Send probe requests in COLLISION_CHECK state in a way that is compliant with
RFC5227. Rate-limiting is also supported. Keep ARP stats per packet send type rather than per ARP state. Use the new stats to replace last_def_ts. Multiple triggers of arp_gw_check from interface-up-events in quick succession could cause the dhcpState to become corrupt. Fix by making the ARP_GW_CHECK be level triggered rather than edge triggered. Make the timeout calculations in the ARP retransmission code much more accurate. Close the ARP fd if we give up on lease defense and go back to requesting a new lease. Do a second arp_announcement() after finding the default GW's hwaddr. Clean up frenew to sanely handle the various ARP checking events. Now renew signals will be ignored during these states. It was particularly insane before if a renew signal were received during DS_COLLISION_CHECK. If the hardware link carrier goes down, do not sleep. Just keep working. Only go to sleep if the user explicitly deconfigures the interface. This change is far more sane for non-mobile hosts, and still works fine with roaming machines: the important thing is the gw hardware address checking that is triggered when the interface comes back up.
This commit is contained in:
parent
751ef43b45
commit
315cf6b135
139
ndhc/arp.c
139
ndhc/arp.c
@ -1,5 +1,5 @@
|
||||
/* arp.c - arp ping checking
|
||||
* Time-stamp: <2011-07-05 13:04:10 njk>
|
||||
* Time-stamp: <2011-07-05 15:37:02 njk>
|
||||
*
|
||||
* Copyright 2010-2011 Nicholas J. Kain <njkain@gmail.com>
|
||||
*
|
||||
@ -66,23 +66,47 @@ typedef enum {
|
||||
AS_MAX,
|
||||
} arp_state_t;
|
||||
|
||||
typedef enum {
|
||||
ASEND_COLLISION_CHECK,
|
||||
ASEND_GW_PING,
|
||||
ASEND_ANNOUNCE,
|
||||
ASEND_MAX,
|
||||
} arp_send_t;
|
||||
|
||||
static arp_state_t arpState;
|
||||
struct arp_stats {
|
||||
long long ts;
|
||||
int count;
|
||||
};
|
||||
static struct arp_stats arp_stats[AS_MAX-1];
|
||||
static struct arp_stats arp_send_stats[ASEND_MAX];
|
||||
static int using_arp_bpf; // Is a BPF installed on the ARP socket?
|
||||
|
||||
int arp_relentless_def; // Don't give up defense no matter what.
|
||||
static long long last_conflict_ts; // TS of the last conflicting ARP seen.
|
||||
static long long pending_def_ts; // TS of the upcoming defense ARP send.
|
||||
static long long last_def_ts; // TS of the most recent defense ARP sent.
|
||||
static int def_old_oldTimeout; // Old value of cs->oldTimeout.
|
||||
|
||||
static int gw_check_init_pingcount; // Initial count of ASEND_GW_PING when
|
||||
// AS_GW_CHECK was entered.
|
||||
|
||||
static long long collision_check_init_ts; // Initial ts when COLLISION_CHECK
|
||||
// was entered.
|
||||
static uint16_t probe_wait_time; // Time to wait for a COLLISION_CHECK reply.
|
||||
static unsigned int total_conflicts; // Total number of address conflicts on
|
||||
// the interface. Never decreases.
