v6-ify
git-svn-id: svn://svn.h5l.se/heimdal/trunk/heimdal@6661 ec53bebd-3082-4978-b11e-865c3cabbd6b
This commit is contained in:
146
appl/rsh/rsh.c
146
appl/rsh/rsh.c
@@ -127,8 +127,8 @@ loop (int s, int errsock)
|
|||||||
#ifdef KRB4
|
#ifdef KRB4
|
||||||
static int
|
static int
|
||||||
send_krb4_auth(int s,
|
send_krb4_auth(int s,
|
||||||
struct sockaddr_in thisaddr,
|
struct sockaddr *thisaddr,
|
||||||
struct sockaddr_in thataddr,
|
struct sockaddr *thataddr,
|
||||||
const char *hostname,
|
const char *hostname,
|
||||||
const char *remote_user,
|
const char *remote_user,
|
||||||
const char *local_user,
|
const char *local_user,
|
||||||
@@ -145,7 +145,9 @@ send_krb4_auth(int s,
|
|||||||
s, &text, "rcmd",
|
s, &text, "rcmd",
|
||||||
(char *)hostname, krb_realmofhost (hostname),
|
(char *)hostname, krb_realmofhost (hostname),
|
||||||
getpid(), &msg, &cred, schedule,
|
getpid(), &msg, &cred, schedule,
|
||||||
&thisaddr, &thataddr, KCMD_VERSION);
|
(struct sockaddr_in *)thisaddr,
|
||||||
|
(struct sockaddr_in *)thataddr,
|
||||||
|
KCMD_VERSION);
|
||||||
if (status != KSUCCESS) {
|
if (status != KSUCCESS) {
|
||||||
warnx ("%s: %s", hostname, krb_get_err_text(status));
|
warnx ("%s: %s", hostname, krb_get_err_text(status));
|
||||||
return 1;
|
return 1;
|
||||||
@@ -247,8 +249,8 @@ krb5_forward_cred (krb5_auth_context auth_context,
|
|||||||
|
|
||||||
static int
|
static int
|
||||||
send_krb5_auth(int s,
|
send_krb5_auth(int s,
|
||||||
struct sockaddr_in thisaddr,
|
struct sockaddr *thisaddr,
|
||||||
struct sockaddr_in thataddr,
|
struct sockaddr *thataddr,
|
||||||
const char *hostname,
|
const char *hostname,
|
||||||
const char *remote_user,
|
const char *remote_user,
|
||||||
const char *local_user,
|
const char *local_user,
|
||||||
@@ -273,7 +275,7 @@ send_krb5_auth(int s,
|
|||||||
|
|
||||||
cksum_data.length = asprintf ((char **)&cksum_data.data,
|
cksum_data.length = asprintf ((char **)&cksum_data.data,
|
||||||
"%u:%s%s%s",
|
"%u:%s%s%s",
|
||||||
ntohs(thataddr.sin_port),
|
ntohs(socket_get_port(thataddr)),
|
||||||
do_encrypt ? "-x " : "",
|
do_encrypt ? "-x " : "",
|
||||||
cmd,
|
cmd,
|
||||||
remote_user);
|
remote_user);
|
||||||
@@ -356,8 +358,8 @@ send_krb5_auth(int s,
|
|||||||
|
|
||||||
static int
|
static int
|
||||||
send_broken_auth(int s,
|
send_broken_auth(int s,
|
||||||
struct sockaddr_in thisaddr,
|
struct sockaddr *thisaddr,
|
||||||
struct sockaddr_in thataddr,
|
struct sockaddr *thataddr,
|
||||||
const char *hostname,
|
const char *hostname,
|
||||||
const char *remote_user,
|
const char *remote_user,
|
||||||
const char *local_user,
|
const char *local_user,
|
||||||
@@ -388,38 +390,40 @@ proto (int s, int errsock,
|
|||||||
const char *hostname, const char *local_user, const char *remote_user,
|
const char *hostname, const char *local_user, const char *remote_user,
|
||||||
const char *cmd, size_t cmd_len,
|
const char *cmd, size_t cmd_len,
|
||||||
int (*auth_func)(int s,
|
int (*auth_func)(int s,
|
||||||
struct sockaddr_in this, struct sockaddr_in that,
|
