]> git.proxmox.com Git - mirror_frr.git/blob - ripd/ripd.c
Merge pull request #1298 from opensourcerouting/iface-rb-tree
[mirror_frr.git] / ripd / ripd.c
1 /* RIP version 1 and 2.
2 * Copyright (C) 2005 6WIND <alain.ritoux@6wind.com>
3 * Copyright (C) 1997, 98, 99 Kunihiro Ishiguro <kunihiro@zebra.org>
4 *
5 * This file is part of GNU Zebra.
6 *
7 * GNU Zebra is free software; you can redistribute it and/or modify it
8 * under the terms of the GNU General Public License as published by the
9 * Free Software Foundation; either version 2, or (at your option) any
10 * later version.
11 *
12 * GNU Zebra is distributed in the hope that it will be useful, but
13 * WITHOUT ANY WARRANTY; without even the implied warranty of
14 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
15 * General Public License for more details.
16 *
17 * You should have received a copy of the GNU General Public License along
18 * with this program; see the file COPYING; if not, write to the Free Software
19 * Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA
20 */
21
22 #include <zebra.h>
23
24 #include "vrf.h"
25 #include "if.h"
26 #include "command.h"
27 #include "prefix.h"
28 #include "table.h"
29 #include "thread.h"
30 #include "memory.h"
31 #include "log.h"
32 #include "stream.h"
33 #include "filter.h"
34 #include "sockunion.h"
35 #include "sockopt.h"
36 #include "routemap.h"
37 #include "if_rmap.h"
38 #include "plist.h"
39 #include "distribute.h"
40 #include "md5.h"
41 #include "keychain.h"
42 #include "privs.h"
43
44 #include "ripd/ripd.h"
45 #include "ripd/rip_debug.h"
46
47 DEFINE_QOBJ_TYPE(rip)
48
49 /* UDP receive buffer size */
50 #define RIP_UDP_RCV_BUF 41600
51
52 /* privileges global */
53 extern struct zebra_privs_t ripd_privs;
54
55 /* RIP Structure. */
56 struct rip *rip = NULL;
57
58 /* RIP neighbor address table. */
59 struct route_table *rip_neighbor_table;
60
61 /* RIP route changes. */
62 long rip_global_route_changes = 0;
63
64 /* RIP queries. */
65 long rip_global_queries = 0;
66
67 /* Prototypes. */
68 static void rip_event(enum rip_event, int);
69 static void rip_output_process(struct connected *, struct sockaddr_in *, int,
70 u_char);
71 static int rip_triggered_update(struct thread *);
72 static int rip_update_jitter(unsigned long);
73
74 /* RIP output routes type. */
75 enum { rip_all_route, rip_changed_route };
76
77 /* RIP command strings. */
78 static const struct message rip_msg[] = {{RIP_REQUEST, "REQUEST"},
79 {RIP_RESPONSE, "RESPONSE"},
80 {RIP_TRACEON, "TRACEON"},
81 {RIP_TRACEOFF, "TRACEOFF"},
82 {RIP_POLL, "POLL"},
83 {RIP_POLL_ENTRY, "POLL ENTRY"},
84 {0}};
85
86 /* Utility function to set boradcast option to the socket. */
87 static int sockopt_broadcast(int sock)
88 {
89 int ret;
90 int on = 1;
91
92 ret = setsockopt(sock, SOL_SOCKET, SO_BROADCAST, (char *)&on,
93 sizeof on);
94 if (ret < 0) {
95 zlog_warn("can't set sockopt SO_BROADCAST to socket %d", sock);
96 return -1;
97 }
98 return 0;
99 }
100
101 static int rip_route_rte(struct rip_info *rinfo)
102 {
103 return (rinfo->type == ZEBRA_ROUTE_RIP
104 && rinfo->sub_type == RIP_ROUTE_RTE);
105 }
106
107 static struct rip_info *rip_info_new(void)
108 {
109 return XCALLOC(MTYPE_RIP_INFO, sizeof(struct rip_info));
110 }
111
112 void rip_info_free(struct rip_info *rinfo)
113 {
114 XFREE(MTYPE_RIP_INFO, rinfo);
115 }
116
117 /* RIP route garbage collect timer. */
118 static int rip_garbage_collect(struct thread *t)
119 {
120 struct rip_info *rinfo;
121 struct route_node *rp;
122
123 rinfo = THREAD_ARG(t);
124 rinfo->t_garbage_collect = NULL;
125
126 /* Off timeout timer. */
127 RIP_TIMER_OFF(rinfo->t_timeout);
128
129 /* Get route_node pointer. */
130 rp = rinfo->rp;
131
132 /* Unlock route_node. */
133 listnode_delete(rp->info, rinfo);
134 if (list_isempty((struct list *)rp->info)) {
135 list_delete_and_null((struct list **)&rp->info);
136 route_unlock_node(rp);
137 }
138
139 /* Free RIP routing information. */
140 rip_info_free(rinfo);
141
142 return 0;
143 }
144
145 static void rip_timeout_update(struct rip_info *rinfo);
146
147 /* Add new route to the ECMP list.
148 * RETURN: the new entry added in the list, or NULL if it is not the first
149 * entry and ECMP is not allowed.
150 */
151 struct rip_info *rip_ecmp_add(struct rip_info *rinfo_new)
152 {
153 struct route_node *rp = rinfo_new->rp;
154 struct rip_info *rinfo = NULL;
155 struct list *list = NULL;
156
157 if (rp->info == NULL)
158 rp->info = list_new();
159 list = (struct list *)rp->info;
160
161 /* If ECMP is not allowed and some entry already exists in the list,
162 * do nothing. */
163 if (listcount(list) && !rip->ecmp)
164 return NULL;
165
166 rinfo = rip_info_new();
167 memcpy(rinfo, rinfo_new, sizeof(struct rip_info));
168 listnode_add(list, rinfo);
169
170 if (rip_route_rte(rinfo)) {
171 rip_timeout_update(rinfo);
172 rip_zebra_ipv4_add(rp);
173 }
174
175 /* Set the route change flag on the first entry. */
176 rinfo = listgetdata(listhead(list));
177 SET_FLAG(rinfo->flags, RIP_RTF_CHANGED);
178
179 /* Signal the output process to trigger an update (see section 2.5). */
180 rip_event(RIP_TRIGGERED_UPDATE, 0);
181
182 return rinfo;
183 }
184
185 /* Replace the ECMP list with the new route.
186 * RETURN: the new entry added in the list
187 */
188 struct rip_info *rip_ecmp_replace(struct rip_info *rinfo_new)
189 {
190 struct route_node *rp = rinfo_new->rp;
191 struct list *list = (struct list *)rp->info;
192 struct rip_info *rinfo = NULL, *tmp_rinfo = NULL;
193 struct listnode *node = NULL, *nextnode = NULL;
194
195 if (list == NULL || listcount(list) == 0)
196 return rip_ecmp_add(rinfo_new);
197
198 /* Get the first entry */
199 rinfo = listgetdata(listhead(list));
200
201 /* Learnt route replaced by a local one. Delete it from zebra. */
202 if (rip_route_rte(rinfo) && !rip_route_rte(rinfo_new))
203 if (CHECK_FLAG(rinfo->flags, RIP_RTF_FIB))
204 rip_zebra_ipv4_delete(rp);
205
206 /* Re-use the first entry, and delete the others. */
207 for (ALL_LIST_ELEMENTS(list, node, nextnode, tmp_rinfo))
208 if (tmp_rinfo != rinfo) {
209 RIP_TIMER_OFF(tmp_rinfo->t_timeout);
210 RIP_TIMER_OFF(tmp_rinfo->t_garbage_collect);
211 list_delete_node(list, node);
212 rip_info_free(tmp_rinfo);
213 }
214
215 RIP_TIMER_OFF(rinfo->t_timeout);
216 RIP_TIMER_OFF(rinfo->t_garbage_collect);
217 memcpy(rinfo, rinfo_new, sizeof(struct rip_info));
218
219 if (rip_route_rte(rinfo)) {
220 rip_timeout_update(rinfo);
221 /* The ADD message implies an update. */
222 rip_zebra_ipv4_add(rp);
223 }
224
225 /* Set the route change flag. */
226 SET_FLAG(rinfo->flags, RIP_RTF_CHANGED);
227
228 /* Signal the output process to trigger an update (see section 2.5). */
229 rip_event(RIP_TRIGGERED_UPDATE, 0);
230
231 return rinfo;
232 }
233
234 /* Delete one route from the ECMP list.
235 * RETURN:
236 * null - the entry is freed, and other entries exist in the list
237 * the entry - the entry is the last one in the list; its metric is set
238 * to INFINITY, and the garbage collector is started for it
239 */
240 struct rip_info *rip_ecmp_delete(struct rip_info *rinfo)
241 {
242 struct route_node *rp = rinfo->rp;
243 struct list *list = (struct list *)rp->info;
244
245 RIP_TIMER_OFF(rinfo->t_timeout);
246
247 if (listcount(list) > 1) {
248 /* Some other ECMP entries still exist. Just delete this entry.
249 */
250 RIP_TIMER_OFF(rinfo->t_garbage_collect);
251 listnode_delete(list, rinfo);
252 if (rip_route_rte(rinfo)
253 && CHECK_FLAG(rinfo->flags, RIP_RTF_FIB))
254 /* The ADD message implies the update. */
255 rip_zebra_ipv4_add(rp);
256 rip_info_free(rinfo);
257 rinfo = NULL;
258 } else {
259 assert(rinfo == listgetdata(listhead(list)));
260
261 /* This is the only entry left in the list. We must keep it in
262 * the list for garbage collection time, with INFINITY metric.
263 */
264
265 rinfo->metric = RIP_METRIC_INFINITY;
266 RIP_TIMER_ON(rinfo->t_garbage_collect, rip_garbage_collect,
267 rip->garbage_time);
268
269 if (rip_route_rte(rinfo)
270 && CHECK_FLAG(rinfo->flags, RIP_RTF_FIB))
271 rip_zebra_ipv4_delete(rp);
272 }
273
274 /* Set the route change flag on the first entry. */
275 rinfo = listgetdata(listhead(list));
276 SET_FLAG(rinfo->flags, RIP_RTF_CHANGED);
277
278 /* Signal the output process to trigger an update (see section 2.5). */
279 rip_event(RIP_TRIGGERED_UPDATE, 0);
280
281 return rinfo;
282 }
283
284 /* Timeout RIP routes. */
285 static int rip_timeout(struct thread *t)
286 {
287 rip_ecmp_delete((struct rip_info *)THREAD_ARG(t));
288 return 0;
289 }
290
291 static void rip_timeout_update(struct rip_info *rinfo)
292 {
293 if (rinfo->metric != RIP_METRIC_INFINITY) {
294 RIP_TIMER_OFF(rinfo->t_timeout);
295 RIP_TIMER_ON(rinfo->t_timeout, rip_timeout, rip->timeout_time);
296 }
297 }
298
299 static int rip_filter(int rip_distribute, struct prefix_ipv4 *p,
300 struct rip_interface *ri)
301 {
302 struct distribute *dist;
303 struct access_list *alist;
304 struct prefix_list *plist;
305 int distribute = rip_distribute == RIP_FILTER_OUT ? DISTRIBUTE_V4_OUT
306 : DISTRIBUTE_V4_IN;
307 const char *inout = rip_distribute == RIP_FILTER_OUT ? "out" : "in";
308
309 /* Input distribute-list filtering. */
310 if (ri->list[rip_distribute]) {
311 if (access_list_apply(ri->list[rip_distribute],
312 (struct prefix *)p)
313 == FILTER_DENY) {
314 if (IS_RIP_DEBUG_PACKET)
315 zlog_debug("%s/%d filtered by distribute %s",
316 inet_ntoa(p->prefix), p->prefixlen,
317 inout);
318 return -1;
319 }
320 }
321 if (ri->prefix[rip_distribute]) {
322 if (prefix_list_apply(ri->prefix[rip_distribute],
323 (struct prefix *)p)
324 == PREFIX_DENY) {
325 if (IS_RIP_DEBUG_PACKET)
326 zlog_debug("%s/%d filtered by prefix-list %s",
327 inet_ntoa(p->prefix), p->prefixlen,
328 inout);
329 return -1;
330 }
331 }
332
333 /* All interface filter check. */
334 dist = distribute_lookup(NULL);
335 if (dist) {
336 if (dist->list[distribute]) {
337 alist = access_list_lookup(AFI_IP,
338 dist->list[distribute]);
339
340 if (alist) {
341 if (access_list_apply(alist, (struct prefix *)p)
342 == FILTER_DENY) {
343 if (IS_RIP_DEBUG_PACKET)
344 zlog_debug(
345 "%s/%d filtered by distribute %s",
346 inet_ntoa(p->prefix),
347 p->prefixlen, inout);
348 return -1;
349 }
350 }
351 }
352 if (dist->prefix[distribute]) {
353 plist = prefix_list_lookup(AFI_IP,
354 dist->prefix[distribute]);
355
356 if (plist) {
357 if (prefix_list_apply(plist, (struct prefix *)p)
358 == PREFIX_DENY) {
359 if (IS_RIP_DEBUG_PACKET)
360 zlog_debug(
361 "%s/%d filtered by prefix-list %s",
362 inet_ntoa(p->prefix),
363 p->prefixlen, inout);
364 return -1;
365 }
366 }
367 }
368 }
369 return 0;
370 }
371
372 /* Check nexthop address validity. */
373 static int rip_nexthop_check(struct in_addr *addr)
374 {
375 struct vrf *vrf = vrf_lookup_by_id(VRF_DEFAULT);
376 struct interface *ifp;
377 struct listnode *cnode;
378 struct connected *ifc;
379 struct prefix *p;
380
381 /* If nexthop address matches local configured address then it is
382 invalid nexthop. */
383
384 FOR_ALL_INTERFACES (vrf, ifp) {
385 for (ALL_LIST_ELEMENTS_RO(ifp->connected, cnode, ifc)) {
386 p = ifc->address;
387
388 if (p->family == AF_INET
389 && IPV4_ADDR_SAME(&p->u.prefix4, addr))
390 return -1;
391 }
392 }
393 return 0;
394 }
395
396 /* RIP add route to routing table. */
397 static void rip_rte_process(struct rte *rte, struct sockaddr_in *from,
398 struct interface *ifp)
399 {
400 int ret;
401 struct prefix_ipv4 p;
402 struct route_node *rp;
403 struct rip_info *rinfo = NULL, newinfo;
404 struct rip_interface *ri;
405 struct in_addr *nexthop;
406 int same = 0;
407 unsigned char old_dist, new_dist;
408 struct list *list = NULL;
409 struct listnode *node = NULL;
410
411 /* Make prefix structure. */
412 memset(&p, 0, sizeof(struct prefix_ipv4));
413 p.family = AF_INET;
414 p.prefix = rte->prefix;
415 p.prefixlen = ip_masklen(rte->mask);
416
417 /* Make sure mask is applied. */
418 apply_mask_ipv4(&p);
419
420 /* Apply input filters. */
421 ri = ifp->info;
422
423 ret = rip_filter(RIP_FILTER_IN, &p, ri);
424 if (ret < 0)
425 return;
426
427 memset(&newinfo, 0, sizeof(newinfo));
428 newinfo.type = ZEBRA_ROUTE_RIP;
429 newinfo.sub_type = RIP_ROUTE_RTE;
430 newinfo.nexthop = rte->nexthop;
431 newinfo.from = from->sin_addr;
432 newinfo.ifindex = ifp->ifindex;
433 newinfo.metric = rte->metric;
434 newinfo.metric_out = rte->metric; /* XXX */
435 newinfo.tag = ntohs(rte->tag); /* XXX */
436
437 /* Modify entry according to the interface routemap. */
438 if (ri->routemap[RIP_FILTER_IN]) {
439 int ret;
440
441 /* The object should be of the type of rip_info */
442 ret = route_map_apply(ri->routemap[RIP_FILTER_IN],
443 (struct prefix *)&p, RMAP_RIP, &newinfo);
444
445 if (ret == RMAP_DENYMATCH) {
446 if (IS_RIP_DEBUG_PACKET)
447 zlog_debug(
448 "RIP %s/%d is filtered by route-map in",
449 inet_ntoa(p.prefix), p.prefixlen);
450 return;
451 }
452
453 /* Get back the object */
454 rte->nexthop = newinfo.nexthop_out;
455 rte->tag = htons(newinfo.tag_out); /* XXX */
456 rte->metric =
457 newinfo.metric_out; /* XXX: the routemap uses the
458 metric_out field */
459 }
460
461 /* Once the entry has been validated, update the metric by
462 adding the cost of the network on wich the message
463 arrived. If the result is greater than infinity, use infinity
464 (RFC2453 Sec. 3.9.2) */
465 /* Zebra ripd can handle offset-list in. */
466 ret = rip_offset_list_apply_in(&p, ifp, &rte->metric);
467
468 /* If offset-list does not modify the metric use interface's
469 metric. */
470 if (!ret)
471 rte->metric += ifp->metric ? ifp->metric : 1;
472
473 if (rte->metric > RIP_METRIC_INFINITY)
474 rte->metric = RIP_METRIC_INFINITY;
475
476 /* Set nexthop pointer. */
477 if (rte->nexthop.s_addr == 0)
478 nexthop = &from->sin_addr;
479 else
480 nexthop = &rte->nexthop;
481
482 /* Check if nexthop address is myself, then do nothing. */
483 if (rip_nexthop_check(nexthop) < 0) {
484 if (IS_RIP_DEBUG_PACKET)
485 zlog_debug("Nexthop address %s is myself",
486 inet_ntoa(*nexthop));
487 return;
488 }
489
490 /* Get index for the prefix. */
491 rp = route_node_get(rip->table, (struct prefix *)&p);
492
493 newinfo.rp = rp;
494 newinfo.nexthop = *nexthop;
495 newinfo.metric = rte->metric;
496 newinfo.tag = ntohs(rte->tag);
497 newinfo.distance = rip_distance_apply(&newinfo);
498
499 new_dist = newinfo.distance ? newinfo.distance
500 : ZEBRA_RIP_DISTANCE_DEFAULT;
501
502 /* Check to see whether there is already RIP route on the table. */
503 if ((list = rp->info) != NULL)
504 for (ALL_LIST_ELEMENTS_RO(list, node, rinfo)) {
505 /* Need to compare with redistributed entry or local
506 * entry */
507 if (!rip_route_rte(rinfo))
508 break;
509
510 if (IPV4_ADDR_SAME(&rinfo->from, &from->sin_addr)
511 && IPV4_ADDR_SAME(&rinfo->nexthop, nexthop))
512 break;
513
514 if (!listnextnode(node)) {
515 /* Not found in the list */
516
517 if (rte->metric > rinfo->metric) {
518 /* New route has a greater metric.
