1994-05-26 05:23:31 +00:00
|
|
|
/*
|
|
|
|
* Copyright (c) 1983, 1991, 1993, 1994
|
|
|
|
* The Regents of the University of California. All rights reserved.
|
|
|
|
*
|
|
|
|
* Redistribution and use in source and binary forms, with or without
|
|
|
|
* modification, are permitted provided that the following conditions
|
|
|
|
* are met:
|
|
|
|
* 1. Redistributions of source code must retain the above copyright
|
|
|
|
* notice, this list of conditions and the following disclaimer.
|
|
|
|
* 2. Redistributions in binary form must reproduce the above copyright
|
|
|
|
* notice, this list of conditions and the following disclaimer in the
|
|
|
|
* documentation and/or other materials provided with the distribution.
|
|
|
|
* 3. All advertising materials mentioning features or use of this software
|
|
|
|
* must display the following acknowledgement:
|
|
|
|
* This product includes software developed by the University of
|
|
|
|
* California, Berkeley and its contributors.
|
|
|
|
* 4. Neither the name of the University nor the names of its contributors
|
|
|
|
* may be used to endorse or promote products derived from this software
|
|
|
|
* without specific prior written permission.
|
|
|
|
*
|
|
|
|
* THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
|
|
|
|
* ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
|
|
|
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
|
|
|
* ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
|
|
|
|
* FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
|
|
|
|
* DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
|
|
|
|
* OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
|
|
|
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
|
|
|
|
* LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
|
|
|
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
|
|
|
* SUCH DAMAGE.
|
|
|
|
*/
|
|
|
|
|
|
|
|
#ifndef lint
|
1997-09-19 06:27:30 +00:00
|
|
|
static const char copyright[] =
|
1994-05-26 05:23:31 +00:00
|
|
|
"@(#) Copyright (c) 1983, 1991, 1993, 1994\n\
|
|
|
|
The Regents of the University of California. All rights reserved.\n";
|
|
|
|
#endif /* not lint */
|
|
|
|
|
|
|
|
#ifndef lint
|
1997-09-19 06:27:30 +00:00
|
|
|
#if 0
|
|
|
|
static char sccsid[] = "@(#)from: inetd.c 8.4 (Berkeley) 4/13/94";
|
|
|
|
#endif
|
|
|
|
static const char rcsid[] =
|
1999-07-22 16:29:48 +00:00
|
|
|
"$Id: inetd.c,v 1.67 1999/07/22 16:10:40 sheldonh Exp $";
|
1994-05-26 05:23:31 +00:00
|
|
|
#endif /* not lint */
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Inetd - Internet super-server
|
|
|
|
*
|
|
|
|
* This program invokes all internet services as needed. Connection-oriented
|
|
|
|
* services are invoked each time a connection is made, by creating a process.
|
|
|
|
* This process is passed the connection as file descriptor 0 and is expected
|
|
|
|
* to do a getpeername to find out the source host and port.
|
|
|
|
*
|
|
|
|
* Datagram oriented services are invoked when a datagram
|
|
|
|
* arrives; a process is created and passed a pending message
|
|
|
|
* on file descriptor 0. Datagram servers may either connect
|
|
|
|
* to their peer, freeing up the original socket for inetd
|
|
|
|
* to receive further messages on, or ``take over the socket'',
|
|
|
|
* processing all arriving datagrams and, eventually, timing
|
|
|
|
* out. The first type of server is said to be ``multi-threaded'';
|
1995-05-30 03:57:47 +00:00
|
|
|
* the second type of server ``single-threaded''.
|
1994-05-26 05:23:31 +00:00
|
|
|
*
|
|
|
|
* Inetd uses a configuration file which is read at startup
|
|
|
|
* and, possibly, at some later time in response to a hangup signal.
|
|
|
|
* The configuration file is ``free format'' with fields given in the
|
|
|
|
* order shown below. Continuation lines for an entry must being with
|
|
|
|
* a space or tab. All fields must be present in each entry.
|
|
|
|
*
|
|
|
|
* service name must be in /etc/services or must
|
|
|
|
* name a tcpmux service
|
|
|
|
* socket type stream/dgram/raw/rdm/seqpacket
|
|
|
|
* protocol must be in /etc/protocols
|
|
|
|
* wait/nowait single-threaded/multi-threaded
|
|
|
|
* user user to run daemon as
|
|
|
|
* server program full path name
|
|
|
|
* server program arguments maximum of MAXARGS (20)
|
|
|
|
*
|
|
|
|
* TCP services without official port numbers are handled with the
|
|
|
|
* RFC1078-based tcpmux internal service. Tcpmux listens on port 1 for
|
|
|
|
* requests. When a connection is made from a foreign host, the service
|
|
|
|
* requested is passed to tcpmux, which looks it up in the servtab list
|
|
|
|
* and returns the proper entry for the service. Tcpmux returns a
|
|
|
|
* negative reply if the service doesn't exist, otherwise the invoked
|
|
|
|
* server is expected to return the positive reply if the service type in
|
|
|
|
* inetd.conf file has the prefix "tcpmux/". If the service type has the
|
|
|
|
* prefix "tcpmux/+", tcpmux will return the positive reply for the
|
|
|
|
* process; this is for compatibility with older server code, and also
|
|
|
|
* allows you to invoke programs that use stdin/stdout without putting any
|
|
|
|
* special server code in them. Services that use tcpmux are "nowait"
|
|
|
|
* because they do not have a well-known port and hence cannot listen
|
|
|
|
* for new requests.
|
|
|
|
*
|
1994-09-11 10:48:02 +00:00
|
|
|
* For RPC services
|
|
|
|
* service name/version must be in /etc/rpc
|
|
|
|
* socket type stream/dgram/raw/rdm/seqpacket
|
|
|
|
* protocol must be in /etc/protocols
|
|
|
|
* wait/nowait single-threaded/multi-threaded
|
|
|
|
* user user to run daemon as
|
|
|
|
* server program full path name
|
|
|
|
* server program arguments maximum of MAXARGS
|
|
|
|
*
|
1994-05-26 05:23:31 +00:00
|
|
|
* Comment lines are indicated by a `#' in column 1.
|
|
|
|
*/
|
|
|
|
#include <sys/param.h>
|
|
|
|
#include <sys/ioctl.h>
|
|
|
|
#include <sys/wait.h>
|
|
|
|
#include <sys/time.h>
|
|
|
|
#include <sys/resource.h>
|
|
|
|
|
|
|
|
#include <netinet/in.h>
|
1998-05-14 20:26:16 +00:00
|
|
|
#include <netinet/tcp.h>
|
1994-05-26 05:23:31 +00:00
|
|
|
#include <arpa/inet.h>
|
1994-09-11 10:48:02 +00:00
|
|
|
#include <rpc/rpc.h>
|
1996-11-10 21:07:27 +00:00
|
|
|
#include <rpc/pmap_clnt.h>
|
1994-05-26 05:23:31 +00:00
|
|
|
|
|
|
|
#include <errno.h>
|
1997-09-19 06:27:30 +00:00
|
|
|
#include <err.h>
|
1994-05-26 05:23:31 +00:00
|
|
|
#include <fcntl.h>
|
1997-10-28 13:46:52 +00:00
|
|
|
#include <grp.h>
|
1994-05-26 05:23:31 +00:00
|
|
|
#include <netdb.h>
|
|
|
|
#include <pwd.h>
|
|
|
|
#include <signal.h>
|
|
|
|
#include <stdio.h>
|
|
|
|
#include <stdlib.h>
|
|
|
|
#include <string.h>
|
|
|
|
#include <syslog.h>
|
1999-06-27 18:05:34 +00:00
|
|
|
#include <tcpd.h>
|
1994-05-26 05:23:31 +00:00
|
|
|
#include <unistd.h>
|
1996-01-01 08:42:23 +00:00
|
|
|
#include <libutil.h>
|
1996-11-10 21:07:27 +00:00
|
|
|
#include <sysexits.h>
|
1994-05-26 05:23:31 +00:00
|
|
|
|
1999-07-22 14:11:26 +00:00
|
|
|
#include "inetd.h"
|
|
|
|
#include "pathnames.h"
|
|
|
|
|
1999-03-28 10:50:30 +00:00
|
|
|
#ifndef LIBWRAP_ALLOW_FACILITY
|
|
|
|
# define LIBWRAP_ALLOW_FACILITY LOG_AUTH
|
|
|
|
#endif
|
|
|
|
#ifndef LIBWRAP_ALLOW_SEVERITY
|
|
|
|
# define LIBWRAP_ALLOW_SEVERITY LOG_INFO
|
|
|
|
#endif
|
|
|
|
#ifndef LIBWRAP_DENY_FACILITY
|
|
|
|
# define LIBWRAP_DENY_FACILITY LOG_AUTH
|
|
|
|
#endif
|
|
|
|
#ifndef LIBWRAP_DENY_SEVERITY
|
|
|
|
# define LIBWRAP_DENY_SEVERITY LOG_WARNING
|
|
|
|
#endif
|
|
|
|
|
