xref: /freebsd/contrib/tcp_wrappers/tcpdchk.c (revision 14f102eacc8434a5a1f96466752578a4167140c9)
12aef6930SMark Murray  /*
22aef6930SMark Murray   * tcpdchk - examine all tcpd access control rules and inetd.conf entries
32aef6930SMark Murray   *
42aef6930SMark Murray   * Usage: tcpdchk [-a] [-d] [-i inet_conf] [-v]
52aef6930SMark Murray   *
62aef6930SMark Murray   * -a: complain about implicit "allow" at end of rule.
72aef6930SMark Murray   *
82aef6930SMark Murray   * -d: rules in current directory.
92aef6930SMark Murray   *
102aef6930SMark Murray   * -i: location of inetd.conf file.
112aef6930SMark Murray   *
122aef6930SMark Murray   * -v: show all rules.
132aef6930SMark Murray   *
142aef6930SMark Murray   * Author: Wietse Venema, Eindhoven University of Technology, The Netherlands.
1599abb287SSheldon Hearn   *
1699abb287SSheldon Hearn   * $FreeBSD$
172aef6930SMark Murray   */
182aef6930SMark Murray 
192aef6930SMark Murray #ifndef lint
202aef6930SMark Murray static char sccsid[] = "@(#) tcpdchk.c 1.8 97/02/12 02:13:25";
212aef6930SMark Murray #endif
222aef6930SMark Murray 
232aef6930SMark Murray /* System libraries. */
242aef6930SMark Murray 
252aef6930SMark Murray #include <sys/types.h>
262aef6930SMark Murray #include <sys/stat.h>
278053080cSYoshinobu Inoue #ifdef INET6
288053080cSYoshinobu Inoue #include <sys/socket.h>
298053080cSYoshinobu Inoue #endif
302aef6930SMark Murray #include <netinet/in.h>
312aef6930SMark Murray #include <arpa/inet.h>
322aef6930SMark Murray #include <stdio.h>
332aef6930SMark Murray #include <syslog.h>
342aef6930SMark Murray #include <setjmp.h>
352aef6930SMark Murray #include <errno.h>
362aef6930SMark Murray #include <netdb.h>
377d2d393cSBrooks Davis #include <stdlib.h>
382aef6930SMark Murray #include <string.h>
3974812c2bSSean Bruno #include <unistd.h>
402aef6930SMark Murray 
412aef6930SMark Murray #ifndef INADDR_NONE
422aef6930SMark Murray #define INADDR_NONE     (-1)		/* XXX should be 0xffffffff */
432aef6930SMark Murray #endif
442aef6930SMark Murray 
452aef6930SMark Murray #ifndef S_ISDIR
462aef6930SMark Murray #define S_ISDIR(m)	(((m) & S_IFMT) == S_IFDIR)
472aef6930SMark Murray #endif
482aef6930SMark Murray 
492aef6930SMark Murray /* Application-specific. */
502aef6930SMark Murray 
512aef6930SMark Murray #include "tcpd.h"
522aef6930SMark Murray #include "inetcf.h"
532aef6930SMark Murray #include "scaffold.h"
542aef6930SMark Murray 
552aef6930SMark Murray  /*
562aef6930SMark Murray   * Stolen from hosts_access.c...
572aef6930SMark Murray   */
582aef6930SMark Murray static char sep[] = ", \t\n";
592aef6930SMark Murray 
602aef6930SMark Murray #define	BUFLEN 2048
612aef6930SMark Murray 
622aef6930SMark Murray int     resident = 0;
632aef6930SMark Murray int     hosts_access_verbose = 0;
642aef6930SMark Murray char   *hosts_allow_table = HOSTS_ALLOW;
652aef6930SMark Murray char   *hosts_deny_table = HOSTS_DENY;
662aef6930SMark Murray extern jmp_buf tcpd_buf;
672aef6930SMark Murray 
682aef6930SMark Murray  /*
692aef6930SMark Murray   * Local stuff.
