]> The Tcpdump Group git mirrors - tcpdump/blob - print-dhcp6.c
d3be3a5dc9ca883ddf2e6ec8be75a569c8375c18
[tcpdump] / print-dhcp6.c
1 /*
2 * Copyright (C) 1998 and 1999 WIDE Project.
3 * All rights reserved.
4 *
5 * Redistribution and use in source and binary forms, with or without
6 * modification, are permitted provided that the following conditions
7 * are met:
8 * 1. Redistributions of source code must retain the above copyright
9 * notice, this list of conditions and the following disclaimer.
10 * 2. Redistributions in binary form must reproduce the above copyright
11 * notice, this list of conditions and the following disclaimer in the
12 * documentation and/or other materials provided with the distribution.
13 * 3. Neither the name of the project nor the names of its contributors
14 * may be used to endorse or promote products derived from this software
15 * without specific prior written permission.
16 *
17 * THIS SOFTWARE IS PROVIDED BY THE PROJECT AND CONTRIBUTORS ``AS IS'' AND
18 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
19 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
20 * ARE DISCLAIMED. IN NO EVENT SHALL THE PROJECT OR CONTRIBUTORS BE LIABLE
21 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
22 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
23 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
24 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
25 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
26 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
27 * SUCH DAMAGE.
28 */
29
30 /* \summary: IPv6 DHCP printer */
31
32 /*
33 * RFC3315: DHCPv6
34 * supported DHCPv6 options:
35 * RFC3319: Session Initiation Protocol (SIP) Servers options,
36 * RFC3633: IPv6 Prefix options,
37 * RFC3646: DNS Configuration options,
38 * RFC3898: Network Information Service (NIS) Configuration options,
39 * RFC4075: Simple Network Time Protocol (SNTP) Configuration option,
40 * RFC4242: Information Refresh Time option,
41 * RFC4280: Broadcast and Multicast Control Servers options,
42 * RFC5908: Network Time Protocol (NTP) Server Option for DHCPv6
43 * RFC6334: Dual-Stack Lite option,
44 */
45
46 #ifdef HAVE_CONFIG_H
47 #include <config.h>
48 #endif
49
50 #include "netdissect-stdinc.h"
51
52 #include "netdissect.h"
53 #include "addrtoname.h"
54 #include "extract.h"
55
56 /* lease duration */
57 #define DHCP6_DURATION_INFINITE 0xffffffff
58
59 /* Error Values */
60 #define DH6ERR_FAILURE 16
61 #define DH6ERR_AUTHFAIL 17
62 #define DH6ERR_POORLYFORMED 18
63 #define DH6ERR_UNAVAIL 19
64 #define DH6ERR_OPTUNAVAIL 20
65
66 /* Message type */
67 #define DH6_SOLICIT 1
68 #define DH6_ADVERTISE 2
69 #define DH6_REQUEST 3
70 #define DH6_CONFIRM 4
71 #define DH6_RENEW 5
72 #define DH6_REBIND 6
73 #define DH6_REPLY 7
74 #define DH6_RELEASE 8
75 #define DH6_DECLINE 9
76 #define DH6_RECONFIGURE 10
77 #define DH6_INFORM_REQ 11
78 #define DH6_RELAY_FORW 12
79 #define DH6_RELAY_REPLY 13
80 #define DH6_LEASEQUERY 14
81 #define DH6_LQ_REPLY 15
82
83 static const struct tok dh6_msgtype_str[] = {
84 { DH6_SOLICIT, "solicit" },