1999-06-30 23:36:39 +00:00
|
|
|
#define ISWRAP(sep) \
|
1999-07-09 11:19:01 +00:00
|
|
|
( ((wrap_ex && !(sep)->se_bi) || (wrap_bi && (sep)->se_bi)) \
|
1999-06-30 23:36:39 +00:00
|
|
|
&& ( ((sep)->se_accept && (sep)->se_socktype == SOCK_STREAM) \
|
|
|
|
|| (sep)->se_socktype == SOCK_DGRAM))
|
|
|
|
|
1997-01-13 02:52:30 +00:00
|
|
|
#ifdef LOGIN_CAP
|
|
|
|
#include <login_cap.h>
|
1997-10-27 22:03:47 +00:00
|
|
|
|
|
|
|
/* see init.c */
|
|
|
|
#define RESOURCE_RC "daemon"
|
|
|
|
|
1997-01-13 02:52:30 +00:00
|
|
|
#endif
|
|
|
|
|
1998-02-24 21:55:14 +00:00
|
|
|
#ifndef MAXCHILD
|
|
|
|
#define MAXCHILD -1 /* maximum number of this service
|
|
|
|
< 0 = no limit */
|
|
|
|
#endif
|
|
|
|
|
|
|
|
#ifndef MAXCPM
|
|
|
|
#define MAXCPM -1 /* rate limit invocations from a
|
|
|
|
single remote address,
|
|
|
|
< 0 = no limit */
|
|
|
|
#endif
|
|
|
|
|
1994-09-11 11:16:32 +00:00
|
|
|
#define TOOMANY 256 /* don't start more than TOOMANY */
|
1994-05-26 05:23:31 +00:00
|
|
|
#define CNT_INTVL 60 /* servers in CNT_INTVL sec. */
|
|
|
|
#define RETRYTIME (60*10) /* retry after bind or server fail */
|
1996-11-10 21:12:44 +00:00
|
|
|
#define MAX_MAXCHLD 32767 /* max allowable max children */
|
1994-05-26 05:23:31 +00:00
|
|
|
|
|
|
|
#define SIGBLOCK (sigmask(SIGCHLD)|sigmask(SIGHUP)|sigmask(SIGALRM))
|
|
|
|
|
1999-06-27 18:05:34 +00:00
|
|
|
int allow_severity;
|
|
|
|
int deny_severity;
|
1999-07-09 11:19:01 +00:00
|
|
|
int wrap_ex = 0;
|
1999-06-27 18:05:34 +00:00
|
|
|
int wrap_bi = 0;
|
1994-05-26 05:23:31 +00:00
|
|
|
int debug = 0;
|
1994-09-11 11:16:32 +00:00
|
|
|
int log = 0;
|
1999-07-22 15:57:37 +00:00
|
|
|
int maxsock; /* highest-numbered descriptor */
|
1994-05-26 05:23:31 +00:00
|
|
|
fd_set allsock;
|
|
|
|
int options;
|
|
|
|
int timingout;
|
|
|
|
int toomany = TOOMANY;
|
1999-06-21 11:17:34 +00:00
|
|
|
int maxchild = MAXCHILD;
|
|
|
|
int maxcpm = MAXCPM;
|
1994-05-26 05:23:31 +00:00
|
|
|
struct servent *sp;
|
1994-09-11 10:48:02 +00:00
|
|
|
struct rpcent *rpc;
|
1996-08-09 22:20:24 +00:00
|
|
|
struct in_addr bind_address;
|
1998-12-28 15:09:43 +00:00
|
|
|
int signalpipe[2];
|
1999-07-22 16:29:48 +00:00
|
|
|
#ifdef SANITY_CHECK
|
|
|
|
int nsock;
|
|
|
|
#endif
|
1994-05-26 05:23:31 +00:00
|
|
|
|
1999-07-22 14:11:26 +00:00
|
|
|
struct servtab *servtab;
|
|
|
|
|
|
|
|
extern struct biltin biltins[];
|
1994-05-26 05:23:31 +00:00
|
|
|
|
|
|
|
#define NUMINT (sizeof(intab) / sizeof(struct inent))
|
|
|
|
char *CONFIG = _PATH_INETDCONF;
|
1996-08-09 22:20:24 +00:00
|
|
|
char *pid_file = _PATH_INETDPID;
|
1996-01-01 08:42:23 +00:00
|
|
|
|
|
|
|
#ifdef OLD_SETPROCTITLE
|
1994-05-26 05:23:31 +00:00
|
|
|
char **Argv;
|
|
|
|
char *LastArg;
|
1996-01-01 08:42:23 +00:00
|
|
|
#endif
|
1994-05-26 05:23:31 +00:00
|
|
|
|
1998-02-24 21:55:14 +00:00
|
|
|
int
|
|
|
|
getvalue(arg, value, whine)
|
|
|
|
char *arg, *whine;
|
|
|
|
int *value;
|
|
|
|
{
|
|
|
|
int tmp;
|
|
|
|
char *p;
|
|
|
|
|
|
|
|
tmp = strtol(arg, &p, 0);
|
|
|
|
if (tmp < 1 || *p) {
|
|
|
|
syslog(LOG_ERR, whine, arg);
|
|
|
|
return 1; /* failure */
|
|
|
|
}
|
|
|
|
*value = tmp;
|
|
|
|
return 0; /* success */
|
|
|
|
}
|
|
|
|
|
1994-05-26 05:23:31 +00:00
|
|
|
int
|
|
|
|
main(argc, argv, envp)
|
|
|
|
int argc;
|
|
|
|
char *argv[], *envp[];
|
|
|
|
{
|
|
|
|
struct servtab *sep;
|
|
|
|
struct passwd *pwd;
|
1997-10-28 13:46:52 +00:00
|
|
|
struct group *grp;
|
1999-07-21 16:09:45 +00:00
|
|
|
struct sigaction sa, saalrm, sachld, sahup, sapipe;
|
1994-05-26 05:23:31 +00:00
|
|
|
int tmpint, ch, dofork;
|
|
|
|
pid_t pid;
|
|
|
|
char buf[50];
|
1997-01-13 02:52:30 +00:00
|
|
|
#ifdef LOGIN_CAP
|
|
|
|
login_cap_t *lc = NULL;
|
|
|
|
#endif
|
1999-03-28 10:50:30 +00:00
|
|
|
struct request_info req;
|
|
|
|
int denied;
|
|
|
|
char *service = NULL;
|
1999-06-30 23:36:39 +00:00
|
|
|
char *pnm;
|
1999-06-17 09:16:08 +00:00
|
|
|
struct sockaddr_in peer;
|
|
|
|
int i;
|
1994-05-26 05:23:31 +00:00
|
|
|
|
1996-01-01 08:42:23 +00:00
|
|
|
|
|
|
|
#ifdef OLD_SETPROCTITLE
|
1994-05-26 05:23:31 +00:00
|
|
|
Argv = argv;
|
|
|
|
if (envp == 0 || *envp == 0)
|
|
|
|
envp = argv;
|
|
|
|
while (*envp)
|
|
|
|
envp++;
|
|
|
|
LastArg = envp[-1] + strlen(envp[-1]);
|
1996-01-01 08:42:23 +00:00
|
|
|
#endif
|
1994-05-26 05:23:31 +00:00
|
|
|
|
|
|
|
openlog("inetd", LOG_PID | LOG_NOWAIT, LOG_DAEMON);
|
|
|
|
|
1996-08-09 22:20:24 +00:00
|
|
|
bind_address.s_addr = htonl(INADDR_ANY);
|
1999-07-09 11:19:01 +00:00
|
|
|
while ((ch = getopt(argc, argv, "dlwWR:a:c:C:p:")) != -1)
|
1994-05-26 05:23:31 +00:00
|
|
|
switch(ch) {
|
|
|
|
case 'd':
|
|
|
|
debug = 1;
|
|
|
|
options |= SO_DEBUG;
|
|
|
|
break;
|
1994-09-11 11:16:32 +00:00
|
|
|
case 'l':
|
|
|
|
log = 1;
|
|
|
|
break;
|
1998-02-24 21:55:14 +00:00
|
|
|
case 'R':
|
|
|
|
getvalue(optarg, &toomany,
|
|
|
|
"-R %s: bad value for service invocation rate");
|
|
|
|
break;
|
|
|
|
case 'c':
|
|
|
|
getvalue(optarg, &maxchild,
|
|
|
|
"-c %s: bad value for maximum children");
|
|
|
|
break;
|
|
|
|
case 'C':
|
|
|
|
getvalue(optarg, &maxcpm,
|
|
|
|
"-C %s: bad value for maximum children/minute");
|
1994-05-26 05:23:31 +00:00
|
|
|
break;
|
1996-08-09 22:20:24 +00:00
|
|
|
case 'a':
|
|
|
|
if (!inet_aton(optarg, &bind_address)) {
|
|
|
|
syslog(LOG_ERR,
|
|
|
|
"-a %s: invalid IP address", optarg);
|
1996-11-10 21:07:27 +00:00
|
|
|
exit(EX_USAGE);
|
1996-08-09 22:20:24 +00:00
|
|
|
}
|
|
|
|
break;
|
|
|
|
case 'p':
|
|
|
|
pid_file = optarg;
|
|
|
|
break;
|
1999-06-27 18:05:34 +00:00
|
|
|
case 'w':
|
1999-07-09 11:19:01 +00:00
|
|
|
wrap_ex++;
|
|
|
|
break;
|
|
|
|
case 'W':
|
|
|
|
wrap_bi++;
|
1999-06-27 18:05:34 +00:00
|
|
|
break;
|
1994-05-26 05:23:31 +00:00
|
|
|
case '?':
|
|
|
|
default:
|
|
|
|
syslog(LOG_ERR,
|
1999-07-09 11:19:01 +00:00
|
|
|
"usage: inetd [-dlwW] [-a address] [-R rate]"
|
1998-02-24 21:55:14 +00:00
|
|
|
" [-c maximum] [-C rate]"
|
1996-08-09 22:20:24 +00:00
|
|
|
" [-p pidfile] [conf-file]");
|
1996-11-10 21:07:27 +00:00
|
|
|
exit(EX_USAGE);
|
1994-05-26 05:23:31 +00:00
|
|
|
}
|
|
|
|
argc -= optind;
|
|
|
|
argv += optind;
|
|
|
|
|
|
|
|
if (argc > 0)
|
|
|
|
CONFIG = argv[0];
|
|
|
|
if (debug == 0) {
|
1995-10-12 16:43:27 +00:00
|
|
|
FILE *fp;
|
1995-11-03 09:30:13 +00:00
|
|
|
if (daemon(0, 0) < 0) {
|
|
|
|
syslog(LOG_WARNING, "daemon(0,0) failed: %m");
|
|
|
|
}
|
|
|
|
/*
|
|
|
|
* In case somebody has started inetd manually, we need to
|
|
|
|
* clear the logname, so that old servers run as root do not
|
|
|
|
* get the user's logname..
|
|
|
|
*/
|
|
|
|
if (setlogin("") < 0) {
|
|
|
|
syslog(LOG_WARNING, "cannot clear logname: %m");
|
|
|
|
/* no big deal if it fails.. */
|
|
|
|
}
|
1995-10-12 16:43:27 +00:00
|
|
|
pid = getpid();
|
1996-08-09 22:20:24 +00:00
|
|
|
fp = fopen(pid_file, "w");
|
1995-10-12 16:43:27 +00:00
|
|
|
if (fp) {
|
|
|
|
fprintf(fp, "%ld\n", (long)pid);
|
|
|
|
fclose(fp);
|
|
|
|
} else {
|
1996-08-09 22:20:24 +00:00
|
|
|
syslog(LOG_WARNING, "%s: %m", pid_file);
|
1995-10-12 16:43:27 +00:00
|
|
|
}
|
1994-05-26 05:23:31 +00:00
|
|
|
}
|
1998-05-11 12:11:59 +00:00
|
|
|
sa.sa_flags = 0;
|
|
|
|
sigemptyset(&sa.sa_mask);
|
|
|
|
sigaddset(&sa.sa_mask, SIGALRM);
|
|
|
|
sigaddset(&sa.sa_mask, SIGCHLD);
|
|
|
|
sigaddset(&sa.sa_mask, SIGHUP);
|
1998-12-28 15:09:43 +00:00
|
|
|
sa.sa_handler = flag_retry;
|
1999-07-21 16:09:45 +00:00
|
|
|
sigaction(SIGALRM, &sa, &saalrm);
|
1998-12-28 15:09:43 +00:00
|
|
|
config();
|
|
|
|
sa.sa_handler = flag_config;
|
1999-07-21 16:09:45 +00:00
