File: [local] / src / usr.sbin / inetd / inetd.c (download)
Revision 1.69, Tue Aug 22 14:47:54 2000 UTC (23 years, 9 months ago) by millert
Branch: MAIN
CVS Tags: OPENBSD_2_8_BASE, OPENBSD_2_8 Changes since 1.68: +4 -4 lines
If a user is specified in inetd.conf, set the LOGIN_SETGROUP flag too
since setting user implies setting default groups for that user.
Porblem noted by sigh@kuzirabekon.econ.nagasaki-u.ac.jp.
|
/* $OpenBSD: inetd.c,v 1.69 2000/08/22 14:47:54 millert Exp $ */
/* $NetBSD: inetd.c,v 1.11 1996/02/22 11:14:41 mycroft Exp $ */
/*
* Copyright (c) 1983,1991 The Regents of the University of California.
* All rights reserved.
*
* Redistribution and use in source and binary forms, with or without
* modification, are permitted provided that the following conditions
* are met:
* 1. Redistributions of source code must retain the above copyright
* notice, this list of conditions and the following disclaimer.
* 2. Redistributions in binary form must reproduce the above copyright
* notice, this list of conditions and the following disclaimer in the
* documentation and/or other materials provided with the distribution.
* 3. All advertising materials mentioning features or use of this software
* must display the following acknowledgement:
* This product includes software developed by the University of
* California, Berkeley and its contributors.
* 4. Neither the name of the University nor the names of its contributors
* may be used to endorse or promote products derived from this software
* without specific prior written permission.
*
* THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
* ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
* ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
* FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
* DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
* OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
* LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
* SUCH DAMAGE.
*/
#ifndef lint
char copyright[] =
"@(#) Copyright (c) 1983 Regents of the University of California.\n\
All rights reserved.\n";
#endif /* not lint */
#ifndef lint
/*static char sccsid[] = "from: @(#)inetd.c 5.30 (Berkeley) 6/3/91";*/
static char rcsid[] = "$OpenBSD: inetd.c,v 1.69 2000/08/22 14:47:54 millert Exp $";
#endif /* not lint */
/*
* Inetd - Internet super-server
*
* This program invokes all internet services as needed.
* connection-oriented services are invoked each time a
* connection is made, by creating a process. This process
* is passed the connection as file descriptor 0 and is
* expected to do a getpeername to find out the source host
* and port.
*
* Datagram oriented services are invoked when a datagram
* arrives; a process is created and passed a pending message
* on file descriptor 0. Datagram servers may either connect
* to their peer, freeing up the original socket for inetd
* to receive further messages on, or ``take over the socket'',
* processing all arriving datagrams and, eventually, timing
* out. The first type of server is said to be ``multi-threaded'';
* the second type of server ``single-threaded''.
*
* Inetd uses a configuration file which is read at startup
* and, possibly, at some later time in response to a hangup signal.
* The configuration file is ``free format'' with fields given in the
* order shown below. Continuation lines for an entry must being with
* a space or tab. All fields must be present in each entry.
*
* service name must be in /etc/services
* socket type stream/dgram/raw/rdm/seqpacket
* protocol must be in /etc/protocols
* wait/nowait[.max] single-threaded/multi-threaded, max #
* user[.group] or user[:group] user/group to run daemon as
* server program full path name
* server program arguments maximum of MAXARGS (20)
*
* For RPC services
* service name/version must be in /etc/rpc
* socket type stream/dgram/raw/rdm/seqpacket
* protocol must be in /etc/protocols
* wait/nowait[.max] single-threaded/multi-threaded
* user[.group] or user[:group] user to run daemon as
* server program full path name
* server program arguments maximum of MAXARGS (20)
*
* For non-RPC services, the "service name" can be of the form
* hostaddress:servicename, in which case the hostaddress is used
* as the host portion of the address to listen on. If hostaddress
* consists of a single `*' character, INADDR_ANY is used.
*
* A line can also consist of just
* hostaddress:
* where hostaddress is as in the preceding paragraph. Such a line must
* have no further fields; the specified hostaddress is remembered and
* used for all further lines that have no hostaddress specified,
* until the next such line (or EOF). (This is why * is provided to
* allow explicit specification of INADDR_ANY.) A line
* *:
* is implicitly in effect at the beginning of the file.
*
* The hostaddress specifier may (and often will) contain dots;
* the service name must not.
*
* For RPC services, host-address specifiers are accepted and will
* work to some extent; however, because of limitations in the
* portmapper interface, it will not work to try to give more than
* one line for any given RPC service, even if the host-address
* specifiers are different.
*
* Comment lines are indicated by a `#' in column 1.
*/
/*
* Here's the scoop concerning the user[.:]group feature:
*
* 1) set-group-option off.
*
* a) user = root: NO setuid() or setgid() is done
*
* b) other: setgid(primary group as found in passwd)
* initgroups(name, primary group)
* setuid()
*
* 2) set-group-option on.
*
* a) user = root: setgid(specified group)
* NO initgroups()
* NO setuid()
*
* b) other: setgid(specified group)
* initgroups(name, specified group)
* setuid()
*
*/
#include <sys/param.h>
#include <sys/stat.h>
#include <sys/ioctl.h>
#include <sys/socket.h>
#include <sys/un.h>
#include <sys/file.h>
#include <sys/wait.h>
#include <sys/time.h>
#include <sys/resource.h>
#ifndef RLIMIT_NOFILE
#define RLIMIT_NOFILE RLIMIT_OFILE
#endif
#include <netinet/in.h>
#include <arpa/inet.h>
#include <errno.h>
#include <signal.h>
#include <netdb.h>
#include <syslog.h>
#include <pwd.h>
#include <grp.h>
#include <stdio.h>
#include <stdlib.h>
#include <unistd.h>
#include <string.h>
#include <login_cap.h>
#include <rpc/rpc.h>
#include <rpc/pmap_clnt.h>
#include <rpcsvc/nfs_prot.h>
#include "pathnames.h"
#define TOOMANY 256 /* don't start more than TOOMANY */
#define CNT_INTVL 60 /* servers in CNT_INTVL sec. */
#define RETRYTIME (60*10) /* retry after bind or server fail */
#define SIGBLOCK (sigmask(SIGCHLD)|sigmask(SIGHUP)|sigmask(SIGALRM))
void config __P((int));
void reapchild __P((int));
void retry __P((int));
void goaway __P((int));
int debug = 0;
int nsock, maxsock;
fd_set allsock;
int toomany = TOOMANY;
int options;
int timingout;
struct servent *sp;
char *curdom;
uid_t uid;
#ifndef OPEN_MAX
#define OPEN_MAX 64
#endif
/* Reserve some descriptors, 3 stdio + at least: 1 log, 1 conf. file */
#define FD_MARGIN (8)
typeof(((struct rlimit *)0)->rlim_cur) rlim_ofile_cur = OPEN_MAX;
#ifdef RLIMIT_NOFILE
struct rlimit rlim_ofile;
#endif
struct servtab {
