freebsd-dev/contrib/pf/ftp-proxy/ftp-proxy.c
Max Laier 0baf7c8675 Resolve conflicts created during the import of pf 3.7 Some features are
missing and will be implemented in a second step.  This is functional as is.

Tested by:	freebsd-pf, pfsense.org
Obtained from:	OpenBSD
2005-05-03 16:55:20 +00:00

1377 lines
36 KiB
C

/* $OpenBSD: ftp-proxy.c,v 1.41 2005/03/05 23:11:19 cloder Exp $ */
/*
* Copyright (c) 1996-2001
* Obtuse Systems Corporation. All rights reserved.
*
* Redistribution and use in source and binary forms, with or without
* modification, are permitted provided that the following conditions
* are met:
* 1. Redistributions of source code must retain the above copyright
* notice, this list of conditions and the following disclaimer.
* 2. Redistributions in binary form must reproduce the above copyright
* notice, this list of conditions and the following disclaimer in the
* documentation and/or other materials provided with the distribution.
* 3. Neither the name of the Obtuse Systems nor the names of its contributors
* may be used to endorse or promote products derived from this software
* without specific prior written permission.
*
* THIS SOFTWARE IS PROVIDED BY OBTUSE SYSTEMS AND CONTRIBUTORS ``AS IS'' AND
* ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
* ARE DISCLAIMED. IN NO EVENT SHALL OBTUSE SYSTEMS CORPORATION OR
* CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL,
* EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO,
* PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS;
* OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,
* WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR
* OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF
* ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
*
*/
#include <sys/cdefs.h>
__FBSDID("$FreeBSD$");
/*
* ftp proxy, Originally based on juniper_ftp_proxy from the Obtuse
* Systems juniper firewall, written by Dan Boulet <danny@obtuse.com>
* and Bob Beck <beck@obtuse.com>
*
* This version basically passes everything through unchanged except
* for the PORT and the * "227 Entering Passive Mode" reply.
*
* A PORT command is handled by noting the IP address and port number
* specified and then configuring a listen port on some very high port
* number and telling the server about it using a PORT message.
* We then watch for an in-bound connection on the port from the server
* and connect to the client's port when it happens.
*
* A "227 Entering Passive Mode" reply is handled by noting the IP address
* and port number specified and then configuring a listen port on some
* very high port number and telling the client about it using a
* "227 Entering Passive Mode" reply.
* We then watch for an in-bound connection on the port from the client
* and connect to the server's port when it happens.
*
* supports tcp wrapper lookups/access control with the -w flag using
* the real destination address - the tcp wrapper stuff is done after
* the real destination address is retrieved from pf
*
*/
/*
* TODO:
* Plenty, this is very basic, with the idea to get it in clean first.
*
* - IPv6 and EPASV support
* - Content filter support
* - filename filter support
* - per-user rules perhaps.
*/
#include <sys/param.h>
#include <sys/time.h>
#include <sys/socket.h>
#include <net/if.h>
#include <netinet/in.h>
#include <arpa/inet.h>
#include <ctype.h>
#include <errno.h>
#include <grp.h>
#include <netdb.h>
#include <pwd.h>
#include <signal.h>
#include <stdarg.h>
#include <stdio.h>
#include <stdlib.h>
#include <string.h>
#include <sysexits.h>
#include <syslog.h>
#include <unistd.h>
#include "util.h"
#ifdef LIBWRAP
#include <tcpd.h>
int allow_severity = LOG_INFO;
int deny_severity = LOG_NOTICE;
#endif /* LIBWRAP */
int min_port = IPPORT_HIFIRSTAUTO;
int max_port = IPPORT_HILASTAUTO;
#define STARTBUFSIZE 1024 /* Must be at least 3 */
/*
* Variables used to support PORT mode connections.
*
* This gets a bit complicated.
*
* If PORT mode is on then client_listen_sa describes the socket that
* the real client is listening on and server_listen_sa describes the
* socket that we are listening on (waiting for the real server to connect
* with us).
*
* If PASV mode is on then client_listen_sa describes the socket that
* we are listening on (waiting for the real client to connect to us on)
* and server_listen_sa describes the socket that the real server is
* listening on.
*
* If the socket we are listening on gets a connection then we connect
* to the other side's socket. Similarly, if a connected socket is
* shutdown then we shutdown the other side's socket.
