NetBSD/usr.sbin/ypbind/ypbind.c

1209 lines
27 KiB
C
Raw Normal View History

1998-07-13 16:01:03 +04:00
/* $NetBSD: ypbind.c,v 1.36 1998/07/13 12:01:03 mrg Exp $ */
/*
1994-05-25 13:55:39 +04:00
* Copyright (c) 1992, 1993 Theo de Raadt <deraadt@fsa.ca>
* All rights reserved.
*
* Redistribution and use in source and binary forms, with or without
* modification, are permitted provided that the following conditions
* are met:
* 1. Redistributions of source code must retain the above copyright
* notice, this list of conditions and the following disclaimer.
* 2. Redistributions in binary form must reproduce the above copyright
* notice, this list of conditions and the following disclaimer in the
* documentation and/or other materials provided with the distribution.
1994-05-25 13:55:39 +04:00
* 3. All advertising materials mentioning features or use of this software
* must display the following acknowledgement:
* This product includes software developed by Theo de Raadt.
* 4. The name of the author may not be used to endorse or promote
* products derived from this software without specific prior written
* permission.
*
* THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS
* OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
* WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
* ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY
* DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
* DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
* OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
* LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
* SUCH DAMAGE.
*/
#include <sys/cdefs.h>
#ifndef LINT
1998-07-13 16:01:03 +04:00
__RCSID("$NetBSD: ypbind.c,v 1.36 1998/07/13 12:01:03 mrg Exp $");
#endif
1993-04-26 12:09:02 +04:00
#include <sys/param.h>
#include <sys/types.h>
#include <sys/ioctl.h>
#include <sys/signal.h>
#include <sys/socket.h>
#include <sys/file.h>
#include <sys/fcntl.h>
#include <sys/uio.h>
1993-04-26 12:09:02 +04:00
#include <sys/syslog.h>
#include <sys/stat.h>
#include <limits.h>
1993-04-26 12:09:02 +04:00
#include <stdio.h>
#include <stdlib.h>
1993-04-26 12:09:02 +04:00
#include <errno.h>
#include <ctype.h>
#include <dirent.h>
#include <netdb.h>
#include <string.h>
#include <err.h>
1993-04-26 12:09:02 +04:00
#include <rpc/rpc.h>
#include <rpc/xdr.h>
#include <net/if.h>
#include <arpa/inet.h>
#include <rpc/pmap_clnt.h>
#include <rpc/pmap_prot.h>
#include <rpc/pmap_rmt.h>
#include <unistd.h>
#include <rpcsvc/yp_prot.h>
#include <rpcsvc/ypclnt.h>
#include "pathnames.h"
#ifndef O_SHLOCK
#define O_SHLOCK 0
#endif
#define BUFSIZE 1400
#define YPSERVERSSUFF ".ypservers"
#define BINDINGDIR __CONCAT(_PATH_VAR_YP, "binding")
1993-04-26 12:09:02 +04:00
struct _dom_binding {
struct _dom_binding *dom_pnext;
char dom_domain[YPMAXDOMAIN + 1];
struct sockaddr_in dom_server_addr;
unsigned short int dom_server_port;
1993-04-26 12:09:02 +04:00
int dom_socket;
CLIENT *dom_client;
long dom_vers;
1993-04-26 12:09:02 +04:00
time_t dom_check_t;
time_t dom_ask_t;
1993-04-26 12:09:02 +04:00
int dom_lockfd;
int dom_alive;
u_int32_t dom_xid;
1993-04-26 12:09:02 +04:00
};
static char *domainname;
1993-04-26 12:09:02 +04:00
static struct _dom_binding *ypbindlist;
static int check;
1993-04-26 12:09:02 +04:00
typedef enum {
YPBIND_DIRECT, YPBIND_BROADCAST, YPBIND_SETLOCAL, YPBIND_SETALL
} ypbind_mode_t;
ypbind_mode_t ypbindmode;
/*
* If ypbindmode is YPBIND_SETLOCAL or YPBIND_SETALL, this indicates
* whether or not we've been "ypset". If we haven't, we behave like
* YPBIND_BROADCAST. If we have, we behave like YPBIND_DIRECT.
