[BACK]Return to nchan.c CVS log [TXT][DIR] Up to [local] / src / usr.bin / ssh

Annotation of src/usr.bin/ssh/nchan.c, Revision 1.66

1.66    ! djm         1: /* $OpenBSD: nchan.c,v 1.65 2017/04/30 23:28:42 djm Exp $ */
1.7       markus      2: /*
1.43      markus      3:  * Copyright (c) 1999, 2000, 2001, 2002 Markus Friedl.  All rights reserved.
1.7       markus      4:  *
                      5:  * Redistribution and use in source and binary forms, with or without
                      6:  * modification, are permitted provided that the following conditions
                      7:  * are met:
                      8:  * 1. Redistributions of source code must retain the above copyright
                      9:  *    notice, this list of conditions and the following disclaimer.
                     10:  * 2. Redistributions in binary form must reproduce the above copyright
                     11:  *    notice, this list of conditions and the following disclaimer in the
                     12:  *    documentation and/or other materials provided with the distribution.
                     13:  *
                     14:  * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
                     15:  * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
                     16:  * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
                     17:  * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
                     18:  * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
                     19:  * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
                     20:  * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
                     21:  * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
                     22:  * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
                     23:  * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
                     24:  */
                     25:
1.54      stevesk    26: #include <sys/types.h>
                     27: #include <sys/socket.h>
1.58      djm        28: #include <sys/queue.h>
1.55      stevesk    29:
                     30: #include <errno.h>
1.56      stevesk    31: #include <string.h>
1.57      deraadt    32: #include <stdarg.h>
1.1       markus     33:
1.22      markus     34: #include "ssh2.h"
1.66    ! djm        35: #include "sshbuf.h"
        !            36: #include "ssherr.h"
1.3       markus     37: #include "packet.h"
1.1       markus     38: #include "channels.h"
1.13      markus     39: #include "compat.h"
1.22      markus     40: #include "log.h"
1.3       markus     41:
1.28      markus     42: /*
                     43:  * SSH Protocol 1.5 aka New Channel Protocol
                     44:  * Thanks to Martina, Axel and everyone who left Erlangen, leaving me bored.
                     45:  * Written by Markus Friedl in October 1999
                     46:  *
                     47:  * Protocol versions 1.3 and 1.5 differ in the handshake protocol used for the
                     48:  * tear down of channels:
                     49:  *
                     50:  * 1.3:        strict request-ack-protocol:
1.51      deraadt    51:  *     CLOSE   ->
                     52:  *             <-  CLOSE_CONFIRM
1.28      markus     53:  *
                     54:  * 1.5:        uses variations of:
1.51      deraadt    55:  *     IEOF    ->
                     56:  *             <-  OCLOSE
                     57:  *             <-  IEOF
                     58:  *     OCLOSE  ->
                     59:  *     i.e. both sides have to close the channel
1.28      markus     60:  *
                     61:  * 2.0: the EOF messages are optional
                     62:  *
                     63:  * See the debugging output from 'ssh -v' and 'sshd -d' of
                     64:  * ssh-1.2.27 as an example.
