| 1 | /* $NetBSD: identd.c,v 1.36 2016/12/10 22:08:13 christos Exp $ */ |
| 2 | |
| 3 | /* |
| 4 | * identd.c - TCP/IP Ident protocol server. |
| 5 | * |
| 6 | * This software is in the public domain. |
| 7 | * Written by Peter Postma <peter@NetBSD.org> |
| 8 | */ |
| 9 | |
| 10 | #include <sys/cdefs.h> |
| 11 | __RCSID("$NetBSD: identd.c,v 1.36 2016/12/10 22:08:13 christos Exp $" ); |
| 12 | |
| 13 | #include <sys/param.h> |
| 14 | #include <sys/socket.h> |
| 15 | #include <sys/stat.h> |
| 16 | #include <sys/sysctl.h> |
| 17 | |
| 18 | #include <netinet/in.h> |
| 19 | #include <netinet/ip_var.h> |
| 20 | #include <netinet/tcp.h> |
| 21 | #include <netinet/tcp_timer.h> |
| 22 | #include <netinet/tcp_var.h> |
| 23 | |
| 24 | #include <arpa/inet.h> |
| 25 | |
| 26 | #include <ctype.h> |
| 27 | #include <err.h> |
| 28 | #include <errno.h> |
| 29 | #include <fcntl.h> |
| 30 | #include <grp.h> |
| 31 | #include <netdb.h> |
| 32 | #include <poll.h> |
| 33 | #include <pwd.h> |
| 34 | #include <signal.h> |
| 35 | #include <stdarg.h> |
| 36 | #include <stdio.h> |
| 37 | #include <stdlib.h> |
| 38 | #include <string.h> |
| 39 | #include <syslog.h> |
| 40 | #include <unistd.h> |
| 41 | |
| 42 | #include "identd.h" |
| 43 | |
| 44 | #define OPSYS_NAME "UNIX" |
| 45 | #define IDENT_SERVICE "auth" |
| 46 | #define TIMEOUT 30 /* seconds */ |
| 47 | |
| 48 | static int idhandle(int, const char *, const char *, const char *, |
| 49 | const char *, struct sockaddr *, int); |
| 50 | static void idparse(int, int, int, const char *, const char *, const char *); |
| 51 | static void iderror(int, int, int, const char *); |
| 52 | static const char *gethost(struct sockaddr *); |
| 53 | static int *socketsetup(const char *, const char *, int); |
| 54 | static int ident_getuid(struct sockaddr_storage *, socklen_t, |
| 55 | struct sockaddr *, uid_t *); |
| 56 | static int sysctl_getuid(struct sockaddr_storage *, socklen_t, uid_t *); |
| 57 | static int sysctl_proxy_getuid(struct sockaddr_storage *, |
| 58 | struct sockaddr *, uid_t *); |
| 59 | static int forward(int, struct sockaddr *, int, int, int); |
| 60 | static int check_noident(const char *); |
| 61 | static int check_userident(const char *, char *, size_t); |
| 62 | static void random_string(char *, size_t); |
| 63 | static int change_format(const char *, struct passwd *, char *, size_t); |
| 64 | __dead static void timeout_handler(int); |
| 65 | __dead static void fatal(const char *); |
| 66 | __dead static void die(const char *, ...) __printflike(1, 2); |
| 67 | |
| 68 | static int bflag, dflag, eflag, fflag, iflag, Iflag; |
| 69 | static int lflag, Lflag, nflag, Nflag, rflag; |
| 70 | |
| 71 | /* NAT lookup function pointer. */ |
| 72 | typedef int (*nat_lookup_t)(const struct sockaddr_storage *, |
| 73 | struct sockaddr_storage *, in_port_t *); |
| 74 | |
| 75 | static nat_lookup_t nat_lookup; |
| 76 | |
| 77 | /* Packet filters. */ |
| 78 | static const struct { |
| 79 | const char *name; |
| 80 | nat_lookup_t fn; |
| 81 | } filters[] = { |
| 82 | #ifdef WITH_PF |
| 83 | { "pf" , pf_natlookup }, |
| 84 | #endif |
| 85 | #ifdef WITH_IPF |
| 86 | { "ipfilter" , ipf_natlookup }, |
| 87 | #endif |
| 88 | #ifdef WITH_NPF |
| 89 | { "npf" , npf_natlookup }, |
| 90 | #endif |
| 91 | { NULL, NULL } |
| 92 | }; |
| 93 | |
| 94 | int |
| 95 | main(int argc, char *argv[]) |
| 96 | { |
| 97 | int IPv4or6, ch, error, i, *socks, timeout; |
| 98 | const char *filter, *osname, *portno, *proxy; |
| 99 | char *address, *charset, *fmt, *p; |
| 100 | char user[LOGIN_NAME_MAX]; |
| 101 | struct addrinfo *ai, hints; |
| 102 | struct sockaddr *proxy_addr; |
| 103 | struct group *grp; |
| 104 | struct passwd *pw; |
| 105 | gid_t gid; |
| 106 | uid_t uid; |
| 107 | |
| 108 | socks = NULL; |
| 109 | IPv4or6 = AF_UNSPEC; |
| 110 | osname = OPSYS_NAME; |
| 111 | portno = IDENT_SERVICE; |
| 112 | timeout = TIMEOUT; |
| 113 | nat_lookup = NULL; |
| 114 | proxy_addr = NULL; |
| 115 | filter = proxy = NULL; |
| 116 | address = charset = fmt = NULL; |
| 117 | uid = gid = 0; |
| 118 | bflag = dflag = eflag = fflag = iflag = Iflag = 0; |
| 119 | lflag = Lflag = nflag = Nflag = rflag = 0; |
| 120 | |
| 121 | /* Started from a tty? then run as daemon. */ |
| 122 | if (isatty(STDIN_FILENO)) |
| 123 | bflag = 1; |
| 124 | |
| 125 | /* Parse command line arguments. */ |