char *se_hostaddr; /* host address to listen on */
char *se_service; /* name of service */
int se_socktype; /* type of socket to use */
int se_family; /* address family */
char *se_proto; /* protocol used */
int se_rpcprog; /* rpc program number */
int se_rpcversl; /* rpc program lowest version */
int se_rpcversh; /* rpc program highest version */
#define isrpcservice(sep) ((sep)->se_rpcversl != 0)
pid_t se_wait; /* single threaded server */
short se_checked; /* looked at during merge */
char *se_user; /* user name to run as */
char *se_group; /* group name to run as */
struct biltin *se_bi; /* if built-in, description */
char *se_server; /* server program */
#define MAXARGV 20
char *se_argv[MAXARGV+1]; /* program arguments */
int se_fd; /* open descriptor */
union {
struct sockaddr se_un_ctrladdr;
struct sockaddr_in se_un_ctrladdr_in;
struct sockaddr_in6 se_un_ctrladdr_in6;
struct sockaddr_un se_un_ctrladdr_un;
struct sockaddr_storage se_un_ctrladdr_storage;
} se_un; /* bound address */
#define se_ctrladdr se_un.se_un_ctrladdr
#define se_ctrladdr_in se_un.se_un_ctrladdr_in
#define se_ctrladdr_in6 se_un.se_un_ctrladdr_in6
#define se_ctrladdr_un se_un.se_un_ctrladdr_un
#define se_ctrladdr_storage se_un.se_un_ctrladdr_storage
int se_ctrladdr_size;
int se_max; /* max # of instances of this service */
int se_count; /* number started since se_time */
struct timeval se_time; /* start of se_count */
#ifdef MULOG
int se_log;
#define MULOG_RFC931 0x40000000
#endif
struct servtab *se_next;
} *servtab;
void echo_stream __P((int, struct servtab *));
void discard_stream __P((int, struct servtab *));
void machtime_stream __P((int, struct servtab *));
void daytime_stream __P((int, struct servtab *));
void chargen_stream __P((int, struct servtab *));
void echo_dg __P((int, struct servtab *));
void discard_dg __P((int, struct servtab *));
void machtime_dg __P((int, struct servtab *));
void daytime_dg __P((int, struct servtab *));
void chargen_dg __P((int, struct servtab *));
struct biltin {
char *bi_service; /* internally provided service name */
int bi_socktype; /* type of socket supported */
short bi_fork; /* 1 if should fork before call */
short bi_wait; /* 1 if should wait for child */
void (*bi_fn) __P((int, struct servtab *));
} biltins[] = {
/* Echo received data */
{ "echo", SOCK_STREAM, 1, 0, echo_stream },
{ "echo", SOCK_DGRAM, 0, 0, echo_dg },
/* Internet /dev/null */
{ "discard", SOCK_STREAM, 1, 0, discard_stream },
{ "discard", SOCK_DGRAM, 0, 0, discard_dg },
/* Return 32 bit time since 1900 */
{ "time", SOCK_STREAM, 0, 0, machtime_stream },
{ "time", SOCK_DGRAM, 0, 0, machtime_dg },
/* Return human-readable time */
{ "daytime", SOCK_STREAM, 0, 0, daytime_stream },
{ "daytime", SOCK_DGRAM, 0, 0, daytime_dg },
/* Familiar character generator */
{ "chargen", SOCK_STREAM, 1, 0, chargen_stream },
{ "chargen", SOCK_DGRAM, 0, 0, chargen_dg },
{ 0 }
};
#define NUMINT (sizeof(intab) / sizeof(struct inent))
char *CONFIG = _PATH_INETDCONF;
char **Argv;
char *LastArg;
char *progname;
void logpid __P((void));
int
main(argc, argv, envp)
int argc;
char *argv[], *envp[];
{
extern char *optarg;
extern int optind;
register struct servtab *sep;
register struct passwd *pwd;
register struct group *grp = NULL;
register int tmpint;
struct sigaction sa, sapipe;
int ch, dofork;
pid_t pid;
char buf[50];
Argv = argv;
if (envp == 0 || *envp == 0)
envp = argv;
while (*envp)
envp++;
LastArg = envp[-1] + strlen(envp[-1]);
progname = strrchr(argv[0], '/');
progname = progname ? progname + 1 : argv[0];
while ((ch = getopt(argc, argv, "dR:")) != -1)
switch(ch) {
case 'd':
debug = 1;
options |= SO_DEBUG;
break;
case 'R': { /* invocation rate */
char *p;
int val;
val = strtoul(optarg, &p, 0);
if (val >= 1 && *p == NULL) {
toomany = val;
break;
}
syslog(LOG_ERR,
"-R %s: bad value for service invocation rate",
optarg);
break;
}
case '?':
default:
fprintf(stderr, "usage: %s [-R rate] [-d] [conf]\n",
progname);
exit(1);
}
argc -= optind;
argv += optind;
uid = getuid();
if (uid != 0)
CONFIG = NULL;
if (argc > 0)
CONFIG = argv[0];
if (CONFIG == NULL) {
fprintf(stderr, "%s: non-root must specify a config file\n",
progname);
exit(1);
}
if (debug == 0) {
daemon(0, 0);
if (uid == 0)
(void) setlogin("");
}
if (uid == 0) {
gid_t gid = getgid();
/* If run by hand, ensure groups vector gets trashed */
setgroups(1, &gid);
}
openlog(progname, LOG_PID | LOG_NOWAIT, LOG_DAEMON);
logpid();
#ifdef RLIMIT_NOFILE
if (getrlimit(RLIMIT_NOFILE, &rlim_ofile) < 0) {
syslog(LOG_ERR, "getrlimit: %m");
} else {
rlim_ofile_cur = rlim_ofile.rlim_cur;
if (rlim_ofile_cur == RLIM_INFINITY) /* ! */
rlim_ofile_cur = OPEN_MAX;
}
#endif
memset((char *)&sa, 0, sizeof(sa));
sigemptyset(&sa.sa_mask);
sigaddset(&sa.sa_mask, SIGALRM);
sigaddset(&sa.sa_mask, SIGCHLD);
sigaddset(&sa.sa_mask, SIGHUP);
sa.sa_handler = retry;
sigaction(SIGALRM, &sa, NULL);
config(SIGHUP);
sa.sa_handler = config;
sigaction(SIGHUP, &sa, NULL);
sa.sa_handler = reapchild;
sigaction(SIGCHLD, &sa, NULL);
sa.sa_handler = goaway;
sigaction(SIGTERM, &sa, NULL);
sa.sa_handler = goaway;
sigaction(SIGINT, &sa, NULL);
sa.sa_handler = SIG_IGN;
sigaction(SIGPIPE, &sa, &sapipe);
{
/* space for daemons to overwrite environment for ps */
#define DUMMYSIZE 100
char dummy[DUMMYSIZE];
(void)memset(dummy, 'x', DUMMYSIZE - 1);
dummy[DUMMYSIZE - 1] = '\0';
(void)setenv("inetd_dummy", dummy, 1);
}
for (;;) {
int n, ctrl = -1;
fd_set readable;
if (nsock == 0) {
(void) sigblock(SIGBLOCK);
while (nsock == 0)
sigpause(0L);
(void) sigsetmask(0L);
}
readable = allsock;
if ((n = select(maxsock + 1, &readable, NULL, NULL, NULL)) <= 0) {
if (n < 0 && errno != EINTR) {
syslog(LOG_WARNING, "select: %m");
sleep(1);
}
continue;
}
for (sep = servtab; n && sep; sep = sep->se_next)
if (sep->se_fd != -1 && FD_ISSET(sep->se_fd, &readable)) {
n--;
if (debug)
fprintf(stderr, "someone wants %s\n", sep->se_service);
if (!sep->se_wait && sep->se_socktype == SOCK_STREAM) {
ctrl = accept(sep->se_fd, NULL, NULL);
if (debug)
fprintf(stderr, "accept, ctrl %d\n", ctrl);
if (ctrl < 0) {
if (errno == EINTR)
continue;
syslog(LOG_WARNING, "accept (for %s): %m",
sep->se_service);
continue;
}
if (sep->se_family == AF_INET &&
sep->se_socktype == SOCK_STREAM) {
struct sockaddr_in peer;
int plen = sizeof(peer);
if (getpeername(ctrl, (struct sockaddr *)&peer,
&plen) < 0) {
syslog(LOG_WARNING, "could not getpeername");
close(ctrl);
continue;
}
if (ntohs(peer.sin_port) == 20) {
/* XXX ftp bounce */
close(ctrl);
continue;
}
}
} else
ctrl = sep->se_fd;
(void) sigblock(SIGBLOCK);
pid = 0;
dofork = (sep->se_bi == 0 || sep->se_bi->bi_fork);
if (dofork) {
if (sep->se_count++ == 0)
(void)gettimeofday(&sep->se_time, NULL);
else if (sep->se_count >= sep->se_max) {
struct timeval now;
(void)gettimeofday(&now, NULL);
if (now.tv_sec - sep->se_time.tv_sec >
CNT_INTVL) {
sep->se_time = now;
sep->se_count = 1;
} else {
if (!sep->se_wait &&
sep->se_socktype == SOCK_STREAM)
close(ctrl);
if (sep->se_family == AF_INET &&
ntohs(sep->se_ctrladdr_in.sin_port) >=
IPPORT_RESERVED) {
/*
* Cannot close it -- there are
* thieves on the system.
