diff options
author | Ashwini Sharma <ak.ashwini1981@gmail.com> | 2013-12-23 07:15:13 -0600 |
---|---|---|
committer | Ashwini Sharma <ak.ashwini1981@gmail.com> | 2013-12-23 07:15:13 -0600 |
commit | 25c1f3a967347c0a3b3e565b358b0e06b3f90225 (patch) | |
tree | eef3c2a78b5fcbdbe756f68bd079d9c753761e0c /toys/pending | |
parent | afba5b8efdf1bac2c02ca787840a2be053c800f7 (diff) | |
download | toybox-25c1f3a967347c0a3b3e565b358b0e06b3f90225.tar.gz |
IPv6 support is added into traceroute command.
traceroute6 is made as an old toy of traceroute.
Diffstat (limited to 'toys/pending')
-rw-r--r-- | toys/pending/traceroute.c | 598 |
1 files changed, 398 insertions, 200 deletions
diff --git a/toys/pending/traceroute.c b/toys/pending/traceroute.c index 832bda5e..a0cf00c3 100644 --- a/toys/pending/traceroute.c +++ b/toys/pending/traceroute.c @@ -2,25 +2,30 @@ * * Copyright 2012 Madhur Verma <mad.flexi@gmail.com> * Copyright 2013 Kyungwan Han <asura321@gmail.com> + * Copyright 2013 Bilal Qureshi <bilal.jmi@gmail.com> + * Copyright 2013 Ashwini Kumar <ak.ashwini@gmail.com> * * No Standard -USE_TRACEROUTE(NEWTOY(traceroute, "<1>2f#<1>255=1z#<0>86400=0g*w#<0>86400=5t#<0>255=0s:q#<1>255=3p#<1>65535=33434m#<1>255=30rvndlIUF64", TOYFLAG_USR|TOYFLAG_BIN)) - +USE_TRACEROUTE(NEWTOY(traceroute, "<1>2i:f#<1>255=1z#<0>86400=0g*w#<0>86400=5t#<0>255=0s:q#<1>255=3p#<1>65535=33434m#<1>255=30rvndlIUF64", TOYFLAG_STAYROOT|TOYFLAG_USR|TOYFLAG_BIN)) +USE_TRACEROUTE(OLDTOY(traceroute6,traceroute, OPTSTR_traceroute, TOYFLAG_STAYROOT|TOYFLAG_USR|TOYFLAG_BIN)) config TRACEROUTE bool "traceroute" - default n + default y help - usage: traceroute [-FUIldnvr] [-f 1ST_TTL] [-m MAXTTL] [-p PORT] [-q PROBES] + usage: traceroute [-46FUIldnvr] [-f 1ST_TTL] [-m MAXTTL] [-p PORT] [-q PROBES] [-s SRC_IP] [-t TOS] [-w WAIT_SEC] [-g GATEWAY] [-i IFACE] [-z PAUSE_MSEC] HOST [BYTES] + + traceroute6 [-dnrv] [-m MAXTTL] [-p PORT] [-q PROBES][-s SRC_IP] [-t TOS] [-w WAIT_SEC] + [-i IFACE] HOST [BYTES] Trace the route to HOST - -F Set the don't fragment bit - -U Use UDP datagrams instead of ICMP ECHO - -I Use ICMP ECHO instead of UDP datagrams - -l Display the TTL value of the returned packet - -f Start from the 1ST_TTL hop (instead from 1)(RANGE 1 to 255) + -4,-6 Force IP or IPv6 name resolution + -F Set the don't fragment bit (supports IPV4 only) + -U Use UDP datagrams instead of ICMP ECHO (supports IPV4 only) + -I Use ICMP ECHO instead of UDP datagrams (supports IPV4 only) + -l Display the TTL value of the returned packet (supports IPV4 only) -d Set SO_DEBUG options to socket -n Print numeric addresses -v verbose @@ -31,13 +36,17 @@ config TRACEROUTE -s IP address to use as the source address -t Type-of-service in probe packets (default 0)(RANGE 0 to 255) -w Time in seconds to wait for a response (default 3)(RANGE 0 to 86400) - -g Loose source route gateway (8 max) - -z Pause Time in milisec (default 0)(RANGE 0 to 86400) + -g Loose source route gateway (8 max) (supports IPV4 only) + -z Pause Time in milisec (default 0)(RANGE 0 to 86400) (supports IPV4 only) + -f Start from the 1ST_TTL hop (instead from 1)(RANGE 1 to 255) (supports IPV4 only) + -i Specify a network interface to operate with */ #define FOR_traceroute #include "toys.h" #include <netinet/udp.h> #include <netinet/ip_icmp.h> +#include <netinet/ip6.h> +#include <netinet/icmp6.h> GLOBALS( long max_ttl; @@ -49,29 +58,33 @@ GLOBALS( struct arg_list *loose_source; long pause_time; long first_ttl; + char *iface; + + uint32_t gw_list[9]; int recv_sock; int snd_sock; unsigned msg_len; - struct ip *packet; - uint32_t gw_list[9]; + char *packet; uint32_t ident; + int istraceroute6; ) +#ifndef SOL_IPV6 +# define SOL_IPV6 IPPROTO_IPV6 +#endif -#define ICMP_HD_SIZE 8 -#define send_icmp ((struct icmp *)(TT.packet + 1)) -#define send_udp ((struct udphdr *)(TT.packet + 1)) +#define ICMP_HD_SIZE4 8 +#define USEC 1000000ULL struct payload_s { - unsigned char seq; - unsigned char ttl; - struct timeval tv; + uint32_t seq; + uint32_t ident; }; -static struct payload_s *send_data; -static struct sockaddr_in dest, from; +char addr_str[INET6_ADDRSTRLEN]; +struct sockaddr_storage dest; -// Computes and returns checksum SUM of buffer P of length LEN +//Compute checksum SUM of buffer P of length LEN static u_int16_t in_cksum(u_int16_t *p, u_int len) { u_int32_t sum = 0; @@ -93,94 +106,131 @@ static u_int16_t in_cksum(u_int16_t *p, u_int len) return (~sum); } -/* - * sends a single probe packet with sequence SEQ and - * time-to-live TTL - */ -static void send_probe(int seq, int ttl) +//sends a single probe packet with sequence(SEQ) and time-to-live(TTL) +static void send_probe4(int seq, int ttl) { int res, len; void *out; + struct payload_s *send_data4 = (struct payload_s *)(TT.packet); + struct icmp *send_icmp4 = (struct icmp *)(TT.packet); if (toys.optflags & FLAG_U) { - send_data->seq = seq; - send_data->ttl = ttl; - dest.sin_port = TT.port + seq; + send_data4->seq = seq; + send_data4->ident = TT.ident; + ((struct sockaddr_in *)&dest)->sin_port = TT.port + seq; + out = send_data4; } else { - send_icmp->icmp_seq = htons(seq); - send_icmp->icmp_cksum = 0; - send_icmp->icmp_cksum = in_cksum((uint16_t *) send_icmp, TT.msg_len - sizeof(struct ip)); - if (send_icmp->icmp_cksum == 0) send_icmp->icmp_cksum = 0xffff; + send_icmp4->icmp_type = ICMP_ECHO; + send_icmp4->icmp_id = htons(TT.ident); + send_icmp4->icmp_seq = htons(seq); + send_icmp4->icmp_cksum = 0; + send_icmp4->icmp_cksum = in_cksum((uint16_t *) send_icmp4, TT.msg_len); + if (send_icmp4->icmp_cksum == 0) send_icmp4->icmp_cksum = 0xffff; + out = send_icmp4; } res = setsockopt(TT.snd_sock, IPPROTO_IP, IP_TTL, &ttl, sizeof(ttl)); if (res < 0) perror_exit("setsockopt ttl %d", ttl); - if (toys.optflags & FLAG_U) { - out = send_data; - len = sizeof(struct payload_s); - } else { - out = send_icmp; - len = TT.msg_len - sizeof(struct ip); - } - res = sendto(TT.snd_sock, out, len, 0, (struct sockaddr *) &dest, sizeof(dest)); + len = TT.msg_len; + res = sendto(TT.snd_sock, out, len, 0, (struct sockaddr *) &dest, + sizeof(struct sockaddr_in)); if (res != len) perror_exit(" sendto"); } -static void resolve_addr(char *host, int type, int proto, struct sockaddr_in *sock) +//sends a single probe packet with sequence(SEQ) and time-to-live(TTL) +static void send_probe6(int seq, int ttl) +{ + void *out; + struct payload_s *send_data6 = (struct payload_s *) (TT.packet); + + send_data6->seq = seq; + send_data6->ident = TT.ident; + ((struct sockaddr_in6 *)&dest)->sin6_port = TT.port; + + if (setsockopt(TT.snd_sock, SOL_IPV6, IPV6_UNICAST_HOPS, &ttl, + sizeof(ttl)) < 