Update to dhcpcd-9.4.0 with the following changes:
[dragonfly.git] / contrib / dhcpcd / src / dhcp.c
1 /* SPDX-License-Identifier: BSD-2-Clause */
2 /*
3  * dhcpcd - DHCP client daemon
4  * Copyright (c) 2006-2020 Roy Marples <roy@marples.name>
5  * All rights reserved
6
7  * Redistribution and use in source and binary forms, with or without
8  * modification, are permitted provided that the following conditions
9  * are met:
10  * 1. Redistributions of source code must retain the above copyright
11  *    notice, this list of conditions and the following disclaimer.
12  * 2. Redistributions in binary form must reproduce the above copyright
13  *    notice, this list of conditions and the following disclaimer in the
14  *    documentation and/or other materials provided with the distribution.
15  *
16  * THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND
17  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
18  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
19  * ARE DISCLAIMED.  IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
20  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
21  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
22  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
23  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
24  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
25  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
26  * SUCH DAMAGE.
27  */
28
29 #include <sys/param.h>
30 #include <sys/socket.h>
31
32 #include <arpa/inet.h>
33 #include <net/if.h>
34 #include <net/route.h>
35 #include <netinet/if_ether.h>
36 #include <netinet/in_systm.h>
37 #include <netinet/in.h>
38 #include <netinet/ip.h>
39 #define __FAVOR_BSD /* Nasty glibc hack so we can use BSD semantics for UDP */
40 #include <netinet/udp.h>
41 #undef __FAVOR_BSD
42
43 #ifdef AF_LINK
44 #  include <net/if_dl.h>
45 #endif
46
47 #include <assert.h>
48 #include <ctype.h>
49 #include <errno.h>
50 #include <fcntl.h>
51 #include <inttypes.h>
52 #include <stdbool.h>
53 #include <stddef.h>
54 #include <stdio.h>
55 #include <stdlib.h>
56 #include <string.h>
57 #include <unistd.h>
58 #include <syslog.h>
59
60 #define ELOOP_QUEUE     ELOOP_DHCP
61 #include "config.h"
62 #include "arp.h"
63 #include "bpf.h"
64 #include "common.h"
65 #include "dhcp.h"
66 #include "dhcpcd.h"
67 #include "dhcp-common.h"
68 #include "duid.h"
69 #include "eloop.h"
70 #include "if.h"
71 #include "ipv4.h"
72 #include "ipv4ll.h"
73 #include "logerr.h"
74 #include "privsep.h"
75 #include "sa.h"
76 #include "script.h"
77
78 #define DAD             "Duplicate address detected"
79 #define DHCP_MIN_LEASE  20
80
81 #define IPV4A           ADDRIPV4 | ARRAY
82 #define IPV4R           ADDRIPV4 | REQUEST
83
84 /* We should define a maximum for the NAK exponential backoff */
85 #define NAKOFF_MAX              60
86
87 /* Wait N nanoseconds between sending a RELEASE and dropping the address.
88  * This gives the kernel enough time to actually send it. */
89 #define RELEASE_DELAY_S         0
90 #define RELEASE_DELAY_NS        10000000
91
92 #ifndef IPDEFTTL
93 #define IPDEFTTL 64 /* RFC1340 */
94 #endif
95
96 /* Support older systems with different defines */
97 #if !defined(IP_RECVPKTINFO) && defined(IP_PKTINFO)
98 #define IP_RECVPKTINFO IP_PKTINFO
99 #endif
100
101 /* Assert the correct structure size for on wire */
102 __CTASSERT(sizeof(struct ip)            == 20);
103 __CTASSERT(sizeof(struct udphdr)        == 8);
104 __CTASSERT(sizeof(struct bootp)         == 300);
105
106 struct dhcp_op {
107         uint8_t value;
108         const char *name;
109 };
110
111 static const struct dhcp_op dhcp_ops[] = {
112         { DHCP_DISCOVER,   "DISCOVER" },
113         { DHCP_OFFER,      "OFFER" },
114         { DHCP_REQUEST,    "REQUEST" },
115         { DHCP_DECLINE,    "DECLINE" },
116         { DHCP_ACK,        "ACK" },
117         { DHCP_NAK,        "NAK" },
118         { DHCP_RELEASE,    "RELEASE" },
119         { DHCP_INFORM,     "INFORM" },
120         { DHCP_FORCERENEW, "FORCERENEW"},
121         { 0, NULL }
122 };
123
124 static const char * const dhcp_params[] = {
125         "ip_address",
126         "subnet_cidr",
127         "network_number",
128         "filename",
129         "server_name",
130         NULL
131 };
132
133 static int dhcp_openbpf(struct interface *);
134 static void dhcp_start1(void *);
135 #if defined(ARP) && (!defined(KERNEL_RFC5227) || defined(ARPING))
136 static void dhcp_arp_found(struct arp_state *, const struct arp_msg *);
137 #endif
138 static void dhcp_handledhcp(struct interface *, struct bootp *, size_t,
139     const struct in_addr *);
140 static void dhcp_handleifudp(void *);
141 static int dhcp_initstate(struct interface *);
142
143 void
144 dhcp_printoptions(const struct dhcpcd_ctx *ctx,
145     const struct dhcp_opt *opts, size_t opts_len)
146 {
147         const char * const *p;
148         size_t i, j;
149         const struct dhcp_opt *opt, *opt2;
150         int cols;
151
152         for (p = dhcp_params; *p; p++)
153                 printf("    %s\n", *p);
154
155         for (i = 0, opt = ctx->dhcp_opts; i < ctx->dhcp_opts_len; i++, opt++) {
156                 for (j = 0, opt2 = opts; j < opts_len; j++, opt2++)
157                         if (opt->option == opt2->option)
158                                 break;
159                 if (j == opts_len) {
160                         cols = printf("%03d %s", opt->option, opt->var);
161                         dhcp_print_option_encoding(opt, cols);
162                 }
163         }
164         for (i = 0, opt = opts; i < opts_len; i++, opt++) {
165                 cols = printf("%03d %s", opt->option, opt->var);
166                 dhcp_print_option_encoding(opt, cols);
167         }
168 }
169
170 static const uint8_t *
171 get_option(struct dhcpcd_ctx *ctx,
172     const struct bootp *bootp, size_t bootp_len,
173     unsigned int opt, size_t *opt_len)
174 {
175         const uint8_t *p, *e;
176         uint8_t l, o, ol, overl, *bp;
177         const uint8_t *op;
178         size_t bl;
179
180         if (bootp == NULL || bootp_len < DHCP_MIN_LEN) {
181                 errno = EINVAL;
182                 return NULL;
183         }
184
185         /* Check we have the magic cookie */
186         if (!IS_DHCP(bootp)) {
187                 errno = ENOTSUP;
188                 return NULL;
189         }
190
191         p = bootp->vend + 4; /* options after the 4 byte cookie */
192         e = (const uint8_t *)bootp + bootp_len;
193         ol = o = overl = 0;
194         bp = NULL;
195         op = NULL;
196         bl = 0;
197         while (p < e) {
198                 o = *p++;
199                 switch (o) {
200                 case DHO_PAD:
201                         /* No length to read */
202                         continue;
203                 case DHO_END:
204                         if (overl & 1) {
205                                 /* bit 1 set means parse boot file */
206                                 overl = (uint8_t)(overl & ~1);
207                                 p = bootp->file;
208                                 e = p + sizeof(bootp->file);
209                         } else if (overl & 2) {
210                                 /* bit 2 set means parse server name */
211                                 overl = (uint8_t)(overl & ~2);
212                                 p = bootp->sname;
213                                 e = p + sizeof(bootp->sname);
214                         } else
215                                 goto exit;
216                         /* No length to read */
217                         continue;
218                 }
219
220                 /* Check we can read the length */
221                 if (p == e) {
222                         errno = EINVAL;
223                         return NULL;
224                 }
225                 l = *p++;
226
227                 /* Check we can read the option data, if present */
228                 if (p + l > e) {
229                         errno = EINVAL;
230                         return NULL;
231                 }
232
233                 if (o == DHO_OPTSOVERLOADED) {
234                         /* Ensure we only get this option once by setting
235                          * the last bit as well as the value.
236                          * This is valid because only the first two bits
237                          * actually mean anything in RFC2132 Section 9.3 */
238                         if (l == 1 && !overl)
239                                 overl = 0x80 | p[0];
240                 }
241
242                 if (o == opt) {
243                         if (op) {
244                                 /* We must concatonate the options. */
245                                 if (bl + l > ctx->opt_buffer_len) {
246                                         size_t pos;
247                                         uint8_t *nb;
248
249                                         if (bp)
250                                                 pos = (size_t)
251                                                     (bp - ctx->opt_buffer);
252                                         else
253                                                 pos = 0;
254                                         nb = realloc(ctx->opt_buffer, bl + l);
255                                         if (nb == NULL)
256                                                 return NULL;
257                                         ctx->opt_buffer = nb;
258                                         ctx->opt_buffer_len = bl + l;
259                                         bp = ctx->opt_buffer + pos;
260                                 }
261                                 if (bp == NULL)
262                                         bp = ctx->opt_buffer;
263                                 memcpy(bp, op, ol);
264                                 bp += ol;
265                         }
266                         ol = l;
267                         op = p;
268                         bl += ol;
269                 }
270                 p += l;
271         }
272
273 exit:
274         if (opt_len)
275                 *opt_len = bl;
276         if (bp) {
277                 memcpy(bp, op, ol);
278                 return (const uint8_t *)ctx->opt_buffer;
279         }
280         if (op)
281                 return op;
282         errno = ENOENT;
283         return NULL;
284 }
285
286 static int
287 get_option_addr(struct dhcpcd_ctx *ctx,
288     struct in_addr *a, const struct bootp *bootp, size_t bootp_len,
289     uint8_t option)
290 {
291         const uint8_t *p;
292         size_t len;
293
294         p = get_option(ctx, bootp, bootp_len, option, &len);
295         if (!p || len < (ssize_t)sizeof(a->s_addr))
296                 return -1;
297         memcpy(&a->s_addr, p, sizeof(a->s_addr));
298         return 0;
299 }
300
301 static int
302 get_option_uint32(struct dhcpcd_ctx *ctx,
303     uint32_t *i, const struct bootp *bootp, size_t bootp_len, uint8_t option)
304 {
305         const uint8_t *p;
306         size_t len;
307         uint32_t d;
308
309         p = get_option(ctx, bootp, bootp_len, option, &len);
310         if (!p || len < (ssize_t)sizeof(d))
311                 return -1;
312         memcpy(&d, p, sizeof(d));
313         if (i)
314                 *i = ntohl(d);
315         return 0;
316 }
317
318 static int
319 get_option_uint16(struct dhcpcd_ctx *ctx,
320     uint16_t *i, const struct bootp *bootp, size_t bootp_len, uint8_t option)
321 {
322         const uint8_t *p;
323         size_t len;
324         uint16_t d;
325
326         p = get_option(ctx, bootp, bootp_len, option, &len);
327         if (!p || len < (ssize_t)sizeof(d))
328                 return -1;
329         memcpy(&d, p, sizeof(d));
330         if (i)
331                 *i = ntohs(d);
332         return 0;
333 }
334
335 static int
336 get_option_uint8(struct dhcpcd_ctx *ctx,
337     uint8_t *i, const struct bootp *bootp, size_t bootp_len, uint8_t option)
338 {
339         const uint8_t *p;
340         size_t len;
341
342         p = get_option(ctx, bootp, bootp_len, option, &len);
343         if (!p || len < (ssize_t)sizeof(*p))
344                 return -1;
345         if (i)
346                 *i = *(p);
347         return 0;
348 }
349
350 ssize_t
351 print_rfc3442(FILE *fp, const uint8_t *data, size_t data_len)
352 {
353         const uint8_t *p = data, *e;
354         size_t ocets;
355         uint8_t cidr;
356         struct in_addr addr;
357
358         /* Minimum is 5 -first is CIDR and a router length of 4 */
359         if (data_len < 5) {
360                 errno = EINVAL;
361                 return -1;
362         }
363
364         e = p + data_len;
365         while (p < e) {
366                 if (p != data) {
367                         if (fputc(' ', fp) == EOF)
368                                 return -1;
369                 }
370                 cidr = *p++;
371                 if (cidr > 32) {
372                         errno = EINVAL;
373                         return -1;
374                 }
375                 ocets = (size_t)(cidr + 7) / NBBY;
376                 if (p + 4 + ocets > e) {
377                         errno = ERANGE;
378                         return -1;
379                 }
380                 /* If we have ocets then we have a destination and netmask */
381                 addr.s_addr = 0;
382                 if (ocets > 0) {
383                         memcpy(&addr.s_addr, p, ocets);
384                         p += ocets;
385                 }
386                 if (fprintf(fp, "%s/%d", inet_ntoa(addr), cidr) == -1)
387                         return -1;
388
389                 /* Finally, snag the router */
390                 memcpy(&addr.s_addr, p, 4);
391                 p += 4;
392                 if (fprintf(fp, " %s", inet_ntoa(addr)) == -1)
393                         return -1;
394         }
395
396         if (fputc('\0', fp) == EOF)
397                 return -1;
398         return 1;
399 }
400
401 static int
402 decode_rfc3442_rt(rb_tree_t *routes, struct interface *ifp,
403     const uint8_t *data, size_t dl, const struct bootp *bootp)
404 {
405         const uint8_t *p = data;
406         const uint8_t *e;
407         uint8_t cidr;
408         size_t ocets;
409         struct rt *rt = NULL;
410         struct in_addr dest, netmask, gateway;
411         int n;
412
413         /* Minimum is 5 -first is CIDR and a router length of 4 */
414         if (dl < 5) {
415                 errno = EINVAL;
416                 return -1;
417         }
418
419         n = 0;
420         e = p + dl;
421         while (p < e) {
422                 cidr = *p++;
423                 if (cidr > 32) {
424                         errno = EINVAL;
425                         return -1;
426                 }
427
428                 ocets = (size_t)(cidr + 7) / NBBY;
429                 if (p + 4 + ocets > e) {
430                         errno = ERANGE;
431                         return -1;
432                 }
433
434                 if ((rt = rt_new(ifp)) == NULL)
435                         return -1;
436
437                 /* If we have ocets then we have a destination and netmask */
438                 dest.s_addr = 0;
439                 if (ocets > 0) {
440                         memcpy(&dest.s_addr, p, ocets);
441                         p += ocets;
442                         netmask.s_addr = htonl(~0U << (32 - cidr));
443                 } else
444                         netmask.s_addr = 0;
445
446                 /* Finally, snag the router */
447                 memcpy(&gateway.s_addr, p, 4);
448                 p += 4;
449
450                 /* An on-link host route is normally set by having the
451                  * gateway match the destination or assigned address */
452                 if (gateway.s_addr == dest.s_addr ||
453                     (gateway.s_addr == bootp->yiaddr ||
454                     gateway.s_addr == bootp->ciaddr))
455                 {
456                         gateway.s_addr = INADDR_ANY;
457                         netmask.s_addr = INADDR_BROADCAST;
458                 }
459                 if (netmask.s_addr == INADDR_BROADCAST)
460                         rt->rt_flags = RTF_HOST;
461
462                 sa_in_init(&rt->rt_dest, &dest);
463                 sa_in_init(&rt->rt_netmask, &netmask);
464                 sa_in_init(&rt->rt_gateway, &gateway);
465                 if (rt_proto_add(routes, rt))
466                         n = 1;
467         }
468         return n;
469 }
470
471 ssize_t
472 print_rfc3361(FILE *fp, const uint8_t *data, size_t dl)
473 {
474         uint8_t enc;
475         char sip[NS_MAXDNAME];
476         struct in_addr addr;
477
478         if (dl < 2) {
479                 errno = EINVAL;
480                 return 0;
481         }
482
483         enc = *data++;
484         dl--;
485         switch (enc) {
486         case 0:
487                 if (decode_rfc1035(sip, sizeof(sip), data, dl) == -1)
488                         return -1;
489                 if (efprintf(fp, "%s", sip) == -1)
490                         return -1;
491                 break;
492         case 1:
493                 if (dl % 4 != 0) {
494                         errno = EINVAL;
495                         break;
496                 }
497                 addr.s_addr = INADDR_BROADCAST;
498                 for (;
499                     dl != 0;
500                     data += sizeof(addr.s_addr), dl -= sizeof(addr.s_addr))
501                 {
502                         memcpy(&addr.s_addr, data, sizeof(addr.s_addr));
503                         if (fprintf(fp, "%s", inet_ntoa(addr)) == -1)
504                                 return -1;
505                         if (dl != sizeof(addr.s_addr)) {
506                                 if (fputc(' ', fp) == EOF)
507                                         return -1;
508                         }
509                 }
510                 if (fputc('\0', fp) == EOF)
511                         return -1;
512                 break;
513         default:
514                 errno = EINVAL;
515                 return 0;
516         }
517
518         return 1;
519 }
520
521 static char *
522 get_option_string(struct dhcpcd_ctx *ctx,
523     const struct bootp *bootp, size_t bootp_len, uint8_t option)
524 {
525         size_t len;
526         const uint8_t *p;
527         char *s;
528
529         p = get_option(ctx, bootp, bootp_len, option, &len);
530         if (!p || len == 0 || *p == '\0')
531                 return NULL;
532
533         s = malloc(sizeof(char) * (len + 1));
534         if (s) {
535                 memcpy(s, p, len);
536                 s[len] = '\0';
537         }
538         return s;
539 }
540
541 /* This calculates the netmask that we should use for static routes.
542  * This IS different from the calculation used to calculate the netmask
543  * for an interface address. */
544 static uint32_t
545 route_netmask(uint32_t ip_in)
546 {
547         /* used to be unsigned long - check if error */
548         uint32_t p = ntohl(ip_in);
549         uint32_t t;
550
551         if (IN_CLASSA(p))
552                 t = ~IN_CLASSA_NET;
553         else {
554                 if (IN_CLASSB(p))
555                         t = ~IN_CLASSB_NET;
556                 else {
557                         if (IN_CLASSC(p))
558                                 t = ~IN_CLASSC_NET;
559                         else
560                                 t = 0;
561                 }
562         }
563
564         while (t & p)
565                 t >>= 1;
566
567         return (htonl(~t));
568 }
569
570 /* We need to obey routing options.
571  * If we have a CSR then we only use that.
