1511b41d2SMark Murray /* 2511b41d2SMark Murray * Author: Tatu Ylonen <ylo@cs.hut.fi> 3511b41d2SMark Murray * Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland 4511b41d2SMark Murray * All rights reserved 5511b41d2SMark Murray * Server main loop for handling the interactive session. 6b66f2d16SKris Kennaway * 7b66f2d16SKris Kennaway * As far as I am concerned, the code I have written for this software 8b66f2d16SKris Kennaway * can be used freely for any purpose. Any derived versions of this 9b66f2d16SKris Kennaway * software must be clearly marked as such, and if the derived work is 10b66f2d16SKris Kennaway * incompatible with the protocol description in the RFC file, it must be 11b66f2d16SKris Kennaway * called by a name other than "ssh" or "Secure Shell". 12b66f2d16SKris Kennaway * 13a04a10f8SKris Kennaway * SSH2 support by Markus Friedl. 14af12a3e7SDag-Erling Smørgrav * Copyright (c) 2000, 2001 Markus Friedl. All rights reserved. 15b66f2d16SKris Kennaway * 16b66f2d16SKris Kennaway * Redistribution and use in source and binary forms, with or without 17b66f2d16SKris Kennaway * modification, are permitted provided that the following conditions 18b66f2d16SKris Kennaway * are met: 19b66f2d16SKris Kennaway * 1. Redistributions of source code must retain the above copyright 20b66f2d16SKris Kennaway * notice, this list of conditions and the following disclaimer. 21b66f2d16SKris Kennaway * 2. Redistributions in binary form must reproduce the above copyright 22b66f2d16SKris Kennaway * notice, this list of conditions and the following disclaimer in the 23b66f2d16SKris Kennaway * documentation and/or other materials provided with the distribution. 24b66f2d16SKris Kennaway * 25b66f2d16SKris Kennaway * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR 26b66f2d16SKris Kennaway * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES 27b66f2d16SKris Kennaway * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. 28b66f2d16SKris Kennaway * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, 29b66f2d16SKris Kennaway * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT 30b66f2d16SKris Kennaway * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, 31b66f2d16SKris Kennaway * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY 32b66f2d16SKris Kennaway * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT 33b66f2d16SKris Kennaway * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF 34b66f2d16SKris Kennaway * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. 35a04a10f8SKris Kennaway */ 36511b41d2SMark Murray 37511b41d2SMark Murray #include "includes.h" 3880628bacSDag-Erling Smørgrav RCSID("$OpenBSD: serverloop.c,v 1.102 2002/06/11 05:46:20 mpech Exp $"); 39e0fbb1d2SBrian Feldman RCSID("$FreeBSD$"); 405b9b2fafSBrian Feldman 41511b41d2SMark Murray #include "xmalloc.h" 42511b41d2SMark Murray #include "packet.h" 43511b41d2SMark Murray #include "buffer.h" 44ca3176e7SBrian Feldman #include "log.h" 45511b41d2SMark Murray #include "servconf.h" 46ca3176e7SBrian Feldman #include "sshpty.h" 47a04a10f8SKris Kennaway #include "channels.h" 48a04a10f8SKris Kennaway #include "compat.h" 49ca3176e7SBrian Feldman #include "ssh1.h" 50a04a10f8SKris Kennaway #include "ssh2.h" 51ca3176e7SBrian Feldman #include "auth.h" 52a04a10f8SKris Kennaway #include "session.h" 53a04a10f8SKris Kennaway #include "dispatch.h" 54b66f2d16SKris Kennaway #include "auth-options.h" 55ca3176e7SBrian Feldman #include "serverloop.h" 56ca3176e7SBrian Feldman #include "misc.h" 57ca3176e7SBrian Feldman #include "kex.h" 58511b41d2SMark Murray 595b9b2fafSBrian Feldman extern ServerOptions options; 605b9b2fafSBrian Feldman 61ca3176e7SBrian Feldman /* XXX */ 62ca3176e7SBrian Feldman extern Kex *xxx_kex; 63af12a3e7SDag-Erling Smørgrav static Authctxt *xxx_authctxt; 64ca3176e7SBrian Feldman 65511b41d2SMark Murray static Buffer stdin_buffer; /* Buffer for stdin data. */ 66511b41d2SMark Murray static Buffer stdout_buffer; /* Buffer for stdout data. */ 67511b41d2SMark Murray static Buffer stderr_buffer; /* Buffer for stderr data. */ 68511b41d2SMark Murray static int fdin; /* Descriptor for stdin (for writing) */ 69511b41d2SMark Murray static int fdout; /* Descriptor for stdout (for reading); 70511b41d2SMark Murray May be same number as fdin. */ 71511b41d2SMark Murray static int fderr; /* Descriptor for stderr. May be -1. */ 72511b41d2SMark Murray static long stdin_bytes = 0; /* Number of bytes written to stdin. */ 73511b41d2SMark Murray static long stdout_bytes = 0; /* Number of stdout bytes sent to client. */ 74511b41d2SMark Murray static long stderr_bytes = 0; /* Number of stderr bytes sent to client. */ 75511b41d2SMark Murray static long fdout_bytes = 0; /* Number of stdout bytes read from program. */ 76511b41d2SMark Murray static int stdin_eof = 0; /* EOF message received from client. */ 77511b41d2SMark Murray static int fdout_eof = 0; /* EOF encountered reading from fdout. */ 78511b41d2SMark Murray static int fderr_eof = 0; /* EOF encountered readung from fderr. */ 79e0fbb1d2SBrian Feldman static int fdin_is_tty = 0; /* fdin points to a tty. */ 80511b41d2SMark Murray static int connection_in; /* Connection to client (input). */ 81511b41d2SMark Murray static int connection_out; /* Connection to client (output). */ 82ca3176e7SBrian Feldman static int connection_closed = 0; /* Connection to client closed. */ 83ca3176e7SBrian Feldman static u_int buffer_high; /* "Soft" max buffer size. */ 84af12a3e7SDag-Erling Smørgrav static int client_alive_timeouts = 0; 85511b41d2SMark Murray 86511b41d2SMark Murray /* 87511b41d2SMark Murray * This SIGCHLD kludge is used to detect when the child exits. The server 88511b41d2SMark Murray * will exit after that, as soon as forwarded connections have terminated. 