upstream: Add a facility to sshd(8) to penalise particular
problematic client behaviours, controlled by two new sshd_config(5) options:
PerSourcePenalties and PerSourcePenaltyExemptList.
When PerSourcePenalties are enabled, sshd(8) will monitor the exit
status of its child pre-auth session processes. Through the exit
status, it can observe situations where the session did not
authenticate as expected. These conditions include when the client
repeatedly attempted authentication unsucessfully (possibly indicating
an attack against one or more accounts, e.g. password guessing), or
when client behaviour caused sshd to crash (possibly indicating
attempts to exploit sshd).
When such a condition is observed, sshd will record a penalty of some
duration (e.g. 30 seconds) against the client's address. If this time
is above a minimum threshold specified by the PerSourcePenalties, then
connections from the client address will be refused (along with any
others in the same PerSourceNetBlockSize CIDR range).
Repeated offenses by the same client address will accrue greater
penalties, up to a configurable maximum. A PerSourcePenaltyExemptList
option allows certain address ranges to be exempt from all penalties.
We hope these options will make it significantly more difficult for
attackers to find accounts with weak/guessable passwords or exploit
bugs in sshd(8) itself.
PerSourcePenalties is off by default, but we expect to enable it
automatically in the near future.
much feedback markus@ and others, ok markus@
OpenBSD-Commit-ID: 89ded70eccb2b4926ef0366a4d58a693de366cca
2024-06-07 01:15:25 +08:00
|
|
|
/* $OpenBSD: misc.c,v 1.196 2024/06/06 17:15:25 djm Exp $ */
|
2000-09-16 10:29:08 +08:00
|
|
|
/*
|
|
|
|
* Copyright (c) 2000 Markus Friedl. All rights reserved.
|
2020-05-26 09:06:52 +08:00
|
|
|
* Copyright (c) 2005-2020 Damien Miller. All rights reserved.
|
|
|
|
* Copyright (c) 2004 Henning Brauer <henning@openbsd.org>
|
2000-09-16 10:29:08 +08:00
|
|
|
*
|
2020-05-26 09:06:52 +08:00
|
|
|
* Permission to use, copy, modify, and distribute this software for any
|
|
|
|
* purpose with or without fee is hereby granted, provided that the above
|
|
|
|
* copyright notice and this permission notice appear in all copies.
|
2000-09-16 10:29:08 +08:00
|
|
|
*
|
2020-05-26 09:06:52 +08:00
|
|
|
* THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES
|
|
|
|
* WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF
|
|
|
|
* MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR
|
|
|
|
* ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
|
|
|
|
* WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
|
|
|
|
* ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
|
|
|
|
* OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
|
2000-09-16 10:29:08 +08:00
|
|
|
*/
|
|
|
|
|
2020-05-26 09:06:52 +08:00
|
|
|
|
2000-08-18 12:01:04 +08:00
|
|
|
#include "includes.h"
|
2006-03-15 08:28:34 +08:00
|
|
|
|
2006-07-10 18:53:08 +08:00
|
|
|
#include <sys/types.h>
|
2006-08-05 10:39:39 +08:00
|
|
|
#include <sys/ioctl.h>
|
2023-07-19 22:02:27 +08:00
|
|
|
#include <sys/mman.h>
|
2006-07-10 18:35:38 +08:00
|
|
|
#include <sys/socket.h>
|
2017-08-18 13:36:45 +08:00
|
|
|
#include <sys/stat.h>
|
2016-01-20 17:22:39 +08:00
|
|
|
#include <sys/time.h>
|
2017-08-18 13:36:45 +08:00
|
|
|
#include <sys/wait.h>
|
2014-07-18 12:11:24 +08:00
|
|
|
#include <sys/un.h>
|
2006-07-10 18:35:38 +08:00
|
|
|
|
2015-01-16 14:40:12 +08:00
|
|
|
#include <limits.h>
|
2017-08-18 13:36:45 +08:00
|
|
|
#ifdef HAVE_LIBGEN_H
|
|
|
|
# include <libgen.h>
|
|
|
|
#endif
|
2019-10-28 12:53:25 +08:00
|
|
|
#ifdef HAVE_POLL_H
|
2018-12-27 11:25:24 +08:00
|
|
|
#include <poll.h>
|
2019-10-28 12:53:25 +08:00
|
|
|
#endif
|
2023-07-19 22:02:27 +08:00
|
|
|
#ifdef HAVE_NLIST_H
|
|
|
|
#include <nlist.h>
|
|
|
|
#endif
|
2017-08-18 13:36:45 +08:00
|
|
|
#include <signal.h>
|
2006-07-12 20:15:16 +08:00
|
|
|
#include <stdarg.h>
|
2006-08-05 09:37:59 +08:00
|
|
|
#include <stdio.h>
|
2023-07-18 13:41:12 +08:00
|
|
|
#ifdef HAVE_STDINT_H
|
|
|
|
# include <stdint.h>
|
|
|
|
#endif
|
2006-08-05 09:34:19 +08:00
|
|
|
#include <stdlib.h>
|
2006-07-24 12:13:33 +08:00
|
|
|
#include <string.h>
|
2011-01-13 09:21:34 +08:00
|
|
|
#include <time.h>
|
2006-07-24 12:01:23 +08:00
|
|
|
#include <unistd.h>
|
2006-07-12 20:15:16 +08:00
|
|
|
|
2006-07-10 18:35:38 +08:00
|
|
|
#include <netinet/in.h>
|
2010-11-20 12:19:38 +08:00
|
|
|
#include <netinet/in_systm.h>
|
|
|
|
#include <netinet/ip.h>
|
2006-03-15 08:19:42 +08:00
|
|
|
#include <netinet/tcp.h>
|
2018-10-05 22:26:09 +08:00
|
|
|
#include <arpa/inet.h>
|
2006-07-10 18:35:38 +08:00
|
|
|
|
2013-10-15 09:14:12 +08:00
|
|
|
#include <ctype.h>
|
2006-07-12 20:22:46 +08:00
|
|
|
#include <errno.h>
|
2006-07-10 19:13:46 +08:00
|
|
|
#include <fcntl.h>
|
2007-12-28 23:43:51 +08:00
|
|
|
#include <netdb.h>
|
2006-03-15 08:16:59 +08:00
|
|
|
#ifdef HAVE_PATHS_H
|
2006-03-15 08:18:26 +08:00
|
|
|
# include <paths.h>
|
2006-07-10 18:53:08 +08:00
|
|
|
#include <pwd.h>
|
2021-09-26 22:03:19 +08:00
|
|
|
#include <grp.h>
|
2006-03-15 08:16:59 +08:00
|
|
|
#endif
|
2006-01-02 20:40:10 +08:00
|
|
|
#ifdef SSH_TUN_OPENBSD
|
|
|
|
#include <net/if.h>
|
|
|
|
#endif
|
2000-08-18 12:01:04 +08:00
|
|
|
|
2006-08-05 10:39:39 +08:00
|
|
|
#include "xmalloc.h"
|
2001-02-04 21:20:36 +08:00
|
|
|
#include "misc.h"
|
2001-01-22 13:34:40 +08:00
|
|
|
#include "log.h"
|
2006-07-10 21:04:19 +08:00
|
|
|
#include "ssh.h"
|
2017-08-18 13:36:45 +08:00
|
|
|
#include "sshbuf.h"
|
|
|
|
#include "ssherr.h"
|
2017-08-23 18:13:18 +08:00
|
|
|
#include "platform.h"
|
2000-08-18 12:01:04 +08:00
|
|
|
|
2001-07-04 12:46:56 +08:00
|
|
|
/* remove newline at end of string */
|
2000-08-18 12:01:04 +08:00
|
|
|
char *
|
|
|
|
chop(char *s)
|
|
|
|
{
|
|
|
|
char *t = s;
|
|
|
|
while (*t) {
|
2001-12-07 02:00:18 +08:00
|
|
|
if (*t == '\n' || *t == '\r') {
|
2000-08-18 12:01:04 +08:00
|
|
|
*t = '\0';
|
|
|
|
return s;
|
|
|
|
}
|
|
|
|
t++;
|
|
|
|
}
|
|
|
|
return s;
|
|
|
|
|
|
|
|
}
|
|
|
|
|
2021-06-08 14:54:40 +08:00
|
|
|
/* remove whitespace from end of string */
|
|
|
|
void
|
|
|
|
rtrim(char *s)
|
|
|
|
{
|
|
|
|
size_t i;
|
|
|
|
|
|
|
|
if ((i = strlen(s)) == 0)
|
|
|
|
return;
|
|
|
|
for (i--; i > 0; i--) {
|
2022-12-16 02:20:39 +08:00
|
|
|
if (isspace((unsigned char)s[i]))
|
2021-06-08 14:54:40 +08:00
|
|
|
s[i] = '\0';
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2001-07-04 12:46:56 +08:00
|
|
|
/* set/unset filedescriptor to non-blocking */
|
2004-06-15 08:35:30 +08:00
|
|
|
int
|
2000-08-18 12:01:04 +08:00
|
|
|
set_nonblock(int fd)
|
|
|
|
{
|
|
|
|
int val;
|
2001-05-12 08:08:37 +08:00
|
|
|
|
2016-04-02 22:37:42 +08:00
|
|
|
val = fcntl(fd, F_GETFL);
|
2019-06-28 21:35:04 +08:00
|
|
|
if (val == -1) {
|
2016-04-02 22:37:42 +08:00
|
|
|
error("fcntl(%d, F_GETFL): %s", fd, strerror(errno));
|
2004-06-15 08:35:30 +08:00
|
|
|
return (-1);
|
2000-08-18 12:01:04 +08:00
|
|
|
}
|
2000-10-28 11:19:58 +08:00
|
|
|
if (val & O_NONBLOCK) {
|
2004-06-15 08:35:30 +08:00
|
|
|
debug3("fd %d is O_NONBLOCK", fd);
|
|
|
|
return (0);
|
2000-10-28 11:19:58 +08:00
|
|
|
}
|
2003-05-14 11:41:39 +08:00
|
|
|
debug2("fd %d setting O_NONBLOCK", fd);
|
2000-08-18 12:01:04 +08:00
|
|
|
val |= O_NONBLOCK;
|
2004-06-15 08:35:30 +08:00
|
|
|
if (fcntl(fd, F_SETFL, val) == -1) {
|
|
|
|
debug("fcntl(%d, F_SETFL, O_NONBLOCK): %s", fd,
|
|
|
|
strerror(errno));
|
|
|
|
return (-1);
|
|
|
|
}
|
|
|
|
return (0);
|
2000-08-18 12:01:04 +08:00
|
|
|
}
|
|
|
|
|
2004-06-15 08:35:30 +08:00
|
|
|
int
|
2001-05-12 08:08:37 +08:00
|
|
|
unset_nonblock(int fd)
|
|
|
|
{
|
|
|
|
int val;
|
|
|
|
|
2016-04-02 22:37:42 +08:00
|
|
|
val = fcntl(fd, F_GETFL);
|
2019-06-28 21:35:04 +08:00
|
|
|
if (val == -1) {
|
2016-04-02 22:37:42 +08:00
|
|
|
error("fcntl(%d, F_GETFL): %s", fd, strerror(errno));
|
2004-06-15 08:35:30 +08:00
|
|
|
return (-1);
|
2001-05-12 08:08:37 +08:00
|
|
|
}
|
|
|
|
if (!(val & O_NONBLOCK)) {
|
2004-06-15 08:35:30 +08:00
|
|
|
debug3("fd %d is not O_NONBLOCK", fd);
|
|
|
|
return (0);
|
2001-05-12 08:08:37 +08:00
|
|
|
}
|
2001-06-21 11:04:37 +08:00
|
|
|
debug("fd %d clearing O_NONBLOCK", fd);
|
2001-05-12 08:08:37 +08:00
|
|
|
val &= ~O_NONBLOCK;
|
2004-06-15 08:35:30 +08:00
|
|
|
if (fcntl(fd, F_SETFL, val) == -1) {
|
|
|
|
debug("fcntl(%d, F_SETFL, ~O_NONBLOCK): %s",
|
2002-03-05 09:48:09 +08:00
|
|
|
fd, strerror(errno));
|
2004-06-15 08:35:30 +08:00
|
|
|
return (-1);
|
|
|
|
}
|
|
|
|
return (0);
|
2001-05-12 08:08:37 +08:00
|
|
|
}
|
|
|
|
|
2007-12-28 23:43:51 +08:00
|
|
|
const char *
|
|
|
|
ssh_gai_strerror(int gaierr)
|
|
|
|
{
|
2013-07-18 14:13:19 +08:00
|
|
|
if (gaierr == EAI_SYSTEM && errno != 0)
|
2008-01-01 17:33:35 +08:00
|
|
|
return strerror(errno);
|
|
|
|
return gai_strerror(gaierr);
|
2007-12-28 23:43:51 +08:00
|
|
|
}
|
|
|
|
|
2002-02-05 08:52:13 +08:00
|
|
|
/* disable nagle on socket */
|
|
|
|
void
|
|
|
|
set_nodelay(int fd)
|
|
|
|
{
|
2002-03-05 09:28:14 +08:00
|
|
|
int opt;
|
|
|
|
socklen_t optlen;
|
2002-02-05 08:52:13 +08:00
|
|
|
|
2002-02-27 02:12:51 +08:00
|
|
|
optlen = sizeof opt;
|
|
|
|
if (getsockopt(fd, IPPROTO_TCP, TCP_NODELAY, &opt, &optlen) == -1) {
|
2003-11-03 17:07:14 +08:00
|
|
|
debug("getsockopt TCP_NODELAY: %.100s", strerror(errno));
|
2002-02-27 02:12:51 +08:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
if (opt == 1) {
|
|
|
|
debug2("fd %d is TCP_NODELAY", fd);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
opt = 1;
|
2002-12-23 10:44:36 +08:00
|
|
|
debug2("fd %d setting TCP_NODELAY", fd);
|
2002-02-27 02:12:51 +08:00
|
|
|
if (setsockopt(fd, IPPROTO_TCP, TCP_NODELAY, &opt, sizeof opt) == -1)
|
2002-02-05 08:52:13 +08:00
|
|
|
error("setsockopt TCP_NODELAY: %.100s", strerror(errno));
|
|
|
|
}
|
|
|
|
|
2017-10-25 08:15:35 +08:00
|
|
|
/* Allow local port reuse in TIME_WAIT */
|
|
|
|
int
|
|
|
|
set_reuseaddr(int fd)
|
|
|
|
{
|
|
|
|
int on = 1;
|
|
|
|
|
|
|
|
if (setsockopt(fd, SOL_SOCKET, SO_REUSEADDR, &on, sizeof(on)) == -1) {
|
|
|
|
error("setsockopt SO_REUSEADDR fd %d: %s", fd, strerror(errno));
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2017-10-25 08:17:08 +08:00
|
|
|
/* Get/set routing domain */
|
|
|
|
char *
|
|
|
|
get_rdomain(int fd)
|
|
|
|
{
|
2017-10-25 10:10:59 +08:00
|
|
|
#if defined(HAVE_SYS_GET_RDOMAIN)
|
|
|
|
return sys_get_rdomain(fd);
|
|
|
|
#elif defined(__OpenBSD__)
|
2017-10-25 08:17:08 +08:00
|
|
|
int rtable;
|
|
|
|
char *ret;
|
|
|
|
socklen_t len = sizeof(rtable);
|
|
|
|
|
|
|
|
if (getsockopt(fd, SOL_SOCKET, SO_RTABLE, &rtable, &len) == -1) {
|
|
|
|
error("Failed to get routing domain for fd %d: %s",
|
|
|
|
fd, strerror(errno));
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
xasprintf(&ret, "%d", rtable);
|
|
|
|
return ret;
|
2017-10-25 10:10:59 +08:00
|
|
|
#else /* defined(__OpenBSD__) */
|
|
|
|
return NULL;
|
|
|
|
#endif
|
2017-10-25 08:17:08 +08:00
|
|
|
}
|
|
|
|
|
2017-10-25 08:15:35 +08:00
|
|
|
int
|
|
|
|
set_rdomain(int fd, const char *name)
|
|
|
|
{
|
2017-10-25 10:10:59 +08:00
|
|
|
#if defined(HAVE_SYS_SET_RDOMAIN)
|
|
|
|
return sys_set_rdomain(fd, name);
|
|
|
|
#elif defined(__OpenBSD__)
|
2017-10-25 08:15:35 +08:00
|
|
|
int rtable;
|
|
|
|
const char *errstr;
|
|
|
|
|
|
|
|
if (name == NULL)
|
|
|
|
return 0; /* default table */
|
|
|
|
|
|
|
|
rtable = (int)strtonum(name, 0, 255, &errstr);
|
|
|
|
if (errstr != NULL) {
|
|
|
|
/* Shouldn't happen */
|
|
|
|
error("Invalid routing domain \"%s\": %s", name, errstr);
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
if (setsockopt(fd, SOL_SOCKET, SO_RTABLE,
|
|
|
|
&rtable, sizeof(rtable)) == -1) {
|
|
|
|
error("Failed to set routing domain %d on fd %d: %s",
|
|
|
|
rtable, fd, strerror(errno));
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
return 0;
|
2017-10-25 10:10:59 +08:00
|
|
|
#else /* defined(__OpenBSD__) */
|
|
|
|
error("Setting routing domain is not supported on this platform");
|
|
|
|
return -1;
|
|
|
|
#endif
|
2017-10-25 08:15:35 +08:00
|
|
|
}
|
|
|
|
|
2020-11-27 08:49:58 +08:00
|
|
|
int
|
|
|
|
get_sock_af(int fd)
|
|
|
|
{
|
|
|
|
struct sockaddr_storage to;
|
|
|
|
socklen_t tolen = sizeof(to);
|
|
|
|
|
|
|
|
memset(&to, 0, sizeof(to));
|
|
|
|
if (getsockname(fd, (struct sockaddr *)&to, &tolen) == -1)
|
|
|
|
return -1;
|
|
|
|
#ifdef IPV4_IN_IPV6
|
|
|
|
if (to.ss_family == AF_INET6 &&
|
|
|
|
IN6_IS_ADDR_V4MAPPED(&((struct sockaddr_in6 *)&to)->sin6_addr))
|
|
|
|
return AF_INET;
|
|
|
|
#endif
|
|
|
|
return to.ss_family;
|
|
|
|
}
|
|
|
|
|
|
|
|
void
|
|
|
|
set_sock_tos(int fd, int tos)
|
|
|
|
{
|
|
|
|
#ifndef IP_TOS_IS_BROKEN
|
|
|
|
int af;
|
|
|
|
|
|
|
|
switch ((af = get_sock_af(fd))) {
|
|
|
|
case -1:
|
|
|
|
/* assume not a socket */
|
|
|
|
break;
|
|
|
|
case AF_INET:
|
|
|
|
# ifdef IP_TOS
|
|
|
|
debug3_f("set socket %d IP_TOS 0x%02x", fd, tos);
|
|
|
|
if (setsockopt(fd, IPPROTO_IP, IP_TOS,
|
|
|
|
&tos, sizeof(tos)) == -1) {
|
2022-11-09 17:01:52 +08:00
|
|
|
error("setsockopt socket %d IP_TOS %d: %s",
|
2020-11-27 08:49:58 +08:00
|
|
|
fd, tos, strerror(errno));
|
|
|
|
}
|
|
|
|
# endif /* IP_TOS */
|
|
|
|
break;
|
|
|
|
case AF_INET6:
|
|
|
|
# ifdef IPV6_TCLASS
|
|
|
|
debug3_f("set socket %d IPV6_TCLASS 0x%02x", fd, tos);
|
|
|
|
if (setsockopt(fd, IPPROTO_IPV6, IPV6_TCLASS,
|
|
|
|
&tos, sizeof(tos)) == -1) {
|
2022-11-09 17:01:52 +08:00
|
|
|
error("setsockopt socket %d IPV6_TCLASS %d: %s",
|
2020-11-27 08:49:58 +08:00
|
|
|
fd, tos, strerror(errno));
|
|
|
|
}
|
|
|
|
# endif /* IPV6_TCLASS */
|
|
|
|
break;
|
|
|
|
default:
|
|
|
|
debug2_f("unsupported socket family %d", af);
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
#endif /* IP_TOS_IS_BROKEN */
|
|
|
|
}
|
|
|
|
|
2018-12-27 11:25:24 +08:00
|
|
|
/*
|
2019-11-22 14:50:30 +08:00
|
|
|
* Wait up to *timeoutp milliseconds for events on fd. Updates
|
2018-12-27 11:25:24 +08:00
|
|
|
* *timeoutp with time remaining.
|
|
|
|
* Returns 0 if fd ready or -1 on timeout or error (see errno).
