1 /* 2 * Copyright (c) 1988, 1989, 1990, 1991, 1993, 1994 3 * The Regents of the University of California. All rights reserved. 4 * 5 * Redistribution and use in source and binary forms, with or without 6 * modification, are permitted provided that: (1) source code distributions 7 * retain the above copyright notice and this paragraph in its entirety, (2) 8 * distributions including binary code include the above copyright notice and 9 * this paragraph in its entirety in the documentation or other materials 10 * provided with the distribution, and (3) all advertising materials mentioning 11 * features or use of this software display the following acknowledgement: 12 * ``This product includes software developed by the University of California, 13 * Lawrence Berkeley Laboratory and its contributors.'' Neither the name of 14 * the University nor the names of its contributors may be used to endorse 15 * or promote products derived from this software without specific prior 16 * written permission. 17 * THIS SOFTWARE IS PROVIDED ``AS IS'' AND WITHOUT ANY EXPRESS OR IMPLIED 18 * WARRANTIES, INCLUDING, WITHOUT LIMITATION, THE IMPLIED WARRANTIES OF 19 * MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. 20 */ 21 22 /* \summary: IPv6 Internet Control Message Protocol (ICMPv6) printer */ 23 24 #include <config.h> 25 26 #include "netdissect-stdinc.h" 27 28 #include <stdio.h> 29 #include <string.h> 30 31 #include "netdissect.h" 32 #include "addrtoname.h" 33 #include "addrtostr.h" 34 #include "extract.h" 35 36 #include "ip6.h" 37 #include "ipproto.h" 38 39 #include "udp.h" 40 #include "ah.h" 41 42 /* NetBSD: icmp6.h,v 1.13 2000/08/03 16:30:37 itojun Exp */ 43 /* $KAME: icmp6.h,v 1.22 2000/08/03 15:25:16 jinmei Exp $ */ 44 45 /* 46 * Copyright (C) 1995, 1996, 1997, and 1998 WIDE Project. 47 * All rights reserved. 48 * 49 * Redistribution and use in source and binary forms, with or without 50 * modification, are permitted provided that the following conditions 51 * are met: 52 * 1. Redistributions of source code must retain the above copyright 53 * notice, this list of conditions and the following disclaimer. 54 * 2. Redistributions in binary form must reproduce the above copyright 55 * notice, this list of conditions and the following disclaimer in the 56 * documentation and/or other materials provided with the distribution. 57 * 3. Neither the name of the project nor the names of its contributors 58 * may be used to endorse or promote products derived from this software 59 * without specific prior written permission. 60 * 61 * THIS SOFTWARE IS PROVIDED BY THE PROJECT AND CONTRIBUTORS ``AS IS'' AND 62 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 63 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 64 * ARE DISCLAIMED. IN NO EVENT SHALL THE PROJECT OR CONTRIBUTORS BE LIABLE 65 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 66 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 67 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 68 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 69 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 70 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 71 * SUCH DAMAGE. 72 */ 73 74 struct icmp6_hdr { 75 nd_uint8_t icmp6_type; /* type field */ 76 nd_uint8_t icmp6_code; /* code field */ 77 nd_uint16_t icmp6_cksum; /* checksum field */ 78 union { 79 nd_uint32_t icmp6_un_data32[1]; /* type-specific field */ 80 nd_uint16_t icmp6_un_data16[2]; /* type-specific field */ 81 nd_uint8_t icmp6_un_data8[4]; /* type-specific field */ 82 nd_byte icmp6_un_data[1]; /* type-specific field */ 83 } icmp6_dataun; 84 }; 85 86 #define icmp6_data32 icmp6_dataun.icmp6_un_data32 87 #define icmp6_data16 icmp6_dataun.icmp6_un_data16 88 #define icmp6_data8 icmp6_dataun.icmp6_un_data8 89 #define icmp6_data icmp6_dataun.icmp6_un_data 90 #define icmp6_pptr icmp6_data32[0] /* parameter prob */ 91 #define icmp6_mtu icmp6_data32[0] /* packet too big */ 92 #define icmp6_id icmp6_data16[0] /* echo request/reply */ 93 #define icmp6_seq icmp6_data16[1] /* echo request/reply */ 94 #define icmp6_maxdelay icmp6_data16[0] /* mcast group membership */ 95 96 #define ICMP6_DST_UNREACH 1 /* dest unreachable, codes: */ 97 #define ICMP6_PACKET_TOO_BIG 2 /* packet too big */ 98 #define ICMP6_TIME_EXCEEDED 3 /* time exceeded, code: */ 99 #define ICMP6_PARAM_PROB 4 /* ip6 header bad */ 100 101 #define ICMP6_ECHO_REQUEST 128 /* echo service */ 102 #define ICMP6_ECHO_REPLY 129 /* echo reply */ 103 #define ICMP6_MEMBERSHIP_QUERY 130 /* group membership query */ 104 #define MLD6_LISTENER_QUERY 130 /* multicast listener query */ 105 #define ICMP6_MEMBERSHIP_REPORT 131 /* group membership report */ 106 #define MLD6_LISTENER_REPORT 131 /* multicast listener report */ 107 #define ICMP6_MEMBERSHIP_REDUCTION 132 /* group membership termination */ 108 #define MLD6_LISTENER_DONE 132 /* multicast listener done */ 109 110 #define ND_ROUTER_SOLICIT 133 /* router solicitation */ 111 #define ND_ROUTER_ADVERT 134 /* router advertisement */ 112 #define ND_NEIGHBOR_SOLICIT 135 /* neighbor solicitation */ 113 #define ND_NEIGHBOR_ADVERT 136 /* neighbor advertisement */ 114 #define ND_REDIRECT 137 /* redirect */ 115 116 #define ICMP6_ROUTER_RENUMBERING 138 /* router renumbering */ 117 118 #define ICMP6_WRUREQUEST 139 /* who are you request */ 119 #define ICMP6_WRUREPLY 140 /* who are you reply */ 120 #define ICMP6_FQDN_QUERY 139 /* FQDN query */ 121 #define ICMP6_FQDN_REPLY 140 /* FQDN reply */ 122 #define ICMP6_NI_QUERY 139 /* node information request - RFC 4620 */ 123 #define ICMP6_NI_REPLY 140 /* node information reply - RFC 4620 */ 124 #define IND_SOLICIT 141 /* inverse neighbor solicitation */ 125 #define IND_ADVERT 142 /* inverse neighbor advertisement */ 126 127 #define ICMP6_V2_MEMBERSHIP_REPORT 143 /* v2 membership report */ 128 #define MLDV2_LISTENER_REPORT 143 /* v2 multicast listener report */ 129 #define ICMP6_HADISCOV_REQUEST 144 130 #define ICMP6_HADISCOV_REPLY 145 131 #define ICMP6_MOBILEPREFIX_SOLICIT 146 132 #define ICMP6_MOBILEPREFIX_ADVERT 147 133 134 #define MLD6_MTRACE_RESP 200 /* mtrace response(to sender) */ 135 #define MLD6_MTRACE 201 /* mtrace messages */ 136 137 #define ICMP6_MAXTYPE 201 138 139 #define ICMP6_DST_UNREACH_NOROUTE 0 /* no route to destination */ 140 #define ICMP6_DST_UNREACH_ADMIN 1 /* administratively prohibited */ 141 #define ICMP6_DST_UNREACH_NOTNEIGHBOR 2 /* not a neighbor(obsolete) */ 142 #define ICMP6_DST_UNREACH_BEYONDSCOPE 2 /* beyond scope of source address */ 143 #define ICMP6_DST_UNREACH_ADDR 3 /* address unreachable */ 144 #define ICMP6_DST_UNREACH_NOPORT 4 /* port unreachable */ 145 146 #define ICMP6_TIME_EXCEED_TRANSIT 0 /* ttl==0 in transit */ 147 #define ICMP6_TIME_EXCEED_REASSEMBLY 1 /* ttl==0 in reass */ 148 149 #define ICMP6_PARAMPROB_HEADER 0 /* erroneous header field */ 150 #define ICMP6_PARAMPROB_NEXTHEADER 1 /* unrecognized next header */ 151 #define ICMP6_PARAMPROB_OPTION 2 /* unrecognized option */ 152 #define ICMP6_PARAMPROB_FRAGHDRCHAIN 3 /* incomplete header chain */ 153 154 #define ICMP6_INFOMSG_MASK 0x80 /* all informational messages */ 155 156 #define ICMP6_NI_SUBJ_IPV6 0 /* Query Subject is an IPv6 address */ 157 #define ICMP6_NI_SUBJ_FQDN 1 /* Query Subject is a Domain name */ 158 #define ICMP6_NI_SUBJ_IPV4 2 /* Query Subject is an IPv4 address */ 159 160 #define ICMP6_NI_SUCCESS 0 /* node information successful reply */ 161 #define ICMP6_NI_REFUSED 1 /* node information request is refused */ 162 #define ICMP6_NI_UNKNOWN 2 /* unknown Qtype */ 163 164 #define ICMP6_ROUTER_RENUMBERING_COMMAND 0 /* rr command */ 165 #define ICMP6_ROUTER_RENUMBERING_RESULT 1 /* rr result */ 166 #define ICMP6_ROUTER_RENUMBERING_SEQNUM_RESET 255 /* rr seq num reset */ 167 168 /* Used in kernel only */ 169 #define ND_REDIRECT_ONLINK 0 /* redirect to an on-link node */ 170 #define ND_REDIRECT_ROUTER 1 /* redirect