inetd.c revision 1.57 1 1.57 itojun /* $NetBSD: inetd.c,v 1.57 2000/01/27 19:52:43 itojun Exp $ */
2 1.42 thorpej
3 1.42 thorpej /*-
4 1.42 thorpej * Copyright (c) 1998 The NetBSD Foundation, Inc.
5 1.42 thorpej * All rights reserved.
6 1.42 thorpej *
7 1.42 thorpej * This code is derived from software contributed to The NetBSD Foundation
8 1.42 thorpej * by Jason R. Thorpe of the Numerical Aerospace Simulation Facility,
9 1.42 thorpej * NASA Ames Research Center.
10 1.42 thorpej *
11 1.42 thorpej * Redistribution and use in source and binary forms, with or without
12 1.42 thorpej * modification, are permitted provided that the following conditions
13 1.42 thorpej * are met:
14 1.42 thorpej * 1. Redistributions of source code must retain the above copyright
15 1.42 thorpej * notice, this list of conditions and the following disclaimer.
16 1.42 thorpej * 2. Redistributions in binary form must reproduce the above copyright
17 1.42 thorpej * notice, this list of conditions and the following disclaimer in the
18 1.42 thorpej * documentation and/or other materials provided with the distribution.
19 1.42 thorpej * 3. All advertising materials mentioning features or use of this software
20 1.42 thorpej * must display the following acknowledgement:
21 1.42 thorpej * This product includes software developed by the NetBSD
22 1.42 thorpej * Foundation, Inc. and its contributors.
23 1.42 thorpej * 4. Neither the name of The NetBSD Foundation nor the names of its
24 1.42 thorpej * contributors may be used to endorse or promote products derived
25 1.42 thorpej * from this software without specific prior written permission.
26 1.42 thorpej *
27 1.42 thorpej * THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS
28 1.42 thorpej * ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
29 1.42 thorpej * TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
30 1.42 thorpej * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS
31 1.42 thorpej * BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
32 1.42 thorpej * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
33 1.42 thorpej * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
34 1.42 thorpej * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
35 1.42 thorpej * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
36 1.42 thorpej * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
37 1.42 thorpej * POSSIBILITY OF SUCH DAMAGE.
38 1.42 thorpej */
39 1.20 mycroft
40 1.1 cgd /*
41 1.23 mycroft * Copyright (c) 1983, 1991, 1993, 1994
42 1.23 mycroft * The Regents of the University of California. All rights reserved.
43 1.1 cgd *
44 1.1 cgd * Redistribution and use in source and binary forms, with or without
45 1.1 cgd * modification, are permitted provided that the following conditions
46 1.1 cgd * are met:
47 1.1 cgd * 1. Redistributions of source code must retain the above copyright
48 1.1 cgd * notice, this list of conditions and the following disclaimer.
49 1.1 cgd * 2. Redistributions in binary form must reproduce the above copyright
50 1.1 cgd * notice, this list of conditions and the following disclaimer in the
51 1.1 cgd * documentation and/or other materials provided with the distribution.
52 1.1 cgd * 3. All advertising materials mentioning features or use of this software
53 1.1 cgd * must display the following acknowledgement:
54 1.1 cgd * This product includes software developed by the University of
55 1.1 cgd * California, Berkeley and its contributors.
56 1.1 cgd * 4. Neither the name of the University nor the names of its contributors
57 1.1 cgd * may be used to endorse or promote products derived from this software
58 1.1 cgd * without specific prior written permission.
59 1.1 cgd *
60 1.1 cgd * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
61 1.1 cgd * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
62 1.1 cgd * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
63 1.1 cgd * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
64 1.1 cgd * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
65 1.1 cgd * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
66 1.1 cgd * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
67 1.1 cgd * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
68 1.1 cgd * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
69 1.1 cgd * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
70 1.1 cgd * SUCH DAMAGE.
71 1.1 cgd */
72 1.1 cgd
73 1.36 mrg #include <sys/cdefs.h>
74 1.1 cgd #ifndef lint
75 1.36 mrg __COPYRIGHT("@(#) Copyright (c) 1983, 1991, 1993, 1994\n\
76 1.36 mrg The Regents of the University of California. All rights reserved.\n");
77 1.23 mycroft #if 0
78 1.23 mycroft static char sccsid[] = "@(#)inetd.c 8.4 (Berkeley) 4/13/94";
79 1.23 mycroft #else
80 1.57 itojun __RCSID("$NetBSD: inetd.c,v 1.57 2000/01/27 19:52:43 itojun Exp $");
81 1.23 mycroft #endif
82 1.1 cgd #endif /* not lint */
83 1.1 cgd
84 1.1 cgd /*
85 1.1 cgd * Inetd - Internet super-server
86 1.1 cgd *
87 1.23 mycroft * This program invokes all internet services as needed. Connection-oriented
88 1.23 mycroft * services are invoked each time a connection is made, by creating a process.
89 1.23 mycroft * This process is passed the connection as file descriptor 0 and is expected
90 1.23 mycroft * to do a getpeername to find out the source host and port.
91 1.1 cgd *
92 1.1 cgd * Datagram oriented services are invoked when a datagram
93 1.1 cgd * arrives; a process is created and passed a pending message
94 1.1 cgd * on file descriptor 0. Datagram servers may either connect
95 1.1 cgd * to their peer, freeing up the original socket for inetd
96 1.1 cgd * to receive further messages on, or ``take over the socket'',
97 1.1 cgd * processing all arriving datagrams and, eventually, timing
98 1.1 cgd * out. The first type of server is said to be ``multi-threaded'';
99 1.16 mouse * the second type of server ``single-threaded''.
100 1.1 cgd *
101 1.1 cgd * Inetd uses a configuration file which is read at startup
102 1.1 cgd * and, possibly, at some later time in response to a hangup signal.
103 1.1 cgd * The configuration file is ``free format'' with fields given in the
104 1.1 cgd * order shown below. Continuation lines for an entry must being with
105 1.1 cgd * a space or tab. All fields must be present in each entry.
106 1.1 cgd *
107 1.23 mycroft * service name must be in /etc/services or must
108 1.23 mycroft * name a tcpmux service
109 1.1 cgd * socket type stream/dgram/raw/rdm/seqpacket
110 1.1 cgd * protocol must be in /etc/protocols
111 1.55 ad * wait/nowait[:max] single-threaded/multi-threaded, max #
112 1.55 ad * user[:group] user/group to run daemon as
113 1.1 cgd * server program full path name
114 1.1 cgd * server program arguments maximum of MAXARGS (20)
115 1.1 cgd *
116 1.2 brezak * For RPC services
117 1.2 brezak * service name/version must be in /etc/rpc
118 1.2 brezak * socket type stream/dgram/raw/rdm/seqpacket
119 1.2 brezak * protocol must be in /etc/protocols
120 1.55 ad * wait/nowait[:max] single-threaded/multi-threaded
121 1.55 ad * user[:group] user to run daemon as
122 1.2 brezak * server program full path name
123 1.2 brezak * server program arguments maximum of MAXARGS (20)
124 1.5 pk *
125 1.16 mouse * For non-RPC services, the "service name" can be of the form
126 1.16 mouse * hostaddress:servicename, in which case the hostaddress is used
127 1.16 mouse * as the host portion of the address to listen on. If hostaddress
128 1.16 mouse * consists of a single `*' character, INADDR_ANY is used.
129 1.16 mouse *
130 1.16 mouse * A line can also consist of just
131 1.16 mouse * hostaddress:
132 1.16 mouse * where hostaddress is as in the preceding paragraph. Such a line must
133 1.16 mouse * have no further fields; the specified hostaddress is remembered and
134 1.16 mouse * used for all further lines that have no hostaddress specified,
135 1.16 mouse * until the next such line (or EOF). (This is why * is provided to
136 1.16 mouse * allow explicit specification of INADDR_ANY.) A line
137 1.16 mouse * *:
138 1.16 mouse * is implicitly in effect at the beginning of the file.
139 1.16 mouse *
140 1.16 mouse * The hostaddress specifier may (and often will) contain dots;
141 1.16 mouse * the service name must not.
142 1.16 mouse *
143 1.16 mouse * For RPC services, host-address specifiers are accepted and will
144 1.16 mouse * work to some extent; however, because of limitations in the
145 1.16 mouse * portmapper interface, it will not work to try to give more than
146 1.16 mouse * one line for any given RPC service, even if the host-address
147 1.16 mouse * specifiers are different.
148 1.16 mouse *
149 1.23 mycroft * TCP services without official port numbers are handled with the
150 1.23 mycroft * RFC1078-based tcpmux internal service. Tcpmux listens on port 1 for
151 1.23 mycroft * requests. When a connection is made from a foreign host, the service
152 1.23 mycroft * requested is passed to tcpmux, which looks it up in the servtab list
153 1.23 mycroft * and returns the proper entry for the service. Tcpmux returns a
154 1.23 mycroft * negative reply if the service doesn't exist, otherwise the invoked
155 1.23 mycroft * server is expected to return the positive reply if the service type in
156 1.23 mycroft * inetd.conf file has the prefix "tcpmux/". If the service type has the
157 1.23 mycroft * prefix "tcpmux/+", tcpmux will return the positive reply for the
158 1.23 mycroft * process; this is for compatibility with older server code, and also
159 1.23 mycroft * allows you to invoke programs that use stdin/stdout without putting any
160 1.23 mycroft * special server code in them. Services that use tcpmux are "nowait"
161 1.23 mycroft * because they do not have a well-known port and hence cannot listen
162 1.23 mycroft * for new requests.
163 1.23 mycroft *
164 1.1 cgd * Comment lines are indicated by a `#' in column 1.
165 1.49 itojun *
166 1.49 itojun * #ifdef IPSEC
167 1.49 itojun * Comment lines that start with "#@" denote IPsec policy string, as described
168 1.49 itojun * in ipsec_set_policy(3). This will affect all the following items in
169 1.49 itojun * inetd.conf(8). To reset the policy, just use "#@" line. By default,
170 1.49 itojun * there's no IPsec policy.
171 1.49 itojun * #endif
172 1.1 cgd */
173 1.5 pk
174 1.5 pk /*
175 1.55 ad * Here's the scoop concerning the user:group feature:
176 1.5 pk *
177 1.5 pk * 1) set-group-option off.
178 1.16 mouse *
179 1.5 pk * a) user = root: NO setuid() or setgid() is done
180 1.16 mouse *
181 1.5 pk * b) other: setuid()
182 1.5 pk * setgid(primary group as found in passwd)
183 1.5 pk * initgroups(name, primary group)
184 1.16 mouse *
185 1.5 pk * 2) set-group-option on.
186 1.16 mouse *
187 1.5 pk * a) user = root: NO setuid()
188 1.5 pk * setgid(specified group)
189 1.5 pk * NO initgroups()
190 1.16 mouse *
191 1.5 pk * b) other: setuid()
192 1.5 pk * setgid(specified group)
193 1.5 pk * initgroups(name, specified group)
194 1.16 mouse *
195 1.5 pk */
196 1.5 pk
197 1.5 pk #include <sys/param.h>
198 1.5 pk #include <sys/stat.h>
199 1.5 pk #include <sys/ioctl.h>
200 1.5 pk #include <sys/socket.h>
201 1.5 pk #include <sys/un.h>
202 1.5 pk #include <sys/wait.h>
203 1.5 pk #include <sys/time.h>
204 1.5 pk #include <sys/resource.h>
205 1.5 pk
206 1.6 pk #ifndef RLIMIT_NOFILE
207 1.6 pk #define RLIMIT_NOFILE RLIMIT_OFILE
208 1.5 pk #endif
209 1.5 pk
210 1.53 sommerfe #ifndef NO_RPC
211 1.5 pk #define RPC
212 1.53 sommerfe #endif
213 1.1 cgd
214 1.1 cgd #include <netinet/in.h>
215 1.1 cgd #include <arpa/inet.h>
216 1.23 mycroft #ifdef RPC
217 1.23 mycroft #include <rpc/rpc.h>
218 1.36 mrg #include <rpc/pmap_clnt.h>
219 1.23 mycroft #endif
220 1.1 cgd
221 1.42 thorpej #include <ctype.h>
222 1.1 cgd #include <errno.h>
223 1.30 mycroft #include <fcntl.h>
224 1.23 mycroft #include <grp.h>
225 1.1 cgd #include <netdb.h>
226 1.1 cgd #include <pwd.h>
227 1.23 mycroft #include <signal.h>
228 1.1 cgd #include <stdio.h>
229 1.9 cgd #include <stdlib.h>
230 1.1 cgd #include <string.h>
231 1.23 mycroft #include <syslog.h>
232 1.23 mycroft #include <unistd.h>
233 1.48 thorpej #include <util.h>
234 1.23 mycroft
235 1.1 cgd #include "pathnames.h"
236 1.1 cgd
237 1.49 itojun #ifdef IPSEC
238 1.49 itojun #include <netinet6/ipsec.h>
239 1.49 itojun #ifndef IPSEC_POLICY_IPSEC /* no ipsec support on old ipsec */
240 1.49 itojun #undef IPSEC
241 1.49 itojun #endif
242 1.49 itojun #endif
243 1.49 itojun
244 1.12 mrg #ifdef LIBWRAP
245 1.12 mrg # include <tcpd.h>
246 1.13 mrg #ifndef LIBWRAP_ALLOW_FACILITY
247 1.17 mouse # define LIBWRAP_ALLOW_FACILITY LOG_AUTH
248 1.13 mrg #endif
249 1.13 mrg #ifndef LIBWRAP_ALLOW_SEVERITY
250 1.13 mrg # define LIBWRAP_ALLOW_SEVERITY LOG_INFO
251 1.13 mrg #endif
252 1.13 mrg #ifndef LIBWRAP_DENY_FACILITY
253 1.17 mouse # define LIBWRAP_DENY_FACILITY LOG_AUTH
254 1.13 mrg #endif
255 1.13 mrg #ifndef LIBWRAP_DENY_SEVERITY
256 1.13 mrg # define LIBWRAP_DENY_SEVERITY LOG_WARNING
257 1.13 mrg #endif
258 1.13 mrg int allow_severity = LIBWRAP_ALLOW_FACILITY|LIBWRAP_ALLOW_SEVERITY;
259 1.13 mrg int deny_severity = LIBWRAP_DENY_FACILITY|LIBWRAP_DENY_SEVERITY;
260 1.12 mrg #endif
261 1.12 mrg
262 1.1 cgd #define TOOMANY 40 /* don't start more than TOOMANY */
263 1.1 cgd #define CNT_INTVL 60 /* servers in CNT_INTVL sec. */
264 1.1 cgd #define RETRYTIME (60*10) /* retry after bind or server fail */
265 1.1 cgd
266 1.1 cgd #define SIGBLOCK (sigmask(SIGCHLD)|sigmask(SIGHUP)|sigmask(SIGALRM))
267 1.1 cgd
268 1.12 mrg int debug;
269 1.12 mrg #ifdef LIBWRAP
270 1.12 mrg int lflag;
271 1.12 mrg #endif
272 1.1 cgd int nsock, maxsock;
273 1.1 cgd fd_set allsock;
274 1.1 cgd int options;
275 1.1 cgd int timingout;
276 1.1 cgd struct servent *sp;
277 1.5 pk char *curdom;
278 1.57 itojun #ifdef NI_WITHSCOPEID
279 1.57 itojun const int niflags = NI_NUMERICHOST | NI_NUMERICSERV | NI_WITHSCOPEID;
280 1.57 itojun #else
281 1.57 itojun const int niflags = NI_NUMERICHOST | NI_NUMERICSERV;
282 1.57 itojun #endif
283 1.5 pk
284 1.5 pk #ifndef OPEN_MAX
285 1.5 pk #define OPEN_MAX 64
286 1.5 pk #endif
287 1.5 pk
288 1.5 pk /* Reserve some descriptors, 3 stdio + at least: 1 log, 1 conf. file */
289 1.5 pk #define FD_MARGIN (8)