|
|
|
|
*/
|
2019-11-22 14:50:30 +08:00
|
|
|
static int
|
2023-08-18 09:37:41 +08:00
|
|
|
waitfd(int fd, int *timeoutp, short events, volatile sig_atomic_t *stop)
|
2018-12-27 11:25:24 +08:00
|
|
|
{
|
|
|
|
struct pollfd pfd;
|
2023-08-18 09:37:41 +08:00
|
|
|
struct timespec timeout;
|
|
|
|
int oerrno, r;
|
|
|
|
sigset_t nsigset, osigset;
|
2018-12-27 11:25:24 +08:00
|
|
|
|
2023-08-18 09:37:41 +08:00
|
|
|
if (timeoutp && *timeoutp == -1)
|
|
|
|
timeoutp = NULL;
|
2018-12-27 11:25:24 +08:00
|
|
|
pfd.fd = fd;
|
2019-11-22 14:50:30 +08:00
|
|
|
pfd.events = events;
|
2023-08-18 09:37:41 +08:00
|
|
|
ptimeout_init(&timeout);
|
|
|
|
if (timeoutp != NULL)
|
|
|
|
ptimeout_deadline_ms(&timeout, *timeoutp);
|
|
|
|
if (stop != NULL)
|
|
|
|
sigfillset(&nsigset);
|
|
|
|
for (; timeoutp == NULL || *timeoutp >= 0;) {
|
|
|
|
if (stop != NULL) {
|
|
|
|
sigprocmask(SIG_BLOCK, &nsigset, &osigset);
|
|
|
|
if (*stop) {
|
|
|
|
sigprocmask(SIG_SETMASK, &osigset, NULL);
|
|
|
|
errno = EINTR;
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
r = ppoll(&pfd, 1, ptimeout_get_tsp(&timeout),
|
|
|
|
stop != NULL ? &osigset : NULL);
|
2018-12-27 11:25:24 +08:00
|
|
|
oerrno = errno;
|
2023-08-18 09:37:41 +08:00
|
|
|
if (stop != NULL)
|
|
|
|
sigprocmask(SIG_SETMASK, &osigset, NULL);
|
|
|
|
if (timeoutp)
|
|
|
|
*timeoutp = ptimeout_get_ms(&timeout);
|
2018-12-27 11:25:24 +08:00
|
|
|
errno = oerrno;
|
|
|
|
if (r > 0)
|
|
|
|
return 0;
|
2020-06-26 13:16:38 +08:00
|
|
|
else if (r == -1 && errno != EAGAIN && errno != EINTR)
|
2018-12-27 11:25:24 +08:00
|
|
|
return -1;
|
|
|
|
else if (r == 0)
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
/* timeout */
|
|
|
|
errno = ETIMEDOUT;
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
2019-11-22 14:50:30 +08:00
|
|
|
/*
|
|
|
|
* Wait up to *timeoutp milliseconds for fd to be readable. Updates
|
|
|
|
* *timeoutp with time remaining.
|
|
|
|
* Returns 0 if fd ready or -1 on timeout or error (see errno).
|
|
|
|
*/
|
|
|
|
int
|
2023-08-18 09:37:41 +08:00
|
|
|
waitrfd(int fd, int *timeoutp, volatile sig_atomic_t *stop) {
|
|
|
|
return waitfd(fd, timeoutp, POLLIN, stop);
|
2019-11-22 14:50:30 +08:00
|
|
|
}
|
|
|
|
|
2018-12-27 11:25:24 +08:00
|
|
|
/*
|
|
|
|
* Attempt a non-blocking connect(2) to the specified address, waiting up to
|
|
|
|
* *timeoutp milliseconds for the connection to complete. If the timeout is
|
|
|
|
* <=0, then wait indefinitely.
|
|
|
|
*
|
|
|
|
* Returns 0 on success or -1 on failure.
|
|
|
|
*/
|
|
|
|
int
|
|
|
|
timeout_connect(int sockfd, const struct sockaddr *serv_addr,
|
|
|
|
socklen_t addrlen, int *timeoutp)
|
|
|
|
{
|
|
|
|
int optval = 0;
|
|
|
|
socklen_t optlen = sizeof(optval);
|
|
|
|
|
|
|
|
/* No timeout: just do a blocking connect() */
|
|
|
|
if (timeoutp == NULL || *timeoutp <= 0)
|
|
|
|
return connect(sockfd, serv_addr, addrlen);
|
|
|
|
|
|
|
|
set_nonblock(sockfd);
|
2020-06-26 13:16:38 +08:00
|
|
|
for (;;) {
|
|
|
|
if (connect(sockfd, serv_addr, addrlen) == 0) {
|
|
|
|
/* Succeeded already? */
|
|
|
|
unset_nonblock(sockfd);
|
|
|
|
return 0;
|
|
|
|
} else if (errno == EINTR)
|
|
|
|
continue;
|
|
|
|
else if (errno != EINPROGRESS)
|
|
|
|
return -1;
|
|
|
|
break;
|
|
|
|
}
|
2018-12-27 11:25:24 +08:00
|
|
|
|
2023-08-18 09:37:41 +08:00
|
|
|
if (waitfd(sockfd, timeoutp, POLLIN | POLLOUT, NULL) == -1)
|
2018-12-27 11:25:24 +08:00
|
|
|
return -1;
|
|
|
|
|
|
|
|
/* Completed or failed */
|
|
|
|
if (getsockopt(sockfd, SOL_SOCKET, SO_ERROR, &optval, &optlen) == -1) {
|
|
|
|
debug("getsockopt: %s", strerror(errno));
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
if (optval != 0) {
|
|
|
|
errno = optval;
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
unset_nonblock(sockfd);
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2000-08-18 12:01:04 +08:00
|
|
|
/* Characters considered whitespace in strsep calls. */
|
|
|
|
#define WHITESPACE " \t\r\n"
|
2006-03-15 09:05:59 +08:00
|
|
|
#define QUOTE "\""
|
2000-08-18 12:01:04 +08:00
|
|
|
|
2001-07-04 12:46:56 +08:00
|
|
|
/* return next token in configuration line */
|
2018-06-09 11:01:12 +08:00
|
|
|
static char *
|
|
|
|
strdelim_internal(char **s, int split_equals)
|
2000-08-18 12:01:04 +08:00
|
|
|
{
|
2018-03-08 07:53:08 +08:00
|
|
|
char *old;
|
2000-08-18 12:01:04 +08:00
|
|
|
int wspace = 0;
|
|
|
|
|
|
|
|
if (*s == NULL)
|
|
|
|
return NULL;
|
|
|
|
|
|
|
|
old = *s;
|
|
|
|
|
2018-06-09 11:01:12 +08:00
|
|
|
*s = strpbrk(*s,
|
|
|
|
split_equals ? WHITESPACE QUOTE "=" : WHITESPACE QUOTE);
|
2000-08-18 12:01:04 +08:00
|
|
|
if (*s == NULL)
|
|
|
|
return (old);
|
|
|
|
|
2006-03-15 09:05:59 +08:00
|
|
|
if (*s[0] == '\"') {
|
|
|
|
memmove(*s, *s + 1, strlen(*s)); /* move nul too */
|
|
|
|
/* Find matching quote */
|
2018-03-08 07:53:08 +08:00
|
|
|
if ((*s = strpbrk(*s, QUOTE)) == NULL) {
|
|
|
|
return (NULL); /* no matching quote */
|
|
|
|
} else {
|
|
|
|
*s[0] = '\0';
|
|
|
|
*s += strspn(*s + 1, WHITESPACE) + 1;
|
|
|
|
return (old);
|
2006-03-15 09:05:59 +08:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2000-08-18 12:01:04 +08:00
|
|
|
/* Allow only one '=' to be skipped */
|
2018-06-09 11:01:12 +08:00
|
|
|
if (split_equals && *s[0] == '=')
|
2000-08-18 12:01:04 +08:00
|
|
|
wspace = 1;
|
|
|
|
*s[0] = '\0';
|
|
|
|
|
2006-03-15 09:05:59 +08:00
|
|
|
/* Skip any extra whitespace after first token */
|
2000-08-18 12:01:04 +08:00
|
|
|
*s += strspn(*s + 1, WHITESPACE) + 1;
|
2018-06-09 11:01:12 +08:00
|
|
|
if (split_equals && *s[0] == '=' && !wspace)
|
2000-08-18 12:01:04 +08:00
|
|
|
*s += strspn(*s + 1, WHITESPACE) + 1;
|
|
|
|
|
|
|
|
return (old);
|
|
|
|
}
|
2001-02-04 21:20:36 +08:00
|
|
|
|
2018-06-09 11:01:12 +08:00
|
|
|
/*
|
|
|
|
* Return next token in configuration line; splts on whitespace or a
|
|
|
|
* single '=' character.
|
|
|
|
*/
|
|
|
|
char *
|
|
|
|
strdelim(char **s)
|
|
|
|
{
|
|
|
|
return strdelim_internal(s, 1);
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Return next token in configuration line; splts on whitespace only.
|
|
|
|
*/
|
|
|
|
char *
|
|
|
|
strdelimw(char **s)
|
|
|
|
{
|
|
|
|
return strdelim_internal(s, 0);
|
|
|
|
}
|
|
|
|
|
2001-03-05 13:56:40 +08:00
|
|
|
struct passwd *
|
|
|
|
pwcopy(struct passwd *pw)
|
|
|
|
{
|
2006-03-26 11:19:21 +08:00
|
|
|
struct passwd *copy = xcalloc(1, sizeof(*copy));
|
2001-03-05 14:22:01 +08:00
|
|
|
|
2001-03-05 13:56:40 +08:00
|
|
|
copy->pw_name = xstrdup(pw->pw_name);
|
2021-05-17 07:40:23 +08:00
|
|
|
copy->pw_passwd = xstrdup(pw->pw_passwd == NULL ? "*" : pw->pw_passwd);
|
2013-04-23 12:25:52 +08:00
|
|
|
#ifdef HAVE_STRUCT_PASSWD_PW_GECOS
|
2001-03-05 14:22:01 +08:00
|
|
|
copy->pw_gecos = xstrdup(pw->pw_gecos);
|
2013-04-23 12:25:52 +08:00
|
|
|
#endif
|
2001-03-05 13:56:40 +08:00
|
|
|
copy->pw_uid = pw->pw_uid;
|
|
|
|
copy->pw_gid = pw->pw_gid;
|
2013-04-23 12:25:52 +08:00
|
|
|
#ifdef HAVE_STRUCT_PASSWD_PW_EXPIRE
|
2001-06-21 11:11:27 +08:00
|
|
|
copy->pw_expire = pw->pw_expire;
|
2001-06-23 05:14:18 +08:00
|
|
|
#endif
|
2013-04-23 12:25:52 +08:00
|
|
|
#ifdef HAVE_STRUCT_PASSWD_PW_CHANGE
|
2001-06-21 11:11:27 +08:00
|
|
|
copy->pw_change = pw->pw_change;
|
2001-06-23 05:14:18 +08:00
|
|
|
#endif
|
2013-04-23 12:25:52 +08:00
|
|
|
#ifdef HAVE_STRUCT_PASSWD_PW_CLASS
|
2001-03-05 13:56:40 +08:00
|
|
|
copy->pw_class = xstrdup(pw->pw_class);
|
2001-03-05 15:57:09 +08:00
|
|
|
#endif
|
2001-03-05 13:56:40 +08:00
|
|
|
copy->pw_dir = xstrdup(pw->pw_dir);
|
|
|
|
copy->pw_shell = xstrdup(pw->pw_shell);
|
|
|
|
return copy;
|
|
|
|
}
|
|
|
|
|
2001-07-04 12:46:56 +08:00
|
|
|
/*
|
|
|
|
* Convert ASCII string to TCP/IP port number.
|
2009-01-28 13:31:22 +08:00
|
|
|
* Port must be >=0 and <=65535.
|
|
|
|
* Return -1 if invalid.
|
2001-07-04 12:46:56 +08:00
|
|
|
*/
|
|
|
|
int
|
|
|
|
a2port(const char *s)
|
2001-04-13 07:39:26 +08:00
|
|
|
{
|
2018-10-05 22:26:09 +08:00
|
|
|
struct servent *se;
|
2009-01-28 13:31:22 +08:00
|
|
|
long long port;
|
|
|
|
const char *errstr;
|
2001-04-13 07:39:26 +08:00
|
|
|
|
2009-01-28 13:31:22 +08:00
|
|
|
port = strtonum(s, 0, 65535, &errstr);
|
2018-10-05 22:26:09 +08:00
|
|
|
if (errstr == NULL)
|
|
|
|
return (int)port;
|
|
|
|
if ((se = getservbyname(s, "tcp")) != NULL)
|
|
|
|
return ntohs(se->s_port);
|
|
|
|
return -1;
|
2001-04-13 07:39:26 +08:00
|
|
|
}
|
|
|
|
|
2005-12-13 16:29:02 +08:00
|
|
|
int
|
|
|
|
a2tun(const char *s, int *remote)
|
|
|
|
{
|
|
|
|
const char *errstr = NULL;
|
|
|
|
char *sp, *ep;
|
|
|
|
int tun;
|
|
|
|
|
|
|
|
if (remote != NULL) {
|
2005-12-13 16:33:19 +08:00
|
|
|
*remote = SSH_TUNID_ANY;
|
2005-12-13 16:29:02 +08:00
|
|
|
sp = xstrdup(s);
|
|
|
|
if ((ep = strchr(sp, ':')) == NULL) {
|
2013-06-02 05:31:17 +08:00
|
|
|
free(sp);
|
2005-12-13 16:29:02 +08:00
|
|
|
return (a2tun(s, NULL));
|
|
|
|
}
|
|
|
|
ep[0] = '\0'; ep++;
|
|
|
|
*remote = a2tun(ep, NULL);
|
|
|
|
tun = a2tun(sp, NULL);
|
2013-06-02 05:31:17 +08:00
|
|
|
free(sp);
|
2005-12-13 16:33:19 +08:00
|
|
|
return (*remote == SSH_TUNID_ERR ? *remote : tun);
|
2005-12-13 16:29:02 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
if (strcasecmp(s, "any") == 0)
|
2005-12-13 16:33:19 +08:00
|
|
|
return (SSH_TUNID_ANY);
|
2005-12-13 16:29:02 +08:00
|
|
|
|
2005-12-13 16:33:19 +08:00
|
|
|
tun = strtonum(s, 0, SSH_TUNID_MAX, &errstr);
|
|
|
|
if (errstr != NULL)
|
|
|
|
return (SSH_TUNID_ERR);
|
2005-12-13 16:29:02 +08:00
|
|
|
|
|
|
|
return (tun);
|
|
|
|
}
|
|
|
|
|
2001-06-06 03:59:08 +08:00
|
|
|
#define SECONDS 1
|
|
|
|
#define MINUTES (SECONDS * 60)
|
|
|
|
#define HOURS (MINUTES * 60)
|
|
|
|
#define DAYS (HOURS * 24)
|
|
|
|
#define WEEKS (DAYS * 7)
|
|
|
|
|
2024-04-02 17:52:14 +08:00
|
|
|
static char *
|
|
|
|
scandigits(char *s)
|
|
|
|
{
|
|
|
|
while (isdigit((unsigned char)*s))
|
|
|
|
s++;
|
|
|
|
return s;
|
|
|
|
}
|
|
|
|
|
2001-07-04 12:46:56 +08:00
|
|
|
/*
|
|
|
|
* Convert a time string into seconds; format is
|
|
|
|
* a sequence of:
|
|
|
|
* time[qualifier]
|
|
|
|
*
|
|
|
|
* Valid time qualifiers are:
|
|
|
|
* <none> seconds
|
|
|
|
* s|S seconds
|
|
|
|
* m|M minutes
|
|
|
|
* h|H hours
|
|
|
|
* d|D days
|
|
|
|
* w|W weeks
|
|
|
|
*
|
|
|
|
* Examples:
|
|
|
|
* 90m 90 minutes
|
|
|
|
* 1h30m 90 minutes
|
|
|
|
* 2d 2 days
|
|
|
|
* 1w 1 week
|
|
|
|
*
|
|
|
|
* Return -1 if time string is invalid.
|
|
|
|
*/
|
2021-01-11 10:12:57 +08:00
|
|
|
int
|
2001-07-04 12:46:56 +08:00
|
|
|
convtime(const char *s)
|
2001-06-06 03:59:08 +08:00
|
|
|
{
|
2024-04-02 17:52:14 +08:00
|
|
|
int secs, total = 0, multiplier;
|
2024-05-17 14:11:17 +08:00
|
|
|
char *p, *os, *np, c = 0;
|
2024-04-02 17:52:14 +08:00
|
|
|
const char *errstr;
|
2001-06-06 03:59:08 +08:00
|
|
|
|
2024-04-02 17:52:14 +08:00
|
|
|
if (s == NULL || *s == '\0')
|
|
|
|
return -1;
|
|
|
|
p = os = strdup(s); /* deal with const */
|
|
|
|
if (os == NULL)
|
2001-06-06 03:59:08 +08:00
|
|
|
return -1;
|
|
|
|
|
|
|
|
while (*p) {
|
2024-04-02 17:52:14 +08:00
|
|
|
np = scandigits(p);
|
|
|
|
if (np) {
|
|
|
|
c = *np;
|
|
|
|
*np = '\0';
|
|
|
|
}
|
|
|
|
secs = (int)strtonum(p, 0, INT_MAX, &errstr);
|
|
|
|
if (errstr)
|
|
|
|
goto fail;
|
|
|
|
*np = c;
|
2001-06-06 03:59:08 +08:00
|
|
|
|
2020-05-29 09:20:46 +08:00
|
|
|
multiplier = 1;
|
2024-04-02 17:52:14 +08:00
|
|
|
switch (c) {
|
2001-06-06 03:59:08 +08:00
|
|
|
case '\0':
|
2024-04-02 17:52:14 +08:00
|
|
|
np--; /* back up */
|
2006-03-26 11:02:35 +08:00
|
|
|
break;
|
2001-06-06 03:59:08 +08:00
|
|
|
case 's':
|
|
|
|
case 'S':
|
|
|
|
break;
|
|
|
|
case 'm':
|
|
|
|
case 'M':
|
2017-03-14 08:25:03 +08:00
|
|
|
multiplier = MINUTES;
|
2001-06-06 03:59:08 +08:00
|
|
|
break;
|
|
|
|
case 'h':
|
|
|
|
case 'H':
|
2017-03-14 08:25:03 +08:00
|
|
|
multiplier = HOURS;
|
2001-06-06 03:59:08 +08:00
|
|
|
break;
|
|
|
|
case 'd':
|
|
|
|
case 'D':
|
2017-03-14 08:25:03 +08:00
|
|
|
multiplier = DAYS;
|
2001-06-06 03:59:08 +08:00
|
|
|
break;
|
|
|
|
case 'w':
|
|
|
|
case 'W':
|
2017-03-14 08:25:03 +08:00
|
|
|
multiplier = WEEKS;
|
2001-06-06 03:59:08 +08:00
|
|
|
break;
|
|
|
|
default:
|
2024-04-02 17:52:14 +08:00
|
|
|
goto fail;
|
2001-06-06 03:59:08 +08:00
|
|
|
}
|
2021-01-15 10:58:11 +08:00
|
|
|
if (secs > INT_MAX / multiplier)
|
2024-04-02 17:52:14 +08:00
|
|
|
goto fail;
|
2017-03-14 08:25:03 +08:00
|
|
|
secs *= multiplier;
|
2021-01-15 10:58:11 +08:00
|
|
|
if (total > INT_MAX - secs)
|
2024-04-02 17:52:14 +08:00
|
|
|
goto fail;
|
2001-06-06 03:59:08 +08:00
|
|
|
total += secs;
|
|
|
|
if (total < 0)
|
2024-04-02 17:52:14 +08:00
|
|
|
goto fail;
|
|
|
|
p = ++np;
|
2001-06-06 03:59:08 +08:00
|
|
|
}
|
2024-04-02 17:52:14 +08:00
|
|
|
free(os);
|
2001-06-06 03:59:08 +08:00
|
|
|
return total;
|
2024-04-02 17:52:14 +08:00
|
|
|
fail:
|
|
|
|
free(os);
|
|
|
|
return -1;
|
2001-06-06 03:59:08 +08:00
|
|
|
}
|
|
|
|
|
2020-05-26 09:06:52 +08:00
|
|
|
#define TF_BUFS 8
|
|
|
|
#define TF_LEN 9
|
|
|
|
|
|
|
|
const char *
|
|
|
|
fmt_timeframe(time_t t)
|
|
|
|
{
|
|
|
|
char *buf;
|
|
|
|
static char tfbuf[TF_BUFS][TF_LEN]; /* ring buffer */
|
|
|
|
static int idx = 0;
|
|
|
|
unsigned int sec, min, hrs, day;
|
|
|
|
unsigned long long week;
|
|
|
|
|
|
|
|
buf = tfbuf[idx++];
|
|
|
|
if (idx == TF_BUFS)
|
|
|
|
idx = 0;
|
|
|
|
|
|
|
|
week = t;
|
|
|
|
|
|
|
|
sec = week % 60;
|
|
|
|
week /= 60;
|
|
|
|
min = week % 60;
|
|
|
|
week /= 60;
|
|
|
|
hrs = week % 24;
|
|
|
|
week /= 24;
|
|
|
|
day = week % 7;
|
|
|
|
week /= 7;
|
|
|
|
|
|
|
|
if (week > 0)
|
|
|
|
snprintf(buf, TF_LEN, "%02lluw%01ud%02uh", week, day, hrs);
|
|
|
|
else if (day > 0)
|
|
|
|
snprintf(buf, TF_LEN, "%01ud%02uh%02um", day, hrs, min);
|
|
|
|
else
|
|
|
|
snprintf(buf, TF_LEN, "%02u:%02u:%02u", hrs, min, sec);
|
|
|
|
|
|
|
|
return (buf);
|
|
|
|
}
|
|
|
|
|
2006-07-10 21:04:19 +08:00
|
|
|
/*
|
|
|
|
* Returns a standardized host+port identifier string.
