mirror of
https://github.com/apache/httpd.git
synced 2025-08-13 14:40:20 +00:00

on the query, and remove IPv4 dependencies. git-svn-id: https://svn.apache.org/repos/asf/httpd/httpd/trunk@87423 13f79535-47bb-0310-9956-ffa450edef68
292 lines
9.8 KiB
C
292 lines
9.8 KiB
C
/* ====================================================================
|
|
* The Apache Software License, Version 1.1
|
|
*
|
|
* Copyright (c) 2000 The Apache Software Foundation. All rights
|
|
* reserved.
|
|
*
|
|
* Redistribution and use in source and binary forms, with or without
|
|
* modification, are permitted provided that the following conditions
|
|
* are met:
|
|
*
|
|
* 1. Redistributions of source code must retain the above copyright
|
|
* notice, this list of conditions and the following disclaimer.
|
|
*
|
|
* 2. Redistributions in binary form must reproduce the above copyright
|
|
* notice, this list of conditions and the following disclaimer in
|
|
* the documentation and/or other materials provided with the
|
|
* distribution.
|
|
*
|
|
* 3. The end-user documentation included with the redistribution,
|
|
* if any, must include the following acknowledgment:
|
|
* "This product includes software developed by the
|
|
* Apache Software Foundation (http://www.apache.org/)."
|
|
* Alternately, this acknowledgment may appear in the software itself,
|
|
* if and wherever such third-party acknowledgments normally appear.
|
|
*
|
|
* 4. The names "Apache" and "Apache Software Foundation" must
|
|
* not be used to endorse or promote products derived from this
|
|
* software without prior written permission. For written
|
|
* permission, please contact apache@apache.org.
|
|
*
|
|
* 5. Products derived from this software may not be called "Apache",
|
|
* nor may "Apache" appear in their name, without prior written
|
|
* permission of the Apache Software Foundation.
|
|
*
|
|
* THIS SOFTWARE IS PROVIDED ``AS IS'' AND ANY EXPRESSED OR IMPLIED
|
|
* WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
|
|
* OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
|
|
* DISCLAIMED. IN NO EVENT SHALL THE APACHE SOFTWARE FOUNDATION OR
|
|
* ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
|
|
* SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
|
|
* LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF
|
|
* USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND
|
|
* ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY,
|
|
* OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT
|
|
* OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
|
* SUCH DAMAGE.
|
|
* ====================================================================
|
|
*
|
|
* This software consists of voluntary contributions made by many
|
|
* individuals on behalf of the Apache Software Foundation. For more
|
|
* information on the Apache Software Foundation, please see
|
|
* <http://www.apache.org/>.
|
|
*
|
|
* Portions of this software are based upon public domain software
|
|
* originally written at the National Center for Supercomputing Applications,
|
|
* University of Illinois, Urbana-Champaign.
|
|
*/
|
|
|
|
/* TODO - put timeouts back in */
|
|
/*
|
|
* rfc1413() speaks a common subset of the RFC 1413, AUTH, TAP and IDENT
|
|
* protocols. The code queries an RFC 1413 etc. compatible daemon on a remote
|
|
* host to look up the owner of a connection. The information should not be
|
|
* used for authentication purposes. This routine intercepts alarm signals.
|
|
*
|
|
* Diagnostics are reported through syslog(3).
|
|
*
|
|
* Author: Wietse Venema, Eindhoven University of Technology,
|
|
* The Netherlands.
|
|
*/
|
|
|
|
/* Some small additions for Apache --- ditch the "sccsid" var if
|
|
* compiling with gcc (it *has* changed), include ap_config.h for the
|
|
* prototypes it defines on at least one system (SunlOSs) which has
|
|
* them missing from the standard header files, and one minor change
|
|
* below (extra parens around assign "if (foo = bar) ..." to shut up
|
|
* gcc -Wall).
