Home | History | Annotate | Line # | Download | only in identd
identd.c revision 1.18
      1 /*	$NetBSD: identd.c,v 1.18 2003/05/17 21:24:38 itojun Exp $	*/
      2 
      3 /*
      4 ** identd.c                       A TCP/IP link identification protocol server
      5 **
      6 ** This program is in the public domain and may be used freely by anyone
      7 ** who wants to.
      8 **
      9 ** Last update: 7 Oct 1993
     10 **
     11 ** Please send bug fixes/bug reports to: Peter Eriksson <pen (at) lysator.liu.se>
     12 */
     13 
     14 #if defined(IRIX) || defined(SVR4) || defined(NeXT) || (defined(sco) && sco >= 42) || defined(_AIX4) || defined(__NetBSD__) || defined(__FreeBSD__) || defined(ultrix)
     15 #  define SIGRETURN_TYPE void
     16 #  define SIGRETURN_TYPE_IS_VOID
     17 #else
     18 #  define SIGRETURN_TYPE int
     19 #endif
     20 
     21 #ifdef SVR4
     22 #  define STRNET
     23 #endif
     24 
     25 #ifdef NeXT31
     26 #  include <libc.h>
     27 #endif
     28 
     29 #ifdef sco
     30 #  define USE_SIGALARM
     31 #endif
     32 
     33 #include <stdio.h>
     34 #include <ctype.h>
     35 #include <errno.h>
     36 #include <netdb.h>
     37 #include <signal.h>
     38 #include <fcntl.h>
     39 #include <poll.h>
     40 
     41 #include <sys/types.h>
     42 #include <sys/param.h>
     43 #include <sys/ioctl.h>
     44 #include <sys/socket.h>
     45 #ifndef _AUX_SOURCE
     46 #  include <sys/file.h>
     47 #endif
     48 #include <sys/time.h>
     49 #include <sys/wait.h>
     50 
     51 #include <pwd.h>
     52 #include <grp.h>
     53 
     54 #include <netinet/in.h>
     55 
     56 #ifndef HPUX7
     57 #  include <arpa/inet.h>
     58 #endif
     59 
     60 #if defined(MIPS) || defined(BSD43)
     61 extern int errno;
     62 #endif
     63 
     64 #if defined(SOLARIS) || defined(__NetBSD__) || defined(__FreeBSD__) || defined(__linux__) || defined(_AIX)
     65 #  include <unistd.h>
     66 #  include <stdlib.h>
     67 #  include <string.h>
     68 #endif
     69 
     70 #include "identd.h"
     71 #include "error.h"
     72 #include "paths.h"
     73 
     74 
     75 /* Antique unixes do not have these things defined... */
     76 #ifndef FD_SETSIZE
     77 #  define FD_SETSIZE 256
     78 #endif
     79 
     80 #ifndef FD_SET
     81 #  ifndef NFDBITS
     82 #    define NFDBITS   	(sizeof(int) * NBBY)  /* bits per mask */
     83 #  endif
     84 #  define FD_SET(n, p)  ((p)->fds_bits[(n)/NFDBITS] |= (1 << ((n) % NFDBITS)))
     85 #endif
     86 
     87 #ifndef FD_ZERO
     88 #  define FD_ZERO(p)        bzero((char *)(p), sizeof(*(p)))
     89 #endif
     90 
     91 
     92 char *path_unix = (char *) NULL;
     93 char *path_kmem = (char *) NULL;
     94 
     95 int verbose_flag = 0;
     96 int debug_flag   = 0;
     97 int syslog_flag  = 0;
     98 int multi_flag   = 0;
     99 int other_flag   = 0;
    100 int unknown_flag = 0;
    101 int noident_flag = 0;
    102 int crypto_flag  = 0;
    103 int liar_flag    = 0;
    104 
    105 int lport = 0;
    106 int fport = 0;
    107 
    108 char *charset_name = (char *) NULL;
    109 char *indirect_host = (char *) NULL;
    110 char *indirect_password = (char *) NULL;
    111 char *lie_string = (char *) NULL;
    112 
    113 #ifdef ALLOW_FORMAT
    114     int format_flag = 0;
    115     char *format = "%u";
    116 #endif
    117 
    118 static int child_pid;
    119 
    120 #ifdef LOG_DAEMON
    121 static int syslog_facility = LOG_DAEMON;
    122 #endif
    123 
    124 static int comparemem __P((void *, void *, int));
    125 char *clearmem __P((void *, int));
    126 static SIGRETURN_TYPE child_handler __P((int));
    127 int main __P((int, char *[]));
    128 
    129 /*
    130 ** The structure passing convention for GCC is incompatible with
    131 ** Suns own C compiler, so we define our own inet_ntoa() function.
