1 /* 2 * Copyright (c) 1992, 1993, 1994, 1995, 1996, 1997 3 * The Regents of the University of California. All rights reserved. 4 * 5 * Redistribution and use in source and binary forms, with or without 6 * modification, are permitted provided that: (1) source code distributions 7 * retain the above copyright notice and this paragraph in its entirety, (2) 8 * distributions including binary code include the above copyright notice and 9 * this paragraph in its entirety in the documentation or other materials 10 * provided with the distribution, and (3) all advertising materials mentioning 11 * features or use of this software display the following acknowledgement: 12 * ``This product includes software developed by the University of California, 13 * Lawrence Berkeley Laboratory and its contributors.'' Neither the name of 14 * the University nor the names of its contributors may be used to endorse 15 * or promote products derived from this software without specific prior 16 * written permission. 17 * THIS SOFTWARE IS PROVIDED ``AS IS'' AND WITHOUT ANY EXPRESS OR IMPLIED 18 * WARRANTIES, INCLUDING, WITHOUT LIMITATION, THE IMPLIED WARRANTIES OF 19 * MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. 20 * 21 * OSPF support contributed by Jeffrey Honig (jch@mitchell.cit.cornell.edu) 22 */ 23 24 #include <sys/cdefs.h> 25 #ifndef lint 26 __RCSID("$NetBSD: print-ospf6.c,v 1.8 2017/09/08 14:01:13 christos Exp $"); 27 #endif 28 29 /* \summary: IPv6 Open Shortest Path First (OSPFv3) printer */ 30 31 #ifdef HAVE_CONFIG_H 32 #include "config.h" 33 #endif 34 35 #include <netdissect-stdinc.h> 36 37 #include <string.h> 38 39 #include "netdissect.h" 40 #include "addrtoname.h" 41 #include "extract.h" 42 43 #include "ospf.h" 44 45 #define OSPF_TYPE_HELLO 1 /* Hello */ 46 #define OSPF_TYPE_DD 2 /* Database Description */ 47 #define OSPF_TYPE_LS_REQ 3 /* Link State Request */ 48 #define OSPF_TYPE_LS_UPDATE 4 /* Link State Update */ 49 #define OSPF_TYPE_LS_ACK 5 /* Link State Ack */ 50 51 /* Options *_options */ 52 #define OSPF6_OPTION_V6 0x01 /* V6 bit: A bit for peeping tom */ 53 #define OSPF6_OPTION_E 0x02 /* E bit: External routes advertised */ 54 #define OSPF6_OPTION_MC 0x04 /* MC bit: Multicast capable */ 55 #define OSPF6_OPTION_N 0x08 /* N bit: For type-7 LSA */ 56 #define OSPF6_OPTION_R 0x10 /* R bit: Router bit */ 57 #define OSPF6_OPTION_DC 0x20 /* DC bit: Demand circuits */ 58 /* The field is actually 24-bit (RFC5340 Section A.2). */ 59 #define OSPF6_OPTION_AF 0x0100 /* AF bit: Multiple address families */ 60 #define OSPF6_OPTION_L 0x0200 /* L bit: Link-local signaling (LLS) */ 61 #define OSPF6_OPTION_AT 0x0400 /* AT bit: Authentication trailer */ 62 63 64 /* db_flags */ 65 #define OSPF6_DB_INIT 0x04 /* */ 66 #define OSPF6_DB_MORE 0x02 67 #define OSPF6_DB_MASTER 0x01 68 #define OSPF6_DB_M6 0x10 /* IPv6 MTU */ 69 70 /* ls_type */ 71 #define LS_TYPE_ROUTER 1 /* router link */ 72 #define LS_TYPE_NETWORK 2 /* network link */ 73 #define LS_TYPE_INTER_AP 3 /* Inter-Area-Prefix */ 74 #define LS_TYPE_INTER_AR 4 /* Inter-Area-Router */ 75 #define LS_TYPE_ASE 5 /* ASE */ 76 #define LS_TYPE_GROUP 6 /* Group membership */ 77 #define LS_TYPE_NSSA 7 /* NSSA */ 78 #define LS_TYPE_LINK 8 /* Link LSA */ 79 #define LS_TYPE_INTRA_AP 9 /* Intra-Area-Prefix */ 80 #define LS_TYPE_INTRA_ATE 10 /* Intra-Area-TE */ 81 #define LS_TYPE_GRACE 11 /* Grace LSA */ 82 #define LS_TYPE_RI 12 /* Router information */ 83 #define LS_TYPE_INTER_ASTE 13 /* Inter-AS-TE */ 84 #define LS_TYPE_L1VPN 14 /* L1VPN */ 85 #define LS_TYPE_MASK 0x1fff 86 87 #define LS_SCOPE_LINKLOCAL 0x0000 88 #define LS_SCOPE_AREA 0x2000 89 #define LS_SCOPE_AS 0x4000 90 #define LS_SCOPE_MASK 0x6000 91 #define LS_SCOPE_U 0x8000 92 93 /* rla_link.link_type */ 94 #define RLA_TYPE_ROUTER 1 /* point-to-point to another router */ 95 #define RLA_TYPE_TRANSIT 2 /* connection to transit network */ 96 #define