89511b41d2SMark Murray */ 90511b41d2SMark Murray 91af12a3e7SDag-Erling Smørgrav static volatile sig_atomic_t child_terminated = 0; /* The child has terminated. */ 92511b41d2SMark Murray 93af12a3e7SDag-Erling Smørgrav /* prototypes */ 94af12a3e7SDag-Erling Smørgrav static void server_init_dispatch(void); 95a04a10f8SKris Kennaway 96af12a3e7SDag-Erling Smørgrav /* 97af12a3e7SDag-Erling Smørgrav * we write to this pipe if a SIGCHLD is caught in order to avoid 98af12a3e7SDag-Erling Smørgrav * the race between select() and child_terminated 99af12a3e7SDag-Erling Smørgrav */ 100af12a3e7SDag-Erling Smørgrav static int notify_pipe[2]; 101af12a3e7SDag-Erling Smørgrav static void 102af12a3e7SDag-Erling Smørgrav notify_setup(void) 103af12a3e7SDag-Erling Smørgrav { 104af12a3e7SDag-Erling Smørgrav if (pipe(notify_pipe) < 0) { 105af12a3e7SDag-Erling Smørgrav error("pipe(notify_pipe) failed %s", strerror(errno)); 106af12a3e7SDag-Erling Smørgrav } else if ((fcntl(notify_pipe[0], F_SETFD, 1) == -1) || 107af12a3e7SDag-Erling Smørgrav (fcntl(notify_pipe[1], F_SETFD, 1) == -1)) { 108af12a3e7SDag-Erling Smørgrav error("fcntl(notify_pipe, F_SETFD) failed %s", strerror(errno)); 109af12a3e7SDag-Erling Smørgrav close(notify_pipe[0]); 110af12a3e7SDag-Erling Smørgrav close(notify_pipe[1]); 111af12a3e7SDag-Erling Smørgrav } else { 112af12a3e7SDag-Erling Smørgrav set_nonblock(notify_pipe[0]); 113af12a3e7SDag-Erling Smørgrav set_nonblock(notify_pipe[1]); 114af12a3e7SDag-Erling Smørgrav return; 115af12a3e7SDag-Erling Smørgrav } 116af12a3e7SDag-Erling Smørgrav notify_pipe[0] = -1; /* read end */ 117af12a3e7SDag-Erling Smørgrav notify_pipe[1] = -1; /* write end */ 118af12a3e7SDag-Erling Smørgrav } 119af12a3e7SDag-Erling Smørgrav static void 120af12a3e7SDag-Erling Smørgrav notify_parent(void) 121af12a3e7SDag-Erling Smørgrav { 122af12a3e7SDag-Erling Smørgrav if (notify_pipe[1] != -1) 123af12a3e7SDag-Erling Smørgrav write(notify_pipe[1], "", 1); 124af12a3e7SDag-Erling Smørgrav } 125af12a3e7SDag-Erling Smørgrav static void 126af12a3e7SDag-Erling Smørgrav notify_prepare(fd_set *readset) 127af12a3e7SDag-Erling Smørgrav { 128af12a3e7SDag-Erling Smørgrav if (notify_pipe[0] != -1) 129af12a3e7SDag-Erling Smørgrav FD_SET(notify_pipe[0], readset); 130af12a3e7SDag-Erling Smørgrav } 131af12a3e7SDag-Erling Smørgrav static void 132af12a3e7SDag-Erling Smørgrav notify_done(fd_set *readset) 133af12a3e7SDag-Erling Smørgrav { 134af12a3e7SDag-Erling Smørgrav char c; 135ca3176e7SBrian Feldman 136af12a3e7SDag-Erling Smørgrav if (notify_pipe[0] != -1 && FD_ISSET(notify_pipe[0], readset)) 137af12a3e7SDag-Erling Smørgrav while (read(notify_pipe[0], &c, 1) != -1) 138af12a3e7SDag-Erling Smørgrav debug2("notify_done: reading"); 139af12a3e7SDag-Erling Smørgrav } 140af12a3e7SDag-Erling Smørgrav 141af12a3e7SDag-Erling Smørgrav static void 142511b41d2SMark Murray sigchld_handler(int sig) 143511b41d2SMark Murray { 144511b41d2SMark Murray int save_errno = errno; 145511b41d2SMark Murray debug("Received SIGCHLD."); 146511b41d2SMark Murray child_terminated = 1; 147511b41d2SMark Murray signal(SIGCHLD, sigchld_handler); 148af12a3e7SDag-Erling Smørgrav notify_parent(); 149a04a10f8SKris Kennaway errno = save_errno; 150511b41d2SMark Murray } 151511b41d2SMark Murray 152511b41d2SMark Murray /* 153511b41d2SMark Murray * Make packets from buffered stderr data, and buffer it for sending 154511b41d2SMark Murray * to the client. 155511b41d2SMark Murray */ 156af12a3e7SDag-Erling Smørgrav static void 157ca3176e7SBrian Feldman make_packets_from_stderr_data(void) 158511b41d2SMark Murray { 159511b41d2SMark Murray int len; 160511b41d2SMark Murray 161511b41d2SMark Murray /* Send buffered stderr data to the client. */ 162511b41d2SMark Murray while (buffer_len(&stderr_buffer) > 0 && 163511b41d2SMark Murray packet_not_very_much_data_to_write()) { 164511b41d2SMark Murray len = buffer_len(&stderr_buffer); 165511b41d2SMark Murray if (packet_is_interactive()) { 166511b41d2SMark Murray if (len > 512) 167511b41d2SMark Murray len = 512; 168511b41d2SMark Murray } else { 169511b41d2SMark Murray /* Keep the packets at reasonable size. */ 170511b41d2SMark Murray if (len > packet_get_maxsize()) 171511b41d2SMark Murray len = packet_get_maxsize(); 172511b41d2SMark Murray } 173511b41d2SMark Murray packet_start(SSH_SMSG_STDERR_DATA); 174511b41d2SMark Murray packet_put_string(buffer_ptr(&stderr_buffer), len); 175511b41d2SMark Murray packet_send(); 176511b41d2SMark Murray buffer_consume(&stderr_buffer, len); 177511b41d2SMark Murray stderr_bytes += len; 178511b41d2SMark Murray } 179511b41d2SMark Murray } 180511b41d2SMark Murray 181511b41d2SMark Murray /* 182511b41d2SMark Murray * Make packets from buffered stdout data, and buffer it for sending to the 183511b41d2SMark Murray * client. 184511b41d2SMark Murray */ 185af12a3e7SDag-Erling Smørgrav static void 186ca3176e7SBrian Feldman make_packets_from_stdout_data(void) 187511b41d2SMark Murray { 188511b41d2SMark Murray int len; 189511b41d2SMark Murray 190511b41d2SMark Murray /* Send buffered stdout data to the client. */ 191511b41d2SMark Murray while (buffer_len(&stdout_buffer) > 0 && 192511b41d2SMark Murray packet_not_very_much_data_to_write()) { 193511b41d2SMark Murray len = buffer_len(&stdout_buffer); 194511b41d2SMark Murray if (packet_is_interactive()) { 195511b41d2SMark Murray if (len > 512) 196511b41d2SMark Murray len = 512; 197511b41d2SMark Murray } else { 198511b41d2SMark Murray /* Keep the packets at reasonable size. */ 199511b41d2SMark Murray if (len > packet_get_maxsize()) 200511b41d2SMark Murray len = packet_get_maxsize(); 201511b41d2SMark Murray } 202511b41d2SMark Murray packet_start(SSH_SMSG_STDOUT_DATA); 203511b41d2SMark Murray packet_put_string(buffer_ptr(&stdout_buffer), len); 