1e961704aSDavid Malone /* $KAME: traceroute6.c,v 1.68 2004/01/25 11:16:12 suz Exp $ */ 2de68a0daSKris Kennaway 37d56d374SYoshinobu Inoue /* 47d56d374SYoshinobu Inoue * Copyright (C) 1995, 1996, 1997, and 1998 WIDE Project. 57d56d374SYoshinobu Inoue * All rights reserved. 67d56d374SYoshinobu Inoue * 77d56d374SYoshinobu Inoue * Redistribution and use in source and binary forms, with or without 87d56d374SYoshinobu Inoue * modification, are permitted provided that the following conditions 97d56d374SYoshinobu Inoue * are met: 107d56d374SYoshinobu Inoue * 1. Redistributions of source code must retain the above copyright 117d56d374SYoshinobu Inoue * notice, this list of conditions and the following disclaimer. 127d56d374SYoshinobu Inoue * 2. Redistributions in binary form must reproduce the above copyright 137d56d374SYoshinobu Inoue * notice, this list of conditions and the following disclaimer in the 147d56d374SYoshinobu Inoue * documentation and/or other materials provided with the distribution. 157d56d374SYoshinobu Inoue * 3. Neither the name of the project nor the names of its contributors 167d56d374SYoshinobu Inoue * may be used to endorse or promote products derived from this software 177d56d374SYoshinobu Inoue * without specific prior written permission. 187d56d374SYoshinobu Inoue * 197d56d374SYoshinobu Inoue * THIS SOFTWARE IS PROVIDED BY THE PROJECT AND CONTRIBUTORS ``AS IS'' AND 207d56d374SYoshinobu Inoue * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 217d56d374SYoshinobu Inoue * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 227d56d374SYoshinobu Inoue * ARE DISCLAIMED. IN NO EVENT SHALL THE PROJECT OR CONTRIBUTORS BE LIABLE 237d56d374SYoshinobu Inoue * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 247d56d374SYoshinobu Inoue * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 257d56d374SYoshinobu Inoue * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 267d56d374SYoshinobu Inoue * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 277d56d374SYoshinobu Inoue * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 287d56d374SYoshinobu Inoue * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 297d56d374SYoshinobu Inoue * SUCH DAMAGE. 307d56d374SYoshinobu Inoue */ 317d56d374SYoshinobu Inoue 327d56d374SYoshinobu Inoue /*- 337d56d374SYoshinobu Inoue * Copyright (c) 1990, 1993 347d56d374SYoshinobu Inoue * The Regents of the University of California. All rights reserved. 357d56d374SYoshinobu Inoue * 367d56d374SYoshinobu Inoue * This code is derived from software contributed to Berkeley by 377d56d374SYoshinobu Inoue * Van Jacobson. 387d56d374SYoshinobu Inoue * 397d56d374SYoshinobu Inoue * Redistribution and use in source and binary forms, with or without 407d56d374SYoshinobu Inoue * modification, are permitted provided that the following conditions 417d56d374SYoshinobu Inoue * are met: 427d56d374SYoshinobu Inoue * 1. Redistributions of source code must retain the above copyright 437d56d374SYoshinobu Inoue * notice, this list of conditions and the following disclaimer. 447d56d374SYoshinobu Inoue * 2. Redistributions in binary form must reproduce the above copyright 457d56d374SYoshinobu Inoue * notice, this list of conditions and the following disclaimer in the 467d56d374SYoshinobu Inoue * documentation and/or other materials provided with the distribution. 477d56d374SYoshinobu Inoue * 4. Neither the name of the University nor the names of its contributors 487d56d374SYoshinobu Inoue * may be used to endorse or promote products derived from this software 497d56d374SYoshinobu Inoue * without specific prior written permission. 507d56d374SYoshinobu Inoue * 517d56d374SYoshinobu Inoue * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND 527d56d374SYoshinobu Inoue * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 537d56d374SYoshinobu Inoue * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 547d56d374SYoshinobu Inoue * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE 557d56d374SYoshinobu Inoue * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 567d56d374SYoshinobu Inoue * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 577d56d374SYoshinobu Inoue * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 587d56d374SYoshinobu Inoue * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 597d56d374SYoshinobu Inoue * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 607d56d374SYoshinobu Inoue * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 617d56d374SYoshinobu Inoue * SUCH DAMAGE. 627d56d374SYoshinobu Inoue */ 637d56d374SYoshinobu Inoue 647d56d374SYoshinobu Inoue #ifndef lint 65f42640a3SUlrich Spörlein static const char copyright[] = 667d56d374SYoshinobu Inoue "@(#) Copyright (c) 1990, 1993\n\ 677d56d374SYoshinobu Inoue The Regents of the University of California. All rights reserved.\n"; 687d56d374SYoshinobu Inoue #endif /* not lint */ 697d56d374SYoshinobu Inoue 707d56d374SYoshinobu Inoue #ifndef lint 71de68a0daSKris Kennaway #if 0 727d56d374SYoshinobu Inoue static char sccsid[] = "@(#)traceroute.c 8.1 (Berkeley) 6/6/93"; 73de68a0daSKris Kennaway #endif 74de68a0daSKris Kennaway static const char rcsid[] = 75de68a0daSKris Kennaway "$FreeBSD$"; 767d56d374SYoshinobu Inoue #endif /* not lint */ 777d56d374SYoshinobu Inoue 787d56d374SYoshinobu Inoue /* 797d56d374SYoshinobu Inoue * traceroute host - trace the route ip packets follow going to "host". 807d56d374SYoshinobu Inoue * 817d56d374SYoshinobu Inoue * Attempt to trace the route an ip packet would follow to some 827d56d374SYoshinobu Inoue * internet host. We find out intermediate hops by launching probe 837d56d374SYoshinobu Inoue * packets with a small ttl (time to live) then listening for an 847d56d374SYoshinobu Inoue * icmp "time exceeded" reply from a gateway. We start our probes 857d56d374SYoshinobu Inoue * with a ttl of one and increase by one until we get an icmp "port 867d56d374SYoshinobu Inoue * unreachable" (which means we got to "host") or hit a max (which 877d56d374SYoshinobu Inoue * defaults to 30 hops & can be changed with the -m flag). Three 887d56d374SYoshinobu Inoue * probes (change with -q flag) are sent at each ttl setting and a 897d56d374SYoshinobu Inoue * line is printed showing the ttl, address of the gateway and 907d56d374SYoshinobu Inoue * round trip time of each probe. If the probe answers come from 917d56d374SYoshinobu Inoue * different gateways, the address of each responding system will 927d56d374SYoshinobu Inoue * be printed. If there is no response within a 5 sec. timeout 937d56d374SYoshinobu Inoue * interval (changed with the -w flag), a "*" is printed for that 947d56d374SYoshinobu Inoue * probe. 957d56d374SYoshinobu Inoue * 967d56d374SYoshinobu Inoue * Probe packets are UDP format. We don't want the destination 977d56d374SYoshinobu Inoue * host to process them so the destination port is set to an 987d56d374SYoshinobu Inoue * unlikely value (if some clod on the destination is using that 997d56d374SYoshinobu Inoue * value, it can be changed with the -p flag). 1007d56d374SYoshinobu Inoue * 1017d56d374SYoshinobu Inoue * A sample use might be: 1027d56d374SYoshinobu Inoue * 1037d56d374SYoshinobu Inoue * [yak 71]% traceroute nis.nsf.net. 1047d56d374SYoshinobu Inoue * traceroute to nis.nsf.net (35.1.1.48), 30 hops max, 56 byte packet 1057d56d374SYoshinobu Inoue * 1 helios.ee.lbl.gov (128.3.112.1) 19 ms 19 ms 0 ms 1067d56d374SYoshinobu Inoue * 2 lilac-dmc.Berkeley.EDU (128.32.216.1) 39 ms 39 ms 19 ms 1077d56d374SYoshinobu Inoue * 3 lilac-dmc.Berkeley.EDU (128.32.216.1) 39 ms 39 ms 19 ms 1087d56d374SYoshinobu Inoue * 4 ccngw-ner-cc.Berkeley.EDU (128.32.136.23) 39 ms 40 ms 39 ms 1097d56d374SYoshinobu Inoue * 5 ccn-nerif22.Berkeley.EDU (128.32.168.22) 39 ms 39 ms 39 ms 1107d56d374SYoshinobu Inoue * 6 128.32.197.4 (128.32.197.4) 40 ms 59 ms 59 ms 1117d56d374SYoshinobu Inoue * 7 131.119.2.5 (131.119.2.5) 59 ms 59 ms 59 ms 1127d56d374SYoshinobu Inoue * 8 129.140.70.13 (129.140.70.13) 99 ms 99 ms 80 ms 1137d56d374SYoshinobu Inoue * 9 129.140.71.6 (129.140.71.6) 139 ms 239 ms 319 ms 1147d56d374SYoshinobu Inoue * 10 129.140.81.7 (129.140.81.7) 220 ms 199 ms 199 ms 1157d56d374SYoshinobu Inoue * 11 nic.merit.edu (35.1.1.48) 239 ms 239 ms 239 ms 1167d56d374SYoshinobu Inoue * 1177d56d374SYoshinobu Inoue * Note that lines 2 & 3 are the same. This is due to a buggy 1187d56d374SYoshinobu Inoue * kernel on the 2nd hop system -- lbl-csam.arpa -- that forwards 1197d56d374SYoshinobu Inoue * packets with a zero ttl. 1207d56d374SYoshinobu Inoue * 1217d56d374SYoshinobu Inoue * A more interesting example is: 1227d56d374SYoshinobu Inoue * 1237d56d374SYoshinobu Inoue * [yak 72]% traceroute allspice.lcs.mit.edu. 1247d56d374SYoshinobu Inoue * traceroute to allspice.lcs.mit.edu (18.26.0.115), 30 hops max 1257d56d374SYoshinobu Inoue * 1 helios.ee.lbl.gov (128.3.112.1) 0 ms 0 ms 0 ms 1267d56d374SYoshinobu Inoue * 2 lilac-dmc.Berkeley.EDU (128.32.216.1) 19 ms 19 ms 19 ms 1277d56d374SYoshinobu Inoue * 3 lilac-dmc.Berkeley.EDU (128.32.216.1) 39 ms 19 ms 19 ms 1287d56d374SYoshinobu Inoue * 4 ccngw-ner-cc.Berkeley.EDU (128.32.136.23) 19 ms 39 ms 39 ms 1297d56d374SYoshinobu Inoue * 5 ccn-nerif22.Berkeley.EDU (128.32.168.22) 20 ms 39 ms 39 ms 1307d56d374SYoshinobu Inoue * 6 128.32.197.4 (128.32.197.4) 59 ms 119 ms 39 ms 1317d56d374SYoshinobu Inoue * 7 131.119.2.5 (131.119.2.5) 59 ms 59 ms 39 ms 1327d56d374SYoshinobu Inoue * 8 129.140.70.13 (129.140.70.13) 80 ms 79 ms 99 ms 1337d56d374SYoshinobu Inoue * 9 129.140.71.6 (129.140.71.6) 139 ms 139 ms 159 ms 1347d56d374SYoshinobu Inoue * 10 129.140.81.7 (129.140.81.7) 199 ms 180 ms 300 ms 1357d56d374SYoshinobu Inoue * 11 129.140.72.17 (129.140.72.17) 300 ms 239 ms 239 ms 1367d56d374SYoshinobu Inoue * 12 * * * 1377d56d374SYoshinobu Inoue * 13 128.121.54.72 (128.121.54.72) 259 ms 499 ms 279 ms 1387d56d374SYoshinobu Inoue * 14 * * * 1397d56d374SYoshinobu Inoue * 15 * * * 1407d56d374SYoshinobu Inoue * 16 * * * 1417d56d374SYoshinobu Inoue * 17 * * * 1427d56d374SYoshinobu Inoue * 18 ALLSPICE.LCS.MIT.EDU (18.26.0.115) 339 ms 279 ms 279 ms 1437d56d374SYoshinobu Inoue * 1447d56d374SYoshinobu Inoue * (I start to see why I'm having so much trouble with mail to 1457d56d374SYoshinobu Inoue * MIT.) Note that the gateways 12, 14, 15, 16 & 17 hops away 1467d56d374SYoshinobu Inoue * either don't send ICMP "time exceeded" messages or send them 1477d56d374SYoshinobu Inoue * with a ttl too small to reach us. 14 - 17 are running the 1487d56d374SYoshinobu Inoue * MIT C Gateway code that doesn't send "time exceeded"s. God 1497d56d374SYoshinobu Inoue * only knows what's going on with 12. 