12aef6930SMark Murray /*
22aef6930SMark Murray * tcpdchk - examine all tcpd access control rules and inetd.conf entries
32aef6930SMark Murray *
42aef6930SMark Murray * Usage: tcpdchk [-a] [-d] [-i inet_conf] [-v]
52aef6930SMark Murray *
62aef6930SMark Murray * -a: complain about implicit "allow" at end of rule.
72aef6930SMark Murray *
82aef6930SMark Murray * -d: rules in current directory.
92aef6930SMark Murray *
102aef6930SMark Murray * -i: location of inetd.conf file.
112aef6930SMark Murray *
122aef6930SMark Murray * -v: show all rules.
132aef6930SMark Murray *
142aef6930SMark Murray * Author: Wietse Venema, Eindhoven University of Technology, The Netherlands.
1599abb287SSheldon Hearn *
1699abb287SSheldon Hearn * $FreeBSD$
172aef6930SMark Murray */
182aef6930SMark Murray
192aef6930SMark Murray #ifndef lint
202aef6930SMark Murray static char sccsid[] = "@(#) tcpdchk.c 1.8 97/02/12 02:13:25";
212aef6930SMark Murray #endif
222aef6930SMark Murray
232aef6930SMark Murray /* System libraries. */
242aef6930SMark Murray
252aef6930SMark Murray #include <sys/types.h>
262aef6930SMark Murray #include <sys/stat.h>
278053080cSYoshinobu Inoue #ifdef INET6
288053080cSYoshinobu Inoue #include <sys/socket.h>
298053080cSYoshinobu Inoue #endif
302aef6930SMark Murray #include <netinet/in.h>
312aef6930SMark Murray #include <arpa/inet.h>
322aef6930SMark Murray #include <stdio.h>
332aef6930SMark Murray #include <syslog.h>
342aef6930SMark Murray #include <setjmp.h>
352aef6930SMark Murray #include <errno.h>
362aef6930SMark Murray #include <netdb.h>
377d2d393cSBrooks Davis #include <stdlib.h>
382aef6930SMark Murray #include <string.h>
3974812c2bSSean Bruno #include <unistd.h>
402aef6930SMark Murray
412aef6930SMark Murray #ifndef INADDR_NONE
422aef6930SMark Murray #define INADDR_NONE (-1) /* XXX should be 0xffffffff */
432aef6930SMark Murray #endif
442aef6930SMark Murray
452aef6930SMark Murray #ifndef S_ISDIR
462aef6930SMark Murray #define S_ISDIR(m) (((m) & S_IFMT) == S_IFDIR)
472aef6930SMark Murray #endif
482aef6930SMark Murray
492aef6930SMark Murray /* Application-specific. */
502aef6930SMark Murray
512aef6930SMark Murray #include "tcpd.h"
522aef6930SMark Murray #include "inetcf.h"
532aef6930SMark Murray #include "scaffold.h"
542aef6930SMark Murray
552aef6930SMark Murray /*
562aef6930SMark Murray * Stolen from hosts_access.c...
572aef6930SMark Murray */
582aef6930SMark Murray static char sep[] = ", \t\n";
592aef6930SMark Murray
602aef6930SMark Murray #define BUFLEN 2048
612aef6930SMark Murray
622aef6930SMark Murray int resident = 0;
632aef6930SMark Murray int hosts_access_verbose = 0;
642aef6930SMark Murray char *hosts_allow_table = HOSTS_ALLOW;
652aef6930SMark Murray char *hosts_deny_table = HOSTS_DENY;
662aef6930SMark Murray extern jmp_buf tcpd_buf;
672aef6930SMark Murray
682aef6930SMark Murray /*
692aef6930SMark Murray * Local stuff.
