dhclient - Implement RFC 3442
[dragonfly.git] / sbin / dhclient / dhclient.c
CommitLineData
846204b6
HT
1/*
2 * Copyright 2004 Henning Brauer <henning@openbsd.org>
3 * Copyright (c) 1995, 1996, 1997, 1998, 1999
4 * The Internet Software Consortium. All rights reserved.
5 *
6 * Redistribution and use in source and binary forms, with or without
7 * modification, are permitted provided that the following conditions
8 * are met:
9 *
10 * 1. Redistributions of source code must retain the above copyright
11 * notice, this list of conditions and the following disclaimer.
12 * 2. Redistributions in binary form must reproduce the above copyright
13 * notice, this list of conditions and the following disclaimer in the
14 * documentation and/or other materials provided with the distribution.
15 * 3. Neither the name of The Internet Software Consortium nor the names
16 * of its contributors may be used to endorse or promote products derived
17 * from this software without specific prior written permission.
18 *
19 * THIS SOFTWARE IS PROVIDED BY THE INTERNET SOFTWARE CONSORTIUM AND
20 * CONTRIBUTORS ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES,
21 * INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
22 * MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
23 * DISCLAIMED. IN NO EVENT SHALL THE INTERNET SOFTWARE CONSORTIUM OR
24 * CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
25 * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
26 * LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF
27 * USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND
28 * ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY,
29 * OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT
30 * OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
31 * SUCH DAMAGE.
32 *
33 * This software has been written for the Internet Software Consortium
34 * by Ted Lemon <mellon@fugue.com> in cooperation with Vixie
35 * Enterprises. To learn more about the Internet Software Consortium,
36 * see ``http://www.vix.com/isc''. To learn more about Vixie
37 * Enterprises, see ``http://www.vix.com''.
38 *
39 * This client was substantially modified and enhanced by Elliot Poger
40 * for use on Linux while he was working on the MosquitoNet project at
41 * Stanford.
42 *
43 * The current version owes much to Elliot's Linux enhancements, but
44 * was substantially reorganized and partially rewritten by Ted Lemon
45 * so as to use the same networking framework that the Internet Software
46 * Consortium DHCP server uses. Much system-specific configuration code
47 * was moved into a shell script so that as support for more operating
48 * systems is added, it will not be necessary to port and maintain
49 * system-specific configuration code to these operating systems - instead,
50 * the shell script can invoke the native tools to accomplish the same
51 * purpose.
52 */
d63fb838 53#include <sys/ioctl.h>
846204b6
HT
54
55#include <ctype.h>
56#include <poll.h>
57#include <pwd.h>
0f5f50b1 58#include <signal.h>
a05d48e6 59#include <unistd.h>
846204b6
HT
60
61#include "dhcpd.h"
62#include "privsep.h"
63
64#define CLIENT_PATH "PATH=/usr/bin:/usr/sbin:/bin:/sbin"
65#define DEFAULT_LEASE_TIME 43200 /* 12 hours... */
66#define TIME_MAX 2147483647
a05d48e6
SG
67#define POLL_FAILURES 10
68#define POLL_FAILURE_WAIT 1 /* Back off multiplier (seconds) */
846204b6 69
846204b6
HT
70char *path_dhclient_conf = _PATH_DHCLIENT_CONF;
71char *path_dhclient_db = NULL;
0f5f50b1 72char *orig_ifname;
846204b6
HT
73
74int log_perror = 1;
75int privfd;
76int nullfd = -1;
77int no_daemon;
0f5f50b1 78int stayalive = 0;
846204b6
HT
79int unknown_ok = 1;
80int routefd = -1;
0f5f50b1 81pid_t monitor_pid;
846204b6
HT
82
83struct iaddr iaddr_broadcast = { 4, { 255, 255, 255, 255 } };
84struct in_addr inaddr_any;
85struct sockaddr_in sockaddr_broadcast;
86
87struct interface_info *ifi;
88struct client_state *client;
89struct client_config *config;
90
0f5f50b1 91int findproto(char *, int);
846204b6 92struct sockaddr *get_ifa(char *, int);
0f5f50b1
MD
93void usage(void);
94int check_option(struct client_lease *l, int option);
6bdc8b43 95int check_classless_option(unsigned char *data, int len);
0f5f50b1
MD
96int ipv4addrs(char * buf);
97int res_hnok(const char *dn);
846204b6 98char *option_as_string(unsigned int code, unsigned char *data, int len);
0f5f50b1
MD
99int fork_privchld(int, int);
100void get_ifname(char *, char *);
101static void sig_handle(int sig);
102static int killclient(int fd);
846204b6
HT
103
104time_t scripttime;
105static FILE *leaseFile;
106
107int
108findproto(char *cp, int n)
109{
110 struct sockaddr *sa;
111 int i;
112
113 if (n == 0)
114 return -1;
115 for (i = 1; i; i <<= 1) {
116 if (i & n) {
117 sa = (struct sockaddr *)cp;
118 switch (i) {
119 case RTA_IFA:
120 case RTA_DST:
121 case RTA_GATEWAY:
122 case RTA_NETMASK:
123 if (sa->sa_family == AF_INET)
124 return AF_INET;
125 if (sa->sa_family == AF_INET6)
126 return AF_INET6;
127 break;
128 case RTA_IFP:
129 break;
130 }
4ff4d99f 131 RT_ADVANCE(cp, sa);
846204b6
HT
132 }
133 }
134 return (-1);
135}
136
137struct sockaddr *
138get_ifa(char *cp, int n)
139{
140 struct sockaddr *sa;
141 int i;
142
143 if (n == 0)
144 return (NULL);
145 for (i = 1; i; i <<= 1)
146 if (i & n) {
147 sa = (struct sockaddr *)cp;
148 if (i == RTA_IFA)
149 return (sa);
4ff4d99f 150 RT_ADVANCE(cp, sa);
846204b6
HT
151 }
152
153 return (NULL);
154}
be18cf74 155struct iaddr defaddr = { .len = 4 }; /* NULL is for silence warnings */
846204b6 156
846204b6
HT
157void
158routehandler(void)
159{
160 int linkstat;
161 char msg[2048];
162 struct rt_msghdr *rtm;
163 struct if_msghdr *ifm;
164 struct ifa_msghdr *ifam;
165 struct if_announcemsghdr *ifan;
166 struct client_lease *l;
846204b6
HT
167 struct sockaddr *sa;
168 struct iaddr a;
169 ssize_t n;
44967127 170 char *errmsg, buf[64];
846204b6
HT
171
172 do {
173 n = read(routefd, &msg, sizeof(msg));
174 } while (n == -1 && errno == EINTR);
175
176 rtm = (struct rt_msghdr *)msg;
177 if (n < sizeof(rtm->rtm_msglen) || n < rtm->rtm_msglen ||
178 rtm->rtm_version != RTM_VERSION)
179 return;
180
181 switch (rtm->rtm_type) {
182 case RTM_NEWADDR:
183 ifam = (struct ifa_msghdr *)rtm;
184 if (ifam->ifam_index != ifi->index)
185 break;
186 if (findproto((char *)(ifam + 1), ifam->ifam_addrs) != AF_INET)
187 break;
188 sa = get_ifa((char *)(ifam + 1), ifam->ifam_addrs);
44967127
AHJ
189 if (sa == NULL) {
190 errmsg = "sa == NULL";
846204b6 191 goto die;
44967127 192 }
846204b6
HT
193
194 if ((a.len = sizeof(struct in_addr)) > sizeof(a.iabuf))
195 error("king bula sez: len mismatch");
196 memcpy(a.iabuf, &((struct sockaddr_in *)sa)->sin_addr, a.len);
197 if (addr_eq(a, defaddr))
198 break;
199
6954ee78
AHJ
200 /* state_panic() can try unexpired existing leases */
201 if (client->active && addr_eq(a, client->active->address))
202 break;
203 for (l = client->leases; l != NULL; l = l->next)
846204b6
HT
204 if (addr_eq(a, l->address))
205 break;
206
7cbe3601 207 if (l != NULL)
846204b6
HT
208 /* new addr is the one we set */
209 break;
44967127
AHJ
210 snprintf(buf, sizeof(buf), "%s: %s",
211 "new address not one we set", piaddr(a));
212 errmsg = buf;
846204b6
HT
213 goto die;
214 case RTM_DELADDR:
215 ifam = (struct ifa_msghdr *)rtm;
216 if (ifam->ifam_index != ifi->index)
217 break;
218 if (findproto((char *)(ifam + 1), ifam->ifam_addrs) != AF_INET)
219 break;
6954ee78 220 /* XXX check addrs like RTM_NEWADDR instead of this? */
3c279f6e 221 if (scripttime == 0 || time(NULL) < scripttime + 10)
846204b6 222 break;
44967127 223 errmsg = "interface address deleted";
846204b6
HT
224 goto die;
225 case RTM_IFINFO:
226 ifm = (struct if_msghdr *)rtm;
227 if (ifm->ifm_index != ifi->index)
228 break;
44967127
AHJ
229 if ((rtm->rtm_flags & RTF_UP) == 0) {
230 errmsg = "interface down";
846204b6 231 goto die;
44967127 232 }
846204b6
HT
233
234 linkstat =
235 LINK_STATE_IS_UP(ifm->ifm_data.ifi_link_state) ? 1 : 0;
236 if (linkstat != ifi->linkstat) {
4cada237 237#ifdef DEBUG
846204b6
HT
238 debug("link state %s -> %s",
239 ifi->linkstat ? "up" : "down",
240 linkstat ? "up" : "down");
4cada237 241#endif
80d26e48 242 ifi->linkstat = interface_status(ifi->name);
846204b6 243 if (ifi->linkstat) {
2cfe4a05 244 client->state = S_REBOOTING;
846204b6
HT
245 state_reboot();
246 }
247 }
248 break;
249 case RTM_IFANNOUNCE:
250 ifan = (struct if_announcemsghdr *)rtm;
251 if (ifan->ifan_what == IFAN_DEPARTURE &&
44967127
AHJ
252 ifan->ifan_index == ifi->index) {
253 errmsg = "interface departure";
846204b6 254 goto die;
44967127 255 }
846204b6
HT
256 break;
257 default:
258 break;
259 }
260 return;
261
262die:
7cbe3601 263 script_init("FAIL");
846204b6 264 script_go();
44967127 265 error("routehandler: %s", errmsg);
846204b6
HT
266}
267
268int
269main(int argc, char *argv[])
270{
0f5f50b1
MD
271 int ch, fd;
272 int pipe_fd[2];
273 int quiet = 0;
274 int dokillclient = 0;
275 int i;
846204b6
HT
276 struct passwd *pw;
277
278 /* Initially, log errors to stderr as well as to syslogd. */
279 openlog(getprogname(), LOG_PID | LOG_NDELAY, DHCPD_LOG_FACILITY);
280 setlogmask(LOG_UPTO(LOG_INFO));
281
0f5f50b1
MD
282 signal(SIGINT, sig_handle);
283 signal(SIGHUP, sig_handle);
284
285 while ((ch = getopt(argc, argv, "c:dl:quwx")) != -1) {
846204b6
HT
286 switch (ch) {
287 case 'c':
288 path_dhclient_conf = optarg;
289 break;
290 case 'd':
291 no_daemon = 1;
292 break;
293 case 'l':
294 path_dhclient_db = optarg;
295 break;
296 case 'q':
297 quiet = 1;
298 break;
299 case 'u':
300 unknown_ok = 0;
301 break;
0f5f50b1
MD
302 case 'w':
303 stayalive = 1;
304 break;
305 case 'x':
306 dokillclient = 1;
307 break;
846204b6
HT
308 default:
309 usage();
310 }
0f5f50b1 311 }
846204b6
HT
312
313 argc -= optind;
314 argv += optind;
315
316 if (argc != 1)
317 usage();
0f5f50b1
MD
318 orig_ifname = argv[0];
319
320 if (dokillclient) {
321 char buf[256];
322
323 snprintf(buf, sizeof(buf),
324 "/var/run/dhclient.%s.pid", orig_ifname);
325 fd = open(buf, O_RDWR, 0644);
326 if (fd < 0 || killclient(fd)) {
327 fprintf(stderr,
328 "no dhclient running on %s\n",
329 orig_ifname);
330 } else {
331 fprintf(stderr,
332 "stopping dhclient on %s\n",
333 orig_ifname);
334 }
335 if (fd >= 0)
336 close(fd);
337 exit(1);
338 }
339
340 if ((nullfd = open(_PATH_DEVNULL, O_RDWR, 0)) == -1)
341 error("cannot open %s: %m", _PATH_DEVNULL);
342
343 /*
344 * If asked to stay alive forever get our daemon going right now
345 * Then set up to fork/monitor and refork on exit.
