Set default for min-update-interval to 30
[project/odhcp6c.git] / src / odhcp6c.c
1 /**
2 * Copyright (C) 2012-2014 Steven Barth <steven@midlink.org>
3 *
4 * This program is free software; you can redistribute it and/or modify
5 * it under the terms of the GNU General Public License v2 as published by
6 * the Free Software Foundation.
7 *
8 * This program is distributed in the hope that it will be useful,
9 * but WITHOUT ANY WARRANTY; without even the implied warranty of
10 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
11 * GNU General Public License for more details.
12 *
13 */
14
15 #include <time.h>
16 #include <errno.h>
17 #include <fcntl.h>
18 #include <stdio.h>
19 #include <stdlib.h>
20 #include <stddef.h>
21 #include <unistd.h>
22 #include <syslog.h>
23 #include <signal.h>
24 #include <string.h>
25 #include <stdbool.h>
26
27 #include <net/if.h>
28 #include <sys/wait.h>
29 #include <sys/syscall.h>
30 #include <arpa/inet.h>
31
32 #include "odhcp6c.h"
33 #include "ra.h"
34
35 #ifdef EXT_BFD_PING
36 #include "bfd.h"
37 #endif
38
39
40 static void sighandler(int signal);
41 static int usage(void);
42
43 static uint8_t *state_data[_STATE_MAX] = {NULL};
44 static size_t state_len[_STATE_MAX] = {0};
45
46 static volatile bool signal_io = false;
47 static volatile bool signal_usr1 = false;
48 static volatile bool signal_usr2 = false;
49 static volatile bool signal_term = false;
50
51 static int urandom_fd = -1, allow_slaac_only = 0;
52 static bool bound = false, release = true;
53 static time_t last_update = 0;
54
55 static unsigned int min_update_interval = DEFAULT_MIN_UPDATE_INTERVAL;
56
57 int main(_unused int argc, char* const argv[])
58 {
59 // Allocate ressources
60 const char *pidfile = NULL;
61 const char *script = "/usr/sbin/odhcp6c-update";
62 ssize_t l;
63 uint8_t buf[134];
64 char *optpos;
65 uint16_t opttype;
66 uint16_t optlen;
67 enum odhcp6c_ia_mode ia_na_mode = IA_MODE_TRY;
68 enum odhcp6c_ia_mode ia_pd_mode = IA_MODE_NONE;
69 int ia_pd_iaid_index = 0;
70 static struct in6_addr ifid = IN6ADDR_ANY_INIT;
71 int sol_timeout = DHCPV6_SOL_MAX_RT;
72
73 #ifdef EXT_BFD_PING
74 int bfd_interval = 0, bfd_loss = 3;
75 #endif
76
77 bool help = false, daemonize = false;
78 int logopt = LOG_PID;
79 int c;
80 unsigned int client_options = DHCPV6_CLIENT_FQDN | DHCPV6_ACCEPT_RECONFIGURE;
81
82 while ((c = getopt(argc, argv, "S::N:V:P:FB:c:i:r:Ru:s:kt:m:hedp:fa")) != -1) {
83 switch (c) {
84 case 'S':
85 allow_slaac_only = (optarg) ? atoi(optarg) : -1;
86 break;
87
88 case 'N':
89 if (!strcmp(optarg, "force")) {
90 ia_na_mode = IA_MODE_FORCE;
91 allow_slaac_only = -1;
92 } else if (!strcmp(optarg, "none")) {
93 ia_na_mode = IA_MODE_NONE;
94 } else if (!strcmp(optarg, "try")) {
95 ia_na_mode = IA_MODE_TRY;
96 } else{
97 help = true;
98 }
99 break;
100
101 case 'V':
102 l = script_unhexlify(buf, sizeof(buf), optarg);
103 if (!l)
104 help=true;
105
106 odhcp6c_add_state(STATE_VENDORCLASS, buf, l);
107
108 break;
109 case 'P':
110 if (ia_pd_mode == IA_MODE_NONE)
