Skip to content
Projects
Groups
Snippets
Help
Loading...
Help
Support
Keyboard shortcuts
?
Submit feedback
Sign in / Register
Toggle navigation
D
Dnsmasq
Project overview
Project overview
Details
Activity
Releases
Repository
Repository
Files
Commits
Branches
Tags
Contributors
Graph
Compare
Locked Files
Issues
0
Issues
0
List
Boards
Labels
Service Desk
Milestones
Merge Requests
0
Merge Requests
0
CI / CD
CI / CD
Pipelines
Jobs
Schedules
Security & Compliance
Security & Compliance
Dependency List
License Compliance
Packages
Packages
List
Container Registry
Analytics
Analytics
CI / CD
Code Review
Insights
Issues
Repository
Value Stream
Wiki
Wiki
Snippets
Snippets
Members
Members
Collapse sidebar
Close sidebar
Activity
Graph
Create a new issue
Jobs
Commits
Issue Boards
Open sidebar
nanahira
Dnsmasq
Commits
fd9fa481
Commit
fd9fa481
authored
Oct 21, 2004
by
Simon Kelley
Browse files
Options
Browse Files
Download
Email Patches
Plain Diff
import of dnsmasq-2.16.tar.gz
parent
36717eee
Changes
21
Expand all
Show whitespace changes
Inline
Side-by-side
Showing
21 changed files
with
1174 additions
and
616 deletions
+1174
-616
CHANGELOG
CHANGELOG
+39
-0
FAQ
FAQ
+16
-0
contrib/dynamic-dnsmasq/dynamic-dnsmasq.pl
contrib/dynamic-dnsmasq/dynamic-dnsmasq.pl
+249
-0
dnsmasq-rh.spec
dnsmasq-rh.spec
+1
-1
dnsmasq-suse.spec
dnsmasq-suse.spec
+1
-1
dnsmasq.8
dnsmasq.8
+8
-2
dnsmasq.conf.example
dnsmasq.conf.example
+14
-1
rpm/dnsmasq-SuSE.patch
rpm/dnsmasq-SuSE.patch
+2
-2
src/cache.c
src/cache.c
+119
-70
src/config.h
src/config.h
+12
-13
src/dhcp.c
src/dhcp.c
+16
-10
src/dnsmasq.c
src/dnsmasq.c
+40
-38
src/dnsmasq.h
src/dnsmasq.h
+32
-14
src/forward.c
src/forward.c
+74
-66
src/isc.c
src/isc.c
+14
-12
src/lease.c
src/lease.c
+3
-3
src/network.c
src/network.c
+11
-2
src/option.c
src/option.c
+179
-103
src/rfc1035.c
src/rfc1035.c
+285
-240
src/rfc2131.c
src/rfc2131.c
+42
-38
src/util.c
src/util.c
+17
-0
No files found.
CHANGELOG
View file @
fd9fa481
...
@@ -1213,4 +1213,43 @@ version 2.15
...
@@ -1213,4 +1213,43 @@ version 2.15
Improve error messages when there are problems with
Improve error messages when there are problems with
configuration.
configuration.
version 2.16
Fixed typo in OpenBSD-only code which stopped compilation
under that OS. Chris Weinhaupl gets credit for reporting
this.
Added dhcp-authoritative option which restores non-RFC
compliant but desirable behaviour of pre-2.14 versions and
avoids long timeouts while DHCP clients try to renew leases
which are unknown to dnsmasq. Thanks to John Mastwijk for
help with this.
Added support to the DHCP option code to allow RFC-3397
domain search DHCP option (119) to be sent.
Set NONBLOCK on all listening sockets to workaround non-POSIX
compliance in Linux 2.4 and 2.6. This fixes rare hangs which
occured when corrupted packets were received. Thanks to
Joris van Rantwijk for chasing that down.
Updated config.h for NetBSD. Thanks to Martin Lambers.
Do a better job of distinguishing between retransmissions
and new queries when forwarding. This fixes a bug
triggered by the polipo web cache which sends A and AAAA
queries both with the same transaction-ID. Thanks to
Joachim Berdal Haga and Juliusz Chroboczek for help with this.
Rewrote cache code to store CNAMES, rather then chasing
them before storage. This eliminates bad situations when
clients get inconsistent views depending on if data comes
from the cache.
Allow for more than one --addn-hosts flag.
Clarify logged message when a DHCP lease clashes with an
/etc/hosts entry. Thanks to Mat Swift for the suggestion.
Added dynamic-dnsmasq from Peter Willis to the contrib
section.
FAQ
View file @
fd9fa481
...
@@ -284,6 +284,22 @@ A: Yes, new releases of dnsmasq are always announced through
...
@@ -284,6 +284,22 @@ A: Yes, new releases of dnsmasq are always announced through
freshmeat.net, and they allow you to subcribe to email alerts when
freshmeat.net, and they allow you to subcribe to email alerts when
new versions of particular projects are released.
new versions of particular projects are released.
Q: What does the dhcp-authoritative option do?
A: See http://www.isc.org/index.pl?/sw/dhcp/authoritative.php - that's
for the ISC daemon, but the same applies to dnsmasq.
Q: Why does my Gentoo box pause for a minute before getting a new
lease?
A: Because when a Gentoo box shuts down, it releases its lease with
the server but remembers it on the client; this seems to be a
Gentoo-specific patch to dhcpcd. On restart it tries to renew
a lease which is long gone, as far as dnsmasq is concerned, and
dnsmasq ignores it until is times out and restarts the process.
To fix this, set the dhcp-authoritative flag in dnsmasq.
contrib/dynamic-dnsmasq/dynamic-dnsmasq.pl
0 → 100755
View file @
fd9fa481
#!/usr/bin/perl
# dynamic-dnsmasq.pl - update dnsmasq's internal dns entries dynamically
# Copyright (C) 2004 Peter Willis
#
# This program is free software; you can redistribute it and/or modify
# it under the terms of the GNU General Public License as published by
# the Free Software Foundation; either version 2 of the License, or
# (at your option) any later version.
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program; if not, write to the Free Software
# Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
#
# the purpose of this script is to be able to update dnsmasq's dns
# records from a remote dynamic dns client.
#
# basic use of this script:
# dynamic-dnsmasq.pl add testaccount 1234 testaccount.mydomain.com
# dynamic-dnsmasq.pl listen &
#
# this script tries to emulate DynDNS.org's dynamic dns service, so
# technically you should be able to use any DynDNS.org client to
# update the records here. tested and confirmed to work with ddnsu
# 1.3.1. just point the client's host to the IP of this machine,
# port 9020, and include the hostname, user and pass, and it should
# work.
#
# make sure "addn-hosts=/etc/dyndns-hosts" is in your /etc/dnsmasq.conf
# file and "nopoll" is commented out.
use
strict
;
use
IO::
Socket
;
use
MIME::
Base64
;
use
DB_File
;
use
Fcntl
;
my
$accountdb
=
"
accounts.db
";
my
$recordfile
=
"
/etc/dyndns-hosts
";
my
$dnsmasqpidfile
=
"
/var/run/dnsmasq.pid
";
# if this doesn't exist, will look for process in /proc
my
$listenaddress
=
"
0.0.0.0
";
my
$listenport
=
9020
;
# no editing past this point should be necessary
if
(
@ARGV
<
1
)
{
die
"
Usage: $0 ADD|DEL|LISTUSERS|WRITEHOSTSFILE|LISTEN
\n
";
}
elsif
(
lc
$ARGV
[
0
]
eq
"
add
"
)
{
die
"
Usage: $0 ADD USER PASS HOSTNAME
\n
"
unless
@ARGV
==
4
;
add_acct
(
$ARGV
[
1
],
$ARGV
[
2
],
$ARGV
[
3
]);
}
elsif
(
lc
$ARGV
[
0
]
eq
"
del
"
)
{
die
"
Usage: $0 DEL USER
\n
"
unless
@ARGV
==
2
;
print
"
Are you sure you want to delete user
\"
$ARGV
[1]
\"
? [N/y]
";
my
$resp
=
<
STDIN
>
;
chomp
$resp
;
if
(
lc
substr
(
$resp
,
0
,
1
)
eq
"
y
"
)
{
del_acct
(
$ARGV
[
1
]);
}
}
elsif
(
lc
$ARGV
[
0
]
eq
"
listusers
"
or
lc
$ARGV
[
0
]
eq
"
writehostsfile
"
)
{
my
$X
=
tie
my
%
h
,
"
DB_File
",
$accountdb
,
O_RDWR
|
O_CREAT
,
0600
,
$DB_HASH
;
my
$fh
;
if
(
lc
$ARGV
[
0
]
eq
"
writehostsfile
"
)
{
open
(
$fh
,
"
>
$recordfile
")
||
die
"
Couldn't open recordfile
\"
$recordfile
\"
: $!
\n
";
flock
(
$fh
,
2
);
seek
(
$fh
,
0
,
0
);
truncate
(
$fh
,
0
);
}
while
(
my
(
$key
,
$val
)
=
each
%
h
)
{
my
(
$pass
,
$domain
,
$ip
)
=
split
("
\t
",
$val
);
if
(
lc
$ARGV
[
0
]
eq
"
listusers
"
)
{
print
"
user
$key
, hostname
$domain
, ip
$ip
\n
";
}
else
{
if
(
defined
$ip
)
{
print
$fh
"
$ip
\t
$domain
\n
";
}
}
}
if
(
lc
$ARGV
[
0
]
eq
"
writehostsfile
"
)
{
flock
(
$fh
,
8
);
close
(
$fh
);
dnsmasq_rescan_configs
();
}
undef
$X
;
untie
%
h
;
}
elsif
(
lc
$ARGV
[
0
]
eq
"
listen
"
)
{
listen_for_updates
();
}
sub
listen_for_updates
{
my
$sock
=
IO::Socket::
INET
->
new
(
Listen
=>
5
,
LocalAddr
=>
$listenaddress
,
LocalPort
=>
$listenport
,
Proto
=>
'
tcp
',
ReuseAddr
=>
1
,
MultiHomed
=>
1
)
||
die
"
Could not open listening socket: $!