346 *
347 * When I say 'forever' I really mean it. If there are configuration
348 * problems or missing interfaces or whatever, dhclient will wait
349 * 10 seconds and try again.
350 */
351 if (stayalive) {
352 pid_t pid;
353 pid_t rpid;
354 int omask;
355
356 go_daemon();
357
358 for (;;) {
359 omask = sigblock(sigmask(SIGINT) | sigmask(SIGHUP));
360 pid = fork();
361 if (pid > 0)
362 monitor_pid = pid;
363 sigsetmask(omask);
364
365 if (pid == 0) /* child falls out of loop */
366 break;
367 while (pid > 0) {
368 rpid = waitpid(pid, NULL, 0);
369 if (rpid == pid)
370 break;
371 if (rpid != EINTR)
372 break;
373 }
374 sleep(10);
375 }
376 }
846204b6
HT
377
378 ifi = calloc(1, sizeof(*ifi));
379 if (ifi == NULL)
380 error("ifi calloc");
381 client = calloc(1, sizeof(*client));
382 if (client == NULL)
383 error("client calloc");
384 config = calloc(1, sizeof(*config));
385 if (config == NULL)
386 error("config calloc");
387
d63fb838 388 get_ifname(ifi->name, argv[0]);
0f5f50b1 389
846204b6
HT
390 if (path_dhclient_db == NULL && asprintf(&path_dhclient_db, "%s.%s",
391 _PATH_DHCLIENT_DB, ifi->name) == -1)
392 error("asprintf");
393
394 if (quiet)
395 log_perror = 0;
396
397 tzset();
846204b6
HT
398
399 memset(&sockaddr_broadcast, 0, sizeof(sockaddr_broadcast));
400 sockaddr_broadcast.sin_family = AF_INET;
401 sockaddr_broadcast.sin_port = htons(REMOTE_PORT);
402 sockaddr_broadcast.sin_addr.s_addr = INADDR_BROADCAST;
403 sockaddr_broadcast.sin_len = sizeof(sockaddr_broadcast);
404 inaddr_any.s_addr = INADDR_ANY;
405
406 read_client_conf();
407
408 if (interface_status(ifi->name) == 0) {
852231a5 409 interface_link_forceup(ifi->name);
846204b6
HT
410 /* Give it up to 4 seconds of silent grace to find link */
411 i = -4;
0f5f50b1 412 } else {
846204b6 413 i = 0;
0f5f50b1 414 }
846204b6 415
80d26e48 416 while (!(ifi->linkstat = interface_status(ifi->name))) {
846204b6
HT
417 if (i == 0)
418 fprintf(stderr, "%s: no link ...", ifi->name);
419 else if (i > 0)
420 fprintf(stderr, ".");
421 fflush(stderr);
422 if (++i > config->link_timeout) {
423 fprintf(stderr, " sleeping\n");
424 goto dispatch;
425 }
426 sleep(1);
846204b6 427 }
ade429c6 428 if (i > 0)
77a69a5f 429 fprintf(stderr, " got link\n");
846204b6
HT
430
431 dispatch:
38623c79
AHJ
432 if ((pw = getpwnam("_dhcp")) == NULL)
433 error("no such user: _dhcp");
846204b6
HT
434
435 if (pipe(pipe_fd) == -1)
436 error("pipe");
437
0f5f50b1 438 go_daemon();
846204b6
HT
439 fork_privchld(pipe_fd[0], pipe_fd[1]);
440
441 close(pipe_fd[0]);
442 privfd = pipe_fd[1];
443
444 if ((fd = open(path_dhclient_db, O_RDONLY|O_EXLOCK|O_CREAT, 0)) == -1)
445 error("can't open and lock %s: %m", path_dhclient_db);
446 read_client_leases();
447 if ((leaseFile = fopen(path_dhclient_db, "w")) == NULL)
448 error("can't open %s: %m", path_dhclient_db);
449 rewrite_client_leases();
450 close(fd);
451
846204b6
HT
452 if ((routefd = socket(PF_ROUTE, SOCK_RAW, 0)) == -1)
453 error("socket(PF_ROUTE, SOCK_RAW): %m");
454
455 /* set up the interface */
456 discover_interface();
457
458 if (chroot(_PATH_VAREMPTY) == -1)
459 error("chroot");
460 if (chdir("/") == -1)
461 error("chdir(\"/\")");
462
463 if (setresgid(pw->pw_gid, pw->pw_gid, pw->pw_gid) == -1)
464 error("setresgid");
465 if (setgroups(1, &pw->pw_gid) == -1)
466 error("setgroups");
467 if (setresuid(pw->pw_uid, pw->pw_uid, pw->pw_uid) == -1)
468 error("setresuid");
469
470 endpwent();
471
472 setproctitle("%s", ifi->name);
473
474 if (ifi->linkstat) {
2cfe4a05 475 client->state = S_REBOOTING;
846204b6 476 state_reboot();
0f5f50b1 477 }
846204b6
HT
478 dispatch();
479
480 /* not reached */
481 return (0);
482}
483
484void
485usage(void)
486{
487 fprintf(stderr, "usage: %s [-dqu] [-c file] [-l file] interface\n",
488 getprogname());
489 exit(1);
490}
491
492/*
493 * Individual States:
494 *
495 * Each routine is called from the dhclient_state_machine() in one of
496 * these conditions:
497 * -> entering INIT state
498 * -> recvpacket_flag == 0: timeout in this state
499 * -> otherwise: received a packet in this state
500 *
501 * Return conditions as handled by dhclient_state_machine():
502 * Returns 1, sendpacket_flag = 1: send packet, reset timer.
503 * Returns 1, sendpacket_flag = 0: just reset the timer (wait for a milestone).
504 * Returns 0: finish the nap which was interrupted for no good reason.
505 *
506 * Several per-interface variables are used to keep track of the process:
507 * active_lease: the lease that is being used on the interface
508 * (null pointer if not configured yet).
509 * offered_leases: leases corresponding to DHCPOFFER messages that have
510 * been sent to us by DHCP servers.
511 * acked_leases: leases corresponding to DHCPACK messages that have been
512 * sent to us by DHCP servers.
513 * sendpacket: DHCP packet we're trying to send.
514 * destination: IP address to send sendpacket to
515 * In addition, there are several relevant per-lease variables.
516 * T1_expiry, T2_expiry, lease_expiry: lease milestones
517 * In the active lease, these control the process of renewing the lease;
518 * In leases on the acked_leases list, this simply determines when we
519 * can no longer legitimately use the lease.
520 */
521void
522state_reboot(void)
523{
86cc4af6
AHJ
524 /* Cancel all timeouts, since a link state change gets us here
525 and can happen anytime. */
8d05e1a0 526 cancel_timeout();
86cc4af6 527
846204b6
HT
528 /* If we don't remember an active lease, go straight to INIT. */
529 if (!client->active || client->active->is_bootp) {
2cfe4a05 530 client->state = S_INIT;
846204b6
HT
531 state_init();
532 return;
533 }
534
846204b6
HT
535 /* make_request doesn't initialize xid because it normally comes
536 from the DHCPDISCOVER, but we haven't sent a DHCPDISCOVER,
537 so pick an xid now. */
538 client->xid = arc4random();
539
540 /* Make a DHCPREQUEST packet, and set appropriate per-interface
541 flags. */
542 make_request(client->active);
543 client->destination = iaddr_broadcast;
3c279f6e 544 client->first_sending = time(NULL);
601f8f90 545 client->interval = 0;
846204b6 546
846204b6
HT
547 send_request();
548}
549
550/*
551 * Called when a lease has completely expired and we've
552 * been unable to renew it.
553 */
554void
555state_init(void)
556{
557 /* Make a DHCPDISCOVER packet, and set appropriate per-interface
558 flags. */
559 make_discover(client->active);
560 client->xid = client->packet.xid;
561 client->destination = iaddr_broadcast;
562 client->state = S_SELECTING;
3c279f6e 563 client->first_sending = time(NULL);
601f8f90 564 client->interval = 0;
846204b6 565
846204b6
HT
566 send_discover();
567}
568
569/*
570 * state_selecting is called when one or more DHCPOFFER packets
571 * have been received and a configurable period of time has passed.
