Man Linux: Main Page and Category List

NAME

       dhcp_probe.cf - configuration file for dhcp_probe

SYNPOSIS

       /etc/dhcp_probe.cf

DESCRIPTION

       The  file /etc/dhcp_probe.cf contains configuration information used by
       the dhcp_probe(8) daemon.  dhcp_probe reads the  file  when  it  begins
       (and whenever it receives a SIGHUP signal).

       The  location  of  this file defaults to /etc/dhcp_probe.cf, but may be
       overridden by a command-line option to dhcp_probe(8).

       The file consists of a  series  of  statements,  one  per  line.   Each
       statement  begins  with  a  keyword  followed  by one or more arguments
       (depending on the keyword); keywords and  arguments  are  separated  by
       spaces or tabs.  Statements may be specified in any order.

       Some  keywords  take  an  ethernet-address  argument.  Ethernet address
       values must be written in a form that  ether_aton(3)  recognizes;  e.g.
       1:2:3:4:5:6 or 00:A5:b2:0:BB:c.

       Some keywords take an ip-address as a value.  IP address values must be
       written in a form that inet_aton(3) recognizes; e.g.  192.168.1.2.

       Blank lines are ignored.  Lines for which the first non-blank character
       is  a ’#’ are treated as comments.  Trailing comments on statements are
       not supported.

       Because all presently-defined keywords are optional, the  file  may  be
       empty, however, it must exist.

KEYWORDS

       The keywords are as follows:

   chaddr
              The  chaddr  statement  is  optional, and is used to specify the
              value of the chaddr field in the request  packets  sent  by  the
              program.   This  value  is  also used to compute the DHCP Client
              Identifier option in some of the request  packets  sent  by  the
              program (by prepending x’01’).

              Specify:

                     chaddr ethernet-address

              If  not  specified,  this value defaults to the Ethernet address
              corresponding to the interface you specified on the commandline.

              You  might  want to use the chaddr statement if the interface is
              also  a  DHCP  client,  so  that  sending  requests   with   the
              interface’s own chaddr/DHCP Client Identifier will not interfere
              with that functionality.

              If you specify a value, be sure to specify  a  unicast  Ethernet
              address  that  does  not  belong  to  any  valid  client on your
              network.

              Correctly-functioning BootP and DHCP servers that  respond  will
              send  any  responses to the chaddr address, or in some cases, to
              the Ethernet broadcast address.  Therefore,  if  you  specify  a
              value  here  (and  it  differs  from  your  interface’s Ethernet
              address), the program will have  to  place  the  interface  into
              promiscuous mode to be sure it hears unicast responses.

              Note  that  the chaddr value does not affect the Ethernet source
              address of the Ethernet frames sent by the program.

              If you specify this value, you may also wish to specify the same
              value  in  the ether_src statement.  See the description of that
              statement for further discussion.

   ether_src
              The ether_src statement is optional, and is used to specify  the
              value  of the ether_src field in the Ethernet frames sent by the
              program.

              Specify:

                     ether_src ethernet-address

              If not specified, this value defaults to  the  Ethernet  address
              corresponding to the interface you specified on the commandline.

              If you specify a value, be sure to specify  a  unicast  Ethernet
              address  that  does  not  belong  to  any  valid  client on your
              network.

              Note that this value does not affect the  chaddr  field  or  the
              DHCP  Client  Identifier option field in request packets sent by
              the program.

              If you specified a chaddr value, you may also wish to specify an
              equal  ether_src  value.  While not strictly necessary, doing so
              will cause any Layer 2 switches on the  network  to  learn  that
              this  hardware  address  is  on your leg of the network, so they
              will not  need  to  flood  response  packets  directed  to  that
              hardware  address,  but  instead can direct the response packets
              only to your leg of the network.

              Additionally, specifying the same ether_src value could help you
              discover  any buggy BootP or DHCP servers that mistakenly direct
              their responses to the sender’s ether_src  (instead  of  to  the
              sender’s bootp_chaddr).

   server_id
              The  server_id statement is optional, and is used to specify the
              value of the DHCP Server Identifer option in some of the request
              packets sent by the program.

              Specify:

                     server_id ip-address

              If not specified, this value defaults to 10.254.254.254.