\n
";
$SIG
{'
CHLD
'}
=
'
IGNORE
';
while
(
my
$client
=
$sock
->
accept
()
)
{
my
$p
=
fork
();
if
(
$p
!=
0
)
{
next
;
}
$SIG
{'
CHLD
'}
=
'
DEFAULT
';
my
@headers
;
my
%
cgi
;
while
(
<
$client
>
)
{
s/(\r|\n)//g
;
last
if
$_
eq
"";
push
@headers
,
$_
;
}
foreach
my
$header
(
@headers
)
{
if
(
$header
=~
/^GET \/nic\/update\?([^\s].+) HTTP\/1\.[01]$/
)
{
foreach
my
$element
(
split
('
&
',
$1
))
{
$cgi
{(
split
'
=
',
$element
)[
0
]}
=
(
split
'
=
',
$element
)[
1
];
}
}
elsif
(
$header
=~
/^Authorization: basic (.+)$/
)
{
unless
(
defined
$cgi
{'
hostname
'}
)
{
print_http_response
(
$client
,
undef
,
"
badsys
");
exit
(
1
);
}
if
(
!
exists
$cgi
{'
myip
'}
)
{
$cgi
{'
myip
'}
=
$client
->
peerhost
();
}
my
(
$user
,
$pass
)
=
split
"
:
",
MIME::Base64::
decode
(
$1
);
if
(
authorize
(
$user
,
$pass
,
$cgi
{'
hostname
'},
$cgi
{'
myip
'})
==
0
)
{
print_http_response
(
$client
,
$cgi
{'
myip
'},
"
good
");
update_dns
(
\%
cgi
);
}
else
{
print_http_response
(
$client
,
undef
,
"
badauth
");
exit
(
1
);
}
last
;
}
}
exit
(
0
);
}
return
(
0
);
}
sub
add_acct
{
my
(
$user
,
$pass
,
$hostname
)
=
@_
;
my
$X
=
tie
my
%
h
,
"
DB_File
",
$accountdb
,
O_RDWR
|
O_CREAT
,
0600
,
$DB_HASH
;
$X
->
put
(
$user
,
join
("
\t
",
(
$pass
,
$hostname
)));
undef
$X
;
untie
%
h
;
}
sub
del_acct
{
my
(
$user
,
$pass
,
$hostname
)
=
@_
;
my
$X
=
tie
my
%
h
,
"
DB_File
",
$accountdb
,
O_RDWR
|
O_CREAT
,
0600
,
$DB_HASH
;
$X
->
del
(
$user
);
undef
$X
;
untie
%
h
;
}
sub
authorize
{
my
$user
=
shift
;
my
$pass
=
shift
;
my
$hostname
=
shift
;
my
$ip
=
shift
;;
my
$X
=
tie
my
%
h
,
"
DB_File
",
$accountdb
,
O_RDWR
|
O_CREAT
,
0600
,
$DB_HASH
;
my
(
$spass
,
$shost
)
=
split
("
\t
",
$h
{
$user
});
if
(
defined
$h
{
$user
}
and
(
$spass
eq
$pass
)
and
(
$shost
eq
$hostname
)
)
{
$X
->
put
(
$user
,
join
("
\t
",
$spass
,
$shost
,
$ip
));
undef
$X
;
untie
%
h
;
return
(
0
);
}
undef
$X
;
untie
%
h
;
return
(
1
);
}
sub
print_http_response
{
my
$sock
=
shift
;
my
$ip
=
shift
;
my
$response
=
shift
;
print
$sock
"
HTTP/1.0 200 OK
\n
";
my
@tmp
=
split
/\s+/
,
scalar
gmtime
();
print
$sock
"
Date:
$tmp
[0],
$tmp
[2]
$tmp
[1]
$tmp
[4]
$tmp
[3] GMT
\n
";
print
$sock
"
Server: Peter's Fake DynDNS.org Server/1.0
\n
";
print
$sock
"
Content-Type: text/plain; charset=ISO-8859-1
\n
";
print
$sock
"
Connection: close
\n
";
print
$sock
"
Transfer-Encoding: chunked
\n
";
print
$sock
"
\n
";
#print $sock "12\n"; # this was part of the dyndns response but i'm not sure what it is
print
$sock
"
$response
",
defined
(
$ip
)?
"
$ip
"
:
""
.
"
\n
";
}
sub
update_dns
{
my
$hashref
=
shift
;
my
@records
;
my
$found
=
0
;
# update the addn-hosts file
open
(
FILE
,
"
+<
$recordfile
")
||
die
"
Couldn't open recordfile
\"
$recordfile
\"
: $!
\n
";
flock
(
FILE
,
2
);
while
(
<
FILE
>
)
{
if
(
/^(\d+\.\d+\.\d+\.\d+)\s+$$hashref{'hostname'}\n$/si
)
{
if
(
$1
ne
$$hashref
{'
myip
'}
)
{
push
@records
,
"
$
$hashref
{'myip'}
\t
$
$hashref
{'hostname'}
\n
";
$found
=
1
;
}
}
else
{
push
@records
,
$_
;
}
}
unless
(
$found
)
{
push
@records
,
"
$
$hashref
{'myip'}
\t
$
$hashref
{'hostname'}
\n
";
}
sysseek
(
FILE
,
0
,
0
);
truncate
(
FILE
,
0
);
syswrite
(
FILE
,
join
("",
@records
));
flock
(
FILE
,
8
);
close
(
FILE
);
dnsmasq_rescan_configs
();
return
(
0
);
}
sub
dnsmasq_rescan_configs
{
# send the HUP signal to dnsmasq
if
(
-
r
$dnsmasqpidfile
)
{
open
(
PID
,"
<
$dnsmasqpidfile
")
||
die
"
Could not open PID file
\"
$dnsmasqpidfile
\"
: $!
\n
";
my
$pid
=
<
PID
>
;
close
(
PID
);
chomp
$pid
;
if
(
kill
(
0
,
$pid
)
)
{
kill
(
1
,
$pid
);
}
else
{
goto
LOOKFORDNSMASQ
;
}
}
else
{
LOOKFORDNSMASQ:
opendir
(
DIR
,"
/proc
")
||
die
"
Couldn't opendir /proc: $!
\n
";
my
@dirs
=
grep
(
/^\d+$/
,
readdir
(
DIR
));
closedir
(
DIR
);
foreach
my
$process
(
@dirs
)
{
if
(
open
(
FILE
,"
</proc/
$process
/cmdline
")
)
{
my
$cmdline
=
<
FILE
>
;
close
(
FILE
);
if
(
(
split
(
/\0/
,
$cmdline
))[
0
]
=~
/dnsmasq/
)
{
kill
(
1
,
$process
);
}
}
}
}
return
(
0
);
}
dnsmasq-rh.spec
View file @
fd9fa481
...
@@ -5,7 +5,7 @@
...
@@ -5,7 +5,7 @@
###############################################################################
###############################################################################
Name: dnsmasq
Name: dnsmasq
Version: 2.1
5
Version: 2.1
6
Release: 1
Release: 1
Copyright: GPL
Copyright: GPL
Group: System Environment/Daemons
Group: System Environment/Daemons
...
...
dnsmasq-suse.spec
View file @
fd9fa481
...
@@ -5,7 +5,7 @@
...
@@ -5,7 +5,7 @@
###############################################################################
###############################################################################
Name: dnsmasq
Name: dnsmasq
Version: 2.1
5
Version: 2.1
6
Release: 1
Release: 1
Copyright: GPL
Copyright: GPL
Group: Productivity/Networking/DNS/Servers
Group: Productivity/Networking/DNS/Servers
...
...
dnsmasq.8
View file @
fd9fa481
...
@@ -34,8 +34,8 @@ Don't read the hostnames in /etc/hosts.
...
@@ -34,8 +34,8 @@ Don't read the hostnames in /etc/hosts.
.TP
.TP
.B \-H, --addn-hosts=<file>
.B \-H, --addn-hosts=<file>
Additional hosts file. Read the specified file as well as /etc/hosts. If -h is given, read
Additional hosts file. Read the specified file as well as /etc/hosts. If -h is given, read
only the specified file.
At most one additional hosts file may b
e
only the specified file.
This option may be repeated for more than on
e
given
.
additional hosts file
.
.TP
.TP
.B \-T, --local-ttl=<time>
.B \-T, --local-ttl=<time>
When replying with information from /etc/hosts or the DHCP leases
When replying with information from /etc/hosts or the DHCP leases
...
@@ -423,6 +423,12 @@ default is 150. This limit is to prevent DoS attacks from hosts which
...
@@ -423,6 +423,12 @@ default is 150. This limit is to prevent DoS attacks from hosts which
create thousands of leases and use lots of memory in the dnsmasq
create thousands of leases and use lots of memory in the dnsmasq
process.
process.
.TP
.TP
.B \-K, --dhcp-authoritative
Should be set when dnsmasq is definatively the only DHCP server on a network.
It changes the behaviour from strict RFC compliance so that DHCP requests on
unknown leases from unknown hosts are not ignored. This allows new hosts
to get a lease without a tedious timeout under all circumstances.
.TP
.B \-l, --dhcp-leasefile=<path>
.B \-l, --dhcp-leasefile=<path>
Use the specified file to store DHCP lease information. If this option
Use the specified file to store DHCP lease information. If this option
is given but no dhcp-range option is given then dnsmasq version 1
is given but no dhcp-range option is given then dnsmasq version 1
...
...
dnsmasq.conf.example
View file @
fd9fa481
...
@@ -238,6 +238,9 @@ bogus-priv
...
@@ -238,6 +238,9 @@ bogus-priv
#dhcp-option=46,8 # netbios node type
#dhcp-option=46,8 # netbios node type
#dhcp-option=47 # empty netbios scope.
#dhcp-option=47 # empty netbios scope.
# Send RFC-3397 DNS domain search DHCP option. WARNING: Your DHCP client
# probably doesn't support this......
#dhcp-option=119,eng.apple.com,marketing.apple.com
# Set the boot filename and tftpd server name and address
# Set the boot filename and tftpd server name and address
# for BOOTP. You will only need this is you want to
# for BOOTP. You will only need this is you want to
...
@@ -252,6 +255,16 @@ bogus-priv
...
@@ -252,6 +255,16 @@ bogus-priv
# the line below.
# the line below.
#dhcp-leasefile=/var/lib/misc/dnsmasq.leases
#dhcp-leasefile=/var/lib/misc/dnsmasq.leases
# Set the DHCP server to authoritative mode. In this mode it will barge in
# and take over the lease for any client which broadcasts on the network,
# whether it has a record of the lease or not. This avoids long timeouts
# when a machine wakes up on a new network. DO NOT enable this if there's
# the slighest chance that you might end up accidentally configuring a DHCP
# server for your campus/company accidentally. The ISC server uses the same
# the same option, and this URL provides more information:
# http://www.isc.org/index.pl?/sw/dhcp/authoritative.php
#dhcp-authoritative
# Set the cachesize here.
# Set the cachesize here.
#cache-size=150
#cache-size=150
...
...
rpm/dnsmasq-SuSE.patch
View file @
fd9fa481
--- dnsmasq.8 2004-08-08 20:57:56.000000000 +0200
--- dnsmasq.8 2004-08-08 20:57:56.000000000 +0200
+++ dnsmasq.8 2004-08-12 00:40:01.000000000 +0200
+++ dnsmasq.8 2004-08-12 00:40:01.000000000 +0200
@@ -6
3,7 +63
,7 @@
@@ -6
9,7 +69
,7 @@
.TP
.TP
.B \-g, --group=<groupname>
.B \-g, --group=<groupname>
Specify the group which dnsmasq will run
Specify the group which dnsmasq will run
...
@@ -31,7 +31,7 @@
...
@@ -31,7 +31,7 @@
#define IP6INTERFACES "/proc/net/if_inet6"
#define IP6INTERFACES "/proc/net/if_inet6"
#define UPTIME "/proc/uptime"
#define UPTIME "/proc/uptime"
#define DHCP_SERVER_PORT 67
#define DHCP_SERVER_PORT 67
@@ -1
76,7 +176
,7 @@
@@ -1
87,7 +187
,7 @@
/* platform independent options. */
/* platform independent options. */
#undef HAVE_BROKEN_RTC
#undef HAVE_BROKEN_RTC
...