RLA_TYPE_VIRTUAL 4 /* virtual link */ 97 98 /* rla_flags */ 99 #define RLA_FLAG_B 0x01 100 #define RLA_FLAG_E 0x02 101 #define RLA_FLAG_V 0x04 102 #define RLA_FLAG_W 0x08 103 #define RLA_FLAG_N 0x10 104 105 /* lsa_prefix options */ 106 #define LSA_PREFIX_OPT_NU 0x01 107 #define LSA_PREFIX_OPT_LA 0x02 108 #define LSA_PREFIX_OPT_MC 0x04 109 #define LSA_PREFIX_OPT_P 0x08 110 #define LSA_PREFIX_OPT_DN 0x10 111 112 /* sla_tosmetric breakdown */ 113 #define SLA_MASK_TOS 0x7f000000 114 #define SLA_MASK_METRIC 0x00ffffff 115 #define SLA_SHIFT_TOS 24 116 117 /* asla_metric */ 118 #define ASLA_FLAG_FWDADDR 0x02000000 119 #define ASLA_FLAG_ROUTETAG 0x01000000 120 #define ASLA_MASK_METRIC 0x00ffffff 121 122 /* RFC6506 Section 4.1 */ 123 #define OSPF6_AT_HDRLEN 16U 124 #define OSPF6_AUTH_TYPE_HMAC 0x0001 125 126 typedef uint32_t rtrid_t; 127 128 /* link state advertisement header */ 129 struct lsa6_hdr { 130 uint16_t ls_age; 131 uint16_t ls_type; 132 rtrid_t ls_stateid; 133 rtrid_t ls_router; 134 uint32_t ls_seq; 135 uint16_t ls_chksum; 136 uint16_t ls_length; 137 }; 138 139 /* Length of an IPv6 address, in bytes. */ 140 #define IPV6_ADDR_LEN_BYTES (128/8) 141 142 struct lsa6_prefix { 143 uint8_t lsa_p_len; 144 uint8_t lsa_p_opt; 145 uint16_t lsa_p_metric; 146 uint8_t lsa_p_prefix[IPV6_ADDR_LEN_BYTES]; /* maximum length */ 147 }; 148 149 /* link state advertisement */ 150 struct lsa6 { 151 struct lsa6_hdr ls_hdr; 152 153 /* Link state types */ 154 union { 155 /* Router links advertisements */ 156 struct { 157 union { 158 uint8_t flg; 159 uint32_t opt; 160 } rla_flgandopt; 161 #define rla_flags rla_flgandopt.flg 162 #define rla_options rla_flgandopt.opt 163 struct rlalink6 { 164 uint8_t link_type; 165 uint8_t link_zero[1]; 166 uint16_t link_metric; 167 uint32_t link_ifid; 168 uint32_t link_nifid; 169 rtrid_t link_nrtid; 170 } rla_link[1]; /* may repeat */ 171 } un_rla; 172 173 /* Network links advertisements */ 174 struct { 175 uint32_t nla_options; 176 rtrid_t nla_router[1]; /* may repeat */ 177 } un_nla; 178 179 /* Inter Area Prefix LSA */ 180 struct { 181 uint32_t inter_ap_metric; 182 struct lsa6_prefix inter_ap_prefix[1]; 183 } un_inter_ap; 184 185 /* AS external links advertisements */ 186 struct { 187 uint32_t asla_metric; 188 struct lsa6_prefix asla_prefix[1]; 189 /* some optional fields follow */ 190 } un_asla; 191 192 #if 0 193 /* Summary links advertisements */ 194 struct { 195 struct in_addr sla_mask; 196 uint32_t sla_tosmetric[1]; /* may repeat */ 197 } un_sla; 198 199 /* Multicast group membership */ 200 struct mcla { 201 uint32_t mcla_vtype; 202 struct in_addr mcla_vid; 203 } un_mcla[1]; 204 #endif 205 206 /* Type 7 LSA */ 207 208 /* Link LSA */ 209 struct llsa { 210 union { 211 uint8_t pri; 212 uint32_t opt; 213 } llsa_priandopt; 214 #define llsa_priority llsa_priandopt.pri 215 #define llsa_options llsa_priandopt.opt 216 struct in6_addr llsa_lladdr; 217 uint32_t llsa_nprefix; 218 struct lsa6_prefix llsa_prefix[1]; 219 } un_llsa; 220 221 /* Intra-Area-Prefix */ 222 struct { 223 uint16_t intra_ap_nprefix; 224 uint16_t intra_ap_lstype; 225 rtrid_t intra_ap_lsid; 226 rtrid_t intra_ap_rtid; 227 struct lsa6_prefix intra_ap_prefix[1]; 228 } un_intra_ap; 229 } lsa_un; 230 }; 231 232 /* 233 * the main header 234 */ 235 struct ospf6hdr { 236 uint8_t ospf6_version; 237 uint8_t ospf6_type; 238 uint16_t ospf6_len; 239 rtrid_t ospf6_routerid; 240 rtrid_t ospf6_areaid; 241 uint16_t ospf6_chksum; 242 uint8_t ospf6_instanceid; 243 uint8_t ospf6_rsvd; 244 }; 245 246 /* 247 * The OSPF6 header length is 16 bytes, regardless of how your compiler 248 * might choose to pad the above structure. 