diff --git a/clients/common/nm-meta-setting-desc.c b/clients/common/nm-meta-setting-desc.c
index 2988b084b7..1154fabfb6 100644
--- a/clients/common/nm-meta-setting-desc.c
+++ b/clients/common/nm-meta-setting-desc.c
@@ -6073,6 +6073,9 @@ static const NMMetaPropertyInfo *const property_infos_IP6_CONFIG[] = {
| NM_META_PROPERTY_TYP_FLAG_ENUM_GET_PRETTY_TEXT,
),
),
+ PROPERTY_INFO (NM_SETTING_IP6_CONFIG_DHCP_DUID, DESCRIBE_DOC_NM_SETTING_IP6_CONFIG_DHCP_DUID,
+ .property_type = &_pt_gobject_string,
+ ),
PROPERTY_INFO (NM_SETTING_IP_CONFIG_DHCP_SEND_HOSTNAME, DESCRIBE_DOC_NM_SETTING_IP6_CONFIG_DHCP_SEND_HOSTNAME,
.property_type = &_pt_gobject_bool,
),
diff --git a/clients/common/settings-docs.h.in b/clients/common/settings-docs.h.in
index 06f96a4e1f..c4b15b4cc2 100644
--- a/clients/common/settings-docs.h.in
+++ b/clients/common/settings-docs.h.in
@@ -152,7 +152,7 @@
#define DESCRIBE_DOC_NM_SETTING_CONNECTION_READ_ONLY N_("FALSE if the connection can be modified using the provided settings service's D-Bus interface with the right privileges, or TRUE if the connection is read-only and cannot be modified.")
#define DESCRIBE_DOC_NM_SETTING_CONNECTION_SECONDARIES N_("List of connection UUIDs that should be activated when the base connection itself is activated. Currently only VPN connections are supported.")
#define DESCRIBE_DOC_NM_SETTING_CONNECTION_SLAVE_TYPE N_("Setting name of the device type of this slave's master connection (eg, \"bond\"), or NULL if this connection is not a slave.")
-#define DESCRIBE_DOC_NM_SETTING_CONNECTION_STABLE_ID N_("This represents the identity of the connection used for various purposes. It allows to configure multiple profiles to share the identity. Also, the stable-id can contain placeholders that are substituted dynamically and deterministically depending on the context. The stable-id is used for generating IPv6 stable private addresses with ipv6.addr-gen-mode=stable-privacy. It is also used to seed the generated cloned MAC address for ethernet.cloned-mac-address=stable and wifi.cloned-mac-address=stable. It is also used as DHCP client identifier with ipv4.dhcp-client-id=stable. Note that depending on the context where it is used, other parameters are also seeded into the generation algorithm. For example, a per-host key is commonly also included, so that different systems end up generating different IDs. Or with ipv6.addr-gen-mode=stable-privacy, also the device's name is included, so that different interfaces yield different addresses. The '$' character is treated special to perform dynamic substitutions at runtime. Currently supported are \"${CONNECTION}\", \"${DEVICE}\", \"${BOOT}\", \"${RANDOM}\". These effectively create unique IDs per-connection, per-device, per-boot, or every time. Note that \"${DEVICE}\" corresponds the the interface name of the device. Any unrecognized patterns following '$' are treated verbatim, however are reserved for future use. You are thus advised to avoid '$' or escape it as \"$$\". For example, set it to \"${CONNECTION}-${BOOT}-${DEVICE}\" to create a unique id for this connection that changes with every reboot and differs depending on the interface where the profile activates. If the value is unset, a global connection default is consulted. If the value is still unset, the default is similar to \"${CONNECTION}\" and uses a unique, fixed ID for the connection.")
+#define DESCRIBE_DOC_NM_SETTING_CONNECTION_STABLE_ID N_("This represents the identity of the connection used for various purposes. It allows to configure multiple profiles to share the identity. Also, the stable-id can contain placeholders that are substituted dynamically and deterministically depending on the context. The stable-id is used for generating IPv6 stable private addresses with ipv6.addr-gen-mode=stable-privacy. It is also used to seed the generated cloned MAC address for ethernet.cloned-mac-address=stable and wifi.cloned-mac-address=stable. It is also used as DHCP client identifier with ipv4.dhcp-client-id=stable and to derive the DHCP DUID with ipv6.dhcp-duid=stable-[llt,ll,uuid]. Note that depending on the context where it is used, other parameters are also seeded into the generation algorithm. For example, a per-host key is commonly also included, so that different systems end up generating different IDs. Or with ipv6.addr-gen-mode=stable-privacy, also the device's name is included, so that different interfaces yield different addresses. The '$' character is treated special to perform dynamic substitutions at runtime. Currently supported are \"${CONNECTION}\", \"${DEVICE}\", \"${BOOT}\", \"${RANDOM}\". These effectively create unique IDs per-connection, per-device, per-boot, or every time. Note that \"${DEVICE}\" corresponds the the interface name of the device. Any unrecognized patterns following '$' are treated verbatim, however are reserved for future use. You are thus advised to avoid '$' or escape it as \"$$\". For example, set it to \"${CONNECTION}-${BOOT}-${DEVICE}\" to create a unique id for this connection that changes with every reboot and differs depending on the interface where the profile activates. If the value is unset, a global connection default is consulted. If the value is still unset, the default is similar to \"${CONNECTION}\" and uses a unique, fixed ID for the connection.")
#define DESCRIBE_DOC_NM_SETTING_CONNECTION_TIMESTAMP N_("The time, in seconds since the Unix Epoch, that the connection was last _successfully_ fully activated. NetworkManager updates the connection timestamp periodically when the connection is active to ensure that an active connection has the latest timestamp. The property is only meant for reading (changes to this property will not be preserved).")
#define DESCRIBE_DOC_NM_SETTING_CONNECTION_TYPE N_("Base type of the connection. For hardware-dependent connections, should contain the setting name of the hardware-type specific setting (ie, \"802-3-ethernet\" or \"802-11-wireless\" or \"bluetooth\", etc), and for non-hardware dependent connections like VPN or otherwise, should contain the setting name of that setting type (ie, \"vpn\" or \"bridge\", etc).")
#define DESCRIBE_DOC_NM_SETTING_CONNECTION_UUID N_("A universally unique identifier for the connection, for example generated with libuuid. It should be assigned when the connection is created, and never changed as long as the connection still applies to the same network. For example, it should not be changed when the \"id\" property or NMSettingIP4Config changes, but might need to be re-created when the Wi-Fi SSID, mobile broadband network provider, or \"type\" property changes. The UUID must be in the format \"2815492f-7e56-435e-b2e9-246bd7cdc664\" (ie, contains only hexadecimal characters and \"-\").")
@@ -233,6 +233,7 @@
#define DESCRIBE_DOC_NM_SETTING_IP6_CONFIG_ADDR_GEN_MODE N_("Configure method for creating the address for use with RFC4862 IPv6 Stateless Address Autoconfiguration. The permitted values are: NM_SETTING_IP6_CONFIG_ADDR_GEN_MODE_EUI64 (0) or NM_SETTING_IP6_CONFIG_ADDR_GEN_MODE_STABLE_PRIVACY (1). If the property is set to EUI64, the addresses will be generated using the interface tokens derived from hardware address. This makes the host part of the address to stay constant, making it possible to track host's presence when it changes networks. The address changes when the interface hardware is replaced. The value of stable-privacy enables use of cryptographically secure hash of a secret host-specific key along with the connection's stable-id and the network address as specified by RFC7217. This makes it impossible to use the address track host's presence, and makes the address stable when the network interface hardware is replaced. On D-Bus, the absence of an addr-gen-mode setting equals enabling stable-privacy. For keyfile plugin, the absence of the setting on disk means EUI64 so that the property doesn't change on upgrade from older versions. Note that this setting is distinct from the Privacy Extensions as configured by \"ip6-privacy\" property and it does not affect the temporary addresses configured with this option.")
#define DESCRIBE_DOC_NM_SETTING_IP6_CONFIG_ADDRESSES N_("Array of IP addresses.")
#define DESCRIBE_DOC_NM_SETTING_IP6_CONFIG_DAD_TIMEOUT N_("Timeout in milliseconds used to check for the presence of duplicate IP addresses on the network. If an address conflict is detected, the activation will fail. A zero value means that no duplicate address detection is performed, -1 means the default value (either configuration ipvx.dad-timeout override or zero). A value greater than zero is a timeout in milliseconds. The property is currently implemented only for IPv4.")
+#define DESCRIBE_DOC_NM_SETTING_IP6_CONFIG_DHCP_DUID N_("A string containing the DHCPv6 Unique Identifier (DUID) used by the dhcp client to identify itself to DHCPv6 servers (RFC 3315). The DUID is carried in the Client Identifier option. If the property is a hex string ('aa:bb:cc') it is interpreted as a binary DUID and filled as an opaque value in the Client Identifier option. The special value \"lease\" will retrieve the DUID previously used from the lease file belonging to the connection. If no DUID is found and \"dhclient\" is the configured dhcp client, the DUID is searched in the system-wide dhclient lease file. If still no DUID is found, or another dhcp client is used, a global and permanent DUID-UUID (RFC 6355) will be generated based on the machine-id. The special values \"llt\" and \"ll\" will generate a DUID of type LLT or LL (see RFC 3315) based on the current MAC address of the device. In order to try providing a stable DUID-LLT, the time field will contain a constant timestamp that is used globally (for all profiles) and persisted to disk. The special values \"stable-llt\", \"stable-ll\" and \"stable-uuid\" will generate a DUID of the corresponding type, derived from the connection's stable-id and a per-host unique key. So, the link-layer address of \"stable-ll\" and \"stable-llt\" will be a generated address derived from the stable id. The DUID-LLT time value in the \"stable-llt\" option will be picked among a static timespan of three years (the upper bound of the interval is the same constant timestamp used in \"llt\"). When the property is unset, the global value provided for \"ipv6.dhcp-duid\" is used. If no global value is provided, the default \"lease\" value is assumed.")
#define DESCRIBE_DOC_NM_SETTING_IP6_CONFIG_DHCP_HOSTNAME N_("If the \"dhcp-send-hostname\" property is TRUE, then the specified name will be sent to the DHCP server when acquiring a lease. This property and \"dhcp-fqdn\" are mutually exclusive and cannot be set at the same time.")
#define DESCRIBE_DOC_NM_SETTING_IP6_CONFIG_DHCP_SEND_HOSTNAME N_("If TRUE, a hostname is sent to the DHCP server when acquiring a lease. Some DHCP servers use this hostname to update DNS databases, essentially providing a static hostname for the computer. If the \"dhcp-hostname\" property is NULL and this property is TRUE, the current persistent hostname of the computer is sent.")