0) error_exit("setsockopt ttl %d", ttl); + + out = send_data6; + + if (sendto(TT.snd_sock, out, TT.msg_len, 0, + (struct sockaddr *) &dest, sizeof(struct sockaddr_in6)) < 0) + perror_exit("sendto"); +} + +static void set_flag_dr(int sock) +{ + int set = 1; + if ((toys.optflags & FLAG_d) && (setsockopt(sock,SOL_SOCKET, SO_DEBUG, + &set, sizeof(set)) < 0)) perror_exit("SO_DEBUG failed "); + + if ((toys.optflags & FLAG_r) && (setsockopt(sock, SOL_SOCKET, SO_DONTROUTE, + &set, sizeof(set)) < 0)) perror_exit("SO_DONTROUTE failed "); +} + +static void bind_to_interface(int sock) +{ + struct ifreq ifr; + + snprintf(ifr.ifr_name, IFNAMSIZ, "%s", TT.iface); + if (setsockopt(sock, SOL_SOCKET, SO_BINDTODEVICE, &ifr, sizeof(ifr))) + perror_msg("can't bind to interface %s", TT.iface); +} + +static void resolve_addr(char *host, int family, int type, int proto, void *sock) { - struct addrinfo *rp, *info, hint; + struct addrinfo *info, hint; int ret; memset(&hint, 0, sizeof(hint)); - hint.ai_family = AF_INET; + hint.ai_family = family; hint.ai_socktype = type; hint.ai_protocol = proto; ret = getaddrinfo(host, NULL, &hint, &info); - if (ret || !info) perror_exit("bad address: %s ", host); + if (ret || !info) error_exit("bad address: %s ", host); - for (rp = info; rp; rp = rp->ai_next) { - if (rp->ai_addrlen == sizeof(struct sockaddr_in)) { - memcpy(sock, rp->ai_addr, rp->ai_addrlen); - break; - } - } - freeaddrinfo(info); - if (!rp) perror_exit("Resolve failed "); + memcpy(sock, info->ai_addr, info->ai_addrlen); + freeaddrinfo(info); } static void do_trace() { int seq, fexit, ttl, tv = TT.wait_time * 1000; struct pollfd pfd[1]; + struct sockaddr_storage from; + memset(&from, 0, sizeof(from)); pfd[0].fd = TT.recv_sock; pfd[0].events = POLLIN; + for (ttl = TT.first_ttl; ttl <= TT.max_ttl; ++ttl) { - int probe, dest_reach = 0; + int probe, dest_reach = 0, print_verbose = 1; struct timeval t1, t2; - struct sockaddr_in last; + struct sockaddr_storage last_addr; - memset(&last, 0, sizeof(last)); + memset(&last_addr, 0, sizeof(last_addr)); fexit = 0; - printf("%2d", ttl); + xprintf("%2d", ttl); for (probe = 0, seq = 0; probe < TT.ttl_probes; ++probe) { int res = 0, tleft; fflush(NULL); - if (probe && (toys.optflags & FLAG_z)) usleep(TT.pause_time * 1000); + if (!TT.istraceroute6) + if (probe && (toys.optflags & FLAG_z)) usleep(TT.pause_time * 1000); - send_probe(++seq, ttl); + if (!TT.istraceroute6) send_probe4(++seq, ttl); + else send_probe6(++seq, ttl); gettimeofday(&t1, NULL); t2 = t1; while ((tleft = (int)(tv - ((unsigned long long)(t2.tv_sec * 1000ULL + t2.tv_usec/1000) - (unsigned long long)(t1.tv_sec * 1000ULL + t1.tv_usec/1000)))) >= 0) { - if (!(res = poll(pfd, 1, tleft))) { - printf(" *"); + unsigned delta = 0; + if (!(res = poll(pfd, 1, tleft))) { + xprintf(" *"); break; } gettimeofday(&t2, NULL); @@ -188,18 +238,21 @@ static void do_trace() if (errno != EINTR) perror_exit("poll"); continue; } + delta = (t2.tv_sec * USEC + t2.tv_usec) + - (t1.tv_sec * USEC + t1.tv_usec); if (pfd[0].revents) { - unsigned addrlen = sizeof(from); - struct ip *rcv_pkt = (struct ip*) toybuf; - int rcv_len, pmtu = 0; + unsigned addrlen = sizeof(struct sockaddr_storage); + int rcv_len, icmp_res = 0; - rcv_len = recvfrom(TT.recv_sock, rcv_pkt, sizeof(toybuf), + rcv_len = recvfrom(TT.recv_sock, toybuf, sizeof(toybuf), MSG_DONTWAIT, (struct sockaddr *) &from, &addrlen); if (rcv_len <= 0) continue; - else { + + if (!TT.istraceroute6) { + int pmtu = 0; + struct ip *rcv_pkt = (struct ip*) toybuf; struct icmp *ricmp; - int icmp_res = 0; ricmp = (struct icmp *) ((void*)rcv_pkt + (rcv_pkt->ip_hl << 2)); if (ricmp->icmp_code == ICMP_UNREACH_NEEDFRAG) @@ -210,234 +263,379 @@ static void do_trace() || ricmp->icmp_type == ICMP_UNREACH || ricmp->icmp_type == ICMP_ECHOREPLY) { - struct ip *hip; struct udphdr *hudp; struct icmp *hicmp; + struct ip *hip = &ricmp->icmp_ip; - hip = &ricmp->icmp_ip; if (toys.optflags & FLAG_U) { - hudp = (struct udphdr*) (hip + (hip->ip_hl << 2)); - if ((hip->ip_hl << 2) + 12 <= (rcv_len - (rcv_pkt->ip_hl << 2)) + hudp = (struct udphdr*) ((char*)hip + (hip->ip_hl << 2)); + if ((hip->ip_hl << 2) + 12 <=(rcv_len - (rcv_pkt->ip_hl << 2)) && hip->ip_p == IPPROTO_UDP - && hudp->dest == htons(TT.port + seq)) - icmp_res = (ricmp->icmp_type == ICMP_TIMXCEED ?-1 : ricmp->icmp_code); + && hudp->dest == (TT.port + seq)) + icmp_res = (ricmp->icmp_type == ICMP_TIMXCEED ? -1 : + ricmp->icmp_code); } else { hicmp = (struct icmp *) ((void*)hip + (hip->ip_hl << 2)); - if (ricmp->icmp_type == ICMP_ECHOREPLY && ricmp->icmp_id == htons(TT.ident) - && ricmp->icmp_seq == htons(seq)) + if (ricmp->icmp_type == ICMP_ECHOREPLY + && ricmp->icmp_id == ntohs(TT.ident) + && ricmp->icmp_seq == ntohs(seq)) icmp_res = ICMP_UNREACH_PORT; - - if ((hip->ip_hl << 2) + ICMP_HD_SIZE <= (rcv_len - (rcv_pkt->ip_hl << 2)) + else if ((hip->ip_hl << 2) + ICMP_HD_SIZE4 + <= (rcv_len - (rcv_pkt->ip_hl << 2)) && hip->ip_p == IPPROTO_ICMP && hicmp->icmp_id == htons(TT.ident) && hicmp->icmp_seq == htons(seq)) - icmp_res = (ricmp->icmp_type == ICMP_TIMXCEED ? -1 : ricmp->icmp_code); + icmp_res = (ricmp->icmp_type == ICMP_TIMXCEED ? -1 : + ricmp->icmp_code); } } if (!icmp_res) continue; if (addrlen > 0) { - unsigned delta = (t2.tv_sec * 1000000ULL + t2.tv_usec) - - (t1.tv_sec * 1000000ULL + t1.tv_usec); - - if (memcmp(&last.sin_addr, &from.sin_addr, sizeof(struct in_addr))) { + if (memcmp(&((struct sockaddr_in *)&last_addr)->sin_addr, + &((struct sockaddr_in *)&from)->sin_addr, + sizeof(struct in_addr))) { if (!(toys.optflags & FLAG_n)) { char host[NI_MAXHOST]; - if (!getnameinfo((struct sockaddr *) &from, - sizeof(from), host, NI_MAXHOST, NULL, 0, 0)) - printf(" %s (", host); - else printf(" %s (", inet_ntoa(from.sin_addr)); + if (!getnameinfo((struct sockaddr *) &from, + sizeof(struct sockaddr_in), host, NI_MAXHOST, NULL, 0, 0)) + xprintf(" %s (", host); + else xprintf(" %s (", inet_ntoa( + ((struct sockaddr_in *)&from)->sin_addr)); } - printf(" %s", inet_ntoa(from.sin_addr)); - if (!(toys.optflags & FLAG_n) ) printf(")"); - last = from; + xprintf(" %s", inet_ntoa( + ((struct sockaddr_in *)&from)->sin_addr)); + if (!(toys.optflags & FLAG_n)) xprintf(")"); + memcpy(&last_addr, &from, sizeof(from)); } - printf(" %u.%03u ms", delta / 1000, delta % 1000); - if (toys.optflags & FLAG_l) printf(" (%d)", rcv_pkt->ip_ttl); + xprintf(" %u.