702aef6930SMark Murray */
71068ad27dSBrooks Davis static void usage(void);
72068ad27dSBrooks Davis static void parse_table(char *table, struct request_info *request);
73068ad27dSBrooks Davis static void print_list(char *title, char *list);
74068ad27dSBrooks Davis static void check_daemon_list(char *list);
75068ad27dSBrooks Davis static void check_client_list(char *list);
76068ad27dSBrooks Davis static void check_daemon(char *pat);
77068ad27dSBrooks Davis static void check_user(char *pat);
78068ad27dSBrooks Davis static int check_host(char *pat);
79068ad27dSBrooks Davis static int reserved_name(char *pat);
802aef6930SMark Murray
812aef6930SMark Murray #define PERMIT 1
822aef6930SMark Murray #define DENY 0
832aef6930SMark Murray
842aef6930SMark Murray #define YES 1
852aef6930SMark Murray #define NO 0
862aef6930SMark Murray
872aef6930SMark Murray static int defl_verdict;
882aef6930SMark Murray static char *myname;
892aef6930SMark Murray static int allow_check;
902aef6930SMark Murray static char *inetcf;
912aef6930SMark Murray
main(int argc,char ** argv)92*14f102eaSEd Maste int main(int argc, char **argv)
932aef6930SMark Murray {
942aef6930SMark Murray struct request_info request;
952aef6930SMark Murray struct stat st;
962aef6930SMark Murray int c;
972aef6930SMark Murray
982aef6930SMark Murray myname = argv[0];
992aef6930SMark Murray
1002aef6930SMark Murray /*
1012aef6930SMark Murray * Parse the JCL.
1022aef6930SMark Murray */
1032aef6930SMark Murray while ((c = getopt(argc, argv, "adi:v")) != EOF) {
1042aef6930SMark Murray switch (c) {
1052aef6930SMark Murray case 'a':
1062aef6930SMark Murray allow_check = 1;
1072aef6930SMark Murray break;
1082aef6930SMark Murray case 'd':
1092aef6930SMark Murray hosts_allow_table = "hosts.allow";
1102aef6930SMark Murray hosts_deny_table = "hosts.deny";
1112aef6930SMark Murray break;
1122aef6930SMark Murray case 'i':
1132aef6930SMark Murray inetcf = optarg;
1142aef6930SMark Murray break;
1152aef6930SMark Murray case 'v':
1162aef6930SMark Murray hosts_access_verbose++;
1172aef6930SMark Murray break;
1182aef6930SMark Murray default:
1192aef6930SMark Murray usage();
1202aef6930SMark Murray /* NOTREACHED */
1212aef6930SMark Murray }
1222aef6930SMark Murray }
1232aef6930SMark Murray if (argc != optind)
1242aef6930SMark Murray usage();
1252aef6930SMark Murray
1262aef6930SMark Murray /*
1272aef6930SMark Murray * When confusion really strikes...
1282aef6930SMark Murray */
1292aef6930SMark Murray if (check_path(REAL_DAEMON_DIR, &st) < 0) {
1302aef6930SMark Murray tcpd_warn("REAL_DAEMON_DIR %s: %m", REAL_DAEMON_DIR);
1312aef6930SMark Murray } else if (!S_ISDIR(st.st_mode)) {
1322aef6930SMark Murray tcpd_warn("REAL_DAEMON_DIR %s is not a directory", REAL_DAEMON_DIR);
1332aef6930SMark Murray }
1342aef6930SMark Murray
1352aef6930SMark Murray /*
1362aef6930SMark Murray * Process the inet configuration file (or its moral equivalent). This
1372aef6930SMark Murray * information is used later to find references in hosts.allow/deny to
1382aef6930SMark Murray * unwrapped services, and other possible problems.
1392aef6930SMark Murray */
1402aef6930SMark Murray inetcf = inet_cfg(inetcf);
1412aef6930SMark Murray if (hosts_access_verbose)
1422aef6930SMark Murray printf("Using network configuration file: %s\n", inetcf);
1432aef6930SMark Murray
1442aef6930SMark Murray /*
1452aef6930SMark Murray * These are not run from inetd but may have built-in access control.
