Home | History | Annotate | Line # | Download | only in rpcbind
pmap_svc.c revision 1.2
      1 /*	$NetBSD: pmap_svc.c,v 1.2 2000/10/20 11:49:40 fvdl Exp $	*/
      2 
      3 /*
      4  * Sun RPC is a product of Sun Microsystems, Inc. and is provided for
      5  * unrestricted use provided that this legend is included on all tape
      6  * media and as a part of the software program in whole or part.  Users
      7  * may copy or modify Sun RPC without charge, but are not authorized
      8  * to license or distribute it to anyone else except as part of a product or
      9  * program developed by the user.
     10  *
     11  * SUN RPC IS PROVIDED AS IS WITH NO WARRANTIES OF ANY KIND INCLUDING THE
     12  * WARRANTIES OF DESIGN, MERCHANTIBILITY AND FITNESS FOR A PARTICULAR
     13  * PURPOSE, OR ARISING FROM A COURSE OF DEALING, USAGE OR TRADE PRACTICE.
     14  *
     15  * Sun RPC is provided with no support and without any obligation on the
     16  * part of Sun Microsystems, Inc. to assist in its use, correction,
     17  * modification or enhancement.
     18  *
     19  * SUN MICROSYSTEMS, INC. SHALL HAVE NO LIABILITY WITH RESPECT TO THE
     20  * INFRINGEMENT OF COPYRIGHTS, TRADE SECRETS OR ANY PATENTS BY SUN RPC
     21  * OR ANY PART THEREOF.
     22  *
     23  * In no event will Sun Microsystems, Inc. be liable for any lost revenue
     24  * or profits or other special, indirect and consequential damages, even if
     25  * Sun has been advised of the possibility of such damages.
     26  *
     27  * Sun Microsystems, Inc.
     28  * 2550 Garcia Avenue
     29  * Mountain View, California  94043
     30  */
     31 /*
     32  * Copyright (c) 1984 - 1991 by Sun Microsystems, Inc.
     33  */
     34 
     35 /* #ident	"@(#)pmap_svc.c	1.14	93/07/05 SMI" */
     36 
     37 #if 0
     38 #ifndef lint
     39 static	char sccsid[] = "@(#)pmap_svc.c 1.23 89/04/05 Copyr 1984 Sun Micro";
     40 #endif
     41 #endif
     42 
     43 /*
     44  * pmap_svc.c
     45  * The server procedure for the version 2 portmaper.
     46  * All the portmapper related interface from the portmap side.
     47  */
     48 
     49 #ifdef PORTMAP
     50 #include <sys/types.h>
     51 #include <sys/socket.h>
     52 #include <stdio.h>
     53 #include <rpc/rpc.h>
     54 #include <rpc/pmap_prot.h>
     55 #include <rpc/rpcb_prot.h>
     56 #ifdef RPCBIND_DEBUG
     57 #include <stdlib.h>
     58 #endif
     59 #include "rpcbind.h"
     60 
     61 static struct pmaplist *find_service_pmap __P((rpcprog_t, rpcvers_t,
     62 					       rpcprot_t));
     63 static bool_t pmapproc_change __P((struct svc_req *, SVCXPRT *, u_long));
     64 static bool_t pmapproc_getport __P((struct svc_req *, SVCXPRT *));
     65 static bool_t pmapproc_dump __P((struct svc_req *, SVCXPRT *));
     66 
     67 /*
     68  * Called for all the version 2 inquiries.
