version 1.8, 1997/10/08 07:07:49 |
version 1.9, 1998/07/15 07:31:56 |
|
|
** This program is in the public domain and may be used freely by anyone |
** This program is in the public domain and may be used freely by anyone |
** who wants to. |
** who wants to. |
** |
** |
** Last update: 22 April 1993 |
** Last update: 7 Oct 1993 |
** |
** |
** Please send bug fixes/bug reports to: Peter Eriksson <pen@lysator.liu.se> |
** Please send bug fixes/bug reports to: Peter Eriksson <pen@lysator.liu.se> |
*/ |
*/ |
|
|
#if defined(IRIX) || defined(SVR4) || defined(NeXT) || defined(__NetBSD__) |
#if !defined(__STDC__) && !defined(_AIX) |
|
#define void int |
|
#endif |
|
|
|
#if defined(IRIX) || defined(SVR4) || defined(NeXT) || (defined(sco) && sco >= 42) || defined(_AIX4) || defined(__NetBSD__) || defined(__FreeBSD__) || defined(ultrix) |
# define SIGRETURN_TYPE void |
# define SIGRETURN_TYPE void |
# define SIGRETURN_TYPE_IS_VOID |
# define SIGRETURN_TYPE_IS_VOID |
#else |
#else |
|
|
# define STRNET |
# define STRNET |
#endif |
#endif |
|
|
|
#ifdef NeXT31 |
|
# include <libc.h> |
|
#endif |
|
|
|
#ifdef sco |
|
# define USE_SIGALARM |
|
#endif |
|
|
|
#include <stdio.h> |
|
#include <ctype.h> |
|
#include <errno.h> |
|
#include <netdb.h> |
|
#include <signal.h> |
|
#include <fcntl.h> |
|
|
#include <sys/types.h> |
#include <sys/types.h> |
#include <sys/param.h> |
#include <sys/param.h> |
#include <sys/ioctl.h> |
#include <sys/ioctl.h> |
|
|
#include <sys/time.h> |
#include <sys/time.h> |
#include <sys/wait.h> |
#include <sys/wait.h> |
|
|
#include <stdio.h> |
|
#include <string.h> |
|
#include <ctype.h> |
|
#include <errno.h> |
|
#include <netdb.h> |
|
#include <signal.h> |
|
#include <fcntl.h> |
|
#include <stdlib.h> |
|
#include <unistd.h> |
|
|
|
#include <pwd.h> |
#include <pwd.h> |
#include <grp.h> |
#include <grp.h> |
|
|
|
|
# include <arpa/inet.h> |
# include <arpa/inet.h> |
#endif |
#endif |
|
|
|
#ifdef _AIX32 |
|
# include <sys/select.h> |
|
#endif |
|
|
#if defined(MIPS) || defined(BSD43) |
#if defined(MIPS) || defined(BSD43) |
extern int errno; |
extern int errno; |
#endif |
#endif |
|
|
|
#if defined(SOLARIS) || defined(__NetBSD__) || defined(__FreeBSD__) || defined(__linux__) || defined(_AIX) |
|
# include <unistd.h> |
|
# include <stdlib.h> |
|
# include <string.h> |
|
#endif |
|
|
#include "identd.h" |
#include "identd.h" |
#include "error.h" |
#include "error.h" |
|
#include "paths.h" |
|
|
|
|
/* Antique unixes do not have these things defined... */ |
/* Antique unixes do not have these things defined... */ |
#ifndef FD_SETSIZE |
#ifndef FD_SETSIZE |
Line 74 extern int errno; |
|
Line 95 extern int errno; |
|
# define FD_ZERO(p) bzero((char *)(p), sizeof(*(p))) |
# define FD_ZERO(p) bzero((char *)(p), sizeof(*(p))) |
#endif |
#endif |
|
|
extern char *version; |
|
|
|
char *path_unix = NULL; |
char *path_unix = (char *) NULL; |
char *path_kmem = NULL; |
char *path_kmem = (char *) NULL; |
|
|
int verbose_flag = 0; |
int verbose_flag = 0; |
int debug_flag = 0; |
int debug_flag = 0; |
Line 85 int syslog_flag = 0; |
|
Line 105 int syslog_flag = 0; |
|
int multi_flag = 0; |
int multi_flag = 0; |
int other_flag = 0; |
int other_flag = 0; |
int unknown_flag = 0; |
int unknown_flag = 0; |
int number_flag = 0; |
|
int noident_flag = 0; |
int noident_flag = 0; |
|
int crypto_flag = 0; |
|
|
int lport = 0; |
int lport = 0; |
int fport = 0; |
int fport = 0; |
|
|
char *charset_name = NULL; |
char *charset_name = (char *) NULL; |
char *indirect_host = NULL; |
char *indirect_host = (char *) NULL; |
char *indirect_password = NULL; |