to a better router */ 171 172 /* 173 * Multicast Listener Discovery 174 */ 175 struct mld6_hdr { 176 struct icmp6_hdr mld6_hdr; 177 nd_ipv6 mld6_addr; /* multicast address */ 178 }; 179 180 #define mld6_type mld6_hdr.icmp6_type 181 #define mld6_code mld6_hdr.icmp6_code 182 #define mld6_cksum mld6_hdr.icmp6_cksum 183 #define mld6_maxdelay mld6_hdr.icmp6_data16[0] 184 #define mld6_reserved mld6_hdr.icmp6_data16[1] 185 186 #define MLD_MINLEN 24 187 #define MLDV2_MINLEN 28 188 189 /* 190 * Neighbor Discovery 191 */ 192 193 struct nd_router_solicit { /* router solicitation */ 194 struct icmp6_hdr nd_rs_hdr; 195 /* could be followed by options */ 196 }; 197 198 #define nd_rs_type nd_rs_hdr.icmp6_type 199 #define nd_rs_code nd_rs_hdr.icmp6_code 200 #define nd_rs_cksum nd_rs_hdr.icmp6_cksum 201 #define nd_rs_reserved nd_rs_hdr.icmp6_data32[0] 202 203 struct nd_router_advert { /* router advertisement */ 204 struct icmp6_hdr nd_ra_hdr; 205 nd_uint32_t nd_ra_reachable; /* reachable time */ 206 nd_uint32_t nd_ra_retransmit; /* retransmit timer */ 207 /* could be followed by options */ 208 }; 209 210 #define nd_ra_type nd_ra_hdr.icmp6_type 211 #define nd_ra_code nd_ra_hdr.icmp6_code 212 #define nd_ra_cksum nd_ra_hdr.icmp6_cksum 213 #define nd_ra_curhoplimit nd_ra_hdr.icmp6_data8[0] 214 #define nd_ra_flags_reserved nd_ra_hdr.icmp6_data8[1] 215 #define ND_RA_FLAG_MANAGED 0x80 216 #define ND_RA_FLAG_OTHER 0x40 217 #define ND_RA_FLAG_HOME_AGENT 0x20 218 #define ND_RA_FLAG_IPV6ONLY 0x02 219 220 /* 221 * Router preference values based on draft-draves-ipngwg-router-selection-01. 222 * These are non-standard definitions. 223 */ 224 #define ND_RA_FLAG_RTPREF_MASK 0x18 /* 00011000 */ 225 226 #define ND_RA_FLAG_RTPREF_HIGH 0x08 /* 00001000 */ 227 #define ND_RA_FLAG_RTPREF_MEDIUM 0x00 /* 00000000 */ 228 #define ND_RA_FLAG_RTPREF_LOW 0x18 /* 00011000 */ 229 #define ND_RA_FLAG_RTPREF_RSV 0x10 /* 00010000 */ 230 231 #define nd_ra_router_lifetime nd_ra_hdr.icmp6_data16[1] 232 233 struct nd_neighbor_solicit { /* neighbor solicitation */ 234 struct icmp6_hdr nd_ns_hdr; 235 nd_ipv6 nd_ns_target; /*target address */ 236 /* could be followed by options */ 237 }; 238 239 #define nd_ns_type nd_ns_hdr.icmp6_type 240 #define nd_ns_code nd_ns_hdr.icmp6_code 241 #define nd_ns_cksum nd_ns_hdr.icmp6_cksum 242 #define nd_ns_reserved nd_ns_hdr.icmp6_data32[0] 243 244 struct nd_neighbor_advert { /* neighbor advertisement */ 245 struct icmp6_hdr nd_na_hdr; 246 nd_ipv6 nd_na_target; /* target address */ 247 /* could be followed by options */ 248 }; 249 250 #define nd_na_type nd_na_hdr.icmp6_type 251 #define nd_na_code nd_na_hdr.icmp6_code 252 #define nd_na_cksum nd_na_hdr.icmp6_cksum 253 #define nd_na_flags_reserved nd_na_hdr.icmp6_data32[0] 254 255 #define ND_NA_FLAG_ROUTER 0x80000000 256 #define ND_NA_FLAG_SOLICITED 0x40000000 257 #define ND_NA_FLAG_OVERRIDE 0x20000000 258 259 struct nd_redirect { /* redirect */ 260 struct icmp6_hdr nd_rd_hdr; 261 nd_ipv6 nd_rd_target; /* target address */ 262 nd_ipv6 nd_rd_dst; /* destination address */ 263 /* could be followed by options */ 264 }; 265 266 #define nd_rd_type nd_rd_hdr.icmp6_type 267 #define nd_rd_code nd_rd_hdr.icmp6_code 268 #define nd_rd_cksum nd_rd_hdr.icmp6_cksum 269 #define nd_rd_reserved nd_rd_hdr.icmp6_data32[0] 270 271 struct nd_opt_hdr { /* Neighbor discovery option header */ 272 nd_uint8_t nd_opt_type; 273 nd_uint8_t nd_opt_len; 274 /* followed by option specific data*/ 275 }; 276 277 #define ND_OPT_SOURCE_LINKADDR 1 278 #define ND_OPT_TARGET_LINKADDR 2 279 #define ND_OPT_PREFIX_INFORMATION 3 280 #define ND_OPT_REDIRECTED_HEADER 4 281 #define ND_OPT_MTU 5 282 #define ND_OPT_ADVINTERVAL 7 283 #define ND_OPT_HOMEAGENT_INFO 8 284 #define ND_OPT_ROUTE_INFO 24 /* RFC4191 */ 285 #define ND_OPT_RDNSS 25 286 #define ND_OPT_DNSSL 31 287 288 struct nd_opt_prefix_info { /* prefix information */ 289 nd_uint8_t nd_opt_pi_type; 290 nd_uint8_t nd_opt_pi_len; 291 nd_uint8_t nd_opt_pi_prefix_len; 292 nd_uint8_t nd_opt_pi_flags_reserved; 293 nd_uint32_t nd_opt_pi_valid_time; 294 nd_uint32_t nd_opt_pi_preferred_time; 295 nd_uint32_t nd_opt_pi_reserved2; 296 nd_ipv6 nd_opt_pi_prefix; 297 }; 298 299 #define ND_OPT_PI_FLAG_ONLINK 0x80 300 #define ND_OPT_PI_FLAG_AUTO 0x40 301 #define ND_OPT_PI_FLAG_ROUTER 0x20 /*2292bis*/ 302 303 struct nd_opt_rd_hdr { /* redirected header */ 304 nd_uint8_t nd_opt_rh_type; 305 nd_uint8_t nd_opt_rh_len; 306 nd_uint16_t nd_opt_rh_reserved1; 307 nd_uint32_t nd_opt_rh_reserved2; 308 /* followed by IP header and data */ 309 }; 310 311 struct nd_opt_mtu { /* MTU option */ 312 nd_uint8_t nd_opt_mtu_type; 313 nd_uint8_t nd_opt_mtu_len; 314 nd_uint16_t nd_opt_mtu_reserved; 315 nd_uint32_t nd_opt_mtu_mtu; 316 }; 317 318 struct nd_opt_rdnss { /* RDNSS RFC 6106 5.1 */ 319 nd_uint8_t nd_opt_rdnss_type; 320 nd_uint8_t nd_opt_rdnss_len; 321 nd_uint16_t nd_opt_rdnss_reserved; 322 nd_uint32_t nd_opt_rdnss_lifetime; 323 nd_ipv6 nd_opt_rdnss_addr[1]; /* variable-length */ 324 }; 325 326 struct nd_opt_dnssl { /* DNSSL RFC 6106 5.2 */ 327 nd_uint8_t nd_opt_dnssl_type; 328 nd_uint8_t nd_opt_dnssl_len; 329 nd_uint16_t nd_opt_dnssl_reserved; 330 nd_uint32_t nd_opt_dnssl_lifetime; 331 /* followed by list of DNS search domains, variable-length */ 332 }; 333 334 struct nd_opt_advinterval { /* Advertisement interval option */ 335 nd_uint8_t nd_opt_adv_type; 336 nd_uint8_t nd_opt_adv_len; 337 nd_uint16_t nd_opt_adv_reserved; 338 nd_uint32_t nd_opt_adv_interval; 339 }; 340 341 struct nd_opt_homeagent_info { /* Home Agent info */ 342 nd_uint8_t nd_opt_hai_type; 343 nd_uint8_t nd_opt_hai_len; 344 nd_uint16_t nd_opt_hai_reserved; 345 nd_uint16_t nd_opt_hai_preference; 346 nd_uint16_t nd_opt_hai_lifetime; 347 }; 348 349 struct nd_opt_route_info { /* route info */ 350 nd_uint8_t nd_opt_rti_type; 351 nd_uint8_t nd_opt_rti_len; 352 nd_uint8_t nd_opt_rti_prefixlen; 353 nd_uint8_t nd_opt_rti_flags; 354 nd_uint32_t nd_opt_rti_lifetime; 355 /* prefix follows */ 356 }; 357 358 /* 359 * icmp6 namelookup 360 */ 361 362 struct icmp6_namelookup { 363 struct icmp6_hdr icmp6_nl_hdr; 364 nd_byte icmp6_nl_nonce[8]; 365 nd_int32_t icmp6_nl_ttl; 366 #if 0 367 nd_uint8_t icmp6_nl_len; 368 nd_byte icmp6_nl_name[3]; 369 #endif 370 /* could be followed by options */ 371 }; 372 373 /* 374 * icmp6 node information 375 */ 376 struct icmp6_nodeinfo { 377 struct icmp6_hdr icmp6_ni_hdr; 378 nd_byte icmp6_ni_nonce[8]; 379 /* could be followed by reply data */ 380 }; 381 382 #define ni_type icmp6_ni_hdr.icmp6_type 383 #define ni_code icmp6_ni_hdr.icmp6_code 384 #define ni_cksum icmp6_ni_hdr.icmp6_cksum 385 #define ni_qtype icmp6_ni_hdr.icmp6_data16[0] 386 #define ni_flags icmp6_ni_hdr.icmp6_data16[1] 387 388 #define NI_QTYPE_NOOP 0 /* NOOP */ 389 #define NI_QTYPE_SUPTYPES 1 /* Supported Qtypes (drafts up to 09) */ 390 #define NI_QTYPE_FQDN 2 /* FQDN (draft 04) */ 391 #define NI_QTYPE_DNSNAME 2 /* DNS Name */ 392 #define NI_QTYPE_NODEADDR 3 /* Node Addresses */ 393 #define NI_QTYPE_IPV4ADDR 4 /* IPv4 Addresses */ 394 395 #define NI_NODEADDR_FLAG_TRUNCATE 0x0001 396 #define NI_NODEADDR_FLAG_ALL 0x0002 397 #define NI_NODEADDR_FLAG_COMPAT 0x0004 398 #define NI_NODEADDR_FLAG_LINKLOCAL 0x0008 399 #define NI_NODEADDR_FLAG_SITELOCAL 0x0010 400 #define NI_NODEADDR_FLAG_GLOBAL 0x0020 401 #define NI_NODEADDR_FLAG_ANYCAST 0x0040 /* just experimental. not in spec */ 402 403 struct ni_reply_fqdn { 404 nd_uint32_t ni_fqdn_ttl; /* TTL */ 405 nd_uint8_t ni_fqdn_namelen; /* length in octets of the FQDN */ 406 nd_byte ni_fqdn_name[3]; /* XXX: alignment */ 407 }; 408 409 /* 410 * Router Renumbering. as router-renum-08.txt 411 */ 412 struct icmp6_router_renum { /* router renumbering header */ 413 struct icmp6_hdr rr_hdr; 414 nd_uint8_t rr_segnum; 415 nd_uint8_t rr_flags; 416 nd_uint16_t rr_maxdelay; 417 nd_uint32_t rr_reserved; 418 }; 419 #define ICMP6_RR_FLAGS_TEST 0x80 420 #define ICMP6_RR_FLAGS_REQRESULT 