diff options
Diffstat (limited to 'src/bin/dhcp6/dhcp6_srv.cc')
-rw-r--r-- | src/bin/dhcp6/dhcp6_srv.cc | 4527 |
1 files changed, 4527 insertions, 0 deletions
diff --git a/src/bin/dhcp6/dhcp6_srv.cc b/src/bin/dhcp6/dhcp6_srv.cc new file mode 100644 index 0000000..1ad9909 --- /dev/null +++ b/src/bin/dhcp6/dhcp6_srv.cc @@ -0,0 +1,4527 @@ +// Copyright (C) 2011-2022 Internet Systems Consortium, Inc. ("ISC") +// +// This Source Code Form is subject to the terms of the Mozilla Public +// License, v. 2.0. If a copy of the MPL was not distributed with this +// file, You can obtain one at http://mozilla.org/MPL/2.0/. + +#include <config.h> +#include <kea_version.h> + +#include <asiolink/io_address.h> +#include <dhcp_ddns/ncr_msg.h> +#include <dhcp/dhcp6.h> +#include <dhcp/docsis3_option_defs.h> +#include <dhcp/duid.h> +#include <dhcp/duid_factory.h> +#include <dhcpsrv/fuzz.h> +#include <dhcp/iface_mgr.h> +#include <dhcp/libdhcp++.h> +#include <dhcp/option6_addrlst.h> +#include <dhcp/option6_client_fqdn.h> +#include <dhcp/option6_ia.h> +#include <dhcp/option6_iaaddr.h> +#include <dhcp/option6_iaprefix.h> +#include <dhcp/option6_status_code.h> +#include <dhcp/option6_pdexclude.h> +#include <dhcp/option_custom.h> +#include <dhcp/option_vendor.h> +#include <dhcp/option_vendor_class.h> +#include <dhcp/option_int_array.h> +#include <dhcp/pkt6.h> +#include <dhcp6/client_handler.h> +#include <dhcp6/dhcp6to4_ipc.h> +#include <dhcp6/dhcp6_log.h> +#include <dhcp6/dhcp6_srv.h> +#include <dhcpsrv/cfg_host_operations.h> +#include <dhcpsrv/cfgmgr.h> +#include <dhcpsrv/lease_mgr.h> +#include <dhcpsrv/lease_mgr_factory.h> +#include <dhcpsrv/ncr_generator.h> +#include <dhcpsrv/subnet.h> +#include <dhcpsrv/subnet_selector.h> +#include <dhcpsrv/utils.h> +#include <eval/evaluate.h> +#include <eval/eval_messages.h> +#include <exceptions/exceptions.h> +#include <hooks/callout_handle.h> +#include <hooks/hooks_log.h> +#include <hooks/hooks_manager.h> +#include <stats/stats_mgr.h> +#include <util/encode/hex.h> +#include <util/io_utilities.h> +#include <util/pointer_util.h> +#include <util/range_utilities.h> +#include <log/logger.h> +#include <cryptolink/cryptolink.h> +#include <cfgrpt/config_report.h> + +#ifdef HAVE_MYSQL +#include <dhcpsrv/mysql_lease_mgr.h> +#endif +#ifdef HAVE_PGSQL +#include <dhcpsrv/pgsql_lease_mgr.h> +#endif +#include <dhcpsrv/memfile_lease_mgr.h> + +#include <boost/foreach.hpp> +#include <boost/tokenizer.hpp> +#include <boost/algorithm/string/erase.hpp> +#include <boost/algorithm/string/join.hpp> +#include <boost/algorithm/string/split.hpp> + +#include <algorithm> +#include <functional> +#include <stdlib.h> +#include <time.h> +#include <iomanip> +#include <fstream> +#include <sstream> +#include <set> + +using namespace isc; +using namespace isc::asiolink; +using namespace isc::cryptolink; +using namespace isc::dhcp; +using namespace isc::dhcp_ddns; +using namespace isc::hooks; +using namespace isc::log; +using namespace isc::stats; +using namespace isc::util; +using namespace std; +namespace ph = std::placeholders; + +namespace { + +/// Structure that holds registered hook indexes +struct Dhcp6Hooks { + int hook_index_buffer6_receive_; ///< index for "buffer6_receive" hook point + int hook_index_pkt6_receive_; ///< index for "pkt6_receive" hook point + int hook_index_subnet6_select_; ///< index for "subnet6_select" hook point + int hook_index_leases6_committed_;///< index for "leases6_committed" hook point + int hook_index_lease6_release_; ///< index for "lease6_release" hook point + int hook_index_pkt6_send_; ///< index for "pkt6_send" hook point + int hook_index_buffer6_send_; ///< index for "buffer6_send" hook point + int hook_index_lease6_decline_; ///< index for "lease6_decline" hook point + int hook_index_host6_identifier_; ///< index for "host6_identifier" hook point + int hook_index_ddns6_update_; ///< index for "ddns6_update" hook point + + /// Constructor that registers hook points for DHCPv6 engine + Dhcp6Hooks() { + hook_index_buffer6_receive_ = HooksManager::registerHook("buffer6_receive"); + hook_index_pkt6_receive_ = HooksManager::registerHook("pkt6_receive"); + hook_index_subnet6_select_ = HooksManager::registerHook("subnet6_select"); + hook_index_leases6_committed_ = HooksManager::registerHook("leases6_committed"); + hook_index_lease6_release_ = HooksManager::registerHook("lease6_release"); + hook_index_pkt6_send_ = HooksManager::registerHook("pkt6_send"); + hook_index_buffer6_send_ = HooksManager::registerHook("buffer6_send"); + hook_index_lease6_decline_ = HooksManager::registerHook("lease6_decline"); + hook_index_host6_identifier_ = HooksManager::registerHook("host6_identifier"); + hook_index_ddns6_update_ = HooksManager::registerHook("ddns6_update"); + } +}; + +// Declare a Hooks object. As this is outside any function or method, it +// will be instantiated (and the constructor run) when the module is loaded. +// As a result, the hook indexes will be defined before any method in this +// module is called. +Dhcp6Hooks Hooks; + +/// @brief Creates instance of the Status Code option. +/// +/// This variant of the function is used when the Status Code option +/// is added as a top-level option. It logs the debug message and +/// includes the information about the client and transaction. +/// +/// @param pkt Reference to the client's message. +/// @param status_code Numeric status code. +/// @param status_message Status message. +/// +/// @return Pointer to the Status Code option. +OptionPtr +createStatusCode(const Pkt6& pkt, const uint16_t status_code, + const std::string& status_message) { + Option6StatusCodePtr option_status(new Option6StatusCode(status_code, + status_message)); + LOG_DEBUG(options6_logger, DBG_DHCP6_DETAIL, DHCP6_ADD_GLOBAL_STATUS_CODE) + .arg(pkt.getLabel()) + .arg(option_status->dataToText()); + return (option_status); +} + +/// @brief Creates instance of the Status Code option. +/// +/// This variant of the function is used when the Status Code option +/// is added to one of the IA options. It logs the debug message and +/// includes the information about the client and transaction as well +/// as IAID of the IA option. +/// +/// @param pkt Reference to the client's message. +/// param ia Reference to the IA option to which the Status Code is +/// being added. +/// @param status_code Numeric status code. +/// @param status_message Status message. +/// +/// @return Pointer to the Status Code option. +OptionPtr +createStatusCode(const Pkt6& pkt, const Option6IA& ia, const uint16_t status_code, + const std::string& status_message) { + Option6StatusCodePtr option_status(new Option6StatusCode(status_code, + status_message)); + LOG_DEBUG(options6_logger, DBG_DHCP6_DETAIL, DHCP6_ADD_STATUS_CODE_FOR_IA) + .arg(pkt.getLabel()) + .arg(ia.getIAID()) + .arg(option_status->dataToText()); + return (option_status); +} + +/// List of statistics which is initialized to 0 during the DHCPv6 +/// server startup. +std::set<std::string> dhcp6_statistics = { + "pkt6-received", + "pkt6-solicit-received", + "pkt6-advertise-received", + "pkt6-request-received", + "pkt6-reply-received", + "pkt6-renew-received", + "pkt6-rebind-received", + "pkt6-decline-received", + "pkt6-release-received", + "pkt6-infrequest-received", + "pkt6-dhcpv4-query-received", + "pkt6-dhcpv4-response-received", + "pkt6-unknown-received", + "pkt6-sent", + "pkt6-advertise-sent", + "pkt6-reply-sent", + "pkt6-dhcpv4-response-sent", + "pkt6-parse-failed", + "pkt6-receive-drop", + "v6-allocation-fail", + "v6-allocation-fail-shared-network", + "v6-allocation-fail-subnet", + "v6-allocation-fail-no-pools", + "v6-allocation-fail-classes" +}; + +} // namespace + +namespace isc { +namespace dhcp { + +const std::string Dhcpv6Srv::VENDOR_CLASS_PREFIX("VENDOR_CLASS_"); + +Dhcpv6Srv::Dhcpv6Srv(uint16_t server_port, uint16_t client_port) + : io_service_(new IOService()), server_port_(server_port), + client_port_(client_port), serverid_(), shutdown_(true), + alloc_engine_(), name_change_reqs_(), + network_state_(new NetworkState(NetworkState::DHCPv6)), + cb_control_(new CBControlDHCPv6()) { + LOG_DEBUG(dhcp6_logger, DBG_DHCP6_START, DHCP6_OPEN_SOCKET) + .arg(server_port); + + Dhcp6to4Ipc::instance().client_port = client_port; + + // Initialize objects required for DHCP server operation. + try { + // Port 0 is used for testing purposes where in most cases we don't + // rely on the physical interfaces. Therefore, it should be possible + // to create an object even when there are no usable interfaces. + if ((server_port > 0) && (IfaceMgr::instance().countIfaces() == 0)) { + LOG_ERROR(dhcp6_logger, DHCP6_NO_INTERFACES); + return; + } + + // Create a DUID instance but do not store it into a file. + DUIDFactory duid_factory; + DuidPtr duid = duid_factory.get(); + serverid_.reset(new Option(Option::V6, D6O_SERVERID, duid->getDuid())); + + // Instantiate allocation engine. The number of allocation attempts equal + // to zero indicates that the allocation engine will use the number of + // attempts depending on the pool size. + alloc_engine_.reset(new AllocEngine(AllocEngine::ALLOC_ITERATIVE, 0)); + + /// @todo call loadLibraries() when handling configuration changes + + } catch (const std::exception &e) { + LOG_ERROR(dhcp6_logger, DHCP6_SRV_CONSTRUCT_ERROR).arg(e.what()); + return; + } + // Initializing all observations with default value + setPacketStatisticsDefaults(); + + // All done, so can proceed + shutdown_ = false; +} + +void Dhcpv6Srv::setPacketStatisticsDefaults() { + isc::stats::StatsMgr& stats_mgr = isc::stats::StatsMgr::instance(); + + // Iterate over set of observed statistics + for (auto it = dhcp6_statistics.begin(); it != dhcp6_statistics.end(); ++it) { + // Initialize them with default value 0 + stats_mgr.setValue((*it), static_cast<int64_t>(0)); + } +} + +Dhcpv6Srv::~Dhcpv6Srv() { + // Discard any parked packets + discardPackets(); + + try { + stopD2(); + } catch (const std::exception& ex) { + // Highly unlikely, but lets Report it but go on + LOG_ERROR(dhcp6_logger, DHCP6_SRV_D2STOP_ERROR).arg(ex.what()); + } + + try { + Dhcp6to4Ipc::instance().close(); + } catch (const std::exception& ex) { + // Highly unlikely, but lets Report it but go on + // LOG_ERROR(dhcp6_logger, DHCP6_SRV_DHCP4O6_ERROR).arg(ex.what()); + } + + IfaceMgr::instance().closeSockets(); + + LeaseMgrFactory::destroy(); + + // Explicitly unload hooks + HooksManager::prepareUnloadLibraries(); + if (!HooksManager::unloadLibraries()) { + auto names = HooksManager::getLibraryNames(); + std::string msg; + if (!names.empty()) { + msg = names[0]; + for (size_t i = 1; i < names.size(); ++i) { + msg += std::string(", ") + names[i]; + } + } + LOG_ERROR(dhcp6_logger, DHCP6_SRV_UNLOAD_LIBRARIES_ERROR).arg(msg); + } +} + +void Dhcpv6Srv::shutdown() { + LOG_DEBUG(dhcp6_logger, DBG_DHCP6_BASIC, DHCP6_SHUTDOWN_REQUEST); + shutdown_ = true; +} + +Pkt6Ptr Dhcpv6Srv::receivePacket(int timeout) { + return (IfaceMgr::instance().receive6(timeout)); +} + +void Dhcpv6Srv::sendPacket(const Pkt6Ptr& packet) { + IfaceMgr::instance().send(packet); +} + +bool +Dhcpv6Srv::testServerID(const Pkt6Ptr& pkt) { + /// @todo Currently we always check server identifier regardless if + /// it is allowed in the received message or not (per RFC 8415). + /// If the server identifier is not allowed in the message, the + /// sanityCheck function should deal with it. + OptionPtr server_id = pkt->getOption(D6O_SERVERID); + if (server_id){ + // Let us test received ServerID if it is same as ServerID + // which is being used by server + if (getServerID()->getData() != server_id->getData()){ + LOG_DEBUG(bad_packet6_logger, DBGLVL_PKT_HANDLING, DHCP6_PACKET_DROP_SERVERID_MISMATCH) + .arg(pkt->getLabel()) + .arg(duidToString(server_id)) + .arg(duidToString(getServerID())); + return (false); + } + } + // return True if: no serverid received or ServerIDs matching + return (true); +} + +bool +Dhcpv6Srv::testUnicast(const Pkt6Ptr& pkt) const { + switch (pkt->getType()) { + case DHCPV6_SOLICIT: + case DHCPV6_CONFIRM: + case DHCPV6_REBIND: + case DHCPV6_INFORMATION_REQUEST: + if (pkt->relay_info_.empty() && !pkt->getLocalAddr().isV6Multicast()) { + LOG_DEBUG(bad_packet6_logger, DBGLVL_PKT_HANDLING, DHCP6_PACKET_DROP_UNICAST) + .arg(pkt->getLabel()) + .arg(pkt->getName()); + return (false); + } + break; + default: + // do nothing + ; + } + return (true); +} + +void +Dhcpv6Srv::setHostIdentifiers(AllocEngine::ClientContext6& ctx) { + const ConstCfgHostOperationsPtr cfg = + CfgMgr::instance().getCurrentCfg()->getCfgHostOperations6(); + BOOST_FOREACH(const Host::IdentifierType& id_type, + cfg->getIdentifierTypes()) { + switch (id_type) { + case Host::IDENT_DUID: + if (ctx.duid_) { + ctx.addHostIdentifier(id_type, ctx.duid_->getDuid()); + } + break; + + case Host::IDENT_HWADDR: + if (ctx.hwaddr_) { + ctx.addHostIdentifier(id_type, ctx.hwaddr_->hwaddr_); + } + break; + case Host::IDENT_FLEX: + // At this point the information in the packet has been unpacked into + // the various packet fields and option objects has been created. + // Execute callouts registered for host6_identifier. + if (HooksManager::calloutsPresent(Hooks.hook_index_host6_identifier_)) { + CalloutHandlePtr callout_handle = getCalloutHandle(ctx.query_); + + Host::IdentifierType type = Host::IDENT_FLEX; + std::vector<uint8_t> id; + + // Use the RAII wrapper to make sure that the callout handle state is + // reset when this object goes out of scope. All hook points must do + // it to prevent possible circular dependency between the callout + // handle and its arguments. + ScopedCalloutHandleState callout_handle_state(callout_handle); + + // Pass incoming packet as argument + callout_handle->setArgument("query6", ctx.query_); + callout_handle->setArgument("id_type", type); + callout_handle->setArgument("id_value", id); + + // Call callouts + HooksManager::callCallouts(Hooks.hook_index_host6_identifier_, + *callout_handle); + + callout_handle->getArgument("id_type", type); + callout_handle->getArgument("id_value", id); + + if ((callout_handle->getStatus() == CalloutHandle::NEXT_STEP_CONTINUE) && + !id.empty()) { + + LOG_DEBUG(packet6_logger, DBGLVL_TRACE_BASIC, DHCP6_FLEX_ID) + .arg(Host::getIdentifierAsText(type, &id[0], id.size())); + + ctx.addHostIdentifier(type, id); + } + } + break; + default: + ; + } + } +} + +bool +Dhcpv6Srv::earlyGHRLookup(const Pkt6Ptr& query, + AllocEngine::ClientContext6& ctx) { + // Pointer to client's query. + ctx.query_ = query; + + // DUID. + ctx.duid_ = query->getClientId(); + + // Hardware address. + ctx.hwaddr_ = getMAC(query); + + // Get the early-global-reservations-lookup flag value. + data::ConstElementPtr egrl = CfgMgr::instance().getCurrentCfg()-> + getConfiguredGlobal(CfgGlobals::EARLY_GLOBAL_RESERVATIONS_LOOKUP); + if (egrl) { + ctx.early_global_reservations_lookup_ = egrl->boolValue(); + } + + // Perform early global reservations lookup when wanted. + if (ctx.early_global_reservations_lookup_) { + // Get the host identifiers. + setHostIdentifiers(ctx); + + // Check for global host reservations. + ConstHostPtr global_host = alloc_engine_->findGlobalReservation(ctx); + + if (global_host && !global_host->getClientClasses6().empty()) { + // Remove dependent evaluated classes. + removeDependentEvaluatedClasses(query); + + // Add classes from the global reservations. + const ClientClasses& classes = global_host->getClientClasses6(); + for (ClientClasses::const_iterator cclass = classes.cbegin(); + cclass != classes.cend(); ++cclass) { + query->addClass(*cclass); + } + + // Evaluate classes before KNOWN. + evaluateClasses(query, false); + } + + if (global_host) { + // Add the KNOWN class; + query->addClass("KNOWN"); + LOG_DEBUG(dhcp6_logger, DBG_DHCP6_BASIC, DHCP6_CLASS_ASSIGNED) + .arg(query->getLabel()) + .arg("KNOWN"); + + // Evaluate classes after KNOWN. + evaluateClasses(query, true); + + // Check the DROP special class. + if (query->inClass("DROP")) { + LOG_DEBUG(packet6_logger, DBGLVL_PKT_HANDLING, + DHCP6_PACKET_DROP_DROP_CLASS_EARLY) + .arg(query->toText()); + StatsMgr::instance().addValue("pkt6-receive-drop", + static_cast<int64_t>(1)); + return (false); + } + + // Store the reservation. + ctx.hosts_[SUBNET_ID_GLOBAL] = global_host; + } + } + + return (true); +} + +void +Dhcpv6Srv::initContext(const Pkt6Ptr& pkt, + AllocEngine::ClientContext6& ctx, + bool& drop) { + ctx.subnet_ = selectSubnet(pkt, drop); + ctx.fwd_dns_update_ = false; + ctx.rev_dns_update_ = false; + ctx.hostname_ = ""; + ctx.callout_handle_ = getCalloutHandle(pkt); + + if (drop) { + // Caller will immediately drop the packet so simply return now. + return; + } + + // Collect host identifiers if host reservations enabled. The identifiers + // are stored in order of preference. The server will use them in that + // order to search for host reservations. + SharedNetwork6Ptr sn; + if (ctx.subnet_) { + // Before we can check for static reservations, we need to prepare + // a set of identifiers to be used for this. + if (!ctx.early_global_reservations_lookup_) { + setHostIdentifiers(ctx); + } + + // Find host reservations using specified identifiers. + alloc_engine_->findReservation(ctx); + + // Get shared network to see if it is set for a subnet. + ctx.subnet_->getSharedNetwork(sn); + } + + // Global host reservations are independent of a selected subnet. If the + // global reservations contain client classes we should use them in case + // they are meant to affect pool selection. Also, if the subnet does not + // belong to a shared network we can use the reserved client classes + // because there is no way our subnet could change. Such classes may + // affect selection of a pool within the selected subnet. + auto global_host = ctx.globalHost(); + auto current_host = ctx.currentHost(); + if ((!ctx.early_global_reservations_lookup_ && + global_host && !global_host->getClientClasses6().empty()) || + (!sn && current_host && !current_host->getClientClasses6().empty())) { + // We have already evaluated client classes and some of them may + // be in conflict with the reserved classes. Suppose there are + // two classes defined in the server configuration: first_class + // and second_class and the test for the second_class it looks + // like this: "not member('first_class')". If the first_class + // initially evaluates to false, the second_class evaluates to + // true. If the first_class is now set within the hosts reservations + // and we don't remove the previously evaluated second_class we'd + // end up with both first_class and second_class evaluated to + // true. In order to avoid that, we have to remove the classes + // evaluated in the first pass and evaluate them again. As + // a result, the first_class set via the host reservation will + // replace the second_class because the second_class will this + // time evaluate to false as desired. + removeDependentEvaluatedClasses(pkt); + setReservedClientClasses(pkt, ctx); + evaluateClasses(pkt, false); + } + + // Set KNOWN builtin class if something was found, UNKNOWN if not. + if (!ctx.hosts_.empty()) { + pkt->addClass("KNOWN"); + LOG_DEBUG(dhcp6_logger, DBG_DHCP6_BASIC, DHCP6_CLASS_ASSIGNED) + .arg(pkt->getLabel()) + .arg("KNOWN"); + } else { + pkt->addClass("UNKNOWN"); + LOG_DEBUG(dhcp6_logger, DBG_DHCP6_BASIC, DHCP6_CLASS_ASSIGNED) + .arg(pkt->getLabel()) + .arg("UNKNOWN"); + } + + // Perform second pass of classification. + evaluateClasses(pkt, true); + + // Check the DROP special class. + if (pkt->inClass("DROP")) { + LOG_DEBUG(packet6_logger, DBGLVL_PKT_HANDLING, DHCP6_PACKET_DROP_DROP_CLASS2) + .arg(pkt->toText()); + StatsMgr::instance().addValue("pkt6-receive-drop", + static_cast<int64_t>(1)); + drop = true; + } +} + +int Dhcpv6Srv::run() { +#ifdef ENABLE_AFL + // Set up structures needed for fuzzing. + Fuzz fuzzer(6, server_port_); + // + // The next line is needed as a signature for AFL to recognize that we are + // running persistent fuzzing. This has to be in the main image file. + while (__AFL_LOOP(fuzzer.maxLoopCount())) { + // Read from stdin and put the data read into an address/port on which + // Kea is listening, read for Kea to read it via asynchronous I/O. + fuzzer.transfer(); +#else + while (!shutdown_) { +#endif // ENABLE_AFL + try { + run_one(); + getIOService()->poll(); + } catch (const std::exception& e) { + // General catch-all standard exceptions that are not caught by more + // specific catches. + LOG_ERROR(packet6_logger, DHCP6_PACKET_PROCESS_STD_EXCEPTION) + .arg(e.what()); + + } catch (...) { + // General catch-all non-standard exception that are not caught + // by more specific catches. + LOG_ERROR(packet6_logger, DHCP6_PACKET_PROCESS_EXCEPTION); + } + } + + // Stop everything before we change into single-threaded mode. + MultiThreadingCriticalSection cs; + + // destroying the thread pool + MultiThreadingMgr::instance().apply(false, 0, 0); + + return (getExitValue()); +} + +void Dhcpv6Srv::run_one() { + // client's message and server's response + Pkt6Ptr query; + + try { + // Set select() timeout to 1s. This value should not be modified + // because it is important that the select() returns control + // frequently so as the IOService can be polled for ready handlers. + uint32_t timeout = 1; + query = receivePacket(timeout); + + // Log if packet has arrived. We can't log the detailed information + // about the DHCP message because it hasn't been unpacked/parsed + // yet, and it can't be parsed at this point because hooks will + // have to process it first. The only information available at this + // point are: the interface, source address and destination addresses + // and ports. + if (query) { + LOG_DEBUG(packet6_logger, DBG_DHCP6_BASIC, DHCP6_BUFFER_RECEIVED) + .arg(query->getRemoteAddr().toText()) + .arg(query->getRemotePort()) + .arg(query->getLocalAddr().toText()) + .arg(query->getLocalPort()) + .arg(query->getIface()); + + // Log reception of the packet. We need to increase it early, as + // any failures in unpacking will cause the packet to be dropped. + // we will increase type specific packets further down the road. + // See processStatsReceived(). + StatsMgr::instance().addValue("pkt6-received", static_cast<int64_t>(1)); + } + + // We used to log that the wait was interrupted, but this is no longer + // the case. Our wait time is 1s now, so the lack of query packet more + // likely means that nothing new appeared within a second, rather than + // we were interrupted. And we don't want to print a message every + // second. + + } catch (const SignalInterruptOnSelect&) { + // Packet reception interrupted because a signal has been received. + // This is not an error because we might have received a SIGTERM, + // SIGINT, SIGHUP or SIGCHLD which are handled by the server. For + // signals that are not handled by the server we rely on the default + // behavior of the system. + LOG_DEBUG(packet6_logger, DBG_DHCP6_DETAIL, DHCP6_BUFFER_WAIT_SIGNAL); + } catch (const std::exception& e) { + LOG_ERROR(packet6_logger, DHCP6_PACKET_RECEIVE_FAIL).arg(e.what()); + } + + // Timeout may be reached or signal received, which breaks select() + // with no packet received + if (!query) { + return; + } + + // If the DHCP service has been globally disabled, drop the packet. + if (!network_state_->isServiceEnabled()) { + LOG_DEBUG(bad_packet6_logger, DBGLVL_PKT_HANDLING, DHCP6_PACKET_DROP_DHCP_DISABLED) + .arg(query->getLabel()); + return; + } else { + if (MultiThreadingMgr::instance().getMode()) { + typedef function<void()> CallBack; + boost::shared_ptr<CallBack> call_back = + boost::make_shared<CallBack>(std::bind(&Dhcpv6Srv::processPacketAndSendResponseNoThrow, + this, query)); + if (!MultiThreadingMgr::instance().getThreadPool().add(call_back)) { + LOG_DEBUG(dhcp6_logger, DBG_DHCP6_BASIC, DHCP6_PACKET_QUEUE_FULL); + } + } else { + processPacketAndSendResponse(query); + } + } +} + +void +Dhcpv6Srv::processPacketAndSendResponseNoThrow(Pkt6Ptr& query) { + try { + processPacketAndSendResponse(query); + } catch (const std::exception& e) { + LOG_ERROR(packet6_logger, DHCP6_PACKET_PROCESS_STD_EXCEPTION) + .arg(e.what()); + } catch (...) { + LOG_ERROR(packet6_logger, DHCP6_PACKET_PROCESS_EXCEPTION); + } +} + +void +Dhcpv6Srv::processPacketAndSendResponse(Pkt6Ptr& query) { + Pkt6Ptr rsp; + processPacket(query, rsp); + if (!rsp) { + return; + } + + CalloutHandlePtr callout_handle = getCalloutHandle(query); + processPacketBufferSend(callout_handle, rsp); +} + +void +Dhcpv6Srv::processPacket(Pkt6Ptr& query, Pkt6Ptr& rsp) { + bool skip_unpack = false; + + // The packet has just been received so contains the uninterpreted wire + // data; execute callouts registered for buffer6_receive. + if (HooksManager::calloutsPresent(Hooks.hook_index_buffer6_receive_)) { + CalloutHandlePtr callout_handle = getCalloutHandle(query); + + // Use the RAII wrapper to make sure that the callout handle state is + // reset when this object goes out of scope. All hook points must do + // it to prevent possible circular dependency between the callout + // handle and its arguments. + ScopedCalloutHandleState callout_handle_state(callout_handle); + + // Enable copying options from the packet within hook library. + ScopedEnableOptionsCopy<Pkt6> query6_options_copy(query); + + // Pass incoming packet as argument + callout_handle->setArgument("query6", query); + + // Call callouts + HooksManager::callCallouts(Hooks.hook_index_buffer6_receive_, *callout_handle); + + // Callouts decided to skip the next processing step. The next + // processing step would to parse the packet, so skip at this + // stage means that callouts did the parsing already, so server + // should skip parsing. + if (callout_handle->getStatus() == CalloutHandle::NEXT_STEP_SKIP) { + LOG_DEBUG(hooks_logger, DBG_DHCP6_DETAIL, DHCP6_HOOK_BUFFER_RCVD_SKIP) + .arg(query->getRemoteAddr().toText()) + .arg(query->getLocalAddr().toText()) + .arg(query->getIface()); + skip_unpack = true; + } + + // Callouts decided to drop the received packet + // The response (rsp) is null so the caller (run_one) will + // immediately return too. + if (callout_handle->getStatus() == CalloutHandle::NEXT_STEP_DROP) { + LOG_DEBUG(hooks_logger, DBGLVL_PKT_HANDLING, DHCP6_HOOK_BUFFER_RCVD_DROP) + .arg(query->getRemoteAddr().toText()) + .arg(query->getLocalAddr().toText()) + .arg(query->getIface()); + + // Increase the statistic of dropped packets. + StatsMgr::instance().addValue("pkt6-receive-drop", + static_cast<int64_t>(1)); + return; + } + + callout_handle->getArgument("query6", query); + } + + // Unpack the packet information unless the buffer6_receive callouts + // indicated they did it + if (!skip_unpack) { + try { + LOG_DEBUG(options6_logger, DBG_DHCP6_DETAIL, DHCP6_BUFFER_UNPACK) + .arg(query->getRemoteAddr().toText()) + .arg(query->getLocalAddr().toText()) + .arg(query->getIface()); + query->unpack(); + } catch (const SkipRemainingOptionsError& e) { + // An option failed to unpack but we are to attempt to process it + // anyway. Log it and let's hope for the best. + LOG_DEBUG(options6_logger, DBG_DHCP6_DETAIL, + DHCP6_PACKET_OPTIONS_SKIPPED) + .arg(e.what()); + } catch (const std::exception &e) { + // Failed to parse the packet. + LOG_DEBUG(bad_packet6_logger, DBGLVL_PKT_HANDLING, DHCP6_PACKET_DROP_PARSE_FAIL) + .arg(query->getRemoteAddr().toText()) + .arg(query->getLocalAddr().toText()) + .arg(query->getIface()) + .arg(e.what()); + + // Increase the statistics of parse failures and dropped packets. + StatsMgr::instance().addValue("pkt6-parse-failed", + static_cast<int64_t>(1)); + StatsMgr::instance().addValue("pkt6-receive-drop", + static_cast<int64_t>(1)); + return; + } + } + + // Update statistics accordingly for received packet. + processStatsReceived(query); + + // Check if received query carries server identifier matching + // server identifier being used by the server. + if (!testServerID(query)) { + + // Increase the statistic of dropped packets. + StatsMgr::instance().addValue("pkt6-receive-drop", static_cast<int64_t>(1)); + return; + } + + // Check if the received query has been sent to unicast or multicast. + // The Solicit, Confirm, Rebind and Information Request will be + // discarded if sent to unicast address. + if (!testUnicast(query)) { + + // Increase the statistic of dropped packets. + StatsMgr::instance().addValue("pkt6-receive-drop", static_cast<int64_t>(1)); + return; + } + + // Assign this packet to a class, if possible + classifyPacket(query); + + LOG_DEBUG(packet6_logger, DBG_DHCP6_BASIC_DATA, DHCP6_PACKET_RECEIVED) + .arg(query->getLabel()) + .arg(query->getName()) + .arg(static_cast<int>(query->getType())) + .arg(query->getRemoteAddr()) + .arg(query->getLocalAddr()) + .arg(query->getIface()); + LOG_DEBUG(packet6_logger, DBG_DHCP6_DETAIL_DATA, DHCP6_QUERY_DATA) + .arg(query->getLabel()) + .arg(query->toText()); + + // At this point the information in the packet has been unpacked into + // the various packet fields and option objects has been created. + // Execute callouts registered for packet6_receive. + if (HooksManager::calloutsPresent(Hooks.hook_index_pkt6_receive_)) { + CalloutHandlePtr callout_handle = getCalloutHandle(query); + + // Use the RAII wrapper to make sure that the callout handle state is + // reset when this object goes out of scope. All hook points must do + // it to prevent possible circular dependency between the callout + // handle and its arguments. + ScopedCalloutHandleState callout_handle_state(callout_handle); + + // Enable copying options from the packet within hook library. + ScopedEnableOptionsCopy<Pkt6> query6_options_copy(query); + + // Pass incoming packet as argument + callout_handle->setArgument("query6", query); + + // Call callouts + HooksManager::callCallouts(Hooks.hook_index_pkt6_receive_, *callout_handle); + + // Callouts decided to skip the next processing step. The next + // processing step would to process the packet, so skip at this + // stage means drop. + if ((callout_handle->getStatus() == CalloutHandle::NEXT_STEP_SKIP) || + (callout_handle->getStatus() == CalloutHandle::NEXT_STEP_DROP)) { + LOG_DEBUG(hooks_logger, DBG_DHCP6_HOOKS, DHCP6_HOOK_PACKET_RCVD_SKIP) + .arg(query->getLabel()); + // Increase the statistic of dropped packets. + StatsMgr::instance().addValue("pkt6-receive-drop", + static_cast<int64_t>(1)); + return; + } + + callout_handle->getArgument("query6", query); + } + + // Reject the message if it doesn't pass the sanity check. + if (!sanityCheck(query)) { + return; + } + + // Check the DROP special class. + if (query->inClass("DROP")) { + LOG_DEBUG(packet6_logger, DBGLVL_PKT_HANDLING, DHCP6_PACKET_DROP_DROP_CLASS) + .arg(query->toText()); + StatsMgr::instance().addValue("pkt6-receive-drop", + static_cast<int64_t>(1)); + return; + } + + processDhcp6Query(query, rsp); +} + +void +Dhcpv6Srv::processDhcp6QueryAndSendResponse(Pkt6Ptr& query, Pkt6Ptr& rsp) { + try { + processDhcp6Query(query, rsp); + if (!rsp) { + return; + } + + CalloutHandlePtr callout_handle = getCalloutHandle(query); + processPacketBufferSend(callout_handle, rsp); + } catch (const std::exception& e) { + LOG_ERROR(packet6_logger, DHCP6_PACKET_PROCESS_STD_EXCEPTION) + .arg(e.what()); + } catch (...) { + LOG_ERROR(packet6_logger, DHCP6_PACKET_PROCESS_EXCEPTION); + } +} + +void +Dhcpv6Srv::processDhcp6Query(Pkt6Ptr& query, Pkt6Ptr& rsp) { + // Create a client race avoidance RAII handler. + ClientHandler client_handler; + + // Check for lease modifier queries from the same client being processed. + if (MultiThreadingMgr::instance().getMode() && + ((query->getType() == DHCPV6_SOLICIT) || + (query->getType() == DHCPV6_REQUEST) || + (query->getType() == DHCPV6_RENEW) || + (query->getType() == DHCPV6_REBIND) || + (query->getType() == DHCPV6_RELEASE) || + (query->getType() == DHCPV6_DECLINE))) { + ContinuationPtr cont = + makeContinuation(std::bind(&Dhcpv6Srv::processDhcp6QueryAndSendResponse, + this, query, rsp)); + if (!client_handler.tryLock(query, cont)) { + return; + } + } + + // Let's create a simplified client context here. + AllocEngine::ClientContext6 ctx; + if (!earlyGHRLookup(query, ctx)) { + return; + } + + if (query->getType() == DHCPV6_DHCPV4_QUERY) { + // This call never throws. Should this change, this section must be + // enclosed in try-catch. + processDhcp4Query(query); + return; + } + + // Complete the client context initialization. + bool drop = false; + initContext(query, ctx, drop); + + // Stop here if initContext decided to drop the packet. + if (drop) { + return; + } + + // Park point here. + + try { + switch (query->getType()) { + case DHCPV6_SOLICIT: + rsp = processSolicit(ctx); + break; + + case DHCPV6_REQUEST: + rsp = processRequest(ctx); + break; + + case DHCPV6_RENEW: + rsp = processRenew(ctx); + break; + + case DHCPV6_REBIND: + rsp = processRebind(ctx); + break; + + case DHCPV6_CONFIRM: + rsp = processConfirm(ctx); + break; + + case DHCPV6_RELEASE: + rsp = processRelease(ctx); + break; + + case DHCPV6_DECLINE: + rsp = processDecline(ctx); + break; + + case DHCPV6_INFORMATION_REQUEST: + rsp = processInfRequest(ctx); + break; + + default: + return; + } + + } catch (const std::exception& e) { + + // Catch-all exception (at least for ones based on the isc Exception + // class, which covers more or less all that are explicitly raised + // in the Kea code), but also the standard one, which may possibly be + // thrown from boost code. Just log the problem and ignore the packet. + // (The problem is logged as a debug message because debug is + // disabled by default - it prevents a DDOS attack based on the + // sending of problem packets.) + LOG_DEBUG(bad_packet6_logger, DBG_DHCP6_BASIC, DHCP6_PACKET_PROCESS_FAIL) + .arg(query->getName()) + .arg(query->getRemoteAddr().toText()) + .arg(e.what()); + + // Increase the statistic of dropped packets. + StatsMgr::instance().addValue("pkt6-receive-drop", static_cast<int64_t>(1)); + } + + if (!rsp) { + return; + } + + // Process relay-supplied options. It is important to call this very + // late in the process, because we now have all the options the + // server wanted to send already set. This is important, because + // RFC6422, section 6 states: + // + // The server SHOULD discard any options that appear in the RSOO + // for which it already has one or more candidates. + // + // So we ignore any RSOO options if there's an option with the same + // code already present. + processRSOO(query, rsp); + + rsp->setRemoteAddr(query->getRemoteAddr()); + rsp->setLocalAddr(query->getLocalAddr()); + + if (client_port_) { + // A command line option enforces a specific client port + rsp->setRemotePort(client_port_); + } else if (rsp->relay_info_.empty()) { + // Direct traffic, send back to the client directly + rsp->setRemotePort(DHCP6_CLIENT_PORT); + } else { + // Relayed traffic, send back to the relay agent + uint16_t relay_port = checkRelaySourcePort(query); + rsp->setRemotePort(relay_port ? relay_port : DHCP6_SERVER_PORT); + } + + if (server_port_) { + rsp->setLocalPort(server_port_); + } else { + rsp->setLocalPort(DHCP6_SERVER_PORT); + } + rsp->setIndex(query->getIndex()); + rsp->setIface(query->getIface()); + + CalloutHandlePtr callout_handle = getCalloutHandle(query); + if (!ctx.fake_allocation_ && (ctx.query_->getType() != DHCPV6_CONFIRM) && + (ctx.query_->getType() != DHCPV6_INFORMATION_REQUEST) && + HooksManager::calloutsPresent(Hooks.hook_index_leases6_committed_)) { + // The ScopedCalloutHandleState class which guarantees that the task + // is added to the thread pool after the response is reset (if needed) + // and CalloutHandle state is reset. In ST it does nothing. + // A smart pointer is used to store the ScopedCalloutHandleState so that + // a copy of the pointer is created by the lambda and only on the + // destruction of the last reference the task is added. + // In MT there are 2 cases: + // 1. packet is unparked before current thread smart pointer to + // ScopedCalloutHandleState is destroyed: + // - the lambda uses the smart pointer to set the callout which adds the + // task, but the task is added after ScopedCalloutHandleState is + // destroyed, on the destruction of the last reference which is held + // by the current thread. + // 2. packet is unparked after the current thread smart pointer to + // ScopedCalloutHandleState is destroyed: + // - the current thread reference to ScopedCalloutHandleState is + // destroyed, but the reference in the lambda keeps it alive until + // the lambda is called and the last reference is released, at which + // time the task is actually added. + // Use the RAII wrapper to make sure that the callout handle state is + // reset when this object goes out of scope. All hook points must do + // it to prevent possible circular dependency between the callout + // handle and its arguments. + std::shared_ptr<ScopedCalloutHandleState> callout_handle_state = + std::make_shared<ScopedCalloutHandleState>(callout_handle); + + ScopedEnableOptionsCopy<Pkt6> query6_options_copy(query); + + // Also pass the corresponding query packet as argument + callout_handle->setArgument("query6", query); + + Lease6CollectionPtr new_leases(new Lease6Collection()); + if (!ctx.new_leases_.empty()) { + // Filter out reused leases as they were not committed. + for (auto new_lease : ctx.new_leases_) { + if (new_lease->reuseable_valid_lft_ == 0) { + new_leases->push_back(new_lease); + } + } + } + callout_handle->setArgument("leases6", new_leases); + + Lease6CollectionPtr deleted_leases(new Lease6Collection()); + + // Do per IA lists + for (auto const& iac : ctx.ias_) { + if (!iac.old_leases_.empty()) { + for (auto old_lease : iac.old_leases_) { + if (ctx.new_leases_.empty()) { + deleted_leases->push_back(old_lease); + continue; + } + bool in_new = false; + for (auto const& new_lease : ctx.new_leases_) { + if ((new_lease->addr_ == old_lease->addr_) && + (new_lease->prefixlen_ == old_lease->prefixlen_)) { + in_new = true; + break; + } + } + if (!in_new) { + deleted_leases->push_back(old_lease); + } + } + } + } + callout_handle->setArgument("deleted_leases6", deleted_leases); + + // Get the parking limit. Parsing should ensure the value is present. + uint32_t parked_packet_limit = 0; + data::ConstElementPtr ppl = CfgMgr::instance().getCurrentCfg()-> + getConfiguredGlobal(CfgGlobals::PARKED_PACKET_LIMIT); + if (ppl) { + parked_packet_limit = ppl->intValue(); + } + + if (parked_packet_limit) { + const auto& parking_lot = ServerHooks::getServerHooks(). + getParkingLotPtr("leases6_committed"); + if (parking_lot && (parking_lot->size() >= parked_packet_limit)) { + // We can't park it so we're going to throw it on the floor. + LOG_DEBUG(packet6_logger, DBGLVL_PKT_HANDLING, + DHCP6_HOOK_LEASES6_PARKING_LOT_FULL) + .arg(parked_packet_limit) + .arg(query->getLabel()); + isc::stats::StatsMgr::instance().addValue("pkt6-receive-drop", + static_cast<int64_t>(1)); + rsp.reset(); + return; + } + } + + // We proactively park the packet. We'll unpark it without invoking + // the callback (i.e. drop) unless the callout status is set to + // NEXT_STEP_PARK. Otherwise the callback we bind here will be + // executed when the hook library unparks the packet. + HooksManager::park("leases6_committed", query, + [this, callout_handle, query, rsp, callout_handle_state]() mutable { + if (MultiThreadingMgr::instance().getMode()) { + typedef function<void()> CallBack; + boost::shared_ptr<CallBack> call_back = + boost::make_shared<CallBack>(std::bind(&Dhcpv6Srv::sendResponseNoThrow, + this, callout_handle, query, rsp)); + callout_handle_state->on_completion_ = [call_back]() { + MultiThreadingMgr::instance().getThreadPool().add(call_back); + }; + } else { + processPacketPktSend(callout_handle, query, rsp); + processPacketBufferSend(callout_handle, rsp); + } + }); + + try { + // Call all installed callouts + HooksManager::callCallouts(Hooks.hook_index_leases6_committed_, + *callout_handle); + } catch (...) { + // Make sure we don't orphan a parked packet. + HooksManager::drop("leases6_committed", query); + throw; + } + + if (callout_handle->getStatus() == CalloutHandle::NEXT_STEP_PARK) { + LOG_DEBUG(hooks_logger, DBG_DHCP6_HOOKS, DHCP6_HOOK_LEASES6_COMMITTED_PARK) + .arg(query->getLabel()); + // Since the hook library(ies) are going to do the unparking, then + // reset the pointer to the response to indicate to the caller that + // it should return, as the packet processing will continue via + // the callback. + rsp.reset(); + } else { + // Drop the park job on the packet, it isn't needed. + HooksManager::drop("leases6_committed", query); + if (callout_handle->getStatus() == CalloutHandle::NEXT_STEP_DROP) { + LOG_DEBUG(hooks_logger, DBGLVL_PKT_HANDLING, DHCP6_HOOK_LEASES6_COMMITTED_DROP) + .arg(query->getLabel()); + rsp.reset(); + } + } + } + + // If we have a response prep it for shipment. + if (rsp) { + processPacketPktSend(callout_handle, query, rsp); + } +} + +void +Dhcpv6Srv::sendResponseNoThrow(hooks::CalloutHandlePtr& callout_handle, + Pkt6Ptr& query, Pkt6Ptr& rsp) { + try { + processPacketPktSend(callout_handle, query, rsp); + processPacketBufferSend(callout_handle, rsp); + } catch (const std::exception& e) { + LOG_ERROR(packet6_logger, DHCP6_PACKET_PROCESS_STD_EXCEPTION) + .arg(e.what()); + } catch (...) { + LOG_ERROR(packet6_logger, DHCP6_PACKET_PROCESS_EXCEPTION); + } +} + +void +Dhcpv6Srv::processPacketPktSend(hooks::CalloutHandlePtr& callout_handle, + Pkt6Ptr& query, Pkt6Ptr& rsp) { + if (!rsp) { + return; + } + + // Specifies if server should do the packing + bool skip_pack = false; + + // Server's reply packet now has all options and fields set. + // Options are represented by individual objects, but the + // output wire data has not been prepared yet. + // Execute all callouts registered for packet6_send + if (HooksManager::calloutsPresent(Hooks.hook_index_pkt6_send_)) { + + // Use the RAII wrapper to make sure that the callout handle state is + // reset when this object goes out of scope. All hook points must do + // it to prevent possible circular dependency between the callout + // handle and its arguments. + ScopedCalloutHandleState callout_handle_state(callout_handle); + + // Enable copying options from the packets within hook library. + ScopedEnableOptionsCopy<Pkt6> query_resp_options_copy(query, rsp); + + // Pass incoming packet as argument + callout_handle->setArgument("query6", query); + + // Set our response + callout_handle->setArgument("response6", rsp); + + // Call all installed callouts + HooksManager::callCallouts(Hooks.hook_index_pkt6_send_, *callout_handle); + + // Callouts decided to skip the next processing step. The next + // processing step would to pack the packet (create wire data). + // That step will be skipped if any callout sets skip flag. + // It essentially means that the callout already did packing, + // so the server does not have to do it again. + if (callout_handle->getStatus() == CalloutHandle::NEXT_STEP_SKIP) { + LOG_DEBUG(hooks_logger, DBG_DHCP6_HOOKS, DHCP6_HOOK_PACKET_SEND_SKIP) + .arg(rsp->getLabel()); + skip_pack = true; + } + + /// Callouts decided to drop the packet. + if (callout_handle->getStatus() == CalloutHandle::NEXT_STEP_DROP) { + LOG_DEBUG(hooks_logger, DBGLVL_PKT_HANDLING, DHCP6_HOOK_PACKET_SEND_DROP) + .arg(rsp->getLabel()); + rsp.reset(); + return; + } + } + + if (!skip_pack) { + try { + rsp->pack(); + } catch (const std::exception& e) { + LOG_ERROR(options6_logger, DHCP6_PACK_FAIL).arg(e.what()); + return; + } + + } +} + +void +Dhcpv6Srv::processPacketBufferSend(CalloutHandlePtr& callout_handle, + Pkt6Ptr& rsp) { + if (!rsp) { + return; + } + + try { + // Now all fields and options are constructed into output wire buffer. + // Option objects modification does not make sense anymore. Hooks + // can only manipulate wire buffer at this stage. + // Let's execute all callouts registered for buffer6_send + if (HooksManager::calloutsPresent(Hooks.hook_index_buffer6_send_)) { + + // Use the RAII wrapper to make sure that the callout handle state is + // reset when this object goes out of scope. All hook points must do + // it to prevent possible circular dependency between the callout + // handle and its arguments. + ScopedCalloutHandleState callout_handle_state(callout_handle); + + // Enable copying options from the packet within hook library. + ScopedEnableOptionsCopy<Pkt6> response6_options_copy(rsp); + + // Pass incoming packet as argument + callout_handle->setArgument("response6", rsp); + + // Call callouts + HooksManager::callCallouts(Hooks.hook_index_buffer6_send_, + *callout_handle); + + // Callouts decided to skip the next processing step. The next + // processing step would to parse the packet, so skip at this + // stage means drop. + if ((callout_handle->getStatus() == CalloutHandle::NEXT_STEP_SKIP) || + (callout_handle->getStatus() == CalloutHandle::NEXT_STEP_DROP)) { + LOG_DEBUG(hooks_logger, DBG_DHCP6_HOOKS, + DHCP6_HOOK_BUFFER_SEND_SKIP) + .arg(rsp->getLabel()); + return; + } + + callout_handle->getArgument("response6", rsp); + } + + LOG_DEBUG(packet6_logger, DBG_DHCP6_BASIC, DHCP6_PACKET_SEND) + .arg(rsp->getLabel()) + .arg(rsp->getName()) + .arg(static_cast<int>(rsp->getType())) + .arg(rsp->getLocalAddr().isV6Zero() ? "*" : rsp->getLocalAddr().toText()) + .arg(rsp->getLocalPort()) + .arg(rsp->getRemoteAddr()) + .arg(rsp->getRemotePort()) + .arg(rsp->getIface()); + + LOG_DEBUG(packet6_logger, DBG_DHCP6_DETAIL_DATA, DHCP6_RESPONSE_DATA) + .arg(static_cast<int>(rsp->getType())).arg(rsp->toText()); + + sendPacket(rsp); + + // Update statistics accordingly for sent packet. + processStatsSent(rsp); + + } catch (const std::exception& e) { + LOG_ERROR(packet6_logger, DHCP6_PACKET_SEND_FAIL).arg(e.what()); + } +} + +std::string +Dhcpv6Srv::duidToString(const OptionPtr& opt) { + stringstream tmp; + + OptionBuffer data = opt->getData(); + + bool colon = false; + for (OptionBufferConstIter it = data.begin(); it != data.end(); ++it) { + if (colon) { + tmp << ":"; + } + tmp << hex << setw(2) << setfill('0') << static_cast<uint16_t>(*it); + if (!colon) { + colon = true; + } + } + + return tmp.str(); +} + +void +Dhcpv6Srv::copyClientOptions(const Pkt6Ptr& question, Pkt6Ptr& answer) { + // Add client-id. + OptionPtr clientid = question->getOption(D6O_CLIENTID); + if (clientid) { + answer->addOption(clientid); + } + /// @todo: Should throw if there is no client-id (except anonymous INF-REQUEST) + + // If this is a relayed message, we need to copy relay information + if (!question->relay_info_.empty()) { + answer->copyRelayInfo(question); + } + +} + +void +Dhcpv6Srv::appendDefaultOptions(const Pkt6Ptr&, Pkt6Ptr& answer, + const CfgOptionList&) { + // add server-id + answer->addOption(getServerID()); +} + +void +Dhcpv6Srv::buildCfgOptionList(const Pkt6Ptr& question, + AllocEngine::ClientContext6& ctx, + CfgOptionList& co_list) { + // Firstly, host specific options. + if (ctx.currentHost() && !ctx.currentHost()->getCfgOption6()->empty()) { + co_list.push_back(ctx.currentHost()->getCfgOption6()); + } + + // Secondly, pool specific options. Pools are defined within a subnet, so + // if there is no subnet, there is nothing to do. + if (ctx.subnet_) { + for (auto resource : ctx.allocated_resources_) { + PoolPtr pool = + ctx.subnet_->getPool(resource.getPrefixLength() == 128 ? + Lease::TYPE_NA : Lease::TYPE_PD, + resource.getAddress(), + false); + if (pool && !pool->getCfgOption()->empty()) { + co_list.push_back(pool->getCfgOption()); + } + } + }; + + if (ctx.subnet_) { + // Next, subnet configured options. + if (!ctx.subnet_->getCfgOption()->empty()) { + co_list.push_back(ctx.subnet_->getCfgOption()); + } + + // Then, shared network specific options. + SharedNetwork6Ptr network; + ctx.subnet_->getSharedNetwork(network); + if (network && !network->getCfgOption()->empty()) { + co_list.push_back(network->getCfgOption()); + } + } + + // Each class in the incoming packet + const ClientClasses& classes = question->getClasses(); + for (ClientClasses::const_iterator cclass = classes.cbegin(); + cclass != classes.cend(); ++cclass) { + // Find the client class definition for this class + const ClientClassDefPtr& ccdef = CfgMgr::instance().getCurrentCfg()-> + getClientClassDictionary()->findClass(*cclass); + if (!ccdef) { + // Not found: the class is built-in or not configured + if (!isClientClassBuiltIn(*cclass)) { + LOG_DEBUG(dhcp6_logger, DBG_DHCP6_BASIC, DHCP6_CLASS_UNCONFIGURED) + .arg(question->getLabel()) + .arg(*cclass); + } + // Skip it + continue; + } + + if (ccdef->getCfgOption()->empty()) { + // Skip classes which don't configure options + continue; + } + + co_list.push_back(ccdef->getCfgOption()); + } + + // Last global options + if (!CfgMgr::instance().getCurrentCfg()->getCfgOption()->empty()) { + co_list.push_back(CfgMgr::instance().getCurrentCfg()->getCfgOption()); + } +} + +void +Dhcpv6Srv::appendRequestedOptions(const Pkt6Ptr& question, Pkt6Ptr& answer, + const CfgOptionList& co_list) { + + // Unlikely short cut + if (co_list.empty()) { + return; + } + + std::vector<uint16_t> requested_opts; + + // Client requests some options using ORO option. Try to + // get this option from client's message. + boost::shared_ptr<OptionIntArray<uint16_t> > option_oro = + boost::dynamic_pointer_cast<OptionIntArray<uint16_t> > + (question->getOption(D6O_ORO)); + + // Get the list of options that client requested. + if (option_oro) { + requested_opts = option_oro->getValues(); + } + // Iterate on the configured option list to add persistent options + for (CfgOptionList::const_iterator copts = co_list.begin(); + copts != co_list.end(); ++copts) { + const OptionContainerPtr& opts = (*copts)->getAll(DHCP6_OPTION_SPACE); + if (!opts) { + continue; + } + // Get persistent options + const OptionContainerPersistIndex& idx = opts->get<2>(); + const OptionContainerPersistRange& range = idx.equal_range(true); + for (OptionContainerPersistIndex::const_iterator desc = range.first; + desc != range.second; ++desc) { + // Add the persistent option code to requested options + if (desc->option_) { + requested_opts.push_back(desc->option_->getType()); + } + } + } + + for (uint16_t opt : requested_opts) { + // Add nothing when it is already there. + if (!answer->getOption(opt)) { + // Iterate on the configured option list + for (CfgOptionList::const_iterator copts = co_list.begin(); + copts != co_list.end(); ++copts) { + OptionDescriptor desc = (*copts)->get(DHCP6_OPTION_SPACE, opt); + // Got it: add it and jump to the outer loop + if (desc.option_) { + answer->addOption(desc.option_); + break; + } + } + } + } +} + +void +Dhcpv6Srv::appendRequestedVendorOptions(const Pkt6Ptr& question, + Pkt6Ptr& answer, + AllocEngine::ClientContext6& ctx, + const CfgOptionList& co_list) { + + // Leave if there is no subnet matching the incoming packet. + // There is no need to log the error message here because + // it will be logged in the assignLease() when it fails to + // pick the suitable subnet. We don't want to duplicate + // error messages in such case. + // + // Also, if there's no options to possibly assign, give up. + if (!ctx.subnet_ || co_list.empty()) { + return; + } + + uint32_t vendor_id = 0; + + // The server could have provided the option using client classification or + // hooks. If there's a vendor info option in the response already, use that. + OptionVendorPtr vendor_rsp(boost::dynamic_pointer_cast<OptionVendor>( + answer->getOption(D6O_VENDOR_OPTS))); + if (vendor_rsp) { + vendor_id = vendor_rsp->getVendorId(); + } + + // Otherwise, try to get the vendor-id from the client packet's + // vendor-specific information option (17). + OptionVendorPtr vendor_req; + if (vendor_id == 0) { + vendor_req = boost::dynamic_pointer_cast<OptionVendor>( + question->getOption(D6O_VENDOR_OPTS)); + if (vendor_req) { + vendor_id = vendor_req->getVendorId(); + } + } + + // Finally, try to get the vendor-id from the client packet's vendor-class + // option (16). + if (vendor_id == 0) { + OptionVendorClassPtr vendor_class( + boost::dynamic_pointer_cast<OptionVendorClass>( + question->getOption(D6O_VENDOR_CLASS))); + if (vendor_class) { + vendor_id = vendor_class->getVendorId(); + } + } + + // If there's no vendor option in either request or response, then there's no way + // to figure out what the vendor-id value is and we give up. + if (vendor_id == 0) { + return; + } + + std::vector<uint16_t> requested_opts; + + // Let's try to get ORO within that vendor-option. + // This is specific to vendor-id=4491 (Cable Labs). Other vendors may have + // different policies. + OptionUint16ArrayPtr oro; + if (vendor_id == VENDOR_ID_CABLE_LABS && vendor_req) { + OptionPtr oro_generic = vendor_req->getOption(DOCSIS3_V6_ORO); + if (oro_generic) { + // Vendor ID 4491 makes Kea look at DOCSIS3_V6_OPTION_DEFINITIONS + // when parsing options. Based on that, oro_generic will have been + // created as an OptionUint16Array, but might not be for other + // vendor IDs. + oro = boost::dynamic_pointer_cast<OptionUint16Array>(oro_generic); + if (oro) { + requested_opts = oro->getValues(); + } + } + } + + // Iterate on the configured option list to add persistent options + for (CfgOptionList::const_iterator copts = co_list.begin(); + copts != co_list.end(); ++copts) { + const OptionContainerPtr& opts = (*copts)->getAll(vendor_id); + if (!opts) { + continue; + } + // Get persistent options + const OptionContainerPersistIndex& idx = opts->get<2>(); + const OptionContainerPersistRange& range = idx.equal_range(true); + for (OptionContainerPersistIndex::const_iterator desc = range.first; + desc != range.second; ++desc) { + // Add the persistent option code to requested options + if (desc->option_) { + requested_opts.push_back(desc->option_->getType()); + } + } + } + + // If there is nothing to add don't do anything then. + if (requested_opts.empty()) { + return; + } + + if (!vendor_rsp) { + // It's possible that the vendor opts option was inserted already + // by client class or a hook. If that is so, let's use it. + vendor_rsp.reset(new OptionVendor(Option::V6, vendor_id)); + } + + // Get the list of options that client requested. + bool added = false; + + for (uint16_t opt : requested_opts) { + if (!vendor_rsp->getOption(opt)) { + for (CfgOptionList::const_iterator copts = co_list.begin(); + copts != co_list.end(); ++copts) { + OptionDescriptor desc = (*copts)->get(vendor_id, opt); + if (desc.option_) { + vendor_rsp->addOption(desc.option_); + added = true; + break; + } + } + } + } + + // If we added some sub-options and the vendor opts option is not in + // the response already, then add it. + if (added && !answer->getOption(D6O_VENDOR_OPTS)) { + answer->addOption(vendor_rsp); + } +} + +bool +Dhcpv6Srv::sanityCheck(const Pkt6Ptr& pkt) { + try { + switch (pkt->getType()) { + case DHCPV6_SOLICIT: + case DHCPV6_REBIND: + case DHCPV6_CONFIRM: + sanityCheck(pkt, MANDATORY, FORBIDDEN); + return (true); + + case DHCPV6_REQUEST: + case DHCPV6_RENEW: + case DHCPV6_RELEASE: + case DHCPV6_DECLINE: + sanityCheck(pkt, MANDATORY, MANDATORY); + return (true); + + case DHCPV6_INFORMATION_REQUEST: + case DHCPV6_DHCPV4_QUERY: + sanityCheck(pkt, OPTIONAL, OPTIONAL); + return (true); + + default: + LOG_DEBUG(bad_packet6_logger, DBG_DHCP6_BASIC, + DHCP6_UNKNOWN_MSG_RECEIVED) + .arg(static_cast<int>(pkt->getType())) + .arg(pkt->getIface()); + } + + } catch (const RFCViolation& e) { + LOG_DEBUG(bad_packet6_logger, DBG_DHCP6_BASIC, DHCP6_REQUIRED_OPTIONS_CHECK_FAIL) + .arg(pkt->getName()) + .arg(pkt->getRemoteAddr().toText()) + .arg(e.what()); + + } + + // Increase the statistic of dropped packets. + StatsMgr::instance().addValue("pkt6-receive-drop", static_cast<int64_t>(1)); + return (false); +} + +void +Dhcpv6Srv::sanityCheck(const Pkt6Ptr& pkt, RequirementLevel clientid, + RequirementLevel serverid) { + OptionCollection client_ids = pkt->getOptions(D6O_CLIENTID); + switch (clientid) { + case MANDATORY: { + if (client_ids.size() != 1) { + isc_throw(RFCViolation, "Exactly 1 client-id option expected in " + << pkt->getName() << ", but " << client_ids.size() + << " received"); + } + sanityCheckDUID(client_ids.begin()->second, "client-id"); + break; + } + case OPTIONAL: + if (client_ids.size() > 1) { + isc_throw(RFCViolation, "Too many (" << client_ids.size() + << ") client-id options received in " << pkt->getName()); + } + if (!client_ids.empty()) { + sanityCheckDUID(client_ids.begin()->second, "client-id"); + } + break; + + case FORBIDDEN: + // doesn't make sense - client-id is always allowed + break; + } + + OptionCollection server_ids = pkt->getOptions(D6O_SERVERID); + switch (serverid) { + case FORBIDDEN: + if (!server_ids.empty()) { + isc_throw(RFCViolation, "Server-id option was not expected, but " + << server_ids.size() << " received in " << pkt->getName()); + } + break; + + case MANDATORY: + if (server_ids.size() != 1) { + isc_throw(RFCViolation, "Invalid number of server-id options received (" + << server_ids.size() << "), exactly 1 expected in message " + << pkt->getName()); + } + sanityCheckDUID(server_ids.begin()->second, "server-id"); + break; + + case OPTIONAL: + if (server_ids.size() > 1) { + isc_throw(RFCViolation, "Too many (" << server_ids.size() + << ") server-id options received in " << pkt->getName()); + } + if (!server_ids.empty()) { + sanityCheckDUID(server_ids.begin()->second, "server-id"); + } + } +} + +void Dhcpv6Srv::sanityCheckDUID(const