]> The Tcpdump Group git mirrors - tcpdump/blob - print-dhcp6.c
Include <string.h> only if required.
[tcpdump] / print-dhcp6.c
1 /*
2 * Copyright (C) 1998 and 1999 WIDE Project.
3 * All rights reserved.
4 *
5 * Redistribution and use in source and binary forms, with or without
6 * modification, are permitted provided that the following conditions
7 * are met:
8 * 1. Redistributions of source code must retain the above copyright
9 * notice, this list of conditions and the following disclaimer.
10 * 2. Redistributions in binary form must reproduce the above copyright
11 * notice, this list of conditions and the following disclaimer in the
12 * documentation and/or other materials provided with the distribution.
13 * 3. Neither the name of the project nor the names of its contributors
14 * may be used to endorse or promote products derived from this software
15 * without specific prior written permission.
16 *
17 * THIS SOFTWARE IS PROVIDED BY THE PROJECT AND CONTRIBUTORS ``AS IS'' AND
18 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
19 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
20 * ARE DISCLAIMED. IN NO EVENT SHALL THE PROJECT OR CONTRIBUTORS BE LIABLE
21 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
22 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
23 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
24 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
25 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
26 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
27 * SUCH DAMAGE.
28 */
29
30 /* \summary: IPv6 DHCP printer */
31
32 /*
33 * RFC3315: DHCPv6
34 * supported DHCPv6 options:
35 * RFC3319: Session Initiation Protocol (SIP) Servers options,
36 * RFC3633: IPv6 Prefix options,
37 * RFC3646: DNS Configuration options,
38 * RFC3898: Network Information Service (NIS) Configuration options,
39 * RFC4075: Simple Network Time Protocol (SNTP) Configuration option,
40 * RFC4242: Information Refresh Time option,
41 * RFC4280: Broadcast and Multicast Control Servers options,
42 * RFC5908: Network Time Protocol (NTP) Server Option for DHCPv6
43 * RFC6334: Dual-Stack Lite option,
44 */
45
46 #ifdef HAVE_CONFIG_H
47 #include <config.h>
48 #endif
49
50 #include "netdissect-stdinc.h"
51
52 #include <stdio.h>
53
54 #include "netdissect.h"
55 #include "addrtoname.h"
56 #include "extract.h"
57
58 /* lease duration */
59 #define DHCP6_DURATION_INFINITE 0xffffffff
60
61 /* Error Values */
62 #define DH6ERR_FAILURE 16
63 #define DH6ERR_AUTHFAIL 17
64 #define DH6ERR_POORLYFORMED 18
65 #define DH6ERR_UNAVAIL 19
66 #define DH6ERR_OPTUNAVAIL 20
67
68 /* Message type */
69 #define DH6_SOLICIT 1
70 #define DH6_ADVERTISE 2
71 #define DH6_REQUEST 3
72 #define DH6_CONFIRM 4
73 #define DH6_RENEW 5
74 #define DH6_REBIND 6
75 #define DH6_REPLY 7
76 #define DH6_RELEASE 8
77 #define DH6_DECLINE 9
78 #define DH6_RECONFIGURE 10
79 #define DH6_INFORM_REQ 11
80 #define DH6_RELAY_FORW 12
81 #define DH6_RELAY_REPLY 13
82 #define DH6_LEASEQUERY 14
83 #define DH6_LQ_REPLY 15
84
85 static const struct tok dh6_msgtype_str[] = {