    132 ** (This should only affect GCC version 1 I think, a well, this works
    133 ** for version 2 also so why bother.. :-)
    134 */
    135 #if defined(__GNUC__) && defined(__sparc__) && !defined(NeXT)
    136 
    137 #ifdef inet_ntoa
    138 #undef inet_ntoa
    139 #endif
    140 
    141 char *inet_ntoa(ad)
    142     struct in_addr ad;
    143 {
    144     unsigned long int s_ad;
    145     int a, b, c, d;
    146     static char addr[20];
    147 
    148     s_ad = ad.s_addr;
    149     d = s_ad % 256;
    150     s_ad /= 256;
    151     c = s_ad % 256;
    152     s_ad /= 256;
    153     b = s_ad % 256;
    154     a = s_ad / 256;
    155     snprintf(addr, sizeof(addr), "%d.%d.%d.%d", a, b, c, d);
    156 
    157     return addr;
    158 }
    159 #endif
    160 
    161 static int comparemem(vp1, vp2, len)
    162      void *vp1;
    163      void *vp2;
    164      int len;
    165 {
    166     unsigned char *p1 = (unsigned char *) vp1;
    167     unsigned char *p2 = (unsigned char *) vp2;
    168     int c;
    169 
    170     while (len-- > 0)
    171 	if ((c = (int) *p1++ - (int) *p2++) != 0)
    172 	    return c;
    173 
    174     return 0;
    175 }
    176 
    177 /*
    178 ** Return the name of the connecting host, or the IP number as a string.
    179 */
    180 char *gethost(addr)
    181     struct in_addr *addr;
    182 {
    183     int i;
    184     struct hostent *hp;
    185 
    186 
    187     hp = gethostbyaddr((char *) addr, sizeof(struct in_addr), AF_INET);
    188     if (hp)
    189     {
    190 	char *hname = strdup(hp->h_name);
    191 
    192 	if (! hname) {
    193 	    syslog(LOG_ERR, "strdup(%s): %m", hp->h_name);
    194 	    exit(1);
    195 	}
    196 	/* Found a IP -> Name match, now try the reverse for security reasons */
    197 	hp = gethostbyname(hname);
    198 	(void) free(hname);
    199 	if (hp)
    200 #ifdef h_addr
    201 	    for (i = 0; hp->h_addr_list[i]; i++)
    202 		if (comparemem(hp->h_addr_list[i],
    203 			       (unsigned char *) addr,
    204 			       (int) sizeof(struct in_addr)) == 0)
    205 		    return (char *) hp->h_name;
    206 #else
    207 	if (comparemem(hp->h_addr, addr, sizeof(struct in_addr)) == 0)
    208 	    return hp->h_name;
    209 #endif
    210   }
    211 
    212   return inet_ntoa(*addr);
    213 }
    214 
    215 #ifdef USE_SIGALARM
    216 /*
    217 ** Exit cleanly after our time's up.
    218 */
    219 static SIGRETURN_TYPE
    220 alarm_handler(int s)
    221 {
    222     if (syslog_flag)
    223 	syslog(LOG_DEBUG, "SIGALRM triggered, exiting");
    224 
    225     exit(0);
    226 }
    227 #endif
    228 
    229 
    230 #if !defined(hpux) && !defined(__hpux) && !defined(SVR4) && \
    231     !defined(_CRAY) && !defined(sco) && !defined(LINUX)
    232 /*
    233 ** This is used to clean up zombie child processes
    234 ** if the -w or -b options are used.
