1994-05-27 05:00:24 +00:00
|
|
|
/*
|
|
|
|
* Copyright (c) 1983, 1993, 1994
|
|
|
|
* The Regents of the University of California. All rights reserved.
|
|
|
|
*
|
|
|
|
* Redistribution and use in source and binary forms, with or without
|
|
|
|
* modification, are permitted provided that the following conditions
|
|
|
|
* are met:
|
|
|
|
* 1. Redistributions of source code must retain the above copyright
|
|
|
|
* notice, this list of conditions and the following disclaimer.
|
|
|
|
* 2. Redistributions in binary form must reproduce the above copyright
|
|
|
|
* notice, this list of conditions and the following disclaimer in the
|
|
|
|
* documentation and/or other materials provided with the distribution.
|
|
|
|
* 3. All advertising materials mentioning features or use of this software
|
|
|
|
* must display the following acknowledgement:
|
|
|
|
* This product includes software developed by the University of
|
|
|
|
* California, Berkeley and its contributors.
|
|
|
|
* 4. Neither the name of the University nor the names of its contributors
|
|
|
|
* may be used to endorse or promote products derived from this software
|
|
|
|
* without specific prior written permission.
|
|
|
|
*
|
|
|
|
* THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
|
|
|
|
* ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
|
|
|
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
|
|
|
* ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
|
|
|
|
* FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
|
|
|
|
* DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
|
|
|
|
* OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
|
|
|
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
|
|
|
|
* LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
|
|
|
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
|
|
|
* SUCH DAMAGE.
|
|
|
|
*/
|
|
|
|
|
|
|
|
#if defined(LIBC_SCCS) && !defined(lint)
|
|
|
|
static char sccsid[] = "@(#)rcmd.c 8.3 (Berkeley) 3/26/94";
|
|
|
|
#endif /* LIBC_SCCS and not lint */
|
2002-03-22 21:53:29 +00:00
|
|
|
#include <sys/cdefs.h>
|
|
|
|
__FBSDID("$FreeBSD$");
|
1994-05-27 05:00:24 +00:00
|
|
|
|
2001-01-24 13:01:12 +00:00
|
|
|
#include "namespace.h"
|
1994-05-27 05:00:24 +00:00
|
|
|
#include <sys/param.h>
|
|
|
|
#include <sys/socket.h>
|
|
|
|
#include <sys/stat.h>
|
|
|
|
|
|
|
|
#include <netinet/in.h>
|
|
|
|
#include <arpa/inet.h>
|
|
|
|
|
|
|
|
#include <signal.h>
|
|
|
|
#include <fcntl.h>
|
|
|
|
#include <netdb.h>
|
2001-10-23 06:22:15 +00:00
|
|
|
#include <stdlib.h>
|
1994-05-27 05:00:24 +00:00
|
|
|
#include <unistd.h>
|
|
|
|
#include <pwd.h>
|
|
|
|
#include <errno.h>
|
|
|
|
#include <stdio.h>
|
|
|
|
#include <ctype.h>
|
|
|
|
#include <string.h>
|
1995-08-07 03:42:14 +00:00
|
|
|
#include <rpc/rpc.h>
|
2004-11-13 20:40:32 +00:00
|
|
|
#ifdef YP
|
1995-08-07 03:42:14 +00:00
|
|
|
#include <rpcsvc/yp_prot.h>
|
|
|
|
#include <rpcsvc/ypclnt.h>
|
|
|
|
#endif
|
2000-07-20 18:49:35 +00:00
|
|
|
#include <arpa/nameser.h>
|
2001-01-24 13:01:12 +00:00
|
|
|
#include "un-namespace.h"
|
1994-05-27 05:00:24 +00:00
|
|
|
|
2002-03-21 22:49:10 +00:00
|
|
|
extern int innetgr( const char *, const char *, const char *, const char * );
|
1996-07-12 18:57:58 +00:00
|
|
|
|
1994-09-08 20:55:02 +00:00
|
|
|
#define max(a, b) ((a > b) ? a : b)
|
|
|
|
|
2002-03-22 09:22:15 +00:00
|
|
|
int __ivaliduser(FILE *, u_int32_t, const char *, const char *);
|
|
|
|
int __ivaliduser_af(FILE *,const void *, const char *, const char *, int, int);
|
|
|
|
int __ivaliduser_sa(FILE *, const struct sockaddr *, socklen_t, const char *,
|
|
|
|
const char *);
|
|
|
|
static int __icheckhost(const struct sockaddr *, socklen_t, const char *);
|
2000-01-13 15:09:48 +00:00
|
|
|
|
2000-12-04 18:02:12 +00:00
|
|
|
char paddr[NI_MAXHOST];
|
1994-05-27 05:00:24 +00:00
|
|
|
|
|
|
|
int
|
|
|
|
rcmd(ahost, rport, locuser, remuser, cmd, fd2p)
|
|
|
|
char **ahost;
|
|
|
|
u_short rport;
|
|
|
|
const char *locuser, *remuser, *cmd;
|
|
|
|
int *fd2p;
|
2000-01-25 14:52:10 +00:00
|
|
|
{
|
|
|
|
return rcmd_af(ahost, rport, locuser, remuser, cmd, fd2p, AF_INET);
|
|
|
|
}
|
|
|
|
|
|
|
|
int
|
|
|
|
rcmd_af(ahost, rport, locuser, remuser, cmd, fd2p, af)
|
|
|
|
char **ahost;
|
|
|
|
u_short rport;
|
|
|
|
const char *locuser, *remuser, *cmd;
|
|
|
|
int *fd2p;
|
|
|
|
int af;
|
1994-05-27 05:00:24 +00:00
|
|
|
{
|
2000-01-13 15:09:48 +00:00
|
|
|
struct addrinfo hints, *res, *ai;
|
|
|
|
struct sockaddr_storage from;
|
1994-05-27 05:00:24 +00:00
|
|
|
fd_set reads;
|
2001-01-24 13:01:12 +00:00
|
|
|
sigset_t oldmask, newmask;
|
1994-05-27 05:00:24 +00:00
|
|
|
pid_t pid;
|
2000-01-13 15:09:48 +00:00
|
|
|
int s, aport, lport, timo, error;
|
2001-10-23 06:22:15 +00:00
|
|
|
char c, *p;
|
2000-12-04 18:02:12 +00:00
|
|
|
int refused, nres;
|
2000-07-20 18:49:35 +00:00
|
|
|
char num[8];
|
|
|
|
static char canonnamebuf[MAXDNAME]; /* is it proper here? */
|
1994-05-27 05:00:24 +00:00
|
|
|
|
2001-10-23 06:22:15 +00:00
|
|
|
/* call rcmdsh() with specified remote shell if appropriate. */
|
|
|
|
if (!issetugid() && (p = getenv("RSH"))) {
|
|
|
|
struct servent *sp = getservbyname("shell", "tcp");
|
|
|
|
|
|
|
|
if (sp && sp->s_port == rport)
|
|
|
|
return (rcmdsh(ahost, rport, locuser, remuser,
|
|
|
|
cmd, p));
|
|
|
|
}
|
|
|
|
|
|
|
|
/* use rsh(1) if non-root and remote port is shell. */
|
|
|
|
if (geteuid()) {
|
|
|
|
struct servent *sp = getservbyname("shell", "tcp");
|
|
|
|
|
|
|
|
if (sp && sp->s_port == rport)
|
|
|
|
return (rcmdsh(ahost, rport, locuser, remuser,
|
|
|
|
cmd, NULL));
|
|
|
|
}
|
|
|
|
|
1994-05-27 05:00:24 +00:00
|
|
|
pid = getpid();
|
2000-01-13 15:09:48 +00:00
|
|
|
|
|
|
|
memset(&hints, 0, sizeof(hints));
|
|
|
|
hints.ai_flags = AI_CANONNAME;
|
2000-01-25 14:52:10 +00:00
|
|
|
hints.ai_family = af;
|
2000-01-13 15:09:48 +00:00
|
|
|
hints.ai_socktype = SOCK_STREAM;
|
|
|
|
hints.ai_protocol = 0;
|
|
|
|
(void)snprintf(num, sizeof(num), "%d", ntohs(rport));
|
|
|
|
error = getaddrinfo(*ahost, num, &hints, &res);
|
|
|
|
if (error) {
|
|
|
|
fprintf(stderr, "rcmd: getaddrinfo: %s\n",
|
|
|
|
gai_strerror(error));
|
|
|
|
if (error == EAI_SYSTEM)
|
|
|
|
fprintf(stderr, "rcmd: getaddrinfo: %s\n",
|
|
|
|
strerror(errno));
|
1994-05-27 05:00:24 +00:00
|
|
|
return (-1);
|
|
|
|
}
|
2000-07-20 18:49:35 +00:00
|
|
|
|
|
|
|
if (res->ai_canonname
|
|
|
|
&& strlen(res->ai_canonname) + 1 < sizeof(canonnamebuf)) {
|
|
|
|
strncpy(canonnamebuf, res->ai_canonname, sizeof(canonnamebuf));
|
|
|
|
*ahost = canonnamebuf;
|
|
|
|
}
|
2000-12-04 18:02:12 +00:00
|
|
|
nres = 0;
|
|
|
|
for (ai = res; ai; ai = ai->ai_next)
|
|
|
|
nres++;
|
2000-01-13 15:09:48 +00:00
|
|
|
ai = res;
|
2000-12-04 18:02:12 +00:00
|
|
|
refused = 0;
|
2001-01-24 13:01:12 +00:00
|
|
|
sigemptyset(&newmask);
|
|
|
|
sigaddset(&newmask, SIGURG);
|
|
|
|
_sigprocmask(SIG_BLOCK, (const sigset_t *)&newmask, &oldmask);
|
1994-05-27 05:00:24 +00:00
|
|
|
for (timo = 1, lport = IPPORT_RESERVED - 1;;) {
|
2000-01-13 15:09:48 +00:00
|
|
|
s = rresvport_af(&lport, ai->ai_family);
|
1994-05-27 05:00:24 +00:00
|
|
|
if (s < 0) {
|
2000-02-10 19:46:47 +00:00
|
|
|
if (errno != EAGAIN && ai->ai_next) {
|
|
|
|
ai = ai->ai_next;
|
|
|
|
continue;
|
|
|
|
}
|
1994-05-27 05:00:24 +00:00
|
|
|
if (errno == EAGAIN)
|
|
|
|
(void)fprintf(stderr,
|
|
|
|
"rcmd: socket: All ports in use\n");
|
|
|
|
else
|
|
|
|
(void)fprintf(stderr, "rcmd: socket: %s\n",
|
|
|
|
strerror(errno));
|
2000-01-13 15:09:48 +00:00
|
|
|
freeaddrinfo(res);
|
2001-01-24 13:01:12 +00:00
|
|
|
_sigprocmask(SIG_SETMASK, (const sigset_t *)&oldmask,
|
|
|
|
NULL);
|
1994-05-27 05:00:24 +00:00
|
|
|
return (-1);
|
|
|
|
}
|
Simplify sytem call renaming. Instead of _foo() <-- _libc_foo <-- foo(),
just use _foo() <-- foo(). In the case of a libpthread that doesn't do
call conversion (such as linuxthreads and our upcoming libpthread), this
is adequate. In the case of libc_r, we still need three names, which are
now _thread_sys_foo() <-- _foo() <-- foo().