86 { DH6_SOLICIT, "solicit" },
87 { DH6_ADVERTISE, "advertise" },
88 { DH6_REQUEST, "request" },
89 { DH6_CONFIRM, "confirm" },
90 { DH6_RENEW, "renew" },
91 { DH6_REBIND, "rebind" },
92 { DH6_REPLY, "reply" },
93 { DH6_RELEASE, "release" },
94 { DH6_DECLINE, "decline" },
95 { DH6_RECONFIGURE, "reconfigure" },
96 { DH6_INFORM_REQ, "inf-req" },
97 { DH6_RELAY_FORW, "relay-fwd" },
98 { DH6_RELAY_REPLY, "relay-reply" },
99 { DH6_LEASEQUERY, "leasequery" },
100 { DH6_LQ_REPLY, "leasequery-reply" },
101 { 0, NULL }
102 };
103
104 /* DHCP6 base packet format */
105 struct dhcp6 {
106 union {
107 nd_uint8_t msgtype;
108 nd_uint32_t xid;
109 } dh6_msgtypexid;
110 /* options follow */
111 };
112 #define DH6_XIDMASK 0x00ffffff
113
114 /* DHCPv6 relay messages */
115 struct dhcp6_relay {
116 nd_uint8_t dh6relay_msgtype;
117 nd_uint8_t dh6relay_hcnt;
118 nd_ipv6 dh6relay_linkaddr; /* XXX: badly aligned */
119 nd_ipv6 dh6relay_peeraddr;
120 /* options follow */
121 };
122
123 /* options */
124 #define DH6OPT_CLIENTID 1
125 #define DH6OPT_SERVERID 2
126 #define DH6OPT_IA_NA 3
127 #define DH6OPT_IA_TA 4
128 #define DH6OPT_IA_ADDR 5
129 #define DH6OPT_ORO 6
130 #define DH6OPT_PREFERENCE 7
131 # define DH6OPT_PREF_MAX 255
132 #define DH6OPT_ELAPSED_TIME 8
133 #define DH6OPT_RELAY_MSG 9
134 /*#define DH6OPT_SERVER_MSG 10 deprecated */
135 #define DH6OPT_AUTH 11
136 # define DH6OPT_AUTHPROTO_DELAYED 2
137 # define DH6OPT_AUTHPROTO_RECONFIG 3
138 # define DH6OPT_AUTHALG_HMACMD5 1
139 # define DH6OPT_AUTHRDM_MONOCOUNTER 0
140 # define DH6OPT_AUTHRECONFIG_KEY 1
141 # define DH6OPT_AUTHRECONFIG_HMACMD5 2
142 #define DH6OPT_UNICAST 12
143 #define DH6OPT_STATUS_CODE 13
144 # define DH6OPT_STCODE_SUCCESS 0
145 # define DH6OPT_STCODE_UNSPECFAIL 1
146 # define DH6OPT_STCODE_NOADDRAVAIL 2
147 # define DH6OPT_STCODE_NOBINDING 3
148 # define DH6OPT_STCODE_NOTONLINK 4
149 # define DH6OPT_STCODE_USEMULTICAST 5
150 # define DH6OPT_STCODE_NOPREFIXAVAIL 6
151 # define DH6OPT_STCODE_UNKNOWNQUERYTYPE 7
152 # define DH6OPT_STCODE_MALFORMEDQUERY 8
153 # define DH6OPT_STCODE_NOTCONFIGURED 9
154 # define DH6OPT_STCODE_NOTALLOWED 10
155 #define DH6OPT_RAPID_COMMIT 14
156 #define DH6OPT_USER_CLASS 15
157 #define DH6OPT_VENDOR_CLASS 16
158 #define DH6OPT_VENDOR_OPTS 17
159 #define DH6OPT_INTERFACE_ID 18
160 #define DH6OPT_RECONF_MSG 19
161 #define DH6OPT_RECONF_ACCEPT 20
162 #define DH6OPT_SIP_SERVER_D 21
163 #define DH6OPT_SIP_SERVER_A 22
164 #define DH6OPT_DNS_SERVERS 23
165 #define DH6OPT_DOMAIN_LIST 24
166 #define DH6OPT_IA_PD 25
167 #define DH6OPT_IA_PD_PREFIX 26
168 #define DH6OPT_NIS_SERVERS 27
169 #define DH6OPT_NISP_SERVERS 28
170 #define DH6OPT_NIS_NAME 29
171 #define DH6OPT_NISP_NAME 30
172 #define DH6OPT_SNTP_SERVERS 31
173 #define DH6OPT_LIFETIME 32
174 #define DH6OPT_BCMCS_SERVER_D 33
175 #define DH6OPT_BCMCS_SERVER_A 34
176 #define DH6OPT_GEOCONF_CIVIC 36
177 #define DH6OPT_REMOTE_ID 37
178 #define DH6OPT_SUBSCRIBER_ID 38
179 #define DH6OPT_CLIENT_FQDN 39
180 #define DH6OPT_PANA_AGENT 40
181 #define DH6OPT_NEW_POSIX_TIMEZONE 41
182 #define DH6OPT_NEW_TZDB_TIMEZONE 42