204511b41d2SMark Murray packet_send(); 205511b41d2SMark Murray buffer_consume(&stdout_buffer, len); 206511b41d2SMark Murray stdout_bytes += len; 207511b41d2SMark Murray } 208511b41d2SMark Murray } 209511b41d2SMark Murray 210af12a3e7SDag-Erling Smørgrav static void 211af12a3e7SDag-Erling Smørgrav client_alive_check(void) 212af12a3e7SDag-Erling Smørgrav { 213af12a3e7SDag-Erling Smørgrav static int had_channel = 0; 214af12a3e7SDag-Erling Smørgrav int id; 215af12a3e7SDag-Erling Smørgrav 216af12a3e7SDag-Erling Smørgrav id = channel_find_open(); 217af12a3e7SDag-Erling Smørgrav if (id == -1) { 218af12a3e7SDag-Erling Smørgrav if (!had_channel) 219af12a3e7SDag-Erling Smørgrav return; 220af12a3e7SDag-Erling Smørgrav packet_disconnect("No open channels after timeout!"); 221af12a3e7SDag-Erling Smørgrav } 222af12a3e7SDag-Erling Smørgrav had_channel = 1; 223af12a3e7SDag-Erling Smørgrav 224af12a3e7SDag-Erling Smørgrav /* timeout, check to see how many we have had */ 225af12a3e7SDag-Erling Smørgrav if (++client_alive_timeouts > options.client_alive_count_max) 226af12a3e7SDag-Erling Smørgrav packet_disconnect("Timeout, your session not responding."); 227af12a3e7SDag-Erling Smørgrav 228af12a3e7SDag-Erling Smørgrav /* 229af12a3e7SDag-Erling Smørgrav * send a bogus channel request with "wantreply", 230af12a3e7SDag-Erling Smørgrav * we should get back a failure 231af12a3e7SDag-Erling Smørgrav */ 232af12a3e7SDag-Erling Smørgrav channel_request_start(id, "keepalive@openssh.com", 1); 233af12a3e7SDag-Erling Smørgrav packet_send(); 234af12a3e7SDag-Erling Smørgrav } 235af12a3e7SDag-Erling Smørgrav 236511b41d2SMark Murray /* 237511b41d2SMark Murray * Sleep in select() until we can do something. This will initialize the 238511b41d2SMark Murray * select masks. Upon return, the masks will indicate which descriptors 239511b41d2SMark Murray * have data or can accept data. Optionally, a maximum time can be specified 240511b41d2SMark Murray * for the duration of the wait (0 = infinite). 241511b41d2SMark Murray */ 242af12a3e7SDag-Erling Smørgrav static void 243ca3176e7SBrian Feldman wait_until_can_do_something(fd_set **readsetp, fd_set **writesetp, int *maxfdp, 244af12a3e7SDag-Erling Smørgrav int *nallocp, u_int max_time_milliseconds) 245511b41d2SMark Murray { 246511b41d2SMark Murray struct timeval tv, *tvp; 247511b41d2SMark Murray int ret; 248ca3176e7SBrian Feldman int client_alive_scheduled = 0; 249ca3176e7SBrian Feldman 250ca3176e7SBrian Feldman /* 251ca3176e7SBrian Feldman * if using client_alive, set the max timeout accordingly, 252ca3176e7SBrian Feldman * and indicate that this particular timeout was for client 253ca3176e7SBrian Feldman * alive by setting the client_alive_scheduled flag. 254ca3176e7SBrian Feldman * 255ca3176e7SBrian Feldman * this could be randomized somewhat to make traffic 256ca3176e7SBrian Feldman * analysis more difficult, but we're not doing it yet. 257ca3176e7SBrian Feldman */ 258af12a3e7SDag-Erling Smørgrav if (compat20 && 259af12a3e7SDag-Erling Smørgrav max_time_milliseconds == 0 && options.client_alive_interval) { 260ca3176e7SBrian Feldman client_alive_scheduled = 1; 261ca3176e7SBrian Feldman max_time_milliseconds = options.client_alive_interval * 1000; 262af12a3e7SDag-Erling Smørgrav } 263511b41d2SMark Murray 264ca3176e7SBrian Feldman /* Allocate and update select() masks for channel descriptors. */ 265af12a3e7SDag-Erling Smørgrav channel_prepare_select(readsetp, writesetp, maxfdp, nallocp, 0); 266511b41d2SMark Murray 267a04a10f8SKris Kennaway if (compat20) { 268af12a3e7SDag-Erling Smørgrav #if 0 269a04a10f8SKris Kennaway /* wrong: bad condition XXX */ 270a04a10f8SKris Kennaway if (channel_not_very_much_buffered_data()) 271af12a3e7SDag-Erling Smørgrav #endif 272ca3176e7SBrian Feldman FD_SET(connection_in, *readsetp); 273a04a10f8SKris Kennaway } else { 2742632b0c8SKris Kennaway /* 2752632b0c8SKris Kennaway * Read packets from the client unless we have too much 2762632b0c8SKris Kennaway * buffered stdin or channel data. 2772632b0c8SKris Kennaway */ 2782632b0c8SKris Kennaway if (buffer_len(&stdin_buffer) < buffer_high && 279511b41d2SMark Murray channel_not_very_much_buffered_data()) 280ca3176e7SBrian Feldman FD_SET(connection_in, *readsetp); 281511b41d2SMark Murray /* 2822632b0c8SKris Kennaway * If there is not too much data already buffered going to 2832632b0c8SKris Kennaway * the client, try to get some more data from the program. 284511b41d2SMark Murray */ 2852632b0c8SKris Kennaway if (packet_not_very_much_data_to_write()) { 286511b41d2SMark Murray if (!fdout_eof) 287ca3176e7SBrian Feldman FD_SET(fdout, *readsetp); 288511b41d2SMark Murray if (!fderr_eof) 289ca3176e7SBrian Feldman FD_SET(fderr, *readsetp); 290511b41d2SMark Murray } 2912632b0c8SKris Kennaway /* 2922632b0c8SKris Kennaway * If we have buffered data, try to write some of that data 2932632b0c8SKris Kennaway * to the program. 2942632b0c8SKris Kennaway */ 2952632b0c8SKris Kennaway if (fdin != -1 && buffer_len(&stdin_buffer) > 0) 296ca3176e7SBrian Feldman FD_SET(fdin, *writesetp); 2972632b0c8SKris Kennaway } 298af12a3e7SDag-Erling Smørgrav notify_prepare(*readsetp); 299511b41d2SMark Murray 300511b41d2SMark Murray /* 301511b41d2SMark Murray * If we have buffered packet data going to the client, mark that 302511b41d2SMark Murray * descriptor. 