|
|
|
sigaction(SIGHUP, &sa, &sahup);
|
1998-12-28 15:09:43 +00:00
|
|
|
sa.sa_handler = flag_reapchild;
|
1999-07-21 16:09:45 +00:00
|
|
|
sigaction(SIGCHLD, &sa, &sachld);
|
1998-05-08 19:15:44 +00:00
|
|
|
sa.sa_handler = SIG_IGN;
|
1998-05-11 12:11:59 +00:00
|
|
|
sigaction(SIGPIPE, &sa, &sapipe);
|
1994-05-26 05:23:31 +00:00
|
|
|
|
|
|
|
{
|
|
|
|
/* space for daemons to overwrite environment for ps */
|
|
|
|
#define DUMMYSIZE 100
|
|
|
|
char dummy[DUMMYSIZE];
|
|
|
|
|
1996-11-01 01:42:08 +00:00
|
|
|
(void)memset(dummy, 'x', DUMMYSIZE - 1);
|
1994-05-26 05:23:31 +00:00
|
|
|
dummy[DUMMYSIZE - 1] = '\0';
|
|
|
|
(void)setenv("inetd_dummy", dummy, 1);
|
|
|
|
}
|
|
|
|
|
1999-01-02 16:04:19 +00:00
|
|
|
if (pipe(signalpipe) != 0) {
|
|
|
|
syslog(LOG_ERR, "pipe: %%m");
|
|
|
|
exit(EX_OSERR);
|
1998-12-28 15:09:43 +00:00
|
|
|
}
|
|
|
|
FD_SET(signalpipe[0], &allsock);
|
1999-07-22 16:29:48 +00:00
|
|
|
#ifdef SANITY_CHECK
|
1999-05-11 12:50:14 +00:00
|
|
|
nsock++;
|
1999-07-22 16:29:48 +00:00
|
|
|
#endif
|
1999-07-22 16:10:40 +00:00
|
|
|
if (signalpipe[0] > maxsock)
|
|
|
|
maxsock = signalpipe[0];
|
|
|
|
if (signalpipe[1] > maxsock)
|
|
|
|
maxsock = signalpipe[1];
|
1998-12-11 17:06:16 +00:00
|
|
|
|
1994-05-26 05:23:31 +00:00
|
|
|
for (;;) {
|
|
|
|
int n, ctrl;
|
|
|
|
fd_set readable;
|
|
|
|
|
1999-07-22 16:29:48 +00:00
|
|
|
#ifdef SANITY_CHECK
|
1994-05-26 05:23:31 +00:00
|
|
|
if (nsock == 0) {
|
1999-05-11 12:50:14 +00:00
|
|
|
syslog(LOG_ERR, "%s: nsock=0", __FUNCTION__);
|
|
|
|
exit(EX_SOFTWARE);
|
1994-05-26 05:23:31 +00:00
|
|
|
}
|
1999-07-22 16:29:48 +00:00
|
|
|
#endif
|
1994-05-26 05:23:31 +00:00
|
|
|
readable = allsock;
|
1998-12-28 15:09:43 +00:00
|
|
|
if ((n = select(maxsock + 1, &readable, (fd_set *)0,
|
|
|
|
(fd_set *)0, (struct timeval *)0)) <= 0) {
|
|
|
|
if (n < 0 && errno != EINTR) {
|
1994-05-26 05:23:31 +00:00
|
|
|
syslog(LOG_WARNING, "select: %m");
|
1997-08-29 18:00:11 +00:00
|
|
|
sleep(1);
|
|
|
|
}
|
1994-05-26 05:23:31 +00:00
|
|
|
continue;
|
|
|
|
}
|
1998-12-28 15:09:43 +00:00
|
|
|
/* handle any queued signal flags */
|
1999-01-02 16:04:19 +00:00
|
|
|
if (FD_ISSET(signalpipe[0], &readable)) {
|
1998-12-28 15:09:43 +00:00
|
|
|
int n;
|
1999-01-02 16:04:19 +00:00
|
|
|
if (ioctl(signalpipe[0], FIONREAD, &n) != 0) {
|
1998-12-28 15:09:43 +00:00
|
|
|
syslog(LOG_ERR, "ioctl: %m");
|
|
|
|
exit(EX_OSERR);
|
|
|
|
}
|
1999-01-02 16:04:19 +00:00
|
|
|
while (--n >= 0) {
|
|
|
|
char c;
|
|
|
|
if (read(signalpipe[0], &c, 1) != 1) {
|
|
|
|
syslog(LOG_ERR, "read: %m");
|
|
|
|
exit(EX_OSERR);
|
|
|
|
}
|
|
|
|
if (debug)
|
|
|
|
warnx("Handling signal flag %c", c);
|
|
|
|
switch(c) {
|
|
|
|
case 'A': /* sigalrm */
|
|
|
|
retry();
|
|
|
|
break;
|
|
|
|
case 'C': /* sigchld */
|
|
|
|
reapchild();
|
|
|
|
break;
|
|
|
|
case 'H': /* sighup */
|
|
|
|
config();
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
1998-12-28 15:09:43 +00:00
|
|
|
}
|
1994-05-26 05:23:31 +00:00
|
|
|
for (sep = servtab; n && sep; sep = sep->se_next)
|
|
|
|
if (sep->se_fd != -1 && FD_ISSET(sep->se_fd, &readable)) {
|
|
|
|
n--;
|
|
|
|
if (debug)
|
1997-09-19 06:27:30 +00:00
|
|
|
warnx("someone wants %s", sep->se_service);
|
1996-11-10 21:12:44 +00:00
|
|
|
if (sep->se_accept && sep->se_socktype == SOCK_STREAM) {
|
1994-05-26 05:23:31 +00:00
|
|
|
ctrl = accept(sep->se_fd, (struct sockaddr *)0,
|
|
|
|
(int *)0);
|
|
|
|
if (debug)
|
1997-09-19 06:27:30 +00:00
|
|
|
warnx("accept, ctrl %d", ctrl);
|
1994-05-26 05:23:31 +00:00
|
|
|
if (ctrl < 0) {
|
|
|
|
if (errno != EINTR)
|
|
|
|
syslog(LOG_WARNING,
|
|
|
|
"accept (for %s): %m",
|
1998-07-22 14:24:12 +00:00
|
|
|
sep->se_service);
|
1998-07-22 05:53:53 +00:00
|
|
|
if (sep->se_accept &&
|
|
|
|
sep->se_socktype == SOCK_STREAM)
|
|
|
|
close(ctrl);
|
1994-05-26 05:23:31 +00:00
|
|
|
continue;
|
|
|
|
}
|
1997-10-29 21:49:04 +00:00
|
|
|
if (cpmip(sep, ctrl) < 0) {
|
|
|
|
close(ctrl);
|
|
|
|
continue;
|
|
|
|
}
|
1994-05-26 05:23:31 +00:00
|
|
|
} else
|
|
|
|
ctrl = sep->se_fd;
|
1999-06-30 23:36:39 +00:00
|
|
|
if (log && !ISWRAP(sep)) {
|
|
|
|
pnm = "unknown";
|
|
|
|
i = sizeof peer;
|
|
|
|
if (getpeername(ctrl, (struct sockaddr *)
|
|
|
|
&peer, &i)) {
|
|
|
|
i = sizeof peer;
|
|
|
|
if (recvfrom(ctrl, buf, sizeof(buf),
|
|
|
|
MSG_PEEK,
|
|
|
|
(struct sockaddr *)&peer, &i) >= 0)
|
|
|
|
pnm = inet_ntoa(peer.sin_addr);
|
|
|
|
}
|
|
|
|
else
|
|
|
|
pnm = inet_ntoa(peer.sin_addr);
|
|
|
|
syslog(LOG_INFO,"%s from %s", sep->se_service, pnm);
|
|
|
|
}
|
1998-12-28 15:09:43 +00:00
|
|
|
(void) sigblock(SIGBLOCK);
|
1994-05-26 05:23:31 +00:00
|
|
|
pid = 0;
|
1999-06-17 09:16:08 +00:00
|
|
|
/*
|
1999-07-21 12:19:24 +00:00
|
|
|
* Fork for all external services, builtins which need to
|
|
|
|
* fork and anything we're wrapping (as wrapping might
|
|
|
|
* block or use hosts_options(5) twist).
|
1999-06-17 09:16:08 +00:00
|
|
|
*/
|
1999-06-30 23:36:39 +00:00
|
|
|
dofork = !sep->se_bi || sep->se_bi->bi_fork || ISWRAP(sep);
|
1994-05-26 05:23:31 +00:00
|
|
|
if (dofork) {
|
|
|
|
if (sep->se_count++ == 0)
|
1998-07-24 08:28:33 +00:00
|
|
|
(void)gettimeofday(&sep->se_time, (struct timezone *)NULL);
|
1994-05-26 05:23:31 +00:00
|
|
|
else if (sep->se_count >= toomany) {
|
|
|
|
struct timeval now;
|
|
|
|
|
1998-07-24 08:28:33 +00:00
|
|
|
(void)gettimeofday(&now, (struct timezone *)NULL);
|
1994-05-26 05:23:31 +00:00
|
|
|
if (now.tv_sec - sep->se_time.tv_sec >
|
|
|
|
CNT_INTVL) {
|
|
|
|
sep->se_time = now;
|
|
|
|
sep->se_count = 1;
|
|
|
|
} else {
|
|
|
|
syslog(LOG_ERR,
|
|
|
|
"%s/%s server failing (looping), service terminated",
|
|
|
|
sep->se_service, sep->se_proto);
|
|
|
|
close_sep(sep);
|
1998-12-28 15:09:43 +00:00
|
|
|
sigsetmask(0L);
|
1994-05-26 05:23:31 +00:00
|
|
|
if (!timingout) {
|
|
|
|
timingout = 1;
|
|
|
|
alarm(RETRYTIME);
|
|
|
|
}
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
pid = fork();
|
|
|
|
}
|
|
|
|
if (pid < 0) {
|
|
|
|
syslog(LOG_ERR, "fork: %m");
|
1996-11-10 21:12:44 +00:00
|
|
|
if (sep->se_accept &&
|
1994-05-26 05:23:31 +00:00
|
|
|
sep->se_socktype == SOCK_STREAM)
|
|
|
|
close(ctrl);
|
1998-12-28 15:09:43 +00:00
|
|
|
sigsetmask(0L);
|
1994-05-26 05:23:31 +00:00
|
|
|
sleep(1);
|
|
|
|
continue;
|
|
|
|
}
|
1996-11-10 21:12:44 +00:00
|
|
|
if (pid)
|
|
|
|
addchild(sep, pid);
|
1998-12-28 15:09:43 +00:00
|
|
|
sigsetmask(0L);
|
1994-05-26 05:23:31 +00:00
|
|
|
if (pid == 0) {
|
|
|
|
if (dofork) {
|
|
|
|
if (debug)
|
1997-09-19 06:27:30 +00:00
|
|
|
warnx("+ closing from %d", maxsock);
|
1994-05-26 05:23:31 +00:00
|
|
|
for (tmpint = maxsock; tmpint > 2; tmpint--)
|
|
|
|
if (tmpint != ctrl)
|
1996-11-10 21:07:27 +00:00
|
|
|
(void) close(tmpint);
|
1999-07-21 16:09:45 +00:00
|
|
|
sigaction(SIGALRM, &saalrm, (struct sigaction *)0);
|
|
|
|
sigaction(SIGCHLD, &sachld, (struct sigaction *)0);
|
|
|
|
sigaction(SIGHUP, &sahup, (struct sigaction *)0);
|
|
|
|
/* SIGPIPE reset before exec */
|
1994-05-26 05:23:31 +00:00
|
|
|
}
|
1998-05-07 18:32:00 +00:00
|
|
|
/*
|
|
|
|
* Call tcpmux to find the real service to exec.
|
|
|
|
*/
|
|
|
|
if (sep->se_bi &&
|
|
|
|
sep->se_bi->bi_fn == (void (*)()) tcpmux) {
|
|
|
|
sep = tcpmux(ctrl);
|
|
|
|
if (sep == NULL) {
|
|
|
|
close(ctrl);
|
|
|
|
_exit(0);
|
|
|
|
}
|
|
|
|
}
|
1999-06-30 23:36:39 +00:00
|
|
|
if (ISWRAP(sep)) {
|
1999-07-09 11:46:45 +00:00
|
|
|
inetd_setproctitle("wrapping", ctrl);
|
1999-06-17 09:16:08 +00:00
|
|
|
service = sep->se_server_name ?
