Home | History | Annotate | Line # | Download | only in rexecd
rexecd.c revision 1.5
      1  1.5  mrg /*	$NetBSD: rexecd.c,v 1.5 1998/07/04 19:03:20 mrg Exp $	*/
      2  1.4  mrg 
      3  1.1  cgd /*
      4  1.4  mrg  * Copyright (c) 1983, 1993
      5  1.4  mrg  *	The Regents of the University of California.  All rights reserved.
      6  1.1  cgd  *
      7  1.1  cgd  * Redistribution and use in source and binary forms, with or without
      8  1.1  cgd  * modification, are permitted provided that the following conditions
      9  1.1  cgd  * are met:
     10  1.1  cgd  * 1. Redistributions of source code must retain the above copyright
     11  1.1  cgd  *    notice, this list of conditions and the following disclaimer.
     12  1.1  cgd  * 2. Redistributions in binary form must reproduce the above copyright
     13  1.1  cgd  *    notice, this list of conditions and the following disclaimer in the
     14  1.1  cgd  *    documentation and/or other materials provided with the distribution.
     15  1.1  cgd  * 3. All advertising materials mentioning features or use of this software
     16  1.1  cgd  *    must display the following acknowledgement:
     17  1.1  cgd  *	This product includes software developed by the University of
     18  1.1  cgd  *	California, Berkeley and its contributors.
     19  1.1  cgd  * 4. Neither the name of the University nor the names of its contributors
     20  1.1  cgd  *    may be used to endorse or promote products derived from this software
     21  1.1  cgd  *    without specific prior written permission.
     22  1.1  cgd  *
     23  1.1  cgd  * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
     24  1.1  cgd  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
     25  1.1  cgd  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
     26  1.1  cgd  * ARE DISCLAIMED.  IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
     27  1.1  cgd  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
     28  1.1  cgd  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
     29  1.1  cgd  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
     30  1.1  cgd  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
     31  1.1  cgd  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
     32  1.1  cgd  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
     33  1.1  cgd  * SUCH DAMAGE.
     34  1.1  cgd  */
     35  1.1  cgd 
     36  1.4  mrg #include <sys/cdefs.h>
     37  1.1  cgd #ifndef lint
     38  1.4  mrg __COPYRIGHT("@(#) Copyright (c) 1983, 1993\n\
     39  1.4  mrg 	The Regents of the University of California.  All rights reserved.\n");
     40  1.4  mrg #if 0
     41  1.4  mrg static char sccsid[] = "from: @(#)rexecd.c	8.1 (Berkeley) 6/4/93";
     42  1.4  mrg #else
     43  1.5  mrg __RCSID("$NetBSD: rexecd.c,v 1.5 1998/07/04 19:03:20 mrg Exp $");
     44  1.4  mrg #endif
     45  1.1  cgd #endif /* not lint */
     46  1.1  cgd 
     47  1.1  cgd #include <sys/param.h>
     48  1.1  cgd #include <sys/ioctl.h>
     49  1.5  mrg #include <sys/poll.h>
     50  1.1  cgd #include <sys/socket.h>
     51  1.5  mrg #include <sys/syslog.h>
     52  1.1  cgd #include <sys/time.h>
     53  1.4  mrg 
     54  1.1  cgd #include <netinet/in.h>
     55  1.4  mrg 
     56  1.5  mrg #include <err.h>
     57  1.4  mrg #include <errno.h>
     58  1.1  cgd #include <netdb.h>
     59  1.4  mrg #include <paths.h>
     60  1.1  cgd #include <pwd.h>
     61  1.4  mrg #include <signal.h>