85 { DH6_ADVERTISE, "advertise" },
86 { DH6_REQUEST, "request" },
87 { DH6_CONFIRM, "confirm" },
88 { DH6_RENEW, "renew" },
89 { DH6_REBIND, "rebind" },
90 { DH6_REPLY, "reply" },
91 { DH6_RELEASE, "release" },
92 { DH6_DECLINE, "decline" },
93 { DH6_RECONFIGURE, "reconfigure" },
94 { DH6_INFORM_REQ, "inf-req" },
95 { DH6_RELAY_FORW, "relay-fwd" },
96 { DH6_RELAY_REPLY, "relay-reply" },
97 { DH6_LEASEQUERY, "leasequery" },
98 { DH6_LQ_REPLY, "leasequery-reply" },
99 { 0, NULL }
100 };
101
102 /* DHCP6 base packet format */
103 struct dhcp6 {
104 union {
105 nd_uint8_t msgtype;
106 nd_uint32_t xid;
107 } dh6_msgtypexid;
108 /* options follow */
109 };
110 #define DH6_XIDMASK 0x00ffffff
111
112 /* DHCPv6 relay messages */
113 struct dhcp6_relay {
114 nd_uint8_t dh6relay_msgtype;
115 nd_uint8_t dh6relay_hcnt;
116 nd_ipv6 dh6relay_linkaddr; /* XXX: badly aligned */
117 nd_ipv6 dh6relay_peeraddr;
118 /* options follow */
119 };
120
121 /* options */
122 #define DH6OPT_CLIENTID 1
123 #define DH6OPT_SERVERID 2
124 #define DH6OPT_IA_NA 3
125 #define DH6OPT_IA_TA 4
126 #define DH6OPT_IA_ADDR 5
127 #define DH6OPT_ORO 6
128 #define DH6OPT_PREFERENCE 7
129 # define DH6OPT_PREF_MAX 255
130 #define DH6OPT_ELAPSED_TIME 8
131 #define DH6OPT_RELAY_MSG 9
132 /*#define DH6OPT_SERVER_MSG 10 deprecated */
133 #define DH6OPT_AUTH 11
134 # define DH6OPT_AUTHPROTO_DELAYED 2
135 # define DH6OPT_AUTHPROTO_RECONFIG 3
136 # define DH6OPT_AUTHALG_HMACMD5 1
137 # define DH6OPT_AUTHRDM_MONOCOUNTER 0
138 # define DH6OPT_AUTHRECONFIG_KEY 1
139 # define DH6OPT_AUTHRECONFIG_HMACMD5 2
140 #define DH6OPT_UNICAST 12
141 #define DH6OPT_STATUS_CODE 13
142 # define DH6OPT_STCODE_SUCCESS 0
143 # define DH6OPT_STCODE_UNSPECFAIL 1
144 # define DH6OPT_STCODE_NOADDRAVAIL 2
145 # define DH6OPT_STCODE_NOBINDING 3
146 # define DH6OPT_STCODE_NOTONLINK 4
147 # define DH6OPT_STCODE_USEMULTICAST 5
148 # define DH6OPT_STCODE_NOPREFIXAVAIL 6
149 # define DH6OPT_STCODE_UNKNOWNQUERYTYPE 7
150 # define DH6OPT_STCODE_MALFORMEDQUERY 8
151 # define DH6OPT_STCODE_NOTCONFIGURED 9
152 # define DH6OPT_STCODE_NOTALLOWED 10
153 #define DH6OPT_RAPID_COMMIT 14
154 #define DH6OPT_USER_CLASS 15
155 #define DH6OPT_VENDOR_CLASS 16
156 #define DH6OPT_VENDOR_OPTS 17
157 #define DH6OPT_INTERFACE_ID 18
158 #define DH6OPT_RECONF_MSG 19
159 #define DH6OPT_RECONF_ACCEPT 20
160 #define DH6OPT_SIP_SERVER_D 21
161 #define DH6OPT_SIP_SERVER_A 22
162 #define DH6OPT_DNS_SERVERS 23
163 #define DH6OPT_DOMAIN_LIST 24
164 #define DH6OPT_IA_PD 25
165 #define DH6OPT_IA_PD_PREFIX 26
166 #define DH6OPT_NIS_SERVERS 27
167 #define DH6OPT_NISP_SERVERS 28
168 #define DH6OPT_NIS_NAME 29
169 #define DH6OPT_NISP_NAME 30
170 #define DH6OPT_SNTP_SERVERS 31
171 #define DH6OPT_LIFETIME 32
172 #define DH6OPT_BCMCS_SERVER_D 33
173 #define DH6OPT_BCMCS_SERVER_A 34
174 #define DH6OPT_GEOCONF_CIVIC 36
175 #define DH6OPT_REMOTE_ID 37
176 #define DH6OPT_SUBSCRIBER_ID 38
177 #define DH6OPT_CLIENT_FQDN 39
178 #define DH6OPT_PANA_AGENT 40
179 #define DH6OPT_NEW_POSIX_TIMEZONE 41
180 #define DH6OPT_NEW_TZDB_TIMEZONE 42
181 #define DH6OPT_ERO 43