572 */
573void
574state_selecting(void)
575{
576 struct client_lease *lp, *next, *picked;
3c279f6e 577 time_t cur_time;
846204b6
HT
578
579 /* Cancel state_selecting and send_discover timeouts, since either
580 one could have got us here. */
8d05e1a0 581 cancel_timeout();
846204b6
HT
582
583 /* We have received one or more DHCPOFFER packets. Currently,
584 the only criterion by which we judge leases is whether or
585 not we get a response when we arp for them. */
586 picked = NULL;
587 for (lp = client->offered_leases; lp; lp = next) {
588 next = lp->next;
589
846204b6 590 if (!picked) {
846204b6 591 picked = lp;
846204b6 592 } else {
7cbe3601
AHJ
593 make_decline(lp);
594 send_decline();
846204b6
HT
595 free_client_lease(lp);
596 }
597 }
598 client->offered_leases = NULL;
599
600 /* If we just tossed all the leases we were offered, go back
601 to square one. */
602 if (!picked) {
603 client->state = S_INIT;
604 state_init();
605 return;
606 }
7cbe3601 607 picked->next = NULL;
846204b6 608
3c279f6e
AHJ
609 time(&cur_time);
610
846204b6
HT
611 /* If it was a BOOTREPLY, we can just take the address right now. */
612 if (!picked->options[DHO_DHCP_MESSAGE_TYPE].len) {
613 client->new = picked;
614
615 /* Make up some lease expiry times
616 XXX these should be configurable. */
617 client->new->expiry = cur_time + 12000;
618 client->new->renewal += cur_time + 8000;
619 client->new->rebind += cur_time + 10000;
620
621 client->state = S_REQUESTING;
622
623 /* Bind to the address we received. */
624 bind_lease();
625 return;
626 }
627
628 /* Go to the REQUESTING state. */
629 client->destination = iaddr_broadcast;
630 client->state = S_REQUESTING;
631 client->first_sending = cur_time;
601f8f90 632 client->interval = 0;
846204b6
HT
633
634 /* Make a DHCPREQUEST packet from the lease we picked. */
635 make_request(picked);
636 client->xid = client->packet.xid;
637
638 /* Toss the lease we picked - we'll get it back in a DHCPACK. */
639 free_client_lease(picked);
640
846204b6
HT
641 send_request();
642}
643
644void
645dhcpack(struct iaddr client_addr, struct option_data *options)
646{
647 struct client_lease *lease;
3c279f6e 648 time_t cur_time;
846204b6 649
846204b6
HT
650
651 if (client->state != S_REBOOTING &&
652 client->state != S_REQUESTING &&
653 client->state != S_RENEWING &&
654 client->state != S_REBINDING)
655 return;
656
846204b6
HT
657
658 lease = packet_to_lease(options);
659 if (!lease) {
660 note("packet_to_lease failed.");
661 return;
662 }
663
664 client->new = lease;
665
666 /* Stop resending DHCPREQUEST. */
8d05e1a0 667 cancel_timeout();
846204b6
HT
668
669 /* Figure out the lease time. */
670 if (client->new->options[DHO_DHCP_LEASE_TIME].data)
671 client->new->expiry =
672 getULong(client->new->options[DHO_DHCP_LEASE_TIME].data);
673 else
674 client->new->expiry = DEFAULT_LEASE_TIME;
675 /* A number that looks negative here is really just very large,
676 because the lease expiry offset is unsigned. */
677 if (client->new->expiry < 0)
678 client->new->expiry = TIME_MAX;
679 /* XXX should be fixed by resetting the client state */
680 if (client->new->expiry < 60)
681 client->new->expiry = 60;
682
683 /* Take the server-provided renewal time if there is one;
684 otherwise figure it out according to the spec. */
685 if (client->new->options[DHO_DHCP_RENEWAL_TIME].len)
686 client->new->renewal =
687 getULong(client->new->options[DHO_DHCP_RENEWAL_TIME].data);
688 else
689 client->new->renewal = client->new->expiry / 2;
690
691 /* Same deal with the rebind time. */
692 if (client->new->options[DHO_DHCP_REBINDING_TIME].len)
693 client->new->rebind =
694 getULong(client->new->options[DHO_DHCP_REBINDING_TIME].data);
695 else
696 client->new->rebind = client->new->renewal +
697 client->new->renewal / 2 + client->new->renewal / 4;
698
3c279f6e
AHJ
699 time(&cur_time);
700
846204b6
HT
701 client->new->expiry += cur_time;
702 /* Lease lengths can never be negative. */
703 if (client->new->expiry < cur_time)
704 client->new->expiry = TIME_MAX;
705 client->new->renewal += cur_time;
706 if (client->new->renewal < cur_time)
707 client->new->renewal = TIME_MAX;
708 client->new->rebind += cur_time;
709 if (client->new->rebind < cur_time)
710 client->new->rebind = TIME_MAX;
711
712 bind_lease();
713}
714
715void
716bind_lease(void)
717{
846204b6
HT
718 /* Run the client script with the new parameters. */
719 script_init((client->state == S_REQUESTING ? "BOUND" :
720 (client->state == S_RENEWING ? "RENEW" :
7cbe3601 721 (client->state == S_REBOOTING ? "REBOOT" : "REBIND"))));
846204b6
HT
722 if (client->active && client->state != S_REBOOTING)
723 script_write_params("old_", client->active);
724 script_write_params("new_", client->new);
846204b6
HT
725 script_go();
726
727 /* Replace the old active lease with the new one. */
728 if (client->active)
729 free_client_lease(client->active);
730 client->active = client->new;
731 client->new = NULL;
732
cc08537d
AHJ
733 /* Write out new leases file. */
734 rewrite_client_leases();
735
8d05e1a0
AHJ
736 /* Set timeout to start the renewal process. */
737 set_timeout(client->active->renewal, state_bound);
846204b6 738
3cc420ba 739 note("bound to %s -- renewal in %lld seconds.",
846204b6 740 piaddr(client->active->address),
3c279f6e 741 (long long)(client->active->renewal - time(NULL)));
846204b6 742 client->state = S_BOUND;
846204b6
HT
743}
744
745/*
746 * state_bound is called when we've successfully bound to a particular
747 * lease, but the renewal time on that lease has expired. We are
748 * expected to unicast a DHCPREQUEST to the server that gave us our
749 * original lease.
750 */
751void
752state_bound(void)
753{
754 /* T1 has expired. */
755 make_request(client->active);
756 client->xid = client->packet.xid;
757
758 if (client->active->options[DHO_DHCP_SERVER_IDENTIFIER].len == 4) {
759 memcpy(client->destination.iabuf,
760 client->active->options[DHO_DHCP_SERVER_IDENTIFIER].data,
761 4);
762 client->destination.len = 4;
763 } else
764 client->destination = iaddr_broadcast;
765
3c279f6e 766 client->first_sending = time(NULL);
601f8f90 767 client->interval = 0;
846204b6
HT
768 client->state = S_RENEWING;
769
846204b6
HT
770 send_request();
771}
772
773void
774dhcpoffer(struct iaddr client_addr, struct option_data *options)
775{
776 struct client_lease *lease, *lp;
777 int i;
423b4b33 778 time_t stop_selecting;
846204b6
HT
779 char *name = options[DHO_DHCP_MESSAGE_TYPE].len ? "DHCPOFFER" :
780 "BOOTREPLY";
781
846204b6
HT
782
783 if (client->state != S_SELECTING)
784 return;
785
846204b6
HT
786
787 /* If this lease doesn't supply the minimum required parameters,
788 blow it off. */
789 for (i = 0; config->required_options[i]; i++) {
790 if (!options[config->required_options[i]].len) {
791 note("%s isn't satisfactory.", name);
792 return;
793 }
794 }
795
796 /* If we've already seen this lease, don't record it again. */
797 for (lease = client->offered_leases;
798 lease; lease = lease->next) {
799 if (lease->address.len == sizeof(client->packet.yiaddr) &&
800 !memcmp(lease->address.iabuf,
801 &client->packet.yiaddr, lease->address.len)) {
4cada237 802#ifdef DEBUG
846204b6 803 debug("%s already seen.", name);
4cada237 804#endif
846204b6
HT
805 return;
806 }
807 }
808
809 lease = packet_to_lease(options);
810 if (!lease) {
811 note("packet_to_lease failed.");
812 return;
813 }
814
107428a4
AHJ
815 /*
816 * Reject offers whose subnet is already configured on another
817 * interface.
818 */
819 if (subnet_exists(lease))
820 return;
821
846204b6
HT
822 /* If this lease was acquired through a BOOTREPLY, record that
823 fact. */
824 if (!options[DHO_DHCP_MESSAGE_TYPE].len)
825 lease->is_bootp = 1;
826
846204b6
HT
827 /* Figure out when we're supposed to stop selecting. */
828 stop_selecting = client->first_sending + config->select_interval;
829
830 /* If this is the lease we asked for, put it at the head of the
831 list, and don't mess with the arp request timeout. */
c3b31e60 832 if (addr_eq(lease->address, client->requested_address)) {
846204b6
HT
833 lease->next = client->offered_leases;
834 client->offered_leases = lease;
835 } else {
846204b6
HT
836 /* Put the lease at the end of the list. */
837 lease->next = NULL;
838 if (!client->offered_leases)
839 client->offered_leases = lease;
840 else {
841 for (lp = client->offered_leases; lp->next;
842 lp = lp->next)
843 ; /* nothing */
844 lp->next = lease;
845 }
846 }
847
846204b6
HT
848 /* If the selecting interval has expired, go immediately to
849 state_selecting(). Otherwise, time out into
850 state_selecting at the select interval. */
3c279f6e 851 if (stop_selecting <= time(NULL))
846204b6
HT
852 state_selecting();
853 else {
8d05e1a0 854 set_timeout(stop_selecting, state_selecting);
846204b6
HT
855 }
856}
857
858/*
859 * Allocate a client_lease structure and initialize it from the
860 * parameters in the specified packet.
