xref: /netbsd-src/libexec/identd/identd.c (revision d9158b13b5dfe46201430699a3f7a235ecf28df3)
1 /*
2 **	$Id: identd.c,v 1.2 1994/02/04 23:17:56 cgd Exp $
3 **
4 ** identd.c                       A TCP/IP link identification protocol server
5 **
6 ** This program is in the public domain and may be used freely by anyone
7 ** who wants to.
8 **
9 ** Last update: 22 April 1993
10 **
11 ** Please send bug fixes/bug reports to: Peter Eriksson <pen@lysator.liu.se>
12 */
13 
14 #if defined(IRIX) || defined(SVR4) || defined(NeXT) || defined(__NetBSD__)
15 #  define SIGRETURN_TYPE void
16 #  define SIGRETURN_TYPE_IS_VOID
17 #else
18 #  define SIGRETURN_TYPE int
19 #endif
20 
21 #ifdef SVR4
22 #  define STRNET
23 #endif
24 
25 #include <stdio.h>
26 #include <ctype.h>
27 #include <errno.h>
28 #include <netdb.h>
29 #include <signal.h>
30 #include <fcntl.h>
31 
32 #include <sys/types.h>
33 #include <sys/param.h>
34 #include <sys/ioctl.h>
35 #include <sys/socket.h>
36 #ifndef _AUX_SOURCE
37 #  include <sys/file.h>
38 #endif
39 #include <sys/time.h>
40 #include <sys/wait.h>
41 
42 #include <pwd.h>
43 #include <grp.h>
44 
45 #include <netinet/in.h>
46 
47 #ifndef HPUX7
48 #  include <arpa/inet.h>
49 #endif
50 
51 #if defined(MIPS) || defined(BSD43)
52 extern int errno;
53 #endif
54 
55 #include "identd.h"
56 #include "error.h"
57 
58 /* Antique unixes do not have these things defined... */
59 #ifndef FD_SETSIZE
60 #  define FD_SETSIZE 256
61 #endif
62 
63 #ifndef FD_SET
64 #  ifndef NFDBITS
65 #    define NFDBITS   	(sizeof(int) * NBBY)  /* bits per mask */
66 #  endif
67 #  define FD_SET(n, p)  ((p)->fds_bits[(n)/NFDBITS] |= (1 << ((n) % NFDBITS)))
68 #endif
69 
70 #ifndef FD_ZERO
71 #  define FD_ZERO(p)        bzero((char *)(p), sizeof(*(p)))
72 #endif
73 
74 extern char *version;
75 
76 extern void *calloc();
77 extern void *malloc();
78 
79 
80 char *path_unix = NULL;
81 char *path_kmem = NULL;
82 
83 int verbose_flag = 0;
84 int debug_flag   = 0;
85 int syslog_flag  = 0;
86 int multi_flag   = 0;
87 int other_flag   = 0;
88 int unknown_flag = 0;
89 int number_flag  = 0;
90 int noident_flag = 0;
91 
92 int lport = 0;
93 int fport = 0;
94 
95 char *charset_name = NULL;
96 char *indirect_host = NULL;
97 char *indirect_password = NULL;
98 
99 static int child_pid;
100 
101 #ifdef LOG_DAEMON
102 static int syslog_facility = LOG_DAEMON;
103 #endif
104 
105 /*
106 ** The structure passing convention for GCC is incompatible with
107 ** Suns own C compiler, so we define our own inet_ntoa() function.
108 ** (This should only affect GCC version 1 I think, a well, this works
109 ** for version 2 also so why bother.. :-)
110 */
111 #if defined(__GNUC__) && defined(__sparc__)
112 
113 #ifdef inet_ntoa
114 #undef inet_ntoa
115 #endif
116 
117 char *inet_ntoa(ad)
118   struct in_addr ad;
119 {
120   unsigned long int s_ad;
121   int a, b, c, d;
122   static char addr[20];
123 
124   s_ad = ad.s_addr;
125   d = s_ad % 256;
126   s_ad /= 256;
127   c = s_ad % 256;
128   s_ad /= 256;
129   b = s_ad % 256;
130   a = s_ad / 256;
131   sprintf(addr, "%d.%d.%d.%d", a, b, c, d);
132 
133   return addr;
134 }
135 #endif
136 
137 
138 /*
139 ** Return the name of the connecting host, or the IP number as a string.