* Simply ignore the connection.
*/
--sep->se_count;
continue;
}
syslog(LOG_ERR,
"%s/%s server failing (looping), service terminated",
sep->se_service, sep->se_proto);
if (!sep->se_wait &&
sep->se_socktype == SOCK_STREAM)
close(ctrl);
FD_CLR(sep->se_fd, &allsock);
(void) close(sep->se_fd);
sep->se_fd = -1;
sep->se_count = 0;
nsock--;
sigsetmask(0L);
if (!timingout) {
timingout = 1;
alarm(RETRYTIME);
}
continue;
}
}
pid = fork();
}
if (pid < 0) {
syslog(LOG_ERR, "fork: %m");
if (!sep->se_wait && sep->se_socktype == SOCK_STREAM)
close(ctrl);
sigsetmask(0L);
sleep(1);
continue;
}
if (pid && sep->se_wait) {
sep->se_wait = pid;
FD_CLR(sep->se_fd, &allsock);
nsock--;
}
sigsetmask(0L);
if (pid == 0) {
if (sep->se_bi)
(*sep->se_bi->bi_fn)(ctrl, sep);
else {
if ((pwd = getpwnam(sep->se_user)) == NULL) {
syslog(LOG_ERR,
"getpwnam: %s: No such user",
sep->se_user);
if (sep->se_socktype != SOCK_STREAM)
recv(0, buf, sizeof (buf), 0);
_exit(1);
}
if (setsid() <0)
syslog(LOG_ERR, "%s: setsid: %m",
sep->se_service);
if (sep->se_group &&
(grp = getgrnam(sep->se_group)) == NULL) {
syslog(LOG_ERR,
"getgrnam: %s: No such group",
sep->se_group);
if (sep->se_socktype != SOCK_STREAM)
recv(0, buf, sizeof (buf), 0);
_exit(1);
}
if (uid != 0) {
/* a user running private inetd */
if (uid != pwd->pw_uid)
_exit(1);
} else {
tmpint = LOGIN_SETALL &
~(LOGIN_SETGROUP|LOGIN_SETLOGIN);
if (pwd->pw_uid)
tmpint |= LOGIN_SETGROUP|LOGIN_SETLOGIN;
if (sep->se_group) {
pwd->pw_gid = grp->gr_gid;
tmpint |= LOGIN_SETGROUP;
}
if (setusercontext(0, pwd, pwd->pw_uid,
tmpint) < 0)
syslog(LOG_ERR,
"%s/%s: setusercontext: %m",
sep->se_service,
sep->se_proto);
}
if (debug)
fprintf(stderr, "%d execl %s\n",
getpid(), sep->se_server);
#ifdef MULOG
if (sep->se_log)
dolog(sep, ctrl);
#endif
dup2(ctrl, 0);
close(ctrl);
dup2(0, 1);
dup2(0, 2);
closelog();
for (tmpint = rlim_ofile_cur-1; --tmpint > 2; )
(void)close(tmpint);
sigaction(SIGPIPE, &sapipe, NULL);
execv(sep->se_server, sep->se_argv);
if (sep->se_socktype != SOCK_STREAM)
recv(0, buf, sizeof (buf), 0);
syslog(LOG_ERR, "execv %s: %m", sep->se_server);
_exit(1);
}
}
if (!sep->se_wait && sep->se_socktype == SOCK_STREAM)
close(ctrl);
}
}
}
int
dg_badinput(sa)
struct sockaddr *sa;
{
struct in_addr in;
#ifdef INET6
struct in6_addr *in6;
#endif
u_int16_t port;
int i;
switch (sa->sa_family) {
case AF_INET:
in.s_addr = ntohl(((struct sockaddr_in *)sa)->sin_addr.s_addr);
port = ntohs(((struct sockaddr_in *)sa)->sin_port);
v4chk:
if (IN_MULTICAST(in.s_addr))
goto bad;
switch ((in.s_addr & 0xff000000) >> 24) {
case 0: case 127: case 255:
goto bad;
}
/* XXX check for subnet broadcast using getifaddrs(3) */
break;
#ifdef INET6
case AF_INET6:
in6 = &((struct sockaddr_in6 *)sa)->sin6_addr;
port = ntohs(((struct sockaddr_in6 *)sa)->sin6_port);
if (IN6_IS_ADDR_MULTICAST(in6) || IN6_IS_ADDR_UNSPECIFIED(in6))
goto bad;
/*
* OpenBSD does not support IPv4 mapped adderss (RFC2553
* inbound behavior) at all. We should drop it.
*/
if (IN6_IS_ADDR_V4MAPPED(in6))
goto bad;
if (IN6_IS_ADDR_V4COMPAT(in6)) {
memcpy(&in, &in6->s6_addr[12], sizeof(in));
in.s_addr = ntohl(in.s_addr);
goto v4chk;
}
break;
#endif
default:
/* XXX unsupported af, is it safe to assume it to be safe? */
return 0;
}
if (port < IPPORT_RESERVED || port == NFS_PORT)
goto bad;
return (0);
bad:
return (1);
}
void
reapchild(sig)
int sig;
{
pid_t pid;
int save_errno = errno, status;
register struct servtab *sep;
for (;;) {
pid = wait3(&status, WNOHANG, NULL);
if (pid <= 0)
break;
if (debug)
fprintf(stderr, "%d reaped, status %x\n", pid, status);
for (sep = servtab; sep; sep = sep->se_next)
if (sep->se_wait == pid) {
if (WIFEXITED(status) && WEXITSTATUS(status))
syslog(LOG_WARNING,
"%s: exit status 0x%x",
sep->se_server, WEXITSTATUS(status));
else if (WIFSIGNALED(status))
syslog(LOG_WARNING,
"%s: exit signal 0x%x",
sep->se_server, WTERMSIG(status));
sep->se_wait = 1;
FD_SET(sep->se_fd, &allsock);
nsock++;
if (debug)
fprintf(stderr, "restored %s, fd %d\n",
sep->se_service, sep->se_fd);
}
}
errno = save_errno;
}
int setconfig __P((void));
void endconfig __P((void));
void register_rpc __P((struct servtab *));
void unregister_rpc __P((struct servtab *));
void freeconfig __P((struct servtab *));
void print_service __P((char *, struct servtab *));
void setup __P((struct servtab *));
struct servtab *getconfigent __P((void));
struct servtab *enter __P((struct servtab *));
int matchconf __P((struct servtab *, struct servtab *));
void
config(sig)
int sig;
{
register struct servtab *sep, *cp, **sepp;
int omask;
int n, add;
char protoname[10];
if (!setconfig()) {
syslog(LOG_ERR, "%s: %m", CONFIG);
return;
}
for (sep = servtab; sep; sep = sep->se_next)
sep->se_checked = 0;
cp = getconfigent();
while (cp != NULL) {
for (sep = servtab; sep; sep = sep->se_next)
if (matchconf(sep, cp))
break;
add = 0;
if (sep != 0) {
int i;
#define SWAP(type, a, b) {type c=(type)a; (type)a=(type)b; (type)b=(type)c;}
omask = sigblock(SIGBLOCK);
/*
* sep->se_wait may be holding the pid of a daemon
* that we're waiting for. If so, don't overwrite
* it unless the config file explicitly says don't
* wait.