|
|
|
|
sep->se_server_name : sep->se_service;
|
|
|
|
request_init(&req, RQ_DAEMON, service, RQ_FILE, ctrl, NULL);
|
1999-03-28 10:50:30 +00:00
|
|
|
fromhost(&req);
|
1999-06-17 09:16:08 +00:00
|
|
|
deny_severity = LIBWRAP_DENY_FACILITY|LIBWRAP_DENY_SEVERITY;
|
|
|
|
allow_severity = LIBWRAP_ALLOW_FACILITY|LIBWRAP_ALLOW_SEVERITY;
|
1999-03-28 10:50:30 +00:00
|
|
|
denied = !hosts_access(&req);
|
|
|
|
if (denied) {
|
|
|
|
syslog(deny_severity,
|
|
|
|
"refused connection from %.500s, service %s (%s)",
|
|
|
|
eval_client(&req), service, sep->se_proto);
|
1999-06-30 23:36:39 +00:00
|
|
|
if (sep->se_socktype != SOCK_STREAM)
|
|
|
|
recv(ctrl, buf, sizeof (buf), 0);
|
|
|
|
if (dofork)
|
|
|
|
_exit(0);
|
1999-03-28 10:50:30 +00:00
|
|
|
}
|
|
|
|
if (log) {
|
|
|
|
syslog(allow_severity,
|
|
|
|
"connection from %.500s, service %s (%s)",
|
|
|
|
eval_client(&req), service, sep->se_proto);
|
|
|
|
}
|
|
|
|
}
|
1996-11-10 21:07:27 +00:00
|
|
|
if (sep->se_bi) {
|
1994-05-26 05:23:31 +00:00
|
|
|
(*sep->se_bi->bi_fn)(ctrl, sep);
|
1996-11-10 21:07:27 +00:00
|
|
|
} else {
|
1994-05-26 05:23:31 +00:00
|
|
|
if (debug)
|
1997-09-19 06:27:30 +00:00
|
|
|
warnx("%d execl %s",
|
|
|
|
getpid(), sep->se_server);
|
1994-05-26 05:23:31 +00:00
|
|
|
dup2(ctrl, 0);
|
|
|
|
close(ctrl);
|
|
|
|
dup2(0, 1);
|
|
|
|
dup2(0, 2);
|
|
|
|
if ((pwd = getpwnam(sep->se_user)) == NULL) {
|
|
|
|
syslog(LOG_ERR,
|
|
|
|
"%s/%s: %s: No such user",
|
|
|
|
sep->se_service, sep->se_proto,
|
|
|
|
sep->se_user);
|
|
|
|
if (sep->se_socktype != SOCK_STREAM)
|
|
|
|
recv(0, buf, sizeof (buf), 0);
|
1996-11-10 21:07:27 +00:00
|
|
|
_exit(EX_NOUSER);
|
1994-05-26 05:23:31 +00:00
|
|
|
}
|
1997-10-28 13:46:52 +00:00
|
|
|
grp = NULL;
|
|
|
|
if ( sep->se_group != NULL
|
|
|
|
&& (grp = getgrnam(sep->se_group)) == NULL
|
|
|
|
) {
|
|
|
|
syslog(LOG_ERR,
|
|
|
|
"%s/%s: %s: No such group",
|
|
|
|
sep->se_service, sep->se_proto,
|
|
|
|
sep->se_group);
|
|
|
|
if (sep->se_socktype != SOCK_STREAM)
|
|
|
|
recv(0, buf, sizeof (buf), 0);
|
|
|
|
_exit(EX_NOUSER);
|
|
|
|
}
|
|
|
|
if (grp != NULL)
|
|
|
|
pwd->pw_gid = grp->gr_gid;
|
1997-01-13 02:52:30 +00:00
|
|
|
#ifdef LOGIN_CAP
|
1997-10-27 22:03:47 +00:00
|
|
|
if ((lc = login_getclass(sep->se_class)) == NULL) {
|
|
|
|
/* error syslogged by getclass */
|
|
|
|
syslog(LOG_ERR,
|
|
|
|
"%s/%s: %s: login class error",
|
1998-07-23 20:05:02 +00:00
|
|
|
sep->se_service, sep->se_proto,
|
|
|
|
sep->se_class);
|
1997-10-27 22:03:47 +00:00
|
|
|
if (sep->se_socktype != SOCK_STREAM)
|
|
|
|
recv(0, buf, sizeof (buf), 0);
|
|
|
|
_exit(EX_NOUSER);
|
|
|
|
}
|
1997-01-13 02:52:30 +00:00
|
|
|
#endif
|
1995-11-03 09:30:13 +00:00
|
|
|
if (setsid() < 0) {
|
|
|
|
syslog(LOG_ERR,
|
|
|
|
"%s: can't setsid(): %m",
|
|
|
|
sep->se_service);
|
1996-11-10 21:07:27 +00:00
|
|
|
/* _exit(EX_OSERR); not fatal yet */
|
1995-11-03 09:30:13 +00:00
|
|
|
}
|
1997-01-13 02:52:30 +00:00
|
|
|
#ifdef LOGIN_CAP
|
|
|
|
if (setusercontext(lc, pwd, pwd->pw_uid,
|
|
|
|
LOGIN_SETALL) != 0) {
|
|
|
|
syslog(LOG_ERR,
|
|
|
|
"%s: can't setusercontext(..%s..): %m",
|
|
|
|
sep->se_service, sep->se_user);
|
|
|
|
_exit(EX_OSERR);
|
|
|
|
}
|
|
|
|
#else
|
1994-05-26 05:23:31 +00:00
|
|
|
if (pwd->pw_uid) {
|
1995-11-03 09:30:13 +00:00
|
|
|
if (setlogin(sep->se_user) < 0) {
|
|
|
|
syslog(LOG_ERR,
|
|
|
|
"%s: can't setlogin(%s): %m",
|
|
|
|
sep->se_service, sep->se_user);
|
1996-11-10 21:07:27 +00:00
|
|
|
/* _exit(EX_OSERR); not yet */
|
1995-11-03 09:30:13 +00:00
|
|
|
}
|
1994-05-26 05:23:31 +00:00
|
|
|
if (setgid(pwd->pw_gid) < 0) {
|
|
|
|
syslog(LOG_ERR,
|
1995-05-30 03:57:47 +00:00
|
|
|
"%s: can't set gid %d: %m",
|
1994-05-26 05:23:31 +00:00
|
|
|
sep->se_service, pwd->pw_gid);
|
1996-11-10 21:07:27 +00:00
|
|
|
_exit(EX_OSERR);
|
1994-05-26 05:23:31 +00:00
|
|
|
}
|
|
|
|
(void) initgroups(pwd->pw_name,
|
|
|
|
pwd->pw_gid);
|
|
|
|
if (setuid(pwd->pw_uid) < 0) {
|
|
|
|
syslog(LOG_ERR,
|
1995-05-30 03:57:47 +00:00
|
|
|
"%s: can't set uid %d: %m",
|
1994-05-26 05:23:31 +00:00
|
|
|
sep->se_service, pwd->pw_uid);
|
1996-11-10 21:07:27 +00:00
|
|
|
_exit(EX_OSERR);
|
1994-05-26 05:23:31 +00:00
|
|
|
}
|
|
|
|
}
|
1997-01-13 02:52:30 +00:00
|
|
|
#endif
|
1998-05-11 12:11:59 +00:00
|
|
|
sigaction(SIGPIPE, &sapipe,
|
|
|
|
(struct sigaction *)0);
|
1994-05-26 05:23:31 +00:00
|
|
|
execv(sep->se_server, sep->se_argv);
|
|
|
|
syslog(LOG_ERR,
|
|
|
|
"cannot execute %s: %m", sep->se_server);
|
1999-03-28 10:50:30 +00:00
|
|
|
if (sep->se_socktype != SOCK_STREAM)
|
|
|
|
recv(0, buf, sizeof (buf), 0);
|
1994-05-26 05:23:31 +00:00
|
|
|
}
|
1999-06-17 09:16:08 +00:00
|
|
|
if (dofork)
|
|
|
|
_exit(0);
|
1994-05-26 05:23:31 +00:00
|
|
|
}
|
1996-11-10 21:12:44 +00:00
|
|
|
if (sep->se_accept && sep->se_socktype == SOCK_STREAM)
|
1994-05-26 05:23:31 +00:00
|
|
|
close(ctrl);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
1998-12-28 15:09:43 +00:00
|
|
|
/*
|
|
|
|
* Add a signal flag to the signal flag queue for later handling
|
|
|
|
*/
|
|
|
|
|
|
|
|
void flag_signal(c)
|
|
|
|
char c;
|
|
|
|
{
|
1999-01-02 16:04:19 +00:00
|
|
|
if (write(signalpipe[1], &c, 1) != 1) {
|
|
|
|
syslog(LOG_ERR, "write: %m");
|
1999-07-22 14:47:29 +00:00
|
|
|
_exit(EX_OSERR);
|
1999-01-02 16:04:19 +00:00
|
|
|
}
|
1998-12-28 15:09:43 +00:00
|
|
|
}
|
|
|
|
|
1996-11-10 21:12:44 +00:00
|
|
|
/*
|
|
|
|
* Record a new child pid for this service. If we've reached the
|
|
|
|
* limit on children, then stop accepting incoming requests.
|
|
|
|
*/
|
|
|
|
|
|
|
|
void
|
|
|
|
addchild(struct servtab *sep, pid_t pid)
|
|
|
|
{
|
|
|
|
#ifdef SANITY_CHECK
|
|
|
|
if (sep->se_numchild >= sep->se_maxchild) {
|
|
|
|
syslog(LOG_ERR, "%s: %d >= %d",
|
|
|
|
__FUNCTION__, sep->se_numchild, sep->se_maxchild);
|
|
|
|
exit(EX_SOFTWARE);
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
if (sep->se_maxchild == 0)
|
|
|
|
return;
|
|
|
|
sep->se_pids[sep->se_numchild++] = pid;
|
|
|
|
if (sep->se_numchild == sep->se_maxchild)
|
|
|
|
disable(sep);
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Some child process has exited. See if it's on somebody's list.
|
|
|
|
*/
|
|
|
|
|
1994-05-26 05:23:31 +00:00
|
|
|
void
|
1998-12-28 15:09:43 +00:00
|
|
|
flag_reapchild(signo)
|
1994-05-26 05:23:31 +00:00
|
|
|
int signo;
|
1998-12-28 15:09:43 +00:00
|
|
|
{
|
1999-01-02 16:04:19 +00:00
|
|
|
flag_signal('C');
|
1998-12-28 15:09:43 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
void
|
|
|
|
reapchild()
|
1994-05-26 05:23:31 +00:00
|
|
|
{
|
1996-11-10 21:12:44 +00:00
|
|
|
int k, status;
|
1994-05-26 05:23:31 +00:00
|
|
|
pid_t pid;
|
|
|
|
struct servtab *sep;
|
|
|
|
|
|
|
|
for (;;) {
|
|
|
|
pid = wait3(&status, WNOHANG, (struct rusage *)0);
|
|
|
|
if (pid <= 0)
|
|
|
|
break;
|
|
|
|
if (debug)
|
1997-09-19 06:27:30 +00:00
|
|
|
warnx("%d reaped, status %#x", pid, status);
|
1996-11-10 21:12:44 +00:00
|
|
|
for (sep = servtab; sep; sep = sep->se_next) {
|
|
|
|
for (k = 0; k < sep->se_numchild; k++)
|
|
|
|
if (sep->se_pids[k] == pid)
|
|
|
|
break;
|
|
|
|
if (k == sep->se_numchild)
|
|
|
|
continue;
|
|
|
|
if (sep->se_numchild == sep->se_maxchild)
|
|
|
|
enable(sep);
|
|
|
|
sep->se_pids[k] = sep->se_pids[--sep->se_numchild];
|
|
|
|
if (status)
|
|
|
|
syslog(LOG_WARNING,
|
|
|
|
"%s[%d]: exit status 0x%x",
|
|
|
|
sep->se_server, pid, status);
|
|
|
|
break;
|
|
|
|
}
|
1994-05-26 05:23:31 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
void
|
1998-12-28 15:09:43 +00:00
|
|
|
flag_config(signo)
|
1994-05-26 05:23:31 +00:00
|
|
|
int signo;
|
1998-12-28 15:09:43 +00:00
|
|
|
{
|
1999-01-02 16:04:19 +00:00
|
|
|
flag_signal('H');
|
1998-12-28 15:09:43 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
void config()
|
1994-05-26 05:23:31 +00:00
|
|
|
{
|
1996-11-10 21:12:44 +00:00
|
|
|
struct servtab *sep, *new, **sepp;
|
1998-12-28 15:09:43 +00:00
|
|
|
long omask;
|
1994-05-26 05:23:31 +00:00
|
|
|
|
|
|
|
if (!setconfig()) {
|
|
|
|
syslog(LOG_ERR, "%s: %m", CONFIG);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
for (sep = servtab; sep; sep = sep->se_next)
|
|
|
|
sep->se_checked = 0;
|
1996-11-10 21:12:44 +00:00
|
|
|
while ((new = getconfigent())) {
|
1997-10-28 13:46:52 +00:00
|
|
|
if (getpwnam(new->se_user) == NULL) {
|
1994-05-26 05:23:31 +00:00
|
|
|
syslog(LOG_ERR,
|
|
|
|
"%s/%s: No such user '%s', service ignored",
|
1996-11-10 21:12:44 +00:00
|
|
|
new->se_service, new->se_proto, new->se_user);
|
1994-05-26 05:23:31 +00:00
|
|
|
continue;
|
|
|
|
}
|
1997-10-28 13:46:52 +00:00
|
|
|
if (new->se_group && getgrnam(new->se_group) == NULL) {
|
|
|
|
syslog(LOG_ERR,
|
|
|
|
"%s/%s: No such group '%s', service ignored",
|
|
|
|
new->se_service, new->se_proto, new->se_group);
|
|
|
|
continue;
|
|
|
|
}
|
1997-10-27 22:03:47 +00:00
|
|
|
#ifdef LOGIN_CAP
|
|
|
|
if (login_getclass(new->se_class) == NULL) {
|
|
|
|
/* error syslogged by getclass */
|
|
|
|
syslog(LOG_ERR,
|
1998-07-23 20:05:02 +00:00
|
|
|
"%s/%s: %s: login class error, service ignored",
|
|
|
|
new->se_service, new->se_proto, new->se_class);
|
1997-10-27 22:03:47 +00:00
|
|
|
continue;
|
|
|
|
}
|
|
|
|
#endif
|
1994-05-26 05:23:31 +00:00
|
|
|
for (sep = servtab; sep; sep = sep->se_next)
|
1996-11-10 21:12:44 +00:00
|
|
|