182 #define DH6OPT_LQ_QUERY 44
183 #define DH6OPT_CLIENT_DATA 45
184 #define DH6OPT_CLT_TIME 46
185 #define DH6OPT_LQ_RELAY_DATA 47
186 #define DH6OPT_LQ_CLIENT_LINK 48
187 #define DH6OPT_NTP_SERVER 56
188 # define DH6OPT_NTP_SUBOPTION_SRV_ADDR 1
189 # define DH6OPT_NTP_SUBOPTION_MC_ADDR 2
190 # define DH6OPT_NTP_SUBOPTION_SRV_FQDN 3
191 #define DH6OPT_AFTR_NAME 64
192 #define DH6OPT_MUDURL 112
193
194 static const struct tok dh6opt_str[] = {
195 { DH6OPT_CLIENTID, "client-ID" },
196 { DH6OPT_SERVERID, "server-ID" },
197 { DH6OPT_IA_NA, "IA_NA" },
198 { DH6OPT_IA_TA, "IA_TA" },
199 { DH6OPT_IA_ADDR, "IA_ADDR" },
200 { DH6OPT_ORO, "option-request" },
201 { DH6OPT_PREFERENCE, "preference" },
202 { DH6OPT_ELAPSED_TIME, "elapsed-time" },
203 { DH6OPT_RELAY_MSG, "relay-message" },
204 { DH6OPT_AUTH, "authentication" },
205 { DH6OPT_UNICAST, "server-unicast" },
206 { DH6OPT_STATUS_CODE, "status-code" },
207 { DH6OPT_RAPID_COMMIT, "rapid-commit" },
208 { DH6OPT_USER_CLASS, "user-class" },
209 { DH6OPT_VENDOR_CLASS, "vendor-class" },
210 { DH6OPT_VENDOR_OPTS, "vendor-specific-info" },
211 { DH6OPT_INTERFACE_ID, "interface-ID" },
212 { DH6OPT_RECONF_MSG, "reconfigure-message" },
213 { DH6OPT_RECONF_ACCEPT, "reconfigure-accept" },
214 { DH6OPT_SIP_SERVER_D, "SIP-servers-domain" },
215 { DH6OPT_SIP_SERVER_A, "SIP-servers-address" },
216 { DH6OPT_DNS_SERVERS, "DNS-server" },
217 { DH6OPT_DOMAIN_LIST, "DNS-search-list" },
218 { DH6OPT_IA_PD, "IA_PD" },
219 { DH6OPT_IA_PD_PREFIX, "IA_PD-prefix" },
220 { DH6OPT_SNTP_SERVERS, "SNTP-servers" },
221 { DH6OPT_LIFETIME, "lifetime" },
222 { DH6OPT_NIS_SERVERS, "NIS-server" },
223 { DH6OPT_NISP_SERVERS, "NIS+-server" },
224 { DH6OPT_NIS_NAME, "NIS-domain-name" },
225 { DH6OPT_NISP_NAME, "NIS+-domain-name" },
226 { DH6OPT_BCMCS_SERVER_D, "BCMCS-domain-name" },
227 { DH6OPT_BCMCS_SERVER_A, "BCMCS-server" },
228 { DH6OPT_GEOCONF_CIVIC, "Geoconf-Civic" },
229 { DH6OPT_REMOTE_ID, "Remote-ID" },
230 { DH6OPT_SUBSCRIBER_ID, "Subscriber-ID" },
231 { DH6OPT_CLIENT_FQDN, "Client-FQDN" },
232 { DH6OPT_PANA_AGENT, "PANA-agent" },
233 { DH6OPT_NEW_POSIX_TIMEZONE, "POSIX-timezone" },
234 { DH6OPT_NEW_TZDB_TIMEZONE, "POSIX-tz-database" },
235 { DH6OPT_ERO, "Echo-request-option" },
236 { DH6OPT_LQ_QUERY, "Lease-query" },
237 { DH6OPT_CLIENT_DATA, "LQ-client-data" },
238 { DH6OPT_CLT_TIME, "Clt-time" },
239 { DH6OPT_LQ_RELAY_DATA, "LQ-relay-data" },
240 { DH6OPT_LQ_CLIENT_LINK, "LQ-client-link" },
241 { DH6OPT_NTP_SERVER, "NTP-server" },
242 { DH6OPT_AFTR_NAME, "AFTR-Name" },
243 { DH6OPT_MUDURL, "MUD-URL" },
244 { 0, NULL }
245 };
246
247 static const struct tok dh6opt_stcode_str[] = {
248 { DH6OPT_STCODE_SUCCESS, "Success" }, /* RFC3315 */
249 { DH6OPT_STCODE_UNSPECFAIL, "UnspecFail" }, /* RFC3315 */
250 { DH6OPT_STCODE_NOADDRAVAIL, "NoAddrsAvail" }, /* RFC3315 */
251 { DH6OPT_STCODE_NOBINDING, "NoBinding" }, /* RFC3315 */
252 { DH6OPT_STCODE_NOTONLINK, "NotOnLink" }, /* RFC3315 */
253 { DH6OPT_STCODE_USEMULTICAST, "UseMulticast" }, /* RFC3315 */
254 { DH6OPT_STCODE_NOPREFIXAVAIL, "NoPrefixAvail" }, /* RFC3633 */