0x40 421 #define ICMP6_RR_FLAGS_FORCEAPPLY 0x20 422 #define ICMP6_RR_FLAGS_SPECSITE 0x10 423 #define ICMP6_RR_FLAGS_PREVDONE 0x08 424 425 #define rr_type rr_hdr.icmp6_type 426 #define rr_code rr_hdr.icmp6_code 427 #define rr_cksum rr_hdr.icmp6_cksum 428 #define rr_seqnum rr_hdr.icmp6_data32[0] 429 430 struct rr_pco_match { /* match prefix part */ 431 nd_uint8_t rpm_code; 432 nd_uint8_t rpm_len; 433 nd_uint8_t rpm_ordinal; 434 nd_uint8_t rpm_matchlen; 435 nd_uint8_t rpm_minlen; 436 nd_uint8_t rpm_maxlen; 437 nd_uint16_t rpm_reserved; 438 nd_ipv6 rpm_prefix; 439 }; 440 441 #define RPM_PCO_ADD 1 442 #define RPM_PCO_CHANGE 2 443 #define RPM_PCO_SETGLOBAL 3 444 #define RPM_PCO_MAX 4 445 446 struct rr_pco_use { /* use prefix part */ 447 nd_uint8_t rpu_uselen; 448 nd_uint8_t rpu_keeplen; 449 nd_uint8_t rpu_ramask; 450 nd_uint8_t rpu_raflags; 451 nd_uint32_t rpu_vltime; 452 nd_uint32_t rpu_pltime; 453 nd_uint32_t rpu_flags; 454 nd_ipv6 rpu_prefix; 455 }; 456 #define ICMP6_RR_PCOUSE_RAFLAGS_ONLINK 0x80 457 #define ICMP6_RR_PCOUSE_RAFLAGS_AUTO 0x40 458 459 /* network endian */ 460 #define ICMP6_RR_PCOUSE_FLAGS_DECRVLTIME ((uint32_t)htonl(0x80000000)) 461 #define ICMP6_RR_PCOUSE_FLAGS_DECRPLTIME ((uint32_t)htonl(0x40000000)) 462 463 struct rr_result { /* router renumbering result message */ 464 nd_uint16_t rrr_flags; 465 nd_uint8_t rrr_ordinal; 466 nd_uint8_t rrr_matchedlen; 467 nd_uint32_t rrr_ifid; 468 nd_ipv6 rrr_prefix; 469 }; 470 /* network endian */ 471 #define ICMP6_RR_RESULT_FLAGS_OOB ((uint16_t)htons(0x0002)) 472 #define ICMP6_RR_RESULT_FLAGS_FORBIDDEN ((uint16_t)htons(0x0001)) 473 474 static const char *get_rtpref(u_int); 475 static const char *get_lifetime(uint32_t); 476 static void print_lladdr(netdissect_options *ndo, const u_char *, size_t); 477 static int icmp6_opt_print(netdissect_options *ndo, const u_char *, int); 478 static void mld6_print(netdissect_options *ndo, const u_char *); 479 static void mldv2_report_print(netdissect_options *ndo, const u_char *, u_int); 480 static void mldv2_query_print(netdissect_options *ndo, const u_char *, u_int); 481 static const struct udphdr *get_upperlayer(netdissect_options *ndo, const u_char *, u_int *); 482 static void dnsname_print(netdissect_options *ndo, const u_char *, const u_char *); 483 static void icmp6_nodeinfo_print(netdissect_options *ndo, u_int, const u_char *, const u_char *); 484 static void icmp6_rrenum_print(netdissect_options *ndo, const u_char *, const u_char *); 485 486 /* 487 * DIO: Updated to RFC6550, as published in 2012: section 6. (page 30) 488 */ 489 490 #define ND_RPL_MESSAGE 155 /* 0x9B */ 491 492 enum ND_RPL_CODE { 493 ND_RPL_DAG_IS=0x00, 494 ND_RPL_DAG_IO=0x01, 495 ND_RPL_DAO =0x02, 496 ND_RPL_DAO_ACK=0x03, 497 ND_RPL_SEC_DAG_IS = 0x80, 498 ND_RPL_SEC_DAG_IO = 0x81, 499 ND_RPL_SEC_DAG = 0x82, 500 ND_RPL_SEC_DAG_ACK= 0x83, 501 ND_RPL_SEC_CONSIST= 0x8A 502 }; 503 504 enum ND_RPL_DIO_FLAGS { 505 ND_RPL_DIO_GROUNDED = 0x80, 506 ND_RPL_DIO_DATRIG = 0x40, 507 ND_RPL_DIO_DASUPPORT= 0x20, 508 ND_RPL_DIO_RES4 = 0x10, 509 ND_RPL_DIO_RES3 = 0x08, 510 ND_RPL_DIO_PRF_MASK = 0x07 /* 3-bit preference */ 511 }; 512 513 #define DAGID_LEN 16 514 515 /* section 6 of draft-ietf-roll-rpl-19 */ 516 struct nd_rpl_security { 517 nd_uint8_t rpl_sec_t_reserved; /* bit 7 is T-bit */ 518 nd_uint8_t rpl_sec_algo; 519 nd_uint16_t rpl_sec_kim_lvl_flags; /* bit 15/14, KIM */ 520 /* bit 10-8, LVL, bit 7-0 flags */ 521 nd_uint32_t rpl_sec_counter; 522 #if 0 523 nd_byte rpl_sec_ki[0]; /* depends upon kim */ 524 #endif 525 }; 526 527 /* section 6.2.1, DODAG Information Solicitation (DIS_IS) */ 528 struct nd_rpl_dis_is { 529 nd_uint8_t rpl_dis_flags; 530 nd_uint8_t rpl_dis_reserved; 531 #if 0 532 nd_byte rpl_dis_options[0]; 533 #endif 534 }; 535 536 /* section 6.3.1, DODAG Information Object (DIO) */ 537 struct nd_rpl_dio { 538 nd_uint8_t rpl_instanceid; 539 nd_uint8_t rpl_version; 540 nd_uint16_t rpl_dagrank; 541 nd_uint8_t rpl_mopprf; /* bit 7=G, 5-3=MOP, 2-0=PRF */ 542 nd_uint8_t rpl_dtsn; /* Dest. Advertisement Trigger Sequence Number */ 543 nd_uint8_t rpl_flags; /* no flags defined yet */ 544 nd_uint8_t rpl_resv1; 545 nd_byte rpl_dagid[DAGID_LEN]; 546 }; 547 #define RPL_DIO_GROUND_FLAG 0x80 548 #define RPL_DIO_MOP_SHIFT 3 549 #define RPL_DIO_MOP_MASK (7 << RPL_DIO_MOP_SHIFT) 550 #define RPL_DIO_PRF_SHIFT 0 551 #define RPL_DIO_PRF_MASK (7 << RPL_DIO_PRF_SHIFT) 552 #define RPL_DIO_GROUNDED(X) ((X)&RPL_DIO_GROUND_FLAG) 553 #define RPL_DIO_MOP(X) (enum RPL_DIO_MOP)(((X)&RPL_DIO_MOP_MASK) >> RPL_DIO_MOP_SHIFT) 554 #define RPL_DIO_PRF(X) (((X)&RPL_DIO_PRF_MASK) >> RPL_DIO_PRF_SHIFT) 555 556 enum RPL_DIO_MOP { 557 RPL_DIO_NONSTORING= 0x0, 558 RPL_DIO_STORING = 0x1, 559 RPL_DIO_NONSTORING_MULTICAST = 0x2, 560 RPL_DIO_STORING_MULTICAST = 0x3 561 }; 562 563 enum RPL_SUBOPT { 564 RPL_OPT_PAD1 = 0, 565 RPL_OPT_PADN = 1, 566 RPL_DIO_METRICS = 2, 567 RPL_DIO_ROUTINGINFO = 3, 568 RPL_DIO_CONFIG = 4, 569 RPL_DAO_RPLTARGET = 5, 570 RPL_DAO_TRANSITINFO = 6, 571 RPL_DIO_DESTPREFIX = 8, 572 RPL_DAO_RPLTARGET_DESC=9 573 }; 574 575 struct rpl_genoption { 576 nd_uint8_t rpl_dio_type; 577 nd_uint8_t rpl_dio_len; /* suboption length, not including type/len */ 578 }; 579 #define RPL_GENOPTION_LEN 2 580 581 #define RPL_DIO_LIFETIME_INFINITE 0xffffffff 582 #define RPL_DIO_LIFETIME_DISCONNECT 0 583 584 struct rpl_dio_destprefix { 585 nd_uint8_t rpl_dio_type; 586 nd_uint8_t rpl_dio_len; 587 nd_uint8_t rpl_dio_prefixlen; /* in bits */ 588 nd_uint8_t rpl_dio_prf; /* flags, including Route Preference */ 589 nd_uint32_t rpl_dio_prefixlifetime; /* in seconds */ 590 #if 0 591 nd_byte rpl_dio_prefix[0]; /* variable number of bytes */ 592 #endif 593 }; 594 595 /* section 6.4.1, DODAG Information Object (DIO) */ 596 struct nd_rpl_dao { 597 nd_uint8_t rpl_instanceid; 598 nd_uint8_t rpl_flags; /* bit 7=K, 6=D */ 599 nd_uint8_t rpl_resv; 600 nd_uint8_t rpl_daoseq; 601 nd_byte rpl_dagid[DAGID_LEN]; /* present when D set. */ 602 }; 603 #define ND_RPL_DAO_MIN_LEN 4 /* length without DAGID */ 604 605 /* indicates if this DAO is to be acK'ed */ 606 #define RPL_DAO_K_SHIFT 7 607 #define RPL_DAO_K_MASK (1 << RPL_DAO_K_SHIFT) 608 #define RPL_DAO_K(X) (((X)&RPL_DAO_K_MASK) >> RPL_DAO_K_SHIFT) 609 610 /* indicates if the DAGID is present */ 611 #define RPL_DAO_D_SHIFT 6 612 #define RPL_DAO_D_MASK (1 << RPL_DAO_D_SHIFT) 613 #define RPL_DAO_D(X) (((X)&RPL_DAO_D_MASK) >> RPL_DAO_D_SHIFT) 614 615 struct rpl_dao_target { 616 nd_uint8_t rpl_dao_type; 617 nd_uint8_t rpl_dao_len; 618 nd_uint8_t rpl_dao_flags; /* unused */ 619 nd_uint8_t rpl_dao_prefixlen; /* in bits */ 620 #if 0 621 nd_byte rpl_dao_prefix[0]; /* variable number of bytes */ 622 #endif 623 }; 624 625 /* section 6.5.1, Destination Advertisement Object Acknowledgement (DAO-ACK) */ 626 struct nd_rpl_daoack { 627 nd_uint8_t rpl_instanceid; 628 nd_uint8_t rpl_flags; /* bit 7=D */ 629 nd_uint8_t rpl_daoseq; 630 nd_uint8_t rpl_status; 631 nd_byte rpl_dagid[DAGID_LEN]; /* present when D set. */ 632 }; 633 #define ND_RPL_DAOACK_MIN_LEN 4 /* length without DAGID */ 634 /* indicates if the DAGID is present */ 635 #define RPL_DAOACK_D_SHIFT 7 636 #define RPL_DAOACK_D_MASK (1 << RPL_DAOACK_D_SHIFT) 637 #define RPL_DAOACK_D(X) (((X)&RPL_DAOACK_D_MASK) >> RPL_DAOACK_D_SHIFT) 638 639 static const struct tok icmp6_type_values[] = { 640 { ICMP6_DST_UNREACH, "destination unreachable"}, 641 { ICMP6_PACKET_TOO_BIG, "packet too big"}, 642 { ICMP6_TIME_EXCEEDED, "time exceeded in-transit"}, 643 { ICMP6_PARAM_PROB, "parameter problem"}, 644 { ICMP6_ECHO_REQUEST, "echo request"}, 645 { ICMP6_ECHO_REPLY, "echo reply"}, 646 { MLD6_LISTENER_QUERY, "multicast listener query"}, 647 { MLD6_LISTENER_REPORT, "multicast listener report"}, 648 { MLD6_LISTENER_DONE, "multicast listener done"}, 649 { ND_ROUTER_SOLICIT, "router solicitation"}, 650 { ND_ROUTER_ADVERT, "router advertisement"}, 651 { ND_NEIGHBOR_SOLICIT, "neighbor