*/
double xfer_start_time;
struct sockaddr_in real_server_sa;
struct sockaddr_in client_listen_sa;
struct sockaddr_in server_listen_sa;
struct sockaddr_in proxy_sa;
struct in_addr src_addr;
int client_listen_socket = -1; /* Only used in PASV mode */
int client_data_socket = -1; /* Connected socket to real client */
int server_listen_socket = -1; /* Only used in PORT mode */
int server_data_socket = -1; /* Connected socket to real server */
int client_data_bytes, server_data_bytes;
int AnonFtpOnly;
int Verbose;
int NatMode;
int ReverseMode;
char ClientName[NI_MAXHOST];
char RealServerName[NI_MAXHOST];
char OurName[NI_MAXHOST];
const char *User = "proxy";
const char *Group;
extern int Debug_Level;
extern int Use_Rdns;
extern in_addr_t Bind_Addr;
extern char *__progname;
typedef enum {
UNKNOWN_MODE,
PORT_MODE,
PASV_MODE,
EPRT_MODE,
EPSV_MODE
} connection_mode_t;
connection_mode_t connection_mode;
extern void debuglog(int debug_level, const char *fmt, ...);
double wallclock_time(void);
void show_xfer_stats(void);
void log_control_command (char *cmd, int client);
int new_dataconn(int server);
void do_client_cmd(struct csiob *client, struct csiob *server);
void do_server_reply(struct csiob *server, struct csiob *client);
static void
usage(void)
{
syslog(LOG_NOTICE,
"usage: %s [-AnrVw] [-a address] [-D debuglevel] [-g group]"
" [-M maxport] [-m minport] [-R address[:port]] [-S address]"
" [-t timeout] [-u user]", __progname);
exit(EX_USAGE);
}
static void
close_client_data(void)
{
if (client_data_socket >= 0) {
shutdown(client_data_socket, 2);
close(client_data_socket);
client_data_socket = -1;
}
}
static void
close_server_data(void)
{
if (server_data_socket >= 0) {
shutdown(server_data_socket, 2);
close(server_data_socket);
server_data_socket = -1;
}
}
static void
drop_privs(void)
{
struct passwd *pw;
struct group *gr;
uid_t uid = 0;
gid_t gid = 0;
if (User != NULL) {
pw = getpwnam(User);
if (pw == NULL) {
syslog(LOG_ERR, "cannot find user %s", User);
exit(EX_USAGE);
}
uid = pw->pw_uid;
gid = pw->pw_gid;
}
if (Group != NULL) {
gr = getgrnam(Group);
if (gr == NULL) {
syslog(LOG_ERR, "cannot find group %s", Group);
exit(EX_USAGE);
}
gid = gr->gr_gid;
}
if (gid != 0 && (setegid(gid) == -1 || setgid(gid) == -1)) {
syslog(LOG_ERR, "cannot drop group privs (%m)");
exit(EX_CONFIG);
}
if (uid != 0 && (seteuid(uid) == -1 || setuid(uid) == -1)) {
syslog(LOG_ERR, "cannot drop root privs (%m)");
exit(EX_CONFIG);
}
}
#ifdef LIBWRAP
/*
* Check a connection against the tcpwrapper, log if we're going to
* reject it, returns: 0 -> reject, 1 -> accept. We add in hostnames
* if we are set to do reverse DNS, otherwise no.
*/
static int
check_host(struct sockaddr_in *client_sin, struct sockaddr_in *server_sin)
{
char cname[NI_MAXHOST];
char sname[NI_MAXHOST];
struct request_info request;
int i;
request_init(&request, RQ_DAEMON, __progname, RQ_CLIENT_SIN,
client_sin, RQ_SERVER_SIN, server_sin, RQ_CLIENT_ADDR,
inet_ntoa(client_sin->sin_addr), 0);
if (Use_Rdns) {
/*
* We already looked these up, but we have to do it again
* for tcp wrapper, to ensure that we get the DNS name, since
* the tcp wrapper cares about these things, and we don't
* want to pass in a printed address as a name.
*/
i = getnameinfo((struct sockaddr *) &client_sin->sin_addr,
sizeof(&client_sin->sin_addr), cname, sizeof(cname),
NULL, 0, NI_NAMEREQD);
if (i != 0 && i != EAI_NONAME && i != EAI_AGAIN)
strlcpy(cname, STRING_UNKNOWN, sizeof(cname));
i = getnameinfo((struct sockaddr *)&server_sin->sin_addr,
sizeof(&server_sin->sin_addr), sname, sizeof(sname),
NULL, 0, NI_NAMEREQD);
if (i != 0 && i != EAI_NONAME && i != EAI_AGAIN)
strlcpy(sname, STRING_UNKNOWN, sizeof(sname));
} else {
/*
* ensure the TCP wrapper doesn't start doing
* reverse DNS lookups if we aren't supposed to.