861 */
862struct client_lease *
863packet_to_lease(struct option_data *options)
864{
865 struct client_lease *lease;
866 int i;
867
868 lease = malloc(sizeof(struct client_lease));
869
870 if (!lease) {
871 warning("dhcpoffer: no memory to record lease.");
872 return (NULL);
873 }
874
875 memset(lease, 0, sizeof(*lease));
876
877 /* Copy the lease options. */
878 for (i = 0; i < 256; i++) {
879 if (options[i].len) {
880 lease->options[i] = options[i];
881 options[i].data = NULL;
882 options[i].len = 0;
883 if (!check_option(lease, i)) {
884 warning("Invalid lease option - ignoring offer");
885 free_client_lease(lease);
886 return (NULL);
887 }
888 }
889 }
890
891 lease->address.len = sizeof(client->packet.yiaddr);
892 memcpy(lease->address.iabuf, &client->packet.yiaddr,
893 lease->address.len);
894
895 /* If the server name was filled out, copy it. */
896 if ((!lease->options[DHO_DHCP_OPTION_OVERLOAD].len ||
897 !(lease->options[DHO_DHCP_OPTION_OVERLOAD].data[0] & 2)) &&
898 client->packet.sname[0]) {
899 lease->server_name = malloc(DHCP_SNAME_LEN + 1);
900 if (!lease->server_name) {
901 warning("dhcpoffer: no memory for server name.");
902 free_client_lease(lease);
903 return (NULL);
904 }
905 memcpy(lease->server_name, client->packet.sname,
906 DHCP_SNAME_LEN);
907 lease->server_name[DHCP_SNAME_LEN] = '\0';
908 if (!res_hnok(lease->server_name)) {
909 warning("Bogus server name %s", lease->server_name);
910 free(lease->server_name);
911 lease->server_name = NULL;
912 }
913 }
914
915 /* Ditto for the filename. */
916 if ((!lease->options[DHO_DHCP_OPTION_OVERLOAD].len ||
917 !(lease->options[DHO_DHCP_OPTION_OVERLOAD].data[0] & 1)) &&
918 client->packet.file[0]) {
919 /* Don't count on the NUL terminator. */
920 lease->filename = malloc(DHCP_FILE_LEN + 1);
921 if (!lease->filename) {
922 warning("dhcpoffer: no memory for filename.");
923 free_client_lease(lease);
924 return (NULL);
925 }
926 memcpy(lease->filename, client->packet.file, DHCP_FILE_LEN);
927 lease->filename[DHCP_FILE_LEN] = '\0';
928 }
929 return lease;
930}
931
932void
933dhcpnak(struct iaddr client_addr, struct option_data *options)
934{
846204b6
HT
935
936 if (client->state != S_REBOOTING &&
937 client->state != S_REQUESTING &&
938 client->state != S_RENEWING &&
939 client->state != S_REBINDING)
940 return;
941
846204b6
HT
942
943 if (!client->active) {
944 note("DHCPNAK with no active lease.");
945 return;
946 }
947
948 free_client_lease(client->active);
949 client->active = NULL;
950
951 /* Stop sending DHCPREQUEST packets... */
8d05e1a0 952 cancel_timeout();
846204b6
HT
953
954 client->state = S_INIT;
955 state_init();
956}
957
958/*
959 * Send out a DHCPDISCOVER packet, and set a timeout to send out another
960 * one after the right interval has expired. If we don't get an offer by
961 * the time we reach the panic interval, call the panic function.
962 */
963void
964send_discover(void)
965{
3c279f6e 966 time_t cur_time;
846204b6
HT
967 int interval, increase = 1;
968
3c279f6e
AHJ
969 time(&cur_time);
970
846204b6
HT
971 /* Figure out how long it's been since we started transmitting. */
972 interval = cur_time - client->first_sending;
973
974 /* If we're past the panic timeout, call the script and tell it
975 we haven't found anything for this interface yet. */
976 if (interval > config->timeout) {
977 state_panic();
978 return;
979 }
980
846204b6
HT
981 /*
982 * If we're supposed to increase the interval, do so. If it's
983 * currently zero (i.e., we haven't sent any packets yet), set
984 * it to initial_interval; otherwise, add to it a random
985 * number between zero and two times itself. On average, this
986 * means that it will double with every transmission.
987 */
988 if (increase) {
989 if (!client->interval)
990 client->interval = config->initial_interval;
991 else {
992 client->interval += (arc4random() >> 2) %
993 (2 * client->interval);
994 }
995
996 /* Don't backoff past cutoff. */
997 if (client->interval > config->backoff_cutoff)
998 client->interval = ((config->backoff_cutoff / 2)
999 + ((arc4random() >> 2) %
1000 config->backoff_cutoff));
1001 } else if (!client->interval)
1002 client->interval = config->initial_interval;
1003
1004 /* If the backoff would take us to the panic timeout, just use that
1005 as the interval. */
1006 if (cur_time + client->interval >
1007 client->first_sending + config->timeout)
1008 client->interval = (client->first_sending +
1009 config->timeout) - cur_time + 1;
1010
1011 /* Record the number of seconds since we started sending. */
1012 if (interval < 65536)
1013 client->packet.secs = htons(interval);
1014 else
1015 client->packet.secs = htons(65535);
1016 client->secs = client->packet.secs;
1017
1018 note("DHCPDISCOVER on %s to %s port %d interval %ld",
1019 ifi->name, inet_ntoa(sockaddr_broadcast.sin_addr),
1020 ntohs(sockaddr_broadcast.sin_port), client->interval);
1021
846204b6
HT
1022 send_packet(inaddr_any, &sockaddr_broadcast, NULL);
1023
3c279f6e 1024 set_timeout_interval(client->interval, send_discover);
846204b6
HT
1025}
1026
1027/*
1028 * state_panic gets called if we haven't received any offers in a preset
1029 * amount of time. When this happens, we try to use existing leases
1030 * that haven't yet expired, and failing that, we call the client script
1031 * and hope it can do something.
1032 */
1033void
1034state_panic(void)
1035{
1036 struct client_lease *loop = client->active;
1037 struct client_lease *lp;
3c279f6e 1038 time_t cur_time;
846204b6
HT
1039
1040 note("No DHCPOFFERS received.");
1041
1042 /* We may not have an active lease, but we may have some
1043 predefined leases that we can try. */
1044 if (!client->active && client->leases)
1045 goto activate_next;
1046
1047 /* Run through the list of leases and see if one can be used. */
3c279f6e 1048 time(&cur_time);
846204b6
HT
1049 while (client->active) {
1050 if (client->active->expiry > cur_time) {
1051 note("Trying recorded lease %s",
1052 piaddr(client->active->address));
1053 /* Run the client script with the existing
1054 parameters. */
7cbe3601 1055 script_init("TIMEOUT");
846204b6 1056 script_write_params("new_", client->active);
846204b6
HT
1057
1058 /* If the old lease is still good and doesn't
1059 yet need renewal, go into BOUND state and
1060 timeout at the renewal time. */
1061 if (!script_go()) {
3c279f6e 1062 if (cur_time < client->active->renewal) {
846204b6 1063 client->state = S_BOUND;
3cc420ba
AHJ
1064 note("bound: renewal in %lld seconds.",
1065 (long long)(client->active->renewal
1066 - cur_time));
8d05e1a0 1067 set_timeout(client->active->renewal,
846204b6
HT
1068 state_bound);
1069 } else {
1070 client->state = S_BOUND;
1071 note("bound: immediate renewal.");
1072 state_bound();
1073 }
846204b6
HT
1074 return;
1075 }
1076 }
1077
1078 /* If there are no other leases, give up. */
1079 if (!client->leases) {
1080 client->leases = client->active;
1081 client->active = NULL;
1082 break;
1083 }
1084
1085activate_next:
1086 /* Otherwise, put the active lease at the end of the
1087 lease list, and try another lease.. */
1088 for (lp = client->leases; lp->next; lp = lp->next)
1089 ;
1090 lp->next = client->active;
1091 if (lp->next)
1092 lp->next->next = NULL;
1093 client->active = client->leases;
1094 client->leases = client->leases->next;
1095
1096 /* If we already tried this lease, we've exhausted the
1097 set of leases, so we might as well give up for
1098 now. */
1099 if (client->active == loop)
1100 break;
1101 else if (!loop)
1102 loop = client->active;
1103 }
1104
1105 /* No leases were available, or what was available didn't work, so
1106 tell the shell script that we failed to allocate an address,
1107 and try again later. */
1108 note("No working leases in persistent database - sleeping.");
7cbe3601 1109 script_init("FAIL");
846204b6
HT
1110 script_go();
1111 client->state = S_INIT;
3c279f6e 1112 set_timeout_interval(config->retry_interval, state_init);
846204b6
HT
1113}
1114
1115void
1116send_request(void)
1117{
1118 struct sockaddr_in destination;
1119 struct in_addr from;
3c279f6e 1120 time_t cur_time;
846204b6
HT
1121 int interval;
1122
3c279f6e
AHJ
1123 time(&cur_time);
1124
846204b6 1125 /* Figure out how long it's been since we started transmitting. */
3c279f6e 1126 interval = (int)(cur_time - client->first_sending);
846204b6
HT
1127
1128 /* If we're in the INIT-REBOOT or REQUESTING state and we're
1129 past the reboot timeout, go to INIT and see if we can
1130 DISCOVER an address... */
1131 /* XXX In the INIT-REBOOT state, if we don't get an ACK, it
1132 means either that we're on a network with no DHCP server,
1133 or that our server is down. In the latter case, assuming
1134 that there is a backup DHCP server, DHCPDISCOVER will get
1135 us a new address, but we could also have successfully
1136 reused our old address. In the former case, we're hosed
1137 anyway. This is not a win-prone situation. */
1138 if ((client->state == S_REBOOTING ||
1139 client->state == S_REQUESTING) &&
1140 interval > config->reboot_timeout) {
846204b6 1141 client->state = S_INIT;
8d05e1a0 1142 cancel_timeout();
846204b6
HT
1143 state_init();
1144 return;
1145 }
1146
846204b6
HT
1147 /* If the lease has expired, relinquish the address and go back
1148 to the INIT state. */
1149 if (client->state != S_REQUESTING &&
1150 cur_time > client->active->expiry) {
1151 /* Run the client script with the new parameters. */
7cbe3601 1152 script_init("EXPIRE");
846204b6 1153 script_write_params("old_", client->active);