303511b41d2SMark Murray */ 304511b41d2SMark Murray if (packet_have_data_to_write()) 305ca3176e7SBrian Feldman FD_SET(connection_out, *writesetp); 306511b41d2SMark Murray 307511b41d2SMark Murray /* 308511b41d2SMark Murray * If child has terminated and there is enough buffer space to read 309511b41d2SMark Murray * from it, then read as much as is available and exit. 310511b41d2SMark Murray */ 311511b41d2SMark Murray if (child_terminated && packet_not_very_much_data_to_write()) 312ca3176e7SBrian Feldman if (max_time_milliseconds == 0 || client_alive_scheduled) 313511b41d2SMark Murray max_time_milliseconds = 100; 314511b41d2SMark Murray 315511b41d2SMark Murray if (max_time_milliseconds == 0) 316511b41d2SMark Murray tvp = NULL; 317511b41d2SMark Murray else { 318511b41d2SMark Murray tv.tv_sec = max_time_milliseconds / 1000; 319511b41d2SMark Murray tv.tv_usec = 1000 * (max_time_milliseconds % 1000); 320511b41d2SMark Murray tvp = &tv; 321511b41d2SMark Murray } 322511b41d2SMark Murray 323511b41d2SMark Murray /* Wait for something to happen, or the timeout to expire. */ 324ca3176e7SBrian Feldman ret = select((*maxfdp)+1, *readsetp, *writesetp, NULL, tvp); 325511b41d2SMark Murray 326ca3176e7SBrian Feldman if (ret == -1) { 327af12a3e7SDag-Erling Smørgrav memset(*readsetp, 0, *nallocp); 328af12a3e7SDag-Erling Smørgrav memset(*writesetp, 0, *nallocp); 329511b41d2SMark Murray if (errno != EINTR) 330511b41d2SMark Murray error("select: %.100s", strerror(errno)); 331af12a3e7SDag-Erling Smørgrav } else if (ret == 0 && client_alive_scheduled) 332af12a3e7SDag-Erling Smørgrav client_alive_check(); 333ca3176e7SBrian Feldman 334af12a3e7SDag-Erling Smørgrav notify_done(*readsetp); 335511b41d2SMark Murray } 336511b41d2SMark Murray 337511b41d2SMark Murray /* 338511b41d2SMark Murray * Processes input from the client and the program. Input data is stored 339511b41d2SMark Murray * in buffers and processed later. 340511b41d2SMark Murray */ 341af12a3e7SDag-Erling Smørgrav static void 342511b41d2SMark Murray process_input(fd_set * readset) 343511b41d2SMark Murray { 344511b41d2SMark Murray int len; 345511b41d2SMark Murray char buf[16384]; 346511b41d2SMark Murray 347511b41d2SMark Murray /* Read and buffer any input data from the client. */ 348511b41d2SMark Murray if (FD_ISSET(connection_in, readset)) { 349511b41d2SMark Murray len = read(connection_in, buf, sizeof(buf)); 350511b41d2SMark Murray if (len == 0) { 351511b41d2SMark Murray verbose("Connection closed by remote host."); 352ca3176e7SBrian Feldman connection_closed = 1; 353ca3176e7SBrian Feldman if (compat20) 354ca3176e7SBrian Feldman return; 355511b41d2SMark Murray fatal_cleanup(); 3562632b0c8SKris Kennaway } else if (len < 0) { 3572632b0c8SKris Kennaway if (errno != EINTR && errno != EAGAIN) { 358511b41d2SMark Murray verbose("Read error from remote host: %.100s", strerror(errno)); 359511b41d2SMark Murray fatal_cleanup(); 360511b41d2SMark Murray } 3612632b0c8SKris Kennaway } else { 362511b41d2SMark Murray /* Buffer any received data. */ 363511b41d2SMark Murray packet_process_incoming(buf, len); 364511b41d2SMark Murray } 3652632b0c8SKris Kennaway } 366a04a10f8SKris Kennaway if (compat20) 367a04a10f8SKris Kennaway return; 368a04a10f8SKris Kennaway 369511b41d2SMark Murray /* Read and buffer any available stdout data from the program. */ 370511b41d2SMark Murray if (!fdout_eof && FD_ISSET(fdout, readset)) { 371511b41d2SMark Murray len = read(fdout, buf, sizeof(buf)); 3722632b0c8SKris Kennaway if (len < 0 && (errno == EINTR || errno == EAGAIN)) { 3732632b0c8SKris Kennaway /* do nothing */ 3742632b0c8SKris Kennaway } else if (len <= 0) { 375511b41d2SMark Murray fdout_eof = 1; 3762632b0c8SKris Kennaway } else { 377511b41d2SMark Murray buffer_append(&stdout_buffer, buf, len); 378511b41d2SMark Murray fdout_bytes += len; 379511b41d2SMark Murray } 380511b41d2SMark Murray } 381511b41d2SMark Murray /* Read and buffer any available stderr data from the program. */ 382511b41d2SMark Murray if (!fderr_eof && FD_ISSET(fderr, readset)) { 383511b41d2SMark Murray len = read(fderr, buf, sizeof(buf)); 3842632b0c8SKris Kennaway if (len < 0 && (errno == EINTR || errno == EAGAIN)) { 3852632b0c8SKris Kennaway /* do nothing */ 3862632b0c8SKris Kennaway } else if (len <= 0) { 387511b41d2SMark Murray fderr_eof = 1; 3882632b0c8SKris Kennaway } else { 389511b41d2SMark Murray buffer_append(&stderr_buffer, buf, len); 390511b41d2SMark Murray } 391511b41d2SMark Murray } 3922632b0c8SKris Kennaway } 393511b41d2SMark Murray 394511b41d2SMark Murray /* 395511b41d2SMark Murray * Sends data from internal buffers to client program stdin. 396511b41d2SMark Murray */ 397af12a3e7SDag-Erling Smørgrav static void 398511b41d2SMark Murray process_output(fd_set * writeset) 399511b41d2SMark Murray { 400e0fbb1d2SBrian Feldman struct termios tio; 401af12a3e7SDag-Erling Smørgrav u_char *data; 402af12a3e7SDag-Erling Smørgrav u_int dlen; 403511b41d2SMark Murray int len; 404511b41d2SMark Murray 405511b41d2SMark Murray /* Write buffered data to program stdin. */ 406a04a10f8SKris Kennaway if (!compat20 && fdin != -1 && FD_ISSET(fdin, writeset)) { 407af12a3e7SDag-Erling Smørgrav data = buffer_ptr(&stdin_buffer); 408af12a3e7SDag-Erling Smørgrav dlen = buffer_len(&stdin_buffer); 409af12a3e7SDag-Erling Smørgrav len = write(fdin, data, dlen); 4102632b0c8SKris Kennaway if (len < 0 && (errno == EINTR || errno == EAGAIN)) { 4112632b0c8SKris Kennaway /* do nothing */ 4122632b0c8SKris Kennaway } else if (len <= 0) { 413a04a10f8SKris Kennaway if (fdin != fdout) 414511b41d2SMark Murray close(fdin); 415511b41d2SMark Murray else 416511b41d2SMark Murray shutdown(fdin, SHUT_WR); /* We will no longer send. */ 417511b41d2SMark Murray fdin = -1; 418511b41d2SMark Murray } else { 419e0fbb1d2SBrian Feldman /* Successful write. */ 420af12a3e7SDag-Erling Smørgrav if (fdin_is_tty && dlen >= 1 && data[0] != '\r' && 421af12a3e7SDag-Erling Smørgrav tcgetattr(fdin, &tio) == 0 && 422e0fbb1d2SBrian Feldman !