version 1.16.2.3, 2002/06/02 22:56:09 |
version 1.17, 2001/05/30 12:55:06 |
|
|
#include "match.h" |
#include "match.h" |
#include "log.h" |
#include "log.h" |
#include "canohost.h" |
#include "canohost.h" |
#include "channels.h" |
#include "channel.h" |
#include "auth-options.h" |
#include "auth-options.h" |
#include "servconf.h" |
#include "servconf.h" |
#include "bufaux.h" |
|
#include "misc.h" |
|
#include "monitor_wrap.h" |
|
#include "auth.h" |
|
|
|
/* Flags set authorized_keys flags */ |
/* Flags set authorized_keys flags */ |
int no_port_forwarding_flag = 0; |
int no_port_forwarding_flag = 0; |
|
|
forced_command = NULL; |
forced_command = NULL; |
} |
} |
channel_clear_permitted_opens(); |
channel_clear_permitted_opens(); |
auth_debug_reset(); |
|
} |
} |
|
|
/* |
/* |
|
|
while (*opts && *opts != ' ' && *opts != '\t') { |
while (*opts && *opts != ' ' && *opts != '\t') { |
cp = "no-port-forwarding"; |
cp = "no-port-forwarding"; |
if (strncasecmp(opts, cp, strlen(cp)) == 0) { |
if (strncasecmp(opts, cp, strlen(cp)) == 0) { |
auth_debug_add("Port forwarding disabled."); |
packet_send_debug("Port forwarding disabled."); |
no_port_forwarding_flag = 1; |
no_port_forwarding_flag = 1; |
opts += strlen(cp); |
opts += strlen(cp); |
goto next_option; |
goto next_option; |
} |
} |
cp = "no-agent-forwarding"; |
cp = "no-agent-forwarding"; |
if (strncasecmp(opts, cp, strlen(cp)) == 0) { |
if (strncasecmp(opts, cp, strlen(cp)) == 0) { |
auth_debug_add("Agent forwarding disabled."); |
packet_send_debug("Agent forwarding disabled."); |
no_agent_forwarding_flag = 1; |
no_agent_forwarding_flag = 1; |
opts += strlen(cp); |
opts += strlen(cp); |
goto next_option; |
goto next_option; |
} |
} |
cp = "no-X11-forwarding"; |
cp = "no-X11-forwarding"; |
if (strncasecmp(opts, cp, strlen(cp)) == 0) { |
if (strncasecmp(opts, cp, strlen(cp)) == 0) { |
auth_debug_add("X11 forwarding disabled."); |
packet_send_debug("X11 forwarding disabled."); |
no_x11_forwarding_flag = 1; |
no_x11_forwarding_flag = 1; |
opts += strlen(cp); |
opts += strlen(cp); |
goto next_option; |
goto next_option; |
} |
} |
cp = "no-pty"; |
cp = "no-pty"; |
if (strncasecmp(opts, cp, strlen(cp)) == 0) { |
if (strncasecmp(opts, cp, strlen(cp)) == 0) { |
auth_debug_add("Pty allocation disabled."); |
packet_send_debug("Pty allocation disabled."); |
no_pty_flag = 1; |
no_pty_flag = 1; |
opts += strlen(cp); |
opts += strlen(cp); |
goto next_option; |
goto next_option; |
|
|
if (!*opts) { |
if (!*opts) { |
debug("%.100s, line %lu: missing end quote", |
debug("%.100s, line %lu: missing end quote", |
file, linenum); |
file, linenum); |
auth_debug_add("%.100s, line %lu: missing end quote", |
packet_send_debug("%.100s, line %lu: missing end quote", |
file, linenum); |
file, linenum); |
xfree(forced_command); |
xfree(forced_command); |
forced_command = NULL; |
forced_command = NULL; |
goto bad_option; |
goto bad_option; |
} |
} |
forced_command[i] = 0; |
forced_command[i] = 0; |
auth_debug_add("Forced command: %.900s", forced_command); |
packet_send_debug("Forced command: %.900s", forced_command); |
opts++; |
opts++; |
goto next_option; |
goto next_option; |
} |
} |
|
|
if (!*opts) { |
if (!*opts) { |
debug("%.100s, line %lu: missing end quote", |
debug("%.100s, line %lu: missing end quote", |
file, linenum); |
file, linenum); |
auth_debug_add("%.100s, line %lu: missing end quote", |
packet_send_debug("%.100s, line %lu: missing end quote", |
file, linenum); |
file, linenum); |
xfree(s); |
xfree(s); |
goto bad_option; |
goto bad_option; |
} |
} |
s[i] = 0; |
s[i] = 0; |
auth_debug_add("Adding to environment: %.900s", s); |
packet_send_debug("Adding to environment: %.900s", s); |
debug("Adding to environment: %.900s", s); |
debug("Adding to environment: %.900s", s); |
opts++; |
opts++; |
new_envstring = xmalloc(sizeof(struct envstring)); |
new_envstring = xmalloc(sizeof(struct envstring)); |
|
|
} |
} |
cp = "from=\""; |
cp = "from=\""; |
if (strncasecmp(opts, cp, strlen(cp)) == 0) { |
if (strncasecmp(opts, cp, strlen(cp)) == 0) { |
|
int mname, mip; |
const char *remote_ip = get_remote_ipaddr(); |
const char *remote_ip = get_remote_ipaddr(); |
const char *remote_host = get_canonical_hostname( |
const char *remote_host = get_canonical_hostname( |
options.verify_reverse_mapping); |
options.reverse_mapping_check); |
char *patterns = xmalloc(strlen(opts) + 1); |
char *patterns = xmalloc(strlen(opts) + 1); |
|
|
opts += strlen(cp); |
opts += strlen(cp); |
|
|
if (!*opts) { |
if (!*opts) { |
