xref: /netbsd-src/libexec/identd/identd.c (revision 76dfffe33547c37f8bdd446e3e4ab0f3c16cea4b)
1 /*
2 **	$NetBSD: identd.c,v 1.6 1996/08/30 17:41:34 thorpej Exp $
3 **
4 ** identd.c                       A TCP/IP link identification protocol server
5 **
6 ** This program is in the public domain and may be used freely by anyone
7 ** who wants to.
8 **
9 ** Last update: 22 April 1993
10 **
11 ** Please send bug fixes/bug reports to: Peter Eriksson <pen@lysator.liu.se>
12 */
13 
14 #if defined(IRIX) || defined(SVR4) || defined(NeXT) || defined(__NetBSD__)
15 #  define SIGRETURN_TYPE void
16 #  define SIGRETURN_TYPE_IS_VOID
17 #else
18 #  define SIGRETURN_TYPE int
19 #endif
20 
21 #ifdef SVR4
22 #  define STRNET
23 #endif
24 
25 #include <stdio.h>
26 #include <string.h>
27 #include <ctype.h>
28 #include <errno.h>
29 #include <netdb.h>
30 #include <signal.h>
31 #include <fcntl.h>
32 
33 #include <sys/types.h>
34 #include <sys/param.h>
35 #include <sys/ioctl.h>
36 #include <sys/socket.h>
37 #ifndef _AUX_SOURCE
38 #  include <sys/file.h>
39 #endif
40 #include <sys/time.h>
41 #include <sys/wait.h>
42 
43 #include <pwd.h>
44 #include <grp.h>
45 
46 #include <netinet/in.h>
47 
48 #ifndef HPUX7
49 #  include <arpa/inet.h>
50 #endif
51 
52 #if defined(MIPS) || defined(BSD43)
53 extern int errno;
54 #endif
55 
56 #include "identd.h"
57 #include "error.h"
58 
59 /* Antique unixes do not have these things defined... */
60 #ifndef FD_SETSIZE
61 #  define FD_SETSIZE 256
62 #endif
63 
64 #ifndef FD_SET
65 #  ifndef NFDBITS
66 #    define NFDBITS   	(sizeof(int) * NBBY)  /* bits per mask */
67 #  endif
68 #  define FD_SET(n, p)  ((p)->fds_bits[(n)/NFDBITS] |= (1 << ((n) % NFDBITS)))
69 #endif
70 
71 #ifndef FD_ZERO
72 #  define FD_ZERO(p)        bzero((char *)(p), sizeof(*(p)))
73 #endif
74 
75 extern char *version;
76 
77 extern void *calloc();
78 extern void *malloc();
79 
80 
81 char *path_unix = NULL;
82 char *path_kmem = NULL;
83 
84 int verbose_flag = 0;
85 int debug_flag   = 0;
86 int syslog_flag  = 0;
87 int multi_flag   = 0;
88 int other_flag   = 0;
89 int unknown_flag = 0;
90 int number_flag  = 0;
91 int noident_flag = 0;
92 
93 int lport = 0;
94 int fport = 0;
95 
96 char *charset_name = NULL;
97 char *indirect_host = NULL;
98 char *indirect_password = NULL;
99 
100 static int child_pid;
101 
102 #ifdef LOG_DAEMON
103 static int syslog_facility = LOG_DAEMON;
104 #endif
105 
106 /*
107 ** The structure passing convention for GCC is incompatible with
108 ** Suns own C compiler, so we define our own inet_ntoa() function.
109 ** (This should only affect GCC version 1 I think, a well, this works
110 ** for version 2 also so why bother.. :-)
111 */
112 #if defined(__GNUC__) && defined(__sparc__)
113 
114 #ifdef inet_ntoa
115 #undef inet_ntoa
116 #endif
117 
118 char *inet_ntoa(ad)
119   struct in_addr ad;
120 {
121   unsigned long int s_ad;
122   int a, b, c, d;
123   static char addr[20];
124 
125   s_ad = ad.s_addr;
126   d = s_ad % 256;
127   s_ad /= 256;
128   c = s_ad % 256;
129   s_ad /= 256;
130   b = s_ad % 256;
131   a = s_ad / 256;
132   sprintf(addr, "%d.%d.%d.%d", a, b, c, d);
133 
134   return addr;
135 }
136 #endif
137 
138 
139 /*
140 ** Return the name of the connecting host, or the IP number as a string.