846204b6
HT
1154 script_go();
1155
1156 client->state = S_INIT;
1157 state_init();
1158 return;
1159 }
1160
1161 /* Do the exponential backoff... */
1162 if (!client->interval)
1163 client->interval = config->initial_interval;
1164 else
1165 client->interval += ((arc4random() >> 2) %
1166 (2 * client->interval));
1167
1168 /* Don't backoff past cutoff. */
1169 if (client->interval > config->backoff_cutoff)
1170 client->interval = ((config->backoff_cutoff / 2) +
1171 ((arc4random() >> 2) % client->interval));
1172
1173 /* If the backoff would take us to the expiry time, just set the
1174 timeout to the expiry time. */
1175 if (client->state != S_REQUESTING && cur_time + client->interval >
1176 client->active->expiry)
1177 client->interval = client->active->expiry - cur_time + 1;
1178
1179 /* If the lease T2 time has elapsed, or if we're not yet bound,
1180 broadcast the DHCPREQUEST rather than unicasting. */
1181 memset(&destination, 0, sizeof(destination));
1182 if (client->state == S_REQUESTING ||
1183 client->state == S_REBOOTING ||
1184 cur_time > client->active->rebind)
1185 destination.sin_addr.s_addr = INADDR_BROADCAST;
1186 else
1187 memcpy(&destination.sin_addr.s_addr, client->destination.iabuf,
1188 sizeof(destination.sin_addr.s_addr));
1189 destination.sin_port = htons(REMOTE_PORT);
1190 destination.sin_family = AF_INET;
1191 destination.sin_len = sizeof(destination);
1192
1193 if (client->state != S_REQUESTING)
1194 memcpy(&from, client->active->address.iabuf, sizeof(from));
1195 else
1196 from.s_addr = INADDR_ANY;
1197
1198 /* Record the number of seconds since we started sending. */
1199 if (client->state == S_REQUESTING)
1200 client->packet.secs = client->secs;
1201 else {
1202 if (interval < 65536)
1203 client->packet.secs = htons(interval);
1204 else
1205 client->packet.secs = htons(65535);
1206 }
1207
1208 note("DHCPREQUEST on %s to %s port %d", ifi->name,
1209 inet_ntoa(destination.sin_addr), ntohs(destination.sin_port));
1210
846204b6
HT
1211 send_packet(from, &destination, NULL);
1212
3c279f6e 1213 set_timeout_interval(client->interval, send_request);
846204b6
HT
1214}
1215
1216void
1217send_decline(void)
1218{
1219 note("DHCPDECLINE on %s to %s port %d", ifi->name,
1220 inet_ntoa(sockaddr_broadcast.sin_addr),
1221 ntohs(sockaddr_broadcast.sin_port));
1222
846204b6
HT
1223 send_packet(inaddr_any, &sockaddr_broadcast, NULL);
1224}
1225
1226void
1227make_discover(struct client_lease *lease)
1228{
1229 unsigned char discover = DHCPDISCOVER;
1230 struct option_data options[256];
1231 int i;
1232
1233 memset(options, 0, sizeof(options));
1234 memset(&client->packet, 0, sizeof(client->packet));
1235
1236 /* Set DHCP_MESSAGE_TYPE to DHCPDISCOVER */
1237 i = DHO_DHCP_MESSAGE_TYPE;
1238 options[i].data = &discover;
1239 options[i].len = sizeof(discover);
1240
1241 /* Request the options we want */
1242 i = DHO_DHCP_PARAMETER_REQUEST_LIST;
1243 options[i].data = config->requested_options;
1244 options[i].len = config->requested_option_count;
1245
1246 /* If we had an address, try to get it again. */
1247 if (lease) {
1248 client->requested_address = lease->address;
1249 i = DHO_DHCP_REQUESTED_ADDRESS;
1250 options[i].data = lease->address.iabuf;
1251 options[i].len = lease->address.len;
1252 } else
1253 client->requested_address.len = 0;
1254
1255 /* Send any options requested in the config file. */
1256 for (i = 0; i < 256; i++)
1257 if (!options[i].data &&
1258 config->send_options[i].data) {
1259 options[i].data = config->send_options[i].data;
1260 options[i].len = config->send_options[i].len;
1261 }
1262
1263 /* Set up the option buffer to fit in a minimal UDP packet. */
741bbb9f 1264 i = cons_options(options);
846204b6
HT
1265 if (i == -1 || client->packet.options[i] != DHO_END)
1266 error("options do not fit in DHCPDISCOVER packet.");
1267 client->packet_length = DHCP_FIXED_NON_UDP+i+1;
1268 if (client->packet_length < BOOTP_MIN_LEN)
1269 client->packet_length = BOOTP_MIN_LEN;
1270
1271 client->packet.op = BOOTREQUEST;
1272 client->packet.htype = ifi->hw_address.htype;
1273 client->packet.hlen = ifi->hw_address.hlen;
1274 client->packet.hops = 0;
1275 client->packet.xid = arc4random();
1276 client->packet.secs = 0; /* filled in by send_discover. */
1277 client->packet.flags = 0;
1278
1279 memset(&client->packet.ciaddr, 0, sizeof(client->packet.ciaddr));
1280 memset(&client->packet.yiaddr, 0, sizeof(client->packet.yiaddr));
1281 memset(&client->packet.siaddr, 0, sizeof(client->packet.siaddr));
1282 memset(&client->packet.giaddr, 0, sizeof(client->packet.giaddr));
1283 memcpy(client->packet.chaddr, ifi->hw_address.haddr,
1284 ifi->hw_address.hlen);
1285}
1286
1287void
1288make_request(struct client_lease * lease)
1289{
1290 unsigned char request = DHCPREQUEST;
1291 struct option_data options[256];
1292 int i;
1293
1294 memset(options, 0, sizeof(options));
1295 memset(&client->packet, 0, sizeof(client->packet));
1296
1297 /* Set DHCP_MESSAGE_TYPE to DHCPREQUEST */
1298 i = DHO_DHCP_MESSAGE_TYPE;
1299 options[i].data = &request;
1300 options[i].len = sizeof(request);
1301
1302 /* Request the options we want */
1303 i = DHO_DHCP_PARAMETER_REQUEST_LIST;
1304 options[i].data = config->requested_options;
1305 options[i].len = config->requested_option_count;
1306
1307 /* If we are requesting an address that hasn't yet been assigned
1308 to us, use the DHCP Requested Address option. */
1309 if (client->state == S_REQUESTING) {
1310 /* Send back the server identifier... */
1311 i = DHO_DHCP_SERVER_IDENTIFIER;
1312 options[i].data = lease->options[i].data;
1313 options[i].len = lease->options[i].len;
1314 }
1315 if (client->state == S_REQUESTING ||
1316 client->state == S_REBOOTING) {
1317 client->requested_address = lease->address;
1318 i = DHO_DHCP_REQUESTED_ADDRESS;
1319 options[i].data = lease->address.iabuf;
1320 options[i].len = lease->address.len;
1321 } else
1322 client->requested_address.len = 0;
1323
1324 /* Send any options requested in the config file. */
1325 for (i = 0; i < 256; i++)
1326 if (!options[i].data && config->send_options[i].data) {
1327 options[i].data = config->send_options[i].data;
1328 options[i].len = config->send_options[i].len;
1329 }
1330
1331 /* Set up the option buffer to fit in a minimal UDP packet. */
741bbb9f 1332 i = cons_options(options);
846204b6
HT
1333 if (i == -1 || client->packet.options[i] != DHO_END)
1334 error("options do not fit in DHCPREQUEST packet.");
1335 client->packet_length = DHCP_FIXED_NON_UDP+i+1;
1336 if (client->packet_length < BOOTP_MIN_LEN)
1337 client->packet_length = BOOTP_MIN_LEN;
1338
1339 client->packet.op = BOOTREQUEST;
1340 client->packet.htype = ifi->hw_address.htype;
1341 client->packet.hlen = ifi->hw_address.hlen;
1342 client->packet.hops = 0;
1343 client->packet.xid = client->xid;
1344 client->packet.secs = 0; /* Filled in by send_request. */
1345 client->packet.flags = 0;
1346
1347 /* If we own the address we're requesting, put it in ciaddr;
1348 otherwise set ciaddr to zero. */
1349 if (client->state == S_BOUND ||
1350 client->state == S_RENEWING ||
1351 client->state == S_REBINDING) {
1352 memcpy(&client->packet.ciaddr,
1353 lease->address.iabuf, lease->address.len);
1354 } else {
1355 memset(&client->packet.ciaddr, 0,
1356 sizeof(client->packet.ciaddr));
1357 }
1358
1359 memset(&client->packet.yiaddr, 0, sizeof(client->packet.yiaddr));
1360 memset(&client->packet.siaddr, 0, sizeof(client->packet.siaddr));
1361 memset(&client->packet.giaddr, 0, sizeof(client->packet.giaddr));
1362 memcpy(client->packet.chaddr, ifi->hw_address.haddr,
1363 ifi->hw_address.hlen);
1364}
1365
1366void
1367make_decline(struct client_lease *lease)
1368{
1369 struct option_data options[256];
1370 unsigned char decline = DHCPDECLINE;
1371 int i;
1372
1373 memset(options, 0, sizeof(options));
1374 memset(&client->packet, 0, sizeof(client->packet));
1375
1376 /* Set DHCP_MESSAGE_TYPE to DHCPDECLINE */
1377 i = DHO_DHCP_MESSAGE_TYPE;
1378 options[i].data = &decline;
1379 options[i].len = sizeof(decline);
1380
1381 /* Send back the server identifier... */
1382 i = DHO_DHCP_SERVER_IDENTIFIER;
1383 options[i].data = lease->options[i].data;
1384 options[i].len = lease->options[i].len;
1385
1386 /* Send back the address we're declining. */
1387 i = DHO_DHCP_REQUESTED_ADDRESS;
1388 options[i].data = lease->address.iabuf;
1389 options[i].len = lease->address.len;
1390
1391 /* Send the uid if the user supplied one. */
1392 i = DHO_DHCP_CLIENT_IDENTIFIER;
1393 if (config->send_options[i].len) {
1394 options[i].data = config->send_options[i].data;
1395 options[i].len = config->send_options[i].len;
1396 }
1397
1398 /* Set up the option buffer to fit in a minimal UDP packet. */
741bbb9f 1399 i = cons_options(options);
846204b6
HT
1400 if (i == -1 || client->packet.options[i] != DHO_END)
1401 error("options do not fit in DHCPDECLINE packet.");
1402 client->packet_length = DHCP_FIXED_NON_UDP+i+1;
1403 if (client->packet_length < BOOTP_MIN_LEN)
1404 client->packet_length = BOOTP_MIN_LEN;
1405
1406 client->packet.op = BOOTREQUEST;
1407 client->packet.htype = ifi->hw_address.htype;
1408 client->packet.hlen = ifi->hw_address.hlen;
1409 client->packet.hops = 0;
1410 client->packet.xid = client->xid;
1411 client->packet.secs = 0; /* Filled in by send_request. */
1412 client->packet.flags = 0;
1413
1414 /* ciaddr must always be zero. */
1415 memset(&client->packet.ciaddr, 0, sizeof(client->packet.ciaddr));
1416 memset(&client->packet.yiaddr, 0, sizeof(client->packet.yiaddr));
