xref: /csrg-svn/libexec/ftpd/ftpd.c (revision 27750)
122499Sdist /*
226044Sminshall  * Copyright (c) 1985 Regents of the University of California.
322499Sdist  * All rights reserved.  The Berkeley software License Agreement
422499Sdist  * specifies the terms and conditions for redistribution.
522499Sdist  */
622499Sdist 
710275Ssam #ifndef lint
822499Sdist char copyright[] =
926044Sminshall "@(#) Copyright (c) 1985 Regents of the University of California.\n\
1022499Sdist  All rights reserved.\n";
1122499Sdist #endif not lint
1210275Ssam 
1322499Sdist #ifndef lint
14*27750Sminshall static char sccsid[] = "@(#)ftpd.c	5.6 (Berkeley) 05/06/86";
1522499Sdist #endif not lint
1622499Sdist 
1710275Ssam /*
1810275Ssam  * FTP server.
1910275Ssam  */
2010303Ssam #include <sys/param.h>
2110275Ssam #include <sys/stat.h>
2210275Ssam #include <sys/ioctl.h>
2310275Ssam #include <sys/socket.h>
2413247Ssam #include <sys/file.h>
2513595Ssam #include <sys/wait.h>
2610275Ssam 
2710275Ssam #include <netinet/in.h>
2810275Ssam 
2913034Ssam #include <arpa/ftp.h>
3013211Sroot #include <arpa/inet.h>
3126044Sminshall #include <arpa/telnet.h>
3213034Ssam 
3310275Ssam #include <stdio.h>
3410275Ssam #include <signal.h>
3510275Ssam #include <pwd.h>
3610275Ssam #include <setjmp.h>
3710275Ssam #include <netdb.h>
3810423Ssam #include <errno.h>
3926044Sminshall #include <strings.h>
4026493Sminshall #include <syslog.h>
4110275Ssam 
4210695Ssam /*
4310695Ssam  * File containing login names
4410695Ssam  * NOT to be used on this machine.
4510695Ssam  * Commonly used to disallow uucp.
4610695Ssam  */
4710695Ssam #define	FTPUSERS	"/etc/ftpusers"
4810695Ssam 
4910275Ssam extern	int errno;
5010275Ssam extern	char *sys_errlist[];
5110275Ssam extern	char *crypt();
5210275Ssam extern	char version[];
5310275Ssam extern	char *home;		/* pointer to home directory for glob */
5426044Sminshall extern	FILE *popen(), *fopen(), *freopen();
5526493Sminshall extern	int  pclose(), fclose();
5626044Sminshall extern	char *getline();
5726044Sminshall extern	char cbuf[];
5810275Ssam 
5910275Ssam struct	sockaddr_in ctrl_addr;
6010275Ssam struct	sockaddr_in data_source;
6110275Ssam struct	sockaddr_in data_dest;
6210275Ssam struct	sockaddr_in his_addr;
6310275Ssam 
6410275Ssam int	data;
6526044Sminshall jmp_buf	errcatch, urgcatch;
6610275Ssam int	logged_in;
6710275Ssam struct	passwd *pw;
6810275Ssam int	debug;
6926493Sminshall int	timeout = 900;    /* timeout after 15 minutes of inactivity */
7011757Ssam int	logging;
7110275Ssam int	guest;
7216033Sralph int	wtmp;
7310275Ssam int	type;
7410275Ssam int	form;
7510275Ssam int	stru;			/* avoid C keyword */
7610275Ssam int	mode;
7710321Ssam int	usedefault = 1;		/* for data transfers */
7826044Sminshall int	pdata;			/* for passive mode */
7926044Sminshall int	unique;
8026044Sminshall int	transflag;
8126044Sminshall char	tmpline[7];
8210275Ssam char	hostname[32];
8313247Ssam char	remotehost[32];
8410275Ssam 
8511653Ssam /*
8611653Ssam  * Timeout intervals for retrying connections
8711653Ssam  * to hosts that don't accept PORT cmds.  This
8811653Ssam  * is a kludge, but given the problems with TCP...
8911653Ssam  */
9011653Ssam #define	SWAITMAX	90	/* wait at most 90 seconds */
9111653Ssam #define	SWAITINT	5	/* interval between retries */
9211653Ssam 
9311653Ssam int	swaitmax = SWAITMAX;
9411653Ssam int	swaitint = SWAITINT;
9511653Ssam 
9610275Ssam int	lostconn();
9726044Sminshall int	myoob();
9810275Ssam FILE	*getdatasock(), *dataconn();
9910275Ssam 
10010275Ssam main(argc, argv)
10110275Ssam 	int argc;
10210275Ssam 	char *argv[];
10310275Ssam {
104*27750Sminshall 	int addrlen, on = 1;
10526044Sminshall 	long pgid;
10610275Ssam 	char *cp;
10710275Ssam 
10816339Skarels 	addrlen = sizeof (his_addr);
10916339Skarels 	if (getpeername(0, &his_addr, &addrlen) < 0) {
11026493Sminshall 		syslog(LOG_ERR, "getpeername (%s): %m",argv[0]);
11110275Ssam 		exit(1);
11210275Ssam 	}
11316339Skarels 	addrlen = sizeof (ctrl_addr);
11426493Sminshall 	if (getsockname(0, (char *) &ctrl_addr, &addrlen) < 0) {
11526493Sminshall 		syslog(LOG_ERR, "getsockname (%s): %m",argv[0]);
11616339Skarels 		exit(1);
11716339Skarels 	}
11816339Skarels 	data_source.sin_port = htons(ntohs(ctrl_addr.sin_port) - 1);
11910275Ssam 	debug = 0;