                     65:  *
                     66:  */
                     67:
1.13      markus     68: /* functions manipulating channel states */
1.3       markus     69: /*
1.6       markus     70:  * EVENTS update channel input/output states execute ACTIONS
1.3       markus     71:  */
1.13      markus     72: /*
                     73:  * ACTIONS: should never update the channel states
                     74:  */
1.66    ! djm        75: static void    chan_send_eof2(struct ssh *, Channel *);
        !            76: static void    chan_send_eow2(struct ssh *, Channel *);
1.13      markus     77:
                     78: /* helper */
1.66    ! djm        79: static void    chan_shutdown_write(struct ssh *, Channel *);
        !            80: static void    chan_shutdown_read(struct ssh *, Channel *);
1.13      markus     81:
1.66    ! djm        82: static const char *ostates[] = { "open", "drain", "wait_ieof", "closed" };
        !            83: static const char *istates[] = { "open", "drain", "wait_oclose", "closed" };
1.37      markus     84:
                     85: static void
                     86: chan_set_istate(Channel *c, u_int next)
                     87: {
                     88:        if (c->istate > CHAN_INPUT_CLOSED || next > CHAN_INPUT_CLOSED)
                     89:                fatal("chan_set_istate: bad state %d -> %d", c->istate, next);
1.49      markus     90:        debug2("channel %d: input %s -> %s", c->self, istates[c->istate],
1.37      markus     91:            istates[next]);
                     92:        c->istate = next;
                     93: }
1.64      djm        94:
1.37      markus     95: static void
                     96: chan_set_ostate(Channel *c, u_int next)
                     97: {
                     98:        if (c->ostate > CHAN_OUTPUT_CLOSED || next > CHAN_OUTPUT_CLOSED)
                     99:                fatal("chan_set_ostate: bad state %d -> %d", c->ostate, next);
1.49      markus    100:        debug2("channel %d: output %s -> %s", c->self, ostates[c->ostate],
1.37      markus    101:            ostates[next]);
                    102:        c->ostate = next;
                    103: }
                    104:
1.42      markus    105: void
1.66    ! djm       106: chan_read_failed(struct ssh *ssh, Channel *c)
1.6       markus    107: {
1.49      markus    108:        debug2("channel %d: read failed", c->self);
1.6       markus    109:        switch (c->istate) {
1.3       markus    110:        case CHAN_INPUT_OPEN:
1.66    ! djm       111:                chan_shutdown_read(ssh, c);
1.37      markus    112:                chan_set_istate(c, CHAN_INPUT_WAIT_DRAIN);
1.3       markus    113:                break;
                    114:        default:
1.28      markus    115:                error("channel %d: chan_read_failed for istate %d",
1.13      markus    116:                    c->self, c->istate);
1.3       markus    117:                break;
1.1       markus    118:        }
                    119: }
1.64      djm       120:
1.42      markus    121: void
1.66    ! djm       122: chan_ibuf_empty(struct ssh *ssh, Channel *c)
1.6       markus    123: {
1.49      markus    124:        debug2("channel %d: ibuf empty", c->self);
1.66    ! djm       125:        if (sshbuf_len(c->input)) {
1.28      markus    126:                error("channel %d: chan_ibuf_empty for non empty buffer",
1.13      markus    127:                    c->self);
1.3       markus    128:                return;
                    129:        }
1.6       markus    130:        switch (c->istate) {
1.3       markus    131:        case CHAN_INPUT_WAIT_DRAIN:
1.64      djm       132:                if (!(c->flags & (CHAN_CLOSE_SENT|CHAN_LOCAL)))
1.66    ! djm       133:                        chan_send_eof2(ssh, c);
1.64      djm       134:                chan_set_istate(c, CHAN_INPUT_CLOSED);
1.3       markus    135:                break;
                    136:        default:
1.28      markus    137:                error("channel %d: chan_ibuf_empty for istate %d",
1.13      markus    138:                    c->self, c->istate);
1.3       markus    139:                break;
1.1       markus    140:        }
                    141: }
1.64      djm       142:
1.42      markus    143: void
1.66    ! djm       144: chan_obuf_empty(struct ssh *ssh, Channel *c)
1.6       markus    145: {
1.49      markus    146:        debug2("channel %d: obuf empty", c->self);
1.66    ! djm       147:        if (sshbuf_len(c->output)) {
1.28      markus    148:                error("channel %d: chan_obuf_empty for non empty buffer",
1.13      markus    149:                    c->self);
1.3       markus    150:                return;
                    151:        }
