911 lines
29 KiB
C
911 lines
29 KiB
C
/*
|
|
* Copyright (c) 2012, Thingsquare, http://www.thingsquare.com/.
|
|
* All rights reserved.
|
|
*
|
|
* Redistribution and use in source and binary forms, with or without
|
|
* modification, are permitted provided that the following conditions
|
|
* are met:
|
|
* 1. Redistributions of source code must retain the above copyright
|
|
* notice, this list of conditions and the following disclaimer.
|
|
* 2. Redistributions in binary form must reproduce the above copyright
|
|
* notice, this list of conditions and the following disclaimer in the
|
|
* documentation and/or other materials provided with the distribution.
|
|
*
|
|
* 3. Neither the name of the copyright holder nor the names of its
|
|
* contributors may be used to endorse or promote products derived
|
|
* from this software without specific prior written permission.
|
|
*
|
|
* THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
|
|
* ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
|
|
* LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS
|
|
* FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE
|
|
* COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT,
|
|
* INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES
|
|
* (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR
|
|
* SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
|
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
|
|
* STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
|
|
* ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
|
|
* OF THE POSSIBILITY OF SUCH DAMAGE.
|
|
*
|
|
*/
|
|
|
|
/* The ip64 module is a translator between IPv6 and IPv4 packets. The
|
|
IPv6 packets come from an IPv6 network and are translated into a
|
|
single IPv4 host, as shown in the ASCII graphics below. The IPv6
|
|
network typically is a low-power RF network and the IPv4 network
|
|
typically is an Ethernet.
|
|
|
|
+----------------+
|
|
| |
|
|
| | +------+
|
|
| IPv6 network |---| ip64 |-- IPv4 network
|
|
| | +------+
|
|
| |
|
|
+----------------+
|
|
|
|
ip64 maps all IPv6 addresses from inside the IPv6 network to its
|
|
own IPv4 address. This IPv4 address would typically have been
|
|
obtained with DHCP from the IPv4 network, but the exact way this
|
|
has been obtained is outside the scope of the ip64 module. The IPv4
|
|
address is given to the ip64 module through the
|
|
ip64_set_ipv4_address() function.
|
|
*/
|
|
|
|
#include "ip64.h"
|
|
#include "ip64-addr.h"
|
|
#include "ip64-addrmap.h"
|
|
#include "ip64-conf.h"
|
|
#include "ip64-special-ports.h"
|
|
#include "ip64-eth-interface.h"
|
|
#include "ip64-slip-interface.h"
|
|
#include "ip64-dns64.h"
|
|
#include "net/ipv6/uip-ds6.h"
|
|
#include "ip64-ipv4-dhcp.h"
|
|
#include "contiki-net.h"
|
|
|
|
#include "net/ip/uip-debug.h"
|
|
|
|
#include <string.h> /* for memcpy() */
|
|
#include <stdio.h> /* for printf() */
|
|
|
|
#define DEBUG 0
|
|
|
|
#if DEBUG
|
|
#undef PRINTF
|
|
#define PRINTF(...) printf(__VA_ARGS__)
|
|
#else /* DEBUG */
|
|
#define PRINTF(...)
|
|
#endif /* DEBUG */
|
|
|
|
struct ipv6_hdr {
|
|
uint8_t vtc;
|
|
uint8_t tcflow;
|
|
uint16_t flow;
|
|
uint8_t len[2];
|
|
uint8_t nxthdr, hoplim;
|
|
uip_ip6addr_t srcipaddr, destipaddr;
|
|
};
|
|
|
|
struct ipv4_hdr {
|
|
uint8_t vhl,
|
|
tos,
|
|
len[2],
|
|
ipid[2],
|
|
ipoffset[2],
|
|
ttl,
|
|
proto;
|
|
uint16_t ipchksum;
|
|
uip_ip4addr_t srcipaddr, destipaddr;
|
|
};
|
|
|
|
#define EPHEMERAL_PORTRANGE 1024
|
|
|
|
#define IPV6_HDRLEN 40
|
|
#define IPV4_HDRLEN 20
|
|
|
|
#define IP_PROTO_ICMPV4 1
|
|
#define IP_PROTO_TCP 6
|
|
#define IP_PROTO_UDP 17
|
|
#define IP_PROTO_ICMPV6 58
|
|
|
|
#define ICMP_ECHO_REPLY 0
|
|
#define ICMP_ECHO 8
|
|