     62  1.1  cgd #include <stdio.h>
     63  1.1  cgd #include <stdlib.h>
     64  1.1  cgd #include <string.h>
     65  1.4  mrg #include <unistd.h>
     66  1.1  cgd 
     67  1.4  mrg void error __P((const char *, ...));
     68  1.4  mrg int main __P((int, char **));
     69  1.4  mrg void doit __P((int, struct sockaddr_in *));
     70  1.4  mrg void getstr __P((char *, int, char *));
     71  1.1  cgd 
     72  1.5  mrg char	username[32 + 1] = "USER=";
     73  1.5  mrg char	homedir[PATH_MAX + 1] = "HOME=";
     74  1.5  mrg char	shell[PATH_MAX + 1] = "SHELL=";
     75  1.5  mrg char	path[sizeof(_PATH_DEFPATH) + sizeof("PATH=")] = "PATH=";
     76  1.5  mrg char	*envinit[] = { homedir, shell, path, username, 0 };
     77  1.5  mrg char	**environ;
     78  1.5  mrg int	log;
     79  1.5  mrg struct	sockaddr_in asin = { AF_INET };
     80  1.5  mrg 
     81  1.1  cgd /*
     82  1.1  cgd  * remote execute server:
     83  1.1  cgd  *	username\0
     84  1.1  cgd  *	password\0
     85  1.1  cgd  *	command\0
     86  1.1  cgd  *	data
     87  1.1  cgd  */
     88  1.4  mrg int
     89  1.1  cgd main(argc, argv)
     90  1.1  cgd 	int argc;
     91  1.1  cgd 	char **argv;
     92  1.1  cgd {
     93  1.1  cgd 	struct sockaddr_in from;
     94  1.5  mrg 	int fromlen, ch;
     95  1.5  mrg 
     96  1.5  mrg 	while ((ch = getopt(argc, argv, "l")) != -1)
     97  1.5  mrg 		switch (ch) {
     98  1.5  mrg 		case 'l':
     99  1.5  mrg 			log = 1;
    100  1.5  mrg 			openlog("rexecd", LOG_PID, LOG_DAEMON);
    101  1.5  mrg 			break;
    102  1.5  mrg 		default:
    103  1.5  mrg 			exit(1);
    104  1.5  mrg 		}
    105  1.1  cgd 
    106  1.1  cgd 	fromlen = sizeof (from);
    107  1.5  mrg 	if (getpeername(0, (struct sockaddr *)&from, &fromlen) < 0)
    108  1.5  mrg 		err(1, "getpeername");
    109  1.5  mrg 
    110  1.1  cgd 	doit(0, &from);
    111  1.4  mrg 	exit(0);
    112  1.1  cgd }
    113  1.1  cgd 
    114  1.4  mrg void
    115  1.1  cgd doit(f, fromp)
    116  1.1  cgd 	int f;
    117  1.1  cgd 	struct sockaddr_in *fromp;
    118  1.1  cgd {
    119  1.5  mrg 	struct pollfd fds[2];
    120  1.1  cgd 	char cmdbuf[NCARGS+1], *cp, *namep;
    121  1.1  cgd 	char user[16], pass[16];
    122  1.5  mrg 	char buf[BUFSIZ], sig;
    123  1.1  cgd 	struct passwd *pwd;
    124  1.4  mrg 	int s = -1; /* XXX gcc */
    125  1.5  mrg 	int pv[2], pid, cc;
    126  1.1  cgd 	int one = 1;
    127  1.5  mrg 	in_port_t port;
    128  1.1  cgd 
    129  1.5  mrg 	(void)signal(SIGINT, SIG_DFL);
    130  1.5  mrg 	(void)signal(SIGQUIT, SIG_DFL);
    131  1.5  mrg 	(void)signal(SIGTERM, SIG_DFL);
    132  1.1  cgd 	dup2(f, 0);
    133  1.1  cgd 	dup2(f, 1);
    134  1.1  cgd 	dup2(f, 2);
    135  1.5  mrg 	(void)alarm(60);
    136  1.1  cgd 	port = 0;
    137  1.1  cgd 	for (;;) {
    138  1.1  cgd 		char c;
    139  1.5  mrg 		if (read(f, &c, 1) != 1) {
    140  1.5  mrg 			if (log)
    141  1.5  mrg 				syslog(LOG_ERR,
    142  1.5  mrg 				    "initial read failed");
    143  1.1  cgd 			exit(1);
    144  1.5  mrg 		}
    145  1.1  cgd 		if (c == 0)
    146  1.1  cgd 			break;
    147  1.1  cgd 		port = port * 10 + c - '0';
    148  1.1  cgd 	}
    149  1.5  mrg 	(void)alarm(0);
    150  1.1  cgd 	if (port != 0) {
    151  1.1  cgd 		s = socket(AF_INET, SOCK_STREAM, 0);
    152  1.5  mrg 		if (s < 0) {
    153  1.5  mrg 			if (log)
    154  1.5  mrg 				syslog(LOG_ERR, "socket: %m");
    155  1.1  cgd 			exit(1);
    156  1.5  mrg 		}