12026493Sminshall 	openlog("ftpd", LOG_PID, LOG_DAEMON);
12110275Ssam 	argc--, argv++;
12210275Ssam 	while (argc > 0 && *argv[0] == '-') {
12310275Ssam 		for (cp = &argv[0][1]; *cp; cp++) switch (*cp) {
12410275Ssam 
12511653Ssam 		case 'v':
12611653Ssam 			debug = 1;
12711653Ssam 			break;
12811653Ssam 
12910275Ssam 		case 'd':
13010275Ssam 			debug = 1;
13110275Ssam 			break;
13210275Ssam 
13311757Ssam 		case 'l':
13411757Ssam 			logging = 1;
13511757Ssam 			break;
13611757Ssam 
13711653Ssam 		case 't':
13811653Ssam 			timeout = atoi(++cp);
13911653Ssam 			goto nextopt;
14011653Ssam 			break;
14111653Ssam 
14210275Ssam 		default:
14316339Skarels 			fprintf(stderr, "ftpd: Unknown flag -%c ignored.\n",
14416339Skarels 			     *cp);
14510275Ssam 			break;
14610275Ssam 		}
14711653Ssam nextopt:
14810275Ssam 		argc--, argv++;
14910275Ssam 	}
15026493Sminshall 	(void) signal(SIGPIPE, lostconn);
15126493Sminshall 	(void) signal(SIGCHLD, SIG_IGN);
15226044Sminshall 	if (signal(SIGURG, myoob) < 0) {
15326493Sminshall 		syslog(LOG_ERR, "signal: %m");
15426044Sminshall 	}
155*27750Sminshall 	/* handle urgent data inline */
156*27750Sminshall #ifdef SO_OOBINLINE
157*27750Sminshall 	if (setsockopt(0, SOL_SOCKET, SO_OOBINLINE, (char *)&on, sizeof(on)) < 0) {
158*27750Sminshall 		syslog(LOG_ERR, "setsockopt: %m");
159*27750Sminshall 	}
160*27750Sminshall #endif SO_OOBINLINE
16126044Sminshall 	pgid = getpid();
162*27750Sminshall 	if (ioctl(fileno(stdin), SIOCSPGRP, (char *) &pgid) < 0) {
16326493Sminshall 		syslog(LOG_ERR, "ioctl: %m");
16426044Sminshall 	}
16516760Slepreau 	dolog(&his_addr);
16616339Skarels 	/* do telnet option negotiation here */
16716339Skarels 	/*
16816339Skarels 	 * Set up default state
16916339Skarels 	 */
17016339Skarels 	logged_in = 0;
17116339Skarels 	data = -1;
17216339Skarels 	type = TYPE_A;
17316339Skarels 	form = FORM_N;
17416339Skarels 	stru = STRU_F;
17516339Skarels 	mode = MODE_S;
17626044Sminshall 	tmpline[0] = '\0';
17726493Sminshall 	(void) gethostname(hostname, sizeof (hostname));
17816339Skarels 	reply(220, "%s FTP server (%s) ready.",
17916339Skarels 		hostname, version);
18010275Ssam 	for (;;) {
18126493Sminshall 		(void) setjmp(errcatch);
18226493Sminshall 		(void) yyparse();
18310275Ssam 	}
18410275Ssam }
18510419Ssam 
18610275Ssam lostconn()
18710275Ssam {
18810275Ssam 
18914089Ssam 	if (debug)
19026493Sminshall 		syslog(LOG_DEBUG, "lost connection");
19114089Ssam 	dologout(-1);
19210275Ssam }
19310275Ssam 
19410275Ssam pass(passwd)
19510275Ssam 	char *passwd;
19610275Ssam {
19710303Ssam 	char *xpasswd, *savestr();
19810303Ssam 	static struct passwd save;
19910275Ssam 
20010275Ssam 	if (logged_in || pw == NULL) {
20110275Ssam 		reply(503, "Login with USER first.");
20210275Ssam 		return;
20310275Ssam 	}
20410275Ssam 	if (!guest) {		/* "ftp" is only account allowed no password */
20510275Ssam 		xpasswd = crypt(passwd, pw->pw_passwd);
20616760Slepreau 		/* The strcmp does not catch null passwords! */
20716760Slepreau 		if (*pw->pw_passwd == '\0' || strcmp(xpasswd, pw->pw_passwd)) {
20810275Ssam 			reply(530, "Login incorrect.");
20910275Ssam 			pw = NULL;
21010275Ssam 			return;
21110275Ssam 		}
21210275Ssam 	}
21310303Ssam 	setegid(pw->pw_gid);
21410275Ssam 	initgroups(pw->pw_name, pw->pw_gid);
21510275Ssam 	if (chdir(pw->pw_dir)) {
21627106Smckusick 		reply(530, "User %s: can't change directory to %s.",
21710275Ssam 			pw->pw_name, pw->pw_dir);
21810303Ssam 		goto bad;
21910275Ssam 	}
22016033Sralph 
22116760Slepreau 	/* grab wtmp before chroot */
22216760Slepreau 	wtmp = open("/usr/adm/wtmp", O_WRONLY|O_APPEND);
22310303Ssam 	if (guest && chroot(pw->pw_dir) < 0) {
22410275Ssam 		reply(550, "Can't set guest privileges.");
22516760Slepreau 		if (wtmp >= 0) {
22616760Slepreau 			(void) close(wtmp);
22716760Slepreau 			wtmp = -1;
22816760Slepreau 		}
22910303Ssam 		goto bad;
23010275Ssam 	}
23110275Ssam 	if (!guest)
23210275Ssam 		reply(230, "User %s logged in.", pw->pw_name);
23310275Ssam 	else
23410275Ssam 		reply(230, "Guest login ok, access restrictions apply.");
23510275Ssam 	logged_in = 1;
23613247Ssam 	dologin(pw);
23710303Ssam 	seteuid(pw->pw_uid);
23810303Ssam 	/*
23910303Ssam 	 * Save everything so globbing doesn't
24010303Ssam 	 * clobber the fields.