#define ICMP6_ECHO_REPLY 129
|
|
#define ICMP6_ECHO 128
|
|
|
|
struct tcp_hdr {
|
|
uint16_t srcport;
|
|
uint16_t destport;
|
|
uint8_t seqno[4];
|
|
uint8_t ackno[4];
|
|
uint8_t tcpoffset;
|
|
uint8_t flags;
|
|
uint8_t wnd[2];
|
|
uint16_t tcpchksum;
|
|
uint8_t urgp[2];
|
|
uint8_t optdata[4];
|
|
};
|
|
|
|
struct udp_hdr {
|
|
uint16_t srcport;
|
|
uint16_t destport;
|
|
uint16_t udplen;
|
|
uint16_t udpchksum;
|
|
};
|
|
|
|
struct icmpv4_hdr {
|
|
uint8_t type, icode;
|
|
uint16_t icmpchksum;
|
|
};
|
|
|
|
struct icmpv6_hdr {
|
|
uint8_t type, icode;
|
|
uint16_t icmpchksum;
|
|
uint16_t id, seqno;
|
|
};
|
|
|
|
#define BUFSIZE UIP_BUFSIZE
|
|
|
|
uip_buf_t ip64_packet_buffer_aligned;
|
|
uint8_t *ip64_packet_buffer = ip64_packet_buffer_aligned.u8;
|
|
|
|
uint16_t ip64_packet_buffer_maxlen = BUFSIZE;
|
|
|
|
static uip_ip4addr_t ip64_hostaddr;
|
|
static uip_ip4addr_t ip64_netmask;
|
|
static uip_ip4addr_t ip64_draddr;
|
|
|
|
static uint16_t ipid;
|
|
static uint8_t ip64_hostaddr_configured = 0;
|
|
|
|
static uip_ip6addr_t ipv6_local_address;
|
|
static uint8_t ipv6_local_address_configured = 0;
|
|
|
|
static uip_ip4addr_t ipv4_broadcast_addr;
|
|
|
|
/* Lifetimes for address mappings. */
|
|
#define SYN_LIFETIME (CLOCK_SECOND * 20)
|
|
#define RST_LIFETIME (CLOCK_SECOND * 30)
|
|
#define DEFAULT_LIFETIME (CLOCK_SECOND * 60 * 5)
|
|
|
|
/* TCP flag defines */
|
|
#define TCP_FIN 0x01
|
|
#define TCP_SYN 0x02
|
|
#define TCP_RST 0x04
|
|
|
|
#define DNS_PORT 53
|
|
|
|
/*---------------------------------------------------------------------------*/
|
|
void
|
|
ip64_init(void)
|
|
{
|
|
int i;
|
|
uint8_t state;
|
|
|
|
uip_ipaddr(&ipv4_broadcast_addr, 255,255,255,255);
|
|
ip64_hostaddr_configured = 0;
|
|
|
|
PRINTF("ip64_init\n");
|
|
IP64_ETH_DRIVER.init();
|
|
#if IP64_CONF_DHCP
|
|
ip64_ipv4_dhcp_init();
|
|
#endif /* IP64_CONF_DHCP */
|
|
|
|
/* Specify an IPv6 address for local communication to the
|
|
host. We'll just pick the first one we find in our list. */
|
|
for(i = 0; i < UIP_DS6_ADDR_NB; i++) {
|
|
state = uip_ds6_if.addr_list[i].state;
|
|
PRINTF("i %d used %d\n", i, uip_ds6_if.addr_list[i].isused);
|
|
if(uip_ds6_if.addr_list[i].isused &&
|
|
(state == ADDR_TENTATIVE || state == ADDR_PREFERRED)) {
|
|
ip64_set_ipv6_address(&uip_ds6_if.addr_list[i].ipaddr);
|
|
break;
|
|
}
|
|
}
|
|
|
|
}
|
|
/*---------------------------------------------------------------------------*/
|
|
void
|
|
ip64_set_hostaddr(const uip_ip4addr_t *hostaddr)
|
|
{
|
|
ip64_hostaddr_configured = 1;
|
|
ip64_addr_copy4(&ip64_hostaddr, hostaddr);
|
|
}
|
|
/*---------------------------------------------------------------------------*/
|
|
void
|
|
ip64_set_netmask(const uip_ip4addr_t *netmask)
|
|
{
|
|
ip64_addr_copy4(&ip64_netmask, netmask);
|
|
}
|
|
/*---------------------------------------------------------------------------*/
|
|
void
|
|
ip64_set_draddr(const uip_ip4addr_t *draddr)
|
|
{
|
|
ip64_addr_copy4(&ip64_draddr, draddr);
|
|
}
|
|
/*---------------------------------------------------------------------------*/
|
|
const uip_ip4addr_t *
|
|
ip64_get_hostaddr(void)
|
|
{
|
|
return &ip64_hostaddr;
|
|
}
|
|
/*---------------------------------------------------------------------------*/
|
|
const uip_ip4addr_t *
|
|
ip64_get_netmask(void)
|
|
{
|
|
return &ip64_netmask;
|
|
}
|
|
/*---------------------------------------------------------------------------*/
|
|
const uip_ip4addr_t *
|
|
ip64_get_draddr(void)
|
|
{
|
|
return &ip64_draddr;
|
|
}
|
|
/*---------------------------------------------------------------------------*/
|
|
void
|
|
ip64_set_ipv4_address(const uip_ip4addr_t *addr, const uip_ip4addr_t *netmask)
|
|
{
|
|
ip64_set_hostaddr(addr);
|
|
