2023-05-26 12:31:55 +03:00
|
|
|
//go:build linux
|
2021-09-30 18:28:19 +03:00
|
|
|
|
|
|
|
package dhcpd
|
|
|
|
|
|
|
|
import (
|
|
|
|
"fmt"
|
|
|
|
"net"
|
|
|
|
"os"
|
|
|
|
"time"
|
|
|
|
|
|
|
|
"github.com/AdguardTeam/golibs/errors"
|
2023-04-14 16:58:07 +03:00
|
|
|
"github.com/AdguardTeam/golibs/log"
|
2021-09-30 18:28:19 +03:00
|
|
|
"github.com/AdguardTeam/golibs/netutil"
|
|
|
|
"github.com/google/gopacket"
|
|
|
|
"github.com/google/gopacket/layers"
|
|
|
|
"github.com/insomniacslk/dhcp/dhcpv4"
|
|
|
|
"github.com/insomniacslk/dhcp/dhcpv4/server4"
|
|
|
|
"github.com/mdlayher/ethernet"
|
2023-03-20 02:29:04 +03:00
|
|
|
"github.com/mdlayher/packet"
|
2021-09-30 18:28:19 +03:00
|
|
|
)
|
|
|
|
|
|
|
|
// dhcpUnicastAddr is the combination of MAC and IP addresses for responding to
|
|
|
|
// the unconfigured host.
|
|
|
|
type dhcpUnicastAddr struct {
|
2023-03-20 02:29:04 +03:00
|
|
|
// packet.Addr is embedded here to make *dhcpUcastAddr a net.Addr without
|
2021-09-30 18:28:19 +03:00
|
|
|
// actually implementing all methods. It also contains the client's
|
|
|
|
// hardware address.
|
2023-03-20 02:29:04 +03:00
|
|
|
packet.Addr
|
2021-09-30 18:28:19 +03:00
|
|
|
|
|
|
|
// yiaddr is an IP address just allocated by server for the host.
|
|
|
|
yiaddr net.IP
|
|
|
|
}
|
|
|
|
|
|
|
|
// dhcpConn is the net.PacketConn capable of handling both net.UDPAddr and
|
|
|
|
// net.HardwareAddr.
|
|
|
|
type dhcpConn struct {
|
|
|
|
// udpConn is the connection for UDP addresses.
|
|
|
|
udpConn net.PacketConn
|
|
|
|
// bcastIP is the broadcast address specific for the configured
|
|
|
|
// interface's subnet.
|
|
|
|
bcastIP net.IP
|
|
|
|
|
|
|
|
// rawConn is the connection for MAC addresses.
|
|
|
|
rawConn net.PacketConn
|
|
|
|
// srcMAC is the hardware address of the configured network interface.
|
|
|
|
srcMAC net.HardwareAddr
|
|
|
|
// srcIP is the IP address of the configured network interface.
|
|
|
|
srcIP net.IP
|
|
|
|
}
|
|
|
|
|
|
|
|
// newDHCPConn creates the special connection for DHCP server.
|
2022-08-03 14:36:18 +03:00
|
|
|
func (s *v4Server) newDHCPConn(iface *net.Interface) (c net.PacketConn, err error) {
|
2021-09-30 18:28:19 +03:00
|
|
|
var ucast net.PacketConn
|
2023-03-20 02:29:04 +03:00
|
|
|
if ucast, err = packet.Listen(iface, packet.Raw, int(ethernet.EtherTypeIPv4), nil); err != nil {
|
2021-09-30 18:28:19 +03:00
|
|
|
return nil, fmt.Errorf("creating raw udp connection: %w", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Create the UDP connection.
|
|
|
|
var bcast net.PacketConn
|
2022-08-03 14:36:18 +03:00
|
|
|
bcast, err = server4.NewIPv4UDPConn(iface.Name, &net.UDPAddr{
|
2021-09-30 18:28:19 +03:00
|
|
|
// TODO(e.burkov): Listening on zeroes makes the server handle
|
|
|
|
// requests from all the interfaces. Inspect the ways to
|
|
|
|
// specify the interface-specific listening addresses.
|
|
|
|
//
|
|
|
|
// See https://github.com/AdguardTeam/AdGuardHome/issues/3539.
