17d56d374SYoshinobu Inoue /* 27d56d374SYoshinobu Inoue * Copyright (C) 1995, 1996, 1997, and 1998 WIDE Project. 37d56d374SYoshinobu Inoue * All rights reserved. 47d56d374SYoshinobu Inoue * 57d56d374SYoshinobu Inoue * Redistribution and use in source and binary forms, with or without 67d56d374SYoshinobu Inoue * modification, are permitted provided that the following conditions 77d56d374SYoshinobu Inoue * are met: 87d56d374SYoshinobu Inoue * 1. Redistributions of source code must retain the above copyright 97d56d374SYoshinobu Inoue * notice, this list of conditions and the following disclaimer. 107d56d374SYoshinobu Inoue * 2. Redistributions in binary form must reproduce the above copyright 117d56d374SYoshinobu Inoue * notice, this list of conditions and the following disclaimer in the 127d56d374SYoshinobu Inoue * documentation and/or other materials provided with the distribution. 137d56d374SYoshinobu Inoue * 3. Neither the name of the project nor the names of its contributors 147d56d374SYoshinobu Inoue * may be used to endorse or promote products derived from this software 157d56d374SYoshinobu Inoue * without specific prior written permission. 167d56d374SYoshinobu Inoue * 177d56d374SYoshinobu Inoue * THIS SOFTWARE IS PROVIDED BY THE PROJECT AND CONTRIBUTORS ``AS IS'' AND 187d56d374SYoshinobu Inoue * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 197d56d374SYoshinobu Inoue * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 207d56d374SYoshinobu Inoue * ARE DISCLAIMED. IN NO EVENT SHALL THE PROJECT OR CONTRIBUTORS BE LIABLE 217d56d374SYoshinobu Inoue * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 227d56d374SYoshinobu Inoue * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 237d56d374SYoshinobu Inoue * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 247d56d374SYoshinobu Inoue * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 257d56d374SYoshinobu Inoue * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 267d56d374SYoshinobu Inoue * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 277d56d374SYoshinobu Inoue * SUCH DAMAGE. 287d56d374SYoshinobu Inoue * 297d56d374SYoshinobu Inoue * $FreeBSD$ 307d56d374SYoshinobu Inoue */ 317d56d374SYoshinobu Inoue 327d56d374SYoshinobu Inoue /*- 337d56d374SYoshinobu Inoue * Copyright (c) 1990, 1993 347d56d374SYoshinobu Inoue * The Regents of the University of California. All rights reserved. 357d56d374SYoshinobu Inoue * 367d56d374SYoshinobu Inoue * This code is derived from software contributed to Berkeley by 377d56d374SYoshinobu Inoue * Van Jacobson. 387d56d374SYoshinobu Inoue * 397d56d374SYoshinobu Inoue * Redistribution and use in source and binary forms, with or without 407d56d374SYoshinobu Inoue * modification, are permitted provided that the following conditions 417d56d374SYoshinobu Inoue * are met: 427d56d374SYoshinobu Inoue * 1. Redistributions of source code must retain the above copyright 437d56d374SYoshinobu Inoue * notice, this list of conditions and the following disclaimer. 447d56d374SYoshinobu Inoue * 2. Redistributions in binary form must reproduce the above copyright 457d56d374SYoshinobu Inoue * notice, this list of conditions and the following disclaimer in the 467d56d374SYoshinobu Inoue * documentation and/or other materials provided with the distribution. 477d56d374SYoshinobu Inoue * 3. All advertising materials mentioning features or use of this software 487d56d374SYoshinobu Inoue * must display the following acknowledgement: 497d56d374SYoshinobu Inoue * This product includes software developed by the University of 507d56d374SYoshinobu Inoue * California, Berkeley and its contributors. 517d56d374SYoshinobu Inoue * 4. Neither the name of the University nor the names of its contributors 527d56d374SYoshinobu Inoue * may be used to endorse or promote products derived from this software 537d56d374SYoshinobu Inoue * without specific prior written permission. 547d56d374SYoshinobu Inoue * 557d56d374SYoshinobu Inoue * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND 567d56d374SYoshinobu Inoue * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 577d56d374SYoshinobu Inoue * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 587d56d374SYoshinobu Inoue * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE 597d56d374SYoshinobu Inoue * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 607d56d374SYoshinobu Inoue * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 617d56d374SYoshinobu Inoue * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 627d56d374SYoshinobu Inoue * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 637d56d374SYoshinobu Inoue * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 647d56d374SYoshinobu Inoue * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 657d56d374SYoshinobu Inoue * SUCH DAMAGE. 667d56d374SYoshinobu Inoue */ 677d56d374SYoshinobu Inoue 687d56d374SYoshinobu Inoue #ifndef lint 697d56d374SYoshinobu Inoue static char copyright[] = 707d56d374SYoshinobu Inoue "@(#) Copyright (c) 1990, 1993\n\ 717d56d374SYoshinobu Inoue The Regents of the University of California. All rights reserved.\n"; 727d56d374SYoshinobu Inoue #endif /* not lint */ 737d56d374SYoshinobu Inoue 747d56d374SYoshinobu Inoue #ifndef lint 757d56d374SYoshinobu Inoue static char sccsid[] = "@(#)traceroute.c 8.1 (Berkeley) 6/6/93"; 767d56d374SYoshinobu Inoue #endif /* not lint */ 777d56d374SYoshinobu Inoue 787d56d374SYoshinobu Inoue /* 797d56d374SYoshinobu Inoue * traceroute host - trace the route ip packets follow going to "host". 807d56d374SYoshinobu Inoue * 817d56d374SYoshinobu Inoue * Attempt to trace the route an ip packet would follow to some 827d56d374SYoshinobu Inoue * internet host. We find out intermediate hops by launching probe 837d56d374SYoshinobu Inoue * packets with a small ttl (time to live) then listening for an 847d56d374SYoshinobu Inoue * icmp "time exceeded" reply from a gateway. We start our probes 857d56d374SYoshinobu Inoue * with a ttl of one and increase by one until we get an icmp "port 867d56d374SYoshinobu Inoue * unreachable" (which means we got to "host") or hit a max (which 877d56d374SYoshinobu Inoue * defaults to 30 hops & can be changed with the -m flag). Three 887d56d374SYoshinobu Inoue * probes (change with -q flag) are sent at each ttl setting and a 897d56d374SYoshinobu Inoue * line is printed showing the ttl, address of the gateway and 907d56d374SYoshinobu Inoue * round trip time of each probe. If the probe answers come from 917d56d374SYoshinobu Inoue * different gateways, the address of each responding system will 927d56d374SYoshinobu Inoue * be printed. If there is no response within a 5 sec. timeout 937d56d374SYoshinobu Inoue * interval (changed with the -w flag), a "*" is printed for that 947d56d374SYoshinobu Inoue * probe. 957d56d374SYoshinobu Inoue * 967d56d374SYoshinobu Inoue * Probe packets are UDP format. We don't want the destination 977d56d374SYoshinobu Inoue * host to process them so the destination port is set to an 987d56d374SYoshinobu Inoue * unlikely value (if some clod on the destination is using that 997d56d374SYoshinobu Inoue * value, it can be changed with the -p flag). 