519 * Discard it. */
520 route_unlock_node(rp);
521 return;
522 }
523
524 if (rte->metric < rinfo->metric)
525 /* New route has a smaller metric.
526 * Replace the ECMP list
527 * with the new one in below. */
528 break;
529
530 /* Metrics are same. We compare the distances.
531 */
532 old_dist = rinfo->distance
533 ? rinfo->distance
534 : ZEBRA_RIP_DISTANCE_DEFAULT;
535
536 if (new_dist > old_dist) {
537 /* New route has a greater distance.
538 * Discard it. */
539 route_unlock_node(rp);
540 return;
541 }
542
543 if (new_dist < old_dist)
544 /* New route has a smaller distance.
545 * Replace the ECMP list
546 * with the new one in below. */
547 break;
548
549 /* Metrics and distances are both same. Keep
550 * "rinfo" null and
551 * the new route is added in the ECMP list in
552 * below. */
553 }
554 }
555
556 if (rinfo) {
557 /* Local static route. */
558 if (rinfo->type == ZEBRA_ROUTE_RIP
559 && ((rinfo->sub_type == RIP_ROUTE_STATIC)
560 || (rinfo->sub_type == RIP_ROUTE_DEFAULT))
561 && rinfo->metric != RIP_METRIC_INFINITY) {
562 route_unlock_node(rp);
563 return;
564 }
565
566 /* Redistributed route check. */
567 if (rinfo->type != ZEBRA_ROUTE_RIP
568 && rinfo->metric != RIP_METRIC_INFINITY) {
569 old_dist = rinfo->distance;
570 /* Only routes directly connected to an interface
571 * (nexthop == 0)
572 * may have a valid NULL distance */
573 if (rinfo->nexthop.s_addr != 0)
574 old_dist = old_dist
575 ? old_dist
576 : ZEBRA_RIP_DISTANCE_DEFAULT;
577 /* If imported route does not have STRICT precedence,
578 mark it as a ghost */
579 if (new_dist <= old_dist
580 && rte->metric != RIP_METRIC_INFINITY)
581 rip_ecmp_replace(&newinfo);
582
583 route_unlock_node(rp);
584 return;
585 }
586 }
587
588 if (!rinfo) {
589 if (rp->info)
590 route_unlock_node(rp);
591
592 /* Now, check to see whether there is already an explicit route
593 for the destination prefix. If there is no such route, add
594 this route to the routing table, unless the metric is
595 infinity (there is no point in adding a route which
596 unusable). */
597 if (rte->metric != RIP_METRIC_INFINITY)
598 rip_ecmp_add(&newinfo);
599 } else {
600 /* Route is there but we are not sure the route is RIP or not.
601 */
602
603 /* If there is an existing route, compare the next hop address
604 to the address of the router from which the datagram came.
605 If this datagram is from the same router as the existing
606 route, reinitialize the timeout. */
607 same = (IPV4_ADDR_SAME(&rinfo->from, &from->sin_addr)
608 && (rinfo->ifindex == ifp->ifindex));
609
610 old_dist = rinfo->distance ? rinfo->distance
611 : ZEBRA_RIP_DISTANCE_DEFAULT;
612
613 /* Next, compare the metrics. If the datagram is from the same
614 router as the existing route, and the new metric is different
615 than the old one; or, if the new metric is lower than the old
616 one, or if the tag has been changed; or if there is a route
617 with a lower administrave distance; or an update of the
618 distance on the actual route; do the following actions: */
619 if ((same && rinfo->metric != rte->metric)
620 || (rte->metric < rinfo->metric)
621 || ((same) && (rinfo->metric == rte->metric)
622 && (newinfo.tag != rinfo->tag))
623 || (old_dist > new_dist)
624 || ((old_dist != new_dist) && same)) {
625 if (listcount(list) == 1) {
626 if (newinfo.metric != RIP_METRIC_INFINITY)
627 rip_ecmp_replace(&newinfo);
628 else
629 rip_ecmp_delete(rinfo);
630 } else {
631 if (newinfo.metric < rinfo->metric)
632 rip_ecmp_replace(&newinfo);
633 else if (newinfo.metric > rinfo->metric)
634 rip_ecmp_delete(rinfo);
635 else if (new_dist < old_dist)
636 rip_ecmp_replace(&newinfo);
637 else if (new_dist > old_dist)
638 rip_ecmp_delete(rinfo);
639 else {
640 int update = CHECK_FLAG(rinfo->flags,
641 RIP_RTF_FIB)
642 ? 1
643 : 0;
644
645 assert(newinfo.metric
646 != RIP_METRIC_INFINITY);
647
648 RIP_TIMER_OFF(rinfo->t_timeout);
649 RIP_TIMER_OFF(rinfo->t_garbage_collect);
650 memcpy(rinfo, &newinfo,
651 sizeof(struct rip_info));
652 rip_timeout_update(rinfo);
653
654 if (update)
655 rip_zebra_ipv4_add(rp);
656
657 /* - Set the route change flag on the
658 * first entry. */
659 rinfo = listgetdata(listhead(list));
660 SET_FLAG(rinfo->flags, RIP_RTF_CHANGED);
661 rip_event(RIP_TRIGGERED_UPDATE, 0);
662 }
663 }
664 } else /* same & no change */
665 rip_timeout_update(rinfo);
666
667 /* Unlock tempolary lock of the route. */
668 route_unlock_node(rp);
669 }
670 }
671
672 /* Dump RIP packet */
673 static void rip_packet_dump(struct rip_packet *packet, int size,
674 const char *sndrcv)
675 {
676 caddr_t lim;
677 struct rte *rte;
678 const char *command_str;
679 char pbuf[BUFSIZ], nbuf[BUFSIZ];
680 u_char netmask = 0;
681 u_char *p;
682
683 /* Set command string. */
684 if (packet->command > 0 && packet->command < RIP_COMMAND_MAX)
685 command_str = lookup_msg(rip_msg, packet->command, NULL);
686 else
687 command_str = "unknown";
688
689 /* Dump packet header. */
690 zlog_debug("%s %s version %d packet size %d", sndrcv, command_str,
691 packet->version, size);
692
693 /* Dump each routing table entry. */
694 rte = packet->rte;
695
696 for (lim = (caddr_t)packet + size; (caddr_t)rte < lim; rte++) {
697 if (packet->version == RIPv2) {
698 netmask = ip_masklen(rte->mask);
699
700 if (rte->family == htons(RIP_FAMILY_AUTH)) {
701 if (rte->tag
702 == htons(RIP_AUTH_SIMPLE_PASSWORD)) {
703 p = (u_char *)&rte->prefix;
704
705 zlog_debug(
706 " family 0x%X type %d auth string: %s",
707 ntohs(rte->family),
708 ntohs(rte->tag), p);
709 } else if (rte->tag == htons(RIP_AUTH_MD5)) {
710 struct rip_md5_info *md5;
711
712 md5 = (struct rip_md5_info *)&packet
713 ->rte;
714
715 zlog_debug(
716 " family 0x%X type %d (MD5 authentication)",
717 ntohs(md5->family),
718 ntohs(md5->type));
719 zlog_debug(
720 " RIP-2 packet len %d Key ID %d"
721 " Auth Data len %d",
722 ntohs(md5->packet_len),
723 md5->keyid, md5->auth_len);
724 zlog_debug(
725 " Sequence Number %ld",
726 (u_long)ntohl(md5->sequence));
727 } else if (rte->tag == htons(RIP_AUTH_DATA)) {
728 p = (u_char *)&rte->prefix;
729
730 zlog_debug(
731 " family 0x%X type %d (MD5 data)",
732 ntohs(rte->family),
733 ntohs(rte->tag));
734 zlog_debug(
735 " MD5: %02X%02X%02X%02X%02X%02X%02X%02X"
736 "%02X%02X%02X%02X%02X%02X%02X%02X",
737 p[0], p[1], p[2], p[3], p[4],
738 p[5], p[6], p[7], p[8], p[9],
739 p[10], p[11], p[12], p[13],
740 p[14], p[15]);
741 } else {
742 zlog_debug(
743 " family 0x%X type %d (Unknown auth type)",
744 ntohs(rte->family),
745 ntohs(rte->tag));
746 }
747 } else
748 zlog_debug(
749 " %s/%d -> %s family %d tag %" ROUTE_TAG_PRI
750 " metric %ld",
751 inet_ntop(AF_INET, &rte->prefix, pbuf,
752 BUFSIZ),
753 netmask,
754 inet_ntop(AF_INET, &rte->nexthop, nbuf,
755 BUFSIZ),
756 ntohs(rte->family),
757 (route_tag_t)ntohs(rte->tag),
758 (u_long)ntohl(rte->metric));
759 } else {
760 zlog_debug(
761 " %s family %d tag %" ROUTE_TAG_PRI
762 " metric %ld",
763 inet_ntop(AF_INET, &rte->prefix, pbuf, BUFSIZ),
764 ntohs(rte->family),
765 (route_tag_t)ntohs(rte->tag),
766 (u_long)ntohl(rte->metric));
767 }
768 }
769 }
770
771 /* Check if the destination address is valid (unicast; not net 0
772 or 127) (RFC2453 Section 3.9.2 - Page 26). But we don't
773 check net 0 because we accept default route. */
774 static int rip_destination_check(struct in_addr addr)
775 {
776 u_int32_t destination;
777
778 /* Convert to host byte order. */
779 destination = ntohl(addr.s_addr);
780
781 if (IPV4_NET127(destination))
782 return 0;
783
784 /* Net 0 may match to the default route. */
785 if (IPV4_NET0(destination) && destination != 0)
786 return 0;
787
788 /* Unicast address must belong to class A, B, C. */
789 if (IN_CLASSA(destination))
790 return 1;
791 if (IN_CLASSB(destination))
792 return 1;
793 if (IN_CLASSC(destination))
794 return 1;
795
796 return 0;
797 }
798
799 /* RIP version 2 authentication. */
800 static int rip_auth_simple_password(struct rte *rte, struct sockaddr_in *from,
801 struct interface *ifp)
802 {
803 struct rip_interface *ri;
804 char *auth_str = (char *)&rte->prefix;
805 int i;
806
807 /* reject passwords with zeros in the middle of the string */
808 for (i = strlen(auth_str); i < 16; i++) {
809 if (auth_str[i] != '\0')
810 return 0;
811 }
812
813 if (IS_RIP_DEBUG_EVENT)
814 zlog_debug("RIPv2 simple password authentication from %s",
815 inet_ntoa(from->sin_addr));
816
817 ri = ifp->info;
818
819 if (ri->auth_type != RIP_AUTH_SIMPLE_PASSWORD
820 || rte->tag != htons(RIP_AUTH_SIMPLE_PASSWORD))
821 return 0;
822
823 /* Simple password authentication. */
824 if (ri->auth_str) {
825 if (strncmp(auth_str, ri->auth_str, 16) == 0)
826 return 1;
827 }
828 if (ri->key_chain) {
829 struct keychain *keychain;
830 struct key *key;
831
832 keychain = keychain_lookup(ri->key_chain);
833 if (keychain == NULL)
834 return 0;
835
836 key = key_match_for_accept(keychain, auth_str);
837 if (key)
838 return 1;
839 }
840 return 0;
841 }
842
843 /* RIP version 2 authentication with MD5. */
844 static int rip_auth_md5(struct rip_packet *packet, struct sockaddr_in *from,
845 int length, struct interface *ifp)
846 {
847 struct rip_interface *ri;
848 struct rip_md5_info *md5;
849 struct rip_md5_data *md5data;
850 struct keychain *keychain;
851 struct key *key;
852 MD5_CTX ctx;
853 u_char digest[RIP_AUTH_MD5_SIZE];
854 u_int16_t packet_len;
855 char auth_str[RIP_AUTH_MD5_SIZE];
856
857 if (IS_RIP_DEBUG_EVENT)
858 zlog_debug("RIPv2 MD5 authentication from %s",
859 inet_ntoa(from->sin_addr));
860
861 ri = ifp->info;
862 md5 = (struct rip_md5_info *)&packet->rte;
863
864 /* Check auth type. */
865 if (ri->auth_type != RIP_AUTH_MD5 || md5->type != htons(RIP_AUTH_MD5))
866 return 0;
867
868 /* If the authentication length is less than 16, then it must be wrong
869 * for
870 * any interpretation of rfc2082. Some implementations also interpret
871 * this as RIP_HEADER_SIZE+ RIP_AUTH_MD5_SIZE, aka
872 * RIP_AUTH_MD5_COMPAT_SIZE.
873 */
874 if (!((md5->auth_len == RIP_AUTH_MD5_SIZE)
875 || (md5->auth_len == RIP_AUTH_MD5_COMPAT_SIZE))) {
876 if (IS_RIP_DEBUG_EVENT)
877 zlog_debug(
878 "RIPv2 MD5 authentication, strange authentication "
879 "length field %d",
880 md5->auth_len);
881 return 0;
882 }
883
884 /* grab and verify check packet length */
885 packet_len = ntohs(md5->packet_len);
886
887 if (packet_len > (length - RIP_HEADER_SIZE - RIP_AUTH_MD5_SIZE)) {
888 if (IS_RIP_DEBUG_EVENT)
889 zlog_debug(
890 "RIPv2 MD5 authentication, packet length field %d "
891 "greater than received length %d!",
892 md5->packet_len, length);
893 return 0;
894 }
895
896 /* retrieve authentication data */
897 md5data = (struct rip_md5_data *)(((u_char *)packet) + packet_len);
898
899 memset(auth_str, 0, RIP_AUTH_MD5_SIZE);
900
901 if (ri->key_chain) {
902 keychain = keychain_lookup(ri->key_chain);
903 if (keychain == NULL)
904 return 0;
905
906 key = key_lookup_for_accept(keychain, md5->keyid);
907 if (key == NULL)
908 return 0;
909
910 strncpy(auth_str, key->string, RIP_AUTH_MD5_SIZE);
911 } else if (ri->auth_str)
912 strncpy(auth_str, ri->auth_str, RIP_AUTH_MD5_SIZE);
913
914 if (auth_str[0] == 0)
915 return 0;
916
917 /* MD5 digest authentication. */
918 memset(&ctx, 0, sizeof(ctx));
919 MD5Init(&ctx);
920 MD5Update(&ctx, packet, packet_len + RIP_HEADER_SIZE);
921 MD5Update(&ctx, auth_str, RIP_AUTH_MD5_SIZE);
922 MD5Final(digest, &ctx);
923
924 if (memcmp(md5data->digest, digest, RIP_AUTH_MD5_SIZE) == 0)
925 return packet_len;
926 else
927 return 0;
928 }
929
930 /* Pick correct auth string for sends, prepare auth_str buffer for use.
931 * (left justified and padded).
932 *
933 * presumes one of ri or key is valid, and that the auth strings they point
934 * to are nul terminated. If neither are present, auth_str will be fully
935 * zero padded.
936 *
937 */
938 static void rip_auth_prepare_str_send(struct rip_interface *ri, struct key *key,
939 char *auth_str, int len)
940 {
941 assert(ri || key);
942
943 memset(auth_str, 0, len);
944 if (key && key->string)
945 strncpy(auth_str, key->string, len);
946 else if (ri->auth_str)
947 strncpy(auth_str, ri->auth_str, len);
948
949 return;
950 }
951
952 /* Write RIPv2 simple password authentication information
953 *
954 * auth_str is presumed to be 2 bytes and correctly prepared
955 * (left justified and zero padded).
956 */
957 static void rip_auth_simple_write(struct stream *s, char *auth_str, int len)
958 {
959 assert(s && len == RIP_AUTH_SIMPLE_SIZE);
960
961 stream_putw(s, RIP_FAMILY_AUTH);
962 stream_putw(s, RIP_AUTH_SIMPLE_PASSWORD);
963 stream_put(s, auth_str, RIP_AUTH_SIMPLE_SIZE);
964
965 return;
966 }
967
968 /* write RIPv2 MD5 "authentication header"
969 * (uses the auth key data field)
970 *
971 * Digest offset field is set to 0.
972 *
973 * returns: offset of the digest offset field, which must be set when
974 * length to the auth-data MD5 digest is known.
975 */
976 static size_t rip_auth_md5_ah_write(struct stream *s, struct rip_interface *ri,
977 struct key *key)
978 {
979 size_t doff = 0;
980
981 assert(s && ri && ri->auth_type == RIP_AUTH_MD5);
982
983 /* MD5 authentication. */
984 stream_putw(s, RIP_FAMILY_AUTH);
985 stream_putw(s, RIP_AUTH_MD5);
986
987 /* MD5 AH digest offset field.
988 *
989 * Set to placeholder value here, to true value when RIP-2 Packet length
990 * is known. Actual value is set in .....().
991 */
992 doff = stream_get_endp(s);
993 stream_putw(s, 0);
994
995 /* Key ID. */
996 if (key)
997 stream_putc(s, key->index % 256);
998 else
999 stream_putc(s, 1);
1000
1001 /* Auth Data Len. Set 16 for MD5 authentication data. Older ripds
1002 * however expect RIP_HEADER_SIZE + RIP_AUTH_MD5_SIZE so we allow for
1003 * this
1004 * to be configurable.