%03u ms", delta / 1000, delta % 1000); + if (toys.optflags & FLAG_l) xprintf(" (%d)", rcv_pkt->ip_ttl); if (toys.optflags & FLAG_v) { - printf(" %d bytes from %s : icmp type %d code %d\t", - rcv_len, inet_ntoa(from.sin_addr), + xprintf(" %d bytes from %s : icmp type %d code %d\t", + rcv_len, inet_ntoa(((struct sockaddr_in *)&from)->sin_addr), ricmp->icmp_type, ricmp->icmp_code); } - } else printf("\t!H"); + } else xprintf("\t!H"); switch (icmp_res) { case ICMP_UNREACH_PORT: - if (rcv_pkt->ip_ttl <= 1) printf(" !"); + if (rcv_pkt->ip_ttl <= 1) xprintf(" !"); dest_reach = 1; break; case ICMP_UNREACH_NET: - printf(" !N"); + xprintf(" !N"); ++fexit; break; case ICMP_UNREACH_HOST: - printf(" !H"); + xprintf(" !H"); ++fexit; break; case ICMP_UNREACH_PROTOCOL: - printf(" !P"); + xprintf(" !P"); dest_reach = 1; break; case ICMP_UNREACH_NEEDFRAG: - printf(" !F-%d", pmtu); + xprintf(" !F-%d", pmtu); ++fexit; break; case ICMP_UNREACH_SRCFAIL: - printf(" !S"); + xprintf(" !S"); ++fexit; break; case ICMP_UNREACH_FILTER_PROHIB: case ICMP_UNREACH_NET_PROHIB: - printf(" !A"); + xprintf(" !A"); ++fexit; break; case ICMP_UNREACH_HOST_PROHIB: - printf(" !C"); + xprintf(" !C"); ++fexit; break; case ICMP_UNREACH_HOST_PRECEDENCE: - printf(" !V"); + xprintf(" !V"); ++fexit; break; case ICMP_UNREACH_PRECEDENCE_CUTOFF: - printf(" !C"); + xprintf(" !C"); ++fexit; break; case ICMP_UNREACH_NET_UNKNOWN: case ICMP_UNREACH_HOST_UNKNOWN: - printf(" !U"); + xprintf(" !U"); ++fexit; break; case ICMP_UNREACH_ISOLATED: - printf(" !I"); + xprintf(" !I"); ++fexit; break; case ICMP_UNREACH_TOSNET: case ICMP_UNREACH_TOSHOST: - printf(" !T"); + xprintf(" !T"); + ++fexit; + break; + default: + break; + } + break; + } else { + struct icmp6_hdr *ricmp = (struct icmp6_hdr *) toybuf; + + if ((ricmp->icmp6_type == ICMP6_TIME_EXCEEDED + && ricmp->icmp6_code == ICMP6_TIME_EXCEED_TRANSIT) + || ricmp->icmp6_type == ICMP6_DST_UNREACH + || ricmp->icmp6_type == ICMP6_ECHO_REPLY) { + + struct ip6_hdr *hip; + struct udphdr *hudp; + int hdr_next; + + hip = (struct ip6_hdr *)(ricmp + 1); + hudp = (struct udphdr*) (hip + 1); + hdr_next = hip->ip6_nxt; + if (hdr_next == IPPROTO_FRAGMENT) { + hdr_next = *(unsigned char*)hudp; + hudp++; + } + + if (hdr_next == IPPROTO_UDP) { + struct payload_s *pkt = (struct payload_s*)(hudp + 1); + if ((pkt->ident == TT.ident) && (pkt->seq == seq)) + icmp_res = (ricmp->icmp6_type == ICMP6_TIME_EXCEEDED) ? -1 : + ricmp->icmp6_code; + } + } + + if (!icmp_res) continue; + if (addrlen > 0) { + if (memcmp(&((struct sockaddr_in6 *)&last_addr)->sin6_addr, + &((struct sockaddr_in6 *)&from)->sin6_addr, + sizeof(struct in6_addr))) { + if (!(toys.optflags & FLAG_n)) { + char host[NI_MAXHOST]; + if (!getnameinfo((struct sockaddr *) &from, + sizeof(from), host, sizeof(host), NULL, 0, 0)) + xprintf(" %s (", host); + } + memset(addr_str, '\0', INET6_ADDRSTRLEN); + inet_ntop(AF_INET6, &((struct sockaddr_in6 *)&from)->sin6_addr, + addr_str, INET6_ADDRSTRLEN); + xprintf(" %s", addr_str); + + if (!(toys.optflags & FLAG_n)) xprintf(")"); + memcpy(&last_addr,&from,sizeof(from)); + } + + if (toys.optflags & FLAG_v) { + if(print_verbose){ + memset(addr_str, '\0', INET6_ADDRSTRLEN); + inet_ntop(AF_INET6, &((struct sockaddr_in6 *) + &from)->sin6_addr, addr_str, INET6_ADDRSTRLEN); + rcv_len -= sizeof(struct ip6_hdr); + xprintf(" %d bytes to %s ", rcv_len, addr_str); + } + } + xprintf(" %u.