Home | History | Annotate | Line # | Download | only in rexecd
rexecd.c revision 1.14
      1  1.14  thorpej /*	$NetBSD: rexecd.c,v 1.14 2002/12/06 02:01:35 thorpej Exp $	*/
      2   1.4      mrg 
      3   1.1      cgd /*
      4   1.4      mrg  * Copyright (c) 1983, 1993
      5   1.4      mrg  *	The Regents of the University of California.  All rights reserved.
      6   1.1      cgd  *
      7   1.1      cgd  * Redistribution and use in source and binary forms, with or without
      8   1.1      cgd  * modification, are permitted provided that the following conditions
      9   1.1      cgd  * are met:
     10   1.1      cgd  * 1. Redistributions of source code must retain the above copyright
     11   1.1      cgd  *    notice, this list of conditions and the following disclaimer.
     12   1.1      cgd  * 2. Redistributions in binary form must reproduce the above copyright
     13   1.1      cgd  *    notice, this list of conditions and the following disclaimer in the
     14   1.1      cgd  *    documentation and/or other materials provided with the distribution.
     15   1.1      cgd  * 3. All advertising materials mentioning features or use of this software
     16   1.1      cgd  *    must display the following acknowledgement:
     17   1.1      cgd  *	This product includes software developed by the University of
     18   1.1      cgd  *	California, Berkeley and its contributors.
     19   1.1      cgd  * 4. Neither the name of the University nor the names of its contributors
     20   1.1      cgd  *    may be used to endorse or promote products derived from this software
     21   1.1      cgd  *    without specific prior written permission.
     22   1.1      cgd  *
     23   1.1      cgd  * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
     24   1.1      cgd  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
     25   1.1      cgd  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
     26   1.1      cgd  * ARE DISCLAIMED.  IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
     27   1.1      cgd  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
     28   1.1      cgd  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
     29   1.1      cgd  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
     30   1.1      cgd  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
     31   1.1      cgd  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
     32   1.1      cgd  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
     33   1.1      cgd  * SUCH DAMAGE.
     34   1.1      cgd  */
     35   1.1      cgd 
     36   1.4      mrg #include <sys/cdefs.h>
     37   1.1      cgd #ifndef lint
     38   1.4      mrg __COPYRIGHT("@(#) Copyright (c) 1983, 1993\n\
     39   1.4      mrg 	The Regents of the University of California.  All rights reserved.\n");
     40   1.4      mrg #if 0
     41   1.4      mrg static char sccsid[] = "from: @(#)rexecd.c	8.1 (Berkeley) 6/4/93";
     42   1.4      mrg #else
     43  1.14  thorpej __RCSID("$NetBSD: rexecd.c,v 1.14 2002/12/06 02:01:35 thorpej Exp $");
     44   1.4      mrg #endif
     45   1.1      cgd #endif /* not lint */
     46   1.1      cgd 
     47   1.1      cgd #include <sys/param.h>
     48   1.1      cgd #include <sys/ioctl.h>
     49   1.1      cgd #include <sys/socket.h>
     50   1.5      mrg #include <sys/syslog.h>
     51   1.1      cgd #include <sys/time.h>
     52   1.4      mrg 
     53   1.1      cgd #include <netinet/in.h>
     54   1.4      mrg 
     55   1.5      mrg #include <err.h>
     56   1.4      mrg #include <errno.h>
     57   1.1      cgd #include <netdb.h>
     58   1.4      mrg #include <paths.h>
     59   1.1      cgd #include <pwd.h>
     60   1.4      mrg #include <signal.h>
     61  1.10      wiz #include <stdarg.h>
     62   1.1      cgd #include <stdio.h>
     63   1.1      cgd #include <stdlib.h>
     64   1.1      cgd #include <string.h>
     65   1.4      mrg #include <unistd.h>
     66  1.12   itojun #include <poll.h>
     67   1.1      cgd 
     68   1.7       is void error __P((const char *, ...))
