1130b656e5
This will make a number of things easier in the future, as well as (finally!) avoiding the Id-smashing problem which has plagued developers for so long. Boy, I'm glad we're not using sup anymore. This update would have been insane otherwise.
574 lines
14 KiB
C
574 lines
14 KiB
C
/*
|
|
*
|
|
* Copyright 1987 by the Massachusetts Institute of Technology.
|
|
*
|
|
* For copying and distribution information,
|
|
* please see the file <mit-copyright.h>.
|
|
*
|
|
*/
|
|
|
|
#if 0
|
|
#ifndef lint
|
|
static char rcsid_kprop_c[] =
|
|
"$FreeBSD$";
|
|
#endif lint
|
|
#endif
|
|
|
|
#include <unistd.h>
|
|
#include <stdio.h>
|
|
#include <string.h>
|
|
#include <stdlib.h>
|
|
#include <sys/types.h>
|
|
#include <sys/file.h>
|
|
#include <signal.h>
|
|
#include <sys/stat.h>
|
|
#include <sys/socket.h>
|
|
#include <netinet/in.h>
|
|
#include <sys/param.h>
|
|
#include <netdb.h>
|
|
#include <krb.h>
|
|
#include <des.h>
|
|
|
|
#include "kprop.h"
|
|
|
|
/* for those broken Unixes without this defined... should be in sys/param.h */
|
|
#ifndef MAXHOSTNAMELEN
|
|
#define MAXHOSTNAMELEN 64
|
|
#endif
|
|
|
|
static char kprop_version[KPROP_PROT_VERSION_LEN] = KPROP_PROT_VERSION;
|
|
|
|
int debug = 0;
|
|
|
|
char my_realm[REALM_SZ];
|
|
int princ_data_size = 3 * sizeof(long) + 3 * sizeof(unsigned char);
|
|
short transfer_mode, net_transfer_mode;
|
|
int force_flag;
|
|
static char ok[] = ".dump_ok";
|
|
|
|
extern char *krb_get_phost(char *);
|
|
|
|
struct slave_host {
|
|
u_long net_addr;
|
|
char *name;
|
|
char *instance;
|
|
char *realm;
|
|
int not_time_yet;
|
|
int succeeded;
|
|
struct slave_host *next;
|
|
};
|
|
|
|
void Death(char *s);
|
|
int get_slaves(struct slave_host **psl, char *file, time_t ok_mtime);
|
|
int prop_to_slaves(struct slave_host *sl, int fd, char *fslv);
|
|
|
|
int
|
|
main(argc, argv)
|
|
int argc;
|
|
char *argv[];
|
|
{
|
|
int fd, i;
|
|
char *floc, *floc_ok;
|
|
char *fslv;
|
|
struct stat stbuf, stbuf_ok;
|
|
long l_init, l_final;
|
|
char *pc;
|
|
int l_diff;
|
|
static struct slave_host *slave_host_list = NULL;
|
|
struct slave_host *sh;
|
|
|
|
transfer_mode = KPROP_TRANSFER_PRIVATE;
|
|
|
|
time(&l_init);
|
|
pc = ctime(&l_init);
|
|
pc[strlen(pc) - 1] = '\0';
|
|
printf("\nStart slave propagation: %s\n", pc);
|
|
|
|
floc = (char *) NULL;
|
|
fslv = (char *) NULL;
|
|
|
|
if (krb_get_lrealm(my_realm,1) != KSUCCESS)
|
|
Death ("Getting my kerberos realm. Check krb.conf");
|
|
|
|
for (i = 1; i < argc; i++)
|
|
switch (argv[i][0]) {
|
|
case '-':
|
|
if (strcmp (argv[i], "-private") == 0)
|
|
transfer_mode = KPROP_TRANSFER_PRIVATE;
|
|
#ifdef not_safe_yet
|
|
else if (strcmp (argv[i], "-safe") == 0)
|
|
transfer_mode = KPROP_TRANSFER_SAFE;
|
|
else if (strcmp (argv[i], "-clear") == 0)
|
|
transfer_mode = KPROP_TRANSFER_CLEAR;
