blob: 8d22e6f62737587050fd03e37cbf348f71bdb975 [file] [log] [blame]
/* Licensed to the Apache Software Foundation (ASF) under one or more
* contributor license agreements. See the NOTICE file distributed with
* this work for additional information regarding copyright ownership.
* The ASF licenses this file to You under the Apache License, Version 2.0
* (the "License"); you may not use this file except in compliance with
* the License. You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
/*
* rfc1413() speaks a common subset of the RFC 1413, AUTH, TAP and IDENT
* protocols. The code queries an RFC 1413 etc. compatible daemon on a remote
* host to look up the owner of a connection. The information should not be
* used for authentication purposes. This routine intercepts alarm signals.
*
* Diagnostics are reported through syslog(3).
*
* Author: Wietse Venema, Eindhoven University of Technology,
* The Netherlands.
*/
/* Some small additions for Apache --- ditch the "sccsid" var if
* compiling with gcc (it *has* changed), include ap_config.h for the
* prototypes it defines on at least one system (SunlOSs) which has
* them missing from the standard header files, and one minor change
* below (extra parens around assign "if (foo = bar) ..." to shut up
* gcc -Wall).
*/
/* Rewritten by David Robinson */
#include "httpd.h" /* for server_rec, conn_rec, ap_longjmp, etc. */
#include "http_log.h" /* for aplog_error */
#include "rfc1413.h"
#include "http_main.h" /* set_callback_and_alarm */
/* Local stuff. */
/* Semi-well-known port */
#define RFC1413_PORT 113
/* maximum allowed length of userid */
#define RFC1413_USERLEN 512
/* rough limit on the amount of data we accept. */
#define RFC1413_MAXDATA 1000
#ifndef RFC1413_TIMEOUT
#define RFC1413_TIMEOUT 30
#endif
#define ANY_PORT 0 /* Any old port will do */
#define FROM_UNKNOWN "unknown"
int ap_rfc1413_timeout = RFC1413_TIMEOUT; /* Global so it can be changed */
#if (defined (NETWARE) || defined (WIN32))
#define write(a,b,c) send(a,b,c,0)
#define read(a,b,c) recv(a,b,c,0)
#endif
#ifdef MULTITHREAD
#define RFC_USER_STATIC
static int setsocktimeout (int sock, int timeout)
{
#if (defined (NETWARE) || defined (WIN32))
u_long msec = 0;
/* Make sure that we are in blocking mode */
if (ioctlsocket(sock, FIONBIO, &msec) == SOCKET_ERROR) {
return h_errno;
}
/* Win32 timeouts are in msec, represented as int */
msec = timeout * 1000;
setsockopt(sock, SOL_SOCKET, SO_RCVTIMEO,
(char *) &msec, sizeof(msec));
setsockopt(sock, SOL_SOCKET, SO_SNDTIMEO,
(char *) &msec, sizeof(msec));
#else
/* XXX Needs to be implemented for non-winsock platforms */
#endif
return 0;
}
#else /* MULTITHREAD */
#define RFC_USER_STATIC static
static JMP_BUF timebuf;
/* ident_timeout - handle timeouts */
static void ident_timeout(int sig)
{
ap_longjmp(timebuf, sig);
}
#endif
/* bind_connect - bind both ends of a socket */
/* Ambarish fix this. Very broken */
static int get_rfc1413(int sock, const struct sockaddr_in *our_sin,
const struct sockaddr_in *rmt_sin,
char user[RFC1413_USERLEN+1], server_rec *srv)
{
struct sockaddr_in rmt_query_sin, our_query_sin;
unsigned int rmt_port, our_port;
int i;
char *cp;
char buffer[RFC1413_MAXDATA + 1];
int buflen;
/*
* Bind the local and remote ends of the query socket to the same
* IP addresses as the connection under investigation. We go
* through all this trouble because the local or remote system
* might have more than one network address. The RFC1413 etc.
* client sends only port numbers; the server takes the IP
* addresses from the query socket.