183 #define DH6OPT_ERO 43
184 #define DH6OPT_LQ_QUERY 44
185 #define DH6OPT_CLIENT_DATA 45
186 #define DH6OPT_CLT_TIME 46
187 #define DH6OPT_LQ_RELAY_DATA 47
188 #define DH6OPT_LQ_CLIENT_LINK 48
189 #define DH6OPT_NTP_SERVER 56
190 # define DH6OPT_NTP_SUBOPTION_SRV_ADDR 1
191 # define DH6OPT_NTP_SUBOPTION_MC_ADDR 2
192 # define DH6OPT_NTP_SUBOPTION_SRV_FQDN 3
193 #define DH6OPT_AFTR_NAME 64
194 #define DH6OPT_MUDURL 112
195
196 static const struct tok dh6opt_str[] = {
197 { DH6OPT_CLIENTID, "client-ID" },
198 { DH6OPT_SERVERID, "server-ID" },
199 { DH6OPT_IA_NA, "IA_NA" },
200 { DH6OPT_IA_TA, "IA_TA" },
201 { DH6OPT_IA_ADDR, "IA_ADDR" },
202 { DH6OPT_ORO, "option-request" },
203 { DH6OPT_PREFERENCE, "preference" },
204 { DH6OPT_ELAPSED_TIME, "elapsed-time" },
205 { DH6OPT_RELAY_MSG, "relay-message" },
206 { DH6OPT_AUTH, "authentication" },
207 { DH6OPT_UNICAST, "server-unicast" },
208 { DH6OPT_STATUS_CODE, "status-code" },
209 { DH6OPT_RAPID_COMMIT, "rapid-commit" },
210 { DH6OPT_USER_CLASS, "user-class" },
211 { DH6OPT_VENDOR_CLASS, "vendor-class" },
212 { DH6OPT_VENDOR_OPTS, "vendor-specific-info" },
213 { DH6OPT_INTERFACE_ID, "interface-ID" },
214 { DH6OPT_RECONF_MSG, "reconfigure-message" },
215 { DH6OPT_RECONF_ACCEPT, "reconfigure-accept" },
216 { DH6OPT_SIP_SERVER_D, "SIP-servers-domain" },
217 { DH6OPT_SIP_SERVER_A, "SIP-servers-address" },
218 { DH6OPT_DNS_SERVERS, "DNS-server" },
219 { DH6OPT_DOMAIN_LIST, "DNS-search-list" },
220 { DH6OPT_IA_PD, "IA_PD" },
221 { DH6OPT_IA_PD_PREFIX, "IA_PD-prefix" },
222 { DH6OPT_SNTP_SERVERS, "SNTP-servers" },
223 { DH6OPT_LIFETIME, "lifetime" },
224 { DH6OPT_NIS_SERVERS, "NIS-server" },
225 { DH6OPT_NISP_SERVERS, "NIS+-server" },
226 { DH6OPT_NIS_NAME, "NIS-domain-name" },
227 { DH6OPT_NISP_NAME, "NIS+-domain-name" },
228 { DH6OPT_BCMCS_SERVER_D, "BCMCS-domain-name" },
229 { DH6OPT_BCMCS_SERVER_A, "BCMCS-server" },
230 { DH6OPT_GEOCONF_CIVIC, "Geoconf-Civic" },
231 { DH6OPT_REMOTE_ID, "Remote-ID" },
232 { DH6OPT_SUBSCRIBER_ID, "Subscriber-ID" },
233 { DH6OPT_CLIENT_FQDN, "Client-FQDN" },
234 { DH6OPT_PANA_AGENT, "PANA-agent" },
235 { DH6OPT_NEW_POSIX_TIMEZONE, "POSIX-timezone" },
236 { DH6OPT_NEW_TZDB_TIMEZONE, "POSIX-tz-database" },
237 { DH6OPT_ERO, "Echo-request-option" },
238 { DH6OPT_LQ_QUERY, "Lease-query" },
239 { DH6OPT_CLIENT_DATA, "LQ-client-data" },
240 { DH6OPT_CLT_TIME, "Clt-time" },
241 { DH6OPT_LQ_RELAY_DATA, "LQ-relay-data" },
242 { DH6OPT_LQ_CLIENT_LINK, "LQ-client-link" },
243 { DH6OPT_NTP_SERVER, "NTP-server" },
244 { DH6OPT_AFTR_NAME, "AFTR-Name" },
245 { DH6OPT_MUDURL, "MUD-URL" },
246 { 0, NULL }
247 };
248
249 static const struct tok dh6opt_stcode_str[] = {
250 { DH6OPT_STCODE_SUCCESS, "Success" }, /* RFC3315 */
251 { DH6OPT_STCODE_UNSPECFAIL, "UnspecFail" }, /* RFC3315 */
252 { DH6OPT_STCODE_NOADDRAVAIL, "NoAddrsAvail" }, /* RFC3315 */
253 { DH6OPT_STCODE_NOBINDING, "NoBinding" }, /* RFC3315 */
254 { DH6OPT_STCODE_NOTONLINK, "NotOnLink" }, /* RFC3315 */
255 { DH6OPT_STCODE_USEMULTICAST, "UseMulticast" }, /* RFC3315 */
256 { DH6OPT_STCODE_NOPREFIXAVAIL, "NoPrefixAvail" }, /* RFC3633 */