111 ia_pd_mode = IA_MODE_TRY;
112
113 if (allow_slaac_only >= 0 && allow_slaac_only < 10)
114 allow_slaac_only = 10;
115
116 char *iaid_begin;
117 int iaid_len = 0;
118
119 int prefix_length = strtoul(optarg, &iaid_begin, 10);
120
121 if (*iaid_begin != '\0' && *iaid_begin != ',' && *iaid_begin != ':') {
122 syslog(LOG_ERR, "invalid argument: '%s'", optarg);
123 return 1;
124 }
125
126 struct odhcp6c_request_prefix prefix = { 0, prefix_length };
127
128 if (*iaid_begin == ',' && (iaid_len = strlen(iaid_begin)) > 1)
129 memcpy(&prefix.iaid, iaid_begin + 1, iaid_len > 4 ? 4 : iaid_len);
130 else if (*iaid_begin == ':')
131 prefix.iaid = htonl((uint32_t)strtoul(&iaid_begin[1], NULL, 16));
132 else
133 prefix.iaid = htonl(++ia_pd_iaid_index);
134
135 odhcp6c_add_state(STATE_IA_PD_INIT, &prefix, sizeof(prefix));
136
137 break;
138
139 case 'F':
140 allow_slaac_only = -1;
141 ia_pd_mode = IA_MODE_FORCE;
142 break;
143
144 #ifdef EXT_BFD_PING
145 case 'B':
146 bfd_interval = atoi(optarg);
147 break;
148 #endif
149
150 case 'c':
151 l = script_unhexlify(&buf[4], sizeof(buf) - 4, optarg);
152 if (l > 0) {
153 buf[0] = 0;
154 buf[1] = DHCPV6_OPT_CLIENTID;
155 buf[2] = 0;
156 buf[3] = l;
157 odhcp6c_add_state(STATE_CLIENT_ID, buf, l + 4);
158 } else {
159 help = true;
160 }
161 break;
162
163 case 'i':
164 if (inet_pton(AF_INET6, optarg, &ifid) != 1)
165 help = true;
166 break;
167
168 case 'r':
169 optpos = optarg;
170 while (optpos[0]) {
171 opttype = htons(strtoul(optarg, &optpos, 10));
172 if (optpos == optarg)
173 break;
174 else if (optpos[0])
175 optarg = &optpos[1];
176 odhcp6c_add_state(STATE_ORO, &opttype, 2);
177 }
178 break;
179
180 case 'R':
181 client_options |= DHCPV6_STRICT_OPTIONS;
182 break;
183
184 case 'u':
185 optlen = htons(strlen(optarg));
186 odhcp6c_add_state(STATE_USERCLASS, &optlen, 2);
187 odhcp6c_add_state(STATE_USERCLASS, optarg, strlen(optarg));
188 break;
189
190 case 's':
191 script = optarg;
192 break;
193
194 case 'k':
195 release = false;
196 break;
197
198 case 't':
199 sol_timeout = atoi(optarg);
200 break;
201
202 case 'm':
203 min_update_interval = atoi(optarg);
204 break;
205
206 case 'e':
207 logopt |= LOG_PERROR;
208 break;
209
210 case 'd':
211 daemonize = true;
212 break;
213
214 case 'p':
215 pidfile = optarg;
216 break;
217
218 case 'f':
219 client_options &= ~DHCPV6_CLIENT_FQDN;
220 break;
221
222 case 'a':
223 client_options &= ~DHCPV6_ACCEPT_RECONFIGURE;
224 break;
225
226 default:
227 help = true;
228 break;
229 }
230 }
231
232 openlog("odhcp6c", logopt, LOG_DAEMON);
233 const char *ifname = argv[optind];
234
235 if (help || !ifname)
236 return usage();
237
238 signal(SIGIO, sighandler);
239 signal(SIGHUP, sighandler);
240 signal(SIGINT, sighandler);
241 signal(SIGCHLD, sighandler);
242 signal(SIGTERM, sighandler);
243 signal(SIGUSR1, sighandler);
244 signal(SIGUSR2, sighandler);
245
246 if ((urandom_fd = open("/dev/urandom", O_CLOEXEC | O_RDONLY)) < 0 ||
247 init_dhcpv6(ifname, client_options, sol_timeout) ||