24110303Ssam 	 */
24210303Ssam 	save = *pw;
24310303Ssam 	save.pw_name = savestr(pw->pw_name);
24410303Ssam 	save.pw_passwd = savestr(pw->pw_passwd);
24510303Ssam 	save.pw_comment = savestr(pw->pw_comment);
24626493Sminshall 	save.pw_gecos = savestr(pw->pw_gecos);
24710303Ssam 	save.pw_dir = savestr(pw->pw_dir);
24810303Ssam 	save.pw_shell = savestr(pw->pw_shell);
24910303Ssam 	pw = &save;
25010303Ssam 	home = pw->pw_dir;		/* home dir for globbing */
25110303Ssam 	return;
25210303Ssam bad:
25310303Ssam 	seteuid(0);
25410303Ssam 	pw = NULL;
25510275Ssam }
25610275Ssam 
25710303Ssam char *
25810303Ssam savestr(s)
25910303Ssam 	char *s;
26010303Ssam {
26110303Ssam 	char *malloc();
26226493Sminshall 	char *new = malloc((unsigned) strlen(s) + 1);
26310303Ssam 
26410303Ssam 	if (new != NULL)
26526493Sminshall 		(void) strcpy(new, s);
26611347Ssam 	return (new);
26710303Ssam }
26810303Ssam 
26910275Ssam retrieve(cmd, name)
27010275Ssam 	char *cmd, *name;
27110275Ssam {
27210275Ssam 	FILE *fin, *dout;
27310275Ssam 	struct stat st;
27426044Sminshall 	int (*closefunc)(), tmp;
27510275Ssam 
27610275Ssam 	if (cmd == 0) {
27710317Ssam #ifdef notdef
27810317Ssam 		/* no remote command execution -- it's a security hole */
27911653Ssam 		if (*name == '|')
28010275Ssam 			fin = popen(name + 1, "r"), closefunc = pclose;
28110275Ssam 		else
28210317Ssam #endif
28310275Ssam 			fin = fopen(name, "r"), closefunc = fclose;
28410275Ssam 	} else {
28510275Ssam 		char line[BUFSIZ];
28610275Ssam 
28726493Sminshall 		(void) sprintf(line, cmd, name), name = line;
28810275Ssam 		fin = popen(line, "r"), closefunc = pclose;
28910275Ssam 	}
29010275Ssam 	if (fin == NULL) {
29113152Ssam 		if (errno != 0)
29213152Ssam 			reply(550, "%s: %s.", name, sys_errlist[errno]);
29310275Ssam 		return;
29410275Ssam 	}
29510275Ssam 	st.st_size = 0;
29610275Ssam 	if (cmd == 0 &&
29710275Ssam 	    (stat(name, &st) < 0 || (st.st_mode&S_IFMT) != S_IFREG)) {
29810275Ssam 		reply(550, "%s: not a plain file.", name);
29910275Ssam 		goto done;
30010275Ssam 	}
30110275Ssam 	dout = dataconn(name, st.st_size, "w");
30210275Ssam 	if (dout == NULL)
30310275Ssam 		goto done;
30426044Sminshall 	if ((tmp = send_data(fin, dout)) > 0 || ferror(dout) > 0) {
30510275Ssam 		reply(550, "%s: %s.", name, sys_errlist[errno]);
30626044Sminshall 	}
30726044Sminshall 	else if (tmp == 0) {
30810275Ssam 		reply(226, "Transfer complete.");
30926044Sminshall 	}
31026493Sminshall 	(void) fclose(dout);
31126044Sminshall 	data = -1;
31226044Sminshall 	pdata = -1;
31310275Ssam done:
31410275Ssam 	(*closefunc)(fin);
31510275Ssam }
31610275Ssam 
31710275Ssam store(name, mode)
31810275Ssam 	char *name, *mode;
31910275Ssam {
32010275Ssam 	FILE *fout, *din;
32126044Sminshall 	int (*closefunc)(), dochown = 0, tmp;
32226044Sminshall 	char *gunique(), *local;
32310275Ssam 
32410317Ssam #ifdef notdef
32510317Ssam 	/* no remote command execution -- it's a security hole */
32611653Ssam 	if (name[0] == '|')
32710275Ssam 		fout = popen(&name[1], "w"), closefunc = pclose;
32810317Ssam 	else
32910317Ssam #endif
33010317Ssam 	{
33110303Ssam 		struct stat st;
33210303Ssam 
33326044Sminshall 		local = name;
33426044Sminshall 		if (stat(name, &st) < 0) {
33510303Ssam 			dochown++;
33626044Sminshall 		}
33726044Sminshall 		else if (unique) {
33826044Sminshall 			if ((local = gunique(name)) == NULL) {
33926044Sminshall 				return;
34026044Sminshall 			}
34126044Sminshall 			dochown++;
34226044Sminshall 		}
34326044Sminshall 		fout = fopen(local, mode), closefunc = fclose;
34410303Ssam 	}
34510275Ssam 	if (fout == NULL) {
34627106Smckusick 		reply(553, "%s: %s.", local, sys_errlist[errno]);
34710275Ssam 		return;
34810275Ssam 	}
34926044Sminshall 	din = dataconn(local, (off_t)-1, "r");
35010275Ssam 	if (din == NULL)
35110275Ssam 		goto done;
35226044Sminshall 	if ((tmp = receive_data(din, fout)) > 0 || ferror(fout) > 0) {
35327106Smckusick 		reply(552, "%s: %s.", local, sys_errlist[errno]);
35426044Sminshall 	}
35526044Sminshall 	else if (tmp == 0 && !unique) {
35610275Ssam 		reply(226, "Transfer complete.");
35726044Sminshall 	}
35826044Sminshall 	else if (tmp == 0 && unique) {
35926044Sminshall 		reply(226, "Transfer complete (unique file name:%s).", local);
36026044Sminshall 	}
36126493Sminshall 	(void) fclose(din);
36226044Sminshall 	data = -1;
36326044Sminshall 	pdata = -1;
36410275Ssam done:
36510303Ssam 	if (dochown)
36626044Sminshall 		(void) chown(local, pw->pw_uid, -1);
36710275Ssam 	(*closefunc)(fout);
36810275Ssam }
36910275Ssam 
37010275Ssam FILE *
37110275Ssam getdatasock(mode)
37210275Ssam 	char *mode;
37310275Ssam {
37417157Ssam 	int s, on = 1;
37510275Ssam 
37610275Ssam 	if (data >= 0)
37710275Ssam 		return (fdopen(data, mode));
37813247Ssam 	s = socket(AF_INET, SOCK_STREAM, 0);
37910602Ssam 	if (s < 0)
38010275Ssam 		return (NULL);
38110275Ssam 	seteuid(0);
38226493Sminshall 	if (setsockopt(s, SOL_SOCKET, SO_REUSEADDR, (char *) &on, sizeof (on)) < 0)
38310602Ssam 		goto bad;
38413152Ssam 	/* anchor socket to avoid multi-homing problems */
38513152Ssam 	data_source.sin_family = AF_INET;
38613152Ssam 	data_source.sin_addr = ctrl_addr.sin_addr;