702aef6930SMark Murray   */
71068ad27dSBrooks Davis static void usage(void);
72068ad27dSBrooks Davis static void parse_table(char *table, struct request_info *request);
73068ad27dSBrooks Davis static void print_list(char *title, char *list);
74068ad27dSBrooks Davis static void check_daemon_list(char *list);
75068ad27dSBrooks Davis static void check_client_list(char *list);
76068ad27dSBrooks Davis static void check_daemon(char *pat);
77068ad27dSBrooks Davis static void check_user(char *pat);
78068ad27dSBrooks Davis static int check_host(char *pat);
79068ad27dSBrooks Davis static int reserved_name(char *pat);
802aef6930SMark Murray 
812aef6930SMark Murray #define PERMIT	1
822aef6930SMark Murray #define DENY	0
832aef6930SMark Murray 
842aef6930SMark Murray #define YES	1
852aef6930SMark Murray #define	NO	0
862aef6930SMark Murray 
872aef6930SMark Murray static int defl_verdict;
882aef6930SMark Murray static char *myname;
892aef6930SMark Murray static int allow_check;
902aef6930SMark Murray static char *inetcf;
912aef6930SMark Murray 
main(int argc,char ** argv)92*14f102eaSEd Maste int     main(int argc, char **argv)
932aef6930SMark Murray {
942aef6930SMark Murray     struct request_info request;
952aef6930SMark Murray     struct stat st;
962aef6930SMark Murray     int     c;
972aef6930SMark Murray 
982aef6930SMark Murray     myname = argv[0];
992aef6930SMark Murray 
1002aef6930SMark Murray     /*
1012aef6930SMark Murray      * Parse the JCL.
1022aef6930SMark Murray      */
1032aef6930SMark Murray     while ((c = getopt(argc, argv, "adi:v")) != EOF) {
1042aef6930SMark Murray 	switch (c) {
1052aef6930SMark Murray 	case 'a':
1062aef6930SMark Murray 	    allow_check = 1;
1072aef6930SMark Murray 	    break;
1082aef6930SMark Murray 	case 'd':
1092aef6930SMark Murray 	    hosts_allow_table = "hosts.allow";
1102aef6930SMark Murray 	    hosts_deny_table = "hosts.deny";
1112aef6930SMark Murray 	    break;
1122aef6930SMark Murray 	case 'i':
1132aef6930SMark Murray 	    inetcf = optarg;
1142aef6930SMark Murray 	    break;
1152aef6930SMark Murray 	case 'v':
1162aef6930SMark Murray 	    hosts_access_verbose++;
1172aef6930SMark Murray 	    break;
1182aef6930SMark Murray 	default:
1192aef6930SMark Murray 	    usage();
1202aef6930SMark Murray 	    /* NOTREACHED */
1212aef6930SMark Murray 	}
1222aef6930SMark Murray     }
1232aef6930SMark Murray     if (argc != optind)
1242aef6930SMark Murray 	usage();
1252aef6930SMark Murray 
1262aef6930SMark Murray     /*
1272aef6930SMark Murray      * When confusion really strikes...
1282aef6930SMark Murray      */
1292aef6930SMark Murray     if (check_path(REAL_DAEMON_DIR, &st) < 0) {
1302aef6930SMark Murray 	tcpd_warn("REAL_DAEMON_DIR %s: %m", REAL_DAEMON_DIR);
1312aef6930SMark Murray     } else if (!S_ISDIR(st.st_mode)) {
1322aef6930SMark Murray 	tcpd_warn("REAL_DAEMON_DIR %s is not a directory", REAL_DAEMON_DIR);
1332aef6930SMark Murray     }
1342aef6930SMark Murray 
1352aef6930SMark Murray     /*
1362aef6930SMark Murray      * Process the inet configuration file (or its moral equivalent). This
1372aef6930SMark Murray      * information is used later to find references in hosts.allow/deny to
1382aef6930SMark Murray      * unwrapped services, and other possible problems.
1392aef6930SMark Murray      */
1402aef6930SMark Murray     inetcf = inet_cfg(inetcf);
1412aef6930SMark Murray     if (hosts_access_verbose)
1422aef6930SMark Murray 	printf("Using network configuration file: %s\n", inetcf);
1432aef6930SMark Murray 
1442aef6930SMark Murray     /*
1452aef6930SMark Murray      * These are not run from inetd but may have built-in access control.