249 */ 250 #define OSPF6HDR_LEN 16 251 252 /* Hello packet */ 253 struct hello6 { 254 uint32_t hello_ifid; 255 union { 256 uint8_t pri; 257 uint32_t opt; 258 } hello_priandopt; 259 #define hello_priority hello_priandopt.pri 260 #define hello_options hello_priandopt.opt 261 uint16_t hello_helloint; 262 uint16_t hello_deadint; 263 rtrid_t hello_dr; 264 rtrid_t hello_bdr; 265 rtrid_t hello_neighbor[1]; /* may repeat */ 266 }; 267 268 /* Database Description packet */ 269 struct dd6 { 270 uint32_t db_options; 271 uint16_t db_mtu; 272 uint8_t db_mbz; 273 uint8_t db_flags; 274 uint32_t db_seq; 275 struct lsa6_hdr db_lshdr[1]; /* may repeat */ 276 }; 277 278 /* Link State Request */ 279 struct lsr6 { 280 uint16_t ls_mbz; 281 uint16_t ls_type; 282 rtrid_t ls_stateid; 283 rtrid_t ls_router; 284 }; 285 286 /* Link State Update */ 287 struct lsu6 { 288 uint32_t lsu_count; 289 struct lsa6 lsu_lsa[1]; /* may repeat */ 290 }; 291 292 static const char tstr[] = " [|ospf3]"; 293 294 static const struct tok ospf6_option_values[] = { 295 { OSPF6_OPTION_V6, "V6" }, 296 { OSPF6_OPTION_E, "External" }, 297 { OSPF6_OPTION_MC, "Deprecated" }, 298 { OSPF6_OPTION_N, "NSSA" }, 299 { OSPF6_OPTION_R, "Router" }, 300 { OSPF6_OPTION_DC, "Demand Circuit" }, 301 { OSPF6_OPTION_AF, "AFs Support" }, 302 { OSPF6_OPTION_L, "LLS" }, 303 { OSPF6_OPTION_AT, "Authentication Trailer" }, 304 { 0, NULL } 305 }; 306 307 static const struct tok ospf6_rla_flag_values[] = { 308 { RLA_FLAG_B, "ABR" }, 309 { RLA_FLAG_E, "External" }, 310 { RLA_FLAG_V, "Virtual-Link Endpoint" }, 311 { RLA_FLAG_W, "Wildcard Receiver" }, 312 { RLA_FLAG_N, "NSSA Translator" }, 313 { 0, NULL } 314 }; 315 316 static const struct tok ospf6_asla_flag_values[] = { 317 { ASLA_FLAG_EXTERNAL, "External Type 2" }, 318 { ASLA_FLAG_FWDADDR, "Forwarding" }, 319 { ASLA_FLAG_ROUTETAG, "Tag" }, 320 { 0, NULL } 321 }; 322 323 static const struct tok ospf6_type_values[] = { 324 { OSPF_TYPE_HELLO, "Hello" }, 325 { OSPF_TYPE_DD, "Database Description" }, 326 { OSPF_TYPE_LS_REQ, "LS-Request" }, 327 { OSPF_TYPE_LS_UPDATE, "LS-Update" }, 328 { OSPF_TYPE_LS_ACK, "LS-Ack" }, 329 { 0, NULL } 330 }; 331 332 static const struct tok ospf6_lsa_values[] = { 333 { LS_TYPE_ROUTER, "Router" }, 334 { LS_TYPE_NETWORK, "Network" }, 335 { LS_TYPE_INTER_AP, "Inter-Area Prefix" }, 336 { LS_TYPE_INTER_AR, "Inter-Area Router" }, 337 { LS_TYPE_ASE, "External" }, 338 { LS_TYPE_GROUP, "Deprecated" }, 339 { LS_TYPE_NSSA, "NSSA" }, 340 { LS_TYPE_LINK, "Link" }, 341 { LS_TYPE_INTRA_AP, "Intra-Area Prefix" }, 342 { LS_TYPE_INTRA_ATE, "Intra-Area TE" }, 343 { LS_TYPE_GRACE, "Grace" }, 344 { LS_TYPE_RI, "Router Information" }, 345 { LS_TYPE_INTER_ASTE, "Inter-AS-TE" }, 346 { LS_TYPE_L1VPN, "Layer 1 VPN" }, 347 { 0, NULL } 348 }; 349 350 static const struct tok ospf6_ls_scope_values[] = { 351 { LS_SCOPE_LINKLOCAL, "Link Local" }, 352 { LS_SCOPE_AREA, "Area Local" }, 353 { LS_SCOPE_AS, "Domain Wide" }, 354 { 0, NULL } 355 }; 356 357 static const struct tok ospf6_dd_flag_values[] = { 358 { OSPF6_DB_INIT, "Init" }, 359 { OSPF6_DB_MORE, "More" }, 360 { OSPF6_DB_MASTER, "Master" }, 361 { OSPF6_DB_M6, "IPv6 MTU" }, 362 { 0, NULL } 363 }; 364 365 static const struct tok ospf6_lsa_prefix_option_values[] = { 366 { LSA_PREFIX_OPT_NU, "No Unicast" }, 367 { LSA_PREFIX_OPT_LA, "Local address" }, 368 { LSA_PREFIX_OPT_MC, "Deprecated" }, 369 { LSA_PREFIX_OPT_P, "Propagate" }, 370 { LSA_PREFIX_OPT_DN, "Down" }, 371 { 0, NULL } 372 }; 373 374 static const struct tok ospf6_auth_type_str[] = { 375 { OSPF6_AUTH_TYPE_HMAC, "HMAC" }, 376 { 0, NULL } 377 }; 378 379 static void 380 ospf6_print_ls_type(netdissect_options *ndo, 381 register u_int ls_type, register const rtrid_t *ls_stateid) 382 { 383 ND_PRINT((ndo, "\n\t %s LSA (%d), %s Scope%s, LSA-ID %s", 384 tok2str(ospf6_lsa_values, "Unknown", ls_type & LS_TYPE_MASK), 385 ls_type & LS_TYPE_MASK, 386 tok2str(ospf6_ls_scope_values, "Unknown", ls_type & LS_SCOPE_MASK), 387 ls_type &0x8000 ? ", transitive" : "", /* U-bit */ 388 ipaddr_string(ndo, ls_stateid))); 389 } 390 391 static int 392 ospf6_print_lshdr(netdissect_options *ndo, 393 register const struct lsa6_hdr *lshp, const