|
|
#endif
|
|
else if (strcmp (argv[i], "-realm") == 0) {
|
|
i++;
|
|
if (i < argc)
|
|
strcpy(my_realm, argv[i]);
|
|
else
|
|
goto usage;
|
|
} else if (strcmp (argv[i], "-force") == 0)
|
|
force_flag++;
|
|
else {
|
|
fprintf (stderr, "kprop: unknown control argument %s.\n",
|
|
argv[i]);
|
|
exit (1);
|
|
}
|
|
break;
|
|
default:
|
|
/* positional arguments are marginal at best ... */
|
|
if (floc == (char *) NULL)
|
|
floc = argv[i];
|
|
else {
|
|
if (fslv == (char *) NULL)
|
|
fslv = argv[i];
|
|
else {
|
|
usage:
|
|
/* already got floc and fslv, what is this? */
|
|
fprintf(stderr,
|
|
"\nUsage: kprop [-force] [-realm realm] [-private|-safe|-clear] data_file slaves_file\n\n");
|
|
exit(1);
|
|
}
|
|
}
|
|
}
|
|
if ((floc == (char *)NULL) || (fslv == (char *)NULL))
|
|
goto usage;
|
|
|
|
if ((floc_ok = (char *) malloc(strlen(floc) + strlen(ok) + 1))
|
|
== NULL) {
|
|
Death(floc);
|
|
}
|
|
strcat(strcpy(floc_ok, floc), ok);
|
|
|
|
if ((fd = open(floc, O_RDONLY)) < 0) {
|
|
Death(floc);
|
|
}
|
|
if (flock(fd, LOCK_EX | LOCK_NB)) {
|
|
Death(floc);
|
|
}
|
|
if (stat(floc, &stbuf)) {
|
|
Death(floc);
|
|
}
|
|
if (stat(floc_ok, &stbuf_ok)) {
|
|
Death(floc_ok);
|
|
}
|
|
if (stbuf.st_mtime > stbuf_ok.st_mtime) {
|
|
fprintf(stderr, "kprop: '%s' more recent than '%s'.\n",
|
|
floc, floc_ok);
|
|
exit(1);
|
|
}
|
|
if (!get_slaves(&slave_host_list, fslv, stbuf_ok.st_mtime)) {
|
|
fprintf(stderr,
|
|
"kprop: can't read slave host file '%s'.\n", fslv);
|
|
exit(1);
|
|
}
|
|
#ifdef KPROP_DBG
|
|
{
|
|
struct slave_host *sh;
|
|
int i;
|
|
fprintf(stderr, "\n\n");
|
|
fflush(stderr);
|
|
for (sh = slave_host_list; sh; sh = sh->next) {
|
|
fprintf(stderr, "slave %d: %s, %s", i++, sh->name,
|
|
inet_ntoa(sh->net_addr));
|
|
fflush(stderr);
|
|
}
|
|
}
|
|
#endif /* KPROP_DBG */
|
|
|
|
if (!prop_to_slaves(slave_host_list, fd, fslv)) {
|
|
fprintf(stderr,
|
|
"kprop: propagation failed.\n");
|
|
exit(1);
|
|
}
|
|
if (flock(fd, LOCK_UN)) {
|
|
Death(floc);
|
|
}
|
|
fprintf(stderr, "\n\n");
|
|
for (sh = slave_host_list; sh; sh = sh->next) {
|
|
fprintf(stderr, "%s:\t\t%s\n", sh->name,
|
|
(sh->not_time_yet? "Not time yet" : (sh->succeeded ? "Succeeded" : "FAILED")));
|
|
}
|
|
|
|
time(&l_final);
|
|
l_diff = l_final - l_init;
|
|
printf("propagation finished, %d:%02d:%02d elapsed\n",
|
|
l_diff / 3600, (l_diff % 3600) / 60, l_diff % 60);
|
|
|
|
exit(0);
|
|
}
|
|
|
|
void
|
|
Death(s)
|
|
char *s;
|
|
{
|
|
fprintf(stderr, "kprop: ");
|
|
perror(s);
|
|
exit(1);
|
|
}
|
|
|
|
/* The master -> slave protocol looks like this:
|
|
1) 8 byte version string
|
|
2) 2 bytes of "transfer mode" (net byte order of course)
|
|
3) ticket/authentication send by sendauth
|
|
4) 4 bytes of "block" length (u_long)
|
|
5) data
|
|
|
|
4 and 5 repeat til EOF ...