|
|
|
|
* Caller must free returned string.
|
|
|
|
*/
|
|
|
|
char *
|
|
|
|
put_host_port(const char *host, u_short port)
|
|
|
|
{
|
|
|
|
char *hoststr;
|
|
|
|
|
|
|
|
if (port == 0 || port == SSH_DEFAULT_PORT)
|
|
|
|
return(xstrdup(host));
|
2019-06-28 02:03:37 +08:00
|
|
|
if (asprintf(&hoststr, "[%s]:%d", host, (int)port) == -1)
|
2006-07-10 21:04:19 +08:00
|
|
|
fatal("put_host_port: asprintf: %s", strerror(errno));
|
|
|
|
debug3("put_host_port: %s", hoststr);
|
|
|
|
return hoststr;
|
|
|
|
}
|
|
|
|
|
2005-03-01 18:24:33 +08:00
|
|
|
/*
|
|
|
|
* Search for next delimiter between hostnames/addresses and ports.
|
|
|
|
* Argument may be modified (for termination).
|
|
|
|
* Returns *cp if parsing succeeds.
|
2017-10-22 07:06:24 +08:00
|
|
|
* *cp is set to the start of the next field, if one was found.
|
|
|
|
* The delimiter char, if present, is stored in delim.
|
2005-03-01 18:24:33 +08:00
|
|
|
* If this is the last field, *cp is set to NULL.
|
|
|
|
*/
|
2019-01-24 05:50:56 +08:00
|
|
|
char *
|
2017-10-22 07:06:24 +08:00
|
|
|
hpdelim2(char **cp, char *delim)
|
2005-03-01 18:24:33 +08:00
|
|
|
{
|
|
|
|
char *s, *old;
|
|
|
|
|
|
|
|
if (cp == NULL || *cp == NULL)
|
|
|
|
return NULL;
|
|
|
|
|
|
|
|
old = s = *cp;
|
|
|
|
if (*s == '[') {
|
|
|
|
if ((s = strchr(s, ']')) == NULL)
|
|
|
|
return NULL;
|
|
|
|
else
|
|
|
|
s++;
|
|
|
|
} else if ((s = strpbrk(s, ":/")) == NULL)
|
|
|
|
s = *cp + strlen(*cp); /* skip to end (see first case below) */
|
|
|
|
|
|
|
|
switch (*s) {
|
|
|
|
case '\0':
|
|
|
|
*cp = NULL; /* no more fields*/
|
|
|
|
break;
|
2005-03-14 20:08:12 +08:00
|
|
|
|
2005-03-01 18:24:33 +08:00
|
|
|
case ':':
|
|
|
|
case '/':
|
2017-10-22 07:06:24 +08:00
|
|
|
if (delim != NULL)
|
|
|
|
*delim = *s;
|
2005-03-01 18:24:33 +08:00
|
|
|
*s = '\0'; /* terminate */
|
|
|
|
*cp = s + 1;
|
|
|
|
break;
|
2005-03-14 20:08:12 +08:00
|
|
|
|
2005-03-01 18:24:33 +08:00
|
|
|
default:
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
|
|
|
return old;
|
|
|
|
}
|
|
|
|
|
2022-02-08 16:59:12 +08:00
|
|
|
/* The common case: only accept colon as delimiter. */
|
2017-10-22 07:06:24 +08:00
|
|
|
char *
|
|
|
|
hpdelim(char **cp)
|
|
|
|
{
|
2022-02-11 08:43:56 +08:00
|
|
|
char *r, delim = '\0';
|
2022-02-08 16:59:12 +08:00
|
|
|
|
|
|
|
r = hpdelim2(cp, &delim);
|
|
|
|
if (delim == '/')
|
|
|
|
return NULL;
|
|
|
|
return r;
|
2017-10-22 07:06:24 +08:00
|
|
|
}
|
|
|
|
|
2001-05-04 07:39:53 +08:00
|
|
|
char *
|
|
|
|
cleanhostname(char *host)
|
|
|
|
{
|
|
|
|
if (*host == '[' && host[strlen(host) - 1] == ']') {
|
|
|
|
host[strlen(host) - 1] = '\0';
|
|
|
|
return (host + 1);
|
|
|
|
} else
|
|
|
|
return host;
|
|
|
|
}
|
|
|
|
|
|
|
|
char *
|
|
|
|
colon(char *cp)
|
|
|
|
{
|
|
|
|
int flag = 0;
|
|
|
|
|
|
|
|
if (*cp == ':') /* Leading colon is part of file name. */
|
2010-06-26 07:30:47 +08:00
|
|
|
return NULL;
|
2001-05-04 07:39:53 +08:00
|
|
|
if (*cp == '[')
|
|
|
|
flag = 1;
|
|
|
|
|
|
|
|
for (; *cp; ++cp) {
|
|
|
|
if (*cp == '@' && *(cp+1) == '[')
|
|
|
|
flag = 1;
|
|
|
|
if (*cp == ']' && *(cp+1) == ':' && flag)
|
|
|
|
return (cp+1);
|
|
|
|
if (*cp == ':' && !flag)
|
|
|
|
return (cp);
|
|
|
|
if (*cp == '/')
|
2010-06-26 07:30:47 +08:00
|
|
|
return NULL;
|
2001-05-04 07:39:53 +08:00
|
|
|
}
|
2010-06-26 07:30:47 +08:00
|
|
|
return NULL;
|
2001-05-04 07:39:53 +08:00
|
|
|
}
|
|
|
|
|
2017-10-22 07:06:24 +08:00
|
|
|
/*
|
|
|
|
* Parse a [user@]host:[path] string.
|
|
|
|
* Caller must free returned user, host and path.
|
|
|
|
* Any of the pointer return arguments may be NULL (useful for syntax checking).
|
|
|
|
* If user was not specified then *userp will be set to NULL.
|
|
|
|
* If host was not specified then *hostp will be set to NULL.
|
|
|
|
* If path was not specified then *pathp will be set to ".".
|
|
|
|
* Returns 0 on success, -1 on failure.
|
|
|
|
*/
|
|
|
|
int
|
|
|
|
parse_user_host_path(const char *s, char **userp, char **hostp, char **pathp)
|
|
|
|
{
|
|
|
|
char *user = NULL, *host = NULL, *path = NULL;
|
|
|
|
char *sdup, *tmp;
|
|
|
|
int ret = -1;
|
|
|
|
|
|
|
|
if (userp != NULL)
|
|
|
|
*userp = NULL;
|
|
|
|
if (hostp != NULL)
|
|
|
|
*hostp = NULL;
|
|
|
|
if (pathp != NULL)
|
|
|
|
*pathp = NULL;
|
|
|
|
|
2017-10-25 03:41:45 +08:00
|
|
|
sdup = xstrdup(s);
|
2017-10-22 07:06:24 +08:00
|
|
|
|
|
|
|
/* Check for remote syntax: [user@]host:[path] */
|
|
|
|
if ((tmp = colon(sdup)) == NULL)
|
|
|
|
goto out;
|
|
|
|
|
|
|
|
/* Extract optional path */
|
|
|
|
*tmp++ = '\0';
|
|
|
|
if (*tmp == '\0')
|
|
|
|
tmp = ".";
|
|
|
|
path = xstrdup(tmp);
|
|
|
|
|
|
|
|
/* Extract optional user and mandatory host */
|
|
|
|
tmp = strrchr(sdup, '@');
|
|
|
|
if (tmp != NULL) {
|
|
|
|
*tmp++ = '\0';
|
|
|
|
host = xstrdup(cleanhostname(tmp));
|
|
|
|
if (*sdup != '\0')
|
|
|
|
user = xstrdup(sdup);
|
|
|
|
} else {
|
|
|
|
host = xstrdup(cleanhostname(sdup));
|
|
|
|
user = NULL;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Success */
|
|
|
|
if (userp != NULL) {
|
|
|
|
*userp = user;
|
|
|
|
user = NULL;
|
|
|
|
}
|
|
|
|
if (hostp != NULL) {
|
|
|
|
*hostp = host;
|
|
|
|
host = NULL;
|
2017-10-25 03:41:45 +08:00
|
|
|
}
|
2017-10-22 07:06:24 +08:00
|
|
|
if (pathp != NULL) {
|
|
|
|
*pathp = path;
|
|
|
|
path = NULL;
|
2017-10-25 03:41:45 +08:00
|
|
|
}
|
2017-10-22 07:06:24 +08:00
|
|
|
ret = 0;
|
|
|
|
out:
|
|
|
|
free(sdup);
|
|
|
|
free(user);
|
|
|
|
free(host);
|
|
|
|
free(path);
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
2016-07-15 08:24:30 +08:00
|
|
|
/*
|
|
|
|
* Parse a [user@]host[:port] string.
|
|
|
|
* Caller must free returned user and host.
|
|
|
|
* Any of the pointer return arguments may be NULL (useful for syntax checking).
|
|
|
|
* If user was not specified then *userp will be set to NULL.
|
|
|
|
* If port was not specified then *portp will be -1.
|
|
|
|
* Returns 0 on success, -1 on failure.
|
|
|
|
*/
|
|
|
|
int
|
|
|
|
parse_user_host_port(const char *s, char **userp, char **hostp, int *portp)
|
|
|
|
{
|
|
|
|
char *sdup, *cp, *tmp;
|
|
|
|
char *user = NULL, *host = NULL;
|
|
|
|
int port = -1, ret = -1;
|
|
|
|
|
|
|
|
if (userp != NULL)
|
|
|
|
*userp = NULL;
|
|
|
|
if (hostp != NULL)
|
|
|
|
*hostp = NULL;
|
|
|
|
if (portp != NULL)
|
|
|
|
*portp = -1;
|
|
|
|
|
|
|
|
if ((sdup = tmp = strdup(s)) == NULL)
|
|
|
|
return -1;
|
|
|
|
/* Extract optional username */
|
2017-10-22 07:06:24 +08:00
|
|
|
if ((cp = strrchr(tmp, '@')) != NULL) {
|
2016-07-15 08:24:30 +08:00
|
|
|
*cp = '\0';
|
|
|
|
if (*tmp == '\0')
|
|
|
|
goto out;
|
|
|
|
if ((user = strdup(tmp)) == NULL)
|
|
|
|
goto out;
|
|
|
|
tmp = cp + 1;
|
|
|
|
}
|
|
|
|
/* Extract mandatory hostname */
|
|
|
|
if ((cp = hpdelim(&tmp)) == NULL || *cp == '\0')
|
|
|
|
goto out;
|
|
|
|
host = xstrdup(cleanhostname(cp));
|
|
|
|
/* Convert and verify optional port */
|
|
|
|
if (tmp != NULL && *tmp != '\0') {
|
|
|
|
if ((port = a2port(tmp)) <= 0)
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
/* Success */
|
|
|
|
if (userp != NULL) {
|
|
|
|
*userp = user;
|
|
|
|
user = NULL;
|
|
|
|
}
|
|
|
|
if (hostp != NULL) {
|
|
|
|
*hostp = host;
|
|
|
|
host = NULL;
|
|
|
|
}
|
|
|
|
if (portp != NULL)
|
|
|
|
*portp = port;
|
|
|
|
ret = 0;
|
|
|
|
out:
|
|
|
|
free(sdup);
|
|
|
|
free(user);
|
|
|
|
free(host);
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
2017-10-22 07:06:24 +08:00
|
|
|
/*
|
|
|
|
* Converts a two-byte hex string to decimal.
|
|
|
|
* Returns the decimal value or -1 for invalid input.
|
|
|
|
*/
|
|
|
|
static int
|
|
|
|
hexchar(const char *s)
|
|
|
|
{
|
|
|
|
unsigned char result[2];
|
|
|
|
int i;
|
|
|
|
|
|
|
|
for (i = 0; i < 2; i++) {
|
|
|
|
if (s[i] >= '0' && s[i] <= '9')
|
|
|
|
result[i] = (unsigned char)(s[i] - '0');
|
|
|
|
else if (s[i] >= 'a' && s[i] <= 'f')
|
|
|
|
result[i] = (unsigned char)(s[i] - 'a') + 10;
|
|
|
|
else if (s[i] >= 'A' && s[i] <= 'F')
|
|
|
|
result[i] = (unsigned char)(s[i] - 'A') + 10;
|
|
|
|
else
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
return (result[0] << 4) | result[1];
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Decode an url-encoded string.
|
|
|
|
* Returns a newly allocated string on success or NULL on failure.
|
|
|
|
*/
|
|
|
|
static char *
|
|
|
|
urldecode(const char *src)
|
|
|
|
{
|
|
|
|
char *ret, *dst;
|
|
|
|
int ch;
|
2023-07-14 13:31:44 +08:00
|
|
|
size_t srclen;
|
2017-10-22 07:06:24 +08:00
|
|
|
|
2023-07-14 13:31:44 +08:00
|
|
|
if ((srclen = strlen(src)) >= SIZE_MAX)
|
|
|
|
fatal_f("input too large");
|
|
|
|
ret = xmalloc(srclen + 1);
|
2017-10-22 07:06:24 +08:00
|
|
|
for (dst = ret; *src != '\0'; src++) {
|
|
|
|
switch (*src) {
|
|
|
|
case '+':
|
|
|
|
*dst++ = ' ';
|
|
|
|
break;
|
|
|
|
case '%':
|
|
|
|
if (!isxdigit((unsigned char)src[1]) ||
|
|
|
|
!isxdigit((unsigned char)src[2]) ||
|
|
|
|
(ch = hexchar(src + 1)) == -1) {
|
|
|
|
free(ret);
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
*dst++ = ch;
|
|
|
|
src += 2;
|
|
|
|
break;
|
|
|
|
default:
|
|
|
|
*dst++ = *src;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
*dst = '\0';
|
|
|
|
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Parse an (scp|ssh|sftp)://[user@]host[:port][/path] URI.
|
|
|
|
* See https://tools.ietf.org/html/draft-ietf-secsh-scp-sftp-ssh-uri-04
|
|
|
|
* Either user or path may be url-encoded (but not host or port).
|
|
|
|
* Caller must free returned user, host and path.
|
|
|
|
* Any of the pointer return arguments may be NULL (useful for syntax checking)
|
|
|
|
* but the scheme must always be specified.
|
|
|
|
* If user was not specified then *userp will be set to NULL.
|
|
|
|
* If port was not specified then *portp will be -1.
|
|
|
|
* If path was not specified then *pathp will be set to NULL.
|
|
|
|
* Returns 0 on success, 1 if non-uri/wrong scheme, -1 on error/invalid uri.
|
|
|
|
*/
|
|
|
|
int
|
|
|
|
parse_uri(const char *scheme, const char *uri, char **userp, char **hostp,
|
|
|
|
int *portp, char **pathp)
|
|
|
|
{
|
|
|
|
char *uridup, *cp, *tmp, ch;
|
|
|
|
char *user = NULL, *host = NULL, *path = NULL;
|
|
|
|
int port = -1, ret = -1;
|
|
|
|
size_t len;
|
|
|
|
|
|
|
|
len = strlen(scheme);
|
|
|
|
if (strncmp(uri, scheme, len) != 0 || strncmp(uri + len, "://", 3) != 0)
|
|
|
|
return 1;
|
|
|
|
uri += len + 3;
|
|
|
|
|
|
|
|
if (userp != NULL)
|
|
|
|
*userp = NULL;
|
|
|
|
if (hostp != NULL)
|
|
|
|
*hostp = NULL;
|
|
|
|
if (portp != NULL)
|
|
|
|
*portp = -1;
|
|
|
|
if (pathp != NULL)
|
|
|
|
*pathp = NULL;
|
|
|
|
|
|
|
|
uridup = tmp = xstrdup(uri);
|
|
|
|
|
|
|
|
/* Extract optional ssh-info (username + connection params) */
|
|
|
|
if ((cp = strchr(tmp, '@')) != NULL) {
|
|
|
|
char *delim;
|
|
|
|
|
|
|
|
*cp = '\0';
|
|
|
|
/* Extract username and connection params */
|
|
|
|
if ((delim = strchr(tmp, ';')) != NULL) {
|
|
|
|
/* Just ignore connection params for now */
|
|
|
|
*delim = '\0';
|
|
|
|
}
|
|
|
|
if (*tmp == '\0') {
|
|
|
|
/* Empty username */
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
if ((user = urldecode(tmp)) == NULL)
|
|
|
|
goto out;
|
|
|
|
tmp = cp + 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Extract mandatory hostname */
|
|
|
|
if ((cp = hpdelim2(&tmp, &ch)) == NULL || *cp == '\0')
|
|
|
|
goto out;
|
|
|
|
host = xstrdup(cleanhostname(cp));
|
|
|
|
if (!valid_domain(host, 0, NULL))
|
|
|
|
goto out;
|
|
|
|
|
|
|
|
if (tmp != NULL && *tmp != '\0') {
|
|
|
|
if (ch == ':') {
|
|
|
|
/* Convert and verify port. */
|
|
|
|
if ((cp = strchr(tmp, '/')) != NULL)
|
|
|
|
*cp = '\0';
|
|
|
|
if ((port = a2port(tmp)) <= 0)
|
|
|
|
goto out;
|
|
|
|
tmp = cp ? cp + 1 : NULL;
|
|
|
|
}
|
|
|
|
if (tmp != NULL && *tmp != '\0') {
|
|
|
|
/* Extract optional path */
|
|
|
|
if ((path = urldecode(tmp)) == NULL)
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Success */
|
|
|
|
if (userp != NULL) {
|
|
|
|
*userp = user;
|
|
|
|
user = NULL;
|
|
|
|
}
|
|
|
|
if (hostp != NULL) {
|
|
|
|
*hostp = host;
|
|
|
|
host = NULL;
|
|
|
|
}
|
|
|
|
if (portp != NULL)
|
|
|
|
*portp = port;
|
|
|
|
if (pathp != NULL) {
|
|
|
|
*pathp = path;
|
|
|
|
path = NULL;
|
|
|
|
}
|
|
|
|
ret = 0;
|
|
|
|
out:
|
|
|
|
free(uridup);
|
|
|
|
free(user);
|
|
|
|
free(host);
|
|
|
|
free(path);
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
2001-07-04 12:46:56 +08:00
|
|
|
/* function to assist building execv() arguments */
|
2001-05-09 04:27:25 +08:00
|
|
|
void
|
|
|
|
addargs(arglist *args, char *fmt, ...)
|
|
|
|
{
|
|
|
|
va_list ap;
|
2006-01-31 18:49:27 +08:00
|
|
|
char *cp;
|
2004-08-13 19:18:00 +08:00
|
|
|
u_int nalloc;
|
2006-01-31 18:49:27 +08:00
|
|
|
int r;
|
2001-05-09 04:27:25 +08:00
|
|
|
|
|
|
|
va_start(ap, fmt);
|
2006-01-31 18:49:27 +08:00
|
|
|
r = vasprintf(&cp, fmt, ap);
|
2001-05-09 04:27:25 +08:00
|
|
|
va_end(ap);
|
2006-01-31 18:49:27 +08:00
|
|
|
if (r == -1)
|
2022-03-20 16:51:21 +08:00
|
|
|
fatal_f("argument too long");
|
2001-05-09 04:27:25 +08:00
|
|
|
|
2003-09-22 19:04:23 +08:00
|
|
|
nalloc = args->nalloc;
|
2001-05-09 04:27:25 +08:00
|
|
|
if (args->list == NULL) {
|
2003-09-22 19:04:23 +08:00
|
|
|
nalloc = 32;
|
2001-05-09 04:27:25 +08:00
|
|
|
args->num = 0;
|
2022-03-20 16:51:21 +08:00
|
|
|
} else if (args->num > (256 * 1024))
|
|
|
|
fatal_f("too many arguments");
|
|
|
|
else if (args->num >= args->nalloc)
|
|
|
|
fatal_f("arglist corrupt");
|
|
|
|
else if (args->num+2 >= nalloc)
|
2003-09-22 19:04:23 +08:00
|
|
|
nalloc *= 2;
|
2001-05-09 04:27:25 +08:00
|
|
|
|
2022-03-20 16:51:21 +08:00
|
|
|
args->list = xrecallocarray(args->list, args->nalloc,
|
|
|
|
nalloc, sizeof(char *));
|
2003-09-22 19:04:23 +08:00
|
|
|
args->nalloc = nalloc;
|
2006-01-31 18:49:27 +08:00
|
|
|
args->list[args->num++] = cp;
|
2001-05-09 04:27:25 +08:00
|
|
|
args->list[args->num] = NULL;
|
|
|
|
}
|
2004-12-06 19:47:41 +08:00
|
|
|
|
2006-01-31 18:49:27 +08:00
|
|
|
void
|
|
|
|
replacearg(arglist *args, u_int which, char *fmt, ...)