1007d56d374SYoshinobu Inoue * 1017d56d374SYoshinobu Inoue * A sample use might be: 1027d56d374SYoshinobu Inoue * 1037d56d374SYoshinobu Inoue * [yak 71]% traceroute nis.nsf.net. 1047d56d374SYoshinobu Inoue * traceroute to nis.nsf.net (35.1.1.48), 30 hops max, 56 byte packet 1057d56d374SYoshinobu Inoue * 1 helios.ee.lbl.gov (128.3.112.1) 19 ms 19 ms 0 ms 1067d56d374SYoshinobu Inoue * 2 lilac-dmc.Berkeley.EDU (128.32.216.1) 39 ms 39 ms 19 ms 1077d56d374SYoshinobu Inoue * 3 lilac-dmc.Berkeley.EDU (128.32.216.1) 39 ms 39 ms 19 ms 1087d56d374SYoshinobu Inoue * 4 ccngw-ner-cc.Berkeley.EDU (128.32.136.23) 39 ms 40 ms 39 ms 1097d56d374SYoshinobu Inoue * 5 ccn-nerif22.Berkeley.EDU (128.32.168.22) 39 ms 39 ms 39 ms 1107d56d374SYoshinobu Inoue * 6 128.32.197.4 (128.32.197.4) 40 ms 59 ms 59 ms 1117d56d374SYoshinobu Inoue * 7 131.119.2.5 (131.119.2.5) 59 ms 59 ms 59 ms 1127d56d374SYoshinobu Inoue * 8 129.140.70.13 (129.140.70.13) 99 ms 99 ms 80 ms 1137d56d374SYoshinobu Inoue * 9 129.140.71.6 (129.140.71.6) 139 ms 239 ms 319 ms 1147d56d374SYoshinobu Inoue * 10 129.140.81.7 (129.140.81.7) 220 ms 199 ms 199 ms 1157d56d374SYoshinobu Inoue * 11 nic.merit.edu (35.1.1.48) 239 ms 239 ms 239 ms 1167d56d374SYoshinobu Inoue * 1177d56d374SYoshinobu Inoue * Note that lines 2 & 3 are the same. This is due to a buggy 1187d56d374SYoshinobu Inoue * kernel on the 2nd hop system -- lbl-csam.arpa -- that forwards 1197d56d374SYoshinobu Inoue * packets with a zero ttl. 1207d56d374SYoshinobu Inoue * 1217d56d374SYoshinobu Inoue * A more interesting example is: 1227d56d374SYoshinobu Inoue * 1237d56d374SYoshinobu Inoue * [yak 72]% traceroute allspice.lcs.mit.edu. 1247d56d374SYoshinobu Inoue * traceroute to allspice.lcs.mit.edu (18.26.0.115), 30 hops max 1257d56d374SYoshinobu Inoue * 1 helios.ee.lbl.gov (128.3.112.1) 0 ms 0 ms 0 ms 1267d56d374SYoshinobu Inoue * 2 lilac-dmc.Berkeley.EDU (128.32.216.1) 19 ms 19 ms 19 ms 1277d56d374SYoshinobu Inoue * 3 lilac-dmc.Berkeley.EDU (128.32.216.1) 39 ms 19 ms 19 ms 1287d56d374SYoshinobu Inoue * 4 ccngw-ner-cc.Berkeley.EDU (128.32.136.23) 19 ms 39 ms 39 ms 1297d56d374SYoshinobu Inoue * 5 ccn-nerif22.Berkeley.EDU (128.32.168.22) 20 ms 39 ms 39 ms 1307d56d374SYoshinobu Inoue * 6 128.32.197.4 (128.32.197.4) 59 ms 119 ms 39 ms 1317d56d374SYoshinobu Inoue * 7 131.119.2.5 (131.119.2.5) 59 ms 59 ms 39 ms 1327d56d374SYoshinobu Inoue * 8 129.140.70.13 (129.140.70.13) 80 ms 79 ms 99 ms 1337d56d374SYoshinobu Inoue * 9 129.140.71.6 (129.140.71.6) 139 ms 139 ms 159 ms 1347d56d374SYoshinobu Inoue * 10 129.140.81.7 (129.140.81.7) 199 ms 180 ms 300 ms 1357d56d374SYoshinobu Inoue * 11 129.140.72.17 (129.140.72.17) 300 ms 239 ms 239 ms 1367d56d374SYoshinobu Inoue * 12 * * * 1377d56d374SYoshinobu Inoue * 13 128.121.54.72 (128.121.54.72) 259 ms 499 ms 279 ms 1387d56d374SYoshinobu Inoue * 14 * * * 1397d56d374SYoshinobu Inoue * 15 * * * 1407d56d374SYoshinobu Inoue * 16 * * * 1417d56d374SYoshinobu Inoue * 17 * * * 1427d56d374SYoshinobu Inoue * 18 ALLSPICE.LCS.MIT.EDU (18.26.0.115) 339 ms 279 ms 279 ms 1437d56d374SYoshinobu Inoue * 1447d56d374SYoshinobu Inoue * (I start to see why I'm having so much trouble with mail to 1457d56d374SYoshinobu Inoue * MIT.) Note that the gateways 12, 14, 15, 16 & 17 hops away 1467d56d374SYoshinobu Inoue * either don't send ICMP "time exceeded" messages or send them 1477d56d374SYoshinobu Inoue * with a ttl too small to reach us. 14 - 17 are running the 1487d56d374SYoshinobu Inoue * MIT C Gateway code that doesn't send "time exceeded"s. God 1497d56d374SYoshinobu Inoue * only knows what's going on with 12. 1507d56d374SYoshinobu Inoue * 1517d56d374SYoshinobu Inoue * The silent gateway 12 in the above may be the result of a bug in 1527d56d374SYoshinobu Inoue * the 4.[23]BSD network code (and its derivatives): 4.x (x <= 3) 1537d56d374SYoshinobu Inoue * sends an unreachable message using whatever ttl remains in the 1547d56d374SYoshinobu Inoue * original datagram. Since, for gateways, the remaining ttl is 1557d56d374SYoshinobu Inoue * zero, the icmp "time exceeded" is guaranteed to not make it back 1567d56d374SYoshinobu Inoue * to us. The behavior of this bug is slightly more interesting 1577d56d374SYoshinobu Inoue * when it appears on the destination system: 1587d56d374SYoshinobu Inoue * 1597d56d374SYoshinobu Inoue * 1 helios.ee.lbl.gov (128.3.112.1) 0 ms 0 ms 0 ms 1607d56d374SYoshinobu Inoue * 2 lilac-dmc.Berkeley.EDU (128.32.216.1) 39 ms 19 ms 39 ms 1617d56d374SYoshinobu Inoue * 3 lilac-dmc.Berkeley.EDU (128.32.216.1) 19 ms 39 ms 19 ms 1627d56d374SYoshinobu Inoue * 4 ccngw-ner-cc.Berkeley.EDU (128.32.136.23) 39 ms 40 ms 19 ms 1637d56d374SYoshinobu Inoue * 5 ccn-nerif35.Berkeley.EDU (128.32.168.35) 39 ms 39 ms 39 ms 1647d56d374SYoshinobu Inoue * 6 csgw.Berkeley.EDU (128.32.133.254) 39 ms 59 ms 39 ms 1657d56d374SYoshinobu Inoue * 7 * * * 1667d56d374SYoshinobu Inoue * 8 * * * 1677d56d374SYoshinobu Inoue * 9 * * * 1687d56d374SYoshinobu Inoue * 10 * * * 1697d56d374SYoshinobu Inoue * 11 * * * 1707d56d374SYoshinobu Inoue * 12 * * * 1717d56d374SYoshinobu Inoue * 13 rip.Berkeley.EDU (128.32.131.22) 59 ms ! 39 ms ! 39 ms ! 1727d56d374SYoshinobu Inoue * 1737d56d374SYoshinobu Inoue * Notice that there are 12 "gateways" (13 is the final 1747d56d374SYoshinobu Inoue * destination) and exactly the last half of them are "missing". 1757d56d374SYoshinobu Inoue * What's really happening is that rip (a Sun-3 running Sun OS3.5) 1767d56d374SYoshinobu Inoue * is using the ttl from our arriving datagram as the ttl in its 1777d56d374SYoshinobu Inoue * icmp reply. So, the reply will time out on the return path 1787d56d374SYoshinobu Inoue * (with no notice sent to anyone since icmp's aren't sent for 1797d56d374SYoshinobu Inoue * icmp's) until we probe with a ttl that's at least twice the path 1807d56d374SYoshinobu Inoue * length. I.e., rip is really only 7 hops away. A reply that 1817d56d374SYoshinobu Inoue * returns with a ttl of 1 is a clue this problem exists. 1827d56d374SYoshinobu Inoue * Traceroute prints a "!" after the time if the ttl is <= 1. 1837d56d374SYoshinobu Inoue * Since vendors ship a lot of obsolete (DEC's Ultrix, Sun 3.x) or 1847d56d374SYoshinobu Inoue * non-standard (HPUX) software, expect to see this problem 1857d56d374SYoshinobu Inoue * frequently and/or take care picking the target host of your 1867d56d374SYoshinobu Inoue * probes. 1877d56d374SYoshinobu Inoue * 1887d56d374SYoshinobu Inoue * Other possible annotations after the time are !H, !N, !P (got a host, 1897d56d374SYoshinobu Inoue * network or protocol unreachable, respectively), !S or !F (source 1907d56d374SYoshinobu Inoue * route failed or fragmentation needed -- neither of these should 1917d56d374SYoshinobu Inoue * ever occur and the associated gateway is busted if you see one). If 1927d56d374SYoshinobu Inoue * almost all the probes result in some kind of unreachable, traceroute 1937d56d374SYoshinobu Inoue * will give up and exit. 1947d56d374SYoshinobu Inoue * 1957d56d374SYoshinobu Inoue * Notes 1967d56d374SYoshinobu Inoue * ----- 1977d56d374SYoshinobu Inoue * This program must be run by root or be setuid. (I suggest that 1987d56d374SYoshinobu Inoue * you *don't* make it setuid -- casual use could result in a lot 1997d56d374SYoshinobu Inoue * of unnecessary traffic on our poor, congested nets.) 2007d56d374SYoshinobu Inoue * 2017d56d374SYoshinobu Inoue * This program requires a kernel mod that does not appear in any 2027d56d374SYoshinobu Inoue * system available from Berkeley: A raw ip socket using proto 2037d56d374SYoshinobu Inoue * IPPROTO_RAW must interpret the data sent as an ip datagram (as 2047d56d374SYoshinobu Inoue * opposed to data to be wrapped in a ip datagram). See the README 2057d56d374SYoshinobu Inoue * file that came with the source to this program for a description 2067d56d374SYoshinobu Inoue * of the mods I made to /sys/netinet/raw_ip.c. Your mileage may 2077d56d374SYoshinobu Inoue * vary. But, again, ANY 4.x (x < 4) BSD KERNEL WILL HAVE TO BE 2087d56d374SYoshinobu Inoue * MODIFIED TO RUN THIS PROGRAM. 