Convert all internal libc usage of: aio_suspend(), close(), fsync(), msync(),
nanosleep(), open(), fcntl(), read(), and write() to _foo() instead of foo().
Remove all internal libc usage of: creat(), pause(), sleep(), system(),
tcdrain(), wait(), and waitpid().
Make thread cancellation fully POSIX-compliant.
Suggested by: deischen
2000-01-27 23:07:25 +00:00
|
|
|
_fcntl(s, F_SETOWN, pid);
|
2001-01-24 13:01:12 +00:00
|
|
|
if (_connect(s, ai->ai_addr, ai->ai_addrlen) >= 0)
|
1994-05-27 05:00:24 +00:00
|
|
|
break;
|
Simplify sytem call renaming. Instead of _foo() <-- _libc_foo <-- foo(),
just use _foo() <-- foo(). In the case of a libpthread that doesn't do
call conversion (such as linuxthreads and our upcoming libpthread), this
is adequate. In the case of libc_r, we still need three names, which are
now _thread_sys_foo() <-- _foo() <-- foo().
Convert all internal libc usage of: aio_suspend(), close(), fsync(), msync(),
nanosleep(), open(), fcntl(), read(), and write() to _foo() instead of foo().
Remove all internal libc usage of: creat(), pause(), sleep(), system(),
tcdrain(), wait(), and waitpid().
Make thread cancellation fully POSIX-compliant.
Suggested by: deischen
2000-01-27 23:07:25 +00:00
|
|
|
(void)_close(s);
|
1994-05-27 05:00:24 +00:00
|
|
|
if (errno == EADDRINUSE) {
|
|
|
|
lport--;
|
|
|
|
continue;
|
|
|
|
}
|
2000-12-04 18:02:12 +00:00
|
|
|
if (errno == ECONNREFUSED)
|
|
|
|
refused = 1;
|
|
|
|
if (ai->ai_next == NULL && (!refused || timo > 16)) {
|
|
|
|
(void)fprintf(stderr, "%s: %s\n",
|
|
|
|
*ahost, strerror(errno));
|
|
|
|
freeaddrinfo(res);
|
2001-01-24 13:01:12 +00:00
|
|
|
_sigprocmask(SIG_SETMASK, (const sigset_t *)&oldmask,
|
|
|
|
NULL);
|
2000-12-04 18:02:12 +00:00
|
|
|
return (-1);
|
2000-08-10 17:10:57 +00:00
|
|
|
}
|
2000-12-04 18:02:12 +00:00
|
|
|
if (nres > 1) {
|
1994-05-27 05:00:24 +00:00
|
|
|
int oerrno = errno;
|
|
|
|
|
2005-05-13 16:31:11 +00:00
|
|
|
getnameinfo(ai->ai_addr, ai->ai_addrlen, paddr,
|
|
|
|
sizeof(paddr), NULL, 0, NI_NUMERICHOST);
|
1994-05-27 05:00:24 +00:00
|
|
|
(void)fprintf(stderr, "connect to address %s: ",
|
2000-01-13 15:09:48 +00:00
|
|
|
paddr);
|
1994-05-27 05:00:24 +00:00
|
|
|
errno = oerrno;
|
|
|
|
perror(0);
|
2000-12-04 18:02:12 +00:00
|
|
|
}
|
|
|
|
if ((ai = ai->ai_next) == NULL) {
|
|
|
|
/* refused && timo <= 16 */
|
|
|
|
struct timespec time_to_sleep, time_remaining;
|
|
|
|
|
|
|
|
time_to_sleep.tv_sec = timo;
|
|
|
|
time_to_sleep.tv_nsec = 0;
|
|
|
|
(void)_nanosleep(&time_to_sleep, &time_remaining);
|
|
|
|
timo *= 2;
|
|
|
|
ai = res;
|
|
|
|
refused = 0;
|
|
|
|
}
|
|
|
|
if (nres > 1) {
|
2005-05-13 16:31:11 +00:00
|
|
|
getnameinfo(ai->ai_addr, ai->ai_addrlen, paddr,
|
|
|
|
sizeof(paddr), NULL, 0, NI_NUMERICHOST);
|
2000-01-13 15:09:48 +00:00
|
|
|
fprintf(stderr, "Trying %s...\n", paddr);
|
1994-05-27 05:00:24 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
lport--;
|
|
|
|
if (fd2p == 0) {
|
Simplify sytem call renaming. Instead of _foo() <-- _libc_foo <-- foo(),
just use _foo() <-- foo(). In the case of a libpthread that doesn't do
call conversion (such as linuxthreads and our upcoming libpthread), this
is adequate. In the case of libc_r, we still need three names, which are
now _thread_sys_foo() <-- _foo() <-- foo().
Convert all internal libc usage of: aio_suspend(), close(), fsync(), msync(),
nanosleep(), open(), fcntl(), read(), and write() to _foo() instead of foo().
Remove all internal libc usage of: creat(), pause(), sleep(), system(),
tcdrain(), wait(), and waitpid().
Make thread cancellation fully POSIX-compliant.
Suggested by: deischen
2000-01-27 23:07:25 +00:00
|
|
|
_write(s, "", 1);
|
1994-05-27 05:00:24 +00:00
|
|
|
lport = 0;
|
|
|
|
} else {
|
2000-01-13 15:09:48 +00:00
|
|
|
int s2 = rresvport_af(&lport, ai->ai_family), s3;
|
2005-02-14 17:51:45 +00:00
|
|
|
socklen_t len = ai->ai_addrlen;
|
1994-09-08 20:55:02 +00:00
|
|
|
int nfds;
|
1994-05-27 05:00:24 +00:00
|
|
|
|
|
|
|
if (s2 < 0)
|
|
|
|
goto bad;
|
2001-01-24 13:01:12 +00:00
|
|
|
_listen(s2, 1);
|
1994-05-27 05:00:24 +00:00
|
|
|
(void)snprintf(num, sizeof(num), "%d", lport);
|
Simplify sytem call renaming. Instead of _foo() <-- _libc_foo <-- foo(),
just use _foo() <-- foo(). In the case of a libpthread that doesn't do
call conversion (such as linuxthreads and our upcoming libpthread), this
is adequate. In the case of libc_r, we still need three names, which are
now _thread_sys_foo() <-- _foo() <-- foo().
Convert all internal libc usage of: aio_suspend(), close(), fsync(), msync(),
nanosleep(), open(), fcntl(), read(), and write() to _foo() instead of foo().
Remove all internal libc usage of: creat(), pause(), sleep(), system(),
tcdrain(), wait(), and waitpid().
Make thread cancellation fully POSIX-compliant.
