtu = (struct opt_mtu) {
+ .header = {
+ .type = OPT_MTU,
+ .len = 1,
+ },
+ .value = htonl(c->mtu),
+ };
+ ptr += sizeof(struct opt_mtu);
+ }
- if (c->no_dhcp_dns)
- goto dns_done;
+ if (!c->no_dhcp_dns) {
+ size_t dns_s_len = 0;
+ int i, n;
for (n = 0; !IN6_IS_ADDR_UNSPECIFIED(&c->ip6.dns[n]); n++);
if (n) {
- *p++ = 25; /* RDNSS */
- *p++ = 1 + 2 * n; /* length */
- p += 2; /* reserved */
- *(uint32_t *)p = (uint32_t)~0U; /* lifetime */
- p += 4;
-
+ struct opt_rdnss *rdnss = (struct opt_rdnss *)ptr;
+ *rdnss = (struct opt_rdnss) {
+ .header = {
+ .type = OPT_RDNSS_TYPE,
+ .len = 1 + 2 * n,
+ },
+ .lifetime = ~0U,
+ };
for (i = 0; i < n; i++) {
- memcpy(p, &c->ip6.dns[i], 16); /* address */
- p += 16;
+ rdnss->dns[i] = c->ip6.dns[i];
}
+ ptr += offsetof(struct opt_rdnss, dns) +
+ i * sizeof(rdnss->dns[0]);
for (n = 0; *c->dns_search[n].n; n++)
dns_s_len += strlen(c->dns_search[n].n) + 2;
}
if (!c->no_dhcp_dns_search && dns_s_len) {
- *p++ = 31; /* DNSSL */
- *p++ = (dns_s_len + 8 - 1) / 8 + 1; /* length */
- p += 2; /* reserved */
- *(uint32_t *)p = (uint32_t)~0U; /* lifetime */
- p += 4;
+ struct opt_dnssl *dnssl = (struct opt_dnssl *)ptr;
+ *dnssl = (struct opt_dnssl) {
+ .header = {
+ .type = OPT_DNSSL_TYPE,
+ .len = DIV_ROUND_UP(dns_s_len, 8) + 1,
+ },
+ .lifetime = ~0U,
+ };
+ ptr = dnssl->domains;
for (i = 0; i < n; i++) {
+ size_t len;
char *dot;
- *(p++) = '.';
+ *(ptr++) = '.';
+
+ len = sizeof(dnssl->domains) -
+ (ptr - dnssl->domains);
- strncpy((char *)p, c->dns_search[i].n,
- sizeof(buf) -
- ((intptr_t)p - (intptr_t)buf));
- for (dot = (char *)p - 1; *dot; dot++) {
+ strncpy((char *)ptr, c->dns_search[i].n, len);
+ for (dot = (char *)ptr - 1; *dot; dot++) {
if (*dot == '.')
