1 /*
2 *
3 * Modified for AF_INET6 by Pedro Roque
4 *
5 * <roque@di.fc.ul.pt>
6 *
7 * Original copyright notice included bellow
8 */
9
10 /*
11 * Copyright (c) 1989 The Regents of the University of California.
12 * All rights reserved.
13 *
14 * This code is derived from software contributed to Berkeley by
15 * Mike Muuss.
16 *
17 * Redistribution and use in source and binary forms, with or without
18 * modification, are permitted provided that the following conditions
19 * are met:
20 * 1. Redistributions of source code must retain the above copyright
21 * notice, this list of conditions and the following disclaimer.
22 * 2. Redistributions in binary form must reproduce the above copyright
23 * notice, this list of conditions and the following disclaimer in the
24 * documentation and/or other materials provided with the distribution.
25 * 3. All advertising materials mentioning features or use of this software
26 * must display the following acknowledgement:
27 * This product includes software developed by the University of
28 * California, Berkeley and its contributors.
29 * 4. Neither the name of the University nor the names of its contributors
30 * may be used to endorse or promote products derived from this software
31 * without specific prior written permission.
32 *
33 * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
34 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
35 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
36 * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
37 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
38 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
39 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
40 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
41 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
42 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
43 * SUCH DAMAGE.
44 */
45
46 #ifndef lint
47 char copyright[] =
48 "@(#) Copyright (c) 1989 The Regents of the University of California.\n\
49 All rights reserved.\n";
50 #endif /* not lint */
51
52 /*
53 * P I N G . C
54 *
55 * Using the InterNet Control Message Protocol (ICMP) "ECHO" facility,
56 * measure round-trip-delays and packet loss across network paths.
57 *
58 * Author -
59 * Mike Muuss
60 * U. S. Army Ballistic Research Laboratory
61 * December, 1983
62 *
63 * Status -
64 * Public Domain. Distribution Unlimited.
65 * Bugs -
66 * More statistics could always be gathered.
67 * This program has to run SUID to ROOT to access the ICMP socket.
68 */
69 #include "ping_common.h"
70
71 #include <linux/filter.h>
72 #include <netinet/ip6.h>
73 #include <netinet/icmp6.h>
74 #include <resolv.h>
75 #ifndef WITHOUT_IFADDRS
76 #include <ifaddrs.h>
77 #endif
78
79 #ifdef USE_IDN
80 #include <stringprep.h>
81 #endif
82
83 #include "ping6_niquery.h"
84 #include "in6_flowlabel.h"
85
86 #ifndef SOL_IPV6
87 #define SOL_IPV6 IPPROTO_IPV6
88 #endif
89
90 #ifndef SOL_ICMPV6
91 #define SOL_ICMPV6 IPPROTO_ICMPV6
92 #endif
93
94 /* RFC3542 */
95 #ifndef ICMP6_DST_UNREACH_BEYONDSCOPE
96 #define ICMP6_DST_UNREACH_BEYONDSCOPE ICMP6_DST_UNREACH_NOTNEIGHBOR
97 #endif
98
99 #if defined(ENABLE_PING6_RTHDR) && !defined(ENABLE_PING6_RTHDR_RFC3542)
100 #ifndef IPV6_SRCRT_TYPE_0
101 #define IPV6_SRCRT_TYPE_0 0
102 #endif
103 #endif
104
105 #ifndef MLD_LISTENER_QUERY
106 #define MLD_LISTENER_QUERY 130
107 #define MLD_LISTENER_REPORT 131
108 #define MLD_LISTENER_REDUCTION 132
109 #endif
110
111 #define BIT_CLEAR(nr, addr) do { ((__u32 *)(addr))[(nr) >> 5] &= ~(1U << ((nr) & 31)); } while(0)
112 #define BIT_SET(nr, addr) do { ((__u32 *)(addr))[(nr) >> 5] |= (1U << ((nr) & 31)); } while(0)
113 #define BIT_TEST(nr, addr) do { (__u32 *)(addr))[(nr) >> 5] & (1U << ((nr) & 31)); } while(0)
114
115 #ifndef ICMP6_FILTER_WILLPASS
116 #define ICMP6_FILTER_WILLPASS(type, filterp) \
117 (BIT_TEST((type), filterp) == 0)
118
119 #define ICMP6_FILTER_WILLBLOCK(type, filterp) \
120 BIT_TEST((type), filterp)
121
122 #define ICMP6_FILTER_SETPASS(type, filterp) \
123 BIT_CLEAR((type), filterp)
124
125 #define ICMP6_FILTER_SETBLOCK(type, filterp) \
126 BIT_SET((type), filterp)
127
128 #define ICMP6_FILTER_SETPASSALL(filterp) \
129 memset(filterp, 0, sizeof(struct icmp6_filter));
130
131 #define ICMP6_FILTER_SETBLOCKALL(filterp) \
132 memset(filterp, 0xFF, sizeof(struct icmp6_filter));
133 #endif
134
135 #define MAXPACKET 128000 /* max packet size */
136
137 #ifdef SO_TIMESTAMP
138 #define HAVE_SIN6_SCOPEID 1
139 #endif
140
141 #ifndef SCOPE_DELIMITER
142 # define SCOPE_DELIMITER '%'
143 #endif
144
145 __u32 flowlabel;
146 __u32 tclass;
147 #ifdef ENABLE_PING6_RTHDR
148 struct cmsghdr *srcrt;
149 #endif
150
151 struct sockaddr_in6 whereto; /* who to ping */
152 u_char outpack[MAXPACKET];
153 int maxpacket = sizeof(outpack);
154
155 static unsigned char cmsgbuf[4096];
156 static int cmsglen = 0;
157
158 static char * pr_addr(struct in6_addr *addr);
159 static char * pr_addr_n(struct in6_addr *addr);
160 static int pr_icmph(__u8 type, __u8 code, __u32 info);
161 static void usage(void) __attribute((noreturn));
162
163 struct sockaddr_in6 source;
164 char *device;
165 int pmtudisc=-1;
166
167 static int icmp_sock;
168
169 #ifdef USE_GNUTLS
170 # include <gnutls/openssl.h>
171 #else
172 # include <openssl/md5.h>
173 #endif
174
175 /* Node Information query */
176 int ni_query = -1;
177 int ni_flag = 0;
178 void *ni_subject = NULL;
179 int ni_subject_len = 0;
180 int ni_subject_type = -1;
181 char *ni_group;
182
ntohsp(__u16 * p)183 static inline int ntohsp(__u16 *p)
184 {
185 __u16 v;
186 memcpy(&v, p, sizeof(v));
187 return ntohs(v);
188 }
189
190 #if defined(ENABLE_PING6_RTHDR) && !defined(ENABLE_PING6_RTHDR_RFC3542)
inet6_srcrt_space(int type,int segments)191 size_t inet6_srcrt_space(int type, int segments)
192 {
193 if (type != 0 || segments > 24)
194 return 0;
195
196 return (sizeof(struct cmsghdr) + sizeof(struct ip6_rthdr0) +
197 segments * sizeof(struct in6_addr));
198 }
199
inet6_srcrt_init(void * bp,int type)200 extern struct cmsghdr * inet6_srcrt_init(void *bp, int type)
201 {
202 struct cmsghdr *cmsg;
203
204 if (type)
205 return NULL;
206
207 memset(bp, 0, sizeof(struct cmsghdr) + sizeof(struct ip6_rthdr0));
208 cmsg = (struct cmsghdr *) bp;
209
210 cmsg->cmsg_len = sizeof(struct cmsghdr) + sizeof(struct ip6_rthdr0);
