/* $OpenBSD: dhcpleased.c,v 1.29 2023/02/15 13:47:00 florian Exp $ */ /* * Copyright (c) 2017, 2021 Florian Obser * Copyright (c) 2005 Claudio Jeker * Copyright (c) 2004 Esben Norby * Copyright (c) 2003, 2004 Henning Brauer * * Permission to use, copy, modify, and distribute this software for any * purpose with or without fee is hereby granted, provided that the above * copyright notice and this permission notice appear in all copies. * * THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES * WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF * MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR * ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES * WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN * ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF * OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. */ #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include "bpf.h" #include "log.h" #include "dhcpleased.h" #include "frontend.h" #include "engine.h" #include "control.h" enum dhcpleased_process { PROC_MAIN, PROC_ENGINE, PROC_FRONTEND }; __dead void usage(void); __dead void main_shutdown(void); void main_sig_handler(int, short, void *); static pid_t start_child(enum dhcpleased_process, char *, int, int, int); void main_dispatch_frontend(int, short, void *); void main_dispatch_engine(int, short, void *); void open_bpfsock(uint32_t); void configure_interface(struct imsg_configure_interface *); void deconfigure_interface(struct imsg_configure_interface *); void propose_rdns(struct imsg_propose_rdns *); void configure_routes(uint8_t, struct imsg_configure_interface *); void configure_route(uint8_t, uint32_t, int, struct sockaddr_in *, struct sockaddr_in *, struct sockaddr_in *, struct sockaddr_in *, int); void read_lease_file(struct imsg_ifinfo *); static int main_imsg_send_ipc_sockets(struct imsgbuf *, struct imsgbuf *); int main_imsg_compose_frontend(int, int, void *, uint16_t); int main_imsg_compose_engine(int, int, void *, uint16_t); #ifndef SMALL int main_imsg_send_config(struct dhcpleased_conf *); #endif /* SMALL */ int main_reload(void); static struct imsgev *iev_frontend; static struct imsgev *iev_engine; #ifndef SMALL struct dhcpleased_conf *main_conf; #endif const char default_conffile[] = _PATH_CONF_FILE; const char *conffile = default_conffile; pid_t frontend_pid; pid_t engine_pid; int routesock, ioctl_sock, rtm_seq, no_lease_files; void main_sig_handler(int sig, short event, void *arg) { /* * Normal signal handler rules don't apply because libevent * decouples for us. */ switch (sig) { case SIGTERM: case SIGINT: main_shutdown(); case SIGHUP: #ifndef SMALL if (main_reload() == -1) log_warnx("configuration reload failed"); else log_debug("configuration reloaded"); #endif /* SMALL */ break; default: fatalx("unexpected signal"); } } __dead void usage(void) { extern char *__progname; fprintf(stderr, "usage: %s [-dnv] [-f file] [-s socket]\n", __progname); exit(1); } int main(int argc, char *argv[]) { struct event ev_sigint, ev_sigterm, ev_sighup; int ch; int debug = 0, engine_flag = 0, frontend_flag = 0; int verbose = 0, no_action = 0; char *saved_argv0; int pipe_main2frontend[2]; int pipe_main2engine[2]; int frontend_routesock, rtfilter, lockfd; int rtable_any = RTABLE_ANY; char *csock = _PATH_DHCPLEASED_SOCKET; #ifndef SMALL int control_fd; #endif /* SMALL */ log_init(1, LOG_DAEMON); /* Log to stderr until daemonized. */ log_setverbose(1); saved_argv0 = argv[0]; if (saved_argv0 == NULL) saved_argv0 = "dhcpleased"; while ((ch = getopt(argc, argv, "dEFf:ns:v")) != -1) { switch (ch) { case 'd': debug = 1; break; case 'E': engine_flag = 1; break; case 'F': frontend_flag = 1; break; case 'f': conffile = optarg; break; case 'n': no_action = 1; break; case 's': csock = optarg; break; case 