1462aef6930SMark Murray */
1472aef6930SMark Murray inet_set("portmap", WR_NOT);
1482aef6930SMark Murray inet_set("rpcbind", WR_NOT);
1492aef6930SMark Murray
1502aef6930SMark Murray /*
1512aef6930SMark Murray * Check accessibility of access control files.
1522aef6930SMark Murray */
1532aef6930SMark Murray (void) check_path(hosts_allow_table, &st);
1542aef6930SMark Murray (void) check_path(hosts_deny_table, &st);
1552aef6930SMark Murray
1562aef6930SMark Murray /*
1572aef6930SMark Murray * Fake up an arbitrary service request.
1582aef6930SMark Murray */
1592aef6930SMark Murray request_init(&request,
1602aef6930SMark Murray RQ_DAEMON, "daemon_name",
1612aef6930SMark Murray RQ_SERVER_NAME, "server_hostname",
1622aef6930SMark Murray RQ_SERVER_ADDR, "server_addr",
1632aef6930SMark Murray RQ_USER, "user_name",
1642aef6930SMark Murray RQ_CLIENT_NAME, "client_hostname",
1652aef6930SMark Murray RQ_CLIENT_ADDR, "client_addr",
1662aef6930SMark Murray RQ_FILE, 1,
1672aef6930SMark Murray 0);
1682aef6930SMark Murray
1692aef6930SMark Murray /*
1702aef6930SMark Murray * Examine all access-control rules.
1712aef6930SMark Murray */
1722aef6930SMark Murray defl_verdict = PERMIT;
1732aef6930SMark Murray parse_table(hosts_allow_table, &request);
1742aef6930SMark Murray defl_verdict = DENY;
1752aef6930SMark Murray parse_table(hosts_deny_table, &request);
1762aef6930SMark Murray return (0);
1772aef6930SMark Murray }
1782aef6930SMark Murray
1792aef6930SMark Murray /* usage - explain */
1802aef6930SMark Murray
usage(void)181068ad27dSBrooks Davis static void usage(void)
1822aef6930SMark Murray {
1832aef6930SMark Murray fprintf(stderr, "usage: %s [-a] [-d] [-i inet_conf] [-v]\n", myname);
1842aef6930SMark Murray fprintf(stderr, " -a: report rules with implicit \"ALLOW\" at end\n");
1852aef6930SMark Murray fprintf(stderr, " -d: use allow/deny files in current directory\n");
1862aef6930SMark Murray fprintf(stderr, " -i: location of inetd.conf file\n");
1872aef6930SMark Murray fprintf(stderr, " -v: list all rules\n");
1882aef6930SMark Murray exit(1);
1892aef6930SMark Murray }
1902aef6930SMark Murray
1912aef6930SMark Murray /* parse_table - like table_match(), but examines _all_ entries */
1922aef6930SMark Murray
parse_table(char * table,struct request_info * request)193*14f102eaSEd Maste static void parse_table(char *table, struct request_info *request)
1942aef6930SMark Murray {
1952aef6930SMark Murray FILE *fp;
1962aef6930SMark Murray int real_verdict;
1972aef6930SMark Murray char sv_list[BUFLEN]; /* becomes list of daemons */
1982aef6930SMark Murray char *cl_list; /* becomes list of requests */
1992aef6930SMark Murray char *sh_cmd; /* becomes optional shell command */
2002aef6930SMark Murray char buf[BUFSIZ];
2012aef6930SMark Murray int verdict;
2022aef6930SMark Murray struct tcpd_context saved_context;
2032aef6930SMark Murray
2042aef6930SMark Murray saved_context = tcpd_context; /* stupid compilers */
2052aef6930SMark Murray
2062aef6930SMark Murray if (fp = fopen(table, "r")) {