211 cmsg->cmsg_level = SOL_IPV6;
212 cmsg->cmsg_type = IPV6_RTHDR;
213
214 return cmsg;
215 }
216
inet6_srcrt_add(struct cmsghdr * cmsg,const struct in6_addr * addr)217 int inet6_srcrt_add(struct cmsghdr *cmsg, const struct in6_addr *addr)
218 {
219 struct ip6_rthdr0 *hdr;
220
221 hdr = (struct ip6_rthdr0 *) CMSG_DATA(cmsg);
222
223 cmsg->cmsg_len += sizeof(struct in6_addr);
224 hdr->ip6r0_len += sizeof(struct in6_addr) / 8;
225
226 memcpy(&hdr->ip6r0_addr[hdr->ip6r0_segleft++], addr,
227 sizeof(struct in6_addr));
228
229 return 0;
230 }
231 #endif
232
if_name2index(const char * ifname)233 unsigned int if_name2index(const char *ifname)
234 {
235 unsigned int i = if_nametoindex(ifname);
236 if (!i) {
237 fprintf(stderr, "ping: unknown iface %s\n", ifname);
238 exit(2);
239 }
240 return i;
241 }
242
243 struct niquery_option {
244 char *name;
245 int namelen;
246 int has_arg;
247 int data;
248 int (*handler)(int index, const char *arg);
249 };
250
251 #define NIQUERY_OPTION(_name, _has_arg, _data, _handler) \
252 { \
253 .name = _name, \
254 .namelen = sizeof(_name) - 1, \
255 .has_arg = _has_arg, \
256 .data = _data, \
257 .handler = _handler \
258 }
259
260 static int niquery_option_name_handler(int index, const char *arg);
261 static int niquery_option_ipv6_handler(int index, const char *arg);
262 static int niquery_option_ipv6_flag_handler(int index, const char *arg);
263 static int niquery_option_ipv4_handler(int index, const char *arg);
264 static int niquery_option_ipv4_flag_handler(int index, const char *arg);
265 static int niquery_option_subject_addr_handler(int index, const char *arg);
266 static int niquery_option_subject_name_handler(int index, const char *arg);
267 static int niquery_option_help_handler(int index, const char *arg);
268
269 struct niquery_option niquery_options[] = {
270 NIQUERY_OPTION("name", 0, 0, niquery_option_name_handler),
271 NIQUERY_OPTION("fqdn", 0, 0, niquery_option_name_handler),
272 NIQUERY_OPTION("ipv6", 0, 0, niquery_option_ipv6_handler),
273 NIQUERY_OPTION("ipv6-all", 0, NI_IPV6ADDR_F_ALL, niquery_option_ipv6_flag_handler),
274 NIQUERY_OPTION("ipv6-compatible", 0, NI_IPV6ADDR_F_COMPAT, niquery_option_ipv6_flag_handler),
275 NIQUERY_OPTION("ipv6-linklocal", 0, NI_IPV6ADDR_F_LINKLOCAL, niquery_option_ipv6_flag_handler),
276 NIQUERY_OPTION("ipv6-sitelocal", 0, NI_IPV6ADDR_F_SITELOCAL, niquery_option_ipv6_flag_handler),
277 NIQUERY_OPTION("ipv6-global", 0, NI_IPV6ADDR_F_GLOBAL, niquery_option_ipv6_flag_handler),
278 NIQUERY_OPTION("ipv4", 0, 0, niquery_option_ipv4_handler),
279 NIQUERY_OPTION("ipv4-all", 0, NI_IPV4ADDR_F_ALL, niquery_option_ipv4_flag_handler),
280 NIQUERY_OPTION("subject-ipv6", 1, NI_SUBJ_IPV6, niquery_option_subject_addr_handler),
281 NIQUERY_OPTION("subject-ipv4", 1, NI_SUBJ_IPV4, niquery_option_subject_addr_handler),
282 NIQUERY_OPTION("subject-name", 1, 0, niquery_option_subject_name_handler),
283 NIQUERY_OPTION("subject-fqdn", 1, -1, niquery_option_subject_name_handler),
284 NIQUERY_OPTION("help", 0, 0, niquery_option_help_handler),
285 {},
286 };
287
niquery_is_enabled(void)288 static inline int niquery_is_enabled(void)
289 {
290 return ni_query >= 0;
291 }
292
293 #if PING6_NONCE_MEMORY
294 __u8 *ni_nonce_ptr;
295 #else
296 struct {
297 struct timeval tv;
298 pid_t pid;
299 } ni_nonce_secret;
300 #endif
301
niquery_init_nonce(void)302 static void niquery_init_nonce(void)
303 {
304 #if PING6_NONCE_MEMORY
305 struct timeval tv;
306 unsigned long seed;
307
308 seed = (unsigned long)getpid();
309 if (!gettimeofday(&tv, NULL))
310 seed ^= tv.tv_usec;
311 srand(seed);
312
313 ni_nonce_ptr = calloc(NI_NONCE_SIZE, MAX_DUP_CHK);
314 if (!ni_nonce_ptr) {
315 perror("ping6: calloc");
316 exit(2);
317 }
318
319 ni_nonce_ptr[0] = ~0;
320 #else
321 gettimeofday(&ni_nonce_secret.tv, NULL);
322 ni_nonce_secret.pid = getpid();
323 #endif
324 }
325
326 #if !PING6_NONCE_MEMORY
niquery_nonce(__u8 * nonce,int fill)327 static int niquery_nonce(__u8 *nonce, int fill)
328 {
329 static __u8 digest[MD5_DIGEST_LENGTH];
330 static int seq = -1;
331
332 if (fill || seq != *(__u16 *)nonce || seq < 0) {
333 MD5_CTX ctxt;
334
335 MD5_Init(&ctxt);
336 MD5_Update(&ctxt, &ni_nonce_secret, sizeof(ni_nonce_secret));
337 MD5_Update(&ctxt, nonce, sizeof(__u16));
338 MD5_Final(digest, &ctxt);
339
340 seq = *(__u16 *)nonce;
341 }
342
343 if (fill) {
344 memcpy(nonce + sizeof(__u16), digest, NI_NONCE_SIZE - sizeof(__u16));
345 return 0;
346 } else {
347 if (memcmp(nonce + sizeof(__u16), digest, NI_NONCE_SIZE - sizeof(__u16)))
348 return -1;
349 return ntohsp((__u16 *)nonce);
350 }
351 }
352 #endif
353
niquery_fill_nonce(__u16 seq,__u8 * nonce)354 static inline void niquery_fill_nonce(__u16 seq, __u8 *nonce)
355 {
356 __u16 v = htons(seq);
357 #if PING6_NONCE_MEMORY
358 int i;
359
360 memcpy(&ni_nonce_ptr[NI_NONCE_SIZE * (seq % MAX_DUP_CHK)], &v, sizeof(v));
361
362 for (i = sizeof(v); i < NI_NONCE_SIZE; i++)
363 ni_nonce_ptr[NI_NONCE_SIZE * (seq % MAX_DUP_CHK) + i] = 0x100 * (rand() / (RAND_MAX + 1.0));
364
365 memcpy(nonce, &ni_nonce_ptr[NI_NONCE_SIZE * (seq % MAX_DUP_CHK)], NI_NONCE_SIZE);
366 #else
367 memcpy(nonce, &v, sizeof(v));
368 niquery_nonce(nonce, 1);
369 #endif
370 }
371
niquery_check_nonce(__u8 * nonce)372 static inline int niquery_check_nonce(__u8 *nonce)
373 {
374 #if PING6_NONCE_MEMORY
375 __u16 seq = ntohsp((__u16 *)nonce);
376 if (memcmp(nonce, &ni_nonce_ptr[NI_NONCE_SIZE * (seq % MAX_DUP_CHK)], NI_NONCE_SIZE))
377 return -1;
378 return seq;
379 #else
380 return niquery_nonce(nonce, 0);
381 #endif
382 }
383
niquery_set_qtype(int type)384 static int niquery_set_qtype(int type)
385 {
386 if (niquery_is_enabled() && ni_query != type) {
387 printf("Qtype conflict\n");
388 return -1;
389 }
390 ni_query = type;
391 return 0;
392 }
393
niquery_option_name_handler(int index,const char * arg)394 static int niquery_option_name_handler(int index, const char *arg)
395 {
396 if (niquery_set_qtype(NI_QTYPE_NAME) < 0)
397 return -1;
398 return 0;
399 }
400
niquery_option_ipv6_handler(int index,const char * arg)401 static int niquery_option_ipv6_handler(int index, const char *arg)
402 {
403 if (niquery_set_qtype(NI_QTYPE_IPV6ADDR) < 0)
404 return -1;
405 return 0;
406 }
407
niquery_option_ipv6_flag_handler(int index,const char * arg)408 static int niquery_option_ipv6_flag_handler(int index, const char *arg)
