2 * Copyright (c) 1983, 1993
3 * The Regents of the University of California. All rights reserved.
5 * Redistribution and use in source and binary forms, with or without
6 * modification, are permitted provided that the following conditions
8 * 1. Redistributions of source code must retain the above copyright
9 * notice, this list of conditions and the following disclaimer.
10 * 2. Redistributions in binary form must reproduce the above copyright
11 * notice, this list of conditions and the following disclaimer in the
12 * documentation and/or other materials provided with the distribution.
13 * 3. All advertising materials mentioning features or use of this software
14 * must display the following acknowledgement:
15 * This product includes software developed by the University of
16 * California, Berkeley and its contributors.
17 * 4. Neither the name of the University nor the names of its contributors
18 * may be used to endorse or promote products derived from this software
19 * without specific prior written permission.
21 * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
22 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
23 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
24 * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
25 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
26 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
27 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
28 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
29 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
30 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
33 * @(#) Copyright (c) 1983, 1993 The Regents of the University of California. All rights reserved.
34 * @(#)rexecd.c 8.1 (Berkeley) 6/4/93
35 * $FreeBSD: src/libexec/rexecd/rexecd.c,v 1.18.2.3 2002/05/14 22:27:21 des Exp $
36 * $DragonFly: src/libexec/rexecd/rexecd.c,v 1.5 2007/11/25 01:28:23 swildner Exp $
39 #include <sys/param.h>
40 #include <sys/ioctl.h>
41 #include <sys/socket.h>
43 #include <netinet/in.h>
59 char username
[MAXLOGNAME
+ 5 + 1] = "USER=";
60 char homedir
[MAXPATHLEN
+ 5 + 1] = "HOME=";
61 char shell
[MAXPATHLEN
+ 6 + 1] = "SHELL=";
62 char path
[sizeof(_PATH_DEFPATH
) + sizeof("PATH=")] = "PATH=";
64 {homedir
, shell
, path
, username
, 0};
66 char remote
[MAXHOSTNAMELEN
];
68 struct sockaddr_in asin
= { AF_INET
};
70 void doit (int, struct sockaddr_in
*);
71 void getstr (char *, int, char *);
80 syslog(LOG_ERR
, "usage: rexecd [-i]");
85 * remote execute server:
97 struct sockaddr_in from
;
101 openlog("rexecd", LOG_PID
, LOG_AUTH
);
103 while ((ch
= getopt(argc
, argv
, "i")) != -1)
114 fromlen
= sizeof (from
);
115 if (getpeername(0, (struct sockaddr
*)&from
, &fromlen
) < 0)
116 err(1, "getpeername");
118 realhostname(remote
, sizeof(remote
) - 1, &from
.sin_addr
);
127 struct sockaddr_in
*fromp
;
130 char cmdbuf
[NCARGS
+1], *cp
, *namep
;
132 char user
[16], pass
[100];
134 char user
[16], pass
[16];
139 int pv
[2], pid
, ready
, readfrom
, cc
;
140 char buf
[BUFSIZ
], sig
;
143 (void) signal(SIGINT
, SIG_DFL
);
144 (void) signal(SIGQUIT
