Annotation of embedaddon/dnsmasq/src/rfc2131.c, revision 1.1
1.1 ! misho 1: /* dnsmasq is Copyright (c) 2000-2013 Simon Kelley
! 2:
! 3: This program is free software; you can redistribute it and/or modify
! 4: it under the terms of the GNU General Public License as published by
! 5: the Free Software Foundation; version 2 dated June, 1991, or
! 6: (at your option) version 3 dated 29 June, 2007.
! 7:
! 8: This program is distributed in the hope that it will be useful,
! 9: but WITHOUT ANY WARRANTY; without even the implied warranty of
! 10: MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
! 11: GNU General Public License for more details.
! 12:
! 13: You should have received a copy of the GNU General Public License
! 14: along with this program. If not, see <http://www.gnu.org/licenses/>.
! 15: */
! 16:
! 17: #include "dnsmasq.h"
! 18:
! 19: #ifdef HAVE_DHCP
! 20:
! 21: #define option_len(opt) ((int)(((unsigned char *)(opt))[1]))
! 22: #define option_ptr(opt, i) ((void *)&(((unsigned char *)(opt))[2u+(unsigned int)(i)]))
! 23:
! 24: #ifdef HAVE_SCRIPT
! 25: static void add_extradata_opt(struct dhcp_lease *lease, unsigned char *opt);
! 26: #endif
! 27:
! 28: static int sanitise(unsigned char *opt, char *buf);
! 29: static struct in_addr server_id(struct dhcp_context *context, struct in_addr override, struct in_addr fallback);
! 30: static unsigned int calc_time(struct dhcp_context *context, struct dhcp_config *config, unsigned char *opt);
! 31: static void option_put(struct dhcp_packet *mess, unsigned char *end, int opt, int len, unsigned int val);
! 32: static void option_put_string(struct dhcp_packet *mess, unsigned char *end,
! 33: int opt, char *string, int null_term);
! 34: static struct in_addr option_addr(unsigned char *opt);
! 35: static unsigned int option_uint(unsigned char *opt, int i, int size);
! 36: static void log_packet(char *type, void *addr, unsigned char *ext_mac,
! 37: int mac_len, char *interface, char *string, u32 xid);
! 38: static unsigned char *option_find(struct dhcp_packet *mess, size_t size, int opt_type, int minsize);
! 39: static unsigned char *option_find1(unsigned char *p, unsigned char *end, int opt, int minsize);
! 40: static size_t dhcp_packet_size(struct dhcp_packet *mess, unsigned char *agent_id, unsigned char *real_end);
! 41: static void clear_packet(struct dhcp_packet *mess, unsigned char *end);
! 42: static void do_options(struct dhcp_context *context,
! 43: struct dhcp_packet *mess,
! 44: unsigned char *real_end,
! 45: unsigned char *req_options,
! 46: char *hostname,
! 47: char *config_domain,
! 48: struct dhcp_netid *netid,
! 49: struct in_addr subnet_addr,
! 50: unsigned char fqdn_flags,
! 51: int null_term, int pxearch,
! 52: unsigned char *uuid,
! 53: int vendor_class_len,
! 54: time_t now);
! 55:
! 56:
! 57: static void match_vendor_opts(unsigned char *opt, struct dhcp_opt *dopt);
! 58: static int do_encap_opts(struct dhcp_opt *opts, int encap, int flag, struct dhcp_packet *mess, unsigned char *end, int null_term);
! 59: static void pxe_misc(struct dhcp_packet *mess, unsigned char *end, unsigned char *uuid);
! 60: static int prune_vendor_opts(struct dhcp_netid *netid);
! 61: static struct dhcp_opt *pxe_opts(int pxe_arch, struct dhcp_netid *netid, struct in_addr local, time_t now);
! 62: struct dhcp_boot *find_boot(struct dhcp_netid *netid);
! 63:
! 64:
! 65: size_t dhcp_reply(struct dhcp_context *context, char *iface_name, int int_index,
! 66: size_t sz, time_t now, int unicast_dest, int *is_inform, int pxe, struct in_addr fallback)
! 67: {
! 68: unsigned char *opt, *clid = NULL;
! 69: struct dhcp_lease *ltmp, *lease = NULL;
! 70: struct dhcp_vendor *vendor;
! 71: struct dhcp_mac *mac;
! 72: struct dhcp_netid_list *id_list;
! 73: int clid_len = 0, ignore = 0, do_classes = 0, selecting = 0, pxearch = -1;
! 74: struct dhcp_packet *mess = (struct dhcp_packet *)daemon->dhcp_packet.iov_base;
! 75: unsigned char *end = (unsigned char *)(mess + 1);
! 76: unsigned char *real_end = (unsigned char *)(mess + 1);
! 77: char *hostname = NULL, *offer_hostname = NULL, *client_hostname = NULL, *domain = NULL;
! 78: int hostname_auth = 0, borken_opt = 0;
! 79: unsigned char *req_options = NULL;
! 80: char *message = NULL;
! 81: unsigned int time;
! 82: struct dhcp_config *config;
! 83: struct dhcp_netid *netid, *tagif_netid;
! 84: struct in_addr subnet_addr, override;
! 85: unsigned short fuzz = 0;
! 86: unsigned int mess_type = 0;
! 87: unsigned char fqdn_flags = 0;
! 88: unsigned char *agent_id = NULL, *uuid = NULL;
! 89: unsigned char *emac = NULL;
! 90: int vendor_class_len = 0, emac_len = 0;
! 91: struct dhcp_netid known_id, iface_id, cpewan_id;
! 92: struct dhcp_opt *o;
! 93: unsigned char pxe_uuid[17];
! 94: unsigned char *oui = NULL, *serial = NULL, *class = NULL;
! 95:
! 96: subnet_addr.s_addr = override.s_addr = 0;
! 97:
! 98: /* set tag with name == interface */
! 99: iface_id.net = iface_name;
! 100: iface_id.next = NULL;
! 101: netid = &iface_id;
! 102:
! 103: if (mess->op != BOOTREQUEST || mess->hlen > DHCP_CHADDR_MAX)
! 104: return 0;
! 105:
! 106: if (mess->htype == 0 && mess->hlen != 0)
! 107: return 0;
! 108:
! 109: /* check for DHCP rather than BOOTP */
! 110: if ((opt = option_find(mess, sz, OPTION_MESSAGE_TYPE, 1)))
! 111: {
! 112: u32 cookie = htonl(DHCP_COOKIE);
! 113:
! 114: /* only insist on a cookie for DHCP. */
! 115: if (memcmp(mess->options, &cookie, sizeof(u32)) != 0)
! 116: return 0;
! 117:
! 118: mess_type = option_uint(opt, 0, 1);
! 119:
! 120: /* two things to note here: expand_buf may move the packet,
! 121: so reassign mess from daemon->packet. Also, the size
! 122: sent includes the IP and UDP headers, hence the magic "-28" */
! 123: if ((opt = option_find(mess, sz, OPTION_MAXMESSAGE, 2)))
! 124: {
! 125: size_t size = (size_t)option_uint(opt, 0, 2) - 28;
! 126:
! 127: if (size > DHCP_PACKET_MAX)
! 128: size = DHCP_PACKET_MAX;
! 129: else if (size < sizeof(struct dhcp_packet))
! 130: size = sizeof(struct dhcp_packet);
! 131:
! 132: if (expand_buf(&daemon->dhcp_packet, size))
! 133: {
! 134: mess = (struct dhcp_packet *)daemon->dhcp_packet.iov_base;
! 135: real_end = end = ((unsigned char *)mess) + size;
! 136: }
! 137: }
! 138:
! 139: /* Some buggy clients set ciaddr when they shouldn't, so clear that here since
! 140: it can affect the context-determination code. */
! 141: if ((option_find(mess, sz, OPTION_REQUESTED_IP, INADDRSZ) || mess_type == DHCPDISCOVER))
! 142: mess->ciaddr.s_addr = 0;
! 143:
! 144: /* search for device identity from CPEWAN devices, we pass this through to the script */
! 145: if ((opt = option_find(mess, sz, OPTION_VENDOR_IDENT_OPT, 5)))
! 146: {
! 147: unsigned int elen, offset, len = option_len(opt);
! 148:
! 149: for (offset = 0; offset < (len - 5); offset += elen + 5)
! 150: {
! 151: elen = option_uint(opt, offset + 4 , 1);
! 152: if (option_uint(opt, offset, 4) == BRDBAND_FORUM_IANA)
! 153: {
! 154: unsigned char *x = option_ptr(opt, offset + 5);
! 155: unsigned char *y = option_ptr(opt, offset + elen + 5);
! 156: oui = option_find1(x, y, 1, 1);
! 157: serial = option_find1(x, y, 2, 1);
! 158: class = option_find1(x, y, 3, 1);
! 159:
! 160: /* If TR069-id is present set the tag "cpewan-id" to facilitate echoing
! 161: the gateway id back. Note that the device class is optional */
! 162: if (oui && serial)
! 163: {
! 164: cpewan_id.net = "cpewan-id";
! 165: cpewan_id.next = netid;
! 166: netid = &cpewan_id;
! 167: }
! 168: break;
! 169: }
! 170: }
! 171: }
! 172:
! 173: if ((opt = option_find(mess, sz, OPTION_AGENT_ID, 1)))
! 174: {
! 175: /* Any agent-id needs to be copied back out, verbatim, as the last option
! 176: in the packet. Here, we shift it to the very end of the buffer, if it doesn't
! 177: get overwritten, then it will be shuffled back at the end of processing.
! 178: Note that the incoming options must not be overwritten here, so there has to
! 179: be enough free space at the end of the packet to copy the option. */
! 180: unsigned char *sopt;
! 181: unsigned int total = option_len(opt) + 2;
! 182: unsigned char *last_opt = option_find(mess, sz, OPTION_END, 0);
! 183: if (last_opt && last_opt < end - total)
! 184: {
! 185: end -= total;
! 186: agent_id = end;
! 187: memcpy(agent_id, opt, total);
! 188: }
! 189:
! 190: /* look for RFC3527 Link selection sub-option */
! 191: if ((sopt = option_find1(option_ptr(opt, 0), option_ptr(opt, option_len(opt)), SUBOPT_SUBNET_SELECT, INADDRSZ)))
! 192: subnet_addr = option_addr(sopt);
! 193:
! 194: /* look for RFC5107 server-identifier-override */
! 195: if ((sopt = option_find1(option_ptr(opt, 0), option_ptr(opt, option_len(opt)), SUBOPT_SERVER_OR, INADDRSZ)))
! 196: override = option_addr(sopt);
! 197:
! 198: /* if a circuit-id or remote-is option is provided, exact-match to options. */
! 199: for (vendor = daemon->dhcp_vendors; vendor; vendor = vendor->next)
! 200: {
! 201: int search;
! 202:
! 203: if (vendor->match_type == MATCH_CIRCUIT)
! 204: search = SUBOPT_CIRCUIT_ID;
! 205: else if (vendor->match_type == MATCH_REMOTE)
! 206: search = SUBOPT_REMOTE_ID;
! 207: else if (vendor->match_type == MATCH_SUBSCRIBER)
! 208: search = SUBOPT_SUBSCR_ID;
! 209: else
! 210: continue;
! 211:
! 212: if ((sopt = option_find1(option_ptr(opt, 0), option_ptr(opt, option_len(opt)), search, 1)) &&
! 213: vendor->len == option_len(sopt) &&
! 214: memcmp(option_ptr(sopt, 0), vendor->data, vendor->len) == 0)
! 215: {
! 216: vendor->netid.next = netid;
! 217: netid = &vendor->netid;
! 218: }
! 219: }
! 220: }
! 221:
! 222: /* Check for RFC3011 subnet selector - only if RFC3527 one not present */
! 223: if (subnet_addr.s_addr == 0 && (opt = option_find(mess, sz, OPTION_SUBNET_SELECT, INADDRSZ)))
! 224: subnet_addr = option_addr(opt);
! 225:
! 226: /* If there is no client identifier option, use the hardware address */
! 227: if ((opt = option_find(mess, sz, OPTION_CLIENT_ID, 1)))
! 228: {
! 229: clid_len = option_len(opt);
! 230: clid = option_ptr(opt, 0);
! 231: }
! 232:
! 233: /* do we have a lease in store? */
! 234: lease = lease_find_by_client(mess->chaddr, mess->hlen, mess->htype, clid, clid_len);
! 235:
! 236: /* If this request is missing a clid, but we've seen one before,
! 237: use it again for option matching etc. */
! 238: if (lease && !clid && lease->clid)
! 239: {
! 240: clid_len = lease->clid_len;
! 241: clid = lease->clid;
! 242: }
! 243:
! 244: /* find mac to use for logging and hashing */
! 245: emac = extended_hwaddr(mess->htype, mess->hlen, mess->chaddr, clid_len, clid, &emac_len);
! 246: }
! 247:
! 248: for (mac = daemon->dhcp_macs; mac; mac = mac->next)
! 249: if (mac->hwaddr_len == mess->hlen &&
! 250: (mac->hwaddr_type == mess->htype || mac->hwaddr_type == 0) &&
! 251: memcmp_masked(mac->hwaddr, mess->chaddr, mess->hlen, mac->mask))
! 252: {
! 253: mac->netid.next = netid;
! 254: netid = &mac->netid;
! 255: }
! 256:
! 257: /* Determine network for this packet. Our caller will have already linked all the
! 258: contexts which match the addresses of the receiving interface but if the
! 259: machine has an address already, or came via a relay, or we have a subnet selector,
! 260: we search again. If we don't have have a giaddr or explicit subnet selector,