ip64_set_netmask(netmask);
|
|
|
|
PRINTF("ip64_set_ipv4_address: configuring address %d.%d.%d.%d/%d.%d.%d.%d\n",
|
|
ip64_hostaddr.u8[0], ip64_hostaddr.u8[1],
|
|
ip64_hostaddr.u8[2], ip64_hostaddr.u8[3],
|
|
ip64_netmask.u8[0], ip64_netmask.u8[1],
|
|
ip64_netmask.u8[2], ip64_netmask.u8[3]);
|
|
}
|
|
/*---------------------------------------------------------------------------*/
|
|
void
|
|
ip64_set_ipv6_address(const uip_ip6addr_t *addr)
|
|
{
|
|
ip64_addr_copy6(&ipv6_local_address, (const uip_ip6addr_t *)addr);
|
|
ipv6_local_address_configured = 1;
|
|
#if DEBUG
|
|
PRINTF("ip64_set_ipv6_address: configuring address ");
|
|
uip_debug_ipaddr_print(addr);
|
|
PRINTF("\n");
|
|
#endif /* DEBUG */
|
|
}
|
|
/*---------------------------------------------------------------------------*/
|
|
static uint16_t
|
|
chksum(uint16_t sum, const uint8_t *data, uint16_t len)
|
|
{
|
|
uint16_t t;
|
|
const uint8_t *dataptr;
|
|
const uint8_t *last_byte;
|
|
|
|
dataptr = data;
|
|
last_byte = data + len - 1;
|
|
|
|
while(dataptr < last_byte) { /* At least two more bytes */
|
|
t = (dataptr[0] << 8) + dataptr[1];
|
|
sum += t;
|
|
if(sum < t) {
|
|
sum++; /* carry */
|
|
}
|
|
dataptr += 2;
|
|
}
|
|
|
|
if(dataptr == last_byte) {
|
|
t = (dataptr[0] << 8) + 0;
|
|
sum += t;
|
|
if(sum < t) {
|
|
sum++; /* carry */
|
|
}
|
|
}
|
|
|
|
/* Return sum in host byte order. */
|
|
return sum;
|
|
}
|
|
/*---------------------------------------------------------------------------*/
|
|
static uint16_t
|
|
ipv4_checksum(struct ipv4_hdr *hdr)
|
|
{
|
|
uint16_t sum;
|
|
|
|
sum = chksum(0, (uint8_t *)hdr, IPV4_HDRLEN);
|
|
return (sum == 0) ? 0xffff : uip_htons(sum);
|
|
}
|
|
/*---------------------------------------------------------------------------*/
|
|
static uint16_t
|
|
ipv4_transport_checksum(const uint8_t *packet, uint16_t len, uint8_t proto)
|
|
{
|
|
uint16_t transport_layer_len;
|
|
uint16_t sum;
|
|
struct ipv4_hdr *v4hdr = (struct ipv4_hdr *)packet;
|
|
|
|
transport_layer_len = len - IPV4_HDRLEN;
|
|
|
|
/* First sum pseudoheader. */
|
|
|
|
if(proto != IP_PROTO_ICMPV4) {
|
|
/* IP protocol and length fields. This addition cannot carry. */
|
|
sum = transport_layer_len + proto;
|
|
/* Sum IP source and destination addresses. */
|
|
sum = chksum(sum, (uint8_t *)&v4hdr->srcipaddr, 2 * sizeof(uip_ip4addr_t));
|
|
} else {
|
|
/* ping replies' checksums are calculated over the icmp-part only */
|
|
sum = 0;
|
|
}
|
|
|
|
/* Sum transport layer header and data. */
|
|
sum = chksum(sum, &packet[IPV4_HDRLEN], transport_layer_len);
|
|
|
|
return (sum == 0) ? 0xffff : uip_htons(sum);
|
|
}
|
|
/*---------------------------------------------------------------------------*/
|
|
static uint16_t
|
|
ipv6_transport_checksum(const uint8_t *packet, uint16_t len, uint8_t proto)
|
|
{
|
|
uint16_t transport_layer_len;
|
|
uint16_t sum;
|
|
struct ipv6_hdr *v6hdr = (struct ipv6_hdr *)packet;
|
|
|
|
transport_layer_len = len - IPV6_HDRLEN;
|
|
|
|
/* First sum pseudoheader. */
|
|
|
|
/* IP protocol and length fields. This addition cannot carry. */
|
|
sum = transport_layer_len + proto;
|
|
/* Sum IP source and destination addresses. */
|
|
sum = chksum(sum, (uint8_t *)&v6hdr->srcipaddr, sizeof(uip_ip6addr_t));
|
|
sum = chksum(sum, (uint8_t *)&v6hdr->destipaddr, sizeof(uip_ip6addr_t));
|
|
|
|
/* Sum transport layer header and data. */
|
|
sum = chksum(sum, &packet[IPV6_HDRLEN], transport_layer_len);
|
|
|
|
return (sum == 0) ? 0xffff : uip_htons(sum);
|
|
}
|
|
/*---------------------------------------------------------------------------*/
|
|
int
|
|
ip64_6to4(const uint8_t *ipv6packet, const uint16_t ipv6packet_len,
|
|
uint8_t *resultpacket)
|
|
{
|
|
struct ipv4_hdr *v4hdr;
|
|
struct ipv6_hdr *v6hdr;