    157  1.5  mrg 		if (bind(s, (struct sockaddr *)&asin, sizeof (asin)) < 0) {
    158  1.5  mrg 			if (log)
    159  1.5  mrg 				syslog(LOG_ERR, "bind: %m");
    160  1.1  cgd 			exit(1);
    161  1.5  mrg 		}
    162  1.5  mrg 		(void)alarm(60);
    163  1.1  cgd 		fromp->sin_port = htons(port);
    164  1.5  mrg 		if (connect(s, (struct sockaddr *)fromp, sizeof (*fromp)) < 0) {
    165  1.5  mrg 			if (log)
    166  1.5  mrg 				syslog(LOG_ERR, "connect: %m");
    167  1.1  cgd 			exit(1);
    168  1.5  mrg 		}
    169  1.5  mrg 		(void)alarm(0);
    170  1.1  cgd 	}
    171  1.1  cgd 	getstr(user, sizeof(user), "username");
    172  1.1  cgd 	getstr(pass, sizeof(pass), "password");
    173  1.1  cgd 	getstr(cmdbuf, sizeof(cmdbuf), "command");
    174  1.1  cgd 	setpwent();
    175  1.1  cgd 	pwd = getpwnam(user);
    176  1.1  cgd 	if (pwd == NULL) {
    177  1.1  cgd 		error("Login incorrect.\n");
    178  1.5  mrg 		if (log)
    179  1.5  mrg 			syslog(LOG_ERR, "no such user %s", user);
    180  1.1  cgd 		exit(1);
    181  1.1  cgd 	}
    182  1.1  cgd 	endpwent();
    183  1.1  cgd 	if (*pwd->pw_passwd != '\0') {
    184  1.1  cgd 		namep = crypt(pass, pwd->pw_passwd);
    185  1.1  cgd 		if (strcmp(namep, pwd->pw_passwd)) {
    186  1.5  mrg 			error("Password incorrect.\n");	/* XXX: wrong! */
    187  1.5  mrg 			if (log)
    188  1.5  mrg 				syslog(LOG_ERR, "incorrect password for %s",
    189  1.5  mrg 				    user);
    190  1.1  cgd 			exit(1);
    191  1.1  cgd 		}
    192  1.5  mrg 	} else
    193  1.5  mrg 		(void)crypt("dummy password", "PA");	/* must always crypt */
    194  1.1  cgd 	if (chdir(pwd->pw_dir) < 0) {
    195  1.1  cgd 		error("No remote directory.\n");
    196  1.5  mrg 		if (log)
    197  1.5  mrg 			syslog(LOG_ERR, "%s does not exist for %s", pwd->pw_dir,
    198  1.5  mrg 			    user);
    199  1.1  cgd 		exit(1);
    200  1.1  cgd 	}
    201  1.5  mrg 	(void)write(2, "\0", 1);
    202  1.1  cgd 	if (port) {
    203  1.5  mrg 		if (pipe(pv) < 0 || (pid = fork()) == -1) {
    204  1.1  cgd 			error("Try again.\n");
    205  1.5  mrg 			if (log)
    206  1.5  mrg 				syslog(LOG_ERR,"pipe or fork failed for %s: %m",
    207  1.5  mrg 				    user);
    208  1.1  cgd 			exit(1);
    209  1.1  cgd 		}
    210  1.1  cgd 		if (pid) {
    211  1.5  mrg 			(void)close(0);
    212  1.5  mrg 			(void)close(1);
    213  1.5  mrg 			(void)close(2);
    214  1.5  mrg 			(void)close(f);
    215  1.5  mrg 			(void)close(pv[1]);
    216  1.5  mrg 			fds[0].fd = s;
    217  1.5  mrg 			fds[1].fd = pv[0];
    218  1.5  mrg 			fds[0].events = fds[1].events = POLLIN;
    219  1.5  mrg 			if (ioctl(pv[1], FIONBIO, (char *)&one) < 0)
    220  1.5  mrg 				_exit(-1);
    221  1.1  cgd 			/* should set s nbio! */
    222  1.1  cgd 			do {
    223  1.5  mrg 				if (poll(fds, 2, 0) < 0) {
    224  1.5  mrg 					close(s);
    225  1.5  mrg 					close(pv[0]);
    226  1.5  mrg 					_exit(-1);
    227  1.5  mrg 				}
    228  1.5  mrg 				if (fds[0].revents & POLLIN) {
    229  1.1  cgd 					if (read(s, &sig, 1) <= 0)
    230  1.5  mrg 						fds[0].events = 0;
    231  1.1  cgd 					else
    232  1.1  cgd 						killpg(pid, sig);
    233  1.1  cgd 				}
    234  1.5  mrg 				if (fds[1].revents & POLLIN) {
    235  1.1  cgd 					cc = read(pv[0], buf, sizeof (buf));
    236  1.1  cgd 					if (cc <= 0) {
    237  1.1  cgd 						shutdown(s, 1+1);
    238  1.5  mrg 						fds[1].events = 0;
    239  1.1  cgd 					} else