|
|
|
|
{
|
|
|
|
va_list ap;
|
|
|
|
char *cp;
|
|
|
|
int r;
|
|
|
|
|
|
|
|
va_start(ap, fmt);
|
|
|
|
r = vasprintf(&cp, fmt, ap);
|
|
|
|
va_end(ap);
|
|
|
|
if (r == -1)
|
2022-03-20 16:51:21 +08:00
|
|
|
fatal_f("argument too long");
|
|
|
|
if (args->list == NULL || args->num >= args->nalloc)
|
|
|
|
fatal_f("arglist corrupt");
|
2006-01-31 18:49:27 +08:00
|
|
|
|
|
|
|
if (which >= args->num)
|
2022-03-20 16:51:21 +08:00
|
|
|
fatal_f("tried to replace invalid arg %d >= %d",
|
2006-01-31 18:49:27 +08:00
|
|
|
which, args->num);
|
2013-06-02 05:31:17 +08:00
|
|
|
free(args->list[which]);
|
2006-01-31 18:49:27 +08:00
|
|
|
args->list[which] = cp;
|
|
|
|
}
|
|
|
|
|
|
|
|
void
|
|
|
|
freeargs(arglist *args)
|
|
|
|
{
|
|
|
|
u_int i;
|
|
|
|
|
2022-03-20 16:51:21 +08:00
|
|
|
if (args == NULL)
|
|
|
|
return;
|
|
|
|
if (args->list != NULL && args->num < args->nalloc) {
|
2006-01-31 18:49:27 +08:00
|
|
|
for (i = 0; i < args->num; i++)
|
2013-06-02 05:31:17 +08:00
|
|
|
free(args->list[i]);
|
|
|
|
free(args->list);
|
2006-01-31 18:49:27 +08:00
|
|
|
}
|
2022-03-20 16:51:21 +08:00
|
|
|
args->nalloc = args->num = 0;
|
|
|
|
args->list = NULL;
|
2006-01-31 18:49:27 +08:00
|
|
|
}
|
|
|
|
|
2005-05-26 10:02:14 +08:00
|
|
|
/*
|
|
|
|
* Expands tildes in the file name. Returns data allocated by xmalloc.
|
|
|
|
* Warning: this calls getpw*.
|
|
|
|
*/
|
2021-08-10 07:47:44 +08:00
|
|
|
int
|
|
|
|
tilde_expand(const char *filename, uid_t uid, char **retp)
|
2005-05-26 10:02:14 +08:00
|
|
|
{
|
2022-01-08 15:32:45 +08:00
|
|
|
char *ocopy = NULL, *copy, *s = NULL;
|
|
|
|
const char *path = NULL, *user = NULL;
|
2005-05-26 10:02:14 +08:00
|
|
|
struct passwd *pw;
|
2022-01-08 15:32:45 +08:00
|
|
|
size_t len;
|
|
|
|
int ret = -1, r, slash;
|
2005-05-26 10:02:14 +08:00
|
|
|
|
2022-01-08 15:32:45 +08:00
|
|
|
*retp = NULL;
|
2021-08-10 07:47:44 +08:00
|
|
|
if (*filename != '~') {
|
|
|
|
*retp = xstrdup(filename);
|
|
|
|
return 0;
|
|
|
|
}
|
2022-01-08 15:32:45 +08:00
|
|
|
ocopy = copy = xstrdup(filename + 1);
|
2005-05-26 10:02:14 +08:00
|
|
|
|
2022-01-08 15:32:45 +08:00
|
|
|
if (*copy == '\0') /* ~ */
|
|
|
|
path = NULL;
|
|
|
|
else if (*copy == '/') {
|
|
|
|
copy += strspn(copy, "/");
|
|
|
|
if (*copy == '\0')
|
|
|
|
path = NULL; /* ~/ */
|
|
|
|
else
|
|
|
|
path = copy; /* ~/path */
|
|
|
|
} else {
|
|
|
|
user = copy;
|
|
|
|
if ((path = strchr(copy, '/')) != NULL) {
|
|
|
|
copy[path - copy] = '\0';
|
|
|
|
path++;
|
|
|
|
path += strspn(path, "/");
|
|
|
|
if (*path == '\0') /* ~user/ */
|
|
|
|
path = NULL;
|
|
|
|
/* else ~user/path */
|
2021-08-10 07:47:44 +08:00
|
|
|
}
|
2022-01-08 15:32:45 +08:00
|
|
|
/* else ~user */
|
|
|
|
}
|
|
|
|
if (user != NULL) {
|
2021-08-10 07:47:44 +08:00
|
|
|
if ((pw = getpwnam(user)) == NULL) {
|
|
|
|
error_f("No such user %s", user);
|
2022-01-08 15:32:45 +08:00
|
|
|
goto out;
|
2021-08-10 07:47:44 +08:00
|
|
|
}
|
2022-01-08 15:32:45 +08:00
|
|
|
} else if ((pw = getpwuid(uid)) == NULL) {
|
2021-08-10 07:47:44 +08:00
|
|
|
error_f("No such uid %ld", (long)uid);
|
2022-01-08 15:32:45 +08:00
|
|
|
goto out;
|
2021-08-10 07:47:44 +08:00
|
|
|
}
|
2005-05-26 10:02:14 +08:00
|
|
|
|
|
|
|
/* Make sure directory has a trailing '/' */
|
2022-01-08 15:32:45 +08:00
|
|
|
slash = (len = strlen(pw->pw_dir)) == 0 || pw->pw_dir[len - 1] != '/';
|
2005-05-26 10:02:14 +08:00
|
|
|
|
2022-01-08 15:32:45 +08:00
|
|
|
if ((r = xasprintf(&s, "%s%s%s", pw->pw_dir,
|
|
|
|
slash ? "/" : "", path != NULL ? path : "")) <= 0) {
|
|
|
|
error_f("xasprintf failed");
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
if (r >= PATH_MAX) {
|
2021-08-10 07:47:44 +08:00
|
|
|
error_f("Path too long");
|
2022-01-08 15:32:45 +08:00
|
|
|
goto out;
|
2021-08-10 07:47:44 +08:00
|
|
|
}
|
2022-01-08 15:32:45 +08:00
|
|
|
/* success */
|
|
|
|
ret = 0;
|
|
|
|
*retp = s;
|
|
|
|
s = NULL;
|
|
|
|
out:
|
|
|
|
free(s);
|
|
|
|
free(ocopy);
|
|
|
|
return ret;
|
2021-08-10 07:47:44 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
char *
|
|
|
|
tilde_expand_filename(const char *filename, uid_t uid)
|
|
|
|
{
|
|
|
|
char *ret;
|
2005-05-26 10:02:14 +08:00
|
|
|
|
2021-08-10 07:47:44 +08:00
|
|
|
if (tilde_expand(filename, uid, &ret) != 0)
|
|
|
|
cleanup_exit(255);
|
|
|
|
return ret;
|
2005-05-26 10:02:14 +08:00
|
|
|
}
|
|
|
|
|
2005-06-16 11:18:34 +08:00
|
|
|
/*
|
2020-05-29 12:25:40 +08:00
|
|
|
* Expand a string with a set of %[char] escapes and/or ${ENVIRONMENT}
|
|
|
|
* substitutions. A number of escapes may be specified as
|
|
|
|
* (char *escape_chars, char *replacement) pairs. The list must be terminated
|
|
|
|
* by a NULL escape_char. Returns replaced string in memory allocated by
|
|
|
|
* xmalloc which the caller must free.
|
2005-06-16 11:18:34 +08:00
|
|
|
*/
|
2020-05-29 12:25:40 +08:00
|
|
|
static char *
|
|
|
|
vdollar_percent_expand(int *parseerror, int dollar, int percent,
|
|
|
|
const char *string, va_list ap)
|
2005-06-16 11:18:34 +08:00
|
|
|
{
|
2023-10-12 11:36:32 +08:00
|
|
|
#define EXPAND_MAX_KEYS 64
|
2020-05-29 12:25:40 +08:00
|
|
|
u_int num_keys = 0, i;
|
2005-06-16 11:18:34 +08:00
|
|
|
struct {
|
|
|
|
const char *key;
|
|
|
|
const char *repl;
|
|
|
|
} keys[EXPAND_MAX_KEYS];
|
2019-08-16 14:13:15 +08:00
|
|
|
struct sshbuf *buf;
|
2020-05-29 12:25:40 +08:00
|
|
|
int r, missingvar = 0;
|
|
|
|
char *ret = NULL, *var, *varend, *val;
|
|
|
|
size_t len;
|
2019-08-16 14:13:15 +08:00
|
|
|
|
|
|
|
if ((buf = sshbuf_new()) == NULL)
|
2020-10-18 19:32:01 +08:00
|
|
|
fatal_f("sshbuf_new failed");
|
2020-05-29 12:25:40 +08:00
|
|
|
if (parseerror == NULL)
|
2020-10-18 19:32:01 +08:00
|
|
|
fatal_f("null parseerror arg");
|
2020-05-29 12:25:40 +08:00
|
|
|
*parseerror = 1;
|
|
|
|
|
|
|
|
/* Gather keys if we're doing percent expansion. */
|
|
|
|
if (percent) {
|
|
|
|
for (num_keys = 0; num_keys < EXPAND_MAX_KEYS; num_keys++) {
|
|
|
|
keys[num_keys].key = va_arg(ap, char *);
|
|
|
|
if (keys[num_keys].key == NULL)
|
|
|
|
break;
|
|
|
|
keys[num_keys].repl = va_arg(ap, char *);
|
2020-10-18 19:32:01 +08:00
|
|
|
if (keys[num_keys].repl == NULL) {
|
|
|
|
fatal_f("NULL replacement for token %s",
|
|
|
|
keys[num_keys].key);
|
|
|
|
}
|
2020-05-29 12:25:40 +08:00
|
|
|
}
|
|
|
|
if (num_keys == EXPAND_MAX_KEYS && va_arg(ap, char *) != NULL)
|
2020-10-18 19:32:01 +08:00
|
|
|
fatal_f("too many keys");
|
2020-05-29 12:25:40 +08:00
|
|
|
if (num_keys == 0)
|
2020-10-18 19:32:01 +08:00
|
|
|
fatal_f("percent expansion without token list");
|
2005-06-16 11:18:34 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
/* Expand string */
|
|
|
|
for (i = 0; *string != '\0'; string++) {
|
2020-05-29 12:25:40 +08:00
|
|
|
/* Optionally process ${ENVIRONMENT} expansions. */
|
|
|
|
if (dollar && string[0] == '$' && string[1] == '{') {
|
|
|
|
string += 2; /* skip over '${' */
|
|
|
|
if ((varend = strchr(string, '}')) == NULL) {
|
2020-10-18 19:32:01 +08:00
|
|
|
error_f("environment variable '%s' missing "
|
2021-04-03 14:18:40 +08:00
|
|
|
"closing '}'", string);
|
2020-05-29 12:25:40 +08:00
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
len = varend - string;
|
|
|
|
if (len == 0) {
|
2020-10-18 19:32:01 +08:00
|
|
|
error_f("zero-length environment variable");
|
2020-05-29 12:25:40 +08:00
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
var = xmalloc(len + 1);
|
|
|
|
(void)strlcpy(var, string, len + 1);
|
|
|
|
if ((val = getenv(var)) == NULL) {
|
2020-10-18 19:32:01 +08:00
|
|
|
error_f("env var ${%s} has no value", var);
|
2020-05-29 12:25:40 +08:00
|
|
|
missingvar = 1;
|
|
|
|
} else {
|
2020-10-18 19:32:01 +08:00
|
|
|
debug3_f("expand ${%s} -> '%s'", var, val);
|
2020-05-29 12:25:40 +08:00
|
|
|
if ((r = sshbuf_put(buf, val, strlen(val))) !=0)
|
2020-10-18 19:32:01 +08:00
|
|
|
fatal_fr(r, "sshbuf_put ${}");
|
2020-05-29 12:25:40 +08:00
|
|
|
}
|
|
|
|
free(var);
|
|
|
|
string += len;
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Process percent expansions if we have a list of TOKENs.
|
|
|
|
* If we're not doing percent expansion everything just gets
|
|
|
|
* appended here.
|
|
|
|
*/
|
|
|
|
if (*string != '%' || !percent) {
|
2005-06-16 11:18:34 +08:00
|
|
|
append:
|
2020-10-18 19:32:01 +08:00
|
|
|
if ((r = sshbuf_put_u8(buf, *string)) != 0)
|
|
|
|
fatal_fr(r, "sshbuf_put_u8 %%");
|
2005-06-16 11:18:34 +08:00
|
|
|
continue;
|
|
|
|
}
|
|
|
|
string++;
|
2010-01-08 15:49:16 +08:00
|
|
|
/* %% case */
|
2005-06-16 11:18:34 +08:00
|
|
|
if (*string == '%')
|
|
|
|
goto append;
|
2020-05-29 12:25:40 +08:00
|
|
|
if (*string == '\0') {
|
2020-10-18 19:32:01 +08:00
|
|
|
error_f("invalid format");
|
2020-05-29 12:25:40 +08:00
|
|
|
goto out;
|
|
|
|
}
|
2019-08-16 14:13:15 +08:00
|
|
|
for (i = 0; i < num_keys; i++) {
|
|
|
|
if (strchr(keys[i].key, *string) != NULL) {
|
|
|
|
if ((r = sshbuf_put(buf, keys[i].repl,
|
2020-10-18 19:32:01 +08:00
|
|
|
strlen(keys[i].repl))) != 0)
|
|
|
|
fatal_fr(r, "sshbuf_put %%-repl");
|
2005-06-16 11:18:34 +08:00
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
2020-05-29 12:25:40 +08:00
|
|
|
if (i >= num_keys) {
|
2020-10-18 19:32:01 +08:00
|
|
|
error_f("unknown key %%%c", *string);
|
2020-05-29 12:25:40 +08:00
|
|
|
goto out;
|
|
|
|
}
|
2005-06-16 11:18:34 +08:00
|
|
|
}
|
2020-05-29 12:25:40 +08:00
|
|
|
if (!missingvar && (ret = sshbuf_dup_string(buf)) == NULL)
|
2020-10-18 19:32:01 +08:00
|
|
|
fatal_f("sshbuf_dup_string failed");
|
2020-05-29 12:25:40 +08:00
|
|
|
*parseerror = 0;
|
|
|
|
out:
|
2019-08-16 14:13:15 +08:00
|
|
|
sshbuf_free(buf);
|
2020-05-29 12:25:40 +08:00
|
|
|
return *parseerror ? NULL : ret;
|
2005-06-16 11:18:34 +08:00
|
|
|
#undef EXPAND_MAX_KEYS
|
|
|
|
}
|
|
|
|
|
2020-05-29 19:17:56 +08:00
|
|
|
/*
|
|
|
|
* Expand only environment variables.
|
|
|
|
* Note that although this function is variadic like the other similar
|
|
|
|
* functions, any such arguments will be unused.
|
|
|
|
*/
|
|
|
|
|
2020-05-29 12:25:40 +08:00
|
|
|
char *
|
2020-05-29 19:17:56 +08:00
|
|
|
dollar_expand(int *parseerr, const char *string, ...)
|
2020-05-29 12:25:40 +08:00
|
|
|
{
|
|
|
|
char *ret;
|
|
|
|
int err;
|
2020-05-29 19:17:56 +08:00
|
|
|
va_list ap;
|
2020-05-29 12:25:40 +08:00
|
|
|
|
2020-05-29 19:17:56 +08:00
|
|
|
va_start(ap, string);
|
|
|
|
ret = vdollar_percent_expand(&err, 1, 0, string, ap);
|
|
|
|
va_end(ap);
|
2020-05-29 12:25:40 +08:00
|
|
|
if (parseerr != NULL)
|
|
|
|
*parseerr = err;
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Returns expanded string or NULL if a specified environment variable is
|
|
|
|
* not defined, or calls fatal if the string is invalid.
|
|
|
|
*/
|
|
|
|
char *
|
|
|
|
percent_expand(const char *string, ...)
|
|
|
|
{
|
|
|
|
char *ret;
|
|
|
|
int err;
|
|
|
|
va_list ap;
|
|
|
|
|
|
|
|
va_start(ap, string);
|
|
|
|
ret = vdollar_percent_expand(&err, 0, 1, string, ap);
|
|
|
|
va_end(ap);
|
|
|
|
if (err)
|
2020-10-18 19:32:01 +08:00
|
|
|
fatal_f("failed");
|
2020-05-29 12:25:40 +08:00
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Returns expanded string or NULL if a specified environment variable is
|
|
|
|
* not defined, or calls fatal if the string is invalid.
|
|
|
|
*/
|
|
|
|
char *
|
|
|
|
percent_dollar_expand(const char *string, ...)