|
|
|
|
IP: net.IP{0, 0, 0, 0},
|
|
|
|
Port: dhcpv4.ServerPort,
|
|
|
|
})
|
|
|
|
if err != nil {
|
|
|
|
return nil, fmt.Errorf("creating ipv4 udp connection: %w", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
return &dhcpConn{
|
|
|
|
udpConn: bcast,
|
2022-10-14 15:29:44 +03:00
|
|
|
bcastIP: s.conf.broadcastIP.AsSlice(),
|
2021-09-30 18:28:19 +03:00
|
|
|
rawConn: ucast,
|
2022-08-03 14:36:18 +03:00
|
|
|
srcMAC: iface.HardwareAddr,
|
2022-10-14 15:29:44 +03:00
|
|
|
srcIP: s.conf.dnsIPAddrs[0].AsSlice(),
|
2021-09-30 18:28:19 +03:00
|
|
|
}, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// wrapErrs is a helper to wrap the errors from two independent underlying
|
|
|
|
// connections.
|
2022-09-07 14:34:30 +03:00
|
|
|
func (*dhcpConn) wrapErrs(action string, udpConnErr, rawConnErr error) (err error) {
|
2021-09-30 18:28:19 +03:00
|
|
|
switch {
|
|
|
|
case udpConnErr != nil && rawConnErr != nil:
|
|
|
|
return errors.List(fmt.Sprintf("%s both connections", action), udpConnErr, rawConnErr)
|
|
|
|
case udpConnErr != nil:
|
|
|
|
return fmt.Errorf("%s udp connection: %w", action, udpConnErr)
|
|
|
|
case rawConnErr != nil:
|
|
|
|
return fmt.Errorf("%s raw connection: %w", action, rawConnErr)
|
|
|
|
default:
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// WriteTo implements net.PacketConn for *dhcpConn. It selects the underlying
|
|
|
|
// connection to write to based on the type of addr.
|
|
|
|
func (c *dhcpConn) WriteTo(p []byte, addr net.Addr) (n int, err error) {
|
|
|
|
switch addr := addr.(type) {
|
|
|
|
case *dhcpUnicastAddr:
|
|
|
|
// Unicast the message to the client's MAC address. Use the raw
|
|
|
|
// connection.
|
|
|
|
//
|
|
|
|
// Note: unicasting is performed on the only network interface
|
|
|
|
// that is configured. For now it may be not what users expect
|
|
|
|
// so additionally broadcast the message via UDP connection.
|
|
|
|
//
|
|
|
|
// See https://github.com/AdguardTeam/AdGuardHome/issues/3539.
|
|
|
|
var rerr error
|
|
|
|
n, rerr = c.unicast(p, addr)
|
|
|
|
|
|
|
|
_, uerr := c.broadcast(p, &net.UDPAddr{
|
|
|
|
IP: netutil.IPv4bcast(),
|
|
|
|
Port: dhcpv4.ClientPort,
|
|
|
|
})
|
|
|
|
|
|
|
|
return n, c.wrapErrs("writing to", uerr, rerr)
|
|
|
|
case *net.UDPAddr:
|
|
|
|
if addr.IP.Equal(net.IPv4bcast) {
|
|
|
|
// Broadcast the message for the client which supports
|
|
|
|
// it. Use the UDP connection.
|
|
|
|
return c.broadcast(p, addr)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Unicast the message to the client's IP address. Use the UDP
|
|
|
|
// connection.
|
|
|
|
return c.udpConn.WriteTo(p, addr)
|
|
|
|
default:
|
2022-09-07 14:34:30 +03:00
|
|
|
return 0, fmt.Errorf("addr has an unexpected type %T", addr)
|
2021-09-30 18:28:19 +03:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// ReadFrom implements net.PacketConn for *dhcpConn.
|
|
|
|
func (c *dhcpConn) ReadFrom(p []byte) (n int, addr net.Addr, err error) {
|
|
|
|
return c.udpConn.ReadFrom(p)
|
|
|
|
}
|
|
|
|
|
|
|
|
// unicast wraps respData with required frames and writes it to the peer.
|
|
|
|
func (c *dhcpConn) unicast(respData []byte, peer *dhcpUnicastAddr) (n int, err error) {
|
|
|
|
var data []byte
|
|
|
|
data, err = c.buildEtherPkt(respData, peer)
|
|
|
|
if err != nil {
|
|
|
|
return 0, err
|
|
|
|
}
|
|
|
|
|
|
|
|
return c.rawConn.WriteTo(data, &peer.Addr)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Close implements net.PacketConn for *dhcpConn.