409 {
410 if (niquery_set_qtype(NI_QTYPE_IPV6ADDR) < 0)
411 return -1;
412 ni_flag |= niquery_options[index].data;
413 return 0;
414 }
415
niquery_option_ipv4_handler(int index,const char * arg)416 static int niquery_option_ipv4_handler(int index, const char *arg)
417 {
418 if (niquery_set_qtype(NI_QTYPE_IPV4ADDR) < 0)
419 return -1;
420 return 0;
421 }
422
niquery_option_ipv4_flag_handler(int index,const char * arg)423 static int niquery_option_ipv4_flag_handler(int index, const char *arg)
424 {
425 if (niquery_set_qtype(NI_QTYPE_IPV4ADDR) < 0)
426 return -1;
427 ni_flag |= niquery_options[index].data;
428 return 0;
429 }
430
niquery_is_subject_valid(void)431 static inline int niquery_is_subject_valid(void)
432 {
433 return ni_subject_type >= 0 && ni_subject;
434 }
435
niquery_set_subject_type(int type)436 static int niquery_set_subject_type(int type)
437 {
438 if (niquery_is_subject_valid() && ni_subject_type != type) {
439 printf("Subject type conflict\n");
440 return -1;
441 }
442 ni_subject_type = type;
443 return 0;
444 }
445
446 #define ARRAY_SIZE(array) (sizeof(array) / sizeof(array[0]))
447 #define OFFSET_OF(type,elem) ((size_t)&((type *)0)->elem)
448
niquery_option_subject_addr_handler(int index,const char * arg)449 static int niquery_option_subject_addr_handler(int index, const char *arg)
450 {
451 struct addrinfo hints, *ai0, *ai;
452 int offset;
453 int gai;
454
455 if (niquery_set_subject_type(niquery_options[index].data) < 0)
456 return -1;
457
458 ni_subject_type = niquery_options[index].data;
459
460 memset(&hints, 0, sizeof(hints));
461
462 switch (niquery_options[index].data) {
463 case NI_SUBJ_IPV6:
464 ni_subject_len = sizeof(struct in6_addr);
465 offset = OFFSET_OF(struct sockaddr_in6, sin6_addr);
466 hints.ai_family = AF_INET6;
467 break;
468 case NI_SUBJ_IPV4:
469 ni_subject_len = sizeof(struct in_addr);
470 offset = OFFSET_OF(struct sockaddr_in, sin_addr);
471 hints.ai_family = AF_INET;
472 break;
473 default:
474 /* should not happen. */
475 offset = -1;
476 }
477
478 hints.ai_socktype = SOCK_DGRAM;
479 #ifdef USE_IDN
480 hints.ai_flags = AI_IDN;
481 #endif
482
483 gai = getaddrinfo(arg, 0, &hints, &ai0);
484 if (gai) {
485 fprintf(stderr, "Unknown host: %s\n", arg);
486 return -1;
487 }
488
489 for (ai = ai0; ai; ai = ai->ai_next) {
490 void *p = malloc(ni_subject_len);
491 if (!p)
492 continue;
493 memcpy(p, (__u8 *)ai->ai_addr + offset, ni_subject_len);
494 free(ni_subject);
495 ni_subject = p;
496 break;
497 }
498 freeaddrinfo(ai0);
499
500 return 0;
501 }
502
niquery_option_subject_name_handler(int index,const char * arg)503 static int niquery_option_subject_name_handler(int index, const char *arg)
504 {
505 static char nigroup_buf[INET6_ADDRSTRLEN + 1 + IFNAMSIZ];
506 unsigned char *dnptrs[2], **dpp, **lastdnptr;
507 int n;
508 int i;
509 char *name, *p;
510 char *canonname = NULL, *idn = NULL;
511 unsigned char *buf = NULL;
512 size_t namelen;
513 size_t buflen;
514 int dots, fqdn = niquery_options[index].data;
515 MD5_CTX ctxt;
516 __u8 digest[MD5_DIGEST_LENGTH];
517 #ifdef USE_IDN
518 int rc;
519 #endif
520
521 if (niquery_set_subject_type(NI_SUBJ_NAME) < 0)
522 return -1;
523
524 #ifdef USE_IDN
525 name = stringprep_locale_to_utf8(arg);
526 if (!name) {
527 fprintf(stderr, "ping6: IDN support failed.\n");
528 exit(2);
529 }
530 #else
531 name = strdup(arg);
532 if (!name)
533 goto oomexit;
534 #endif
535
536 p = strchr(name, SCOPE_DELIMITER);
537 if (p) {
538 *p = '\0';
539 if (strlen(p + 1) >= IFNAMSIZ) {
540 fprintf(stderr, "ping6: too long scope name.\n");
541 exit(1);
542 }
543 }
544
545 #ifdef USE_IDN
546 rc = idna_to_ascii_8z(name, &idn, 0);
547 if (rc) {
548 fprintf(stderr, "ping6: IDN encoding error: %s\n",
549 idna_strerror(rc));
550 exit(2);
551 }
552 #else
553 idn = strdup(name);
554 if (!idn)
555 goto oomexit;
556 #endif
557
558 namelen = strlen(idn);
559 canonname = malloc(namelen + 1);
560 if (!canonname)
561 goto oomexit;
562
563 dots = 0;
564 for (i = 0; i < namelen + 1; i++) {
565 canonname[i] = isupper(idn[i]) ? tolower(idn[i]) : idn[i];
566 if (idn[i] == '.')
567 dots++;
568 }
569
570 if (fqdn == 0) {
571 /* guess if hostname is FQDN */
572 fqdn = dots ? 1 : -1;
573 }
574
575 buflen = namelen + 3 + 1; /* dn_comp() requrires strlen() + 3,
576 plus non-fqdn indicator. */
577 buf = malloc(buflen);
578 if (!buf) {
579 fprintf(stderr, "ping6: out of memory.\n");
580 goto errexit;
581 }
582
583 dpp = dnptrs;
584 lastdnptr = &dnptrs[ARRAY_SIZE(dnptrs)];
585
586 *dpp++ = (unsigned char *)buf;
587 *dpp++ = NULL;
588
589 n = dn_comp(canonname, (unsigned char *)buf, buflen, dnptrs, lastdnptr);
590 if (n < 0) {
591 fprintf(stderr, "ping6: Inappropriate subject name: %s\n", canonname);
592 goto errexit;
593 } else if (n >= buflen) {
594 fprintf(stderr, "ping6: dn_comp() returned too long result.\n");
595 goto errexit;
596 }
597
598 MD5_Init(&ctxt);
599 MD5_Update(&ctxt, buf, buf[0]);
600 MD5_Final(digest, &ctxt);
601
602 sprintf(nigroup_buf, "ff02::2:%02x%02x:%02x%02x%s%s",
603 digest[0], digest[1], digest[2], digest[3],
604 p ? "%" : "",
605 p ? p + 1 : "");
606
607 if (fqdn < 0)
608 buf[n] = 0;
609
610 free(ni_subject);
611
612 ni_group = nigroup_buf;
613 ni_subject = buf;
614 ni_subject_len = n + (fqdn < 0);
615 ni_group = nigroup_buf;
616
617 free(canonname);
618 free(idn);
619 free(name);
620
621 return 0;
622 oomexit:
623 fprintf(stderr, "ping6: out of memory.\n");
624 errexit:
625 free(buf);
626 free(canonname);
627 free(idn);
628 free(name);
629 exit(1);
630 }
631
niquery_option_help_handler(int index,const char * arg)632 int niquery_option_help_handler(int index, const char *arg)
633 {
634 fprintf(stderr, "ping6 -N suboptions\n"
635 "\tHelp:\n"
636 "\t\thelp\n"
637 "\tQuery:\n"
638 "\t\tname,\n"
639 "\t\tipv6,ipv6-all,ipv6-compatible,ipv6-linklocal,ipv6-sitelocal,ipv6-global,\n"
640 "\t\tipv4,ipv4-all,\n"
641 "\tSubject:\n"
642 "\t\tsubject-ipv6=addr,subject-ipv4=addr,subject-name=name,subject-fqdn=name,\n"
643 );
644 exit(2);
645 }
646
niquery_option_handler(const char * opt_arg)647 int niquery_option_handler(const char *opt_arg)
648 {
649 struct niquery_option *p;
650 int i;
651 int ret = -1;
652 for (i = 0, p = niquery_options; p->name; i++, p++) {
653 if (strncmp(p->name, opt_arg, p->namelen))