'v': verbose++; break; default: usage(); } } argc -= optind; argv += optind; if (argc > 0 || (engine_flag && frontend_flag)) usage(); if (engine_flag) engine(debug, verbose); else if (frontend_flag) frontend(debug, verbose); #ifndef SMALL /* parse config file */ if ((main_conf = parse_config(conffile)) == NULL) exit(1); if (no_action) { if (verbose) print_config(main_conf); else fprintf(stderr, "configuration OK\n"); exit(0); } #endif /* SMALL */ /* Check for root privileges. */ if (geteuid()) errx(1, "need root privileges"); lockfd = open(_PATH_LOCKFILE, O_CREAT|O_RDWR|O_EXLOCK|O_NONBLOCK, 0600); if (lockfd == -1) { if (errno == EAGAIN) errx(1, "already running"); err(1, "%s", _PATH_LOCKFILE); } /* Check for assigned daemon user */ if (getpwnam(DHCPLEASED_USER) == NULL) errx(1, "unknown user %s", DHCPLEASED_USER); log_init(debug, LOG_DAEMON); log_setverbose(verbose); if (!debug) daemon(0, 0); if (socketpair(AF_UNIX, SOCK_STREAM | SOCK_CLOEXEC | SOCK_NONBLOCK, PF_UNSPEC, pipe_main2frontend) == -1) fatal("main2frontend socketpair"); if (socketpair(AF_UNIX, SOCK_STREAM | SOCK_CLOEXEC | SOCK_NONBLOCK, PF_UNSPEC, pipe_main2engine) == -1) fatal("main2engine socketpair"); /* Start children. */ engine_pid = start_child(PROC_ENGINE, saved_argv0, pipe_main2engine[1], debug, verbose); frontend_pid = start_child(PROC_FRONTEND, saved_argv0, pipe_main2frontend[1], debug, verbose); log_procinit("main"); if ((routesock = socket(AF_ROUTE, SOCK_RAW | SOCK_CLOEXEC | SOCK_NONBLOCK, AF_INET)) == -1) fatal("route socket"); shutdown(routesock, SHUT_RD); event_init(); /* Setup signal handler. */ signal_set(&ev_sigint, SIGINT, main_sig_handler, NULL); signal_set(&ev_sigterm, SIGTERM, main_sig_handler, NULL); signal_set(&ev_sighup, SIGHUP, main_sig_handler, NULL); signal_add(&ev_sigint, NULL); signal_add(&ev_sigterm, NULL); signal_add(&ev_sighup, NULL); signal(SIGPIPE, SIG_IGN); /* Setup pipes to children. */ if ((iev_frontend = malloc(sizeof(struct imsgev))) == NULL || (iev_engine = malloc(sizeof(struct imsgev))) == NULL) fatal(NULL); imsg_init(&iev_frontend->ibuf, pipe_main2frontend[0]); iev_frontend->handler = main_dispatch_frontend; imsg_init(&iev_engine->ibuf, pipe_main2engine[0]); iev_engine->handler = main_dispatch_engine; /* Setup event handlers for pipes to engine & frontend. */ iev_frontend->events = EV_READ; event_set(&iev_frontend->ev, iev_frontend->ibuf.fd, iev_frontend->events, iev_frontend->handler, iev_frontend); event_add(&iev_frontend->ev, NULL); iev_engine->events = EV_READ; event_set(&iev_engine->ev, iev_engine->ibuf.fd, iev_engine->events, iev_engine->handler, iev_engine); event_add(&iev_engine->ev, NULL); if (main_imsg_send_ipc_sockets(&iev_frontend->ibuf, &iev_engine->ibuf)) fatal("could not establish imsg links"); if ((ioctl_sock = socket(AF_INET, SOCK_DGRAM | SOCK_CLOEXEC, 0)) == -1) fatal("socket"); if ((frontend_routesock = socket(AF_ROUTE, SOCK_RAW | SOCK_CLOEXEC, AF_INET)) == -1) fatal("route socket"); rtfilter = ROUTE_FILTER(RTM_IFINFO) | ROUTE_FILTER(RTM_PROPOSAL) | ROUTE_FILTER(RTM_IFANNOUNCE); if (setsockopt(frontend_routesock, AF_ROUTE, ROUTE_MSGFILTER, &rtfilter, sizeof(rtfilter)) == -1) fatal("setsockopt(ROUTE_MSGFILTER)"); if (setsockopt(frontend_routesock, AF_ROUTE, ROUTE_TABLEFILTER, &rtable_any, sizeof(rtable_any)) == -1) fatal("setsockopt(ROUTE_TABLEFILTER)"); #ifndef SMALL if ((control_fd = control_init(csock)) == -1) warnx("control socket setup failed"); #endif /* SMALL */ if (unveil(conffile, "r") == -1) fatal("unveil %s", conffile); if (unveil("/dev/bpf", "rw") == -1) fatal("unveil /dev/bpf"); if (unveil(_PATH_LEASE, "rwc") == -1) { no_lease_files = 1; log_warn("disabling lease files, unveil " _PATH_LEASE); } if (unveil(NULL, NULL) == -1) fatal("unveil"); #if notyet if (pledge("stdio inet rpath wpath