1999-05-11 09:53:45 +00:00
|
|
|
/*
|
|
|
|
* Rest in pieces - RIP protocol
|
|
|
|
*
|
|
|
|
* Copyright (c) 1999 Pavel Machek <pavel@ucw.cz>
|
2004-06-26 20:11:14 +00:00
|
|
|
* Copyright (c) 2004 Ondrej Filip <feela@network.cz>
|
1999-05-11 09:53:45 +00:00
|
|
|
*
|
2003-04-06 18:38:01 +00:00
|
|
|
* Bug fixes by Eric Leblond <eleblond@init-sys.com>, April 2003
|
|
|
|
*
|
1999-05-11 09:53:45 +00:00
|
|
|
* Can be freely distributed and used under the terms of the GNU GPL.
|
|
|
|
*/
|
|
|
|
|
2003-04-06 18:38:01 +00:00
|
|
|
#undef LOCAL_DEBUG
|
1999-05-11 09:53:45 +00:00
|
|
|
|
|
|
|
#include "nest/bird.h"
|
|
|
|
#include "nest/iface.h"
|
|
|
|
#include "nest/protocol.h"
|
|
|
|
#include "nest/route.h"
|
|
|
|
#include "lib/socket.h"
|
|
|
|
#include "lib/resource.h"
|
|
|
|
#include "lib/lists.h"
|
|
|
|
#include "lib/timer.h"
|
1999-05-31 19:16:22 +00:00
|
|
|
#include "lib/md5.h"
|
2000-03-31 23:30:21 +00:00
|
|
|
#include "lib/string.h"
|
1999-05-11 09:53:45 +00:00
|
|
|
|
|
|
|
#include "rip.h"
|
|
|
|
|
|
|
|
#define P ((struct rip_proto *) p)
|
|
|
|
#define P_CF ((struct rip_proto_config *)p->cf)
|
|
|
|
|
1999-08-20 09:59:39 +00:00
|
|
|
#define PACKETLEN(num) (num * sizeof(struct rip_block) + sizeof(struct rip_packet_heading))
|
|
|
|
|
2000-06-05 17:13:36 +00:00
|
|
|
/*
|
2000-06-05 12:52:57 +00:00
|
|
|
* rip_incoming_authentication - check authentication of incomming packet and return 1 if there's problem.
|
|
|
|
*/
|
1999-05-11 09:53:45 +00:00
|
|
|
int
|
1999-12-01 12:52:57 +00:00
|
|
|
rip_incoming_authentication( struct proto *p, struct rip_block_auth *block, struct rip_packet *packet, int num, ip_addr whotoldme )
|
1999-05-11 09:53:45 +00:00
|
|
|
{
|
2015-05-19 07:57:10 +00:00
|
|
|
DBG("Incoming authentication: " );
|
2003-04-06 18:38:01 +00:00
|
|
|
switch (ntohs(block->authtype)) { /* Authentication type */
|
1999-11-25 14:54:08 +00:00
|
|
|
case AT_PLAINTEXT:
|
|
|
|
{
|
2008-11-08 16:24:23 +00:00
|
|
|
struct password_item *passwd = password_find(P_CF->passwords, 1);
|
2015-05-19 07:57:10 +00:00
|
|
|
DBG("Plaintext passwd" );
|
1999-11-25 14:54:08 +00:00
|
|
|
if (!passwd) {
|
2015-05-19 07:57:10 +00:00
|
|
|
log(L_AUTH "No passwords set and password authentication came" );
|
1999-11-25 14:54:08 +00:00
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
if (strncmp( (char *) (&block->packetlen), passwd->password, 16)) {
|
2015-05-19 07:57:10 +00:00
|
|
|
log(L_AUTH "Passwd authentication failed!" );
|
|
|
|
DBG("Expected %s, got %.16s\n", passwd->password, &block->packetlen );
|
1999-11-25 14:54:08 +00:00
|
|
|
return 1;
|
|
|
|
}
|
1999-05-11 09:53:45 +00:00
|
|
|
}
|
2004-06-26 20:11:14 +00:00
|
|
|
break;
|
1999-05-31 17:12:38 +00:00
|
|
|
case AT_MD5:
|
2015-05-19 07:57:10 +00:00
|
|
|
DBG("md5 password" );
|
1999-05-31 17:12:38 +00:00