if (strcmp(sep->se_service, new->se_service) == 0 &&
|
|
|
|
strcmp(sep->se_proto, new->se_proto) == 0)
|
1994-05-26 05:23:31 +00:00
|
|
|
break;
|
|
|
|
if (sep != 0) {
|
|
|
|
int i;
|
|
|
|
|
1996-11-10 21:12:44 +00:00
|
|
|
#define SWAP(a, b) { typeof(a) c = a; a = b; b = c; }
|
1998-12-28 15:09:43 +00:00
|
|
|
omask = sigblock(SIGBLOCK);
|
1996-11-10 21:12:44 +00:00
|
|
|
/* copy over outstanding child pids */
|
|
|
|
if (sep->se_maxchild && new->se_maxchild) {
|
|
|
|
new->se_numchild = sep->se_numchild;
|
|
|
|
if (new->se_numchild > new->se_maxchild)
|
|
|
|
new->se_numchild = new->se_maxchild;
|
|
|
|
memcpy(new->se_pids, sep->se_pids,
|
|
|
|
new->se_numchild * sizeof(*new->se_pids));
|
|
|
|
}
|
|
|
|
SWAP(sep->se_pids, new->se_pids);
|
|
|
|
sep->se_maxchild = new->se_maxchild;
|
|
|
|
sep->se_numchild = new->se_numchild;
|
1997-10-29 21:49:04 +00:00
|
|
|
sep->se_maxcpm = new->se_maxcpm;
|
1996-11-10 21:12:44 +00:00
|
|
|
/* might need to turn on or off service now */
|
|
|
|
if (sep->se_fd >= 0) {
|
|
|
|
if (sep->se_maxchild
|
|
|
|
&& sep->se_numchild == sep->se_maxchild) {
|
|
|
|
if (FD_ISSET(sep->se_fd, &allsock))
|
|
|
|
disable(sep);
|
|
|
|
} else {
|
|
|
|
if (!FD_ISSET(sep->se_fd, &allsock))
|
|
|
|
enable(sep);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
sep->se_accept = new->se_accept;
|
1997-10-28 13:46:52 +00:00
|
|
|
SWAP(sep->se_user, new->se_user);
|
|
|
|
SWAP(sep->se_group, new->se_group);
|
1997-10-27 22:03:47 +00:00
|
|
|
#ifdef LOGIN_CAP
|
1997-10-28 13:46:52 +00:00
|
|
|
SWAP(sep->se_class, new->se_class);
|
1997-10-27 22:03:47 +00:00
|
|
|
#endif
|
1997-10-28 13:46:52 +00:00
|
|
|
SWAP(sep->se_server, new->se_server);
|
1999-06-17 09:16:08 +00:00
|
|
|
SWAP(sep->se_server_name, new->se_server_name);
|
1994-05-26 05:23:31 +00:00
|
|
|
for (i = 0; i < MAXARGV; i++)
|
1996-11-10 21:12:44 +00:00
|
|
|
SWAP(sep->se_argv[i], new->se_argv[i]);
|
1998-12-28 15:09:43 +00:00
|
|
|
sigsetmask(omask);
|
1996-11-10 21:12:44 +00:00
|
|
|
freeconfig(new);
|
1994-05-26 05:23:31 +00:00
|
|
|
if (debug)
|
|
|
|
print_service("REDO", sep);
|
|
|
|
} else {
|
1996-11-10 21:12:44 +00:00
|
|
|
sep = enter(new);
|
1994-05-26 05:23:31 +00:00
|
|
|
if (debug)
|
|
|
|
print_service("ADD ", sep);
|
|
|
|
}
|
|
|
|
sep->se_checked = 1;
|
|
|
|
if (ISMUX(sep)) {
|
|
|
|
sep->se_fd = -1;
|
|
|
|
continue;
|
|
|
|
}
|
1994-09-11 10:48:02 +00:00
|
|
|
if (!sep->se_rpc) {
|
|
|
|
sp = getservbyname(sep->se_service, sep->se_proto);
|
|
|
|
if (sp == 0) {
|
|
|
|
syslog(LOG_ERR, "%s/%s: unknown service",
|
|
|
|
sep->se_service, sep->se_proto);
|
|
|
|
sep->se_checked = 0;
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
if (sp->s_port != sep->se_ctrladdr.sin_port) {
|
|
|
|
sep->se_ctrladdr.sin_family = AF_INET;
|
1997-02-05 19:50:04 +00:00
|
|
|
sep->se_ctrladdr.sin_addr = bind_address;
|
1994-09-11 10:48:02 +00:00
|
|
|
sep->se_ctrladdr.sin_port = sp->s_port;
|
|
|
|
if (sep->se_fd >= 0)
|
|
|
|
close_sep(sep);
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
rpc = getrpcbyname(sep->se_service);
|
|
|
|
if (rpc == 0) {
|
|
|
|
syslog(LOG_ERR, "%s/%s unknown RPC service.",
|
|
|
|
sep->se_service, sep->se_proto);
|
|
|
|
if (sep->se_fd != -1)
|
|
|
|
(void) close(sep->se_fd);
|
|
|
|
sep->se_fd = -1;
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
if (rpc->r_number != sep->se_rpc_prog) {
|
|
|
|
if (sep->se_rpc_prog)
|
|
|
|
unregisterrpc(sep);
|
|
|
|
sep->se_rpc_prog = rpc->r_number;
|
|
|
|
if (sep->se_fd != -1)
|
|
|
|
(void) close(sep->se_fd);
|
|
|
|
sep->se_fd = -1;
|
|
|
|
}
|
1994-05-26 05:23:31 +00:00
|
|
|
}
|
|
|
|
if (sep->se_fd == -1)
|
|
|
|
setup(sep);
|
|
|
|
}
|
|
|
|
endconfig();
|
|
|
|
/*
|
|
|
|
* Purge anything not looked at above.
|
|
|
|
*/
|
1998-12-28 15:09:43 +00:00
|
|
|
omask = sigblock(SIGBLOCK);
|
1994-05-26 05:23:31 +00:00
|
|
|
sepp = &servtab;
|
1996-11-10 21:07:27 +00:00
|
|
|
while ((sep = *sepp)) {
|
1994-05-26 05:23:31 +00:00
|
|
|
if (sep->se_checked) {
|
|
|
|
sepp = &sep->se_next;
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
*sepp = sep->se_next;
|
|
|
|
if (sep->se_fd >= 0)
|
|
|
|
close_sep(sep);
|
|
|
|
if (debug)
|
|
|
|
print_service("FREE", sep);
|
1994-09-11 10:48:02 +00:00
|
|
|
if (sep->se_rpc && sep->se_rpc_prog > 0)
|
|
|
|
unregisterrpc(sep);
|
1994-05-26 05:23:31 +00:00
|
|
|
freeconfig(sep);
|
|
|
|
free((char *)sep);
|
|
|
|
}
|
1998-12-28 15:09:43 +00:00
|
|
|
(void) sigsetmask(omask);
|
1994-05-26 05:23:31 +00:00
|
|
|
}
|
|
|
|
|
1994-09-11 10:48:02 +00:00
|
|
|
void
|
|
|
|
unregisterrpc(sep)
|
|
|
|
struct servtab *sep;
|
|
|
|
{
|
|
|
|
int i;
|
|
|
|
struct servtab *sepp;
|
1998-12-28 15:09:43 +00:00
|
|
|
long omask;
|
1994-09-11 10:48:02 +00:00
|
|
|
|
1998-12-28 15:09:43 +00:00
|
|
|
omask = sigblock(SIGBLOCK);
|
1994-09-11 10:48:02 +00:00
|
|
|
for (sepp = servtab; sepp; sepp = sepp->se_next) {
|
|
|
|
if (sepp == sep)
|
|
|
|
continue;
|
|
|
|
if (sep->se_checked == 0 ||
|
|
|
|
!sepp->se_rpc ||
|
|
|
|
sep->se_rpc_prog != sepp->se_rpc_prog)
|
|
|
|
continue;
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
if (debug)
|
|
|
|
print_service("UNREG", sep);
|
|
|
|
for (i = sep->se_rpc_lowvers; i <= sep->se_rpc_highvers; i++)
|
|
|
|
pmap_unset(sep->se_rpc_prog, i);
|
|
|
|
if (sep->se_fd != -1)
|
|
|
|
(void) close(sep->se_fd);
|
|
|
|
sep->se_fd = -1;
|
1998-12-28 15:09:43 +00:00
|
|
|
(void) sigsetmask(omask);
|
1994-09-11 10:48:02 +00:00
|
|
|
}
|
|
|
|
|
1994-05-26 05:23:31 +00:00
|
|
|
void
|
1998-12-28 15:09:43 +00:00
|
|
|
flag_retry(signo)
|
1994-05-26 05:23:31 +00:00
|
|
|
int signo;
|
1998-12-28 15:09:43 +00:00
|
|
|
{
|
1999-01-02 16:04:19 +00:00
|
|
|
flag_signal('A');
|
1998-12-28 15:09:43 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
void
|
|
|
|
retry()
|
1994-05-26 05:23:31 +00:00
|
|
|
{
|
|
|
|
struct servtab *sep;
|
|
|
|
|
|
|
|
timingout = 0;
|
|
|
|
for (sep = servtab; sep; sep = sep->se_next)
|
1996-11-10 21:07:27 +00:00
|
|
|
if (sep->se_fd == -1 && !ISMUX(sep))
|
1994-05-26 05:23:31 +00:00
|
|
|
setup(sep);
|
|
|
|
}
|
|
|
|
|
|
|
|
void
|
|
|
|
setup(sep)
|
|
|
|
struct servtab *sep;
|
|
|
|
{
|
|
|
|
int on = 1;
|
|
|
|
|
|
|
|
if ((sep->se_fd = socket(AF_INET, sep->se_socktype, 0)) < 0) {
|
|
|
|
if (debug)
|
1997-09-19 06:27:30 +00:00
|
|
|
warn("socket failed on %s/%s",
|
|
|
|
sep->se_service, sep->se_proto);
|
1994-05-26 05:23:31 +00:00
|
|
|
syslog(LOG_ERR, "%s/%s: socket: %m",
|
|
|
|
sep->se_service, sep->se_proto);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
#define turnon(fd, opt) \
|
|
|
|
setsockopt(fd, SOL_SOCKET, opt, (char *)&on, sizeof (on))
|
|
|
|
if (strcmp(sep->se_proto, "tcp") == 0 && (options & SO_DEBUG) &&
|
|
|
|
turnon(sep->se_fd, SO_DEBUG) < 0)
|
|
|
|
syslog(LOG_ERR, "setsockopt (SO_DEBUG): %m");
|
|
|
|
if (turnon(sep->se_fd, SO_REUSEADDR) < 0)
|
|
|
|
syslog(LOG_ERR, "setsockopt (SO_REUSEADDR): %m");
|
1997-04-28 13:55:07 +00:00
|
|
|
#ifdef SO_PRIVSTATE
|
1996-02-07 17:15:01 +00:00
|
|
|
if (turnon(sep->se_fd, SO_PRIVSTATE) < 0)
|
|
|
|
syslog(LOG_ERR, "setsockopt (SO_PRIVSTATE): %m");
|
1997-04-28 13:55:07 +00:00
|
|
|
#endif
|
1994-05-26 05:23:31 +00:00
|
|
|
#undef turnon
|
1998-05-14 20:26:16 +00:00
|
|
|
if (sep->se_type == TTCP_TYPE)
|
|
|
|
if (setsockopt(sep->se_fd, IPPROTO_TCP, TCP_NOPUSH,
|
|
|
|
(char *)&on, sizeof (on)) < 0)
|
|
|
|
syslog(LOG_ERR, "setsockopt (TCP_NOPUSH): %m");
|
1994-05-26 05:23:31 +00:00
|
|
|
if (bind(sep->se_fd, (struct sockaddr *)&sep->se_ctrladdr,
|
|
|
|
sizeof (sep->se_ctrladdr)) < 0) {
|
|
|
|
if (debug)
|
1997-09-19 06:27:30 +00:00
|
|
|
warn("bind failed on %s/%s",
|
|
|
|
sep->se_service, sep->se_proto);
|
1994-05-26 05:23:31 +00:00
|
|
|
syslog(LOG_ERR, "%s/%s: bind: %m",
|
|
|
|
sep->se_service, sep->se_proto);
|
|
|
|
(void) close(sep->se_fd);
|
|
|
|
sep->se_fd = -1;
|
|
|
|
if (!timingout) {
|
|
|
|
timingout = 1;
|
|
|
|
alarm(RETRYTIME);
|
|
|
|
}
|
|
|
|
return;
|
|
|
|
}
|
1994-09-11 10:48:02 +00:00
|
|
|
if (sep->se_rpc) {
|
|
|
|
int i, len = sizeof(struct sockaddr);
|
|
|
|
|
1995-05-30 03:57:47 +00:00
|
|
|
if (getsockname(sep->se_fd,
|
1994-09-11 10:48:02 +00:00
|
|
|
(struct sockaddr*)&sep->se_ctrladdr, &len) < 0){
|
|
|
|
syslog(LOG_ERR, "%s/%s: getsockname: %m",
|
|
|
|
sep->se_service, sep->se_proto);
|
|
|
|
(void) close(sep->se_fd);
|
|
|
|
sep->se_fd = -1;
|
1995-05-30 03:57:47 +00:00
|
|
|
return;
|
1994-09-11 10:48:02 +00:00
|
|
|
}
|
|
|
|
if (debug)
|
|
|
|
print_service("REG ", sep);
|
|
|
|
for (i = sep->se_rpc_lowvers; i <= sep->se_rpc_highvers; i++) {
|
|
|
|
pmap_unset(sep->se_rpc_prog, i);
|
|
|
|
pmap_set(sep->se_rpc_prog, i,
|
|
|
|
(sep->se_socktype == SOCK_DGRAM)
|
|
|
|
? IPPROTO_UDP : IPPROTO_TCP,
|
|
|
|
ntohs(sep->se_ctrladdr.sin_port));
|
|
|
|
}
|
1995-05-30 03:57:47 +00:00
|
|
|
|
1994-09-11 10:48:02 +00:00
|
|
|
}
|
1994-05-26 05:23:31 +00:00
|
|
|
if (sep->se_socktype == SOCK_STREAM)
|
1996-07-17 15:00:28 +00:00
|
|
|
listen(sep->se_fd, 64);
|
1996-11-10 21:12:44 +00:00
|
|
|
enable(sep);
|
1994-05-26 05:23:31 +00:00
|
|
|
if (debug) {
|
1997-09-19 06:27:30 +00:00
|
|
|
warnx("registered %s on %d",
|
1994-05-26 05:23:31 +00:00
|
|
|
sep->se_server, sep->se_fd);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Finish with a service and its socket.