1417 memset(&client->packet.siaddr, 0, sizeof(client->packet.siaddr));
1418 memset(&client->packet.giaddr, 0, sizeof(client->packet.giaddr));
1419 memcpy(client->packet.chaddr, ifi->hw_address.haddr,
1420 ifi->hw_address.hlen);
1421}
1422
1423void
1424free_client_lease(struct client_lease *lease)
1425{
1426 int i;
1427
1428 if (lease->server_name)
1429 free(lease->server_name);
1430 if (lease->filename)
1431 free(lease->filename);
1432 for (i = 0; i < 256; i++) {
1433 if (lease->options[i].len)
1434 free(lease->options[i].data);
1435 }
1436 free(lease);
1437}
1438
1439void
1440rewrite_client_leases(void)
1441{
1442 struct client_lease *lp;
1443
1444 if (!leaseFile) /* XXX */
1445 error("lease file not open");
1446
1447 fflush(leaseFile);
1448 rewind(leaseFile);
1449
cc08537d
AHJ
1450 for (lp = client->leases; lp; lp = lp->next) {
1451 if (client->active && addr_eq(lp->address,
1452 client->active->address))
1453 continue;
1454 write_client_lease(lp);
1455 }
1456
846204b6 1457 if (client->active)
cc08537d 1458 write_client_lease(client->active);
846204b6
HT
1459
1460 fflush(leaseFile);
1461 ftruncate(fileno(leaseFile), ftello(leaseFile));
1462 fsync(fileno(leaseFile));
1463}
1464
1465void
cc08537d 1466write_client_lease(struct client_lease *lease)
846204b6 1467{
846204b6
HT
1468 struct tm *t;
1469 int i;
1470
846204b6
HT
1471 /* If the lease came from the config file, we don't need to stash
1472 a copy in the lease database. */
1473 if (lease->is_static)
1474 return;
1475
1476 if (!leaseFile) /* XXX */
1477 error("lease file not open");
1478
1479 fprintf(leaseFile, "lease {\n");
1480 if (lease->is_bootp)
1481 fprintf(leaseFile, " bootp;\n");
1482 fprintf(leaseFile, " interface \"%s\";\n", ifi->name);
1483 fprintf(leaseFile, " fixed-address %s;\n", piaddr(lease->address));
1484 if (lease->filename)
1485 fprintf(leaseFile, " filename \"%s\";\n", lease->filename);
1486 if (lease->server_name)
1487 fprintf(leaseFile, " server-name \"%s\";\n",
1488 lease->server_name);
846204b6
HT
1489 for (i = 0; i < 256; i++)
1490 if (lease->options[i].len)
1491 fprintf(leaseFile, " option %s %s;\n",
1492 dhcp_options[i].name,
dafcba85 1493 pretty_print_option(i, &lease->options[i], 1));
846204b6
HT
1494
1495 t = gmtime(&lease->renewal);
1496 fprintf(leaseFile, " renew %d %d/%d/%d %02d:%02d:%02d;\n",
1497 t->tm_wday, t->tm_year + 1900, t->tm_mon + 1, t->tm_mday,
1498 t->tm_hour, t->tm_min, t->tm_sec);
1499 t = gmtime(&lease->rebind);
1500 fprintf(leaseFile, " rebind %d %d/%d/%d %02d:%02d:%02d;\n",
1501 t->tm_wday, t->tm_year + 1900, t->tm_mon + 1, t->tm_mday,
1502 t->tm_hour, t->tm_min, t->tm_sec);
1503 t = gmtime(&lease->expiry);
1504 fprintf(leaseFile, " expire %d %d/%d/%d %02d:%02d:%02d;\n",
1505 t->tm_wday, t->tm_year + 1900, t->tm_mon + 1, t->tm_mday,
1506 t->tm_hour, t->tm_min, t->tm_sec);
1507 fprintf(leaseFile, "}\n");
1508 fflush(leaseFile);
1509}
1510
1511void
7cbe3601 1512script_init(char *reason)
846204b6 1513{
7cbe3601 1514 size_t len;
846204b6
HT
1515 struct imsg_hdr hdr;
1516 struct buf *buf;
1517
846204b6 1518 hdr.code = IMSG_SCRIPT_INIT;
7cbe3601 1519 hdr.len = sizeof(struct imsg_hdr) + sizeof(size_t) + strlen(reason);
846204b6
HT
1520 buf = buf_open(hdr.len);
1521
1522 buf_add(buf, &hdr, sizeof(hdr));
846204b6
HT
1523 len = strlen(reason);
1524 buf_add(buf, &len, sizeof(len));
1525 buf_add(buf, reason, len);
1526
1527 buf_close(privfd, buf);
1528}
1529
1530void
7cbe3601 1531priv_script_init(char *reason)
846204b6
HT
1532{
1533 client->scriptEnvsize = 100;
1534 if (client->scriptEnv == NULL)
1535 client->scriptEnv =
1536 calloc(client->scriptEnvsize, sizeof(char *));
1537 if (client->scriptEnv == NULL)
1538 error("script_init: no memory for environment");
1539
1540 client->scriptEnv[0] = strdup(CLIENT_PATH);
1541 if (client->scriptEnv[0] == NULL)
1542 error("script_init: no memory for environment");
1543
1544 client->scriptEnv[1] = NULL;
1545
1546 script_set_env("", "interface", ifi->name);
1547
846204b6
HT
1548 script_set_env("", "reason", reason);
1549}
1550
1551void
1552priv_script_write_params(char *prefix, struct client_lease *lease)
1553{
dafcba85
AHJ
1554 char buf[256];
1555 struct option_data o;
1556 int i;
846204b6
HT
1557
1558 script_set_env(prefix, "ip_address", piaddr(lease->address));
1559
1560 if (lease->options[DHO_SUBNET_MASK].len &&
1561 (lease->options[DHO_SUBNET_MASK].len <
1562 sizeof(lease->address.iabuf))) {
1563 struct iaddr netmask, subnet, broadcast;
1564
1565 memcpy(netmask.iabuf, lease->options[DHO_SUBNET_MASK].data,
1566 lease->options[DHO_SUBNET_MASK].len);
1567 netmask.len = lease->options[DHO_SUBNET_MASK].len;
1568
1569 subnet = subnet_number(lease->address, netmask);
1570 if (subnet.len) {
1571 script_set_env(prefix, "network_number",
1572 piaddr(subnet));
1573 if (!lease->options[DHO_BROADCAST_ADDRESS].len) {
1574 broadcast = broadcast_addr(subnet, netmask);
1575 if (broadcast.len)
1576 script_set_env(prefix,
1577 "broadcast_address",
1578 piaddr(broadcast));
1579 }
1580 }
1581 }
1582
1583 if (lease->filename)
1584 script_set_env(prefix, "filename", lease->filename);
1585 if (lease->server_name)
1586 script_set_env(prefix, "server_name",
1587 lease->server_name);
dafcba85 1588
846204b6 1589 for (i = 0; i < 256; i++) {
dafcba85
AHJ
1590 if (!dhcp_option_ev_name(buf, sizeof(buf), &dhcp_options[i]))
1591 continue;
1592
1593 switch (config->default_actions[i]) {
1594 case ACTION_IGNORE:
1595 break;
1596
1597 case ACTION_DEFAULT:
1598 if (lease->options[i].len)
1599 script_set_env(prefix, buf,
1600 pretty_print_option(i, &lease->options[i],
1601 0));
1602 else if (config->defaults[i].len)
1603 script_set_env(prefix, buf,
1604 pretty_print_option(i, &config->defaults[i],
1605 0));
1606 break;
1607
1608 case ACTION_SUPERSEDE:
1609 if (config->defaults[i].len)
1610 script_set_env(prefix, buf,
1611 pretty_print_option(i, &config->defaults[i],
1612 0));
1613 break;
1614
1615 case ACTION_PREPEND:
1616 o.len = config->defaults[i].len + lease->options[i].len;
1617 if (o.len > 0) {
1618 o.data = calloc(1, o.len);
1619 if (o.data == NULL)
1620 error("no space to prepend '%s' to %s",
846204b6 1621 config->defaults[i].data,
dafcba85
AHJ
1622 dhcp_options[i].name);
1623 memcpy(o.data, config->defaults[i].data,
1624 config->defaults[i].len);
1625 memcpy(o.data + config->defaults[i].len,
1626 lease->options[i].data,
1627 lease->options[i].len);
1628 script_set_env(prefix, buf,
1629 pretty_print_option(i, &o, 0));
1630 free(o.data);
846204b6 1631 }
dafcba85 1632 break;
846204b6 1633
dafcba85
AHJ
1634 case ACTION_APPEND:
1635 o.len = config->defaults[i].len + lease->options[i].len;
1636 if (o.len > 0) {
1637 o.data = calloc(1, o.len);
1638 if (o.data == NULL)
1639 error("no space to append '%s' to %s",
1640 config->defaults[i].data,
1641 dhcp_options[i].name);
1642 memcpy(o.data, lease->options[i].data,
1643 lease->options[i].len);
1644 memcpy(o.data + lease->options[i].len,
1645 config->defaults[i].data,
1646 config->defaults[i].len);
1647 script_set_env(prefix, buf,
1648 pretty_print_option(i, &o, 0));
1649 free(o.data);
1650 }
1651 break;
846204b6
HT
1652 }
1653 }
dafcba85
AHJ
1654
1655 snprintf(buf, sizeof(buf), "%d", (int)lease->expiry);
1656 script_set_env(prefix, "expiry", buf);
846204b6
HT
1657}
1658
1659void
1660script_write_params(char *prefix, struct client_lease *lease)
1661{
1662 size_t fn_len = 0, sn_len = 0, pr_len = 0;
1663 struct imsg_hdr hdr;
1664 struct buf *buf;
1665 int i;
1666
1667 if (lease->filename != NULL)
1668 fn_len = strlen(lease->filename);
1669 if (lease->server_name != NULL)
1670 sn_len = strlen(lease->server_name);
1671 if (prefix != NULL)
1672 pr_len = strlen(prefix);
1673
1674 hdr.code = IMSG_SCRIPT_WRITE_PARAMS;
1675 hdr.len = sizeof(hdr) + sizeof(struct client_lease) +
1676 sizeof(size_t) + fn_len + sizeof(size_t) + sn_len +
1677 sizeof(size_t) + pr_len;
1678
1679 for (i = 0; i < 256; i++)
1680 hdr.len += sizeof(int) + lease->options[i].len;
1681
1682 scripttime = time(NULL);
1683
1684 buf = buf_open(hdr.len);
1685
1686 buf_add(buf, &hdr, sizeof(hdr));
1687 buf_add(buf, lease, sizeof(struct client_lease));
1688 buf_add(buf, &fn_len, sizeof(fn_len));
1689 buf_add(buf, lease->filename, fn_len);
1690 buf_add(buf, &sn_len, sizeof(sn_len));
1691 buf_add(buf, lease->server_name, sn_len);
1692 buf_add(buf, &pr_len, sizeof(pr_len));
1693 buf_add(buf, prefix, pr_len);
1694
1695 for (i = 0; i < 256; i++) {
1696 buf_add(buf, &lease->options[i].len,
1697 sizeof(lease->options[i].len));
1698 buf_add(buf, lease->options[i].data,
1699 lease->options[i].len);
1700 }
1701
1702 buf_close(privfd, buf);
1703}
1704
1705int
1706script_go(void)
1707{
1708 struct imsg_hdr hdr;
1709 struct buf *buf;
1710 int ret;
1711
1712 scripttime = time(NULL);
1713
1714 hdr.code = IMSG_SCRIPT_GO;
1715 hdr.len = sizeof(struct imsg_hdr);
1716
1717 buf = buf_open(hdr.len);
1718
1719 buf_add(buf, &hdr, sizeof(hdr));
1720 buf_close(privfd, buf);
1721
1722 bzero(&hdr, sizeof(hdr));
1723 buf_read(privfd, &hdr, sizeof(hdr));
1724 if (hdr.code != IMSG_SCRIPT_GO_RET)
1725 error("unexpected msg type %u", hdr.code);
1726 if (hdr.len != sizeof(hdr) + sizeof(int))
1727 error("received corrupted message");
1728 buf_read(privfd, &ret, sizeof(ret));
1729
1730 return (ret);
1731}
1732
1733int
1734priv_script_go(void)
1735{
1736 char *scriptName, *argv[2], **envp;
1737 int pid, wpid, wstatus;
1738
1739 scripttime = time(NULL);
1740
1741 scriptName = config->script_name;
1742 envp = client->scriptEnv;