! 261: use the ciaddr. This is necessary because a machine which got a lease via a
! 262: relay won't use the relay to renew. If matching a ciaddr fails but we have a context
! 263: from the physical network, continue using that to allow correct DHCPNAK generation later. */
! 264: if (mess->giaddr.s_addr || subnet_addr.s_addr || mess->ciaddr.s_addr)
! 265: {
! 266: struct dhcp_context *context_tmp, *context_new = NULL;
! 267: struct in_addr addr;
! 268: int force = 0;
! 269:
! 270: if (subnet_addr.s_addr)
! 271: {
! 272: addr = subnet_addr;
! 273: force = 1;
! 274: }
! 275: else if (mess->giaddr.s_addr)
! 276: {
! 277: addr = mess->giaddr;
! 278: force = 1;
! 279: }
! 280: else
! 281: {
! 282: /* If ciaddr is in the hardware derived set of contexts, leave that unchanged */
! 283: addr = mess->ciaddr;
! 284: for (context_tmp = context; context_tmp; context_tmp = context_tmp->current)
! 285: if (context_tmp->netmask.s_addr &&
! 286: is_same_net(addr, context_tmp->start, context_tmp->netmask) &&
! 287: is_same_net(addr, context_tmp->end, context_tmp->netmask))
! 288: {
! 289: context_new = context;
! 290: break;
! 291: }
! 292: }
! 293:
! 294: if (!context_new)
! 295: for (context_tmp = daemon->dhcp; context_tmp; context_tmp = context_tmp->next)
! 296: {
! 297: struct in_addr netmask = context_tmp->netmask;
! 298:
! 299: /* guess the netmask for relayed networks */
! 300: if (!(context_tmp->flags & CONTEXT_NETMASK) && context_tmp->netmask.s_addr == 0)
! 301: {
! 302: if (IN_CLASSA(ntohl(context_tmp->start.s_addr)) && IN_CLASSA(ntohl(context_tmp->end.s_addr)))
! 303: netmask.s_addr = htonl(0xff000000);
! 304: else if (IN_CLASSB(ntohl(context_tmp->start.s_addr)) && IN_CLASSB(ntohl(context_tmp->end.s_addr)))
! 305: netmask.s_addr = htonl(0xffff0000);
! 306: else if (IN_CLASSC(ntohl(context_tmp->start.s_addr)) && IN_CLASSC(ntohl(context_tmp->end.s_addr)))
! 307: netmask.s_addr = htonl(0xffffff00);
! 308: }
! 309:
! 310: /* This section fills in context mainly when a client which is on a remote (relayed)
! 311: network renews a lease without using the relay, after dnsmasq has restarted. */
! 312: if (netmask.s_addr != 0 &&
! 313: is_same_net(addr, context_tmp->start, netmask) &&
! 314: is_same_net(addr, context_tmp->end, netmask))
! 315: {
! 316: context_tmp->netmask = netmask;
! 317: if (context_tmp->local.s_addr == 0)
! 318: context_tmp->local = fallback;
! 319: if (context_tmp->router.s_addr == 0)
! 320: context_tmp->router = mess->giaddr;
! 321:
! 322: /* fill in missing broadcast addresses for relayed ranges */
! 323: if (!(context_tmp->flags & CONTEXT_BRDCAST) && context_tmp->broadcast.s_addr == 0 )
! 324: context_tmp->broadcast.s_addr = context_tmp->start.s_addr | ~context_tmp->netmask.s_addr;
! 325:
! 326: context_tmp->current = context_new;
! 327: context_new = context_tmp;
! 328: }
! 329: }
! 330:
! 331: if (context_new || force)
! 332: context = context_new;
! 333: }
! 334:
! 335: if (!context)
! 336: {
! 337: my_syslog(MS_DHCP | LOG_WARNING, _("no address range available for DHCP request %s %s"),
! 338: subnet_addr.s_addr ? _("with subnet selector") : _("via"),
! 339: subnet_addr.s_addr ? inet_ntoa(subnet_addr) : (mess->giaddr.s_addr ? inet_ntoa(mess->giaddr) : iface_name));
! 340: return 0;
! 341: }
! 342:
! 343: if (option_bool(OPT_LOG_OPTS))
! 344: {
! 345: struct dhcp_context *context_tmp;
! 346: for (context_tmp = context; context_tmp; context_tmp = context_tmp->current)
! 347: {
! 348: strcpy(daemon->namebuff, inet_ntoa(context_tmp->start));
! 349: if (context_tmp->flags & (CONTEXT_STATIC | CONTEXT_PROXY))
! 350: my_syslog(MS_DHCP | LOG_INFO, _("%u available DHCP subnet: %s/%s"),
! 351: ntohl(mess->xid), daemon->namebuff, inet_ntoa(context_tmp->netmask));
! 352: else
! 353: my_syslog(MS_DHCP | LOG_INFO, _("%u available DHCP range: %s -- %s"),
! 354: ntohl(mess->xid), daemon->namebuff, inet_ntoa(context_tmp->end));
! 355: }
! 356: }
! 357:
! 358: mess->op = BOOTREPLY;
! 359:
! 360: config = find_config(daemon->dhcp_conf, context, clid, clid_len,
! 361: mess->chaddr, mess->hlen, mess->htype, NULL);
! 362:
! 363: /* set "known" tag for known hosts */
! 364: if (config)
! 365: {
! 366: known_id.net = "known";
! 367: known_id.next = netid;
! 368: netid = &known_id;
! 369: }
! 370:
! 371: if (mess_type == 0 && !pxe)
! 372: {
! 373: /* BOOTP request */
! 374: struct dhcp_netid id, bootp_id;
! 375: struct in_addr *logaddr = NULL;
! 376:
! 377: /* must have a MAC addr for bootp */
! 378: if (mess->htype == 0 || mess->hlen == 0 || (context->flags & CONTEXT_PROXY))
! 379: return 0;
! 380:
! 381: if (have_config(config, CONFIG_DISABLE))
! 382: message = _("disabled");
! 383:
! 384: end = mess->options + 64; /* BOOTP vend area is only 64 bytes */
! 385:
! 386: if (have_config(config, CONFIG_NAME))
! 387: {
! 388: hostname = config->hostname;
! 389: domain = config->domain;
! 390: }
! 391:
! 392: if (config)
! 393: {
! 394: struct dhcp_netid_list *list;
! 395:
! 396: for (list = config->netid; list; list = list->next)
! 397: {
! 398: list->list->next = netid;
! 399: netid = list->list;
! 400: }
! 401: }
! 402:
! 403: /* Match incoming filename field as a netid. */
! 404: if (mess->file[0])
! 405: {
! 406: memcpy(daemon->dhcp_buff2, mess->file, sizeof(mess->file));
! 407: daemon->dhcp_buff2[sizeof(mess->file) + 1] = 0; /* ensure zero term. */
! 408: id.net = (char *)daemon->dhcp_buff2;
! 409: id.next = netid;
! 410: netid = &id;
! 411: }
! 412:
! 413: /* Add "bootp" as a tag to allow different options, address ranges etc
! 414: for BOOTP clients */
! 415: bootp_id.net = "bootp";
! 416: bootp_id.next = netid;
! 417: netid = &bootp_id;
! 418:
! 419: tagif_netid = run_tag_if(netid);
! 420:
! 421: for (id_list = daemon->dhcp_ignore; id_list; id_list = id_list->next)
! 422: if (match_netid(id_list->list, tagif_netid, 0))
! 423: message = _("ignored");
! 424:
! 425: if (!message)
! 426: {
! 427: int nailed = 0;
! 428:
! 429: if (have_config(config, CONFIG_ADDR))
! 430: {
! 431: nailed = 1;
! 432: logaddr = &config->addr;
! 433: mess->yiaddr = config->addr;
! 434: if ((lease = lease_find_by_addr(config->addr)) &&
! 435: (lease->hwaddr_len != mess->hlen ||
! 436: lease->hwaddr_type != mess->htype ||
! 437: memcmp(lease->hwaddr, mess->chaddr, lease->hwaddr_len) != 0))
! 438: message = _("address in use");
! 439: }
! 440: else
! 441: {
! 442: if (!(lease = lease_find_by_client(mess->chaddr, mess->hlen, mess->htype, NULL, 0)) ||
! 443: !address_available(context, lease->addr, tagif_netid))
! 444: {
! 445: if (lease)
! 446: {
! 447: /* lease exists, wrong network. */
! 448: lease_prune(lease, now);
! 449: lease = NULL;
! 450: }
! 451: if (!address_allocate(context, &mess->yiaddr, mess->chaddr, mess->hlen, tagif_netid, now))
! 452: message = _("no address available");
! 453: }
! 454: else
! 455: mess->yiaddr = lease->addr;
! 456: }
! 457:
! 458: if (!message && !(context = narrow_context(context, mess->yiaddr, netid)))
! 459: message = _("wrong network");
! 460: else if (context->netid.net)
! 461: {
! 462: context->netid.next = netid;
! 463: tagif_netid = run_tag_if(&context->netid);
! 464: }
! 465:
! 466: log_tags(tagif_netid, ntohl(mess->xid));
! 467:
! 468: if (!message && !nailed)
! 469: {
! 470: for (id_list = daemon->bootp_dynamic; id_list; id_list = id_list->next)
! 471: if ((!id_list->list) || match_netid(id_list->list, tagif_netid, 0))
! 472: break;
! 473: if (!id_list)
! 474: message = _("no address configured");
! 475: }
! 476:
! 477: if (!message &&
! 478: !lease &&
! 479: (!(lease = lease4_allocate(mess->yiaddr))))
! 480: message = _("no leases left");
! 481:
! 482: if (!message)
! 483: {
! 484: logaddr = &mess->yiaddr;
! 485:
! 486: lease_set_hwaddr(lease, mess->chaddr, NULL, mess->hlen, mess->htype, 0, now, 1);
! 487: if (hostname)
! 488: lease_set_hostname(lease, hostname, 1, get_domain(lease->addr), domain);
! 489: /* infinite lease unless nailed in dhcp-host line. */
! 490: lease_set_expires(lease,
! 491: have_config(config, CONFIG_TIME) ? config->lease_time : 0xffffffff,
! 492: now);
! 493: lease_set_interface(lease, int_index, now);
! 494:
! 495: clear_packet(mess, end);
! 496: match_vendor_opts(NULL, daemon->dhcp_opts); /* clear flags */
! 497: do_options(context, mess, end, NULL, hostname, get_domain(mess->yiaddr),
! 498: netid, subnet_addr, 0, 0, -1, NULL, 0, now);
! 499: }
! 500: }
! 501:
! 502: log_packet("BOOTP", logaddr, mess->chaddr, mess->hlen, iface_name, message, mess->xid);
! 503:
! 504: return message ? 0 : dhcp_packet_size(mess, agent_id, real_end);
! 505: }
! 506:
! 507: if ((opt = option_find(mess, sz, OPTION_CLIENT_FQDN, 4)))
! 508: {
! 509: /* http://tools.ietf.org/wg/dhc/draft-ietf-dhc-fqdn-option/draft-ietf-dhc-fqdn-option-10.txt */
! 510: int len = option_len(opt);
! 511: char *pq = daemon->dhcp_buff;
! 512: unsigned char *pp, *op = option_ptr(opt, 0);
! 513:
! 514: fqdn_flags = *op;
! 515: len -= 3;
! 516: op += 3;
! 517: pp = op;
! 518:
! 519: /* NB, the following always sets at least one bit */
! 520: if (option_bool(OPT_FQDN_UPDATE))
! 521: {
! 522: if (fqdn_flags & 0x01)
! 523: {
! 524: fqdn_flags |= 0x02; /* set O */
! 525: fqdn_flags &= ~0x01; /* clear S */
! 526: }
! 527: fqdn_flags |= 0x08; /* set N */
! 528: }
! 529: else
! 530: {
! 531: if (!(fqdn_flags & 0x01))
! 532: fqdn_flags |= 0x03; /* set S and O */
! 533: fqdn_flags &= ~0x08; /* clear N */
! 534: }
! 535:
! 536: if (fqdn_flags & 0x04)
! 537: while (*op != 0 && ((op + (*op) + 1) - pp) < len)
! 538: {
! 539: memcpy(pq, op+1, *op);
! 540: pq += *op;
! 541: op += (*op)+1;
! 542: *(pq++) = '.';
! 543: }
! 544: else
! 545: {
! 546: memcpy(pq, op, len);
! 547: if (len > 0 && op[len-1] == 0)
! 548: borken_opt = 1;
! 549: pq += len + 1;
! 550: }
! 551:
! 552: if (pq != daemon->dhcp_buff)
! 553: pq--;
! 554:
! 555: *pq = 0;
! 556:
! 557: if (legal_hostname(daemon->dhcp_buff))
! 558: offer_hostname = client_hostname = daemon->dhcp_buff;
! 559: }
! 560: else if ((opt = option_find(mess, sz, OPTION_HOSTNAME, 1)))
! 561: {
! 562: int len = option_len(opt);
! 563: memcpy(daemon->dhcp_buff, option_ptr(opt, 0), len);
! 564: /* Microsoft clients are broken, and need zero-terminated strings
! 565: in options. We detect this state here, and do the same in
! 566: any options we send */
! 567: if (len > 0 && daemon->dhcp_buff[len-1] == 0)
! 568: borken_opt = 1;
! 569: else
! 570: daemon->dhcp_buff[len] = 0;
! 571: if (legal_hostname(daemon->dhcp_buff))
! 572: client_hostname = daemon->dhcp_buff;
! 573: }
! 574:
! 575: if (client_hostname && option_bool(OPT_LOG_OPTS))
! 576: my_syslog(MS_DHCP | LOG_INFO, _("%u client provides name: %s"), ntohl(mess->xid), client_hostname);
! 577:
! 578: if (have_config(config, CONFIG_NAME))
! 579: {
! 580: hostname = config->hostname;
! 581: domain = config->domain;
! 582: hostname_auth = 1;
! 583: /* be careful not to send an OFFER with a hostname not matching the DISCOVER. */
! 584: if (fqdn_flags != 0 || !client_hostname || hostname_isequal(hostname, client_hostname))
! 585: offer_hostname = hostname;
! 586: }
! 587: else if (client_hostname)
! 588: {
! 589: domain = strip_hostname(client_hostname);
! 590:
! 591: if (strlen(client_hostname) != 0)
! 592: {
! 593: hostname = client_hostname;
! 594: if (!config)
! 595: {
! 596: /* Search again now we have a hostname.