char *indirect_password = (char *) NULL; |
|
|
|
#ifdef ALLOW_FORMAT |
|
int format_flag = 0; |
|
char *format = "%u"; |
|
#endif |
|
|
static int child_pid; |
static int child_pid; |
|
|
Line 101 static int child_pid; |
|
Line 126 static int child_pid; |
|
static int syslog_facility = LOG_DAEMON; |
static int syslog_facility = LOG_DAEMON; |
#endif |
#endif |
|
|
char *clearmem __P((char *, int)); |
static int comparemem __P((void *, void *, int)); |
static SIGRETURN_TYPE alarm_handler __P((int)); |
char *clearmem __P((void *, int)); |
|
static SIGRETURN_TYPE child_handler __P((int)); |
int main __P((int, char *[])); |
int main __P((int, char *[])); |
|
|
/* |
/* |
Line 111 int main __P((int, char *[])); |
|
Line 137 int main __P((int, char *[])); |
|
** (This should only affect GCC version 1 I think, a well, this works |
** (This should only affect GCC version 1 I think, a well, this works |
** for version 2 also so why bother.. :-) |
** for version 2 also so why bother.. :-) |
*/ |
*/ |
#if defined(__GNUC__) && defined(__sparc__) |
#if defined(__GNUC__) && defined(__sparc__) && !defined(NeXT) |
|
|
#ifdef inet_ntoa |
#ifdef inet_ntoa |
#undef inet_ntoa |
#undef inet_ntoa |
#endif |
#endif |
|
|
char *inet_ntoa(ad) |
char *inet_ntoa(ad) |
struct in_addr ad; |
struct in_addr ad; |
{ |
{ |
unsigned long int s_ad; |
unsigned long int s_ad; |
int a, b, c, d; |
int a, b, c, d; |
static char addr[20]; |
static char addr[20]; |
|
|
s_ad = ad.s_addr; |
s_ad = ad.s_addr; |
d = s_ad % 256; |
d = s_ad % 256; |
s_ad /= 256; |
s_ad /= 256; |
c = s_ad % 256; |
c = s_ad % 256; |
s_ad /= 256; |
s_ad /= 256; |
b = s_ad % 256; |
b = s_ad % 256; |
a = s_ad / 256; |
a = s_ad / 256; |
sprintf(addr, "%d.%d.%d.%d", a, b, c, d); |
sprintf(addr, "%d.%d.%d.%d", a, b, c, d); |
|
|
return addr; |
return addr; |
} |
} |
#endif |
#endif |
|
|
|
static int comparemem(vp1, vp2, len) |
|
void *vp1; |
|
void *vp2; |
|
int len; |
|
{ |
|
unsigned char *p1 = (unsigned char *) vp1; |
|
unsigned char *p2 = (unsigned char *) vp2; |
|
int c; |
|
|
|
while (len-- > 0) |
|
if ((c = (int) *p1++ - (int) *p2++) != 0) |
|
return c; |
|
|
|
return 0; |
|
} |
|
|
/* |
/* |
** Return the name of the connecting host, or the IP number as a string. |
** Return the name of the connecting host, or the IP number as a string. |
*/ |
*/ |
char *gethost(addr) |
char *gethost(addr) |
struct in_addr *addr; |
struct in_addr *addr; |
{ |
{ |
struct hostent *hp; |
int i; |
|
struct hostent *hp; |
|
|
|
|
hp = gethostbyaddr((char *) addr, sizeof(struct in_addr), AF_INET); |
hp = gethostbyaddr((char *) addr, sizeof(struct in_addr), AF_INET); |
if (hp) |
if (hp) |
return hp->h_name; |
{ |
else |
char *hname = strdup(hp->h_name); |
return inet_ntoa(*addr); |
|
|
if (! hname) { |
|
syslog(LOG_ERR, "strdup(%s): %m", hp->h_name); |
|
exit(1); |
|
} |
|
/* Found a IP -> Name match, now try the reverse for security reasons */ |
|
hp = gethostbyname(hname); |
|
(void) free(hname); |
|
if (hp) |
|
#ifdef h_addr |
|
for (i = 0; hp->h_addr_list[i]; i++) |
|
if (comparemem(hp->h_addr_list[i], |
|
(unsigned char *) addr, |
|
(int) sizeof(struct in_addr)) == 0) |
|
return (char *) hp->h_name; |
|
#else |
|
if (comparemem(hp->h_addr, addr, sizeof(struct in_addr)) == 0) |
|
return hp->h_name; |
|
#endif |
|
} |
|
|
|
return inet_ntoa(*addr); |
} |
} |
|
|
|
#ifdef USE_SIGALARM |
/* |
/* |
** Exit cleanly after our time's up. |
** Exit cleanly after our time's up. |
*/ |
*/ |
static SIGRETURN_TYPE |
static SIGRETURN_TYPE |
alarm_handler(dummy) |
alarm_handler(int s) |
int dummy; |
|
{ |
{ |
if (syslog_flag) |