*/
our_query_sin = *our_sin;
our_query_sin.sin_port = htons(ANY_PORT);
#ifdef MPE
our_query_sin.sin_addr.s_addr = INADDR_ANY;
#endif
rmt_query_sin = *rmt_sin;
rmt_query_sin.sin_port = htons(RFC1413_PORT);
if (bind(sock, (struct sockaddr *) &our_query_sin,
sizeof(struct sockaddr_in)) < 0) {
ap_log_error(APLOG_MARK, APLOG_CRIT, srv,
"bind: rfc1413: Error binding to local port");
return -1;
}
/*
* errors from connect usually imply the remote machine doesn't support
* the service
*/
if (connect(sock, (struct sockaddr *) &rmt_query_sin,
sizeof(struct sockaddr_in)) < 0)
return -1;
/* send the data */
buflen = ap_snprintf(buffer, sizeof(buffer), "%u,%u\r\n", ntohs(rmt_sin->sin_port),
ntohs(our_sin->sin_port));
/* send query to server. Handle short write. */
#ifdef CHARSET_EBCDIC
ebcdic2ascii(buffer, buffer, buflen);
#endif
i = 0;
while(i < (int)strlen(buffer)) {
int j;
j = write(sock, buffer+i, (strlen(buffer+i)));
if (j < 0 && errno != EINTR) {
ap_log_error(APLOG_MARK, APLOG_CRIT, srv,
"write: rfc1413: error sending request");
return -1;
}
else if (j > 0) {
i+=j;
}
}
/*
* Read response from server. - the response should be newline
* terminated according to rfc - make sure it doesn't stomp it's
* way out of the buffer.
*/
i = 0;
memset(buffer, '\0', sizeof(buffer));
/*
* Note that the strchr function below checks for \012 instead of '\n'
* this allows it to work on both ASCII and EBCDIC machines.
*/
while((cp = strchr(buffer, '\012')) == NULL && i < sizeof(buffer) - 1) {
int j;
#ifdef TPF
/*
* socket read on TPF doesn't get interrupted by
* signals so additional processing is needed
*/
j = ap_set_callback_and_alarm(NULL, 0);
ap_set_callback_and_alarm(ident_timeout, j);
j = select(&sock, 1, 0, 0, j * 1000);
if (j < 1) {
ap_set_callback_and_alarm(NULL, 0);
ap_check_signals();
return -1;
}
#endif /* TPF */
j = read(sock, buffer+i, (sizeof(buffer) - 1) - i);
if (j < 0 && errno != EINTR) {
ap_log_error(APLOG_MARK, APLOG_CRIT, srv,
"read: rfc1413: error reading response");
return -1;
}
else if (j > 0) {
i+=j;
}
}
/* RFC1413_USERLEN = 512 */
#ifdef CHARSET_EBCDIC
ascii2ebcdic(buffer, buffer, (size_t)i);
#endif
if (sscanf(buffer, "%u , %u : USERID :%*[^:]:%512s", &rmt_port, &our_port,
user) != 3 || ntohs(rmt_sin->sin_port) != rmt_port
|| ntohs(our_sin->sin_port) != our_port)
return -1;
/*
* Strip trailing carriage return. It is part of the
* protocol, not part of the data.
*/
if ((cp = strchr(user, '\r')))
*cp = '\0';
return 0;
}
/* rfc1413 - return remote user name, given socket structures */
API_EXPORT(char *) ap_rfc1413(conn_rec *conn, server_rec *srv)
{
RFC_USER_STATIC char user[RFC1413_USERLEN + 1]; /* XXX */
RFC_USER_STATIC char *result;
RFC_USER_STATIC int sock;
result = FROM_UNKNOWN;
sock = ap_psocket_ex(conn->pool, AF_INET, SOCK_STREAM, IPPROTO_TCP, 1);
if (sock < 0) {
ap_log_error(APLOG_MARK, APLOG_CRIT, srv,
"socket: rfc1413: error creating socket");
conn->remote_logname = result;
}
/*
* Set up a timer so we won't get stuck while waiting for the server.
*/
#ifdef MULTITHREAD
if (setsocktimeout(sock, ap_rfc1413_timeout) == 0) {
if (get_rfc1413(sock, &conn->local_addr, &conn->remote_addr, user, srv) >= 0)
result = ap_pstrdup (conn->pool, user);
}
#else
if (ap_setjmp(timebuf) == 0) {
ap_set_callback_and_alarm(ident_timeout, ap_rfc1413_timeout);
if (get_rfc1413(sock, &conn->local_addr, &conn->remote_addr, user, srv) >= 0)
result = user;
}
ap_set_callback_and_alarm(NULL, 0);
#endif
ap_pclosesocket(conn->pool, sock);
conn->remote_logname = result;
return conn->remote_logname;
}