     69   1.7       is      __attribute__((__format__(__printf__, 1, 2)));
     70   1.4      mrg int main __P((int, char **));
     71  1.11   itojun void doit __P((int, struct sockaddr *));
     72   1.4      mrg void getstr __P((char *, int, char *));
     73   1.1      cgd 
     74   1.5      mrg char	username[32 + 1] = "USER=";
     75   1.5      mrg char	homedir[PATH_MAX + 1] = "HOME=";
     76   1.5      mrg char	shell[PATH_MAX + 1] = "SHELL=";
     77   1.5      mrg char	path[sizeof(_PATH_DEFPATH) + sizeof("PATH=")] = "PATH=";
     78   1.5      mrg char	*envinit[] = { homedir, shell, path, username, 0 };
     79   1.5      mrg char	**environ;
     80  1.14  thorpej int	dolog;
     81   1.5      mrg 
     82   1.1      cgd /*
     83   1.1      cgd  * remote execute server:
     84   1.1      cgd  *	username\0
     85   1.1      cgd  *	password\0
     86   1.1      cgd  *	command\0
     87   1.1      cgd  *	data
     88   1.1      cgd  */
     89   1.4      mrg int
     90   1.1      cgd main(argc, argv)
     91   1.1      cgd 	int argc;
     92   1.1      cgd 	char **argv;
     93   1.1      cgd {
     94  1.11   itojun 	struct sockaddr_storage from;
     95   1.5      mrg 	int fromlen, ch;
     96   1.5      mrg 
     97   1.5      mrg 	while ((ch = getopt(argc, argv, "l")) != -1)
     98   1.5      mrg 		switch (ch) {
     99   1.5      mrg 		case 'l':
    100  1.14  thorpej 			dolog = 1;
    101   1.5      mrg 			openlog("rexecd", LOG_PID, LOG_DAEMON);
    102   1.5      mrg 			break;
    103   1.5      mrg 		default:
    104   1.5      mrg 			exit(1);
    105   1.5      mrg 		}
    106   1.1      cgd 
    107   1.1      cgd 	fromlen = sizeof (from);
    108   1.5      mrg 	if (getpeername(0, (struct sockaddr *)&from, &fromlen) < 0)
    109   1.5      mrg 		err(1, "getpeername");
    110   1.5      mrg 
    111  1.11   itojun 	doit(0, (struct sockaddr *)&from);
    112   1.4      mrg 	exit(0);
    113   1.1      cgd }
    114   1.1      cgd 
    115   1.4      mrg void
    116   1.1      cgd doit(f, fromp)
    117   1.1      cgd 	int f;
    118  1.11   itojun 	struct sockaddr *fromp;
    119   1.1      cgd {
    120   1.5      mrg 	struct pollfd fds[2];
    121   1.6  mycroft 	char cmdbuf[NCARGS+1], *namep;
    122   1.6  mycroft 	const char *cp;
    123   1.1      cgd 	char user[16], pass[16];
    124   1.5      mrg 	char buf[BUFSIZ], sig;
    125   1.1      cgd 	struct passwd *pwd;
    126   1.4      mrg 	int s = -1; /* XXX gcc */
    127   1.5      mrg 	int pv[2], pid, cc;
    128   1.1      cgd 	int one = 1;
    129   1.5      mrg 	in_port_t port;
    130   1.1      cgd 
    131   1.5      mrg 	(void)signal(SIGINT, SIG_DFL);
    132   1.5      mrg 	(void)signal(SIGQUIT, SIG_DFL);
    133   1.5      mrg 	(void)signal(SIGTERM, SIG_DFL);
    134   1.1      cgd 	dup2(f, 0);
    135   1.1      cgd 	dup2(f, 1);
    136   1.1      cgd 	dup2(f, 2);
    137   1.5      mrg 	(void)alarm(60);
    138   1.1      cgd 	port = 0;
    139   1.1      cgd 	for (;;) {
    140   1.1      cgd 		char c;
    141   1.5      mrg 		if (read(f, &c, 1) != 1) {
    142  1.14  thorpej 			if (dolog)
    143   1.5      mrg 				syslog(LOG_ERR,
    144   1.5      mrg 				    "initial read failed");
    145   1.1      cgd 			exit(1);
    146   1.5      mrg 		}
    147   1.1      cgd 		if (c == 0)
    148   1.1      cgd 			break;
    149   1.1      cgd 		port = port * 10 + c - '0';
    150   1.1      cgd 	}
    151   1.5      mrg 	(void)alarm(0);
    152   1.1      cgd 	if (port != 0) {
    153  1.11   itojun 		s = socket(fromp->sa_family, SOCK_STREAM, 0);
    154   1.5      mrg 		if (s < 0) {
    155  1.14  thorpej 			if (dolog)
    156   1.5      mrg 				syslog(LOG_ERR, "socket: %m");
    157   1.1      cgd 			exit(1);
    158   1.5      mrg 		}