572  * Otherwise we add static routes and then routers. */
573 static int
574 get_option_routes(rb_tree_t *routes, struct interface *ifp,
575     const struct bootp *bootp, size_t bootp_len)
576 {
577         struct if_options *ifo = ifp->options;
578         const uint8_t *p;
579         const uint8_t *e;
580         struct rt *rt = NULL;
581         struct in_addr dest, netmask, gateway;
582         size_t len;
583         const char *csr = "";
584         int n;
585
586         /* If we have CSR's then we MUST use these only */
587         if (!has_option_mask(ifo->nomask, DHO_CSR))
588                 p = get_option(ifp->ctx, bootp, bootp_len, DHO_CSR, &len);
589         else
590                 p = NULL;
591         /* Check for crappy MS option */
592         if (!p && !has_option_mask(ifo->nomask, DHO_MSCSR)) {
593                 p = get_option(ifp->ctx, bootp, bootp_len, DHO_MSCSR, &len);
594                 if (p)
595                         csr = "MS ";
596         }
597         if (p && (n = decode_rfc3442_rt(routes, ifp, p, len, bootp)) != -1) {
598                 const struct dhcp_state *state;
599
600                 state = D_CSTATE(ifp);
601                 if (!(ifo->options & DHCPCD_CSR_WARNED) &&
602                     !(state->added & STATE_FAKE))
603                 {
604                         logdebugx("%s: using %sClassless Static Routes",
605                             ifp->name, csr);
606                         ifo->options |= DHCPCD_CSR_WARNED;
607                 }
608                 return n;
609         }
610
611         n = 0;
612         /* OK, get our static routes first. */
613         if (!has_option_mask(ifo->nomask, DHO_STATICROUTE))
614                 p = get_option(ifp->ctx, bootp, bootp_len,
615                     DHO_STATICROUTE, &len);
616         else
617                 p = NULL;
618         /* RFC 2131 Section 5.8 states length MUST be in multiples of 8 */
619         if (p && len % 8 == 0) {
620                 e = p + len;
621                 while (p < e) {
622                         memcpy(&dest.s_addr, p, sizeof(dest.s_addr));
623                         p += 4;
624                         memcpy(&gateway.s_addr, p, sizeof(gateway.s_addr));
625                         p += 4;
626                         /* RFC 2131 Section 5.8 states default route is
627                          * illegal */
628                         if (gateway.s_addr == INADDR_ANY)
629                                 continue;
630                         if ((rt = rt_new(ifp)) == NULL)
631                                 return -1;
632
633                         /* A on-link host route is normally set by having the
634                          * gateway match the destination or assigned address */
635                         if (gateway.s_addr == dest.s_addr ||
636                              (gateway.s_addr == bootp->yiaddr ||
637                               gateway.s_addr == bootp->ciaddr))
638                         {
639                                 gateway.s_addr = INADDR_ANY;
640                                 netmask.s_addr = INADDR_BROADCAST;
641                         } else
642                                 netmask.s_addr = route_netmask(dest.s_addr);
643                         if (netmask.s_addr == INADDR_BROADCAST)
644                                 rt->rt_flags = RTF_HOST;
645
646                         sa_in_init(&rt->rt_dest, &dest);
647                         sa_in_init(&rt->rt_netmask, &netmask);
648                         sa_in_init(&rt->rt_gateway, &gateway);
649                         if (rt_proto_add(routes, rt))
650                                 n++;
651                 }
652         }
653
654         /* Now grab our routers */
655         if (!has_option_mask(ifo->nomask, DHO_ROUTER))
656                 p = get_option(ifp->ctx, bootp, bootp_len, DHO_ROUTER, &len);
657         else
658                 p = NULL;
659         if (p && len % 4 == 0) {
660                 e = p + len;
661                 dest.s_addr = INADDR_ANY;
662                 netmask.s_addr = INADDR_ANY;
663                 while (p < e) {
664                         if ((rt = rt_new(ifp)) == NULL)
665                                 return -1;
666                         memcpy(&gateway.s_addr, p, sizeof(gateway.s_addr));
667                         p += 4;
668                         sa_in_init(&rt->rt_dest, &dest);
669                         sa_in_init(&rt->rt_netmask, &netmask);
670                         sa_in_init(&rt->rt_gateway, &gateway);
671                         if (rt_proto_add(routes, rt))
672                                 n++;
673                 }
674         }
675
676         return n;
677 }
678
679 uint16_t
680 dhcp_get_mtu(const struct interface *ifp)
681 {
682         const struct dhcp_state *state;
683         uint16_t mtu;
684
685         if (ifp->options->mtu)
686                 return (uint16_t)ifp->options->mtu;
687         mtu = 0; /* bogus gcc warning */
688         if ((state = D_CSTATE(ifp)) == NULL ||
689             has_option_mask(ifp->options->nomask, DHO_MTU) ||
690             get_option_uint16(ifp->ctx, &mtu,
691                               state->new, state->new_len, DHO_MTU) == -1)
692                 return 0;
693         return mtu;
694 }
695
696 /* Grab our routers from the DHCP message and apply any MTU value
697  * the message contains */
698 int
699 dhcp_get_routes(rb_tree_t *routes, struct interface *ifp)
700 {
701         const struct dhcp_state *state;
702
703         if ((state = D_CSTATE(ifp)) == NULL || !(state->added & STATE_ADDED))
704                 return 0;
705         return get_option_routes(routes, ifp, state->new, state->new_len);
706 }
707
708 /* Assumes DHCP options */
709 static int
710 dhcp_message_add_addr(struct bootp *bootp,
711     uint8_t type, struct in_addr addr)
712 {
713         uint8_t *p;
714         size_t len;
715
716         p = bootp->vend;
717         while (*p != DHO_END) {
718                 p++;
719                 p += *p + 1;
720         }
721
722         len = (size_t)(p - bootp->vend);
723         if (len + 6 > sizeof(bootp->vend)) {
724                 errno = ENOMEM;
725                 return -1;
726         }
727
728         *p++ = type;
729         *p++ = 4;
730         memcpy(p, &addr.s_addr, 4);
731         p += 4;
732         *p = DHO_END;
733         return 0;
734 }
735
736 static ssize_t
737 make_message(struct bootp **bootpm, const struct interface *ifp, uint8_t type)
738 {
739         struct bootp *bootp;
740         uint8_t *lp, *p, *e;
741         uint8_t *n_params = NULL;
742         uint32_t ul;
743         uint16_t sz;
744         size_t len, i;
745         const struct dhcp_opt *opt;
746         struct if_options *ifo = ifp->options;
747         const struct dhcp_state *state = D_CSTATE(ifp);
748         const struct dhcp_lease *lease = &state->lease;
749         char hbuf[HOSTNAME_MAX_LEN + 1];
750         const char *hostname;
751         const struct vivco *vivco;
752         int mtu;
753 #ifdef AUTH
754         uint8_t *auth, auth_len;
755 #endif
756
757         if ((mtu = if_getmtu(ifp)) == -1)
758                 logerr("%s: if_getmtu", ifp->name);
759         else if (mtu < MTU_MIN) {
760                 if (if_setmtu(ifp, MTU_MIN) == -1)
761                         logerr("%s: if_setmtu", ifp->name);
762                 mtu = MTU_MIN;
763         }
764
765         if (ifo->options & DHCPCD_BOOTP)
766                 bootp = calloc(1, sizeof (*bootp));
767         else
768                 /* Make the maximal message we could send */
769                 bootp = calloc(1, (size_t)(mtu - IP_UDP_SIZE));
770
771         if (bootp == NULL)
772                 return -1;
773         *bootpm = bootp;
774
775         if (state->addr != NULL &&
776             (type == DHCP_INFORM || type == DHCP_RELEASE ||
777             (type == DHCP_REQUEST &&
778             state->addr->mask.s_addr == lease->mask.s_addr &&
779             (state->new == NULL || IS_DHCP(state->new)) &&
780             !(state->added & (STATE_FAKE | STATE_EXPIRED)))))
781                 bootp->ciaddr = state->addr->addr.s_addr;
782
783         bootp->op = BOOTREQUEST;
784         bootp->htype = (uint8_t)ifp->hwtype;
785         if (ifp->hwlen != 0 && ifp->hwlen < sizeof(bootp->chaddr)) {
786                 bootp->hlen = (uint8_t)ifp->hwlen;
787                 memcpy(&bootp->chaddr, &ifp->hwaddr, ifp->hwlen);
788         }
789
790         if (ifo->options & DHCPCD_BROADCAST &&
791             bootp->ciaddr == 0 &&
792             type != DHCP_DECLINE &&
793             type != DHCP_RELEASE)
794                 bootp->flags = htons(BROADCAST_FLAG);
795
796         if (type != DHCP_DECLINE && type != DHCP_RELEASE) {
797                 struct timespec tv;
798                 unsigned long long secs;
799
800                 clock_gettime(CLOCK_MONOTONIC, &tv);
801                 secs = eloop_timespec_diff(&tv, &state->started, NULL);
802                 if (secs > UINT16_MAX)
803                         bootp->secs = htons((uint16_t)UINT16_MAX);
804                 else
805                         bootp->secs = htons((uint16_t)secs);
806         }
807
808         bootp->xid = htonl(state->xid);
809
810         if (ifo->options & DHCPCD_BOOTP)
811                 return sizeof(*bootp);
812
813         p = bootp->vend;
814         e = (uint8_t *)bootp + (mtu - IP_UDP_SIZE) - 1; /* -1 for DHO_END */
815
816         ul = htonl(MAGIC_COOKIE);
817         memcpy(p, &ul, sizeof(ul));
818         p += sizeof(ul);
819
820 #define AREA_LEFT       (size_t)(e - p)
821 #define AREA_FIT(s)     if ((s) > AREA_LEFT) goto toobig
822 #define AREA_CHECK(s)   if ((s) + 2UL > AREA_LEFT) goto toobig
823 #define PUT_ADDR(o, a)  do {            \
824         AREA_CHECK(4);                  \
825         *p++ = (o);                     \
826         *p++ = 4;                       \
827         memcpy(p, &(a)->s_addr, 4);     \
828         p += 4;                         \
829 } while (0 /* CONSTCOND */)
830
831         /* Options are listed in numerical order as per RFC 7844 Section 3.1
832          * XXX: They should be randomised. */
833
834         bool putip = false;
835         if (lease->addr.s_addr && lease->cookie == htonl(MAGIC_COOKIE)) {
836                 if (type == DHCP_DECLINE ||
837                     (type == DHCP_REQUEST &&
838                     (state->addr == NULL ||
839                     state->added & (STATE_FAKE | STATE_EXPIRED) ||
840                     lease->addr.s_addr != state->addr->addr.s_addr)))
841                 {
842                         putip = true;
843                         PUT_ADDR(DHO_IPADDRESS, &lease->addr);
844                 }
845         }
846
847         AREA_CHECK(3);
848         *p++ = DHO_MESSAGETYPE;
849         *p++ = 1;
850         *p++ = type;
851
852         if (lease->addr.s_addr && lease->cookie == htonl(MAGIC_COOKIE)) {
853                 if (type == DHCP_RELEASE || putip) {
854                         if (lease->server.s_addr)
855                                 PUT_ADDR(DHO_SERVERID, &lease->server);
856                 }
857         }
858
859         if (type == DHCP_DECLINE) {
860                 len = strlen(DAD);
861                 if (len > AREA_LEFT) {
862                         *p++ = DHO_MESSAGE;
863                         *p++ = (uint8_t)len;
864                         memcpy(p, DAD, len);
865                         p += len;
866                 }
867         }
868
869 #define DHCP_DIR(type) ((type) == DHCP_DISCOVER || (type) == DHCP_INFORM || \
870     (type) == DHCP_REQUEST)
871
872         if (DHCP_DIR(type)) {
873                 /* vendor is already encoded correctly, so just add it */
874                 if (ifo->vendor[0]) {
875                         AREA_CHECK(ifo->vendor[0]);
876                         *p++ = DHO_VENDOR;
877                         memcpy(p, ifo->vendor, (size_t)ifo->vendor[0] + 1);
878                         p += ifo->vendor[0] + 1;
879                 }
880         }
881
882         if (type == DHCP_DISCOVER && ifo->options & DHCPCD_REQUEST)
883                 PUT_ADDR(DHO_IPADDRESS, &ifo->req_addr);
884
885         if (DHCP_DIR(type)) {
886                 if (type != DHCP_INFORM) {
887                         if (ifo->leasetime != 0) {
888                                 AREA_CHECK(4);
889                                 *p++ = DHO_LEASETIME;
890                                 *p++ = 4;
891                                 ul = htonl(ifo->leasetime);
892                                 memcpy(p, &ul, 4);
893                                 p += 4;
894                         }
895                 }
896
897                 AREA_CHECK(0);
898                 *p++ = DHO_PARAMETERREQUESTLIST;
899                 n_params = p;
900                 *p++ = 0;
901                 for (i = 0, opt = ifp->ctx->dhcp_opts;
902                     i < ifp->ctx->dhcp_opts_len;
903                     i++, opt++)
904                 {
905                         if (!DHC_REQOPT(opt, ifo->requestmask, ifo->nomask))
906                                 continue;
907                         if (type == DHCP_INFORM &&
908                             (opt->option == DHO_RENEWALTIME ||
909                                 opt->option == DHO_REBINDTIME))
910                                 continue;
911                         AREA_FIT(1);
912                         *p++ = (uint8_t)opt->option;
913                 }
914                 for (i = 0, opt = ifo->dhcp_override;
915                     i < ifo->dhcp_override_len;
916                     i++, opt++)
917                 {
918                         /* Check if added above */
919                         for (lp = n_params + 1; lp < p; lp++)
920                                 if (*lp == (uint8_t)opt->option)
921                                         break;
922                         if (lp < p)
923                                 continue;
924                         if (!DHC_REQOPT(opt, ifo->requestmask, ifo->nomask))
925                                 continue;
926                         if (type == DHCP_INFORM &&
927                             (opt->option == DHO_RENEWALTIME ||
928                                 opt->option == DHO_REBINDTIME))
929                                 continue;
930                         AREA_FIT(1);
931                         *p++ = (uint8_t)opt->option;
932                 }
933                 *n_params = (uint8_t)(p - n_params - 1);
934
935                 if (mtu != -1 &&
936                     !(has_option_mask(ifo->nomask, DHO_MAXMESSAGESIZE)))
937                 {
938                         AREA_CHECK(2);
939                         *p++ = DHO_MAXMESSAGESIZE;
940                         *p++ = 2;
941                         sz = htons((uint16_t)(mtu - IP_UDP_SIZE));
942                         memcpy(p, &sz, 2);
943                         p += 2;
944                 }
945
946                 if (ifo->userclass[0] &&
947                     !has_option_mask(ifo->nomask, DHO_USERCLASS))
948                 {
949                         AREA_CHECK(ifo->userclass[0]);
950                         *p++ = DHO_USERCLASS;
951                         memcpy(p, ifo->userclass,
952                             (size_t)ifo->userclass[0] + 1);
953                         p += ifo->userclass[0] + 1;
954                 }
955         }
956
957         if (state->clientid) {
958                 AREA_CHECK(state->clientid[0]);
959                 *p++ = DHO_CLIENTID;
960                 memcpy(p, state->clientid, (size_t)state->clientid[0] + 1);
961                 p += state->clientid[0] + 1;
962         }
963
964         if (DHCP_DIR(type) &&
965             !has_option_mask(ifo->nomask, DHO_VENDORCLASSID) &&
966             ifo->vendorclassid[0])
967         {
968                 AREA_CHECK(ifo->vendorclassid[0]);
969                 *p++ = DHO_VENDORCLASSID;
970                 memcpy(p, ifo->vendorclassid, (size_t)ifo->vendorclassid[0]+1);
971                 p += ifo->vendorclassid[0] + 1;
972         }
973
974         if (type == DHCP_DISCOVER &&
975             !(ifp->ctx->options & DHCPCD_TEST) &&
976             DHC_REQ(ifo->requestmask, ifo->nomask, DHO_RAPIDCOMMIT))
977         {
978                 /* RFC 4039 Section 3 */
979                 AREA_CHECK(0);
980                 *p++ = DHO_RAPIDCOMMIT;
981                 *p++ = 0;
982         }
983
984         if (DHCP_DIR(type)) {
985                 hostname = dhcp_get_hostname(hbuf, sizeof(hbuf), ifo);
986
987                 /*
988                  * RFC4702 3.1 States that if we send the Client FQDN option
989                  * then we MUST NOT also send the Host Name option.
990                  * Technically we could, but that is not RFC conformant and
991                  * also seems to break some DHCP server implemetations such as
992                  * Windows. On the other hand, ISC dhcpd is just as non RFC
993                  * conformant by not accepting a partially qualified FQDN.
994                  */
995                 if (ifo->fqdn != FQDN_DISABLE) {
996                         /* IETF DHC-FQDN option (81), RFC4702 */
997                         i = 3;
998                         if (hostname)
999                                 i += encode_rfc1035(hostname, NULL);
1000                         AREA_CHECK(i);
1001                         *p++ = DHO_FQDN;
1002                         *p++ = (uint8_t)i;
1003                         /*
1004                          * Flags: 0000NEOS
1005                          * S: 1 => Client requests Server to update
1006                          *         a RR in DNS as well as PTR
1007                          * O: 1 => Server indicates to client that
1008                          *         DNS has been updated
1009                          * E: 1 => Name data is DNS format
1010                          * N: 1 => Client requests Server to not
1011                          *         update DNS
1012                          */
1013                         if (hostname)
1014                                 *p++ = (uint8_t)((ifo->fqdn & 0x09) | 0x04);
1015                         else
1016                                 *p++ = (FQDN_NONE & 0x09) | 0x04;
1017                         *p++ = 0; /* from server for PTR RR */
1018                         *p++ = 0; /* from server for A RR if S=1 */
1019                         if (hostname) {
1020                                 i = encode_rfc1035(hostname, p);
1021                                 p += i;
1022                         }
1023                 } else if (ifo->options & DHCPCD_HOSTNAME && hostname) {
1024                         len = strlen(hostname);
1025                         AREA_CHECK(len);
1026                         *p++ = DHO_HOSTNAME;
1027                         *p++ = (uint8_t)len;
1028                         memcpy(p, hostname, len);
1029                         p += len;
1030                 }
1031         }
1032
1033 #ifdef AUTH
1034         auth = NULL;    /* appease GCC */
1035         auth_len = 0;
1036         if (ifo->auth.options & DHCPCD_AUTH_SEND) {
1037                 ssize_t alen = dhcp_auth_encode(ifp->ctx, &ifo->auth,
1038                     state->auth.token,
1039                     NULL, 0, 4, type, NULL, 0);
1040                 if (alen != -1 && alen > UINT8_MAX) {
1041                         errno = ERANGE;
1042                         alen = -1;
1043                 }
1044                 if (alen == -1)
1045                         logerr("%s: dhcp_auth_encode", ifp->name);
1046                 else if (alen != 0) {
1047                         auth_len = (uint8_t)alen;
1048                         AREA_CHECK(auth_len);
1049                         *p++ = DHO_AUTHENTICATION;
1050                         *p++ = auth_len;
1051                         auth = p;
1052                         p += auth_len;
1053                 }
1054         }
1055 #endif
1056
1057         /* RFC 2563 Auto Configure */
1058         if (type == DHCP_DISCOVER && ifo->options & DHCPCD_IPV4LL &&
1059             !(has_option_mask(ifo->nomask, DHO_AUTOCONFIGURE)))
1060         {
1061                 AREA_CHECK(1);
1062                 *p++ = DHO_AUTOCONFIGURE;
1063                 *p++ = 1;
1064                 *p++ = 1;
1065         }
1066
1067         if (DHCP_DIR(type)) {
1068                 if (ifo->mudurl[0]) {
1069                        AREA_CHECK(ifo->mudurl[0]);
1070                        *p++ = DHO_MUDURL;
1071                        memcpy(p, ifo->mudurl, (size_t)ifo->mudurl[0] + 1);
1072                        p += ifo->mudurl[0] + 1;
1073                 }
1074
1075                 if (ifo->vivco_len &&
1076                     !has_option_mask(ifo->nomask, DHO_VIVCO))
1077                 {
1078                         AREA_CHECK(sizeof(ul));
1079                         *p++ = DHO_VIVCO;
1080                         lp = p++;
1081                         *lp = sizeof(ul);
1082                         ul = htonl(ifo->vivco_en);
1083                         memcpy(p, &ul, sizeof(ul));
1084                         p += sizeof(ul);
1085                         for (i = 0, vivco = ifo->vivco;
1086                             i < ifo->vivco_len;
1087                             i++, vivco++)
1088                         {
1089                                 AREA_FIT(vivco->len);
1090                                 if (vivco->len + 2 + *lp > 255) {
1091                                         logerrx("%s: VIVCO option too big",
1092                                             ifp->name);
1093                                         free(bootp);
1094                                         return -1;
1095                                 }
1096                                 *p++ = (uint8_t)vivco->len;
1097                                 memcpy(p, vivco->data, vivco->len);
1098                                 p += vivco->len;
1099                                 *lp = (uint8_t)(*lp + vivco->len + 1);
1100                         }
1101                 }
1102
1103 #ifdef AUTH
1104                 if ((ifo->auth.options & DHCPCD_AUTH_SENDREQUIRE) !=
1105                     DHCPCD_AUTH_SENDREQUIRE &&
1106                     !has_option_mask(ifo->nomask, DHO_FORCERENEW_NONCE))
1107                 {
1108                         /* We support HMAC-MD5 */
1109                         AREA_CHECK(1);
1110                         *p++ = DHO_FORCERENEW_NONCE;
1111                         *p++ = 1;
1112                         *p++ = AUTH_ALG_HMAC_MD5;
1113                 }
1114 #endif
1115         }
1116
1117         *p++ = DHO_END;
1118         len = (size_t)(p - (uint8_t *)bootp);
1119
1120         /* Pad out to the BOOTP message length.