*/
strlcpy(cname, STRING_UNKNOWN, sizeof(cname));
strlcpy(sname, STRING_UNKNOWN, sizeof(sname));
}
request_set(&request, RQ_SERVER_ADDR, inet_ntoa(server_sin->sin_addr),
0);
request_set(&request, RQ_CLIENT_NAME, cname, RQ_SERVER_NAME, sname, 0);
if (!hosts_access(&request)) {
syslog(LOG_NOTICE, "tcpwrappers rejected: %s -> %s",
ClientName, RealServerName);
return(0);
}
return(1);
}
#endif /* LIBWRAP */
double
wallclock_time(void)
{
struct timeval tv;
gettimeofday(&tv, NULL);
return(tv.tv_sec + tv.tv_usec / 1e6);
}
/*
* Show the stats for this data transfer
*/
void
show_xfer_stats(void)
{
char tbuf[1000];
double delta;
size_t len;
int i = -1;
if (!Verbose)
return;
delta = wallclock_time() - xfer_start_time;
if (delta < 0.001)
delta = 0.001;
if (client_data_bytes == 0 && server_data_bytes == 0) {
syslog(LOG_INFO,
"data transfer complete (no bytes transferred)");
return;
}
len = sizeof(tbuf);
if (delta >= 60) {
int idelta;
idelta = delta + 0.5;
if (idelta >= 60*60) {
i = snprintf(tbuf, len,
"data transfer complete (%dh %dm %ds",
idelta / (60*60), (idelta % (60*60)) / 60,
idelta % 60);
if (i == -1 || i >= len)
goto logit;
len -= i;
} else {
i = snprintf(tbuf, len,
"data transfer complete (%dm %ds", idelta / 60,
idelta % 60);
if (i == -1 || i >= len)
goto logit;
len -= i;
}
} else {
i = snprintf(tbuf, len, "data transfer complete (%.1fs",
delta);
if (i == -1 || i >= len)
goto logit;
len -= i;
}
if (client_data_bytes > 0) {
i = snprintf(&tbuf[strlen(tbuf)], len,
", %d bytes to server) (%.1fKB/s", client_data_bytes,
(client_data_bytes / delta) / (double)1024);
if (i == -1 || i >= len)
goto logit;
len -= i;
}
if (server_data_bytes > 0) {
i = snprintf(&tbuf[strlen(tbuf)], len,
", %d bytes to client) (%.1fKB/s", server_data_bytes,
(server_data_bytes / delta) / (double)1024);
if (i == -1 || i >= len)
goto logit;
len -= i;
}
strlcat(tbuf, ")", sizeof(tbuf));
logit:
if (i != -1)
syslog(LOG_INFO, "%s", tbuf);
}
void
log_control_command (char *cmd, int client)
{
/* log an ftp control command or reply */
const char *logstring;
int level = LOG_DEBUG;
if (!Verbose)
return;
/* don't log passwords */
if (strncasecmp(cmd, "pass ", 5) == 0)
logstring = "PASS XXXX";
else
logstring = cmd;
if (client) {
/* log interesting stuff at LOG_INFO, rest at LOG_DEBUG */
if ((strncasecmp(cmd, "user ", 5) == 0) ||
(strncasecmp(cmd, "retr ", 5) == 0) ||
(strncasecmp(cmd, "cwd ", 4) == 0) ||
(strncasecmp(cmd, "stor " ,5) == 0))
level = LOG_INFO;
}
syslog(level, "%s %s", client ? "client:" : " server:",
logstring);
}
/*
* set ourselves up for a new data connection. Direction is toward client if
* "server" is 0, towards server otherwise.
*/
int
new_dataconn(int server)
{
/*
* Close existing data conn.
*/
if (client_listen_socket != -1) {
close(client_listen_socket);
client_listen_socket = -1;
}
close_client_data();
if (server_listen_socket != -1) {
close(server_listen_socket);
server_listen_socket = -1;
}
close_server_data();
if (server) {
bzero(&server_listen_sa, sizeof(server_listen_sa));
server_listen_socket = get_backchannel_socket(SOCK_STREAM,
min_port, max_port, -1, 1, &server_listen_sa);
if (server_listen_socket == -1) {
syslog(LOG_INFO, "server socket bind() failed (%m)");
exit(EX_OSERR);
}
if (listen(server_listen_socket, 5) != 0) {
syslog(LOG_INFO, "server socket listen() failed (%m)");
exit(EX_OSERR);
}
} else {
bzero(&client_listen_sa, sizeof(client_listen_sa));
client_listen_socket = get_backchannel_socket(SOCK_STREAM,
min_port, max_port, -1, 1, &client_listen_sa);
if (client_listen_socket == -1) {
syslog(LOG_NOTICE,
"cannot get client listen socket (%m)");
exit(EX_OSERR);
}
if (listen(client_listen_socket, 5) != 0) {
syslog(LOG_NOTICE,
"cannot listen on client socket (%m)");
exit(EX_OSERR);
}
}
return(0);
}
static void
connect_pasv_backchannel(void)
{
struct sockaddr_in listen_sa;
socklen_t salen;
/*
* We are about to accept a connection from the client.
* This is a PASV data connection.
*/
debuglog(2, "client listen socket ready");
close_server_data();
close_client_data();
salen = sizeof(listen_sa);
client_data_socket = accept(client_listen_socket,
(struct sockaddr *)&listen_sa, &salen);
if (client_data_socket < 0) {
syslog(LOG_NOTICE, "accept() failed (%m)");
exit(EX_OSERR);
}
close(client_listen_socket);
client_listen_socket = -1;
memset(&listen_sa, 0, sizeof(listen_sa));
server_data_socket = get_backchannel_socket(SOCK_STREAM, min_port,
max_port, -1, 1, &listen_sa);
if (server_data_socket < 0) {
syslog(LOG_NOTICE, "get_backchannel_socket() failed (%m)");
exit(EX_OSERR);
}
if (connect(server_data_socket, (struct sockaddr *) &server_listen_sa,
sizeof(server_listen_sa)) != 0) {
syslog(LOG_NOTICE, "connect() failed (%m)");
exit(EX_NOHOST);
}
client_data_bytes = 0;
server_data_bytes = 0;
xfer_start_time = wallclock_time();
}
static void
connect_port_backchannel(void)
{
struct sockaddr_in listen_sa;
socklen_t salen;
/*
* We are about to accept a connection from the server.
* This is a PORT or EPRT data connection.
*/
debuglog(2, "server listen socket ready");
close_server_data();
close_client_data();
salen = sizeof(listen_sa);
server_data_socket = accept(server_listen_socket,
(struct sockaddr *)&listen_sa, &salen);
if (server_data_socket < 0) {
syslog(LOG_NOTICE, "accept() failed (%m)");
exit(EX_OSERR);
}
close(server_listen_socket);
server_listen_socket = -1;
if (getuid() != 0) {
/*
* We're not running as root, so we get a backchannel
* socket bound in our designated range, instead of
* getting one bound to port 20 - This is deliberately
* not RFC compliant.
