12aef6930SMark Murray /* 22aef6930SMark Murray * This module determines the type of socket (datagram, stream), the client 32aef6930SMark Murray * socket address and port, the server socket address and port. In addition, 42aef6930SMark Murray * it provides methods to map a transport address to a printable host name 52aef6930SMark Murray * or address. Socket address information results are in static memory. 62aef6930SMark Murray * 72aef6930SMark Murray * The result from the hostname lookup method is STRING_PARANOID when a host 82aef6930SMark Murray * pretends to have someone elses name, or when a host name is available but 92aef6930SMark Murray * could not be verified. 102aef6930SMark Murray * 112aef6930SMark Murray * When lookup or conversion fails the result is set to STRING_UNKNOWN. 122aef6930SMark Murray * 132aef6930SMark Murray * Diagnostics are reported through syslog(3). 142aef6930SMark Murray * 152aef6930SMark Murray * Author: Wietse Venema, Eindhoven University of Technology, The Netherlands. 162aef6930SMark Murray */ 172aef6930SMark Murray 182aef6930SMark Murray #ifndef lint 192aef6930SMark Murray static char sccsid[] = "@(#) socket.c 1.15 97/03/21 19:27:24"; 202aef6930SMark Murray #endif 212aef6930SMark Murray 222aef6930SMark Murray /* System libraries. */ 232aef6930SMark Murray 242aef6930SMark Murray #include <sys/types.h> 252aef6930SMark Murray #include <sys/param.h> 262aef6930SMark Murray #include <sys/socket.h> 272aef6930SMark Murray #include <netinet/in.h> 282aef6930SMark Murray #include <netdb.h> 292aef6930SMark Murray #include <stdio.h> 302aef6930SMark Murray #include <syslog.h> 312aef6930SMark Murray #include <string.h> 322aef6930SMark Murray 332aef6930SMark Murray extern char *inet_ntoa(); 342aef6930SMark Murray 352aef6930SMark Murray /* Local stuff. */ 362aef6930SMark Murray 372aef6930SMark Murray #include "tcpd.h" 382aef6930SMark Murray 392aef6930SMark Murray /* Forward declarations. */ 402aef6930SMark Murray 412aef6930SMark Murray static void sock_sink(); 422aef6930SMark Murray 432aef6930SMark Murray #ifdef APPEND_DOT 442aef6930SMark Murray 452aef6930SMark Murray /* 462aef6930SMark Murray * Speed up DNS lookups by terminating the host name with a dot. Should be 472aef6930SMark Murray * done with care. The speedup can give problems with lookups from sources 482aef6930SMark Murray * that lack DNS-style trailing dot magic, such as local files or NIS maps. 492aef6930SMark Murray */ 502aef6930SMark Murray 512aef6930SMark Murray static struct hostent *gethostbyname_dot(name) 522aef6930SMark Murray char *name; 532aef6930SMark Murray { 542aef6930SMark Murray char dot_name[MAXHOSTNAMELEN + 1]; 552aef6930SMark Murray 562aef6930SMark Murray /* 572aef6930SMark Murray * Don't append dots to unqualified names. Such names are likely to come 582aef6930SMark Murray * from local hosts files or from NIS. 592aef6930SMark Murray */ 602aef6930SMark Murray 612aef6930SMark Murray if (strchr(name, '.') == 0 || strlen(name) >= MAXHOSTNAMELEN - 1) { 622aef6930SMark Murray return (gethostbyname(name)); 632aef6930SMark Murray } else { 642aef6930SMark Murray sprintf(dot_name, "%s.", name); 652aef6930SMark Murray return (gethostbyname(dot_name)); 662aef6930SMark Murray } 672aef6930SMark Murray } 682aef6930SMark Murray 692aef6930SMark Murray #define gethostbyname gethostbyname_dot 702aef6930SMark Murray #endif 712aef6930SMark Murray 722aef6930SMark Murray /* sock_host - look up endpoint addresses and install conversion methods */ 732aef6930SMark Murray 742aef6930SMark Murray void sock_host(request) 752aef6930SMark Murray struct request_info *request; 762aef6930SMark Murray { 772aef6930SMark Murray static struct sockaddr_in client; 782aef6930SMark Murray static struct sockaddr_in server; 792aef6930SMark Murray int len; 802aef6930SMark Murray char buf[BUFSIZ]; 812aef6930SMark Murray int fd = request->fd; 822aef6930SMark Murray 832aef6930SMark Murray