    235 */
    236 static SIGRETURN_TYPE
    237 child_handler(dummy)
    238 	int dummy;
    239 {
    240 #if defined(NeXT) || (defined(__sgi) && defined(__SVR3))
    241     union wait status;
    242 #else
    243     int status;
    244 #endif
    245     int saved_errno = errno;
    246 
    247     while (wait3(&status, WNOHANG, NULL) > 0)
    248 	;
    249 
    250     errno = saved_errno;
    251 
    252 #ifndef SIGRETURN_TYPE_IS_VOID
    253     return 0;
    254 #endif
    255 }
    256 #endif
    257 
    258 
    259 char *clearmem(vbp, len)
    260      void *vbp;
    261      int len;
    262 {
    263     char *bp = (char *) vbp;
    264     char *cp;
    265 
    266     cp = bp;
    267     while (len-- > 0)
    268 	*cp++ = 0;
    269 
    270     return bp;
    271 }
    272 
    273 
    274 /*
    275 ** Main entry point into this daemon
    276 */
    277 int main(argc,argv)
    278     int argc;
    279     char *argv[];
    280 {
    281     int i, len;
    282     struct sockaddr_in sin;
    283     struct in_addr laddr, faddr;
    284     int one = 1;
    285 
    286     int background_flag = 0;
    287     int timeout = 0;
    288     char *portno = "113";
    289     char *bind_address = (char *) NULL;
    290     int set_uid = 0;
    291     int set_gid = 0;
    292     int inhibit_default_config = 0;
    293     int opt_count = 0;		/* Count of option flags */
    294 
    295 #ifdef __convex__
    296     argc--;    /* get rid of extra argument passed by inetd */
    297 #endif
    298 
    299 
    300     if (isatty(0))
    301 	background_flag = 1;
    302 
    303     /*
    304     ** Prescan the arguments for "-f<config-file>" switches
    305     */
    306     inhibit_default_config = 0;
    307     for (i = 1; i < argc && argv[i][0] == '-'; i++)
    308 	if (argv[i][1] == 'f')
    309 	    inhibit_default_config = 1;
    310 
    311     /*
    312     ** Parse the default config file - if it exists
    313     */
    314     if (!inhibit_default_config)
    315 	parse_config(NULL, 1);
    316 
    317     /*
    318     ** Parse the command line arguments
    319     */
    320     for (i = 1; i < argc && argv[i][0] == '-'; i++) {
    321 	opt_count++;
    322 	switch (argv[i][1])
    323 	{
    324 	  case 'b':    /* Start as standalone daemon */
    325 	    background_flag = 1;
    326 	    break;
    327 
    328 	  case 'w':    /* Start from Inetd, wait mode */
    329 	    background_flag = 2;
    330 	    break;
    331 
    332 	  case 'i':    /* Start from Inetd, nowait mode */
    333 	    background_flag = 0;
    334 	    break;
    335 
    336 	  case 't':
    337 	    timeout = atoi(argv[i]+2);
    338 	    break;
    339 
    340 	  case 'p':
    341 	    portno = argv[i]+2;
    342 	    break;
    343 
    344 	  case 'a':
    345 	    bind_address = argv[i]+2;
    346 	    break;
    347 
    348 	  case 'u':
    349 	    if (isdigit(argv[i][2]))
    350 		set_uid = atoi(argv[i]+2);
    351 	    else
    352 	    {
    353 		struct passwd *pwd;
    354 
    355 		pwd = getpwnam(argv[i]+2);
    356 		if (!pwd)
    357 		    ERROR1("no such user (%s) for -u option", argv[i]+2);
    358 		else
    359 		{
    360 		    set_uid = pwd->pw_uid;
    361 		    set_gid = pwd->pw_gid;
    362 		}
    363 	    }
    364 	    break;
    365 
    366 	  case 'g':
    367 	    if (isdigit(argv[i][2]))
    368 		set_gid = atoi(argv[i]+2);
    369 	    else
    370 	    {
    371 		struct group *grp;
    372 
    373 		grp = getgrnam(argv[i]+2);
    374 		if (!grp)
    375 		    ERROR1("no such group (%s) for -g option", argv[i]+2);
    376 		else
    377 		    set_gid = grp->gr_gid;
    378 	    }
    379 	    break;
    380 
    381 	  case 'c':
    382 	    charset_name = argv[i]+2;
    383 	    break;
    384 
    385 	  case 'r':
    386 	    indirect_host = argv[i]+2;
    387 	    break;
    388 
    389 	  case 'l':    /* Use the Syslog daemon for logging */
    390 	    syslog_flag++;
    391 	    break;
    392 
    393 	  case 'o':
    394 	    other_flag = 1;
    395 	    break;
    396 
    397 	  case 'e':
    398 	    unknown_flag = 1;
    399 	    break;
    400 
    401 	  case 'V':    /* Give version of this daemon */
    402 	    printf("[in.identd, version %s]\r\n", version);