|
|
struct udp_hdr *udphdr;
|
|
struct tcp_hdr *tcphdr;
|
|
struct icmpv4_hdr *icmpv4hdr;
|
|
struct icmpv6_hdr *icmpv6hdr;
|
|
uint16_t ipv6len, ipv4len;
|
|
struct ip64_addrmap_entry *m;
|
|
|
|
v6hdr = (struct ipv6_hdr *)ipv6packet;
|
|
v4hdr = (struct ipv4_hdr *)resultpacket;
|
|
|
|
if((v6hdr->len[0] << 8) + v6hdr->len[1] <= ipv6packet_len) {
|
|
ipv6len = (v6hdr->len[0] << 8) + v6hdr->len[1] + IPV6_HDRLEN;
|
|
} else {
|
|
PRINTF("ip64_6to4: packet smaller than reported in IPv6 header, dropping\n");
|
|
return 0;
|
|
}
|
|
|
|
/* We copy the data from the IPv6 packet into the IPv4 packet. We do
|
|
not modify the data in any way. */
|
|
memcpy(&resultpacket[IPV4_HDRLEN],
|
|
&ipv6packet[IPV6_HDRLEN],
|
|
ipv6len - IPV6_HDRLEN);
|
|
|
|
udphdr = (struct udp_hdr *)&resultpacket[IPV4_HDRLEN];
|
|
tcphdr = (struct tcp_hdr *)&resultpacket[IPV4_HDRLEN];
|
|
icmpv4hdr = (struct icmpv4_hdr *)&resultpacket[IPV4_HDRLEN];
|
|
icmpv6hdr = (struct icmpv6_hdr *)&ipv6packet[IPV6_HDRLEN];
|
|
|
|
/* Translate the IPv6 header into an IPv4 header. */
|
|
|
|
/* First the basics: the IPv4 version, header length, type of
|
|
service, and offset fields. Those are the same for all IPv4
|
|
packets we send, regardless of the values found in the IPv6
|
|
packet. */
|
|
v4hdr->vhl = 0x45;
|
|
v4hdr->tos = 0;
|
|
v4hdr->ipoffset[0] = v4hdr->ipoffset[1] = 0;
|
|
|
|
/* We assume that the IPv6 packet has a fixed size header with no
|
|
extension headers, and compute the length of the IPv4 packet and
|
|
place the resulting value in the IPv4 packet header. */
|
|
ipv4len = ipv6len - IPV6_HDRLEN + IPV4_HDRLEN;
|
|
v4hdr->len[0] = ipv4len >> 8;
|
|
v4hdr->len[1] = ipv4len & 0xff;
|
|
|
|
/* For simplicity, we set a unique IP id for each outgoing IPv4
|
|
packet. */
|
|
ipid++;
|
|
v4hdr->ipid[0] = ipid >> 8;
|
|
v4hdr->ipid[1] = ipid & 0xff;
|
|
|
|
/* Set the IPv4 protocol. We only support TCP, UDP, and ICMP at this
|
|
point. While the IPv4 header protocol numbers are the same as the
|
|
IPv6 next header numbers, the ICMPv4 and ICMPv6 numbers are
|
|
different so we cannot simply copy the contents of the IPv6 next
|
|
header field. */
|
|
switch(v6hdr->nxthdr) {
|
|
case IP_PROTO_TCP:
|
|
PRINTF("ip64_6to4: TCP header\n");
|
|
v4hdr->proto = IP_PROTO_TCP;
|
|
|
|
/* Compute and check the TCP checksum - since we're going to
|
|
recompute it ourselves, we must ensure that it was correct in
|
|
the first place. */
|
|
if(ipv6_transport_checksum(ipv6packet, ipv6len,
|
|
IP_PROTO_TCP) != 0xffff) {
|
|
PRINTF("Bad TCP checksum, dropping packet\n");
|
|
}
|
|
|
|
break;
|
|
|
|
case IP_PROTO_UDP:
|
|
PRINTF("ip64_6to4: UDP header\n");
|
|
v4hdr->proto = IP_PROTO_UDP;
|
|
|
|
/* Check if this is a DNS request. If so, we should rewrite it
|
|
with the DNS64 module. */
|
|
if(udphdr->destport == UIP_HTONS(DNS_PORT)) {
|
|
ip64_dns64_6to4((uint8_t *)v6hdr + IPV6_HDRLEN + sizeof(struct udp_hdr),
|
|
ipv6len - IPV6_HDRLEN - sizeof(struct udp_hdr),
|
|
(uint8_t *)udphdr + sizeof(struct udp_hdr),
|
|
BUFSIZE - IPV4_HDRLEN - sizeof(struct udp_hdr));
|
|
}
|
|
/* Compute and check the UDP checksum - since we're going to
|
|
recompute it ourselves, we must ensure that it was correct in
|
|
the first place. */
|
|
if(ipv6_transport_checksum(ipv6packet, ipv6len,
|
|
IP_PROTO_UDP) != 0xffff) {
|
|
PRINTF("Bad UDP checksum, dropping packet\n");
|
|
}
|
|
break;
|
|
|
|
case IP_PROTO_ICMPV6:
|
|
PRINTF("ip64_6to4: ICMPv6 header\n");
|
|
v4hdr->proto = IP_PROTO_ICMPV4;
|
|
/* Translate only ECHO_REPLY messages. */
|
|
if(icmpv6hdr->type == ICMP6_ECHO_REPLY) {
|
|
icmpv4hdr->type = ICMP_ECHO_REPLY;
|
|
} else {
|
|
PRINTF("ip64_6to4: ICMPv6 mapping for type %d not implemented.\n",
|
|
icmpv6hdr->type);
|
|
return 0;
|