1005 */
1006 stream_putc(s, ri->md5_auth_len);
1007
1008 /* Sequence Number (non-decreasing). */
1009 /* RFC2080: The value used in the sequence number is
1010 arbitrary, but two suggestions are the time of the
1011 message's creation or a simple message counter. */
1012 stream_putl(s, time(NULL));
1013
1014 /* Reserved field must be zero. */
1015 stream_putl(s, 0);
1016 stream_putl(s, 0);
1017
1018 return doff;
1019 }
1020
1021 /* If authentication is in used, write the appropriate header
1022 * returns stream offset to which length must later be written
1023 * or 0 if this is not required
1024 */
1025 static size_t rip_auth_header_write(struct stream *s, struct rip_interface *ri,
1026 struct key *key, char *auth_str, int len)
1027 {
1028 assert(ri->auth_type != RIP_NO_AUTH);
1029
1030 switch (ri->auth_type) {
1031 case RIP_AUTH_SIMPLE_PASSWORD:
1032 rip_auth_prepare_str_send(ri, key, auth_str, len);
1033 rip_auth_simple_write(s, auth_str, len);
1034 return 0;
1035 case RIP_AUTH_MD5:
1036 return rip_auth_md5_ah_write(s, ri, key);
1037 }
1038 assert(1);
1039 return 0;
1040 }
1041
1042 /* Write RIPv2 MD5 authentication data trailer */
1043 static void rip_auth_md5_set(struct stream *s, struct rip_interface *ri,
1044 size_t doff, char *auth_str, int authlen)
1045 {
1046 unsigned long len;
1047 MD5_CTX ctx;
1048 unsigned char digest[RIP_AUTH_MD5_SIZE];
1049
1050 /* Make it sure this interface is configured as MD5
1051 authentication. */
1052 assert((ri->auth_type == RIP_AUTH_MD5)
1053 && (authlen == RIP_AUTH_MD5_SIZE));
1054 assert(doff > 0);
1055
1056 /* Get packet length. */
1057 len = stream_get_endp(s);
1058
1059 /* Check packet length. */
1060 if (len < (RIP_HEADER_SIZE + RIP_RTE_SIZE)) {
1061 zlog_err(
1062 "rip_auth_md5_set(): packet length %ld is less than minimum length.",
1063 len);
1064 return;
1065 }
1066
1067 /* Set the digest offset length in the header */
1068 stream_putw_at(s, doff, len);
1069
1070 /* Set authentication data. */
1071 stream_putw(s, RIP_FAMILY_AUTH);
1072 stream_putw(s, RIP_AUTH_DATA);
1073
1074 /* Generate a digest for the RIP packet. */
1075 memset(&ctx, 0, sizeof(ctx));
1076 MD5Init(&ctx);
1077 MD5Update(&ctx, STREAM_DATA(s), stream_get_endp(s));
1078 MD5Update(&ctx, auth_str, RIP_AUTH_MD5_SIZE);
1079 MD5Final(digest, &ctx);
1080
1081 /* Copy the digest to the packet. */
1082 stream_write(s, digest, RIP_AUTH_MD5_SIZE);
1083 }
1084
1085 /* RIP routing information. */
1086 static void rip_response_process(struct rip_packet *packet, int size,
1087 struct sockaddr_in *from,
1088 struct connected *ifc)
1089 {
1090 caddr_t lim;
1091 struct rte *rte;
1092 struct prefix_ipv4 ifaddr;
1093 struct prefix_ipv4 ifaddrclass;
1094 int subnetted;
1095
1096 memset(&ifaddr, 0, sizeof(ifaddr));
1097 /* We don't know yet. */
1098 subnetted = -1;
1099
1100 /* The Response must be ignored if it is not from the RIP
1101 port. (RFC2453 - Sec. 3.9.2)*/
1102 if (from->sin_port != htons(RIP_PORT_DEFAULT)) {
1103 zlog_info("response doesn't come from RIP port: %d",
1104 from->sin_port);
1105 rip_peer_bad_packet(from);
1106 return;
1107 }
1108
1109 /* The datagram's IPv4 source address should be checked to see
1110 whether the datagram is from a valid neighbor; the source of the
1111 datagram must be on a directly connected network (RFC2453 - Sec.
1112 3.9.2) */
1113 if (if_lookup_address((void *)&from->sin_addr, AF_INET, VRF_DEFAULT)
1114 == NULL) {
1115 zlog_info(
1116 "This datagram doesn't came from a valid neighbor: %s",
1117 inet_ntoa(from->sin_addr));
1118 rip_peer_bad_packet(from);
1119 return;
1120 }
1121
1122 /* It is also worth checking to see whether the response is from one
1123 of the router's own addresses. */
1124
1125 ; /* Alredy done in rip_read () */
1126
1127 /* Update RIP peer. */
1128 rip_peer_update(from, packet->version);
1129
1130 /* Set RTE pointer. */
1131 rte = packet->rte;
1132
1133 for (lim = (caddr_t)packet + size; (caddr_t)rte < lim; rte++) {
1134 /* RIPv2 authentication check. */
1135 /* If the Address Family Identifier of the first (and only the
1136 first) entry in the message is 0xFFFF, then the remainder of
1137 the entry contains the authentication. */
1138 /* If the packet gets here it means authentication enabled */
1139 /* Check is done in rip_read(). So, just skipping it */
1140 if (packet->version == RIPv2 && rte == packet->rte
1141 && rte->family == htons(RIP_FAMILY_AUTH))
1142 continue;
1143
1144 if (rte->family != htons(AF_INET)) {
1145 /* Address family check. RIP only supports AF_INET. */
1146 zlog_info("Unsupported family %d from %s.",
1147 ntohs(rte->family),
1148 inet_ntoa(from->sin_addr));
1149 continue;
1150 }
1151
1152 /* - is the destination address valid (e.g., unicast; not net 0
1153 or 127) */
1154 if (!rip_destination_check(rte->prefix)) {
1155 zlog_info(
1156 "Network is net 0 or net 127 or it is not unicast network");
1157 rip_peer_bad_route(from);
1158 continue;
1159 }
1160
1161 /* Convert metric value to host byte order. */
1162 rte->metric = ntohl(rte->metric);
1163
1164 /* - is the metric valid (i.e., between 1 and 16, inclusive) */
1165 if (!(rte->metric >= 1 && rte->metric <= 16)) {
1166 zlog_info("Route's metric is not in the 1-16 range.");
1167 rip_peer_bad_route(from);
1168 continue;
1169 }
1170
1171 /* RIPv1 does not have nexthop value. */
1172 if (packet->version == RIPv1 && rte->nexthop.s_addr != 0) {
1173 zlog_info("RIPv1 packet with nexthop value %s",
1174 inet_ntoa(rte->nexthop));
1175 rip_peer_bad_route(from);
1176 continue;
1177 }
1178
1179 /* That is, if the provided information is ignored, a possibly
1180 sub-optimal, but absolutely valid, route may be taken. If
1181 the received Next Hop is not directly reachable, it should be
1182 treated as 0.0.0.0. */
1183 if (packet->version == RIPv2 && rte->nexthop.s_addr != 0) {
1184 u_int32_t addrval;
1185
1186 /* Multicast address check. */
1187 addrval = ntohl(rte->nexthop.s_addr);
1188 if (IN_CLASSD(addrval)) {
1189 zlog_info(
1190 "Nexthop %s is multicast address, skip this rte",
1191 inet_ntoa(rte->nexthop));
1192 continue;
1193 }
1194
1195 if (!if_lookup_address((void *)&rte->nexthop, AF_INET,
1196 VRF_DEFAULT)) {
1197 struct route_node *rn;
1198 struct rip_info *rinfo;
1199
1200 rn = route_node_match_ipv4(rip->table,
1201 &rte->nexthop);
1202
1203 if (rn) {
1204 rinfo = rn->info;
1205
1206 if (rinfo->type == ZEBRA_ROUTE_RIP
1207 && rinfo->sub_type
1208 == RIP_ROUTE_RTE) {
1209 if (IS_RIP_DEBUG_EVENT)
1210 zlog_debug(
1211 "Next hop %s is on RIP network. Set nexthop to the packet's originator",
1212 inet_ntoa(
1213 rte->nexthop));
1214 rte->nexthop = rinfo->from;
1215 } else {
1216 if (IS_RIP_DEBUG_EVENT)
1217 zlog_debug(
1218 "Next hop %s is not directly reachable. Treat it as 0.0.0.0",
1219 inet_ntoa(
1220 rte->nexthop));
1221 rte->nexthop.s_addr = 0;
1222 }
1223
1224 route_unlock_node(rn);
1225 } else {
1226 if (IS_RIP_DEBUG_EVENT)
1227 zlog_debug(
1228 "Next hop %s is not directly reachable. Treat it as 0.0.0.0",
1229 inet_ntoa(
1230 rte->nexthop));
1231 rte->nexthop.s_addr = 0;
1232 }
1233 }
1234 }
1235
1236 /* For RIPv1, there won't be a valid netmask.
1237
1238 This is a best guess at the masks. If everyone was using old
1239 Ciscos before the 'ip subnet zero' option, it would be almost
1240 right too :-)
1241
1242 Cisco summarize ripv1 advertisments to the classful boundary
1243 (/16 for class B's) except when the RIP packet does to inside
1244 the classful network in question. */
1245
1246 if ((packet->version == RIPv1 && rte->prefix.s_addr != 0)
1247 || (packet->version == RIPv2
1248 && (rte->prefix.s_addr != 0
1249 && rte->mask.s_addr == 0))) {
1250 u_int32_t destination;
1251
1252 if (subnetted == -1) {
1253 memcpy(&ifaddr, ifc->address,
1254 sizeof(struct prefix_ipv4));
1255 memcpy(&ifaddrclass, &ifaddr,
1256 sizeof(struct prefix_ipv4));
1257 apply_classful_mask_ipv4(&ifaddrclass);
1258 subnetted = 0;
1259 if (ifaddr.prefixlen > ifaddrclass.prefixlen)
1260 subnetted = 1;
1261 }
1262
1263 destination = ntohl(rte->prefix.s_addr);
1264
1265 if (IN_CLASSA(destination))
1266 masklen2ip(8, &rte->mask);
1267 else if (IN_CLASSB(destination))
1268 masklen2ip(16, &rte->mask);
1269 else if (IN_CLASSC(destination))
1270 masklen2ip(24, &rte->mask);
1271
1272 if (subnetted == 1)
1273 masklen2ip(ifaddrclass.prefixlen,
1274 (struct in_addr *)&destination);
1275 if ((subnetted == 1)
1276 && ((rte->prefix.s_addr & destination)
1277 == ifaddrclass.prefix.s_addr)) {
1278 masklen2ip(ifaddr.prefixlen, &rte->mask);
1279 if ((rte->prefix.s_addr & rte->mask.s_addr)
1280 != rte->prefix.s_addr)
1281 masklen2ip(32, &rte->mask);
1282 if (IS_RIP_DEBUG_EVENT)
1283 zlog_debug("Subnetted route %s",
1284 inet_ntoa(rte->prefix));
1285 } else {
1286 if ((rte->prefix.s_addr & rte->mask.s_addr)
1287 != rte->prefix.s_addr)
1288 continue;
1289 }
1290
1291 if (IS_RIP_DEBUG_EVENT) {
1292 zlog_debug("Resultant route %s",
1293 inet_ntoa(rte->prefix));
1294 zlog_debug("Resultant mask %s",
1295 inet_ntoa(rte->mask));
1296 }
1297 }
1298
1299 /* In case of RIPv2, if prefix in RTE is not netmask applied one
1300 ignore the entry. */
1301 if ((packet->version == RIPv2) && (rte->mask.s_addr != 0)
1302 && ((rte->prefix.s_addr & rte->mask.s_addr)
1303 != rte->prefix.s_addr)) {
1304 zlog_warn(
1305 "RIPv2 address %s is not mask /%d applied one",
1306 inet_ntoa(rte->prefix), ip_masklen(rte->mask));
1307 rip_peer_bad_route(from);
1308 continue;
1309 }
1310
1311 /* Default route's netmask is ignored. */
1312 if (packet->version == RIPv2 && (rte->prefix.s_addr == 0)
1313 && (rte->mask.s_addr != 0)) {
1314 if (IS_RIP_DEBUG_EVENT)
1315 zlog_debug(
1316 "Default route with non-zero netmask. Set zero to netmask");
1317 rte->mask.s_addr = 0;
1318 }
1319
1320 /* Routing table updates. */
1321 rip_rte_process(rte, from, ifc->ifp);
1322 }
1323 }
1324
1325 /* Make socket for RIP protocol. */
1326 static int rip_create_socket(void)
1327 {
1328 int ret;
1329 int sock;
1330 struct sockaddr_in addr;
1331
1332 memset(&addr, 0, sizeof(struct sockaddr_in));
1333 addr.sin_family = AF_INET;
1334 addr.sin_addr.s_addr = INADDR_ANY;
1335 #ifdef HAVE_STRUCT_SOCKADDR_IN_SIN_LEN
1336 addr.sin_len = sizeof(struct sockaddr_in);
1337 #endif /* HAVE_STRUCT_SOCKADDR_IN_SIN_LEN */
1338 /* sending port must always be the RIP port */
1339 addr.sin_port = htons(RIP_PORT_DEFAULT);
1340
1341 /* Make datagram socket. */
1342 sock = socket(AF_INET, SOCK_DGRAM, IPPROTO_UDP);
1343 if (sock < 0) {
1344 zlog_err("Cannot create UDP socket: %s", safe_strerror(errno));
1345 exit(1);
1346 }
1347
1348 sockopt_broadcast(sock);
1349 sockopt_reuseaddr(sock);
1350 sockopt_reuseport(sock);
1351 setsockopt_ipv4_multicast_loop(sock, 0);
1352 #ifdef RIP_RECVMSG
1353 setsockopt_pktinfo(sock);
1354 #endif /* RIP_RECVMSG */
1355 #ifdef IPTOS_PREC_INTERNETCONTROL
1356 setsockopt_ipv4_tos(sock, IPTOS_PREC_INTERNETCONTROL);
1357 #endif
1358
1359 if (ripd_privs.change(ZPRIVS_RAISE))
1360 zlog_err("rip_create_socket: could not raise privs");
1361 setsockopt_so_recvbuf(sock, RIP_UDP_RCV_BUF);
1362 if ((ret = bind(sock, (struct sockaddr *)&addr, sizeof(addr))) < 0)
1363
1364 {
1365 int save_errno = errno;
1366 if (ripd_privs.change(ZPRIVS_LOWER))
1367 zlog_err("rip_create_socket: could not lower privs");
1368
1369 zlog_err("%s: Can't bind socket %d to %s port %d: %s", __func__,
1370 sock, inet_ntoa(addr.sin_addr),
1371 (int)ntohs(addr.sin_port), safe_strerror(save_errno));
1372
1373 close(sock);
1374 return ret;
1375 }
1376
1377 if (ripd_privs.change(ZPRIVS_LOWER))
1378 zlog_err("rip_create_socket: could not lower privs");
1379
1380 return sock;
1381 }
1382
1383 /* RIP packet send to destination address, on interface denoted by
1384 * by connected argument. NULL to argument denotes destination should be
1385 * should be RIP multicast group
1386 */
1387 static int rip_send_packet(u_char *buf, int size, struct sockaddr_in *to,
1388 struct connected *ifc)
1389 {
1390 int ret;
1391 struct sockaddr_in sin;
1392
1393 assert(ifc != NULL);
1394
1395 if (IS_RIP_DEBUG_PACKET) {
1396 #define ADDRESS_SIZE 20
1397 char dst[ADDRESS_SIZE];
1398 dst[ADDRESS_SIZE - 1] = '\0';
1399
1400 if (to) {
1401 strncpy(dst, inet_ntoa(to->sin_addr), ADDRESS_SIZE - 1);
1402 } else {
1403 sin.sin_addr.s_addr = htonl(INADDR_RIP_GROUP);
1404 strncpy(dst, inet_ntoa(sin.sin_addr), ADDRESS_SIZE - 1);
1405 }
1406 #undef ADDRESS_SIZE
1407 zlog_debug("rip_send_packet %s > %s (%s)",
1408 inet_ntoa(ifc->address->u.prefix4), dst,
1409 ifc->ifp->name);
1410 }
1411
1412 if (CHECK_FLAG(ifc->flags, ZEBRA_IFA_SECONDARY)) {
1413 /*
1414 * ZEBRA_IFA_SECONDARY is set on linux when an interface is
1415 * configured
1416 * with multiple addresses on the same subnet: the first address
1417 * on the subnet is configured "primary", and all subsequent
1418 * addresses
1419 * on that subnet are treated as "secondary" addresses.
1420 * In order to avoid routing-table bloat on other rip listeners,
1421 * we do not send out RIP packets with ZEBRA_IFA_SECONDARY
1422 * source addrs.
1423 * XXX Since Linux is the only system for which the
1424 * ZEBRA_IFA_SECONDARY
1425 * flag is set, we would end up sending a packet for a
1426 * "secondary"
1427 * source address on non-linux systems.