248 ra_init(ifname, &ifid) || script_init(script, ifname)) {
249 syslog(LOG_ERR, "failed to initialize: %s", strerror(errno));
250 return 3;
251 }
252
253 if (daemonize) {
254 openlog("odhcp6c", LOG_PID, LOG_DAEMON); // Disable LOG_PERROR
255 if (daemon(0, 0)) {
256 syslog(LOG_ERR, "Failed to daemonize: %s",
257 strerror(errno));
258 return 4;
259 }
260
261 char pidbuf[128];
262 if (!pidfile) {
263 snprintf(pidbuf, sizeof(pidbuf),
264 "/var/run/odhcp6c.%s.pid", ifname);
265 pidfile = pidbuf;
266 }
267
268 int fd = open(pidfile, O_WRONLY | O_CREAT, 0644);
269 if (fd >= 0) {
270 char buf[8];
271 int len = snprintf(buf, sizeof(buf), "%i\n", getpid());
272 write(fd, buf, len);
273 close(fd);
274 }
275 }
276
277 script_call("started");
278
279 while (!signal_term) { // Main logic
280 odhcp6c_clear_state(STATE_SERVER_ID);
281 odhcp6c_clear_state(STATE_IA_NA);
282 odhcp6c_clear_state(STATE_IA_PD);
283 odhcp6c_clear_state(STATE_SNTP_IP);
284 odhcp6c_clear_state(STATE_NTP_IP);
285 odhcp6c_clear_state(STATE_NTP_FQDN);
286 odhcp6c_clear_state(STATE_SIP_IP);
287 odhcp6c_clear_state(STATE_SIP_FQDN);
288 dhcpv6_set_ia_mode(ia_na_mode, ia_pd_mode);
289 bound = false;
290
291 syslog(LOG_NOTICE, "(re)starting transaction on %s", ifname);
292
293 signal_usr1 = signal_usr2 = false;
294 int mode = dhcpv6_request(DHCPV6_MSG_SOLICIT);
295 odhcp6c_signal_process();
296
297 if (mode < 0)
298 continue;
299
300 do {
301 int res = dhcpv6_request(mode == DHCPV6_STATELESS ?
302 DHCPV6_MSG_INFO_REQ : DHCPV6_MSG_REQUEST);
303 bool signalled = odhcp6c_signal_process();
304
305 if (res > 0)
306 break;
307 else if (signalled) {
308 mode = -1;
309 break;
310 }
311
312 mode = dhcpv6_promote_server_cand();
313 } while (mode > DHCPV6_UNKNOWN);
314
315 if (mode < 0)
316 continue;
317
318 switch (mode) {
319 case DHCPV6_STATELESS:
320 bound = true;
321 syslog(LOG_NOTICE, "entering stateless-mode on %s", ifname);
322
323 while (!signal_usr2 && !signal_term) {
324 signal_usr1 = false;
325 script_call("informed");
326
327 int res = dhcpv6_poll_reconfigure();
328 odhcp6c_signal_process();
329
330 if (res > 0)
331 continue;
332
333 if (signal_usr1) {
334 signal_usr1 = false; // Acknowledged
335 continue;
336 }
337 if (signal_usr2 || signal_term)
338 break;
339
340 res = dhcpv6_request(DHCPV6_MSG_INFO_REQ);
341 odhcp6c_signal_process();
342 if (signal_usr1)
343 continue;
344 else if (res < 0)
345 break;
346 }
347 break;
348
349 case DHCPV6_STATEFUL:
350 script_call("bound");
351 bound = true;
352 syslog(LOG_NOTICE, "entering stateful-mode on %s", ifname);
353 #ifdef EXT_BFD_PING
354 if (bfd_interval > 0)
355 bfd_start(ifname, bfd_loss, bfd_interval);
356 #endif
357
358 while (!signal_usr2 && !signal_term) {
359 // Renew Cycle
360 // Wait for T1 to expire or until we get a reconfigure
361 int res = dhcpv6_poll_reconfigure();
362 odhcp6c_signal_process();
363 if (res > 0) {
364 script_call("updated");
365 continue;
366 }
367
368 // Handle signal, if necessary
369 if (signal_usr1)
370 signal_usr1 = false; // Acknowledged
