2 * Copyright (c) 1990, 1993
3 * The Regents of the University of California. All rights reserved.
5 * Redistribution and use in source and binary forms, with or without
6 * modification, are permitted provided that the following conditions
8 * 1. Redistributions of source code must retain the above copyright
9 * notice, this list of conditions and the following disclaimer.
10 * 2. Redistributions in binary form must reproduce the above copyright
11 * notice, this list of conditions and the following disclaimer in the
12 * documentation and/or other materials provided with the distribution.
13 * 3. Neither the name of the University nor the names of its contributors
14 * may be used to endorse or promote products derived from this software
15 * without specific prior written permission.
17 * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
18 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
19 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
20 * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
21 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
22 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
23 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
24 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
25 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
26 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
29 * @(#) Copyright (c) 1990, 1993 The Regents of the University of California. All rights reserved.
30 * @(#)sliplogin.c 8.2 (Berkeley) 2/1/94
31 * $FreeBSD: src/usr.sbin/sliplogin/sliplogin.c,v 1.9.6.2 2001/07/19 05:21:28 kris Exp $
32 * $DragonFly: src/usr.sbin/sliplogin/sliplogin.c,v 1.5 2008/09/14 22:04:36 swildner Exp $
37 * [MUST BE RUN SUID, SLOPEN DOES A SUSER()!]
39 * This program initializes its own tty port to be an async TCP/IP interface.
40 * It sets the line discipline to slip, invokes a shell script to initialize
41 * the network interface, then pauses forever waiting for hangup.
43 * It is a remote descendant of several similar programs with incestuous ties:
44 * - Kirk Smith's slipconf, modified by Richard Johnsson @ DEC WRL.
45 * - slattach, probably by Rick Adams but touched by countless hordes.
46 * - the original sliplogin for 4.2bsd, Doug Kingston the mover behind it.
48 * There are two forms of usage:
51 * Invoked simply as "sliplogin", the program looks up the username
52 * in the file /etc/slip.hosts.
53 * If an entry is found, the line on fd0 is configured for SLIP operation
54 * as specified in the file.
56 * "sliplogin IPhostlogin </dev/ttyb"
57 * Invoked by root with a username, the name is looked up in the
58 * /etc/slip.hosts file and if found fd0 is configured as in case 1.
61 #include <sys/param.h>
62 #include <sys/socket.h>
69 #include <sys/ioctl.h>
81 #include "pathnames.h"
83 extern char **environ
;
85 static char *restricted_environ
[] = {
86 "PATH=" _PATH_STDPATH
,
97 char loginargs
[BUFSIZ
];
98 char loginfile
[MAXPATHLEN
];
99 char loginname
[BUFSIZ
];
100 static char raddr