solicitation"}, 652 { ND_NEIGHBOR_ADVERT, "neighbor advertisement"}, 653 { ND_REDIRECT, "redirect"}, 654 { ICMP6_ROUTER_RENUMBERING, "router renumbering"}, 655 { IND_SOLICIT, "inverse neighbor solicitation"}, 656 { IND_ADVERT, "inverse neighbor advertisement"}, 657 { MLDV2_LISTENER_REPORT, "multicast listener report v2"}, 658 { ICMP6_HADISCOV_REQUEST, "ha discovery request"}, 659 { ICMP6_HADISCOV_REPLY, "ha discovery reply"}, 660 { ICMP6_MOBILEPREFIX_SOLICIT, "mobile router solicitation"}, 661 { ICMP6_MOBILEPREFIX_ADVERT, "mobile router advertisement"}, 662 { ICMP6_WRUREQUEST, "who-are-you request"}, 663 { ICMP6_WRUREPLY, "who-are-you reply"}, 664 { ICMP6_NI_QUERY, "node information query"}, 665 { ICMP6_NI_REPLY, "node information reply"}, 666 { MLD6_MTRACE, "mtrace message"}, 667 { MLD6_MTRACE_RESP, "mtrace response"}, 668 { ND_RPL_MESSAGE, "RPL"}, 669 { 0, NULL } 670 }; 671 672 static const struct tok icmp6_dst_unreach_code_values[] = { 673 { ICMP6_DST_UNREACH_NOROUTE, "unreachable route" }, 674 { ICMP6_DST_UNREACH_ADMIN, " unreachable prohibited"}, 675 { ICMP6_DST_UNREACH_BEYONDSCOPE, "beyond scope"}, 676 { ICMP6_DST_UNREACH_ADDR, "unreachable address"}, 677 { ICMP6_DST_UNREACH_NOPORT, "unreachable port"}, 678 { 0, NULL } 679 }; 680 681 static const struct tok icmp6_opt_pi_flag_values[] = { 682 { ND_OPT_PI_FLAG_ONLINK, "onlink" }, 683 { ND_OPT_PI_FLAG_AUTO, "auto" }, 684 { ND_OPT_PI_FLAG_ROUTER, "router" }, 685 { 0, NULL } 686 }; 687 688 static const struct tok icmp6_opt_ra_flag_values[] = { 689 { ND_RA_FLAG_MANAGED, "managed" }, 690 { ND_RA_FLAG_OTHER, "other stateful"}, 691 { ND_RA_FLAG_HOME_AGENT, "home agent"}, 692 { ND_RA_FLAG_IPV6ONLY, "ipv6 only"}, 693 { 0, NULL } 694 }; 695 696 static const struct tok icmp6_nd_na_flag_values[] = { 697 { ND_NA_FLAG_ROUTER, "router" }, 698 { ND_NA_FLAG_SOLICITED, "solicited" }, 699 { ND_NA_FLAG_OVERRIDE, "override" }, 700 { 0, NULL } 701 }; 702 703 static const struct tok icmp6_opt_values[] = { 704 { ND_OPT_SOURCE_LINKADDR, "source link-address"}, 705 { ND_OPT_TARGET_LINKADDR, "destination link-address"}, 706 { ND_OPT_PREFIX_INFORMATION, "prefix info"}, 707 { ND_OPT_REDIRECTED_HEADER, "redirected header"}, 708 { ND_OPT_MTU, "mtu"}, 709 { ND_OPT_RDNSS, "rdnss"}, 710 { ND_OPT_DNSSL, "dnssl"}, 711 { ND_OPT_ADVINTERVAL, "advertisement interval"}, 712 { ND_OPT_HOMEAGENT_INFO, "homeagent information"}, 713 { ND_OPT_ROUTE_INFO, "route info"}, 714 { 0, NULL } 715 }; 716 717 /* mldv2 report types */ 718 static const struct tok mldv2report2str[] = { 719 { 1, "is_in" }, 720 { 2, "is_ex" }, 721 { 3, "to_in" }, 722 { 4, "to_ex" }, 723 { 5, "allow" }, 724 { 6, "block" }, 725 { 0, NULL } 726 }; 727 728 static const char * 729 get_rtpref(u_int v) 730 { 731 static const char *rtpref_str[] = { 732 "medium", /* 00 */ 733 "high", /* 01 */ 734 "rsv", /* 10 */ 735 "low" /* 11 */ 736 }; 737 738 return rtpref_str[((v & ND_RA_FLAG_RTPREF_MASK) >> 3) & 0xff]; 739 } 740 741 static const char * 742 get_lifetime(uint32_t v) 743 { 744 static char buf[20]; 745 746 if (v == (uint32_t)~0UL) 747 return "infinity"; 748 else { 749 snprintf(buf, sizeof(buf), "%us", v); 750 return buf; 751 } 752 } 753 754 static void 755 print_lladdr(netdissect_options *ndo, const uint8_t *p, size_t l) 756 { 757 const uint8_t *ep, *q; 758 759 q = p; 760 ep = p + l; 761 while (l > 0 && q < ep) { 762 if (q > p) 763 ND_PRINT(":"); 764 ND_PRINT("%02x", GET_U_1(q)); 765 q++; 766 l--; 767 } 768 } 769 770 static uint16_t icmp6_cksum(netdissect_options *ndo, const struct ip6_hdr *ip6, 771 const struct icmp6_hdr *icp, u_int len) 772 { 773 return nextproto6_cksum(ndo, ip6, (const uint8_t *)(const void *)icp, len, len, 774 IPPROTO_ICMPV6); 775 } 776 777 static const struct tok rpl_mop_values[] = { 778 { RPL_DIO_NONSTORING, "nonstoring"}, 779 { RPL_DIO_STORING, "storing"}, 780 { RPL_DIO_NONSTORING_MULTICAST, "nonstoring-multicast"}, 781 { RPL_DIO_STORING_MULTICAST, "storing-multicast"}, 782 { 0, NULL}, 783 }; 784 785 static const struct tok rpl_subopt_values[] = { 786 { RPL_OPT_PAD1, "pad1"}, 787 { RPL_OPT_PADN, "padN"}, 788 { RPL_DIO_METRICS, "metrics"}, 789 { RPL_DIO_ROUTINGINFO, "routinginfo"}, 790 { RPL_DIO_CONFIG, "config"}, 791 { RPL_DAO_RPLTARGET, "rpltarget"}, 792 { RPL_DAO_TRANSITINFO, "transitinfo"}, 793 { RPL_DIO_DESTPREFIX, "destprefix"}, 794 { RPL_DAO_RPLTARGET_DESC, "rpltargetdesc"}, 795 { 0, NULL}, 796 }; 797 798 static void 799 rpl_printopts(netdissect_options *ndo, const uint8_t *opts, u_int length) 800 { 801 const struct rpl_genoption *opt; 802 uint8_t dio_type; 803 u_int optlen; 804 805 while (length != 0) { 806 opt = (const struct rpl_genoption *)opts; 807 dio_type = GET_U_1(opt->rpl_dio_type); 808 if (dio_type == RPL_OPT_PAD1) { 809 optlen = 1; 810 ND_PRINT(" opt:pad1"); 811 } else { 812 if (length < RPL_GENOPTION_LEN) 813 goto trunc; 814 optlen = GET_U_1(opt->rpl_dio_len)+RPL_GENOPTION_LEN; 815 ND_PRINT(" opt:%s len:%u ", 816 tok2str(rpl_subopt_values, "subopt:%u", dio_type), 817 optlen); 818 ND_TCHECK_LEN(opt, optlen); 819 if (length < optlen) 820 goto trunc; 821 if (ndo->ndo_vflag > 2) { 822 hex_print(ndo, 823 " ", 824 opts + RPL_GENOPTION_LEN, /* content of DIO option */ 825 optlen - RPL_GENOPTION_LEN); 826 } 827 } 828 opts += optlen; 829 length -= optlen; 830 } 831 return; 832 trunc: 833 nd_print_trunc(ndo); 834 } 835 836 static void 837 rpl_dio_print(netdissect_options *ndo, 838 const u_char *bp, u_int length) 839 { 840 const struct nd_rpl_dio *dio = (const struct nd_rpl_dio *)bp; 841 842 ND_ICHECK_ZU(length, <, sizeof(struct nd_rpl_dio)); 843 ND_PRINT(" [dagid:%s,seq:%u,instance:%u,rank:%u,%smop:%s,prf:%u]", 844 GET_IP6ADDR_STRING(dio->rpl_dagid), 845 GET_U_1(dio->rpl_dtsn), 846 GET_U_1(dio->rpl_instanceid), 847 GET_BE_U_2(dio->rpl_dagrank), 848 RPL_DIO_GROUNDED(GET_U_1(dio->rpl_mopprf)) ? "grounded,":"", 849 tok2str(rpl_mop_values, "mop%u", 850 RPL_DIO_MOP(GET_U_1(dio->rpl_mopprf))), 851 RPL_DIO_PRF(GET_U_1(dio->rpl_mopprf))); 852 853 if(ndo->ndo_vflag > 1) { 854 rpl_printopts(ndo, bp + sizeof(struct nd_rpl_dio), 855 length - sizeof(struct nd_rpl_dio)); 856 } 857 return; 858 invalid: 859 nd_print_invalid(ndo); 860 } 861 862 static void 863 rpl_dao_print(netdissect_options *ndo, 864 const u_char *bp, u_int length) 865 { 866 const struct nd_rpl_dao *dao = (const struct nd_rpl_dao *)bp; 867 const char *dagid_str = "<elided>"; 868 uint8_t rpl_flags; 869 870 ND_TCHECK_SIZE(dao); 871 if (length < ND_RPL_DAO_MIN_LEN) 872 goto tooshort; 873 874 bp += ND_RPL_DAO_MIN_LEN; 875 length -= ND_RPL_DAO_MIN_LEN; 876 rpl_flags = GET_U_1(dao->rpl_flags); 877 if(RPL_DAO_D(rpl_flags)) { 878 ND_TCHECK_LEN(dao->rpl_dagid, DAGID_LEN); 879 if (length < DAGID_LEN) 880 goto tooshort; 881 dagid_str = ip6addr_string (ndo, dao->rpl_dagid); 882 bp += DAGID_LEN; 883 length -= DAGID_LEN; 884 } 885 886 ND_PRINT(" [dagid:%s,seq:%u,instance:%u%s%s,flags:%02x]", 887 dagid_str, 888 GET_U_1(dao->rpl_daoseq), 889 GET_U_1(dao->rpl_instanceid), 890 RPL_DAO_K(rpl_flags) ? ",acK":"", 891 RPL_DAO_D(rpl_flags) ? ",Dagid":"", 892 rpl_flags); 893 894 if(ndo->ndo_vflag > 1) { 895 rpl_printopts(ndo, bp, length); 896 } 897 return; 898 899 trunc: 900 nd_print_trunc(ndo); 901 return; 902 903 tooshort: 904 ND_PRINT(" [|length too short]"); 905 } 906 907 static void 908 rpl_daoack_print(netdissect_options *ndo, 909 const u_char *bp, u_int length) 910 { 911 const struct nd_rpl_daoack *daoack = (const struct nd_rpl_daoack *)bp; 912 const char *dagid_str = "<elided>"; 913 914 ND_TCHECK_LEN(daoack, ND_RPL_DAOACK_MIN_LEN); 915 if (length < ND_RPL_DAOACK_MIN_LEN) 916 goto tooshort; 917 918 bp += ND_RPL_DAOACK_MIN_LEN; 919 length -= ND_RPL_DAOACK_MIN_LEN; 920 if(RPL_DAOACK_D(GET_U_1(daoack->rpl_flags))) { 921 ND_TCHECK_LEN(daoack->rpl_dagid, DAGID_LEN); 922 if (length < DAGID_LEN) 923 goto tooshort; 924 dagid_str = ip6addr_string (ndo, daoack->rpl_dagid); 925 bp += DAGID_LEN; 926 length -= DAGID_LEN; 927 } 