*/
int been_ypset;
#ifdef DEBUG
static int debug;
#endif
static int insecure;
static int rpcsock, pingsock;
static struct rmtcallargs rmtca;
static struct rmtcallres rmtcr;
static bool_t rmtcr_outval;
static u_long rmtcr_port;
static SVCXPRT *udptransp, *tcptransp;
int _yp_invalid_domain __P((const char *)); /* from libc */
1997-07-18 11:57:55 +04:00
int main __P((int, char *[]));
static void usage __P((void));
static struct _dom_binding *makebinding __P((const char *));
static int makelock __P((struct _dom_binding *));
static void removelock __P((struct _dom_binding *));
static void *ypbindproc_null_2 __P((SVCXPRT *, void *));
static void *ypbindproc_domain_2 __P((SVCXPRT *, void *));
static void *ypbindproc_setdom_2 __P((SVCXPRT *, void *));
static void ypbindprog_2 __P((struct svc_req *, SVCXPRT *));
static void checkwork __P((void));
static int ping __P((struct _dom_binding *));
static int nag_servers __P((struct _dom_binding *));
static enum clnt_stat handle_replies __P((void));
static enum clnt_stat handle_ping __P((void));
static void rpc_received __P((char *, struct sockaddr_in *, int));
static struct _dom_binding *xid2ypdb __P((u_int32_t));
static u_int32_t unique_xid __P((struct _dom_binding *));
static int broadcast __P((char *, int));
static int direct __P((char *, int));
static int direct_set __P((char *, int, struct _dom_binding *));
static void
usage()
{
extern char *__progname;
char *opt = "";
#ifdef DEBUG
opt = " [-d]";
#endif
1998-07-13 16:01:03 +04:00
(void)fprintf(stderr,
"Usage: %s [-broadcast] [-insecure] [-ypset] [-ypsetme] %s\n",
__progname, opt);
exit(1);
}
static struct _dom_binding *
makebinding(dm)
const char *dm;
{
struct _dom_binding *ypdb;
if ((ypdb = (struct _dom_binding *)malloc(sizeof *ypdb)) == NULL)
err(1, "makebinding");
1998-07-13 16:01:03 +04:00
(void)memset(ypdb, 0, sizeof *ypdb);
(void)strncpy(ypdb->dom_domain, dm, sizeof ypdb->dom_domain);
ypdb->dom_domain[sizeof(ypdb->dom_domain) - 1] = '\0';
return ypdb;
}
static int
makelock(ypdb)
struct _dom_binding *ypdb;
{
int fd;
char path[MAXPATHLEN];
1998-07-13 16:01:03 +04:00
(void)snprintf(path, sizeof(path), "%s/%s.%ld", BINDINGDIR,
ypdb->dom_domain, ypdb->dom_vers);
if ((fd = open(path, O_CREAT|O_SHLOCK|O_RDWR|O_TRUNC, 0644)) == -1) {
1998-07-13 16:01:03 +04:00
(void)mkdir(BINDINGDIR, 0755);
if ((fd = open(path, O_CREAT|O_SHLOCK|O_RDWR|O_TRUNC, 0644)) == -1)
return -1;
}
#if O_SHLOCK == 0
1998-07-13 16:01:03 +04:00
(void)flock(fd, LOCK_SH);
#endif
return fd;
}
1993-04-26 12:09:02 +04:00
static void
removelock(ypdb)
struct _dom_binding *ypdb;
{
char path[MAXPATHLEN];
1993-04-26 12:09:02 +04:00
1998-07-13 16:01:03 +04:00
(void)snprintf(path, sizeof(path), "%s/%s.%ld",
BINDINGDIR, ypdb->dom_domain, ypdb->dom_vers);
1998-07-13 16:01:03 +04:00
(void)unlink(path);
}
static void *
ypbindproc_null_2(transp, argp)
1995-01-15 11:55:59 +03:00
SVCXPRT *transp;
void *argp;
1993-04-26 12:09:02 +04:00
{
static char res;
#ifdef DEBUG
if (debug)
printf("ypbindproc_null_2\n");
#endif
1998-07-13 16:01:03 +04:00
(void)memset(&res, 0, sizeof(res));
1993-04-26 12:09:02 +04:00
return (void *)&res;
}
static void *
ypbindproc_domain_2(transp, argp)
1995-01-15 11:55:59 +03:00
SVCXPRT *transp;
void *argp;
1993-04-26 12:09:02 +04:00
{
static struct ypbind_resp res;
struct _dom_binding *ypdb;
char *arg = *(char **) argp;
time_t now;
int count;
1993-04-26 12:09:02 +04:00
#ifdef DEBUG
if (debug)
printf("ypbindproc_domain_2 %s\n", arg);
#endif
if (_yp_invalid_domain(arg))
return NULL;
1998-07-13 16:01:03 +04:00
(void)memset(&res, 0, sizeof res);
1993-04-26 12:09:02 +04:00
res.ypbind_status = YPBIND_FAIL_VAL;
for (count = 0, ypdb = ypbindlist;
ypdb != NULL;
ypdb = ypdb->dom_pnext, count++) {
if (count > 100)
return NULL; /* prevent denial of service */
if (!strcmp(ypdb->dom_domain, arg))
1993-04-26 12:09:02 +04:00
break;
}
1993-04-26 12:09:02 +04:00
1995-01-15 11:55:59 +03:00
if (ypdb == NULL) {
ypdb = makebinding(arg);
1993-04-26 12:09:02 +04:00
ypdb->dom_vers = YPVERS;
ypdb->dom_alive = 0;
ypdb->dom_lockfd = -1;
removelock(ypdb);
ypdb->dom_xid = unique_xid(ypdb);
1993-04-26 12:09:02 +04:00
ypdb->dom_pnext = ypbindlist;
ypbindlist = ypdb;
check++;
#ifdef DEBUG
if (debug)
printf("unknown domain %s\n", arg);
#endif
1993-04-26 12:09:02 +04:00
return NULL;
}
if (ypdb->dom_alive == 0) {
#ifdef DEBUG
if (debug)
printf("dead domain %s\n", arg);
#endif
1993-04-26 12:09:02 +04:00
return NULL;
}
1993-04-26 12:09:02 +04:00
#ifdef HEURISTIC
time(&now);
if (now < ypdb->dom_ask_t + 5) {
1993-04-26 12:09:02 +04:00
/*
* Hmm. More than 2 requests in 5 seconds have indicated
* that my binding is possibly incorrect.
* Ok, do an immediate poll of the server.