| 126 | while ((ch = getopt(argc, argv, |
| 127 | "46a:bcdeF:f:g:IiL:lm:Nno:P:p:rt:u:" )) != -1) { |
| 128 | switch (ch) { |
| 129 | case '4': |
| 130 | IPv4or6 = AF_INET; |
| 131 | break; |
| 132 | case '6': |
| 133 | IPv4or6 = AF_INET6; |
| 134 | break; |
| 135 | case 'a': |
| 136 | address = optarg; |
| 137 | break; |
| 138 | case 'b': |
| 139 | bflag = 1; |
| 140 | break; |
| 141 | case 'c': |
| 142 | charset = optarg; |
| 143 | break; |
| 144 | case 'd': |
| 145 | dflag++; |
| 146 | break; |
| 147 | case 'e': |
| 148 | eflag = 1; |
| 149 | break; |
| 150 | case 'F': |
| 151 | fmt = optarg; |
| 152 | break; |
| 153 | case 'f': |
| 154 | fflag = 1; |
| 155 | (void)strlcpy(user, optarg, sizeof(user)); |
| 156 | break; |
| 157 | case 'g': |
| 158 | gid = (gid_t)strtol(optarg, &p, 0); |
| 159 | if (*p != '\0') { |
| 160 | if ((grp = getgrnam(optarg)) != NULL) |
| 161 | gid = grp->gr_gid; |
| 162 | else |
| 163 | die("No such group `%s'" , optarg); |
| 164 | } |
| 165 | break; |
| 166 | case 'I': |
| 167 | Iflag = 1; |
| 168 | /* FALLTHROUGH */ |
| 169 | case 'i': |
| 170 | iflag = 1; |
| 171 | break; |
| 172 | case 'L': |
| 173 | Lflag = 1; |
| 174 | (void)strlcpy(user, optarg, sizeof(user)); |
| 175 | break; |
| 176 | case 'l': |
| 177 | if (!lflag) |
| 178 | openlog("identd" , LOG_PID, LOG_DAEMON); |
| 179 | lflag = 1; |
| 180 | break; |
| 181 | case 'm': |
| 182 | filter = optarg; |
| 183 | break; |
| 184 | case 'N': |
| 185 | Nflag = 1; |
| 186 | break; |
| 187 | case 'n': |
| 188 | nflag = 1; |
| 189 | break; |
| 190 | case 'o': |
| 191 | osname = optarg; |
| 192 | break; |
| 193 | case 'P': |
| 194 | proxy = optarg; |
| 195 | break; |
| 196 | case 'p': |
| 197 | portno = optarg; |
| 198 | break; |
| 199 | case 'r': |
| 200 | rflag = 1; |
| 201 | break; |
| 202 | case 't': |
| 203 | timeout = (int)strtol(optarg, &p, 0); |
| 204 | if (*p != '\0' || timeout < 1) |
| 205 | die("Invalid timeout value `%s'" , optarg); |
| 206 | break; |
| 207 | case 'u': |
| 208 | uid = (uid_t)strtol(optarg, &p, 0); |
| 209 | if (*p != '\0') { |
| 210 | if ((pw = getpwnam(optarg)) != NULL) { |
| 211 | uid = pw->pw_uid; |
| 212 | gid = pw->pw_gid; |
| 213 | } else |
| 214 | die("No such user `%s'" , optarg); |
| 215 | } |
| 216 | break; |
| 217 | default: |
| 218 | exit(EXIT_FAILURE); |
| 219 | } |
| 220 | } |
| 221 | |
| 222 | /* Verify proxy address, if enabled. */ |
| 223 | if (proxy != NULL) { |
| 224 | (void)memset(&hints, 0, sizeof(hints)); |
| 225 | hints.ai_family = IPv4or6; |
| 226 | hints.ai_socktype = SOCK_STREAM; |
| 227 | error = getaddrinfo(proxy, NULL, &hints, &ai); |
| 228 | if (error != 0) |
| 229 | die("Bad proxy `%s': %s" , proxy, gai_strerror(error)); |
| 230 | if (ai->ai_next != NULL) |
| 231 | die("Bad proxy `%s': resolves to multiple addresses" , |
| 232 | proxy); |
| 233 | proxy_addr = ai->ai_addr; |
| 234 | } |
| 235 | |
| 236 | /* Verify filter, if enabled. */ |
| 237 | if (filter != NULL) { |
| 238 | for (i = 0; filters[i].name != NULL; i++) { |
| 239 | if (strcasecmp(filter, filters[i].name) == 0) { |
| 240 | nat_lookup = filters[i].fn; |
| 241 | break; |
| 242 | } |
| 243 | } |
| 244 | if (nat_lookup == NULL) |
| 245 | die("Packet filter `%s' is not supported" , filter); |
| 246 | } |
| 247 | |
| 248 | /* Setup sockets when running in the background. */ |
| 249 | if (bflag) |
| 250 | socks = socketsetup(address, portno, IPv4or6); |
| 251 | |
| 252 | /* Switch to another uid/gid? */ |
| 253 | if (gid && setgid(gid) == -1) |
| 254 | die("Failed to set GID to `%d': %s" , gid, strerror(errno)); |
| 255 | if (uid && setuid(uid) == -1) |
| 256 | die("Failed to set UID to `%d': %s" , uid, strerror(errno)); |
| 257 | |
| 258 | /* |
| 259 | * When running as daemon: daemonize, setup pollfds and go into |
| 260 | * the mainloop. Otherwise, just read the input from stdin and |
| 261 | * let inetd handle the sockets. |
| 262 | */ |
| 263 | if (bflag) { |
| 264 | int fd, nfds, rv; |
| 265 | struct pollfd *rfds; |
| 266 | |
| 267 | if (!dflag && daemon(0, 0) < 0) |
| 268 | die("daemon: %s" , strerror(errno)); |
| 269 | |
| 270 | rfds = malloc(*socks * sizeof(struct pollfd)); |
| 271 | if (rfds == NULL) |
| 272 | fatal("malloc" ); |
| 273 | nfds = *socks; |
| 274 | for (i = 0; i < nfds; i++) { |
| 275 | rfds[i].fd = socks[i+1]; |