1121          * Even if we send a DHCP packet with a variable length vendor area,
1122          * some servers / relay agents don't like packets smaller than
1123          * a BOOTP message which is fine because that's stipulated
1124          * in RFC1542 section 2.1. */
1125         while (len < sizeof(*bootp)) {
1126                 *p++ = DHO_PAD;
1127                 len++;
1128         }
1129
1130 #ifdef AUTH
1131         if (ifo->auth.options & DHCPCD_AUTH_SEND && auth_len != 0)
1132                 dhcp_auth_encode(ifp->ctx, &ifo->auth, state->auth.token,
1133                     (uint8_t *)bootp, len, 4, type, auth, auth_len);
1134 #endif
1135
1136         return (ssize_t)len;
1137
1138 toobig:
1139         logerrx("%s: DHCP message too big", ifp->name);
1140         free(bootp);
1141         return -1;
1142 }
1143
1144 static size_t
1145 read_lease(struct interface *ifp, struct bootp **bootp)
1146 {
1147         union {
1148                 struct bootp bootp;
1149                 uint8_t buf[FRAMELEN_MAX];
1150         } buf;
1151         struct dhcp_state *state = D_STATE(ifp);
1152         ssize_t sbytes;
1153         size_t bytes;
1154         uint8_t type;
1155 #ifdef AUTH
1156         const uint8_t *auth;
1157         size_t auth_len;
1158 #endif
1159
1160         /* Safety */
1161         *bootp = NULL;
1162
1163         if (state->leasefile[0] == '\0') {
1164                 logdebugx("reading standard input");
1165                 sbytes = read(fileno(stdin), buf.buf, sizeof(buf.buf));
1166         } else {
1167                 logdebugx("%s: reading lease: %s",
1168                     ifp->name, state->leasefile);
1169                 sbytes = dhcp_readfile(ifp->ctx, state->leasefile,
1170                     buf.buf, sizeof(buf.buf));
1171         }
1172         if (sbytes == -1) {
1173                 if (errno != ENOENT)
1174                         logerr("%s: %s", ifp->name, state->leasefile);
1175                 return 0;
1176         }
1177         bytes = (size_t)sbytes;
1178
1179         /* Ensure the packet is at lease BOOTP sized
1180          * with a vendor area of 4 octets
1181          * (it should be more, and our read packet enforces this so this
1182          * code should not be needed, but of course people could
1183          * scribble whatever in the stored lease file. */
1184         if (bytes < DHCP_MIN_LEN) {
1185                 logerrx("%s: %s: truncated lease", ifp->name, __func__);
1186                 return 0;
1187         }
1188
1189         if (ifp->ctx->options & DHCPCD_DUMPLEASE)
1190                 goto out;
1191
1192         /* We may have found a BOOTP server */
1193         if (get_option_uint8(ifp->ctx, &type, &buf.bootp, bytes,
1194             DHO_MESSAGETYPE) == -1)
1195                 type = 0;
1196
1197 #ifdef AUTH
1198         /* Authenticate the message */
1199         auth = get_option(ifp->ctx, &buf.bootp, bytes,
1200             DHO_AUTHENTICATION, &auth_len);
1201         if (auth) {
1202                 if (dhcp_auth_validate(&state->auth, &ifp->options->auth,
1203                     &buf.bootp, bytes, 4, type, auth, auth_len) == NULL)
1204                 {
1205                         logerr("%s: authentication failed", ifp->name);
1206                         return 0;
1207                 }
1208                 if (state->auth.token)
1209                         logdebugx("%s: validated using 0x%08" PRIu32,
1210                             ifp->name, state->auth.token->secretid);
1211                 else
1212                         logdebugx("%s: accepted reconfigure key", ifp->name);
1213         } else if ((ifp->options->auth.options & DHCPCD_AUTH_SENDREQUIRE) ==
1214             DHCPCD_AUTH_SENDREQUIRE)
1215         {
1216                 logerrx("%s: authentication now required", ifp->name);
1217                 return 0;
1218         }
1219 #endif
1220
1221 out:
1222         *bootp = malloc(bytes);
1223         if (*bootp == NULL) {
1224                 logerr(__func__);
1225                 return 0;
1226         }
1227         memcpy(*bootp, buf.buf, bytes);
1228         return bytes;
1229 }
1230
1231 static const struct dhcp_opt *
1232 dhcp_getoverride(const struct if_options *ifo, unsigned int o)
1233 {
1234         size_t i;
1235         const struct dhcp_opt *opt;
1236
1237         for (i = 0, opt = ifo->dhcp_override;
1238             i < ifo->dhcp_override_len;
1239             i++, opt++)
1240         {
1241                 if (opt->option == o)
1242                         return opt;
1243         }
1244         return NULL;
1245 }
1246
1247 static const uint8_t *
1248 dhcp_getoption(struct dhcpcd_ctx *ctx,
1249     size_t *os, unsigned int *code, size_t *len,
1250     const uint8_t *od, size_t ol, struct dhcp_opt **oopt)
1251 {
1252         size_t i;
1253         struct dhcp_opt *opt;
1254
1255         if (od) {
1256                 if (ol < 2) {
1257                         errno = EINVAL;
1258                         return NULL;
1259                 }
1260                 *os = 2; /* code + len */
1261                 *code = (unsigned int)*od++;
1262                 *len = (size_t)*od++;
1263                 if (*len > ol - *os) {
1264                         errno = ERANGE;
1265                         return NULL;
1266                 }
1267         }
1268
1269         *oopt = NULL;
1270         for (i = 0, opt = ctx->dhcp_opts; i < ctx->dhcp_opts_len; i++, opt++) {
1271                 if (opt->option == *code) {
1272                         *oopt = opt;
1273                         break;
1274                 }
1275         }
1276
1277         return od;
1278 }
1279
1280 ssize_t
1281 dhcp_env(FILE *fenv, const char *prefix, const struct interface *ifp,
1282     const struct bootp *bootp, size_t bootp_len)
1283 {
1284         const struct if_options *ifo;
1285         const uint8_t *p;
1286         struct in_addr addr;
1287         struct in_addr net;
1288         struct in_addr brd;
1289         struct dhcp_opt *opt, *vo;
1290         size_t i, pl;
1291         char safe[(BOOTP_FILE_LEN * 4) + 1];
1292         uint8_t overl = 0;
1293         uint32_t en;
1294
1295         ifo = ifp->options;
1296         if (get_option_uint8(ifp->ctx, &overl, bootp, bootp_len,
1297             DHO_OPTSOVERLOADED) == -1)
1298                 overl = 0;
1299
1300         if (bootp->yiaddr || bootp->ciaddr) {
1301                 /* Set some useful variables that we derive from the DHCP
1302                  * message but are not necessarily in the options */
1303                 addr.s_addr = bootp->yiaddr ? bootp->yiaddr : bootp->ciaddr;
1304                 if (efprintf(fenv, "%s_ip_address=%s",
1305                     prefix, inet_ntoa(addr)) == -1)
1306                         return -1;
1307                 if (get_option_addr(ifp->ctx, &net,
1308                     bootp, bootp_len, DHO_SUBNETMASK) == -1) {
1309                         net.s_addr = ipv4_getnetmask(addr.s_addr);
1310                         if (efprintf(fenv, "%s_subnet_mask=%s",
1311                             prefix, inet_ntoa(net)) == -1)
1312                                 return -1;
1313                 }
1314                 if (efprintf(fenv, "%s_subnet_cidr=%d",
1315                     prefix, inet_ntocidr(net))== -1)
1316                         return -1;
1317                 if (get_option_addr(ifp->ctx, &brd,
1318                     bootp, bootp_len, DHO_BROADCAST) == -1)
1319                 {
1320                         brd.s_addr = addr.s_addr | ~net.s_addr;
1321                         if (efprintf(fenv, "%s_broadcast_address=%s",
1322                             prefix, inet_ntoa(brd)) == -1)
1323                                 return -1;
1324                 }
1325                 addr.s_addr = bootp->yiaddr & net.s_addr;
1326                 if (efprintf(fenv, "%s_network_number=%s",
1327                     prefix, inet_ntoa(addr)) == -1)
1328                         return -1;
1329         }
1330
1331         if (*bootp->file && !(overl & 1)) {
1332                 print_string(safe, sizeof(safe), OT_STRING,
1333                     bootp->file, sizeof(bootp->file));
1334                 if (efprintf(fenv, "%s_filename=%s", prefix, safe) == -1)
1335                         return -1;
1336         }
1337         if (*bootp->sname && !(overl & 2)) {
1338                 print_string(safe, sizeof(safe), OT_STRING | OT_DOMAIN,
1339                     bootp->sname, sizeof(bootp->sname));
1340                 if (efprintf(fenv, "%s_server_name=%s", prefix, safe) == -1)
1341                         return -1;
1342         }
1343
1344         /* Zero our indexes */
1345         for (i = 0, opt = ifp->ctx->dhcp_opts;
1346             i < ifp->ctx->dhcp_opts_len;
1347             i++, opt++)
1348                 dhcp_zero_index(opt);
1349         for (i = 0, opt = ifp->options->dhcp_override;
1350             i < ifp->options->dhcp_override_len;
1351             i++, opt++)
1352                 dhcp_zero_index(opt);
1353         for (i = 0, opt = ifp->ctx->vivso;
1354             i < ifp->ctx->vivso_len;
1355             i++, opt++)
1356                 dhcp_zero_index(opt);
1357
1358         for (i = 0, opt = ifp->ctx->dhcp_opts;
1359             i < ifp->ctx->dhcp_opts_len;
1360             i++, opt++)
1361         {
1362                 if (has_option_mask(ifo->nomask, opt->option))
1363                         continue;
1364                 if (dhcp_getoverride(ifo, opt->option))
1365                         continue;
1366                 p = get_option(ifp->ctx, bootp, bootp_len, opt->option, &pl);
1367                 if (p == NULL)
1368                         continue;
1369                 dhcp_envoption(ifp->ctx, fenv, prefix, ifp->name,
1370                     opt, dhcp_getoption, p, pl);
1371
1372                 if (opt->option != DHO_VIVSO || pl <= (int)sizeof(uint32_t))
1373                         continue;
1374                 memcpy(&en, p, sizeof(en));
1375                 en = ntohl(en);
1376                 vo = vivso_find(en, ifp);
1377                 if (vo == NULL)
1378                         continue;
1379                 /* Skip over en + total size */
1380                 p += sizeof(en) + 1;
1381                 pl -= sizeof(en) + 1;
1382                 dhcp_envoption(ifp->ctx, fenv, prefix, ifp->name,
1383                     vo, dhcp_getoption, p, pl);
1384         }
1385
1386         for (i = 0, opt = ifo->dhcp_override;
1387             i < ifo->dhcp_override_len;
1388             i++, opt++)
1389         {
1390                 if (has_option_mask(ifo->nomask, opt->option))
1391                         continue;
1392                 p = get_option(ifp->ctx, bootp, bootp_len, opt->option, &pl);
1393                 if (p == NULL)
1394                         continue;
1395                 dhcp_envoption(ifp->ctx, fenv, prefix, ifp->name,
1396                     opt, dhcp_getoption, p, pl);
1397         }
1398
1399         return 1;
1400 }
1401
1402 static void
1403 get_lease(struct interface *ifp,
1404     struct dhcp_lease *lease, const struct bootp *bootp, size_t len)
1405 {
1406         struct dhcpcd_ctx *ctx;
1407
1408         assert(bootp != NULL);
1409
1410         memcpy(&lease->cookie, bootp->vend, sizeof(lease->cookie));
1411         /* BOOTP does not set yiaddr for replies when ciaddr is set. */
1412         lease->addr.s_addr = bootp->yiaddr ? bootp->yiaddr : bootp->ciaddr;
1413         ctx = ifp->ctx;
1414         if (ifp->options->options & (DHCPCD_STATIC | DHCPCD_INFORM)) {
1415                 if (ifp->options->req_addr.s_addr != INADDR_ANY) {
1416                         lease->mask = ifp->options->req_mask;
1417                         if (ifp->options->req_brd.s_addr != INADDR_ANY)
1418                                 lease->brd = ifp->options->req_brd;
1419                         else
1420                                 lease->brd.s_addr =
1421                                     lease->addr.s_addr | ~lease->mask.s_addr;
1422                 } else {
1423                         const struct ipv4_addr *ia;
1424
1425                         ia = ipv4_iffindaddr(ifp, &lease->addr, NULL);
1426                         assert(ia != NULL);
1427                         lease->mask = ia->mask;
1428                         lease->brd = ia->brd;
1429                 }
1430         } else {
1431                 if (get_option_addr(ctx, &lease->mask, bootp, len,
1432                     DHO_SUBNETMASK) == -1)
1433                         lease->mask.s_addr =
1434                             ipv4_getnetmask(lease->addr.s_addr);
1435                 if (get_option_addr(ctx, &lease->brd, bootp, len,
1436                     DHO_BROADCAST) == -1)
1437                         lease->brd.s_addr =
1438                             lease->addr.s_addr | ~lease->mask.s_addr;
1439         }
1440         if (get_option_uint32(ctx, &lease->leasetime,
1441             bootp, len, DHO_LEASETIME) != 0)
1442                 lease->leasetime = DHCP_INFINITE_LIFETIME;
1443         if (get_option_uint32(ctx, &lease->renewaltime,
1444             bootp, len, DHO_RENEWALTIME) != 0)
1445                 lease->renewaltime = 0;
1446         if (get_option_uint32(ctx, &lease->rebindtime,
1447             bootp, len, DHO_REBINDTIME) != 0)
1448                 lease->rebindtime = 0;
1449         if (get_option_addr(ctx, &lease->server, bootp, len, DHO_SERVERID) != 0)
1450                 lease->server.s_addr = INADDR_ANY;
1451 }
1452
1453 static const char *
1454 get_dhcp_op(uint8_t type)
1455 {
1456         const struct dhcp_op *d;
1457
1458         for (d = dhcp_ops; d->name; d++)
1459                 if (d->value == type)
1460                         return d->name;
1461         return NULL;
1462 }
1463
1464 static void
1465 dhcp_fallback(void *arg)
1466 {
1467         struct interface *iface;
1468
1469         iface = (struct interface *)arg;
1470         dhcpcd_selectprofile(iface, iface->options->fallback);
1471         dhcpcd_startinterface(iface);
1472 }
1473
1474 static void
1475 dhcp_new_xid(struct interface *ifp)
1476 {
1477         struct dhcp_state *state;
1478         const struct interface *ifp1;
1479         const struct dhcp_state *state1;
1480
1481         state = D_STATE(ifp);
1482         if (ifp->options->options & DHCPCD_XID_HWADDR &&
1483             ifp->hwlen >= sizeof(state->xid))
1484                 /* The lower bits are probably more unique on the network */
1485                 memcpy(&state->xid,
1486                     (ifp->hwaddr + ifp->hwlen) - sizeof(state->xid),
1487                     sizeof(state->xid));
1488         else {
1489 again:
1490                 state->xid = arc4random();
1491         }
1492
1493         /* Ensure it's unique */
1494         TAILQ_FOREACH(ifp1, ifp->ctx->ifaces, next) {
1495                 if (ifp == ifp1)
1496                         continue;
1497                 if ((state1 = D_CSTATE(ifp1)) == NULL)
1498                         continue;
1499                 if (state1->xid == state->xid)
1500                         break;
1501         }
1502         if (ifp1 != NULL) {
1503                 if (ifp->options->options & DHCPCD_XID_HWADDR &&
1504                     ifp->hwlen >= sizeof(state->xid))
1505                 {
1506                         logerrx("%s: duplicate xid on %s",
1507                             ifp->name, ifp1->name);
1508                             return;
1509                 }
1510                 goto again;
1511         }
1512
1513         /* We can't do this when sharing leases across interfaes */
1514 #if 0
1515         /* As the XID changes, re-apply the filter. */
1516         if (state->bpf_fd != -1) {
1517                 if (bpf_bootp(ifp, state->bpf_fd) == -1)
1518                         logerr(__func__); /* try to continue */
1519         }
1520 #endif
1521 }
1522
1523 static void
1524 dhcp_closebpf(struct interface *ifp)
1525 {
1526         struct dhcpcd_ctx *ctx = ifp->ctx;
1527         struct dhcp_state *state = D_STATE(ifp);
1528
1529 #ifdef PRIVSEP
1530         if (IN_PRIVSEP_SE(ctx))
1531                 ps_bpf_closebootp(ifp);
1532 #endif
1533
1534         if (state->bpf != NULL) {
1535                 eloop_event_delete(ctx->eloop, state->bpf->bpf_fd);
1536                 bpf_close(state->bpf);
1537                 state->bpf = NULL;
1538         }
1539 }
1540
1541 static void
1542 dhcp_closeinet(struct interface *ifp)
1543 {
1544         struct dhcpcd_ctx *ctx = ifp->ctx;
1545         struct dhcp_state *state = D_STATE(ifp);
1546
1547 #ifdef PRIVSEP
1548         if (IN_PRIVSEP_SE(ctx)) {
1549                 if (state->addr != NULL)
1550                         ps_inet_closebootp(state->addr);
1551         }
1552 #endif
1553
1554         if (state->udp_rfd != -1) {
1555                 eloop_event_delete(ctx->eloop, state->udp_rfd);
1556                 close(state->udp_rfd);
1557                 state->udp_rfd = -1;
1558         }
1559 }
1560
1561 void
1562 dhcp_close(struct interface *ifp)
1563 {
1564         struct dhcp_state *state = D_STATE(ifp);
1565
1566         if (state == NULL)
1567                 return;
1568
1569         dhcp_closebpf(ifp);
1570         dhcp_closeinet(ifp);
1571
1572         state->interval = 0;
1573 }
1574
1575 int
1576 dhcp_openudp(struct in_addr *ia)
1577 {
1578         int s;
1579         struct sockaddr_in sin;
1580         int n;
1581
1582         if ((s = xsocket(PF_INET, SOCK_DGRAM | SOCK_CXNB, IPPROTO_UDP)) == -1)
1583                 return -1;
1584
1585         n = 1;
1586         if (setsockopt(s, SOL_SOCKET, SO_REUSEADDR, &n, sizeof(n)) == -1)
1587                 goto errexit;
1588 #ifdef IP_RECVIF
1589         if (setsockopt(s, IPPROTO_IP, IP_RECVIF, &n, sizeof(n)) == -1)
1590                 goto errexit;
1591 #else
1592         if (setsockopt(s, IPPROTO_IP, IP_RECVPKTINFO, &n, sizeof(n)) == -1)
1593                 goto errexit;
1594 #endif
1595 #ifdef SO_RERROR
1596         if (setsockopt(s, SOL_SOCKET, SO_RERROR, &n, sizeof(n)) == -1)
1597                 goto errexit;
1598 #endif
1599
1600         memset(&sin, 0, sizeof(sin));
1601         sin.sin_family = AF_INET;
1602         sin.sin_port = htons(BOOTPC);
1603         if (ia != NULL)
1604                 sin.sin_addr = *ia;
1605         if (bind(s, (struct sockaddr *)&sin, sizeof(sin)) == -1)
1606                 goto errexit;
1607
1608         return s;
1609
1610 errexit:
1611         close(s);
1612         return -1;
1613 }
1614
1615 static uint16_t
1616 in_cksum(const void *data, size_t len, uint32_t *isum)
1617 {
1618         const uint16_t *word = data;
1619         uint32_t sum = isum != NULL ? *isum : 0;
1620
1621         for (; len > 1; len -= sizeof(*word))
1622                 sum += *word++;
1623
1624         if (len == 1)
1625                 sum += htons((uint16_t)(*(const uint8_t *)word << 8));
1626
1627         if (isum != NULL)
1628                 *isum = sum;
1629
1630         sum = (sum >> 16) + (sum & 0xffff);
1631         sum += (sum >> 16);
1632
1633         return (uint16_t)~sum;
1634 }
1635
1636 static struct bootp_pkt *
1637 dhcp_makeudppacket(size_t *sz, const uint8_t *data, size_t length,
1638         struct in_addr source, struct in_addr dest)
1639 {
1640         struct bootp_pkt *udpp;
1641         struct ip *ip;
1642         struct udphdr *udp;
1643
1644         if ((udpp = calloc(1, sizeof(*ip) + sizeof(*udp) + length)) == NULL)
1645                 return NULL;
1646         ip = &udpp->ip;
1647         udp = &udpp->udp;
1648
1649         /* OK, this is important :)
1650          * We copy the data to our packet and then create a small part of the
1651          * ip structure and an invalid ip_len (basically udp length).
1652          * We then fill the udp structure and put the checksum
1653          * of the whole packet into the udp checksum.
1654          * Finally we complete the ip structure and ip checksum.