|
|
|
|
func (c *dhcpConn) Close() (err error) {
|
|
|
|
rerr := c.rawConn.Close()
|
|
|
|
if errors.Is(rerr, os.ErrClosed) {
|
|
|
|
// Ignore the error since the actual file is closed already.
|
|
|
|
rerr = nil
|
|
|
|
}
|
|
|
|
|
|
|
|
return c.wrapErrs("closing", c.udpConn.Close(), rerr)
|
|
|
|
}
|
|
|
|
|
|
|
|
// LocalAddr implements net.PacketConn for *dhcpConn.
|
|
|
|
func (c *dhcpConn) LocalAddr() (a net.Addr) {
|
|
|
|
return c.udpConn.LocalAddr()
|
|
|
|
}
|
|
|
|
|
|
|
|
// SetDeadline implements net.PacketConn for *dhcpConn.
|
|
|
|
func (c *dhcpConn) SetDeadline(t time.Time) (err error) {
|
|
|
|
return c.wrapErrs("setting deadline on", c.udpConn.SetDeadline(t), c.rawConn.SetDeadline(t))
|
|
|
|
}
|
|
|
|
|
|
|
|
// SetReadDeadline implements net.PacketConn for *dhcpConn.
|
|
|
|
func (c *dhcpConn) SetReadDeadline(t time.Time) error {
|
|
|
|
return c.wrapErrs(
|
|
|
|
"setting reading deadline on",
|
|
|
|
c.udpConn.SetReadDeadline(t),
|
|
|
|
c.rawConn.SetReadDeadline(t),
|
|
|
|
)
|
|
|
|
}
|
|
|
|
|
|
|
|
// SetWriteDeadline implements net.PacketConn for *dhcpConn.
|
|
|
|
func (c *dhcpConn) SetWriteDeadline(t time.Time) error {
|
|
|
|
return c.wrapErrs(
|
|
|
|
"setting writing deadline on",
|
|
|
|
c.udpConn.SetWriteDeadline(t),
|
|
|
|
c.rawConn.SetWriteDeadline(t),
|
|
|
|
)
|
|
|
|
}
|
|
|
|
|
2022-09-07 14:34:30 +03:00
|
|
|
// ipv4DefaultTTL is the default Time to Live value in seconds as recommended by
|
|
|
|
// RFC-1700.
|
|
|
|
//
|
|
|
|
// See https://datatracker.ietf.org/doc/html/rfc1700.
|
2021-09-30 18:28:19 +03:00
|
|
|
const ipv4DefaultTTL = 64
|
|
|
|
|
2022-09-07 14:34:30 +03:00
|
|
|
// buildEtherPkt wraps the payload with IPv4, UDP and Ethernet frames.
|
|
|
|
// Validation of the payload is a caller's responsibility.
|
2021-09-30 18:28:19 +03:00
|
|
|
func (c *dhcpConn) buildEtherPkt(payload []byte, peer *dhcpUnicastAddr) (pkt []byte, err error) {
|
|
|
|
udpLayer := &layers.UDP{
|
|
|
|
SrcPort: dhcpv4.ServerPort,
|
|
|
|
DstPort: dhcpv4.ClientPort,
|
|
|
|
}
|
2022-09-07 14:34:30 +03:00
|
|
|
|
2021-09-30 18:28:19 +03:00
|
|
|
ipv4Layer := &layers.IPv4{
|
|
|
|
Version: uint8(layers.IPProtocolIPv4),
|
|
|
|
Flags: layers.IPv4DontFragment,
|
|
|
|
TTL: ipv4DefaultTTL,
|
|
|
|
Protocol: layers.IPProtocolUDP,
|
|
|
|
SrcIP: c.srcIP,
|
|
|
|
DstIP: peer.yiaddr,
|
|
|
|
}
|
|
|
|
|
|
|
|
// Ignore the error since it's only returned for invalid network layer's
|
|
|
|
// type.
