route6.c revision 1.20 1 1.20 christos /* $NetBSD: route6.c,v 1.20 2007/05/23 17:15:04 christos Exp $ */
2 1.8 itojun /* $KAME: route6.c,v 1.22 2000/12/03 00:54:00 itojun Exp $ */
3 1.3 thorpej
4 1.2 itojun /*
5 1.2 itojun * Copyright (C) 1995, 1996, 1997, and 1998 WIDE Project.
6 1.2 itojun * All rights reserved.
7 1.7 itojun *
8 1.2 itojun * Redistribution and use in source and binary forms, with or without
9 1.2 itojun * modification, are permitted provided that the following conditions
10 1.2 itojun * are met:
11 1.2 itojun * 1. Redistributions of source code must retain the above copyright
12 1.2 itojun * notice, this list of conditions and the following disclaimer.
13 1.2 itojun * 2. Redistributions in binary form must reproduce the above copyright
14 1.2 itojun * notice, this list of conditions and the following disclaimer in the
15 1.2 itojun * documentation and/or other materials provided with the distribution.
16 1.2 itojun * 3. Neither the name of the project nor the names of its contributors
17 1.2 itojun * may be used to endorse or promote products derived from this software
18 1.2 itojun * without specific prior written permission.
19 1.7 itojun *
20 1.2 itojun * THIS SOFTWARE IS PROVIDED BY THE PROJECT AND CONTRIBUTORS ``AS IS'' AND
21 1.2 itojun * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
22 1.2 itojun * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
23 1.2 itojun * ARE DISCLAIMED. IN NO EVENT SHALL THE PROJECT OR CONTRIBUTORS BE LIABLE
24 1.2 itojun * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
25 1.2 itojun * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
26 1.2 itojun * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
27 1.2 itojun * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
28 1.2 itojun * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
29 1.2 itojun * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
30 1.2 itojun * SUCH DAMAGE.
31 1.2 itojun */
32 1.10 lukem
33 1.10 lukem #include <sys/cdefs.h>
34 1.20 christos __KERNEL_RCSID(0, "$NetBSD: route6.c,v 1.20 2007/05/23 17:15:04 christos Exp $");
35 1.2 itojun
36 1.2 itojun #include <sys/param.h>
37 1.2 itojun #include <sys/mbuf.h>
38 1.2 itojun #include <sys/socket.h>
39 1.4 itojun #include <sys/systm.h>
40 1.8 itojun #include <sys/queue.h>
41 1.2 itojun
42 1.2 itojun #include <net/if.h>
43 1.2 itojun
44 1.2 itojun #include <netinet/in.h>
45 1.4 itojun #include <netinet6/in6_var.h>
46 1.6 itojun #include <netinet/ip6.h>
47 1.2 itojun #include <netinet6/ip6_var.h>
48 1.14 rpaulo #include <netinet6/scope6_var.h>
49 1.2 itojun
50 1.2 itojun #include <netinet/icmp6.h>
51 1.2 itojun
52 1.19 yamt #if 0
53 1.18 christos static int ip6_rthdr0(struct mbuf *, struct ip6_hdr *, struct ip6_rthdr0 *);
54 1.19 yamt #endif
55 1.2 itojun
56 1.2 itojun int
57 1.16 christos route6_input(struct mbuf **mp, int *offp, int proto)
58 1.2 itojun {
59 1.8 itojun struct ip6_hdr *ip6;
60 1.8 itojun struct mbuf *m = *mp;
61 1.8 itojun struct ip6_rthdr *rh;
62 1.2 itojun int off = *offp, rhlen;
63 1.2 itojun
64 1.4 itojun ip6 = mtod(m, struct ip6_hdr *);
65 1.4 itojun IP6_EXTHDR_GET(rh, struct ip6_rthdr *, m, off, sizeof(*rh));
66 1.4 itojun if (rh == NULL) {
67 1.4 itojun ip6stat.ip6s_tooshort++;
68 1.4 itojun return IPPROTO_DONE;
69 1.4 itojun }
70 1.2 itojun
71 1.8 itojun switch (rh->ip6r_type) {
72 1.19 yamt #if 0
73 1.19 yamt /*
74 1.19 yamt * See http://www.secdev.org/conf/IPv6_RH_security-csw07.pdf
75 1.19 yamt * for why IPV6_RTHDR_TYPE_0 is banned here.
