/* * PPP Link Control Protocol (LCP) Module * * Written by Toshiharu OHNO (tony-o@iij.ad.jp) * * Copyright (C) 1993, Internet Initiative Japan, Inc. All rights reserverd. * * Redistribution and use in source and binary forms are permitted * provided that the above copyright notice and this paragraph are * duplicated in all such forms and that any documentation, * advertising materials, and other materials related to such * distribution and use acknowledge that the software was developed * by the Internet Initiative Japan, Inc. The name of the * IIJ may not be used to endorse or promote products derived * from this software without specific prior written permission. * THIS SOFTWARE IS PROVIDED ``AS IS'' AND WITHOUT ANY EXPRESS OR * IMPLIED WARRANTIES, INCLUDING, WITHOUT LIMITATION, THE IMPLIED * WARRANTIES OF MERCHANTIBILITY AND FITNESS FOR A PARTICULAR PURPOSE. * * $Id: lcp.c,v 1.32 1997/09/22 02:51:24 brian Exp $ * * TODO: * o Validate magic number received from peer. * o Limit data field length by MRU */ #include #include #include #include #include "fsm.h" #include "lcp.h" #include "ipcp.h" #include "lcpproto.h" #include "os.h" #include "hdlc.h" #include "ccp.h" #include "lqr.h" #include "phase.h" #include "loadalias.h" #include "vars.h" #include "auth.h" #include "timeout.h" extern void IpcpUp(); extern void IpcpOpen(); extern void SetLinkParams(struct lcpstate *); extern void Prompt(); extern void Cleanup(); extern struct pppTimer IpcpReportTimer; extern int randinit; struct lcpstate LcpInfo; static void LcpSendConfigReq(struct fsm *); static void LcpSendTerminateReq(struct fsm * fp); static void LcpSendTerminateAck(struct fsm * fp); static void LcpDecodeConfig(u_char * cp, int flen, int mode); static void LcpInitRestartCounter(struct fsm *); static void LcpLayerUp(struct fsm *); static void LcpLayerDown(struct fsm *); static void LcpLayerStart(struct fsm *); static void LcpLayerFinish(struct fsm *); extern int ModemSpeed(); #define REJECTED(p, x) (p->his_reject & (1<auth_ineed = lcp->want_auth; lcp->auth_iwait = lcp->his_auth; if (lcp->his_auth || lcp->want_auth) { LogPrintf(LogPHASE, " his = %x, mine = %x\n", lcp->his_auth, lcp->want_auth); if (lcp->his_auth == PROTO_PAP) StartAuthChallenge(&AuthPapInfo); if (lcp->want_auth == PROTO_CHAP) StartAuthChallenge(&AuthChapInfo); } else NewPhase(PHASE_NETWORK); break; case PHASE_NETWORK: IpcpUp(); IpcpOpen(); CcpUp(); CcpOpen(); break; case PHASE_DEAD: if (mode & MODE_DIRECT) Cleanup(EX_DEAD); if (mode & MODE_BACKGROUND && reconnectState != RECON_TRUE) Cleanup(EX_DEAD); break; } } static void LcpReportTime() { if (LogIsKept(LogDEBUG)) { time_t t; time(&t); LogPrintf(LogDEBUG, "LcpReportTime: %s\n", ctime(&t)); } StopTimer(&LcpReportTimer); LcpReportTimer.state = TIMER_STOPPED; StartTimer(&LcpReportTimer); HdlcErrorCheck(); } int ReportLcpStatus() { struct lcpstate *lcp = &LcpInfo; struct fsm *fp = &LcpFsm; if (!VarTerm) return 1; fprintf(VarTerm, "%s [%s]\n", fp->name, StateNames[fp->state]); fprintf(VarTerm, " his side: MRU %ld, ACCMAP %08lx, PROTOCOMP %d, ACFCOMP %d, MAGIC %08lx,\n" " REJECT %04lx\n", lcp->his_mru, lcp->his_accmap, lcp->his_protocomp, lcp->his_acfcomp, lcp->his_magic, lcp->his_reject); fprintf(VarTerm, " my side: MRU %ld, ACCMAP %08lx, PROTOCOMP %d, ACFCOMP %d, MAGIC %08lx,\n" " REJECT %04lx\n", lcp->want_mru, lcp->want_accmap, lcp->want_protocomp, lcp->want_acfcomp, lcp->want_magic, lcp->my_reject); fprintf(VarTerm, "\nDefaults: MRU = %ld, ACCMAP = %08x\t", VarMRU, VarAccmap); fprintf(VarTerm, "Open Mode: %s\n", (VarOpenMode == OPEN_ACTIVE) ? "active" : "passive"); return 0; } /* * Generate random number which will be used as magic number. */ u_long GenerateMagic() { if (!randinit) { randinit = 1; srandomdev(); } return (random()); } void LcpInit() { struct lcpstate *lcp = &LcpInfo; FsmInit(&LcpFsm); HdlcInit(); bzero(lcp, sizeof(struct lcpstate)); lcp->want_mru = VarMRU; lcp->his_mru = DEF_MRU; lcp->his_accmap = 0xffffffff; lcp->want_accmap = VarAccmap; lcp->want_magic = GenerateMagic(); lcp->want_auth = lcp->his_auth = 0; if (Enabled(ConfChap)) lcp->want_auth = PROTO_CHAP; else if (Enabled(ConfPap)) lcp->want_auth = PROTO_PAP; if (Enabled(ConfLqr)) lcp->want_lqrperiod = VarLqrTimeout * 100; if (Enabled(ConfAcfcomp)) lcp->want_acfcomp = 1; if (Enabled(ConfProtocomp)) lcp->want_protocomp = 1; LcpFsm.maxconfig = 10; } static void LcpInitRestartCounter(struct fsm * fp) { fp->FsmTimer.load = VarRetryTimeout * SECTICKS; fp->restart = 5; } void PutConfValue(u_char ** cpp, char **types, u_char type, int len, u_long val) { u_char *cp; struct in_addr ina; cp = *cpp; *cp++ = type; *cp++ = len; if (len == 6) { if (type == TY_IPADDR) { ina.s_addr = htonl(val); LogPrintf(LogLCP, " %s [%d] %s\n", types[type], len, inet_ntoa(ina)); } else { LogPrintf(LogLCP, " %s [%d] %08x\n", types[type], len, val); } *cp++ = (val >> 24) & 0377; *cp++ = (val >> 16) & 0377; } else LogPrintf(LogLCP, " %s [%d] %d\n", types[type], len, val); *cp++ = (val >> 8) & 0377; *cp++ = val & 0377; *cpp = cp; } static void LcpSendConfigReq(struct fsm * fp) { u_char *cp; struct lcpstate *lcp = &LcpInfo; struct lqrreq *req; LogPrintf(LogLCP, "LcpSendConfigReq\n"); cp = ReqBuff; if (!DEV_IS_SYNC) { if (lcp->want_acfcomp && !REJECTED(lcp, TY_ACFCOMP)) { *cp++ = TY_ACFCOMP; *cp++ = 2; LogPrintf(LogLCP, " %s\n", cftypes[TY_ACFCOMP]); } if (lcp->want_protocomp && !REJECTED(lcp, TY_PROTOCOMP)) { *cp++ = TY_PROTOCOMP; *cp++ = 2; LogPrintf(LogLCP, " %s\n", cftypes[TY_PROTOCOMP]); } if (!REJECTED(lcp, TY_ACCMAP)) PutConfValue(&cp, cftypes, TY_ACCMAP, 6, lcp->want_accmap); } if (!REJECTED(lcp, TY_MRU)) PutConfValue(&cp, cftypes, TY_MRU, 4, lcp->want_mru); if (lcp->want_magic && !REJECTED(lcp, TY_MAGICNUM)) PutConfValue(&cp, cftypes, TY_MAGICNUM, 6, lcp->want_magic); if (lcp->want_lqrperiod && !REJECTED(lcp, TY_QUALPROTO)) { req = (struct lqrreq *) cp; req->type = TY_QUALPROTO; req->length = sizeof(struct lqrreq); req->proto = htons(PROTO_LQR); req->period = htonl(lcp->want_lqrperiod); cp += sizeof(struct lqrreq); LogPrintf(LogLCP, " %s (%d)\n", cftypes[TY_QUALPROTO], lcp->want_lqrperiod); } switch (lcp->want_auth) { case PROTO_PAP: PutConfValue(&cp, cftypes, TY_AUTHPROTO, 4, lcp->want_auth); break; case PROTO_CHAP: PutConfValue(&cp, cftypes, TY_AUTHPROTO, 5, lcp->want_auth); *cp++ = VarEncMD4 ? 0x80 : 0x05; /* Use MD4/MD5 */ break; } FsmOutput(fp, CODE_CONFIGREQ, fp->reqid++, ReqBuff, cp - ReqBuff); } void LcpSendProtoRej(u_char * option, int count) { struct fsm *fp = &LcpFsm; LogPrintf(LogLCP, "LcpSendProtoRej\n"); FsmOutput(fp, CODE_PROTOREJ, fp->reqid, option, count); } static void LcpSendTerminateReq(struct fsm * fp) { /* Most thins are done in fsm layer. Nothing to to. */ } static void LcpSendTerminateAck(struct fsm * fp) { LogPrintf(LogLCP, "LcpSendTerminateAck.