|
||||
|
||||
static struct arpMsg arpreply;
|
||||
static int arpreply_offset;
|
||||
static struct dhcpmsg arp_dhcp_packet; // Used only for AS_COLLISION_CHECK
|
||||
|
||||
void arp_reset_send_stats(void)
|
||||
{
|
||||
for (int i = 0; i < ASEND_MAX; ++i) {
|
||||
arp_send_stats[i].ts = 0;
|
||||
arp_send_stats[i].count = 0;
|
||||
}
|
||||
}
|
||||
|
||||
static void arp_set_bpf_basic(int fd)
|
||||
{
|
||||
static const struct sock_filter sf_arp[] = {
|
||||
@ -204,8 +228,6 @@ static void arp_switch_state(struct client_state_t *cs, arp_state_t state)
|
||||
if (arpState == state || arpState >= AS_MAX)
|
||||
return;
|
||||
arpState = state;
|
||||
arp_stats[arpState].ts = 0;
|
||||
arp_stats[arpState].count = 0;
|
||||
if (arpState == AS_NONE) {
|
||||
arp_close_fd(cs);
|
||||
return;
|
||||
@ -271,7 +293,6 @@ static int arp_send(struct client_state_t *cs, struct arpMsg *arp)
|
||||
arp_reopen_fd(cs);
|
||||
return -1;
|
||||
}
|
||||
arp_stats[arpState].count++;
|
||||
return 0;
|
||||
}
|
||||
|
||||
@ -291,7 +312,11 @@ static int arp_ping(struct client_state_t *cs, uint32_t test_ip)
|
||||
BASE_ARPMSG();
|
||||
memcpy(arp.sip4, &cs->clientAddr, sizeof cs->clientAddr);
|
||||
memcpy(arp.dip4, &test_ip, sizeof test_ip);
|
||||
return arp_send(cs, &arp);
|
||||
if (arp_send(cs, &arp) == -1)
|
||||
return -1;
|
||||
arp_send_stats[ASEND_GW_PING].count++;
|
||||
arp_send_stats[ASEND_GW_PING].ts = curms();
|
||||
return 0;
|
||||
}
|
||||
|
||||
// Returns 0 on success, -1 on failure.
|
||||
@ -299,7 +324,11 @@ static int arp_ip_anon_ping(struct client_state_t *cs, uint32_t test_ip)
|
||||
{
|
||||
BASE_ARPMSG();
|
||||
memcpy(arp.dip4, &test_ip, sizeof test_ip);
|
||||
return arp_send(cs, &arp);
|
||||
if (arp_send(cs, &arp) == -1)
|
||||
return -1;
|
||||
arp_send_stats[ASEND_COLLISION_CHECK].count++;
|
||||
arp_send_stats[ASEND_COLLISION_CHECK].ts = curms();
|
||||
return 0;
|
||||
}
|
||||
|
||||
static int arp_announcement(struct client_state_t *cs)
|
||||
@ -307,7 +336,11 @@ static int arp_announcement(struct client_state_t *cs)
|
||||
BASE_ARPMSG();
|
||||
memcpy(arp.sip4, &cs->clientAddr, 4);
|
||||
memcpy(arp.dip4, &cs->clientAddr, 4);
|
||||
return arp_send(cs, &arp);
|
||||
if (arp_send(cs, &arp) == -1)
|
||||
return -1;
|
||||
arp_send_stats[ASEND_ANNOUNCE].count++;
|
||||
arp_send_stats[ASEND_ANNOUNCE].ts = curms();
|
||||
return 0;
|
||||
}
|
||||
#undef BASE_ARPMSG
|
||||
|
||||
@ -321,11 +354,13 @@ static void arpreply_clear()
|
||||
int arp_check(struct client_state_t *cs, struct dhcpmsg *packet)
|
||||
{
|
||||
arp_switch_state(cs, AS_COLLISION_CHECK);
|
||||
log_line("arp: Probing for hosts that may conflict with our lease...");
|
||||
if (arp_ip_anon_ping(cs, arp_dhcp_packet.yiaddr) == -1)
|
||||
return -1;
|
||||
cs->arpPrevState = cs->dhcpState;
|
||||
cs->dhcpState = DS_COLLISION_CHECK;
|
||||
cs->timeout = 2000;
|
||||
collision_check_init_ts = arp_send_stats[ASEND_COLLISION_CHECK].ts;
|
||||
cs->timeout = probe_wait_time = PROBE_WAIT;
|
||||
memcpy(&arp_dhcp_packet, packet, sizeof (struct dhcpmsg));
|
||||
arpreply_clear();
|
||||
return 0;
|
||||
@ -334,9 +369,12 @@ int arp_check(struct client_state_t *cs, struct dhcpmsg *packet)
|
||||
// Callable only from DS_BOUND via state.c:ifup_action().