|
|
*/
|
|
|
|
int
|
|
prop_to_slaves(sl, fd, fslv)
|
|
struct slave_host *sl;
|
|
int fd;
|
|
char *fslv;
|
|
{
|
|
char buf[KPROP_BUFSIZ];
|
|
char obuf[KPROP_BUFSIZ + 64 /* leave room for private msg overhead */ ];
|
|
struct servent *sp;
|
|
struct sockaddr_in sin, my_sin;
|
|
int i, n, s;
|
|
struct slave_host *cs; /* current slave */
|
|
char path[256], my_host_name[MAXHOSTNAMELEN], *p_my_host_name;
|
|
char kprop_service_instance[INST_SZ];
|
|
char *pc;
|
|
u_long cksum, get_data_checksum();
|
|
u_long length, nlength;
|
|
long kerror;
|
|
KTEXT_ST ticket;
|
|
CREDENTIALS cred;
|
|
MSG_DAT msg_dat;
|
|
static char tkstring[] = "/tmp/kproptktXXXXXX";
|
|
|
|
Key_schedule session_sched;
|
|
|
|
(void) mktemp(tkstring);
|
|
krb_set_tkt_string(tkstring);
|
|
|
|
if ((sp = getservbyname("krb_prop", "tcp")) == 0) {
|
|
fprintf(stderr, "tcp/krb_prop: service unknown.\n");
|
|
exit(1);
|
|
}
|
|
|
|
bzero(&sin, sizeof sin);
|
|
sin.sin_family = AF_INET;
|
|
sin.sin_port = sp->s_port;
|
|
|
|
strcpy(path, fslv);
|
|
if ((pc = rindex(path, '/'))) {
|
|
pc += 1;
|
|
} else {
|
|
pc = path;
|
|
}
|
|
|
|
for (i = 0; i < 5; i++) { /* try each slave five times max */
|
|
for (cs = sl; cs; cs = cs->next) {
|
|
if (!cs->succeeded) {
|
|
if ((s = socket(AF_INET, SOCK_STREAM, 0)) < 0) {
|
|
perror("kprop: socket");
|
|
exit(1);
|
|
}
|
|
bcopy(&cs->net_addr, &sin.sin_addr,
|
|
sizeof cs->net_addr);
|
|
/* for krb_mk_{priv, safe} */
|
|
bzero (&my_sin, sizeof my_sin);
|
|
n = sizeof my_sin;
|
|
if ((kerror = krb_get_local_addr (&my_sin)) != KSUCCESS) {
|
|
fprintf (stderr, "kprop: can't get local address: %s\n",
|
|
krb_err_txt[kerror]);
|
|
close (s);
|
|
continue; /*** NEXT SLAVE ***/
|
|
}
|
|
if (bind(s, (struct sockaddr *) &my_sin, sizeof my_sin) < 0) {
|
|
fprintf(stderr, "Unable to bind local address: ");
|
|
perror("bind");
|
|
close(s);
|
|
continue;
|
|
}
|
|
if (connect(s, (struct sockaddr *) &sin, sizeof sin) < 0) {
|
|
fprintf(stderr, "%s: ", cs->name);
|
|
perror("connect");
|
|
close(s);
|
|
continue; /*** NEXT SLAVE ***/
|
|
}
|
|
|
|
/* Get ticket */
|
|
kerror = krb_mk_req (&ticket, KPROP_SERVICE_NAME,
|
|
cs->instance, cs->realm, (u_long) 0);
|
|
/* if ticket has expired try to get a new one, but
|
|
* first get a TGT ...
|
|
*/
|
|
if (kerror != MK_AP_OK) {
|
|
if (gethostname (my_host_name, sizeof(my_host_name)) != 0) {
|
|
fprintf (stderr, "%s:", cs->name);
|
|
perror ("getting my hostname");
|
|
close (s);
|
|
break; /* next one can't work either! */
|
|
}
|
|
/* get canonical kerberos service instance name */
|
|
p_my_host_name = krb_get_phost (my_host_name);
|
|
/* copy it to make sure gethostbyname static doesn't
|
|
* screw us. */
|
|
strcpy (kprop_service_instance, p_my_host_name);
|
|
kerror = krb_get_svc_in_tkt (KPROP_SERVICE_NAME,
|
|
#if 0
|
|
kprop_service_instance,
|
|
#else
|
|
KRB_MASTER,
|
|
#endif
|
|
my_realm,
|
|
TGT_SERVICE_NAME,
|
|
my_realm,
|
|
96,
|
|
KPROP_SRVTAB);
|
|
if (kerror != INTK_OK) {
|
|
fprintf (stderr,
|
|
"%s: %s. While getting initial ticket\n",
|
|
cs->name, krb_err_txt[kerror]);
|
|
close (s);
|
|
goto punt;
|
|
}
|
|
