summaryrefslogtreecommitdiffstats
path: root/libexec/ftp-proxy/util.c
diff options
context:
space:
mode:
authorbeck <beck@openbsd.org>2001-08-19 04:11:11 +0000
committerbeck <beck@openbsd.org>2001-08-19 04:11:11 +0000
commit19c07a54afb1800d21a855e16f410d13535735a9 (patch)
tree80cabb2b1f0876e98ee584e2e0b0b00fe9a42f43 /libexec/ftp-proxy/util.c
parentenable pthread_main_np(3) (diff)
downloadwireguard-openbsd-19c07a54afb1800d21a855e16f410d13535735a9.tar.xz
wireguard-openbsd-19c07a54afb1800d21a855e16f410d13535735a9.zip
transparent ftp proxy, based on Obtuse Systems juniper stuff with much
modernizing and cleanup. still needs looking at. Currently supports PORT PASV EPRT data connections with only a pf rdr to capture the control connection. (I.E. you don't need ip forwarding or other NAT stuff). Runs from inetd. Supports all passive (EPSV PASV) when using -n flag, where the proxy ignores passive mode data connections (and assumes nat will get them through). Todo yet: More audit IpV6 Handle EPSV in proxy (with an rdr added then removed) Option to Daemonize and bind only to the loopback More Content/Login filtering, etc. etc. and more bloat
Diffstat (limited to 'libexec/ftp-proxy/util.c')
-rw-r--r--libexec/ftp-proxy/util.c322
1 files changed, 322 insertions, 0 deletions
diff --git a/libexec/ftp-proxy/util.c b/libexec/ftp-proxy/util.c
new file mode 100644
index 00000000000..e553b5cf3dc
--- /dev/null
+++ b/libexec/ftp-proxy/util.c
@@ -0,0 +1,322 @@
+/* $OpenBSD: util.c,v 1.1 2001/08/19 04:11:12 beck Exp $ */
+/*
+ * Copyright (c) 1996-2001
+ * Obtuse Systems Corporation. All rights reserved.
+ *
+ * Redistribution and use in source and binary forms, with or without
+ * modification, are permitted provided that the following conditions
+ * are met:
+ * 1. Redistributions of source code must retain the above copyright
+ * notice, this list of conditions and the following disclaimer.
+ * 2. Redistributions in binary form must reproduce the above copyright
+ * notice, this list of conditions and the following disclaimer in the
+ * documentation and/or other materials provided with the distribution.
+ * 3. Neither the name of the Obtuse Systems nor the names of its contributors
+ * may be used to endorse or promote products derived from this software
+ * without specific prior written permission.
+ *
+ * THIS SOFTWARE IS PROVIDED BY THE OBTUSE SYSTEMS AND CONTRIBUTORS
+ * ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
+ * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS
+ * FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL OBTUSE
+ * SYSTEMS CORPORATION OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT,
+ * INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES
+ * (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR
+ * SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
+ * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
+ * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
+ * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
+ * OF THE POSSIBILITY OF SUCH DAMAGE.
+ *
+ */
+
+
+#include <sys/types.h>
+#include <sys/socket.h>
+#include <netinet/in.h>
+#include <sys/ioctl.h>
+#include <sys/file.h>
+#include <netinet/in.h>
+#include <netinet/in_systm.h>
+#include <net/if.h>
+#include <net/pfvar.h>
+
+#include <arpa/inet.h>
+
+#include <ctype.h>
+#include <errno.h>
+#include <netdb.h>
+#include <signal.h>
+#include <stdio.h>
+#include <stdlib.h>
+#include <string.h>
+#include <stdarg.h>
+#include <sysexits.h>
+#include <syslog.h>
+#include <tcpd.h>
+#include <unistd.h>
+
+#include "util.h"
+
+int Debug_Level;
+int Use_Rdns;
+
+void
+debuglog(int debug_level, const char *fmt, ...)