2097d56d374SYoshinobu Inoue * 2107d56d374SYoshinobu Inoue * The udp port usage may appear bizarre (well, ok, it is bizarre). 2117d56d374SYoshinobu Inoue * The problem is that an icmp message only contains 8 bytes of 2127d56d374SYoshinobu Inoue * data from the original datagram. 8 bytes is the size of a udp 2137d56d374SYoshinobu Inoue * header so, if we want to associate replies with the original 2147d56d374SYoshinobu Inoue * datagram, the necessary information must be encoded into the 2157d56d374SYoshinobu Inoue * udp header (the ip id could be used but there's no way to 2167d56d374SYoshinobu Inoue * interlock with the kernel's assignment of ip id's and, anyway, 2177d56d374SYoshinobu Inoue * it would have taken a lot more kernel hacking to allow this 2187d56d374SYoshinobu Inoue * code to set the ip id). So, to allow two or more users to 2197d56d374SYoshinobu Inoue * use traceroute simultaneously, we use this task's pid as the 2207d56d374SYoshinobu Inoue * source port (the high bit is set to move the port number out 2217d56d374SYoshinobu Inoue * of the "likely" range). To keep track of which probe is being 2227d56d374SYoshinobu Inoue * replied to (so times and/or hop counts don't get confused by a 2237d56d374SYoshinobu Inoue * reply that was delayed in transit), we increment the destination 2247d56d374SYoshinobu Inoue * port number before each probe. 2257d56d374SYoshinobu Inoue * 2267d56d374SYoshinobu Inoue * Don't use this as a coding example. I was trying to find a 2277d56d374SYoshinobu Inoue * routing problem and this code sort-of popped out after 48 hours 2287d56d374SYoshinobu Inoue * without sleep. I was amazed it ever compiled, much less ran. 2297d56d374SYoshinobu Inoue * 2307d56d374SYoshinobu Inoue * I stole the idea for this program from Steve Deering. Since 2317d56d374SYoshinobu Inoue * the first release, I've learned that had I attended the right 2327d56d374SYoshinobu Inoue * IETF working group meetings, I also could have stolen it from Guy 2337d56d374SYoshinobu Inoue * Almes or Matt Mathis. I don't know (or care) who came up with 2347d56d374SYoshinobu Inoue * the idea first. I envy the originators' perspicacity and I'm 2357d56d374SYoshinobu Inoue * glad they didn't keep the idea a secret. 2367d56d374SYoshinobu Inoue * 2377d56d374SYoshinobu Inoue * Tim Seaver, Ken Adelman and C. Philip Wood provided bug fixes and/or 2387d56d374SYoshinobu Inoue * enhancements to the original distribution. 2397d56d374SYoshinobu Inoue * 2407d56d374SYoshinobu Inoue * I've hacked up a round-trip-route version of this that works by 2417d56d374SYoshinobu Inoue * sending a loose-source-routed udp datagram through the destination 2427d56d374SYoshinobu Inoue * back to yourself. Unfortunately, SO many gateways botch source 2437d56d374SYoshinobu Inoue * routing, the thing is almost worthless. Maybe one day... 2447d56d374SYoshinobu Inoue * 2457d56d374SYoshinobu Inoue * -- Van Jacobson (van@helios.ee.lbl.gov) 2467d56d374SYoshinobu Inoue * Tue Dec 20 03:50:13 PST 1988 2477d56d374SYoshinobu Inoue */ 2487d56d374SYoshinobu Inoue 2497d56d374SYoshinobu Inoue #include <sys/param.h> 2507d56d374SYoshinobu Inoue #include <sys/time.h> 2517d56d374SYoshinobu Inoue #include <sys/socket.h> 2527d56d374SYoshinobu Inoue #include <sys/uio.h> 2537d56d374SYoshinobu Inoue #include <sys/file.h> 2547d56d374SYoshinobu Inoue #include <sys/ioctl.h> 2557d56d374SYoshinobu Inoue 2567d56d374SYoshinobu Inoue #include <netinet/in.h> 2577d56d374SYoshinobu Inoue 2587d56d374SYoshinobu Inoue #include <arpa/inet.h> 2597d56d374SYoshinobu Inoue 2607d56d374SYoshinobu Inoue #include <netdb.h> 2617d56d374SYoshinobu Inoue #include <stdio.h> 2627d56d374SYoshinobu Inoue #include <err.h> 2637d56d374SYoshinobu Inoue #include <errno.h> 2647d56d374SYoshinobu Inoue #include <stdlib.h> 2657d56d374SYoshinobu Inoue #include <string.h> 2667d56d374SYoshinobu Inoue #include <unistd.h> 2677d56d374SYoshinobu Inoue 2687d56d374SYoshinobu Inoue #include <netinet/ip6.h> 2697d56d374SYoshinobu Inoue #include <netinet/icmp6.h> 2707d56d374SYoshinobu Inoue #include <netinet/udp.h> 2717d56d374SYoshinobu Inoue 2727d56d374SYoshinobu Inoue #ifdef IPSEC 2737d56d374SYoshinobu Inoue #include <net/route.h> 2747d56d374SYoshinobu Inoue #include <netinet6/ipsec.h> 2757d56d374SYoshinobu Inoue #endif 2767d56d374SYoshinobu Inoue 2777d56d374SYoshinobu Inoue #define freehostent(hp) 2787d56d374SYoshinobu Inoue #define DUMMY_PORT 10010 2797d56d374SYoshinobu Inoue 2807d56d374SYoshinobu Inoue #define MAXPACKET 65535 /* max ip packet size */ 2817d56d374SYoshinobu Inoue #ifndef MAXHOSTNAMELEN 2827d56d374SYoshinobu Inoue #define MAXHOSTNAMELEN 64 2837d56d374SYoshinobu Inoue #endif 2847d56d374SYoshinobu Inoue 2857d56d374SYoshinobu Inoue #ifndef FD_SET 2867d56d374SYoshinobu Inoue #define NFDBITS (8*sizeof(fd_set)) 2877d56d374SYoshinobu Inoue #define FD_SETSIZE NFDBITS 2887d56d374SYoshinobu Inoue #define FD_SET(n, p) ((p)->fds_bits[(n)/NFDBITS] |= (1 << ((n) % NFDBITS))) 2897d56d374SYoshinobu Inoue #define FD_CLR(n, p) ((p)->fds_bits[(n)/NFDBITS] &= ~(1 << ((n) % NFDBITS))) 2907d56d374SYoshinobu Inoue #define FD_ISSET(n, p) ((p)->fds_bits[(n)/NFDBITS] & (1 << ((n) % NFDBITS))) 2917d56d374SYoshinobu Inoue #define FD_ZERO(p) bzero((char *)(p), sizeof(*(p))) 2927d56d374SYoshinobu Inoue #endif 2937d56d374SYoshinobu Inoue 2947d56d374SYoshinobu Inoue #define Fprintf (void)fprintf 2957d56d374SYoshinobu Inoue #define Sprintf (void)sprintf 2967d56d374SYoshinobu Inoue #define Printf (void)printf 2977d56d374SYoshinobu Inoue 2987d56d374SYoshinobu Inoue /* 2997d56d374SYoshinobu Inoue * format of a (udp) probe packet. 3007d56d374SYoshinobu Inoue */ 3017d56d374SYoshinobu Inoue struct opacket { 3027d56d374SYoshinobu Inoue u_char seq; /* sequence number of this packet */ 3037d56d374SYoshinobu Inoue u_char hops; /* hop limit of the packet */ 3047d56d374SYoshinobu Inoue struct timeval tv; /* time packet left */ 3057d56d374SYoshinobu Inoue }; 3067d56d374SYoshinobu Inoue 3077d56d374SYoshinobu Inoue u_char packet[512]; /* last inbound (icmp) packet */ 3087d56d374SYoshinobu Inoue struct opacket *outpacket; /* last output (udp) packet */ 3097d56d374SYoshinobu Inoue 3107d56d374SYoshinobu Inoue int main __P((int, char *[])); 3117d56d374SYoshinobu Inoue int wait_for_reply __P((int, struct msghdr *)); 3127d56d374SYoshinobu Inoue int setpolicy __P((int so, char *policy)); 3137d56d374SYoshinobu Inoue void send_probe __P((int, int)); 3147d56d374SYoshinobu Inoue struct udphdr *get_udphdr __P((struct ip6_hdr *, u_char *)); 3157d56d374SYoshinobu Inoue int get_hoplim __P((struct msghdr *)); 3167d56d374SYoshinobu Inoue double deltaT __P((struct timeval *, struct timeval *)); 3177d56d374SYoshinobu Inoue char *pr_type __P((int)); 3187d56d374SYoshinobu Inoue int packet_ok __P((struct msghdr *, int, int)); 3197d56d374SYoshinobu