257 { DH6OPT_STCODE_UNKNOWNQUERYTYPE, "UnknownQueryType" }, /* RFC5007 */
258 { DH6OPT_STCODE_MALFORMEDQUERY, "MalformedQuery" }, /* RFC5007 */
259 { DH6OPT_STCODE_NOTCONFIGURED, "NotConfigured" }, /* RFC5007 */
260 { DH6OPT_STCODE_NOTALLOWED, "NotAllowed" }, /* RFC5007 */
261 { 0, NULL }
262 };
263
264 struct dhcp6opt {
265 nd_uint16_t dh6opt_type;
266 nd_uint16_t dh6opt_len;
267 /* type-dependent data follows */
268 };
269
270 static const char *
271 dhcp6stcode(const uint16_t code)
272 {
273 return code > 255 ? "INVALID code" : tok2str(dh6opt_stcode_str, "code%u", code);
274 }
275
276 static void
277 dhcp6opt_print(netdissect_options *ndo,
278 const u_char *cp, const u_char *ep)
279 {
280 const struct dhcp6opt *dh6o;
281 const u_char *tp;
282 u_int i;
283 uint16_t opttype;
284 uint16_t optlen;
285 uint8_t auth_proto;
286 uint8_t auth_alg;
287 uint8_t auth_rdm;
288 u_int authinfolen, authrealmlen;
289 u_int remain_len; /* Length of remaining options */
290 u_int label_len; /* Label length */
291 uint16_t subopt_code;
292 uint16_t subopt_len;
293 uint8_t dh6_reconf_type;
294 uint8_t dh6_lq_query_type;
295
296 if (cp == ep)
297 return;
298 while (cp < ep) {
299 if (ep < cp + sizeof(*dh6o))
300 goto trunc;
301 dh6o = (const struct dhcp6opt *)cp;
302 ND_TCHECK_SIZE(dh6o);
303 optlen = GET_BE_U_2(dh6o->dh6opt_len);
304 if (ep < cp + sizeof(*dh6o) + optlen)
305 goto trunc;
306 opttype = GET_BE_U_2(dh6o->dh6opt_type);
307 ND_PRINT(" (%s", tok2str(dh6opt_str, "opt_%u", opttype));
308 ND_TCHECK_LEN(cp + sizeof(*dh6o), optlen);
309 switch (opttype) {
310 case DH6OPT_CLIENTID:
311 case DH6OPT_SERVERID:
312 if (optlen < 2) {
313 /*(*/
314 ND_PRINT(" ?)");
315 break;
316 }
317 tp = (const u_char *)(dh6o + 1);
318 switch (GET_BE_U_2(tp)) {
319 case 1:
320 if (optlen >= 2 + 6) {
321 ND_PRINT(" hwaddr/time type %u time %u ",
322 GET_BE_U_2(tp + 2),
323 GET_BE_U_4(tp + 4));
324 for (i = 8; i < optlen; i++)
325 ND_PRINT("%02x",
326 GET_U_1(tp + i));
327 /*(*/
328 ND_PRINT(")");
329 } else {
330 /*(*/
331 ND_PRINT(" ?)");
332 }
333 break;
334 case 2:
335 if (optlen >= 2 + 8) {
336 ND_PRINT(" vid ");
337 for (i = 2; i < 2 + 8; i++)
338 ND_PRINT("%02x",
339 GET_U_1(tp + i));
340 /*(*/
341 ND_PRINT(")");
342 } else {
343 /*(*/
344 ND_PRINT(" ?)");
345 }
346 break;
347 case 3:
348 if (optlen >= 2 + 2) {
349 ND_PRINT(" hwaddr type %u ",
350 GET_BE_U_2(tp + 2));
351 for (i = 4; i < optlen; i++)
352 ND_PRINT("%02x",
353 GET_U_1(tp + i));
354 /*(*/
355 ND_PRINT(")");
356 } else {
357 /*(*/
358 ND_PRINT(" ?)");
359 }
360 break;
361 default:
362 ND_PRINT(" type %u)", GET_BE_U_2(tp));
363 break;
364 }
365 break;
366 case DH6OPT_IA_ADDR:
367 if (optlen < 24) {
368 /*(*/
369 ND_PRINT(" ?)");
370 break;
371 }
372 tp = (const u_char *)(dh6o + 1);
373 ND_PRINT(" %s", GET_IP6ADDR_STRING(tp));
374 ND_PRINT(" pltime:%u vltime:%u",
375 GET_BE_U_4(tp + 16),
376 GET_BE_U_4(tp + 20));
377 if (optlen > 24) {
378 /* there are sub-options */
379 dhcp6opt_print(ndo, tp + 24, tp + optlen);
380 }
381 ND_PRINT(")");
382 break;
383 case DH6OPT_ORO:
384 case DH6OPT_ERO:
385 if (optlen % 2) {
386 ND_PRINT(" ?)");
387 break;
388 }
389 tp = (const u_char *)(dh6o + 1);
390 for (i = 0; i < optlen; i += 2) {
391 ND_PRINT(" %s",
392 tok2str(dh6opt_str, "opt_%u", GET_BE_U_2(tp + i)));
393 }
394 ND_PRINT(")");
395 break;
396 case DH6OPT_PREFERENCE:
397 if (optlen != 1) {
398 ND_PRINT(" ?)");
399 break;
400 }
401 tp = (const u_char *)(dh6o + 1);
402 ND_PRINT(" %u)", GET_U_1(tp));
403 break;
404 case DH6OPT_ELAPSED_TIME:
405 if (optlen != 2) {
406 ND_PRINT(" ?)");
407 break;
408 }
409 tp = (const u_char *)(dh6o + 1);
410 ND_PRINT(" %u)", GET_BE_U_2(tp));
411 break;
412 case DH6OPT_RELAY_MSG:
413 ND_PRINT(" (");
414 tp = (const u_char *)(dh6o + 1);
415 dhcp6_print(ndo, tp, optlen);
416 ND_PRINT(")");
417 break;
418 case DH6OPT_AUTH:
419 if (optlen < 11) {
420 ND_PRINT(" ?)");
421 break;
422 }
423 tp = (const u_char *)(dh6o + 1);
424 auth_proto = GET_U_1(tp);
425 switch (auth_proto) {
426 case DH6OPT_AUTHPROTO_DELAYED:
427 ND_PRINT(" proto: delayed");
428 break;
429 case DH6OPT_AUTHPROTO_RECONFIG:
430 ND_PRINT(" proto: reconfigure");
431 break;
432 default:
433 ND_PRINT(" proto: %u", auth_proto);
434 break;
435 }
436 tp++;
437 auth_alg = GET_U_1(tp);
438 switch (auth_alg) {
439 case DH6OPT_AUTHALG_HMACMD5:
440 /* XXX: may depend on the protocol */
441 ND_PRINT(", alg: HMAC-MD5");
442 break;
443 default:
444 ND_PRINT(", alg: %u", auth_alg);
445 break;
446 }
447 tp++;
448 auth_rdm = GET_U_1(tp);
449 switch (auth_rdm) {
450 case DH6OPT_AUTHRDM_MONOCOUNTER:
451 ND_PRINT(", RDM: mono");
452 break;
453 default:
454 ND_PRINT(", RDM: %u", auth_rdm);
455 break;
456 }
457 tp++;
458 ND_PRINT(", RD:");
459 for (i = 0; i < 4; i++, tp += 2)
460 ND_PRINT(" %04x", GET_BE_U_2(tp));
461
462 /* protocol dependent part */
463 authinfolen = optlen - 11;
464 switch (auth_proto) {
465 case DH6OPT_AUTHPROTO_DELAYED:
466 if (authinfolen == 0)
467 break;
468 if (authinfolen < 20) {
469 ND_PRINT(" ??");
470 break;
471 }
472 authrealmlen = authinfolen - 20;
473 if (authrealmlen > 0) {
474 ND_PRINT(", realm: ");
475 }
476 for (i = 0; i < authrealmlen; i++, tp++)
477 ND_PRINT("%02x", GET_U_1(tp));
478 ND_PRINT(", key ID: %08x", GET_BE_U_4(tp));
479 tp += 4;
480 ND_PRINT(", HMAC-MD5:");
481 for (i = 0; i < 4; i++, tp+= 4)
482 ND_PRINT(" %08x", GET_BE_U_4(tp));
483 break;
484 case DH6OPT_AUTHPROTO_RECONFIG:
485 if (authinfolen != 17) {
486 ND_PRINT(" ??");
487 break;
488 }
489 switch (GET_U_1(tp)) {
490 case DH6OPT_AUTHRECONFIG_KEY:
491 ND_PRINT(" reconfig-key");
492 break;
493 case DH6OPT_AUTHRECONFIG_HMACMD5:
494 ND_PRINT(" type: HMAC-MD5");
495 break;
496 default:
497 ND_PRINT(" type: ??");
498 break;
499 }
500 tp++;
501 ND_PRINT(" value:");
502 for (i = 0; i < 4; i++, tp+= 4)
503 ND_PRINT(" %08x", GET_BE_U_4(tp));
504 break;
505 default:
506 ND_PRINT(" ??");
507 break;
508 }
509
510 ND_PRINT(")");
511 break;
512 case DH6OPT_RAPID_COMMIT: /* nothing todo */
513 ND_PRINT(")");
514 break;
515 case DH6OPT_INTERFACE_ID:
516 case DH6OPT_SUBSCRIBER_ID:
517 /*
518 * Since we cannot predict the encoding, print hex dump
519 * at most 10 characters.