255 { DH6OPT_STCODE_UNKNOWNQUERYTYPE, "UnknownQueryType" }, /* RFC5007 */
256 { DH6OPT_STCODE_MALFORMEDQUERY, "MalformedQuery" }, /* RFC5007 */
257 { DH6OPT_STCODE_NOTCONFIGURED, "NotConfigured" }, /* RFC5007 */
258 { DH6OPT_STCODE_NOTALLOWED, "NotAllowed" }, /* RFC5007 */
259 { 0, NULL }
260 };
261
262 struct dhcp6opt {
263 nd_uint16_t dh6opt_type;
264 nd_uint16_t dh6opt_len;
265 /* type-dependent data follows */
266 };
267
268 static const char *
269 dhcp6stcode(const uint16_t code)
270 {
271 return code > 255 ? "INVALID code" : tok2str(dh6opt_stcode_str, "code%u", code);
272 }
273
274 static void
275 dhcp6opt_print(netdissect_options *ndo,
276 const u_char *cp, const u_char *ep)
277 {
278 const struct dhcp6opt *dh6o;
279 const u_char *tp;
280 u_int i;
281 uint16_t opttype;
282 uint16_t optlen;
283 uint8_t auth_proto;
284 uint8_t auth_alg;
285 uint8_t auth_rdm;
286 u_int authinfolen, authrealmlen;
287 u_int remain_len; /* Length of remaining options */
288 u_int label_len; /* Label length */
289 uint16_t subopt_code;
290 uint16_t subopt_len;
291 uint8_t dh6_reconf_type;
292 uint8_t dh6_lq_query_type;
293
294 if (cp == ep)
295 return;
296 while (cp < ep) {
297 if (ep < cp + sizeof(*dh6o))
298 goto trunc;
299 dh6o = (const struct dhcp6opt *)cp;
300 ND_TCHECK_SIZE(dh6o);
301 optlen = GET_BE_U_2(dh6o->dh6opt_len);
302 if (ep < cp + sizeof(*dh6o) + optlen)
303 goto trunc;
304 opttype = GET_BE_U_2(dh6o->dh6opt_type);
305 ND_PRINT(" (%s", tok2str(dh6opt_str, "opt_%u", opttype));
306 ND_TCHECK_LEN(cp + sizeof(*dh6o), optlen);
307 switch (opttype) {
308 case DH6OPT_CLIENTID:
309 case DH6OPT_SERVERID:
310 if (optlen < 2) {
311 /*(*/
312 ND_PRINT(" ?)");
313 break;
314 }
315 tp = (const u_char *)(dh6o + 1);
316 switch (GET_BE_U_2(tp)) {
317 case 1:
318 if (optlen >= 2 + 6) {
319 ND_PRINT(" hwaddr/time type %u time %u ",
320 GET_BE_U_2(tp + 2),
321 GET_BE_U_4(tp + 4));
322 for (i = 8; i < optlen; i++)
323 ND_PRINT("%02x",
324 GET_U_1(tp + i));
325 /*(*/
326 ND_PRINT(")");
327 } else {
328 /*(*/
329 ND_PRINT(" ?)");
330 }
331 break;
332 case 2:
333 if (optlen >= 2 + 8) {
334 ND_PRINT(" vid ");
335 for (i = 2; i < 2 + 8; i++)
336 ND_PRINT("%02x",
337 GET_U_1(tp + i));
338 /*(*/
339 ND_PRINT(")");
340 } else {
341 /*(*/
342 ND_PRINT(" ?)");
343 }
344 break;
345 case 3:
346 if (optlen >= 2 + 2) {
347 ND_PRINT(" hwaddr type %u ",
348 GET_BE_U_2(tp + 2));
349 for (i = 4; i < optlen; i++)
350 ND_PRINT("%02x",
351 GET_U_1(tp + i));
352 /*(*/
353 ND_PRINT(")");
354 } else {
355 /*(*/
356 ND_PRINT(" ?)");
357 }
358 break;
359 default:
360 ND_PRINT(" type %u)", GET_BE_U_2(tp));
361 break;
362 }
363 break;
364 case DH6OPT_IA_ADDR:
365 if (optlen < 24) {
366 /*(*/
367 ND_PRINT(" ?)");
368 break;
369 }
370 tp = (const u_char *)(dh6o + 1);
371 ND_PRINT(" %s", GET_IP6ADDR_STRING(tp));
372 ND_PRINT(" pltime:%u vltime:%u",
373 GET_BE_U_4(tp + 16),
374 GET_BE_U_4(tp + 20));
375 if (optlen > 24) {
376 /* there are sub-options */
377 dhcp6opt_print(ndo, tp + 24, tp + optlen);
378 }
379 ND_PRINT(")");
380 break;
381 case DH6OPT_ORO:
382 case DH6OPT_ERO:
383 if (optlen % 2) {
384 ND_PRINT(" ?)");
385 break;
386 }
387 tp = (const u_char *)(dh6o + 1);
388 for (i = 0; i < optlen; i += 2) {
389 ND_PRINT(" %s",
390 tok2str(dh6opt_str, "opt_%u", GET_BE_U_2(tp + i)));
391 }
392 ND_PRINT(")");
393 break;
394 case DH6OPT_PREFERENCE:
395 if (optlen != 1) {
396 ND_PRINT(" ?)");
397 break;
398 }
399 tp = (const u_char *)(dh6o + 1);
400 ND_PRINT(" %u)", GET_U_1(tp));
401 break;
402 case DH6OPT_ELAPSED_TIME:
403 if (optlen != 2) {
404 ND_PRINT(" ?)");
405 break;
406 }
407 tp = (const u_char *)(dh6o + 1);
408 ND_PRINT(" %u)", GET_BE_U_2(tp));
409 break;
410 case DH6OPT_RELAY_MSG:
411 ND_PRINT(" (");
412 tp = (const u_char *)(dh6o + 1);
413 dhcp6_print(ndo, tp, optlen);
414 ND_PRINT(")");
415 break;
416 case DH6OPT_AUTH:
417 if (optlen < 11) {
418 ND_PRINT(" ?)");
419 break;
420 }
421 tp = (const u_char *)(dh6o + 1);
422 auth_proto = GET_U_1(tp);
423 switch (auth_proto) {
424 case DH6OPT_AUTHPROTO_DELAYED:
425 ND_PRINT(" proto: delayed");
426 break;
427 case DH6OPT_AUTHPROTO_RECONFIG:
428 ND_PRINT(" proto: reconfigure");
429 break;
430 default:
431 ND_PRINT(" proto: %u", auth_proto);
432 break;
433 }
434 tp++;
435 auth_alg = GET_U_1(tp);
436 switch (auth_alg) {
437 case DH6OPT_AUTHALG_HMACMD5:
438 /* XXX: may depend on the protocol */
439 ND_PRINT(", alg: HMAC-MD5");
440 break;
441 default:
442 ND_PRINT(", alg: %u", auth_alg);
443 break;
444 }
445 tp++;
446 auth_rdm = GET_U_1(tp);
447 switch (auth_rdm) {
448 case DH6OPT_AUTHRDM_MONOCOUNTER:
449 ND_PRINT(", RDM: mono");
450 break;
451 default:
452 ND_PRINT(", RDM: %u", auth_rdm);
453 break;
454 }
455 tp++;
456 ND_PRINT(", RD:");
457 for (i = 0; i < 4; i++, tp += 2)
458 ND_PRINT(" %04x", GET_BE_U_2(tp));
459
460 /* protocol dependent part */
461 authinfolen = optlen - 11;
462 switch (auth_proto) {
463 case DH6OPT_AUTHPROTO_DELAYED:
464 if (authinfolen == 0)
465 break;
466 if (authinfolen < 20) {
467 ND_PRINT(" ??");
468 break;
469 }
470 authrealmlen = authinfolen - 20;
471 if (authrealmlen > 0) {
472 ND_PRINT(", realm: ");
473 }
474 for (i = 0; i < authrealmlen; i++, tp++)
475 ND_PRINT("%02x", GET_U_1(tp));
476 ND_PRINT(", key ID: %08x", GET_BE_U_4(tp));
477 tp += 4;
478 ND_PRINT(", HMAC-MD5:");
479 for (i = 0; i < 4; i++, tp+= 4)
480 ND_PRINT(" %08x", GET_BE_U_4(tp));
481 break;
482 case DH6OPT_AUTHPROTO_RECONFIG:
483 if (authinfolen != 17) {
484 ND_PRINT(" ??");
485 break;
486 }
487 switch (GET_U_1(tp)) {
488 case DH6OPT_AUTHRECONFIG_KEY:
489 ND_PRINT(" reconfig-key");
490 break;
491 case DH6OPT_AUTHRECONFIG_HMACMD5:
492 ND_PRINT(" type: HMAC-MD5");
493 break;
494 default:
495 ND_PRINT(" type: ??");
496 break;
497 }
498 tp++;
499 ND_PRINT(" value:");
500 for (i = 0; i < 4; i++, tp+= 4)
501 ND_PRINT(" %08x", GET_BE_U_4(tp));
502 break;
503 default:
504 ND_PRINT(" ??");
505 break;
506 }
507
508 ND_PRINT(")");
509 break;
510 case DH6OPT_RAPID_COMMIT: /* nothing todo */
511 ND_PRINT(")");
512 break;
513 case DH6OPT_INTERFACE_ID:
514 case DH6OPT_SUBSCRIBER_ID:
515 /*
516 * Since we cannot predict the encoding, print hex dump
517 * at most 10 characters.