2072aef6930SMark Murray tcpd_context.file = table;
2082aef6930SMark Murray tcpd_context.line = 0;
2092aef6930SMark Murray while (xgets(sv_list, sizeof(sv_list), fp)) {
2102aef6930SMark Murray if (sv_list[strlen(sv_list) - 1] != '\n') {
2112aef6930SMark Murray tcpd_warn("missing newline or line too long");
2122aef6930SMark Murray continue;
2132aef6930SMark Murray }
2142aef6930SMark Murray if (sv_list[0] == '#' || sv_list[strspn(sv_list, " \t\r\n")] == 0)
2152aef6930SMark Murray continue;
2162aef6930SMark Murray if ((cl_list = split_at(sv_list, ':')) == 0) {
2172aef6930SMark Murray tcpd_warn("missing \":\" separator");
2182aef6930SMark Murray continue;
2192aef6930SMark Murray }
2202aef6930SMark Murray sh_cmd = split_at(cl_list, ':');
2212aef6930SMark Murray
2222aef6930SMark Murray if (hosts_access_verbose)
2232aef6930SMark Murray printf("\n>>> Rule %s line %d:\n",
2242aef6930SMark Murray tcpd_context.file, tcpd_context.line);
2252aef6930SMark Murray
2262aef6930SMark Murray if (hosts_access_verbose)
2272aef6930SMark Murray print_list("daemons: ", sv_list);
2282aef6930SMark Murray check_daemon_list(sv_list);
2292aef6930SMark Murray
2302aef6930SMark Murray if (hosts_access_verbose)
2312aef6930SMark Murray print_list("clients: ", cl_list);
2322aef6930SMark Murray check_client_list(cl_list);
2332aef6930SMark Murray
2342aef6930SMark Murray #ifdef PROCESS_OPTIONS
2352aef6930SMark Murray real_verdict = defl_verdict;
2362aef6930SMark Murray if (sh_cmd) {
2372aef6930SMark Murray verdict = setjmp(tcpd_buf);
2382aef6930SMark Murray if (verdict != 0) {
2392aef6930SMark Murray real_verdict = (verdict == AC_PERMIT);
2402aef6930SMark Murray } else {
2412aef6930SMark Murray dry_run = 1;
2422aef6930SMark Murray process_options(sh_cmd, request);
2432aef6930SMark Murray if (dry_run == 1 && real_verdict && allow_check)
2442aef6930SMark Murray tcpd_warn("implicit \"allow\" at end of rule");
2452aef6930SMark Murray }
2462aef6930SMark Murray } else if (defl_verdict && allow_check) {
2472aef6930SMark Murray tcpd_warn("implicit \"allow\" at end of rule");
2482aef6930SMark Murray }
2492aef6930SMark Murray if (hosts_access_verbose)
2502aef6930SMark Murray printf("access: %s\n", real_verdict ? "granted" : "denied");
2512aef6930SMark Murray #else
2522aef6930SMark Murray if (sh_cmd)
2532aef6930SMark Murray shell_cmd(percent_x(buf, sizeof(buf), sh_cmd, request));
2542aef6930SMark Murray if (hosts_access_verbose)
2552aef6930SMark Murray printf("access: %s\n", defl_verdict ? "granted" : "denied");
2562aef6930SMark Murray #endif
2572aef6930SMark Murray }
2582aef6930SMark Murray (void) fclose(fp);
2592aef6930SMark Murray } else if (errno != ENOENT) {
2602aef6930SMark Murray tcpd_warn("cannot open %s: %m", table);
2612aef6930SMark Murray }
2622aef6930SMark Murray tcpd_context = saved_context;
2632aef6930SMark Murray }
2642aef6930SMark Murray
2652aef6930SMark Murray /* print_list - pretty-print a list */
2662aef6930SMark Murray
print_list(char * title,char * list)267*14f102eaSEd Maste static void print_list(char *title, char *list)