1993-04-26 12:09:02 +04:00
*/
if (ypdb->dom_check_t >= now) {
/* don't flood it */
ypdb->dom_check_t = 0;
check++;
}
1993-04-26 12:09:02 +04:00
}
ypdb->dom_ask_t = now;
1993-04-26 12:09:02 +04:00
#endif
res.ypbind_status = YPBIND_SUCC_VAL;
res.ypbind_respbody.ypbind_bindinfo.ypbind_binding_addr.s_addr =
ypdb->dom_server_addr.sin_addr.s_addr;
res.ypbind_respbody.ypbind_bindinfo.ypbind_binding_port =
ypdb->dom_server_port;
#ifdef DEBUG
if (debug)
printf("domain %s at %s/%d\n", ypdb->dom_domain,
inet_ntoa(ypdb->dom_server_addr.sin_addr),
ntohs(ypdb->dom_server_addr.sin_port));
#endif
1993-04-26 12:09:02 +04:00
return &res;
}
static void *
ypbindproc_setdom_2(transp, argp)
1995-01-15 11:55:59 +03:00
SVCXPRT *transp;
void *argp;
1993-04-26 12:09:02 +04:00
{
struct ypbind_setdom *sd = argp;
1993-04-26 12:09:02 +04:00
struct sockaddr_in *fromsin, bindsin;
1994-09-28 04:39:54 +03:00
static bool_t res;
1993-04-26 12:09:02 +04:00
#ifdef DEBUG
if (debug)
printf("ypbindproc_setdom_2 %s\n", inet_ntoa(bindsin.sin_addr));
#endif
1998-07-13 16:01:03 +04:00
(void)memset(&res, 0, sizeof(res));
1993-04-26 12:09:02 +04:00
fromsin = svc_getcaller(transp);
switch (ypbindmode) {
case YPBIND_SETLOCAL:
if (fromsin->sin_addr.s_addr != htonl(INADDR_LOOPBACK)) {
#ifdef DEBUG
if (debug)
printf("ypset from %s denied\n",
inet_ntoa(fromsin->sin_addr));
#endif
return NULL;
}
/* FALLTHROUGH */
case YPBIND_SETALL:
been_ypset = 1;
1993-04-26 12:09:02 +04:00
break;
case YPBIND_DIRECT:
case YPBIND_BROADCAST:
1993-04-26 12:09:02 +04:00
default:
#ifdef DEBUG
if (debug)
printf("ypset denied\n");
#endif
return NULL;
1993-04-26 12:09:02 +04:00
}
if (ntohs(fromsin->sin_port) >= IPPORT_RESERVED) {
#ifdef DEBUG
if (debug)
printf("ypset from unpriviledged port denied\n");
#endif
1994-09-28 04:39:54 +03:00
return &res;
}
if (sd->ypsetdom_vers != YPVERS) {
#ifdef DEBUG
if (debug)
printf("ypset with wrong version denied\n");
#endif
1994-09-28 04:39:54 +03:00
return &res;
}
1993-04-26 12:09:02 +04:00
1998-07-13 16:01:03 +04:00
(void)memset(&bindsin, 0, sizeof bindsin);
1993-04-26 12:09:02 +04:00
bindsin.sin_family = AF_INET;
1995-01-15 11:55:59 +03:00
bindsin.sin_len = sizeof(bindsin);
bindsin.sin_addr = sd->ypsetdom_addr;
bindsin.sin_port = sd->ypsetdom_port;
rpc_received(sd->ypsetdom_domain, &bindsin, 1);
1993-04-26 12:09:02 +04:00
#ifdef DEBUG
if (debug)
printf("ypset to %s succeeded\n", inet_ntoa(bindsin.sin_addr));
#endif
1993-04-26 12:09:02 +04:00
res = 1;
1994-09-28 04:39:54 +03:00
return &res;
1993-04-26 12:09:02 +04:00
}
static void
ypbindprog_2(rqstp, transp)
1995-01-15 11:55:59 +03:00
struct svc_req *rqstp;
register SVCXPRT *transp;
1993-04-26 12:09:02 +04:00
{
union {
char ypbindproc_domain_2_arg[YPMAXDOMAIN + 1];
1993-04-26 12:09:02 +04:00
struct ypbind_setdom ypbindproc_setdom_2_arg;
} argument;
struct authunix_parms *creds;
char *result;
xdrproc_t xdr_argument, xdr_result;
void *(*local) __P((SVCXPRT *, void *));
1993-04-26 12:09:02 +04:00
switch (rqstp->rq_proc) {
case YPBINDPROC_NULL:
xdr_argument = xdr_void;
xdr_result = xdr_void;
local = ypbindproc_null_2;
1993-04-26 12:09:02 +04:00
break;
case YPBINDPROC_DOMAIN:
xdr_argument = xdr_ypdomain_wrap_string;
1993-04-26 12:09:02 +04:00
xdr_result = xdr_ypbind_resp;
local = ypbindproc_domain_2;
1993-04-26 12:09:02 +04:00
break;
case YPBINDPROC_SETDOM:
1995-01-15 11:55:59 +03:00
switch (rqstp->rq_cred.oa_flavor) {
1993-04-26 12:09:02 +04:00
case AUTH_UNIX:
creds = (struct authunix_parms *)rqstp->rq_clntcred;
1995-01-15 11:55:59 +03:00
if (creds->aup_uid != 0) {
1993-04-26 12:09:02 +04:00
svcerr_auth(transp, AUTH_BADCRED);
return;
}
break;
default:
svcerr_auth(transp, AUTH_TOOWEAK);
return;
}
xdr_argument = xdr_ypbind_setdom;
xdr_result = xdr_void;
local = ypbindproc_setdom_2;
1993-04-26 12:09:02 +04:00
break;
default:
svcerr_noproc(transp);
return;
}
1998-07-13 16:01:03 +04:00
(void)memset(&argument, 0, sizeof(argument));
if (!svc_getargs(transp, xdr_argument, (caddr_t)&argument)) {
1993-04-26 12:09:02 +04:00
svcerr_decode(transp);
return;
}
result = (*local)(transp, &argument);
1993-04-26 12:09:02 +04:00
if (result != NULL && !svc_sendreply(transp, xdr_result, result)) {
svcerr_systemerr(transp);
}
return;
}
int
1993-04-26 12:09:02 +04:00
main(argc, argv)
1995-01-15 11:55:59 +03:00
int argc;
char *argv[];
1993-04-26 12:09:02 +04:00
{
struct timeval tv;
fd_set fdsr;
1994-09-28 04:39:54 +03:00
int width, lockfd;
int evil = 0, one;
char pathname[MAXPATHLEN];
struct stat st;
1993-04-26 12:09:02 +04:00
yp_get_default_domain(&domainname);
if (domainname[0] == '\0')
errx(1, "Domainname not set. Aborting.");
1993-04-26 12:09:02 +04:00
/*
* Per traditional ypbind(8) semantics, if a ypservers
* file does not exist, we default to broadcast mode.