|
|
|
|
*/
|
|
|
|
void
|
|
|
|
close_sep(sep)
|
|
|
|
struct servtab *sep;
|
|
|
|
{
|
|
|
|
if (sep->se_fd >= 0) {
|
1996-11-10 21:12:44 +00:00
|
|
|
if (FD_ISSET(sep->se_fd, &allsock))
|
|
|
|
disable(sep);
|
1994-05-26 05:23:31 +00:00
|
|
|
(void) close(sep->se_fd);
|
|
|
|
sep->se_fd = -1;
|
|
|
|
}
|
|
|
|
sep->se_count = 0;
|
1996-11-10 21:12:44 +00:00
|
|
|
sep->se_numchild = 0; /* forget about any existing children */
|
1994-05-26 05:23:31 +00:00
|
|
|
}
|
|
|
|
|
1999-07-02 16:21:13 +00:00
|
|
|
int
|
|
|
|
matchservent(name1, name2, proto)
|
|
|
|
char *name1, *name2, *proto;
|
|
|
|
{
|
|
|
|
char **alias;
|
|
|
|
struct servent *se;
|
|
|
|
|
|
|
|
if ((se = getservbyname(name1, proto)) != NULL) {
|
|
|
|
if (strcmp(name2, se->s_name) == 0)
|
|
|
|
return(1);
|
|
|
|
for (alias = se->s_aliases; *alias; alias++)
|
|
|
|
if (strcmp(name2, *alias) == 0)
|
|
|
|
return(1);
|
|
|
|
}
|
|
|
|
return(0);
|
|
|
|
}
|
|
|
|
|
1994-05-26 05:23:31 +00:00
|
|
|
struct servtab *
|
|
|
|
enter(cp)
|
|
|
|
struct servtab *cp;
|
|
|
|
{
|
|
|
|
struct servtab *sep;
|
1998-12-28 15:09:43 +00:00
|
|
|
long omask;
|
1994-05-26 05:23:31 +00:00
|
|
|
|
|
|
|
sep = (struct servtab *)malloc(sizeof (*sep));
|
|
|
|
if (sep == (struct servtab *)0) {
|
|
|
|
syslog(LOG_ERR, "Out of memory.");
|
1996-11-10 21:07:27 +00:00
|
|
|
exit(EX_OSERR);
|
1994-05-26 05:23:31 +00:00
|
|
|
}
|
|
|
|
*sep = *cp;
|
|
|
|
sep->se_fd = -1;
|
1998-12-28 15:09:43 +00:00
|
|
|
omask = sigblock(SIGBLOCK);
|
1994-05-26 05:23:31 +00:00
|
|
|
sep->se_next = servtab;
|
|
|
|
servtab = sep;
|
1998-12-28 15:09:43 +00:00
|
|
|
sigsetmask(omask);
|
1994-05-26 05:23:31 +00:00
|
|
|
return (sep);
|
|
|
|
}
|
|
|
|
|
1996-11-10 21:12:44 +00:00
|
|
|
void
|
|
|
|
enable(struct servtab *sep)
|
|
|
|
{
|
|
|
|
if (debug)
|
1997-09-19 06:27:30 +00:00
|
|
|
warnx(
|
1996-11-10 21:12:44 +00:00
|
|
|
"enabling %s, fd %d", sep->se_service, sep->se_fd);
|
|
|
|
#ifdef SANITY_CHECK
|
|
|
|
if (sep->se_fd < 0) {
|
|
|
|
syslog(LOG_ERR,
|
|
|
|
"%s: %s: bad fd", __FUNCTION__, sep->se_service);
|
|
|
|
exit(EX_SOFTWARE);
|
|
|
|
}
|
|
|
|
if (ISMUX(sep)) {
|
|
|
|
syslog(LOG_ERR,
|
|
|
|
"%s: %s: is mux", __FUNCTION__, sep->se_service);
|
|
|
|
exit(EX_SOFTWARE);
|
|
|
|
}
|
|
|
|
if (FD_ISSET(sep->se_fd, &allsock)) {
|
|
|
|
syslog(LOG_ERR,
|
|
|
|
"%s: %s: not off", __FUNCTION__, sep->se_service);
|
|
|
|
exit(EX_SOFTWARE);
|
|
|
|
}
|
1999-07-22 16:29:48 +00:00
|
|
|
nsock++;
|
1996-11-10 21:12:44 +00:00
|
|
|
#endif
|
|
|
|
FD_SET(sep->se_fd, &allsock);
|
|
|
|
if (sep->se_fd > maxsock)
|
|
|
|
maxsock = sep->se_fd;
|
|
|
|
}
|
|
|
|
|
|
|
|
void
|
|
|
|
disable(struct servtab *sep)
|
|
|
|
{
|
|
|
|
if (debug)
|
1997-09-19 06:27:30 +00:00
|
|
|
warnx(
|
1996-11-10 21:12:44 +00:00
|
|
|
"disabling %s, fd %d", sep->se_service, sep->se_fd);
|
|
|
|
#ifdef SANITY_CHECK
|
|
|
|
if (sep->se_fd < 0) {
|
|
|
|
syslog(LOG_ERR,
|
|
|
|
"%s: %s: bad fd", __FUNCTION__, sep->se_service);
|
|
|
|
exit(EX_SOFTWARE);
|
|
|
|
}
|
|
|
|
if (ISMUX(sep)) {
|
|
|
|
syslog(LOG_ERR,
|
|
|
|
"%s: %s: is mux", __FUNCTION__, sep->se_service);
|
|
|
|
exit(EX_SOFTWARE);
|
|
|
|
}
|
|
|
|
if (!FD_ISSET(sep->se_fd, &allsock)) {
|
|
|
|
syslog(LOG_ERR,
|
|
|
|
"%s: %s: not on", __FUNCTION__, sep->se_service);
|
|
|
|
exit(EX_SOFTWARE);
|
|
|
|
}
|
|
|
|
if (nsock == 0) {
|
|
|
|
syslog(LOG_ERR, "%s: nsock=0", __FUNCTION__);
|
|
|
|
exit(EX_SOFTWARE);
|
|
|
|
}
|
1999-07-22 16:29:48 +00:00
|
|
|
nsock--;
|
1996-11-10 21:12:44 +00:00
|
|
|
#endif
|
|
|
|
FD_CLR(sep->se_fd, &allsock);
|
|
|
|
if (sep->se_fd == maxsock)
|
|
|
|
maxsock--;
|
|
|
|
}
|
|
|
|
|
1994-05-26 05:23:31 +00:00
|
|
|
FILE *fconfig = NULL;
|
|
|
|
struct servtab serv;
|
|
|
|
char line[LINE_MAX];
|
|
|
|
|
|
|
|
int
|
|
|
|
setconfig()
|
|
|
|
{
|
|
|
|
|
|
|
|
if (fconfig != NULL) {
|
|
|
|
fseek(fconfig, 0L, SEEK_SET);
|
|
|
|
return (1);
|
|
|
|
}
|
|
|
|
fconfig = fopen(CONFIG, "r");
|
|
|
|
return (fconfig != NULL);
|
|
|
|
}
|
|
|
|
|
|
|
|
void
|
|
|
|
endconfig()
|
|
|
|
{
|
|
|
|
if (fconfig) {
|
|
|
|
(void) fclose(fconfig);
|
|
|
|
fconfig = NULL;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
struct servtab *
|
|
|
|
getconfigent()
|
|
|
|
{
|
|
|
|
struct servtab *sep = &serv;
|
|
|
|
int argc;
|
1996-11-10 21:12:44 +00:00
|
|
|
char *cp, *arg, *s;
|
1994-09-11 10:48:02 +00:00
|
|
|
char *versp;
|
1994-05-26 05:23:31 +00:00
|
|
|
static char TCPMUX_TOKEN[] = "tcpmux/";
|
|
|
|
#define MUX_LEN (sizeof(TCPMUX_TOKEN)-1)
|
|
|
|
|
|
|
|
more:
|
|
|
|
while ((cp = nextline(fconfig)) && (*cp == '#' || *cp == '\0'))
|
|
|
|
;
|
|
|
|
if (cp == NULL)
|
|
|
|
return ((struct servtab *)0);
|
|
|
|
/*
|
|
|
|
* clear the static buffer, since some fields (se_ctrladdr,
|
|
|
|
* for example) don't get initialized here.
