
git-svn-id: svn://svn.h5l.se/heimdal/trunk/heimdal@1541 ec53bebd-3082-4978-b11e-865c3cabbd6b
437 lines
11 KiB
C
437 lines
11 KiB
C
/*
|
|
* Copyright (c) 1995, 1996, 1997 Kungliga Tekniska Högskolan
|
|
* (Royal Institute of Technology, Stockholm, Sweden).
|
|
* All rights reserved.
|
|
*
|
|
* Redistribution and use in source and binary forms, with or without
|
|
* modification, are permitted provided that the following conditions
|
|
* are met:
|
|
*
|
|
* 1. Redistributions of source code must retain the above copyright
|
|
* notice, this list of conditions and the following disclaimer.
|
|
*
|
|
* 2. Redistributions in binary form must reproduce the above copyright
|
|
* notice, this list of conditions and the following disclaimer in the
|
|
* documentation and/or other materials provided with the distribution.
|
|
*
|
|
* 3. All advertising materials mentioning features or use of this software
|
|
* must display the following acknowledgement:
|
|
* This product includes software developed by the Kungliga Tekniska
|
|
* Högskolan and its contributors.
|
|
*
|
|
* 4. Neither the name of the Institute nor the names of its contributors
|
|
* may be used to endorse or promote products derived from this software
|
|
* without specific prior written permission.
|
|
*
|
|
* THIS SOFTWARE IS PROVIDED BY THE INSTITUTE AND CONTRIBUTORS ``AS IS'' AND
|
|
* ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
|
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
|
* ARE DISCLAIMED. IN NO EVENT SHALL THE INSTITUTE OR CONTRIBUTORS BE LIABLE
|
|
* FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
|
|
* DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
|
|
* OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
|
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
|
|
* LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
|
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
|
* SUCH DAMAGE.
|
|
*/
|
|
|
|
#include "kx.h"
|
|
|
|
RCSID("$Id$");
|
|
|
|
char x_socket[MaxPathLen];
|
|
|
|
u_int32_t display_num;
|
|
char display[MaxPathLen];
|
|
int display_size = sizeof(display);
|
|
char xauthfile[MaxPathLen];
|
|
int xauthfile_size = sizeof(xauthfile);
|
|
u_char cookie[16];
|
|
size_t cookie_len = sizeof(cookie);
|
|
|
|
static int
|
|
do_enccopy (int fd1, int fd2, int mode, des_cblock *iv,
|
|
des_key_schedule schedule, int *num)
|
|
{
|
|
int ret;
|
|
u_char buf[BUFSIZ];
|
|
|
|
ret = read (fd1, buf, sizeof(buf));
|
|
if (ret == 0)
|
|
return 0;
|
|
if (ret < 0) {
|
|
warn ("read");
|
|
return ret;
|
|
}
|
|
#ifndef NOENCRYPTION
|
|
des_cfb64_encrypt (buf, buf, ret, schedule, iv,
|
|
num, mode);
|
|
#endif
|
|
ret = krb_net_write (fd2, buf, ret);
|
|
if (ret < 0) {
|
|
warn ("write");
|
|
return ret;
|
|
}
|
|
return 1;
|
|
}
|
|
|
|
/*
|
|
* Copy data from `fd1' to `fd2', encrypting it. Data in the other
|
|
* direction is of course, decrypted.
|
|
*/
|
|
|
|
int
|
|
copy_encrypted (int fd1, int fd2, des_cblock *iv,
|
|
des_key_schedule schedule)
|
|
{
|
|
des_cblock iv1, iv2;
|
|
int num1 = 0, num2 = 0;
|
|
|
|
memcpy (&iv1, iv, sizeof(iv1));
|
|
memcpy (&iv2, iv, sizeof(iv2));
|
|
for (;;) {
|
|
fd_set fdset;
|
|
int ret;
|
|
|
|
FD_ZERO(&fdset);
|
|
FD_SET(fd1, &fdset);
|
|
FD_SET(fd2, &fdset);
|
|
|
|
ret = select (max(fd1, fd2)+1, &fdset, NULL, NULL, NULL);
|
|
if (ret < 0 && errno != EINTR) {
|
|
warn ("select");
|
|
return 1;
|
|
}
|
|
if (FD_ISSET(fd1, &fdset)) {
|
|
ret = do_enccopy (fd1, fd2, DES_ENCRYPT, &iv1, schedule, &num1);
|
|
if (ret <= 0)
|
|
return ret;
|
|
}
|
|
if (FD_ISSET(fd2, &fdset)) {
|
|
ret = do_enccopy (fd2, fd1, DES_DECRYPT, &iv2, schedule, &num2);
|
|
if (ret <= 0)
|
|
return ret;
|
|
}
|
|
}
|
|
}
|
|
|
|
#ifndef X_UNIX_PATH
|
|
#define X_UNIX_PATH "/tmp/.X11-unix/X"
|
|
#endif
|
|
|
|
#ifndef INADDR_LOOPBACK
|
|
#define INADDR_LOOPBACK 0x7f000001
|
|
#endif
|
|
|
|
/*
|
|
* Allocate and listen on a local X server socket and a TCP socket.