struct sockaddr *this, struct sockaddr *that,
|
||||||
const char *hostname, const char *remote_user,
|
const char *hostname, const char *remote_user,
|
||||||
const char *local_user, size_t cmd_len,
|
const char *local_user, size_t cmd_len,
|
||||||
const char *cmd))
|
const char *cmd))
|
||||||
{
|
{
|
||||||
struct sockaddr_in erraddr;
|
|
||||||
int errsock2;
|
int errsock2;
|
||||||
char buf[BUFSIZ];
|
char buf[BUFSIZ];
|
||||||
char *p;
|
char *p;
|
||||||
size_t len;
|
size_t len;
|
||||||
char reply;
|
char reply;
|
||||||
struct sockaddr_in thisaddr, thataddr;
|
struct sockaddr_storage thisaddr_ss;
|
||||||
|
struct sockaddr *thisaddr = (struct sockaddr *)&thisaddr_ss;
|
||||||
|
struct sockaddr_storage thataddr_ss;
|
||||||
|
struct sockaddr *thataddr = (struct sockaddr *)&thataddr_ss;
|
||||||
|
struct sockaddr_storage erraddr_ss;
|
||||||
|
struct sockaddr *erraddr = (struct sockaddr *)&erraddr_ss;
|
||||||
int addrlen;
|
int addrlen;
|
||||||
int ret;
|
int ret;
|
||||||
|
|
||||||
addrlen = sizeof(thisaddr);
|
addrlen = sizeof(thisaddr_ss);
|
||||||
if (getsockname (s, (struct sockaddr *)&thisaddr, &addrlen) < 0
|
if (getsockname (s, thisaddr, &addrlen) < 0) {
|
||||||
|| addrlen != sizeof(thisaddr)) {
|
|
||||||
warn ("getsockname(%s)", hostname);
|
warn ("getsockname(%s)", hostname);
|
||||||
return 1;
|
return 1;
|
||||||
}
|
}
|
||||||
addrlen = sizeof(thataddr);
|
addrlen = sizeof(thataddr_ss);
|
||||||
if (getpeername (s, (struct sockaddr *)&thataddr, &addrlen) < 0
|
if (getpeername (s, thataddr, &addrlen) < 0) {
|
||||||
|| addrlen != sizeof(thataddr)) {
|
|
||||||
warn ("getpeername(%s)", hostname);
|
warn ("getpeername(%s)", hostname);
|
||||||
return 1;
|
return 1;
|
||||||
}
|
}
|
||||||
|
|
||||||
if (errsock != -1) {
|
if (errsock != -1) {
|
||||||
|
|
||||||
addrlen = sizeof(erraddr);
|
addrlen = sizeof(erraddr_ss);
|
||||||
if (getsockname (errsock, (struct sockaddr *)&erraddr, &addrlen) < 0) {
|
if (getsockname (errsock, erraddr, &addrlen) < 0) {
|
||||||
warn ("getsockname");
|
warn ("getsockname");
|
||||||
return 1;
|
return 1;
|
||||||
}
|
}
|
||||||
@@ -430,7 +434,8 @@ proto (int s, int errsock,
|
|||||||
}
|
}
|
||||||
|
|
||||||
p = buf;
|
p = buf;
|
||||||
snprintf (p, sizeof(buf), "%u", ntohs(erraddr.sin_port));
|
snprintf (p, sizeof(buf), "%u",
|
||||||
|
ntohs(socket_get_port(erraddr)));
|
||||||
len = strlen(buf) + 1;
|
len = strlen(buf) + 1;
|
||||||
if(net_write (s, buf, len) != len) {
|
if(net_write (s, buf, len) != len) {
|
||||||
warn ("write");
|
warn ("write");
|
||||||
@@ -486,7 +491,7 @@ proto (int s, int errsock,
|
|||||||
*/
|
*/
|
||||||
|
|
||||||
static size_t
|
static size_t
|
||||||
construct_command (char **res, int argc, char **argv)
|
construct_command (char **res, int argc, const char **argv)
|
||||||
{
|
{
|
||||||
int i;
|
int i;
|
||||||
size_t len = 0;
|
size_t len = 0;
|
||||||
@@ -510,6 +515,19 @@ construct_command (char **res, int argc, char **argv)
|
|||||||
return len;
|
return len;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
static char *
|
||||||
|