(tio.c_lflag & ECHO) && (tio.c_lflag & ICANON)) { 423e0fbb1d2SBrian Feldman /* 424e0fbb1d2SBrian Feldman * Simulate echo to reduce the impact of 425e0fbb1d2SBrian Feldman * traffic analysis 426e0fbb1d2SBrian Feldman */ 427ca3176e7SBrian Feldman packet_send_ignore(len); 428e0fbb1d2SBrian Feldman packet_send(); 429e0fbb1d2SBrian Feldman } 430e0fbb1d2SBrian Feldman /* Consume the data from the buffer. */ 431511b41d2SMark Murray buffer_consume(&stdin_buffer, len); 432511b41d2SMark Murray /* Update the count of bytes written to the program. */ 433511b41d2SMark Murray stdin_bytes += len; 434511b41d2SMark Murray } 435511b41d2SMark Murray } 436511b41d2SMark Murray /* Send any buffered packet data to the client. */ 437511b41d2SMark Murray if (FD_ISSET(connection_out, writeset)) 438511b41d2SMark Murray packet_write_poll(); 439511b41d2SMark Murray } 440511b41d2SMark Murray 441511b41d2SMark Murray /* 442511b41d2SMark Murray * Wait until all buffered output has been sent to the client. 443511b41d2SMark Murray * This is used when the program terminates. 444511b41d2SMark Murray */ 445af12a3e7SDag-Erling Smørgrav static void 446ca3176e7SBrian Feldman drain_output(void) 447511b41d2SMark Murray { 448511b41d2SMark Murray /* Send any buffered stdout data to the client. */ 449511b41d2SMark Murray if (buffer_len(&stdout_buffer) > 0) { 450511b41d2SMark Murray packet_start(SSH_SMSG_STDOUT_DATA); 451511b41d2SMark Murray packet_put_string(buffer_ptr(&stdout_buffer), 452511b41d2SMark Murray buffer_len(&stdout_buffer)); 453511b41d2SMark Murray packet_send(); 454511b41d2SMark Murray /* Update the count of sent bytes. */ 455511b41d2SMark Murray stdout_bytes += buffer_len(&stdout_buffer); 456511b41d2SMark Murray } 457511b41d2SMark Murray /* Send any buffered stderr data to the client. */ 458511b41d2SMark Murray if (buffer_len(&stderr_buffer) > 0) { 459511b41d2SMark Murray packet_start(SSH_SMSG_STDERR_DATA); 460511b41d2SMark Murray packet_put_string(buffer_ptr(&stderr_buffer), 461511b41d2SMark Murray buffer_len(&stderr_buffer)); 462511b41d2SMark Murray packet_send(); 463511b41d2SMark Murray /* Update the count of sent bytes. */ 464511b41d2SMark Murray stderr_bytes += buffer_len(&stderr_buffer); 465511b41d2SMark Murray } 466511b41d2SMark Murray /* Wait until all buffered data has been written to the client. */ 467511b41d2SMark Murray packet_write_wait(); 468511b41d2SMark Murray } 469511b41d2SMark Murray 470af12a3e7SDag-Erling Smørgrav static void 471ca3176e7SBrian Feldman process_buffered_input_packets(void) 472a04a10f8SKris Kennaway { 473ca3176e7SBrian Feldman dispatch_run(DISPATCH_NONBLOCK, NULL, compat20 ? xxx_kex : NULL); 474a04a10f8SKris Kennaway } 475a04a10f8SKris Kennaway 476511b41d2SMark Murray /* 477511b41d2SMark Murray * Performs the interactive session. This handles data transmission between 478511b41d2SMark Murray * the client and the program. Note that the notion of stdin, stdout, and 479511b41d2SMark Murray * stderr in this function is sort of reversed: this function writes to 480511b41d2SMark Murray * stdin (of the child program), and reads from stdout and stderr (of the 481511b41d2SMark Murray * child program). 482511b41d2SMark Murray */ 483511b41d2SMark Murray void 484a04a10f8SKris Kennaway server_loop(pid_t pid, int fdin_arg, int fdout_arg, int fderr_arg) 485511b41d2SMark Murray { 486ca3176e7SBrian Feldman fd_set *readset = NULL, *writeset = NULL; 487af12a3e7SDag-Erling Smørgrav int max_fd = 0, nalloc = 0; 488a04a10f8SKris Kennaway int wait_status; /* Status returned by wait(). */ 489a04a10f8SKris Kennaway pid_t wait_pid; /* pid returned by wait(). */ 490511b41d2SMark Murray int waiting_termination = 0; /* Have displayed waiting close message. */ 491ca3176e7SBrian Feldman u_int max_time_milliseconds; 492ca3176e7SBrian Feldman u_int previous_stdout_buffer_bytes; 493ca3176e7SBrian Feldman u_int stdout_buffer_bytes; 494511b41d2SMark Murray int type; 495511b41d2SMark Murray 496511b41d2SMark Murray debug("Entering interactive session."); 497511b41d2SMark Murray 498511b41d2SMark Murray /* Initialize the SIGCHLD kludge. */ 499511b41d2SMark Murray child_terminated = 0; 500511b41d2SMark Murray signal(SIGCHLD, sigchld_handler); 501511b41d2SMark Murray 502511b41d2SMark Murray /* Initialize our global variables. */ 503511b41d2SMark Murray fdin = fdin_arg; 504511b41d2SMark Murray fdout = fdout_arg; 505511b41d2SMark Murray fderr = fderr_arg; 5062632b0c8SKris Kennaway 5072632b0c8SKris Kennaway /* nonblocking IO */ 5082632b0c8SKris Kennaway set_nonblock(fdin); 5092632b0c8SKris Kennaway set_nonblock(fdout); 5102632b0c8SKris Kennaway /* we don't have stderr for interactive terminal sessions, see below */ 5112632b0c8SKris Kennaway if (fderr != -1) 5122632b0c8SKris Kennaway set_nonblock(fderr); 5132632b0c8SKris Kennaway 514e0fbb1d2SBrian Feldman if (!(datafellows & SSH_BUG_IGNOREMSG) && isatty(fdin)) 515e0fbb1d2SBrian Feldman fdin_is_tty = 1; 516e0fbb1d2SBrian Feldman 517511b41d2SMark Murray connection_in = packet_get_connection_in(); 518511b41d2SMark Murray connection_out = packet_get_connection_out(); 519511b41d2SMark Murray 520af12a3e7SDag-Erling Smørgrav notify_setup(); 521af12a3e7SDag-Erling Smørgrav 522511b41d2SMark Murray previous_stdout_buffer_bytes = 0; 523511b41d2SMark Murray 524511b41d2SMark Murray /* Set approximate I/O buffer size. */ 525511b41d2SMark Murray if (packet_is_interactive()) 526511b41d2SMark Murray buffer_high = 4096; 527511b41d2SMark Murray else 528511b41d2SMark Murray buffer_high = 64 * 1024; 529511b41d2SMark Murray 530af12a3e7SDag-Erling Smørgrav #if 0 531511b41d2SMark Murray /* Initialize max_fd to the maximum of the known file descriptors. */ 532af12a3e7SDag-Erling Smørgrav max_fd = MAX(connection_in, connection_out); 533af12a3e7SDag-Erling Smørgrav max_fd = MAX(max_fd, fdin); 534af12a3e7SDag-Erling Smørgrav max_fd = MAX(max_fd, fdout); 535ca3176e7SBrian Feldman if (fderr != -1) 536ca3176e7SBrian Feldman max_fd = MAX(max_fd, fderr); 537af12a3e7SDag-Erling Smørgrav #endif 538511b41d2SMark Murray 539511b41d2SMark Murray /* Initialize Initialize buffers. */ 540511b41d2SMark Murray buffer_init(&stdin_buffer); 541511b41d2SMark Murray buffer_init(&stdout_buffer); 542511b41d2SMark Murray buffer_init(&stderr_buffer); 543511b41d2SMark Murray 544511b41d2SMark Murray /* 545511b41d2SMark Murray * If we have no separate fderr (which is the case when we have a pty 546511b41d2SMark Murray * - there we cannot make difference between data sent to stdout and 547511b41d2SMark Murray * stderr), indicate that we have seen an EOF from stderr. This way 548511b41d2SMark Murray * we don\'t need to check the descriptor everywhere. 