Home | History | Annotate | Line # | Download | only in dist
mux.c revision 1.9
      1  1.9  christos /*	$NetBSD: mux.c,v 1.9 2013/11/08 19:18:25 christos Exp $	*/
      2  1.9  christos /* $OpenBSD: mux.c,v 1.44 2013/07/12 00:19:58 djm Exp $ */
      3  1.1  christos /*
      4  1.1  christos  * Copyright (c) 2002-2008 Damien Miller <djm (at) openbsd.org>
      5  1.1  christos  *
      6  1.1  christos  * Permission to use, copy, modify, and distribute this software for any
      7  1.1  christos  * purpose with or without fee is hereby granted, provided that the above
      8  1.1  christos  * copyright notice and this permission notice appear in all copies.
      9  1.1  christos  *
     10  1.1  christos  * THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES
     11  1.1  christos  * WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF
     12  1.1  christos  * MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR
     13  1.1  christos  * ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
     14  1.1  christos  * WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
     15  1.1  christos  * ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
     16  1.1  christos  * OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
     17  1.1  christos  */
     18  1.1  christos 
     19  1.1  christos /* ssh session multiplexing support */
     20  1.1  christos 
     21  1.1  christos /*
     22  1.1  christos  * TODO:
     23  1.3      adam  *   - Better signalling from master to slave, especially passing of
     24  1.1  christos  *      error messages
     25  1.3      adam  *   - Better fall-back from mux slave error to new connection.
     26  1.3      adam  *   - ExitOnForwardingFailure
     27  1.3      adam  *   - Maybe extension mechanisms for multi-X11/multi-agent forwarding
     28  1.3      adam  *   - Support ~^Z in mux slaves.
     29  1.3      adam  *   - Inspect or control sessions in master.
     30  1.3      adam  *   - If we ever support the "signal" channel request, send signals on
     31  1.3      adam  *     sessions in master.
     32  1.1  christos  */
     33  1.1  christos 
     34  1.2  christos #include "includes.h"
     35  1.9  christos __RCSID("$NetBSD: mux.c,v 1.9 2013/11/08 19:18:25 christos Exp $");
     36  1.1  christos #include <sys/types.h>
     37  1.1  christos #include <sys/param.h>
     38  1.1  christos #include <sys/queue.h>
     39  1.1  christos #include <sys/stat.h>
     40  1.1  christos #include <sys/socket.h>
     41  1.1  christos #include <sys/un.h>
     42  1.1  christos 
     43  1.1  christos #include <errno.h>
     44  1.1  christos #include <fcntl.h>
     45  1.3      adam #include <poll.h>
     46  1.1  christos #include <signal.h>
     47  1.1  christos #include <stdarg.h>
     48  1.1  christos #include <stddef.h>
     49  1.1  christos #include <stdlib.h>
     50  1.1  christos #include <stdio.h>
     51  1.1  christos #include <string.h>
     52  1.1  christos #include <unistd.h>
     53  1.1  christos #include <util.h>
     54  1.1  christos #include <paths.h>
     55  1.1  christos 
     56  1.3      adam #include "atomicio.h"
     57  1.1  christos #include "xmalloc.h"
     58  1.1  christos #include "log.h"
     59  1.1  christos #include "ssh.h"
     60  1.3      adam #include "ssh2.h"
     61  1.1  christos #include "pathnames.h"
     62  1.1  christos #include "misc.h"
     63  1.1  christos #include "match.h"
     64  1.1  christos #include "buffer.h"
     65  1.1  christos #include "channels.h"
     66  1.1  christos #include "msg.h"
     67  1.1  christos #include "packet.h"
     68  1.1  christos #include "monitor_fdpass.h"
     69  1.1  christos #include "sshpty.h"
     70  1.1  christos #include "key.h"
     71  1.1  christos #include "readconf.h"
     72  1.1  christos #include "clientloop.h"
     73  1.1  christos 
     74  1.1  christos /* from ssh.c */
     75  1.1  christos extern int tty_flag;
     76  1.1  christos extern Options options;
     77  1.1  christos extern int stdin_null_flag;
     78  1.1  christos extern char *host;
     79  1.3      adam extern int subsystem_flag;
     80  1.1  christos extern Buffer command;
     81  1.3      adam extern volatile sig_atomic_t quit_pending;
     82  1.3      adam extern char *stdio_forward_host;
     83  1.3      adam extern int stdio_forward_port;
     84  1.1  christos 
     85  1.1  christos /* Context for session open confirmation callback */
     86  1.1  christos struct mux_session_confirm_ctx {
     87  1.3      adam 	u_int want_tty;
     88  1.3      adam 	u_int want_subsys;
     89  1.3      adam 	u_int want_x_fwd;
     90  1.3      adam 	u_int want_agent_fwd;
     91  1.1  christos 	Buffer cmd;
     92  1.1  christos 	char *term;
     93  1.1  christos 	struct termios tio;
     94  1.1  christos 	char **env;
     95  1.3      adam 	u_int rid;
     96  1.3      adam };
     97  1.3      adam 
     98  1.3      adam /* Context for global channel callback */
     99  1.3      adam struct mux_channel_confirm_ctx {
    100  1.3      adam 	u_int cid;	/* channel id */
    101  1.3      adam 	u_int rid;	/* request id */
    102  1.3      adam 	int fid;	/* forward id */
    103  1.1  christos };
    104  1.1  christos 
    105  1.1  christos /* fd to control socket */
    106  1.1  christos int muxserver_sock = -1;
    107  1.1  christos 
    108  1.3      adam /* client request id */
    109  1.3      adam u_int muxclient_request_id = 0;
    110  1.3      adam 
    111  1.1  christos /* Multiplexing control command */
    112  1.1  christos u_int muxclient_command = 0;
    113  1.1  christos 
    114  1.1  christos /* Set when signalled. */
    115  1.1  christos static volatile sig_atomic_t muxclient_terminate = 0;
    116  1.1  christos 
    117  1.1  christos /* PID of multiplex server */
    118  1.1  christos static u_int muxserver_pid = 0;
    119  1.1  christos 
    120  1.3      adam static Channel *mux_listener_channel = NULL;
    121  1.3      adam 
    122  1.3      adam struct mux_master_state {
    123  1.3      adam 	int hello_rcvd;
    124  1.3      adam };
    125  1.1  christos 
    126  1.3      adam /* mux protocol messages */
    127  1.3      adam #define MUX_MSG_HELLO		0x00000001
    128  1.3      adam #define MUX_C_NEW_SESSION	0x10000002
    129  1.3      adam #define MUX_C_ALIVE_CHECK	0x10000004
    130  1.3      adam #define MUX_C_TERMINATE		0x10000005
    131  1.3      adam #define MUX_C_OPEN_FWD		0x10000006
    132  1.3      adam #define MUX_C_CLOSE_FWD		0x10000007
    133  1.3      adam #define MUX_C_NEW_STDIO_FWD	0x10000008
    134  1.5  christos #define MUX_C_STOP_LISTENING	0x10000009
    135  1.3      adam #define MUX_S_OK		0x80000001
    136  1.3      adam #define MUX_S_PERMISSION_DENIED	0x80000002
    137  1.3      adam #define MUX_S_FAILURE		0x80000003
    138  1.3      adam #define MUX_S_EXIT_MESSAGE	0x80000004
    139  1.3      adam #define MUX_S_ALIVE		0x80000005
    140  1.3      adam #define MUX_S_SESSION_OPENED	0x80000006
    141  1.3      adam #define MUX_S_REMOTE_PORT	0x80000007
    142  1.5  christos #define MUX_S_TTY_ALLOC_FAIL	0x80000008
    143  1.3      adam 
    144  1.3      adam /* type codes for MUX_C_OPEN_FWD and MUX_C_CLOSE_FWD */
    145  1.3      adam #define MUX_FWD_LOCAL   1
    146  1.3      adam #define MUX_FWD_REMOTE  2
    147  1.3      adam #define MUX_FWD_DYNAMIC 3
    148  1.3      adam 
    149  1.3      adam static void mux_session_confirm(int, int, void *);
    150  1.3      adam 
    151  1.3      adam static int process_mux_master_hello(u_int, Channel *, Buffer *, Buffer *);
    152  1.3      adam static int process_mux_new_session(u_int, Channel *, Buffer *, Buffer *);
    153  1.3      adam static int process_mux_alive_check(u_int, Channel *, Buffer *, Buffer *);
    154  1.3      adam static int process_mux_terminate(u_int, Channel *, Buffer *, Buffer *);
    155  1.3      adam static int process_mux_open_fwd(u_int, Channel *, Buffer *, Buffer *);
    156  1.3      adam static int process_mux_close_fwd(u_int, Channel *, Buffer *, Buffer *);
    157  1.3      adam static int process_mux_stdio_fwd(u_int, Channel *, Buffer *, Buffer *);
    158  1.5  christos static int process_mux_stop_listening(u_int, Channel *, Buffer *, Buffer *);
    159  1.3      adam 
    160  1.3      adam static const struct {
    161  1.3      adam 	u_int type;
    162  1.3      adam 	int (*handler)(u_int, Channel *, Buffer *, Buffer *);
    163  1.3      adam } mux_master_handlers[] = {
    164  1.3      adam 	{ MUX_MSG_HELLO, process_mux_master_hello },
    165  1.3      adam 	{ MUX_C_NEW_SESSION, process_mux_new_session },
    166  1.3      adam 	{ MUX_C_ALIVE_CHECK, process_mux_alive_check },
    167  1.3      adam 	{ MUX_C_TERMINATE, process_mux_terminate },
    168  1.3      adam 	{ MUX_C_OPEN_FWD, process_mux_open_fwd },
    169  1.3      adam 	{ MUX_C_CLOSE_FWD, process_mux_close_fwd },
    170  1.3      adam 	{ MUX_C_NEW_STDIO_FWD, process_mux_stdio_fwd },
    171  1.5  christos 	{ MUX_C_STOP_LISTENING, process_mux_stop_listening },
    172  1.3      adam 	{ 0, NULL }
    173  1.3      adam };
    174  1.1  christos 
    175  1.3      adam /* Cleanup callback fired on closure of mux slave _session_ channel */
    176  1.3      adam /* ARGSUSED */
    177  1.9  christos static void
    178  1.3      adam mux_master_session_cleanup_cb(int cid, void *unused)
    179  1.1  christos {
    180  1.3      adam 	Channel *cc, *c = channel_by_id(cid);
    181  1.1  christos 
    182  1.3      adam 	debug3("%s: entering for channel %d", __func__, cid);
    183  1.3      adam 	if (c == NULL)
    184  1.3      adam 		fatal("%s: channel_by_id(%i) == NULL", __func__, cid);
    185  1.3      adam 	if (c->ctl_chan != -1) {
    186  1.3      adam 		if ((cc = channel_by_id(c->ctl_chan)) == NULL)
    187  1.3      adam 			fatal("%s: channel %d missing control channel %d",
    188  1.3      adam 			    __func__, c->self, c->ctl_chan);
    189  1.3      adam 		c->ctl_chan = -1;
    190  1.3      adam 		cc->remote_id = -1;
    191  1.3      adam 		chan_rcvd_oclose(cc);
    192  1.1  christos 	}
    193  1.3      adam 	channel_cancel_cleanup(c->self);
    194  1.1  christos }
    195  1.1  christos 
    196  1.3      adam /* Cleanup callback fired on closure of mux slave _control_ channel */
    197  1.3      adam /* ARGSUSED */
    198  1.1  christos static void
    199  1.3      adam mux_master_control_cleanup_cb(int cid, void *unused)
    200  1.1  christos {
    201  1.3      adam 	Channel *sc, *c = channel_by_id(cid);
    202  1.1  christos 
    203  1.3      adam 	debug3("%s: entering for channel %d", __func__, cid);
    204  1.3      adam 	if (c == NULL)
    205  1.3      adam 		fatal("%s: channel_by_id(%i) == NULL", __func__, cid);
    206  1.3      adam 	if (c->remote_id != -1) {
    207  1.3      adam 		if ((sc = channel_by_id(c->remote_id)) == NULL)
    208  1.3      adam 			fatal("%s: channel %d missing session channel %d",
    209  1.3      adam 			    __func__, c->self, c->remote_id);
    210  1.3      adam 		c->remote_id = -1;
    211  1.3      adam 		sc->ctl_chan = -1;
    212  1.9  christos 		if (sc->type != SSH_CHANNEL_OPEN &&
    213  1.9  christos 		    sc->type != SSH_CHANNEL_OPENING) {
    214  1.3      adam 			debug2("%s: channel %d: not open", __func__, sc->self);
    215  1.3      adam 			chan_mark_dead(sc);
    216  1.3      adam 		} else {
    217  1.3      adam 			if (sc->istate == CHAN_INPUT_OPEN)
    218  1.3      adam 				chan_read_failed(sc);
    219  1.3      adam 			if (sc->ostate == CHAN_OUTPUT_OPEN)
    220  1.3      adam 				chan_write_failed(sc);
    221  1.3      adam 		}
    222  1.1  christos 	}
    223  1.3      adam 	channel_cancel_cleanup(c->self);
    224  1.1  christos }
    225  1.1  christos 
    226  1.3      adam /* Check mux client environment variables before passing them to mux master. */
    227  1.3      adam static int
    228  1.3      adam env_permitted(char *env)
    229  1.1  christos {
    230  1.3      adam 	int i, ret;
    231  1.3      adam 	char name[1024], *cp;
    232  1.1  christos 
    233  1.3      adam 	if ((cp = strchr(env, '=')) == NULL || cp == env)
    234  1.1  christos 		return 0;
    235  1.3      adam 	ret = snprintf(name, sizeof(name), "%.*s", (int)(cp - env), env);
    236  1.3      adam 	if (ret <= 0 || (size_t)ret >= sizeof(name)) {
    237  1.3      adam 		error("env_permitted: name '%.100s...' too long", env);
    238  1.1  christos 		return 0;
    239  1.1  christos 	}
    240  1.1  christos 
    241  1.3      adam 	for (i = 0; i < options.num_send_env; i++)
    242  1.3      adam 		if (match_pattern(name, options.send_env[i]))
    243  1.3      adam 			return 1;
    244  1.1  christos 
    245  1.3      adam 	return 0;
    246  1.3      adam }
    247  1.1  christos 
    248  1.3      adam /* Mux master protocol message handlers */
    249  1.1  christos 
    250  1.3      adam static int
    251  1.3      adam process_mux_master_hello(u_int rid, Channel *c, Buffer *m, Buffer *r)
    252  1.3      adam {
    253  1.3      adam 	u_int ver;
    254  1.3      adam 	struct mux_master_state *state = (struct mux_master_state *)c->mux_ctx;
    255  1.1  christos 
    256  1.3      adam 	if (state == NULL)
    257  1.3      adam 		fatal("%s: channel %d: c->mux_ctx == NULL", __func__, c->self);