#define DESCRIBE_DOC_NM_SETTING_IP6_CONFIG_DHCP_TIMEOUT N_("A timeout for a DHCP transaction in seconds.")
diff --git a/clients/tests/test-client.check-on-disk/test_003-022.expected b/clients/tests/test-client.check-on-disk/test_003-022.expected
index fb27dfc02a..b29a2ea543 100644
--- a/clients/tests/test-client.check-on-disk/test_003-022.expected
+++ b/clients/tests/test-client.check-on-disk/test_003-022.expected
@@ -2,7 +2,7 @@ location: clients/tests/test-client.py:751:test_003()/22
cmd: $NMCLI -f ALL con s ethernet
lang: C
returncode: 0
-stdout: 3516 bytes
+stdout: 3559 bytes
>>>
connection.id: ethernet
connection.uuid: UUID-ethernet-REPLACED-REPLACED-REPL
@@ -75,6 +75,7 @@ ipv6.never-default: no
ipv6.may-fail: yes
ipv6.ip6-privacy: -1 (unknown)
ipv6.addr-gen-mode: stable-privacy
+ipv6.dhcp-duid: --
ipv6.dhcp-send-hostname: yes
ipv6.dhcp-hostname: --
ipv6.token: --
diff --git a/clients/tests/test-client.check-on-disk/test_003-023.expected b/clients/tests/test-client.check-on-disk/test_003-023.expected
index 577bd49818..0c0b7e4e16 100644
--- a/clients/tests/test-client.check-on-disk/test_003-023.expected
+++ b/clients/tests/test-client.check-on-disk/test_003-023.expected
@@ -2,7 +2,7 @@ location: clients/tests/test-client.py:751:test_003()/23
cmd: $NMCLI -f ALL con s ethernet
lang: pl_PL.UTF-8
returncode: 0
-stdout: 3534 bytes
+stdout: 3577 bytes
>>>
connection.id: ethernet
connection.uuid: UUID-ethernet-REPLACED-REPLACED-REPL
@@ -75,6 +75,7 @@ ipv6.never-default: nie
ipv6.may-fail: tak
ipv6.ip6-privacy: -1 (unknown)
ipv6.addr-gen-mode: stable-privacy
+ipv6.dhcp-duid: --
ipv6.dhcp-send-hostname: tak
ipv6.dhcp-hostname: --
ipv6.token: --
diff --git a/clients/tests/test-client.check-on-disk/test_003-026.expected b/clients/tests/test-client.check-on-disk/test_003-026.expected
index 836780edd9..6a9803af4b 100644
--- a/clients/tests/test-client.check-on-disk/test_003-026.expected
+++ b/clients/tests/test-client.check-on-disk/test_003-026.expected
@@ -2,7 +2,7 @@ location: clients/tests/test-client.py:757:test_003()/26
cmd: $NMCLI con s ethernet
lang: C
returncode: 0
-stdout: 4180 bytes
+stdout: 4223 bytes
>>>
connection.id: ethernet
connection.uuid: UUID-ethernet-REPLACED-REPLACED-REPL
@@ -75,6 +75,7 @@ ipv6.never-default: no
ipv6.may-fail: yes
ipv6.ip6-privacy: -1 (unknown)
ipv6.addr-gen-mode: stable-privacy
+ipv6.dhcp-duid: --
ipv6.dhcp-send-hostname: yes
ipv6.dhcp-hostname: --
ipv6.token: --
diff --git a/clients/tests/test-client.check-on-disk/test_003-027.expected b/clients/tests/test-client.check-on-disk/test_003-027.expected
index d7122ebfb2..c4650c059e 100644
--- a/clients/tests/test-client.check-on-disk/test_003-027.expected
+++ b/clients/tests/test-client.check-on-disk/test_003-027.expected
@@ -2,7 +2,7 @@ location: clients/tests/test-client.py:757:test_003()/27
cmd: $NMCLI con s ethernet
lang: pl_PL.UTF-8
returncode: 0
-stdout: 4202 bytes
+stdout: 4245 bytes
>>>
connection.id: ethernet
connection.uuid: UUID-ethernet-REPLACED-REPLACED-REPL
@@ -75,6 +75,7 @@ ipv6.never-default: nie
ipv6.may-fail: tak
ipv6.ip6-privacy: -1 (unknown)
ipv6.addr-gen-mode: stable-privacy
+ipv6.dhcp-duid: --
ipv6.dhcp-send-hostname: tak
ipv6.dhcp-hostname: --
ipv6.token: --
diff --git a/clients/tests/test-client.check-on-disk/test_003-043.expected b/clients/tests/test-client.check-on-disk/test_003-043.expected
index ee879f85a6..ed2e00d73e 100644
--- a/clients/tests/test-client.check-on-disk/test_003-043.expected
+++ b/clients/tests/test-client.check-on-disk/test_003-043.expected
@@ -2,7 +2,7 @@ location: clients/tests/test-client.py:751:test_003()/43
cmd: $NMCLI -f ALL con s ethernet
lang: C
returncode: 0
-stdout: 3516 bytes
+stdout: 3559 bytes
>>>
connection.id: ethernet
connection.uuid: UUID-ethernet-REPLACED-REPLACED-REPL
@@ -75,6 +75,7 @@ ipv6.never-default: no
ipv6.may-fail: yes
ipv6.ip6-privacy: -1 (unknown)
ipv6.addr-gen-mode: stable-privacy
+ipv6.dhcp-duid: --
ipv6.dhcp-send-hostname: yes
ipv6.dhcp-hostname: --
ipv6.token: --
diff --git a/clients/tests/test-client.check-on-disk/test_003-044.expected b/clients/tests/test-client.check-on-disk/test_003-044.expected
index b891b3d940..97a1a3d470 100644
--- a/clients/tests/test-client.check-on-disk/test_003-044.expected
+++ b/clients/tests/test-client.check-on-disk/test_003-044.expected
@@ -2,7 +2,7 @@ location: clients/tests/test-client.py:751:test_003()/44
cmd: $NMCLI -f ALL con s ethernet
lang: pl_PL.UTF-8
returncode: 0
-stdout: 3534 bytes
+stdout: 3577 bytes
>>>
connection.id: ethernet
connection.uuid: UUID-ethernet-REPLACED-REPLACED-REPL
@@ -75,6 +75,7 @@ ipv6.never-default: nie
ipv6.may-fail: tak
ipv6.ip6-privacy: -1 (unknown)
ipv6.addr-gen-mode: stable-privacy
+ipv6.dhcp-duid: --
ipv6.dhcp-send-hostname: tak
ipv6.dhcp-hostname: --
ipv6.token: --
diff --git a/clients/tests/test-client.check-on-disk/test_003-047.expected b/clients/tests/test-client.check-on-disk/test_003-047.expected
index 9ab2a4ca49..bc4f457889 100644
--- a/clients/tests/test-client.check-on-disk/test_003-047.expected
+++ b/clients/tests/test-client.check-on-disk/test_003-047.expected
@@ -2,7 +2,7 @@ location: clients/tests/test-client.py:757:test_003()/47
cmd: $NMCLI con s ethernet
lang: C
returncode: 0
-stdout: 4845 bytes
+stdout: 4888 bytes
>>>
connection.id: ethernet
connection.uuid: UUID-ethernet-REPLACED-REPLACED-REPL
@@ -75,6 +75,7 @@ ipv6.never-default: no
ipv6.may-fail: yes
ipv6.ip6-privacy: -1 (unknown)
ipv6.addr-gen-mode: stable-privacy
+ipv6.dhcp-duid: --
ipv6.dhcp-send-hostname: yes
ipv6.dhcp-hostname: --
ipv6.token: --
diff --git a/clients/tests/test-client.check-on-disk/test_003-048.expected b/clients/tests/test-client.check-on-disk/test_003-048.expected
index a6171ff9c2..9742869cb8 100644
--- a/clients/tests/test-client.check-on-disk/test_003-048.expected
+++ b/clients/tests/test-client.check-on-disk/test_003-048.expected
@@ -2,7 +2,7 @@ location: clients/tests/test-client.py:757:test_003()/48
cmd: $NMCLI con s ethernet
lang: pl_PL.UTF-8
returncode: 0
-stdout: 4871 bytes
+stdout: 4914 bytes
>>>
connection.id: ethernet
connection.uuid: UUID-ethernet-REPLACED-REPLACED-REPL
@@ -75,6 +75,7 @@ ipv6.never-default: nie
ipv6.may-fail: tak
ipv6.ip6-privacy: -1 (unknown)
ipv6.addr-gen-mode: stable-privacy
+ipv6.dhcp-duid: --
ipv6.dhcp-send-hostname: tak
ipv6.dhcp-hostname: --
ipv6.token: --
diff --git a/clients/tests/test-client.check-on-disk/test_003-069.expected b/clients/tests/test-client.check-on-disk/test_003-069.expected
index 92f207a075..81d1edaa2f 100644
--- a/clients/tests/test-client.check-on-disk/test_003-069.expected
+++ b/clients/tests/test-client.check-on-disk/test_003-069.expected
@@ -2,7 +2,7 @@ location: clients/tests/test-client.py:801:test_003()/69
cmd: $NMCLI con s ethernet
lang: C
returncode: 0
-stdout: 4848 bytes
+stdout: 4891 bytes
>>>
connection.id: ethernet
connection.uuid: UUID-ethernet-REPLACED-REPLACED-REPL
@@ -75,6 +75,7 @@ ipv6.never-default: no
ipv6.may-fail: yes
ipv6.ip6-privacy: -1 (unknown)
ipv6.addr-gen-mode: stable-privacy
+ipv6.dhcp-duid: --
ipv6.dhcp-send-hostname: yes
ipv6.dhcp-hostname: --
ipv6.token: --
diff --git a/clients/tests/test-client.check-on-disk/test_003-070.expected b/clients/tests/test-client.check-on-disk/test_003-070.expected
index 454f96d7d1..50cf870741 100644
--- a/clients/tests/test-client.check-on-disk/test_003-070.expected
+++ b/clients/tests/test-client.check-on-disk/test_003-070.expected
@@ -2,7 +2,7 @@ location: clients/tests/test-client.py:801:test_003()/70
cmd: $NMCLI con s ethernet
lang: pl_PL.UTF-8
returncode: 0
-stdout: 4875 bytes
+stdout: 4918 bytes
>>>
connection.id: ethernet
connection.uuid: UUID-ethernet-REPLACED-REPLACED-REPL
@@ -75,6 +75,7 @@ ipv6.never-default: nie
ipv6.may-fail: tak
ipv6.ip6-privacy: -1 (unknown)
ipv6.addr-gen-mode: stable-privacy
+ipv6.dhcp-duid: --
ipv6.dhcp-send-hostname: tak
ipv6.dhcp-hostname: --
ipv6.token: --
diff --git a/clients/tests/test-client.check-on-disk/test_003-071.expected b/clients/tests/test-client.check-on-disk/test_003-071.expected
index 6ce3b3a698..14a0b2a06b 100644
--- a/clients/tests/test-client.check-on-disk/test_003-071.expected
+++ b/clients/tests/test-client.check-on-disk/test_003-071.expected
@@ -2,7 +2,7 @@ location: clients/tests/test-client.py:804:test_003()/71
cmd: $NMCLI c s /org/freedesktop/NetworkManager/ActiveConnection/1
lang: C
returncode: 0
-stdout: 4183 bytes
+stdout: 4226 bytes
>>>
connection.id: ethernet
connection.uuid: UUID-ethernet-REPLACED-REPLACED-REPL
@@ -75,6 +75,7 @@ ipv6.never-default: no
ipv6.may-fail: yes
ipv6.ip6-privacy: -1 (unknown)
ipv6.addr-gen-mode: stable-privacy
+ipv6.dhcp-duid: --
ipv6.dhcp-send-hostname: yes
ipv6.dhcp-hostname: --
ipv6.token: --
diff --git a/clients/tests/test-client.check-on-disk/test_003-072.expected b/clients/tests/test-client.check-on-disk/test_003-072.expected
index 52d30d16b2..d7912b81b8 100644
--- a/clients/tests/test-client.check-on-disk/test_003-072.expected
+++ b/clients/tests/test-client.check-on-disk/test_003-072.expected
@@ -2,7 +2,7 @@ location: clients/tests/test-client.py:804:test_003()/72
cmd: $NMCLI c s /org/freedesktop/NetworkManager/ActiveConnection/1
lang: pl_PL.UTF-8
returncode: 0
-stdout: 4206 bytes
+stdout: 4249 bytes
>>>
connection.id: ethernet