76 1.19 yamt *
77 1.19 yamt * We return ICMPv6 parameter problem so that innocent people
78 1.19 yamt * (not an attacker) would notice about the use of IPV6_RTHDR_TYPE_0.
79 1.19 yamt * Since there's no amplification, and ICMPv6 error will be rate-
80 1.19 yamt * controlled, it shouldn't cause any problem.
81 1.19 yamt * If you are concerned about this, you may want to use the following
82 1.19 yamt * code fragment:
83 1.19 yamt *
84 1.19 yamt * case IPV6_RTHDR_TYPE_0:
85 1.19 yamt * m_freem(m);
86 1.19 yamt * return (IPPROTO_DONE);
87 1.19 yamt */
88 1.8 itojun case IPV6_RTHDR_TYPE_0:
89 1.19 yamt rhlen = (rh->ip6r_len + 1) << 3;
90 1.19 yamt /*
91 1.19 yamt * note on option length:
92 1.19 yamt * maximum rhlen: 2048
93 1.19 yamt * max mbuf m_pulldown can handle: MCLBYTES == usually 2048
94 1.19 yamt * so, here we are assuming that m_pulldown can handle
95 1.19 yamt * rhlen == 2048 case. this may not be a good thing to
96 1.19 yamt * assume - we may want to avoid pulling it up altogether.
97 1.19 yamt */
98 1.19 yamt IP6_EXTHDR_GET(rh, struct ip6_rthdr *, m, off, rhlen);
99 1.19 yamt if (rh == NULL) {
100 1.19 yamt ip6stat.ip6s_tooshort++;
101 1.19 yamt return IPPROTO_DONE;
102 1.8 itojun }
103 1.19 yamt if (ip6_rthdr0(m, ip6, (struct ip6_rthdr0 *)rh))
104 1.19 yamt return (IPPROTO_DONE);
105 1.19 yamt break;
106 1.19 yamt #endif
107 1.8 itojun default:
108 1.8 itojun /* unknown routing type */
109 1.8 itojun if (rh->ip6r_segleft == 0) {
110 1.8 itojun rhlen = (rh->ip6r_len + 1) << 3;
111 1.8 itojun break; /* Final dst. Just ignore the header. */
112 1.8 itojun }
113 1.8 itojun ip6stat.ip6s_badoptions++;
114 1.8 itojun icmp6_error(m, ICMP6_PARAM_PROB, ICMP6_PARAMPROB_HEADER,
115 1.17 christos (char *)&rh->ip6r_type - (char *)ip6);
116 1.11 itojun return (IPPROTO_DONE);
117 1.2 itojun }
118 1.2 itojun
119 1.2 itojun *offp += rhlen;
120 1.11 itojun return (rh->ip6r_nxt);
121 1.2 itojun }
122 1.2 itojun
123 1.19 yamt #if 0
124 1.2 itojun /*
125 1.2 itojun * Type0 routing header processing
126 1.13 itojun *
127 1.13 itojun * RFC2292 backward compatibility warning: no support for strict/loose bitmap,
128 1.13 itojun * as it was dropped between RFC1883 and RFC2460.
129 1.2 itojun */
130 1.2 itojun static int
131 1.20 christos ip6_rthdr0(struct mbuf *m, struct ip6_hdr *ip6,
132 1.20 christos struct ip6_rthdr0 *rh0)
133 1.2 itojun {
134 1.2 itojun int addrs, index;
135 1.2 itojun struct in6_addr *nextaddr, tmpaddr;
136 1.14 rpaulo struct in6_ifaddr *ifa;
137 1.2 itojun
138 1.2 itojun if (rh0->ip6r0_segleft == 0)
139 1.11 itojun return (0);
140 1.2 itojun
141 1.2 itojun if (rh0->ip6r0_len % 2
142 1.2 itojun #ifdef COMPAT_RFC1883
143 1.2 itojun || rh0->ip6r0_len > 46
144 1.2 itojun #endif
145 1.2 itojun ) {
146 1.2 itojun /*
147 1.2 itojun * Type 0 routing header can't contain more than 23 addresses.
148 1.9 itojun * RFC 2462: this limitation was removed since strict/loose
149 1.2 itojun * bitmap field was deleted.
