dhcpv4.rs 18 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508
  1. use crate::socket::SocketHandle;
  2. use crate::socket::{Context, SocketMeta};
  3. use crate::time::{Duration, Instant};
  4. use crate::wire::dhcpv4::field as dhcpv4_field;
  5. use crate::wire::{
  6. DhcpMessageType, DhcpPacket, DhcpRepr, IpAddress, IpProtocol, Ipv4Address, Ipv4Cidr, Ipv4Repr,
  7. UdpRepr, DHCP_CLIENT_PORT, DHCP_MAX_DNS_SERVER_COUNT, DHCP_SERVER_PORT, UDP_HEADER_LEN,
  8. };
  9. use crate::{Error, Result};
  10. use super::{PollAt, Socket};
  11. const DISCOVER_TIMEOUT: Duration = Duration::from_secs(10);
  12. // timeout doubles every 2 tries.
  13. // total time 5 + 5 + 10 + 10 + 20 = 50s
  14. const REQUEST_TIMEOUT: Duration = Duration::from_secs(5);
  15. const REQUEST_RETRIES: u16 = 5;
  16. const MIN_RENEW_TIMEOUT: Duration = Duration::from_secs(60);
  17. const DEFAULT_LEASE_DURATION: Duration = Duration::from_secs(120);
  18. const PARAMETER_REQUEST_LIST: &[u8] = &[
  19. dhcpv4_field::OPT_SUBNET_MASK,
  20. dhcpv4_field::OPT_ROUTER,
  21. dhcpv4_field::OPT_DOMAIN_NAME_SERVER,
  22. ];
  23. /// IPv4 configuration data provided by the DHCP server.
  24. #[derive(Debug, Eq, PartialEq)]
  25. #[cfg_attr(feature = "defmt", derive(defmt::Format))]
  26. pub struct Config {
  27. /// IP address
  28. pub address: Ipv4Cidr,
  29. /// Router address, also known as default gateway. Does not necessarily
  30. /// match the DHCP server's address.
  31. pub router: Option<Ipv4Address>,
  32. /// DNS servers
  33. pub dns_servers: [Option<Ipv4Address>; DHCP_MAX_DNS_SERVER_COUNT],
  34. }
  35. /// Information on how to reach a DHCP server.
  36. #[derive(Debug, Clone, Copy)]
  37. #[cfg_attr(feature = "defmt", derive(defmt::Format))]
  38. struct ServerInfo {
  39. /// IP address to use as destination in outgoing packets
  40. address: Ipv4Address,
  41. /// Server identifier to use in outgoing packets. Usually equal to server_address,
  42. /// but may differ in some situations (eg DHCP relays)
  43. identifier: Ipv4Address,
  44. }
  45. #[derive(Debug)]
  46. #[cfg_attr(feature = "defmt", derive(defmt::Format))]
  47. struct DiscoverState {
  48. /// When to send next request
  49. retry_at: Instant,
  50. }
  51. #[derive(Debug)]
  52. #[cfg_attr(feature = "defmt", derive(defmt::Format))]
  53. struct RequestState {
  54. /// When to send next request
  55. retry_at: Instant,
  56. /// How many retries have been done
  57. retry: u16,
  58. /// Server we're trying to request from
  59. server: ServerInfo,
  60. /// IP address that we're trying to request.
  61. requested_ip: Ipv4Address,
  62. }
  63. #[derive(Debug)]
  64. #[cfg_attr(feature = "defmt", derive(defmt::Format))]
  65. struct RenewState {
  66. /// Server that gave us the lease
  67. server: ServerInfo,
  68. /// Active network config
  69. config: Config,
  70. /// Renew timer. When reached, we will start attempting
  71. /// to renew this lease with the DHCP server.
  72. /// Must be less or equal than `expires_at`.
  73. renew_at: Instant,
  74. /// Expiration timer. When reached, this lease is no longer valid, so it must be
  75. /// thrown away and the ethernet interface deconfigured.