if (syslog_flag) |
syslog(LOG_DEBUG, "SIGALRM triggered, exiting"); |
syslog(LOG_DEBUG, "SIGALRM triggered, exiting"); |
|
|
exit(0); |
exit(0); |
} |
} |
|
#endif |
|
|
|
|
#if !defined(hpux) && !defined(__hpux) && !defined(SVR4) && !defined(__NetBSD__) || defined(_CRAY) |
#if !defined(hpux) && !defined(__hpux) && !defined(SVR4) && \ |
|
!defined(_CRAY) && !defined(sco) && !defined(LINUX) |
/* |
/* |
** This is used to clean up zombie child processes |
** This is used to clean up zombie child processes |
** if the -w or -b options are used. |
** if the -w or -b options are used. |
*/ |
*/ |
static SIGRETURN_TYPE |
static SIGRETURN_TYPE |
child_handler() |
child_handler(dummy) |
|
int dummy; |
{ |
{ |
#if defined(IRIX) || defined(NeXT) |
#if defined(NeXT) || (defined(__sgi) && defined(__SVR3)) |
union wait status; |
union wait status; |
#else |
#else |
int status; |
int status; |
#endif |
#endif |
|
int saved_errno = errno; |
|
|
|
while (wait3(&status, WNOHANG, NULL) > 0) |
|
; |
|
|
while (wait3(&status, WNOHANG, NULL) > 0) |
errno = saved_errno; |
; |
|
|
|
#ifndef SIGRETURN_TYPE_IS_VOID |
#ifndef SIGRETURN_TYPE_IS_VOID |
return 0; |
return 0; |
#endif |
#endif |
} |
} |
#endif |
#endif |
|
|
char *clearmem(bp, len) |
|
char *bp; |
|
int len; |
|
{ |
|
char *cp; |
|
|
|
cp = bp; |
char *clearmem(vbp, len) |
while (len-- > 0) |
void *vbp; |
*cp++ = 0; |
int len; |
|
{ |
|
char *bp = (char *) vbp; |
|
char *cp; |
|
|
return bp; |
cp = bp; |
|
while (len-- > 0) |
|
*cp++ = 0; |
|
|
|
return bp; |
} |
} |
|
|
|
|
Line 208 char *clearmem(bp, len) |
|
Line 280 char *clearmem(bp, len) |
|
** Main entry point into this daemon |
** Main entry point into this daemon |
*/ |
*/ |
int main(argc,argv) |
int main(argc,argv) |
int argc; |
int argc; |
char *argv[]; |
char *argv[]; |
{ |
{ |
int i, len; |
int i, len; |
struct sockaddr_in sin; |
struct sockaddr_in sin; |
struct in_addr laddr, faddr; |
struct in_addr laddr, faddr; |
struct timeval tv; |
#ifndef USE_SIGALARM |
|
struct timeval tv; |
int background_flag = 0; |
#endif |
int timeout = 0; |
int one = 1; |
char *portno = "113"; |
|
char *bind_address = NULL; |
int background_flag = 0; |
int set_uid = 0; |
int timeout = 0; |
int set_gid = 0; |
char *portno = "113"; |
int inhibit_default_config = 0; |
char *bind_address = (char *) NULL; |
int opt_count = 0; /* Count of option flags */ |
int set_uid = 0; |
|
int set_gid = 0; |
|
int inhibit_default_config = 0; |
|
int opt_count = 0; /* Count of option flags */ |
|
|
#ifdef __convex__ |
#ifdef __convex__ |
argc--; /* get rid of extra argument passed by inetd */ |
argc--; /* get rid of extra argument passed by inetd */ |
#endif |
#endif |
|
|
/* |
|
** Prescan the arguments for "-f<config-file>" switches |
|
*/ |
|
inhibit_default_config = 0; |
|
for (i = 1; i < argc && argv[i][0] == '-'; i++) |
|
if (argv[i][1] == 'f') |
|
inhibit_default_config = 1; |
|
|
|
/* |
|
** Parse the default config file - if it exists |
|
*/ |
|
if (!inhibit_default_config) |
|
parse_config(NULL, 1); |
|
|
|
/* |
|
** Parse the command line arguments |
|
*/ |
|
for (i = 1; i < argc && argv[i][0] == '-'; i++) { |
|
opt_count++; |
|
switch (argv[i][1]) |
|
{ |
|
case 'b': /* Start as standalone daemon */ |
|
background_flag = 1; |
|
break; |
|
|
|
case 'w': /* Start from Inetd, wait mode */ |
|
background_flag = 2; |
|
break; |
|
|
|
case 'i': /* Start from Inetd, nowait mode */ |
|
background_flag = 0; |
|
break; |
|
|
|
case 't': |
|
timeout = atoi(argv[i]+2); |
|
break; |
|
|
|
case 'p': |
|
portno = argv[i]+2; |
|
break; |
|
|
|
case 'a': |
|
bind_address = argv[i]+2; |
|
