1 /* 2 * Copyright (c) 1992, 1993, 1994, 1995, 1996, 1997 3 * The Regents of the University of California. All rights reserved. 4 * 5 * Redistribution and use in source and binary forms, with or without 6 * modification, are permitted provided that: (1) source code distributions 7 * retain the above copyright notice and this paragraph in its entirety, (2) 8 * distributions including binary code include the above copyright notice and 9 * this paragraph in its entirety in the documentation or other materials 10 * provided with the distribution, and (3) all advertising materials mentioning 11 * features or use of this software display the following acknowledgement: 12 * ``This product includes software developed by the University of California, 13 * Lawrence Berkeley Laboratory and its contributors.'' Neither the name of 14 * the University nor the names of its contributors may be used to endorse 15 * or promote products derived from this software without specific prior 16 * written permission. 17 * THIS SOFTWARE IS PROVIDED ``AS IS'' AND WITHOUT ANY EXPRESS OR IMPLIED 18 * WARRANTIES, INCLUDING, WITHOUT LIMITATION, THE IMPLIED WARRANTIES OF 19 * MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. 20 * 21 * OSPF support contributed by Jeffrey Honig (jch@mitchell.cit.cornell.edu) 22 */ 23 24 #include <sys/cdefs.h> 25 #ifndef lint 26 __RCSID("$NetBSD: print-ospf6.c,v 1.9 2019/10/01 16:06:16 christos Exp $"); 27 #endif 28 29 /* \summary: IPv6 Open Shortest Path First (OSPFv3) printer */ 30 31 #ifdef HAVE_CONFIG_H 32 #include "config.h" 33 #endif 34 35 #include <netdissect-stdinc.h> 36 37 #include <string.h> 38 39 #include "netdissect.h" 40 #include "addrtoname.h" 41 #include "extract.h" 42 43 #include "ospf.h" 44 45 #define OSPF_TYPE_HELLO 1 /* Hello */ 46 #define OSPF_TYPE_DD 2 /* Database Description */ 47 #define OSPF_TYPE_LS_REQ 3 /* Link State Request */ 48 #define OSPF_TYPE_LS_UPDATE 4 /* Link State Update */ 49 #define OSPF_TYPE_LS_ACK 5 /* Link State Ack */ 50 51 /* Options *_options */ 52 #define OSPF6_OPTION_V6 0x01 /* V6 bit: A bit for peeping tom */ 53 #define OSPF6_OPTION_E 0x02 /* E bit: External routes advertised */ 54 #define OSPF6_OPTION_MC 0x04 /* MC bit: Multicast capable */ 55 #define OSPF6_OPTION_N 0x08 /* N bit: For type-7 LSA */ 56 #define OSPF6_OPTION_R 0x10 /* R bit: Router bit */ 57 #define OSPF6_OPTION_DC 0x20 /* DC bit: Demand circuits */ 58 /* The field is actually 24-bit (RFC5340 Section A.2). */ 59 #define OSPF6_OPTION_AF 0x0100 /* AF bit: Multiple address families */ 60 #define OSPF6_OPTION_L 0x0200 /* L bit: Link-local signaling (LLS) */ 61 #define OSPF6_OPTION_AT 0x0400 /* AT bit: Authentication trailer */ 62 63 64 /* db_flags */ 65 #define OSPF6_DB_INIT 0x04 /* */ 66 #define OSPF6_DB_MORE 0x02 67 #define OSPF6_DB_MASTER 0x01 68 #define OSPF6_DB_M6 0x10 /* IPv6 MTU */ 69 70 /* ls_type */ 71 #define LS_TYPE_ROUTER 1 /* router link */ 72 #define LS_TYPE_NETWORK 2 /* network link */ 73 #define LS_TYPE_INTER_AP 3 /* Inter-Area-Prefix */ 74 #define LS_TYPE_INTER_AR 4 /* Inter-Area-Router */ 75 #define LS_TYPE_ASE 5 /* ASE */ 76 #define LS_TYPE_GROUP 6 /* Group membership */ 77 #define LS_TYPE_NSSA 7 /* NSSA */ 78 #define LS_TYPE_LINK 8 /* Link LSA */ 79 #define LS_TYPE_INTRA_AP 9 /* Intra-Area-Prefix */ 80 #define LS_TYPE_INTRA_ATE 10 /* Intra-Area-TE */ 81 #define LS_TYPE_GRACE 11 /* Grace LSA */ 82 #define LS_TYPE_RI 12 /* Router information */ 83 #define LS_TYPE_INTER_ASTE 13 /* Inter-AS-TE */ 84 #define LS_TYPE_L1VPN 14 /* L1VPN */ 85 #define LS_TYPE_MASK 0x1fff 86 87 #define LS_SCOPE_LINKLOCAL 0x0000 88 #define LS_SCOPE_AREA 0x2000 89 #define LS_SCOPE_AS 0x4000 90 #define LS_SCOPE_MASK 0x6000 91 #define LS_SCOPE_U 0x8000 92 93 /* rla_link.link_type */ 94 #define RLA_TYPE_ROUTER 1 /* point-to-point to another router */ 95 #define RLA_TYPE_TRANSIT 2 /* connection to transit network */ 96 #define