    240  1.5  mrg 						(void)write(s, buf, cc);
    241  1.1  cgd 				}
    242  1.5  mrg 			} while ((fds[0].events | fds[1].events) & POLLIN);
    243  1.5  mrg 			_exit(0);
    244  1.5  mrg 		}
    245  1.5  mrg 		(void)setpgrp(0, getpid());
    246  1.5  mrg 		(void)close(s);
    247  1.5  mrg 		(void)close(pv[0]);
    248  1.5  mrg 		if (dup2(pv[1], 2) < 0) {
    249  1.5  mrg 			error("Try again.\n");
    250  1.5  mrg 			if (log)
    251  1.5  mrg 				syslog(LOG_ERR, "dup2 failed for %s", user);
    252  1.5  mrg 			exit(1);
    253  1.1  cgd 		}
    254  1.1  cgd 	}
    255  1.1  cgd 	if (*pwd->pw_shell == '\0')
    256  1.1  cgd 		pwd->pw_shell = _PATH_BSHELL;
    257  1.1  cgd 	if (f > 2)
    258  1.5  mrg 		(void)close(f);
    259  1.5  mrg 	if (setlogin(pwd->pw_name) < 0 ||
    260  1.5  mrg 	    initgroups(pwd->pw_name, pwd->pw_gid) < 0 ||
    261  1.5  mrg 	    setgid((gid_t)pwd->pw_gid) < 0 ||
    262  1.5  mrg 	    setuid((uid_t)pwd->pw_uid) < 0) {
    263  1.5  mrg 		error("Try again.\n");
    264  1.5  mrg 		if (log)
    265  1.5  mrg 			syslog(LOG_ERR, "could not set permissions for %s: %m",
    266  1.5  mrg 			    user);
    267  1.5  mrg 		exit(1);
    268  1.5  mrg 	}
    269  1.1  cgd 	(void)strcat(path, _PATH_DEFPATH);
    270  1.1  cgd 	environ = envinit;
    271  1.5  mrg 	strncat(homedir, pwd->pw_dir, sizeof(homedir) - 6);
    272  1.5  mrg 	strncat(shell, pwd->pw_shell, sizeof(shell) - 7);
    273  1.5  mrg 	strncat(username, pwd->pw_name, sizeof(username) - 6);
    274  1.4  mrg 	cp = strrchr(pwd->pw_shell, '/');
    275  1.1  cgd 	if (cp)
    276  1.1  cgd 		cp++;
    277  1.1  cgd 	else
    278  1.1  cgd 		cp = pwd->pw_shell;
    279  1.5  mrg 	if (log)
    280  1.5  mrg 		syslog(LOG_INFO, "running command for %s: %s", user, cmdbuf);
    281  1.1  cgd 	execl(pwd->pw_shell, cp, "-c", cmdbuf, 0);
    282  1.1  cgd 	perror(pwd->pw_shell);
    283  1.5  mrg 	if (log)
    284  1.5  mrg 		syslog(LOG_ERR, "execl failed for %s: %m", user);
    285  1.1  cgd 	exit(1);
    286  1.1  cgd }
    287  1.1  cgd 
    288  1.4  mrg #ifdef __STDC__
    289  1.4  mrg #include <stdarg.h>
    290  1.4  mrg #else
    291  1.4  mrg #include <varargs.h>
    292  1.4  mrg #endif
    293  1.4  mrg 
    294  1.4  mrg void
    295  1.4  mrg #ifdef __STDC__
    296  1.4  mrg error(const char *fmt, ...)
    297  1.4  mrg #else
    298  1.4  mrg error(fmt, va_alist)
    299  1.1  cgd 	char *fmt;
    300  1.4  mrg 	va_dcl
    301  1.4  mrg #endif
    302  1.1  cgd {
    303  1.1  cgd 	char buf[BUFSIZ];
    304  1.4  mrg 	va_list ap;
    305  1.4  mrg 
    306  1.4  mrg #ifdef __STDC__
    307  1.4  mrg 	va_start(ap, fmt);
    308  1.4  mrg #else
    309  1.4  mrg 	va_start(ap);
    310  1.4  mrg #endif
    311  1.1  cgd 
    312  1.1  cgd 	buf[0] = 1;
    313  1.5  mrg 	(void)vsnprintf(buf+1, sizeof(buf) - 1, fmt, ap);
    314  1.4  mrg 	(void)write(2, buf, strlen(buf));
    315  1.1  cgd }
    316  1.1  cgd 
    317  1.4  mrg void
    318  1.1  cgd getstr(buf, cnt, err)
    319  1.1  cgd 	char *buf;
    320  1.1  cgd 	int cnt;
    321  1.1  cgd 	char *err;
    322  1.1  cgd {
    323  1.1  cgd 	char c;
    324  1.1  cgd 
    325  1.1  cgd 	do {
    326  1.1  cgd 		if (read(0, &c, 1) != 1)
    327  1.1  cgd 			exit(1);
    328  1.1  cgd 		*buf++ = c;
    329  1.1  cgd 		if (--cnt == 0) {
    330  1.1  cgd 			error("%s too long\n", err);
    331  1.1  cgd 			exit(1);
    332  1.1  cgd 		}
    333  1.1  cgd 	} while (c != 0);
    334  1.1  cgd }
    335