xrdp/sesman/scp_v1.c

233 lines
7.1 KiB
C
Raw Normal View History

/*
This program is free software; you can redistribute it and/or modify
it under the terms of the GNU General Public License as published by
the Free Software Foundation; either version 2 of the License, or
(at your option) any later version.
This program is distributed in the hope that it will be useful,
but WITHOUT ANY WARRANTY; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
GNU General Public License for more details.
You should have received a copy of the GNU General Public License
along with this program; if not, write to the Free Software
Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
xrdp: A Remote Desktop Protocol server.
2008-01-30 10:53:57 +03:00
Copyright (C) Jay Sorg 2005-2008
*/
/**
*
* @file scp_v1.c
* @brief scp version 1 implementation
* @author Jay Sorg, Simone Fedele
2007-03-17 19:41:21 +03:00
*
*/
#include "sesman.h"
//#include "libscp_types.h"
#include "libscp.h"
extern struct config_sesman* g_cfg; /* in sesman.c */
2007-03-17 19:41:21 +03:00
static void parseCommonStates(enum SCP_SERVER_STATES_E e, char* f);
/******************************************************************************/
2007-02-01 09:03:46 +03:00
void DEFAULT_CC
scp_v1_process(struct SCP_CONNECTION* c, struct SCP_SESSION* s)
{
long data;
int display;
int retries;
int current_try;
enum SCP_SERVER_STATES_E e;
struct SCP_DISCONNECTED_SESSION* slist;
struct session_item* sitem;
int scount;
SCP_SID sid;
retries = g_cfg->sec.login_retry;
2007-02-01 09:03:46 +03:00
current_try = retries;
2007-02-01 09:03:46 +03:00
data = auth_userpass(s->username, s->password);
2007-03-17 19:41:21 +03:00
/*LOG_DBG("user: %s\npass: %s", s->username, s->password);*/
2007-02-01 09:03:46 +03:00
while ((!data) && ((retries == 0) || (current_try > 0)))
{
LOG_DBG("data %d - retry %d - currenttry %d - expr %d",
data, retries, current_try,
((!data) && ((retries == 0) || (current_try > 0))));
2007-02-01 09:03:46 +03:00
e = scp_v1s_request_password(c, s, "Wrong username and/or password");
2007-02-01 09:03:46 +03:00
switch (e)
{
case SCP_SERVER_STATE_OK:
/* all ok, we got new username and password */
2007-02-01 09:03:46 +03:00
data = auth_userpass(s->username, s->password);
2007-03-17 19:41:21 +03:00
/* one try less */
2007-02-01 09:03:46 +03:00
if (current_try > 0)
{
current_try--;
}
break;
default:
2007-03-17 19:41:21 +03:00
/* we check the other errors */
parseCommonStates(e, "scp_v1s_list_sessions()");
scp_session_destroy(s);
2007-02-01 09:03:46 +03:00
return;
2007-03-17 19:41:21 +03:00
//break;
}
}
if (!data)
{
2007-02-01 09:03:46 +03:00
scp_v1s_deny_connection(c, "Login failed");
2012-05-27 19:17:39 +04:00
log_message( LOG_LEVEL_INFO,
2007-02-01 09:03:46 +03:00
"Login failed for user %s. Connection terminated", s->username);
scp_session_destroy(s);
return;
}
2007-03-17 19:41:21 +03:00
/* testing if login is allowed*/
2007-02-01 09:03:46 +03:00
if (0 == access_login_allowed(s->username))
{
2007-02-01 09:03:46 +03:00
scp_v1s_deny_connection(c, "Access to Terminal Server not allowed.");
2012-05-27 19:17:39 +04:00
log_message(LOG_LEVEL_INFO,
2007-02-01 09:03:46 +03:00
"User %s not allowed on TS. Connection terminated", s->username);
scp_session_destroy(s);
return;
}
2007-02-01 09:03:46 +03:00
//check if we need password change
2007-02-01 09:03:46 +03:00
/* list disconnected sessions */
slist = session_get_byuser(s->username, &scount, SESMAN_SESSION_STATUS_DISCONNECTED);
2007-02-01 09:03:46 +03:00
if (scount == 0)
{
/* no disconnected sessions - start a new one */
2012-05-27 19:17:39 +04:00
log_message(LOG_LEVEL_DEBUG,"No disconnected sessions for this user"
"- we create a new one");
2010-11-04 14:14:03 +03:00
if (0 != s->client_ip)
{
2012-05-27 19:17:39 +04:00
log_message(LOG_LEVEL_INFO, "++ created session (access granted): username %s, ip %s", s->username, s->client_ip);
2010-11-04 14:14:03 +03:00
}
else
{
2012-05-27 19:17:39 +04:00
log_message(LOG_LEVEL_INFO, "++ created session (access granted): username %s", s->username);
2010-11-04 14:14:03 +03:00