[32]; /* remote address */
101 char ifname
[IFNAMSIZ
]; /* interface name */
102 static char pidfilename
[MAXPATHLEN
]; /* name of pid file */
103 static char iffilename
[MAXPATHLEN
]; /* name of if file */
104 static pid_t pid
; /* our pid */
109 static char address
[20] ="";
111 unsigned long ipaddr
;
114 if ((he
= gethostbyname(raddr
)) != NULL
) {
115 ipaddr
= ntohl(*(long *)he
->h_addr_list
[0]);
116 sprintf(address
, "%lu.%lu.%lu.%lu",
118 (ipaddr
& 0x00ff0000) >> 16,
119 (ipaddr
& 0x0000ff00) >> 8,
120 (ipaddr
& 0x000000ff));
132 "compress", IFF_LINK0
, IFF_LINK2
,
133 "noicmp", IFF_LINK1
, 0 ,
134 "autocomp", IFF_LINK2
, IFF_LINK0
,
141 static char slopt
[5][16];
142 static char laddr
[16];
143 static char mask
[16];
144 char slparmsfile
[MAXPATHLEN
];
149 environ
= restricted_environ
; /* minimal protection for system() */
151 strncpy(loginname
, name
, sizeof(loginname
)-1);
152 loginname
[sizeof(loginname
)-1] = '\0';
154 if ((fp
= fopen(_PATH_ACCESS
, "r")) == NULL
) {
156 syslog(LOG_ERR
, "%s: %m\n", _PATH_ACCESS
);
159 while (fgets(loginargs
, sizeof(loginargs
) - 1, fp
)) {
162 if (loginargs
[0] == '#' || isspace(loginargs
[0]))
164 n
= sscanf(loginargs
, "%15s%*[ \t]%15s%*[ \t]%15s%*[ \t]%15s%*[ \t]%15s%*[ \t]%15s%*[ \t]%15s%*[ \t]%15s%*[ \t]%15s\n",
165 user
, laddr
, raddr
, mask
, slopt
[0], slopt
[1],
166 slopt
[2], slopt
[3], slopt
[4]);
168 syslog(LOG_ERR
, "%s: wrong format\n", _PATH_ACCESS
);
171 if (strcmp(user
, name
) != 0)
177 for (i
= 0; i
< n
- 4; i
++) {
178 for (j
= 0; j
< sizeof(modes
)/sizeof(struct slip_modes
);
180 if (strcmp(modes
[j
].sm_name
, slopt
[i
]) == 0) {
181 slip_mode
|= (modes
[j
].sm_or_flag
);
182 slip_mode
&= ~(modes
[j
].sm_and_flag
);
189 * we've found the guy we're looking for -- see if
190 * there's a login file we can use. First check for
191 * one specific to this host. If none found, try for
194 snprintf(loginfile
, sizeof(loginfile
), "%s.%s", _PATH_SLOGIN
, name
);
195 if (access(loginfile
, R_OK
|X_OK
) != 0) {
196 strncpy(loginfile
, _PATH_SLOGIN
, sizeof(loginfile
)-1);
197 loginfile
[sizeof(loginfile
)-1] = '\0';
198 if (access(loginfile
, R_OK
|X_OK
)) {
200 "access denied for %s - no %s\n",
205 snprintf(slparmsfile
, sizeof(slparmsfile
), "%s.%s", _PATH_SLPARMS
, name
);
206 if (access(slparmsfile
, R_OK
|X_OK
) != 0) {
207 strncpy(slparmsfile
, _PATH_SLPARMS
, sizeof(slparmsfile
)-1);
208 slparmsfile
[sizeof(slparmsfile
)-1] = '\0';
209 if (access(slparmsfile
, R_OK
|X_OK
))
212 keepal
= outfill
= 0;
215 if ((fp
= fopen(slparmsfile
, "r")) == NULL
) {
217 syslog(LOG_ERR
, "%s: %m\n", slparmsfile
);
221 while (fgets(buf
, sizeof(buf
) - 1, fp
) != NULL
) {
224 if (buf
[0] == '#' || isspace(buf
[0]))
226 n
= sscanf(buf
, "%d %d %d", &keepal
, &outfill
, &slunit
);
229 syslog(LOG_ERR
, "%s: wrong format\n", slparmsfile
);
241 syslog(LOG_ERR
, "SLIP access denied for %s\n", name
);
252 case SIGHUP
: return("HUP");
253 case SIGINT
: return("INT");
254 case SIGQUIT
: return("QUIT");