1507d56d374SYoshinobu Inoue * 1517d56d374SYoshinobu Inoue * The silent gateway 12 in the above may be the result of a bug in 1527d56d374SYoshinobu Inoue * the 4.[23]BSD network code (and its derivatives): 4.x (x <= 3) 1537d56d374SYoshinobu Inoue * sends an unreachable message using whatever ttl remains in the 1547d56d374SYoshinobu Inoue * original datagram. Since, for gateways, the remaining ttl is 1557d56d374SYoshinobu Inoue * zero, the icmp "time exceeded" is guaranteed to not make it back 1567d56d374SYoshinobu Inoue * to us. The behavior of this bug is slightly more interesting 1577d56d374SYoshinobu Inoue * when it appears on the destination system: 1587d56d374SYoshinobu Inoue * 1597d56d374SYoshinobu Inoue * 1 helios.ee.lbl.gov (128.3.112.1) 0 ms 0 ms 0 ms 1607d56d374SYoshinobu Inoue * 2 lilac-dmc.Berkeley.EDU (128.32.216.1) 39 ms 19 ms 39 ms 1617d56d374SYoshinobu Inoue * 3 lilac-dmc.Berkeley.EDU (128.32.216.1) 19 ms 39 ms 19 ms 1627d56d374SYoshinobu Inoue * 4 ccngw-ner-cc.Berkeley.EDU (128.32.136.23) 39 ms 40 ms 19 ms 1637d56d374SYoshinobu Inoue * 5 ccn-nerif35.Berkeley.EDU (128.32.168.35) 39 ms 39 ms 39 ms 1647d56d374SYoshinobu Inoue * 6 csgw.Berkeley.EDU (128.32.133.254) 39 ms 59 ms 39 ms 1657d56d374SYoshinobu Inoue * 7 * * * 1667d56d374SYoshinobu Inoue * 8 * * * 1677d56d374SYoshinobu Inoue * 9 * * * 1687d56d374SYoshinobu Inoue * 10 * * * 1697d56d374SYoshinobu Inoue * 11 * * * 1707d56d374SYoshinobu Inoue * 12 * * * 1717d56d374SYoshinobu Inoue * 13 rip.Berkeley.EDU (128.32.131.22) 59 ms ! 39 ms ! 39 ms ! 1727d56d374SYoshinobu Inoue * 1737d56d374SYoshinobu Inoue * Notice that there are 12 "gateways" (13 is the final 1747d56d374SYoshinobu Inoue * destination) and exactly the last half of them are "missing". 1757d56d374SYoshinobu Inoue * What's really happening is that rip (a Sun-3 running Sun OS3.5) 1767d56d374SYoshinobu Inoue * is using the ttl from our arriving datagram as the ttl in its 1777d56d374SYoshinobu Inoue * icmp reply. So, the reply will time out on the return path 1787d56d374SYoshinobu Inoue * (with no notice sent to anyone since icmp's aren't sent for 1797d56d374SYoshinobu Inoue * icmp's) until we probe with a ttl that's at least twice the path 1807d56d374SYoshinobu Inoue * length. I.e., rip is really only 7 hops away. A reply that 1817d56d374SYoshinobu Inoue * returns with a ttl of 1 is a clue this problem exists. 1827d56d374SYoshinobu Inoue * Traceroute prints a "!" after the time if the ttl is <= 1. 1837d56d374SYoshinobu Inoue * Since vendors ship a lot of obsolete (DEC's Ultrix, Sun 3.x) or 1847d56d374SYoshinobu Inoue * non-standard (HPUX) software, expect to see this problem 1857d56d374SYoshinobu Inoue * frequently and/or take care picking the target host of your 1867d56d374SYoshinobu Inoue * probes. 1877d56d374SYoshinobu Inoue * 1887d56d374SYoshinobu Inoue * Other possible annotations after the time are !H, !N, !P (got a host, 1897d56d374SYoshinobu Inoue * network or protocol unreachable, respectively), !S or !F (source 1907d56d374SYoshinobu Inoue * route failed or fragmentation needed -- neither of these should 1917d56d374SYoshinobu Inoue * ever occur and the associated gateway is busted if you see one). If 1927d56d374SYoshinobu Inoue * almost all the probes result in some kind of unreachable, traceroute 1937d56d374SYoshinobu Inoue * will give up and exit. 1947d56d374SYoshinobu Inoue * 1957d56d374SYoshinobu Inoue * Notes 1967d56d374SYoshinobu Inoue * ----- 1977d56d374SYoshinobu Inoue * This program must be run by root or be setuid. (I suggest that 1987d56d374SYoshinobu Inoue * you *don't* make it setuid -- casual use could result in a lot 1997d56d374SYoshinobu Inoue * of unnecessary traffic on our poor, congested nets.) 2007d56d374SYoshinobu Inoue * 2017d56d374SYoshinobu Inoue * This program requires a kernel mod that does not appear in any 2027d56d374SYoshinobu Inoue * system available from Berkeley: A raw ip socket using proto 2037d56d374SYoshinobu Inoue * IPPROTO_RAW must interpret the data sent as an ip datagram (as 2049d5abbddSJens Schweikhardt * opposed to data to be wrapped in an ip datagram). See the README 2057d56d374SYoshinobu Inoue * file that came with the source to this program for a description 2067d56d374SYoshinobu Inoue * of the mods I made to /sys/netinet/raw_ip.c. Your mileage may 2077d56d374SYoshinobu Inoue * vary. But, again, ANY 4.x (x < 4) BSD KERNEL WILL HAVE TO BE 2087d56d374SYoshinobu Inoue * MODIFIED TO RUN THIS PROGRAM. 2097d56d374SYoshinobu Inoue * 2107d56d374SYoshinobu Inoue * The udp port usage may appear bizarre (well, ok, it is bizarre). 2117d56d374SYoshinobu Inoue * The problem is that an icmp message only contains 8 bytes of 2127d56d374SYoshinobu Inoue * data from the original datagram. 8 bytes is the size of a udp 2137d56d374SYoshinobu Inoue * header so, if we want to associate replies with the original 2147d56d374SYoshinobu Inoue * datagram, the necessary information must be encoded into the 2157d56d374SYoshinobu Inoue * udp header (the ip id could be used but there's no way to 2167d56d374SYoshinobu Inoue * interlock with the kernel's assignment of ip id's and, anyway, 2177d56d374SYoshinobu Inoue * it would have taken a lot more kernel hacking to allow this 2187d56d374SYoshinobu Inoue * code to set the ip id). So, to allow two or more users to 2197d56d374SYoshinobu Inoue * use traceroute simultaneously, we use this task's pid as the 2207d56d374SYoshinobu Inoue * source port (the high bit is set to move the port number out 2217d56d374SYoshinobu Inoue * of the "likely" range). To keep track of which probe is being 2227d56d374SYoshinobu Inoue * replied to (so times and/or hop counts don't get confused by a 2237d56d374SYoshinobu Inoue * reply that was delayed in transit), we increment the destination 2247d56d374SYoshinobu Inoue * port number before each probe. 2257d56d374SYoshinobu Inoue * 2267d56d374SYoshinobu Inoue * Don't use this as a coding example. I was trying to find a 2277d56d374SYoshinobu Inoue * routing problem and this code sort-of popped out after 48 hours 2287d56d374SYoshinobu Inoue * without sleep. I was amazed it ever compiled, much less ran. 2297d56d374SYoshinobu Inoue * 2307d56d374SYoshinobu Inoue * I stole the idea for this program from Steve Deering. Since 2317d56d374SYoshinobu Inoue * the first release, I've learned that had I attended the right 2327d56d374SYoshinobu Inoue * IETF working group meetings, I also could have stolen it from Guy 2337d56d374SYoshinobu Inoue * Almes or Matt Mathis. I don't know (or care) who came up with 2347d56d374SYoshinobu Inoue * the idea first. I envy the originators' perspicacity and I'm 2357d56d374SYoshinobu Inoue * glad they didn't keep the idea a secret. 2367d56d374SYoshinobu Inoue * 2377d56d374SYoshinobu Inoue * Tim Seaver, Ken Adelman and C. Philip Wood provided bug fixes and/or 2387d56d374SYoshinobu Inoue * enhancements to the original distribution. 2397d56d374SYoshinobu Inoue * 2407d56d374SYoshinobu Inoue * I've hacked up a round-trip-route version of this that works by 2417d56d374SYoshinobu Inoue * sending a loose-source-routed udp datagram through the destination 2427d56d374SYoshinobu Inoue * back to yourself. Unfortunately, SO many gateways botch source 2437d56d374SYoshinobu Inoue * routing, the thing is almost worthless. Maybe one day... 2447d56d374SYoshinobu Inoue * 2457d56d374SYoshinobu Inoue * -- Van Jacobson (van@helios.ee.lbl.gov) 2467d56d374SYoshinobu Inoue * Tue Dec 20 03:50:13 PST 1988 2477d56d374SYoshinobu Inoue */ 2487d56d374SYoshinobu Inoue 2497d56d374SYoshinobu Inoue #include <sys/param.h> 2507d56d374SYoshinobu Inoue #include <sys/time.h> 2517d56d374SYoshinobu Inoue #include <sys/socket.h> 2527d56d374SYoshinobu Inoue #include <sys/uio.h> 2537d56d374SYoshinobu Inoue #include <sys/file.h> 2547d56d374SYoshinobu Inoue #include <sys/ioctl.h> 25584a1a4cfSHajimu UMEMOTO #include <sys/sysctl.h> 2567d56d374SYoshinobu Inoue 2577d56d374SYoshinobu Inoue #include <netinet/in.h> 2587d56d374SYoshinobu Inoue 2597d56d374SYoshinobu Inoue #include <arpa/inet.h> 2607d56d374SYoshinobu Inoue 2617d56d374SYoshinobu Inoue #include <netdb.h> 2627d56d374SYoshinobu Inoue #include <stdio.h> 2637d56d374SYoshinobu Inoue #include <err.h> 2642a1c5efaSKris Kennaway #ifdef HAVE_POLL 2652a1c5efaSKris Kennaway #include <poll.h> 2662a1c5efaSKris Kennaway #endif 2677d56d374SYoshinobu Inoue #include <errno.h> 2687d56d374SYoshinobu Inoue #include <stdlib.h> 2697d56d374SYoshinobu Inoue #include <string.h> 2707d56d374SYoshinobu Inoue #include <unistd.h> 2717d56d374SYoshinobu Inoue 2727d56d374SYoshinobu Inoue #include <netinet/ip6.h> 2737d56d374SYoshinobu Inoue #include <netinet/icmp6.h> 2747d56d374SYoshinobu Inoue #include <netinet/udp.h> 2757d56d374SYoshinobu Inoue 2767d56d374SYoshinobu Inoue #ifdef IPSEC 2777d56d374SYoshinobu Inoue #include <net/route.h> 2788409aedfSGeorge V. Neville-Neil #include <netipsec/ipsec.h> 2797d56d374SYoshinobu Inoue #endif 2807d56d374SYoshinobu Inoue 281d429d720SHajimu UMEMOTO #include "as.h" 282d429d720SHajimu UMEMOTO 2837d56d374SYoshinobu Inoue #define DUMMY_PORT 10010 2847d56d374SYoshinobu Inoue 2857d56d374SYoshinobu Inoue #define MAXPACKET 65535 /* max ip packet size */ 2867d56d374SYoshinobu Inoue 287de68a0daSKris Kennaway #ifndef HAVE_GETIPNODEBYNAME 288de68a0daSKris Kennaway #define getipnodebyname(x, y, z, u) gethostbyname2((x), (y)) 289de68a0daSKris Kennaway #define freehostent(x) 290de68a0daSKris Kennaway #endif 291de68a0daSKris Kennaway 2927d56d374SYoshinobu Inoue /* 2937d56d374SYoshinobu Inoue * format of a (udp) probe packet. 