|
|
* Return the display number.
|
|
*/
|
|
|
|
int
|
|
get_xsockets (int *unix_socket, int *tcp_socket)
|
|
{
|
|
int unixfd, tcpfd = -1;
|
|
struct sockaddr_un unixaddr;
|
|
struct sockaddr_in tcpaddr;
|
|
int dpy;
|
|
int oldmask;
|
|
struct in_addr local;
|
|
char *dir, *p;
|
|
|
|
dir = strdup (X_UNIX_PATH);
|
|
p = strrchr (dir, '/');
|
|
if (p)
|
|
*p = '\0';
|
|
|
|
oldmask = umask(0);
|
|
mkdir (dir, 01777);
|
|
chmod (dir, 01777);
|
|
umask (oldmask);
|
|
free (dir);
|
|
|
|
local.s_addr = htonl(INADDR_LOOPBACK);
|
|
|
|
for(dpy = 4; dpy < 256; ++dpy) {
|
|
unixfd = socket (AF_UNIX, SOCK_STREAM, 0);
|
|
if (unixfd < 0)
|
|
err (1, "socket AF_UNIX");
|
|
memset (&unixaddr, 0, sizeof(unixaddr));
|
|
unixaddr.sun_family = AF_UNIX;
|
|
sprintf (unixaddr.sun_path, X_UNIX_PATH "%u", dpy);
|
|
if(bind(unixfd,
|
|
(struct sockaddr *)&unixaddr,
|
|
sizeof(unixaddr)) < 0) {
|
|
close (unixfd);
|
|
if (errno == EADDRINUSE ||
|
|
errno == EACCES) /* Cray return EACCESS */
|
|
continue;
|
|
else
|
|
return -1;
|
|
}
|
|
|
|
if (tcp_socket) {
|
|
int one = 1;
|
|
|
|
tcpfd = socket (AF_INET, SOCK_STREAM, 0);
|
|
if (tcpfd < 0)
|
|
err (1, "socket AF_INET");
|
|
#if defined(TCP_NODELAY) && defined(HAVE_SETSOCKOPT)
|
|
setsockopt (tcpfd, IPPROTO_TCP, TCP_NODELAY, (void *)&one,
|
|
sizeof(one));
|
|
#endif
|
|
memset (&tcpaddr, 0, sizeof(tcpaddr));
|
|
tcpaddr.sin_family = AF_INET;
|
|
tcpaddr.sin_addr = local;
|
|
tcpaddr.sin_port = htons(6000 + dpy);
|
|
if (bind (tcpfd, (struct sockaddr *)&tcpaddr,
|
|
sizeof(tcpaddr)) < 0) {
|
|
close (unixfd);
|
|
close (tcpfd);
|
|
if (errno == EADDRINUSE)
|
|
continue;
|
|
else
|
|
return -1;
|
|
}
|
|
}
|
|
break;
|
|
}
|
|
if (dpy == 256)
|
|
errx (1, "no free x-servers");
|
|
if (listen (unixfd, SOMAXCONN) < 0)
|
|
err (1, "listen");
|
|
if (tcp_socket)
|
|
if (listen (tcpfd, SOMAXCONN) < 0)
|
|
err (1, "listen");
|
|
strcpy(x_socket, unixaddr.sun_path);
|
|
*unix_socket = unixfd;
|
|
if (tcp_socket)
|
|
*tcp_socket = tcpfd;
|
|
return dpy;
|
|
}
|
|
|
|
/*
|
|
*
|
|
*/
|
|
|
|
int
|
|
connect_local_xsocket (unsigned dnr)
|
|
{
|
|
int fd;
|
|
struct sockaddr_un addr;
|
|
|
|
fd = socket (AF_UNIX, SOCK_STREAM, 0);
|
|
if (fd < 0)
|
|
err (1, "socket AF_UNIX");
|
|
addr.sun_family = AF_UNIX;
|
|
sprintf (addr.sun_path, "/tmp/.X11-unix/X%u", dnr);
|
|
if (connect (fd, (struct sockaddr *)&addr, sizeof(addr)) < 0)
|
|
err (1, "connect");
|
|
return fd;
|
|
}
|
|
|
|
int
|
|
create_and_write_cookie (char *xauthfile,
|
|
u_char *cookie,
|
|
size_t sz)
|
|
{
|
|
Xauth auth;
|
|
char tmp[64];
|
|
FILE *f;
|
|
char hostname[MaxHostNameLen];
|
|
struct in_addr loopback;
|
|
struct hostent *h;
|
|
|
|
