Revive some things that were lost during the ppp-2.3.1 update.

- (see auth.c rev 1.13) allow the pap/chap secrets file to specify an
override for the otherwise hard coded IP addresses.  This allows specific
users to dial in on a rotary which would otherwise get a dynamic address
forced to authenticate and get their own fixed addresses.
- (see options.c rev 1.9) recognize the old dns1 and dns2 options.  This
is a hack (TM). :-)
This commit is contained in:
Peter Wemm 1997-10-10 06:02:57 +00:00
parent 44f203cb96
commit 8298b5a8af
3 changed files with 57 additions and 6 deletions

View File

@ -33,7 +33,7 @@
*/ */
#ifndef lint #ifndef lint
static char rcsid[] = "$Id: auth.c,v 1.17 1997/08/19 17:52:31 peter Exp $"; static char rcsid[] = "$Id: auth.c,v 1.18 1997/08/22 12:03:52 peter Exp $";
#endif #endif
#include <stdio.h> #include <stdio.h>
@ -103,6 +103,9 @@ static int auth_pending[NUM_PPP];
/* Set if we have successfully called login() */ /* Set if we have successfully called login() */
static int logged_in; static int logged_in;
/* Set if not wild or blank */
static int non_wildclient;
/* Set if we have run the /etc/ppp/auth-up script. */ /* Set if we have run the /etc/ppp/auth-up script. */
static int did_authup; static int did_authup;
@ -141,6 +144,7 @@ static int ip_addr_check __P((u_int32_t, struct wordlist *));
static int scan_authfile __P((FILE *, char *, char *, u_int32_t, char *, static int scan_authfile __P((FILE *, char *, char *, u_int32_t, char *,
struct wordlist **, char *)); struct wordlist **, char *));
static void free_wordlist __P((struct wordlist *)); static void free_wordlist __P((struct wordlist *));
static void auth_set_ip_addr __P((int));
static void auth_script __P((char *)); static void auth_script __P((char *));
static void set_allowed_addrs __P((int, struct wordlist *)); static void set_allowed_addrs __P((int, struct wordlist *));
#ifdef CBCP_SUPPORT #ifdef CBCP_SUPPORT
@ -363,6 +367,12 @@ auth_peer_success(unit, protocol, name, namelen)
BCOPY(name, peer_authname, namelen); BCOPY(name, peer_authname, namelen);
peer_authname[namelen] = 0; peer_authname[namelen] = 0;
/*
* If we have overridden addresses based on auth info
* then set that information now before continuing.
*/
auth_set_ip_addr(unit);
/* /*
* If there is no more authentication still to be done, * If there is no more authentication still to be done,
* proceed to the network (or callback) phase. * proceed to the network (or callback) phase.
@ -411,6 +421,12 @@ auth_withpeer_success(unit, protocol)
bit = 0; bit = 0;
} }
/*
* If we have overridden addresses based on auth info
* then set that information now before continuing.
*/
auth_set_ip_addr(unit);
/* /*
* If there is no more authentication still being done, * If there is no more authentication still being done,
* proceed to the network (or callback) phase. * proceed to the network (or callback) phase.
@ -1150,6 +1166,23 @@ set_allowed_addrs(unit, addrs)
} }
} }
static void
auth_set_ip_addr(unit)
int unit;
{
struct wordlist *addrs;
if (non_wildclient && (addrs = addresses[unit]) != NULL) {
for (; addrs != NULL; addrs = addrs->next) {
/* Look for address overrides, and set them if we have any */
if (strchr(addrs->word, ':') != NULL) {
if (setipaddr(addrs->word))
break;
}
}
}
}
/* /*
* auth_ip_addr - check whether the peer is authorized to use * auth_ip_addr - check whether the peer is authorized to use
* a given IP address. Returns 1 if authorized, 0 otherwise. * a given IP address. Returns 1 if authorized, 0 otherwise.
@ -1167,6 +1200,7 @@ ip_addr_check(addr, addrs)
u_int32_t addr; u_int32_t addr;
struct wordlist *addrs; struct wordlist *addrs;
{ {
int x, y;
u_int32_t a, mask, ah; u_int32_t a, mask, ah;
int accept; int accept;
char *ptr_word, *ptr_mask; char *ptr_word, *ptr_mask;
@ -1180,7 +1214,9 @@ ip_addr_check(addr, addrs)
if (addrs == NULL) if (addrs == NULL)
return !auth_required; /* no addresses authorized */ return !auth_required; /* no addresses authorized */
x = y = 0;
for (; addrs != NULL; addrs = addrs->next) { for (; addrs != NULL; addrs = addrs->next) {
y++;
/* "-" means no addresses authorized, "*" means any address allowed */ /* "-" means no addresses authorized, "*" means any address allowed */
ptr_word = addrs->word; ptr_word = addrs->word;
if (strcmp(ptr_word, "-") == 0) if (strcmp(ptr_word, "-") == 0)
@ -1188,6 +1224,14 @@ ip_addr_check(addr, addrs)
if (strcmp(ptr_word, "*") == 0) if (strcmp(ptr_word, "*") == 0)
return 1; return 1;
/*
* A colon in the string means that we wish to force a specific
* local:remote address, but we ignore these for now.
*/
if (strchr(addrs->word, ':') != NULL)
x++;
else {
accept = 1; accept = 1;
if (*ptr_word == '!') { if (*ptr_word == '!') {
accept = 0; accept = 0;
@ -1244,8 +1288,9 @@ ip_addr_check(addr, addrs)
and mask is in host order. */ and mask is in host order. */
if (((addr ^ a) & htonl(mask)) == 0) if (((addr ^ a) & htonl(mask)) == 0)
return accept; return accept;
} /* else */
} }
return 0; /* not in list => can't have it */ return x == y; /* not in list => can't have it */
} }
/* /*
@ -1430,6 +1475,7 @@ scan_authfile(f, client, server, ipaddr, secret, addrs, filename)
else if (addr_list != NULL) else if (addr_list != NULL)
free_wordlist(addr_list); free_wordlist(addr_list);
non_wildclient = (best_flag & NONWILD_CLIENT) && *client != '\0';
return best_flag; return best_flag;
} }