1428 */
1429 if (IS_RIP_DEBUG_PACKET)
1430 zlog_debug("duplicate dropped");
1431 return 0;
1432 }
1433
1434 /* Make destination address. */
1435 memset(&sin, 0, sizeof(struct sockaddr_in));
1436 sin.sin_family = AF_INET;
1437 #ifdef HAVE_STRUCT_SOCKADDR_IN_SIN_LEN
1438 sin.sin_len = sizeof(struct sockaddr_in);
1439 #endif /* HAVE_STRUCT_SOCKADDR_IN_SIN_LEN */
1440
1441 /* When destination is specified, use it's port and address. */
1442 if (to) {
1443 sin.sin_port = to->sin_port;
1444 sin.sin_addr = to->sin_addr;
1445 } else {
1446 sin.sin_port = htons(RIP_PORT_DEFAULT);
1447 sin.sin_addr.s_addr = htonl(INADDR_RIP_GROUP);
1448
1449 rip_interface_multicast_set(rip->sock, ifc);
1450 }
1451
1452 ret = sendto(rip->sock, buf, size, 0, (struct sockaddr *)&sin,
1453 sizeof(struct sockaddr_in));
1454
1455 if (IS_RIP_DEBUG_EVENT)
1456 zlog_debug("SEND to %s.%d", inet_ntoa(sin.sin_addr),
1457 ntohs(sin.sin_port));
1458
1459 if (ret < 0)
1460 zlog_warn("can't send packet : %s", safe_strerror(errno));
1461
1462 return ret;
1463 }
1464
1465 /* Add redistributed route to RIP table. */
1466 void rip_redistribute_add(int type, int sub_type, struct prefix_ipv4 *p,
1467 ifindex_t ifindex, struct in_addr *nexthop,
1468 unsigned int metric, unsigned char distance,
1469 route_tag_t tag)
1470 {
1471 int ret;
1472 struct route_node *rp = NULL;
1473 struct rip_info *rinfo = NULL, newinfo;
1474 struct list *list = NULL;
1475
1476 /* Redistribute route */
1477 ret = rip_destination_check(p->prefix);
1478 if (!ret)
1479 return;
1480
1481 rp = route_node_get(rip->table, (struct prefix *)p);
1482
1483 memset(&newinfo, 0, sizeof(struct rip_info));
1484 newinfo.type = type;
1485 newinfo.sub_type = sub_type;
1486 newinfo.ifindex = ifindex;
1487 newinfo.metric = 1;
1488 newinfo.external_metric = metric;
1489 newinfo.distance = distance;
1490 if (tag <= UINT16_MAX) /* RIP only supports 16 bit tags */
1491 newinfo.tag = tag;
1492 newinfo.rp = rp;
1493 if (nexthop)
1494 newinfo.nexthop = *nexthop;
1495
1496 if ((list = rp->info) != NULL && listcount(list) != 0) {
1497 rinfo = listgetdata(listhead(list));
1498
1499 if (rinfo->type == ZEBRA_ROUTE_CONNECT
1500 && rinfo->sub_type == RIP_ROUTE_INTERFACE
1501 && rinfo->metric != RIP_METRIC_INFINITY) {
1502 route_unlock_node(rp);
1503 return;
1504 }
1505
1506 /* Manually configured RIP route check. */
1507 if (rinfo->type == ZEBRA_ROUTE_RIP
1508 && ((rinfo->sub_type == RIP_ROUTE_STATIC)
1509 || (rinfo->sub_type == RIP_ROUTE_DEFAULT))) {
1510 if (type != ZEBRA_ROUTE_RIP
1511 || ((sub_type != RIP_ROUTE_STATIC)
1512 && (sub_type != RIP_ROUTE_DEFAULT))) {
1513 route_unlock_node(rp);
1514 return;
1515 }
1516 }
1517
1518 rinfo = rip_ecmp_replace(&newinfo);
1519 route_unlock_node(rp);
1520 } else
1521 rinfo = rip_ecmp_add(&newinfo);
1522
1523 if (IS_RIP_DEBUG_EVENT) {
1524 if (!nexthop)
1525 zlog_debug(
1526 "Redistribute new prefix %s/%d on the interface %s",
1527 inet_ntoa(p->prefix), p->prefixlen,
1528 ifindex2ifname(ifindex, VRF_DEFAULT));
1529 else
1530 zlog_debug(
1531 "Redistribute new prefix %s/%d with nexthop %s on the interface %s",
1532 inet_ntoa(p->prefix), p->prefixlen,
1533 inet_ntoa(rinfo->nexthop),
1534 ifindex2ifname(ifindex, VRF_DEFAULT));
1535 }
1536
1537 rip_event(RIP_TRIGGERED_UPDATE, 0);
1538 }
1539
1540 /* Delete redistributed route from RIP table. */
1541 void rip_redistribute_delete(int type, int sub_type, struct prefix_ipv4 *p,
1542 ifindex_t ifindex)
1543 {
1544 int ret;
1545 struct route_node *rp;
1546 struct rip_info *rinfo;
1547
1548 ret = rip_destination_check(p->prefix);
1549 if (!ret)
1550 return;
1551
1552 rp = route_node_lookup(rip->table, (struct prefix *)p);
1553 if (rp) {
1554 struct list *list = rp->info;
1555
1556 if (list != NULL && listcount(list) != 0) {
1557 rinfo = listgetdata(listhead(list));
1558 if (rinfo != NULL && rinfo->type == type
1559 && rinfo->sub_type == sub_type
1560 && rinfo->ifindex == ifindex) {
1561 /* Perform poisoned reverse. */
1562 rinfo->metric = RIP_METRIC_INFINITY;
1563 RIP_TIMER_ON(rinfo->t_garbage_collect,
1564 rip_garbage_collect,
1565 rip->garbage_time);
1566 RIP_TIMER_OFF(rinfo->t_timeout);
1567 rinfo->flags |= RIP_RTF_CHANGED;
1568
1569 if (IS_RIP_DEBUG_EVENT)
1570 zlog_debug(
1571 "Poisone %s/%d on the interface %s with an "
1572 "infinity metric [delete]",
1573 inet_ntoa(p->prefix),
1574 p->prefixlen,
1575 ifindex2ifname(ifindex,
1576 VRF_DEFAULT));
1577
1578 rip_event(RIP_TRIGGERED_UPDATE, 0);
1579 }
1580 }
1581 route_unlock_node(rp);
1582 }
1583 }
1584
1585 /* Response to request called from rip_read ().*/
1586 static void rip_request_process(struct rip_packet *packet, int size,
1587 struct sockaddr_in *from, struct connected *ifc)
1588 {
1589 caddr_t lim;
1590 struct rte *rte;
1591 struct prefix_ipv4 p;
1592 struct route_node *rp;
1593 struct rip_info *rinfo;
1594 struct rip_interface *ri;
1595
1596 /* Does not reponse to the requests on the loopback interfaces */
1597 if (if_is_loopback(ifc->ifp))
1598 return;
1599
1600 /* Check RIP process is enabled on this interface. */
1601 ri = ifc->ifp->info;
1602 if (!ri->running)
1603 return;
1604
1605 /* When passive interface is specified, suppress responses */
1606 if (ri->passive)
1607 return;
1608
1609 /* RIP peer update. */
1610 rip_peer_update(from, packet->version);
1611
1612 lim = ((caddr_t)packet) + size;
1613 rte = packet->rte;
1614
1615 /* The Request is processed entry by entry. If there are no
1616 entries, no response is given. */
1617 if (lim == (caddr_t)rte)
1618 return;
1619
1620 /* There is one special case. If there is exactly one entry in the
1621 request, and it has an address family identifier of zero and a
1622 metric of infinity (i.e., 16), then this is a request to send the
1623 entire routing table. */
1624 if (lim == ((caddr_t)(rte + 1)) && ntohs(rte->family) == 0
1625 && ntohl(rte->metric) == RIP_METRIC_INFINITY) {
1626 /* All route with split horizon */
1627 rip_output_process(ifc, from, rip_all_route, packet->version);
1628 } else {
1629 if (ntohs(rte->family) != AF_INET)
1630 return;
1631
1632 /* Examine the list of RTEs in the Request one by one. For each
1633 entry, look up the destination in the router's routing
1634 database and, if there is a route, put that route's metric in
1635 the metric field of the RTE. If there is no explicit route
1636 to the specified destination, put infinity in the metric
1637 field. Once all the entries have been filled in, change the
1638 command from Request to Response and send the datagram back
1639 to the requestor. */
1640 p.family = AF_INET;
1641
1642 for (; ((caddr_t)rte) < lim; rte++) {
1643 p.prefix = rte->prefix;
1644 p.prefixlen = ip_masklen(rte->mask);
1645 apply_mask_ipv4(&p);
1646
1647 rp = route_node_lookup(rip->table, (struct prefix *)&p);
1648 if (rp) {
1649 rinfo = listgetdata(
1650 listhead((struct list *)rp->info));
1651 rte->metric = htonl(rinfo->metric);
1652 route_unlock_node(rp);
1653 } else
1654 rte->metric = htonl(RIP_METRIC_INFINITY);
1655 }
1656 packet->command = RIP_RESPONSE;
1657
1658 rip_send_packet((u_char *)packet, size, from, ifc);
1659 }
1660 rip_global_queries++;
1661 }
1662
1663 #if RIP_RECVMSG
1664 /* Set IPv6 packet info to the socket. */
1665 static int setsockopt_pktinfo(int sock)
1666 {
1667 int ret;
1668 int val = 1;
1669
1670 ret = setsockopt(sock, IPPROTO_IP, IP_PKTINFO, &val, sizeof(val));
1671 if (ret < 0)
1672 zlog_warn("Can't setsockopt IP_PKTINFO : %s",
1673 safe_strerror(errno));
1674 return ret;
1675 }
1676
1677 /* Read RIP packet by recvmsg function. */
1678 int rip_recvmsg(int sock, u_char *buf, int size, struct sockaddr_in *from,
1679 ifindex_t *ifindex)
1680 {
1681 int ret;
1682 struct msghdr msg;
1683 struct iovec iov;
1684 struct cmsghdr *ptr;
1685 char adata[1024];
1686
1687 memset(&msg, 0, sizeof(msg));
1688 msg.msg_name = (void *)from;
1689 msg.msg_namelen = sizeof(struct sockaddr_in);
1690 msg.msg_iov = &iov;
1691 msg.msg_iovlen = 1;
1692 msg.msg_control = (void *)adata;
1693 msg.msg_controllen = sizeof adata;
1694 iov.iov_base = buf;
1695 iov.iov_len = size;
1696
1697 ret = recvmsg(sock, &msg, 0);
1698 if (ret < 0)
1699 return ret;
1700
1701 for (ptr = ZCMSG_FIRSTHDR(&msg); ptr != NULL;
1702 ptr = CMSG_NXTHDR(&msg, ptr))
1703 if (ptr->cmsg_level == IPPROTO_IP
1704 && ptr->cmsg_type == IP_PKTINFO) {
1705 struct in_pktinfo *pktinfo;
1706 int i;
1707
1708 pktinfo = (struct in_pktinfo *)CMSG_DATA(ptr);
1709 i = pktinfo->ipi_ifindex;
1710 }
1711 return ret;
1712 }
1713
1714 /* RIP packet read function. */
1715 int rip_read_new(struct thread *t)
1716 {
1717 int ret;
1718 int sock;
1719 char buf[RIP_PACKET_MAXSIZ];
1720 struct sockaddr_in from;
1721 ifindex_t ifindex;
1722
1723 /* Fetch socket then register myself. */
1724 sock = THREAD_FD(t);
1725 rip_event(RIP_READ, sock);
1726
1727 /* Read RIP packet. */
1728 ret = rip_recvmsg(sock, buf, RIP_PACKET_MAXSIZ, &from, (int *)&ifindex);
1729 if (ret < 0) {
1730 zlog_warn("Can't read RIP packet: %s", safe_strerror(errno));
1731 return ret;
1732 }
1733
1734 return ret;
1735 }
1736 #endif /* RIP_RECVMSG */
1737
1738 /* First entry point of RIP packet. */
1739 static int rip_read(struct thread *t)
1740 {
1741 int sock;
1742 int ret;
1743 int rtenum;
1744 union rip_buf rip_buf;
1745 struct rip_packet *packet;
1746 struct sockaddr_in from;
1747 int len;
1748 int vrecv;
1749 socklen_t fromlen;
1750 struct interface *ifp = NULL;
1751 struct connected *ifc;
1752 struct rip_interface *ri;
1753 struct prefix p;
1754
1755 /* Fetch socket then register myself. */
1756 sock = THREAD_FD(t);
1757 rip->t_read = NULL;
1758
1759 /* Add myself to tne next event */
1760 rip_event(RIP_READ, sock);
1761
1762 /* RIPd manages only IPv4. */
1763 memset(&from, 0, sizeof(struct sockaddr_in));
1764 fromlen = sizeof(struct sockaddr_in);
1765
1766 len = recvfrom(sock, (char *)&rip_buf.buf, sizeof(rip_buf.buf), 0,
1767 (struct sockaddr *)&from, &fromlen);
1768 if (len < 0) {
1769 zlog_info("recvfrom failed: %s", safe_strerror(errno));
1770 return len;
1771 }
1772
1773 /* Check is this packet comming from myself? */
1774 if (if_check_address(from.sin_addr)) {
1775 if (IS_RIP_DEBUG_PACKET)
1776 zlog_debug("ignore packet comes from myself");
1777 return -1;
1778 }
1779
1780 /* Which interface is this packet comes from. */
1781 ifc = if_lookup_address((void *)&from.sin_addr, AF_INET, VRF_DEFAULT);
1782 if (ifc)
1783 ifp = ifc->ifp;
1784
1785 /* RIP packet received */
1786 if (IS_RIP_DEBUG_EVENT)
1787 zlog_debug("RECV packet from %s port %d on %s",
1788 inet_ntoa(from.sin_addr), ntohs(from.sin_port),
1789 ifp ? ifp->name : "unknown");
1790
1791 /* If this packet come from unknown interface, ignore it. */
1792 if (ifp == NULL) {
1793 zlog_info(
1794 "rip_read: cannot find interface for packet from %s port %d",
1795 inet_ntoa(from.sin_addr), ntohs(from.sin_port));
1796 return -1;
1797 }
1798
1799 p.family = AF_INET;
1800 p.u.prefix4 = from.sin_addr;
1801 p.prefixlen = IPV4_MAX_BITLEN;
1802
1803 ifc = connected_lookup_prefix(ifp, &p);
1804
1805 if (ifc == NULL) {
1806 zlog_info(
1807 "rip_read: cannot find connected address for packet from %s "
1808 "port %d on interface %s",
1809 inet_ntoa(from.sin_addr), ntohs(from.sin_port),
1810 ifp->name);
1811 return -1;
1812 }
1813
1814 /* Packet length check. */
1815 if (len < RIP_PACKET_MINSIZ) {
1816 zlog_warn("packet size %d is smaller than minimum size %d", len,
1817 RIP_PACKET_MINSIZ);
1818 rip_peer_bad_packet(&from);
1819 return len;
1820 }
1821 if (len > RIP_PACKET_MAXSIZ) {
1822 zlog_warn("packet size %d is larger than max size %d", len,
1823 RIP_PACKET_MAXSIZ);
1824 rip_peer_bad_packet(&from);
1825 return len;
1826 }
1827
1828 /* Packet alignment check. */
1829 if ((len - RIP_PACKET_MINSIZ) % 20) {
1830 zlog_warn("packet size %d is wrong for RIP packet alignment",
1831 len);
1832 rip_peer_bad_packet(&from);
1833 return len;
1834 }
1835
1836 /* Set RTE number. */
1837 rtenum = ((len - RIP_PACKET_MINSIZ) / 20);
1838
1839 /* For easy to handle. */
1840 packet = &rip_buf.rip_packet;
1841
1842 /* RIP version check. */
1843 if (packet->version == 0) {
1844 zlog_info("version 0 with command %d received.",
1845 packet->command);
1846 rip_peer_bad_packet(&from);
1847 return -1;
1848 }
1849
1850 /* Dump RIP packet. */
1851 if (IS_RIP_DEBUG_RECV)
1852 rip_packet_dump(packet, len, "RECV");
1853
1854 /* RIP version adjust. This code should rethink now. RFC1058 says
1855 that "Version 1 implementations are to ignore this extra data and
1856 process only the fields specified in this document.". So RIPv3
1857 packet should be treated as RIPv1 ignoring must be zero field. */
1858 if (packet->version > RIPv2)
1859 packet->version = RIPv2;
1860
1861 /* Is RIP running or is this RIP neighbor ?*/
1862 ri = ifp->info;
1863 if (!ri->running && !rip_neighbor_lookup(&from)) {
1864 if (IS_RIP_DEBUG_EVENT)
1865 zlog_debug("RIP is not enabled on interface %s.",
1866 ifp->name);
1867 rip_peer_bad_packet(&from);
1868 return -1;
1869 }
1870
1871 /* RIP Version check. RFC2453, 4.6 and 5.1 */
1872 vrecv = ((ri->ri_receive == RI_RIP_UNSPEC) ? rip->version_recv
1873 : ri->ri_receive);
1874 if (vrecv == RI_RIP_VERSION_NONE
1875 || ((packet->version == RIPv1) && !(vrecv & RIPv1))
1876 || ((packet->version == RIPv2) && !(vrecv & RIPv2))) {
1877 if (IS_RIP_DEBUG_PACKET)
1878 zlog_debug(
1879 " packet's v%d doesn't fit to if version spec",
1880 packet->version);
1881 rip_peer_bad_packet(&from);
1882 return -1;
1883 }
1884
1885 /* RFC2453 5.2 If the router is not configured to authenticate RIP-2
1886 messages, then RIP-1 and unauthenticated RIP-2 messages will be
1887 accepted; authenticated RIP-2 messages shall be discarded. */
1888 if ((ri->auth_type == RIP_NO_AUTH) && rtenum
1889 && (packet->version == RIPv2)
1890 && (packet->rte->family == htons(RIP_FAMILY_AUTH))) {
1891 if (IS_RIP_DEBUG_EVENT)
1892 zlog_debug(
1893 "packet RIPv%d is dropped because authentication disabled",
1894 packet->version);
1895 rip_peer_bad_packet(&from);
1896 return -1;
1897 }
1898
1899 /* RFC:
1900 If the router is configured to authenticate RIP-2 messages, then
1901 RIP-1 messages and RIP-2 messages which pass authentication
1902 testing shall be accepted; unauthenticated and failed
1903 authentication RIP-2 messages shall be discarded. For maximum
1904 security, RIP-1 messages should be ignored when authentication is
1905 in use (see section 4.1); otherwise, the routing information from
1906 authenticated messages will be propagated by RIP-1 routers in an
1907 unauthenticated manner.
1908 */
1909 /* We make an exception for RIPv1 REQUEST packets, to which we'll
1910 * always reply regardless of authentication settings, because:
1911 *
1912 * - if there other authorised routers on-link, the REQUESTor can
1913 * passively obtain the routing updates anyway
1914 * - if there are no other authorised routers on-link, RIP can
1915 * easily be disabled for the link to prevent giving out information
1916 * on state of this routers RIP routing table..
1917 *
1918 * I.e. if RIPv1 has any place anymore these days, it's as a very
1919 * simple way to distribute routing information (e.g. to embedded
1920 * hosts / appliances) and the ability to give out RIPv1
1921 * routing-information freely, while still requiring RIPv2
1922 * authentication for any RESPONSEs might be vaguely useful.
1923 */
1924 if (ri->auth_type != RIP_NO_AUTH && packet->version == RIPv1) {
1925 /* Discard RIPv1 messages other than REQUESTs */
1926 if (packet->command != RIP_REQUEST) {
1927 if (IS_RIP_DEBUG_PACKET)
1928 zlog_debug(
1929 "RIPv1"
1930 " dropped because authentication enabled");
1931 rip_peer_bad_packet(&from);
1932 return -1;
1933 }
1934 } else if (ri->auth_type != RIP_NO_AUTH) {
1935 const char *auth_desc;
1936
1937 if (rtenum == 0) {
1938 /* There definitely is no authentication in the packet.