|
}
|
|
break;
|
|
|
|
default:
|
|
/* We did not recognize the next header, and we do not attempt to
|
|
translate something we do not understand, so we return 0 to
|
|
indicate that no successful translation could be made. */
|
|
PRINTF("ip64_6to4: Could not convert IPv6 next hop %d to an IPv4 protocol number.\n",
|
|
v6hdr->nxthdr);
|
|
return 0;
|
|
}
|
|
|
|
/* We set the IPv4 ttl value to the hoplim number from the IPv6
|
|
header. This means that information about the IPv6 topology is
|
|
transported into to the IPv4 network. */
|
|
v4hdr->ttl = v6hdr->hoplim;
|
|
|
|
/* We next convert the destination address. We make this conversion
|
|
with the ip64_addr_6to4() function. If the conversion
|
|
fails, ip64_addr_6to4() returns 0. If so, we also return 0 to
|
|
indicate failure. */
|
|
if(ip64_addr_6to4(&v6hdr->destipaddr,
|
|
&v4hdr->destipaddr) == 0) {
|
|
#if DEBUG
|
|
PRINTF("ip64_6to4: Could not convert IPv6 destination address.\n");
|
|
uip_debug_ipaddr_print(&v6hdr->destipaddr);
|
|
PRINTF("\n");
|
|
#endif /* DEBUG */
|
|
return 0;
|
|
}
|
|
|
|
/* We set the source address in the IPv4 packet to be the IPv4
|
|
address that we have been configured with through the
|
|
ip64_set_ipv4_address() function. Only let broadcasts through. */
|
|
if(!ip64_hostaddr_configured &&
|
|
!uip_ip4addr_cmp(&v4hdr->destipaddr, &ipv4_broadcast_addr)) {
|
|
PRINTF("ip64_6to4: no IPv4 address configured.\n");
|
|
return 0;
|
|
}
|
|
ip64_addr_copy4(&v4hdr->srcipaddr, &ip64_hostaddr);
|
|
|
|
|
|
/* Next we update the transport layer header. This must be updated
|
|
in two ways: the source port number is changed and the transport
|
|
layer checksum must be recomputed. The reason why we change the
|
|
source port number is so that we can remember what IPv6 address
|
|
this packet came from, in case the packet will result in a reply
|
|
from the host on the IPv4 network. If a reply would be sent, it
|
|
would be sent to the port number that we chose, and we will be
|
|
able to map this back to the IPv6 address of the original sender
|
|
of the packet.
|
|
*/
|
|
|
|
/* We check to see if we already have an existing IP address mapping
|
|
for this connection. If not, we create a new one. */
|
|
if((v4hdr->proto == IP_PROTO_UDP || v4hdr->proto == IP_PROTO_TCP)) {
|
|
|
|
if(ip64_special_ports_outgoing_is_special(uip_ntohs(udphdr->srcport))) {
|
|
uint16_t newport;
|
|
if(ip64_special_ports_translate_outgoing(uip_ntohs(udphdr->srcport),
|
|
&v6hdr->srcipaddr,
|
|
&newport)) {
|
|
udphdr->srcport = uip_htons(newport);
|
|
}
|
|
} else if(uip_ntohs(udphdr->srcport) >= EPHEMERAL_PORTRANGE) {
|
|
m = ip64_addrmap_lookup(&v6hdr->srcipaddr,
|
|
uip_ntohs(udphdr->srcport),
|
|
&v4hdr->destipaddr,
|
|
uip_ntohs(udphdr->destport),
|
|
v4hdr->proto);
|
|
if(m == NULL) {
|
|
PRINTF("Lookup failed\n");
|
|
m = ip64_addrmap_create(&v6hdr->srcipaddr,
|
|
uip_ntohs(udphdr->srcport),
|
|
&v4hdr->destipaddr,
|
|
uip_ntohs(udphdr->destport),
|
|
v4hdr->proto);
|
|
if(m == NULL) {
|
|
PRINTF("Could not create new map\n");
|
|
return 0;
|
|
} else {
|
|
PRINTF("Could create new local port %d\n", m->mapped_port);
|
|
}
|
|
} else {
|
|
PRINTF("Lookup: found local port %d (%d)\n", m->mapped_port,
|
|
uip_htons(m->mapped_port));
|
|
}
|
|
|
|
/* Update the lifetime of the address mapping. We need to be
|
|
frugal with address mapping table entries, so we assign
|
|
different lifetimes depending on the type of packet we see.
|
|
|
|
For TCP connections, we don't want to have a lot of failed
|
|
connection attmpts lingering around, so we assign mappings
|
|
with TCP SYN segments a short lifetime. If we see a RST
|
|
segment, this indicates that the connection might be dead,
|
|
and we'll assign a shorter lifetime.