* If the file does exist, we default to direct mode.
* Note that we can still override direct mode by passing
* the -broadcast flag.
*/
snprintf(pathname, sizeof(pathname), "%s/%s%s", BINDINGDIR,
domainname, YPSERVERSSUFF);
if (stat(pathname, &st) < 0) {
#ifdef DEBUG
if (debug)
fprintf(stderr,
"%s does not exist, defaulting to broadcast\n",
pathname);
#endif
ypbindmode = YPBIND_BROADCAST;
} else
ypbindmode = YPBIND_DIRECT;
while (--argc) {
++argv;
if (!strcmp("-insecure", *argv))
insecure = 1;
else if (!strcmp("-ypset", *argv))
ypbindmode = YPBIND_SETALL;
else if (!strcmp("-ypsetme", *argv))
ypbindmode = YPBIND_SETLOCAL;
else if (!strcmp("-broadcast", *argv))
ypbindmode = YPBIND_BROADCAST;
#ifdef DEBUG
else if (!strcmp("-d", *argv))
debug++;
#endif
else
usage();
1993-04-26 12:09:02 +04:00
}
/* blow away everything in BINDINGDIR */
lockfd = open(_PATH_YPBIND_LOCK, O_CREAT|O_SHLOCK|O_RDWR|O_TRUNC, 0644);
if (lockfd == -1)
err(1, "Cannot create %s", _PATH_YPBIND_LOCK);
#if O_SHLOCK == 0
1998-07-13 16:01:03 +04:00
(void)flock(lockfd, LOCK_SH);
1994-09-28 04:39:54 +03:00
#endif
1993-04-26 12:09:02 +04:00
1998-07-13 16:01:03 +04:00
(void)pmap_unset(YPBINDPROG, YPBINDVERS);
1993-04-26 12:09:02 +04:00
udptransp = svcudp_create(RPC_ANYSOCK);
if (udptransp == NULL)
errx(1, "Cannot create udp service.");
if (!svc_register(udptransp, YPBINDPROG, YPBINDVERS, ypbindprog_2,
IPPROTO_UDP))
errx(1, "Unable to register (YPBINDPROG, YPBINDVERS, udp).");
1993-04-26 12:09:02 +04:00
tcptransp = svctcp_create(RPC_ANYSOCK, 0, 0);
if (tcptransp == NULL)
errx(1, "Cannot create tcp service.");
if (!svc_register(tcptransp, YPBINDPROG, YPBINDVERS, ypbindprog_2,
IPPROTO_TCP))
errx(1, "Unable to register (YPBINDPROG, YPBINDVERS, tcp).");
1993-04-26 12:09:02 +04:00
/* XXX use SOCK_STREAM for direct queries? */
if ((rpcsock = socket(AF_INET, SOCK_DGRAM, IPPROTO_UDP)) == -1)
err(1, "rpc socket");
if ((pingsock = socket(AF_INET, SOCK_DGRAM, IPPROTO_UDP)) == -1)
err(1, "ping socket");
1998-07-13 16:01:03 +04:00
(void)fcntl(rpcsock, F_SETFL, fcntl(rpcsock, F_GETFL, 0) | FNDELAY);
(void)fcntl(pingsock, F_SETFL, fcntl(pingsock, F_GETFL, 0) | FNDELAY);
one = 1;
1998-07-13 16:01:03 +04:00
(void)setsockopt(rpcsock, SOL_SOCKET, SO_BROADCAST, &one, sizeof(one));
1993-04-26 12:09:02 +04:00
rmtca.prog = YPPROG;
rmtca.vers = YPVERS;
rmtca.proc = YPPROC_DOMAIN_NONACK;
rmtca.xdr_args = NULL; /* set at call time */
rmtca.args_ptr = NULL; /* set at call time */
rmtcr.port_ptr = &rmtcr_port;
rmtcr.xdr_results = xdr_bool;
rmtcr.results_ptr = (caddr_t)&rmtcr_outval;
if (_yp_invalid_domain(domainname))
errx(1, "bad domainname: %s", domainname);
1993-04-26 12:09:02 +04:00
/* build initial domain binding, make it "unsuccessful" */
ypbindlist = makebinding(domainname);
1993-04-26 12:09:02 +04:00
ypbindlist->dom_vers = YPVERS;
ypbindlist->dom_alive = 0;
ypbindlist->dom_lockfd = -1;
removelock(ypbindlist);
1993-04-26 12:09:02 +04:00
checkwork();
width = svc_maxfd;
if (rpcsock > width)
width = rpcsock;
if (pingsock > width)
width = pingsock;
width++;
1995-01-15 11:55:59 +03:00
for (;;) {
1993-04-26 12:09:02 +04:00
fdsr = svc_fdset;
FD_SET(rpcsock, &fdsr);
FD_SET(pingsock, &fdsr);
1993-04-26 12:09:02 +04:00
tv.tv_sec = 1;
tv.tv_usec = 0;
1995-01-15 11:55:59 +03:00
switch (select(width, &fdsr, NULL, NULL, &tv)) {
1993-04-26 12:09:02 +04:00
case 0:
checkwork();
break;
case -1:
warn("select");
1993-04-26 12:09:02 +04:00
break;
default:
if (FD_ISSET(rpcsock, &fdsr))
1993-04-26 12:09:02 +04:00
handle_replies();
if (FD_ISSET(pingsock, &fdsr))
handle_ping();
1993-04-26 12:09:02 +04:00
svc_getreqset(&fdsr);
if (check)
1993-04-26 12:09:02 +04:00
checkwork();
break;
}
if (!evil && ypbindlist->dom_alive) {
evil = 1;
#ifdef DEBUG
if (!debug)
#endif
daemon(0, 0);
}
1993-04-26 12:09:02 +04:00
}
}
/*
* State transition is done like this:
*
* STATE EVENT ACTION NEWSTATE TIMEOUT
* no binding timeout broadcast no binding 5 sec
* no binding answer -- binding 60 sec
* binding timeout ping server checking 5 sec
* checking timeout ping server + broadcast checking 5 sec
* checking answer -- binding 60 sec
1993-04-26 12:09:02 +04:00
*/
void