Inoue void print __P((struct msghdr *, int)); 3207d56d374SYoshinobu Inoue void tvsub __P((struct timeval *, struct timeval *)); 3217d56d374SYoshinobu Inoue char *inetname __P((struct in6_addr *)); 3227d56d374SYoshinobu Inoue void usage __P((void)); 3237d56d374SYoshinobu Inoue 3247d56d374SYoshinobu Inoue int rcvsock; /* receive (icmp) socket file descriptor */ 3257d56d374SYoshinobu Inoue int sndsock; /* send (udp) socket file descriptor */ 3267d56d374SYoshinobu Inoue struct timezone tz; /* leftover */ 3277d56d374SYoshinobu Inoue 3287d56d374SYoshinobu Inoue struct msghdr rcvmhdr; 3297d56d374SYoshinobu Inoue struct iovec rcviov[2]; 3307d56d374SYoshinobu Inoue int rcvhlim; 3317d56d374SYoshinobu Inoue struct in6_pktinfo *rcvpktinfo; 3327d56d374SYoshinobu Inoue 3337d56d374SYoshinobu Inoue struct sockaddr_in6 Src, Dst, Rcv; 3347d56d374SYoshinobu Inoue struct sockaddr_in6 *src = &Src, *dst = &Dst, *rcv = &Rcv; 3357d56d374SYoshinobu Inoue int datalen; /* How much data */ 3367d56d374SYoshinobu Inoue char rtbuf[1024]; /*XXX*/ 3377d56d374SYoshinobu Inoue struct cmsghdr *cmsg; 3387d56d374SYoshinobu Inoue 3397d56d374SYoshinobu Inoue char *source = 0; 3407d56d374SYoshinobu Inoue char *hostname; 3417d56d374SYoshinobu Inoue 3427d56d374SYoshinobu Inoue int nprobes = 3; 3437d56d374SYoshinobu Inoue int max_hops = 30; 3447d56d374SYoshinobu Inoue u_short ident; 3457d56d374SYoshinobu Inoue u_short port = 32768+666; /* start udp dest port # for probe packets */ 3467d56d374SYoshinobu Inoue int options; /* socket options */ 3477d56d374SYoshinobu Inoue int verbose; 3487d56d374SYoshinobu Inoue int waittime = 5; /* time to wait for response (in seconds) */ 3497d56d374SYoshinobu Inoue int nflag; /* print addresses numerically */ 3507d56d374SYoshinobu Inoue int lflag; /* print both numerical address & hostname */ 3517d56d374SYoshinobu Inoue 3527d56d374SYoshinobu Inoue char ntop_buf[INET6_ADDRSTRLEN]; /* for inet_ntop() */ 3537d56d374SYoshinobu Inoue 3547d56d374SYoshinobu Inoue int 3557d56d374SYoshinobu Inoue main(argc, argv) 3567d56d374SYoshinobu Inoue int argc; 3577d56d374SYoshinobu Inoue char *argv[]; 3587d56d374SYoshinobu Inoue { 3597d56d374SYoshinobu Inoue extern char *optarg; 3607d56d374SYoshinobu Inoue extern int optind; 3617d56d374SYoshinobu Inoue struct hostent *hp; 36239865d64SYoshinobu Inoue struct addrinfo hints, *res; 36339865d64SYoshinobu Inoue int error; 3647d56d374SYoshinobu Inoue int ch, i, on, probe, seq, hops; 3657d56d374SYoshinobu Inoue static u_char rcvcmsgbuf[CMSG_SPACE(sizeof(struct in6_pktinfo)) 3667d56d374SYoshinobu Inoue + CMSG_SPACE(sizeof(int))]; 3677d56d374SYoshinobu Inoue 36853c9088fSYoshinobu Inoue /* 36953c9088fSYoshinobu Inoue * Receive ICMP 37053c9088fSYoshinobu Inoue */ 37153c9088fSYoshinobu Inoue if ((rcvsock = socket(AF_INET6, SOCK_RAW, IPPROTO_ICMPV6)) < 0) { 37253c9088fSYoshinobu Inoue perror("traceroute6: icmp socket"); 37353c9088fSYoshinobu Inoue exit(5); 37453c9088fSYoshinobu Inoue } 37553c9088fSYoshinobu Inoue setuid(getuid()); 37653c9088fSYoshinobu Inoue 3777d56d374SYoshinobu Inoue on = 1; 3787d56d374SYoshinobu Inoue seq = 0; 3797d56d374SYoshinobu Inoue 3807d56d374SYoshinobu Inoue while ((ch = getopt(argc, argv, "dlm:np:q:rs:w:vg:")) != EOF) 3817d56d374SYoshinobu Inoue switch(ch) { 3827d56d374SYoshinobu Inoue case 'd': 3837d56d374SYoshinobu Inoue options |= SO_DEBUG; 3847d56d374SYoshinobu Inoue break; 3857d56d374SYoshinobu Inoue case 'l': 3867d56d374SYoshinobu Inoue lflag++; 3877d56d374SYoshinobu Inoue break; 3887d56d374SYoshinobu Inoue case 'g': 3897d56d374SYoshinobu Inoue hp = getipnodebyname(optarg, AF_INET6, 0, &h_errno); 3907d56d374SYoshinobu Inoue if (hp == NULL) { 3917d56d374SYoshinobu Inoue Fprintf(stderr, 3927d56d374SYoshinobu Inoue "traceroute6: unknown host %s\n", optarg); 3937d56d374SYoshinobu Inoue exit(1); 3947d56d374SYoshinobu Inoue } 3957d56d374SYoshinobu Inoue if (cmsg == NULL) 3967d56d374SYoshinobu Inoue cmsg = inet6_rthdr_init(rtbuf, IPV6_RTHDR_TYPE_0); 3977d56d374SYoshinobu Inoue inet6_rthdr_add(cmsg, (struct in6_addr *)hp->h_addr, IPV6_RTHDR_LOOSE); 3987d56d374SYoshinobu Inoue break; 3997d56d374SYoshinobu Inoue case 'm': 4007d56d374SYoshinobu Inoue max_hops = atoi(optarg); 4017d56d374SYoshinobu Inoue if (max_hops <= 1) { 4027d56d374SYoshinobu Inoue Fprintf(stderr, 4037d56d374SYoshinobu Inoue "traceroute6: max hoplimit must be >1.\n"); 4047d56d374SYoshinobu Inoue exit(1); 4057d56d374SYoshinobu Inoue } 4067d56d374SYoshinobu Inoue break; 4077d56d374SYoshinobu Inoue case 'n': 4087d56d374SYoshinobu Inoue nflag++; 4097d56d374SYoshinobu Inoue break; 4107d56d374SYoshinobu Inoue case 'p': 4117d56d374SYoshinobu Inoue port = atoi(optarg); 4127d56d374SYoshinobu Inoue if (port < 1) { 4137d56d374SYoshinobu Inoue Fprintf(stderr, 4147d56d374SYoshinobu Inoue "traceroute6: port must be >0.\n"); 4157d56d374SYoshinobu Inoue exit(1); 4167d56d374SYoshinobu Inoue } 4177d56d374SYoshinobu Inoue break; 4187d56d374SYoshinobu Inoue case 'q': 4197d56d374SYoshinobu Inoue nprobes = atoi(optarg); 4207d56d374SYoshinobu Inoue if (nprobes < 1) { 4217d56d374SYoshinobu Inoue Fprintf(stderr, 4227d56d374SYoshinobu Inoue "traceroute6: nprobes must be >0.\n"); 4237d56d374SYoshinobu Inoue exit(1); 4247d56d374SYoshinobu Inoue } 4257d56d374SYoshinobu Inoue break; 4267d56d374SYoshinobu Inoue case 'r': 4277d56d374SYoshinobu Inoue options |= SO_DONTROUTE; 4287d56d374SYoshinobu Inoue break; 4297d56d374SYoshinobu Inoue case 's': 4307d56d374SYoshinobu Inoue /* 4317d56d374SYoshinobu Inoue * set the ip source address of the outbound 4327d56d374SYoshinobu Inoue * probe (e.g., on a multi-homed host). 4337d56d374SYoshinobu Inoue */ 4347d56d374SYoshinobu Inoue source = optarg; 4357d56d374SYoshinobu Inoue break; 4367d56d374SYoshinobu Inoue case 'v': 4377d56d374SYoshinobu Inoue verbose++; 4387d56d374SYoshinobu Inoue break; 4397d56d374SYoshinobu Inoue case 'w': 4407d56d374SYoshinobu Inoue waittime = atoi(optarg); 4417d56d374SYoshinobu Inoue if (waittime <= 1) { 4427d56d374SYoshinobu Inoue Fprintf(stderr, 4437d56d374SYoshinobu Inoue "traceroute6: wait must be >1 sec.\n"); 4447d56d374SYoshinobu Inoue exit(1); 4457d56d374SYoshinobu Inoue } 4467d56d374SYoshinobu Inoue break; 4477d56d374SYoshinobu Inoue default: 4487d56d374SYoshinobu Inoue usage(); 4497d56d374SYoshinobu Inoue } 4507d56d374SYoshinobu Inoue argc -= optind; 4517d56d374SYoshinobu Inoue argv += optind; 4527d56d374SYoshinobu Inoue 4537d56d374SYoshinobu Inoue if (argc < 1) 4547d56d374SYoshinobu Inoue usage(); 4557d56d374SYoshinobu Inoue 4567d56d374SYoshinobu Inoue setvbuf(stdout, NULL, _IOLBF, BUFSIZ); 4577d56d374SYoshinobu Inoue 45839865d64SYoshinobu Inoue memset(&hints, 0, sizeof(hints)); 45939865d64SYoshinobu Inoue hints.ai_family = PF_INET6; 46039865d64SYoshinobu Inoue hints.ai_socktype = SOCK_RAW; 46139865d64SYoshinobu Inoue hints.ai_protocol = IPPROTO_ICMPV6; 46239865d64SYoshinobu Inoue hints.ai_flags = AI_CANONNAME; 46339865d64SYoshinobu Inoue error = getaddrinfo(*argv, NULL, &hints, &res); 46439865d64SYoshinobu Inoue if (error) { 4657d56d374SYoshinobu Inoue (void)fprintf(stderr, 46639865d64SYoshinobu Inoue "traceroute6: %s\n", gai_strerror(error)); 46739865d64SYoshinobu Inoue if (error == EAI_SYSTEM) 46839865d64SYoshinobu Inoue (void)fprintf(stderr, 46939865d64SYoshinobu Inoue "traceroute6: %s\n", strerror(errno)); 4707d56d374SYoshinobu Inoue exit(1); 4717d56d374SYoshinobu Inoue } 47239865d64SYoshinobu Inoue if (!res->ai_addr) 47339865d64SYoshinobu Inoue errx(1, "getaddrinfo failed"); 47439865d64SYoshinobu Inoue memcpy(&Dst, res->ai_addr, res->ai_addrlen); 47539865d64SYoshinobu Inoue hostname = res->ai_canonname ? strdup(res->ai_canonname) : *argv; 47639865d64SYoshinobu Inoue freeaddrinfo(res); 4777d56d374SYoshinobu Inoue 4787d56d374SYoshinobu Inoue if (*++argv) 4797d56d374SYoshinobu Inoue datalen = atoi(*argv); 4807d56d374SYoshinobu Inoue if (datalen < 0 || datalen >= MAXPACKET - sizeof(struct opacket)) { 4817d56d374SYoshinobu Inoue Fprintf(stderr, 4827d56d374SYoshinobu Inoue "traceroute6: packet size must be 0 <= s < %ld.