*/
bcopy(&src_addr, &listen_sa.sin_addr, sizeof(struct in_addr));
client_data_socket = get_backchannel_socket(SOCK_STREAM,
min_port, max_port, -1, 1, &listen_sa);
if (client_data_socket < 0) {
syslog(LOG_NOTICE, "get_backchannel_socket() failed (%m)");
exit(EX_OSERR);
}
} else {
/*
* We're root, get our backchannel socket bound to port
* 20 here, so we're fully RFC compliant.
*/
client_data_socket = socket(AF_INET, SOCK_STREAM, 0);
salen = 1;
listen_sa.sin_family = AF_INET;
bcopy(&src_addr, &listen_sa.sin_addr, sizeof(struct in_addr));
listen_sa.sin_port = htons(20);
if (setsockopt(client_data_socket, SOL_SOCKET, SO_REUSEADDR,
&salen, sizeof(salen)) == -1) {
syslog(LOG_NOTICE, "setsockopt() failed (%m)");
exit(EX_OSERR);
}
if (bind(client_data_socket, (struct sockaddr *)&listen_sa,
sizeof(listen_sa)) == - 1) {
syslog(LOG_NOTICE, "data channel bind() failed (%m)");
exit(EX_OSERR);
}
}
if (connect(client_data_socket, (struct sockaddr *) &client_listen_sa,
sizeof(client_listen_sa)) != 0) {
syslog(LOG_INFO, "cannot connect data channel (%m)");
exit(EX_NOHOST);
}
client_data_bytes = 0;
server_data_bytes = 0;
xfer_start_time = wallclock_time();
}
void
do_client_cmd(struct csiob *client, struct csiob *server)
{
int i, j, rv;
char tbuf[100];
char *sendbuf = NULL;
log_control_command((char *)client->line_buffer, 1);
/* client->line_buffer is an ftp control command.
* There is no reason for these to be very long.
* In the interest of limiting buffer overrun attempts,
* we catch them here.
*/
if (strlen((char *)client->line_buffer) > 512) {
syslog(LOG_NOTICE, "excessively long control command");
exit(EX_DATAERR);
}
/*
* Check the client user provided if needed
*/
if (AnonFtpOnly && strncasecmp((char *)client->line_buffer, "user ",
strlen("user ")) == 0) {
char *cp;
cp = (char *) client->line_buffer + strlen("user ");
if ((strcasecmp(cp, "ftp\r\n") != 0) &&
(strcasecmp(cp, "anonymous\r\n") != 0)) {
/*
* this isn't anonymous - give the client an
* error before they send a password
*/
snprintf(tbuf, sizeof(tbuf),
"500 Only anonymous FTP is allowed\r\n");
j = 0;
i = strlen(tbuf);
do {
rv = send(client->fd, tbuf + j, i - j, 0);
if (rv == -1 && errno != EAGAIN &&
errno != EINTR)
break;
else if (rv != -1)
j += rv;
} while (j >= 0 && j < i);
sendbuf = NULL;
} else
sendbuf = (char *)client->line_buffer;
} else if ((strncasecmp((char *)client->line_buffer, "eprt ",
strlen("eprt ")) == 0)) {
/* Watch out for EPRT commands */
char *line = NULL, *q, *p, *result[3], delim;
struct addrinfo hints, *res = NULL;
unsigned long proto;
j = 0;
line = strdup((char *)client->line_buffer+strlen("eprt "));
if (line == NULL) {
syslog(LOG_ERR, "insufficient memory");
exit(EX_UNAVAILABLE);
}
p = line;
delim = p[0];
p++;
memset(result,0, sizeof(result));
for (i = 0; i < 3; i++) {
q = strchr(p, delim);
if (!q || *q != delim)
goto parsefail;
*q++ = '\0';
result[i] = p;
p = q;
}
proto = strtoul(result[0], &p, 10);
if (!*result[0] || *p)
goto protounsupp;
memset(&hints, 0, sizeof(hints));
if (proto != 1) /* 1 == AF_INET - all we support for now */
goto protounsupp;
hints.ai_family = AF_INET;
hints.ai_socktype = SOCK_STREAM;
hints.ai_flags = AI_NUMERICHOST; /*no DNS*/
if (getaddrinfo(result[1], result[2], &hints, &res))
goto parsefail;
if (res->ai_next)
goto parsefail;
if (sizeof(client_listen_sa) < res->ai_addrlen)
goto parsefail;
memcpy(&client_listen_sa, res->ai_addr, res->ai_addrlen);
debuglog(1, "client wants us to use %s:%u",
inet_ntoa(client_listen_sa.sin_addr),
htons(client_listen_sa.sin_port));
/*
* Configure our own listen socket and tell the server about it
*/
new_dataconn(1);
connection_mode = EPRT_MODE;
debuglog(1, "we want server to use %s:%u",
inet_ntoa(server->sa.sin_addr),
ntohs(server_listen_sa.sin_port));
snprintf(tbuf, sizeof(tbuf), "EPRT |%d|%s|%u|\r\n", 1,
inet_ntoa(server->sa.sin_addr),
ntohs(server_listen_sa.sin_port));
debuglog(1, "to server (modified): %s", tbuf);
sendbuf = tbuf;
goto out;
parsefail:
snprintf(tbuf, sizeof(tbuf),
"500 Invalid argument; rejected\r\n");
sendbuf = NULL;
goto out;
protounsupp:
/* we only support AF_INET for now */
if (proto == 2)
snprintf(tbuf, sizeof(tbuf),
"522 Protocol not supported, use (1)\r\n");
else
snprintf(tbuf, sizeof(tbuf),
"501 Protocol not supported\r\n");
sendbuf = NULL;
out:
if (line)
free(line);
if (res)
freeaddrinfo(res);
if (sendbuf == NULL) {
debuglog(1, "to client (modified): %s", tbuf);
i = strlen(tbuf);
do {
rv = send(client->fd, tbuf + j, i - j, 0);
if (rv == -1 && errno != EAGAIN &&
errno != EINTR)
break;
else if (rv != -1)
j += rv;
} while (j >= 0 && j < i);
}
} else if (!NatMode && (strncasecmp((char *)client->line_buffer,
"epsv", strlen("epsv")) == 0)) {
/*
* If we aren't in NAT mode, deal with EPSV.
