// Copyright 2011-2020 Nicholas J. Kain // SPDX-License-Identifier: MIT #include #include #include #include #include #include #include "nk/log.h" #include "nk/random.h" #include "state.h" #include "ifchange.h" #include "arp.h" #include "options.h" #include "ndhc.h" #include "sys.h" #include "netlink.h" #include "coroutine.h" #define IGNORED_RENEWS_BEFORE_REBIND 3 #define SEL_SUCCESS 0 #define SEL_FAIL -1 #define REQ_SUCCESS 0 #define REQ_TIMEOUT -1 #define REQ_FAIL -2 #define ANP_SUCCESS 0 #define ANP_IGNORE -1 #define ANP_REJECTED -2 #define ANP_CHECK_IP -3 #define BTO_WAIT 0 #define BTO_EXPIRED -1 #define BTO_HARDFAIL -2 #define IFUP_REVALIDATE 0 #define IFUP_NEWLEASE 1 #define IFUP_FAIL -1 static int delay_timeout(struct client_state_t *cs, size_t numpackets) { int to = 64; char tot[] = { 4, 8, 16, 32, 64 }; if (numpackets < sizeof tot) to = tot[numpackets]; // Distribution is a bit biased but it doesn't really matter. return to * 1000 + (int)(nk_random_u32(&cs->rnd_state) % 1000); } static void reinit_shared_deconfig(struct client_state_t *cs) { cs->xid = nk_random_u32(&cs->rnd_state); cs->clientAddr = 0; cs->num_dhcp_requests = 0; cs->num_dhcp_renews = 0; cs->server_arp_sent = 0; cs->router_arp_sent = 0; cs->server_arp_state = ARP_QUERY; cs->router_arp_state = ARP_QUERY; cs->fp_state = FPRINT_NONE; cs->check_fingerprint = false; cs->sent_renew_or_rebind = false; cs->sent_gw_query = false; cs->sent_first_announce = false; cs->sent_second_announce = false; memset(&cs->routerArp, 0, sizeof cs->routerArp); memset(&cs->serverArp, 0, sizeof cs->serverArp); arp_reset_state(cs); } static void reinit_selecting(struct client_state_t *cs, int timeout) { reinit_shared_deconfig(cs); cs->dhcp_wake_ts = curms() + timeout; start_dhcp_listen(cs); } // Triggered after a DHCP lease request packet has been sent and no reply has // been received within the response wait time. If we've not exceeded the // maximum number of request retransmits, then send another packet and wait // again. Otherwise, return to the DHCP initialization state. static int requesting_timeout(struct client_state_t *cs, long long nowts) { if (cs->num_dhcp_requests >= 5) { reinit_selecting(cs, 0); return REQ_TIMEOUT; } if (send_selecting(cs) < 0) { log_line("%s: Failed to send a selecting request packet.", client_config.interface); return REQ_FAIL; } cs->dhcp_wake_ts = nowts + delay_timeout(cs, cs->num_dhcp_requests); cs->num_dhcp_requests++; return REQ_SUCCESS; } // Called by renewing_timeout() to try to renew the lease. If all // timeouts expire, then expire the lease and notify the caller. static int rebinding_timeout(struct client_state_t *cs, long long nowts) { long long elt = cs->leaseStartTime + cs->lease * 1000; if (nowts >= elt) { log_line("%s: Lease expired. Searching for a new lease...", client_config.interface); reinit_selecting(cs, 0); return BTO_EXPIRED; } start_dhcp_listen(cs); if (send_rebind(cs) < 0) { log_line("%s: Failed to send a rebind request packet.", client_config.interface); return BTO_HARDFAIL; } cs->sent_renew_or_rebind = true; long long ts0 = nowts + (50 + nk_random_u32(&cs->rnd_state) % 20) * 