371 if (signal_usr2 || signal_term)
372 break; // Other signal type
373
374 // Send renew as T1 expired
375 size_t ia_pd_len, ia_na_len;
376 odhcp6c_get_state(STATE_IA_PD, &ia_pd_len);
377 odhcp6c_get_state(STATE_IA_NA, &ia_na_len);
378
379 // If we have any IAs, send renew, otherwise request
380 if (ia_pd_len == 0 && ia_na_len == 0)
381 res = dhcpv6_request(DHCPV6_MSG_REQUEST);
382 else
383 res = dhcpv6_request(DHCPV6_MSG_RENEW);
384
385 odhcp6c_signal_process();
386 if (res > 0) { // Renew was succesfull
387 // Publish updates
388 script_call("updated");
389 continue; // Renew was successful
390 }
391
392 odhcp6c_clear_state(STATE_SERVER_ID); // Remove binding
393
394 // If we have IAs, try rebind otherwise restart
395 res = dhcpv6_request(DHCPV6_MSG_REBIND);
396 odhcp6c_signal_process();
397
398 if (res > 0)
399 script_call("rebound");
400 else {
401 #ifdef EXT_BFD_PING
402 bfd_stop();
403 #endif
404 break;
405 }
406 }
407 break;
408
409 default:
410 break;
411 }
412
413 size_t ia_pd_len, ia_na_len, server_id_len;
414 odhcp6c_get_state(STATE_IA_PD, &ia_pd_len);
415 odhcp6c_get_state(STATE_IA_NA, &ia_na_len);
416 odhcp6c_get_state(STATE_SERVER_ID, &server_id_len);
417
418 // Add all prefixes to lost prefixes
419 bound = false;
420 script_call("unbound");
421
422 if (server_id_len > 0 && (ia_pd_len > 0 || ia_na_len > 0) && release)
423 dhcpv6_request(DHCPV6_MSG_RELEASE);
424
425 odhcp6c_clear_state(STATE_IA_NA);
426 odhcp6c_clear_state(STATE_IA_PD);
427 }
428
429 script_call("stopped");
430 return 0;
431 }
432
433
434 static int usage(void)
435 {
436 const char buf[] =
437 "Usage: odhcp6c [options] <interface>\n"
438 "\nFeature options:\n"
439 " -S <time> Wait at least <time> sec for a DHCP-server (0)\n"
440 " -N <mode> Mode for requesting addresses [try|force|none]\n"
441 " -P <length> Request IPv6-Prefix (0 = auto)\n"
442 " -F Force IPv6-Prefix\n"
443 " -V <class> Set vendor-class option (base-16 encoded)\n"
444 #ifdef EXT_BFD_PING
445 " -B <interval> Enable BFD ping check\n"
446 #endif
447 " -c <clientid> Override client-ID (base-16 encoded)\n"
448 " -i <iface-id> Use a custom interface identifier for RA handling\n"
449 " -r <options> Options to be requested (comma-separated)\n"
450 " -R Do not request any options except those specified with -r\n"
451 " -s <script> Status update script (/usr/sbin/odhcp6c-update)\n"
452 " -a Don't send Accept Reconfigure option\n"
453 " -f Don't send Client FQDN option\n"
454 " -k Don't send a RELEASE when stopping\n"
455 " -t <seconds> Maximum timeout for DHCPv6-SOLICIT (3600)\n"
456 " -m <seconds> Minimum time between accepting updates (30)\n"
457 "\nInvocation options:\n"
458 " -p <pidfile> Set pidfile (/var/run/odhcp6c.pid)\n"
459 " -d Daemonize\n"
460 " -e Write logmessages to stderr\n"
461 //" -v Increase logging verbosity\n"
462 " -h Show this help\n\n";
463 write(STDERR_FILENO, buf, sizeof(buf));
464 return 1;
465 }
466
467
468 // Don't want to pull-in librt and libpthread just for a monotonic clock...