    258  1.3      adam 	if (state->hello_rcvd) {
    259  1.3      adam 		error("%s: HELLO received twice", __func__);
    260  1.3      adam 		return -1;
    261  1.3      adam 	}
    262  1.3      adam 	if (buffer_get_int_ret(&ver, m) != 0) {
    263  1.3      adam  malf:
    264  1.3      adam 		error("%s: malformed message", __func__);
    265  1.3      adam 		return -1;
    266  1.3      adam 	}
    267  1.3      adam 	if (ver != SSHMUX_VER) {
    268  1.3      adam 		error("Unsupported multiplexing protocol version %d "
    269  1.3      adam 		    "(expected %d)", ver, SSHMUX_VER);
    270  1.3      adam 		return -1;
    271  1.3      adam 	}
    272  1.3      adam 	debug2("%s: channel %d slave version %u", __func__, c->self, ver);
    273  1.3      adam 
    274  1.3      adam 	/* No extensions are presently defined */
    275  1.3      adam 	while (buffer_len(m) > 0) {
    276  1.3      adam 		char *name = buffer_get_string_ret(m, NULL);
    277  1.3      adam 		char *value = buffer_get_string_ret(m, NULL);
    278  1.3      adam 
    279  1.3      adam 		if (name == NULL || value == NULL) {
    280  1.9  christos 			free(name);
    281  1.9  christos 			free(value);
    282  1.3      adam 			goto malf;
    283  1.1  christos 		}
    284  1.3      adam 		debug2("Unrecognised slave extension \"%s\"", name);
    285  1.9  christos 		free(name);
    286  1.9  christos 		free(value);
    287  1.1  christos 	}
    288  1.3      adam 	state->hello_rcvd = 1;
    289  1.3      adam 	return 0;
    290  1.3      adam }
    291  1.3      adam 
    292  1.3      adam static int
    293  1.3      adam process_mux_new_session(u_int rid, Channel *c, Buffer *m, Buffer *r)
    294  1.3      adam {
    295  1.3      adam 	Channel *nc;
    296  1.3      adam 	struct mux_session_confirm_ctx *cctx;
    297  1.3      adam 	char *reserved, *cmd, *cp;
    298  1.3      adam 	u_int i, j, len, env_len, escape_char, window, packetmax;
    299  1.3      adam 	int new_fd[3];
    300  1.1  christos 
    301  1.1  christos 	/* Reply for SSHMUX_COMMAND_OPEN */
    302  1.3      adam 	cctx = xcalloc(1, sizeof(*cctx));
    303  1.3      adam 	cctx->term = NULL;
    304  1.3      adam 	cctx->rid = rid;
    305  1.3      adam 	cmd = reserved = NULL;
    306  1.7  christos 	cctx->env = NULL;
    307  1.7  christos 	env_len = 0;
    308  1.3      adam 	if ((reserved = buffer_get_string_ret(m, NULL)) == NULL ||
    309  1.3      adam 	    buffer_get_int_ret(&cctx->want_tty, m) != 0 ||
    310  1.3      adam 	    buffer_get_int_ret(&cctx->want_x_fwd, m) != 0 ||
    311  1.3      adam 	    buffer_get_int_ret(&cctx->want_agent_fwd, m) != 0 ||
    312  1.3      adam 	    buffer_get_int_ret(&cctx->want_subsys, m) != 0 ||
    313  1.3      adam 	    buffer_get_int_ret(&escape_char, m) != 0 ||
    314  1.3      adam 	    (cctx->term = buffer_get_string_ret(m, &len)) == NULL ||
    315  1.3      adam 	    (cmd = buffer_get_string_ret(m, &len)) == NULL) {
    316  1.3      adam  malf:
    317  1.9  christos 		free(cmd);
    318  1.9  christos 		free(reserved);
    319  1.7  christos 		for (j = 0; j < env_len; j++)
    320  1.9  christos 			free(cctx->env[j]);
    321  1.9  christos 		free(cctx->env);
    322  1.9  christos 		free(cctx->term);
    323  1.9  christos 		free(cctx);
    324  1.3      adam 		error("%s: malformed message", __func__);
    325  1.3      adam 		return -1;
    326  1.1  christos 	}
    327  1.9  christos 	free(reserved);
    328  1.3      adam 	reserved = NULL;
    329  1.1  christos 
    330  1.3      adam 	while (buffer_len(m) > 0) {
    331  1.3      adam #define MUX_MAX_ENV_VARS	4096
    332  1.6  christos 		if ((cp = buffer_get_string_ret(m, &len)) == NULL)
    333  1.3      adam 			goto malf;
    334  1.3      adam 		if (!env_permitted(cp)) {
    335  1.9  christos 			free(cp);
    336  1.3      adam 			continue;
    337  1.3      adam 		}
    338  1.3      adam 		cctx->env = xrealloc(cctx->env, env_len + 2,
    339  1.3      adam 		    sizeof(*cctx->env));
    340  1.3      adam 		cctx->env[env_len++] = cp;
    341  1.3      adam 		cctx->env[env_len] = NULL;
    342  1.3      adam 		if (env_len > MUX_MAX_ENV_VARS) {
    343  1.3      adam 			error(">%d environment variables received, ignoring "
    344  1.3      adam 			    "additional", MUX_MAX_ENV_VARS);
    345  1.3      adam 			break;
    346  1.3      adam 		}
    347  1.1  christos 	}
    348  1.1  christos 
    349  1.3      adam 	debug2("%s: channel %d: request tty %d, X %d, agent %d, subsys %d, "
    350  1.3      adam 	    "term \"%s\", cmd \"%s\", env %u", __func__, c->self,
    351  1.3      adam 	    cctx->want_tty, cctx->want_x_fwd, cctx->want_agent_fwd,
    352  1.3      adam 	    cctx->want_subsys, cctx->term, cmd, env_len);
    353  1.1  christos 
    354  1.1  christos 	buffer_init(&cctx->cmd);
    355  1.1  christos 	buffer_append(&cctx->cmd, cmd, strlen(cmd));
    356  1.9  christos 	free(cmd);
    357  1.3      adam 	cmd = NULL;
    358  1.1  christos 
    359  1.1  christos 	/* Gather fds from client */
    360  1.1  christos 	for(i = 0; i < 3; i++) {
    361  1.3      adam 		if ((new_fd[i] = mm_receive_fd(c->sock)) == -1) {
    362  1.1  christos 			error("%s: failed to receive fd %d from slave",
    363  1.1  christos 			    __func__, i);
    364  1.1  christos 			for (j = 0; j < i; j++)
    365  1.1  christos 				close(new_fd[j]);
    366  1.1  christos 			for (j = 0; j < env_len; j++)
    367  1.9  christos 				free(cctx->env[j]);
    368  1.9  christos 			free(cctx->env);
    369  1.9  christos 			free(cctx->term);
    370  1.1  christos 			buffer_free(&cctx->cmd);
    371  1.9  christos 			free(cctx);
    372  1.3      adam 
    373  1.3      adam 			/* prepare reply */
    374  1.3      adam 			buffer_put_int(r, MUX_S_FAILURE);
    375  1.3      adam 			buffer_put_int(r, rid);
    376  1.3      adam 			buffer_put_cstring(r,
    377  1.3      adam 			    "did not receive file descriptors");
    378  1.3      adam 			return -1;
    379  1.1  christos 		}
    380  1.1  christos 	}
    381  1.1  christos 
    382  1.3      adam 	debug3("%s: got fds stdin %d, stdout %d, stderr %d", __func__,
    383  1.1  christos 	    new_fd[0], new_fd[1], new_fd[2]);
    384  1.1  christos 
    385  1.3      adam 	/* XXX support multiple child sessions in future */
    386  1.3      adam 	if (c->remote_id != -1) {
    387  1.3      adam 		debug2("%s: session already open", __func__);
    388  1.3      adam 		/* prepare reply */
    389  1.3      adam 		buffer_put_int(r, MUX_S_FAILURE);
    390  1.3      adam 		buffer_put_int(r, rid);
    391  1.3      adam 		buffer_put_cstring(r, "Multiple sessions not supported");
    392  1.3      adam  cleanup:
    393  1.1  christos 		close(new_fd[0]);
    394  1.1  christos 		close(new_fd[1]);
    395  1.1  christos 		close(new_fd[2]);
    396  1.9  christos 		free(cctx->term);
    397  1.1  christos 		if (env_len != 0) {
    398  1.1  christos 			for (i = 0; i < env_len; i++)
    399  1.9  christos 				free(cctx->env[i]);
    400  1.9  christos 			free(cctx->env);
    401  1.1  christos 		}
    402  1.3      adam 		buffer_free(&cctx->cmd);
    403  1.9  christos 		free(cctx);
    404  1.1  christos 		return 0;
    405  1.1  christos 	}
    406  1.3      adam 
    407  1.3      adam 	if (options.control_master == SSHCTL_MASTER_ASK ||
    408  1.3      adam 	    options.control_master == SSHCTL_MASTER_AUTO_ASK) {
    409  1.3      adam 		if (!ask_permission("Allow shared connection to %s? ", host)) {
    410  1.3      adam 			debug2("%s: session refused by user", __func__);
    411  1.3      adam 			/* prepare reply */
    412  1.3      adam 			buffer_put_int(r, MUX_S_PERMISSION_DENIED);
    413  1.3      adam 			buffer_put_int(r, rid);
    414  1.3      adam 			buffer_put_cstring(r, "Permission denied");
    415  1.3      adam 			goto cleanup;
    416  1.3      adam 		}
    417  1.3      adam 	}
    418  1.3      adam 
    419  1.3      adam 	/* Try to pick up ttymodes from client before it goes raw */
    420  1.3      adam 	if (cctx->want_tty && tcgetattr(new_fd[0], &cctx->tio) == -1)
    421  1.3      adam 		error("%s: tcgetattr: %s", __func__, strerror(errno));
    422  1.1  christos 
    423  1.1  christos 	/* enable nonblocking unless tty */
    424  1.1  christos 	if (!isatty(new_fd[0]))
    425  1.1  christos 		set_nonblock(new_fd[0]);
    426  1.1  christos 	if (!isatty(new_fd[1]))
    427  1.1  christos 		set_nonblock(new_fd[1]);
    428  1.1  christos 	if (!isatty(new_fd[2]))
    429  1.1  christos 		set_nonblock(new_fd[2]);
    430  1.1  christos 
    431  1.1  christos 	window = CHAN_SES_WINDOW_DEFAULT;
    432  1.1  christos 	packetmax = CHAN_SES_PACKET_DEFAULT;
    433  1.1  christos 	if (cctx->want_tty) {
    434  1.1  christos 		window >>= 1;
    435  1.1  christos 		packetmax >>= 1;
    436  1.1  christos 	}
    437  1.3      adam 
    438  1.3      adam 	nc = channel_new("session", SSH_CHANNEL_OPENING,
    439  1.1  christos 	    new_fd[0], new_fd[1], new_fd[2], window, packetmax,
    440  1.1  christos 	    CHAN_EXTENDED_WRITE, "client-session", /*nonblock*/0);
    441  1.1  christos 
    442  1.3      adam 	nc->ctl_chan = c->self;		/* link session -> control channel */
    443  1.3      adam 	c->remote_id = nc->self; 	/* link control -> session channel */
    444  1.3      adam 
    445  1.1  christos 	if (cctx->want_tty && escape_char != 0xffffffff) {
    446  1.3      adam 		channel_register_filter(nc->self,
    447  1.1  christos 		    client_simple_escape_filter, NULL,
    448  1.1  christos 		    client_filter_cleanup,
    449  1.1  christos 		    client_new_escape_filter_ctx((int)escape_char));
    450  1.1  christos 	}
    451  1.1  christos 
    452  1.3      adam 	debug2("%s: channel_new: %d linked to control channel %d",
    453  1.3      adam 	    __func__, nc->self, nc->ctl_chan);
    454  1.3      adam 
    455  1.3      adam 	channel_send_open(nc->self);
    456  1.3      adam 	channel_register_open_confirm(nc->self, mux_session_confirm, cctx);
    457  1.3      adam 	c->mux_pause = 1; /* stop handling messages until open_confirm done */
    458  1.3      adam 	channel_register_cleanup(nc->self, mux_master_session_cleanup_cb, 1);
    459  1.1  christos 
    460  1.3      adam 	/* reply is deferred, sent by mux_session_confirm */
    461  1.1  christos 	return 0;
    462  1.1  christos }
    463  1.1  christos 
    464  1.3      adam static int
    465  1.3      adam process_mux_alive_check(u_int rid, Channel *c, Buffer *m, Buffer *r)
    466  1.1  christos {
    467  1.3      adam 	debug2("%s: channel %d: alive check", __func__, c->self);
    468  1.1  christos 
    469  1.3      adam 	/* prepare reply */
    470  1.3      adam 	buffer_put_int(r, MUX_S_ALIVE);
    471  1.3      adam 	buffer_put_int(r, rid);
    472  1.3      adam 	buffer_put_int(r, (u_int)getpid());
    473  1.1  christos 
    474  1.3      adam 	return 0;
    475  1.1  christos }
    476  1.1  christos 
    477  1.1  christos static int
    478  1.3      adam process_mux_terminate(u_int rid, Channel *c, Buffer *m, Buffer *r)
    479  1.1  christos {
    480  1.3      adam 	debug2("%s: channel %d: terminate request", __func__, c->self);
    481  1.1  christos 
    482  1.3      adam 	if (options.control_master == SSHCTL_MASTER_ASK ||
    483  1.3      adam 	    options.control_master == SSHCTL_MASTER_AUTO_ASK) {
    484  1.3      adam 		if (!ask_permission("Terminate shared connection to %s? ",
    485  1.3      adam 		    host)) {
    486  1.3      adam 			debug2("%s: termination refused by user", __func__);
    487  1.3      adam 			buffer_put_int(r, MUX_S_PERMISSION_DENIED);
    488  1.3      adam 			buffer_put_int(r, rid);
    489  1.3      adam 			buffer_put_cstring(r, "Permission denied");
    490  1.3      adam 			return 0;
    491  1.3      adam 		}
    492  1.3      adam 	}
    493  1.1  christos 
    494  1.3      adam 	quit_pending = 1;
    495  1.3      adam 	buffer_put_int(r, MUX_S_OK);
    496  1.3      adam 	buffer_put_int(r, rid);
    497  1.3      adam 	/* XXX exit happens too soon - message never makes it to client */
    498  1.3      adam 	return 0;
    499  1.1  christos }
    500  1.1  christos 
    501  1.3      adam static char *
    502  1.3      adam format_forward(u_int ftype, Forward *fwd)
    503  1.1  christos {
    504  1.3      adam 	char *ret;
    505  1.1  christos 
    506  1.3      adam 	switch (ftype) {
    507  1.3      adam 	case MUX_FWD_LOCAL:
    508  1.3      adam 		xasprintf(&ret, "local forward %.200s:%d -> %.200s:%d",
    509  1.3      adam 		    (fwd->listen_host == NULL) ?
    510  1.3      adam 		    (options.gateway_ports ? "*" : "LOCALHOST") :
    511  1.3      adam 		    fwd->listen_host, fwd->listen_port,
    512  1.3      adam 		    fwd->connect_host, fwd->connect_port);
    513  1.3      adam 		break;
    514  1.3      adam 	case MUX_FWD_DYNAMIC:
    515  1.3      adam 		xasprintf(&ret, "dynamic forward %.200s:%d -> *",
    516  1.3      adam 		    (fwd->listen_host == NULL) ?
    517  1.3      adam 		    (options.gateway_ports ? "*" : "LOCALHOST") :
    518  1.3      adam 		     fwd->listen_host, fwd->listen_port);
    519  1.3      adam 		break;
    520  1.3      adam 	case MUX_FWD_REMOTE:
    521  1.3      adam 		xasprintf(&ret, "remote forward %.200s:%d -> %.200s:%d",
    522  1.3      adam 		    (fwd->listen_host == NULL) ?