1000; cs->dhcp_wake_ts = ts0 < elt ? ts0 : elt; return BTO_WAIT; } // Called by bound_timeout() to try to renew the lease. static int renewing_timeout(struct client_state_t *cs, long long nowts) { long long rbt = cs->leaseStartTime + cs->rebindTime * 1000; if (nowts >= rbt || cs->num_dhcp_renews >= IGNORED_RENEWS_BEFORE_REBIND) return rebinding_timeout(cs, nowts); start_dhcp_listen(cs); if (send_renew(cs) < 0) { log_line("%s: Failed to send a renew request packet.", client_config.interface); return BTO_HARDFAIL; } cs->sent_renew_or_rebind = true; ++cs->num_dhcp_renews; long long ts0 = nowts + (50 + nk_random_u32(&cs->rnd_state) % 20) * 1000; cs->dhcp_wake_ts = ts0 < rbt ? ts0 : rbt; return BTO_WAIT; } // Called to handle dhcp state timeouts, such as when RENEW or REBIND // DHCPREQUESTs must be sent. Can return BTO_(WAIT|EXPIRED|HARDFAIL). static int bound_timeout(struct client_state_t *cs, long long nowts) { long long rnt = cs->leaseStartTime + cs->renewTime * 1000; if (nowts < rnt) { cs->dhcp_wake_ts = rnt; return BTO_WAIT; } return renewing_timeout(cs, nowts); } static void get_leasetime(struct client_state_t *cs, struct dhcpmsg *packet) { cs->lease = get_option_leasetime(packet); cs->leaseStartTime = curms(); if (!cs->lease) { log_line("%s: No lease time received; assuming 1h.", client_config.interface); cs->lease = 60 * 60; } else { if (cs->lease < 60) { log_line("%s: Server sent lease of <1m. Forcing lease to 1m.", client_config.interface); cs->lease = 60; } } // Always use RFC2131 'default' values. It's not worth validating // the remote server values, if they even exist, for sanity. cs->renewTime = cs->lease >> 1; cs->rebindTime = (cs->lease >> 3) * 0x7; // * 0.875 cs->dhcp_wake_ts = cs->leaseStartTime + cs->renewTime * 1000; } static bool validate_acknak(struct client_state_t *cs, struct dhcpmsg *packet, const char *typemsg, uint32_t srcaddr) { // Don't validate the server id. Instead validate that the // yiaddr matches. Some networks have multiple servers // that don't respect the serverid that was specified in // our DHCPREQUEST. if (memcmp(&packet->yiaddr, &cs->clientAddr, 4)) return false; int found; uint32_t sid = get_option_serverid(packet, &found); if (!found) { log_line("%s: Received %s with no server id. Ignoring it.", client_config.interface, typemsg); return false; } if (cs->serverAddr != sid) { cs->serverAddr = sid; cs->srcAddr = srcaddr; } return true; } static int extend_packet(struct client_state_t *cs, struct dhcpmsg *packet, uint8_t msgtype, uint32_t srcaddr) { (void)srcaddr; if (msgtype == DHCPACK) { if (!validate_acknak(cs, packet, "DHCPACK", srcaddr)) return ANP_IGNORE; cs->sent_renew_or_rebind = false; cs->num_dhcp_renews = 0; get_leasetime(cs, packet); // Did we receive a lease with a different IP than we had before? if (memcmp(&packet->yiaddr, &cs->clientAddr, 4)) { char clibuf[INET_ADDRSTRLEN]; inet_ntop(AF_INET, &(struct in_addr){.s_addr=cs->clientAddr}, clibuf, sizeof clibuf); log_line("%s: Server is now offering IP %s. Validating...", client_config.interface, clibuf); cs->xid = nk_random_u32(&cs->rnd_state); return ANP_CHECK_IP; } else { log_line("%s: Lease refreshed to %u seconds.", client_config.interface, cs->lease); if (arp_set_defense_mode(cs) < 0) log_line("%s: Failed to create ARP defense socket.", client_config.interface); stop_dhcp_listen(cs); cs->xid = nk_random_u32(&cs->rnd_state); return ANP_SUCCESS; } } else if (msgtype == DHCPNAK) { if (!validate_acknak(cs, packet, "DHCPNAK", srcaddr)) return ANP_IGNORE; cs->sent_renew_or_rebind = false; cs->num_dhcp_renews = 0; log_line("%s: Our request was rejected. Searching for a new lease...", client_config.interface); reinit_selecting(cs, 3000); return ANP_REJECTED; } return ANP_IGNORE; } static int selecting_packet(struct client_state_t *cs, struct dhcpmsg *packet, uint8_t msgtype, uint32_t srcaddr, bool is_requesting) { char clibuf[INET_ADDRSTRLEN]; char svrbuf[INET_ADDRSTRLEN]; char srcbuf[INET_ADDRSTRLEN]; int found; if (!is_requesting && msgtype == DHCPOFFER) { uint32_t sid = get_option_serverid(packet, &found); if (!found) { log_line("%s: Invalid offer received: it didn't have a server id.", client_config.interface); return ANP_IGNORE; } cs->xid = packet->xid; // Use for subsequent DHCPREQUESTs cs->clientAddr = packet->yiaddr; cs->serverAddr = sid; cs->srcAddr = srcaddr; cs->dhcp_wake_ts = curms(); cs->num_dhcp_requests = 0; inet_ntop(AF_INET, &(struct in_addr){.s_addr=cs->clientAddr}, clibuf, sizeof clibuf); inet_ntop(AF_INET, &(struct in_addr){.s_addr=cs->serverAddr}, svrbuf, sizeof svrbuf); inet_ntop(AF_INET, &(struct in_addr){.s_addr=cs->srcAddr}, srcbuf, sizeof srcbuf); log_line("%s: Received IP offer: %s from server %s via %s.", client_config.interface, clibuf, svrbuf, srcbuf); return ANP_SUCCESS; } else if (is_requesting && msgtype == DHCPACK) { if (!validate_acknak(cs, packet, "DHCPACK", srcaddr)) return ANP_IGNORE; get_leasetime(cs, packet); inet_ntop(AF_INET, &(struct in_addr){.s_addr=cs->clientAddr}, clibuf, sizeof clibuf); inet_ntop(AF_INET, &(struct in_addr){.s_addr=cs->serverAddr}, svrbuf, sizeof svrbuf); inet_ntop(AF_INET, &(struct in_addr){.s_addr=cs->srcAddr}, srcbuf, sizeof srcbuf); log_line("%s: Received ACK: %s from server %s via %s. Validating...", client_config.interface, clibuf, svrbuf, srcbuf); return ANP_CHECK_IP; } return ANP_IGNORE; } // Triggered after a DHCP discover packet has been sent and no reply has // been received within the response wait time. If we've not exceeded the // maximum number of discover retransmits, then send another packet and wait // again. Otherwise fail. static int selecting_timeout(struct client_state_t *cs, long long nowts) { if (cs->program_init && cs->num_dhcp_requests >= 2) { if (client_config.abort_if_no_lease) suicide("%s: No lease; failing.", client_config.interface); } if (send_discover(cs) < 0) { log_line("%s: Failed to send a discover request packet.", client_config.interface); return SEL_FAIL; } cs->dhcp_wake_ts = nowts + delay_timeout(cs, cs->num_dhcp_requests); cs->num_dhcp_requests++; return SEL_SUCCESS; } // Called for a release signal during SELECTING or REQUESTING. static void print_release(struct client_state_t *cs) { log_line("%s: ndhc going to sleep. Wake it by sending a