/* * $OpenBSD: inet6.c,v 1.31 2004/11/17 01:47:20 itojun Exp $ */ /* * BSDI inet.c,v 2.3 1995/10/24 02:19:29 prb Exp */ /* * Copyright (c) 1983, 1988, 1993 * The Regents of the University of California. All rights reserved. * * Redistribution and use in source and binary forms, with or without * modification, are permitted provided that the following conditions * are met: * 1. Redistributions of source code must retain the above copyright * notice, this list of conditions and the following disclaimer. * 2. Redistributions in binary form must reproduce the above copyright * notice, this list of conditions and the following disclaimer in the * documentation and/or other materials provided with the distribution. * 3. Neither the name of the University nor the names of its contributors * may be used to endorse or promote products derived from this software * without specific prior written permission. * * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF * SUCH DAMAGE. */ #include #if HAVE_UNISTD_H #include #endif #if HAVE_WINSOCK_H #include "winstub.h" #endif #if HAVE_SYS_SOCKET_H #include #endif #if HAVE_NETDB_H #include #endif #if HAVE_SYS_TYPES_H #include #endif #if HAVE_NETINET_IN_H #include #endif #if HAVE_ARPA_INET_H #include #endif #include #include "main.h" #include "netstat.h" struct stat_table { unsigned int entry; /* entry number in table */ /* * format string to printf(description, value) * warning: the %d must be before the %s */ char description[80]; }; static char *inet6name(const struct in6_addr *); /* * Print a summary of TCPv6 connections * Listening processes are suppressed unless the * -a (all) flag is specified. */ const char *tcp6states[] = { "", "CLOSED", "LISTEN", "SYNSENT", "SYNRECEIVED", "ESTABLISHED", "FINWAIT1", "FINWAIT2", "CLOSEWAIT", "LASTACK", "CLOSING", "TIMEWAIT" }; #define TCP_NSTATES 11 void tcp6protopr(const char *name) { netsnmp_variable_list *var, *vp; oid ipv6TcpConnState_oid[] = { 1, 3, 6, 1, 2, 1, 6, 16, 1, 6 }; size_t ipv6TcpConnState_len = OID_LENGTH(ipv6TcpConnState_oid); int state, i; unsigned char localAddr[16], remoteAddr[16]; int localPort, remotePort, ifIndex; int first = 1; /* * Walking the v6 tcpConnState column will provide all * the necessary information. */ var = NULL; snmp_varlist_add_variable(&var, ipv6TcpConnState_oid, ipv6TcpConnState_len, ASN_NULL, NULL, 0); if (netsnmp_query_walk(var, ss) != SNMP_ERR_NOERROR) return; if ((var->type & 0xF0) == 0x80) /* exception */ return; for (vp = var; vp; vp = vp->next_variable) { state = *vp->val.integer; if (!aflag && state == MIB_TCPCONNSTATE_LISTEN) continue; if (first) { printf("Active Internet Connections"); if (aflag) printf(" (including servers)"); putchar('\n'); printf("%-5.5s %-27.27s %-27.27s %4s %s\n", "Proto", "Local Address", "Remote Address", "I/F", "(state)"); first = 0; } /* * Extract the local/remote information from the index values */ for (i = 0; i < 16; i++) localAddr[i] = vp->name[10 + i]; localPort = vp->name[26]; for (i = 0; i < 16; i++) remoteAddr[i] = vp->name[27 + i]; remotePort = vp->name[43]; ifIndex = vp->name[44]; printf("%-5.5s", name); inet6print((struct in6_addr *) localAddr, localPort, name, 1); inet6print((struct in6_addr *) remoteAddr, remotePort, name, 0); if (state < 1 || state > TCP_NSTATES) printf(" %4d %d\n", ifIndex, state); else printf(" %4d %s\n", ifIndex, tcp6states[state]); } snmp_free_varbind(var); } /* * Print a summary of UDPv6 "connections" * XXX - what about "listening" services ?? */ void udp6protopr(const char *name) { netsnmp_variable_list *var, *vp; oid ipv6UdpLocalAddress_oid[] = { 1, 3, 6, 1, 2, 1, 7, 6, 1, 1 }; size_t ipv6UdpLocalAddress_len = OID_LENGTH(ipv6UdpLocalAddress_oid); int localPort, ifIndex; /* * Walking a single column of the udpTable will provide * all the necessary information from the index values. */ var = NULL; snmp_varlist_add_variable(&var, ipv6UdpLocalAddress_oid, ipv6UdpLocalAddress_len, ASN_NULL, NULL, 0); if (netsnmp_query_walk(var, ss) != SNMP_ERR_NOERROR) return; if ((var->type & 0xF0) == 0x80) /* exception */ return; printf("Active Internet Connections\n"); printf("%-5.5s %-27.27s %4s\n", "Proto", "Local Address", "I/F"); for (vp = var; vp; vp = vp->next_variable) { printf("%-5.5s", name); /* * Extract the local port from the index values, but take * the IP address from the varbind value, (which is why * we walked udpLocalAddress rather than udpLocalPort) */ localPort = vp->name[vp->name_length - 2]; ifIndex = vp->name[vp->name_length - 1]; inet6print((struct in6_addr *) vp->val.string, localPort, name, 1); printf(" %4d\n", ifIndex); } snmp_free_varbind(var); } /********************* * * IPv6 statistics * *********************/ /* * Unlike the equivalent IPv4 statistics display routine, * the IPv6 version must walk the columns of a table * and total the statistics for each column (rather * than simply retrieving individual scalar values) */ void _dump_v6stats(const char *name, oid * oid_buf, size_t buf_len, struct stat_table *stable) { netsnmp_variable_list *var, *vp; struct stat_table *sp; long *stats; oid stat; unsigned int max_stat = 0; int active = 0; var = NULL; for (sp = stable; sp->entry; sp++) { oid_buf[buf_len - 1] = sp->entry; if (sp->entry > max_stat) max_stat = sp->entry; snmp_varlist_add_variable(&var, oid_buf, buf_len, ASN_NULL, NULL, 0); } oid_buf[buf_len - 1] = stable[0].entry; stats = (long *) calloc(max_stat + 1, sizeof(long)); /* * Walk the specified column(s), and total the individual statistics */ while (1) { if (netsnmp_query_getnext(var, ss) != SNMP_ERR_NOERROR) break; if ((var->type & 0xF0) == 0x80) /* exception */ break; if (snmp_oid_compare(oid_buf, buf_len, var->name, buf_len) != 0) break; /* End of Table */ for (vp = var; vp; vp = vp->next_variable) { stat = vp->name[buf_len - 1]; stats[stat] += *vp->val.integer; } active = 1; } if (!active) { free(stats); snmp_free_varbind(var); return; /* No statistics to display */ } /* * Display the results */ printf("%s:\n", name); for (sp = stable; sp->entry; sp++) { /* * If '-Cs' was specified twice, * then only display non-zero stats. */ if (stats[sp->entry] > 0 || sflag == 1) { printf(sp->description, stats[sp->entry], plural(stats[sp->entry])); putchar('\n'); } } free(stats); snmp_free_varbind(var); } /* * Dump IP6 statistics. */ void ip6_stats(const char *name) { oid ip6stats_oid[] = { 1, 3, 6, 1, 2, 1, 55, 1, 6, 1, 0 }; size_t ip6stats_len = OID_LENGTH(ip6stats_oid); struct stat_table ip6stats_tbl[] = { {1, "%14d total datagram%s received"}, {2, "%14d datagram%s with header errors"}, {3, "%14d oversized datagram%s"}, {4, "%14d datagram%s with no route"}, {5, "%14d datagram%s with an invalid destination address"}, {6, "%14d datagram%s with unknown protocol"}, {7, "%14d short datagram%s discarded"}, {8, "%14d datagram%s discarded"}, {9, "%14d datagram%s delivered"}, {10, "%14d datagram%s forwarded"}, {11, "%14d output datagram request%s"}, {12, "%14d output datagram%s discarded"}, {13, "%14d datagram%s fragmented"}, {14, "%14d fragmentation failure%s"}, {15, "%14d fragment%s created"}, {16, "%14d fragment%s received"}, {17, "%14d datagram%s reassembled"}, {18, "%14d reassembly failure%s"}, {19, "%14d multicast datagram%s received"}, {20, "%14d multicast datagram%s transmitted"}, {0, ""} }; _dump_v6stats(name, ip6stats_oid, ip6stats_len, ip6stats_tbl); } /* * Dump IPv6 per-interface statistics - Omitted */ /* * Dump ICMP6 statistics. */ void icmp6_stats(const char *name) { oid icmp6stats_oid[] = { 1, 3, 6, 1, 2, 1, 56, 1, 1, 1, 0 }; size_t icmp6stats_len = OID_LENGTH(icmp6stats_oid); struct stat_table icmp6stats_tbl[] = { {1, "%14d total message%s received"}, {2, "%14d message%s dropped due to errors"}, {18, "%14d ouput