              The  DHCP  Server  Identifer  option  appears in the packets the
              program sends when it mimics a  DHCP  client  in  the  SELECTING
              state.

              It’s  best  that  the  DHCP Server Identifier option the program
              uses not match the IP address of any valid DHCP server  on  your
              network,  to  avoid  confusing  them.   Other  than that, any IP
              address is a reasonable value; you may wish to specify one  that
              could never be a valid address on your network.

   client_ip_address
              The  client_ip_address  statement  is  optional,  and is used to
              specify the IP address that the program should request, or claim
              to have a lease on.

              Specify:

                     client_ip_address ip-address

              If not specified, this value defaults to 172.31.254.254.

              When  the  program  generates a DHCPREQUEST packet that mimics a
              DHCP client that is in the INIT-REBOOT or SELECTING  state,  the
              packet  contains  a  Requested IP Address option containing this
              value.  When the program generates  a  DHCPREQUEST  packet  that
              mimics  a DHCP client that is in the REBINDING state, the packet
              contains a ciaddr field containing this value.

              It’s best that the value the  program  uses  not  match  the  IP
              address  of  any  valid  DHCP  client  on your network, to avoid
              confusing valid DHCP servers.

              It’s extremely useful if the value the program uses not be valid
              (topologically  speaking)  for the physical network on which the
              program   sends   the   packets.    Sending   a    topologically
              inappropriate  value  may stimulate some DHCP servers to respond
              with a DHCPNAK, which helps the program flush out DHCP  servers.

   response_wait_time
              The  response_wait_time  statement  is  optional, and is used to
              specify how long the program should  wait  for  responses  after
              sending a single request packet.

              Specify

                     response_wait_time num_milliseconds

              If  not  specified,  this value defaults to 5000 milliseconds (5
              seconds).

              The value is specified in milliseconds, and  must  fit  into  an
              ’int’  on  your  host.   (Values  larger  than  an  ’int’ may be
              silently misinterpreted.)  Typical values are on the order of  a
              few thousand milliseconds; i.e. several seconds.

   cycle_time
              The cycle_time statement is optional, and is used to specify how
              long the program should sleep between each probe cycle.

              Specify

                     cycle_time num_seconds

              If not specified, this value defaults to 300 seconds.

              The value is  specified  in  seconds,  and  must  into  into  an
              ’unsigned  int’  on your host.  (Values larger than an ’unsigned
              int’ may be silently misinterpreted.)  Typical valus range  from
              several  hundred  to  several  thousand  seconds  (i.e.  several
              minutes to several hours).

              During each probe cycle, the program sends one  of  the  request
              packet  flavors,  captures  any responses that arrive during the
              response_wait_time, then repeats this  for  each  of  the  other
              request  packet  flavors.   After  doing this for each flavor of
              request packet, the probe cycle is  complete,  and  the  program
              sleeps for the cycle_time.

   legal_server
              The  legal_server  statement is optional, and is used to specify
              the IP source address of responses that come from a legal  BootP
              or  DHCP server on your network.  The statement may be specified
              multiple times.

              Specify

                     legal_server ip-address

              If not specified, the program assumes there are no  legal  BootP
              and  DHCP servers on your network; all responses will be treated
              as coming from an unknown DHCP server.

              When the program receives a response  packet,  it  compares  the
              packet’s  IP  source  address  to  all  the  addresses  you have
              specified in legal_server statements.  If the IP source  address
              matches one of these values, the response is deemed to have come
              from a known DHCP server, and is  ignored.   If  the  IP  source
              address  does  not  match  any  of  these  values (or you do not
              specify any legal_server), then the program logs a message  that
              reports  the  packet’s  IP  source  address  and Ethernet source
              address.  Additionally, if the program was started with  the  -o
              commandline  option,  the  packet  is  also  written to a packet
              capture file.

              If  both  legal_server  and   legal_server_ethersrc   statements
              appear,  then  a response must have both a valid IP source and a
              valid ethernet source to be considered to have come from a known
              DHCP server.