break; |
|
|
|
case 'u': |
|
if (isdigit(argv[i][2])) |
|
set_uid = atoi(argv[i]+2); |
|
else |
|
{ |
|
struct passwd *pwd; |
|
|
|
pwd = getpwnam(argv[i]+2); |
|
if (!pwd) |
|
ERROR1("no such user (%s) for -u option", argv[i]+2); |
|
else |
|
{ |
|
set_uid = pwd->pw_uid; |
|
set_gid = pwd->pw_gid; |
|
} |
|
} |
|
break; |
|
|
|
case 'g': |
|
if (isdigit(argv[i][2])) |
|
set_gid = atoi(argv[i]+2); |
|
else |
|
{ |
|
struct group *grp; |
|
|
|
grp = getgrnam(argv[i]+2); |
if (isatty(0)) |
if (!grp) |
background_flag = 1; |
ERROR1("no such group (%s) for -g option", argv[i]+2); |
|
else |
/* |
set_gid = grp->gr_gid; |
** Prescan the arguments for "-f<config-file>" switches |
|
*/ |
|
inhibit_default_config = 0; |
|
for (i = 1; i < argc && argv[i][0] == '-'; i++) |
|
if (argv[i][1] == 'f') |
|
inhibit_default_config = 1; |
|
|
|
/* |
|
** Parse the default config file - if it exists |
|
*/ |
|
if (!inhibit_default_config) |
|
parse_config(NULL, 1); |
|
|
|
/* |
|
** Parse the command line arguments |
|
*/ |
|
for (i = 1; i < argc && argv[i][0] == '-'; i++) { |
|
opt_count++; |
|
switch (argv[i][1]) |
|
{ |
|
case 'b': /* Start as standalone daemon */ |
|
background_flag = 1; |
|
break; |
|
|
|
case 'w': /* Start from Inetd, wait mode */ |
|
background_flag = 2; |
|
break; |
|
|
|
case 'i': /* Start from Inetd, nowait mode */ |
|
background_flag = 0; |
|
break; |
|
|
|
case 't': |
|
timeout = atoi(argv[i]+2); |
|
break; |
|
|
|
case 'p': |
|
portno = argv[i]+2; |
|
break; |
|
|
|
case 'a': |
|
bind_address = argv[i]+2; |
|
break; |
|
|
|
case 'u': |
|
if (isdigit(argv[i][2])) |
|
set_uid = atoi(argv[i]+2); |
|
else |
|
{ |
|
struct passwd *pwd; |
|
|
|
pwd = getpwnam(argv[i]+2); |
|
if (!pwd) |
|
ERROR1("no such user (%s) for -u option", argv[i]+2); |
|
else |
|
{ |
|
set_uid = pwd->pw_uid; |
|
set_gid = pwd->pw_gid; |
|
} |
|
} |
|
break; |
|
|
|
case 'g': |
|
if (isdigit(argv[i][2])) |
|
set_gid = atoi(argv[i]+2); |
|
else |
|
{ |
|
struct group *grp; |
|
|
|
grp = getgrnam(argv[i]+2); |
|
if (!grp) |
|
ERROR1("no such group (%s) for -g option", argv[i]+2); |
|
else |
|
set_gid = grp->gr_gid; |
|
} |
|
break; |
|
|
|
case 'c': |
|
charset_name = argv[i]+2; |
|
break; |
|
|
|
case 'r': |
|
indirect_host = argv[i]+2; |
|
break; |
|
|
|
case 'l': /* Use the Syslog daemon for logging */ |
|
syslog_flag++; |
|
#ifdef LOG_DAEMON |
|
openlog("identd", LOG_PID, syslog_facility); |
|
#else |
|
openlog("identd", LOG_PID); |
|
#endif |
|
break; |
|
|
|
case 'o': |
|
other_flag = 1; |
|
break; |
|
|
|
case 'e': |
|
unknown_flag = 1; |
|
break; |
|
|
|
case 'V': /* Give version of this daemon */ |
|
printf("[in.identd, version %s]\r\n", version); |
|
exit(0); |
|
break; |
|
|
|
case 'v': /* Be verbose */ |
|
verbose_flag++; |
|
break; |
|
|
|
case 'd': /* Enable debugging */ |
|
debug_flag++; |
|
break; |
|
|
|
case 'm': /* Enable multiline queries */ |
|
multi_flag++; |
|
break; |
|
|
|
case 'N': /* Enable users ".noident" files */ |
|
noident_flag++; |
|
break; |
|
|
|
#ifdef INCLUDE_CRYPT |
|
case 'C': /* Enable encryption. */ |
|
{ |
|
FILE *keyfile; |
|
|
|
if (argv[i][2]) |
|
keyfile = fopen(argv[i]+2, "r"); |
|
else |
|
keyfile = fopen(PATH_DESKEY, "r"); |
|
|
|
if (keyfile == NULL) |
|
{ |
|
ERROR("cannot open key file for option -C"); |
|
} |
|
else |
|
{ |
|
char buf[1024]; |
|
|
|
if (fgets(buf, 1024, keyfile) == NULL) |
|
{ |
|
ERROR("cannot read key file for option -C"); |
|
} |
|
else |
|
{ |
|
init_encryption(buf); |
|
crypto_flag++; |
|
} |
|
fclose(keyfile); |
|
} |
|
} |
|
break; |
|
#endif |
|
|
|
#ifdef ALLOW_FORMAT |
|