+{
+ va_list ap;
+ va_start(ap,fmt);
+
+ if (Debug_Level >= debug_level) {
+ vsyslog(LOG_DEBUG, fmt, ap);
+ }
+}
+
+
+int
+get_proxy_env(int connected_fd, struct sockaddr_in *real_server_sa_ptr,
+ struct sockaddr_in *client_sa_ptr)
+{
+ struct pf_natlook natlook;
+ struct pf_natlook *natlookp;
+ char * client;
+ int slen, fd;
+
+
+ slen = sizeof(*real_server_sa_ptr);
+ if (getsockname(connected_fd, (struct sockaddr *)real_server_sa_ptr,
+ &slen) != 0) {
+ syslog(LOG_ERR,"getsockname failed (%m)");
+ return(-1);
+ }
+ slen = sizeof(*client_sa_ptr);
+ if (getpeername(connected_fd, (struct sockaddr *)client_sa_ptr,
+ &slen) != 0) {
+ syslog(LOG_ERR,"getpeername failed (%m)");
+ return(-1);
+ }
+
+
+ /*
+ * Build up the pf natlook structure.
+ */
+
+ memset((void *)&natlook, 0, sizeof(natlook));
+ natlook.saddr = client_sa_ptr->sin_addr.s_addr;
+ natlook.daddr = real_server_sa_ptr->sin_addr.s_addr;
+ natlook.proto = IPPROTO_TCP;
+ natlook.sport = client_sa_ptr->sin_port;
+ natlook.dport = real_server_sa_ptr->sin_port;
+ natlook.direction = PF_OUT;
+
+ /*
+ * Open the pf device and lookup the mapping pair to find
+ * the original address we were supposed to connect to.
+ */
+
+ client = strdup(inet_ntoa(client_sa_ptr->sin_addr));
+ if (client == NULL) {
+ errno = ENOMEM;
+ return(-1);
+ }
+
+ fd = open("/dev/pf", O_RDWR);
+ if (fd == -1) {
+ syslog(LOG_ERR, "Can't open /dev/pf (%m)");
+ exit(EX_UNAVAILABLE);
+ }
+
+ natlookp = &natlook;
+ if (ioctl(fd, DIOCNATLOOK, natlookp) == -1) {
+ syslog(LOG_INFO,
+ "pf nat lookup failed (%m), connection from %s:%hu",
+ client, ntohs(client_sa_ptr->sin_port));
+ close(fd);
+ return(-1);
+ }
+ close(fd);
+
+ /*
+ * Now jam the original address and port back into the into
+ * destination sockaddr_in for the proxy to deal with.
+ */
+
+ memset((void *)real_server_sa_ptr, 0, sizeof(struct sockaddr_in));
+ real_server_sa_ptr->sin_port = natlookp->rdport;
+ real_server_sa_ptr->sin_addr.s_addr = natlookp->rdaddr;
+ real_server_sa_ptr->sin_len = sizeof(struct sockaddr_in);
+ real_server_sa_ptr->sin_family = AF_INET;
+ return(0);
+}
+
+
+/*
+ * Transfer one unit of data across a pair of sockets
+ *
+ * A unit of data is as much as we get with a single read(2) call.
+ *
+ */
+
+int
+xfer_data(const char *what_read,int from_fd, int to_fd, struct in_addr from,
+ struct in_addr to)
+{
+ char tbuf[4096];
+ int rlen, offset, xerrno;
+ int mark, flags;
+
+ /*
+ * Are we at the OOB mark?