connection.uuid: UUID-ethernet-REPLACED-REPLACED-REPL
@@ -75,6 +75,7 @@ ipv6.never-default: nie
ipv6.may-fail: tak
ipv6.ip6-privacy: -1 (unknown)
ipv6.addr-gen-mode: stable-privacy
+ipv6.dhcp-duid: --
ipv6.dhcp-send-hostname: tak
ipv6.dhcp-hostname: --
ipv6.token: --
diff --git a/clients/tests/test-client.check-on-disk/test_004-008.expected b/clients/tests/test-client.check-on-disk/test_004-008.expected
index eb0d66afdf..51ce2a39e8 100644
--- a/clients/tests/test-client.check-on-disk/test_004-008.expected
+++ b/clients/tests/test-client.check-on-disk/test_004-008.expected
@@ -2,7 +2,7 @@ location: clients/tests/test-client.py:823:test_004()/8
cmd: $NMCLI con s con-xx1
lang: C
returncode: 0
-stdout: 3713 bytes
+stdout: 3756 bytes
>>>
connection.id: con-xx1
connection.uuid: UUID-con-xx1-REPLACED-REPLACED-REPLA
@@ -77,6 +77,7 @@ ipv6.never-default: no
ipv6.may-fail: yes
ipv6.ip6-privacy: -1 (unknown)
ipv6.addr-gen-mode: stable-privacy
+ipv6.dhcp-duid: --
ipv6.dhcp-send-hostname: yes
ipv6.dhcp-hostname: --
ipv6.token: --
diff --git a/clients/tests/test-client.check-on-disk/test_004-009.expected b/clients/tests/test-client.check-on-disk/test_004-009.expected
index 3248f83504..c5155cf832 100644
--- a/clients/tests/test-client.check-on-disk/test_004-009.expected
+++ b/clients/tests/test-client.check-on-disk/test_004-009.expected
@@ -2,7 +2,7 @@ location: clients/tests/test-client.py:823:test_004()/9
cmd: $NMCLI con s con-xx1
lang: pl_PL.UTF-8
returncode: 0
-stdout: 3731 bytes
+stdout: 3774 bytes
>>>
connection.id: con-xx1
connection.uuid: UUID-con-xx1-REPLACED-REPLACED-REPLA
@@ -77,6 +77,7 @@ ipv6.never-default: nie
ipv6.may-fail: tak
ipv6.ip6-privacy: -1 (unknown)
ipv6.addr-gen-mode: stable-privacy
+ipv6.dhcp-duid: --
ipv6.dhcp-send-hostname: tak
ipv6.dhcp-hostname: --
ipv6.token: --
diff --git a/clients/tests/test-client.check-on-disk/test_004-013.expected b/clients/tests/test-client.check-on-disk/test_004-013.expected
index b2fad08bd4..74164e5544 100644
--- a/clients/tests/test-client.check-on-disk/test_004-013.expected
+++ b/clients/tests/test-client.check-on-disk/test_004-013.expected
@@ -2,7 +2,7 @@ location: clients/tests/test-client.py:835:test_004()/13
cmd: $NMCLI con s con-vpn-1
lang: C
returncode: 0
-stdout: 3231 bytes
+stdout: 3274 bytes
>>>
connection.id: con-vpn-1
connection.uuid: UUID-con-vpn-1-REPLACED-REPLACED-REP
@@ -61,6 +61,7 @@ ipv6.never-default: no
ipv6.may-fail: yes
ipv6.ip6-privacy: -1 (unknown)
ipv6.addr-gen-mode: stable-privacy
+ipv6.dhcp-duid: --
ipv6.dhcp-send-hostname: yes
ipv6.dhcp-hostname: --
ipv6.token: --
diff --git a/clients/tests/test-client.check-on-disk/test_004-014.expected b/clients/tests/test-client.check-on-disk/test_004-014.expected
index 8ad3eb0350..ede05f47ad 100644
--- a/clients/tests/test-client.check-on-disk/test_004-014.expected
+++ b/clients/tests/test-client.check-on-disk/test_004-014.expected
@@ -2,7 +2,7 @@ location: clients/tests/test-client.py:835:test_004()/14
cmd: $NMCLI con s con-vpn-1
lang: pl_PL.UTF-8
returncode: 0
-stdout: 3241 bytes
+stdout: 3284 bytes
>>>
connection.id: con-vpn-1
connection.uuid: UUID-con-vpn-1-REPLACED-REPLACED-REP
@@ -61,6 +61,7 @@ ipv6.never-default: nie
ipv6.may-fail: tak
ipv6.ip6-privacy: -1 (unknown)
ipv6.addr-gen-mode: stable-privacy
+ipv6.dhcp-duid: --
ipv6.dhcp-send-hostname: tak
ipv6.dhcp-hostname: --
ipv6.token: --
diff --git a/clients/tests/test-client.check-on-disk/test_004-021.expected b/clients/tests/test-client.check-on-disk/test_004-021.expected
index 5ae414a111..7f876ded47 100644
--- a/clients/tests/test-client.check-on-disk/test_004-021.expected
+++ b/clients/tests/test-client.check-on-disk/test_004-021.expected
@@ -2,7 +2,7 @@ location: clients/tests/test-client.py:845:test_004()/21
cmd: $NMCLI con s con-vpn-1
lang: C
returncode: 0
-stdout: 4283 bytes
+stdout: 4326 bytes
>>>
connection.id: con-vpn-1
connection.uuid: UUID-con-vpn-1-REPLACED-REPLACED-REP
@@ -61,6 +61,7 @@ ipv6.never-default: no
ipv6.may-fail: yes
ipv6.ip6-privacy: -1 (unknown)
ipv6.addr-gen-mode: stable-privacy
+ipv6.dhcp-duid: --
ipv6.dhcp-send-hostname: yes
ipv6.dhcp-hostname: --
ipv6.token: --
diff --git a/clients/tests/test-client.check-on-disk/test_004-022.expected b/clients/tests/test-client.check-on-disk/test_004-022.expected
index 6921761f5f..75582122f4 100644
--- a/clients/tests/test-client.check-on-disk/test_004-022.expected
+++ b/clients/tests/test-client.check-on-disk/test_004-022.expected
@@ -2,7 +2,7 @@ location: clients/tests/test-client.py:845:test_004()/22
cmd: $NMCLI con s con-vpn-1
lang: pl_PL.UTF-8
returncode: 0
-stdout: 4297 bytes
+stdout: 4340 bytes
>>>
connection.id: con-vpn-1
connection.uuid: UUID-con-vpn-1-REPLACED-REPLACED-REP
@@ -61,6 +61,7 @@ ipv6.never-default: nie
ipv6.may-fail: tak
ipv6.ip6-privacy: -1 (unknown)
ipv6.addr-gen-mode: stable-privacy
+ipv6.dhcp-duid: --
ipv6.dhcp-send-hostname: tak
ipv6.dhcp-hostname: --
ipv6.token: --
diff --git a/clients/tests/test-client.check-on-disk/test_004-023.expected b/clients/tests/test-client.check-on-disk/test_004-023.expected
index cf49305a88..4043e845b9 100644
--- a/clients/tests/test-client.check-on-disk/test_004-023.expected
+++ b/clients/tests/test-client.check-on-disk/test_004-023.expected
@@ -2,7 +2,7 @@ location: clients/tests/test-client.py:854:test_004()/23
cmd: $NMCLI con s con-vpn-1
lang: C
returncode: 0
-stdout: 4319 bytes
+stdout: 4362 bytes
>>>
connection.id: con-vpn-1
connection.uuid: UUID-con-vpn-1-REPLACED-REPLACED-REP
@@ -61,6 +61,7 @@ ipv6.never-default: no
ipv6.may-fail: yes
ipv6.ip6-privacy: -1 (unknown)
ipv6.addr-gen-mode: stable-privacy
+ipv6.dhcp-duid: --
ipv6.dhcp-send-hostname: yes
ipv6.dhcp-hostname: --
ipv6.token: --
diff --git a/clients/tests/test-client.check-on-disk/test_004-024.expected b/clients/tests/test-client.check-on-disk/test_004-024.expected
index b901fe23d1..1f5d993662 100644
--- a/clients/tests/test-client.check-on-disk/test_004-024.expected
+++ b/clients/tests/test-client.check-on-disk/test_004-024.expected
@@ -2,7 +2,7 @@ location: clients/tests/test-client.py:854:test_004()/24
cmd: $NMCLI con s con-vpn-1
lang: pl_PL.UTF-8
returncode: 0
-stdout: 4337 bytes
+stdout: 4380 bytes
>>>
connection.id: con-vpn-1
connection.uuid: UUID-con-vpn-1-REPLACED-REPLACED-REP
@@ -61,6 +61,7 @@ ipv6.never-default: nie
ipv6.may-fail: tak
ipv6.ip6-privacy: -1 (unknown)
ipv6.addr-gen-mode: stable-privacy
+ipv6.dhcp-duid: --
ipv6.dhcp-send-hostname: tak
ipv6.dhcp-hostname: --
ipv6.token: --
diff --git a/clients/tests/test-client.check-on-disk/test_004-025.expected b/clients/tests/test-client.check-on-disk/test_004-025.expected
index 3ec1c5a44d..bf7758b000 100644
--- a/clients/tests/test-client.check-on-disk/test_004-025.expected
+++ b/clients/tests/test-client.check-on-disk/test_004-025.expected
@@ -2,7 +2,7 @@ location: clients/tests/test-client.py:857:test_004()/25
cmd: $NMCLI -f ALL con s con-vpn-1
lang: C
returncode: 0
-stdout: 3231 bytes
+stdout: 3274 bytes
>>>
connection.id: con-vpn-1
connection.uuid: UUID-con-vpn-1-REPLACED-REPLACED-REP
@@ -61,6 +61,7 @@ ipv6.never-default: no
ipv6.may-fail: yes
ipv6.ip6-privacy: -1 (unknown)
ipv6.addr-gen-mode: stable-privacy
+ipv6.dhcp-duid: --
ipv6.dhcp-send-hostname: yes
ipv6.dhcp-hostname: --
ipv6.token: --
diff --git a/clients/tests/test-client.check-on-disk/test_004-026.expected b/clients/tests/test-client.check-on-disk/test_004-026.expected
index 8409fb7a5f..26e2788827 100644
--- a/clients/tests/test-client.check-on-disk/test_004-026.expected
+++ b/clients/tests/test-client.check-on-disk/test_004-026.expected
@@ -2,7 +2,7 @@ location: clients/tests/test-client.py:857:test_004()/26
cmd: $NMCLI -f ALL con s con-vpn-1
lang: pl_PL.UTF-8
returncode: 0
-stdout: 3241 bytes
+stdout: 3284 bytes
>>>
connection.id: con-vpn-1
connection.uuid: UUID-con-vpn-1-REPLACED-REPLACED-REP
@@ -61,6 +61,7 @@ ipv6.never-default: nie
ipv6.may-fail: tak
ipv6.ip6-privacy: -1 (unknown)
ipv6.addr-gen-mode: stable-privacy
+ipv6.dhcp-duid: --
ipv6.dhcp-send-hostname: tak
ipv6.dhcp-hostname: --
ipv6.token: --
diff --git a/libnm-core/nm-core-internal.h b/libnm-core/nm-core-internal.h
index cace423a7d..2a2045e6ba 100644
--- a/libnm-core/nm-core-internal.h
+++ b/libnm-core/nm-core-internal.h
@@ -508,4 +508,7 @@ _nm_connection_type_is_master (const char *type)
/*****************************************************************************/
+gboolean _nm_utils_dhcp_duid_valid (const char *duid, GBytes **out_duid_bin);
+
+/*****************************************************************************/
#endif
diff --git a/libnm-core/nm-setting-connection.c b/libnm-core/nm-setting-connection.c
index f8f1b017e6..2649838c43 100644
--- a/libnm-core/nm-setting-connection.c
+++ b/libnm-core/nm-setting-connection.c
@@ -1544,7 +1544,8 @@ nm_setting_connection_class_init (NMSettingConnectionClass *setting_class)
* with ipv6.addr-gen-mode=stable-privacy. It is also used to seed the
* generated cloned MAC address for ethernet.cloned-mac-address=stable
* and wifi.cloned-mac-address=stable. It is also used as DHCP client
- * identifier with ipv4.dhcp-client-id=stable.
+ * identifier with ipv4.dhcp-client-id=stable and to derive the DHCP
+ * DUID with ipv6.dhcp-duid=stable-[llt,ll,uuid].