case 'n': /* Compatibility flag - just send the user number */ |
|
format_flag = 1; |
|
format = "%U"; |
|
break; |
|
|
|
case 'F': /* Output format */ |
|
format_flag = 1; |
|
format = argv[i]+2; |
|
break; |
|
#endif |
|
|
|
default: |
|
ERROR1("Bad option %s", argv[i]); |
|
break; |
} |
} |
break; |
|
|
|
case 'c': |
|
charset_name = argv[i]+2; |
|
break; |
|
|
|
case 'r': |
|
indirect_host = argv[i]+2; |
|
break; |
|
|
|
case 'l': /* Use the Syslog daemon for logging */ |
|
syslog_flag++; |
|
break; |
|
|
|
case 'o': |
|
other_flag = 1; |
|
break; |
|
|
|
case 'e': |
|
unknown_flag = 1; |
|
break; |
|
|
|
case 'n': |
|
number_flag = 1; |
|
break; |
|
|
|
case 'V': /* Give version of this daemon */ |
|
printf("[in.identd, version %s]\r\n", version); |
|
exit(0); |
|
break; |
|
|
|
case 'v': /* Be verbose */ |
|
verbose_flag++; |
|
break; |
|
|
|
case 'd': /* Enable debugging */ |
|
debug_flag++; |
|
break; |
|
|
|
case 'm': /* Enable multiline queries */ |
|
multi_flag++; |
|
break; |
|
|
|
case 'N': /* Enable users ".noident" files */ |
|
noident_flag++; |
|
break; |
|
} |
} |
} |
|
|
|
#if defined(_AUX_SOURCE) || defined (SUNOS35) |
#if defined(_AUX_SOURCE) || defined (SUNOS35) |
/* A/UX 2.0* & SunOS 3.5 calls us with an argument XXXXXXXX.YYYY |
/* A/UX 2.0* & SunOS 3.5 calls us with an argument XXXXXXXX.YYYY |
** where XXXXXXXXX is the hexadecimal version of the callers |
** where XXXXXXXXX is the hexadecimal version of the callers |
** IP number, and YYYY is the port/socket or something. |
** IP number, and YYYY is the port/socket or something. |
** It seems to be impossible to pass arguments to a daemon started |
** It seems to be impossible to pass arguments to a daemon started |
** by inetd. |
** by inetd. |
** |
** |
** Just in case it is started from something else, then we only |
** Just in case it is started from something else, then we only |
** skip the argument if no option flags have been seen. |
** skip the argument if no option flags have been seen. |
*/ |
*/ |
if (opt_count == 0) |
if (opt_count == 0) |
argc--; |
argc--; |
#endif |
#endif |
|
|
/* |
|
** Path to kernel namelist file specified on command line |
|
*/ |
|
if (i < argc) |
|
path_unix = argv[i++]; |
|
|
|
/* |
|
** Path to kernel memory device specified on command line |
|
*/ |
|
if (i < argc) |
|
path_kmem = argv[i++]; |
|
|
|
|
|
/* |
|
** Open the kernel memory device and read the nlist table |
|
*/ |
|
if (k_open() < 0) |
|
ERROR("main: k_open"); |
|
|
|
/* |
|
** Do the special handling needed for the "-b" flag |
|
*/ |
|
if (background_flag == 1) |
|
{ |
|
struct sockaddr_in addr; |
|
struct servent *sp; |
|
int fd; |
|
|
|
|
|
if (fork()) |
|
exit(0); |
|
|
|
close(0); |
|
close(1); |
|
close(2); |
|
|
|
if (fork()) |
|
exit(0); |
|
|
|
fd = socket(AF_INET, SOCK_STREAM, 0); |
|
if (fd == -1) |
|
ERROR("main: socket"); |
|
|
|
if (fd != 0) |
|
dup2(fd, 0); |
|
|
|
clearmem((char *)&addr, sizeof(addr)); |
|
|
|
addr.sin_len = sizeof(struct sockaddr_in); |
|
addr.sin_family = AF_INET; |
|
if (bind_address == NULL) |
|
addr.sin_addr.s_addr = htonl(INADDR_ANY); |
|
else |
|
{ |
|
if (inet_aton(bind_address, &addr.sin_addr) == 0) |
|
{ |
|
struct hostent *hp; |
|
|
|
hp = gethostbyname(bind_address); |
|
if (!hp) |
|
ERROR1("no such address (%s) for -a switch", bind_address); |
|
|
|
memcpy(&addr.sin_addr, hp->h_addr, sizeof(addr.sin_addr)); |
/* |
} |
** Path to kernel namelist file specified on command line |
} |
*/ |
|
if (i < argc) |
|
path_unix = argv[i++]; |
|
|
if (isdigit(portno[0])) |
/* |
addr.sin_port = htons(atoi(portno)); |