  76. expires_at: Instant,
  77. }
  78. #[derive(Debug)]
  79. #[cfg_attr(feature = "defmt", derive(defmt::Format))]
  80. enum ClientState {
  81. /// Discovering the DHCP server
  82. Discovering(DiscoverState),
  83. /// Requesting an address
  84. Requesting(RequestState),
  85. /// Having an address, refresh it periodically.
  86. Renewing(RenewState),
  87. }
  88. /// Return value for the `Dhcpv4Socket::poll` function
  89. pub enum Event<'a> {
  90. /// Configuration has been lost (for example, the lease has expired)
  91. Deconfigured,
  92. /// Configuration has been newly acquired, or modified.
  93. Configured(&'a Config),
  94. }
  95. #[derive(Debug)]
  96. pub struct Dhcpv4Socket {
  97. pub(crate) meta: SocketMeta,
  98. /// State of the DHCP client.
  99. state: ClientState,
  100. /// Set to true on config/state change, cleared back to false by the `config` function.
  101. config_changed: bool,
  102. /// xid of the last sent message.
  103. transaction_id: u32,
  104. /// Max lease duration. If set, it sets a maximum cap to the server-provided lease duration.
  105. /// Useful to react faster to IP configuration changes and to test whether renews work correctly.
  106. max_lease_duration: Option<Duration>,
  107. }
  108. /// DHCP client socket.
  109. ///
  110. /// The socket acquires an IP address configuration through DHCP autonomously.
  111. /// You must query the configuration with `.poll()` after every call to `Interface::poll()`,
  112. /// and apply the configuration to the `Interface`.
  113. impl Dhcpv4Socket {
  114. /// Create a DHCPv4 socket
  115. #[allow(clippy::new_without_default)]
  116. pub fn new() -> Self {
  117. Dhcpv4Socket {
  118. meta: SocketMeta::default(),
  119. state: ClientState::Discovering(DiscoverState {
  120. retry_at: Instant::from_millis(0),
  121. }),
  122. config_changed: true,
  123. transaction_id: 1,
  124. max_lease_duration: None,
  125. }
  126. }
  127. pub fn max_lease_duration(&self) -> Option<Duration> {
  128. self.max_lease_duration
  129. }
  130. pub fn set_max_lease_duration(&mut self, max_lease_duration: Option<Duration>) {
  131. self.max_lease_duration = max_lease_duration;
  132. }
  133. pub(crate) fn poll_at(&self, _cx: &Context) -> PollAt {
  134. let t = match &self.state {
  135. ClientState::Discovering(state) => state.retry_at,
  136. ClientState::Requesting(state) => state.retry_at,
  137. ClientState::Renewing(state) => state.renew_at.min(state.expires_at),
  138. };
  139. PollAt::Time(t)
  140. }
  141. pub(crate) fn process(
  142. &mut self,
  143. cx: &Context,
  144. ip_repr: &Ipv4Repr,
  145. repr: &UdpRepr,
  146. payload: &[u8],
  147. ) -> Result<()> {
  148. let src_ip = ip_repr.src_addr;
  149. // This is enforced in interface.rs.