View File

@ -18,7 +18,7 @@
*/ */
#ifndef lint #ifndef lint
static char rcsid[] = "$Id$"; static char rcsid[] = "$Id: options.c,v 1.14 1997/08/22 15:50:09 peter Exp $";
#endif #endif
#include <ctype.h> #include <ctype.h>
@ -133,7 +133,6 @@ pcap_t pc; /* Fake struct pcap so we can compile expr */
* Prototypes * Prototypes
*/ */
static int setdevname __P((char *, int)); static int setdevname __P((char *, int));
static int setipaddr __P((char *));
static int setspeed __P((char *)); static int setspeed __P((char *));
static int setdebug __P((char **)); static int setdebug __P((char **));
static int setkdebug __P((char **)); static int setkdebug __P((char **));
@ -375,6 +374,10 @@ static struct cmd {
{"papcrypt", 0, setpapcrypt}, /* PAP passwords encrypted */ {"papcrypt", 0, setpapcrypt}, /* PAP passwords encrypted */
{"idle", 1, setidle}, /* idle time limit (seconds) */ {"idle", 1, setidle}, /* idle time limit (seconds) */
{"holdoff", 1, setholdoff}, /* set holdoff time (seconds) */ {"holdoff", 1, setholdoff}, /* set holdoff time (seconds) */
/* backwards compat hack */
{"dns1", 1, setdnsaddr}, /* DNS address for the peer's use */
{"dns2", 1, setdnsaddr}, /* DNS address for the peer's use */
/* end compat hack */
{"ms-dns", 1, setdnsaddr}, /* DNS address for the peer's use */ {"ms-dns", 1, setdnsaddr}, /* DNS address for the peer's use */
{"ms-wins", 1, setwinsaddr}, /* Nameserver for SMB over TCP/IP for peer */ {"ms-wins", 1, setwinsaddr}, /* Nameserver for SMB over TCP/IP for peer */
{"noipx", 0, resetipxproto}, /* Disable IPXCP (and IPX) */ {"noipx", 0, resetipxproto}, /* Disable IPXCP (and IPX) */
@ -1684,7 +1687,7 @@ setdevname(cp, quiet)
/* /*
* setipaddr - Set the IP address * setipaddr - Set the IP address
*/ */
static int int
setipaddr(arg) setipaddr(arg)
char *arg; char *arg;
{ {

View File

@ -16,7 +16,7 @@
* IMPLIED WARRANTIES, INCLUDING, WITHOUT LIMITATION, THE IMPLIED * IMPLIED WARRANTIES, INCLUDING, WITHOUT LIMITATION, THE IMPLIED
* WARRANTIES OF MERCHANTIBILITY AND FITNESS FOR A PARTICULAR PURPOSE. * WARRANTIES OF MERCHANTIBILITY AND FITNESS FOR A PARTICULAR PURPOSE.
* *
* $Id$ * $Id: pppd.h,v 1.9 1997/08/19 17:52:46 peter Exp $
*/ */
/* /*
@ -313,6 +313,8 @@ int getword __P((FILE *f, char *word, int *newlinep, char *filename));
/* Read a word from a file */ /* Read a word from a file */
void option_error __P((char *fmt, ...)); void option_error __P((char *fmt, ...));
/* Print an error message about an option */ /* Print an error message about an option */
int setipaddr __P((char *)); /* set IP addresses */
/* /*
* This structure is used to store information about certain * This structure is used to store information about certain