520 */
521 tp = (const u_char *)(dh6o + 1);
522 ND_PRINT(" ");
523 for (i = 0; i < optlen && i < 10; i++)
524 ND_PRINT("%02x", GET_U_1(tp + i));
525 ND_PRINT("...)");
526 break;
527 case DH6OPT_RECONF_MSG:
528 if (optlen != 1) {
529 ND_PRINT(" ?)");
530 break;
531 }
532 tp = (const u_char *)(dh6o + 1);
533 dh6_reconf_type = GET_U_1(tp);
534 switch (dh6_reconf_type) {
535 case DH6_RENEW:
536 ND_PRINT(" for renew)");
537 break;
538 case DH6_INFORM_REQ:
539 ND_PRINT(" for inf-req)");
540 break;
541 default:
542 ND_PRINT(" for ?\?\?(%02x))", dh6_reconf_type);
543 break;
544 }
545 break;
546 case DH6OPT_RECONF_ACCEPT: /* nothing todo */
547 ND_PRINT(")");
548 break;
549 case DH6OPT_SIP_SERVER_A:
550 case DH6OPT_DNS_SERVERS:
551 case DH6OPT_SNTP_SERVERS:
552 case DH6OPT_NIS_SERVERS:
553 case DH6OPT_NISP_SERVERS:
554 case DH6OPT_BCMCS_SERVER_A:
555 case DH6OPT_PANA_AGENT:
556 case DH6OPT_LQ_CLIENT_LINK:
557 if (optlen % 16) {
558 ND_PRINT(" ?)");
559 break;
560 }
561 tp = (const u_char *)(dh6o + 1);
562 for (i = 0; i < optlen; i += 16)
563 ND_PRINT(" %s", GET_IP6ADDR_STRING(tp + i));
564 ND_PRINT(")");
565 break;
566 case DH6OPT_SIP_SERVER_D:
567 case DH6OPT_DOMAIN_LIST:
568 tp = (const u_char *)(dh6o + 1);
569 while (tp < cp + sizeof(*dh6o) + optlen) {
570 ND_PRINT(" ");
571 if ((tp = fqdn_print(ndo, tp, cp + sizeof(*dh6o) + optlen)) == NULL)
572 goto trunc;
573 }
574 ND_PRINT(")");
575 break;
576 case DH6OPT_STATUS_CODE:
577 if (optlen < 2) {
578 ND_PRINT(" ?)");
579 break;
580 }
581 tp = (const u_char *)(dh6o + 1);
582 ND_PRINT(" %s)", dhcp6stcode(GET_BE_U_2(tp)));
583 break;
584 case DH6OPT_IA_NA:
585 case DH6OPT_IA_PD:
586 if (optlen < 12) {
587 ND_PRINT(" ?)");
588 break;
589 }
590 tp = (const u_char *)(dh6o + 1);
591 ND_PRINT(" IAID:%u T1:%u T2:%u",
592 GET_BE_U_4(tp),
593 GET_BE_U_4(tp + 4),
594 GET_BE_U_4(tp + 8));
595 if (optlen > 12) {
596 /* there are sub-options */
597 dhcp6opt_print(ndo, tp + 12, tp + optlen);
598 }
599 ND_PRINT(")");
600 break;
601 case DH6OPT_IA_TA:
602 if (optlen < 4) {
603 ND_PRINT(" ?)");
604 break;
605 }
606 tp = (const u_char *)(dh6o + 1);