|
|
|
|
_ = udpLayer.SetNetworkLayerForChecksum(ipv4Layer)
|
2022-09-07 14:34:30 +03:00
|
|
|
|
2021-09-30 18:28:19 +03:00
|
|
|
ethLayer := &layers.Ethernet{
|
|
|
|
SrcMAC: c.srcMAC,
|
|
|
|
DstMAC: peer.HardwareAddr,
|
|
|
|
EthernetType: layers.EthernetTypeIPv4,
|
|
|
|
}
|
|
|
|
|
|
|
|
buf := gopacket.NewSerializeBuffer()
|
2022-09-07 14:34:30 +03:00
|
|
|
setts := gopacket.SerializeOptions{
|
2021-09-30 18:28:19 +03:00
|
|
|
FixLengths: true,
|
|
|
|
ComputeChecksums: true,
|
2022-09-07 14:34:30 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
err = gopacket.SerializeLayers(
|
|
|
|
buf,
|
|
|
|
setts,
|
|
|
|
ethLayer,
|
|
|
|
ipv4Layer,
|
|
|
|
udpLayer,
|
|
|
|
gopacket.Payload(payload),
|
|
|
|
)
|
2021-09-30 18:28:19 +03:00
|
|
|
if err != nil {
|
|
|
|
return nil, fmt.Errorf("serializing layers: %w", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
return buf.Bytes(), nil
|
|
|
|
}
|
2023-04-14 16:58:07 +03:00
|
|
|
|
|
|
|
// send writes resp for peer to conn considering the req's parameters according
|
|
|
|
// to RFC-2131.
|
|
|
|
//
|
|
|
|
// See https://datatracker.ietf.org/doc/html/rfc2131#section-4.1.
|
|
|
|
func (s *v4Server) send(peer net.Addr, conn net.PacketConn, req, resp *dhcpv4.DHCPv4) {
|
|
|
|
switch giaddr, ciaddr, mtype := req.GatewayIPAddr, req.ClientIPAddr, resp.MessageType(); {
|
|
|
|
case giaddr != nil && !giaddr.IsUnspecified():
|
2023-06-22 14:18:43 +03:00
|
|
|
// Send any return messages to the server port on the BOOTP relay agent
|
|
|
|
// whose address appears in giaddr.
|
2023-04-14 16:58:07 +03:00
|
|
|
peer = &net.UDPAddr{
|
|
|
|
IP: giaddr,
|
|
|
|
Port: dhcpv4.ServerPort,
|
|
|
|
}
|
|
|
|
if mtype == dhcpv4.MessageTypeNak {
|
|
|
|
// Set the broadcast bit in the DHCPNAK, so that the relay agent
|
2023-06-22 14:18:43 +03:00
|
|
|
// broadcasts it to the client, because the client may not have a
|
|
|
|
// correct network address or subnet mask, and the client may not be
|
|
|
|
// answering ARP requests.
|
2023-04-14 16:58:07 +03:00
|
|
|
resp.SetBroadcast()
|
|
|
|
}
|
|
|
|
case mtype == dhcpv4.MessageTypeNak:
|
|
|
|
// Broadcast any DHCPNAK messages to 0xffffffff.
|
|
|
|
case ciaddr != nil && !ciaddr.IsUnspecified():
|
2023-06-22 14:18:43 +03:00
|
|
|
// Unicast DHCPOFFER and DHCPACK messages to the address in ciaddr.
|
2023-04-14 16:58:07 +03:00
|
|
|
peer = &net.UDPAddr{
|
|
|
|
IP: ciaddr,
|
|
|
|
Port: dhcpv4.ClientPort,
|
|
|
|
}
|
|
|
|
case !req.IsBroadcast() && req.ClientHWAddr != nil:
|
2023-06-22 14:18:43 +03:00
|
|
|
// Unicast DHCPOFFER and DHCPACK messages to the client's hardware
|
|
|
|
// address and yiaddr.
|
2023-04-14 16:58:07 +03:00
|
|
|
peer = &dhcpUnicastAddr{
|
|
|
|
Addr: packet.Addr{HardwareAddr: req.ClientHWAddr},
|
|
|
|
yiaddr: resp.YourIPAddr,
|
|
|
|
}
|
|
|
|
default:
|
|
|
|
// Go on since peer is already set to broadcast.
|
|
|
|
}
|
|
|
|
|
|
|
|
pktData := resp.ToBytes()
|
|
|
|
|
|
|
|
log.Debug("dhcpv4: sending %d bytes to %s: %s", len(pktData), peer, resp.Summary())
|
|
|
|
|
|
|
|
_, err := conn.WriteTo(pktData, peer)
|
|
|
|
if err != nil {
|
|
|
|
log.Error("dhcpv4: conn.Write to %s failed: %s", peer, err)
|
|
|
|
}
|
|
|
|
}
|