|
|
|
|
{
|
|
|
|
char *ret;
|
|
|
|
int err;
|
|
|
|
va_list ap;
|
|
|
|
|
|
|
|
va_start(ap, string);
|
|
|
|
ret = vdollar_percent_expand(&err, 1, 1, string, ap);
|
|
|
|
va_end(ap);
|
|
|
|
if (err)
|
2020-10-18 19:32:01 +08:00
|
|
|
fatal_f("failed");
|
2020-05-29 12:25:40 +08:00
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
2005-12-13 16:29:02 +08:00
|
|
|
int
|
2017-10-23 13:08:00 +08:00
|
|
|
tun_open(int tun, int mode, char **ifname)
|
2005-12-13 16:29:02 +08:00
|
|
|
{
|
2005-12-13 17:44:13 +08:00
|
|
|
#if defined(CUSTOM_SYS_TUN_OPEN)
|
2017-10-23 13:08:00 +08:00
|
|
|
return (sys_tun_open(tun, mode, ifname));
|
2006-01-01 16:47:05 +08:00
|
|
|
#elif defined(SSH_TUN_OPENBSD)
|
2005-12-13 16:33:19 +08:00
|
|
|
struct ifreq ifr;
|
2005-12-13 16:29:02 +08:00
|
|
|
char name[100];
|
2005-12-13 16:33:19 +08:00
|
|
|
int fd = -1, sock;
|
2015-10-24 16:34:09 +08:00
|
|
|
const char *tunbase = "tun";
|
|
|
|
|
2017-10-23 13:08:00 +08:00
|
|
|
if (ifname != NULL)
|
|
|
|
*ifname = NULL;
|
|
|
|
|
2015-10-24 16:34:09 +08:00
|
|
|
if (mode == SSH_TUNMODE_ETHERNET)
|
|
|
|
tunbase = "tap";
|
2005-12-13 16:29:02 +08:00
|
|
|
|
2005-12-13 16:33:19 +08:00
|
|
|
/* Open the tunnel device */
|
|
|
|
if (tun <= SSH_TUNID_MAX) {
|
2015-10-24 16:34:09 +08:00
|
|
|
snprintf(name, sizeof(name), "/dev/%s%d", tunbase, tun);
|
2005-12-13 16:33:19 +08:00
|
|
|
fd = open(name, O_RDWR);
|
|
|
|
} else if (tun == SSH_TUNID_ANY) {
|
|
|
|
for (tun = 100; tun >= 0; tun--) {
|
2015-10-24 16:34:09 +08:00
|
|
|
snprintf(name, sizeof(name), "/dev/%s%d",
|
|
|
|
tunbase, tun);
|
2005-12-13 16:33:19 +08:00
|
|
|
if ((fd = open(name, O_RDWR)) >= 0)
|
|
|
|
break;
|
2005-12-13 16:29:02 +08:00
|
|
|
}
|
|
|
|
} else {
|
2020-10-18 19:32:01 +08:00
|
|
|
debug_f("invalid tunnel %u", tun);
|
2015-10-07 08:54:06 +08:00
|
|
|
return -1;
|
2005-12-13 16:33:19 +08:00
|
|
|
}
|
|
|
|
|
2019-06-28 21:35:04 +08:00
|
|
|
if (fd == -1) {
|
2020-10-18 19:32:01 +08:00
|
|
|
debug_f("%s open: %s", name, strerror(errno));
|
2015-10-07 08:54:06 +08:00
|
|
|
return -1;
|
2005-12-13 16:33:19 +08:00
|
|
|
}
|
|
|
|
|
2020-10-18 19:32:01 +08:00
|
|
|
debug_f("%s mode %d fd %d", name, mode, fd);
|
2005-12-13 16:33:19 +08:00
|
|
|
|
2015-10-24 16:34:09 +08:00
|
|
|
/* Bring interface up if it is not already */
|
|
|
|
snprintf(ifr.ifr_name, sizeof(ifr.ifr_name), "%s%d", tunbase, tun);
|
|
|
|
if ((sock = socket(PF_UNIX, SOCK_STREAM, 0)) == -1)
|
2005-12-13 16:33:19 +08:00
|
|
|
goto failed;
|
|
|
|
|
2015-10-07 08:54:06 +08:00
|
|
|
if (ioctl(sock, SIOCGIFFLAGS, &ifr) == -1) {
|
2020-10-18 19:32:01 +08:00
|
|
|
debug_f("get interface %s flags: %s", ifr.ifr_name,
|
|
|
|
strerror(errno));
|
2005-12-13 16:33:19 +08:00
|
|
|
goto failed;
|
2015-10-07 08:54:06 +08:00
|
|
|
}
|
2006-01-02 20:41:21 +08:00
|
|
|
|
2015-10-07 08:54:06 +08:00
|
|
|
if (!(ifr.ifr_flags & IFF_UP)) {
|
|
|
|
ifr.ifr_flags |= IFF_UP;
|
|
|
|
if (ioctl(sock, SIOCSIFFLAGS, &ifr) == -1) {
|
2020-10-18 19:32:01 +08:00
|
|
|
debug_f("activate interface %s: %s", ifr.ifr_name,
|
|
|
|
strerror(errno));
|
2015-10-07 08:54:06 +08:00
|
|
|
goto failed;
|
|
|
|
}
|
|
|
|
}
|
2005-12-13 16:33:19 +08:00
|
|
|
|
2017-10-23 13:08:00 +08:00
|
|
|
if (ifname != NULL)
|
|
|
|
*ifname = xstrdup(ifr.ifr_name);
|
|
|
|
|
2005-12-13 16:33:19 +08:00
|
|
|
close(sock);
|
2015-10-07 08:54:06 +08:00
|
|
|
return fd;
|
2005-12-13 16:33:19 +08:00
|
|
|
|
|
|
|
failed:
|
|
|
|
if (fd >= 0)
|
|
|
|
close(fd);
|
|
|
|
if (sock >= 0)
|
|
|
|
close(sock);
|
2015-10-07 08:54:06 +08:00
|
|
|
return -1;
|
2005-12-13 17:44:13 +08:00
|
|
|
#else
|
|
|
|
error("Tunnel interfaces are not supported on this platform");
|
|
|
|
return (-1);
|
|
|
|
#endif
|
2005-12-13 16:29:02 +08:00
|
|
|
}
|
|
|
|
|
2005-10-03 16:11:24 +08:00
|
|
|
void
|
|
|
|
sanitise_stdfd(void)
|
|
|
|
{
|
2006-01-06 11:50:44 +08:00
|
|
|
int nullfd, dupfd;
|
2005-10-03 16:11:24 +08:00
|
|
|
|
2006-01-06 11:50:44 +08:00
|
|
|
if ((nullfd = dupfd = open(_PATH_DEVNULL, O_RDWR)) == -1) {
|
2009-02-22 05:47:02 +08:00
|
|
|
fprintf(stderr, "Couldn't open /dev/null: %s\n",
|
|
|
|
strerror(errno));
|
2005-10-03 16:11:24 +08:00
|
|
|
exit(1);
|
|
|
|
}
|
2016-04-02 22:37:42 +08:00
|
|
|
while (++dupfd <= STDERR_FILENO) {
|
|
|
|
/* Only populate closed fds. */
|
|
|
|
if (fcntl(dupfd, F_GETFL) == -1 && errno == EBADF) {
|
|
|
|
if (dup2(nullfd, dupfd) == -1) {
|
|
|
|
fprintf(stderr, "dup2: %s\n", strerror(errno));
|
|
|
|
exit(1);
|
|
|
|
}
|
2005-10-03 16:11:24 +08:00
|
|
|
}
|
|
|
|
}
|
2016-04-02 22:37:42 +08:00
|
|
|
if (nullfd > STDERR_FILENO)
|
2005-10-03 16:11:24 +08:00
|
|
|
close(nullfd);
|
|
|
|
}
|
|
|
|
|
2005-07-06 07:44:19 +08:00
|
|
|
char *
|
2006-03-31 20:13:02 +08:00
|
|
|
tohex(const void *vp, size_t l)
|
2005-07-06 07:44:19 +08:00
|
|
|
{
|
2006-03-31 20:13:02 +08:00
|
|
|
const u_char *p = (const u_char *)vp;
|
2005-07-06 07:44:19 +08:00
|
|
|
char b[3], *r;
|
2006-03-31 20:13:02 +08:00
|
|
|
size_t i, hl;
|
|
|
|
|
|
|
|
if (l > 65536)
|
|
|
|
return xstrdup("tohex: length > 65536");
|
2005-07-06 07:44:19 +08:00
|
|
|
|
|
|
|
hl = l * 2 + 1;
|
2006-03-26 11:19:21 +08:00
|
|
|
r = xcalloc(1, hl);
|
2005-07-06 07:44:19 +08:00
|
|
|
for (i = 0; i < l; i++) {
|
2006-03-31 20:13:02 +08:00
|
|
|
snprintf(b, sizeof(b), "%02x", p[i]);
|
2005-07-06 07:44:19 +08:00
|
|
|
strlcat(r, b, hl);
|
|
|
|
}
|
|
|
|
return (r);
|
|
|
|
}
|
|
|
|
|
2020-01-25 07:54:40 +08:00
|
|
|
/*
|
|
|
|
* Extend string *sp by the specified format. If *sp is not NULL (or empty),
|
|
|
|
* then the separator 'sep' will be prepended before the formatted arguments.
|
|
|
|
* Extended strings are heap allocated.
|
|
|
|
*/
|
|
|
|
void
|
|
|
|
xextendf(char **sp, const char *sep, const char *fmt, ...)
|
|
|
|
{
|
|
|
|
va_list ap;
|
|
|
|
char *tmp1, *tmp2;
|
|
|
|
|
|
|
|
va_start(ap, fmt);
|
|
|
|
xvasprintf(&tmp1, fmt, ap);
|
|
|
|
va_end(ap);
|
|
|
|
|
|
|
|
if (*sp == NULL || **sp == '\0') {
|
|
|
|
free(*sp);
|
|
|
|
*sp = tmp1;
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
xasprintf(&tmp2, "%s%s%s", *sp, sep == NULL ? "" : sep, tmp1);
|
|
|
|
free(tmp1);
|
|
|
|
free(*sp);
|
|
|
|
*sp = tmp2;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2006-03-31 20:13:02 +08:00
|
|
|
u_int64_t
|
|
|
|
get_u64(const void *vp)
|
|
|
|
{
|
|
|
|
const u_char *p = (const u_char *)vp;
|
|
|
|
u_int64_t v;
|
|
|
|
|
|
|
|
v = (u_int64_t)p[0] << 56;
|
|
|
|
v |= (u_int64_t)p[1] << 48;
|
|
|
|
v |= (u_int64_t)p[2] << 40;
|
|
|
|
v |= (u_int64_t)p[3] << 32;
|
|
|
|
v |= (u_int64_t)p[4] << 24;
|
|
|
|
v |= (u_int64_t)p[5] << 16;
|
|
|
|
v |= (u_int64_t)p[6] << 8;
|
|
|
|
v |= (u_int64_t)p[7];
|
|
|
|
|
|
|
|
return (v);
|
|
|
|
}
|
|
|
|
|
|
|
|
u_int32_t
|
|
|
|
get_u32(const void *vp)
|
|
|
|
{
|
|
|
|
const u_char *p = (const u_char *)vp;
|
|
|
|
u_int32_t v;
|
|
|
|
|
|
|
|
v = (u_int32_t)p[0] << 24;
|
|
|
|
v |= (u_int32_t)p[1] << 16;
|
|
|
|
v |= (u_int32_t)p[2] << 8;
|
|
|
|
v |= (u_int32_t)p[3];
|
|
|
|
|
|
|
|
return (v);
|
|
|
|
}
|
|
|
|
|
2014-04-20 11:33:19 +08:00
|
|
|
u_int32_t
|
|
|
|
get_u32_le(const void *vp)
|
|
|
|
{
|
|
|
|
const u_char *p = (const u_char *)vp;
|
|
|
|
u_int32_t v;
|
|
|
|
|
|
|
|
v = (u_int32_t)p[0];
|
|
|
|
v |= (u_int32_t)p[1] << 8;
|
|
|
|
v |= (u_int32_t)p[2] << 16;
|
|
|
|
v |= (u_int32_t)p[3] << 24;
|
|
|
|
|
|
|
|
return (v);
|
|
|
|
}
|
|
|
|
|
2006-03-31 20:13:02 +08:00
|
|
|
u_int16_t
|
|
|
|
get_u16(const void *vp)
|
|
|
|
{
|
|
|
|
const u_char *p = (const u_char *)vp;
|
|
|
|
u_int16_t v;
|
|
|
|
|
|
|
|
v = (u_int16_t)p[0] << 8;
|
|
|
|
v |= (u_int16_t)p[1];
|
|
|
|
|
|
|
|
return (v);
|
|
|
|
}
|
|
|
|
|
|
|
|
void
|
|
|
|
put_u64(void *vp, u_int64_t v)
|
|
|
|
{
|
|
|
|
u_char *p = (u_char *)vp;
|
|
|
|
|
|
|
|
p[0] = (u_char)(v >> 56) & 0xff;
|
|
|
|
p[1] = (u_char)(v >> 48) & 0xff;
|
|
|
|
p[2] = (u_char)(v >> 40) & 0xff;
|
|
|
|
p[3] = (u_char)(v >> 32) & 0xff;
|
|
|
|
p[4] = (u_char)(v >> 24) & 0xff;
|
|
|
|
p[5] = (u_char)(v >> 16) & 0xff;
|
|
|
|
p[6] = (u_char)(v >> 8) & 0xff;
|
|
|
|
p[7] = (u_char)v & 0xff;
|
|
|
|
}
|
|
|
|
|
|
|
|
void
|
|
|
|
put_u32(void *vp, u_int32_t v)
|
|
|
|
{
|
|
|
|
u_char *p = (u_char *)vp;
|
|
|
|
|
|
|
|
p[0] = (u_char)(v >> 24) & 0xff;
|
|
|
|
p[1] = (u_char)(v >> 16) & 0xff;
|
|
|
|
p[2] = (u_char)(v >> 8) & 0xff;
|
|
|
|
p[3] = (u_char)v & 0xff;
|
|
|
|
}
|
|
|
|
|
2014-04-20 11:33:19 +08:00
|
|
|
void
|
|
|
|
put_u32_le(void *vp, u_int32_t v)
|
|
|
|
{
|
|
|
|
u_char *p = (u_char *)vp;
|
|
|
|
|
|
|
|
p[0] = (u_char)v & 0xff;
|
|
|
|
p[1] = (u_char)(v >> 8) & 0xff;
|
|
|
|
p[2] = (u_char)(v >> 16) & 0xff;
|
|
|
|
p[3] = (u_char)(v >> 24) & 0xff;
|
|
|
|
}
|
2006-03-31 20:13:02 +08:00
|
|
|
|
|
|
|
void
|
|
|
|
put_u16(void *vp, u_int16_t v)
|
|
|
|
{
|
|
|
|
u_char *p = (u_char *)vp;
|
|
|
|
|
|
|
|
p[0] = (u_char)(v >> 8) & 0xff;
|
|
|
|
p[1] = (u_char)v & 0xff;
|
|
|
|
}
|
2008-06-13 04:42:45 +08:00
|
|
|
|
|
|
|
void
|
|
|
|
ms_subtract_diff(struct timeval *start, int *ms)
|
|
|
|
{
|
|
|
|
struct timeval diff, finish;
|
|
|
|
|
2017-11-25 14:46:22 +08:00
|
|
|
monotime_tv(&finish);
|
|
|
|
timersub(&finish, start, &diff);
|
2008-06-13 04:42:45 +08:00
|
|
|
*ms -= (diff.tv_sec * 1000) + (diff.tv_usec / 1000);
|
|
|
|
}
|
|
|
|
|
|
|
|
void
|
2021-11-14 05:14:13 +08:00
|
|
|
ms_to_timespec(struct timespec *ts, int ms)
|
2008-06-13 04:42:45 +08:00
|
|
|
{
|
|
|
|
if (ms < 0)
|
|
|
|
ms = 0;
|
2021-11-14 05:14:13 +08:00
|
|
|
ts->tv_sec = ms / 1000;
|
|
|
|
ts->tv_nsec = (ms % 1000) * 1000 * 1000;
|
2008-06-13 04:42:45 +08:00
|
|
|
}
|
|
|
|
|
2017-11-25 14:46:22 +08:00
|
|
|
void
|
|
|
|
monotime_ts(struct timespec *ts)
|
2013-06-02 05:46:16 +08:00
|
|
|
{
|
2017-11-25 14:46:22 +08:00
|
|
|
struct timeval tv;
|
|
|
|
#if defined(HAVE_CLOCK_GETTIME) && (defined(CLOCK_BOOTTIME) || \
|
|
|
|
defined(CLOCK_MONOTONIC) || defined(CLOCK_REALTIME))
|
2013-08-08 09:52:37 +08:00
|
|
|
static int gettime_failed = 0;
|
2013-06-02 05:46:16 +08:00
|
|
|
|
2013-08-08 09:52:37 +08:00
|
|
|
if (!gettime_failed) {
|
2017-11-25 14:46:22 +08:00
|
|
|
# ifdef CLOCK_BOOTTIME
|
|
|
|
if (clock_gettime(CLOCK_BOOTTIME, ts) == 0)
|
|
|
|
return;
|
|
|
|
# endif /* CLOCK_BOOTTIME */
|
|
|
|
# ifdef CLOCK_MONOTONIC
|
|
|
|
if (clock_gettime(CLOCK_MONOTONIC, ts) == 0)
|
|
|
|
return;
|
|
|
|
# endif /* CLOCK_MONOTONIC */
|
|
|
|
# ifdef CLOCK_REALTIME
|
|
|
|
/* Not monotonic, but we're almost out of options here. */
|
|
|
|
if (clock_gettime(CLOCK_REALTIME, ts) == 0)
|
|
|
|
return;
|
|
|
|
# endif /* CLOCK_REALTIME */
|
2013-08-08 09:52:37 +08:00
|
|
|
debug3("clock_gettime: %s", strerror(errno));
|
|
|
|
gettime_failed = 1;
|
|
|
|
}
|
2017-11-25 14:46:22 +08:00
|
|
|
#endif /* HAVE_CLOCK_GETTIME && (BOOTTIME || MONOTONIC || REALTIME) */
|
|
|
|
gettimeofday(&tv, NULL);
|
|
|
|
ts->tv_sec = tv.tv_sec;
|
|
|
|
ts->tv_nsec = (long)tv.tv_usec * 1000;
|
|
|
|
}
|
2013-06-02 05:46:16 +08:00
|
|
|
|
2017-11-25 14:46:22 +08:00
|
|
|
void
|
|
|
|
monotime_tv(struct timeval *tv)
|
|
|
|
{
|
|
|
|
struct timespec ts;
|
|
|
|
|
|
|
|
monotime_ts(&ts);
|
|
|
|
tv->tv_sec = ts.tv_sec;
|
|
|
|
tv->tv_usec = ts.tv_nsec / 1000;
|
|
|
|
}
|
|
|
|
|
|
|
|
time_t
|
|
|
|
monotime(void)
|
|
|
|
{
|
|
|
|
struct timespec ts;
|
|
|
|
|
|
|
|
monotime_ts(&ts);
|
|
|
|
return ts.tv_sec;
|
2013-06-02 05:46:16 +08:00
|
|
|
}
|
|
|
|
|
2016-03-03 06:42:40 +08:00
|
|
|
double
|
|
|
|
monotime_double(void)
|
|
|
|
{
|
|
|
|
struct timespec ts;
|
|
|
|
|
2017-11-25 14:46:22 +08:00
|
|
|
monotime_ts(&ts);
|
|
|
|
return ts.tv_sec + ((double)ts.tv_nsec / 1000000000);
|
2016-03-03 06:42:40 +08:00
|
|
|
}
|
|
|
|
|
2010-09-24 20:15:11 +08:00
|
|
|
void
|
|
|
|
bandwidth_limit_init(struct bwlimit *bw, u_int64_t kbps, size_t buflen)
|
|
|
|
{
|
|
|
|
bw->buflen = buflen;
|
|
|
|
bw->rate = kbps;
|
2018-12-07 12:36:09 +08:00
|
|
|
bw->thresh = buflen;
|
2010-09-24 20:15:11 +08:00
|
|
|
bw->lamt = 0;
|
|
|
|
timerclear(&bw->bwstart);
|
|
|
|
timerclear(&bw->bwend);
|
2018-12-07 12:36:09 +08:00
|
|
|
}
|
2010-09-24 20:15:11 +08:00
|
|
|
|
|
|
|
/* Callback from read/write loop to insert bandwidth-limiting delays */
|
|
|
|
void
|
|
|
|
bandwidth_limit(struct bwlimit *bw, size_t read_len)
|
|
|
|
{
|
|
|
|
u_int64_t waitlen;
|
|
|
|
struct timespec ts, rm;
|
|
|
|
|
2018-12-07 12:36:09 +08:00
|
|
|
bw->lamt += read_len;
|
2010-09-24 20:15:11 +08:00
|
|
|
if (!timerisset(&bw->bwstart)) {
|
2017-11-25 14:46:22 +08:00
|
|
|
monotime_tv(&bw->bwstart);
|
2010-09-24 20:15:11 +08:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
if (bw->lamt < bw->thresh)
|
|
|
|
return;
|
|
|
|
|
2017-11-25 14:46:22 +08:00
|
|
|
monotime_tv(&bw->bwend);
|
2010-09-24 20:15:11 +08:00
|
|
|
timersub(&bw->bwend, &bw->bwstart, &bw->bwend);
|
|
|
|
if (!timerisset(&bw->bwend))
|
|
|
|
return;
|
|
|
|
|
|
|
|
bw->lamt *= 8;
|
|
|
|
waitlen = (double)1000000L * bw->lamt / bw->rate;
|
|
|
|
|
|
|
|
bw->bwstart.tv_sec = waitlen / 1000000L;
|
|
|
|
bw->bwstart.tv_usec = waitlen % 1000000L;
|
|
|
|
|
|
|
|
if (timercmp(&bw->bwstart, &bw->bwend, >)) {
|
|
|
|
timersub(&bw->bwstart, &bw->bwend, &bw->bwend);
|
|
|
|
|
|
|
|
/* Adjust the wait time */
|
|
|
|
if (bw->bwend.tv_sec) {
|
|
|
|
bw->thresh /= 2;
|
|
|
|
if (bw->thresh < bw->buflen / 4)
|
|
|
|
bw->thresh = bw->buflen / 4;
|
|
|
|
} else if (bw->bwend.tv_usec < 10000) {
|
|
|
|
bw->thresh *= 2;
|
|
|
|
if (bw->thresh > bw->buflen * 8)
|
|
|
|
bw->thresh = bw->buflen * 8;
|
|
|
|
}
|
|
|
|
|
|
|
|
TIMEVAL_TO_TIMESPEC(&bw->bwend, &ts);
|
|
|
|
while (nanosleep(&ts, &rm) == -1) {
|
|
|
|
if (errno != EINTR)
|
|
|
|
break;
|
|
|
|
ts = rm;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
bw->lamt = 0;
|
2017-11-25 14:46:22 +08:00
|
|
|
monotime_tv(&bw->bwstart);
|
2010-09-24 20:15:11 +08:00
|
|
|
}
|
2010-11-20 12:19:38 +08:00
|
|
|
|
2010-12-01 08:50:35 +08:00
|
|
|
/* Make a template filename for mk[sd]temp() */