k_gethostname (hostname, sizeof(hostname));
|
|
loopback.s_addr = htonl(INADDR_LOOPBACK);
|
|
|
|
auth.family = FamilyLocal;
|
|
auth.address = hostname;
|
|
auth.address_length = strlen(auth.address);
|
|
sprintf (tmp, "%d", display_num);
|
|
auth.number_length = strlen(tmp);
|
|
auth.number = tmp;
|
|
auth.name = COOKIE_TYPE;
|
|
auth.name_length = strlen(auth.name);
|
|
auth.data_length = sz;
|
|
auth.data = (char*)cookie;
|
|
des_rand_data (cookie, sz);
|
|
|
|
f = fopen(xauthfile, "w");
|
|
if (f == NULL)
|
|
return 1;
|
|
if(XauWriteAuth(f, &auth) == 0) {
|
|
fclose(f);
|
|
return 1;
|
|
}
|
|
|
|
h = gethostbyname (hostname);
|
|
if (h == NULL) {
|
|
fclose (f);
|
|
return 1;
|
|
}
|
|
|
|
/*
|
|
* I would like to write a cookie for localhost:n here, but some
|
|
* stupid code in libX11 will not look for cookies of that type,
|
|
* so we are forced to use FamilyWild instead.
|
|
*/
|
|
|
|
auth.family = FamilyWild;
|
|
auth.address_length = 0;
|
|
|
|
#if 0 /* XXX */
|
|
auth.address = (char *)&loopback;
|
|
auth.address_length = sizeof(loopback);
|
|
#endif
|
|
|
|
if (XauWriteAuth(f, &auth) == 0) {
|
|
fclose (f);
|
|
return 1;
|
|
}
|
|
|
|
if(fclose(f))
|
|
return 1;
|
|
return 0;
|
|
}
|
|
|
|
/*
|
|
* Verify and remove cookies. Read and parse a X-connection from
|
|
* `fd'. Check the cookie used is the same as in `cookie'. Remove the
|
|
* cookie and copy the rest of it to `sock'.
|
|
* Return 0 iff ok.
|
|
*/
|
|
|
|
int
|
|
verify_and_remove_cookies (int fd, int sock)
|
|
{
|
|
u_char beg[12];
|
|
int bigendianp;
|
|
unsigned n, d, npad, dpad;
|
|
char *protocol_name, *protocol_data;
|
|
u_char zeros[6] = {0, 0, 0, 0, 0, 0};
|
|
|
|
if (krb_net_read (fd, beg, sizeof(beg)) != sizeof(beg))
|
|
return 1;
|
|
if (krb_net_write (sock, beg, 6) != 6)
|
|
return 1;
|
|
bigendianp = beg[0] == 'B';
|
|
if (bigendianp) {
|
|
n = (beg[6] << 8) | beg[7];
|
|
d = (beg[8] << 8) | beg[9];
|
|
} else {
|
|
n = (beg[7] << 8) | beg[6];
|
|
d = (beg[9] << 8) | beg[8];
|
|
}
|
|
npad = (4 - (n % 4)) % 4;
|
|
dpad = (4 - (d % 4)) % 4;
|
|
protocol_name = malloc(n + npad);
|
|
protocol_data = malloc(d + dpad);
|
|
if (krb_net_read (fd, protocol_name, n + npad) != n + npad)
|
|
return 1;
|
|
if (krb_net_read (fd, protocol_data, d + dpad) != d + dpad)
|
|
return 1;
|
|
if (strncmp (protocol_name, COOKIE_TYPE, strlen(COOKIE_TYPE)) != 0)
|
|
return 1;
|
|
if (d != cookie_len ||
|
|
memcmp (protocol_data, cookie, cookie_len) != 0)
|
|
return 1;
|
|
if (krb_net_write (sock, zeros, 6) != 6)
|
|
return 1;
|
|
return 0;
|
|
}
|
|
|
|
/*
|
|
* Get rid of the cookie that we were sent and get the correct one
|
|
* from our own cookie file instead.