928 929 ND_PRINT(" [dagid:%s,seq:%u,instance:%u,status:%u]", 930 dagid_str, 931 GET_U_1(daoack->rpl_daoseq), 932 GET_U_1(daoack->rpl_instanceid), 933 GET_U_1(daoack->rpl_status)); 934 935 /* no officially defined options for DAOACK, but print any we find */ 936 if(ndo->ndo_vflag > 1) { 937 rpl_printopts(ndo, bp, length); 938 } 939 return; 940 941 trunc: 942 nd_print_trunc(ndo); 943 return; 944 945 tooshort: 946 ND_PRINT(" [|dao-length too short]"); 947 } 948 949 static void 950 rpl_print(netdissect_options *ndo, 951 uint8_t icmp6_code, 952 const u_char *bp, u_int length) 953 { 954 int secured = icmp6_code & 0x80; 955 int basecode= icmp6_code & 0x7f; 956 957 if(secured) { 958 ND_PRINT(", (SEC) [worktodo]"); 959 /* XXX 960 * the next header pointer needs to move forward to 961 * skip the secure part. 962 */ 963 return; 964 } else { 965 ND_PRINT(", (CLR)"); 966 } 967 968 switch(basecode) { 969 case ND_RPL_DAG_IS: 970 ND_PRINT("DODAG Information Solicitation"); 971 if(ndo->ndo_vflag) { 972 } 973 break; 974 case ND_RPL_DAG_IO: 975 ND_PRINT("DODAG Information Object"); 976 if(ndo->ndo_vflag) { 977 rpl_dio_print(ndo, bp, length); 978 } 979 break; 980 case ND_RPL_DAO: 981 ND_PRINT("Destination Advertisement Object"); 982 if(ndo->ndo_vflag) { 983 rpl_dao_print(ndo, bp, length); 984 } 985 break; 986 case ND_RPL_DAO_ACK: 987 ND_PRINT("Destination Advertisement Object Ack"); 988 if(ndo->ndo_vflag) { 989 rpl_daoack_print(ndo, bp, length); 990 } 991 break; 992 default: 993 ND_PRINT("RPL message, unknown code %u",icmp6_code); 994 break; 995 } 996 return; 997 998 #if 0 999 trunc: 1000 nd_print_trunc(ndo); 1001 return; 1002 #endif 1003 1004 } 1005 1006 void 1007 icmp6_print(netdissect_options *ndo, 1008 const u_char *bp, u_int length, const u_char *bp2, int fragmented) 1009 { 1010 const struct icmp6_hdr *dp; 1011 uint8_t icmp6_type, icmp6_code; 1012 const struct ip6_hdr *ip; 1013 const struct ip6_hdr *oip; 1014 const struct udphdr *ouh; 1015 uint16_t dport; 1016 const u_char *ep; 1017 u_int prot; 1018 1019 ndo->ndo_protocol = "icmp6"; 1020 dp = (const struct icmp6_hdr *)bp; 1021 ip = (const struct ip6_hdr *)bp2; 1022 oip = (const struct ip6_hdr *)(dp + 1); 1023 /* 'ep' points to the end of available data. */ 1024 ep = ndo->ndo_snapend; 1025 if (length == 0) { 1026 ND_PRINT("ICMP6, length 0"); 1027 nd_print_invalid(ndo); 1028 return; 1029 } 1030 1031 if (ndo->ndo_vflag && !fragmented) { 1032 uint16_t sum, udp_sum; 1033 1034 if (ND_TTEST_LEN(bp, length)) { 1035 udp_sum = GET_BE_U_2(dp->icmp6_cksum); 1036 sum = icmp6_cksum(ndo, ip, dp, length); 1037 if (sum != 0) 1038 ND_PRINT("[bad icmp6 cksum 0x%04x -> 0x%04x!] ", 1039 udp_sum, 1040 in_cksum_shouldbe(udp_sum, sum)); 1041 else 1042 ND_PRINT("[icmp6 sum ok] "); 1043 } 1044 } 1045 1046 icmp6_type = GET_U_1(dp->icmp6_type); 1047 ND_PRINT("ICMP6, %s", tok2str(icmp6_type_values,"unknown icmp6 type (%u)",icmp6_type)); 1048 1049 /* display cosmetics: print the packet length for printer that use the vflag now */ 1050 if (ndo->ndo_vflag && (icmp6_type == ND_ROUTER_SOLICIT || 1051 icmp6_type == ND_ROUTER_ADVERT || 1052 icmp6_type == ND_NEIGHBOR_ADVERT || 1053 icmp6_type == ND_NEIGHBOR_SOLICIT || 1054 icmp6_type == ND_REDIRECT || 1055 icmp6_type == ICMP6_HADISCOV_REPLY || 1056 icmp6_type == ICMP6_MOBILEPREFIX_ADVERT )) 1057 ND_PRINT(", length %u", length); 1058 1059 icmp6_code = GET_U_1(dp->icmp6_code); 1060 1061 switch (icmp6_type) { 1062 case ICMP6_DST_UNREACH: 1063 ND_PRINT(", %s", tok2str(icmp6_dst_unreach_code_values,"unknown unreach code (%u)",icmp6_code)); 1064 switch (icmp6_code) { 1065 1066 case ICMP6_DST_UNREACH_NOROUTE: /* fall through */ 1067 case ICMP6_DST_UNREACH_ADMIN: 1068 case ICMP6_DST_UNREACH_ADDR: 1069 ND_PRINT(" %s",GET_IP6ADDR_STRING(oip->ip6_dst)); 1070 break; 1071 case ICMP6_DST_UNREACH_BEYONDSCOPE: 1072 ND_PRINT(" %s, source address %s", 1073 GET_IP6ADDR_STRING(oip->ip6_dst), 1074 GET_IP6ADDR_STRING(oip->ip6_src)); 1075 break; 1076 case ICMP6_DST_UNREACH_NOPORT: 1077 if ((ouh = get_upperlayer(ndo, (const u_char *)oip, &prot)) 1078 == NULL) 1079 goto trunc; 1080 1081 dport = GET_BE_U_2(ouh->uh_dport); 1082 switch (prot) { 1083 case IPPROTO_TCP: 1084 ND_PRINT(", %s tcp port %s", 1085 GET_IP6ADDR_STRING(oip->ip6_dst), 1086 tcpport_string(ndo, dport)); 1087 break; 1088 case IPPROTO_UDP: 1089 ND_PRINT(", %s udp port %s", 1090 GET_IP6ADDR_STRING(oip->ip6_dst), 1091 udpport_string(ndo, dport)); 1092 break; 1093 default: 1094 ND_PRINT(", %s protocol %u port %u unreachable", 1095 GET_IP6ADDR_STRING(oip->ip6_dst), 1096 prot, dport); 1097 break; 1098 } 1099 break; 1100 default: 1101 if (ndo->ndo_vflag <= 1) { 1102 print_unknown_data(ndo, bp,"\n\t",length); 1103 return; 1104 } 1105 break; 1106 } 1107 break; 1108 case ICMP6_PACKET_TOO_BIG: 1109 ND_PRINT(", mtu %u", GET_BE_U_4(dp->icmp6_mtu)); 1110 break; 1111 case ICMP6_TIME_EXCEEDED: 1112 switch (icmp6_code) { 1113 case ICMP6_TIME_EXCEED_TRANSIT: 1114 ND_PRINT(" for %s", 1115 GET_IP6ADDR_STRING(oip->ip6_dst)); 1116 break; 1117 case ICMP6_TIME_EXCEED_REASSEMBLY: 1118 ND_PRINT(" (reassembly)"); 1119 break; 1120 default: 1121 ND_PRINT(", unknown code (%u)", icmp6_code); 1122 break; 1123 } 1124 break; 1125 case ICMP6_PARAM_PROB: 1126 ND_TCHECK_16(oip->ip6_dst); 1127 switch (icmp6_code) { 1128 case ICMP6_PARAMPROB_HEADER: 1129 ND_PRINT(", erroneous - octet %u", 1130 GET_BE_U_4(dp->icmp6_pptr)); 1131 break; 1132 case ICMP6_PARAMPROB_NEXTHEADER: 1133 ND_PRINT(", next header - octet %u", 1134 GET_BE_U_4(dp->icmp6_pptr)); 1135 break; 1136 case ICMP6_PARAMPROB_OPTION: 1137 ND_PRINT(", option - octet %u", 1138 GET_BE_U_4(dp->icmp6_pptr)); 1139 break; 1140 case ICMP6_PARAMPROB_FRAGHDRCHAIN: 1141 ND_PRINT(", incomplete header chain - octet %u", 1142 GET_BE_U_4(dp->icmp6_pptr)); 1143 break; 1144 default: 1145 ND_PRINT(", code-#%u", 1146 icmp6_code); 1147 break; 1148 } 1149 break; 1150 case ICMP6_ECHO_REQUEST: 1151 case ICMP6_ECHO_REPLY: 1152 ND_PRINT(", id %u, seq %u", GET_BE_U_2(dp->icmp6_id), 1153 GET_BE_U_2(dp->icmp6_seq)); 1154 break; 1155 case ICMP6_MEMBERSHIP_QUERY: 1156 if (length == MLD_MINLEN) { 1157 mld6_print(ndo, (const u_char *)dp); 1158 } else if (length >= MLDV2_MINLEN) { 1159 ND_PRINT(" v2"); 1160 mldv2_query_print(ndo, (const u_char *)dp, length); 1161 } else { 1162 ND_PRINT(" unknown-version (len %u) ", length); 1163 } 1164 break; 1165 case ICMP6_MEMBERSHIP_REPORT: 1166 mld6_print(ndo, (const u_char *)dp); 1167 break; 1168 case ICMP6_MEMBERSHIP_REDUCTION: 1169 mld6_print(ndo, (const u_char *)dp); 1170 break; 1171 case ND_ROUTER_SOLICIT: 1172 #define RTSOLLEN 8 1173 if (ndo->ndo_vflag) { 1174 if (icmp6_opt_print(ndo, (const u_char *)dp + RTSOLLEN, 1175 length - RTSOLLEN) == -1) 1176 goto trunc; 1177 } 1178 break; 1179 case ND_ROUTER_ADVERT: 1180 #define RTADVLEN 16 1181 if (ndo->ndo_vflag) { 1182 const struct nd_router_advert *p; 1183 1184 p = (const struct nd_router_advert *)dp; 1185 ND_PRINT("\n\thop limit %u, Flags [%s]" 1186 ", pref %s, router lifetime %us, reachable time %ums, retrans timer %ums", 1187 GET_U_1(p->nd_ra_curhoplimit), 1188 bittok2str(icmp6_opt_ra_flag_values,"none",GET_U_1(p->nd_ra_flags_reserved)), 1189 get_rtpref(GET_U_1(p->nd_ra_flags_reserved)), 1190 GET_BE_U_2(p->nd_ra_router_lifetime), 1191 GET_BE_U_4(p->nd_ra_reachable), 1192 GET_BE_U_4(p->nd_ra_retransmit)); 1193 1194 if (icmp6_opt_print(ndo, (const u_char *)dp + RTADVLEN, 1195 length - RTADVLEN) == -1) 1196 goto trunc; 1197 } 1198 break; 1199 case ND_NEIGHBOR_SOLICIT: 1200 { 1201 const struct nd_neighbor_solicit *p; 1202 p = (const struct nd_neighbor_solicit *)dp; 1203 ND_PRINT(", who has %s", GET_IP6ADDR_STRING(p->nd_ns_target)); 1204 if (ndo->ndo_vflag) { 1205 #define NDSOLLEN 24 1206 if (icmp6_opt_print(ndo, (const u_char *)dp + NDSOLLEN, 1207 length - NDSOLLEN) == -1) 1208 goto trunc; 1209 } 1210 } 1211 break; 1212 case ND_NEIGHBOR_ADVERT: 1213 { 1214 const struct nd_neighbor_advert *p; 1215 1216 p = (const struct nd_neighbor_advert *)dp; 1217 ND_PRINT(", tgt is %s", 1218 GET_IP6ADDR_STRING(p->nd_na_target)); 1219 if (ndo->ndo_vflag) { 1220 ND_PRINT(", Flags [%s]", 1221 bittok2str(icmp6_nd_na_flag_values, 1222 "none", 1223 GET_BE_U_4(p->nd_na_flags_reserved))); 1224 #define NDADVLEN 24 1225 if (icmp6_opt_print(ndo, (const u_char *)dp + NDADVLEN, 1226 length - NDADVLEN) == -1) 1227 goto trunc; 1228 #undef NDADVLEN 1229 } 1230 } 1231 break; 1232 case ND_REDIRECT: 1233 { 1234 const struct nd_redirect *p; 1235 1236 p = (const struct nd_redirect *)dp; 1237 ND_PRINT(", %s", GET_IP6ADDR_STRING(p->nd_rd_dst)); 1238 ND_PRINT(" to %s", GET_IP6ADDR_STRING(p->nd_rd_target)); 1239 #define REDIRECTLEN 40 1240 if (ndo->ndo_vflag) { 1241 if (icmp6_opt_print(ndo, (const u_char *)dp + REDIRECTLEN, 1242 length - REDIRECTLEN) == -1) 1243 goto trunc; 1244 #undef REDIRECTLEN 1245 } 1246 } 1247 break; 1248 case ICMP6_ROUTER_RENUMBERING: 1249 icmp6_rrenum_print(ndo, bp, ep); 1250 break; 1251 case ICMP6_NI_QUERY: 1252 case ICMP6_NI_REPLY: 1253 icmp6_nodeinfo_print(ndo, length, bp, ep); 1254 break; 1255 case IND_SOLICIT: 1256 case IND_ADVERT: 1257 break; 1258 case ICMP6_V2_MEMBERSHIP_REPORT: 1259 mldv2_report_print(ndo, (const u_char *) dp, length); 1260 break; 1261 case ICMP6_MOBILEPREFIX_SOLICIT: /* fall through */ 1262 case ICMP6_HADISCOV_REQUEST: 1263 ND_PRINT(", id 0x%04x", GET_BE_U_2(dp->icmp6_data16[0])); 1264 break; 1265 case ICMP6_HADISCOV_REPLY: 1266 if (ndo->ndo_vflag) { 1267 const u_char *cp; 1268 const u_char *p; 1269 1270 ND_PRINT(", id 0x%04x", 1271 GET_BE_U_2(dp->icmp6_data16[0])); 1272 cp = (const u_char *)dp + 1273 ND_MIN(length, ND_BYTES_AVAILABLE_AFTER(dp)); 1274 p = (const u_char *)(dp + 1); 1275 while (p < cp) { 1276 ND_PRINT(", %s", GET_IP6ADDR_STRING(p)); 1277 p += 16; 1278 } 1279 } 1280 break; 1281 case ICMP6_MOBILEPREFIX_ADVERT: 1282 if (ndo->ndo_vflag) { 1283 uint16_t flags; 1284 1285 ND_PRINT(", id 0x%04x", 1286 GET_BE_U_2(dp->icmp6_data16[0])); 1287 flags = GET_BE_U_2(dp->icmp6_data16[1]); 1288 if (flags & 0xc000) 1289 ND_PRINT(" "); 1290 if (flags & 0x8000) 1291 ND_PRINT("M"); 1292 if (flags & 0x4000) 1293 ND_PRINT("O"); 1294 #define MPADVLEN 8 1295 if (icmp6_opt_print(ndo, (const u_char *)dp + MPADVLEN, 1296 length - MPADVLEN) == -1) 1297 goto trunc; 1298 } 1299 break; 1300 case ND_RPL_MESSAGE: 1301 /* plus 4, because struct icmp6_hdr contains 4 bytes of icmp payload */ 1302 rpl_print(ndo, icmp6_code, dp->icmp6_data, length-sizeof(struct icmp6_hdr)+4); 1303 break; 1304 default: 1305 ND_PRINT(", length %u", length); 1306 if (ndo->ndo_vflag <= 1) 1307 print_unknown_data(ndo, bp,"\n\t", length); 1308 return; 1309 } 1310 if (!ndo->ndo_vflag) 1311 ND_PRINT(", length %u", length); 1312 return; 1313 trunc: 1314 nd_print_trunc(ndo); 1315 } 1316 1317 static const struct udphdr * 1318 get_upperlayer(netdissect_options *ndo, const u_char *bp, u_int *prot) 1319 { 1320 const u_char *ep; 1321 const struct ip6_hdr *ip6 = (const struct ip6_hdr *)bp; 1322 const struct udphdr *uh; 1323 const struct ip6_hbh *hbh; 1324 const struct ip6_frag *fragh; 1325 const struct ah *ah; 1326 u_int nh; 1327 int hlen; 1328 1329 /* 'ep' points to the end of available data. */ 1330 ep = ndo->ndo_snapend; 1331 1332 if (!ND_TTEST_1(ip6->ip6_nxt)) 1333 return NULL; 1334 1335 nh = GET_U_1(ip6->ip6_nxt); 1336 hlen = sizeof(struct ip6_hdr); 1337 1338 while (bp < ep) { 1339 bp += hlen; 1340 1341 switch(nh) { 1342 case IPPROTO_UDP: 1343 case IPPROTO_TCP: 1344 uh = (const struct udphdr *)bp; 1345 if (ND_TTEST_2(uh->uh_dport)) { 1346 *prot = nh; 1347 return(uh); 1348 } else 1349 return(NULL); 1350 /* NOTREACHED */ 1351 1352 case IPPROTO_HOPOPTS: 1353 case IPPROTO_DSTOPTS: 1354 case IPPROTO_ROUTING: 1355 hbh = (const struct ip6_hbh *)bp; 1356 if (!ND_TTEST_1(hbh->ip6h_len)) 1357 return(NULL); 1358 nh = GET_U_1(hbh->ip6h_nxt); 1359 hlen = (GET_U_1(hbh->ip6h_len) + 1) << 3; 1360 break; 1361 1362 case IPPROTO_FRAGMENT: /* this should be odd, but try anyway */ 1363 fragh = (const struct ip6_frag *)bp; 1364 if (!ND_TTEST_2(fragh->ip6f_offlg)) 1365 return(NULL); 1366 /* fragments with non-zero offset are meaningless */ 1367 if ((GET_BE_U_2(fragh->ip6f_offlg) & IP6F_OFF_MASK) != 0) 1368 return(NULL); 1369 nh = GET_U_1(fragh->ip6f_nxt); 1370 hlen = sizeof(struct ip6_frag); 1371 break; 1372 1373 case IPPROTO_AH: 1374 ah = (const struct ah *)bp; 1375 if (!ND_TTEST_1(ah->ah_len)) 1376 return(NULL); 1377 nh = GET_U_1(ah->ah_nxt); 1378 hlen = (GET_U_1(ah->ah_len) + 2) << 2; 1379 break; 1380 1381 default: /* unknown or undecodable header */ 1382 *prot = nh; /* meaningless, but set here anyway */ 1383 return(NULL); 1384 } 1385 } 1386 1387 return(NULL); /* should be notreached, though */ 1388 } 1389 1390 static int 1391 icmp6_opt_print(netdissect_options *ndo, const u_char *bp, int resid) 1392 { 1393 const struct nd_opt_hdr *op; 1394 uint8_t opt_type; 1395 u_int opt_len; 1396 const struct nd_opt_prefix_info *opp; 1397 const struct nd_opt_mtu *opm; 1398 const struct nd_opt_rdnss *oprd; 1399 const struct nd_opt_dnssl *opds; 1400 const struct nd_opt_advinterval *opa; 1401 const struct nd_opt_homeagent_info *oph; 1402 const struct nd_opt_route_info *opri; 1403 const u_char *cp, *ep, *domp; 1404 nd_ipv6 in6; 1405 size_t l; 1406 u_int i; 1407 1408 cp = bp; 1409 /* 'ep' points to the end of available data. */ 1410 ep = ndo->ndo_snapend; 1411 1412 while (cp < ep) { 1413 op = (const struct nd_opt_hdr *)cp; 1414 1415 ND_TCHECK_1(op->nd_opt_len); 1416 if (resid <= 0) 1417 return 0; 1418 opt_type = GET_U_1(op->nd_opt_type); 1419 opt_len = GET_U_1(op->nd_opt_len); 1420 if (opt_len == 0) 1421 goto trunc; 1422 if (cp + (opt_len << 3) > ep) 1423 goto trunc; 1424 1425 ND_PRINT("\n\t %s option (%u), length %u (%u): ", 1426 tok2str(icmp6_opt_values, "unknown", opt_type), 1427 opt_type, 1428 opt_len << 3, 1429 opt_len); 1430 1431 switch (opt_type) { 1432 case ND_OPT_SOURCE_LINKADDR: 1433 l = (opt_len << 3) - 2; 1434 print_lladdr(ndo, cp + 2, l); 1435 break; 1436 case ND_OPT_TARGET_LINKADDR: 1437 l = (opt_len << 3) - 2; 1438 print_lladdr(ndo, cp + 2, l); 1439 break; 1440 case ND_OPT_PREFIX_INFORMATION: 1441 opp = (const struct nd_opt_prefix_info *)op; 1442 ND_PRINT("%s/%u%s, Flags [%s], valid time %s", 1443 GET_IP6ADDR_STRING(opp->nd_opt_pi_prefix), 1444 GET_U_1(opp->nd_opt_pi_prefix_len), 1445 (opt_len != 4) ? "badlen" : "", 1446 bittok2str(icmp6_opt_pi_flag_values, "none", GET_U_1(opp->nd_opt_pi_flags_reserved)), 1447 get_lifetime(GET_BE_U_4(opp->nd_opt_pi_valid_time))); 1448 ND_PRINT(", pref. time %s", 1449 get_lifetime(GET_BE_U_4(opp->nd_opt_pi_preferred_time))); 1450 break; 1451 case ND_OPT_REDIRECTED_HEADER: 1452 print_unknown_data(ndo, bp,"\n\t ",opt_len<<3); 1453 /* xxx */ 1454 break; 1455 case ND_OPT_MTU: 1456 opm = (const struct nd_opt_mtu *)op; 1457 ND_PRINT(" %u%s", 1458 GET_BE_U_4(opm->nd_opt_mtu_mtu), 1459 (opt_len != 1) ? "bad option length" : "" ); 1460 break; 1461 case ND_OPT_RDNSS: 1462 oprd = (const struct nd_opt_rdnss *)op; 1463 l = (opt_len - 1) / 2; 1464 ND_PRINT(" lifetime %us,", 1465 GET_BE_U_4(oprd->nd_opt_rdnss_lifetime)); 1466 for (i = 0; i < l; i++) { 1467 ND_PRINT(" addr: %s", 1468 GET_IP6ADDR_STRING(oprd->nd_opt_rdnss_addr[i])); 1469 } 1470 break; 1471 case ND_OPT_DNSSL: 1472 opds = (const struct nd_opt_dnssl *)op; 1473 ND_PRINT(" lifetime %us, domain(s):", 1474 GET_BE_U_4(opds->nd_opt_dnssl_lifetime)); 1475 domp = cp + 8; /* domain names, variable-sized, RFC1035-encoded */ 1476 while (domp < cp + (opt_len << 3) && GET_U_1(domp) != '\0') { 1477 ND_PRINT(" "); 1478 if ((domp = fqdn_print(ndo, domp, bp)) == NULL) 1479 goto trunc; 1480 } 1481 break; 1482 case ND_OPT_ADVINTERVAL: 1483 opa = (const struct nd_opt_advinterval *)op; 1484 ND_PRINT(" %ums", 1485 GET_BE_U_4(opa->nd_opt_adv_interval)); 1486 break; 1487 case ND_OPT_HOMEAGENT_INFO: 1488 oph = (const struct nd_opt_homeagent_info *)op; 1489 ND_PRINT(" preference %u, lifetime %u", 1490 GET_BE_U_2(oph->nd_opt_hai_preference), 1491 GET_BE_U_2(oph->nd_opt_hai_lifetime)); 1492 break; 1493 case ND_OPT_ROUTE_INFO: 1494 opri = (const struct nd_opt_route_info *)op; 1495 ND_TCHECK_4(opri->nd_opt_rti_lifetime); 1496 memset(&in6, 0, sizeof(in6)); 1497 switch (opt_len) { 1498 case 1: 1499 break; 1500 case 2: 1501 GET_CPY_BYTES(&in6, opri + 1, 8); 1502 break; 1503 case 3: 1504 GET_CPY_BYTES(&in6, opri + 1, 16); 1505 break; 1506 default: 1507 goto trunc; 1508 } 1509 ND_PRINT(" %s/%u", ip6addr_string(ndo, (const u_char *)&in6), /* local buffer, not packet data; don't use GET_IP6ADDR_STRING() */ 1510 GET_U_1(opri->nd_opt_rti_prefixlen)); 1511 ND_PRINT(", pref=%s", 1512 get_rtpref(GET_U_1(opri->nd_opt_rti_flags))); 1513 ND_PRINT(", lifetime=%s", 1514 get_lifetime(GET_BE_U_4(opri->nd_opt_rti_lifetime))); 1515 break; 1516 default: 1517 if (ndo->ndo_vflag <= 1) { 1518 print_unknown_data(ndo,cp+2,"\n\t ", (opt_len << 3) - 2); /* skip option header */ 1519 return 0; 1520 } 1521 break; 1522 } 1523 /* do we want to see an additional hexdump ? */ 1524 if (ndo->ndo_vflag> 1) 1525 print_unknown_data(ndo, cp+2,"\n\t ", (opt_len << 3) - 2); /* skip option header */ 1526 1527 cp += opt_len << 3; 1528 resid -= opt_len << 3; 1529 } 1530 return 0; 1531 1532 trunc: 1533 return -1; 1534 } 1535 1536 static void 1537 mld6_print(netdissect_options *ndo, const u_char *bp) 1538 { 1539 const struct mld6_hdr *mp = (const struct mld6_hdr *)bp; 1540 const u_char *ep; 1541 1542 /* 'ep' points to the end of available data. */ 1543 ep = ndo->ndo_snapend; 1544 1545 if ((const u_char *)mp + sizeof(*mp) > ep) 1546 return; 1547 1548 ND_PRINT("max resp delay: %u ", GET_BE_U_2(mp->mld6_maxdelay)); 1549 ND_PRINT("addr: %s", GET_IP6ADDR_STRING(mp->mld6_addr)); 1550 } 1551 1552 static void 1553 mldv2_report_print(netdissect_options *ndo, const u_char *bp, u_int len) 1554 { 1555 const struct icmp6_hdr *icp = (const struct icmp6_hdr *) bp; 1556 u_int group, nsrcs, ngroups; 1557 u_int i, j; 1558 1559 /* Minimum len is 8 */ 1560 if (len < 8) { 1561 ND_PRINT(" [invalid len %u]", len); 1562 return; 1563 } 1564 1565 ngroups = GET_BE_U_2(icp->icmp6_data16[1]); 1566 ND_PRINT(", %u group record(s)", ngroups); 1567 if (ndo->ndo_vflag > 0) { 1568 /* Print the group records */ 1569 group = 8; 1570 for (i = 0; i < ngroups; i++) { 1571 /* type(1) + auxlen(1) + numsrc(2) + grp(16) */ 1572 if (len < group + 20) { 1573 ND_PRINT(" [invalid number of groups]"); 1574 return; 1575 } 1576 ND_PRINT(" [gaddr %s", GET_IP6ADDR_STRING(bp + group + 4)); 1577 ND_PRINT(" %s", tok2str(mldv2report2str, " [v2-report-#%u]", 1578 GET_U_1(bp + group))); 1579 nsrcs = GET_BE_U_2(bp + group + 2); 1580 /* Check the number of sources and print them */ 1581 if (len < group + 20 + (nsrcs * sizeof(nd_ipv6))) { 1582 ND_PRINT(" [invalid number of sources %u]", nsrcs); 1583 return; 1584 } 1585 if (ndo->ndo_vflag == 1) 1586 ND_PRINT(", %u source(s)", nsrcs); 1587 else { 1588 /* Print the sources */ 1589 ND_PRINT(" {"); 1590 for (j = 0; j < nsrcs; j++) { 1591 ND_PRINT(" %s", GET_IP6ADDR_STRING(bp + group + 20 + (j * sizeof(nd_ipv6)))); 1592 } 1593 ND_PRINT(" }"); 1594 } 1595 /* Next group record */ 1596 group += 20 + nsrcs * sizeof(nd_ipv6); 1597 ND_PRINT("]"); 1598 } 1599 } 1600 } 1601 1602 static void 1603 mldv2_query_print(netdissect_options *ndo, const u_char *bp, u_int len) 1604 { 1605 const struct icmp6_hdr *icp = (const struct icmp6_hdr *) bp; 1606 u_int mrc; 1607 u_int mrt, qqi; 1608 u_int nsrcs; 1609 u_int i; 1610 1611 /* Minimum len is 28 */ 1612 if (len < 28) { 1613 ND_PRINT(" [invalid len %u]", len); 1614 return; 1615 } 1616 mrc = GET_BE_U_2(icp->icmp6_data16[0]); 1617 if (mrc < 32768) { 1618 mrt = mrc; 1619 } else { 1620 mrt = ((mrc & 0x0fff) | 0x1000) << (((mrc & 0x7000) >> 12) + 3); 1621 } 1622 if (ndo->ndo_vflag) { 1623 ND_PRINT(" [max resp delay=%u]", mrt); 1624 } 1625 ND_PRINT(" [gaddr %s", GET_IP6ADDR_STRING(bp + 8)); 1626 1627 if (ndo->ndo_vflag) { 1628 if (GET_U_1(bp + 24) & 0x08) { 1629 ND_PRINT(" sflag"); 1630 } 1631 if (GET_U_1(bp + 24) & 0x07) { 1632 ND_PRINT(" robustness=%u", GET_U_1(bp + 24) & 0x07); 1633 } 1634 if (GET_U_1(bp + 25) < 128) { 1635 qqi = GET_U_1(bp + 25); 1636 } else { 1637 qqi = ((GET_U_1(bp + 25) & 0x0f) | 0x10) << 1638 (((GET_U_1(bp + 25) & 0x70) >> 4) + 3); 1639 } 1640 ND_PRINT(" qqi=%u", qqi); 1641 } 1642 1643 nsrcs = GET_BE_U_2(bp + 26); 1644 if (nsrcs > 0) { 1645 if (len < 28 + nsrcs * sizeof(nd_ipv6)) 1646 ND_PRINT(" [invalid number of sources]"); 1647 else if (ndo->ndo_vflag > 1) { 1648 ND_PRINT(" {"); 1649 for (i = 0; i < nsrcs; i++) { 1650 ND_PRINT(" %s", GET_IP6ADDR_STRING(bp + 28 + (i * sizeof(nd_ipv6)))); 1651 } 1652 ND_PRINT(" }"); 1653 } else 1654 ND_PRINT(", %u source(s)", nsrcs); 1655 } 1656 ND_PRINT("]"); 1657 } 1658 1659 static void 1660 dnsname_print(netdissect_options *ndo, const u_char *cp, const u_char *ep) 1661 { 1662 int i; 1663 1664 /* DNS name decoding - no decompression */ 1665 ND_PRINT(", \""); 1666 while (cp < ep) { 1667 i = GET_U_1(cp); 1668 cp++; 1669 if (i) { 1670 if (i > ep - cp) { 1671 ND_PRINT("???"); 1672 break; 1673 } 1674 while (i-- && cp < ep) { 1675 fn_print_char(ndo, GET_U_1(cp)); 1676 cp++; 1677 } 1678 if (cp + 1 < ep && GET_U_1(cp)) 1679 ND_PRINT("."); 1680 } else { 1681 if (cp == ep) { 1682 /* FQDN */ 1683 ND_PRINT("."); 1684 } else if (cp + 1 == ep && GET_U_1(cp) == '\0') { 1685 /* truncated */ 1686 } else { 1687 /* invalid */ 1688 ND_PRINT("???"); 1689 } 1690 break; 1691 } 1692 } 1693 ND_PRINT("\""); 1694 } 1695 1696 static void 1697 icmp6_nodeinfo_print(netdissect_options *ndo, u_int icmp6len, const u_char *bp, const u_char *ep) 1698 { 1699 const struct icmp6_nodeinfo *ni6; 1700 const struct icmp6_hdr *dp; 1701 const u_char *cp; 1702 size_t siz, i; 1703 int needcomma; 1704 1705 if (ep < bp) 1706 return; 1707 dp = (const struct icmp6_hdr *)bp; 1708 ni6 = (const struct icmp6_nodeinfo *)bp; 1709 siz = ep - bp; 1710 1711 switch (GET_U_1(ni6->ni_type)) { 1712 case ICMP6_NI_QUERY: 1713 if (siz == sizeof(*dp) + 4) { 1714 /* KAME who-are-you */ 1715 ND_PRINT(" who-are-you request"); 1716 break; 1717 } 1718 ND_PRINT(" node information query"); 1719 1720 ND_TCHECK_LEN(dp, sizeof(*ni6)); 1721 ni6 = (const struct icmp6_nodeinfo *)dp; 1722 ND_PRINT(" ("); /*)*/ 1723 switch (GET_BE_U_2(ni6->ni_qtype)) { 1724 case NI_QTYPE_NOOP: 1725 ND_PRINT("noop"); 1726 break; 1727 case NI_QTYPE_SUPTYPES: 1728 ND_PRINT("supported qtypes"); 1729 i = GET_BE_U_2(ni6->ni_flags); 1730 if (i) 1731 ND_PRINT(" [%s]", (i & 0x01) ? "C" : ""); 1732 break; 1733 case NI_QTYPE_FQDN: 1734 ND_PRINT("DNS name"); 1735 break; 1736 case NI_QTYPE_NODEADDR: 1737 ND_PRINT("node addresses"); 1738 i = GET_BE_U_2(ni6->ni_flags); 1739 if (!i) 1740 break; 1741 /* NI_NODEADDR_FLAG_TRUNCATE undefined for query */ 1742 ND_PRINT(" [%s%s%s%s%s%s]", 1743 (i & NI_NODEADDR_FLAG_ANYCAST) ? "a" : "", 1744 (i & NI_NODEADDR_FLAG_GLOBAL) ? "G" : "", 1745 (i & NI_NODEADDR_FLAG_SITELOCAL) ? "S" : "", 1746 (i & NI_NODEADDR_FLAG_LINKLOCAL) ? "L" : "", 1747 (i & NI_NODEADDR_FLAG_COMPAT) ? "C" : "", 1748 (i & NI_NODEADDR_FLAG_ALL) ? "A" : ""); 1749 break; 1750 default: 1751 ND_PRINT("unknown"); 1752 break; 1753 } 1754 1755 if (GET_BE_U_2(ni6->ni_qtype) == NI_QTYPE_NOOP || 1756 GET_BE_U_2(ni6->ni_qtype) == NI_QTYPE_SUPTYPES) { 1757 if (siz != sizeof(*ni6)) 1758 if (ndo->ndo_vflag) 1759 ND_PRINT(", invalid len"); 1760 /*(*/ 1761 ND_PRINT(")"); 1762 break; 1763 } 1764 1765 /* XXX backward compat, icmp-name-lookup-03 */ 1766 if (siz == sizeof(*ni6)) { 1767 ND_PRINT(", 03 draft"); 1768 /*(*/ 1769 ND_PRINT(")"); 1770 break; 1771 } 1772 1773 cp = (const u_char *)(ni6 + 1); 1774 switch (GET_U_1(ni6->ni_code)) { 1775 case ICMP6_NI_SUBJ_IPV6: 1776 if (!ND_TTEST_LEN(dp, sizeof(*ni6) + sizeof(nd_ipv6))) 1777 break; 1778 if (siz != sizeof(*ni6) + sizeof(nd_ipv6)) { 