1655          * If we don't do the ordering like so then the udp checksum will be
1656          * broken, so find another way of doing it! */
1657
1658         memcpy(&udpp->bootp, data, length);
1659
1660         ip->ip_p = IPPROTO_UDP;
1661         ip->ip_src.s_addr = source.s_addr;
1662         if (dest.s_addr == 0)
1663                 ip->ip_dst.s_addr = INADDR_BROADCAST;
1664         else
1665                 ip->ip_dst.s_addr = dest.s_addr;
1666
1667         udp->uh_sport = htons(BOOTPC);
1668         udp->uh_dport = htons(BOOTPS);
1669         udp->uh_ulen = htons((uint16_t)(sizeof(*udp) + length));
1670         ip->ip_len = udp->uh_ulen;
1671         udp->uh_sum = in_cksum(udpp, sizeof(*ip) + sizeof(*udp) + length, NULL);
1672
1673         ip->ip_v = IPVERSION;
1674         ip->ip_hl = sizeof(*ip) >> 2;
1675         ip->ip_id = (uint16_t)arc4random_uniform(UINT16_MAX);
1676         ip->ip_ttl = IPDEFTTL;
1677         ip->ip_len = htons((uint16_t)(sizeof(*ip) + sizeof(*udp) + length));
1678         ip->ip_sum = in_cksum(ip, sizeof(*ip), NULL);
1679         if (ip->ip_sum == 0)
1680                 ip->ip_sum = 0xffff; /* RFC 768 */
1681
1682         *sz = sizeof(*ip) + sizeof(*udp) + length;
1683         return udpp;
1684 }
1685
1686 static ssize_t
1687 dhcp_sendudp(struct interface *ifp, struct in_addr *to, void *data, size_t len)
1688 {
1689         struct sockaddr_in sin = {
1690                 .sin_family = AF_INET,
1691                 .sin_addr = *to,
1692                 .sin_port = htons(BOOTPS),
1693 #ifdef HAVE_SA_LEN
1694                 .sin_len = sizeof(sin),
1695 #endif
1696         };
1697         struct udphdr udp = {
1698             .uh_sport = htons(BOOTPC),
1699             .uh_dport = htons(BOOTPS),
1700             .uh_ulen = htons((uint16_t)(sizeof(udp) + len)),
1701         };
1702         struct iovec iov[] = {
1703             { .iov_base = &udp, .iov_len = sizeof(udp), },
1704             { .iov_base = data, .iov_len = len, },
1705         };
1706         struct msghdr msg = {
1707                 .msg_name = (void *)&sin,
1708                 .msg_namelen = sizeof(sin),
1709                 .msg_iov = iov,
1710                 .msg_iovlen = __arraycount(iov),
1711         };
1712         struct dhcpcd_ctx *ctx = ifp->ctx;
1713
1714 #ifdef PRIVSEP
1715         if (ctx->options & DHCPCD_PRIVSEP)
1716                 return ps_inet_sendbootp(ifp, &msg);
1717 #endif
1718         return sendmsg(ctx->udp_wfd, &msg, 0);
1719 }
1720
1721 static void
1722 send_message(struct interface *ifp, uint8_t type,
1723     void (*callback)(void *))
1724 {
1725         struct dhcp_state *state = D_STATE(ifp);
1726         struct if_options *ifo = ifp->options;
1727         struct bootp *bootp;
1728         struct bootp_pkt *udp;
1729         size_t len, ulen;
1730         ssize_t r;
1731         struct in_addr from, to;
1732         unsigned int RT;
1733
1734         if (callback == NULL) {
1735                 /* No carrier? Don't bother sending the packet. */
1736                 if (!if_is_link_up(ifp))
1737                         return;
1738                 logdebugx("%s: sending %s with xid 0x%x",
1739                     ifp->name,
1740                     ifo->options & DHCPCD_BOOTP ? "BOOTP" : get_dhcp_op(type),
1741                     state->xid);
1742                 RT = 0; /* bogus gcc warning */
1743         } else {
1744                 if (state->interval == 0)
1745                         state->interval = 4;
1746                 else {
1747                         state->interval *= 2;
1748                         if (state->interval > 64)
1749                                 state->interval = 64;
1750                 }
1751                 RT = (state->interval * MSEC_PER_SEC) +
1752                     (arc4random_uniform(MSEC_PER_SEC * 2) - MSEC_PER_SEC);
1753                 /* No carrier? Don't bother sending the packet.
1754                  * However, we do need to advance the timeout. */
1755                 if (!if_is_link_up(ifp))
1756                         goto fail;
1757                 logdebugx("%s: sending %s (xid 0x%x), next in %0.1f seconds",
1758                     ifp->name,
1759                     ifo->options & DHCPCD_BOOTP ? "BOOTP" : get_dhcp_op(type),
1760                     state->xid,
1761                     (float)RT / MSEC_PER_SEC);
1762         }
1763
1764         r = make_message(&bootp, ifp, type);
1765         if (r == -1)
1766                 goto fail;
1767         len = (size_t)r;
1768
1769         if (!(state->added & (STATE_FAKE | STATE_EXPIRED)) &&
1770             state->addr != NULL &&
1771             ipv4_iffindaddr(ifp, &state->lease.addr, NULL) != NULL)
1772                 from.s_addr = state->lease.addr.s_addr;
1773         else
1774                 from.s_addr = INADDR_ANY;
1775         if (from.s_addr != INADDR_ANY &&
1776             state->lease.server.s_addr != INADDR_ANY)
1777                 to.s_addr = state->lease.server.s_addr;
1778         else
1779                 to.s_addr = INADDR_BROADCAST;
1780
1781         /*
1782          * If not listening on the unspecified address we can
1783          * only receive broadcast messages via BPF.
1784          * Sockets bound to an address cannot receive broadcast messages
1785          * even if they are setup to send them.
1786          * Broadcasting from UDP is only an optimisation for rebinding
1787          * and on BSD, at least, is reliant on the subnet route being
1788          * correctly configured to receive the unicast reply.
1789          * As such, we always broadcast and receive the reply to it via BPF.
1790          * This also guarantees we have a DHCP server attached to the
1791          * interface we want to configure because we can't dictate the
1792          * interface via IP_PKTINFO unlike for IPv6.
1793          */
1794         if (to.s_addr != INADDR_BROADCAST) {
1795                 if (dhcp_sendudp(ifp, &to, bootp, len) != -1)
1796                         goto out;
1797                 logerr("%s: dhcp_sendudp", ifp->name);
1798         }
1799
1800         if (dhcp_openbpf(ifp) == -1)
1801                 goto out;
1802
1803         udp = dhcp_makeudppacket(&ulen, (uint8_t *)bootp, len, from, to);
1804         if (udp == NULL) {
1805                 logerr("%s: dhcp_makeudppacket", ifp->name);
1806                 r = 0;
1807 #ifdef PRIVSEP
1808         } else if (ifp->ctx->options & DHCPCD_PRIVSEP) {
1809                 r = ps_bpf_sendbootp(ifp, udp, ulen);
1810                 free(udp);
1811 #endif
1812         } else {
1813                 r = bpf_send(state->bpf, ETHERTYPE_IP, udp, ulen);
1814                 free(udp);
1815         }
1816         /* If we failed to send a raw packet this normally means
1817          * we don't have the ability to work beneath the IP layer
1818          * for this interface.
1819          * As such we remove it from consideration without actually
1820          * stopping the interface. */
1821         if (r == -1) {
1822                 logerr("%s: bpf_send", ifp->name);
1823                 switch(errno) {
1824                 case ENETDOWN:
1825                 case ENETRESET:
1826                 case ENETUNREACH:
1827                 case ENOBUFS:
1828                         break;
1829                 default:
1830                         if (!(ifp->ctx->options & DHCPCD_TEST))
1831                                 dhcp_drop(ifp, "FAIL");
1832                         eloop_timeout_delete(ifp->ctx->eloop,
1833                             NULL, ifp);
1834                         callback = NULL;
1835                 }
1836         }
1837
1838 out:
1839         free(bootp);
1840
1841 fail:
1842         /* Even if we fail to send a packet we should continue as we are
1843          * as our failure timeouts will change out codepath when needed. */
1844         if (callback != NULL)
1845                 eloop_timeout_add_msec(ifp->ctx->eloop, RT, callback, ifp);
1846 }
1847
1848 static void
1849 send_inform(void *arg)
1850 {
1851
1852         send_message((struct interface *)arg, DHCP_INFORM, send_inform);
1853 }
1854
1855 static void
1856 send_discover(void *arg)
1857 {
1858
1859         send_message((struct interface *)arg, DHCP_DISCOVER, send_discover);
1860 }
1861
1862 static void
1863 send_request(void *arg)
1864 {
1865
1866         send_message((struct interface *)arg, DHCP_REQUEST, send_request);
1867 }
1868
1869 static void
1870 send_renew(void *arg)
1871 {
1872
1873         send_message((struct interface *)arg, DHCP_REQUEST, send_renew);
1874 }
1875
1876 static void
1877 send_rebind(void *arg)
1878 {
1879
1880         send_message((struct interface *)arg, DHCP_REQUEST, send_rebind);
1881 }
1882
1883 void
1884 dhcp_discover(void *arg)
1885 {
1886         struct interface *ifp = arg;
1887         struct dhcp_state *state = D_STATE(ifp);
1888         struct if_options *ifo = ifp->options;
1889
1890         state->state = DHS_DISCOVER;
1891         dhcp_new_xid(ifp);
1892         eloop_timeout_delete(ifp->ctx->eloop, NULL, ifp);
1893         if (!(state->added & STATE_EXPIRED)) {
1894                 if (ifo->fallback)
1895                         eloop_timeout_add_sec(ifp->ctx->eloop,
1896                             ifo->reboot, dhcp_fallback, ifp);
1897 #ifdef IPV4LL
1898                 else if (ifo->options & DHCPCD_IPV4LL)
1899                         eloop_timeout_add_sec(ifp->ctx->eloop,
1900                             ifo->reboot, ipv4ll_start, ifp);
1901 #endif
1902         }
1903         if (ifo->options & DHCPCD_REQUEST)
1904                 loginfox("%s: soliciting a DHCP lease (requesting %s)",
1905                     ifp->name, inet_ntoa(ifo->req_addr));
1906         else
1907                 loginfox("%s: soliciting a %s lease",
1908                     ifp->name, ifo->options & DHCPCD_BOOTP ? "BOOTP" : "DHCP");
1909         send_discover(ifp);
1910 }
1911
1912 static void
1913 dhcp_request(void *arg)
1914 {
1915         struct interface *ifp = arg;
1916         struct dhcp_state *state = D_STATE(ifp);
1917
1918         state->state = DHS_REQUEST;
1919         send_request(ifp);
1920 }
1921
1922 static void
1923 dhcp_expire(void *arg)
1924 {
1925         struct interface *ifp = arg;
1926         struct dhcp_state *state = D_STATE(ifp);
1927
1928         if (ifp->options->options & DHCPCD_LASTLEASE_EXTEND) {
1929                 logwarnx("%s: DHCP lease expired, extending lease", ifp->name);
1930                 state->added |= STATE_EXPIRED;
1931         } else {
1932                 logerrx("%s: DHCP lease expired", ifp->name);
1933                 dhcp_drop(ifp, "EXPIRE");
1934                 dhcp_unlink(ifp->ctx, state->leasefile);
1935         }
1936         state->interval = 0;
1937         dhcp_discover(ifp);
1938 }
1939
1940 #if defined(ARP) || defined(IN_IFF_DUPLICATED)
1941 static void
1942 dhcp_decline(struct interface *ifp)
1943 {
1944
1945         send_message(ifp, DHCP_DECLINE, NULL);
1946 }
1947 #endif
1948
1949 static void
1950 dhcp_startrenew(void *arg)
1951 {
1952         struct interface *ifp = arg;
1953         struct dhcp_state *state;
1954         struct dhcp_lease *lease;
1955
1956         if ((state = D_STATE(ifp)) == NULL)
1957                 return;
1958
1959         /* Only renew in the bound or renew states */
1960         if (state->state != DHS_BOUND &&
1961             state->state != DHS_RENEW)
1962                 return;
1963
1964         /* Remove the timeout as the renew may have been forced. */
1965         eloop_timeout_delete(ifp->ctx->eloop, dhcp_startrenew, ifp);
1966
1967         lease = &state->lease;
1968         logdebugx("%s: renewing lease of %s", ifp->name,
1969             inet_ntoa(lease->addr));
1970         state->state = DHS_RENEW;
1971         dhcp_new_xid(ifp);
1972         state->interval = 0;
1973         send_renew(ifp);
1974 }
1975
1976 void
1977 dhcp_renew(struct interface *ifp)
1978 {
1979
1980         dhcp_startrenew(ifp);
1981 }
1982
1983 static void
1984 dhcp_rebind(void *arg)
1985 {
1986         struct interface *ifp = arg;
1987         struct dhcp_state *state = D_STATE(ifp);
1988         struct dhcp_lease *lease = &state->lease;
1989
1990         logwarnx("%s: failed to renew DHCP, rebinding", ifp->name);
1991         logdebugx("%s: expire in %"PRIu32" seconds",
1992             ifp->name, lease->leasetime - lease->rebindtime);
1993         state->state = DHS_REBIND;
1994         eloop_timeout_delete(ifp->ctx->eloop, send_renew, ifp);
1995         state->lease.server.s_addr = INADDR_ANY;
1996         state->interval = 0;
1997         ifp->options->options &= ~(DHCPCD_CSR_WARNED |
1998             DHCPCD_ROUTER_HOST_ROUTE_WARNED);
1999         send_rebind(ifp);
2000 }
2001
2002 #if defined(ARP) || defined(IN_IFF_DUPLICATED)
2003 static void
2004 dhcp_finish_dad(struct interface *ifp, struct in_addr *ia)
2005 {
2006         struct dhcp_state *state = D_STATE(ifp);
2007
2008         if (state->state != DHS_PROBE)
2009                 return;
2010         if (state->offer == NULL || state->offer->yiaddr != ia->s_addr)
2011                 return;
2012
2013         logdebugx("%s: DAD completed for %s", ifp->name, inet_ntoa(*ia));
2014         if (!(ifp->options->options & DHCPCD_INFORM))
2015                 dhcp_bind(ifp);
2016 #ifndef IN_IFF_DUPLICATED
2017         else {
2018                 struct bootp *bootp;
2019                 size_t len;
2020
2021                 bootp = state->new;
2022                 len = state->new_len;
2023                 state->new = state->offer;
2024                 state->new_len = state->offer_len;
2025                 get_lease(ifp, &state->lease, state->new, state->new_len);
2026                 ipv4_applyaddr(ifp);
2027                 state->new = bootp;
2028                 state->new_len = len;
2029         }
2030 #endif
2031
2032 #ifdef IPV4LL
2033         /* Stop IPv4LL now we have a working DHCP address */
2034         ipv4ll_drop(ifp);
2035 #endif
2036
2037         if (ifp->options->options & DHCPCD_INFORM)
2038                 dhcp_inform(ifp);
2039 }
2040
2041
2042 static bool
2043 dhcp_addr_duplicated(struct interface *ifp, struct in_addr *ia)
2044 {
2045         struct dhcp_state *state = D_STATE(ifp);
2046         unsigned long long opts = ifp->options->options;
2047         struct dhcpcd_ctx *ctx = ifp->ctx;
2048         bool deleted = false;
2049 #ifdef IN_IFF_DUPLICATED
2050         struct ipv4_addr *iap;
2051 #endif
2052
2053         if ((state->offer == NULL || state->offer->yiaddr != ia->s_addr) &&
2054             !IN_ARE_ADDR_EQUAL(ia, &state->lease.addr))
2055                 return deleted;
2056
2057         /* RFC 2131 3.1.5, Client-server interaction */
2058         logerrx("%s: DAD detected %s", ifp->name, inet_ntoa(*ia));
2059         dhcp_unlink(ifp->ctx, state->leasefile);
2060         if (!(opts & DHCPCD_STATIC) && !state->lease.frominfo)
2061                 dhcp_decline(ifp);
2062 #ifdef IN_IFF_DUPLICATED
2063         if ((iap = ipv4_iffindaddr(ifp, ia, NULL)) != NULL) {
2064                 ipv4_deladdr(iap, 0);
2065                 deleted = true;
2066         }
2067 #endif
2068         eloop_timeout_delete(ctx->eloop, NULL, ifp);
2069         if (opts & (DHCPCD_STATIC | DHCPCD_INFORM)) {
2070                 state->reason = "EXPIRE";
2071                 script_runreason(ifp, state->reason);
2072 #define NOT_ONLY_SELF (DHCPCD_MASTER | DHCPCD_IPV6RS | DHCPCD_DHCP6)
2073                 if (!(ctx->options & NOT_ONLY_SELF))
2074                         eloop_exit(ifp->ctx->eloop, EXIT_FAILURE);
2075                 return deleted;
2076         }
2077         eloop_timeout_add_sec(ifp->ctx->eloop,
2078             DHCP_RAND_MAX, dhcp_discover, ifp);
2079         return deleted;
2080 }
2081 #endif
2082
2083 #ifdef ARP
2084 #ifdef KERNEL_RFC5227
2085 #ifdef ARPING
2086 static void
2087 dhcp_arp_announced(struct arp_state *state)
2088 {
2089
2090         arp_free(state);
2091 }
2092 #endif
2093 #else
2094 static void
2095 dhcp_arp_defend_failed(struct arp_state *astate)
2096 {
2097         struct interface *ifp = astate->iface;
2098
2099         dhcp_drop(ifp, "EXPIRED");
2100         dhcp_start1(ifp);
2101 }
2102 #endif
2103
2104 #if !defined(KERNEL_RFC5227) || defined(ARPING)
2105 static void dhcp_arp_not_found(struct arp_state *);
2106
2107 static struct arp_state *
2108 dhcp_arp_new(struct interface *ifp, struct in_addr *addr)
2109 {
2110         struct arp_state *astate;
2111
2112         astate = arp_new(ifp, addr);
2113         if (astate == NULL)
2114                 return NULL;
2115
2116         astate->found_cb = dhcp_arp_found;
2117         astate->not_found_cb = dhcp_arp_not_found;
2118 #ifdef KERNEL_RFC5227
2119         astate->announced_cb = dhcp_arp_announced;
2120 #else
2121         astate->announced_cb = NULL;
2122         astate->defend_failed_cb = dhcp_arp_defend_failed;
2123 #endif
2124         return astate;
2125 }
2126 #endif
2127
2128 #ifdef ARPING
2129 static int
2130 dhcp_arping(struct interface *ifp)
2131 {
2132         struct dhcp_state *state;
2133         struct if_options *ifo;
2134         struct arp_state *astate;
2135         struct in_addr addr;
2136
2137         state = D_STATE(ifp);
2138         ifo = ifp->options;
2139
2140         if (ifo->arping_len == 0 || state->arping_index > ifo->arping_len)
2141                 return 0;
2142
2143         if (state->arping_index + 1 == ifo->arping_len) {
2144                 state->arping_index++;
2145                 dhcpcd_startinterface(ifp);
2146                 return 1;
2147         }
2148
2149         addr.s_addr = ifo->arping[++state->arping_index];
2150         astate = dhcp_arp_new(ifp, &addr);
2151         if (astate == NULL) {
2152                 logerr(__func__);
2153                 return -1;
2154         }
2155         arp_probe(astate);
2156         return 1;
2157 }
2158 #endif
2159
2160 #if !defined(KERNEL_RFC5227) || defined(ARPING)
2161 static void
2162 dhcp_arp_not_found(struct arp_state *astate)
2163 {
2164         struct interface *ifp;
2165
2166         ifp = astate->iface;
2167 #ifdef ARPING
2168         if (dhcp_arping(ifp) == 1) {
2169                 arp_free(astate);
2170                 return;
2171         }
2172 #endif
2173
2174         dhcp_finish_dad(ifp, &astate->addr);
2175 }
2176
2177 static void
2178 dhcp_arp_found(struct arp_state *astate, const struct arp_msg *amsg)
2179 {
2180         struct in_addr addr;
2181         struct interface *ifp = astate->iface;
2182 #ifdef ARPING
2183         struct dhcp_state *state;
2184         struct if_options *ifo;
2185
2186         state = D_STATE(ifp);
2187
2188         ifo = ifp->options;
2189         if (state->arping_index != -1 &&
2190             state->arping_index < ifo->arping_len &&
2191             amsg &&
2192             amsg->sip.s_addr == ifo->arping[state->arping_index])
2193         {
2194                 char buf[HWADDR_LEN * 3];
2195
2196                 hwaddr_ntoa(amsg->sha, ifp->hwlen, buf, sizeof(buf));
2197                 if (dhcpcd_selectprofile(ifp, buf) == -1 &&
2198                     dhcpcd_selectprofile(ifp, inet_ntoa(amsg->sip)) == -1)
2199                 {
2200                         /* We didn't find a profile for this
2201                          * address or hwaddr, so move to the next
2202                          * arping profile */
2203                         dhcp_arp_not_found(astate);
2204                         return;
2205                 }
2206                 arp_free(astate);
2207                 eloop_timeout_delete(ifp->ctx->eloop, NULL, ifp);
2208                 dhcpcd_startinterface(ifp);
2209                 return;
2210         }
2211 #else
2212         UNUSED(amsg);
2213 #endif
2214
2215         addr = astate->addr;
2216         arp_free(astate);
2217         dhcp_addr_duplicated(ifp, &addr);
2218 }
2219 #endif
2220
2221 #endif /* ARP */
2222
2223 void
2224 dhcp_bind(struct interface *ifp)
2225 {
2226         struct dhcpcd_ctx *ctx = ifp->ctx;
2227         struct dhcp_state *state = D_STATE(ifp);
2228         struct if_options *ifo = ifp->options;
2229         struct dhcp_lease *lease = &state->lease;
2230         uint8_t old_state;
2231
2232         state->reason = NULL;
2233         /* If we don't have an offer, we are re-binding a lease on preference,
2234          * normally when two interfaces have a lease matching IP addresses. */
2235         if (state->offer) {
2236                 free(state->old);
2237                 state->old = state->new;
2238                 state->old_len = state->new_len;
2239                 state->new = state->offer;
2240                 state->new_len = state->offer_len;
2241                 state->offer = NULL;
2242                 state->offer_len = 0;
2243         }
2244         get_lease(ifp, lease, state->new, state->new_len);