              When  relaying  a response from a server to a client, some BootP
              Relay Agents  may  change  the  response’s  IP  source  address,
              replacing  the  server’s IP address with that of the BootP Relay
              Agent.  If BootP Relay Agents on your network do this, you  will
              need to specify their IP addresses here instead.

   legal_server_ethersrc
              The  legal_server_ethersrc statement is optional, and is used to
              specify the Ethernet source address of responses that come  from
              a legal BootP or DHCP server on your network.  The statement may
              be specified multiple times.

              Specify

                     legal_server_ethersrc ethernet-address

              If not specified, the program does not check the Ethernet source
              address of responses.

              If  you have specified at least one legal_server_ethersrc value,
              when  the  program  receives  a  response  packet,  the  program
              compares  the  packet’s  Ethernet  source  address  to  all  the
              addresses   you   have   specified   in    legal_server_ethersrc
              statements.   If the Ethernet source does not match one of these
              values, the response is deemed to have come from an unknown DHCP
              server;  the program logs a message that reports the packet’s IP
              source address and Ethernet source  address.   Additionally,  if
              the  program  was  started  with  the -o commandline option, the
              packet is also written to a packet capture file.

              If  both  legal_server  and   legal_server_ethersrc   statements
              appear,  then  a response must have both a valid IP source and a
              valid ethernet source to be considered to have come from a known
              DHCP server.

              Each  router on the path from the DHCP server to the DHCP client
              will overwrite the Ethernet source address  field.   So  if  you
              specify  any  legal_server_ethersrc  statements,  also  list the
              Ethernet source value(s) for the last hop  router(s).   A  BootP
              Relay  Agent on the path from the DHCP server to the DHCP client
              will overwrite the Ethernet field.  So also  list  the  Ethernet
              source  value(s)  for  the  BootP Relay Agent.  (The BootP Relay
              Agent is often co-resident in the last-hop IP router, so you may
              have  already  taken  care  of this when you listed the last-hop
              router(s).

              The legal_server_ethersrc statement is  considered  experimental
              in version 1.3.0, as it has received only limited testing.

   lease_network_of_concern
              The  lease_network_of_concern  statement is optional, and may be
              specified multiple times.  The statement is used to specify  one
              or  more  network  ranges that are of concern relative to the IP
              addresses distributed by a rogue BootP/DHCP server.

              Specify

                     lease_network_of_concern network-ip-address network-mask

              Specifying  one  or  more  lease_network_of_concern   statements
              activates the "Lease Networks of Concern" feature.

              When  the  program receives a response packet that it determines
              to be from a rogue BootP/DHCP server, if the "Lease Networks  of
              Concern"  feature is active, the program will examine the packet
              further.  If the packet’s yiaddr field is non-zero, the value in
              that  field  is  tested  to  see  if  it falls within any of the
              "Leases Networks of Concern."  If it does, then the message  the
              program  logs  is  extended  to  also  report  this fact, and to
              include the value of  the  yiaddr  field.   Furthermore,  if  an
              alert_program_name2  was specified, when that program is called,
              it is called with an additional -y yiaddr option.  (This is  not
              supported  if  an alert_program_name was specified, as the older
              alert_program_name uses a syntax that cannot be extended.)

              The "Lease Networks of Concern" feature does not change the  way
              the  program  probes  for  or  detects rogue BootP/DHCP servers.
              Upon detection of a rogue BootP/DHCP server,  the  feature  only
              may  cause  additional  information  to  be added to the message
              logged (and passed to alert_program_name2).

              This feature may  be  used,  for  example,  by  specifying  your
              networks’  legitimate  address  ranges  as  "Lease  Networks  of
              Concern".   While  most  rogue  BootP/DHCP  servers   distribute
              private  IP  addresses,  or send DHCPNAKs to legitimate clients,
              other more damaging rogue BootP/DHCP servers may  distribute  IP
              addresses that fall within your legitimate network ranges.  This
              will help differentiate those more damaging incidents  from  the
              more common ones.

   alert_program_name
              The alert_program_name statement is optional, and may be used to
              specify the name of an external program that should be run every
              time a response packet is received from an unexpected server.

              Note  that  using  the  newer  alert_program_name2  statement is
              preferrable.