kerror = krb_mk_req (&ticket, KPROP_SERVICE_NAME,
|
|
cs->instance, cs->realm, (u_long) 0);
|
|
}
|
|
if (kerror != MK_AP_OK) {
|
|
fprintf (stderr, "%s: %s. Calling krb_mk_req.",
|
|
cs->name, krb_err_txt[kerror]);
|
|
close (s);
|
|
continue; /*** NEXT SLAVE ***/
|
|
}
|
|
|
|
if (write(s, kprop_version, sizeof(kprop_version))
|
|
!= sizeof(kprop_version)) {
|
|
fprintf (stderr, "%s: ", cs->name);
|
|
perror ("write (version) error");
|
|
close (s);
|
|
continue; /*** NEXT SLAVE ***/
|
|
}
|
|
|
|
net_transfer_mode = htons (transfer_mode);
|
|
if (write(s, &net_transfer_mode, sizeof(net_transfer_mode))
|
|
!= sizeof(net_transfer_mode)) {
|
|
fprintf (stderr, "%s: ", cs->name);
|
|
perror ("write (transfer_mode) error");
|
|
close (s);
|
|
continue; /*** NEXT SLAVE ***/
|
|
}
|
|
|
|
kerror = krb_get_cred (KPROP_SERVICE_NAME, cs->instance,
|
|
cs->realm, &cred);
|
|
if (kerror != KSUCCESS) {
|
|
fprintf (stderr, "%s: %s. Getting session key.",
|
|
cs->name, krb_err_txt[kerror]);
|
|
close (s);
|
|
continue; /*** NEXT SLAVE ***/
|
|
}
|
|
#ifdef NOENCRYPTION
|
|
bzero((char *)session_sched, sizeof(session_sched));
|
|
#else
|
|
if (key_sched ((C_Block *)cred.session, session_sched)) {
|
|
fprintf (stderr, "%s: can't make key schedule.",
|
|
cs->name);
|
|
close (s);
|
|
continue; /*** NEXT SLAVE ***/
|
|
}
|
|
#endif
|
|
/* SAFE (quad_cksum) and CLEAR are just not good enough */
|
|
cksum = 0;
|
|
#ifdef not_working_yet
|
|
if (transfer_mode != KPROP_TRANSFER_PRIVATE) {
|
|
cksum = get_data_checksum(fd, session_sched);
|
|
lseek(fd, 0L, 0);
|
|
}
|
|
else
|
|
#endif
|
|
{
|
|
struct stat st;
|
|
fstat (fd, &st);
|
|
cksum = st.st_size;
|
|
}
|
|
kerror = krb_sendauth(KOPT_DO_MUTUAL,
|
|
s,
|
|
&ticket,
|
|
KPROP_SERVICE_NAME,
|
|
cs->instance,
|
|
cs->realm,
|
|
cksum,
|
|
&msg_dat,
|
|
&cred,
|
|
session_sched,
|
|
&my_sin,
|
|
&sin,
|
|
KPROP_PROT_VERSION);
|
|
if (kerror != KSUCCESS) {
|
|
fprintf (stderr, "%s: %s. Calling krb_sendauth.",
|
|
cs->name, krb_err_txt[kerror]);
|
|
close (s);
|
|
continue; /*** NEXT SLAVE ***/
|
|
}
|
|
|
|
while ((n = read(fd, buf, sizeof buf))) {
|
|
if (n < 0) {
|
|
perror("input file read error");
|
|
exit(1);
|
|
}
|
|
switch (transfer_mode) {
|
|
case KPROP_TRANSFER_PRIVATE:
|
|
case KPROP_TRANSFER_SAFE:
|
|
if (transfer_mode == KPROP_TRANSFER_PRIVATE)
|
|
length = krb_mk_priv (buf, obuf, n,
|
|
session_sched, cred.session,
|
|
&my_sin, &sin);
|
|
else
|
|
length = krb_mk_safe (buf, obuf, n,
|
|
(C_Block *)cred.session,
|
|
&my_sin, &sin);
|
|
if (length == -1) {
|
|
fprintf (stderr, "%s: %s failed.",
|
|
cs->name,
|
|
(transfer_mode == KPROP_TRANSFER_PRIVATE)
|
|
? "krb_rd_priv" : "krb_rd_safe");
|
|
close (s);
|
|
continue; /*** NEXT SLAVE ***/
|
|
}
|
|
nlength = htonl(length);
|
|
if (write(s, &nlength, sizeof nlength)
|
|
!= sizeof nlength) {
|
|
fprintf (stderr, "%s: ", cs->name);
|
|
perror ("write error");
|
|
close (s);
|
|
continue; /*** NEXT SLAVE ***/
|
|
}
|
|
if (write(s, obuf, length) != length) {
|
|
fprintf(stderr, "%s: ", cs->name);
|
|
perror("write error");
|
|
close(s);
|
|
continue; /*** NEXT SLAVE ***/
|
|
}
|
|
break;