1462aef6930SMark Murray      */
1472aef6930SMark Murray     inet_set("portmap", WR_NOT);
1482aef6930SMark Murray     inet_set("rpcbind", WR_NOT);
1492aef6930SMark Murray 
1502aef6930SMark Murray     /*
1512aef6930SMark Murray      * Check accessibility of access control files.
1522aef6930SMark Murray      */
1532aef6930SMark Murray     (void) check_path(hosts_allow_table, &st);
1542aef6930SMark Murray     (void) check_path(hosts_deny_table, &st);
1552aef6930SMark Murray 
1562aef6930SMark Murray     /*
1572aef6930SMark Murray      * Fake up an arbitrary service request.
1582aef6930SMark Murray      */
1592aef6930SMark Murray     request_init(&request,
1602aef6930SMark Murray 		 RQ_DAEMON, "daemon_name",
1612aef6930SMark Murray 		 RQ_SERVER_NAME, "server_hostname",
1622aef6930SMark Murray 		 RQ_SERVER_ADDR, "server_addr",
1632aef6930SMark Murray 		 RQ_USER, "user_name",
1642aef6930SMark Murray 		 RQ_CLIENT_NAME, "client_hostname",
1652aef6930SMark Murray 		 RQ_CLIENT_ADDR, "client_addr",
1662aef6930SMark Murray 		 RQ_FILE, 1,
1672aef6930SMark Murray 		 0);
1682aef6930SMark Murray 
1692aef6930SMark Murray     /*
1702aef6930SMark Murray      * Examine all access-control rules.
1712aef6930SMark Murray      */
1722aef6930SMark Murray     defl_verdict = PERMIT;
1732aef6930SMark Murray     parse_table(hosts_allow_table, &request);
1742aef6930SMark Murray     defl_verdict = DENY;
1752aef6930SMark Murray     parse_table(hosts_deny_table, &request);
1762aef6930SMark Murray     return (0);
1772aef6930SMark Murray }
1782aef6930SMark Murray 
1792aef6930SMark Murray /* usage - explain */
1802aef6930SMark Murray 
usage(void)181068ad27dSBrooks Davis static void usage(void)
1822aef6930SMark Murray {
1832aef6930SMark Murray     fprintf(stderr, "usage: %s [-a] [-d] [-i inet_conf] [-v]\n", myname);
1842aef6930SMark Murray     fprintf(stderr, "	-a: report rules with implicit \"ALLOW\" at end\n");
1852aef6930SMark Murray     fprintf(stderr, "	-d: use allow/deny files in current directory\n");
1862aef6930SMark Murray     fprintf(stderr, "	-i: location of inetd.conf file\n");
1872aef6930SMark Murray     fprintf(stderr, "	-v: list all rules\n");
1882aef6930SMark Murray     exit(1);
1892aef6930SMark Murray }
1902aef6930SMark Murray 
1912aef6930SMark Murray /* parse_table - like table_match(), but examines _all_ entries */
1922aef6930SMark Murray 
parse_table(char * table,struct request_info * request)193*14f102eaSEd Maste static void parse_table(char *table, struct request_info *request)
1942aef6930SMark Murray {
1952aef6930SMark Murray     FILE   *fp;
1962aef6930SMark Murray     int     real_verdict;
1972aef6930SMark Murray     char    sv_list[BUFLEN];		/* becomes list of daemons */
1982aef6930SMark Murray     char   *cl_list;			/* becomes list of requests */
1992aef6930SMark Murray     char   *sh_cmd;			/* becomes optional shell command */
2002aef6930SMark Murray     char    buf[BUFSIZ];
2012aef6930SMark Murray     int     verdict;
2022aef6930SMark Murray     struct tcpd_context saved_context;
2032aef6930SMark Murray 
2042aef6930SMark Murray     saved_context = tcpd_context;		/* stupid compilers */
2052aef6930SMark Murray 
2062aef6930SMark Murray     if (fp = fopen(table, "r")) {