|
|
|
|
*/
|
|
|
|
memset((caddr_t)sep, 0, sizeof *sep);
|
|
|
|
arg = skip(&cp);
|
|
|
|
if (cp == NULL) {
|
|
|
|
/* got an empty line containing just blanks/tabs. */
|
|
|
|
goto more;
|
|
|
|
}
|
|
|
|
if (strncmp(arg, TCPMUX_TOKEN, MUX_LEN) == 0) {
|
|
|
|
char *c = arg + MUX_LEN;
|
|
|
|
if (*c == '+') {
|
|
|
|
sep->se_type = MUXPLUS_TYPE;
|
|
|
|
c++;
|
|
|
|
} else
|
|
|
|
sep->se_type = MUX_TYPE;
|
|
|
|
sep->se_service = newstr(c);
|
|
|
|
} else {
|
|
|
|
sep->se_service = newstr(arg);
|
|
|
|
sep->se_type = NORM_TYPE;
|
|
|
|
}
|
|
|
|
arg = sskip(&cp);
|
|
|
|
if (strcmp(arg, "stream") == 0)
|
|
|
|
sep->se_socktype = SOCK_STREAM;
|
|
|
|
else if (strcmp(arg, "dgram") == 0)
|
|
|
|
sep->se_socktype = SOCK_DGRAM;
|
|
|
|
else if (strcmp(arg, "rdm") == 0)
|
|
|
|
sep->se_socktype = SOCK_RDM;
|
|
|
|
else if (strcmp(arg, "seqpacket") == 0)
|
|
|
|
sep->se_socktype = SOCK_SEQPACKET;
|
|
|
|
else if (strcmp(arg, "raw") == 0)
|
|
|
|
sep->se_socktype = SOCK_RAW;
|
|
|
|
else
|
|
|
|
sep->se_socktype = -1;
|
1998-05-14 20:26:16 +00:00
|
|
|
|
|
|
|
arg = sskip(&cp);
|
|
|
|
if (strcmp(arg, "tcp/ttcp") == 0) {
|
|
|
|
sep->se_type = TTCP_TYPE;
|
|
|
|
sep->se_proto = newstr("tcp");
|
|
|
|
} else {
|
|
|
|
sep->se_proto = newstr(arg);
|
|
|
|
}
|
1994-09-11 10:48:02 +00:00
|
|
|
if (strncmp(sep->se_proto, "rpc/", 4) == 0) {
|
1996-10-28 23:02:38 +00:00
|
|
|
memmove(sep->se_proto, sep->se_proto + 4,
|
|
|
|
strlen(sep->se_proto) + 1 - 4);
|
1994-09-11 10:48:02 +00:00
|
|
|
sep->se_rpc = 1;
|
|
|
|
sep->se_rpc_prog = sep->se_rpc_lowvers =
|
|
|
|
sep->se_rpc_lowvers = 0;
|
|
|
|
sep->se_ctrladdr.sin_family = AF_INET;
|
|
|
|
sep->se_ctrladdr.sin_port = 0;
|
1996-08-09 22:20:24 +00:00
|
|
|
sep->se_ctrladdr.sin_addr = bind_address;
|
1994-09-11 10:48:02 +00:00
|
|
|
if ((versp = rindex(sep->se_service, '/'))) {
|
|
|
|
*versp++ = '\0';
|
|
|
|
switch (sscanf(versp, "%d-%d",
|
|
|
|
&sep->se_rpc_lowvers,
|
|
|
|
&sep->se_rpc_highvers)) {
|
|
|
|
case 2:
|
|
|
|
break;
|
|
|
|
case 1:
|
|
|
|
sep->se_rpc_highvers =
|
|
|
|
sep->se_rpc_lowvers;
|
|
|
|
break;
|
|
|
|
default:
|
1995-05-30 03:57:47 +00:00
|
|
|
syslog(LOG_ERR,
|
|
|
|
"bad RPC version specifier; %s\n",
|
1994-09-11 10:48:02 +00:00
|
|
|
sep->se_service);
|
|
|
|
freeconfig(sep);
|
|
|
|
goto more;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
else {
|
|
|
|
sep->se_rpc_lowvers =
|
|
|
|
sep->se_rpc_highvers = 1;
|
|
|
|
}
|
|
|
|
}
|
1994-05-26 05:23:31 +00:00
|
|
|
arg = sskip(&cp);
|
1996-11-10 21:12:44 +00:00
|
|
|
if (!strncmp(arg, "wait", 4))
|
|
|
|
sep->se_accept = 0;
|
|
|
|
else if (!strncmp(arg, "nowait", 6))
|
|
|
|
sep->se_accept = 1;
|
|
|
|
else {
|
|
|
|
syslog(LOG_ERR,
|
|
|
|
"%s: bad wait/nowait for service %s",
|
|
|
|
CONFIG, sep->se_service);
|
|
|
|
goto more;
|
|
|
|
}
|
1999-06-21 11:17:34 +00:00
|
|
|
sep->se_maxchild = -1;
|
|
|
|
sep->se_maxcpm = -1;
|
1996-11-10 21:12:44 +00:00
|
|
|
if ((s = strchr(arg, '/')) != NULL) {
|
|
|
|
char *eptr;
|
|
|
|
u_long val;
|
|
|
|
|
|
|
|
val = strtoul(s + 1, &eptr, 10);
|
1997-10-29 21:49:04 +00:00
|
|
|
if (eptr == s + 1 || val > MAX_MAXCHLD) {
|
1996-11-10 21:12:44 +00:00
|
|
|
syslog(LOG_ERR,
|
|
|
|
"%s: bad max-child for service %s",
|
|
|
|
CONFIG, sep->se_service);
|
|
|
|
goto more;
|
|
|
|
}
|
1999-06-21 11:17:34 +00:00
|
|
|
if (debug)
|
|
|
|
if (!sep->se_accept && val != 1)
|
|
|
|
warnx("maxchild=%lu for wait service %s"
|
|
|
|
" not recommended", val, sep->se_service);
|
1996-11-10 21:12:44 +00:00
|
|
|
sep->se_maxchild = val;
|
1997-10-29 21:49:04 +00:00
|
|
|
if (*eptr == '/')
|
|
|
|
sep->se_maxcpm = strtol(eptr + 1, &eptr, 10);
|
|
|
|
/*
|
|
|
|
* explicitly do not check for \0 for future expansion /
|
|
|
|
* backwards compatibility
|
|
|
|
*/
|
1996-11-10 21:12:44 +00:00
|
|
|
}
|
1994-05-26 05:23:31 +00:00
|
|
|
if (ISMUX(sep)) {
|
|
|
|
/*
|
1996-11-10 21:12:44 +00:00
|
|
|
* Silently enforce "nowait" mode for TCPMUX services
|
|
|
|
* since they don't have an assigned port to listen on.
|
1994-05-26 05:23:31 +00:00
|
|
|
*/
|
1996-11-10 21:12:44 +00:00
|
|
|
sep->se_accept = 1;
|
1994-05-26 05:23:31 +00:00
|
|
|
if (strcmp(sep->se_proto, "tcp")) {
|
1995-05-30 03:57:47 +00:00
|
|
|
syslog(LOG_ERR,
|
1994-05-26 05:23:31 +00:00
|
|
|
"%s: bad protocol for tcpmux service %s",
|
|
|
|
CONFIG, sep->se_service);
|
|
|
|
goto more;
|
|
|
|
}
|
|
|
|
if (sep->se_socktype != SOCK_STREAM) {
|
1995-05-30 03:57:47 +00:00
|
|
|
syslog(LOG_ERR,
|
1994-05-26 05:23:31 +00:00
|
|
|
"%s: bad socket type for tcpmux service %s",
|
|
|
|
CONFIG, sep->se_service);
|
|
|
|
goto more;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
sep->se_user = newstr(sskip(&cp));
|
1997-10-27 22:03:47 +00:00
|
|
|
#ifdef LOGIN_CAP
|
|
|
|
if ((s = strrchr(sep->se_user, '/')) != NULL) {
|
|
|
|
*s = '\0';
|
|
|
|
sep->se_class = newstr(s + 1);
|
|
|
|
} else
|
|
|
|
sep->se_class = newstr(RESOURCE_RC);
|
|
|
|
#endif
|
1997-10-28 13:46:52 +00:00
|
|
|
if ((s = strrchr(sep->se_user, ':')) != NULL) {
|
|
|
|
*s = '\0';
|
|
|
|
sep->se_group = newstr(s + 1);
|
|
|
|
} else
|
|
|
|
sep->se_group = NULL;
|
1994-05-26 05:23:31 +00:00
|
|
|
sep->se_server = newstr(sskip(&cp));
|
1999-04-11 09:22:17 +00:00
|
|
|
if ((sep->se_server_name = rindex(sep->se_server, '/')))
|
|
|
|
sep->se_server_name++;
|
1994-05-26 05:23:31 +00:00
|
|
|
if (strcmp(sep->se_server, "internal") == 0) {
|
|
|
|
struct biltin *bi;
|
|
|
|
|
|
|
|
for (bi = biltins; bi->bi_service; bi++)
|
1999-07-02 16:21:13 +00:00
|
|
|
if ((bi->bi_socktype == sep->se_socktype &&
|
|
|
|
strcmp(bi->bi_service, sep->se_service) == 0) ||
|
|
|
|
matchservent(bi->bi_service, sep->se_service,
|
|
|
|
sep->se_proto))
|
1994-05-26 05:23:31 +00:00
|
|
|
break;
|
|
|
|
if (bi->bi_service == 0) {
|
|
|
|
syslog(LOG_ERR, "internal service %s unknown",
|
|
|
|
sep->se_service);
|
|
|
|
goto more;
|
|
|
|
}
|
1996-11-10 21:12:44 +00:00
|
|
|
sep->se_accept = 1; /* force accept mode for built-ins */
|
1994-05-26 05:23:31 +00:00
|
|
|
sep->se_bi = bi;
|
|
|
|
} else
|
|
|
|
sep->se_bi = NULL;
|
1999-06-21 11:17:34 +00:00
|
|
|
if (sep->se_maxcpm < 0)
|
|
|
|
sep->se_maxcpm = maxcpm;
|
1999-04-11 09:22:17 +00:00
|
|
|
if (sep->se_maxchild < 0) { /* apply default max-children */
|
1999-06-21 11:17:34 +00:00
|
|
|
if (sep->se_bi && sep->se_bi->bi_maxchild >= 0)
|
1996-11-10 21:12:44 +00:00
|
|
|
sep->se_maxchild = sep->se_bi->bi_maxchild;
|
1999-06-21 11:17:34 +00:00
|
|
|
else if (sep->se_accept)
|
|
|
|
sep->se_maxchild = maxchild > 0 ? maxchild : 0;
|
1996-11-10 21:12:44 +00:00
|
|
|
else
|
1999-06-21 11:17:34 +00:00
|
|
|
sep->se_maxchild = 1;
|
1999-04-11 09:22:17 +00:00
|
|
|
}
|
1996-11-10 21:12:44 +00:00
|
|
|
if (sep->se_maxchild) {
|
|
|
|
sep->se_pids = malloc(sep->se_maxchild * sizeof(*sep->se_pids));
|
|
|
|
if (sep->se_pids == NULL) {
|
|
|
|
syslog(LOG_ERR, "Out of memory.");
|
|
|
|
exit(EX_OSERR);
|
|
|
|
}
|
|
|
|
}
|
1994-05-26 05:23:31 +00:00
|
|
|
argc = 0;
|
|
|
|
for (arg = skip(&cp); cp; arg = skip(&cp))
|
1996-11-10 21:12:44 +00:00
|
|
|
if (argc < MAXARGV) {
|
1994-05-26 05:23:31 +00:00
|
|
|
sep->se_argv[argc++] = newstr(arg);
|
1996-11-10 21:12:44 +00:00
|
|
|
} else {
|
|
|
|
syslog(LOG_ERR,
|
|
|
|
"%s: too many arguments for service %s",
|
|
|
|
CONFIG, sep->se_service);
|
|
|
|
goto more;
|
|
|
|
}
|
1994-05-26 05:23:31 +00:00
|
|
|
while (argc <= MAXARGV)
|
|
|
|
sep->se_argv[argc++] = NULL;
|
|
|
|
return (sep);
|
|
|
|
}
|
|
|
|
|
|
|
|
void
|
|
|
|
freeconfig(cp)
|
|
|
|
struct servtab *cp;
|
|
|
|
{
|
|
|
|
int i;
|
|
|
|
|
|
|
|
if (cp->se_service)
|
|
|
|
free(cp->se_service);
|
|
|
|
if (cp->se_proto)
|
|
|
|
free(cp->se_proto);
|
|
|
|
if (cp->se_user)
|
|
|
|
free(cp->se_user);
|
1997-10-28 13:46:52 +00:00
|
|
|
if (cp->se_group)
|
|
|
|
free(cp->se_group);
|
1997-10-27 22:03:47 +00:00
|
|
|
#ifdef LOGIN_CAP
|
|
|
|
if (cp->se_class)
|
|
|
|
free(cp->se_class);
|
|
|
|
#endif
|
1994-05-26 05:23:31 +00:00
|
|
|
if (cp->se_server)
|
|
|
|
free(cp->se_server);
|
1996-11-10 21:12:44 +00:00
|
|
|
if (cp->se_pids)
|
|
|
|
free(cp->se_pids);
|
1994-05-26 05:23:31 +00:00
|
|
|
for (i = 0; i < MAXARGV; i++)
|
|
|
|
if (cp->se_argv[i])
|
|
|
|
free(cp->se_argv[i]);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Safe skip - if skip returns null, log a syntax error in the
|
|
|
|
* configuration file and exit.