** Path to kernel memory device specified on command line |
else |
*/ |
{ |
if (i < argc) |
sp = getservbyname(portno, "tcp"); |
path_kmem = argv[i++]; |
if (sp == NULL) |
|
ERROR1("main: getservbyname: %s", portno); |
|
addr.sin_port = sp->s_port; |
|
} |
|
|
|
if (bind(0, (struct sockaddr *) &addr, sizeof(addr)) < 0) |
|
ERROR("main: bind"); |
|
|
|
if (listen(0, 3) < 0) |
|
ERROR("main: listen"); |
if (i < argc) |
} |
ERROR1("Too many arguments: ignored from %s", argv[i]); |
|
|
if (set_gid) |
|
if (setgid(set_gid) == -1) |
|
ERROR("main: setgid"); |
|
|
|
if (set_uid) |
|
if (setuid(set_uid) == -1) |
|
ERROR("main: setuid"); |
|
|
|
/* |
|
** Do some special handling if the "-b" or "-w" flags are used |
|
*/ |
|
if (background_flag) |
|
{ |
|
int nfds, fd; |
|
fd_set read_set; |
|
|
|
|
|
/* |
/* |
** Set up the SIGCHLD signal child termination handler so |
** We used to call k_open here. But then the file descriptor |
** that we can avoid zombie processes hanging around and |
** kd->fd open on /dev/kmem is shared by all child processes. |
** handle childs terminating before being able to complete the |
** From the fork(2) man page: |
** handshake. |
** o The child process has its own copy of the parent's descriptors. These |
*/ |
** descriptors reference the same underlying objects. For instance, file |
#if (defined(SVR4) || defined(hpux) || defined(__hpux) || \ |
** pointers in file objects are shared between the child and the parent |
defined(__NetBSD__) || defined(_CRAY) || defined(_AUX_SOURCE)) |
** so that an lseek(2) on a descriptor in the child process can affect a |
signal(SIGCHLD, SIG_IGN); |
** subsequent read(2) or write(2) by the parent. |
#else |
** Thus with concurrent (simultaneous) identd client processes, |
signal(SIGCHLD, (SIGRETURN_TYPE (*)()) child_handler); |
** they step on each other's toes when they use kvm_read. |
#endif |
** |
|
** Calling k_open here was a mistake for another reason too: we |
|
** did not yet honor -u and -g options. Presumably we are |
|
** running as root (unless the in.identd file is setuid), and |
|
** then we can open kmem regardless of -u and -g values. |
|
** |
|
** |
|
** Open the kernel memory device and read the nlist table |
|
** |
|
** if (k_open() < 0) |
|
** ERROR("main: k_open"); |
|
*/ |
|
|
/* |
/* |
** Loop and dispatch client handling processes |
** Do the special handling needed for the "-b" flag |
*/ |
*/ |
do |
if (background_flag == 1) |
{ |
{ |
/* |
struct sockaddr_in addr; |
** Terminate if we've been idle for 'timeout' seconds |
struct servent *sp; |
*/ |
int fd; |
if (background_flag == 2 && timeout) |
|
{ |
|
signal(SIGALRM, alarm_handler); |
|
alarm(timeout); |
|
} |
|
|
|
/* |
|
** Wait for a connection request to occur. |
|
** Ignore EINTR (Interrupted System Call). |
|
*/ |
|
do |
|
{ |
|
FD_ZERO(&read_set); |
|
FD_SET(0, &read_set); |
|
|
|
if (timeout) |
if (!debug_flag) |
|
{ |
|
if (fork()) |
|
exit(0); |
|
|
|
close(0); |
|
close(1); |
|
close(2); |
|
|
|
if (fork()) |
|
exit(0); |
|
} |
|
|
|
fd = socket(AF_INET, SOCK_STREAM, 0); |
|
if (fd == -1) |
|
ERROR("main: socket"); |
|
|
|
if (fd != 0) |
|
dup2(fd, 0); |
|
|
|
clearmem((void *) &addr, (int) sizeof(addr)); |
|
|
|
addr.sin_family = AF_INET; |
|
if (bind_address == (char *) NULL) |
|
addr.sin_addr.s_addr = htonl(INADDR_ANY); |
|
else |
{ |
{ |
tv.tv_sec = timeout; |
if (isdigit(bind_address[0])) |
tv.tv_usec = 0; |
addr.sin_addr.s_addr = inet_addr(bind_address); |
nfds = select(FD_SETSIZE, &read_set, NULL, NULL, &tv); |
else |
|
{ |
|
struct hostent *hp; |
|
|
|
hp = gethostbyname(bind_address); |
|
if (!hp) |
|