Suggested by: deischen
2000-01-27 23:07:25 +00:00
|
|
|
if (_write(s, num, strlen(num)+1) != strlen(num)+1) {
|
1994-05-27 05:00:24 +00:00
|
|
|
(void)fprintf(stderr,
|
|
|
|
"rcmd: write (setting up stderr): %s\n",
|
|
|
|
strerror(errno));
|
Simplify sytem call renaming. Instead of _foo() <-- _libc_foo <-- foo(),
just use _foo() <-- foo(). In the case of a libpthread that doesn't do
call conversion (such as linuxthreads and our upcoming libpthread), this
is adequate. In the case of libc_r, we still need three names, which are
now _thread_sys_foo() <-- _foo() <-- foo().
Convert all internal libc usage of: aio_suspend(), close(), fsync(), msync(),
nanosleep(), open(), fcntl(), read(), and write() to _foo() instead of foo().
Remove all internal libc usage of: creat(), pause(), sleep(), system(),
tcdrain(), wait(), and waitpid().
Make thread cancellation fully POSIX-compliant.
Suggested by: deischen
2000-01-27 23:07:25 +00:00
|
|
|
(void)_close(s2);
|
1994-05-27 05:00:24 +00:00
|
|
|
goto bad;
|
|
|
|
}
|
1994-09-08 20:55:02 +00:00
|
|
|
nfds = max(s, s2)+1;
|
|
|
|
if(nfds > FD_SETSIZE) {
|
|
|
|
fprintf(stderr, "rcmd: too many files\n");
|
Simplify sytem call renaming. Instead of _foo() <-- _libc_foo <-- foo(),
just use _foo() <-- foo(). In the case of a libpthread that doesn't do
call conversion (such as linuxthreads and our upcoming libpthread), this
is adequate. In the case of libc_r, we still need three names, which are
now _thread_sys_foo() <-- _foo() <-- foo().
Convert all internal libc usage of: aio_suspend(), close(), fsync(), msync(),
nanosleep(), open(), fcntl(), read(), and write() to _foo() instead of foo().
Remove all internal libc usage of: creat(), pause(), sleep(), system(),
tcdrain(), wait(), and waitpid().
Make thread cancellation fully POSIX-compliant.
Suggested by: deischen
2000-01-27 23:07:25 +00:00
|
|
|
(void)_close(s2);
|
1994-09-08 20:55:02 +00:00
|
|
|
goto bad;
|
|
|
|
}
|
1996-08-12 14:14:09 +00:00
|
|
|
again:
|
1994-05-27 05:00:24 +00:00
|
|
|
FD_ZERO(&reads);
|
|
|
|
FD_SET(s, &reads);
|
|
|
|
FD_SET(s2, &reads);
|
|
|
|
errno = 0;
|
2001-01-24 13:01:12 +00:00
|
|
|
if (_select(nfds, &reads, 0, 0, 0) < 1 || !FD_ISSET(s2, &reads)){
|
1994-05-27 05:00:24 +00:00
|
|
|
if (errno != 0)
|
|
|
|
(void)fprintf(stderr,
|
|
|
|
"rcmd: select (setting up stderr): %s\n",
|
|
|
|
strerror(errno));
|
|
|
|
else
|
|
|
|
(void)fprintf(stderr,
|
|
|
|
"select: protocol failure in circuit setup\n");
|
Simplify sytem call renaming. Instead of _foo() <-- _libc_foo <-- foo(),
just use _foo() <-- foo(). In the case of a libpthread that doesn't do
call conversion (such as linuxthreads and our upcoming libpthread), this
is adequate. In the case of libc_r, we still need three names, which are
now _thread_sys_foo() <-- _foo() <-- foo().
Convert all internal libc usage of: aio_suspend(), close(), fsync(), msync(),
nanosleep(), open(), fcntl(), read(), and write() to _foo() instead of foo().
Remove all internal libc usage of: creat(), pause(), sleep(), system(),
tcdrain(), wait(), and waitpid().
Make thread cancellation fully POSIX-compliant.
Suggested by: deischen
2000-01-27 23:07:25 +00:00
|
|
|
(void)_close(s2);
|
1994-05-27 05:00:24 +00:00
|
|
|
goto bad;
|
|
|
|
}
|
2001-01-24 13:01:12 +00:00
|
|
|
s3 = _accept(s2, (struct sockaddr *)&from, &len);
|
2000-01-13 15:09:48 +00:00
|
|
|
switch (from.ss_family) {
|
|
|
|
case AF_INET:
|
|
|
|
aport = ntohs(((struct sockaddr_in *)&from)->sin_port);
|
|
|
|
break;
|
|
|
|
#ifdef INET6
|
|
|
|
case AF_INET6:
|
|
|
|
aport = ntohs(((struct sockaddr_in6 *)&from)->sin6_port);
|
|
|
|
break;
|
|
|
|
#endif
|
|
|
|
default:
|
|
|
|
aport = 0; /* error */
|
|
|
|
break;
|
|
|
|
}
|
1996-08-12 14:14:09 +00:00
|
|
|
/*
|
|
|
|
* XXX careful for ftp bounce attacks. If discovered, shut them
|
|
|
|
* down and check for the real auxiliary channel to connect.
|
|
|
|
*/
|
2000-01-13 15:09:48 +00:00
|
|
|
if (aport == 20) {
|
Simplify sytem call renaming. Instead of _foo() <-- _libc_foo <-- foo(),
just use _foo() <-- foo(). In the case of a libpthread that doesn't do
call conversion (such as linuxthreads and our upcoming libpthread), this
is adequate. In the case of libc_r, we still need three names, which are
now _thread_sys_foo() <-- _foo() <-- foo().
Convert all internal libc usage of: aio_suspend(), close(), fsync(), msync(),
nanosleep(), open(), fcntl(), read(), and write() to _foo() instead of foo().
Remove all internal libc usage of: creat(), pause(), sleep(), system(),
tcdrain(), wait(), and waitpid().
Make thread cancellation fully POSIX-compliant.
Suggested by: deischen
2000-01-27 23:07:25 +00:00
|
|
|
_close(s3);
|
1996-08-12 14:14:09 +00:00
|
|
|
goto again;
|
|
|
|
}
|
Simplify sytem call renaming. Instead of _foo() <-- _libc_foo <-- foo(),
just use _foo() <-- foo(). In the case of a libpthread that doesn't do
call conversion (such as linuxthreads and our upcoming libpthread), this
is adequate. In the case of libc_r, we still need three names, which are
now _thread_sys_foo() <-- _foo() <-- foo().
Convert all internal libc usage of: aio_suspend(), close(), fsync(), msync(),
nanosleep(), open(), fcntl(), read(), and write() to _foo() instead of foo().
Remove all internal libc usage of: creat(), pause(), sleep(), system(),
tcdrain(), wait(), and waitpid().
Make thread cancellation fully POSIX-compliant.
Suggested by: deischen
2000-01-27 23:07:25 +00:00
|
|
|
(void)_close(s2);
|
1994-05-27 05:00:24 +00:00
|
|
|
if (s3 < 0) {
|
|
|
|
(void)fprintf(stderr,
|
|
|
|
"rcmd: accept: %s\n", strerror(errno));
|
|
|
|
lport = 0;
|
|
|
|
goto bad;
|
|
|
|
}
|
|
|
|
*fd2p = s3;
|
2000-01-13 15:09:48 +00:00
|
|
|
if (aport >= IPPORT_RESERVED || aport < IPPORT_RESERVED / 2) {
|
1994-05-27 05:00:24 +00:00
|
|
|
(void)fprintf(stderr,
|
|
|
|
"socket: protocol failure in circuit setup.\n");
|
|
|
|
goto bad2;
|
|
|
|
}
|
|
|
|
}
|
Simplify sytem call renaming. Instead of _foo() <-- _libc_foo <-- foo(),
just use _foo() <-- foo(). In the case of a libpthread that doesn't do
call conversion (such as linuxthreads and our upcoming libpthread), this
is adequate. In the case of libc_r, we still need three names, which are
now _thread_sys_foo() <-- _foo() <-- foo().
Convert all internal libc usage of: aio_suspend(), close(), fsync(), msync(),
nanosleep(), open(), fcntl(), read(), and write() to _foo() instead of foo().
Remove all internal libc usage of: creat(), pause(), sleep(), system(),
tcdrain(), wait(), and waitpid().
Make thread cancellation fully POSIX-compliant.
Suggested by: deischen
2000-01-27 23:07:25 +00:00
|
|
|
(void)_write(s, locuser, strlen(locuser)+1);
|
|
|
|
(void)_write(s, remuser, strlen(remuser)+1);
|
|
|
|
(void)_write(s, cmd, strlen(cmd)+1);
|
|
|
|
if (_read(s, &c, 1) != 1) {
|
1994-05-27 05:00:24 +00:00
|
|
|
(void)fprintf(stderr,
|
|
|
|
"rcmd: %s: %s\n", *ahost, strerror(errno));
|
|
|
|
goto bad2;
|
|
|
|
}
|
|
|
|
if (c != 0) {
|
Simplify sytem call renaming. Instead of _foo() <-- _libc_foo <-- foo(),
just use _foo() <-- foo(). In the case of a libpthread that doesn't do
call conversion (such as linuxthreads and our upcoming libpthread), this
is adequate. In the case of libc_r, we still need three names, which are
now _thread_sys_foo() <-- _foo() <-- foo().