2072aef6930SMark Murray 	tcpd_context.file = table;
2082aef6930SMark Murray 	tcpd_context.line = 0;
2092aef6930SMark Murray 	while (xgets(sv_list, sizeof(sv_list), fp)) {
2102aef6930SMark Murray 	    if (sv_list[strlen(sv_list) - 1] != '\n') {
2112aef6930SMark Murray 		tcpd_warn("missing newline or line too long");
2122aef6930SMark Murray 		continue;
2132aef6930SMark Murray 	    }
2142aef6930SMark Murray 	    if (sv_list[0] == '#' || sv_list[strspn(sv_list, " \t\r\n")] == 0)
2152aef6930SMark Murray 		continue;
2162aef6930SMark Murray 	    if ((cl_list = split_at(sv_list, ':')) == 0) {
2172aef6930SMark Murray 		tcpd_warn("missing \":\" separator");
2182aef6930SMark Murray 		continue;
2192aef6930SMark Murray 	    }
2202aef6930SMark Murray 	    sh_cmd = split_at(cl_list, ':');
2212aef6930SMark Murray 
2222aef6930SMark Murray 	    if (hosts_access_verbose)
2232aef6930SMark Murray 		printf("\n>>> Rule %s line %d:\n",
2242aef6930SMark Murray 		       tcpd_context.file, tcpd_context.line);
2252aef6930SMark Murray 
2262aef6930SMark Murray 	    if (hosts_access_verbose)
2272aef6930SMark Murray 		print_list("daemons:  ", sv_list);
2282aef6930SMark Murray 	    check_daemon_list(sv_list);
2292aef6930SMark Murray 
2302aef6930SMark Murray 	    if (hosts_access_verbose)
2312aef6930SMark Murray 		print_list("clients:  ", cl_list);
2322aef6930SMark Murray 	    check_client_list(cl_list);
2332aef6930SMark Murray 
2342aef6930SMark Murray #ifdef PROCESS_OPTIONS
2352aef6930SMark Murray 	    real_verdict = defl_verdict;
2362aef6930SMark Murray 	    if (sh_cmd) {
2372aef6930SMark Murray 		verdict = setjmp(tcpd_buf);
2382aef6930SMark Murray 		if (verdict != 0) {
2392aef6930SMark Murray 		    real_verdict = (verdict == AC_PERMIT);
2402aef6930SMark Murray 		} else {
2412aef6930SMark Murray 		    dry_run = 1;
2422aef6930SMark Murray 		    process_options(sh_cmd, request);
2432aef6930SMark Murray 		    if (dry_run == 1 && real_verdict && allow_check)
2442aef6930SMark Murray 			tcpd_warn("implicit \"allow\" at end of rule");
2452aef6930SMark Murray 		}
2462aef6930SMark Murray 	    } else if (defl_verdict && allow_check) {
2472aef6930SMark Murray 		tcpd_warn("implicit \"allow\" at end of rule");
2482aef6930SMark Murray 	    }
2492aef6930SMark Murray 	    if (hosts_access_verbose)
2502aef6930SMark Murray 		printf("access:   %s\n", real_verdict ? "granted" : "denied");
2512aef6930SMark Murray #else
2522aef6930SMark Murray 	    if (sh_cmd)
2532aef6930SMark Murray 		shell_cmd(percent_x(buf, sizeof(buf), sh_cmd, request));
2542aef6930SMark Murray 	    if (hosts_access_verbose)
2552aef6930SMark Murray 		printf("access:   %s\n", defl_verdict ? "granted" : "denied");
2562aef6930SMark Murray #endif
2572aef6930SMark Murray 	}
2582aef6930SMark Murray 	(void) fclose(fp);
2592aef6930SMark Murray     } else if (errno != ENOENT) {
2602aef6930SMark Murray 	tcpd_warn("cannot open %s: %m", table);
2612aef6930SMark Murray     }
2622aef6930SMark Murray     tcpd_context = saved_context;
2632aef6930SMark Murray }
2642aef6930SMark Murray 
2652aef6930SMark Murray /* print_list - pretty-print a list */
2662aef6930SMark Murray 