2947d56d374SYoshinobu Inoue */ 29584a1a4cfSHajimu UMEMOTO struct tv32 { 29684a1a4cfSHajimu UMEMOTO u_int32_t tv32_sec; 29784a1a4cfSHajimu UMEMOTO u_int32_t tv32_usec; 29884a1a4cfSHajimu UMEMOTO }; 2997d56d374SYoshinobu Inoue 300e961704aSDavid Malone struct opacket { 301e961704aSDavid Malone u_char seq; /* sequence number of this packet */ 302e961704aSDavid Malone u_char hops; /* hop limit of the packet */ 303e961704aSDavid Malone u_char pad[2]; 304e961704aSDavid Malone struct tv32 tv; /* time packet left */ 305e961704aSDavid Malone } __attribute__((__packed__)); 306e961704aSDavid Malone 3077d56d374SYoshinobu Inoue u_char packet[512]; /* last inbound (icmp) packet */ 3087d56d374SYoshinobu Inoue struct opacket *outpacket; /* last output (udp) packet */ 3097d56d374SYoshinobu Inoue 310784bddbcSKevin Lo int main(int, char *[]); 311784bddbcSKevin Lo int wait_for_reply(int, struct msghdr *); 312de68a0daSKris Kennaway #ifdef IPSEC 313de68a0daSKris Kennaway #ifdef IPSEC_POLICY_IPSEC 314784bddbcSKevin Lo int setpolicy(int so, char *policy); 315de68a0daSKris Kennaway #endif 316de68a0daSKris Kennaway #endif 317784bddbcSKevin Lo void send_probe(int, u_long); 318d7b63fafSDavid Malone void *get_uphdr(struct ip6_hdr *, u_char *); 319784bddbcSKevin Lo int get_hoplim(struct msghdr *); 320784bddbcSKevin Lo double deltaT(struct timeval *, struct timeval *); 321f42640a3SUlrich Spörlein const char *pr_type(int); 322784bddbcSKevin Lo int packet_ok(struct msghdr *, int, int); 323784bddbcSKevin Lo void print(struct msghdr *, int); 324784bddbcSKevin Lo const char *inetname(struct sockaddr *); 325784bddbcSKevin Lo void usage(void); 3267d56d374SYoshinobu Inoue 3277d56d374SYoshinobu Inoue int rcvsock; /* receive (icmp) socket file descriptor */ 3287d56d374SYoshinobu Inoue int sndsock; /* send (udp) socket file descriptor */ 3297d56d374SYoshinobu Inoue 3307d56d374SYoshinobu Inoue struct msghdr rcvmhdr; 3317d56d374SYoshinobu Inoue struct iovec rcviov[2]; 3327d56d374SYoshinobu Inoue int rcvhlim; 3337d56d374SYoshinobu Inoue struct in6_pktinfo *rcvpktinfo; 3347d56d374SYoshinobu Inoue 3357d56d374SYoshinobu Inoue struct sockaddr_in6 Src, Dst, Rcv; 33684a1a4cfSHajimu UMEMOTO u_long datalen; /* How much data */ 33784a1a4cfSHajimu UMEMOTO #define ICMP6ECHOLEN 8 338de68a0daSKris Kennaway /* XXX: 2064 = 127(max hops in type 0 rthdr) * sizeof(ip6_hdr) + 16(margin) */ 339de68a0daSKris Kennaway char rtbuf[2064]; 340de68a0daSKris Kennaway #ifdef USE_RFC2292BIS 341de68a0daSKris Kennaway struct ip6_rthdr *rth; 342de68a0daSKris Kennaway #endif 3437d56d374SYoshinobu Inoue struct cmsghdr *cmsg; 3447d56d374SYoshinobu Inoue 345ac97203fSPedro F. Giffuni char *source = NULL; 3467d56d374SYoshinobu Inoue char *hostname; 3477d56d374SYoshinobu Inoue 34884a1a4cfSHajimu UMEMOTO u_long nprobes = 3; 34984a1a4cfSHajimu UMEMOTO u_long first_hop = 1; 35084a1a4cfSHajimu UMEMOTO u_long max_hops = 30; 35184a1a4cfSHajimu UMEMOTO u_int16_t srcport; 35284a1a4cfSHajimu UMEMOTO u_int16_t port = 32768+666; /* start udp dest port # for probe packets */ 35384a1a4cfSHajimu UMEMOTO u_int16_t ident; 3547d56d374SYoshinobu Inoue int options; /* socket options */ 3557d56d374SYoshinobu Inoue int verbose; 3567d56d374SYoshinobu Inoue int waittime = 5; /* time to wait for response (in seconds) */ 3577d56d374SYoshinobu Inoue int nflag; /* print addresses numerically */ 358d7b63fafSDavid Malone int useproto = IPPROTO_UDP; /* protocol to use to send packet */ 3597d56d374SYoshinobu Inoue int lflag; /* print both numerical address & hostname */ 360d429d720SHajimu UMEMOTO int as_path; /* print as numbers for each hop */ 361d429d720SHajimu UMEMOTO char *as_server = NULL; 362d429d720SHajimu UMEMOTO void *asn; 3637d56d374SYoshinobu Inoue 3647d56d374SYoshinobu Inoue int 3657d56d374SYoshinobu Inoue main(argc, argv) 3667d56d374SYoshinobu Inoue int argc; 3677d56d374SYoshinobu Inoue char *argv[]; 3687d56d374SYoshinobu Inoue { 36984a1a4cfSHajimu UMEMOTO int mib[4] = { CTL_NET, PF_INET6, IPPROTO_IPV6, IPV6CTL_DEFHLIM }; 370e961704aSDavid Malone char hbuf[NI_MAXHOST], src0[NI_MAXHOST], *ep; 371f42640a3SUlrich Spörlein int ch, i, on = 1, seq, rcvcmsglen, error; 372e961704aSDavid Malone struct addrinfo hints, *res; 373e961704aSDavid Malone static u_char *rcvcmsgbuf; 374e961704aSDavid Malone u_long probe, hops, lport; 375e961704aSDavid Malone struct hostent *hp; 376f42640a3SUlrich Spörlein size_t size, minlen; 37719c7ed84SKevin Lo uid_t uid; 3787d56d374SYoshinobu Inoue 37953c9088fSYoshinobu Inoue /* 38053c9088fSYoshinobu Inoue * Receive ICMP 38153c9088fSYoshinobu Inoue */ 38253c9088fSYoshinobu Inoue if ((rcvsock = socket(AF_INET6, SOCK_RAW, IPPROTO_ICMPV6)) < 0) { 383de68a0daSKris Kennaway perror("socket(ICMPv6)"); 38453c9088fSYoshinobu Inoue exit(5); 38553c9088fSYoshinobu Inoue } 386de68a0daSKris Kennaway 38784a1a4cfSHajimu UMEMOTO size = sizeof(i); 38884a1a4cfSHajimu UMEMOTO (void) sysctl(mib, sizeof(mib)/sizeof(mib[0]), &i, &size, NULL, 0); 38984a1a4cfSHajimu UMEMOTO max_hops = i; 39084a1a4cfSHajimu UMEMOTO 391de68a0daSKris Kennaway /* specify to tell receiving interface */ 392de68a0daSKris Kennaway #ifdef IPV6_RECVPKTINFO 393de68a0daSKris Kennaway if (setsockopt(rcvsock, IPPROTO_IPV6, IPV6_RECVPKTINFO, &on, 394de68a0daSKris Kennaway sizeof(on)) < 0) 395de68a0daSKris Kennaway err(1, "setsockopt(IPV6_RECVPKTINFO)"); 396de68a0daSKris Kennaway #else /* old adv. API */ 397de68a0daSKris Kennaway if (setsockopt(rcvsock, IPPROTO_IPV6, IPV6_PKTINFO, &on, 398de68a0daSKris Kennaway sizeof(on)) < 0) 399de68a0daSKris Kennaway err(1, "setsockopt(IPV6_PKTINFO)"); 400de68a0daSKris Kennaway #endif 401de68a0daSKris Kennaway 402de68a0daSKris Kennaway /* specify to tell value of hoplimit field of received IP6 hdr */ 403de68a0daSKris Kennaway #ifdef IPV6_RECVHOPLIMIT 404de68a0daSKris Kennaway if (setsockopt(rcvsock, IPPROTO_IPV6, IPV6_RECVHOPLIMIT, &on, 405de68a0daSKris Kennaway sizeof(on)) < 0) 406de68a0daSKris Kennaway err(1, "setsockopt(IPV6_RECVHOPLIMIT)"); 407de68a0daSKris Kennaway #else /* old adv. API */ 408de68a0daSKris Kennaway if (setsockopt(rcvsock, IPPROTO_IPV6, IPV6_HOPLIMIT, &on, 409de68a0daSKris Kennaway sizeof(on)) < 0) 410de68a0daSKris Kennaway err(1, "setsockopt(IPV6_HOPLIMIT)"); 411de68a0daSKris Kennaway #endif 412de68a0daSKris Kennaway 4137d56d374SYoshinobu Inoue seq = 0; 4147d56d374SYoshinobu Inoue 415d429d720SHajimu UMEMOTO while ((ch = getopt(argc, argv, "aA:df:g:Ilm:nNp:q:rs:Uvw:")) != -1) 4167d56d374SYoshinobu Inoue switch (ch) { 417d429d720SHajimu UMEMOTO case 'a': 418d429d720SHajimu UMEMOTO as_path = 1; 419d429d720SHajimu UMEMOTO break; 420d429d720SHajimu UMEMOTO case 'A': 421d429d720SHajimu UMEMOTO as_path = 1; 422d429d720SHajimu UMEMOTO as_server = optarg; 423d429d720SHajimu UMEMOTO break; 4247d56d374SYoshinobu Inoue case 'd': 4257d56d374SYoshinobu Inoue options |= SO_DEBUG; 4267d56d374SYoshinobu Inoue break; 427de68a0daSKris Kennaway case 'f': 42833841545SHajimu UMEMOTO ep = NULL; 42984a1a4cfSHajimu UMEMOTO errno = 0; 43033841545SHajimu UMEMOTO first_hop = strtoul(optarg, &ep, 0); 43184a1a4cfSHajimu UMEMOTO if (errno || !*optarg || *ep || first_hop > 255) { 432c449e284SHajimu UMEMOTO fprintf(stderr, 43333841545SHajimu UMEMOTO "traceroute6: invalid min hoplimit.\n"); 43433841545SHajimu UMEMOTO exit(1); 43533841545SHajimu UMEMOTO } 4367d56d374SYoshinobu Inoue break; 4377d56d374SYoshinobu Inoue case 'g': 4387d56d374SYoshinobu Inoue hp = getipnodebyname(optarg, AF_INET6, 0, &h_errno); 4397d56d374SYoshinobu Inoue if (hp == NULL) { 440c449e284SHajimu UMEMOTO fprintf(stderr, 4417d56d374SYoshinobu Inoue "traceroute6: unknown host %s\n", optarg); 4427d56d374SYoshinobu Inoue exit(1); 4437d56d374SYoshinobu Inoue } 444de68a0daSKris Kennaway #ifdef USE_RFC2292BIS 445de68a0daSKris Kennaway if (rth == NULL) { 446de68a0daSKris Kennaway /* 447de68a0daSKris Kennaway * XXX: We can't detect the number of 448de68a0daSKris Kennaway * intermediate nodes yet. 449de68a0daSKris Kennaway */ 450de68a0daSKris Kennaway if ((rth = inet6_rth_init((void *)rtbuf, 451c449e284SHajimu UMEMOTO sizeof(rtbuf), IPV6_RTHDR_TYPE_0, 452de68a0daSKris Kennaway 0)) == NULL) { 453c449e284SHajimu UMEMOTO fprintf(stderr, 454de68a0daSKris Kennaway "inet6_rth_init failed.