ERROR1("no such address (%s) for -a switch", bind_address); |
|
|
|
/* This is ugly, should use memcpy() or bcopy() but... */ |
|
addr.sin_addr.s_addr = * (unsigned long *) (hp->h_addr); |
|
} |
} |
} |
|
|
|
if (isdigit(portno[0])) |
|
addr.sin_port = htons(atoi(portno)); |
else |
else |
|
{ |
|
sp = getservbyname(portno, "tcp"); |
|
if (sp == (struct servent *) NULL) |
|
ERROR1("main: getservbyname: %s", portno); |
|
addr.sin_port = sp->s_port; |
|
} |
|
|
nfds = select(FD_SETSIZE, &read_set, NULL, NULL, NULL); |
#ifdef SO_REUSEADDR |
} while (nfds < 0 && errno == EINTR); |
setsockopt(0, SOL_SOCKET, SO_REUSEADDR, (void *) &one, sizeof(one)); |
|
#endif |
|
|
/* |
if (bind(0, (struct sockaddr *) &addr, sizeof(addr)) < 0) |
** An error occured in select? Just die |
ERROR("main: bind"); |
*/ |
} |
if (nfds < 0) |
|
ERROR("main: select"); |
if (background_flag) |
|
{ |
/* |
if (listen(0, 3) < 0) |
** Timeout limit reached. Exit nicely |
ERROR("main: listen"); |
*/ |
} |
if (nfds == 0) |
|
exit(0); |
if (set_gid) |
|
{ |
|
if (setgid(set_gid) == -1) |
|
ERROR("main: setgid"); |
|
/* Call me paranoid... PSz */ |
|
if (getgid() != set_gid) |
|
ERROR2("main: setgid failed: wanted %d, got GID %d", set_gid, getgid()); |
|
if (getegid() != set_gid) |
|
ERROR2("main: setgid failed: wanted %d, got EGID %d", set_gid, getegid()); |
|
} |
|
|
|
if (set_uid) |
|
{ |
|
if (setuid(set_uid) == -1) |
|
ERROR("main: setuid"); |
|
/* Call me paranoid... PSz */ |
|
if (getuid() != set_uid) |
|
ERROR2("main: setuid failed: wanted %d, got UID %d", set_uid, getuid()); |
|
if (geteuid() != set_uid) |
|
ERROR2("main: setuid failed: wanted %d, got EUID %d", set_uid, geteuid()); |
|
} |
|
|
|
/* |
|
** Do some special handling if the "-b" or "-w" flags are used |
|
*/ |
|
if (background_flag) |
|
{ |
|
int nfds, fd; |
|
fd_set read_set; |
|
struct sockaddr sad; |
|
int sadlen; |
|
|
|
|
|
/* |
|
** Set up the SIGCHLD signal child termination handler so |
|
** that we can avoid zombie processes hanging around and |
|
** handle childs terminating before being able to complete the |
|
** handshake. |
|
*/ |
|
#if (defined(SVR4) || defined(hpux) || defined(__hpux) || defined(IRIX) || \ |
|
defined(_CRAY) || defined(_AUX_SOURCE) || defined(sco) || \ |
|
defined(LINUX)) |
|
signal(SIGCHLD, SIG_IGN); |
|
#else |
|
signal(SIGCHLD, child_handler); |
|
#endif |
|
|
|
/* |
|
** Loop and dispatch client handling processes |
|
*/ |
|
do |
|
{ |
|
#ifdef USE_SIGALARM |
|
/* |
|
** Terminate if we've been idle for 'timeout' seconds |
|
*/ |
|
if (background_flag == 2 && timeout) |
|
{ |
|
signal(SIGALRM, alarm_handler); |
|
alarm(timeout); |
|
} |
|
#endif |
|
|
|
/* |
|
** Wait for a connection request to occur. |
|
** Ignore EINTR (Interrupted System Call). |
|
*/ |
|
do |
|
{ |
|
FD_ZERO(&read_set); |
|
FD_SET(0, &read_set); |
|
|
|
#ifndef USE_SIGALARM |
|
if (timeout) |
|
{ |
|
tv.tv_sec = timeout; |
|
tv.tv_usec = 0; |
|
#ifdef __hpux |
|
nfds = select(FD_SETSIZE, |
|
(int *) &read_set, NULL, NULL, &tv); |
|
#else |
|
nfds = select(FD_SETSIZE, &read_set, NULL, NULL, &tv); |
|
#endif |
|
} |
|
else |
|
#endif |
|
|
|
#ifdef __hpux |
|
nfds = select(FD_SETSIZE, (int *) &read_set, NULL, NULL, NULL); |
|
#else |
|
nfds = select(FD_SETSIZE, &read_set, NULL, NULL, NULL); |
|
#endif |
|
} while (nfds < 0 && errno == EINTR); |
|
|
|
/* |
|
** An error occured in select? Just die |
|
*/ |
|
if (nfds < 0) |
|
ERROR("main: select"); |
|
|
|
/* |
|
** Timeout limit reached. Exit nicely |
|
*/ |
|
if (nfds == 0) |
|
exit(0); |
|
|
/* |
#ifdef USE_SIGALARM |
** Disable the alarm timeout |
/* |