print_list(char * title,char * list)267*14f102eaSEd Maste static void print_list(char *title, char *list)
2682aef6930SMark Murray {
2692aef6930SMark Murray     char    buf[BUFLEN];
2702aef6930SMark Murray     char   *cp;
2712aef6930SMark Murray     char   *next;
2722aef6930SMark Murray 
2732aef6930SMark Murray     fputs(title, stdout);
2742aef6930SMark Murray     strcpy(buf, list);
2752aef6930SMark Murray 
2762aef6930SMark Murray     for (cp = strtok(buf, sep); cp != 0; cp = next) {
2772aef6930SMark Murray 	fputs(cp, stdout);
2782aef6930SMark Murray 	next = strtok((char *) 0, sep);
2792aef6930SMark Murray 	if (next != 0)
2802aef6930SMark Murray 	    fputs(" ", stdout);
2812aef6930SMark Murray     }
2822aef6930SMark Murray     fputs("\n", stdout);
2832aef6930SMark Murray }
2842aef6930SMark Murray 
2852aef6930SMark Murray /* check_daemon_list - criticize daemon list */
2862aef6930SMark Murray 
check_daemon_list(char * list)287*14f102eaSEd Maste static void check_daemon_list(char *list)
2882aef6930SMark Murray {
2892aef6930SMark Murray     char    buf[BUFLEN];
2902aef6930SMark Murray     char   *cp;
2912aef6930SMark Murray     char   *host;
2922aef6930SMark Murray     int     daemons = 0;
2932aef6930SMark Murray 
2942aef6930SMark Murray     strcpy(buf, list);
2952aef6930SMark Murray 
2962aef6930SMark Murray     for (cp = strtok(buf, sep); cp != 0; cp = strtok((char *) 0, sep)) {
2972aef6930SMark Murray 	if (STR_EQ(cp, "EXCEPT")) {
2982aef6930SMark Murray 	    daemons = 0;
2992aef6930SMark Murray 	} else {
3002aef6930SMark Murray 	    daemons++;
3012aef6930SMark Murray 	    if ((host = split_at(cp + 1, '@')) != 0 && check_host(host) > 1) {
3022aef6930SMark Murray 		tcpd_warn("host %s has more than one address", host);
3032aef6930SMark Murray 		tcpd_warn("(consider using an address instead)");
3042aef6930SMark Murray 	    }
3052aef6930SMark Murray 	    check_daemon(cp);
3062aef6930SMark Murray 	}
3072aef6930SMark Murray     }
3082aef6930SMark Murray     if (daemons == 0)
3092aef6930SMark Murray 	tcpd_warn("daemon list is empty or ends in EXCEPT");
3102aef6930SMark Murray }
3112aef6930SMark Murray 
3122aef6930SMark Murray /* check_client_list - criticize client list */
3132aef6930SMark Murray 
check_client_list(char * list)314*14f102eaSEd Maste static void check_client_list(char *list)
3152aef6930SMark Murray {
3162aef6930SMark Murray     char    buf[BUFLEN];
3172aef6930SMark Murray     char   *cp;
3182aef6930SMark Murray     char   *host;
3192aef6930SMark Murray     int     clients = 0;
3202aef6930SMark Murray 
3212aef6930SMark Murray     strcpy(buf, list);
3222aef6930SMark Murray 
3232aef6930SMark Murray     for (cp = strtok(buf, sep); cp != 0; cp = strtok((char *) 0, sep)) {
3242aef6930SMark Murray 	if (STR_EQ(cp, "EXCEPT")) {
3252aef6930SMark Murray 	    clients = 0;
3262aef6930SMark Murray 	} else {
3272aef6930SMark Murray 	    clients++;
3282aef6930SMark Murray 	    if (host = split_at(cp + 1, '@')) {	/* user@host */
3292aef6930SMark Murray 		check_user(cp);
3302aef6930SMark Murray 		check_host(host);
3312aef6930SMark Murray 	    } else {
3322aef6930SMark Murray 		check_host(cp);
3332aef6930SMark Murray 	    }
3342aef6930SMark Murray 	}
3352aef6930SMark Murray     }
