xref: /netbsd-src/sbin/routed/input.c (revision ae1bfcddc410612bc8c58b807e1830becb69a24c)
1 /*
2  * Copyright (c) 1983, 1988, 1993
3  *	The Regents of the University of California.  All rights reserved.
4  *
5  * Redistribution and use in source and binary forms, with or without
6  * modification, are permitted provided that the following conditions
7  * are met:
8  * 1. Redistributions of source code must retain the above copyright
9  *    notice, this list of conditions and the following disclaimer.
10  * 2. Redistributions in binary form must reproduce the above copyright
11  *    notice, this list of conditions and the following disclaimer in the
12  *    documentation and/or other materials provided with the distribution.
13  * 3. All advertising materials mentioning features or use of this software
14  *    must display the following acknowledgement:
15  *	This product includes software developed by the University of
16  *	California, Berkeley and its contributors.
17  * 4. Neither the name of the University nor the names of its contributors
18  *    may be used to endorse or promote products derived from this software
19  *    without specific prior written permission.
20  *
21  * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
22  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
23  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
24  * ARE DISCLAIMED.  IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
25  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
26  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
27  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
28  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
29  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
30  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
31  * SUCH DAMAGE.
32  */
33 
34 #ifndef lint
35 /*static char sccsid[] = "from: @(#)input.c	8.1 (Berkeley) 6/5/93";*/
36 static char *rcsid = "$Id: input.c,v 1.5 1994/05/13 08:04:39 mycroft Exp $";
37 #endif /* not lint */
38 
39 /*
40  * Routing Table Management Daemon
41  */
42 #include "defs.h"
43 #include <sys/syslog.h>
44 
45 /*
46  * Process a newly received packet.
47  */
48 rip_input(from, rip, size)
49 	struct sockaddr *from;
50 	register struct rip *rip;
51 	int size;
52 {
53 	register struct rt_entry *rt;
54 	register struct netinfo *n;
55 	register struct interface *ifp;
56 	struct interface *if_ifwithdstaddr();
57 	int count, changes = 0;
58 	register struct afswitch *afp;
59 	static struct sockaddr badfrom, badfrom2;
60 
61 	ifp = 0;
62 	TRACE_INPUT(ifp, from, (char *)rip, size);
63 	if (from->sa_family >= af_max ||
64 	    (afp = &afswitch[from->sa_family])->af_hash == (int (*)())0) {
65 		syslog(LOG_INFO,
66 	 "\"from\" address in unsupported address family (%d), cmd %d\n",
67 		    from->sa_family, rip->rip_cmd);
68 		return;
69 	}
70 	if (rip->rip_vers == 0) {
71 		syslog(LOG_ERR,
72 		    "RIP version 0 packet received from %s! (cmd %d)",
73 		    (*afswitch[from->sa_family].af_format)(from), rip->rip_cmd);
74 		return;
75 	}
76 	switch (rip->rip_cmd) {
77 
78 	case RIPCMD_REQUEST:
79 		n = rip->rip_nets;
80 		count = size - ((char *)n - (char *)rip);
81 		if (count < sizeof (struct netinfo))
82 			return;
83 		for (; count > 0; n++) {
84 			if (count < sizeof (struct netinfo))
85 				break;
86 			count -= sizeof (struct netinfo);
87 
88 #if BSD < 198810
89 			if (sizeof(n->rip_dst.sa_family) > 1)	/* XXX */
90 			    n->rip_dst.sa_family = ntohs(n->rip_dst.sa_family);
91 #else
92 #define osa(x) ((struct osockaddr *)(&(x)))
93 			    n->rip_dst.sa_family =
94 					ntohs(osa(n->rip_dst)->sa_family);
95 			    n->rip_dst.sa_len = sizeof(n->rip_dst);
96 #endif
97 			n->rip_metric = ntohl(n->rip_metric);
98 			/*
99 			 * A single entry with sa_family == AF_UNSPEC and
100 			 * metric ``infinity'' means ``all routes''.