1779 if (ndo->ndo_vflag) 1780 ND_PRINT(", invalid subject len"); 1781 break; 1782 } 1783 ND_PRINT(", subject=%s", 1784 GET_IP6ADDR_STRING(cp)); 1785 break; 1786 case ICMP6_NI_SUBJ_FQDN: 1787 ND_PRINT(", subject=DNS name"); 1788 if (GET_U_1(cp) == ep - cp - 1) { 1789 /* icmp-name-lookup-03, pascal string */ 1790 if (ndo->ndo_vflag) 1791 ND_PRINT(", 03 draft"); 1792 cp++; 1793 ND_PRINT(", \""); 1794 while (cp < ep) { 1795 fn_print_char(ndo, GET_U_1(cp)); 1796 cp++; 1797 } 1798 ND_PRINT("\""); 1799 } else 1800 dnsname_print(ndo, cp, ep); 1801 break; 1802 case ICMP6_NI_SUBJ_IPV4: 1803 if (!ND_TTEST_LEN(dp, sizeof(*ni6) + sizeof(nd_ipv4))) 1804 break; 1805 if (siz != sizeof(*ni6) + sizeof(nd_ipv4)) { 1806 if (ndo->ndo_vflag) 1807 ND_PRINT(", invalid subject len"); 1808 break; 1809 } 1810 ND_PRINT(", subject=%s", 1811 GET_IPADDR_STRING(cp)); 1812 break; 1813 default: 1814 ND_PRINT(", unknown subject"); 1815 break; 1816 } 1817 1818 /*(*/ 1819 ND_PRINT(")"); 1820 break; 1821 1822 case ICMP6_NI_REPLY: 1823 if (icmp6len > siz) 1824 goto trunc; 1825 1826 needcomma = 0; 1827 1828 ND_TCHECK_LEN(dp, sizeof(*ni6)); 1829 ni6 = (const struct icmp6_nodeinfo *)dp; 1830 ND_PRINT(" node information reply"); 1831 ND_PRINT(" ("); /*)*/ 1832 switch (GET_U_1(ni6->ni_code)) { 1833 case ICMP6_NI_SUCCESS: 1834 if (ndo->ndo_vflag) { 1835 ND_PRINT("success"); 1836 needcomma++; 1837 } 1838 break; 1839 case ICMP6_NI_REFUSED: 1840 ND_PRINT("refused"); 1841 needcomma++; 1842 if (siz != sizeof(*ni6)) 1843 if (ndo->ndo_vflag) 1844 ND_PRINT(", invalid length"); 1845 break; 1846 case ICMP6_NI_UNKNOWN: 1847 ND_PRINT("unknown"); 1848 needcomma++; 1849 if (siz != sizeof(*ni6)) 1850 if (ndo->ndo_vflag) 1851 ND_PRINT(", invalid length"); 1852 break; 1853 } 1854 1855 if (GET_U_1(ni6->ni_code) != ICMP6_NI_SUCCESS) { 1856 /*(*/ 1857 ND_PRINT(")"); 1858 break; 1859 } 1860 1861 switch (GET_BE_U_2(ni6->ni_qtype)) { 1862 case NI_QTYPE_NOOP: 1863 if (needcomma) 1864 ND_PRINT(", "); 1865 ND_PRINT("noop"); 1866 if (siz != sizeof(*ni6)) 1867 if (ndo->ndo_vflag) 1868 ND_PRINT(", invalid length"); 1869 break; 1870 case NI_QTYPE_SUPTYPES: 1871 if (needcomma) 1872 ND_PRINT(", "); 1873 ND_PRINT("supported qtypes"); 1874 i = GET_BE_U_2(ni6->ni_flags); 1875 if (i) 1876 ND_PRINT(" [%s]", (i & 0x01) ? "C" : ""); 1877 break; 1878 case NI_QTYPE_FQDN: 1879 if (needcomma) 1880 ND_PRINT(", "); 1881 ND_PRINT("DNS name"); 1882 cp = (const u_char *)(ni6 + 1) + 4; 1883 if (GET_U_1(cp) == ep - cp - 1) { 1884 /* icmp-name-lookup-03, pascal string */ 1885 if (ndo->ndo_vflag) 1886 ND_PRINT(", 03 draft"); 1887 cp++; 1888 ND_PRINT(", \""); 1889 while (cp < ep) { 1890 fn_print_char(ndo, GET_U_1(cp)); 1891 cp++; 1892 } 1893 ND_PRINT("\""); 1894 } else 1895 dnsname_print(ndo, cp, ep); 1896 if ((GET_BE_U_2(ni6->ni_flags) & 0x01) != 0) 1897 ND_PRINT(" [TTL=%u]", GET_BE_U_4(ni6 + 1)); 1898 break; 1899 case NI_QTYPE_NODEADDR: 1900 if (needcomma) 1901 ND_PRINT(", "); 1902 ND_PRINT("node addresses"); 1903 i = sizeof(*ni6); 1904 while (i < siz) { 1905 if (i + sizeof(uint32_t) + sizeof(nd_ipv6) > siz) 1906 break; 1907 ND_PRINT(" %s(%u)", 1908 GET_IP6ADDR_STRING(bp + i + sizeof(uint32_t)), 1909 GET_BE_U_4(bp + i)); 1910 i += sizeof(uint32_t) + sizeof(nd_ipv6); 1911 } 1912 i = GET_BE_U_2(ni6->ni_flags); 1913 if (!i) 1914 break; 1915 ND_PRINT(" [%s%s%s%s%s%s%s]", 1916 (i & NI_NODEADDR_FLAG_ANYCAST) ? "a" : "", 1917 (i & NI_NODEADDR_FLAG_GLOBAL) ? "G" : "", 1918 (i & NI_NODEADDR_FLAG_SITELOCAL) ? "S" : "", 1919 (i & NI_NODEADDR_FLAG_LINKLOCAL) ? "L" : "", 1920 (i & NI_NODEADDR_FLAG_COMPAT) ? "C" : "", 1921 (i & NI_NODEADDR_FLAG_ALL) ? "A" : "", 1922 (i & NI_NODEADDR_FLAG_TRUNCATE) ? "T" : ""); 1923 break; 1924 default: 1925 if (needcomma) 1926 ND_PRINT(", "); 1927 ND_PRINT("unknown"); 1928 break; 1929 } 1930 1931 /*(*/ 1932 ND_PRINT(")"); 1933 break; 1934 } 1935 return; 1936 1937 trunc: 1938 nd_print_trunc(ndo); 1939 } 1940 1941 static void 1942 icmp6_rrenum_print(netdissect_options *ndo, const u_char *bp, const u_char *ep) 1943 { 1944 const struct icmp6_router_renum *rr6; 1945 const char *cp; 1946 const struct rr_pco_match *match; 1947 const struct rr_pco_use *use; 1948 char hbuf[NI_MAXHOST]; 1949 int n; 1950 1951 if (ep < bp) 1952 return; 1953 rr6 = (const struct icmp6_router_renum *)bp; 1954 cp = (const char *)(rr6 + 1); 1955 1956 ND_TCHECK_4(rr6->rr_reserved); 1957 switch (GET_U_1(rr6->rr_code)) { 1958 case ICMP6_ROUTER_RENUMBERING_COMMAND: 1959 ND_PRINT(", command"); 1960 break; 1961 case ICMP6_ROUTER_RENUMBERING_RESULT: 1962 ND_PRINT(", result"); 1963 break; 1964 case ICMP6_ROUTER_RENUMBERING_SEQNUM_RESET: 1965 ND_PRINT(", sequence number reset"); 1966 break; 1967 default: 1968 ND_PRINT(", code-#%u", GET_U_1(rr6->rr_code)); 1969 break; 1970 } 1971 1972 ND_PRINT(", seq=%u", GET_BE_U_4(rr6->rr_seqnum)); 1973 1974 if (ndo->ndo_vflag) { 1975 uint8_t rr_flags = GET_U_1(rr6->rr_flags); 1976 #define F(x, y) (rr_flags & (x) ? (y) : "") 1977 ND_PRINT("["); /*]*/ 1978 if (rr_flags) { 1979 ND_PRINT("%s%s%s%s%s,", F(ICMP6_RR_FLAGS_TEST, "T"), 1980 F(ICMP6_RR_FLAGS_REQRESULT, "R"), 1981 F(ICMP6_RR_FLAGS_FORCEAPPLY, "A"), 1982 F(ICMP6_RR_FLAGS_SPECSITE, "S"), 1983 F(ICMP6_RR_FLAGS_PREVDONE, "P")); 1984 } 1985 ND_PRINT("seg=%u,", GET_U_1(rr6->rr_segnum)); 1986 ND_PRINT("maxdelay=%u", GET_BE_U_2(rr6->rr_maxdelay)); 1987 if (GET_BE_U_4(rr6->rr_reserved)) 1988 ND_PRINT("rsvd=0x%x", GET_BE_U_4(rr6->rr_reserved)); 1989 /*[*/ 1990 ND_PRINT("]"); 1991 #undef F 1992 } 1993 1994 if (GET_U_1(rr6->rr_code) == ICMP6_ROUTER_RENUMBERING_COMMAND) { 1995 match = (const struct rr_pco_match *)cp; 1996 cp = (const char *)(match + 1); 1997 1998 ND_TCHECK_16(match->rpm_prefix); 1999 2000 if (ndo->ndo_vflag > 1) 2001 ND_PRINT("\n\t"); 2002 else 2003 ND_PRINT(" "); 2004 ND_PRINT("match("); /*)*/ 2005 switch (GET_U_1(match->rpm_code)) { 2006 case RPM_PCO_ADD: ND_PRINT("add"); break; 2007 case RPM_PCO_CHANGE: ND_PRINT("change"); break; 2008 case RPM_PCO_SETGLOBAL: ND_PRINT("setglobal"); break; 2009 default: ND_PRINT("#%u", 2010 GET_U_1(match->rpm_code)); break; 2011 } 2012 2013 if (ndo->ndo_vflag) { 2014 ND_PRINT(",ord=%u", GET_U_1(match->rpm_ordinal)); 2015 ND_PRINT(",min=%u", GET_U_1(match->rpm_minlen)); 2016 ND_PRINT(",max=%u", GET_U_1(match->rpm_maxlen)); 2017 } 2018 if (addrtostr6(match->rpm_prefix, hbuf, sizeof(hbuf))) 2019 ND_PRINT(",%s/%u", hbuf, GET_U_1(match->rpm_matchlen)); 2020 else 2021 ND_PRINT(",?/%u", GET_U_1(match->rpm_matchlen)); 2022 /*(*/ 2023 ND_PRINT(")"); 2024 2025 n = GET_U_1(match->rpm_len) - 3; 2026 if (n % 4) 2027 goto trunc; 2028 n /= 4; 2029 while (n-- > 0) { 2030 use = (const struct rr_pco_use *)cp; 2031 cp = (const char *)(use + 1); 2032 2033 ND_TCHECK_16(use->rpu_prefix); 2034 2035 if (ndo->ndo_vflag > 1) 2036 ND_PRINT("\n\t"); 2037 else 2038 ND_PRINT(" "); 2039 ND_PRINT("use("); /*)*/ 2040 if (GET_U_1(use->rpu_flags)) { 2041 #define F(x, y) (GET_U_1(use->rpu_flags) & (x) ? (y) : "") 2042 ND_PRINT("%s%s,", 2043 F(ICMP6_RR_PCOUSE_FLAGS_DECRVLTIME, "V"), 2044 F(ICMP6_RR_PCOUSE_FLAGS_DECRPLTIME, "P")); 2045 #undef F 2046 } 2047 if (ndo->ndo_vflag) { 2048 ND_PRINT("mask=0x%x,", 2049 GET_U_1(use->rpu_ramask)); 2050 ND_PRINT("raflags=0x%x,", 2051 GET_U_1(use->rpu_raflags)); 2052 if (GET_BE_U_4(use->rpu_vltime) == 0xffffffff) 2053 ND_PRINT("vltime=infty,"); 2054 else 2055 ND_PRINT("vltime=%u,", 2056 GET_BE_U_4(use->rpu_vltime)); 2057 if (GET_BE_U_4(use->rpu_pltime) == 0xffffffff) 2058 ND_PRINT("pltime=infty,"); 2059 else 2060 ND_PRINT("pltime=%u,", 2061 GET_BE_U_4(use->rpu_pltime)); 2062 } 2063 if (addrtostr6(use->rpu_prefix, hbuf, sizeof(hbuf))) 2064 ND_PRINT("%s/%u/%u", hbuf, 2065 GET_U_1(use->rpu_uselen), 2066 GET_U_1(use->rpu_keeplen)); 2067 else 2068 ND_PRINT("?/%u/%u", GET_U_1(use->rpu_uselen), 2069 GET_U_1(use->rpu_keeplen)); 2070 /*(*/ 2071 ND_PRINT(")"); 2072 } 2073 } 2074 2075 return; 2076 2077 trunc: 2078 nd_print_trunc(ndo); 2079 } 2080