...
src/cache.c
View file @
fd9fa481
This diff is collapsed.
Click to expand it.
src/config.h
View file @
fd9fa481
...
@@ -12,7 +12,7 @@
...
@@ -12,7 +12,7 @@
/* Author's email: simon@thekelleys.org.uk */
/* Author's email: simon@thekelleys.org.uk */
#define VERSION "2.1
5
"
#define VERSION "2.1
6
"
#define FTABSIZ 150
/* max number of outstanding requests */
#define FTABSIZ 150
/* max number of outstanding requests */
#define MAX_PROCS 20
/* max no children for TCP requests */
#define MAX_PROCS 20
/* max no children for TCP requests */
...
@@ -156,7 +156,7 @@ HAVE_PSELECT
...
@@ -156,7 +156,7 @@ HAVE_PSELECT
If your C library implements pselect, define this.
If your C library implements pselect, define this.
HAVE_BPF
HAVE_BPF
If your OS implements Berkeley P
A
cket filter, define this.
If your OS implements Berkeley P
a
cket filter, define this.
NOTES:
NOTES:
For Linux you should define
For Linux you should define
...
@@ -176,10 +176,12 @@ NOTES:
...
@@ -176,10 +176,12 @@ NOTES:
you should NOT define
you should NOT define
HAVE_LINUX_IPV6_PROC
HAVE_LINUX_IPV6_PROC
and you MAY define
and you MAY define
HAVE_ARC4RANDOM - OpenBSD and FreeBSD
HAVE_ARC4RANDOM - OpenBSD and FreeBSD and NetBSD version 2.0 or later
HAVE_DEV_URANDOM - OpenBSD and FreeBSD
HAVE_DEV_URANDOM - OpenBSD and FreeBSD and NetBSD
HAVE_DEV_RANDOM - FreeBSD (OpenBSD with hardware random number generator)
HAVE_DEV_RANDOM - FreeBSD and NetBSD
HAVE_GETOPT_LONG - only if you link GNU getopt.
(OpenBSD with hardware random number generator)
HAVE_GETOPT_LONG - NetBSD
(FreeBSD and OpenBSD only if you link GNU getopt)
*/
*/
...
@@ -250,9 +252,6 @@ typedef unsigned long in_addr_t;
...
@@ -250,9 +252,6 @@ typedef unsigned long in_addr_t;
#endif
#endif
#endif
#endif
/* #elif defined(__OpenBSD__)
#error The sockets API in OpenBSD does not provide facilities required by dnsmasq
*/
#elif defined(__FreeBSD__) || defined(__OpenBSD__)
#elif defined(__FreeBSD__) || defined(__OpenBSD__)
#undef HAVE_LINUX_IPV6_PROC
#undef HAVE_LINUX_IPV6_PROC
#undef HAVE_GETOPT_LONG
#undef HAVE_GETOPT_LONG
...
@@ -275,16 +274,16 @@ typedef unsigned long in_addr_t;
...
@@ -275,16 +274,16 @@ typedef unsigned long in_addr_t;
#define BIND_8_COMPAT
#define BIND_8_COMPAT
/* Define before sys/socket.h is included so we get socklen_t */
/* Define before sys/socket.h is included so we get socklen_t */
#define _BSD_SOCKLEN_T_
#define _BSD_SOCKLEN_T_
/* Th
e three below are
not defined in Mac OS X arpa/nameserv.h */
/* Th
is is
not defined in Mac OS X arpa/nameserv.h */
#define IN6ADDRSZ 16
#define IN6ADDRSZ 16
#elif defined(__NetBSD__)
#elif defined(__NetBSD__)
#undef HAVE_LINUX_IPV6_PROC
#undef HAVE_LINUX_IPV6_PROC
#
undef
HAVE_GETOPT_LONG
#
define
HAVE_GETOPT_LONG
#undef HAVE_ARC4RANDOM
#undef HAVE_ARC4RANDOM
#define HAVE_RANDOM
#define HAVE_RANDOM
#
undef
HAVE_DEV_URANDOM
#
define
HAVE_DEV_URANDOM
#
undef
HAVE_DEV_RANDOM
#
define
HAVE_DEV_RANDOM
#define HAVE_SOCKADDR_SA_LEN
#define HAVE_SOCKADDR_SA_LEN
#undef HAVE_PSELECT
#undef HAVE_PSELECT
#define HAVE_BPF
#define HAVE_BPF
...
...
src/dhcp.c
View file @
fd9fa481
...
@@ -18,13 +18,14 @@ void dhcp_init(struct daemon *daemon)
...
@@ -18,13 +18,14 @@ void dhcp_init(struct daemon *daemon)
{
{
int
fd
=
socket
(
PF_INET
,
SOCK_DGRAM
,
IPPROTO_UDP
);
int
fd
=
socket
(
PF_INET
,
SOCK_DGRAM
,
IPPROTO_UDP
);
struct
sockaddr_in
saddr
;
struct
sockaddr_in
saddr
;
int
oneopt
=
1
,
zeroopt
=
0
;
int
flags
,
oneopt
=
1
,
zeroopt
=
0
;
struct
dhcp_config
*
configs
,
*
cp
;
struct
dhcp_config
*
configs
,
*
cp
;
if
(
fd
==
-
1
)
if
(
fd
==
-
1
)
die
(
"cannot create DHCP socket : %s"
,
NULL
);
die
(
"cannot create DHCP socket : %s"
,
NULL
);
if
(
if
((
flags
=
fcntl
(
fd
,
F_GETFL
,
0
))
==
-
1
||
fcntl
(
fd
,
F_SETFL
,
flags
|
O_NONBLOCK
)
==
-
1
||
#if defined(IP_PKTINFO)
#if defined(IP_PKTINFO)
setsockopt
(
fd
,
SOL_IP
,
IP_PKTINFO
,
&
oneopt
,
sizeof
(
oneopt
))
==
-
1
||
setsockopt
(
fd
,
SOL_IP
,
IP_PKTINFO
,
&
oneopt
,
sizeof
(
oneopt
))
==
-
1
||
#elif defined(IP_RECVIF)
#elif defined(IP_RECVIF)
...
@@ -72,6 +73,8 @@ void dhcp_init(struct daemon *daemon)
...
@@ -72,6 +73,8 @@ void dhcp_init(struct daemon *daemon)
socket receive buffer size to one to avoid that. (zero is
socket receive buffer size to one to avoid that. (zero is
rejected as non-sensical by some BSD kernels) */
rejected as non-sensical by some BSD kernels) */
if
((
fd
=
socket
(
PF_PACKET
,
SOCK_DGRAM
,
htons
(
ETHERTYPE_IP
)))
==
-
1
||
if
((
fd
=
socket
(
PF_PACKET
,
SOCK_DGRAM
,
htons
(
ETHERTYPE_IP
)))
==
-
1
||
(
flags
=
fcntl
(
fd
,
F_GETFL
,
0
))
==
-
1
||
fcntl
(
fd
,
F_SETFL
,
flags
|
O_NONBLOCK
)
==
-
1
||
setsockopt
(
fd
,
SOL_SOCKET
,
SO_RCVBUF
,
&
oneopt
,
sizeof
(
oneopt
))
==
-
1
)
setsockopt
(
fd
,
SOL_SOCKET
,
SO_RCVBUF
,
&
oneopt
,
sizeof
(
oneopt
))
==
-
1
)
die
(
"cannot create DHCP packet socket: %s. "
die
(
"cannot create DHCP packet socket: %s. "
"Is CONFIG_PACKET enabled in your kernel?"
,
NULL
);
"Is CONFIG_PACKET enabled in your kernel?"
,
NULL
);
...
@@ -160,7 +163,7 @@ void dhcp_packet(struct daemon *daemon, time_t now)
...
@@ -160,7 +163,7 @@ void dhcp_packet(struct daemon *daemon, time_t now)
#else
#else
{
{
struct
iname
*
name
;
struct
iname
*
name
;
for
(
name
=
daemon
->
if_names
;
name
s
->
isloop
;
names
=
names
->
next
);
for
(
name
=
daemon
->
if_names
;
name
->
isloop
;
name
=
name
->
next
);
strcpy
(
ifr
.
ifr_name
,
name
->
name
);
strcpy
(
ifr
.
ifr_name
,
name
->
name
);
}
}
#endif
#endif
...
@@ -257,7 +260,7 @@ void dhcp_packet(struct daemon *daemon, time_t now)
...
@@ -257,7 +260,7 @@ void dhcp_packet(struct daemon *daemon, time_t now)
lease_prune
(
NULL
,
now
);
/* lose any expired leases */
lease_prune
(
NULL
,
now
);
/* lose any expired leases */
newlen
=
dhcp_reply
(
daemon
,
iface_addr
,
ifr
.
ifr_name
,
sz
,
now
);
newlen
=
dhcp_reply
(
daemon
,
iface_addr
,
ifr
.
ifr_name
,
sz
,
now
);
lease_update_file
(
0
,
now
);
lease_update_file
(
0
,
now
);
lease_update_dns
();
lease_update_dns
(
daemon
);
if
(
newlen
==
0
)
if
(
newlen
==
0
)
return
;
return
;
...
@@ -283,7 +286,9 @@ void dhcp_packet(struct daemon *daemon, time_t now)
...
@@ -283,7 +286,9 @@ void dhcp_packet(struct daemon *daemon, time_t now)
dest
.
sin_addr
=
mess
->
ciaddr
;
dest
.
sin_addr
=
mess
->
ciaddr
;
}
}
sendto
(
daemon
->
dhcpfd
,
mess
,
newlen
,
0
,
(
struct
sockaddr
*
)
&
dest
,
sizeof
(
dest
));
while
(
sendto
(
daemon
->
dhcpfd
,
mess
,
newlen
,
0
,
(
struct
sockaddr
*
)
&
dest
,
sizeof
(
dest
))
==
-
1
&&
retry_send
());
}
}
else
else
{
{
...
@@ -353,7 +358,8 @@ void dhcp_packet(struct daemon *daemon, time_t now)
...
@@ -353,7 +358,8 @@ void dhcp_packet(struct daemon *daemon, time_t now)
iov
[
0
].
iov_len
=
sizeof
(
struct
ether_header
);
iov
[
0
].
iov_len
=
sizeof
(
struct
ether_header
);
iov
[
1
].
iov_base
=
(
char
*
)
rawpacket
;
iov
[
1
].
iov_base
=
(
char
*
)
rawpacket
;
iov
[
1
].
iov_len
=
ntohs
(
rawpacket
->
ip
.
ip_len
);
iov
[
1
].
iov_len
=
ntohs
(
rawpacket
->
ip
.
ip_len
);
writev
(
daemon
->
dhcp_raw_fd
,
iov
,
2
);
while
(
writev
(
daemon
->
dhcp_raw_fd
,
iov
,
2
)
==
-
1
&&
errno
==
EINTR
);
#else
#else
struct
sockaddr_ll
dest
;
struct
sockaddr_ll
dest
;
...
@@ -362,9 +368,9 @@ void dhcp_packet(struct daemon *daemon, time_t now)
...