    523  1.3      adam 		    "LOCALHOST" : fwd->listen_host,
    524  1.3      adam 		    fwd->listen_port,
    525  1.3      adam 		    fwd->connect_host, fwd->connect_port);
    526  1.1  christos 		break;
    527  1.1  christos 	default:
    528  1.3      adam 		fatal("%s: unknown forward type %u", __func__, ftype);
    529  1.1  christos 	}
    530  1.3      adam 	return ret;
    531  1.3      adam }
    532  1.1  christos 
    533  1.3      adam static int
    534  1.3      adam compare_host(const char *a, const char *b)
    535  1.3      adam {
    536  1.3      adam 	if (a == NULL && b == NULL)
    537  1.3      adam 		return 1;
    538  1.3      adam 	if (a == NULL || b == NULL)
    539  1.3      adam 		return 0;
    540  1.3      adam 	return strcmp(a, b) == 0;
    541  1.3      adam }
    542  1.3      adam 
    543  1.3      adam static int
    544  1.3      adam compare_forward(Forward *a, Forward *b)
    545  1.3      adam {
    546  1.3      adam 	if (!compare_host(a->listen_host, b->listen_host))
    547  1.3      adam 		return 0;
    548  1.3      adam 	if (a->listen_port != b->listen_port)
    549  1.3      adam 		return 0;
    550  1.3      adam 	if (!compare_host(a->connect_host, b->connect_host))
    551  1.3      adam 		return 0;
    552  1.3      adam 	if (a->connect_port != b->connect_port)
    553  1.3      adam 		return 0;
    554  1.1  christos 
    555  1.3      adam 	return 1;
    556  1.3      adam }
    557  1.1  christos 
    558  1.3      adam static void
    559  1.3      adam mux_confirm_remote_forward(int type, u_int32_t seq, void *ctxt)
    560  1.3      adam {
    561  1.3      adam 	struct mux_channel_confirm_ctx *fctx = ctxt;
    562  1.3      adam 	char *failmsg = NULL;
    563  1.3      adam 	Forward *rfwd;
    564  1.3      adam 	Channel *c;
    565  1.3      adam 	Buffer out;
    566  1.1  christos 
    567  1.3      adam 	if ((c = channel_by_id(fctx->cid)) == NULL) {
    568  1.3      adam 		/* no channel for reply */
    569  1.3      adam 		error("%s: unknown channel", __func__);
    570  1.3      adam 		return;
    571  1.3      adam 	}
    572  1.3      adam 	buffer_init(&out);
    573  1.3      adam 	if (fctx->fid >= options.num_remote_forwards) {
    574  1.3      adam 		xasprintf(&failmsg, "unknown forwarding id %d", fctx->fid);
    575  1.3      adam 		goto fail;
    576  1.3      adam 	}
    577  1.3      adam 	rfwd = &options.remote_forwards[fctx->fid];
    578  1.3      adam 	debug("%s: %s for: listen %d, connect %s:%d", __func__,
    579  1.3      adam 	    type == SSH2_MSG_REQUEST_SUCCESS ? "success" : "failure",
    580  1.3      adam 	    rfwd->listen_port, rfwd->connect_host, rfwd->connect_port);
    581  1.3      adam 	if (type == SSH2_MSG_REQUEST_SUCCESS) {
    582  1.3      adam 		if (rfwd->listen_port == 0) {
    583  1.3      adam 			rfwd->allocated_port = packet_get_int();
    584  1.3      adam 			logit("Allocated port %u for mux remote forward"
    585  1.3      adam 			    " to %s:%d", rfwd->allocated_port,
    586  1.3      adam 			    rfwd->connect_host, rfwd->connect_port);
    587  1.3      adam 			buffer_put_int(&out, MUX_S_REMOTE_PORT);
    588  1.3      adam 			buffer_put_int(&out, fctx->rid);
    589  1.3      adam 			buffer_put_int(&out, rfwd->allocated_port);
    590  1.6  christos 			channel_update_permitted_opens(rfwd->handle,
    591  1.6  christos 			   rfwd->allocated_port);
    592  1.3      adam 		} else {
    593  1.3      adam 			buffer_put_int(&out, MUX_S_OK);
    594  1.3      adam 			buffer_put_int(&out, fctx->rid);
    595  1.3      adam 		}
    596  1.3      adam 		goto out;
    597  1.3      adam 	} else {
    598  1.6  christos 		if (rfwd->listen_port == 0)
    599  1.6  christos 			channel_update_permitted_opens(rfwd->handle, -1);
    600  1.3      adam 		xasprintf(&failmsg, "remote port forwarding failed for "
    601  1.3      adam 		    "listen port %d", rfwd->listen_port);
    602  1.3      adam 	}
    603  1.3      adam  fail:
    604  1.3      adam 	error("%s: %s", __func__, failmsg);
    605  1.3      adam 	buffer_put_int(&out, MUX_S_FAILURE);
    606  1.3      adam 	buffer_put_int(&out, fctx->rid);
    607  1.3      adam 	buffer_put_cstring(&out, failmsg);
    608  1.9  christos 	free(failmsg);
    609  1.3      adam  out:
    610  1.3      adam 	buffer_put_string(&c->output, buffer_ptr(&out), buffer_len(&out));
    611  1.3      adam 	buffer_free(&out);
    612  1.3      adam 	if (c->mux_pause <= 0)
    613  1.3      adam 		fatal("%s: mux_pause %d", __func__, c->mux_pause);
    614  1.3      adam 	c->mux_pause = 0; /* start processing messages again */
    615  1.3      adam }
    616  1.3      adam 
    617  1.3      adam static int
    618  1.3      adam process_mux_open_fwd(u_int rid, Channel *c, Buffer *m, Buffer *r)
    619  1.3      adam {
    620  1.3      adam 	Forward fwd;
    621  1.3      adam 	char *fwd_desc = NULL;
    622  1.3      adam 	u_int ftype;
    623  1.9  christos 	u_int lport, cport;
    624  1.3      adam 	int i, ret = 0, freefwd = 1;
    625  1.3      adam 
    626  1.3      adam 	fwd.listen_host = fwd.connect_host = NULL;
    627  1.3      adam 	if (buffer_get_int_ret(&ftype, m) != 0 ||
    628  1.3      adam 	    (fwd.listen_host = buffer_get_string_ret(m, NULL)) == NULL ||
    629  1.9  christos 	    buffer_get_int_ret(&lport, m) != 0 ||
    630  1.3      adam 	    (fwd.connect_host = buffer_get_string_ret(m, NULL)) == NULL ||
    631  1.9  christos 	    buffer_get_int_ret(&cport, m) != 0 ||
    632  1.9  christos 	    lport > 65535 || cport > 65535) {
    633  1.3      adam 		error("%s: malformed message", __func__);
    634  1.3      adam 		ret = -1;
    635  1.3      adam 		goto out;
    636  1.3      adam 	}
    637  1.9  christos 	fwd.listen_port = lport;
    638  1.9  christos 	fwd.connect_port = cport;
    639  1.3      adam 	if (*fwd.listen_host == '\0') {
    640  1.9  christos 		free(fwd.listen_host);
    641  1.3      adam 		fwd.listen_host = NULL;
    642  1.3      adam 	}
    643  1.3      adam 	if (*fwd.connect_host == '\0') {
    644  1.9  christos 		free(fwd.connect_host);
    645  1.3      adam 		fwd.connect_host = NULL;
    646  1.3      adam 	}
    647  1.3      adam 
    648  1.3      adam 	debug2("%s: channel %d: request %s", __func__, c->self,
    649  1.3      adam 	    (fwd_desc = format_forward(ftype, &fwd)));
    650  1.3      adam 
    651  1.3      adam 	if (ftype != MUX_FWD_LOCAL && ftype != MUX_FWD_REMOTE &&
    652  1.3      adam 	    ftype != MUX_FWD_DYNAMIC) {
    653  1.3      adam 		logit("%s: invalid forwarding type %u", __func__, ftype);
    654  1.3      adam  invalid:
    655  1.9  christos 		free(fwd.listen_host);
    656  1.9  christos 		free(fwd.connect_host);
    657  1.3      adam 		buffer_put_int(r, MUX_S_FAILURE);
    658  1.3      adam 		buffer_put_int(r, rid);
    659  1.3      adam 		buffer_put_cstring(r, "Invalid forwarding request");
    660  1.3      adam 		return 0;
    661  1.3      adam 	}
    662  1.3      adam 	if (fwd.listen_port >= 65536) {
    663  1.3      adam 		logit("%s: invalid listen port %u", __func__,
    664  1.3      adam 		    fwd.listen_port);
    665  1.3      adam 		goto invalid;
    666  1.3      adam 	}
    667  1.3      adam 	if (fwd.connect_port >= 65536 || (ftype != MUX_FWD_DYNAMIC &&
    668  1.3      adam 	    ftype != MUX_FWD_REMOTE && fwd.connect_port == 0)) {
    669  1.3      adam 		logit("%s: invalid connect port %u", __func__,
    670  1.3      adam 		    fwd.connect_port);
    671  1.3      adam 		goto invalid;
    672  1.3      adam 	}
    673  1.3      adam 	if (ftype != MUX_FWD_DYNAMIC && fwd.connect_host == NULL) {
    674  1.3      adam 		logit("%s: missing connect host", __func__);
    675  1.3      adam 		goto invalid;
    676  1.3      adam 	}
    677  1.3      adam 
    678  1.3      adam 	/* Skip forwards that have already been requested */
    679  1.3      adam 	switch (ftype) {
    680  1.3      adam 	case MUX_FWD_LOCAL:
    681  1.3      adam 	case MUX_FWD_DYNAMIC:
    682  1.3      adam 		for (i = 0; i < options.num_local_forwards; i++) {
    683  1.3      adam 			if (compare_forward(&fwd,
    684  1.3      adam 			    options.local_forwards + i)) {
    685  1.3      adam  exists:
    686  1.3      adam 				debug2("%s: found existing forwarding",
    687  1.3      adam 				    __func__);
    688  1.3      adam 				buffer_put_int(r, MUX_S_OK);
    689  1.3      adam 				buffer_put_int(r, rid);
    690  1.3      adam 				goto out;
    691  1.3      adam 			}
    692  1.3      adam 		}
    693  1.3      adam 		break;
    694  1.3      adam 	case MUX_FWD_REMOTE:
    695  1.3      adam 		for (i = 0; i < options.num_remote_forwards; i++) {
    696  1.3      adam 			if (compare_forward(&fwd,
    697  1.3      adam 			    options.remote_forwards + i)) {
    698  1.3      adam 				if (fwd.listen_port != 0)
    699  1.3      adam 					goto exists;
    700  1.3      adam 				debug2("%s: found allocated port",
    701  1.3      adam 				    __func__);
    702  1.3      adam 				buffer_put_int(r, MUX_S_REMOTE_PORT);
    703  1.3      adam 				buffer_put_int(r, rid);
    704  1.3      adam 				buffer_put_int(r,
    705  1.3      adam 				    options.remote_forwards[i].allocated_port);
    706  1.3      adam 				goto out;
    707  1.3      adam 			}
    708  1.3      adam 		}
    709  1.3      adam 		break;
    710  1.3      adam 	}
    711  1.3      adam 
    712  1.3      adam 	if (options.control_master == SSHCTL_MASTER_ASK ||
    713  1.3      adam 	    options.control_master == SSHCTL_MASTER_AUTO_ASK) {
    714  1.3      adam 		if (!ask_permission("Open %s on %s?", fwd_desc, host)) {
    715  1.3      adam 			debug2("%s: forwarding refused by user", __func__);
    716  1.3      adam 			buffer_put_int(r, MUX_S_PERMISSION_DENIED);
    717  1.3      adam 			buffer_put_int(r, rid);
    718  1.3      adam 			buffer_put_cstring(r, "Permission denied");
    719  1.3      adam 			goto out;
    720  1.3      adam 		}
    721  1.3      adam 	}
    722  1.3      adam 
    723  1.3      adam 	if (ftype == MUX_FWD_LOCAL || ftype == MUX_FWD_DYNAMIC) {
    724  1.8  christos 		if (!channel_setup_local_fwd_listener(fwd.listen_host,
    725  1.3      adam 		    fwd.listen_port, fwd.connect_host, fwd.connect_port,
    726  1.8  christos 		    options.gateway_ports)) {
    727  1.3      adam  fail:
    728  1.3      adam 			logit("slave-requested %s failed", fwd_desc);
    729  1.3      adam 			buffer_put_int(r, MUX_S_FAILURE);
    730  1.3      adam 			buffer_put_int(r, rid);
    731  1.3      adam 			buffer_put_cstring(r, "Port forwarding failed");
    732  1.3      adam 			goto out;
    733  1.3      adam 		}
    734  1.3      adam 		add_local_forward(&options, &fwd);
    735  1.3      adam 		freefwd = 0;
    736  1.3      adam 	} else {
    737  1.3      adam 		struct mux_channel_confirm_ctx *fctx;
    738  1.3      adam 
    739  1.6  christos 		fwd.handle = channel_request_remote_forwarding(fwd.listen_host,
    740  1.6  christos 		    fwd.listen_port, fwd.connect_host, fwd.connect_port);
    741  1.6  christos 		if (fwd.handle < 0)
    742  1.3      adam 			goto fail;
    743  1.3      adam 		add_remote_forward(&options, &fwd);
    744  1.3      adam 		fctx = xcalloc(1, sizeof(*fctx));
    745  1.3      adam 		fctx->cid = c->self;
    746  1.3      adam 		fctx->rid = rid;
    747  1.3      adam 		fctx->fid = options.num_remote_forwards - 1;
    748  1.3      adam 		client_register_global_confirm(mux_confirm_remote_forward,
    749  1.3      adam 		    fctx);
    750  1.3      adam 		freefwd = 0;
    751  1.3      adam 		c->mux_pause = 1; /* wait for mux_confirm_remote_forward */
    752  1.3      adam 		/* delayed reply in mux_confirm_remote_forward */
    753  1.3      adam 		goto out;
    754  1.3      adam 	}
    755  1.3      adam 	buffer_put_int(r, MUX_S_OK);
    756  1.3      adam 	buffer_put_int(r, rid);
    757  1.3      adam  out:
    758  1.9  christos 	free(fwd_desc);
    759  1.3      adam 	if (freefwd) {
    760  1.9  christos 		free(fwd.listen_host);
    761  1.9  christos 		free(fwd.connect_host);
    762  1.3      adam 	}
    763  1.3      adam 	return ret;
    764  1.3      adam }
    765  1.3      adam 
    766  1.3      adam static int
    767  1.3      adam process_mux_close_fwd(u_int rid, Channel *c, Buffer *m, Buffer *r)
    768  1.3      adam {
    769  1.6  christos 	Forward fwd, *found_fwd;
    770  1.3      adam 	char *fwd_desc = NULL;
    771  1.6  christos 	const char *error_reason = NULL;
    772  1.3      adam 	u_int ftype;
    773  1.6  christos 	int i, listen_port, ret = 0;
    774  1.9  christos 	u_int lport, cport;
    775  1.3      adam 
    776  1.3      adam 	fwd.listen_host = fwd.connect_host = NULL;
    777  1.3      adam 	if (buffer_get_int_ret(&ftype, m) != 0 ||
    778  1.3      adam 	    (fwd.listen_host = buffer_get_string_ret(m, NULL)) == NULL ||
    779  1.9  christos 	    buffer_get_int_ret(&lport, m) != 0 ||
    780  1.3      adam 	    (fwd.connect_host = buffer_get_string_ret(m, NULL)) == NULL ||
    781  1.9  christos 	    buffer_get_int_ret(&cport, m) != 0 ||
    782  1.9  christos 	    lport > 65535 || cport > 65535) {
    783  1.3      adam 		error("%s: malformed message", __func__);
    784  1.3      adam 		ret = -1;
    785  1.3      adam 		goto out;
    786  1.3      adam 	}
    787  1.9  christos 	fwd.listen_port = lport;
    788  1.9  christos 	fwd.connect_port = cport;
    789  1.3      adam 
    790  1.3      adam 	if (*fwd.listen_host == '\0') {
    791  1.9  christos 		free(fwd.listen_host);
    792  1.3      adam 		fwd.listen_host = NULL;
    793  1.3      adam 	}
    794  1.3      adam 	if (*fwd.connect_host == '\0') {
    795  1.9  christos 		free(fwd.connect_host);
    796  1.3      adam 		fwd.connect_host = NULL;
    797  1.3      adam 	}
    798  1.3      adam 
    799  1.6  christos 	debug2("%s: channel %d: request cancel %s", __func__, c->self,
    800  1.3      adam 	    (fwd_desc = format_forward(ftype, &fwd)));
    801  1.3      adam 
    802  1.6  christos 	/* make sure this has been requested */
    803  1.6  christos 	found_fwd = NULL;
    804  1.6  christos 	switch (ftype) {
    805  1.6  christos 	case MUX_FWD_LOCAL:
    806  1.6  christos 	case MUX_FWD_DYNAMIC:
    807  1.6  christos 		for (i = 0; i < options.num_local_forwards; i++) {
    808  1.6  christos 			if (compare_forward(&fwd,
    809  1.6  christos 			    options.local_forwards + i)) {
    810  1.6  christos 				found_fwd = options.local_forwards + i;
    811  1.6  christos 				break;
    812  1.6  christos 			}
    813  1.6  christos 		}
    814  1.6  christos 		break;
    815  1.6  christos 	case MUX_FWD_REMOTE:
    816  1.6  christos 		for (i = 0; i < options.num_remote_forwards; i++) {
    817  1.6  christos 			if (compare_forward(&fwd,
    818  1.6  christos 			    options.remote_forwards + i)) {
    819  1.6  christos 				found_fwd = options.remote_forwards + i;
    820  1.6  christos 				break;
    821  1.6  christos 			}
    822  1.6  christos 		}
    823  1.6  christos 		break;
    824  1.6  christos 	}
    825  1.6  christos 
    826  1.6  christos 	if (found_fwd == NULL)
    827  1.6  christos 		error_reason = "port not forwarded";
    828  1.6  christos 	else if (ftype == MUX_FWD_REMOTE) {
    829  1.6  christos 		/*
    830  1.6  christos 		 * This shouldn't fail unless we confused the host/port
    831  1.6  christos 		 * between options.remote_forwards and permitted_opens.