141 */
142 char *gethost(addr)
143   struct in_addr *addr;
144 {
145   struct hostent *hp;
146 
147 
148   hp = gethostbyaddr((char *) addr, sizeof(struct in_addr), AF_INET);
149   if (hp)
150     return hp->h_name;
151   else
152     return inet_ntoa(*addr);
153 }
154 
155 /*
156 ** Exit cleanly after our time's up.
157 */
158 static SIGRETURN_TYPE
159 alarm_handler()
160 {
161   if (syslog_flag)
162     syslog(LOG_DEBUG, "SIGALRM triggered, exiting");
163 
164   exit(0);
165 }
166 
167 #if !defined(hpux) && !defined(__hpux) && !defined(SVR4) || defined(_CRAY)
168 /*
169 ** This is used to clean up zombie child processes
170 ** if the -w or -b options are used.
171 */
172 static SIGRETURN_TYPE
173 child_handler()
174 {
175 #if defined(IRIX) || defined(NeXT)
176   union wait status;
177 #else
178   int status;
179 #endif
180 
181   while (wait3(&status, WNOHANG, NULL) > 0)
182     ;
183 
184 #ifndef SIGRETURN_TYPE_IS_VOID
185   return 0;
186 #endif
187 }
188 #endif
189 
190 
191 char *clearmem(bp, len)
192   char *bp;
193   int len;
194 {
195   char *cp;
196 
197   cp = bp;
198   while (len-- > 0)
199     *cp++ = 0;
200 
201   return bp;
202 }
203 
204 
205 /*
206 ** Main entry point into this daemon
207 */
208 int main(argc,argv)
209   int argc;
210   char *argv[];
211 {
212   int i, len;
213   struct sockaddr_in sin;
214   struct in_addr laddr, faddr;
215   struct timeval tv;
216 
217   int background_flag = 0;
218   int timeout = 0;
219   char *portno = "113";
220   char *bind_address = NULL;
221   int set_uid = 0;
222   int set_gid = 0;
223   int inhibit_default_config = 0;
224   int opt_count = 0;		/* Count of option flags */
225 
226 #ifdef __convex__
227   argc--;    /* get rid of extra argument passed by inetd */
228 #endif
229 
230   /*
231   ** Prescan the arguments for "-f<config-file>" switches
232   */
233   inhibit_default_config = 0;
234   for (i = 1; i < argc && argv[i][0] == '-'; i++)
235     if (argv[i][1] == 'f')
236       inhibit_default_config = 1;
237 
238   /*
239   ** Parse the default config file - if it exists
240   */
241   if (!inhibit_default_config)
242     parse_config(NULL, 1);
243 
244   /*
245   ** Parse the command line arguments
246   */
247   for (i = 1; i < argc && argv[i][0] == '-'; i++) {
248     opt_count++;
249     switch (argv[i][1])
250     {
251       case 'b':    /* Start as standalone daemon */
252         background_flag = 1;
253 	break;
254 
255       case 'w':    /* Start from Inetd, wait mode */
256 	background_flag = 2;
257 	break;
258 
259       case 'i':    /* Start from Inetd, nowait mode */
260 	background_flag = 0;
261 	break;
262 
263       case 't':
264 	timeout = atoi(argv[i]+2);
265 	break;
266 
267       case 'p':
268 	portno = argv[i]+2;
269 	break;
270 
271       case 'a':
272 	bind_address = argv[i]+2;
273 	break;
274 
275       case 'u':
276 	if (isdigit(argv[i][2]))
277 	  set_uid = atoi(argv[i]+2);
278 	else
279  	{
280 	  struct passwd *pwd;
281 
282 	  pwd = getpwnam(argv[i]+2);
283 	  if (!pwd)
284 	    ERROR1("no such user (%s) for -u option", argv[i]+2);
285 	  else
286 	  {
287 	    set_uid = pwd->pw_uid;
288 	    set_gid = pwd->pw_gid;
289 	  }
290 	}
291 	break;
292 
293       case 'g':
294 	if (isdigit(argv[i][2]))
295 	  set_gid = atoi(argv[i]+2);
296 	else
297  	{
298 	  struct group *grp;
299 
300 	  grp = getgrnam(argv[i]+2);
301 	  if (!grp)
302 	    ERROR1("no such group (%s) for -g option", argv[i]+2);
303 	  else
304 	    set_gid = grp->gr_gid;
305 	}
306 	break;
307 
308       case 'c':
309 	charset_name = argv[i]+2;
310 	break;
311 
312       case 'r':
313 	indirect_host = argv[i]+2;
314 	break;
315 
316       case 'l':    /* Use the Syslog daemon for logging */
317 	syslog_flag++;
318 	break;
319 