! 597: Only accept configs without CLID and HWADDR here, (they won't match)
! 598: to avoid impersonation by name. */
! 599: struct dhcp_config *new = find_config(daemon->dhcp_conf, context, NULL, 0,
! 600: mess->chaddr, mess->hlen,
! 601: mess->htype, hostname);
! 602: if (new && !have_config(new, CONFIG_CLID) && !new->hwaddr)
! 603: {
! 604: config = new;
! 605: /* set "known" tag for known hosts */
! 606: known_id.net = "known";
! 607: known_id.next = netid;
! 608: netid = &known_id;
! 609: }
! 610: }
! 611: }
! 612: }
! 613:
! 614: if (config)
! 615: {
! 616: struct dhcp_netid_list *list;
! 617:
! 618: for (list = config->netid; list; list = list->next)
! 619: {
! 620: list->list->next = netid;
! 621: netid = list->list;
! 622: }
! 623: }
! 624:
! 625: /* dhcp-match. If we have hex-and-wildcards, look for a left-anchored match.
! 626: Otherwise assume the option is an array, and look for a matching element.
! 627: If no data given, existance of the option is enough. This code handles
! 628: rfc3925 V-I classes too. */
! 629: for (o = daemon->dhcp_match; o; o = o->next)
! 630: {
! 631: unsigned int len, elen, match = 0;
! 632: size_t offset, o2;
! 633:
! 634: if (o->flags & DHOPT_RFC3925)
! 635: {
! 636: if (!(opt = option_find(mess, sz, OPTION_VENDOR_IDENT, 5)))
! 637: continue;
! 638:
! 639: for (offset = 0; offset < (option_len(opt) - 5u); offset += len + 5)
! 640: {
! 641: len = option_uint(opt, offset + 4 , 1);
! 642: /* Need to take care that bad data can't run us off the end of the packet */
! 643: if ((offset + len + 5 <= (option_len(opt))) &&
! 644: (option_uint(opt, offset, 4) == (unsigned int)o->u.encap))
! 645: for (o2 = offset + 5; o2 < offset + len + 5; o2 += elen + 1)
! 646: {
! 647: elen = option_uint(opt, o2, 1);
! 648: if ((o2 + elen + 1 <= option_len(opt)) &&
! 649: (match = match_bytes(o, option_ptr(opt, o2 + 1), elen)))
! 650: break;
! 651: }
! 652: if (match)
! 653: break;
! 654: }
! 655: }
! 656: else
! 657: {
! 658: if (!(opt = option_find(mess, sz, o->opt, 1)))
! 659: continue;
! 660:
! 661: match = match_bytes(o, option_ptr(opt, 0), option_len(opt));
! 662: }
! 663:
! 664: if (match)
! 665: {
! 666: o->netid->next = netid;
! 667: netid = o->netid;
! 668: }
! 669: }
! 670:
! 671: /* user-class options are, according to RFC3004, supposed to contain
! 672: a set of counted strings. Here we check that this is so (by seeing
! 673: if the counts are consistent with the overall option length) and if
! 674: so zero the counts so that we don't get spurious matches between
! 675: the vendor string and the counts. If the lengths don't add up, we
! 676: assume that the option is a single string and non RFC3004 compliant
! 677: and just do the substring match. dhclient provides these broken options.
! 678: The code, later, which sends user-class data to the lease-change script
! 679: relies on the transformation done here.
! 680: */
! 681:
! 682: if ((opt = option_find(mess, sz, OPTION_USER_CLASS, 1)))
! 683: {
! 684: unsigned char *ucp = option_ptr(opt, 0);
! 685: int tmp, j;
! 686: for (j = 0; j < option_len(opt); j += ucp[j] + 1);
! 687: if (j == option_len(opt))
! 688: for (j = 0; j < option_len(opt); j = tmp)
! 689: {
! 690: tmp = j + ucp[j] + 1;
! 691: ucp[j] = 0;
! 692: }
! 693: }
! 694:
! 695: for (vendor = daemon->dhcp_vendors; vendor; vendor = vendor->next)
! 696: {
! 697: int mopt;
! 698:
! 699: if (vendor->match_type == MATCH_VENDOR)
! 700: mopt = OPTION_VENDOR_ID;
! 701: else if (vendor->match_type == MATCH_USER)
! 702: mopt = OPTION_USER_CLASS;
! 703: else
! 704: continue;
! 705:
! 706: if ((opt = option_find(mess, sz, mopt, 1)))
! 707: {
! 708: int i;
! 709: for (i = 0; i <= (option_len(opt) - vendor->len); i++)
! 710: if (memcmp(vendor->data, option_ptr(opt, i), vendor->len) == 0)
! 711: {
! 712: vendor->netid.next = netid;
! 713: netid = &vendor->netid;
! 714: break;
! 715: }
! 716: }
! 717: }
! 718:
! 719: /* mark vendor-encapsulated options which match the client-supplied vendor class,
! 720: save client-supplied vendor class */
! 721: if ((opt = option_find(mess, sz, OPTION_VENDOR_ID, 1)))
! 722: {
! 723: memcpy(daemon->dhcp_buff3, option_ptr(opt, 0), option_len(opt));
! 724: vendor_class_len = option_len(opt);
! 725: }
! 726: match_vendor_opts(opt, daemon->dhcp_opts);
! 727:
! 728: if (option_bool(OPT_LOG_OPTS))
! 729: {
! 730: if (sanitise(opt, daemon->namebuff))
! 731: my_syslog(MS_DHCP | LOG_INFO, _("%u vendor class: %s"), ntohl(mess->xid), daemon->namebuff);
! 732: if (sanitise(option_find(mess, sz, OPTION_USER_CLASS, 1), daemon->namebuff))
! 733: my_syslog(MS_DHCP | LOG_INFO, _("%u user class: %s"), ntohl(mess->xid), daemon->namebuff);
! 734: }
! 735:
! 736: tagif_netid = run_tag_if(netid);
! 737:
! 738: /* if all the netids in the ignore list are present, ignore this client */
! 739: for (id_list = daemon->dhcp_ignore; id_list; id_list = id_list->next)
! 740: if (match_netid(id_list->list, tagif_netid, 0))
! 741: ignore = 1;
! 742:
! 743: /* If configured, we can override the server-id to be the address of the relay,
! 744: so that all traffic goes via the relay and can pick up agent-id info. This can be
! 745: configured for all relays, or by address. */
! 746: if (daemon->override && mess->giaddr.s_addr != 0 && override.s_addr == 0)
! 747: {
! 748: if (!daemon->override_relays)
! 749: override = mess->giaddr;
! 750: else
! 751: {
! 752: struct addr_list *l;
! 753: for (l = daemon->override_relays; l; l = l->next)
! 754: if (l->addr.s_addr == mess->giaddr.s_addr)
! 755: break;
! 756: if (l)
! 757: override = mess->giaddr;
! 758: }
! 759: }
! 760:
! 761: /* Can have setting to ignore the client ID for a particular MAC address or hostname */
! 762: if (have_config(config, CONFIG_NOCLID))
! 763: clid = NULL;
! 764:
! 765: /* Check if client is PXE client. */
! 766: if (daemon->enable_pxe &&
! 767: (opt = option_find(mess, sz, OPTION_VENDOR_ID, 9)) &&
! 768: strncmp(option_ptr(opt, 0), "PXEClient", 9) == 0)
! 769: {
! 770: if ((opt = option_find(mess, sz, OPTION_PXE_UUID, 17)))
! 771: {
! 772: memcpy(pxe_uuid, option_ptr(opt, 0), 17);
! 773: uuid = pxe_uuid;
! 774: }
! 775:
! 776: /* Check if this is really a PXE bootserver request, and handle specially if so. */
! 777: if ((mess_type == DHCPREQUEST || mess_type == DHCPINFORM) &&
! 778: (opt = option_find(mess, sz, OPTION_VENDOR_CLASS_OPT, 1)) &&
! 779: (opt = option_find1(option_ptr(opt, 0), option_ptr(opt, option_len(opt)), SUBOPT_PXE_BOOT_ITEM, 4)))
! 780: {
! 781: struct pxe_service *service;
! 782: int type = option_uint(opt, 0, 2);
! 783: int layer = option_uint(opt, 2, 2);
! 784: unsigned char save71[4];
! 785: struct dhcp_opt opt71;
! 786:
! 787: if (ignore)
! 788: return 0;
! 789:
! 790: if (layer & 0x8000)
! 791: {
! 792: my_syslog(MS_DHCP | LOG_ERR, _("PXE BIS not supported"));
! 793: return 0;
! 794: }
! 795:
! 796: memcpy(save71, option_ptr(opt, 0), 4);
! 797:
! 798: for (service = daemon->pxe_services; service; service = service->next)
! 799: if (service->type == type)
! 800: break;
! 801:
! 802: if (!service || !service->basename)
! 803: return 0;
! 804:
! 805: clear_packet(mess, end);
! 806:
! 807: mess->yiaddr = mess->ciaddr;
! 808: mess->ciaddr.s_addr = 0;
! 809: if (service->sname)
! 810: mess->siaddr = a_record_from_hosts(service->sname, now);
! 811: else if (service->server.s_addr != 0)
! 812: mess->siaddr = service->server;
! 813: else
! 814: mess->siaddr = context->local;
! 815:
! 816: snprintf((char *)mess->file, sizeof(mess->file), "%s.%d", service->basename, layer);
! 817: option_put(mess, end, OPTION_MESSAGE_TYPE, 1, DHCPACK);
! 818: option_put(mess, end, OPTION_SERVER_IDENTIFIER, INADDRSZ, htonl(context->local.s_addr));
! 819: pxe_misc(mess, end, uuid);
! 820:
! 821: prune_vendor_opts(tagif_netid);
! 822: opt71.val = save71;
! 823: opt71.opt = SUBOPT_PXE_BOOT_ITEM;
! 824: opt71.len = 4;
! 825: opt71.flags = DHOPT_VENDOR_MATCH;
! 826: opt71.netid = NULL;
! 827: opt71.next = daemon->dhcp_opts;
! 828: do_encap_opts(&opt71, OPTION_VENDOR_CLASS_OPT, DHOPT_VENDOR_MATCH, mess, end, 0);
! 829:
! 830: log_packet("PXE", &mess->yiaddr, emac, emac_len, iface_name, (char *)mess->file, mess->xid);
! 831: log_tags(tagif_netid, ntohl(mess->xid));
! 832: return dhcp_packet_size(mess, agent_id, real_end);
! 833: }
! 834:
! 835: if ((opt = option_find(mess, sz, OPTION_ARCH, 2)))
! 836: {
! 837: pxearch = option_uint(opt, 0, 2);
! 838:
! 839: /* proxy DHCP here. */
! 840: if ((mess_type == DHCPDISCOVER || (pxe && mess_type == DHCPREQUEST)))
! 841: {
! 842: struct dhcp_context *tmp;
! 843:
! 844: for (tmp = context; tmp; tmp = tmp->current)
! 845: if ((tmp->flags & CONTEXT_PROXY) &&
! 846: match_netid(tmp->filter, tagif_netid, 1))
! 847: break;
! 848:
! 849: if (tmp)
! 850: {
! 851: struct dhcp_boot *boot = find_boot(tagif_netid);
! 852:
! 853: mess->yiaddr.s_addr = 0;
! 854: if (mess_type == DHCPDISCOVER || mess->ciaddr.s_addr == 0)
! 855: {
! 856: mess->ciaddr.s_addr = 0;
! 857: mess->flags |= htons(0x8000); /* broadcast */
! 858: }
! 859:
! 860: clear_packet(mess, end);
! 861:
! 862: /* Provide the bootfile here, for gPXE, and in case we have no menu items
! 863: and set discovery_control = 8 */
! 864: if (boot)
! 865: {
! 866: if (boot->next_server.s_addr)
! 867: mess->siaddr = boot->next_server;
! 868: else if (boot->tftp_sname)
! 869: mess->siaddr = a_record_from_hosts(boot->tftp_sname, now);
! 870:
! 871: if (boot->file)
! 872: strncpy((char *)mess->file, boot->file, sizeof(mess->file)-1);
! 873: }
! 874:
! 875: option_put(mess, end, OPTION_MESSAGE_TYPE, 1,
! 876: mess_type == DHCPDISCOVER ? DHCPOFFER : DHCPACK);
! 877: option_put(mess, end, OPTION_SERVER_IDENTIFIER, INADDRSZ, htonl(context->local.s_addr));
! 878: pxe_misc(mess, end, uuid);
! 879: prune_vendor_opts(tagif_netid);
! 880: do_encap_opts(pxe_opts(pxearch, tagif_netid, context->local, now), OPTION_VENDOR_CLASS_OPT, DHOPT_VENDOR_MATCH, mess, end, 0);
! 881:
! 882: log_packet("PXE", NULL, emac, emac_len, iface_name, ignore ? "proxy-ignored" : "proxy", mess->xid);
! 883: log_tags(tagif_netid, ntohl(mess->xid));
! 884: return ignore ? 0 : dhcp_packet_size(mess, agent_id, real_end);
! 885: }
! 886: }
! 887: }
! 888: }
! 889:
! 890: /* if we're just a proxy server, go no further */
! 891: if ((context->flags & CONTEXT_PROXY) || pxe)
! 892: return 0;
! 893:
! 894: if ((opt = option_find(mess, sz, OPTION_REQUESTED_OPTIONS, 0)))
! 895: {
! 896: req_options = (unsigned char *)daemon->dhcp_buff2;
! 897: memcpy(req_options, option_ptr(opt, 0), option_len(opt));
! 898: req_options[option_len(opt)] = OPTION_END;
! 899: }
! 900:
! 901: switch (mess_type)
! 902: {
! 903: case DHCPDECLINE:
! 904: if (!(opt = option_find(mess, sz, OPTION_SERVER_IDENTIFIER, INADDRSZ)) ||
! 905: option_addr(opt).s_addr != server_id(context, override, fallback).s_addr)
! 906: return 0;
! 907:
! 908: /* sanitise any message. Paranoid? Moi? */
! 909: sanitise(option_find(mess, sz, OPTION_MESSAGE, 1), daemon->dhcp_buff);
! 910:
! 911: if (!(opt = option_find(mess, sz, OPTION_REQUESTED_IP, INADDRSZ)))
! 912: return 0;
! 913:
! 914: log_packet("DHCPDECLINE", option_ptr(opt, 0), emac, emac_len, iface_name, daemon->dhcp_buff, mess->xid);
! 915:
! 916: if (lease && lease->addr.s_addr == option_addr(opt).s_addr)
! 917: lease_prune(lease, now);
! 918:
! 919: if (have_config(config, CONFIG_ADDR) &&
! 920: config->addr.s_addr == option_addr(opt).s_addr)
! 921: {
! 922: prettyprint_time(daemon->dhcp_buff, DECLINE_BACKOFF);
! 923: my_syslog(MS_DHCP | LOG_WARNING, _("disabling DHCP static address %s for %s"),
! 924: inet_ntoa(config->addr), daemon->dhcp_buff);
! 925: config->flags |= CONFIG_DECLINED;
! 926: config->decline_time = now;
! 927: }
! 928: else
! 929: /* make sure this host gets a different address next time. */
! 930: for (; context; context = context->current)
! 931: context->addr_epoch++;
! 932:
! 933: return 0;
! 934:
! 935: case DHCPRELEASE:
! 936: if (!(context = narrow_context(context, mess->ciaddr, tagif_netid)) ||
! 937: !(opt = option_find(mess, sz, OPTION_SERVER_IDENTIFIER, INADDRSZ)) ||
! 938: option_addr(opt).s_addr != server_id(context, override, fallback).s_addr)
! 939: return 0;
! 940:
! 941: if (lease && lease->addr.s_addr == mess->ciaddr.s_addr)
! 942: lease_prune(lease, now);
! 943: else
! 944: message = _("unknown lease");
! 945:
! 946: log_packet("DHCPRELEASE", &mess->ciaddr, emac, emac_len, iface_name, message, mess->xid);
! 947:
! 948: return 0;
! 949:
! 950: case DHCPDISCOVER:
! 951: if (ignore || have_config(config, CONFIG_DISABLE))
! 952: {
! 953: message = _("ignored");
! 954: opt = NULL;
! 955: }
! 956: else
! 957: {
! 958: struct in_addr addr, conf;
! 959:
! 960: addr.s_addr = conf.s_addr = 0;
! 961:
! 962: if ((opt = option_find(mess, sz, OPTION_REQUESTED_IP, INADDRSZ)))
! 963: addr = option_addr(opt);
! 964:
! 965: if (have_config(config, CONFIG_ADDR))
! 966: {
! 967: char *addrs = inet_ntoa(config->addr);
! 968:
! 969: if ((ltmp = lease_find_by_addr(config->addr)) &&
! 970: ltmp != lease &&
! 971: !config_has_mac(config, ltmp->hwaddr, ltmp->hwaddr_len, ltmp->hwaddr_type))
! 972: {
! 973: int len;
! 974: unsigned char *mac = extended_hwaddr(ltmp->hwaddr_type, ltmp->hwaddr_len,
! 975: ltmp->hwaddr, ltmp->clid_len, ltmp->clid, &len);
! 976: my_syslog(MS_DHCP | LOG_WARNING, _("not using configured address %s because it is leased to %s"),
! 977: addrs, print_mac(daemon->namebuff, mac, len));
! 978: }
! 979: else
! 980: {
! 981: struct dhcp_context *tmp;
! 982: for (tmp = context; tmp; tmp = tmp->current)
! 983: if (context->router.s_addr == config->addr.s_addr)
! 984: break;
! 985: if (tmp)
! 986: my_syslog(MS_DHCP | LOG_WARNING, _("not using configured address %s because it is in use by the server or relay"), addrs);
! 987: else if (have_config(config, CONFIG_DECLINED) &&
! 988: difftime(now, config->decline_time) < (float)DECLINE_BACKOFF)
! 989: my_syslog(MS_DHCP | LOG_WARNING, _("not using configured address %s because it was previously declined"), addrs);
! 990: else
! 991: conf = config->addr;
! 992: }
! 993: }
! 994:
! 995: if (conf.s_addr)
! 996: mess->yiaddr = conf;
! 997: else if (lease &&
! 998: address_available(context, lease->addr, tagif_netid) &&
! 999: !config_find_by_address(daemon->dhcp_conf, lease->addr))
! 1000: mess->yiaddr = lease->addr;
! 1001: else if (opt && address_available(context, addr, tagif_netid) && !lease_find_by_addr(addr) &&
! 1002: !config_find_by_address(daemon->dhcp_conf, addr))
! 1003: mess->yiaddr = addr;
! 1004: else if (emac_len == 0)
! 1005: message = _("no unique-id");
! 1006: else if (!address_allocate(context, &mess->yiaddr, emac, emac_len, tagif_netid, now))
! 1007: message = _("no address available");
! 1008: }
! 1009:
! 1010: log_packet("DHCPDISCOVER", opt ? option_ptr(opt, 0) : NULL, emac, emac_len, iface_name, message, mess->xid);
! 1011:
! 1012: if (message || !(context = narrow_context(context, mess->yiaddr, tagif_netid)))
! 1013: return 0;
! 1014:
! 1015: if (context->netid.net)
! 1016: {
! 1017: context->netid.next = netid;
! 1018: tagif_netid = run_tag_if(&context->netid);
! 1019: }
! 1020:
! 1021: log_tags(tagif_netid, ntohl(mess->xid));
! 1022:
! 1023: log_packet("DHCPOFFER" , &mess->yiaddr, emac, emac_len, iface_name, NULL, mess->xid);
! 1024:
! 1025: time = calc_time(context, config, option_find(mess, sz, OPTION_LEASE_TIME, 4));
! 1026: clear_packet(mess, end);
! 1027: option_put(mess, end, OPTION_MESSAGE_TYPE, 1, DHCPOFFER);
! 1028: option_put(mess, end, OPTION_SERVER_IDENTIFIER, INADDRSZ, ntohl(server_id(context, override, fallback).s_addr));
! 1029: option_put(mess, end, OPTION_LEASE_TIME, 4, time);
! 1030: /* T1 and T2 are required in DHCPOFFER by HP's wacky Jetdirect client. */
! 1031: if (time != 0xffffffff)
! 1032: {
! 1033: option_put(mess, end, OPTION_T1, 4, (time/2));
! 1034: option_put(mess, end, OPTION_T2, 4, (time*7)/8);
! 1035: }
! 1036: do_options(context, mess, end, req_options, offer_hostname, get_domain(mess->yiaddr),
! 1037: netid, subnet_addr, fqdn_flags, borken_opt, pxearch, uuid, vendor_class_len, now);
! 1038:
! 1039: return dhcp_packet_size(mess, agent_id, real_end);
! 1040:
! 1041: case DHCPREQUEST:
! 1042: if (ignore || have_config(config, CONFIG_DISABLE))
! 1043: return 0;
! 1044: if ((opt = option_find(mess, sz, OPTION_REQUESTED_IP, INADDRSZ)))
! 1045: {
! 1046: /* SELECTING or INIT_REBOOT */
! 1047: mess->yiaddr = option_addr(opt);
! 1048:
! 1049: /* send vendor and user class info for new or recreated lease */
! 1050: do_classes = 1;
! 1051:
! 1052: if ((opt = option_find(mess, sz, OPTION_SERVER_IDENTIFIER, INADDRSZ)))
! 1053: {
! 1054: /* SELECTING */
! 1055: selecting = 1;
! 1056:
! 1057: if (override.s_addr != 0)
! 1058: {
! 1059: if (option_addr(opt).s_addr != override.s_addr)
! 1060: return 0;
! 1061: }
! 1062: else
! 1063: {
! 1064: for (; context; context = context->current)
! 1065: if (context->local.s_addr == option_addr(opt).s_addr)
! 1066: break;
! 1067:
! 1068: if (!context)
! 1069: {
! 1070: /* Handle very strange configs where clients have more than one route to the server.
! 1071: If a clients idea of its server-id matches any of our DHCP interfaces, we let it pass.
! 1072: Have to set override to make sure we echo back the correct server-id */
! 1073: struct irec *intr;
! 1074:
! 1075: enumerate_interfaces();
! 1076:
! 1077: for (intr = daemon->interfaces; intr; intr = intr->next)
! 1078: if (intr->addr.sa.sa_family == AF_INET &&
! 1079: intr->addr.in.sin_addr.s_addr == option_addr(opt).s_addr &&
! 1080: intr->tftp_ok)
! 1081: break;
! 1082:
! 1083: if (intr)
! 1084: override = intr->addr.in.sin_addr;
! 1085: else
! 1086: {
! 1087: /* In auth mode, a REQUEST sent to the wrong server
! 1088: should be faulted, so that the client establishes
! 1089: communication with us, otherwise, silently ignore. */
! 1090: if (!option_bool(OPT_AUTHORITATIVE))
! 1091: return 0;
! 1092: message = _("wrong server-ID");
! 1093: }
! 1094: }
! 1095: }
! 1096:
! 1097: /* If a lease exists for this host and another address, squash it. */
! 1098: if (lease && lease->addr.s_addr != mess->yiaddr.s_addr)
! 1099: {
! 1100: lease_prune(lease, now);
! 1101: lease = NULL;
! 1102: }
! 1103: }
! 1104: else
! 1105: {
! 1106: /* INIT-REBOOT */
! 1107: if (!lease && !option_bool(OPT_AUTHORITATIVE))
! 1108: return 0;
! 1109:
! 1110: if (lease && lease->addr.s_addr != mess->yiaddr.s_addr)
! 1111: message = _("wrong address");
! 1112: }
! 1113: }
! 1114: else
! 1115: {
! 1116: /* RENEWING or REBINDING */
! 1117: /* Check existing lease for this address.
! 1118: We allow it to be missing if dhcp-authoritative mode
! 1119: as long as we can allocate the lease now - checked below.
! 1120: This makes for a smooth recovery from a lost lease DB */
! 1121: if ((lease && mess->ciaddr.s_addr != lease->addr.s_addr) ||
! 1122: (!lease && !option_bool(OPT_AUTHORITATIVE)))
! 1123: {
! 1124: /* A client rebinding will broadcast the request, so we may see it even
! 1125: if the lease is held by another server. Just ignore it in that case.