    832  1.6  christos 		 * However, for dynamic allocated listen ports we need
    833  1.6  christos 		 * to lookup the actual listen port.
    834  1.6  christos 		 */
    835  1.6  christos 	        listen_port = (fwd.listen_port == 0) ?
    836  1.6  christos 		    found_fwd->allocated_port : fwd.listen_port;
    837  1.6  christos 		if (channel_request_rforward_cancel(fwd.listen_host,
    838  1.6  christos 		    listen_port) == -1)
    839  1.6  christos 			error_reason = "port not in permitted opens";
    840  1.6  christos 	} else {	/* local and dynamic forwards */
    841  1.6  christos 		/* Ditto */
    842  1.6  christos 		if (channel_cancel_lport_listener(fwd.listen_host,
    843  1.6  christos 		    fwd.listen_port, fwd.connect_port,
    844  1.6  christos 		    options.gateway_ports) == -1)
    845  1.6  christos 			error_reason = "port not found";
    846  1.6  christos 	}
    847  1.6  christos 
    848  1.6  christos 	if (error_reason == NULL) {
    849  1.6  christos 		buffer_put_int(r, MUX_S_OK);
    850  1.6  christos 		buffer_put_int(r, rid);
    851  1.3      adam 
    852  1.9  christos 		free(found_fwd->listen_host);
    853  1.9  christos 		free(found_fwd->connect_host);
    854  1.6  christos 		found_fwd->listen_host = found_fwd->connect_host = NULL;
    855  1.6  christos 		found_fwd->listen_port = found_fwd->connect_port = 0;
    856  1.6  christos 	} else {
    857  1.6  christos 		buffer_put_int(r, MUX_S_FAILURE);
    858  1.6  christos 		buffer_put_int(r, rid);
    859  1.6  christos 		buffer_put_cstring(r, error_reason);
    860  1.6  christos 	}
    861  1.3      adam  out:
    862  1.9  christos 	free(fwd_desc);
    863  1.9  christos 	free(fwd.listen_host);
    864  1.9  christos 	free(fwd.connect_host);
    865  1.3      adam 
    866  1.3      adam 	return ret;
    867  1.3      adam }
    868  1.3      adam 
    869  1.3      adam static int
    870  1.3      adam process_mux_stdio_fwd(u_int rid, Channel *c, Buffer *m, Buffer *r)
    871  1.3      adam {
    872  1.3      adam 	Channel *nc;
    873  1.3      adam 	char *reserved, *chost;
    874  1.3      adam 	u_int cport, i, j;
    875  1.3      adam 	int new_fd[2];
    876  1.3      adam 
    877  1.3      adam 	chost = reserved = NULL;
    878  1.3      adam 	if ((reserved = buffer_get_string_ret(m, NULL)) == NULL ||
    879  1.3      adam 	   (chost = buffer_get_string_ret(m, NULL)) == NULL ||
    880  1.3      adam 	    buffer_get_int_ret(&cport, m) != 0) {
    881  1.9  christos 		free(reserved);
    882  1.9  christos 		free(chost);
    883  1.3      adam 		error("%s: malformed message", __func__);
    884  1.3      adam 		return -1;
    885  1.3      adam 	}
    886  1.9  christos 	free(reserved);
    887  1.3      adam 
    888  1.3      adam 	debug2("%s: channel %d: request stdio fwd to %s:%u",
    889  1.3      adam 	    __func__, c->self, chost, cport);
    890  1.3      adam 
    891  1.3      adam 	/* Gather fds from client */
    892  1.3      adam 	for(i = 0; i < 2; i++) {
    893  1.3      adam 		if ((new_fd[i] = mm_receive_fd(c->sock)) == -1) {
    894  1.3      adam 			error("%s: failed to receive fd %d from slave",
    895  1.3      adam 			    __func__, i);
    896  1.3      adam 			for (j = 0; j < i; j++)
    897  1.3      adam 				close(new_fd[j]);
    898  1.9  christos 			free(chost);
    899  1.3      adam 
    900  1.3      adam 			/* prepare reply */
    901  1.3      adam 			buffer_put_int(r, MUX_S_FAILURE);
    902  1.3      adam 			buffer_put_int(r, rid);
    903  1.3      adam 			buffer_put_cstring(r,
    904  1.3      adam 			    "did not receive file descriptors");
    905  1.3      adam 			return -1;
    906  1.3      adam 		}
    907  1.3      adam 	}
    908  1.3      adam 
    909  1.3      adam 	debug3("%s: got fds stdin %d, stdout %d", __func__,
    910  1.3      adam 	    new_fd[0], new_fd[1]);
    911  1.3      adam 
    912  1.3      adam 	/* XXX support multiple child sessions in future */
    913  1.3      adam 	if (c->remote_id != -1) {
    914  1.3      adam 		debug2("%s: session already open", __func__);
    915  1.3      adam 		/* prepare reply */
    916  1.3      adam 		buffer_put_int(r, MUX_S_FAILURE);
    917  1.3      adam 		buffer_put_int(r, rid);
    918  1.3      adam 		buffer_put_cstring(r, "Multiple sessions not supported");
    919  1.3      adam  cleanup:
    920  1.3      adam 		close(new_fd[0]);
    921  1.3      adam 		close(new_fd[1]);
    922  1.9  christos 		free(chost);
    923  1.3      adam 		return 0;
    924  1.3      adam 	}
    925  1.3      adam 
    926  1.3      adam 	if (options.control_master == SSHCTL_MASTER_ASK ||
    927  1.3      adam 	    options.control_master == SSHCTL_MASTER_AUTO_ASK) {
    928  1.4  christos 		if (!ask_permission("Allow forward to %s:%u? ",
    929  1.3      adam 		    chost, cport)) {
    930  1.3      adam 			debug2("%s: stdio fwd refused by user", __func__);
    931  1.3      adam 			/* prepare reply */
    932  1.3      adam 			buffer_put_int(r, MUX_S_PERMISSION_DENIED);
    933  1.3      adam 			buffer_put_int(r, rid);
    934  1.3      adam 			buffer_put_cstring(r, "Permission denied");
    935  1.3      adam 			goto cleanup;
    936  1.3      adam 		}
    937  1.3      adam 	}
    938  1.3      adam 
    939  1.3      adam 	/* enable nonblocking unless tty */
    940  1.3      adam 	if (!isatty(new_fd[0]))
    941  1.3      adam 		set_nonblock(new_fd[0]);
    942  1.3      adam 	if (!isatty(new_fd[1]))
    943  1.3      adam 		set_nonblock(new_fd[1]);
    944  1.3      adam 
    945  1.3      adam 	nc = channel_connect_stdio_fwd(chost, cport, new_fd[0], new_fd[1]);
    946  1.3      adam 
    947  1.3      adam 	nc->ctl_chan = c->self;		/* link session -> control channel */
    948  1.3      adam 	c->remote_id = nc->self; 	/* link control -> session channel */
    949  1.3      adam 
    950  1.3      adam 	debug2("%s: channel_new: %d linked to control channel %d",
    951  1.3      adam 	    __func__, nc->self, nc->ctl_chan);
    952  1.3      adam 
    953  1.3      adam 	channel_register_cleanup(nc->self, mux_master_session_cleanup_cb, 1);
    954  1.3      adam 
    955  1.3      adam 	/* prepare reply */
    956  1.3      adam 	/* XXX defer until channel confirmed */
    957  1.3      adam 	buffer_put_int(r, MUX_S_SESSION_OPENED);
    958  1.3      adam 	buffer_put_int(r, rid);
    959  1.3      adam 	buffer_put_int(r, nc->self);
    960  1.3      adam 
    961  1.3      adam 	return 0;
    962  1.3      adam }
    963  1.3      adam 
    964  1.5  christos static int
    965  1.5  christos process_mux_stop_listening(u_int rid, Channel *c, Buffer *m, Buffer *r)
    966  1.5  christos {
    967  1.5  christos 	debug("%s: channel %d: stop listening", __func__, c->self);
    968  1.5  christos 
    969  1.5  christos 	if (options.control_master == SSHCTL_MASTER_ASK ||
    970  1.5  christos 	    options.control_master == SSHCTL_MASTER_AUTO_ASK) {
    971  1.5  christos 		if (!ask_permission("Disable further multiplexing on shared "
    972  1.5  christos 		    "connection to %s? ", host)) {
    973  1.5  christos 			debug2("%s: stop listen refused by user", __func__);
    974  1.5  christos 			buffer_put_int(r, MUX_S_PERMISSION_DENIED);
    975  1.5  christos 			buffer_put_int(r, rid);
    976  1.5  christos 			buffer_put_cstring(r, "Permission denied");
    977  1.5  christos 			return 0;
    978  1.5  christos 		}
    979  1.5  christos 	}
    980  1.5  christos 
    981  1.5  christos 	if (mux_listener_channel != NULL) {
    982  1.5  christos 		channel_free(mux_listener_channel);
    983  1.5  christos 		client_stop_mux();
    984  1.9  christos 		free(options.control_path);
    985  1.5  christos 		options.control_path = NULL;
    986  1.5  christos 		mux_listener_channel = NULL;
    987  1.5  christos 		muxserver_sock = -1;
    988  1.5  christos 	}
    989  1.5  christos 
    990  1.5  christos 	/* prepare reply */
    991  1.5  christos 	buffer_put_int(r, MUX_S_OK);
    992  1.5  christos 	buffer_put_int(r, rid);
    993  1.5  christos 
    994  1.5  christos 	return 0;
    995  1.5  christos }
    996  1.5  christos 
    997  1.3      adam /* Channel callbacks fired on read/write from mux slave fd */
    998  1.3      adam static int
    999  1.3      adam mux_master_read_cb(Channel *c)
   1000  1.3      adam {
   1001  1.3      adam 	struct mux_master_state *state = (struct mux_master_state *)c->mux_ctx;
   1002  1.3      adam 	Buffer in, out;
   1003  1.3      adam 	void *ptr;
   1004  1.3      adam 	u_int type, rid, have, i;
   1005  1.3      adam 	int ret = -1;
   1006  1.3      adam 
   1007  1.3      adam 	/* Setup ctx and  */
   1008  1.3      adam 	if (c->mux_ctx == NULL) {
   1009  1.3      adam 		state = xcalloc(1, sizeof(*state));
   1010  1.3      adam 		c->mux_ctx = state;
   1011  1.3      adam 		channel_register_cleanup(c->self,
   1012  1.3      adam 		    mux_master_control_cleanup_cb, 0);
   1013  1.3      adam 
   1014  1.3      adam 		/* Send hello */
   1015  1.3      adam 		buffer_init(&out);
   1016  1.3      adam 		buffer_put_int(&out, MUX_MSG_HELLO);
   1017  1.3      adam 		buffer_put_int(&out, SSHMUX_VER);
   1018  1.3      adam 		/* no extensions */
   1019  1.3      adam 		buffer_put_string(&c->output, buffer_ptr(&out),
   1020  1.3      adam 		    buffer_len(&out));
   1021  1.3      adam 		buffer_free(&out);
   1022  1.3      adam 		debug3("%s: channel %d: hello sent", __func__, c->self);
   1023  1.3      adam 		return 0;
   1024  1.3      adam 	}
   1025  1.3      adam 
   1026  1.3      adam 	buffer_init(&in);
   1027  1.3      adam 	buffer_init(&out);
   1028  1.3      adam 
   1029  1.3      adam 	/* Channel code ensures that we receive whole packets */
   1030  1.3      adam 	if ((ptr = buffer_get_string_ptr_ret(&c->input, &have)) == NULL) {
   1031  1.3      adam  malf:
   1032  1.3      adam 		error("%s: malformed message", __func__);
   1033  1.3      adam 		goto out;
   1034  1.3      adam 	}
   1035  1.3      adam 	buffer_append(&in, ptr, have);
   1036  1.3      adam 
   1037  1.3      adam 	if (buffer_get_int_ret(&type, &in) != 0)
   1038  1.3      adam 		goto malf;
   1039  1.3      adam 	debug3("%s: channel %d packet type 0x%08x len %u",
   1040  1.3      adam 	    __func__, c->self, type, buffer_len(&in));
   1041  1.3      adam 
   1042  1.3      adam 	if (type == MUX_MSG_HELLO)
   1043  1.3      adam 		rid = 0;
   1044  1.3      adam 	else {
   1045  1.3      adam 		if (!state->hello_rcvd) {
   1046  1.3      adam 			error("%s: expected MUX_MSG_HELLO(0x%08x), "
   1047  1.3      adam 			    "received 0x%08x", __func__, MUX_MSG_HELLO, type);
   1048  1.3      adam 			goto out;
   1049  1.1  christos 		}
   1050  1.3      adam 		if (buffer_get_int_ret(&rid, &in) != 0)
   1051  1.3      adam 			goto malf;
   1052  1.3      adam 	}
   1053  1.3      adam 
   1054  1.3      adam 	for (i = 0; mux_master_handlers[i].handler != NULL; i++) {
   1055  1.3      adam 		if (type == mux_master_handlers[i].type) {
   1056  1.3      adam 			ret = mux_master_handlers[i].handler(rid, c, &in, &out);
   1057  1.3      adam 			break;
   1058  1.1  christos 		}
   1059  1.3      adam 	}
   1060  1.3      adam 	if (mux_master_handlers[i].handler == NULL) {
   1061  1.3      adam 		error("%s: unsupported mux message 0x%08x", __func__, type);
   1062  1.3      adam 		buffer_put_int(&out, MUX_S_FAILURE);
   1063  1.3      adam 		buffer_put_int(&out, rid);
   1064  1.3      adam 		buffer_put_cstring(&out, "unsupported request");
   1065  1.3      adam 		ret = 0;
   1066  1.3      adam 	}
   1067  1.3      adam 	/* Enqueue reply packet */
   1068  1.3      adam 	if (buffer_len(&out) != 0) {
   1069  1.3      adam 		buffer_put_string(&c->output, buffer_ptr(&out),
   1070  1.3      adam 		    buffer_len(&out));
   1071  1.3      adam 	}
   1072  1.3      adam  out:
   1073  1.3      adam 	buffer_free(&in);
   1074  1.3      adam 	buffer_free(&out);
   1075  1.3      adam 	return ret;
   1076  1.3      adam }
   1077  1.3      adam 
   1078  1.3      adam void
   1079  1.3      adam mux_exit_message(Channel *c, int exitval)