RLA_TYPE_VIRTUAL 4 /* virtual link */ 97 98 /* rla_flags */ 99 #define RLA_FLAG_B 0x01 100 #define RLA_FLAG_E 0x02 101 #define RLA_FLAG_V 0x04 102 #define RLA_FLAG_W 0x08 103 #define RLA_FLAG_N 0x10 104 105 /* lsa_prefix options */ 106 #define LSA_PREFIX_OPT_NU 0x01 107 #define LSA_PREFIX_OPT_LA 0x02 108 #define LSA_PREFIX_OPT_MC 0x04 109 #define LSA_PREFIX_OPT_P 0x08 110 #define LSA_PREFIX_OPT_DN 0x10 111 112 /* sla_tosmetric breakdown */ 113 #define SLA_MASK_TOS 0x7f000000 114 #define SLA_MASK_METRIC 0x00ffffff 115 #define SLA_SHIFT_TOS 24 116 117 /* asla_metric */ 118 #define ASLA_FLAG_FWDADDR 0x02000000 119 #define ASLA_FLAG_ROUTETAG 0x01000000 120 #define ASLA_MASK_METRIC 0x00ffffff 121 122 /* RFC6506 Section 4.1 */ 123 #define OSPF6_AT_HDRLEN 16U 124 #define OSPF6_AUTH_TYPE_HMAC 0x0001 125 126 typedef uint32_t rtrid_t; 127 128 /* link state advertisement header */ 129 struct lsa6_hdr { 130 uint16_t ls_age; 131 uint16_t ls_type; 132 rtrid_t ls_stateid; 133 rtrid_t ls_router; 134 uint32_t ls_seq; 135 uint16_t ls_chksum; 136 uint16_t ls_length; 137 }; 138 139 /* Length of an IPv6 address, in bytes. */ 140 #define IPV6_ADDR_LEN_BYTES (128/8) 141 142 struct lsa6_prefix { 143 uint8_t lsa_p_len; 144 uint8_t lsa_p_opt; 145 uint16_t lsa_p_metric; 146 uint8_t lsa_p_prefix[IPV6_ADDR_LEN_BYTES]; /* maximum length */ 147 }; 148 149 /* link state advertisement */ 150 struct lsa6 { 151 struct lsa6_hdr ls_hdr; 152 153 /* Link state types */ 154 union { 155 /* Router links advertisements */ 156 struct { 157 union { 158 uint8_t flg; 159 uint32_t opt; 160 } rla_flgandopt; 161 #define rla_flags rla_flgandopt.flg 162 #define rla_options rla_flgandopt.opt 163 struct rlalink6 { 164 uint8_t link_type; 165 uint8_t link_zero[1]; 166 uint16_t link_metric; 167 uint32_t link_ifid; 168 uint32_t link_nifid; 169 rtrid_t link_nrtid; 170 } rla_link[1]; /* may repeat */ 171 } un_rla; 172 173 /* Network links advertisements */ 174 struct { 175 uint32_t nla_options; 176 rtrid_t nla_router[1]; /* may repeat */ 177 } un_nla; 178 179 /* Inter Area Prefix LSA */ 180 struct { 181 uint32_t inter_ap_metric; 182 struct lsa6_prefix inter_ap_prefix[1]; 183 } un_inter_ap; 184 185 /* AS external links advertisements */ 186 struct { 187 uint32_t asla_metric; 188 struct lsa6_prefix asla_prefix[1]; 189 /* some optional fields follow */ 190 } un_asla; 191 192 #if 0 193 /* Summary links advertisements */ 194 struct { 195 struct in_addr sla_mask; 196 uint32_t sla_tosmetric[1]; /* may repeat */ 197 } un_sla; 198 199 /* Multicast group membership */ 200 struct mcla { 201 uint32_t mcla_vtype; 202 struct in_addr mcla_vid; 203 } un_mcla[1]; 204 #endif 205 206 /* Type 7 LSA */ 207 208 /* Link LSA */ 209 struct llsa { 210 union { 211 uint8_t pri; 212 uint32_t opt; 213 } llsa_priandopt; 214 #define llsa_priority llsa_priandopt.pri 215 #define llsa_options llsa_priandopt.opt 216 struct in6_addr llsa_lladdr; 217 uint32_t llsa_nprefix; 218 struct lsa6_prefix llsa_prefix[1]; 219 } un_llsa; 220 221 /* Intra-Area-Prefix */ 222 struct { 223 uint16_t intra_ap_nprefix; 224 uint16_t intra_ap_lstype; 225 rtrid_t intra_ap_lsid; 226 rtrid_t intra_ap_rtid; 227 struct lsa6_prefix intra_ap_prefix[1]; 228 } un_intra_ap; 229 } lsa_un; 230 }; 231 232 /* 233 * the main header 234 */ 235 struct ospf6hdr { 236 uint8_t ospf6_version; 237 uint8_t ospf6_type; 238 uint16_t ospf6_len; 239 rtrid_t ospf6_routerid; 240 rtrid_t ospf6_areaid; 241 uint16_t ospf6_chksum; 242 uint8_t ospf6_instanceid; 243 uint8_t ospf6_rsvd; 244 }; 245 246 /* 247 * The OSPF6 header length is 16 bytes, regardless of how your compiler 248 * might choose to pad the above structure. 