OptionPtr& opt, const std::string& opt_name) { + if (!opt) { + isc_throw(RFCViolation, "Unable to find expected option " << opt_name); + } + + // The client-id or server-id has to have at least 3 bytes of useful data: + // two for duid type and one more for actual duid value. + uint16_t len = opt->len() - opt->getHeaderLen(); + if (len < 3 || len > DUID::MAX_DUID_LEN || opt->getData().empty()) { + isc_throw(RFCViolation, "Received invalid DUID for " << opt_name << ", received " + << len << " byte(s). It must be at least 3 and no more than " + << DUID::MAX_DUID_LEN); + } +} + +Subnet6Ptr +Dhcpv6Srv::selectSubnet(const Pkt6Ptr& question, bool& drop) { + const SubnetSelector& selector = CfgSubnets6::initSelector(question); + + Subnet6Ptr subnet = CfgMgr::instance().getCurrentCfg()-> + getCfgSubnets6()->selectSubnet(selector); + + // Let's execute all callouts registered for subnet6_receive + if (HooksManager::calloutsPresent(Hooks.hook_index_subnet6_select_)) { + CalloutHandlePtr callout_handle = getCalloutHandle(question); + + // Use the RAII wrapper to make sure that the callout handle state is + // reset when this object goes out of scope. All hook points must do + // it to prevent possible circular dependency between the callout + // handle and its arguments. + ScopedCalloutHandleState callout_handle_state(callout_handle); + + // Enable copying options from the packet within hook library. + ScopedEnableOptionsCopy<Pkt6> query6_options_copy(question); + + // Set new arguments + callout_handle->setArgument("query6", question); + callout_handle->setArgument("subnet6", subnet); + + // We pass pointer to const collection for performance reasons. + // Otherwise we would get a non-trivial performance penalty each + // time subnet6_select is called. + callout_handle->setArgument("subnet6collection", + CfgMgr::instance().getCurrentCfg()-> + getCfgSubnets6()->getAll()); + + // Call user (and server-side) callouts + HooksManager::callCallouts(Hooks.hook_index_subnet6_select_, *callout_handle); + + // Callouts decided to skip this step. This means that no + // subnet will be selected. Packet processing will continue, + // but it will be severely limited (i.e. only global options + // will be assigned) + if (callout_handle->getStatus() == CalloutHandle::NEXT_STEP_SKIP) { + LOG_DEBUG(hooks_logger, DBG_DHCP6_HOOKS, DHCP6_HOOK_SUBNET6_SELECT_SKIP) + .arg(question->getLabel()); + return (Subnet6Ptr()); + } + + // Callouts decided to drop the packet. It is a superset of the + // skip case so no subnet will be selected. + if (callout_handle->getStatus() == CalloutHandle::NEXT_STEP_DROP) { + LOG_DEBUG(hooks_logger, DBG_DHCP6_HOOKS, DHCP6_HOOK_SUBNET6_SELECT_DROP) + .arg(question->getLabel()); + drop = true; + return (Subnet6Ptr()); + } + + // Use whatever subnet was specified by the callout + callout_handle->getArgument("subnet6", subnet); + } + + if (subnet) { + // Log at higher debug level that subnet has been found. + LOG_DEBUG(packet6_logger, DBG_DHCP6_BASIC_DATA, DHCP6_SUBNET_SELECTED) + .arg(question->getLabel()) + .arg(subnet->getID()); + // Log detailed information about the selected subnet at the + // lower debug level. + LOG_DEBUG(packet6_logger, DBG_DHCP6_DETAIL_DATA, DHCP6_SUBNET_DATA) + .arg(question->getLabel()) + .arg(subnet->toText()); + + } else { + LOG_DEBUG(packet6_logger, DBG_DHCP6_DETAIL, DHCP6_SUBNET_SELECTION_FAILED) + .arg(question->getLabel()); + } + + return (subnet); +} + +void +Dhcpv6Srv::assignLeases(const Pkt6Ptr& question, Pkt6Ptr& answer, + AllocEngine::ClientContext6& ctx) { + // Save the originally selected subnet. + Subnet6Ptr orig_subnet = ctx.subnet_; + + // We need to allocate addresses for all IA_NA options in the client's + // question (i.e. SOLICIT or REQUEST) message. + // @todo add support for IA_TA + + // For the lease allocation it is critical that the client has sent + // DUID. There is no need to check for the presence of the DUID here + // because we have already checked it in the sanityCheck(). + + // Now that we have all information about the client, let's iterate over all + // received options and handle IA_NA options one by one and store our + // responses in answer message (ADVERTISE or REPLY). + // + // @todo: IA_TA once we implement support for temporary addresses. + for (const auto& opt : question->options_) { + switch (opt.second->getType()) { + case D6O_IA_NA: { + OptionPtr answer_opt = assignIA_NA(question, ctx, + boost::dynamic_pointer_cast< + Option6IA>(opt.second)); + if (answer_opt) { + answer->addOption(answer_opt); + } + break; + } + case D6O_IA_PD: { + OptionPtr answer_opt = assignIA_PD(question, ctx, + boost::dynamic_pointer_cast< + Option6IA>(opt.second)); + if (answer_opt) { + answer->addOption(answer_opt); + } + break; + } + default: + break; + } + } + + // Subnet may be modified by the allocation engine, there are things + // we need to do when that happens. + checkDynamicSubnetChange(question, answer, ctx, orig_subnet); +} + +void +Dhcpv6Srv::processClientFqdn(const Pkt6Ptr& question, const Pkt6Ptr& answer, + AllocEngine::ClientContext6& ctx) { + D2ClientMgr& d2_mgr = CfgMgr::instance().getD2ClientMgr(); + DdnsParamsPtr ddns_params = ctx.getDdnsParams(); + + // Get Client FQDN Option from the client's message. If this option hasn't + // been included, do nothing. + Option6ClientFqdnPtr fqdn = boost::dynamic_pointer_cast< + Option6ClientFqdn>(question->getOption(D6O_CLIENT_FQDN)); + if (!fqdn) { + if (ddns_params->getEnableUpdates() && + (ddns_params->getReplaceClientNameMode() == D2ClientConfig::RCM_ALWAYS || + ddns_params->getReplaceClientNameMode() == D2ClientConfig::RCM_WHEN_NOT_PRESENT)) { + // Fabricate an empty "client" FQDN with flags requesting + // the server do all the updates. The flags will get modified + // below according the configuration options, the name will + // be supplied later on. + fqdn.reset(new Option6ClientFqdn(Option6ClientFqdn::FLAG_S, "", + Option6ClientFqdn::PARTIAL)); + LOG_DEBUG(ddns6_logger, DBG_DHCP6_DETAIL, DHCP6_DDNS_GENERATE_FQDN) + .arg(question->getLabel()); + } else { + // No FQDN so get the lease hostname from the host reservation if + // there is one. + if (ctx.currentHost()) { + ctx.hostname_ = ctx.currentHost()->getHostname(); + } + + return; + } + } + + LOG_DEBUG(ddns6_logger, DBG_DHCP6_DETAIL, DHCP6_DDNS_RECEIVE_FQDN) + .arg(question->getLabel()) + .arg(fqdn->toText()); + + // Create the DHCPv6 Client FQDN Option to be included in the server's + // response to a client. + Option6ClientFqdnPtr fqdn_resp(new Option6ClientFqdn(*fqdn)); + + // Set the server S, N, and O flags based on client's flags and + // current configuration. + d2_mgr.adjustFqdnFlags<Option6ClientFqdn>(*fqdn, *fqdn_resp, *ddns_params); + + // Get DDNS update direction flags + CfgMgr::instance().getD2ClientMgr().getUpdateDirections(*fqdn_resp, ctx.fwd_dns_update_, + ctx.rev_dns_update_); + + // If there's a reservation and it has a hostname specified, use it! + if (ctx.currentHost() && !ctx.currentHost()->getHostname().empty()) { + // Add the qualifying suffix. + // After #3765, this will only occur if the suffix is not empty. + fqdn_resp->setDomainName(d2_mgr.qualifyName(ctx.currentHost()->getHostname(), + *ddns_params, true), + Option6ClientFqdn::FULL); + } else { + // Adjust the domain name based on domain name value and type sent by + // the client and current configuration. + d2_mgr.adjustDomainName<Option6ClientFqdn>(*fqdn, *fqdn_resp, *ddns_params); + } + + // Once we have the FQDN setup to use it for the lease hostname. This + // only gets replaced later if the FQDN is to be generated from the address. + ctx.hostname_ = fqdn_resp->getDomainName(); + + // The FQDN has been processed successfully. Let's append it to the + // response to be sent to a client. Note that the Client FQDN option is + // always sent back to the client if Client FQDN was included in the + // client's message. + LOG_DEBUG(ddns6_logger, DBG_DHCP6_DETAIL, DHCP6_DDNS_RESPONSE_FQDN_DATA) + .arg(question->getLabel()) + .arg(fqdn_resp->toText()); + answer->addOption(fqdn_resp); + + // Optionally, call a hook that may override the decisions made + // earlier. + if (HooksManager::calloutsPresent(Hooks.hook_index_ddns6_update_)) { + CalloutHandlePtr callout_handle = getCalloutHandle(question); + + // Use the RAII wrapper to make sure that the callout handle state is + // reset when this object goes out of scope. All hook points must do + // it to prevent possible circular dependency between the callout + // handle and its arguments. + ScopedCalloutHandleState callout_handle_state(callout_handle); + + // Setup the callout arguments. + Subnet6Ptr subnet = ctx.subnet_; + callout_handle->setArgument("query6", question); + callout_handle->setArgument("response6", answer); + callout_handle->setArgument("subnet6", subnet); + callout_handle->setArgument("hostname", ctx.hostname_); + callout_handle->setArgument("fwd-update", ctx.fwd_dns_update_); + callout_handle->setArgument("rev-update", ctx.rev_dns_update_); + callout_handle->setArgument("ddns-params", ddns_params); + + // Call callouts + HooksManager::callCallouts(Hooks.hook_index_ddns6_update_, *callout_handle); + + // Let's get the parameters returned by hook. + string hook_hostname; + bool hook_fwd_dns_update; + bool hook_rev_dns_update; + callout_handle->getArgument("hostname", hook_hostname); + callout_handle->getArgument("fwd-update", hook_fwd_dns_update); + callout_handle->getArgument("rev-update", hook_rev_dns_update); + + // If there's anything changed by the hook, log it and then update the parameters + if ((ctx.hostname_ != hook_hostname) || (ctx.fwd_dns_update_!= hook_fwd_dns_update) || + (ctx.rev_dns_update_ != hook_rev_dns_update)) { + LOG_DEBUG(hooks_logger, DBGLVL_PKT_HANDLING, DHCP6_HOOK_DDNS_UPDATE) + .arg(ctx.hostname_).arg(hook_hostname) + .arg(ctx.fwd_dns_update_).arg(hook_fwd_dns_update) + .arg(ctx.rev_dns_update_).arg(hook_rev_dns_update); + + // Update the FQDN option in the response. + fqdn_resp = boost::dynamic_pointer_cast<Option6ClientFqdn>(answer->getOption(D6O_CLIENT_FQDN)); + if (fqdn) { + fqdn_resp->setDomainName(hook_hostname, Option6ClientFqdn::FULL); + if (!(hook_fwd_dns_update || hook_rev_dns_update)) { + // Hook disabled updates, Set flags back to client accordingly. + fqdn_resp->setFlag(Option6ClientFqdn::FLAG_S, 0); + fqdn_resp->setFlag(Option6ClientFqdn::FLAG_N, 1); + } + } + + ctx.hostname_ = hook_hostname; + ctx.fwd_dns_update_ = hook_fwd_dns_update; + ctx.rev_dns_update_ = hook_rev_dns_update; + } + } +} + +void +Dhcpv6Srv::createNameChangeRequests(const Pkt6Ptr& answer, + AllocEngine::ClientContext6& ctx) { + // Don't create NameChangeRequests if DNS updates are disabled. + if (!(ctx.getDdnsParams()->getEnableUpdates())) { + return; + } + + // The response message instance is always required. For instance it + // holds the Client Identifier. It is a programming error if supplied + // message is NULL. + if (!answer) { + isc_throw(isc::Unexpected, "an instance of the object" + << " encapsulating server's message must not be" + << " NULL when creating DNS NameChangeRequest"); + } + + // It is likely that client haven't included the FQDN option. In such case, + // FQDN option will be NULL. This is valid state, so we simply return. + Option6ClientFqdnPtr opt_fqdn = boost::dynamic_pointer_cast< + Option6ClientFqdn>(answer->getOption(D6O_CLIENT_FQDN)); + if (!opt_fqdn) { + return; + } + + // Get the update directions that should be performed based on our + // response FQDN flags. + bool do_fwd = false; + bool do_rev = false; + CfgMgr::instance().getD2ClientMgr().getUpdateDirections(*opt_fqdn, + do_fwd, do_rev); + + // Get the Client Id. It is mandatory and a function creating a response + // would have thrown an exception if it was missing. Thus throwing + // Unexpected if it is missing as it is a programming error. + OptionPtr opt_duid = answer->getOption(D6O_CLIENTID); + if (!opt_duid) { + isc_throw(isc::Unexpected, + "client identifier is required when creating a new" + " DNS NameChangeRequest"); + } + DuidPtr duid = DuidPtr(new DUID(opt_duid->getData())); + + // Get the FQDN in the on-wire format. It will be needed to compute + // DHCID. + OutputBuffer name_buf(1); + opt_fqdn->packDomainName(name_buf); + const uint8_t* name_data = static_cast<const uint8_t*>(name_buf.getData()); + // @todo currently D2Dhcid accepts a vector holding FQDN. + // However, it will be faster if we used a pointer name_data. + std::vector<uint8_t> buf_vec(name_data, name_data + name_buf.getLength()); + // Compute DHCID from Client Identifier and FQDN. + isc::dhcp_ddns::D2Dhcid dhcid(*duid, buf_vec); + + // Get all IAs from the answer. For each IA, holding an address we will + // create a corresponding NameChangeRequest. + for (auto answer_ia : answer->getOptions(D6O_IA_NA)) { + /// @todo IA_NA may contain multiple addresses. We should process + /// each address individually. Currently we get only one. + Option6IAAddrPtr iaaddr = boost::static_pointer_cast< + Option6IAAddr>(answer_ia.second->getOption(D6O_IAADDR)); + + // We need an address to create a name-to-address mapping. + // If address is missing for any reason, go to the next IA. + if (!iaaddr) { + continue; + } + + // If the lease for iaaddr is in the list of changed leases, we need + // to determine if the changes included changes to the FQDN. If so + // then we may need to do a CHG_REMOVE. + bool extended_only = false; + for (Lease6Collection::const_iterator l = ctx.currentIA().changed_leases_.begin(); + l != ctx.currentIA().changed_leases_.end(); ++l) { + + if ((*l)->addr_ == iaaddr->getAddress()) { + // The address is the same so this must be renewal. If we're not + // always updating on renew, then we only renew if DNS info has + // changed. + if (!ctx.getDdnsParams()->getUpdateOnRenew() && + ((*l)->hostname_ == opt_fqdn->getDomainName() && + (*l)->fqdn_fwd_ == do_fwd && (*l)->fqdn_rev_ == do_rev)) { + extended_only = true; + } else { + // Queue a CHG_REMOVE of the old data. + // NCR will only be created if the lease hostname is not + // empty and at least one of the direction flags is true + queueNCR(CHG_REMOVE, *l); + } + + break; + } + } + + if (!(do_fwd || do_rev) || (extended_only)) { + // Flags indicate no updates needed or it was an extension of + // an existing lease with no FQDN changes. In the case of the + // former, the most likely scenario is that we are honoring the + // client's request that no updates be done. + continue; + } + + // Create new NameChangeRequest. Use the domain name from the FQDN. + // This is an FQDN included in the response to the client, so it + // holds a fully qualified domain-name already (not partial). + // Get the IP address from the lease. + NameChangeRequestPtr ncr; + ncr.reset(new NameChangeRequest(isc::dhcp_ddns::CHG_ADD, + do_fwd, do_rev, + opt_fqdn->getDomainName(), + iaaddr->getAddress().toText(), + dhcid, 0, calculateDdnsTtl(iaaddr->getValid()), + ctx.getDdnsParams()->getUseConflictResolution())); + LOG_DEBUG(ddns6_logger, DBG_DHCP6_DETAIL, + DHCP6_DDNS_CREATE_ADD_NAME_CHANGE_REQUEST).arg(ncr->toText()); + + // Post the NCR to the D2ClientMgr. + CfgMgr::instance().getD2ClientMgr().sendRequest(ncr); + + /// @todo Currently we create NCR with the first IPv6 address that + /// is carried in one of the IA_NAs. In the future, the NCR API should + /// be extended to map multiple IPv6 addresses to a single FQDN. + /// In such case, this return statement will be removed. + return; + } +} + +HWAddrPtr +Dhcpv6Srv::getMAC(const Pkt6Ptr& pkt) { + CfgMACSources mac_sources = CfgMgr::instance().getCurrentCfg()-> + getMACSources().get(); + HWAddrPtr hwaddr; + for (CfgMACSources::const_iterator it = mac_sources.begin(); + it != mac_sources.end(); ++it) { + hwaddr = pkt->getMAC(*it); + if (hwaddr) { + return (hwaddr); + } + } + return (hwaddr); +} + +OptionPtr +Dhcpv6Srv::assignIA_NA(const Pkt6Ptr& query, + AllocEngine::ClientContext6& ctx, + boost::shared_ptr<Option6IA> ia) { + + // Check if the client sent us a hint in his IA_NA. Clients may send an + // address in their IA_NA options as a suggestion (e.g. the last address + // they used before). + Option6IAAddrPtr hint_opt = + boost::dynamic_pointer_cast<Option6IAAddr>(ia->getOption(D6O_IAADDR)); + IOAddress hint = IOAddress::IPV6_ZERO_ADDRESS(); + if (hint_opt) { + hint = hint_opt->getAddress(); + } + + LOG_DEBUG(lease6_logger, DBG_DHCP6_DETAIL, DHCP6_PROCESS_IA_NA_REQUEST) + .arg(query->getLabel()) + .arg(ia->getIAID()) + .arg(hint_opt ? hint.toText() : "(no hint)"); + + // convenience values + const Subnet6Ptr& subnet = ctx.subnet_; + + // If there is no subnet selected for handling this IA_NA, the only thing left to do is + // to say that we are sorry, but the user won't get an address. As a convenience, we + // use a different status text to indicate that (compare to the same status code, + // but different wording below) + if (!subnet) { + // Create an empty IA_NA option with IAID matching the request. + // Note that we don't use OptionDefinition class to create this option. + // This is because we prefer using a constructor of Option6IA that + // initializes IAID. Otherwise we would have to use setIAID() after + // creation of the option which has some performance implications. + boost::shared_ptr<Option6IA> ia_rsp(new Option6IA(D6O_IA_NA, ia->getIAID())); + + // Insert status code NoAddrsAvail. + ia_rsp->addOption(createStatusCode(*query, *ia_rsp, STATUS_NoAddrsAvail, + "Server could not select subnet for" + " this client")); + return (ia_rsp); + } + + // Set per-IA context values. + ctx.createIAContext(); + ctx.currentIA().iaid_ = ia->getIAID(); + if (hint_opt) { + ctx.currentIA().addHint(hint_opt); + } else { + ctx.currentIA().addHint(hint); + } + ctx.currentIA().type_ = Lease::TYPE_NA; + + // Use allocation engine to pick a lease for this client. Allocation engine + // will try to honor the hint, but it is just a hint - some other address + // may be used instead. If fake_allocation is set to false, the lease will + // be inserted into the LeaseMgr as well. + Lease6Collection leases = alloc_engine_->allocateLeases6(ctx); + + /// @todo: Handle more than one lease + Lease6Ptr lease; + if (!leases.empty()) { + lease = *leases.begin(); + } + + // Create IA_NA that we will put in the response. + // Do not use OptionDefinition to create option's instance so + // as we can initialize IAID using a constructor. + Option6IAPtr ia_rsp(new Option6IA(D6O_IA_NA, ia->getIAID())); + + if (lease) { + // We have a lease! Let's wrap its content into IA_NA option + // with IAADDR suboption. + if (ctx.fake_allocation_) { + LOG_INFO(lease6_logger, DHCP6_LEASE_ADVERT) + .arg(query->getLabel()) + .arg(lease->addr_.toText()) + .arg(ia->getIAID()); + } else if (lease->reuseable_valid_lft_ == 0) { + LOG_INFO(lease6_logger, DHCP6_LEASE_ALLOC) + .arg(query->getLabel()) + .arg(lease->addr_.toText()) + .arg(ia->getIAID()) + .arg(Lease::lifetimeToText(lease->valid_lft_)); + } else { + lease->valid_lft_ = lease->reuseable_valid_lft_; + lease->preferred_lft_ = lease->reuseable_preferred_lft_; + LOG_INFO(lease6_logger, DHCP6_LEASE_REUSE) + .arg(query->getLabel()) + .arg(lease->addr_.toText()) + .arg(ia->getIAID()) + .arg(Lease::lifetimeToText(lease->valid_lft_)); + } + LOG_DEBUG(lease6_logger, DBG_DHCP6_DETAIL_DATA, DHCP6_LEASE_DATA) + .arg(query->getLabel()) + .arg(ia->getIAID()) + .arg(lease->toText()); + + // Set the values for T1 and T2. + setTeeTimes(lease->preferred_lft_, subnet, ia_rsp); + + Option6IAAddrPtr addr(new Option6IAAddr(D6O_IAADDR, lease->addr_, + lease->preferred_lft_, + lease->valid_lft_)); + ia_rsp->addOption(addr); + + // It would be possible to insert status code=0(success) as well, + // but this is considered waste of bandwidth as absence of status + // code is considered a success. + + } else { + // Allocation engine did not allocate a lease. The engine logged + // cause of that failure. The only thing left is to insert + // status code to pass the sad news to the client. + + LOG_DEBUG(lease6_logger, DBG_DHCP6_DETAIL, ctx.fake_allocation_ ? + DHCP6_LEASE_ADVERT_FAIL : DHCP6_LEASE_ALLOC_FAIL) + .arg(query->getLabel()) + .arg(ia->getIAID()); + + ia_rsp->addOption(createStatusCode(*query, *ia_rsp, + STATUS_NoAddrsAvail, + "Sorry, no address could be" + " allocated.")); + } + return (ia_rsp); +} + +OptionPtr +Dhcpv6Srv::assignIA_PD(const Pkt6Ptr& query, + AllocEngine::ClientContext6& ctx, + boost::shared_ptr<Option6IA> ia) { + + // Check if the client sent us a hint in his IA_PD. Clients may send an + // address in their IA_PD options as a suggestion (e.g. the last address + // they used before). While the hint consists of a full prefix (prefix + + // length), getting just the prefix is sufficient to identify a lease. + Option6IAPrefixPtr hint_opt = + boost::dynamic_pointer_cast<Option6IAPrefix>(ia->getOption(D6O_IAPREFIX)); + IOAddress hint = IOAddress::IPV6_ZERO_ADDRESS(); + if (hint_opt) { + hint = hint_opt->getAddress(); + } + + LOG_DEBUG(lease6_logger, DBG_DHCP6_DETAIL, DHCP6_PROCESS_IA_PD_REQUEST) + .arg(query->getLabel()) + .arg(ia->getIAID()) + .arg(hint_opt ? hint.toText() : "(no hint)"); + + const Subnet6Ptr& subnet = ctx.subnet_; + + // Create IA_PD that we will put in the response. + // Do not use OptionDefinition to create option's instance so + // as we can initialize IAID using a constructor. + boost::shared_ptr<Option6IA> ia_rsp(new Option6IA(D6O_IA_PD, ia->getIAID())); + + // If there is no subnet selected for handling this IA_PD, the only thing + // left to do is to say that we are sorry, but the user won't get an address. + // As a convenience, we use a different status text to indicate that + // (compare to the same status code, but different wording below) + if (!subnet) { + + // Insert status code NoAddrsAvail. + ia_rsp->addOption(createStatusCode(*query, *ia_rsp, STATUS_NoPrefixAvail, + "Sorry, no subnet available.")); + return (ia_rsp); + } + + // Set per-IA context values. + ctx.createIAContext(); + ctx.currentIA().iaid_ = ia->getIAID(); + if (hint_opt) { + ctx.currentIA().addHint(hint_opt); + } else { + ctx.currentIA().addHint(hint); + } + ctx.currentIA().type_ = Lease::TYPE_PD; + + // Use allocation engine to pick a lease for this client. Allocation engine + // will try to honor the hint, but it is just a hint - some other address + // may be used instead. If fake_allocation is set to false, the lease will + // be inserted into the LeaseMgr as well. + Lease6Collection leases = alloc_engine_->allocateLeases6(ctx); + + if (!leases.empty()) { + + // Need to retain the shortest preferred lease time to use + // for calculating T1 and T2. + uint32_t min_preferred_lft = (*leases.begin())->preferred_lft_; + + const bool pd_exclude_requested = requestedInORO(query, D6O_PD_EXCLUDE); + for (Lease6Collection::iterator l = leases.begin(); + l != leases.end(); ++l) { + + // We have a lease! Let's wrap its content into IA_PD option + // with IAADDR suboption. + if (ctx.fake_allocation_) { + LOG_INFO(lease6_logger, DHCP6_PD_LEASE_ADVERT) + .arg(query->getLabel()) + .arg((*l)->addr_.toText()) + .arg(static_cast<int>((*l)->prefixlen_)) + .arg(ia->getIAID()); + } else if ((*l)->reuseable_valid_lft_ == 0) { + LOG_INFO(lease6_logger, DHCP6_PD_LEASE_ALLOC) + .arg(query->getLabel()) + .arg((*l)->addr_.toText()) + .arg(static_cast<int>((*l)->prefixlen_)) + .arg(ia->getIAID()) + .arg(Lease::lifetimeToText((*l)->valid_lft_)); + } else { + (*l)->valid_lft_ = (*l)->reuseable_valid_lft_; + (*l)->preferred_lft_ = (*l)->reuseable_preferred_lft_; + LOG_INFO(lease6_logger, DHCP6_PD_LEASE_REUSE) + .arg(query->getLabel()) + .arg((*l)->addr_.toText()) + .arg(static_cast<int>((*l)->prefixlen_)) + .arg(ia->getIAID()) + .arg(Lease::lifetimeToText((*l)->valid_lft_)); + } + + // Check for new minimum lease time + if (((*l)->preferred_lft_ > 0) && (min_preferred_lft > (*l)->preferred_lft_)) { + min_preferred_lft = (*l)->preferred_lft_; + } + + boost::shared_ptr<Option6IAPrefix> + addr(new Option6IAPrefix(D6O_IAPREFIX, (*l)->addr_, + (*l)->prefixlen_, (*l)->preferred_lft_, + (*l)->valid_lft_)); + ia_rsp->addOption(addr); + + if (pd_exclude_requested) { + // PD exclude option has been requested via ORO, thus we need to + // include it if the pool configuration specifies this option. + Pool6Ptr pool = boost::dynamic_pointer_cast< + Pool6>(subnet->getPool(Lease::TYPE_PD, (*l)->addr_)); + if (pool) { + Option6PDExcludePtr pd_exclude_option = pool->getPrefixExcludeOption(); + if (pd_exclude_option) { + addr->addOption(pd_exclude_option); + } + } + } + } + + // Set T1 and T2, using the shortest preferred lifetime among the leases. + setTeeTimes(min_preferred_lft, subnet, ia_rsp); + + // It would be possible to insert status code=0(success) as well, + // but this is considered waste of bandwidth as absence of status + // code is considered a success. + + } else { + // Allocation engine did not allocate a lease. The engine logged + // cause of that failure. The only thing left is to insert + // status code to pass the sad news to the client. + + LOG_DEBUG(lease6_logger, DBG_DHCP6_DETAIL, ctx.fake_allocation_ ? + DHCP6_PD_LEASE_ADVERT_FAIL : DHCP6_PD_LEASE_ALLOC_FAIL) + .arg(query->getLabel()) + .arg(ia->getIAID()); + + ia_rsp->addOption(createStatusCode(*query, *ia_rsp, + STATUS_NoPrefixAvail, + "Sorry, no prefixes could" + " be allocated.")); + } + return (ia_rsp); +} + +OptionPtr +Dhcpv6Srv::extendIA_NA(const Pkt6Ptr& query, + AllocEngine::ClientContext6& ctx, + boost::shared_ptr<Option6IA> ia) { + + LOG_DEBUG(lease6_logger, DBG_DHCP6_DETAIL, DHCP6_PROCESS_IA_NA_EXTEND) + .arg(query->getLabel()) + .arg(ia->getIAID()); + + // convenience values + const Subnet6Ptr& subnet = ctx.subnet_; + + // Create empty IA_NA option with IAID matching the request. + Option6IAPtr ia_rsp(new Option6IA(D6O_IA_NA, ia->getIAID())); + + if (!subnet) { + /// @todo For simplicity and due to limitations of LeaseMgr we don't + /// get the binding for the client for which we don't get subnet id. + /// Subnet id is a required value when searching for the bindings. + /// The fact that we can't identify the subnet for the returning client + /// doesn't really mean that the client has no binding. It is possible + /// that due to server's reconfiguration the subnet has been removed + /// or modified since the client has got his lease. We may need to + /// rethink whether it is appropriate to send no binding if the subnet + /// hasn't been found for the client. + ia_rsp->addOption(createStatusCode(*query, *ia_rsp, STATUS_NoBinding, + "Sorry, no known leases for this duid/iaid.")); + return (ia_rsp); + } + + // Set per-IA context values. + ctx.createIAContext(); + ctx.currentIA().iaid_ = ia->getIAID(); + ctx.currentIA().type_ = Lease::TYPE_NA; + ctx.currentIA().ia_rsp_ = ia_rsp; + + // Extract the addresses that the client is trying to obtain. + OptionCollection addrs = ia->getOptions(); + for (OptionCollection::const_iterator it = addrs.begin(); + it != addrs.end(); ++it) { + if (it->second->getType() != D6O_IAADDR) { + continue; + } + Option6IAAddrPtr iaaddr = boost::dynamic_pointer_cast<Option6IAAddr>(it->second); + if (!iaaddr) { + // That's weird. Option code was ok, but the object type was not. + // This should never happen. The only case would be with badly + // mis-implemented hook libraries that insert invalid option objects. + // There's no way to protect against this. + continue; + } + ctx.currentIA().addHint(iaaddr); + } + + Lease6Collection leases = alloc_engine_->renewLeases6(ctx); + + // Ok, now we have the leases extended. We have: + // - what the client tried to renew in ctx.hints_ + // - what we actually assigned in leases + // - old leases that are no longer valid in ctx.old_leases_ + + // For each IA inserted by the client we have to determine what to do + // about included addresses and notify the client. We will iterate over + // those prefixes and remove those that we have already processed. We + // don't want to remove them from the context, so we need to copy them + // into temporary container. + AllocEngine::HintContainer hints = ctx.currentIA().hints_; + + // Retains the shortest valid lease time to use + // for calculating T1 and T2. + uint32_t min_preferred_lft = std::numeric_limits<uint32_t>::max(); + + // For all leases we have now, add the IAADDR with non-zero lifetimes. + for (Lease6Collection::iterator l = leases.begin(); l != leases.end(); ++l) { + if ((*l)->reuseable_valid_lft_ == 0) { + LOG_INFO(lease6_logger, DHCP6_LEASE_RENEW) + .arg(query->getLabel()) + .arg((*l)->addr_.toText()) + .arg(ia->getIAID()); + } else { + (*l)->valid_lft_ = (*l)->reuseable_valid_lft_; + (*l)->preferred_lft_ = (*l)->reuseable_preferred_lft_; + LOG_INFO(lease6_logger, DHCP6_LEASE_REUSE) + .arg(query->getLabel()) + .arg((*l)->addr_.toText()) + .arg(ia->getIAID()) + .arg(Lease::lifetimeToText((*l)->valid_lft_)); + } + + Option6IAAddrPtr iaaddr(new Option6IAAddr(D6O_IAADDR, + (*l)->addr_, (*l)->preferred_lft_, (*l)->valid_lft_)); + ia_rsp->addOption(iaaddr); + + // Check for new minimum lease time + if (((*l)->preferred_lft_ > 0) && (min_preferred_lft > (*l)->preferred_lft_)) { + min_preferred_lft = (*l)->preferred_lft_; + } + + // Now remove this prefix from the hints list. + AllocEngine::Resource hint_type((*l)->addr_, (*l)->prefixlen_); + hints.erase(std::remove(hints.begin(), hints.end(), hint_type), + hints.end()); + } + + // For the leases that we just retired, send the addresses with 0 lifetimes. + for (Lease6Collection::iterator l = ctx.currentIA().old_leases_.begin(); + l != ctx.currentIA().old_leases_.end(); ++l) { + + // Send an address with zero lifetimes only when this lease belonged to + // this client. Do not send it when we're reusing an old lease that belonged + // to someone else. + if (equalValues(query->getClientId(), (*l)->duid_)) { + Option6IAAddrPtr iaaddr(new Option6IAAddr(D6O_IAADDR, + (*l)->addr_, 0, 0)); + ia_rsp->addOption(iaaddr); + } + + // Now remove this address from the hints list. + AllocEngine::Resource hint_type((*l)->addr_, 128); + hints.erase(std::remove(hints.begin(), hints.end(), hint_type), hints.end()); + + // If the new FQDN settings have changed for the lease, we need to + // delete any existing FQDN records for this lease. + if (((*l)->hostname_ != ctx.hostname_) || ((*l)->fqdn_fwd_ != ctx.fwd_dns_update_) || + ((*l)->fqdn_rev_ != ctx.rev_dns_update_)) { + LOG_DEBUG(ddns6_logger, DBG_DHCP6_DETAIL, + DHCP6_DDNS_REMOVE_OLD_LEASE_FQDN) + .arg(query->getLabel()) + .arg((*l)->toText()) + .arg(ctx.hostname_) + .arg(ctx.rev_dns_update_ ? "true" : "false") + .arg(ctx.fwd_dns_update_ ? "true" : "false"); + + queueNCR(CHG_REMOVE, *l); + } + } + + // Finally, if there are any addresses requested that we haven't dealt with + // already, inform the client that he can't have them. + for (AllocEngine::HintContainer::const_iterator hint = hints.begin(); + hint != hints.end(); ++hint) { + Option6IAAddrPtr iaaddr(new Option6IAAddr(D6O_IAADDR, + hint->getAddress(), 0, 0)); + ia_rsp->addOption(iaaddr); + } + + if (!leases.empty()) { + // We allocated leases so we need to update T1 and T2. + setTeeTimes(min_preferred_lft, subnet, ia_rsp); + } else { + // The server wasn't able allocate new lease and renew an existing + // lease. In that case, the server sends NoAddrsAvail per RFC 8415. + ia_rsp->addOption(createStatusCode(*query, *ia_rsp, + STATUS_NoAddrsAvail, + "Sorry, no addresses could be" + " assigned at this time.")); + } + + return (ia_rsp); +} + +OptionPtr +Dhcpv6Srv::extendIA_PD(const Pkt6Ptr& query, + AllocEngine::ClientContext6& ctx, + boost::shared_ptr<Option6IA> ia) { + + LOG_DEBUG(lease6_logger, DBG_DHCP6_DETAIL, DHCP6_PROCESS_IA_PD_EXTEND) + .arg(query->getLabel()) + .arg(ia->getIAID()); + + const Subnet6Ptr& subnet = ctx.subnet_; + const DuidPtr& duid = ctx.duid_; + + // Let's create a IA_PD response and fill it in later + Option6IAPtr ia_rsp(new Option6IA(D6O_IA_PD, ia->getIAID())); + + // If there is no subnet for the particular client, we can't retrieve + // information about client's leases from lease database. We treat this + // as no binding for the client. + if (!subnet) { + // Per RFC 8415, section 18.3.4, if there is no binding and we are + // processing a Renew, the NoBinding status code should be returned. + if (query->getType() == DHCPV6_RENEW) { + // Insert status code NoBinding + ia_rsp->addOption(createStatusCode(*query, *ia_rsp, STATUS_NoBinding, + "Sorry, no known PD leases" + " for this duid/iaid.")); + return (ia_rsp); + + // Per RFC 8415, section 18.3.5, if there is no binding and we are + // processing Rebind, the message has to be discarded (assuming that + // the server doesn't know if the prefix in the IA_PD option is + // appropriate for the client's link). The exception being thrown + // here should propagate to the main loop and cause the message to + // be discarded. + } else { + + /// @todo: We may consider in which cases we could determine + /// whether the delegated prefixes are appropriate for the + /// link to which the client's interface is attached. Just not + /// being able to select the subnet may not be enough, because + /// there might be other DHCP servers around that are configured + /// to handle that subnet. Therefore we don't fully follow all + /// the paths in section 18.3.5 of RFC 8415 to respond with + /// zero lifetimes for the prefixes being rebound. + isc_throw(DHCPv6DiscardMessageError, "no subnet found for the" + " client sending Rebind to extend lifetime of the" + " prefix (DUID=" << duid->toText() << ", IAID=" + << ia->getIAID() << ")"); + } + } + + // Set per-IA context values. + ctx.createIAContext(); + ctx.currentIA().iaid_ = ia->getIAID(); + ctx.currentIA().type_ = Lease::TYPE_PD; + ctx.currentIA().ia_rsp_ = ia_rsp; + + // Extract prefixes that the client is trying to renew. + OptionCollection addrs = ia->getOptions(); + for (OptionCollection::const_iterator it = addrs.begin(); + it != addrs.end(); ++it) { + if (it->second->getType() != D6O_IAPREFIX) { + continue; + } + Option6IAPrefixPtr prf = boost::dynamic_pointer_cast<Option6IAPrefix>(it->second); + if (!prf) { + // That's weird. Option code was ok, but the object type was not. + // This should never happen. The only case would be with badly + // mis-implemented hook libraries that insert invalid option objects. + // There's no way to protect against this. + continue; + } + + // Put the client's prefix into the hints list. + ctx.currentIA().addHint(prf); + } + + // Call Allocation Engine and attempt to renew leases. Number of things + // may happen. Leases may be extended, revoked (if the lease is no longer + // valid or reserved for someone else), or new leases may be added. + // Important parameters are: + // - returned container - current valid leases + // - old_leases - leases that used to be, but are no longer valid + // - changed_leases - leases that have FQDN changed (not really important + // in PD context) + Lease6Collection leases = alloc_engine_->renewLeases6(ctx); + + // For each IA inserted by the client we have to determine what to do + // about included prefixes and notify the client. We will iterate over + // those prefixes and remove those that we have already processed. We + // don't want to remove them from the context, so we need to copy them + // into temporary container. + AllocEngine::HintContainer hints = ctx.currentIA().hints_; + + const bool pd_exclude_requested = requestedInORO(query, D6O_PD_EXCLUDE); + + // Retains the shortest valid lease time to use + // for calculating T1 and T2. + uint32_t min_preferred_lft = std::numeric_limits<uint32_t>::max(); + + for (Lease6Collection::iterator l = leases.begin(); l != leases.end(); ++l) { + if ((*l)->reuseable_valid_lft_ == 0) { + LOG_INFO(lease6_logger, DHCP6_PD_LEASE_RENEW) + .arg(query->getLabel()) + .arg((*l)->addr_.toText()) + .arg(static_cast<int>((*l)->prefixlen_)) + .arg(ia->getIAID()); + } else { + (*l)->valid_lft_ = (*l)->reuseable_valid_lft_; + (*l)->preferred_lft_ = (*l)->reuseable_preferred_lft_; + LOG_INFO(lease6_logger, DHCP6_PD_LEASE_REUSE) + .arg(query->getLabel()) + .arg((*l)->addr_.toText()) + .arg(static_cast<int>((*l)->prefixlen_)) + .arg(ia->getIAID()) + .arg(Lease::lifetimeToText((*l)->valid_lft_)); + } + + Option6IAPrefixPtr prf(new Option6IAPrefix(D6O_IAPREFIX, + (*l)->addr_, (*l)->prefixlen_, + (*l)->preferred_lft_, (*l)->valid_lft_)); + ia_rsp->addOption(prf); + + if (pd_exclude_requested) { + // PD exclude option has been requested via ORO, thus we need to + // include it if the pool configuration specifies this option. + Pool6Ptr pool = boost::dynamic_pointer_cast< + Pool6>(subnet->getPool(Lease::TYPE_PD, (*l)->addr_)); + + if (pool) { + Option6PDExcludePtr pd_exclude_option = pool->getPrefixExcludeOption(); + if (pd_exclude_option) { + prf->addOption(pd_exclude_option); + } + } + } + + // Check for new minimum lease time + if (((*l)->preferred_lft_ > 0) && ((*l)->preferred_lft_ < min_preferred_lft)) { + min_preferred_lft = (*l)->preferred_lft_; + } + + // Now remove this prefix from the hints list. + AllocEngine::Resource hint_type((*l)->addr_, (*l)->prefixlen_); + hints.erase(std::remove(hints.begin(), hints.end(), hint_type), + hints.end()); + } + + /// For the leases that we just retired, send the prefixes with 0 lifetimes. + for (Lease6Collection::iterator l = ctx.currentIA().old_leases_.begin(); + l != ctx.currentIA().old_leases_.end(); ++l) { + + // Send a prefix with zero lifetimes only when this lease belonged to + // this client. Do not send it when we're reusing an old lease that belonged + // to someone else. + if (equalValues(query->getClientId(), (*l)->duid_)) { + Option6IAPrefixPtr prefix(new Option6IAPrefix(D6O_IAPREFIX, (*l)->addr_, + (*l)->prefixlen_, 0, 0)); + ia_rsp->addOption(prefix); + } + + // Now remove this prefix from the hints list. + AllocEngine::Resource hint_type((*l)->addr_, (*l)->prefixlen_); + hints.erase(std::remove(hints.begin(), hints.end(), hint_type), hints.end()); + } + + // Finally, if there are any prefixes requested that we haven't dealt with + // already, inform the client that he can't have them. + for (AllocEngine::HintContainer::const_iterator prefix = hints.begin(); + prefix != hints.end(); ++prefix) { + + // Send the prefix with the zero lifetimes only if the prefix + // contains non-zero value. A zero value indicates that the hint was + // for the prefix length. + if (!prefix->getAddress().isV6Zero()) { + OptionPtr prefix_opt(new Option6IAPrefix(D6O_IAPREFIX, + prefix->getAddress(), + prefix->getPrefixLength(), + 0, 0)); + ia_rsp->addOption(prefix_opt); + } + } + + if (!leases.empty()) { + // We allocated leases so we need to update T1 and T2. + setTeeTimes(min_preferred_lft, subnet, ia_rsp); + } else { + // All is left is to insert the status code. + // The server wasn't able allocate new lease and renew an existing + // lease. In that case, the server sends NoPrefixAvail per RFC 8415. + ia_rsp->addOption(createStatusCode(*query, *ia_rsp, + STATUS_NoPrefixAvail, + "Sorry, no prefixes could be" + " assigned at this time.")); + } + + return (ia_rsp); +} + +void +Dhcpv6Srv::extendLeases(const Pkt6Ptr& query, Pkt6Ptr& reply, + AllocEngine::ClientContext6& ctx) { + + // We will try to extend lease lifetime for all IA options in the client's + // Renew or Rebind message. + /// @todo add support for IA_TA + + // For the lease extension it is critical that the client has sent + // DUID. There is no need to check for the presence of the DUID here + // because we have already checked it in the sanityCheck(). + + // Save the originally selected subnet. + Subnet6Ptr orig_subnet = ctx.subnet_; + + for (const auto& opt : query->options_) { + switch (opt.second->getType()) { + case D6O_IA_NA: { + OptionPtr answer_opt = extendIA_NA(query, ctx, + boost::dynamic_pointer_cast< + Option6IA>(opt.second)); + if (answer_opt) { + reply->addOption(answer_opt); + } + break; + } + + case D6O_IA_PD: { + OptionPtr answer_opt = extendIA_PD(query, ctx, + boost::dynamic_pointer_cast< + Option6IA>(opt.second)); + if (answer_opt) { + reply->addOption(answer_opt); + } + break; + } + + default: + break; + } + } + + // Subnet may be modified by the allocation engine, there are things + // we need to do when that happens. + checkDynamicSubnetChange(query, reply, ctx, orig_subnet); +} + +void +Dhcpv6Srv::releaseLeases(const Pkt6Ptr& release, Pkt6Ptr& reply, + AllocEngine::ClientContext6& ctx) { + + // We need to release addresses for all IA options in the client's + // RELEASE message. + + /// @todo Add support for IA_TA + /// @todo Consider supporting more than one address in a single IA. + /// It is allowed by RFC 8415, but it is not widely implemented. The only + /// software that supports that is Dibbler, but its author seriously doubts + /// if anyone is really using it. Clients that want more than one address + /// or prefix just include more instances of IA options. + + // Let's set the status to be success by default. We can override it with + // error status if needed. The important thing to understand here is that + // the global status code may be set to success only if all IA options were + // handled properly. Therefore the releaseIA_NA and releaseIA_PD options + // may turn the status code to some error, but can't turn it back to success. + int general_status = STATUS_Success; + for (const auto& opt : release->options_) { + Lease6Ptr old_lease; + switch (opt.second->getType()) { + case D6O_IA_NA: { + OptionPtr answer_opt = releaseIA_NA(ctx.duid_, release, general_status, + boost::dynamic_pointer_cast<Option6IA>(opt.second), + old_lease); + if (answer_opt) { + reply->addOption(answer_opt); + } + break; + } + case D6O_IA_PD: { + OptionPtr answer_opt = releaseIA_PD(ctx.duid_, release, general_status, + boost::dynamic_pointer_cast<Option6IA>(opt.second), + old_lease); + if (answer_opt) { + reply->addOption(answer_opt); + } + break; + } + // @todo: add support for IA_TA + default: + // remaining options are stateless and thus ignored in this context + ; + } + + // Store the old lease. + if (old_lease) { + ctx.currentIA().old_leases_.push_back(old_lease); + } + } + + // Include top-level status code as well. + reply->addOption(createStatusCode(*release, general_status, + "Summary status for all processed IA_NAs")); +} + +OptionPtr +Dhcpv6Srv::releaseIA_NA(const DuidPtr& duid, const Pkt6Ptr& query, + int& general_status, boost::shared_ptr<Option6IA> ia, + Lease6Ptr& old_lease) { + + LOG_DEBUG(lease6_logger, DBG_DHCP6_DETAIL, DHCP6_PROCESS_IA_NA_RELEASE) + .arg(query->getLabel()) + .arg(ia->getIAID()); + + // Release can be done in one of two ways: + // Approach 1: extract address from client's IA_NA and see if it belongs + // to this particular client. + // Approach 2: find a subnet for this client, get a lease for + // this subnet/duid/iaid and check if its content matches to what the + // client is asking us to release. + // + // This method implements approach 1. + + // That's our response + boost::shared_ptr<Option6IA> ia_rsp(new Option6IA(D6O_IA_NA, ia->getIAID())); + + Option6IAAddrPtr release_addr = boost::dynamic_pointer_cast<Option6IAAddr> + (ia->getOption(D6O_IAADDR)); + if (!release_addr) { + ia_rsp->addOption(createStatusCode(*query, STATUS_NoBinding, + "You did not include an address in your RELEASE")); + general_status = STATUS_NoBinding; + return (ia_rsp); + } + + Lease6Ptr lease = LeaseMgrFactory::instance().getLease6(Lease::TYPE_NA, + release_addr->getAddress()); + + if (!lease) { + // client releasing a lease that we don't know about. + + // Insert status code NoBinding. + ia_rsp->addOption(createStatusCode(*query, *ia_rsp, STATUS_NoBinding, + "Sorry, no known leases for this duid/iaid, can't release.")); + general_status = STATUS_NoBinding; + + return (ia_rsp); + } + + if (!lease->duid_) { + // Something is gravely wrong here. We do have a lease, but it does not + // have mandatory DUID information attached. Someone was messing with our + // database. + + LOG_ERROR(lease6_logger, DHCP6_LEASE_NA_WITHOUT_DUID) + .arg(query->getLabel()) + .arg(release_addr->getAddress().toText()); + + general_status = STATUS_UnspecFail; + ia_rsp->addOption(createStatusCode(*query, *ia_rsp, STATUS_UnspecFail, + "Database consistency check failed when trying to RELEASE")); + return (ia_rsp); + } + + if (*duid != *(lease->duid_)) { + + // Sorry, it's not your address. You can't release it. + LOG_INFO(lease6_logger, DHCP6_RELEASE_NA_FAIL_WRONG_DUID) + .arg(query->getLabel()) + .arg(release_addr->getAddress().toText()) + .arg(lease->duid_->toText()); + + general_status = STATUS_NoBinding; + ia_rsp->addOption(createStatusCode(*query, *ia_rsp, STATUS_NoBinding, + "This address does not belong to you, you can't release it")); + return (ia_rsp); + } + + if (ia->getIAID() != lease->iaid_) { + // This address belongs to this client, but to a different IA + LOG_WARN(lease6_logger, DHCP6_RELEASE_NA_FAIL_WRONG_IAID) + .arg(query->getLabel()) + .arg(release_addr->getAddress().toText()) + .arg(lease->iaid_) + .arg(ia->getIAID()); + ia_rsp->addOption(createStatusCode(*query, *ia_rsp, STATUS_NoBinding, + "This is your address, but you used wrong IAID")); + general_status = STATUS_NoBinding; + return (ia_rsp); + } + + // It is not necessary to check if the address matches as we used + // getLease6(addr) method that is supposed to return a proper lease. + + bool skip = false; + // Execute all callouts registered for packet6_send + if (HooksManager::calloutsPresent(Hooks.hook_index_lease6_release_)) { + CalloutHandlePtr callout_handle = getCalloutHandle(query); + + // Use the RAII wrapper to make sure that the callout handle state is + // reset when this object goes out of scope. All hook points must do + // it to prevent possible circular dependency between the callout + // handle and its arguments. + ScopedCalloutHandleState callout_handle_state(callout_handle); + + // Enable copying options from the packet within hook library. + ScopedEnableOptionsCopy<Pkt6> query6_options_copy(query); + + // Delete all previous arguments + callout_handle->deleteAllArguments(); + + // Pass the original packet + callout_handle->setArgument("query6", query); + + // Pass the lease to be updated + callout_handle->setArgument("lease6", lease); + + // Call all installed callouts + HooksManager::callCallouts(Hooks.hook_index_lease6_release_, *callout_handle); + + // Callouts decided to skip the next processing step. The next + // processing step would to send the packet, so skip at this + // stage means "drop response". + if ((callout_handle->getStatus() == CalloutHandle::NEXT_STEP_SKIP) || + (callout_handle->getStatus() == CalloutHandle::NEXT_STEP_DROP)) { + skip = true; + LOG_DEBUG(hooks_logger, DBG_DHCP6_HOOKS, DHCP6_HOOK_LEASE6_RELEASE_NA_SKIP) + .arg(query->getLabel()); + } + } + + // Ok, we've passed all checks. Let's release this address. + bool success = false; // was the removal operation successful? + + if (!skip) { + success = LeaseMgrFactory::instance().deleteLease(lease); + } + + // Here the success should be true if we removed lease successfully + // and false if skip flag was set or the removal failed for whatever reason + + if (!success) { + ia_rsp->addOption(createStatusCode(*query, *ia_rsp, STATUS_UnspecFail, + "Server failed to release a lease")); + + LOG_ERROR(lease6_logger, DHCP6_RELEASE_NA_FAIL) + .arg(query->getLabel()) + .arg(lease->addr_.toText()) + .arg(lease->iaid_); + general_status = STATUS_UnspecFail; + + return (ia_rsp); + } else { + old_lease = lease; + + LOG_INFO(lease6_logger, DHCP6_RELEASE_NA) + .arg(query->getLabel()) + .arg(lease->addr_.toText()) + .arg(lease->iaid_); + + ia_rsp->addOption(createStatusCode(*query, *ia_rsp, STATUS_Success, + "Lease released. Thank you, please come again.")); + + // Need to decrease statistic for assigned addresses. + StatsMgr::instance().addValue( + StatsMgr::generateName("subnet", lease->subnet_id_, "assigned-nas"), + static_cast<int64_t>(-1)); + + // Check if a lease has flags indicating that the FQDN update has + // been performed. If so, create NameChangeRequest which removes + // the entries. + queueNCR(CHG_REMOVE, lease); + + return (ia_rsp); + } +} + +OptionPtr +Dhcpv6Srv::releaseIA_PD(const DuidPtr& duid, const Pkt6Ptr& query, + int& general_status, boost::shared_ptr<Option6IA> ia, + Lease6Ptr& old_lease) { + // Release can be done in one of two ways: + // Approach 1: extract address from client's IA_NA and see if it belongs + // to this particular client. + // Approach 2: find a subnet for this client, get a lease for + // this subnet/duid/iaid and check if its content matches to what the + // client is asking us to release. + // + // This method implements approach 1. + + // That's our response. We will fill it in as we check the lease to be + // released. + boost::shared_ptr<Option6IA> ia_rsp(new Option6IA(D6O_IA_PD, ia->getIAID())); + + boost::shared_ptr<Option6IAPrefix> release_prefix = + boost::dynamic_pointer_cast<Option6IAPrefix>(ia->getOption(D6O_IAPREFIX)); + if (!release_prefix) { + ia_rsp->addOption(createStatusCode(*query, *ia_rsp, STATUS_NoBinding, + "You did not include a prefix in your RELEASE")); + general_status = STATUS_NoBinding; + return (ia_rsp); + } + + Lease6Ptr lease = LeaseMgrFactory::instance().getLease6(Lease::TYPE_PD, + release_prefix->getAddress()); + + if (!lease) { + // Client releasing a lease that we don't know about. + + // Insert status code NoBinding. + ia_rsp->addOption(createStatusCode(*query, *ia_rsp, STATUS_NoBinding, + "Sorry, no known leases for this duid/iaid, can't release.")); + general_status = STATUS_NoBinding; + + return (ia_rsp); + } + + if (!lease->duid_) { + // Something is gravely wrong here. We do have a lease, but it does not + // have mandatory DUID information attached. Someone was messing with our + // database. + LOG_ERROR(lease6_logger, DHCP6_LEASE_PD_WITHOUT_DUID) + .arg(query->getLabel()) + .arg(release_prefix->getAddress().toText()) + .arg(static_cast<int>(release_prefix->getLength())); + + general_status = STATUS_UnspecFail; + ia_rsp->addOption(createStatusCode(*query, *ia_rsp, STATUS_UnspecFail, + "Database consistency check failed when trying to RELEASE")); + return (ia_rsp); + } + + if (*duid != *(lease->duid_)) { + // Sorry, it's not your address. You can't release it. + LOG_INFO(lease6_logger, DHCP6_RELEASE_PD_FAIL_WRONG_DUID) + .arg(query->getLabel()) + .arg(release_prefix->getAddress().toText()) + .arg(static_cast<int>(release_prefix->getLength())) + .arg(lease->duid_->toText()); + + general_status = STATUS_NoBinding; + ia_rsp->addOption(createStatusCode(*query, *ia_rsp, STATUS_NoBinding, + "This address does not belong to you, you can't release it")); + return (ia_rsp); + } + + if (ia->getIAID() != lease->iaid_) { + // This address belongs to this client, but to a different IA + LOG_WARN(lease6_logger, DHCP6_RELEASE_PD_FAIL_WRONG_IAID) + .arg(query->getLabel()) + .arg(release_prefix->getAddress().toText()) + .arg(static_cast<int>(release_prefix->getLength())) + .arg(lease->iaid_) + .arg(ia->getIAID()); + ia_rsp->addOption(createStatusCode(*query, *ia_rsp, STATUS_NoBinding, + "This is your address, but you used wrong IAID")); + general_status = STATUS_NoBinding; + return (ia_rsp); + } + + // It is not necessary to check if the address matches as we used + // getLease6(addr) method that is supposed to return a proper lease. + + bool skip = false; + // Execute all callouts registered for packet6_send + if (HooksManager::calloutsPresent(Hooks.hook_index_lease6_release_)) { + CalloutHandlePtr callout_handle = getCalloutHandle(query); + + // Use the RAII wrapper to make sure that the callout handle state is + // reset when this object goes out of scope. All hook points must do + // it to prevent possible circular dependency between the callout + // handle and its arguments. + ScopedCalloutHandleState callout_handle_state(callout_handle); + + // Enable copying options from the packet within hook library. + ScopedEnableOptionsCopy<Pkt6> query6_options_copy(query); + + // Pass the original packet + callout_handle->setArgument("query6", query); + + // Pass the lease to be updated + callout_handle->setArgument("lease6", lease); + + // Call all installed callouts + HooksManager::callCallouts(Hooks.hook_index_lease6_release_, *callout_handle); + + skip = callout_handle->getStatus() == CalloutHandle::NEXT_STEP_SKIP; + } + + // Ok, we've passed all checks. Let's release this prefix. + bool success = false; // was the removal operation successful? + + if (!skip) { + success = LeaseMgrFactory::instance().deleteLease(lease); + } else { + // Callouts decided to skip the next processing step. The next + // processing step would to send the packet, so skip at this + // stage means "drop response". + LOG_DEBUG(hooks_logger, DBG_DHCP6_HOOKS, DHCP6_HOOK_LEASE6_RELEASE_PD_SKIP) + .arg(query->getLabel()); + } + + // Here the success should be true if we removed lease successfully + // and false if skip flag was set or the removal failed for whatever reason + + if (!success) { + ia_rsp->addOption(createStatusCode(*query, *ia_rsp, STATUS_UnspecFail, + "Server failed to release a lease")); + + LOG_ERROR(lease6_logger, DHCP6_RELEASE_PD_FAIL) + .arg(query->getLabel()) + .arg(lease->addr_.toText()) + .arg(static_cast<int>(lease->prefixlen_)) + .arg(lease->iaid_); + general_status = STATUS_UnspecFail; + + } else { + old_lease = lease; + + LOG_INFO(lease6_logger, DHCP6_RELEASE_PD) + .arg(query->getLabel()) + .arg(lease->addr_.toText()) + .arg(static_cast<int>(lease->prefixlen_)) + .arg(lease->iaid_); + + ia_rsp->addOption(createStatusCode(*query, *ia_rsp, STATUS_Success, + "Lease released. Thank you, please come again.")); + + // Need to decrease statistic for assigned prefixes. + StatsMgr::instance().addValue( + StatsMgr::generateName("subnet", lease->subnet_id_, "assigned-pds"), + static_cast<int64_t>(-1)); + } + + return (ia_rsp); +} + +Pkt6Ptr +Dhcpv6Srv::processSolicit(AllocEngine::ClientContext6& ctx) { + + Pkt6Ptr solicit = ctx.query_; + Pkt6Ptr response(new Pkt6(DHCPV6_ADVERTISE, solicit->getTransid())); + + // Handle Rapid Commit option, if present. + if (ctx.subnet_ && ctx.subnet_->getRapidCommit()) { + OptionPtr opt_rapid_commit = solicit->getOption(D6O_RAPID_COMMIT); + if (opt_rapid_commit) { + + LOG_DEBUG(options6_logger, DBG_DHCP6_DETAIL, DHCP6_RAPID_COMMIT) + .arg(solicit->getLabel()); + + // If Rapid Commit has been sent by the client, change the + // response type to Reply and include Rapid Commit option. + response->setType(DHCPV6_REPLY); + response->addOption(opt_rapid_commit); + } + } + + // "Fake" allocation is the case when the server is processing the Solicit + // message without the Rapid Commit option and advertises a lease to + // the client, but doesn't commit this lease to the lease database. If + // the Solicit contains the Rapid Commit option and the server is + // configured to honor the Rapid Commit option, or the client has sent + // the Request message, the lease will be committed to the lease + // database. The type of the server's response may be used to determine + // if this is the fake allocation case or not. When the server sends + // Reply message it means that it is committing leases. Other message + // type (Advertise) means that server is not committing leases (fake + // allocation). + ctx.fake_allocation_ = (response->getType() != DHCPV6_REPLY); + + processClientFqdn(solicit, response, ctx); + + if (MultiThreadingMgr::instance().getMode()) { + // The lease reclamation cannot run at the same time. + ReadLockGuard share(alloc_engine_->getReadWriteMutex()); + + assignLeases(solicit, response, ctx); + } else { + assignLeases(solicit, response, ctx); + } + + conditionallySetReservedClientClasses(solicit, ctx); + requiredClassify(solicit, ctx); + + copyClientOptions(solicit, response); + CfgOptionList co_list; + buildCfgOptionList(solicit, ctx, co_list); + appendDefaultOptions(solicit, response, co_list); + appendRequestedOptions(solicit, response, co_list); + appendRequestedVendorOptions(solicit, response, ctx, co_list); + + updateReservedFqdn(ctx, response); + + // Only generate name change requests if sending a Reply as a result + // of receiving Rapid Commit option. + if (response->getType() == DHCPV6_REPLY) { + createNameChangeRequests(response, ctx); + } + + return (response); +} + +Pkt6Ptr +Dhcpv6Srv::processRequest(AllocEngine::ClientContext6& ctx) { + + Pkt6Ptr request = ctx.query_; + Pkt6Ptr reply(new Pkt6(DHCPV6_REPLY, request->getTransid())); + + processClientFqdn(request, reply, ctx); + + if (MultiThreadingMgr::instance().getMode()) { + // The lease reclamation cannot run at the same time. + ReadLockGuard share(alloc_engine_->getReadWriteMutex()); + + assignLeases(request, reply, ctx); + } else { + assignLeases(request, reply, ctx); + } + + conditionallySetReservedClientClasses(request, ctx); + requiredClassify(request, ctx); + + copyClientOptions(request, reply); + CfgOptionList co_list; + buildCfgOptionList(request, ctx, co_list); + appendDefaultOptions(request, reply, co_list); + appendRequestedOptions(request, reply, co_list); + appendRequestedVendorOptions(request, reply, ctx, co_list); + + updateReservedFqdn(ctx, reply); + generateFqdn(reply, ctx); + createNameChangeRequests(reply, ctx); + + return (reply); +} + +Pkt6Ptr +Dhcpv6Srv::processRenew(AllocEngine::ClientContext6& ctx) { + + Pkt6Ptr renew = ctx.query_; + Pkt6Ptr reply(new Pkt6(DHCPV6_REPLY, renew->getTransid())); + + processClientFqdn(renew, reply, ctx); + + if (MultiThreadingMgr::instance().getMode()) { + // The lease reclamation cannot run at the same time. + ReadLockGuard share(alloc_engine_->getReadWriteMutex()); + + extendLeases(renew, reply, ctx); + } else { + extendLeases(renew, reply, ctx); + } + + conditionallySetReservedClientClasses(renew, ctx); + requiredClassify(renew, ctx); + + copyClientOptions(renew, reply); + CfgOptionList co_list; + buildCfgOptionList(renew, ctx, co_list); + appendDefaultOptions(renew, reply, co_list); + appendRequestedOptions(renew, reply, co_list); + appendRequestedVendorOptions(renew, reply, ctx, co_list); + + updateReservedFqdn(ctx, reply); + generateFqdn(reply, ctx); + createNameChangeRequests(reply, ctx); + + return (reply); +} + +Pkt6Ptr +Dhcpv6Srv::processRebind(AllocEngine::ClientContext6& ctx) { + + Pkt6Ptr rebind = ctx.query_; + Pkt6Ptr reply(new Pkt6(DHCPV6_REPLY, rebind->getTransid())); + + processClientFqdn(rebind, reply, ctx); + + if (MultiThreadingMgr::instance().getMode()) { + // The lease reclamation cannot run at the same time. + ReadLockGuard share(alloc_engine_->getReadWriteMutex()); + + extendLeases(rebind, reply, ctx); + } else { + extendLeases(rebind, reply, ctx); + } + + conditionallySetReservedClientClasses(rebind, ctx); + requiredClassify(rebind, ctx); + + copyClientOptions(rebind, reply); + CfgOptionList co_list; + buildCfgOptionList(rebind, ctx, co_list); + appendDefaultOptions(rebind, reply, co_list); + appendRequestedOptions(rebind, reply, co_list); + appendRequestedVendorOptions(rebind, reply, ctx, co_list); + + updateReservedFqdn(ctx, reply); + generateFqdn(reply, ctx); + createNameChangeRequests(reply, ctx); + + return (reply); +} + +Pkt6Ptr +Dhcpv6Srv::processConfirm(AllocEngine::ClientContext6& ctx) { + + Pkt6Ptr confirm = ctx.query_; + conditionallySetReservedClientClasses(confirm, ctx); + requiredClassify(confirm, ctx); + + // Get IA_NAs from the Confirm. If there are none, the message is + // invalid and must be discarded. There is nothing more to do. + OptionCollection ias = confirm->getOptions(D6O_IA_NA); + if (ias.empty()) { + return (Pkt6Ptr()); + } + + // The server sends Reply message in response to Confirm. + Pkt6Ptr reply(new Pkt6(DHCPV6_REPLY, confirm->getTransid())); + // Make sure that the necessary options are included. + copyClientOptions(confirm, reply); + CfgOptionList co_list; + buildCfgOptionList(confirm, ctx, co_list); + appendDefaultOptions(confirm, reply, co_list); + appendRequestedOptions(confirm, reply, co_list); + appendRequestedVendorOptions(confirm, reply, ctx, co_list); + // Indicates if at least one address has been verified. If no addresses + // are verified it means that the client has sent no IA_NA options + // or no IAAddr options and that client's message has to be discarded. + bool verified = false; + // Check if subnet was selected for the message. If no subnet + // has been selected, the client is not on link. + SubnetPtr subnet = ctx.subnet_; + + // Regardless if the subnet has been selected or not, we will iterate + // over the IA_NA options to check if they hold any addresses. If there + // are no, the Confirm is discarded. + // Check addresses in IA_NA options and make sure they are appropriate. + for (OptionCollection::const_iterator ia = ias.begin(); + ia != ias.end(); ++ia) { + const OptionCollection& opts = ia->second->getOptions(); + for (OptionCollection::const_iterator opt = opts.begin(); + opt != opts.end(); ++opt) { + // Ignore options other than IAAddr. + if (opt->second->getType() == D6O_IAADDR) { + // Check that the address is in range in the subnet selected. + Option6IAAddrPtr iaaddr = boost::dynamic_pointer_cast< + Option6IAAddr>(opt->second); + // If there is subnet selected and the address has been included + // in IA_NA, mark it verified and verify that it belongs to the + // subnet. + if (iaaddr) { + // If at least one address is not in range, then return + // the NotOnLink status code. + if (subnet && !subnet->inRange(iaaddr->getAddress())) { + std::ostringstream status_msg; + status_msg << "Address " << iaaddr->getAddress() + << " is not on link."; + reply->addOption(createStatusCode(*confirm, + STATUS_NotOnLink, + status_msg.str())); + return (reply); + } + verified = true; + } else { + isc_throw(Unexpected, "failed to cast the IA Address option" + " to the Option6IAAddrPtr. This is programming" + " error and should be reported"); + } + } + } + } + + // It seems that the client hasn't included any addresses in which case + // the Confirm must be discarded. + if (!verified) { + return (Pkt6Ptr()); + } + + // If there is a subnet, there were addresses in IA_NA options and the + // addresses where consistent with the subnet then the client is on link. + if (subnet) { + // All addresses in range, so return success. + reply->addOption(createStatusCode(*confirm, STATUS_Success, + "All addresses are on-link")); + } else { + reply->addOption(createStatusCode(*confirm, STATUS_NotOnLink, + "No subnet selected")); + } + + return (reply); +} + +Pkt6Ptr +Dhcpv6Srv::processRelease(AllocEngine::ClientContext6& ctx) { + + Pkt6Ptr release = ctx.query_; + conditionallySetReservedClientClasses(release, ctx); + requiredClassify(release, ctx); + + // Create an empty Reply message. + Pkt6Ptr reply(new Pkt6(DHCPV6_REPLY, release->getTransid())); + + // Copy client options (client-id, also relay information if present) + copyClientOptions(release, reply); + + // Get the configured option list + CfgOptionList co_list; + // buildCfgOptionList(release, ctx, co_list); + appendDefaultOptions(release, reply, co_list); + + releaseLeases(release, reply, ctx); + + /// @todo If client sent a release and we should remove outstanding + /// DNS records. + + return (reply); +} + +Pkt6Ptr +Dhcpv6Srv::processDecline(AllocEngine::ClientContext6& ctx) { + + Pkt6Ptr decline = ctx.query_; + conditionallySetReservedClientClasses(decline, ctx); + requiredClassify(decline, ctx); + + // Create an empty Reply message. + Pkt6Ptr reply(new Pkt6(DHCPV6_REPLY, decline->getTransid())); + + // Copy client options (client-id, also relay information if present) + copyClientOptions(decline, reply); + + // Get the configured option list + CfgOptionList co_list; + buildCfgOptionList(decline, ctx, co_list); + + // Include server-id + appendDefaultOptions(decline, reply, co_list); + + if (declineLeases(decline, reply, ctx)) { + return (reply); + } else { + + // declineLeases returns false only if the hooks set the next step + // status to DROP. We'll just doing as requested. + return (Pkt6Ptr()); + } +} + +bool +Dhcpv6Srv::declineLeases(const Pkt6Ptr& decline, Pkt6Ptr& reply, + AllocEngine::ClientContext6& ctx) { + + // We need to decline addresses for all IA_NA options in the client's + // DECLINE message. + + // Let's set the status to be success by default. We can override it with + // error status if needed. The important thing to understand here is that + // the global status code may be set to success only if all IA options were + // handled properly. Therefore the declineIA options + // may turn the status code to some error, but can't turn it back to success. + int general_status = STATUS_Success; + + for (const auto& opt : decline->options_) { + switch (opt.second->getType()) { + case D6O_IA_NA: { + OptionPtr answer_opt = declineIA(decline, ctx.duid_, general_status, + boost::dynamic_pointer_cast<Option6IA>(opt.second), + ctx.new_leases_); + if (answer_opt) { + + // We have an answer, let's use it. + reply->addOption(answer_opt); + } else { + + // The only case when declineIA could return NULL is if one of the + // hook callouts set next step status to DROP. We just need to drop + // this packet. + return (false); + } + break; + } + default: + // We don't care for the remaining options + ; + } + } + + return (true); +} + +OptionPtr +Dhcpv6Srv::declineIA(const Pkt6Ptr& decline, const DuidPtr& duid, + int& general_status, boost::shared_ptr<Option6IA> ia, + Lease6Collection& new_leases) { + + LOG_DEBUG(lease6_logger, DBG_DHCP6_DETAIL, DHCP6_DECLINE_PROCESS_IA) + .arg(decline->getLabel()) + .arg(ia->getIAID()); + + // Decline can be done in one of two ways: + // Approach 1: extract address from client's IA_NA and see if it belongs + // to this particular client. + // Approach 2: find a subnet for this client, get a lease for + // this subnet/duid/iaid and check if its content matches to what the + // client is asking us to decline. + // + // This method implements approach 1. + + // That's our response + boost::shared_ptr<Option6IA> ia_rsp(new Option6IA(D6O_IA_NA, ia->getIAID())); + + const OptionCollection& opts = ia->getOptions(); + int total_addrs = 0; // Let's count the total number of addresses. + for (OptionCollection::const_iterator opt = opts.begin(); opt != opts.end(); + ++opt) { + + // Let's ignore nested options other than IAADDR (there shouldn't be anything + // else in IA_NA in Decline message, but let's be on the safe side). + if (opt->second->getType() != D6O_IAADDR) { + continue; + } + Option6IAAddrPtr decline_addr = boost::dynamic_pointer_cast<Option6IAAddr> + (opt->second); + if (!decline_addr) { + continue; + } + + total_addrs++; + + Lease6Ptr lease = LeaseMgrFactory::instance().getLease6(Lease::TYPE_NA, + decline_addr->getAddress()); + + if (!lease) { + // Client trying to decline a lease that we don't know about. + LOG_INFO(lease6_logger, DHCP6_DECLINE_FAIL_NO_LEASE) + .arg(decline->getLabel()).arg(decline_addr->getAddress().toText()); + + // According to RFC 8415, section 18.3.8: + // "For each IA in the Decline message for which the server has no + // binding information, the server adds an IA option using the IAID + // from the Decline message and includes a Status Code option with + // the value NoBinding in the IA option". + setStatusCode(ia_rsp, createStatusCode(*decline, *ia_rsp, STATUS_NoBinding, + "Server does not know about such an address.")); + + // In the same section of RFC 8415: + // "The server ignores addresses not assigned to the IAs (though it may" + // choose to log an error if it finds such addresses)." + continue; // There may be other addresses. + } + + if (!lease->duid_) { + // Something is gravely wrong here. We do have a lease, but it does not + // have mandatory DUID information attached. Someone was messing with our + // database. + + LOG_ERROR(lease6_logger, DHCP6_DECLINE_FAIL_LEASE_WITHOUT_DUID) + .arg(decline->getLabel()) + .arg(decline_addr->getAddress().toText()); + + ia_rsp->addOption(createStatusCode(*decline, *ia_rsp, STATUS_UnspecFail, + "Database consistency check failed when attempting Decline.")); + + continue; + } + + // Ok, there's a sane lease with an address. Let's check if DUID matches first. + if (*duid != *(lease->duid_)) { + + // Sorry, it's not your address. You can't release it. + LOG_INFO(lease6_logger, DHCP6_DECLINE_FAIL_DUID_MISMATCH) + .arg(decline->getLabel()) + .arg(decline_addr->getAddress().toText()) + .arg(lease->duid_->toText()); + + ia_rsp->addOption(createStatusCode(*decline, *ia_rsp, STATUS_NoBinding, + "This address does not belong to you, you can't decline it")); + + continue; + } + + // Let's check if IAID matches. + if (ia->getIAID() != lease->iaid_) { + // This address belongs to this client, but to a different IA + LOG_INFO(lease6_logger, DHCP6_DECLINE_FAIL_IAID_MISMATCH) + .arg(decline->getLabel()) + .arg(lease->addr_.toText()) + .arg(ia->getIAID()) + .arg(lease->iaid_); + setStatusCode(ia_rsp, createStatusCode(*decline, *ia_rsp, STATUS_NoBinding, + "This is your address, but you used wrong IAID")); + + continue; + } + + // Ok, all is good. Decline this lease. + if (!declineLease(decline, lease, ia_rsp)) { + // declineLease returns false only when hook callouts set the next + // step status to drop. We just propagate the bad news here. + return (OptionPtr()); + + } else { + new_leases.push_back(lease); + } + } + + if (total_addrs == 0) { + setStatusCode(ia_rsp, createStatusCode(*decline, *ia_rsp, STATUS_NoBinding, + "No addresses sent in IA_NA")); + general_status = STATUS_NoBinding; + } + + return (ia_rsp); +} + +void +Dhcpv6Srv::setStatusCode(boost::shared_ptr<isc::dhcp::Option6IA>& container, + const OptionPtr& status) { + // Let's delete any old status code we may have. + container->delOption(D6O_STATUS_CODE); + + container->addOption(status); +} + +bool +Dhcpv6Srv::declineLease(const Pkt6Ptr& decline, const Lease6Ptr lease, + boost::shared_ptr<Option6IA> ia_rsp) { + // We do not want to decrease the assigned-nas at this time. While + // technically a declined address is no longer allocated, the + // primary usage of the assigned-nas statistic is to monitor pool + // utilization. Most people would forget to include declined-nas + // in the calculation, and simply do assigned-nas/total-nas. This + // would have a bias towards under-representing pool utilization, + // if we decreased allocated immediately after receiving DHCPDECLINE, + // rather than later when we recover the address. + + // Let's call lease6_decline hooks if necessary. + if (HooksManager::calloutsPresent(Hooks.hook_index_lease6_decline_)) { + CalloutHandlePtr callout_handle = getCalloutHandle(decline); + + // Use the RAII wrapper to make sure that the callout handle state is + // reset when this object goes out of scope. All hook points must do + // it to prevent possible circular dependency between the callout + // handle and its arguments. + ScopedCalloutHandleState callout_handle_state(callout_handle); + + // Enable copying options from the packet within hook library. + ScopedEnableOptionsCopy<Pkt6> query6_options_copy(decline); + + // Pass the original packet + callout_handle->setArgument("query6", decline); + + // Pass the lease to be updated + callout_handle->setArgument("lease6", lease); + + // Call callouts + HooksManager::callCallouts(Hooks.hook_index_lease6_decline_, + *callout_handle); + + // Callouts decided to SKIP the next processing step. The next + // processing step would to actually decline the lease, so we'll + // keep the lease as is. + if (callout_handle->getStatus() == CalloutHandle::NEXT_STEP_SKIP) { + LOG_DEBUG(hooks_logger, DBG_DHCP6_DETAIL, DHCP6_HOOK_DECLINE_SKIP) + .arg(decline->getLabel()) + .arg(decline->getIface()) + .arg(lease->addr_.toText()); + return (true); + } + + // Callouts decided to DROP the packet. Let's simply log it and + // return false, so callers will act accordingly. + if (callout_handle->getStatus() == CalloutHandle::NEXT_STEP_DROP) { + LOG_DEBUG(hooks_logger, DBGLVL_PKT_HANDLING, DHCP6_HOOK_DECLINE_DROP) + .arg(decline->getLabel()) + .arg(decline->getIface()) + .arg(lease->addr_.toText()); + return (false); + } + } + + Lease6Ptr old_values = boost::make_shared<Lease6>(*lease); + + // @todo: Call hooks. + + // We need to disassociate the lease from the client. Once we move a lease + // to declined state, it is no longer associated with the client in any + // way. + lease->decline(CfgMgr::instance().getCurrentCfg()->getDeclinePeriod()); + + try { + LeaseMgrFactory::instance().updateLease6(lease); + } catch (const Exception& ex) { + // Update failed. + LOG_ERROR(lease6_logger, DHCP6_DECLINE_FAIL) + .arg(decline->getLabel()) + .arg(lease->addr_.toText()) + .arg(ex.what()); + return (false); + } + + // Check if a lease has flags indicating that the FQDN update has + // been performed. If so, create NameChangeRequest which removes + // the entries. This method does all necessary checks. + queueNCR(CHG_REMOVE, old_values); + + // Bump up the subnet-specific statistic. + StatsMgr::instance().addValue( + StatsMgr::generateName("subnet", lease->subnet_id_, "declined-addresses"), + static_cast<int64_t>(1)); + + // Global declined addresses counter. + StatsMgr::instance().addValue("declined-addresses", static_cast<int64_t>(1)); + + LOG_INFO(lease6_logger, DHCP6_DECLINE_LEASE).arg(decline->getLabel()) + .arg(lease->addr_.toText()).arg(lease->valid_lft_); + + ia_rsp->addOption(createStatusCode(*decline, *ia_rsp, STATUS_Success, + "Lease declined. Hopefully the next one will be better.")); + + return (true); +} + +Pkt6Ptr +Dhcpv6Srv::processInfRequest(AllocEngine::ClientContext6& ctx) { + + Pkt6Ptr inf_request = ctx.query_; + conditionallySetReservedClientClasses(inf_request, ctx); + requiredClassify(inf_request, ctx); + + // Create a Reply packet, with the same trans-id as the client's. + Pkt6Ptr reply(new Pkt6(DHCPV6_REPLY, inf_request->getTransid())); + + // Copy client options (client-id, also relay information if present) + copyClientOptions(inf_request, reply); + + // Build the configured option list for append methods + CfgOptionList co_list; + buildCfgOptionList(inf_request, ctx, co_list); + + // Append default options, i.e. options that the server is supposed + // to put in all messages it sends (server-id for now, but possibly other + // options once we start supporting authentication) + appendDefaultOptions(inf_request, reply, co_list); + + // Try to assign options that were requested by the client. + appendRequestedOptions(inf_request, reply, co_list); + + // Try to assign vendor options that were requested by the client. + appendRequestedVendorOptions(inf_request, reply, ctx, co_list); + + return (reply); +} + +void +Dhcpv6Srv::processDhcp4Query(const Pkt6Ptr& dhcp4_query) { + + // flags are in transid + // uint32_t flags = dhcp4_query->getTransid(); + // do nothing with DHCPV4_QUERY_FLAGS_UNICAST + + // Get the DHCPv4 message option + OptionPtr dhcp4_msg = dhcp4_query->getOption(D6O_DHCPV4_MSG); + if (dhcp4_msg) { + try { + // Forward the whole message to the DHCPv4 server via IPC + Dhcp6to4Ipc::instance().send(dhcp4_query); + } catch (...) { + // Assume the error was already logged + return; + } + } + + // This method does not return anything as we always sent back + // the response via Dhcp6To4Ipc. +} + +void Dhcpv6Srv::classifyByVendor(const Pkt6Ptr& pkt, std::string& classes) { + OptionVendorClassPtr vclass = boost::dynamic_pointer_cast< + OptionVendorClass>(pkt->getOption(D6O_VENDOR_CLASS)); + + if (!vclass || vclass->getTuplesNum() == 0) { + return; + } + + if (vclass->hasTuple(DOCSIS3_CLASS_MODEM)) { + pkt->addClass(VENDOR_CLASS_PREFIX + DOCSIS3_CLASS_MODEM); + classes += VENDOR_CLASS_PREFIX + DOCSIS3_CLASS_MODEM + " "; + + } else if (vclass->hasTuple(DOCSIS3_CLASS_EROUTER)) { + pkt->addClass(VENDOR_CLASS_PREFIX + DOCSIS3_CLASS_EROUTER); + classes += VENDOR_CLASS_PREFIX + DOCSIS3_CLASS_EROUTER + " "; + + } else { + pkt->addClass(VENDOR_CLASS_PREFIX + vclass->getTuple(0).getText()); + classes + VENDOR_CLASS_PREFIX + vclass->getTuple(0).getText() + " "; + } +} + +void Dhcpv6Srv::classifyPacket(const Pkt6Ptr& pkt) { + // All packets belongs to ALL + pkt->addClass("ALL"); + string classes = "ALL "; + + // First: built-in vendor class processing + classifyByVendor(pkt, classes); + + // Run match expressions on classes not depending on KNOWN/UNKNOWN. + evaluateClasses(pkt, false); +} + +void