*/
if (cp->se_bi == 0 &&
(sep->se_wait == 1 || cp->se_wait == 0))
sep->se_wait = cp->se_wait;
SWAP(int, cp->se_max, sep->se_max);
SWAP(char *, sep->se_user, cp->se_user);
SWAP(char *, sep->se_group, cp->se_group);
SWAP(char *, sep->se_server, cp->se_server);
for (i = 0; i < MAXARGV; i++)
SWAP(char *, sep->se_argv[i], cp->se_argv[i]);
#undef SWAP
if (isrpcservice(sep))
unregister_rpc(sep);
sep->se_rpcversl = cp->se_rpcversl;
sep->se_rpcversh = cp->se_rpcversh;
sigsetmask(omask);
freeconfig(cp);
add = 1;
} else {
sep = enter(cp);
}
sep->se_checked = 1;
switch (sep->se_family) {
case AF_UNIX:
if (sep->se_fd != -1)
break;
(void)unlink(sep->se_service);
n = strlen(sep->se_service);
if (n > sizeof sep->se_ctrladdr_un.sun_path - 1)
n = sizeof sep->se_ctrladdr_un.sun_path - 1;
strncpy(sep->se_ctrladdr_un.sun_path,
sep->se_service, n);
sep->se_ctrladdr_un.sun_path[n] = '\0';
sep->se_ctrladdr_un.sun_family = AF_UNIX;
sep->se_ctrladdr_size = n +
sizeof sep->se_ctrladdr_un.sun_family;
setup(sep);
break;
case AF_INET:
sep->se_ctrladdr_in.sin_family = AF_INET;
/* se_ctrladdr_in was set in getconfigent */
sep->se_ctrladdr_size = sizeof sep->se_ctrladdr_in;
if (isrpcservice(sep)) {
struct rpcent *rp;
sep->se_rpcprog = atoi(sep->se_service);
if (sep->se_rpcprog == 0) {
rp = getrpcbyname(sep->se_service);
if (rp == 0) {
syslog(LOG_ERR,
"%s: unknown rpc service",
sep->se_service);
goto serv_unknown;
}
sep->se_rpcprog = rp->r_number;
}
if (sep->se_fd == -1)
setup(sep);
if (sep->se_fd != -1)
register_rpc(sep);
} else {
u_short port = htons(atoi(sep->se_service));
if (!port) {
/*XXX*/
strncpy(protoname, sep->se_proto,
sizeof(protoname));
if (isdigit(protoname[strlen(protoname) - 1]))
protoname[strlen(protoname) - 1] = '\0';
sp = getservbyname(sep->se_service,
protoname);
if (sp == 0) {
syslog(LOG_ERR,
"%s/%s: unknown service",
sep->se_service, sep->se_proto);
goto serv_unknown;
}
port = sp->s_port;
}
if (port != sep->se_ctrladdr_in.sin_port) {
sep->se_ctrladdr_in.sin_port = port;
if (sep->se_fd != -1) {
FD_CLR(sep->se_fd, &allsock);
nsock--;
(void) close(sep->se_fd);
}
sep->se_fd = -1;
}
if (sep->se_fd == -1)
setup(sep);
}
break;
case AF_INET6:
sep->se_ctrladdr_in6.sin6_family = AF_INET6;
/* se_ctrladdr_in was set in getconfigent */
sep->se_ctrladdr_size = sizeof sep->se_ctrladdr_in6;
if (isrpcservice(sep)) {
struct rpcent *rp;
sep->se_rpcprog = atoi(sep->se_service);
if (sep->se_rpcprog == 0) {
rp = getrpcbyname(sep->se_service);
if (rp == 0) {
syslog(LOG_ERR,
"%s: unknown rpc service",
sep->se_service);
goto serv_unknown;
}
sep->se_rpcprog = rp->r_number;
}
if (sep->se_fd == -1)
setup(sep);
if (sep->se_fd != -1)
register_rpc(sep);
} else {
u_short port = htons(atoi(sep->se_service));
if (!port) {
/*XXX*/
strncpy(protoname, sep->se_proto,
sizeof(protoname));
if (isdigit(protoname[strlen(protoname) - 1]))
protoname[strlen(protoname) - 1] = '\0';
sp = getservbyname(sep->se_service,
protoname);
if (sp == 0) {
syslog(LOG_ERR,
"%s/%s: unknown service",
sep->se_service, sep->se_proto);
goto serv_unknown;
}
port = sp->s_port;
}
if (port != sep->se_ctrladdr_in6.sin6_port) {
sep->se_ctrladdr_in6.sin6_port = port;
if (sep->se_fd != -1) {
FD_CLR(sep->se_fd, &allsock);
nsock--;
(void) close(sep->se_fd);
}
sep->se_fd = -1;
}
if (sep->se_fd == -1)
setup(sep);
}
break;
}
serv_unknown:
if (cp->se_next != NULL) {
struct servtab *tmp = cp;
cp = cp->se_next;
free(tmp);
} else {
free(cp);
cp = getconfigent();
}
if (debug)
print_service(add ? "REDO" : "ADD", sep);
}
endconfig();
/*
* Purge anything not looked at above.
*/
omask = sigblock(SIGBLOCK);
sepp = &servtab;
while ((sep = *sepp)) {
if (sep->se_checked) {
sepp = &sep->se_next;
continue;
}
*sepp = sep->se_next;
if (sep->se_fd != -1) {
FD_CLR(sep->se_fd, &allsock);
nsock--;
(void) close(sep->se_fd);
}
if (isrpcservice(sep))
unregister_rpc(sep);
if (sep->se_family == AF_UNIX)
(void)unlink(sep->se_service);
if (debug)
print_service("FREE", sep);
freeconfig(sep);
free((char *)sep);
}
(void) sigsetmask(omask);
}
void
retry(sig)
int sig;
{
register struct servtab *sep;
timingout = 0;
for (sep = servtab; sep; sep = sep->se_next) {
if (sep->se_fd == -1) {
switch (sep->se_family) {
case AF_UNIX:
case AF_INET:
case AF_INET6:
setup(sep);
if (sep->se_fd != -1 && isrpcservice(sep))
register_rpc(sep);
break;
}
}
}
}
void
goaway(sig)
int sig;
{
register struct servtab *sep;
for (sep = servtab; sep; sep = sep->se_next) {
if (sep->se_fd == -1)
continue;
switch (sep->se_family) {
case AF_UNIX:
(void)unlink(sep->se_service);
break;
case AF_INET:
case AF_INET6:
if (sep->se_wait == 1 && isrpcservice(sep))
unregister_rpc(sep);
break;
}
(void)close(sep->se_fd);
}
(void)unlink(_PATH_INETDPID);
exit(0);
}
int bump_nofile __P((void));
void
setup(sep)
register struct servtab *sep;
{
int on = 1;
int r;
if ((sep->se_fd = socket(sep->se_family, sep->se_socktype, 0)) < 0) {
syslog(LOG_ERR, "%s/%s: socket: %m",
sep->se_service, sep->se_proto);
return;
}
#define turnon(fd, opt) \
setsockopt(fd, SOL_SOCKET, opt, (char *)&on, sizeof (on))
if (strncmp(sep->se_proto, "tcp", 3) == 0 && (options & SO_DEBUG) &&
turnon(sep->se_fd, SO_DEBUG) < 0)
syslog(LOG_ERR, "setsockopt (SO_DEBUG): %m");
if (turnon(sep->se_fd, SO_REUSEADDR) < 0)
syslog(LOG_ERR, "setsockopt (SO_REUSEADDR): %m");
#undef turnon
if (isrpcservice(sep)) {
struct passwd *pwd;
/*
* for RPC services, attempt to use a reserved port
* if they are going to be running as root.
*
* Also, zero out the port for all RPC services; let bind()
* find one.