\n", 4837d56d374SYoshinobu Inoue (long)(MAXPACKET - sizeof(struct opacket))); 4847d56d374SYoshinobu Inoue exit(1); 4857d56d374SYoshinobu Inoue } 4867d56d374SYoshinobu Inoue datalen += sizeof(struct opacket); 4877d56d374SYoshinobu Inoue outpacket = (struct opacket *)malloc((unsigned)datalen); 4887d56d374SYoshinobu Inoue if (! outpacket) { 4897d56d374SYoshinobu Inoue perror("traceroute6: malloc"); 4907d56d374SYoshinobu Inoue exit(1); 4917d56d374SYoshinobu Inoue } 4927d56d374SYoshinobu Inoue (void) bzero((char *)outpacket, datalen); 4937d56d374SYoshinobu Inoue 4947d56d374SYoshinobu Inoue /* initialize msghdr for receiving packets */ 4957d56d374SYoshinobu Inoue rcviov[0].iov_base = (caddr_t)packet; 4967d56d374SYoshinobu Inoue rcviov[0].iov_len = sizeof(packet); 4977d56d374SYoshinobu Inoue rcvmhdr.msg_name = (caddr_t)rcv; 4987d56d374SYoshinobu Inoue rcvmhdr.msg_namelen = sizeof(*rcv); 4997d56d374SYoshinobu Inoue rcvmhdr.msg_iov = rcviov; 5007d56d374SYoshinobu Inoue rcvmhdr.msg_iovlen = 1; 5017d56d374SYoshinobu Inoue rcvmhdr.msg_control = (caddr_t) rcvcmsgbuf; 5027d56d374SYoshinobu Inoue rcvmhdr.msg_controllen = sizeof(rcvcmsgbuf); 5037d56d374SYoshinobu Inoue 5047d56d374SYoshinobu Inoue /* specify to tell receiving interface */ 5057d56d374SYoshinobu Inoue if (setsockopt(rcvsock, IPPROTO_IPV6, IPV6_PKTINFO, &on, 5067d56d374SYoshinobu Inoue sizeof(on)) < 0) 5077d56d374SYoshinobu Inoue err(1, "setsockopt(IPV6_PKTINFO)"); 5087d56d374SYoshinobu Inoue 5097d56d374SYoshinobu Inoue /* specify to tell value of hoplimit field of received IP6 hdr */ 5107d56d374SYoshinobu Inoue if (setsockopt(rcvsock, IPPROTO_IPV6, IPV6_HOPLIMIT, &on, 5117d56d374SYoshinobu Inoue sizeof(on)) < 0) 5127d56d374SYoshinobu Inoue err(1, "setsockopt(IPV6_HOPLIMIT)"); 5137d56d374SYoshinobu Inoue 5147d56d374SYoshinobu Inoue if (options & SO_DEBUG) 5157d56d374SYoshinobu Inoue (void) setsockopt(rcvsock, SOL_SOCKET, SO_DEBUG, 5167d56d374SYoshinobu Inoue (char *)&on, sizeof(on)); 5177d56d374SYoshinobu Inoue if (options & SO_DONTROUTE) 5187d56d374SYoshinobu Inoue (void) setsockopt(rcvsock, SOL_SOCKET, SO_DONTROUTE, 5197d56d374SYoshinobu Inoue (char *)&on, sizeof(on)); 5207d56d374SYoshinobu Inoue #ifdef IPSEC 5217d56d374SYoshinobu Inoue #ifdef IPSEC_POLICY_IPSEC 5227d56d374SYoshinobu Inoue /* 5237d56d374SYoshinobu Inoue * do not raise error even if setsockopt fails, kernel may have ipsec 5247d56d374SYoshinobu Inoue * turned off. 5257d56d374SYoshinobu Inoue */ 5267d56d374SYoshinobu Inoue if (setpolicy(rcvsock, "in bypass") < 0) 5277d56d374SYoshinobu Inoue errx(1, ipsec_strerror()); 5287d56d374SYoshinobu Inoue if (setpolicy(rcvsock, "out bypass") < 0) 5297d56d374SYoshinobu Inoue errx(1, ipsec_strerror()); 5307d56d374SYoshinobu Inoue #endif /*IPSEC_POLICY_IPSEC*/ 5317d56d374SYoshinobu Inoue #endif /*IPSEC*/ 5327d56d374SYoshinobu Inoue 5337d56d374SYoshinobu Inoue /* 5347d56d374SYoshinobu Inoue * Send UDP 5357d56d374SYoshinobu Inoue */ 5367d56d374SYoshinobu Inoue if ((sndsock = socket(AF_INET6, SOCK_DGRAM, 0)) < 0) { 5377d56d374SYoshinobu Inoue perror("traceroute6: udp socket"); 5387d56d374SYoshinobu Inoue exit(5); 5397d56d374SYoshinobu Inoue } 5407d56d374SYoshinobu Inoue if (setsockopt(sndsock, SOL_SOCKET, SO_SNDBUF, (char *)&datalen, 5417d56d374SYoshinobu Inoue sizeof(datalen)) < 0) { 5427d56d374SYoshinobu Inoue perror("traceroute6: SO_SNDBUF"); 5437d56d374SYoshinobu Inoue exit(6); 5447d56d374SYoshinobu Inoue } 5457d56d374SYoshinobu Inoue if (options & SO_DEBUG) 5467d56d374SYoshinobu Inoue (void) setsockopt(sndsock, SOL_SOCKET, SO_DEBUG, 5477d56d374SYoshinobu Inoue (char *)&on, sizeof(on)); 5487d56d374SYoshinobu Inoue if (options & SO_DONTROUTE) 5497d56d374SYoshinobu Inoue (void) setsockopt(sndsock, SOL_SOCKET, SO_DONTROUTE, 5507d56d374SYoshinobu Inoue (char *)&on, sizeof(on)); 5517d56d374SYoshinobu Inoue if (cmsg != NULL) { 5527d56d374SYoshinobu Inoue inet6_rthdr_lasthop(cmsg, IPV6_RTHDR_LOOSE); 5537d56d374SYoshinobu Inoue (void) setsockopt(sndsock, IPPROTO_IPV6, IPV6_PKTOPTIONS, 5547d56d374SYoshinobu Inoue rtbuf, cmsg->cmsg_len); 5557d56d374SYoshinobu Inoue } 5567d56d374SYoshinobu Inoue #ifdef IPSEC 5577d56d374SYoshinobu Inoue #ifdef IPSEC_POLICY_IPSEC 5587d56d374SYoshinobu Inoue /* 5597d56d374SYoshinobu Inoue * do not raise error even if setsockopt fails, kernel may have ipsec 5607d56d374SYoshinobu Inoue * turned off. 5617d56d374SYoshinobu Inoue */ 5627d56d374SYoshinobu Inoue if (setpolicy(sndsock, "in bypass") < 0) 5637d56d374SYoshinobu Inoue errx(1, ipsec_strerror()); 5647d56d374SYoshinobu Inoue if (setpolicy(sndsock, "out bypass") < 0) 5657d56d374SYoshinobu Inoue errx(1, ipsec_strerror()); 5667d56d374SYoshinobu Inoue #endif /*IPSEC_POLICY_IPSEC*/ 5677d56d374SYoshinobu Inoue #endif /*IPSEC*/ 5687d56d374SYoshinobu Inoue 5697d56d374SYoshinobu Inoue /* 5707d56d374SYoshinobu Inoue * Source selection 5717d56d374SYoshinobu Inoue */ 5727d56d374SYoshinobu Inoue bzero((char *)src, sizeof(Src)); 5737d56d374SYoshinobu Inoue if (source) { 5747d56d374SYoshinobu Inoue if (inet_pton(AF_INET6, source, &Src.sin6_addr) != 1) { 5757d56d374SYoshinobu Inoue Printf("traceroute6: unknown host %s\n", source); 5767d56d374SYoshinobu Inoue exit(1); 5777d56d374SYoshinobu Inoue } 5787d56d374SYoshinobu Inoue } else { 5797d56d374SYoshinobu Inoue struct sockaddr_in6 Nxt; 5807d56d374SYoshinobu Inoue int dummy, len; 5817d56d374SYoshinobu Inoue 5827d56d374SYoshinobu Inoue len = sizeof(Src); 5837d56d374SYoshinobu Inoue Nxt = Dst; 5847d56d374SYoshinobu Inoue Nxt.sin6_port = htons(DUMMY_PORT); 5857d56d374SYoshinobu Inoue if (cmsg != NULL) 5867d56d374SYoshinobu Inoue bcopy(inet6_rthdr_getaddr(cmsg, 1), &Nxt.sin6_addr, 5877d56d374SYoshinobu Inoue sizeof(Nxt.sin6_addr)); 5887d56d374SYoshinobu Inoue if ((dummy = socket(AF_INET6, SOCK_DGRAM, 0)) < 0) { 5897d56d374SYoshinobu Inoue perror("socket") ; 5907d56d374SYoshinobu Inoue } 5917d56d374SYoshinobu Inoue if(-1 == connect(dummy, (struct sockaddr *)&Nxt, sizeof(Nxt))) 5927d56d374SYoshinobu Inoue perror("connect"); 5937d56d374SYoshinobu Inoue if(-1 == getsockname(dummy, (struct sockaddr *)src, &len)) { 5947d56d374SYoshinobu Inoue perror("getsockname"); 5957d56d374SYoshinobu Inoue printf("%d\n", errno); 5967d56d374SYoshinobu Inoue } 5977d56d374SYoshinobu Inoue close(dummy) ; 5987d56d374SYoshinobu Inoue } 5997d56d374SYoshinobu Inoue ident = (getpid() & 0xffff) | 0x8000; 6007d56d374SYoshinobu Inoue Src.sin6_family = AF_INET6; 6017d56d374SYoshinobu Inoue Src.sin6_port = htons(ident); 6027d56d374SYoshinobu Inoue if (bind(sndsock, (struct sockaddr *)src, sizeof(Src)) < 0){ 6037d56d374SYoshinobu Inoue perror ("traceroute6: bind:"); 6047d56d374SYoshinobu