@@ -362,9 +368,9 @@ void dhcp_packet(struct daemon *daemon, time_t now)
dest
.
sll_ifindex
=
iface_index
;
dest
.
sll_ifindex
=
iface_index
;
dest
.
sll_protocol
=
htons
(
ETHERTYPE_IP
);
dest
.
sll_protocol
=
htons
(
ETHERTYPE_IP
);
memcpy
(
dest
.
sll_addr
,
hwdest
,
ETHER_ADDR_LEN
);
memcpy
(
dest
.
sll_addr
,
hwdest
,
ETHER_ADDR_LEN
);
sendto
(
daemon
->
dhcp_raw_fd
,
rawpacket
,
ntohs
(
rawpacket
->
ip
.
ip_len
),
while
(
sendto
(
daemon
->
dhcp_raw_fd
,
rawpacket
,
ntohs
(
rawpacket
->
ip
.
ip_len
),
0
,
(
struct
sockaddr
*
)
&
dest
,
sizeof
(
dest
));
0
,
(
struct
sockaddr
*
)
&
dest
,
sizeof
(
dest
))
==
-
1
&&
errno
==
EINTR
);
#endif
#endif
}
}
}
}
...
@@ -624,7 +630,7 @@ void dhcp_update_configs(struct dhcp_config *configs)
...
@@ -624,7 +630,7 @@ void dhcp_update_configs(struct dhcp_config *configs)
(
crec
=
cache_find_by_name
(
NULL
,
config
->
hostname
,
0
,
F_IPV4
))
&&
(
crec
=
cache_find_by_name
(
NULL
,
config
->
hostname
,
0
,
F_IPV4
))
&&
(
crec
->
flags
&
F_HOSTS
))
(
crec
->
flags
&
F_HOSTS
))
{
{
config
->
addr
=
crec
->
addr
.
addr
.
addr4
;
config
->
addr
=
crec
->
addr
.
addr
.
addr
.
addr
4
;
config
->
flags
|=
CONFIG_ADDR
;
config
->
flags
|=
CONFIG_ADDR
;
}
}
}
}
...
...
src/dnsmasq.c
View file @
fd9fa481
...
@@ -314,7 +314,7 @@ int main (int argc, char **argv)
...
@@ -314,7 +314,7 @@ int main (int argc, char **argv)
dhcp_update_configs
(
daemon
->
dhcp_conf
);
dhcp_update_configs
(
daemon
->
dhcp_conf
);
lease_update_from_configs
(
daemon
->
dhcp_conf
,
daemon
->
domain_suffix
);
lease_update_from_configs
(
daemon
->
dhcp_conf
,
daemon
->
domain_suffix
);
lease_update_file
(
0
,
now
);
lease_update_file
(
0
,
now
);
lease_update_dns
();
lease_update_dns
(
daemon
);
}
}
if
(
daemon
->
resolv_files
&&
(
daemon
->
options
&
OPT_NO_POLL
))
if
(
daemon
->
resolv_files
&&
(
daemon
->
options
&
OPT_NO_POLL
))
{
{
...
@@ -326,7 +326,7 @@ int main (int argc, char **argv)
...
@@ -326,7 +326,7 @@ int main (int argc, char **argv)
if
(
sigusr1
)
if
(
sigusr1
)
{
{
dump_cache
(
daemon
->
options
&
(
OPT_DEBUG
|
OPT_LOG
),
daemon
->
cachesize
);
dump_cache
(
daemon
);
sigusr1
=
0
;
sigusr1
=
0
;
}
}
...
@@ -379,7 +379,7 @@ int main (int argc, char **argv)
...
@@ -379,7 +379,7 @@ int main (int argc, char **argv)
#ifdef HAVE_ISC_READER
#ifdef HAVE_ISC_READER
if
(
daemon
->
lease_file
&&
!
daemon
->
dhcp
)
if
(
daemon
->
lease_file
&&
!
daemon
->
dhcp
)
load_dhcp
(
daemon
->
lease_file
,
daemon
->
domain_suffix
,
now
,
daemon
->
namebuff
);
load_dhcp
(
daemon
,
now
);
#endif
#endif
if
(
!
(
daemon
->
options
&
OPT_NO_POLL
))
if
(
!
(
daemon
->
options
&
OPT_NO_POLL
))
...
@@ -638,8 +638,10 @@ int icmp_ping(struct daemon *daemon, struct in_addr addr)
...
@@ -638,8 +638,10 @@ int icmp_ping(struct daemon *daemon, struct in_addr addr)
setsockopt
(
daemon
->
dhcp_icmp_fd
,
SOL_SOCKET
,
SO_RCVBUF
,
&
opt
,
sizeof
(
opt
));
setsockopt
(
daemon
->
dhcp_icmp_fd
,
SOL_SOCKET
,
SO_RCVBUF
,
&
opt
,
sizeof
(
opt
));
if
(
sendto
(
daemon
->
dhcp_icmp_fd
,
(
char
*
)
&
packet
.
icmp
,
sizeof
(
struct
icmp
),
0
,
while
(
sendto
(
daemon
->
dhcp_icmp_fd
,
(
char
*
)
&
packet
.
icmp
,
sizeof
(
struct
icmp
),
0
,
(
struct
sockaddr
*
)
&
saddr
,
sizeof
(
saddr
))
==
sizeof
(
struct
icmp
))
(
struct
sockaddr
*
)
&
saddr
,
sizeof
(
saddr
))
==
-
1
&&
retry_send
());
for
(
now
=
start
=
dnsmasq_time
(
daemon
->
uptime_fd
);
difftime
(
now
,
start
)
<
3
.
0
;)
for
(
now
=
start
=
dnsmasq_time
(
daemon
->
uptime_fd
);
difftime
(
now
,
start
)
<
3
.
0
;)
{
{
struct
timeval
tv
;
struct
timeval
tv
;
...
...
src/dnsmasq.h
View file @
fd9fa481
...
@@ -95,6 +95,7 @@
...
@@ -95,6 +95,7 @@
#define OPT_ETHERS 16384
#define OPT_ETHERS 16384
#define OPT_RESOLV_DOMAIN 32768
#define OPT_RESOLV_DOMAIN 32768
#define OPT_NO_FORK 65536
#define OPT_NO_FORK 65536
#define OPT_AUTHORITATIVE 131072
struct
all_addr
{
struct
all_addr
{
union
{
union
{
...
@@ -129,7 +130,14 @@ union bigname {
...
@@ -129,7 +130,14 @@ union bigname {
struct
crec
{
struct
crec
{
struct
crec
*
next
,
*
prev
,
*
hash_next
;
struct
crec
*
next
,
*
prev
,
*
hash_next
;
time_t
ttd
;
/* time to die */
time_t
ttd
;
/* time to die */
int
uid
;
union
{
struct
all_addr
addr
;
struct
all_addr
addr
;
struct
{
struct
crec
*
cache
;
int
uid
;
}
cname
;
}
addr
;
unsigned
short
flags
;
unsigned
short
flags
;
union
{
union
{
char
sname
[
SMALLDNAME
];
char
sname
[
SMALLDNAME
];
...
@@ -152,7 +160,7 @@ struct crec {
...
@@ -152,7 +160,7 @@ struct crec {
#define F_SERVER 2048
#define F_SERVER 2048
#define F_NXDOMAIN 4096
#define F_NXDOMAIN 4096
#define F_QUERY 8192
#define F_QUERY 8192
#define F_
ADDN
16384
#define F_
CNAME
16384
#define F_NOERR 32768
#define F_NOERR 32768
/* struct sockaddr is not large enough to hold any address,
/* struct sockaddr is not large enough to hold any address,
...
@@ -227,6 +235,13 @@ struct resolvc {
...
@@ -227,6 +235,13 @@ struct resolvc {
char
*
name
;
char
*
name
;
};
};
/* adn-hosts parms from command-line */
struct
hostsfile
{
struct
hostsfile
*
next
;
char
*
fname
;
int
index
;
/* matches to cache entries fro logging */
};
struct
frec
{
struct
frec
{
union
mysockaddr
source
;
union
mysockaddr
source
;
struct
all_addr
dest
;
struct
all_addr
dest
;
...
@@ -234,6 +249,7 @@ struct frec {
...
@@ -234,6 +249,7 @@ struct frec {
unsigned
int
iface
;
unsigned
int
iface
;
unsigned
short
orig_id
,
new_id
;
unsigned
short
orig_id
,
new_id
;
int
fd
;
int
fd
;
unsigned
int
crc
;
time_t
time
;
time_t
time
;
struct
frec
*
next
;
struct
frec
*
next
;
};
};
...
@@ -340,7 +356,7 @@ struct daemon {
...
@@ -340,7 +356,7 @@ struct daemon {
int
cachesize
;
int
cachesize
;
int
port
,
query_port
;
int
port
,
query_port
;
unsigned
long
local_ttl
;
unsigned
long
local_ttl
;
char
*
addn_hosts
;
struct
hostsfile
*
addn_hosts
;
struct
dhcp_context
*
dhcp
;
struct
dhcp_context
*
dhcp
;
struct
dhcp_config
*
dhcp_conf
;
struct
dhcp_config
*
dhcp_conf
;
struct
dhcp_opt
*
dhcp_opts
;
struct
dhcp_opt
*
dhcp_opts
;
...
@@ -369,7 +385,8 @@ struct daemon {
...
@@ -369,7 +385,8 @@ struct daemon {
/* cache.c */
/* cache.c */
void
cache_init
(
int
cachesize
,
int
log
);
void
cache_init
(
int
cachesize
,
int
log
);
void
log_query
(
unsigned
short
flags
,
char
*
name
,
struct
all_addr
*
addr
,
unsigned
short
type
);
void
log_query
(
unsigned
short
flags
,
char
*
name
,
struct
all_addr
*
addr
,
unsigned
short
type
,
struct
hostsfile
*
addn_hosts
,
int
index
);
struct
crec
*
cache_find_by_addr
(
struct
crec
*
crecp
,
struct
crec
*
cache_find_by_addr
(
struct
crec
*
crecp
,
struct
all_addr
*
addr
,
time_t
now
,
struct
all_addr
*
addr
,
time_t
now
,
unsigned
short
prot
);
unsigned
short
prot
);
...
@@ -377,12 +394,12 @@ struct crec *cache_find_by_name(struct crec *crecp,
...
@@ -377,12 +394,12 @@ struct crec *cache_find_by_name(struct crec *crecp,
char
*
name
,
time_t
now
,
unsigned
short
prot
);
char
*
name
,
time_t
now
,
unsigned
short
prot
);
void
cache_end_insert
(
void
);
void
cache_end_insert
(
void
);
void
cache_start_insert
(
void
);
void
cache_start_insert
(
void
);
void
cache_insert
(
char
*
name
,
struct
all_addr
*
addr
,
struct
crec
*
cache_insert
(
char
*
name
,
struct
all_addr
*
addr
,
time_t
now
,
unsigned
long
ttl
,
unsigned
short
flags
);
time_t
now
,
unsigned
long
ttl
,
unsigned
short
flags
);
void
cache_reload
(
int
opts
,
char
*
buff
,
char
*
domain_suffix
,
char
*
addn_hosts
);
void
cache_reload
(
int
opts
,
char
*
buff
,
char
*
domain_suffix
,
struct
hostsfile
*
addn_hosts
);
void
cache_add_dhcp_entry
(
char
*
host_name
,
struct
in_addr
*
host_address
,
time_t
ttd
);
void
cache_add_dhcp_entry
(
struct
daemon
*
daemon
,
char
*
host_name
,
struct
in_addr
*
host_address
,
time_t
ttd
);
void
cache_unhash_dhcp
(
void
);
void
cache_unhash_dhcp
(
void
);
void
dump_cache
(
int
debug
,
int
size
);
void
dump_cache
(
struct
daemon
*
daemon
);
char
*
cache_get_name
(
struct
crec
*
crecp
);
char
*
cache_get_name
(
struct
crec
*
crecp
);
/* rfc1035.c */
/* rfc1035.c */
...