654 continue;
655 if (!p->has_arg) {
656 if (opt_arg[p->namelen] == '\0') {
657 ret = p->handler(i, NULL);
658 if (ret >= 0)
659 break;
660 }
661 } else {
662 if (opt_arg[p->namelen] == '=') {
663 ret = p->handler(i, &opt_arg[p->namelen] + 1);
664 if (ret >= 0)
665 break;
666 }
667 }
668 }
669 if (!p->name)
670 ret = niquery_option_help_handler(0, NULL);
671 return ret;
672 }
673
hextoui(const char * str)674 static int hextoui(const char *str)
675 {
676 unsigned long val;
677 char *ep;
678
679 errno = 0;
680 val = strtoul(str, &ep, 16);
681 if (*ep) {
682 if (!errno)
683 errno = EINVAL;
684 return -1;
685 }
686
687 if (val > UINT_MAX) {
688 errno = ERANGE;
689 return UINT_MAX;
690 }
691
692 return val;
693 }
694
main(int argc,char * argv[])695 int main(int argc, char *argv[])
696 {
697 int ch, hold, packlen;
698 u_char *packet;
699 char *target;
700 struct addrinfo hints, *ai;
701 int gai;
702 struct sockaddr_in6 firsthop;
703 int socket_errno = 0;
704 struct icmp6_filter filter;
705 int err;
706 #ifdef __linux__
707 int csum_offset, sz_opt;
708 #endif
709 static uint32_t scope_id = 0;
710
711 #ifdef ANDROID
712 android_check_security();
713 #endif
714
715 limit_capabilities();
716
717 #ifdef USE_IDN
718 setlocale(LC_ALL, "");
719 #endif
720
721 icmp_sock = socket(AF_INET6, SOCK_DGRAM, IPPROTO_ICMPV6);
722 if (icmp_sock < 0) {
723 enable_capability_raw();
724 icmp_sock = socket(AF_INET6, SOCK_RAW, IPPROTO_ICMPV6);
725 socket_errno = errno;
726 disable_capability_raw();
727 using_ping_socket = 0;
728 }
729
730 source.sin6_family = AF_INET6;
731 memset(&firsthop, 0, sizeof(firsthop));
732 firsthop.sin6_family = AF_INET6;
733
734 preload = 1;
735 while ((ch = getopt(argc, argv, COMMON_OPTSTR "F:N:")) != EOF) {
736 switch(ch) {
737 case 'F':
738 flowlabel = hextoui(optarg);
739 if (errno || (flowlabel & ~IPV6_FLOWINFO_FLOWLABEL)) {
740 fprintf(stderr, "ping: Invalid flowinfo %s\n", optarg);
741 exit(2);
742 }
743 options |= F_FLOWINFO;
744 break;
745 case 'Q':
746 tclass = hextoui(optarg);
747 if (errno || (tclass & ~0xff)) {
748 fprintf(stderr, "ping: Invalid tclass %s\n", optarg);
749 exit(2);
750 }
751 options |= F_TCLASS;
752 break;
753 case 'I':
754 if (strchr(optarg, ':')) {
755 char *p, *addr = strdup(optarg);
756
757 if (!addr) {
758 fprintf(stderr, "ping: out of memory\n");
759 exit(2);
760 }
761
762 p = strchr(addr, SCOPE_DELIMITER);
763 if (p) {
764 *p = '\0';
765 device = optarg + (p - addr) + 1;
766 }
767
768 if (inet_pton(AF_INET6, addr, (char*)&source.sin6_addr) <= 0) {
769 fprintf(stderr, "ping: invalid source address %s\n", optarg);
770 exit(2);
771 }
772
773 options |= F_STRICTSOURCE;
774
775 free(addr);
776 } else {
777 device = optarg;
778 }
779 break;
780 case 'M':
781 if (strcmp(optarg, "do") == 0)
782 pmtudisc = IPV6_PMTUDISC_DO;
783 else if (strcmp(optarg, "dont") == 0)
784 pmtudisc = IPV6_PMTUDISC_DONT;
785 else if (strcmp(optarg, "want") == 0)
786 pmtudisc = IPV6_PMTUDISC_WANT;
787 else {
788 fprintf(stderr, "ping: wrong value for -M: do, dont, want are valid ones.\n");
789 exit(2);
790 }
791 break;
792 case 'V':
793 printf("ping6 utility, iputils-%s\n", SNAPSHOT);
794 exit(0);
795 case 'N':
796 if (using_ping_socket) {
797 fprintf(stderr, "ping: -N requires raw socket permissions\n");
798 exit(2);
799 }
800 if (niquery_option_handler(optarg) < 0) {
801 usage();
802 break;
803 }
804 break;
805 COMMON_OPTIONS
806 common_options(ch);
807 break;
808 default:
809 usage();
810 }
811 }
812 argc -= optind;
813 argv += optind;
814
815 #ifdef ENABLE_PING6_RTHDR
816 while (argc > 1) {
817 struct in6_addr *addr;
818
819 if (srcrt == NULL) {
820 int space;
821
822 fprintf(stderr, "ping6: Warning: "
823 "Source routing is deprecated by RFC5095.\n");
824
825 #ifdef ENABLE_PING6_RTHDR_RFC3542
826 space = inet6_rth_space(IPV6_RTHDR_TYPE_0, argc - 1);
827 #else
828 space = inet6_srcrt_space(IPV6_SRCRT_TYPE_0, argc - 1);
829 #endif
830 if (space == 0) {
831 fprintf(stderr, "srcrt_space failed\n");
832 exit(2);
833 }
834 #ifdef ENABLE_PING6_RTHDR_RFC3542
835 if (cmsglen + CMSG_SPACE(space) > sizeof(cmsgbuf)) {
836 fprintf(stderr, "no room for options\n");
837 exit(2);
838 }
839 #else
840 if (space + cmsglen > sizeof(cmsgbuf)) {
841 fprintf(stderr, "no room for options\n");
842 exit(2);
843 }
844 #endif
845 srcrt = (struct cmsghdr*)(cmsgbuf+cmsglen);
846 #ifdef ENABLE_PING6_RTHDR_RFC3542
847 memset(srcrt, 0, CMSG_SPACE(0));
848 srcrt->cmsg_len = CMSG_LEN(space);
849 srcrt->cmsg_level = IPPROTO_IPV6;
850 srcrt->cmsg_type = IPV6_RTHDR;
851 inet6_rth_init(CMSG_DATA(srcrt), space, IPV6_RTHDR_TYPE_0, argc - 1);
852 cmsglen += CMSG_SPACE(space);
853 #else
854 cmsglen += CMSG_ALIGN(space);
855 inet6_srcrt_init(srcrt, IPV6_SRCRT_TYPE_0);
856 #endif
857 }
858
859 target = *argv;
860
861 memset(&hints, 0, sizeof(hints));
862 hints.ai_family = AF_INET6;
863 #ifdef USE_IDN
864 hints.ai_flags = AI_IDN;
865 #endif
866 gai = getaddrinfo(target, NULL, &hints, &ai);
867 if (gai) {
868 fprintf(stderr, "unknown host\n");
869 exit(2);
870 }
871 addr = &((struct sockaddr_in6 *)(ai->ai_addr))->sin6_addr;
872 #ifdef ENABLE_PING6_RTHDR_RFC3542
873 inet6_rth_add(CMSG_DATA(srcrt), addr);
874 #else
875 inet6_srcrt_add(srcrt, addr);
876 #endif
877 if (IN6_IS_ADDR_UNSPECIFIED(&firsthop.sin6_addr)) {
878 memcpy(&firsthop.sin6_addr, addr, 16);
879 #ifdef HAVE_SIN6_SCOPEID
880 firsthop.sin6_scope_id = ((struct sockaddr_in6 *)(ai->ai_addr))->sin6_scope_id;
881 /* Verify scope_id is the same as previous nodes */
882 if (firsthop.sin6_scope_id && scope_id && firsthop.sin6_scope_id != scope_id) {
883 fprintf(stderr, "scope discrepancy among the nodes\n");
884 exit(2);
885 } else if (!scope_id) {
886 scope_id = firsthop.sin6_scope_id;
887 }
888 #endif
889 }
890 freeaddrinfo(ai);
891
892 argv++;
893 argc--;
894 }
895 #endif
896
897 if (niquery_is_enabled()) {
898 niquery_init_nonce();
899
900 if (!niquery_is_subject_valid()) {
901 ni_subject = &whereto.sin6_addr;
902 ni_subject_len = sizeof(whereto.sin6_addr);
903 ni_subject_type = NI_SUBJ_IPV6;
904 }
905 }
906
907 if (argc > 1) {
908 #ifndef ENABLE_PING6_RTHDR
909 fprintf(stderr, "ping6: Source routing is deprecated by RFC5095.\n");
910 #endif
911 usage();
912 } else if (argc == 1) {
913 target = *argv;
914 } else {
915 if (ni_query < 0 && ni_subject_type != NI_SUBJ_NAME)