469 uint64_t odhcp6c_get_milli_time(void)
470 {
471 struct timespec t = {0, 0};
472 syscall(SYS_clock_gettime, CLOCK_MONOTONIC, &t);
473 return t.tv_sec * 1000 + t.tv_nsec / 1000000;
474 }
475
476
477 static uint8_t* odhcp6c_resize_state(enum odhcp6c_state state, ssize_t len)
478 {
479 if (len == 0)
480 return state_data[state] + state_len[state];
481 else if (state_len[state] + len > 1024)
482 return NULL;
483
484 uint8_t *n = realloc(state_data[state], state_len[state] + len);
485 if (n || state_len[state] + len == 0) {
486 state_data[state] = n;
487 n += state_len[state];
488 state_len[state] += len;
489 }
490 return n;
491 }
492
493
494 bool odhcp6c_signal_process(void)
495 {
496 while (signal_io) {
497 signal_io = false;
498
499 bool ra_updated = ra_process();
500
501 if (ra_link_up())
502 signal_usr2 = true;
503
504 if (ra_updated && (bound || allow_slaac_only == 0))
505 script_call("ra-updated"); // Immediate process urgent events
506 else if (ra_updated && !bound && allow_slaac_only > 0)
507 script_delay_call("ra-updated", allow_slaac_only);
508
509 #ifdef EXT_BFD_PING
510 bfd_receive();
511 #endif
512 }
513
514 return signal_usr1 || signal_usr2 || signal_term;
515 }
516
517
518 void odhcp6c_clear_state(enum odhcp6c_state state)
519 {
520 state_len[state] = 0;
521 }
522
523
524 void odhcp6c_add_state(enum odhcp6c_state state, const void *data, size_t len)
525 {
526 uint8_t *n = odhcp6c_resize_state(state, len);
527 if (n)
528 memcpy(n, data, len);
529 }
530
531 void odhcp6c_insert_state(enum odhcp6c_state state, size_t offset, const void *data, size_t len)
532 {
533 ssize_t len_after = state_len[state] - offset;
534 if (len_after < 0)
535 return;
536
537 uint8_t *n = odhcp6c_resize_state(state, len);
538 if (n) {
539 uint8_t *sdata = state_data[state];
540
541 memmove(sdata + offset + len, sdata + offset, len_after);
542 memcpy(sdata + offset, data, len);
543 }
544 }
545
546 size_t odhcp6c_remove_state(enum odhcp6c_state state, size_t offset, size_t len)
547 {
548 uint8_t *data = state_data[state];
549 ssize_t len_after = state_len[state] - (offset + len);
550 if (len_after < 0)
551 return state_len[state];
552
553 memmove(data + offset, data + offset + len, len_after);
554 return state_len[state] -= len;
555 }
556
557
558 void* odhcp6c_move_state(enum odhcp6c_state state, size_t *len)
559 {
560 *len = state_len[state];
561 void *data = state_data[state];
562
563 state_len[state] = 0;
564 state_data[state] = NULL;
565
566 return data;
567 }
568
569
570 void* odhcp6c_get_state(enum odhcp6c_state state, size_t *len)
571 {
572 *len = state_len[state];
573 return state_data[state];
574 }
575
576
577 struct odhcp6c_entry* odhcp6c_find_entry(enum odhcp6c_state state, const struct odhcp6c_entry *new)
578 {
579 size_t len, cmplen = offsetof(struct odhcp6c_entry, target) + new->length / 8;
580 struct odhcp6c_entry *start = odhcp6c_get_state(state, &len);
581 struct odhcp6c_entry *x = NULL;
582
583 for (struct odhcp6c_entry *c = start; !x && c < &start[len/sizeof(*c)]; ++c)
584 if (!memcmp(c, new, cmplen))