1993-04-26 12:09:02 +04:00
checkwork()
{
struct _dom_binding *ypdb;
time_t t;
check = 0;
time(&t);
1995-01-15 11:55:59 +03:00
for (ypdb = ypbindlist; ypdb; ypdb = ypdb->dom_pnext) {
if (ypdb->dom_check_t < t) {
if (ypdb->dom_alive == 1)
ping(ypdb);
else
nag_servers(ypdb);
1993-04-26 12:09:02 +04:00
time(&t);
ypdb->dom_check_t = t + 5;
}
}
}
int
1994-07-01 23:40:23 +04:00
ping(ypdb)
struct _dom_binding *ypdb;
{
char *dom = ypdb->dom_domain;
1995-01-15 11:55:59 +03:00
struct rpc_msg msg;
char buf[BUFSIZE];
enum clnt_stat st;
int outlen;
AUTH *rpcua;
1995-01-15 11:55:59 +03:00
XDR xdr;
1998-07-13 16:01:03 +04:00
(void)memset(&xdr, 0, sizeof xdr);
(void)memset(&msg, 0, sizeof msg);
rpcua = authunix_create_default();
if (rpcua == NULL) {
#ifdef DEBUG
if (debug)
printf("cannot get unix auth\n");
#endif
return RPC_SYSTEMERROR;
}
1995-01-15 11:55:59 +03:00
msg.rm_direction = CALL;
msg.rm_call.cb_rpcvers = RPC_MSG_VERSION;
msg.rm_call.cb_prog = YPPROG;
msg.rm_call.cb_vers = YPVERS;
msg.rm_call.cb_proc = YPPROC_DOMAIN_NONACK;
msg.rm_call.cb_cred = rpcua->ah_cred;
msg.rm_call.cb_verf = rpcua->ah_verf;
msg.rm_xid = ypdb->dom_xid;
1995-01-15 11:55:59 +03:00
xdrmem_create(&xdr, buf, sizeof buf, XDR_ENCODE);
if (!xdr_callmsg(&xdr, &msg)) {
st = RPC_CANTENCODEARGS;
AUTH_DESTROY(rpcua);
return st;
}
if (!xdr_ypdomain_wrap_string(&xdr, &dom)) {
st = RPC_CANTENCODEARGS;
AUTH_DESTROY(rpcua);
return st;
}
1995-01-15 11:55:59 +03:00
outlen = (int)xdr_getpos(&xdr);
xdr_destroy(&xdr);
if (outlen < 1) {
st = RPC_CANTENCODEARGS;
AUTH_DESTROY(rpcua);
return st;
}
AUTH_DESTROY(rpcua);
ypdb->dom_alive = 2;
if (sendto(pingsock, buf, outlen, 0,
(struct sockaddr *)&ypdb->dom_server_addr,
sizeof ypdb->dom_server_addr) == -1)
warn("ping: sendto");
return 0;
}
static int
nag_servers(ypdb)
struct _dom_binding *ypdb;
1993-04-26 12:09:02 +04:00
{
1994-07-01 23:40:23 +04:00
char *dom = ypdb->dom_domain;
1995-01-15 11:55:59 +03:00
struct rpc_msg msg;
char buf[BUFSIZE];
1993-04-26 12:09:02 +04:00
enum clnt_stat st;
int outlen;
1993-04-26 12:09:02 +04:00
AUTH *rpcua;
1995-01-15 11:55:59 +03:00
XDR xdr;
1993-04-26 12:09:02 +04:00
rmtca.xdr_args = xdr_ypdomain_wrap_string;
rmtca.args_ptr = (char *)&dom;
1993-04-26 12:09:02 +04:00
1998-07-13 16:01:03 +04:00
(void)memset(&xdr, 0, sizeof xdr);
(void)memset(&msg, 0, sizeof msg);
1993-04-26 12:09:02 +04:00
rpcua = authunix_create_default();
if (rpcua == NULL) {
#ifdef DEBUG
if (debug)
printf("cannot get unix auth\n");
#endif
1993-04-26 12:09:02 +04:00
return RPC_SYSTEMERROR;
}
1995-01-15 11:55:59 +03:00
msg.rm_direction = CALL;
msg.rm_call.cb_rpcvers = RPC_MSG_VERSION;
msg.rm_call.cb_prog = PMAPPROG;
msg.rm_call.cb_vers = PMAPVERS;
msg.rm_call.cb_proc = PMAPPROC_CALLIT;
msg.rm_call.cb_cred = rpcua->ah_cred;
msg.rm_call.cb_verf = rpcua->ah_verf;
msg.rm_xid = ypdb->dom_xid;
1995-01-15 11:55:59 +03:00
xdrmem_create(&xdr, buf, sizeof buf, XDR_ENCODE);
if (!xdr_callmsg(&xdr, &msg)) {
1993-04-26 12:09:02 +04:00
st = RPC_CANTENCODEARGS;
AUTH_DESTROY(rpcua);
return st;
}
1995-01-15 11:55:59 +03:00
if (!xdr_rmtcall_args(&xdr, &rmtca)) {
1993-04-26 12:09:02 +04:00
st = RPC_CANTENCODEARGS;
AUTH_DESTROY(rpcua);
return st;
}
1995-01-15 11:55:59 +03:00
outlen = (int)xdr_getpos(&xdr);
xdr_destroy(&xdr);
if (outlen < 1) {
st = RPC_CANTENCODEARGS;
1993-04-26 12:09:02 +04:00
AUTH_DESTROY(rpcua);
return st;
}
AUTH_DESTROY(rpcua);
1995-01-15 11:55:59 +03:00
if (ypdb->dom_lockfd != -1) {
1998-07-13 16:01:03 +04:00
(void)close(ypdb->dom_lockfd);
ypdb->dom_lockfd = -1;
removelock(ypdb);
}
1994-07-01 23:40:23 +04:00
if (ypdb->dom_alive == 2) {
/*
* This resolves the following situation:
* ypserver on other subnet was once bound,
* but rebooted and is now using a different port
*/
struct sockaddr_in bindsin;
memset(&bindsin, 0, sizeof bindsin);
bindsin.sin_family = AF_INET;
bindsin.sin_len = sizeof(bindsin);
bindsin.sin_port = htons(PMAPPORT);
1995-01-15 11:55:59 +03:00
bindsin.sin_addr = ypdb->dom_server_addr.sin_addr;
1995-01-15 11:55:59 +03:00
if (sendto(rpcsock, buf, outlen, 0, (struct sockaddr *)&bindsin,
sizeof bindsin) == -1)
warn("broadcast: sendto");
}
switch (ypbindmode) {