! 1126: If the request is unicast to us, then somethings wrong, NAK */
! 1127: if (!unicast_dest)
! 1128: return 0;
! 1129: message = _("lease not found");
! 1130: /* ensure we broadcast NAK */
! 1131: unicast_dest = 0;
! 1132: }
! 1133:
! 1134: /* desynchronise renewals */
! 1135: fuzz = rand16();
! 1136: mess->yiaddr = mess->ciaddr;
! 1137: }
! 1138:
! 1139: log_packet("DHCPREQUEST", &mess->yiaddr, emac, emac_len, iface_name, NULL, mess->xid);
! 1140:
! 1141: if (!message)
! 1142: {
! 1143: struct dhcp_config *addr_config;
! 1144: struct dhcp_context *tmp = NULL;
! 1145:
! 1146: if (have_config(config, CONFIG_ADDR))
! 1147: for (tmp = context; tmp; tmp = tmp->current)
! 1148: if (context->router.s_addr == config->addr.s_addr)
! 1149: break;
! 1150:
! 1151: if (!(context = narrow_context(context, mess->yiaddr, tagif_netid)))
! 1152: {
! 1153: /* If a machine moves networks whilst it has a lease, we catch that here. */
! 1154: message = _("wrong network");
! 1155: /* ensure we broadcast NAK */
! 1156: unicast_dest = 0;
! 1157: }
! 1158:
! 1159: /* Check for renewal of a lease which is outside the allowed range. */
! 1160: else if (!address_available(context, mess->yiaddr, tagif_netid) &&
! 1161: (!have_config(config, CONFIG_ADDR) || config->addr.s_addr != mess->yiaddr.s_addr))
! 1162: message = _("address not available");
! 1163:
! 1164: /* Check if a new static address has been configured. Be very sure that
! 1165: when the client does DISCOVER, it will get the static address, otherwise
! 1166: an endless protocol loop will ensue. */
! 1167: else if (!tmp && !selecting &&
! 1168: have_config(config, CONFIG_ADDR) &&
! 1169: (!have_config(config, CONFIG_DECLINED) ||
! 1170: difftime(now, config->decline_time) > (float)DECLINE_BACKOFF) &&
! 1171: config->addr.s_addr != mess->yiaddr.s_addr &&
! 1172: (!(ltmp = lease_find_by_addr(config->addr)) || ltmp == lease))
! 1173: message = _("static lease available");
! 1174:
! 1175: /* Check to see if the address is reserved as a static address for another host */
! 1176: else if ((addr_config = config_find_by_address(daemon->dhcp_conf, mess->yiaddr)) && addr_config != config)
! 1177: message = _("address reserved");
! 1178:
! 1179: else if (!lease && (ltmp = lease_find_by_addr(mess->yiaddr)))
! 1180: {
! 1181: /* If a host is configured with more than one MAC address, it's OK to 'nix
! 1182: a lease from one of it's MACs to give the address to another. */
! 1183: if (config && config_has_mac(config, ltmp->hwaddr, ltmp->hwaddr_len, ltmp->hwaddr_type))
! 1184: {
! 1185: my_syslog(MS_DHCP | LOG_INFO, _("abandoning lease to %s of %s"),
! 1186: print_mac(daemon->namebuff, ltmp->hwaddr, ltmp->hwaddr_len),
! 1187: inet_ntoa(ltmp->addr));
! 1188: lease = ltmp;
! 1189: }
! 1190: else
! 1191: message = _("address in use");
! 1192: }
! 1193:
! 1194: if (!message)
! 1195: {
! 1196: if (emac_len == 0)
! 1197: message = _("no unique-id");
! 1198:
! 1199: else if (!lease)
! 1200: {
! 1201: if ((lease = lease4_allocate(mess->yiaddr)))
! 1202: do_classes = 1;
! 1203: else
! 1204: message = _("no leases left");
! 1205: }
! 1206: }
! 1207: }
! 1208:
! 1209: if (message)
! 1210: {
! 1211: log_packet("DHCPNAK", &mess->yiaddr, emac, emac_len, iface_name, message, mess->xid);
! 1212:
! 1213: mess->yiaddr.s_addr = 0;
! 1214: clear_packet(mess, end);
! 1215: option_put(mess, end, OPTION_MESSAGE_TYPE, 1, DHCPNAK);
! 1216: option_put(mess, end, OPTION_SERVER_IDENTIFIER, INADDRSZ, ntohl(server_id(context, override, fallback).s_addr));
! 1217: option_put_string(mess, end, OPTION_MESSAGE, message, borken_opt);
! 1218: /* This fixes a problem with the DHCP spec, broadcasting a NAK to a host on
! 1219: a distant subnet which unicast a REQ to us won't work. */
! 1220: if (!unicast_dest || mess->giaddr.s_addr != 0 ||
! 1221: mess->ciaddr.s_addr == 0 || is_same_net(context->local, mess->ciaddr, context->netmask))
! 1222: {
! 1223: mess->flags |= htons(0x8000); /* broadcast */
! 1224: mess->ciaddr.s_addr = 0;
! 1225: }
! 1226: }
! 1227: else
! 1228: {
! 1229: if (context->netid.net)
! 1230: {
! 1231: context->netid.next = netid;
! 1232: tagif_netid = run_tag_if( &context->netid);
! 1233: }
! 1234:
! 1235: log_tags(tagif_netid, ntohl(mess->xid));
! 1236:
! 1237: if (do_classes)
! 1238: {
! 1239: /* pick up INIT-REBOOT events. */
! 1240: lease->flags |= LEASE_CHANGED;
! 1241:
! 1242: #ifdef HAVE_SCRIPT
! 1243: if (daemon->lease_change_command)
! 1244: {
! 1245: struct dhcp_netid *n;
! 1246:
! 1247: if (mess->giaddr.s_addr)
! 1248: lease->giaddr = mess->giaddr;
! 1249:
! 1250: free(lease->extradata);
! 1251: lease->extradata = NULL;
! 1252: lease->extradata_size = lease->extradata_len = 0;
! 1253:
! 1254: add_extradata_opt(lease, option_find(mess, sz, OPTION_VENDOR_ID, 1));
! 1255: add_extradata_opt(lease, option_find(mess, sz, OPTION_HOSTNAME, 1));
! 1256: add_extradata_opt(lease, oui);
! 1257: add_extradata_opt(lease, serial);
! 1258: add_extradata_opt(lease, class);
! 1259:
! 1260: if ((opt = option_find(mess, sz, OPTION_AGENT_ID, 1)))
! 1261: {
! 1262: add_extradata_opt(lease, option_find1(option_ptr(opt, 0), option_ptr(opt, option_len(opt)), SUBOPT_CIRCUIT_ID, 1));
! 1263: add_extradata_opt(lease, option_find1(option_ptr(opt, 0), option_ptr(opt, option_len(opt)), SUBOPT_SUBSCR_ID, 1));
! 1264: add_extradata_opt(lease, option_find1(option_ptr(opt, 0), option_ptr(opt, option_len(opt)), SUBOPT_REMOTE_ID, 1));
! 1265: }
! 1266: else
! 1267: {
! 1268: add_extradata_opt(lease, NULL);
! 1269: add_extradata_opt(lease, NULL);
! 1270: add_extradata_opt(lease, NULL);
! 1271: }
! 1272:
! 1273: /* space-concat tag set */
! 1274: if (!tagif_netid)
! 1275: add_extradata_opt(lease, NULL);
! 1276: else
! 1277: for (n = tagif_netid; n; n = n->next)
! 1278: {
! 1279: struct dhcp_netid *n1;
! 1280: /* kill dupes */
! 1281: for (n1 = n->next; n1; n1 = n1->next)
! 1282: if (strcmp(n->net, n1->net) == 0)
! 1283: break;
! 1284: if (!n1)
! 1285: lease_add_extradata(lease, (unsigned char *)n->net, strlen(n->net), n->next ? ' ' : 0);
! 1286: }
! 1287:
! 1288: if ((opt = option_find(mess, sz, OPTION_USER_CLASS, 1)))
! 1289: {
! 1290: int len = option_len(opt);
! 1291: unsigned char *ucp = option_ptr(opt, 0);
! 1292: /* If the user-class option started as counted strings, the first byte will be zero. */
! 1293: if (len != 0 && ucp[0] == 0)
! 1294: ucp++, len--;
! 1295: lease_add_extradata(lease, ucp, len, 0);
! 1296: }
! 1297: }
! 1298: #endif
! 1299: }
! 1300:
! 1301: if (!hostname_auth && (client_hostname = host_from_dns(mess->yiaddr)))
! 1302: {
! 1303: domain = get_domain(mess->yiaddr);
! 1304: hostname = client_hostname;
! 1305: hostname_auth = 1;
! 1306: }
! 1307:
! 1308: time = calc_time(context, config, option_find(mess, sz, OPTION_LEASE_TIME, 4));
! 1309: lease_set_hwaddr(lease, mess->chaddr, clid, mess->hlen, mess->htype, clid_len, now, do_classes);
! 1310:
! 1311: /* if all the netids in the ignore_name list are present, ignore client-supplied name */
! 1312: if (!hostname_auth)
! 1313: {
! 1314: for (id_list = daemon->dhcp_ignore_names; id_list; id_list = id_list->next)
! 1315: if ((!id_list->list) || match_netid(id_list->list, tagif_netid, 0))
! 1316: break;
! 1317: if (id_list)
! 1318: hostname = NULL;
! 1319: }
! 1320:
! 1321: /* Last ditch, if configured, generate hostname from mac address */
! 1322: if (!hostname && emac_len != 0)
! 1323: {
! 1324: for (id_list = daemon->dhcp_gen_names; id_list; id_list = id_list->next)
! 1325: if ((!id_list->list) || match_netid(id_list->list, tagif_netid, 0))
! 1326: break;
! 1327: if (id_list)
! 1328: {
! 1329: int i;
! 1330:
! 1331: hostname = daemon->dhcp_buff;
! 1332: /* buffer is 256 bytes, 3 bytes per octet */
! 1333: for (i = 0; (i < emac_len) && (i < 80); i++)
! 1334: hostname += sprintf(hostname, "%.2x%s", emac[i], (i == emac_len - 1) ? "" : "-");
! 1335: hostname = daemon->dhcp_buff;
! 1336: }
! 1337: }
! 1338:
! 1339: if (hostname)
! 1340: lease_set_hostname(lease, hostname, hostname_auth, get_domain(lease->addr), domain);
! 1341:
! 1342: lease_set_expires(lease, time, now);
! 1343: lease_set_interface(lease, int_index, now);
! 1344:
! 1345: if (override.s_addr != 0)
! 1346: lease->override = override;
! 1347: else
! 1348: override = lease->override;
! 1349:
! 1350: log_packet("DHCPACK", &mess->yiaddr, emac, emac_len, iface_name, hostname, mess->xid);
! 1351:
! 1352: clear_packet(mess, end);
! 1353: option_put(mess, end, OPTION_MESSAGE_TYPE, 1, DHCPACK);
! 1354: option_put(mess, end, OPTION_SERVER_IDENTIFIER, INADDRSZ, ntohl(server_id(context, override, fallback).s_addr));
! 1355: option_put(mess, end, OPTION_LEASE_TIME, 4, time);
! 1356: if (time != 0xffffffff)
! 1357: {
! 1358: while (fuzz > (time/16))
! 1359: fuzz = fuzz/2;
! 1360: option_put(mess, end, OPTION_T1, 4, (time/2) - fuzz);
! 1361: option_put(mess, end, OPTION_T2, 4, ((time/8)*7) - fuzz);
! 1362: }
! 1363: do_options(context, mess, end, req_options, hostname, get_domain(mess->yiaddr),
! 1364: netid, subnet_addr, fqdn_flags, borken_opt, pxearch, uuid, vendor_class_len, now);
! 1365: }
! 1366:
! 1367: return dhcp_packet_size(mess, agent_id, real_end);
! 1368:
! 1369: case DHCPINFORM:
! 1370: if (ignore || have_config(config, CONFIG_DISABLE))
! 1371: message = _("ignored");
! 1372:
! 1373: log_packet("DHCPINFORM", &mess->ciaddr, emac, emac_len, iface_name, message, mess->xid);
! 1374:
! 1375: if (message || mess->ciaddr.s_addr == 0)
! 1376: return 0;
! 1377:
! 1378: /* For DHCPINFORM only, cope without a valid context */
! 1379: context = narrow_context(context, mess->ciaddr, tagif_netid);
! 1380:
! 1381: /* Find a least based on IP address if we didn't
! 1382: get one from MAC address/client-d */
! 1383: if (!lease &&
! 1384: (lease = lease_find_by_addr(mess->ciaddr)) &&
! 1385: lease->hostname)
! 1386: hostname = lease->hostname;
! 1387:
! 1388: if (!hostname && (hostname = host_from_dns(mess->ciaddr)))
! 1389: domain = get_domain(mess->ciaddr);
! 1390:
! 1391: if (context && context->netid.net)
! 1392: {
! 1393: context->netid.next = netid;
! 1394: tagif_netid = run_tag_if(&context->netid);
! 1395: }
! 1396:
! 1397: log_tags(tagif_netid, ntohl(mess->xid));
! 1398:
! 1399: log_packet("DHCPACK", &mess->ciaddr, emac, emac_len, iface_name, hostname, mess->xid);
! 1400:
! 1401: if (lease)
! 1402: {
! 1403: lease_set_interface(lease, int_index, now);
! 1404: if (override.s_addr != 0)
! 1405: lease->override = override;
! 1406: else
! 1407: override = lease->override;
! 1408: }
! 1409:
! 1410: clear_packet(mess, end);
! 1411: option_put(mess, end, OPTION_MESSAGE_TYPE, 1, DHCPACK);
! 1412: option_put(mess, end, OPTION_SERVER_IDENTIFIER, INADDRSZ, ntohl(server_id(context, override, fallback).s_addr));
! 1413:
! 1414: do_options(context, mess, end, req_options, hostname, get_domain(mess->ciaddr),
! 1415: netid, subnet_addr, fqdn_flags, borken_opt, pxearch, uuid, vendor_class_len, now);
! 1416:
! 1417: *is_inform = 1; /* handle reply differently */
! 1418: return dhcp_packet_size(mess, agent_id, real_end);
! 1419: }
! 1420:
! 1421: return 0;
! 1422: }
! 1423:
! 1424: /* find a good value to use as MAC address for logging and address-allocation hashing.
! 1425: This is normally just the chaddr field from the DHCP packet,
! 1426: but eg Firewire will have hlen == 0 and use the client-id instead.
! 1427: This could be anything, but will normally be EUI64 for Firewire.