518 */
519 tp = (const u_char *)(dh6o + 1);
520 ND_PRINT(" ");
521 for (i = 0; i < optlen && i < 10; i++)
522 ND_PRINT("%02x", GET_U_1(tp + i));
523 ND_PRINT("...)");
524 break;
525 case DH6OPT_RECONF_MSG:
526 if (optlen != 1) {
527 ND_PRINT(" ?)");
528 break;
529 }
530 tp = (const u_char *)(dh6o + 1);
531 dh6_reconf_type = GET_U_1(tp);
532 switch (dh6_reconf_type) {
533 case DH6_RENEW:
534 ND_PRINT(" for renew)");
535 break;
536 case DH6_INFORM_REQ:
537 ND_PRINT(" for inf-req)");
538 break;
539 default:
540 ND_PRINT(" for ?\?\?(%02x))", dh6_reconf_type);
541 break;
542 }
543 break;
544 case DH6OPT_RECONF_ACCEPT: /* nothing todo */
545 ND_PRINT(")");
546 break;
547 case DH6OPT_SIP_SERVER_A:
548 case DH6OPT_DNS_SERVERS:
549 case DH6OPT_SNTP_SERVERS:
550 case DH6OPT_NIS_SERVERS:
551 case DH6OPT_NISP_SERVERS:
552 case DH6OPT_BCMCS_SERVER_A:
553 case DH6OPT_PANA_AGENT:
554 case DH6OPT_LQ_CLIENT_LINK:
555 if (optlen % 16) {
556 ND_PRINT(" ?)");
557 break;
558 }
559 tp = (const u_char *)(dh6o + 1);
560 for (i = 0; i < optlen; i += 16)
561 ND_PRINT(" %s", GET_IP6ADDR_STRING(tp + i));
562 ND_PRINT(")");
563 break;
564 case DH6OPT_SIP_SERVER_D:
565 case DH6OPT_DOMAIN_LIST:
566 tp = (const u_char *)(dh6o + 1);
567 while (tp < cp + sizeof(*dh6o) + optlen) {
568 ND_PRINT(" ");
569 if ((tp = fqdn_print(ndo, tp, cp + sizeof(*dh6o) + optlen)) == NULL)
570 goto trunc;
571 }
572 ND_PRINT(")");
573 break;
574 case DH6OPT_STATUS_CODE:
575 if (optlen < 2) {
576 ND_PRINT(" ?)");
577 break;
578 }
579 tp = (const u_char *)(dh6o + 1);
580 ND_PRINT(" %s)", dhcp6stcode(GET_BE_U_2(tp)));
581 break;
582 case DH6OPT_IA_NA:
583 case DH6OPT_IA_PD:
584 if (optlen < 12) {
585 ND_PRINT(" ?)");
586 break;
587 }
588 tp = (const u_char *)(dh6o + 1);
589 ND_PRINT(" IAID:%u T1:%u T2:%u",
590 GET_BE_U_4(tp),
591 GET_BE_U_4(tp + 4),
592 GET_BE_U_4(tp + 8));
593 if (optlen > 12) {
594 /* there are sub-options */
595 dhcp6opt_print(ndo, tp + 12, tp + optlen);
596 }
597 ND_PRINT(")");
598 break;
599 case DH6OPT_IA_TA:
600 if (optlen < 4) {
601 ND_PRINT(" ?)");
602 break;
603 }
604 tp = (const u_char *)(dh6o + 1);