print_addr (int af, const void *a)
|
||||||
|
{
|
||||||
|
char addr_str[256];
|
||||||
|
char *res;
|
||||||
|
|
||||||
|
inet_ntop (af, a, addr_str, sizeof(addr_str));
|
||||||
|
res = strdup(addr_str);
|
||||||
|
if (res == NULL)
|
||||||
|
errx (1, "malloc: out of memory");
|
||||||
|
return res;
|
||||||
|
}
|
||||||
|
|
||||||
static int
|
static int
|
||||||
doit_broken (int argc,
|
doit_broken (int argc,
|
||||||
char **argv,
|
char **argv,
|
||||||
@@ -523,27 +541,41 @@ doit_broken (int argc,
|
|||||||
const char *cmd,
|
const char *cmd,
|
||||||
size_t cmd_len)
|
size_t cmd_len)
|
||||||
{
|
{
|
||||||
struct hostent *hostent;
|
struct hostent *hostent = NULL;
|
||||||
struct sockaddr_in addr;
|
struct sockaddr_storage addr_ss;
|
||||||
|
struct sockaddr *addr = (struct sockaddr *)&addr_ss;
|
||||||
|
int error;
|
||||||
|
int af;
|
||||||
|
|
||||||
if (priv_socket1 < 0) {
|
if (priv_socket1 < 0) {
|
||||||
warnx ("unable to bind reserved port: is rsh setuid root?");
|
warnx ("unable to bind reserved port: is rsh setuid root?");
|
||||||
return 1;
|
return 1;
|
||||||
}
|
}
|
||||||
|
|
||||||
hostent = roken_gethostbyname (host);
|
#ifdef HAVE_IPV6
|
||||||
|
if (hostent == NULL)
|
||||||
|
hostent = getipnodebyname (host, AF_INET6, 0, &error);
|
||||||
|
#endif
|
||||||
|
if (hostent == NULL)
|
||||||
|
hostent = getipnodebyname (host, AF_INET, 0, &error);
|
||||||
|
|
||||||
if (hostent == NULL) {
|
if (hostent == NULL) {
|
||||||
warn("gethostbyname '%s' failed: %s", host, hstrerror(h_errno));
|
warn("gethostbyname '%s' failed: %s", host, hstrerror(error));
|
||||||
return 1;
|
return 1;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
af = addr->sa_family = hostent->h_addrtype;
|
||||||
|
socket_set_address_and_port (addr, hostent->h_addr_list[0], port);
|
||||||
|
|
||||||
|
#if 0
|
||||||
memset (&addr, 0, sizeof(addr));
|
memset (&addr, 0, sizeof(addr));
|
||||||
addr.sin_family = AF_INET;
|
addr.sin_family = AF_INET;
|
||||||
addr.sin_port = port;
|
addr.sin_port = port;
|
||||||
addr.sin_addr = *((struct in_addr *)hostent->h_addr_list[0]);
|
addr.sin_addr = *((struct in_addr *)hostent->h_addr_list[0]);
|
||||||
|
#endif
|
||||||
|
|
||||||
if (connect(priv_socket1, (struct sockaddr *)&addr, sizeof(addr)) < 0) {
|
if (connect(priv_socket1, addr, socket_sockaddr_size(addr)) < 0) {
|
||||||
struct in_addr **h;
|
const char **h;
|
||||||
|
|
||||||
if (hostent->h_addr_list[1] == NULL)
|
if (hostent->h_addr_list[1] == NULL)
|
||||||
return 1;
|
return 1;
|
||||||
@@ -551,9 +583,7 @@ doit_broken (int argc,
|
|||||||
close(priv_socket1);
|
close(priv_socket1);
|
||||||
close(priv_socket2);
|
close(priv_socket2);
|
||||||
|
|
||||||
for(h = (struct in_addr **)hostent->h_addr_list;
|
for(h = hostent->h_addr_list; *h != NULL; ++h) {
|
||||||
*h != NULL;
|
|
||||||
++h) {
|
|
||||||
pid_t pid;
|
pid_t pid;
|
||||||
|
|
||||||
pid = fork();
|
pid = fork();
|
||||||
@@ -569,18 +599,20 @@ doit_broken (int argc,
|
|||||||
new_argv[i] = argv[i];
|
new_argv[i] = argv[i];
|
||||||
++i;
|
++i;
|
||||||
if (optind == i)
|