*
* Note that depending on the context where it is used, other parameters are
* also seeded into the generation algorithm. For example, a per-host key
diff --git a/libnm-core/nm-setting-ip6-config.c b/libnm-core/nm-setting-ip6-config.c
index 7c2b45f29f..808c88a763 100644
--- a/libnm-core/nm-setting-ip6-config.c
+++ b/libnm-core/nm-setting-ip6-config.c
@@ -28,6 +28,7 @@
#include "nm-setting-private.h"
#include "nm-core-enum-types.h"
+#include "nm-core-internal.h"
/**
* SECTION:nm-setting-ip6-config
@@ -61,6 +62,7 @@ typedef struct {
NMSettingIP6ConfigPrivacy ip6_privacy;
NMSettingIP6ConfigAddrGenMode addr_gen_mode;
char *token;
+ char *dhcp_duid;
} NMSettingIP6ConfigPrivate;
enum {
@@ -68,6 +70,7 @@ enum {
PROP_IP6_PRIVACY,
PROP_ADDR_GEN_MODE,
PROP_TOKEN,
+ PROP_DHCP_DUID,
LAST_PROP
};
@@ -141,6 +144,26 @@ nm_setting_ip6_config_get_token (NMSettingIP6Config *setting)
return NM_SETTING_IP6_CONFIG_GET_PRIVATE (setting)->token;
}
+/**
+ * nm_setting_ip6_config_get_dhcp_duid:
+ * @setting: the #NMSettingIP6Config
+ *
+ * Returns the value contained in the #NMSettingIP6Config:dhcp-duid
+ * property.
+ *
+ * Returns: The configured DUID value to be included in the DHCPv6 requests
+ * sent to the DHCPv6 servers.
+ *
+ * Since: 1.12
+ **/
+const char *
+nm_setting_ip6_config_get_dhcp_duid (NMSettingIP6Config *setting)
+{
+ g_return_val_if_fail (NM_IS_SETTING_IP6_CONFIG (setting), NULL);
+
+ return NM_SETTING_IP6_CONFIG_GET_PRIVATE (setting)->dhcp_duid;
+}
+
static gboolean
verify (NMSetting *setting, NMConnection *connection, GError **error)
{
@@ -254,6 +277,17 @@ verify (NMSetting *setting, NMConnection *connection, GError **error)
}
}
+ if (priv->dhcp_duid) {
+ if (!_nm_utils_dhcp_duid_valid (priv->dhcp_duid, NULL)) {
+ g_set_error_literal (error,
+ NM_CONNECTION_ERROR,
+ NM_CONNECTION_ERROR_INVALID_PROPERTY,
+ _("invalid DUID"));
+ g_prefix_error (error, "%s.%s: ", NM_SETTING_IP6_CONFIG_SETTING_NAME, NM_SETTING_IP6_CONFIG_DHCP_DUID);
+ return FALSE;
+ }
+ }
+
/* Failures from here on, are NORMALIZABLE_ERROR... */
if (token_needs_normalization) {
@@ -467,6 +501,10 @@ set_property (GObject *object, guint prop_id,
g_free (priv->token);
priv->token = g_value_dup_string (value);
break;
+ case PROP_DHCP_DUID:
+ g_free (priv->dhcp_duid);
+ priv->dhcp_duid = g_value_dup_string (value);
+ break;
default:
G_OBJECT_WARN_INVALID_PROPERTY_ID (object, prop_id, pspec);
break;
@@ -489,6 +527,9 @@ get_property (GObject *object, guint prop_id,
case PROP_TOKEN:
g_value_set_string (value, priv->token);
break;
+ case PROP_DHCP_DUID:
+ g_value_set_string (value, priv->dhcp_duid);
+ break;
default:
G_OBJECT_WARN_INVALID_PROPERTY_ID (object, prop_id, pspec);
break;
@@ -502,6 +543,7 @@ finalize (GObject *object)
NMSettingIP6ConfigPrivate *priv = NM_SETTING_IP6_CONFIG_GET_PRIVATE (self);
g_free (priv->token);
+ g_free (priv->dhcp_duid);
G_OBJECT_CLASS (nm_setting_ip6_config_parent_class)->finalize (object);
}
@@ -790,6 +832,57 @@ nm_setting_ip6_config_class_init (NMSettingIP6ConfigClass *ip6_class)
NM_SETTING_PARAM_INFERRABLE |
G_PARAM_STATIC_STRINGS));
+ /**
+ * NMSettingIP6Config:dhcp-duid:
+ *
+ * A string containing the DHCPv6 Unique Identifier (DUID) used by the dhcp
+ * client to identify itself to DHCPv6 servers (RFC 3315). The DUID is carried
+ * in the Client Identifier option.
+ * If the property is a hex string ('aa:bb:cc') it is interpreted as a binary
+ * DUID and filled as an opaque value in the Client Identifier option.
+ *
+ * The special value "lease" will retrieve the DUID previously used from the
+ * lease file belonging to the connection. If no DUID is found and "dhclient"
+ * is the configured dhcp client, the DUID is searched in the system-wide
+ * dhclient lease file. If still no DUID is found, or another dhcp client is
+ * used, a global and permanent DUID-UUID (RFC 6355) will be generated based
+ * on the machine-id.
+ *
+ * The special values "llt" and "ll" will generate a DUID of type LLT or LL
+ * (see RFC 3315) based on the current MAC address of the device. In order to
+ * try providing a stable DUID-LLT, the time field will contain a constant
+ * timestamp that is used globally (for all profiles) and persisted to disk.
+ *
+ * The special values "stable-llt", "stable-ll" and "stable-uuid" will generate
+ * a DUID of the corresponding type, derived from the connection's stable-id and
+ * a per-host unique key.
+ * So, the link-layer address of "stable-ll" and "stable-llt" will be a generated
+ * address derived from the stable id. The DUID-LLT time value in the "stable-llt"
+ * option will be picked among a static timespan of three years (the upper bound
+ * of the interval is the same constant timestamp used in "llt").
+ *
+ * When the property is unset, the global value provided for "ipv6.dhcp-duid" is
+ * used. If no global value is provided, the default "lease" value is assumed.
+ *
+ * Since: 1.12
+ **/
+ /* ---ifcfg-rh---
+ * property: dhcp-duid
+ * variable: DHCPV6_DUID(+)
+ * description: A string sent to the DHCPv6 server to identify the local machine.
+ * Apart from the special values "lease", "stable-llt", "stable-ll", "stable-uuid",
+ * "llt" and "ll" a binary value in hex format is expected. An hex string where
+ * each octet is separated by a colon is also accepted.
+ * example: DHCPV6_DUID=LL; DHCPV6_DUID=0301deadbeef0001; DHCPV6_DUID=03:01:de:ad:be:ef:00:01
+ * ---end---
+ */
+ g_object_class_install_property
+ (object_class, PROP_DHCP_DUID,
+ g_param_spec_string (NM_SETTING_IP6_CONFIG_DHCP_DUID, "", "",
+ NULL,
+ G_PARAM_READWRITE |
+ G_PARAM_STATIC_STRINGS));
+
/* IP6-specific property overrides */
/* ---dbus---
diff --git a/libnm-core/nm-setting-ip6-config.h b/libnm-core/nm-setting-ip6-config.h
index e01a36b756..ae8ab1a23a 100644
--- a/libnm-core/nm-setting-ip6-config.h
+++ b/libnm-core/nm-setting-ip6-config.h
@@ -45,6 +45,8 @@ G_BEGIN_DECLS
#define NM_SETTING_IP6_CONFIG_TOKEN "token"
+#define NM_SETTING_IP6_CONFIG_DHCP_DUID "dhcp-duid"
+
/**
* NM_SETTING_IP6_CONFIG_METHOD_IGNORE:
*
@@ -162,6 +164,8 @@ NM_AVAILABLE_IN_1_2
NMSettingIP6ConfigAddrGenMode nm_setting_ip6_config_get_addr_gen_mode (NMSettingIP6Config *setting);
NM_AVAILABLE_IN_1_4
const char *nm_setting_ip6_config_get_token (NMSettingIP6Config *setting);
+NM_AVAILABLE_IN_1_12
+const char *nm_setting_ip6_config_get_dhcp_duid (NMSettingIP6Config *setting);
G_END_DECLS
diff --git a/libnm-core/nm-utils.c b/libnm-core/nm-utils.c
index eb65f8db7d..861b283e45 100644
--- a/libnm-core/nm-utils.c
+++ b/libnm-core/nm-utils.c
@@ -4436,6 +4436,52 @@ _nm_utils_inet6_is_token (const struct in6_addr *in6addr)
return FALSE;
}
+/**
+ * _nm_utils_dhcp_duid_valid:
+ * @duid: the candidate DUID
+ *
+ * Checks if @duid string contains either a special duid value ("ll",
+ * "llt", "lease" or the "stable" variants) or a valid hex DUID.
+ *
+ * Return value: %TRUE or %FALSE
+ */
+gboolean
+_nm_utils_dhcp_duid_valid (const char *duid, GBytes **out_duid_bin)
+{
+ gsize duid_len;
+ gs_unref_bytes GBytes *duid_bin = NULL;
+
+ if (out_duid_bin)
+ *out_duid_bin = NULL;
+
+ if (!duid)
+ return FALSE;
+
+ if (NM_IN_STRSET (duid, "lease",
+ "llt",
+ "ll",
+ "stable-llt",
+ "stable-ll",
+ "stable-uuid")) {
+ return TRUE;
+ }
+
+ duid_bin = nm_utils_hexstr2bin (duid);
+ if (!duid_bin)
+ return FALSE;
+
+ duid_len = g_bytes_get_size (duid_bin);
+ /* MAX DUID lenght is 128 octects + the type code (2 octects). */
+ if ( duid_len <= 2
+ || duid_len > (128 + 2))
+ return FALSE;
+
+ if (out_duid_bin)
+ *out_duid_bin = g_steal_pointer (&duid_bin);
+
+ return TRUE;
+}
+
/**
* nm_utils_check_virtual_device_compatibility:
* @virtual_type: a virtual connection type
diff --git a/libnm/libnm.ver b/libnm/libnm.ver
index ec1b91dad0..8afd01b070 100644
--- a/libnm/libnm.ver
+++ b/libnm/libnm.ver
@@ -1355,6 +1355,7 @@ global:
nm_setting_connection_get_mdns;
nm_setting_connection_mdns_get_type;
nm_setting_ip_tunnel_get_flags;
+ nm_setting_ip6_config_get_dhcp_duid;
nm_setting_vpn_get_data_keys;
nm_setting_vpn_get_secret_keys;
nm_setting_wireless_security_get_fils;
diff --git a/man/NetworkManager.conf.xml b/man/NetworkManager.conf.xml
index 8fd62c4782..e2c6562bc6 100644
--- a/man/NetworkManager.conf.xml
+++ b/man/NetworkManager.conf.xml
@@ -704,6 +704,10 @@ ipv6.ip6-privacy=0
removes extraneous routes from the tables.
+
+ ipv6.dhcp-duid
+ If left unspecified, it defaults to "lease".