549511b41d2SMark Murray */ 550511b41d2SMark Murray if (fderr == -1) 551511b41d2SMark Murray fderr_eof = 1; 552511b41d2SMark Murray 553a04a10f8SKris Kennaway server_init_dispatch(); 554a04a10f8SKris Kennaway 555511b41d2SMark Murray /* Main loop of the server for the interactive session mode. */ 556511b41d2SMark Murray for (;;) { 557511b41d2SMark Murray 558511b41d2SMark Murray /* Process buffered packets from the client. */ 559511b41d2SMark Murray process_buffered_input_packets(); 560511b41d2SMark Murray 561511b41d2SMark Murray /* 562511b41d2SMark Murray * If we have received eof, and there is no more pending 563511b41d2SMark Murray * input data, cause a real eof by closing fdin. 564511b41d2SMark Murray */ 565511b41d2SMark Murray if (stdin_eof && fdin != -1 && buffer_len(&stdin_buffer) == 0) { 566a04a10f8SKris Kennaway if (fdin != fdout) 567511b41d2SMark Murray close(fdin); 568511b41d2SMark Murray else 569511b41d2SMark Murray shutdown(fdin, SHUT_WR); /* We will no longer send. */ 570511b41d2SMark Murray fdin = -1; 571511b41d2SMark Murray } 572511b41d2SMark Murray /* Make packets from buffered stderr data to send to the client. */ 573511b41d2SMark Murray make_packets_from_stderr_data(); 574511b41d2SMark Murray 575511b41d2SMark Murray /* 576511b41d2SMark Murray * Make packets from buffered stdout data to send to the 577511b41d2SMark Murray * client. If there is very little to send, this arranges to 578511b41d2SMark Murray * not send them now, but to wait a short while to see if we 579511b41d2SMark Murray * are getting more data. This is necessary, as some systems 580511b41d2SMark Murray * wake up readers from a pty after each separate character. 581511b41d2SMark Murray */ 582511b41d2SMark Murray max_time_milliseconds = 0; 583511b41d2SMark Murray stdout_buffer_bytes = buffer_len(&stdout_buffer); 584511b41d2SMark Murray if (stdout_buffer_bytes != 0 && stdout_buffer_bytes < 256 && 585511b41d2SMark Murray stdout_buffer_bytes != previous_stdout_buffer_bytes) { 586511b41d2SMark Murray /* try again after a while */ 587511b41d2SMark Murray max_time_milliseconds = 10; 588511b41d2SMark Murray } else { 589511b41d2SMark Murray /* Send it now. */ 590511b41d2SMark Murray make_packets_from_stdout_data(); 591511b41d2SMark Murray } 592511b41d2SMark Murray previous_stdout_buffer_bytes = buffer_len(&stdout_buffer); 593511b41d2SMark Murray 594511b41d2SMark Murray /* Send channel data to the client. */ 595511b41d2SMark Murray if (packet_not_very_much_data_to_write()) 596511b41d2SMark Murray channel_output_poll(); 597511b41d2SMark Murray 598511b41d2SMark Murray /* 599511b41d2SMark Murray * Bail out of the loop if the program has closed its output 600511b41d2SMark Murray * descriptors, and we have no more data to send to the 601511b41d2SMark Murray * client, and there is no pending buffered data. 602511b41d2SMark Murray */ 603511b41d2SMark Murray if (fdout_eof && fderr_eof && !packet_have_data_to_write() && 604511b41d2SMark Murray buffer_len(&stdout_buffer) == 0 && buffer_len(&stderr_buffer) == 0) { 605511b41d2SMark Murray if (!channel_still_open()) 606a04a10f8SKris Kennaway break; 607511b41d2SMark Murray if (!waiting_termination) { 608511b41d2SMark Murray const char *s = "Waiting for forwarded connections to terminate...\r\n"; 609511b41d2SMark Murray char *cp; 610511b41d2SMark Murray waiting_termination = 1; 611511b41d2SMark Murray buffer_append(&stderr_buffer, s, strlen(s)); 612511b41d2SMark Murray 613511b41d2SMark Murray /* Display list of open channels. */ 614511b41d2SMark Murray cp = channel_open_message(); 615511b41d2SMark Murray buffer_append(&stderr_buffer, cp, strlen(cp)); 616511b41d2SMark Murray xfree(cp); 617511b41d2SMark Murray } 618511b41d2SMark Murray } 619af12a3e7SDag-Erling Smørgrav max_fd = MAX(connection_in, connection_out); 620af12a3e7SDag-Erling Smørgrav max_fd = MAX(max_fd, fdin); 621af12a3e7SDag-Erling Smørgrav max_fd = MAX(max_fd, fdout); 622af12a3e7SDag-Erling Smørgrav max_fd = MAX(max_fd, fderr); 623af12a3e7SDag-Erling Smørgrav max_fd = MAX(max_fd, notify_pipe[0]); 624af12a3e7SDag-Erling Smørgrav 625511b41d2SMark Murray /* Sleep in select() until we can do something. */ 626ca3176e7SBrian Feldman wait_until_can_do_something(&readset, &writeset, &max_fd, 627af12a3e7SDag-Erling Smørgrav &nalloc, max_time_milliseconds); 628511b41d2SMark Murray 629511b41d2SMark Murray /* Process any channel events. */ 630ca3176e7SBrian Feldman channel_after_select(readset, writeset); 631511b41d2SMark Murray 632511b41d2SMark Murray /* Process input from the client and from program stdout/stderr. */ 633ca3176e7SBrian Feldman process_input(readset); 634511b41d2SMark Murray 635511b41d2SMark Murray /* Process output to the client and to program stdin. */ 636ca3176e7SBrian Feldman process_output(writeset); 637511b41d2SMark Murray } 638ca3176e7SBrian Feldman if (readset) 639ca3176e7SBrian Feldman xfree(readset); 640ca3176e7SBrian Feldman if (writeset) 641ca3176e7SBrian Feldman xfree(writeset); 642511b41d2SMark Murray 643511b41d2SMark Murray /* Cleanup and termination code. */ 644511b41d2SMark Murray 645511b41d2SMark Murray /* Wait