| 276 | rfds[i].events = POLLIN; |
| 277 | rfds[i].revents = 0; |
| 278 | } |
| 279 | /* Mainloop for daemon. */ |
| 280 | for (;;) { |
| 281 | rv = poll(rfds, nfds, INFTIM); |
| 282 | if (rv < 0) { |
| 283 | if (errno == EINTR) |
| 284 | continue; |
| 285 | fatal("poll" ); |
| 286 | } |
| 287 | for (i = 0; i < nfds; i++) { |
| 288 | if (rfds[i].revents & POLLIN) { |
| 289 | fd = accept(rfds[i].fd, NULL, NULL); |
| 290 | if (fd < 0) { |
| 291 | maybe_syslog(LOG_ERR, |
| 292 | "accept: %m" ); |
| 293 | continue; |
| 294 | } |
| 295 | switch (fork()) { |
| 296 | case -1: /* error */ |
| 297 | maybe_syslog(LOG_ERR, |
| 298 | "fork: %m" ); |
| 299 | (void)sleep(1); |
| 300 | break; |
| 301 | case 0: /* child */ |
| 302 | (void)idhandle(fd, charset, |
| 303 | fmt, osname, user, |
| 304 | proxy_addr, timeout); |
| 305 | _exit(EXIT_SUCCESS); |
| 306 | default: /* parent */ |
| 307 | (void)signal(SIGCHLD, SIG_IGN); |
| 308 | (void)close(fd); |
| 309 | } |
| 310 | } |
| 311 | } |
| 312 | } |
| 313 | } else |
| 314 | (void)idhandle(STDIN_FILENO, charset, fmt, osname, user, |
| 315 | proxy_addr, timeout); |
| 316 | |
| 317 | return 0; |
| 318 | } |
| 319 | |
| 320 | /* |
| 321 | * Handle a request on the ident port. Returns 0 on success or 1 on |
| 322 | * failure. The return values are currently ignored. |
| 323 | */ |
| 324 | static int |
| 325 | idhandle(int fd, const char *charset, const char *fmt, const char *osname, |
| 326 | const char *user, struct sockaddr *proxy, int timeout) |
| 327 | { |
| 328 | struct sockaddr_storage ss[2]; |
| 329 | char userbuf[LOGIN_NAME_MAX]; /* actual user name (or numeric uid) */ |
| 330 | char idbuf[LOGIN_NAME_MAX]; /* name to be used in response */ |
| 331 | char buf[BUFSIZ], *p; |
| 332 | struct passwd *pw; |
| 333 | int lport, fport; |
| 334 | socklen_t len; |
| 335 | uid_t uid; |
| 336 | ssize_t n; |
| 337 | size_t qlen; |
| 338 | |
| 339 | lport = fport = 0; |
| 340 | |
| 341 | (void)strlcpy(idbuf, user, sizeof(idbuf)); |
| 342 | (void)signal(SIGALRM, timeout_handler); |
| 343 | (void)alarm(timeout); |
| 344 | |
| 345 | /* Get foreign internet address. */ |
| 346 | len = sizeof(ss[0]); |
| 347 | if (getpeername(fd, (struct sockaddr *)&ss[0], &len) < 0) |
| 348 | fatal("getpeername" ); |
| 349 | |
| 350 | maybe_syslog(LOG_INFO, "Connection from %s" , |
| 351 | gethost((struct sockaddr *)&ss[0])); |
| 352 | |
| 353 | /* Get local internet address. */ |
| 354 | len = sizeof(ss[1]); |
| 355 | if (getsockname(fd, (struct sockaddr *)&ss[1], &len) < 0) |
| 356 | fatal("getsockname" ); |
| 357 | |
| 358 | /* Be sure to have the same address families. */ |
| 359 | if (ss[0].ss_family != ss[1].ss_family) { |
| 360 | maybe_syslog(LOG_ERR, "Different foreign/local address family" ); |
| 361 | return 1; |
| 362 | } |
| 363 | |
| 364 | /* Receive data from the client. */ |
| 365 | qlen = 0; |
| 366 | for (;;) { |
| 367 | if ((n = recv(fd, &buf[qlen], sizeof(buf) - qlen, 0)) < 0) { |
| 368 | fatal("recv" ); |
| 369 | } else if (n == 0) { |
| 370 | maybe_syslog(LOG_NOTICE, "recv: EOF" ); |
| 371 | iderror(fd, 0, 0, "UNKNOWN-ERROR" ); |
| 372 | return 1; |
| 373 | } |
| 374 | /* |
| 375 | * 1413 is not clear on what to do if data follows the first |
| 376 | * CRLF before we respond. We do not consider the query |
| 377 | * complete until we get a CRLF _at the end of the buffer_. |
| 378 | */ |
| 379 | qlen += n; |
| 380 | if (qlen >= sizeof(buf)) { |
| 381 | maybe_syslog(LOG_NOTICE, "recv: message too long" ); |
| 382 | exit(0); |
| 383 | } |
| 384 | if ((qlen >= 2) && (buf[qlen - 2] == '\r') && |
| 385 | (buf[qlen - 1] == '\n')) |
| 386 | break; |
| 387 | } |
| 388 | buf[qlen - 2] = '\0'; |
| 389 | |
| 390 | /* Get local and remote ports from the received data. */ |
| 391 | p = buf; |
| 392 | while (*p != '\0' && isspace((unsigned char)*p)) |
| 393 | p++; |
| 394 | if ((p = strtok(p, " \t," )) != NULL) { |
| 395 | lport = atoi(p); |
| 396 | if ((p = strtok(NULL, " \t," )) != NULL) |
| 397 | fport = atoi(p); |
| 398 | } |
| 399 | |
| 400 | /* Are the ports valid? */ |
| 401 | if (lport < 1 || lport > 65535 || fport < 1 || fport > 65535) { |
| 402 | maybe_syslog(LOG_NOTICE, "Invalid port(s): %d, %d from %s" , |
| 403 | lport, fport, gethost((struct sockaddr *)&ss[0])); |
| 404 | iderror(fd, 0, 0, eflag ? "UNKNOWN-ERROR" : "INVALID-PORT" ); |
| 405 | return 1; |