+
ipv6.dhcp-timeout
If left unspecified, the default value for
diff --git a/src/devices/nm-device.c b/src/devices/nm-device.c
index 7c46f1d608..66bd419447 100644
--- a/src/devices/nm-device.c
+++ b/src/devices/nm-device.c
@@ -37,8 +37,11 @@
#include
#include
#include
+#include
#include "nm-utils/nm-dedup-multi.h"
+#include "nm-utils/nm-random-utils.h"
+#include "nm-utils/unaligned.h"
#include "nm-common-macros.h"
#include "nm-device-private.h"
@@ -7679,12 +7682,250 @@ dhcp6_prefix_delegated (NMDhcpClient *client,
g_signal_emit (self, signals[IP6_PREFIX_DELEGATED], 0, prefix);
}
+/* RFC 3315 defines the epoch for the DUID-LLT time field on Jan 1st 2000. */
+#define EPOCH_DATETIME_200001010000 946684800
+
+static GBytes *
+generate_duid_llt (const guint8 *hwaddr /* ETH_ALEN bytes */,
+ gint64 time)
+{
+ GByteArray *duid_arr;
+ const guint16 duid_type = htons (1);
+ const guint16 hw_type = htons (ARPHRD_ETHER);
+ const guint32 duid_time = htonl (NM_MAX (0, time - EPOCH_DATETIME_200001010000));
+
+ duid_arr = g_byte_array_sized_new (2 + 4 + 2 + ETH_ALEN);
+
+ g_byte_array_append (duid_arr, (const guint8 *) &duid_type, 2);
+ g_byte_array_append (duid_arr, (const guint8 *) &hw_type, 2);
+ g_byte_array_append (duid_arr, (const guint8 *) &duid_time, 4);
+ g_byte_array_append (duid_arr, hwaddr, ETH_ALEN);
+
+ return g_byte_array_free_to_bytes (duid_arr);
+}
+
+static GBytes *
+generate_duid_ll (const guint8 *hwaddr /* ETH_ALEN bytes */)
+{
+ GByteArray *duid_arr;
+ const guint16 duid_type = htons (3);
+ const guint16 hw_type = htons (ARPHRD_ETHER);
+ gs_unref_bytes GBytes *stable_hwaddr = NULL;
+
+ duid_arr = g_byte_array_sized_new (2 + 2 + ETH_ALEN);
+
+ g_byte_array_append (duid_arr, (const guint8 *) &duid_type, 2);
+ g_byte_array_append (duid_arr, (const guint8 *) &hw_type, 2);
+ g_byte_array_append (duid_arr, hwaddr, ETH_ALEN);
+
+ return g_byte_array_free_to_bytes (duid_arr);
+}
+
+static GBytes *
+generate_duid_uuid (guint8 *data, gsize data_len)
+{
+ const guint16 duid_type = g_htons (4);
+ const int DUID_SIZE = 18;
+ guint8 *duid_buffer;
+
+ nm_assert (data);
+ nm_assert (data_len >= 16);
+
+ /* Generate a DHCP Unique Identifier for DHCPv6 using the
+ * DUID-UUID method (see RFC 6355 section 4). Format is:
+ *
+ * u16: type (DUID-UUID = 4)
+ * u8[16]: UUID bytes
+ */
+ duid_buffer = g_malloc (DUID_SIZE);
+
+ G_STATIC_ASSERT_EXPR (sizeof (duid_type) == 2);
+ memcpy (&duid_buffer[0], &duid_type, 2);
+
+ /* UUID is 128 bits, we just take the first 128 bits
+ * (regardless of data size) as the DUID-UUID.
+ */
+ memcpy (&duid_buffer[2], data, 16);
+
+ return g_bytes_new_take (duid_buffer, DUID_SIZE);
+}
+
+static GBytes *
+generate_duid_from_machine_id (void)
+{
+ gs_free const char *machine_id_s = NULL;
+ uuid_t uuid;
+ GChecksum *sum;
+ guint8 sha256_digest[32];
+ gsize len = sizeof (sha256_digest);
+ static GBytes *global_duid = NULL;
+
+ if (global_duid)
+ return g_bytes_ref (global_duid);
+
+ machine_id_s = nm_utils_machine_id_read ();
+ if (nm_utils_machine_id_parse (machine_id_s, uuid)) {
+ /* Hash the machine ID so it's not leaked to the network */
+ sum = g_checksum_new (G_CHECKSUM_SHA256);
+ g_checksum_update (sum, (const guchar *) &uuid, sizeof (uuid));
+ g_checksum_get_digest (sum, sha256_digest, &len);
+ g_checksum_free (sum);
+ } else {
+ nm_log_warn (LOGD_IP6, "global duid: failed to read " SYSCONFDIR "/machine-id "
+ "or " LOCALSTATEDIR "/lib/dbus/machine-id to generate "
+ "DHCPv6 DUID; creating non-persistent random DUID.");
+ nm_utils_random_bytes (sha256_digest, len);
+ }
+
+ global_duid = generate_duid_uuid (sha256_digest, len);
+ return g_bytes_ref (global_duid);
+}
+
+static GBytes *
+dhcp6_get_duid (NMDevice *self, NMConnection *connection, GBytes *hwaddr, NMDhcpDuidEnforce *out_enforce)
+{
+ NMSettingIPConfig *s_ip6;
+ const char *duid;
+ gs_free char *duid_default = NULL;
+ const char *duid_error = NULL;
+ GBytes *duid_out = NULL;
+ guint8 sha256_digest[32];
+ gsize len = sizeof (sha256_digest);
+ NMDhcpDuidEnforce duid_enforce = NM_DHCP_DUID_ENFORCE_NEVER;
+
+
+ s_ip6 = nm_connection_get_setting_ip6_config (connection);
+ duid = nm_setting_ip6_config_get_dhcp_duid (NM_SETTING_IP6_CONFIG (s_ip6));
+
+ if (!duid) {
+ duid_default = nm_config_data_get_connection_default (NM_CONFIG_GET_DATA,
+ "ipv6.dhcp-duid", self);
+ duid = duid_default;
+ }
+
+ if (!duid || nm_streq (duid, "lease")) {
+ duid_out = generate_duid_from_machine_id ();
+ goto end;
+ }
+
+ if (!_nm_utils_dhcp_duid_valid (duid, &duid_out)) {
+ duid_error = "invalid duid";
+ goto end;
+ }
+
+ if (duid_out)
+ goto end;
+
+ if (NM_IN_STRSET (duid, "ll", "llt")) {
+ if (!hwaddr) {
+ duid_error = "missing link-layer address";
+ goto end;
+ }
+ if (g_bytes_get_size (hwaddr) != ETH_ALEN) {
+ duid_error = "unsupported link-layer address";
+ goto end;
+ }
+ } else if (NM_IN_STRSET (duid, "stable-llt", "stable-ll", "stable-uuid")) {
+ NMUtilsStableType stable_type;
+ const char *stable_id = NULL;
+ guint32 salted_header;
+ GChecksum *sum;
+ const guint8 *secret_key;
+ gsize secret_key_len;
+
+ stable_id = _get_stable_id (self, connection, &stable_type);
+ if (!stable_id) {
+ nm_assert_not_reached ();
+ duid_error = "cannot retrieve the stable id";
+ goto end;
+ }
+
+ salted_header = htonl (670531087 + stable_type);
+
+ nm_utils_secret_key_get (&secret_key, &secret_key_len);
+
+ sum = g_checksum_new (G_CHECKSUM_SHA256);
+
+ g_checksum_update (sum, (const guchar *) &salted_header, sizeof (salted_header));
+ g_checksum_update (sum, (const guchar *) stable_id, -1);
+ g_checksum_update (sum, (const guchar *) secret_key, secret_key_len);
+
+ g_checksum_get_digest (sum, sha256_digest, &len);
+ g_checksum_free (sum);
+ }
+
+ duid_enforce = NM_DHCP_DUID_ENFORCE_ALWAYS;
+
+#define EPOCH_DATETIME_THREE_YEARS (356 * 24 * 3600 * 3)
+ if (nm_streq0 (duid, "ll")) {
+ duid_out = generate_duid_ll (g_bytes_get_data (hwaddr, NULL));
+
+ } else if (nm_streq0 (duid, "llt")) {
+ gint64 time;
+
+ time = nm_utils_secret_key_get_timestamp ();
+ if (!time) {
+ duid_error = "cannot retrieve the secret key timestamp";
+ goto end;
+ }
+
+ duid_out = generate_duid_llt (g_bytes_get_data (hwaddr, NULL), time);
+ } else if (nm_streq0 (duid, "stable-ll")) {
+ duid_out = generate_duid_ll (sha256_digest);
+
+ } else if (nm_streq0 (duid, "stable-llt")) {
+ gint64 time;
+
+ /* We want a variable time between the secret_key timestamp and three years
+ * before. Let's compute the time (in seconds) from 0 to 3 years; then we'll
+ * subtract it from the secret_key timestamp.
+ */
+ time = nm_utils_secret_key_get_timestamp ();
+ if (!time) {
+ duid_error = "cannot retrieve the secret key timestamp";
+ goto end;
+ }
+ /* don't use too old timestamps. They cannot be expressed in DUID-LLT and
+ * would all be truncated to zero. */
+ time = NM_MAX (time, EPOCH_DATETIME_200001010000 + EPOCH_DATETIME_THREE_YEARS);
+ time -= (unaligned_read_be32 (&sha256_digest[ETH_ALEN]) % EPOCH_DATETIME_THREE_YEARS);
+
+ duid_out = generate_duid_llt (sha256_digest, time);
+
+ } else if (nm_streq0 (duid, "stable-uuid")) {
+ duid_out = generate_duid_uuid (sha256_digest, len);
+ }
+
+ duid_error = "generation failed";
+end:
+ if (!duid_out) {
+ guint8 uuid[16];
+
+ if (duid_error)
+ _LOGW (LOGD_IP6, "duid-gen (%s): %s. Fallback to random DUID-UUID.", duid, duid_error);
+
+ nm_utils_random_bytes (uuid, sizeof (uuid));
+ duid_out = generate_duid_uuid (uuid, sizeof (uuid));
+ }
+
+ _LOGD (LOGD_IP6, "DUID gen: '%s' (%s)",
+ nm_dhcp_utils_duid_to_string (duid_out),
+ (duid_enforce == NM_DHCP_DUID_ENFORCE_ALWAYS) ? "enforcing" : "fallback");
+
+ NM_SET_OUT (out_enforce, duid_enforce);
+
+ return duid_out;
+}
+
static gboolean
dhcp6_start_with_link_ready (NMDevice *self, NMConnection *connection)
{
NMDevicePrivate *priv = NM_DEVICE_GET_PRIVATE (self);
NMSettingIPConfig *s_ip6;
gs_unref_bytes GBytes *hwaddr = NULL;
+ gs_unref_bytes GBytes *duid = NULL;
+ NMDhcpDuidEnforce enforce_duid;
+
const NMPlatformIP6Address *ll_addr = NULL;
g_assert (connection);
@@ -7705,6 +7946,7 @@ dhcp6_start_with_link_ready (NMDevice *self, NMConnection *connection)
hwaddr = nm_platform_link_get_address_as_bytes (nm_device_get_platform (self),
nm_device_get_ip_ifindex (self));
+ duid = dhcp6_get_duid (self, connection, hwaddr, &enforce_duid);
priv->dhcp6.client = nm_dhcp_manager_start_ip6 (nm_dhcp_manager_get (),
nm_device_get_multi_index (self),
nm_device_get_ip_iface (self),
@@ -7716,6 +7958,8 @@ dhcp6_start_with_link_ready (NMDevice *self, NMConnection *connection)
nm_device_get_route_metric (self, AF_INET6),
nm_setting_ip_config_get_dhcp_send_hostname (s_ip6),
nm_setting_ip_config_get_dhcp_hostname (s_ip6),
+ duid,
+ enforce_duid,
get_dhcp_timeout (self, AF_INET6),
priv->dhcp_anycast_address,
(priv->dhcp6.mode == NM_NDISC_DHCP_LEVEL_OTHERCONF) ? TRUE : FALSE,
diff --git a/src/dhcp/nm-dhcp-client.c b/src/dhcp/nm-dhcp-client.c
index ba517606ed..390b7054ec 100644
--- a/src/dhcp/nm-dhcp-client.c
+++ b/src/dhcp/nm-dhcp-client.c
@@ -513,69 +513,15 @@ nm_dhcp_client_start_ip4 (NMDhcpClient *self,
}
static GBytes *
-generate_duid_from_machine_id (void)
+get_duid (NMDhcpClient *self, gboolean global)
{
- const int DUID_SIZE = 18;
- guint8 *duid_buffer;
- GChecksum *sum;
- guint8 buffer[32]; /* SHA256 digest size */
- gsize sumlen = sizeof (buffer);
- const guint16 duid_type = g_htons (4);
- uuid_t uuid;
- gs_free char *machine_id_s = NULL;
- gs_free char *str = NULL;
- GBytes *duid;
-
- machine_id_s = nm_utils_machine_id_read ();
- if (nm_utils_machine_id_parse (machine_id_s, uuid)) {
- /* Hash the machine ID so it's not leaked to the network */
- sum = g_checksum_new (G_CHECKSUM_SHA256);
- g_checksum_update (sum, (const guchar *) &uuid, sizeof (uuid));
- g_checksum_get_digest (sum, buffer, &sumlen);
- g_checksum_free (sum);
- } else {
- nm_log_warn (LOGD_DHCP, "dhcp: failed to read " SYSCONFDIR "/machine-id "
- "or " LOCALSTATEDIR "/lib/dbus/machine-id to generate "
- "DHCPv6 DUID; creating non-persistent random DUID.");
-
- nm_utils_random_bytes (buffer, sizeof (buffer));
- }
-
- /* Generate a DHCP Unique Identifier for DHCPv6 using the
- * DUID-UUID method (see RFC 6355 section 4). Format is:
- *
- * u16: type (DUID-UUID = 4)
- * u8[16]: UUID bytes
- */
- duid_buffer = g_malloc (DUID_SIZE);
-
- G_STATIC_ASSERT_EXPR (sizeof (duid_type) == 2);
- memcpy (&duid_buffer[0], &duid_type, 2);
-
- /* Since SHA256 is 256 bits, but UUID is 128 bits, we just take the first
- * 128 bits of the SHA256 as the DUID-UUID.