* EPSV is a problem - Unlike PASV, the reply from the
* server contains *only* a port, we can't modify the reply
* to the client and get the client to connect to us without
* resorting to using a dynamic rdr rule we have to add in
* for the reply to this connection, and take away afterwards.
* so this will wait until we have the right solution for rule
* additions/deletions in pf.
*
* in the meantime we just tell the client we don't do it,
* and most clients should fall back to using PASV.
*/
snprintf(tbuf, sizeof(tbuf),
"500 EPSV command not understood\r\n");
debuglog(1, "to client (modified): %s", tbuf);
j = 0;
i = strlen(tbuf);
do {
rv = send(client->fd, tbuf + j, i - j, 0);
if (rv == -1 && errno != EAGAIN && errno != EINTR)
break;
else if (rv != -1)
j += rv;
} while (j >= 0 && j < i);
sendbuf = NULL;
} else if (strncasecmp((char *)client->line_buffer, "port ",
strlen("port ")) == 0) {
unsigned int values[6];
char *tailptr;
debuglog(1, "Got a PORT command");
tailptr = (char *)&client->line_buffer[strlen("port ")];
values[0] = 0;
i = sscanf(tailptr, "%u,%u,%u,%u,%u,%u", &values[0],
&values[1], &values[2], &values[3], &values[4],
&values[5]);
if (i != 6) {
syslog(LOG_INFO, "malformed PORT command (%s)",
client->line_buffer);
exit(EX_DATAERR);
}
for (i = 0; i<6; i++) {
if (values[i] > 255) {
syslog(LOG_INFO,
"malformed PORT command (%s)",
client->line_buffer);
exit(EX_DATAERR);
}
}
client_listen_sa.sin_family = AF_INET;
client_listen_sa.sin_addr.s_addr = htonl((values[0] << 24) |
(values[1] << 16) | (values[2] << 8) |
(values[3] << 0));
client_listen_sa.sin_port = htons((values[4] << 8) |
values[5]);
debuglog(1, "client wants us to use %u.%u.%u.%u:%u",
values[0], values[1], values[2], values[3],
(values[4] << 8) | values[5]);
/*
* Configure our own listen socket and tell the server about it
*/
new_dataconn(1);
connection_mode = PORT_MODE;
debuglog(1, "we want server to use %s:%u",
inet_ntoa(server->sa.sin_addr),
ntohs(server_listen_sa.sin_port));
snprintf(tbuf, sizeof(tbuf), "PORT %u,%u,%u,%u,%u,%u\r\n",
((u_char *)&server->sa.sin_addr.s_addr)[0],
((u_char *)&server->sa.sin_addr.s_addr)[1],
((u_char *)&server->sa.sin_addr.s_addr)[2],
((u_char *)&server->sa.sin_addr.s_addr)[3],
((u_char *)&server_listen_sa.sin_port)[0],
((u_char *)&server_listen_sa.sin_port)[1]);
debuglog(1, "to server (modified): %s", tbuf);
sendbuf = tbuf;
} else
sendbuf = (char *)client->line_buffer;
/*
*send our (possibly modified) control command in sendbuf
* on it's way to the server
*/
if (sendbuf != NULL) {
j = 0;
i = strlen(sendbuf);
do {
rv = send(server->fd, sendbuf + j, i - j, 0);
if (rv == -1 && errno != EAGAIN && errno != EINTR)
break;
else if (rv != -1)
j += rv;
} while (j >= 0 && j < i);
}
}
void
do_server_reply(struct csiob *server, struct csiob *client)
{
int code, i, j, rv;
struct in_addr *iap;
static int continuing = 0;
char tbuf[100], *sendbuf, *p;
log_control_command((char *)server->line_buffer, 0);
if (strlen((char *)server->line_buffer) > 512) {
/*
* someone's playing games. Have a cow in the syslogs and
* exit - we don't pass this on for fear of hurting
* our other end, which might be poorly implemented.