249 */ 250 #define OSPF6HDR_LEN 16 251 252 /* Hello packet */ 253 struct hello6 { 254 uint32_t hello_ifid; 255 union { 256 uint8_t pri; 257 uint32_t opt; 258 } hello_priandopt; 259 #define hello_priority hello_priandopt.pri 260 #define hello_options hello_priandopt.opt 261 uint16_t hello_helloint; 262 uint16_t hello_deadint; 263 rtrid_t hello_dr; 264 rtrid_t hello_bdr; 265 rtrid_t hello_neighbor[1]; /* may repeat */ 266 }; 267 268 /* Database Description packet */ 269 struct dd6 { 270 uint32_t db_options; 271 uint16_t db_mtu; 272 uint8_t db_mbz; 273 uint8_t db_flags; 274 uint32_t db_seq; 275 struct lsa6_hdr db_lshdr[1]; /* may repeat */ 276 }; 277 278 /* Link State Request */ 279 struct lsr6 { 280 uint16_t ls_mbz; 281 uint16_t ls_type; 282 rtrid_t ls_stateid; 283 rtrid_t ls_router; 284 }; 285 286 /* Link State Update */ 287 struct lsu6 { 288 uint32_t lsu_count; 289 struct lsa6 lsu_lsa[1]; /* may repeat */ 290 }; 291 292 static const char tstr[] = " [|ospf3]"; 293 294 static const struct tok ospf6_option_values[] = { 295 { OSPF6_OPTION_V6, "V6" }, 296 { OSPF6_OPTION_E, "External" }, 297 { OSPF6_OPTION_MC, "Deprecated" }, 298 { OSPF6_OPTION_N, "NSSA" }, 299 { OSPF6_OPTION_R, "Router" }, 300 { OSPF6_OPTION_DC, "Demand Circuit" }, 301 { OSPF6_OPTION_AF, "AFs Support" }, 302 { OSPF6_OPTION_L, "LLS" }, 303 { OSPF6_OPTION_AT, "Authentication Trailer" }, 304 { 0, NULL } 305 }; 306 307 static const struct tok ospf6_rla_flag_values[] = { 308 { RLA_FLAG_B, "ABR" }, 309 { RLA_FLAG_E, "External" }, 310 { RLA_FLAG_V, "Virtual-Link Endpoint" }, 311 { RLA_FLAG_W, "Wildcard Receiver" }, 312 { RLA_FLAG_N, "NSSA Translator" }, 313 { 0, NULL } 314 }; 315 316 static const struct tok ospf6_asla_flag_values[] = { 317 { ASLA_FLAG_EXTERNAL, "External Type 2" }, 318 { ASLA_FLAG_FWDADDR, "Forwarding" }, 319 { ASLA_FLAG_ROUTETAG, "Tag" }, 320 { 0, NULL } 321 }; 322 323 static const struct tok ospf6_type_values[] = { 324 { OSPF_TYPE_HELLO, "Hello" }, 325 { OSPF_TYPE_DD, "Database Description" }, 326 { OSPF_TYPE_LS_REQ, "LS-Request" }, 327 { OSPF_TYPE_LS_UPDATE, "LS-Update" }, 328 { OSPF_TYPE_LS_ACK, "LS-Ack" }, 329 { 0, NULL } 330 }; 331 332 static const struct tok ospf6_lsa_values[] = { 333 { LS_TYPE_ROUTER, "Router" }, 334 { LS_TYPE_NETWORK, "Network" }, 335 { LS_TYPE_INTER_AP, "Inter-Area Prefix" }, 336 { LS_TYPE_INTER_AR, "Inter-Area Router" }, 337 { LS_TYPE_ASE, "External" }, 338 { LS_TYPE_GROUP, "Deprecated" }, 339 { LS_TYPE_NSSA, "NSSA" }, 340 { LS_TYPE_LINK, "Link" }, 341 { LS_TYPE_INTRA_AP, "Intra-Area Prefix" }, 342 { LS_TYPE_INTRA_ATE, "Intra-Area TE" }, 343 { LS_TYPE_GRACE, "Grace" }, 344 { LS_TYPE_RI, "Router Information" }, 345 { LS_TYPE_INTER_ASTE, "Inter-AS-TE" }, 346 { LS_TYPE_L1VPN, "Layer 1 VPN" }, 347 { 0, NULL } 348 }; 349 350 static const struct tok ospf6_ls_scope_values[] = { 351 { LS_SCOPE_LINKLOCAL, "Link Local" }, 352 { LS_SCOPE_AREA, "Area Local" }, 353 { LS_SCOPE_AS, "Domain Wide" }, 354 { 0, NULL } 355 }; 356 357 static const struct tok ospf6_dd_flag_values[] = { 358 { OSPF6_DB_INIT, "Init" }, 359 { OSPF6_DB_MORE, "More" }, 360 { OSPF6_DB_MASTER, "Master" }, 361 { OSPF6_DB_M6, "IPv6 MTU" }, 362 { 0, NULL } 363 }; 364 365 static const struct tok ospf6_lsa_prefix_option_values[] = { 366 { LSA_PREFIX_OPT_NU, "No Unicast" }, 367 { LSA_PREFIX_OPT_LA, "Local address" }, 368 { LSA_PREFIX_OPT_MC, "Deprecated" }, 369 { LSA_PREFIX_OPT_P, "Propagate" }, 370 { LSA_PREFIX_OPT_DN, "Down" }, 371 { 0, NULL } 372 }; 373 374 static const struct tok ospf6_auth_type_str[] = { 375 { OSPF6_AUTH_TYPE_HMAC, "HMAC" }, 376 { 0, NULL } 377 }; 378 379 static void 380 ospf6_print_ls_type(netdissect_options *ndo, 381 register u_int ls_type, register const rtrid_t *ls_stateid) 382 { 383 ND_PRINT((ndo, "\n\t %s LSA (%d), %s Scope%s, LSA-ID %s", 384 tok2str(ospf6_lsa_values, "Unknown", ls_type & LS_TYPE_MASK), 385 ls_type & LS_TYPE_MASK, 386 tok2str(ospf6_ls_scope_values, "Unknown", ls_type & LS_SCOPE_MASK), 387 ls_type &0x8000 ? ", transitive" : "", /* U-bit */ 388 ipaddr_string(ndo, ls_stateid))); 389 } 390 391 static int 392 ospf6_print_lshdr(netdissect_options *ndo, 393 register const struct lsa6_hdr *lshp, const u_char *dataend) 394 { 395 if ((const u_char *)(lshp + 1) > dataend) 396 goto trunc; 397 ND_TCHECK(lshp->ls_length); /* last field of struct lsa6_hdr */ 398 399 ND_PRINT((ndo, "\n\t Advertising Router %s, seq 0x%08x, age %us, length %u", 400 ipaddr_string(ndo, &lshp->ls_router), 401 EXTRACT_32BITS(&lshp->ls_seq), 402 EXTRACT_16BITS(&lshp->ls_age), 403 EXTRACT_16BITS(&lshp->ls_length)-(u_int)sizeof(struct lsa6_hdr))); 404 405 ospf6_print_ls_type(ndo, EXTRACT_16BITS(&lshp->ls_type), &lshp->ls_stateid); 406 407 return (0); 408 trunc: 409 return (1); 410 } 411 412 static int 413 ospf6_print_lsaprefix(netdissect_options *ndo, 414 const uint8_t *tptr, u_int lsa_length) 415 { 416 const struct lsa6_prefix *lsapp = (const struct lsa6_prefix *)tptr; 417 u_int wordlen; 418 struct in6_addr prefix; 419 420 if (lsa_length < sizeof (*lsapp) - IPV6_ADDR_LEN_BYTES) 421 goto trunc; 422 lsa_length -= sizeof (*lsapp) - IPV6_ADDR_LEN_BYTES; 423 ND_TCHECK2(*lsapp, sizeof (*lsapp) - IPV6_ADDR_LEN_BYTES); 424 wordlen = (lsapp->lsa_p_len + 31) / 32; 425 if (wordlen * 4 > sizeof(struct in6_addr)) { 426 ND_PRINT((ndo, " bogus prefixlen /%d", lsapp->lsa_p_len)); 427 goto trunc; 428 } 429 if (lsa_length < wordlen * 4) 430 goto trunc; 431 lsa_length -= wordlen * 4; 432 ND_TCHECK2(lsapp->lsa_p_prefix, wordlen * 4); 433 memset(&prefix, 0, sizeof(prefix)); 434 memcpy(&prefix, lsapp->lsa_p_prefix, wordlen * 4); 435 ND_PRINT((ndo, "\n\t\t%s/%d", ip6addr_string(ndo, &prefix), 436 lsapp->lsa_p_len)); 437 if (lsapp->lsa_p_opt) { 438 ND_PRINT((ndo, ", Options [%s]", 439 bittok2str(ospf6_lsa_prefix_option_values, 440 "none", lsapp->lsa_p_opt))); 441 } 442 ND_PRINT((ndo, ", metric %u", EXTRACT_16BITS(&lsapp->lsa_p_metric))); 443 return sizeof(*lsapp) - IPV6_ADDR_LEN_BYTES + wordlen * 4; 444 445 trunc: 446 return -1; 447 } 448 449 450 /* 451 * Print a single link state advertisement. If truncated return 1, else 0. 452 */ 453 static int 454 ospf6_print_lsa(netdissect_options *ndo, 455 register const struct lsa6 *lsap, const u_char *dataend) 456 { 457 register const struct rlalink6 *rlp; 458 #if 0 459 register const struct tos_metric *tosp; 460 #endif 461 register const rtrid_t *ap; 462 #if 0 463 register const struct aslametric *almp; 464 register const struct mcla *mcp; 465 #endif 466 register const struct llsa *llsap; 467 register const struct lsa6_prefix *lsapp; 468 #if 0 469 register const uint32_t *lp; 470 #endif 471 register u_int prefixes; 472 register int bytelen; 473 register u_int length, lsa_length; 474 uint32_t flags32; 475 const uint8_t *tptr; 476 477 if (ospf6_print_lshdr(ndo, &lsap->ls_hdr, dataend)) 478 return (1); 479 ND_TCHECK(lsap->ls_hdr.ls_length); 480 length = EXTRACT_16BITS(&lsap->ls_hdr.ls_length); 481 482 /* 483 * The LSA length includes the length of the header; 484 * it must have a value that's at least that length. 485 * If it does, find the length of what follows the 486 * header. 487 */ 488 if (length < sizeof(struct lsa6_hdr) || (const u_char *)lsap + length > dataend) 489 return (1); 490 lsa_length = length - sizeof(struct lsa6_hdr); 491 tptr = (const uint8_t *)lsap+sizeof(struct lsa6_hdr); 492 493 switch (EXTRACT_16BITS(&lsap->ls_hdr.ls_type)) { 494 case LS_TYPE_ROUTER | LS_SCOPE_AREA: 495 if (lsa_length < sizeof (lsap->lsa_un.un_rla.rla_options)) 496 return (1); 497 lsa_length -= sizeof (lsap->lsa_un.un_rla.rla_options); 498 ND_TCHECK(lsap->lsa_un.un_rla.rla_options); 499 ND_PRINT((ndo, "\n\t Options [%s]", 500 bittok2str(ospf6_option_values, "none", 501 EXTRACT_32BITS(&lsap->lsa_un.un_rla.rla_options)))); 502 ND_PRINT((ndo, ", RLA-Flags [%s]", 503 bittok2str(ospf6_rla_flag_values, "none", 504 lsap->lsa_un.un_rla.rla_flags))); 505 506 rlp = lsap->lsa_un.un_rla.rla_link; 507 while (lsa_length != 0) { 508 if (lsa_length < sizeof (*rlp)) 509 return (1); 510 lsa_length -= sizeof (*rlp); 511 ND_TCHECK(*rlp); 512 switch (rlp->link_type) { 513 514 