|
|
|
|
*/
|
|
|
|
char *
|
|
|
|
sskip(cpp)
|
|
|
|
char **cpp;
|
|
|
|
{
|
|
|
|
char *cp;
|
|
|
|
|
|
|
|
cp = skip(cpp);
|
|
|
|
if (cp == NULL) {
|
|
|
|
syslog(LOG_ERR, "%s: syntax error", CONFIG);
|
1996-11-10 21:07:27 +00:00
|
|
|
exit(EX_DATAERR);
|
1994-05-26 05:23:31 +00:00
|
|
|
}
|
|
|
|
return (cp);
|
|
|
|
}
|
|
|
|
|
|
|
|
char *
|
|
|
|
skip(cpp)
|
|
|
|
char **cpp;
|
|
|
|
{
|
|
|
|
char *cp = *cpp;
|
|
|
|
char *start;
|
1995-10-30 14:03:00 +00:00
|
|
|
char quote = '\0';
|
1994-05-26 05:23:31 +00:00
|
|
|
|
|
|
|
again:
|
|
|
|
while (*cp == ' ' || *cp == '\t')
|
|
|
|
cp++;
|
|
|
|
if (*cp == '\0') {
|
|
|
|
int c;
|
|
|
|
|
|
|
|
c = getc(fconfig);
|
|
|
|
(void) ungetc(c, fconfig);
|
|
|
|
if (c == ' ' || c == '\t')
|
1996-11-10 21:07:27 +00:00
|
|
|
if ((cp = nextline(fconfig)))
|
1994-05-26 05:23:31 +00:00
|
|
|
goto again;
|
|
|
|
*cpp = (char *)0;
|
|
|
|
return ((char *)0);
|
|
|
|
}
|
1995-10-30 14:03:00 +00:00
|
|
|
if (*cp == '"' || *cp == '\'')
|
|
|
|
quote = *cp++;
|
1994-05-26 05:23:31 +00:00
|
|
|
start = cp;
|
1995-10-30 14:03:00 +00:00
|
|
|
if (quote)
|
|
|
|
while (*cp && *cp != quote)
|
|
|
|
cp++;
|
|
|
|
else
|
|
|
|
while (*cp && *cp != ' ' && *cp != '\t')
|
|
|
|
cp++;
|
1994-05-26 05:23:31 +00:00
|
|
|
if (*cp != '\0')
|
|
|
|
*cp++ = '\0';
|
|
|
|
*cpp = cp;
|
|
|
|
return (start);
|
|
|
|
}
|
|
|
|
|
|
|
|
char *
|
|
|
|
nextline(fd)
|
|
|
|
FILE *fd;
|
|
|
|
{
|
|
|
|
char *cp;
|
|
|
|
|
|
|
|
if (fgets(line, sizeof (line), fd) == NULL)
|
|
|
|
return ((char *)0);
|
|
|
|
cp = strchr(line, '\n');
|
|
|
|
if (cp)
|
|
|
|
*cp = '\0';
|
|
|
|
return (line);
|
|
|
|
}
|
|
|
|
|
|
|
|
char *
|
|
|
|
newstr(cp)
|
|
|
|
char *cp;
|
|
|
|
{
|
1996-11-10 21:07:27 +00:00
|
|
|
if ((cp = strdup(cp ? cp : "")))
|
1994-05-26 05:23:31 +00:00
|
|
|
return (cp);
|
|
|
|
syslog(LOG_ERR, "strdup: %m");
|
1996-11-10 21:07:27 +00:00
|
|
|
exit(EX_OSERR);
|
1994-05-26 05:23:31 +00:00
|
|
|
}
|
|
|
|
|
1996-01-01 08:42:23 +00:00
|
|
|
#ifdef OLD_SETPROCTITLE
|
1994-05-26 05:23:31 +00:00
|
|
|
void
|
1996-01-01 08:42:23 +00:00
|
|
|
inetd_setproctitle(a, s)
|
1994-05-26 05:23:31 +00:00
|
|
|
char *a;
|
|
|
|
int s;
|
|
|
|
{
|
|
|
|
int size;
|
|
|
|
char *cp;
|
|
|
|
struct sockaddr_in sin;
|
|
|
|
char buf[80];
|
|
|
|
|
|
|
|
cp = Argv[0];
|
|
|
|
size = sizeof(sin);
|
|
|
|
if (getpeername(s, (struct sockaddr *)&sin, &size) == 0)
|
1995-05-30 03:57:47 +00:00
|
|
|
(void) sprintf(buf, "-%s [%s]", a, inet_ntoa(sin.sin_addr));
|
1994-05-26 05:23:31 +00:00
|
|
|
else
|
1995-05-30 03:57:47 +00:00
|
|
|
(void) sprintf(buf, "-%s", a);
|
1994-05-26 05:23:31 +00:00
|
|
|
strncpy(cp, buf, LastArg - cp);
|
|
|
|
cp += strlen(cp);
|
|
|
|
while (cp < LastArg)
|
|
|
|
*cp++ = ' ';
|
|
|
|
}
|
1996-01-01 08:42:23 +00:00
|
|
|
#else
|
|
|
|
void
|
|
|
|
inetd_setproctitle(a, s)
|
|
|
|
char *a;
|
|
|
|
int s;
|
|
|
|
{
|
|
|
|
int size;
|
|
|
|
struct sockaddr_in sin;
|
|
|
|
char buf[80];
|
|
|
|
|
|
|
|
size = sizeof(sin);
|
|
|
|
if (getpeername(s, (struct sockaddr *)&sin, &size) == 0)
|
|
|
|
(void) sprintf(buf, "%s [%s]", a, inet_ntoa(sin.sin_addr));
|
|
|
|
else
|
|
|
|
(void) sprintf(buf, "%s", a);
|
|
|
|
setproctitle("%s", buf);
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
1994-05-26 05:23:31 +00:00
|
|
|
|
|
|
|
/*
|
|
|
|
* Internet services provided internally by inetd:
|
|
|
|
*/
|
|
|
|
|
1994-12-21 19:08:45 +00:00
|
|
|
int check_loop(sin, sep)
|
|
|
|
struct sockaddr_in *sin;
|
|
|
|
struct servtab *sep;
|
|
|
|
{
|
|
|
|
struct servtab *se2;
|
|
|
|
|
|
|
|
for (se2 = servtab; se2; se2 = se2->se_next) {
|
|
|
|
if (!se2->se_bi || se2->se_socktype != SOCK_DGRAM)
|
|
|
|
continue;
|
|
|
|
|
|
|
|
if (sin->sin_port == se2->se_ctrladdr.sin_port) {
|
|
|
|
syslog(LOG_WARNING,
|
|
|
|
"%s/%s:%s/%s loop request REFUSED from %s",
|
1995-05-30 03:57:47 +00:00
|
|
|
sep->se_service, sep->se_proto,
|
1994-12-21 19:08:45 +00:00
|
|
|
se2->se_service, se2->se_proto,
|
|
|
|
inet_ntoa(sin->sin_addr));
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
1994-05-26 05:23:31 +00:00
|
|
|
/*
|
|
|
|
* print_service:
|
|
|
|
* Dump relevant information to stderr
|
|
|
|
*/
|
|
|
|
void
|
|
|
|
print_service(action, sep)
|
|
|
|
char *action;
|
|
|
|
struct servtab *sep;
|
|
|
|
{
|
1996-11-10 21:07:27 +00:00
|
|
|
fprintf(stderr,
|
1997-10-27 22:03:47 +00:00
|
|
|
#ifdef LOGIN_CAP
|
1998-08-17 06:16:59 +00:00
|
|
|
"%s: %s proto=%s accept=%d max=%d user=%s group=%s class=%s builtin=%p server=%s\n",
|
1997-10-27 22:03:47 +00:00
|
|
|
#else
|
1998-08-17 06:16:59 +00:00
|
|
|
"%s: %s proto=%s accept=%d max=%d user=%s group=%s builtin=%p server=%s\n",
|
1997-10-27 22:03:47 +00:00
|
|
|
#endif
|
1996-11-10 21:07:27 +00:00
|
|
|
action, sep->se_service, sep->se_proto,
|
1997-10-28 13:46:52 +00:00
|
|
|
sep->se_accept, sep->se_maxchild, sep->se_user, sep->se_group,
|
1997-10-27 22:03:47 +00:00
|
|
|
#ifdef LOGIN_CAP
|
|
|
|
sep->se_class,
|
|
|
|
#endif
|
1998-08-18 02:10:05 +00:00
|
|
|
(void *) sep->se_bi, sep->se_server);
|
1994-05-26 05:23:31 +00:00
|
|
|
}
|
|
|
|
|
1997-10-29 21:49:04 +00:00
|
|
|
#define CPMHSIZE 256
|
|
|
|
#define CPMHMASK (CPMHSIZE-1)
|
|
|
|
#define CHTGRAN 10
|
|
|
|
#define CHTSIZE 6
|
|
|
|
|
|
|
|
typedef struct CTime {
|
|
|
|
unsigned long ct_Ticks;
|
|
|
|
int ct_Count;
|
|
|
|
} CTime;
|
|
|
|
|
|
|
|
typedef struct CHash {
|
|
|
|
struct in_addr ch_Addr;
|
|
|
|
time_t ch_LTime;
|
|
|
|
char *ch_Service;
|
|
|
|
CTime ch_Times[CHTSIZE];
|
|
|
|
} CHash;
|
|
|
|
|
|
|
|
CHash CHashAry[CPMHSIZE];
|
|
|
|
|
|
|
|
int
|
|
|
|
cpmip(sep, ctrl)
|
|
|
|
struct servtab *sep;
|
|
|
|
int ctrl;
|
|
|
|
{
|
|
|
|
struct sockaddr_in rsin;
|
|
|
|
int rsinLen = sizeof(rsin);
|
|
|
|
int r = 0;
|
|
|
|
|
|
|
|
/*
|
|
|
|
* If getpeername() fails, just let it through (if logging is
|
|
|
|
* enabled the condition is caught elsewhere)
|
|
|
|
*/
|
|
|
|
|
|
|
|
if (sep->se_maxcpm > 0 &&
|
|
|
|
getpeername(ctrl, (struct sockaddr *)&rsin, &rsinLen) == 0 ) {
|
|
|
|
time_t t = time(NULL);
|
|
|
|
int hv = 0xABC3D20F;
|
|
|
|
int i;
|
|
|
|
int cnt = 0;
|
|
|
|
CHash *chBest = NULL;
|
|
|
|
unsigned int ticks = t / CHTGRAN;
|
|
|
|
|
|
|
|
{
|
|
|
|
char *p;
|
|
|
|
int i;
|
|
|
|
|
|
|
|
for (i = 0, p = (char *)&rsin.sin_addr;
|
|
|
|
i < sizeof(rsin.sin_addr);
|
|
|
|
++i, ++p) {
|
|
|
|
hv = (hv << 5) ^ (hv >> 23) ^ *p;
|
|
|
|
}
|
|
|
|
hv = (hv ^ (hv >> 16));
|
|
|
|
}
|
|
|
|
for (i = 0; i < 5; ++i) {
|
|
|
|
CHash *ch = &CHashAry[(hv + i) & CPMHMASK];
|
|
|
|
|
|
|
|
if (rsin.sin_addr.s_addr == ch->ch_Addr.s_addr &&
|
|
|
|
ch->ch_Service && strcmp(sep->se_service,
|
|
|
|
ch->ch_Service) == 0) {
|
|
|
|
chBest = ch;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
if (chBest == NULL || ch->ch_LTime == 0 ||
|
|
|
|
ch->ch_LTime < chBest->ch_LTime) {
|
|
|
|
chBest = ch;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if (rsin.sin_addr.s_addr != chBest->ch_Addr.s_addr ||
|
|
|
|
chBest->ch_Service == NULL ||
|
|
|
|
strcmp(sep->se_service, chBest->ch_Service) != 0) {
|
|
|
|
chBest->ch_Addr = rsin.sin_addr;
|
|
|
|
if (chBest->ch_Service)
|
|
|
|
free(chBest->ch_Service);
|
|
|
|
chBest->ch_Service = strdup(sep->se_service);
|
|
|
|
bzero(chBest->ch_Times, sizeof(chBest->ch_Times));
|
|
|
|
}
|
|
|
|
chBest->ch_LTime = t;
|
|
|
|
{
|
|
|
|
CTime *ct = &chBest->ch_Times[ticks % CHTSIZE];
|
|
|
|
if (ct->ct_Ticks != ticks) {
|
|
|
|
ct->ct_Ticks = ticks;
|
|
|
|
ct->ct_Count = 0;
|
|
|
|
}
|
|
|
|
++ct->ct_Count;
|
|
|
|
}
|
|
|
|
for (i = 0; i < CHTSIZE; ++i) {
|
|
|
|
CTime *ct = &chBest->ch_Times[i];
|
|
|
|
if (ct->ct_Ticks <= ticks &&
|
|
|
|
ct->ct_Ticks >= ticks - CHTSIZE) {
|
|
|
|
cnt += ct->ct_Count;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if (cnt * (CHTSIZE * CHTGRAN) / 60 > sep->se_maxcpm) {
|
|
|
|
r = -1;
|
|
|
|
syslog(LOG_ERR,
|
1998-02-24 21:55:14 +00:00
|
|
|
"%s from %s exceeded counts/min (limit %d/min)",
|
|
|
|
sep->se_service, inet_ntoa(rsin.sin_addr),
|
|
|
|
sep->se_maxcpm);
|
1997-10-29 21:49:04 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
return(r);
|
|
|
|
}
|