until all output has been sent to the client. */ 646511b41d2SMark Murray drain_output(); 647511b41d2SMark Murray 648511b41d2SMark Murray debug("End of interactive session; stdin %ld, stdout (read %ld, sent %ld), stderr %ld bytes.", 649511b41d2SMark Murray stdin_bytes, fdout_bytes, stdout_bytes, stderr_bytes); 650511b41d2SMark Murray 651511b41d2SMark Murray /* Free and clear the buffers. */ 652511b41d2SMark Murray buffer_free(&stdin_buffer); 653511b41d2SMark Murray buffer_free(&stdout_buffer); 654511b41d2SMark Murray buffer_free(&stderr_buffer); 655511b41d2SMark Murray 656511b41d2SMark Murray /* Close the file descriptors. */ 657511b41d2SMark Murray if (fdout != -1) 658511b41d2SMark Murray close(fdout); 659511b41d2SMark Murray fdout = -1; 660511b41d2SMark Murray fdout_eof = 1; 661511b41d2SMark Murray if (fderr != -1) 662511b41d2SMark Murray close(fderr); 663511b41d2SMark Murray fderr = -1; 664511b41d2SMark Murray fderr_eof = 1; 665511b41d2SMark Murray if (fdin != -1) 666511b41d2SMark Murray close(fdin); 667511b41d2SMark Murray fdin = -1; 668511b41d2SMark Murray 669af12a3e7SDag-Erling Smørgrav channel_free_all(); 670511b41d2SMark Murray 671511b41d2SMark Murray /* We no longer want our SIGCHLD handler to be called. */ 672511b41d2SMark Murray signal(SIGCHLD, SIG_DFL); 673511b41d2SMark Murray 67480628bacSDag-Erling Smørgrav while ((wait_pid = waitpid(-1, &wait_status, 0)) < 0) 67580628bacSDag-Erling Smørgrav if (errno != EINTR) 676af12a3e7SDag-Erling Smørgrav packet_disconnect("wait: %.100s", strerror(errno)); 67780628bacSDag-Erling Smørgrav if (wait_pid != pid) 67880628bacSDag-Erling Smørgrav error("Strange, wait returned pid %ld, expected %ld", 67980628bacSDag-Erling Smørgrav (long)wait_pid, (long)pid); 680af12a3e7SDag-Erling Smørgrav 681511b41d2SMark Murray /* Check if it exited normally. */ 682511b41d2SMark Murray if (WIFEXITED(wait_status)) { 683511b41d2SMark Murray /* Yes, normal exit. Get exit status and send it to the client. */ 684511b41d2SMark Murray debug("Command exited with status %d.", WEXITSTATUS(wait_status)); 685511b41d2SMark Murray packet_start(SSH_SMSG_EXITSTATUS); 686511b41d2SMark Murray packet_put_int(WEXITSTATUS(wait_status)); 687511b41d2SMark Murray packet_send(); 688511b41d2SMark Murray packet_write_wait(); 689511b41d2SMark Murray 690511b41d2SMark Murray /* 691511b41d2SMark Murray * Wait for exit confirmation. Note that there might be 692511b41d2SMark Murray * other packets coming before it; however, the program has 693511b41d2SMark Murray * already died so we just ignore them. The client is 694511b41d2SMark Murray * supposed to respond with the confirmation when it receives 695511b41d2SMark Murray * the exit status. 696511b41d2SMark Murray */ 697511b41d2SMark Murray do { 698af12a3e7SDag-Erling Smørgrav type = packet_read(); 699511b41d2SMark Murray } 700511b41d2SMark Murray while (type != SSH_CMSG_EXIT_CONFIRMATION); 701511b41d2SMark Murray 702511b41d2SMark Murray debug("Received exit confirmation."); 703511b41d2SMark Murray return; 704511b41d2SMark Murray } 705511b41d2SMark Murray /* Check if the program terminated due to a signal. */ 706511b41d2SMark Murray if (WIFSIGNALED(wait_status)) 707511b41d2SMark Murray packet_disconnect("Command terminated on signal %d.", 708511b41d2SMark Murray WTERMSIG(wait_status)); 709511b41d2SMark Murray 710511b41d2SMark Murray /* Some weird exit cause. Just exit. */ 711511b41d2SMark Murray packet_disconnect("wait returned status %04x.", wait_status); 712511b41d2SMark Murray /* NOTREACHED */ 713511b41d2SMark Murray } 714a04a10f8SKris Kennaway 715af12a3e7SDag-Erling Smørgrav static void 716af12a3e7SDag-Erling Smørgrav collect_children(void) 717af12a3e7SDag-Erling Smørgrav { 718af12a3e7SDag-Erling Smørgrav pid_t pid; 719af12a3e7SDag-Erling Smørgrav sigset_t oset, nset; 720af12a3e7SDag-Erling Smørgrav int status; 721af12a3e7SDag-Erling Smørgrav 722af12a3e7SDag-Erling Smørgrav /* block SIGCHLD while we check for dead children */ 723af12a3e7SDag-Erling Smørgrav sigemptyset(&nset); 724af12a3e7SDag-Erling Smørgrav sigaddset(&nset, SIGCHLD); 725af12a3e7SDag-Erling Smørgrav sigprocmask(SIG_BLOCK, &nset, &oset); 726af12a3e7SDag-Erling Smørgrav if (child_terminated) { 72780628bacSDag-Erling Smørgrav while ((pid = waitpid(-1, &status, WNOHANG)) > 0 || 72880628bacSDag-Erling Smørgrav (pid < 0 && errno == EINTR)) 72980628bacSDag-Erling Smørgrav if (pid > 0) 730af12a3e7SDag-Erling Smørgrav session_close_by_pid(pid, status); 731af12a3e7SDag-Erling Smørgrav child_terminated = 0; 732af12a3e7SDag-Erling Smørgrav } 733af12a3e7SDag-Erling Smørgrav sigprocmask(SIG_SETMASK, &oset, NULL); 734af12a3e7SDag-Erling Smørgrav } 735af12a3e7SDag-Erling Smørgrav 736a04a10f8SKris Kennaway void 737af12a3e7SDag-Erling Smørgrav server_loop2(Authctxt *authctxt) 738a04a10f8SKris Kennaway { 739ca3176e7SBrian Feldman fd_set *readset = NULL, *writeset = NULL; 740af12a3e7SDag-Erling Smørgrav int rekeying = 0, max_fd, nalloc = 0; 741a04a10f8SKris Kennaway 742a04a10f8SKris Kennaway debug("Entering interactive session for SSH2."); 743a04a10f8SKris Kennaway 744af12a3e7SDag-Erling Smørgrav signal(SIGCHLD, sigchld_handler); 745a04a10f8SKris Kennaway child_terminated = 0; 746a04a10f8SKris Kennaway connection_in = packet_get_connection_in(); 747a04a10f8SKris Kennaway connection_out = packet_get_connection_out(); 748ca3176e7SBrian Feldman 749af12a3e7SDag-Erling Smørgrav notify_setup(); 750af12a3e7SDag-Erling Smørgrav 751ca3176e7SBrian Feldman max_fd = MAX(connection_in, connection_out); 752af12a3e7SDag-Erling Smørgrav max_fd = MAX(max_fd, notify_pipe[0]); 753af12a3e7SDag-Erling Smørgrav 754af12a3e7SDag-Erling Smørgrav xxx_authctxt = authctxt; 755ca3176e7SBrian Feldman 756a04a10f8SKris Kennaway server_init_dispatch(); 757a04a10f8SKris