2245         if (ifo->options & DHCPCD_STATIC) {
2246                 loginfox("%s: using static address %s/%d",
2247                     ifp->name, inet_ntoa(lease->addr),
2248                     inet_ntocidr(lease->mask));
2249                 lease->leasetime = DHCP_INFINITE_LIFETIME;
2250                 state->reason = "STATIC";
2251         } else if (ifo->options & DHCPCD_INFORM) {
2252                 loginfox("%s: received approval for %s",
2253                     ifp->name, inet_ntoa(lease->addr));
2254                 lease->leasetime = DHCP_INFINITE_LIFETIME;
2255                 state->reason = "INFORM";
2256         } else {
2257                 if (lease->frominfo)
2258                         state->reason = "TIMEOUT";
2259                 if (lease->leasetime == DHCP_INFINITE_LIFETIME) {
2260                         lease->renewaltime =
2261                             lease->rebindtime =
2262                             lease->leasetime;
2263                         loginfox("%s: leased %s for infinity",
2264                            ifp->name, inet_ntoa(lease->addr));
2265                 } else {
2266                         if (lease->leasetime < DHCP_MIN_LEASE) {
2267                                 logwarnx("%s: minimum lease is %d seconds",
2268                                     ifp->name, DHCP_MIN_LEASE);
2269                                 lease->leasetime = DHCP_MIN_LEASE;
2270                         }
2271                         if (lease->rebindtime == 0)
2272                                 lease->rebindtime =
2273                                     (uint32_t)(lease->leasetime * T2);
2274                         else if (lease->rebindtime >= lease->leasetime) {
2275                                 lease->rebindtime =
2276                                     (uint32_t)(lease->leasetime * T2);
2277                                 logwarnx("%s: rebind time greater than lease "
2278                                     "time, forcing to %"PRIu32" seconds",
2279                                     ifp->name, lease->rebindtime);
2280                         }
2281                         if (lease->renewaltime == 0)
2282                                 lease->renewaltime =
2283                                     (uint32_t)(lease->leasetime * T1);
2284                         else if (lease->renewaltime > lease->rebindtime) {
2285                                 lease->renewaltime =
2286                                     (uint32_t)(lease->leasetime * T1);
2287                                 logwarnx("%s: renewal time greater than "
2288                                     "rebind time, forcing to %"PRIu32" seconds",
2289                                     ifp->name, lease->renewaltime);
2290                         }
2291                         if (state->state == DHS_RENEW && state->addr &&
2292                             lease->addr.s_addr == state->addr->addr.s_addr &&
2293                             !(state->added & STATE_FAKE))
2294                                 logdebugx("%s: leased %s for %"PRIu32" seconds",
2295                                     ifp->name, inet_ntoa(lease->addr),
2296                                     lease->leasetime);
2297                         else
2298                                 loginfox("%s: leased %s for %"PRIu32" seconds",
2299                                     ifp->name, inet_ntoa(lease->addr),
2300                                     lease->leasetime);
2301                 }
2302         }
2303         if (ctx->options & DHCPCD_TEST) {
2304                 state->reason = "TEST";
2305                 script_runreason(ifp, state->reason);
2306                 eloop_exit(ctx->eloop, EXIT_SUCCESS);
2307                 return;
2308         }
2309         if (state->reason == NULL) {
2310                 if (state->old &&
2311                     !(state->added & (STATE_FAKE | STATE_EXPIRED)))
2312                 {
2313                         if (state->old->yiaddr == state->new->yiaddr &&
2314                             lease->server.s_addr &&
2315                             state->state != DHS_REBIND)
2316                                 state->reason = "RENEW";
2317                         else
2318                                 state->reason = "REBIND";
2319                 } else if (state->state == DHS_REBOOT)
2320                         state->reason = "REBOOT";
2321                 else
2322                         state->reason = "BOUND";
2323         }
2324         if (lease->leasetime == DHCP_INFINITE_LIFETIME)
2325                 lease->renewaltime = lease->rebindtime = lease->leasetime;
2326         else {
2327                 eloop_timeout_add_sec(ctx->eloop,
2328                     lease->renewaltime, dhcp_startrenew, ifp);
2329                 eloop_timeout_add_sec(ctx->eloop,
2330                     lease->rebindtime, dhcp_rebind, ifp);
2331                 eloop_timeout_add_sec(ctx->eloop,
2332                     lease->leasetime, dhcp_expire, ifp);
2333                 logdebugx("%s: renew in %"PRIu32" seconds, rebind in %"PRIu32
2334                     " seconds",
2335                     ifp->name, lease->renewaltime, lease->rebindtime);
2336         }
2337         state->state = DHS_BOUND;
2338         if (!state->lease.frominfo &&
2339             !(ifo->options & (DHCPCD_INFORM | DHCPCD_STATIC))) {
2340                 logdebugx("%s: writing lease: %s",
2341                     ifp->name, state->leasefile);
2342                 if (dhcp_writefile(ifp->ctx, state->leasefile, 0640,
2343                     state->new, state->new_len) == -1)
2344                         logerr("dhcp_writefile: %s", state->leasefile);
2345         }
2346
2347         old_state = state->added;
2348
2349         if (!(ifo->options & DHCPCD_CONFIGURE)) {
2350                 struct ipv4_addr *ia;
2351
2352                 script_runreason(ifp, state->reason);
2353                 dhcpcd_daemonise(ifp->ctx);
2354
2355                 /* We we are not configuring the address, we need to keep
2356                  * the BPF socket open if the address does not exist. */
2357                 ia = ipv4_iffindaddr(ifp, &state->lease.addr, NULL);
2358                 if (ia != NULL) {
2359                         state->addr = ia;
2360                         state->added = STATE_ADDED;
2361                         dhcp_closebpf(ifp);
2362                         goto openudp;
2363                 }
2364                 return;
2365         }
2366
2367         /* Add the address */
2368         if (ipv4_applyaddr(ifp) == NULL) {
2369                 /* There was an error adding the address.
2370                  * If we are in oneshot, exit with a failure. */
2371                 if (ctx->options & DHCPCD_ONESHOT) {
2372                         loginfox("exiting due to oneshot");
2373                         eloop_exit(ctx->eloop, EXIT_FAILURE);
2374                 }
2375                 return;
2376         }
2377
2378         /* Close the BPF filter as we can now receive DHCP messages
2379          * on a UDP socket. */
2380         dhcp_closebpf(ifp);
2381
2382 openudp:
2383         /* If not in master mode, open an address specific socket. */
2384         if (ctx->options & DHCPCD_MASTER ||
2385             (state->old != NULL &&
2386              state->old->yiaddr == state->new->yiaddr &&
2387              old_state & STATE_ADDED && !(old_state & STATE_FAKE)))
2388                 return;
2389
2390         dhcp_closeinet(ifp);
2391 #ifdef PRIVSEP
2392         if (IN_PRIVSEP_SE(ctx)) {
2393                 if (ps_inet_openbootp(state->addr) == -1)
2394                     logerr(__func__);
2395                 return;
2396         }
2397 #endif
2398
2399         state->udp_rfd = dhcp_openudp(&state->addr->addr);
2400         if (state->udp_rfd == -1) {
2401                 logerr(__func__);
2402                 /* Address sharing without master mode is not supported.
2403                  * It's also possible another DHCP client could be running,
2404                  * which is even worse.
2405                  * We still need to work, so re-open BPF. */
2406                 dhcp_openbpf(ifp);
2407                 return;
2408         }
2409         eloop_event_add(ctx->eloop, state->udp_rfd, dhcp_handleifudp, ifp);
2410 }
2411
2412 static size_t
2413 dhcp_message_new(struct bootp **bootp,
2414     const struct in_addr *addr, const struct in_addr *mask)
2415 {
2416         uint8_t *p;
2417         uint32_t cookie;
2418
2419         if ((*bootp = calloc(1, sizeof(**bootp))) == NULL)
2420                 return 0;
2421
2422         (*bootp)->yiaddr = addr->s_addr;
2423         p = (*bootp)->vend;
2424
2425         cookie = htonl(MAGIC_COOKIE);
2426         memcpy(p, &cookie, sizeof(cookie));
2427         p += sizeof(cookie);
2428
2429         if (mask->s_addr != INADDR_ANY) {
2430                 *p++ = DHO_SUBNETMASK;
2431                 *p++ = sizeof(mask->s_addr);
2432                 memcpy(p, &mask->s_addr, sizeof(mask->s_addr));
2433                 p+= sizeof(mask->s_addr);
2434         }
2435
2436         *p = DHO_END;
2437         return sizeof(**bootp);
2438 }
2439
2440 #if defined(ARP) || defined(KERNEL_RFC5227)
2441 static int
2442 dhcp_arp_address(struct interface *ifp)
2443 {
2444         struct dhcp_state *state;
2445         struct in_addr addr;
2446         struct ipv4_addr *ia;
2447
2448         eloop_timeout_delete(ifp->ctx->eloop, NULL, ifp);
2449
2450         state = D_STATE(ifp);
2451         addr.s_addr = state->offer->yiaddr == INADDR_ANY ?
2452             state->offer->ciaddr : state->offer->yiaddr;
2453         /* If the interface already has the address configured
2454          * then we can't ARP for duplicate detection. */
2455         ia = ipv4_iffindaddr(ifp, &addr, NULL);
2456 #ifdef IN_IFF_NOTUSEABLE
2457         if (ia == NULL || ia->addr_flags & IN_IFF_NOTUSEABLE) {
2458                 state->state = DHS_PROBE;
2459                 if (ia == NULL) {
2460                         struct dhcp_lease l;
2461
2462                         get_lease(ifp, &l, state->offer, state->offer_len);
2463                         /* Add the address now, let the kernel handle DAD. */
2464                         ipv4_addaddr(ifp, &l.addr, &l.mask, &l.brd,
2465                             l.leasetime, l.rebindtime);
2466                 } else if (ia->addr_flags & IN_IFF_DUPLICATED)
2467                         dhcp_addr_duplicated(ifp, &ia->addr);
2468                 else
2469                         loginfox("%s: waiting for DAD on %s",
2470                             ifp->name, inet_ntoa(addr));
2471                 return 0;
2472         }
2473 #else
2474         if (!(ifp->flags & IFF_NOARP) &&
2475             ifp->options->options & DHCPCD_ARP)
2476         {
2477                 struct arp_state *astate;
2478                 struct dhcp_lease l;
2479
2480                 /* Even if the address exists, we need to defend it. */
2481                 astate = dhcp_arp_new(ifp, &addr);
2482                 if (astate == NULL)
2483                         return -1;
2484
2485                 if (ia == NULL) {
2486                         state->state = DHS_PROBE;
2487                         get_lease(ifp, &l, state->offer, state->offer_len);
2488                         loginfox("%s: probing address %s/%d",
2489                             ifp->name, inet_ntoa(l.addr), inet_ntocidr(l.mask));
2490                         /* We need to handle DAD. */
2491                         arp_probe(astate);
2492                         return 0;
2493                 }
2494         }
2495 #endif
2496
2497         return 1;
2498 }
2499
2500 static void
2501 dhcp_arp_bind(struct interface *ifp)
2502 {
2503
2504         if (ifp->ctx->options & DHCPCD_TEST ||
2505             dhcp_arp_address(ifp) == 1)
2506                 dhcp_bind(ifp);
2507 }
2508 #endif
2509
2510 static void
2511 dhcp_lastlease(void *arg)
2512 {
2513         struct interface *ifp = arg;
2514         struct dhcp_state *state = D_STATE(ifp);
2515
2516         loginfox("%s: timed out contacting a DHCP server, using last lease",
2517             ifp->name);
2518 #if defined(ARP) || defined(KERNEL_RFC5227)
2519         dhcp_arp_bind(ifp);
2520 #else
2521         dhcp_bind(ifp);
2522 #endif
2523         /* Set expired here because dhcp_bind() -> ipv4_addaddr() will reset
2524          * state */
2525         state->added |= STATE_EXPIRED;
2526         state->interval = 0;
2527         dhcp_discover(ifp);
2528 }
2529
2530 static void
2531 dhcp_static(struct interface *ifp)
2532 {
2533         struct if_options *ifo;
2534         struct dhcp_state *state;
2535         struct ipv4_addr *ia;
2536
2537         state = D_STATE(ifp);
2538         ifo = ifp->options;
2539
2540         ia = NULL;
2541         if (ifo->req_addr.s_addr == INADDR_ANY &&
2542             (ia = ipv4_iffindaddr(ifp, NULL, NULL)) == NULL)
2543         {
2544                 loginfox("%s: waiting for 3rd party to "
2545                     "configure IP address", ifp->name);
2546                 state->reason = "3RDPARTY";
2547                 script_runreason(ifp, state->reason);
2548                 return;
2549         }
2550
2551         state->offer_len = dhcp_message_new(&state->offer,
2552             ia ? &ia->addr : &ifo->req_addr,
2553             ia ? &ia->mask : &ifo->req_mask);
2554         if (state->offer_len)
2555 #if defined(ARP) || defined(KERNEL_RFC5227)
2556                 dhcp_arp_bind(ifp);
2557 #else
2558                 dhcp_bind(ifp);
2559 #endif
2560 }
2561
2562 void
2563 dhcp_inform(struct interface *ifp)
2564 {
2565         struct dhcp_state *state;
2566         struct if_options *ifo;
2567         struct ipv4_addr *ia;
2568
2569         state = D_STATE(ifp);
2570         ifo = ifp->options;
2571
2572         state->state = DHS_INFORM;
2573         free(state->offer);
2574         state->offer = NULL;
2575         state->offer_len = 0;
2576
2577         if (ifo->req_addr.s_addr == INADDR_ANY) {
2578                 ia = ipv4_iffindaddr(ifp, NULL, NULL);
2579                 if (ia == NULL) {
2580                         loginfox("%s: waiting for 3rd party to "
2581                             "configure IP address",
2582                             ifp->name);
2583                         if (!(ifp->ctx->options & DHCPCD_TEST)) {
2584                                 state->reason = "3RDPARTY";
2585                                 script_runreason(ifp, state->reason);
2586                         }
2587                         return;
2588                 }
2589         } else {
2590                 ia = ipv4_iffindaddr(ifp, &ifo->req_addr, &ifo->req_mask);
2591                 if (ia == NULL) {
2592                         if (ifp->ctx->options & DHCPCD_TEST) {
2593                                 logerrx("%s: cannot add IP address in test mode",
2594                                     ifp->name);
2595                                 return;
2596                         }
2597                         ia = ipv4_iffindaddr(ifp, &ifo->req_addr, NULL);
2598                         if (ia != NULL)
2599                                 /* Netmask must be different, delete it. */
2600                                 ipv4_deladdr(ia, 1);
2601                         state->offer_len = dhcp_message_new(&state->offer,
2602                             &ifo->req_addr, &ifo->req_mask);
2603 #ifdef ARP
2604                         if (dhcp_arp_address(ifp) != 1)
2605                                 return;
2606 #endif
2607                         ia = ipv4_iffindaddr(ifp,
2608                             &ifo->req_addr, &ifo->req_mask);
2609                         assert(ia != NULL);
2610                 }
2611         }
2612
2613         state->addr = ia;
2614         state->offer_len = dhcp_message_new(&state->offer,
2615             &ia->addr, &ia->mask);
2616         if (state->offer_len) {
2617                 dhcp_new_xid(ifp);
2618                 get_lease(ifp, &state->lease, state->offer, state->offer_len);
2619                 send_inform(ifp);
2620         }
2621 }
2622
2623 void
2624 dhcp_reboot_newopts(struct interface *ifp, unsigned long long oldopts)
2625 {
2626         struct if_options *ifo;
2627         struct dhcp_state *state = D_STATE(ifp);
2628
2629         if (state == NULL || state->state == DHS_NONE)
2630                 return;
2631         ifo = ifp->options;
2632         if ((ifo->options & (DHCPCD_INFORM | DHCPCD_STATIC) &&
2633                 (state->addr == NULL ||
2634                 state->addr->addr.s_addr != ifo->req_addr.s_addr)) ||
2635             (oldopts & (DHCPCD_INFORM | DHCPCD_STATIC) &&
2636                 !(ifo->options & (DHCPCD_INFORM | DHCPCD_STATIC))))
2637         {
2638                 dhcp_drop(ifp, "EXPIRE");
2639         }
2640 }
2641
2642 #ifdef ARP
2643 static int
2644 dhcp_activeaddr(const struct interface *ifp, const struct in_addr *addr)
2645 {
2646         const struct interface *ifp1;
2647         const struct dhcp_state *state;
2648
2649         TAILQ_FOREACH(ifp1, ifp->ctx->ifaces, next) {
2650                 if (ifp1 == ifp)
2651                         continue;
2652                 if ((state = D_CSTATE(ifp1)) == NULL)
2653                         continue;
2654                 switch(state->state) {
2655                 case DHS_REBOOT:
2656                 case DHS_RENEW:
2657                 case DHS_REBIND:
2658                 case DHS_BOUND:
2659                 case DHS_INFORM:
2660                         break;
2661                 default:
2662                         continue;
2663                 }
2664                 if (state->lease.addr.s_addr == addr->s_addr)
2665                         return 1;
2666         }
2667         return 0;
2668 }
2669 #endif
2670
2671 static void
2672 dhcp_reboot(struct interface *ifp)
2673 {
2674         struct if_options *ifo;
2675         struct dhcp_state *state = D_STATE(ifp);
2676 #ifdef ARP
2677         struct ipv4_addr *ia;
2678 #endif
2679
2680         if (state == NULL || state->state == DHS_NONE)
2681                 return;
2682         ifo = ifp->options;
2683         state->state = DHS_REBOOT;
2684         state->interval = 0;
2685
2686         if (ifo->options & DHCPCD_LINK && !if_is_link_up(ifp)) {
2687                 loginfox("%s: waiting for carrier", ifp->name);
2688                 return;
2689         }
2690         if (ifo->options & DHCPCD_STATIC) {
2691                 dhcp_static(ifp);
2692                 return;
2693         }
2694         if (ifo->options & DHCPCD_INFORM) {
2695                 loginfox("%s: informing address of %s",
2696                     ifp->name, inet_ntoa(state->lease.addr));
2697                 dhcp_inform(ifp);
2698                 return;
2699         }
2700         if (ifo->reboot == 0 || state->offer == NULL) {
2701                 dhcp_discover(ifp);
2702                 return;
2703         }
2704         if (!IS_DHCP(state->offer))
2705                 return;
2706
2707         loginfox("%s: rebinding lease of %s",
2708             ifp->name, inet_ntoa(state->lease.addr));
2709
2710 #ifdef ARP
2711 #ifndef KERNEL_RFC5227
2712         /* Create the DHCP ARP state so we can defend it. */
2713         (void)dhcp_arp_new(ifp, &state->lease.addr);
2714 #endif
2715
2716         /* If the address exists on the interface and no other interface
2717          * is currently using it then announce it to ensure this
2718          * interface gets the reply. */
2719         ia = ipv4_iffindaddr(ifp, &state->lease.addr, NULL);
2720         if (ia != NULL &&
2721             !(ifp->ctx->options & DHCPCD_TEST) &&
2722 #ifdef IN_IFF_NOTUSEABLE
2723             !(ia->addr_flags & IN_IFF_NOTUSEABLE) &&
2724 #endif
2725             dhcp_activeaddr(ifp, &state->lease.addr) == 0)
2726                 arp_ifannounceaddr(ifp, &state->lease.addr);
2727 #endif
2728
2729         dhcp_new_xid(ifp);
2730         state->lease.server.s_addr = INADDR_ANY;
2731         eloop_timeout_delete(ifp->ctx->eloop, NULL, ifp);
2732
2733 #ifdef IPV4LL
2734         /* Need to add this before dhcp_expire and friends. */
2735         if (!ifo->fallback && ifo->options & DHCPCD_IPV4LL)
2736                 eloop_timeout_add_sec(ifp->ctx->eloop,
2737                     ifo->reboot, ipv4ll_start, ifp);
2738 #endif
2739
2740         if (ifo->options & DHCPCD_LASTLEASE && state->lease.frominfo)
2741                 eloop_timeout_add_sec(ifp->ctx->eloop,
2742                     ifo->reboot, dhcp_lastlease, ifp);
2743         else if (!(ifo->options & DHCPCD_INFORM))
2744                 eloop_timeout_add_sec(ifp->ctx->eloop,
2745                     ifo->reboot, dhcp_expire, ifp);
2746
2747         /* Don't bother ARP checking as the server could NAK us first.