! 1428: We assume that if the first byte of the client-id equals the htype byte
! 1429: then the client-id is using the usual encoding and use the rest of the
! 1430: client-id: if not we can use the whole client-id. This should give
! 1431: sane MAC address logs. */
! 1432: unsigned char *extended_hwaddr(int hwtype, int hwlen, unsigned char *hwaddr,
! 1433: int clid_len, unsigned char *clid, int *len_out)
! 1434: {
! 1435: if (hwlen == 0 && clid && clid_len > 3)
! 1436: {
! 1437: if (clid[0] == hwtype)
! 1438: {
! 1439: *len_out = clid_len - 1 ;
! 1440: return clid + 1;
! 1441: }
! 1442:
! 1443: #if defined(ARPHRD_EUI64) && defined(ARPHRD_IEEE1394)
! 1444: if (clid[0] == ARPHRD_EUI64 && hwtype == ARPHRD_IEEE1394)
! 1445: {
! 1446: *len_out = clid_len - 1 ;
! 1447: return clid + 1;
! 1448: }
! 1449: #endif
! 1450:
! 1451: *len_out = clid_len;
! 1452: return clid;
! 1453: }
! 1454:
! 1455: *len_out = hwlen;
! 1456: return hwaddr;
! 1457: }
! 1458:
! 1459: static unsigned int calc_time(struct dhcp_context *context, struct dhcp_config *config, unsigned char *opt)
! 1460: {
! 1461: unsigned int time = have_config(config, CONFIG_TIME) ? config->lease_time : context->lease_time;
! 1462:
! 1463: if (opt)
! 1464: {
! 1465: unsigned int req_time = option_uint(opt, 0, 4);
! 1466: if (req_time < 120 )
! 1467: req_time = 120; /* sanity */
! 1468: if (time == 0xffffffff || (req_time != 0xffffffff && req_time < time))
! 1469: time = req_time;
! 1470: }
! 1471:
! 1472: return time;
! 1473: }
! 1474:
! 1475: static struct in_addr server_id(struct dhcp_context *context, struct in_addr override, struct in_addr fallback)
! 1476: {
! 1477: if (override.s_addr != 0)
! 1478: return override;
! 1479: else if (context && context->local.s_addr != 0)
! 1480: return context->local;
! 1481: else
! 1482: return fallback;
! 1483: }
! 1484:
! 1485: static int sanitise(unsigned char *opt, char *buf)
! 1486: {
! 1487: char *p;
! 1488: int i;
! 1489:
! 1490: *buf = 0;
! 1491:
! 1492: if (!opt)
! 1493: return 0;
! 1494:
! 1495: p = option_ptr(opt, 0);
! 1496:
! 1497: for (i = option_len(opt); i > 0; i--)
! 1498: {
! 1499: char c = *p++;
! 1500: if (isprint((int)c))
! 1501: *buf++ = c;
! 1502: }
! 1503: *buf = 0; /* add terminator */
! 1504:
! 1505: return 1;
! 1506: }
! 1507:
! 1508: #ifdef HAVE_SCRIPT
! 1509: static void add_extradata_opt(struct dhcp_lease *lease, unsigned char *opt)
! 1510: {
! 1511: if (!opt)
! 1512: lease_add_extradata(lease, NULL, 0, 0);
! 1513: else
! 1514: lease_add_extradata(lease, option_ptr(opt, 0), option_len(opt), 0);
! 1515: }
! 1516: #endif
! 1517:
! 1518: static void log_packet(char *type, void *addr, unsigned char *ext_mac,
! 1519: int mac_len, char *interface, char *string, u32 xid)
! 1520: {
! 1521: struct in_addr a;
! 1522:
! 1523: /* addr may be misaligned */
! 1524: if (addr)
! 1525: memcpy(&a, addr, sizeof(a));
! 1526:
! 1527: print_mac(daemon->namebuff, ext_mac, mac_len);
! 1528:
! 1529: if(option_bool(OPT_LOG_OPTS))
! 1530: my_syslog(MS_DHCP | LOG_INFO, "%u %s(%s) %s%s%s %s",
! 1531: ntohl(xid),
! 1532: type,
! 1533: interface,
! 1534: addr ? inet_ntoa(a) : "",
! 1535: addr ? " " : "",
! 1536: daemon->namebuff,
! 1537: string ? string : "");
! 1538: else
! 1539: my_syslog(MS_DHCP | LOG_INFO, "%s(%s) %s%s%s %s",
! 1540: type,
! 1541: interface,
! 1542: addr ? inet_ntoa(a) : "",
! 1543: addr ? " " : "",
! 1544: daemon->namebuff,
! 1545: string ? string : "");
! 1546: }
! 1547:
! 1548: static void log_options(unsigned char *start, u32 xid)
! 1549: {
! 1550: while (*start != OPTION_END)
! 1551: {
! 1552: char *optname = option_string(AF_INET, start[0], option_ptr(start, 0), option_len(start), daemon->namebuff, MAXDNAME);
! 1553:
! 1554: my_syslog(MS_DHCP | LOG_INFO, "%u sent size:%3d option:%3d %s %s",
! 1555: ntohl(xid), option_len(start), start[0], optname, daemon->namebuff);
! 1556: start += start[1] + 2;
! 1557: }
! 1558: }
! 1559:
! 1560: static unsigned char *option_find1(unsigned char *p, unsigned char *end, int opt, int minsize)
! 1561: {
! 1562: while (1)
! 1563: {
! 1564: if (p > end)
! 1565: return NULL;
! 1566: else if (*p == OPTION_END)
! 1567: return opt == OPTION_END ? p : NULL;
! 1568: else if (*p == OPTION_PAD)
! 1569: p++;
! 1570: else
! 1571: {
! 1572: int opt_len;
! 1573: if (p > end - 2)
! 1574: return NULL; /* malformed packet */
! 1575: opt_len = option_len(p);
! 1576: if (p > end - (2 + opt_len))
! 1577: return NULL; /* malformed packet */
! 1578: if (*p == opt && opt_len >= minsize)
! 1579: return p;
! 1580: p += opt_len + 2;
! 1581: }
! 1582: }
! 1583: }
! 1584:
! 1585: static unsigned char *option_find(struct dhcp_packet *mess, size_t size, int opt_type, int minsize)
! 1586: {
! 1587: unsigned char *ret, *overload;
! 1588:
! 1589: /* skip over DHCP cookie; */
! 1590: if ((ret = option_find1(&mess->options[0] + sizeof(u32), ((unsigned char *)mess) + size, opt_type, minsize)))
! 1591: return ret;
! 1592:
! 1593: /* look for overload option. */
! 1594: if (!(overload = option_find1(&mess->options[0] + sizeof(u32), ((unsigned char *)mess) + size, OPTION_OVERLOAD, 1)))
! 1595: return NULL;
! 1596:
! 1597: /* Can we look in filename area ? */
! 1598: if ((overload[2] & 1) &&
! 1599: (ret = option_find1(&mess->file[0], &mess->file[128], opt_type, minsize)))
! 1600: return ret;
! 1601:
! 1602: /* finally try sname area */
! 1603: if ((overload[2] & 2) &&
! 1604: (ret = option_find1(&mess->sname[0], &mess->sname[64], opt_type, minsize)))
! 1605: return ret;
! 1606:
! 1607: return NULL;
! 1608: }
! 1609:
! 1610: static struct in_addr option_addr(unsigned char *opt)
! 1611: {
! 1612: /* this worries about unaligned data in the option. */
! 1613: /* struct in_addr is network byte order */
! 1614: struct in_addr ret;
! 1615:
! 1616: memcpy(&ret, option_ptr(opt, 0), INADDRSZ);
! 1617:
! 1618: return ret;
! 1619: }
! 1620:
! 1621: static unsigned int option_uint(unsigned char *opt, int offset, int size)
! 1622: {
! 1623: /* this worries about unaligned data and byte order */
! 1624: unsigned int ret = 0;
! 1625: int i;
! 1626: unsigned char *p = option_ptr(opt, offset);
! 1627:
! 1628: for (i = 0; i < size; i++)
! 1629: ret = (ret << 8) | *p++;
! 1630:
! 1631: return ret;
! 1632: }
! 1633:
! 1634: static unsigned char *dhcp_skip_opts(unsigned char *start)
! 1635: {
! 1636: while (*start != 0)
! 1637: start += start[1] + 2;
! 1638: return start;
! 1639: }
! 1640:
! 1641: /* only for use when building packet: doesn't check for bad data. */
! 1642: static unsigned char *find_overload(struct dhcp_packet *mess)
! 1643: {
! 1644: unsigned char *p = &mess->options[0] + sizeof(u32);
! 1645:
! 1646: while (*p != 0)
! 1647: {
! 1648: if (*p == OPTION_OVERLOAD)
! 1649: return p;
! 1650: p += p[1] + 2;
! 1651: }
! 1652: return NULL;
! 1653: }
! 1654:
! 1655: static size_t dhcp_packet_size(struct dhcp_packet *mess, unsigned char *agent_id, unsigned char *real_end)
! 1656: {
! 1657: unsigned char *p = dhcp_skip_opts(&mess->options[0] + sizeof(u32));
! 1658: unsigned char *overload;
! 1659: size_t ret;
! 1660:
! 1661: /* move agent_id back down to the end of the packet */
! 1662: if (agent_id)
! 1663: {
! 1664: memmove(p, agent_id, real_end - agent_id);
! 1665: p += real_end - agent_id;
! 1666: memset(p, 0, real_end - p); /* in case of overlap */
! 1667: }
! 1668:
! 1669: /* add END options to the regions. */
! 1670: overload = find_overload(mess);
! 1671:
! 1672: if (overload && (option_uint(overload, 0, 1) & 1))
! 1673: {
! 1674: *dhcp_skip_opts(mess->file) = OPTION_END;
! 1675: if (option_bool(OPT_LOG_OPTS))
! 1676: log_options(mess->file, mess->xid);
! 1677: }
! 1678: else if (option_bool(OPT_LOG_OPTS) && strlen((char *)mess->file) != 0)
! 1679: my_syslog(MS_DHCP | LOG_INFO, _("%u bootfile name: %s"), ntohl(mess->xid), (char *)mess->file);
! 1680:
! 1681: if (overload && (option_uint(overload, 0, 1) & 2))
! 1682: {
! 1683: *dhcp_skip_opts(mess->sname) = OPTION_END;
! 1684: if (option_bool(OPT_LOG_OPTS))
! 1685: log_options(mess->sname, mess->xid);
! 1686: }
! 1687: else if (option_bool(OPT_LOG_OPTS) && strlen((char *)mess->sname) != 0)
! 1688: my_syslog(MS_DHCP | LOG_INFO, _("%u server name: %s"), ntohl(mess->xid), (char *)mess->sname);
! 1689:
! 1690:
! 1691: *p++ = OPTION_END;
! 1692:
! 1693: if (option_bool(OPT_LOG_OPTS))
! 1694: {
! 1695: if (mess->siaddr.s_addr != 0)
! 1696: my_syslog(MS_DHCP | LOG_INFO, _("%u next server: %s"), ntohl(mess->xid), inet_ntoa(mess->siaddr));
! 1697:
! 1698: if ((mess->flags & htons(0x8000)) && mess->ciaddr.s_addr == 0)
! 1699: my_syslog(MS_DHCP | LOG_INFO, _("%u broadcast response"), ntohl(mess->xid));
! 1700:
! 1701: log_options(&mess->options[0] + sizeof(u32), mess->xid);
! 1702: }
! 1703:
! 1704: ret = (size_t)(p - (unsigned char *)mess);
! 1705:
! 1706: if (ret < MIN_PACKETSZ)
! 1707: ret = MIN_PACKETSZ;
! 1708:
! 1709: return ret;
! 1710: }
! 1711:
! 1712: static unsigned char *free_space(struct dhcp_packet *mess, unsigned char *end, int opt, int len)
! 1713: {
! 1714: unsigned char *p = dhcp_skip_opts(&mess->options[0] + sizeof(u32));
! 1715:
! 1716: if (p + len + 3 >= end)
! 1717: /* not enough space in options area, try and use overload, if poss */
! 1718: {
! 1719: unsigned char *overload;
! 1720:
! 1721: if (!(overload = find_overload(mess)) &&
! 1722: (mess->file[0] == 0 || mess->sname[0] == 0))
! 1723: {
! 1724: /* attempt to overload fname and sname areas, we've reserved space for the
! 1725: overflow option previuously. */
! 1726: overload = p;
! 1727: *(p++) = OPTION_OVERLOAD;
! 1728: *(p++) = 1;
! 1729: }
! 1730:
! 1731: p = NULL;
! 1732:
! 1733: /* using filename field ? */
! 1734: if (overload)
! 1735: {
! 1736: if (mess->file[0] == 0)
! 1737: overload[2] |= 1;
! 1738:
! 1739: if (overload[2] & 1)
! 1740: {
! 1741: p = dhcp_skip_opts(mess->file);
! 1742: if (p + len + 3 >= mess->file + sizeof(mess->file))
! 1743: p = NULL;
! 1744: }
! 1745:
! 1746: if (!p)
! 1747: {
! 1748: /* try to bring sname into play (it may be already) */
! 1749: if (mess->sname[0] == 0)
! 1750: overload[2] |= 2;
! 1751:
! 1752: if (overload[2] & 2)
! 1753: {
! 1754: p = dhcp_skip_opts(mess->sname);
! 1755: if (p + len + 3 >= mess->sname + sizeof(mess->sname))
! 1756: p = NULL;
! 1757: }
! 1758: }
! 1759: }
! 1760:
! 1761: if (!p)
! 1762: my_syslog(MS_DHCP | LOG_WARNING, _("cannot send DHCP/BOOTP option %d: no space left in packet"), opt);
! 1763: }
! 1764:
! 1765: if (p)
! 1766: {
! 1767: *(p++) = opt;
! 1768: *(p++) = len;
! 1769: }
! 1770:
! 1771: return p;
! 1772: }
! 1773:
! 1774: static void option_put(struct dhcp_packet *mess, unsigned char *end, int opt, int len, unsigned int val)
! 1775: {
! 1776: int i;
! 1777: unsigned char *p = free_space(mess, end, opt, len);
! 1778:
! 1779: if (p)
! 1780: for (i = 0; i < len; i++)
! 1781: *(p++) = val >> (8 * (len - (i + 1)));
! 1782: }
! 1783:
! 1784: static void option_put_string(struct dhcp_packet *mess, unsigned char *end, int opt,
! 1785: char *string, int null_term)
! 1786: {
! 1787: unsigned char *p;
! 1788: size_t len = strlen(string);
! 1789:
! 1790: if (null_term && len != 255)
! 1791: len++;
! 1792:
! 1793: if ((p = free_space(mess, end, opt, len)))
! 1794: memcpy(p, string, len);
! 1795: }
! 1796:
! 1797: /* return length, note this only does the data part */
! 1798: static int do_opt(struct dhcp_opt *opt, unsigned char *p, struct dhcp_context *context, int null_term)
! 1799: {
! 1800: int len = opt->len;
! 1801:
! 1802: if ((opt->flags & DHOPT_STRING) && null_term && len != 255)
! 1803: len++;
! 1804:
! 1805: if (p && len != 0)
! 1806: {
! 1807: if (context && (opt->flags & DHOPT_ADDR))
! 1808: {
! 1809: int j;
! 1810: struct in_addr *a = (struct in_addr *)opt->val;
! 1811: for (j = 0; j < opt->len; j+=INADDRSZ, a++)
! 1812: {
! 1813: /* zero means "self" (but not in vendorclass options.) */
! 1814: if (a->s_addr == 0)
! 1815: memcpy(p, &context->local, INADDRSZ);
! 1816: else
! 1817: memcpy(p, a, INADDRSZ);
! 1818: p += INADDRSZ;
! 1819: }
! 1820: }
! 1821: else
! 1822: memcpy(p, opt->val, len);
! 1823: }
! 1824: return len;
! 1825: }
! 1826:
! 1827: static int in_list(unsigned char *list, int opt)
! 1828: {
! 1829: int i;
! 1830:
! 1831: /* If no requested options, send everything, not nothing. */
! 1832: if (!list)
! 1833: return 1;
! 1834:
! 1835: for (i = 0; list[i] != OPTION_END; i++)
! 1836: if (opt == list[i])
! 1837: return 1;
! 1838:
! 1839: return 0;
! 1840: }
! 1841:
! 1842: static struct dhcp_opt *option_find2(int opt)
! 1843: {
! 1844: struct dhcp_opt *opts;
! 1845:
! 1846: for (opts = daemon->dhcp_opts; opts; opts = opts->next)
! 1847: if (opts->opt == opt && (opts->flags & DHOPT_TAGOK))
! 1848: return opts;
! 1849:
! 1850: return NULL;
! 1851: }
! 1852:
! 1853: /* mark vendor-encapsulated options which match the client-supplied or
! 1854: config-supplied vendor class */
! 1855: static void match_vendor_opts(unsigned char *opt, struct dhcp_opt *dopt)
! 1856: {
! 1857: for (; dopt; dopt = dopt->next)
! 1858: {
! 1859: dopt->flags &= ~DHOPT_VENDOR_MATCH;
! 1860: if (opt && (dopt->flags & DHOPT_VENDOR))
! 1861: {
! 1862: int i, len = 0;
! 1863: if (dopt->u.vendor_class)
! 1864: len = strlen((char *)dopt->u.vendor_class);
! 1865: for (i = 0; i <= (option_len(opt) - len); i++)
! 1866: if (len == 0 || memcmp(dopt->u.vendor_class, option_ptr(opt, i), len) == 0)
! 1867: {
! 1868: dopt->flags |= DHOPT_VENDOR_MATCH;
! 1869: break;
! 1870: }
! 1871: }
! 1872: }
! 1873: }
! 1874:
! 1875: static int do_encap_opts(struct dhcp_opt *opt, int encap, int flag,
! 1876: struct dhcp_packet *mess, unsigned char *end, int null_term)
! 1877: {
! 1878: int len, enc_len, ret = 0;
! 1879: struct dhcp_opt *start;
! 1880: unsigned char *p;
! 1881:
! 1882: /* find size in advance */
! 1883: for (enc_len = 0, start = opt; opt; opt = opt->next)
! 1884: if (opt->flags & flag)
! 1885: {
! 1886: int new = do_opt(opt, NULL, NULL, null_term) + 2;
! 1887: ret = 1;
! 1888: if (enc_len + new <= 255)
! 1889: enc_len += new;
! 1890: else
! 1891: {
! 1892: p = free_space(mess, end, encap, enc_len);
! 1893: for (; start && start != opt; start = start->next)
! 1894: if (p && (start->flags & flag))
! 1895: {
! 1896: len = do_opt(start, p + 2, NULL, null_term);
! 1897: *(p++) = start->opt;
! 1898: *(p++) = len;
! 1899: p += len;
! 1900: }
! 1901: enc_len = new;
! 1902: start = opt;
! 1903: }
! 1904: }
! 1905:
! 1906: if (enc_len != 0 &&
! 1907: (p = free_space(mess, end, encap, enc_len + 1)))
! 1908: {
! 1909: for (; start; start = start->next)
! 1910: if (start->flags & flag)
! 1911: {
! 1912: len = do_opt(start, p + 2, NULL, null_term);
! 1913: *(p++) = start->opt;
! 1914: *(p++) = len;
! 1915: p += len;
! 1916: }
! 1917: *p = OPTION_END;
! 1918: }
! 1919:
! 1920: return ret;
! 1921: }
! 1922:
! 1923: static void pxe_misc(struct dhcp_packet *mess, unsigned char *end, unsigned char *uuid)
! 1924: {
! 1925: unsigned char *p;
! 1926:
! 1927: option_put_string(mess, end, OPTION_VENDOR_ID, "PXEClient", 0);
! 1928: if (uuid && (p = free_space(mess, end, OPTION_PXE_UUID, 17)))
! 1929: memcpy(p, uuid, 17);
! 1930: }
! 1931:
! 1932: static int prune_vendor_opts(struct dhcp_netid *netid)
! 1933: {
! 1934: int force = 0;
! 1935: struct dhcp_opt *opt;
! 1936:
! 1937: /* prune vendor-encapsulated options based on netid, and look if we're forcing them to be sent */
! 1938: for (opt = daemon->dhcp_opts; opt; opt = opt->next)
! 1939: if (opt->flags & DHOPT_VENDOR_MATCH)
! 1940: {
! 1941: if (!match_netid(opt->netid, netid, 1))
! 1942: opt->flags &= ~DHOPT_VENDOR_MATCH;
! 1943: else if (opt->flags & DHOPT_FORCE)
! 1944: force = 1;
! 1945: }
! 1946: return force;
! 1947: }
! 1948:
! 1949: static struct dhcp_opt *pxe_opts(int pxe_arch, struct dhcp_netid *netid, struct in_addr local, time_t now)
! 1950: {
! 1951: #define NUM_OPTS 4
! 1952:
! 1953: unsigned char *p, *q;
! 1954: struct pxe_service *service;
! 1955: static struct dhcp_opt *o, *ret;
! 1956: int i, j = NUM_OPTS - 1;
! 1957: struct in_addr boot_server;
! 1958:
! 1959: /* We pass back references to these, hence they are declared static */
! 1960: static unsigned char discovery_control;
! 1961: static unsigned char fake_prompt[] = { 0, 'P', 'X', 'E' };
! 1962: static struct dhcp_opt *fake_opts = NULL;
! 1963:
! 1964: /* Disable multicast, since we don't support it, and broadcast
! 1965: unless we need it */
! 1966: discovery_control = 3;
! 1967:
! 1968: ret = daemon->dhcp_opts;
! 1969:
! 1970: if (!fake_opts && !(fake_opts = whine_malloc(NUM_OPTS * sizeof(struct dhcp_opt))))
! 1971: return ret;
! 1972:
! 1973: for (i = 0; i < NUM_OPTS; i++)
! 1974: {
! 1975: fake_opts[i].flags = DHOPT_VENDOR_MATCH;
! 1976: fake_opts[i].netid = NULL;
! 1977: fake_opts[i].next = i == (NUM_OPTS - 1) ? ret : &fake_opts[i+1];
! 1978: }
! 1979:
! 1980: /* create the data for the PXE_MENU and PXE_SERVERS options. */
! 1981: p = (unsigned char *)daemon->dhcp_buff;
! 1982: q = (unsigned char *)daemon->dhcp_buff3;
! 1983:
! 1984: for (i = 0, service = daemon->pxe_services; service; service = service->next)
! 1985: if (pxe_arch == service->CSA && match_netid(service->netid, netid, 1))
! 1986: {
! 1987: size_t len = strlen(service->menu);
! 1988: /* opt 43 max size is 255. encapsulated option has type and length
! 1989: bytes, so its max size is 253. */
! 1990: if (p - (unsigned char *)daemon->dhcp_buff + len + 3 < 253)
! 1991: {
! 1992: *(p++) = service->type >> 8;
! 1993: *(p++) = service->type;
! 1994: *(p++) = len;
! 1995: memcpy(p, service->menu, len);
! 1996: p += len;
! 1997: i++;
! 1998: }
! 1999: else
! 2000: {
! 2001: toobig:
! 2002: my_syslog(MS_DHCP | LOG_ERR, _("PXE menu too large"));
! 2003: return daemon->dhcp_opts;
! 2004: }
! 2005:
! 2006: boot_server = service->basename ? local :
! 2007: (service->sname ? a_record_from_hosts(service->sname, now) : service->server);
! 2008:
! 2009: if (boot_server.s_addr != 0)
! 2010: {
! 2011: if (q - (unsigned char *)daemon->dhcp_buff3 + 3 + INADDRSZ >= 253)
! 2012: goto toobig;
! 2013:
! 2014: /* Boot service with known address - give it */
! 2015: *(q++) = service->type >> 8;
! 2016: *(q++) = service->type;
! 2017: *(q++) = 1;
! 2018: /* dest misaligned */
! 2019: memcpy(q, &boot_server.s_addr, INADDRSZ);
! 2020: q += INADDRSZ;
! 2021: }
! 2022: else if (service->type != 0)
! 2023: /* We don't know the server for a service type, so we'll
! 2024: allow the client to broadcast for it */
! 2025: discovery_control = 2;
! 2026: }
! 2027:
! 2028: /* if no prompt, wait forever if there's a choice */
! 2029: fake_prompt[0] = (i > 1) ? 255 : 0;
! 2030:
! 2031: if (i == 0)
! 2032: discovery_control = 8; /* no menu - just use use mess->filename */
! 2033: else
! 2034: {
! 2035: ret = &fake_opts[j--];
! 2036: ret->len = p - (unsigned char *)daemon->dhcp_buff;
! 2037: ret->val = (unsigned char *)daemon->dhcp_buff;
! 2038: ret->opt = SUBOPT_PXE_MENU;
! 2039:
! 2040: if (q - (unsigned char *)daemon->dhcp_buff3 != 0)
! 2041: {
! 2042: ret = &fake_opts[j--];
! 2043: ret->len = q - (unsigned char *)daemon->dhcp_buff3;
! 2044: ret->val = (unsigned char *)daemon->dhcp_buff3;
! 2045: ret->opt = SUBOPT_PXE_SERVERS;
! 2046: }
! 2047: }
! 2048:
! 2049: for (o = daemon->dhcp_opts; o; o = o->next)
! 2050: if ((o->flags & DHOPT_VENDOR_MATCH) && o->opt == SUBOPT_PXE_MENU_PROMPT)
! 2051: break;
! 2052:
! 2053: if (!o)
! 2054: {
! 2055: ret = &fake_opts[j--];
! 2056: ret->len = sizeof(fake_prompt);
! 2057: ret->val = fake_prompt;
! 2058: ret->opt = SUBOPT_PXE_MENU_PROMPT;
! 2059: }
! 2060:
! 2061: ret = &fake_opts[j--];
! 2062: ret->len = 1;
! 2063: ret->opt = SUBOPT_PXE_DISCOVERY;
! 2064: ret->val= &discovery_control;
! 2065:
! 2066: return ret;
! 2067: }
! 2068:
! 2069: static void clear_packet(struct dhcp_packet *mess, unsigned char *end)
! 2070: {
! 2071: memset(mess->sname, 0, sizeof(mess->sname));
! 2072: memset(mess->file, 0, sizeof(mess->file));
! 2073: memset(&mess->options[0] + sizeof(u32), 0, end - (&mess->options[0] + sizeof(u32)));
! 2074: mess->siaddr.s_addr = 0;
! 2075: }
! 2076:
! 2077: struct dhcp_boot *find_boot(struct dhcp_netid *netid)
! 2078: {
! 2079: struct dhcp_boot *boot;
! 2080:
! 2081: /* decide which dhcp-boot option we're using */
! 2082: for (boot = daemon->boot_config; boot; boot = boot->next)
! 2083: if (match_netid(boot->netid, netid, 0))
! 2084: break;
! 2085: if (!boot)
! 2086: /* No match, look for one without a netid */
! 2087: for (boot = daemon->boot_config; boot; boot = boot->next)
! 2088: if (match_netid(boot->netid, netid, 1))
! 2089: break;
! 2090:
! 2091: return boot;
! 2092: }
! 2093:
! 2094: static void do_options(struct dhcp_context *context,
! 2095: struct dhcp_packet *mess,
! 2096: unsigned char *end,
! 2097: unsigned char *req_options,
! 2098: char *hostname,
! 2099: char *domain,
! 2100: struct dhcp_netid *netid,
! 2101: struct in_addr subnet_addr,
! 2102: unsigned char fqdn_flags,
! 2103: int null_term, int pxe_arch,
! 2104: unsigned char *uuid,
! 2105: int vendor_class_len,
! 2106: time_t now)
! 2107: {
! 2108: struct dhcp_opt *opt, *config_opts = daemon->dhcp_opts;
! 2109: struct dhcp_boot *boot;
! 2110: unsigned char *p;
! 2111: int i, len, force_encap = 0;
! 2112: unsigned char f0 = 0, s0 = 0;
! 2113: int done_file = 0, done_server = 0;
! 2114: int done_vendor_class = 0;
! 2115: struct dhcp_netid *tagif;
! 2116: struct dhcp_netid_list *id_list;
! 2117:
! 2118: /* filter options based on tags, those we want get DHOPT_TAGOK bit set */
! 2119: if (context)
! 2120: context->netid.next = NULL;
! 2121: tagif = option_filter(netid, context && context->netid.net ? &context->netid : NULL, config_opts);
! 2122:
! 2123: /* logging */
! 2124: if (option_bool(OPT_LOG_OPTS) && req_options)
! 2125: {
! 2126: char *q = daemon->namebuff;
! 2127: for (i = 0; req_options[i] != OPTION_END; i++)
! 2128: {
! 2129: char *s = option_string(AF_INET, req_options[i], NULL, 0, NULL, 0);
! 2130: q += snprintf(q, MAXDNAME - (q - daemon->namebuff),
! 2131: "%d%s%s%s",
! 2132: req_options[i],
! 2133: strlen(s) != 0 ? ":" : "",
! 2134: s,
! 2135: req_options[i+1] == OPTION_END ? "" : ", ");
! 2136: if (req_options[i+1] == OPTION_END || (q - daemon->namebuff) > 40)
! 2137: {
! 2138: q = daemon->namebuff;
! 2139: my_syslog(MS_DHCP | LOG_INFO, _("%u requested options: %s"), ntohl(mess->xid), daemon->namebuff);
! 2140: }
! 2141: }
! 2142: }
! 2143:
! 2144: for (id_list = daemon->force_broadcast; id_list; id_list = id_list->next)
! 2145: if ((!id_list->list) || match_netid(id_list->list, netid, 0))
! 2146: break;
! 2147: if (id_list)
! 2148: mess->flags |= htons(0x8000); /* force broadcast */
! 2149:
! 2150: if (context)
! 2151: mess->siaddr = context->local;
! 2152:
! 2153: /* See if we can send the boot stuff as options.
! 2154: To do this we need a requested option list, BOOTP
! 2155: and very old DHCP clients won't have this, we also
! 2156: provide an manual option to disable it.