| 406 | } |
| 407 | |
| 408 | /* If there is a 'lie' user enabled, then handle it now and stop. */ |
| 409 | if (Lflag) { |
| 410 | maybe_syslog(LOG_NOTICE, "Lying with name %s to %s" , |
| 411 | idbuf, gethost((struct sockaddr *)&ss[0])); |
| 412 | idparse(fd, lport, fport, charset, osname, idbuf); |
| 413 | return 0; |
| 414 | } |
| 415 | |
| 416 | /* Protocol dependent stuff. */ |
| 417 | switch (ss[0].ss_family) { |
| 418 | case AF_INET: |
| 419 | satosin(&ss[0])->sin_port = htons(fport); |
| 420 | satosin(&ss[1])->sin_port = htons(lport); |
| 421 | break; |
| 422 | case AF_INET6: |
| 423 | satosin6(&ss[0])->sin6_port = htons(fport); |
| 424 | satosin6(&ss[1])->sin6_port = htons(lport); |
| 425 | break; |
| 426 | default: |
| 427 | maybe_syslog(LOG_ERR, "Unsupported protocol (no. %d)" , |
| 428 | ss[0].ss_family); |
| 429 | return 1; |
| 430 | } |
| 431 | |
| 432 | /* Try to get the UID of the connection owner using sysctl. */ |
| 433 | if (ident_getuid(ss, sizeof(ss), proxy, &uid) == -1) { |
| 434 | /* Lookup failed, try to forward if enabled. */ |
| 435 | if (nat_lookup != NULL) { |
| 436 | struct sockaddr_storage nat_addr; |
| 437 | in_port_t nat_lport; |
| 438 | |
| 439 | (void)memset(&nat_addr, 0, sizeof(nat_addr)); |
| 440 | if ((*nat_lookup)(ss, &nat_addr, &nat_lport) && |
| 441 | forward(fd, (struct sockaddr *)&nat_addr, |
| 442 | nat_lport, fport, lport)) { |
| 443 | maybe_syslog(LOG_INFO, |
| 444 | "Succesfully forwarded the request to %s" , |
| 445 | gethost((struct sockaddr *)&nat_addr)); |
| 446 | return 0; |
| 447 | } |
| 448 | } |
| 449 | /* Fall back to a default name? */ |
| 450 | if (fflag) { |
| 451 | maybe_syslog(LOG_NOTICE, "Using fallback name %s to %s" , |
| 452 | idbuf, gethost((struct sockaddr *)&ss[0])); |
| 453 | idparse(fd, lport, fport, charset, osname, idbuf); |
| 454 | return 0; |
| 455 | } |
| 456 | maybe_syslog(LOG_ERR, "Lookup failed, returning error to %s" , |
| 457 | gethost((struct sockaddr *)&ss[0])); |
| 458 | iderror(fd, lport, fport, eflag ? "UNKNOWN-ERROR" : "NO-USER" ); |
| 459 | return 1; |
| 460 | } |
| 461 | |
| 462 | /* Fill in userbuf with user name if possible, else numeric UID. */ |
| 463 | if ((pw = getpwuid(uid)) == NULL) { |
| 464 | maybe_syslog(LOG_ERR, "Couldn't map uid (%u) to name" , uid); |
| 465 | (void)snprintf(userbuf, sizeof(userbuf), "%u" , uid); |
| 466 | } else { |
| 467 | maybe_syslog(LOG_INFO, "Successful lookup: %d, %d: %s for %s" , |
| 468 | lport, fport, pw->pw_name, |
| 469 | gethost((struct sockaddr *)&ss[0])); |
| 470 | (void)strlcpy(userbuf, pw->pw_name, sizeof(userbuf)); |
| 471 | } |
| 472 | |
| 473 | /* No ident enabled? */ |
| 474 | if (Nflag && pw && check_noident(pw->pw_dir)) { |
| 475 | maybe_syslog(LOG_NOTICE, "Returning HIDDEN-USER for user %s" |
| 476 | " to %s" , pw->pw_name, gethost((struct sockaddr *)&ss[0])); |
| 477 | iderror(fd, lport, fport, "HIDDEN-USER" ); |
| 478 | return 1; |
| 479 | } |
| 480 | |
| 481 | /* User ident enabled? */ |
| 482 | if (iflag && pw && check_userident(pw->pw_dir, idbuf, sizeof(idbuf))) { |
| 483 | if (!Iflag) { |
| 484 | if ((strspn(idbuf, "0123456789" ) && |
| 485 | getpwuid(atoi(idbuf)) != NULL) || |
| 486 | (getpwnam(idbuf) != NULL)) { |
| 487 | maybe_syslog(LOG_NOTICE, |
| 488 | "Ignoring user-specified '%s' for user %s" , |
| 489 | idbuf, userbuf); |
| 490 | (void)strlcpy(idbuf, userbuf, sizeof(idbuf)); |
| 491 | } |
| 492 | } |
| 493 | maybe_syslog(LOG_NOTICE, |
| 494 | "Returning user-specified '%s' for user %s to %s" , |
| 495 | idbuf, userbuf, gethost((struct sockaddr *)&ss[0])); |
| 496 | idparse(fd, lport, fport, charset, osname, idbuf); |
| 497 | return 0; |
| 498 | } |
| 499 | |
| 500 | /* Send a random message? */ |
| 501 | if (rflag) { |
| 502 | /* Random number or string? */ |
| 503 | if (nflag) |
| 504 | (void)snprintf(idbuf, sizeof(idbuf), "%u" , |
| 505 | (unsigned int)(arc4random() % 65535)); |
| 506 | else |
| 507 | random_string(idbuf, sizeof(idbuf)); |
| 508 | |
| 509 | maybe_syslog(LOG_NOTICE, |
| 510 | "Returning random '%s' for user %s to %s" , |
| 511 | idbuf, userbuf, gethost((struct sockaddr *)&ss[0])); |
| 512 | idparse(fd, lport, fport, charset, osname, idbuf); |
| 513 | return 0; |
| 514 | } |
| 515 | |
| 516 | /* Return numberic user ID? */ |
| 517 | if (nflag) |
| 518 | (void)snprintf(idbuf, sizeof(idbuf), "%u" , uid); |