2748          * Don't call dhcp_request as that would change the state */
2749         send_request(ifp);
2750 }
2751
2752 void
2753 dhcp_drop(struct interface *ifp, const char *reason)
2754 {
2755         struct dhcp_state *state;
2756 #ifdef RELEASE_SLOW
2757         struct timespec ts;
2758 #endif
2759
2760         state = D_STATE(ifp);
2761         /* dhcp_start may just have been called and we don't yet have a state
2762          * but we do have a timeout, so punt it. */
2763         if (state == NULL || state->state == DHS_NONE) {
2764                 eloop_timeout_delete(ifp->ctx->eloop, NULL, ifp);
2765                 return;
2766         }
2767
2768 #ifdef ARP
2769         if (state->addr != NULL)
2770                 arp_freeaddr(ifp, &state->addr->addr);
2771 #endif
2772 #ifdef ARPING
2773         state->arping_index = -1;
2774 #endif
2775
2776         if (ifp->options->options & DHCPCD_RELEASE &&
2777             !(ifp->options->options & DHCPCD_INFORM))
2778         {
2779                 /* Failure to send the release may cause this function to
2780                  * re-enter so guard by setting the state. */
2781                 if (state->state == DHS_RELEASE)
2782                         return;
2783                 state->state = DHS_RELEASE;
2784
2785                 dhcp_unlink(ifp->ctx, state->leasefile);
2786                 if (if_is_link_up(ifp) &&
2787                     state->new != NULL &&
2788                     state->lease.server.s_addr != INADDR_ANY)
2789                 {
2790                         loginfox("%s: releasing lease of %s",
2791                             ifp->name, inet_ntoa(state->lease.addr));
2792                         dhcp_new_xid(ifp);
2793                         send_message(ifp, DHCP_RELEASE, NULL);
2794 #ifdef RELEASE_SLOW
2795                         /* Give the packet a chance to go */
2796                         ts.tv_sec = RELEASE_DELAY_S;
2797                         ts.tv_nsec = RELEASE_DELAY_NS;
2798                         nanosleep(&ts, NULL);
2799 #endif
2800                 }
2801         }
2802 #ifdef AUTH
2803         else if (state->auth.reconf != NULL) {
2804                 /*
2805                  * Drop the lease as the token may only be present
2806                  * in the initial reply message and not subsequent
2807                  * renewals.
2808                  * If dhcpcd is restarted, the token is lost.
2809                  * XXX persist this in another file?
2810                  */
2811                 dhcp_unlink(ifp->ctx, state->leasefile);
2812         }
2813 #endif
2814
2815         eloop_timeout_delete(ifp->ctx->eloop, NULL, ifp);
2816 #ifdef AUTH
2817         dhcp_auth_reset(&state->auth);
2818 #endif
2819
2820         /* Close DHCP ports so a changed interface family is picked
2821          * up by a new BPF state. */
2822         dhcp_close(ifp);
2823
2824         state->state = DHS_NONE;
2825         free(state->offer);
2826         state->offer = NULL;
2827         state->offer_len = 0;
2828         free(state->old);
2829         state->old = state->new;
2830         state->old_len = state->new_len;
2831         state->new = NULL;
2832         state->new_len = 0;
2833         state->reason = reason;
2834         if (ifp->options->options & DHCPCD_CONFIGURE)
2835                 ipv4_applyaddr(ifp);
2836         else {
2837                 state->addr = NULL;
2838                 state->added = 0;
2839                 script_runreason(ifp, state->reason);
2840         }
2841         free(state->old);
2842         state->old = NULL;
2843         state->old_len = 0;
2844         state->lease.addr.s_addr = 0;
2845         ifp->options->options &= ~(DHCPCD_CSR_WARNED |
2846             DHCPCD_ROUTER_HOST_ROUTE_WARNED);
2847 }
2848
2849 static int
2850 blacklisted_ip(const struct if_options *ifo, in_addr_t addr)
2851 {
2852         size_t i;
2853
2854         for (i = 0; i < ifo->blacklist_len; i += 2)
2855                 if (ifo->blacklist[i] == (addr & ifo->blacklist[i + 1]))
2856                         return 1;
2857         return 0;
2858 }
2859
2860 #define WHTLST_NONE     0
2861 #define WHTLST_MATCH    1
2862 #define WHTLST_NOMATCH  2
2863 static unsigned int
2864 whitelisted_ip(const struct if_options *ifo, in_addr_t addr)
2865 {
2866         size_t i;
2867
2868         if (ifo->whitelist_len == 0)
2869                 return WHTLST_NONE;
2870         for (i = 0; i < ifo->whitelist_len; i += 2)
2871                 if (ifo->whitelist[i] == (addr & ifo->whitelist[i + 1]))
2872                         return WHTLST_MATCH;
2873         return WHTLST_NOMATCH;
2874 }
2875
2876 static void
2877 log_dhcp(int loglevel, const char *msg,
2878     const struct interface *ifp, const struct bootp *bootp, size_t bootp_len,
2879     const struct in_addr *from, int ad)
2880 {
2881         const char *tfrom;
2882         char *a, sname[sizeof(bootp->sname) * 4];
2883         struct in_addr addr;
2884         int r;
2885         uint8_t overl;
2886
2887         if (strcmp(msg, "NAK:") == 0) {
2888                 a = get_option_string(ifp->ctx, bootp, bootp_len, DHO_MESSAGE);
2889                 if (a) {
2890                         char *tmp;
2891                         size_t al, tmpl;
2892
2893                         al = strlen(a);
2894                         tmpl = (al * 4) + 1;
2895                         tmp = malloc(tmpl);
2896                         if (tmp == NULL) {
2897                                 logerr(__func__);
2898                                 free(a);
2899                                 return;
2900                         }
2901                         print_string(tmp, tmpl, OT_STRING, (uint8_t *)a, al);
2902                         free(a);
2903                         a = tmp;
2904                 }
2905         } else if (ad && bootp->yiaddr != 0) {
2906                 addr.s_addr = bootp->yiaddr;
2907                 a = strdup(inet_ntoa(addr));
2908                 if (a == NULL) {
2909                         logerr(__func__);
2910                         return;
2911                 }
2912         } else
2913                 a = NULL;
2914
2915         tfrom = "from";
2916         r = get_option_addr(ifp->ctx, &addr, bootp, bootp_len, DHO_SERVERID);
2917         if (get_option_uint8(ifp->ctx, &overl, bootp, bootp_len,
2918             DHO_OPTSOVERLOADED) == -1)
2919                 overl = 0;
2920         if (bootp->sname[0] && r == 0 && !(overl & 2)) {
2921                 print_string(sname, sizeof(sname), OT_STRING | OT_DOMAIN,
2922                     bootp->sname, sizeof(bootp->sname));
2923                 if (a == NULL)
2924                         logmessage(loglevel, "%s: %s %s %s %s",
2925                             ifp->name, msg, tfrom, inet_ntoa(addr), sname);
2926                 else
2927                         logmessage(loglevel, "%s: %s %s %s %s %s",
2928                             ifp->name, msg, a, tfrom, inet_ntoa(addr), sname);
2929         } else {
2930                 if (r != 0) {
2931                         tfrom = "via";
2932                         addr = *from;
2933                 }
2934                 if (a == NULL)
2935                         logmessage(loglevel, "%s: %s %s %s",
2936                             ifp->name, msg, tfrom, inet_ntoa(addr));
2937                 else
2938                         logmessage(loglevel, "%s: %s %s %s %s",
2939                             ifp->name, msg, a, tfrom, inet_ntoa(addr));
2940         }
2941         free(a);
2942 }
2943
2944 /* If we're sharing the same IP address with another interface on the
2945  * same network, we may receive the DHCP reply on the wrong interface.
2946  * Try and re-direct it here. */
2947 static void
2948 dhcp_redirect_dhcp(struct interface *ifp, struct bootp *bootp, size_t bootp_len,
2949     const struct in_addr *from)
2950 {
2951         struct interface *ifn;
2952         const struct dhcp_state *state;
2953         uint32_t xid;
2954
2955         xid = ntohl(bootp->xid);
2956         TAILQ_FOREACH(ifn, ifp->ctx->ifaces, next) {
2957                 if (ifn == ifp)
2958                         continue;
2959                 state = D_CSTATE(ifn);
2960                 if (state == NULL || state->state == DHS_NONE)
2961                         continue;
2962                 if (state->xid != xid)
2963                         continue;
2964                 if (ifn->hwlen <= sizeof(bootp->chaddr) &&
2965                     memcmp(bootp->chaddr, ifn->hwaddr, ifn->hwlen))
2966                         continue;
2967                 logdebugx("%s: redirecting DHCP message to %s",
2968                     ifp->name, ifn->name);
2969                 dhcp_handledhcp(ifn, bootp, bootp_len, from);
2970         }
2971 }
2972
2973 static void
2974 dhcp_handledhcp(struct interface *ifp, struct bootp *bootp, size_t bootp_len,
2975     const struct in_addr *from)
2976 {
2977         struct dhcp_state *state = D_STATE(ifp);
2978         struct if_options *ifo = ifp->options;
2979         struct dhcp_lease *lease = &state->lease;
2980         uint8_t type, tmp;
2981         struct in_addr addr;
2982         unsigned int i;
2983         char *msg;
2984         bool bootp_copied;
2985         uint32_t v6only_time = 0;
2986         bool use_v6only = false;
2987 #ifdef AUTH
2988         const uint8_t *auth;
2989         size_t auth_len;
2990 #endif
2991 #ifdef IN_IFF_DUPLICATED
2992         struct ipv4_addr *ia;
2993 #endif
2994
2995 #define LOGDHCP0(l, m) \
2996         log_dhcp((l), (m), ifp, bootp, bootp_len, from, 0)
2997 #define LOGDHCP(l, m) \
2998         log_dhcp((l), (m), ifp, bootp, bootp_len, from, 1)
2999
3000 #define IS_STATE_ACTIVE(s) ((s)-state != DHS_NONE && \
3001         (s)->state != DHS_INIT && (s)->state != DHS_BOUND)
3002
3003         if (bootp->op != BOOTREPLY) {
3004                 if (IS_STATE_ACTIVE(state))
3005                         logdebugx("%s: op (%d) is not BOOTREPLY",
3006                             ifp->name, bootp->op);
3007                 return;
3008         }
3009
3010         if (state->xid != ntohl(bootp->xid)) {
3011                 if (IS_STATE_ACTIVE(state))
3012                         logdebugx("%s: wrong xid 0x%x (expecting 0x%x) from %s",
3013                             ifp->name, ntohl(bootp->xid), state->xid,
3014                             inet_ntoa(*from));
3015                 dhcp_redirect_dhcp(ifp, bootp, bootp_len, from);
3016                 return;
3017         }
3018
3019         if (ifp->hwlen <= sizeof(bootp->chaddr) &&
3020             memcmp(bootp->chaddr, ifp->hwaddr, ifp->hwlen))
3021         {
3022                 if (IS_STATE_ACTIVE(state)) {
3023                         char buf[sizeof(bootp->chaddr) * 3];
3024
3025                         logdebugx("%s: xid 0x%x is for hwaddr %s",
3026                             ifp->name, ntohl(bootp->xid),
3027                             hwaddr_ntoa(bootp->chaddr, sizeof(bootp->chaddr),
3028                                     buf, sizeof(buf)));
3029                 }
3030                 dhcp_redirect_dhcp(ifp, bootp, bootp_len, from);
3031                 return;
3032         }
3033
3034         if (!ifp->active)
3035                 return;
3036
3037         i = whitelisted_ip(ifp->options, from->s_addr);
3038         switch (i) {
3039         case WHTLST_NOMATCH:
3040                 logwarnx("%s: non whitelisted DHCP packet from %s",
3041                     ifp->name, inet_ntoa(*from));
3042                 return;
3043         case WHTLST_MATCH:
3044                 break;
3045         case WHTLST_NONE:
3046                 if (blacklisted_ip(ifp->options, from->s_addr) == 1) {
3047                         logwarnx("%s: blacklisted DHCP packet from %s",
3048                             ifp->name, inet_ntoa(*from));
3049                         return;
3050                 }
3051         }
3052
3053         /* We may have found a BOOTP server */
3054         if (get_option_uint8(ifp->ctx, &type,
3055             bootp, bootp_len, DHO_MESSAGETYPE) == -1)
3056                 type = 0;
3057         else if (ifo->options & DHCPCD_BOOTP) {
3058                 logdebugx("%s: ignoring DHCP reply (expecting BOOTP)",
3059                     ifp->name);
3060                 return;
3061         }
3062
3063 #ifdef AUTH
3064         /* Authenticate the message */
3065         auth = get_option(ifp->ctx, bootp, bootp_len,
3066             DHO_AUTHENTICATION, &auth_len);
3067         if (auth) {
3068                 if (dhcp_auth_validate(&state->auth, &ifo->auth,
3069                     (uint8_t *)bootp, bootp_len, 4, type,
3070                     auth, auth_len) == NULL)
3071                 {
3072                         LOGDHCP0(LOG_ERR, "authentication failed");
3073                         return;
3074                 }
3075                 if (state->auth.token)
3076                         logdebugx("%s: validated using 0x%08" PRIu32,
3077                             ifp->name, state->auth.token->secretid);
3078                 else
3079                         loginfox("%s: accepted reconfigure key", ifp->name);
3080         } else if (ifo->auth.options & DHCPCD_AUTH_SEND) {
3081                 if (ifo->auth.options & DHCPCD_AUTH_REQUIRE) {
3082                         LOGDHCP0(LOG_ERR, "no authentication");
3083                         return;
3084                 }
3085                 LOGDHCP0(LOG_WARNING, "no authentication");
3086         }
3087 #endif
3088
3089         /* RFC 3203 */
3090         if (type == DHCP_FORCERENEW) {
3091                 if (from->s_addr == INADDR_ANY ||
3092                     from->s_addr == INADDR_BROADCAST)
3093                 {
3094                         LOGDHCP(LOG_ERR, "discarding Force Renew");
3095                         return;
3096                 }
3097 #ifdef AUTH
3098                 if (auth == NULL) {
3099                         LOGDHCP(LOG_ERR, "unauthenticated Force Renew");
3100                         if (ifo->auth.options & DHCPCD_AUTH_REQUIRE)
3101                                 return;
3102                 }
3103                 if (state->state != DHS_BOUND && state->state != DHS_INFORM) {
3104                         LOGDHCP(LOG_DEBUG, "not bound, ignoring Force Renew");
3105                         return;
3106                 }
3107                 LOGDHCP(LOG_INFO, "Force Renew from");
3108                 /* The rebind and expire timings are still the same, we just
3109                  * enter the renew state early */
3110                 if (state->state == DHS_BOUND)
3111                         dhcp_renew(ifp);
3112                 else {
3113                         eloop_timeout_delete(ifp->ctx->eloop,
3114                             send_inform, ifp);
3115                         dhcp_inform(ifp);
3116                 }
3117 #else
3118                 LOGDHCP(LOG_ERR, "unauthenticated Force Renew");
3119 #endif
3120                 return;
3121         }
3122
3123         if (state->state == DHS_BOUND) {
3124                 LOGDHCP(LOG_DEBUG, "bound, ignoring");
3125                 return;
3126         }
3127
3128         if (state->state == DHS_PROBE) {
3129                 /* Ignore any DHCP messages whilst probing a lease to bind. */
3130                 LOGDHCP(LOG_DEBUG, "probing, ignoring");
3131                 return;
3132         }
3133
3134         /* reset the message counter */
3135         state->interval = 0;
3136
3137         /* Ensure that no reject options are present */
3138         for (i = 1; i < 255; i++) {
3139                 if (has_option_mask(ifo->rejectmask, i) &&
3140                     get_option_uint8(ifp->ctx, &tmp,
3141                     bootp, bootp_len, (uint8_t)i) == 0)
3142                 {
3143                         LOGDHCP(LOG_WARNING, "reject DHCP");
3144                         return;
3145                 }
3146         }
3147
3148         if (type == DHCP_NAK) {
3149                 /* For NAK, only check if we require the ServerID */
3150                 if (has_option_mask(ifo->requiremask, DHO_SERVERID) &&
3151                     get_option_addr(ifp->ctx, &addr,
3152                     bootp, bootp_len, DHO_SERVERID) == -1)
3153                 {
3154                         LOGDHCP(LOG_WARNING, "reject NAK");
3155                         return;
3156                 }
3157
3158                 /* We should restart on a NAK */
3159                 LOGDHCP(LOG_WARNING, "NAK:");
3160                 if ((msg = get_option_string(ifp->ctx,
3161                     bootp, bootp_len, DHO_MESSAGE)))
3162                 {
3163                         logwarnx("%s: message: %s", ifp->name, msg);
3164                         free(msg);
3165                 }
3166                 if (state->state == DHS_INFORM) /* INFORM should not be NAKed */
3167                         return;
3168                 if (!(ifp->ctx->options & DHCPCD_TEST)) {
3169                         dhcp_drop(ifp, "NAK");
3170                         dhcp_unlink(ifp->ctx, state->leasefile);
3171                 }
3172
3173                 /* If we constantly get NAKS then we should slowly back off */
3174                 eloop_timeout_add_sec(ifp->ctx->eloop,
3175                     state->nakoff, dhcp_discover, ifp);
3176                 if (state->nakoff == 0)
3177                         state->nakoff = 1;
3178                 else {
3179                         state->nakoff *= 2;
3180                         if (state->nakoff > NAKOFF_MAX)
3181                                 state->nakoff = NAKOFF_MAX;
3182                 }
3183                 return;
3184         }
3185
3186         /* Ensure that all required options are present */
3187         for (i = 1; i < 255; i++) {
3188                 if (has_option_mask(ifo->requiremask, i) &&
3189                     get_option_uint8(ifp->ctx, &tmp,
3190                     bootp, bootp_len, (uint8_t)i) != 0)
3191                 {
3192                         /* If we are BOOTP, then ignore the need for serverid.
3193                          * To ignore BOOTP, require dhcp_message_type.