290 1.7 pk typeof(((struct rlimit *)0)->rlim_cur) rlim_ofile_cur = OPEN_MAX;
291 1.5 pk
292 1.6 pk #ifdef RLIMIT_NOFILE
293 1.5 pk struct rlimit rlim_ofile;
294 1.5 pk #endif
295 1.1 cgd
296 1.1 cgd struct servtab {
297 1.16 mouse char *se_hostaddr; /* host address to listen on */
298 1.1 cgd char *se_service; /* name of service */
299 1.1 cgd int se_socktype; /* type of socket to use */
300 1.5 pk int se_family; /* address family */
301 1.1 cgd char *se_proto; /* protocol used */
302 1.42 thorpej int se_sndbuf; /* sndbuf size */
303 1.42 thorpej int se_rcvbuf; /* rcvbuf size */
304 1.5 pk int se_rpcprog; /* rpc program number */
305 1.5 pk int se_rpcversl; /* rpc program lowest version */
306 1.5 pk int se_rpcversh; /* rpc program highest version */
307 1.5 pk #define isrpcservice(sep) ((sep)->se_rpcversl != 0)
308 1.51 ghudson pid_t se_wait; /* single threaded server */
309 1.1 cgd short se_checked; /* looked at during merge */
310 1.1 cgd char *se_user; /* user name to run as */
311 1.5 pk char *se_group; /* group name to run as */
312 1.1 cgd struct biltin *se_bi; /* if built-in, description */
313 1.1 cgd char *se_server; /* server program */
314 1.1 cgd #define MAXARGV 20
315 1.1 cgd char *se_argv[MAXARGV+1]; /* program arguments */
316 1.49 itojun #ifdef IPSEC
317 1.49 itojun char *se_policy; /* IPsec poilcy string */
318 1.49 itojun #endif
319 1.1 cgd int se_fd; /* open descriptor */
320 1.23 mycroft int se_type; /* type */
321 1.5 pk union {
322 1.5 pk struct sockaddr se_un_ctrladdr;
323 1.5 pk struct sockaddr_in se_un_ctrladdr_in;
324 1.49 itojun struct sockaddr_in6 se_un_ctrladdr_in6;
325 1.5 pk struct sockaddr_un se_un_ctrladdr_un;
326 1.5 pk } se_un; /* bound address */
327 1.5 pk #define se_ctrladdr se_un.se_un_ctrladdr
328 1.5 pk #define se_ctrladdr_in se_un.se_un_ctrladdr_in
329 1.5 pk #define se_ctrladdr_un se_un.se_un_ctrladdr_un
330 1.5 pk int se_ctrladdr_size;
331 1.5 pk int se_max; /* max # of instances of this service */
332 1.1 cgd int se_count; /* number started since se_time */
333 1.1 cgd struct timeval se_time; /* start of se_count */
334 1.5 pk #ifdef MULOG
335 1.5 pk int se_log;
336 1.5 pk #define MULOG_RFC931 0x40000000
337 1.5 pk #endif
338 1.1 cgd struct servtab *se_next;
339 1.1 cgd } *servtab;
340 1.1 cgd
341 1.23 mycroft #define NORM_TYPE 0
342 1.23 mycroft #define MUX_TYPE 1
343 1.23 mycroft #define MUXPLUS_TYPE 2
344 1.23 mycroft #define ISMUX(sep) (((sep)->se_type == MUX_TYPE) || \
345 1.23 mycroft ((sep)->se_type == MUXPLUS_TYPE))
346 1.23 mycroft #define ISMUXPLUS(sep) ((sep)->se_type == MUXPLUS_TYPE)
347 1.23 mycroft
348 1.23 mycroft
349 1.23 mycroft void chargen_dg __P((int, struct servtab *));
350 1.23 mycroft void chargen_stream __P((int, struct servtab *));
351 1.23 mycroft void close_sep __P((struct servtab *));
352 1.23 mycroft void config __P((int));
353 1.23 mycroft void daytime_dg __P((int, struct servtab *));
354 1.23 mycroft void daytime_stream __P((int, struct servtab *));
355 1.23 mycroft void discard_dg __P((int, struct servtab *));
356 1.23 mycroft void discard_stream __P((int, struct servtab *));
357 1.23 mycroft void echo_dg __P((int, struct servtab *));
358 1.23 mycroft void echo_stream __P((int, struct servtab *));
359 1.23 mycroft void endconfig __P((void));
360 1.23 mycroft struct servtab *enter __P((struct servtab *));
361 1.23 mycroft void freeconfig __P((struct servtab *));
362 1.23 mycroft struct servtab *getconfigent __P((void));
363 1.23 mycroft void goaway __P((int));
364 1.23 mycroft void machtime_dg __P((int, struct servtab *));
365 1.23 mycroft void machtime_stream __P((int, struct servtab *));
366 1.23 mycroft char *newstr __P((char *));
367 1.23 mycroft char *nextline __P((FILE *));
368 1.23 mycroft void print_service __P((char *, struct servtab *));
369 1.23 mycroft void reapchild __P((int));
370 1.23 mycroft void retry __P((int));
371 1.30 mycroft void run_service __P((int, struct servtab *));
372 1.23 mycroft int setconfig __P((void));
373 1.23 mycroft void setup __P((struct servtab *));
374 1.49 itojun #ifdef IPSEC
375 1.50 itojun int ipsecsetup __P((struct servtab *));
376 1.49 itojun #endif
377 1.23 mycroft char *sskip __P((char **));
378 1.23 mycroft char *skip __P((char **));
379 1.30 mycroft void tcpmux __P((int, struct servtab *));
380 1.23 mycroft void usage __P((void));
381 1.36 mrg void register_rpc __P((struct servtab *sep));
382 1.36 mrg void unregister_rpc __P((struct servtab *sep));
383 1.36 mrg void bump_nofile __P((void));
384 1.36 mrg void inetd_setproctitle __P((char *, int));
385 1.36 mrg void initring __P((void));
386 1.36 mrg long machtime __P((void));
387 1.47 hwr int port_good_dg __P((struct sockaddr *sa));
388 1.36 mrg static int getline __P((int, char *, int));
389 1.36 mrg int main __P((int, char *[], char *[]));
390 1.1 cgd
391 1.1 cgd struct biltin {
392 1.1 cgd char *bi_service; /* internally provided service name */
393 1.1 cgd int bi_socktype; /* type of socket supported */
394 1.1 cgd short bi_fork; /* 1 if should fork before call */
395 1.1 cgd short bi_wait; /* 1 if should wait for child */
396 1.36 mrg void (*bi_fn) __P((int, struct servtab *));
397 1.36 mrg /* function which performs it */
398 1.1 cgd } biltins[] = {
399 1.1 cgd /* Echo received data */
400 1.23 mycroft { "echo", SOCK_STREAM, 1, 0, echo_stream },
401 1.23 mycroft { "echo", SOCK_DGRAM, 0, 0, echo_dg },
402 1.1 cgd
403 1.1 cgd /* Internet /dev/null */
404 1.23 mycroft { "discard", SOCK_STREAM, 1, 0, discard_stream },
405 1.23 mycroft { "discard", SOCK_DGRAM, 0, 0, discard_dg },
406 1.1 cgd
407 1.35 mrg /* Return 32 bit time since 1970 */
408 1.23 mycroft { "time", SOCK_STREAM, 0, 0, machtime_stream },
409 1.23 mycroft { "time", SOCK_DGRAM, 0, 0, machtime_dg },
410 1.1 cgd
411 1.1 cgd /* Return human-readable time */
412 1.23 mycroft { "daytime", SOCK_STREAM, 0, 0, daytime_stream },
413 1.23 mycroft { "daytime", SOCK_DGRAM, 0, 0, daytime_dg },
414 1.1 cgd
415 1.1 cgd /* Familiar character generator */
416 1.23 mycroft { "chargen", SOCK_STREAM, 1, 0, chargen_stream },
417 1.23 mycroft { "chargen", SOCK_DGRAM, 0, 0, chargen_dg },
418 1.23 mycroft
419 1.30 mycroft { "tcpmux", SOCK_STREAM, 1, 0, tcpmux },
420 1.23 mycroft
421 1.23 mycroft { NULL }
422 1.1 cgd };
423 1.1 cgd
424 1.47 hwr /* list of "bad" ports. I.e. ports that are most obviously used for
425 1.47 hwr * "cycling packets" denial of service attacks. See /etc/services.
426 1.47 hwr * List must end with port number "0".
427 1.47 hwr */
428 1.47 hwr
429 1.47 hwr u_int16_t bad_ports[] = { 7, 9, 13, 19, 37, 0};
430 1.47 hwr
431 1.47 hwr
432 1.1 cgd #define NUMINT (sizeof(intab) / sizeof(struct inent))
433 1.1 cgd char *CONFIG = _PATH_INETDCONF;
434 1.1 cgd char **Argv;
435 1.1 cgd char *LastArg;
436 1.23 mycroft extern char *__progname;
437 1.5 pk
438 1.5 pk #ifdef sun
439 1.5 pk /*
440 1.5 pk * Sun's RPC library caches the result of `dtablesize()'
441 1.5 pk * This is incompatible with our "bumping" of file descriptors "on demand"
442 1.5 pk */
443 1.5 pk int
444 1.5 pk _rpc_dtablesize()
445 1.5 pk {
446 1.5 pk return rlim_ofile_cur;
447 1.5 pk }
448 1.5 pk #endif
449 1.1 cgd
450 1.36 mrg int
451 1.1 cgd main(argc, argv, envp)
452 1.1 cgd int argc;
453 1.1 cgd char *argv[], *envp[];
454 1.1 cgd {
455 1.23 mycroft struct servtab *sep, *nsep;
456 1.1 cgd struct sigvec sv;
457 1.36 mrg int ch, dofork;
458 1.23 mycroft pid_t pid;
459 1.1 cgd
460 1.1 cgd Argv = argv;
461 1.1 cgd if (envp == 0 || *envp == 0)
462 1.1 cgd envp = argv;
463 1.1 cgd while (*envp)
464 1.1 cgd envp++;
465 1.1 cgd LastArg = envp[-1] + strlen(envp[-1]);
466 1.1 cgd
467 1.12 mrg while ((ch = getopt(argc, argv,
468 1.12 mrg #ifdef LIBWRAP
469 1.12 mrg "dl"
470 1.12 mrg #else
471 1.12 mrg "d"
472 1.12 mrg #endif
473 1.38 lukem )) != -1)
474 1.1 cgd switch(ch) {
475 1.1 cgd case 'd':
476 1.1 cgd debug = 1;
477 1.1 cgd options |= SO_DEBUG;
478 1.1 cgd break;
479 1.12 mrg #ifdef LIBWRAP
480 1.12 mrg case 'l':
481 1.12 mrg lflag = 1;
482 1.12 mrg break;
483 1.12 mrg #endif
484 1.1 cgd case '?':
485 1.1 cgd default:
486 1.23 mycroft usage();
487 1.1 cgd }
488 1.1 cgd argc -= optind;
489 1.1 cgd argv += optind;
490 1.1 cgd
491 1.1 cgd if (argc > 0)
492 1.1 cgd CONFIG = argv[0];
493 1.5 pk
494 1.1 cgd if (debug == 0)
495 1.1 cgd daemon(0, 0);
496 1.23 mycroft openlog(__progname, LOG_PID | LOG_NOWAIT, LOG_DAEMON);
497 1.48 thorpej pidfile(NULL);
498 1.5 pk
499 1.6 pk #ifdef RLIMIT_NOFILE
500 1.6 pk if (getrlimit(RLIMIT_NOFILE, &rlim_ofile) < 0) {
501 1.5 pk syslog(LOG_ERR, "getrlimit: %m");
502 1.5 pk } else {
503 1.5 pk rlim_ofile_cur = rlim_ofile.rlim_cur;
504 1.6 pk if (rlim_ofile_cur == RLIM_INFINITY) /* ! */
505 1.6 pk rlim_ofile_cur = OPEN_MAX;
506 1.5 pk }
507 1.5 pk #endif
508 1.5 pk
509 1.23 mycroft memset(&sv, 0, sizeof(sv));
510 1.1 cgd sv.sv_mask = SIGBLOCK;
511 1.1 cgd sv.sv_handler = retry;
512 1.1 cgd sigvec(SIGALRM, &sv, (struct sigvec *)0);
513 1.23 mycroft config(SIGHUP);
514 1.1 cgd sv.sv_handler = config;
515 1.1 cgd sigvec(SIGHUP, &sv, (struct sigvec *)0);
516 1.1 cgd sv.sv_handler = reapchild;
517 1.1 cgd sigvec(SIGCHLD, &sv, (struct sigvec *)0);
518 1.5 pk sv.sv_handler = goaway;
519 1.5 pk sigvec(SIGTERM, &sv, (struct sigvec *)0);
520 1.5 pk sv.sv_handler = goaway;
521 1.5 pk sigvec(SIGINT, &sv, (struct sigvec *)0);
522 1.41 mycroft sv.sv_mask = 0L;
523 1.39 mycroft sv.sv_handler = SIG_IGN;
524 1.39 mycroft sigvec(SIGPIPE, &sv, (struct sigvec *)0);
525 1.1 cgd
526 1.1 cgd {
527 1.1 cgd /* space for daemons to overwrite environment for ps */
528 1.1 cgd #define DUMMYSIZE 100
529 1.1 cgd char dummy[DUMMYSIZE];
530 1.1 cgd
531 1.5 pk (void)memset(dummy, 'x', DUMMYSIZE - 1);
532 1.1 cgd dummy[DUMMYSIZE - 1] = '\0';
533 1.5 pk
534 1.1 cgd (void)setenv("inetd_dummy", dummy, 1);
535 1.1 cgd }
536 1.1 cgd
537 1.1 cgd for (;;) {
538 1.1 cgd int n, ctrl;
539 1.1 cgd fd_set readable;
540 1.1 cgd
541 1.1 cgd if (nsock == 0) {
542 1.1 cgd (void) sigblock(SIGBLOCK);
543 1.1 cgd while (nsock == 0)
544 1.1 cgd sigpause(0L);
545 1.1 cgd (void) sigsetmask(0L);
546 1.1 cgd }
547 1.1 cgd readable = allsock;
548 1.1 cgd if ((n = select(maxsock + 1, &readable, (fd_set *)0,
549 1.1 cgd (fd_set *)0, (struct timeval *)0)) <= 0) {
550 1.37 mycroft if (n == -1 && errno != EINTR) {
551 1.23 mycroft syslog(LOG_WARNING, "select: %m");
552 1.37 mycroft sleep(1);
553 1.37 mycroft }
554 1.1 cgd continue;
555 1.1 cgd }
556 1.23 mycroft for (sep = servtab; n && sep; sep = nsep) {
557 1.23 mycroft nsep = sep->se_next;
558 1.5 pk if (sep->se_fd != -1 && FD_ISSET(sep->se_fd, &readable)) {
559 1.5 pk n--;
560 1.5 pk if (debug)
561 1.5 pk fprintf(stderr, "someone wants %s\n", sep->se_service);
562 1.5 pk if (!sep->se_wait && sep->se_socktype == SOCK_STREAM) {
563 1.12 mrg /* XXX here do the libwrap check-before-accept */
564 1.5 pk ctrl = accept(sep->se_fd, (struct sockaddr *)0,
565 1.5 pk (int *)0);
566 1.5 pk if (debug)
567 1.5 pk fprintf(stderr, "accept, ctrl %d\n", ctrl);
568 1.5 pk if (ctrl < 0) {
569 1.23 mycroft if (errno != EINTR)
570 1.23 mycroft syslog(LOG_WARNING,
571 1.23 mycroft "accept (for %s): %m",
572 1.23 mycroft sep->se_service);
573 1.23 mycroft continue;
574 1.23 mycroft }
575 1.5 pk } else
576 1.5 pk ctrl = sep->se_fd;
577 1.5 pk (void) sigblock(SIGBLOCK);
578 1.5 pk pid = 0;
579 1.28 mycroft #ifdef LIBWRAP_INTERNAL
580 1.26 mycroft dofork = 1;
581 1.26 mycroft #else
582 1.5 pk dofork = (sep->se_bi == 0 || sep->se_bi->bi_fork);
583 1.26 mycroft #endif
584 1.5 pk if (dofork) {
585 1.5 pk if (sep->se_count++ == 0)
586 1.5 pk (void)gettimeofday(&sep->se_time,
587 1.5 pk (struct timezone *)0);
588 1.5 pk else if (sep->se_count >= sep->se_max) {
589 1.1 cgd struct timeval now;
590 1.1 cgd
591 1.1 cgd (void)gettimeofday(&now, (struct timezone *)0);
592 1.1 cgd if (now.tv_sec - sep->se_time.tv_sec >
593 1.1 cgd CNT_INTVL) {
594 1.1 cgd sep->se_time = now;
595 1.1 cgd sep->se_count = 1;
596 1.1 cgd } else {
597 1.1 cgd syslog(LOG_ERR,
598 1.1 cgd "%s/%s server failing (looping), service terminated\n",
599 1.1 cgd sep->se_service, sep->se_proto);
600 1.43 tron if (!sep->se_wait && sep->se_socktype == SOCK_STREAM)
601 1.43 tron close(ctrl);
602 1.23 mycroft close_sep(sep);
603 1.5 pk sigsetmask(0L);
604 1.1 cgd if (!timingout) {
605 1.1 cgd timingout = 1;
606 1.1 cgd alarm(RETRYTIME);
607 1.1 cgd }
608 1.5 pk continue;
609 1.1 cgd }
610 1.5 pk }
611 1.5 pk pid = fork();
612 1.25 mycroft if (pid < 0) {
613 1.25 mycroft syslog(LOG_ERR, "fork: %m");
614 1.32 mycroft if (!sep->se_wait && sep->se_socktype == SOCK_STREAM)
615 1.25 mycroft close(ctrl);
616 1.25 mycroft sigsetmask(0L);
617 1.25 mycroft sleep(1);
618 1.25 mycroft continue;
619 1.25 mycroft }
620 1.25 mycroft if (pid != 0 && sep->se_wait) {
621 1.25 mycroft sep->se_wait = pid;
622 1.25 mycroft FD_CLR(sep->se_fd, &allsock);
623 1.25 mycroft nsock--;
624 1.25 mycroft }
625 1.41 mycroft if (pid == 0) {
626 1.41 mycroft sv.sv_mask = 0L;
627 1.41 mycroft sv.sv_handler = SIG_DFL;
628 1.41 mycroft sigvec(SIGPIPE, &sv, (struct sigvec *)0);
629 1.41 mycroft if (debug)
630 1.41 mycroft setsid();
631 1.41 mycroft }
632 1.5 pk }
633 1.5 pk sigsetmask(0L);
634 1.5 pk if (pid == 0) {
635 1.30 mycroft run_service(ctrl, sep);
636 1.30 mycroft if (dofork)
637 1.30 mycroft exit(0);
638 1.30 mycroft }
639 1.32 mycroft if (!sep->se_wait && sep->se_socktype == SOCK_STREAM)
640 1.30 mycroft close(ctrl);
641 1.30 mycroft }
642 1.30 mycroft }
643 1.30 mycroft }
644 1.30 mycroft }
645 1.30 mycroft
646 1.30 mycroft void
647 1.30 mycroft run_service(ctrl, sep)
648 1.30 mycroft int ctrl;
649 1.30 mycroft struct servtab *sep;
650 1.30 mycroft {
651 1.30 mycroft struct passwd *pwd;
652 1.36 mrg struct group *grp = NULL; /* XXX gcc */
653 1.57 itojun char buf[NI_MAXSERV];
654 1.30 mycroft #ifdef LIBWRAP
655 1.30 mycroft struct request_info req;
656 1.30 mycroft int denied;
657 1.40 christos char *service = NULL; /* XXX gcc */
658 1.30 mycroft #endif
659 1.30 mycroft
660 1.20 mycroft #ifdef LIBWRAP
661 1.28 mycroft #ifndef LIBWRAP_INTERNAL
662 1.30 mycroft if (sep->se_bi == 0)
663 1.28 mycroft #endif
664 1.34 mycroft if (!sep->se_wait && sep->se_socktype == SOCK_STREAM) {
665 1.30 mycroft request_init(&req, RQ_DAEMON, sep->se_argv[0] ?