debug("%.100s, line %lu: missing end quote", |
debug("%.100s, line %lu: missing end quote", |
file, linenum); |
file, linenum); |
auth_debug_add("%.100s, line %lu: missing end quote", |
packet_send_debug("%.100s, line %lu: missing end quote", |
file, linenum); |
file, linenum); |
xfree(patterns); |
xfree(patterns); |
goto bad_option; |
goto bad_option; |
} |
} |
patterns[i] = 0; |
patterns[i] = 0; |
opts++; |
opts++; |
if (match_host_and_ip(remote_host, remote_ip, |
/* |
patterns) != 1) { |
* Deny access if we get a negative |
xfree(patterns); |
* match for the hostname or the ip |
|
* or if we get not match at all |
|
*/ |
|
mname = match_hostname(remote_host, patterns, |
|
strlen(patterns)); |
|
mip = match_hostname(remote_ip, patterns, |
|
strlen(patterns)); |
|
xfree(patterns); |
|
if (mname == -1 || mip == -1 || |
|
(mname != 1 && mip != 1)) { |
log("Authentication tried for %.100s with " |
log("Authentication tried for %.100s with " |
"correct key but not from a permitted " |
"correct key but not from a permitted " |
"host (host=%.200s, ip=%.200s).", |
"host (host=%.200s, ip=%.200s).", |
pw->pw_name, remote_host, remote_ip); |
pw->pw_name, remote_host, remote_ip); |
auth_debug_add("Your host '%.200s' is not " |
packet_send_debug("Your host '%.200s' is not " |
"permitted to use this key for login.", |
"permitted to use this key for login.", |
remote_host); |
remote_host); |
/* deny access */ |
/* deny access */ |
return 0; |
return 0; |
} |
} |
xfree(patterns); |
|
/* Host name matches. */ |
/* Host name matches. */ |
goto next_option; |
goto next_option; |
} |
} |
cp = "permitopen=\""; |
cp = "permitopen=\""; |
if (strncasecmp(opts, cp, strlen(cp)) == 0) { |
if (strncasecmp(opts, cp, strlen(cp)) == 0) { |
char host[256], sport[6]; |
|
u_short port; |
u_short port; |
|
char *c, *ep; |
char *patterns = xmalloc(strlen(opts) + 1); |
char *patterns = xmalloc(strlen(opts) + 1); |
|
|
opts += strlen(cp); |
opts += strlen(cp); |
|
|
if (!*opts) { |
if (!*opts) { |
debug("%.100s, line %lu: missing end quote", |
debug("%.100s, line %lu: missing end quote", |
file, linenum); |
file, linenum); |
auth_debug_add("%.100s, line %lu: missing end quote", |
packet_send_debug("%.100s, line %lu: missing end quote", |
file, linenum); |
file, linenum); |
xfree(patterns); |
xfree(patterns); |
goto bad_option; |
goto bad_option; |
} |
} |
patterns[i] = 0; |
patterns[i] = 0; |
opts++; |
opts++; |
if (sscanf(patterns, "%255[^:]:%5[0-9]", host, sport) != 2 && |
c = strchr(patterns, ':'); |
sscanf(patterns, "%255[^/]/%5[0-9]", host, sport) != 2) { |
if (c == NULL) { |
debug("%.100s, line %lu: Bad permitopen specification " |
debug("%.100s, line %lu: permitopen: missing colon <%.100s>", |
"<%.100s>", file, linenum, patterns); |
file, linenum, patterns); |
auth_debug_add("%.100s, line %lu: " |
packet_send_debug("%.100s, line %lu: missing colon", |
"Bad permitopen specification", file, linenum); |
file, linenum); |
xfree(patterns); |
xfree(patterns); |
goto bad_option; |
goto bad_option; |
} |
} |
if ((port = a2port(sport)) == 0) { |
*c = 0; |
debug("%.100s, line %lu: Bad permitopen port <%.100s>", |
c++; |
file, linenum, sport); |
port = strtol(c, &ep, 0); |
auth_debug_add("%.100s, line %lu: " |
if (c == ep) { |
"Bad permitopen port", file, linenum); |
debug("%.100s, line %lu: permitopen: missing port <%.100s>", |
|
file, linenum, patterns); |
|
packet_send_debug("%.100s, line %lu: missing port", |
|
file, linenum); |
xfree(patterns); |
xfree(patterns); |
goto bad_option; |
goto bad_option; |
} |
} |
if (options.allow_tcp_forwarding) |
if (options.allow_tcp_forwarding) |
channel_add_permitted_opens(host, port); |
channel_add_permitted_opens(patterns, port); |
xfree(patterns); |
xfree(patterns); |
goto next_option; |
goto next_option; |
} |
} |
|
|
opts++; |
opts++; |
/* Process the next option. */ |
/* Process the next option. */ |
} |
} |
|
|
if (!use_privsep) |
|
auth_debug_send(); |
|
|
|
/* grant access */ |
/* grant access */ |
return 1; |
return 1; |
|
|
bad_option: |
bad_option: |
log("Bad options in %.100s file, line %lu: %.50s", |
log("Bad options in %.100s file, line %lu: %.50s", |
file, linenum, opts); |
file, linenum, opts); |
auth_debug_add("Bad options in %.100s file, line %lu: %.50s", |
packet_send_debug("Bad options in %.100s file, line %lu: %.50s", |
file, linenum, opts); |
file, linenum, opts); |
|
|
if (!use_privsep) |
|
auth_debug_send(); |
|
|
|
/* deny access */ |
/* deny access */ |
return 0; |
return 0; |
} |
} |