*/
sep->se_ctrladdr_in.sin_port = 0;
if (sep->se_user && (pwd = getpwnam(sep->se_user)) &&
pwd->pw_uid == 0 && uid == 0)
r = bindresvport(sep->se_fd, &sep->se_ctrladdr_in);
else {
r = bind(sep->se_fd, &sep->se_ctrladdr,
sep->se_ctrladdr_size);
if (r == 0) {
int len = sep->se_ctrladdr_size;
int saveerrno = errno;
/* update se_ctrladdr_in.sin_port */
r = getsockname(sep->se_fd, &sep->se_ctrladdr,
&len);
if (r <= 0)
errno = saveerrno;
}
}
} else
r = bind(sep->se_fd, &sep->se_ctrladdr, sep->se_ctrladdr_size);
if (r < 0) {
syslog(LOG_ERR, "%s/%s: bind: %m",
sep->se_service, sep->se_proto);
(void) close(sep->se_fd);
sep->se_fd = -1;
if (!timingout) {
timingout = 1;
alarm(RETRYTIME);
}
return;
}
if (sep->se_socktype == SOCK_STREAM)
listen(sep->se_fd, 10);
FD_SET(sep->se_fd, &allsock);
nsock++;
if (sep->se_fd > maxsock) {
maxsock = sep->se_fd;
if (maxsock > rlim_ofile_cur - FD_MARGIN)
bump_nofile();
}
}
void
register_rpc(sep)
register struct servtab *sep;
{
int n;
struct sockaddr_in sin;
struct protoent *pp;
if ((pp = getprotobyname(sep->se_proto+4)) == NULL) {
syslog(LOG_ERR, "%s: getproto: %m",
sep->se_proto);
return;
}
n = sizeof sin;
if (getsockname(sep->se_fd, (struct sockaddr *)&sin, &n) < 0) {
syslog(LOG_ERR, "%s/%s: getsockname: %m",
sep->se_service, sep->se_proto);
return;
}
for (n = sep->se_rpcversl; n <= sep->se_rpcversh; n++) {
if (debug)
fprintf(stderr, "pmap_set: %u %u %u %u\n",
sep->se_rpcprog, n, pp->p_proto,
ntohs(sin.sin_port));
(void)pmap_unset(sep->se_rpcprog, n);
if (!pmap_set(sep->se_rpcprog, n, pp->p_proto, ntohs(sin.sin_port)))
syslog(LOG_ERR, "%s %s: pmap_set: %u %u %u %u: %m",
sep->se_service, sep->se_proto,
sep->se_rpcprog, n, pp->p_proto,
ntohs(sin.sin_port));
}
}
void
unregister_rpc(sep)
register struct servtab *sep;
{
int n;
for (n = sep->se_rpcversl; n <= sep->se_rpcversh; n++) {
if (debug)
fprintf(stderr, "pmap_unset(%u, %u)\n",
sep->se_rpcprog, n);
if (!pmap_unset(sep->se_rpcprog, n))
syslog(LOG_ERR, "pmap_unset(%u, %u)",
sep->se_rpcprog, n);
}
}
struct servtab *
enter(cp)
struct servtab *cp;
{
register struct servtab *sep;
int omask;
sep = (struct servtab *)malloc(sizeof (*sep));
if (sep == NULL) {
syslog(LOG_ERR, "Out of memory.");
exit(-1);
}
*sep = *cp;
sep->se_fd = -1;
sep->se_rpcprog = -1;
omask = sigblock(SIGBLOCK);
sep->se_next = servtab;
servtab = sep;
sigsetmask(omask);
return (sep);
}
int
matchconf (old, new)
struct servtab *old;
struct servtab *new;
{
if (strcmp(old->se_service, new->se_service) != 0)
return (0);
if (strcmp(old->se_hostaddr, new->se_hostaddr) != 0)
return (0);
if (strcmp(old->se_proto, new->se_proto) != 0)
return (0);
/*
* If the new servtab is bound to a specific address, check that the
* old servtab is bound to the same entry. If the new service is not
* bound to a specific address then the check of se_hostaddr above
* is sufficient.
*/
if (old->se_family == AF_INET && new->se_family == AF_INET &&
bcmp(&old->se_ctrladdr_in.sin_addr,
&new->se_ctrladdr_in.sin_addr,
sizeof(new->se_ctrladdr_in.sin_addr)) != 0)
return (0);
if (old->se_family == AF_INET6 && new->se_family == AF_INET6 &&
bcmp(&old->se_ctrladdr_in6.sin6_addr,
&new->se_ctrladdr_in6.sin6_addr,
sizeof(new->se_ctrladdr_in6.sin6_addr)) != 0)
return (0);
if (old->se_family == AF_INET6 && new->se_family == AF_INET6 &&
old->se_ctrladdr_in6.sin6_scope_id !=
new->se_ctrladdr_in6.sin6_scope_id)
return (0);
return (1);
}
FILE *fconfig = NULL;
char line[1024];
char *defhost;
char *skip __P((char **, int));
char *nextline __P((FILE *));
char *newstr __P((char *));
struct servtab *dupconfig __P((struct servtab *));
int
setconfig()
{
if (defhost) free(defhost);
defhost = newstr("*");
if (fconfig != NULL) {
fseek(fconfig, 0L, SEEK_SET);
return (1);
}
fconfig = fopen(CONFIG, "r");
return (fconfig != NULL);
}
void
endconfig()
{
if (fconfig) {
(void) fclose(fconfig);
fconfig = NULL;
}
if (defhost) {
free(defhost);
defhost = 0;
}
}
struct servtab *
getconfigent()
{
register struct servtab *sep;
int argc;
char *cp, *arg, *s;
char *hostdelim;
struct servtab *nsep;
struct servtab *psep;
sep = (struct servtab *) malloc(sizeof(struct servtab));
if (sep == NULL) {
syslog(LOG_ERR, "malloc: %m");
exit(-1);
}
memset(sep, 0, sizeof *sep);
more:
freeconfig(sep);
#ifdef MULOG
while ((cp = nextline(fconfig)) && *cp == '#') {
/* Avoid use of `skip' if there is a danger of it looking
* at continuation lines.
*/
do {
cp++;
} while (*cp == ' ' || *cp == '\t');
if (*cp == '\0')
continue;
if ((arg = skip(&cp, 0)) == NULL)
continue;
if (strcmp(arg, "DOMAIN"))
continue;
if (curdom)
free(curdom);
curdom = NULL;
while (*cp == ' ' || *cp == '\t')
cp++;
if (*cp == '\0')
continue;
arg = cp;
while (*cp && *cp != ' ' && *cp != '\t')
cp++;
if (*cp != '\0')
*cp++ = '\0';
curdom = newstr(arg);
}
#else
while ((cp = nextline(fconfig)) && *cp == '#')
;
#endif
if (cp == NULL) {
free(sep);
return (NULL);
}
memset((char *)sep, 0, sizeof *sep);
arg = skip(&cp, 0);
if (arg == NULL) {
/* A blank line. */
goto more;
}
/* Check for a host name. */
hostdelim = strrchr(arg, ':');
if (hostdelim) {
*hostdelim = '\0';
if (arg[0] == '[' && hostdelim > arg && hostdelim[-1] == ']') {
hostdelim[-1] = '\0';
sep->se_hostaddr = newstr(arg + 1);
} else
sep->se_hostaddr = newstr(arg);
arg = hostdelim + 1;
/*
* If the line is of the form `host:', then just change the
* default host for the following lines.