    159  1.11   itojun 		(void)alarm(60);
    160  1.11   itojun 		switch (fromp->sa_family) {
    161  1.11   itojun 		case AF_INET:
    162  1.11   itojun 			((struct sockaddr_in *)fromp)->sin_port = htons(port);
    163  1.11   itojun 			break;
    164  1.11   itojun 		case AF_INET6:
    165  1.11   itojun 			((struct sockaddr_in6 *)fromp)->sin6_port = htons(port);
    166  1.11   itojun 			break;
    167  1.11   itojun 		default:
    168  1.11   itojun 			syslog(LOG_ERR, "unsupported address family");
    169   1.1      cgd 			exit(1);
    170   1.5      mrg 		}
    171  1.11   itojun 		if (connect(s, (struct sockaddr *)fromp, fromp->sa_len) < 0) {
    172  1.14  thorpej 			if (dolog)
    173   1.5      mrg 				syslog(LOG_ERR, "connect: %m");
    174   1.1      cgd 			exit(1);
    175   1.5      mrg 		}
    176   1.5      mrg 		(void)alarm(0);
    177   1.1      cgd 	}
    178   1.1      cgd 	getstr(user, sizeof(user), "username");
    179   1.1      cgd 	getstr(pass, sizeof(pass), "password");
    180   1.1      cgd 	getstr(cmdbuf, sizeof(cmdbuf), "command");
    181   1.1      cgd 	setpwent();
    182   1.1      cgd 	pwd = getpwnam(user);
    183   1.1      cgd 	if (pwd == NULL) {
    184   1.1      cgd 		error("Login incorrect.\n");
    185  1.14  thorpej 		if (dolog)
    186   1.5      mrg 			syslog(LOG_ERR, "no such user %s", user);
    187   1.1      cgd 		exit(1);
    188   1.1      cgd 	}
    189   1.1      cgd 	endpwent();
    190   1.1      cgd 	if (*pwd->pw_passwd != '\0') {
    191   1.1      cgd 		namep = crypt(pass, pwd->pw_passwd);
    192   1.1      cgd 		if (strcmp(namep, pwd->pw_passwd)) {
    193   1.5      mrg 			error("Password incorrect.\n");	/* XXX: wrong! */
    194  1.14  thorpej 			if (dolog)
    195   1.5      mrg 				syslog(LOG_ERR, "incorrect password for %s",
    196   1.5      mrg 				    user);
    197   1.1      cgd 			exit(1);
    198   1.1      cgd 		}
    199   1.5      mrg 	} else
    200   1.5      mrg 		(void)crypt("dummy password", "PA");	/* must always crypt */
    201   1.1      cgd 	if (chdir(pwd->pw_dir) < 0) {
    202   1.1      cgd 		error("No remote directory.\n");
    203  1.14  thorpej 		if (dolog)
    204   1.5      mrg 			syslog(LOG_ERR, "%s does not exist for %s", pwd->pw_dir,
    205   1.5      mrg 			    user);
    206   1.1      cgd 		exit(1);
    207   1.1      cgd 	}
    208   1.5      mrg 	(void)write(2, "\0", 1);
    209   1.1      cgd 	if (port) {
    210   1.5      mrg 		if (pipe(pv) < 0 || (pid = fork()) == -1) {
    211   1.1      cgd 			error("Try again.\n");
    212  1.14  thorpej 			if (dolog)
    213   1.5      mrg 				syslog(LOG_ERR,"pipe or fork failed for %s: %m",
    214   1.5      mrg 				    user);
    215   1.1      cgd 			exit(1);
    216   1.1      cgd 		}
    217   1.1      cgd 		if (pid) {
    218   1.5      mrg 			(void)close(0);
    219   1.5      mrg 			(void)close(1);
    220   1.5      mrg 			(void)close(2);
    221   1.5      mrg 			(void)close(f);
    222   1.5      mrg 			(void)close(pv[1]);
    223   1.5      mrg 			fds[0].fd = s;
    224   1.5      mrg 			fds[1].fd = pv[0];
    225   1.5      mrg 			fds[0].events = fds[1].events = POLLIN;
    226   1.5      mrg 			if (ioctl(pv[1], FIONBIO, (char *)&one) < 0)
    227   1.8      wiz 				_exit(1);
    228   1.1      cgd 			/* should set s nbio! */
    229   1.1      cgd 			do {
    230   1.5      mrg 				if (poll(fds, 2, 0) < 0) {
    231   1.5      mrg 					close(s);
    232   1.5      mrg 					close(pv[0]);
    233   1.8      wiz 					_exit(1);
    234   1.5      mrg 				}
    235   1.5      mrg 				if (fds[0].revents & POLLIN) {
    236   1.1      cgd 					if (read(s, &sig, 1) <= 0)
    237   1.5      mrg 						fds[0].events = 0;
    238   1.1      cgd 					else
    239   1.1      cgd 						killpg(pid, sig);