sendfd wroute bpf", NULL) == -1) fatal("pledge"); #endif main_imsg_compose_frontend(IMSG_ROUTESOCK, frontend_routesock, NULL, 0); #ifndef SMALL if (control_fd != -1) main_imsg_compose_frontend(IMSG_CONTROLFD, control_fd, NULL, 0); main_imsg_send_config(main_conf); #endif /* SMALL */ main_imsg_compose_frontend(IMSG_STARTUP, -1, NULL, 0); event_dispatch(); main_shutdown(); return (0); } __dead void main_shutdown(void) { pid_t pid; int status; /* Close pipes. */ msgbuf_clear(&iev_frontend->ibuf.w); close(iev_frontend->ibuf.fd); msgbuf_clear(&iev_engine->ibuf.w); close(iev_engine->ibuf.fd); #ifndef SMALL config_clear(main_conf); #endif /* SMALL */ log_debug("waiting for children to terminate"); do { pid = wait(&status); if (pid == -1) { if (errno != EINTR && errno != ECHILD) fatal("wait"); } else if (WIFSIGNALED(status)) log_warnx("%s terminated; signal %d", (pid == engine_pid) ? "engine" : "frontend", WTERMSIG(status)); } while (pid != -1 || (pid == -1 && errno == EINTR)); free(iev_frontend); free(iev_engine); log_info("terminating"); exit(0); } static pid_t start_child(enum dhcpleased_process p, char *argv0, int fd, int debug, int verbose) { char *argv[7]; int argc = 0; pid_t pid; switch (pid = fork()) { case -1: fatal("cannot fork"); case 0: break; default: close(fd); return (pid); } if (fd != 3) { if (dup2(fd, 3) == -1) fatal("cannot setup imsg fd"); } else if (fcntl(fd, F_SETFD, 0) == -1) fatal("cannot setup imsg fd"); argv[argc++] = argv0; switch (p) { case PROC_MAIN: fatalx("Can not start main process"); case PROC_ENGINE: argv[argc++] = "-E"; break; case PROC_FRONTEND: argv[argc++] = "-F"; break; } if (debug) argv[argc++] = "-d"; if (verbose) argv[argc++] = "-v"; if (verbose > 1) argv[argc++] = "-v"; argv[argc++] = NULL; execvp(argv0, argv); fatal("execvp"); } void main_dispatch_frontend(int fd, short event, void *bula) { struct imsgev *iev = bula; struct imsgbuf *ibuf; struct imsg imsg; struct imsg_ifinfo imsg_ifinfo; ssize_t n; int shut = 0; uint32_t if_index; #ifndef SMALL int verbose; #endif /* SMALL */ ibuf = &iev->ibuf; if (event & EV_READ) { if ((n = imsg_read(ibuf)) == -1 && errno != EAGAIN) fatal("imsg_read error"); if (n == 0) /* Connection closed. */ shut = 1; } if (event & EV_WRITE) { if ((n = msgbuf_write(&ibuf->w)) == -1 && errno != EAGAIN) fatal("msgbuf_write"); if (n == 0) /* Connection closed. */ shut = 1; } for (;;) { if ((n = imsg_get(ibuf, &imsg)) == -1) fatal("imsg_get"); if (n == 0) /* No more messages. */ break; switch (imsg.hdr.type) { case IMSG_OPEN_BPFSOCK: if (IMSG_DATA_SIZE(imsg) != sizeof(if_index)) fatalx("%s: IMSG_OPEN_BPFSOCK wrong length: " "%lu", __func__, IMSG_DATA_SIZE(imsg)); memcpy(&if_index, imsg.data, sizeof(if_index)); open_bpfsock(if_index); break; #ifndef SMALL case IMSG_CTL_RELOAD: if (main_reload() == -1) log_warnx("configuration reload failed"); else log_warnx("configuration reloaded"); break; case IMSG_CTL_LOG_VERBOSE: if (IMSG_DATA_SIZE(imsg) != sizeof(verbose)) fatalx("%s: IMSG_CTL_LOG_VERBOSE wrong length: " "%lu", __func__, IMSG_DATA_SIZE(imsg)); memcpy(&verbose, imsg.data, sizeof(verbose)); log_setverbose(verbose); break; #endif /* SMALL */ case IMSG_UPDATE_IF: if (IMSG_DATA_SIZE(imsg) != sizeof(imsg_ifinfo)) fatalx("%s: IMSG_UPDATE_IF wrong length: %lu", __func__, IMSG_DATA_SIZE(imsg)); memcpy(&imsg_ifinfo, imsg.data, sizeof(imsg_ifinfo)); read_lease_file(&imsg_ifinfo); main_imsg_compose_engine(IMSG_UPDATE_IF, -1, &imsg_ifinfo, sizeof(imsg_ifinfo)); break; default: log_debug("%s: error handling imsg %d", __func__, imsg.hdr.type); break; } imsg_free(&imsg); } if (!shut) imsg_event_add(iev); else { /* This pipe is dead. Remove its event handler */ event_del(&iev->ev); event_loopexit(NULL); } } void main_dispatch_engine(int fd, short event, void *bula) { struct imsgev *iev = bula; struct imsgbuf *ibuf; struct imsg imsg; ssize_t n; int shut = 0; ibuf = &iev->ibuf; if (event & EV_READ) { if ((n = imsg_read(ibuf)) == -1 && errno != EAGAIN) fatal("imsg_read error"); if (n == 0) /* Connection closed. */ shut = 1; } if (event & EV_WRITE) { if ((n = msgbuf_write(&ibuf->w)) == -1 && errno != EAGAIN) fatal("msgbuf_write"); if (n == 0) /* Connection closed. */ shut = 1; } for (;;) { if ((n = imsg_get(ibuf, &imsg)) == -1) fatal("imsg_get"); if (n == 0) /* No more messages. */ break; switch (imsg.hdr.type) { case IMSG_CONFIGURE_INTERFACE: { struct imsg_configure_interface imsg_interface; if (IMSG_DATA_SIZE(imsg) != sizeof(imsg_interface)) fatalx("%s: IMSG_CONFIGURE_INTERFACE wrong " "length: %lu", __func__, IMSG_DATA_SIZE(imsg)); memcpy(&imsg_interface, imsg.data, sizeof(imsg_interface)); if (imsg_interface.routes_len >= MAX_DHCP_ROUTES) fatalx("%s: too many routes in imsg", __func__); configure_interface(&imsg_interface); break; } case IMSG_DECONFIGURE_INTERFACE: { struct imsg_configure_interface imsg_interface; if (IMSG_DATA_SIZE(imsg) != sizeof(imsg_interface)) fatalx("%s: IMSG_CONFIGURE_INTERFACE wrong " "length: %lu", __func__, IMSG_DATA_SIZE(imsg)); memcpy(&imsg_interface, imsg.data, sizeof(imsg_interface)); if (imsg_interface.routes_len >= MAX_DHCP_ROUTES) fatalx("%s: too many routes in imsg", __func__); deconfigure_interface(&imsg_interface); main_imsg_compose_frontend(IMSG_CLOSE_UDPSOCK, -1, &imsg_interface.if_index, sizeof(imsg_interface.if_index)); break; } case IMSG_WITHDRAW_ROUTES: { struct imsg_configure_interface imsg_interface; if (IMSG_DATA_SIZE(imsg) != sizeof(imsg_interface)) fatalx("%s: IMSG_CONFIGURE_INTERFACE wrong " "length: %lu", __func__, IMSG_DATA_SIZE(imsg)); memcpy(&imsg_interface, imsg.data, sizeof(imsg_interface)); if (imsg_interface.routes_len >= MAX_DHCP_ROUTES) fatalx("%s: too many routes in imsg", __func__); if (imsg_interface.routes_len > 0) configure_routes(RTM_DELETE, &imsg_interface); break; } case IMSG_PROPOSE_RDNS: { struct imsg_propose_rdns rdns; if (IMSG_DATA_SIZE(imsg) != sizeof(rdns)) fatalx("%s: IMSG_PROPOSE_RDNS wrong " "length: %lu", __func__, IMSG_DATA_SIZE(imsg)); memcpy(&rdns, imsg.data, sizeof(rdns)); if ((2 + rdns.rdns_count * sizeof(struct in_addr)) > sizeof(struct sockaddr_rtdns)) fatalx("%s: rdns_count too big: %d", __func__, rdns.rdns_count); propose_rdns(&rdns); break; } case IMSG_WITHDRAW_RDNS: { struct imsg_propose_rdns rdns; if (IMSG_DATA_SIZE(imsg) != sizeof(rdns)) fatalx("%s: IMSG_PROPOSE_RDNS wrong " "length: %lu", __func__, IMSG_DATA_SIZE(imsg)); memcpy(&rdns, imsg.data, sizeof(rdns)); if (rdns.rdns_count != 0) fatalx("%s: expected rdns_count == 0: %d", __func__, rdns.rdns_count); propose_rdns(&rdns); break; } default: log_debug("%s: error handling imsg %d", __func__, imsg.hdr.type); break; } imsg_free(&imsg); } if (!shut) imsg_event_add(iev); else { /* This pipe is dead. Remove its event handler. */ event_del(&iev->ev); event_loopexit(NULL); } } int main_imsg_compose_frontend(int type, int fd, void *data, uint16_t datalen) { if (iev_frontend) return (imsg_compose_event(iev_frontend, type, 0, 0, fd, data, datalen)); else return (-1); } int main_imsg_compose_engine(int type, int fd, void *data, uint16_t datalen) { if (iev_engine) return(imsg_compose_event(iev_engine, type, 0, 0, fd, data, datalen)); else return (-1); } void imsg_event_add(struct imsgev *iev) { iev->events = EV_READ; if (iev->ibuf.w.queued) iev->events |= EV_WRITE; event_del(&iev->ev); event_set(&iev->ev, iev->ibuf.fd, iev->events, iev->handler, iev); event_add(&iev->ev, NULL); } int imsg_compose_event(struct imsgev *iev, uint16_t type, uint32_t peerid, pid_t pid, int fd, void *data, uint16_t datalen) { int ret; if ((ret = imsg_compose(&iev->ibuf, type, peerid, pid, fd, data, datalen)) != -1) imsg_event_add(iev); return (ret); } static int main_imsg_send_ipc_sockets(struct imsgbuf *frontend_buf, struct imsgbuf *engine_buf) { int pipe_frontend2engine[2]; if (socketpair(AF_UNIX, SOCK_STREAM | SOCK_CLOEXEC | SOCK_NONBLOCK, PF_UNSPEC, pipe_frontend2engine) == -1) return (-1); if (imsg_compose(frontend_buf, IMSG_SOCKET_IPC, 0, 0, pipe_frontend2engine[0], NULL, 0) == -1) return (-1); imsg_flush(frontend_buf); if (imsg_compose(engine_buf, IMSG_SOCKET_IPC, 0, 0, pipe_frontend2engine[1], NULL, 0) == -1) return (-1); imsg_flush(engine_buf); return (0); } #ifndef SMALL int main_reload(void) { struct dhcpleased_conf *xconf; if ((xconf = parse_config(conffile)) == NULL) return (-1); if (main_imsg_send_config(xconf) == -1) return (-1); merge_config(main_conf, xconf); return (0); } int main_imsg_send_config(struct dhcpleased_conf *xconf) { struct iface_conf *iface_conf; main_imsg_compose_frontend(IMSG_RECONF_CONF, -1, NULL, 0); main_imsg_compose_engine(IMSG_RECONF_CONF, -1, NULL, 0); /* Send the interface list to the frontend & engine. */ SIMPLEQ_FOREACH(iface_conf, &xconf->iface_list, entry) { main_imsg_compose_frontend(IMSG_RECONF_IFACE, -1, iface_conf, sizeof(*iface_conf)); main_imsg_compose_engine(IMSG_RECONF_IFACE, -1, iface_conf, sizeof(*iface_conf)); main_imsg_compose_frontend(IMSG_RECONF_VC_ID, -1, iface_conf->vc_id, iface_conf->vc_id_len); main_imsg_compose_engine(IMSG_RECONF_VC_ID, -1, iface_conf->vc_id, iface_conf->vc_id_len); main_imsg_compose_frontend(IMSG_RECONF_C_ID, -1, iface_conf->c_id, iface_conf->c_id_len); main_imsg_compose_engine(IMSG_RECONF_C_ID, -1, iface_conf->c_id, iface_conf->c_id_len); if (iface_conf->h_name != NULL) main_imsg_compose_frontend(IMSG_RECONF_H_NAME, -1, iface_conf->h_name, strlen(iface_conf->h_name) + 1); } /* Config is now complete. */ main_imsg_compose_frontend(IMSG_RECONF_END, -1, NULL, 0); main_imsg_compose_engine(IMSG_RECONF_END, -1, NULL, 0); return (0); } #endif /* SMALL */ void configure_interface(struct imsg_configure_interface *imsg) { struct ifaliasreq ifaliasreq; struct ifaddrs *ifap, *ifa; struct sockaddr_in *req_sin_addr, *req_sin_mask; int found = 0, udpsock, opt = 1, len, fd = -1; char *if_name; char ip_ntop_buf[INET_ADDRSTRLEN]; char nextserver_ntop_buf[INET_ADDRSTRLEN]; char lease_buf[LEASE_SIZE]; char lease_file_buf[sizeof(_PATH_LEASE) + IF_NAMESIZE]; char tmpl[] = _PATH_LEASE"XXXXXXXXXX"; memset(&ifaliasreq, 0, sizeof(ifaliasreq)); if_name = if_indextoname(imsg->if_index, ifaliasreq.ifra_name); if (if_name == NULL) { log_warnx("%s: cannot find interface %d", __func__, imsg->if_index); return; } log_debug("%s %s", __func__, if_name); if (getifaddrs(&ifap) != 0) fatal("getifaddrs"); req_sin_addr = (struct sockaddr_in *)&ifaliasreq.ifra_addr; req_sin_addr->sin_family = AF_INET; req_sin_addr->sin_len = sizeof(*req_sin_addr); for (ifa = ifap; ifa != NULL; ifa = ifa->ifa_next) { struct in_addr addr, mask; if (strcmp(if_name, ifa->ifa_name) != 0) continue; if (ifa->ifa_addr == NULL) continue; if (ifa->ifa_addr->sa_family != AF_INET) continue; addr = ((struct sockaddr_in *)ifa->ifa_addr)->sin_addr; mask = ((struct sockaddr_in *)ifa->ifa_netmask)->sin_addr; if (imsg->addr.s_addr == addr.s_addr) { if (imsg->mask.s_addr == mask.s_addr) found = 1; else { req_sin_addr->sin_addr = addr; if (ioctl(ioctl_sock, SIOCDIFADDR, &ifaliasreq) == -1) { if (errno != EADDRNOTAVAIL) log_warn("SIOCDIFADDR"); } } break; } } freeifaddrs(ifap); req_sin_addr->sin_addr = imsg->addr; if (!found) { req_sin_mask = (struct sockaddr_in *)&ifaliasreq.ifra_mask; req_sin_mask->sin_family = AF_INET; req_sin_mask->sin_len = sizeof(*req_sin_mask); req_sin_mask->sin_addr = imsg->mask; if (ioctl(ioctl_sock, SIOCAIFADDR, &ifaliasreq) == -1) log_warn("SIOCAIFADDR"); } if (imsg->routes_len > 