. All rights reserved. Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: 1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer. 2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. THIS SOFTWARE IS PROVIDED ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. */ require("guiconfig.inc"); /* Fix failover DHCP problem * http://article.gmane.org/gmane.comp.security.firewalls.pfsense.support/18749 */ ini_set("memory_limit","64M"); /* This function will remove entries from dhcpd.leases that would otherwise * overlap with static DHCP reservations. If we don't clean these out, * then DHCP will print a warning in the logs about a duplicate lease */ function dhcp_clean_leases() { global $g, $config; $leasesfile = "{$g['dhcpd_chroot_path']}/var/db/dhcpd.leases"; if (!file_exists($leasesfile)) return; /* Build list of static MACs */ $staticmacs = array(); foreach($config['interfaces'] as $ifname => $ifarr) if (is_array($config['dhcpd'][$ifname]['staticmap'])) foreach($config['dhcpd'][$ifname]['staticmap'] as $static) $staticmacs[] = $static['mac']; /* Read existing leases */ $leases_contents = explode("\n", file_get_contents($leasesfile)); $newleases_contents = array(); $i=0; while ($i < count($leases_contents)) { /* Find a lease definition */ if (substr($leases_contents[$i], 0, 6) == "lease ") { $templease = array(); $thismac = ""; /* Read to the end of the lease declaration */ do { if (substr($leases_contents[$i], 0, 20) == " hardware ethernet ") $thismac = substr($leases_contents[$i], 20, 17); $templease[] = $leases_contents[$i]; $i++; } while ($leases_contents[$i-1] != "}"); /* Check for a matching MAC address and if not present, keep it. */ if (! in_array($thismac, $staticmacs)) $newleases_contents = array_merge($newleases_contents, $templease); } else { /* It's a line we want to keep, copy it over. */ $newleases_contents[] = $leases_contents[$i]; $i++; } } /* Write out the new leases file */ $fd = fopen($leasesfile, 'w'); fwrite($fd, implode("\n", $newleases_contents)); fclose($fd); } $if = $_GET['if']; if ($_POST['if']) $if = $_POST['if']; /* if OLSRD is enabled, allow WAN to house DHCP. */ if($config['installedpackages']['olsrd']) { foreach($config['installedpackages']['olsrd']['config'] as $olsrd) { if($olsrd['enable']) { $iflist = array("lan" => "LAN", "wan" => "WAN"); $is_olsr_enabled = true; break; } } } if(!$iflist) $iflist = array("lan" => "LAN"); for ($i = 1; isset($config['interfaces']['opt' . $i]); $i++) { $oc = $config['interfaces']['opt' . $i]; if (isset($oc['enable']) && $oc['if'] && (!$oc['bridge'])) { $iflist['opt' . $i] = $oc['descr']; } } if (!$if || !isset($iflist[$if])) $if = "lan"; $pconfig['range_from'] = $config['dhcpd'][$if]['range']['from']; $pconfig['range_to'] = $config['dhcpd'][$if]['range']['to']; $pconfig['deftime'] = $config['dhcpd'][$if]['defaultleasetime']; $pconfig['maxtime'] = $config['dhcpd'][$if]['maxleasetime']; $pconfig['gateway'] = $config['dhcpd'][$if]['gateway']; list($pconfig['wins1'],$pconfig['wins2']) = $config['dhcpd'][$if]['winsserver']; list($pconfig['dns1'],$pconfig['dns2']) = $config['dhcpd'][$if]['dnsserver']; $pconfig['enable'] = isset($config['dhcpd'][$if]['enable']); $pconfig['denyunknown'] = isset($config['dhcpd'][$if]['denyunknown']); $pconfig['staticarp'] = isset($config['dhcpd'][$if]['staticarp']); $pconfig['ddnsdomain'] = $config['dhcpd'][$if]['ddnsdomain']; $pconfig['ddnsupdate'] = isset($config['dhcpd'][$if]['ddnsupdate']); list($pconfig['ntp1'],$pconfig['ntp2']) = $config['dhcpd'][$if]['ntpserver']; $pconfig['netboot'] = isset($config['dhcpd'][$if]['netboot']); $pconfig['nextserver'] = $config['dhcpd'][$if]['next-server']; $pconfig['filename'] = $config['dhcpd'][$if]['filename']; $pconfig['rootpath'] = $config['dhcpd'][$if]['rootpath']; $pconfig['failover_peerip'] = $config['dhcpd'][$if]['failover_peerip']; $pconfig['netmask'] = $config['dhcpd'][$if]['netmask']; $ifcfg = $config['interfaces'][$if]; /* set the enabled flag which will tell us if DHCP relay is enabled * on any interface. We will use this to disable DHCP server since * the two are not compatible with each other. */ $dhcrelay_enabled = false; $dhcrelaycfg = $config['dhcrelay']; if(is_array($dhcrelaycfg)) { foreach ($dhcrelaycfg as $dhcrelayif => $dhcrelayifconf) { if (isset($dhcrelayifconf['enable']) && (($dhcrelayif == "lan") || (isset($config['interfaces'][$dhcrelayif]['enable']) && $config['interfaces'][$dhcrelayif]['if'] && (!$config['interfaces'][$dhcrelayif]['bridge'])))) $dhcrelay_enabled = true; } } if (!is_array($config['dhcpd'][$if]['staticmap'])) { $config['dhcpd'][$if]['staticmap'] = array(); } staticmaps_sort($if); $a_maps = &$config['dhcpd'][$if]['staticmap']; function is_inrange($test, $start, $end) { if ( (ip2long($test) < ip2long($end)) && (ip2long($test) > ip2long($start)) ) return true; else return false; } if ($_POST) { unset($input_errors); $pconfig = $_POST; /* input validation */ if ($_POST['enable']) { $reqdfields = explode(" ", "range_from range_to"); $reqdfieldsn = explode(",", "Range begin,Range end"); do_input_validation($_POST, $reqdfields, $reqdfieldsn, &$input_errors); foreach($a_maps as $mapent) { if(is_inrange($mapent['ipaddr'], $_POST['range_from'], $_POST['range_to'])) { $input_errors[] = "{$mapent['ipaddr']} is inside the range you specified."; } } if (($_POST['range_from'] && !is_ipaddr($_POST['range_from']))) { $input_errors[] = "A valid range must be specified."; } if (($_POST['range_to'] && !is_ipaddr($_POST['range_to']))) { $input_errors[] = "A valid range must be specified."; } if (($_POST['gateway'] && !is_ipaddr($_POST['gateway']))) { $input_errors[] = "A valid IP address must be specified for the gateway."; } if (($_POST['wins1'] && !is_ipaddr($_POST['wins1'])) || ($_POST['wins2'] && !is_ipaddr($_POST['wins2']))) { $input_errors[] = "A valid IP address must be specified for the primary/secondary WINS servers."; } if (($_POST['dns1'] && !is_ipaddr($_POST['dns1'])) || ($_POST['dns2'] && !is_ipaddr($_POST['dns2']))) { $input_errors[] = "A valid IP address must be specified for the primary/secondary DNS servers."; } if ($_POST['deftime'] && (!is_numeric($_POST['deftime']) || ($_POST['deftime'] < 60))) { $input_errors[] = "The default lease time must be at least 60 seconds."; } if ($_POST['maxtime'] && (!is_numeric($_POST['maxtime']) || ($_POST['maxtime'] < 60) || ($_POST['maxtime'] <= $_POST['deftime']))) { $input_errors[] = "The maximum lease time must be at least 60 seconds and higher than the default lease time."; } if (($_POST['ddnsdomain'] && !is_domain($_POST['ddnsdomain']))) { $input_errors[] = "A valid domain name must be specified for the dynamic DNS registration."; } if (($_POST['ntp1'] && !is_ipaddr($_POST['ntp1'])) || ($_POST['ntp2'] && !is_ipaddr($_POST['ntp2']))) { $input_errors[] = "A valid IP address must be specified for the primary/secondary NTP servers."; } if (($_POST['nextserver'] && !is_ipaddr($_POST['nextserver']))) { $input_errors[] = "A valid IP address must be specified for the network boot server."; } if (!$input_errors) { /* make sure the range lies within the current subnet */ $subnet_start = (ip2long($ifcfg['ipaddr']) & gen_subnet_mask_long($ifcfg['subnet'])); $subnet_end = (ip2long($ifcfg['ipaddr']) | (~gen_subnet_mask_long($ifcfg['subnet']))); if ((ip2long($_POST['range_from']) < $subnet_start) || (ip2long($_POST['range_from']) > $subnet_end) || (ip2long($_POST['range_to']) < $subnet_start) || (ip2long($_POST['range_to']) > $subnet_end)) { $input_errors[] = "The specified range lies outside of the current subnet."; } if (ip2long($_POST['range_from']) > ip2long($_POST['range_to'])) $input_errors[] = "The range is invalid (first element higher than second element)."; /* make sure that the DHCP Relay isn't enabled on this interface */ if (isset($config['dhcrelay'][$if]['enable'])) $input_errors[] = "You must disable the DHCP relay on the {$iflist[$if]} interface before enabling the DHCP server."; } } if (!$input_errors) { $config['dhcpd'][$if]['range']['from'] = $_POST['range_from']; $config['dhcpd'][$if]['range']['to'] = $_POST['range_to']; $config['dhcpd'][$if]['defaultleasetime'] = $_POST['deftime']; $config['dhcpd'][$if]['maxleasetime'] = $_POST['maxtime']; $config['dhcpd'][$if]['netmask'] = $_POST['netmask']; $previous = $config['dhcpd'][$if]['failover_peerip']; if($previous <> $_POST['failover_peerip']) { mwexec("rm -rf /var/dhcpd/var/db/*"); } $config['dhcpd'][$if]['failover_peerip'] = $_POST['failover_peerip']; unset($config['dhcpd'][$if]['winsserver']); if ($_POST['wins1']) $config['dhcpd'][$if]['winsserver'][] = $_POST['wins1']; if ($_POST['wins2']) $config['dhcpd'][$if]['winsserver'][] = $_POST['wins2']; unset($config['dhcpd'][$if]['dnsserver']); if ($_POST['dns1']) $config['dhcpd'][$if]['dnsserver'][] = $_POST['dns1']; if ($_POST['dns2']) $config['dhcpd'][$if]['dnsserver'][] = $_POST['dns2']; $config['dhcpd'][$if]['gateway'] = $_POST['gateway']; $config['dhcpd'][$if]['denyunknown'] = ($_POST['denyunknown']) ? true : false; $config['dhcpd'][$if]['enable'] = ($_POST['enable']) ? true : false; $config['dhcpd'][$if]['staticarp'] = ($_POST['staticarp']) ? true : false; $config['dhcpd'][$if]['ddnsdomain'] = $_POST['ddnsdomain']; $config['dhcpd'][$if]['ddnsupdate'] = ($_POST['ddnsupdate']) ? true : false; unset($config['dhcpd'][$if]['ntpserver']); if ($_POST['ntp1']) $config['dhcpd'][$if]['ntpserver'][] = $_POST['ntp1']; if ($_POST['ntp2']) $config['dhcpd'][$if]['ntpserver'][] = $_POST['ntp2']; $config['dhcpd'][$if]['netboot'] = ($_POST['netboot']) ? true : false; $config['dhcpd'][$if]['next-server'] = $_POST['nextserver']; $config['dhcpd'][$if]['filename'] = $_POST['filename']; $config['dhcpd'][$if]['rootpath'] = $_POST['rootpath']; write_config(); /* static arp configuration */ interfaces_staticarp_configure($if); $retval = 0; $retvaldhcp = 0; $retvaldns = 0; config_lock(); /* Stop DHCP so we can cleanup leases */ killbyname("dhcpd"); dhcp_clean_leases(); /* dnsmasq_configure calls dhcpd_configure */ /* no need to restart dhcpd twice */ if (isset($config['dnsmasq']['regdhcpstatic'])) { $retvaldns = services_dnsmasq_configure(); if ($retvaldns == 0) { if (file_exists($d_hostsdirty_path)) unlink($d_hostsdirty_path); if (file_exists($d_staticmapsdirty_path)) unlink($d_staticmapsdirty_path); } } else { $retvaldhcp = services_dhcpd_configure(); if ($retvaldhcp == 0) { if (file_exists($d_staticmapsdirty_path)) unlink($d_staticmapsdirty_path); } } config_unlock(); if($retvaldhcp == 1 || $retvaldns == 1) $retval = 1; $savemsg = get_std_save_message($retval); } } if ($_GET['act'] == "del") { if ($a_maps[$_GET['id']]) { unset($a_maps[$_GET['id']]); write_config(); if(isset($config['dhcpd'][$if]['enable'])) { touch($d_staticmapsdirty_path); if (isset($config['dnsmasq']['regdhcpstatic'])) touch($d_hostsdirty_path); } header("Location: services_dhcp.php?if={$if}"); exit; } } $pgtitle = "Services: DHCP server"; include("head.inc"); ?>