\n"); 455de68a0daSKris Kennaway exit(1); 456de68a0daSKris Kennaway } 457de68a0daSKris Kennaway } 458de68a0daSKris Kennaway if (inet6_rth_add((void *)rth, 459de68a0daSKris Kennaway (struct in6_addr *)hp->h_addr)) { 460c449e284SHajimu UMEMOTO fprintf(stderr, 461de68a0daSKris Kennaway "inet6_rth_add failed for %s\n", 462de68a0daSKris Kennaway optarg); 463de68a0daSKris Kennaway exit(1); 464de68a0daSKris Kennaway } 465de68a0daSKris Kennaway #else /* old advanced API */ 4667d56d374SYoshinobu Inoue if (cmsg == NULL) 4677d56d374SYoshinobu Inoue cmsg = inet6_rthdr_init(rtbuf, IPV6_RTHDR_TYPE_0); 468c449e284SHajimu UMEMOTO inet6_rthdr_add(cmsg, (struct in6_addr *)hp->h_addr, 469c449e284SHajimu UMEMOTO IPV6_RTHDR_LOOSE); 470de68a0daSKris Kennaway #endif 471de68a0daSKris Kennaway freehostent(hp); 472de68a0daSKris Kennaway break; 47384a1a4cfSHajimu UMEMOTO case 'I': 474d7b63fafSDavid Malone useproto = IPPROTO_ICMPV6; 47584a1a4cfSHajimu UMEMOTO ident = htons(getpid() & 0xffff); /* same as ping6 */ 47684a1a4cfSHajimu UMEMOTO break; 477de68a0daSKris Kennaway case 'l': 478de68a0daSKris Kennaway lflag++; 4797d56d374SYoshinobu Inoue break; 4807d56d374SYoshinobu Inoue case 'm': 48133841545SHajimu UMEMOTO ep = NULL; 48284a1a4cfSHajimu UMEMOTO errno = 0; 48333841545SHajimu UMEMOTO max_hops = strtoul(optarg, &ep, 0); 48484a1a4cfSHajimu UMEMOTO if (errno || !*optarg || *ep || max_hops > 255) { 485c449e284SHajimu UMEMOTO fprintf(stderr, 48633841545SHajimu UMEMOTO "traceroute6: invalid max hoplimit.\n"); 48733841545SHajimu UMEMOTO exit(1); 48833841545SHajimu UMEMOTO } 4897d56d374SYoshinobu Inoue break; 4907d56d374SYoshinobu Inoue case 'n': 4917d56d374SYoshinobu Inoue nflag++; 4927d56d374SYoshinobu Inoue break; 493d7b63fafSDavid Malone case 'N': 494d7b63fafSDavid Malone useproto = IPPROTO_NONE; 495d7b63fafSDavid Malone break; 4967d56d374SYoshinobu Inoue case 'p': 49733841545SHajimu UMEMOTO ep = NULL; 49884a1a4cfSHajimu UMEMOTO errno = 0; 49984a1a4cfSHajimu UMEMOTO lport = strtoul(optarg, &ep, 0); 50084a1a4cfSHajimu UMEMOTO if (errno || !*optarg || *ep) { 50184a1a4cfSHajimu UMEMOTO fprintf(stderr, "traceroute6: invalid port.\n"); 50233841545SHajimu UMEMOTO exit(1); 50333841545SHajimu UMEMOTO } 50484a1a4cfSHajimu UMEMOTO if (lport == 0 || lport != (lport & 0xffff)) { 505c449e284SHajimu UMEMOTO fprintf(stderr, 50684a1a4cfSHajimu UMEMOTO "traceroute6: port out of range.\n"); 5077d56d374SYoshinobu Inoue exit(1); 5087d56d374SYoshinobu Inoue } 50984a1a4cfSHajimu UMEMOTO port = lport & 0xffff; 5107d56d374SYoshinobu Inoue break; 5117d56d374SYoshinobu Inoue case 'q': 51233841545SHajimu UMEMOTO ep = NULL; 51384a1a4cfSHajimu UMEMOTO errno = 0; 51433841545SHajimu UMEMOTO nprobes = strtoul(optarg, &ep, 0); 51584a1a4cfSHajimu UMEMOTO if (errno || !*optarg || *ep) { 516c449e284SHajimu UMEMOTO fprintf(stderr, 51733841545SHajimu UMEMOTO "traceroute6: invalid nprobes.\n"); 51833841545SHajimu UMEMOTO exit(1); 51933841545SHajimu UMEMOTO } 5207d56d374SYoshinobu Inoue if (nprobes < 1) { 521c449e284SHajimu UMEMOTO fprintf(stderr, 5227d56d374SYoshinobu Inoue "traceroute6: nprobes must be >0.\n"); 5237d56d374SYoshinobu Inoue exit(1); 5247d56d374SYoshinobu Inoue } 5257d56d374SYoshinobu Inoue break; 5267d56d374SYoshinobu Inoue case 'r': 5277d56d374SYoshinobu Inoue options |= SO_DONTROUTE; 5287d56d374SYoshinobu Inoue break; 5297d56d374SYoshinobu Inoue case 's': 5307d56d374SYoshinobu Inoue /* 5317d56d374SYoshinobu Inoue * set the ip source address of the outbound 5327d56d374SYoshinobu Inoue * probe (e.g., on a multi-homed host). 5337d56d374SYoshinobu Inoue */ 5347d56d374SYoshinobu Inoue source = optarg; 5357d56d374SYoshinobu Inoue break; 5367d56d374SYoshinobu Inoue case 'v': 5377d56d374SYoshinobu Inoue verbose++; 5387d56d374SYoshinobu Inoue break; 539d7b63fafSDavid Malone case 'U': 540d7b63fafSDavid Malone useproto = IPPROTO_UDP; 541d7b63fafSDavid Malone break; 5427d56d374SYoshinobu Inoue case 'w': 54333841545SHajimu UMEMOTO ep = NULL; 54484a1a4cfSHajimu UMEMOTO errno = 0; 54533841545SHajimu UMEMOTO waittime = strtoul(optarg, &ep, 0); 54684a1a4cfSHajimu UMEMOTO if (errno || !*optarg || *ep) { 547c449e284SHajimu UMEMOTO fprintf(stderr, 54833841545SHajimu UMEMOTO "traceroute6: invalid wait time.\n"); 54933841545SHajimu UMEMOTO exit(1); 55033841545SHajimu UMEMOTO } 551eea319c4SMaxim Konovalov if (waittime < 1) { 552c449e284SHajimu UMEMOTO fprintf(stderr, 553eea319c4SMaxim Konovalov "traceroute6: wait must be >= 1 sec.\n"); 5547d56d374SYoshinobu Inoue exit(1); 5557d56d374SYoshinobu Inoue } 5567d56d374SYoshinobu Inoue break; 5577d56d374SYoshinobu Inoue default: 5587d56d374SYoshinobu Inoue usage(); 5597d56d374SYoshinobu Inoue } 5607d56d374SYoshinobu Inoue argc -= optind; 5617d56d374SYoshinobu Inoue argv += optind; 5627d56d374SYoshinobu Inoue 563d7b63fafSDavid Malone /* 564d7b63fafSDavid Malone * Open socket to send probe packets. 565d7b63fafSDavid Malone */ 566d7b63fafSDavid Malone switch (useproto) { 567d7b63fafSDavid Malone case IPPROTO_ICMPV6: 568d7b63fafSDavid Malone sndsock = rcvsock; 569d7b63fafSDavid Malone break; 570d7b63fafSDavid Malone case IPPROTO_UDP: 571d7b63fafSDavid Malone if ((sndsock = socket(AF_INET6, SOCK_DGRAM, 0)) < 0) { 572d7b63fafSDavid Malone perror("socket(SOCK_DGRAM)"); 573d7b63fafSDavid Malone exit(5); 574d7b63fafSDavid Malone } 575d7b63fafSDavid Malone break; 576d7b63fafSDavid Malone case IPPROTO_NONE: 577d7b63fafSDavid Malone if ((sndsock = socket(AF_INET6, SOCK_RAW, IPPROTO_NONE)) < 0) { 578d7b63fafSDavid Malone perror("socket(SOCK_RAW)"); 579d7b63fafSDavid Malone exit(5); 580d7b63fafSDavid Malone } 581d7b63fafSDavid Malone break; 582d7b63fafSDavid Malone default: 583d7b63fafSDavid Malone fprintf(stderr, "traceroute6: unknown probe protocol %d", 584d7b63fafSDavid Malone useproto); 585d7b63fafSDavid Malone exit(5); 586d7b63fafSDavid Malone } 58784a1a4cfSHajimu UMEMOTO if (max_hops < first_hop) { 58884a1a4cfSHajimu UMEMOTO fprintf(stderr, 58984a1a4cfSHajimu UMEMOTO "traceroute6: max hoplimit must be larger than first hoplimit.\n"); 59084a1a4cfSHajimu UMEMOTO exit(1); 59184a1a4cfSHajimu UMEMOTO } 59284a1a4cfSHajimu UMEMOTO 593d7b63fafSDavid Malone /* revoke privs */ 594d7b63fafSDavid Malone uid = getuid(); 595d7b63fafSDavid Malone if (setresuid(uid, uid, uid) == -1) { 596d7b63fafSDavid Malone perror("setresuid"); 597d7b63fafSDavid Malone exit(1); 598d7b63fafSDavid Malone } 599d7b63fafSDavid Malone 600d7b63fafSDavid Malone 60133841545SHajimu UMEMOTO if (argc < 1 || argc > 2) 6027d56d374SYoshinobu Inoue usage(); 6037d56d374SYoshinobu Inoue 604de68a0daSKris Kennaway #if 1 6057d56d374SYoshinobu Inoue setvbuf(stdout, NULL, _IOLBF, BUFSIZ); 606de68a0daSKris Kennaway #else 607de68a0daSKris Kennaway setlinebuf(stdout); 608de68a0daSKris Kennaway #endif 6097d56d374SYoshinobu Inoue 61039865d64SYoshinobu Inoue memset(&hints, 0, sizeof(hints)); 61139865d64SYoshinobu Inoue hints.ai_family = PF_INET6; 61239865d64SYoshinobu Inoue hints.ai_socktype = SOCK_RAW; 61339865d64SYoshinobu Inoue hints.ai_protocol = IPPROTO_ICMPV6; 61439865d64SYoshinobu Inoue hints.ai_flags = AI_CANONNAME; 61539865d64SYoshinobu Inoue error = getaddrinfo(*argv, NULL, &hints, &res); 61639865d64SYoshinobu Inoue if (error) { 617c449e284SHajimu UMEMOTO fprintf(stderr, 61839865d64SYoshinobu Inoue "traceroute6: %s\n", gai_strerror(error)); 6197d56d374SYoshinobu Inoue exit(1); 6207d56d374SYoshinobu Inoue } 621de68a0daSKris Kennaway if (res->ai_addrlen != sizeof(Dst)) { 622c449e284SHajimu UMEMOTO fprintf(stderr, 623de68a0daSKris Kennaway "traceroute6: size of sockaddr mismatch\n"); 624de68a0daSKris Kennaway exit(1); 625de68a0daSKris Kennaway } 62639865d64SYoshinobu Inoue memcpy(&Dst, res->ai_addr, res->ai_addrlen); 62739865d64SYoshinobu Inoue hostname = res->ai_canonname ? strdup(res->ai_canonname) : *argv; 62833841545SHajimu UMEMOTO if (!hostname) { 629c449e284SHajimu UMEMOTO fprintf(stderr, "traceroute6: not enough core\n"); 63033841545SHajimu UMEMOTO exit(1); 63133841545SHajimu UMEMOTO } 63284a1a4cfSHajimu UMEMOTO if (res->ai_next) { 63384a1a4cfSHajimu UMEMOTO if (getnameinfo(res->ai_addr, res->ai_addrlen, hbuf, 63484a1a4cfSHajimu UMEMOTO sizeof(hbuf), NULL, 0, NI_NUMERICHOST) != 0) 63584a1a4cfSHajimu UMEMOTO strlcpy(hbuf, "?", sizeof(hbuf)); 63684a1a4cfSHajimu UMEMOTO fprintf(stderr, "traceroute6: Warning: %s has multiple " 63784a1a4cfSHajimu UMEMOTO "addresses; using %s\n", hostname, hbuf); 63884a1a4cfSHajimu UMEMOTO } 6397d56d374SYoshinobu Inoue 64033841545SHajimu UMEMOTO if (*++argv) { 64133841545SHajimu UMEMOTO ep = NULL; 64284a1a4cfSHajimu UMEMOTO errno = 0; 64333841545SHajimu UMEMOTO datalen = strtoul(*argv, &ep, 0); 64484a1a4cfSHajimu UMEMOTO if (errno || !*argv || *ep) { 645c449e284SHajimu UMEMOTO fprintf(stderr, 64633841545SHajimu UMEMOTO "traceroute6: invalid packet length.\n"); 64733841545SHajimu UMEMOTO exit(1); 64833841545SHajimu UMEMOTO } 64933841545SHajimu UMEMOTO } 650d7b63fafSDavid Malone switch (useproto) { 651d7b63fafSDavid Malone case IPPROTO_ICMPV6: 65284a1a4cfSHajimu UMEMOTO minlen = ICMP6ECHOLEN + sizeof(struct tv32); 653d7b63fafSDavid Malone break; 654d7b63fafSDavid Malone case IPPROTO_UDP: 65584a1a4cfSHajimu UMEMOTO minlen = sizeof(struct opacket); 656d7b63fafSDavid Malone break; 657d7b63fafSDavid Malone case IPPROTO_NONE: 658d7b63fafSDavid Malone minlen = 0; 659d7b63fafSDavid Malone datalen = 0; 660d7b63fafSDavid Malone break; 661d7b63fafSDavid Malone default: 662d7b63fafSDavid Malone fprintf(stderr, "traceroute6: unknown probe protocol %d.\n", 663d7b63fafSDavid Malone useproto); 664d7b63fafSDavid Malone exit(1); 665d7b63fafSDavid Malone } 66684a1a4cfSHajimu UMEMOTO if (datalen < minlen) 66784a1a4cfSHajimu UMEMOTO datalen = minlen; 66884a1a4cfSHajimu UMEMOTO else if (datalen >= MAXPACKET) { 669c449e284SHajimu UMEMOTO fprintf(stderr, 670f42640a3SUlrich Spörlein "traceroute6: packet size must be %zu <= s < %d.