Inoue exit (1); 6057d56d374SYoshinobu Inoue } 6067d56d374SYoshinobu Inoue 6077d56d374SYoshinobu Inoue /* 6087d56d374SYoshinobu Inoue * Message to users 6097d56d374SYoshinobu Inoue */ 6107d56d374SYoshinobu Inoue Fprintf(stderr, "traceroute to %s (%s)", hostname, 6117d56d374SYoshinobu Inoue inet_ntop(AF_INET6, &Dst.sin6_addr, 6127d56d374SYoshinobu Inoue ntop_buf, sizeof(ntop_buf))); 6137d56d374SYoshinobu Inoue if (source) 6147d56d374SYoshinobu Inoue Fprintf(stderr, " from %s", source); 6157d56d374SYoshinobu Inoue Fprintf(stderr, ", %d hops max, %d byte packets\n", max_hops, datalen); 6167d56d374SYoshinobu Inoue (void) fflush(stderr); 6177d56d374SYoshinobu Inoue 6187d56d374SYoshinobu Inoue /* 6197d56d374SYoshinobu Inoue * Main loop 6207d56d374SYoshinobu Inoue */ 6217d56d374SYoshinobu Inoue for (hops = 1; hops <= max_hops; ++hops) { 6227d56d374SYoshinobu Inoue struct in6_addr lastaddr; 6237d56d374SYoshinobu Inoue int got_there = 0; 6247d56d374SYoshinobu Inoue int unreachable = 0; 6257d56d374SYoshinobu Inoue 6267d56d374SYoshinobu Inoue Printf("%2d ", hops); 6277d56d374SYoshinobu Inoue bzero(&lastaddr, sizeof(lastaddr)); 6287d56d374SYoshinobu Inoue for (probe = 0; probe < nprobes; ++probe) { 6297d56d374SYoshinobu Inoue int cc; 6307d56d374SYoshinobu Inoue struct timeval t1, t2; 6317d56d374SYoshinobu Inoue struct timezone tz; 6327d56d374SYoshinobu Inoue 6337d56d374SYoshinobu Inoue (void) gettimeofday(&t1, &tz); 6347d56d374SYoshinobu Inoue send_probe(++seq, hops); 6357d56d374SYoshinobu Inoue while ((cc = wait_for_reply(rcvsock, &rcvmhdr))) { 6367d56d374SYoshinobu Inoue (void) gettimeofday(&t2, &tz); 6377d56d374SYoshinobu Inoue if ((i = packet_ok(&rcvmhdr, cc, seq))) { 6387d56d374SYoshinobu Inoue if (! IN6_ARE_ADDR_EQUAL(&Rcv.sin6_addr, 6397d56d374SYoshinobu Inoue &lastaddr)) { 6407d56d374SYoshinobu Inoue print(&rcvmhdr, cc); 6417d56d374SYoshinobu Inoue lastaddr = Rcv.sin6_addr; 6427d56d374SYoshinobu Inoue } 6437d56d374SYoshinobu Inoue Printf(" %g ms", deltaT(&t1, &t2)); 6447d56d374SYoshinobu Inoue switch(i - 1) { 6457d56d374SYoshinobu Inoue case ICMP6_DST_UNREACH_NOROUTE: 6467d56d374SYoshinobu Inoue ++unreachable; 6477d56d374SYoshinobu Inoue Printf(" !N"); 6487d56d374SYoshinobu Inoue break; 6497d56d374SYoshinobu Inoue case ICMP6_DST_UNREACH_ADMIN: 6507d56d374SYoshinobu Inoue ++unreachable; 6517d56d374SYoshinobu Inoue Printf(" !P"); 6527d56d374SYoshinobu Inoue break; 6537d56d374SYoshinobu Inoue case ICMP6_DST_UNREACH_NOTNEIGHBOR: 6547d56d374SYoshinobu Inoue ++unreachable; 6557d56d374SYoshinobu Inoue Printf(" !S"); 6567d56d374SYoshinobu Inoue break; 6577d56d374SYoshinobu Inoue case ICMP6_DST_UNREACH_ADDR: 6587d56d374SYoshinobu Inoue ++unreachable; 6597d56d374SYoshinobu Inoue Printf(" !A"); 6607d56d374SYoshinobu Inoue break; 6617d56d374SYoshinobu Inoue case ICMP6_DST_UNREACH_NOPORT: 6627d56d374SYoshinobu Inoue if (rcvhlim >= 0 && 6637d56d374SYoshinobu Inoue rcvhlim <= 1) 6647d56d374SYoshinobu Inoue Printf(" !"); 6657d56d374SYoshinobu Inoue ++got_there; 6667d56d374SYoshinobu Inoue break; 6677d56d374SYoshinobu Inoue } 6687d56d374SYoshinobu Inoue break; 6697d56d374SYoshinobu Inoue } 6707d56d374SYoshinobu Inoue } 6717d56d374SYoshinobu Inoue if (cc == 0) 6727d56d374SYoshinobu Inoue Printf(" *"); 6737d56d374SYoshinobu Inoue (void) fflush(stdout); 6747d56d374SYoshinobu Inoue } 6757d56d374SYoshinobu Inoue putchar('\n'); 6767d56d374SYoshinobu Inoue if (got_there || 6777d56d374SYoshinobu Inoue (unreachable > 0 && unreachable >= ((nprobes + 1) / 2))) { 6787d56d374SYoshinobu Inoue exit(0); 6797d56d374SYoshinobu Inoue } 6807d56d374SYoshinobu Inoue } 6817d56d374SYoshinobu Inoue 6827d56d374SYoshinobu Inoue exit(0); 6837d56d374SYoshinobu Inoue } 6847d56d374SYoshinobu Inoue 6857d56d374SYoshinobu Inoue int 6867d56d374SYoshinobu Inoue wait_for_reply(sock, mhdr) 6877d56d374SYoshinobu Inoue int sock; 6887d56d374SYoshinobu Inoue struct msghdr *mhdr; 6897d56d374SYoshinobu Inoue { 6907d56d374SYoshinobu Inoue fd_set fds; 6917d56d374SYoshinobu Inoue struct timeval wait; 6927d56d374SYoshinobu Inoue int cc = 0; 6937d56d374SYoshinobu Inoue 6947d56d374SYoshinobu Inoue FD_ZERO(&fds); 6957d56d374SYoshinobu Inoue FD_SET(sock, &fds); 6967d56d374SYoshinobu Inoue wait.tv_sec = waittime; wait.tv_usec = 0; 6977d56d374SYoshinobu Inoue 6987d56d374SYoshinobu Inoue if (select(sock+1, &fds, (fd_set *)0, (fd_set *)0, &wait) > 0) 6997d56d374SYoshinobu Inoue cc = recvmsg(rcvsock, mhdr, 0); 7007d56d374SYoshinobu Inoue 7017d56d374SYoshinobu Inoue return(cc); 7027d56d374SYoshinobu Inoue } 7037d56d374SYoshinobu Inoue 7047d56d374SYoshinobu Inoue #ifdef IPSEC 7057d56d374SYoshinobu Inoue #ifdef IPSEC_POLICY_IPSEC 7067d56d374SYoshinobu Inoue int 7077d56d374SYoshinobu Inoue setpolicy(so, policy) 7087d56d374SYoshinobu Inoue int so; 7097d56d374SYoshinobu Inoue char *policy; 7107d56d374SYoshinobu Inoue { 7117d56d374SYoshinobu Inoue char *buf; 7127d56d374SYoshinobu Inoue 7137d56d374SYoshinobu Inoue buf = ipsec_set_policy(policy, strlen(policy)); 7147d56d374SYoshinobu Inoue if (buf == NULL) { 7157d56d374SYoshinobu Inoue warnx(ipsec_strerror()); 7167d56d374SYoshinobu Inoue return -1; 7177d56d374SYoshinobu Inoue } 7187d56d374SYoshinobu Inoue (void)setsockopt(so, IPPROTO_IPV6, IPV6_IPSEC_POLICY, 7197d56d374SYoshinobu Inoue buf, ipsec_get_policylen(buf)); 7207d56d374SYoshinobu Inoue 7217d56d374SYoshinobu Inoue free(buf); 7227d56d374SYoshinobu Inoue 7237d56d374SYoshinobu Inoue return 0; 7247d56d374SYoshinobu Inoue } 7257d56d374SYoshinobu Inoue #endif 7267d56d374SYoshinobu Inoue #endif 7277d56d374SYoshinobu Inoue 7287d56d374SYoshinobu Inoue void 7297d56d374SYoshinobu Inoue send_probe(seq, hops) 7307d56d374SYoshinobu Inoue int seq, hops; 7317d56d374SYoshinobu Inoue { 7327d56d374SYoshinobu Inoue struct opacket *op = outpacket; 7337d56d374SYoshinobu Inoue int i; 7347d56d374SYoshinobu Inoue 7357d56d374SYoshinobu Inoue if(setsockopt(sndsock, IPPROTO_IPV6, IPV6_UNICAST_HOPS, 7367d56d374SYoshinobu Inoue (char *)&hops, sizeof(hops)) < 0) { 7377d56d374SYoshinobu Inoue perror("setsockopt IPV6_UNICAST_HOPS"); 7387d56d374SYoshinobu Inoue } 7397d56d374SYoshinobu Inoue 7407d56d374SYoshinobu Inoue Dst.sin6_port = htons(port + seq); 7417d56d374SYoshinobu Inoue 7427d56d374SYoshinobu Inoue op->seq = seq; 7437d56d374SYoshinobu Inoue op->hops = hops; 7447d56d374SYoshinobu Inoue (void) gettimeofday(&op->tv, &tz); 7457d56d374SYoshinobu Inoue 7467d56d374SYoshinobu Inoue i = sendto(sndsock, (char *)outpacket, datalen , 0, 7477d56d374SYoshinobu Inoue (struct sockaddr *)dst, sizeof(Dst)); 7487d56d374SYoshinobu Inoue if (i < 0 || i != datalen) { 7497d56d374SYoshinobu Inoue if (i<0) 7507d56d374SYoshinobu Inoue perror("sendto"); 7517d56d374SYoshinobu Inoue Printf("traceroute6: wrote %s %d chars, ret=%d\n", hostname, 7527d56d374SYoshinobu Inoue datalen, i); 7537d56d374SYoshinobu Inoue (void) fflush(stdout); 7547d56d374SYoshinobu Inoue } 7557d56d374SYoshinobu Inoue } 7567d56d374SYoshinobu Inoue 7577d56d374SYoshinobu Inoue int 7587d56d374SYoshinobu Inoue get_hoplim(mhdr) 7597d56d374SYoshinobu Inoue struct msghdr *mhdr; 7607d56d374SYoshinobu Inoue { 7617d56d374SYoshinobu Inoue struct cmsghdr *cm; 7627d56d374SYoshinobu Inoue 7637d56d374SYoshinobu Inoue for (cm = (struct cmsghdr *)CMSG_FIRSTHDR(mhdr); cm; 7647d56d374SYoshinobu Inoue cm = (struct cmsghdr *)CMSG_NXTHDR(mhdr, cm)) { 7657d56d374SYoshinobu Inoue if (cm->cmsg_level == IPPROTO_IPV6 && 7667d56d374SYoshinobu Inoue cm->cmsg_type == IPV6_HOPLIMIT && 7677d56d374SYoshinobu Inoue cm->cmsg_len == CMSG_LEN(sizeof(int))) 7687d56d374SYoshinobu Inoue return(*(int *)CMSG_DATA(cm)); 7697d56d374SYoshinobu Inoue } 7707d56d374SYoshinobu Inoue 7717d56d374SYoshinobu Inoue return(-1); 7727d56d374SYoshinobu Inoue } 7737d56d374SYoshinobu Inoue 7747d56d374SYoshinobu Inoue double 7757d56d374SYoshinobu Inoue deltaT(t1p, t2p) 7767d56d374SYoshinobu Inoue struct timeval *t1p, *t2p; 7777d56d374SYoshinobu Inoue { 7787d56d374SYoshinobu Inoue register double dt; 7797d56d374SYoshinobu Inoue 7807d56d374SYoshinobu Inoue dt = (double)(t2p->tv_sec - t1p->tv_sec) * 1000.0 + 7817d56d374SYoshinobu Inoue (double)(t2p->tv_usec - t1p->tv_usec) / 1000.0; 7827d56d374SYoshinobu Inoue return (dt); 7837d56d374SYoshinobu Inoue } 7847d56d374SYoshinobu Inoue 7857d56d374SYoshinobu Inoue 7867d56d374SYoshinobu Inoue /* 7877d56d374SYoshinobu Inoue * Convert an ICMP "type" field to a printable string. 