if (optind == i)
|
||||||
new_argv[i++] = inet_ntoa(**h);
|
new_argv[i++] = print_addr (af, *h);
|
||||||
new_argv[i++] = "-K";
|
new_argv[i++] = "-K";
|
||||||
for(; i <= argc; ++i)
|
for(; i <= argc; ++i)
|
||||||
new_argv[i] = argv[i - 1];
|
new_argv[i] = argv[i - 1];
|
||||||
if (optind > 1)
|
if (optind > 1)
|
||||||
new_argv[optind + 1] = inet_ntoa(**h);
|
new_argv[optind + 1] = print_addr(af, *h);
|
||||||
new_argv[argc + 1] = NULL;
|
new_argv[argc + 1] = NULL;
|
||||||
execv(PATH_RSH, new_argv);
|
execv(PATH_RSH, new_argv);
|
||||||
err(1, "execv(%s)", PATH_RSH);
|
err(1, "execv(%s)", PATH_RSH);
|
||||||
} else {
|
} else {
|
||||||
int status;
|
int status;
|
||||||
|
|
||||||
|
freehostent (hostent);
|
||||||
|
|
||||||
while(waitpid(pid, &status, 0) < 0)
|
while(waitpid(pid, &status, 0) < 0)
|
||||||
;
|
;
|
||||||
if(WIFEXITED(status) && WEXITSTATUS(status) == 0)
|
if(WIFEXITED(status) && WEXITSTATUS(status) == 0)
|
||||||
@@ -591,6 +623,8 @@ doit_broken (int argc,
|
|||||||
} else {
|
} else {
|
||||||
int ret;
|
int ret;
|
||||||
|
|
||||||
|
freehostent (hostent);
|
||||||
|
|
||||||
ret = proto (priv_socket1, priv_socket2,
|
ret = proto (priv_socket1, priv_socket2,
|
||||||
argv[optind],
|
argv[optind],
|
||||||
local_user, remote_user,
|
local_user, remote_user,
|
||||||
@@ -609,50 +643,62 @@ doit (const char *hostname,
|
|||||||
size_t cmd_len,
|
size_t cmd_len,
|
||||||
int do_errsock,
|
int do_errsock,
|
||||||
int (*auth_func)(int s,
|
int (*auth_func)(int s,
|
||||||
struct sockaddr_in this, struct sockaddr_in that,
|
struct sockaddr *this, struct sockaddr *that,
|
||||||
const char *hostname, const char *remote_user,
|
const char *hostname, const char *remote_user,
|
||||||
const char *local_user, size_t cmd_len,
|
const char *local_user, size_t cmd_len,
|
||||||
const char *cmd))
|
const char *cmd))
|
||||||
{
|
{
|
||||||
struct hostent *hostent;
|
struct hostent *hostent = NULL;
|
||||||
struct in_addr **h;
|
int error;
|
||||||
|
const char **h;
|
||||||
|
int af;
|
||||||
|
|
||||||
|
#ifdef HAVE_IPV6
|
||||||
|
if (hostent == NULL)
|
||||||
|
hostent = getipnodebyname (hostname, AF_INET6, 0, &error);
|
||||||
|
#endif
|
||||||
|
if (hostent == NULL)
|
||||||
|
hostent = getipnodebyname (hostname, AF_INET, 0, &error);
|
||||||
|
|
||||||
hostent = roken_gethostbyname (hostname);
|
|
||||||
if (hostent == NULL)
|
if (hostent == NULL)
|
||||||
errx (1, "gethostbyname '%s' failed: %s",
|
errx (1, "gethostbyname '%s' failed: %s",
|
||||||
hostname,
|
hostname,
|
||||||
hstrerror(h_errno));
|
hstrerror(error));
|
||||||
for (h = (struct in_addr **)hostent->h_addr_list;
|
af = hostent->h_addrtype;
|
||||||
*h != NULL;
|
for (h = hostent->h_addr_list; *h != NULL; ++h) {
|
||||||
++h) {
|
|
||||||
int s;
|
int s;
|
||||||
struct sockaddr_in addr;
|
struct sockaddr_storage addr_ss;
|
||||||
|
struct sockaddr *addr = (struct sockaddr *)&addr_ss;
|
||||||
int errsock;
|
int errsock;
|
||||||
struct sockaddr_in erraddr;
|
struct sockaddr_storage erraddr_ss;
|
||||||
|
struct sockaddr *erraddr = (struct sockaddr *)&erraddr_ss;