Convert all internal libc usage of: aio_suspend(), close(), fsync(), msync(),
nanosleep(), open(), fcntl(), read(), and write() to _foo() instead of foo().
Remove all internal libc usage of: creat(), pause(), sleep(), system(),
tcdrain(), wait(), and waitpid().
Make thread cancellation fully POSIX-compliant.
Suggested by: deischen
2000-01-27 23:07:25 +00:00
|
|
|
while (_read(s, &c, 1) == 1) {
|
|
|
|
(void)_write(STDERR_FILENO, &c, 1);
|
1994-05-27 05:00:24 +00:00
|
|
|
if (c == '\n')
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
goto bad2;
|
|
|
|
}
|
2001-01-24 13:01:12 +00:00
|
|
|
_sigprocmask(SIG_SETMASK, (const sigset_t *)&oldmask, NULL);
|
2000-01-13 15:09:48 +00:00
|
|
|
freeaddrinfo(res);
|
1994-05-27 05:00:24 +00:00
|
|
|
return (s);
|
|
|
|
bad2:
|
|
|
|
if (lport)
|
Simplify sytem call renaming. Instead of _foo() <-- _libc_foo <-- foo(),
just use _foo() <-- foo(). In the case of a libpthread that doesn't do
call conversion (such as linuxthreads and our upcoming libpthread), this
is adequate. In the case of libc_r, we still need three names, which are
now _thread_sys_foo() <-- _foo() <-- foo().
Convert all internal libc usage of: aio_suspend(), close(), fsync(), msync(),
nanosleep(), open(), fcntl(), read(), and write() to _foo() instead of foo().
Remove all internal libc usage of: creat(), pause(), sleep(), system(),
tcdrain(), wait(), and waitpid().
Make thread cancellation fully POSIX-compliant.
Suggested by: deischen
2000-01-27 23:07:25 +00:00
|
|
|
(void)_close(*fd2p);
|
1994-05-27 05:00:24 +00:00
|
|
|
bad:
|
Simplify sytem call renaming. Instead of _foo() <-- _libc_foo <-- foo(),
just use _foo() <-- foo(). In the case of a libpthread that doesn't do
call conversion (such as linuxthreads and our upcoming libpthread), this
is adequate. In the case of libc_r, we still need three names, which are
now _thread_sys_foo() <-- _foo() <-- foo().
Convert all internal libc usage of: aio_suspend(), close(), fsync(), msync(),
nanosleep(), open(), fcntl(), read(), and write() to _foo() instead of foo().
Remove all internal libc usage of: creat(), pause(), sleep(), system(),
tcdrain(), wait(), and waitpid().
Make thread cancellation fully POSIX-compliant.
Suggested by: deischen
2000-01-27 23:07:25 +00:00
|
|
|
(void)_close(s);
|
2001-01-24 13:01:12 +00:00
|
|
|
_sigprocmask(SIG_SETMASK, (const sigset_t *)&oldmask, NULL);
|
2000-01-13 15:09:48 +00:00
|
|
|
freeaddrinfo(res);
|
1994-05-27 05:00:24 +00:00
|
|
|
return (-1);
|
|
|
|
}
|
|
|
|
|
|
|
|
int
|
2000-01-13 15:09:48 +00:00
|
|
|
rresvport(port)
|
|
|
|
int *port;
|
|
|
|
{
|
|
|
|
return rresvport_af(port, AF_INET);
|
|
|
|
}
|
|
|
|
|
|
|
|
int
|
|
|
|
rresvport_af(alport, family)
|
|
|
|
int *alport, family;
|
1994-05-27 05:00:24 +00:00
|
|
|
{
|
2003-02-18 13:39:52 +00:00
|
|
|
int s;
|
2000-01-13 15:09:48 +00:00
|
|
|
struct sockaddr_storage ss;
|
|
|
|
u_short *sport;
|
|
|
|
|
|
|
|
memset(&ss, 0, sizeof(ss));
|
|
|
|
ss.ss_family = family;
|
|
|
|
switch (family) {
|
|
|
|
case AF_INET:
|
|
|
|
((struct sockaddr *)&ss)->sa_len = sizeof(struct sockaddr_in);
|
|
|
|
sport = &((struct sockaddr_in *)&ss)->sin_port;
|
|
|
|
((struct sockaddr_in *)&ss)->sin_addr.s_addr = INADDR_ANY;
|
|
|
|
break;
|
|
|
|
#ifdef INET6
|
|
|
|
case AF_INET6:
|
|
|
|
((struct sockaddr *)&ss)->sa_len = sizeof(struct sockaddr_in6);
|
|
|
|
sport = &((struct sockaddr_in6 *)&ss)->sin6_port;
|
|
|
|
((struct sockaddr_in6 *)&ss)->sin6_addr = in6addr_any;
|
|
|
|
break;
|
|
|
|
#endif
|
|
|
|
default:
|
|
|
|
errno = EAFNOSUPPORT;
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
2001-01-24 13:01:12 +00:00
|
|
|
s = _socket(ss.ss_family, SOCK_STREAM, 0);
|
1994-05-27 05:00:24 +00:00
|
|
|
if (s < 0)
|
|
|
|
return (-1);
|
1996-08-12 14:14:09 +00:00
|
|
|
#if 0 /* compat_exact_traditional_rresvport_semantics */
|
|
|
|
sin.sin_port = htons((u_short)*alport);
|
2001-01-24 13:01:12 +00:00
|
|
|
if (_bind(s, (struct sockaddr *)&sin, sizeof(sin)) >= 0)
|
1996-08-12 14:14:09 +00:00
|
|
|
return (s);
|
|
|
|
if (errno != EADDRINUSE) {
|
Simplify sytem call renaming. Instead of _foo() <-- _libc_foo <-- foo(),
just use _foo() <-- foo(). In the case of a libpthread that doesn't do
call conversion (such as linuxthreads and our upcoming libpthread), this
is adequate. In the case of libc_r, we still need three names, which are
now _thread_sys_foo() <-- _foo() <-- foo().
Convert all internal libc usage of: aio_suspend(), close(), fsync(), msync(),
nanosleep(), open(), fcntl(), read(), and write() to _foo() instead of foo().
Remove all internal libc usage of: creat(), pause(), sleep(), system(),
tcdrain(), wait(), and waitpid().
Make thread cancellation fully POSIX-compliant.
Suggested by: deischen
2000-01-27 23:07:25 +00:00
|
|
|
(void)_close(s);
|
1996-08-12 14:14:09 +00:00
|
|
|
return (-1);
|
1996-05-31 04:00:21 +00:00
|
|
|
}
|
1996-08-12 14:14:09 +00:00
|
|
|
#endif
|
2000-01-13 15:09:48 +00:00
|
|
|
*sport = 0;
|
2000-01-26 14:13:41 +00:00
|
|
|
if (bindresvport_sa(s, (struct sockaddr *)&ss) == -1) {
|
Simplify sytem call renaming. Instead of _foo() <-- _libc_foo <-- foo(),
just use _foo() <-- foo(). In the case of a libpthread that doesn't do
call conversion (such as linuxthreads and our upcoming libpthread), this
is adequate. In the case of libc_r, we still need three names, which are
now _thread_sys_foo() <-- _foo() <-- foo().
Convert all internal libc usage of: aio_suspend(), close(), fsync(), msync(),
nanosleep(), open(), fcntl(), read(), and write() to _foo() instead of foo().
Remove all internal libc usage of: creat(), pause(), sleep(), system(),
tcdrain(), wait(), and waitpid().
Make thread cancellation fully POSIX-compliant.