38726493Sminshall 	if (bind(s, &data_source, sizeof (data_source)) < 0)
38810602Ssam 		goto bad;
38910311Ssam 	seteuid(pw->pw_uid);
39010275Ssam 	return (fdopen(s, mode));
39110602Ssam bad:
39210602Ssam 	seteuid(pw->pw_uid);
39326493Sminshall 	(void) close(s);
39410602Ssam 	return (NULL);
39510275Ssam }
39610275Ssam 
39710275Ssam FILE *
39810275Ssam dataconn(name, size, mode)
39910275Ssam 	char *name;
40011653Ssam 	off_t size;
40110275Ssam 	char *mode;
40210275Ssam {
40310275Ssam 	char sizebuf[32];
40410275Ssam 	FILE *file;
40511653Ssam 	int retry = 0;
40610275Ssam 
40710275Ssam 	if (size >= 0)
40826493Sminshall 		(void) sprintf (sizebuf, " (%ld bytes)", size);
40910275Ssam 	else
41010275Ssam 		(void) strcpy(sizebuf, "");
41126044Sminshall 	if (pdata > 0) {
41226044Sminshall 		struct sockaddr_in from;
41326044Sminshall 		int s, fromlen = sizeof(from);
41426044Sminshall 
41526493Sminshall 		s = accept(pdata, &from, &fromlen);
41626044Sminshall 		if (s < 0) {
41726044Sminshall 			reply(425, "Can't open data connection.");
41826044Sminshall 			(void) close(pdata);
41926044Sminshall 			pdata = -1;
42026044Sminshall 			return(NULL);
42126044Sminshall 		}
42226044Sminshall 		(void) close(pdata);
42326044Sminshall 		pdata = s;
42426044Sminshall 		reply(150, "Openning data connection for %s (%s,%d)%s.",
42526493Sminshall 		     name, inet_ntoa(from.sin_addr),
42626044Sminshall 		     ntohs(from.sin_port), sizebuf);
42726044Sminshall 		return(fdopen(pdata, mode));
42826044Sminshall 	}
42910275Ssam 	if (data >= 0) {
43010275Ssam 		reply(125, "Using existing data connection for %s%s.",
43110275Ssam 		    name, sizebuf);
43210321Ssam 		usedefault = 1;
43310275Ssam 		return (fdopen(data, mode));
43410275Ssam 	}
43510566Ssam 	if (usedefault)
43610422Ssam 		data_dest = his_addr;
43710422Ssam 	usedefault = 1;
43810275Ssam 	file = getdatasock(mode);
43910275Ssam 	if (file == NULL) {
44010275Ssam 		reply(425, "Can't create data socket (%s,%d): %s.",
44113247Ssam 		    inet_ntoa(data_source.sin_addr),
44210275Ssam 		    ntohs(data_source.sin_port),
44310275Ssam 		    sys_errlist[errno]);
44410275Ssam 		return (NULL);
44510275Ssam 	}
44610275Ssam 	data = fileno(file);
44726044Sminshall 	while (connect(data, &data_dest, sizeof (data_dest)) < 0) {
44811653Ssam 		if (errno == EADDRINUSE && retry < swaitmax) {
44926493Sminshall 			sleep((unsigned) swaitint);
45011653Ssam 			retry += swaitint;
45111653Ssam 			continue;
45211653Ssam 		}
45310275Ssam 		reply(425, "Can't build data connection: %s.",
45410275Ssam 		    sys_errlist[errno]);
45510275Ssam 		(void) fclose(file);
45610275Ssam 		data = -1;
45710275Ssam 		return (NULL);
45810275Ssam 	}
459*27750Sminshall 	reply(150, "Opening data connection for %s (%s,%d)%s.",
460*27750Sminshall 	    name, inet_ntoa(data_dest.sin_addr),
461*27750Sminshall 	    ntohs(data_dest.sin_port), sizebuf);
46210275Ssam 	return (file);
46310275Ssam }
46410275Ssam 
46510275Ssam /*
46610275Ssam  * Tranfer the contents of "instr" to
46710275Ssam  * "outstr" peer using the appropriate
46810275Ssam  * encapulation of the date subject
46910275Ssam  * to Mode, Structure, and Type.
47010275Ssam  *
47110275Ssam  * NB: Form isn't handled.
47210275Ssam  */
47310275Ssam send_data(instr, outstr)
47410275Ssam 	FILE *instr, *outstr;
47510275Ssam {
47610275Ssam 	register int c;
47710275Ssam 	int netfd, filefd, cnt;
47810275Ssam 	char buf[BUFSIZ];
47910275Ssam 
48026044Sminshall 	transflag++;
48126044Sminshall 	if (setjmp(urgcatch)) {
48226044Sminshall 		transflag = 0;
48326044Sminshall 		return(-1);
48426044Sminshall 	}
48510275Ssam 	switch (type) {
48610275Ssam 
48710275Ssam 	case TYPE_A:
48810275Ssam 		while ((c = getc(instr)) != EOF) {
48911220Ssam 			if (c == '\n') {
49026044Sminshall 				if (ferror (outstr)) {
49126044Sminshall 					transflag = 0;
49211220Ssam 					return (1);
49326044Sminshall 				}
494*27750Sminshall 				(void) putc('\r', outstr);
49511220Ssam 			}
496*27750Sminshall 			(void) putc(c, outstr);
49726044Sminshall 		/*	if (c == '\r')			*/
49826044Sminshall 		/*		putc ('\0', outstr);	*/
49910275Ssam 		}
50026044Sminshall 		transflag = 0;
50126044Sminshall 		if (ferror (instr) || ferror (outstr)) {
50211220Ssam 			return (1);
50326044Sminshall 		}
50410275Ssam 		return (0);
50510275Ssam 
50610275Ssam 	case TYPE_I:
50710275Ssam 	case TYPE_L:
50810275Ssam 		netfd = fileno(outstr);
50910275Ssam 		filefd = fileno(instr);
51010275Ssam 
51126044Sminshall 		while ((cnt = read(filefd, buf, sizeof (buf))) > 0) {
51226044Sminshall 			if (write(netfd, buf, cnt) < 0) {
51326044Sminshall 				transflag = 0;
51410275Ssam 				return (1);
51526044Sminshall 			}
51626044Sminshall 		}
51726044Sminshall 		transflag = 0;
51810275Ssam 		return (cnt < 0);
51910275Ssam 	}
52027106Smckusick 	reply(550, "Unimplemented TYPE %d in send_data", type);
52126044Sminshall 	transflag = 0;
52227106Smckusick 	return (-1);
52310275Ssam }
52410275Ssam 
52510275Ssam /*
52610275Ssam  * Transfer data from peer to
52710275Ssam  * "outstr" using the appropriate
52810275Ssam  * encapulation of the data subject
52910275Ssam  * to Mode, Structure, and Type.