150 1.2 itojun */
151 1.2 itojun ip6stat.ip6s_badoptions++;
152 1.2 itojun icmp6_error(m, ICMP6_PARAM_PROB, ICMP6_PARAMPROB_HEADER,
153 1.17 christos (char *)&rh0->ip6r0_len - (char *)ip6);
154 1.11 itojun return (-1);
155 1.2 itojun }
156 1.2 itojun
157 1.2 itojun if ((addrs = rh0->ip6r0_len / 2) < rh0->ip6r0_segleft) {
158 1.2 itojun ip6stat.ip6s_badoptions++;
159 1.2 itojun icmp6_error(m, ICMP6_PARAM_PROB, ICMP6_PARAMPROB_HEADER,
160 1.17 christos (char *)&rh0->ip6r0_segleft - (char *)ip6);
161 1.11 itojun return (-1);
162 1.2 itojun }
163 1.2 itojun
164 1.2 itojun index = addrs - rh0->ip6r0_segleft;
165 1.2 itojun rh0->ip6r0_segleft--;
166 1.13 itojun nextaddr = ((struct in6_addr *)(rh0 + 1)) + index;
167 1.2 itojun
168 1.5 itojun /*
169 1.5 itojun * reject invalid addresses. be proactive about malicious use of
170 1.5 itojun * IPv4 mapped/compat address.
171 1.5 itojun * XXX need more checks?
172 1.5 itojun */
173 1.2 itojun if (IN6_IS_ADDR_MULTICAST(nextaddr) ||
174 1.5 itojun IN6_IS_ADDR_UNSPECIFIED(nextaddr) ||
175 1.5 itojun IN6_IS_ADDR_V4MAPPED(nextaddr) ||
176 1.5 itojun IN6_IS_ADDR_V4COMPAT(nextaddr)) {
177 1.5 itojun ip6stat.ip6s_badoptions++;
178 1.13 itojun goto bad;
179 1.5 itojun }
180 1.5 itojun if (IN6_IS_ADDR_MULTICAST(&ip6->ip6_dst) ||
181 1.5 itojun IN6_IS_ADDR_UNSPECIFIED(&ip6->ip6_dst) ||
182 1.5 itojun IN6_IS_ADDR_V4MAPPED(&ip6->ip6_dst) ||
183 1.7 itojun IN6_IS_ADDR_V4COMPAT(&ip6->ip6_dst)) {
184 1.2 itojun ip6stat.ip6s_badoptions++;
185 1.13 itojun goto bad;
186 1.2 itojun }
187 1.2 itojun
188 1.2 itojun /*
189 1.14 rpaulo * Determine the scope zone of the next hop, based on the interface
190 1.14 rpaulo * of the current hop. [RFC4007, Section 9]
191 1.14 rpaulo * Then disambiguate the scope zone for the next hop (if necessary).
192 1.14 rpaulo */
193 1.14 rpaulo if ((ifa = ip6_getdstifaddr(m)) == NULL)
194 1.14 rpaulo goto bad;
195 1.14 rpaulo if (in6_setscope(nextaddr, ifa->ia_ifp, NULL) != 0) {
196 1.14 rpaulo ip6stat.ip6s_badscope++;
197 1.14 rpaulo goto bad;
198 1.14 rpaulo }
199 1.14 rpaulo
200 1.14 rpaulo /*
201 1.2 itojun * Swap the IPv6 destination address and nextaddr. Forward the packet.
202 1.2 itojun */
203 1.2 itojun tmpaddr = *nextaddr;
204 1.2 itojun *nextaddr = ip6->ip6_dst;
205 1.14 rpaulo in6_clearscope(nextaddr); /* XXX */
206 1.2 itojun ip6->ip6_dst = tmpaddr;
207 1.2 itojun
208 1.2 itojun #ifdef COMPAT_RFC1883
209 1.2 itojun if (rh0->ip6r0_slmap[index / 8] & (1 << (7 - (index % 8))))
210 1.2 itojun ip6_forward(m, IPV6_SRCRT_NEIGHBOR);
211 1.2 itojun else
212 1.2 itojun ip6_forward(m, IPV6_SRCRT_NOTNEIGHBOR);
213 1.2 itojun #else
214 1.2 itojun ip6_forward(m, 1);
215 1.2 itojun #endif
216 1.7 itojun
217 1.11 itojun return (-1); /* m would be freed in ip6_forward() */
218 1.13 itojun
219 1.13 itojun bad:
220 1.13 itojun m_freem(m);
221 1.13 itojun return (-1);
222 1.2 itojun }
223 1.19 yamt #endif
224