  150. assert!(repr.src_port == DHCP_SERVER_PORT && repr.dst_port == DHCP_CLIENT_PORT);
  151. let dhcp_packet = match DhcpPacket::new_checked(payload) {
  152. Ok(dhcp_packet) => dhcp_packet,
  153. Err(e) => {
  154. net_debug!("DHCP invalid pkt from {}: {:?}", src_ip, e);
  155. return Ok(());
  156. }
  157. };
  158. let dhcp_repr = match DhcpRepr::parse(&dhcp_packet) {
  159. Ok(dhcp_repr) => dhcp_repr,
  160. Err(e) => {
  161. net_debug!("DHCP error parsing pkt from {}: {:?}", src_ip, e);
  162. return Ok(());
  163. }
  164. };
  165. if dhcp_repr.client_hardware_address != cx.ethernet_address.unwrap() {
  166. return Ok(());
  167. }
  168. if dhcp_repr.transaction_id != self.transaction_id {
  169. return Ok(());
  170. }
  171. let server_identifier = match dhcp_repr.server_identifier {
  172. Some(server_identifier) => server_identifier,
  173. None => {
  174. net_debug!(
  175. "DHCP ignoring {:?} because missing server_identifier",
  176. dhcp_repr.message_type
  177. );
  178. return Ok(());
  179. }
  180. };
  181. net_debug!(
  182. "DHCP recv {:?} from {} ({})",
  183. dhcp_repr.message_type,
  184. src_ip,
  185. server_identifier
  186. );
  187. match (&mut self.state, dhcp_repr.message_type) {
  188. (ClientState::Discovering(_state), DhcpMessageType::Offer) => {
  189. if !dhcp_repr.your_ip.is_unicast() {
  190. net_debug!("DHCP ignoring OFFER because your_ip is not unicast");
  191. return Ok(());
  192. }
  193. self.state = ClientState::Requesting(RequestState {
  194. retry_at: cx.now,
  195. retry: 0,
  196. server: ServerInfo {
  197. address: src_ip,
  198. identifier: server_identifier,
  199. },
  200. requested_ip: dhcp_repr.your_ip, // use the offered ip
  201. });
  202. }
  203. (ClientState::Requesting(state), DhcpMessageType::Ack) => {
  204. if let Some((config, renew_at, expires_at)) =
  205. Self::parse_ack(cx.now, &dhcp_repr, self.max_lease_duration)
  206. {
  207. self.config_changed = true;
  208. self.state = ClientState::Renewing(RenewState {
  209. server: state.server,
  210. config,
  211. renew_at,
  212. expires_at,
  213. });
  214. }
  215. }
  216. (ClientState::Requesting(_), DhcpMessageType::Nak) => {
  217. self.reset();
  218. }
  219. (ClientState::Renewing(state), DhcpMessageType::Ack) => {
  220. if let Some((config, renew_at, expires_at)) =
  221. Self::parse_ack(cx.now, &dhcp_repr, self.max_lease_duration)
  222. {
  223. state.renew_at = renew_at;
  224. state.expires_at = expires_at;
  225. if state.config != config {
  226. self.config_changed = true;
  227. state.config = config;
  228. }
  229. }
  230. }
  231. (ClientState::Renewing(_), DhcpMessageType::Nak) => {
  232. self.reset();
  233. }
  234. _ => {
  235. net_debug!(
  236. "DHCP ignoring {:?}: unexpected in current state",
  237. dhcp_repr.message_type
  238. );
  239. }
  240. }
  241. Ok(())
  242. }
  243. fn parse_ack(
  244. now: Instant,
  245. dhcp_repr: &DhcpRepr,
  246. max_lease_duration: Option<Duration>,
  247. ) -> Option<(Config, Instant, Instant)> {
  248. let subnet_mask = match dhcp_repr.subnet_mask {
  249. Some(subnet_mask) => subnet_mask,
  250. None => {
  251. net_debug!("DHCP ignoring ACK because missing subnet_mask");
  252. return None;
  253. }
  254. };
  255. let prefix_len = match IpAddress::Ipv4(subnet_mask).to_prefix_len() {
  256. Some(prefix_len) => prefix_len,
  257. None => {
  258. net_debug!("DHCP ignoring ACK because subnet_mask is not a valid mask");
  259. return None;
  260. }
  261. };
  262. if !dhcp_repr.your_ip.is_unicast() {
  263. net_debug!("DHCP ignoring ACK because your_ip is not unicast");
  264. return None;
  265. }
  266. let mut lease_duration = dhcp_repr
  267. .lease_duration
  268. .map(|d| Duration::from_secs(d as _))
  269. .unwrap_or(DEFAULT_LEASE_DURATION);
  270. if let Some(max_lease_duration) = max_lease_duration {
  271. lease_duration = lease_duration.min(max_lease_duration);
  272. }
  273. // Cleanup the DNS servers list, keeping only unicasts/
  274. // TP-Link TD-W8970 sends 0.0.0.0 as second DNS server if there's only one configured :(
  275. let mut dns_servers = [None; DHCP_MAX_DNS_SERVER_COUNT];
  276. if let Some(received) = dhcp_repr.dns_servers {
  277. let mut i = 0;
  278. for addr in received.iter().flatten() {
  279. if addr.is_unicast() {
  280. // This can never be out-of-bounds since both arrays have length DHCP_MAX_DNS_SERVER_COUNT
  281. dns_servers[i] = Some(*addr);
  282. i += 1;
  283. }
  284. }
  285. }
  286. let config = Config {
  287. address: Ipv4Cidr::new(dhcp_repr.your_ip, prefix_len),
  288. router: dhcp_repr.router,
  289. dns_servers: dns_servers,
  290. };
  291. // RFC 2131 indicates clients should renew a lease halfway through its expiration.