SIGUSR1.", client_config.interface); reinit_shared_deconfig(cs); cs->dhcp_wake_ts = -1; stop_dhcp_listen(cs); } // Called for a release signal during BOUND, RENEWING, or REBINDING. static int xmit_release(struct client_state_t *cs) { char clibuf[INET_ADDRSTRLEN]; char svrbuf[INET_ADDRSTRLEN]; inet_ntop(AF_INET, &(struct in_addr){.s_addr=cs->clientAddr}, clibuf, sizeof clibuf); inet_ntop(AF_INET, &(struct in_addr){.s_addr=cs->serverAddr}, svrbuf, sizeof svrbuf); log_line("%s: Unicasting a release of %s to %s.", client_config.interface, clibuf, svrbuf); if (send_release(cs) < 0) { log_line("%s: Failed to send a release request packet.", client_config.interface); return -1; } print_release(cs); return 0; } // Called for a renewing signal during BOUND or RELEASED static int frenew(struct client_state_t *cs, bool is_bound) { if (is_bound) { log_line("%s: Forcing a DHCP renew...", client_config.interface); start_dhcp_listen(cs); if (send_renew(cs) < 0) { log_line("%s: Failed to send a renew request packet.", client_config.interface); return -1; } } else { // RELEASED reinit_selecting(cs, 0); } return 0; } // If we have a lease, check to see if our gateway is still valid via ARP. // If it fails, state -> SELECTING. static int ifup_action(struct client_state_t *cs) { if (cs->routerAddr && cs->serverAddr) { const bool fp_server = cs->server_arp_state == ARP_FOUND; const bool fp_router = (cs->routerAddr != cs->serverAddr) ? (cs->router_arp_state == ARP_FOUND) : fp_server; if ((!fp_server && !fp_router) || cs->fp_state == FPRINT_NONE) goto no_fingerprint; if (cs->fp_state == FPRINT_INPROGRESS) { suicide("%s: Carrier lost during initial fingerprint. Forcing restart.", client_config.interface); } if (arp_gw_check(cs) >= 0) { log_line("%s: Interface is back. Revalidating lease...", client_config.interface); return IFUP_REVALIDATE; } else { log_line("%s: arp_gw_check could not make arp socket.", client_config.interface); return IFUP_FAIL; } } no_fingerprint: log_line("%s: Interface is back. Searching for new lease...", client_config.interface); return IFUP_NEWLEASE; } // If ret == 0: do nothing // ret == 1: ret = COR_ERROR; scrReturn(ret); continue // ret == 2: goto skip_to_released // ret == 3: break static int signal_check_nolease(struct client_state_t *cs) { for (;;) { int s = signals_flagged(); if (s == SIGNAL_NONE) break; if (s == SIGNAL_EXIT) signal_exit(EXIT_SUCCESS); if (s == SIGNAL_RELEASE) { print_release(cs); return 2; } } return 0; } static int signal_check_havelease(struct client_state_t *cs) { for (;;) { int s = signals_flagged(); if (s == SIGNAL_NONE) break; if (s == SIGNAL_EXIT) signal_exit(EXIT_SUCCESS); if (s == SIGNAL_RELEASE) { int r = xmit_release(cs); if (r) return 1; return 2; } if (s == SIGNAL_RENEW) { int r = frenew(cs, true); if (r) return 1; } } return 0; } static int signal_check_released(struct client_state_t *cs) { (void)cs; for (;;) { int s = signals_flagged(); if (s == SIGNAL_NONE) break; if (s == SIGNAL_EXIT) signal_exit(EXIT_SUCCESS); if (s == SIGNAL_RENEW) return 3; } return 0; } #define SIGNAL_CHECK(NAME) \ { \ int tt = signal_check_ ## NAME(cs); \ if (tt == 1) { \ ret = COR_ERROR; \ scrReturn(ret); \ continue; \ } \ if (tt == 2) goto skip_to_released; \ if (tt == 3) break; \ } #define BAD_STATE() suicide("%s(%d): bad state", __func__, __LINE__) // XXX: Should be re-entrant so as to handle multiple servers. int dhcp_handle(struct client_state_t *cs, long long nowts, bool sev_dhcp, struct dhcpmsg *dhcp_packet, uint8_t dhcp_msgtype, uint32_t dhcp_srcaddr, bool sev_arp, bool force_fingerprint, bool dhcp_timeout, bool arp_timeout) { scrBegin; reinit: // We're in the SELECTING state here. for (;;) { int ret = COR_SUCCESS; SIGNAL_CHECK(nolease); if (sev_dhcp) { int r = selecting_packet(cs, dhcp_packet, dhcp_msgtype, dhcp_srcaddr, false); if (r == ANP_SUCCESS) { // Send a request packet to the answering DHCP server. sev_dhcp = false; goto skip_to_requesting; } } if (dhcp_timeout) { int r = selecting_timeout(cs, nowts); if (r == SEL_SUCCESS) { } else if (r == SEL_FAIL) { ret = COR_ERROR; } else BAD_STATE(); } scrReturn(ret); } scrReturn(COR_SUCCESS); // We're in the REQUESTING state here. for (;;) { int ret; skip_to_requesting: ret = COR_SUCCESS; SIGNAL_CHECK(nolease); if (sev_dhcp) { int r = selecting_packet(cs, dhcp_packet, dhcp_msgtype, dhcp_srcaddr, true); if (r == ANP_IGNORE) { } else if (r == ANP_CHECK_IP) { if (arp_check(cs, dhcp_packet) < 0) { log_line("%s: Failed to make arp socket. Searching for new lease...", client_config.interface); reinit_selecting(cs, 3000); sev_dhcp = false; goto reinit; } break; } else BAD_STATE(); } if (dhcp_timeout) { // Send a request packet to the answering DHCP server. int r = requesting_timeout(cs, nowts); if (r == REQ_SUCCESS) { } else if (r == REQ_TIMEOUT) { // We timed out. Send another packet. sev_dhcp = false; goto reinit; } else if (r == REQ_FAIL) { // Failed to send packet. Sleep and retry. ret = COR_ERROR; } else BAD_STATE(); } scrReturn(ret); } scrReturn(COR_SUCCESS); // We're checking to see if there's a conflict for our IP. Technically, // this is still in REQUESTING. for (;;) { int ret; ret = COR_SUCCESS; SIGNAL_CHECK(nolease); if (sev_dhcp) { // XXX: Maybe I can think of something to do here. Would // be more relevant if we tracked multiple dhcp servers. } if (sev_arp) { int r = arp_do_collision_check(cs); if (r == ARPR_OK) { } else if (r == ARPR_CONFLICT) { // XXX: If we tracked multiple DHCP servers, then we // could fall back on another one. reinit_selecting(cs, 0); sev_dhcp = false; goto reinit; } else if (r == ARPR_FAIL) { ret = COR_ERROR; scrReturn(ret); continue; } else BAD_STATE(); } if (arp_timeout) { int r = arp_collision_timeout(cs, nowts); if (r == ARPR_FREE) { arp_query_gateway(cs); arp_announce(cs); break; } else if (r == ARPR_OK) { } else if (r == ARPR_FAIL) { ret = COR_ERROR; scrReturn(ret); continue; } else BAD_STATE(); } if (dhcp_timeout) { // Send a request packet to the answering DHCP server. int r = requesting_timeout(cs, nowts); if (r == REQ_SUCCESS) { } else if (r == REQ_TIMEOUT) { // We timed out. Send another packet. sev_dhcp = false; goto reinit; } else if (r == REQ_FAIL) { // Failed to send packet. Sleep and retry. ret = COR_ERROR; } else BAD_STATE(); } scrReturn(ret); } scrReturn(COR_SUCCESS); // We're