   1080  1.3      adam {
   1081  1.3      adam 	Buffer m;
   1082  1.3      adam 	Channel *mux_chan;
   1083  1.3      adam 
   1084  1.9  christos 	debug3("%s: channel %d: exit message, exitval %d", __func__, c->self,
   1085  1.3      adam 	    exitval);
   1086  1.3      adam 
   1087  1.3      adam 	if ((mux_chan = channel_by_id(c->ctl_chan)) == NULL)
   1088  1.3      adam 		fatal("%s: channel %d missing mux channel %d",
   1089  1.3      adam 		    __func__, c->self, c->ctl_chan);
   1090  1.3      adam 
   1091  1.3      adam 	/* Append exit message packet to control socket output queue */
   1092  1.3      adam 	buffer_init(&m);
   1093  1.3      adam 	buffer_put_int(&m, MUX_S_EXIT_MESSAGE);
   1094  1.3      adam 	buffer_put_int(&m, c->self);
   1095  1.3      adam 	buffer_put_int(&m, exitval);
   1096  1.3      adam 
   1097  1.3      adam 	buffer_put_string(&mux_chan->output, buffer_ptr(&m), buffer_len(&m));
   1098  1.3      adam 	buffer_free(&m);
   1099  1.3      adam }
   1100  1.3      adam 
   1101  1.5  christos void
   1102  1.5  christos mux_tty_alloc_failed(Channel *c)
   1103  1.5  christos {
   1104  1.5  christos 	Buffer m;
   1105  1.5  christos 	Channel *mux_chan;
   1106  1.5  christos 
   1107  1.5  christos 	debug3("%s: channel %d: TTY alloc failed", __func__, c->self);
   1108  1.5  christos 
   1109  1.5  christos 	if ((mux_chan = channel_by_id(c->ctl_chan)) == NULL)
   1110  1.5  christos 		fatal("%s: channel %d missing mux channel %d",
   1111  1.5  christos 		    __func__, c->self, c->ctl_chan);
   1112  1.5  christos 
   1113  1.5  christos 	/* Append exit message packet to control socket output queue */
   1114  1.5  christos 	buffer_init(&m);
   1115  1.5  christos 	buffer_put_int(&m, MUX_S_TTY_ALLOC_FAIL);
   1116  1.5  christos 	buffer_put_int(&m, c->self);
   1117  1.5  christos 
   1118  1.5  christos 	buffer_put_string(&mux_chan->output, buffer_ptr(&m), buffer_len(&m));
   1119  1.5  christos 	buffer_free(&m);
   1120  1.5  christos }
   1121  1.5  christos 
   1122  1.3      adam /* Prepare a mux master to listen on a Unix domain socket. */
   1123  1.3      adam void
   1124  1.3      adam muxserver_listen(void)
   1125  1.3      adam {
   1126  1.3      adam 	struct sockaddr_un addr;
   1127  1.3      adam 	mode_t old_umask;
   1128  1.4  christos 	char *orig_control_path = options.control_path;
   1129  1.4  christos 	char rbuf[16+1];
   1130  1.4  christos 	u_int i, r;
   1131  1.3      adam 
   1132  1.3      adam 	if (options.control_path == NULL ||
   1133  1.3      adam 	    options.control_master == SSHCTL_MASTER_NO)
   1134  1.1  christos 		return;
   1135  1.3      adam 
   1136  1.3      adam 	debug("setting up multiplex master socket");
   1137  1.3      adam 
   1138  1.4  christos 	/*
   1139  1.4  christos 	 * Use a temporary path before listen so we can pseudo-atomically
   1140  1.4  christos 	 * establish the listening socket in its final location to avoid
   1141  1.4  christos 	 * other processes racing in between bind() and listen() and hitting
   1142  1.4  christos 	 * an unready socket.
   1143  1.4  christos 	 */
   1144  1.4  christos 	for (i = 0; i < sizeof(rbuf) - 1; i++) {
   1145  1.4  christos 		r = arc4random_uniform(26+26+10);
   1146  1.4  christos 		rbuf[i] = (r < 26) ? 'a' + r :
   1147  1.4  christos 		    (r < 26*2) ? 'A' + r - 26 :
   1148  1.4  christos 		    '0' + r - 26 - 26;
   1149  1.4  christos 	}
   1150  1.4  christos 	rbuf[sizeof(rbuf) - 1] = '\0';
   1151  1.4  christos 	options.control_path = NULL;
   1152  1.4  christos 	xasprintf(&options.control_path, "%s.%s", orig_control_path, rbuf);
   1153  1.4  christos 	debug3("%s: temporary control path %s", __func__, options.control_path);
   1154  1.4  christos 
   1155  1.3      adam 	memset(&addr, '\0', sizeof(addr));
   1156  1.3      adam 	addr.sun_family = AF_UNIX;
   1157  1.3      adam 	addr.sun_len = offsetof(struct sockaddr_un, sun_path) +
   1158  1.3      adam 	    strlen(options.control_path) + 1;
   1159  1.3      adam 
   1160  1.3      adam 	if (strlcpy(addr.sun_path, options.control_path,
   1161  1.5  christos 	    sizeof(addr.sun_path)) >= sizeof(addr.sun_path)) {
   1162  1.5  christos 		error("ControlPath \"%s\" too long for Unix domain socket",
   1163  1.5  christos 		    options.control_path);
   1164  1.5  christos 		goto disable_mux_master;
   1165  1.5  christos 	}
   1166  1.3      adam 
   1167  1.3      adam 	if ((muxserver_sock = socket(PF_UNIX, SOCK_STREAM, 0)) < 0)
   1168  1.3      adam 		fatal("%s socket(): %s", __func__, strerror(errno));
   1169  1.3      adam 
   1170  1.3      adam 	old_umask = umask(0177);
   1171  1.3      adam 	if (bind(muxserver_sock, (struct sockaddr *)&addr, addr.sun_len) == -1) {
   1172  1.3      adam 		if (errno == EINVAL || errno == EADDRINUSE) {
   1173  1.3      adam 			error("ControlSocket %s already exists, "
   1174  1.3      adam 			    "disabling multiplexing", options.control_path);
   1175  1.4  christos  disable_mux_master:
   1176  1.5  christos 			if (muxserver_sock != -1) {
   1177  1.5  christos 				close(muxserver_sock);
   1178  1.5  christos 				muxserver_sock = -1;
   1179  1.5  christos 			}
   1180  1.9  christos 			free(orig_control_path);
   1181  1.9  christos 			free(options.control_path);
   1182  1.3      adam 			options.control_path = NULL;
   1183  1.3      adam 			options.control_master = SSHCTL_MASTER_NO;
   1184  1.3      adam 			return;
   1185  1.3      adam 		} else
   1186  1.3      adam 			fatal("%s bind(): %s", __func__, strerror(errno));
   1187  1.3      adam 	}
   1188  1.3      adam 	umask(old_umask);
   1189  1.3      adam 
   1190  1.3      adam 	if (listen(muxserver_sock, 64) == -1)
   1191  1.3      adam 		fatal("%s listen(): %s", __func__, strerror(errno));
   1192  1.3      adam 
   1193  1.4  christos 	/* Now atomically "move" the mux socket into position */
   1194  1.4  christos 	if (link(options.control_path, orig_control_path) != 0) {
   1195  1.4  christos 		if (errno != EEXIST) {
   1196  1.4  christos 			fatal("%s: link mux listener %s => %s: %s", __func__,
   1197  1.4  christos 			    options.control_path, orig_control_path,
   1198  1.4  christos 			    strerror(errno));
   1199  1.4  christos 		}
   1200  1.4  christos 		error("ControlSocket %s already exists, disabling multiplexing",
   1201  1.4  christos 		    orig_control_path);
   1202  1.4  christos 		unlink(options.control_path);
   1203  1.4  christos 		goto disable_mux_master;
   1204  1.4  christos 	}
   1205  1.4  christos 	unlink(options.control_path);
   1206  1.9  christos 	free(options.control_path);
   1207  1.4  christos 	options.control_path = orig_control_path;
   1208  1.4  christos 
   1209  1.3      adam 	set_nonblock(muxserver_sock);
   1210  1.3      adam 
   1211  1.3      adam 	mux_listener_channel = channel_new("mux listener",
   1212  1.3      adam 	    SSH_CHANNEL_MUX_LISTENER, muxserver_sock, muxserver_sock, -1,
   1213  1.3      adam 	    CHAN_TCP_WINDOW_DEFAULT, CHAN_TCP_PACKET_DEFAULT,
   1214  1.4  christos 	    0, options.control_path, 1);
   1215  1.3      adam 	mux_listener_channel->mux_rcb = mux_master_read_cb;
   1216  1.3      adam 	debug3("%s: mux listener channel %d fd %d", __func__,
   1217  1.3      adam 	    mux_listener_channel->self, mux_listener_channel->sock);
   1218  1.3      adam }
   1219  1.3      adam 
   1220  1.3      adam /* Callback on open confirmation in mux master for a mux client session. */
   1221  1.3      adam static void
   1222  1.3      adam mux_session_confirm(int id, int success, void *arg)
   1223  1.3      adam {
   1224  1.3      adam 	struct mux_session_confirm_ctx *cctx = arg;
   1225  1.3      adam 	const char *display;
   1226  1.3      adam 	Channel *c, *cc;
   1227  1.3      adam 	int i;
   1228  1.3      adam 	Buffer reply;
   1229  1.3      adam 
   1230  1.3      adam 	if (cctx == NULL)
   1231  1.3      adam 		fatal("%s: cctx == NULL", __func__);
   1232  1.3      adam 	if ((c = channel_by_id(id)) == NULL)
   1233  1.3      adam 		fatal("%s: no channel for id %d", __func__, id);
   1234  1.3      adam 	if ((cc = channel_by_id(c->ctl_chan)) == NULL)
   1235  1.3      adam 		fatal("%s: channel %d lacks control channel %d", __func__,
   1236  1.3      adam 		    id, c->ctl_chan);
   1237  1.3      adam 
   1238  1.3      adam 	if (!success) {
   1239  1.3      adam 		debug3("%s: sending failure reply", __func__);
   1240  1.3      adam 		/* prepare reply */
   1241  1.3      adam 		buffer_init(&reply);
   1242  1.3      adam 		buffer_put_int(&reply, MUX_S_FAILURE);
   1243  1.3      adam 		buffer_put_int(&reply, cctx->rid);
   1244  1.3      adam 		buffer_put_cstring(&reply, "Session open refused by peer");
   1245  1.3      adam 		goto done;
   1246  1.3      adam 	}
   1247  1.3      adam 
   1248  1.3      adam 	display = getenv("DISPLAY");
   1249  1.3      adam 	if (cctx->want_x_fwd && options.forward_x11 && display != NULL) {
   1250  1.3      adam 		char *proto, *data;
   1251  1.3      adam 
   1252  1.3      adam 		/* Get reasonable local authentication information. */
   1253  1.3      adam 		client_x11_get_proto(display, options.xauth_location,
   1254  1.3      adam 		    options.forward_x11_trusted, options.forward_x11_timeout,
   1255  1.3      adam 		    &proto, &data);
   1256  1.3      adam 		/* Request forwarding with authentication spoofing. */
   1257  1.3      adam 		debug("Requesting X11 forwarding with authentication "
   1258  1.3      adam 		    "spoofing.");
   1259  1.5  christos 		x11_request_forwarding_with_spoofing(id, display, proto,
   1260  1.5  christos 		    data, 1);
   1261  1.5  christos 		client_expect_confirm(id, "X11 forwarding", CONFIRM_WARN);
   1262  1.5  christos 		/* XXX exit_on_forward_failure */
   1263  1.1  christos 	}
   1264  1.1  christos 
   1265  1.3      adam 	if (cctx->want_agent_fwd && options.forward_agent) {
   1266  1.3      adam 		debug("Requesting authentication agent forwarding.");
   1267  1.3      adam 		channel_request_start(id, "auth-agent-req (at) openssh.com", 0);
   1268  1.3      adam 		packet_send();
   1269  1.3      adam 	}
   1270  1.3      adam 
   1271  1.3      adam 	client_session2_setup(id, cctx->want_tty, cctx->want_subsys,
   1272  1.3      adam 	    cctx->term, &cctx->tio, c->rfd, &cctx->cmd, cctx->env);
   1273  1.3      adam 
   1274  1.3      adam 	debug3("%s: sending success reply", __func__);
   1275  1.3      adam 	/* prepare reply */
   1276  1.3      adam 	buffer_init(&reply);
   1277  1.3      adam 	buffer_put_int(&reply, MUX_S_SESSION_OPENED);
   1278  1.3      adam 	buffer_put_int(&reply, cctx->rid);
   1279  1.3      adam 	buffer_put_int(&reply, c->self);
   1280  1.3      adam 
   1281  1.3      adam  done:
   1282  1.3      adam 	/* Send reply */
   1283  1.3      adam 	buffer_put_string(&cc->output, buffer_ptr(&reply), buffer_len(&reply));
   1284  1.3      adam 	buffer_free(&reply);
   1285  1.3      adam 
   1286  1.3      adam 	if (cc->mux_pause <= 0)
   1287  1.3      adam 		fatal("%s: mux_pause %d", __func__, cc->mux_pause);
   1288  1.3      adam 	cc->mux_pause = 0; /* start processing messages again */
   1289  1.3      adam 	c->open_confirm_ctx = NULL;
   1290  1.3      adam 	buffer_free(&cctx->cmd);
   1291  1.9  christos 	free(cctx->term);
   1292  1.3      adam 	if (cctx->env != NULL) {
   1293  1.3      adam 		for (i = 0; cctx->env[i] != NULL; i++)
   1294  1.9  christos 			free(cctx->env[i]);
   1295  1.9  christos 		free(cctx->env);
   1296  1.3      adam 	}
   1297  1.9  christos 	free(cctx);
   1298  1.3      adam }
   1299  1.3      adam 
   1300  1.3      adam /* ** Multiplexing client support */
   1301  1.3      adam 
   1302  1.3      adam /* Exit signal handler */
   1303  1.3      adam static void
   1304  1.3      adam control_client_sighandler(int signo)
   1305  1.3      adam {
   1306  1.3      adam 	muxclient_terminate = signo;
   1307  1.3      adam }
   1308  1.3      adam 
   1309  1.3      adam /*
   1310  1.3      adam  * Relay signal handler - used to pass some signals from mux client to
   1311  1.3      adam  * mux master.