|
|
|
{
|
2004-06-26 20:11:14 +00:00
|
|
|
struct password_item *pass = NULL, *ptmp;
|
1999-05-31 19:16:22 +00:00
|
|
|
struct rip_md5_tail *tail;
|
2015-05-19 07:57:10 +00:00
|
|
|
struct md5_context ctxt;
|
2004-06-26 20:11:14 +00:00
|
|
|
char md5sum_packet[16];
|
2015-05-13 08:55:02 +00:00
|
|
|
char *md5sum_computed;
|
2004-06-26 20:11:14 +00:00
|
|
|
struct neighbor *neigh = neigh_find(p, &whotoldme, 0);
|
|
|
|
list *l = P_CF->passwords;
|
|
|
|
|
2003-04-06 18:38:01 +00:00
|
|
|
if (ntohs(block->packetlen) != PACKETLEN(num) - sizeof(struct rip_md5_tail) ) {
|
2015-05-19 07:57:10 +00:00
|
|
|
log(L_ERR "Packet length in MD5 does not match computed value" );
|
1999-08-20 09:59:39 +00:00
|
|
|
return 1;
|
|
|
|
}
|
1999-08-18 13:19:33 +00:00
|
|
|
|
2003-04-06 18:38:01 +00:00
|
|
|
tail = (struct rip_md5_tail *) ((char *) packet + (ntohs(block->packetlen) ));
|
|
|
|
if ((tail->mustbeFFFF != 0xffff) || (tail->mustbe0001 != 0x0100)) {
|
2015-05-19 07:57:10 +00:00
|
|
|
log(L_ERR "MD5 tail signature is not there" );
|
1999-11-25 14:54:08 +00:00
|
|
|
return 1;
|
|
|
|
}
|
1999-05-31 19:16:22 +00:00
|
|
|
|
2004-06-26 20:11:14 +00:00
|
|
|
WALK_LIST(ptmp, *l)
|
|
|
|
{
|
2004-09-08 16:04:02 +00:00
|
|
|
if (block->keyid != ptmp->id) continue;
|
2008-11-05 21:36:49 +00:00
|
|
|
if ((ptmp->genfrom > now_real) || (ptmp->gento < now_real)) continue;
|
2004-06-26 20:11:14 +00:00
|
|
|
pass = ptmp;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
if(!pass) return 1;
|
|
|
|
|
|
|
|
if (!neigh) {
|
2015-05-19 07:57:10 +00:00
|
|
|
log(L_AUTH "Non-neighbour MD5 checksummed packet?" );
|
2004-06-26 20:11:14 +00:00
|
|
|
} else {
|
|
|
|
if (neigh->aux > block->seq) {
|
2015-05-19 07:57:10 +00:00
|
|
|
log(L_AUTH "MD5 protected packet with lower numbers" );
|
2004-06-26 20:11:14 +00:00
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
neigh->aux = block->seq;
|
1999-05-31 17:12:38 +00:00
|
|
|
}
|
2004-06-26 20:11:14 +00:00
|
|
|
|
|
|
|
memcpy(md5sum_packet, tail->md5, 16);
|
2014-10-24 08:27:21 +00:00
|
|
|
strncpy(tail->md5, pass->password, 16);
|
2004-06-26 20:11:14 +00:00
|
|
|
|
2015-05-13 07:32:00 +00:00
|
|
|
md5_init(&ctxt);
|
|
|
|
md5_update(&ctxt, (char *) packet, ntohs(block->packetlen) + sizeof(struct rip_block_auth) );
|
2015-05-13 08:55:02 +00:00
|
|
|
md5sum_computed = md5_final(&ctxt);
|
2004-06-26 20:11:14 +00:00
|
|
|
if (memcmp(md5sum_packet, md5sum_computed, 16))
|
|
|
|
return 1;
|
1999-05-31 17:12:38 +00:00
|
|
|
}
|
1999-05-11 09:53:45 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2000-06-05 17:13:36 +00:00
|
|
|
/*
|
2000-06-05 12:52:57 +00:00
|
|
|
* rip_outgoing_authentication - append authentication information to the packet.
|
|
|
|
* %num: number of rip_blocks already in packets. This function returns size of packet to send.