@@ -392,14 +409,14 @@ int setup_reply(HEADER *header, unsigned int qlen,
...
@@ -392,14 +409,14 @@ int setup_reply(HEADER *header, unsigned int qlen,
struct
all_addr
*
addrp
,
unsigned
short
flags
,
struct
all_addr
*
addrp
,
unsigned
short
flags
,
unsigned
long
local_ttl
);
unsigned
long
local_ttl
);
void
extract_addresses
(
HEADER
*
header
,
unsigned
int
qlen
,
char
*
namebuff
,
void
extract_addresses
(
HEADER
*
header
,
unsigned
int
qlen
,
char
*
namebuff
,
time_t
now
,
struct
doctor
*
doctors
);
time_t
now
,
struct
daemon
*
daemon
);
void
extract_neg_addrs
(
HEADER
*
header
,
unsigned
int
qlen
,
char
*
namebuff
,
time_t
now
,
unsigned
short
flags
);
int
answer_request
(
HEADER
*
header
,
char
*
limit
,
unsigned
int
qlen
,
struct
daemon
*
daemon
,
time_t
now
);
int
answer_request
(
HEADER
*
header
,
char
*
limit
,
unsigned
int
qlen
,
struct
daemon
*
daemon
,
time_t
now
);
int
check_for_bogus_wildcard
(
HEADER
*
header
,
unsigned
int
qlen
,
char
*
name
,
int
check_for_bogus_wildcard
(
HEADER
*
header
,
unsigned
int
qlen
,
char
*
name
,
struct
bogus_addr
*
addr
,
time_t
now
);
struct
bogus_addr
*
addr
,
time_t
now
);
unsigned
char
*
find_pseudoheader
(
HEADER
*
header
,
unsigned
int
plen
,
unsigned
char
*
find_pseudoheader
(
HEADER
*
header
,
unsigned
int
plen
,
unsigned
int
*
len
,
unsigned
char
**
p
);
unsigned
int
*
len
,
unsigned
char
**
p
);
int
check_for_local_domain
(
char
*
name
,
time_t
now
,
struct
mx_record
*
mx
);
int
check_for_local_domain
(
char
*
name
,
time_t
now
,
struct
mx_record
*
mx
);
unsigned
int
questions_crc
(
HEADER
*
header
,
unsigned
int
plen
);
int
resize_packet
(
HEADER
*
header
,
unsigned
int
plen
,
int
resize_packet
(
HEADER
*
header
,
unsigned
int
plen
,
unsigned
char
*
pheader
,
unsigned
int
hlen
);
unsigned
char
*
pheader
,
unsigned
int
hlen
);
...
@@ -417,6 +434,7 @@ int sockaddr_isequal(union mysockaddr *s1, union mysockaddr *s2);
...
@@ -417,6 +434,7 @@ int sockaddr_isequal(union mysockaddr *s1, union mysockaddr *s2);
int
hostname_isequal
(
unsigned
char
*
a
,
unsigned
char
*
b
);
int
hostname_isequal
(
unsigned
char
*
a
,
unsigned
char
*
b
);
time_t
dnsmasq_time
(
int
fd
);
time_t
dnsmasq_time
(
int
fd
);
int
is_same_net
(
struct
in_addr
a
,
struct
in_addr
b
,
struct
in_addr
mask
);
int
is_same_net
(
struct
in_addr
a
,
struct
in_addr
b
,
struct
in_addr
mask
);
int
retry_send
(
void
);
/* option.c */
/* option.c */
struct
daemon
*
read_opts
(
int
argc
,
char
**
argv
);
struct
daemon
*
read_opts
(
int
argc
,
char
**
argv
);
...
@@ -452,7 +470,7 @@ struct dhcp_config *config_find_by_address(struct dhcp_config *configs, struct i
...
@@ -452,7 +470,7 @@ struct dhcp_config *config_find_by_address(struct dhcp_config *configs, struct i
/* lease.c */
/* lease.c */
void
lease_update_file
(
int
force
,
time_t
now
);
void
lease_update_file
(
int
force
,
time_t
now
);
void
lease_update_dns
(
void
);
void
lease_update_dns
(
struct
daemon
*
daemon
);
void
lease_init
(
struct
daemon
*
daemon
,
time_t
now
);
void
lease_init
(
struct
daemon
*
daemon
,
time_t
now
);
struct
dhcp_lease
*
lease_allocate
(
unsigned
char
*
clid
,
int
clid_len
,
struct
in_addr
addr
);
struct
dhcp_lease
*
lease_allocate
(
unsigned
char
*
clid
,
int
clid_len
,
struct
in_addr
addr
);
void
lease_set_hwaddr
(
struct
dhcp_lease
*
lease
,
unsigned
char
*
hwaddr
);
void
lease_set_hwaddr
(
struct
dhcp_lease
*
lease
,
unsigned
char
*
hwaddr
);
...
@@ -471,6 +489,6 @@ int icmp_ping(struct daemon *daemon, struct in_addr addr);
...
@@ -471,6 +489,6 @@ int icmp_ping(struct daemon *daemon, struct in_addr addr);
/* isc.c */
/* isc.c */
#ifdef HAVE_ISC_READER
#ifdef HAVE_ISC_READER
void
load_dhcp
(
char
*
file
,
char
*
suffix
,
time_t
now
,
char
*
hostname
);
void
load_dhcp
(
struct
daemon
*
daemon
,
time_t
now
);
#endif
#endif
src/forward.c
View file @
fd9fa481
This diff is collapsed.
Click to expand it.
src/isc.c
View file @
fd9fa481
...
@@ -55,8 +55,9 @@ static int next_token (char *token, int buffsize, FILE * fp)
...
@@ -55,8 +55,9 @@ static int next_token (char *token, int buffsize, FILE * fp)
return
count
?
1
:
0
;
return
count
?
1
:
0
;
}
}
void
load_dhcp
(
char
*
file
,
char
*
suffix
,
time_t
now
,
char
*
hostname
)
void
load_dhcp
(
struct
daemon
*
daemon
,
time_t
now
)
{
{
char
*
hostname
=
daemon
->
namebuff
;
char
token
[
MAXTOK
],
*
dot
;
char
token
[
MAXTOK
],
*
dot
;
struct
in_addr
host_address
;
struct
in_addr
host_address
;
time_t
ttd
,
tts
;
time_t
ttd
,
tts
;
...
@@ -64,10 +65,10 @@ void load_dhcp(char *file, char *suffix, time_t now, char *hostname)
...
@@ -64,10 +65,10 @@ void load_dhcp(char *file, char *suffix, time_t now, char *hostname)
struct
isc_lease
*
lease
,
*
tmp
,
**
up
;
struct
isc_lease
*
lease
,
*
tmp
,
**
up
;
struct
stat
statbuf
;
struct
stat
statbuf
;
if
(
stat
(
file
,
&
statbuf
)
==
-
1
)
if
(
stat
(
daemon
->
lease_
file
,
&
statbuf
)
==
-
1
)
{
{
if
(
!
logged_lease
)
if
(
!
logged_lease
)
syslog
(
LOG_WARNING
,
"failed to access %s: %m"
,
file
);
syslog
(
LOG_WARNING
,
"failed to access %s: %m"
,
daemon
->
lease_
file
);
logged_lease
=
1
;
logged_lease
=
1
;
return
;
return
;
}
}
...
@@ -81,13 +82,13 @@ void load_dhcp(char *file, char *suffix, time_t now, char *hostname)
...
@@ -81,13 +82,13 @@ void load_dhcp(char *file, char *suffix, time_t now, char *hostname)
lease_file_size
=
statbuf
.
st_size
;
lease_file_size
=
statbuf
.
st_size
;
lease_file_inode
=
statbuf
.
st_ino
;
lease_file_inode
=
statbuf
.
st_ino
;
if
(
!
(
fp
=
fopen
(
file
,
"r"
)))
if
(
!
(
fp
=
fopen
(
daemon
->
lease_
file
,
"r"
)))
{
{
syslog
(
LOG_ERR
,
"failed to load %s: %m"
,
file
);
syslog
(
LOG_ERR
,
"failed to load %s: %m"
,
daemon
->
lease_
file
);
return
;
return
;
}
}
syslog
(
LOG_INFO
,
"reading %s"
,
file
);
syslog
(
LOG_INFO
,
"reading %s"
,
daemon
->
lease_
file
);
while
((
next_token
(
token
,
MAXTOK
,
fp
)))
while
((
next_token
(
token
,
MAXTOK
,
fp
)))
{
{
...
@@ -109,7 +110,7 @@ void load_dhcp(char *file, char *suffix, time_t now, char *hostname)
...
@@ -109,7 +110,7 @@ void load_dhcp(char *file, char *suffix, time_t now, char *hostname)
if
(
!
canonicalise
(
hostname
))
if
(
!
canonicalise
(
hostname
))
{
{
*
hostname
=
0
;
*
hostname
=
0
;
syslog
(
LOG_ERR
,
"bad name in %s"
,
file
);
syslog
(
LOG_ERR
,
"bad name in %s"
,
daemon
->
lease_
file
);
}
}
}
}
else
if
((
strcmp
(
token
,
"ends"
)
==
0
)
||
else
if
((
strcmp
(
token
,
"ends"
)
==
0
)
||
...
@@ -168,7 +169,7 @@ void load_dhcp(char *file, char *suffix, time_t now, char *hostname)
...
@@ -168,7 +169,7 @@ void load_dhcp(char *file, char *suffix, time_t now, char *hostname)
if
((
dot
=
strchr
(
hostname
,
'.'
)))
if
((
dot
=
strchr
(
hostname
,
'.'
)))
{
{
if
(
!
suffix
||
hostname_isequal
(
dot
+
1
,
suffix
))
if
(
!
daemon
->
domain_suffix
||
hostname_isequal
(
dot
+
1
,
daemon
->
domain_
suffix
))
{
{
syslog
(
LOG_WARNING
,
syslog
(
LOG_WARNING
,
"Ignoring DHCP lease for %s because it has an illegal domain part"
,
"Ignoring DHCP lease for %s because it has an illegal domain part"
,
...
@@ -198,11 +199,12 @@ void load_dhcp(char *file, char *suffix, time_t now, char *hostname)
...