|
|
|
|
For UDP packets and for non-SYN/non-RST segments, we assign
|
|
the default lifetime. */
|
|
if(v4hdr->proto == IP_PROTO_TCP) {
|
|
if((tcphdr->flags & TCP_SYN)) {
|
|
ip64_addrmap_set_lifetime(m, SYN_LIFETIME);
|
|
} else if((tcphdr->flags & TCP_RST)) {
|
|
ip64_addrmap_set_lifetime(m, RST_LIFETIME);
|
|
} else {
|
|
ip64_addrmap_set_lifetime(m, DEFAULT_LIFETIME);
|
|
}
|
|
|
|
/* Also check if we see a FIN segment. If so, we'll mark the
|
|
address mapping as being candidate for recycling. Same for
|
|
RST segments. */
|
|
if((tcphdr->flags & TCP_FIN) ||
|
|
(tcphdr->flags & TCP_RST)) {
|
|
ip64_addrmap_set_recycleble(m);
|
|
}
|
|
} else {
|
|
ip64_addrmap_set_lifetime(m, DEFAULT_LIFETIME);
|
|
|
|
/* Treat UDP packets from the IPv6 network to a multicast
|
|
address on the IPv4 network differently: since there is
|
|
no way for packets from the IPv4 network to go back to
|
|
the IPv6 network on these mappings, we'll mark them as
|
|
recyclable. */
|
|
if(v4hdr->destipaddr.u8[0] == 224) {
|
|
ip64_addrmap_set_recycleble(m);
|
|
}
|
|
|
|
/* Treat DNS requests differently: since the are one-shot, we
|
|
mark them as recyclable. */
|
|
if(udphdr->destport == UIP_HTONS(DNS_PORT)) {
|
|
ip64_addrmap_set_recycleble(m);
|
|
}
|
|
}
|
|
|
|
/* Set the source port of the packet to be the mapped port
|
|
number. */
|
|
udphdr->srcport = uip_htons(m->mapped_port);
|
|
}
|
|
}
|
|
|
|
/* The IPv4 header is now complete, so we can compute the IPv4
|
|
header checksum. */
|
|
v4hdr->ipchksum = 0;
|
|
v4hdr->ipchksum = ~(ipv4_checksum(v4hdr));
|
|
|
|
|
|
|
|
/* The checksum is in different places in the different protocol
|
|
headers, so we need to be sure that we update the correct
|
|
field. */
|
|
switch(v4hdr->proto) {
|
|
case IP_PROTO_TCP:
|
|
tcphdr->tcpchksum = 0;
|
|
tcphdr->tcpchksum = ~(ipv4_transport_checksum(resultpacket, ipv4len,
|
|
IP_PROTO_TCP));
|
|
break;
|
|
case IP_PROTO_UDP:
|
|
udphdr->udpchksum = 0;
|
|
udphdr->udpchksum = ~(ipv4_transport_checksum(resultpacket, ipv4len,
|
|
IP_PROTO_UDP));
|
|
if(udphdr->udpchksum == 0) {
|
|
udphdr->udpchksum = 0xffff;
|
|
}
|
|
break;
|
|
case IP_PROTO_ICMPV4:
|
|
icmpv4hdr->icmpchksum = 0;
|
|
icmpv4hdr->icmpchksum = ~(ipv4_transport_checksum(resultpacket, ipv4len,
|
|
IP_PROTO_ICMPV4));
|
|
break;
|
|
|
|
default:
|
|
PRINTF("ip64_6to4: transport protocol %d not implemented\n", v4hdr->proto);
|
|
return 0;
|
|
}
|
|
|
|
/* Finally, we return the length of the resulting IPv4 packet. */
|
|
PRINTF("ip64_6to4: ipv4len %d\n", ipv4len);
|
|
return ipv4len;
|
|
}
|
|
/*---------------------------------------------------------------------------*/
|
|
int
|
|
ip64_4to6(const uint8_t *ipv4packet, const uint16_t ipv4packet_len,
|
|
uint8_t *resultpacket)
|
|
{
|
|
struct ipv4_hdr *v4hdr;
|
|
struct ipv6_hdr *v6hdr;
|
|
struct udp_hdr *udphdr;
|
|
struct tcp_hdr *tcphdr;
|
|
struct icmpv4_hdr *icmpv4hdr;
|
|
struct icmpv6_hdr *icmpv6hdr;
|
|
uint16_t ipv4len, ipv6len, ipv6_packet_len;
|
|
struct ip64_addrmap_entry *m;
|
|
|
|
v6hdr = (struct ipv6_hdr *)resultpacket;
|
|
v4hdr = (struct ipv4_hdr *)ipv4packet;
|
|
|
|
if((v4hdr->len[0] << 8) + v4hdr->len[1] <= ipv4packet_len) {
|
|
ipv4len = (v4hdr->len[0] << 8) + v4hdr->len[1];
|
|
} else {
|
|
PRINTF("ip64_4to6: packet smaller than reported in IPv4 header, dropping\n");
|
|
return 0;
|
|
}
|
|
|
|
if(ipv4len <= IPV4_HDRLEN) {
|
|
return 0;
|
|
}
|
|
|
|
/* Make sure that the resulting packet fits in the ip64 packet
|
|
buffer. If not, we drop it. */
|
|
if(ipv4len - IPV4_HDRLEN + IPV6_HDRLEN > BUFSIZE) {
|
|
PRINTF("ip64_4to6: packet too big to fit in buffer, dropping\n");
|
|
return 0;
|
|
}
|
|
/* We copy the data from the IPv4 packet into the IPv6 packet. */
|
|
memcpy(&resultpacket[IPV6_HDRLEN],
|
|
&ipv4packet[IPV4_HDRLEN],
|
|
ipv4len - IPV4_HDRLEN);
|
|
|
|
udphdr = (struct udp_hdr *)&resultpacket[IPV6_HDRLEN];
|
|
tcphdr = (struct tcp_hdr *)&resultpacket[IPV6_HDRLEN];
|
|
icmpv4hdr = (struct icmpv4_hdr *)&ipv4packet[IPV4_HDRLEN];
|
|