140 */
141 char *gethost(addr)
142   struct in_addr *addr;
143 {
144   struct hostent *hp;
145 
146 
147   hp = gethostbyaddr((char *) addr, sizeof(struct in_addr), AF_INET);
148   if (hp)
149     return hp->h_name;
150   else
151     return inet_ntoa(*addr);
152 }
153 
154 /*
155 ** Exit cleanly after our time's up.
156 */
157 static SIGRETURN_TYPE
158 alarm_handler()
159 {
160   if (syslog_flag)
161     syslog(LOG_DEBUG, "SIGALRM triggered, exiting");
162 
163   exit(0);
164 }
165 
166 #if !defined(hpux) && !defined(__hpux) && !defined(SVR4) || defined(_CRAY)
167 /*
168 ** This is used to clean up zombie child processes
169 ** if the -w or -b options are used.
170 */
171 static SIGRETURN_TYPE
172 child_handler()
173 {
174 #if defined(IRIX) || defined(NeXT)
175   union wait status;
176 #else
177   int status;
178 #endif
179 
180   while (wait3(&status, WNOHANG, NULL) > 0)
181     ;
182 
183 #ifndef SIGRETURN_TYPE_IS_VOID
184   return 0;
185 #endif
186 }
187 #endif
188 
189 
190 char *clearmem(bp, len)
191   char *bp;
192   int len;
193 {
194   char *cp;
195 
196   cp = bp;
197   while (len-- > 0)
198     *cp++ = 0;
199 
200   return bp;
201 }
202 
203 
204 /*
205 ** Main entry point into this daemon
206 */
207 int main(argc,argv)
208   int argc;
209   char *argv[];
210 {
211   int i, len;
212   struct sockaddr_in sin;
213   struct in_addr laddr, faddr;
214   struct timeval tv;
215 
216   int background_flag = 0;
217   int timeout = 0;
218   char *portno = "113";
219   char *bind_address = NULL;
220   int set_uid = 0;
221   int set_gid = 0;
222   int inhibit_default_config = 0;
223   int opt_count = 0;		/* Count of option flags */
224 
225 #ifdef __convex__
226   argc--;    /* get rid of extra argument passed by inetd */
227 #endif
228 
229   /*
230   ** Prescan the arguments for "-f<config-file>" switches
231   */
232   inhibit_default_config = 0;
233   for (i = 1; i < argc && argv[i][0] == '-'; i++)
234     if (argv[i][1] == 'f')
235       inhibit_default_config = 1;
236 
237   /*
238   ** Parse the default config file - if it exists
239   */
240   if (!inhibit_default_config)
241     parse_config(NULL, 1);
242 
243   /*
244   ** Parse the command line arguments
245   */
246   for (i = 1; i < argc && argv[i][0] == '-'; i++) {
247     opt_count++;
248     switch (argv[i][1])
249     {
250       case 'b':    /* Start as standalone daemon */
251         background_flag = 1;
252 	break;
253 
254       case 'w':    /* Start from Inetd, wait mode */
255 	background_flag = 2;
256 	break;
257 
258       case 'i':    /* Start from Inetd, nowait mode */
259 	background_flag = 0;
260 	break;
261 
262       case 't':
263 	timeout = atoi(argv[i]+2);
264 	break;
265 
266       case 'p':
267 	portno = argv[i]+2;
268 	break;
269 
270       case 'a':
271 	bind_address = argv[i]+2;
272 	break;
273 
274       case 'u':
275 	if (isdigit(argv[i][2]))
276 	  set_uid = atoi(argv[i]+2);
277 	else
278  	{
279 	  struct passwd *pwd;
280 
281 	  pwd = getpwnam(argv[i]+2);
282 	  if (!pwd)
283 	    ERROR1("no such user (%s) for -u option", argv[i]+2);
284 	  else
285 	  {
286 	    set_uid = pwd->pw_uid;
287 	    set_gid = pwd->pw_gid;
288 	  }
289 	}
290 	break;
291 
292       case 'g':
293 	if (isdigit(argv[i][2]))
294 	  set_gid = atoi(argv[i]+2);
295 	else
296  	{
297 	  struct group *grp;
298 
299 	  grp = getgrnam(argv[i]+2);
300 	  if (!grp)
301 	    ERROR1("no such group (%s) for -g option", argv[i]+2);
302 	  else
303 	    set_gid = grp->gr_gid;
304 	}
305 	break;
306 
307       case 'c':
308 	charset_name = argv[i]+2;
309 	break;
310 
311       case 'r':
312 	indirect_host = argv[i]+2;
313 	break;
314 
315       case 'l':    /* Use the Syslog daemon for logging */
316 	syslog_flag++;
317 	break;
318 
319       case 'o':
320 	other_flag = 1;