@@ -198,11 +199,12 @@ void load_dhcp(char *file, char *suffix, time_t now, char *hostname)
{
{
leases
=
lease
;
leases
=
lease
;
strcpy
(
lease
->
name
,
hostname
);
strcpy
(
lease
->
name
,
hostname
);
if
(
suffix
&&
(
lease
->
fqdn
=
malloc
(
strlen
(
hostname
)
+
strlen
(
suffix
)
+
2
)))
if
(
daemon
->
domain_suffix
&&
(
lease
->
fqdn
=
malloc
(
strlen
(
hostname
)
+
strlen
(
daemon
->
domain_suffix
)
+
2
)))
{
{
strcpy
(
lease
->
fqdn
,
hostname
);
strcpy
(
lease
->
fqdn
,
hostname
);
strcat
(
lease
->
fqdn
,
"."
);
strcat
(
lease
->
fqdn
,
"."
);
strcat
(
lease
->
fqdn
,
suffix
);
strcat
(
lease
->
fqdn
,
daemon
->
domain_
suffix
);
}
}
}
}
}
}
...
@@ -235,8 +237,8 @@ void load_dhcp(char *file, char *suffix, time_t now, char *hostname)
...
@@ -235,8 +237,8 @@ void load_dhcp(char *file, char *suffix, time_t now, char *hostname)
for
(
lease
=
leases
;
lease
;
lease
=
lease
->
next
)
for
(
lease
=
leases
;
lease
;
lease
=
lease
->
next
)
{
{
cache_add_dhcp_entry
(
lease
->
fqdn
,
&
lease
->
addr
,
lease
->
expires
);
cache_add_dhcp_entry
(
daemon
,
lease
->
fqdn
,
&
lease
->
addr
,
lease
->
expires
);
cache_add_dhcp_entry
(
lease
->
name
,
&
lease
->
addr
,
lease
->
expires
);
cache_add_dhcp_entry
(
daemon
,
lease
->
name
,
&
lease
->
addr
,
lease
->
expires
);
}
}
}
}
...
...
src/lease.c
View file @
fd9fa481
...
@@ -167,7 +167,7 @@ void lease_update_file(int force, time_t now)
...
@@ -167,7 +167,7 @@ void lease_update_file(int force, time_t now)
}
}
}
}
void
lease_update_dns
(
void
)
void
lease_update_dns
(
struct
daemon
*
daemon
)
{
{
struct
dhcp_lease
*
lease
;
struct
dhcp_lease
*
lease
;
...
@@ -177,8 +177,8 @@ void lease_update_dns(void)
...
@@ -177,8 +177,8 @@ void lease_update_dns(void)
for
(
lease
=
leases
;
lease
;
lease
=
lease
->
next
)
for
(
lease
=
leases
;
lease
;
lease
=
lease
->
next
)
{
{
cache_add_dhcp_entry
(
lease
->
fqdn
,
&
lease
->
addr
,
lease
->
expires
);
cache_add_dhcp_entry
(
daemon
,
lease
->
fqdn
,
&
lease
->
addr
,
lease
->
expires
);
cache_add_dhcp_entry
(
lease
->
hostname
,
&
lease
->
addr
,
lease
->
expires
);
cache_add_dhcp_entry
(
daemon
,
lease
->
hostname
,
&
lease
->
addr
,
lease
->
expires
);
}
}
dns_dirty
=
0
;
dns_dirty
=
0
;
...
...
src/network.c
View file @
fd9fa481
...
@@ -256,6 +256,8 @@ static int create_ipv6_listener(struct listener **link, int port)
...
@@ -256,6 +256,8 @@ static int create_ipv6_listener(struct listener **link, int port)
setsockopt
(
tcpfd
,
SOL_SOCKET
,
SO_REUSEADDR
,
&
opt
,
sizeof
(
opt
))
==
-
1
||
setsockopt
(
tcpfd
,
SOL_SOCKET
,
SO_REUSEADDR
,
&
opt
,
sizeof
(
opt
))
==
-
1
||
setsockopt
(
fd
,
IPV6_LEVEL
,
IPV6_V6ONLY
,
&
opt
,
sizeof
(
opt
))
==
-
1
||
setsockopt
(
fd
,
IPV6_LEVEL
,
IPV6_V6ONLY
,
&
opt
,
sizeof
(
opt
))
==
-
1
||
setsockopt
(
tcpfd
,
IPV6_LEVEL
,
IPV6_V6ONLY
,
&
opt
,
sizeof
(
opt
))
==
-
1
||
setsockopt
(
tcpfd
,
IPV6_LEVEL
,
IPV6_V6ONLY
,
&
opt
,
sizeof
(
opt
))
==
-
1
||
(
flags
=
fcntl
(
fd
,
F_GETFL
,
0
))
==
-
1
||
fcntl
(
fd
,
F_SETFL
,
flags
|
O_NONBLOCK
)
==
-
1
||
(
flags
=
fcntl
(
tcpfd
,
F_GETFL
,
0
))
==
-
1
||
(
flags
=
fcntl
(
tcpfd
,
F_GETFL
,
0
))
==
-
1
||
fcntl
(
tcpfd
,
F_SETFL
,
flags
|
O_NONBLOCK
)
==
-
1
||
fcntl
(
tcpfd
,
F_SETFL
,
flags
|
O_NONBLOCK
)
==
-
1
||
#ifdef IPV6_RECVPKTINFO
#ifdef IPV6_RECVPKTINFO
...
@@ -321,6 +323,8 @@ struct listener *create_wildcard_listeners(int port)
...
@@ -321,6 +323,8 @@ struct listener *create_wildcard_listeners(int port)
!
create_ipv6_listener
(
&
l6
,
port
)
||
!
create_ipv6_listener
(
&
l6
,
port
)
||
#endif
#endif
setsockopt
(
fd
,
SOL_SOCKET
,
SO_REUSEADDR
,
&
opt
,
sizeof
(
opt
))
==
-
1
||
setsockopt
(
fd
,
SOL_SOCKET
,
SO_REUSEADDR
,
&
opt
,
sizeof
(
opt
))
==
-
1
||
(
flags
=
fcntl
(
fd
,
F_GETFL
,
0
))
==
-
1
||
fcntl
(
fd
,
F_SETFL
,
flags
|
O_NONBLOCK
)
==
-
1
||
#if defined(IP_PKTINFO)
#if defined(IP_PKTINFO)
setsockopt
(
fd
,
SOL_IP
,
IP_PKTINFO
,
&
opt
,
sizeof
(
opt
))
==
-
1
||
setsockopt
(
fd
,
SOL_IP
,
IP_PKTINFO
,
&
opt
,
sizeof
(
opt
))
==
-
1
||
#elif defined(IP_RECVDSTADDR) && defined(IP_RECVIF)
#elif defined(IP_RECVDSTADDR) && defined(IP_RECVIF)
...
@@ -373,6 +377,8 @@ struct listener *create_bound_listeners(struct irec *interfaces, int port)
...
@@ -373,6 +377,8 @@ struct listener *create_bound_listeners(struct irec *interfaces, int port)
/* See Stevens 16.6 */
/* See Stevens 16.6 */
(
flags
=
fcntl
(
new
->
tcpfd
,
F_GETFL
,
0
))
==
-
1
||
(
flags
=
fcntl
(
new
->
tcpfd
,
F_GETFL
,
0
))
==
-
1
||
fcntl
(
new
->
tcpfd
,
F_SETFL
,
flags
|
O_NONBLOCK
)
==
-
1
||
fcntl
(
new
->
tcpfd
,
F_SETFL
,
flags
|
O_NONBLOCK
)
==
-
1
||
(
flags
=
fcntl
(
new
->
fd
,
F_GETFL
,
0
))
==
-
1
||
fcntl
(
new
->
fd
,
F_SETFL
,
flags
|
O_NONBLOCK
)
==
-
1
||
bind
(
new
->
tcpfd
,
&
iface
->
addr
.
sa
,
sa_len
(
&
iface
->
addr
))
==
-
1
||
bind
(
new
->
tcpfd
,
&
iface
->
addr
.
sa
,
sa_len
(
&
iface
->
addr
))
==
-
1
||
bind
(
new
->
fd
,
&
iface
->
addr
.
sa
,
sa_len
(
&
iface
->
addr
))
==
-
1
||
bind
(
new
->
fd
,
&
iface
->
addr
.
sa
,
sa_len
(
&
iface
->
addr
))
==
-
1
||
listen
(
new
->
tcpfd
,
5
)
==
-
1
)
listen
(
new
->
tcpfd
,
5
)
==
-
1
)
...
@@ -385,6 +391,7 @@ struct listener *create_bound_listeners(struct irec *interfaces, int port)
...
@@ -385,6 +391,7 @@ struct listener *create_bound_listeners(struct irec *interfaces, int port)
struct
serverfd
*
allocate_sfd
(
union
mysockaddr
*
addr
,
struct
serverfd
**
sfds
)
struct
serverfd
*
allocate_sfd
(
union
mysockaddr
*
addr
,
struct
serverfd
**
sfds
)
{
{
struct
serverfd
*
sfd
;
struct
serverfd
*
sfd
;
int
flags
;
/* may have a suitable one already */
/* may have a suitable one already */
for
(
sfd
=
*
sfds
;
sfd
;
sfd
=
sfd
->
next
)
for
(
sfd
=
*
sfds
;
sfd
;
sfd
=
sfd
->
next
)
...
@@ -402,7 +409,9 @@ struct serverfd *allocate_sfd(union mysockaddr *addr, struct serverfd **sfds)
...
@@ -402,7 +409,9 @@ struct serverfd *allocate_sfd(union mysockaddr *addr, struct serverfd **sfds)
return
NULL
;
return
NULL
;
}
}
if
(
bind
(
sfd
->
fd
,
(
struct
sockaddr
*
)
addr
,
sa_len
(
addr
))
==
-
1
)
if
(
bind
(
sfd
->
fd
,
(
struct
sockaddr
*
)
addr
,
sa_len
(
addr
))
==
-
1
||
(
flags
=
fcntl
(
sfd
->
fd
,
F_GETFL
,
0
))
==
-
1
||
fcntl
(
sfd
->
fd
,
F_SETFL
,
flags
|
O_NONBLOCK
)
==
-
1
)
{
{
int
errsave
=
errno
;
/* save error from bind. */
int
errsave
=
errno
;
/* save error from bind. */
close
(
sfd
->
fd
);
close
(
sfd
->
fd
);
...
...
src/option.c
View file @
fd9fa481
...
@@ -21,7 +21,7 @@ struct myoption {
...
@@ -21,7 +21,7 @@ struct myoption {
int
val
;
int
val
;
};
};
#define OPTSTRING "ZDNLERzowefnbvhdkqr:m:p:c:l:s:i:t:u:g:a:x:S:C:A:T:H:Q:I:B:F:G:O:M:X:V:U:j:P:"
#define OPTSTRING "ZDNLER
K
zowefnbvhdkqr:m:p:c:l:s:i:t:u:g:a:x:S:C:A:T:H:Q:I:B:F:G:O:M:X:V:U:j:P:"
static
struct
myoption
opts
[]
=
{
static
struct
myoption
opts
[]
=
{
{
"version"
,
0
,
0
,
'v'
},
{
"version"
,
0
,
0
,
'v'
},
...
@@ -74,6 +74,7 @@ static struct myoption opts[] = {
...