              Specify

                     alert_program_name /absolute/path/name

              Unexpected response packets are reported as a matter of  course,
              and optionally written to a packet capture file.  You may use an
              alert_program_name to provide additional handling of the  event,
              for  example,  to alert an appropriate party via mail or paging.
              The alert_program_name you specify is called with four arguments
              in  the  following  order: the name of the calling program (e.g.
              dhcp_probe), the name of the interface on which  the  unexpected
              response  packet  was  received,  the  IP  source address of the
              packet, and the Ethernet source address of the packet.

              As the alert_program_name is called with the same privileges  as
              dhcp_probe  (i.e.  root),  you should exercise caution to ensure
              that the alert program is safe for a privileged user to execute.

              Because  the  syntax  supported  by  the external program is not
              extensible, the use of alert_program_name2 is preferrable.

              You   may    not    specify    both    alert_program_name    and
              alert_program_name2.

   alert_program_name2
              The  alert_program_name2  statement is optional, and may be used
              to specify the name of an external program that  should  be  run
              every  time  a  response  packet  is received from an unexpected
              server.

              Specify

                     alert_program_name2 /absolute/path/name

              Unexpected response packets are reported as a matter of  course,
              and optionally written to a packet capture file.  You may use an
              alert_program_name2 to provide additional handling of the event,
              for  example,  to alert an appropriate party via mail or paging.
              The alert_program_name2 you specify is called with the following
              required options:

                     -p the name of the calling program (e.g. dhcp_probe),
                     -I the name of the interface on which the unexpected response packet was received
                     -i the IP source address of the packet
                     -m Ethernet source address of the packet

              The following non-required options may also be passed:

                     -y the non-zero yiaddr value from the packet, when it falls inside a "Lease Network of Concern"

              The  alert_program_name2 program you specify must ignore options
              or arguments it does not recognize; this is to ensure it remains
              forward-compatible  with  future enhancements to dhcp_probe.  It
              must be prepared to accept options in any order.

              As the alert_program_name2 is called with the same privileges as
              dhcp_probe  (i.e.  root),  you should exercise caution to ensure
              that the alert program is safe for a privileged user to execute.

              You    may    not    specify    both    alert_program_name   and
              alert_program_name2.

EXAMPLE

       An example /etc/dhcp_probe.cf file follows:

              # dhcp_probe.cf: config file for dhcp_probe
              #
              # General syntax:
              #  Comment lines start with ’#’ (trailing comments not permitted).
              #  Blank lines are OK.
              #  Tokens within a line should be separated with spaces and/or tabs.
              #  Entries in the file may be in any order.
              #  Any ’ethernet-address’ must be written in a form that ether_aton(3) recognizes; e.g.
              #      1:2:3:4:5:6   00:A5:b2:0:BB:c
              #  Any ’ip-address’ must be written in a form that inet_aton(3) recognizes; e.g.
              #      192.168.1.2
              #
              # ----------------------------------------------------------------------------------
              #
              # CLIENT HARDWARE ADDRESS
              #
              # By default, for the ’chaddr’ field in the BootP header, we use the Ethernet
              # address corresponding to the interface you specified.
              # We also use this value to compute the DHCP Client Identifier option (by prepending x’01’).
              # You may optionally override this value.
              # (Note that this does not override the Ethernet Src address in the Ethernet frame we send.)
              #
              # You might want to do this if our interface is also a DHCP client, so
              # sending requests with the interface’s own chaddr/DHCP Client Identifier would interfere with
              # that functionality.
              #
              # If you specify a value, be sure to specify an Ethernet address that does not belong to
              # any valid client on your network.  Be sure to specify a unicast Ethernet address.
              #
              # Syntax:
              #    chaddr enet-addr

              chaddr 0:0:0:1:2:3

              # ----------------------------------------------------------------------------------
              #
              # ETHERNET SOURCE ADDRESS
              #
              # By default, for the ’ether_shost’ field in the Ethernet header, we use the Ethernet
              # address corresponding to the interface you specified.
              # You may optionally override this value.
              # (Note that this does not override the ’chaddr’ in the BootP header, nor the DHCP Client Identifier.)
              #
              # If you are specify the ’chaddr’ statement, you might want to also do this, so you don’t miss buggy
              # DHCP servers that respond (incorrectly) to ether_src instead of to chaddr.
              #
              # If you specify a value, be sure to specify an Ethernet address that does not belong to
              # any valid client on your network.  Be sure to specify a unicast Ethernet address.
              #
              # Syntax:
              #    ether_src enet-addr