101 			 * We respond to routers only if we are acting
102 			 * as a supplier, or to anyone other than a router
103 			 * (eg, query).
104 			 */
105 			if (n->rip_dst.sa_family == AF_UNSPEC &&
106 			    n->rip_metric == HOPCNT_INFINITY && count == 0) {
107 			    	if (supplier || (*afp->af_portmatch)(from) == 0)
108 					supply(from, 0, 0, 0);
109 				return;
110 			}
111 			if (n->rip_dst.sa_family < af_max &&
112 			    afswitch[n->rip_dst.sa_family].af_hash)
113 				rt = rtlookup(&n->rip_dst);
114 			else
115 				rt = 0;
116 #define min(a, b) (a < b ? a : b)
117 			n->rip_metric = rt == 0 ? HOPCNT_INFINITY :
118 				min(rt->rt_metric + 1, HOPCNT_INFINITY);
119 #if BSD < 198810
120 			if (sizeof(n->rip_dst.sa_family) > 1)	/* XXX */
121 			    n->rip_dst.sa_family = htons(n->rip_dst.sa_family);
122 #else
123 			    osa(n->rip_dst)->sa_family =
124 						htons(n->rip_dst.sa_family);
125 #endif
126 			n->rip_metric = htonl(n->rip_metric);
127 		}
128 		rip->rip_cmd = RIPCMD_RESPONSE;
129 		bcopy((char *)rip, packet, size);
130 		(*afp->af_output)(s, 0, from, size);
131 		return;
132 
133 	case RIPCMD_TRACEON:
134 	case RIPCMD_TRACEOFF:
135 		/* verify message came from a privileged port */
136 		if ((*afp->af_portcheck)(from) == 0)
137 			return;
138 		if ((ifp = if_iflookup(from)) == 0 || (ifp->int_flags &
139 		    (IFF_BROADCAST | IFF_POINTOPOINT | IFF_REMOTE)) == 0 ||
140 		    ifp->int_flags & IFF_PASSIVE) {
141 			syslog(LOG_ERR, "trace command from unknown router, %s",
142 			    (*afswitch[from->sa_family].af_format)(from));
143 			return;
144 		}
145 		((char *)rip)[size] = '\0';
146 		if (rip->rip_cmd == RIPCMD_TRACEON)
147 			traceon(rip->rip_tracefile);
148 		else
149 			traceoff();
150 		return;
151 
152 	case RIPCMD_RESPONSE:
153 		/* verify message came from a router */
154 		if ((*afp->af_portmatch)(from) == 0)
155 			return;
156 		(*afp->af_canon)(from);
157 		/* are we talking to ourselves? */
158 		ifp = if_ifwithaddr(from);
159 		if (ifp) {
160 			if (ifp->int_flags & IFF_PASSIVE) {
161 				syslog(LOG_ERR,
162 				  "bogus input (from passive interface, %s)",
163 				  (*afswitch[from->sa_family].af_format)(from));
164 				return;
165 			}
166 			rt = rtfind(from);
167 			if (rt == 0 || ((rt->rt_state & RTS_INTERFACE) == 0) &&
168 			    rt->rt_metric >= ifp->int_metric)
169 				addrouteforif(ifp);
170 			else
171 				rt->rt_timer = 0;
172 			return;
173 		}
174 		/*
175 		 * Update timer for interface on which the packet arrived.
176 		 * If from other end of a point-to-point link that isn't
177 		 * in the routing tables, (re-)add the route.
178 		 */
179 		if ((rt = rtfind(from)) &&
180 		    (rt->rt_state & (RTS_INTERFACE | RTS_REMOTE)))
181 			rt->rt_timer = 0;
182 		else if ((ifp = if_ifwithdstaddr(from)) &&
183 		    (rt == 0 || rt->rt_metric >= ifp->int_metric))
184 			addrouteforif(ifp);
185 		/*
186 		 * "Authenticate" router from which message originated.