53010275Ssam  *
53110275Ssam  * N.B.: Form isn't handled.
53210275Ssam  */
53310275Ssam receive_data(instr, outstr)
53410275Ssam 	FILE *instr, *outstr;
53510275Ssam {
53610275Ssam 	register int c;
53711220Ssam 	int cnt;
53810275Ssam 	char buf[BUFSIZ];
53910275Ssam 
54010275Ssam 
54126044Sminshall 	transflag++;
54226044Sminshall 	if (setjmp(urgcatch)) {
54326044Sminshall 		transflag = 0;
54426044Sminshall 		return(-1);
54526044Sminshall 	}
54610275Ssam 	switch (type) {
54710275Ssam 
54810275Ssam 	case TYPE_I:
54910275Ssam 	case TYPE_L:
55026044Sminshall 		while ((cnt = read(fileno(instr), buf, sizeof buf)) > 0) {
55126044Sminshall 			if (write(fileno(outstr), buf, cnt) < 0) {
55226044Sminshall 				transflag = 0;
55310275Ssam 				return (1);
55426044Sminshall 			}
55526044Sminshall 		}
55626044Sminshall 		transflag = 0;
55710275Ssam 		return (cnt < 0);
55810275Ssam 
55910275Ssam 	case TYPE_E:
56027106Smckusick 		reply(553, "TYPE E not implemented.");
56126044Sminshall 		transflag = 0;
56227106Smckusick 		return (-1);
56310275Ssam 
56410275Ssam 	case TYPE_A:
56510275Ssam 		while ((c = getc(instr)) != EOF) {
566*27750Sminshall 			while (c == '\r') {
56726044Sminshall 				if (ferror (outstr)) {
56826044Sminshall 					transflag = 0;
56911220Ssam 					return (1);
57026044Sminshall 				}
57111220Ssam 				if ((c = getc(instr)) != '\n')
572*27750Sminshall 					(void) putc ('\r', outstr);
57326044Sminshall 			/*	if (c == '\0')			*/
57426044Sminshall 			/*		continue;		*/
57510275Ssam 			}
576*27750Sminshall 			(void) putc (c, outstr);
57710275Ssam 		}
57826044Sminshall 		transflag = 0;
57911220Ssam 		if (ferror (instr) || ferror (outstr))
58011220Ssam 			return (1);
58110275Ssam 		return (0);
58210275Ssam 	}
58326044Sminshall 	transflag = 0;
58410275Ssam 	fatal("Unknown type in receive_data.");
58510275Ssam 	/*NOTREACHED*/
58610275Ssam }
58710275Ssam 
58810275Ssam fatal(s)
58910275Ssam 	char *s;
59010275Ssam {
59110275Ssam 	reply(451, "Error in server: %s\n", s);
59210275Ssam 	reply(221, "Closing connection due to server error.");
59313247Ssam 	dologout(0);
59410275Ssam }
59510275Ssam 
59626493Sminshall /*VARARGS2*/
59710275Ssam reply(n, s, args)
59810275Ssam 	int n;
59910275Ssam 	char *s;
60010275Ssam {
60110275Ssam 
60210275Ssam 	printf("%d ", n);
60310275Ssam 	_doprnt(s, &args, stdout);
60410275Ssam 	printf("\r\n");
60526493Sminshall 	(void) fflush(stdout);
60610275Ssam 	if (debug) {
60726493Sminshall 		syslog(LOG_DEBUG, "<--- %d ", n);
60826493Sminshall 		syslog(LOG_DEBUG, s, &args);
60910275Ssam 	}
61010275Ssam }
61110275Ssam 
61226493Sminshall /*VARARGS2*/
61310275Ssam lreply(n, s, args)
61410275Ssam 	int n;
61510275Ssam 	char *s;
61610275Ssam {
61710275Ssam 	printf("%d-", n);
61810275Ssam 	_doprnt(s, &args, stdout);
61910275Ssam 	printf("\r\n");
62026493Sminshall 	(void) fflush(stdout);
62110275Ssam 	if (debug) {
62226493Sminshall 		syslog(LOG_DEBUG, "<--- %d- ", n);
62326493Sminshall 		syslog(LOG_DEBUG, s, &args);
62410275Ssam 	}
62510275Ssam }
62610275Ssam 
62710275Ssam ack(s)
62810275Ssam 	char *s;
62910275Ssam {
63027106Smckusick 	reply(250, "%s command successful.", s);
63110275Ssam }
63210275Ssam 
63310275Ssam nack(s)
63410275Ssam 	char *s;
63510275Ssam {
63610275Ssam 	reply(502, "%s command not implemented.", s);
63710275Ssam }
63810275Ssam 
63926493Sminshall yyerror(s)
64026493Sminshall 	char *s;
64110275Ssam {
64226044Sminshall 	char *cp;
64326044Sminshall 
64426044Sminshall 	cp = index(cbuf,'\n');
64526044Sminshall 	*cp = '\0';
64626044Sminshall 	reply(500, "'%s': command not understood.",cbuf);
64710275Ssam }
64810275Ssam 
64910275Ssam delete(name)
65010275Ssam 	char *name;
65110275Ssam {
65210275Ssam 	struct stat st;
65310275Ssam 
65410275Ssam 	if (stat(name, &st) < 0) {
65510275Ssam 		reply(550, "%s: %s.", name, sys_errlist[errno]);
65610275Ssam 		return;
65710275Ssam 	}
65810275Ssam 	if ((st.st_mode&S_IFMT) == S_IFDIR) {
65910275Ssam 		if (rmdir(name) < 0) {
66010275Ssam 			reply(550, "%s: %s.", name, sys_errlist[errno]);
66110275Ssam 			return;
66210275Ssam 		}
66310275Ssam 		goto done;
66410275Ssam 	}
66510275Ssam 	if (unlink(name) < 0) {
66610275Ssam 		reply(550, "%s: %s.", name, sys_errlist[errno]);
66710275Ssam 		return;
66810275Ssam 	}
66910275Ssam done:
67010275Ssam 	ack("DELE");
67110275Ssam }
67210275Ssam 
67310275Ssam cwd(path)
67410275Ssam 	char *path;
67510275Ssam {
67610275Ssam 
67710275Ssam 	if (chdir(path) < 0) {
67810275Ssam 		reply(550, "%s: %s.", path, sys_errlist[errno]);
67910275Ssam 		return;
68010275Ssam 	}
68110275Ssam 	ack("CWD");
68210275Ssam }