2682aef6930SMark Murray {
2692aef6930SMark Murray char buf[BUFLEN];
2702aef6930SMark Murray char *cp;
2712aef6930SMark Murray char *next;
2722aef6930SMark Murray
2732aef6930SMark Murray fputs(title, stdout);
2742aef6930SMark Murray strcpy(buf, list);
2752aef6930SMark Murray
2762aef6930SMark Murray for (cp = strtok(buf, sep); cp != 0; cp = next) {
2772aef6930SMark Murray fputs(cp, stdout);
2782aef6930SMark Murray next = strtok((char *) 0, sep);
2792aef6930SMark Murray if (next != 0)
2802aef6930SMark Murray fputs(" ", stdout);
2812aef6930SMark Murray }
2822aef6930SMark Murray fputs("\n", stdout);
2832aef6930SMark Murray }
2842aef6930SMark Murray
2852aef6930SMark Murray /* check_daemon_list - criticize daemon list */
2862aef6930SMark Murray
check_daemon_list(char * list)287*14f102eaSEd Maste static void check_daemon_list(char *list)
2882aef6930SMark Murray {
2892aef6930SMark Murray char buf[BUFLEN];
2902aef6930SMark Murray char *cp;
2912aef6930SMark Murray char *host;
2922aef6930SMark Murray int daemons = 0;
2932aef6930SMark Murray
2942aef6930SMark Murray strcpy(buf, list);
2952aef6930SMark Murray
2962aef6930SMark Murray for (cp = strtok(buf, sep); cp != 0; cp = strtok((char *) 0, sep)) {
2972aef6930SMark Murray if (STR_EQ(cp, "EXCEPT")) {
2982aef6930SMark Murray daemons = 0;
2992aef6930SMark Murray } else {
3002aef6930SMark Murray daemons++;
3012aef6930SMark Murray if ((host = split_at(cp + 1, '@')) != 0 && check_host(host) > 1) {
3022aef6930SMark Murray tcpd_warn("host %s has more than one address", host);
3032aef6930SMark Murray tcpd_warn("(consider using an address instead)");
3042aef6930SMark Murray }
3052aef6930SMark Murray check_daemon(cp);
3062aef6930SMark Murray }
3072aef6930SMark Murray }
3082aef6930SMark Murray if (daemons == 0)
3092aef6930SMark Murray tcpd_warn("daemon list is empty or ends in EXCEPT");
3102aef6930SMark Murray }
3112aef6930SMark Murray
3122aef6930SMark Murray /* check_client_list - criticize client list */
3132aef6930SMark Murray
check_client_list(char * list)314*14f102eaSEd Maste static void check_client_list(char *list)
3152aef6930SMark Murray {
3162aef6930SMark Murray char buf[BUFLEN];
3172aef6930SMark Murray char *cp;
3182aef6930SMark Murray char *host;
3192aef6930SMark Murray int clients = 0;
3202aef6930SMark Murray
3212aef6930SMark Murray strcpy(buf, list);
3222aef6930SMark Murray
3232aef6930SMark Murray for (cp = strtok(buf, sep); cp != 0; cp = strtok((char *) 0, sep)) {
3242aef6930SMark Murray if (STR_EQ(cp, "EXCEPT")) {
3252aef6930SMark Murray clients = 0;
3262aef6930SMark Murray } else {
3272aef6930SMark Murray clients++;
3282aef6930SMark Murray if (host = split_at(cp + 1, '@')) { /* user@host */
3292aef6930SMark Murray check_user(cp);
3302aef6930SMark Murray check_host(host);
3312aef6930SMark Murray } else {
3322aef6930SMark Murray check_host(cp);
3332aef6930SMark Murray }
3342aef6930SMark Murray }
3352aef6930SMark Murray }
3362aef6930SMark Murray if (clients == 0)
3372aef6930SMark Murray tcpd_warn("client list is empty or ends in EXCEPT");
