/* $OpenBSD: ospfd.c,v 1.37 2006/12/07 19:14:27 claudio Exp $ */ /* * Copyright (c) 2005 Claudio Jeker * Copyright (c) 2004 Esben Norby * Copyright (c) 2003, 2004 Henning Brauer * * Permission to use, copy, modify, and distribute this software for any * purpose with or without fee is hereby granted, provided that the above * copyright notice and this permission notice appear in all copies. * * THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES * WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF * MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR * ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES * WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN * ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF * OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. */ #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include "ospfd.h" #include "ospf.h" #include "ospfe.h" #include "control.h" #include "log.h" #include "rde.h" void main_sig_handler(int, short, void *); __dead void usage(void); void ospfd_shutdown(void); int check_child(pid_t, const char *); void main_dispatch_ospfe(int, short, void *); void main_dispatch_rde(int, short, void *); int check_file_secrecy(int, const char *); void ospf_redistribute_default(int); int pipe_parent2ospfe[2]; int pipe_parent2rde[2]; int pipe_ospfe2rde[2]; struct ospfd_conf *conf = NULL; struct imsgbuf *ibuf_ospfe; struct imsgbuf *ibuf_rde; pid_t ospfe_pid = 0; pid_t rde_pid = 0; /* ARGSUSED */ void main_sig_handler(int sig, short event, void *arg) { /* * signal handler rules don't apply, libevent decouples for us */ int die = 0; switch (sig) { case SIGTERM: case SIGINT: die = 1; /* FALLTHROUGH */ case SIGCHLD: if (check_child(ospfe_pid, "ospf engine")) { ospfe_pid = 0; die = 1; } if (check_child(rde_pid, "route decision engine")) { rde_pid = 0; die = 1; } if (die) ospfd_shutdown(); break; case SIGHUP: /* reconfigure */ /* ... */ break; default: fatalx("unexpected signal"); /* NOTREACHED */ } } __dead void usage(void) { extern char *__progname; fprintf(stderr, "usage: %s [-dnv] [-f file]\n", __progname); exit(1); } int main(int argc, char *argv[]) { struct event ev_sigint, ev_sigterm, ev_sigchld, ev_sighup; char *conffile; int ch, opts = 0; int debug = 0; int ipforwarding; int mib[4]; size_t len; conffile = CONF_FILE; ospfd_process = PROC_MAIN; while ((ch = getopt(argc, argv, "df:nv")) != -1) { switch (ch) { case 'd': debug = 1; break; case 'f': conffile = optarg; break; case 'n': opts |= OSPFD_OPT_NOACTION; break; case 'v': if (opts & OSPFD_OPT_VERBOSE) opts |= OSPFD_OPT_VERBOSE2; opts |= OSPFD_OPT_VERBOSE; break; default: usage(); /* NOTREACHED */ } } /* start logging */ log_init(debug); mib[0] = CTL_NET; mib[1] = PF_INET; mib[2] = IPPROTO_IP; mib[3] = IPCTL_FORWARDING; len = sizeof(ipforwarding); if (sysctl(mib, 4, &ipforwarding, &len, NULL, 0) == -1) err(1, "sysctl"); if (!ipforwarding) log_warnx("WARNING: IP forwarding NOT enabled"); /* fetch interfaces early */ kif_init(); /* parse config file */ if ((conf = parse_config(conffile, opts)) == NULL ) exit(1); if (conf->opts & OSPFD_OPT_NOACTION) { if (conf->opts & OSPFD_OPT_VERBOSE) print_config(conf); else fprintf(stderr, "configuration OK\n"); exit(0); } /* check for root privileges */ if (geteuid()) errx(1, "need root privileges"); /* check for ospfd user */ if (getpwnam(OSPFD_USER) == NULL) errx(1, "unknown user %s", OSPFD_USER); if (!debug) daemon(1, 0); log_info("startup"); if (socketpair(AF_UNIX, SOCK_STREAM, PF_UNSPEC, pipe_parent2ospfe) == -1) fatal("socketpair"); if (socketpair(AF_UNIX, SOCK_STREAM, PF_UNSPEC, pipe_parent2rde) == -1) fatal("socketpair"); if (socketpair(AF_UNIX, SOCK_STREAM, PF_UNSPEC, pipe_ospfe2rde) == -1) fatal("socketpair"); session_socket_blockmode(pipe_parent2ospfe[0], BM_NONBLOCK); session_socket_blockmode(pipe_parent2ospfe[1], BM_NONBLOCK); session_socket_blockmode(pipe_parent2rde[0], BM_NONBLOCK); session_socket_blockmode(pipe_parent2rde[1], BM_NONBLOCK); session_socket_blockmode(pipe_ospfe2rde[0], BM_NONBLOCK); session_socket_blockmode(pipe_ospfe2rde[1], BM_NONBLOCK); /* start children */ rde_pid = rde(conf, pipe_parent2rde, pipe_ospfe2rde, pipe_parent2ospfe); ospfe_pid = ospfe(conf, pipe_parent2ospfe, pipe_ospfe2rde, pipe_parent2rde); /* show who we are */ setproctitle("parent"); event_init(); /* setup signal handler */ signal_set(&ev_sigint, SIGINT, main_sig_handler, NULL); signal_set(&ev_sigterm, SIGTERM, main_sig_handler, NULL); signal_set(&ev_sigchld, SIGCHLD, main_sig_handler, NULL); signal_set(&ev_sighup, SIGHUP, main_sig_handler, NULL); signal_add(&ev_sigint, NULL); signal_add(&ev_sigterm, NULL); signal_add(&ev_sigchld, NULL); signal_add(&ev_sighup, NULL); /* setup pipes to children */ close(pipe_parent2ospfe[1]); close(pipe_parent2rde[1]); close(pipe_ospfe2rde[0]); close(pipe_ospfe2rde[1]); if ((ibuf_ospfe = malloc(sizeof(struct imsgbuf))) == NULL || (ibuf_rde = malloc(sizeof(struct imsgbuf))) == NULL) fatal(NULL); imsg_init(ibuf_ospfe, pipe_parent2ospfe[0], main_dispatch_ospfe); imsg_init(ibuf_rde, pipe_parent2rde[0], main_dispatch_rde); /* setup event handler */ ibuf_ospfe->events = EV_READ; event_set(&ibuf_ospfe->ev, ibuf_ospfe->fd, ibuf_ospfe->events, ibuf_ospfe->handler, ibuf_ospfe); event_add(&ibuf_ospfe->ev, NULL); ibuf_rde->events = EV_READ; event_set(&ibuf_rde->ev, ibuf_rde->fd, ibuf_rde->events, ibuf_rde->handler, ibuf_rde); event_add(&ibuf_rde->ev, NULL); if (kr_init(!(conf->flags & OSPFD_FLAG_NO_FIB_UPDATE)) == -1) fatalx("kr_init failed"); /* redistribute default */ ospf_redistribute_default(IMSG_NETWORK_ADD); event_dispatch(); ospfd_shutdown(); /* NOTREACHED */ return (0); } void ospfd_shutdown(void) { struct area *a; pid_t pid; if (ospfe_pid) kill(ospfe_pid, SIGTERM); if (rde_pid) kill(rde_pid, SIGTERM); while ((a = LIST_FIRST(&conf->area_list)) != NULL) { LIST_REMOVE(a, entry); area_del(a); } control_cleanup(); kr_shutdown(); do { if ((pid = wait(NULL)) == -1 && errno != EINTR && errno != ECHILD) fatal("wait"); } while (pid != -1 || (pid == -1 && errno == EINTR)); msgbuf_clear(&ibuf_ospfe->w); free(ibuf_ospfe); msgbuf_clear(&ibuf_rde->w); free(ibuf_rde); free(conf); log_info("terminating"); exit(0); } int check_child(pid_t pid, const char *pname) { int status; if (waitpid(pid, &status, WNOHANG) > 0) { if (WIFEXITED(status)) { log_warnx("lost child: %s exited", pname); return (1); } if (WIFSIGNALED(status)) { log_warnx("lost child: %s terminated; signal %d", pname, WTERMSIG(status)); return (1); } } return (0); } /* imsg handling */ /* ARGSUSED */ void main_dispatch_ospfe(int fd, short event, void *bula) { struct imsgbuf *ibuf = bula; struct imsg imsg; ssize_t n; switch (event) { case EV_READ: if ((n = imsg_read(ibuf)) == -1) fatal("imsg_read error"); if (n == 0) /* connection closed */ fatalx("pipe closed"); break; case EV_WRITE: if (msgbuf_write(&ibuf->w) == -1) fatal("msgbuf_write"); imsg_event_add(ibuf); return; default: fatalx("unknown event"); } for (;;) { if ((n = imsg_get(ibuf, &imsg)) == -1) fatal("imsg_get"); if (n == 0) break; switch (imsg.hdr.type) { case IMSG_CTL_RELOAD: /* XXX reconfig */ break; case IMSG_CTL_FIB_COUPLE: kr_fib_couple(); break; case IMSG_CTL_FIB_DECOUPLE: kr_fib_decouple(); break; case IMSG_CTL_KROUTE: case IMSG_CTL_KROUTE_ADDR: kr_show_route(&imsg); break; case IMSG_CTL_IFINFO: if (imsg.hdr.len == IMSG_HEADER_SIZE) kr_ifinfo(NULL, imsg.hdr.pid); else if (imsg.hdr.len == IMSG_HEADER_SIZE + IFNAMSIZ) kr_ifinfo(imsg.data, imsg.hdr.pid); else log_warnx("IFINFO request with wrong len"); break; default: log_debug("main_dispatch_ospfe: error handling imsg %d", imsg.hdr.type); break; } imsg_free(&imsg); } imsg_event_add(ibuf); } /* ARGSUSED */ void main_dispatch_rde(int fd, short event, void *bula) { struct imsgbuf *ibuf = bula; struct imsg imsg; ssize_t n; switch (event) { case EV_READ: if ((n = imsg_read(ibuf)) == -1) fatal("imsg_read error"); if (n == 0) /* connection closed */ fatalx("pipe closed"); break; case EV_WRITE: if (msgbuf_write(&ibuf->w) == -1) fatal("msgbuf_write"); imsg_event_add(ibuf); return; default: fatalx("unknown event"); } for (;;) { if ((n = imsg_get(ibuf, &imsg)) == -1) fatal("imsg_get"); if (n == 0) break; switch (imsg.hdr.type) { case IMSG_KROUTE_CHANGE: if (kr_change(imsg.data)) log_warn("main_dispatch_rde: error changing " "route"); break; case IMSG_KROUTE_DELETE: if (kr_delete(imsg.data)) log_warn("main_dispatch_rde: error deleting " "route"); break; default: log_debug("main_dispatch_rde: error handling imsg %d", imsg.hdr.type); break; } imsg_free(&imsg); } imsg_event_add(ibuf); } void main_imsg_compose_ospfe(int type, pid_t pid, void *data, u_int16_t datalen) { imsg_compose(ibuf_ospfe, type, 0, pid, data, datalen); } void main_imsg_compose_rde(int type, pid_t pid, void *data, u_int16_t datalen) { imsg_compose(ibuf_rde, type, 0, pid, data, datalen); } int check_file_secrecy(int fd, const char *fname) { struct stat st; if (fstat(fd, &st)) { warn("cannot stat %s", fname); return (-1); } if (st.st_uid != 0 && st.st_uid != getuid()) { warnx("%s: owner not root or current user", fname); return (-1); } if (st.st_mode & (S_IRWXG | S_IRWXO)) { warnx("%s: group/world readable/writeable", fname); return (-1); } return (0); } /* this needs to be added here so that ospfctl can be used without libevent */ void imsg_event_add(struct imsgbuf *ibuf) { ibuf->events = EV_READ; if (ibuf->w.queued) ibuf->events |= EV_WRITE; event_del(&ibuf->ev); event_set(&ibuf->ev, ibuf->fd, ibuf->events, ibuf->handler, ibuf); event_add(&ibuf->ev, NULL); } int ospf_redistribute(struct kroute *kr, u_int32_t *metric) { struct redistribute *r; /* stub area router? */ if ((conf->options & OSPF_OPTION_E) == 0) return (0); /* only allow 0.0.0.0/0 via REDISTRIBUTE_DEFAULT */ if (kr->prefix.s_addr == INADDR_ANY && kr->prefixlen == 0) return (0); SIMPLEQ_FOREACH(r, &conf->redist_list, entry) { switch (r->type & ~REDIST_NO) { case REDIST_LABEL: if (kr->rtlabel == r->label) return (r->type & REDIST_NO ? 0 : 1); break; case REDIST_STATIC: /* * Dynamic routes are not redistributable. Placed here * so that link local addresses can be redistributed * via a rtlabel. */ if (kr->flags & F_DYNAMIC) continue; if (kr->flags & F_STATIC) { *metric = r->metric; return (r->type & REDIST_NO ? 0 : 1); } break; case REDIST_CONNECTED: if (kr->flags & F_DYNAMIC) continue; if (kr->flags & F_CONNECTED) { *metric = r->metric; return (r->type & REDIST_NO ? 0 : 1); } break; case REDIST_ADDR: if (kr->flags & F_DYNAMIC) continue; if ((kr->prefix.s_addr & r->mask.s_addr) == (r->addr.s_addr & r->mask.s_addr) && kr->prefixlen >= mask2prefixlen(r->mask.s_addr)) { *metric = r->metric; return (r->type & REDIST_NO? 0 : 1); } break; } } return (0); } void ospf_redistribute_default(int type) { struct kroute kr; bzero(&kr, sizeof(kr)); if (conf->redistribute & REDISTRIBUTE_DEFAULT) main_imsg_compose_rde(type, 0, &kr, sizeof(struct kroute)); }