*/
syslog(LOG_NOTICE, "long FTP control reply");
exit(EX_DATAERR);
}
/*
* Watch out for "227 Entering Passive Mode ..." replies
*/
code = strtol((char *)server->line_buffer, &p, 10);
if (isspace(server->line_buffer[0]))
code = 0;
if (!*(server->line_buffer) || (*p != ' ' && *p != '-')) {
if (continuing)
goto sendit;
syslog(LOG_INFO, "malformed control reply");
exit(EX_DATAERR);
}
if (code <= 0 || code > 999) {
if (continuing)
goto sendit;
syslog(LOG_INFO, "invalid server reply code %d", code);
exit(EX_DATAERR);
}
if (*p == '-')
continuing = 1;
else
continuing = 0;
if (code == 227 && !NatMode) {
unsigned int values[6];
char *tailptr;
debuglog(1, "Got a PASV reply");
debuglog(1, "{%s}", (char *)server->line_buffer);
tailptr = (char *)strchr((char *)server->line_buffer, '(');
if (tailptr == NULL) {
tailptr = strrchr((char *)server->line_buffer, ' ');
if (tailptr == NULL) {
syslog(LOG_NOTICE, "malformed 227 reply");
exit(EX_DATAERR);
}
}
tailptr++; /* skip past space or ( */
values[0] = 0;
i = sscanf(tailptr, "%u,%u,%u,%u,%u,%u", &values[0],
&values[1], &values[2], &values[3], &values[4],
&values[5]);
if (i != 6) {
syslog(LOG_INFO, "malformed PASV reply (%s)",
client->line_buffer);
exit(EX_DATAERR);
}
for (i = 0; i<6; i++)
if (values[i] > 255) {
syslog(LOG_INFO, "malformed PASV reply(%s)",
client->line_buffer);
exit(EX_DATAERR);
}
server_listen_sa.sin_family = AF_INET;
server_listen_sa.sin_addr.s_addr = htonl((values[0] << 24) |
(values[1] << 16) | (values[2] << 8) | (values[3] << 0));
server_listen_sa.sin_port = htons((values[4] << 8) |
values[5]);
debuglog(1, "server wants us to use %s:%u",
inet_ntoa(server_listen_sa.sin_addr), (values[4] << 8) |
values[5]);
new_dataconn(0);
connection_mode = PASV_MODE;
if (ReverseMode)
iap = &(proxy_sa.sin_addr);
else
iap = &(server->sa.sin_addr);
debuglog(1, "we want client to use %s:%u", inet_ntoa(*iap),
htons(client_listen_sa.sin_port));
snprintf(tbuf, sizeof(tbuf),
"227 Entering Passive Mode (%u,%u,%u,%u,%u,%u)\r\n",
((u_char *)iap)[0], ((u_char *)iap)[1],
((u_char *)iap)[2], ((u_char *)iap)[3],
((u_char *)&client_listen_sa.sin_port)[0],
((u_char *)&client_listen_sa.sin_port)[1]);
debuglog(1, "to client (modified): %s", tbuf);
sendbuf = tbuf;
} else {
sendit:
sendbuf = (char *)server->line_buffer;
}
/*
* send our (possibly modified) control command in sendbuf
* on it's way to the client
*/
j = 0;
i = strlen(sendbuf);
do {
rv = send(client->fd, sendbuf + j, i - j, 0);
if (rv == -1 && errno != EAGAIN && errno != EINTR)
break;
else if (rv != -1)
j += rv;
} while (j >= 0 && j < i);
}
int
main(int argc, char *argv[])
{
struct csiob client_iob, server_iob;
struct sigaction new_sa, old_sa;
int sval, ch, flags, i;
socklen_t salen;
int one = 1;
long timeout_seconds = 0;
struct timeval tv;
#ifdef LIBWRAP
int use_tcpwrapper = 0;
#endif /* LIBWRAP */
while ((ch = getopt(argc, argv, "a:D:g:m:M:R:S:t:u:AnVwr")) != -1) {
char *p;
switch (ch) {
case 'a':
if (!*optarg)
usage();
if ((Bind_Addr = inet_addr(optarg)) == INADDR_NONE) {
syslog(LOG_NOTICE,
"%s: invalid address", optarg);
usage();
}
break;
case 'A':
AnonFtpOnly = 1; /* restrict to anon usernames only */
break;
case 'D':
Debug_Level = strtol(optarg, &p, 10);
if (!*optarg || *p)
usage();
break;
case 'g':
Group = optarg;
break;
case 'm':
min_port = strtol(optarg, &p, 10);
if (!*optarg || *p)
usage();
if (min_port < 0 || min_port > USHRT_MAX)
usage();
break;
case 'M':
max_port = strtol(optarg, &p, 10);
if (!*optarg || *p)
usage();
if (max_port < 0 || max_port > USHRT_MAX)
usage();
break;
case 'n':
NatMode = 1; /* pass all passives, we're using NAT */
break;
case 'r':
Use_Rdns = 1; /* look up hostnames */
break;
case 'R': {
char *s, *t;
if (!*optarg)
usage();
if ((s = strdup(optarg)) == NULL) {
syslog (LOG_NOTICE,
"Insufficient memory (malloc failed)");
exit(EX_UNAVAILABLE);
}
memset(&real_server_sa, 0, sizeof(real_server_sa));
real_server_sa.sin_len = sizeof(struct sockaddr_in);
real_server_sa.sin_family = AF_INET;
t = strchr(s, ':');
if (t == NULL)
real_server_sa.sin_port = htons(21);
else {
long port = strtol(t + 1, &p, 10);
if (*p || port <= 0 || port > 65535)
usage();
real_server_sa.sin_port = htons(port);
*t = 0;
}
real_server_sa.sin_addr.s_addr = inet_addr(s);
if (real_server_sa.sin_addr.s_addr == INADDR_NONE)
usage();
free(s);
ReverseMode = 1;
break;
}
case 'S':
if (!inet_aton(optarg, &src_addr))
usage();
break;
case 't':
timeout_seconds = strtol(optarg, &p, 10);
if (!*optarg || *p)
usage();
break;
case 'u':
User = optarg;
break;
case 'V':
Verbose = 1;
break;
#ifdef LIBWRAP
case 'w':
use_tcpwrapper = 1; /* do the libwrap thing */
break;
#endif /* LIBWRAP */
default:
usage();
/* NOTREACHED */
}
}
argc -= optind;
argv += optind;
if (max_port < min_port)
usage();
openlog(__progname, LOG_NDELAY|LOG_PID, LOG_DAEMON);
setlinebuf(stdout);
setlinebuf(stderr);
memset(&client_iob, 0, sizeof(client_iob));
memset(&server_iob, 0, sizeof(server_iob));
if (get_proxy_env(0, &real_server_sa, &client_iob.sa,
&proxy_sa) == -1)
exit(EX_PROTOCOL);
/*
* We may now drop root privs, as we have done our ioctl for
* pf. If we do drop root, we can't make backchannel connections
* for PORT and EPRT come from port 20, which is not strictly
* RFC compliant. This shouldn't cause problems for all but
* the stupidest ftp clients and the stupidest packet filters.