3382aef6930SMark Murray }
3392aef6930SMark Murray
3402aef6930SMark Murray /* check_daemon - criticize daemon pattern */
3412aef6930SMark Murray
check_daemon(char * pat)342*14f102eaSEd Maste static void check_daemon(char *pat)
3432aef6930SMark Murray {
3442aef6930SMark Murray if (pat[0] == '@') {
3452aef6930SMark Murray tcpd_warn("%s: daemon name begins with \"@\"", pat);
34699abb287SSheldon Hearn } else if (pat[0] == '/') {
34799abb287SSheldon Hearn tcpd_warn("%s: daemon name begins with \"/\"", pat);
3482aef6930SMark Murray } else if (pat[0] == '.') {
3492aef6930SMark Murray tcpd_warn("%s: daemon name begins with dot", pat);
3502aef6930SMark Murray } else if (pat[strlen(pat) - 1] == '.') {
3512aef6930SMark Murray tcpd_warn("%s: daemon name ends in dot", pat);
3522aef6930SMark Murray } else if (STR_EQ(pat, "ALL") || STR_EQ(pat, unknown)) {
3532aef6930SMark Murray /* void */ ;
3542aef6930SMark Murray } else if (STR_EQ(pat, "FAIL")) { /* obsolete */
3552aef6930SMark Murray tcpd_warn("FAIL is no longer recognized");
3562aef6930SMark Murray tcpd_warn("(use EXCEPT or DENY instead)");
3572aef6930SMark Murray } else if (reserved_name(pat)) {
3582aef6930SMark Murray tcpd_warn("%s: daemon name may be reserved word", pat);
3592aef6930SMark Murray } else {
3602aef6930SMark Murray switch (inet_get(pat)) {
3612aef6930SMark Murray case WR_UNKNOWN:
3622aef6930SMark Murray tcpd_warn("%s: no such process name in %s", pat, inetcf);
3632aef6930SMark Murray inet_set(pat, WR_YES); /* shut up next time */
3642aef6930SMark Murray break;
3652aef6930SMark Murray case WR_NOT:
3662aef6930SMark Murray tcpd_warn("%s: service possibly not wrapped", pat);
3672aef6930SMark Murray inet_set(pat, WR_YES);
3682aef6930SMark Murray break;
3692aef6930SMark Murray }
3702aef6930SMark Murray }
3712aef6930SMark Murray }
3722aef6930SMark Murray
3732aef6930SMark Murray /* check_user - criticize user pattern */
3742aef6930SMark Murray
check_user(char * pat)375*14f102eaSEd Maste static void check_user(char *pat)
3762aef6930SMark Murray {
3772aef6930SMark Murray if (pat[0] == '@') { /* @netgroup */
3782aef6930SMark Murray tcpd_warn("%s: user name begins with \"@\"", pat);
37999abb287SSheldon Hearn } else if (pat[0] == '/') {
38099abb287SSheldon Hearn tcpd_warn("%s: user name begins with \"/\"", pat);
3812aef6930SMark Murray } else if (pat[0] == '.') {
3822aef6930SMark Murray tcpd_warn("%s: user name begins with dot", pat);
3832aef6930SMark Murray } else if (pat[strlen(pat) - 1] == '.') {
3842aef6930SMark Murray tcpd_warn("%s: user name ends in dot", pat);
3852aef6930SMark Murray } else if (STR_EQ(pat, "ALL") || STR_EQ(pat, unknown)
3862aef6930SMark Murray || STR_EQ(pat, "KNOWN")) {
3872aef6930SMark Murray /* void */ ;
3882aef6930SMark Murray } else if (STR_EQ(pat, "FAIL")) { /* obsolete */
3892aef6930SMark Murray tcpd_warn("FAIL is no longer recognized");
3902aef6930SMark Murray tcpd_warn("(use EXCEPT or DENY instead)");
3912aef6930SMark Murray } else if (reserved_name(pat)) {