666 1.30 mycroft sep->se_argv[0] : sep->se_service, RQ_FILE, ctrl, NULL);
667 1.30 mycroft fromhost(&req);
668 1.30 mycroft denied = !hosts_access(&req);
669 1.30 mycroft if (denied || lflag) {
670 1.52 itojun if (getnameinfo(&sep->se_ctrladdr,
671 1.52 itojun sep->se_ctrladdr.sa_len, NULL, 0,
672 1.52 itojun buf, sizeof(buf), 0) != 0) {
673 1.52 itojun /* shouldn't happen */
674 1.30 mycroft (void)snprintf(buf, sizeof buf, "%d",
675 1.30 mycroft ntohs(sep->se_ctrladdr_in.sin_port));
676 1.52 itojun }
677 1.52 itojun service = buf;
678 1.30 mycroft }
679 1.30 mycroft if (denied) {
680 1.30 mycroft syslog(deny_severity,
681 1.30 mycroft "refused connection from %.500s, service %s (%s)",
682 1.30 mycroft eval_client(&req), service, sep->se_proto);
683 1.30 mycroft goto reject;
684 1.30 mycroft }
685 1.30 mycroft if (lflag) {
686 1.30 mycroft syslog(allow_severity,
687 1.30 mycroft "connection from %.500s, service %s (%s)",
688 1.30 mycroft eval_client(&req), service, sep->se_proto);
689 1.30 mycroft }
690 1.30 mycroft }
691 1.30 mycroft #endif /* LIBWRAP */
692 1.30 mycroft
693 1.30 mycroft if (sep->se_bi) {
694 1.30 mycroft (*sep->se_bi->bi_fn)(ctrl, sep);
695 1.30 mycroft } else {
696 1.30 mycroft if ((pwd = getpwnam(sep->se_user)) == NULL) {
697 1.30 mycroft syslog(LOG_ERR, "%s/%s: %s: No such user",
698 1.30 mycroft sep->se_service, sep->se_proto, sep->se_user);
699 1.30 mycroft goto reject;
700 1.30 mycroft }
701 1.30 mycroft if (sep->se_group &&
702 1.30 mycroft (grp = getgrnam(sep->se_group)) == NULL) {
703 1.30 mycroft syslog(LOG_ERR, "%s/%s: %s: No such group",
704 1.30 mycroft sep->se_service, sep->se_proto, sep->se_group);
705 1.30 mycroft goto reject;
706 1.30 mycroft }
707 1.30 mycroft if (pwd->pw_uid) {
708 1.30 mycroft if (sep->se_group)
709 1.30 mycroft pwd->pw_gid = grp->gr_gid;
710 1.30 mycroft if (setgid(pwd->pw_gid) < 0) {
711 1.30 mycroft syslog(LOG_ERR,
712 1.30 mycroft "%s/%s: can't set gid %d: %m", sep->se_service,
713 1.30 mycroft sep->se_proto, pwd->pw_gid);
714 1.30 mycroft goto reject;
715 1.20 mycroft }
716 1.30 mycroft (void) initgroups(pwd->pw_name,
717 1.30 mycroft pwd->pw_gid);
718 1.30 mycroft if (setuid(pwd->pw_uid) < 0) {
719 1.30 mycroft syslog(LOG_ERR,
720 1.30 mycroft "%s/%s: can't set uid %d: %m", sep->se_service,
721 1.30 mycroft sep->se_proto, pwd->pw_uid);
722 1.22 mycroft goto reject;
723 1.20 mycroft }
724 1.30 mycroft } else if (sep->se_group) {
725 1.30 mycroft (void) setgid((gid_t)grp->gr_gid);
726 1.30 mycroft }
727 1.30 mycroft if (debug)
728 1.30 mycroft fprintf(stderr, "%d execl %s\n",
729 1.30 mycroft getpid(), sep->se_server);
730 1.5 pk #ifdef MULOG
731 1.30 mycroft if (sep->se_log)
732 1.30 mycroft dolog(sep, ctrl);
733 1.5 pk #endif
734 1.30 mycroft /* Set our control descriptor to not close-on-exec... */
735 1.30 mycroft if (fcntl(ctrl, F_SETFD, 0) < 0)
736 1.30 mycroft syslog(LOG_ERR, "fcntl (F_SETFD, 0): %m");
737 1.30 mycroft /* ...and dup it to stdin, stdout, and stderr. */
738 1.30 mycroft if (ctrl != 0) {
739 1.30 mycroft dup2(ctrl, 0);
740 1.30 mycroft close(ctrl);
741 1.30 mycroft ctrl = 0;
742 1.30 mycroft }
743 1.30 mycroft dup2(0, 1);
744 1.30 mycroft dup2(0, 2);
745 1.6 pk #ifdef RLIMIT_NOFILE
746 1.30 mycroft if (rlim_ofile.rlim_cur != rlim_ofile_cur &&
747 1.30 mycroft setrlimit(RLIMIT_NOFILE, &rlim_ofile) < 0)
748 1.30 mycroft syslog(LOG_ERR, "setrlimit: %m");
749 1.30 mycroft #endif
750 1.30 mycroft execv(sep->se_server, sep->se_argv);
751 1.30 mycroft syslog(LOG_ERR, "cannot execute %s: %m", sep->se_server);
752 1.30 mycroft reject:
753 1.30 mycroft if (sep->se_socktype != SOCK_STREAM)
754 1.30 mycroft recv(ctrl, buf, sizeof (buf), 0);
755 1.30 mycroft _exit(1);
756 1.1 cgd }
757 1.1 cgd }
758 1.1 cgd
759 1.1 cgd void
760 1.23 mycroft reapchild(signo)
761 1.23 mycroft int signo;
762 1.1 cgd {
763 1.1 cgd int status;
764 1.23 mycroft pid_t pid;
765 1.23 mycroft struct servtab *sep;
766 1.1 cgd
767 1.1 cgd for (;;) {
768 1.1 cgd pid = wait3(&status, WNOHANG, (struct rusage *)0);
769 1.1 cgd if (pid <= 0)
770 1.1 cgd break;
771 1.1 cgd if (debug)
772 1.23 mycroft fprintf(stderr, "%d reaped, status %#x\n",
773 1.23 mycroft pid, status);
774 1.1 cgd for (sep = servtab; sep; sep = sep->se_next)
775 1.1 cgd if (sep->se_wait == pid) {
776 1.5 pk if (WIFEXITED(status) && WEXITSTATUS(status))
777 1.1 cgd syslog(LOG_WARNING,
778 1.1 cgd "%s: exit status 0x%x",
779 1.5 pk sep->se_server, WEXITSTATUS(status));
780 1.5 pk else if (WIFSIGNALED(status))
781 1.5 pk syslog(LOG_WARNING,
782 1.5 pk "%s: exit signal 0x%x",
783 1.5 pk sep->se_server, WTERMSIG(status));
784 1.5 pk sep->se_wait = 1;
785 1.5 pk FD_SET(sep->se_fd, &allsock);
786 1.5 pk nsock++;
787 1.1 cgd if (debug)
788 1.1 cgd fprintf(stderr, "restored %s, fd %d\n",
789 1.1 cgd sep->se_service, sep->se_fd);
790 1.1 cgd }
791 1.1 cgd }
792 1.1 cgd }
793 1.1 cgd
794 1.1 cgd void
795 1.23 mycroft config(signo)
796 1.23 mycroft int signo;
797 1.1 cgd {
798 1.23 mycroft struct servtab *sep, *cp, **sepp;
799 1.1 cgd long omask;
800 1.5 pk int n;
801 1.1 cgd
802 1.1 cgd if (!setconfig()) {
803 1.1 cgd syslog(LOG_ERR, "%s: %m", CONFIG);
804 1.1 cgd return;
805 1.1 cgd }
806 1.1 cgd for (sep = servtab; sep; sep = sep->se_next)
807 1.1 cgd sep->se_checked = 0;
808 1.36 mrg while ((cp = getconfigent())) {
809 1.1 cgd for (sep = servtab; sep; sep = sep->se_next)
810 1.1 cgd if (strcmp(sep->se_service, cp->se_service) == 0 &&
811 1.18 mikel strcmp(sep->se_hostaddr, cp->se_hostaddr) == 0 &&
812 1.23 mycroft strcmp(sep->se_proto, cp->se_proto) == 0 &&
813 1.23 mycroft ISMUX(sep) == ISMUX(cp))
814 1.1 cgd break;
815 1.1 cgd if (sep != 0) {
816 1.1 cgd int i;
817 1.1 cgd
818 1.5 pk #define SWAP(type, a, b) {type c=(type)a; (type)a=(type)b; (type)b=(type)c;}
819 1.5 pk
820 1.1 cgd omask = sigblock(SIGBLOCK);
821 1.1 cgd /*
822 1.1 cgd * sep->se_wait may be holding the pid of a daemon
823 1.1 cgd * that we're waiting for. If so, don't overwrite
824 1.16 mouse * it unless the config file explicitly says don't
825 1.1 cgd * wait.