*/
drop_privs();
/*
* We check_host after get_proxy_env so that checks are done
* against the original destination endpoint, not the endpoint
* of our side of the rdr. This allows the use of tcpwrapper
* rules to restrict destinations as well as sources of connections
* for ftp.
*/
if (Use_Rdns)
flags = 0;
else
flags = NI_NUMERICHOST | NI_NUMERICSERV;
i = getnameinfo((struct sockaddr *)&client_iob.sa,
sizeof(client_iob.sa), ClientName, sizeof(ClientName), NULL, 0,
flags);
if (i != 0 && i != EAI_NONAME && i != EAI_AGAIN) {
debuglog(2, "name resolution failure (client)");
exit(EX_OSERR);
}
i = getnameinfo((struct sockaddr *)&real_server_sa,
sizeof(real_server_sa), RealServerName, sizeof(RealServerName),
NULL, 0, flags);
if (i != 0 && i != EAI_NONAME && i != EAI_AGAIN) {
debuglog(2, "name resolution failure (server)");
exit(EX_OSERR);
}
#ifdef LIBWRAP
if (use_tcpwrapper && !check_host(&client_iob.sa, &real_server_sa))
exit(EX_NOPERM);
#endif
client_iob.fd = 0;
syslog(LOG_INFO, "accepted connection from %s:%u to %s:%u", ClientName,
ntohs(client_iob.sa.sin_port), RealServerName,
ntohs(real_server_sa.sin_port));
server_iob.fd = get_backchannel_socket(SOCK_STREAM, min_port, max_port,
-1, 1, &server_iob.sa);
if (connect(server_iob.fd, (struct sockaddr *)&real_server_sa,
sizeof(real_server_sa)) != 0) {
syslog(LOG_INFO, "cannot connect to %s:%u (%m)", RealServerName,
ntohs(real_server_sa.sin_port));
exit(EX_NOHOST);
}
/*
* Now that we are connected to the real server, get the name
* of our end of the server socket so we know our IP address
* from the real server's perspective.
*/
salen = sizeof(server_iob.sa);
getsockname(server_iob.fd, (struct sockaddr *)&server_iob.sa, &salen);
i = getnameinfo((struct sockaddr *)&server_iob.sa,
sizeof(server_iob.sa), OurName, sizeof(OurName), NULL, 0, flags);
if (i != 0 && i != EAI_NONAME && i != EAI_AGAIN) {
debuglog(2, "name resolution failure (local)");
exit(EX_OSERR);
}
debuglog(1, "local socket is %s:%u", OurName,
ntohs(server_iob.sa.sin_port));
/* ignore SIGPIPE */
bzero(&new_sa, sizeof(new_sa));
new_sa.sa_handler = SIG_IGN;
(void)sigemptyset(&new_sa.sa_mask);
new_sa.sa_flags = SA_RESTART;
if (sigaction(SIGPIPE, &new_sa, &old_sa) != 0) {
syslog(LOG_ERR, "sigaction() failed (%m)");
exit(EX_OSERR);
}
if (setsockopt(client_iob.fd, SOL_SOCKET, SO_OOBINLINE, (char *)&one,
sizeof(one)) == -1) {
syslog(LOG_NOTICE, "cannot set SO_OOBINLINE (%m)");
exit(EX_OSERR);
}
client_iob.line_buffer_size = STARTBUFSIZE;
client_iob.line_buffer = malloc(client_iob.line_buffer_size);
client_iob.io_buffer_size = STARTBUFSIZE;
client_iob.io_buffer = malloc(client_iob.io_buffer_size);
client_iob.next_byte = 0;
client_iob.io_buffer_len = 0;
client_iob.alive = 1;
client_iob.who = "client";
client_iob.send_oob_flags = 0;
client_iob.real_sa = client_iob.sa;
server_iob.line_buffer_size = STARTBUFSIZE;
server_iob.line_buffer = malloc(server_iob.line_buffer_size);
server_iob.io_buffer_size = STARTBUFSIZE;
server_iob.io_buffer = malloc(server_iob.io_buffer_size);
server_iob.next_byte = 0;
server_iob.io_buffer_len = 0;
server_iob.alive = 1;
server_iob.who = "server";
server_iob.send_oob_flags = MSG_OOB;
server_iob.real_sa = real_server_sa;
if (client_iob.line_buffer == NULL || client_iob.io_buffer == NULL ||
server_iob.line_buffer == NULL || server_iob.io_buffer == NULL) {
syslog (LOG_NOTICE, "insufficient memory");
exit(EX_UNAVAILABLE);
}
while (client_iob.alive || server_iob.alive) {