| 519 | else |
| 520 | (void)strlcpy(idbuf, userbuf, sizeof(idbuf)); |
| 521 | |
| 522 | /* |
| 523 | * Change the output format? Note that 512 is the maximum |
| 524 | * size of the result according to RFC 1413. |
| 525 | */ |
| 526 | if (fmt && change_format(fmt, pw, buf, 512 + 1)) |
| 527 | idparse(fd, lport, fport, charset, osname, buf); |
| 528 | else |
| 529 | idparse(fd, lport, fport, charset, osname, idbuf); |
| 530 | |
| 531 | return 0; |
| 532 | } |
| 533 | |
| 534 | /* Send/parse the ident result. */ |
| 535 | static void |
| 536 | idparse(int fd, int lport, int fport, const char *charset, const char *osname, |
| 537 | const char *user) |
| 538 | { |
| 539 | char *p; |
| 540 | |
| 541 | if (asprintf(&p, "%d,%d:USERID:%s%s%s:%s\r\n" , lport, fport, |
| 542 | osname, charset ? "," : "" , charset ? charset : "" , user) < 0) |
| 543 | fatal("asprintf" ); |
| 544 | if (send(fd, p, strlen(p), 0) < 0) { |
| 545 | free(p); |
| 546 | fatal("send" ); |
| 547 | } |
| 548 | free(p); |
| 549 | } |
| 550 | |
| 551 | /* Return a specified ident error. */ |
| 552 | static void |
| 553 | iderror(int fd, int lport, int fport, const char *error) |
| 554 | { |
| 555 | char *p; |
| 556 | |
| 557 | if (asprintf(&p, "%d,%d:ERROR:%s\r\n" , lport, fport, error) < 0) |
| 558 | fatal("asprintf" ); |
| 559 | if (send(fd, p, strlen(p), 0) < 0) { |
| 560 | free(p); |
| 561 | fatal("send" ); |
| 562 | } |
| 563 | free(p); |
| 564 | } |
| 565 | |
| 566 | /* Return the IP address of the connecting host. */ |
| 567 | static const char * |
| 568 | gethost(struct sockaddr *sa) |
| 569 | { |
| 570 | static char host[NI_MAXHOST]; |
| 571 | |
| 572 | if (getnameinfo(sa, sa->sa_len, host, sizeof(host), |
| 573 | NULL, 0, NI_NUMERICHOST) == 0) |
| 574 | return host; |
| 575 | |
| 576 | return "UNKNOWN" ; |
| 577 | } |
| 578 | |
| 579 | /* Setup sockets, for daemon mode. */ |
| 580 | static int * |
| 581 | socketsetup(const char *address, const char *port, int af) |
| 582 | { |
| 583 | struct addrinfo hints, *res, *res0; |
| 584 | int error, maxs, *s, *socks; |
| 585 | const char *cause = NULL; |
| 586 | socklen_t y = 1; |
| 587 | |
| 588 | (void)memset(&hints, 0, sizeof(hints)); |
| 589 | hints.ai_flags = AI_PASSIVE; |
| 590 | hints.ai_family = af; |
| 591 | hints.ai_socktype = SOCK_STREAM; |
| 592 | error = getaddrinfo(address, port, &hints, &res0); |
| 593 | if (error) { |
| 594 | die("getaddrinfo: %s" , gai_strerror(error)); |
| 595 | /* NOTREACHED */ |
| 596 | } |
| 597 | |
| 598 | /* Count max number of sockets we may open. */ |
| 599 | for (maxs = 0, res = res0; res != NULL; res = res->ai_next) |
| 600 | maxs++; |
| 601 | |
| 602 | socks = malloc((maxs + 1) * sizeof(int)); |
| 603 | if (socks == NULL) { |
| 604 | die("malloc: %s" , strerror(errno)); |
| 605 | /* NOTREACHED */ |
| 606 | } |
| 607 | |
| 608 | *socks = 0; |
| 609 | s = socks + 1; |
| 610 | for (res = res0; res != NULL; res = res->ai_next) { |
| 611 | *s = socket(res->ai_family, res->ai_socktype, res->ai_protocol); |
| 612 | if (*s < 0) { |
| 613 | cause = "socket" ; |
| 614 | continue; |
| 615 | } |
| 616 | (void)setsockopt(*s, SOL_SOCKET, SO_REUSEADDR, &y, sizeof(y)); |
| 617 | if (bind(*s, res->ai_addr, res->ai_addrlen) < 0) { |
| 618 | cause = "bind" ; |
| 619 | (void)close(*s); |
| 620 | continue; |
| 621 | } |
| 622 | if (listen(*s, 5) < 0) { |
| 623 | cause = "listen" ; |
| 624 | (void)close(*s); |
| 625 | continue; |
| 626 | } |
| 627 | *socks = *socks + 1; |
| 628 | s++; |
| 629 | } |
| 630 | |
| 631 | if (*socks == 0) { |
| 632 | free(socks); |
| 633 | die("%s: %s" , cause, strerror(errno)); |
| 634 | /* NOTREACHED */ |
| 635 | } |
| 636 | if (res0) |
| 637 | freeaddrinfo(res0); |
| 638 | |
| 639 | return socks; |
| 640 | } |
| 641 | |
| 642 | /* UID lookup wrapper. */ |
| 643 | static int |
| 644 | ident_getuid(struct sockaddr_storage *ss, socklen_t len, |
| 645 | struct sockaddr *proxy, uid_t *uid) |
| 646 | { |
| 647 | int rc; |
| 648 | |
| 649 | rc = sysctl_getuid(ss, len, uid); |
| 650 | if (rc == -1 && proxy != NULL) |
| 651 | rc = sysctl_proxy_getuid(ss, proxy, uid); |
| 652 | |
| 653 | return rc; |
| 654 | } |
| 655 | |
| 656 | /* Try to get the UID of the connection owner using sysctl. */ |
| 657 | static int |
| 658 | sysctl_getuid(struct sockaddr_storage *ss, socklen_t len, uid_t *uid) |