3362aef6930SMark Murray     if (clients == 0)
3372aef6930SMark Murray 	tcpd_warn("client list is empty or ends in EXCEPT");
3382aef6930SMark Murray }
3392aef6930SMark Murray 
3402aef6930SMark Murray /* check_daemon - criticize daemon pattern */
3412aef6930SMark Murray 
check_daemon(char * pat)342*14f102eaSEd Maste static void check_daemon(char *pat)
3432aef6930SMark Murray {
3442aef6930SMark Murray     if (pat[0] == '@') {
3452aef6930SMark Murray 	tcpd_warn("%s: daemon name begins with \"@\"", pat);
34699abb287SSheldon Hearn     } else if (pat[0] == '/') {
34799abb287SSheldon Hearn 	tcpd_warn("%s: daemon name begins with \"/\"", pat);
3482aef6930SMark Murray     } else if (pat[0] == '.') {
3492aef6930SMark Murray 	tcpd_warn("%s: daemon name begins with dot", pat);
3502aef6930SMark Murray     } else if (pat[strlen(pat) - 1] == '.') {
3512aef6930SMark Murray 	tcpd_warn("%s: daemon name ends in dot", pat);
3522aef6930SMark Murray     } else if (STR_EQ(pat, "ALL") || STR_EQ(pat, unknown)) {
3532aef6930SMark Murray 	 /* void */ ;
3542aef6930SMark Murray     } else if (STR_EQ(pat, "FAIL")) {		/* obsolete */
3552aef6930SMark Murray 	tcpd_warn("FAIL is no longer recognized");
3562aef6930SMark Murray 	tcpd_warn("(use EXCEPT or DENY instead)");
3572aef6930SMark Murray     } else if (reserved_name(pat)) {
3582aef6930SMark Murray 	tcpd_warn("%s: daemon name may be reserved word", pat);
3592aef6930SMark Murray     } else {
3602aef6930SMark Murray 	switch (inet_get(pat)) {
3612aef6930SMark Murray 	case WR_UNKNOWN:
3622aef6930SMark Murray 	    tcpd_warn("%s: no such process name in %s", pat, inetcf);
3632aef6930SMark Murray 	    inet_set(pat, WR_YES);		/* shut up next time */
3642aef6930SMark Murray 	    break;
3652aef6930SMark Murray 	case WR_NOT:
3662aef6930SMark Murray 	    tcpd_warn("%s: service possibly not wrapped", pat);
3672aef6930SMark Murray 	    inet_set(pat, WR_YES);
3682aef6930SMark Murray 	    break;
3692aef6930SMark Murray 	}
3702aef6930SMark Murray     }
3712aef6930SMark Murray }
3722aef6930SMark Murray 
3732aef6930SMark Murray /* check_user - criticize user pattern */
3742aef6930SMark Murray 
check_user(char * pat)375*14f102eaSEd Maste static void check_user(char *pat)
3762aef6930SMark Murray {
3772aef6930SMark Murray     if (pat[0] == '@') {			/* @netgroup */
3782aef6930SMark Murray 	tcpd_warn("%s: user name begins with \"@\"", pat);
37999abb287SSheldon Hearn     } else if (pat[0] == '/') {
38099abb287SSheldon Hearn 	tcpd_warn("%s: user name begins with \"/\"", pat);
3812aef6930SMark Murray     } else if (pat[0] == '.') {
3822aef6930SMark Murray 	tcpd_warn("%s: user name begins with dot", pat);
3832aef6930SMark Murray     } else if (pat[strlen(pat) - 1] == '.') {
3842aef6930SMark Murray 	tcpd_warn("%s: user name ends in dot", pat);
3852aef6930SMark Murray     } else if (STR_EQ(pat, "ALL") || STR_EQ(pat, unknown)
3862aef6930SMark Murray 	       || STR_EQ(pat, "KNOWN")) {
3872aef6930SMark Murray 	 /* void */ ;
3882aef6930SMark Murray     } else if (STR_EQ(pat, "FAIL")) {		/* obsolete */
3892aef6930SMark Murray 	tcpd_warn("FAIL is no longer recognized");
3902aef6930SMark Murray 	tcpd_warn("(use EXCEPT or DENY instead)");
3912aef6930SMark Murray     } else if (reserved_name(pat)) {