3194                          * However, nothing really stops BOOTP from providing
3195                          * DHCP style options as well so the above isn't
3196                          * always true. */
3197                         if (type == 0 && i == DHO_SERVERID)
3198                                 continue;
3199                         LOGDHCP(LOG_WARNING, "reject DHCP");
3200                         return;
3201                 }
3202         }
3203
3204         if (has_option_mask(ifo->requestmask, DHO_IPV6_PREFERRED_ONLY)) {
3205                 if (get_option_uint32(ifp->ctx, &v6only_time, bootp, bootp_len,
3206                     DHO_IPV6_PREFERRED_ONLY) == 0 &&
3207                     (state->state == DHS_DISCOVER || state->state == DHS_REBOOT))
3208                 {
3209                         char v6msg[128];
3210
3211                         use_v6only = true;
3212                         if (v6only_time < MIN_V6ONLY_WAIT)
3213                                 v6only_time = MIN_V6ONLY_WAIT;
3214                         snprintf(v6msg, sizeof(v6msg),
3215                             "IPv6-Only Preferred received (%u seconds)",
3216                             v6only_time);
3217                         LOGDHCP(LOG_INFO, v6msg);
3218                 }
3219         }
3220
3221         /* DHCP Auto-Configure, RFC 2563 */
3222         if (type == DHCP_OFFER && bootp->yiaddr == 0) {
3223                 LOGDHCP(LOG_WARNING, "no address given");
3224                 if ((msg = get_option_string(ifp->ctx,
3225                     bootp, bootp_len, DHO_MESSAGE)))
3226                 {
3227                         logwarnx("%s: message: %s", ifp->name, msg);
3228                         free(msg);
3229                 }
3230 #ifdef IPV4LL
3231                 if (state->state == DHS_DISCOVER &&
3232                     get_option_uint8(ifp->ctx, &tmp, bootp, bootp_len,
3233                     DHO_AUTOCONFIGURE) == 0)
3234                 {
3235                         switch (tmp) {
3236                         case 0:
3237                                 LOGDHCP(LOG_WARNING, "IPv4LL disabled from");
3238                                 ipv4ll_drop(ifp);
3239 #ifdef ARP
3240                                 arp_drop(ifp);
3241 #endif
3242                                 break;
3243                         case 1:
3244                                 LOGDHCP(LOG_WARNING, "IPv4LL enabled from");
3245                                 ipv4ll_start(ifp);
3246                                 break;
3247                         default:
3248                                 logerrx("%s: unknown auto configuration "
3249                                     "option %d",
3250                                     ifp->name, tmp);
3251                                 break;
3252                         }
3253                         eloop_timeout_delete(ifp->ctx->eloop, NULL, ifp);
3254                         eloop_timeout_add_sec(ifp->ctx->eloop,
3255                             use_v6only ? v6only_time : DHCP_MAX,
3256                             dhcp_discover, ifp);
3257                 }
3258 #endif
3259                 return;
3260         }
3261
3262         if (use_v6only) {
3263                 dhcp_drop(ifp, "EXPIRE");
3264                 dhcp_unlink(ifp->ctx, state->leasefile);
3265                 eloop_timeout_delete(ifp->ctx->eloop, NULL, ifp);
3266                 eloop_timeout_add_sec(ifp->ctx->eloop, v6only_time,
3267                     dhcp_discover, ifp);
3268                 return;
3269         }
3270
3271         /* Ensure that the address offered is valid */
3272         if ((type == 0 || type == DHCP_OFFER || type == DHCP_ACK) &&
3273             (bootp->ciaddr == INADDR_ANY || bootp->ciaddr == INADDR_BROADCAST)
3274             &&
3275             (bootp->yiaddr == INADDR_ANY || bootp->yiaddr == INADDR_BROADCAST))
3276         {
3277                 LOGDHCP(LOG_WARNING, "reject invalid address");
3278                 return;
3279         }
3280
3281 #ifdef IN_IFF_DUPLICATED
3282         ia = ipv4_iffindaddr(ifp, &lease->addr, NULL);
3283         if (ia && ia->addr_flags & IN_IFF_DUPLICATED) {
3284                 LOGDHCP(LOG_WARNING, "declined duplicate address");
3285                 if (type)
3286                         dhcp_decline(ifp);
3287                 ipv4_deladdr(ia, 0);
3288                 eloop_timeout_delete(ifp->ctx->eloop, NULL, ifp);
3289                 eloop_timeout_add_sec(ifp->ctx->eloop,
3290                     DHCP_RAND_MAX, dhcp_discover, ifp);
3291                 return;
3292         }
3293 #endif
3294
3295         bootp_copied = false;
3296         if ((type == 0 || type == DHCP_OFFER) && state->state == DHS_DISCOVER) {
3297                 lease->frominfo = 0;
3298                 lease->addr.s_addr = bootp->yiaddr;
3299                 memcpy(&lease->cookie, bootp->vend, sizeof(lease->cookie));
3300                 if (type == 0 ||
3301                     get_option_addr(ifp->ctx,
3302                     &lease->server, bootp, bootp_len, DHO_SERVERID) != 0)
3303                         lease->server.s_addr = INADDR_ANY;
3304
3305                 /* Test for rapid commit in the OFFER */
3306                 if (!(ifp->ctx->options & DHCPCD_TEST) &&
3307                     has_option_mask(ifo->requestmask, DHO_RAPIDCOMMIT) &&
3308                     get_option(ifp->ctx, bootp, bootp_len,
3309                     DHO_RAPIDCOMMIT, NULL))
3310                 {
3311                         state->state = DHS_REQUEST;
3312                         goto rapidcommit;
3313                 }
3314
3315                 LOGDHCP(LOG_INFO, "offered");
3316                 if (state->offer_len < bootp_len) {
3317                         free(state->offer);
3318                         if ((state->offer = malloc(bootp_len)) == NULL) {
3319                                 logerr(__func__);
3320                                 state->offer_len = 0;
3321                                 return;
3322                         }
3323                 }
3324                 state->offer_len = bootp_len;
3325                 memcpy(state->offer, bootp, bootp_len);
3326                 bootp_copied = true;
3327                 if (ifp->ctx->options & DHCPCD_TEST) {
3328                         free(state->old);
3329                         state->old = state->new;
3330                         state->old_len = state->new_len;
3331                         state->new = state->offer;
3332                         state->new_len = state->offer_len;
3333                         state->offer = NULL;
3334                         state->offer_len = 0;
3335                         state->reason = "TEST";
3336                         script_runreason(ifp, state->reason);
3337                         eloop_exit(ifp->ctx->eloop, EXIT_SUCCESS);
3338                         state->bpf->bpf_flags |= BPF_EOF;
3339                         return;
3340                 }
3341                 eloop_timeout_delete(ifp->ctx->eloop, send_discover, ifp);
3342                 /* We don't request BOOTP addresses */
3343                 if (type) {
3344                         /* We used to ARP check here, but that seems to be in
3345                          * violation of RFC2131 where it only describes
3346                          * DECLINE after REQUEST.
3347                          * It also seems that some MS DHCP servers actually
3348                          * ignore DECLINE if no REQUEST, ie we decline a
3349                          * DISCOVER. */
3350                         dhcp_request(ifp);
3351                         return;
3352                 }
3353         }
3354
3355         if (type) {
3356                 if (type == DHCP_OFFER) {
3357                         LOGDHCP(LOG_WARNING, "ignoring offer of");
3358                         return;
3359                 }
3360
3361                 /* We should only be dealing with acks */
3362                 if (type != DHCP_ACK) {
3363                         LOGDHCP(LOG_ERR, "not ACK or OFFER");
3364                         return;
3365                 }
3366
3367                 if (state->state == DHS_DISCOVER) {
3368                         /* We only allow ACK of rapid commit DISCOVER. */
3369                         if (has_option_mask(ifo->requestmask,
3370                             DHO_RAPIDCOMMIT) &&
3371                             get_option(ifp->ctx, bootp, bootp_len,
3372                             DHO_RAPIDCOMMIT, NULL))
3373                                 state->state = DHS_REQUEST;
3374                         else {
3375                                 LOGDHCP(LOG_DEBUG, "ignoring ack of");
3376                                 return;
3377                         }
3378                 }
3379
3380 rapidcommit:
3381                 if (!(ifo->options & DHCPCD_INFORM))
3382                         LOGDHCP(LOG_DEBUG, "acknowledged");
3383                 else
3384                     ifo->options &= ~DHCPCD_STATIC;
3385         }
3386
3387         /* No NAK, so reset the backoff
3388          * We don't reset on an OFFER message because the server could
3389          * potentially NAK the REQUEST. */
3390         state->nakoff = 0;
3391
3392         /* BOOTP could have already assigned this above. */
3393         if (!bootp_copied) {
3394                 if (state->offer_len < bootp_len) {
3395                         free(state->offer);
3396                         if ((state->offer = malloc(bootp_len)) == NULL) {
3397                                 logerr(__func__);
3398                                 state->offer_len = 0;
3399                                 return;
3400                         }
3401                 }
3402                 state->offer_len = bootp_len;
3403                 memcpy(state->offer, bootp, bootp_len);
3404         }
3405
3406         lease->frominfo = 0;
3407         eloop_timeout_delete(ifp->ctx->eloop, NULL, ifp);
3408
3409 #if defined(ARP) || defined(KERNEL_RFC5227)
3410         dhcp_arp_bind(ifp);
3411 #else
3412         dhcp_bind(ifp);
3413 #endif
3414 }
3415
3416 static void *
3417 get_udp_data(void *packet, size_t *len)
3418 {
3419         const struct ip *ip = packet;
3420         size_t ip_hl = (size_t)ip->ip_hl * 4;
3421         char *p = packet;
3422
3423         p += ip_hl + sizeof(struct udphdr);
3424         *len = (size_t)ntohs(ip->ip_len) - sizeof(struct udphdr) - ip_hl;
3425         return p;
3426 }
3427
3428 static bool
3429 is_packet_udp_bootp(void *packet, size_t plen)
3430 {
3431         struct ip *ip = packet;
3432         size_t ip_hlen;
3433         struct udphdr udp;
3434
3435         if (plen < sizeof(*ip))
3436                 return false;
3437
3438         if (ip->ip_v != IPVERSION || ip->ip_p != IPPROTO_UDP)
3439                 return false;
3440
3441         /* Sanity. */
3442         if (ntohs(ip->ip_len) > plen)
3443                 return false;
3444
3445         ip_hlen = (size_t)ip->ip_hl * 4;
3446         if (ip_hlen < sizeof(*ip))
3447                 return false;
3448
3449         /* Check we have a UDP header and BOOTP. */
3450         if (ip_hlen + sizeof(udp) + offsetof(struct bootp, vend) > plen)
3451                 return false;
3452
3453         /* Sanity. */
3454         memcpy(&udp, (char *)ip + ip_hlen, sizeof(udp));
3455         if (ntohs(udp.uh_ulen) < sizeof(udp))
3456                 return false;
3457         if (ip_hlen + ntohs(udp.uh_ulen) > plen)
3458                 return false;
3459
3460         /* Check it's to and from the right ports. */
3461         if (udp.uh_dport != htons(BOOTPC) || udp.uh_sport != htons(BOOTPS))
3462                 return false;
3463
3464         return true;
3465 }
3466
3467 /* Lengths have already been checked. */
3468 static bool
3469 checksums_valid(void *packet,
3470     struct in_addr *from, unsigned int flags)
3471 {
3472         struct ip *ip = packet;
3473         union pip {
3474                 struct ip ip;
3475                 uint16_t w[sizeof(struct ip) / 2];
3476         } pip = {
3477                 .ip = {
3478                         .ip_p = IPPROTO_UDP,
3479                         .ip_src = ip->ip_src,
3480                         .ip_dst = ip->ip_dst,
3481                 }
3482         };
3483         size_t ip_hlen;
3484         struct udphdr udp;
3485         char *udpp, *uh_sump;
3486         uint32_t csum;
3487
3488         if (from != NULL)
3489                 from->s_addr = ip->ip_src.s_addr;
3490
3491         ip_hlen = (size_t)ip->ip_hl * 4;
3492         if (in_cksum(ip, ip_hlen, NULL) != 0)
3493                 return false;
3494
3495         if (flags & BPF_PARTIALCSUM)
3496                 return true;
3497
3498         udpp = (char *)ip + ip_hlen;
3499         memcpy(&udp, udpp, sizeof(udp));
3500         if (udp.uh_sum == 0)
3501                 return true;
3502
3503         /* UDP checksum is based on a pseudo IP header alongside
3504          * the UDP header and payload. */
3505         pip.ip.ip_len = udp.uh_ulen;
3506         csum = 0;
3507
3508         /* Need to zero the UDP sum in the packet for the checksum to work. */
3509         uh_sump = udpp + offsetof(struct udphdr, uh_sum);
3510         memset(uh_sump, 0, sizeof(udp.uh_sum));
3511
3512         /* Checksum pseudo header and then UDP + payload. */
3513         in_cksum(pip.w, sizeof(pip.w), &csum);
3514         csum = in_cksum(udpp, ntohs(udp.uh_ulen), &csum);
3515
3516 #if 0   /* Not needed, just here for completeness. */
3517         /* Put the checksum back. */
3518         memcpy(uh_sump, &udp.uh_sum, sizeof(udp.uh_sum));
3519 #endif
3520
3521         return csum == udp.uh_sum;
3522 }
3523
3524 static void
3525 dhcp_handlebootp(struct interface *ifp, struct bootp *bootp, size_t len,
3526     struct in_addr *from)
3527 {
3528         size_t v;
3529
3530         if (len < offsetof(struct bootp, vend)) {
3531                 logerrx("%s: truncated packet (%zu) from %s",
3532                     ifp->name, len, inet_ntoa(*from));
3533                 return;
3534         }
3535
3536         /* Unlikely, but appeases sanitizers. */
3537         if (len > FRAMELEN_MAX) {
3538                 logerrx("%s: packet exceeded frame length (%zu) from %s",
3539                     ifp->name, len, inet_ntoa(*from));
3540                 return;
3541         }
3542
3543         /* To make our IS_DHCP macro easy, ensure the vendor
3544          * area has at least 4 octets. */
3545         v = len - offsetof(struct bootp, vend);
3546         while (v < 4) {
3547                 bootp->vend[v++] = '\0';
3548                 len++;
3549         }
3550
3551         dhcp_handledhcp(ifp, bootp, len, from);
3552 }
3553
3554 void
3555 dhcp_packet(struct interface *ifp, uint8_t *data, size_t len,
3556     unsigned int bpf_flags)
3557 {
3558         struct bootp *bootp;
3559         struct in_addr from;
3560         size_t udp_len;
3561         size_t fl = bpf_frame_header_len(ifp);
3562 #ifdef PRIVSEP
3563         const struct dhcp_state *state = D_CSTATE(ifp);
3564
3565         /* It's possible that an interface departs and arrives in short
3566          * order to receive a BPF frame out of order.
3567          * There is a similar check in ARP, but much lower down the stack.
3568          * It's not needed for other inet protocols because we send the
3569          * message as a whole and select the interface off that and then
3570          * check state. BPF on the other hand is very interface
3571          * specific and we do need this check. */
3572         if (state == NULL)
3573                 return;
3574
3575         /* Ignore double reads */
3576         if (IN_PRIVSEP(ifp->ctx)) {
3577                 switch (state->state) {
3578                 case DHS_BOUND: /* FALLTHROUGH */
3579                 case DHS_RENEW:
3580                         return;
3581                 default:
3582                         break;
3583                 }
3584         }
3585 #endif
3586
3587         /* Trim frame header */
3588         if (fl != 0) {
3589                 if (len < fl) {
3590                         logerrx("%s: %s: short frame header %zu",
3591                             __func__, ifp->name, len);
3592                         return;
3593                 }
3594                 len -= fl;
3595                 /* Move the data to avoid alignment errors. */
3596                 memmove(data, data + fl, len);
3597         }
3598
3599         /* Validate filter. */
3600         if (!is_packet_udp_bootp(data, len)) {
3601 #ifdef BPF_DEBUG
3602                 logerrx("%s: DHCP BPF validation failure", ifp->name);
3603 #endif
3604                 return;
3605         }
3606
3607         if (!checksums_valid(data, &from, bpf_flags)) {
3608                 logerrx("%s: checksum failure from %s",
3609                     ifp->name, inet_ntoa(from));
3610                 return;
3611         }
3612
3613         /*
3614          * DHCP has a variable option area rather than a fixed vendor area.
3615          * Because DHCP uses the BOOTP protocol it should still send BOOTP
3616          * sized packets to be RFC compliant.
3617          * However some servers send a truncated vendor area.
3618          * dhcpcd can work fine without the vendor area being sent.
3619          */
3620         bootp = get_udp_data(data, &udp_len);
3621         dhcp_handlebootp(ifp, bootp, udp_len, &from);
3622 }
3623
3624 static void
3625 dhcp_readbpf(void *arg)
3626 {
3627         struct interface *ifp = arg;
3628         uint8_t buf[FRAMELEN_MAX];
3629         ssize_t bytes;
3630         struct dhcp_state *state = D_STATE(ifp);
3631         struct bpf *bpf = state->bpf;
3632
3633         bpf->bpf_flags &= ~BPF_EOF;
3634         while (!(bpf->bpf_flags & BPF_EOF)) {
3635                 bytes = bpf_read(bpf, buf, sizeof(buf));
3636                 if (bytes == -1) {
3637                         if (state->state != DHS_NONE) {
3638                                 logerr("%s: %s", __func__, ifp->name);
3639                                 dhcp_close(ifp);
3640                         }
3641                         break;
3642                 }
3643                 dhcp_packet(ifp, buf, (size_t)bytes, bpf->bpf_flags);
3644                 /* Check we still have a state after processing. */
3645                 if ((state = D_STATE(ifp)) == NULL)
3646                         break;
3647                 if ((bpf = state->bpf) == NULL)
3648                         break;
3649         }
3650 }
3651
3652 void
3653 dhcp_recvmsg(struct dhcpcd_ctx *ctx, struct msghdr *msg)
3654 {
3655         struct sockaddr_in *from = (struct sockaddr_in *)msg->msg_name;
3656         struct iovec *iov = &msg->msg_iov[0];
3657         struct interface *ifp;
3658         const struct dhcp_state *state;
3659
3660         ifp = if_findifpfromcmsg(ctx, msg, NULL);
3661         if (ifp == NULL) {
3662                 logerr(__func__);
3663                 return;
3664         }
3665         state = D_CSTATE(ifp);
3666         if (state == NULL) {
3667                 /* Try re-directing it to another interface. */
3668                 dhcp_redirect_dhcp(ifp, (struct bootp *)iov->iov_base,
3669                     iov->iov_len, &from->sin_addr);
3670                 return;
3671         }
3672
3673         if (state->bpf != NULL) {
3674                 /* Avoid a duplicate read if BPF is open for the interface. */
3675                 return;
3676         }
3677 #ifdef PRIVSEP
3678         if (IN_PRIVSEP(ctx)) {
3679                 switch (state->state) {
3680                 case DHS_BOUND: /* FALLTHROUGH */
3681                 case DHS_RENEW:
3682                         break;
3683                 default:
3684                         /* Any other state we ignore it or will receive
3685                          * via BPF. */
3686                         return;
3687                 }
3688         }
3689 #endif
3690
3691         dhcp_handlebootp(ifp, iov->iov_base, iov->iov_len,
3692             &from->sin_addr);
3693 }
3694
3695 static void
3696 dhcp_readudp(struct dhcpcd_ctx *ctx, struct interface *ifp)
3697 {
3698         const struct dhcp_state *state;
3699         struct sockaddr_in from;
3700         union {
3701                 struct bootp bootp;
3702                 uint8_t buf[10 * 1024]; /* Maximum MTU */
3703         } iovbuf;
3704         struct iovec iov = {
3705                 .iov_base = iovbuf.buf,
3706                 .iov_len = sizeof(iovbuf.buf),
3707         };
3708         union {
3709                 struct cmsghdr hdr;
3710 #ifdef IP_RECVIF
3711                 uint8_t buf[CMSG_SPACE(sizeof(struct sockaddr_dl))];
3712 #else
3713                 uint8_t buf[CMSG_SPACE(sizeof(struct in_pktinfo))];
3714 #endif
3715         } cmsgbuf = { .buf = { 0 } };
3716         struct msghdr msg = {
3717             .msg_name = &from, .msg_namelen = sizeof(from),
3718             .msg_iov = &iov, .msg_iovlen = 1,
3719             .msg_control = cmsgbuf.buf, .msg_controllen = sizeof(cmsgbuf.buf),
3720         };
3721         int s;
3722         ssize_t bytes;
3723
3724         if (ifp != NULL) {
3725                 state = D_CSTATE(ifp);
3726                 s = state->udp_rfd;
3727         } else
3728                 s = ctx->udp_rfd;
3729
3730         bytes = recvmsg(s, &msg, 0);
3731         if (bytes == -1) {
3732                 logerr(__func__);
3733                 return;
3734         }
3735
3736         iov.iov_len = (size_t)bytes;
3737         dhcp_recvmsg(ctx, &msg);
3738 }
3739
3740 static void
3741 dhcp_handleudp(void *arg)
3742 {
3743         struct dhcpcd_ctx *ctx = arg;
3744
3745         dhcp_readudp(ctx, NULL);
3746 }
3747
3748 static void
3749 dhcp_handleifudp(void *arg)
3750 {
3751         struct interface *ifp = arg;
3752
3753         dhcp_readudp(ifp->ctx, ifp);
3754 }
3755
3756 static int
3757 dhcp_openbpf(struct interface *ifp)
3758 {
3759         struct dhcp_state *state;
3760
3761         state = D_STATE(ifp);
3762
3763 #ifdef PRIVSEP
3764         if (IN_PRIVSEP_SE(ifp->ctx)) {
3765                 if (ps_bpf_openbootp(ifp) == -1) {
3766                         logerr(__func__);
3767                         return -1;
3768                 }
3769                 return 0;
3770         }
3771 #endif
3772
3773         if (state->bpf != NULL)
3774                 return 0;
3775
3776         state->bpf = bpf_open(ifp, bpf_bootp, NULL);
3777         if (state->bpf == NULL) {
3778                 if (errno == ENOENT) {
3779                         logerrx("%s not found", bpf_name);
3780                         /* May as well disable IPv4 entirely at
3781                          * this point as we really need it. */
3782                         ifp->options->options &= ~DHCPCD_IPV4;
3783                 } else
3784                         logerr("%s: %s", __func__, ifp->name);
3785                 return -1;
3786         }
3787
3788         eloop_event_add(ifp->ctx->eloop,
3789             state->bpf->bpf_fd, dhcp_readbpf, ifp);
3790         return 0;
3791 }
3792
3793 void
3794 dhcp_free(struct interface *ifp)
3795 {
3796         struct dhcp_state *state = D_STATE(ifp);
3797         struct dhcpcd_ctx *ctx;
3798
3799         dhcp_close(ifp);
3800 #ifdef ARP
3801         arp_drop(ifp);
3802 #endif
3803         if (state) {
3804                 state->state = DHS_NONE;
3805                 free(state->old);
3806                 free(state->new);
3807                 free(state->offer);
3808                 free(state->clientid);
3809                 free(state);
3810         }
3811
3812         ctx = ifp->ctx;
3813         /* If we don't have any more DHCP enabled interfaces,
3814          * close the global socket and release resources */
3815         if (ctx->ifaces) {
3816                 TAILQ_FOREACH(ifp, ctx->ifaces, next) {
3817                         state = D_STATE(ifp);
3818                         if (state != NULL && state->state != DHS_NONE)
3819                                 break;
3820                 }
3821         }
3822         if (ifp == NULL) {
3823                 if (ctx->udp_rfd != -1) {
3824                         eloop_event_delete(ctx->eloop, ctx->udp_rfd);
3825                         close(ctx->udp_rfd);
3826                         ctx->udp_rfd = -1;
3827                 }
3828                 if (ctx->udp_wfd != -1) {
3829                         close(ctx->udp_wfd);
3830                         ctx->udp_wfd = -1;
3831                 }
3832
3833                 free(ctx->opt_buffer);
3834                 ctx->opt_buffer = NULL;
3835         }
3836 }
3837
3838 static int
3839 dhcp_initstate(struct interface *ifp)
3840 {
3841         struct dhcp_state *state;
3842
3843         state = D_STATE(ifp);
3844         if (state != NULL)
3845                 return 0;
3846
3847         ifp->if_data[IF_DATA_DHCP] = calloc(1, sizeof(*state));
3848         state = D_STATE(ifp);
3849         if (state == NULL)
3850                 return -1;
3851
3852         state->state = DHS_NONE;
3853         /* 0 is a valid fd, so init to -1 */
3854         state->udp_rfd = -1;
3855 #ifdef ARPING
3856         state->arping_index = -1;
3857 #endif
3858         return 1;
3859 }
3860
3861 static int
3862 dhcp_init(struct interface *ifp)
3863 {
3864         struct dhcp_state *state;
3865         struct if_options *ifo;
3866         uint8_t len;
3867         char buf[(sizeof(ifo->clientid) - 1) * 3];
3868
3869         if (dhcp_initstate(ifp) == -1)
3870                 return -1;
3871
3872         state = D_STATE(ifp);
3873         state->state = DHS_INIT;
3874         state->reason = "PREINIT";
3875         state->nakoff = 0;
3876         dhcp_set_leasefile(state->leasefile, sizeof(state->leasefile),
3877             AF_INET, ifp);
3878
3879         ifo = ifp->options;
3880         /* We need to drop the leasefile so that dhcp_start
3881          * doesn't load it. */
3882         if (ifo->options & DHCPCD_REQUEST)
3883                 dhcp_unlink(ifp->ctx, state->leasefile);
3884
3885         free(state->clientid);
3886         state->clientid = NULL;
3887
3888         if (ifo->options & DHCPCD_ANONYMOUS) {
3889                 /* Removing the option could show that we want anonymous.