1743
1744 argv[0] = scriptName;
1745 argv[1] = NULL;
1746
1747 pid = fork();
1748 if (pid < 0) {
1749 error("fork: %m");
1750 wstatus = 0;
1751 } else if (pid) {
1752 do {
1753 wpid = wait(&wstatus);
1754 } while (wpid != pid && wpid > 0);
1755 if (wpid < 0) {
1756 error("wait: %m");
1757 wstatus = 0;
1758 }
1759 } else {
1760 execve(scriptName, argv, envp);
1761 error("execve (%s, ...): %m", scriptName);
1762 }
1763
1764 script_flush_env();
1765
1766 return (WEXITSTATUS(wstatus));
1767}
1768
1769void
1770script_set_env(const char *prefix, const char *name, const char *value)
1771{
1772 int i, j, namelen;
1773
fe8f575c
SZ
1774 /* No `` or $() command substitution allowed in environment values! */
1775 for (j = 0; j < strlen(value); j++)
1776 switch (value[j]) {
1777 case '`':
1778 case '$':
1779 warning("illegal character (%c) in value '%s'",
1780 value[j], value);
1781 /* Ignore this option */
1782 return;
1783 }
1784
846204b6
HT
1785 namelen = strlen(name);
1786
1787 for (i = 0; client->scriptEnv[i]; i++)
1788 if (strncmp(client->scriptEnv[i], name, namelen) == 0 &&
1789 client->scriptEnv[i][namelen] == '=')
1790 break;
1791
1792 if (client->scriptEnv[i])
1793 /* Reuse the slot. */
1794 free(client->scriptEnv[i]);
1795 else {
1796 /* New variable. Expand if necessary. */
1797 if (i >= client->scriptEnvsize - 1) {
1798 char **newscriptEnv;
1799 int newscriptEnvsize = client->scriptEnvsize + 50;
1800
1801 newscriptEnv = realloc(client->scriptEnv,
1802 newscriptEnvsize);
1803 if (newscriptEnv == NULL) {
1804 free(client->scriptEnv);
1805 client->scriptEnv = NULL;
1806 client->scriptEnvsize = 0;
1807 error("script_set_env: no memory for variable");
1808 }
1809 client->scriptEnv = newscriptEnv;
1810 client->scriptEnvsize = newscriptEnvsize;
1811 }
1812 /* need to set the NULL pointer at end of array beyond
1813 the new slot. */
1814 client->scriptEnv[i + 1] = NULL;
1815 }
1816 /* Allocate space and format the variable in the appropriate slot. */
1817 client->scriptEnv[i] = malloc(strlen(prefix) + strlen(name) + 1 +
1818 strlen(value) + 1);
1819 if (client->scriptEnv[i] == NULL)
1820 error("script_set_env: no memory for variable assignment");
846204b6
HT
1821 snprintf(client->scriptEnv[i], strlen(prefix) + strlen(name) +
1822 1 + strlen(value) + 1, "%s%s=%s", prefix, name, value);
1823}
1824
1825void
1826script_flush_env(void)
1827{
1828 int i;
1829
1830 for (i = 0; client->scriptEnv[i]; i++) {
1831 free(client->scriptEnv[i]);
1832 client->scriptEnv[i] = NULL;
1833 }
1834 client->scriptEnvsize = 0;
1835}
1836
1837int
1838dhcp_option_ev_name(char *buf, size_t buflen, const struct option *option)
1839{
1840 size_t i;
1841
1842 for (i = 0; option->name[i]; i++) {
1843 if (i + 1 == buflen)
1844 return 0;
1845 if (option->name[i] == '-')
1846 buf[i] = '_';
1847 else
1848 buf[i] = option->name[i];
1849 }
1850
1851 buf[i] = 0;
1852 return 1;
1853}
1854
1855void
1856go_daemon(void)
1857{
0f5f50b1
MD
1858 char buf[256];
1859 int fd;
846204b6 1860
0f5f50b1
MD
1861 /*
1862 * Only once
1863 */
1864 if (no_daemon == 2)
846204b6
HT
1865 return;
1866
0f5f50b1
MD
1867 /*
1868 * Setup pidfile, kill any dhclient already running for this
1869 * interface.
1870 */
1871 snprintf(buf, sizeof(buf), "/var/run/dhclient.%s.pid", orig_ifname);
1872 fd = open(buf, O_RDWR|O_CREAT, 0644);
1873 if (fd >= 0) {
1874 if (killclient(fd)) {
1875 fprintf(stderr,
1876 "starting dhclient on %s\n",
1877 orig_ifname);
1878 } else {
1879 fprintf(stderr,
1880 "restarting dhclient on %s\n",
1881 orig_ifname);
1882 }
1883 }
1884
1885 /*
1886 * Daemonize if requested
1887 */
1888 if (no_daemon == 0) {
1889 /* Stop logging to stderr... */
1890 log_perror = 0;
846204b6 1891
0f5f50b1
MD
1892 if (daemon(1, 0) == -1)
1893 error("daemon");
846204b6 1894
0f5f50b1
MD
1895 /* we are chrooted, daemon(3) fails to open /dev/null */
1896 if (nullfd != -1) {
1897 dup2(nullfd, STDIN_FILENO);
1898 dup2(nullfd, STDOUT_FILENO);
1899 dup2(nullfd, STDERR_FILENO);
1900 close(nullfd);
1901 nullfd = -1;
1902 }
1903 }
846204b6 1904
0f5f50b1
MD
1905 /*
1906 * No further daemonizations, write out pid file and lock.
1907 */
1908 no_daemon = 2;
1909 if (fd >= 0) {
1910 lseek(fd, 0L, SEEK_SET);
1911 ftruncate(fd, 0);
1912 snprintf(buf, sizeof(buf), "%ld\n", (long)getpid());
1913 write(fd, buf, strlen(buf));
1914 flock(fd, LOCK_EX);
1915 /* leave descriptor open and locked */
846204b6
HT
1916 }
1917}
1918
1919int
1920check_option(struct client_lease *l, int option)
1921{
1922 char *opbuf;
1923 char *sbuf;
1924
1925 /* we use this, since this is what gets passed to dhclient-script */
1926
dafcba85 1927 opbuf = pretty_print_option(option, &l->options[option], 0);
846204b6
HT
1928
1929 sbuf = option_as_string(option, l->options[option].data,
1930 l->options[option].len);
1931
1932 switch (option) {
1933 case DHO_SUBNET_MASK:
313ef36c
AHJ
1934 case DHO_SWAP_SERVER:
1935 case DHO_BROADCAST_ADDRESS:
1936 case DHO_DHCP_SERVER_IDENTIFIER:
1937 case DHO_ROUTER_SOLICITATION_ADDRESS:
1938 case DHO_DHCP_REQUESTED_ADDRESS:
1939 if (ipv4addrs(opbuf) == 0) {
1940 warning("Invalid IP address in option %s: %s",
1941 dhcp_options[option].name, opbuf);
1942 return (0);
1943 }
1944 if (l->options[option].len != 4) { /* RFC 2132 */
1945 warning("warning: Only 1 IP address allowed in "
1946 "%s option; length %d, must be 4",
1947 dhcp_options[option].name,
1948 l->options[option].len);
1949 l->options[option].len = 4;
1950 }
1951 return (1);
846204b6
HT
1952 case DHO_TIME_SERVERS:
1953 case DHO_NAME_SERVERS:
1954 case DHO_ROUTERS:
1955 case DHO_DOMAIN_NAME_SERVERS:
1956 case DHO_LOG_SERVERS:
1957 case DHO_COOKIE_SERVERS:
1958 case DHO_LPR_SERVERS:
1959 case DHO_IMPRESS_SERVERS:
1960 case DHO_RESOURCE_LOCATION_SERVERS:
846204b6
HT
1961 case DHO_NIS_SERVERS:
1962 case DHO_NTP_SERVERS:
1963 case DHO_NETBIOS_NAME_SERVERS:
1964 case DHO_NETBIOS_DD_SERVER:
1965 case DHO_FONT_SERVERS:
313ef36c
AHJ
1966 if (ipv4addrs(opbuf) == 0) {
1967 warning("Invalid IP address in option %s: %s",
1968 dhcp_options[option].name, opbuf);
846204b6
HT
1969 return (0);
1970 }
1971 return (1);
1972 case DHO_HOST_NAME:
1973 case DHO_DOMAIN_NAME:
1974 case DHO_NIS_DOMAIN:
1975 if (!res_hnok(sbuf)) {
1976 warning("Bogus Host Name option %d: %s (%s)", option,
1977 sbuf, opbuf);
1978 l->options[option].len = 0;
1979 free(l->options[option].data);
1980 }
1981 return (1);
1982 case DHO_PAD:
1983 case DHO_TIME_OFFSET:
1984 case DHO_BOOT_SIZE:
1985 case DHO_MERIT_DUMP:
1986 case DHO_ROOT_PATH:
1987 case DHO_EXTENSIONS_PATH:
1988 case DHO_IP_FORWARDING:
1989 case DHO_NON_LOCAL_SOURCE_ROUTING:
1990 case DHO_POLICY_FILTER:
1991 case DHO_MAX_DGRAM_REASSEMBLY:
1992 case DHO_DEFAULT_IP_TTL:
1993 case DHO_PATH_MTU_AGING_TIMEOUT:
1994 case DHO_PATH_MTU_PLATEAU_TABLE:
1995 case DHO_INTERFACE_MTU:
1996 case DHO_ALL_SUBNETS_LOCAL:
1997 case DHO_PERFORM_MASK_DISCOVERY:
1998 case DHO_MASK_SUPPLIER:
1999 case DHO_ROUTER_DISCOVERY:
846204b6
HT
2000 case DHO_STATIC_ROUTES:
2001 case DHO_TRAILER_ENCAPSULATION:
2002 case DHO_ARP_CACHE_TIMEOUT:
2003 case DHO_IEEE802_3_ENCAPSULATION:
2004 case DHO_DEFAULT_TCP_TTL:
2005 case DHO_TCP_KEEPALIVE_INTERVAL:
2006 case DHO_TCP_KEEPALIVE_GARBAGE:
2007 case DHO_VENDOR_ENCAPSULATED_OPTIONS:
2008 case DHO_NETBIOS_NODE_TYPE:
2009 case DHO_NETBIOS_SCOPE:
2010 case DHO_X_DISPLAY_MANAGER:
846204b6
HT
2011 case DHO_DHCP_LEASE_TIME:
2012 case DHO_DHCP_OPTION_OVERLOAD:
2013 case DHO_DHCP_MESSAGE_TYPE:
2014 case DHO_DHCP_PARAMETER_REQUEST_LIST:
2015 case DHO_DHCP_MESSAGE:
2016 case DHO_DHCP_MAX_MESSAGE_SIZE:
2017 case DHO_DHCP_RENEWAL_TIME:
2018 case DHO_DHCP_REBINDING_TIME:
2019 case DHO_DHCP_CLASS_IDENTIFIER:
2020 case DHO_DHCP_CLIENT_IDENTIFIER:
2021 case DHO_DHCP_USER_CLASS_ID:
7a6ba664 2022 case DHO_TFTP_SERVER:
846204b6
HT
2023 case DHO_END:
2024 return (1);
6bdc8b43
MD
2025 case DHO_CLASSLESS_ROUTES:
2026 return (check_classless_option(l->options[option].data,
2027 l->options[option].len));
846204b6 2028 default:
b796b237
AHJ
2029 if (!unknown_ok)
2030 warning("unknown dhcp option value 0x%x", option);
846204b6
HT
2031 return (unknown_ok);
2032 }
2033}
2034
6bdc8b43
MD
2035/* RFC 3442 The Classless Static Routes option checks */
2036int
2037check_classless_option(unsigned char *data, int len)
2038{
2039 int i = 0;
2040 unsigned char width;
2041 in_addr_t addr, mask;
2042
2043 if (len < 5) {
2044 warning("Too small length: %d", len);
2045 return (0);
2046 }
2047 while(i < len) {
2048 width = data[i++];
2049 if (width == 0) {
2050 i += 4;
2051 continue;
2052 } else if (width < 9) {
2053 addr = (in_addr_t)(data[i] << 24);
2054 i += 1;
2055 } else if (width < 17) {
2056 addr = (in_addr_t)(data[i] << 24) +
2057 (in_addr_t)(data[i + 1] << 16);
2058 i += 2;
2059 } else if (width < 25) {
2060 addr = (in_addr_t)(data[i] << 24) +
2061 (in_addr_t)(data[i + 1] << 16) +
2062 (in_addr_t)(data[i + 2] << 8);
2063 i += 3;
2064 } else if (width < 33) {
2065 addr = (in_addr_t)(data[i] << 24) +
2066 (in_addr_t)(data[i + 1] << 16) +
2067 (in_addr_t)(data[i + 2] << 8) +
2068 data[i + 3];
2069 i += 4;
2070 } else {
2071 warning("Incorrect subnet width: %d", width);
2072 return (0);
2073 }
2074 mask = (in_addr_t)(~0) << (32 - width);
2075 addr = ntohl(addr);
2076 mask = ntohl(mask);
2077
2078 /*
2079 * From RFC 3442:
2080 * ... After deriving a subnet number and subnet mask
2081 * from each destination descriptor, the DHCP client
2082 * MUST zero any bits in the subnet number where the
2083 * corresponding bit in the mask is zero...