3922aef6930SMark Murray tcpd_warn("%s: user name may be reserved word", pat);
3932aef6930SMark Murray }
3942aef6930SMark Murray }
3952aef6930SMark Murray
3968053080cSYoshinobu Inoue #ifdef INET6
is_inet6_addr(char * pat)397*14f102eaSEd Maste static int is_inet6_addr(char *pat)
3988053080cSYoshinobu Inoue {
399b208ff84SHajimu UMEMOTO struct addrinfo hints, *res;
4008053080cSYoshinobu Inoue int len, ret;
4018053080cSYoshinobu Inoue char ch;
4028053080cSYoshinobu Inoue
4038053080cSYoshinobu Inoue if (*pat != '[')
4048053080cSYoshinobu Inoue return (0);
4058053080cSYoshinobu Inoue len = strlen(pat);
4068053080cSYoshinobu Inoue if ((ch = pat[len - 1]) != ']')
4078053080cSYoshinobu Inoue return (0);
4088053080cSYoshinobu Inoue pat[len - 1] = '\0';
409b208ff84SHajimu UMEMOTO memset(&hints, 0, sizeof(hints));
410b208ff84SHajimu UMEMOTO hints.ai_family = AF_INET6;
411b208ff84SHajimu UMEMOTO hints.ai_socktype = SOCK_STREAM;
412b208ff84SHajimu UMEMOTO hints.ai_flags = AI_PASSIVE | AI_NUMERICHOST;
413b208ff84SHajimu UMEMOTO if ((ret = getaddrinfo(pat + 1, NULL, &hints, &res)) == 0)
414b208ff84SHajimu UMEMOTO freeaddrinfo(res);
4158053080cSYoshinobu Inoue pat[len - 1] = ch;
416b208ff84SHajimu UMEMOTO return (ret == 0);
4178053080cSYoshinobu Inoue }
4188053080cSYoshinobu Inoue #endif
4198053080cSYoshinobu Inoue
4202aef6930SMark Murray /* check_host - criticize host pattern */
4212aef6930SMark Murray
check_host(char * pat)422*14f102eaSEd Maste static int check_host(char *pat)
4232aef6930SMark Murray {
42499abb287SSheldon Hearn char buf[BUFSIZ];
4252aef6930SMark Murray char *mask;
4262aef6930SMark Murray int addr_count = 1;
42799abb287SSheldon Hearn FILE *fp;
42899abb287SSheldon Hearn struct tcpd_context saved_context;
42999abb287SSheldon Hearn char *cp;
43099abb287SSheldon Hearn char *wsp = " \t\r\n";
4312aef6930SMark Murray
4322aef6930SMark Murray if (pat[0] == '@') { /* @netgroup */
4332aef6930SMark Murray #ifdef NO_NETGRENT
4342aef6930SMark Murray /* SCO has no *netgrent() support */
4352aef6930SMark Murray #else
4362aef6930SMark Murray #ifdef NETGROUP
4372aef6930SMark Murray char *machinep;
4382aef6930SMark Murray char *userp;
4392aef6930SMark Murray char *domainp;
4402aef6930SMark Murray
4412aef6930SMark Murray setnetgrent(pat + 1);
4422aef6930SMark Murray if (getnetgrent(&machinep, &userp, &domainp) == 0)
4432aef6930SMark Murray tcpd_warn("%s: unknown or empty netgroup", pat + 1);
4442aef6930SMark Murray endnetgrent();
4452aef6930SMark Murray #else
4462aef6930SMark Murray tcpd_warn("netgroup support disabled");
4472aef6930SMark Murray #endif
4482aef6930SMark Murray #endif
44999abb287SSheldon Hearn } else if (pat[0] == '/') { /* /path/name */
45099abb287SSheldon Hearn if ((fp = fopen(pat, "r")) != 0) {
45199abb287SSheldon Hearn saved_context = tcpd_context;
45299abb287SSheldon Hearn tcpd_context.file = pat;
45399abb287SSheldon Hearn tcpd_context.line = 0;
45499abb287SSheldon Hearn while (fgets(buf, sizeof(buf), fp)) {
45599abb287SSheldon Hearn tcpd_context.line++;