case YPBIND_SETALL:
case YPBIND_SETLOCAL:
if (been_ypset)
return direct_set(buf, outlen, ypdb);
/* FALLTHROUGH */
case YPBIND_BROADCAST:
return broadcast(buf, outlen);
case YPBIND_DIRECT:
return direct(buf, outlen);
}
return -1;
}
static int
broadcast(buf, outlen)
char *buf;
int outlen;
{
struct ifconf ifc;
struct ifreq ifreq, *ifr;
struct in_addr in;
int i, sock, len;
char inbuf[8192];
struct sockaddr_in bindsin;
1993-04-26 12:09:02 +04:00
/* find all networks and send the RPC packet out them all */
if ((sock = socket(AF_INET, SOCK_DGRAM, IPPROTO_UDP)) == -1) {
warn("broadcast: socket");
1993-04-26 12:09:02 +04:00
return -1;
}
memset(&bindsin, 0, sizeof bindsin);
bindsin.sin_family = AF_INET;
bindsin.sin_len = sizeof(bindsin);
bindsin.sin_port = htons(PMAPPORT);
1993-04-26 12:09:02 +04:00
ifc.ifc_len = sizeof inbuf;
ifc.ifc_buf = inbuf;
1995-01-15 11:55:59 +03:00
if (ioctl(sock, SIOCGIFCONF, &ifc) < 0) {
1998-07-13 16:01:03 +04:00
(void)close(sock);
warn("broadcast: ioctl(SIOCGIFCONF)");
1993-04-26 12:09:02 +04:00
return -1;
}
ifr = ifc.ifc_req;
ifreq.ifr_name[0] = '\0';
1995-01-15 11:55:59 +03:00
for (i = 0; i < ifc.ifc_len; i += len, ifr = (struct ifreq *)((caddr_t)ifr + len)) {
1993-04-26 12:09:02 +04:00
#if defined(BSD) && BSD >= 199103
len = sizeof ifr->ifr_name + ifr->ifr_addr.sa_len;
#else
len = sizeof ifc.ifc_len / sizeof(struct ifreq);
#endif
ifreq = *ifr;
1995-01-15 11:55:59 +03:00
if (ifreq.ifr_addr.sa_family != AF_INET)
1993-04-26 12:09:02 +04:00
continue;
1995-01-15 11:55:59 +03:00
if (ioctl(sock, SIOCGIFFLAGS, &ifreq) < 0) {
warn("broadcast: ioctl(SIOCGIFFLAGS)");
1993-04-26 12:09:02 +04:00
continue;
}
1995-01-15 11:55:59 +03:00
if ((ifreq.ifr_flags & IFF_UP) == 0)
1993-04-26 12:09:02 +04:00
continue;
ifreq.ifr_flags &= (IFF_LOOPBACK | IFF_BROADCAST);
1995-01-15 11:55:59 +03:00
if (ifreq.ifr_flags == IFF_BROADCAST) {
if (ioctl(sock, SIOCGIFBRDADDR, &ifreq) < 0) {
warn("broadcast: ioctl(SIOCGIFBRDADDR)");
1993-04-26 12:09:02 +04:00
continue;
}
1995-01-15 11:55:59 +03:00
} else if (ifreq.ifr_flags == IFF_LOOPBACK) {
if (ioctl(sock, SIOCGIFADDR, &ifreq) < 0) {
warn("broadcast: ioctl(SIOCGIFADDR)");
1993-04-26 12:09:02 +04:00
continue;
}
} else
continue;
in = ((struct sockaddr_in *)&ifreq.ifr_addr)->sin_addr;
1995-01-15 11:55:59 +03:00
bindsin.sin_addr = in;
if (sendto(rpcsock, buf, outlen, 0, (struct sockaddr *)&bindsin,
sizeof bindsin) == -1)
warn("broadcast: sendto");
1993-04-26 12:09:02 +04:00
}
1998-07-13 16:01:03 +04:00
(void)close(sock);
1993-04-26 12:09:02 +04:00
return 0;
}
static int
direct(buf, outlen)
char *buf;
int outlen;
{
static FILE *df;
static char ypservers_path[MAXPATHLEN];
char line[_POSIX2_LINE_MAX];
char *p;
struct hostent *hp;
struct sockaddr_in bindsin;
int i, count = 0;
if (df)
rewind(df);
else {
snprintf(ypservers_path, sizeof(ypservers_path),
"%s/%s%s", BINDINGDIR, domainname, YPSERVERSSUFF);
df = fopen(ypservers_path, "r");
if (df == NULL)
err(1, ypservers_path);
}
memset(&bindsin, 0, sizeof bindsin);
bindsin.sin_family = AF_INET;
bindsin.sin_len = sizeof(bindsin);
bindsin.sin_port = htons(PMAPPORT);
while(fgets(line, sizeof(line), df) != NULL) {
/* skip lines that are too big */
p = strchr(line, '\n');
if (p == NULL) {
int c;
while ((c = getc(df)) != '\n' && c != EOF)
;
continue;
}
*p = '\0';
p = line;
while (isspace(*p))
p++;
if (*p == '#')
continue;
hp = gethostbyname(p);
if (!hp) {
herror(p);
continue;
}
/* step through all addresses in case first is unavailable */
for (i = 0; hp->h_addr_list[i]; i++) {
memmove(&bindsin.sin_addr, hp->h_addr_list[0],
hp->h_length);
if (sendto(rpcsock, buf, outlen, 0,
(struct sockaddr *)&bindsin, sizeof bindsin) < 0) {
warn("direct: sendto");
continue;
} else
count++;
}
}
if (!count)
errx(1, "no contactable servers found in %s",
ypservers_path);
return 0;
}
static int
direct_set(buf, outlen, ypdb)
char *buf;
int outlen;
struct _dom_binding *ypdb;
{
struct sockaddr_in bindsin;
char path[MAXPATHLEN];
struct iovec iov[2];
struct ypbind_resp ybr;
SVCXPRT dummy_svc;
int fd, bytes;
/*
* Gack, we lose if binding file went away. We reset
* "been_set" if this happens, otherwise we'll never
* bind again.