|
|
*/
|
|
|
|
int
|
|
replace_cookie(int xserver, int fd, char *filename)
|
|
{
|
|
u_char beg[12];
|
|
int bigendianp;
|
|
unsigned n, d, npad, dpad;
|
|
Xauth *auth;
|
|
FILE *f;
|
|
u_char zeros[6] = {0, 0, 0, 0, 0, 0};
|
|
|
|
if (krb_net_read (fd, beg, sizeof(beg)) != sizeof(beg))
|
|
return 1;
|
|
if (krb_net_write (xserver, beg, 6) != 6)
|
|
return 1;
|
|
bigendianp = beg[0] == 'B';
|
|
if (bigendianp) {
|
|
n = (beg[6] << 8) | beg[7];
|
|
d = (beg[8] << 8) | beg[9];
|
|
} else {
|
|
n = (beg[7] << 8) | beg[6];
|
|
d = (beg[9] << 8) | beg[8];
|
|
}
|
|
if (n != 0 || d != 0)
|
|
return 1;
|
|
f = fopen(filename, "r");
|
|
if (f) {
|
|
u_char len[6] = {0, 0, 0, 0, 0, 0};
|
|
|
|
auth = XauReadAuth(f);
|
|
fclose(f);
|
|
n = auth->name_length;
|
|
d = auth->data_length;
|
|
if (bigendianp) {
|
|
len[0] = n >> 8;
|
|
len[1] = n & 0xFF;
|
|
len[2] = d >> 8;
|
|
len[3] = d & 0xFF;
|
|
} else {
|
|
len[0] = n & 0xFF;
|
|
len[1] = n >> 8;
|
|
len[2] = d & 0xFF;
|
|
len[3] = d >> 8;
|
|
}
|
|
if (krb_net_write (xserver, len, 6) != 6)
|
|
return 1;
|
|
if(krb_net_write (xserver, auth->name, n) != n)
|
|
return 1;
|
|
npad = (4 - (n % 4)) % 4;
|
|
if (npad) {
|
|
if (krb_net_write (xserver, zeros, npad) != npad)
|
|
return 1;
|
|
}
|
|
if (krb_net_write (xserver, auth->data, d) != d)
|
|
return 1;
|
|
dpad = (4 - (d % 4)) % 4;
|
|
if (dpad) {
|
|
if (krb_net_write (xserver, zeros, dpad) != dpad)
|
|
return 1;
|
|
}
|
|
XauDisposeAuth(auth);
|
|
} else {
|
|
if(krb_net_write(xserver, zeros, 6) != 6)
|
|
return 1;
|
|
}
|
|
return 0;
|
|
}
|
|
|
|
|
|
|
|
|
|
/*
|
|
* Some simple controls on the address and corresponding socket
|
|
*/
|
|
|
|
int
|
|
suspicious_address (int sock, struct sockaddr_in addr)
|
|
{
|
|
char data[40];
|
|
int len = sizeof(data);
|
|
|
|
return addr.sin_addr.s_addr != htonl(INADDR_LOOPBACK)
|
|
#if defined(IP_OPTIONS) && defined(HAVE_GETSOCKOPT)
|
|
|| getsockopt (sock, IPPROTO_IP, IP_OPTIONS, data, &len) < 0
|
|
|| len != 0
|
|
#endif
|
|
;
|
|
}
|