826 1.1 cgd */
827 1.16 mouse if (cp->se_bi == 0 &&
828 1.1 cgd (sep->se_wait == 1 || cp->se_wait == 0))
829 1.1 cgd sep->se_wait = cp->se_wait;
830 1.11 mycroft SWAP(char *, sep->se_user, cp->se_user);
831 1.11 mycroft SWAP(char *, sep->se_group, cp->se_group);
832 1.11 mycroft SWAP(char *, sep->se_server, cp->se_server);
833 1.1 cgd for (i = 0; i < MAXARGV; i++)
834 1.5 pk SWAP(char *, sep->se_argv[i], cp->se_argv[i]);
835 1.49 itojun #ifdef IPSEC
836 1.49 itojun SWAP(char *, sep->se_policy, cp->se_policy);
837 1.50 itojun if (sep->se_fd != -1) {
838 1.50 itojun if (ipsecsetup(sep) < 0 && sep->se_policy) {
839 1.50 itojun syslog(LOG_ERR,
840 1.50 itojun "%s: ipsec initialization failed",
841 1.50 itojun sep->se_service);
842 1.50 itojun sep->se_checked = 0;
843 1.56 itojun sigsetmask(omask);
844 1.50 itojun continue;
845 1.50 itojun }
846 1.50 itojun }
847 1.49 itojun #endif
848 1.24 mycroft SWAP(int, cp->se_type, sep->se_type);
849 1.24 mycroft SWAP(int, cp->se_max, sep->se_max);
850 1.5 pk #undef SWAP
851 1.5 pk if (isrpcservice(sep))
852 1.5 pk unregister_rpc(sep);
853 1.5 pk sep->se_rpcversl = cp->se_rpcversl;
854 1.5 pk sep->se_rpcversh = cp->se_rpcversh;
855 1.1 cgd sigsetmask(omask);
856 1.1 cgd freeconfig(cp);
857 1.1 cgd if (debug)
858 1.1 cgd print_service("REDO", sep);
859 1.1 cgd } else {
860 1.1 cgd sep = enter(cp);
861 1.1 cgd if (debug)
862 1.1 cgd print_service("ADD ", sep);
863 1.1 cgd }
864 1.1 cgd sep->se_checked = 1;
865 1.2 brezak
866 1.5 pk switch (sep->se_family) {
867 1.44 lukem case AF_LOCAL:
868 1.5 pk if (sep->se_fd != -1)
869 1.5 pk break;
870 1.38 lukem n = strlen(sep->se_service);
871 1.38 lukem if (n > sizeof(sep->se_ctrladdr_un.sun_path)) {
872 1.38 lukem syslog(LOG_ERR, "%s: address too long",
873 1.38 lukem sep->se_service);
874 1.38 lukem sep->se_checked = 0;
875 1.38 lukem continue;
876 1.38 lukem }
877 1.5 pk (void)unlink(sep->se_service);
878 1.19 mikel strncpy(sep->se_ctrladdr_un.sun_path,
879 1.19 mikel sep->se_service, n);
880 1.44 lukem sep->se_ctrladdr_un.sun_family = AF_LOCAL;
881 1.5 pk sep->se_ctrladdr_size = n +
882 1.23 mycroft sizeof(sep->se_ctrladdr_un) -
883 1.23 mycroft sizeof(sep->se_ctrladdr_un.sun_path);
884 1.23 mycroft if (!ISMUX(sep))
885 1.23 mycroft setup(sep);
886 1.5 pk break;
887 1.5 pk case AF_INET:
888 1.49 itojun case AF_INET6:
889 1.49 itojun {
890 1.49 itojun struct addrinfo hints, *res;
891 1.49 itojun char *host, *port;
892 1.49 itojun int error;
893 1.49 itojun
894 1.49 itojun memset(&hints, 0, sizeof(hints));
895 1.49 itojun hints.ai_family = sep->se_family;
896 1.49 itojun hints.ai_socktype = sep->se_socktype;
897 1.49 itojun if (!strcmp(sep->se_hostaddr, "*")) {
898 1.49 itojun hints.ai_flags = AI_PASSIVE;
899 1.49 itojun host = NULL;
900 1.49 itojun } else
901 1.49 itojun host = sep->se_hostaddr;
902 1.49 itojun if (isrpcservice(sep) || ISMUX(sep))
903 1.49 itojun port = "0";
904 1.49 itojun else
905 1.49 itojun port = sep->se_service;
906 1.49 itojun error = getaddrinfo(host, port, &hints, &res);
907 1.49 itojun if (error) {
908 1.50 itojun syslog(LOG_ERR, "%s/%s: %s: %s",
909 1.50 itojun sep->se_service, sep->se_proto,
910 1.49 itojun sep->se_hostaddr, gai_strerror(error));
911 1.49 itojun sep->se_checked = 0;
912 1.49 itojun continue;
913 1.49 itojun }
914 1.49 itojun if (res->ai_next) {
915 1.50 itojun syslog(LOG_ERR,
916 1.50 itojun "%s/%s: %s: resolved to multiple addr",
917 1.50 itojun sep->se_service, sep->se_proto,
918 1.49 itojun sep->se_hostaddr);
919 1.49 itojun sep->se_checked = 0;
920 1.49 itojun freeaddrinfo(res);
921 1.49 itojun continue;
922 1.16 mouse }
923 1.49 itojun memcpy(&sep->se_ctrladdr, res->ai_addr,
924 1.49 itojun res->ai_addrlen);
925 1.23 mycroft if (ISMUX(sep)) {
926 1.23 mycroft sep->se_fd = -1;
927 1.49 itojun freeaddrinfo(res);
928 1.23 mycroft continue;
929 1.23 mycroft }
930 1.49 itojun sep->se_ctrladdr_size = res->ai_addrlen;
931 1.49 itojun freeaddrinfo(res);
932 1.53 sommerfe #ifdef RPC
933 1.5 pk if (isrpcservice(sep)) {
934 1.5 pk struct rpcent *rp;
935 1.5 pk
936 1.5 pk sep->se_rpcprog = atoi(sep->se_service);
937 1.5 pk if (sep->se_rpcprog == 0) {
938 1.5 pk rp = getrpcbyname(sep->se_service);
939 1.5 pk if (rp == 0) {
940 1.5 pk syslog(LOG_ERR,
941 1.23 mycroft "%s/%s: unknown service",
942 1.23 mycroft sep->se_service,
943 1.23 mycroft sep->se_proto);
944 1.23 mycroft sep->se_checked = 0;
945 1.5 pk continue;
946 1.5 pk }
947 1.5 pk sep->se_rpcprog = rp->r_number;
948 1.5 pk }
949 1.23 mycroft if (sep->se_fd == -1 && !ISMUX(sep))
950 1.5 pk setup(sep);
951 1.5 pk if (sep->se_fd != -1)
952 1.5 pk register_rpc(sep);
953 1.53 sommerfe } else
954 1.53 sommerfe #endif
955 1.53 sommerfe {
956 1.49 itojun if (sep->se_fd >= 0)
957 1.49 itojun close_sep(sep);
958 1.23 mycroft if (sep->se_fd == -1 && !ISMUX(sep))
959 1.5 pk setup(sep);
960 1.5 pk }
961 1.49 itojun }
962 1.5 pk }
963 1.1 cgd }
964 1.1 cgd endconfig();
965 1.1 cgd /*
966 1.1 cgd * Purge anything not looked at above.
967 1.1 cgd */
968 1.1 cgd omask = sigblock(SIGBLOCK);
969 1.1 cgd sepp = &servtab;
970 1.36 mrg while ((sep = *sepp)) {
971 1.1 cgd if (sep->se_checked) {
972 1.1 cgd sepp = &sep->se_next;
973 1.1 cgd continue;
974 1.1 cgd }
975 1.1 cgd *sepp = sep->se_next;
976 1.23 mycroft if (sep->se_fd >= 0)
977 1.23 mycroft close_sep(sep);
978 1.5 pk if (isrpcservice(sep))
979 1.5 pk unregister_rpc(sep);
980 1.44 lukem if (sep->se_family == AF_LOCAL)
981 1.5 pk (void)unlink(sep->se_service);
982 1.1 cgd if (debug)
983 1.1 cgd print_service("FREE", sep);
984 1.1 cgd freeconfig(sep);
985 1.1 cgd free((char *)sep);
986 1.1 cgd }
987 1.1 cgd (void) sigsetmask(omask);
988 1.1 cgd }
989 1.1 cgd
990 1.1 cgd void
991 1.23 mycroft retry(signo)
992 1.23 mycroft int signo;
993 1.5 pk {
994 1.23 mycroft struct servtab *sep;
995 1.2 brezak
996 1.5 pk timingout = 0;
997 1.5 pk for (sep = servtab; sep; sep = sep->se_next) {
998 1.23 mycroft if (sep->se_fd == -1 && !ISMUX(sep)) {
999 1.5 pk switch (sep->se_family) {
1000 1.44 lukem case AF_LOCAL:
1001 1.5 pk case AF_INET:
1002 1.49 itojun case AF_INET6:
1003 1.5 pk setup(sep);
1004 1.5 pk if (sep->se_fd != -1 && isrpcservice(sep))
1005 1.5 pk register_rpc(sep);
1006 1.5 pk break;
1007 1.5 pk }
1008 1.5 pk }
1009 1.5 pk }
1010 1.2 brezak }
1011 1.2 brezak
1012 1.2 brezak void
1013 1.23 mycroft goaway(signo)
1014 1.23 mycroft int signo;
1015 1.1 cgd {
1016 1.36 mrg struct servtab *sep;
1017 1.1 cgd
1018 1.5 pk for (sep = servtab; sep; sep = sep->se_next) {
1019 1.1 cgd if (sep->se_fd == -1)
1020 1.5 pk continue;
1021 1.5 pk
1022 1.5 pk switch (sep->se_family) {
1023 1.44 lukem case AF_LOCAL:
1024 1.5 pk (void)unlink(sep->se_service);
1025 1.5 pk break;
1026 1.5 pk case AF_INET:
1027 1.49 itojun case AF_INET6:
1028 1.5 pk if (sep->se_wait == 1 && isrpcservice(sep))
1029 1.5 pk unregister_rpc(sep);
1030 1.5 pk break;
1031 1.5 pk }
1032 1.5 pk (void)close(sep->se_fd);
1033 1.5 pk }
1034 1.5 pk exit(0);
1035 1.1 cgd }
1036 1.1 cgd
1037 1.23 mycroft void
1038 1.1 cgd setup(sep)
1039 1.23 mycroft struct servtab *sep;
1040 1.1 cgd {
1041 1.1 cgd int on = 1;
1042 1.1 cgd
1043 1.5 pk if ((sep->se_fd = socket(sep->se_family, sep->se_socktype, 0)) < 0) {
1044 1.23 mycroft if (debug)
1045 1.23 mycroft fprintf(stderr, "socket failed on %s/%s: %s\n",
1046 1.23 mycroft sep->se_service, sep->se_proto, strerror(errno));
1047 1.1 cgd syslog(LOG_ERR, "%s/%s: socket: %m",
1048 1.1 cgd sep->se_service, sep->se_proto);
1049 1.1 cgd return;
1050 1.1 cgd }
1051 1.46 mycroft /* Set all listening sockets to close-on-exec. */
1052 1.30 mycroft if (fcntl(sep->se_fd, F_SETFD, FD_CLOEXEC) < 0)
1053 1.30 mycroft syslog(LOG_ERR, "fcntl (F_SETFD, FD_CLOEXEC): %m");
1054 1.42 thorpej
1055 1.1 cgd #define turnon(fd, opt) \
1056 1.1 cgd setsockopt(fd, SOL_SOCKET, opt, (char *)&on, sizeof (on))
1057 1.1 cgd if (strcmp(sep->se_proto, "tcp") == 0 && (options & SO_DEBUG) &&
1058 1.1 cgd turnon(sep->se_fd, SO_DEBUG) < 0)
1059 1.1 cgd syslog(LOG_ERR, "setsockopt (SO_DEBUG): %m");
1060 1.1 cgd if (turnon(sep->se_fd, SO_REUSEADDR) < 0)
1061 1.1 cgd syslog(LOG_ERR, "setsockopt (SO_REUSEADDR): %m");
1062 1.1 cgd #undef turnon
1063 1.42 thorpej
1064 1.42 thorpej /* Set the socket buffer sizes, if specified. */
1065 1.42 thorpej if (sep->se_sndbuf != 0 && setsockopt(sep->se_fd, SOL_SOCKET,
1066 1.42 thorpej SO_SNDBUF, (char *)&sep->se_sndbuf, sizeof(sep->se_sndbuf)) < 0)
1067 1.42 thorpej syslog(LOG_ERR, "setsockopt (SO_SNDBUF %d): %m",
1068 1.42 thorpej sep->se_sndbuf);
1069 1.42 thorpej if (sep->se_rcvbuf != 0 && setsockopt(sep->se_fd, SOL_SOCKET,
1070 1.42 thorpej SO_RCVBUF, (char *)&sep->se_rcvbuf, sizeof(sep->se_rcvbuf)) < 0)
1071 1.42 thorpej syslog(LOG_ERR, "setsockopt (SO_RCVBUF %d): %m",
1072 1.42 thorpej sep->se_rcvbuf);
1073 1.49 itojun #ifdef IPSEC
1074 1.50 itojun if (ipsecsetup(sep) < 0 && sep->se_policy) {
1075 1.50 itojun syslog(LOG_ERR, "%s/%s: ipsec setup failed",
1076 1.50 itojun sep->se_service, sep->se_proto);
1077 1.50 itojun close(sep->se_fd);
1078 1.50 itojun return;
1079 1.50 itojun }
1080 1.49 itojun #endif
1081 1.42 thorpej
1082 1.5 pk if (bind(sep->se_fd, &sep->se_ctrladdr, sep->se_ctrladdr_size) < 0) {
1083 1.23 mycroft if (debug)
1084 1.23 mycroft fprintf(stderr, "bind failed on %s/%s: %s\n",
1085 1.23 mycroft sep->se_service, sep->se_proto, strerror(errno));
1086 1.1 cgd syslog(LOG_ERR, "%s/%s: bind: %m",
1087 1.1 cgd sep->se_service, sep->se_proto);
1088 1.1 cgd (void) close(sep->se_fd);
1089 1.1 cgd sep->se_fd = -1;
1090 1.1 cgd if (!timingout) {
1091 1.1 cgd timingout = 1;
1092 1.1 cgd alarm(RETRYTIME);
1093 1.1 cgd }
1094 1.1 cgd return;
1095 1.1 cgd }
1096 1.1 cgd if (sep->se_socktype == SOCK_STREAM)
1097 1.1 cgd listen(sep->se_fd, 10);
1098 1.5 pk
1099 1.1 cgd FD_SET(sep->se_fd, &allsock);
1100 1.1 cgd nsock++;
1101 1.5 pk if (sep->se_fd > maxsock) {
1102 1.1 cgd maxsock = sep->se_fd;
1103 1.5 pk if (maxsock > rlim_ofile_cur - FD_MARGIN)
1104 1.5 pk bump_nofile();
1105 1.5 pk }
1106 1.23 mycroft if (debug)
1107 1.23 mycroft fprintf(stderr, "registered %s on %d\n",
1108 1.23 mycroft sep->se_server, sep->se_fd);
1109 1.23 mycroft }
1110 1.23 mycroft
1111 1.49 itojun #ifdef IPSEC
1112 1.50 itojun int
1113 1.49 itojun ipsecsetup(sep)
1114 1.49 itojun struct servtab *sep;
1115 1.49 itojun {
1116 1.49 itojun int len;
1117 1.49 itojun char *buf;
1118 1.49 itojun char *policy;
1119 1.49 itojun int level, opt;
1120 1.50 itojun int ret;
1121 1.49 itojun
1122 1.49 itojun switch (sep->se_family) {
1123 1.49 itojun case AF_INET:
1124 1.49 itojun level = IPPROTO_IP;
1125 1.49 itojun opt = IP_IPSEC_POLICY;
1126 1.49 itojun break;
1127 1.49 itojun case AF_INET6:
1128 1.49 itojun level = IPPROTO_IPV6;
1129 1.49 itojun opt = IPV6_IPSEC_POLICY;
1130 1.49 itojun break;
1131 1.49 itojun default:
1132 1.50 itojun return -1;
1133 1.49 itojun }
1134 1.49 itojun
1135 1.49 itojun if (!sep->se_policy || sep->se_policy[0] == '\0')
1136 1.49 itojun policy = "entrust";
1137 1.49 itojun else
1138 1.49 itojun policy = sep->se_policy;
1139 1.49 itojun
1140 1.49 itojun len = ipsec_get_policylen(policy);
1141 1.50 itojun if (len < 0) {
1142 1.50 itojun syslog(LOG_ERR, "invalid security policy \"%s\"", policy);
1143 1.50 itojun return -1;
1144 1.50 itojun }
1145 1.50 itojun buf = (char *)malloc(len);
1146 1.50 itojun if (buf != NULL) {
1147 1.49 itojun ipsec_set_policy(buf, len, policy);
1148 1.50 itojun ret = setsockopt(sep->se_fd, level, opt, buf, len);
1149 1.49 itojun free(buf);
1150 1.49 itojun } else
1151 1.50 itojun ret = -1;
1152 1.50 itojun
1153 1.50 itojun return ret;
1154 1.49 itojun }
1155 1.49 itojun #endif
1156 1.49 itojun
1157 1.23 mycroft /*
1158 1.23 mycroft * Finish with a service and its socket.
1159 1.23 mycroft */
1160 1.23 mycroft void
1161 1.23 mycroft close_sep(sep)
1162 1.23 mycroft struct servtab *sep;
1163 1.23 mycroft {
1164 1.23 mycroft if (sep->se_fd >= 0) {
1165 1.23 mycroft nsock--;
1166 1.23 mycroft FD_CLR(sep->se_fd, &allsock);
1167 1.23 mycroft (void) close(sep->se_fd);
1168 1.23 mycroft sep->se_fd = -1;
1169 1.23 mycroft }
1170 1.23 mycroft sep->se_count = 0;
1171 1.23 mycroft /*
1172 1.23 mycroft * Don't keep the pid of this running deamon: when reapchild()
1173 1.23 mycroft * reaps this pid, it would erroneously increment nsock.