*dot = strcspn(dot + 1, ".");
}
- p += strlen(c->dns_search[i].n);
- *(p++) = 0;
+ ptr += strlen(c->dns_search[i].n);
+ *(ptr++) = 0;
}
- memset(p, 0, 8 - dns_s_len % 8); /* padding */
- p += 8 - dns_s_len % 8;
+ memset(ptr, 0, 8 - dns_s_len % 8); /* padding */
+ ptr += 8 - dns_s_len % 8;
}
+ }
+
+ memcpy(&ra.source_ll.mac, c->our_tap_mac, ETH_ALEN);
-dns_done:
- *p++ = 1; /* source ll */
- *p++ = 1; /* length */
- memcpy(p, c->mac, ETH_ALEN);
- p += 6;
- } else {
+ ndp_send(c, dst, &ra, ptr - (unsigned char *)&ra);
+}
+
+/**
+ * ndp() - Check for NDP solicitations, reply as needed
+ * @c: Execution context
+ * @ih: ICMPv6 header
+ * @saddr: Source IPv6 address
+ * @p: Packet pool
+ *
+ * Return: 0 if not handled here, 1 if handled, -1 on failure
+ */
+int ndp(const struct ctx *c, const struct icmp6hdr *ih,
+ const struct in6_addr *saddr, const struct pool *p)
+{
+ if (ih->icmp6_type < RS || ih->icmp6_type > NA)
+ return 0;
+
+ if (c->no_ndp)
return 1;
- }
- len = (uintptr_t)p - (uintptr_t)ihr - sizeof(*ihr);
+ if (ih->icmp6_type == NS) {
+ const struct ndp_ns *ns;
+
+ ns = packet_get(p, 0, 0, sizeof(struct ndp_ns), NULL);
+ if (!ns)
+ return -1;
- if (IN6_IS_ADDR_LINKLOCAL(saddr))
- c->ip6.addr_ll_seen = *saddr;
- else
- c->ip6.addr_seen = *saddr;
+ if (IN6_IS_ADDR_UNSPECIFIED(saddr))
+ return 1;
- if (IN6_IS_ADDR_LINKLOCAL(&c->ip6.gw))
- rsaddr = &c->ip6.gw;
- else
- rsaddr = &c->ip6.addr_ll;
+ info("NDP: received NS, sending NA");
+
+ ndp_na(c, saddr, &ns->target_addr);
+ } else if (ih->icmp6_type == RS) {
+ if (c->no_ra)
+ return 1;
- tap_icmp6_send(c, rsaddr, saddr, ihr, len + sizeof(*ihr));
+ info("NDP: received RS, sending RA");
+ ndp_ra(c, saddr);
+ }
return 1;
}
+
+/* Default interval between unsolicited RAs (seconds) */
+#define DEFAULT_MAX_RTR_ADV_INTERVAL 600 /* RFC 4861, 6.2.1 */
+
+/* Minimum required interval between RAs (seconds) */
+#define MIN_DELAY_BETWEEN_RAS 3 /* RFC 4861, 10 */
+
+static time_t next_ra;
+
+/**
+ * ndp_timer() - Send unsolicited NDP messages if necessary
+ * @c: Execution context
+ * @now: Current (monotonic) time
+ */
+void ndp_timer(const struct ctx *c, const struct timespec *now)
+{
+ time_t max_rtr_adv_interval = DEFAULT_MAX_RTR_ADV_INTERVAL;
+ time_t min_rtr_adv_interval, interval;
+
+ if (c->no_ra || now->tv_sec < next_ra)
+ return;
+
+ /* We must advertise before the route's lifetime expires */
+ max_rtr_adv_interval = MIN(max_rtr_adv_interval, RT_LIFETIME - 1);
+
+ /* But we must not go smaller than the minimum delay */
+ max_rtr_adv_interval = MAX(max_rtr_adv_interval, MIN_DELAY_BETWEEN_RAS);
+
+ /* RFC 4861, 6.2.1 */
+ min_rtr_adv_interval = MAX(max_rtr_adv_interval / 3,
+ MIN_DELAY_BETWEEN_RAS);
+
+ /* As required by RFC 4861, we randomise the interval between
+ * unsolicited RAs. This is to prevent multiple routers on a link
+ * getting synchronised (e.g. after booting a bunch of routers at once)
+ * and causing flurries of RAs at the same time.
+ *
+ * This random doesn't need to be cryptographically strong, so random(3)
+ * is fine. Other routers on the link also want to avoid
+ * synchronisation, and anything malicious has much easier ways to cause
+ * trouble.
+ *
+ * The modulus also makes this not strictly a uniform distribution, but,
+ * again, it's close enough for our purposes.
+ */
+ interval = min_rtr_adv_interval +
+ random() % (max_rtr_adv_interval - min_rtr_adv_interval);
+
+ info("NDP: sending unsolicited RA, next in %llds", (long long)interval);
+
+ ndp_ra(c, &in6addr_ll_all_nodes);
+
+ next_ra = now->tv_sec + interval;
+}