u_char *dataend) 394 { 395 if ((const u_char *)(lshp + 1) > dataend) 396 goto trunc; 397 ND_TCHECK(lshp->ls_type); 398 ND_TCHECK(lshp->ls_seq); 399 400 ND_PRINT((ndo, "\n\t Advertising Router %s, seq 0x%08x, age %us, length %u", 401 ipaddr_string(ndo, &lshp->ls_router), 402 EXTRACT_32BITS(&lshp->ls_seq), 403 EXTRACT_16BITS(&lshp->ls_age), 404 EXTRACT_16BITS(&lshp->ls_length)-(u_int)sizeof(struct lsa6_hdr))); 405 406 ospf6_print_ls_type(ndo, EXTRACT_16BITS(&lshp->ls_type), &lshp->ls_stateid); 407 408 return (0); 409 trunc: 410 return (1); 411 } 412 413 static int 414 ospf6_print_lsaprefix(netdissect_options *ndo, 415 const uint8_t *tptr, u_int lsa_length) 416 { 417 const struct lsa6_prefix *lsapp = (const struct lsa6_prefix *)tptr; 418 u_int wordlen; 419 struct in6_addr prefix; 420 421 if (lsa_length < sizeof (*lsapp) - IPV6_ADDR_LEN_BYTES) 422 goto trunc; 423 lsa_length -= sizeof (*lsapp) - IPV6_ADDR_LEN_BYTES; 424 ND_TCHECK2(*lsapp, sizeof (*lsapp) - IPV6_ADDR_LEN_BYTES); 425 wordlen = (lsapp->lsa_p_len + 31) / 32; 426 if (wordlen * 4 > sizeof(struct in6_addr)) { 427 ND_PRINT((ndo, " bogus prefixlen /%d", lsapp->lsa_p_len)); 428 goto trunc; 429 } 430 if (lsa_length < wordlen * 4) 431 goto trunc; 432 lsa_length -= wordlen * 4; 433 ND_TCHECK2(lsapp->lsa_p_prefix, wordlen * 4); 434 memset(&prefix, 0, sizeof(prefix)); 435 memcpy(&prefix, lsapp->lsa_p_prefix, wordlen * 4); 436 ND_PRINT((ndo, "\n\t\t%s/%d", ip6addr_string(ndo, &prefix), 437 lsapp->lsa_p_len)); 438 if (lsapp->lsa_p_opt) { 439 ND_PRINT((ndo, ", Options [%s]", 440 bittok2str(ospf6_lsa_prefix_option_values, 441 "none", lsapp->lsa_p_opt))); 442 } 443 ND_PRINT((ndo, ", metric %u", EXTRACT_16BITS(&lsapp->lsa_p_metric))); 444 return sizeof(*lsapp) - IPV6_ADDR_LEN_BYTES + wordlen * 4; 445 446 trunc: 447 return -1; 448 } 449 450 451 /* 452 * Print a single link state advertisement. If truncated return 1, else 0. 453 */ 454 static int 455 ospf6_print_lsa(netdissect_options *ndo, 456 register const struct lsa6 *lsap, const u_char *dataend) 457 { 458 register const struct rlalink6 *rlp; 459 #if 0 460 register const struct tos_metric *tosp; 461 #endif 462 register const rtrid_t *ap; 463 #if 0 464 register const struct aslametric *almp; 465 register const struct mcla *mcp; 466 #endif 467 register const struct llsa *llsap; 468 register const struct lsa6_prefix *lsapp; 469 #if 0 470 register const uint32_t *lp; 471 #endif 472 register u_int prefixes; 473 register int bytelen; 474 register u_int length, lsa_length; 475 uint32_t flags32; 476 const uint8_t *tptr; 477 478 if (ospf6_print_lshdr(ndo, &lsap->ls_hdr, dataend)) 479 return (1); 480 ND_TCHECK(lsap->ls_hdr.ls_length); 481 length = EXTRACT_16BITS(&lsap->ls_hdr.ls_length); 482 483 /* 484 * The LSA length includes the length of the header; 485 * it must have a value that's at least that length. 486 * If it does, find the length of what follows the 487 * header. 488 */ 489 if (length < sizeof(struct lsa6_hdr) || (const u_char *)lsap + length > dataend) 490 return (1); 491 lsa_length = length - sizeof(struct lsa6_hdr); 492 tptr = (const uint8_t *)lsap+sizeof(struct lsa6_hdr); 493 494 switch (EXTRACT_16BITS(&lsap->ls_hdr.ls_type)) { 495 case LS_TYPE_ROUTER | LS_SCOPE_AREA: 496 if (lsa_length < sizeof (lsap->lsa_un.un_rla.rla_options)) 497 return (1); 498 lsa_length -= sizeof (lsap->lsa_un.un_rla.rla_options); 499 ND_TCHECK(lsap->lsa_un.un_rla.rla_options); 500 ND_PRINT((ndo, "\n\t Options [%s]", 501 bittok2str(ospf6_option_values, "none", 502 EXTRACT_32BITS(&lsap->lsa_un.un_rla.rla_options)))); 503 ND_PRINT((ndo, ", RLA-Flags [%s]", 504 bittok2str(ospf6_rla_flag_values, "none", 505 lsap->lsa_un.un_rla.rla_flags))); 506 507 rlp = lsap->lsa_un.un_rla.rla_link; 508 while (lsa_length != 0) { 509 if (lsa_length < sizeof (*rlp)) 510 return (1); 511 lsa_length -= sizeof (*rlp); 512 ND_TCHECK(*rlp); 513 switch (rlp->link_type) { 514 515 case