sock_methods(request); 842aef6930SMark Murray 852aef6930SMark Murray /* 862aef6930SMark Murray * Look up the client host address. Hal R. Brand <BRAND@addvax.llnl.gov> 872aef6930SMark Murray * suggested how to get the client host info in case of UDP connections: 882aef6930SMark Murray * peek at the first message without actually looking at its contents. We 892aef6930SMark Murray * really should verify that client.sin_family gets the value AF_INET, 902aef6930SMark Murray * but this program has already caused too much grief on systems with 912aef6930SMark Murray * broken library code. 922aef6930SMark Murray */ 932aef6930SMark Murray 942aef6930SMark Murray len = sizeof(client); 952aef6930SMark Murray if (getpeername(fd, (struct sockaddr *) & client, &len) < 0) { 962aef6930SMark Murray request->sink = sock_sink; 972aef6930SMark Murray len = sizeof(client); 982aef6930SMark Murray if (recvfrom(fd, buf, sizeof(buf), MSG_PEEK, 992aef6930SMark Murray (struct sockaddr *) & client, &len) < 0) { 1002aef6930SMark Murray tcpd_warn("can't get client address: %m"); 1012aef6930SMark Murray return; /* give up */ 1022aef6930SMark Murray } 1032aef6930SMark Murray #ifdef really_paranoid 1042aef6930SMark Murray memset(buf, 0 sizeof(buf)); 1052aef6930SMark Murray #endif 1062aef6930SMark Murray } 1072aef6930SMark Murray request->client->sin = &client; 1082aef6930SMark Murray 1092aef6930SMark Murray /* 1102aef6930SMark Murray * Determine the server binding. This is used for client username 1112aef6930SMark Murray * lookups, and for access control rules that trigger on the server 1122aef6930SMark Murray * address or name. 1132aef6930SMark Murray */ 1142aef6930SMark Murray 1152aef6930SMark Murray len = sizeof(server); 1162aef6930SMark Murray if (getsockname(fd, (struct sockaddr *) & server, &len) < 0) { 1172aef6930SMark Murray tcpd_warn("getsockname: %m"); 1182aef6930SMark Murray return; 1192aef6930SMark Murray } 1202aef6930SMark Murray request->server->sin = &server; 1212aef6930SMark Murray } 1222aef6930SMark Murray 1232aef6930SMark Murray /* sock_hostaddr - map endpoint address to printable form */ 1242aef6930SMark Murray 1252aef6930SMark Murray void sock_hostaddr(host) 1262aef6930SMark Murray struct host_info *host; 1272aef6930SMark Murray { 1282aef6930SMark Murray struct sockaddr_in *sin = host->sin; 1292aef6930SMark Murray 1302aef6930SMark Murray if (sin != 0) 1312aef6930SMark Murray STRN_CPY(host->addr, inet_ntoa(sin->sin_addr), sizeof(host->addr)); 1322aef6930SMark Murray } 1332aef6930SMark Murray 1342aef6930SMark Murray /* sock_hostname - map endpoint address to host name */ 1352aef6930SMark Murray 1362aef6930SMark Murray void sock_hostname(host) 1372aef6930SMark Murray struct host_info *host; 1382aef6930SMark Murray { 1392aef6930SMark Murray struct sockaddr_in *sin = host->sin; 1402aef6930SMark Murray struct hostent *hp; 1412aef6930SMark Murray int i; 1422aef6930SMark Murray 1432aef6930SMark Murray /* 1442aef6930SMark Murray * On some systems, for example Solaris 2.3, gethostbyaddr(0.0.0.0) does 1452aef6930SMark Murray * not fail. Instead it returns "INADDR_ANY". Unfortunately, this does 1462aef6930SMark Murray * not work the other way around: gethostbyname("INADDR_ANY") fails. We 1472aef6930SMark Murray * have to special-case 0.0.0.0, in order to avoid false alerts from the 1482aef6930SMark Murray * host name/address checking code below. 1492aef6930SMark Murray */ 1502aef6930SMark Murray if (sin != 0 && sin->sin_addr.s_addr != 0 1512aef6930SMark Murray && (hp = gethostbyaddr((char *) &(sin->sin_addr), 1522aef6930SMark Murray sizeof(sin->sin_addr), AF_INET)) != 0) { 1532aef6930SMark Murray 1542aef6930SMark Murray STRN_CPY(host->name, hp->h_name, sizeof(host->name)); 1552aef6930SMark Murray 1562aef6930SMark Murray /* 1572aef6930SMark Murray * Verify that the address is a member of the address list returned 1582aef6930SMark Murray * by gethostbyname(hostname). 