    403 	    exit(0);
    404 	    break;
    405 
    406 	  case 'v':    /* Be verbose */
    407 	    verbose_flag++;
    408 	    break;
    409 
    410 	  case 'd':    /* Enable debugging */
    411 	    debug_flag++;
    412 	    break;
    413 
    414 	  case 'm':    /* Enable multiline queries */
    415 	    multi_flag++;
    416 	    break;
    417 
    418 	  case 'N':    /* Enable users ".noident" files */
    419 	    noident_flag++;
    420 	    break;
    421 
    422 #ifdef INCLUDE_CRYPT
    423           case 'C':    /* Enable encryption. */
    424 	    {
    425 		FILE *keyfile;
    426 
    427 		if (argv[i][2])
    428 		    keyfile = fopen(argv[i]+2, "r");
    429 		else
    430 		    keyfile = fopen(PATH_DESKEY, "r");
    431 
    432 		if (keyfile == NULL)
    433 		{
    434 		    ERROR("cannot open key file for option -C");
    435 		}
    436 		else
    437 		{
    438 		    char buf[1024];
    439 
    440 		    if (fgets(buf, 1024, keyfile) == NULL)
    441 		    {
    442 			ERROR("cannot read key file for option -C");
    443 		    }
    444 		    else
    445 		    {
    446 			init_encryption(buf);
    447 			crypto_flag++;
    448 		    }
    449 		    fclose(keyfile);
    450 		}
    451 	    }
    452             break;
    453 #endif
    454 
    455 #ifdef ALLOW_FORMAT
    456 	  case 'n': /* Compatibility flag - just send the user number */
    457 	    format_flag = 1;
    458 	    format = "%U";
    459 	    break;
    460 
    461           case 'F':    /* Output format */
    462 	    format_flag = 1;
    463 	    format = argv[i]+2;
    464 	    break;
    465 #endif
    466 
    467 	  case 'L':	/* lie brazenly */
    468 	    liar_flag = 1;
    469 	    if (*(argv[i]+2) != '\0')
    470 		lie_string = argv[i]+2;
    471 	    else
    472 #ifdef DEFAULT_LIE_USER
    473 		lie_string = DEFAULT_LIE_USER;
    474 #else
    475 		ERROR("-L specified with no user name");
    476 #endif
    477 	    break;
    478 
    479 	  default:
    480 	    ERROR1("Bad option %s", argv[i]);
    481 	    break;
    482 	}
    483     }
    484 
    485 #if defined(_AUX_SOURCE) || defined (SUNOS35)
    486     /* A/UX 2.0* & SunOS 3.5 calls us with an argument XXXXXXXX.YYYY
    487     ** where XXXXXXXXX is the hexadecimal version of the callers
    488     ** IP number, and YYYY is the port/socket or something.
    489     ** It seems to be impossible to pass arguments to a daemon started
    490     ** by inetd.
    491     **
    492     ** Just in case it is started from something else, then we only
    493     ** skip the argument if no option flags have been seen.
    494     */
    495     if (opt_count == 0)
    496 	argc--;
    497 #endif
    498 
    499     /*
    500     ** Path to kernel namelist file specified on command line
    501     */
    502     if (i < argc)
    503 	path_unix = argv[i++];
    504 
    505     /*
    506     ** Path to kernel memory device specified on command line
    507     */
    508     if (i < argc)
    509 	path_kmem = argv[i++];
    510 
    511 
    512     if (i < argc)
    513 	ERROR1("Too many arguments: ignored from %s", argv[i]);
    514 
    515 
    516     /*
    517     ** We used to call k_open here. But then the file descriptor
    518     ** kd->fd open on /dev/kmem is shared by all child processes.
    519     ** From the fork(2) man page:
    520     **      o  The child process has its own copy of the parent's descriptors.  These
    521     **         descriptors reference the same underlying objects.  For instance, file
    522     **         pointers in file objects are shared between the child and the parent
    523     **         so that an lseek(2) on a descriptor in the child process can affect a
    524     **         subsequent read(2) or write(2) by the parent.
    525     ** Thus with concurrent (simultaneous) identd client processes,
    526     ** they step on each other's toes when they use kvm_read.
    527     **
    528     ** Calling k_open here was a mistake for another reason too: we
    529     ** did not yet honor -u and -g options. Presumably we are
    530     ** running as root (unless the in.identd file is setuid), and
    531     ** then we can open kmem regardless of -u and -g values.