916 usage();
917 target = ni_group;
918 }
919
920 memset(&hints, 0, sizeof(hints));
921 hints.ai_family = AF_INET6;
922 #ifdef USE_IDN
923 hints.ai_flags = AI_IDN;
924 #endif
925 gai = getaddrinfo(target, NULL, &hints, &ai);
926 if (gai) {
927 fprintf(stderr, "unknown host\n");
928 exit(2);
929 }
930
931 memcpy(&whereto, ai->ai_addr, sizeof(whereto));
932 whereto.sin6_port = htons(IPPROTO_ICMPV6);
933
934 if (memchr(target, ':', strlen(target)))
935 options |= F_NUMERIC;
936
937 freeaddrinfo(ai);
938
939 if (IN6_IS_ADDR_UNSPECIFIED(&firsthop.sin6_addr)) {
940 memcpy(&firsthop.sin6_addr, &whereto.sin6_addr, 16);
941 #ifdef HAVE_SIN6_SCOPEID
942 firsthop.sin6_scope_id = whereto.sin6_scope_id;
943 /* Verify scope_id is the same as intermediate nodes */
944 if (firsthop.sin6_scope_id && scope_id && firsthop.sin6_scope_id != scope_id) {
945 fprintf(stderr, "scope discrepancy among the nodes\n");
946 exit(2);
947 } else if (!scope_id) {
948 scope_id = firsthop.sin6_scope_id;
949 }
950 #endif
951 }
952
953 hostname = target;
954
955 if (IN6_IS_ADDR_UNSPECIFIED(&source.sin6_addr)) {
956 socklen_t alen;
957 int probe_fd = socket(AF_INET6, SOCK_DGRAM, 0);
958
959 if (probe_fd < 0) {
960 perror("socket");
961 exit(2);
962 }
963 if (device) {
964 #if defined(IPV6_RECVPKTINFO) || defined(HAVE_SIN6_SCOPEID)
965 unsigned int iface = if_name2index(device);
966 #endif
967 #ifdef IPV6_RECVPKTINFO
968 struct in6_pktinfo ipi;
969
970 memset(&ipi, 0, sizeof(ipi));
971 ipi.ipi6_ifindex = iface;
972 #endif
973
974 #ifdef HAVE_SIN6_SCOPEID
975 if (IN6_IS_ADDR_LINKLOCAL(&firsthop.sin6_addr) ||
976 IN6_IS_ADDR_MC_LINKLOCAL(&firsthop.sin6_addr))
977 firsthop.sin6_scope_id = iface;
978 #endif
979 enable_capability_raw();
980 if (
981 #ifdef IPV6_RECVPKTINFO
982 setsockopt(probe_fd, IPPROTO_IPV6, IPV6_PKTINFO, &ipi, sizeof(ipi)) == -1 &&
983 #endif
984 setsockopt(probe_fd, SOL_SOCKET, SO_BINDTODEVICE, device, strlen(device)+1) == -1) {
985 perror("setsockopt(SO_BINDTODEVICE)");
986 exit(2);
987 }
988 disable_capability_raw();
989 }
990 firsthop.sin6_port = htons(1025);
991
992 sock_setmark(probe_fd);
993
994 if (connect(probe_fd, (struct sockaddr*)&firsthop, sizeof(firsthop)) == -1) {
995 perror("connect");
996 exit(2);
997 }
998 alen = sizeof(source);
999 if (getsockname(probe_fd, (struct sockaddr*)&source, &alen) == -1) {
1000 perror("getsockname");
1001 exit(2);
1002 }
1003 source.sin6_port = 0;
1004 close(probe_fd);
1005
1006 #ifndef WITHOUT_IFADDRS
1007 if (device) {
1008 struct ifaddrs *ifa0, *ifa;
1009
1010 if (getifaddrs(&ifa0)) {
1011 perror("getifaddrs");
1012 exit(2);
1013 }
1014
1015 for (ifa = ifa0; ifa; ifa = ifa->ifa_next) {
1016 if (!ifa->ifa_addr || ifa->ifa_addr->sa_family != AF_INET6)
1017 continue;
1018 if (!strncmp(ifa->ifa_name, device, sizeof(device) - 1) &&
1019 IN6_ARE_ADDR_EQUAL(&((struct sockaddr_in6 *)ifa->ifa_addr)->sin6_addr,
1020 &source.sin6_addr))
1021 break;
1022 }
1023 if (!ifa)
1024 fprintf(stderr, "ping6: Warning: source address might be selected on device other than %s.\n", device);
1025
1026 freeifaddrs(ifa0);
1027 }
1028 #endif
1029 }
1030 #ifdef HAVE_SIN6_SCOPEID
1031 else if (device && (IN6_IS_ADDR_LINKLOCAL(&source.sin6_addr) ||
1032 IN6_IS_ADDR_MC_LINKLOCAL(&source.sin6_addr)))
1033 source.sin6_scope_id = if_name2index(device);
1034 #endif
1035
1036 if (icmp_sock < 0) {
1037 errno = socket_errno;
1038 perror("ping: icmp open socket");
1039 exit(2);
1040 }
1041
1042 if (device) {
1043 struct cmsghdr *cmsg;
1044 struct in6_pktinfo *ipi;
1045
1046 cmsg = (struct cmsghdr*)(cmsgbuf+cmsglen);
1047 cmsglen += CMSG_SPACE(sizeof(*ipi));
1048 cmsg->cmsg_len = CMSG_LEN(sizeof(*ipi));
1049 cmsg->cmsg_level = SOL_IPV6;
1050 cmsg->cmsg_type = IPV6_PKTINFO;
1051
1052 ipi = (struct in6_pktinfo*)CMSG_DATA(cmsg);
1053 memset(ipi, 0, sizeof(*ipi));
1054 ipi->ipi6_ifindex = if_name2index(device);
1055 }
1056
1057 if ((whereto.sin6_addr.s6_addr16[0]&htons(0xff00)) == htons (0xff00)) {
1058 if (uid) {
1059 if (interval < 1000) {
1060 fprintf(stderr, "ping: multicast ping with too short interval.\n");
1061 exit(2);
1062 }
1063 if (pmtudisc >= 0 && pmtudisc != IPV6_PMTUDISC_DO) {
1064 fprintf(stderr, "ping: multicast ping does not fragment.\n");
1065 exit(2);
1066 }
1067 }
1068 if (pmtudisc < 0)
1069 pmtudisc = IPV6_PMTUDISC_DO;
1070 }
1071
1072 if (pmtudisc >= 0) {
1073 if (setsockopt(icmp_sock, SOL_IPV6, IPV6_MTU_DISCOVER, &pmtudisc, sizeof(pmtudisc)) == -1) {
1074 perror("ping: IPV6_MTU_DISCOVER");
1075 exit(2);
1076 }
1077 }
1078
1079 if ((options&F_STRICTSOURCE) &&
1080 bind(icmp_sock, (struct sockaddr*)&source, sizeof(source)) == -1) {
1081 perror("ping: bind icmp socket");
1082 exit(2);
1083 }
1084
1085 if (datalen >= sizeof(struct timeval) && (ni_query < 0)) {
1086 /* can we time transfer */
1087 timing = 1;
1088 }
1089 packlen = datalen + 8 + 4096 + 40 + 8; /* 4096 for rthdr */
1090 if (!(packet = (u_char *)malloc((u_int)packlen))) {
1091 fprintf(stderr, "ping: out of memory.\n");
1092 exit(2);
1093 }
1094
1095 working_recverr = 1;
1096 hold = 1;
1097 if (setsockopt(icmp_sock, SOL_IPV6, IPV6_RECVERR, (char *)&hold, sizeof(hold))) {
1098 fprintf(stderr, "WARNING: your kernel is veeery old. No problems.\n");
1099 working_recverr = 0;
1100 }
1101
1102 /* Estimate memory eaten by single packet. It is rough estimate.
1103 * Actually, for small datalen's it depends on kernel side a lot. */
1104 hold = datalen+8;
1105 hold += ((hold+511)/512)*(40+16+64+160);
1106 sock_setbufs(icmp_sock, hold);
1107
1108 if (!using_ping_socket) {
1109 #ifdef __linux__
1110 csum_offset = 2;
1111 sz_opt = sizeof(int);
1112
1113 err = setsockopt(icmp_sock, SOL_RAW, IPV6_CHECKSUM,
1114 &csum_offset, sz_opt);
1115 if (err < 0) {
1116 /* checksum should be enabled by default and setting
1117 * this option might fail anyway.
1118 */
1119 fprintf(stderr, "setsockopt(RAW_CHECKSUM) failed"
1120 " - try to continue.");
1121 }
1122 #endif
1123
1124 /*
1125 * select icmp echo reply as icmp type to receive
1126 */
1127
1128 ICMP6_FILTER_SETBLOCKALL(&filter);
1129
1130 if (!working_recverr) {
1131 ICMP6_FILTER_SETPASS(ICMP6_DST_UNREACH, &filter);
1132 ICMP6_FILTER_SETPASS(ICMP6_PACKET_TOO_BIG, &filter);
1133 ICMP6_FILTER_SETPASS(ICMP6_TIME_EXCEEDED, &filter);
1134 ICMP6_FILTER_SETPASS(ICMP6_PARAM_PROB, &filter);
1135 }
1136