68310275Ssam 
68410303Ssam makedir(name)
68510275Ssam 	char *name;
68610275Ssam {
68710303Ssam 	struct stat st;
68810303Ssam 	int dochown = stat(name, &st) < 0;
68910275Ssam 
69010275Ssam 	if (mkdir(name, 0777) < 0) {
69110275Ssam 		reply(550, "%s: %s.", name, sys_errlist[errno]);
69210275Ssam 		return;
69310275Ssam 	}
69410303Ssam 	if (dochown)
69510303Ssam 		(void) chown(name, pw->pw_uid, -1);
69627106Smckusick 	reply(257, "MKD command successful.");
69710275Ssam }
69810275Ssam 
69910303Ssam removedir(name)
70010275Ssam 	char *name;
70110275Ssam {
70210275Ssam 
70310275Ssam 	if (rmdir(name) < 0) {
70410275Ssam 		reply(550, "%s: %s.", name, sys_errlist[errno]);
70510275Ssam 		return;
70610275Ssam 	}
70727106Smckusick 	ack("RMD");
70810275Ssam }
70910275Ssam 
71010303Ssam pwd()
71110275Ssam {
71210303Ssam 	char path[MAXPATHLEN + 1];
71310275Ssam 
71410275Ssam 	if (getwd(path) == NULL) {
71527106Smckusick 		reply(550, "%s.", path);
71610275Ssam 		return;
71710275Ssam 	}
71827106Smckusick 	reply(257, "\"%s\" is current directory.", path);
71910275Ssam }
72010275Ssam 
72110275Ssam char *
72210275Ssam renamefrom(name)
72310275Ssam 	char *name;
72410275Ssam {
72510275Ssam 	struct stat st;
72610275Ssam 
72710275Ssam 	if (stat(name, &st) < 0) {
72810275Ssam 		reply(550, "%s: %s.", name, sys_errlist[errno]);
72910275Ssam 		return ((char *)0);
73010275Ssam 	}
73110303Ssam 	reply(350, "File exists, ready for destination name");
73210275Ssam 	return (name);
73310275Ssam }
73410275Ssam 
73510275Ssam renamecmd(from, to)
73610275Ssam 	char *from, *to;
73710275Ssam {
73810275Ssam 
73910275Ssam 	if (rename(from, to) < 0) {
74010275Ssam 		reply(550, "rename: %s.", sys_errlist[errno]);
74110275Ssam 		return;
74210275Ssam 	}
74310275Ssam 	ack("RNTO");
74410275Ssam }
74510275Ssam 
74610275Ssam dolog(sin)
74710275Ssam 	struct sockaddr_in *sin;
74810275Ssam {
74910275Ssam 	struct hostent *hp = gethostbyaddr(&sin->sin_addr,
75010275Ssam 		sizeof (struct in_addr), AF_INET);
75110275Ssam 	time_t t;
75226493Sminshall 	extern char *ctime();
75310275Ssam 
75413247Ssam 	if (hp) {
75526493Sminshall 		(void) strncpy(remotehost, hp->h_name, sizeof (remotehost));
75613247Ssam 		endhostent();
75713247Ssam 	} else
75826493Sminshall 		(void) strncpy(remotehost, inet_ntoa(sin->sin_addr),
75913247Ssam 		    sizeof (remotehost));
76013247Ssam 	if (!logging)
76113247Ssam 		return;
76226493Sminshall 	t = time((time_t *) 0);
76326493Sminshall 	syslog(LOG_INFO,"FTPD: connection from %s at %s", remotehost, ctime(&t));
76410275Ssam }
76510695Ssam 
76613247Ssam #include <utmp.h>
76713247Ssam 
76826493Sminshall #define	SCPYN(a, b)	(void) strncpy(a, b, sizeof (a))
76913247Ssam struct	utmp utmp;
77013247Ssam 
77110695Ssam /*
77213247Ssam  * Record login in wtmp file.
77313247Ssam  */
77413247Ssam dologin(pw)
77513247Ssam 	struct passwd *pw;
77613247Ssam {
77713247Ssam 	char line[32];
77813247Ssam 
77913247Ssam 	if (wtmp >= 0) {
78013247Ssam 		/* hack, but must be unique and no tty line */
78126493Sminshall 		(void) sprintf(line, "ftp%d", getpid());
78213247Ssam 		SCPYN(utmp.ut_line, line);
78313247Ssam 		SCPYN(utmp.ut_name, pw->pw_name);
78413247Ssam 		SCPYN(utmp.ut_host, remotehost);
78526493Sminshall 		utmp.ut_time = (long) time((time_t *) 0);
78613247Ssam 		(void) write(wtmp, (char *)&utmp, sizeof (utmp));
78716760Slepreau 		if (!guest) {		/* anon must hang on */
78816760Slepreau 			(void) close(wtmp);
78916760Slepreau 			wtmp = -1;
79016760Slepreau 		}
79113247Ssam 	}
79213247Ssam }
79313247Ssam 
79413247Ssam /*
79513247Ssam  * Record logout in wtmp file
79613247Ssam  * and exit with supplied status.
79713247Ssam  */
79813247Ssam dologout(status)
79913247Ssam 	int status;
80013247Ssam {
80116339Skarels 
80217580Ssam 	if (logged_in) {
80317580Ssam 		(void) seteuid(0);
80417580Ssam 		if (wtmp < 0)
80517580Ssam 			wtmp = open("/usr/adm/wtmp", O_WRONLY|O_APPEND);
80617580Ssam 		if (wtmp >= 0) {
80717580Ssam 			SCPYN(utmp.ut_name, "");
80817580Ssam 			SCPYN(utmp.ut_host, "");
80926493Sminshall 			utmp.ut_time = (long) time((time_t *) 0);
81017580Ssam 			(void) write(wtmp, (char *)&utmp, sizeof (utmp));
81117580Ssam 			(void) close(wtmp);
81217580Ssam 		}
81313247Ssam 	}
81414436Ssam 	/* beware of flushing buffers after a SIGPIPE */
81514436Ssam 	_exit(status);
81613247Ssam }
81713247Ssam 
81813247Ssam /*
81910695Ssam  * Special version of popen which avoids
82010695Ssam  * call to shell.  This insures noone may
82110695Ssam  * create a pipe to a hidden program as a side
82210695Ssam  * effect of a list or dir command.