    532     **
    533     **
    534     ** Open the kernel memory device and read the nlist table
    535     **
    536     **     if (k_open() < 0)
    537     ** 		ERROR("main: k_open");
    538     */
    539 
    540     /*
    541     ** Do the special handling needed for the "-b" flag
    542     */
    543     if (background_flag == 1)
    544     {
    545 	struct sockaddr_in addr;
    546 	struct servent *sp;
    547 	int fd;
    548 
    549 
    550 	if (!debug_flag)
    551 	{
    552 	    if (fork())
    553 		exit(0);
    554 
    555 	    close(0);
    556 	    close(1);
    557 	    close(2);
    558 
    559 	    if (fork())
    560 		exit(0);
    561 	}
    562 
    563 	fd = socket(AF_INET, SOCK_STREAM, 0);
    564 	if (fd == -1)
    565 	    ERROR("main: socket");
    566 
    567 	if (fd != 0)
    568 	    dup2(fd, 0);
    569 
    570 	clearmem((void *) &addr, (int) sizeof(addr));
    571 
    572 	addr.sin_family = AF_INET;
    573 	if (bind_address == (char *) NULL)
    574 	    addr.sin_addr.s_addr = htonl(INADDR_ANY);
    575 	else
    576 	{
    577 	    if (isdigit(bind_address[0]))
    578 		addr.sin_addr.s_addr = inet_addr(bind_address);
    579 	    else
    580 	    {
    581 		struct hostent *hp;
    582 
    583 		hp = gethostbyname(bind_address);
    584 		if (!hp)
    585 		    ERROR1("no such address (%s) for -a switch", bind_address);
    586 
    587 		/* This is ugly, should use memcpy() or bcopy() but... */
    588 		addr.sin_addr.s_addr = * (unsigned long *) (hp->h_addr);
    589 	    }
    590 	}
    591 
    592 	if (isdigit(portno[0]))
    593 	    addr.sin_port = htons(atoi(portno));
    594 	else
    595 	{
    596 	    sp = getservbyname(portno, "tcp");
    597 	    if (sp == (struct servent *) NULL)
    598 		ERROR1("main: getservbyname: %s", portno);
    599 	    addr.sin_port = sp->s_port;
    600 	}
    601 
    602 #ifdef SO_REUSEADDR
    603 	setsockopt(0, SOL_SOCKET, SO_REUSEADDR, (void *) &one, sizeof(one));
    604 #endif
    605 
    606 	if (bind(0, (struct sockaddr *) &addr, sizeof(addr)) < 0)
    607 	    ERROR("main: bind");
    608     }
    609 
    610     if (background_flag)
    611     {
    612       if (listen(0, 3) < 0)
    613 	ERROR("main: listen");
    614     }
    615 
    616     if (set_gid)
    617     {
    618 	if (setgid(set_gid) == -1)
    619 	    ERROR("main: setgid");
    620 	/* Call me paranoid... PSz */
    621 	if (getgid() != set_gid)
    622 	    ERROR2("main: setgid failed: wanted %d, got GID %d", set_gid, getgid());
    623 	if (getegid() != set_gid)
    624 	    ERROR2("main: setgid failed: wanted %d, got EGID %d", set_gid, getegid());
    625     }
    626 
    627     if (set_uid)
    628     {
    629 	if (setuid(set_uid) == -1)
    630 	    ERROR("main: setuid");
    631 	/* Call me paranoid... PSz */
    632 	if (getuid() != set_uid)
    633 	    ERROR2("main: setuid failed: wanted %d, got UID %d", set_uid, getuid());
    634 	if (geteuid() != set_uid)
    635 	    ERROR2("main: setuid failed: wanted %d, got EUID %d", set_uid, geteuid());
    636     }
    637 
    638     if (syslog_flag) {
    639 #ifdef LOG_DAEMON
    640 	openlog("identd", LOG_PID, syslog_facility);
    641 #else
    642 	openlog("identd", LOG_PID);
    643 #endif
    644     }
    645     (void)getpwnam("xyzzy");
    646     (void)gethostbyname("xyzzy");
    647 
    648     /*
    649     ** Do some special handling if the "-b" or "-w" flags are used
    650     */
    651     if (background_flag)
    652     {
    653 	int nfds, fd;
    654 	struct pollfd set[1];
    655 	struct sockaddr sad;
    656 	int sadlen;
    657 
    658 
    659 	/*
    660 	** Set up the SIGCHLD signal child termination handler so
    661 	** that we can avoid zombie processes hanging around and
    662 	** handle childs terminating before being able to complete the
    663 	** handshake.