1.6       markus    152:        switch (c->ostate) {
1.3       markus    153:        case CHAN_OUTPUT_WAIT_DRAIN:
1.66    ! djm       154:                chan_shutdown_write(ssh, c);
1.37      markus    155:                chan_set_ostate(c, CHAN_OUTPUT_CLOSED);
1.3       markus    156:                break;
                    157:        default:
1.28      markus    158:                error("channel %d: internal error: obuf_empty for ostate %d",
1.13      markus    159:                    c->self, c->ostate);
1.3       markus    160:                break;
                    161:        }
                    162: }
1.63      djm       163:
1.59      markus    164: void
1.66    ! djm       165: chan_rcvd_eow(struct ssh *ssh, Channel *c)
1.59      markus    166: {
                    167:        debug2("channel %d: rcvd eow", c->self);
                    168:        switch (c->istate) {
                    169:        case CHAN_INPUT_OPEN:
1.66    ! djm       170:                chan_shutdown_read(ssh, c);
1.59      markus    171:                chan_set_istate(c, CHAN_INPUT_CLOSED);
                    172:                break;
                    173:        }
                    174: }
1.64      djm       175:
1.13      markus    176: static void
1.66    ! djm       177: chan_send_eof2(struct ssh *ssh, Channel *c)
1.6       markus    178: {
1.66    ! djm       179:        int r;
        !           180:
1.49      markus    181:        debug2("channel %d: send eof", c->self);
1.13      markus    182:        switch (c->istate) {
                    183:        case CHAN_INPUT_WAIT_DRAIN:
1.66    ! djm       184:                if ((r = sshpkt_start(ssh, SSH2_MSG_CHANNEL_EOF)) != 0 ||
        !           185:                    (r = sshpkt_put_u32(ssh, c->remote_id)) != 0 ||
        !           186:                    (r = sshpkt_send(ssh)) != 0)
        !           187:                        fatal("%s: send CHANNEL_EOF: %s", __func__, ssh_err(r));
1.45      markus    188:                c->flags |= CHAN_EOF_SENT;
1.13      markus    189:                break;
                    190:        default:
1.28      markus    191:                error("channel %d: cannot send eof for istate %d",
1.13      markus    192:                    c->self, c->istate);
                    193:                break;
                    194:        }
1.1       markus    195: }
1.64      djm       196:
1.3       markus    197: static void
1.66    ! djm       198: chan_send_close2(struct ssh *ssh, Channel *c)
1.6       markus    199: {
1.66    ! djm       200:        int r;
        !           201:
1.49      markus    202:        debug2("channel %d: send close", c->self);
1.13      markus    203:        if (c->ostate != CHAN_OUTPUT_CLOSED ||
                    204:            c->istate != CHAN_INPUT_CLOSED) {
1.28      markus    205:                error("channel %d: cannot send close for istate/ostate %d/%d",
1.13      markus    206:                    c->self, c->istate, c->ostate);
                    207:        } else if (c->flags & CHAN_CLOSE_SENT) {
1.28      markus    208:                error("channel %d: already sent close", c->self);
1.13      markus    209:        } else {
1.66    ! djm       210:                if ((r = sshpkt_start(ssh, SSH2_MSG_CHANNEL_CLOSE)) != 0 ||
        !           211:                    (r = sshpkt_put_u32(ssh, c->remote_id)) != 0 ||
        !           212:                    (r = sshpkt_send(ssh)) != 0)
        !           213:                        fatal("%s: send CHANNEL_EOF: %s", __func__, ssh_err(r));
1.13      markus    214:                c->flags |= CHAN_CLOSE_SENT;
                    215:        }
1.59      markus    216: }
1.64      djm       217:
1.59      markus    218: static void
1.66    ! djm       219: chan_send_eow2(struct ssh *ssh, Channel *c)
1.59      markus    220: {
1.66    ! djm       221:        int r;
        !           222:
1.59      markus    223:        debug2("channel %d: send eow", c->self);
                    224:        if (c->ostate == CHAN_OUTPUT_CLOSED) {
                    225:                error("channel %d: must not sent eow on closed output",
                    226:                    c->self);
                    227:                return;
                    228:        }
1.61      markus    229:        if (!(datafellows & SSH_NEW_OPENSSH))
                    230:                return;
1.66    ! djm       231:        if ((r = sshpkt_start(ssh, SSH2_MSG_CHANNEL_REQUEST)) != 0 ||
        !           232:            (r = sshpkt_put_u32(ssh, c->remote_id)) != 0 ||
        !           233:            (r = sshpkt_put_cstring(ssh, "eow@openssh.com")) != 0 ||
        !           234:            (r = sshpkt_put_u8(ssh, 0)) != 0 ||