45699abb287SSheldon Hearn for (cp = strtok(buf, wsp); cp; cp = strtok((char *) 0, wsp))
45799abb287SSheldon Hearn check_host(cp);
45899abb287SSheldon Hearn }
45999abb287SSheldon Hearn tcpd_context = saved_context;
46099abb287SSheldon Hearn fclose(fp);
46199abb287SSheldon Hearn } else if (errno != ENOENT) {
46299abb287SSheldon Hearn tcpd_warn("open %s: %m", pat);
46399abb287SSheldon Hearn }
4642aef6930SMark Murray } else if (mask = split_at(pat, '/')) { /* network/netmask */
4658053080cSYoshinobu Inoue #ifdef INET6
4668053080cSYoshinobu Inoue int mask_len;
4678053080cSYoshinobu Inoue
4688053080cSYoshinobu Inoue if ((dot_quad_addr(pat) == INADDR_NONE
4698053080cSYoshinobu Inoue || dot_quad_addr(mask) == INADDR_NONE)
4708053080cSYoshinobu Inoue && (!is_inet6_addr(pat)
4718053080cSYoshinobu Inoue || ((mask_len = atoi(mask)) < 0 || mask_len > 128)))
4728053080cSYoshinobu Inoue #else
4732aef6930SMark Murray if (dot_quad_addr(pat) == INADDR_NONE
4742aef6930SMark Murray || dot_quad_addr(mask) == INADDR_NONE)
4758053080cSYoshinobu Inoue #endif
4762aef6930SMark Murray tcpd_warn("%s/%s: bad net/mask pattern", pat, mask);
4772aef6930SMark Murray } else if (STR_EQ(pat, "FAIL")) { /* obsolete */
4782aef6930SMark Murray tcpd_warn("FAIL is no longer recognized");
4792aef6930SMark Murray tcpd_warn("(use EXCEPT or DENY instead)");
4802aef6930SMark Murray } else if (reserved_name(pat)) { /* other reserved */
4812aef6930SMark Murray /* void */ ;
4828053080cSYoshinobu Inoue #ifdef INET6
4838053080cSYoshinobu Inoue } else if (is_inet6_addr(pat)) { /* IPv6 address */
4848053080cSYoshinobu Inoue addr_count = 1;
4858053080cSYoshinobu Inoue #endif
4862aef6930SMark Murray } else if (NOT_INADDR(pat)) { /* internet name */
4872aef6930SMark Murray if (pat[strlen(pat) - 1] == '.') {
4882aef6930SMark Murray tcpd_warn("%s: domain or host name ends in dot", pat);
4892aef6930SMark Murray } else if (pat[0] != '.') {
4902aef6930SMark Murray addr_count = check_dns(pat);
4912aef6930SMark Murray }
4922aef6930SMark Murray } else { /* numeric form */
4932aef6930SMark Murray if (STR_EQ(pat, "0.0.0.0") || STR_EQ(pat, "255.255.255.255")) {
4942aef6930SMark Murray /* void */ ;
4952aef6930SMark Murray } else if (pat[0] == '.') {
4962aef6930SMark Murray tcpd_warn("%s: network number begins with dot", pat);
4972aef6930SMark Murray } else if (pat[strlen(pat) - 1] != '.') {
4982aef6930SMark Murray check_dns(pat);
4992aef6930SMark Murray }
5002aef6930SMark Murray }
5012aef6930SMark Murray return (addr_count);
5022aef6930SMark Murray }
5032aef6930SMark Murray
5042aef6930SMark Murray /* reserved_name - determine if name is reserved */
5052aef6930SMark Murray
reserved_name(char * pat)506*14f102eaSEd Maste static int reserved_name(char *pat)
5072aef6930SMark Murray {
5082aef6930SMark Murray return (STR_EQ(pat, unknown)
5092aef6930SMark Murray || STR_EQ(pat, "KNOWN")
5102aef6930SMark Murray || STR_EQ(pat, paranoid)
5112aef6930SMark Murray || STR_EQ(pat, "ALL")
5122aef6930SMark Murray || STR_EQ(pat, "LOCAL"));
5132aef6930SMark Murray }
514