3922aef6930SMark Murray 	tcpd_warn("%s: user name may be reserved word", pat);
3932aef6930SMark Murray     }
3942aef6930SMark Murray }
3952aef6930SMark Murray 
3968053080cSYoshinobu Inoue #ifdef INET6
is_inet6_addr(char * pat)397*14f102eaSEd Maste static int is_inet6_addr(char *pat)
3988053080cSYoshinobu Inoue {
399b208ff84SHajimu UMEMOTO     struct addrinfo hints, *res;
4008053080cSYoshinobu Inoue     int len, ret;
4018053080cSYoshinobu Inoue     char ch;
4028053080cSYoshinobu Inoue 
4038053080cSYoshinobu Inoue     if (*pat != '[')
4048053080cSYoshinobu Inoue 	return (0);
4058053080cSYoshinobu Inoue     len = strlen(pat);
4068053080cSYoshinobu Inoue     if ((ch = pat[len - 1]) != ']')
4078053080cSYoshinobu Inoue 	return (0);
4088053080cSYoshinobu Inoue     pat[len - 1] = '\0';
409b208ff84SHajimu UMEMOTO     memset(&hints, 0, sizeof(hints));
410b208ff84SHajimu UMEMOTO     hints.ai_family = AF_INET6;
411b208ff84SHajimu UMEMOTO     hints.ai_socktype = SOCK_STREAM;
412b208ff84SHajimu UMEMOTO     hints.ai_flags = AI_PASSIVE | AI_NUMERICHOST;
413b208ff84SHajimu UMEMOTO     if ((ret = getaddrinfo(pat + 1, NULL, &hints, &res)) == 0)
414b208ff84SHajimu UMEMOTO 	freeaddrinfo(res);
4158053080cSYoshinobu Inoue     pat[len - 1] = ch;
416b208ff84SHajimu UMEMOTO     return (ret == 0);
4178053080cSYoshinobu Inoue }
4188053080cSYoshinobu Inoue #endif
4198053080cSYoshinobu Inoue 
4202aef6930SMark Murray /* check_host - criticize host pattern */
4212aef6930SMark Murray 
check_host(char * pat)422*14f102eaSEd Maste static int check_host(char *pat)
4232aef6930SMark Murray {
42499abb287SSheldon Hearn     char    buf[BUFSIZ];
4252aef6930SMark Murray     char   *mask;
4262aef6930SMark Murray     int     addr_count = 1;
42799abb287SSheldon Hearn     FILE   *fp;
42899abb287SSheldon Hearn     struct tcpd_context saved_context;
42999abb287SSheldon Hearn     char   *cp;
43099abb287SSheldon Hearn     char   *wsp = " \t\r\n";
4312aef6930SMark Murray 
4322aef6930SMark Murray     if (pat[0] == '@') {			/* @netgroup */
4332aef6930SMark Murray #ifdef NO_NETGRENT
4342aef6930SMark Murray 	/* SCO has no *netgrent() support */
4352aef6930SMark Murray #else
4362aef6930SMark Murray #ifdef NETGROUP
4372aef6930SMark Murray 	char   *machinep;
4382aef6930SMark Murray 	char   *userp;
4392aef6930SMark Murray 	char   *domainp;
4402aef6930SMark Murray 
4412aef6930SMark Murray 	setnetgrent(pat + 1);
4422aef6930SMark Murray 	if (getnetgrent(&machinep, &userp, &domainp) == 0)
4432aef6930SMark Murray 	    tcpd_warn("%s: unknown or empty netgroup", pat + 1);
4442aef6930SMark Murray 	endnetgrent();
4452aef6930SMark Murray #else
4462aef6930SMark Murray 	tcpd_warn("netgroup support disabled");
4472aef6930SMark Murray #endif
4482aef6930SMark Murray #endif
44999abb287SSheldon Hearn     } else if (pat[0] == '/') {			/* /path/name */
45099abb287SSheldon Hearn 	if ((fp = fopen(pat, "r")) != 0) {
45199abb287SSheldon Hearn 	    saved_context = tcpd_context;
45299abb287SSheldon Hearn 	    tcpd_context.file = pat;
45399abb287SSheldon Hearn 	    tcpd_context.line = 0;
45499abb287SSheldon Hearn 	    while (fgets(buf, sizeof(buf), fp)) {
45599abb287SSheldon Hearn 		tcpd_context.line++;