|
|
case KPROP_TRANSFER_CLEAR:
|
|
if (write(s, buf, n) != n) {
|
|
fprintf(stderr, "%s: ", cs->name);
|
|
perror("write error");
|
|
close(s);
|
|
continue; /*** NEXT SLAVE ***/
|
|
}
|
|
break;
|
|
}
|
|
}
|
|
close(s);
|
|
cs->succeeded = 1;
|
|
fprintf(stderr, "%s: success.\n", cs->name);
|
|
strcat(strcpy(pc, cs->name), "-last-prop");
|
|
close(creat(path, 0600));
|
|
}
|
|
}
|
|
}
|
|
punt:
|
|
|
|
dest_tkt();
|
|
for (cs = sl; cs; cs = cs->next) {
|
|
if (!cs->succeeded)
|
|
return (0); /* didn't get this slave */
|
|
}
|
|
return (1);
|
|
}
|
|
|
|
int
|
|
get_slaves(psl, file, ok_mtime)
|
|
struct slave_host **psl;
|
|
char *file;
|
|
time_t ok_mtime;
|
|
{
|
|
FILE *fin;
|
|
char namebuf[128], *inst;
|
|
char *pc;
|
|
struct hostent *host;
|
|
struct slave_host **th;
|
|
char path[256];
|
|
char *ppath;
|
|
struct stat stbuf;
|
|
|
|
if ((fin = fopen(file, "r")) == NULL) {
|
|
fprintf(stderr, "Can't open slave host file, '%s'.\n", file);
|
|
exit(-1);
|
|
}
|
|
strcpy(path, file);
|
|
if ((ppath = rindex(path, '/'))) {
|
|
ppath += 1;
|
|
} else {
|
|
ppath = path;
|
|
}
|
|
for (th = psl; fgets(namebuf, sizeof namebuf, fin); th = &(*th)->next) {
|
|
if ((pc = index(namebuf, '\n'))) {
|
|
*pc = '\0';
|
|
} else {
|
|
fprintf(stderr, "Host name too long (>= %d chars) in '%s'.\n",
|
|
sizeof namebuf, file);
|
|
exit(-1);
|
|
}
|
|
host = gethostbyname(namebuf);
|
|
if (host == NULL) {
|
|
fprintf(stderr, "Unknown host '%s' in '%s'.\n", namebuf, file);
|
|
exit(-1);
|
|
}
|
|
(*th) = (struct slave_host *) malloc(sizeof(struct slave_host));
|
|
if (!*th) {
|
|
fprintf(stderr, "No memory reading host list from '%s'.\n",
|
|
file);
|
|
exit(-1);
|
|
}
|
|
(*th)->name = malloc(strlen(namebuf) + 1);
|
|
if (!(*th)->name) {
|
|
fprintf(stderr, "No memory reading host list from '%s'.\n",
|
|
file);
|
|
exit(-1);
|
|
}
|
|
/* get kerberos cannonical instance name */
|
|
strcpy((*th)->name, namebuf);
|
|
inst = krb_get_phost ((*th)->name);
|
|
(*th)->instance = malloc(strlen(inst) + 1);
|
|
if (!(*th)->instance) {
|
|
fprintf(stderr, "No memory reading host list from '%s'.\n",
|
|
file);
|
|
exit(-1);
|
|
}
|
|
strcpy((*th)->instance, inst);
|
|
/* what a concept, slave servers in different realms! */
|
|
(*th)->realm = my_realm;
|
|
(*th)->net_addr = *(u_long *) host->h_addr;
|
|
(*th)->succeeded = 0;
|
|
(*th)->next = NULL;
|
|
strcat(strcpy(ppath, (*th)->name), "-last-prop");
|
|
if (!force_flag && !stat(path, &stbuf) && stbuf.st_mtime > ok_mtime) {
|
|
(*th)->not_time_yet = 1;
|
|
(*th)->succeeded = 1; /* no change since last success */
|
|
}
|
|
}
|
|
fclose(fin);
|
|
return (1);
|
|
}
|
|
|
|
#ifdef doesnt_work_yet
|
|
u_long get_data_checksum(fd, key_sched)
|
|
int fd;
|
|
Key_schedule key_sched;
|
|
{
|
|
unsigned long cksum = 0;
|
|
unsigned long cbc_cksum();
|
|
int n;
|
|
char buf[BUFSIZ];
|
|
long obuf[2];
|
|
|
|
while (n = read(fd, buf, sizeof buf)) {
|
|
if (n < 0) {
|
|
fprintf(stderr, "Input data file read error: ");
|
|
perror("read");
|
|
exit(1);
|
|
}
|
|
cksum = cbc_cksum(buf, obuf, n, key_sched, key_sched);
|
|
}
|
|
return cksum;
|
|
}
|
|
#endif
|