1939 */
1940 if (IS_RIP_DEBUG_PACKET)
1941 zlog_debug(
1942 "RIPv2 authentication failed: no auth RTE in packet");
1943 rip_peer_bad_packet(&from);
1944 return -1;
1945 }
1946
1947 /* First RTE must be an Authentication Family RTE */
1948 if (packet->rte->family != htons(RIP_FAMILY_AUTH)) {
1949 if (IS_RIP_DEBUG_PACKET)
1950 zlog_debug(
1951 "RIPv2"
1952 " dropped because authentication enabled");
1953 rip_peer_bad_packet(&from);
1954 return -1;
1955 }
1956
1957 /* Check RIPv2 authentication. */
1958 switch (ntohs(packet->rte->tag)) {
1959 case RIP_AUTH_SIMPLE_PASSWORD:
1960 auth_desc = "simple";
1961 ret = rip_auth_simple_password(packet->rte, &from, ifp);
1962 break;
1963
1964 case RIP_AUTH_MD5:
1965 auth_desc = "MD5";
1966 ret = rip_auth_md5(packet, &from, len, ifp);
1967 /* Reset RIP packet length to trim MD5 data. */
1968 len = ret;
1969 break;
1970
1971 default:
1972 ret = 0;
1973 auth_desc = "unknown type";
1974 if (IS_RIP_DEBUG_PACKET)
1975 zlog_debug(
1976 "RIPv2 Unknown authentication type %d",
1977 ntohs(packet->rte->tag));
1978 }
1979
1980 if (ret) {
1981 if (IS_RIP_DEBUG_PACKET)
1982 zlog_debug("RIPv2 %s authentication success",
1983 auth_desc);
1984 } else {
1985 if (IS_RIP_DEBUG_PACKET)
1986 zlog_debug("RIPv2 %s authentication failure",
1987 auth_desc);
1988 rip_peer_bad_packet(&from);
1989 return -1;
1990 }
1991 }
1992
1993 /* Process each command. */
1994 switch (packet->command) {
1995 case RIP_RESPONSE:
1996 rip_response_process(packet, len, &from, ifc);
1997 break;
1998 case RIP_REQUEST:
1999 case RIP_POLL:
2000 rip_request_process(packet, len, &from, ifc);
2001 break;
2002 case RIP_TRACEON:
2003 case RIP_TRACEOFF:
2004 zlog_info(
2005 "Obsolete command %s received, please sent it to routed",
2006 lookup_msg(rip_msg, packet->command, NULL));
2007 rip_peer_bad_packet(&from);
2008 break;
2009 case RIP_POLL_ENTRY:
2010 zlog_info("Obsolete command %s received",
2011 lookup_msg(rip_msg, packet->command, NULL));
2012 rip_peer_bad_packet(&from);
2013 break;
2014 default:
2015 zlog_info("Unknown RIP command %d received", packet->command);
2016 rip_peer_bad_packet(&from);
2017 break;
2018 }
2019
2020 return len;
2021 }
2022
2023 /* Write routing table entry to the stream and return next index of
2024 the routing table entry in the stream. */
2025 static int rip_write_rte(int num, struct stream *s, struct prefix_ipv4 *p,
2026 u_char version, struct rip_info *rinfo)
2027 {
2028 struct in_addr mask;
2029
2030 /* Write routing table entry. */
2031 if (version == RIPv1) {
2032 stream_putw(s, AF_INET);
2033 stream_putw(s, 0);
2034 stream_put_ipv4(s, p->prefix.s_addr);
2035 stream_put_ipv4(s, 0);
2036 stream_put_ipv4(s, 0);
2037 stream_putl(s, rinfo->metric_out);
2038 } else {
2039 masklen2ip(p->prefixlen, &mask);
2040
2041 stream_putw(s, AF_INET);
2042 stream_putw(s, rinfo->tag_out);
2043 stream_put_ipv4(s, p->prefix.s_addr);
2044 stream_put_ipv4(s, mask.s_addr);
2045 stream_put_ipv4(s, rinfo->nexthop_out.s_addr);
2046 stream_putl(s, rinfo->metric_out);
2047 }
2048
2049 return ++num;
2050 }
2051
2052 /* Send update to the ifp or spcified neighbor. */
2053 void rip_output_process(struct connected *ifc, struct sockaddr_in *to,
2054 int route_type, u_char version)
2055 {
2056 int ret;
2057 struct stream *s;
2058 struct route_node *rp;
2059 struct rip_info *rinfo;
2060 struct rip_interface *ri;
2061 struct prefix_ipv4 *p;
2062 struct prefix_ipv4 classfull;
2063 struct prefix_ipv4 ifaddrclass;
2064 struct key *key = NULL;
2065 /* this might need to made dynamic if RIP ever supported auth methods
2066 with larger key string sizes */
2067 char auth_str[RIP_AUTH_SIMPLE_SIZE];
2068 size_t doff = 0; /* offset of digest offset field */
2069 int num = 0;
2070 int rtemax;
2071 int subnetted = 0;
2072 struct list *list = NULL;
2073 struct listnode *listnode = NULL;
2074
2075 /* Logging output event. */
2076 if (IS_RIP_DEBUG_EVENT) {
2077 if (to)
2078 zlog_debug("update routes to neighbor %s",
2079 inet_ntoa(to->sin_addr));
2080 else
2081 zlog_debug("update routes on interface %s ifindex %d",
2082 ifc->ifp->name, ifc->ifp->ifindex);
2083 }
2084
2085 /* Set output stream. */
2086 s = rip->obuf;
2087
2088 /* Reset stream and RTE counter. */
2089 stream_reset(s);
2090 rtemax = RIP_MAX_RTE;
2091
2092 /* Get RIP interface. */
2093 ri = ifc->ifp->info;
2094
2095 /* If output interface is in simple password authentication mode, we
2096 need space for authentication data. */
2097 if (ri->auth_type == RIP_AUTH_SIMPLE_PASSWORD)
2098 rtemax -= 1;
2099
2100 /* If output interface is in MD5 authentication mode, we need space
2101 for authentication header and data. */
2102 if (ri->auth_type == RIP_AUTH_MD5)
2103 rtemax -= 2;
2104
2105 /* If output interface is in simple password authentication mode
2106 and string or keychain is specified we need space for auth. data */
2107 if (ri->auth_type != RIP_NO_AUTH) {
2108 if (ri->key_chain) {
2109 struct keychain *keychain;
2110
2111 keychain = keychain_lookup(ri->key_chain);
2112 if (keychain)
2113 key = key_lookup_for_send(keychain);
2114 }
2115 /* to be passed to auth functions later */
2116 rip_auth_prepare_str_send(ri, key, auth_str,
2117 RIP_AUTH_SIMPLE_SIZE);
2118 }
2119
2120 if (version == RIPv1) {
2121 memcpy(&ifaddrclass, ifc->address, sizeof(struct prefix_ipv4));
2122 apply_classful_mask_ipv4(&ifaddrclass);
2123 subnetted = 0;
2124 if (ifc->address->prefixlen > ifaddrclass.prefixlen)
2125 subnetted = 1;
2126 }
2127
2128 for (rp = route_top(rip->table); rp; rp = route_next(rp))
2129 if ((list = rp->info) != NULL && listcount(list) != 0) {
2130 rinfo = listgetdata(listhead(list));
2131 /* For RIPv1, if we are subnetted, output subnets in our
2132 * network */
2133 /* that have the same mask as the output "interface".
2134 * For other */
2135 /* networks, only the classfull version is output. */
2136
2137 if (version == RIPv1) {
2138 p = (struct prefix_ipv4 *)&rp->p;
2139
2140 if (IS_RIP_DEBUG_PACKET)
2141 zlog_debug(
2142 "RIPv1 mask check, %s/%d considered for output",
2143 inet_ntoa(rp->p.u.prefix4),
2144 rp->p.prefixlen);
2145
2146 if (subnetted
2147 && prefix_match(
2148 (struct prefix *)&ifaddrclass,
2149 &rp->p)) {
2150 if ((ifc->address->prefixlen
2151 != rp->p.prefixlen)
2152 && (rp->p.prefixlen != 32))
2153 continue;
2154 } else {
2155 memcpy(&classfull, &rp->p,
2156 sizeof(struct prefix_ipv4));
2157 apply_classful_mask_ipv4(&classfull);
2158 if (rp->p.u.prefix4.s_addr != 0
2159 && classfull.prefixlen
2160 != rp->p.prefixlen)
2161 continue;
2162 }
2163 if (IS_RIP_DEBUG_PACKET)
2164 zlog_debug(
2165 "RIPv1 mask check, %s/%d made it through",
2166 inet_ntoa(rp->p.u.prefix4),
2167 rp->p.prefixlen);
2168 } else
2169 p = (struct prefix_ipv4 *)&rp->p;
2170
2171 /* Apply output filters. */
2172 ret = rip_filter(RIP_FILTER_OUT, p, ri);
2173 if (ret < 0)
2174 continue;
2175
2176 /* Changed route only output. */
2177 if (route_type == rip_changed_route
2178 && (!(rinfo->flags & RIP_RTF_CHANGED)))
2179 continue;
2180
2181 /* Split horizon. */
2182 /* if (split_horizon == rip_split_horizon) */
2183 if (ri->split_horizon == RIP_SPLIT_HORIZON) {
2184 /*
2185 * We perform split horizon for RIP and
2186 * connected route.
2187 * For rip routes, we want to suppress the route
2188 * if we would
2189 * end up sending the route back on the
2190 * interface that we
2191 * learned it from, with a higher metric. For
2192 * connected routes,
2193 * we suppress the route if the prefix is a
2194 * subset of the
2195 * source address that we are going to use for
2196 * the packet
2197 * (in order to handle the case when multiple
2198 * subnets are
2199 * configured on the same interface).
2200 */
2201 int suppress = 0;
2202 struct rip_info *tmp_rinfo = NULL;
2203
2204 for (ALL_LIST_ELEMENTS_RO(list, listnode,
2205 tmp_rinfo))
2206 if (tmp_rinfo->type == ZEBRA_ROUTE_RIP
2207 && tmp_rinfo->ifindex
2208 == ifc->ifp->ifindex) {
2209 suppress = 1;
2210 break;
2211 }
2212
2213 if (!suppress
2214 && rinfo->type == ZEBRA_ROUTE_CONNECT
2215 && prefix_match((struct prefix *)p,
2216 ifc->address))
2217 suppress = 1;
2218
2219 if (suppress)
2220 continue;
2221 }
2222
2223 /* Preparation for route-map. */
2224 rinfo->metric_set = 0;
2225 rinfo->nexthop_out.s_addr = 0;
2226 rinfo->metric_out = rinfo->metric;
2227 rinfo->tag_out = rinfo->tag;
2228 rinfo->ifindex_out = ifc->ifp->ifindex;
2229
2230 /* In order to avoid some local loops,
2231 * if the RIP route has a nexthop via this interface,
2232 * keep the nexthop,
2233 * otherwise set it to 0. The nexthop should not be
2234 * propagated
2235 * beyond the local broadcast/multicast area in order
2236 * to avoid an IGP multi-level recursive look-up.
2237 * see (4.4)
2238 */
2239 if (rinfo->ifindex == ifc->ifp->ifindex)
2240 rinfo->nexthop_out = rinfo->nexthop;
2241
2242 /* Interface route-map */
2243 if (ri->routemap[RIP_FILTER_OUT]) {
2244 ret = route_map_apply(
2245 ri->routemap[RIP_FILTER_OUT],
2246 (struct prefix *)p, RMAP_RIP, rinfo);
2247
2248 if (ret == RMAP_DENYMATCH) {
2249 if (IS_RIP_DEBUG_PACKET)
2250 zlog_debug(
2251 "RIP %s/%d is filtered by route-map out",
2252 inet_ntoa(p->prefix),
2253 p->prefixlen);
2254 continue;
2255 }
2256 }
2257
2258 /* Apply redistribute route map - continue, if deny */
2259 if (rip->route_map[rinfo->type].name
2260 && rinfo->sub_type != RIP_ROUTE_INTERFACE) {
2261 ret = route_map_apply(
2262 rip->route_map[rinfo->type].map,
2263 (struct prefix *)p, RMAP_RIP, rinfo);
2264
2265 if (ret == RMAP_DENYMATCH) {
2266 if (IS_RIP_DEBUG_PACKET)
2267 zlog_debug(
2268 "%s/%d is filtered by route-map",
2269 inet_ntoa(p->prefix),
2270 p->prefixlen);
2271 continue;
2272 }
2273 }
2274
2275 /* When route-map does not set metric. */
2276 if (!rinfo->metric_set) {
2277 /* If redistribute metric is set. */
2278 if (rip->route_map[rinfo->type].metric_config
2279 && rinfo->metric != RIP_METRIC_INFINITY) {
2280 rinfo->metric_out =
2281 rip->route_map[rinfo->type]
2282 .metric;
2283 } else {
2284 /* If the route is not connected or
2285 localy generated
2286 one, use default-metric value*/
2287 if (rinfo->type != ZEBRA_ROUTE_RIP
2288 && rinfo->type
2289 != ZEBRA_ROUTE_CONNECT
2290 && rinfo->metric
2291 != RIP_METRIC_INFINITY)
2292 rinfo->metric_out =
2293 rip->default_metric;
2294 }
2295 }
2296
2297 /* Apply offset-list */
2298 if (rinfo->metric != RIP_METRIC_INFINITY)
2299 rip_offset_list_apply_out(p, ifc->ifp,
2300 &rinfo->metric_out);
2301
2302 if (rinfo->metric_out > RIP_METRIC_INFINITY)
2303 rinfo->metric_out = RIP_METRIC_INFINITY;
2304
2305 /* Perform split-horizon with poisoned reverse
2306 * for RIP and connected routes.
2307 **/
2308 if (ri->split_horizon
2309 == RIP_SPLIT_HORIZON_POISONED_REVERSE) {
2310 /*
2311 * We perform split horizon for RIP and
2312 * connected route.
2313 * For rip routes, we want to suppress the route
2314 * if we would
2315 * end up sending the route back on the
2316 * interface that we
2317 * learned it from, with a higher metric. For
2318 * connected routes,
2319 * we suppress the route if the prefix is a
2320 * subset of the
2321 * source address that we are going to use for
2322 * the packet
2323 * (in order to handle the case when multiple
2324 * subnets are
2325 * configured on the same interface).
2326 */
2327 struct rip_info *tmp_rinfo = NULL;
2328
2329 for (ALL_LIST_ELEMENTS_RO(list, listnode,
2330 tmp_rinfo))
2331 if (tmp_rinfo->type == ZEBRA_ROUTE_RIP
2332 && tmp_rinfo->ifindex
2333 == ifc->ifp->ifindex)
2334 rinfo->metric_out =
2335 RIP_METRIC_INFINITY;
2336 if (tmp_rinfo->type == ZEBRA_ROUTE_CONNECT
2337 && prefix_match((struct prefix *)p,
2338 ifc->address))
2339 rinfo->metric_out = RIP_METRIC_INFINITY;
2340 }
2341
2342 /* Prepare preamble, auth headers, if needs be */
2343 if (num == 0) {
2344 stream_putc(s, RIP_RESPONSE);
2345 stream_putc(s, version);
2346 stream_putw(s, 0);
2347
2348 /* auth header for !v1 && !no_auth */
2349 if ((ri->auth_type != RIP_NO_AUTH)
2350 && (version != RIPv1))
2351 doff = rip_auth_header_write(
2352 s, ri, key, auth_str,
2353 RIP_AUTH_SIMPLE_SIZE);
2354 }
2355
2356 /* Write RTE to the stream. */
2357 num = rip_write_rte(num, s, p, version, rinfo);
2358 if (num == rtemax) {
2359 if (version == RIPv2
2360 && ri->auth_type == RIP_AUTH_MD5)
2361 rip_auth_md5_set(s, ri, doff, auth_str,
2362 RIP_AUTH_SIMPLE_SIZE);
2363
2364 ret = rip_send_packet(STREAM_DATA(s),
2365 stream_get_endp(s), to,
2366 ifc);
2367
2368 if (ret >= 0 && IS_RIP_DEBUG_SEND)
2369 rip_packet_dump((struct rip_packet *)
2370 STREAM_DATA(s),
2371 stream_get_endp(s),
2372 "SEND");
2373 num = 0;
2374 stream_reset(s);
2375 }
2376 }
2377
2378 /* Flush unwritten RTE. */
2379 if (num != 0) {
2380 if (version == RIPv2 && ri->auth_type == RIP_AUTH_MD5)
2381 rip_auth_md5_set(s, ri, doff, auth_str,
2382 RIP_AUTH_SIMPLE_SIZE);
2383
2384 ret = rip_send_packet(STREAM_DATA(s), stream_get_endp(s), to,
2385 ifc);
2386
2387 if (ret >= 0 && IS_RIP_DEBUG_SEND)
2388 rip_packet_dump((struct rip_packet *)STREAM_DATA(s),
2389 stream_get_endp(s), "SEND");
2390 stream_reset(s);
2391 }
2392
2393 /* Statistics updates. */
2394 ri->sent_updates++;
2395 }
2396
2397 /* Send RIP packet to the interface. */
2398 static void rip_update_interface(struct connected *ifc, u_char version,
2399 int route_type)
2400 {
2401 struct interface *ifp = ifc->ifp;
2402 struct rip_interface *ri = ifp->info;
2403 struct sockaddr_in to;
2404
2405 /* When RIP version is 2 and multicast enable interface. */
2406 if (version == RIPv2 && !ri->v2_broadcast && if_is_multicast(ifp)) {
2407 if (IS_RIP_DEBUG_EVENT)
2408 zlog_debug("multicast announce on %s ", ifp->name);
2409
2410 rip_output_process(ifc, NULL, route_type, version);
2411 return;
2412 }
2413
2414 /* If we can't send multicast packet, send it with unicast. */
2415 if (if_is_broadcast(ifp) || if_is_pointopoint(ifp)) {
2416 if (ifc->address->family == AF_INET) {
2417 /* Destination address and port setting. */
2418 memset(&to, 0, sizeof(struct sockaddr_in));
2419 if (ifc->destination)
2420 /* use specified broadcast or peer destination
2421 * addr */
2422 to.sin_addr = ifc->destination->u.prefix4;
2423 else if (ifc->address->prefixlen < IPV4_MAX_PREFIXLEN)
2424 /* calculate the appropriate broadcast address
2425 */
2426 to.sin_addr.s_addr = ipv4_broadcast_addr(
2427 ifc->address->u.prefix4.s_addr,
2428 ifc->address->prefixlen);
2429 else
2430 /* do not know where to send the packet */
2431 return;
2432 to.sin_port = htons(RIP_PORT_DEFAULT);
2433
2434 if (IS_RIP_DEBUG_EVENT)
2435 zlog_debug("%s announce to %s on %s",
2436 CONNECTED_PEER(ifc) ? "unicast"
2437 : "broadcast",
2438 inet_ntoa(to.sin_addr), ifp->name);
2439
2440 rip_output_process(ifc, &to, route_type, version);
2441 }
2442 }
2443 }
2444
2445 /* Update send to all interface and neighbor. */
2446 static void rip_update_process(int route_type)
2447 {
2448 struct vrf *vrf = vrf_lookup_by_id(VRF_DEFAULT);
2449 struct listnode *ifnode, *ifnnode;
2450 struct connected *connected;
2451 struct interface *ifp;
2452 struct rip_interface *ri;
2453 struct route_node *rp;
2454 struct sockaddr_in to;
2455 struct prefix *p;
2456
2457 /* Send RIP update to each interface. */
2458 FOR_ALL_INTERFACES (vrf, ifp) {
2459 if (if_is_loopback(ifp))
2460 continue;
2461
2462 if (!if_is_operative(ifp))
2463 continue;
2464
2465 /* Fetch RIP interface information. */
2466 ri = ifp->info;
2467
2468 /* When passive interface is specified, suppress announce to the
2469 interface. */
2470 if (ri->passive)
2471 continue;
2472
2473 if (ri->running) {
2474 /*
2475 * If there is no version configuration in the
2476 * interface,
2477 * use rip's version setting.