*/ |
** Disable the alarm timeout |
alarm(0); |
*/ |
|
alarm(0); |
|
#endif |
|
|
/* |
/* |
** Accept the new client |
** Accept the new client |
*/ |
*/ |
fd = accept(0, NULL, NULL); |
sadlen = sizeof(sad); |
if (fd == -1) |
errno = 0; |
ERROR1("main: accept. errno = %d", errno); |
fd = accept(0, &sad, &sadlen); |
|
if (fd == -1) |
|
ERROR1("main: accept. errno = %d", errno); |
|
|
/* |
/* |
** And fork, then close the fd if we are the parent. |
** And fork, then close the fd if we are the parent. |
*/ |
*/ |
child_pid = fork(); |
child_pid = fork(); |
} while (child_pid && (close(fd), 1)); |
} while (child_pid && (close(fd), 1)); |
|
|
|
/* |
|
** We are now in child, the parent has returned to "do" above. |
|
*/ |
|
if (dup2(fd, 0) == -1) |
|
ERROR("main: dup2: failed fd 0"); |
|
|
|
if (dup2(fd, 1) == -1) |
|
ERROR("main: dup2: failed fd 1"); |
|
|
|
if (dup2(fd, 2) == -1) |
|
ERROR("main: dup2: failed fd 2"); |
|
} |
|
|
/* |
/* |
** We are now in child, the parent has returned to "do" above. |
** Get foreign internet address |
*/ |
*/ |
if (dup2(fd, 0) == -1) |
len = sizeof(sin); |
ERROR("main: dup2: failed fd 0"); |
if (getpeername(0, (struct sockaddr *) &sin, &len) == -1) |
|
{ |
|
/* |
|
** A user has tried to start us from the command line or |
|
** the network link died, in which case this message won't |
|
** reach to other end anyway, so lets give the poor user some |
|
** errors. |
|
*/ |
|
perror("in.identd: getpeername()"); |
|
exit(1); |
|
} |
|
|
if (dup2(fd, 1) == -1) |
faddr = sin.sin_addr; |
ERROR("main: dup2: failed fd 1"); |
|
|
|
if (dup2(fd, 2) == -1) |
|
ERROR("main: dup2: failed fd 2"); |
#ifdef STRONG_LOG |
} |
if (syslog_flag) |
|
syslog(LOG_INFO, "Connection from %s", gethost(&faddr)); |
|
#endif |
|
|
/* |
|
** Get foreign internet address |
/* |
*/ |
** Get local internet address |
len = sizeof(sin); |
|
if (getpeername(0, (struct sockaddr *) &sin, &len) == -1) |
|
{ |
|
/* |
|
** A user has tried to start us from the command line or |
|
** the network link died, in which case this message won't |
|
** reach to other end anyway, so lets give the poor user some |
|
** errors. |
|
*/ |
*/ |
perror("in.identd: getpeername()"); |
len = sizeof(sin); |
exit(1); |
#ifdef ATTSVR4 |
} |
if (t_getsockname(0, (struct sockaddr *) &sin, &len) == -1) |
|
|
faddr = sin.sin_addr; |
|
|
|
|
|
/* |
|
** Open the connection to the Syslog daemon if requested |
|
*/ |
|
if (syslog_flag) |
|
{ |
|
#ifdef LOG_DAEMON |
|
openlog("identd", LOG_PID, syslog_facility); |
|
#else |
#else |
openlog("identd", LOG_PID); |
if (getsockname(0, (struct sockaddr *) &sin, &len) == -1) |
#endif |
#endif |
|
{ |
|
/* |
|
** We can just die here, because if this fails then the |
|
** network has died and we haven't got anyone to return |
|
** errors to. |
|
*/ |
|
exit(1); |
|
} |
|
laddr = sin.sin_addr; |
|
|
syslog(LOG_INFO, "Connection from %s", gethost(&faddr)); |
|
} |
|
|
|
|
|
/* |
|
** Get local internet address |
|
*/ |
|
len = sizeof(sin); |
|
#ifdef ATTSVR4 |
|
if (t_getsockname(0, (struct sockaddr *) &sin, &len) == -1) |
|
#else |
|
if (getsockname(0, (struct sockaddr *) &sin, &len) == -1) |
|
#endif |
|
{ |
|
/* |
/* |
** We can just die here, because if this fails then the |
** Get the local/foreign port pair from the luser |
** network has died and we haven't got anyone to return |
|
** errors to. |
|
*/ |
*/ |
exit(1); |
parse(stdin, &laddr, &faddr); |
} |
|
laddr = sin.sin_addr; |
|
|
|
|
|
/* |
|
** Get the local/foreign port pair from the luser |
|
*/ |
|
parse(stdin, &laddr, &faddr); |
|
|
|
exit(0); |
exit(0); |
} |
} |