- */
- memcpy (&duid_buffer[2], buffer, 16);
-
- duid = g_bytes_new_take (duid_buffer, DUID_SIZE);
- nm_log_dbg (LOGD_DHCP, "dhcp: generated DUID %s",
- (str = nm_dhcp_utils_duid_to_string (duid)));
- return duid;
-}
-
-static GBytes *
-get_duid (NMDhcpClient *self)
-{
- static GBytes *duid = NULL;
-
- if (G_UNLIKELY (!duid))
- duid = generate_duid_from_machine_id ();
-
- return g_bytes_ref (duid);
+ return NULL;
}
gboolean
nm_dhcp_client_start_ip6 (NMDhcpClient *self,
+ GBytes *client_id,
+ NMDhcpDuidEnforce enforce_duid,
const char *dhcp_anycast_addr,
const struct in6_addr *ll_addr,
const char *hostname,
@@ -592,11 +538,17 @@ nm_dhcp_client_start_ip6 (NMDhcpClient *self,
g_return_val_if_fail (priv->addr_family == AF_INET6, FALSE);
g_return_val_if_fail (priv->uuid != NULL, FALSE);
- /* If we don't have one yet, read the default DUID for this DHCPv6 client
- * from the client-specific persistent configuration.
- */
+ nm_assert (!priv->duid);
+ nm_assert (client_id);
+
+ if (enforce_duid == NM_DHCP_DUID_ENFORCE_NEVER)
+ priv->duid = NM_DHCP_CLIENT_GET_CLASS (self)->get_duid (self, TRUE);
+ else if (enforce_duid == NM_DHCP_DUID_ENFORCE_LEASE_FALLBACK)
+ priv->duid = NM_DHCP_CLIENT_GET_CLASS (self)->get_duid (self, FALSE);
+
+ /* NM_DHCP_DUID_ENFORCE_ALWAYS and fallback */
if (!priv->duid)
- priv->duid = NM_DHCP_CLIENT_GET_CLASS (self)->get_duid (self);
+ priv->duid = g_bytes_ref (client_id);
_LOGD ("DUID is '%s'", (str = nm_dhcp_utils_duid_to_string (priv->duid)));
diff --git a/src/dhcp/nm-dhcp-client.h b/src/dhcp/nm-dhcp-client.h
index 111b063bd5..98c3ed262e 100644
--- a/src/dhcp/nm-dhcp-client.h
+++ b/src/dhcp/nm-dhcp-client.h
@@ -23,6 +23,7 @@
#include "nm-setting-ip6-config.h"
#include "nm-ip4-config.h"
#include "nm-ip6-config.h"
+#include "nm-dhcp-utils.h"
#define NM_DHCP_TIMEOUT_DEFAULT ((guint32) 45) /* default DHCP timeout, in seconds */
#define NM_DHCP_TIMEOUT_INFINITY G_MAXINT32
@@ -95,13 +96,15 @@ typedef struct {
/**
* get_duid:
* @self: the #NMDhcpClient
+ * @global: if set to #true, the duid should be searched also in the
+ * DHCP client's system-wide persistent configuration.
*
* Attempts to find an existing DHCPv6 DUID for this client in the DHCP
* client's persistent configuration. Returned DUID should be the binary
* representation of the DUID. If no DUID is found, %NULL should be
* returned.
*/
- GBytes *(*get_duid) (NMDhcpClient *self);
+ GBytes *(*get_duid) (NMDhcpClient *self, gboolean global);
/* Signals */
void (*state_changed) (NMDhcpClient *self,
@@ -149,6 +152,8 @@ gboolean nm_dhcp_client_start_ip4 (NMDhcpClient *self,
const char *last_ip4_address);
gboolean nm_dhcp_client_start_ip6 (NMDhcpClient *self,
+ GBytes *client_id,
+ NMDhcpDuidEnforce enforce_duid,
const char *dhcp_anycast_addr,
const struct in6_addr *ll_addr,
const char *hostname,
diff --git a/src/dhcp/nm-dhcp-dhclient-utils.c b/src/dhcp/nm-dhcp-dhclient-utils.c
index 16a76d23eb..3290dd65cc 100644
--- a/src/dhcp/nm-dhcp-dhclient-utils.c
+++ b/src/dhcp/nm-dhcp-dhclient-utils.c
@@ -594,7 +594,8 @@ nm_dhcp_dhclient_save_duid (const char *leasefile,
const char *escaped_duid,
GError **error)
{
- char **lines = NULL, **iter, *l;
+ gs_strfreev char **lines = NULL;
+ char **iter, *l;
GString *s;
gboolean success;
gsize len = 0;
@@ -610,19 +611,9 @@ nm_dhcp_dhclient_save_duid (const char *leasefile,
return FALSE;
}
- /* If the file already contains an uncommented DUID, leave it */
g_assert (contents);
lines = g_strsplit_set (contents, "\n\r", -1);
g_free (contents);
- for (iter = lines; iter && *iter; iter++) {
- l = *iter;
- while (g_ascii_isspace (*l))
- l++;
- if (g_str_has_prefix (l, DUID_PREFIX)) {
- g_strfreev (lines);
- return TRUE;
- }
- }
}
s = g_string_sized_new (len + 50);
@@ -630,9 +621,31 @@ nm_dhcp_dhclient_save_duid (const char *leasefile,
/* Preserve existing leasefile contents */
if (lines) {
- for (iter = lines; iter && *iter; iter++)
- g_string_append (s, *iter[0] ? *iter : "\n");
- g_strfreev (lines);
+ for (iter = lines; iter && *iter; iter++) {
+ l = *iter;
+ while (g_ascii_isspace (*l))
+ l++;
+ /* If we find an uncommented DUID in the file, check if
+ * equal to the one we are going to write: if so, no need
+ * to update the lease file, otherwise skip the old DUID.
+ */
+ if (g_str_has_prefix (l, DUID_PREFIX)) {
+ gs_strfreev char **split = NULL;
+
+ split = g_strsplit (l, "\"", -1);
+ if (nm_streq0 (split[1], escaped_duid)) {
+ g_string_free (s, TRUE);
+ return TRUE;
+ }
+ continue;
+ }
+
+ if (*iter[0])
+ g_string_append (s, *iter);
+ /* avoid to add an extra '\n' at the end of file */
+ if ((iter[1]) != NULL)
+ g_string_append_c (s, '\n');
+ }
}
success = g_file_set_contents (leasefile, s->str, -1, error);
diff --git a/src/dhcp/nm-dhcp-dhclient.c b/src/dhcp/nm-dhcp-dhclient.c
index 93306ddd5f..43746dd394 100644
--- a/src/dhcp/nm-dhcp-dhclient.c
+++ b/src/dhcp/nm-dhcp-dhclient.c
@@ -582,7 +582,7 @@ state_changed (NMDhcpClient *client,
}
static GBytes *
-get_duid (NMDhcpClient *client)
+get_duid (NMDhcpClient *client, gboolean global)
{
NMDhcpDhclient *self = NM_DHCP_DHCLIENT (client);
NMDhcpDhclientPrivate *priv = NM_DHCP_DHCLIENT_GET_PRIVATE (self);
@@ -607,7 +607,7 @@ get_duid (NMDhcpClient *client)
g_free (leasefile);
}
- if (!duid) {
+ if (!duid && global) {
/* Otherwise read the default machine-wide DUID */
_LOGD ("looking for default DUID in '%s'", priv->def_leasefile);
duid = nm_dhcp_dhclient_read_duid (priv->def_leasefile, &error);
@@ -619,8 +619,7 @@ get_duid (NMDhcpClient *client)
}
}
- /* return our DUID, otherwise let the parent class make a default DUID */
- return duid ?: NM_DHCP_CLIENT_CLASS (nm_dhcp_dhclient_parent_class)->get_duid (client);
+ return duid;
}
/*****************************************************************************/
diff --git a/src/dhcp/nm-dhcp-manager.c b/src/dhcp/nm-dhcp-manager.c
index aa40e8037d..2d85c73ac7 100644
--- a/src/dhcp/nm-dhcp-manager.c
+++ b/src/dhcp/nm-dhcp-manager.c
@@ -164,6 +164,7 @@ client_start (NMDhcpManager *self,
guint32 route_metric,
const struct in6_addr *ipv6_ll_addr,
GBytes *dhcp_client_id,
+ NMDhcpDuidEnforce enforce_duid,
guint32 timeout,
const char *dhcp_anycast_addr,
const char *hostname,
@@ -218,7 +219,7 @@ client_start (NMDhcpManager *self,
if (addr_family == AF_INET)
success = nm_dhcp_client_start_ip4 (client, dhcp_client_id, dhcp_anycast_addr, hostname, last_ip4_address);
else
- success = nm_dhcp_client_start_ip6 (client, dhcp_anycast_addr, ipv6_ll_addr, hostname, privacy, needed_prefixes);
+ success = nm_dhcp_client_start_ip6 (client, dhcp_client_id, enforce_duid, dhcp_anycast_addr, ipv6_ll_addr, hostname, privacy, needed_prefixes);
if (!success) {
remove_client_unref (self, client);
@@ -280,7 +281,7 @@ nm_dhcp_manager_start_ip4 (NMDhcpManager *self,
return client_start (self, AF_INET, multi_idx, iface, ifindex, hwaddr, uuid,
route_table, route_metric, NULL,
- dhcp_client_id, timeout, dhcp_anycast_addr, hostname,
+ dhcp_client_id, 0, timeout, dhcp_anycast_addr, hostname,
use_fqdn, FALSE, 0, last_ip_address, 0);
}
@@ -297,6 +298,8 @@ nm_dhcp_manager_start_ip6 (NMDhcpManager *self,
guint32 route_metric,
gboolean send_hostname,
const char *dhcp_hostname,
+ GBytes *duid,
+ NMDhcpDuidEnforce enforce_duid,
guint32 timeout,
const char *dhcp_anycast_addr,
gboolean info_only,
@@ -314,8 +317,8 @@ nm_dhcp_manager_start_ip6 (NMDhcpManager *self,
hostname = dhcp_hostname ?: priv->default_hostname;
}
return client_start (self, AF_INET6, multi_idx, iface, ifindex, hwaddr, uuid,
- route_table, route_metric, ll_addr,
- NULL, timeout, dhcp_anycast_addr, hostname, TRUE, info_only,
+ route_table, route_metric, ll_addr, duid, enforce_duid,
+ timeout, dhcp_anycast_addr, hostname, TRUE, info_only,
privacy, NULL, needed_prefixes);
}
diff --git a/src/dhcp/nm-dhcp-manager.h b/src/dhcp/nm-dhcp-manager.h