icmpv6hdr = (struct icmpv6_hdr *)&resultpacket[IPV6_HDRLEN];
|
|
|
|
ipv6len = ipv4len - IPV4_HDRLEN + IPV6_HDRLEN;
|
|
ipv6_packet_len = ipv6len - IPV6_HDRLEN;
|
|
|
|
/* Translate the IPv4 header into an IPv6 header. */
|
|
|
|
/* We first fill in the simple fields: IP header version, traffic
|
|
class and flow label, and length fields. */
|
|
v6hdr->vtc = 0x60;
|
|
v6hdr->tcflow = 0;
|
|
v6hdr->flow = 0;
|
|
v6hdr->len[0] = ipv6_packet_len >> 8;
|
|
v6hdr->len[1] = ipv6_packet_len & 0xff;
|
|
|
|
/* We use the IPv4 TTL field as the IPv6 hop limit field. */
|
|
v6hdr->hoplim = v4hdr->ttl;
|
|
|
|
|
|
/* We now translate the IPv4 source and destination addresses to
|
|
IPv6 source and destination addresses. We translate the IPv4
|
|
source address into an IPv6-encoded IPv4 address. The IPv4
|
|
destination address will be the address with which we have
|
|
previously been configured, through the ip64_set_ipv4_address()
|
|
function. We use the mapping table to look up the new IPv6
|
|
destination address. As we assume that the IPv4 packet is a
|
|
response to a previously sent IPv6 packet, we should have a
|
|
mapping between the (protocol, destport, srcport, srcaddress)
|
|
tuple. If not, we'll return 0 to indicate that we failed to
|
|
translate the packet. */
|
|
if(ip64_addr_4to6(&v4hdr->srcipaddr, &v6hdr->srcipaddr) == 0) {
|
|
PRINTF("ip64_packet_4to6: failed to convert source IP address\n");
|
|
return 0;
|
|
}
|
|
|
|
/* For the next header field, we simply use the IPv4 protocol
|
|
field. We only support UDP and TCP packets. */
|
|
switch(v4hdr->proto) {
|
|
case IP_PROTO_UDP:
|
|
v6hdr->nxthdr = IP_PROTO_UDP;
|
|
/* Check if this is a DNS request. If so, we should rewrite it
|
|
with the DNS64 module. */
|
|
if(udphdr->srcport == UIP_HTONS(DNS_PORT)) {
|
|
int len;
|
|
|
|
len = ip64_dns64_4to6((uint8_t *)v4hdr + IPV4_HDRLEN + sizeof(struct udp_hdr),
|
|
ipv4len - IPV4_HDRLEN - sizeof(struct udp_hdr),
|
|
(uint8_t *)v6hdr + IPV6_HDRLEN + sizeof(struct udp_hdr),
|
|
ipv6_packet_len - sizeof(struct udp_hdr));
|
|
ipv6_packet_len = len + sizeof(struct udp_hdr);
|
|
v6hdr->len[0] = ipv6_packet_len >> 8;
|
|
v6hdr->len[1] = ipv6_packet_len & 0xff;
|
|
ipv6len = ipv6_packet_len + IPV6_HDRLEN;
|
|
|
|
}
|
|
break;
|
|
|
|
case IP_PROTO_TCP:
|
|
v6hdr->nxthdr = IP_PROTO_TCP;
|
|
break;
|
|
|
|
case IP_PROTO_ICMPV4:
|
|
/* Allow only ICMPv4 ECHO_REQUESTS (ping packets) through to the
|
|
local IPv6 host. */
|
|
if(icmpv4hdr->type == ICMP_ECHO) {
|
|
PRINTF("ip64_4to6: translating ICMPv4 ECHO packet\n");
|
|
v6hdr->nxthdr = IP_PROTO_ICMPV6;
|
|
icmpv6hdr->type = ICMP6_ECHO;
|
|
ip64_addr_copy6(&v6hdr->destipaddr, &ipv6_local_address);
|
|
} else {
|
|
PRINTF("ip64_packet_4to6: ICMPv4 packet type %d not supported\n",
|
|
icmpv4hdr->type);
|
|
return 0;
|
|
}
|
|
break;
|
|
|
|
default:
|
|
/* For protocol types that we do not support, we return 0 to
|
|
indicate that we failed to translate the packet to an IPv6
|
|
packet. */
|
|
PRINTF("ip64_packet_4to6: protocol type %d not supported\n",
|
|
v4hdr->proto);
|
|
return 0;
|
|
}
|
|
|
|
/* Translate IPv4 broadcasts to IPv6 all-nodes multicasts. */
|
|
if(uip_ip4addr_cmp(&v4hdr->destipaddr, &ipv4_broadcast_addr) ||
|
|
(uip_ipaddr_maskcmp(&v4hdr->destipaddr, &ip64_hostaddr,
|
|
&ip64_netmask) &&
|
|
((v4hdr->destipaddr.u16[0] & (~ip64_netmask.u16[0])) ==
|
|
(ipv4_broadcast_addr.u16[0] & (~ip64_netmask.u16[0]))) &&
|
|
((v4hdr->destipaddr.u16[1] & (~ip64_netmask.u16[1])) ==
|
|
(ipv4_broadcast_addr.u16[1] & (~ip64_netmask.u16[1]))))) {
|
|
uip_create_linklocal_allnodes_mcast(&v6hdr->destipaddr);
|
|
} else {
|
|
|
|
if(!ip64_hostaddr_configured) {
|
|
PRINTF("ip64_packet_4to6: no local IPv4 address configured, dropping incoming packet.\n");
|
|
return 0;
|
|
}
|
|
|
|
if(!uip_ip4addr_cmp(&v4hdr->destipaddr, &ip64_hostaddr)) {
|
|
PRINTF("ip64_packet_4to6: the IPv4 destination address %d.%d.%d.%d did not match our IPv4 address %d.%d.%d.%d\n",
|
|
uip_ipaddr_to_quad(&v4hdr->destipaddr),
|
|
uip_ipaddr_to_quad(&ip64_hostaddr));