Suggested by: deischen
2000-01-27 23:07:25 +00:00
|
|
|
(void)_close(s);
|
1996-08-12 14:14:09 +00:00
|
|
|
return (-1);
|
1994-05-27 05:00:24 +00:00
|
|
|
}
|
2000-01-13 15:09:48 +00:00
|
|
|
*alport = (int)ntohs(*sport);
|
1996-08-12 14:14:09 +00:00
|
|
|
return (s);
|
1994-05-27 05:00:24 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
int __check_rhosts_file = 1;
|
|
|
|
char *__rcmd_errstr;
|
|
|
|
|
|
|
|
int
|
|
|
|
ruserok(rhost, superuser, ruser, luser)
|
|
|
|
const char *rhost, *ruser, *luser;
|
|
|
|
int superuser;
|
2000-01-13 15:09:48 +00:00
|
|
|
{
|
2000-02-01 15:55:56 +00:00
|
|
|
struct addrinfo hints, *res, *r;
|
|
|
|
int error;
|
2000-01-13 15:09:48 +00:00
|
|
|
|
2000-02-01 15:55:56 +00:00
|
|
|
memset(&hints, 0, sizeof(hints));
|
|
|
|
hints.ai_family = PF_UNSPEC;
|
|
|
|
hints.ai_socktype = SOCK_DGRAM; /*dummy*/
|
|
|
|
error = getaddrinfo(rhost, "0", &hints, &res);
|
|
|
|
if (error)
|
1994-05-27 05:00:24 +00:00
|
|
|
return (-1);
|
2000-02-01 15:55:56 +00:00
|
|
|
|
|
|
|
for (r = res; r; r = r->ai_next) {
|
|
|
|
if (iruserok_sa(r->ai_addr, r->ai_addrlen, superuser, ruser,
|
|
|
|
luser) == 0) {
|
|
|
|
freeaddrinfo(res);
|
|
|
|
return (0);
|
2000-01-13 15:09:48 +00:00
|
|
|
}
|
1994-05-27 05:00:24 +00:00
|
|
|
}
|
2000-02-01 15:55:56 +00:00
|
|
|
freeaddrinfo(res);
|
|
|
|
return (-1);
|
1994-05-27 05:00:24 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* New .rhosts strategy: We are passed an ip address. We spin through
|
|
|
|
* hosts.equiv and .rhosts looking for a match. When the .rhosts only
|
|
|
|
* has ip addresses, we don't have to trust a nameserver. When it
|
|
|
|
* contains hostnames, we spin through the list of addresses the nameserver
|
|
|
|
* gives us and look for a match.
|
|
|
|
*
|
|
|
|
* Returns 0 if ok, -1 if not ok.
|
|
|
|
*/
|
|
|
|
int
|
|
|
|
iruserok(raddr, superuser, ruser, luser)
|
1998-10-05 18:35:04 +00:00
|
|
|
unsigned long raddr;
|
1994-05-27 05:00:24 +00:00
|
|
|
int superuser;
|
|
|
|
const char *ruser, *luser;
|
2000-01-13 15:09:48 +00:00
|
|
|
{
|
2000-12-04 18:02:12 +00:00
|
|
|
struct sockaddr_in sin;
|
|
|
|
|
|
|
|
memset(&sin, 0, sizeof(sin));
|
|
|
|
sin.sin_family = AF_INET;
|
|
|
|
sin.sin_len = sizeof(struct sockaddr_in);
|
|
|
|
memcpy(&sin.sin_addr, &raddr, sizeof(sin.sin_addr));
|
|
|
|
return iruserok_sa((struct sockaddr *)&sin, sin.sin_len, superuser,
|
|
|
|
ruser, luser);
|
2000-01-13 15:09:48 +00:00
|
|
|
}
|
|
|
|
|
2000-12-04 18:02:12 +00:00
|
|
|
/*
|
|
|
|
* AF independent extension of iruserok.
|
|
|
|
*
|
|
|
|
* Returns 0 if ok, -1 if not ok.
|
|
|
|
*/
|
|
|
|
int
|
|
|
|
iruserok_sa(ra, rlen, superuser, ruser, luser)
|
|
|
|
const void *ra;
|
|
|
|
int rlen;
|
2000-01-13 15:09:48 +00:00
|
|
|
int superuser;
|
|
|
|
const char *ruser, *luser;
|
1994-05-27 05:00:24 +00:00
|
|
|
{
|
2002-03-21 18:49:23 +00:00
|
|
|
char *cp;
|
1994-05-27 05:00:24 +00:00
|
|
|
struct stat sbuf;
|
|
|
|
struct passwd *pwd;
|
|
|
|
FILE *hostf;
|
|
|
|
uid_t uid;
|
|
|
|
int first;
|
|
|
|
char pbuf[MAXPATHLEN];
|
2000-12-04 18:02:12 +00:00
|
|
|
const struct sockaddr *raddr;
|
|
|
|
struct sockaddr_storage ss;
|
2000-01-13 15:09:48 +00:00
|
|
|
|
2000-12-04 18:02:12 +00:00
|
|
|
/* avoid alignment issue */
|
|
|
|
if (rlen > sizeof(ss))
|
|
|
|
return(-1);
|
|
|
|
memcpy(&ss, ra, rlen);
|
|
|
|
raddr = (struct sockaddr *)&ss;
|
1994-05-27 05:00:24 +00:00
|
|
|
|
|
|
|
first = 1;
|
|
|
|
hostf = superuser ? NULL : fopen(_PATH_HEQUIV, "r");
|
|
|
|
again:
|
|
|
|
if (hostf) {
|
2000-12-04 18:02:12 +00:00
|
|
|
if (__ivaliduser_sa(hostf, raddr, rlen, luser, ruser) == 0) {
|
1994-05-27 05:00:24 +00:00
|
|
|
(void)fclose(hostf);
|
|
|
|
return (0);
|
|
|
|
}
|
|
|
|
(void)fclose(hostf);
|
|
|
|
}
|
|
|
|
if (first == 1 && (__check_rhosts_file || superuser)) {
|
|
|
|
first = 0;
|
|
|
|
if ((pwd = getpwnam(luser)) == NULL)
|
|
|
|
return (-1);
|
|
|
|
(void)strcpy(pbuf, pwd->pw_dir);
|
|
|
|
(void)strcat(pbuf, "/.rhosts");
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Change effective uid while opening .rhosts. If root and
|
|
|
|
* reading an NFS mounted file system, can't read files that
|
|
|
|
* are protected read/write owner only.
|
|
|
|
*/
|
|
|
|
uid = geteuid();
|
|
|
|
(void)seteuid(pwd->pw_uid);
|
|
|
|
hostf = fopen(pbuf, "r");
|
|
|
|
(void)seteuid(uid);
|
|
|
|
|
|
|
|
if (hostf == NULL)
|
|
|
|
return (-1);
|
|
|
|
/*
|
|
|
|
* If not a regular file, or is owned by someone other than
|
|
|
|
* user or root or if writeable by anyone but the owner, quit.
|
|
|
|
*/
|
|
|
|
cp = NULL;
|
|
|
|
if (lstat(pbuf, &sbuf) < 0)
|
|
|
|
cp = ".rhosts lstat failed";
|
|
|
|
else if (!S_ISREG(sbuf.st_mode))
|
|
|
|
cp = ".rhosts not regular file";
|
2001-01-24 13:01:12 +00:00
|
|
|
else if (_fstat(fileno(hostf), &sbuf) < 0)
|
1994-05-27 05:00:24 +00:00
|
|
|
cp = ".rhosts fstat failed";
|
|
|
|
else if (sbuf.st_uid && sbuf.st_uid != pwd->pw_uid)
|
|
|
|
cp = "bad .rhosts owner";
|
|
|
|
else if (sbuf.st_mode & (S_IWGRP|S_IWOTH))
|
|
|
|
cp = ".rhosts writeable by other than owner";
|
|
|
|
/* If there were any problems, quit. */
|
|
|
|
if (cp) {
|
|
|
|
__rcmd_errstr = cp;
|
|
|
|
(void)fclose(hostf);
|
|
|
|
return (-1);
|
|
|
|
}
|
|
|
|
goto again;
|
|
|
|
}
|
|
|
|
return (-1);
|
|
|
|
}
|
|
|
|
|
2000-02-01 15:55:56 +00:00
|
|
|
/*
|
2000-12-04 18:02:12 +00:00
|
|
|
* XXX
|
|
|
|
* Don't make static, used by lpd(8).
|
2000-02-01 15:55:56 +00:00
|
|
|
*
|
|
|
|
* Returns 0 if ok, -1 if not ok.
|
|
|
|
*/
|
|
|
|
int
|
2000-12-04 18:02:12 +00:00
|
|
|
__ivaliduser(hostf, raddr, luser, ruser)
|
|
|
|
FILE *hostf;
|
|
|
|
u_int32_t raddr;
|
|
|
|
const char *luser, *ruser;
|
|
|
|
{
|
|
|
|
struct sockaddr_in sin;
|
|
|
|
|
|
|
|
memset(&sin, 0, sizeof(sin));
|
|
|
|
sin.sin_family = AF_INET;
|
|
|
|
sin.sin_len = sizeof(struct sockaddr_in);
|
|
|
|
memcpy(&sin.sin_addr, &raddr, sizeof(sin.sin_addr));
|
|
|
|
return __ivaliduser_sa(hostf, (struct sockaddr *)&sin, sin.sin_len,
|
|
|
|
luser, ruser);
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Returns 0 if ok, -1 if not ok.
|
|
|
|
*
|
|
|
|
* XXX obsolete API.
