Matt Layher 107a8f0425
internal/radvd: switch to github.com/mdlayher/ndp types (#43)
Signed-off-by: Matt Layher <mdlayher@gmail.com>
2020-05-09 22:50:44 +02:00

272 lines
5.9 KiB
Go
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

// Copyright 2018 Google Inc.
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.
// Package radvd implements IPv6 router advertisments.
package radvd
import (
"encoding/binary"
"log"
"net"
"sync"
"time"
"github.com/google/gopacket/layers"
"github.com/mdlayher/ndp"
"golang.org/x/net/ipv6"
)
type Server struct {
pc *ipv6.PacketConn
ifname string
mu sync.Mutex
prefixes []net.IPNet
iface *net.Interface
}
func NewServer() (*Server, error) {
return &Server{}, nil
}
func (s *Server) SetPrefixes(prefixes []net.IPNet) {
s.mu.Lock()
if s.ifname != "" {
var err error
// Gather details about the interface again, the MAC address might have been
// changed.
s.iface, err = net.InterfaceByName(s.ifname)
if err != nil {
log.Fatal(err) // interface vanished
}
}
s.prefixes = prefixes
s.mu.Unlock()
if s.iface != nil {
s.sendAdvertisement(nil)
}
}
func (s *Server) Serve(ifname string, conn net.PacketConn) error {
var err error
s.ifname = ifname
s.iface, err = net.InterfaceByName(ifname)
if err != nil {
return err
}
defer conn.Close()
s.pc = ipv6.NewPacketConn(conn)
s.pc.SetHopLimit(255) // as per RFC 4861, section 4.1
s.pc.SetMulticastHopLimit(255) // as per RFC 4861, section 4.1
var filter ipv6.ICMPFilter
filter.SetAll(true)
filter.Accept(ipv6.ICMPTypeRouterSolicitation)
if err := s.pc.SetICMPFilter(&filter); err != nil {
return err
}
go func() {
for {
s.sendAdvertisement(nil) // TODO: handle error
time.Sleep(1 * time.Minute)
}
}()
// A 512 bytes buffer is sufficient for router solicitation packets, which
// are basically empty.
buf := make([]byte, 512)
for {
n, _, addr, err := s.pc.ReadFrom(buf)
if err != nil {
return err
}
// TODO: isnt this guaranteed by the filter above?
if n == 0 ||
ipv6.ICMPType(buf[0]) != ipv6.ICMPTypeRouterSolicitation {
continue
}
if err := s.sendAdvertisement(addr); err != nil {
return err
}
}
return nil
}
func (s *Server) ListenAndServe(ifname string) error {
// TODO(correctness): would it be better to listen on
// net.IPv6linklocalallrouters? Just specifying that results in an error,
// though.
conn, err := net.ListenIP("ip6:ipv6-icmp", &net.IPAddr{net.IPv6unspecified, ""})
if err != nil {
return err
}
return s.Serve(ifname, conn)
}
type sourceLinkLayerAddress struct {
address net.HardwareAddr
}
func (o sourceLinkLayerAddress) Marshal() layers.ICMPv6Option {
return layers.ICMPv6Option{
Type: layers.ICMPv6OptSourceAddress,
Data: o.address,
}
}
type mtu struct {
mtu uint32
}
func (o mtu) Marshal() layers.ICMPv6Option {
buf := make([]byte, 6)
// First 2 bytes are reserved
binary.BigEndian.PutUint32(buf[2:], o.mtu)
return layers.ICMPv6Option{
Type: layers.ICMPv6OptMTU,
Data: buf,
}
}
type prefixInfo struct {
prefixLength byte
flags byte // TODO: enum for values
validLifetime uint32 // seconds
preferredLifetime uint32 // seconds
prefix [16]byte
}
func (o prefixInfo) Marshal() layers.ICMPv6Option {
buf := make([]byte, 30)
buf[0] = o.prefixLength
buf[1] = o.flags
binary.BigEndian.PutUint32(buf[2:], o.validLifetime)
binary.BigEndian.PutUint32(buf[6:], o.preferredLifetime)
// 4 bytes reserved
copy(buf[14:], o.prefix[:])
return layers.ICMPv6Option{
Type: layers.ICMPv6OptPrefixInfo,
Data: buf,
}
}
type rdnss struct {
lifetime uint32 // seconds
server []byte
}
func (o rdnss) Marshal() layers.ICMPv6Option {
buf := make([]byte, 22)
// 2 bytes reserved
binary.BigEndian.PutUint32(buf[2:], o.lifetime)
copy(buf[6:], o.server[:])
return layers.ICMPv6Option{
Type: 25, // TODO: Recursive DNS Server
Data: buf,
}
}
var ipv6LinkLocal = func(cidr string) *net.IPNet {
_, net, err := net.ParseCIDR(cidr)
if err != nil {
panic(err)
}
return net
}("fe80::/10")
func (s *Server) sendAdvertisement(addr net.Addr) error {
s.mu.Lock()
defer s.mu.Unlock()
if s.prefixes == nil {
return nil // nothing to do
}
if addr == nil {
addr = &net.IPAddr{
IP: net.IPv6linklocalallnodes,
Zone: s.iface.Name,
}
}
var options []ndp.Option
if len(s.prefixes) > 0 {
addrs, err := s.iface.Addrs()
if err != nil {
return err
}
var linkLocal net.IP
for _, addr := range addrs {
ipnet, ok := addr.(*net.IPNet)
if !ok {
continue
}
if ipv6LinkLocal.Contains(ipnet.IP) {
linkLocal = ipnet.IP
break
}
}
if !linkLocal.Equal(net.IPv6zero) {
options = append(options, &ndp.RecursiveDNSServer{
Lifetime: 30 * time.Minute,
Servers: []net.IP{linkLocal},
})
}
}
for _, prefix := range s.prefixes {
ones, _ := prefix.Mask.Size()
// Use the first /64 subnet within larger prefixes
if ones < 64 {
ones = 64
}
options = append(options, &ndp.PrefixInformation{
PrefixLength: uint8(ones),
OnLink: true,
AutonomousAddressConfiguration: true,
ValidLifetime: 2 * time.Hour,
PreferredLifetime: 30 * time.Minute,
Prefix: prefix.IP,
})
}
options = append(options,
ndp.NewMTU(uint32(s.iface.MTU)),
&ndp.LinkLayerAddress{
Direction: ndp.Source,
Addr: s.iface.HardwareAddr,
},
)
ra := &ndp.RouterAdvertisement{
CurrentHopLimit: 64,
RouterLifetime: 30 * time.Minute,
Options: options,
}
mb, err := ndp.MarshalMessage(ra)
if err != nil {
return err
}
log.Printf("sending to %s", addr)
if _, err := s.pc.WriteTo(mb, nil, addr); err != nil {
return err
}
return nil
}