82310695Ssam  */
82410695Ssam #define	tst(a,b)	(*mode == 'r'? (b) : (a))
82510695Ssam #define	RDR	0
82610695Ssam #define	WTR	1
82710695Ssam static	int popen_pid[5];
82810695Ssam 
82910695Ssam static char *
83010695Ssam nextarg(cpp)
83110695Ssam 	char *cpp;
83210695Ssam {
83310695Ssam 	register char *cp = cpp;
83410695Ssam 
83510695Ssam 	if (cp == 0)
83610695Ssam 		return (cp);
83710695Ssam 	while (*cp && *cp != ' ' && *cp != '\t')
83810695Ssam 		cp++;
83910695Ssam 	if (*cp == ' ' || *cp == '\t') {
84010695Ssam 		*cp++ = '\0';
84110695Ssam 		while (*cp == ' ' || *cp == '\t')
84210695Ssam 			cp++;
84310695Ssam 	}
84410695Ssam 	if (cp == cpp)
84510695Ssam 		return ((char *)0);
84610695Ssam 	return (cp);
84710695Ssam }
84810695Ssam 
84910695Ssam FILE *
85010695Ssam popen(cmd, mode)
85110695Ssam 	char *cmd, *mode;
85210695Ssam {
85313211Sroot 	int p[2], ac, gac;
85410695Ssam 	register myside, hisside, pid;
85513211Sroot 	char *av[20], *gav[512];
85610695Ssam 	register char *cp;
85710695Ssam 
85810695Ssam 	if (pipe(p) < 0)
85910695Ssam 		return (NULL);
86010695Ssam 	cp = cmd, ac = 0;
86113211Sroot 	/* break up string into pieces */
86210695Ssam 	do {
86310695Ssam 		av[ac++] = cp;
86410695Ssam 		cp = nextarg(cp);
86513211Sroot 	} while (cp && *cp && ac < 20);
86610695Ssam 	av[ac] = (char *)0;
86713211Sroot 	gav[0] = av[0];
86813211Sroot 	/* glob each piece */
86913211Sroot 	for (gac = ac = 1; av[ac] != NULL; ac++) {
87013211Sroot 		char **pop;
87122024Ssam 		extern char **glob(), **copyblk();
87213211Sroot 
87313211Sroot 		pop = glob(av[ac]);
87422024Ssam 		if (pop == (char **)NULL) {	/* globbing failed */
87522024Ssam 			char *vv[2];
87622024Ssam 
87722024Ssam 			vv[0] = av[ac];
87822024Ssam 			vv[1] = 0;
87922024Ssam 			pop = copyblk(vv);
88013211Sroot 		}
88122024Ssam 		av[ac] = (char *)pop;		/* save to free later */
88222024Ssam 		while (*pop && gac < 512)
88322024Ssam 			gav[gac++] = *pop++;
88411757Ssam 	}
88513211Sroot 	gav[gac] = (char *)0;
88610695Ssam 	myside = tst(p[WTR], p[RDR]);
88710695Ssam 	hisside = tst(p[RDR], p[WTR]);
88810695Ssam 	if ((pid = fork()) == 0) {
88910695Ssam 		/* myside and hisside reverse roles in child */
89026493Sminshall 		(void) close(myside);
89126493Sminshall 		(void) dup2(hisside, tst(0, 1));
89226493Sminshall 		(void) close(hisside);
89313211Sroot 		execv(gav[0], gav);
89410695Ssam 		_exit(1);
89510695Ssam 	}
89613211Sroot 	for (ac = 1; av[ac] != NULL; ac++)
89713211Sroot 		blkfree((char **)av[ac]);
89810695Ssam 	if (pid == -1)
89910695Ssam 		return (NULL);
90010695Ssam 	popen_pid[myside] = pid;
90126493Sminshall 	(void) close(hisside);
90210695Ssam 	return (fdopen(myside, mode));
90310695Ssam }
90410695Ssam 
90510695Ssam pclose(ptr)
90610695Ssam 	FILE *ptr;
90710695Ssam {
90810695Ssam 	register f, r, (*hstat)(), (*istat)(), (*qstat)();
90910695Ssam 	int status;
91010695Ssam 
91110695Ssam 	f = fileno(ptr);
91226493Sminshall 	(void) fclose(ptr);
91310695Ssam 	istat = signal(SIGINT, SIG_IGN);
91410695Ssam 	qstat = signal(SIGQUIT, SIG_IGN);
91510695Ssam 	hstat = signal(SIGHUP, SIG_IGN);
91610695Ssam 	while ((r = wait(&status)) != popen_pid[f] && r != -1)
91710695Ssam 		;
91810695Ssam 	if (r == -1)
91910695Ssam 		status = -1;
92026493Sminshall 	(void) signal(SIGINT, istat);
92126493Sminshall 	(void) signal(SIGQUIT, qstat);
92226493Sminshall 	(void) signal(SIGHUP, hstat);
92310695Ssam 	return (status);
92410695Ssam }
92510695Ssam 
92610695Ssam /*
92710695Ssam  * Check user requesting login priviledges.
92810695Ssam  * Disallow anyone mentioned in the file FTPUSERS
92910695Ssam  * to allow people such as uucp to be avoided.