45699abb287SSheldon Hearn 		for (cp = strtok(buf, wsp); cp; cp = strtok((char *) 0, wsp))
45799abb287SSheldon Hearn 		    check_host(cp);
45899abb287SSheldon Hearn 	    }
45999abb287SSheldon Hearn 	    tcpd_context = saved_context;
46099abb287SSheldon Hearn 	    fclose(fp);
46199abb287SSheldon Hearn 	} else if (errno != ENOENT) {
46299abb287SSheldon Hearn 	    tcpd_warn("open %s: %m", pat);
46399abb287SSheldon Hearn 	}
4642aef6930SMark Murray     } else if (mask = split_at(pat, '/')) {	/* network/netmask */
4658053080cSYoshinobu Inoue #ifdef INET6
4668053080cSYoshinobu Inoue 	int mask_len;
4678053080cSYoshinobu Inoue 
4688053080cSYoshinobu Inoue 	if ((dot_quad_addr(pat) == INADDR_NONE
4698053080cSYoshinobu Inoue 	    || dot_quad_addr(mask) == INADDR_NONE)
4708053080cSYoshinobu Inoue 	    && (!is_inet6_addr(pat)
4718053080cSYoshinobu Inoue 		|| ((mask_len = atoi(mask)) < 0 || mask_len > 128)))
4728053080cSYoshinobu Inoue #else
4732aef6930SMark Murray 	if (dot_quad_addr(pat) == INADDR_NONE
4742aef6930SMark Murray 	    || dot_quad_addr(mask) == INADDR_NONE)
4758053080cSYoshinobu Inoue #endif
4762aef6930SMark Murray 	    tcpd_warn("%s/%s: bad net/mask pattern", pat, mask);
4772aef6930SMark Murray     } else if (STR_EQ(pat, "FAIL")) {		/* obsolete */
4782aef6930SMark Murray 	tcpd_warn("FAIL is no longer recognized");
4792aef6930SMark Murray 	tcpd_warn("(use EXCEPT or DENY instead)");
4802aef6930SMark Murray     } else if (reserved_name(pat)) {		/* other reserved */
4812aef6930SMark Murray 	 /* void */ ;
4828053080cSYoshinobu Inoue #ifdef INET6
4838053080cSYoshinobu Inoue     } else if (is_inet6_addr(pat)) { /* IPv6 address */
4848053080cSYoshinobu Inoue 	addr_count = 1;
4858053080cSYoshinobu Inoue #endif
4862aef6930SMark Murray     } else if (NOT_INADDR(pat)) {		/* internet name */
4872aef6930SMark Murray 	if (pat[strlen(pat) - 1] == '.') {
4882aef6930SMark Murray 	    tcpd_warn("%s: domain or host name ends in dot", pat);
4892aef6930SMark Murray 	} else if (pat[0] != '.') {
4902aef6930SMark Murray 	    addr_count = check_dns(pat);
4912aef6930SMark Murray 	}
4922aef6930SMark Murray     } else {					/* numeric form */
4932aef6930SMark Murray 	if (STR_EQ(pat, "0.0.0.0") || STR_EQ(pat, "255.255.255.255")) {
4942aef6930SMark Murray 	    /* void */ ;
4952aef6930SMark Murray 	} else if (pat[0] == '.') {
4962aef6930SMark Murray 	    tcpd_warn("%s: network number begins with dot", pat);
4972aef6930SMark Murray 	} else if (pat[strlen(pat) - 1] != '.') {
4982aef6930SMark Murray 	    check_dns(pat);
4992aef6930SMark Murray 	}
5002aef6930SMark Murray     }
5012aef6930SMark Murray     return (addr_count);
5022aef6930SMark Murray }
5032aef6930SMark Murray 
5042aef6930SMark Murray /* reserved_name - determine if name is reserved */
5052aef6930SMark Murray 
reserved_name(char * pat)506*14f102eaSEd Maste static int reserved_name(char *pat)
5072aef6930SMark Murray {
5082aef6930SMark Murray     return (STR_EQ(pat, unknown)
5092aef6930SMark Murray 	    || STR_EQ(pat, "KNOWN")
5102aef6930SMark Murray 	    || STR_EQ(pat, paranoid)
5112aef6930SMark Murray 	    || STR_EQ(pat, "ALL")
5122aef6930SMark Murray 	    || STR_EQ(pat, "LOCAL"));
5132aef6930SMark Murray }
514