2478 */
2479 int vsend = ((ri->ri_send == RI_RIP_UNSPEC)
2480 ? rip->version_send
2481 : ri->ri_send);
2482
2483 if (IS_RIP_DEBUG_EVENT)
2484 zlog_debug("SEND UPDATE to %s ifindex %d",
2485 ifp->name, ifp->ifindex);
2486
2487 /* send update on each connected network */
2488 for (ALL_LIST_ELEMENTS(ifp->connected, ifnode, ifnnode,
2489 connected)) {
2490 if (connected->address->family == AF_INET) {
2491 if (vsend & RIPv1)
2492 rip_update_interface(
2493 connected, RIPv1,
2494 route_type);
2495 if ((vsend & RIPv2)
2496 && if_is_multicast(ifp))
2497 rip_update_interface(
2498 connected, RIPv2,
2499 route_type);
2500 }
2501 }
2502 }
2503 }
2504
2505 /* RIP send updates to each neighbor. */
2506 for (rp = route_top(rip->neighbor); rp; rp = route_next(rp))
2507 if (rp->info != NULL) {
2508 p = &rp->p;
2509
2510 connected = if_lookup_address(&p->u.prefix4, AF_INET,
2511 VRF_DEFAULT);
2512 if (!connected) {
2513 zlog_warn(
2514 "Neighbor %s doesnt have connected interface!",
2515 inet_ntoa(p->u.prefix4));
2516 continue;
2517 }
2518
2519 /* Set destination address and port */
2520 memset(&to, 0, sizeof(struct sockaddr_in));
2521 to.sin_addr = p->u.prefix4;
2522 to.sin_port = htons(RIP_PORT_DEFAULT);
2523
2524 /* RIP version is rip's configuration. */
2525 rip_output_process(connected, &to, route_type,
2526 rip->version_send);
2527 }
2528 }
2529
2530 /* RIP's periodical timer. */
2531 static int rip_update(struct thread *t)
2532 {
2533 /* Clear timer pointer. */
2534 rip->t_update = NULL;
2535
2536 if (IS_RIP_DEBUG_EVENT)
2537 zlog_debug("update timer fire!");
2538
2539 /* Process update output. */
2540 rip_update_process(rip_all_route);
2541
2542 /* Triggered updates may be suppressed if a regular update is due by
2543 the time the triggered update would be sent. */
2544 RIP_TIMER_OFF(rip->t_triggered_interval);
2545 rip->trigger = 0;
2546
2547 /* Register myself. */
2548 rip_event(RIP_UPDATE_EVENT, 0);
2549
2550 return 0;
2551 }
2552
2553 /* Walk down the RIP routing table then clear changed flag. */
2554 static void rip_clear_changed_flag(void)
2555 {
2556 struct route_node *rp;
2557 struct rip_info *rinfo = NULL;
2558 struct list *list = NULL;
2559 struct listnode *listnode = NULL;
2560
2561 for (rp = route_top(rip->table); rp; rp = route_next(rp))
2562 if ((list = rp->info) != NULL)
2563 for (ALL_LIST_ELEMENTS_RO(list, listnode, rinfo)) {
2564 UNSET_FLAG(rinfo->flags, RIP_RTF_CHANGED);
2565 /* This flag can be set only on the first entry.
2566 */
2567 break;
2568 }
2569 }
2570
2571 /* Triggered update interval timer. */
2572 static int rip_triggered_interval(struct thread *t)
2573 {
2574 int rip_triggered_update(struct thread *);
2575
2576 rip->t_triggered_interval = NULL;
2577
2578 if (rip->trigger) {
2579 rip->trigger = 0;
2580 rip_triggered_update(t);
2581 }
2582 return 0;
2583 }
2584
2585 /* Execute triggered update. */
2586 static int rip_triggered_update(struct thread *t)
2587 {
2588 int interval;
2589
2590 /* Clear thred pointer. */
2591 rip->t_triggered_update = NULL;
2592
2593 /* Cancel interval timer. */
2594 RIP_TIMER_OFF(rip->t_triggered_interval);
2595 rip->trigger = 0;
2596
2597 /* Logging triggered update. */
2598 if (IS_RIP_DEBUG_EVENT)
2599 zlog_debug("triggered update!");
2600
2601 /* Split Horizon processing is done when generating triggered
2602 updates as well as normal updates (see section 2.6). */
2603 rip_update_process(rip_changed_route);
2604
2605 /* Once all of the triggered updates have been generated, the route
2606 change flags should be cleared. */
2607 rip_clear_changed_flag();
2608
2609 /* After a triggered update is sent, a timer should be set for a
2610 random interval between 1 and 5 seconds. If other changes that
2611 would trigger updates occur before the timer expires, a single
2612 update is triggered when the timer expires. */
2613 interval = (random() % 5) + 1;
2614
2615 rip->t_triggered_interval = NULL;
2616 thread_add_timer(master, rip_triggered_interval, NULL, interval,
2617 &rip->t_triggered_interval);
2618
2619 return 0;
2620 }
2621
2622 /* Withdraw redistributed route. */
2623 void rip_redistribute_withdraw(int type)
2624 {
2625 struct route_node *rp;
2626 struct rip_info *rinfo = NULL;
2627 struct list *list = NULL;
2628
2629 if (!rip)
2630 return;
2631
2632 for (rp = route_top(rip->table); rp; rp = route_next(rp))
2633 if ((list = rp->info) != NULL) {
2634 rinfo = listgetdata(listhead(list));
2635 if (rinfo->type == type
2636 && rinfo->sub_type != RIP_ROUTE_INTERFACE) {
2637 /* Perform poisoned reverse. */
2638 rinfo->metric = RIP_METRIC_INFINITY;
2639 RIP_TIMER_ON(rinfo->t_garbage_collect,
2640 rip_garbage_collect,
2641 rip->garbage_time);
2642 RIP_TIMER_OFF(rinfo->t_timeout);
2643 rinfo->flags |= RIP_RTF_CHANGED;
2644
2645 if (IS_RIP_DEBUG_EVENT) {
2646 struct prefix_ipv4 *p =
2647 (struct prefix_ipv4 *)&rp->p;
2648
2649 zlog_debug(
2650 "Poisone %s/%d on the interface %s with an infinity metric [withdraw]",
2651 inet_ntoa(p->prefix),
2652 p->prefixlen,
2653 ifindex2ifname(rinfo->ifindex,
2654 VRF_DEFAULT));
2655 }
2656
2657 rip_event(RIP_TRIGGERED_UPDATE, 0);
2658 }
2659 }
2660 }
2661
2662 /* Create new RIP instance and set it to global variable. */
2663 static int rip_create(void)
2664 {
2665 rip = XCALLOC(MTYPE_RIP, sizeof(struct rip));
2666
2667 /* Set initial value. */
2668 rip->version_send = RI_RIP_VERSION_2;
2669 rip->version_recv = RI_RIP_VERSION_1_AND_2;
2670 rip->update_time = RIP_UPDATE_TIMER_DEFAULT;
2671 rip->timeout_time = RIP_TIMEOUT_TIMER_DEFAULT;
2672 rip->garbage_time = RIP_GARBAGE_TIMER_DEFAULT;
2673 rip->default_metric = RIP_DEFAULT_METRIC_DEFAULT;
2674
2675 /* Initialize RIP routig table. */
2676 rip->table = route_table_init();
2677 rip->route = route_table_init();
2678 rip->neighbor = route_table_init();
2679
2680 /* Make output stream. */
2681 rip->obuf = stream_new(1500);
2682
2683 /* Make socket. */
2684 rip->sock = rip_create_socket();
2685 if (rip->sock < 0)
2686 return rip->sock;
2687
2688 /* Create read and timer thread. */
2689 rip_event(RIP_READ, rip->sock);
2690 rip_event(RIP_UPDATE_EVENT, 1);
2691
2692 QOBJ_REG(rip, rip);
2693
2694 return 0;
2695 }
2696
2697 /* Sned RIP request to the destination. */
2698 int rip_request_send(struct sockaddr_in *to, struct interface *ifp,
2699 u_char version, struct connected *connected)
2700 {
2701 struct rte *rte;
2702 struct rip_packet rip_packet;
2703 struct listnode *node, *nnode;
2704
2705 memset(&rip_packet, 0, sizeof(rip_packet));
2706
2707 rip_packet.command = RIP_REQUEST;
2708 rip_packet.version = version;
2709 rte = rip_packet.rte;
2710 rte->metric = htonl(RIP_METRIC_INFINITY);
2711
2712 if (connected) {
2713 /*
2714 * connected is only sent for ripv1 case, or when
2715 * interface does not support multicast. Caller loops
2716 * over each connected address for this case.
2717 */
2718 if (rip_send_packet((u_char *)&rip_packet, sizeof(rip_packet),
2719 to, connected)
2720 != sizeof(rip_packet))
2721 return -1;
2722 else
2723 return sizeof(rip_packet);
2724 }
2725
2726 /* send request on each connected network */
2727 for (ALL_LIST_ELEMENTS(ifp->connected, node, nnode, connected)) {
2728 struct prefix_ipv4 *p;
2729
2730 p = (struct prefix_ipv4 *)connected->address;
2731
2732 if (p->family != AF_INET)
2733 continue;
2734
2735 if (rip_send_packet((u_char *)&rip_packet, sizeof(rip_packet),
2736 to, connected)
2737 != sizeof(rip_packet))
2738 return -1;
2739 }
2740 return sizeof(rip_packet);
2741 }
2742
2743 static int rip_update_jitter(unsigned long time)
2744 {
2745 #define JITTER_BOUND 4
2746 /* We want to get the jitter to +/- 1/JITTER_BOUND the interval.
2747 Given that, we cannot let time be less than JITTER_BOUND seconds.
2748 The RIPv2 RFC says jitter should be small compared to
2749 update_time. We consider 1/JITTER_BOUND to be small.
2750 */
2751
2752 int jitter_input = time;
2753 int jitter;
2754
2755 if (jitter_input < JITTER_BOUND)
2756 jitter_input = JITTER_BOUND;
2757
2758 jitter = (((random() % ((jitter_input * 2) + 1)) - jitter_input));
2759
2760 return jitter / JITTER_BOUND;
2761 }
2762
2763 void rip_event(enum rip_event event, int sock)
2764 {
2765 int jitter = 0;
2766
2767 switch (event) {
2768 case RIP_READ:
2769 rip->t_read = NULL;
2770 thread_add_read(master, rip_read, NULL, sock, &rip->t_read);
2771 break;
2772 case RIP_UPDATE_EVENT:
2773 RIP_TIMER_OFF(rip->t_update);
2774 jitter = rip_update_jitter(rip->update_time);
2775 thread_add_timer(master, rip_update, NULL,
2776 sock ? 2 : rip->update_time + jitter,
2777 &rip->t_update);
2778 break;
2779 case RIP_TRIGGERED_UPDATE:
2780 if (rip->t_triggered_interval)
2781 rip->trigger = 1;
2782 else
2783 thread_add_event(master, rip_triggered_update, NULL, 0,
2784 &rip->t_triggered_update);
2785 break;
2786 default:
2787 break;
2788 }
2789 }
2790
2791 DEFUN_NOSH (router_rip,
2792 router_rip_cmd,
2793 "router rip",
2794 "Enable a routing process\n"
2795 "Routing Information Protocol (RIP)\n")
2796 {
2797 int ret;
2798
2799 /* If rip is not enabled before. */
2800 if (!rip) {
2801 ret = rip_create();
2802 if (ret < 0) {
2803 zlog_info("Can't create RIP");
2804 return CMD_WARNING_CONFIG_FAILED;
2805 }
2806 }
2807 VTY_PUSH_CONTEXT(RIP_NODE, rip);
2808
2809 return CMD_SUCCESS;
2810 }
2811
2812 DEFUN (no_router_rip,
2813 no_router_rip_cmd,
2814 "no router rip",
2815 NO_STR
2816 "Enable a routing process\n"
2817 "Routing Information Protocol (RIP)\n")
2818 {
2819 if (rip)
2820 rip_clean();
2821 return CMD_SUCCESS;
2822 }
2823
2824 DEFUN (rip_version,
2825 rip_version_cmd,
2826 "version (1-2)",
2827 "Set routing protocol version\n"
2828 "version\n")
2829 {
2830 int idx_number = 1;
2831 int version;
2832
2833 version = atoi(argv[idx_number]->arg);
2834 if (version != RIPv1 && version != RIPv2) {
2835 vty_out(vty, "invalid rip version %d\n", version);
2836 return CMD_WARNING_CONFIG_FAILED;
2837 }
2838 rip->version_send = version;
2839 rip->version_recv = version;
2840
2841 return CMD_SUCCESS;
2842 }
2843
2844 DEFUN (no_rip_version,
2845 no_rip_version_cmd,
2846 "no version [(1-2)]",
2847 NO_STR
2848 "Set routing protocol version\n"
2849 "Version\n")
2850 {
2851 /* Set RIP version to the default. */
2852 rip->version_send = RI_RIP_VERSION_2;
2853 rip->version_recv = RI_RIP_VERSION_1_AND_2;
2854
2855 return CMD_SUCCESS;
2856 }
2857
2858
2859 DEFUN (rip_route,
2860 rip_route_cmd,
2861 "route A.B.C.D/M",
2862 "RIP static route configuration\n"
2863 "IP prefix <network>/<length>\n")
2864 {
2865 int idx_ipv4_prefixlen = 1;
2866 int ret;
2867 struct prefix_ipv4 p;
2868 struct route_node *node;
2869
2870 ret = str2prefix_ipv4(argv[idx_ipv4_prefixlen]->arg, &p);
2871 if (ret < 0) {
2872 vty_out(vty, "Malformed address\n");
2873 return CMD_WARNING_CONFIG_FAILED;
2874 }
2875 apply_mask_ipv4(&p);
2876
2877 /* For router rip configuration. */
2878 node = route_node_get(rip->route, (struct prefix *)&p);
2879
2880 if (node->info) {
2881 vty_out(vty, "There is already same static route.\n");
2882 route_unlock_node(node);
2883 return CMD_WARNING;
2884 }
2885
2886 node->info = (void *)1;
2887
2888 rip_redistribute_add(ZEBRA_ROUTE_RIP, RIP_ROUTE_STATIC, &p, 0, NULL, 0,
2889 0, 0);
2890
2891 return CMD_SUCCESS;
2892 }
2893
2894 DEFUN (no_rip_route,
2895 no_rip_route_cmd,
2896 "no route A.B.C.D/M",
2897 NO_STR
2898 "RIP static route configuration\n"
2899 "IP prefix <network>/<length>\n")
2900 {
2901 int idx_ipv4_prefixlen = 2;
2902 int ret;
2903 struct prefix_ipv4 p;
2904 struct route_node *node;
2905
2906 ret = str2prefix_ipv4(argv[idx_ipv4_prefixlen]->arg, &p);
2907 if (ret < 0) {
2908 vty_out(vty, "Malformed address\n");
2909 return CMD_WARNING_CONFIG_FAILED;
2910 }
2911 apply_mask_ipv4(&p);
2912
2913 /* For router rip configuration. */
2914 node = route_node_lookup(rip->route, (struct prefix *)&p);
2915 if (!node) {
2916 vty_out(vty, "Can't find route %s.\n",
2917 argv[idx_ipv4_prefixlen]->arg);
2918 return CMD_WARNING_CONFIG_FAILED;
2919 }
2920
2921 rip_redistribute_delete(ZEBRA_ROUTE_RIP, RIP_ROUTE_STATIC, &p, 0);
2922 route_unlock_node(node);
2923
2924 node->info = NULL;
2925 route_unlock_node(node);
2926
2927 return CMD_SUCCESS;
2928 }
2929
2930 #if 0
2931 static void
2932 rip_update_default_metric (void)
2933 {
2934 struct route_node *np;
2935 struct rip_info *rinfo = NULL;
2936 struct list *list = NULL;
2937 struct listnode *listnode = NULL;
2938
2939 for (np = route_top (rip->table); np; np = route_next (np))
2940 if ((list = np->info) != NULL)
2941 for (ALL_LIST_ELEMENTS_RO (list, listnode, rinfo))
2942 if (rinfo->type != ZEBRA_ROUTE_RIP && rinfo->type != ZEBRA_ROUTE_CONNECT)
2943 rinfo->metric = rip->default_metric;
2944 }
2945 #endif
2946
2947 DEFUN (rip_default_metric,
2948 rip_default_metric_cmd,
2949 "default-metric (1-16)",
2950 "Set a metric of redistribute routes\n"
2951 "Default metric\n")
2952 {
2953 int idx_number = 1;
2954 if (rip) {
2955 rip->default_metric = atoi(argv[idx_number]->arg);
2956 /* rip_update_default_metric (); */
2957 }
2958 return CMD_SUCCESS;
2959 }
2960
2961 DEFUN (no_rip_default_metric,
2962 no_rip_default_metric_cmd,
2963 "no default-metric [(1-16)]",
2964 NO_STR
2965 "Set a metric of redistribute routes\n"
2966 "Default metric\n")
2967 {
2968 if (rip) {
2969 rip->default_metric = RIP_DEFAULT_METRIC_DEFAULT;
2970 /* rip_update_default_metric (); */
2971 }
2972 return CMD_SUCCESS;
2973 }
2974
2975
2976 DEFUN (rip_timers,
2977 rip_timers_cmd,
2978 "timers basic (5-2147483647) (5-2147483647) (5-2147483647)",
2979 "Adjust routing timers\n"
2980 "Basic routing protocol update timers\n"
2981 "Routing table update timer value in second. Default is 30.\n"
2982 "Routing information timeout timer. Default is 180.\n"
2983 "Garbage collection timer. Default is 120.\n")
2984 {
2985 int idx_number = 2;
2986 int idx_number_2 = 3;
2987 int idx_number_3 = 4;
2988 unsigned long update;
2989 unsigned long timeout;
2990 unsigned long garbage;
2991 char *endptr = NULL;
2992 unsigned long RIP_TIMER_MAX = 2147483647;
2993 unsigned long RIP_TIMER_MIN = 5;
2994
2995 update = strtoul(argv[idx_number]->arg, &endptr, 10);
2996 if (update > RIP_TIMER_MAX || update < RIP_TIMER_MIN