in the BOUND, RENEWING, or REBINDING states here. for (;;) { int ret = COR_SUCCESS; SIGNAL_CHECK(havelease); if (sev_dhcp && cs->sent_renew_or_rebind) { int r = extend_packet(cs, dhcp_packet, dhcp_msgtype, dhcp_srcaddr); if (r == ANP_SUCCESS || r == ANP_IGNORE) { } else if (r == ANP_REJECTED) { sev_dhcp = false; goto reinit; } else if (r == ANP_CHECK_IP) { if (arp_check(cs, dhcp_packet) < 0) { log_line("%s: Failed to make arp socket. Searching for new lease...", client_config.interface); reinit_selecting(cs, 3000); sev_dhcp = false; goto reinit; } } else BAD_STATE(); } if (sev_arp) { int r; r = arp_do_defense(cs); if (r == ARPR_OK) { } else if (r == ARPR_CONFLICT) { reinit_selecting(cs, 0); sev_dhcp = false; goto reinit; } else if (r == ARPR_FAIL) { ret = COR_ERROR; scrReturn(ret); continue; } else BAD_STATE(); if (cs->router_arp_state == ARP_QUERY || cs->server_arp_state == ARP_QUERY) { r = arp_do_gw_query(cs); if (r == ARPR_OK) { } else if (r == ARPR_FREE) { log_line("%s: Network fingerprinting complete.", client_config.interface); cs->fp_state = FPRINT_DONE; } else if (r == ARPR_FAIL) { ret = COR_ERROR; scrReturn(ret); continue; } else BAD_STATE(); } else if (cs->check_fingerprint) { r = arp_do_gw_check(cs); if (r == ARPR_OK) { } else if (r == ARPR_FREE) { cs->check_fingerprint = false; } else if (r == ARPR_CONFLICT) { cs->check_fingerprint = false; reinit_selecting(cs, 0); sev_dhcp = false; goto reinit; } else if (r == ARPR_FAIL) { ret = COR_ERROR; scrReturn(ret); continue; } else BAD_STATE(); } } if (arp_timeout) { if (cs->sent_first_announce && cs->sent_second_announce) arp_defense_timeout(cs, nowts); else arp_announce_timeout(cs, nowts); if (!cs->sent_gw_query) arp_query_gateway_timeout(cs, nowts); else if (cs->router_arp_state == ARP_QUERY || cs->server_arp_state == ARP_QUERY) { int r = arp_gw_query_timeout(cs, nowts); if (r == ARPR_OK) { } else if (r == ARPR_FAIL) { ret = COR_ERROR; scrReturn(ret); continue; } else BAD_STATE(); } else if (cs->check_fingerprint) { int r = arp_gw_check_timeout(cs, nowts); if (r == ARPR_OK) { } else if (r == ARPR_CONFLICT) { cs->check_fingerprint = false; reinit_selecting(cs, 0); sev_dhcp = false; goto reinit; } else if (r == ARPR_FAIL) { ret = COR_ERROR; scrReturn(ret); continue; } else BAD_STATE(); } } if (force_fingerprint) { int r = ifup_action(cs); if (r == IFUP_REVALIDATE) { } else if (r == IFUP_NEWLEASE) { if (ifchange_deconfig(cs) < 0) { // Likely only to fail because of rfkill. ret = COR_ERROR; scrReturn(ret); } reinit_selecting(cs, 0); sev_dhcp = false; goto reinit; } else if (r == IFUP_FAIL) { ret = COR_ERROR; scrReturn(ret); continue; } else BAD_STATE(); } if (dhcp_timeout) { int r = bound_timeout(cs, nowts); if (r == BTO_WAIT) { } else if (r == BTO_EXPIRED) { sev_dhcp = false; goto reinit; } else if (r == BTO_HARDFAIL) { ret = COR_ERROR; } else BAD_STATE(); } scrReturn(ret); } sev_dhcp = false; goto reinit; // We're in the RELEASED state here. for (;;) { int ret; skip_to_released: ret = COR_SUCCESS; SIGNAL_CHECK(released); scrReturn(ret); } sev_dhcp = false; goto reinit; scrFinish(COR_SUCCESS); }