case RLA_TYPE_VIRTUAL: 515 ND_PRINT((ndo, "\n\t Virtual Link: Neighbor Router-ID %s" 516 "\n\t Neighbor Interface-ID %s, Interface %s", 517 ipaddr_string(ndo, &rlp->link_nrtid), 518 ipaddr_string(ndo, &rlp->link_nifid), 519 ipaddr_string(ndo, &rlp->link_ifid))); 520 break; 521 522 case RLA_TYPE_ROUTER: 523 ND_PRINT((ndo, "\n\t Neighbor Router-ID %s" 524 "\n\t Neighbor Interface-ID %s, Interface %s", 525 ipaddr_string(ndo, &rlp->link_nrtid), 526 ipaddr_string(ndo, &rlp->link_nifid), 527 ipaddr_string(ndo, &rlp->link_ifid))); 528 break; 529 530 case RLA_TYPE_TRANSIT: 531 ND_PRINT((ndo, "\n\t Neighbor Network-ID %s" 532 "\n\t Neighbor Interface-ID %s, Interface %s", 533 ipaddr_string(ndo, &rlp->link_nrtid), 534 ipaddr_string(ndo, &rlp->link_nifid), 535 ipaddr_string(ndo, &rlp->link_ifid))); 536 break; 537 538 default: 539 ND_PRINT((ndo, "\n\t Unknown Router Links Type 0x%02x", 540 rlp->link_type)); 541 return (0); 542 } 543 ND_PRINT((ndo, ", metric %d", EXTRACT_16BITS(&rlp->link_metric))); 544 rlp++; 545 } 546 break; 547 548 case LS_TYPE_NETWORK | LS_SCOPE_AREA: 549 if (lsa_length < sizeof (lsap->lsa_un.un_nla.nla_options)) 550 return (1); 551 lsa_length -= sizeof (lsap->lsa_un.un_nla.nla_options); 552 ND_TCHECK(lsap->lsa_un.un_nla.nla_options); 553 ND_PRINT((ndo, "\n\t Options [%s]", 554 bittok2str(ospf6_option_values, "none", 555 EXTRACT_32BITS(&lsap->lsa_un.un_nla.nla_options)))); 556 557 ND_PRINT((ndo, "\n\t Connected Routers:")); 558 ap = lsap->lsa_un.un_nla.nla_router; 559 while (lsa_length != 0) { 560 if (lsa_length < sizeof (*ap)) 561 return (1); 562 lsa_length -= sizeof (*ap); 563 ND_TCHECK(*ap); 564 ND_PRINT((ndo, "\n\t\t%s", ipaddr_string(ndo, ap))); 565 ++ap; 566 } 567 break; 568 569 case LS_TYPE_INTER_AP | LS_SCOPE_AREA: 570 if (lsa_length < sizeof (lsap->lsa_un.un_inter_ap.inter_ap_metric)) 571 return (1); 572 lsa_length -= sizeof (lsap->lsa_un.un_inter_ap.inter_ap_metric); 573 ND_TCHECK(lsap->lsa_un.un_inter_ap.inter_ap_metric); 574 ND_PRINT((ndo, ", metric %u", 575 EXTRACT_32BITS(&lsap->lsa_un.un_inter_ap.inter_ap_metric) & SLA_MASK_METRIC)); 576 577 tptr = (const uint8_t *)lsap->lsa_un.un_inter_ap.inter_ap_prefix; 578 while (lsa_length != 0) { 579 bytelen = ospf6_print_lsaprefix(ndo, tptr, lsa_length); 580 if (bytelen < 0) 581 goto trunc; 582 lsa_length -= bytelen; 583 tptr += bytelen; 584 } 585 break; 586 587 case LS_TYPE_ASE | LS_SCOPE_AS: 588 if (lsa_length < sizeof (lsap->lsa_un.un_asla.asla_metric)) 589 return (1); 590 lsa_length -= sizeof (lsap->lsa_un.un_asla.asla_metric); 591 ND_TCHECK(lsap->lsa_un.un_asla.asla_metric); 592 flags32 = EXTRACT_32BITS(&lsap->lsa_un.un_asla.asla_metric); 593 ND_PRINT((ndo, "\n\t Flags [%s]", 594 bittok2str(ospf6_asla_flag_values, "none", flags32))); 595 ND_PRINT((ndo, " metric %u", 596 EXTRACT_32BITS(&lsap->lsa_un.un_asla.asla_metric) & 597 ASLA_MASK_METRIC)); 598 599 tptr = (const uint8_t *)lsap->lsa_un.un_asla.asla_prefix; 600 lsapp = (const struct lsa6_prefix *)tptr; 601 bytelen = ospf6_print_lsaprefix(ndo, tptr, lsa_length); 602 if (bytelen < 0) 603 goto trunc; 604 lsa_length -= bytelen; 605 tptr += bytelen; 606 607 if ((flags32 & ASLA_FLAG_FWDADDR) != 0) { 608 const struct in6_addr *fwdaddr6; 609 610 fwdaddr6 = (const struct in6_addr *)tptr; 611 if (lsa_length < sizeof (*fwdaddr6)) 612 return (1); 613 lsa_length -= sizeof (*fwdaddr6); 614 ND_TCHECK(*fwdaddr6); 615 ND_PRINT((ndo, " forward %s", 616 ip6addr_string(ndo, fwdaddr6))); 617 tptr += sizeof(*fwdaddr6); 618 } 619 620 if ((flags32 & ASLA_FLAG_ROUTETAG) != 0) { 621 if (lsa_length < sizeof (uint32_t)) 622 return (1); 623 lsa_length -= sizeof (uint32_t); 624 ND_TCHECK(*(const uint32_t *)tptr); 625 ND_PRINT((ndo, " tag %s", 626 ipaddr_string(ndo, (const uint32_t *)tptr))); 627 tptr += sizeof(uint32_t); 628 } 629 630 if (lsapp->lsa_p_metric) { 631 if (lsa_length < sizeof (uint32_t)) 632 return (1); 633 lsa_length -= sizeof (uint32_t); 634 ND_TCHECK(*(const uint32_t *)tptr); 635 ND_PRINT((ndo, " RefLSID: %s", 636 ipaddr_string(ndo, (const uint32_t *)tptr))); 637 tptr += sizeof(uint32_t); 638 } 639 break; 640 641 case LS_TYPE_LINK: 642 /* Link LSA */ 643 llsap = &lsap->lsa_un.un_llsa; 644 if (lsa_length < sizeof (llsap->llsa_priandopt)) 645 return (1); 646 lsa_length -= sizeof (llsap->llsa_priandopt); 647 ND_TCHECK(llsap->llsa_priandopt); 648 ND_PRINT((ndo, "\n\t Options [%s]", 649 bittok2str(ospf6_option_values, "none", 650 EXTRACT_32BITS(&llsap->llsa_options)))); 651 652 if (lsa_length < sizeof (llsap->llsa_lladdr) + sizeof (llsap->llsa_nprefix)) 653 return (1); 654 lsa_length -= sizeof (llsap->llsa_lladdr) + sizeof (llsap->llsa_nprefix); 655 ND_TCHECK(llsap->llsa_nprefix); 656 prefixes = EXTRACT_32BITS(&llsap->llsa_nprefix); 657 ND_PRINT((ndo, "\n\t Priority %d, Link-local address %s, Prefixes %d:", 658 llsap->llsa_priority, 659 ip6addr_string(ndo, &llsap->llsa_lladdr), 660 prefixes)); 661 662 tptr = (const uint8_t *)llsap->llsa_prefix; 663 while (prefixes > 0) { 664 bytelen = ospf6_print_lsaprefix(ndo, tptr, lsa_length); 665 if (bytelen < 0) 666 goto trunc; 667 prefixes--; 668 lsa_length -= bytelen; 669 tptr += bytelen; 670 } 671 break; 672 673 case LS_TYPE_INTRA_AP | LS_SCOPE_AREA: 674 /* Intra-Area-Prefix LSA */ 675 if (lsa_length < sizeof (lsap->lsa_un.un_intra_ap.intra_ap_rtid)) 676 return (1); 677 lsa_length -= sizeof (lsap->lsa_un.un_intra_ap.intra_ap_rtid); 678 ND_TCHECK(lsap->lsa_un.un_intra_ap.intra_ap_rtid); 679 ospf6_print_ls_type(ndo, 680 EXTRACT_16BITS(&lsap->lsa_un.un_intra_ap.intra_ap_lstype), 681 &lsap->lsa_un.un_intra_ap.intra_ap_lsid); 682 683 if (lsa_length < sizeof (lsap->lsa_un.un_intra_ap.intra_ap_nprefix)) 684 return (1); 685 lsa_length -= sizeof (lsap->lsa_un.un_intra_ap.intra_ap_nprefix); 686 ND_TCHECK(lsap->lsa_un.un_intra_ap.intra_ap_nprefix); 687 prefixes = EXTRACT_16BITS(&lsap->lsa_un.un_intra_ap.intra_ap_nprefix); 688 ND_PRINT((ndo, "\n\t Prefixes %d:", prefixes)); 689 690 tptr = (const uint8_t *)lsap->lsa_un.un_intra_ap.intra_ap_prefix; 691 while (prefixes > 0) { 692 bytelen = ospf6_print_lsaprefix(ndo, tptr, lsa_length); 693 if (bytelen < 0) 694 goto trunc; 695 prefixes--; 696 lsa_length -= bytelen; 697 tptr += bytelen; 698 } 699 break; 700 701 case LS_TYPE_GRACE | LS_SCOPE_LINKLOCAL: 702 if (ospf_print_grace_lsa(ndo, tptr, lsa_length) == -1) { 703 return 1; 704 } 705 break; 706 707 case LS_TYPE_INTRA_ATE | LS_SCOPE_LINKLOCAL: 708 if (ospf_print_te_lsa(ndo, tptr, lsa_length) == -1) { 709 return 1; 710 } 711 break; 712 713 default: 714 if(!print_unknown_data(ndo,tptr, 715 "\n\t ", 716 lsa_length)) { 717 return (1); 718 } 719 break; 720 } 721 722 return (0); 723 trunc: 724 return (1); 725 } 726 727 static int 728 ospf6_decode_v3(netdissect_options *ndo, 729 register const struct ospf6hdr *op, 730 register const u_char *dataend) 731 { 732 register const rtrid_t *ap; 733 register const struct lsr6 *lsrp; 734 register const struct lsa6_hdr *lshp; 735 register const struct lsa6 *lsap; 736 register int i; 737 738 switch (op->ospf6_type) { 739 740 case OSPF_TYPE_HELLO: { 741 register const struct hello6 *hellop = (const struct hello6 *)((const uint8_t *)op + OSPF6HDR_LEN); 742 743 ND_TCHECK_32BITS(&hellop->hello_options); 744 ND_PRINT((ndo, "\n\tOptions [%s]", 745 bittok2str(ospf6_option_values, "none", 746 EXTRACT_32BITS(&hellop->hello_options)))); 747 748 ND_TCHECK(hellop->hello_deadint); 749 ND_PRINT((ndo, "\n\t Hello Timer %us, Dead Timer %us, Interface-ID %s, Priority %u", 750 EXTRACT_16BITS(&hellop->hello_helloint), 751 EXTRACT_16BITS(&hellop->hello_deadint), 752 ipaddr_string(ndo, &hellop->hello_ifid), 753 hellop->hello_priority)); 754 755 ND_TCHECK(hellop->hello_dr); 756 if (EXTRACT_32BITS(&hellop->hello_dr) != 0) 757 ND_PRINT((ndo, "\n\t Designated Router %s", 758 ipaddr_string(ndo, &hellop->hello_dr))); 759 