              ether_src 0:0:0:1:2:3

              # ----------------------------------------------------------------------------------
              #
              # DHCP SERVER IDENTIFIER
              #
              # When we generate a DHCPREQUEST packet corresponding to a client that is in the SELECTING
              # state, the options field must contain a ’DHCP Server Identifier’ option, indicating the
              # IP address of the DHCP server the client is selecting.   It’s best that the value we use
              # not match the IP address of any valid DHCP server, to avoid confusing them.  The program
              # provides a default value of 10.254.254.254, which you may override here.
              #
              # Syntax:
              #    server_id ip-addr

              server_id 10.1.2.3

              # ----------------------------------------------------------------------------------
              #
              # CLIENT IP ADDRESS
              #
              # When we generate a DHCPREQUEST packet corresponding to a client that is in the INIT-REBOOT
              # or SELECTING state, the options field must containg a ’Requested IP Address’ option, indicating
              # the IP address the client is requesting.    When we generate a DHCPREQUEST packet corresponding
              # to a client that is in the REBINDING state, the ’ciaddr’ field in the BootP header must contain
              # the IP address that the DHCP client presently has leased and wishes to renew.
              #
              # In all these cases, it’s best that the value we use not match the IP address of any valid DHCP client,
              # to avoid confusing the valid DHCP servers.
              #
              # Furthermore, it is extremely useful if the value we use *not* be valid (topologically speaking) for the
              # physical network on which we send the packets.  Sending a topologically inappropriate value
              # may stimulate some DHCP servers to respond with a DHCPNAK, which helps us flush out DHCP servers.
              # (This will probably happen only in response to the packets we sending when pretending to be in REBINDING state.)
              #
              # The program provides a default value of 172.31.254.254, which you may override here.
              #
              # Syntax:
              #   client_ip_address ip-addr

              # client_ip_address 172.31.254.254

              # ----------------------------------------------------------------------------------
              #
              # RESPONSE WAIT TIME
              #
              # After sending one packet, we wait for responses.  The length of time we wait
              # is the ’response_wait_time’.  The program provides a default value of 5000, which you
              # may override here.  The value is measured in milliseconds, and must fit into
              # an ’int’ on your host.  (Values larger than an ’int’ may be silently misinterpreted.)
              # Typical values are on the order of a few thousand milliseconds; i.e. several seconds.
              #
              # Syntax:
              #    response_wait_time num_milliseconds

              # response_wait_time 5000

              # ----------------------------------------------------------------------------------
              #
              # CYCLE WAIT TIME
              #
              # For each flavor packet, we send the packet and listen for responses to that packet.
              # After doing this for all flavor packets, we go to sleep for the "cycle_time",
              # then repeat the process.  The program provides a default value of 300, which you
              # may override here.  The value is measured in seconds, and must fit into an
              # ’unsigned int’ on your host.  (Values larger than an ’unsigned int’ may be silently
              # misinterpreted.)  Typical valus range from several hundred to several thousand
              # seconds (i.e. several minutes to several hours).
              #
              # Syntax:
              #    cycle_time num_seconds

              cycle_time 1200

              # ----------------------------------------------------------------------------------
              #
              # LEGAL SERVERS’ IP SOURCE ADDRESSES
              #
              # After sending one packet, we wait for responses.  Responses from legal BootP or DHCP
              # servers are ignored; presumably you aren’t interesting in discovering them.
              # Specify a legal server’s IP source address with the ’legal_server’ statement.
              # The value you specify is compared to the IPsrc field in each response’s IP header.
              #
              # If you have multiple legal servers, specify each in a separate statement.
              # If your BootP Relay Agents overwrite the server’s IP address in the IPsrc field
              # with their own IP addresses, you will need to list the IP addresses of the
              # BootP Relay Agents.
              #
              # Alternatively, do not specify any legal_server statements at all, so *no* responses
              # will be considered legal.
              # (This is different from the way legal_server_ethersrc statements are handled.)
              #
              # If both legal_server and legal_server_ethersrc statements appear, then a response
              # must have both a valid IP source and a valid ethernet source to be considered legal.
              #
              # Syntax:
              #   legal_server ip-addr