605 ND_PRINT(" IAID:%u", GET_BE_U_4(tp));
606 if (optlen > 4) {
607 /* there are sub-options */
608 dhcp6opt_print(ndo, tp + 4, tp + optlen);
609 }
610 ND_PRINT(")");
611 break;
612 case DH6OPT_IA_PD_PREFIX:
613 if (optlen < 25) {
614 ND_PRINT(" ?)");
615 break;
616 }
617 tp = (const u_char *)(dh6o + 1);
618 ND_PRINT(" %s/%u", GET_IP6ADDR_STRING(tp + 9),
619 GET_U_1(tp + 8));
620 ND_PRINT(" pltime:%u vltime:%u",
621 GET_BE_U_4(tp),
622 GET_BE_U_4(tp + 4));
623 if (optlen > 25) {
624 /* there are sub-options */
625 dhcp6opt_print(ndo, tp + 25, tp + optlen);
626 }
627 ND_PRINT(")");
628 break;
629 case DH6OPT_LIFETIME:
630 case DH6OPT_CLT_TIME:
631 if (optlen != 4) {
632 ND_PRINT(" ?)");
633 break;
634 }
635 tp = (const u_char *)(dh6o + 1);
636 ND_PRINT(" %u)", GET_BE_U_4(tp));
637 break;
638 case DH6OPT_REMOTE_ID:
639 if (optlen < 4) {
640 ND_PRINT(" ?)");
641 break;
642 }
643 tp = (const u_char *)(dh6o + 1);
644 ND_PRINT(" %u ", GET_BE_U_4(tp));
645 /*
646 * Print hex dump first 10 characters.
647 */
648 for (i = 4; i < optlen && i < 14; i++)
649 ND_PRINT("%02x", GET_U_1(tp + i));
650 ND_PRINT("...)");
651 break;
652 case DH6OPT_LQ_QUERY:
653 if (optlen < 17) {
654 ND_PRINT(" ?)");
655 break;
656 }
657 tp = (const u_char *)(dh6o + 1);
658 dh6_lq_query_type = GET_U_1(tp);
659 switch (dh6_lq_query_type) {
660 case 1:
661 ND_PRINT(" by-address");
662 break;
663 case 2:
664 ND_PRINT(" by-clientID");
665 break;
666 default:
667 ND_PRINT(" type_%u", dh6_lq_query_type);
668 break;
669 }
670 ND_PRINT(" %s", GET_IP6ADDR_STRING(tp + 1));
671 if (optlen > 17) {
672 /* there are query-options */
673 dhcp6opt_print(ndo, tp + 17, tp + optlen);
674 }
675 ND_PRINT(")");
676 break;
677 case DH6OPT_CLIENT_DATA:
678 tp = (const u_char *)(dh6o + 1);
679 if (optlen > 0) {
680 /* there are encapsulated options */
681 dhcp6opt_print(ndo, tp, tp + optlen);
682 }
683 ND_PRINT(")");
684 break;
685 case DH6OPT_LQ_RELAY_DATA:
686 if (optlen < 16) {
687 ND_PRINT(" ?)");
688 break;
689 }
690 tp = (const u_char *)(dh6o + 1);
691 ND_PRINT(" %s ", GET_IP6ADDR_STRING(tp));
692 /*
693 * Print hex dump first 10 characters.