|
|
*/
|
|
|
|
/* Rewritten by David Robinson */
|
|
|
|
#include "apr.h"
|
|
#include "apr_network_io.h"
|
|
#include "apr_strings.h"
|
|
|
|
#if APR_HAVE_STDIO_H
|
|
#include <stdio.h>
|
|
#endif
|
|
|
|
#include "ap_config.h"
|
|
|
|
#ifdef HAVE_STRING_H
|
|
#include <string.h>
|
|
#endif
|
|
|
|
#include "httpd.h" /* for server_rec, conn_rec, etc. */
|
|
#include "http_log.h" /* for aplog_error */
|
|
#include "rfc1413.h"
|
|
#include "http_main.h" /* set_callback_and_alarm */
|
|
#include "util_ebcdic.h"
|
|
|
|
/* Local stuff. */
|
|
/* Semi-well-known port */
|
|
#define RFC1413_PORT 113
|
|
/* maximum allowed length of userid */
|
|
#define RFC1413_USERLEN 512
|
|
/* rough limit on the amount of data we accept. */
|
|
#define RFC1413_MAXDATA 1000
|
|
|
|
#ifndef RFC1413_TIMEOUT
|
|
#define RFC1413_TIMEOUT 30
|
|
#endif
|
|
#define FROM_UNKNOWN "unknown"
|
|
|
|
int ap_rfc1413_timeout = RFC1413_TIMEOUT; /* Global so it can be changed */
|
|
|
|
static apr_status_t rfc1413_connect(apr_socket_t **newsock, conn_rec *conn,
|
|
server_rec *srv)
|
|
{
|
|
apr_status_t rv;
|
|
apr_sockaddr_t *localsa, *destsa;
|
|
|
|
if ((rv = apr_getaddrinfo(&localsa, conn->local_ip, APR_UNSPEC,
|
|
0, /* ephemeral port */
|
|
0, conn->pool)) != APR_SUCCESS) {
|
|
/* This should not fail since we have a numeric address string
|
|
* as the host. */
|
|
ap_log_error(APLOG_MARK, APLOG_CRIT, rv, srv,
|
|
"rfc1413: apr_getaddrinfo(%s) failed",
|
|
conn->local_ip);
|
|
return rv;
|
|
}
|
|
|
|
if ((rv = apr_getaddrinfo(&destsa, conn->remote_ip,
|
|
localsa->sa.sin.sin_family, /* has to match */
|
|
RFC1413_PORT, 0, conn->pool)) != APR_SUCCESS) {
|
|
/* This should not fail since we have a numeric address string
|
|
* as the host. */
|
|
ap_log_error(APLOG_MARK, APLOG_CRIT, rv, srv,
|
|
"rfc1413: apr_getaddrinfo(%s) failed",
|
|
conn->remote_ip);
|
|
return rv;
|
|
}
|
|
|
|
if ((rv = apr_create_socket(newsock,
|
|
localsa->sa.sin.sin_family, /* has to match */
|
|
SOCK_STREAM, conn->pool)) != APR_SUCCESS) {
|
|
ap_log_error(APLOG_MARK, APLOG_CRIT, rv, srv,
|
|
"rfc1413: error creating query socket");
|
|
return rv;
|
|
}
|
|
|
|
if ((rv = apr_setsocketopt(*newsock, APR_SO_TIMEOUT,
|
|
ap_rfc1413_timeout * APR_USEC_PER_SEC))
|
|
!= APR_SUCCESS) {
|
|
ap_log_error(APLOG_MARK, APLOG_CRIT, rv, srv,
|
|
"rfc1413: error setting query socket timeout");
|
|
apr_close_socket(*newsock);
|
|
return rv;
|
|
}
|
|
|
|
/*
|
|
* Bind the local and remote ends of the query socket to the same
|
|
* IP addresses as the connection under investigation. We go
|
|
* through all this trouble because the local or remote system
|
|
* might have more than one network address. The RFC1413 etc.
|
|
* client sends only port numbers; the server takes the IP
|
|
* addresses from the query socket.