index f8a7e31d2d..ed8ee742a9 100644
--- a/src/dhcp/nm-dhcp-manager.h
+++ b/src/dhcp/nm-dhcp-manager.h
@@ -72,6 +72,8 @@ NMDhcpClient * nm_dhcp_manager_start_ip6 (NMDhcpManager *manager,
guint32 route_metric,
gboolean send_hostname,
const char *dhcp_hostname,
+ GBytes *duid,
+ NMDhcpDuidEnforce enforce_duid,
guint32 timeout,
const char *dhcp_anycast_addr,
gboolean info_only,
diff --git a/src/dhcp/nm-dhcp-utils.h b/src/dhcp/nm-dhcp-utils.h
index 5c127bd194..afb87c1a14 100644
--- a/src/dhcp/nm-dhcp-utils.h
+++ b/src/dhcp/nm-dhcp-utils.h
@@ -24,6 +24,12 @@
#include "nm-ip4-config.h"
#include "nm-ip6-config.h"
+typedef enum {
+ NM_DHCP_DUID_ENFORCE_NEVER = 0,
+ NM_DHCP_DUID_ENFORCE_LEASE_FALLBACK,
+ NM_DHCP_DUID_ENFORCE_ALWAYS,
+} NMDhcpDuidEnforce;
+
NMIP4Config *nm_dhcp_utils_ip4_config_from_options (struct _NMDedupMultiIndex *multi_idx,
int ifindex,
const char *iface,
diff --git a/src/dhcp/tests/test-dhcp-dhclient.c b/src/dhcp/tests/test-dhcp-dhclient.c
index a8284b23de..2f369aacc0 100644
--- a/src/dhcp/tests/test-dhcp-dhclient.c
+++ b/src/dhcp/tests/test-dhcp-dhclient.c
@@ -785,17 +785,18 @@ static void
test_write_existing_duid (void)
{
const char *duid = "\\000\\001\\000\\001\\023o\\023n\\000\\\"\\372\\214\\326\\302";
- const char *expected_contents = "default-duid \"\\000\\001\\000\\001\\027X\\350X\\000#\\025\\010~\\254\";\n";
+ const char *original_contents = "default-duid \"\\000\\001\\000\\001\\027X\\350X\\000#\\025\\010~\\254\";\n";
+ const char *expected_contents = "default-duid \"\\000\\001\\000\\001\\023o\\023n\\000\\\"\\372\\214\\326\\302\";\n";
GError *error = NULL;
char *contents = NULL;
gboolean success;
const char *path = "test-dhclient-write-existing-duid.leases";
- success = g_file_set_contents (path, expected_contents, -1, &error);
+ success = g_file_set_contents (path, original_contents, -1, &error);
g_assert_no_error (error);
g_assert (success);
- /* Save other DUID; should be a no-op */
+ /* Save other DUID; should be overwritten */
success = nm_dhcp_dhclient_save_duid (path, duid, &error);
g_assert_no_error (error);
g_assert (success);
@@ -811,14 +812,14 @@ test_write_existing_duid (void)
g_free (contents);
}
+#define DUID "\\000\\001\\000\\001\\023o\\023n\\000\\\"\\372\\214\\326\\302"
static void
test_write_existing_commented_duid (void)
{
- #define DUID "\\000\\001\\000\\001\\023o\\023n\\000\\\"\\372\\214\\326\\302"
- #define ORIG_CONTENTS "#default-duid \"\\000\\001\\000\\001\\027X\\350X\\000#\\025\\010~\\254\";\n"
- const char *expected_contents = \
- "default-duid \"" DUID "\";\n"
- ORIG_CONTENTS;
+#define ORIG_CONTENTS "#default-duid \"\\000\\001\\000\\001\\027X\\350X\\000#\\025\\010~\\254\";\n"
+ const char *expected_contents =
+ "default-duid \"" DUID "\";\n"
+ ORIG_CONTENTS;
GError *error = NULL;
char *contents = NULL;
gboolean success;
@@ -828,7 +829,7 @@ test_write_existing_commented_duid (void)
g_assert_no_error (error);
g_assert (success);
- /* Save other DUID; should be a no-op */
+ /* Save other DUID; should be saved on top */
success = nm_dhcp_dhclient_save_duid (path, DUID, &error);
g_assert_no_error (error);
g_assert (success);
@@ -842,6 +843,33 @@ test_write_existing_commented_duid (void)
g_assert_cmpstr (expected_contents, ==, contents);
g_free (contents);
+#undef ORIG_CONTENTS
+}
+
+static void
+test_write_existing_multiline_duid (void)
+{
+#define ORIG_CONTENTS "### Commented old DUID ###\n" \
+ "#default-duid \"\\000\\001\\000\\001\\027X\\350X\\000#\\025\\010~\\254\";\n"
+ const char *expected_contents = \
+ "default-duid \"" DUID "\";\n"
+ ORIG_CONTENTS;
+ GError *error = NULL;
+ gs_free char *contents = NULL;
+ gboolean success;
+ nmtst_auto_unlinkfile char *path = g_strdup ("test-dhclient-write-existing-multiline-duid.leases");
+
+ success = g_file_set_contents (path, ORIG_CONTENTS, -1, &error);
+ nmtst_assert_success (success, error);
+
+ success = nm_dhcp_dhclient_save_duid (path, DUID, &error);
+ nmtst_assert_success (success, error);
+
+ success = g_file_get_contents (path, &contents, NULL, &error);
+ nmtst_assert_success (success, error);
+
+ g_assert_cmpstr (expected_contents, ==, contents);
+#undef ORIG_CONTENTS
}
/*****************************************************************************/
@@ -1025,6 +1053,7 @@ main (int argc, char **argv)
g_test_add_func ("/dhcp/dhclient/write_duid", test_write_duid);
g_test_add_func ("/dhcp/dhclient/write_existing_duid", test_write_existing_duid);
g_test_add_func ("/dhcp/dhclient/write_existing_commented_duid", test_write_existing_commented_duid);
+ g_test_add_func ("/dhcp/dhclient/write_existing_multiline_duid", test_write_existing_multiline_duid);
return g_test_run ();
}
diff --git a/src/nm-core-utils.c b/src/nm-core-utils.c
index b1a4cc25a2..09b465a07e 100644
--- a/src/nm-core-utils.c
+++ b/src/nm-core-utils.c
@@ -2896,6 +2896,22 @@ nm_utils_secret_key_get (const guint8 **out_secret_key,
return secret_key->is_good;
}
+gint64
+nm_utils_secret_key_get_timestamp (void)
+{
+ struct stat stat_buf;
+ const guint8 *key;
+ gsize key_len;
+
+ if (!nm_utils_secret_key_get (&key, &key_len))
+ return 0;
+
+ if (stat (NMSTATEDIR "/secret_key", &stat_buf) != 0)
+ return 0;
+
+ return stat_buf.st_mtim.tv_sec;
+}
+
/*****************************************************************************/
const char *
diff --git a/src/nm-core-utils.h b/src/nm-core-utils.h
index 7f406d214c..085304008c 100644
--- a/src/nm-core-utils.h
+++ b/src/nm-core-utils.h
@@ -285,6 +285,7 @@ gboolean nm_utils_machine_id_parse (const char *id_str, /*uuid_t*/ guchar *out_u
gboolean nm_utils_secret_key_get (const guint8 **out_secret_key,
gsize *out_key_len);
+gint64 nm_utils_secret_key_get_timestamp (void);
const char *nm_utils_get_boot_id (void);
diff --git a/src/settings/plugins/ifcfg-rh/nms-ifcfg-rh-reader.c b/src/settings/plugins/ifcfg-rh/nms-ifcfg-rh-reader.c
index 722d4e366d..b16cc28122 100644
--- a/src/settings/plugins/ifcfg-rh/nms-ifcfg-rh-reader.c
+++ b/src/settings/plugins/ifcfg-rh/nms-ifcfg-rh-reader.c
@@ -1685,12 +1685,13 @@ make_ip6_setting (shvarFile *ifcfg,
{
NMSettingIPConfig *s_ip6 = NULL;
const char *v;
- char *value = NULL;
- char *str_value;
+ gs_free char *value = NULL;
char *route6_path = NULL;
gboolean ipv6init, ipv6forwarding, dhcp6 = FALSE;
char *method = NM_SETTING_IP6_CONFIG_METHOD_MANUAL;
- char *ipv6addr, *ipv6addr_secondaries;
+ const char *ipv6addr, *ipv6addr_secondaries;
+ gs_free char *ipv6addr_to_free = NULL;
+ gs_free char *ipv6addr_secondaries_to_free = NULL;
gs_free const char **list = NULL;
const char *const *iter;
guint32 i;
@@ -1716,13 +1717,16 @@ make_ip6_setting (shvarFile *ifcfg,
* When both are set, the device specified in IPV6_DEFAULTGW takes preference.
*/
if (network_ifcfg) {
- char *ipv6_defaultgw, *ipv6_defaultdev;
- char *default_dev = NULL;
+ const char *ipv6_defaultgw, *ipv6_defaultdev;
+ gs_free char *ipv6_defaultgw_to_free = NULL;
+ gs_free char *ipv6_defaultdev_to_free = NULL;
+ const char *default_dev = NULL;
/* Get the connection ifcfg device name and the global default route device */
- value = svGetValueStr_cp (ifcfg, "DEVICE");
- ipv6_defaultgw = svGetValueStr_cp (network_ifcfg, "IPV6_DEFAULTGW");
- ipv6_defaultdev = svGetValueStr_cp (network_ifcfg, "IPV6_DEFAULTDEV");
+ nm_clear_g_free (&value);
+ v = svGetValueStr (ifcfg, "DEVICE", &value);
+ ipv6_defaultgw = svGetValueStr (network_ifcfg, "IPV6_DEFAULTGW", &ipv6_defaultgw_to_free);
+ ipv6_defaultdev = svGetValueStr (network_ifcfg, "IPV6_DEFAULTDEV", &ipv6_defaultdev_to_free);
if (ipv6_defaultgw) {
default_dev = strchr (ipv6_defaultgw, '%');
@@ -1735,66 +1739,64 @@ make_ip6_setting (shvarFile *ifcfg,
/* If there was a global default route device specified, then only connections
* for that device can be the default connection.