321 	break;
322 
323       case 'e':
324 	unknown_flag = 1;
325 	break;
326 
327       case 'n':
328 	number_flag = 1;
329 	break;
330 
331       case 'V':    /* Give version of this daemon */
332 	printf("[in.identd, version %s]\r\n", version);
333 	exit(0);
334 	break;
335 
336       case 'v':    /* Be verbose */
337 	verbose_flag++;
338 	break;
339 
340       case 'd':    /* Enable debugging */
341 	debug_flag++;
342 	break;
343 
344       case 'm':    /* Enable multiline queries */
345 	multi_flag++;
346 	break;
347 
348       case 'N':    /* Enable users ".noident" files */
349 	noident_flag++;
350 	break;
351     }
352   }
353 
354 #if defined(_AUX_SOURCE) || defined (SUNOS35)
355   /* A/UX 2.0* & SunOS 3.5 calls us with an argument XXXXXXXX.YYYY
356   ** where XXXXXXXXX is the hexadecimal version of the callers
357   ** IP number, and YYYY is the port/socket or something.
358   ** It seems to be impossible to pass arguments to a daemon started
359   ** by inetd.
360   **
361   ** Just in case it is started from something else, then we only
362   ** skip the argument if no option flags have been seen.
363   */
364   if (opt_count == 0)
365     argc--;
366 #endif
367 
368   /*
369   ** Path to kernel namelist file specified on command line
370   */
371   if (i < argc)
372     path_unix = argv[i++];
373 
374   /*
375   ** Path to kernel memory device specified on command line
376   */
377   if (i < argc)
378     path_kmem = argv[i++];
379 
380 
381   /*
382   ** Open the kernel memory device and read the nlist table
383   */
384   if (k_open() < 0)
385       ERROR("main: k_open");
386 
387   /*
388   ** Do the special handling needed for the "-b" flag
389   */
390   if (background_flag == 1)
391   {
392     struct sockaddr_in addr;
393     struct servent *sp;
394     int fd;
395 
396 
397     if (fork())
398       exit(0);
399 
400     close(0);
401     close(1);
402     close(2);
403 
404     if (fork())
405       exit(0);
406 
407     fd = socket(AF_INET, SOCK_STREAM, 0);
408     if (fd == -1)
409       ERROR("main: socket");
410 
411     if (fd != 0)
412       dup2(fd, 0);
413 
414     clearmem(&addr, sizeof(addr));
415 
416     addr.sin_family = AF_INET;
417     if (bind_address == NULL)
418       addr.sin_addr.s_addr = htonl(INADDR_ANY);
419     else
420     {
421       if (isdigit(bind_address[0]))
422 	addr.sin_addr.s_addr = inet_addr(bind_address);
423       else
424       {
425 	struct hostent *hp;
426 
427 	hp = gethostbyname(bind_address);
428 	if (!hp)
429 	  ERROR1("no such address (%s) for -a switch", bind_address);
430 
431 	/* This is ugly, should use memcpy() or bcopy() but... */
432 	addr.sin_addr.s_addr = * (unsigned long *) (hp->h_addr);
433       }
434     }
435 
436     if (isdigit(portno[0]))
437       addr.sin_port = htons(atoi(portno));
438     else
439     {
440       sp = getservbyname(portno, "tcp");
441       if (sp == NULL)
442 	ERROR1("main: getservbyname: %s", portno);
443       addr.sin_port = sp->s_port;
444     }
445 
446     if (bind(0, (struct sockaddr *) &addr, sizeof(addr)) < 0)
447       ERROR("main: bind");
448 
449     if (listen(0, 3) < 0)
450       ERROR("main: listen");
451   }
452 
453   if (set_gid)
454     if (setgid(set_gid) == -1)
455       ERROR("main: setgid");
456 
457   if (set_uid)
458     if (setuid(set_uid) == -1)
459       ERROR("main: setuid");
460 
461   /*
462   ** Do some special handling if the "-b" or "-w" flags are used
463   */
464   if (background_flag)
465   {
466     int nfds, fd;
467     fd_set read_set;
468 
469 
470     /*
471     ** Set up the SIGCHLD signal child termination handler so
472     ** that we can avoid zombie processes hanging around and
473     ** handle childs terminating before being able to complete the
474     ** handshake.