585 return c;
586
587 return NULL;
588 }
589
590
591 bool odhcp6c_update_entry_safe(enum odhcp6c_state state, struct odhcp6c_entry *new, uint32_t safe)
592 {
593 size_t len;
594 struct odhcp6c_entry *x = odhcp6c_find_entry(state, new);
595 struct odhcp6c_entry *start = odhcp6c_get_state(state, &len);
596
597 if (x && x->valid > new->valid && new->valid < safe)
598 new->valid = safe;
599
600 if (new->valid > 0) {
601 if (x) {
602 if (new->valid >= x->valid && new->valid != UINT32_MAX &&
603 new->valid - x->valid < min_update_interval &&
604 new->preferred >= x->preferred &&
605 new->preferred != UINT32_MAX &&
606 new->preferred - x->preferred < min_update_interval &&
607 x->class == new->class)
608 return false;
609 x->valid = new->valid;
610 x->preferred = new->preferred;
611 x->t1 = new->t1;
612 x->t2 = new->t2;
613 x->class = new->class;
614 x->iaid = new->iaid;
615 } else {
616 odhcp6c_add_state(state, new, sizeof(*new));
617 }
618 } else if (x) {
619 odhcp6c_remove_state(state, (x - start) * sizeof(*x), sizeof(*x));
620 }
621 return true;
622 }
623
624
625 bool odhcp6c_update_entry(enum odhcp6c_state state, struct odhcp6c_entry *new)
626 {
627 return odhcp6c_update_entry_safe(state, new, 0);
628 }
629
630
631 static void odhcp6c_expire_list(enum odhcp6c_state state, uint32_t elapsed)
632 {
633 size_t len;
634 struct odhcp6c_entry *start = odhcp6c_get_state(state, &len);
635 for (struct odhcp6c_entry *c = start; c < &start[len / sizeof(*c)]; ++c) {
636 if (c->t1 < elapsed)
637 c->t1 = 0;
638 else if (c->t1 != UINT32_MAX)
639 c->t1 -= elapsed;
640
641 if (c->t2 < elapsed)
642 c->t2 = 0;
643 else if (c->t2 != UINT32_MAX)
644 c->t2 -= elapsed;
645
646 if (c->preferred < elapsed)
647 c->preferred = 0;
648 else if (c->preferred != UINT32_MAX)
649 c->preferred -= elapsed;
650
651 if (c->valid < elapsed)
652 c->valid = 0;
653 else if (c->valid != UINT32_MAX)
654 c->valid -= elapsed;
655
656 if (!c->valid)
657 odhcp6c_remove_state(state, (c - start) * sizeof(*c), sizeof(*c));
658 }
659 }
660
661
662 void odhcp6c_expire(void)
663 {
664 time_t now = odhcp6c_get_milli_time() / 1000;
665 uint32_t elapsed = (last_update > 0) ? now - last_update : 0;
666 last_update = now;
667
668 odhcp6c_expire_list(STATE_RA_PREFIX, elapsed);
669 odhcp6c_expire_list(STATE_RA_ROUTE, elapsed);
670 odhcp6c_expire_list(STATE_RA_DNS, elapsed);
671 odhcp6c_expire_list(STATE_IA_NA, elapsed);
672 odhcp6c_expire_list(STATE_IA_PD, elapsed);
673 }
674
675
676 uint32_t odhcp6c_elapsed(void)
677 {
678 return odhcp6c_get_milli_time() / 1000 - last_update;
679 }
680
681
682 void odhcp6c_random(void *buf, size_t len)
683 {
684 read(urandom_fd, buf, len);
685 }
686
687 bool odhcp6c_is_bound(void)
688 {
689 return bound;
690 }
691
692 static void sighandler(int signal)
693 {
694 if (signal == SIGCHLD)
695 while (waitpid(-1, NULL, WNOHANG) > 0);
696 else if (signal == SIGUSR1)
697 signal_usr1 = true;
698 else if (signal == SIGUSR2)
699 signal_usr2 = true;
700 else if (signal == SIGIO)
701 signal_io = true;
702 else
703 signal_term = true;
704 }