| 659 | { |
| 660 | int mib[4]; |
| 661 | uid_t myuid; |
| 662 | size_t uidlen; |
| 663 | |
| 664 | uidlen = sizeof(myuid); |
| 665 | |
| 666 | mib[0] = CTL_NET; |
| 667 | mib[1] = ss->ss_family; |
| 668 | mib[2] = IPPROTO_TCP; |
| 669 | mib[3] = TCPCTL_IDENT; |
| 670 | |
| 671 | if (sysctl(mib, sizeof(mib)/ sizeof(int), &myuid, &uidlen, ss, len) < 0) |
| 672 | return -1; |
| 673 | *uid = myuid; |
| 674 | |
| 675 | return 0; |
| 676 | } |
| 677 | |
| 678 | /* Try to get the UID of the connection owner using sysctl (proxy version). */ |
| 679 | static int |
| 680 | sysctl_proxy_getuid(struct sockaddr_storage *ss, struct sockaddr *proxy, |
| 681 | uid_t *uid) |
| 682 | { |
| 683 | struct sockaddr_storage new[2]; |
| 684 | int rc, name[CTL_MAXNAME]; |
| 685 | size_t i; |
| 686 | struct kinfo_pcb *kp; |
| 687 | size_t sz, len; |
| 688 | const char *list; |
| 689 | |
| 690 | rc = -1; |
| 691 | sz = CTL_MAXNAME; |
| 692 | list = NULL; |
| 693 | |
| 694 | /* Retrieve a list of sockets. */ |
| 695 | switch (ss[0].ss_family) { |
| 696 | case AF_INET: |
| 697 | /* We only accept queries from the proxy. */ |
| 698 | if (in_hosteq(satosin(&ss[0])->sin_addr, |
| 699 | satosin(proxy)->sin_addr)) |
| 700 | list = "net.inet.tcp.pcblist" ; |
| 701 | break; |
| 702 | case AF_INET6: |
| 703 | /* We only accept queries from the proxy. */ |
| 704 | if (IN6_ARE_ADDR_EQUAL(&satosin6(&ss[0])->sin6_addr, |
| 705 | &satosin6(proxy)->sin6_addr)) |
| 706 | list = "net.inet6.tcp.pcblist" ; |
| 707 | break; |
| 708 | default: |
| 709 | maybe_syslog(LOG_ERR, "Unsupported protocol for proxy (no. %d)" , |
| 710 | ss[0].ss_family); |
| 711 | } |
| 712 | if (list != NULL) |
| 713 | rc = sysctlnametomib(list, &name[0], &sz); |
| 714 | if (rc == -1) |
| 715 | return -1; |
| 716 | len = sz; |
| 717 | |
| 718 | name[len++] = PCB_ALL; |
| 719 | name[len++] = 0; |
| 720 | name[len++] = sizeof(struct kinfo_pcb); |
| 721 | name[len++] = INT_MAX; |
| 722 | |
| 723 | kp = NULL; |
| 724 | sz = 0; |
| 725 | do { |
| 726 | rc = sysctl(&name[0], len, kp, &sz, NULL, 0); |
| 727 | if (rc == -1 && errno != ENOMEM) |
| 728 | return -1; |
| 729 | if (kp == NULL) { |
| 730 | kp = malloc(sz); |
| 731 | rc = -1; |
| 732 | } |
| 733 | if (kp == NULL) |
| 734 | return -1; |
| 735 | } while (rc == -1); |
| 736 | |
| 737 | rc = -1; |
| 738 | /* |
| 739 | * Walk through the list of sockets and try to find a match. |
| 740 | * We don't know who has sent the query (we only know that the |
| 741 | * proxy has forwarded to us) so just try to match the ports and |
| 742 | * the local address. |
| 743 | */ |
| 744 | for (i = 0; i < sz / sizeof(struct kinfo_pcb); i++) { |
| 745 | switch (ss[0].ss_family) { |
| 746 | case AF_INET: |
| 747 | /* Foreign and local ports must match. */ |
| 748 | if (satosin(&ss[0])->sin_port != |
| 749 | satosin(&kp[i].ki_src)->sin_port) |
| 750 | continue; |
| 751 | if (satosin(&ss[1])->sin_port != |
| 752 | satosin(&kp[i].ki_dst)->sin_port) |
| 753 | continue; |
| 754 | /* Foreign address may not match proxy address. */ |
| 755 | if (in_hosteq(satosin(proxy)->sin_addr, |
| 756 | satosin(&kp[i].ki_dst)->sin_addr)) |
| 757 | continue; |
| 758 | /* Local addresses must match. */ |
| 759 | if (!in_hosteq(satosin(&ss[1])->sin_addr, |
| 760 | satosin(&kp[i].ki_src)->sin_addr)) |
| 761 | continue; |
| 762 | break; |
| 763 | case AF_INET6: |
| 764 | /* Foreign and local ports must match. */ |
| 765 | if (satosin6(&ss[0])->sin6_port != |
| 766 | satosin6(&kp[i].ki_src)->sin6_port) |
| 767 | continue; |
| 768 | if (satosin6(&ss[1])->sin6_port != |
| 769 | satosin6(&kp[i].ki_dst)->sin6_port) |
| 770 | continue; |
| 771 | /* Foreign address may not match proxy address. */ |
| 772 | if (IN6_ARE_ADDR_EQUAL(&satosin6(proxy)->sin6_addr, |
| 773 | &satosin6(&kp[i].ki_dst)->sin6_addr)) |
| 774 | continue; |
| 775 | /* Local addresses must match. */ |
| 776 | if (!IN6_ARE_ADDR_EQUAL(&satosin6(&ss[1])->sin6_addr, |
| 777 | &satosin6(&kp[i].ki_src)->sin6_addr)) |
| 778 | continue; |
| 779 | break; |
| 780 | } |
| 781 | |
| 782 | /* |
| 783 | * We have found the foreign address, copy it to a new |
| 784 | * struct and retrieve the UID of the connection owner. |
| 785 | */ |
| 786 | (void)memcpy(&new[0], &kp[i].ki_dst, kp[i].ki_dst.sa_len); |
| 787 | (void)memcpy(&new[1], &kp[i].ki_src, kp[i].ki_src.sa_len); |