|
|
return 0;
|
|
}
|
|
|
|
|
|
/* Now we translate the transport layer port numbers. We assume that
|
|
the IPv4 packet is a response to a packet that has previously
|
|
been translated from IPv6 to IPv4. If this is the case, the tuple
|
|
(protocol, destport, srcport, srcaddress) corresponds to an address/port
|
|
pair in our mapping table. If we do not find a mapping, we return
|
|
0 to indicate that we could not translate the IPv4 packet to an
|
|
IPv6 packet. */
|
|
|
|
/* XXX treat a few ports differently: those ports should be let
|
|
through to the local host. For those ports, we set up an address
|
|
mapping that ensures that the local port number is retained. */
|
|
|
|
if((v4hdr->proto == IP_PROTO_TCP || v4hdr->proto == IP_PROTO_UDP)) {
|
|
if(uip_htons(tcphdr->destport) < EPHEMERAL_PORTRANGE) {
|
|
/* This packet should go to the local host. */
|
|
PRINTF("Port is in the non-ephemeral port range %d (%d)\n",
|
|
tcphdr->destport, uip_htons(tcphdr->destport));
|
|
ip64_addr_copy6(&v6hdr->destipaddr, &ipv6_local_address);
|
|
} else if(ip64_special_ports_incoming_is_special(uip_htons(tcphdr->destport))) {
|
|
uip_ip6addr_t newip6addr;
|
|
uint16_t newport;
|
|
PRINTF("ip64 port %d (%d) is special, treating it differently\n",
|
|
tcphdr->destport, uip_htons(tcphdr->destport));
|
|
if(ip64_special_ports_translate_incoming(uip_htons(tcphdr->destport),
|
|
&newip6addr, &newport)) {
|
|
ip64_addr_copy6(&v6hdr->destipaddr, &newip6addr);
|
|
tcphdr->destport = uip_htons(newport);
|
|
PRINTF("New port %d (%d)\n",
|
|
tcphdr->destport, uip_htons(tcphdr->destport));
|
|
} else {
|
|
ip64_addr_copy6(&v6hdr->destipaddr, &ipv6_local_address);
|
|
PRINTF("No new port\n");
|
|
}
|
|
} else {
|
|
/* The TCP or UDP port numbers were not non-ephemeral and not
|
|
special, so we map the port number according to the address
|
|
mapping table. */
|
|
|
|
m = ip64_addrmap_lookup_port(uip_ntohs(udphdr->destport),
|
|
v4hdr->proto);
|
|
if(m == NULL) {
|
|
PRINTF("Inbound lookup failed\n");
|
|
return 0;
|
|
} else {
|
|
PRINTF("Inbound lookup did not fail\n");
|
|
}
|
|
ip64_addr_copy6(&v6hdr->destipaddr, &m->ip6addr);
|
|
udphdr->destport = uip_htons(m->ip6port);
|
|
}
|
|
}
|
|
}
|
|
|
|
/* The checksum is in different places in the different protocol
|
|
headers, so we need to be sure that we update the correct
|
|
field. */
|
|
switch(v6hdr->nxthdr) {
|
|
case IP_PROTO_TCP:
|
|
tcphdr->tcpchksum = 0;
|
|
tcphdr->tcpchksum = ~(ipv6_transport_checksum(resultpacket,
|
|
ipv6len,
|
|
IP_PROTO_TCP));
|
|
break;
|
|
case IP_PROTO_UDP:
|
|
udphdr->udpchksum = 0;
|
|
udphdr->udpchksum = ~(ipv6_transport_checksum(resultpacket,
|
|
ipv6len,
|
|
IP_PROTO_UDP));
|
|
if(udphdr->udpchksum == 0) {
|
|
udphdr->udpchksum = 0xffff;
|
|
}
|
|
break;
|
|
|
|
case IP_PROTO_ICMPV6:
|
|
icmpv6hdr->icmpchksum = 0;
|
|
icmpv6hdr->icmpchksum = ~(ipv6_transport_checksum(resultpacket,
|
|
ipv6len,
|
|
IP_PROTO_ICMPV6));
|
|
break;
|
|
default:
|
|
PRINTF("ip64_4to6: transport protocol %d not implemented\n", v4hdr->proto);
|
|
return 0;
|
|
}
|
|
|
|
/* Finally, we return the length of the resulting IPv6 packet. */
|
|
PRINTF("ip64_4to6: ipv6len %d\n", ipv6len);
|
|
return ipv6len;
|
|
}
|
|
/*---------------------------------------------------------------------------*/
|
|
int
|
|
ip64_hostaddr_is_configured(void)
|
|
{
|
|
return ip64_hostaddr_configured;
|
|
}
|
|
/*---------------------------------------------------------------------------*/
|
|
static void
|
|
interface_init(void)
|
|
{
|
|
IP64_CONF_UIP_FALLBACK_INTERFACE.init();
|
|
}
|
|
/*---------------------------------------------------------------------------*/
|
|
static void
|
|
interface_output(void)
|
|
{
|
|
PRINTF("ip64: interface_output len %d\n", uip_len);
|
|
IP64_CONF_UIP_FALLBACK_INTERFACE.output();
|
|
}
|
|
/*---------------------------------------------------------------------------*/
|
|
const struct uip_fallback_interface ip64_uip_fallback_interface = {
|
|
interface_init, interface_output
|
|
};
|
|
|