7887d56d374SYoshinobu Inoue */ 7897d56d374SYoshinobu Inoue char * 7907d56d374SYoshinobu Inoue pr_type(t0) 7917d56d374SYoshinobu Inoue int t0; 7927d56d374SYoshinobu Inoue { 7937d56d374SYoshinobu Inoue u_char t = t0 & 0xff; 7947d56d374SYoshinobu Inoue char *cp; 7957d56d374SYoshinobu Inoue 7967d56d374SYoshinobu Inoue switch (t) { 7977d56d374SYoshinobu Inoue case ICMP6_DST_UNREACH: 7987d56d374SYoshinobu Inoue cp = "Destination Unreachable"; 7997d56d374SYoshinobu Inoue break; 8007d56d374SYoshinobu Inoue case ICMP6_PACKET_TOO_BIG: 8017d56d374SYoshinobu Inoue cp = "Pakcet Too Big"; 8027d56d374SYoshinobu Inoue break; 8037d56d374SYoshinobu Inoue case ICMP6_TIME_EXCEEDED: 8047d56d374SYoshinobu Inoue cp = "Time Exceeded"; 8057d56d374SYoshinobu Inoue break; 8067d56d374SYoshinobu Inoue case ICMP6_PARAM_PROB: 8077d56d374SYoshinobu Inoue cp = "Parameter Problem"; 8087d56d374SYoshinobu Inoue break; 8097d56d374SYoshinobu Inoue case ICMP6_ECHO_REQUEST: 8107d56d374SYoshinobu Inoue cp = "Echo Request"; 8117d56d374SYoshinobu Inoue break; 8127d56d374SYoshinobu Inoue case ICMP6_ECHO_REPLY: 8137d56d374SYoshinobu Inoue cp = "Echo Reply"; 8147d56d374SYoshinobu Inoue break; 8157d56d374SYoshinobu Inoue case ICMP6_MEMBERSHIP_QUERY: 8167d56d374SYoshinobu Inoue cp = "Group Membership Query"; 8177d56d374SYoshinobu Inoue break; 8187d56d374SYoshinobu Inoue case ICMP6_MEMBERSHIP_REPORT: 8197d56d374SYoshinobu Inoue cp = "Group Membership Report"; 8207d56d374SYoshinobu Inoue break; 8217d56d374SYoshinobu Inoue case ICMP6_MEMBERSHIP_REDUCTION: 8227d56d374SYoshinobu Inoue cp = "Group Membership Reduction"; 8237d56d374SYoshinobu Inoue break; 8247d56d374SYoshinobu Inoue case ND_ROUTER_SOLICIT: 8257d56d374SYoshinobu Inoue cp = "Router Solicitation"; 8267d56d374SYoshinobu Inoue break; 8277d56d374SYoshinobu Inoue case ND_ROUTER_ADVERT: 8287d56d374SYoshinobu Inoue cp = "Router Advertisement"; 8297d56d374SYoshinobu Inoue break; 8307d56d374SYoshinobu Inoue case ND_NEIGHBOR_SOLICIT: 8317d56d374SYoshinobu Inoue cp = "Neighbor Solicitation"; 8327d56d374SYoshinobu Inoue break; 8337d56d374SYoshinobu Inoue case ND_NEIGHBOR_ADVERT: 8347d56d374SYoshinobu Inoue cp = "Neighbor Advertisement"; 8357d56d374SYoshinobu Inoue break; 8367d56d374SYoshinobu Inoue case ND_REDIRECT: 8377d56d374SYoshinobu Inoue cp = "Ridirect"; 8387d56d374SYoshinobu Inoue break; 8397d56d374SYoshinobu Inoue default: 8407d56d374SYoshinobu Inoue cp = "Unknown"; 8417d56d374SYoshinobu Inoue break; 8427d56d374SYoshinobu Inoue } 8437d56d374SYoshinobu Inoue return cp; 8447d56d374SYoshinobu Inoue } 8457d56d374SYoshinobu Inoue 8467d56d374SYoshinobu Inoue 8477d56d374SYoshinobu Inoue int 8487d56d374SYoshinobu Inoue packet_ok(mhdr, cc, seq) 8497d56d374SYoshinobu Inoue struct msghdr *mhdr; 8507d56d374SYoshinobu Inoue int cc; 8517d56d374SYoshinobu Inoue int seq; 8527d56d374SYoshinobu Inoue { 8537d56d374SYoshinobu Inoue register struct icmp6_hdr *icp; 8547d56d374SYoshinobu Inoue struct sockaddr_in6 *from = (struct sockaddr_in6 *)mhdr->msg_name; 8557d56d374SYoshinobu Inoue u_char type, code; 8567d56d374SYoshinobu Inoue char *buf = (char *)mhdr->msg_iov[0].iov_base; 8577d56d374SYoshinobu Inoue struct cmsghdr *cm; 8587d56d374SYoshinobu Inoue int *hlimp; 8597d56d374SYoshinobu Inoue 8607d56d374SYoshinobu Inoue if (cc < sizeof(struct icmp6_hdr)) { 8617d56d374SYoshinobu Inoue if (verbose) 8627d56d374SYoshinobu Inoue Printf("data too short (%d bytes) from %s\n", cc, 8637d56d374SYoshinobu Inoue inet_ntop(AF_INET6, &from->sin6_addr, 8647d56d374SYoshinobu Inoue ntop_buf, sizeof(ntop_buf))); 8657d56d374SYoshinobu Inoue return(0); 8667d56d374SYoshinobu Inoue } 8677d56d374SYoshinobu Inoue icp = (struct icmp6_hdr *)buf; 8687d56d374SYoshinobu Inoue /* get optional information via advanced API */ 8697d56d374SYoshinobu Inoue rcvpktinfo = NULL; 8707d56d374SYoshinobu Inoue hlimp = NULL; 8717d56d374SYoshinobu Inoue for (cm = (struct cmsghdr *)CMSG_FIRSTHDR(mhdr); cm; 8727d56d374SYoshinobu Inoue cm = (struct cmsghdr *)CMSG_NXTHDR(mhdr, cm)) { 8737d56d374SYoshinobu Inoue if (cm->cmsg_level == IPPROTO_IPV6 && 8747d56d374SYoshinobu Inoue cm->cmsg_type == IPV6_PKTINFO && 8757d56d374SYoshinobu Inoue cm->cmsg_len == 8767d56d374SYoshinobu Inoue CMSG_LEN(sizeof(struct in6_pktinfo))) 8777d56d374SYoshinobu Inoue rcvpktinfo = (struct in6_pktinfo *)(CMSG_DATA(cm)); 8787d56d374SYoshinobu Inoue 8797d56d374SYoshinobu Inoue if (cm->cmsg_level == IPPROTO_IPV6 && 8807d56d374SYoshinobu Inoue cm->cmsg_type == IPV6_HOPLIMIT && 8817d56d374SYoshinobu Inoue cm->cmsg_len == CMSG_LEN(sizeof(int))) 8827d56d374SYoshinobu Inoue hlimp = (int *)CMSG_DATA(cm); 8837d56d374SYoshinobu Inoue } 8847d56d374SYoshinobu Inoue if (rcvpktinfo == NULL || hlimp == NULL) { 8857d56d374SYoshinobu Inoue warnx("failed to get received hop limit or packet info"); 8867d56d374SYoshinobu Inoue return(0); 8877d56d374SYoshinobu Inoue } 8887d56d374SYoshinobu Inoue rcvhlim = *hlimp; 8897d56d374SYoshinobu Inoue 8907d56d374SYoshinobu Inoue type = icp->icmp6_type; 8917d56d374SYoshinobu Inoue code = icp->icmp6_code; 8927d56d374SYoshinobu Inoue if ((type == ICMP6_TIME_EXCEEDED && code == ICMP6_TIME_EXCEED_TRANSIT) 8937d56d374SYoshinobu Inoue || type == ICMP6_DST_UNREACH) { 8947d56d374SYoshinobu Inoue struct ip6_hdr *hip; 8957d56d374SYoshinobu Inoue struct udphdr *up; 8967d56d374SYoshinobu Inoue 8977d56d374SYoshinobu Inoue hip = (struct ip6_hdr *)(icp + 1); 8987d56d374SYoshinobu Inoue if ((up = get_udphdr(hip, (u_char *)(buf + cc))) == NULL) { 8997d56d374SYoshinobu Inoue if (verbose) 9007d56d374SYoshinobu Inoue warnx("failed to get upper layer header"); 9017d56d374SYoshinobu Inoue return(0); 9027d56d374SYoshinobu Inoue } 9037d56d374SYoshinobu Inoue if (up->uh_sport == htons(ident) && 9047d56d374SYoshinobu Inoue up->uh_dport == htons(port+seq)) 9057d56d374SYoshinobu Inoue return (type == ICMP6_TIME_EXCEEDED ? -1 : code + 1); 9067d56d374SYoshinobu Inoue } 9077d56d374SYoshinobu Inoue if (verbose) { 9087d56d374SYoshinobu Inoue int i; 9097d56d374SYoshinobu Inoue u_long *lp = (u_long *)(icp + 1); 9107d56d374SYoshinobu Inoue char sbuf[INET6_ADDRSTRLEN+1], dbuf[INET6_ADDRSTRLEN]; 9117d56d374SYoshinobu Inoue 9127d56d374SYoshinobu Inoue Printf("\n%d bytes from %s to %s", cc, 9137d56d374SYoshinobu Inoue inet_ntop(AF_INET6, &from->sin6_addr, 9147d56d374SYoshinobu Inoue sbuf, sizeof(sbuf)), 9157d56d374SYoshinobu Inoue inet_ntop(AF_INET6, &rcvpktinfo->ipi6_addr, 9167d56d374SYoshinobu Inoue dbuf, sizeof(dbuf))); 9177d56d374SYoshinobu Inoue Printf(": icmp type %d (%s) code %d\n", type, pr_type(type), 9187d56d374SYoshinobu Inoue icp->icmp6_code); 9197d56d374SYoshinobu Inoue for (i = 4; i < cc ; i += sizeof(long)) 9207d56d374SYoshinobu Inoue Printf("%2d: %8.8x\n", i, (u_int32_t)ntohl(*lp++)); 9217d56d374SYoshinobu Inoue } 9227d56d374SYoshinobu Inoue return(0); 9237d56d374SYoshinobu Inoue } 9247d56d374SYoshinobu Inoue 9257d56d374SYoshinobu Inoue /* 9267d56d374SYoshinobu Inoue * Increment pointer until find the UDP header. 