1137 if (niquery_is_enabled())
1138 ICMP6_FILTER_SETPASS(ICMPV6_NI_REPLY, &filter);
1139 else
1140 ICMP6_FILTER_SETPASS(ICMP6_ECHO_REPLY, &filter);
1141
1142 err = setsockopt(icmp_sock, IPPROTO_ICMPV6, ICMP6_FILTER,
1143 &filter, sizeof(struct icmp6_filter));
1144
1145 if (err < 0) {
1146 perror("setsockopt(ICMP6_FILTER)");
1147 exit(2);
1148 }
1149 }
1150
1151 if (options & F_NOLOOP) {
1152 int loop = 0;
1153 if (setsockopt(icmp_sock, IPPROTO_IPV6, IPV6_MULTICAST_LOOP,
1154 &loop, sizeof(loop)) == -1) {
1155 perror ("can't disable multicast loopback");
1156 exit(2);
1157 }
1158 }
1159 if (options & F_TTL) {
1160 if (setsockopt(icmp_sock, IPPROTO_IPV6, IPV6_MULTICAST_HOPS,
1161 &ttl, sizeof(ttl)) == -1) {
1162 perror ("can't set multicast hop limit");
1163 exit(2);
1164 }
1165 if (setsockopt(icmp_sock, IPPROTO_IPV6, IPV6_UNICAST_HOPS,
1166 &ttl, sizeof(ttl)) == -1) {
1167 perror ("can't set unicast hop limit");
1168 exit(2);
1169 }
1170 }
1171
1172 if (1) {
1173 int on = 1;
1174 if (
1175 #ifdef IPV6_RECVHOPLIMIT
1176 setsockopt(icmp_sock, IPPROTO_IPV6, IPV6_RECVHOPLIMIT,
1177 &on, sizeof(on)) == -1 &&
1178 setsockopt(icmp_sock, IPPROTO_IPV6, IPV6_2292HOPLIMIT,
1179 &on, sizeof(on)) == -1
1180 #else
1181 setsockopt(icmp_sock, IPPROTO_IPV6, IPV6_HOPLIMIT,
1182 &on, sizeof(on)) == -1
1183 #endif
1184 ){
1185 perror ("can't receive hop limit");
1186 exit(2);
1187 }
1188 }
1189
1190 if (options & F_TCLASS) {
1191 #ifdef IPV6_TCLASS
1192 if (setsockopt(icmp_sock, IPPROTO_IPV6, IPV6_TCLASS,
1193 &tclass, sizeof(tclass)) == -1) {
1194 perror ("setsockopt(IPV6_TCLASS)");
1195 exit(2);
1196 }
1197 #else
1198 fprintf(stderr, "Traffic class is not supported.\n");
1199 #endif
1200 }
1201
1202 if (options&F_FLOWINFO) {
1203 #ifdef IPV6_FLOWINFO_SEND
1204 int on = 1;
1205 #endif
1206 #ifdef IPV6_FLOWLABEL_MGR
1207 char freq_buf[CMSG_ALIGN(sizeof(struct in6_flowlabel_req)) + cmsglen];
1208 struct in6_flowlabel_req *freq = (struct in6_flowlabel_req *)freq_buf;
1209 int freq_len = sizeof(*freq);
1210 #ifdef ENABLE_PING6_RTHDR
1211 if (srcrt)
1212 freq_len = CMSG_ALIGN(sizeof(*freq)) + srcrt->cmsg_len;
1213 #endif
1214 memset(freq, 0, sizeof(*freq));
1215 freq->flr_label = htonl(flowlabel & IPV6_FLOWINFO_FLOWLABEL);
1216 freq->flr_action = IPV6_FL_A_GET;
1217 freq->flr_flags = IPV6_FL_F_CREATE;
1218 freq->flr_share = IPV6_FL_S_EXCL;
1219 memcpy(&freq->flr_dst, &whereto.sin6_addr, 16);
1220 #ifdef ENABLE_PING6_RTHDR
1221 if (srcrt)
1222 memcpy(freq_buf + CMSG_ALIGN(sizeof(*freq)), srcrt, srcrt->cmsg_len);
1223 #endif
1224 if (setsockopt(icmp_sock, IPPROTO_IPV6, IPV6_FLOWLABEL_MGR,
1225 freq, freq_len) == -1) {
1226 perror ("can't set flowlabel");
1227 exit(2);
1228 }
1229 flowlabel = freq->flr_label;
1230 #ifdef ENABLE_PING6_RTHDR
1231 if (srcrt) {
1232 cmsglen = (char*)srcrt - (char*)cmsgbuf;
1233 srcrt = NULL;
1234 }
1235 #endif
1236 #else
1237 fprintf(stderr, "Flow labels are not supported.\n");
1238 exit(2);
1239 #endif
1240
1241 #ifdef IPV6_FLOWINFO_SEND
1242 whereto.sin6_flowinfo = flowlabel;
1243 if (setsockopt(icmp_sock, IPPROTO_IPV6, IPV6_FLOWINFO_SEND,
1244 &on, sizeof(on)) == -1) {
1245 perror ("can't send flowinfo");
1246 exit(2);
1247 }
1248 #else
1249 fprintf(stderr, "Flowinfo is not supported.\n");
1250 exit(2);
1251 #endif
1252 }
1253
1254 printf("PING %s(%s) ", hostname, pr_addr(&whereto.sin6_addr));
1255 if (flowlabel)
1256 printf(", flow 0x%05x, ", (unsigned)ntohl(flowlabel));
1257 if (device || (options&F_STRICTSOURCE)) {
1258 printf("from %s %s: ",
1259 pr_addr_n(&source.sin6_addr), device ? : "");
1260 }
1261 printf("%d data bytes\n", datalen);
1262
1263 setup(icmp_sock);
1264
1265 main_loop(icmp_sock, packet, packlen);
1266 }
1267
receive_error_msg()1268 int receive_error_msg()
1269 {
1270 int res;
1271 char cbuf[512];
1272 struct iovec iov;
1273 struct msghdr msg;
1274 struct cmsghdr *cmsg;
1275 struct sock_extended_err *e;
1276 struct icmp6_hdr icmph;
1277 struct sockaddr_in6 target;
1278 int net_errors = 0;
1279 int local_errors = 0;
1280 int saved_errno = errno;
1281
1282 iov.iov_base = &icmph;
1283 iov.iov_len = sizeof(icmph);
1284 msg.msg_name = (void*)⌖
1285 msg.msg_namelen = sizeof(target);
1286 msg.msg_iov = &iov;
1287 msg.msg_iovlen = 1;
1288 msg.msg_flags = 0;
1289 msg.msg_control = cbuf;
1290 msg.msg_controllen = sizeof(cbuf);
1291
1292 res = recvmsg(icmp_sock, &msg, MSG_ERRQUEUE|MSG_DONTWAIT);
1293 if (res < 0)
1294 goto out;
1295
1296 e = NULL;
1297 for (cmsg = CMSG_FIRSTHDR(&msg); cmsg; cmsg = CMSG_NXTHDR(&msg, cmsg)) {
1298 if (cmsg->cmsg_level == SOL_IPV6) {
1299 if (cmsg->cmsg_type == IPV6_RECVERR)
1300 e = (struct sock_extended_err *)CMSG_DATA(cmsg);
1301 }
1302 }
1303 if (e == NULL)
1304 abort();
1305
1306 if (e->ee_origin == SO_EE_ORIGIN_LOCAL) {
1307 local_errors++;
1308 if (options & F_QUIET)
1309 goto out;
1310 if (options & F_FLOOD)
1311 write_stdout("E", 1);
1312 else if (e->ee_errno != EMSGSIZE)
1313 fprintf(stderr, "ping: local error: %s\n", strerror(e->ee_errno));
1314 else
1315 fprintf(stderr, "ping: local error: Message too long, mtu=%u\n", e->ee_info);
1316 nerrors++;
1317 } else if (e->ee_origin == SO_EE_ORIGIN_ICMP6) {
1318 struct sockaddr_in6 *sin6 = (struct sockaddr_in6*)(e+1);
1319
1320 if (res < sizeof(icmph) ||
1321 memcmp(&target.sin6_addr, &whereto.sin6_addr, 16) ||
1322 icmph.icmp6_type != ICMP6_ECHO_REQUEST ||
1323 !is_ours(icmph.icmp6_id)) {
1324 /* Not our error, not an error at all. Clear. */
1325 saved_errno = 0;
1326 goto out;
1327 }
1328
1329 net_errors++;
1330 nerrors++;
1331 if (options & F_QUIET)
1332 goto out;
1333 if (options & F_FLOOD) {
1334 write_stdout("\bE", 2);
1335 } else {
1336 print_timestamp();
1337 printf("From %s icmp_seq=%u ", pr_addr(&sin6->sin6_addr), ntohs(icmph.icmp6_seq));
1338 pr_icmph(e->ee_type, e->ee_code, e->ee_info);
1339 putchar('\n');
1340 fflush(stdout);
1341 }
1342 }
1343
1344 out:
1345 errno = saved_errno;
1346 return net_errors ? : -local_errors;
1347 }
1348
1349 /*
1350 * pinger --
1351 * Compose and transmit an ICMP ECHO REQUEST packet. The IP packet
1352 * will be added on by the kernel. The ID field is our UNIX process ID,
1353 * and the sequence number is an ascending integer. The first 8 bytes
1354 * of the data portion are used to hold a UNIX "timeval" struct in VAX
1355 * byte-order, to compute the round-trip time.