| 788 | |
| 789 | rc = sysctl_getuid(new, sizeof(new), uid); |
| 790 | |
| 791 | /* Done. */ |
| 792 | break; |
| 793 | } |
| 794 | |
| 795 | free(kp); |
| 796 | return rc; |
| 797 | } |
| 798 | |
| 799 | /* Forward ident queries. Returns 1 when succesful, or zero if not. */ |
| 800 | static int |
| 801 | forward(int fd, struct sockaddr *nat_addr, int nat_lport, int fport, int lport) |
| 802 | { |
| 803 | char buf[BUFSIZ], reply[BUFSIZ], *p; |
| 804 | ssize_t n; |
| 805 | int sock; |
| 806 | |
| 807 | /* Connect to the NAT host. */ |
| 808 | sock = socket(nat_addr->sa_family, SOCK_STREAM, 0); |
| 809 | if (sock < 0) { |
| 810 | maybe_syslog(LOG_ERR, "socket: %m" ); |
| 811 | return 0; |
| 812 | } |
| 813 | if (connect(sock, nat_addr, nat_addr->sa_len) < 0) { |
| 814 | maybe_syslog(LOG_ERR, "Can't connect to %s: %m" , |
| 815 | gethost(nat_addr)); |
| 816 | (void)close(sock); |
| 817 | return 0; |
| 818 | } |
| 819 | |
| 820 | /* |
| 821 | * Send the ident query to the NAT host, but use as local port |
| 822 | * the port of the NAT host. |
| 823 | */ |
| 824 | (void)snprintf(buf, sizeof(buf), "%d , %d\r\n" , fport, nat_lport); |
| 825 | if (send(sock, buf, strlen(buf), 0) < 0) { |
| 826 | maybe_syslog(LOG_ERR, "send: %m" ); |
| 827 | (void)close(sock); |
| 828 | return 0; |
| 829 | } |
| 830 | |
| 831 | /* Read the reply from the NAT host. */ |
| 832 | if ((n = recv(sock, reply, sizeof(reply) - 1, 0)) < 0) { |
| 833 | maybe_syslog(LOG_ERR, "recv: %m" ); |
| 834 | (void)close(sock); |
| 835 | return 0; |
| 836 | } else if (n == 0) { |
| 837 | maybe_syslog(LOG_NOTICE, "recv: EOF" ); |
| 838 | (void)close(sock); |
| 839 | return 0; |
| 840 | } |
| 841 | reply[n] = '\0'; |
| 842 | if (dflag) |
| 843 | maybe_syslog(LOG_ERR, "Replied %s" , reply); |
| 844 | (void)close(sock); |
| 845 | |
| 846 | /* Extract everything after the port specs from the ident reply. */ |
| 847 | for (p = reply; *p != '\0' && *p != ':'; p++) |
| 848 | continue; |
| 849 | if (*p == '\0' || *++p == '\0') { |
| 850 | maybe_syslog(LOG_ERR, "Malformed ident reply from %s" , |
| 851 | gethost(nat_addr)); |
| 852 | return 0; |
| 853 | } |
| 854 | /* Build reply for the requesting host, use the original local port. */ |
| 855 | (void)snprintf(buf, sizeof(buf), "%d,%d:%s" , lport, fport, p); |
| 856 | |
| 857 | /* Send the reply from the NAT host back to the requesting host. */ |
| 858 | if (send(fd, buf, strlen(buf), 0) < 0) { |
| 859 | maybe_syslog(LOG_ERR, "send: %m" ); |
| 860 | return 0; |
| 861 | } |
| 862 | |
| 863 | return 1; |
| 864 | } |
| 865 | |
| 866 | /* Check if a .noident file exists in the user home directory. */ |
| 867 | static int |
| 868 | check_noident(const char *homedir) |
| 869 | { |
| 870 | struct stat sb; |
| 871 | char *path; |
| 872 | int ret; |
| 873 | |
| 874 | if (homedir == NULL) |
| 875 | return 0; |
| 876 | if (asprintf(&path, "%s/.noident" , homedir) < 0) |
| 877 | return 0; |
| 878 | ret = stat(path, &sb); |
| 879 | |
| 880 | free(path); |
| 881 | return (ret == 0); |
| 882 | } |
| 883 | |
| 884 | /* |
| 885 | * Check if a .ident file exists in the user home directory and |
| 886 | * return the contents of that file. |
| 887 | */ |
| 888 | static int |
| 889 | check_userident(const char *homedir, char *username, size_t len) |
| 890 | { |
| 891 | struct stat sb; |
| 892 | char *path, *p; |
| 893 | ssize_t n; |
| 894 | int fd; |
| 895 | |
| 896 | if (len == 0 || homedir == NULL) |
| 897 | return 0; |
| 898 | if (asprintf(&path, "%s/.ident" , homedir) < 0) |
| 899 | return 0; |
| 900 | if ((fd = open(path, O_RDONLY|O_NONBLOCK|O_NOFOLLOW, 0)) < 0) { |
| 901 | free(path); |
| 902 | return 0; |
| 903 | } |
| 904 | if (fstat(fd, &sb) < 0 || !S_ISREG(sb.st_mode)) { |
| 905 | (void)close(fd); |
| 906 | free(path); |
| 907 | return 0; |
| 908 | } |
| 909 | if ((n = read(fd, username, len - 1)) < 1) { |
| 910 | (void)close(fd); |
| 911 | free(path); |
| 912 | return 0; |
| 913 | } |
| 914 | username[n] = '\0'; |
| 915 | |
| 916 | if ((p = strpbrk(username, "\r\n" )) != NULL) |
| 917 | *p = '\0'; |
| 918 | |
| 919 | (void)close(fd); |
| 920 | free(path); |
| 921 | return 1; |
| 922 | } |
| 923 | |
| 924 | /* Generate a random string. */ |
| 925 | static void |
| 926 | random_string(char *str, size_t len) |
| 927 | { |
| 928 | static const char chars[] = "abcdefghijklmnopqrstuvwxyz1234567890" ; |