RLA_TYPE_VIRTUAL: 516 ND_PRINT((ndo, "\n\t Virtual Link: Neighbor Router-ID %s" 517 "\n\t Neighbor Interface-ID %s, Interface %s", 518 ipaddr_string(ndo, &rlp->link_nrtid), 519 ipaddr_string(ndo, &rlp->link_nifid), 520 ipaddr_string(ndo, &rlp->link_ifid))); 521 break; 522 523 case RLA_TYPE_ROUTER: 524 ND_PRINT((ndo, "\n\t Neighbor Router-ID %s" 525 "\n\t Neighbor Interface-ID %s, Interface %s", 526 ipaddr_string(ndo, &rlp->link_nrtid), 527 ipaddr_string(ndo, &rlp->link_nifid), 528 ipaddr_string(ndo, &rlp->link_ifid))); 529 break; 530 531 case RLA_TYPE_TRANSIT: 532 ND_PRINT((ndo, "\n\t Neighbor Network-ID %s" 533 "\n\t Neighbor Interface-ID %s, Interface %s", 534 ipaddr_string(ndo, &rlp->link_nrtid), 535 ipaddr_string(ndo, &rlp->link_nifid), 536 ipaddr_string(ndo, &rlp->link_ifid))); 537 break; 538 539 default: 540 ND_PRINT((ndo, "\n\t Unknown Router Links Type 0x%02x", 541 rlp->link_type)); 542 return (0); 543 } 544 ND_PRINT((ndo, ", metric %d", EXTRACT_16BITS(&rlp->link_metric))); 545 rlp++; 546 } 547 break; 548 549 case LS_TYPE_NETWORK | LS_SCOPE_AREA: 550 if (lsa_length < sizeof (lsap->lsa_un.un_nla.nla_options)) 551 return (1); 552 lsa_length -= sizeof (lsap->lsa_un.un_nla.nla_options); 553 ND_TCHECK(lsap->lsa_un.un_nla.nla_options); 554 ND_PRINT((ndo, "\n\t Options [%s]", 555 bittok2str(ospf6_option_values, "none", 556 EXTRACT_32BITS(&lsap->lsa_un.un_nla.nla_options)))); 557 558 ND_PRINT((ndo, "\n\t Connected Routers:")); 559 ap = lsap->lsa_un.un_nla.nla_router; 560 while (lsa_length != 0) { 561 if (lsa_length < sizeof (*ap)) 562 return (1); 563 lsa_length -= sizeof (*ap); 564 ND_TCHECK(*ap); 565 ND_PRINT((ndo, "\n\t\t%s", ipaddr_string(ndo, ap))); 566 ++ap; 567 } 568 break; 569 570 case LS_TYPE_INTER_AP | LS_SCOPE_AREA: 571 if (lsa_length < sizeof (lsap->lsa_un.un_inter_ap.inter_ap_metric)) 572 return (1); 573 lsa_length -= sizeof (lsap->lsa_un.un_inter_ap.inter_ap_metric); 574 ND_TCHECK(lsap->lsa_un.un_inter_ap.inter_ap_metric); 575 ND_PRINT((ndo, ", metric %u", 576 EXTRACT_32BITS(&lsap->lsa_un.un_inter_ap.inter_ap_metric) & SLA_MASK_METRIC)); 577 578 tptr = (const uint8_t *)lsap->lsa_un.un_inter_ap.inter_ap_prefix; 579 while (lsa_length != 0) { 580 bytelen = ospf6_print_lsaprefix(ndo, tptr, lsa_length); 581 if (bytelen < 0) 582 goto trunc; 583 lsa_length -= bytelen; 584 tptr += bytelen; 585 } 586 break; 587 588 case LS_TYPE_ASE | LS_SCOPE_AS: 589 if (lsa_length < sizeof (lsap->lsa_un.un_asla.asla_metric)) 590 return (1); 591 lsa_length -= sizeof (lsap->lsa_un.un_asla.asla_metric); 592 ND_TCHECK(lsap->lsa_un.un_asla.asla_metric); 593 flags32 = EXTRACT_32BITS(&lsap->lsa_un.un_asla.asla_metric); 594 ND_PRINT((ndo, "\n\t Flags [%s]", 595 bittok2str(ospf6_asla_flag_values, "none", flags32))); 596 ND_PRINT((ndo, " metric %u", 597 EXTRACT_32BITS(&lsap->lsa_un.un_asla.asla_metric) & 598 ASLA_MASK_METRIC)); 599 600 tptr = (const uint8_t *)lsap->lsa_un.un_asla.asla_prefix; 601 lsapp = (const struct lsa6_prefix *)tptr; 602 bytelen = ospf6_print_lsaprefix(ndo, tptr, lsa_length); 603 if (bytelen < 0) 604 goto trunc; 605 lsa_length -= bytelen; 606 tptr += bytelen; 607 608 if ((flags32 & ASLA_FLAG_FWDADDR) != 0) { 609 const struct in6_addr *fwdaddr6; 610 611 fwdaddr6 = (const struct in6_addr *)tptr; 612 if (lsa_length < sizeof (*fwdaddr6)) 613 return (1); 614 lsa_length -= sizeof (*fwdaddr6); 615 ND_TCHECK(*fwdaddr6); 616 ND_PRINT((ndo, " forward %s", 617 ip6addr_string(ndo, fwdaddr6))); 618 tptr += sizeof(*fwdaddr6); 619 } 620 621 if ((flags32 & ASLA_FLAG_ROUTETAG) != 0) { 622 if (lsa_length < sizeof (uint32_t)) 623 return (1); 624 lsa_length -= sizeof (uint32_t); 625 ND_TCHECK(*(const uint32_t *)tptr); 626 ND_PRINT((ndo, " tag %s", 627 ipaddr_string(ndo, (const uint32_t *)tptr))); 628 tptr += sizeof(uint32_t); 629 } 630 631 if (lsapp->lsa_p_metric) { 632 if (lsa_length < sizeof (uint32_t)) 633 return (1); 634 lsa_length -= sizeof (uint32_t); 635 ND_TCHECK(*(const uint32_t *)tptr); 636 ND_PRINT((ndo, " RefLSID: %s", 637 ipaddr_string(ndo, (const uint32_t *)tptr))); 638 tptr += sizeof(uint32_t); 639 } 640 break; 641 642 case LS_TYPE_LINK: 643 /* Link LSA */ 644 llsap = &lsap->lsa_un.un_llsa; 645 if (lsa_length < sizeof (llsap->llsa_priandopt)) 646 return (1); 647 lsa_length -= sizeof (llsap->llsa_priandopt); 648 ND_TCHECK(llsap->llsa_priandopt); 649 ND_PRINT((ndo, "\n\t Options [%s]", 650 bittok2str(ospf6_option_values, "none", 651 EXTRACT_32BITS(&llsap->llsa_options)))); 652 653 if (lsa_length < sizeof (llsap->llsa_lladdr) + sizeof (llsap->llsa_nprefix)) 654 return (1); 655 lsa_length -= sizeof (llsap->llsa_lladdr) + sizeof (llsap->llsa_nprefix); 656 ND_TCHECK(llsap->llsa_nprefix); 657 prefixes = EXTRACT_32BITS(&llsap->llsa_nprefix); 658 ND_PRINT((ndo, "\n\t Priority %d, Link-local address %s, Prefixes %d:", 659 llsap->llsa_priority, 660 ip6addr_string(ndo, &llsap->llsa_lladdr), 661 prefixes)); 662 663 tptr = (const uint8_t *)llsap->llsa_prefix; 664 while (prefixes > 0) { 665 bytelen = ospf6_print_lsaprefix(ndo, tptr, lsa_length); 666 if (bytelen < 0) 667 goto trunc; 668 prefixes--; 669 lsa_length -= bytelen; 670 tptr += bytelen; 671 } 672 break; 673 674 case LS_TYPE_INTRA_AP | LS_SCOPE_AREA: 675 /* Intra-Area-Prefix LSA */ 676 if (lsa_length < sizeof (lsap->lsa_un.un_intra_ap.intra_ap_rtid)) 677 return (1); 678 lsa_length -= sizeof (lsap->lsa_un.un_intra_ap.intra_ap_rtid); 679 ND_TCHECK(lsap->lsa_un.un_intra_ap.intra_ap_rtid); 680 ospf6_print_ls_type(ndo, 681 EXTRACT_16BITS(&lsap->lsa_un.un_intra_ap.intra_ap_lstype), 682 &lsap->lsa_un.un_intra_ap.intra_ap_lsid); 683 684 if (lsa_length < sizeof (lsap->lsa_un.un_intra_ap.intra_ap_nprefix)) 685 return (1); 686 lsa_length -= sizeof (lsap->lsa_un.un_intra_ap.intra_ap_nprefix); 687 ND_TCHECK(lsap->lsa_un.un_intra_ap.intra_ap_nprefix); 688 prefixes = EXTRACT_16BITS(&lsap->lsa_un.un_intra_ap.intra_ap_nprefix); 689 ND_PRINT((ndo, "\n\t Prefixes %d:", prefixes)); 690 691 tptr = (const uint8_t *)lsap->lsa_un.un_intra_ap.intra_ap_prefix; 692 while (prefixes > 0) { 693 bytelen = ospf6_print_lsaprefix(ndo, tptr, lsa_length); 694 if (bytelen < 0) 695 goto trunc; 696 prefixes--; 697 lsa_length -= bytelen; 698 tptr += bytelen; 699 } 700 break; 701 702 case LS_TYPE_GRACE | LS_SCOPE_LINKLOCAL: 703 if (ospf_print_grace_lsa(ndo, tptr, lsa_length) == -1) { 704 return 1; 705 } 706 break; 707 708 case LS_TYPE_INTRA_ATE | LS_SCOPE_LINKLOCAL: 709 if (ospf_print_te_lsa(ndo, tptr, lsa_length) == -1) { 710 return 1; 711 } 712 break; 713 714 default: 715 if(!print_unknown_data(ndo,tptr, 716 "\n\t ", 717 lsa_length)) { 718 return (1); 719 } 720 break; 721 } 722 723 return (0); 724 trunc: 725 return (1); 726 } 727 728 static int 729 ospf6_decode_v3(netdissect_options *ndo, 730 register const struct ospf6hdr *op, 731 register const u_char *dataend) 732 { 733 register const rtrid_t *ap; 734 register const struct lsr6 *lsrp; 735 register const struct lsa6_hdr *lshp; 736 register const struct lsa6 *lsap; 737 register int i; 738 739 switch (op->ospf6_type) { 740 741 case OSPF_TYPE_HELLO: { 742 register const struct hello6 *hellop = (const struct hello6 *)((const uint8_t *)op + OSPF6HDR_LEN); 743 744 ND_TCHECK_32BITS(&hellop->hello_options); 745 ND_PRINT((ndo, "\n\tOptions [%s]", 746 bittok2str(ospf6_option_values, "none", 747 EXTRACT_32BITS(&hellop->hello_options)))); 748 749 ND_TCHECK(hellop->hello_deadint); 750 ND_PRINT((ndo, "\n\t Hello Timer %us, Dead Timer %us, Interface-ID %s, Priority %u", 751 EXTRACT_16BITS(&hellop->hello_helloint), 752 EXTRACT_16BITS(&hellop->hello_deadint), 753 ipaddr_string(ndo, &hellop->hello_ifid), 754 hellop->hello_priority)); 755 756 ND_TCHECK(hellop->hello_dr); 757 if (EXTRACT_32BITS(&hellop->hello_dr) != 0) 758 ND_PRINT((ndo, "\n\t Designated Router %s", 759 ipaddr_string(ndo, &hellop->hello_dr))); 760 