*/
snprintf(path, sizeof(path), "%s/%s.%ld", BINDINGDIR,
ypdb->dom_domain, ypdb->dom_vers);
if ((fd = open(path, O_SHLOCK|O_RDONLY, 0644)) == -1) {
warn(path);
been_ypset = 0;
return -1;
}
#if O_SHLOCK == 0
1998-07-13 16:01:03 +04:00
(void)flock(fd, LOCK_SH);
#endif
/* Read the binding file... */
iov[0].iov_base = (caddr_t)&(dummy_svc.xp_port);
iov[0].iov_len = sizeof(dummy_svc.xp_port);
iov[1].iov_base = (caddr_t)&ybr;
iov[1].iov_len = sizeof(ybr);
bytes = readv(fd, iov, 2);
(void)close(fd);
if (bytes != (iov[0].iov_len + iov[1].iov_len)) {
/* Binding file corrupt? */
warn(path);
been_ypset = 0;
return -1;
}
bindsin.sin_addr =
ybr.ypbind_respbody.ypbind_bindinfo.ypbind_binding_addr;
if (sendto(rpcsock, buf, outlen, 0, (struct sockaddr *)&bindsin,
sizeof(bindsin)) < 0) {
warn("direct_set: sendto");
return -1;
}
return 0;
}
static enum clnt_stat
1993-04-26 12:09:02 +04:00
handle_replies()
{
char buf[BUFSIZE];
1993-04-26 12:09:02 +04:00
int fromlen, inlen;
struct _dom_binding *ypdb;
1993-04-26 12:09:02 +04:00
struct sockaddr_in raddr;
struct rpc_msg msg;
XDR xdr;
recv_again:
1998-07-13 16:01:03 +04:00
(void)memset(&xdr, 0, sizeof(xdr));
(void)memset(&msg, 0, sizeof(msg));
1993-04-26 12:09:02 +04:00
msg.acpted_rply.ar_verf = _null_auth;
msg.acpted_rply.ar_results.where = (caddr_t)&rmtcr;
msg.acpted_rply.ar_results.proc = xdr_rmtcallres;
try_again:
1998-07-13 16:01:03 +04:00
fromlen = sizeof(struct sockaddr);
1993-04-26 12:09:02 +04:00
inlen = recvfrom(rpcsock, buf, sizeof buf, 0,
(struct sockaddr *)&raddr, &fromlen);
1995-01-15 11:55:59 +03:00
if (inlen < 0) {
if (errno == EINTR)
1993-04-26 12:09:02 +04:00
goto try_again;
return RPC_CANTRECV;
}
1995-01-15 11:55:59 +03:00
if (inlen < sizeof(u_int32_t))
1993-04-26 12:09:02 +04:00
goto recv_again;
/*
* see if reply transaction id matches sent id.
* If so, decode the results.
*/
xdrmem_create(&xdr, buf, (u_int)inlen, XDR_DECODE);
1995-01-15 11:55:59 +03:00
if (xdr_replymsg(&xdr, &msg)) {
if ((msg.rm_reply.rp_stat == MSG_ACCEPTED) &&
(msg.acpted_rply.ar_stat == SUCCESS)) {
raddr.sin_port = htons((u_short)rmtcr_port);
ypdb = xid2ypdb(msg.rm_xid);
if (ypdb != NULL)
rpc_received(ypdb->dom_domain, &raddr, 0);
1993-04-26 12:09:02 +04:00
}
}
xdr.x_op = XDR_FREE;
msg.acpted_rply.ar_results.proc = xdr_void;
xdr_destroy(&xdr);
return RPC_SUCCESS;
}
static enum clnt_stat
handle_ping()
{
char buf[BUFSIZE];
int fromlen, inlen;
struct _dom_binding *ypdb;
struct sockaddr_in raddr;
struct rpc_msg msg;
XDR xdr;
bool_t res;
recv_again:
1998-07-13 16:01:03 +04:00
(void)memset(&xdr, 0, sizeof(xdr));
(void)memset(&msg, 0, sizeof(msg));
msg.acpted_rply.ar_verf = _null_auth;
msg.acpted_rply.ar_results.where = (caddr_t)&res;
msg.acpted_rply.ar_results.proc = xdr_bool;
try_again:
fromlen = sizeof (struct sockaddr);
inlen = recvfrom(pingsock, buf, sizeof buf, 0,
(struct sockaddr *)&raddr, &fromlen);
1995-01-15 11:55:59 +03:00
if (inlen < 0) {
if (errno == EINTR)
goto try_again;
return RPC_CANTRECV;
}
1995-01-15 11:55:59 +03:00
if (inlen < sizeof(u_int32_t))
goto recv_again;
/*
* see if reply transaction id matches sent id.