255 case SIGILL
: return("ILL");
256 case SIGTRAP
: return("TRAP");
257 case SIGIOT
: return("IOT");
258 case SIGEMT
: return("EMT");
259 case SIGFPE
: return("FPE");
260 case SIGKILL
: return("KILL");
261 case SIGBUS
: return("BUS");
262 case SIGSEGV
: return("SEGV");
263 case SIGSYS
: return("SYS");
264 case SIGPIPE
: return("PIPE");
265 case SIGALRM
: return("ALRM");
266 case SIGTERM
: return("TERM");
267 case SIGURG
: return("URG");
268 case SIGSTOP
: return("STOP");
269 case SIGTSTP
: return("TSTP");
270 case SIGCONT
: return("CONT");
271 case SIGCHLD
: return("CHLD");
272 case SIGTTIN
: return("TTIN");
273 case SIGTTOU
: return("TTOU");
274 case SIGIO
: return("IO");
275 case SIGXCPU
: return("XCPU");
276 case SIGXFSZ
: return("XFSZ");
277 case SIGVTALRM
: return("VTALRM");
278 case SIGPROF
: return("PROF");
279 case SIGWINCH
: return("WINCH");
281 case SIGLOST
: return("LOST");
283 case SIGUSR1
: return("USR1");
284 case SIGUSR2
: return("USR2");
286 snprintf(buf
, sizeof(buf
), "sig %d", s
);
293 char logoutfile
[MAXPATHLEN
];
297 snprintf(logoutfile
, sizeof(logoutfile
), "%s.%s", _PATH_SLOGOUT
, loginname
);
298 if (access(logoutfile
, R_OK
|X_OK
) != 0) {
299 strncpy(logoutfile
, _PATH_SLOGOUT
, sizeof(logoutfile
)-1);
300 logoutfile
[sizeof(logoutfile
)-1] = '\0';
302 if (access(logoutfile
, R_OK
|X_OK
) == 0) {
303 char logincmd
[2*MAXPATHLEN
+32];
305 snprintf(logincmd
, sizeof(logincmd
), "%s %d %ld %s", logoutfile
, unit
, speed
, loginargs
);
308 syslog(LOG_INFO
, "closed %s slip unit %d (%s)\n", loginname
, unit
,
310 if (unlink(pidfilename
) < 0 && errno
!= ENOENT
)
311 syslog(LOG_WARNING
, "unable to delete pid file: %m");
312 if (unlink(iffilename
) < 0 && errno
!= ENOENT
)
313 syslog(LOG_WARNING
, "unable to delete if file: %m");
319 /* Modify the slip line mode and add any compression or no-icmp flags. */
326 /* open a socket as the handle to the interface */
327 s
= socket(AF_INET
, SOCK_DGRAM
, 0);
329 syslog(LOG_ERR
, "socket: %m");
332 sprintf(ifr
.ifr_name
, "sl%d", unit
);
334 /* get the flags for the interface */
335 if (ioctl(s
, SIOCGIFFLAGS
, (caddr_t
)&ifr
) < 0) {
336 syslog(LOG_ERR
, "ioctl (SIOCGIFFLAGS): %m");
340 /* Assert any compression or no-icmp flags. */
341 #define SLMASK (~(IFF_LINK0 | IFF_LINK1 | IFF_LINK2))
342 ifr
.ifr_flags
&= SLMASK
;
343 ifr
.ifr_flags
|= slip_mode
;
344 if (ioctl(s
, SIOCSIFFLAGS
, (caddr_t
)&ifr
) < 0) {
345 syslog(LOG_ERR
, "ioctl (SIOCSIFFLAGS): %m");
352 main(int argc
, char *argv
[])
356 struct termios tios
, otios
;
357 char logincmd
[2*BUFSIZ
+32];
358 extern uid_t
getuid();
360 FILE *pidfile
; /* pid file */
361 FILE *iffile
; /* interfaces file */
364 char devnam
[MAXPATHLEN
] = _PATH_TTY
; /* Device name */
366 if ((name
= strrchr(argv
[0], '/')) == NULL
)
369 for (fd
= 3 ; fd
< s
; fd
++)
371 openlog(name
, LOG_PID
|LOG_PERROR
, LOG_DAEMON
);
377 * Disassociate from current controlling terminal, if any,
378 * and ensure that the slip line is our controlling terminal.