ND_TCHECK(hellop->hello_bdr); 761 if (EXTRACT_32BITS(&hellop->hello_bdr) != 0) 762 ND_PRINT((ndo, ", Backup Designated Router %s", 763 ipaddr_string(ndo, &hellop->hello_bdr))); 764 if (ndo->ndo_vflag > 1) { 765 ND_PRINT((ndo, "\n\t Neighbor List:")); 766 ap = hellop->hello_neighbor; 767 while ((const u_char *)ap < dataend) { 768 ND_TCHECK(*ap); 769 ND_PRINT((ndo, "\n\t %s", ipaddr_string(ndo, ap))); 770 ++ap; 771 } 772 } 773 break; /* HELLO */ 774 } 775 776 case OSPF_TYPE_DD: { 777 register const struct dd6 *ddp = (const struct dd6 *)((const uint8_t *)op + OSPF6HDR_LEN); 778 779 ND_TCHECK(ddp->db_options); 780 ND_PRINT((ndo, "\n\tOptions [%s]", 781 bittok2str(ospf6_option_values, "none", 782 EXTRACT_32BITS(&ddp->db_options)))); 783 ND_TCHECK(ddp->db_flags); 784 ND_PRINT((ndo, ", DD Flags [%s]", 785 bittok2str(ospf6_dd_flag_values,"none",ddp->db_flags))); 786 787 ND_TCHECK(ddp->db_seq); 788 ND_PRINT((ndo, ", MTU %u, DD-Sequence 0x%08x", 789 EXTRACT_16BITS(&ddp->db_mtu), 790 EXTRACT_32BITS(&ddp->db_seq))); 791 if (ndo->ndo_vflag > 1) { 792 /* Print all the LS adv's */ 793 lshp = ddp->db_lshdr; 794 while ((const u_char *)lshp < dataend) { 795 if (ospf6_print_lshdr(ndo, lshp++, dataend)) 796 goto trunc; 797 } 798 } 799 break; 800 } 801 802 case OSPF_TYPE_LS_REQ: 803 if (ndo->ndo_vflag > 1) { 804 lsrp = (const struct lsr6 *)((const uint8_t *)op + OSPF6HDR_LEN); 805 while ((const u_char *)lsrp < dataend) { 806 ND_TCHECK(*lsrp); 807 ND_PRINT((ndo, "\n\t Advertising Router %s", 808 ipaddr_string(ndo, &lsrp->ls_router))); 809 ospf6_print_ls_type(ndo, EXTRACT_16BITS(&lsrp->ls_type), 810 &lsrp->ls_stateid); 811 ++lsrp; 812 } 813 } 814 break; 815 816 case OSPF_TYPE_LS_UPDATE: 817 if (ndo->ndo_vflag > 1) { 818 register const struct lsu6 *lsup = (const struct lsu6 *)((const uint8_t *)op + OSPF6HDR_LEN); 819 820 ND_TCHECK(lsup->lsu_count); 821 i = EXTRACT_32BITS(&lsup->lsu_count); 822 lsap = lsup->lsu_lsa; 823 while ((const u_char *)lsap < dataend && i--) { 824 if (ospf6_print_lsa(ndo, lsap, dataend)) 825 goto trunc; 826 lsap = (const struct lsa6 *)((const u_char *)lsap + 827 EXTRACT_16BITS(&lsap->ls_hdr.ls_length)); 828 } 829 } 830 break; 831 832 case OSPF_TYPE_LS_ACK: 833 if (ndo->ndo_vflag > 1) { 834 lshp = (const struct lsa6_hdr *)((const uint8_t *)op + OSPF6HDR_LEN); 835 while ((const u_char *)lshp < dataend) { 836 if (ospf6_print_lshdr(ndo, lshp++, dataend)) 837 goto trunc; 838 } 839 } 840 break; 841 842 default: 843 break; 844 } 845 return (0); 846 trunc: 847 return (1); 848 } 849 850 /* RFC5613 Section 2.2 (w/o the TLVs) */ 851 static int 852 ospf6_print_lls(netdissect_options *ndo, 853 const u_char *cp, const u_int len) 854 { 855 uint16_t llsdatalen; 856 857 if (len == 0) 858 return 0; 859 if (len < OSPF_LLS_HDRLEN) 860 goto trunc; 861 /* Checksum */ 862 ND_TCHECK2(*cp, 2); 863 ND_PRINT((ndo, "\n\tLLS Checksum 0x%04x", EXTRACT_16BITS(cp))); 864 cp += 2; 865 /* LLS Data Length */ 866 ND_TCHECK2(*cp, 2); 867 llsdatalen = EXTRACT_16BITS(cp); 868 ND_PRINT((ndo, ", Data Length %u", llsdatalen)); 869 if (llsdatalen < OSPF_LLS_HDRLEN || llsdatalen > len) 870 goto trunc; 871 cp += 2; 872 /* LLS TLVs */ 873 ND_TCHECK2(*cp, llsdatalen - OSPF_LLS_HDRLEN); 874 /* FIXME: code in print-ospf.c can be reused to decode the TLVs */ 875 876 return llsdatalen; 877 trunc: 878 return -1; 879 } 880 881 /* RFC6506 Section 4.1 */ 882 static int 883 ospf6_decode_at(netdissect_options *ndo, 884 const u_char *cp, const u_int len) 885 { 886 uint16_t authdatalen; 887 888 if (len == 0) 889 return 0; 890 if (len < OSPF6_AT_HDRLEN) 891 goto trunc; 892 /* Authentication Type */ 893 ND_TCHECK2(*cp, 2); 894 ND_PRINT((ndo, "\n\tAuthentication Type %s", tok2str(ospf6_auth_type_str, "unknown (0x%04x)", EXTRACT_16BITS(cp)))); 895 cp += 2; 896 /* Auth Data Len */ 897 ND_TCHECK2(*cp, 2); 898 authdatalen = EXTRACT_16BITS(cp); 899 ND_PRINT((ndo, ", Length %u", authdatalen)); 900 if (authdatalen < OSPF6_AT_HDRLEN || authdatalen > len) 901 goto trunc; 902 cp += 2; 903 /* Reserved */ 904 ND_TCHECK2(*cp, 2); 905 cp += 2; 906 /* Security Association ID */ 907 ND_TCHECK2(*cp, 2); 908 ND_PRINT((ndo, ", SAID %u", EXTRACT_16BITS(cp))); 909 cp += 2; 910 /* Cryptographic Sequence Number (High-Order 32 Bits) */ 911 ND_TCHECK2(*cp, 4); 912 ND_PRINT((ndo, ", CSN 0x%08x", EXTRACT_32BITS(cp))); 913 cp += 4; 914 /* Cryptographic Sequence Number (Low-Order 32 Bits) */ 915 ND_TCHECK2(*cp, 4); 916 ND_PRINT((ndo, ":%08x", EXTRACT_32BITS(cp))); 917 cp += 4; 918 /* Authentication Data */ 919 ND_TCHECK2(*cp, authdatalen - OSPF6_AT_HDRLEN); 920 if (ndo->ndo_vflag > 1) 921 print_unknown_data(ndo,cp, "\n\tAuthentication Data ", authdatalen - OSPF6_AT_HDRLEN); 922 return 0; 923 924 trunc: 925 return 1; 926 } 927 928 /* The trailing data may include LLS and/or AT data (in this specific order). 929 * LLS data may be present only in Hello and DBDesc packets with the L-bit set. 930 * AT data may be present in Hello and DBDesc packets with the AT-bit set or in 931 * any other packet type, thus decode the AT data regardless of the AT-bit. 932 */ 933 static int 934 ospf6_decode_v3_trailer(netdissect_options *ndo, 935 const struct ospf6hdr *op, const u_char *cp, const unsigned len) 936 { 937 int llslen = 0; 938 int lls_hello = 0; 939 int lls_dd = 0; 940 941 if (op->ospf6_type == OSPF_TYPE_HELLO) { 942 const struct hello6 *hellop = (const struct hello6 *)((const uint8_t *)op + OSPF6HDR_LEN); 943 ND_TCHECK(hellop->hello_options); 944 if (EXTRACT_32BITS(&hellop->hello_options) & OSPF6_OPTION_L) 945 lls_hello = 1; 946 } else if (op->ospf6_type == OSPF_TYPE_DD) { 947 const struct dd6 *ddp = (const struct dd6 *)((const uint8_t *)op + OSPF6HDR_LEN); 948 ND_TCHECK(ddp->db_options); 949 if (EXTRACT_32BITS(&ddp->db_options) & OSPF6_OPTION_L) 950 lls_dd = 1; 951 } 952 if ((lls_hello || lls_dd) && (llslen = ospf6_print_lls(ndo, cp, len)) < 0) 953 goto trunc; 954 return ospf6_decode_at(ndo, cp + llslen, len - llslen); 955 956 trunc: 957 return 1; 958 } 959 960 void 961 ospf6_print(netdissect_options *ndo, 962 register const u_char *bp, register u_int length) 963 { 964 register const struct ospf6hdr *op; 965 register const u_char *dataend; 966 register const char *cp; 967 uint16_t datalen; 968 969 op = (const struct ospf6hdr *)bp; 970 971 /* If the type is valid translate it, or just print the type */ 972 /* value. If it's not valid, say so and return */ 973 ND_TCHECK(op->ospf6_type); 974 cp = tok2str(ospf6_type_values, "unknown packet type (%u)", op->ospf6_type); 975 ND_PRINT((ndo, "OSPFv%u, %s, length %d", op->ospf6_version, cp, length)); 976 if (*cp == 'u') { 977 return; 978 } 979 980 if(!ndo->ndo_vflag) { /* non verbose - so lets bail out here */ 981 return; 982 } 983 984 /* OSPFv3 data always comes first and optional trailing data may follow. */ 985 ND_TCHECK(op->ospf6_len); 986 datalen = EXTRACT_16BITS(&op->ospf6_len); 987 if (datalen > length) { 988 ND_PRINT((ndo, " [len %d]", datalen)); 989 return; 990 } 991 dataend = bp + datalen; 992 993 ND_TCHECK(op->ospf6_routerid); 994 ND_PRINT((ndo, "\n\tRouter-ID %s", ipaddr_string(ndo, &op->ospf6_routerid))); 995 996 ND_TCHECK(op->ospf6_areaid); 997 if (EXTRACT_32BITS(&op->ospf6_areaid) != 0) 998 ND_PRINT((ndo, ", Area %s", ipaddr_string(ndo, &op->ospf6_areaid))); 999 else 1000 ND_PRINT((ndo, ", Backbone Area")); 1001 ND_TCHECK(op->ospf6_instanceid); 1002 if (op->ospf6_instanceid) 1003 ND_PRINT((ndo, ", Instance %u", op->ospf6_instanceid)); 1004 1005 /* Do rest according to version. */ 1006 switch (op->ospf6_version) { 1007 1008 case 3: 1009 /* ospf version 3 */ 1010 if (ospf6_decode_v3(ndo, op, dataend) || 1011 ospf6_decode_v3_trailer(ndo, op, dataend, length - datalen)) 1012 goto trunc; 1013 break; 1014 } /* end switch on version */ 1015 1016 return; 1017 trunc: 1018 ND_PRINT((ndo, "%s", tstr)); 1019 } 1020