|
||||
int arp_gw_check(struct client_state_t *cs)
|
||||
{
|
||||
arp_switch_state(cs, AS_GW_CHECK);
|
||||
if (arpState == AS_GW_CHECK) // Guard against state bounce.
|
||||
return 0;
|
||||
gw_check_init_pingcount = arp_send_stats[ASEND_GW_PING].count;
|
||||
if (arp_ping(cs, cs->routerAddr) == -1)
|
||||
return -1;
|
||||
arp_switch_state(cs, AS_GW_CHECK);
|
||||
cs->arpPrevState = cs->dhcpState;
|
||||
cs->dhcpState = DS_BOUND_GW_CHECK;
|
||||
cs->oldTimeout = cs->timeout;
|
||||
@ -366,12 +404,13 @@ static void arp_failed(struct client_state_t *cs)
|
||||
log_line("arp: Offered address is in use -- declining");
|
||||
arp_close_fd(cs);
|
||||
send_decline(cs, arp_dhcp_packet.yiaddr);
|
||||
reinit_selecting(cs, 0);
|
||||
reinit_selecting(cs, total_conflicts < MAX_CONFLICTS ?
|
||||
0 : RATE_LIMIT_INTERVAL);
|
||||
}
|
||||
|
||||
void arp_gw_failed(struct client_state_t *cs)
|
||||
{
|
||||
if (arp_stats[arpState].count >= 3) {
|
||||
if (arp_send_stats[ASEND_GW_PING].count >= gw_check_init_pingcount + 3) {
|
||||
log_line("arp: Gateway appears to have changed, getting new lease");
|
||||
arp_close_fd(cs);
|
||||
cs->oldTimeout = 0;
|
||||
@ -394,7 +433,6 @@ void arp_success(struct client_state_t *cs)
|
||||
cs->init = 0;
|
||||
last_conflict_ts = 0;
|
||||
pending_def_ts = 0;
|
||||
last_def_ts = 0;
|
||||
def_old_oldTimeout = 0;
|
||||
ifchange_bind(&arp_dhcp_packet);
|
||||
if (cs->arpPrevState == DS_RENEWING || cs->arpPrevState == DS_REBINDING) {
|
||||
@ -477,13 +515,18 @@ static int arp_is_query_reply(struct arpMsg *am)
|
||||
return 1;
|
||||
}
|
||||
|
||||
static int arp_gen_probe_wait(void)
|
||||
{
|
||||
// This is not a uniform distribution but it doesn't matter here.
|
||||
return PROBE_MIN + rand() % (PROBE_MAX - PROBE_MIN);
|
||||
}
|
||||
|
||||
// Perform retransmission if necessary.
|
||||
void arp_retransmit(struct client_state_t *cs)
|
||||
{
|
||||
if (pending_def_ts) {
|
||||
log_line("arp: Defending our lease IP.");
|
||||
pending_def_ts = 0;
|
||||
last_def_ts = curms();
|
||||
arp_announcement(cs);
|
||||
if (def_old_oldTimeout) {
|
||||
cs->timeout = cs->oldTimeout;
|
||||
@ -491,24 +534,39 @@ void arp_retransmit(struct client_state_t *cs)
|
||||
def_old_oldTimeout = 0;
|
||||
}
|
||||
}
|
||||
if (curms() < arp_stats[arpState].ts + ARP_RETRANS_DELAY)
|
||||
if (arpState == AS_GW_CHECK || arpState == AS_GW_QUERY) {
|
||||
long long cms = curms();
|
||||
long long rtts = arp_send_stats[ASEND_GW_PING].ts + ARP_RETRANS_DELAY;
|
||||
if (cms < rtts) {
|
||||
cs->timeout = rtts - cms;
|
||||
return;
|
||||
}
|
||||
log_line(arpState == AS_GW_CHECK ?