\n"); FsmOutput(fp, CODE_TERMACK, fp->reqid++, NULL, 0); } static void LcpLayerStart(struct fsm * fp) { LogPrintf(LogLCP, "LcpLayerStart\n"); NewPhase(PHASE_ESTABLISH); } static void StopAllTimers() { StopTimer(&LcpReportTimer); StopTimer(&IpcpReportTimer); StopIdleTimer(); StopTimer(&AuthPapInfo.authtimer); StopTimer(&AuthChapInfo.authtimer); StopLqrTimer(); } static void LcpLayerFinish(struct fsm * fp) { LogPrintf(LogLCP, "LcpLayerFinish\n"); OsCloseLink(1); NewPhase(PHASE_DEAD); StopAllTimers(); (void) OsInterfaceDown(0); Prompt(); } static void LcpLayerUp(struct fsm * fp) { LogPrintf(LogLCP, "LcpLayerUp\n"); OsSetInterfaceParams(23, LcpInfo.his_mru, ModemSpeed()); SetLinkParams(&LcpInfo); NewPhase(PHASE_AUTHENTICATE); StartLqm(); StopTimer(&LcpReportTimer); LcpReportTimer.state = TIMER_STOPPED; LcpReportTimer.load = 60 * SECTICKS; LcpReportTimer.func = LcpReportTime; StartTimer(&LcpReportTimer); } static void LcpLayerDown(struct fsm * fp) { StopAllTimers(); OsLinkdown(); LogPrintf(LogLCP, "LcpLayerDown\n"); NewPhase(PHASE_TERMINATE); } void LcpUp() { FsmUp(&LcpFsm); LcpFailedMagic = 0; } void LcpDown() { /* Sudden death */ LcpFailedMagic = 0; NewPhase(PHASE_DEAD); StopAllTimers(); FsmDown(&LcpFsm); } void LcpOpen(int mode) { LcpFsm.open_mode = mode; LcpFailedMagic = 0; FsmOpen(&LcpFsm); } void LcpClose() { FsmClose(&LcpFsm); LcpFailedMagic = 0; } /* * XXX: Should validate option length */ static void LcpDecodeConfig(u_char * cp, int plen, int mode) { char *request; int type, length, mru; u_long *lp, magic, accmap; u_short *sp, proto; struct lqrreq *req; ackp = AckBuff; nakp = NakBuff; rejp = RejBuff; while (plen >= sizeof(struct fsmconfig)) { type = *cp; length = cp[1]; if (type <= TY_ACFCOMP) request = cftypes[type]; else request = "???"; switch (type) { case TY_MRU: sp = (u_short *) (cp + 2); mru = htons(*sp); LogPrintf(LogLCP, " %s %d\n", request, mru); switch (mode) { case MODE_REQ: if (mru > MAX_MRU) { *sp = htons(MAX_MRU); bcopy(cp, nakp, 4); nakp += 4; } else if (mru < MIN_MRU) { *sp = htons(MIN_MRU); bcopy(cp, nakp, 4); nakp += 4; } else { LcpInfo.his_mru = mru; bcopy(cp, ackp, 4); ackp += 4; } break; case MODE_NAK: if (mru >= MIN_MRU || mru <= MAX_MRU) LcpInfo.want_mru = mru; break; case MODE_REJ: LcpInfo.his_reject |= (1 << type); break; } break; case TY_ACCMAP: lp = (u_long *) (cp + 2); accmap = htonl(*lp); LogPrintf(LogLCP, " %s %08x\n", request, accmap); switch (mode) { case MODE_REQ: LcpInfo.his_accmap = accmap; bcopy(cp, ackp, 6); ackp += 6; break; case MODE_NAK: LcpInfo.want_accmap = accmap; break; case MODE_REJ: LcpInfo.his_reject |= (1 << type); break; } break; case TY_AUTHPROTO: sp = (u_short *) (cp + 2); proto = ntohs(*sp); LogPrintf(LogLCP, " %s proto = %04x\n", request, proto); switch (mode) { case MODE_REQ: switch (proto) { case PROTO_PAP: if (length != 4) { LogPrintf(LogLCP, " %s bad length (%d)\n", request, length); goto reqreject; } if (Acceptable(ConfPap)) { LcpInfo.his_auth = proto; bcopy(cp, ackp, length); ackp += length; } else if (Acceptable(ConfChap)) { *nakp++ = *cp; *nakp++ = 5; *nakp++ = (unsigned char) (PROTO_CHAP >> 8); *nakp++ = (unsigned char) PROTO_CHAP; *nakp++ = 5; } else goto reqreject; break; case PROTO_CHAP: if (length < 5) { LogPrintf(LogLCP, " %s bad length (%d)\n", request, length); goto reqreject; } if (Acceptable(ConfChap) && (cp[4] == 5 || cp[4] == 0x80)) { LcpInfo.his_auth = proto; bcopy(cp, ackp, length); ackp += length; VarEncMD4 = cp[4] == 0x80; } else if (Acceptable(ConfPap)) { *nakp++ = *cp; *nakp++ = 4; *nakp++ = (unsigned char) (PROTO_PAP >> 8); *nakp++ = (unsigned char) PROTO_PAP; } else goto reqreject; break; default: LogPrintf(LogLCP, " %s not implemented, NAK.