| /* |
| * Routines for testing only. Not really industrial strength. |
| * |
| * Author: Wietse Venema, Eindhoven University of Technology, The Netherlands. |
| */ |
| |
| #ifndef lint |
| static char sccs_id[] = "@(#) scaffold.c 1.6 97/03/21 19:27:24"; |
| #endif |
| |
| /* System libraries. */ |
| |
| #include <sys/types.h> |
| #include <sys/stat.h> |
| #include <sys/socket.h> |
| #include <netinet/in.h> |
| #include <arpa/inet.h> |
| #include <netdb.h> |
| #include <stdio.h> |
| #include <stdlib.h> |
| #include <syslog.h> |
| #include <setjmp.h> |
| #include <string.h> |
| |
| #ifndef INADDR_NONE |
| #define INADDR_NONE (-1) /* XXX should be 0xffffffff */ |
| #endif |
| |
| #ifndef INET6 |
| extern char *malloc(); |
| #endif |
| |
| /* Application-specific. */ |
| |
| #include "tcpd.h" |
| #include "scaffold.h" |
| |
| /* |
| * These are referenced by the options module and by rfc931.c. |
| */ |
| int allow_severity = SEVERITY; |
| int deny_severity = LOG_WARNING; |
| int rfc931_timeout = RFC931_TIMEOUT; |
| |
| #ifndef INET6 |
| /* dup_hostent - create hostent in one memory block */ |
| |
| static struct hostent *dup_hostent(hp) |
| struct hostent *hp; |
| { |
| struct hostent_block { |
| struct hostent host; |
| char *addr_list[1]; |
| }; |
| struct hostent_block *hb; |
| int count; |
| char *data; |
| char *addr; |
| |
| for (count = 0; hp->h_addr_list[count] != 0; count++) |
| /* void */ ; |
| |
| if ((hb = (struct hostent_block *) malloc(sizeof(struct hostent_block) |
| + (hp->h_length + sizeof(char *)) * count)) == 0) { |
| fprintf(stderr, "Sorry, out of memory\n"); |
| exit(1); |
| } |
| memset((char *) &hb->host, 0, sizeof(hb->host)); |
| hb->host.h_length = hp->h_length; |
| hb->host.h_addr_list = hb->addr_list; |
| hb->host.h_addr_list[count] = 0; |
| data = (char *) (hb->host.h_addr_list + count + 1); |
| |
| for (count = 0; (addr = hp->h_addr_list[count]) != 0; count++) { |
| hb->host.h_addr_list[count] = data + hp->h_length * count; |
| memcpy(hb->host.h_addr_list[count], addr, hp->h_length); |
| } |
| return (&hb->host); |
| } |
| #endif |
| |
| /* find_inet_addr - find all addresses for this host, result to free() */ |
| |
| #ifdef INET6 |
| struct addrinfo *find_inet_addr(host) |
| char *host; |
| { |
| struct addrinfo hints, *res; |
| |
| memset(&hints, 0, sizeof(hints)); |
| hints.ai_family = PF_UNSPEC; |
| hints.ai_socktype = SOCK_STREAM; |
| hints.ai_flags = AI_PASSIVE | AI_NUMERICHOST; |
| if (getaddrinfo(host, NULL, &hints, &res) == 0) |
| return (res); |
| |
| memset(&hints, 0, sizeof(hints)); |
| hints.ai_family = PF_UNSPEC; |
| hints.ai_socktype = SOCK_STREAM; |
| hints.ai_flags = AI_PASSIVE | AI_CANONNAME; |
| if (getaddrinfo(host, NULL, &hints, &res) != 0) { |
| tcpd_warn("%s: host not found", host); |
| return (0); |
| } |
| if (res->ai_family != AF_INET6 && res->ai_family != AF_INET) { |
| tcpd_warn("%d: not an internet host", res->ai_family); |
| freeaddrinfo(res); |
| return (0); |
| } |
| if (!res->ai_canonname) { |
| tcpd_warn("%s: hostname alias", host); |
| tcpd_warn("(cannot obtain official name)", res->ai_canonname); |
| } else if (STR_NE(host, res->ai_canonname)) { |
| tcpd_warn("%s: hostname alias", host); |
| tcpd_warn("(official name: %.*s)", STRING_LENGTH, res->ai_canonname); |
| } |
| return (res); |
| } |
| #else |
| struct hostent *find_inet_addr(host) |
| char *host; |
| { |
| struct in_addr addr; |
| struct hostent *hp; |
| static struct hostent h; |
| static char *addr_list[2]; |
| |
| /* |
| * Host address: translate it to internal form. |
| */ |
| if ((addr.s_addr = dot_quad_addr(host)) != INADDR_NONE) { |
| h.h_addr_list = addr_list; |
| h.h_addr_list[0] = (char *) &addr; |
| h.h_length = sizeof(addr); |