|
||||
"arp: Still waiting for gateway to reply to arp ping..." :
|
||||
"arp: Still looking for gateway hardware address...");
|
||||
if (arp_ping(cs, cs->routerAddr) == -1)
|
||||
log_warning("arp: Failed to send ARP ping in retransmission.");
|
||||
cs->timeout = ARP_RETRANS_DELAY;
|
||||
return;
|
||||
}
|
||||
if (arpState == AS_COLLISION_CHECK) {
|
||||
long long cms = curms();
|
||||
if (cms >= collision_check_init_ts + ANNOUNCE_WAIT ||
|
||||
arp_send_stats[ASEND_COLLISION_CHECK].count >= PROBE_NUM) {
|
||||
arp_success(cs);
|
||||
return;
|
||||
}
|
||||
long long rtts = arp_send_stats[ASEND_COLLISION_CHECK].ts +
|
||||
probe_wait_time;
|
||||
if (cms < rtts) {
|
||||
cs->timeout = rtts - cms;
|
||||
return;
|
||||
}
|
||||
log_line("arp: Probing for hosts that may conflict with our lease...");
|
||||
if (arp_ip_anon_ping(cs, arp_dhcp_packet.yiaddr) == -1)
|
||||
log_warning("arp: Failed to send ARP ping in retransmission.");
|
||||
cs->timeout = probe_wait_time = arp_gen_probe_wait();
|
||||
return;
|
||||
switch (arpState) {
|
||||
case AS_GW_CHECK:
|
||||
log_line("arp: Still waiting for gateway to reply to arp ping...");
|
||||
arp_ping(cs, cs->routerAddr);
|
||||
cs->timeout = ARP_RETRANS_DELAY + 250;
|
||||
break;
|
||||
case AS_GW_QUERY:
|
||||
log_line("arp: Still looking for gateway hardware address...");
|
||||
arp_ping(cs, cs->routerAddr);
|
||||
cs->timeout = ARP_RETRANS_DELAY + 250;
|
||||
break;
|
||||
case AS_COLLISION_CHECK:
|
||||
// XXX: send some additional checks after BOUND is set just to
|
||||
// be safe?
|
||||
default:
|
||||
break;
|
||||
}
|
||||
}
|
||||
|
||||
@ -519,14 +577,14 @@ static void arp_do_defense(struct client_state_t *cs)
|
||||
if (!last_conflict_ts ||
|
||||
cur_conflict_ts - last_conflict_ts < DEFEND_INTERVAL) {
|
||||
log_line("arp: Defending our lease IP.");
|
||||
last_def_ts = cur_conflict_ts;
|
||||
arp_announcement(cs);
|
||||
} else if (!arp_relentless_def) {
|
||||
log_line("arp: Conflicting peer is persistent. Requesting new lease.");
|
||||
arp_close_fd(cs);
|
||||
send_release(cs);
|
||||
reinit_selecting(cs, 0);
|
||||
} else {
|
||||
pending_def_ts = last_def_ts + DEFEND_INTERVAL;
|
||||
pending_def_ts = arp_send_stats[ASEND_ANNOUNCE].ts + DEFEND_INTERVAL;
|
||||
long long def_xmit_ts = pending_def_ts - cur_conflict_ts;
|
||||
if (!cs->timeout || cs->timeout > def_xmit_ts) {
|
||||
def_old_oldTimeout = cs->oldTimeout;
|
||||
@ -534,6 +592,7 @@ static void arp_do_defense(struct client_state_t *cs)
|
||||
cs->timeout = def_xmit_ts;
|
||||
}
|
||||
}
|
||||
total_conflicts++;
|
||||
last_conflict_ts = cur_conflict_ts;
|
||||
}
|
||||
|
||||
@ -576,11 +635,12 @@ void handle_arp_response(struct client_state_t *cs)
|
||||
case AS_COLLISION_CHECK:
|
||||
if (!arp_is_query_reply(&arpreply))
|
||||
break;
|
||||
if (!memcmp(arpreply.sip4, &arp_dhcp_packet.yiaddr, 4)) {
|
||||
// Check to see if we replied to our own ARP query.
|
||||
if (!memcmp(client_config.arp, arpreply.smac, 6))
|
||||
arp_success(cs);
|
||||
else
|
||||
// If this packet was sent from our lease IP, and does not have a
|
||||
// MAC address matching our own (the latter check guards against stupid
|
||||
// hubs or repeaters), then it's a conflict and thus a failure.