|
|
|
|
void
|
|
|
|
mktemp_proto(char *s, size_t len)
|
|
|
|
{
|
|
|
|
const char *tmpdir;
|
|
|
|
int r;
|
|
|
|
|
|
|
|
if ((tmpdir = getenv("TMPDIR")) != NULL) {
|
|
|
|
r = snprintf(s, len, "%s/ssh-XXXXXXXXXXXX", tmpdir);
|
|
|
|
if (r > 0 && (size_t)r < len)
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
r = snprintf(s, len, "/tmp/ssh-XXXXXXXXXXXX");
|
|
|
|
if (r < 0 || (size_t)r >= len)
|
2020-10-18 19:32:01 +08:00
|
|
|
fatal_f("template string too short");
|
2010-12-01 08:50:35 +08:00
|
|
|
}
|
|
|
|
|
2010-11-20 12:19:38 +08:00
|
|
|
static const struct {
|
|
|
|
const char *name;
|
|
|
|
int value;
|
|
|
|
} ipqos[] = {
|
2017-07-24 07:37:02 +08:00
|
|
|
{ "none", INT_MAX }, /* can't use 0 here; that's CS0 */
|
2010-11-20 12:19:38 +08:00
|
|
|
{ "af11", IPTOS_DSCP_AF11 },
|
|
|
|
{ "af12", IPTOS_DSCP_AF12 },
|
|
|
|
{ "af13", IPTOS_DSCP_AF13 },
|
2011-09-22 19:34:35 +08:00
|
|
|
{ "af21", IPTOS_DSCP_AF21 },
|
2010-11-20 12:19:38 +08:00
|
|
|
{ "af22", IPTOS_DSCP_AF22 },
|
|
|
|
{ "af23", IPTOS_DSCP_AF23 },
|
|
|
|
{ "af31", IPTOS_DSCP_AF31 },
|
|
|
|
{ "af32", IPTOS_DSCP_AF32 },
|
|
|
|
{ "af33", IPTOS_DSCP_AF33 },
|
|
|
|
{ "af41", IPTOS_DSCP_AF41 },
|
|
|
|
{ "af42", IPTOS_DSCP_AF42 },
|
|
|
|
{ "af43", IPTOS_DSCP_AF43 },
|
|
|
|
{ "cs0", IPTOS_DSCP_CS0 },
|
|
|
|
{ "cs1", IPTOS_DSCP_CS1 },
|
|
|
|
{ "cs2", IPTOS_DSCP_CS2 },
|
|
|
|
{ "cs3", IPTOS_DSCP_CS3 },
|
|
|
|
{ "cs4", IPTOS_DSCP_CS4 },
|
|
|
|
{ "cs5", IPTOS_DSCP_CS5 },
|
|
|
|
{ "cs6", IPTOS_DSCP_CS6 },
|
|
|
|
{ "cs7", IPTOS_DSCP_CS7 },
|
|
|
|
{ "ef", IPTOS_DSCP_EF },
|
2020-01-28 09:49:36 +08:00
|
|
|
{ "le", IPTOS_DSCP_LE },
|
2010-11-20 12:19:38 +08:00
|
|
|
{ "lowdelay", IPTOS_LOWDELAY },
|
|
|
|
{ "throughput", IPTOS_THROUGHPUT },
|
|
|
|
{ "reliability", IPTOS_RELIABILITY },
|
|
|
|
{ NULL, -1 }
|
|
|
|
};
|
|
|
|
|
|
|
|
int
|
|
|
|
parse_ipqos(const char *cp)
|
|
|
|
{
|
2024-04-02 18:02:08 +08:00
|
|
|
const char *errstr;
|
2010-11-20 12:19:38 +08:00
|
|
|
u_int i;
|
2024-04-02 18:02:08 +08:00
|
|
|
int val;
|
2010-11-20 12:19:38 +08:00
|
|
|
|
|
|
|
if (cp == NULL)
|
|
|
|
return -1;
|
|
|
|
for (i = 0; ipqos[i].name != NULL; i++) {
|
|
|
|
if (strcasecmp(cp, ipqos[i].name) == 0)
|
|
|
|
return ipqos[i].value;
|
|
|
|
}
|
|
|
|
/* Try parsing as an integer */
|
2024-04-02 18:02:08 +08:00
|
|
|
val = (int)strtonum(cp, 0, 255, &errstr);
|
|
|
|
if (errstr)
|
2010-11-20 12:19:38 +08:00
|
|
|
return -1;
|
|
|
|
return val;
|
|
|
|
}
|
|
|
|
|
2011-05-05 12:14:34 +08:00
|
|
|
const char *
|
|
|
|
iptos2str(int iptos)
|
|
|
|
{
|
|
|
|
int i;
|
|
|
|
static char iptos_str[sizeof "0xff"];
|
|
|
|
|
|
|
|
for (i = 0; ipqos[i].name != NULL; i++) {
|
|
|
|
if (ipqos[i].value == iptos)
|
|
|
|
return ipqos[i].name;
|
|
|
|
}
|
|
|
|
snprintf(iptos_str, sizeof iptos_str, "0x%02x", iptos);
|
|
|
|
return iptos_str;
|
|
|
|
}
|
2013-10-15 09:14:12 +08:00
|
|
|
|
|
|
|
void
|
|
|
|
lowercase(char *s)
|
|
|
|
{
|
|
|
|
for (; *s; s++)
|
|
|
|
*s = tolower((u_char)*s);
|
|
|
|
}
|
2014-07-18 12:11:24 +08:00
|
|
|
|
|
|
|
int
|
|
|
|
unix_listener(const char *path, int backlog, int unlink_first)
|
|
|
|
{
|
|
|
|
struct sockaddr_un sunaddr;
|
|
|
|
int saved_errno, sock;
|
|
|
|
|
|
|
|
memset(&sunaddr, 0, sizeof(sunaddr));
|
|
|
|
sunaddr.sun_family = AF_UNIX;
|
2017-12-08 10:13:02 +08:00
|
|
|
if (strlcpy(sunaddr.sun_path, path,
|
|
|
|
sizeof(sunaddr.sun_path)) >= sizeof(sunaddr.sun_path)) {
|
2020-10-18 19:32:01 +08:00
|
|
|
error_f("path \"%s\" too long for Unix domain socket", path);
|
2014-07-18 12:11:24 +08:00
|
|
|
errno = ENAMETOOLONG;
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
sock = socket(PF_UNIX, SOCK_STREAM, 0);
|
2019-06-28 21:35:04 +08:00
|
|
|
if (sock == -1) {
|
2014-07-18 12:11:24 +08:00
|
|
|
saved_errno = errno;
|
2020-10-18 19:32:01 +08:00
|
|
|
error_f("socket: %.100s", strerror(errno));
|
2014-07-18 12:11:24 +08:00
|
|
|
errno = saved_errno;
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
if (unlink_first == 1) {
|
|
|
|
if (unlink(path) != 0 && errno != ENOENT)
|
|
|
|
error("unlink(%s): %.100s", path, strerror(errno));
|
|
|
|
}
|
2019-06-28 21:35:04 +08:00
|
|
|
if (bind(sock, (struct sockaddr *)&sunaddr, sizeof(sunaddr)) == -1) {
|
2014-07-18 12:11:24 +08:00
|
|
|
saved_errno = errno;
|
2020-10-18 19:32:01 +08:00
|
|
|
error_f("cannot bind to path %s: %s", path, strerror(errno));
|
2017-12-08 10:14:33 +08:00
|
|
|
close(sock);
|
2014-07-18 12:11:24 +08:00
|
|
|
errno = saved_errno;
|
|
|
|
return -1;
|
|
|
|
}
|
2019-06-28 21:35:04 +08:00
|
|
|
if (listen(sock, backlog) == -1) {
|
2014-07-18 12:11:24 +08:00
|
|
|
saved_errno = errno;
|
2020-10-18 19:32:01 +08:00
|
|
|
error_f("cannot listen on path %s: %s", path, strerror(errno));
|
2017-12-08 10:14:33 +08:00
|
|
|
close(sock);
|
|
|
|
unlink(path);
|
2014-07-18 12:11:24 +08:00
|
|
|
errno = saved_errno;
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
return sock;
|
|
|
|
}
|
2014-08-30 01:29:19 +08:00
|
|
|
|
2009-11-18 14:48:30 +08:00
|
|
|
void
|
|
|
|
sock_set_v6only(int s)
|
|
|
|
{
|
2015-12-09 06:18:45 +08:00
|
|
|
#if defined(IPV6_V6ONLY) && !defined(__OpenBSD__)
|
2009-11-18 14:48:30 +08:00
|
|
|
int on = 1;
|
|
|
|
|
|
|
|
debug3("%s: set socket %d IPV6_V6ONLY", __func__, s);
|
|
|
|
if (setsockopt(s, IPPROTO_IPV6, IPV6_V6ONLY, &on, sizeof(on)) == -1)
|
|
|
|
error("setsockopt IPV6_V6ONLY: %s", strerror(errno));
|
|
|
|
#endif
|
|
|
|
}
|
2016-04-06 14:42:17 +08:00
|
|
|
|
|
|
|
/*
|
|
|
|
* Compares two strings that maybe be NULL. Returns non-zero if strings
|
|
|
|
* are both NULL or are identical, returns zero otherwise.
|
|
|
|
*/
|
|
|
|
static int
|
|
|
|
strcmp_maybe_null(const char *a, const char *b)
|
|
|
|
{
|
|
|
|
if ((a == NULL && b != NULL) || (a != NULL && b == NULL))
|
|
|
|
return 0;
|
|
|
|
if (a != NULL && strcmp(a, b) != 0)
|
|
|
|
return 0;
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Compare two forwards, returning non-zero if they are identical or
|
|
|
|
* zero otherwise.
|
|
|
|
*/
|
|
|
|
int
|
|
|
|
forward_equals(const struct Forward *a, const struct Forward *b)
|
|
|
|
{
|
|
|
|
if (strcmp_maybe_null(a->listen_host, b->listen_host) == 0)
|
|
|
|
return 0;
|
|
|
|
if (a->listen_port != b->listen_port)
|
|
|
|
return 0;
|
|
|
|
if (strcmp_maybe_null(a->listen_path, b->listen_path) == 0)
|
|
|
|
return 0;
|
|
|
|
if (strcmp_maybe_null(a->connect_host, b->connect_host) == 0)
|
|
|
|
return 0;
|
|
|
|
if (a->connect_port != b->connect_port)
|
|
|
|
return 0;
|
|
|
|
if (strcmp_maybe_null(a->connect_path, b->connect_path) == 0)
|
|
|
|
return 0;
|
|
|
|
/* allocated_port and handle are not checked */
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
2024-05-17 08:30:23 +08:00
|
|
|
/* returns port number, FWD_PERMIT_ANY_PORT or -1 on error */
|
|
|
|
int
|
|
|
|
permitopen_port(const char *p)
|
|
|
|
{
|
|
|
|
int port;
|
|
|
|
|
|
|
|
if (strcmp(p, "*") == 0)
|
|
|
|
return FWD_PERMIT_ANY_PORT;
|
|
|
|
if ((port = a2port(p)) > 0)
|
|
|
|
return port;
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
2016-11-30 08:28:31 +08:00
|
|
|
/* returns 1 if process is already daemonized, 0 otherwise */
|
|
|
|
int
|
|
|
|
daemonized(void)
|
|
|
|
{
|
|
|
|
int fd;
|
|
|
|
|
|
|
|
if ((fd = open(_PATH_TTY, O_RDONLY | O_NOCTTY)) >= 0) {
|
|
|
|
close(fd);
|
|
|
|
return 0; /* have controlling terminal */
|
|
|
|
}
|
|
|
|
if (getppid() != 1)
|
|
|
|
return 0; /* parent is not init */
|
|
|
|
if (getsid(0) != getpid())
|
|
|
|
return 0; /* not session leader */
|
|
|
|
debug3("already daemonized");
|
|
|
|
return 1;
|
|
|
|
}
|
2017-08-18 13:36:45 +08:00
|
|
|
|
|
|
|
/*
|
|
|
|
* Splits 's' into an argument vector. Handles quoted string and basic
|
|
|
|
* escape characters (\\, \", \'). Caller must free the argument vector
|
|
|
|
* and its members.
|
|
|
|
*/
|
|
|
|
int
|
2021-06-08 14:54:40 +08:00
|
|
|
argv_split(const char *s, int *argcp, char ***argvp, int terminate_on_comment)
|
2017-08-18 13:36:45 +08:00
|
|
|
{
|
|
|
|
int r = SSH_ERR_INTERNAL_ERROR;
|
|
|
|
int argc = 0, quote, i, j;
|
|
|
|
char *arg, **argv = xcalloc(1, sizeof(*argv));
|
|
|
|
|
|
|
|
*argvp = NULL;
|
|
|
|
*argcp = 0;
|
|
|
|
|
|
|
|
for (i = 0; s[i] != '\0'; i++) {
|
|
|
|
/* Skip leading whitespace */
|
|
|
|
if (s[i] == ' ' || s[i] == '\t')
|
|
|
|
continue;
|
2021-06-08 14:54:40 +08:00
|
|
|
if (terminate_on_comment && s[i] == '#')
|
|
|
|
break;
|
2017-08-18 13:36:45 +08:00
|
|
|
/* Start of a token */
|
|
|
|
quote = 0;
|
|
|
|
|
|
|
|
argv = xreallocarray(argv, (argc + 2), sizeof(*argv));
|
|
|
|
arg = argv[argc++] = xcalloc(1, strlen(s + i) + 1);
|
|
|
|
argv[argc] = NULL;
|
|
|
|
|
|
|
|
/* Copy the token in, removing escapes */
|
|
|
|
for (j = 0; s[i] != '\0'; i++) {
|
|
|
|
if (s[i] == '\\') {
|
|
|
|
if (s[i + 1] == '\'' ||
|
|
|
|
s[i + 1] == '\"' ||
|
2021-06-08 14:54:40 +08:00
|
|
|
s[i + 1] == '\\' ||
|
|
|
|
(quote == 0 && s[i + 1] == ' ')) {
|
2017-08-18 13:36:45 +08:00
|
|
|
i++; /* Skip '\' */
|
|
|
|
arg[j++] = s[i];
|
|
|
|
} else {
|
|
|
|
/* Unrecognised escape */
|
|
|
|
arg[j++] = s[i];
|
|
|
|
}
|
|
|
|
} else if (quote == 0 && (s[i] == ' ' || s[i] == '\t'))
|
|
|
|
break; /* done */
|
2021-04-03 13:21:46 +08:00
|
|
|
else if (quote == 0 && (s[i] == '\"' || s[i] == '\''))
|
|
|
|
quote = s[i]; /* quote start */
|
2017-08-18 13:36:45 +08:00
|
|
|
else if (quote != 0 && s[i] == quote)
|
2021-04-03 13:21:46 +08:00
|
|
|
quote = 0; /* quote end */
|
2017-08-18 13:36:45 +08:00
|
|
|
else
|
|
|
|
arg[j++] = s[i];
|
|
|
|
}
|
|
|
|
if (s[i] == '\0') {
|
|
|
|
if (quote != 0) {
|
|
|
|
/* Ran out of string looking for close quote */
|
|
|
|
r = SSH_ERR_INVALID_FORMAT;
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
/* Success */
|
|
|
|
*argcp = argc;
|
|
|
|
*argvp = argv;
|
|
|
|
argc = 0;
|
|
|
|
argv = NULL;
|
|
|
|
r = 0;
|
|
|
|
out:
|
|
|
|
if (argc != 0 && argv != NULL) {
|
|
|
|
for (i = 0; i < argc; i++)
|
|
|
|
free(argv[i]);
|
|
|
|
free(argv);
|
|
|
|
}
|
|
|
|
return r;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Reassemble an argument vector into a string, quoting and escaping as
|
|
|
|
* necessary. Caller must free returned string.
|
|
|
|
*/
|
|
|
|
char *
|
|
|
|
argv_assemble(int argc, char **argv)
|
|
|
|
{
|
|
|
|
int i, j, ws, r;
|
|
|
|
char c, *ret;
|
|
|
|
struct sshbuf *buf, *arg;
|
|
|
|
|
|
|
|
if ((buf = sshbuf_new()) == NULL || (arg = sshbuf_new()) == NULL)
|
2020-10-18 19:32:01 +08:00
|
|
|
fatal_f("sshbuf_new failed");
|
2017-08-18 13:36:45 +08:00
|
|
|
|
|
|
|
for (i = 0; i < argc; i++) {
|
|
|
|
ws = 0;
|
|
|
|
sshbuf_reset(arg);
|
|
|
|
for (j = 0; argv[i][j] != '\0'; j++) {
|
|
|
|
r = 0;
|
|
|
|
c = argv[i][j];
|
|
|
|
switch (c) {
|
|
|
|
case ' ':
|
|
|
|
case '\t':
|
|
|
|
ws = 1;
|
|
|
|
r = sshbuf_put_u8(arg, c);
|
|
|
|
break;
|
|
|
|
case '\\':
|
|
|
|
case '\'':
|
|
|
|
case '"':
|
|
|
|
if ((r = sshbuf_put_u8(arg, '\\')) != 0)
|
|
|
|
break;
|
|
|
|
/* FALLTHROUGH */
|
|
|
|
default:
|
|
|
|
r = sshbuf_put_u8(arg, c);
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
if (r != 0)
|
2020-10-18 19:32:01 +08:00
|
|
|
fatal_fr(r, "sshbuf_put_u8");
|
2017-08-18 13:36:45 +08:00
|
|
|
}
|
|
|
|
if ((i != 0 && (r = sshbuf_put_u8(buf, ' ')) != 0) ||
|
|
|
|
(ws != 0 && (r = sshbuf_put_u8(buf, '"')) != 0) ||
|
|
|
|
(r = sshbuf_putb(buf, arg)) != 0 ||
|
|
|
|
(ws != 0 && (r = sshbuf_put_u8(buf, '"')) != 0))
|
2020-10-18 19:32:01 +08:00
|
|
|
fatal_fr(r, "assemble");
|
2017-08-18 13:36:45 +08:00
|
|
|
}
|
|
|
|
if ((ret = malloc(sshbuf_len(buf) + 1)) == NULL)
|
2020-10-18 19:32:01 +08:00
|
|
|
fatal_f("malloc failed");
|
2017-08-18 13:36:45 +08:00
|
|
|
memcpy(ret, sshbuf_ptr(buf), sshbuf_len(buf));
|
|
|
|
ret[sshbuf_len(buf)] = '\0';
|
|
|
|
sshbuf_free(buf);
|
|
|
|
sshbuf_free(arg);
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
2021-06-08 14:54:40 +08:00
|
|
|
char *
|
|
|
|
argv_next(int *argcp, char ***argvp)
|
|
|
|
{
|
|
|
|
char *ret = (*argvp)[0];
|
|
|
|
|
|
|
|
if (*argcp > 0 && ret != NULL) {
|
|
|
|
(*argcp)--;
|
|
|
|
(*argvp)++;
|
|
|
|
}
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
void
|
|
|
|
argv_consume(int *argcp)
|
|
|
|
{
|
|
|
|
*argcp = 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
void
|
|
|
|
argv_free(char **av, int ac)
|
|
|
|
{
|
|
|
|
int i;
|
|
|
|
|
|
|
|
if (av == NULL)
|
|
|
|
return;
|
|
|
|
for (i = 0; i < ac; i++)
|
|
|
|
free(av[i]);
|
|
|
|
free(av);
|
|
|
|
}
|
|
|
|
|
2017-08-18 13:36:45 +08:00
|
|
|
/* Returns 0 if pid exited cleanly, non-zero otherwise */
|
|
|
|
int
|
2017-08-18 13:48:04 +08:00
|
|
|
exited_cleanly(pid_t pid, const char *tag, const char *cmd, int quiet)
|
2017-08-18 13:36:45 +08:00
|
|
|
{
|
|
|
|
int status;
|
|
|
|
|
|
|
|
while (waitpid(pid, &status, 0) == -1) {
|
|
|
|
if (errno != EINTR) {
|
2020-10-18 19:32:01 +08:00
|
|
|
error("%s waitpid: %s", tag, strerror(errno));
|
2017-08-18 13:36:45 +08:00
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if (WIFSIGNALED(status)) {
|
|
|
|
error("%s %s exited on signal %d", tag, cmd, WTERMSIG(status));
|
|
|
|
return -1;
|
|
|
|
} else if (WEXITSTATUS(status) != 0) {
|
2017-08-18 13:48:04 +08:00
|
|
|
do_log2(quiet ? SYSLOG_LEVEL_DEBUG1 : SYSLOG_LEVEL_INFO,
|
|
|
|
"%s %s failed, status %d", tag, cmd, WEXITSTATUS(status));
|
2017-08-18 13:36:45 +08:00
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Check a given path for security. This is defined as all components
|
|
|
|
* of the path to the file must be owned by either the owner of
|
|
|
|
* of the file or root and no directories must be group or world writable.
|
|
|
|
*
|
|
|
|
* XXX Should any specific check be done for sym links ?
|
|
|
|
*
|
|
|
|
* Takes a file name, its stat information (preferably from fstat() to
|
|
|
|
* avoid races), the uid of the expected owner, their home directory and an
|
|
|
|
* error buffer plus max size as arguments.