+ */
+
+ if (ioctl(from_fd, SIOCATMARK, &mark) < 0) {
+ xerrno = errno;
+ syslog(LOG_ERR,"can't ioctl(SIOCATMARK) socket from %s (%m)",
+ what_read);
+ errno = xerrno;
+ return(-1);
+ }
+
+ if (mark)
+ flags = MSG_OOB; /* Yes - at the OOB mark */
+ else
+ flags = 0;
+
+snarf:
+ rlen = recv(from_fd,tbuf,sizeof(tbuf), flags);
+ if (rlen == -1 && flags == MSG_OOB && errno == EINVAL) {
+ /* OOB didn't work */
+ flags = 0;
+ rlen = recv(from_fd,tbuf,sizeof(tbuf), flags);
+ }
+ if (rlen == 0) {
+ debuglog(3, "xfer_data - eof on read socket");
+ return(0);
+ } else if (rlen == -1) {
+ if (errno == EAGAIN || errno == EINTR)
+ goto snarf;
+ xerrno = errno;
+ syslog(LOG_ERR,"(xfer_data:%s) - failed (%m) with flags 0%o",
+ what_read, flags);
+ errno = xerrno;
+ return(-1);
+ } else {
+ offset = 0;
+ debuglog(3, "xfer got %d bytes from socket\n",rlen);
+
+ while (offset < rlen) {
+ int wlen;
+ fling:
+ wlen = send(to_fd, &tbuf[offset], rlen - offset,
+ flags);
+ if (wlen == 0) {
+ debuglog(3,"zero length write");
+ goto fling;
+ } else if (wlen == -1) {
+ if (errno == EAGAIN || errno == EINTR)
+ goto fling;
+ xerrno = errno;
+ syslog(LOG_INFO,"write failed (%m)");
+ errno = xerrno;
+ return(-1);
+ } else {
+ debuglog(3,"wrote %d bytes to socket\n",wlen);
+ offset += wlen;
+ }
+ }
+ return(offset);
+ }
+}
+
+
+/*
+ * get_backchannel_socket gets us a socket bound somewhere in a
+ * particular range of ports
+ */
+
+int
+get_backchannel_socket(int type, int min_port, int max_port, int start_port,
+ int direction, struct sockaddr_in *sap)
+{
+ int count;
+
+ /*
+ * Make sure that direction is 'defined' and that min_port is not
+ * greater than max_port.
+ */
+
+ /* by default we go up by one port until we find one */
+ if (direction != -1)
+ direction = 1;
+
+ if (min_port > max_port) {
+ errno = EINVAL;
+ return(-1);
+ }
+
+ count = 1 + max_port - min_port;
+
+ /*
+ * pick a port we can bind to from within the range we want.
+ * If the caller specifies -1 as the starting port number then
+ * we pick one somewhere in the range to try.
+ * This is an optimization intended to speedup port selection and
+ * has NOTHING to do with security.
+ */
+
+ if (start_port == -1)
+ start_port = (arc4random() % count) + min_port;
+
+ if (start_port < min_port || start_port > max_port) {
+ errno = EINVAL;
+ return(-1);
+ }
+
+ while (count-- > 0) {
+ int one;
+ int fd;
+ struct sockaddr_in sa;
+
+ fd = socket(AF_INET, type, 0);
+
+ sa.sin_family = AF_INET;
+ if (sap == NULL)
+ sa.sin_addr.s_addr = INADDR_ANY;
+ else
+ sa.sin_addr.s_addr = sap->sin_addr.s_addr;
+
+ /*
+ * Indicate that we want to reuse a port if it happens that the
+ * port in question was a listen port recently.
+ */
+
+ one = 1;
+ if (setsockopt(fd, SOL_SOCKET, SO_REUSEADDR, &one,
+ sizeof(one)) == -1)
+ return(-1);
+
+ sa.sin_port = htons(start_port);
+
+ if (bind(fd, (struct sockaddr *)&sa, sizeof(sa)) == 0) {
+ if (sap != NULL)
+ *sap = sa;
+ return(fd);
+ }
+
+ if (errno != EADDRINUSE)
+ return(-1);
+
+ /* if it's in use, try the next port */
+
+ close(fd);
+
+ start_port += direction;
+ if (start_port < min_port)
+ start_port = max_port;
+ else if (start_port > max_port)
+ start_port = min_port;
+
+ }
+ errno = EAGAIN;
+ return(-1);
+}