*/
- if (default_dev && value)
- never_default = !!strcmp (value, default_dev);
-
- g_free (ipv6_defaultgw);
- g_free (ipv6_defaultdev);
- g_free (value);
+ if (default_dev && v)
+ never_default = !!strcmp (v, default_dev);
}
/* Find out method property */
/* Is IPV6 enabled? Set method to "ignored", when not enabled */
- str_value = svGetValueStr_cp (ifcfg, "IPV6INIT");
+ nm_clear_g_free (&value);
+ v = svGetValueStr (ifcfg, "IPV6INIT", &value);
ipv6init = svGetValueBoolean (ifcfg, "IPV6INIT", FALSE);
- if (!str_value) {
+ if (!v) {
if (network_ifcfg)
ipv6init = svGetValueBoolean (network_ifcfg, "IPV6INIT", FALSE);
}
- g_free (str_value);
if (!ipv6init)
method = NM_SETTING_IP6_CONFIG_METHOD_IGNORE; /* IPv6 is disabled */
else {
ipv6forwarding = svGetValueBoolean (ifcfg, "IPV6FORWARDING", FALSE);
- str_value = svGetValueStr_cp (ifcfg, "IPV6_AUTOCONF");
+ nm_clear_g_free (&value);
+ v = svGetValueStr (ifcfg, "IPV6_AUTOCONF", &value);
dhcp6 = svGetValueBoolean (ifcfg, "DHCPV6C", FALSE);
- if (!g_strcmp0 (str_value, "shared"))
+ if (!g_strcmp0 (v, "shared"))
method = NM_SETTING_IP6_CONFIG_METHOD_SHARED;
- else if (svParseBoolean (str_value, !ipv6forwarding))
+ else if (svParseBoolean (v, !ipv6forwarding))
method = NM_SETTING_IP6_CONFIG_METHOD_AUTO;
else if (dhcp6)
method = NM_SETTING_IP6_CONFIG_METHOD_DHCP;
else {
/* IPV6_AUTOCONF=no and no IPv6 address -> method 'link-local' */
- g_free (str_value);
- str_value = svGetValueStr_cp (ifcfg, "IPV6ADDR");
- if (!str_value)
- str_value = svGetValueStr_cp (ifcfg, "IPV6ADDR_SECONDARIES");
+ nm_clear_g_free (&value);
+ v = svGetValueStr (ifcfg, "IPV6ADDR", &value);
+ if (!v) {
+ nm_clear_g_free (&value);
+ v = svGetValueStr (ifcfg, "IPV6ADDR_SECONDARIES", &value);
+ }
- if (!str_value)
+ if (!v)
method = NM_SETTING_IP6_CONFIG_METHOD_LINK_LOCAL;
}
- g_free (str_value);
}
/* TODO - handle other methods */
/* Read IPv6 Privacy Extensions configuration */
- str_value = svGetValueStr_cp (ifcfg, "IPV6_PRIVACY");
- if (str_value) {
- ip6_privacy = svParseBoolean (str_value, FALSE);
+ nm_clear_g_free (&value);
+ v = svGetValueStr (ifcfg, "IPV6_PRIVACY", &value);
+ if (v) {
+ ip6_privacy = svParseBoolean (v, FALSE);
if (!ip6_privacy)
- ip6_privacy = (g_strcmp0 (str_value, "rfc4941") == 0) ||
- (g_strcmp0 (str_value, "rfc3041") == 0);
+ ip6_privacy = (g_strcmp0 (v, "rfc4941") == 0) ||
+ (g_strcmp0 (v, "rfc3041") == 0);
}
ip6_privacy_prefer_public_ip = svGetValueBoolean (ifcfg, "IPV6_PRIVACY_PREFER_PUBLIC_IP", FALSE);
- ip6_privacy_val = str_value ?
+ ip6_privacy_val = v ?
(ip6_privacy ?
(ip6_privacy_prefer_public_ip ? NM_SETTING_IP6_CONFIG_PRIVACY_PREFER_PUBLIC_ADDR : NM_SETTING_IP6_CONFIG_PRIVACY_PREFER_TEMP_ADDR) :
NM_SETTING_IP6_CONFIG_PRIVACY_DISABLED) :
NM_SETTING_IP6_CONFIG_PRIVACY_UNKNOWN;
- g_free (str_value);
/* the route table (policy routing) is ignored if we don't handle routes. */
route_table = svGetValueInt64 (ifcfg, "IPV6_ROUTE_TABLE", 10,
@@ -1821,19 +1823,25 @@ make_ip6_setting (shvarFile *ifcfg,
if (strcmp (method, NM_SETTING_IP6_CONFIG_METHOD_IGNORE) == 0)
return NM_SETTING (s_ip6);
- value = svGetValueStr_cp (ifcfg, "DHCPV6_HOSTNAME");
+ nm_clear_g_free (&value);
+ v = svGetValueStr (ifcfg, "DHCPV6_DUID", &value);
+ if (v)
+ g_object_set (s_ip6, NM_SETTING_IP6_CONFIG_DHCP_DUID, v, NULL);
+
+ nm_clear_g_free (&value);
+ v = svGetValueStr (ifcfg, "DHCPV6_HOSTNAME", &value);
/* Use DHCP_HOSTNAME as fallback if it is in FQDN format and ipv6.method is
* auto or dhcp: this is required to support old ifcfg files
*/
- if (!value && ( !strcmp (method, NM_SETTING_IP6_CONFIG_METHOD_AUTO)
+ if (!v && ( !strcmp (method, NM_SETTING_IP6_CONFIG_METHOD_AUTO)
|| !strcmp (method, NM_SETTING_IP6_CONFIG_METHOD_DHCP))) {
- value = svGetValueStr_cp (ifcfg, "DHCP_HOSTNAME");
- if (value && !strchr (value, '.'))
- g_clear_pointer (&value, g_free);
+ nm_clear_g_free (&value);
+ v = svGetValueStr (ifcfg, "DHCP_HOSTNAME", &value);
+ if (v && !strchr (v, '.'))
+ v = NULL;
}
- if (value)
- g_object_set (s_ip6, NM_SETTING_IP_CONFIG_DHCP_HOSTNAME, value, NULL);
- g_free (value);
+ if (v)
+ g_object_set (s_ip6, NM_SETTING_IP_CONFIG_DHCP_HOSTNAME, v, NULL);
g_object_set (s_ip6, NM_SETTING_IP_CONFIG_DHCP_SEND_HOSTNAME,
svGetValueBoolean (ifcfg, "DHCPV6_SEND_HOSTNAME", TRUE), NULL);
@@ -1843,18 +1851,16 @@ make_ip6_setting (shvarFile *ifcfg,
* added to the automatic ones. Note that this is not currently supported by
* the legacy 'network' service (ifup-eth).
*/
- ipv6addr = svGetValueStr_cp (ifcfg, "IPV6ADDR");
- ipv6addr_secondaries = svGetValueStr_cp (ifcfg, "IPV6ADDR_SECONDARIES");
+ ipv6addr = svGetValueStr (ifcfg, "IPV6ADDR", &ipv6addr_to_free);
+ ipv6addr_secondaries = svGetValueStr (ifcfg, "IPV6ADDR_SECONDARIES", &ipv6addr_secondaries_to_free);
+ nm_clear_g_free (&value);
value = g_strjoin (ipv6addr && ipv6addr_secondaries ? " " : NULL,
ipv6addr ?: "",
ipv6addr_secondaries ?: "",
NULL);
- g_free (ipv6addr);
- g_free (ipv6addr_secondaries);
list = nm_utils_strsplit_set (value, " ");
- g_free (value);
for (iter = list, i = 0; iter && *iter; iter++, i++) {
NMIPAddress *addr = NULL;
@@ -1868,25 +1874,26 @@ make_ip6_setting (shvarFile *ifcfg,
/* Gateway */
if (nm_setting_ip_config_get_num_addresses (s_ip6)) {
- value = svGetValueStr_cp (ifcfg, "IPV6_DEFAULTGW");
- if (!value) {
+ nm_clear_g_free (&value);
+ v = svGetValueStr (ifcfg, "IPV6_DEFAULTGW", &value);
+ if (!v) {
/* If no gateway in the ifcfg, try global /etc/sysconfig/network instead */
- if (network_ifcfg)
- value = svGetValueStr_cp (network_ifcfg, "IPV6_DEFAULTGW");
+ if (network_ifcfg) {
+ nm_clear_g_free (&value);
+ v = svGetValueStr (network_ifcfg, "IPV6_DEFAULTGW", &value);
+ }
}
- if (value) {
+ if (v) {
char *ptr;
- if ((ptr = strchr (value, '%')) != NULL)
+ if ((ptr = strchr (v, '%')) != NULL)
*ptr = '\0'; /* remove %interface prefix if present */
- if (!nm_utils_ipaddr_valid (AF_INET6, value)) {
+ if (!nm_utils_ipaddr_valid (AF_INET6, v)) {
g_set_error (error, NM_SETTINGS_ERROR, NM_SETTINGS_ERROR_INVALID_CONNECTION,
- "Invalid IP6 address '%s'", value);
- g_free (value);
+ "Invalid IP6 address '%s'", v);
goto error;
}
- g_object_set (s_ip6, NM_SETTING_IP_CONFIG_GATEWAY, value, NULL);
- g_free (value);
+ g_object_set (s_ip6, NM_SETTING_IP_CONFIG_GATEWAY, v, NULL);
}
}
@@ -1900,11 +1907,10 @@ make_ip6_setting (shvarFile *ifcfg,
g_object_set (s_ip6, NM_SETTING_IP6_CONFIG_ADDR_GEN_MODE, i_val, NULL);
/* IPv6 tokenized interface identifier */
- str_value = svGetValueStr_cp (ifcfg, "IPV6_TOKEN");
- if (str_value) {
- g_object_set (s_ip6, NM_SETTING_IP6_CONFIG_TOKEN, str_value, NULL);
- g_free (str_value);
- }
+ nm_clear_g_free (&value);
+ v = svGetValueStr (ifcfg, "IPV6_TOKEN", &value);
+ if (v)
+ g_object_set (s_ip6, NM_SETTING_IP6_CONFIG_TOKEN, v, NULL);
/* DNS servers
* Pick up just IPv6 addresses (IPv4 addresses are taken by make_ip4_setting())
@@ -1913,24 +1919,22 @@ make_ip6_setting (shvarFile *ifcfg,
char tag[256];
numbered_tag (tag, "DNS", i);
- value = svGetValueStr_cp (ifcfg, tag);
- if (!value) {
+ nm_clear_g_free (&value);
+ v = svGetValueStr (ifcfg, tag, &value);
+ if (!v) {
/* all done */
break;
}
- if (nm_utils_ipaddr_valid (AF_INET6, value)) {
- if (!nm_setting_ip_config_add_dns (s_ip6, value))
+ if (nm_utils_ipaddr_valid (AF_INET6, v)) {
+ if (!nm_setting_ip_config_add_dns (s_ip6, v))
PARSE_WARNING ("duplicate DNS server %s", tag);
- } else if (nm_utils_ipaddr_valid (AF_INET, value)) {
+ } else if (nm_utils_ipaddr_valid (AF_INET, v)) {
/* Ignore IPv4 addresses */
} else {
- PARSE_WARNING ("invalid DNS server address %s", value);
- g_free (value);
+ PARSE_WARNING ("invalid DNS server address %s", v);
goto error;
}
-
- g_free (value);
}
if (!routes_read) {
@@ -1961,7 +1965,6 @@ make_ip6_setting (shvarFile *ifcfg,
/* DNS options */
nm_clear_g_free (&value);
parse_dns_options (s_ip6, svGetValue (ifcfg, "IPV6_RES_OPTIONS", &value));
- g_free (value);
/* DNS priority */
priority = svGetValueInt64 (ifcfg, "IPV6_DNS_PRIORITY", 10, G_MININT32, G_MAXINT32, 0);
diff --git a/src/settings/plugins/ifcfg-rh/nms-ifcfg-rh-writer.c b/src/settings/plugins/ifcfg-rh/nms-ifcfg-rh-writer.c
index bdad738966..1656530911 100644
--- a/src/settings/plugins/ifcfg-rh/nms-ifcfg-rh-writer.c
+++ b/src/settings/plugins/ifcfg-rh/nms-ifcfg-rh-writer.c
@@ -2568,6 +2568,7 @@ write_ip6_setting (NMConnection *connection,
svUnsetValue (ifcfg, "IPV6INIT");
svUnsetValue (ifcfg, "IPV6_AUTOCONF");
svUnsetValue (ifcfg, "DHCPV6C");
+ svUnsetValue (ifcfg, "DHCPv6_DUID");
svUnsetValue (ifcfg, "DHCPV6_HOSTNAME");
svUnsetValue (ifcfg, "DHCPV6_SEND_HOSTNAME");
svUnsetValue (ifcfg, "IPV6_DEFROUTE");
@@ -2608,6 +2609,9 @@ write_ip6_setting (NMConnection *connection,
svUnsetValue (ifcfg, "DHCPV6C");
}
+ svSetValueStr (ifcfg, "DHCPV6_DUID",
+ nm_setting_ip6_config_get_dhcp_duid (NM_SETTING_IP6_CONFIG (s_ip6)));
+
write_ip6_setting_dhcp_hostname (s_ip6, ifcfg);
/* Write out IP addresses */