1174 1.23 mycroft */
1175 1.23 mycroft if (sep->se_wait > 1)
1176 1.23 mycroft sep->se_wait = 1;
1177 1.5 pk }
1178 1.5 pk
1179 1.36 mrg void
1180 1.5 pk register_rpc(sep)
1181 1.36 mrg struct servtab *sep;
1182 1.5 pk {
1183 1.5 pk #ifdef RPC
1184 1.5 pk int n;
1185 1.49 itojun struct sockaddr_storage ss;
1186 1.49 itojun struct sockaddr_in *sin = (struct sockaddr_in *)&ss;
1187 1.5 pk struct protoent *pp;
1188 1.5 pk
1189 1.5 pk if ((pp = getprotobyname(sep->se_proto+4)) == NULL) {
1190 1.5 pk syslog(LOG_ERR, "%s: getproto: %m",
1191 1.5 pk sep->se_proto);
1192 1.5 pk return;
1193 1.5 pk }
1194 1.49 itojun n = sizeof ss;
1195 1.49 itojun if (getsockname(sep->se_fd, (struct sockaddr *)&ss, &n) < 0) {
1196 1.5 pk syslog(LOG_ERR, "%s/%s: getsockname: %m",
1197 1.5 pk sep->se_service, sep->se_proto);
1198 1.5 pk return;
1199 1.5 pk }
1200 1.49 itojun if (ss.ss_family != AF_INET) { /*XXX*/
1201 1.49 itojun syslog(LOG_ERR, "%s/%s: rpc not supported",
1202 1.49 itojun sep->se_service, sep->se_proto);
1203 1.49 itojun return;
1204 1.49 itojun }
1205 1.5 pk
1206 1.5 pk for (n = sep->se_rpcversl; n <= sep->se_rpcversh; n++) {
1207 1.5 pk if (debug)
1208 1.5 pk fprintf(stderr, "pmap_set: %u %u %u %u\n",
1209 1.23 mycroft sep->se_rpcprog, n, pp->p_proto,
1210 1.49 itojun ntohs(sin->sin_port));
1211 1.5 pk (void)pmap_unset(sep->se_rpcprog, n);
1212 1.49 itojun if (!pmap_set(sep->se_rpcprog, n, pp->p_proto, ntohs(sin->sin_port)))
1213 1.5 pk syslog(LOG_ERR, "pmap_set: %u %u %u %u: %m",
1214 1.23 mycroft sep->se_rpcprog, n, pp->p_proto,
1215 1.49 itojun ntohs(sin->sin_port));
1216 1.5 pk }
1217 1.5 pk #endif /* RPC */
1218 1.5 pk }
1219 1.5 pk
1220 1.36 mrg void
1221 1.5 pk unregister_rpc(sep)
1222 1.36 mrg struct servtab *sep;
1223 1.5 pk {
1224 1.5 pk #ifdef RPC
1225 1.5 pk int n;
1226 1.5 pk
1227 1.5 pk for (n = sep->se_rpcversl; n <= sep->se_rpcversh; n++) {
1228 1.5 pk if (debug)
1229 1.5 pk fprintf(stderr, "pmap_unset(%u, %u)\n",
1230 1.23 mycroft sep->se_rpcprog, n);
1231 1.5 pk if (!pmap_unset(sep->se_rpcprog, n))
1232 1.5 pk syslog(LOG_ERR, "pmap_unset(%u, %u)\n",
1233 1.23 mycroft sep->se_rpcprog, n);
1234 1.5 pk }
1235 1.5 pk #endif /* RPC */
1236 1.1 cgd }
1237 1.1 cgd
1238 1.5 pk
1239 1.1 cgd struct servtab *
1240 1.1 cgd enter(cp)
1241 1.1 cgd struct servtab *cp;
1242 1.1 cgd {
1243 1.23 mycroft struct servtab *sep;
1244 1.1 cgd long omask;
1245 1.1 cgd
1246 1.1 cgd sep = (struct servtab *)malloc(sizeof (*sep));
1247 1.1 cgd if (sep == (struct servtab *)0) {
1248 1.1 cgd syslog(LOG_ERR, "Out of memory.");
1249 1.1 cgd exit(-1);
1250 1.1 cgd }
1251 1.1 cgd *sep = *cp;
1252 1.1 cgd sep->se_fd = -1;
1253 1.5 pk sep->se_rpcprog = -1;
1254 1.1 cgd omask = sigblock(SIGBLOCK);
1255 1.1 cgd sep->se_next = servtab;
1256 1.1 cgd servtab = sep;
1257 1.1 cgd sigsetmask(omask);
1258 1.1 cgd return (sep);
1259 1.1 cgd }
1260 1.1 cgd
1261 1.1 cgd FILE *fconfig = NULL;
1262 1.1 cgd struct servtab serv;
1263 1.23 mycroft char line[LINE_MAX];
1264 1.16 mouse char *defhost;
1265 1.1 cgd
1266 1.23 mycroft int
1267 1.1 cgd setconfig()
1268 1.1 cgd {
1269 1.16 mouse if (defhost) free(defhost);
1270 1.16 mouse defhost = newstr("*");
1271 1.1 cgd if (fconfig != NULL) {
1272 1.16 mouse fseek(fconfig, 0L, SEEK_SET);
1273 1.1 cgd return (1);
1274 1.1 cgd }
1275 1.1 cgd fconfig = fopen(CONFIG, "r");
1276 1.1 cgd return (fconfig != NULL);
1277 1.1 cgd }
1278 1.1 cgd
1279 1.23 mycroft void
1280 1.1 cgd endconfig()
1281 1.1 cgd {
1282 1.1 cgd if (fconfig) {
1283 1.1 cgd (void) fclose(fconfig);
1284 1.1 cgd fconfig = NULL;
1285 1.1 cgd }
1286 1.16 mouse if (defhost) {
1287 1.16 mouse free(defhost);
1288 1.16 mouse defhost = 0;
1289 1.16 mouse }
1290 1.1 cgd }
1291 1.1 cgd
1292 1.1 cgd struct servtab *
1293 1.1 cgd getconfigent()
1294 1.1 cgd {
1295 1.23 mycroft struct servtab *sep = &serv;
1296 1.42 thorpej int argc, val;
1297 1.42 thorpej char *cp, *cp0, *arg, *buf0, *buf1, *sz0, *sz1;
1298 1.23 mycroft static char TCPMUX_TOKEN[] = "tcpmux/";
1299 1.23 mycroft #define MUX_LEN (sizeof(TCPMUX_TOKEN)-1)
1300 1.16 mouse char *hostdelim;
1301 1.49 itojun #ifdef IPSEC
1302 1.49 itojun char *policy = NULL;
1303 1.49 itojun #endif
1304 1.5 pk
1305 1.1 cgd more:
1306 1.49 itojun while ((cp = nextline(fconfig))) {
1307 1.49 itojun #ifdef IPSEC
1308 1.49 itojun /* lines starting with #@ is not a comment, but the policy */
1309 1.49 itojun if (cp[0] == '#' && cp[1] == '@') {
1310 1.49 itojun char *p;
1311 1.49 itojun for (p = cp + 2; p && *p && isspace(*p); p++)
1312 1.49 itojun ;
1313 1.49 itojun if (*p == '\0') {
1314 1.49 itojun if (policy)
1315 1.49 itojun free(policy);
1316 1.49 itojun policy = NULL;
1317 1.49 itojun } else if (ipsec_get_policylen(p) >= 0) {
1318 1.49 itojun if (policy)
1319 1.49 itojun free(policy);
1320 1.49 itojun policy = newstr(p);
1321 1.49 itojun } else {
1322 1.49 itojun syslog(LOG_ERR,
1323 1.49 itojun "%s: invalid ipsec policy \"%s\"",
1324 1.49 itojun CONFIG, p);
1325 1.49 itojun exit(-1);
1326 1.49 itojun }
1327 1.49 itojun }
1328 1.49 itojun #endif
1329 1.49 itojun if (*cp == '#' || *cp == '\0')
1330 1.49 itojun continue;
1331 1.5 pk #ifdef MULOG
1332 1.5 pk /* Avoid use of `skip' if there is a danger of it looking
1333 1.5 pk * at continuation lines.
1334 1.5 pk */
1335 1.5 pk do {
1336 1.5 pk cp++;
1337 1.5 pk } while (*cp == ' ' || *cp == '\t');
1338 1.5 pk if (*cp == '\0')
1339 1.5 pk continue;
1340 1.5 pk if ((arg = skip(&cp)) == NULL)
1341 1.5 pk continue;
1342 1.5 pk if (strcmp(arg, "DOMAIN"))
1343 1.5 pk continue;
1344 1.5 pk if (curdom)
1345 1.5 pk free(curdom);
1346 1.5 pk curdom = NULL;
1347 1.5 pk while (*cp == ' ' || *cp == '\t')
1348 1.5 pk cp++;
1349 1.5 pk if (*cp == '\0')
1350 1.5 pk continue;
1351 1.5 pk arg = cp;
1352 1.5 pk while (*cp && *cp != ' ' && *cp != '\t')
1353 1.5 pk cp++;
1354 1.5 pk if (*cp != '\0')
1355 1.5 pk *cp++ = '\0';
1356 1.5 pk curdom = newstr(arg);
1357 1.49 itojun #endif
1358 1.49 itojun break;
1359 1.5 pk }
1360 1.1 cgd if (cp == NULL)
1361 1.1 cgd return ((struct servtab *)0);
1362 1.23 mycroft /*
1363 1.23 mycroft * clear the static buffer, since some fields (se_ctrladdr,
1364 1.23 mycroft * for example) don't get initialized here.
1365 1.23 mycroft */
1366 1.23 mycroft memset((caddr_t)sep, 0, sizeof *sep);
1367 1.23 mycroft arg = skip(&cp);
1368 1.23 mycroft if (cp == NULL) {
1369 1.23 mycroft /* got an empty line containing just blanks/tabs. */
1370 1.23 mycroft goto more;
1371 1.23 mycroft }
1372 1.23 mycroft /* Check for a host name. */
1373 1.23 mycroft hostdelim = strrchr(arg, ':');
1374 1.16 mouse if (hostdelim) {
1375 1.16 mouse *hostdelim = '\0';
1376 1.23 mycroft sep->se_hostaddr = newstr(arg);
1377 1.23 mycroft arg = hostdelim + 1;
1378 1.23 mycroft /*
1379 1.23 mycroft * If the line is of the form `host:', then just change the
1380 1.23 mycroft * default host for the following lines.
1381 1.23 mycroft */
1382 1.23 mycroft if (*arg == '\0') {
1383 1.23 mycroft arg = skip(&cp);
1384 1.23 mycroft if (cp == NULL) {
1385 1.23 mycroft free(defhost);
1386 1.23 mycroft defhost = sep->se_hostaddr;
1387 1.23 mycroft goto more;
1388 1.23 mycroft }
1389 1.23 mycroft }
1390 1.23 mycroft } else
1391 1.16 mouse sep->se_hostaddr = newstr(defhost);
1392 1.23 mycroft if (strncmp(arg, TCPMUX_TOKEN, MUX_LEN) == 0) {
1393 1.23 mycroft char *c = arg + MUX_LEN;
1394 1.23 mycroft if (*c == '+') {
1395 1.23 mycroft sep->se_type = MUXPLUS_TYPE;
1396 1.23 mycroft c++;
1397 1.16 mouse } else
1398 1.23 mycroft sep->se_type = MUX_TYPE;
1399 1.23 mycroft sep->se_service = newstr(c);
1400 1.23 mycroft } else {
1401 1.23 mycroft sep->se_service = newstr(arg);
1402 1.23 mycroft sep->se_type = NORM_TYPE;
1403 1.16 mouse }
1404 1.5 pk
1405 1.23 mycroft arg = sskip(&cp);
1406 1.1 cgd if (strcmp(arg, "stream") == 0)
1407 1.1 cgd sep->se_socktype = SOCK_STREAM;
1408 1.1 cgd else if (strcmp(arg, "dgram") == 0)
1409 1.1 cgd sep->se_socktype = SOCK_DGRAM;
1410 1.1 cgd else if (strcmp(arg, "rdm") == 0)
1411 1.1 cgd sep->se_socktype = SOCK_RDM;
1412 1.1 cgd else if (strcmp(arg, "seqpacket") == 0)
1413 1.1 cgd sep->se_socktype = SOCK_SEQPACKET;
1414 1.1 cgd else if (strcmp(arg, "raw") == 0)
1415 1.1 cgd sep->se_socktype = SOCK_RAW;
1416 1.1 cgd else
1417 1.1 cgd sep->se_socktype = -1;
1418 1.5 pk
1419 1.23 mycroft sep->se_proto = newstr(sskip(&cp));
1420 1.42 thorpej
1421 1.42 thorpej #define MALFORMED(arg) \
1422 1.42 thorpej do { \
1423 1.42 thorpej syslog(LOG_ERR, "%s: malformed buffer size option `%s'", \
1424 1.42 thorpej sep->se_service, (arg)); \
1425 1.42 thorpej goto more; \
1426 1.42 thorpej } while (0)
1427 1.42 thorpej
1428 1.42 thorpej #define GETVAL(arg) \
1429 1.42 thorpej do { \
1430 1.42 thorpej if (!isdigit(*(arg))) \
1431 1.42 thorpej MALFORMED(arg); \
1432 1.42 thorpej val = strtol((arg), &cp0, 10); \
1433 1.42 thorpej if (cp0 != NULL) { \
1434 1.42 thorpej if (cp0[1] != '\0') \
1435 1.42 thorpej MALFORMED((arg)); \
1436 1.42 thorpej if (cp0[0] == 'k') \
1437 1.42 thorpej val *= 1024; \
1438 1.42 thorpej if (cp0[0] == 'm') \
1439 1.42 thorpej val *= 1024 * 1024; \
1440 1.42 thorpej } \
1441 1.42 thorpej if (val < 1) { \
1442 1.42 thorpej syslog(LOG_ERR, "%s: invalid buffer size `%s'", \
1443 1.42 thorpej sep->se_service, (arg)); \
1444 1.42 thorpej goto more; \
1445 1.42 thorpej } \
1446 1.42 thorpej } while (0)
1447 1.42 thorpej
1448 1.42 thorpej #define ASSIGN(arg) \
1449 1.42 thorpej do { \
1450 1.42 thorpej if (strcmp((arg), "sndbuf") == 0) \
1451 1.42 thorpej sep->se_sndbuf = val; \
1452 1.42 thorpej else if (strcmp((arg), "rcvbuf") == 0) \
1453 1.42 thorpej sep->se_rcvbuf = val; \
1454 1.42 thorpej else \
1455 1.42 thorpej MALFORMED((arg)); \
1456 1.42 thorpej } while (0)
1457 1.42 thorpej
1458 1.42 thorpej /*
1459 1.42 thorpej * Extract the send and receive buffer sizes before parsing
1460 1.42 thorpej * the protocol.