message request%s"}, {19, "%14d output message%s discarded"}, {0, ""} }; struct stat_table icmp6_inhistogram[] = { {3, " Destination unreachable: %d"}, {4, " Admin Prohibit: %d"}, {5, " Time Exceeded: %d"}, {6, " Parameter Problem: %d"}, {7, " Too Big: %d"}, {8, " Echo Request: %d"}, {9, " Echo Reply: %d"}, {10, " Router Solicit: %d"}, {11, " Router Advert: %d"}, {12, " Neighbor Solicit: %d"}, {13, " Neighbor Advert: %d"}, {14, " Redirect: %d"}, {15, " Group Member Request: %d"}, {16, " Group Member Reply: %d"}, {17, " Group Member Reduce: %d"}, {0, ""} }; struct stat_table icmp6_outhistogram[] = { {20, " Destination unreachable: %d"}, {21, " Admin Prohibit: %d"}, {22, " Time Exceeded: %d"}, {23, " Parameter Problem: %d"}, {24, " Too Big: %d"}, {25, " Echo Request: %d"}, {26, " Echo Reply: %d"}, {27, " Router Solicit: %d"}, {28, " Router Advert: %d"}, {29, " Neighbor Solicit: %d"}, {30, " Neighbor Advert: %d"}, {31, " Redirect: %d"}, {32, " Group Member Request: %d"}, {33, " Group Member Reply: %d"}, {34, " Group Member Reduce: %d"}, {0, ""} }; _dump_v6stats(name, icmp6stats_oid, icmp6stats_len, icmp6stats_tbl); _dump_v6stats(" Input Histogram", icmp6stats_oid, icmp6stats_len, icmp6_inhistogram); _dump_v6stats(" Output Histogram", icmp6stats_oid, icmp6stats_len, icmp6_outhistogram); } /* * Dump ICMPv6 per-interface statistics - Omitted */ /* * Ommitted: * Dump PIM statistics * Dump raw ip6 statistics */ /* * Pretty print an Internet address (net address + port). * If the nflag was specified, use numbers instead of names. */ void inet6print(const struct in6_addr *in6, int port, const char *proto, int local) { #define GETSERVBYPORT6(port, proto, ret) do { \ if (strcmp((proto), "tcp6") == 0) \ (ret) = getservbyport((int)(port), "tcp"); \ else if (strcmp((proto), "udp6") == 0) \ (ret) = getservbyport((int)(port), "udp"); \ else \ (ret) = getservbyport((int)(port), (proto)); \ } while (0) struct servent *sp = NULL; char line[80], *cp; int width = 27 - 9; int len = sizeof line; if (vflag && width < strlen(inet6name(in6))) width = strlen(inet6name(in6)); snprintf(line, len, "%.*s.", width, inet6name(in6)); len -= strlen(line); if (len <= 0) goto bail; cp = strchr(line, '\0'); if (!nflag && port && local) GETSERVBYPORT6(htons(port), proto, sp); if (sp || port == 0) snprintf(cp, len, vflag ? "%s" : "%.8s", sp ? sp->s_name : "*"); else snprintf(cp, len, "%d", port); width = 27; if (vflag && width < strlen(line)) width = strlen(line); bail: printf(" %-*.*s", width, width, line); } /* * Construct an Internet address representation. * If the nflag has been supplied, give * numeric value, otherwise try for symbolic name. */ char * inet6name(const struct in6_addr *in6p) { char *cp; static char line[NI_MAXHOST]; static char domain[MAXHOSTNAMELEN]; static int first = 1; if (first && !nflag) { first = 0; if (gethostname(line, sizeof(line)) == 0 && (cp = strchr(line, '.'))) (void) strlcpy(domain, cp + 1, sizeof domain); else domain[0] = '\0'; } #ifdef NETSNMP_ENABLE_IPV6 if (IN6_IS_ADDR_UNSPECIFIED(in6p)) { strlcpy(line, "*", sizeof(line)); } else { struct sockaddr_in6 sin6; char hbuf[NI_MAXHOST]; memset(&sin6, 0, sizeof(sin6)); sin6.sin6_family = AF_INET6; sin6.sin6_addr = *in6p; #ifdef __KAME__ if (IN6_IS_ADDR_LINKLOCAL(in6p) || IN6_IS_ADDR_MC_LINKLOCAL(in6p)) { sin6.sin6_scope_id = ntohs(*(const uint16_t *) &in6p->s6_addr[2]); sin6.sin6_addr.s6_addr[2] = 0; sin6.sin6_addr.s6_addr[3] = 0; } #endif if (getnameinfo((struct sockaddr *) &sin6, sizeof(sin6), hbuf, sizeof(hbuf), NULL, 0, nflag ? NI_NUMERICHOST : 0) < 0) strlcpy(hbuf, "?", sizeof(hbuf)); if ((cp = strchr(hbuf, '.')) && strcmp(cp + 1, domain) == 0) *cp = 0; strlcpy(line, hbuf, sizeof(line)); } #else strlcpy(line, "[[XXX - inet6 address]]", sizeof(line)); #endif return (line); } #ifdef TCP6 /* * Dump the contents of a TCP6 PCB - Omitted */ #endif