*/
if (*arg == '\0') {
arg = skip(&cp, 0);
if (cp == NULL) {
free(defhost);
defhost = newstr(sep->se_hostaddr);
goto more;
}
}
} else
sep->se_hostaddr = newstr(defhost);
sep->se_service = newstr(arg);
if ((arg = skip(&cp, 1)) == NULL)
goto more;
if (strcmp(arg, "stream") == 0)
sep->se_socktype = SOCK_STREAM;
else if (strcmp(arg, "dgram") == 0)
sep->se_socktype = SOCK_DGRAM;
else if (strcmp(arg, "rdm") == 0)
sep->se_socktype = SOCK_RDM;
else if (strcmp(arg, "seqpacket") == 0)
sep->se_socktype = SOCK_SEQPACKET;
else if (strcmp(arg, "raw") == 0)
sep->se_socktype = SOCK_RAW;
else
sep->se_socktype = -1;
if ((arg = skip(&cp, 1)) == NULL)
goto more;
sep->se_proto = newstr(arg);
if (strcmp(sep->se_proto, "unix") == 0) {
sep->se_family = AF_UNIX;
} else {
sep->se_family = AF_INET;
if (sep->se_proto[strlen(sep->se_proto) - 1] == '6')
sep->se_family = AF_INET6;
if (strncmp(sep->se_proto, "rpc/", 4) == 0) {
char *cp, *ccp;
long l;
cp = strchr(sep->se_service, '/');
if (cp == 0) {
syslog(LOG_ERR, "%s: no rpc version",
sep->se_service);
goto more;
}
*cp++ = '\0';
l = strtol(cp, &ccp, 0);
if (ccp == cp || l < 0 || l > INT_MAX) {
badafterall:
syslog(LOG_ERR, "%s/%s: bad rpc version",
sep->se_service, cp);
goto more;
}
sep->se_rpcversl = sep->se_rpcversh = l;
if (*ccp == '-') {
cp = ccp + 1;
l = strtol(cp, &ccp, 0);
if (ccp == cp || l < 0 || l > INT_MAX ||
l < sep->se_rpcversl || *ccp)
goto badafterall;
sep->se_rpcversh = l;
} else if (*ccp != '\0')
goto badafterall;
}
}
arg = skip(&cp, 1);
if (arg == NULL)
goto more;
s = strchr(arg, '.');
if (s) {
*s++ = '\0';
sep->se_max = atoi(s);
} else
sep->se_max = toomany;
sep->se_wait = strcmp(arg, "wait") == 0;
if ((arg = skip(&cp, 1)) == NULL)
goto more;
sep->se_user = newstr(arg);
arg = strchr(sep->se_user, '.');
if (arg == NULL)
arg = strchr(sep->se_user, ':');
if (arg) {
*arg++ = '\0';
sep->se_group = newstr(arg);
}
if ((arg = skip(&cp, 1)) == NULL)
goto more;
sep->se_server = newstr(arg);
if (strcmp(sep->se_server, "internal") == 0) {
struct biltin *bi;
for (bi = biltins; bi->bi_service; bi++)
if (bi->bi_socktype == sep->se_socktype &&
strcmp(bi->bi_service, sep->se_service) == 0)
break;
if (bi->bi_service == 0) {
syslog(LOG_ERR, "internal service %s unknown",
sep->se_service);
goto more;
}
sep->se_bi = bi;
sep->se_wait = bi->bi_wait;
} else
sep->se_bi = NULL;
argc = 0;
for (arg = skip(&cp, 0); cp; arg = skip(&cp, 0)) {
#if MULOG
char *colon;
if (argc == 0 && (colon = strrchr(arg, ':'))) {
while (arg < colon) {
int x;
char *ccp;
switch (*arg++) {
case 'l':
x = 1;
if (isdigit(*arg)) {
x = strtol(arg, &ccp, 0);
if (ccp == arg)
break;
arg = ccp;
}
sep->se_log &= ~MULOG_RFC931;
sep->se_log |= x;
break;
case 'a':
sep->se_log |= MULOG_RFC931;
break;
default:
break;
}
}
arg = colon + 1;
}
#endif
if (argc < MAXARGV)
sep->se_argv[argc++] = newstr(arg);
}
while (argc <= MAXARGV)
sep->se_argv[argc++] = NULL;
/*
* Now that we've processed the entire line, check if the hostname
* specifier was a comma separated list of hostnames. If so
* we'll make new entries for each address.
*/
while ((hostdelim = strrchr(sep->se_hostaddr, ',')) != NULL) {
nsep = dupconfig(sep);
/*
* NULL terminate the hostname field of the existing entry,
* and make a dup for the new entry.
*/
*hostdelim++ = '\0';
nsep->se_hostaddr = newstr(hostdelim);
nsep->se_next = sep->se_next;
sep->se_next = nsep;
}
nsep = sep;
while (nsep != NULL) {
nsep->se_checked = 1;
switch (nsep->se_family) {
case AF_INET:
case AF_INET6:
{
struct addrinfo hints, *res0, *res;
char *host, *port;
int error;
int s;
/* check if the family is supported */
s = socket(nsep->se_family, SOCK_DGRAM, 0);
if (s < 0) {
syslog(LOG_WARNING,
"%s/%s: %s: the address family is not supported by the kernel",
nsep->se_service, nsep->se_proto,
nsep->se_hostaddr);
nsep->se_checked = 0;
goto skip;
}
close(s);
memset(&hints, 0, sizeof(hints));
hints.ai_family = nsep->se_family;
hints.ai_socktype = nsep->se_socktype;
hints.ai_flags = AI_PASSIVE;
if (!strcmp(nsep->se_hostaddr, "*"))
host = NULL;
else
host = nsep->se_hostaddr;
port = "0";
/* XXX shortened IPv4 syntax is now forbidden */
error = getaddrinfo(host, port, &hints, &res0);
if (error) {
syslog(LOG_ERR, "%s/%s: %s: %s",
nsep->se_service, nsep->se_proto,
nsep->se_hostaddr,
gai_strerror(error));
nsep->se_checked = 0;
goto skip;
}
for (res = res0; res; res = res->ai_next) {
if (res->ai_addrlen >
sizeof(nsep->se_ctrladdr_storage))
continue;
if (res == res0) {
memcpy(&nsep->se_ctrladdr_storage,
res->ai_addr, res->ai_addrlen);
continue;
}
psep = dupconfig(nsep);
psep->se_hostaddr = newstr(nsep->se_hostaddr);
psep->se_checked = 1;
memcpy(&psep->se_ctrladdr_storage, res->ai_addr,
res->ai_addrlen);
psep->se_ctrladdr_size = res->ai_addrlen;
/*
* Prepend to list, don't want to look up its
* hostname again.
*/
psep->se_next = sep;
sep = psep;
}
freeaddrinfo(res0);
break;
}
}
skip:
nsep = nsep->se_next;
}
/*
* Finally, free any entries which failed the gethostbyname
* check.