        !           235:            (r = sshpkt_send(ssh)) != 0)
        !           236:                fatal("%s: send CHANNEL_EOF: %s", __func__, ssh_err(r));
1.1       markus    237: }
1.23      markus    238:
                    239: /* shared */
                    240:
1.24      markus    241: void
1.66    ! djm       242: chan_rcvd_ieof(struct ssh *ssh, Channel *c)
1.42      markus    243: {
1.64      djm       244:        debug2("channel %d: rcvd eof", c->self);
                    245:        c->flags |= CHAN_EOF_RCVD;
                    246:        if (c->ostate == CHAN_OUTPUT_OPEN)
                    247:                chan_set_ostate(c, CHAN_OUTPUT_WAIT_DRAIN);
1.44      markus    248:        if (c->ostate == CHAN_OUTPUT_WAIT_DRAIN &&
1.66    ! djm       249:            sshbuf_len(c->output) == 0 &&
1.45      markus    250:            !CHANNEL_EFD_OUTPUT_ACTIVE(c))
1.66    ! djm       251:                chan_obuf_empty(ssh, c);
1.42      markus    252: }
1.64      djm       253:
1.42      markus    254: void
1.66    ! djm       255: chan_rcvd_oclose(struct ssh *ssh, Channel *c)
1.42      markus    256: {
1.64      djm       257:        debug2("channel %d: rcvd close", c->self);
                    258:        if (!(c->flags & CHAN_LOCAL)) {
                    259:                if (c->flags & CHAN_CLOSE_RCVD)
                    260:                        error("channel %d: protocol error: close rcvd twice",
                    261:                            c->self);
                    262:                c->flags |= CHAN_CLOSE_RCVD;
                    263:        }
                    264:        if (c->type == SSH_CHANNEL_LARVAL) {
                    265:                /* tear down larval channels immediately */
                    266:                chan_set_ostate(c, CHAN_OUTPUT_CLOSED);
                    267:                chan_set_istate(c, CHAN_INPUT_CLOSED);
                    268:                return;
                    269:        }
                    270:        switch (c->ostate) {
                    271:        case CHAN_OUTPUT_OPEN:
                    272:                /*
                    273:                 * wait until a data from the channel is consumed if a CLOSE
                    274:                 * is received
                    275:                 */
                    276:                chan_set_ostate(c, CHAN_OUTPUT_WAIT_DRAIN);
                    277:                break;
                    278:        }
                    279:        switch (c->istate) {
                    280:        case CHAN_INPUT_OPEN:
1.66    ! djm       281:                chan_shutdown_read(ssh, c);
1.64      djm       282:                chan_set_istate(c, CHAN_INPUT_CLOSED);
                    283:                break;
                    284:        case CHAN_INPUT_WAIT_DRAIN:
                    285:                if (!(c->flags & CHAN_LOCAL))
1.66    ! djm       286:                        chan_send_eof2(ssh, c);
1.64      djm       287:                chan_set_istate(c, CHAN_INPUT_CLOSED);
                    288:                break;
                    289:        }
1.42      markus    290: }
1.64      djm       291:
1.42      markus    292: void
1.66    ! djm       293: chan_write_failed(struct ssh *ssh, Channel *c)
1.42      markus    294: {
1.64      djm       295:        debug2("channel %d: write failed", c->self);
                    296:        switch (c->ostate) {
                    297:        case CHAN_OUTPUT_OPEN:
                    298:        case CHAN_OUTPUT_WAIT_DRAIN:
1.66    ! djm       299:                chan_shutdown_write(ssh, c);
1.64      djm       300:                if (strcmp(c->ctype, "session") == 0)
1.66    ! djm       301:                        chan_send_eow2(ssh, c);
1.64      djm       302:                chan_set_ostate(c, CHAN_OUTPUT_CLOSED);
                    303:                break;
                    304:        default:
                    305:                error("channel %d: chan_write_failed for ostate %d",
                    306:                    c->self, c->ostate);
                    307:                break;
                    308:        }
1.42      markus    309: }
                    310:
                    311: void
1.66    ! djm       312: chan_mark_dead(struct ssh *ssh, Channel *c)
1.24      markus    313: {
1.26      markus    314:        c->type = SSH_CHANNEL_ZOMBIE;
1.24      markus    315: }
                    316:
1.23      markus    317: int
1.66    ! djm       318: chan_is_dead(struct ssh *ssh, Channel *c, int do_send)
1.6       markus    319: {
1.26      markus    320:        if (c->type == SSH_CHANNEL_ZOMBIE) {
1.49      markus    321:                debug2("channel %d: zombie", c->self);