|
|
|
|
*/
|
|
|
|
int
|
|
|
|
__ivaliduser_af(hostf, raddr, luser, ruser, af, len)
|
|
|
|
FILE *hostf;
|
|
|
|
const void *raddr;
|
|
|
|
const char *luser, *ruser;
|
|
|
|
int af, len;
|
2000-02-01 15:55:56 +00:00
|
|
|
{
|
2000-12-04 18:02:12 +00:00
|
|
|
struct sockaddr *sa = NULL;
|
|
|
|
struct sockaddr_in *sin = NULL;
|
|
|
|
#ifdef INET6
|
|
|
|
struct sockaddr_in6 *sin6 = NULL;
|
|
|
|
#endif
|
|
|
|
struct sockaddr_storage ss;
|
2000-02-01 15:55:56 +00:00
|
|
|
|
2000-12-04 18:02:12 +00:00
|
|
|
memset(&ss, 0, sizeof(ss));
|
|
|
|
switch (af) {
|
2000-02-01 15:55:56 +00:00
|
|
|
case AF_INET:
|
2000-12-04 18:02:12 +00:00
|
|
|
if (len != sizeof(sin->sin_addr))
|
|
|
|
return -1;
|
|
|
|
sin = (struct sockaddr_in *)&ss;
|
|
|
|
sin->sin_family = AF_INET;
|
|
|
|
sin->sin_len = sizeof(struct sockaddr_in);
|
|
|
|
memcpy(&sin->sin_addr, raddr, sizeof(sin->sin_addr));
|
2000-02-01 15:55:56 +00:00
|
|
|
break;
|
|
|
|
#ifdef INET6
|
|
|
|
case AF_INET6:
|
2000-12-04 18:02:12 +00:00
|
|
|
if (len != sizeof(sin6->sin6_addr))
|
|
|
|
return -1;
|
|
|
|
/* you will lose scope info */
|
|
|
|
sin6 = (struct sockaddr_in6 *)&ss;
|
|
|
|
sin6->sin6_family = AF_INET6;
|
|
|
|
sin6->sin6_len = sizeof(struct sockaddr_in6);
|
|
|
|
memcpy(&sin6->sin6_addr, raddr, sizeof(sin6->sin6_addr));
|
2000-02-01 15:55:56 +00:00
|
|
|
break;
|
|
|
|
#endif
|
2000-12-04 18:02:12 +00:00
|
|
|
default:
|
|
|
|
return -1;
|
2000-02-01 15:55:56 +00:00
|
|
|
}
|
|
|
|
|
2000-12-04 18:02:12 +00:00
|
|
|
sa = (struct sockaddr *)&ss;
|
|
|
|
return __ivaliduser_sa(hostf, sa, sa->sa_len, luser, ruser);
|
2000-02-01 15:55:56 +00:00
|
|
|
}
|
|
|
|
|
1994-05-27 05:00:24 +00:00
|
|
|
int
|
2000-12-04 18:02:12 +00:00
|
|
|
__ivaliduser_sa(hostf, raddr, salen, luser, ruser)
|
1994-05-27 05:00:24 +00:00
|
|
|
FILE *hostf;
|
2000-12-04 18:02:12 +00:00
|
|
|
const struct sockaddr *raddr;
|
|
|
|
socklen_t salen;
|
1994-05-27 05:00:24 +00:00
|
|
|
const char *luser, *ruser;
|
|
|
|
{
|
2002-03-21 18:49:23 +00:00
|
|
|
char *user, *p;
|
1994-05-27 05:00:24 +00:00
|
|
|
int ch;
|
|
|
|
char buf[MAXHOSTNAMELEN + 128]; /* host + login */
|
1995-08-14 23:52:49 +00:00
|
|
|
char hname[MAXHOSTNAMELEN];
|
At last! Modified __ivaliduser() to do the same kind of user/host validation
that everyone else does: you can now use +host/-host, +user,-user and
+@netgroup/-@netgroup in /etc/hosts.equiv, /.rhosts, /etc/hosts.lpd and
~/.rhosts. Previously, __ivaliduser would only do host/user matches,
which was lame. This affects all the r-commands, lpd, and any other
program/service that uses ruserok().
An example of the usefullness of this feature would be a hosts.equiv
file that looks like this:
+@equiv-hosts
Since the netgroup database can now be accessed via NIS, this lets you
set up client machines once and then never have to worry about them
again: all hosts.equiv changes can now be done through NIS. Once I
finish with getpwent.c, we'll be able to do similar wacky things
with login authentication too. (Our password field substitution
will finally be on par with everyone else's, and I'll finally be
able to fully integrate my FreeBSD machine into my network without
having to worry about the grad students sneaking into it when I'm
not looking. :)
Danger Will Robinson! I tested this thing every which way I could, but
Murphy's Law applies! If anybody spots a potential security problem with
the way my matching algorithm works, tell me immediately! I don't want
crackers snickering and calling me names behind my back. :)
1995-03-20 07:29:55 +00:00
|
|
|
/* Presumed guilty until proven innocent. */
|
|
|
|
int userok = 0, hostok = 0;
|
1995-08-07 03:42:14 +00:00
|
|
|
#ifdef YP
|
|
|
|
char *ypdomain;
|
At last! Modified __ivaliduser() to do the same kind of user/host validation
that everyone else does: you can now use +host/-host, +user,-user and
+@netgroup/-@netgroup in /etc/hosts.equiv, /.rhosts, /etc/hosts.lpd and
~/.rhosts. Previously, __ivaliduser would only do host/user matches,
which was lame. This affects all the r-commands, lpd, and any other
program/service that uses ruserok().
An example of the usefullness of this feature would be a hosts.equiv
file that looks like this:
+@equiv-hosts
Since the netgroup database can now be accessed via NIS, this lets you
set up client machines once and then never have to worry about them
again: all hosts.equiv changes can now be done through NIS. Once I
finish with getpwent.c, we'll be able to do similar wacky things
with login authentication too. (Our password field substitution
will finally be on par with everyone else's, and I'll finally be
able to fully integrate my FreeBSD machine into my network without
having to worry about the grad students sneaking into it when I'm
not looking. :)
Danger Will Robinson! I tested this thing every which way I could, but
Murphy's Law applies! If anybody spots a potential security problem with
the way my matching algorithm works, tell me immediately! I don't want
crackers snickering and calling me names behind my back. :)
1995-03-20 07:29:55 +00:00
|
|
|
|
1995-08-07 03:42:14 +00:00
|
|
|
if (yp_get_default_domain(&ypdomain))
|
|
|
|
ypdomain = NULL;
|
|
|
|
#else
|
|
|
|
#define ypdomain NULL
|
|
|
|
#endif
|
At last! Modified __ivaliduser() to do the same kind of user/host validation
that everyone else does: you can now use +host/-host, +user,-user and
+@netgroup/-@netgroup in /etc/hosts.equiv, /.rhosts, /etc/hosts.lpd and
~/.rhosts. Previously, __ivaliduser would only do host/user matches,
which was lame. This affects all the r-commands, lpd, and any other
program/service that uses ruserok().
An example of the usefullness of this feature would be a hosts.equiv
file that looks like this:
+@equiv-hosts
Since the netgroup database can now be accessed via NIS, this lets you
set up client machines once and then never have to worry about them
again: all hosts.equiv changes can now be done through NIS. Once I
finish with getpwent.c, we'll be able to do similar wacky things
with login authentication too. (Our password field substitution
will finally be on par with everyone else's, and I'll finally be
able to fully integrate my FreeBSD machine into my network without
having to worry about the grad students sneaking into it when I'm
not looking. :)
Danger Will Robinson! I tested this thing every which way I could, but
Murphy's Law applies! If anybody spots a potential security problem with
the way my matching algorithm works, tell me immediately! I don't want
crackers snickering and calling me names behind my back. :)
1995-03-20 07:29:55 +00:00
|
|
|
/* We need to get the damn hostname back for netgroup matching. */
|
2000-12-04 18:02:12 +00:00
|
|
|
if (getnameinfo(raddr, salen, hname, sizeof(hname), NULL, 0,
|
|
|
|
NI_NAMEREQD) != 0)
|
2002-08-24 17:37:42 +00:00
|
|
|
hname[0] = '\0';
|
1994-05-27 05:00:24 +00:00
|
|
|
|
|
|
|
while (fgets(buf, sizeof(buf), hostf)) {
|
|
|
|
p = buf;
|
|
|
|
/* Skip lines that are too long. */
|
2000-03-16 23:53:41 +00:00
|
|
|
if (strchr(p, '\n') == NULL) {
|
1994-05-27 05:00:24 +00:00
|
|
|
while ((ch = getc(hostf)) != '\n' && ch != EOF);
|
|
|
|
continue;
|
|
|
|
}
|
1995-07-16 17:03:58 +00:00
|
|
|
if (*p == '\n' || *p == '#') {
|
|
|
|
/* comment... */
|
|
|
|
continue;
|
|
|
|
}
|
1994-05-27 05:00:24 +00:00
|
|
|
while (*p != '\n' && *p != ' ' && *p != '\t' && *p != '\0') {
|
1999-11-04 04:35:33 +00:00
|
|
|
*p = isupper((unsigned char)*p) ? tolower((unsigned char)*p) : *p;
|
1994-05-27 05:00:24 +00:00
|
|
|
p++;
|
|
|
|
}
|
|
|
|
if (*p == ' ' || *p == '\t') {
|
|
|
|
*p++ = '\0';
|
|
|
|
while (*p == ' ' || *p == '\t')
|
|
|
|
p++;
|
|
|
|
user = p;
|
|
|
|
while (*p != '\n' && *p != ' ' &&
|
|
|
|
*p != '\t' && *p != '\0')
|
|
|
|
p++;
|
|
|
|
} else
|
|
|
|
user = p;
|
|
|
|
*p = '\0';
|
At last! Modified __ivaliduser() to do the same kind of user/host validation
that everyone else does: you can now use +host/-host, +user,-user and
+@netgroup/-@netgroup in /etc/hosts.equiv, /.rhosts, /etc/hosts.lpd and
~/.rhosts. Previously, __ivaliduser would only do host/user matches,
which was lame. This affects all the r-commands, lpd, and any other
program/service that uses ruserok().