|
|
|
|
*
|
|
|
|
* Returns 0 on success and -1 on failure
|
|
|
|
*/
|
|
|
|
int
|
|
|
|
safe_path(const char *name, struct stat *stp, const char *pw_dir,
|
|
|
|
uid_t uid, char *err, size_t errlen)
|
|
|
|
{
|
|
|
|
char buf[PATH_MAX], homedir[PATH_MAX];
|
|
|
|
char *cp;
|
|
|
|
int comparehome = 0;
|
|
|
|
struct stat st;
|
|
|
|
|
|
|
|
if (realpath(name, buf) == NULL) {
|
|
|
|
snprintf(err, errlen, "realpath %s failed: %s", name,
|
|
|
|
strerror(errno));
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
if (pw_dir != NULL && realpath(pw_dir, homedir) != NULL)
|
|
|
|
comparehome = 1;
|
|
|
|
|
|
|
|
if (!S_ISREG(stp->st_mode)) {
|
|
|
|
snprintf(err, errlen, "%s is not a regular file", buf);
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
if ((!platform_sys_dir_uid(stp->st_uid) && stp->st_uid != uid) ||
|
|
|
|
(stp->st_mode & 022) != 0) {
|
|
|
|
snprintf(err, errlen, "bad ownership or modes for file %s",
|
|
|
|
buf);
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* for each component of the canonical path, walking upwards */
|
|
|
|
for (;;) {
|
|
|
|
if ((cp = dirname(buf)) == NULL) {
|
|
|
|
snprintf(err, errlen, "dirname() failed");
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
strlcpy(buf, cp, sizeof(buf));
|
|
|
|
|
2019-06-28 21:35:04 +08:00
|
|
|
if (stat(buf, &st) == -1 ||
|
2017-08-18 13:36:45 +08:00
|
|
|
(!platform_sys_dir_uid(st.st_uid) && st.st_uid != uid) ||
|
|
|
|
(st.st_mode & 022) != 0) {
|
|
|
|
snprintf(err, errlen,
|
|
|
|
"bad ownership or modes for directory %s", buf);
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* If are past the homedir then we can stop */
|
|
|
|
if (comparehome && strcmp(homedir, buf) == 0)
|
|
|
|
break;
|
|
|
|
|
|
|
|
/*
|
|
|
|
* dirname should always complete with a "/" path,
|
|
|
|
* but we can be paranoid and check for "." too
|
|
|
|
*/
|
|
|
|
if ((strcmp("/", buf) == 0) || (strcmp(".", buf) == 0))
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Version of safe_path() that accepts an open file descriptor to
|
|
|
|
* avoid races.
|
|
|
|
*
|
|
|
|
* Returns 0 on success and -1 on failure
|
|
|
|
*/
|
|
|
|
int
|
|
|
|
safe_path_fd(int fd, const char *file, struct passwd *pw,
|
|
|
|
char *err, size_t errlen)
|
|
|
|
{
|
|
|
|
struct stat st;
|
|
|
|
|
|
|
|
/* check the open file to avoid races */
|
2019-06-28 21:35:04 +08:00
|
|
|
if (fstat(fd, &st) == -1) {
|
2017-08-18 13:36:45 +08:00
|
|
|
snprintf(err, errlen, "cannot stat file %s: %s",
|
|
|
|
file, strerror(errno));
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
return safe_path(file, &st, pw->pw_dir, pw->pw_uid, err, errlen);
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Sets the value of the given variable in the environment. If the variable
|
|
|
|
* already exists, its value is overridden.
|
|
|
|
*/
|
|
|
|
void
|
|
|
|
child_set_env(char ***envp, u_int *envsizep, const char *name,
|
|
|
|
const char *value)
|
|
|
|
{
|
|
|
|
char **env;
|
|
|
|
u_int envsize;
|
|
|
|
u_int i, namelen;
|
|
|
|
|
|
|
|
if (strchr(name, '=') != NULL) {
|
|
|
|
error("Invalid environment variable \"%.100s\"", name);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* If we're passed an uninitialized list, allocate a single null
|
|
|
|
* entry before continuing.
|
|
|
|
*/
|
2023-03-30 10:53:29 +08:00
|
|
|
if ((*envp == NULL) != (*envsizep == 0))
|
|
|
|
fatal_f("environment size mismatch");
|
2017-08-18 13:36:45 +08:00
|
|
|
if (*envp == NULL && *envsizep == 0) {
|
|
|
|
*envp = xmalloc(sizeof(char *));
|
|
|
|
*envp[0] = NULL;
|
|
|
|
*envsizep = 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Find the slot where the value should be stored. If the variable
|
|
|
|
* already exists, we reuse the slot; otherwise we append a new slot
|
|
|
|
* at the end of the array, expanding if necessary.
|
|
|
|
*/
|
|
|
|
env = *envp;
|
|
|
|
namelen = strlen(name);
|
|
|
|
for (i = 0; env[i]; i++)
|
|
|
|
if (strncmp(env[i], name, namelen) == 0 && env[i][namelen] == '=')
|
|
|
|
break;
|
|
|
|
if (env[i]) {
|
|
|
|
/* Reuse the slot. */
|
|
|
|
free(env[i]);
|
|
|
|
} else {
|
|
|
|
/* New variable. Expand if necessary. */
|
|
|
|
envsize = *envsizep;
|
|
|
|
if (i >= envsize - 1) {
|
|
|
|
if (envsize >= 1000)
|
|
|
|
fatal("child_set_env: too many env vars");
|
|
|
|
envsize += 50;
|
|
|
|
env = (*envp) = xreallocarray(env, envsize, sizeof(char *));
|
|
|
|
*envsizep = envsize;
|
|
|
|
}
|
|
|
|
/* Need to set the NULL pointer at end of array beyond the new slot. */
|
|
|
|
env[i + 1] = NULL;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Allocate space and format the variable in the appropriate slot. */
|
2018-03-03 11:15:51 +08:00
|
|
|
/* XXX xasprintf */
|
2017-08-18 13:36:45 +08:00
|
|
|
env[i] = xmalloc(strlen(name) + 1 + strlen(value) + 1);
|
|
|
|
snprintf(env[i], strlen(name) + 1 + strlen(value) + 1, "%s=%s", name, value);
|
|
|
|
}
|
|
|
|
|
2017-10-22 07:06:24 +08:00
|
|
|
/*
|
|
|
|
* Check and optionally lowercase a domain name, also removes trailing '.'
|
|
|
|
* Returns 1 on success and 0 on failure, storing an error message in errstr.
|
|
|
|
*/
|
|
|
|
int
|
|
|
|
valid_domain(char *name, int makelower, const char **errstr)
|
|
|
|
{
|
|
|
|
size_t i, l = strlen(name);
|
|
|
|
u_char c, last = '\0';
|
|
|
|
static char errbuf[256];
|
|
|
|
|
|
|
|
if (l == 0) {
|
|
|
|
strlcpy(errbuf, "empty domain name", sizeof(errbuf));
|
|
|
|
goto bad;
|
|
|
|
}
|
|
|
|
if (!isalpha((u_char)name[0]) && !isdigit((u_char)name[0])) {
|
|
|
|
snprintf(errbuf, sizeof(errbuf), "domain name \"%.100s\" "
|
|
|
|
"starts with invalid character", name);
|
|
|
|
goto bad;
|
|
|
|
}
|
|
|
|
for (i = 0; i < l; i++) {
|
|
|
|
c = tolower((u_char)name[i]);
|
|
|
|
if (makelower)
|
|
|
|
name[i] = (char)c;
|
|
|
|
if (last == '.' && c == '.') {
|
|
|
|
snprintf(errbuf, sizeof(errbuf), "domain name "
|
|
|
|
"\"%.100s\" contains consecutive separators", name);
|
|
|
|
goto bad;
|
|
|
|
}
|
|
|
|
if (c != '.' && c != '-' && !isalnum(c) &&
|
|
|
|
c != '_') /* technically invalid, but common */ {
|
|
|
|
snprintf(errbuf, sizeof(errbuf), "domain name "
|
|
|
|
"\"%.100s\" contains invalid characters", name);
|
|
|
|
goto bad;
|
|
|
|
}
|
|
|
|
last = c;
|
|
|
|
}
|
|
|
|
if (name[l - 1] == '.')
|
|
|
|
name[l - 1] = '\0';
|
|
|
|
if (errstr != NULL)
|
|
|
|
*errstr = NULL;
|
|
|
|
return 1;
|
|
|
|
bad:
|
|
|
|
if (errstr != NULL)
|
|
|
|
*errstr = errbuf;
|
|
|
|
return 0;
|
|
|
|
}
|
2017-12-06 07:59:47 +08:00
|
|
|
|
2018-10-03 14:38:35 +08:00
|
|
|
/*
|
|
|
|
* Verify that a environment variable name (not including initial '$') is
|
|
|
|
* valid; consisting of one or more alphanumeric or underscore characters only.
|
|
|
|
* Returns 1 on valid, 0 otherwise.
|
|
|
|
*/
|
|
|
|
int
|
|
|
|
valid_env_name(const char *name)
|
|
|
|
{
|
|
|
|
const char *cp;
|
|
|
|
|
|
|
|
if (name[0] == '\0')
|
|
|
|
return 0;
|
|
|
|
for (cp = name; *cp != '\0'; cp++) {
|
|
|
|
if (!isalnum((u_char)*cp) && *cp != '_')
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
2017-12-06 07:59:47 +08:00
|
|
|
const char *
|
|
|
|
atoi_err(const char *nptr, int *val)
|
|
|
|
{
|
|
|
|
const char *errstr = NULL;
|
|
|
|
|
|
|
|
if (nptr == NULL || *nptr == '\0')
|
|
|
|
return "missing";
|
2024-04-02 17:56:58 +08:00
|
|
|
*val = strtonum(nptr, 0, INT_MAX, &errstr);
|
2017-12-06 07:59:47 +08:00
|
|
|
return errstr;
|
|
|
|
}
|
2018-03-12 08:52:01 +08:00
|
|
|
|
|
|
|
int
|
|
|
|
parse_absolute_time(const char *s, uint64_t *tp)
|
|
|
|
{
|
|
|
|
struct tm tm;
|
|
|
|
time_t tt;
|
|
|
|
char buf[32], *fmt;
|
2022-08-11 09:56:51 +08:00
|
|
|
const char *cp;
|
|
|
|
size_t l;
|
|
|
|
int is_utc = 0;
|
2018-03-12 08:52:01 +08:00
|
|
|
|
|
|
|
*tp = 0;
|
|
|
|
|
2022-08-11 09:56:51 +08:00
|
|
|
l = strlen(s);
|
|
|
|
if (l > 1 && strcasecmp(s + l - 1, "Z") == 0) {
|
|
|
|
is_utc = 1;
|
|
|
|
l--;
|
|
|
|
} else if (l > 3 && strcasecmp(s + l - 3, "UTC") == 0) {
|
|
|
|
is_utc = 1;
|
|
|
|
l -= 3;
|
|
|
|
}
|
2018-03-12 08:52:01 +08:00
|
|
|
/*
|
|
|
|
* POSIX strptime says "The application shall ensure that there
|
|
|
|
* is white-space or other non-alphanumeric characters between
|
|
|
|
* any two conversion specifications" so arrange things this way.
|
|
|
|
*/
|
2022-08-11 09:56:51 +08:00
|
|
|
switch (l) {
|
2018-03-12 08:52:01 +08:00
|
|
|
case 8: /* YYYYMMDD */
|
|
|
|
fmt = "%Y-%m-%d";
|
|
|
|
snprintf(buf, sizeof(buf), "%.4s-%.2s-%.2s", s, s + 4, s + 6);
|
|
|
|
break;
|
|
|
|
case 12: /* YYYYMMDDHHMM */
|
|
|
|
fmt = "%Y-%m-%dT%H:%M";
|
|
|
|
snprintf(buf, sizeof(buf), "%.4s-%.2s-%.2sT%.2s:%.2s",
|
|
|
|
s, s + 4, s + 6, s + 8, s + 10);
|
|
|
|
break;
|
|
|
|
case 14: /* YYYYMMDDHHMMSS */
|
|
|
|
fmt = "%Y-%m-%dT%H:%M:%S";
|
|
|
|
snprintf(buf, sizeof(buf), "%.4s-%.2s-%.2sT%.2s:%.2s:%.2s",
|
|
|
|
s, s + 4, s + 6, s + 8, s + 10, s + 12);
|
|
|
|
break;
|
|
|
|
default:
|
|
|
|
return SSH_ERR_INVALID_FORMAT;
|
|
|
|
}
|
|
|
|
|
|
|
|
memset(&tm, 0, sizeof(tm));
|
2022-08-11 09:56:51 +08:00
|
|
|
if ((cp = strptime(buf, fmt, &tm)) == NULL || *cp != '\0')
|
2018-03-12 08:52:01 +08:00
|
|
|
return SSH_ERR_INVALID_FORMAT;
|
2022-08-11 09:56:51 +08:00
|
|
|
if (is_utc) {
|
|
|
|
if ((tt = timegm(&tm)) < 0)
|
|
|
|
return SSH_ERR_INVALID_FORMAT;
|
|
|
|
} else {
|
|
|
|
if ((tt = mktime(&tm)) < 0)
|
|
|
|
return SSH_ERR_INVALID_FORMAT;
|
|
|
|
}
|
2018-03-12 08:52:01 +08:00
|
|
|
/* success */
|
|
|
|
*tp = (uint64_t)tt;
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
void
|
|
|
|
format_absolute_time(uint64_t t, char *buf, size_t len)
|
|
|
|
{
|
2021-07-02 15:20:44 +08:00
|
|
|
time_t tt = t > SSH_TIME_T_MAX ? SSH_TIME_T_MAX : t;
|
2018-03-12 08:52:01 +08:00
|
|
|
struct tm tm;
|
|
|
|
|
|
|
|
localtime_r(&tt, &tm);
|
|
|
|
strftime(buf, len, "%Y-%m-%dT%H:%M:%S", &tm);
|
|
|
|
}
|
2018-11-16 11:26:01 +08:00
|
|
|
|
2023-10-12 06:42:26 +08:00
|
|
|
/*
|
|
|
|
* Parse a "pattern=interval" clause (e.g. a ChannelTimeout).
|
|
|
|
* Returns 0 on success or non-zero on failure.
|
|
|
|
* Caller must free *typep.
|
|
|
|
*/
|
|
|
|
int
|
|
|
|
parse_pattern_interval(const char *s, char **typep, int *secsp)
|
|
|
|
{
|
|
|
|
char *cp, *sdup;
|
|
|
|
int secs;
|
|
|
|
|
|
|
|
if (typep != NULL)
|
|
|
|
*typep = NULL;
|
|
|
|
if (secsp != NULL)
|
|
|
|
*secsp = 0;
|
|
|
|
if (s == NULL)
|
|
|
|
return -1;
|
|
|
|
sdup = xstrdup(s);
|
|
|
|
|
|
|
|
if ((cp = strchr(sdup, '=')) == NULL || cp == sdup) {
|
|
|
|
free(sdup);
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
*cp++ = '\0';
|
|
|
|
if ((secs = convtime(cp)) < 0) {
|
|
|
|
free(sdup);
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
/* success */
|
|
|
|
if (typep != NULL)
|
|
|
|
*typep = xstrdup(sdup);
|
|
|
|
if (secsp != NULL)
|
|
|
|
*secsp = secs;
|
|
|
|
free(sdup);
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2018-11-16 11:26:01 +08:00
|
|
|
/* check if path is absolute */
|
|
|
|
int
|
|
|
|
path_absolute(const char *path)
|
|
|
|
{
|
|
|
|
return (*path == '/') ? 1 : 0;
|
|
|
|
}
|
2019-09-03 16:29:58 +08:00
|
|
|
|
|
|
|
void
|
|
|
|
skip_space(char **cpp)
|
|
|
|
{
|
|
|
|
char *cp;
|
|
|
|
|
|
|
|
for (cp = *cpp; *cp == ' ' || *cp == '\t'; cp++)
|
|
|
|
;
|
|
|
|
*cpp = cp;
|
|
|
|
}
|
2019-09-03 16:32:11 +08:00
|
|
|
|
|
|
|
/* authorized_key-style options parsing helpers */
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Match flag 'opt' in *optsp, and if allow_negate is set then also match
|
|
|
|
* 'no-opt'. Returns -1 if option not matched, 1 if option matches or 0
|
|
|
|
* if negated option matches.
|
|
|
|
* If the option or negated option matches, then *optsp is updated to
|
|
|
|
* point to the first character after the option.
|
|
|
|
*/
|
|
|
|
int
|
|
|
|
opt_flag(const char *opt, int allow_negate, const char **optsp)
|
|
|
|
{
|
|
|
|
size_t opt_len = strlen(opt);
|
|
|
|
const char *opts = *optsp;
|
|
|
|
int negate = 0;
|
|
|
|
|
|
|
|
if (allow_negate && strncasecmp(opts, "no-", 3) == 0) {
|
|
|
|
opts += 3;
|
|
|
|
negate = 1;
|
|
|
|
}
|
|
|
|
if (strncasecmp(opts, opt, opt_len) == 0) {
|
|
|
|
*optsp = opts + opt_len;
|
|
|
|
return negate ? 0 : 1;
|
|
|
|
}
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
char *
|
|
|
|
opt_dequote(const char **sp, const char **errstrp)
|
|
|
|
{
|
|
|
|
const char *s = *sp;
|
|
|
|
char *ret;
|
|
|
|
size_t i;
|
|
|
|
|
|
|
|
*errstrp = NULL;
|
|
|
|
if (*s != '"') {
|
|
|
|
*errstrp = "missing start quote";
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
s++;
|
|
|
|
if ((ret = malloc(strlen((s)) + 1)) == NULL) {
|
|
|
|
*errstrp = "memory allocation failed";
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
for (i = 0; *s != '\0' && *s != '"';) {
|
|
|
|
if (s[0] == '\\' && s[1] == '"')
|
|
|
|
s++;
|
|
|
|
ret[i++] = *s++;
|
|
|
|
}
|
|
|
|
if (*s == '\0') {
|
|
|
|
*errstrp = "missing end quote";
|
|
|
|
free(ret);
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
ret[i] = '\0';
|
|
|
|
s++;
|
|
|
|
*sp = s;
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
int
|
|
|
|
opt_match(const char **opts, const char *term)
|
|
|
|
{
|
|
|
|
if (strncasecmp((*opts), term, strlen(term)) == 0 &&
|
|
|
|
(*opts)[strlen(term)] == '=') {
|
|
|
|
*opts += strlen(term) + 1;
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2021-02-16 04:36:35 +08:00
|
|
|
void
|
|
|
|
opt_array_append2(const char *file, const int line, const char *directive,
|
|
|
|
char ***array, int **iarray, u_int *lp, const char *s, int i)
|
|
|
|
{
|
|
|
|
|
|
|
|
if (*lp >= INT_MAX)
|
|
|
|
fatal("%s line %d: Too many %s entries", file, line, directive);
|
|
|
|
|
|
|
|
if (iarray != NULL) {
|
|
|
|
*iarray = xrecallocarray(*iarray, *lp, *lp + 1,
|
|
|
|
sizeof(**iarray));
|
|
|
|
(*iarray)[*lp] = i;
|
|
|
|
}
|
|
|
|
|
|
|
|
*array = xrecallocarray(*array, *lp, *lp + 1, sizeof(**array));
|
|
|
|
(*array)[*lp] = xstrdup(s);
|
|
|
|
(*lp)++;
|
|
|
|
}
|
|
|
|
|
|
|
|
void
|
|
|
|
opt_array_append(const char *file, const int line, const char *directive,
|
|
|
|
char ***array, u_int *lp, const char *s)
|
|
|
|
{
|
|
|
|
opt_array_append2(file, line, directive, array, NULL, lp, s, 0);
|
|
|
|
}
|
|
|
|
|
2024-03-04 10:16:11 +08:00
|
|
|
void
|
|
|
|
opt_array_free2(char **array, int **iarray, u_int l)
|
|
|
|
{
|
|
|
|
u_int i;
|
|
|
|
|
|
|
|
if (array == NULL || l == 0)
|
|
|
|
return;
|
|
|
|
for (i = 0; i < l; i++)
|
|
|
|
free(array[i]);
|
|
|
|
free(array);
|
|
|
|
free(iarray);
|
|
|
|
}
|
|
|
|
|
2020-01-23 15:10:22 +08:00
|
|
|
sshsig_t
|
|
|
|
ssh_signal(int signum, sshsig_t handler)
|
|
|
|
{
|
|
|
|
struct sigaction sa, osa;
|
|
|
|
|
|
|
|
/* mask all other signals while in handler */
|
2020-04-25 14:59:36 +08:00
|
|
|
memset(&sa, 0, sizeof(sa));
|
2020-01-23 15:10:22 +08:00
|
|
|
sa.sa_handler = handler;
|
|
|
|
sigfillset(&sa.sa_mask);
|
2020-05-01 13:09:26 +08:00
|
|
|
#if defined(SA_RESTART) && !defined(NO_SA_RESTART)
|
2020-01-23 15:10:22 +08:00
|
|
|
if (signum != SIGALRM)
|
|
|
|
sa.sa_flags = SA_RESTART;
|
2020-05-01 13:09:26 +08:00
|
|
|
#endif
|
2020-01-23 15:10:22 +08:00
|
|
|
if (sigaction(signum, &sa, &osa) == -1) {
|
|
|
|
debug3("sigaction(%s): %s", strsignal(signum), strerror(errno));
|
|
|
|
return SIG_ERR;
|
|
|
|
}
|
|
|
|
return osa.sa_handler;
|
|
|
|
}
|
2020-10-03 17:22:26 +08:00
|
|
|
|
|
|
|
int
|
|
|
|
stdfd_devnull(int do_stdin, int do_stdout, int do_stderr)
|
|
|
|
{
|
|
|
|
int devnull, ret = 0;
|
|
|
|
|
|
|
|
if ((devnull = open(_PATH_DEVNULL, O_RDWR)) == -1) {
|
2020-10-18 19:32:01 +08:00
|
|
|
error_f("open %s: %s", _PATH_DEVNULL,
|
2020-10-03 17:22:26 +08:00
|
|
|
strerror(errno));
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
if ((do_stdin && dup2(devnull, STDIN_FILENO) == -1) ||
|
|
|
|
(do_stdout && dup2(devnull, STDOUT_FILENO) == -1) ||
|
|
|
|
(do_stderr && dup2(devnull, STDERR_FILENO) == -1)) {
|
2020-10-18 19:32:01 +08:00
|
|
|
error_f("dup2: %s", strerror(errno));
|
2020-10-03 17:22:26 +08:00
|
|
|
ret = -1;
|
|
|
|
}
|
|
|
|
if (devnull > STDERR_FILENO)
|
|
|
|
close(devnull);
|
|
|
|
return ret;
|
|
|
|
}
|
2020-12-22 08:12:22 +08:00
|
|
|
|
|
|
|
/*
|
|
|
|
* Runs command in a subprocess with a minimal environment.