1356 */
build_echo(__u8 * _icmph)1357 int build_echo(__u8 *_icmph)
1358 {
1359 struct icmp6_hdr *icmph;
1360 int cc;
1361
1362 icmph = (struct icmp6_hdr *)_icmph;
1363 icmph->icmp6_type = ICMP6_ECHO_REQUEST;
1364 icmph->icmp6_code = 0;
1365 icmph->icmp6_cksum = 0;
1366 icmph->icmp6_seq = htons(ntransmitted+1);
1367 icmph->icmp6_id = ident;
1368
1369 if (timing)
1370 gettimeofday((struct timeval *)&outpack[8],
1371 (struct timezone *)NULL);
1372
1373 cc = datalen + 8; /* skips ICMP portion */
1374
1375 return cc;
1376 }
1377
1378
build_niquery(__u8 * _nih)1379 int build_niquery(__u8 *_nih)
1380 {
1381 struct ni_hdr *nih;
1382 int cc;
1383
1384 nih = (struct ni_hdr *)_nih;
1385 nih->ni_cksum = 0;
1386
1387 nih->ni_type = ICMPV6_NI_QUERY;
1388 cc = sizeof(*nih);
1389 datalen = 0;
1390
1391 niquery_fill_nonce(ntransmitted + 1, nih->ni_nonce);
1392 nih->ni_code = ni_subject_type;
1393 nih->ni_qtype = htons(ni_query);
1394 nih->ni_flags = ni_flag;
1395 memcpy(nih + 1, ni_subject, ni_subject_len);
1396 cc += ni_subject_len;
1397
1398 return cc;
1399 }
1400
send_probe(void)1401 int send_probe(void)
1402 {
1403 int len, cc;
1404
1405 rcvd_clear(ntransmitted + 1);
1406
1407 if (niquery_is_enabled())
1408 len = build_niquery(outpack);
1409 else
1410 len = build_echo(outpack);
1411
1412 if (cmsglen == 0) {
1413 cc = sendto(icmp_sock, (char *)outpack, len, confirm,
1414 (struct sockaddr *) &whereto,
1415 sizeof(struct sockaddr_in6));
1416 } else {
1417 struct msghdr mhdr;
1418 struct iovec iov;
1419
1420 iov.iov_len = len;
1421 iov.iov_base = outpack;
1422
1423 memset(&mhdr, 0, sizeof(mhdr));
1424 mhdr.msg_name = &whereto;
1425 mhdr.msg_namelen = sizeof(struct sockaddr_in6);
1426 mhdr.msg_iov = &iov;
1427 mhdr.msg_iovlen = 1;
1428 mhdr.msg_control = cmsgbuf;
1429 mhdr.msg_controllen = cmsglen;
1430
1431 cc = sendmsg(icmp_sock, &mhdr, confirm);
1432 }
1433 confirm = 0;
1434
1435 return (cc == len ? 0 : cc);
1436 }
1437
pr_echo_reply(__u8 * _icmph,int cc)1438 void pr_echo_reply(__u8 *_icmph, int cc)
1439 {
1440 struct icmp6_hdr *icmph = (struct icmp6_hdr *) _icmph;
1441 printf(" icmp_seq=%u", ntohs(icmph->icmp6_seq));
1442 };
1443
putchar_safe(char c)1444 static void putchar_safe(char c)
1445 {
1446 if (isprint(c))
1447 putchar(c);
1448 else
1449 printf("\\%03o", c);
1450 }
1451
pr_niquery_reply_name(struct ni_hdr * nih,int len)1452 void pr_niquery_reply_name(struct ni_hdr *nih, int len)
1453 {
1454 __u8 *h = (__u8 *)(nih + 1);
1455 __u8 *p = h + 4;
1456 __u8 *end = (__u8 *)nih + len;
1457 int continued = 0;
1458 char buf[1024];
1459 int ret;
1460
1461 len -= sizeof(struct ni_hdr) + 4;
1462
1463 if (len < 0) {
1464 printf(" parse error (too short)");
1465 return;
1466 }
1467 while (p < end) {
1468 int fqdn = 1;
1469 int i;
1470
1471 memset(buf, 0xff, sizeof(buf));
1472
1473 if (continued)
1474 putchar(',');
1475
1476 ret = dn_expand(h, end, p, buf, sizeof(buf));
1477 if (ret < 0) {
1478 printf(" parse error (truncated)");
1479 break;
1480 }
1481 if (p + ret < end && *(p + ret) == '\0')
1482 fqdn = 0;
1483
1484 putchar(' ');
1485 for (i = 0; i < strlen(buf); i++)
1486 putchar_safe(buf[i]);
1487 if (fqdn)
1488 putchar('.');
1489
1490 p += ret + !fqdn;
1491
1492 continued = 1;
1493 }
1494 }
1495
pr_niquery_reply_addr(struct ni_hdr * nih,int len)1496 void pr_niquery_reply_addr(struct ni_hdr *nih, int len)
1497 {
1498 __u8 *h = (__u8 *)(nih + 1);
1499 __u8 *p = h + 4;
1500 __u8 *end = (__u8 *)nih + len;
1501 int af;
1502 int aflen;
1503 int continued = 0;
1504 int truncated;
1505 char buf[1024];
1506
1507 switch (ntohs(nih->ni_qtype)) {
1508 case NI_QTYPE_IPV4ADDR:
1509 af = AF_INET;
1510 aflen = sizeof(struct in_addr);
1511 truncated = nih->ni_flags & NI_IPV6ADDR_F_TRUNCATE;
1512 break;
1513 case NI_QTYPE_IPV6ADDR:
1514 af = AF_INET6;
1515 aflen = sizeof(struct in6_addr);
1516 truncated = nih->ni_flags & NI_IPV4ADDR_F_TRUNCATE;
1517 break;
1518 default:
1519 /* should not happen */
1520 af = aflen = truncated = 0;
1521 }
1522 p = h;
1523 if (len < 0) {
1524 printf(" parse error (too short)");
1525 return;
1526 }
1527
1528 while (p < end) {
1529 if (continued)
1530 putchar(',');
1531
1532 if (p + sizeof(__u32) + aflen > end) {
1533 printf(" parse error (truncated)");
1534 break;
1535 }
1536 if (!inet_ntop(af, p + sizeof(__u32), buf, sizeof(buf)))
1537 printf(" unexpeced error in inet_ntop(%s)",
1538 strerror(errno));
1539 else
1540 printf(" %s", buf);
1541 p += sizeof(__u32) + aflen;
1542
1543 continued = 1;
1544 }
1545 if (truncated)
1546 printf(" (truncated)");
1547 }
1548
pr_niquery_reply(__u8 * _nih,int len)1549 void pr_niquery_reply(__u8 *_nih, int len)
1550 {
1551 struct ni_hdr *nih = (struct ni_hdr *)_nih;
1552
1553 switch (nih->ni_code) {
1554 case NI_SUCCESS:
1555 switch (ntohs(nih->ni_qtype)) {
1556 case NI_QTYPE_NAME:
1557 pr_niquery_reply_name(nih, len);
1558 break;
1559 case NI_QTYPE_IPV4ADDR:
1560 case NI_QTYPE_IPV6ADDR:
1561 pr_niquery_reply_addr(nih, len);
1562 break;
1563 default:
1564 printf(" unknown qtype(0x%02x)", ntohs(nih->ni_qtype));
1565 }
1566 break;
1567 case NI_REFUSED:
1568 printf(" refused");
1569 break;
1570 case NI_UNKNOWN:
1571 printf(" unknown");
1572 break;
1573 default:
1574 printf(" unknown code(%02x)", ntohs(nih->ni_code));
1575 }
1576 printf("; seq=%u;", ntohsp((__u16*)nih->ni_nonce));
1577 }
1578
1579 /*
1580 * parse_reply --
1581 * Print out the packet, if it came from us. This logic is necessary
1582 * because ALL readers of the ICMP socket get a copy of ALL ICMP packets
1583 * which arrive ('tis only fair). This permits multiple copies of this
1584 * program to be run without having intermingled output (or statistics!).