*/
psep = NULL;
nsep = sep;
while (nsep != NULL) {
struct servtab *tsep;
if (nsep->se_checked == 0) {
tsep = nsep;
if (psep == NULL) {
sep = nsep->se_next;
nsep = sep;
} else {
nsep = nsep->se_next;
psep->se_next = nsep;
}
freeconfig(tsep);
} else {
nsep->se_checked = 0;
psep = nsep;
nsep = nsep->se_next;
}
}
return (sep);
}
void
freeconfig(cp)
register struct servtab *cp;
{
int i;
if (cp->se_hostaddr)
free(cp->se_hostaddr);
if (cp->se_service)
free(cp->se_service);
if (cp->se_proto)
free(cp->se_proto);
if (cp->se_user)
free(cp->se_user);
if (cp->se_group)
free(cp->se_group);
if (cp->se_server)
free(cp->se_server);
for (i = 0; i < MAXARGV; i++)
if (cp->se_argv[i])
free(cp->se_argv[i]);
}
char *
skip(cpp, report)
char **cpp;
int report;
{
char *cp = *cpp;
char *start;
erp:
if (*cpp == NULL) {
if (report)
syslog(LOG_ERR, "syntax error in inetd config file");
return (NULL);
}
again:
while (*cp == ' ' || *cp == '\t')
cp++;
if (*cp == '\0') {
int c;
c = getc(fconfig);
(void) ungetc(c, fconfig);
if (c == ' ' || c == '\t')
if ((cp = nextline(fconfig)))
goto again;
*cpp = NULL;
goto erp;
}
start = cp;
while (*cp && *cp != ' ' && *cp != '\t')
cp++;
if (*cp != '\0')
*cp++ = '\0';
if ((*cpp = cp) == NULL)
goto erp;
return (start);
}
char *
nextline(fd)
FILE *fd;
{
char *cp;
if (fgets(line, sizeof (line), fd) == NULL)
return (NULL);
cp = strchr(line, '\n');
if (cp)
*cp = '\0';
return (line);
}
char *
newstr(cp)
char *cp;
{
if ((cp = strdup(cp ? cp : "")))
return(cp);
syslog(LOG_ERR, "strdup: %m");
exit(-1);
}
struct servtab *
dupconfig(sep)
struct servtab *sep;
{
struct servtab *newtab;
int argc;
newtab = (struct servtab *) malloc(sizeof(struct servtab));
if (newtab == NULL) {
syslog(LOG_ERR, "malloc: %m");
exit (-1);
}
memset((char *)newtab, 0, sizeof(struct servtab));
newtab->se_service = sep->se_service ? newstr(sep->se_service) : NULL;
newtab->se_socktype = sep->se_socktype;
newtab->se_family = sep->se_family;
newtab->se_proto = sep->se_proto ? newstr(sep->se_proto) : NULL;
newtab->se_rpcprog = sep->se_rpcprog;
newtab->se_rpcversl = sep->se_rpcversl;
newtab->se_rpcversh = sep->se_rpcversh;
newtab->se_wait = sep->se_wait;
newtab->se_user = sep->se_user ? newstr(sep->se_user) : NULL;
newtab->se_group = sep->se_group ? newstr(sep->se_group) : NULL;
newtab->se_bi = sep->se_bi;
newtab->se_server = sep->se_server ? newstr(sep->se_server) : 0;
for (argc = 0; argc <= MAXARGV; argc++)
newtab->se_argv[argc] = sep->se_argv[argc] ?
newstr(sep->se_argv[argc]) : NULL;
newtab->se_max = sep->se_max;
#ifdef MULOG
newtab->se_log = sep->se_log;
#endif
return (newtab);
}
void
inetd_setproctitle(a, s)
char *a;
int s;
{
int size;
register char *cp;
struct sockaddr_in sin;
char buf[80];
cp = Argv[0];
size = sizeof(sin);
(void) snprintf(buf, sizeof buf, "-%s", a);
if (getpeername(s, (struct sockaddr *)&sin, &size) == 0) {
char *s = inet_ntoa(sin.sin_addr);
buf[sizeof(buf) - 1 - strlen(s) - 3] = '\0';
strcat(buf, " [");
strcat(buf, s);
strcat(buf, "]");
}
strncpy(cp, buf, LastArg - cp);
cp += strlen(cp);
while (cp < LastArg)
*cp++ = ' ';
}
void
logpid()
{
FILE *fp;
if ((fp = fopen(_PATH_INETDPID, "w")) != NULL) {
fprintf(fp, "%u\n", getpid());
(void)fclose(fp);
}
}
int
bump_nofile()
{
#ifdef RLIMIT_NOFILE
#define FD_CHUNK 32
struct rlimit rl;
if (getrlimit(RLIMIT_NOFILE, &rl) < 0) {
syslog(LOG_ERR, "getrlimit: %m");
return -1;
}
rl.rlim_cur = MIN(rl.rlim_max, rl.rlim_cur + FD_CHUNK);
rl.rlim_cur = MIN(FD_SETSIZE, rl.rlim_cur + FD_CHUNK);
if (rl.rlim_cur <= rlim_ofile_cur) {
syslog(LOG_ERR,
"bump_nofile: cannot extend file limit, max = %d",
(int)rl.rlim_cur);
return -1;
}
if (setrlimit(RLIMIT_NOFILE, &rl) < 0) {
syslog(LOG_ERR, "setrlimit: %m");
return -1;
}
rlim_ofile_cur = rl.rlim_cur;
return 0;
#else
syslog(LOG_ERR, "bump_nofile: cannot extend file limit");
return -1;
#endif
}
/*
* Internet services provided internally by inetd:
*/
#define BUFSIZE 4096
/* ARGSUSED */
void
echo_stream(s, sep) /* Echo service -- echo data back */
int s;
struct servtab *sep;
{
char buffer[BUFSIZE];
int i;
inetd_setproctitle(sep->se_service, s);
while ((i = read(s, buffer, sizeof(buffer))) > 0 &&
write(s, buffer, i) > 0)
;
exit(0);
}
/* ARGSUSED */
void
echo_dg(s, sep) /* Echo service -- echo data back */
int s;
struct servtab *sep;
{
char buffer[BUFSIZE];
int i, size;
struct sockaddr_storage ss;
size = sizeof(ss);
if ((i = recvfrom(s, buffer, sizeof(buffer), 0, (struct sockaddr *)&ss,
&size)) < 0)
return;
if (dg_badinput((struct sockaddr *)&ss))
return;
(void) sendto(s, buffer, i, 0, (struct sockaddr *)&ss, size);
}
/* ARGSUSED */
void
discard_stream(s, sep) /* Discard service -- ignore data */
int s;
struct servtab *sep;
{
char buffer[BUFSIZE];
inetd_setproctitle(sep->se_service, s);
while ((errno = 0, read(s, buffer, sizeof(buffer)) > 0) ||
errno == EINTR)
;
exit(0);
}
/* ARGSUSED */
void
discard_dg(s, sep) /* Discard service -- ignore data */
int s;
struct servtab *sep;
{
char buffer[BUFSIZE];
(void) read(s, buffer, sizeof(buffer));
}
#include <ctype.h>
#define LINESIZ 72
char ring[128];
char *endring;
void
initring()
{
register int i;
endring = ring;
for (i = 0; i <= 128; ++i)
if (isprint(i))
*endring++ = i;
}
/* ARGSUSED */
void
chargen_stream(s, sep) /* Character generator */
int s;
struct servtab *sep;
{
register char *rs;
int len;
char text[LINESIZ+2];
inetd_setproctitle(sep->se_service, s);
if (!endring) {
initring();
rs = ring;
}
text[LINESIZ] = '\r';
text[LINESIZ + 1] = '\n';
for (rs = ring;;) {
if ((len = endring - rs) >= LINESIZ)
memmove(text, rs, LINESIZ);
else {
memmove(text, rs, len);
memmove(text + len, ring, LINESIZ - len);
}
if (++rs == endring)
rs = ring;
if (write(s, text, sizeof(text)) != sizeof(text))
break;
}
exit(0);
}
/* ARGSUSED */
void
chargen_dg(s, sep) /* Character generator */
int s;
struct servtab *sep;
{
struct sockaddr_storage ss;
static char *rs;
int len, size;
char text[LINESIZ+2];
if (endring == 0) {
initring();
rs = ring;
}
size = sizeof(ss);
if (recvfrom(s, text, sizeof(text), 0, (struct sockaddr *)&ss,
&size) < 0)
return;
if (dg_badinput((struct sockaddr *)&ss))
return;
if ((len = endring - rs) >= LINESIZ)
memmove(text, rs, LINESIZ);
else {
memmove(text, rs, len);
memmove(text + len, ring, LINESIZ - len);
}
if (++rs == endring)
rs = ring;
text[LINESIZ] = '\r';
text[LINESIZ + 1] = '\n';
(void) sendto(s, text, sizeof(text), 0, (struct sockaddr *)&ss, size);
}
/*
* Return a machine readable date and time, in the form of the
* number of seconds since midnight, Jan 1, 1900. Since gettimeofday
* returns the number of seconds since midnight, Jan 1, 1970,
* we must add 2208988800 seconds to this figure to make up for
* some seventy years Bell Labs was asleep.