1461 1.42 thorpej */
1462 1.42 thorpej sep->se_sndbuf = sep->se_rcvbuf = 0;
1463 1.42 thorpej buf0 = buf1 = sz0 = sz1 = NULL;
1464 1.42 thorpej if ((buf0 = strchr(sep->se_proto, ',')) != NULL) {
1465 1.42 thorpej /* Not meaningful for Tcpmux services. */
1466 1.42 thorpej if (sep->se_type != NORM_TYPE) {
1467 1.42 thorpej syslog(LOG_ERR, "%s: can't specify buffer sizes for "
1468 1.42 thorpej "tcpmux services", sep->se_service);
1469 1.42 thorpej goto more;
1470 1.42 thorpej }
1471 1.42 thorpej
1472 1.42 thorpej /* Skip the , */
1473 1.42 thorpej *buf0++ = '\0';
1474 1.42 thorpej
1475 1.42 thorpej /* Check to see if another socket buffer size was specified. */
1476 1.42 thorpej if ((buf1 = strchr(buf0, ',')) != NULL) {
1477 1.42 thorpej /* Skip the , */
1478 1.42 thorpej *buf1++ = '\0';
1479 1.42 thorpej
1480 1.42 thorpej /* Make sure a 3rd one wasn't specified. */
1481 1.42 thorpej if (strchr(buf1, ',') != NULL) {
1482 1.42 thorpej syslog(LOG_ERR, "%s: too many buffer sizes",
1483 1.42 thorpej sep->se_service);
1484 1.42 thorpej goto more;
1485 1.42 thorpej }
1486 1.42 thorpej
1487 1.42 thorpej /* Locate the size. */
1488 1.42 thorpej if ((sz1 = strchr(buf1, '=')) == NULL)
1489 1.42 thorpej MALFORMED(buf1);
1490 1.42 thorpej
1491 1.42 thorpej /* Skip the = */
1492 1.42 thorpej *sz1++ = '\0';
1493 1.42 thorpej }
1494 1.42 thorpej
1495 1.42 thorpej /* Locate the size. */
1496 1.42 thorpej if ((sz0 = strchr(buf0, '=')) == NULL)
1497 1.42 thorpej MALFORMED(buf0);
1498 1.42 thorpej
1499 1.42 thorpej /* Skip the = */
1500 1.42 thorpej *sz0++ = '\0';
1501 1.42 thorpej
1502 1.42 thorpej GETVAL(sz0);
1503 1.42 thorpej ASSIGN(buf0);
1504 1.42 thorpej
1505 1.42 thorpej if (buf1 != NULL) {
1506 1.42 thorpej GETVAL(sz1);
1507 1.42 thorpej ASSIGN(buf1);
1508 1.42 thorpej }
1509 1.42 thorpej }
1510 1.42 thorpej
1511 1.42 thorpej #undef ASSIGN
1512 1.42 thorpej #undef GETVAL
1513 1.42 thorpej #undef MALFORMED
1514 1.42 thorpej
1515 1.5 pk if (strcmp(sep->se_proto, "unix") == 0) {
1516 1.44 lukem sep->se_family = AF_LOCAL;
1517 1.5 pk } else {
1518 1.49 itojun val = strlen(sep->se_proto);
1519 1.49 itojun if (!val) {
1520 1.49 itojun syslog(LOG_ERR, "%s: invalid protocol specified",
1521 1.49 itojun sep->se_service);
1522 1.49 itojun goto more;
1523 1.49 itojun }
1524 1.49 itojun val = sep->se_proto[val - 1];
1525 1.49 itojun switch (val) {
1526 1.49 itojun case '4': /*tcp4 or udp4*/
1527 1.49 itojun sep->se_family = AF_INET;
1528 1.49 itojun break;
1529 1.49 itojun case '6': /*tcp6 or udp6*/
1530 1.49 itojun sep->se_family = AF_INET6;
1531 1.49 itojun break;
1532 1.49 itojun default:
1533 1.49 itojun sep->se_family = AF_INET; /*will become AF_INET6*/
1534 1.49 itojun break;
1535 1.49 itojun }
1536 1.5 pk if (strncmp(sep->se_proto, "rpc/", 4) == 0) {
1537 1.5 pk #ifdef RPC
1538 1.5 pk char *cp, *ccp;
1539 1.23 mycroft cp = strchr(sep->se_service, '/');
1540 1.5 pk if (cp == 0) {
1541 1.5 pk syslog(LOG_ERR, "%s: no rpc version",
1542 1.5 pk sep->se_service);
1543 1.5 pk goto more;
1544 1.5 pk }
1545 1.5 pk *cp++ = '\0';
1546 1.23 mycroft sep->se_rpcversl = sep->se_rpcversh =
1547 1.23 mycroft strtol(cp, &ccp, 0);
1548 1.5 pk if (ccp == cp) {
1549 1.5 pk badafterall:
1550 1.5 pk syslog(LOG_ERR, "%s/%s: bad rpc version",
1551 1.5 pk sep->se_service, cp);
1552 1.5 pk goto more;
1553 1.5 pk }
1554 1.5 pk if (*ccp == '-') {
1555 1.5 pk cp = ccp + 1;
1556 1.16 mouse sep->se_rpcversh = strtol(cp, &ccp, 0);
1557 1.5 pk if (ccp == cp)
1558 1.5 pk goto badafterall;
1559 1.5 pk }
1560 1.5 pk #else
1561 1.5 pk syslog(LOG_ERR, "%s: rpc services not suported",
1562 1.5 pk sep->se_service);
1563 1.5 pk goto more;
1564 1.5 pk #endif /* RPC */
1565 1.5 pk }
1566 1.5 pk }
1567 1.23 mycroft arg = sskip(&cp);
1568 1.5 pk {
1569 1.23 mycroft char *cp;
1570 1.55 ad if ((cp = strchr(arg, ':')) == NULL)
1571 1.55 ad cp = strchr(arg, '.');
1572 1.55 ad if (cp != NULL) {
1573 1.23 mycroft *cp++ = '\0';
1574 1.23 mycroft sep->se_max = atoi(cp);
1575 1.5 pk } else
1576 1.5 pk sep->se_max = TOOMANY;
1577 1.5 pk }
1578 1.1 cgd sep->se_wait = strcmp(arg, "wait") == 0;
1579 1.23 mycroft if (ISMUX(sep)) {
1580 1.23 mycroft /*
1581 1.23 mycroft * Silently enforce "nowait" for TCPMUX services since
1582 1.23 mycroft * they don't have an assigned port to listen on.
1583 1.23 mycroft */
1584 1.23 mycroft sep->se_wait = 0;
1585 1.23 mycroft
1586 1.49 itojun if (strncmp(sep->se_proto, "tcp", 3)) {
1587 1.23 mycroft syslog(LOG_ERR,
1588 1.23 mycroft "%s: bad protocol for tcpmux service %s",
1589 1.23 mycroft CONFIG, sep->se_service);
1590 1.23 mycroft goto more;
1591 1.23 mycroft }
1592 1.23 mycroft if (sep->se_socktype != SOCK_STREAM) {
1593 1.23 mycroft syslog(LOG_ERR,
1594 1.23 mycroft "%s: bad socket type for tcpmux service %s",
1595 1.23 mycroft CONFIG, sep->se_service);
1596 1.23 mycroft goto more;
1597 1.23 mycroft }
1598 1.23 mycroft }
1599 1.23 mycroft sep->se_user = newstr(sskip(&cp));
1600 1.55 ad if ((sep->se_group = strchr(sep->se_user, ':')) != NULL)
1601 1.5 pk *sep->se_group++ = '\0';
1602 1.55 ad else if ((sep->se_group = strchr(sep->se_user, '.')) != NULL)
1603 1.55 ad *sep->se_group++ = '\0';
1604 1.55 ad
1605 1.23 mycroft sep->se_server = newstr(sskip(&cp));
1606 1.1 cgd if (strcmp(sep->se_server, "internal") == 0) {
1607 1.23 mycroft struct biltin *bi;
1608 1.1 cgd
1609 1.1 cgd for (bi = biltins; bi->bi_service; bi++)
1610 1.1 cgd if (bi->bi_socktype == sep->se_socktype &&
1611 1.1 cgd strcmp(bi->bi_service, sep->se_service) == 0)
1612 1.1 cgd break;
1613 1.1 cgd if (bi->bi_service == 0) {
1614 1.23 mycroft syslog(LOG_ERR, "internal service %s unknown",
1615 1.23 mycroft sep->se_service);
1616 1.1 cgd goto more;
1617 1.1 cgd }
1618 1.1 cgd sep->se_bi = bi;
1619 1.1 cgd sep->se_wait = bi->bi_wait;
1620 1.1 cgd } else
1621 1.1 cgd sep->se_bi = NULL;
1622 1.1 cgd argc = 0;
1623 1.5 pk for (arg = skip(&cp); cp; arg = skip(&cp)) {
1624 1.5 pk #if MULOG
1625 1.23 mycroft char *colon;
1626 1.5 pk
1627 1.23 mycroft if (argc == 0 && (colon = strrchr(arg, ':'))) {
1628 1.5 pk while (arg < colon) {
1629 1.5 pk int x;
1630 1.5 pk char *ccp;
1631 1.5 pk
1632 1.5 pk switch (*arg++) {
1633 1.5 pk case 'l':
1634 1.5 pk x = 1;
1635 1.5 pk if (isdigit(*arg)) {
1636 1.5 pk x = strtol(arg, &ccp, 0);
1637 1.5 pk if (ccp == arg)
1638 1.5 pk break;
1639 1.5 pk arg = ccp;
1640 1.5 pk }
1641 1.5 pk sep->se_log &= ~MULOG_RFC931;
1642 1.5 pk sep->se_log |= x;
1643 1.5 pk break;
1644 1.5 pk case 'a':
1645 1.5 pk sep->se_log |= MULOG_RFC931;
1646 1.5 pk break;
1647 1.5 pk default:
1648 1.5 pk break;
1649 1.5 pk }
1650 1.5 pk }
1651 1.5 pk arg = colon + 1;
1652 1.5 pk }
1653 1.5 pk #endif
1654 1.1 cgd if (argc < MAXARGV)
1655 1.1 cgd sep->se_argv[argc++] = newstr(arg);
1656 1.5 pk }
1657 1.1 cgd while (argc <= MAXARGV)
1658 1.1 cgd sep->se_argv[argc++] = NULL;
1659 1.49 itojun #ifdef IPSEC
1660 1.49 itojun sep->se_policy = policy ? newstr(policy) : NULL;
1661 1.49 itojun #endif
1662 1.1 cgd return (sep);
1663 1.1 cgd }
1664 1.1 cgd
1665 1.23 mycroft void
1666 1.1 cgd freeconfig(cp)
1667 1.23 mycroft struct servtab *cp;
1668 1.1 cgd {
1669 1.1 cgd int i;
1670 1.1 cgd
1671 1.16 mouse if (cp->se_hostaddr)
1672 1.16 mouse free(cp->se_hostaddr);
1673 1.1 cgd if (cp->se_service)
1674 1.1 cgd free(cp->se_service);
1675 1.1 cgd if (cp->se_proto)
1676 1.1 cgd free(cp->se_proto);
1677 1.1 cgd if (cp->se_user)
1678 1.1 cgd free(cp->se_user);
1679 1.5 pk /* Note: se_group is part of the newstr'ed se_user */
1680 1.1 cgd if (cp->se_server)
1681 1.1 cgd free(cp->se_server);
1682 1.1 cgd for (i = 0; i < MAXARGV; i++)
1683 1.1 cgd if (cp->se_argv[i])
1684 1.1 cgd free(cp->se_argv[i]);
1685 1.49 itojun #ifdef IPSEC
1686 1.49 itojun if (cp->se_policy)
1687 1.49 itojun free(cp->se_policy);
1688 1.49 itojun #endif
1689 1.1 cgd }
1690 1.1 cgd
1691 1.23 mycroft
1692 1.23 mycroft /*
1693 1.23 mycroft * Safe skip - if skip returns null, log a syntax error in the
1694 1.23 mycroft * configuration file and exit.
1695 1.23 mycroft */
1696 1.23 mycroft char *
1697 1.23 mycroft sskip(cpp)
1698 1.23 mycroft char **cpp;
1699 1.23 mycroft {
1700 1.23 mycroft char *cp;
1701 1.23 mycroft
1702 1.23 mycroft cp = skip(cpp);
1703 1.23 mycroft if (cp == NULL) {
1704 1.23 mycroft syslog(LOG_ERR, "%s: syntax error", CONFIG);
1705 1.23 mycroft exit(-1);
1706 1.23 mycroft }
1707 1.23 mycroft return (cp);
1708 1.23 mycroft }
1709 1.23 mycroft
1710 1.1 cgd char *
1711 1.1 cgd skip(cpp)
1712 1.1 cgd char **cpp;
1713 1.1 cgd {
1714 1.23 mycroft char *cp = *cpp;
1715 1.1 cgd char *start;
1716 1.1 cgd
1717 1.5 pk if (*cpp == NULL)
1718 1.5 pk return ((char *)0);
1719 1.5 pk
1720 1.1 cgd again:
1721 1.1 cgd while (*cp == ' ' || *cp == '\t')
1722 1.1 cgd cp++;
1723 1.1 cgd if (*cp == '\0') {
1724 1.1 cgd int c;
1725 1.1 cgd
1726 1.1 cgd c = getc(fconfig);
1727 1.1 cgd (void) ungetc(c, fconfig);
1728 1.1 cgd if (c == ' ' || c == '\t')
1729 1.36 mrg if ((cp = nextline(fconfig)))
1730 1.1 cgd goto again;
1731 1.1 cgd *cpp = (char *)0;
1732 1.1 cgd return ((char *)0);
1733 1.1 cgd }
1734 1.1 cgd start = cp;
1735 1.1 cgd while (*cp && *cp != ' ' && *cp != '\t')
1736 1.1 cgd cp++;
1737 1.1 cgd if (*cp != '\0')
1738 1.1 cgd *cp++ = '\0';
1739 1.1 cgd *cpp = cp;
1740 1.1 cgd return (start);
1741 1.1 cgd }
1742 1.1 cgd
1743 1.1 cgd char *
1744 1.1 cgd nextline(fd)
1745 1.1 cgd FILE *fd;
1746 1.1 cgd {
1747 1.1 cgd char *cp;
1748 1.1 cgd
1749 1.1 cgd if (fgets(line, sizeof (line), fd) == NULL)
1750 1.1 cgd return ((char *)0);
1751 1.23 mycroft cp = strchr(line, '\n');
1752 1.1 cgd if (cp)
1753 1.1 cgd *cp = '\0';
1754 1.1 cgd return (line);
1755 1.1 cgd }
1756 1.1 cgd
1757 1.1 cgd char *
1758 1.1 cgd newstr(cp)
1759 1.1 cgd char *cp;
1760 1.1 cgd {
1761 1.36 mrg if ((cp = strdup(cp ? cp : "")))
1762 1.23 mycroft return (cp);
1763 1.1 cgd syslog(LOG_ERR, "strdup: %m");
1764 1.1 cgd exit(-1);
1765 1.1 cgd }
1766 1.1 cgd
1767 1.23 mycroft void
1768 1.9 cgd inetd_setproctitle(a, s)
1769 1.1 cgd char *a;
1770 1.1 cgd int s;
1771 1.1 cgd {
1772 1.1 cgd int size;
1773 1.23 mycroft char *cp;
1774 1.49 itojun struct sockaddr_storage ss;
1775 1.1 cgd char buf[80];
1776 1.57 itojun char hbuf[NI_MAXHOST];
1777 1.1 cgd
1778 1.1 cgd cp = Argv[0];
1779 1.49 itojun size = sizeof(ss);
1780 1.49 itojun if (getpeername(s, (struct sockaddr *)&ss, &size) == 0) {
1781 1.57 itojun if (getnameinfo((struct sockaddr *)&ss, ss.ss_len,
1782 1.57 itojun hbuf, sizeof(hbuf), NULL, 0, niflags) != 0)
1783 1.57 itojun strcpy(hbuf, "?");
1784 1.49 itojun (void)snprintf(buf, sizeof buf, "-%s [%s]", a, hbuf);
1785 1.49 itojun } else
1786 1.16 mouse (void)snprintf(buf, sizeof buf, "-%s", a);
1787 1.1 cgd strncpy(cp, buf, LastArg - cp);
1788 1.1 cgd cp += strlen(cp);
1789 1.1 cgd while (cp < LastArg)
1790 1.1 cgd *cp++ = ' ';
1791 1.5 pk }
1792 1.5 pk
1793 1.36 mrg void
1794 1.5 pk bump_nofile()
1795 1.5 pk {
1796 1.6 pk #ifdef RLIMIT_NOFILE
1797 1.5 pk
1798 1.5 pk #define FD_CHUNK 32
1799 1.5 pk
1800 1.5 pk struct rlimit rl;
1801 1.5 pk
1802 1.6 pk if (getrlimit(RLIMIT_NOFILE, &rl) < 0) {
1803 1.5 pk syslog(LOG_ERR, "getrlimit: %m");
1804 1.36 mrg return;
1805 1.5 pk }
1806 1.5 pk rl.rlim_cur = MIN(rl.rlim_max, rl.rlim_cur + FD_CHUNK);
1807 1.5 pk if (rl.rlim_cur <= rlim_ofile_cur) {
1808 1.5 pk syslog(LOG_ERR,
1809 1.23 mycroft "bump_nofile: cannot extend file limit, max = %d",
1810 1.36 mrg (int)rl.rlim_cur);
1811 1.36 mrg return;
1812 1.5 pk }
1813 1.5 pk
1814 1.6 pk if (setrlimit(RLIMIT_NOFILE, &rl) < 0) {
1815 1.5 pk syslog(LOG_ERR, "setrlimit: %m");
1816 1.36 mrg return;
1817 1.5 pk }
1818 1.5 pk
1819 1.5 pk rlim_ofile_cur = rl.rlim_cur;
1820 1.36 mrg return;
1821 1.5 pk
1822 1.5 pk #else
1823 1.5 pk syslog(LOG_ERR, "bump_nofile: cannot extend file limit");