     69  */
     70 void
     71 pmap_service(struct svc_req *rqstp, SVCXPRT *xprt)
     72 {
     73 	rpcbs_procinfo(RPCBVERS_2_STAT, rqstp->rq_proc);
     74 	switch (rqstp->rq_proc) {
     75 	case PMAPPROC_NULL:
     76 		/*
     77 		 * Null proc call
     78 		 */
     79 #ifdef RPCBIND_DEBUG
     80 		if (debugging)
     81 			fprintf(stderr, "PMAPPROC_NULL\n");
     82 #endif
     83 		check_access(xprt, rqstp->rq_proc, NULL, PMAPVERS);
     84 		if ((!svc_sendreply(xprt, (xdrproc_t) xdr_void, NULL)) &&
     85 			debugging) {
     86 			if (doabort) {
     87 				rpcbind_abort();
     88 			}
     89 		}
     90 		break;
     91 
     92 	case PMAPPROC_SET:
     93 		/*
     94 		 * Set a program, version to port mapping
     95 		 */
     96 		pmapproc_change(rqstp, xprt, rqstp->rq_proc);
     97 		break;
     98 
     99 	case PMAPPROC_UNSET:
    100 		/*
    101 		 * Remove a program, version to port mapping.
    102 		 */
    103 		pmapproc_change(rqstp, xprt, rqstp->rq_proc);
    104 		break;
    105 
    106 	case PMAPPROC_GETPORT:
    107 		/*
    108 		 * Lookup the mapping for a program, version and return its
    109 		 * port number.
    110 		 */
    111 		pmapproc_getport(rqstp, xprt);
    112 		break;
    113 
    114 	case PMAPPROC_DUMP:
    115 		/*
    116 		 * Return the current set of mapped program, version
    117 		 */
    118 #ifdef RPCBIND_DEBUG
    119 		if (debugging)
    120 			fprintf(stderr, "PMAPPROC_DUMP\n");
    121 #endif
    122 		pmapproc_dump(rqstp, xprt);
    123 		break;
    124 
    125 	case PMAPPROC_CALLIT:
    126 		/*
    127 		 * Calls a procedure on the local machine. If the requested
    128 		 * procedure is not registered this procedure does not return
    129 		 * error information!!
    130 		 * This procedure is only supported on rpc/udp and calls via
    131 		 * rpc/udp. It passes null authentication parameters.
    132 		 */
    133 		rpcbproc_callit_com(rqstp, xprt, PMAPPROC_CALLIT, PMAPVERS);
    134 		break;
    135 
    136 	default:
    137 		svcerr_noproc(xprt);
    138 		break;
    139 	}
    140 }
    141 
    142 /*
    143  * returns the item with the given program, version number. If that version
    144  * number is not found, it returns the item with that program number, so that
    145  * the port number is now returned to the caller. The caller when makes a
    146  * call to this program, version number, the call will fail and it will
    147  * return with PROGVERS_MISMATCH. The user can then determine the highest
    148  * and the lowest version number for this program using clnt_geterr() and
    149  * use those program version numbers.
    150  */
    151 static struct pmaplist *
    152 find_service_pmap(rpcprog_t prog, rpcvers_t vers, rpcprot_t prot)
    153 {
    154 	register struct pmaplist *hit = NULL;
    155 	register struct pmaplist *pml;
    156 
    157 	for (pml = list_pml; pml != NULL; pml = pml->pml_next) {
    158 		if ((pml->pml_map.pm_prog != prog) ||
    159 			(pml->pml_map.pm_prot != prot))
    160 			continue;
    161 		hit = pml;
    162 		if (pml->pml_map.pm_vers == vers)
    163 			break;
    164 	}
    165 	return (hit);
    166 }
    167 
    168 static bool_t
    169 pmapproc_change(struct svc_req *rqstp, SVCXPRT *xprt, unsigned long op)
    170 {
    171 	struct pmap reg;
    172 	RPCB rpcbreg;
    173 	long ans;
    174 	struct sockaddr_in *who;
    175 	struct sockcred *sc;
    176 	char uidbuf[32];
    177 
    178 #ifdef RPCBIND_DEBUG
    179 	if (debugging)
    180 		fprintf(stderr, "%s request for (%lu, %lu) : ",
    181 		    op == PMAPPROC_SET ? "PMAP_SET" : "PMAP_UNSET",
    182 		    reg.pm_prog, reg.pm_vers);
    183 #endif
    184 
    185 	if (!svc_getargs(xprt, (xdrproc_t) xdr_pmap, (char *)&reg)) {
    186 		svcerr_decode(xprt);
    187 		return (FALSE);
    188 	}
    189 
    190 	if (!check_access(xprt, op, &reg, PMAPVERS)) {
    191 		svcerr_weakauth(xprt);
    192 		return FALSE;
    193 	}
    194 
    195 	who = svc_getcaller(xprt);
    196 	sc = __svc_getcallercreds(xprt);
    197 
    198 	/*
    199 	 * Can't use getpwnam here. We might end up calling ourselves
    200 	 * and looping.