\n", 671f42640a3SUlrich Spörlein minlen, MAXPACKET); 6727d56d374SYoshinobu Inoue exit(1); 6737d56d374SYoshinobu Inoue } 674f42640a3SUlrich Spörlein outpacket = malloc(datalen); 6757d56d374SYoshinobu Inoue if (!outpacket) { 676de68a0daSKris Kennaway perror("malloc"); 6777d56d374SYoshinobu Inoue exit(1); 6787d56d374SYoshinobu Inoue } 6797d56d374SYoshinobu Inoue (void) bzero((char *)outpacket, datalen); 6807d56d374SYoshinobu Inoue 6817d56d374SYoshinobu Inoue /* initialize msghdr for receiving packets */ 6827d56d374SYoshinobu Inoue rcviov[0].iov_base = (caddr_t)packet; 6837d56d374SYoshinobu Inoue rcviov[0].iov_len = sizeof(packet); 684de68a0daSKris Kennaway rcvmhdr.msg_name = (caddr_t)&Rcv; 685de68a0daSKris Kennaway rcvmhdr.msg_namelen = sizeof(Rcv); 6867d56d374SYoshinobu Inoue rcvmhdr.msg_iov = rcviov; 6877d56d374SYoshinobu Inoue rcvmhdr.msg_iovlen = 1; 688e961704aSDavid Malone rcvcmsglen = CMSG_SPACE(sizeof(struct in6_pktinfo)) + 689e961704aSDavid Malone CMSG_SPACE(sizeof(int)); 690de68a0daSKris Kennaway if ((rcvcmsgbuf = malloc(rcvcmsglen)) == NULL) { 691c449e284SHajimu UMEMOTO fprintf(stderr, "traceroute6: malloc failed\n"); 692de68a0daSKris Kennaway exit(1); 693de68a0daSKris Kennaway } 6947d56d374SYoshinobu Inoue rcvmhdr.msg_control = (caddr_t) rcvcmsgbuf; 695de68a0daSKris Kennaway rcvmhdr.msg_controllen = rcvcmsglen; 6967d56d374SYoshinobu Inoue 6977d56d374SYoshinobu Inoue if (options & SO_DEBUG) 6987d56d374SYoshinobu Inoue (void) setsockopt(rcvsock, SOL_SOCKET, SO_DEBUG, 6997d56d374SYoshinobu Inoue (char *)&on, sizeof(on)); 7007d56d374SYoshinobu Inoue if (options & SO_DONTROUTE) 7017d56d374SYoshinobu Inoue (void) setsockopt(rcvsock, SOL_SOCKET, SO_DONTROUTE, 7027d56d374SYoshinobu Inoue (char *)&on, sizeof(on)); 7037d56d374SYoshinobu Inoue #ifdef IPSEC 7047d56d374SYoshinobu Inoue #ifdef IPSEC_POLICY_IPSEC 7057d56d374SYoshinobu Inoue /* 7067d56d374SYoshinobu Inoue * do not raise error even if setsockopt fails, kernel may have ipsec 7077d56d374SYoshinobu Inoue * turned off. 7087d56d374SYoshinobu Inoue */ 7097d56d374SYoshinobu Inoue if (setpolicy(rcvsock, "in bypass") < 0) 710d94e8c62SKris Kennaway errx(1, "%s", ipsec_strerror()); 7117d56d374SYoshinobu Inoue if (setpolicy(rcvsock, "out bypass") < 0) 712d94e8c62SKris Kennaway errx(1, "%s", ipsec_strerror()); 713de68a0daSKris Kennaway #else 714de68a0daSKris Kennaway { 715de68a0daSKris Kennaway int level = IPSEC_LEVEL_NONE; 716de68a0daSKris Kennaway 717de68a0daSKris Kennaway (void)setsockopt(rcvsock, IPPROTO_IPV6, IPV6_ESP_TRANS_LEVEL, &level, 718de68a0daSKris Kennaway sizeof(level)); 719de68a0daSKris Kennaway (void)setsockopt(rcvsock, IPPROTO_IPV6, IPV6_ESP_NETWORK_LEVEL, &level, 720de68a0daSKris Kennaway sizeof(level)); 721de68a0daSKris Kennaway #ifdef IP_AUTH_TRANS_LEVEL 722de68a0daSKris Kennaway (void)setsockopt(rcvsock, IPPROTO_IPV6, IPV6_AUTH_TRANS_LEVEL, &level, 723de68a0daSKris Kennaway sizeof(level)); 724de68a0daSKris Kennaway #else 725de68a0daSKris Kennaway (void)setsockopt(rcvsock, IPPROTO_IPV6, IPV6_AUTH_LEVEL, &level, 726de68a0daSKris Kennaway sizeof(level)); 727de68a0daSKris Kennaway #endif 728de68a0daSKris Kennaway #ifdef IP_AUTH_NETWORK_LEVEL 729de68a0daSKris Kennaway (void)setsockopt(rcvsock, IPPROTO_IPV6, IPV6_AUTH_NETWORK_LEVEL, &level, 730de68a0daSKris Kennaway sizeof(level)); 731de68a0daSKris Kennaway #endif 732de68a0daSKris Kennaway } 7337d56d374SYoshinobu Inoue #endif /*IPSEC_POLICY_IPSEC*/ 7347d56d374SYoshinobu Inoue #endif /*IPSEC*/ 7357d56d374SYoshinobu Inoue 736de68a0daSKris Kennaway #ifdef SO_SNDBUF 73784a1a4cfSHajimu UMEMOTO i = datalen; 73884a1a4cfSHajimu UMEMOTO if (setsockopt(sndsock, SOL_SOCKET, SO_SNDBUF, (char *)&i, 739d7b63fafSDavid Malone sizeof(i)) < 0 && useproto != IPPROTO_NONE) { 740de68a0daSKris Kennaway perror("setsockopt(SO_SNDBUF)"); 7417d56d374SYoshinobu Inoue exit(6); 7427d56d374SYoshinobu Inoue } 743de68a0daSKris Kennaway #endif /* SO_SNDBUF */ 7447d56d374SYoshinobu Inoue if (options & SO_DEBUG) 7457d56d374SYoshinobu Inoue (void) setsockopt(sndsock, SOL_SOCKET, SO_DEBUG, 7467d56d374SYoshinobu Inoue (char *)&on, sizeof(on)); 7477d56d374SYoshinobu Inoue if (options & SO_DONTROUTE) 7487d56d374SYoshinobu Inoue (void) setsockopt(sndsock, SOL_SOCKET, SO_DONTROUTE, 7497d56d374SYoshinobu Inoue (char *)&on, sizeof(on)); 750de68a0daSKris Kennaway #ifdef USE_RFC2292BIS 751de68a0daSKris Kennaway if (rth) {/* XXX: there is no library to finalize the header... */ 752de68a0daSKris Kennaway rth->ip6r_len = rth->ip6r_segleft * 2; 753de68a0daSKris Kennaway if (setsockopt(sndsock, IPPROTO_IPV6, IPV6_RTHDR, 754de68a0daSKris Kennaway (void *)rth, (rth->ip6r_len + 1) << 3)) { 755c449e284SHajimu UMEMOTO fprintf(stderr, "setsockopt(IPV6_RTHDR): %s\n", 756de68a0daSKris Kennaway strerror(errno)); 757de68a0daSKris Kennaway exit(1); 758de68a0daSKris Kennaway } 759de68a0daSKris Kennaway } 760de68a0daSKris Kennaway #else /* old advanced API */ 7617d56d374SYoshinobu Inoue if (cmsg != NULL) { 7627d56d374SYoshinobu Inoue inet6_rthdr_lasthop(cmsg, IPV6_RTHDR_LOOSE); 763de68a0daSKris Kennaway if (setsockopt(sndsock, IPPROTO_IPV6, IPV6_PKTOPTIONS, 764de68a0daSKris Kennaway rtbuf, cmsg->cmsg_len) < 0) { 765c449e284SHajimu UMEMOTO fprintf(stderr, "setsockopt(IPV6_PKTOPTIONS): %s\n", 766de68a0daSKris Kennaway strerror(errno)); 767de68a0daSKris Kennaway exit(1); 7687d56d374SYoshinobu Inoue } 769de68a0daSKris Kennaway } 770de68a0daSKris Kennaway #endif /* USE_RFC2292BIS */ 7717d56d374SYoshinobu Inoue #ifdef IPSEC 7727d56d374SYoshinobu Inoue #ifdef IPSEC_POLICY_IPSEC 7737d56d374SYoshinobu Inoue /* 7747d56d374SYoshinobu Inoue * do not raise error even if setsockopt fails, kernel may have ipsec 7757d56d374SYoshinobu Inoue * turned off. 7767d56d374SYoshinobu Inoue */ 7777d56d374SYoshinobu Inoue if (setpolicy(sndsock, "in bypass") < 0) 778d94e8c62SKris Kennaway errx(1, "%s", ipsec_strerror()); 7797d56d374SYoshinobu Inoue if (setpolicy(sndsock, "out bypass") < 0) 780d94e8c62SKris Kennaway errx(1, "%s", ipsec_strerror()); 781de68a0daSKris Kennaway #else 782de68a0daSKris Kennaway { 783de68a0daSKris Kennaway int level = IPSEC_LEVEL_BYPASS; 784de68a0daSKris Kennaway 785de68a0daSKris Kennaway (void)setsockopt(sndsock, IPPROTO_IPV6, IPV6_ESP_TRANS_LEVEL, &level, 786de68a0daSKris Kennaway sizeof(level)); 787de68a0daSKris Kennaway (void)setsockopt(sndsock, IPPROTO_IPV6, IPV6_ESP_NETWORK_LEVEL, &level, 788de68a0daSKris Kennaway sizeof(level)); 789de68a0daSKris Kennaway #ifdef IP_AUTH_TRANS_LEVEL 790de68a0daSKris Kennaway (void)setsockopt(sndsock, IPPROTO_IPV6, IPV6_AUTH_TRANS_LEVEL, &level, 791de68a0daSKris Kennaway sizeof(level)); 792de68a0daSKris Kennaway #else 793de68a0daSKris Kennaway (void)setsockopt(sndsock, IPPROTO_IPV6, IPV6_AUTH_LEVEL, &level, 794de68a0daSKris Kennaway sizeof(level)); 795de68a0daSKris Kennaway #endif 796de68a0daSKris Kennaway #ifdef IP_AUTH_NETWORK_LEVEL 797de68a0daSKris Kennaway (void)setsockopt(sndsock, IPPROTO_IPV6, IPV6_AUTH_NETWORK_LEVEL, &level, 798de68a0daSKris Kennaway sizeof(level)); 799de68a0daSKris Kennaway #endif 800de68a0daSKris Kennaway } 8017d56d374SYoshinobu Inoue #endif /*IPSEC_POLICY_IPSEC*/ 8027d56d374SYoshinobu Inoue #endif /*IPSEC*/ 8037d56d374SYoshinobu Inoue 8047d56d374SYoshinobu Inoue /* 8057d56d374SYoshinobu Inoue * Source selection 8067d56d374SYoshinobu Inoue */ 807de68a0daSKris Kennaway bzero(&Src, sizeof(Src)); 8087d56d374SYoshinobu Inoue if (source) { 809de68a0daSKris Kennaway struct addrinfo hints, *res; 810de68a0daSKris Kennaway int error; 811de68a0daSKris Kennaway 812de68a0daSKris Kennaway memset(&hints, 0, sizeof(hints)); 813de68a0daSKris Kennaway hints.ai_family = AF_INET6; 814de68a0daSKris Kennaway hints.ai_socktype = SOCK_DGRAM; /*dummy*/ 815de68a0daSKris Kennaway hints.ai_flags = AI_NUMERICHOST; 816de68a0daSKris Kennaway error = getaddrinfo(source, "0", &hints, &res); 817de68a0daSKris Kennaway if (error) { 818c449e284SHajimu UMEMOTO printf("traceroute6: %s: %s\n", source, 819de68a0daSKris Kennaway gai_strerror(error)); 8207d56d374SYoshinobu Inoue exit(1); 8217d56d374SYoshinobu Inoue } 822de68a0daSKris Kennaway if (res->ai_addrlen > sizeof(Src)) { 823c449e284SHajimu UMEMOTO printf("traceroute6: %s: %s\n", source, 824de68a0daSKris Kennaway gai_strerror(error)); 825de68a0daSKris Kennaway exit(1); 826de68a0daSKris Kennaway } 827de68a0daSKris Kennaway memcpy(&Src, res->ai_addr, res->ai_addrlen); 828de68a0daSKris Kennaway freeaddrinfo(res); 8297d56d374SYoshinobu Inoue } else { 8307d56d374SYoshinobu Inoue struct sockaddr_in6 Nxt; 83184a1a4cfSHajimu UMEMOTO int dummy; 83284a1a4cfSHajimu UMEMOTO socklen_t len; 8337d56d374SYoshinobu Inoue 8347d56d374SYoshinobu Inoue Nxt = Dst; 8357d56d374SYoshinobu Inoue Nxt.sin6_port = htons(DUMMY_PORT); 8367d56d374SYoshinobu Inoue if (cmsg != NULL) 8377d56d374SYoshinobu Inoue bcopy(inet6_rthdr_getaddr(cmsg, 1), &Nxt.sin6_addr, 8387d56d374SYoshinobu Inoue sizeof(Nxt.sin6_addr)); 8397d56d374SYoshinobu Inoue if ((dummy = socket(AF_INET6, SOCK_DGRAM, 0)) < 0) { 8407d56d374SYoshinobu Inoue perror("socket"); 841de68a0daSKris Kennaway exit(1); 8427d56d374SYoshinobu Inoue } 843de68a0daSKris Kennaway if (connect(dummy, (struct sockaddr *)&Nxt, Nxt.sin6_len) < 0) { 8447d56d374SYoshinobu Inoue perror("connect"); 845de68a0daSKris Kennaway exit(1); 8467d56d374SYoshinobu Inoue } 847de68a0daSKris Kennaway len = sizeof(Src); 848de68a0daSKris Kennaway if (getsockname(dummy, (struct sockaddr *)&Src, &len) < 0) { 849de68a0daSKris Kennaway perror("getsockname"); 850de68a0daSKris Kennaway exit(1); 851de68a0daSKris Kennaway } 852de68a0daSKris Kennaway if (getnameinfo((struct sockaddr *)&Src, Src.sin6_len, 853d24cb249SHajimu UMEMOTO src0, sizeof(src0), NULL, 0, NI_NUMERICHOST)) { 854c449e284SHajimu UMEMOTO fprintf(stderr, "getnameinfo failed for source\n"); 855de68a0daSKris Kennaway exit(1); 856de68a0daSKris Kennaway } 857de68a0daSKris Kennaway source = src0; 8587d56d374SYoshinobu Inoue close(dummy); 8597d56d374SYoshinobu Inoue } 860de68a0daSKris Kennaway 86184a1a4cfSHajimu UMEMOTO Src.sin6_port = htons(0); 862de68a0daSKris Kennaway if (bind(sndsock, (struct sockaddr *)&Src, Src.sin6_len) < 0) { 863de68a0daSKris Kennaway perror("bind"); 8647d56d374SYoshinobu Inoue exit(1); 8657d56d374SYoshinobu Inoue } 8667d56d374SYoshinobu Inoue 86784a1a4cfSHajimu UMEMOTO { 868c449e284SHajimu UMEMOTO socklen_t len; 869de68a0daSKris Kennaway 870de68a0daSKris Kennaway len = sizeof(Src); 87184a1a4cfSHajimu UMEMOTO if (getsockname(sndsock, (struct sockaddr *)&Src, &len) < 0) { 872de68a0daSKris Kennaway perror("getsockname"); 873de68a0daSKris Kennaway exit(1); 874de68a0daSKris Kennaway } 87584a1a4cfSHajimu UMEMOTO srcport = ntohs(Src.sin6_port); 876de68a0daSKris Kennaway } 877de68a0daSKris Kennaway 878d429d720SHajimu UMEMOTO if (as_path) { 879d429d720SHajimu UMEMOTO asn = as_setup(as_server); 880d429d720SHajimu UMEMOTO if (asn == NULL) { 881d429d720SHajimu UMEMOTO fprintf(stderr, 882d429d720SHajimu UMEMOTO "traceroute6: as_setup failed, AS# lookups" 883d429d720SHajimu UMEMOTO " disabled\n"); 884d429d720SHajimu UMEMOTO (void)fflush(stderr); 885d429d720SHajimu UMEMOTO as_path = 0; 886d429d720SHajimu UMEMOTO } 887d429d720SHajimu UMEMOTO } 888d429d720SHajimu UMEMOTO 8897d56d374SYoshinobu Inoue /* 8907d56d374SYoshinobu Inoue * Message to users 8917d56d374SYoshinobu Inoue */ 892de68a0daSKris Kennaway if (getnameinfo((struct sockaddr *)&Dst, Dst.sin6_len, hbuf, 893d24cb249SHajimu UMEMOTO sizeof(hbuf), NULL, 0, NI_NUMERICHOST)) 89433841545SHajimu UMEMOTO strlcpy(hbuf, "(invalid)", sizeof(hbuf)); 895c449e284SHajimu UMEMOTO fprintf(stderr, "traceroute6"); 896c449e284SHajimu UMEMOTO fprintf(stderr, " to %s (%s)", hostname, hbuf); 8977d56d374SYoshinobu Inoue if (source) 898c449e284SHajimu UMEMOTO fprintf(stderr, " from %s", source); 89984a1a4cfSHajimu UMEMOTO fprintf(stderr, ", %lu hops max, %lu byte packets\n", 900de68a0daSKris Kennaway max_hops, datalen); 9017d56d374SYoshinobu Inoue (void) fflush(stderr); 9027d56d374SYoshinobu Inoue 903de68a0daSKris Kennaway if (first_hop > 1) 90484a1a4cfSHajimu UMEMOTO printf("Skipping %lu intermediate hops\n", first_hop - 1); 905de68a0daSKris Kennaway 9067d56d374SYoshinobu Inoue /* 9077d56d374SYoshinobu Inoue * Main loop 9087d56d374SYoshinobu Inoue */ 909de68a0daSKris Kennaway for (hops = first_hop; hops <= max_hops; ++hops) { 9107d56d374SYoshinobu Inoue struct in6_addr lastaddr; 9117d56d374SYoshinobu Inoue int got_there = 0; 912f42640a3SUlrich Spörlein unsigned unreachable = 0; 9137d56d374SYoshinobu Inoue 91484a1a4cfSHajimu UMEMOTO printf("%2lu ", hops); 9157d56d374SYoshinobu Inoue bzero(&lastaddr, sizeof(lastaddr)); 9167d56d374SYoshinobu Inoue for (probe = 0; probe < nprobes; ++probe) { 9177d56d374SYoshinobu Inoue int cc; 9187d56d374SYoshinobu Inoue struct timeval t1, t2; 9197d56d374SYoshinobu Inoue 92084a1a4cfSHajimu UMEMOTO (void) gettimeofday(&t1, NULL); 9217d56d374SYoshinobu Inoue send_probe(++seq, hops); 9227d56d374SYoshinobu Inoue while ((cc = wait_for_reply(rcvsock, &rcvmhdr))) { 92384a1a4cfSHajimu UMEMOTO (void) gettimeofday(&t2, NULL); 9247d56d374SYoshinobu Inoue if ((i = packet_ok(&rcvmhdr, cc, seq))) { 9257d56d374SYoshinobu Inoue if (!IN6_ARE_ADDR_EQUAL(&Rcv.sin6_addr, 9267d56d374SYoshinobu Inoue &lastaddr)) { 92759876f93SChristian S.J. Peron if (probe > 0) 92859876f93SChristian S.J. Peron fputs("\n ", stdout); 9297d56d374SYoshinobu Inoue print(&rcvmhdr, cc); 9307d56d374SYoshinobu Inoue lastaddr = Rcv.sin6_addr; 9317d56d374SYoshinobu Inoue } 932c449e284SHajimu UMEMOTO printf(" %.3f ms", deltaT(&t1, &t2)); 9337d56d374SYoshinobu Inoue switch (i - 1) { 9347d56d374SYoshinobu Inoue case ICMP6_DST_UNREACH_NOROUTE: 9357d56d374SYoshinobu Inoue ++unreachable; 936c449e284SHajimu UMEMOTO printf(" !N"); 9377d56d374SYoshinobu Inoue break; 9387d56d374SYoshinobu Inoue case ICMP6_DST_UNREACH_ADMIN: 9397d56d374SYoshinobu Inoue ++unreachable; 940c449e284SHajimu UMEMOTO printf(" !P"); 9417d56d374SYoshinobu Inoue break; 9427d56d374SYoshinobu Inoue case ICMP6_DST_UNREACH_NOTNEIGHBOR: 9437d56d374SYoshinobu Inoue ++unreachable; 944c449e284SHajimu UMEMOTO printf(" !S"); 9457d56d374SYoshinobu Inoue break; 9467d56d374SYoshinobu Inoue case ICMP6_DST_UNREACH_ADDR: 9477d56d374SYoshinobu Inoue ++unreachable; 948c449e284SHajimu UMEMOTO printf(" !A"); 9497d56d374SYoshinobu Inoue break; 9507d56d374SYoshinobu Inoue case ICMP6_DST_UNREACH_NOPORT: 9517d56d374SYoshinobu Inoue if (rcvhlim >= 0 && 9527d56d374SYoshinobu Inoue rcvhlim <= 1) 953c449e284SHajimu UMEMOTO printf(" !"); 9547d56d374SYoshinobu Inoue ++got_there; 9557d56d374SYoshinobu Inoue break; 9567d56d374SYoshinobu Inoue } 9577d56d374SYoshinobu Inoue break; 958*161ab37dSHiroki Sato } else if (deltaT(&t1, &t2) > waittime * 1000) { 959*161ab37dSHiroki Sato cc = 0; 960*161ab37dSHiroki Sato break; 9617d56d374SYoshinobu Inoue } 9627d56d374SYoshinobu Inoue } 9637d56d374SYoshinobu Inoue if (cc == 0) 964c449e284SHajimu UMEMOTO printf(" *"); 9657d56d374SYoshinobu Inoue (void) fflush(stdout); 9667d56d374SYoshinobu Inoue } 9677d56d374SYoshinobu Inoue putchar('\n'); 9687d56d374SYoshinobu Inoue if (got_there || 9697d56d374SYoshinobu Inoue (unreachable > 0 && unreachable >= ((nprobes + 1) / 2))) { 9707d56d374SYoshinobu Inoue exit(0); 9717d56d374SYoshinobu Inoue } 9727d56d374SYoshinobu Inoue } 973d429d720SHajimu UMEMOTO if (as_path) 974d429d720SHajimu UMEMOTO as_shutdown(asn); 9757d56d374SYoshinobu Inoue 9767d56d374SYoshinobu Inoue exit(0); 9777d56d374SYoshinobu Inoue } 9787d56d374SYoshinobu Inoue 9797d56d374SYoshinobu Inoue int 9807d56d374SYoshinobu Inoue wait_for_reply(sock, mhdr) 9817d56d374SYoshinobu Inoue int sock; 9827d56d374SYoshinobu Inoue struct msghdr *mhdr; 9837d56d374SYoshinobu Inoue { 9842a1c5efaSKris Kennaway #ifdef HAVE_POLL 9852a1c5efaSKris Kennaway struct pollfd pfd[1]; 9867d56d374SYoshinobu Inoue int cc = 0; 9877d56d374SYoshinobu Inoue 9882a1c5efaSKris Kennaway pfd[0].fd = sock; 9892a1c5efaSKris Kennaway pfd[0].events = POLLIN; 9902a1c5efaSKris Kennaway pfd[0].revents = 0; 9917d56d374SYoshinobu Inoue 9922a1c5efaSKris Kennaway if (poll(pfd, 1, waittime * 1000) > 0) 9937d56d374SYoshinobu Inoue cc = recvmsg(rcvsock, mhdr, 0); 9947d56d374SYoshinobu Inoue 9957d56d374SYoshinobu Inoue return(cc); 9962a1c5efaSKris Kennaway #else 9972a1c5efaSKris Kennaway fd_set *fdsp; 9982a1c5efaSKris Kennaway struct timeval wait; 9992a1c5efaSKris Kennaway int cc = 0, fdsn; 10002a1c5efaSKris Kennaway 10012a1c5efaSKris Kennaway fdsn = howmany(sock + 1, NFDBITS) * sizeof(fd_mask); 10022a1c5efaSKris Kennaway if ((fdsp = (fd_set *)malloc(fdsn)) == NULL) 10032a1c5efaSKris Kennaway err(1, "malloc"); 10042a1c5efaSKris Kennaway memset(fdsp, 0, fdsn); 10052a1c5efaSKris Kennaway FD_SET(sock, fdsp); 10062a1c5efaSKris Kennaway wait.tv_sec = waittime; wait.tv_usec = 0; 10072a1c5efaSKris Kennaway 10082a1c5efaSKris Kennaway if (select(sock+1, fdsp, (fd_set *)0, (fd_set *)0, &wait) > 0) 10092a1c5efaSKris Kennaway cc = recvmsg(rcvsock, mhdr, 0); 10102a1c5efaSKris Kennaway 10112a1c5efaSKris Kennaway free(fdsp); 10122a1c5efaSKris Kennaway return(cc); 10132a1c5efaSKris Kennaway #endif 10147d56d374SYoshinobu Inoue } 10157d56d374SYoshinobu Inoue 10167d56d374SYoshinobu Inoue #ifdef IPSEC 10177d56d374SYoshinobu Inoue #ifdef IPSEC_POLICY_IPSEC 10187d56d374SYoshinobu Inoue int 10197d56d374SYoshinobu Inoue setpolicy(so, policy) 10207d56d374SYoshinobu Inoue int so; 10217d56d374SYoshinobu Inoue char *policy; 10227d56d374SYoshinobu Inoue { 10237d56d374SYoshinobu Inoue char *buf; 10247d56d374SYoshinobu Inoue 10257d56d374SYoshinobu Inoue buf = ipsec_set_policy(policy, strlen(policy)); 10267d56d374SYoshinobu Inoue if (buf == NULL) { 1027de68a0daSKris Kennaway warnx("%s", ipsec_strerror()); 10287d56d374SYoshinobu Inoue return -1; 10297d56d374SYoshinobu Inoue } 10307d56d374SYoshinobu Inoue (void)setsockopt(so, IPPROTO_IPV6, IPV6_IPSEC_POLICY, 10317d56d374SYoshinobu Inoue buf, ipsec_get_policylen(buf)); 10327d56d374SYoshinobu Inoue 10337d56d374SYoshinobu Inoue free(buf); 10347d56d374SYoshinobu Inoue 10357d56d374SYoshinobu Inoue return 0; 10367d56d374SYoshinobu Inoue } 10377d56d374SYoshinobu Inoue #endif 10387d56d374SYoshinobu Inoue #endif 10397d56d374SYoshinobu Inoue 10407d56d374SYoshinobu Inoue void 10417d56d374SYoshinobu Inoue send_probe(seq, hops) 104284a1a4cfSHajimu UMEMOTO int seq; 104384a1a4cfSHajimu UMEMOTO u_long hops; 10447d56d374SYoshinobu Inoue { 1045d7b63fafSDavid Malone struct icmp6_hdr *icp; 1046d7b63fafSDavid Malone struct opacket *op; 1047e961704aSDavid Malone struct timeval tv; 1048e961704aSDavid Malone struct tv32 tv32; 10497d56d374SYoshinobu Inoue int i; 10507d56d374SYoshinobu Inoue 105184a1a4cfSHajimu UMEMOTO i = hops; 10527d56d374SYoshinobu Inoue if (setsockopt(sndsock, IPPROTO_IPV6, IPV6_UNICAST_HOPS, 105384a1a4cfSHajimu UMEMOTO (char *)&i, sizeof(i)) < 0) { 10547d56d374SYoshinobu Inoue perror("setsockopt IPV6_UNICAST_HOPS"); 10557d56d374SYoshinobu Inoue } 10567d56d374SYoshinobu Inoue 10577d56d374SYoshinobu Inoue Dst.sin6_port = htons(port + seq); 1058e961704aSDavid Malone (void) gettimeofday(&tv, NULL); 1059e961704aSDavid Malone tv32.tv32_sec = htonl(tv.tv_sec); 1060e961704aSDavid Malone tv32.tv32_usec = htonl(tv.tv_usec); 10617d56d374SYoshinobu Inoue 1062d7b63fafSDavid Malone switch (useproto) { 1063d7b63fafSDavid Malone case IPPROTO_ICMPV6: 1064d7b63fafSDavid Malone icp = (struct icmp6_hdr *)outpacket; 106584a1a4cfSHajimu UMEMOTO 106684a1a4cfSHajimu UMEMOTO icp->icmp6_type = ICMP6_ECHO_REQUEST; 106784a1a4cfSHajimu UMEMOTO icp->icmp6_code = 0; 106884a1a4cfSHajimu UMEMOTO icp->icmp6_cksum = 0; 106984a1a4cfSHajimu UMEMOTO icp->icmp6_id = ident; 107084a1a4cfSHajimu UMEMOTO icp->icmp6_seq = htons(seq); 1071e961704aSDavid Malone bcopy(&tv32, ((u_int8_t *)outpacket + ICMP6ECHOLEN), 1072e961704aSDavid Malone sizeof(tv32)); 1073d7b63fafSDavid Malone break; 1074d7b63fafSDavid Malone case IPPROTO_UDP: 1075d7b63fafSDavid Malone op = outpacket; 1076e961704aSDavid Malone 10777d56d374SYoshinobu Inoue op->seq = seq; 10787d56d374SYoshinobu Inoue op->hops = hops; 1079e961704aSDavid Malone bcopy(&tv32, &op->tv, sizeof tv32); 1080d7b63fafSDavid Malone break; 1081d7b63fafSDavid Malone case IPPROTO_NONE: 1082d7b63fafSDavid Malone /* No space for anything. No harm as seq/tv32 are decorative. */ 1083d7b63fafSDavid Malone break; 1084d7b63fafSDavid Malone default: 1085d7b63fafSDavid Malone fprintf(stderr, "Unknown probe protocol %d.