}
if (SCP_SESSION_TYPE_XVNC == s->type)
{
2012-05-27 19:17:39 +04:00
log_message(LOG_LEVEL_INFO, "starting Xvnc session...");
2007-02-01 09:03:46 +03:00
display = session_start(s->width, s->height, s->bpp, s->username,
s->password, data, SESMAN_SESSION_TYPE_XVNC,
2010-11-04 14:14:03 +03:00
s->domain, s->program, s->directory, s->client_ip);
}
else
{
2012-05-27 19:17:39 +04:00
log_message(LOG_LEVEL_INFO, "starting X11rdp session...");
2007-02-01 09:03:46 +03:00
display = session_start(s->width, s->height, s->bpp, s->username,
s->password, data, SESMAN_SESSION_TYPE_XRDP,
2010-11-04 14:14:03 +03:00
s->domain, s->program, s->directory, s->client_ip);
}
2007-02-01 09:03:46 +03:00
e = scp_v1s_connect_new_session(c, display);
switch (e)
{
case SCP_SERVER_STATE_OK:
/* all ok, we got new username and password */
break;
default:
2007-03-17 19:41:21 +03:00
/* we check the other errors */
parseCommonStates(e, "scp_v1s_connect_new_session()");
break;
}
}
2007-03-17 19:41:21 +03:00
else
{
2007-03-17 19:41:21 +03:00
/* one or more disconnected sessions - listing */
2007-02-01 09:03:46 +03:00
e = scp_v1s_list_sessions(c, scount, slist, &sid);
2007-03-17 19:41:21 +03:00
switch (e)
{
/*case SCP_SERVER_STATE_FORCE_NEW:*/
/* we should check for MaxSessions */
case SCP_SERVER_STATE_SELECTION_CANCEL:
2012-05-27 19:17:39 +04:00
log_message( LOG_LEVEL_INFO, "Connection cancelled after session listing");
2007-03-17 19:41:21 +03:00
break;
case SCP_SERVER_STATE_OK:
/* ok, reconnecting... */
sitem=session_get_bypid(sid);
if (0 == sitem)
2007-03-17 19:41:21 +03:00
{
e = scp_v1s_connection_error(c, "Internal error");
2012-05-27 19:17:39 +04:00
log_message(LOG_LEVEL_INFO, "Cannot find session item on the chain");
2007-03-17 19:41:21 +03:00
}
else
{
display = sitem->display;
2007-03-17 19:41:21 +03:00
/*e=scp_v1s_reconnect_session(c, sitem, display);*/
e=scp_v1s_reconnect_session(c, display);
2010-11-04 14:14:03 +03:00
if (0 != s->client_ip)
{
2012-05-27 19:17:39 +04:00
log_message(LOG_LEVEL_INFO, "++ reconnected session: username %s, display :%d.0, session_pid %d, ip %s", s->username, display, sitem->pid, s->client_ip);
2010-11-04 14:14:03 +03:00
}
else
{
2012-05-27 19:17:39 +04:00
log_message(LOG_LEVEL_INFO, "++ reconnected session: username %s, display :%d.0, session_pid %d", s->username, display, sitem->pid);
2010-11-04 14:14:03 +03:00
}
g_free(sitem);
2007-03-17 19:41:21 +03:00
}
break;
default:
/* we check the other errors */
parseCommonStates(e, "scp_v1s_list_sessions()");
break;
}
g_free(slist);
}
/* resource management */
2007-02-01 09:03:46 +03:00
if ((e == SCP_SERVER_STATE_OK) && (s->rsr))
{
/* here goes scp resource sharing code */
}
2007-02-01 09:03:46 +03:00
2007-03-17 19:41:21 +03:00
/* cleanup */
scp_session_destroy(s);
2007-03-17 19:41:21 +03:00
auth_end(data);
}
2007-03-17 19:41:21 +03:00
static void parseCommonStates(enum SCP_SERVER_STATES_E e, char* f)
{
switch (e)
{
case SCP_SERVER_STATE_VERSION_ERR:
2012-05-27 19:17:39 +04:00
LOG_DBG("version error")
2007-03-17 19:41:21 +03:00
case SCP_SERVER_STATE_SIZE_ERR:
/* an unknown scp version was requested, so we shut down the */
/* connection (and log the fact) */
2012-05-27 19:17:39 +04:00
log_message(LOG_LEVEL_WARNING,
2007-03-17 19:41:21 +03:00
"protocol violation. connection closed.");
break;
case SCP_SERVER_STATE_NETWORK_ERR:
2012-05-27 19:17:39 +04:00
log_message(LOG_LEVEL_WARNING, "libscp network error.");
2007-03-17 19:41:21 +03:00
break;
case SCP_SERVER_STATE_SEQUENCE_ERR:
2012-05-27 19:17:39 +04:00
log_message(LOG_LEVEL_WARNING, "libscp sequence error.");
2007-03-17 19:41:21 +03:00
break;
case SCP_SERVER_STATE_INTERNAL_ERR:
/* internal error occurred (eg. malloc() error, ecc.) */
2012-05-27 19:17:39 +04:00
log_message(LOG_LEVEL_ERROR, "libscp internal error occurred.");
2007-03-17 19:41:21 +03:00
break;
default:
/* dummy: scp_v1s_request_password won't generate any other */
/* error other than the ones before */
2012-05-27 19:17:39 +04:00
log_message(LOG_LEVEL_ALWAYS, "unknown return from %s", f);
2007-03-17 19:41:21 +03:00
break;
}
}