0) configure_routes(RTM_ADD, imsg); req_sin_addr->sin_port = ntohs(CLIENT_PORT); if ((udpsock = socket(AF_INET, SOCK_DGRAM, 0)) == -1) { log_warn("socket"); return; } if (setsockopt(udpsock, SOL_SOCKET, SO_REUSEADDR, &opt, sizeof(opt)) == -1) log_warn("setting SO_REUSEADDR on socket"); if (setsockopt(udpsock, SOL_SOCKET, SO_RTABLE, &imsg->rdomain, sizeof(imsg->rdomain)) == -1) { /* we might race against removal of the rdomain */ log_warn("setsockopt SO_RTABLE"); close(udpsock); return; } if (bind(udpsock, (struct sockaddr *)req_sin_addr, sizeof(*req_sin_addr)) == -1) { close(udpsock); return; } shutdown(udpsock, SHUT_RD); main_imsg_compose_frontend(IMSG_UDPSOCK, udpsock, &imsg->if_index, sizeof(imsg->if_index)); if (no_lease_files) return; if (inet_ntop(AF_INET, &imsg->addr, ip_ntop_buf, sizeof(ip_ntop_buf)) == NULL) { log_warn("%s: inet_ntop", __func__); return; } if (imsg->siaddr.s_addr == INADDR_ANY) nextserver_ntop_buf[0] = '\0'; else { if (inet_ntop(AF_INET, &imsg->siaddr, nextserver_ntop_buf, sizeof(nextserver_ntop_buf)) == NULL) { log_warn("%s: inet_ntop", __func__); return; } } len = snprintf(lease_file_buf, sizeof(lease_file_buf), "%s%s", _PATH_LEASE, if_name); if ( len == -1 || (size_t) len >= sizeof(lease_file_buf)) { log_warnx("%s: failed to encode lease path for %s", __func__, if_name); return; } len = snprintf(lease_buf, sizeof(lease_buf), "%s\n%s%s\n%s%s\n%s%s\n%s%s\n%s%s\n", LEASE_VERSION, LEASE_IP_PREFIX, ip_ntop_buf, LEASE_NEXTSERVER_PREFIX, nextserver_ntop_buf, LEASE_BOOTFILE_PREFIX, imsg->file, LEASE_HOSTNAME_PREFIX, imsg->hostname, LEASE_DOMAIN_PREFIX, imsg->domainname); if ( len == -1 || (size_t) len >= sizeof(lease_buf)) { log_warnx("%s: failed to encode lease for %s", __func__, ip_ntop_buf); return; } if ((fd = mkstemp(tmpl)) == -1) { log_warn("%s: mkstemp", __func__); return; } if (write(fd, lease_buf, len) < len) goto err; if (fchmod(fd, 0644) == -1) goto err; if (close(fd) == -1) goto err; fd = -1; if (rename(tmpl, lease_file_buf) == -1) goto err; return; err: log_warn("%s", __func__); if (fd != -1) close(fd); unlink(tmpl); } void deconfigure_interface(struct imsg_configure_interface *imsg) { struct ifaliasreq ifaliasreq; struct sockaddr_in *req_sin_addr; memset(&ifaliasreq, 0, sizeof(ifaliasreq)); #if 0 /* * When two default routes have the same gateway the kernel always * deletes the first which might be the wrong one. When we then * deconfigure the IP address from the interface the kernel deletes * all routes pointing out that interface and we end up with no * default. * This can happen with a wired & wireless interface on the same * layer 2 network and the user issues ifconfig $WIFI inet -autoconf. * Work around this issue by not deleting the default route and let * the kernel handle it when we remove the IP address a few lines * down. */ if (imsg->routes_len > 0) configure_routes(RTM_DELETE, imsg); #endif if (if_indextoname(imsg->if_index, ifaliasreq.ifra_name) == NULL) { log_warnx("%s: cannot find interface %d", __func__, imsg->if_index); return; } log_debug("%s %s", __func__, ifaliasreq.ifra_name); req_sin_addr = (struct sockaddr_in *)&ifaliasreq.ifra_addr; req_sin_addr->sin_family = AF_INET; req_sin_addr->sin_len = sizeof(*req_sin_addr); req_sin_addr->sin_addr = imsg->addr; if (ioctl(ioctl_sock, SIOCDIFADDR, &ifaliasreq) == -1) { if (errno != EADDRNOTAVAIL) log_warn("SIOCDIFADDR"); } } void configure_routes(uint8_t rtm_type, struct imsg_configure_interface *imsg) { struct sockaddr_in dst, mask, gw, ifa; in_addr_t addrnet, gwnet; int i; memset(&ifa, 0, sizeof(ifa)); ifa.sin_family = AF_INET; ifa.sin_len = sizeof(ifa); ifa.sin_addr = imsg->addr; memset(&dst, 0, sizeof(dst)); dst.sin_family = AF_INET; dst.sin_len = sizeof(dst); memset(&mask, 0, sizeof(mask)); mask.sin_family = AF_INET; mask.sin_len = sizeof(mask); memset(&gw, 0, sizeof(gw)); gw.sin_family = AF_INET; gw.sin_len = sizeof(gw); addrnet = imsg->addr.s_addr & imsg->mask.s_addr; for (i = 0; i < imsg->routes_len; i++) { dst.sin_addr = imsg->routes[i].dst; mask.sin_addr = imsg->routes[i].mask; gw.sin_addr = imsg->routes[i].gw; if (gw.sin_addr.s_addr == INADDR_ANY) { /* direct route */ configure_route(rtm_type, imsg->if_index, imsg->rdomain, &dst, &mask, &ifa, NULL, RTF_CLONING); } else if (mask.sin_addr.s_addr == INADDR_ANY) { /* default route */ gwnet = gw.sin_addr.s_addr & imsg->mask.s_addr; if (addrnet != gwnet) { /* * The gateway for the default route is outside * the configured prefix. Install a direct * cloning route for the gateway to make the * default route reachable. */ mask.sin_addr.s_addr = 0xffffffff; configure_route(rtm_type, imsg->if_index, imsg->rdomain, &gw, &mask, &ifa, NULL, RTF_CLONING); mask.sin_addr = imsg->routes[i].mask; } if (gw.sin_addr.s_addr == ifa.sin_addr.s_addr) { /* directly connected default */ configure_route(rtm_type, imsg->if_index, imsg->rdomain, &dst, &mask, &gw, NULL, 0); } else { /* default route via gateway */ configure_route(rtm_type, imsg->if_index, imsg->rdomain, &dst, &mask, &gw, &ifa, RTF_GATEWAY); } } else { /* non-default via gateway */ configure_route(rtm_type, imsg->if_index, imsg->rdomain, &dst, &mask, &gw, NULL, RTF_GATEWAY); } } } #define ROUNDUP(a) \ (((a) & (sizeof(long) - 1)) ? (1 + ((a) | (sizeof(long) - 1))) : (a)) void configure_route(uint8_t rtm_type, uint32_t if_index, int rdomain, struct sockaddr_in *dst, struct sockaddr_in *mask, struct sockaddr_in *gw, struct sockaddr_in *ifa, int rtm_flags) { struct rt_msghdr rtm; struct sockaddr_dl ifp; struct sockaddr_rtlabel rl; struct iovec iov[14]; long pad = 0; int iovcnt = 0, padlen; memset(&rtm, 0, sizeof(rtm)); rtm.rtm_version = RTM_VERSION; rtm.rtm_type = rtm_type; rtm.rtm_msglen = sizeof(rtm); rtm.rtm_index = if_index; rtm.rtm_tableid = rdomain; rtm.rtm_seq = ++rtm_seq; rtm.rtm_priority = RTP_NONE; rtm.rtm_addrs = RTA_DST | RTA_GATEWAY | RTA_NETMASK | RTA_IFP | RTA_LABEL; rtm.rtm_flags = RTF_UP | RTF_STATIC | RTF_MPATH | rtm_flags; if (ifa) rtm.rtm_addrs |= RTA_IFA; iov[iovcnt].iov_base = &rtm; iov[iovcnt++].iov_len = sizeof(rtm); iov[iovcnt].iov_base = dst; iov[iovcnt++].iov_len = dst->sin_len; rtm.rtm_msglen += dst->sin_len; padlen = ROUNDUP(dst->sin_len) - dst->sin_len; if (padlen > 0) { iov[iovcnt].iov_base = &pad; iov[iovcnt++].iov_len = padlen; rtm.rtm_msglen += padlen; } iov[iovcnt].iov_base = gw; iov[iovcnt++].iov_len = gw->sin_len; rtm.rtm_msglen += gw->sin_len; padlen = ROUNDUP(gw->sin_len) - gw->sin_len; if (padlen > 0) { iov[iovcnt].iov_base = &pad; iov[iovcnt++].iov_len = padlen; rtm.rtm_msglen += padlen; } iov[iovcnt].iov_base = mask; iov[iovcnt++].iov_len = mask->sin_len; rtm.rtm_msglen += mask->sin_len; padlen = ROUNDUP(mask->sin_len) - mask->sin_len; if (padlen > 0) { iov[iovcnt].iov_base = &pad; iov[iovcnt++].iov_len = padlen; rtm.rtm_msglen += padlen; } memset(&ifp, 0, sizeof(ifp)); ifp.sdl_len = sizeof(struct sockaddr_dl); ifp.sdl_family = AF_LINK; ifp.sdl_index = if_index; iov[iovcnt].iov_base = &ifp; iov[iovcnt++].iov_len = sizeof(ifp); rtm.rtm_msglen += sizeof(ifp); padlen = ROUNDUP(sizeof(ifp)) - sizeof(ifp); if (padlen > 0) { iov[iovcnt].iov_base = &pad; iov[iovcnt++].iov_len = padlen; rtm.rtm_msglen += padlen; } if (ifa) { iov[iovcnt].iov_base = ifa; iov[iovcnt++].iov_len = ifa->sin_len; rtm.rtm_msglen += ifa->sin_len; padlen = ROUNDUP(ifa->sin_len) - ifa->sin_len; if (padlen > 0) { iov[iovcnt].iov_base = &pad; iov[iovcnt++].iov_len = padlen; rtm.rtm_msglen += padlen; } } memset(&rl, 0, sizeof(rl)); rl.sr_len = sizeof(rl); rl.sr_family = AF_UNSPEC; (void)snprintf(rl.sr_label, sizeof(rl.sr_label), "%s", DHCPLEASED_RTA_LABEL); iov[iovcnt].iov_base = &rl; iov[iovcnt++].iov_len = sizeof(rl); rtm.rtm_msglen += sizeof(rl); padlen = ROUNDUP(sizeof(rl)) - sizeof(rl); if (padlen > 0) { iov[iovcnt].iov_base = &pad; iov[iovcnt++].iov_len = padlen; rtm.rtm_msglen += padlen; } if (writev(routesock, iov, iovcnt) == -1) { if (errno != EEXIST) log_warn("failed to send route message"); } } #ifndef SMALL const char* sin_to_str(struct sockaddr_in *sin) { static char hbuf[NI_MAXHOST]; int error; error = getnameinfo((struct sockaddr *)sin, sin->sin_len, hbuf, sizeof(hbuf), NULL, 0, NI_NUMERICHOST | NI_NUMERICSERV); if (error) { log_warnx("%s", gai_strerror(error)); strlcpy(hbuf, "unknown", sizeof(hbuf)); } return hbuf; } #endif /* SMALL */ void open_bpfsock(uint32_t if_index) { int bpfsock; char ifname[IF_NAMESIZE]; if (if_indextoname(if_index, ifname) == NULL) { log_warnx("%s: cannot find interface %d", __func__, if_index); return; } if ((bpfsock = get_bpf_sock(ifname)) == -1) return; main_imsg_compose_frontend(IMSG_BPFSOCK, bpfsock, &if_index, sizeof(if_index)); } void propose_rdns(struct imsg_propose_rdns *rdns) { struct rt_msghdr rtm; struct sockaddr_rtdns rtdns; struct iovec iov[3]; long pad = 0; int iovcnt = 0, padlen; memset(&rtm, 0, sizeof(rtm)); rtm.rtm_version = RTM_VERSION; rtm.rtm_type = RTM_PROPOSAL; rtm.rtm_msglen = sizeof(rtm); rtm.rtm_tableid = rdns->rdomain; rtm.rtm_index = rdns->if_index; rtm.rtm_seq = ++rtm_seq; rtm.rtm_priority = RTP_PROPOSAL_DHCLIENT; rtm.rtm_addrs = RTA_DNS; rtm.rtm_flags = RTF_UP; iov[iovcnt].iov_base = &rtm; iov[iovcnt++].iov_len = sizeof(rtm); memset(&rtdns, 0, sizeof(rtdns)); rtdns.sr_family = AF_INET; rtdns.sr_len = 2 + rdns->rdns_count * sizeof(struct in_addr); memcpy(rtdns.sr_dns, rdns->rdns, sizeof(rtdns.sr_dns)); iov[iovcnt].iov_base = &rtdns; iov[iovcnt++].iov_len = sizeof(rtdns); rtm.rtm_msglen += sizeof(rtdns); padlen = ROUNDUP(sizeof(rtdns)) - sizeof(rtdns); if (padlen > 0) { iov[iovcnt].iov_base = &pad; iov[iovcnt++].iov_len = padlen; rtm.rtm_msglen += padlen; } if (writev(routesock, iov, iovcnt) == -1) log_warn("failed to propose nameservers"); } void read_lease_file(struct imsg_ifinfo *imsg_ifinfo) { int len, fd; char if_name[IF_NAMESIZE]; char lease_file_buf[sizeof(_PATH_LEASE) + IF_NAMESIZE]; if (no_lease_files) return; memset(imsg_ifinfo->lease, 0, sizeof(imsg_ifinfo->lease)); if (if_indextoname(imsg_ifinfo->if_index, if_name) == NULL) { log_warnx("%s: cannot find interface %d", __func__, imsg_ifinfo->if_index); return; } len = snprintf(lease_file_buf, sizeof(lease_file_buf), "%s%s", _PATH_LEASE, if_name); if ( len == -1 || (size_t) len >= sizeof(lease_file_buf)) { log_warnx("%s: failed to encode lease path for %s", __func__, if_name); return; } if ((fd = open(lease_file_buf, O_RDONLY)) == -1) return; /* no need for error handling, we'll just do a DHCP discover */ read(fd, imsg_ifinfo->lease, sizeof(imsg_ifinfo->lease) - 1); close(fd); } #ifndef SMALL void merge_config(struct dhcpleased_conf *conf, struct dhcpleased_conf *xconf) { struct iface_conf *iface_conf; /* Remove & discard existing interfaces. */ while ((iface_conf = SIMPLEQ_FIRST(&conf->iface_list)) != NULL) { SIMPLEQ_REMOVE_HEAD(&conf->iface_list, entry); free(iface_conf->vc_id); free(iface_conf->c_id); free(iface_conf->h_name); free(iface_conf); } /* Add new interfaces. */ SIMPLEQ_CONCAT(&conf->iface_list, &xconf->iface_list); free(xconf); } struct dhcpleased_conf * config_new_empty(void) { struct dhcpleased_conf *xconf; xconf = calloc(1, sizeof(*xconf)); if (xconf == NULL) fatal(NULL); SIMPLEQ_INIT(&xconf->iface_list); return (xconf); } void config_clear(struct dhcpleased_conf *conf) { struct dhcpleased_conf *xconf; /* Merge current config with an empty config. */ xconf = config_new_empty(); merge_config(conf, xconf); free(conf); } #endif /* SMALL */