2084 */
2085 if ((addr & mask) != addr) {
2086 addr &= mask;
2087 data[i - 1] = (unsigned char)(
2088 (addr >> (((32 - width)/8)*8)) & 0xFF);
2089 }
2090 i += 4;
2091 }
2092 if (i > len) {
2093 warning("Incorrect data length: %d (must be %d)", len, i);
2094 return (0);
2095 }
2096 return (1);
2097}
2098
846204b6
HT
2099int
2100res_hnok(const char *name)
2101{
2102 const char *dn = name;
2103 int pch = '.', ch = *dn++;
2104 int warn = 0;
2105
2106 while (ch != '\0') {
2107 int nch = *dn++;
2108
2109 if (ch == '.') {
2110 ;
2111 } else if (pch == '.' || nch == '.' || nch == '\0') {
2112 if (!isalnum(ch))
2113 return (0);
2114 } else if (!isalnum(ch) && ch != '-' && ch != '_')
2115 return (0);
2116 else if (ch == '_' && warn == 0) {
2117 warning("warning: hostname %s contains an "
2118 "underscore which violates RFC 952", name);
2119 warn++;
2120 }
2121 pch = ch, ch = nch;
2122 }
2123 return (1);
2124}
2125
2126/* Does buf consist only of dotted decimal ipv4 addrs?
2127 * return how many if so,
2128 * otherwise, return 0
2129 */
2130int
2131ipv4addrs(char * buf)
2132{
2133 struct in_addr jnk;
2134 int count = 0;
2135
2136 while (inet_aton(buf, &jnk) == 1){
2137 count++;
2138 while (*buf == '.' || isdigit(*buf))
2139 buf++;
2140 if (*buf == '\0')
2141 return (count);
2142 while (*buf == ' ')
2143 buf++;
2144 }
2145 return (0);
2146}
2147
2148char *
2149option_as_string(unsigned int code, unsigned char *data, int len)
2150{
2151 static char optbuf[32768]; /* XXX */
2152 char *op = optbuf;
2153 int opleft = sizeof(optbuf);
2154 unsigned char *dp = data;
2155
2156 if (code > 255)
2157 error("option_as_string: bad code %d", code);
2158
2159 for (; dp < data + len; dp++) {
2160 if (!isascii(*dp) || !isprint(*dp)) {
2161 if (dp + 1 != data + len || *dp != 0) {
2162 size_t oplen;
2163 snprintf(op, opleft, "\\%03o", *dp);
2164 oplen = strlen(op);
2165 op += oplen;
2166 opleft -= oplen;
2167 }
2168 } else if (*dp == '"' || *dp == '\'' || *dp == '$' ||
2169 *dp == '`' || *dp == '\\') {
2170 *op++ = '\\';
2171 *op++ = *dp;
2172 opleft -= 2;
2173 } else {
2174 *op++ = *dp;
2175 opleft--;
2176 }
2177 }
2178 if (opleft < 1)
2179 goto toobig;
2180 *op = 0;
2181 return optbuf;
2182toobig:
2183 warning("dhcp option too large");
2184 return "<error>";
2185}
2186
2187int
2188fork_privchld(int fd, int fd2)
2189{
2190 struct pollfd pfd[1];
a05d48e6 2191 int nfds, pfail = 0;
0f5f50b1
MD
2192 pid_t pid;
2193 int omask;
846204b6 2194
0f5f50b1
MD
2195 omask = sigblock(sigmask(SIGINT)|sigmask(SIGHUP));
2196 pid = fork();
2197 if (pid > 0)
2198 monitor_pid = pid;
2199 sigsetmask(omask);
2200
2201 switch (pid) {
846204b6
HT
2202 case -1:
2203 error("cannot fork");
2204 break;
2205 case 0:
2206 break;
2207 default:
2208 return (0);
2209 }
2210
2211 if (chdir("/") == -1)
2212 error("chdir(\"/\")");
2213
2214 setproctitle("%s [priv]", ifi->name);
2215
2216 dup2(nullfd, STDIN_FILENO);
2217 dup2(nullfd, STDOUT_FILENO);
2218 dup2(nullfd, STDERR_FILENO);
2219 close(nullfd);
2220 close(fd2);
2221
2222 for (;;) {
2223 pfd[0].fd = fd;
2224 pfd[0].events = POLLIN;
2225 if ((nfds = poll(pfd, 1, INFTIM)) == -1)
2226 if (errno != EINTR)
2227 error("poll error");
2228
a05d48e6
SG
2229 /*
2230 * Handle temporary errors, but bail if they persist.
2231 */
2232 if (nfds == 0 || !(pfd[0].revents & POLLIN)) {
2233 if (pfail > POLL_FAILURES)
2234 error("poll failed > %d times", POLL_FAILURES);
2235 sleep(pfail * POLL_FAILURE_WAIT);
2236 pfail++;
846204b6 2237 continue;
a05d48e6 2238 }
846204b6
HT
2239
2240 dispatch_imsg(fd);
2241 }
2242}
d63fb838
AHJ
2243
2244void
2245get_ifname(char *ifname, char *arg)
2246{
2247 struct ifgroupreq ifgr;
2248 struct ifg_req *ifg;
2249 int s, len;
2250
2251 if (!strcmp(arg, "egress")) {
2252 s = socket(AF_INET, SOCK_DGRAM, 0);
2253 if (s == -1)
2254 error("socket error");
2255 bzero(&ifgr, sizeof(ifgr));
2256 strlcpy(ifgr.ifgr_name, "egress", sizeof(ifgr.ifgr_name));
2257 if (ioctl(s, SIOCGIFGMEMB, (caddr_t)&ifgr) == -1) {
2258 if (errno == ENOENT)
2259 error("no interface in group egress found");
2260 error("ioctl SIOCGIFGMEMB: %m");
2261 }
2262 len = ifgr.ifgr_len;
2263 if ((ifgr.ifgr_groups = calloc(1, len)) == NULL)
2264 error("get_ifname");
2265 if (ioctl(s, SIOCGIFGMEMB, (caddr_t)&ifgr) == -1)
2266 error("ioctl SIOCGIFGMEMB: %m");
2267
2268 arg = NULL;
2269 for (ifg = ifgr.ifgr_groups;
2270 ifg && len >= sizeof(struct ifg_req); ifg++) {
2271 len -= sizeof(struct ifg_req);
2272 if (arg)
2273 error("too many interfaces in group egress");
2274 arg = ifg->ifgrq_member;
2275 }
2276
2277 if (strlcpy(ifi->name, arg, IFNAMSIZ) >= IFNAMSIZ)
2278 error("Interface name too long: %m");
2279
2280 free(ifgr.ifgr_groups);
2281 close(s);
2282 } else if (strlcpy(ifi->name, arg, IFNAMSIZ) >= IFNAMSIZ)
2283 error("Interface name too long");
2284}
0f5f50b1
MD
2285
2286static
2287void
2288sig_handle(int signo)
2289{
2290 if (monitor_pid > 0)
2291 kill(monitor_pid, signo);
2292 fprintf(stderr, "killed by signal\n");
2293 exit(1);
2294}
2295
2296static
2297int
2298killclient(int fd)
2299{
2300 int noclient = 1;
2301
2302 /*
2303 * Kill previously running dhclient
2304 */
2305 if (flock(fd, LOCK_EX|LOCK_NB) < 0) {
2306 char buf[256];
2307 ssize_t n;
2308 pid_t pid;
2309
2310 lseek(fd, 0L, SEEK_SET);
2311 n = read(fd, buf, sizeof(buf));
2312 if (n > 0) {
2313 buf[n-1] = 0;
2314 pid = strtol(buf, NULL, 10);
2315 if ((int)pid > 0) {
2316 noclient = 0;
2317 kill(pid, SIGINT);
2318 }
2319 }
2320 if (flock(fd, LOCK_EX|LOCK_NB) < 0)
2321 usleep(20000);
2322 while (flock(fd, LOCK_EX|LOCK_NB) < 0)
2323 sleep(1);
2324 }
2325 return noclient;
2326}