An example of the usefullness of this feature would be a hosts.equiv
file that looks like this:
+@equiv-hosts
Since the netgroup database can now be accessed via NIS, this lets you
set up client machines once and then never have to worry about them
again: all hosts.equiv changes can now be done through NIS. Once I
finish with getpwent.c, we'll be able to do similar wacky things
with login authentication too. (Our password field substitution
will finally be on par with everyone else's, and I'll finally be
able to fully integrate my FreeBSD machine into my network without
having to worry about the grad students sneaking into it when I'm
not looking. :)
Danger Will Robinson! I tested this thing every which way I could, but
Murphy's Law applies! If anybody spots a potential security problem with
the way my matching algorithm works, tell me immediately! I don't want
crackers snickering and calling me names behind my back. :)
1995-03-20 07:29:55 +00:00
|
|
|
/*
|
|
|
|
* Do +/- and +@/-@ checking. This looks really nasty,
|
|
|
|
* but it matches SunOS's behavior so far as I can tell.
|
|
|
|
*/
|
|
|
|
switch(buf[0]) {
|
|
|
|
case '+':
|
|
|
|
if (!buf[1]) { /* '+' matches all hosts */
|
|
|
|
hostok = 1;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
if (buf[1] == '@') /* match a host by netgroup */
|
2002-08-24 17:37:42 +00:00
|
|
|
hostok = hname[0] != '\0' &&
|
|
|
|
innetgr(&buf[2], hname, NULL, ypdomain);
|
At last! Modified __ivaliduser() to do the same kind of user/host validation
that everyone else does: you can now use +host/-host, +user,-user and
+@netgroup/-@netgroup in /etc/hosts.equiv, /.rhosts, /etc/hosts.lpd and
~/.rhosts. Previously, __ivaliduser would only do host/user matches,
which was lame. This affects all the r-commands, lpd, and any other
program/service that uses ruserok().
An example of the usefullness of this feature would be a hosts.equiv
file that looks like this:
+@equiv-hosts
Since the netgroup database can now be accessed via NIS, this lets you
set up client machines once and then never have to worry about them
again: all hosts.equiv changes can now be done through NIS. Once I
finish with getpwent.c, we'll be able to do similar wacky things
with login authentication too. (Our password field substitution
will finally be on par with everyone else's, and I'll finally be
able to fully integrate my FreeBSD machine into my network without
having to worry about the grad students sneaking into it when I'm
not looking. :)
Danger Will Robinson! I tested this thing every which way I could, but
Murphy's Law applies! If anybody spots a potential security problem with
the way my matching algorithm works, tell me immediately! I don't want
crackers snickering and calling me names behind my back. :)
1995-03-20 07:29:55 +00:00
|
|
|
else /* match a host by addr */
|
2000-12-04 18:02:12 +00:00
|
|
|
hostok = __icheckhost(raddr, salen,
|
|
|
|
(char *)&buf[1]);
|
At last! Modified __ivaliduser() to do the same kind of user/host validation
that everyone else does: you can now use +host/-host, +user,-user and
+@netgroup/-@netgroup in /etc/hosts.equiv, /.rhosts, /etc/hosts.lpd and
~/.rhosts. Previously, __ivaliduser would only do host/user matches,
which was lame. This affects all the r-commands, lpd, and any other
program/service that uses ruserok().
An example of the usefullness of this feature would be a hosts.equiv
file that looks like this:
+@equiv-hosts
Since the netgroup database can now be accessed via NIS, this lets you
set up client machines once and then never have to worry about them
again: all hosts.equiv changes can now be done through NIS. Once I
finish with getpwent.c, we'll be able to do similar wacky things
with login authentication too. (Our password field substitution
will finally be on par with everyone else's, and I'll finally be
able to fully integrate my FreeBSD machine into my network without
having to worry about the grad students sneaking into it when I'm
not looking. :)
Danger Will Robinson! I tested this thing every which way I could, but
Murphy's Law applies! If anybody spots a potential security problem with
the way my matching algorithm works, tell me immediately! I don't want
crackers snickering and calling me names behind my back. :)
1995-03-20 07:29:55 +00:00
|
|
|
break;
|
|
|
|
case '-': /* reject '-' hosts and all their users */
|
|
|
|
if (buf[1] == '@') {
|
2002-08-24 17:37:42 +00:00
|
|
|
if (hname[0] == '\0' ||
|
|
|
|
innetgr(&buf[2], hname, NULL, ypdomain))
|
At last! Modified __ivaliduser() to do the same kind of user/host validation
that everyone else does: you can now use +host/-host, +user,-user and
+@netgroup/-@netgroup in /etc/hosts.equiv, /.rhosts, /etc/hosts.lpd and
~/.rhosts. Previously, __ivaliduser would only do host/user matches,
which was lame. This affects all the r-commands, lpd, and any other
program/service that uses ruserok().
An example of the usefullness of this feature would be a hosts.equiv
file that looks like this:
+@equiv-hosts
Since the netgroup database can now be accessed via NIS, this lets you
set up client machines once and then never have to worry about them
again: all hosts.equiv changes can now be done through NIS. Once I
finish with getpwent.c, we'll be able to do similar wacky things
with login authentication too. (Our password field substitution
will finally be on par with everyone else's, and I'll finally be
able to fully integrate my FreeBSD machine into my network without
having to worry about the grad students sneaking into it when I'm
not looking. :)
Danger Will Robinson! I tested this thing every which way I could, but
Murphy's Law applies! If anybody spots a potential security problem with
the way my matching algorithm works, tell me immediately! I don't want
crackers snickering and calling me names behind my back. :)
1995-03-20 07:29:55 +00:00
|
|
|
return(-1);
|
|
|
|
} else {
|
2000-12-04 18:02:12 +00:00
|
|
|
if (__icheckhost(raddr, salen,
|
|
|
|
(char *)&buf[1]))
|
At last! Modified __ivaliduser() to do the same kind of user/host validation
that everyone else does: you can now use +host/-host, +user,-user and
+@netgroup/-@netgroup in /etc/hosts.equiv, /.rhosts, /etc/hosts.lpd and
~/.rhosts. Previously, __ivaliduser would only do host/user matches,
which was lame. This affects all the r-commands, lpd, and any other
program/service that uses ruserok().
An example of the usefullness of this feature would be a hosts.equiv
file that looks like this:
+@equiv-hosts
Since the netgroup database can now be accessed via NIS, this lets you
set up client machines once and then never have to worry about them
again: all hosts.equiv changes can now be done through NIS. Once I
finish with getpwent.c, we'll be able to do similar wacky things
with login authentication too. (Our password field substitution
will finally be on par with everyone else's, and I'll finally be
able to fully integrate my FreeBSD machine into my network without
having to worry about the grad students sneaking into it when I'm
not looking. :)
Danger Will Robinson! I tested this thing every which way I could, but
Murphy's Law applies! If anybody spots a potential security problem with
the way my matching algorithm works, tell me immediately! I don't want
crackers snickering and calling me names behind my back. :)
1995-03-20 07:29:55 +00:00
|
|
|
return(-1);
|
|
|
|
}
|
|
|
|
break;
|
|
|
|
default: /* if no '+' or '-', do a simple match */
|
2000-12-04 18:02:12 +00:00
|
|
|
hostok = __icheckhost(raddr, salen, buf);
|
At last! Modified __ivaliduser() to do the same kind of user/host validation
that everyone else does: you can now use +host/-host, +user,-user and
+@netgroup/-@netgroup in /etc/hosts.equiv, /.rhosts, /etc/hosts.lpd and
~/.rhosts. Previously, __ivaliduser would only do host/user matches,
which was lame. This affects all the r-commands, lpd, and any other
program/service that uses ruserok().