! 2157: Some PXE ROMs have bugs (surprise!) and need zero-terminated
! 2158: names, so we always send those. */
! 2159: if ((boot = find_boot(tagif)))
! 2160: {
! 2161: if (boot->sname)
! 2162: {
! 2163: if (!option_bool(OPT_NO_OVERRIDE) &&
! 2164: req_options &&
! 2165: in_list(req_options, OPTION_SNAME))
! 2166: option_put_string(mess, end, OPTION_SNAME, boot->sname, 1);
! 2167: else
! 2168: strncpy((char *)mess->sname, boot->sname, sizeof(mess->sname)-1);
! 2169: }
! 2170:
! 2171: if (boot->file)
! 2172: {
! 2173: if (!option_bool(OPT_NO_OVERRIDE) &&
! 2174: req_options &&
! 2175: in_list(req_options, OPTION_FILENAME))
! 2176: option_put_string(mess, end, OPTION_FILENAME, boot->file, 1);
! 2177: else
! 2178: strncpy((char *)mess->file, boot->file, sizeof(mess->file)-1);
! 2179: }
! 2180:
! 2181: if (boot->next_server.s_addr)
! 2182: mess->siaddr = boot->next_server;
! 2183: else if (boot->tftp_sname)
! 2184: mess->siaddr = a_record_from_hosts(boot->tftp_sname, now);
! 2185: }
! 2186: else
! 2187: /* Use the values of the relevant options if no dhcp-boot given and
! 2188: they're not explicitly asked for as options. OPTION_END is used
! 2189: as an internal way to specify siaddr without using dhcp-boot, for use in
! 2190: dhcp-optsfile. */
! 2191: {
! 2192: if ((!req_options || !in_list(req_options, OPTION_FILENAME)) &&
! 2193: (opt = option_find2(OPTION_FILENAME)) && !(opt->flags & DHOPT_FORCE))
! 2194: {
! 2195: strncpy((char *)mess->file, (char *)opt->val, sizeof(mess->file)-1);
! 2196: done_file = 1;
! 2197: }
! 2198:
! 2199: if ((!req_options || !in_list(req_options, OPTION_SNAME)) &&
! 2200: (opt = option_find2(OPTION_SNAME)) && !(opt->flags & DHOPT_FORCE))
! 2201: {
! 2202: strncpy((char *)mess->sname, (char *)opt->val, sizeof(mess->sname)-1);
! 2203: done_server = 1;
! 2204: }
! 2205:
! 2206: if ((opt = option_find2(OPTION_END)))
! 2207: mess->siaddr.s_addr = ((struct in_addr *)opt->val)->s_addr;
! 2208: }
! 2209:
! 2210: /* We don't want to do option-overload for BOOTP, so make the file and sname
! 2211: fields look like they are in use, even when they aren't. This gets restored
! 2212: at the end of this function. */
! 2213:
! 2214: if (!req_options || option_bool(OPT_NO_OVERRIDE))
! 2215: {
! 2216: f0 = mess->file[0];
! 2217: mess->file[0] = 1;
! 2218: s0 = mess->sname[0];
! 2219: mess->sname[0] = 1;
! 2220: }
! 2221:
! 2222: /* At this point, if mess->sname or mess->file are zeroed, they are available
! 2223: for option overload, reserve space for the overload option. */
! 2224: if (mess->file[0] == 0 || mess->sname[0] == 0)
! 2225: end -= 3;
! 2226:
! 2227: /* rfc3011 says this doesn't need to be in the requested options list. */
! 2228: if (subnet_addr.s_addr)
! 2229: option_put(mess, end, OPTION_SUBNET_SELECT, INADDRSZ, ntohl(subnet_addr.s_addr));
! 2230:
! 2231: /* replies to DHCPINFORM may not have a valid context */
! 2232: if (context)
! 2233: {
! 2234: if (!option_find2(OPTION_NETMASK))
! 2235: option_put(mess, end, OPTION_NETMASK, INADDRSZ, ntohl(context->netmask.s_addr));
! 2236:
! 2237: /* May not have a "guessed" broadcast address if we got no packets via a relay
! 2238: from this net yet (ie just unicast renewals after a restart */
! 2239: if (context->broadcast.s_addr &&
! 2240: !option_find2(OPTION_BROADCAST))
! 2241: option_put(mess, end, OPTION_BROADCAST, INADDRSZ, ntohl(context->broadcast.s_addr));
! 2242:
! 2243: /* Same comments as broadcast apply, and also may not be able to get a sensible
! 2244: default when using subnet select. User must configure by steam in that case. */
! 2245: if (context->router.s_addr &&
! 2246: in_list(req_options, OPTION_ROUTER) &&
! 2247: !option_find2(OPTION_ROUTER))
! 2248: option_put(mess, end, OPTION_ROUTER, INADDRSZ, ntohl(context->router.s_addr));
! 2249:
! 2250: if (daemon->port == NAMESERVER_PORT &&
! 2251: in_list(req_options, OPTION_DNSSERVER) &&
! 2252: !option_find2(OPTION_DNSSERVER))
! 2253: option_put(mess, end, OPTION_DNSSERVER, INADDRSZ, ntohl(context->local.s_addr));
! 2254: }
! 2255:
! 2256: if (domain && in_list(req_options, OPTION_DOMAINNAME) &&
! 2257: !option_find2(OPTION_DOMAINNAME))
! 2258: option_put_string(mess, end, OPTION_DOMAINNAME, domain, null_term);
! 2259:
! 2260: /* Note that we ignore attempts to set the fqdn using --dhc-option=81,<name> */
! 2261: if (hostname)
! 2262: {
! 2263: if (in_list(req_options, OPTION_HOSTNAME) &&
! 2264: !option_find2(OPTION_HOSTNAME))
! 2265: option_put_string(mess, end, OPTION_HOSTNAME, hostname, null_term);
! 2266:
! 2267: if (fqdn_flags != 0)
! 2268: {
! 2269: len = strlen(hostname) + 3;
! 2270:
! 2271: if (fqdn_flags & 0x04)
! 2272: len += 2;
! 2273: else if (null_term)
! 2274: len++;
! 2275:
! 2276: if (domain)
! 2277: len += strlen(domain) + 1;
! 2278:
! 2279: if ((p = free_space(mess, end, OPTION_CLIENT_FQDN, len)))
! 2280: {
! 2281: *(p++) = fqdn_flags & 0x0f; /* MBZ bits to zero */
! 2282: *(p++) = 255;
! 2283: *(p++) = 255;
! 2284:
! 2285: if (fqdn_flags & 0x04)
! 2286: {
! 2287: p = do_rfc1035_name(p, hostname);
! 2288: if (domain)
! 2289: p = do_rfc1035_name(p, domain);
! 2290: *p++ = 0;
! 2291: }
! 2292: else
! 2293: {
! 2294: memcpy(p, hostname, strlen(hostname));
! 2295: p += strlen(hostname);
! 2296: if (domain)
! 2297: {
! 2298: *(p++) = '.';
! 2299: memcpy(p, domain, strlen(domain));
! 2300: p += strlen(domain);
! 2301: }
! 2302: if (null_term)
! 2303: *(p++) = 0;
! 2304: }
! 2305: }
! 2306: }
! 2307: }
! 2308:
! 2309: for (opt = config_opts; opt; opt = opt->next)
! 2310: {
! 2311: int optno = opt->opt;
! 2312:
! 2313: /* netids match and not encapsulated? */
! 2314: if (!(opt->flags & DHOPT_TAGOK))
! 2315: continue;
! 2316:
! 2317: /* was it asked for, or are we sending it anyway? */
! 2318: if (!(opt->flags & DHOPT_FORCE) && !in_list(req_options, optno))
! 2319: continue;
! 2320:
! 2321: /* prohibit some used-internally options */
! 2322: if (optno == OPTION_CLIENT_FQDN ||
! 2323: optno == OPTION_MAXMESSAGE ||
! 2324: optno == OPTION_OVERLOAD ||
! 2325: optno == OPTION_PAD ||
! 2326: optno == OPTION_END)
! 2327: continue;
! 2328:
! 2329: if (optno == OPTION_SNAME && done_server)
! 2330: continue;
! 2331:
! 2332: if (optno == OPTION_FILENAME && done_file)
! 2333: continue;
! 2334:
! 2335: /* For the options we have default values on
! 2336: dhc-option=<optionno> means "don't include this option"
! 2337: not "include a zero-length option" */
! 2338: if (opt->len == 0 &&
! 2339: (optno == OPTION_NETMASK ||
! 2340: optno == OPTION_BROADCAST ||
! 2341: optno == OPTION_ROUTER ||
! 2342: optno == OPTION_DNSSERVER ||
! 2343: optno == OPTION_DOMAINNAME ||
! 2344: optno == OPTION_HOSTNAME))
! 2345: continue;
! 2346:
! 2347: /* vendor-class comes from elsewhere for PXE */
! 2348: if (pxe_arch != -1 && optno == OPTION_VENDOR_ID)
! 2349: continue;
! 2350:
! 2351: /* always force null-term for filename and servername - buggy PXE again. */
! 2352: len = do_opt(opt, NULL, context,
! 2353: (optno == OPTION_SNAME || optno == OPTION_FILENAME) ? 1 : null_term);
! 2354:
! 2355: if ((p = free_space(mess, end, optno, len)))
! 2356: {
! 2357: do_opt(opt, p, context,
! 2358: (optno == OPTION_SNAME || optno == OPTION_FILENAME) ? 1 : null_term);
! 2359:
! 2360: /* If we send a vendor-id, revisit which vendor-ops we consider
! 2361: it appropriate to send. */
! 2362: if (optno == OPTION_VENDOR_ID)
! 2363: {
! 2364: match_vendor_opts(p - 2, config_opts);
! 2365: done_vendor_class = 1;
! 2366: }
! 2367: }
! 2368: }
! 2369:
! 2370: /* Now send options to be encapsulated in arbitrary options,
! 2371: eg dhcp-option=encap:172,17,.......
! 2372: Also handle vendor-identifying vendor-encapsulated options,
! 2373: dhcp-option = vi-encap:13,17,.......
! 2374: The may be more that one "outer" to do, so group
! 2375: all the options which match each outer in turn. */
! 2376: for (opt = config_opts; opt; opt = opt->next)
! 2377: opt->flags &= ~DHOPT_ENCAP_DONE;
! 2378:
! 2379: for (opt = config_opts; opt; opt = opt->next)
! 2380: {
! 2381: int flags;
! 2382:
! 2383: if ((flags = (opt->flags & (DHOPT_ENCAPSULATE | DHOPT_RFC3925))))
! 2384: {
! 2385: int found = 0;
! 2386: struct dhcp_opt *o;
! 2387:
! 2388: if (opt->flags & DHOPT_ENCAP_DONE)
! 2389: continue;
! 2390:
! 2391: for (len = 0, o = config_opts; o; o = o->next)
! 2392: {
! 2393: int outer = flags & DHOPT_ENCAPSULATE ? o->u.encap : OPTION_VENDOR_IDENT_OPT;
! 2394:
! 2395: o->flags &= ~DHOPT_ENCAP_MATCH;
! 2396:
! 2397: if (!(o->flags & flags) || opt->u.encap != o->u.encap)
! 2398: continue;
! 2399:
! 2400: o->flags |= DHOPT_ENCAP_DONE;
! 2401: if (match_netid(o->netid, tagif, 1) &&
! 2402: ((o->flags & DHOPT_FORCE) || in_list(req_options, outer)))
! 2403: {
! 2404: o->flags |= DHOPT_ENCAP_MATCH;
! 2405: found = 1;
! 2406: len += do_opt(o, NULL, NULL, 0) + 2;
! 2407: }
! 2408: }
! 2409:
! 2410: if (found)
! 2411: {
! 2412: if (flags & DHOPT_ENCAPSULATE)
! 2413: do_encap_opts(config_opts, opt->u.encap, DHOPT_ENCAP_MATCH, mess, end, null_term);
! 2414: else if (len > 250)
! 2415: my_syslog(MS_DHCP | LOG_WARNING, _("cannot send RFC3925 option: too many options for enterprise number %d"), opt->u.encap);
! 2416: else if ((p = free_space(mess, end, OPTION_VENDOR_IDENT_OPT, len + 5)))
! 2417: {
! 2418: int swap_ent = htonl(opt->u.encap);
! 2419: memcpy(p, &swap_ent, 4);
! 2420: p += 4;
! 2421: *(p++) = len;
! 2422: for (o = config_opts; o; o = o->next)
! 2423: if (o->flags & DHOPT_ENCAP_MATCH)
! 2424: {
! 2425: len = do_opt(o, p + 2, NULL, 0);
! 2426: *(p++) = o->opt;
! 2427: *(p++) = len;
! 2428: p += len;
! 2429: }
! 2430: }
! 2431: }
! 2432: }
! 2433: }
! 2434:
! 2435: force_encap = prune_vendor_opts(tagif);
! 2436:
! 2437: if (context && pxe_arch != -1)
! 2438: {
! 2439: pxe_misc(mess, end, uuid);
! 2440: config_opts = pxe_opts(pxe_arch, tagif, context->local, now);
! 2441: }
! 2442:
! 2443: if ((force_encap || in_list(req_options, OPTION_VENDOR_CLASS_OPT)) &&
! 2444: do_encap_opts(config_opts, OPTION_VENDOR_CLASS_OPT, DHOPT_VENDOR_MATCH, mess, end, null_term) &&
! 2445: pxe_arch == -1 && !done_vendor_class && vendor_class_len != 0 &&
! 2446: (p = free_space(mess, end, OPTION_VENDOR_ID, vendor_class_len)))
! 2447: /* If we send vendor encapsulated options, and haven't already sent option 60,
! 2448: echo back the value we got from the client. */
! 2449: memcpy(p, daemon->dhcp_buff3, vendor_class_len);
! 2450:
! 2451: /* restore BOOTP anti-overload hack */
! 2452: if (!req_options || option_bool(OPT_NO_OVERRIDE))
! 2453: {
! 2454: mess->file[0] = f0;
! 2455: mess->sname[0] = s0;
! 2456: }
! 2457: }
! 2458:
! 2459: #endif
! 2460:
! 2461:
! 2462:
! 2463:
! 2464:
! 2465:
! 2466:
FreeBSD-CVSweb <freebsd-cvsweb@FreeBSD.org>