694 */
695 for (i = 16; i < optlen && i < 26; i++)
696 ND_PRINT("%02x", GET_U_1(tp + i));
697 ND_PRINT("...)");
698 break;
699 case DH6OPT_NTP_SERVER:
700 if (optlen < 4) {
701 ND_PRINT(" ?)");
702 break;
703 }
704 tp = (const u_char *)(dh6o + 1);
705 while (tp < cp + sizeof(*dh6o) + optlen - 4) {
706 subopt_code = GET_BE_U_2(tp);
707 tp += 2;
708 subopt_len = GET_BE_U_2(tp);
709 tp += 2;
710 if (tp + subopt_len > cp + sizeof(*dh6o) + optlen)
711 goto trunc;
712 ND_PRINT(" subopt:%u", subopt_code);
713 switch (subopt_code) {
714 case DH6OPT_NTP_SUBOPTION_SRV_ADDR:
715 case DH6OPT_NTP_SUBOPTION_MC_ADDR:
716 if (subopt_len != 16) {
717 ND_PRINT(" ?");
718 break;
719 }
720 ND_PRINT(" %s", GET_IP6ADDR_STRING(tp));
721 break;
722 case DH6OPT_NTP_SUBOPTION_SRV_FQDN:
723 ND_PRINT(" ");
724 if (fqdn_print(ndo, tp, tp + subopt_len) == NULL)
725 goto trunc;
726 break;
727 default:
728 ND_PRINT(" ?");
729 break;
730 }
731 tp += subopt_len;
732 }
733 ND_PRINT(")");
734 break;
735 case DH6OPT_AFTR_NAME:
736 if (optlen < 3) {
737 ND_PRINT(" ?)");
738 break;
739 }
740 tp = (const u_char *)(dh6o + 1);
741 remain_len = optlen;
742 ND_PRINT(" ");
743 /* Encoding is described in section 3.1 of RFC 1035 */
744 while (remain_len && GET_U_1(tp)) {
745 label_len = GET_U_1(tp);
746 tp++;
747 if (label_len < remain_len - 1) {
748 (void)nd_printn(ndo, tp, label_len, NULL);
749 tp += label_len;
750 remain_len -= (label_len + 1);
751 if(GET_U_1(tp)) ND_PRINT(".");
752 } else {
753 ND_PRINT(" ?");
754 break;
755 }
756 }
757 ND_PRINT(")");
758 break;
759 case DH6OPT_NEW_POSIX_TIMEZONE: /* all three of these options */
760 case DH6OPT_NEW_TZDB_TIMEZONE: /* are encoded similarly */
761 case DH6OPT_MUDURL: /* although GMT might not work */
762 if (optlen < 5) {
763 ND_PRINT(" ?)");
764 break;
765 }
766 tp = (const u_char *)(dh6o + 1);
767 ND_PRINT("=");
768 (void)nd_printn(ndo, tp, (u_int)optlen, NULL);
769 ND_PRINT(")");
770 break;
771
772 default:
773 ND_PRINT(")");
774 break;
775 }
776
777 cp += sizeof(*dh6o) + optlen;
778 }
779 return;
780
781 trunc:
782 nd_print_trunc(ndo);
783 }
784
785 /*
786 * Print dhcp6 packets
787 */
788 void
789 dhcp6_print(netdissect_options *ndo,
790 const u_char *cp, u_int length)
791 {
792 const struct dhcp6 *dh6;
793 const struct dhcp6_relay *dh6relay;
794 uint8_t msgtype;
795 const u_char *ep;
796 const u_char *extp;
797 const char *name;
798
799 ndo->ndo_protocol = "dhcp6";
800 ND_PRINT("dhcp6");
801
802 ep = ndo->ndo_snapend;
803 if (cp + length < ep)
804 ep = cp + length;
805
806 dh6 = (const struct dhcp6 *)cp;
807 dh6relay = (const struct dhcp6_relay *)cp;
808 ND_TCHECK_4(dh6->dh6_msgtypexid.xid);
809 msgtype = GET_U_1(dh6->dh6_msgtypexid.msgtype);
810 name = tok2str(dh6_msgtype_str, "msgtype-%u", msgtype);
811
812 if (!ndo->ndo_vflag) {
813 ND_PRINT(" %s", name);
814 return;
815 }
816
817 /* XXX relay agent messages have to be handled differently */
818
819 ND_PRINT(" %s (", name); /*)*/
820 if (msgtype != DH6_RELAY_FORW && msgtype != DH6_RELAY_REPLY) {
821 ND_PRINT("xid=%x",
822 GET_BE_U_4(dh6->dh6_msgtypexid.xid) & DH6_XIDMASK);
823 extp = (const u_char *)(dh6 + 1);
824 dhcp6opt_print(ndo, extp, ep);
825 } else { /* relay messages */
826 ND_PRINT("linkaddr=%s", GET_IP6ADDR_STRING(dh6relay->dh6relay_linkaddr));
827
828 ND_PRINT(" peeraddr=%s", GET_IP6ADDR_STRING(dh6relay->dh6relay_peeraddr));
829
830 dhcp6opt_print(ndo, (const u_char *)(dh6relay + 1), ep);
831 }
832 /*(*/
833 ND_PRINT(")");
834 return;
835
836 trunc:
837 nd_print_trunc(ndo);
838 }