1585 */
1586 int
parse_reply(struct msghdr * msg,int cc,void * addr,struct timeval * tv)1587 parse_reply(struct msghdr *msg, int cc, void *addr, struct timeval *tv)
1588 {
1589 struct sockaddr_in6 *from = addr;
1590 __u8 *buf = msg->msg_iov->iov_base;
1591 struct cmsghdr *c;
1592 struct icmp6_hdr *icmph;
1593 int hops = -1;
1594
1595 for (c = CMSG_FIRSTHDR(msg); c; c = CMSG_NXTHDR(msg, c)) {
1596 if (c->cmsg_level != SOL_IPV6)
1597 continue;
1598 switch(c->cmsg_type) {
1599 case IPV6_HOPLIMIT:
1600 #ifdef IPV6_2292HOPLIMIT
1601 case IPV6_2292HOPLIMIT:
1602 #endif
1603 if (c->cmsg_len < CMSG_LEN(sizeof(int)))
1604 continue;
1605 memcpy(&hops, CMSG_DATA(c), sizeof(hops));
1606 }
1607 }
1608
1609
1610 /* Now the ICMP part */
1611
1612 icmph = (struct icmp6_hdr *) buf;
1613 if (cc < 8) {
1614 if (options & F_VERBOSE)
1615 fprintf(stderr, "ping: packet too short (%d bytes)\n", cc);
1616 return 1;
1617 }
1618
1619 if (icmph->icmp6_type == ICMP6_ECHO_REPLY) {
1620 if (!is_ours(icmph->icmp6_id))
1621 return 1;
1622 if (gather_statistics((__u8*)icmph, sizeof(*icmph), cc,
1623 ntohs(icmph->icmp6_seq),
1624 hops, 0, tv, pr_addr(&from->sin6_addr),
1625 pr_echo_reply))
1626 return 0;
1627 } else if (icmph->icmp6_type == ICMPV6_NI_REPLY) {
1628 struct ni_hdr *nih = (struct ni_hdr *)icmph;
1629 int seq = niquery_check_nonce(nih->ni_nonce);
1630 if (seq < 0)
1631 return 1;
1632 if (gather_statistics((__u8*)icmph, sizeof(*icmph), cc,
1633 seq,
1634 hops, 0, tv, pr_addr(&from->sin6_addr),
1635 pr_niquery_reply))
1636 return 0;
1637 } else {
1638 int nexthdr;
1639 struct ip6_hdr *iph1 = (struct ip6_hdr*)(icmph+1);
1640 struct icmp6_hdr *icmph1 = (struct icmp6_hdr *)(iph1+1);
1641
1642 /* We must not ever fall here. All the messages but
1643 * echo reply are blocked by filter and error are
1644 * received with IPV6_RECVERR. Ugly code is preserved
1645 * however, just to remember what crap we avoided
1646 * using RECVRERR. :-)
1647 */
1648
1649 if (cc < 8+sizeof(struct ip6_hdr)+8)
1650 return 1;
1651
1652 if (memcmp(&iph1->ip6_dst, &whereto.sin6_addr, 16))
1653 return 1;
1654
1655 nexthdr = iph1->ip6_nxt;
1656
1657 if (nexthdr == 44) {
1658 nexthdr = *(__u8*)icmph1;
1659 icmph1++;
1660 }
1661 if (nexthdr == IPPROTO_ICMPV6) {
1662 if (icmph1->icmp6_type != ICMP6_ECHO_REQUEST ||
1663 !is_ours(icmph1->icmp6_id))
1664 return 1;
1665 acknowledge(ntohs(icmph1->icmp6_seq));
1666 if (working_recverr)
1667 return 0;
1668 nerrors++;
1669 if (options & F_FLOOD) {
1670 write_stdout("\bE", 2);
1671 return 0;
1672 }
1673 print_timestamp();
1674 printf("From %s: icmp_seq=%u ", pr_addr(&from->sin6_addr), ntohs(icmph1->icmp6_seq));
1675 } else {
1676 /* We've got something other than an ECHOREPLY */
1677 if (!(options & F_VERBOSE) || uid)
1678 return 1;
1679 print_timestamp();
1680 printf("From %s: ", pr_addr(&from->sin6_addr));
1681 }
1682 pr_icmph(icmph->icmp6_type, icmph->icmp6_code, ntohl(icmph->icmp6_mtu));
1683 }
1684
1685 if (!(options & F_FLOOD)) {
1686 if (options & F_AUDIBLE)
1687 putchar('\a');
1688 putchar('\n');
1689 fflush(stdout);
1690 } else {
1691 putchar('\a');
1692 fflush(stdout);
1693 }
1694 return 0;
1695 }
1696
1697
pr_icmph(__u8 type,__u8 code,__u32 info)1698 int pr_icmph(__u8 type, __u8 code, __u32 info)
1699 {
1700 switch(type) {
1701 case ICMP6_DST_UNREACH:
1702 printf("Destination unreachable: ");
1703 switch (code) {
1704 case ICMP6_DST_UNREACH_NOROUTE:
1705 printf("No route");
1706 break;
1707 case ICMP6_DST_UNREACH_ADMIN:
1708 printf("Administratively prohibited");
1709 break;
1710 case ICMP6_DST_UNREACH_BEYONDSCOPE:
1711 printf("Beyond scope of source address");
1712 break;
1713 case ICMP6_DST_UNREACH_ADDR:
1714 printf("Address unreachable");
1715 break;
1716 case ICMP6_DST_UNREACH_NOPORT:
1717 printf("Port unreachable");
1718 break;
1719 default:
1720 printf("Unknown code %d", code);
1721 break;
1722 }
1723 break;
1724 case ICMP6_PACKET_TOO_BIG:
1725 printf("Packet too big: mtu=%u", info);
1726 if (code)
1727 printf(", code=%d", code);
1728 break;
1729 case ICMP6_TIME_EXCEEDED:
1730 printf("Time exceeded: ");
1731 if (code == ICMP6_TIME_EXCEED_TRANSIT)
1732 printf("Hop limit");
1733 else if (code == ICMP6_TIME_EXCEED_REASSEMBLY)
1734 printf("Defragmentation failure");
1735 else
1736 printf("code %d", code);
1737 break;
1738 case ICMP6_PARAM_PROB:
1739 printf("Parameter problem: ");
1740 if (code == ICMP6_PARAMPROB_HEADER)
1741 printf("Wrong header field ");
1742 else if (code == ICMP6_PARAMPROB_NEXTHEADER)
1743 printf("Unknown header ");
1744 else if (code == ICMP6_PARAMPROB_OPTION)
1745 printf("Unknown option ");
1746 else
1747 printf("code %d ", code);
1748 printf ("at %u", info);
1749 break;
1750 case ICMP6_ECHO_REQUEST:
1751 printf("Echo request");
1752 break;
1753 case ICMP6_ECHO_REPLY:
1754 printf("Echo reply");
1755 break;
1756 case MLD_LISTENER_QUERY:
1757 printf("MLD Query");
1758 break;
1759 case MLD_LISTENER_REPORT:
1760 printf("MLD Report");
1761 break;
1762 case MLD_LISTENER_REDUCTION:
1763 printf("MLD Reduction");
1764 break;
1765 default:
1766 printf("unknown icmp type: %u", type);
1767
1768 }
1769 return 0;
1770 }
1771
1772 #include <linux/filter.h>
1773
install_filter(void)1774 void install_filter(void)
1775 {
1776 static int once;
1777 static struct sock_filter insns[] = {
1778 BPF_STMT(BPF_LD|BPF_H|BPF_ABS, 4), /* Load icmp echo ident */
1779 BPF_JUMP(BPF_JMP|BPF_JEQ|BPF_K, 0xAAAA, 0, 1), /* Ours? */
1780 BPF_STMT(BPF_RET|BPF_K, ~0U), /* Yes, it passes. */
1781 BPF_STMT(BPF_LD|BPF_B|BPF_ABS, 0), /* Load icmp type */
1782 BPF_JUMP(BPF_JMP|BPF_JEQ|BPF_K, ICMP6_ECHO_REPLY, 1, 0), /* Echo? */
1783 BPF_STMT(BPF_RET|BPF_K, ~0U), /* No. It passes. This must not happen. */
1784 BPF_STMT(BPF_RET|BPF_K, 0), /* Echo with wrong ident. Reject. */
1785 };
1786 static struct sock_fprog filter = {
1787 sizeof insns / sizeof(insns[0]),
1788 insns
1789 };
1790
1791 if (once)
1792 return;
1793 once = 1;
1794
1795 /* Patch bpflet for current identifier. */
1796 insns[1] = (struct sock_filter)BPF_JUMP(BPF_JMP|BPF_JEQ|BPF_K, htons(ident), 0, 1);
1797
1798 if (setsockopt(icmp_sock, SOL_SOCKET, SO_ATTACH_FILTER, &filter, sizeof(filter)))
1799 perror("WARNING: failed to install socket filter\n");
1800 }
1801
1802
1803 /*
1804 * pr_addr --
1805 * Return an ascii host address as a dotted quad and optionally with
1806 * a hostname.
1807 */
pr_addr(struct in6_addr * addr)1808 char * pr_addr(struct in6_addr *addr)
1809 {
1810 struct hostent *hp = NULL;
1811 static char *s;
1812
1813 #ifdef USE_IDN
1814 free(s);
1815 #endif
1816
1817 in_pr_addr = !setjmp(pr_addr_jmp);
1818
1819 if (!(exiting || options&F_NUMERIC))
1820 hp = gethostbyaddr((__u8*)addr, sizeof(struct in6_addr), AF_INET6);
1821
1822 in_pr_addr = 0;
1823
1824 if (!hp
1825 #ifdef USE_IDN
1826 || idna_to_unicode_lzlz(hp->h_name, &s, 0) != IDNA_SUCCESS
1827 #endif
1828 )
1829 s = NULL;
1830
1831 return hp ? (s ? s : hp->h_name) : pr_addr_n(addr);
1832 }
1833
pr_addr_n(struct in6_addr * addr)1834 char * pr_addr_n(struct in6_addr *addr)
1835 {
1836 static char str[64];
1837 inet_ntop(AF_INET6, addr, str, sizeof(str));
1838 return str;
1839 }
1840
1841 #define USAGE_NEWLINE "\n "
1842
usage(void)1843 void usage(void)
1844 {
1845 fprintf(stderr,
1846 "Usage: ping6"
1847 " [-"
1848 "aAbBdDfhLnOqrRUvV"
1849 "]"
1850 " [-c count]"
1851 " [-i interval]"
1852 " [-I interface]"
1853 USAGE_NEWLINE
1854 " [-l preload]"
1855 " [-m mark]"
1856 " [-M pmtudisc_option]"
1857 USAGE_NEWLINE
1858 " [-N nodeinfo_option]"
1859 " [-p pattern]"
1860 " [-Q tclass]"
1861 " [-s packetsize]"
1862 USAGE_NEWLINE
1863 " [-S sndbuf]"
1864 " [-t ttl]"
1865 " [-T timestamp_option]"
1866 " [-w deadline]"
1867 USAGE_NEWLINE
1868 " [-W timeout]"
1869 #ifdef ENABLE_PING6_RTHDR
1870 " [hop1 ...]"
1871 #endif
1872 " destination"
1873 "\n"
1874 );
1875 exit(2);
1876 }
1877