|
|
|
|
* Returns pid on success, 0 on failure.
|
|
|
|
* The child stdout and stderr maybe captured, left attached or sent to
|
|
|
|
* /dev/null depending on the contents of flags.
|
|
|
|
* "tag" is prepended to log messages.
|
|
|
|
* NB. "command" is only used for logging; the actual command executed is
|
|
|
|
* av[0].
|
|
|
|
*/
|
|
|
|
pid_t
|
|
|
|
subprocess(const char *tag, const char *command,
|
|
|
|
int ac, char **av, FILE **child, u_int flags,
|
|
|
|
struct passwd *pw, privdrop_fn *drop_privs, privrestore_fn *restore_privs)
|
|
|
|
{
|
|
|
|
FILE *f = NULL;
|
|
|
|
struct stat st;
|
|
|
|
int fd, devnull, p[2], i;
|
|
|
|
pid_t pid;
|
|
|
|
char *cp, errmsg[512];
|
|
|
|
u_int nenv = 0;
|
|
|
|
char **env = NULL;
|
|
|
|
|
|
|
|
/* If dropping privs, then must specify user and restore function */
|
|
|
|
if (drop_privs != NULL && (pw == NULL || restore_privs == NULL)) {
|
|
|
|
error("%s: inconsistent arguments", tag); /* XXX fatal? */
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
if (pw == NULL && (pw = getpwuid(getuid())) == NULL) {
|
|
|
|
error("%s: no user for current uid", tag);
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
if (child != NULL)
|
|
|
|
*child = NULL;
|
|
|
|
|
|
|
|
debug3_f("%s command \"%s\" running as %s (flags 0x%x)",
|
|
|
|
tag, command, pw->pw_name, flags);
|
|
|
|
|
|
|
|
/* Check consistency */
|
|
|
|
if ((flags & SSH_SUBPROCESS_STDOUT_DISCARD) != 0 &&
|
|
|
|
(flags & SSH_SUBPROCESS_STDOUT_CAPTURE) != 0) {
|
|
|
|
error_f("inconsistent flags");
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
if (((flags & SSH_SUBPROCESS_STDOUT_CAPTURE) == 0) != (child == NULL)) {
|
|
|
|
error_f("inconsistent flags/output");
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* If executing an explicit binary, then verify the it exists
|
|
|
|
* and appears safe-ish to execute
|
|
|
|
*/
|
|
|
|
if (!path_absolute(av[0])) {
|
|
|
|
error("%s path is not absolute", tag);
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
if (drop_privs != NULL)
|
|
|
|
drop_privs(pw);
|
|
|
|
if (stat(av[0], &st) == -1) {
|
|
|
|
error("Could not stat %s \"%s\": %s", tag,
|
|
|
|
av[0], strerror(errno));
|
|
|
|
goto restore_return;
|
|
|
|
}
|
|
|
|
if ((flags & SSH_SUBPROCESS_UNSAFE_PATH) == 0 &&
|
|
|
|
safe_path(av[0], &st, NULL, 0, errmsg, sizeof(errmsg)) != 0) {
|
|
|
|
error("Unsafe %s \"%s\": %s", tag, av[0], errmsg);
|
|
|
|
goto restore_return;
|
|
|
|
}
|
|
|
|
/* Prepare to keep the child's stdout if requested */
|
|
|
|
if (pipe(p) == -1) {
|
|
|
|
error("%s: pipe: %s", tag, strerror(errno));
|
|
|
|
restore_return:
|
|
|
|
if (restore_privs != NULL)
|
|
|
|
restore_privs();
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
if (restore_privs != NULL)
|
|
|
|
restore_privs();
|
|
|
|
|
|
|
|
switch ((pid = fork())) {
|
|
|
|
case -1: /* error */
|
|
|
|
error("%s: fork: %s", tag, strerror(errno));
|
|
|
|
close(p[0]);
|
|
|
|
close(p[1]);
|
|
|
|
return 0;
|
|
|
|
case 0: /* child */
|
|
|
|
/* Prepare a minimal environment for the child. */
|
|
|
|
if ((flags & SSH_SUBPROCESS_PRESERVE_ENV) == 0) {
|
|
|
|
nenv = 5;
|
|
|
|
env = xcalloc(sizeof(*env), nenv);
|
|
|
|
child_set_env(&env, &nenv, "PATH", _PATH_STDPATH);
|
|
|
|
child_set_env(&env, &nenv, "USER", pw->pw_name);
|
|
|
|
child_set_env(&env, &nenv, "LOGNAME", pw->pw_name);
|
|
|
|
child_set_env(&env, &nenv, "HOME", pw->pw_dir);
|
|
|
|
if ((cp = getenv("LANG")) != NULL)
|
|
|
|
child_set_env(&env, &nenv, "LANG", cp);
|
|
|
|
}
|
|
|
|
|
2021-02-28 09:50:47 +08:00
|
|
|
for (i = 1; i < NSIG; i++)
|
2020-12-22 08:12:22 +08:00
|
|
|
ssh_signal(i, SIG_DFL);
|
|
|
|
|
|
|
|
if ((devnull = open(_PATH_DEVNULL, O_RDWR)) == -1) {
|
|
|
|
error("%s: open %s: %s", tag, _PATH_DEVNULL,
|
|
|
|
strerror(errno));
|
|
|
|
_exit(1);
|
|
|
|
}
|
|
|
|
if (dup2(devnull, STDIN_FILENO) == -1) {
|
|
|
|
error("%s: dup2: %s", tag, strerror(errno));
|
|
|
|
_exit(1);
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Set up stdout as requested; leave stderr in place for now. */
|
|
|
|
fd = -1;
|
|
|
|
if ((flags & SSH_SUBPROCESS_STDOUT_CAPTURE) != 0)
|
|
|
|
fd = p[1];
|
|
|
|
else if ((flags & SSH_SUBPROCESS_STDOUT_DISCARD) != 0)
|
|
|
|
fd = devnull;
|
|
|
|
if (fd != -1 && dup2(fd, STDOUT_FILENO) == -1) {
|
|
|
|
error("%s: dup2: %s", tag, strerror(errno));
|
|
|
|
_exit(1);
|
|
|
|
}
|
|
|
|
closefrom(STDERR_FILENO + 1);
|
|
|
|
|
2021-09-26 22:01:03 +08:00
|
|
|
if (geteuid() == 0 &&
|
|
|
|
initgroups(pw->pw_name, pw->pw_gid) == -1) {
|
|
|
|
error("%s: initgroups(%s, %u): %s", tag,
|
|
|
|
pw->pw_name, (u_int)pw->pw_gid, strerror(errno));
|
|
|
|
_exit(1);
|
|
|
|
}
|
2020-12-22 08:12:22 +08:00
|
|
|
if (setresgid(pw->pw_gid, pw->pw_gid, pw->pw_gid) == -1) {
|
|
|
|
error("%s: setresgid %u: %s", tag, (u_int)pw->pw_gid,
|
|
|
|
strerror(errno));
|
|
|
|
_exit(1);
|
|
|
|
}
|
|
|
|
if (setresuid(pw->pw_uid, pw->pw_uid, pw->pw_uid) == -1) {
|
|
|
|
error("%s: setresuid %u: %s", tag, (u_int)pw->pw_uid,
|
|
|
|
strerror(errno));
|
|
|
|
_exit(1);
|
|
|
|
}
|
|
|
|
/* stdin is pointed to /dev/null at this point */
|
|
|
|
if ((flags & SSH_SUBPROCESS_STDOUT_DISCARD) != 0 &&
|
|
|
|
dup2(STDIN_FILENO, STDERR_FILENO) == -1) {
|
|
|
|
error("%s: dup2: %s", tag, strerror(errno));
|
|
|
|
_exit(1);
|
|
|
|
}
|
|
|
|
if (env != NULL)
|
|
|
|
execve(av[0], av, env);
|
|
|
|
else
|
|
|
|
execv(av[0], av);
|
|
|
|
error("%s %s \"%s\": %s", tag, env == NULL ? "execv" : "execve",
|
|
|
|
command, strerror(errno));
|
|
|
|
_exit(127);
|
|
|
|
default: /* parent */
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
close(p[1]);
|
|
|
|
if ((flags & SSH_SUBPROCESS_STDOUT_CAPTURE) == 0)
|
|
|
|
close(p[0]);
|
|
|
|
else if ((f = fdopen(p[0], "r")) == NULL) {
|
|
|
|
error("%s: fdopen: %s", tag, strerror(errno));
|
|
|
|
close(p[0]);
|
|
|
|
/* Don't leave zombie child */
|
|
|
|
kill(pid, SIGTERM);
|
|
|
|
while (waitpid(pid, NULL, 0) == -1 && errno == EINTR)
|
|
|
|
;
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
/* Success */
|
|
|
|
debug3_f("%s pid %ld", tag, (long)pid);
|
|
|
|
if (child != NULL)
|
|
|
|
*child = f;
|
|
|
|
return pid;
|
|
|
|
}
|
2021-06-04 13:02:40 +08:00
|
|
|
|
|
|
|
const char *
|
|
|
|
lookup_env_in_list(const char *env, char * const *envs, size_t nenvs)
|
|
|
|
{
|
|
|
|
size_t i, envlen;
|
|
|
|
|
|
|
|
envlen = strlen(env);
|
|
|
|
for (i = 0; i < nenvs; i++) {
|
|
|
|
if (strncmp(envs[i], env, envlen) == 0 &&
|
|
|
|
envs[i][envlen] == '=') {
|
|
|
|
return envs[i] + envlen + 1;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return NULL;
|
|
|
|
}
|
2022-06-03 12:30:46 +08:00
|
|
|
|
|
|
|
const char *
|
|
|
|
lookup_setenv_in_list(const char *env, char * const *envs, size_t nenvs)
|
|
|
|
{
|
|
|
|
char *name, *cp;
|
|
|
|
const char *ret;
|
|
|
|
|
|
|
|
name = xstrdup(env);
|
|
|
|
if ((cp = strchr(name, '=')) == NULL) {
|
|
|
|
free(name);
|
|
|
|
return NULL; /* not env=val */
|
|
|
|
}
|
|
|
|
*cp = '\0';
|
|
|
|
ret = lookup_env_in_list(name, envs, nenvs);
|
|
|
|
free(name);
|
|
|
|
return ret;
|
|
|
|
}
|
2023-01-06 10:37:04 +08:00
|
|
|
|
|
|
|
/*
|
|
|
|
* Helpers for managing poll(2)/ppoll(2) timeouts
|
|
|
|
* Will remember the earliest deadline and return it for use in poll/ppoll.
|
|
|
|
*/
|
|
|
|
|
|
|
|
/* Initialise a poll/ppoll timeout with an indefinite deadline */
|
|
|
|
void
|
|
|
|
ptimeout_init(struct timespec *pt)
|
|
|
|
{
|
|
|
|
/*
|
|
|
|
* Deliberately invalid for ppoll(2).
|
|
|
|
* Will be converted to NULL in ptimeout_get_tspec() later.
|
|
|
|
*/
|
|
|
|
pt->tv_sec = -1;
|
|
|
|
pt->tv_nsec = 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Specify a poll/ppoll deadline of at most 'sec' seconds */
|
|
|
|
void
|
|
|
|
ptimeout_deadline_sec(struct timespec *pt, long sec)
|
|
|
|
{
|
|
|
|
if (pt->tv_sec == -1 || pt->tv_sec >= sec) {
|
|
|
|
pt->tv_sec = sec;
|
|
|
|
pt->tv_nsec = 0;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Specify a poll/ppoll deadline of at most 'p' (timespec) */
|
|
|
|
static void
|
|
|
|
ptimeout_deadline_tsp(struct timespec *pt, struct timespec *p)
|
|
|
|
{
|
|
|
|
if (pt->tv_sec == -1 || timespeccmp(pt, p, >=))
|
|
|
|
*pt = *p;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Specify a poll/ppoll deadline of at most 'ms' milliseconds */
|
|
|
|
void
|
|
|
|
ptimeout_deadline_ms(struct timespec *pt, long ms)
|
|
|
|
{
|
|
|
|
struct timespec p;
|
|
|
|
|
|
|
|
p.tv_sec = ms / 1000;
|
|
|
|
p.tv_nsec = (ms % 1000) * 1000000;
|
|
|
|
ptimeout_deadline_tsp(pt, &p);
|
|
|
|
}
|
|
|
|
|
2023-08-28 11:31:16 +08:00
|
|
|
/* Specify a poll/ppoll deadline at wall clock monotime 'when' (timespec) */
|
2023-01-06 10:37:04 +08:00
|
|
|
void
|
2023-08-28 11:31:16 +08:00
|
|
|
ptimeout_deadline_monotime_tsp(struct timespec *pt, struct timespec *when)
|
2023-01-06 10:37:04 +08:00
|
|
|
{
|
|
|
|
struct timespec now, t;
|
|
|
|
|
|
|
|
monotime_ts(&now);
|
|
|
|
|
2023-08-28 11:31:16 +08:00
|
|
|
if (timespeccmp(&now, when, >=)) {
|
|
|
|
/* 'when' is now or in the past. Timeout ASAP */
|
|
|
|
pt->tv_sec = 0;
|
|
|
|
pt->tv_nsec = 0;
|
|
|
|
} else {
|
|
|
|
timespecsub(when, &now, &t);
|
2023-01-06 10:37:04 +08:00
|
|
|
ptimeout_deadline_tsp(pt, &t);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2023-08-28 11:31:16 +08:00
|
|
|
/* Specify a poll/ppoll deadline at wall clock monotime 'when' */
|
|
|
|
void
|
|
|
|
ptimeout_deadline_monotime(struct timespec *pt, time_t when)
|
|
|
|
{
|
|
|
|
struct timespec t;
|
|
|
|
|
|
|
|
t.tv_sec = when;
|
|
|
|
t.tv_nsec = 0;
|
|
|
|
ptimeout_deadline_monotime_tsp(pt, &t);
|
|
|
|
}
|
|
|
|
|
2023-01-06 10:37:04 +08:00
|
|
|
/* Get a poll(2) timeout value in milliseconds */
|
|
|
|
int
|
|
|
|
ptimeout_get_ms(struct timespec *pt)
|
|
|
|
{
|
|
|
|
if (pt->tv_sec == -1)
|
|
|
|
return -1;
|
|
|
|
if (pt->tv_sec >= (INT_MAX - (pt->tv_nsec / 1000000)) / 1000)
|
|
|
|
return INT_MAX;
|
|
|
|
return (pt->tv_sec * 1000) + (pt->tv_nsec / 1000000);
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Get a ppoll(2) timeout value as a timespec pointer */
|
|
|
|
struct timespec *
|
|
|
|
ptimeout_get_tsp(struct timespec *pt)
|
|
|
|
{
|
|
|
|
return pt->tv_sec == -1 ? NULL : pt;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Returns non-zero if a timeout has been set (i.e. is not indefinite) */
|
|
|
|
int
|
|
|
|
ptimeout_isset(struct timespec *pt)
|
|
|
|
{
|
|
|
|
return pt->tv_sec != -1;
|
|
|
|
}
|
2023-07-19 22:02:27 +08:00
|
|
|
|
|
|
|
/*
|
|
|
|
* Returns zero if the library at 'path' contains symbol 's', nonzero
|
|
|
|
* otherwise.
|
|
|
|
*/
|
|
|
|
int
|
|
|
|
lib_contains_symbol(const char *path, const char *s)
|
|
|
|
{
|
|
|
|
#ifdef HAVE_NLIST_H
|
|
|
|
struct nlist nl[2];
|
|
|
|
int ret = -1, r;
|
|
|
|
|
|
|
|
memset(nl, 0, sizeof(nl));
|
|
|
|
nl[0].n_name = xstrdup(s);
|
|
|
|
nl[1].n_name = NULL;
|
|
|
|
if ((r = nlist(path, nl)) == -1) {
|
|
|
|
error_f("nlist failed for %s", path);
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
if (r != 0 || nl[0].n_value == 0 || nl[0].n_type == 0) {
|
|
|
|
error_f("library %s does not contain symbol %s", path, s);
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
/* success */
|
|
|
|
ret = 0;
|
|
|
|
out:
|
|
|
|
free(nl[0].n_name);
|
|
|
|
return ret;
|
|
|
|
#else /* HAVE_NLIST_H */
|
|
|
|
int fd, ret = -1;
|
|
|
|
struct stat st;
|
|
|
|
void *m = NULL;
|
|
|
|
size_t sz = 0;
|
|
|
|
|
|
|
|
memset(&st, 0, sizeof(st));
|
|
|
|
if ((fd = open(path, O_RDONLY)) < 0) {
|
|
|
|
error_f("open %s: %s", path, strerror(errno));
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
if (fstat(fd, &st) != 0) {
|
|
|
|
error_f("fstat %s: %s", path, strerror(errno));
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
if (!S_ISREG(st.st_mode)) {
|
|
|
|
error_f("%s is not a regular file", path);
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
if (st.st_size < 0 ||
|
|
|
|
(size_t)st.st_size < strlen(s) ||
|
|
|
|
st.st_size >= INT_MAX/2) {
|
|
|
|
error_f("%s bad size %lld", path, (long long)st.st_size);
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
sz = (size_t)st.st_size;
|
|
|
|
if ((m = mmap(NULL, sz, PROT_READ, MAP_PRIVATE, fd, 0)) == MAP_FAILED ||
|
|
|
|
m == NULL) {
|
|
|
|
error_f("mmap %s: %s", path, strerror(errno));
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
if (memmem(m, sz, s, strlen(s)) == NULL) {
|
|
|
|
error_f("%s does not contain expected string %s", path, s);
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
/* success */
|
|
|
|
ret = 0;
|
|
|
|
out:
|
|
|
|
if (m != NULL && m != MAP_FAILED)
|
|
|
|
munmap(m, sz);
|
|
|
|
close(fd);
|
|
|
|
return ret;
|
|
|
|
#endif /* HAVE_NLIST_H */
|
|
|
|
}
|
upstream: Add a facility to sshd(8) to penalise particular
problematic client behaviours, controlled by two new sshd_config(5) options:
PerSourcePenalties and PerSourcePenaltyExemptList.
When PerSourcePenalties are enabled, sshd(8) will monitor the exit
status of its child pre-auth session processes. Through the exit
status, it can observe situations where the session did not
authenticate as expected. These conditions include when the client
repeatedly attempted authentication unsucessfully (possibly indicating
an attack against one or more accounts, e.g. password guessing), or
when client behaviour caused sshd to crash (possibly indicating
attempts to exploit sshd).
When such a condition is observed, sshd will record a penalty of some
duration (e.g. 30 seconds) against the client's address. If this time
is above a minimum threshold specified by the PerSourcePenalties, then
connections from the client address will be refused (along with any
others in the same PerSourceNetBlockSize CIDR range).
Repeated offenses by the same client address will accrue greater
penalties, up to a configurable maximum. A PerSourcePenaltyExemptList
option allows certain address ranges to be exempt from all penalties.
We hope these options will make it significantly more difficult for
attackers to find accounts with weak/guessable passwords or exploit
bugs in sshd(8) itself.
PerSourcePenalties is off by default, but we expect to enable it
automatically in the near future.
much feedback markus@ and others, ok markus@
OpenBSD-Commit-ID: 89ded70eccb2b4926ef0366a4d58a693de366cca
2024-06-07 01:15:25 +08:00
|
|
|
|
|
|
|
int
|
|
|
|
signal_is_crash(int sig)
|
|
|
|
{
|
|
|
|
switch (sig) {
|
|
|
|
case SIGSEGV:
|
|
|
|
case SIGBUS:
|
|
|
|
case SIGTRAP:
|
|
|
|
case SIGSYS:
|
|
|
|
case SIGFPE:
|
|
|
|
case SIGILL:
|
|
|
|
case SIGABRT:
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
return 0;
|
|
|
|
}
|