| return (dup_hostent(&h)); |
| } |
| |
| /* |
| * Map host name to a series of addresses. Watch out for non-internet |
| * forms or aliases. The NOT_INADDR() is here in case gethostbyname() has |
| * been "enhanced" to accept numeric addresses. Make a copy of the |
| * address list so that later gethostbyXXX() calls will not clobber it. |
| */ |
| if (NOT_INADDR(host) == 0) { |
| tcpd_warn("%s: not an internet address", host); |
| return (0); |
| } |
| if ((hp = gethostbyname(host)) == 0) { |
| tcpd_warn("%s: host not found", host); |
| return (0); |
| } |
| if (hp->h_addrtype != AF_INET) { |
| tcpd_warn("%d: not an internet host", hp->h_addrtype); |
| return (0); |
| } |
| if (STR_NE(host, hp->h_name)) { |
| tcpd_warn("%s: hostname alias", host); |
| tcpd_warn("(official name: %.*s)", STRING_LENGTH, hp->h_name); |
| } |
| return (dup_hostent(hp)); |
| } |
| #endif |
| |
| /* check_dns - give each address thorough workout, return address count */ |
| |
| int check_dns(host) |
| char *host; |
| { |
| struct request_info request; |
| #ifdef INET6 |
| struct sockaddr_storage sin; |
| struct addrinfo *hp, *res; |
| #else |
| struct sockaddr_in sin; |
| struct hostent *hp; |
| #endif |
| int count; |
| char *addr; |
| |
| if ((hp = find_inet_addr(host)) == 0) |
| return (0); |
| request_init(&request, RQ_CLIENT_SIN, &sin, 0); |
| sock_methods(&request); |
| #ifndef INET6 |
| memset((char *) &sin, 0, sizeof(sin)); |
| sin.sin_family = AF_INET; |
| #endif |
| |
| #ifdef INET6 |
| for (res = hp, count = 0; res; res = res->ai_next, count++) { |
| memcpy(&sin, res->ai_addr, res->ai_addrlen); |
| #else |
| for (count = 0; (addr = hp->h_addr_list[count]) != 0; count++) { |
| memcpy((char *) &sin.sin_addr, addr, sizeof(sin.sin_addr)); |
| #endif |
| |
| /* |
| * Force host name and address conversions. Use the request structure |
| * as a cache. Detect hostname lookup problems. Any name/name or |
| * name/address conflicts will be reported while eval_hostname() does |
| * its job. |
| */ |
| request_set(&request, RQ_CLIENT_ADDR, "", RQ_CLIENT_NAME, "", 0); |
| if (STR_EQ(eval_hostname(request.client), unknown)) |
| tcpd_warn("host address %s->name lookup failed", |
| eval_hostaddr(request.client)); |
| } |
| #ifdef INET6 |
| freeaddrinfo(hp); |
| #else |
| free((char *) hp); |
| #endif |
| return (count); |
| } |
| |
| /* dummy function to intercept the real shell_cmd() */ |
| |
| /* ARGSUSED */ |
| |
| void shell_cmd(command) |
| char *command; |
| { |
| if (hosts_access_verbose) |
| printf("command: %s", command); |
| } |
| |
| /* dummy function to intercept the real clean_exit() */ |
| |
| /* ARGSUSED */ |
| |
| void clean_exit(request) |
| struct request_info *request; |
| { |
| exit(0); |
| } |
| |
| /* dummy function to intercept the real rfc931() */ |
| |
| /* ARGSUSED */ |
| |
| void rfc931(rmt_sin, our_sin, dest) |
| #ifdef INET6 |
| struct sockaddr *rmt_sin; |
| struct sockaddr *our_sin; |
| #else |
| struct sockaddr_in *rmt_sin; |
| struct sockaddr_in *our_sin; |
| #endif |
| char *dest; |
| { |
| strcpy(dest, unknown); |
| } |
| |
| /* check_path - examine accessibility */ |
| |
| int check_path(path, st) |
| char *path; |
| struct stat *st; |
| { |
| struct stat stbuf; |
| char buf[BUFSIZ]; |
| |
| if (stat(path, st) < 0) |
| return (-1); |
| #ifdef notdef |
| if (st->st_uid != 0) |
| tcpd_warn("%s: not owned by root", path); |
| if (st->st_mode & 020) |
| tcpd_warn("%s: group writable", path); |
| #endif |
| if (st->st_mode & 002) |
| tcpd_warn("%s: world writable", path); |
| if (path[0] == '/' && path[1] != 0) { |
| strrchr(strcpy(buf, path), '/')[0] = 0; |
| (void) check_path(buf[0] ? buf : "/", &stbuf); |
| } |
| return (0); |
| } |