|
||||||
int ret;
|
int ret;
|
||||||
|
|
||||||
|
addr->sa_family = af;
|
||||||
|
socket_set_address_and_port (addr, *h, port);
|
||||||
|
|
||||||
|
#if 0
|
||||||
memset (&addr, 0, sizeof(addr));
|
memset (&addr, 0, sizeof(addr));
|
||||||
addr.sin_family = AF_INET;
|
addr.sin_family = AF_INET;
|
||||||
addr.sin_port = port;
|
addr.sin_port = port;
|
||||||
addr.sin_addr = **h;
|
addr.sin_addr = **h;
|
||||||
|
#endif
|
||||||
|
|
||||||
s = socket (AF_INET, SOCK_STREAM, 0);
|
s = socket (af, SOCK_STREAM, 0);
|
||||||
if (s < 0)
|
if (s < 0)
|
||||||
err (1, "socket");
|
err (1, "socket");
|
||||||
if (connect (s, (struct sockaddr *)&addr, sizeof(addr)) < 0) {
|
if (connect (s, addr, socket_sockaddr_size(addr)) < 0) {
|
||||||
warn ("connect(%s)", hostname);
|
warn ("connect(%s)", hostname);
|
||||||
close (s);
|
close (s);
|
||||||
continue;
|
continue;
|
||||||
}
|
}
|
||||||
if (do_errsock) {
|
if (do_errsock) {
|
||||||
errsock = socket (AF_INET, SOCK_STREAM, 0);
|
errsock = socket (af, SOCK_STREAM, 0);
|
||||||
if (errsock < 0)
|
if (errsock < 0)
|
||||||
err (1, "socket");
|
err (1, "socket");
|
||||||
memset (&erraddr, 0, sizeof(erraddr));
|
socket_set_any (erraddr, af);
|
||||||
erraddr.sin_family = AF_INET;
|
|
||||||
erraddr.sin_addr.s_addr = INADDR_ANY;
|
if (bind (errsock, erraddr, socket_sockaddr_size(erraddr)) < 0)
|
||||||
if (bind (errsock, (struct sockaddr *)&erraddr,
|
|
||||||
sizeof(erraddr)) < 0)
|
|
||||||
err (1, "bind");
|
err (1, "bind");
|
||||||
} else
|
} else
|
||||||
errsock = -1;
|
errsock = -1;
|
||||||
|
@@ -110,8 +110,8 @@ read_str (int s, char *str, size_t sz, char *expl)
|
|||||||
|
|
||||||
static int
|
static int
|
||||||
recv_bsd_auth (int s, u_char *buf,
|
recv_bsd_auth (int s, u_char *buf,
|
||||||
struct sockaddr_in thisaddr,
|
struct sockaddr_in *thisaddr,
|
||||||
struct sockaddr_in thataddr,
|
struct sockaddr_in *thataddr,
|
||||||
char *client_username,
|
char *client_username,
|
||||||
char *server_username,
|
char *server_username,
|
||||||
char *cmd)
|
char *cmd)
|
||||||
@@ -124,7 +124,7 @@ recv_bsd_auth (int s, u_char *buf,
|
|||||||
pwd = getpwnam(server_username);
|
pwd = getpwnam(server_username);
|
||||||
if (pwd == NULL)
|
if (pwd == NULL)
|
||||||
fatal(s, "Login incorrect.");
|
fatal(s, "Login incorrect.");
|
||||||
if (iruserok(thataddr.sin_addr.s_addr, pwd->pw_uid == 0,
|
if (iruserok(thataddr->sin_addr.s_addr, pwd->pw_uid == 0,
|
||||||
client_username, server_username))
|
client_username, server_username))
|
||||||
fatal(s, "Login incorrect.");
|
fatal(s, "Login incorrect.");
|
||||||
return 0;
|
return 0;
|
||||||
@@ -133,8 +133,8 @@ recv_bsd_auth (int s, u_char *buf,
|
|||||||
#ifdef KRB4
|
#ifdef KRB4
|
||||||
static int
|
static int
|
||||||
recv_krb4_auth (int s, u_char *buf,
|
recv_krb4_auth (int s, u_char *buf,
|
||||||
struct sockaddr_in thisaddr,
|
struct sockaddr *thisaddr,
|
||||||
struct sockaddr_in thataddr,
|
struct sockaddr *thataddr,
|
||||||
char *client_username,
|
char *client_username,
|
||||||
char *server_username,