\n", useproto); 1086d7b63fafSDavid Malone exit(1); 108784a1a4cfSHajimu UMEMOTO } 10887d56d374SYoshinobu Inoue 10897d56d374SYoshinobu Inoue i = sendto(sndsock, (char *)outpacket, datalen, 0, 1090de68a0daSKris Kennaway (struct sockaddr *)&Dst, Dst.sin6_len); 1091f42640a3SUlrich Spörlein if (i < 0 || (u_long)i != datalen) { 10927d56d374SYoshinobu Inoue if (i < 0) 10937d56d374SYoshinobu Inoue perror("sendto"); 109484a1a4cfSHajimu UMEMOTO printf("traceroute6: wrote %s %lu chars, ret=%d\n", 1095c449e284SHajimu UMEMOTO hostname, datalen, i); 10967d56d374SYoshinobu Inoue (void) fflush(stdout); 10977d56d374SYoshinobu Inoue } 10987d56d374SYoshinobu Inoue } 10997d56d374SYoshinobu Inoue 11007d56d374SYoshinobu Inoue int 11017d56d374SYoshinobu Inoue get_hoplim(mhdr) 11027d56d374SYoshinobu Inoue struct msghdr *mhdr; 11037d56d374SYoshinobu Inoue { 11047d56d374SYoshinobu Inoue struct cmsghdr *cm; 11057d56d374SYoshinobu Inoue 11067d56d374SYoshinobu Inoue for (cm = (struct cmsghdr *)CMSG_FIRSTHDR(mhdr); cm; 11077d56d374SYoshinobu Inoue cm = (struct cmsghdr *)CMSG_NXTHDR(mhdr, cm)) { 11087d56d374SYoshinobu Inoue if (cm->cmsg_level == IPPROTO_IPV6 && 11097d56d374SYoshinobu Inoue cm->cmsg_type == IPV6_HOPLIMIT && 11107d56d374SYoshinobu Inoue cm->cmsg_len == CMSG_LEN(sizeof(int))) 11117d56d374SYoshinobu Inoue return(*(int *)CMSG_DATA(cm)); 11127d56d374SYoshinobu Inoue } 11137d56d374SYoshinobu Inoue 11147d56d374SYoshinobu Inoue return(-1); 11157d56d374SYoshinobu Inoue } 11167d56d374SYoshinobu Inoue 11177d56d374SYoshinobu Inoue double 11187d56d374SYoshinobu Inoue deltaT(t1p, t2p) 11197d56d374SYoshinobu Inoue struct timeval *t1p, *t2p; 11207d56d374SYoshinobu Inoue { 1121e961704aSDavid Malone double dt; 11227d56d374SYoshinobu Inoue 11237d56d374SYoshinobu Inoue dt = (double)(t2p->tv_sec - t1p->tv_sec) * 1000.0 + 11247d56d374SYoshinobu Inoue (double)(t2p->tv_usec - t1p->tv_usec) / 1000.0; 11257d56d374SYoshinobu Inoue return (dt); 11267d56d374SYoshinobu Inoue } 11277d56d374SYoshinobu Inoue 11287d56d374SYoshinobu Inoue /* 11297d56d374SYoshinobu Inoue * Convert an ICMP "type" field to a printable string. 11307d56d374SYoshinobu Inoue */ 1131f42640a3SUlrich Spörlein const char * 1132f42640a3SUlrich Spörlein pr_type(int t0) 11337d56d374SYoshinobu Inoue { 11347d56d374SYoshinobu Inoue u_char t = t0 & 0xff; 1135f42640a3SUlrich Spörlein const char *cp; 11367d56d374SYoshinobu Inoue 11377d56d374SYoshinobu Inoue switch (t) { 11387d56d374SYoshinobu Inoue case ICMP6_DST_UNREACH: 11397d56d374SYoshinobu Inoue cp = "Destination Unreachable"; 11407d56d374SYoshinobu Inoue break; 11417d56d374SYoshinobu Inoue case ICMP6_PACKET_TOO_BIG: 1142c449e284SHajimu UMEMOTO cp = "Packet Too Big"; 11437d56d374SYoshinobu Inoue break; 11447d56d374SYoshinobu Inoue case ICMP6_TIME_EXCEEDED: 11457d56d374SYoshinobu Inoue cp = "Time Exceeded"; 11467d56d374SYoshinobu Inoue break; 11477d56d374SYoshinobu Inoue case ICMP6_PARAM_PROB: 11487d56d374SYoshinobu Inoue cp = "Parameter Problem"; 11497d56d374SYoshinobu Inoue break; 11507d56d374SYoshinobu Inoue case ICMP6_ECHO_REQUEST: 11517d56d374SYoshinobu Inoue cp = "Echo Request"; 11527d56d374SYoshinobu Inoue break; 11537d56d374SYoshinobu Inoue case ICMP6_ECHO_REPLY: 11547d56d374SYoshinobu Inoue cp = "Echo Reply"; 11557d56d374SYoshinobu Inoue break; 11567d56d374SYoshinobu Inoue case ICMP6_MEMBERSHIP_QUERY: 11577d56d374SYoshinobu Inoue cp = "Group Membership Query"; 11587d56d374SYoshinobu Inoue break; 11597d56d374SYoshinobu Inoue case ICMP6_MEMBERSHIP_REPORT: 11607d56d374SYoshinobu Inoue cp = "Group Membership Report"; 11617d56d374SYoshinobu Inoue break; 11627d56d374SYoshinobu Inoue case ICMP6_MEMBERSHIP_REDUCTION: 11637d56d374SYoshinobu Inoue cp = "Group Membership Reduction"; 11647d56d374SYoshinobu Inoue break; 11657d56d374SYoshinobu Inoue case ND_ROUTER_SOLICIT: 11667d56d374SYoshinobu Inoue cp = "Router Solicitation"; 11677d56d374SYoshinobu Inoue break; 11687d56d374SYoshinobu Inoue case ND_ROUTER_ADVERT: 11697d56d374SYoshinobu Inoue cp = "Router Advertisement"; 11707d56d374SYoshinobu Inoue break; 11717d56d374SYoshinobu Inoue case ND_NEIGHBOR_SOLICIT: 11727d56d374SYoshinobu Inoue cp = "Neighbor Solicitation"; 11737d56d374SYoshinobu Inoue break; 11747d56d374SYoshinobu Inoue case ND_NEIGHBOR_ADVERT: 11757d56d374SYoshinobu Inoue cp = "Neighbor Advertisement"; 11767d56d374SYoshinobu Inoue break; 11777d56d374SYoshinobu Inoue case ND_REDIRECT: 1178de68a0daSKris Kennaway cp = "Redirect"; 11797d56d374SYoshinobu Inoue break; 11807d56d374SYoshinobu Inoue default: 11817d56d374SYoshinobu Inoue cp = "Unknown"; 11827d56d374SYoshinobu Inoue break; 11837d56d374SYoshinobu Inoue } 11847d56d374SYoshinobu Inoue return cp; 11857d56d374SYoshinobu Inoue } 11867d56d374SYoshinobu Inoue 11877d56d374SYoshinobu Inoue int 11887d56d374SYoshinobu Inoue packet_ok(mhdr, cc, seq) 11897d56d374SYoshinobu Inoue struct msghdr *mhdr; 11907d56d374SYoshinobu Inoue int cc; 11917d56d374SYoshinobu Inoue int seq; 11927d56d374SYoshinobu Inoue { 1193e961704aSDavid Malone struct icmp6_hdr *icp; 11947d56d374SYoshinobu Inoue struct sockaddr_in6 *from = (struct sockaddr_in6 *)mhdr->msg_name; 11957d56d374SYoshinobu Inoue u_char type, code; 11967d56d374SYoshinobu Inoue char *buf = (char *)mhdr->msg_iov[0].iov_base; 11977d56d374SYoshinobu Inoue struct cmsghdr *cm; 11987d56d374SYoshinobu Inoue int *hlimp; 1199de68a0daSKris Kennaway char hbuf[NI_MAXHOST]; 12007d56d374SYoshinobu Inoue 1201de68a0daSKris Kennaway #ifdef OLDRAWSOCKET 1202de68a0daSKris Kennaway int hlen; 1203de68a0daSKris Kennaway struct ip6_hdr *ip; 1204de68a0daSKris Kennaway #endif 1205de68a0daSKris Kennaway 1206de68a0daSKris Kennaway #ifdef OLDRAWSOCKET 1207de68a0daSKris Kennaway ip = (struct ip6_hdr *) buf; 1208de68a0daSKris Kennaway hlen = sizeof(struct ip6_hdr); 1209de68a0daSKris Kennaway if (cc < hlen + sizeof(struct icmp6_hdr)) { 1210de68a0daSKris Kennaway if (verbose) { 1211de68a0daSKris Kennaway if (getnameinfo((struct sockaddr *)from, from->sin6_len, 1212d24cb249SHajimu UMEMOTO hbuf, sizeof(hbuf), NULL, 0, NI_NUMERICHOST) != 0) 121333841545SHajimu UMEMOTO strlcpy(hbuf, "invalid", sizeof(hbuf)); 1214c449e284SHajimu UMEMOTO printf("packet too short (%d bytes) from %s\n", cc, 1215de68a0daSKris Kennaway hbuf); 1216de68a0daSKris Kennaway } 1217de68a0daSKris Kennaway return (0); 1218de68a0daSKris Kennaway } 1219de68a0daSKris Kennaway cc -= hlen; 1220de68a0daSKris Kennaway icp = (struct icmp6_hdr *)(buf + hlen); 1221de68a0daSKris Kennaway #else 1222f42640a3SUlrich Spörlein if (cc < (int)sizeof(struct icmp6_hdr)) { 1223de68a0daSKris Kennaway if (verbose) { 1224de68a0daSKris Kennaway if (getnameinfo((struct sockaddr *)from, from->sin6_len, 1225d24cb249SHajimu UMEMOTO hbuf, sizeof(hbuf), NULL, 0, NI_NUMERICHOST) != 0) 122633841545SHajimu UMEMOTO strlcpy(hbuf, "invalid", sizeof(hbuf)); 1227c449e284SHajimu UMEMOTO printf("data too short (%d bytes) from %s\n", cc, hbuf); 1228de68a0daSKris Kennaway } 12297d56d374SYoshinobu Inoue return(0); 12307d56d374SYoshinobu Inoue } 12317d56d374SYoshinobu Inoue icp = (struct icmp6_hdr *)buf; 1232de68a0daSKris Kennaway #endif 12337d56d374SYoshinobu Inoue /* get optional information via advanced API */ 12347d56d374SYoshinobu Inoue rcvpktinfo = NULL; 12357d56d374SYoshinobu Inoue hlimp = NULL; 12367d56d374SYoshinobu Inoue for (cm = (struct cmsghdr *)CMSG_FIRSTHDR(mhdr); cm; 12377d56d374SYoshinobu Inoue cm = (struct cmsghdr *)CMSG_NXTHDR(mhdr, cm)) { 12387d56d374SYoshinobu Inoue if (cm->cmsg_level == IPPROTO_IPV6 && 12397d56d374SYoshinobu Inoue cm->cmsg_type == IPV6_PKTINFO && 12407d56d374SYoshinobu Inoue cm->cmsg_len == 12417d56d374SYoshinobu Inoue CMSG_LEN(sizeof(struct in6_pktinfo))) 12427d56d374SYoshinobu Inoue rcvpktinfo = (struct in6_pktinfo *)(CMSG_DATA(cm)); 12437d56d374SYoshinobu Inoue 12447d56d374SYoshinobu Inoue if (cm->cmsg_level == IPPROTO_IPV6 && 12457d56d374SYoshinobu Inoue cm->cmsg_type == IPV6_HOPLIMIT && 12467d56d374SYoshinobu Inoue cm->cmsg_len == CMSG_LEN(sizeof(int))) 12477d56d374SYoshinobu Inoue hlimp = (int *)CMSG_DATA(cm); 12487d56d374SYoshinobu Inoue } 12497d56d374SYoshinobu Inoue if (rcvpktinfo == NULL || hlimp == NULL) { 12507d56d374SYoshinobu Inoue warnx("failed to get received hop limit or packet info"); 1251de68a0daSKris Kennaway #if 0 12527d56d374SYoshinobu Inoue return(0); 1253de68a0daSKris Kennaway #else 1254de68a0daSKris Kennaway rcvhlim = 0; /*XXX*/ 1255de68a0daSKris Kennaway #endif 12567d56d374SYoshinobu Inoue } 1257de68a0daSKris Kennaway else 12587d56d374SYoshinobu Inoue rcvhlim = *hlimp; 12597d56d374SYoshinobu Inoue 12607d56d374SYoshinobu Inoue type = icp->icmp6_type; 12617d56d374SYoshinobu Inoue code = icp->icmp6_code; 12627d56d374SYoshinobu Inoue if ((type == ICMP6_TIME_EXCEEDED && code == ICMP6_TIME_EXCEED_TRANSIT) 12637d56d374SYoshinobu Inoue || type == ICMP6_DST_UNREACH) { 12647d56d374SYoshinobu Inoue struct ip6_hdr *hip; 1265d7b63fafSDavid Malone void *up; 12667d56d374SYoshinobu Inoue 12677d56d374SYoshinobu Inoue hip = (struct ip6_hdr *)(icp + 1); 1268d7b63fafSDavid Malone if ((up = get_uphdr(hip, (u_char *)(buf + cc))) == NULL) { 12697d56d374SYoshinobu Inoue if (verbose) 12707d56d374SYoshinobu Inoue warnx("failed to get upper layer header"); 12717d56d374SYoshinobu Inoue return(0); 12727d56d374SYoshinobu Inoue } 1273d7b63fafSDavid Malone switch (useproto) { 1274d7b63fafSDavid Malone case IPPROTO_ICMPV6: 1275d7b63fafSDavid Malone if (((struct icmp6_hdr *)up)->icmp6_id == ident && 127684a1a4cfSHajimu UMEMOTO ((struct icmp6_hdr *)up)->icmp6_seq == htons(seq)) 1277d7b63fafSDavid Malone return (type == ICMP6_TIME_EXCEEDED ? 