    201 	 */
    202 	if (sc == NULL)
    203 		rpcbreg.r_owner = "unknown";
    204 	else if (sc->sc_uid == 0)
    205 		rpcbreg.r_owner = "superuser";
    206 	else {
    207 		/* r_owner will be strdup-ed later */
    208 		snprintf(uidbuf, sizeof uidbuf, "%d", sc->sc_uid);
    209 		rpcbreg.r_owner = uidbuf;
    210 	}
    211 
    212 	rpcbreg.r_prog = reg.pm_prog;
    213 	rpcbreg.r_vers = reg.pm_vers;
    214 
    215 	if (op == PMAPPROC_SET) {
    216 		char buf[32];
    217 
    218 		sprintf(buf, "0.0.0.0.%d.%d", (int)((reg.pm_port >> 8) & 0xff),
    219 			(int)(reg.pm_port & 0xff));
    220 		rpcbreg.r_addr = buf;
    221 		if (reg.pm_prot == IPPROTO_UDP) {
    222 			rpcbreg.r_netid = udptrans;
    223 		} else if (reg.pm_prot == IPPROTO_TCP) {
    224 			rpcbreg.r_netid = tcptrans;
    225 		} else {
    226 			ans = FALSE;
    227 			goto done_change;
    228 		}
    229 		ans = map_set(&rpcbreg, rpcbreg.r_owner);
    230 	} else if (op == PMAPPROC_UNSET) {
    231 		bool_t ans1, ans2;
    232 
    233 		rpcbreg.r_addr = NULL;
    234 		rpcbreg.r_netid = tcptrans;
    235 		ans1 = map_unset(&rpcbreg, rpcbreg.r_owner);
    236 		rpcbreg.r_netid = udptrans;
    237 		ans2 = map_unset(&rpcbreg, rpcbreg.r_owner);
    238 		ans = ans1 || ans2;
    239 	} else {
    240 		ans = FALSE;
    241 	}
    242 done_change:
    243 	if ((!svc_sendreply(xprt, (xdrproc_t) xdr_long, (caddr_t) &ans)) &&
    244 	    debugging) {
    245 		fprintf(stderr, "portmap: svc_sendreply\n");
    246 		if (doabort) {
    247 			rpcbind_abort();
    248 		}
    249 	}
    250 #ifdef RPCBIND_DEBUG
    251 	if (debugging)
    252 		fprintf(stderr, "%s\n", ans == TRUE ? "succeeded" : "failed");
    253 #endif
    254 	if (op == PMAPPROC_SET)
    255 		rpcbs_set(RPCBVERS_2_STAT, ans);
    256 	else
    257 		rpcbs_unset(RPCBVERS_2_STAT, ans);
    258 	return (TRUE);
    259 }
    260 
    261 /* ARGSUSED */
    262 static bool_t
    263 pmapproc_getport(struct svc_req *rqstp, SVCXPRT *xprt)
    264 {
    265 	struct pmap reg;
    266 	long lport;
    267 	int port = 0;
    268 	struct pmaplist *fnd;
    269 #ifdef RPCBIND_DEBUG
    270 	char *uaddr;
    271 #endif
    272 
    273 	if (!svc_getargs(xprt, (xdrproc_t) xdr_pmap, (char *)&reg)) {
    274 		svcerr_decode(xprt);
    275 		return (FALSE);
    276 	}
    277 
    278 	if (!check_access(xprt, PMAPPROC_GETPORT, &reg, PMAPVERS)) {
    279 		svcerr_weakauth(xprt);
    280 		return FALSE;
    281 	}
    282 
    283 #ifdef RPCBIND_DEBUG
    284 	if (debugging) {
    285 		uaddr =  taddr2uaddr(rpcbind_get_conf(xprt->xp_netid),
