2 * pmap_check - additional portmap security.
4 * Always reject non-local requests to update the portmapper tables.
6 * Refuse to forward mount requests to the nfs mount daemon. Otherwise, the
7 * requests would appear to come from the local system, and nfs export
8 * restrictions could be bypassed.
10 * Refuse to forward requests to the nfsd process.
12 * Refuse to forward requests to NIS (YP) daemons; The only exception is the
13 * YPPROC_DOMAIN_NONACK broadcast rpc call that is used to establish initial
14 * contact with the NIS server.
16 * Always allocate an unprivileged port when forwarding a request.
18 * If compiled with -DCHECK_PORT, require that requests to register or
19 * unregister a privileged port come from a privileged port. This makes it
20 * more difficult to replace a critical service by a trojan.
22 * If compiled with -DHOSTS_ACCESS, reject requests from hosts that are not
23 * authorized by the /etc/hosts.{allow,deny} files. The local system is
24 * always treated as an authorized host. The access control tables are never
25 * consulted for requests from the local system, and are always consulted
26 * for requests from other hosts. Access control is based on IP addresses
27 * only; attempts to map an address to a host name might cause the
30 * Author: Wietse Venema (wietse@wzv.win.tue.nl), dept. of Mathematics and
31 * Computing Science, Eindhoven University of Technology, The Netherlands.
35 * @(#) pmap_check.c 1.6 93/11/21 20:58:59
36 * $FreeBSD: src/usr.sbin/portmap/pmap_check.c,v 1.6 2000/01/15 23:08:28 brian Exp $
37 * $DragonFly: src/usr.sbin/portmap/pmap_check.c,v 1.5 2007/11/25 01:28:24 swildner Exp $
40 #include <sys/types.h>
41 #include <sys/socket.h>
42 #include <sys/signal.h>
43 #include <netinet/in.h>
44 #include <arpa/inet.h>
46 #include <rpc/pmap_prot.h>
54 #include "pmap_check.h"
56 /* Explicit #defines in case the include files are not available. */
58 #define NFSPROG ((u_long) 100003)
59 #define MOUNTPROG ((u_long) 100005)
60 #define YPXPROG ((u_long) 100069)
61 #define YPPROG ((u_long) 100004)
62 #define YPPROC_DOMAIN_NONACK ((u_long) 2)
63 #define MOUNTPROC_MNT ((u_long) 1)
65 static void logit(int, struct sockaddr_in
*, u_long
, u_long
, const char *);
66 static void toggle_verboselog(int);
69 int allow_severity
= LOG_INFO
;
70 int deny_severity
= LOG_WARNING
;
72 /* A handful of macros for "readability". */
74 #define good_client(a) hosts_ctl("portmap", "", inet_ntoa(a->sin_addr), "")
76 #define legal_port(a,p) \
77 (ntohs((a)->sin_port) < IPPORT_RESERVED || (p) >= IPPORT_RESERVED)
79 #define log_bad_port(addr, proc, prog) \
80 logit(deny_severity, addr, proc, prog, ": request from unprivileged port")
82 #define log_bad_host(addr, proc, prog) \
83 logit(deny_severity, addr, proc, prog, ": request from unauthorized host")
85 #define log_bad_owner(addr, proc, prog) \
86 logit(deny_severity, addr, proc, prog, ": request from non-local host")
88 #define log_no_forward(addr, proc, prog) \
89 logit(deny_severity, addr, proc, prog, ": request not forwarded")
91 #define log_client(addr, proc, prog) \
92 logit(allow_severity, addr, proc, prog, "")
94 /* check_startup - additional startup code */
100 * Give up root privileges so that we can never allocate a privileged
101 * port when forwarding an rpc request.
103 if (setuid(1) == -1) {
104 syslog(LOG_ERR
, "setuid(1) failed: %m");
107 signal(SIGINT
, toggle_verboselog
);
110 /* check_default - additional checks for NULL, DUMP, GETPORT and unknown */
113 check_default(struct sockaddr_in
*addr
, u_long proc
, u_long prog
)
116 if (!(from_local(addr
) || good_client(addr
))) {
117 log_bad_host(addr
, proc
, prog
);
122 log_client(addr
, proc
, prog
);
126 /* check_privileged_port - additional checks for privileged-port updates */
129 check_privileged_port(struct sockaddr_in
*addr
,
130 u_long proc
, u_long prog
, u_long port
)
133 if (!legal_port(addr
, port
)) {
134 log_bad_port(addr
, proc
, prog
);
141 /* check_setunset - additional checks for update requests */
144 check_setunset(struct sockaddr_in
*addr
,
145 u_long proc
, u_long prog
, u_long port
)
147 if (!from_local(addr
)) {
149 good_client(addr
); /* because of side effects */
151 log_bad_owner(addr
, proc
, prog
);
154 if (port
&& !check_privileged_port(addr
, proc
, prog
, port
))
157 log_client(addr
, proc
, prog
);
161 /* check_callit - additional checks for forwarded requests */
164 check_callit(struct sockaddr_in
*addr
, u_long proc
, u_long prog
, u_long aproc
)
167 if (!(from_local(addr
) || good_client(addr
))) {
168 log_bad_host(addr
, proc
, prog
);
172 if (prog
== PMAPPROG
|| prog
== NFSPROG
|| prog
== YPXPROG
||
173 (prog
== MOUNTPROG
&& aproc
== MOUNTPROC_MNT
) ||
174 (prog
== YPPROG
&& aproc
!= YPPROC_DOMAIN_NONACK
)) {
175 log_no_forward(addr
, proc
, prog
);
179 log_client(addr
, proc
, prog
);
183 /* toggle_verboselog - toggle verbose logging flag */
186 toggle_verboselog(int sig
)
188 signal(sig
, toggle_verboselog
);
189 verboselog
= !verboselog
;
192 /* logit - report events of interest via the syslog daemon */
195 logit(int severity
, struct sockaddr_in
*addr
, u_long procnum
, u_long prognum
,
198 const char *procname
;
199 char procbuf
[4 * sizeof(u_long
)];
200 const char *progname
;
201 char progbuf
[4 * sizeof(u_long
)];
207 struct proc_map
*procp
;
208 static struct proc_map procmap
[] = {
209 {PMAPPROC_CALLIT
, "callit"},
210 {PMAPPROC_DUMP
, "dump"},
211 {PMAPPROC_GETPORT
, "getport"},
212 {PMAPPROC_NULL
, "null"},
213 {PMAPPROC_SET
, "set"},
214 {PMAPPROC_UNSET
, "unset"},
219 * Fork off a process or the portmap daemon might hang while
220 * getrpcbynumber() or syslog() does its thing.
225 /* Try to map program number to name. */
229 } else if ((rpc
= getrpcbynumber((int) prognum
))) {
230 progname
= rpc
->r_name
;
232 sprintf(progbuf
, "%lu", prognum
);
236 /* Try to map procedure number to name. */
238 for (procp
= procmap
; procp
->proc
&& procp
->code
!= procnum
; procp
++)
240 if ((procname
= procp
->proc
) == 0) {
241 sprintf(procbuf
, "%lu", (u_long
) procnum
);
245 /* Write syslog record. */
247 syslog(severity
, "connect from %s to %s(%s)%s",
248 inet_ntoa(addr
->sin_addr
), procname
, progname
, text
);