475     */
476 #if (defined(SVR4) || defined(hpux) || defined(__hpux) || \
477      defined(_CRAY) || defined(_AUX_SOURCE))
478     signal(SIGCHLD, SIG_IGN);
479 #else
480     signal(SIGCHLD, (SIGRETURN_TYPE (*)()) child_handler);
481 #endif
482 
483     /*
484     ** Loop and dispatch client handling processes
485     */
486     do
487     {
488       /*
489       ** Terminate if we've been idle for 'timeout' seconds
490       */
491       if (background_flag == 2 && timeout)
492       {
493 	signal(SIGALRM, alarm_handler);
494 	alarm(timeout);
495       }
496 
497       /*
498       ** Wait for a connection request to occur.
499       ** Ignore EINTR (Interrupted System Call).
500       */
501       do
502       {
503 	FD_ZERO(&read_set);
504 	FD_SET(0, &read_set);
505 
506 	if (timeout)
507 	{
508 	  tv.tv_sec = timeout;
509 	  tv.tv_usec = 0;
510 	  nfds = select(FD_SETSIZE, &read_set, NULL, NULL, &tv);
511 	}
512 	else
513 
514 	nfds = select(FD_SETSIZE, &read_set, NULL, NULL, NULL);
515       } while (nfds < 0  && errno == EINTR);
516 
517       /*
518       ** An error occured in select? Just die
519       */
520       if (nfds < 0)
521 	ERROR("main: select");
522 
523       /*
524       ** Timeout limit reached. Exit nicely
525       */
526       if (nfds == 0)
527 	exit(0);
528 
529       /*
530       ** Disable the alarm timeout
531       */
532       alarm(0);
533 
534       /*
535       ** Accept the new client
536       */
537       fd = accept(0, NULL, NULL);
538       if (fd == -1)
539 	ERROR1("main: accept. errno = %d", errno);
540 
541       /*
542       ** And fork, then close the fd if we are the parent.
543       */
544       child_pid = fork();
545     } while (child_pid && (close(fd), 1));
546 
547     /*
548     ** We are now in child, the parent has returned to "do" above.
549     */
550     if (dup2(fd, 0) == -1)
551       ERROR("main: dup2: failed fd 0");
552 
553     if (dup2(fd, 1) == -1)
554       ERROR("main: dup2: failed fd 1");
555 
556     if (dup2(fd, 2) == -1)
557       ERROR("main: dup2: failed fd 2");
558   }
559 
560   /*
561   ** Get foreign internet address
562   */
563   len = sizeof(sin);
564   if (getpeername(0, (struct sockaddr *) &sin, &len) == -1)
565   {
566     /*
567     ** A user has tried to start us from the command line or
568     ** the network link died, in which case this message won't
569     ** reach to other end anyway, so lets give the poor user some
570     ** errors.
571     */
572     perror("in.identd: getpeername()");
573     exit(1);
574   }
575 
576   faddr = sin.sin_addr;
577 
578 
579   /*
580   ** Open the connection to the Syslog daemon if requested
581   */
582   if (syslog_flag)
583   {
584 #ifdef LOG_DAEMON
585     openlog("identd", LOG_PID, syslog_facility);
586 #else
587     openlog("identd", LOG_PID);
588 #endif
589 
590     syslog(LOG_INFO, "Connection from %s", gethost(&faddr));
591   }
592 
593 
594   /*
595   ** Get local internet address
596   */
597   len = sizeof(sin);
598 #ifdef ATTSVR4
599   if (t_getsockname(0, (struct sockaddr *) &sin, &len) == -1)
600 #else
601   if (getsockname(0, (struct sockaddr *) &sin, &len) == -1)
602 #endif
603   {
604     /*
605     ** We can just die here, because if this fails then the
606     ** network has died and we haven't got anyone to return
607     ** errors to.
608     */
609     exit(1);
610   }
611   laddr = sin.sin_addr;
612 
613 
614   /*
615   ** Get the local/foreign port pair from the luser
616   */
617   parse(stdin, &laddr, &faddr);
618 
619   exit(0);
620 }
621