%03u ms", delta / 1000, delta % 1000); + delta = 0; + + } else xprintf("\t!H"); + + switch (icmp_res) { + case ICMP6_DST_UNREACH_NOPORT: + ++fexit; + dest_reach = 1; + break; + case ICMP6_DST_UNREACH_NOROUTE: + xprintf(" !N"); ++fexit; break; + case ICMP6_DST_UNREACH_ADDR: + xprintf(" !H"); + ++fexit; + break; + case ICMP6_DST_UNREACH_ADMIN: + xprintf(" !S"); + ++fexit; + break; + default: + break; } break; } - } + } //revents } + print_verbose = 0; } xputc('\n'); - if (!memcmp(&from.sin_addr, &dest.sin_addr, sizeof(struct in_addr)) - || dest_reach || (fexit >= TT.ttl_probes -1)) - break; + if(!TT.istraceroute6) { + if (!memcmp(&((struct sockaddr_in *)&from)->sin_addr, + &((struct sockaddr_in *)&dest)->sin_addr, sizeof(struct in_addr)) + || dest_reach || (fexit && fexit >= TT.ttl_probes -1)) + break; + } else if (dest_reach || (fexit > 0 && fexit >= TT.ttl_probes -1)) break; } - } void traceroute_main(void) { - unsigned opt_len = 0, pack_size, tyser = 0; - int set = 1, lsrr = 0; + unsigned opt_len = 0, pack_size = 0, tyser = 0; + int lsrr = 0, set = 1; + + if(!(toys.optflags & FLAG_4) && + (inet_pton(AF_INET6, toys.optargs[0], (void*)&dest))) + toys.optflags |= FLAG_6; - if (toys.optflags & FLAG_g) { - struct arg_list *node; + memset(&dest, 0, sizeof(dest)); + if (toys.optflags & FLAG_6) TT.istraceroute6 = 1; + else TT.istraceroute6 = toys.which->name[10] == '6'; - for (node = TT.loose_source; node; node = node->next, lsrr++) { - struct sockaddr_in sin; + if(!TT.istraceroute6 && (toys.optflags & FLAG_g)) { + struct arg_list *node; - memset( &sin, 0, sizeof(sin)); - if (lsrr >= 8) error_exit("no more than 8 gateways"); // NGATEWAYS - resolve_addr(node->arg, SOCK_STREAM, 0, &sin); - TT.gw_list[lsrr] = sin.sin_addr.s_addr; - } - opt_len = (lsrr + 1) * sizeof(TT.gw_list[0]); - } + for (node = TT.loose_source; node; node = node->next, lsrr++) { + struct sockaddr_in sin; - pack_size = sizeof(struct ip) + opt_len; - pack_size += (toys.optflags & FLAG_U) ? sizeof(struct udphdr) - + sizeof(struct payload_s) : ICMP_HD_SIZE; + memset( &sin, 0, sizeof(sin)); + if (lsrr >= 8) error_exit("no more than 8 gateways"); // NGATEWAYS + resolve_addr(node->arg, AF_INET, SOCK_STREAM, 0, &sin); + TT.gw_list[lsrr] = sin.sin_addr.s_addr; + } + opt_len = (lsrr + 1) * sizeof(TT.gw_list[0]); + } else TT.first_ttl = 1; + TT.msg_len = pack_size = ICMP_HD_SIZE4; //udp payload is also 8bytes if (toys.optargs[1]) - TT.msg_len = get_int_value(toys.optargs[1], pack_size, 32768);//max packet size - - TT.msg_len = (TT.msg_len < pack_size) ? pack_size : TT.msg_len; - TT.recv_sock = xsocket(AF_INET, SOCK_RAW, IPPROTO_ICMP); - if (toys.optflags & FLAG_d - && (setsockopt(TT.recv_sock, SOL_SOCKET, SO_DEBUG, &set, sizeof(set)) < 0)) - perror_exit("SO_DEBUG failed "); - if (toys.optflags & FLAG_r - && (setsockopt(TT.recv_sock, SOL_SOCKET, SO_DONTROUTE, &set, sizeof(set)) < 0)) - perror_exit("SO_DONTROUTE failed "); - - if (toys.optflags & FLAG_U) TT.snd_sock = xsocket(AF_INET, SOCK_DGRAM, IPPROTO_UDP); - else TT.snd_sock = xsocket(AF_INET, SOCK_RAW, IPPROTO_ICMP); - - resolve_addr(toys.optargs[0], ((toys.optflags & FLAG_U) ? SOCK_DGRAM : SOCK_RAW), - ((toys.optflags & FLAG_U) ? IPPROTO_UDP : IPPROTO_ICMP), &dest); - - if (lsrr > 0) { - unsigned char optlist[MAX_IPOPTLEN]; - unsigned size; - - TT.gw_list[lsrr] = dest.sin_addr.s_addr; - ++lsrr; - - optlist[0] = IPOPT_NOP; - optlist[1] = IPOPT_LSRR;// loose source route option - size = lsrr * sizeof(TT.gw_list[0]); - optlist[2] = size + 3; - optlist[3] = IPOPT_MINOFF; - memcpy(optlist + 4, TT.gw_list, size); - - if (setsockopt(TT.snd_sock, IPPROTO_IP, IP_OPTIONS, - (char *)optlist, size + sizeof(TT.gw_list[0])) < 0) - perror_exit("LSRR IP_OPTIONS"); + TT.msg_len = atolx_range(toys.optargs[1], pack_size, 32768);//max packet size + + TT.recv_sock = xsocket((TT.istraceroute6 ? AF_INET6 : AF_INET), SOCK_RAW, + (TT.istraceroute6 ? IPPROTO_ICMPV6 : IPPROTO_ICMP)); + + if (TT.istraceroute6) { + int two = 2; +#ifdef IPV6_RECVPKTINFO + setsockopt(TT.recv_sock, SOL_IPV6, IPV6_RECVPKTINFO, &set, + sizeof(set)); + setsockopt(TT.recv_sock, SOL_IPV6, IPV6_2292PKTINFO, &set, + sizeof(set)); +#else + setsockopt(TT.recv_sock, SOL_IPV6, IPV6_PKTINFO, &set, sizeof(set)); +#endif + + if (setsockopt(TT.recv_sock, SOL_RAW, IPV6_CHECKSUM, &two, + sizeof(two)) < 0) perror_exit("setsockopt RAW_CHECKSUM"); } - if (setsockopt(TT.snd_sock, SOL_SOCKET, SO_SNDBUF, &TT.msg_len, sizeof(TT.msg_len)) < 0) - perror_exit("SO_SNDBUF failed "); + set_flag_dr(TT.recv_sock); + + if (!TT.istraceroute6) { + if (toys.optflags & FLAG_U) + TT.snd_sock = xsocket(AF_INET, SOCK_DGRAM, IPPROTO_UDP); + else TT.snd_sock = xsocket(AF_INET, SOCK_RAW, IPPROTO_ICMP); + + if (toys.optflags & FLAG_i) bind_to_interface(TT.snd_sock); - if ((toys.optflags & FLAG_t) && - setsockopt(TT.snd_sock, IPPROTO_IP, IP_TOS, &tyser, sizeof(tyser)) < 0) - perror_exit("IP_TOS %d failed ", TT.tos); + resolve_addr(toys.optargs[0], AF_INET, ((toys.optflags & FLAG_U) ? + SOCK_DGRAM : SOCK_RAW), ((toys.optflags & FLAG_U) ? IPPROTO_UDP : + IPPROTO_ICMP), &dest); + if (lsrr > 0) { + unsigned char optlist[MAX_IPOPTLEN]; + unsigned size; + + TT.gw_list[lsrr] = ((struct sockaddr_in *)&dest)->sin_addr.s_addr; + ++lsrr; + + optlist[0] = IPOPT_NOP; + optlist[1] = IPOPT_LSRR;// loose source route option + size = lsrr * sizeof(TT.gw_list[0]); + optlist[2] = size + 3; + optlist[3] = IPOPT_MINOFF; + memcpy(optlist + 4, TT.gw_list, size); + + if (setsockopt(TT.snd_sock, IPPROTO_IP, IP_OPTIONS, + (char *)optlist, size + sizeof(TT.gw_list[0])) < 0) + perror_exit("LSRR IP_OPTIONS"); + } + } else TT.snd_sock = xsocket(AF_INET6, SOCK_DGRAM, IPPROTO_UDP); + + if (setsockopt(TT.snd_sock, SOL_SOCKET, SO_SNDBUF, &TT.msg_len, + sizeof(TT.msg_len)) < 0) perror_exit("SO_SNDBUF failed "); + + if (!TT.istraceroute6) { + if ((toys.optflags & FLAG_t) && + setsockopt(TT.snd_sock, IPPROTO_IP, IP_TOS, &tyser, sizeof(tyser)) < 0) + perror_exit("IP_TOS %d failed ", TT.tos); #ifdef IP_DONTFRAG - if ((toys.optflags & FLAG_F) && - (setsockopt(TT.snd_sock, IPPROTO_IP, IP_DONTFRAG, &set, sizeof(set)) < 0)) - perror_exit("IP_DONTFRAG failed "); + if ((toys.optflags & FLAG_F) && + (setsockopt(TT.snd_sock, IPPROTO_IP, IP_DONTFRAG, &set, + sizeof(set)) < 0)) perror_exit("IP_DONTFRAG failed "); #endif + } else if (setsockopt(TT.snd_sock, IPPROTO_IPV6, IPV6_TCLASS, &TT.tos, + sizeof(TT.tos)) < 0) perror_exit("IPV6_TCLASS %d failed ", TT.tos); - if ((toys.optflags & FLAG_d) - && (setsockopt(TT.snd_sock, SOL_SOCKET, SO_DEBUG, &set, sizeof(set)) < 0)) - perror_exit("SO_DEBUG failed "); - if ((toys.optflags & FLAG_r) && - (setsockopt(TT.snd_sock, SOL_SOCKET, SO_DONTROUTE, &set, sizeof(set)) < 0)) - perror_exit("SO_DONTROUTE failed "); + set_flag_dr(TT.snd_sock); + TT.packet = xzalloc(TT.msg_len); + TT.ident = getpid(); + if (!TT.istraceroute6) { + if (!