187 		 * We accept routing packets from routers directly connected
188 		 * via broadcast or point-to-point networks,
189 		 * and from those listed in /etc/gateways.
190 		 */
191 		if ((ifp = if_iflookup(from)) == 0 || (ifp->int_flags &
192 		    (IFF_BROADCAST | IFF_POINTOPOINT | IFF_REMOTE)) == 0 ||
193 		    ifp->int_flags & IFF_PASSIVE) {
194 			if (bcmp((char *)from, (char *)&badfrom,
195 			    sizeof(badfrom)) != 0) {
196 				syslog(LOG_ERR,
197 				  "packet from unknown router, %s",
198 				  (*afswitch[from->sa_family].af_format)(from));
199 				badfrom = *from;
200 			}
201 			return;
202 		}
203 		size -= 4 * sizeof (char);
204 		n = rip->rip_nets;
205 		for (; size > 0; size -= sizeof (struct netinfo), n++) {
206 			if (size < sizeof (struct netinfo))
207 				break;
208 #if BSD < 198810
209 			if (sizeof(n->rip_dst.sa_family) > 1)	/* XXX */
210 				n->rip_dst.sa_family =
211 					ntohs(n->rip_dst.sa_family);
212 #else
213 			    n->rip_dst.sa_family =
214 					ntohs(osa(n->rip_dst)->sa_family);
215 			    n->rip_dst.sa_len = sizeof(n->rip_dst);
216 #endif
217 			n->rip_metric = ntohl(n->rip_metric);
218 			if (n->rip_dst.sa_family >= af_max ||
219 			    (afp = &afswitch[n->rip_dst.sa_family])->af_hash ==
220 			    (int (*)())0) {
221 				syslog(LOG_INFO,
222 		"route in unsupported address family (%d), from %s (af %d)\n",
223 				   n->rip_dst.sa_family,
224 				   (*afswitch[from->sa_family].af_format)(from),
225 				   from->sa_family);
226 				continue;
227 			}
228 			if (((*afp->af_checkhost)(&n->rip_dst)) == 0) {
229 				syslog(LOG_DEBUG,
230 				    "bad host in route from %s (af %d)\n",
231 				   (*afswitch[from->sa_family].af_format)(from),
232 				   from->sa_family);
233 				continue;
234 			}
235 			if (n->rip_metric == 0 ||
236 			    (unsigned) n->rip_metric > HOPCNT_INFINITY) {
237 				if (bcmp((char *)from, (char *)&badfrom2,
238 				    sizeof(badfrom2)) != 0) {
239 					syslog(LOG_ERR,
240 					    "bad metric (%d) from %s\n",
241 					    n->rip_metric,
242 				  (*afswitch[from->sa_family].af_format)(from));
243 					badfrom2 = *from;
244 				}
245 				continue;
246 			}
247 			/*
248 			 * Adjust metric according to incoming interface.
249 			 */
250 			if ((unsigned) n->rip_metric < HOPCNT_INFINITY)
251 				n->rip_metric += ifp->int_metric;
252 			if ((unsigned) n->rip_metric > HOPCNT_INFINITY)
253 				n->rip_metric = HOPCNT_INFINITY;
254 			rt = rtlookup(&n->rip_dst);
255 			if (rt == 0 ||
256 			    (rt->rt_state & (RTS_INTERNAL|RTS_INTERFACE)) ==
257 			    (RTS_INTERNAL|RTS_INTERFACE)) {
258 				/*
259 				 * If we're hearing a logical network route
260 				 * back from a peer to which we sent it,
261 				 * ignore it.
262 				 */
263 				if (rt && rt->rt_state & RTS_SUBNET &&
264 				    (*afp->af_sendroute)(rt, from))
265 					continue;
266 				if ((unsigned)n->rip_metric < HOPCNT_INFINITY) {
267 				    /*
268 				     * Look for an equivalent route that
269 				     * includes this one before adding
270 				     * this route.