  292. let renew_at = now + lease_duration / 2;
  293. let expires_at = now + lease_duration;
  294. Some((config, renew_at, expires_at))
  295. }
  296. pub(crate) fn dispatch<F>(&mut self, cx: &Context, emit: F) -> Result<()>
  297. where
  298. F: FnOnce((Ipv4Repr, UdpRepr, DhcpRepr)) -> Result<()>,
  299. {
  300. // note: Dhcpv4Socket is only usable in ethernet mediums, so the
  301. // unwrap can never fail.
  302. let ethernet_addr = cx.ethernet_address.unwrap();
  303. // Worst case biggest IPv4 header length.
  304. // 0x0f * 4 = 60 bytes.
  305. const MAX_IPV4_HEADER_LEN: usize = 60;
  306. // We don't directly increment transaction_id because sending the packet
  307. // may fail. We only want to update state after succesfully sending.
  308. let next_transaction_id = self.transaction_id + 1;
  309. let mut dhcp_repr = DhcpRepr {
  310. message_type: DhcpMessageType::Discover,
  311. transaction_id: next_transaction_id,
  312. client_hardware_address: ethernet_addr,
  313. client_ip: Ipv4Address::UNSPECIFIED,
  314. your_ip: Ipv4Address::UNSPECIFIED,
  315. server_ip: Ipv4Address::UNSPECIFIED,
  316. router: None,
  317. subnet_mask: None,
  318. relay_agent_ip: Ipv4Address::UNSPECIFIED,
  319. broadcast: true,
  320. requested_ip: None,
  321. client_identifier: Some(ethernet_addr),
  322. server_identifier: None,
  323. parameter_request_list: Some(PARAMETER_REQUEST_LIST),
  324. max_size: Some((cx.caps.ip_mtu() - MAX_IPV4_HEADER_LEN - UDP_HEADER_LEN) as u16),
  325. lease_duration: None,
  326. dns_servers: None,
  327. };
  328. let udp_repr = UdpRepr {
  329. src_port: DHCP_CLIENT_PORT,
  330. dst_port: DHCP_SERVER_PORT,
  331. };
  332. let mut ipv4_repr = Ipv4Repr {
  333. src_addr: Ipv4Address::UNSPECIFIED,
  334. dst_addr: Ipv4Address::BROADCAST,
  335. protocol: IpProtocol::Udp,
  336. payload_len: 0, // filled right before emit
  337. hop_limit: 64,
  338. };
  339. match &mut self.state {
  340. ClientState::Discovering(state) => {
  341. if cx.now < state.retry_at {
  342. return Err(Error::Exhausted);
  343. }
  344. // send packet
  345. net_debug!(
  346. "DHCP send DISCOVER to {}: {:?}",
  347. ipv4_repr.dst_addr,
  348. dhcp_repr
  349. );
  350. ipv4_repr.payload_len = udp_repr.header_len() + dhcp_repr.buffer_len();
  351. emit((ipv4_repr, udp_repr, dhcp_repr))?;
  352. // Update state AFTER the packet has been successfully sent.