|
||||
if (!memcmp(arpreply.sip4, &arp_dhcp_packet.yiaddr, 4) &&
|
||||
!memcmp(client_config.arp, arpreply.smac, 6)) {
|
||||
total_conflicts++;
|
||||
arp_failed(cs);
|
||||
}
|
||||
break;
|
||||
@ -605,6 +665,7 @@ void handle_arp_response(struct client_state_t *cs)
|
||||
cs->routerArp[2], cs->routerArp[3],
|
||||
cs->routerArp[4], cs->routerArp[5]);
|
||||
arp_switch_state(cs, AS_DEFENSE);
|
||||
arp_announcement(cs); // Do a second announcement.
|
||||
break;
|
||||
}
|
||||
if (!arp_validate_bpf_defense(cs, &arpreply))
|
||||
|
@ -1,5 +1,5 @@
|
||||
/* arp.h - functions to call the interface change daemon
|
||||
* Time-stamp: <2011-07-05 12:54:21 njk>
|
||||
* Time-stamp: <2011-07-05 13:49:59 njk>
|
||||
*
|
||||
* Copyright 2010-2011 Nicholas J. Kain <njkain@gmail.com>
|
||||
*
|
||||
@ -47,6 +47,7 @@ struct arpMsg {
|
||||
|
||||
extern int arp_relentless_def;
|
||||
|
||||
void arp_reset_send_stats(void);
|
||||
int arp_close_fd(struct client_state_t *cs);
|
||||
int arp_check(struct client_state_t *cs, struct dhcpmsg *packet);
|
||||
int arp_gw_check(struct client_state_t *cs);
|
||||
|
57
ndhc/state.c
57
ndhc/state.c
@ -22,6 +22,7 @@ static void bound_timeout(struct client_state_t *cs);
|
||||
static void renewing_timeout(struct client_state_t *cs);
|
||||
static void rebinding_timeout(struct client_state_t *cs);
|
||||
static void released_timeout(struct client_state_t *cs);
|
||||
static void collision_check_timeout(struct client_state_t *cs);
|
||||
static void anfrelease(struct client_state_t *cs);
|
||||
static void nfrelease(struct client_state_t *cs);
|
||||
static void frelease(struct client_state_t *cs);
|
||||
@ -42,7 +43,7 @@ dhcp_state_t dhcp_states[] = {
|
||||
{ an_packet, renewing_timeout, frenew, nfrelease}, // RENEWING
|
||||
{ an_packet, rebinding_timeout, frenew, nfrelease}, // REBINDING
|
||||
{ 0, arp_gw_failed, frenew, anfrelease}, // BOUND_GW_CHECK
|
||||
{ 0, arp_success, frenew, anfrelease}, // COLLISION_CHECK
|
||||
{ 0, collision_check_timeout, frenew, anfrelease}, // COLLISION_CHECK
|
||||
{ 0, released_timeout, frenew, frelease}, // RELEASED
|
||||
{ 0, 0, 0, 0}, // NUM_STATES
|
||||
};
|
||||
@ -63,6 +64,7 @@ void reinit_selecting(struct client_state_t *cs, int timeout)
|
||||
cs->timeout = timeout;
|
||||
cs->clientAddr = 0;
|
||||
cs->packetNum = 0;
|
||||
arp_reset_send_stats();
|
||||
set_listen_raw(cs);
|
||||
|
||||
}
|
||||
@ -153,6 +155,11 @@ static void released_timeout(struct client_state_t *cs)
|
||||
cs->timeout = -1;
|
||||
}
|
||||
|
||||
static void collision_check_timeout(struct client_state_t *cs)
|
||||
{
|
||||
arp_retransmit(cs);
|
||||
}
|
||||
|
||||
static void an_packet(struct client_state_t *cs, struct dhcpmsg *packet,
|
||||
uint8_t *message)
|
||||
{
|
||||
@ -253,78 +260,66 @@ static void frelease(struct client_state_t *cs)
|
||||
set_listen_none(cs);
|
||||
cs->dhcpState = DS_RELEASED;
|
||||
cs->timeout = -1;
|
||||
arp_reset_send_stats();
|
||||
}
|
||||
|
||||
static void frenew(struct client_state_t *cs)
|
||||
{
|
||||
log_line("Forcing a DHCP renew...");
|
||||
retry:
|
||||
switch (cs->dhcpState) {
|
||||
case DS_BOUND:
|
||||
case DS_BOUND_GW_CHECK:
|
||||
arp_close_fd(cs);
|
||||
cs->dhcpState = DS_RENEWING;
|
||||
set_listen_cooked(cs);
|
||||
send_renew(cs);
|
||||
break;
|
||||
case DS_COLLISION_CHECK:
|
||||
// Cancel arp ping in progress and treat as previous state.