|
char *server_username,
|
||||||
char *cmd)
|
char *cmd)
|
||||||
@@ -163,8 +163,8 @@ recv_krb4_auth (int s, u_char *buf,
|
|||||||
&ticket,
|
&ticket,
|
||||||
"rcmd",
|
"rcmd",
|
||||||
instance,
|
instance,
|
||||||
&thataddr,
|
(struct sockaddr_in *)thataddr,
|
||||||
&thisaddr,
|
(struct sockaddr_in *)thisaddr,
|
||||||
&auth,
|
&auth,
|
||||||
"",
|
"",
|
||||||
schedule,
|
schedule,
|
||||||
@@ -182,7 +182,8 @@ recv_krb4_auth (int s, u_char *buf,
|
|||||||
syslog(LOG_INFO|LOG_AUTH,
|
syslog(LOG_INFO|LOG_AUTH,
|
||||||
"kerberos v4 shell from %s on %s as %s, cmd '%.80s'",
|
"kerberos v4 shell from %s on %s as %s, cmd '%.80s'",
|
||||||
krb_unparse_name_long(auth.pname, auth.pinst, auth.prealm),
|
krb_unparse_name_long(auth.pname, auth.pinst, auth.prealm),
|
||||||
inet_ntoa(thataddr.sin_addr),
|
|
||||||
|
inet_ntoa(((struct sockaddr_in *)thataddr)->sin_addr),
|
||||||
server_username,
|
server_username,
|
||||||
cmd);
|
cmd);
|
||||||
|
|
||||||
@@ -239,8 +240,8 @@ out:
|
|||||||
|
|
||||||
static int
|
static int
|
||||||
recv_krb5_auth (int s, u_char *buf,
|
recv_krb5_auth (int s, u_char *buf,
|
||||||
struct sockaddr_in thisaddr,
|
struct sockaddr *thisaddr,
|
||||||
struct sockaddr_in thataddr,
|
struct sockaddr *thataddr,
|
||||||
char *client_username,
|
char *client_username,
|
||||||
char *server_username,
|
char *server_username,
|
||||||
char *cmd)
|
char *cmd)
|
||||||
@@ -303,7 +304,7 @@ recv_krb5_auth (int s, u_char *buf,
|
|||||||
|
|
||||||
cksum_data.length = asprintf ((char **)&cksum_data.data,
|
cksum_data.length = asprintf ((char **)&cksum_data.data,
|
||||||
"%u:%s%s",
|
"%u:%s%s",
|
||||||
ntohs(thisaddr.sin_port),
|
ntohs(socket_get_port (thisaddr)),
|
||||||
cmd,
|
cmd,
|
||||||
server_username);
|
server_username);
|
||||||
|
|
||||||
@@ -380,10 +381,18 @@ recv_krb5_auth (int s, u_char *buf,
|
|||||||
char *name;
|
char *name;
|
||||||
|
|
||||||
if (krb5_unparse_name (context, ticket->client, &name) == 0) {
|
if (krb5_unparse_name (context, ticket->client, &name) == 0) {
|
||||||
|
char addr_str[256];
|
||||||
|
|
||||||
|
if (inet_ntop (thataddr->sa_family,
|
||||||
|
socket_get_address (thataddr),
|
||||||
|
addr_str, sizeof(addr_str)) == NULL)
|
||||||
|
strcpy_truncate (addr_str, "unknown address",
|
||||||
|
sizeof(addr_str));
|
||||||
|
|
||||||
syslog(LOG_INFO|LOG_AUTH,
|
syslog(LOG_INFO|LOG_AUTH,
|
||||||
"kerberos v5 shell from %s on %s as %s, cmd '%.80s'",
|
"kerberos v5 shell from %s on %s as %s, cmd '%.80s'",
|
||||||
name,
|
name,
|
||||||
inet_ntoa(thataddr.sin_addr),
|
addr_str,
|
||||||
server_username,
|
server_username,
|
||||||
cmd);
|
cmd);
|
||||||
free (name);
|
free (name);
|
||||||
@@ -545,7 +554,12 @@ doit (int do_kerberos, int check_rhosts)
|
|||||||
{
|
{
|
||||||
u_char buf[BUFSIZ];
|
u_char buf[BUFSIZ];
|
||||||
u_char *p;
|
u_char *p;
|
||||||
struct sockaddr_in thisaddr, thataddr, erraddr;
|
struct sockaddr_storage thisaddr_ss;
|
||||||
|
struct sockaddr *thisaddr = (struct sockaddr *)&thisaddr_ss;
|
||||||
|
struct sockaddr_storage thataddr_ss;
|
||||||
|