1278d7b63fafSDavid Malone -1 : code + 1); 1279d7b63fafSDavid Malone break; 1280d7b63fafSDavid Malone case IPPROTO_UDP: 1281d7b63fafSDavid Malone if (((struct udphdr *)up)->uh_sport == htons(srcport) && 1282d7b63fafSDavid Malone ((struct udphdr *)up)->uh_dport == htons(port + seq)) 1283d7b63fafSDavid Malone return (type == ICMP6_TIME_EXCEEDED ? 1284d7b63fafSDavid Malone -1 : code + 1); 1285d7b63fafSDavid Malone break; 1286d7b63fafSDavid Malone case IPPROTO_NONE: 128784a1a4cfSHajimu UMEMOTO return (type == ICMP6_TIME_EXCEEDED ? -1 : code + 1); 1288d7b63fafSDavid Malone default: 1289d7b63fafSDavid Malone fprintf(stderr, "Unknown probe proto %d.\n", useproto); 1290d7b63fafSDavid Malone break; 1291d7b63fafSDavid Malone } 1292d7b63fafSDavid Malone } else if (useproto == IPPROTO_ICMPV6 && type == ICMP6_ECHO_REPLY) { 129384a1a4cfSHajimu UMEMOTO if (icp->icmp6_id == ident && 129484a1a4cfSHajimu UMEMOTO icp->icmp6_seq == htons(seq)) 129584a1a4cfSHajimu UMEMOTO return (ICMP6_DST_UNREACH_NOPORT + 1); 12967d56d374SYoshinobu Inoue } 12977d56d374SYoshinobu Inoue if (verbose) { 1298de68a0daSKris Kennaway char sbuf[NI_MAXHOST+1], dbuf[INET6_ADDRSTRLEN]; 1299e961704aSDavid Malone u_int8_t *p; 1300e961704aSDavid Malone int i; 13017d56d374SYoshinobu Inoue 1302de68a0daSKris Kennaway if (getnameinfo((struct sockaddr *)from, from->sin6_len, 1303d24cb249SHajimu UMEMOTO sbuf, sizeof(sbuf), NULL, 0, NI_NUMERICHOST) != 0) 1304c449e284SHajimu UMEMOTO strlcpy(sbuf, "invalid", sizeof(sbuf)); 1305c449e284SHajimu UMEMOTO printf("\n%d bytes from %s to %s", cc, sbuf, 1306de68a0daSKris Kennaway rcvpktinfo ? inet_ntop(AF_INET6, &rcvpktinfo->ipi6_addr, 1307c449e284SHajimu UMEMOTO dbuf, sizeof(dbuf)) : "?"); 1308c449e284SHajimu UMEMOTO printf(": icmp type %d (%s) code %d\n", type, pr_type(type), 13097d56d374SYoshinobu Inoue icp->icmp6_code); 1310de68a0daSKris Kennaway p = (u_int8_t *)(icp + 1); 1311de68a0daSKris Kennaway #define WIDTH 16 1312de68a0daSKris Kennaway for (i = 0; i < cc; i++) { 1313de68a0daSKris Kennaway if (i % WIDTH == 0) 1314c449e284SHajimu UMEMOTO printf("%04x:", i); 1315de68a0daSKris Kennaway if (i % 4 == 0) 1316c449e284SHajimu UMEMOTO printf(" "); 1317c449e284SHajimu UMEMOTO printf("%02x", p[i]); 1318de68a0daSKris Kennaway if (i % WIDTH == WIDTH - 1) 1319c449e284SHajimu UMEMOTO printf("\n"); 1320de68a0daSKris Kennaway } 1321de68a0daSKris Kennaway if (cc % WIDTH != 0) 1322c449e284SHajimu UMEMOTO printf("\n"); 13237d56d374SYoshinobu Inoue } 13247d56d374SYoshinobu Inoue return(0); 13257d56d374SYoshinobu Inoue } 13267d56d374SYoshinobu Inoue 13277d56d374SYoshinobu Inoue /* 132884a1a4cfSHajimu UMEMOTO * Increment pointer until find the UDP or ICMP header. 13297d56d374SYoshinobu Inoue */ 1330d7b63fafSDavid Malone void * 1331d7b63fafSDavid Malone get_uphdr(ip6, lim) 13327d56d374SYoshinobu Inoue struct ip6_hdr *ip6; 13337d56d374SYoshinobu Inoue u_char *lim; 13347d56d374SYoshinobu Inoue { 13357d56d374SYoshinobu Inoue u_char *cp = (u_char *)ip6, nh; 13367d56d374SYoshinobu Inoue int hlen; 1337d7b63fafSDavid Malone static u_char none_hdr[1]; /* Fake pointer for IPPROTO_NONE. */ 13387d56d374SYoshinobu Inoue 1339d7b63fafSDavid Malone if (cp + sizeof(*ip6) > lim) 13407d56d374SYoshinobu Inoue return(NULL); 13417d56d374SYoshinobu Inoue 13427d56d374SYoshinobu Inoue nh = ip6->ip6_nxt; 13437d56d374SYoshinobu Inoue cp += sizeof(struct ip6_hdr); 13447d56d374SYoshinobu Inoue 1345d7b63fafSDavid Malone while (lim - cp >= (nh == IPPROTO_NONE ? 0 : 8)) { 13467d56d374SYoshinobu Inoue switch (nh) { 13477d56d374SYoshinobu Inoue case IPPROTO_ESP: 13487d56d374SYoshinobu Inoue case IPPROTO_TCP: 13497d56d374SYoshinobu Inoue return(NULL); 135084a1a4cfSHajimu UMEMOTO case IPPROTO_ICMPV6: 1351d7b63fafSDavid Malone return(useproto == nh ? cp : NULL); 13527d56d374SYoshinobu Inoue case IPPROTO_UDP: 1353d7b63fafSDavid Malone return(useproto == nh ? cp : NULL); 1354d7b63fafSDavid Malone case IPPROTO_NONE: 1355d7b63fafSDavid Malone return(useproto == nh ? none_hdr : NULL); 13567d56d374SYoshinobu Inoue case IPPROTO_FRAGMENT: 13577d56d374SYoshinobu Inoue hlen = sizeof(struct ip6_frag); 13587d56d374SYoshinobu Inoue nh = ((struct ip6_frag *)cp)->ip6f_nxt; 13597d56d374SYoshinobu Inoue break; 13607d56d374SYoshinobu Inoue case IPPROTO_AH: 13617d56d374SYoshinobu Inoue hlen = (((struct ip6_ext *)cp)->ip6e_len + 2) << 2; 13627d56d374SYoshinobu Inoue nh = ((struct ip6_ext *)cp)->ip6e_nxt; 13637d56d374SYoshinobu Inoue break; 13647d56d374SYoshinobu Inoue default: 13657d56d374SYoshinobu Inoue hlen = (((struct ip6_ext *)cp)->ip6e_len + 1) << 3; 13667d56d374SYoshinobu Inoue nh = ((struct ip6_ext *)cp)->ip6e_nxt; 13677d56d374SYoshinobu Inoue break; 13687d56d374SYoshinobu Inoue } 13697d56d374SYoshinobu Inoue 13707d56d374SYoshinobu Inoue cp += hlen; 13717d56d374SYoshinobu Inoue } 13727d56d374SYoshinobu Inoue 13737d56d374SYoshinobu Inoue return(NULL); 13747d56d374SYoshinobu Inoue } 13757d56d374SYoshinobu Inoue 13767d56d374SYoshinobu Inoue void 13777d56d374SYoshinobu Inoue print(mhdr, cc) 13787d56d374SYoshinobu Inoue struct msghdr *mhdr; 13797d56d374SYoshinobu Inoue int cc; 13807d56d374SYoshinobu Inoue { 13817d56d374SYoshinobu Inoue struct sockaddr_in6 *from = (struct sockaddr_in6 *)mhdr->msg_name; 1382de68a0daSKris Kennaway char hbuf[NI_MAXHOST]; 13837d56d374SYoshinobu Inoue 1384de68a0daSKris Kennaway if (getnameinfo((struct sockaddr *)from, from->sin6_len, 1385d24cb249SHajimu UMEMOTO hbuf, sizeof(hbuf), NULL, 0, NI_NUMERICHOST) != 0) 138633841545SHajimu UMEMOTO strlcpy(hbuf, "invalid", sizeof(hbuf)); 1387d429d720SHajimu UMEMOTO if (as_path) 1388d429d720SHajimu UMEMOTO printf(" [AS%u]", as_lookup(asn, hbuf, AF_INET6)); 1389de68a0daSKris Kennaway if (nflag) 1390c449e284SHajimu UMEMOTO printf(" %s", hbuf); 1391de68a0daSKris Kennaway else if (lflag) 1392c449e284SHajimu UMEMOTO printf(" %s (%s)", inetname((struct sockaddr *)from), hbuf); 1393de68a0daSKris Kennaway else 1394c449e284SHajimu UMEMOTO printf(" %s", inetname((struct sockaddr *)from)); 13957d56d374SYoshinobu Inoue 13967d56d374SYoshinobu Inoue if (verbose) { 1397de68a0daSKris Kennaway #ifdef OLDRAWSOCKET 1398c449e284SHajimu UMEMOTO printf(" %d bytes to %s", cc, 1399de68a0daSKris Kennaway rcvpktinfo ? inet_ntop(AF_INET6, &rcvpktinfo->ipi6_addr, 1400c449e284SHajimu UMEMOTO hbuf, sizeof(hbuf)) : "?"); 1401de68a0daSKris Kennaway #else 1402c449e284SHajimu UMEMOTO printf(" %d bytes of data to %s", cc, 1403de68a0daSKris Kennaway rcvpktinfo ? inet_ntop(AF_INET6, &rcvpktinfo->ipi6_addr, 1404c449e284SHajimu UMEMOTO hbuf, sizeof(hbuf)) : "?"); 1405de68a0daSKris Kennaway #endif 14067d56d374SYoshinobu Inoue } 14077d56d374SYoshinobu Inoue } 14087d56d374SYoshinobu Inoue 14097d56d374SYoshinobu Inoue /* 14107d56d374SYoshinobu Inoue * Construct an Internet address representation. 14117d56d374SYoshinobu Inoue * If the nflag has been supplied, give 14127d56d374SYoshinobu Inoue * numeric value, otherwise try for symbolic name. 14137d56d374SYoshinobu Inoue */ 1414de68a0daSKris Kennaway const char * 1415de68a0daSKris Kennaway inetname(sa) 1416de68a0daSKris Kennaway struct sockaddr *sa; 14177d56d374SYoshinobu Inoue { 1418e961704aSDavid Malone static char line[NI_MAXHOST], domain[MAXHOSTNAMELEN + 1]; 14197d56d374SYoshinobu Inoue static int first = 1; 1420e961704aSDavid Malone char *cp; 14217d56d374SYoshinobu Inoue 14227d56d374SYoshinobu Inoue if (first && !nflag) { 14237d56d374SYoshinobu Inoue first = 0; 1424c449e284SHajimu UMEMOTO if (gethostname(domain, sizeof(domain)) == 0 && 1425c449e284SHajimu UMEMOTO (cp = strchr(domain, '.'))) 142633841545SHajimu UMEMOTO (void) strlcpy(domain, cp + 1, sizeof(domain)); 14277d56d374SYoshinobu Inoue else 14287d56d374SYoshinobu Inoue domain[0] = 0; 14297d56d374SYoshinobu Inoue } 1430de68a0daSKris Kennaway cp = NULL; 14317d56d374SYoshinobu Inoue if (!nflag) { 1432de68a0daSKris Kennaway if (getnameinfo(sa, sa->sa_len, line, sizeof(line), NULL, 0, 1433de68a0daSKris Kennaway NI_NAMEREQD) == 0) { 1434c449e284SHajimu UMEMOTO if ((cp = strchr(line, '.')) && 14357d56d374SYoshinobu Inoue !strcmp(cp + 1, domain)) 14367d56d374SYoshinobu Inoue *cp = 0; 1437de68a0daSKris Kennaway cp = line; 14387d56d374SYoshinobu Inoue } 14397d56d374SYoshinobu Inoue } 14407d56d374SYoshinobu Inoue if (cp) 1441de68a0daSKris Kennaway return cp; 1442de68a0daSKris Kennaway 1443de68a0daSKris Kennaway if (getnameinfo(sa, sa->sa_len, line, sizeof(line), NULL, 0, 1444d24cb249SHajimu UMEMOTO NI_NUMERICHOST) != 0) 144533841545SHajimu UMEMOTO strlcpy(line, "invalid", sizeof(line)); 1446de68a0daSKris Kennaway return line; 14477d56d374SYoshinobu Inoue } 14487d56d374SYoshinobu Inoue 14497d56d374SYoshinobu Inoue void 14507d56d374SYoshinobu Inoue usage() 14517d56d374SYoshinobu Inoue { 145284a1a4cfSHajimu UMEMOTO 145384a1a4cfSHajimu UMEMOTO fprintf(stderr, 14540d7d117cSHajimu UMEMOTO "usage: traceroute6 [-adIlnNrUv] [-A as_server] [-f firsthop] [-g gateway]\n" 14550d7d117cSHajimu UMEMOTO " [-m hoplimit] [-p port] [-q probes] [-s src] [-w waittime] target\n" 14560d7d117cSHajimu UMEMOTO " [datalen]\n"); 14577d56d374SYoshinobu Inoue exit(1); 14587d56d374SYoshinobu Inoue } 1459