"; echo ""; exit; } ?>

You must apply the changes in order for them to take effect.");?>
$ifname) { if ($ifent == $if) $active = true; else $active = false; $tab_array[] = array($ifname, $active, "services_dhcp.php?if={$ifent}"); } display_top_tabs($tab_array); ?>
  onClick="enable_change(false)"> Enable DHCP server on interface
  > Deny unknown clients
If this is checked, only the clients defined below will get DHCP leases from this server.
Subnet
Subnet mask
Available range -
Subnet Mask
Range  to 
WINS servers
DNS servers

NOTE: leave blank to use the system default DNS servers - this interface's IP if DNS forwarder is enabled, otherwise the servers configured on the General page.
Gateway
The default is to use the IP on this interface of the firewall as the gateway. Specify an alternate gateway here if this is not the correct gateway for your network.
Default lease time seconds
This is used for clients that do not ask for a specific expiration time.
The default is 7200 seconds.
Maximum lease time seconds
This is the maximum lease time for clients that ask for a specific expiration time.
The default is 86400 seconds.
Failover peer IP:
Leave blank to disable. Enter the REAL address of the other machine. Machines must be using CARP.
Static ARP
Enable Static ARP entries
  Note: Only the machines listed below will be able to communicate with the firewall on this NIC.
Dynamic DNS
- Show Dynamic DNS
NTP servers
- Show NTP configuration
Enable Network booting
- Show Network booting
 
 

Note:
The DNS servers entered in System: General setup (or the DNS forwarder, if enabled)
will be assigned to clients by the DHCP server.

The DHCP lease table can be viewed on the Status: DHCP leases page.

"" or $mapent['ipaddr'] <> ""): ?>
MAC address IP address Hostname Description