2997 || *endptr != '\0') {
2998 vty_out(vty, "update timer value error\n");
2999 return CMD_WARNING_CONFIG_FAILED;
3000 }
3001
3002 timeout = strtoul(argv[idx_number_2]->arg, &endptr, 10);
3003 if (timeout > RIP_TIMER_MAX || timeout < RIP_TIMER_MIN
3004 || *endptr != '\0') {
3005 vty_out(vty, "timeout timer value error\n");
3006 return CMD_WARNING_CONFIG_FAILED;
3007 }
3008
3009 garbage = strtoul(argv[idx_number_3]->arg, &endptr, 10);
3010 if (garbage > RIP_TIMER_MAX || garbage < RIP_TIMER_MIN
3011 || *endptr != '\0') {
3012 vty_out(vty, "garbage timer value error\n");
3013 return CMD_WARNING_CONFIG_FAILED;
3014 }
3015
3016 /* Set each timer value. */
3017 rip->update_time = update;
3018 rip->timeout_time = timeout;
3019 rip->garbage_time = garbage;
3020
3021 /* Reset update timer thread. */
3022 rip_event(RIP_UPDATE_EVENT, 0);
3023
3024 return CMD_SUCCESS;
3025 }
3026
3027 DEFUN (no_rip_timers,
3028 no_rip_timers_cmd,
3029 "no timers basic [(0-65535) (0-65535) (0-65535)]",
3030 NO_STR
3031 "Adjust routing timers\n"
3032 "Basic routing protocol update timers\n"
3033 "Routing table update timer value in second. Default is 30.\n"
3034 "Routing information timeout timer. Default is 180.\n"
3035 "Garbage collection timer. Default is 120.\n")
3036 {
3037 /* Set each timer value to the default. */
3038 rip->update_time = RIP_UPDATE_TIMER_DEFAULT;
3039 rip->timeout_time = RIP_TIMEOUT_TIMER_DEFAULT;
3040 rip->garbage_time = RIP_GARBAGE_TIMER_DEFAULT;
3041
3042 /* Reset update timer thread. */
3043 rip_event(RIP_UPDATE_EVENT, 0);
3044
3045 return CMD_SUCCESS;
3046 }
3047
3048
3049 struct route_table *rip_distance_table;
3050
3051 struct rip_distance {
3052 /* Distance value for the IP source prefix. */
3053 u_char distance;
3054
3055 /* Name of the access-list to be matched. */
3056 char *access_list;
3057 };
3058
3059 static struct rip_distance *rip_distance_new(void)
3060 {
3061 return XCALLOC(MTYPE_RIP_DISTANCE, sizeof(struct rip_distance));
3062 }
3063
3064 static void rip_distance_free(struct rip_distance *rdistance)
3065 {
3066 XFREE(MTYPE_RIP_DISTANCE, rdistance);
3067 }
3068
3069 static int rip_distance_set(struct vty *vty, const char *distance_str,
3070 const char *ip_str, const char *access_list_str)
3071 {
3072 int ret;
3073 struct prefix_ipv4 p;
3074 u_char distance;
3075 struct route_node *rn;
3076 struct rip_distance *rdistance;
3077
3078 ret = str2prefix_ipv4(ip_str, &p);
3079 if (ret == 0) {
3080 vty_out(vty, "Malformed prefix\n");
3081 return CMD_WARNING_CONFIG_FAILED;
3082 }
3083
3084 distance = atoi(distance_str);
3085
3086 /* Get RIP distance node. */
3087 rn = route_node_get(rip_distance_table, (struct prefix *)&p);
3088 if (rn->info) {
3089 rdistance = rn->info;
3090 route_unlock_node(rn);
3091 } else {
3092 rdistance = rip_distance_new();
3093 rn->info = rdistance;
3094 }
3095
3096 /* Set distance value. */
3097 rdistance->distance = distance;
3098
3099 /* Reset access-list configuration. */
3100 if (rdistance->access_list) {
3101 free(rdistance->access_list);
3102 rdistance->access_list = NULL;
3103 }
3104 if (access_list_str)
3105 rdistance->access_list = strdup(access_list_str);
3106
3107 return CMD_SUCCESS;
3108 }
3109
3110 static int rip_distance_unset(struct vty *vty, const char *distance_str,
3111 const char *ip_str, const char *access_list_str)
3112 {
3113 int ret;
3114 struct prefix_ipv4 p;
3115 struct route_node *rn;
3116 struct rip_distance *rdistance;
3117
3118 ret = str2prefix_ipv4(ip_str, &p);
3119 if (ret == 0) {
3120 vty_out(vty, "Malformed prefix\n");
3121 return CMD_WARNING_CONFIG_FAILED;
3122 }
3123
3124 rn = route_node_lookup(rip_distance_table, (struct prefix *)&p);
3125 if (!rn) {
3126 vty_out(vty, "Can't find specified prefix\n");
3127 return CMD_WARNING_CONFIG_FAILED;
3128 }
3129
3130 rdistance = rn->info;
3131
3132 if (rdistance->access_list)
3133 free(rdistance->access_list);
3134 rip_distance_free(rdistance);
3135
3136 rn->info = NULL;
3137 route_unlock_node(rn);
3138 route_unlock_node(rn);
3139
3140 return CMD_SUCCESS;
3141 }
3142
3143 static void rip_distance_reset(void)
3144 {
3145 struct route_node *rn;
3146 struct rip_distance *rdistance;
3147
3148 for (rn = route_top(rip_distance_table); rn; rn = route_next(rn))
3149 if ((rdistance = rn->info) != NULL) {
3150 if (rdistance->access_list)
3151 free(rdistance->access_list);
3152 rip_distance_free(rdistance);
3153 rn->info = NULL;
3154 route_unlock_node(rn);
3155 }
3156 }
3157
3158 /* Apply RIP information to distance method. */
3159 u_char rip_distance_apply(struct rip_info *rinfo)
3160 {
3161 struct route_node *rn;
3162 struct prefix_ipv4 p;
3163 struct rip_distance *rdistance;
3164 struct access_list *alist;
3165
3166 if (!rip)
3167 return 0;
3168
3169 memset(&p, 0, sizeof(struct prefix_ipv4));
3170 p.family = AF_INET;
3171 p.prefix = rinfo->from;
3172 p.prefixlen = IPV4_MAX_BITLEN;
3173
3174 /* Check source address. */
3175 rn = route_node_match(rip_distance_table, (struct prefix *)&p);
3176 if (rn) {
3177 rdistance = rn->info;
3178 route_unlock_node(rn);
3179
3180 if (rdistance->access_list) {
3181 alist = access_list_lookup(AFI_IP,
3182 rdistance->access_list);
3183 if (alist == NULL)
3184 return 0;
3185 if (access_list_apply(alist, &rinfo->rp->p)
3186 == FILTER_DENY)
3187 return 0;
3188
3189 return rdistance->distance;
3190 } else
3191 return rdistance->distance;
3192 }
3193
3194 if (rip->distance)
3195 return rip->distance;
3196
3197 return 0;
3198 }
3199
3200 static void rip_distance_show(struct vty *vty)
3201 {
3202 struct route_node *rn;
3203 struct rip_distance *rdistance;
3204 int header = 1;
3205 char buf[BUFSIZ];
3206
3207 vty_out(vty, " Distance: (default is %d)\n",
3208 rip->distance ? rip->distance : ZEBRA_RIP_DISTANCE_DEFAULT);
3209
3210 for (rn = route_top(rip_distance_table); rn; rn = route_next(rn))
3211 if ((rdistance = rn->info) != NULL) {
3212 if (header) {
3213 vty_out(vty,
3214 " Address Distance List\n");
3215 header = 0;
3216 }
3217 sprintf(buf, "%s/%d", inet_ntoa(rn->p.u.prefix4),
3218 rn->p.prefixlen);
3219 vty_out(vty, " %-20s %4d %s\n", buf,
3220 rdistance->distance,
3221 rdistance->access_list ? rdistance->access_list
3222 : "");
3223 }
3224 }
3225
3226 DEFUN (rip_distance,
3227 rip_distance_cmd,
3228 "distance (1-255)",
3229 "Administrative distance\n"
3230 "Distance value\n")
3231 {
3232 int idx_number = 1;
3233 rip->distance = atoi(argv[idx_number]->arg);
3234 return CMD_SUCCESS;
3235 }
3236
3237 DEFUN (no_rip_distance,
3238 no_rip_distance_cmd,
3239 "no distance (1-255)",
3240 NO_STR
3241 "Administrative distance\n"
3242 "Distance value\n")
3243 {
3244 rip->distance = 0;
3245 return CMD_SUCCESS;
3246 }
3247
3248 DEFUN (rip_distance_source,
3249 rip_distance_source_cmd,
3250 "distance (1-255) A.B.C.D/M",
3251 "Administrative distance\n"
3252 "Distance value\n"
3253 "IP source prefix\n")
3254 {
3255 int idx_number = 1;
3256 int idx_ipv4_prefixlen = 2;
3257 rip_distance_set(vty, argv[idx_number]->arg,
3258 argv[idx_ipv4_prefixlen]->arg, NULL);
3259 return CMD_SUCCESS;
3260 }
3261
3262 DEFUN (no_rip_distance_source,
3263 no_rip_distance_source_cmd,
3264 "no distance (1-255) A.B.C.D/M",
3265 NO_STR
3266 "Administrative distance\n"
3267 "Distance value\n"
3268 "IP source prefix\n")
3269 {
3270 int idx_number = 2;
3271 int idx_ipv4_prefixlen = 3;
3272 rip_distance_unset(vty, argv[idx_number]->arg,
3273 argv[idx_ipv4_prefixlen]->arg, NULL);
3274 return CMD_SUCCESS;
3275 }
3276
3277 DEFUN (rip_distance_source_access_list,
3278 rip_distance_source_access_list_cmd,
3279 "distance (1-255) A.B.C.D/M WORD",
3280 "Administrative distance\n"
3281 "Distance value\n"
3282 "IP source prefix\n"
3283 "Access list name\n")
3284 {
3285 int idx_number = 1;
3286 int idx_ipv4_prefixlen = 2;
3287 int idx_word = 3;
3288 rip_distance_set(vty, argv[idx_number]->arg,
3289 argv[idx_ipv4_prefixlen]->arg, argv[idx_word]->arg);
3290 return CMD_SUCCESS;
3291 }
3292
3293 DEFUN (no_rip_distance_source_access_list,
3294 no_rip_distance_source_access_list_cmd,
3295 "no distance (1-255) A.B.C.D/M WORD",
3296 NO_STR
3297 "Administrative distance\n"
3298 "Distance value\n"
3299 "IP source prefix\n"
3300 "Access list name\n")
3301 {
3302 int idx_number = 2;
3303 int idx_ipv4_prefixlen = 3;
3304 int idx_word = 4;
3305 rip_distance_unset(vty, argv[idx_number]->arg,
3306 argv[idx_ipv4_prefixlen]->arg, argv[idx_word]->arg);
3307 return CMD_SUCCESS;
3308 }
3309
3310 /* Update ECMP routes to zebra when ECMP is disabled. */
3311 static void rip_ecmp_disable(void)
3312 {
3313 struct route_node *rp;
3314 struct rip_info *rinfo, *tmp_rinfo;
3315 struct list *list;
3316 struct listnode *node, *nextnode;
3317
3318 if (!rip)
3319 return;
3320
3321 for (rp = route_top(rip->table); rp; rp = route_next(rp))
3322 if ((list = rp->info) != NULL && listcount(list) > 1) {
3323 rinfo = listgetdata(listhead(list));
3324 if (!rip_route_rte(rinfo))
3325 continue;
3326
3327 /* Drop all other entries, except the first one. */
3328 for (ALL_LIST_ELEMENTS(list, node, nextnode, tmp_rinfo))
3329 if (tmp_rinfo != rinfo) {
3330 RIP_TIMER_OFF(tmp_rinfo->t_timeout);
3331 RIP_TIMER_OFF(
3332 tmp_rinfo->t_garbage_collect);
3333 list_delete_node(list, node);
3334 rip_info_free(tmp_rinfo);
3335 }
3336
3337 /* Update zebra. */
3338 rip_zebra_ipv4_add(rp);
3339
3340 /* Set the route change flag. */
3341 SET_FLAG(rinfo->flags, RIP_RTF_CHANGED);
3342
3343 /* Signal the output process to trigger an update. */
3344 rip_event(RIP_TRIGGERED_UPDATE, 0);
3345 }
3346 }
3347
3348 DEFUN (rip_allow_ecmp,
3349 rip_allow_ecmp_cmd,
3350 "allow-ecmp",
3351 "Allow Equal Cost MultiPath\n")
3352 {
3353 if (rip->ecmp) {
3354 vty_out(vty, "ECMP is already enabled.\n");
3355 return CMD_WARNING;
3356 }
3357
3358 rip->ecmp = 1;
3359 zlog_info("ECMP is enabled.");
3360 return CMD_SUCCESS;
3361 }
3362
3363 DEFUN (no_rip_allow_ecmp,
3364 no_rip_allow_ecmp_cmd,
3365 "no allow-ecmp",
3366 NO_STR
3367 "Allow Equal Cost MultiPath\n")
3368 {
3369 if (!rip->ecmp) {
3370 vty_out(vty, "ECMP is already disabled.\n");
3371 return CMD_WARNING;
3372 }
3373
3374 rip->ecmp = 0;
3375 zlog_info("ECMP is disabled.");
3376 rip_ecmp_disable();
3377 return CMD_SUCCESS;
3378 }
3379
3380 /* Print out routes update time. */
3381 static void rip_vty_out_uptime(struct vty *vty, struct rip_info *rinfo)
3382 {
3383 time_t clock;
3384 struct tm *tm;
3385 #define TIME_BUF 25
3386 char timebuf[TIME_BUF];
3387 struct thread *thread;
3388
3389 if ((thread = rinfo->t_timeout) != NULL) {
3390 clock = thread_timer_remain_second(thread);
3391 tm = gmtime(&clock);
3392 strftime(timebuf, TIME_BUF, "%M:%S", tm);
3393 vty_out(vty, "%5s", timebuf);
3394 } else if ((thread = rinfo->t_garbage_collect) != NULL) {
3395 clock = thread_timer_remain_second(thread);
3396 tm = gmtime(&clock);
3397 strftime(timebuf, TIME_BUF, "%M:%S", tm);
3398 vty_out(vty, "%5s", timebuf);
3399 }
3400 }
3401
3402 static const char *rip_route_type_print(int sub_type)
3403 {
3404 switch (sub_type) {
3405 case RIP_ROUTE_RTE:
3406 return "n";
3407 case RIP_ROUTE_STATIC:
3408 return "s";
3409 case RIP_ROUTE_DEFAULT:
3410 return "d";
3411 case RIP_ROUTE_REDISTRIBUTE:
3412 return "r";
3413 case RIP_ROUTE_INTERFACE:
3414 return "i";
3415 default:
3416 return "?";
3417 }
3418 }
3419
3420 DEFUN (show_ip_rip,
3421 show_ip_rip_cmd,
3422 "show ip rip",
3423 SHOW_STR
3424 IP_STR
3425 "Show RIP routes\n")
3426 {
3427 struct route_node *np;
3428 struct rip_info *rinfo = NULL;
3429 struct list *list = NULL;
3430 struct listnode *listnode = NULL;
3431
3432 if (!rip)
3433 return CMD_SUCCESS;
3434
3435 vty_out(vty,
3436 "Codes: R - RIP, C - connected, S - Static, O - OSPF, B - BGP\n"
3437 "Sub-codes:\n"
3438 " (n) - normal, (s) - static, (d) - default, (r) - redistribute,\n"
3439 " (i) - interface\n\n"
3440 " Network Next Hop Metric From Tag Time\n");
3441
3442 for (np = route_top(rip->table); np; np = route_next(np))
3443 if ((list = np->info) != NULL)
3444 for (ALL_LIST_ELEMENTS_RO(list, listnode, rinfo)) {
3445 int len;
3446
3447 len = vty_out(
3448 vty, "%c(%s) %s/%d",
3449 /* np->lock, For debugging. */
3450 zebra_route_char(rinfo->type),
3451 rip_route_type_print(rinfo->sub_type),
3452 inet_ntoa(np->p.u.prefix4),
3453 np->p.prefixlen);
3454
3455 len = 24 - len;
3456
3457 if (len > 0)
3458 vty_out(vty, "%*s", len, " ");
3459
3460 if (rinfo->nexthop.s_addr)
3461 vty_out(vty, "%-20s %2d ",
3462 inet_ntoa(rinfo->nexthop),
3463 rinfo->metric);
3464 else
3465 vty_out(vty,
3466 "0.0.0.0 %2d ",
3467 rinfo->metric);
3468
3469 /* Route which exist in kernel routing table. */
3470 if ((rinfo->type == ZEBRA_ROUTE_RIP)
3471 && (rinfo->sub_type == RIP_ROUTE_RTE)) {
3472 vty_out(vty, "%-15s ",
3473 inet_ntoa(rinfo->from));
3474 vty_out(vty, "%3" ROUTE_TAG_PRI " ",
3475 (route_tag_t)rinfo->tag);
3476 rip_vty_out_uptime(vty, rinfo);
3477 } else if (rinfo->metric
3478 == RIP_METRIC_INFINITY) {
3479 vty_out(vty, "self ");
3480 vty_out(vty, "%3" ROUTE_TAG_PRI " ",
3481 (route_tag_t)rinfo->tag);
3482 rip_vty_out_uptime(vty, rinfo);
3483 } else {
3484 if (rinfo->external_metric) {
3485 len = vty_out(
3486 vty, "self (%s:%d)",
3487 zebra_route_string(
3488 rinfo->type),
3489 rinfo->external_metric);
3490 len = 16 - len;
3491 if (len > 0)
3492 vty_out(vty, "%*s", len,
3493 " ");
3494 } else
3495 vty_out(vty,
3496 "self ");
3497 vty_out(vty, "%3" ROUTE_TAG_PRI,
3498 (route_tag_t)rinfo->tag);
3499 }
3500
3501 vty_out(vty, "\n");
3502 }
3503 return CMD_SUCCESS;
3504 }
3505
3506 /* Vincent: formerly, it was show_ip_protocols_rip: "show ip protocols" */
3507 DEFUN (show_ip_rip_status,
3508 show_ip_rip_status_cmd,
3509 "show ip rip status",
3510 SHOW_STR
3511 IP_STR
3512 "Show RIP routes\n"
3513 "IP routing protocol process parameters and statistics\n")
3514 {
3515 struct vrf *vrf = vrf_lookup_by_id(VRF_DEFAULT);
3516 struct interface *ifp;
3517 struct rip_interface *ri;
3518 extern const struct message ri_version_msg[];
3519 const char *send_version;
3520 const char *receive_version;
3521
3522 if (!rip)
3523 return CMD_SUCCESS;
3524
3525 vty_out(vty, "Routing Protocol is \"rip\"\n");
3526 vty_out(vty, " Sending updates every %ld seconds with +/-50%%,",