1824 1.36 mrg return;
1825 1.5 pk #endif
1826 1.5 pk }
1827 1.5 pk
1828 1.1 cgd /*
1829 1.1 cgd * Internet services provided internally by inetd:
1830 1.1 cgd */
1831 1.5 pk #define BUFSIZE 4096
1832 1.1 cgd
1833 1.1 cgd /* ARGSUSED */
1834 1.23 mycroft void
1835 1.1 cgd echo_stream(s, sep) /* Echo service -- echo data back */
1836 1.1 cgd int s;
1837 1.1 cgd struct servtab *sep;
1838 1.1 cgd {
1839 1.1 cgd char buffer[BUFSIZE];
1840 1.1 cgd int i;
1841 1.1 cgd
1842 1.9 cgd inetd_setproctitle(sep->se_service, s);
1843 1.1 cgd while ((i = read(s, buffer, sizeof(buffer))) > 0 &&
1844 1.1 cgd write(s, buffer, i) > 0)
1845 1.1 cgd ;
1846 1.1 cgd }
1847 1.1 cgd
1848 1.1 cgd /* ARGSUSED */
1849 1.23 mycroft void
1850 1.1 cgd echo_dg(s, sep) /* Echo service -- echo data back */
1851 1.1 cgd int s;
1852 1.1 cgd struct servtab *sep;
1853 1.1 cgd {
1854 1.1 cgd char buffer[BUFSIZE];
1855 1.1 cgd int i, size;
1856 1.54 itojun struct sockaddr_storage ss;
1857 1.54 itojun struct sockaddr *sa;
1858 1.1 cgd
1859 1.54 itojun sa = (struct sockaddr *)&ss;
1860 1.54 itojun size = sizeof(ss);
1861 1.54 itojun if ((i = recvfrom(s, buffer, sizeof(buffer), 0, sa, &size)) < 0)
1862 1.1 cgd return;
1863 1.54 itojun if (port_good_dg(sa))
1864 1.54 itojun (void) sendto(s, buffer, i, 0, sa, size);
1865 1.1 cgd }
1866 1.1 cgd
1867 1.1 cgd /* ARGSUSED */
1868 1.23 mycroft void
1869 1.1 cgd discard_stream(s, sep) /* Discard service -- ignore data */
1870 1.1 cgd int s;
1871 1.1 cgd struct servtab *sep;
1872 1.1 cgd {
1873 1.1 cgd char buffer[BUFSIZE];
1874 1.1 cgd
1875 1.9 cgd inetd_setproctitle(sep->se_service, s);
1876 1.5 pk while ((errno = 0, read(s, buffer, sizeof(buffer)) > 0) ||
1877 1.5 pk errno == EINTR)
1878 1.5 pk ;
1879 1.1 cgd }
1880 1.1 cgd
1881 1.1 cgd /* ARGSUSED */
1882 1.23 mycroft void
1883 1.1 cgd discard_dg(s, sep) /* Discard service -- ignore data */
1884 1.1 cgd int s;
1885 1.1 cgd struct servtab *sep;
1886 1.1 cgd {
1887 1.1 cgd char buffer[BUFSIZE];
1888 1.1 cgd
1889 1.1 cgd (void) read(s, buffer, sizeof(buffer));
1890 1.1 cgd }
1891 1.1 cgd
1892 1.1 cgd #include <ctype.h>
1893 1.1 cgd #define LINESIZ 72
1894 1.1 cgd char ring[128];
1895 1.1 cgd char *endring;
1896 1.1 cgd
1897 1.23 mycroft void
1898 1.1 cgd initring()
1899 1.1 cgd {
1900 1.23 mycroft int i;
1901 1.1 cgd
1902 1.1 cgd endring = ring;
1903 1.1 cgd
1904 1.1 cgd for (i = 0; i <= 128; ++i)
1905 1.1 cgd if (isprint(i))
1906 1.1 cgd *endring++ = i;
1907 1.1 cgd }
1908 1.1 cgd
1909 1.1 cgd /* ARGSUSED */
1910 1.23 mycroft void
1911 1.1 cgd chargen_stream(s, sep) /* Character generator */
1912 1.1 cgd int s;
1913 1.1 cgd struct servtab *sep;
1914 1.1 cgd {
1915 1.1 cgd int len;
1916 1.23 mycroft char *rs, text[LINESIZ+2];
1917 1.1 cgd
1918 1.9 cgd inetd_setproctitle(sep->se_service, s);
1919 1.1 cgd
1920 1.1 cgd if (!endring) {
1921 1.1 cgd initring();
1922 1.1 cgd rs = ring;
1923 1.1 cgd }
1924 1.1 cgd
1925 1.1 cgd text[LINESIZ] = '\r';
1926 1.1 cgd text[LINESIZ + 1] = '\n';
1927 1.1 cgd for (rs = ring;;) {
1928 1.1 cgd if ((len = endring - rs) >= LINESIZ)
1929 1.23 mycroft memmove(text, rs, LINESIZ);
1930 1.1 cgd else {
1931 1.23 mycroft memmove(text, rs, len);
1932 1.23 mycroft memmove(text + len, ring, LINESIZ - len);
1933 1.1 cgd }
1934 1.1 cgd if (++rs == endring)
1935 1.1 cgd rs = ring;
1936 1.1 cgd if (write(s, text, sizeof(text)) != sizeof(text))
1937 1.1 cgd break;
1938 1.1 cgd }
1939 1.1 cgd }
1940 1.1 cgd
1941 1.1 cgd /* ARGSUSED */
1942 1.23 mycroft void
1943 1.1 cgd chargen_dg(s, sep) /* Character generator */
1944 1.1 cgd int s;
1945 1.1 cgd struct servtab *sep;
1946 1.1 cgd {
1947 1.54 itojun struct sockaddr_storage ss;
1948 1.54 itojun struct sockaddr *sa;
1949 1.1 cgd static char *rs;
1950 1.1 cgd int len, size;
1951 1.1 cgd char text[LINESIZ+2];
1952 1.1 cgd
1953 1.1 cgd if (endring == 0) {
1954 1.1 cgd initring();
1955 1.1 cgd rs = ring;
1956 1.1 cgd }
1957 1.1 cgd
1958 1.54 itojun sa = (struct sockaddr *)&ss;
1959 1.54 itojun size = sizeof(ss);
1960 1.54 itojun if (recvfrom(s, text, sizeof(text), 0, sa, &size) < 0)
1961 1.1 cgd return;
1962 1.1 cgd
1963 1.54 itojun if (!port_good_dg(sa))
1964 1.47 hwr return;
1965 1.47 hwr
1966 1.1 cgd if ((len = endring - rs) >= LINESIZ)
1967 1.23 mycroft memmove(text, rs, LINESIZ);
1968 1.1 cgd else {
1969 1.23 mycroft memmove(text, rs, len);
1970 1.23 mycroft memmove(text + len, ring, LINESIZ - len);
1971 1.1 cgd }
1972 1.1 cgd if (++rs == endring)
1973 1.1 cgd rs = ring;
1974 1.1 cgd text[LINESIZ] = '\r';
1975 1.1 cgd text[LINESIZ + 1] = '\n';
1976 1.54 itojun (void) sendto(s, text, sizeof(text), 0, sa, size);
1977 1.1 cgd }
1978 1.1 cgd
1979 1.1 cgd /*
1980 1.1 cgd * Return a machine readable date and time, in the form of the
1981 1.1 cgd * number of seconds since midnight, Jan 1, 1900. Since gettimeofday
1982 1.1 cgd * returns the number of seconds since midnight, Jan 1, 1970,
1983 1.1 cgd * we must add 2208988800 seconds to this figure to make up for
1984 1.1 cgd * some seventy years Bell Labs was asleep.
1985 1.1 cgd */
1986 1.1 cgd
1987 1.1 cgd long
1988 1.1 cgd machtime()
1989 1.1 cgd {
1990 1.1 cgd struct timeval tv;
1991 1.1 cgd
1992 1.1 cgd if (gettimeofday(&tv, (struct timezone *)0) < 0) {
1993 1.23 mycroft if (debug)
1994 1.23 mycroft fprintf(stderr, "Unable to get time of day\n");
1995 1.1 cgd return (0L);
1996 1.1 cgd }
1997 1.23 mycroft #define OFFSET ((u_long)25567 * 24*60*60)
1998 1.23 mycroft return (htonl((long)(tv.tv_sec + OFFSET)));
1999 1.23 mycroft #undef OFFSET
2000 1.1 cgd }
2001 1.1 cgd
2002 1.1 cgd /* ARGSUSED */
2003 1.23 mycroft void
2004 1.1 cgd machtime_stream(s, sep)
2005 1.1 cgd int s;
2006 1.1 cgd struct servtab *sep;
2007 1.1 cgd {
2008 1.1 cgd long result;
2009 1.1 cgd
2010 1.1 cgd result = machtime();
2011 1.1 cgd (void) write(s, (char *) &result, sizeof(result));
2012 1.1 cgd }
2013 1.1 cgd
2014 1.1 cgd /* ARGSUSED */
2015 1.23 mycroft void
2016 1.1 cgd machtime_dg(s, sep)
2017 1.1 cgd int s;
2018 1.1 cgd struct servtab *sep;
2019 1.1 cgd {
2020 1.1 cgd long result;
2021 1.54 itojun struct sockaddr_storage ss;
2022 1.54 itojun struct sockaddr *sa;
2023 1.1 cgd int size;
2024 1.1 cgd
2025 1.54 itojun sa = (struct sockaddr *)&ss;
2026 1.54 itojun size = sizeof(ss);
2027 1.54 itojun if (recvfrom(s, (char *)&result, sizeof(result), 0, sa, &size) < 0)
2028 1.1 cgd return;
2029 1.54 itojun if (!port_good_dg(sa))
2030 1.47 hwr return;
2031 1.1 cgd result = machtime();
2032 1.54 itojun (void) sendto(s, (char *) &result, sizeof(result), 0, sa, size);
2033 1.1 cgd }
2034 1.1 cgd
2035 1.1 cgd /* ARGSUSED */
2036 1.23 mycroft void
2037 1.1 cgd daytime_stream(s, sep) /* Return human-readable time of day */
2038 1.1 cgd int s;
2039 1.1 cgd struct servtab *sep;
2040 1.1 cgd {
2041 1.1 cgd char buffer[256];
2042 1.23 mycroft time_t clock;
2043 1.12 mrg int len;
2044 1.1 cgd
2045 1.1 cgd clock = time((time_t *) 0);
2046 1.1 cgd
2047 1.12 mrg len = snprintf(buffer, sizeof buffer, "%.24s\r\n", ctime(&clock));
2048 1.12 mrg (void) write(s, buffer, len);
2049 1.1 cgd }
2050 1.1 cgd
2051 1.1 cgd /* ARGSUSED */
2052 1.23 mycroft void
2053 1.1 cgd daytime_dg(s, sep) /* Return human-readable time of day */
2054 1.1 cgd int s;
2055 1.1 cgd struct servtab *sep;
2056 1.1 cgd {
2057 1.1 cgd char buffer[256];
2058 1.23 mycroft time_t clock;
2059 1.54 itojun struct sockaddr_storage ss;
2060 1.54 itojun struct sockaddr *sa;
2061 1.23 mycroft int size, len;
2062 1.1 cgd
2063 1.1 cgd clock = time((time_t *) 0);
2064 1.1 cgd
2065 1.54 itojun sa = (struct sockaddr *)&ss;
2066 1.54 itojun size = sizeof(ss);
2067 1.54 itojun if (recvfrom(s, buffer, sizeof(buffer), 0, sa, &size) < 0)
2068 1.1 cgd return;
2069 1.54 itojun if (!port_good_dg(sa))
2070 1.47 hwr return;
2071 1.23 mycroft len = snprintf(buffer, sizeof buffer, "%.24s\r\n", ctime(&clock));
2072 1.54 itojun (void) sendto(s, buffer, len, 0, sa, size);
2073 1.1 cgd }
2074 1.1 cgd
2075 1.1 cgd /*
2076 1.1 cgd * print_service:
2077 1.1 cgd * Dump relevant information to stderr
2078 1.1 cgd */
2079 1.23 mycroft void
2080 1.1 cgd print_service(action, sep)
2081 1.1 cgd char *action;
2082 1.1 cgd struct servtab *sep;
2083 1.1 cgd {
2084 1.5 pk if (isrpcservice(sep))
2085 1.5 pk fprintf(stderr,
2086 1.55 ad "%s: %s rpcprog=%d, rpcvers = %d/%d, proto=%s, wait:max=%d.%d, user:group=%s.%s builtin=%lx server=%s"
2087 1.49 itojun #ifdef IPSEC
2088 1.49 itojun " policy=\"%s\""
2089 1.49 itojun #endif
2090 1.49 itojun "\n",
2091 1.5 pk action, sep->se_service,
2092 1.5 pk sep->se_rpcprog, sep->se_rpcversh, sep->se_rpcversl, sep->se_proto,
2093 1.5 pk sep->se_wait, sep->se_max, sep->se_user, sep->se_group,
2094 1.49 itojun (long)sep->se_bi, sep->se_server
2095 1.49 itojun #ifdef IPSEC
2096 1.49 itojun , (sep->se_policy ? sep->se_policy : "")
2097 1.49 itojun #endif
2098 1.49 itojun );
2099 1.5 pk else
2100 1.5 pk fprintf(stderr,
2101 1.55 ad "%s: %s proto=%s, wait:max=%d.%d, user:group=%s.%s builtin=%lx server=%s"
2102 1.49 itojun #ifdef IPSEC
2103 1.49 itojun " policy=%s"
2104 1.49 itojun #endif
2105 1.49 itojun "\n",
2106 1.5 pk action, sep->se_service, sep->se_proto,
2107 1.5 pk sep->se_wait, sep->se_max, sep->se_user, sep->se_group,
2108 1.49 itojun (long)sep->se_bi, sep->se_server
2109 1.49 itojun #ifdef IPSEC
2110 1.49 itojun , (sep->se_policy ? sep->se_policy : "")
2111 1.49 itojun #endif
2112 1.49 itojun );
2113 1.5 pk }
2114 1.5 pk
2115 1.23 mycroft void
2116 1.23 mycroft usage()
2117 1.23 mycroft {
2118 1.23 mycroft
2119 1.23 mycroft #ifdef LIBWRAP
2120 1.23 mycroft (void)fprintf(stderr, "usage: %s [-dl] [conf]\n", __progname);
2121 1.23 mycroft #else
2122 1.23 mycroft (void)fprintf(stderr, "usage: %s [-d] [conf]\n", __progname);
2123 1.23 mycroft #endif
2124 1.23 mycroft exit(1);
2125 1.23 mycroft }
2126 1.23 mycroft
2127 1.23 mycroft
2128 1.23 mycroft /*
2129 1.23 mycroft * Based on TCPMUX.C by Mark K. Lottor November 1988
2130 1.23 mycroft * sri-nic::ps:<mkl>tcpmux.c
2131 1.23 mycroft */
2132 1.23 mycroft
2133 1.23 mycroft static int /* # of characters upto \r,\n or \0 */
2134 1.23 mycroft getline(fd, buf, len)
2135 1.23 mycroft int fd;
2136 1.23 mycroft char *buf;
2137 1.23 mycroft int len;
2138 1.23 mycroft {
2139 1.23 mycroft int count = 0, n;
2140 1.23 mycroft
2141 1.23 mycroft do {
2142 1.23 mycroft n = read(fd, buf, len-count);
2143 1.23 mycroft if (n == 0)
2144 1.23 mycroft return (count);
2145 1.23 mycroft if (n < 0)
2146 1.23 mycroft return (-1);
2147 1.23 mycroft while (--n >= 0) {
2148 1.23 mycroft if (*buf == '\r' || *buf == '\n' || *buf == '\0')
2149 1.23 mycroft return (count);
2150 1.23 mycroft count++;
2151 1.23 mycroft buf++;
2152 1.23 mycroft }
2153 1.23 mycroft } while (count < len);
2154 1.23 mycroft return (count);
2155 1.23 mycroft }
2156 1.23 mycroft
2157 1.23 mycroft #define MAX_SERV_LEN (256+2) /* 2 bytes for \r\n */
2158 1.23 mycroft
2159 1.23 mycroft #define strwrite(fd, buf) (void) write(fd, buf, sizeof(buf)-1)
2160 1.23 mycroft
2161 1.30 mycroft void
2162 1.30 mycroft tcpmux(ctrl, sep)
2163 1.30 mycroft int ctrl;
2164 1.30 mycroft struct servtab *sep;
2165 1.23 mycroft {
2166 1.23 mycroft char service[MAX_SERV_LEN+1];
2167 1.23 mycroft int len;
2168 1.23 mycroft
2169 1.23 mycroft /* Get requested service name */
2170 1.30 mycroft if ((len = getline(ctrl, service, MAX_SERV_LEN)) < 0) {
2171 1.30 mycroft strwrite(ctrl, "-Error reading service name\r\n");
2172 1.30 mycroft goto reject;
2173 1.23 mycroft }
2174 1.23 mycroft service[len] = '\0';
2175 1.23 mycroft
2176 1.23 mycroft if (debug)
2177 1.23 mycroft fprintf(stderr, "tcpmux: someone wants %s\n", service);
2178 1.23 mycroft
2179 1.23 mycroft /*
2180 1.23 mycroft * Help is a required command, and lists available services,
2181 1.23 mycroft * one per line.
