/* $NetBSD: uucpd.c,v 1.15 1999/09/24 17:59:27 sommerfeld Exp $ */ /* * Copyright (c) 1985 The Regents of the University of California. * All rights reserved. * * This code is derived from software contributed to Berkeley by * Rick Adams. * * Redistribution and use in source and binary forms, with or without * modification, are permitted provided that the following conditions * are met: * 1. Redistributions of source code must retain the above copyright * notice, this list of conditions and the following disclaimer. * 2. Redistributions in binary form must reproduce the above copyright * notice, this list of conditions and the following disclaimer in the * documentation and/or other materials provided with the distribution. * 3. All advertising materials mentioning features or use of this software * must display the following acknowledgement: * This product includes software developed by the University of * California, Berkeley and its contributors. * 4. Neither the name of the University nor the names of its contributors * may be used to endorse or promote products derived from this software * without specific prior written permission. * * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF * SUCH DAMAGE. */ #include #ifndef lint __COPYRIGHT("@(#) Copyright (c) 1985 The Regents of the University of California.\n\ All rights reserved.\n"); #if 0 static char sccsid[] = "from: @(#)uucpd.c 5.10 (Berkeley) 2/26/91"; #else __RCSID("$NetBSD: uucpd.c,v 1.15 1999/09/24 17:59:27 sommerfeld Exp $"); #endif #endif /* not lint */ /* * 4.2BSD TCP/IP server for uucico * uucico's TCP channel causes this server to be run at the remote end. */ #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include "pathnames.h" struct sockaddr_in hisctladdr; int hisaddrlen = sizeof hisctladdr; struct sockaddr_in myctladdr; int mypid; char Username[64]; char *nenv[] = { Username, NULL, }; int log; extern char **environ; void dologout __P((void)); void dologin __P((struct passwd *, struct sockaddr_in *)); void doit __P((struct sockaddr_in *)); int readline __P((char *, int)); int main __P((int, char **)); int main(argc, argv) int argc; char **argv; { int ch; while ((ch = getopt(argc, argv, "l")) != -1) switch (ch) { case 'l': log = 1; break; default: exit(1); } if (log) openlog("uucpd", LOG_PID, LOG_AUTH); environ = nenv; close(1); close(2); dup(0); dup(0); hisaddrlen = sizeof (hisctladdr); if (getpeername(0, (struct sockaddr *)&hisctladdr, &hisaddrlen) < 0) { fprintf(stderr, "%s: ", argv[0]); perror("getpeername"); if (log) syslog(LOG_ERR, "getpeername failed: %m"); exit(1); } switch (fork()) { case -1: break; case 0: doit(&hisctladdr); break; default: dologout(); } exit(1); } void doit(sinp) struct sockaddr_in *sinp; { char user[64], passwd[64]; char *xpasswd = NULL; /* XXX gcc */ struct passwd *pw; alarm(60); do { printf("login: "); fflush(stdout); if (readline(user, sizeof user) < 0) { fprintf(stderr, "user read\n"); if (log) syslog(LOG_ERR, "user read failed: %m"); return; } } while (user[0] == '\0'); /* ensure username is NUL-terminated */ user[sizeof(user)-1] = '\0'; pw = getpwnam(user); if (pw == NULL || (pw->pw_passwd && *pw->pw_passwd != '\0')) { printf("Password: "); fflush(stdout); if (readline(passwd, sizeof passwd) < 0) { fprintf(stderr, "passwd read\n"); if (log) syslog(LOG_ERR, "passwd read failed: %m"); return; } if (pw != NULL) xpasswd = crypt(passwd, pw->pw_passwd); if (pw == NULL || strcmp(xpasswd, pw->pw_passwd)) { fprintf(stderr, "Login incorrect.\n"); if (log) syslog(LOG_ERR, "incorrect password from %s", user); return; } } else (void)crypt("dummy password", "PA"); /* must always crypt */ if (strcmp(pw->pw_shell, _PATH_UUCICO)) { fprintf(stderr, "Login incorrect.\n"); if (log) syslog(LOG_ERR, "incorrect shell for %s", user); return; } alarm(0); sprintf(Username, "USER=%s", user); dologin(pw, sinp); if (initgroups(pw->pw_name, pw->pw_gid) < 0 || setgid(pw->pw_gid) < 0 || chdir(pw->pw_dir) < 0 || setlogin(user) < 0 || setuid(pw->pw_uid) < 0) { fprintf(stderr, "Could not set permissions.\n"); if (log) syslog(LOG_ERR,"couldn't set user %s's permissions: %m", user); return; } if (log) syslog(LOG_INFO, "%s has logged in", user); execl(_PATH_UUCICO, "uucico", (char *)0); perror("uucico server: execl"); if (log) syslog(LOG_ERR, "execl failed: %m"); } int readline(p, n) char *p; int n; { char c; while (n-- > 0) { if (read(0, &c, 1) <= 0) return(-1); c &= 0177; if (c == '\r') { *p = '\0'; return(0); } if (c != '\n') *p++ = c; } return (-1); } /* Note that SCPYN is only used on strings that may not be nul terminated */ #define SCPYN(a, b) strncpy(a, b, sizeof (a)) struct utmp utmp; void dologout() { int pid, wtmp; while ((pid = wait(NULL)) > 0) { wtmp = open(_PATH_WTMP, O_WRONLY|O_APPEND); if (wtmp >= 0) { sprintf(utmp.ut_line, "uucp%.4d", pid); SCPYN(utmp.ut_name, ""); SCPYN(utmp.ut_host, ""); (void)time(&utmp.ut_time); (void)write(wtmp, (char *)&utmp, sizeof (utmp)); (void)close(wtmp); } } } /* * Record login in wtmp file. */ void dologin(pw, sin) struct passwd *pw; struct sockaddr_in *sin; { char line[UT_LINESIZE+1]; char remotehost[UT_HOSTSIZE+1]; int wtmp, f; struct hostent *hp = gethostbyaddr((char *)&sin->sin_addr, sizeof (struct in_addr), AF_INET); if (hp) { strncpy(remotehost, hp->h_name, sizeof (remotehost)); endhostent(); } else strncpy(remotehost, inet_ntoa(sin->sin_addr), sizeof (remotehost)); wtmp = open(_PATH_WTMP, O_WRONLY|O_APPEND); if (wtmp >= 0) { /* hack, but must be unique and no tty line */ sprintf(line, "uucp%.4d", getpid()); SCPYN(utmp.ut_line, line); SCPYN(utmp.ut_name, pw->pw_name); SCPYN(utmp.ut_host, remotehost); time(&utmp.ut_time); (void)write(wtmp, (char *)&utmp, sizeof (utmp)); (void)close(wtmp); } if ((f = open(_PATH_LASTLOG, O_RDWR)) >= 0) { struct lastlog ll; time(&ll.ll_time); lseek(f, pw->pw_uid * sizeof(struct lastlog), 0); SCPYN(ll.ll_line, remotehost); SCPYN(ll.ll_host, remotehost); (void)write(f, (char *) &ll, sizeof ll); (void)close(f); } }