1.24      markus    322:                return 1;
1.26      markus    323:        }
1.23      markus    324:        if (c->istate != CHAN_INPUT_CLOSED || c->ostate != CHAN_OUTPUT_CLOSED)
                    325:                return 0;
1.45      markus    326:        if ((datafellows & SSH_BUG_EXTEOF) &&
                    327:            c->extended_usage == CHAN_EXTENDED_WRITE &&
                    328:            c->efd != -1 &&
1.66    ! djm       329:            sshbuf_len(c->extended) > 0) {
        !           330:                debug2("channel %d: active efd: %d len %zu",
        !           331:                    c->self, c->efd, sshbuf_len(c->extended));
1.45      markus    332:                return 0;
                    333:        }
1.63      djm       334:        if (c->flags & CHAN_LOCAL) {
                    335:                debug2("channel %d: is dead (local)", c->self);
                    336:                return 1;
                    337:        }
1.45      markus    338:        if (!(c->flags & CHAN_CLOSE_SENT)) {
1.50      avsm      339:                if (do_send) {
1.66    ! djm       340:                        chan_send_close2(ssh, c);
1.45      markus    341:                } else {
                    342:                        /* channel would be dead if we sent a close */
                    343:                        if (c->flags & CHAN_CLOSE_RCVD) {
1.49      markus    344:                                debug2("channel %d: almost dead",
1.45      markus    345:                                    c->self);
                    346:                                return 1;
1.32      markus    347:                        }
1.13      markus    348:                }
1.45      markus    349:        }
                    350:        if ((c->flags & CHAN_CLOSE_SENT) &&
                    351:            (c->flags & CHAN_CLOSE_RCVD)) {
1.49      markus    352:                debug2("channel %d: is dead", c->self);
1.45      markus    353:                return 1;
1.1       markus    354:        }
1.23      markus    355:        return 0;
1.13      markus    356: }
                    357:
                    358: /* helper */
                    359: static void
1.66    ! djm       360: chan_shutdown_write(struct ssh *ssh, Channel *c)
1.13      markus    361: {
1.66    ! djm       362:        sshbuf_reset(c->output);
1.64      djm       363:        if (c->type == SSH_CHANNEL_LARVAL)
1.13      markus    364:                return;
                    365:        /* shutdown failure is allowed if write failed already */
1.49      markus    366:        debug2("channel %d: close_write", c->self);
1.13      markus    367:        if (c->sock != -1) {
                    368:                if (shutdown(c->sock, SHUT_WR) < 0)
1.49      markus    369:                        debug2("channel %d: chan_shutdown_write: "
1.62      stevesk   370:                            "shutdown() failed for fd %d: %.100s",
1.13      markus    371:                            c->self, c->sock, strerror(errno));
                    372:        } else {
1.66    ! djm       373:                if (channel_close_fd(ssh, &c->wfd) < 0)
1.48      itojun    374:                        logit("channel %d: chan_shutdown_write: "
1.62      stevesk   375:                            "close() failed for fd %d: %.100s",
1.13      markus    376:                            c->self, c->wfd, strerror(errno));
                    377:        }
                    378: }
1.64      djm       379:
1.13      markus    380: static void
1.66    ! djm       381: chan_shutdown_read(struct ssh *ssh, Channel *c)
1.13      markus    382: {
1.64      djm       383:        if (c->type == SSH_CHANNEL_LARVAL)
1.13      markus    384:                return;
1.49      markus    385:        debug2("channel %d: close_read", c->self);
1.13      markus    386:        if (c->sock != -1) {
                    387:                if (shutdown(c->sock, SHUT_RD) < 0)
1.28      markus    388:                        error("channel %d: chan_shutdown_read: "
1.62      stevesk   389:                            "shutdown() failed for fd %d [i%d o%d]: %.100s",
1.28      markus    390:                            c->self, c->sock, c->istate, c->ostate,
                    391:                            strerror(errno));
1.13      markus    392:        } else {
1.66    ! djm       393:                if (channel_close_fd(ssh, &c->rfd) < 0)
1.48      itojun    394:                        logit("channel %d: chan_shutdown_read: "
1.62      stevesk   395:                            "close() failed for fd %d: %.100s",
1.13      markus    396:                            c->self, c->rfd, strerror(errno));
                    397:        }
1.1       markus    398: }