   1312  1.3      adam  */
   1313  1.3      adam static void
   1314  1.3      adam control_client_sigrelay(int signo)
   1315  1.3      adam {
   1316  1.3      adam 	int save_errno = errno;
   1317  1.3      adam 
   1318  1.3      adam 	if (muxserver_pid > 1)
   1319  1.3      adam 		kill(muxserver_pid, signo);
   1320  1.3      adam 
   1321  1.3      adam 	errno = save_errno;
   1322  1.3      adam }
   1323  1.3      adam 
   1324  1.3      adam static int
   1325  1.3      adam mux_client_read(int fd, Buffer *b, u_int need)
   1326  1.3      adam {
   1327  1.3      adam 	u_int have;
   1328  1.3      adam 	ssize_t len;
   1329  1.3      adam 	u_char *p;
   1330  1.3      adam 	struct pollfd pfd;
   1331  1.3      adam 
   1332  1.3      adam 	pfd.fd = fd;
   1333  1.3      adam 	pfd.events = POLLIN;
   1334  1.3      adam 	p = buffer_append_space(b, need);
   1335  1.3      adam 	for (have = 0; have < need; ) {
   1336  1.3      adam 		if (muxclient_terminate) {
   1337  1.3      adam 			errno = EINTR;
   1338  1.3      adam 			return -1;
   1339  1.3      adam 		}
   1340  1.3      adam 		len = read(fd, p + have, need - have);
   1341  1.3      adam 		if (len < 0) {
   1342  1.3      adam 			switch (errno) {
   1343  1.3      adam 			case EAGAIN:
   1344  1.3      adam 				(void)poll(&pfd, 1, -1);
   1345  1.3      adam 				/* FALLTHROUGH */
   1346  1.3      adam 			case EINTR:
   1347  1.3      adam 				continue;
   1348  1.3      adam 			default:
   1349  1.3      adam 				return -1;
   1350  1.3      adam 			}
   1351  1.3      adam 		}
   1352  1.3      adam 		if (len == 0) {
   1353  1.3      adam 			errno = EPIPE;
   1354  1.3      adam 			return -1;
   1355  1.3      adam 		}
   1356  1.3      adam 		have += (u_int)len;
   1357  1.3      adam 	}
   1358  1.3      adam 	return 0;
   1359  1.3      adam }
   1360  1.3      adam 
   1361  1.3      adam static int
   1362  1.3      adam mux_client_write_packet(int fd, Buffer *m)
   1363  1.3      adam {
   1364  1.3      adam 	Buffer queue;
   1365  1.3      adam 	u_int have, need;
   1366  1.3      adam 	int oerrno, len;
   1367  1.3      adam 	u_char *ptr;
   1368  1.3      adam 	struct pollfd pfd;
   1369  1.3      adam 
   1370  1.3      adam 	pfd.fd = fd;
   1371  1.3      adam 	pfd.events = POLLOUT;
   1372  1.3      adam 	buffer_init(&queue);
   1373  1.3      adam 	buffer_put_string(&queue, buffer_ptr(m), buffer_len(m));
   1374  1.3      adam 
   1375  1.3      adam 	need = buffer_len(&queue);
   1376  1.3      adam 	ptr = buffer_ptr(&queue);
   1377  1.3      adam 
   1378  1.3      adam 	for (have = 0; have < need; ) {
   1379  1.3      adam 		if (muxclient_terminate) {
   1380  1.3      adam 			buffer_free(&queue);
   1381  1.3      adam 			errno = EINTR;
   1382  1.3      adam 			return -1;
   1383  1.3      adam 		}
   1384  1.3      adam 		len = write(fd, ptr + have, need - have);
   1385  1.3      adam 		if (len < 0) {
   1386  1.3      adam 			switch (errno) {
   1387  1.3      adam 			case EAGAIN:
   1388  1.3      adam 				(void)poll(&pfd, 1, -1);
   1389  1.3      adam 				/* FALLTHROUGH */
   1390  1.3      adam 			case EINTR:
   1391  1.3      adam 				continue;
   1392  1.3      adam 			default:
   1393  1.3      adam 				oerrno = errno;
   1394  1.3      adam 				buffer_free(&queue);
   1395  1.3      adam 				errno = oerrno;
   1396  1.3      adam 				return -1;
   1397  1.3      adam 			}
   1398  1.3      adam 		}
   1399  1.3      adam 		if (len == 0) {
   1400  1.3      adam 			buffer_free(&queue);
   1401  1.3      adam 			errno = EPIPE;
   1402  1.3      adam 			return -1;
   1403  1.3      adam 		}
   1404  1.3      adam 		have += (u_int)len;
   1405  1.3      adam 	}
   1406  1.3      adam 	buffer_free(&queue);
   1407  1.3      adam 	return 0;
   1408  1.3      adam }
   1409  1.3      adam 
   1410  1.3      adam static int
   1411  1.3      adam mux_client_read_packet(int fd, Buffer *m)
   1412  1.3      adam {
   1413  1.3      adam 	Buffer queue;
   1414  1.3      adam 	u_int need, have;
   1415  1.3      adam 	void *ptr;
   1416  1.3      adam 	int oerrno;
   1417  1.3      adam 
   1418  1.3      adam 	buffer_init(&queue);
   1419  1.3      adam 	if (mux_client_read(fd, &queue, 4) != 0) {
   1420  1.3      adam 		if ((oerrno = errno) == EPIPE)
   1421  1.9  christos 			debug3("%s: read header failed: %s", __func__,
   1422  1.9  christos 			    strerror(errno));
   1423  1.9  christos 		buffer_free(&queue);
   1424  1.3      adam 		errno = oerrno;
   1425  1.3      adam 		return -1;
   1426  1.3      adam 	}
   1427  1.3      adam 	need = get_u32(buffer_ptr(&queue));
   1428  1.3      adam 	if (mux_client_read(fd, &queue, need) != 0) {
   1429  1.3      adam 		oerrno = errno;
   1430  1.3      adam 		debug3("%s: read body failed: %s", __func__, strerror(errno));
   1431  1.9  christos 		buffer_free(&queue);
   1432  1.3      adam 		errno = oerrno;
   1433  1.3      adam 		return -1;
   1434  1.3      adam 	}
   1435  1.3      adam 	ptr = buffer_get_string_ptr(&queue, &have);
   1436  1.3      adam 	buffer_append(m, ptr, have);
   1437  1.3      adam 	buffer_free(&queue);
   1438  1.3      adam 	return 0;
   1439  1.3      adam }
   1440  1.3      adam 
   1441  1.3      adam static int
   1442  1.3      adam mux_client_hello_exchange(int fd)
   1443  1.3      adam {
   1444  1.3      adam 	Buffer m;
   1445  1.3      adam 	u_int type, ver;
   1446  1.3      adam 
   1447  1.3      adam 	buffer_init(&m);
   1448  1.3      adam 	buffer_put_int(&m, MUX_MSG_HELLO);
   1449  1.3      adam 	buffer_put_int(&m, SSHMUX_VER);
   1450  1.3      adam 	/* no extensions */
   1451  1.3      adam 
   1452  1.3      adam 	if (mux_client_write_packet(fd, &m) != 0)
   1453  1.3      adam 		fatal("%s: write packet: %s", __func__, strerror(errno));
   1454  1.3      adam 
   1455  1.3      adam 	buffer_clear(&m);
   1456  1.3      adam 
   1457  1.3      adam 	/* Read their HELLO */
   1458  1.3      adam 	if (mux_client_read_packet(fd, &m) != 0) {
   1459  1.3      adam 		buffer_free(&m);
   1460  1.3      adam 		return -1;
   1461  1.1  christos 	}
   1462  1.1  christos 
   1463  1.3      adam 	type = buffer_get_int(&m);
   1464  1.3      adam 	if (type != MUX_MSG_HELLO)
   1465  1.3      adam 		fatal("%s: expected HELLO (%u) received %u",
   1466  1.3      adam 		    __func__, MUX_MSG_HELLO, type);
   1467  1.3      adam 	ver = buffer_get_int(&m);
   1468  1.3      adam 	if (ver != SSHMUX_VER)
   1469  1.3      adam 		fatal("Unsupported multiplexing protocol version %d "
   1470  1.3      adam 		    "(expected %d)", ver, SSHMUX_VER);
   1471  1.3      adam 	debug2("%s: master version %u", __func__, ver);
   1472  1.3      adam 	/* No extensions are presently defined */
   1473  1.3      adam 	while (buffer_len(&m) > 0) {
   1474  1.3      adam 		char *name = buffer_get_string(&m, NULL);
   1475  1.3      adam 		char *value = buffer_get_string(&m, NULL);
   1476  1.3      adam 
   1477  1.3      adam 		debug2("Unrecognised master extension \"%s\"", name);
   1478  1.9  christos 		free(name);
   1479  1.9  christos 		free(value);
   1480  1.3      adam 	}
   1481  1.3      adam 	buffer_free(&m);
   1482  1.3      adam 	return 0;
   1483  1.3      adam }
   1484  1.1  christos 
   1485  1.3      adam static u_int
   1486  1.3      adam mux_client_request_alive(int fd)
   1487  1.3      adam {
   1488  1.3      adam 	Buffer m;
   1489  1.3      adam 	char *e;
   1490  1.3      adam 	u_int pid, type, rid;
   1491  1.1  christos 
   1492  1.3      adam 	debug3("%s: entering", __func__);
   1493  1.1  christos 
   1494  1.1  christos 	buffer_init(&m);
   1495  1.3      adam 	buffer_put_int(&m, MUX_C_ALIVE_CHECK);
   1496  1.3      adam 	buffer_put_int(&m, muxclient_request_id);
   1497  1.1  christos 
   1498  1.3      adam 	if (mux_client_write_packet(fd, &m) != 0)
   1499  1.3      adam 		fatal("%s: write packet: %s", __func__, strerror(errno));
   1500  1.3      adam 
   1501  1.3      adam 	buffer_clear(&m);
   1502  1.3      adam 
   1503  1.3      adam 	/* Read their reply */
   1504  1.3      adam 	if (mux_client_read_packet(fd, &m) != 0) {
   1505  1.1  christos 		buffer_free(&m);
   1506  1.3      adam 		return 0;
   1507  1.3      adam 	}
   1508  1.3      adam 
   1509  1.3      adam 	type = buffer_get_int(&m);
   1510  1.3      adam 	if (type != MUX_S_ALIVE) {
   1511  1.3      adam 		e = buffer_get_string(&m, NULL);
   1512  1.3      adam 		fatal("%s: master returned error: %s", __func__, e);
   1513  1.1  christos 	}
   1514  1.3      adam 
   1515  1.3      adam 	if ((rid = buffer_get_int(&m)) != muxclient_request_id)
   1516  1.3      adam 		fatal("%s: out of sequence reply: my id %u theirs %u",
   1517  1.3      adam 		    __func__, muxclient_request_id, rid);
   1518  1.3      adam 	pid = buffer_get_int(&m);
   1519  1.3      adam 	buffer_free(&m);
   1520  1.3      adam 
   1521  1.3      adam 	debug3("%s: done pid = %u", __func__, pid);
   1522  1.3      adam 
   1523  1.3      adam 	muxclient_request_id++;
   1524  1.3      adam 
   1525  1.3      adam 	return pid;
   1526  1.3      adam }
   1527  1.3      adam 
   1528  1.3      adam static void
   1529  1.3      adam mux_client_request_terminate(int fd)
   1530  1.3      adam {
   1531  1.3      adam 	Buffer m;
   1532  1.3      adam 	char *e;
   1533  1.3      adam 	u_int type, rid;
   1534  1.3      adam 
   1535  1.3      adam 	debug3("%s: entering", __func__);
   1536  1.3      adam 
   1537  1.3      adam 	buffer_init(&m);
   1538  1.3      adam 	buffer_put_int(&m, MUX_C_TERMINATE);
   1539  1.3      adam 	buffer_put_int(&m, muxclient_request_id);
   1540  1.3      adam 
   1541  1.3      adam 	if (mux_client_write_packet(fd, &m) != 0)
   1542  1.3      adam 		fatal("%s: write packet: %s", __func__, strerror(errno));
   1543  1.3      adam 
   1544  1.1  christos 	buffer_clear(&m);
   1545  1.1  christos 
   1546  1.3      adam 	/* Read their reply */
   1547  1.3      adam 	if (mux_client_read_packet(fd, &m) != 0) {
   1548  1.3      adam 		/* Remote end exited already */
   1549  1.3      adam 		if (errno == EPIPE) {
   1550  1.3      adam 			buffer_free(&m);
   1551  1.3      adam 			return;
   1552  1.3      adam 		}
   1553  1.3      adam 		fatal("%s: read from master failed: %s",
   1554  1.3      adam 		    __func__, strerror(errno));
   1555  1.3      adam 	}
   1556  1.3      adam 
   1557  1.3      adam 	type = buffer_get_int(&m);
   1558  1.3      adam 	if ((rid = buffer_get_int(&m)) != muxclient_request_id)
   1559  1.3      adam 		fatal("%s: out of sequence reply: my id %u theirs %u",
   1560  1.3      adam 		    __func__, muxclient_request_id, rid);
   1561  1.3      adam 	switch (type) {
   1562  1.3      adam 	case MUX_S_OK:
   1563  1.3      adam 		break;
   1564  1.3      adam 	case MUX_S_PERMISSION_DENIED:
   1565  1.3      adam 		e = buffer_get_string(&m, NULL);
   1566  1.3      adam 		fatal("Master refused termination request: %s", e);
   1567  1.3      adam 	case MUX_S_FAILURE:
   1568  1.3      adam 		e = buffer_get_string(&m, NULL);
   1569  1.3      adam 		fatal("%s: termination request failed: %s", __func__, e);