2182 1.23 mycroft */
2183 1.23 mycroft if (!strcasecmp(service, "help")) {
2184 1.31 mycroft strwrite(ctrl, "+Available services:\r\n");
2185 1.31 mycroft strwrite(ctrl, "help\r\n");
2186 1.23 mycroft for (sep = servtab; sep; sep = sep->se_next) {
2187 1.23 mycroft if (!ISMUX(sep))
2188 1.23 mycroft continue;
2189 1.30 mycroft (void)write(ctrl, sep->se_service,
2190 1.30 mycroft strlen(sep->se_service));
2191 1.30 mycroft strwrite(ctrl, "\r\n");
2192 1.23 mycroft }
2193 1.30 mycroft goto reject;
2194 1.23 mycroft }
2195 1.23 mycroft
2196 1.23 mycroft /* Try matching a service in inetd.conf with the request */
2197 1.23 mycroft for (sep = servtab; sep; sep = sep->se_next) {
2198 1.23 mycroft if (!ISMUX(sep))
2199 1.23 mycroft continue;
2200 1.23 mycroft if (!strcasecmp(service, sep->se_service)) {
2201 1.30 mycroft if (ISMUXPLUS(sep))
2202 1.30 mycroft strwrite(ctrl, "+Go\r\n");
2203 1.30 mycroft run_service(ctrl, sep);
2204 1.30 mycroft return;
2205 1.23 mycroft }
2206 1.23 mycroft }
2207 1.30 mycroft strwrite(ctrl, "-Service not available\r\n");
2208 1.30 mycroft reject:
2209 1.30 mycroft _exit(1);
2210 1.23 mycroft }
2211 1.23 mycroft
2212 1.23 mycroft
2213 1.5 pk #ifdef MULOG
2214 1.5 pk dolog(sep, ctrl)
2215 1.5 pk struct servtab *sep;
2216 1.5 pk int ctrl;
2217 1.5 pk {
2218 1.49 itojun struct sockaddr_storage ss;
2219 1.54 itojun struct sockaddr *sa = (struct sockaddr *)&ss;
2220 1.49 itojun struct sockaddr_in *sin = (struct sockaddr_in *)&ss;
2221 1.49 itojun int len = sizeof(ss);
2222 1.5 pk struct hostent *hp;
2223 1.5 pk char *host, *dp, buf[BUFSIZ], *rfc931_name();
2224 1.5 pk int connected = 1;
2225 1.5 pk
2226 1.49 itojun switch (sep->se_family) {
2227 1.49 itojun case AF_INET:
2228 1.49 itojun case AF_INET6:
2229 1.49 itojun break;
2230 1.49 itojun default;
2231 1.5 pk return;
2232 1.49 itojun }
2233 1.5 pk
2234 1.49 itojun if (getpeername(ctrl, sa, &len) < 0) {
2235 1.5 pk if (errno != ENOTCONN) {
2236 1.5 pk syslog(LOG_ERR, "getpeername: %m");
2237 1.5 pk return;
2238 1.5 pk }
2239 1.49 itojun if (recvfrom(ctrl, buf, sizeof(buf), MSG_PEEK, sa, &len) < 0) {
2240 1.5 pk syslog(LOG_ERR, "recvfrom: %m");
2241 1.5 pk return;
2242 1.5 pk }
2243 1.5 pk connected = 0;
2244 1.5 pk }
2245 1.49 itojun switch (sa->sa_family) {
2246 1.49 itojun case AF_INET:
2247 1.49 itojun case AF_INET6:
2248 1.49 itojun break;
2249 1.49 itojun default;
2250 1.49 itojun syslog(LOG_ERR, "unexpected address family %u", sa->sa_family);
2251 1.5 pk return;
2252 1.5 pk }
2253 1.5 pk
2254 1.57 itojun if (getnameinfo(sa, sa->sa_len, buf, sizeof(buf), NULL, 0, 0) != 0)
2255 1.57 itojun strcpy(buf, "?");
2256 1.49 itojun host = buf;
2257 1.5 pk
2258 1.5 pk switch (sep->se_log & ~MULOG_RFC931) {
2259 1.5 pk case 0:
2260 1.5 pk return;
2261 1.5 pk case 1:
2262 1.5 pk if (curdom == NULL || *curdom == '\0')
2263 1.5 pk break;
2264 1.5 pk dp = host + strlen(host) - strlen(curdom);
2265 1.5 pk if (dp < host)
2266 1.5 pk break;
2267 1.5 pk if (debug)
2268 1.5 pk fprintf(stderr, "check \"%s\" against curdom \"%s\"\n",
2269 1.23 mycroft host, curdom);
2270 1.5 pk if (strcasecmp(dp, curdom) == 0)
2271 1.5 pk return;
2272 1.5 pk break;
2273 1.5 pk case 2:
2274 1.5 pk default:
2275 1.5 pk break;
2276 1.5 pk }
2277 1.5 pk
2278 1.5 pk openlog("", LOG_NOWAIT, MULOG);
2279 1.5 pk
2280 1.5 pk if (connected && (sep->se_log & MULOG_RFC931))
2281 1.5 pk syslog(LOG_INFO, "%s@%s wants %s",
2282 1.49 itojun rfc931_name(sa, ctrl), host, sep->se_service);
2283 1.5 pk else
2284 1.5 pk syslog(LOG_INFO, "%s wants %s",
2285 1.23 mycroft host, sep->se_service);
2286 1.5 pk }
2287 1.23 mycroft
2288 1.5 pk /*
2289 1.5 pk * From tcp_log by
2290 1.5 pk * Wietse Venema, Eindhoven University of Technology, The Netherlands.
2291 1.5 pk */
2292 1.5 pk #if 0
2293 1.5 pk static char sccsid[] = "@(#) rfc931.c 1.3 92/08/31 22:54:46";
2294 1.5 pk #endif
2295 1.5 pk
2296 1.5 pk #include <setjmp.h>
2297 1.5 pk
2298 1.5 pk #define RFC931_PORT 113 /* Semi-well-known port */
2299 1.5 pk #define TIMEOUT 4
2300 1.5 pk #define TIMEOUT2 10
2301 1.5 pk
2302 1.5 pk static jmp_buf timebuf;
2303 1.5 pk
2304 1.5 pk /* timeout - handle timeouts */
2305 1.5 pk
2306 1.5 pk static void timeout(sig)
2307 1.5 pk int sig;
2308 1.5 pk {
2309 1.5 pk longjmp(timebuf, sig);
2310 1.5 pk }
2311 1.5 pk
2312 1.5 pk /* rfc931_name - return remote user name */
2313 1.5 pk
2314 1.5 pk char *
2315 1.5 pk rfc931_name(there, ctrl)
2316 1.49 itojun struct sockaddr *there; /* remote link information */
2317 1.5 pk int ctrl;
2318 1.5 pk {
2319 1.49 itojun struct sockaddr_storage here; /* local link information */
2320 1.49 itojun struct sockaddr_storage sin; /* for talking to RFC931 daemon */
2321 1.5 pk int length;
2322 1.5 pk int s;
2323 1.5 pk unsigned remote;
2324 1.5 pk unsigned local;
2325 1.5 pk static char user[256]; /* XXX */
2326 1.5 pk char buf[256];
2327 1.5 pk char *cp;
2328 1.5 pk char *result = "USER_UNKNOWN";
2329 1.5 pk int len;
2330 1.49 itojun u_int16_t myport, hisport;
2331 1.5 pk
2332 1.5 pk /* Find out local port number of our stdin. */
2333 1.5 pk
2334 1.5 pk length = sizeof(here);
2335 1.5 pk if (getsockname(ctrl, (struct sockaddr *) &here, &length) == -1) {
2336 1.5 pk syslog(LOG_ERR, "getsockname: %m");
2337 1.5 pk return (result);
2338 1.5 pk }
2339 1.49 itojun switch (here.ss_family) {
2340 1.49 itojun case AF_INET:
2341 1.49 itojun myport = ((struct sockaddr_in *)&here)->sin_port;
2342 1.49 itojun break;
2343 1.49 itojun case AF_INET6:
2344 1.49 itojun myport = ((struct sockaddr_in6 *)&here)->sin6_port;
2345 1.49 itojun break;
2346 1.49 itojun }
2347 1.49 itojun switch (there->sa_family) {
2348 1.49 itojun case AF_INET:
2349 1.49 itojun hisport = ((struct sockaddr_in *)sa)->sin_port;
2350 1.49 itojun break;
2351 1.49 itojun case AF_INET6:
2352 1.49 itojun hisport = ((struct sockaddr_in6 *)sa)->sin6_port;
2353 1.49 itojun break;
2354 1.49 itojun }
2355 1.5 pk /* Set up timer so we won't get stuck. */
2356 1.5 pk
2357 1.49 itojun if ((s = socket(here.ss_family, SOCK_STREAM, 0)) == -1) {
2358 1.5 pk syslog(LOG_ERR, "socket: %m");
2359 1.5 pk return (result);
2360 1.5 pk }
2361 1.5 pk
2362 1.5 pk sin = here;
2363 1.49 itojun switch (sin.ss_family) {
2364 1.49 itojun case AF_INET:
2365 1.49 itojun ((struct sockaddr_in *)&sin)->sin_port = htons(0);
2366 1.49 itojun break;
2367 1.49 itojun case AF_INET6:
2368 1.49 itojun ((struct sockaddr_in6 *)&sin)->sin6_port = htons(0);
2369 1.49 itojun break;
2370 1.49 itojun }
2371 1.49 itojun if (bind(s, (struct sockaddr *) &sin, sin.ss_len) == -1) {
2372 1.5 pk syslog(LOG_ERR, "bind: %m");
2373 1.5 pk return (result);
2374 1.5 pk }
2375 1.5 pk
2376 1.5 pk signal(SIGALRM, timeout);
2377 1.5 pk if (setjmp(timebuf)) {
2378 1.5 pk close(s); /* not: fclose(fp) */
2379 1.5 pk return (result);
2380 1.5 pk }
2381 1.5 pk alarm(TIMEOUT);
2382 1.5 pk
2383 1.5 pk /* Connect to the RFC931 daemon. */
2384 1.5 pk
2385 1.49 itojun memcpy(&sin, there, there->sa_len);
2386 1.49 itojun switch (sin.ss_family) {
2387 1.49 itojun case AF_INET:
2388 1.49 itojun ((struct sockaddr_in *)&sin)->sin_port = htons(RFC931_PORT);
2389 1.49 itojun break;
2390 1.49 itojun case AF_INET6:
2391 1.49 itojun ((struct sockaddr_in6 *)&sin)->sin6_port = htons(RFC931_PORT);
2392 1.49 itojun break;
2393 1.49 itojun }
2394 1.49 itojun if (connect(s, (struct sockaddr *) &sin, sin.ss_len) == -1) {
2395 1.5 pk close(s);
2396 1.5 pk alarm(0);
2397 1.5 pk return (result);
2398 1.5 pk }
2399 1.5 pk
2400 1.5 pk /* Query the RFC 931 server. Would 13-byte writes ever be broken up? */
2401 1.49 itojun (void)snprintf(buf, sizeof buf, "%u,%u\r\n", ntohs(hisport),
2402 1.49 itojun ntohs(myport));
2403 1.5 pk
2404 1.5 pk
2405 1.5 pk for (len = 0, cp = buf; len < strlen(buf); ) {
2406 1.5 pk int n;
2407 1.12 mrg
2408 1.5 pk if ((n = write(s, cp, strlen(buf) - len)) == -1) {
2409 1.5 pk close(s);
2410 1.5 pk alarm(0);
2411 1.5 pk return (result);
2412 1.5 pk }
2413 1.5 pk cp += n;
2414 1.5 pk len += n;
2415 1.5 pk }
2416 1.5 pk
2417 1.5 pk /* Read response */
2418 1.5 pk for (cp = buf; cp < buf + sizeof(buf) - 1; ) {
2419 1.5 pk char c;
2420 1.5 pk if (read(s, &c, 1) != 1) {
2421 1.5 pk close(s);
2422 1.5 pk alarm(0);
2423 1.5 pk return (result);
2424 1.5 pk }
2425 1.5 pk if (c == '\n')
2426 1.5 pk break;
2427 1.5 pk *cp++ = c;
2428 1.5 pk }
2429 1.5 pk *cp = '\0';
2430 1.5 pk
2431 1.5 pk if (sscanf(buf, "%u , %u : USERID :%*[^:]:%255s", &remote, &local, user) == 3
2432 1.49 itojun && ntohs(hisport) == remote
2433 1.49 itojun && ntohs(myport) == local) {
2434 1.5 pk
2435 1.5 pk /* Strip trailing carriage return. */
2436 1.5 pk if (cp = strchr(user, '\r'))
2437 1.5 pk *cp = 0;
2438 1.5 pk result = user;
2439 1.5 pk }
2440 1.5 pk
2441 1.5 pk alarm(0);
2442 1.5 pk close(s);
2443 1.5 pk return (result);
2444 1.1 cgd }
2445 1.5 pk #endif
2446 1.47 hwr
2447 1.47 hwr /*
2448 1.47 hwr * check if the port where send data to is one of the obvious ports
2449 1.47 hwr * that are used for denial of service attacks like two echo ports
2450 1.47 hwr * just echoing data between them
2451 1.47 hwr */
2452 1.54 itojun int
2453 1.54 itojun port_good_dg(sa)
2454 1.54 itojun struct sockaddr *sa;
2455 1.47 hwr {
2456 1.47 hwr u_int16_t port;
2457 1.54 itojun int i, bad;
2458 1.57 itojun char hbuf[NI_MAXHOST];
2459 1.47 hwr
2460 1.54 itojun bad = 0;
2461 1.47 hwr
2462 1.54 itojun switch (sa->sa_family) {
2463 1.54 itojun case AF_INET:
2464 1.54 itojun port = ntohs(((struct sockaddr_in *)sa)->sin_port);
2465 1.54 itojun break;
2466 1.54 itojun case AF_INET6:
2467 1.54 itojun port = ntohs(((struct sockaddr_in6 *)sa)->sin6_port);
2468 1.54 itojun break;
2469 1.54 itojun default:
2470 1.54 itojun /* XXX unsupported af, is it safe to assume it to be safe? */
2471 1.54 itojun return 1;
2472 1.54 itojun }
2473 1.47 hwr
2474 1.54 itojun for (i = 0; bad_ports[i] != 0; i++)
2475 1.54 itojun if (port == bad_ports[i]) {
2476 1.54 itojun bad = 1;
2477 1.47 hwr break;
2478 1.47 hwr }
2479 1.47 hwr
2480 1.47 hwr if (bad) {
2481 1.57 itojun if (getnameinfo(sa, sa->sa_len, hbuf, sizeof(hbuf),
2482 1.57 itojun NULL, 0, niflags) != 0)
2483 1.57 itojun strcpy(hbuf, "?");
2484 1.47 hwr syslog(LOG_WARNING,"Possible DoS attack from %s, Port %d",
2485 1.54 itojun hbuf, port);
2486 1.47 hwr return (0);
2487 1.47 hwr } else
2488 1.47 hwr return (1);
2489 1.47 hwr }
2490 1.47 hwr
2491