1592aef6930SMark Murray * 1602aef6930SMark Murray * Verify also that gethostbyaddr() and gethostbyname() return the same 1612aef6930SMark Murray * hostname, or rshd and rlogind may still end up being spoofed. 1622aef6930SMark Murray * 1632aef6930SMark Murray * On some sites, gethostbyname("localhost") returns "localhost.domain". 1642aef6930SMark Murray * This is a DNS artefact. We treat it as a special case. When we 1652aef6930SMark Murray * can't believe the address list from gethostbyname("localhost") 1662aef6930SMark Murray * we're in big trouble anyway. 1672aef6930SMark Murray */ 1682aef6930SMark Murray 1692aef6930SMark Murray if ((hp = gethostbyname(host->name)) == 0) { 1702aef6930SMark Murray 1712aef6930SMark Murray /* 1722aef6930SMark Murray * Unable to verify that the host name matches the address. This 1732aef6930SMark Murray * may be a transient problem or a botched name server setup. 1742aef6930SMark Murray */ 1752aef6930SMark Murray 1762aef6930SMark Murray tcpd_warn("can't verify hostname: gethostbyname(%s) failed", 1772aef6930SMark Murray host->name); 1782aef6930SMark Murray 1792aef6930SMark Murray } else if (STR_NE(host->name, hp->h_name) 1802aef6930SMark Murray && STR_NE(host->name, "localhost")) { 1812aef6930SMark Murray 1822aef6930SMark Murray /* 1832aef6930SMark Murray * The gethostbyaddr() and gethostbyname() calls did not return 1842aef6930SMark Murray * the same hostname. This could be a nameserver configuration 1852aef6930SMark Murray * problem. It could also be that someone is trying to spoof us. 1862aef6930SMark Murray */ 1872aef6930SMark Murray 1882aef6930SMark Murray tcpd_warn("host name/name mismatch: %s != %.*s", 1892aef6930SMark Murray host->name, STRING_LENGTH, hp->h_name); 1902aef6930SMark Murray 1912aef6930SMark Murray } else { 1922aef6930SMark Murray 1932aef6930SMark Murray /* 1942aef6930SMark Murray * The address should be a member of the address list returned by 1952aef6930SMark Murray * gethostbyname(). We should first verify that the h_addrtype 1962aef6930SMark Murray * field is AF_INET, but this program has already caused too much 1972aef6930SMark Murray * grief on systems with broken library code. 1982aef6930SMark Murray */ 1992aef6930SMark Murray 2002aef6930SMark Murray for (i = 0; hp->h_addr_list[i]; i++) { 2012aef6930SMark Murray if (memcmp(hp->h_addr_list[i], 2022aef6930SMark Murray (char *) &sin->sin_addr, 2032aef6930SMark Murray sizeof(sin->sin_addr)) == 0) 2042aef6930SMark Murray return; /* name is good, keep it */ 2052aef6930SMark Murray } 2062aef6930SMark Murray 2072aef6930SMark Murray /* 2082aef6930SMark Murray * The host name does not map to the initial address. Perhaps 2092aef6930SMark Murray * someone has messed up. Perhaps someone compromised a name 2102aef6930SMark Murray * server. 2112aef6930SMark Murray */ 2122aef6930SMark Murray 2132aef6930SMark Murray tcpd_warn("host name/address mismatch: %s != %.*s", 2142aef6930SMark Murray inet_ntoa(sin->sin_addr), STRING_LENGTH, hp->h_name); 2152aef6930SMark Murray } 2162aef6930SMark Murray strcpy(host->name, paranoid); /* name is bad, clobber it */ 2172aef6930SMark Murray } 2182aef6930SMark Murray } 2192aef6930SMark Murray 2202aef6930SMark Murray /* sock_sink - absorb unreceived IP datagram */ 2212aef6930SMark Murray 2222aef6930SMark Murray static void sock_sink(fd) 2232aef6930SMark Murray int fd; 2242aef6930SMark Murray { 2252aef6930SMark Murray char buf[BUFSIZ]; 2262aef6930SMark Murray struct sockaddr_in sin; 2272aef6930SMark Murray int size = sizeof(sin); 2282aef6930SMark Murray 2292aef6930SMark Murray /* 2302aef6930SMark Murray * Eat up the not-yet received datagram. Some systems insist on a 2312aef6930SMark Murray * non-zero source address argument in the recvfrom() call below. 2322aef6930SMark Murray */ 2332aef6930SMark Murray 2342aef6930SMark Murray (void) recvfrom(fd, buf, sizeof(buf), 0, (struct sockaddr *) & sin, &size); 2352aef6930SMark Murray } 236