320       case 'o':
321 	other_flag = 1;
322 	break;
323 
324       case 'e':
325 	unknown_flag = 1;
326 	break;
327 
328       case 'n':
329 	number_flag = 1;
330 	break;
331 
332       case 'V':    /* Give version of this daemon */
333 	printf("[in.identd, version %s]\r\n", version);
334 	exit(0);
335 	break;
336 
337       case 'v':    /* Be verbose */
338 	verbose_flag++;
339 	break;
340 
341       case 'd':    /* Enable debugging */
342 	debug_flag++;
343 	break;
344 
345       case 'm':    /* Enable multiline queries */
346 	multi_flag++;
347 	break;
348 
349       case 'N':    /* Enable users ".noident" files */
350 	noident_flag++;
351 	break;
352     }
353   }
354 
355 #if defined(_AUX_SOURCE) || defined (SUNOS35)
356   /* A/UX 2.0* & SunOS 3.5 calls us with an argument XXXXXXXX.YYYY
357   ** where XXXXXXXXX is the hexadecimal version of the callers
358   ** IP number, and YYYY is the port/socket or something.
359   ** It seems to be impossible to pass arguments to a daemon started
360   ** by inetd.
361   **
362   ** Just in case it is started from something else, then we only
363   ** skip the argument if no option flags have been seen.
364   */
365   if (opt_count == 0)
366     argc--;
367 #endif
368 
369   /*
370   ** Path to kernel namelist file specified on command line
371   */
372   if (i < argc)
373     path_unix = argv[i++];
374 
375   /*
376   ** Path to kernel memory device specified on command line
377   */
378   if (i < argc)
379     path_kmem = argv[i++];
380 
381 
382   /*
383   ** Open the kernel memory device and read the nlist table
384   */
385   if (k_open() < 0)
386       ERROR("main: k_open");
387 
388   /*
389   ** Do the special handling needed for the "-b" flag
390   */
391   if (background_flag == 1)
392   {
393     struct sockaddr_in addr;
394     struct servent *sp;
395     int fd;
396 
397 
398     if (fork())
399       exit(0);
400 
401     close(0);
402     close(1);
403     close(2);
404 
405     if (fork())
406       exit(0);
407 
408     fd = socket(AF_INET, SOCK_STREAM, 0);
409     if (fd == -1)
410       ERROR("main: socket");
411 
412     if (fd != 0)
413       dup2(fd, 0);
414 
415     clearmem(&addr, sizeof(addr));
416 
417     addr.sin_len = sizeof(struct sockaddr_in);
418     addr.sin_family = AF_INET;
419     if (bind_address == NULL)
420       addr.sin_addr.s_addr = htonl(INADDR_ANY);
421     else
422     {
423       if (inet_aton(bind_address, &addr.sin_addr) == 0)
424       {
425 	struct hostent *hp;
426 
427 	hp = gethostbyname(bind_address);
428 	if (!hp)
429 	  ERROR1("no such address (%s) for -a switch", bind_address);
430 
431 	memcpy(&addr.sin_addr, hp->h_addr, sizeof(addr.sin_addr));
432       }
433     }
434 
435     if (isdigit(portno[0]))
436       addr.sin_port = htons(atoi(portno));
437     else
438     {
439       sp = getservbyname(portno, "tcp");
440       if (sp == NULL)
441 	ERROR1("main: getservbyname: %s", portno);
442       addr.sin_port = sp->s_port;
443     }
444 
445     if (bind(0, (struct sockaddr *) &addr, sizeof(addr)) < 0)
446       ERROR("main: bind");
447 
448     if (listen(0, 3) < 0)
449       ERROR("main: listen");
450   }
451 
452   if (set_gid)
453     if (setgid(set_gid) == -1)
454       ERROR("main: setgid");
455 
456   if (set_uid)
457     if (setuid(set_uid) == -1)
458       ERROR("main: setuid");
459 
460   /*
461   ** Do some special handling if the "-b" or "-w" flags are used
462   */
463   if (background_flag)
464   {
465     int nfds, fd;
466     fd_set read_set;
467 
468 
469     /*
470     ** Set up the SIGCHLD signal child termination handler so
471     ** that we can avoid zombie processes hanging around and
472     ** handle childs terminating before being able to complete the
473     ** handshake.