   1570  1.3      adam 	default:
   1571  1.3      adam 		fatal("%s: unexpected response from master 0x%08x",
   1572  1.3      adam 		    __func__, type);
   1573  1.1  christos 	}
   1574  1.3      adam 	buffer_free(&m);
   1575  1.3      adam 	muxclient_request_id++;
   1576  1.3      adam }
   1577  1.3      adam 
   1578  1.3      adam static int
   1579  1.6  christos mux_client_forward(int fd, int cancel_flag, u_int ftype, Forward *fwd)
   1580  1.3      adam {
   1581  1.3      adam 	Buffer m;
   1582  1.3      adam 	char *e, *fwd_desc;
   1583  1.3      adam 	u_int type, rid;
   1584  1.3      adam 
   1585  1.3      adam 	fwd_desc = format_forward(ftype, fwd);
   1586  1.6  christos 	debug("Requesting %s %s",
   1587  1.6  christos 	    cancel_flag ? "cancellation of" : "forwarding of", fwd_desc);
   1588  1.9  christos 	free(fwd_desc);
   1589  1.3      adam 
   1590  1.3      adam 	buffer_init(&m);
   1591  1.6  christos 	buffer_put_int(&m, cancel_flag ? MUX_C_CLOSE_FWD : MUX_C_OPEN_FWD);
   1592  1.3      adam 	buffer_put_int(&m, muxclient_request_id);
   1593  1.3      adam 	buffer_put_int(&m, ftype);
   1594  1.3      adam 	buffer_put_cstring(&m,
   1595  1.3      adam 	    fwd->listen_host == NULL ? "" : fwd->listen_host);
   1596  1.3      adam 	buffer_put_int(&m, fwd->listen_port);
   1597  1.3      adam 	buffer_put_cstring(&m,
   1598  1.3      adam 	    fwd->connect_host == NULL ? "" : fwd->connect_host);
   1599  1.3      adam 	buffer_put_int(&m, fwd->connect_port);
   1600  1.3      adam 
   1601  1.3      adam 	if (mux_client_write_packet(fd, &m) != 0)
   1602  1.3      adam 		fatal("%s: write packet: %s", __func__, strerror(errno));
   1603  1.1  christos 
   1604  1.1  christos 	buffer_clear(&m);
   1605  1.1  christos 
   1606  1.3      adam 	/* Read their reply */
   1607  1.3      adam 	if (mux_client_read_packet(fd, &m) != 0) {
   1608  1.3      adam 		buffer_free(&m);
   1609  1.3      adam 		return -1;
   1610  1.3      adam 	}
   1611  1.1  christos 
   1612  1.3      adam 	type = buffer_get_int(&m);
   1613  1.3      adam 	if ((rid = buffer_get_int(&m)) != muxclient_request_id)
   1614  1.3      adam 		fatal("%s: out of sequence reply: my id %u theirs %u",
   1615  1.3      adam 		    __func__, muxclient_request_id, rid);
   1616  1.3      adam 	switch (type) {
   1617  1.3      adam 	case MUX_S_OK:
   1618  1.3      adam 		break;
   1619  1.3      adam 	case MUX_S_REMOTE_PORT:
   1620  1.6  christos 		if (cancel_flag)
   1621  1.6  christos 			fatal("%s: got MUX_S_REMOTE_PORT for cancel", __func__);
   1622  1.3      adam 		fwd->allocated_port = buffer_get_int(&m);
   1623  1.3      adam 		logit("Allocated port %u for remote forward to %s:%d",
   1624  1.3      adam 		    fwd->allocated_port,
   1625  1.3      adam 		    fwd->connect_host ? fwd->connect_host : "",
   1626  1.3      adam 		    fwd->connect_port);
   1627  1.3      adam 		if (muxclient_command == SSHMUX_COMMAND_FORWARD)
   1628  1.3      adam 			fprintf(stdout, "%u\n", fwd->allocated_port);
   1629  1.1  christos 		break;
   1630  1.3      adam 	case MUX_S_PERMISSION_DENIED:
   1631  1.3      adam 		e = buffer_get_string(&m, NULL);
   1632  1.3      adam 		buffer_free(&m);
   1633  1.3      adam 		error("Master refused forwarding request: %s", e);
   1634  1.3      adam 		return -1;
   1635  1.3      adam 	case MUX_S_FAILURE:
   1636  1.3      adam 		e = buffer_get_string(&m, NULL);
   1637  1.3      adam 		buffer_free(&m);
   1638  1.4  christos 		error("%s: forwarding request failed: %s", __func__, e);
   1639  1.3      adam 		return -1;
   1640  1.1  christos 	default:
   1641  1.3      adam 		fatal("%s: unexpected response from master 0x%08x",
   1642  1.3      adam 		    __func__, type);
   1643  1.3      adam 	}
   1644  1.3      adam 	buffer_free(&m);
   1645  1.3      adam 
   1646  1.3      adam 	muxclient_request_id++;
   1647  1.3      adam 	return 0;
   1648  1.3      adam }
   1649  1.3      adam 
   1650  1.3      adam static int
   1651  1.6  christos mux_client_forwards(int fd, int cancel_flag)
   1652  1.3      adam {
   1653  1.6  christos 	int i, ret = 0;
   1654  1.3      adam 
   1655  1.6  christos 	debug3("%s: %s forwardings: %d local, %d remote", __func__,
   1656  1.6  christos 	    cancel_flag ? "cancel" : "request",
   1657  1.3      adam 	    options.num_local_forwards, options.num_remote_forwards);
   1658  1.3      adam 
   1659  1.3      adam 	/* XXX ExitOnForwardingFailure */
   1660  1.3      adam 	for (i = 0; i < options.num_local_forwards; i++) {
   1661  1.6  christos 		if (mux_client_forward(fd, cancel_flag,
   1662  1.3      adam 		    options.local_forwards[i].connect_port == 0 ?
   1663  1.3      adam 		    MUX_FWD_DYNAMIC : MUX_FWD_LOCAL,
   1664  1.3      adam 		    options.local_forwards + i) != 0)
   1665  1.6  christos 			ret = -1;
   1666  1.3      adam 	}
   1667  1.3      adam 	for (i = 0; i < options.num_remote_forwards; i++) {
   1668  1.6  christos 		if (mux_client_forward(fd, cancel_flag, MUX_FWD_REMOTE,
   1669  1.3      adam 		    options.remote_forwards + i) != 0)
   1670  1.6  christos 			ret = -1;
   1671  1.1  christos 	}
   1672  1.6  christos 	return ret;
   1673  1.3      adam }
   1674  1.1  christos 
   1675  1.3      adam static int
   1676  1.3      adam mux_client_request_session(int fd)
   1677  1.3      adam {
   1678  1.3      adam 	Buffer m;
   1679  1.3      adam 	char *e, *term;
   1680  1.3      adam 	u_int i, rid, sid, esid, exitval, type, exitval_seen;
   1681  1.3      adam 	extern char **environ;
   1682  1.5  christos 	int devnull, rawmode;
   1683  1.3      adam 
   1684  1.3      adam 	debug3("%s: entering", __func__);
   1685  1.3      adam 
   1686  1.3      adam 	if ((muxserver_pid = mux_client_request_alive(fd)) == 0) {
   1687  1.3      adam 		error("%s: master alive request failed", __func__);
   1688  1.3      adam 		return -1;
   1689  1.1  christos 	}
   1690  1.1  christos 
   1691  1.3      adam 	signal(SIGPIPE, SIG_IGN);
   1692  1.3      adam 
   1693  1.3      adam 	if (stdin_null_flag) {
   1694  1.3      adam 		if ((devnull = open(_PATH_DEVNULL, O_RDONLY)) == -1)
   1695  1.3      adam 			fatal("open(/dev/null): %s", strerror(errno));
   1696  1.3      adam 		if (dup2(devnull, STDIN_FILENO) == -1)
   1697  1.3      adam 			fatal("dup2: %s", strerror(errno));
   1698  1.3      adam 		if (devnull > STDERR_FILENO)
   1699  1.3      adam 			close(devnull);
   1700  1.1  christos 	}
   1701  1.1  christos 
   1702  1.3      adam 	term = getenv("TERM");
   1703  1.3      adam 
   1704  1.3      adam 	buffer_init(&m);
   1705  1.3      adam 	buffer_put_int(&m, MUX_C_NEW_SESSION);
   1706  1.3      adam 	buffer_put_int(&m, muxclient_request_id);
   1707  1.3      adam 	buffer_put_cstring(&m, ""); /* reserved */
   1708  1.3      adam 	buffer_put_int(&m, tty_flag);
   1709  1.3      adam 	buffer_put_int(&m, options.forward_x11);
   1710  1.3      adam 	buffer_put_int(&m, options.forward_agent);
   1711  1.3      adam 	buffer_put_int(&m, subsystem_flag);
   1712  1.3      adam 	buffer_put_int(&m, options.escape_char == SSH_ESCAPECHAR_NONE ?
   1713  1.3      adam 	    0xffffffff : (u_int)options.escape_char);
   1714  1.3      adam 	buffer_put_cstring(&m, term == NULL ? "" : term);
   1715  1.3      adam 	buffer_put_string(&m, buffer_ptr(&command), buffer_len(&command));
   1716  1.3      adam 
   1717  1.3      adam 	if (options.num_send_env > 0 && environ != NULL) {
   1718  1.3      adam 		/* Pass environment */
   1719  1.3      adam 		for (i = 0; environ[i] != NULL; i++) {
   1720  1.3      adam 			if (env_permitted(environ[i])) {
   1721  1.3      adam 				buffer_put_cstring(&m, environ[i]);
   1722  1.3      adam 			}
   1723  1.3      adam 		}
   1724  1.3      adam 	}
   1725  1.3      adam 
   1726  1.3      adam 	if (mux_client_write_packet(fd, &m) != 0)
   1727  1.3      adam 		fatal("%s: write packet: %s", __func__, strerror(errno));
   1728  1.3      adam 
   1729  1.3      adam 	/* Send the stdio file descriptors */
   1730  1.3      adam 	if (mm_send_fd(fd, STDIN_FILENO) == -1 ||
   1731  1.3      adam 	    mm_send_fd(fd, STDOUT_FILENO) == -1 ||
   1732  1.3      adam 	    mm_send_fd(fd, STDERR_FILENO) == -1)
   1733  1.3      adam 		fatal("%s: send fds failed", __func__);
   1734  1.3      adam 
   1735  1.3      adam 	debug3("%s: session request sent", __func__);
   1736  1.1  christos 
   1737  1.3      adam 	/* Read their reply */
   1738  1.1  christos 	buffer_clear(&m);
   1739  1.3      adam 	if (mux_client_read_packet(fd, &m) != 0) {
   1740  1.3      adam 		error("%s: read from master failed: %s",
   1741  1.3      adam 		    __func__, strerror(errno));
   1742  1.3      adam 		buffer_free(&m);
   1743  1.3      adam 		return -1;
   1744  1.3      adam 	}
   1745  1.3      adam 
   1746  1.3      adam 	type = buffer_get_int(&m);
   1747  1.3      adam 	if ((rid = buffer_get_int(&m)) != muxclient_request_id)
   1748  1.3      adam 		fatal("%s: out of sequence reply: my id %u theirs %u",
   1749  1.3      adam 		    __func__, muxclient_request_id, rid);
   1750  1.3      adam 	switch (type) {
   1751  1.3      adam 	case MUX_S_SESSION_OPENED:
   1752  1.3      adam 		sid = buffer_get_int(&m);
   1753  1.3      adam 		debug("%s: master session id: %u", __func__, sid);
   1754  1.3      adam 		break;
   1755  1.3      adam 	case MUX_S_PERMISSION_DENIED:
   1756  1.3      adam 		e = buffer_get_string(&m, NULL);
   1757  1.3      adam 		buffer_free(&m);
   1758  1.4  christos 		error("Master refused session request: %s", e);
   1759  1.3      adam 		return -1;
   1760  1.3      adam 	case MUX_S_FAILURE:
   1761  1.3      adam 		e = buffer_get_string(&m, NULL);
   1762  1.3      adam 		buffer_free(&m);
   1763  1.4  christos 		error("%s: session request failed: %s", __func__, e);
   1764  1.3      adam 		return -1;
   1765  1.3      adam 	default:
   1766  1.3      adam 		buffer_free(&m);
   1767  1.3      adam 		error("%s: unexpected response from master 0x%08x",
   1768  1.3      adam 		    __func__, type);
   1769  1.3      adam 		return -1;
   1770  1.3      adam 	}
   1771  1.3      adam 	muxclient_request_id++;
   1772  1.1  christos 
   1773  1.1  christos 	signal(SIGHUP, control_client_sighandler);
   1774  1.1  christos 	signal(SIGINT, control_client_sighandler);
   1775  1.1  christos 	signal(SIGTERM, control_client_sighandler);
   1776  1.1  christos 	signal(SIGWINCH, control_client_sigrelay);
   1777  1.1  christos 
   1778  1.5  christos 	rawmode = tty_flag;
   1779  1.1  christos 	if (tty_flag)
   1780  1.5  christos 		enter_raw_mode(options.request_tty == REQUEST_TTY_FORCE);
   1781  1.1  christos 
   1782  1.1  christos 	/*
   1783  1.1  christos 	 * Stick around until the controlee closes the client_fd.
   1784  1.3      adam 	 * Before it does, it is expected to write an exit message.
   1785  1.3      adam 	 * This process must read the value and wait for the closure of
   1786  1.3      adam 	 * the client_fd; if this one closes early, the multiplex master will
   1787  1.3      adam 	 * terminate early too (possibly losing data).