ND_TCHECK(hellop->hello_bdr); 760 if (EXTRACT_32BITS(&hellop->hello_bdr) != 0) 761 ND_PRINT((ndo, ", Backup Designated Router %s", 762 ipaddr_string(ndo, &hellop->hello_bdr))); 763 if (ndo->ndo_vflag > 1) { 764 ND_PRINT((ndo, "\n\t Neighbor List:")); 765 ap = hellop->hello_neighbor; 766 while ((const u_char *)ap < dataend) { 767 ND_TCHECK(*ap); 768 ND_PRINT((ndo, "\n\t %s", ipaddr_string(ndo, ap))); 769 ++ap; 770 } 771 } 772 break; /* HELLO */ 773 } 774 775 case OSPF_TYPE_DD: { 776 register const struct dd6 *ddp = (const struct dd6 *)((const uint8_t *)op + OSPF6HDR_LEN); 777 778 ND_TCHECK(ddp->db_options); 779 ND_PRINT((ndo, "\n\tOptions [%s]", 780 bittok2str(ospf6_option_values, "none", 781 EXTRACT_32BITS(&ddp->db_options)))); 782 ND_TCHECK(ddp->db_flags); 783 ND_PRINT((ndo, ", DD Flags [%s]", 784 bittok2str(ospf6_dd_flag_values,"none",ddp->db_flags))); 785 786 ND_TCHECK(ddp->db_seq); 787 ND_PRINT((ndo, ", MTU %u, DD-Sequence 0x%08x", 788 EXTRACT_16BITS(&ddp->db_mtu), 789 EXTRACT_32BITS(&ddp->db_seq))); 790 if (ndo->ndo_vflag > 1) { 791 /* Print all the LS adv's */ 792 lshp = ddp->db_lshdr; 793 while ((const u_char *)lshp < dataend) { 794 if (ospf6_print_lshdr(ndo, lshp++, dataend)) 795 goto trunc; 796 } 797 } 798 break; 799 } 800 801 case OSPF_TYPE_LS_REQ: 802 if (ndo->ndo_vflag > 1) { 803 lsrp = (const struct lsr6 *)((const uint8_t *)op + OSPF6HDR_LEN); 804 while ((const u_char *)lsrp < dataend) { 805 ND_TCHECK(*lsrp); 806 ND_PRINT((ndo, "\n\t Advertising Router %s", 807 ipaddr_string(ndo, &lsrp->ls_router))); 808 ospf6_print_ls_type(ndo, EXTRACT_16BITS(&lsrp->ls_type), 809 &lsrp->ls_stateid); 810 ++lsrp; 811 } 812 } 813 break; 814 815 case OSPF_TYPE_LS_UPDATE: 816 if (ndo->ndo_vflag > 1) { 817 register const struct lsu6 *lsup = (const struct lsu6 *)((const uint8_t *)op + OSPF6HDR_LEN); 818 819 ND_TCHECK(lsup->lsu_count); 820 i = EXTRACT_32BITS(&lsup->lsu_count); 821 lsap = lsup->lsu_lsa; 822 while ((const u_char *)lsap < dataend && i--) { 823 if (ospf6_print_lsa(ndo, lsap, dataend)) 824 goto trunc; 825 lsap = (const struct lsa6 *)((const u_char *)lsap + 826 EXTRACT_16BITS(&lsap->ls_hdr.ls_length)); 827 } 828 } 829 break; 830 831 case OSPF_TYPE_LS_ACK: 832 if (ndo->ndo_vflag > 1) { 833 lshp = (const struct lsa6_hdr *)((const uint8_t *)op + OSPF6HDR_LEN); 834 while ((const u_char *)lshp < dataend) { 835 if (ospf6_print_lshdr(ndo, lshp++, dataend)) 836 goto trunc; 837 } 838 } 839 break; 840 841 default: 842 break; 843 } 844 return (0); 845 trunc: 846 return (1); 847 } 848 849 /* RFC5613 Section 2.2 (w/o the TLVs) */ 850 static int 851 ospf6_print_lls(netdissect_options *ndo, 852 const u_char *cp, const u_int len) 853 { 854 uint16_t llsdatalen; 855 856 if (len == 0) 857 return 0; 858 if (len < OSPF_LLS_HDRLEN) 859 goto trunc; 860 /* Checksum */ 861 ND_TCHECK2(*cp, 2); 862 ND_PRINT((ndo, "\n\tLLS Checksum 0x%04x", EXTRACT_16BITS(cp))); 863 cp += 2; 864 /* LLS Data Length */ 865 ND_TCHECK2(*cp, 2); 866 llsdatalen = EXTRACT_16BITS(cp); 867 ND_PRINT((ndo, ", Data Length %u", llsdatalen)); 868 if (llsdatalen < OSPF_LLS_HDRLEN || llsdatalen > len) 869 goto trunc; 870 cp += 2; 871 /* LLS TLVs */ 872 ND_TCHECK2(*cp, llsdatalen - OSPF_LLS_HDRLEN); 873 /* FIXME: code in print-ospf.c can be reused to decode the TLVs */ 874 875 return llsdatalen; 876 trunc: 877 return -1; 878 } 879 880 /* RFC6506 Section 4.1 */ 881 static int 882 ospf6_decode_at(netdissect_options *ndo, 883 const u_char *cp, const u_int len) 884 { 885 uint16_t authdatalen; 886 887 if (len == 0) 888 return 0; 889 if (len < OSPF6_AT_HDRLEN) 890 goto trunc; 891 /* Authentication Type */ 892 ND_TCHECK2(*cp, 2); 893 ND_PRINT((ndo, "\n\tAuthentication Type %s", tok2str(ospf6_auth_type_str, "unknown (0x%04x)", EXTRACT_16BITS(cp)))); 894 cp += 2; 895 /* Auth Data Len */ 896 ND_TCHECK2(*cp, 2); 897 authdatalen = EXTRACT_16BITS(cp); 898 ND_PRINT((ndo, ", Length %u", authdatalen)); 899 if (authdatalen < OSPF6_AT_HDRLEN || authdatalen > len) 900 goto trunc; 901 cp += 2; 902 /* Reserved */ 903 ND_TCHECK2(*cp, 2); 904 cp += 2; 905 /* Security Association ID */ 906 ND_TCHECK2(*cp, 2); 907 ND_PRINT((ndo, ", SAID %u", EXTRACT_16BITS(cp))); 908 cp += 2; 909 /* Cryptographic Sequence Number (High-Order 32 Bits) */ 910 ND_TCHECK2(*cp, 4); 911 ND_PRINT((ndo, ", CSN 0x%08x", EXTRACT_32BITS(cp))); 912 cp += 4; 913 /* Cryptographic Sequence Number (Low-Order 32 Bits) */ 914 ND_TCHECK2(*cp, 4); 915 ND_PRINT((ndo, ":%08x", EXTRACT_32BITS(cp))); 916 cp += 4; 917 /* Authentication Data */ 918 ND_TCHECK2(*cp, authdatalen - OSPF6_AT_HDRLEN); 919 if (ndo->ndo_vflag > 1) 920 print_unknown_data(ndo,cp, "\n\tAuthentication Data ", authdatalen - OSPF6_AT_HDRLEN); 921 return 0; 922 923 trunc: 924 return 1; 925 } 926 927 /* The trailing data may include LLS and/or AT data (in this specific order). 928 * LLS data may be present only in Hello and DBDesc packets with the L-bit set. 929 * AT data may be present in Hello and DBDesc packets with the AT-bit set or in 930 * any other packet type, thus decode the AT data regardless of the AT-bit. 931 */ 932 static int 933 ospf6_decode_v3_trailer(netdissect_options *ndo, 934 const struct ospf6hdr *op, const u_char *cp, const unsigned len) 935 { 936 int llslen = 0; 937 int lls_hello = 0; 938 int lls_dd = 0; 939 940 if (op->ospf6_type == OSPF_TYPE_HELLO) { 941 const struct hello6 *hellop = (const struct hello6 *)((const uint8_t *)op + OSPF6HDR_LEN); 942 ND_TCHECK(hellop->hello_options); 943 if (EXTRACT_32BITS(&hellop->hello_options) & OSPF6_OPTION_L) 944 lls_hello = 1; 945 } else if (op->ospf6_type == OSPF_TYPE_DD) { 946 const struct dd6 *ddp = (const struct dd6 *)((const uint8_t *)op + OSPF6HDR_LEN); 947 ND_TCHECK(ddp->db_options); 948 if (EXTRACT_32BITS(&ddp->db_options) & OSPF6_OPTION_L) 949 lls_dd = 1; 950 } 951 if ((lls_hello || lls_dd) && (llslen = ospf6_print_lls(ndo, cp, len)) < 0) 952 goto trunc; 953 return ospf6_decode_at(ndo, cp + llslen, len - llslen); 954 955 trunc: 956 return 1; 957 } 958 959 void 960 ospf6_print(netdissect_options *ndo, 961 register const u_char *bp, register u_int length) 962 { 963 register const struct ospf6hdr *op; 964 register const u_char *dataend; 965 register const char *cp; 966 uint16_t datalen; 967 968 op = (const struct ospf6hdr *)bp; 969 970 /* If the type is valid translate it, or just print the type */ 971 /* value. If it's not valid, say so and return */ 972 ND_TCHECK(op->ospf6_type); 973 cp = tok2str(ospf6_type_values, "unknown packet type (%u)", op->ospf6_type); 974 ND_PRINT((ndo, "OSPFv%u, %s, length %d", op->ospf6_version, cp, length)); 975 if (*cp == 'u') { 976 return; 977 } 978 979 if(!ndo->ndo_vflag) { /* non verbose - so lets bail out here */ 980 return; 981 } 982 983 /* OSPFv3 data always comes first and optional trailing data may follow. */ 984 ND_TCHECK(op->ospf6_len); 985 datalen = EXTRACT_16BITS(&op->ospf6_len); 986 if (datalen > length) { 987 ND_PRINT((ndo, " [len %d]", datalen)); 988 return; 989 } 990 dataend = bp + datalen; 991 992 ND_TCHECK(op->ospf6_routerid); 993 ND_PRINT((ndo, "\n\tRouter-ID %s", ipaddr_string(ndo, &op->ospf6_routerid))); 994 995 ND_TCHECK(op->ospf6_areaid); 996 if (EXTRACT_32BITS(&op->ospf6_areaid) != 0) 997 ND_PRINT((ndo, ", Area %s", ipaddr_string(ndo, &op->ospf6_areaid))); 998 else 999 ND_PRINT((ndo, ", Backbone Area")); 1000 ND_TCHECK(op->ospf6_instanceid); 1001 if (op->ospf6_instanceid) 1002 ND_PRINT((ndo, ", Instance %u", op->ospf6_instanceid)); 1003 1004 /* Do rest according to version. */ 1005 switch (op->ospf6_version) { 1006 1007 case 3: 1008 /* ospf version 3 */ 1009 if (ospf6_decode_v3(ndo, op, dataend) || 1010 ospf6_decode_v3_trailer(ndo, op, dataend, length - datalen)) 1011 goto trunc; 1012 break; 1013 } /* end switch on version */ 1014 1015 return; 1016 trunc: 1017 ND_PRINT((ndo, "%s", tstr)); 1018 } 1019