              legal_server 192.168.1.2
              legal_server 192.168.3.4

              # ----------------------------------------------------------------------------------
              #
              # LEGAL SERVERS’ ETHERNET SOURCE ADDRESSES
              #
              # Specify a legal server’s Ethernet source address with the ’legal_server_ethersrc’ statement.
              # The value you specify is compared to the ethernet_src field in each response’s IP header.
              #
              # If you have multiple legal ethernet sources, specify each in a separate statement.
              # Each router on the path from the DHCP server to the DHCP client will overwrite
              # the ethernet_src field.  So also list the ethernet_src value(s) for the last hop router(s).
              # The BootP Relay Agent on the path from the DHCP server to the DHCP client will overwrite
              # the ethernet_src field.  So also list the ethernet_src value(s) for the BootP Relay Agent.
              # (This is often co-resident in the last-hop IP router, so you may have already taken care
              # of this when you listed the last-hop router(s).
              #
              # Alternatively, do not specify any legal_server_ethersrc statements at all.
              # If none are specified, then all ethernet_src values are considered legal.
              # (This is different from the way legal_server statements are handled.)
              #
              # If both legal_server and legal_server_ethersrc statements appear, then a response
              # must have both a valid IP source and a valid ethernet source to be considered legal.
              #
              # Syntax:
              #   legal_server_ethersrc enet-addr

              # legal_server_ethersrc 0:2:4:ab:cd:ef
              # legal_server_ethersrc 0:17:30:1:0A:3

              # ----------------------------------------------------------------------------------
              #
              # ALERT PROGRAM NAME
              #
              # In addition to logging a response received from an unexpected server, we will optionally
              # call a user-specified ’alert program’ if one is specified here.  To use this feature,
              # specify the absolute pathname of a program we should execute for each unexpected response.
              # Either specify it using the older ’alert_program_name’ statement, or (preferrably) using
              # the newer ’alert_program_name2’ statement.  (The newer statement is preferrable because
              # it calls the alert program with a more extensible syntax.)  You may not specify
              # both alert_program_name and alert_program_name2.
              #
              # Old style alert program:
              #
              # Syntax:
              #   alert_program_name /absolute/path/name
              #
              # The program specified via ’alert_program_name’ will be called as follows:
              #   /absolute/path/name  name_of_calling_program  name_of_interface_on_which_the_response_was_received  IP_source_of_the_response  ether_src_of_the_response
              #
              #
              # Newer style alert program:
              #
              # Syntax:
              #   alert_program_name2 /absolute/path/name
              #
              # The program specified via ’alert_program_name2’ will be called as follows:
              #   /absolute/path/name  -p name_of_calling_program  -I name_of_interface_on_which_the_response_was_received  -i IP_source_of_the_response  -m ether_src_of_the_response [-y yiaddr_when_in_lease_networks_of_concern]
              # The options may appear in any order.
              # The program must silently ignore any options or arguments it does not recognize,
              # so as to be forward-compatible with future enhancements to dhcp_probe.

              alert_program_name2 /usr/local/etc/dhcp_probe_notify2

              # ----------------------------------------------------------------------------------
              #
              # LEASE NETWORKS OF CONCERN
              #
              # Optionally define one or more network ranges that are to be treated as
              # being of special concern when a rogue BootP/DHCP server is detected sending response
              # that contains a ’yiaddr’ value that falls into any of these ranges.
              # Specify each such network ranges of concern in a separate statement.
              # When the yiaddr value in a rogue server’s response falls into any of these ranges,
              # the message logged will contain additional text remarking on this fact.
              # And if an alert_program_name2 is used, that alert program
              # will be called with an extra option so it can also act on that fact.
              #
              # If you specify all your networks’ legitimate IP ranges, this can help you
              # take additional notice of rogue BootP/DHCP servers that distribute *your*
              # network addresess, rather than simply distribute private IP address or
              # send DHCPNAKs to legitimate clients.
              #
              # Syntax:
              #    lease_network_of_concern  IP-network-address network-mask

              lease_network_of_concern 128.112.0.0 255.255.0.0
              lease_network_of_concern 140.180.0.0 255.255.0.0

SEE ALSO

       dhcp_probe(8)