xref: /freebsd/crypto/openssh/canohost.c (revision 19261079b74319502c6ffa1249920079f0f69a72)
1 /* $OpenBSD: canohost.c,v 1.75 2020/10/18 11:32:01 djm Exp $ */
2 /*
3  * Author: Tatu Ylonen <ylo@cs.hut.fi>
4  * Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland
5  *                    All rights reserved
6  * Functions for returning the canonical host name of the remote site.
7  *
8  * As far as I am concerned, the code I have written for this software
9  * can be used freely for any purpose.  Any derived versions of this
10  * software must be clearly marked as such, and if the derived work is
11  * incompatible with the protocol description in the RFC file, it must be
12  * called by a name other than "ssh" or "Secure Shell".
13  */
14 
15 #include "includes.h"
16 
17 #include <sys/types.h>
18 #include <sys/socket.h>
19 #include <sys/un.h>
20 
21 #include <netinet/in.h>
22 #include <arpa/inet.h>
23 
24 #include <errno.h>
25 #include <netdb.h>
26 #include <stdio.h>
27 #include <stdlib.h>
28 #include <string.h>
29 #include <stdarg.h>
30 #include <unistd.h>
31 
32 #include "xmalloc.h"
33 #include "packet.h"
34 #include "log.h"
35 #include "canohost.h"
36 #include "misc.h"
37 
38 void
39 ipv64_normalise_mapped(struct sockaddr_storage *addr, socklen_t *len)
40 {
41 	struct sockaddr_in6 *a6 = (struct sockaddr_in6 *)addr;
42 	struct sockaddr_in *a4 = (struct sockaddr_in *)addr;
43 	struct in_addr inaddr;
44 	u_int16_t port;
45 
46 	if (addr->ss_family != AF_INET6 ||
47 	    !IN6_IS_ADDR_V4MAPPED(&a6->sin6_addr))
48 		return;
49 
50 	debug3("Normalising mapped IPv4 in IPv6 address");
51 
52 	memcpy(&inaddr, ((char *)&a6->sin6_addr) + 12, sizeof(inaddr));
53 	port = a6->sin6_port;
54 
55 	memset(a4, 0, sizeof(*a4));
56 
57 	a4->sin_family = AF_INET;
58 	*len = sizeof(*a4);
59 	memcpy(&a4->sin_addr, &inaddr, sizeof(inaddr));
60 	a4->sin_port = port;
61 }
62 
63 /*
64  * Returns the local/remote IP-address/hostname of socket as a string.
65  * The returned string must be freed.
66  */
67 static char *
68 get_socket_address(int sock, int remote, int flags)
69 {
70 	struct sockaddr_storage addr;
71 	socklen_t addrlen;
72 	char ntop[NI_MAXHOST];
73 	int r;
74 
75 	/* Get IP address of client. */
76 	addrlen = sizeof(addr);
77 	memset(&addr, 0, sizeof(addr));
78 
79 	if (remote) {
80 		if (getpeername(sock, (struct sockaddr *)&addr, &addrlen) != 0)
81 			return NULL;
82 	} else {
83 		if (getsockname(sock, (struct sockaddr *)&addr, &addrlen) != 0)
84 			return NULL;
85 	}
86 
87 	/* Work around Linux IPv6 weirdness */
88 	if (addr.ss_family == AF_INET6) {
89 		addrlen = sizeof(struct sockaddr_in6);
90 		ipv64_normalise_mapped(&addr, &addrlen);
91 	}
92 
93 	switch (addr.ss_family) {
94 	case AF_INET:
95 	case AF_INET6:
96 		/* Get the address in ascii. */
97 		if ((r = getnameinfo((struct sockaddr *)&addr, addrlen, ntop,
98 		    sizeof(ntop), NULL, 0, flags)) != 0) {
99 			error_f("getnameinfo %d failed: %s",
100 			    flags, ssh_gai_strerror(r));
101 			return NULL;
102 		}
103 		return xstrdup(ntop);
104 	case AF_UNIX:
105 		/* Get the Unix domain socket path. */
106 		return xstrdup(((struct sockaddr_un *)&addr)->sun_path);
107 	default:
108 		/* We can't look up remote Unix domain sockets. */
109 		return NULL;
110 	}
111 }
112 
113 char *
114 get_peer_ipaddr(int sock)
115 {
116 	char *p;
117 
118 	if ((p = get_socket_address(sock, 1, NI_NUMERICHOST)) != NULL)
119 		return p;
120 	return xstrdup("UNKNOWN");
121 }
122 
123 char *
124 get_local_ipaddr(int sock)
125 {
126 	char *p;
127 
128 	if ((p = get_socket_address(sock, 0, NI_NUMERICHOST)) != NULL)
129 		return p;
130 	return xstrdup("UNKNOWN");
131 }
132 
133 char *
134 get_local_name(int fd)
135 {
136 	char *host, myname[NI_MAXHOST];
137 
138 	/* Assume we were passed a socket */
139 	if ((host = get_socket_address(fd, 0, NI_NAMEREQD)) != NULL)
140 		return host;
141 
142 	/* Handle the case where we were passed a pipe */
143 	if (gethostname(myname, sizeof(myname)) == -1) {
144 		verbose_f("gethostname: %s", strerror(errno));
145 		host = xstrdup("UNKNOWN");
146 	} else {
147 		host = xstrdup(myname);
148 	}
149 
150 	return host;
151 }
152 
153 /* Returns the local/remote port for the socket. */
154 
155 static int
156 get_sock_port(int sock, int local)
157 {
158 	struct sockaddr_storage from;
159 	socklen_t fromlen;
160 	char strport[NI_MAXSERV];
161 	int r;
162 
163 	/* Get IP address of client. */
164 	fromlen = sizeof(from);
165 	memset(&from, 0, sizeof(from));
166 	if (local) {
167 		if (getsockname(sock, (struct sockaddr *)&from, &fromlen) == -1) {
168 			error("getsockname failed: %.100s", strerror(errno));
169 			return 0;
170 		}
171 	} else {
172 		if (getpeername(sock, (struct sockaddr *)&from, &fromlen) == -1) {
173 			debug("getpeername failed: %.100s", strerror(errno));
174 			return -1;
175 		}
176 	}
177 
178 	/* Work around Linux IPv6 weirdness */
179 	if (from.ss_family == AF_INET6)
180 		fromlen = sizeof(struct sockaddr_in6);
181 
182 	/* Non-inet sockets don't have a port number. */
183 	if (from.ss_family != AF_INET && from.ss_family != AF_INET6)
184 		return 0;
185 
186 	/* Return port number. */
187 	if ((r = getnameinfo((struct sockaddr *)&from, fromlen, NULL, 0,
188 	    strport, sizeof(strport), NI_NUMERICSERV)) != 0)
189 		fatal_f("getnameinfo NI_NUMERICSERV failed: %s",
190 		    ssh_gai_strerror(r));
191 	return atoi(strport);
192 }
193 
194 int
195 get_peer_port(int sock)
196 {
197 	return get_sock_port(sock, 0);
198 }
199 
200 int
201 get_local_port(int sock)
202 {
203 	return get_sock_port(sock, 1);
204 }
205