    240   1.1      cgd 				}
    241   1.5      mrg 				if (fds[1].revents & POLLIN) {
    242   1.1      cgd 					cc = read(pv[0], buf, sizeof (buf));
    243   1.1      cgd 					if (cc <= 0) {
    244   1.1      cgd 						shutdown(s, 1+1);
    245   1.5      mrg 						fds[1].events = 0;
    246   1.1      cgd 					} else
    247   1.5      mrg 						(void)write(s, buf, cc);
    248   1.1      cgd 				}
    249   1.5      mrg 			} while ((fds[0].events | fds[1].events) & POLLIN);
    250   1.5      mrg 			_exit(0);
    251   1.5      mrg 		}
    252   1.5      mrg 		(void)setpgrp(0, getpid());
    253   1.5      mrg 		(void)close(s);
    254   1.5      mrg 		(void)close(pv[0]);
    255   1.5      mrg 		if (dup2(pv[1], 2) < 0) {
    256   1.5      mrg 			error("Try again.\n");
    257  1.14  thorpej 			if (dolog)
    258   1.5      mrg 				syslog(LOG_ERR, "dup2 failed for %s", user);
    259   1.5      mrg 			exit(1);
    260   1.1      cgd 		}
    261   1.1      cgd 	}
    262   1.1      cgd 	if (*pwd->pw_shell == '\0')
    263   1.1      cgd 		pwd->pw_shell = _PATH_BSHELL;
    264   1.1      cgd 	if (f > 2)
    265   1.5      mrg 		(void)close(f);
    266   1.5      mrg 	if (setlogin(pwd->pw_name) < 0 ||
    267   1.5      mrg 	    initgroups(pwd->pw_name, pwd->pw_gid) < 0 ||
    268   1.5      mrg 	    setgid((gid_t)pwd->pw_gid) < 0 ||
    269   1.5      mrg 	    setuid((uid_t)pwd->pw_uid) < 0) {
    270   1.5      mrg 		error("Try again.\n");
    271  1.14  thorpej 		if (dolog)
    272   1.5      mrg 			syslog(LOG_ERR, "could not set permissions for %s: %m",
    273   1.5      mrg 			    user);
    274   1.5      mrg 		exit(1);
    275   1.5      mrg 	}
    276   1.1      cgd 	(void)strcat(path, _PATH_DEFPATH);
    277   1.1      cgd 	environ = envinit;
    278   1.5      mrg 	strncat(homedir, pwd->pw_dir, sizeof(homedir) - 6);
    279   1.5      mrg 	strncat(shell, pwd->pw_shell, sizeof(shell) - 7);
    280   1.5      mrg 	strncat(username, pwd->pw_name, sizeof(username) - 6);
    281   1.4      mrg 	cp = strrchr(pwd->pw_shell, '/');
    282   1.1      cgd 	if (cp)
    283   1.1      cgd 		cp++;
    284   1.1      cgd 	else
    285   1.1      cgd 		cp = pwd->pw_shell;
    286  1.14  thorpej 	if (dolog)
    287   1.5      mrg 		syslog(LOG_INFO, "running command for %s: %s", user, cmdbuf);
    288   1.1      cgd 	execl(pwd->pw_shell, cp, "-c", cmdbuf, 0);
    289   1.1      cgd 	perror(pwd->pw_shell);
    290  1.14  thorpej 	if (dolog)
    291   1.5      mrg 		syslog(LOG_ERR, "execl failed for %s: %m", user);
    292   1.1      cgd 	exit(1);
    293   1.1      cgd }
    294   1.1      cgd 
    295   1.4      mrg void
    296   1.4      mrg error(const char *fmt, ...)
    297   1.1      cgd {
    298   1.1      cgd 	char buf[BUFSIZ];
    299   1.4      mrg 	va_list ap;
    300   1.4      mrg 
    301   1.4      mrg 	va_start(ap, fmt);
    302   1.1      cgd 	buf[0] = 1;
    303   1.5      mrg 	(void)vsnprintf(buf+1, sizeof(buf) - 1, fmt, ap);
    304   1.4      mrg 	(void)write(2, buf, strlen(buf));
    305   1.9      wiz 	va_end(ap);
    306   1.1      cgd }
    307   1.1      cgd 
    308   1.4      mrg void
    309   1.1      cgd getstr(buf, cnt, err)
    310   1.1      cgd 	char *buf;
    311   1.1      cgd 	int cnt;
    312   1.1      cgd 	char *err;
    313   1.1      cgd {
    314   1.1      cgd 	char c;
    315   1.1      cgd 
    316   1.1      cgd 	do {
    317   1.1      cgd 		if (read(0, &c, 1) != 1)
    318   1.1      cgd 			exit(1);
    319   1.1      cgd 		*buf++ = c;
    320   1.1      cgd 		if (--cnt == 0) {
    321   1.1      cgd 			error("%s too long\n", err);
    322   1.1      cgd 			exit(1);
    323   1.1      cgd 		}
    324   1.1      cgd 	} while (c != 0);
    325   1.1      cgd }
    326