@@ -74,6 +74,7 @@ static struct myoption opts[] = {
{
"dhcp-userclass"
,
1
,
0
,
'j'
},
{
"dhcp-userclass"
,
1
,
0
,
'j'
},
{
"edns-packet-max"
,
1
,
0
,
'P'
},
{
"edns-packet-max"
,
1
,
0
,
'P'
},
{
"keep-in-foreground"
,
0
,
0
,
'k'
},
{
"keep-in-foreground"
,
0
,
0
,
'k'
},
{
"dhcp-authoritative"
,
0
,
0
,
'K'
},
{
0
,
0
,
0
,
0
}
{
0
,
0
,
0
,
0
}
};
};
...
@@ -91,6 +92,7 @@ static struct optflags optmap[] = {
...
@@ -91,6 +92,7 @@ static struct optflags optmap[] = {
{
'n'
,
OPT_NO_POLL
},
{
'n'
,
OPT_NO_POLL
},
{
'd'
,
OPT_DEBUG
},
{
'd'
,
OPT_DEBUG
},
{
'k'
,
OPT_NO_FORK
},
{
'k'
,
OPT_NO_FORK
},
{
'K'
,
OPT_AUTHORITATIVE
},
{
'o'
,
OPT_ORDER
},
{
'o'
,
OPT_ORDER
},
{
'R'
,
OPT_NO_RESOLV
},
{
'R'
,
OPT_NO_RESOLV
},
{
'E'
,
OPT_EXPAND
},
{
'E'
,
OPT_EXPAND
},
...
@@ -127,6 +129,7 @@ static char *usage =
...
@@ -127,6 +129,7 @@ static char *usage =
"-I, --except-interface=int Specify interface(s) NOT to listen on.
\n
"
"-I, --except-interface=int Specify interface(s) NOT to listen on.
\n
"
"-j, --dhcp-userclass=<id>,<class> Map DHCP user class to option set.
\n
"
"-j, --dhcp-userclass=<id>,<class> Map DHCP user class to option set.
\n
"
"-k, --keep-in-foreground Do NOT fork into the background, do NOT run in debug mode.
\n
"
"-k, --keep-in-foreground Do NOT fork into the background, do NOT run in debug mode.
\n
"
"-K, --dhcp-authoritative Assume we are the only DHCP server on the local network.
\n
"
"-l, --dhcp-leasefile=path Specify where to store DHCP leases (defaults to "
LEASEFILE
").
\n
"
"-l, --dhcp-leasefile=path Specify where to store DHCP leases (defaults to "
LEASEFILE
").
\n
"
"-L, --localmx Return MX records for local hosts.
\n
"
"-L, --localmx Return MX records for local hosts.
\n
"
"-m, --mx-host=host_name Specify the MX name to reply to.
\n
"
"-m, --mx-host=host_name Specify the MX name to reply to.
\n
"
...
@@ -165,7 +168,7 @@ struct daemon *read_opts (int argc, char **argv)
...
@@ -165,7 +168,7 @@ struct daemon *read_opts (int argc, char **argv)
int
option
=
0
,
i
;
int
option
=
0
,
i
;
FILE
*
file_save
=
NULL
,
*
f
=
NULL
;
FILE
*
file_save
=
NULL
,
*
f
=
NULL
;
char
*
file_name_save
=
NULL
,
*
conffile
=
CONFFILE
;
char
*
file_name_save
=
NULL
,
*
conffile
=
CONFFILE
;
int
conffile_set
=
0
;
int
hosts_index
=
1
,
conffile_set
=
0
;
int
line_save
=
0
,
lineno
=
0
;
int
line_save
=
0
,
lineno
=
0
;
opterr
=
0
;
opterr
=
0
;
...
@@ -398,14 +401,14 @@ struct daemon *read_opts (int argc, char **argv)
...
@@ -398,14 +401,14 @@ struct daemon *read_opts (int argc, char **argv)
break
;
break
;
case
'H'
:
case
'H'
:
if
(
daemon
->
addn_hosts
)
{
{
option
=
'?'
;
struct
hostsfile
*
new
=
safe_malloc
(
sizeof
(
struct
hostsfile
))
;
problem
=
"only one addn hosts file allowed"
;
new
->
fname
=
safe_string_alloc
(
optarg
)
;
}
new
->
index
=
hosts_index
++
;
else
new
->
next
=
daemon
->
addn_hosts
;
daemon
->
addn_hosts
=
safe_string_alloc
(
optarg
)
;
daemon
->
addn_hosts
=
new
;
break
;
break
;
}
case
's'
:
case
's'
:
if
(
strcmp
(
optarg
,
"#"
)
==
0
)
if
(
strcmp
(
optarg
,
"#"
)
==
0
)
...
@@ -1009,10 +1012,11 @@ struct daemon *read_opts (int argc, char **argv)
...
@@ -1009,10 +1012,11 @@ struct daemon *read_opts (int argc, char **argv)
new
->
len
=
0
;
new
->
len
=
0
;
new
->
is_addr
=
0
;
new
->
is_addr
=
0
;
new
->
netid
=
NULL
;
new
->
netid
=
NULL
;
new
->
val
=
NULL
;
if
((
comma
=
strchr
(
optarg
,
','
)))
if
((
comma
=
strchr
(
optarg
,
','
)))
{
{
*
comma
=
0
;
*
comma
++
=
0
;
for
(
cp
=
optarg
;
*
cp
;
cp
++
)
for
(
cp
=
optarg
;
*
cp
;
cp
++
)
if
(
!
(
*
cp
==
' '
||
(
*
cp
>=
'0'
&&
*
cp
<=
'9'
)))
if
(
!
(
*
cp
==
' '
||
(
*
cp
>=
'0'
&&
*
cp
<=
'9'
)))
...
@@ -1021,9 +1025,9 @@ struct daemon *read_opts (int argc, char **argv)
...
@@ -1021,9 +1025,9 @@ struct daemon *read_opts (int argc, char **argv)
if
(
*
cp
)
if
(
*
cp
)
{
{
new
->
netid
=
safe_string_alloc
(
optarg
);
new
->
netid
=
safe_string_alloc
(
optarg
);
optarg
=
comma
+
1
;
optarg
=
comma
;
if
((
comma
=
strchr
(
optarg
,
','
)))
if
((
comma
=
strchr
(
optarg
,
','
)))
*
comma
=
0
;
*
comma
++
=
0
;
}
}
}
}
...
@@ -1031,21 +1035,74 @@ struct daemon *read_opts (int argc, char **argv)
...
@@ -1031,21 +1035,74 @@ struct daemon *read_opts (int argc, char **argv)
{
{
option
=
'?'
;
option
=
'?'
;
problem
=
"bad dhcp-opt"
;
problem
=
"bad dhcp-opt"
;
if
(
new
->
netid
)
free
(
new
->
netid
);
free
(
new
);
break
;
}
}
else
if
(
comma
&&
new
->
opt
==
119
)
{
/* dns search, RFC 3397 */
unsigned
char
*
q
,
*
r
,
*
tail
;
unsigned
char
*
p
=
NULL
;
int
newlen
,
len
=
0
;
daemon
->
dhcp_opts
=
new
;
optarg
=
comma
;
if
((
comma
=
strchr
(
optarg
,
','
)))
*
(
comma
++
)
=
0
;
if
(
!
comma
)
while
(
optarg
&&
*
optarg
)
{
if
(
!
canonicalise
(
optarg
))
{
option
=
'?'
;
problem
=
"bad dhcp-search-opt"
;
break
;
break
;
}
if
(
!
(
r
=
realloc
(
p
,
len
+
strlen
(
optarg
)
+
2
)))
die
(
"could not get memory"
,
NULL
);
p
=
memmove
(
r
,
p
,
len
);
q
=
p
+
len
;
/* add string on the end in RFC1035 format */
while
(
*
optarg
)
{
char
*
cp
=
q
++
;
int
j
;
for
(
j
=
0
;
*
optarg
&&
(
*
optarg
!=
'.'
);
optarg
++
,
j
++
)
*
q
++
=
*
optarg
;
*
cp
=
j
;
if
(
*
optarg
)
optarg
++
;
}
*
q
++
=
0
;
/* Now tail-compress using earlier names. */
newlen
=
q
-
p
;
for
(
tail
=
p
+
len
;
*
tail
;
tail
+=
(
*
tail
)
+
1
)
for
(
r
=
p
;
r
-
p
<
len
;
r
+=
(
*
r
)
+
1
)
if
(
strcmp
(
r
,
tail
)
==
0
)
{
PUTSHORT
((
r
-
p
)
|
0xc000
,
tail
);
newlen
=
tail
-
p
;
goto
end
;
}
end:
len
=
newlen
;
optarg
=
comma
;
if
(
optarg
&&
(
comma
=
strchr
(
optarg
,
','
)))
*
(
comma
++
)
=
0
;
}
new
->
len
=
len
;
new
->
val
=
p
;
}
else
if
(
comma
)
{
/* not option 119 */
/* characterise the value */
/* characterise the value */
is_addr
=
is_hex
=
is_dec
=
1
;
is_addr
=
is_hex
=
is_dec
=
1
;
addrs
=
digs
=
1
;
addrs
=
digs
=
1
;
for
(
cp
=
comma
+
1
;
*
cp
;
cp
++
)
for
(
cp
=
comma
;
*
cp
;
cp
++
)
if
(
*
cp
==
','
)
if
(
*
cp
==
','
)
{
{
addrs
++
;
addrs
++
;
...
@@ -1068,7 +1125,7 @@ struct daemon *read_opts (int argc, char **argv)
...
@@ -1068,7 +1125,7 @@ struct daemon *read_opts (int argc, char **argv)
if
(
is_hex
&&
digs
>
1
)
if
(
is_hex
&&
digs
>
1
)
{
{
char
*
p
=
comma
+
1
,
*
q
,
*
r
;
char
*
p
=
comma
,
*
q
,
*
r
;
new
->
len
=
digs
;
new
->
len
=
digs
;
q
=
new
->
val
=
safe_malloc
(
new
->
len
);
q
=
new
->
val
=
safe_malloc
(
new
->
len
);
while
(
*
p
)
while
(
*
p
)
...
@@ -1095,7 +1152,7 @@ struct daemon *read_opts (int argc, char **argv)
...
@@ -1095,7 +1152,7 @@ struct daemon *read_opts (int argc, char **argv)
{
{
/* Given that we don't know the length,
/* Given that we don't know the length,
this appaling hack is the best available */
this appaling hack is the best available */
unsigned
int
val
=
atoi
(
comma
+
1
);
unsigned
int
val
=
atoi
(
comma
);
if
(
val
<
256
)
if
(
val
<
256
)
{
{
new
->
len
=
1
;
new
->
len
=
1
;
...
@@ -1129,9 +1186,9 @@ struct daemon *read_opts (int argc, char **argv)
...