   1788  1.1  christos 	 */
   1789  1.3      adam 	for (exitval = 255, exitval_seen = 0;;) {
   1790  1.3      adam 		buffer_clear(&m);
   1791  1.3      adam 		if (mux_client_read_packet(fd, &m) != 0)
   1792  1.1  christos 			break;
   1793  1.3      adam 		type = buffer_get_int(&m);
   1794  1.5  christos 		switch (type) {
   1795  1.5  christos 		case MUX_S_TTY_ALLOC_FAIL:
   1796  1.5  christos 			if ((esid = buffer_get_int(&m)) != sid)
   1797  1.5  christos 				fatal("%s: tty alloc fail on unknown session: "
   1798  1.5  christos 				    "my id %u theirs %u",
   1799  1.5  christos 				    __func__, sid, esid);
   1800  1.5  christos 			leave_raw_mode(options.request_tty ==
   1801  1.5  christos 			    REQUEST_TTY_FORCE);
   1802  1.5  christos 			rawmode = 0;
   1803  1.5  christos 			continue;
   1804  1.5  christos 		case MUX_S_EXIT_MESSAGE:
   1805  1.5  christos 			if ((esid = buffer_get_int(&m)) != sid)
   1806  1.5  christos 				fatal("%s: exit on unknown session: "
   1807  1.5  christos 				    "my id %u theirs %u",
   1808  1.5  christos 				    __func__, sid, esid);
   1809  1.5  christos 			if (exitval_seen)
   1810  1.5  christos 				fatal("%s: exitval sent twice", __func__);
   1811  1.5  christos 			exitval = buffer_get_int(&m);
   1812  1.5  christos 			exitval_seen = 1;
   1813  1.5  christos 			continue;
   1814  1.5  christos 		default:
   1815  1.3      adam 			e = buffer_get_string(&m, NULL);
   1816  1.3      adam 			fatal("%s: master returned error: %s", __func__, e);
   1817  1.1  christos 		}
   1818  1.1  christos 	}
   1819  1.1  christos 
   1820  1.3      adam 	close(fd);
   1821  1.5  christos 	if (rawmode)
   1822  1.5  christos 		leave_raw_mode(options.request_tty == REQUEST_TTY_FORCE);
   1823  1.3      adam 
   1824  1.1  christos 	if (muxclient_terminate) {
   1825  1.2  christos 		debug2("Exiting on signal %ld", (long)muxclient_terminate);
   1826  1.3      adam 		exitval = 255;
   1827  1.3      adam 	} else if (!exitval_seen) {
   1828  1.1  christos 		debug2("Control master terminated unexpectedly");
   1829  1.3      adam 		exitval = 255;
   1830  1.1  christos 	} else
   1831  1.3      adam 		debug2("Received exit status from master %d", exitval);
   1832  1.1  christos 
   1833  1.1  christos 	if (tty_flag && options.log_level != SYSLOG_LEVEL_QUIET)
   1834  1.1  christos 		fprintf(stderr, "Shared connection to %s closed.\r\n", host);
   1835  1.1  christos 
   1836  1.3      adam 	exit(exitval);
   1837  1.3      adam }
   1838  1.3      adam 
   1839  1.3      adam static int
   1840  1.3      adam mux_client_request_stdio_fwd(int fd)
   1841  1.3      adam {
   1842  1.3      adam 	Buffer m;
   1843  1.3      adam 	char *e;
   1844  1.3      adam 	u_int type, rid, sid;
   1845  1.3      adam 	int devnull;
   1846  1.3      adam 
   1847  1.3      adam 	debug3("%s: entering", __func__);
   1848  1.3      adam 
   1849  1.3      adam 	if ((muxserver_pid = mux_client_request_alive(fd)) == 0) {
   1850  1.3      adam 		error("%s: master alive request failed", __func__);
   1851  1.3      adam 		return -1;
   1852  1.3      adam 	}
   1853  1.3      adam 
   1854  1.3      adam 	signal(SIGPIPE, SIG_IGN);
   1855  1.3      adam 
   1856  1.3      adam 	if (stdin_null_flag) {
   1857  1.3      adam 		if ((devnull = open(_PATH_DEVNULL, O_RDONLY)) == -1)
   1858  1.3      adam 			fatal("open(/dev/null): %s", strerror(errno));
   1859  1.3      adam 		if (dup2(devnull, STDIN_FILENO) == -1)
   1860  1.3      adam 			fatal("dup2: %s", strerror(errno));
   1861  1.3      adam 		if (devnull > STDERR_FILENO)
   1862  1.3      adam 			close(devnull);
   1863  1.3      adam 	}
   1864  1.3      adam 
   1865  1.3      adam 	buffer_init(&m);
   1866  1.3      adam 	buffer_put_int(&m, MUX_C_NEW_STDIO_FWD);
   1867  1.3      adam 	buffer_put_int(&m, muxclient_request_id);
   1868  1.3      adam 	buffer_put_cstring(&m, ""); /* reserved */
   1869  1.3      adam 	buffer_put_cstring(&m, stdio_forward_host);
   1870  1.3      adam 	buffer_put_int(&m, stdio_forward_port);
   1871  1.3      adam 
   1872  1.3      adam 	if (mux_client_write_packet(fd, &m) != 0)
   1873  1.3      adam 		fatal("%s: write packet: %s", __func__, strerror(errno));
   1874  1.3      adam 
   1875  1.3      adam 	/* Send the stdio file descriptors */
   1876  1.3      adam 	if (mm_send_fd(fd, STDIN_FILENO) == -1 ||
   1877  1.3      adam 	    mm_send_fd(fd, STDOUT_FILENO) == -1)
   1878  1.3      adam 		fatal("%s: send fds failed", __func__);
   1879  1.3      adam 
   1880  1.3      adam 	debug3("%s: stdio forward request sent", __func__);
   1881  1.3      adam 
   1882  1.3      adam 	/* Read their reply */
   1883  1.3      adam 	buffer_clear(&m);
   1884  1.3      adam 
   1885  1.3      adam 	if (mux_client_read_packet(fd, &m) != 0) {
   1886  1.3      adam 		error("%s: read from master failed: %s",
   1887  1.3      adam 		    __func__, strerror(errno));
   1888  1.3      adam 		buffer_free(&m);
   1889  1.3      adam 		return -1;
   1890  1.3      adam 	}
   1891  1.3      adam 
   1892  1.3      adam 	type = buffer_get_int(&m);
   1893  1.3      adam 	if ((rid = buffer_get_int(&m)) != muxclient_request_id)
   1894  1.3      adam 		fatal("%s: out of sequence reply: my id %u theirs %u",
   1895  1.3      adam 		    __func__, muxclient_request_id, rid);
   1896  1.3      adam 	switch (type) {
   1897  1.3      adam 	case MUX_S_SESSION_OPENED:
   1898  1.3      adam 		sid = buffer_get_int(&m);
   1899  1.3      adam 		debug("%s: master session id: %u", __func__, sid);
   1900  1.3      adam 		break;
   1901  1.3      adam 	case MUX_S_PERMISSION_DENIED:
   1902  1.3      adam 		e = buffer_get_string(&m, NULL);
   1903  1.3      adam 		buffer_free(&m);
   1904  1.4  christos 		fatal("Master refused stdio forwarding request: %s", e);
   1905  1.3      adam 	case MUX_S_FAILURE:
   1906  1.3      adam 		e = buffer_get_string(&m, NULL);
   1907  1.3      adam 		buffer_free(&m);
   1908  1.3      adam 		fatal("%s: stdio forwarding request failed: %s", __func__, e);
   1909  1.3      adam 	default:
   1910  1.3      adam 		buffer_free(&m);
   1911  1.3      adam 		error("%s: unexpected response from master 0x%08x",
   1912  1.3      adam 		    __func__, type);
   1913  1.3      adam 		return -1;
   1914  1.3      adam 	}
   1915  1.3      adam 	muxclient_request_id++;
   1916  1.3      adam 
   1917  1.3      adam 	signal(SIGHUP, control_client_sighandler);
   1918  1.3      adam 	signal(SIGINT, control_client_sighandler);
   1919  1.3      adam 	signal(SIGTERM, control_client_sighandler);
   1920  1.3      adam 	signal(SIGWINCH, control_client_sigrelay);
   1921  1.3      adam 
   1922  1.3      adam 	/*
   1923  1.3      adam 	 * Stick around until the controlee closes the client_fd.
   1924  1.3      adam 	 */
   1925  1.3      adam 	buffer_clear(&m);
   1926  1.3      adam 	if (mux_client_read_packet(fd, &m) != 0) {
   1927  1.3      adam 		if (errno == EPIPE ||
   1928  1.3      adam 		    (errno == EINTR && muxclient_terminate != 0))
   1929  1.3      adam 			return 0;
   1930  1.3      adam 		fatal("%s: mux_client_read_packet: %s",
   1931  1.3      adam 		    __func__, strerror(errno));
   1932  1.3      adam 	}
   1933  1.3      adam 	fatal("%s: master returned unexpected message %u", __func__, type);
   1934  1.3      adam }
   1935  1.3      adam 
   1936  1.5  christos static void
   1937  1.5  christos mux_client_request_stop_listening(int fd)
   1938  1.5  christos {
   1939  1.5  christos 	Buffer m;
   1940  1.5  christos 	char *e;
   1941  1.5  christos 	u_int type, rid;
   1942  1.5  christos 
   1943  1.5  christos 	debug3("%s: entering", __func__);
   1944  1.5  christos 
   1945  1.5  christos 	buffer_init(&m);
   1946  1.5  christos 	buffer_put_int(&m, MUX_C_STOP_LISTENING);
   1947  1.5  christos 	buffer_put_int(&m, muxclient_request_id);
   1948  1.5  christos 
   1949  1.5  christos 	if (mux_client_write_packet(fd, &m) != 0)
   1950  1.5  christos 		fatal("%s: write packet: %s", __func__, strerror(errno));
   1951  1.5  christos 
   1952  1.5  christos 	buffer_clear(&m);
   1953  1.5  christos 
   1954  1.5  christos 	/* Read their reply */
   1955  1.5  christos 	if (mux_client_read_packet(fd, &m) != 0)
   1956  1.5  christos 		fatal("%s: read from master failed: %s",
   1957  1.5  christos 		    __func__, strerror(errno));
   1958  1.5  christos 
   1959  1.5  christos 	type = buffer_get_int(&m);
   1960  1.5  christos 	if ((rid = buffer_get_int(&m)) != muxclient_request_id)
   1961  1.5  christos 		fatal("%s: out of sequence reply: my id %u theirs %u",
   1962  1.5  christos 		    __func__, muxclient_request_id, rid);
   1963  1.5  christos 	switch (type) {
   1964  1.5  christos 	case MUX_S_OK:
   1965  1.5  christos 		break;
   1966  1.5  christos 	case MUX_S_PERMISSION_DENIED:
   1967  1.5  christos 		e = buffer_get_string(&m, NULL);
   1968  1.5  christos 		fatal("Master refused stop listening request: %s", e);
   1969  1.5  christos 	case MUX_S_FAILURE:
   1970  1.5  christos 		e = buffer_get_string(&m, NULL);
   1971  1.5  christos 		fatal("%s: stop listening request failed: %s", __func__, e);
   1972  1.5  christos 	default:
   1973  1.5  christos 		fatal("%s: unexpected response from master 0x%08x",
   1974  1.5  christos 		    __func__, type);
   1975  1.5  christos 	}
   1976  1.5  christos 	buffer_free(&m);
   1977  1.5  christos 	muxclient_request_id++;
   1978  1.5  christos }
   1979  1.5  christos 
   1980  1.3      adam /* Multiplex client main loop. */
   1981  1.3      adam void
   1982  1.3      adam muxclient(const char *path)
   1983  1.3      adam {
   1984  1.3      adam 	struct sockaddr_un addr;
   1985  1.3      adam 	int sock;
   1986  1.3      adam 	u_int pid;
   1987  1.3      adam 
   1988  1.3      adam 	if (muxclient_command == 0) {
   1989  1.3      adam 		if (stdio_forward_host != NULL)
   1990  1.3      adam 			muxclient_command = SSHMUX_COMMAND_STDIO_FWD;
   1991  1.3      adam 		else
   1992  1.3      adam 			muxclient_command = SSHMUX_COMMAND_OPEN;
   1993  1.3      adam 	}
   1994  1.3      adam 
   1995  1.3      adam 	switch (options.control_master) {
   1996  1.3      adam 	case SSHCTL_MASTER_AUTO:
   1997  1.3      adam 	case SSHCTL_MASTER_AUTO_ASK:
   1998  1.3      adam 		debug("auto-mux: Trying existing master");
   1999  1.3      adam 		/* FALLTHROUGH */
   2000  1.3      adam 	case SSHCTL_MASTER_NO:
   2001  1.3      adam 		break;
   2002  1.3      adam 	default:
   2003  1.3      adam 		return;
   2004  1.3      adam 	}
   2005  1.3      adam 
   2006  1.3      adam 	memset(&addr, '\0', sizeof(addr));
   2007  1.3      adam 	addr.sun_family = AF_UNIX;
   2008  1.3      adam 	addr.sun_len = offsetof(struct sockaddr_un, sun_path) +
   2009  1.3      adam 	    strlen(path) + 1;
   2010  1.3      adam 
   2011  1.3      adam 	if (strlcpy(addr.sun_path, path,
   2012  1.3      adam 	    sizeof(addr.sun_path)) >= sizeof(addr.sun_path))
   2013  1.3      adam 		fatal("ControlPath too long");
   2014  1.3      adam 
   2015  1.3      adam 	if ((sock = socket(PF_UNIX, SOCK_STREAM, 0)) < 0)
   2016  1.3      adam 		fatal("%s socket(): %s", __func__, strerror(errno));
   2017  1.3      adam 
   2018  1.3      adam 	if (connect(sock, (struct sockaddr *)&addr, addr.sun_len) == -1) {
   2019  1.3      adam 		switch (muxclient_command) {
   2020  1.3      adam 		case SSHMUX_COMMAND_OPEN:
   2021  1.3      adam 		case SSHMUX_COMMAND_STDIO_FWD:
   2022  1.3      adam 			break;
   2023  1.3      adam 		default:
   2024  1.3      adam 			fatal("Control socket connect(%.100s): %s", path,
   2025  1.3      adam 			    strerror(errno));
   2026  1.3      adam 		}
   2027  1.4  christos 		if (errno == ECONNREFUSED &&
   2028  1.4  christos 		    options.control_master != SSHCTL_MASTER_NO) {
   2029  1.4  christos 			debug("Stale control socket %.100s, unlinking", path);
   2030  1.4  christos 			unlink(path);
   2031  1.4  christos 		} else if (errno == ENOENT) {
   2032  1.3      adam 			debug("Control socket \"%.100s\" does not exist", path);
   2033  1.4  christos 		} else {
   2034  1.3      adam 			error("Control socket connect(%.100s): %s", path,
   2035  1.3      adam 			    strerror(errno));
   2036  1.3      adam 		}
   2037  1.3      adam 		close(sock);
   2038  1.3      adam 		return;
   2039  1.3      adam 	}
   2040  1.3      adam 	set_nonblock(sock);
   2041  1.3      adam 
   2042  1.3      adam 	if (mux_client_hello_exchange(sock) != 0) {
   2043  1.3      adam 		error("%s: master hello exchange failed", __func__);
   2044  1.3      adam 		close(sock);
   2045  1.3      adam 		return;
   2046  1.3      adam 	}
   2047  1.3      adam 
   2048  1.3      adam 	switch (muxclient_command) {
   2049  1.3      adam 	case SSHMUX_COMMAND_ALIVE_CHECK:
   2050  1.3      adam 		if ((pid = mux_client_request_alive(sock)) == 0)
   2051  1.3      adam 			fatal("%s: master alive check failed", __func__);
   2052  1.3      adam 		fprintf(stderr, "Master running (pid=%d)\r\n", pid);
   2053  1.3      adam 		exit(0);
   2054  1.3      adam 	case SSHMUX_COMMAND_TERMINATE:
   2055  1.3      adam 		mux_client_request_terminate(sock);
   2056  1.3      adam 		fprintf(stderr, "Exit request sent.\r\n");
   2057  1.3      adam 		exit(0);
   2058  1.3      adam 	case SSHMUX_COMMAND_FORWARD:
   2059  1.6  christos 		if (mux_client_forwards(sock, 0) != 0)
   2060  1.3      adam 			fatal("%s: master forward request failed", __func__);
   2061  1.3      adam 		exit(0);
   2062  1.3      adam 	case SSHMUX_COMMAND_OPEN:
   2063  1.6  christos 		if (mux_client_forwards(sock, 0) != 0) {
   2064  1.3      adam 			error("%s: master forward request failed", __func__);
   2065  1.3      adam 			return;
   2066  1.3      adam 		}
   2067  1.3      adam 		mux_client_request_session(sock);
   2068  1.3      adam 		return;
   2069  1.3      adam 	case SSHMUX_COMMAND_STDIO_FWD:
   2070  1.3      adam 		mux_client_request_stdio_fwd(sock);
   2071  1.3      adam 		exit(0);
   2072  1.5  christos 	case SSHMUX_COMMAND_STOP:
   2073  1.5  christos 		mux_client_request_stop_listening(sock);
   2074  1.5  christos 		fprintf(stderr, "Stop listening request sent.\r\n");
   2075  1.5  christos 		exit(0);
   2076  1.6  christos 	case SSHMUX_COMMAND_CANCEL_FWD:
   2077  1.6  christos 		if (mux_client_forwards(sock, 1) != 0)
   2078  1.6  christos 			error("%s: master cancel forward request failed",
   2079  1.6  christos 			    __func__);
   2080  1.6  christos 		exit(0);
   2081  1.3      adam 	default:
   2082  1.3      adam 		fatal("unrecognised muxclient_command %d", muxclient_command);
   2083  1.3      adam 	}
   2084  1.1  christos }
   2085