Dhcpv6Srv::evaluateClasses(const Pkt6Ptr& pkt, bool depend_on_known) { + // Note getClientClassDictionary() cannot be null + const ClientClassDictionaryPtr& dict = + CfgMgr::instance().getCurrentCfg()->getClientClassDictionary(); + const ClientClassDefListPtr& defs_ptr = dict->getClasses(); + for (ClientClassDefList::const_iterator it = defs_ptr->cbegin(); + it != defs_ptr->cend(); ++it) { + // Note second cannot be null + const ExpressionPtr& expr_ptr = (*it)->getMatchExpr(); + // Nothing to do without an expression to evaluate + if (!expr_ptr) { + continue; + } + // Not the right time if only when required + if ((*it)->getRequired()) { + continue; + } + // Not the right pass. + if ((*it)->getDependOnKnown() != depend_on_known) { + continue; + } + // Evaluate the expression which can return false (no match), + // true (match) or raise an exception (error) + try { + bool status = evaluateBool(*expr_ptr, *pkt); + if (status) { + LOG_INFO(dhcp6_logger, EVAL_RESULT) + .arg((*it)->getName()) + .arg(status); + // Matching: add the class + pkt->addClass((*it)->getName()); + } else { + LOG_DEBUG(dhcp6_logger, DBG_DHCP6_DETAIL, EVAL_RESULT) + .arg((*it)->getName()) + .arg(status); + } + } catch (const Exception& ex) { + LOG_ERROR(dhcp6_logger, EVAL_RESULT) + .arg((*it)->getName()) + .arg(ex.what()); + } catch (...) { + LOG_ERROR(dhcp6_logger, EVAL_RESULT) + .arg((*it)->getName()) + .arg("get exception?"); + } + } +} + +void +Dhcpv6Srv::removeDependentEvaluatedClasses(const Pkt6Ptr& pkt) { + const ClientClassDictionaryPtr& dict = + CfgMgr::instance().getCurrentCfg()->getClientClassDictionary(); + const ClientClassDefListPtr& defs_ptr = dict->getClasses(); + for (auto def : *defs_ptr) { + // Only remove evaluated classes. Other classes can be + // assigned via hooks libraries and we should not remove + // them because there is no way they can be added back. + if (def->getMatchExpr()) { + pkt->classes_.erase(def->getName()); + } + } +} + +void +Dhcpv6Srv::setReservedClientClasses(const Pkt6Ptr& pkt, + const AllocEngine::ClientContext6& ctx) { + if (ctx.currentHost() && pkt) { + const ClientClasses& classes = ctx.currentHost()->getClientClasses6(); + for (ClientClasses::const_iterator cclass = classes.cbegin(); + cclass != classes.cend(); ++cclass) { + pkt->addClass(*cclass); + } + } + + const ClientClasses& classes = pkt->getClasses(); + if (!classes.empty()) { + LOG_DEBUG(dhcp6_logger, DBG_DHCP6_BASIC, DHCP6_CLASS_ASSIGNED) + .arg(pkt->getLabel()) + .arg(classes.toText()); + } +} + +void +Dhcpv6Srv::conditionallySetReservedClientClasses(const Pkt6Ptr& pkt, + const AllocEngine::ClientContext6& ctx) { + if (ctx.subnet_) { + SharedNetwork6Ptr shared_network; + ctx.subnet_->getSharedNetwork(shared_network); + if (shared_network) { + ConstHostPtr host = ctx.currentHost(); + if (host && (host->getIPv6SubnetID() != SUBNET_ID_GLOBAL)) { + setReservedClientClasses(pkt, ctx); + } + } + } +} + +void +Dhcpv6Srv::requiredClassify(const Pkt6Ptr& pkt, AllocEngine::ClientContext6& ctx) { + // First collect required classes + ClientClasses classes = pkt->getClasses(true); + Subnet6Ptr subnet = ctx.subnet_; + + if (subnet) { + // Begin by the shared-network + SharedNetwork6Ptr network; + subnet->getSharedNetwork(network); + if (network) { + const ClientClasses& to_add = network->getRequiredClasses(); + for (ClientClasses::const_iterator cclass = to_add.cbegin(); + cclass != to_add.cend(); ++cclass) { + classes.insert(*cclass); + } + } + + // Followed by the subnet + const ClientClasses& to_add = subnet->getRequiredClasses(); + for (ClientClasses::const_iterator cclass = to_add.cbegin(); + cclass != to_add.cend(); ++cclass) { + classes.insert(*cclass); + } + + // And finish by pools + for (auto resource : ctx.allocated_resources_) { + PoolPtr pool = + ctx.subnet_->getPool(resource.getPrefixLength() == 128 ? + Lease::TYPE_NA : Lease::TYPE_PD, + resource.getAddress(), + false); + if (pool) { + const ClientClasses& to_add = pool->getRequiredClasses(); + for (ClientClasses::const_iterator cclass = to_add.cbegin(); + cclass != to_add.cend(); ++cclass) { + classes.insert(*cclass); + } + } + } + + // host reservation??? + } + + // Run match expressions + // Note getClientClassDictionary() cannot be null + const ClientClassDictionaryPtr& dict = + CfgMgr::instance().getCurrentCfg()->getClientClassDictionary(); + for (ClientClasses::const_iterator cclass = classes.cbegin(); + cclass != classes.cend(); ++cclass) { + const ClientClassDefPtr class_def = dict->findClass(*cclass); + if (!class_def) { + LOG_DEBUG(dhcp6_logger, DBG_DHCP6_BASIC, DHCP6_CLASS_UNDEFINED) + .arg(*cclass); + continue; + } + const ExpressionPtr& expr_ptr = class_def->getMatchExpr(); + // Nothing to do without an expression to evaluate + if (!expr_ptr) { + LOG_DEBUG(dhcp6_logger, DBG_DHCP6_BASIC, DHCP6_CLASS_UNTESTABLE) + .arg(*cclass); + continue; + } + // Evaluate the expression which can return false (no match), + // true (match) or raise an exception (error) + try { + bool status = evaluateBool(*expr_ptr, *pkt); + if (status) { + LOG_INFO(dhcp6_logger, EVAL_RESULT) + .arg(*cclass) + .arg(status); + // Matching: add the class + pkt->addClass(*cclass); + } else { + LOG_DEBUG(dhcp6_logger, DBG_DHCP6_DETAIL, EVAL_RESULT) + .arg(*cclass) + .arg(status); + } + } catch (const Exception& ex) { + LOG_ERROR(dhcp6_logger, EVAL_RESULT) + .arg(*cclass) + .arg(ex.what()); + } catch (...) { + LOG_ERROR(dhcp6_logger, EVAL_RESULT) + .arg(*cclass) + .arg("get exception?"); + } + } +} + +void +Dhcpv6Srv::updateReservedFqdn(AllocEngine::ClientContext6& ctx, + const Pkt6Ptr& answer) { + if (!answer) { + isc_throw(isc::Unexpected, "an instance of the object encapsulating" + " a message must not be NULL when updating reserved FQDN"); + } + + Option6ClientFqdnPtr fqdn = boost::dynamic_pointer_cast<Option6ClientFqdn> + (answer->getOption(D6O_CLIENT_FQDN)); + + // If Client FQDN option is not included, there is nothing to do. + if (!fqdn) { + return; + } + + std::string name = fqdn->getDomainName(); + + // If there is a host reservation for this client we have to check whether + // this reservation has the same hostname as the hostname currently + // present in the FQDN option. If not, it indicates that the allocation + // engine picked a different subnet (from within a shared network) for + // reservations and we have to send this new value to the client. + if (ctx.currentHost() && + !ctx.currentHost()->getHostname().empty()) { + std::string new_name = CfgMgr::instance().getD2ClientMgr(). + qualifyName(ctx.currentHost()->getHostname(), *ctx.getDdnsParams(), true); + + if (new_name != name) { + fqdn->setDomainName(new_name, Option6ClientFqdn::FULL); + + // Replace previous instance of Client FQDN option. + answer->delOption(D6O_CLIENT_FQDN); + answer->addOption(fqdn); + } + } +} + +void +Dhcpv6Srv::generateFqdn(const Pkt6Ptr& answer, + AllocEngine::ClientContext6& ctx) { + if (!answer) { + isc_throw(isc::Unexpected, "an instance of the object encapsulating" + " a message must not be NULL when generating FQDN"); + } + + /// @todo Add proper logging for cases when we can't generate FQDN. + /// See #3885 for details. + + // It is likely that client hasn't included the FQDN option. In such case, + // FQDN option will be NULL. Also, there is nothing to do if the option + // is present and conveys the non-empty FQDN. + Option6ClientFqdnPtr fqdn = boost::dynamic_pointer_cast< + Option6ClientFqdn>(answer->getOption(D6O_CLIENT_FQDN)); + if (!fqdn || !fqdn->getDomainName().empty()) { + return; + } + + // Get the first IA_NA acquired for the client. + OptionPtr ia = answer->getOption(D6O_IA_NA); + if (!ia) { + return; + } + + // If it has any IAAddr, use the first one to generate unique FQDN. + Option6IAAddrPtr iaaddr = boost::dynamic_pointer_cast< + Option6IAAddr>(ia->getOption(D6O_IAADDR)); + if (!iaaddr) { + return; + } + // Get the IPv6 address acquired by the client. + IOAddress addr = iaaddr->getAddress(); + std::string generated_name = + CfgMgr::instance().getD2ClientMgr().generateFqdn(addr, *ctx.getDdnsParams()); + + LOG_DEBUG(ddns6_logger, DBG_DHCP6_DETAIL_DATA, DHCP6_DDNS_FQDN_GENERATED) + .arg(answer->getLabel()) + .arg(generated_name); + + try { + // The lease has been acquired but the FQDN for this lease hasn't + // been updated in the lease database. We now have new FQDN + // generated, so the lease database has to be updated here. + // However, never update lease database for Advertise, just send + // our notion of client's FQDN in the Client FQDN option. + if (answer->getType() != DHCPV6_ADVERTISE) { + Lease6Ptr lease; + for (auto l : ctx.new_leases_) { + if ((l->type_ == Lease::TYPE_NA) && (l->addr_ == addr)) { + lease = l; + break; + } + } + if (lease) { + lease->hostname_ = generated_name; + lease->reuseable_valid_lft_ = 0; + LeaseMgrFactory::instance().updateLease6(lease); + + } else { + isc_throw(isc::Unexpected, "there is no lease in the database " + " for address " << addr << ", so as it is impossible" + " to update FQDN data. This is a programmatic error" + " as the given address is now being handed to the" + " client"); + } + } + // Set the generated FQDN in the Client FQDN option. + fqdn->setDomainName(generated_name, Option6ClientFqdn::FULL); + + answer->delOption(D6O_CLIENT_FQDN); + answer->addOption(fqdn); + ctx.hostname_ = generated_name; + } catch (const Exception& ex) { + LOG_ERROR(ddns6_logger, DHCP6_DDNS_GENERATED_FQDN_UPDATE_FAIL) + .arg(answer->getLabel()) + .arg(addr.toText()) + .arg(ex.what()); + } +} + +void +Dhcpv6Srv::startD2() { + D2ClientMgr& d2_mgr = CfgMgr::instance().getD2ClientMgr(); + if (d2_mgr.ddnsEnabled()) { + // Updates are enabled, so lets start the sender, passing in + // our error handler. + // This may throw so wherever this is called needs to ready. + d2_mgr.startSender(std::bind(&Dhcpv6Srv::d2ClientErrorHandler, + this, ph::_1, ph::_2)); + } +} + +void +Dhcpv6Srv::stopD2() { + D2ClientMgr& d2_mgr = CfgMgr::instance().getD2ClientMgr(); + if (d2_mgr.ddnsEnabled()) { + // Updates are enabled, so lets stop the sender + d2_mgr.stopSender(); + } +} + +void +Dhcpv6Srv::d2ClientErrorHandler(const + dhcp_ddns::NameChangeSender::Result result, + dhcp_ddns::NameChangeRequestPtr& ncr) { + LOG_ERROR(ddns6_logger, DHCP6_DDNS_REQUEST_SEND_FAILED). + arg(result).arg((ncr ? ncr->toText() : " NULL ")); + // We cannot communicate with kea-dhcp-ddns, suspend further updates. + /// @todo We may wish to revisit this, but for now we will simply turn + /// them off. + CfgMgr::instance().getD2ClientMgr().suspendUpdates(); +} + +// Refer to config_report so it will be embedded in the binary +const char* const* dhcp6_config_report = isc::detail::config_report; + +std::string +Dhcpv6Srv::getVersion(bool extended) { + std::stringstream tmp; + + tmp << VERSION; + if (extended) { + tmp << endl << EXTENDED_VERSION << endl; + tmp << "linked with:" << endl; + tmp << Logger::getVersion() << endl; + tmp << CryptoLink::getVersion() << endl; + tmp << "database:" << endl; +#ifdef HAVE_MYSQL + tmp << MySqlLeaseMgr::getDBVersion() << endl; +#endif +#ifdef HAVE_PGSQL + tmp << PgSqlLeaseMgr::getDBVersion() << endl; +#endif + tmp << Memfile_LeaseMgr::getDBVersion(Memfile_LeaseMgr::V6); + + // @todo: more details about database runtime + } + + return (tmp.str()); +} + +void Dhcpv6Srv::processRSOO(const Pkt6Ptr& query, const Pkt6Ptr& rsp) { + + if (query->relay_info_.empty()) { + // RSOO is inserted by relay agents, nothing to do here if it's + // a direct message. + return; + } + + // Get RSOO configuration. + ConstCfgRSOOPtr cfg_rsoo = CfgMgr::instance().getCurrentCfg()->getCfgRSOO(); + + // Let's get over all relays (encapsulation levels). We need to do + // it in the same order as the client packet traversed the relays. + for (int i = query->relay_info_.size(); i > 0 ; --i) { + OptionPtr rsoo_container = query->getRelayOption(D6O_RSOO, i - 1); + if (rsoo_container) { + // There are RSOO options. Let's get through them one by one + // and if it's RSOO-enabled and there's no such option provided yet, + // copy it to the server's response + const OptionCollection& rsoo = rsoo_container->getOptions(); + for (OptionCollection::const_iterator opt = rsoo.begin(); + opt != rsoo.end(); ++opt) { + + // Echo option if it is RSOO enabled option and there is no such + // option added yet. + if (cfg_rsoo->enabled(opt->second->getType()) && + !rsp->getOption(opt->second->getType())) { + rsp->addOption(opt->second); + } + } + } + } +} + +uint16_t Dhcpv6Srv::checkRelaySourcePort(const Pkt6Ptr& query) { + + if (query->relay_info_.empty()) { + // No relay agent + return (0); + } + + // Did the last relay agent add a relay-source-port? + if (query->getRelayOption(D6O_RELAY_SOURCE_PORT, 0)) { + // RFC 8357 section 5.2 + return (query->getRemotePort()); + } + + return (0); +} + +void Dhcpv6Srv::processStatsReceived(const Pkt6Ptr& query) { + // Note that we're not bumping pkt6-received statistic as it was + // increased early in the packet reception code. + + string stat_name = "pkt6-unknown-received"; + switch (query->getType()) { + case DHCPV6_SOLICIT: + stat_name = "pkt6-solicit-received"; + break; + case DHCPV6_ADVERTISE: + // Should not happen, but let's keep a counter for it + stat_name = "pkt6-advertise-received"; + break; + case DHCPV6_REQUEST: + stat_name = "pkt6-request-received"; + break; + case DHCPV6_CONFIRM: + stat_name = "pkt6-confirm-received"; + break; + case DHCPV6_RENEW: + stat_name = "pkt6-renew-received"; + break; + case DHCPV6_REBIND: + stat_name = "pkt6-rebind-received"; + break; + case DHCPV6_REPLY: + // Should not happen, but let's keep a counter for it + stat_name = "pkt6-reply-received"; + break; + case DHCPV6_RELEASE: + stat_name = "pkt6-release-received"; + break; + case DHCPV6_DECLINE: + stat_name = "pkt6-decline-received"; + break; + case DHCPV6_RECONFIGURE: + stat_name = "pkt6-reconfigure-received"; + break; + case DHCPV6_INFORMATION_REQUEST: + stat_name = "pkt6-infrequest-received"; + break; + case DHCPV6_DHCPV4_QUERY: + stat_name = "pkt6-dhcpv4-query-received"; + break; + case DHCPV6_DHCPV4_RESPONSE: + // Should not happen, but let's keep a counter for it + stat_name = "pkt6-dhcpv4-response-received"; + break; + default: + ; // do nothing + } + + StatsMgr::instance().addValue(stat_name, static_cast<int64_t>(1)); +} + +void Dhcpv6Srv::processStatsSent(const Pkt6Ptr& response) { + // Increase generic counter for sent packets. + StatsMgr::instance().addValue("pkt6-sent", static_cast<int64_t>(1)); + + // Increase packet type specific counter for packets sent. + string stat_name; + switch (response->getType()) { + case DHCPV6_ADVERTISE: + stat_name = "pkt6-advertise-sent"; + break; + case DHCPV6_REPLY: + stat_name = "pkt6-reply-sent"; + break; + case DHCPV6_DHCPV4_RESPONSE: + stat_name = "pkt6-dhcpv4-response-sent"; + break; + default: + // That should never happen + return; + } + + StatsMgr::instance().addValue(stat_name, static_cast<int64_t>(1)); +} + +int Dhcpv6Srv::getHookIndexBuffer6Send() { + return (Hooks.hook_index_buffer6_send_); +} + +bool +Dhcpv6Srv::requestedInORO(const Pkt6Ptr& query, const uint16_t code) const { + OptionUint16ArrayPtr oro = + boost::dynamic_pointer_cast<OptionUint16Array>(query->getOption(D6O_ORO)); + + if (oro) { + const std::vector<uint16_t>& codes = oro->getValues(); + return (std::find(codes.begin(), codes.end(), code) != codes.end()); + } + + return (false); +} + +void Dhcpv6Srv::discardPackets() { + // Dump all of our current packets, anything that is mid-stream + HooksManager::clearParkingLots(); +} + +/// @todo This logic to be modified if we decide to support infinite lease times. +void +Dhcpv6Srv::setTeeTimes(uint32_t preferred_lft, const Subnet6Ptr& subnet, Option6IAPtr& resp) { + // Default T2 time to zero. + uint32_t t2_time = 0; + + // If T2 is explicitly configured we'll use that value. + if (!subnet->getT2().unspecified()) { + t2_time = subnet->getT2(); + } else if (subnet->getCalculateTeeTimes()) { + // Calculating tee times is enabled, so calculate it. + t2_time = static_cast<uint32_t>(round(subnet->getT2Percent() * preferred_lft)); + } + + // We allow T2 to be any value. + resp->setT2(t2_time); + + // Default T1 time to zero. + uint32_t t1_time = 0; + + // If T1 is explicitly configured we'll use try value. + if (!subnet->getT1().unspecified()) { + t1_time = subnet->getT1(); + } else if (subnet->getCalculateTeeTimes()) { + // Calculating tee times is enabled, so calculate it. + t1_time = static_cast<uint32_t>(round(subnet->getT1Percent() * preferred_lft)); + } + + // T1 is sane if it is less than or equal to T2. + if (t1_time < t2_time) { + resp->setT1(t1_time); + } else { + // It's either explicitly 0 or insane, leave it to the client + resp->setT1(0); + } +} + +void +Dhcpv6Srv::checkDynamicSubnetChange(const Pkt6Ptr& question, Pkt6Ptr& answer, + AllocEngine::ClientContext6& ctx, + const Subnet6Ptr orig_subnet) { + // If the subnet's are the same there's nothing to do. + if ((!ctx.subnet_) || (!orig_subnet) || (orig_subnet->getID() == ctx.subnet_->getID())) { + return; + } + + // We get the network for logging only. It should always be set as this a dynamic + // change should only happen within shared-networks. Not having one might not be + // an error if a hook changed the subnet? + SharedNetwork6Ptr network; + orig_subnet->getSharedNetwork(network); + LOG_DEBUG(packet6_logger, DBG_DHCP6_BASIC_DATA, DHCP6_SUBNET_DYNAMICALLY_CHANGED) + .arg(question->getLabel()) + .arg(orig_subnet->toText()) + .arg(ctx.subnet_->toText()) + .arg(network ? network->getName() : "<no network?>"); + + // The DDNS parameters may have changed with the subnet, so we need to + // recalculate the client name. + + // Save the current DNS values on the context. + std::string prev_hostname = ctx.hostname_; + bool prev_fwd_dns_update = ctx.fwd_dns_update_; + bool prev_rev_dns_update = ctx.rev_dns_update_; + + // Remove the current FQDN option from the answer. + answer->delOption(D6O_CLIENT_FQDN); + + // Recalculate the client's FQDN. This will replace the FQDN option and + // update the context values for hostname_ and DNS directions. + processClientFqdn(question, answer, ctx); + + // If this is a real allocation and the DNS values changed we need to + // update the leases. + if (!ctx.fake_allocation_ && + ((prev_hostname != ctx.hostname_) || + (prev_fwd_dns_update != ctx.fwd_dns_update_) || + (prev_rev_dns_update != ctx.rev_dns_update_))) { + for (Lease6Collection::const_iterator l = ctx.new_leases_.begin(); + l != ctx.new_leases_.end(); ++l) { + (*l)->hostname_ = ctx.hostname_; + (*l)->fqdn_fwd_ = ctx.fwd_dns_update_; + (*l)->fqdn_rev_ = ctx.rev_dns_update_; + (*l)->reuseable_valid_lft_ = 0; + LeaseMgrFactory::instance().updateLease6(*l); + } + } +} + +std::list<std::list<std::string>> Dhcpv6Srv::jsonPathsToRedact() const{ + static std::list<std::list<std::string>> const list({ + {"config-control", "config-databases", "[]"}, + {"hooks-libraries", "[]", "parameters", "*"}, + {"hosts-database"}, + {"hosts-databases", "[]"}, + {"lease-database"}, + }); + return list; +} + +} // namespace dhcp +} // namespace isc |