@@ -1129,9 +1186,9 @@ struct daemon *read_opts (int argc, char **argv)
while
(
addrs
--
)
while
(
addrs
--
)
{
{
cp
=
comma
;
cp
=
comma
;
if
((
comma
=
strchr
(
cp
+
1
,
','
)))
if
((
comma
=
strchr
(
cp
,
','
)))
*
comma
=
0
;
*
comma
++
=
0
;
in
.
s_addr
=
inet_addr
(
cp
+
1
);
in
.
s_addr
=
inet_addr
(
cp
);
memcpy
(
op
,
&
in
,
INADDRSZ
);
memcpy
(
op
,
&
in
,
INADDRSZ
);
op
+=
INADDRSZ
;
op
+=
INADDRSZ
;
}
}
...
@@ -1139,10 +1196,29 @@ struct daemon *read_opts (int argc, char **argv)
...
@@ -1139,10 +1196,29 @@ struct daemon *read_opts (int argc, char **argv)
else
else
{
{
/* text arg */
/* text arg */
new
->
len
=
strlen
(
comma
+
1
);
new
->
len
=
strlen
(
comma
);
new
->
val
=
safe_malloc
(
new
->
len
);
new
->
val
=
safe_malloc
(
new
->
len
);
memcpy
(
new
->
val
,
comma
+
1
,
new
->
len
);
memcpy
(
new
->
val
,
comma
,
new
->
len
);
}
}
}
if
(
new
->
len
>
256
)
{
option
=
'?'
;
problem
=
"dhcp-option too long"
;
}
if
(
option
==
'?'
)
{
if
(
new
->
netid
)
free
(
new
->
netid
);
if
(
new
->
val
)
free
(
new
->
val
);
free
(
new
);
}
else
daemon
->
dhcp_opts
=
new
;
break
;
break
;
}
}
...
...
src/rfc1035.c
View file @
fd9fa481
This diff is collapsed.
Click to expand it.
src/rfc2131.c
View file @
fd9fa481
...
@@ -408,10 +408,12 @@ int dhcp_reply(struct daemon *daemon, struct in_addr iface_addr, char *iface_nam
...
@@ -408,10 +408,12 @@ int dhcp_reply(struct daemon *daemon, struct in_addr iface_addr, char *iface_nam
(
iface_addr
.
s_addr
!=
option_addr
(
opt
).
s_addr
))
(
iface_addr
.
s_addr
!=
option_addr
(
opt
).
s_addr
))
return
0
;
return
0
;
log_packet
(
"RELEASE"
,
&
mess
->
ciaddr
,
mess
->
chaddr
,
iface_name
,
NULL
);
if
(
lease
&&
lease
->
addr
.
s_addr
==
mess
->
ciaddr
.
s_addr
)
if
(
lease
&&
lease
->
addr
.
s_addr
==
mess
->
ciaddr
.
s_addr
)
lease_prune
(
lease
,
now
);
lease_prune
(
lease
,
now
);
else
message
=
"unknown lease"
;
log_packet
(
"RELEASE"
,
&
mess
->
ciaddr
,
mess
->
chaddr
,
iface_name
,
message
);
return
0
;
return
0
;
...
@@ -473,22 +475,14 @@ int dhcp_reply(struct daemon *daemon, struct in_addr iface_addr, char *iface_nam
...
@@ -473,22 +475,14 @@ int dhcp_reply(struct daemon *daemon, struct in_addr iface_addr, char *iface_nam
lease_prune
(
lease
,
now
);
lease_prune
(
lease
,
now
);
lease
=
NULL
;
lease
=
NULL
;
}
}
if
(
!
lease
)
{
if
(
lease_find_by_addr
(
mess
->
yiaddr
))
message
=
"address in use"
;
else
if
(
!
(
lease
=
lease_allocate
(
clid
,
clid_len
,
mess
->
yiaddr
)))
message
=
"no leases left"
;
}
}
}
else
else
{
{
/* INIT-REBOOT */
/* INIT-REBOOT */
if
(
!
lease
)
if
(
!
lease
&&
!
(
daemon
->
options
&
OPT_AUTHORITATIVE
)
)
return
0
;
return
0
;
if
(
lease
->
addr
.
s_addr
!=
mess
->
yiaddr
.
s_addr
)
if
(
lease
&&
lease
->
addr
.
s_addr
!=
mess
->
yiaddr
.
s_addr
)
message
=
"wrong address"
;
message
=
"wrong address"
;
}
}
}
}
...
@@ -507,31 +501,40 @@ int dhcp_reply(struct daemon *daemon, struct in_addr iface_addr, char *iface_nam
...
@@ -507,31 +501,40 @@ int dhcp_reply(struct daemon *daemon, struct in_addr iface_addr, char *iface_nam
mess
->
yiaddr
=
mess
->
ciaddr
;
mess
->
yiaddr
=
mess
->
ciaddr
;
}
}
log_packet
(
"REQUEST"
,
&
mess
->
yiaddr
,
mess
->
chaddr
,
iface_name
,
NULL
);
if
(
!
message
)
if
(
!
message
)
{
{
struct
dhcp_config
*
addr_config
;
struct
dhcp_config
*
addr_config
;
/* If a machine moves networks whilst it has a lease, we catch that here. */
/* If a machine moves networks whilst it has a lease, we catch that here. */
if
(
!
is_same_net
(
mess
->
yiaddr
,
context
->
start
,
context
->
netmask
))
if
(
!
is_same_net
(
mess
->
yiaddr
,
context
->
start
,
context
->
netmask
))
message
=
"wrong network"
;
message
=
"wrong network"
;
/* Check for renewal of a lease which is
now
outside the allowed range. */
/* Check for renewal of a lease which is outside the allowed range. */
else
if
(
!
address_available
(
context
,
mess
->
yiaddr
)
&&
else
if
(
!
address_available
(
context
,
mess
->
yiaddr
)
&&
(
!
have_config
(
config
,
CONFIG_ADDR
)
||
config
->
addr
.
s_addr
!=
mess
->
yiaddr
.
s_addr
))
(
!
have_config
(
config
,
CONFIG_ADDR
)
||
config
->
addr
.
s_addr
!=
mess
->
yiaddr
.
s_addr
))
message
=
"address no
longer
available"
;
message
=
"address no
t
available"
;
/* Check if a new static address has been configured. Be very sure that
/* Check if a new static address has been configured. Be very sure that
when the client does DISCOVER, it will get the static address, otherwise
when the client does DISCOVER, it will get the static address, otherwise
an endless protocol loop will ensue. */
an endless protocol loop will ensue. */
else
if
(
have_config
(
config
,
CONFIG_ADDR
)
&&
!
lease_find_by_addr
(
config
->
addr
))
else
if
(
have_config
(
config
,
CONFIG_ADDR
)
&&
config
->
addr
.
s_addr
!=
mess
->
yiaddr
.
s_addr
&&
(
!
(
ltmp
=
lease_find_by_addr
(
config
->
addr
))
||
ltmp
==
lease
))
message
=
"static lease available"
;
message
=
"static lease available"
;
/* Check to see if the address is reserved as a static address for another host */
/* Check to see if the address is reserved as a static address for another host */
else
if
((
addr_config
=
config_find_by_address
(
daemon
->
dhcp_conf
,
mess
->
yiaddr
))
&&
addr_config
!=
config
)
else
if
((
addr_config
=
config_find_by_address
(
daemon
->
dhcp_conf
,
mess
->
yiaddr
))
&&
addr_config
!=
config
)
message
=
"address reserved"
;
message
=
"address reserved"
;
}
log_packet
(
"REQUEST"
,
&
mess
->
yiaddr
,
mess
->
chaddr
,
iface_name
,
NULL
);
else
if
((
ltmp
=
lease_find_by_addr
(
mess
->
yiaddr
))
&&
ltmp
!=
lease
)
message
=
"address in use"
;
else
if
(
!
lease
&&
!
(
lease
=
lease_allocate
(
clid
,
clid_len
,
mess
->
yiaddr
)))
message
=
"no leases left"
;
}
if
(
message
)
if
(
message
)
{
{
...
@@ -541,11 +544,10 @@ int dhcp_reply(struct daemon *daemon, struct in_addr iface_addr, char *iface_nam
...
@@ -541,11 +544,10 @@ int dhcp_reply(struct daemon *daemon, struct in_addr iface_addr, char *iface_nam
bootp_option_put
(
mess
,
NULL
,
NULL
);
bootp_option_put
(
mess
,
NULL
,
NULL
);
p
=
option_put
(
p
,
end
,
OPTION_MESSAGE_TYPE
,
1
,
DHCPNAK
);
p
=
option_put
(
p
,
end
,
OPTION_MESSAGE_TYPE
,
1
,
DHCPNAK
);
p
=
option_put_string
(
p
,
end
,
OPTION_MESSAGE
,
message
);
p
=
option_put_string
(
p
,
end
,
OPTION_MESSAGE
,
message
);
p
=
option_end
(
p
,
end
,
mess
);
mess
->
flags
|=
htons
(
0x8000
);
/* broadcast */
mess
->
flags
|=
htons
(
0x8000
);
/* broadcast */
return
p
-
(
unsigned
char
*
)
mess
;
}
}
else
{
log_packet
(
"ACK"
,
&
mess
->
yiaddr
,
mess
->
chaddr
,
iface_name
,
hostname
);
log_packet
(
"ACK"
,
&
mess
->
yiaddr
,
mess
->
chaddr
,
iface_name
,
hostname
);
lease_set_hwaddr
(
lease
,
mess
->
chaddr
);
lease_set_hwaddr
(
lease
,
mess
->
chaddr
);
...
@@ -565,6 +567,8 @@ int dhcp_reply(struct daemon *daemon, struct in_addr iface_addr, char *iface_nam
...
@@ -565,6 +567,8 @@ int dhcp_reply(struct daemon *daemon, struct in_addr iface_addr, char *iface_nam
}
}
p
=
do_req_options
(
context
,
p
,
end
,
req_options
,
daemon
,
p
=
do_req_options
(
context
,
p
,
end
,
req_options
,
daemon
,
hostname
,
iface_addr
,
netid
,
subnet_addr
);
hostname
,
iface_addr
,
netid
,
subnet_addr
);
}
p
=
option_end
(
p
,
end
,
mess
);
p
=
option_end
(
p
,
end
,
mess
);
return
p
-
(
unsigned
char
*
)
mess
;
return
p
-
(
unsigned
char
*
)
mess
;
...
...
src/util.c
View file @
fd9fa481
...
@@ -251,3 +251,20 @@ int is_same_net(struct in_addr a, struct in_addr b, struct in_addr mask)
...
@@ -251,3 +251,20 @@ int is_same_net(struct in_addr a, struct in_addr b, struct in_addr mask)
{
{
return
(
a
.
s_addr
&
mask
.
s_addr
)
==
(
b
.
s_addr
&
mask
.
s_addr
);
return
(
a
.
s_addr
&
mask
.
s_addr
)
==
(
b
.
s_addr
&
mask
.
s_addr
);
}
}
int
retry_send
(
void
)
{
struct
timespec
waiter
;
if
(
errno
==
EAGAIN
)
{
waiter
.
tv_sec
=
0
;
waiter
.
tv_nsec
=
10000
;
nanosleep
(
&
waiter
,
NULL
);
return
1
;
}
if
(
errno
==
EINTR
)
return
1
;
return
0
;
}
Write
Preview
Markdown
is supported
0%
Try again
or
attach a new file
Attach a file
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Cancel
Please
register
or
sign in
to comment