|
|
|
|
*/
|
1999-11-25 14:54:08 +00:00
|
|
|
int
|
1999-05-31 17:12:38 +00:00
|
|
|
rip_outgoing_authentication( struct proto *p, struct rip_block_auth *block, struct rip_packet *packet, int num )
|
1999-05-11 09:53:45 +00:00
|
|
|
{
|
2008-11-08 16:24:23 +00:00
|
|
|
struct password_item *passwd = password_find(P_CF->passwords, 1);
|
1999-11-25 14:54:08 +00:00
|
|
|
|
|
|
|
if (!P_CF->authtype)
|
|
|
|
return PACKETLEN(num);
|
|
|
|
|
2015-05-19 07:57:10 +00:00
|
|
|
DBG("Outgoing authentication: " );
|
1999-05-11 09:53:45 +00:00
|
|
|
|
1999-08-18 13:19:33 +00:00
|
|
|
if (!passwd) {
|
2015-05-19 07:57:10 +00:00
|
|
|
log(L_ERR "No suitable password found for authentication" );
|
1999-11-25 14:54:08 +00:00
|
|
|
return PACKETLEN(num);
|
1999-08-18 13:19:33 +00:00
|
|
|
}
|
|
|
|
|
2003-04-06 18:38:01 +00:00
|
|
|
block->authtype = htons(P_CF->authtype);
|
1999-08-18 13:19:33 +00:00
|
|
|
block->mustbeFFFF = 0xffff;
|
1999-05-11 09:53:45 +00:00
|
|
|
switch (P_CF->authtype) {
|
|
|
|
case AT_PLAINTEXT:
|
2014-10-24 08:27:21 +00:00
|
|
|
strncpy( (char *) (&block->packetlen), passwd->password, 16);
|
1999-11-25 14:54:08 +00:00
|
|
|
return PACKETLEN(num);
|
1999-08-18 13:19:33 +00:00
|
|
|
case AT_MD5:
|
|
|
|
{
|
|
|
|
struct rip_md5_tail *tail;
|
2015-05-19 07:57:10 +00:00
|
|
|
struct md5_context ctxt;
|
2004-05-31 18:11:16 +00:00
|
|
|
static u32 sequence = 0;
|
1999-08-18 13:19:33 +00:00
|
|
|
|
|
|
|
if (num > PACKET_MD5_MAX)
|
2015-05-19 07:57:10 +00:00
|
|
|
bug("We can not add MD5 authentication to this long packet" );
|
1999-08-18 13:19:33 +00:00
|
|
|
|
2004-05-31 18:11:16 +00:00
|
|
|
/* need to preset the sequence number to a sane value */
|
2004-05-31 20:35:19 +00:00
|
|
|
if (!sequence)
|
2004-05-31 18:11:16 +00:00
|
|
|
sequence = (u32) time(NULL);
|
|
|
|
|
1999-08-18 13:19:33 +00:00
|
|
|
block->keyid = passwd->id;
|
2003-04-06 18:38:01 +00:00
|
|
|
block->authlen = sizeof(struct rip_block_auth);
|
1999-08-18 13:19:33 +00:00
|
|
|
block->seq = sequence++;
|
|
|
|
block->zero0 = 0;
|
1999-11-25 14:54:08 +00:00
|
|
|
block->zero1 = 0;
|
2003-04-06 18:38:01 +00:00
|
|
|
block->packetlen = htons(PACKETLEN(num));
|
|
|
|
tail = (struct rip_md5_tail *) ((char *) packet + PACKETLEN(num) );
|
1999-08-18 13:19:33 +00:00
|
|
|
tail->mustbeFFFF = 0xffff;
|
2003-04-06 18:38:01 +00:00
|
|
|
tail->mustbe0001 = 0x0100;
|
1999-08-18 13:19:33 +00:00
|
|
|
|
2014-10-24 08:27:21 +00:00
|
|
|
strncpy(tail->md5, passwd->password, 16);
|
2015-05-13 07:32:00 +00:00
|
|
|
md5_init(&ctxt);
|
|
|
|
md5_update(&ctxt, (char *) packet, PACKETLEN(num) + sizeof(struct rip_md5_tail));
|
2015-05-13 08:55:02 +00:00
|
|
|
memcpy(tail->md5, md5_final(&ctxt), MD5_SIZE);
|
1999-11-25 15:03:12 +00:00
|
|
|
return PACKETLEN(num) + block->authlen;
|
1999-05-31 17:12:38 +00:00
|
|
|
}
|
1999-11-25 14:54:08 +00:00
|
|
|
default:
|
2015-05-19 07:57:10 +00:00
|
|
|
bug("Unknown authtype in outgoing authentication?" );
|
1999-05-11 09:53:45 +00:00
|
|
|
}
|
|
|
|
}
|