3890                  * As such keep it as it's already in the hwaddr field. */
3891                 goto make_clientid;
3892         } else if (*ifo->clientid) {
3893                 state->clientid = malloc((size_t)(ifo->clientid[0] + 1));
3894                 if (state->clientid == NULL)
3895                         goto eexit;
3896                 memcpy(state->clientid, ifo->clientid,
3897                     (size_t)(ifo->clientid[0]) + 1);
3898         } else if (ifo->options & DHCPCD_CLIENTID) {
3899                 if (ifo->options & DHCPCD_DUID) {
3900                         state->clientid = malloc(ifp->ctx->duid_len + 6);
3901                         if (state->clientid == NULL)
3902                                 goto eexit;
3903                         state->clientid[0] =(uint8_t)(ifp->ctx->duid_len + 5);
3904                         state->clientid[1] = 255; /* RFC 4361 */
3905                         memcpy(state->clientid + 2, ifo->iaid, 4);
3906                         memcpy(state->clientid + 6, ifp->ctx->duid,
3907                             ifp->ctx->duid_len);
3908                 } else {
3909 make_clientid:
3910                         len = (uint8_t)(ifp->hwlen + 1);
3911                         state->clientid = malloc((size_t)len + 1);
3912                         if (state->clientid == NULL)
3913                                 goto eexit;
3914                         state->clientid[0] = len;
3915                         state->clientid[1] = (uint8_t)ifp->hwtype;
3916                         memcpy(state->clientid + 2, ifp->hwaddr,
3917                             ifp->hwlen);
3918                 }
3919         }
3920
3921         if (ifo->options & DHCPCD_DUID)
3922                 /* Don't bother logging as DUID and IAID are reported
3923                  * at device start. */
3924                 return 0;
3925
3926         if (ifo->options & DHCPCD_CLIENTID && state->clientid != NULL)
3927                 logdebugx("%s: using ClientID %s", ifp->name,
3928                     hwaddr_ntoa(state->clientid + 1, state->clientid[0],
3929                         buf, sizeof(buf)));
3930         else if (ifp->hwlen)
3931                 logdebugx("%s: using hwaddr %s", ifp->name,
3932                     hwaddr_ntoa(ifp->hwaddr, ifp->hwlen, buf, sizeof(buf)));
3933         return 0;
3934
3935 eexit:
3936         logerr(__func__);
3937         return -1;
3938 }
3939
3940 static void
3941 dhcp_start1(void *arg)
3942 {
3943         struct interface *ifp = arg;
3944         struct dhcpcd_ctx *ctx = ifp->ctx;
3945         struct if_options *ifo = ifp->options;
3946         struct dhcp_state *state;
3947         uint32_t l;
3948         int nolease;
3949
3950         if (!(ifo->options & DHCPCD_IPV4))
3951                 return;
3952
3953         /* Listen on *.*.*.*:bootpc so that the kernel never sends an
3954          * ICMP port unreachable message back to the DHCP server.
3955          * Only do this in master mode so we don't swallow messages
3956          * for dhcpcd running on another interface. */
3957         if ((ctx->options & (DHCPCD_MASTER|DHCPCD_PRIVSEP)) == DHCPCD_MASTER
3958             && ctx->udp_rfd == -1)
3959         {
3960                 ctx->udp_rfd = dhcp_openudp(NULL);
3961                 if (ctx->udp_rfd == -1) {
3962                         logerr(__func__);
3963                         return;
3964                 }
3965                 eloop_event_add(ctx->eloop, ctx->udp_rfd, dhcp_handleudp, ctx);
3966         }
3967         if (!IN_PRIVSEP(ctx) && ctx->udp_wfd == -1) {
3968                 ctx->udp_wfd = xsocket(PF_INET, SOCK_RAW|SOCK_CXNB,IPPROTO_UDP);
3969                 if (ctx->udp_wfd == -1) {
3970                         logerr(__func__);
3971                         return;
3972                 }
3973         }
3974
3975         if (dhcp_init(ifp) == -1) {
3976                 logerr("%s: dhcp_init", ifp->name);
3977                 return;
3978         }
3979
3980         state = D_STATE(ifp);
3981         clock_gettime(CLOCK_MONOTONIC, &state->started);
3982         state->interval = 0;
3983         free(state->offer);
3984         state->offer = NULL;
3985         state->offer_len = 0;
3986
3987 #ifdef ARPING
3988         if (ifo->arping_len && state->arping_index < ifo->arping_len) {
3989                 dhcp_arping(ifp);
3990                 return;
3991         }
3992 #endif
3993
3994         if (ifo->options & DHCPCD_STATIC) {
3995                 dhcp_static(ifp);
3996                 return;
3997         }
3998
3999         if (ifo->options & DHCPCD_INFORM) {
4000                 dhcp_inform(ifp);
4001                 return;
4002         }
4003
4004         /* We don't want to read the old lease if we NAK an old test */
4005         nolease = state->offer && ifp->ctx->options & DHCPCD_TEST;
4006         if (!nolease && ifo->options & DHCPCD_DHCP) {
4007                 state->offer_len = read_lease(ifp, &state->offer);
4008                 /* Check the saved lease matches the type we want */
4009                 if (state->offer) {
4010 #ifdef IN_IFF_DUPLICATED
4011                         struct in_addr addr;
4012                         struct ipv4_addr *ia;
4013
4014                         addr.s_addr = state->offer->yiaddr;
4015                         ia = ipv4_iffindaddr(ifp, &addr, NULL);
4016 #endif
4017
4018                         if ((!IS_DHCP(state->offer) &&
4019                             !(ifo->options & DHCPCD_BOOTP)) ||
4020 #ifdef IN_IFF_DUPLICATED
4021                             (ia && ia->addr_flags & IN_IFF_DUPLICATED) ||
4022 #endif
4023                             (IS_DHCP(state->offer) &&
4024                             ifo->options & DHCPCD_BOOTP))
4025                         {
4026                                 free(state->offer);
4027                                 state->offer = NULL;
4028                                 state->offer_len = 0;
4029                         }
4030                 }
4031         }
4032         if (state->offer) {
4033                 struct ipv4_addr *ia;
4034                 time_t mtime;
4035
4036                 get_lease(ifp, &state->lease, state->offer, state->offer_len);
4037                 state->lease.frominfo = 1;
4038                 if (state->new == NULL &&
4039                     (ia = ipv4_iffindaddr(ifp,
4040                     &state->lease.addr, &state->lease.mask)) != NULL)
4041                 {
4042                         /* We still have the IP address from the last lease.
4043                          * Fake add the address and routes from it so the lease
4044                          * can be cleaned up. */
4045                         state->new = malloc(state->offer_len);
4046                         if (state->new) {
4047                                 memcpy(state->new,
4048                                     state->offer, state->offer_len);
4049                                 state->new_len = state->offer_len;
4050                                 state->addr = ia;
4051                                 state->added |= STATE_ADDED | STATE_FAKE;
4052                                 rt_build(ifp->ctx, AF_INET);
4053                         } else
4054                                 logerr(__func__);
4055                 }
4056                 if (!IS_DHCP(state->offer)) {
4057                         free(state->offer);
4058                         state->offer = NULL;
4059                         state->offer_len = 0;
4060                 } else if (!(ifo->options & DHCPCD_LASTLEASE_EXTEND) &&
4061                     state->lease.leasetime != DHCP_INFINITE_LIFETIME &&
4062                     dhcp_filemtime(ifp->ctx, state->leasefile, &mtime) == 0)
4063                 {
4064                         time_t now;
4065
4066                         /* Offset lease times and check expiry */
4067                         now = time(NULL);
4068                         if (now == -1 ||
4069                             (time_t)state->lease.leasetime < now - mtime)
4070                         {
4071                                 logdebugx("%s: discarding expired lease",
4072                                     ifp->name);
4073                                 free(state->offer);
4074                                 state->offer = NULL;
4075                                 state->offer_len = 0;
4076                                 state->lease.addr.s_addr = 0;
4077                                 /* Technically we should discard the lease
4078                                  * as it's expired, just as DHCPv6 addresses
4079                                  * would be by the kernel.
4080                                  * However, this may violate POLA so
4081                                  * we currently leave it be.
4082                                  * If we get a totally different lease from
4083                                  * the DHCP server we'll drop it anyway, as
4084                                  * we will on any other event which would
4085                                  * trigger a lease drop.
4086                                  * This should only happen if dhcpcd stops
4087                                  * running and the lease expires before
4088                                  * dhcpcd starts again. */
4089 #if 0
4090                                 if (state->new)
4091                                         dhcp_drop(ifp, "EXPIRE");
4092 #endif
4093                         } else {
4094                                 l = (uint32_t)(now - mtime);
4095                                 state->lease.leasetime -= l;
4096                                 state->lease.renewaltime -= l;
4097                                 state->lease.rebindtime -= l;
4098                         }
4099                 }
4100         }
4101
4102 #ifdef IPV4LL
4103         if (!(ifo->options & DHCPCD_DHCP)) {
4104                 if (ifo->options & DHCPCD_IPV4LL)
4105                         ipv4ll_start(ifp);
4106                 return;
4107         }
4108 #endif
4109
4110         if (state->offer == NULL ||
4111             !IS_DHCP(state->offer) ||
4112             ifo->options & DHCPCD_ANONYMOUS)
4113                 dhcp_discover(ifp);
4114         else
4115                 dhcp_reboot(ifp);
4116 }
4117
4118 void
4119 dhcp_start(struct interface *ifp)
4120 {
4121         unsigned int delay;
4122 #ifdef ARPING
4123         const struct dhcp_state *state;
4124 #endif
4125
4126         if (!(ifp->options->options & DHCPCD_IPV4))
4127                 return;
4128
4129         /* If we haven't been given a netmask for our requested address,
4130          * set it now. */
4131         if (ifp->options->req_addr.s_addr != INADDR_ANY &&
4132             ifp->options->req_mask.s_addr == INADDR_ANY)
4133                 ifp->options->req_mask.s_addr =
4134                     ipv4_getnetmask(ifp->options->req_addr.s_addr);
4135
4136         /* If we haven't specified a ClientID and our hardware address
4137          * length is greater than BOOTP CHADDR then we enforce a ClientID
4138          * of the hardware address type and the hardware address.
4139          * If there is no hardware address and no ClientID set,
4140          * force a DUID based ClientID. */
4141         if (ifp->hwlen > 16)
4142                 ifp->options->options |= DHCPCD_CLIENTID;
4143         else if (ifp->hwlen == 0 && !(ifp->options->options & DHCPCD_CLIENTID))
4144                 ifp->options->options |= DHCPCD_CLIENTID | DHCPCD_DUID;
4145
4146         /* Firewire and InfiniBand interfaces require ClientID and
4147          * the broadcast option being set. */
4148         switch (ifp->hwtype) {
4149         case ARPHRD_IEEE1394:   /* FALLTHROUGH */
4150         case ARPHRD_INFINIBAND:
4151                 ifp->options->options |= DHCPCD_CLIENTID | DHCPCD_BROADCAST;
4152                 break;
4153         }
4154
4155         /* If we violate RFC2131 section 3.7 then require ARP
4156          * to detect if any other client wants our address. */
4157         if (ifp->options->options & DHCPCD_LASTLEASE_EXTEND)
4158                 ifp->options->options |= DHCPCD_ARP;
4159
4160         /* No point in delaying a static configuration */
4161         if (ifp->options->options & DHCPCD_STATIC ||
4162             !(ifp->options->options & DHCPCD_INITIAL_DELAY))
4163         {
4164                 dhcp_start1(ifp);
4165                 return;
4166         }
4167
4168 #ifdef ARPING
4169         /* If we have arpinged then we have already delayed. */
4170         state = D_CSTATE(ifp);
4171         if (state != NULL && state->arping_index != -1) {
4172                 dhcp_start1(ifp);
4173                 return;
4174         }
4175 #endif
4176         delay = MSEC_PER_SEC +
4177                 (arc4random_uniform(MSEC_PER_SEC * 2) - MSEC_PER_SEC);
4178         logdebugx("%s: delaying IPv4 for %0.1f seconds",
4179             ifp->name, (float)delay / MSEC_PER_SEC);
4180
4181         eloop_timeout_add_msec(ifp->ctx->eloop, delay, dhcp_start1, ifp);
4182 }
4183
4184 void
4185 dhcp_abort(struct interface *ifp)
4186 {
4187         struct dhcp_state *state;
4188
4189         state = D_STATE(ifp);
4190 #ifdef ARPING
4191         if (state != NULL)
4192                 state->arping_index = -1;
4193 #endif
4194
4195         eloop_timeout_delete(ifp->ctx->eloop, dhcp_start1, ifp);
4196
4197         if (state != NULL && state->added) {
4198                 rt_build(ifp->ctx, AF_INET);
4199 #ifdef ARP
4200                 if (ifp->options->options & DHCPCD_ARP)
4201                         arp_announceaddr(ifp->ctx, &state->addr->addr);
4202 #endif
4203         }
4204 }
4205
4206 struct ipv4_addr *
4207 dhcp_handleifa(int cmd, struct ipv4_addr *ia, pid_t pid)
4208 {
4209         struct interface *ifp;
4210         struct dhcp_state *state;
4211         struct if_options *ifo;
4212         uint8_t i;
4213
4214         ifp = ia->iface;
4215         state = D_STATE(ifp);
4216         if (state == NULL || state->state == DHS_NONE)
4217                 return ia;
4218
4219         if (cmd == RTM_DELADDR) {
4220                 if (state->addr == ia) {
4221                         loginfox("%s: pid %d deleted IP address %s",
4222                             ifp->name, pid, ia->saddr);
4223                         dhcp_close(ifp);
4224                         state->addr = NULL;
4225                         /* Don't clear the added state as we need
4226                          * to drop the lease. */
4227                         dhcp_drop(ifp, "EXPIRE");
4228                         dhcp_start1(ifp);
4229                         return ia;
4230                 }
4231         }
4232
4233         if (cmd != RTM_NEWADDR)
4234                 return ia;
4235
4236 #ifdef IN_IFF_NOTUSEABLE
4237         if (!(ia->addr_flags & IN_IFF_NOTUSEABLE))
4238                 dhcp_finish_dad(ifp, &ia->addr);
4239         else if (ia->addr_flags & IN_IFF_DUPLICATED)
4240                 return dhcp_addr_duplicated(ifp, &ia->addr) ? NULL : ia;
4241 #endif
4242
4243         ifo = ifp->options;
4244
4245 #ifdef PRIVSEP
4246         if (IN_PRIVSEP_SE(ifp->ctx) &&
4247             !(ifp->ctx->options & (DHCPCD_MASTER | DHCPCD_CONFIGURE)) &&
4248             IN_ARE_ADDR_EQUAL(&state->lease.addr, &ia->addr))
4249         {
4250                 state->addr = ia;
4251                 state->added = STATE_ADDED;
4252                 dhcp_closebpf(ifp);
4253                 if (ps_inet_openbootp(ia) == -1)
4254                     logerr(__func__);
4255         }
4256 #endif
4257
4258         if (ifo->options & DHCPCD_INFORM) {
4259                 if (state->state != DHS_INFORM)
4260                         dhcp_inform(ifp);
4261                 return ia;
4262         }
4263
4264         if (!(ifo->options & DHCPCD_STATIC))
4265                 return ia;
4266         if (ifo->req_addr.s_addr != INADDR_ANY)
4267                 return ia;
4268
4269         free(state->old);
4270         state->old = state->new;
4271         state->new_len = dhcp_message_new(&state->new, &ia->addr, &ia->mask);
4272         if (state->new == NULL)
4273                 return ia;
4274         if (ifp->flags & IFF_POINTOPOINT) {
4275                 for (i = 1; i < 255; i++)
4276                         if (i != DHO_ROUTER && has_option_mask(ifo->dstmask,i))
4277                                 dhcp_message_add_addr(state->new, i, ia->brd);
4278         }
4279         state->reason = "STATIC";
4280         rt_build(ifp->ctx, AF_INET);
4281         script_runreason(ifp, state->reason);
4282         if (ifo->options & DHCPCD_INFORM) {
4283                 state->state = DHS_INFORM;
4284                 dhcp_new_xid(ifp);
4285                 state->lease.server.s_addr = INADDR_ANY;
4286                 state->addr = ia;
4287                 dhcp_inform(ifp);
4288         }
4289
4290         return ia;
4291 }
4292
4293 #ifndef SMALL
4294 int
4295 dhcp_dump(struct interface *ifp)
4296 {
4297         struct dhcp_state *state;
4298
4299         ifp->if_data[IF_DATA_DHCP] = state = calloc(1, sizeof(*state));
4300         if (state == NULL) {
4301                 logerr(__func__);
4302                 return -1;
4303         }
4304         state->new_len = read_lease(ifp, &state->new);
4305         if (state->new == NULL) {
4306                 logerr("read_lease");
4307                 return -1;
4308         }
4309         state->reason = "DUMP";
4310         return script_runreason(ifp, state->reason);
4311 }
4312 #endif