\n", request); bcopy(cp, nakp, length); nakp += length; break; } break; case MODE_NAK: break; case MODE_REJ: LcpInfo.his_reject |= (1 << type); break; } break; case TY_QUALPROTO: req = (struct lqrreq *) cp; LogPrintf(LogLCP, " %s proto: %x, interval: %dms\n", request, ntohs(req->proto), ntohl(req->period) * 10); switch (mode) { case MODE_REQ: if (ntohs(req->proto) != PROTO_LQR || !Acceptable(ConfLqr)) goto reqreject; else { LcpInfo.his_lqrperiod = ntohl(req->period); if (LcpInfo.his_lqrperiod < 500) LcpInfo.his_lqrperiod = 500; req->period = htonl(LcpInfo.his_lqrperiod); bcopy(cp, ackp, length); ackp += length; } break; case MODE_NAK: break; case MODE_REJ: LcpInfo.his_reject |= (1 << type); break; } break; case TY_MAGICNUM: lp = (u_long *) (cp + 2); magic = ntohl(*lp); LogPrintf(LogLCP, " %s %08x\n", request, magic); switch (mode) { case MODE_REQ: if (LcpInfo.want_magic) { /* Validate magic number */ if (magic == LcpInfo.want_magic) { LogPrintf(LogLCP, "Magic is same (%08x) - %d times\n", magic, ++LcpFailedMagic); LcpInfo.want_magic = GenerateMagic(); bcopy(cp, nakp, 6); nakp += 6; ualarm(TICKUNIT * (4 + 4 * LcpFailedMagic), 0); sigpause(0); } else { LcpInfo.his_magic = magic; bcopy(cp, ackp, length); ackp += length; LcpFailedMagic = 0; } } else { LcpInfo.my_reject |= (1 << type); goto reqreject; } break; case MODE_NAK: LogPrintf(LogLCP, " %s magic %08x has NAKed\n", request, magic); LcpInfo.want_magic = GenerateMagic(); break; case MODE_REJ: LogPrintf(LogLCP, " %s magic has REJected\n", request); LcpInfo.want_magic = 0; LcpInfo.his_reject |= (1 << type); break; } break; case TY_PROTOCOMP: LogPrintf(LogLCP, " %s\n", request); switch (mode) { case MODE_REQ: if (Acceptable(ConfProtocomp)) { LcpInfo.his_protocomp = 1; bcopy(cp, ackp, 2); ackp += 2; } else { #ifdef OLDMST /* * MorningStar before v1.3 needs NAK */ bcopy(cp, nakp, 2); nakp += 2; #else bcopy(cp, rejp, 2); rejp += 2; LcpInfo.my_reject |= (1 << type); #endif } break; case MODE_NAK: case MODE_REJ: LcpInfo.want_protocomp = 0; LcpInfo.his_reject |= (1 << type); break; } break; case TY_ACFCOMP: LogPrintf(LogLCP, " %s\n", request); switch (mode) { case MODE_REQ: if (Acceptable(ConfAcfcomp)) { LcpInfo.his_acfcomp = 1; bcopy(cp, ackp, 2); ackp += 2; } else { #ifdef OLDMST /* * MorningStar before v1.3 needs NAK */ bcopy(cp, nakp, 2); nakp += 2; #else bcopy(cp, rejp, 2); rejp += 2; LcpInfo.my_reject |= (1 << type); #endif } break; case MODE_NAK: case MODE_REJ: LcpInfo.want_acfcomp = 0; LcpInfo.his_reject |= (1 << type); break; } break; case TY_SDP: LogPrintf(LogLCP, " %s\n", request); switch (mode) { case MODE_REQ: case MODE_NAK: case MODE_REJ: break; } break; default: LogPrintf(LogLCP, " ???[%02x]\n", type); if (mode == MODE_REQ) { reqreject: bcopy(cp, rejp, length); rejp += length; LcpInfo.my_reject |= (1 << type); } break; } /* to avoid inf. loop */ if (length == 0) { LogPrintf(LogLCP, "LCP size zero\n"); break; } plen -= length; cp += length; } } void LcpInput(struct mbuf * bp) { FsmInput(&LcpFsm, bp); }