struct sockaddr *thataddr = (struct sockaddr *)&thataddr_ss;
|
||||||
|
struct sockaddr_storage erraddr_ss;
|
||||||
|
struct sockaddr *erraddr = (struct sockaddr *)&erraddr_ss;
|
||||||
int addrlen;
|
int addrlen;
|
||||||
int port;
|
int port;
|
||||||
int errsock = -1;
|
int errsock = -1;
|
||||||
@@ -555,18 +569,14 @@ doit (int do_kerberos, int check_rhosts)
|
|||||||
int s = STDIN_FILENO;
|
int s = STDIN_FILENO;
|
||||||
char *env[7];
|
char *env[7];
|
||||||
|
|
||||||
addrlen = sizeof(thisaddr);
|
addrlen = sizeof(thisaddr_ss);
|
||||||
if (getsockname (s, (struct sockaddr *)&thisaddr, &addrlen) < 0
|
if (getsockname (s, thisaddr, &addrlen) < 0)
|
||||||
|| addrlen != sizeof(thisaddr)) {
|
|
||||||
syslog_and_die("getsockname: %m");
|
syslog_and_die("getsockname: %m");
|
||||||
}
|
addrlen = sizeof(thataddr_ss);
|
||||||
addrlen = sizeof(thataddr);
|
if (getpeername (s, thataddr, &addrlen) < 0)
|
||||||
if (getpeername (s, (struct sockaddr *)&thataddr, &addrlen) < 0
|
|
||||||
|| addrlen != sizeof(thataddr)) {
|
|
||||||
syslog_and_die ("getpeername: %m");
|
syslog_and_die ("getpeername: %m");
|
||||||
}
|
|
||||||
|
|
||||||
if (!do_kerberos && !is_reserved(thataddr.sin_port))
|
if (!do_kerberos && !is_reserved(socket_get_port(thataddr)))
|
||||||
fatal(s, "Permission denied");
|
fatal(s, "Permission denied");
|
||||||
|
|
||||||
p = buf;
|
p = buf;
|
||||||
@@ -594,14 +604,24 @@ doit (int do_kerberos, int check_rhosts)
|
|||||||
* do... :-(
|
* do... :-(
|
||||||
*/
|
*/
|
||||||
|
|
||||||
erraddr = thataddr;
|
erraddr->sa_family = thataddr->sa_family;
|
||||||
erraddr.sin_port = htons(port);
|
socket_set_address_and_port (erraddr,
|
||||||
errsock = rresvport (&priv_port);
|
socket_get_address (thataddr),
|
||||||
|
htons(port));
|
||||||
|
|
||||||
|
/*
|
||||||
|
* we only do reserved port for IPv4
|
||||||
|
*/
|
||||||
|
|
||||||
|
if (erraddr->sa_family == AF_INET)
|
||||||
|
errsock = rresvport (&priv_port);
|
||||||
|
else
|
||||||
|
errsock = socket (erraddr->sa_family, SOCK_STREAM, 0);
|
||||||
if (errsock < 0)
|
if (errsock < 0)
|
||||||
syslog_and_die ("socket: %m");
|
syslog_and_die ("socket: %m");
|
||||||
if (connect (errsock,
|
if (connect (errsock,
|
||||||
(struct sockaddr *)&erraddr,
|
erraddr,
|
||||||
sizeof(erraddr)) < 0)
|
socket_sockaddr_size (erraddr)) < 0)
|
||||||
syslog_and_die ("connect: %m");
|
syslog_and_die ("connect: %m");
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -626,7 +646,9 @@ doit (int do_kerberos, int check_rhosts)
|
|||||||
syslog_and_die ("unrecognized auth protocol: %x %x %x %x",
|
syslog_and_die ("unrecognized auth protocol: %x %x %x %x",
|
||||||
buf[0], buf[1], buf[2], buf[3]);
|
buf[0], buf[1], buf[2], buf[3]);
|
||||||
} else {
|
} else {
|
||||||
if(recv_bsd_auth (s, buf, thisaddr, thataddr,
|
if(recv_bsd_auth (s, buf,
|
||||||
|
(struct sockaddr_in *)thisaddr,
|
||||||
|
(struct sockaddr_in *)thataddr,
|
||||||
client_user,
|
client_user,
|
||||||
server_user,
|
server_user,
|
||||||
cmd) == 0) {
|
cmd) == 0) {
|
||||||
|
Reference in New Issue
Block a user