    286 			    svc_getrpccaller(xprt));
    287 		fprintf(stderr, "PMAP_GETPORT req for (%lu, %lu, %s) from %s :",
    288 			reg.pm_prog, reg.pm_vers,
    289 			reg.pm_prot == IPPROTO_UDP ? "udp" : "tcp", uaddr);
    290 		free(uaddr);
    291 	}
    292 #endif
    293 	fnd = find_service_pmap(reg.pm_prog, reg.pm_vers, reg.pm_prot);
    294 	if (fnd) {
    295 		char serveuaddr[32], *ua;
    296 		int h1, h2, h3, h4, p1, p2;
    297 		char *netid;
    298 
    299 		if (reg.pm_prot == IPPROTO_UDP) {
    300 			ua = udp_uaddr;
    301 			netid = udptrans;
    302 		} else {
    303 			ua = tcp_uaddr; /* To get the len */
    304 			netid = tcptrans;
    305 		}
    306 		if (ua == NULL) {
    307 			goto sendreply;
    308 		}
    309 		if (sscanf(ua, "%d.%d.%d.%d.%d.%d", &h1, &h2, &h3,
    310 				&h4, &p1, &p2) == 6) {
    311 			p1 = (fnd->pml_map.pm_port >> 8) & 0xff;
    312 			p2 = (fnd->pml_map.pm_port) & 0xff;
    313 			sprintf(serveuaddr, "%d.%d.%d.%d.%d.%d",
    314 				h1, h2, h3, h4, p1, p2);
    315 			if (is_bound(netid, serveuaddr)) {
    316 				port = fnd->pml_map.pm_port;
    317 			} else { /* this service is dead; delete it */
    318 				delete_prog(reg.pm_prog);
    319 			}
    320 		}
    321 	}
    322 sendreply:
    323 	lport = port;
    324 	if ((!svc_sendreply(xprt, (xdrproc_t) xdr_long, (caddr_t)&lport)) &&
    325 			debugging) {
    326 		(void) fprintf(stderr, "portmap: svc_sendreply\n");
    327 		if (doabort) {
    328 			rpcbind_abort();
    329 		}
    330 	}
    331 #ifdef RPCBIND_DEBUG
    332 	if (debugging)
    333 		fprintf(stderr, "port = %d\n", port);
    334 #endif
    335 	rpcbs_getaddr(RPCBVERS_2_STAT, reg.pm_prog, reg.pm_vers,
    336 		reg.pm_prot == IPPROTO_UDP ? udptrans : tcptrans,
    337 		port ? udptrans : "");
    338 
    339 	return (TRUE);
    340 }
    341 
    342 /* ARGSUSED */
    343 static bool_t
    344 pmapproc_dump(struct svc_req *rqstp, SVCXPRT *xprt)
    345 {
    346 	if (!svc_getargs(xprt, (xdrproc_t)xdr_void, NULL)) {
    347 		svcerr_decode(xprt);
    348 		return (FALSE);
    349 	}
    350 
    351 	if (!check_access(xprt, PMAPPROC_DUMP, NULL, PMAPVERS)) {
    352 		svcerr_weakauth(xprt);
    353 		return FALSE;
    354 	}
    355 
    356 	if ((!svc_sendreply(xprt, (xdrproc_t) xdr_pmaplist_ptr,
    357 			(caddr_t)&list_pml)) && debugging) {
    358 		if (debugging)
    359 			(void) fprintf(stderr, "portmap: svc_sendreply\n");
    360 		if (doabort) {
    361 			rpcbind_abort();
    362 		}
    363 	}
    364 	return (TRUE);
    365 }
    366 
    367 #endif /* PORTMAP */
    368