|
||||
if (arp_close_fd(cs))
|
||||
cs->dhcpState = cs->arpPrevState;
|
||||
goto retry;
|
||||
case DS_RELEASED:
|
||||
set_listen_raw(cs);
|
||||
cs->dhcpState = DS_SELECTING;
|
||||
break;
|
||||
case DS_BOUND_GW_CHECK:
|
||||
case DS_COLLISION_CHECK:
|
||||
case DS_RENEWING:
|
||||
case DS_REBINDING:
|
||||
break;
|
||||
default:
|
||||
return;
|
||||
}
|
||||
cs->packetNum = 0;
|
||||
cs->packetNum = 0; // XXX necessary?
|
||||
cs->timeout = 0;
|
||||
}
|
||||
|
||||
static void restart_if(struct client_state_t *cs)
|
||||
{
|
||||
log_line("nl: %s back, querying for new lease", client_config.interface);
|
||||
reinit_selecting(cs, 0);
|
||||
}
|
||||
|
||||
static void sleep_if(struct client_state_t *cs)
|
||||
{
|
||||
arp_close_fd(cs);
|
||||
set_listen_none(cs);
|
||||
cs->dhcpState = DS_RELEASED;
|
||||
cs->timeout = -1;
|
||||
}
|
||||
|
||||
void ifup_action(struct client_state_t *cs)
|
||||
{
|
||||
// If we have a lease, then check to see
|
||||
// if our gateway is still valid (via ARP).
|
||||
// If we have a lease, check to see if our gateway is still valid via ARP.
|
||||
// If it fails, state -> SELECTING.
|
||||
// XXX what about RENEWING and REBINDING??
|
||||
if (cs->dhcpState == DS_BOUND) {
|
||||
if (arp_gw_check(cs) == -1)
|
||||
log_warning("nl: arp_gw_check could not make arp socket, assuming lease is still OK");
|
||||
else
|
||||
log_line("nl: interface back, revalidating lease");
|
||||
// If we don't have a lease, state -> SELECTING.
|
||||
} else if (cs->dhcpState != DS_SELECTING)
|
||||
restart_if(cs);
|
||||
} else if (cs->dhcpState != DS_SELECTING) {
|
||||
log_line("nl: %s back, querying for new lease", client_config.interface);
|
||||
reinit_selecting(cs, 0);
|
||||
}
|
||||
}
|
||||
|
||||
void ifdown_action(struct client_state_t *cs)
|
||||
{
|
||||
log_line("Interface shut down. Going to sleep.");
|
||||
sleep_if(cs);
|
||||
arp_close_fd(cs);
|
||||
arp_reset_send_stats();
|
||||
set_listen_none(cs);
|
||||
cs->dhcpState = DS_RELEASED;
|
||||
cs->timeout = -1;
|
||||
cs->clientAddr = 0;
|
||||
cs->packetNum = 0;
|
||||
}
|
||||
|
||||
void ifnocarrier_action(struct client_state_t *cs)
|
||||
{
|
||||
log_line("Interface carrier down. Going to sleep.");
|
||||
sleep_if(cs);
|
||||
log_line("Interface carrier down.");
|
||||
}
|
||||
|
||||
void packet_action(struct client_state_t *cs, struct dhcpmsg *packet,
|
||||
|
Loading…
Reference in New Issue
Block a user