607 ND_PRINT(" IAID:%u", GET_BE_U_4(tp));
608 if (optlen > 4) {
609 /* there are sub-options */
610 dhcp6opt_print(ndo, tp + 4, tp + optlen);
611 }
612 ND_PRINT(")");
613 break;
614 case DH6OPT_IA_PD_PREFIX:
615 if (optlen < 25) {
616 ND_PRINT(" ?)");
617 break;
618 }
619 tp = (const u_char *)(dh6o + 1);
620 ND_PRINT(" %s/%u", GET_IP6ADDR_STRING(tp + 9),
621 GET_U_1(tp + 8));
622 ND_PRINT(" pltime:%u vltime:%u",
623 GET_BE_U_4(tp),
624 GET_BE_U_4(tp + 4));
625 if (optlen > 25) {
626 /* there are sub-options */
627 dhcp6opt_print(ndo, tp + 25, tp + optlen);
628 }
629 ND_PRINT(")");
630 break;
631 case DH6OPT_LIFETIME:
632 case DH6OPT_CLT_TIME:
633 if (optlen != 4) {
634 ND_PRINT(" ?)");
635 break;
636 }
637 tp = (const u_char *)(dh6o + 1);
638 ND_PRINT(" %u)", GET_BE_U_4(tp));
639 break;
640 case DH6OPT_REMOTE_ID:
641 if (optlen < 4) {
642 ND_PRINT(" ?)");
643 break;
644 }
645 tp = (const u_char *)(dh6o + 1);
646 ND_PRINT(" %u ", GET_BE_U_4(tp));
647 /*
648 * Print hex dump first 10 characters.
649 */
650 for (i = 4; i < optlen && i < 14; i++)
651 ND_PRINT("%02x", GET_U_1(tp + i));
652 ND_PRINT("...)");
653 break;
654 case DH6OPT_LQ_QUERY:
655 if (optlen < 17) {
656 ND_PRINT(" ?)");
657 break;
658 }
659 tp = (const u_char *)(dh6o + 1);
660 dh6_lq_query_type = GET_U_1(tp);
661 switch (dh6_lq_query_type) {
662 case 1:
663 ND_PRINT(" by-address");
664 break;
665 case 2:
666 ND_PRINT(" by-clientID");
667 break;
668 default:
669 ND_PRINT(" type_%u", dh6_lq_query_type);
670 break;
671 }
672 ND_PRINT(" %s", GET_IP6ADDR_STRING(tp + 1));
673 if (optlen > 17) {
674 /* there are query-options */
675 dhcp6opt_print(ndo, tp + 17, tp + optlen);
676 }
677 ND_PRINT(")");
678 break;
679 case DH6OPT_CLIENT_DATA:
680 tp = (const u_char *)(dh6o + 1);
681 if (optlen > 0) {
682 /* there are encapsulated options */
683 dhcp6opt_print(ndo, tp, tp + optlen);
684 }
685 ND_PRINT(")");
686 break;
687 case DH6OPT_LQ_RELAY_DATA:
688 if (optlen < 16) {
689 ND_PRINT(" ?)");
690 break;
691 }
692 tp = (const u_char *)(dh6o + 1);
693 ND_PRINT(" %s ", GET_IP6ADDR_STRING(tp));
694 /*
695 * Print hex dump first 10 characters.