int maxfd = 0;
fd_set *fdsp;
if (client_iob.fd > maxfd)
maxfd = client_iob.fd;
if (client_listen_socket > maxfd)
maxfd = client_listen_socket;
if (client_data_socket > maxfd)
maxfd = client_data_socket;
if (server_iob.fd > maxfd)
maxfd = server_iob.fd;
if (server_listen_socket > maxfd)
maxfd = server_listen_socket;
if (server_data_socket > maxfd)
maxfd = server_data_socket;
debuglog(3, "client is %s; server is %s",
client_iob.alive ? "alive" : "dead",
server_iob.alive ? "alive" : "dead");
fdsp = (fd_set *)calloc(howmany(maxfd + 1, NFDBITS),
sizeof(fd_mask));
if (fdsp == NULL) {
syslog(LOG_NOTICE, "insufficient memory");
exit(EX_UNAVAILABLE);
}
if (client_iob.alive && telnet_getline(&client_iob,
&server_iob)) {
debuglog(3, "client line buffer is \"%s\"",
(char *)client_iob.line_buffer);
if (client_iob.line_buffer[0] != '\0')
do_client_cmd(&client_iob, &server_iob);
} else if (server_iob.alive && telnet_getline(&server_iob,
&client_iob)) {
debuglog(3, "server line buffer is \"%s\"",
(char *)server_iob.line_buffer);
if (server_iob.line_buffer[0] != '\0')
do_server_reply(&server_iob, &client_iob);
} else {
if (client_iob.alive) {
FD_SET(client_iob.fd, fdsp);
if (client_listen_socket >= 0)
FD_SET(client_listen_socket, fdsp);
if (client_data_socket >= 0)
FD_SET(client_data_socket, fdsp);
}
if (server_iob.alive) {
FD_SET(server_iob.fd, fdsp);
if (server_listen_socket >= 0)
FD_SET(server_listen_socket, fdsp);
if (server_data_socket >= 0)
FD_SET(server_data_socket, fdsp);
}
tv.tv_sec = timeout_seconds;
tv.tv_usec = 0;
doselect:
sval = select(maxfd + 1, fdsp, NULL, NULL,
(tv.tv_sec == 0) ? NULL : &tv);
if (sval == 0) {
/*
* This proxy has timed out. Expire it
* quietly with an obituary in the syslogs
* for any passing mourners.
*/
syslog(LOG_INFO,
"timeout: no data for %ld seconds",
timeout_seconds);
exit(EX_OK);
}
if (sval == -1) {
if (errno == EINTR || errno == EAGAIN)
goto doselect;
syslog(LOG_NOTICE,
"select() failed (%m)");
exit(EX_OSERR);
}
if (client_data_socket >= 0 &&
FD_ISSET(client_data_socket, fdsp)) {
int rval;
debuglog(3, "transfer: client to server");
rval = xfer_data("client to server",
client_data_socket,
server_data_socket,
client_iob.sa.sin_addr,
real_server_sa.sin_addr);
if (rval <= 0) {
close_client_data();
close_server_data();
show_xfer_stats();
} else
client_data_bytes += rval;
}
if (server_data_socket >= 0 &&
FD_ISSET(server_data_socket, fdsp)) {
int rval;
debuglog(3, "transfer: server to client");
rval = xfer_data("server to client",
server_data_socket,
client_data_socket,
real_server_sa.sin_addr,
client_iob.sa.sin_addr);
if (rval <= 0) {
close_client_data();
close_server_data();
show_xfer_stats();
} else
server_data_bytes += rval;
}
if (server_listen_socket >= 0 &&
FD_ISSET(server_listen_socket, fdsp)) {
connect_port_backchannel();
}
if (client_listen_socket >= 0 &&
FD_ISSET(client_listen_socket, fdsp)) {
connect_pasv_backchannel();
}
if (client_iob.alive &&
FD_ISSET(client_iob.fd, fdsp)) {
client_iob.data_available = 1;
}
if (server_iob.alive &&
FD_ISSET(server_iob.fd, fdsp)) {
server_iob.data_available = 1;
}
}
free(fdsp);
if (client_iob.got_eof) {
shutdown(server_iob.fd, 1);
shutdown(client_iob.fd, 0);
client_iob.got_eof = 0;
client_iob.alive = 0;
}
if (server_iob.got_eof) {
shutdown(client_iob.fd, 1);
shutdown(server_iob.fd, 0);
server_iob.got_eof = 0;
server_iob.alive = 0;
}
}
if (Verbose)
syslog(LOG_INFO, "session ended");
exit(EX_OK);
}