9277d56d374SYoshinobu Inoue */ 9287d56d374SYoshinobu Inoue struct udphdr * 9297d56d374SYoshinobu Inoue get_udphdr(ip6, lim) 9307d56d374SYoshinobu Inoue struct ip6_hdr *ip6; 9317d56d374SYoshinobu Inoue u_char *lim; 9327d56d374SYoshinobu Inoue { 9337d56d374SYoshinobu Inoue u_char *cp = (u_char *)ip6, nh; 9347d56d374SYoshinobu Inoue int hlen; 9357d56d374SYoshinobu Inoue 9367d56d374SYoshinobu Inoue if (cp + sizeof(*ip6) >= lim) 9377d56d374SYoshinobu Inoue return(NULL); 9387d56d374SYoshinobu Inoue 9397d56d374SYoshinobu Inoue nh = ip6->ip6_nxt; 9407d56d374SYoshinobu Inoue cp += sizeof(struct ip6_hdr); 9417d56d374SYoshinobu Inoue 9427d56d374SYoshinobu Inoue while(lim - cp >= 8) { 9437d56d374SYoshinobu Inoue switch(nh) { 9447d56d374SYoshinobu Inoue case IPPROTO_ESP: 9457d56d374SYoshinobu Inoue case IPPROTO_TCP: 9467d56d374SYoshinobu Inoue case IPPROTO_ICMPV6: 9477d56d374SYoshinobu Inoue return(NULL); 9487d56d374SYoshinobu Inoue case IPPROTO_UDP: 9497d56d374SYoshinobu Inoue return((struct udphdr *)cp); 9507d56d374SYoshinobu Inoue case IPPROTO_FRAGMENT: 9517d56d374SYoshinobu Inoue hlen = sizeof(struct ip6_frag); 9527d56d374SYoshinobu Inoue nh = ((struct ip6_frag *)cp)->ip6f_nxt; 9537d56d374SYoshinobu Inoue break; 9547d56d374SYoshinobu Inoue case IPPROTO_AH: 9557d56d374SYoshinobu Inoue hlen = (((struct ip6_ext *)cp)->ip6e_len + 2) << 2; 9567d56d374SYoshinobu Inoue nh = ((struct ip6_ext *)cp)->ip6e_nxt; 9577d56d374SYoshinobu Inoue break; 9587d56d374SYoshinobu Inoue default: 9597d56d374SYoshinobu Inoue hlen = (((struct ip6_ext *)cp)->ip6e_len + 1) << 3; 9607d56d374SYoshinobu Inoue nh = ((struct ip6_ext *)cp)->ip6e_nxt; 9617d56d374SYoshinobu Inoue break; 9627d56d374SYoshinobu Inoue } 9637d56d374SYoshinobu Inoue 9647d56d374SYoshinobu Inoue cp += hlen; 9657d56d374SYoshinobu Inoue } 9667d56d374SYoshinobu Inoue 9677d56d374SYoshinobu Inoue return(NULL); 9687d56d374SYoshinobu Inoue } 9697d56d374SYoshinobu Inoue 9707d56d374SYoshinobu Inoue void 9717d56d374SYoshinobu Inoue print(mhdr, cc) 9727d56d374SYoshinobu Inoue struct msghdr *mhdr; 9737d56d374SYoshinobu Inoue int cc; 9747d56d374SYoshinobu Inoue { 9757d56d374SYoshinobu Inoue struct sockaddr_in6 *from = (struct sockaddr_in6 *)mhdr->msg_name; 9767d56d374SYoshinobu Inoue 9777d56d374SYoshinobu Inoue if (nflag) { 9787d56d374SYoshinobu Inoue Printf(" %s", inet_ntop(AF_INET6, &from->sin6_addr, 9797d56d374SYoshinobu Inoue ntop_buf, sizeof(ntop_buf))); 9807d56d374SYoshinobu Inoue } 9817d56d374SYoshinobu Inoue else if (lflag) { 9827d56d374SYoshinobu Inoue Printf(" %s (%s)", inetname(&from->sin6_addr), 9837d56d374SYoshinobu Inoue inet_ntop(AF_INET6, &from->sin6_addr, 9847d56d374SYoshinobu Inoue ntop_buf, sizeof(ntop_buf))); 9857d56d374SYoshinobu Inoue } 9867d56d374SYoshinobu Inoue else { 9877d56d374SYoshinobu Inoue Printf(" %s", inetname(&from->sin6_addr)); 9887d56d374SYoshinobu Inoue } 9897d56d374SYoshinobu Inoue 9907d56d374SYoshinobu Inoue if (verbose) { 9917d56d374SYoshinobu Inoue Printf(" %d bytes of data to %s", cc, 9927d56d374SYoshinobu Inoue inet_ntop(AF_INET6, &rcvpktinfo->ipi6_addr, 9937d56d374SYoshinobu Inoue ntop_buf, sizeof(ntop_buf))); 9947d56d374SYoshinobu Inoue } 9957d56d374SYoshinobu Inoue } 9967d56d374SYoshinobu Inoue 9977d56d374SYoshinobu Inoue /* 9987d56d374SYoshinobu Inoue * Subtract 2 timeval structs: out = out - in. 9997d56d374SYoshinobu Inoue * Out is assumed to be >= in. 10007d56d374SYoshinobu Inoue */ 10017d56d374SYoshinobu Inoue void 10027d56d374SYoshinobu Inoue tvsub(out, in) 10037d56d374SYoshinobu Inoue register struct timeval *out, *in; 10047d56d374SYoshinobu Inoue { 10057d56d374SYoshinobu Inoue if ((out->tv_usec -= in->tv_usec) < 0) { 10067d56d374SYoshinobu Inoue out->tv_sec--; 10077d56d374SYoshinobu Inoue out->tv_usec += 1000000; 10087d56d374SYoshinobu Inoue } 10097d56d374SYoshinobu Inoue out->tv_sec -= in->tv_sec; 10107d56d374SYoshinobu Inoue } 10117d56d374SYoshinobu Inoue 10127d56d374SYoshinobu Inoue 10137d56d374SYoshinobu Inoue /* 10147d56d374SYoshinobu Inoue * Construct an Internet address representation. 10157d56d374SYoshinobu Inoue * If the nflag has been supplied, give 10167d56d374SYoshinobu Inoue * numeric value, otherwise try for symbolic name. 10177d56d374SYoshinobu Inoue */ 10187d56d374SYoshinobu Inoue char * 10197d56d374SYoshinobu Inoue inetname(in) 10207d56d374SYoshinobu Inoue struct in6_addr *in; 10217d56d374SYoshinobu Inoue { 10227d56d374SYoshinobu Inoue register char *cp; 10237d56d374SYoshinobu Inoue static char line[50]; 10247d56d374SYoshinobu Inoue struct hostent *hp; 10257d56d374SYoshinobu Inoue static char domain[MAXHOSTNAMELEN + 1]; 10267d56d374SYoshinobu Inoue static int first = 1; 102739865d64SYoshinobu Inoue int herr; 10287d56d374SYoshinobu Inoue 10297d56d374SYoshinobu Inoue if (first && !nflag) { 10307d56d374SYoshinobu Inoue first = 0; 10317d56d374SYoshinobu Inoue if (gethostname(domain, MAXHOSTNAMELEN) == 0 && 10327d56d374SYoshinobu Inoue (cp = index(domain, '.'))) 10337d56d374SYoshinobu Inoue (void) strcpy(domain, cp + 1); 10347d56d374SYoshinobu Inoue else 10357d56d374SYoshinobu Inoue domain[0] = 0; 10367d56d374SYoshinobu Inoue } 10377d56d374SYoshinobu Inoue cp = 0; 10387d56d374SYoshinobu Inoue if (!nflag) { 10397d56d374SYoshinobu Inoue /* hp = (struct hostent *)addr2hostname(in, sizeof(*in), AF_INET6, &herr); */ 104039865d64SYoshinobu Inoue hp = (struct hostent *)getipnodebyaddr((const char *)in, sizeof(*in), 104139865d64SYoshinobu Inoue AF_INET6, &herr); 10427d56d374SYoshinobu Inoue if (hp) { 10437d56d374SYoshinobu Inoue if ((cp = index(hp->h_name, '.')) && 10447d56d374SYoshinobu Inoue !strcmp(cp + 1, domain)) 10457d56d374SYoshinobu Inoue *cp = 0; 10467d56d374SYoshinobu Inoue cp = hp->h_name; 104739865d64SYoshinobu Inoue #undef freehostent(hp) 10487d56d374SYoshinobu Inoue freehostent(hp); 104939865d64SYoshinobu Inoue #define freehostent(hp) 10507d56d374SYoshinobu Inoue } 10517d56d374SYoshinobu Inoue } 10527d56d374SYoshinobu Inoue if (cp) 10537d56d374SYoshinobu Inoue (void) strcpy(line, cp); 10547d56d374SYoshinobu Inoue else { 10557d56d374SYoshinobu Inoue (void)inet_ntop(AF_INET6, in, line, sizeof(line)); 10567d56d374SYoshinobu Inoue } 10577d56d374SYoshinobu Inoue return (line); 10587d56d374SYoshinobu Inoue } 10597d56d374SYoshinobu Inoue 10607d56d374SYoshinobu Inoue void 10617d56d374SYoshinobu Inoue usage() 10627d56d374SYoshinobu Inoue { 10637d56d374SYoshinobu Inoue (void)fprintf(stderr, 10647d56d374SYoshinobu Inoue "usage: traceroute6 [-dlnrv] [-m max_hops] [-p port#] [-q nqueries]\n\t\ 10657d56d374SYoshinobu Inoue [-s src_addr] [-g gateway] [-w wait] host [data size]\n"); 10667d56d374SYoshinobu Inoue exit(1); 10677d56d374SYoshinobu Inoue } 1068