696 */
697 for (i = 16; i < optlen && i < 26; i++)
698 ND_PRINT("%02x", GET_U_1(tp + i));
699 ND_PRINT("...)");
700 break;
701 case DH6OPT_NTP_SERVER:
702 if (optlen < 4) {
703 ND_PRINT(" ?)");
704 break;
705 }
706 tp = (const u_char *)(dh6o + 1);
707 while (tp < cp + sizeof(*dh6o) + optlen - 4) {
708 subopt_code = GET_BE_U_2(tp);
709 tp += 2;
710 subopt_len = GET_BE_U_2(tp);
711 tp += 2;
712 if (tp + subopt_len > cp + sizeof(*dh6o) + optlen)
713 goto trunc;
714 ND_PRINT(" subopt:%u", subopt_code);
715 switch (subopt_code) {
716 case DH6OPT_NTP_SUBOPTION_SRV_ADDR:
717 case DH6OPT_NTP_SUBOPTION_MC_ADDR:
718 if (subopt_len != 16) {
719 ND_PRINT(" ?");
720 break;
721 }
722 ND_PRINT(" %s", GET_IP6ADDR_STRING(tp));
723 break;
724 case DH6OPT_NTP_SUBOPTION_SRV_FQDN:
725 ND_PRINT(" ");
726 if (fqdn_print(ndo, tp, tp + subopt_len) == NULL)
727 goto trunc;
728 break;
729 default:
730 ND_PRINT(" ?");
731 break;
732 }
733 tp += subopt_len;
734 }
735 ND_PRINT(")");
736 break;
737 case DH6OPT_AFTR_NAME:
738 if (optlen < 3) {
739 ND_PRINT(" ?)");
740 break;
741 }
742 tp = (const u_char *)(dh6o + 1);
743 remain_len = optlen;
744 ND_PRINT(" ");
745 /* Encoding is described in section 3.1 of RFC 1035 */
746 while (remain_len && GET_U_1(tp)) {
747 label_len = GET_U_1(tp);
748 tp++;
749 if (label_len < remain_len - 1) {
750 (void)nd_printn(ndo, tp, label_len, NULL);
751 tp += label_len;
752 remain_len -= (label_len + 1);
753 if(GET_U_1(tp)) ND_PRINT(".");
754 } else {
755 ND_PRINT(" ?");
756 break;
757 }
758 }
759 ND_PRINT(")");
760 break;
761 case DH6OPT_NEW_POSIX_TIMEZONE: /* all three of these options */
762 case DH6OPT_NEW_TZDB_TIMEZONE: /* are encoded similarly */
763 case DH6OPT_MUDURL: /* although GMT might not work */
764 if (optlen < 5) {
765 ND_PRINT(" ?)");
766 break;
767 }
768 tp = (const u_char *)(dh6o + 1);
769 ND_PRINT("=");
770 (void)nd_printn(ndo, tp, (u_int)optlen, NULL);
771 ND_PRINT(")");
772 break;
773
774 default:
775 ND_PRINT(")");
776 break;
777 }
778
779 cp += sizeof(*dh6o) + optlen;
780 }
781 return;
782
783 trunc:
784 nd_print_trunc(ndo);
785 }
786
787 /*
788 * Print dhcp6 packets
789 */
790 void
791 dhcp6_print(netdissect_options *ndo,
792 const u_char *cp, u_int length)
793 {
794 const struct dhcp6 *dh6;
795 const struct dhcp6_relay *dh6relay;
796 uint8_t msgtype;
797 const u_char *ep;
798 const u_char *extp;
799 const char *name;
800
801 ndo->ndo_protocol = "dhcp6";
802 ND_PRINT("dhcp6");
803
804 ep = ndo->ndo_snapend;
805 if (cp + length < ep)
806 ep = cp + length;
807
808 dh6 = (const struct dhcp6 *)cp;
809 dh6relay = (const struct dhcp6_relay *)cp;
810 ND_TCHECK_4(dh6->dh6_msgtypexid.xid);
811 msgtype = GET_U_1(dh6->dh6_msgtypexid.msgtype);
812 name = tok2str(dh6_msgtype_str, "msgtype-%u", msgtype);
813
814 if (!ndo->ndo_vflag) {
815 ND_PRINT(" %s", name);
816 return;
817 }
818
819 /* XXX relay agent messages have to be handled differently */
820
821 ND_PRINT(" %s (", name); /*)*/
822 if (msgtype != DH6_RELAY_FORW && msgtype != DH6_RELAY_REPLY) {
823 ND_PRINT("xid=%x",
824 GET_BE_U_4(dh6->dh6_msgtypexid.xid) & DH6_XIDMASK);
825 extp = (const u_char *)(dh6 + 1);
826 dhcp6opt_print(ndo, extp, ep);
827 } else { /* relay messages */
828 ND_PRINT("linkaddr=%s", GET_IP6ADDR_STRING(dh6relay->dh6relay_linkaddr));
829
830 ND_PRINT(" peeraddr=%s", GET_IP6ADDR_STRING(dh6relay->dh6relay_peeraddr));
831
832 dhcp6opt_print(ndo, (const u_char *)(dh6relay + 1), ep);
833 }
834 /*(*/
835 ND_PRINT(")");
836 return;
837
838 trunc:
839 nd_print_trunc(ndo);
840 }