381 syslog(LOG_ERR
, "daemon(1, 1): %m");
385 if ((fd
= open(argv
[2], O_RDWR
)) == -1) {
386 syslog(LOG_ERR
, "open %s: %m", argv
[2]);
393 if (ioctl(0, TIOCSCTTY
, 0) == -1) {
394 syslog(LOG_ERR
, "ioctl (TIOCSCTTY): %m");
397 if (tcsetpgrp(0, getpid()) < 0) {
398 syslog(LOG_ERR
, "tcsetpgrp failed: %m");
402 if ((name
= getlogin()) == NULL
) {
403 syslog(LOG_ERR
, "access denied - login name not found\n");
409 fprintf(stderr
, "starting slip login for %s\n", loginname
);
410 fprintf(stderr
, "your address is %s\n\n", make_ipaddr());
415 /* set up the line parameters */
416 if (tcgetattr(0, &tios
) < 0) {
417 syslog(LOG_ERR
, "tcgetattr: %m");
422 if (tcsetattr(0, TCSAFLUSH
, &tios
) < 0) {
423 syslog(LOG_ERR
, "tcsetattr: %m");
426 speed
= cfgetispeed(&tios
);
429 if (ioctl(0, TIOCSETD
, &ldisc
) < 0) {
430 syslog(LOG_ERR
, "ioctl(TIOCSETD): %m");
433 if (slunit
>= 0 && ioctl(0, SLIOCSUNIT
, &slunit
) < 0) {
434 syslog(LOG_ERR
, "ioctl (SLIOCSUNIT): %m");
437 /* find out what unit number we were assigned */
438 if (ioctl(0, SLIOCGUNIT
, &unit
) < 0) {
439 syslog(LOG_ERR
, "ioctl (SLIOCGUNIT): %m");
442 signal(SIGHUP
, hup_handler
);
443 signal(SIGTERM
, hup_handler
);
446 signal(SIGURG
, hup_handler
);
447 if (ioctl(0, SLIOCSKEEPAL
, &keepal
) < 0) {
448 syslog(LOG_ERR
, "ioctl(SLIOCSKEEPAL): %m");
452 if (outfill
> 0 && ioctl(0, SLIOCSOUTFILL
, &outfill
) < 0) {
453 syslog(LOG_ERR
, "ioctl(SLIOCSOUTFILL): %m");
457 /* write pid to file */
459 sprintf(ifname
, "sl%d", unit
);
460 sprintf(pidfilename
, "%s%s.pid", _PATH_VARRUN
, ifname
);
461 if ((pidfile
= fopen(pidfilename
, "w")) != NULL
) {
462 fprintf(pidfile
, "%d\n", pid
);
465 syslog(LOG_ERR
, "Failed to create pid file %s: %m",
470 /* write interface unit number to file */
474 for (n
= strlen(devnam
); n
> 0; n
--)
475 if (devnam
[n
] == '/') {
479 sprintf(iffilename
, "%s%s.if", _PATH_VARRUN
, &devnam
[n
]);
480 if ((iffile
= fopen(iffilename
, "w")) != NULL
) {
481 fprintf(iffile
, "sl%d\n", unit
);
484 syslog(LOG_ERR
, "Failed to create if file %s: %m", iffilename
);
489 syslog(LOG_INFO
, "attaching slip unit %d for %s\n", unit
, loginname
);
490 snprintf(logincmd
, sizeof(logincmd
), "%s %d %ld %s", loginfile
, unit
, speed
,
493 * aim stdout and errout at /dev/null so logincmd output won't
494 * babble into the slip tty line.
497 if ((fd
= open(_PATH_DEVNULL
, O_WRONLY
)) != 1) {
499 syslog(LOG_ERR
, "open %s: %m", _PATH_DEVNULL
);
508 * Run login and logout scripts as root (real and effective);
509 * current route(8) is setuid root, and checks the real uid
510 * to see whether changes are allowed (or just "route get").
513 if (s
= system(logincmd
)) {
514 syslog(LOG_ERR
, "%s login failed: exit status %d from %s",
515 loginname
, s
, loginfile
);
519 /* Handle any compression or no-icmp flags. */
522 /* reset uid to users' to allow the user to give a signal. */
524 /* twiddle thumbs until we get a signal */