| 929 | char *p; |
| 930 | |
| 931 | if (len == 0) |
| 932 | return; |
| 933 | for (p = str; len > 1; len--) |
| 934 | *p++ = chars[arc4random() % (sizeof(chars) - 1)]; |
| 935 | *p = '\0'; |
| 936 | } |
| 937 | |
| 938 | /* Change the output format. */ |
| 939 | static int |
| 940 | change_format(const char *format, struct passwd *pw, char *dest, size_t len) |
| 941 | { |
| 942 | struct group *gr; |
| 943 | const char *cp; |
| 944 | char **gmp; |
| 945 | size_t bp; |
| 946 | |
| 947 | if (len == 0 || ((gr = getgrgid(pw->pw_gid)) == NULL)) |
| 948 | return 0; |
| 949 | |
| 950 | for (bp = 0, cp = format; *cp != '\0' && bp < len - 1; cp++) { |
| 951 | if (*cp != '%') { |
| 952 | dest[bp++] = *cp; |
| 953 | continue; |
| 954 | } |
| 955 | if (*++cp == '\0') |
| 956 | break; |
| 957 | switch (*cp) { |
| 958 | case 'u': |
| 959 | (void)snprintf(&dest[bp], len - bp, "%s" , pw->pw_name); |
| 960 | break; |
| 961 | case 'U': |
| 962 | (void)snprintf(&dest[bp], len - bp, "%d" , pw->pw_uid); |
| 963 | break; |
| 964 | case 'g': |
| 965 | (void)snprintf(&dest[bp], len - bp, "%s" , gr->gr_name); |
| 966 | break; |
| 967 | case 'G': |
| 968 | (void)snprintf(&dest[bp], len - bp, "%d" , gr->gr_gid); |
| 969 | break; |
| 970 | case 'l': |
| 971 | (void)snprintf(&dest[bp], len - bp, "%s" , gr->gr_name); |
| 972 | bp += strlen(&dest[bp]); |
| 973 | if (bp >= len) |
| 974 | break; |
| 975 | setgrent(); |
| 976 | while ((gr = getgrent()) != NULL) { |
| 977 | if (gr->gr_gid == pw->pw_gid) |
| 978 | continue; |
| 979 | for (gmp = gr->gr_mem; *gmp && **gmp; gmp++) { |
| 980 | if (strcmp(*gmp, pw->pw_name) == 0) { |
| 981 | (void)snprintf(&dest[bp], |
| 982 | len - bp, ",%s" , |
| 983 | gr->gr_name); |
| 984 | bp += strlen(&dest[bp]); |
| 985 | break; |
| 986 | } |
| 987 | } |
| 988 | if (bp >= len) |
| 989 | break; |
| 990 | } |
| 991 | endgrent(); |
| 992 | break; |
| 993 | case 'L': |
| 994 | (void)snprintf(&dest[bp], len - bp, "%u" , gr->gr_gid); |
| 995 | bp += strlen(&dest[bp]); |
| 996 | if (bp >= len) |
| 997 | break; |
| 998 | setgrent(); |
| 999 | while ((gr = getgrent()) != NULL) { |
| 1000 | if (gr->gr_gid == pw->pw_gid) |
| 1001 | continue; |
| 1002 | for (gmp = gr->gr_mem; *gmp && **gmp; gmp++) { |
| 1003 | if (strcmp(*gmp, pw->pw_name) == 0) { |
| 1004 | (void)snprintf(&dest[bp], |
| 1005 | len - bp, ",%u" , |
| 1006 | gr->gr_gid); |
| 1007 | bp += strlen(&dest[bp]); |
| 1008 | break; |
| 1009 | } |
| 1010 | } |
| 1011 | if (bp >= len) |
| 1012 | break; |
| 1013 | } |
| 1014 | endgrent(); |
| 1015 | break; |
| 1016 | default: |
| 1017 | dest[bp] = *cp; |
| 1018 | dest[bp+1] = '\0'; |
| 1019 | break; |
| 1020 | } |
| 1021 | bp += strlen(&dest[bp]); |
| 1022 | } |
| 1023 | dest[bp] = '\0'; |
| 1024 | |
| 1025 | return 1; |
| 1026 | } |
| 1027 | |
| 1028 | /* Just exit when we caught SIGALRM. */ |
| 1029 | static void |
| 1030 | timeout_handler(int __unused s) |
| 1031 | { |
| 1032 | maybe_syslog(LOG_INFO, "Timeout for request, closing connection..." ); |
| 1033 | exit(EXIT_FAILURE); |
| 1034 | } |
| 1035 | |
| 1036 | /* Report error message string through syslog and quit. */ |
| 1037 | static void |
| 1038 | fatal(const char *func) |
| 1039 | { |
| 1040 | maybe_syslog(LOG_ERR, "%s: %m" , func); |
| 1041 | exit(EXIT_FAILURE); |
| 1042 | } |
| 1043 | |
| 1044 | /* |
| 1045 | * Report an error through syslog and/or stderr and quit. Only used when |
| 1046 | * running identd in the background and when it isn't a daemon yet. |
| 1047 | */ |
| 1048 | static void |
| 1049 | die(const char *message, ...) |
| 1050 | { |
| 1051 | va_list ap; |
| 1052 | |
| 1053 | if (bflag) { |
| 1054 | va_start(ap, message); |
| 1055 | vwarnx(message, ap); |
| 1056 | va_end(ap); |
| 1057 | } |
| 1058 | |
| 1059 | if (lflag) { |
| 1060 | va_start(ap, message); |
| 1061 | vsyslog(LOG_ERR, message, ap); |
| 1062 | va_end(ap); |
| 1063 | } |
| 1064 | |
| 1065 | exit(EXIT_FAILURE); |
| 1066 | } |
| 1067 | |
| 1068 | /* Log using syslog, but only if enabled with the -l flag. */ |
| 1069 | void |
| 1070 | maybe_syslog(int priority, const char *message, ...) |
| 1071 | { |
| 1072 | va_list ap; |
| 1073 | |
| 1074 | if (lflag) { |
| 1075 | va_start(ap, message); |
| 1076 | vsyslog(priority, message, ap); |
| 1077 | va_end(ap); |
| 1078 | } |
| 1079 | } |
| 1080 | |