474     */
475 #if (defined(SVR4) || defined(hpux) || defined(__hpux) || \
476      defined(_CRAY) || defined(_AUX_SOURCE))
477     signal(SIGCHLD, SIG_IGN);
478 #else
479     signal(SIGCHLD, (SIGRETURN_TYPE (*)()) child_handler);
480 #endif
481 
482     /*
483     ** Loop and dispatch client handling processes
484     */
485     do
486     {
487       /*
488       ** Terminate if we've been idle for 'timeout' seconds
489       */
490       if (background_flag == 2 && timeout)
491       {
492 	signal(SIGALRM, alarm_handler);
493 	alarm(timeout);
494       }
495 
496       /*
497       ** Wait for a connection request to occur.
498       ** Ignore EINTR (Interrupted System Call).
499       */
500       do
501       {
502 	FD_ZERO(&read_set);
503 	FD_SET(0, &read_set);
504 
505 	if (timeout)
506 	{
507 	  tv.tv_sec = timeout;
508 	  tv.tv_usec = 0;
509 	  nfds = select(FD_SETSIZE, &read_set, NULL, NULL, &tv);
510 	}
511 	else
512 
513 	nfds = select(FD_SETSIZE, &read_set, NULL, NULL, NULL);
514       } while (nfds < 0  && errno == EINTR);
515 
516       /*
517       ** An error occured in select? Just die
518       */
519       if (nfds < 0)
520 	ERROR("main: select");
521 
522       /*
523       ** Timeout limit reached. Exit nicely
524       */
525       if (nfds == 0)
526 	exit(0);
527 
528       /*
529       ** Disable the alarm timeout
530       */
531       alarm(0);
532 
533       /*
534       ** Accept the new client
535       */
536       fd = accept(0, NULL, NULL);
537       if (fd == -1)
538 	ERROR1("main: accept. errno = %d", errno);
539 
540       /*
541       ** And fork, then close the fd if we are the parent.
542       */
543       child_pid = fork();
544     } while (child_pid && (close(fd), 1));
545 
546     /*
547     ** We are now in child, the parent has returned to "do" above.
548     */
549     if (dup2(fd, 0) == -1)
550       ERROR("main: dup2: failed fd 0");
551 
552     if (dup2(fd, 1) == -1)
553       ERROR("main: dup2: failed fd 1");
554 
555     if (dup2(fd, 2) == -1)
556       ERROR("main: dup2: failed fd 2");
557   }
558 
559   /*
560   ** Get foreign internet address
561   */
562   len = sizeof(sin);
563   if (getpeername(0, (struct sockaddr *) &sin, &len) == -1)
564   {
565     /*
566     ** A user has tried to start us from the command line or
567     ** the network link died, in which case this message won't
568     ** reach to other end anyway, so lets give the poor user some
569     ** errors.
570     */
571     perror("in.identd: getpeername()");
572     exit(1);
573   }
574 
575   faddr = sin.sin_addr;
576 
577 
578   /*
579   ** Open the connection to the Syslog daemon if requested
580   */
581   if (syslog_flag)
582   {
583 #ifdef LOG_DAEMON
584     openlog("identd", LOG_PID, syslog_facility);
585 #else
586     openlog("identd", LOG_PID);
587 #endif
588 
589     syslog(LOG_INFO, "Connection from %s", gethost(&faddr));
590   }
591 
592 
593   /*
594   ** Get local internet address
595   */
596   len = sizeof(sin);
597 #ifdef ATTSVR4
598   if (t_getsockname(0, (struct sockaddr *) &sin, &len) == -1)
599 #else
600   if (getsockname(0, (struct sockaddr *) &sin, &len) == -1)
601 #endif
602   {
603     /*
604     ** We can just die here, because if this fails then the
605     ** network has died and we haven't got anyone to return
606     ** errors to.
607     */
608     exit(1);
609   }
610   laddr = sin.sin_addr;
611 
612 
613   /*
614   ** Get the local/foreign port pair from the luser
615   */
616   parse(stdin, &laddr, &faddr);
617 
618   exit(0);
619 }
620