*/
u_int
machtime()
{
struct timeval tv;
if (gettimeofday(&tv, NULL) < 0) {
fprintf(stderr, "Unable to get time of day\n");
return (0L);
}
return (htonl((u_int)tv.tv_sec + 2208988800UL));
}
/* ARGSUSED */
void
machtime_stream(s, sep)
int s;
struct servtab *sep;
{
u_int result;
result = machtime();
(void) write(s, (char *) &result, sizeof(result));
}
/* ARGSUSED */
void
machtime_dg(s, sep)
int s;
struct servtab *sep;
{
u_int result;
struct sockaddr_storage ss;
int size;
size = sizeof(ss);
if (recvfrom(s, (char *)&result, sizeof(result), 0,
(struct sockaddr *)&ss, &size) < 0)
return;
if (dg_badinput((struct sockaddr *)&ss))
return;
result = machtime();
(void) sendto(s, (char *) &result, sizeof(result), 0,
(struct sockaddr *)&ss, size);
}
/* ARGSUSED */
void
daytime_stream(s, sep) /* Return human-readable time of day */
int s;
struct servtab *sep;
{
char buffer[256];
time_t time(), clock;
clock = time(NULL);
(void) sprintf(buffer, "%.24s\r\n", ctime(&clock));
(void) write(s, buffer, strlen(buffer));
}
/* ARGSUSED */
void
daytime_dg(s, sep) /* Return human-readable time of day */
int s;
struct servtab *sep;
{
char buffer[256];
time_t time(), clock;
struct sockaddr_storage ss;
int size;
clock = time((time_t *) 0);
size = sizeof(ss);
if (recvfrom(s, buffer, sizeof(buffer), 0, (struct sockaddr *)&ss,
&size) < 0)
return;
if (dg_badinput((struct sockaddr *)&ss))
return;
(void) sprintf(buffer, "%.24s\r\n", ctime(&clock));
(void) sendto(s, buffer, strlen(buffer), 0, (struct sockaddr *)&ss,
size);
}
/*
* print_service:
* Dump relevant information to stderr
*/
void
print_service(action, sep)
char *action;
struct servtab *sep;
{
if (strcmp(sep->se_hostaddr, "*") == 0)
fprintf(stderr, "%s: %s ", action, sep->se_service);
else
fprintf(stderr, "%s: %s:%s ", action, sep->se_hostaddr,
sep->se_service);
if (isrpcservice(sep))
fprintf(stderr, "rpcprog=%d, rpcvers=%d/%d, proto=%s,",
sep->se_rpcprog, sep->se_rpcversh,
sep->se_rpcversl, sep->se_proto);
else
fprintf(stderr, "proto=%s,", sep->se_proto);
fprintf(stderr,
" wait.max=%hd.%d user:group=%s.%s builtin=%lx server=%s\n",
sep->se_wait, sep->se_max, sep->se_user,
sep->se_group ? sep->se_group : "wheel",
(long)sep->se_bi, sep->se_server);
}
#ifdef MULOG
char *rfc931_name __P((struct sockaddr_in *, int));
dolog(sep, ctrl)
struct servtab *sep;
int ctrl;
{
struct sockaddr sa;
struct sockaddr_in *sin = (struct sockaddr_in *)&sa;
int len = sizeof(sa);
struct hostent *hp;
char *host, *dp, buf[BUFSIZ];
int connected = 1;
if (sep->se_family != AF_INET)
return;
if (getpeername(ctrl, &sa, &len) < 0) {
if (errno != ENOTCONN) {
syslog(LOG_ERR, "getpeername: %m");
return;
}
if (recvfrom(ctrl, buf, sizeof(buf), MSG_PEEK, &sa, &len) < 0) {
syslog(LOG_ERR, "recvfrom: %m");
return;
}
connected = 0;
}
if (sa.sa_family != AF_INET) {
syslog(LOG_ERR, "unexpected address family %u", sa.sa_family);
return;
}
hp = gethostbyaddr((char *) &sin->sin_addr.s_addr,
sizeof (sin->sin_addr.s_addr), AF_INET);
host = hp?hp->h_name:inet_ntoa(sin->sin_addr);
switch (sep->se_log & ~MULOG_RFC931) {
case 0:
return;
case 1:
if (curdom == NULL || *curdom == '\0')
break;
dp = host + strlen(host) - strlen(curdom);
if (dp < host)
break;
if (debug)
fprintf(stderr, "check \"%s\" against curdom \"%s\"\n",
host, curdom);
if (strcasecmp(dp, curdom) == 0)
return;
break;
case 2:
default:
break;
}
openlog("", LOG_NOWAIT, MULOG);
if (connected && (sep->se_log & MULOG_RFC931))
syslog(LOG_INFO, "%s@%s wants %s", rfc931_name(sin, ctrl),
host, sep->se_service);
else
syslog(LOG_INFO, "%s wants %s", host, sep->se_service);
}
/*
* From tcp_log by
* Wietse Venema, Eindhoven University of Technology, The Netherlands.
*/
#if 0
static char sccsid[] = "@(#) rfc931.c 1.3 92/08/31 22:54:46";
#endif
#include <setjmp.h>
#define RFC931_PORT 113 /* Semi-well-known port */
#define TIMEOUT 4
#define TIMEOUT2 10
static jmp_buf timebuf;
/* timeout - handle timeouts */
static void
timeout(sig)
int sig;
{
longjmp(timebuf, sig);
}
/* rfc931_name - return remote user name */
char *
rfc931_name(there, ctrl)
struct sockaddr_in *there; /* remote link information */
int ctrl;
{
struct sockaddr_in here; /* local link information */
struct sockaddr_in sin; /* for talking to RFC931 daemon */
int length;
int s;
unsigned remote;
unsigned local;
static char user[256]; /* XXX */
char buf[256];
char *cp;
char *result = "USER_UNKNOWN";
int len;
/* Find out local port number of our stdin. */
length = sizeof(here);
if (getsockname(ctrl, (struct sockaddr *) &here, &length) == -1) {
syslog(LOG_ERR, "getsockname: %m");
return (result);
}
/* Set up timer so we won't get stuck. */
if ((s = socket(AF_INET, SOCK_STREAM, 0)) == -1) {
syslog(LOG_ERR, "socket: %m");
return (result);
}
sin = here;
sin.sin_port = htons(0);
if (bind(s, (struct sockaddr *) &sin, sizeof(sin)) == -1) {
syslog(LOG_ERR, "bind: %m");
return (result);
}
signal(SIGALRM, timeout);
if (setjmp(timebuf)) {
close(s); /* not: fclose(fp) */
return (result);
}
alarm(TIMEOUT);
/* Connect to the RFC931 daemon. */
sin = *there;
sin.sin_port = htons(RFC931_PORT);
if (connect(s, (struct sockaddr *) &sin, sizeof(sin)) == -1) {
close(s);
alarm(0);
return (result);
}
/* Query the RFC 931 server. Would 13-byte writes ever be broken up? */
sprintf(buf, "%u,%u\r\n", ntohs(there->sin_port), ntohs(here.sin_port));
for (len = 0, cp = buf; len < strlen(buf); ) {
int n;
if ((n = write(s, cp, strlen(buf) - len)) == -1) {
close(s);
alarm(0);
return (result);
}
cp += n;
len += n;
}
/* Read response */
for (cp = buf; cp < buf + sizeof(buf) - 1; ) {
char c;
if (read(s, &c, 1) != 1) {
close(s);
alarm(0);
return (result);
}
if (c == '\n')
break;
*cp++ = c;
}
*cp = '\0';
if (sscanf(buf, "%u , %u : USERID :%*[^:]:%255s", &remote,
&local, user) == 3 && ntohs(there->sin_port) == remote &&
ntohs(here.sin_port) == local) {
/* Strip trailing carriage return. */
if (cp = strchr(user, '\r'))
*cp = 0;
result = user;
}
alarm(0);
close(s);
return (result);
}
#endif