    664 	*/
    665 #if (defined(SVR4) || defined(hpux) || defined(__hpux) || defined(IRIX) || \
    666      defined(_CRAY) || defined(_AUX_SOURCE) || defined(sco) || \
    667 	 defined(LINUX))
    668 	signal(SIGCHLD, SIG_IGN);
    669 #else
    670 	signal(SIGCHLD, child_handler);
    671 #endif
    672 
    673 	set[0].fd = 0;
    674 	set[0].events = POLLIN;
    675 
    676 	/*
    677 	** Loop and dispatch client handling processes
    678 	*/
    679 	do
    680 	{
    681 #ifdef USE_SIGALARM
    682 	    /*
    683 	    ** Terminate if we've been idle for 'timeout' seconds
    684 	    */
    685 	    if (background_flag == 2 && timeout)
    686 	    {
    687 		signal(SIGALRM, alarm_handler);
    688 		alarm(timeout);
    689 	    }
    690 #endif
    691 
    692 	    /*
    693 	    ** Wait for a connection request to occur.
    694 	    ** Ignore EINTR (Interrupted System Call).
    695 	    */
    696 	    do
    697 	    {
    698 #ifndef USE_SIGALARM
    699 		if (timeout)
    700 		    nfds = poll(set, 1, timeout * 1000);
    701 		else
    702 #endif
    703 		nfds = poll(set, 1, INFTIM);
    704 	    } while (nfds < 0  && errno == EINTR);
    705 
    706 	    /*
    707 	    ** An error occurred in select? Just die
    708 	    */
    709 	    if (nfds < 0)
    710 		ERROR("main: poll");
    711 
    712 	    /*
    713 	    ** Timeout limit reached. Exit nicely
    714 	    */
    715 	    if (nfds == 0)
    716 		exit(0);
    717 
    718 #ifdef USE_SIGALARM
    719 	    /*
    720 	    ** Disable the alarm timeout
    721 	    */
    722 	    alarm(0);
    723 #endif
    724 
    725 	    /*
    726 	    ** Accept the new client
    727 	    */
    728 	    sadlen = sizeof(sad);
    729 	    errno = 0;
    730 	    fd = accept(0, &sad, &sadlen);
    731 	    if (fd == -1)
    732 		ERROR1("main: accept. errno = %d", errno);
    733 
    734 	    /*
    735 	    ** And fork, then close the fd if we are the parent.
    736 	    */
    737 	    child_pid = fork();
    738 	} while (child_pid && (close(fd), 1));
    739 
    740 	/*
    741 	** We are now in child, the parent has returned to "do" above.
    742 	*/
    743 	if (dup2(fd, 0) == -1)
    744 	    ERROR("main: dup2: failed fd 0");
    745 
    746 	if (dup2(fd, 1) == -1)
    747 	    ERROR("main: dup2: failed fd 1");
    748 
    749 	if (dup2(fd, 2) == -1)
    750 	    ERROR("main: dup2: failed fd 2");
    751     }
    752 
    753     /*
    754     ** Get foreign internet address
    755     */
    756     len = sizeof(sin);
    757     if (getpeername(0, (struct sockaddr *) &sin, &len) == -1)
    758     {
    759 	/*
    760 	** A user has tried to start us from the command line or
    761 	** the network link died, in which case this message won't
    762 	** reach to other end anyway, so lets give the poor user some
    763 	** errors.
    764 	*/
    765 	perror("in.identd: getpeername()");
    766 	exit(1);
    767     }
    768 
    769     faddr = sin.sin_addr;
    770 
    771 
    772 #ifdef STRONG_LOG
    773     if (syslog_flag)
    774 	syslog(LOG_INFO, "Connection from %s", gethost(&faddr));
    775 #endif
    776 
    777 
    778     /*
    779     ** Get local internet address
    780     */
    781     len = sizeof(sin);
    782 #ifdef ATTSVR4
    783     if (t_getsockname(0, (struct sockaddr *) &sin, &len) == -1)
    784 #else
    785     if (getsockname(0, (struct sockaddr *) &sin, &len) == -1)
    786 #endif
    787     {
    788 	/*
    789 	** We can just die here, because if this fails then the
    790 	** network has died and we haven't got anyone to return
    791 	** errors to.
    792 	*/
    793 	exit(1);
    794     }
    795     laddr = sin.sin_addr;
    796 
    797 
    798     /*
    799     ** Get the local/foreign port pair from the luser
    800     */
    801     parse(stdin, &laddr, &faddr);
    802 
    803     exit(0);
    804 }
    805