, SIG_DFL
);
145 (void) signal(SIGTERM
, SIG_DFL
);
147 { int t
= open(_PATH_TTY
, 2);
149 ioctl(t
, TIOCNOTTY
, (char *)0);
161 if (read(f
, &c
, 1) != 1)
165 port
= port
* 10 + c
- '0';
169 s
= socket(AF_INET
, SOCK_STREAM
, 0);
172 if (bind(s
, (struct sockaddr
*)&asin
, sizeof (asin
)) < 0)
175 fromp
->sin_port
= htons(port
);
176 if (connect(s
, (struct sockaddr
*)fromp
, sizeof (*fromp
)) < 0)
181 getstr(user
, sizeof(user
), "username");
182 getstr(pass
, sizeof(pass
), "password");
183 getstr(cmdbuf
, sizeof(cmdbuf
), "command");
186 pwd
= getpwnam(user
);
188 error("Login incorrect.\n");
192 if (*pwd
->pw_passwd
!= '\0') {
194 namep
= skey_crypt(pass
, pwd
->pw_passwd
, pwd
,
195 skeyaccess(user
, NULL
, remote
, NULL
));
197 namep
= crypt(pass
, pwd
->pw_passwd
);
199 if (strcmp(namep
, pwd
->pw_passwd
)) {
200 syslog(LOG_ERR
, "LOGIN FAILURE from %s, %s",
202 error("Login incorrect.\n");
207 if ((pwd
->pw_uid
== 0 && no_uid_0
) || *pwd
->pw_passwd
== '\0' ||
208 (pwd
->pw_expire
&& time(NULL
) >= pwd
->pw_expire
)) {
209 syslog(LOG_ERR
, "%s LOGIN REFUSED from %s", user
, remote
);
210 error("Login incorrect.\n");
214 if ((fp
= fopen(_PATH_FTPUSERS
, "r")) != NULL
) {
215 while (fgets(buf
, sizeof(buf
), fp
) != NULL
) {
216 if ((cp
= index(buf
, '\n')) != NULL
)
218 if (strcmp(buf
, pwd
->pw_name
) == 0) {
219 syslog(LOG_ERR
, "%s LOGIN REFUSED from %s",
221 error("Login incorrect.\n");
228 syslog(LOG_INFO
, "login from %s as %s", remote
, user
);
230 (void) write(2, "\0", 1);
235 error("Try again.\n");
239 (void) close(0); (void) close(1); (void) close(2);
240 (void) close(f
); (void) close(pv
[1]);
241 readfrom
= (1<<s
) | (1<<pv
[0]);
242 ioctl(pv
[1], FIONBIO
, (char *)&one
);
243 /* should set s nbio! */
246 (void) select(16, (fd_set
*)&ready
,
247 (fd_set
*)NULL
, (fd_set
*)NULL
,
248 (struct timeval
*)NULL
);
249 if (ready
& (1<<s
)) {
250 if (read(s
, &sig
, 1) <= 0)
255 if (ready
& (1<<pv
[0])) {
256 cc
= read(pv
[0], buf
, sizeof (buf
));
258 shutdown(s
, SHUT_RDWR
);
259 readfrom
&= ~(1<<pv
[0]);
261 (void) write(s
, buf
, cc
);
266 setpgrp(0, getpid());
267 (void) close(s
); (void)close(pv
[0]);
270 if (*pwd
->pw_shell
== '\0')
271 pwd
->pw_shell
= _PATH_BSHELL
;
274 if (setlogin(pwd
->pw_name
) < 0)
275 syslog(LOG_ERR
, "setlogin() failed: %m");
276 (void) setgid((gid_t
)pwd
->pw_gid
);
277 initgroups(pwd
->pw_name
, pwd
->pw_gid
);
278 (void) setuid((uid_t
)pwd
->pw_uid
);
279 (void)strcat(path
, _PATH_DEFPATH
);
281 strncat(homedir
, pwd
->pw_dir
, sizeof(homedir
)-6);
282 strncat(shell
, pwd
->pw_shell
, sizeof(shell
)-7);
283 strncat(username
, pwd
->pw_name
, sizeof(username
)-6);
284 cp
= strrchr(pwd
->pw_shell
, '/');
289 if (chdir(pwd
->pw_dir
) < 0) {
290 error("No remote directory.\n");
293 execl(pwd
->pw_shell
, cp
, "-c", cmdbuf
, 0);
294 err(1, "%s", pwd
->pw_shell
);
299 error(fmt
, a1
, a2
, a3
)
306 (void) snprintf(buf
+1, sizeof(buf
) - 1, fmt
, a1
, a2
, a3
);
307 (void) write(2, buf
, strlen(buf
));
311 getstr(buf
, cnt
, err
)
319 if (read(0, &c
, 1) != 1)
323 error("%s too long\n", err
);