  353. state.retry_at = cx.now + DISCOVER_TIMEOUT;
  354. self.transaction_id = next_transaction_id;
  355. Ok(())
  356. }
  357. ClientState::Requesting(state) => {
  358. if cx.now < state.retry_at {
  359. return Err(Error::Exhausted);
  360. }
  361. if state.retry >= REQUEST_RETRIES {
  362. net_debug!("DHCP request retries exceeded, restarting discovery");
  363. self.reset();
  364. // return Ok so we get polled again
  365. return Ok(());
  366. }
  367. dhcp_repr.message_type = DhcpMessageType::Request;
  368. dhcp_repr.broadcast = false;
  369. dhcp_repr.requested_ip = Some(state.requested_ip);
  370. dhcp_repr.server_identifier = Some(state.server.identifier);
  371. net_debug!(
  372. "DHCP send request to {}: {:?}",
  373. ipv4_repr.dst_addr,
  374. dhcp_repr
  375. );
  376. ipv4_repr.payload_len = udp_repr.header_len() + dhcp_repr.buffer_len();
  377. emit((ipv4_repr, udp_repr, dhcp_repr))?;
  378. // Exponential backoff: Double every 2 retries.
  379. state.retry_at = cx.now + (REQUEST_TIMEOUT << (state.retry as u32 / 2));
  380. state.retry += 1;
  381. self.transaction_id = next_transaction_id;
  382. Ok(())
  383. }
  384. ClientState::Renewing(state) => {
  385. if state.expires_at <= cx.now {
  386. net_debug!("DHCP lease expired");
  387. self.reset();
  388. // return Ok so we get polled again
  389. return Ok(());
  390. }
  391. if cx.now < state.renew_at {
  392. return Err(Error::Exhausted);
  393. }
  394. ipv4_repr.src_addr = state.config.address.address();
  395. ipv4_repr.dst_addr = state.server.address;
  396. dhcp_repr.message_type = DhcpMessageType::Request;
  397. dhcp_repr.client_ip = state.config.address.address();
  398. dhcp_repr.broadcast = false;
  399. net_debug!("DHCP send renew to {}: {:?}", ipv4_repr.dst_addr, dhcp_repr);
  400. ipv4_repr.payload_len = udp_repr.header_len() + dhcp_repr.buffer_len();
  401. emit((ipv4_repr, udp_repr, dhcp_repr))?;
  402. // In both RENEWING and REBINDING states, if the client receives no
  403. // response to its DHCPREQUEST message, the client SHOULD wait one-half
  404. // of the remaining time until T2 (in RENEWING state) and one-half of
  405. // the remaining lease time (in REBINDING state), down to a minimum of
  406. // 60 seconds, before retransmitting the DHCPREQUEST message.
  407. state.renew_at = cx.now + MIN_RENEW_TIMEOUT.max((state.expires_at - cx.now) / 2);
  408. self.transaction_id = next_transaction_id;
  409. Ok(())
  410. }
  411. }
  412. }
  413. /// Return the socket handle.
  414. #[inline]
  415. pub fn handle(&self) -> SocketHandle {
  416. self.meta.handle
  417. }
  418. /// Reset state and restart discovery phase.
  419. ///
  420. /// Use this to speed up acquisition of an address in a new
  421. /// network if a link was down and it is now back up.
  422. pub fn reset(&mut self) {
  423. net_trace!("DHCP reset");
  424. if let ClientState::Renewing(_) = &self.state {
  425. self.config_changed = true;
  426. }
  427. self.state = ClientState::Discovering(DiscoverState {
  428. retry_at: Instant::from_millis(0),
  429. });
  430. }
  431. /// Query the socket for configuration changes.
  432. ///
  433. /// The socket has an internal "configuration changed" flag. If
  434. /// set, this function returns the configuration and resets the flag.
  435. pub fn poll(&mut self) -> Option<Event<'_>> {
  436. if !self.config_changed {
  437. None
  438. } else if let ClientState::Renewing(state) = &self.state {
  439. self.config_changed = false;
  440. Some(Event::Configured(&state.config))
  441. } else {
  442. self.config_changed = false;
  443. Some(Event::Deconfigured)
  444. }
  445. }
  446. }
  447. impl<'a> From<Dhcpv4Socket> for Socket<'a> {
  448. fn from(val: Dhcpv4Socket) -> Self {
  449. Socket::Dhcpv4(val)
  450. }
  451. }