271 				     */
272 				    rt = rtfind(&n->rip_dst);
273 				    if (rt && equal(from, &rt->rt_router))
274 					    continue;
275 				    rtadd(&n->rip_dst, from, n->rip_metric, 0);
276 				    changes++;
277 				}
278 				continue;
279 			}
280 
281 			/*
282 			 * Update if from gateway and different,
283 			 * shorter, or equivalent but old route
284 			 * is getting stale.
285 			 */
286 			if (equal(from, &rt->rt_router)) {
287 				if (n->rip_metric != rt->rt_metric) {
288 					rtchange(rt, from, n->rip_metric);
289 					changes++;
290 					rt->rt_timer = 0;
291 					if (rt->rt_metric >= HOPCNT_INFINITY)
292 						rt->rt_timer =
293 						    GARBAGE_TIME - EXPIRE_TIME;
294 				} else if (rt->rt_metric < HOPCNT_INFINITY)
295 					rt->rt_timer = 0;
296 			} else if ((unsigned) n->rip_metric < rt->rt_metric ||
297 			    (rt->rt_metric == n->rip_metric &&
298 			    rt->rt_timer > (EXPIRE_TIME/2) &&
299 			    (unsigned) n->rip_metric < HOPCNT_INFINITY)) {
300 				rtchange(rt, from, n->rip_metric);
301 				changes++;
302 				rt->rt_timer = 0;
303 			}
304 		}
305 		break;
306 	}
307 
308 	/*
309 	 * If changes have occurred, and if we have not sent a broadcast
310 	 * recently, send a dynamic update.  This update is sent only
311 	 * on interfaces other than the one on which we received notice
312 	 * of the change.  If we are within MIN_WAITTIME of a full update,
313 	 * don't bother sending; if we just sent a dynamic update
314 	 * and set a timer (nextbcast), delay until that time.
315 	 * If we just sent a full update, delay the dynamic update.
316 	 * Set a timer for a randomized value to suppress additional
317 	 * dynamic updates until it expires; if we delayed sending
318 	 * the current changes, set needupdate.
319 	 */
320 	if (changes && supplier &&
321 	   now.tv_sec - lastfullupdate.tv_sec < SUPPLY_INTERVAL-MAX_WAITTIME) {
322 		u_long delay;
323 		extern long random();
324 
325 		if (now.tv_sec - lastbcast.tv_sec >= MIN_WAITTIME &&
326 		    timercmp(&nextbcast, &now, <)) {
327 			if (traceactions)
328 				fprintf(ftrace, "send dynamic update\n");
329 			toall(supply, RTS_CHANGED, ifp);
330 			lastbcast = now;
331 			needupdate = 0;
332 			nextbcast.tv_sec = 0;
333 		} else {
334 			needupdate++;
335 			if (traceactions)
336 				fprintf(ftrace, "delay dynamic update\n");
337 		}
338 #define RANDOMDELAY()	(MIN_WAITTIME * 1000000 + \
339 		(u_long)random() % ((MAX_WAITTIME - MIN_WAITTIME) * 1000000))
340 
341 		if (nextbcast.tv_sec == 0) {
342 			delay = RANDOMDELAY();
343 			if (traceactions)
344 				fprintf(ftrace,
345 				    "inhibit dynamic update for %d usec\n",
346 				    delay);
347 			nextbcast.tv_sec = delay / 1000000;
348 			nextbcast.tv_usec = delay % 1000000;
349 			timevaladd(&nextbcast, &now);
350 			/*
351 			 * If the next possibly dynamic update
352 			 * is within MIN_WAITTIME of the next full update,
353 			 * force the delay past the full update,
354 			 * or we might send a dynamic update just before
355 			 * the full update.
356 			 */
357 			if (nextbcast.tv_sec > lastfullupdate.tv_sec +
358 			    SUPPLY_INTERVAL - MIN_WAITTIME)
359 				nextbcast.tv_sec = lastfullupdate.tv_sec +
360 				    SUPPLY_INTERVAL + 1;
361 		}
362 	}
363 }
364