93010695Ssam  */
93110695Ssam checkuser(name)
93210695Ssam 	register char *name;
93310695Ssam {
93410695Ssam 	char line[BUFSIZ], *index();
93510695Ssam 	FILE *fd;
93610695Ssam 	int found = 0;
93710695Ssam 
93810695Ssam 	fd = fopen(FTPUSERS, "r");
93910695Ssam 	if (fd == NULL)
94010695Ssam 		return (1);
94110695Ssam 	while (fgets(line, sizeof (line), fd) != NULL) {
94210695Ssam 		register char *cp = index(line, '\n');
94310695Ssam 
94410695Ssam 		if (cp)
94510695Ssam 			*cp = '\0';
94610695Ssam 		if (strcmp(line, name) == 0) {
94710695Ssam 			found++;
94810695Ssam 			break;
94910695Ssam 		}
95010695Ssam 	}
95126493Sminshall 	(void) fclose(fd);
95210695Ssam 	return (!found);
95310695Ssam }
95426044Sminshall 
95526044Sminshall myoob()
95626044Sminshall {
957*27750Sminshall 	char *cp;
95826044Sminshall 
959*27750Sminshall 	/* only process if transfer occurring */
96026044Sminshall 	if (!transflag) {
96126044Sminshall 		return;
96226044Sminshall 	}
963*27750Sminshall 	cp = tmpline;
964*27750Sminshall 	if (getline(cp, 7, stdin) == NULL) {
965*27750Sminshall 		reply(221, "You could at least say goodby.");
966*27750Sminshall 		dologout(0);
96726044Sminshall 	}
96826044Sminshall 	upper(cp);
96926227Ssam 	if (strcmp(cp, "ABOR\r\n"))
97026044Sminshall 		return;
97126044Sminshall 	tmpline[0] = '\0';
97226044Sminshall 	reply(426,"Transfer aborted. Data connection closed.");
97326044Sminshall 	reply(226,"Abort successful");
97426044Sminshall 	longjmp(urgcatch, 1);
97526044Sminshall }
97626044Sminshall 
97727106Smckusick /*
97827106Smckusick  * Note: The 530 reply codes could be 4xx codes, except nothing is
97927106Smckusick  * given in the state tables except 421 which implies an exit.  (RFC959)
98027106Smckusick  */
98126044Sminshall passive()
98226044Sminshall {
98326044Sminshall 	int len;
98426044Sminshall 	struct sockaddr_in tmp;
98526044Sminshall 	register char *p, *a;
98626044Sminshall 
98726044Sminshall 	pdata = socket(AF_INET, SOCK_STREAM, 0);
98826044Sminshall 	if (pdata < 0) {
98927106Smckusick 		reply(530, "Can't open passive connection");
99026044Sminshall 		return;
99126044Sminshall 	}
99226044Sminshall 	tmp = ctrl_addr;
99326044Sminshall 	tmp.sin_port = 0;
99426044Sminshall 	seteuid(0);
99526493Sminshall 	if (bind(pdata, (struct sockaddr *) &tmp, sizeof(tmp)) < 0) {
99626044Sminshall 		seteuid(pw->pw_uid);
99726044Sminshall 		(void) close(pdata);
99826044Sminshall 		pdata = -1;
99927106Smckusick 		reply(530, "Can't open passive connection");
100026044Sminshall 		return;
100126044Sminshall 	}
100226044Sminshall 	seteuid(pw->pw_uid);
100326044Sminshall 	len = sizeof(tmp);
100426044Sminshall 	if (getsockname(pdata, (char *) &tmp, &len) < 0) {
100526044Sminshall 		(void) close(pdata);
100626044Sminshall 		pdata = -1;
100727106Smckusick 		reply(530, "Can't open passive connection");
100826044Sminshall 		return;
100926044Sminshall 	}
101026044Sminshall 	if (listen(pdata, 1) < 0) {
101126044Sminshall 		(void) close(pdata);
101226044Sminshall 		pdata = -1;
101327106Smckusick 		reply(530, "Can't open passive connection");
101426044Sminshall 		return;
101526044Sminshall 	}
101626044Sminshall 	a = (char *) &tmp.sin_addr;
101726044Sminshall 	p = (char *) &tmp.sin_port;
101826044Sminshall 
101926044Sminshall #define UC(b) (((int) b) & 0xff)
102026044Sminshall 
102126044Sminshall 	reply(227, "Entering Passive Mode (%d,%d,%d,%d,%d,%d)", UC(a[0]),
102226044Sminshall 		UC(a[1]), UC(a[2]), UC(a[3]), UC(p[0]), UC(p[1]));
102326044Sminshall }
102426044Sminshall 
102526044Sminshall char *
102626044Sminshall gunique(local)
102726044Sminshall 	char *local;
102826044Sminshall {
102926044Sminshall 	static char new[MAXPATHLEN];
103026044Sminshall 	char *cp = rindex(local, '/');
103126044Sminshall 	int d, count=0;
103226044Sminshall 	char ext = '1';
103326044Sminshall 
103426044Sminshall 	if (cp) {
103526044Sminshall 		*cp = '\0';
103626044Sminshall 	}
103726044Sminshall 	d = access(cp ? local : ".", 2);
103826044Sminshall 	if (cp) {
103926044Sminshall 		*cp = '/';
104026044Sminshall 	}
104126044Sminshall 	if (d < 0) {
104226493Sminshall 		syslog(LOG_ERR, "%s: %m", local);
104326044Sminshall 		return((char *) 0);
104426044Sminshall 	}
104526044Sminshall 	(void) strcpy(new, local);
104626044Sminshall 	cp = new + strlen(new);
104726044Sminshall 	*cp++ = '.';
104826044Sminshall 	while (!d) {
104926044Sminshall 		if (++count == 100) {
105027106Smckusick 			reply(452, "Unique file name not cannot be created.");
105126044Sminshall 			return((char *) 0);
105226044Sminshall 		}
105326044Sminshall 		*cp++ = ext;
105426044Sminshall 		*cp = '\0';
105526044Sminshall 		if (ext == '9') {
105626044Sminshall 			ext = '0';
105726044Sminshall 		}
105826044Sminshall 		else {
105926044Sminshall 			ext++;
106026044Sminshall 		}
106126044Sminshall 		if ((d = access(new, 0)) < 0) {
106226044Sminshall 			break;
106326044Sminshall 		}
106426044Sminshall 		if (ext != '0') {
106526044Sminshall 			cp--;
106626044Sminshall 		}
106726044Sminshall 		else if (*(cp - 2) == '.') {
106826044Sminshall 			*(cp - 1) = '1';
106926044Sminshall 		}
107026044Sminshall 		else {
107126044Sminshall 			*(cp - 2) = *(cp - 2) + 1;
107226044Sminshall 			cp--;
107326044Sminshall 		}
107426044Sminshall 	}
107526044Sminshall 	return(new);
107626044Sminshall }
1077