* If so, decode the results.
*/
xdrmem_create(&xdr, buf, (u_int)inlen, XDR_DECODE);
1995-01-15 11:55:59 +03:00
if (xdr_replymsg(&xdr, &msg)) {
if ((msg.rm_reply.rp_stat == MSG_ACCEPTED) &&
(msg.acpted_rply.ar_stat == SUCCESS)) {
ypdb = xid2ypdb(msg.rm_xid);
if (ypdb != NULL)
rpc_received(ypdb->dom_domain, &raddr, 0);
}
}
xdr.x_op = XDR_FREE;
msg.acpted_rply.ar_results.proc = xdr_void;
xdr_destroy(&xdr);
return RPC_SUCCESS;
}
1993-04-26 12:09:02 +04:00
/*
* LOOPBACK IS MORE IMPORTANT: PUT IN HACK
*/
void
1993-04-26 12:09:02 +04:00
rpc_received(dom, raddrp, force)
char *dom;
struct sockaddr_in *raddrp;
int force;
1993-04-26 12:09:02 +04:00
{
struct _dom_binding *ypdb;
struct iovec iov[2];
struct ypbind_resp ybr;
1993-04-26 12:09:02 +04:00
int fd;
#ifdef DEBUG
if (debug)
printf("returned from %s about %s\n",
inet_ntoa(raddrp->sin_addr), dom);
#endif
1993-04-26 12:09:02 +04:00
1995-01-15 11:55:59 +03:00
if (dom == NULL)
1993-04-26 12:09:02 +04:00
return;
if (_yp_invalid_domain(dom))
return;
/* don't support insecure servers by default */
if (!insecure && ntohs(raddrp->sin_port) >= IPPORT_RESERVED)
return;
1995-01-15 11:55:59 +03:00
for (ypdb = ypbindlist; ypdb; ypdb = ypdb->dom_pnext)
if (!strcmp(ypdb->dom_domain, dom))
1993-04-26 12:09:02 +04:00
break;
1995-01-15 11:55:59 +03:00
if (ypdb == NULL) {
if (force == 0)
1993-04-26 12:09:02 +04:00
return;
ypdb = makebinding(dom);
1993-04-26 12:09:02 +04:00
ypdb->dom_lockfd = -1;
ypdb->dom_pnext = ypbindlist;
ypbindlist = ypdb;
}
1994-07-01 23:40:23 +04:00
/* soft update, alive */
1995-01-15 11:55:59 +03:00
if (ypdb->dom_alive == 1 && force == 0) {
if (!memcmp(&ypdb->dom_server_addr, raddrp,
sizeof ypdb->dom_server_addr)) {
1994-07-01 23:40:23 +04:00
ypdb->dom_alive = 1;
/* recheck binding in 60 sec */
ypdb->dom_check_t = time(NULL) + 60;
1994-07-01 23:40:23 +04:00
}
1993-04-26 12:09:02 +04:00
return;
1994-07-01 23:40:23 +04:00
}
1998-07-13 16:01:03 +04:00
(void)memcpy(&ypdb->dom_server_addr, raddrp,
sizeof ypdb->dom_server_addr);
/* recheck binding in 60 seconds */
ypdb->dom_check_t = time(NULL) + 60;
1993-04-26 12:09:02 +04:00
ypdb->dom_vers = YPVERS;
ypdb->dom_alive = 1;
1995-01-15 11:55:59 +03:00
if (ypdb->dom_lockfd != -1)
1998-07-13 16:01:03 +04:00
(void)close(ypdb->dom_lockfd);
1993-04-26 12:09:02 +04:00
if ((fd = makelock(ypdb)) == -1)
return;
1993-04-26 12:09:02 +04:00
/*
* ok, if BINDINGDIR exists, and we can create the binding file,
* then write to it..
*/
ypdb->dom_lockfd = fd;
iov[0].iov_base = (caddr_t)&(udptransp->xp_port);
iov[0].iov_len = sizeof udptransp->xp_port;
iov[1].iov_base = (caddr_t)&ybr;
iov[1].iov_len = sizeof ybr;
1998-07-13 16:01:03 +04:00
(void)memset(&ybr, 0, sizeof ybr);
ybr.ypbind_status = YPBIND_SUCC_VAL;
ybr.ypbind_respbody.ypbind_bindinfo.ypbind_binding_addr =
raddrp->sin_addr;
ybr.ypbind_respbody.ypbind_bindinfo.ypbind_binding_port =
raddrp->sin_port;
if (writev(ypdb->dom_lockfd, iov, 2) !=
iov[0].iov_len + iov[1].iov_len) {
warnx("writev");
1998-07-13 16:01:03 +04:00
(void)close(ypdb->dom_lockfd);
removelock(ypdb);
1993-04-26 12:09:02 +04:00
ypdb->dom_lockfd = -1;
}
}
static struct _dom_binding *
xid2ypdb(xid)
u_int32_t xid;
{
struct _dom_binding *ypdb;
for (ypdb = ypbindlist; ypdb; ypdb = ypdb->dom_pnext)
if (ypdb->dom_xid == xid)
break;
return (ypdb);
}
static u_int32_t
unique_xid(ypdb)
struct _dom_binding *ypdb;
{
u_int32_t tmp_xid;
tmp_xid = (u_int32_t)(((u_long)ypdb) & 0xffffffff);
while (xid2ypdb(tmp_xid) != NULL)
tmp_xid++;
return tmp_xid;
}