3527 rip->update_time);
3528 vty_out(vty, " next due in %lu seconds\n",
3529 thread_timer_remain_second(rip->t_update));
3530 vty_out(vty, " Timeout after %ld seconds,", rip->timeout_time);
3531 vty_out(vty, " garbage collect after %ld seconds\n", rip->garbage_time);
3532
3533 /* Filtering status show. */
3534 config_show_distribute(vty);
3535
3536 /* Default metric information. */
3537 vty_out(vty, " Default redistribution metric is %d\n",
3538 rip->default_metric);
3539
3540 /* Redistribute information. */
3541 vty_out(vty, " Redistributing:");
3542 config_write_rip_redistribute(vty, 0);
3543 vty_out(vty, "\n");
3544
3545 vty_out(vty, " Default version control: send version %s,",
3546 lookup_msg(ri_version_msg, rip->version_send, NULL));
3547 if (rip->version_recv == RI_RIP_VERSION_1_AND_2)
3548 vty_out(vty, " receive any version \n");
3549 else
3550 vty_out(vty, " receive version %s \n",
3551 lookup_msg(ri_version_msg, rip->version_recv, NULL));
3552
3553 vty_out(vty, " Interface Send Recv Key-chain\n");
3554
3555 FOR_ALL_INTERFACES (vrf, ifp) {
3556 ri = ifp->info;
3557
3558 if (!ri->running)
3559 continue;
3560
3561 if (ri->enable_network || ri->enable_interface) {
3562 if (ri->ri_send == RI_RIP_UNSPEC)
3563 send_version =
3564 lookup_msg(ri_version_msg,
3565 rip->version_send, NULL);
3566 else
3567 send_version = lookup_msg(ri_version_msg,
3568 ri->ri_send, NULL);
3569
3570 if (ri->ri_receive == RI_RIP_UNSPEC)
3571 receive_version =
3572 lookup_msg(ri_version_msg,
3573 rip->version_recv, NULL);
3574 else
3575 receive_version = lookup_msg(
3576 ri_version_msg, ri->ri_receive, NULL);
3577
3578 vty_out(vty, " %-17s%-3s %-3s %s\n", ifp->name,
3579 send_version, receive_version,
3580 ri->key_chain ? ri->key_chain : "");
3581 }
3582 }
3583
3584 vty_out(vty, " Routing for Networks:\n");
3585 config_write_rip_network(vty, 0);
3586
3587 {
3588 int found_passive = 0;
3589 FOR_ALL_INTERFACES (vrf, ifp) {
3590 ri = ifp->info;
3591
3592 if ((ri->enable_network || ri->enable_interface)
3593 && ri->passive) {
3594 if (!found_passive) {
3595 vty_out(vty,
3596 " Passive Interface(s):\n");
3597 found_passive = 1;
3598 }
3599 vty_out(vty, " %s\n", ifp->name);
3600 }
3601 }
3602 }
3603
3604 vty_out(vty, " Routing Information Sources:\n");
3605 vty_out(vty,
3606 " Gateway BadPackets BadRoutes Distance Last Update\n");
3607 rip_peer_display(vty);
3608
3609 rip_distance_show(vty);
3610
3611 return CMD_SUCCESS;
3612 }
3613
3614 /* RIP configuration write function. */
3615 static int config_write_rip(struct vty *vty)
3616 {
3617 int write = 0;
3618 struct route_node *rn;
3619 struct rip_distance *rdistance;
3620
3621 if (rip) {
3622 /* Router RIP statement. */
3623 vty_out(vty, "router rip\n");
3624 write++;
3625
3626 /* RIP version statement. Default is RIP version 2. */
3627 if (rip->version_send != RI_RIP_VERSION_2
3628 || rip->version_recv != RI_RIP_VERSION_1_AND_2)
3629 vty_out(vty, " version %d\n", rip->version_send);
3630
3631 /* RIP timer configuration. */
3632 if (rip->update_time != RIP_UPDATE_TIMER_DEFAULT
3633 || rip->timeout_time != RIP_TIMEOUT_TIMER_DEFAULT
3634 || rip->garbage_time != RIP_GARBAGE_TIMER_DEFAULT)
3635 vty_out(vty, " timers basic %lu %lu %lu\n",
3636 rip->update_time, rip->timeout_time,
3637 rip->garbage_time);
3638
3639 /* Default information configuration. */
3640 if (rip->default_information) {
3641 if (rip->default_information_route_map)
3642 vty_out(vty,
3643 " default-information originate route-map %s\n",
3644 rip->default_information_route_map);
3645 else
3646 vty_out(vty,
3647 " default-information originate\n");
3648 }
3649
3650 /* Redistribute configuration. */
3651 config_write_rip_redistribute(vty, 1);
3652
3653 /* RIP offset-list configuration. */
3654 config_write_rip_offset_list(vty);
3655
3656 /* RIP enabled network and interface configuration. */
3657 config_write_rip_network(vty, 1);
3658
3659 /* RIP default metric configuration */
3660 if (rip->default_metric != RIP_DEFAULT_METRIC_DEFAULT)
3661 vty_out(vty, " default-metric %d\n",
3662 rip->default_metric);
3663
3664 /* Distribute configuration. */
3665 write += config_write_distribute(vty);
3666
3667 /* Interface routemap configuration */
3668 write += config_write_if_rmap(vty);
3669
3670 /* Distance configuration. */
3671 if (rip->distance)
3672 vty_out(vty, " distance %d\n", rip->distance);
3673
3674 /* RIP source IP prefix distance configuration. */
3675 for (rn = route_top(rip_distance_table); rn;
3676 rn = route_next(rn))
3677 if ((rdistance = rn->info) != NULL)
3678 vty_out(vty, " distance %d %s/%d %s\n",
3679 rdistance->distance,
3680 inet_ntoa(rn->p.u.prefix4),
3681 rn->p.prefixlen,
3682 rdistance->access_list
3683 ? rdistance->access_list
3684 : "");
3685
3686 /* ECMP configuration. */
3687 if (rip->ecmp)
3688 vty_out(vty, " allow-ecmp\n");
3689
3690 /* RIP static route configuration. */
3691 for (rn = route_top(rip->route); rn; rn = route_next(rn))
3692 if (rn->info)
3693 vty_out(vty, " route %s/%d\n",
3694 inet_ntoa(rn->p.u.prefix4),
3695 rn->p.prefixlen);
3696 }
3697 return write;
3698 }
3699
3700 /* RIP node structure. */
3701 static struct cmd_node rip_node = {RIP_NODE, "%s(config-router)# ", 1};
3702
3703 /* Distribute-list update functions. */
3704 static void rip_distribute_update(struct distribute *dist)
3705 {
3706 struct interface *ifp;
3707 struct rip_interface *ri;
3708 struct access_list *alist;
3709 struct prefix_list *plist;
3710
3711 if (!dist->ifname)
3712 return;
3713
3714 ifp = if_lookup_by_name(dist->ifname, VRF_DEFAULT);
3715 if (ifp == NULL)
3716 return;
3717
3718 ri = ifp->info;
3719
3720 if (dist->list[DISTRIBUTE_V4_IN]) {
3721 alist = access_list_lookup(AFI_IP,
3722 dist->list[DISTRIBUTE_V4_IN]);
3723 if (alist)
3724 ri->list[RIP_FILTER_IN] = alist;
3725 else
3726 ri->list[RIP_FILTER_IN] = NULL;
3727 } else
3728 ri->list[RIP_FILTER_IN] = NULL;
3729
3730 if (dist->list[DISTRIBUTE_V4_OUT]) {
3731 alist = access_list_lookup(AFI_IP,
3732 dist->list[DISTRIBUTE_V4_OUT]);
3733 if (alist)
3734 ri->list[RIP_FILTER_OUT] = alist;
3735 else
3736 ri->list[RIP_FILTER_OUT] = NULL;
3737 } else
3738 ri->list[RIP_FILTER_OUT] = NULL;
3739
3740 if (dist->prefix[DISTRIBUTE_V4_IN]) {
3741 plist = prefix_list_lookup(AFI_IP,
3742 dist->prefix[DISTRIBUTE_V4_IN]);
3743 if (plist)
3744 ri->prefix[RIP_FILTER_IN] = plist;
3745 else
3746 ri->prefix[RIP_FILTER_IN] = NULL;
3747 } else
3748 ri->prefix[RIP_FILTER_IN] = NULL;
3749
3750 if (dist->prefix[DISTRIBUTE_V4_OUT]) {
3751 plist = prefix_list_lookup(AFI_IP,
3752 dist->prefix[DISTRIBUTE_V4_OUT]);
3753 if (plist)
3754 ri->prefix[RIP_FILTER_OUT] = plist;
3755 else
3756 ri->prefix[RIP_FILTER_OUT] = NULL;
3757 } else
3758 ri->prefix[RIP_FILTER_OUT] = NULL;
3759 }
3760
3761 void rip_distribute_update_interface(struct interface *ifp)
3762 {
3763 struct distribute *dist;
3764
3765 dist = distribute_lookup(ifp->name);
3766 if (dist)
3767 rip_distribute_update(dist);
3768 }
3769
3770 /* Update all interface's distribute list. */
3771 /* ARGSUSED */
3772 static void rip_distribute_update_all(struct prefix_list *notused)
3773 {
3774 struct vrf *vrf = vrf_lookup_by_id(VRF_DEFAULT);
3775 struct interface *ifp;
3776
3777 FOR_ALL_INTERFACES (vrf, ifp)
3778 rip_distribute_update_interface(ifp);
3779 }
3780 /* ARGSUSED */
3781 static void rip_distribute_update_all_wrapper(struct access_list *notused)
3782 {
3783 rip_distribute_update_all(NULL);
3784 }
3785
3786 /* Delete all added rip route. */
3787 void rip_clean(void)
3788 {
3789 int i;
3790 struct route_node *rp;
3791 struct rip_info *rinfo = NULL;
3792 struct list *list = NULL;
3793 struct listnode *listnode = NULL;
3794
3795 if (rip) {
3796 QOBJ_UNREG(rip);
3797
3798 /* Clear RIP routes */
3799 for (rp = route_top(rip->table); rp; rp = route_next(rp))
3800 if ((list = rp->info) != NULL) {
3801 rinfo = listgetdata(listhead(list));
3802 if (rip_route_rte(rinfo))
3803 rip_zebra_ipv4_delete(rp);
3804
3805 for (ALL_LIST_ELEMENTS_RO(list, listnode,
3806 rinfo)) {
3807 RIP_TIMER_OFF(rinfo->t_timeout);
3808 RIP_TIMER_OFF(rinfo->t_garbage_collect);
3809 rip_info_free(rinfo);
3810 }
3811 list_delete_and_null(&list);
3812 rp->info = NULL;
3813 route_unlock_node(rp);
3814 }
3815
3816 /* Cancel RIP related timers. */
3817 RIP_TIMER_OFF(rip->t_update);
3818 RIP_TIMER_OFF(rip->t_triggered_update);
3819 RIP_TIMER_OFF(rip->t_triggered_interval);
3820
3821 /* Cancel read thread. */
3822 THREAD_READ_OFF(rip->t_read);
3823
3824 /* Close RIP socket. */
3825 if (rip->sock >= 0) {
3826 close(rip->sock);
3827 rip->sock = -1;
3828 }
3829
3830 stream_free(rip->obuf);
3831 /* Static RIP route configuration. */
3832 for (rp = route_top(rip->route); rp; rp = route_next(rp))
3833 if (rp->info) {
3834 rp->info = NULL;
3835 route_unlock_node(rp);
3836 }
3837
3838 /* RIP neighbor configuration. */
3839 for (rp = route_top(rip->neighbor); rp; rp = route_next(rp))
3840 if (rp->info) {
3841 rp->info = NULL;
3842 route_unlock_node(rp);
3843 }
3844
3845 /* Redistribute related clear. */
3846 if (rip->default_information_route_map)
3847 free(rip->default_information_route_map);
3848
3849 for (i = 0; i < ZEBRA_ROUTE_MAX; i++)
3850 if (rip->route_map[i].name)
3851 free(rip->route_map[i].name);
3852
3853 XFREE(MTYPE_ROUTE_TABLE, rip->table);
3854 XFREE(MTYPE_ROUTE_TABLE, rip->route);
3855 XFREE(MTYPE_ROUTE_TABLE, rip->neighbor);
3856
3857 XFREE(MTYPE_RIP, rip);
3858 rip = NULL;
3859 }
3860
3861 rip_clean_network();
3862 rip_passive_nondefault_clean();
3863 rip_offset_clean();
3864 rip_interfaces_clean();
3865 rip_distance_reset();
3866 rip_redistribute_clean();
3867 }
3868
3869 /* Reset all values to the default settings. */
3870 void rip_reset(void)
3871 {
3872 /* Reset global counters. */
3873 rip_global_route_changes = 0;
3874 rip_global_queries = 0;
3875
3876 /* Call ripd related reset functions. */
3877 rip_debug_reset();
3878 rip_route_map_reset();
3879
3880 /* Call library reset functions. */
3881 vty_reset();
3882 access_list_reset();
3883 prefix_list_reset();
3884
3885 distribute_list_reset();
3886
3887 rip_interfaces_reset();
3888 rip_distance_reset();
3889
3890 rip_zclient_reset();
3891 }
3892
3893 static void rip_if_rmap_update(struct if_rmap *if_rmap)
3894 {
3895 struct interface *ifp;
3896 struct rip_interface *ri;
3897 struct route_map *rmap;
3898
3899 ifp = if_lookup_by_name(if_rmap->ifname, VRF_DEFAULT);
3900 if (ifp == NULL)
3901 return;
3902
3903 ri = ifp->info;
3904
3905 if (if_rmap->routemap[IF_RMAP_IN]) {
3906 rmap = route_map_lookup_by_name(if_rmap->routemap[IF_RMAP_IN]);
3907 if (rmap)
3908 ri->routemap[IF_RMAP_IN] = rmap;
3909 else
3910 ri->routemap[IF_RMAP_IN] = NULL;
3911 } else
3912 ri->routemap[RIP_FILTER_IN] = NULL;
3913
3914 if (if_rmap->routemap[IF_RMAP_OUT]) {
3915 rmap = route_map_lookup_by_name(if_rmap->routemap[IF_RMAP_OUT]);
3916 if (rmap)
3917 ri->routemap[IF_RMAP_OUT] = rmap;
3918 else
3919 ri->routemap[IF_RMAP_OUT] = NULL;
3920 } else
3921 ri->routemap[RIP_FILTER_OUT] = NULL;
3922 }
3923
3924 void rip_if_rmap_update_interface(struct interface *ifp)
3925 {
3926 struct if_rmap *if_rmap;
3927
3928 if_rmap = if_rmap_lookup(ifp->name);
3929 if (if_rmap)
3930 rip_if_rmap_update(if_rmap);
3931 }
3932
3933 static void rip_routemap_update_redistribute(void)
3934 {
3935 int i;
3936
3937 if (rip) {
3938 for (i = 0; i < ZEBRA_ROUTE_MAX; i++) {
3939 if (rip->route_map[i].name)
3940 rip->route_map[i].map =
3941 route_map_lookup_by_name(
3942 rip->route_map[i].name);
3943 }
3944 }
3945 }
3946
3947 /* ARGSUSED */
3948 static void rip_routemap_update(const char *notused)
3949 {
3950 struct vrf *vrf = vrf_lookup_by_id(VRF_DEFAULT);
3951 struct interface *ifp;
3952
3953 FOR_ALL_INTERFACES (vrf, ifp)
3954 rip_if_rmap_update_interface(ifp);
3955
3956 rip_routemap_update_redistribute();
3957 }
3958
3959 /* Allocate new rip structure and set default value. */
3960 void rip_init(void)
3961 {
3962 /* Install top nodes. */
3963 install_node(&rip_node, config_write_rip);
3964
3965 /* Install rip commands. */
3966 install_element(VIEW_NODE, &show_ip_rip_cmd);
3967 install_element(VIEW_NODE, &show_ip_rip_status_cmd);
3968 install_element(CONFIG_NODE, &router_rip_cmd);
3969 install_element(CONFIG_NODE, &no_router_rip_cmd);
3970
3971 install_default(RIP_NODE);
3972 install_element(RIP_NODE, &rip_version_cmd);
3973 install_element(RIP_NODE, &no_rip_version_cmd);
3974 install_element(RIP_NODE, &rip_default_metric_cmd);
3975 install_element(RIP_NODE, &no_rip_default_metric_cmd);
3976 install_element(RIP_NODE, &rip_timers_cmd);
3977 install_element(RIP_NODE, &no_rip_timers_cmd);
3978 install_element(RIP_NODE, &rip_route_cmd);
3979 install_element(RIP_NODE, &no_rip_route_cmd);
3980 install_element(RIP_NODE, &rip_distance_cmd);
3981 install_element(RIP_NODE, &no_rip_distance_cmd);
3982 install_element(RIP_NODE, &rip_distance_source_cmd);
3983 install_element(RIP_NODE, &no_rip_distance_source_cmd);
3984 install_element(RIP_NODE, &rip_distance_source_access_list_cmd);
3985 install_element(RIP_NODE, &no_rip_distance_source_access_list_cmd);
3986 install_element(RIP_NODE, &rip_allow_ecmp_cmd);
3987 install_element(RIP_NODE, &no_rip_allow_ecmp_cmd);
3988
3989 /* Debug related init. */
3990 rip_debug_init();
3991
3992 /* Access list install. */
3993 access_list_init();
3994 access_list_add_hook(rip_distribute_update_all_wrapper);
3995 access_list_delete_hook(rip_distribute_update_all_wrapper);
3996
3997 /* Prefix list initialize.*/
3998 prefix_list_init();
3999 prefix_list_add_hook(rip_distribute_update_all);
4000 prefix_list_delete_hook(rip_distribute_update_all);
4001
4002 /* Distribute list install. */
4003 distribute_list_init(RIP_NODE);
4004 distribute_list_add_hook(rip_distribute_update);
4005 distribute_list_delete_hook(rip_distribute_update);
4006
4007 /* Route-map */
4008 rip_route_map_init();
4009 rip_offset_init();
4010
4011 route_map_add_hook(rip_routemap_update);
4012 route_map_delete_hook(rip_routemap_update);
4013
4014 if_rmap_init(RIP_NODE);
4015 if_rmap_hook_add(rip_if_rmap_update);
4016 if_rmap_hook_delete(rip_if_rmap_update);
4017
4018 /* Distance control. */
4019 rip_distance_table = route_table_init();
4020 }