|
|
*/
|
|
|
|
if ((rv = apr_bind(*newsock, localsa)) != APR_SUCCESS) {
|
|
ap_log_error(APLOG_MARK, APLOG_CRIT, rv, srv,
|
|
"rfc1413: Error binding query socket to local port");
|
|
apr_close_socket(*newsock);
|
|
return rv;
|
|
}
|
|
|
|
/*
|
|
* errors from connect usually imply the remote machine doesn't support
|
|
* the service; don't log such an error
|
|
*/
|
|
if ((rv = apr_connect(*newsock, destsa)) != APR_SUCCESS) {
|
|
apr_close_socket(*newsock);
|
|
return rv;
|
|
}
|
|
|
|
return APR_SUCCESS;
|
|
}
|
|
|
|
static apr_status_t rfc1413_query(apr_socket_t *sock, conn_rec *conn,
|
|
server_rec *srv)
|
|
{
|
|
apr_port_t rmt_port, our_port;
|
|
apr_port_t sav_rmt_port, sav_our_port;
|
|
size_t i;
|
|
char *cp;
|
|
char buffer[RFC1413_MAXDATA + 1];
|
|
char user[RFC1413_USERLEN + 1]; /* XXX */
|
|
int buflen;
|
|
apr_sockaddr_t *localsa;
|
|
|
|
apr_get_sockaddr(&localsa, APR_LOCAL, sock);
|
|
apr_get_port(&sav_our_port, localsa);
|
|
sav_rmt_port = RFC1413_PORT;
|
|
|
|
/* send the data */
|
|
buflen = apr_snprintf(buffer, sizeof(buffer), "%hu,%hu\r\n", sav_rmt_port,
|
|
sav_our_port);
|
|
ap_xlate_proto_to_ascii(buffer, buflen);
|
|
|
|
/* send query to server. Handle short write. */
|
|
i = 0;
|
|
while (i < strlen(buffer)) {
|
|
apr_size_t j = strlen(buffer + i);
|
|
apr_status_t status;
|
|
status = apr_send(sock, buffer+i, &j);
|
|
if (status != APR_SUCCESS) {
|
|
ap_log_error(APLOG_MARK, APLOG_CRIT, status, srv,
|
|
"write: rfc1413: error sending request");
|
|
return status;
|
|
}
|
|
else if (j > 0) {
|
|
i+=j;
|
|
}
|
|
}
|
|
|
|
/*
|
|
* Read response from server. - the response should be newline
|
|
* terminated according to rfc - make sure it doesn't stomp its
|
|
* way out of the buffer.
|
|
*/
|
|
|
|
i = 0;
|
|
memset(buffer, '\0', sizeof(buffer));
|
|
/*
|
|
* Note that the strchr function below checks for \012 instead of '\n'
|
|
* this allows it to work on both ASCII and EBCDIC machines.
|
|
*/
|
|
while((cp = strchr(buffer, '\012')) == NULL && i < sizeof(buffer) - 1) {
|
|
apr_size_t j = sizeof(buffer) - 1 - i;
|
|
apr_status_t status;
|
|
status = apr_recv(sock, buffer+i, &j);
|
|
if (status != APR_SUCCESS) {
|
|
ap_log_error(APLOG_MARK, APLOG_CRIT, status, srv,
|
|
"read: rfc1413: error reading response");
|
|
return status;
|
|
}
|
|
else if (j > 0) {
|
|
i+=j;
|
|
}
|
|
else if (status == APR_SUCCESS && j == 0) {
|
|
/* Oops... we ran out of data before finding newline */
|
|
return APR_EINVAL;
|
|
}
|
|
}
|
|
|
|
/* RFC1413_USERLEN = 512 */
|
|
ap_xlate_proto_from_ascii(buffer, i);
|
|
if (sscanf(buffer, "%hu , %hu : USERID :%*[^:]:%512s", &rmt_port, &our_port,
|
|
user) != 3 || sav_rmt_port != rmt_port
|
|
|| sav_our_port != our_port)
|
|
return APR_EINVAL;
|
|
|
|
/*
|
|
* Strip trailing carriage return. It is part of the
|
|
* protocol, not part of the data.
|
|
*/
|
|
|
|
if ((cp = strchr(user, '\r')))
|
|
*cp = '\0';
|
|
|
|
conn->remote_logname = apr_pstrdup(conn->pool, user);
|
|
|
|
return APR_SUCCESS;
|
|
}
|
|
|
|
char *ap_rfc1413(conn_rec *conn, server_rec *srv)
|
|
{
|
|
apr_socket_t *sock;
|
|
apr_status_t rv;
|
|
|
|
rv = rfc1413_connect(&sock, conn, srv);
|
|
if (rv == APR_SUCCESS) {
|
|
rv = rfc1413_query(sock, conn, srv);
|
|
apr_close_socket(sock);
|
|
}
|
|
if (rv != APR_SUCCESS) {
|
|
conn->remote_logname = FROM_UNKNOWN;
|
|
}
|
|
return conn->remote_logname;
|
|
}
|