(toys.optflags & FLAG_U)) TT.ident |= 0x8000; + if (toys.optflags & FLAG_s) { + struct sockaddr_in source; + + memset(&source, 0, sizeof(source)); + if (!inet_aton(TT.src_ip, &(source.sin_addr))) + error_exit("bad address: %s", TT.src_ip); + if (setsockopt(TT.snd_sock, IPPROTO_IP, IP_MULTICAST_IF, + (struct sockaddr*)&source, sizeof(struct sockaddr_in))) + perror_exit("can't set multicast source interface"); + if (bind(TT.snd_sock,(struct sockaddr*)&source, + sizeof(struct sockaddr_in)) < 0) perror_exit("bind"); + } - TT.packet = xmalloc(TT.msg_len); - TT.ident = getpid(); + if(TT.first_ttl > TT.max_ttl) + error_exit("ERROR :Range for -f is 1 to %d (max ttl)", TT.max_ttl); - if (toys.optflags & FLAG_U) send_data = (struct payload_s *) (send_udp + 1); - else { - TT.ident |= 0x8000; - send_icmp->icmp_type = ICMP_ECHO; - send_icmp->icmp_id = htons(TT.ident); - } - if (toys.optflags & FLAG_s) { - struct sockaddr_in *source = xzalloc(sizeof(struct sockaddr_in)); - inet_aton(TT.src_ip, &source->sin_addr); - if (setsockopt(TT.snd_sock, IPPROTO_IP, IP_MULTICAST_IF, - (struct sockaddr*)source, sizeof(*source))) - perror_exit("can't set multicast source interface"); - if (bind(TT.snd_sock,(struct sockaddr*)source, sizeof(*source))) - perror_exit("bind"); - free(source); + xprintf("traceroute to %s(%s)", toys.optargs[0], + inet_ntoa(((struct sockaddr_in *)&dest)->sin_addr)); + } else { + if (toys.optflags & FLAG_i) bind_to_interface(TT.snd_sock); + + resolve_addr(toys.optargs[0], AF_INET6, SOCK_DGRAM, IPPROTO_UDP, &dest); + if (toys.optflags & FLAG_s) { + struct sockaddr_in6 source; + + memset(&source, 0, sizeof(source)); + if(inet_pton(AF_INET6, TT.src_ip, &(source.sin6_addr)) <= 0) + error_exit("bad address: %s", TT.src_ip); + + if (bind(TT.snd_sock,(struct sockaddr*)&source, + sizeof(struct sockaddr_in6)) < 0) + error_exit("bind: Cannot assign requested address"); + } else { + struct sockaddr_in6 prb; + socklen_t len = sizeof(prb); + int p_fd = xsocket(AF_INET6, SOCK_DGRAM, 0); + if (toys.optflags & FLAG_i) bind_to_interface(p_fd); + + ((struct sockaddr_in6 *)&dest)->sin6_port = htons(1025); + if (connect(p_fd, (struct sockaddr *)&dest, sizeof(struct sockaddr_in6)) < 0) + perror_exit("can't connect to remote host"); + if(getsockname(p_fd, (struct sockaddr *)&prb, &len)) + error_exit("probe addr failed"); + close(p_fd); + prb.sin6_port = 0; + if (bind(TT.snd_sock, (struct sockaddr*)&prb, + sizeof(struct sockaddr_in6))) perror_exit("bind"); + if (bind(TT.recv_sock, (struct sockaddr*)&prb, + sizeof(struct sockaddr_in6))) perror_exit("bind"); + } + + inet_ntop(AF_INET6, &((struct sockaddr_in6 *)&dest)->sin6_addr, + addr_str, INET6_ADDRSTRLEN); + xprintf("traceroute6 to %s(%s)", toys.optargs[0], addr_str); } - if(TT.first_ttl > TT.max_ttl) - error_exit("ERROR :Range for -f is 1 to %d (max ttl)", TT.max_ttl); + if (toys.optflags & FLAG_s) xprintf(" from %s",TT.src_ip); + xprintf(", %ld hops max, %u byte packets\n", TT.max_ttl, TT.msg_len); - printf("traceroute to %s(%s)", toys.optargs[0], inet_ntoa(dest.sin_addr)); - if (toys.optflags & FLAG_s) printf(" from %s", TT.src_ip); - printf(", %ld hops max, %u byte packets\n", TT.max_ttl, TT.msg_len); - do_trace(); } |