An example of the usefullness of this feature would be a hosts.equiv
file that looks like this:
+@equiv-hosts
Since the netgroup database can now be accessed via NIS, this lets you
set up client machines once and then never have to worry about them
again: all hosts.equiv changes can now be done through NIS. Once I
finish with getpwent.c, we'll be able to do similar wacky things
with login authentication too. (Our password field substitution
will finally be on par with everyone else's, and I'll finally be
able to fully integrate my FreeBSD machine into my network without
having to worry about the grad students sneaking into it when I'm
not looking. :)
Danger Will Robinson! I tested this thing every which way I could, but
Murphy's Law applies! If anybody spots a potential security problem with
the way my matching algorithm works, tell me immediately! I don't want
crackers snickering and calling me names behind my back. :)
1995-03-20 07:29:55 +00:00
|
|
|
break;
|
|
|
|
}
|
|
|
|
switch(*user) {
|
|
|
|
case '+':
|
|
|
|
if (!*(user+1)) { /* '+' matches all users */
|
|
|
|
userok = 1;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
if (*(user+1) == '@') /* match a user by netgroup */
|
1995-08-07 03:42:14 +00:00
|
|
|
userok = innetgr(user+2, NULL, ruser, ypdomain);
|
At last! Modified __ivaliduser() to do the same kind of user/host validation
that everyone else does: you can now use +host/-host, +user,-user and
+@netgroup/-@netgroup in /etc/hosts.equiv, /.rhosts, /etc/hosts.lpd and
~/.rhosts. Previously, __ivaliduser would only do host/user matches,
which was lame. This affects all the r-commands, lpd, and any other
program/service that uses ruserok().
An example of the usefullness of this feature would be a hosts.equiv
file that looks like this:
+@equiv-hosts
Since the netgroup database can now be accessed via NIS, this lets you
set up client machines once and then never have to worry about them
again: all hosts.equiv changes can now be done through NIS. Once I
finish with getpwent.c, we'll be able to do similar wacky things
with login authentication too. (Our password field substitution
will finally be on par with everyone else's, and I'll finally be
able to fully integrate my FreeBSD machine into my network without
having to worry about the grad students sneaking into it when I'm
not looking. :)
Danger Will Robinson! I tested this thing every which way I could, but
Murphy's Law applies! If anybody spots a potential security problem with
the way my matching algorithm works, tell me immediately! I don't want
crackers snickering and calling me names behind my back. :)
1995-03-20 07:29:55 +00:00
|
|
|
else /* match a user by direct specification */
|
|
|
|
userok = !(strcmp(ruser, user+1));
|
|
|
|
break;
|
|
|
|
case '-': /* if we matched a hostname, */
|
|
|
|
if (hostok) { /* check for user field rejections */
|
|
|
|
if (!*(user+1))
|
|
|
|
return(-1);
|
|
|
|
if (*(user+1) == '@') {
|
|
|
|
if (innetgr(user+2, NULL,
|
1995-08-07 03:42:14 +00:00
|
|
|
ruser, ypdomain))
|
At last! Modified __ivaliduser() to do the same kind of user/host validation
that everyone else does: you can now use +host/-host, +user,-user and
+@netgroup/-@netgroup in /etc/hosts.equiv, /.rhosts, /etc/hosts.lpd and
~/.rhosts. Previously, __ivaliduser would only do host/user matches,
which was lame. This affects all the r-commands, lpd, and any other
program/service that uses ruserok().
An example of the usefullness of this feature would be a hosts.equiv
file that looks like this:
+@equiv-hosts
Since the netgroup database can now be accessed via NIS, this lets you
set up client machines once and then never have to worry about them
again: all hosts.equiv changes can now be done through NIS. Once I
finish with getpwent.c, we'll be able to do similar wacky things
with login authentication too. (Our password field substitution
will finally be on par with everyone else's, and I'll finally be
able to fully integrate my FreeBSD machine into my network without
having to worry about the grad students sneaking into it when I'm
not looking. :)
Danger Will Robinson! I tested this thing every which way I could, but
Murphy's Law applies! If anybody spots a potential security problem with
the way my matching algorithm works, tell me immediately! I don't want
crackers snickering and calling me names behind my back. :)
1995-03-20 07:29:55 +00:00
|
|
|
return(-1);
|
|
|
|
} else {
|
|
|
|
if (!strcmp(ruser, user+1))
|
|
|
|
return(-1);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
break;
|
|
|
|
default: /* no rejections: try to match the user */
|
|
|
|
if (hostok)
|
|
|
|
userok = !(strcmp(ruser,*user ? user : luser));
|
|
|
|
break;
|
1994-05-27 05:00:24 +00:00
|
|
|
}
|
At last! Modified __ivaliduser() to do the same kind of user/host validation
that everyone else does: you can now use +host/-host, +user,-user and
+@netgroup/-@netgroup in /etc/hosts.equiv, /.rhosts, /etc/hosts.lpd and
~/.rhosts. Previously, __ivaliduser would only do host/user matches,
which was lame. This affects all the r-commands, lpd, and any other
program/service that uses ruserok().
An example of the usefullness of this feature would be a hosts.equiv
file that looks like this:
+@equiv-hosts
Since the netgroup database can now be accessed via NIS, this lets you
set up client machines once and then never have to worry about them
again: all hosts.equiv changes can now be done through NIS. Once I
finish with getpwent.c, we'll be able to do similar wacky things
with login authentication too. (Our password field substitution
will finally be on par with everyone else's, and I'll finally be
able to fully integrate my FreeBSD machine into my network without
having to worry about the grad students sneaking into it when I'm
not looking. :)
Danger Will Robinson! I tested this thing every which way I could, but
Murphy's Law applies! If anybody spots a potential security problem with
the way my matching algorithm works, tell me immediately! I don't want
crackers snickering and calling me names behind my back. :)
1995-03-20 07:29:55 +00:00
|
|
|
if (hostok && userok)
|
|
|
|
return(0);
|
1994-05-27 05:00:24 +00:00
|
|
|
}
|
|
|
|
return (-1);
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Returns "true" if match, 0 if no match.
|
|
|
|
*/
|
|
|
|
static int
|
2000-12-04 18:02:12 +00:00
|
|
|
__icheckhost(raddr, salen, lhost)
|
|
|
|
const struct sockaddr *raddr;
|
|
|
|
socklen_t salen;
|
|
|
|
const char *lhost;
|
1994-05-27 05:00:24 +00:00
|
|
|
{
|
2000-12-04 18:02:12 +00:00
|
|
|
struct sockaddr_in sin;
|
|
|
|
struct sockaddr_in6 *sin6;
|
|
|
|
struct addrinfo hints, *res, *r;
|
|
|
|
int error;
|
|
|
|
char h1[NI_MAXHOST], h2[NI_MAXHOST];
|
|
|
|
|
|
|
|
if (raddr->sa_family == AF_INET6) {
|
|
|
|
sin6 = (struct sockaddr_in6 *)raddr;
|
|
|
|
if (IN6_IS_ADDR_V4MAPPED(&sin6->sin6_addr)) {
|
|
|
|
memset(&sin, 0, sizeof(sin));
|
|
|
|
sin.sin_family = AF_INET;
|
|
|
|
sin.sin_len = sizeof(struct sockaddr_in);
|
|
|
|
memcpy(&sin.sin_addr, &sin6->sin6_addr.s6_addr[12],
|
|
|
|
sizeof(sin.sin_addr));
|
|
|
|
raddr = (struct sockaddr *)&sin;
|
|
|
|
salen = sin.sin_len;
|
|
|
|
}
|
2000-01-13 15:09:48 +00:00
|
|
|
}
|
1994-05-27 05:00:24 +00:00
|
|
|
|
2000-12-04 18:02:12 +00:00
|
|
|
h1[0] = '\0';
|
|
|
|
if (getnameinfo(raddr, salen, h1, sizeof(h1), NULL, 0,
|
2005-05-13 16:31:11 +00:00
|
|
|
NI_NUMERICHOST) != 0)
|
1994-05-27 05:00:24 +00:00
|
|
|
return (0);
|
|
|
|
|
2000-12-04 18:02:12 +00:00
|
|
|
/* Resolve laddr into sockaddr */
|
|
|
|
memset(&hints, 0, sizeof(hints));
|
|
|
|
hints.ai_family = raddr->sa_family;
|
|
|
|
hints.ai_socktype = SOCK_DGRAM; /*XXX dummy*/
|
|
|
|
res = NULL;
|
|
|
|
error = getaddrinfo(lhost, "0", &hints, &res);
|
|
|
|
if (error)
|
|
|
|
return (0);
|
|
|
|
|
|
|
|
for (r = res; r ; r = r->ai_next) {
|
|
|
|
h2[0] = '\0';
|
|
|
|
if (getnameinfo(r->ai_addr, r->ai_addrlen, h2, sizeof(h2),
|
2005-05-13 16:31:11 +00:00
|
|
|
NULL, 0, NI_NUMERICHOST) != 0)
|
2000-12-04 18:02:12 +00:00
|
|
|
continue;
|
|
|
|
if (strcmp(h1, h2) == 0) {
|
|
|
|
freeaddrinfo(res);
|
|
|
|
return (1);
|
2000-01-13 15:09:48 +00:00
|
|
|
}
|
2000-12-04 18:02:12 +00:00
|
|
|
}
|
1994-05-27 05:00:24 +00:00
|
|
|
|
2000-12-04 18:02:12 +00:00
|
|
|
/* No match. */
|
|
|
|
freeaddrinfo(res);
|
|
|
|
return (0);
|
1994-05-27 05:00:24 +00:00
|
|
|
}
|