Kennaway 758a04a10f8SKris Kennaway for (;;) { 759a04a10f8SKris Kennaway process_buffered_input_packets(); 760ca3176e7SBrian Feldman 761ca3176e7SBrian Feldman rekeying = (xxx_kex != NULL && !xxx_kex->done); 762ca3176e7SBrian Feldman 763ca3176e7SBrian Feldman if (!rekeying && packet_not_very_much_data_to_write()) 764a04a10f8SKris Kennaway channel_output_poll(); 765ca3176e7SBrian Feldman wait_until_can_do_something(&readset, &writeset, &max_fd, 766af12a3e7SDag-Erling Smørgrav &nalloc, 0); 767af12a3e7SDag-Erling Smørgrav 768af12a3e7SDag-Erling Smørgrav collect_children(); 769ca3176e7SBrian Feldman if (!rekeying) 770ca3176e7SBrian Feldman channel_after_select(readset, writeset); 771ca3176e7SBrian Feldman process_input(readset); 772ca3176e7SBrian Feldman if (connection_closed) 773ca3176e7SBrian Feldman break; 774ca3176e7SBrian Feldman process_output(writeset); 775a04a10f8SKris Kennaway } 776af12a3e7SDag-Erling Smørgrav collect_children(); 777af12a3e7SDag-Erling Smørgrav 778ca3176e7SBrian Feldman if (readset) 779ca3176e7SBrian Feldman xfree(readset); 780ca3176e7SBrian Feldman if (writeset) 781ca3176e7SBrian Feldman xfree(writeset); 782ca3176e7SBrian Feldman 783af12a3e7SDag-Erling Smørgrav /* free all channels, no more reads and writes */ 784af12a3e7SDag-Erling Smørgrav channel_free_all(); 785af12a3e7SDag-Erling Smørgrav 786af12a3e7SDag-Erling Smørgrav /* free remaining sessions, e.g. remove wtmp entries */ 78780628bacSDag-Erling Smørgrav session_destroy_all(NULL); 788a04a10f8SKris Kennaway } 789a04a10f8SKris Kennaway 790af12a3e7SDag-Erling Smørgrav static void 791af12a3e7SDag-Erling Smørgrav server_input_channel_failure(int type, u_int32_t seq, void *ctxt) 792ca3176e7SBrian Feldman { 793ca3176e7SBrian Feldman debug("Got CHANNEL_FAILURE for keepalive"); 794ca3176e7SBrian Feldman /* 795ca3176e7SBrian Feldman * reset timeout, since we got a sane answer from the client. 796ca3176e7SBrian Feldman * even if this was generated by something other than 797ca3176e7SBrian Feldman * the bogus CHANNEL_REQUEST we send for keepalives. 798ca3176e7SBrian Feldman */ 799ca3176e7SBrian Feldman client_alive_timeouts = 0; 800ca3176e7SBrian Feldman } 801ca3176e7SBrian Feldman 802ca3176e7SBrian Feldman 803af12a3e7SDag-Erling Smørgrav static void 804af12a3e7SDag-Erling Smørgrav server_input_stdin_data(int type, u_int32_t seq, void *ctxt) 805a04a10f8SKris Kennaway { 806a04a10f8SKris Kennaway char *data; 807ca3176e7SBrian Feldman u_int data_len; 808a04a10f8SKris Kennaway 809a04a10f8SKris Kennaway /* Stdin data from the client. Append it to the buffer. */ 810a04a10f8SKris Kennaway /* Ignore any data if the client has closed stdin. */ 811a04a10f8SKris Kennaway if (fdin == -1) 812a04a10f8SKris Kennaway return; 813a04a10f8SKris Kennaway data = packet_get_string(&data_len); 814af12a3e7SDag-Erling Smørgrav packet_check_eom(); 815a04a10f8SKris Kennaway buffer_append(&stdin_buffer, data, data_len); 816a04a10f8SKris Kennaway memset(data, 0, data_len); 817a04a10f8SKris Kennaway xfree(data); 818a04a10f8SKris Kennaway } 819a04a10f8SKris Kennaway 820af12a3e7SDag-Erling Smørgrav static void 821af12a3e7SDag-Erling Smørgrav server_input_eof(int type, u_int32_t seq, void *ctxt) 822a04a10f8SKris Kennaway { 823a04a10f8SKris Kennaway /* 824a04a10f8SKris Kennaway * Eof from the client. The stdin descriptor to the 825a04a10f8SKris Kennaway * program will be closed when all buffered data has 826a04a10f8SKris Kennaway * drained. 827a04a10f8SKris Kennaway */ 828a04a10f8SKris Kennaway debug("EOF received for stdin."); 829af12a3e7SDag-Erling Smørgrav packet_check_eom(); 830a04a10f8SKris Kennaway stdin_eof = 1; 831a04a10f8SKris Kennaway } 832a04a10f8SKris Kennaway 833af12a3e7SDag-Erling Smørgrav static void 834af12a3e7SDag-Erling Smørgrav server_input_window_size(int type, u_int32_t seq, void *ctxt) 835a04a10f8SKris Kennaway { 836a04a10f8SKris Kennaway int row = packet_get_int(); 837a04a10f8SKris Kennaway int col = packet_get_int(); 838a04a10f8SKris Kennaway int xpixel = packet_get_int(); 839a04a10f8SKris Kennaway int ypixel = packet_get_int(); 840a04a10f8SKris Kennaway 841a04a10f8SKris Kennaway debug("Window change received."); 842af12a3e7SDag-Erling Smørgrav packet_check_eom(); 843a04a10f8SKris Kennaway if (fdin != -1) 844a04a10f8SKris Kennaway pty_change_window_size(fdin, row, col, xpixel, ypixel); 845a04a10f8SKris Kennaway } 846a04a10f8SKris Kennaway 847af12a3e7SDag-Erling Smørgrav static Channel * 848ca3176e7SBrian Feldman server_request_direct_tcpip(char *ctype) 849a04a10f8SKris Kennaway { 850af12a3e7SDag-Erling Smørgrav Channel *c; 851af12a3e7SDag-Erling Smørgrav int sock; 852a04a10f8SKris Kennaway char *target, *originator; 853a04a10f8SKris Kennaway int target_port, originator_port; 854a04a10f8SKris Kennaway 855a04a10f8SKris Kennaway target = packet_get_string(NULL); 856a04a10f8SKris Kennaway target_port = packet_get_int(); 857a04a10f8SKris Kennaway originator = packet_get_string(NULL); 858a04a10f8SKris Kennaway originator_port = packet_get_int(); 859af12a3e7SDag-Erling Smørgrav packet_check_eom(); 8602632b0c8SKris Kennaway 861ca3176e7SBrian Feldman debug("server_request_direct_tcpip: originator %s port %d, target %s port %d", 8622632b0c8SKris Kennaway originator, originator_port, target, target_port); 863b66f2d16SKris Kennaway 864a04a10f8SKris Kennaway /* XXX check permission */ 865a04a10f8SKris Kennaway sock = channel_connect_to(target, target_port); 866a04a10f8SKris Kennaway xfree(target); 867a04a10f8SKris Kennaway xfree(originator); 868a04a10f8SKris Kennaway if (sock < 0) 869ca3176e7SBrian Feldman return NULL; 870af12a3e7SDag-Erling Smørgrav c = channel_new(ctype, SSH_CHANNEL_CONNECTING, 871b66f2d16SKris Kennaway sock, sock, -1, CHAN_TCP_WINDOW_DEFAULT, 8725b9b2fafSBrian Feldman CHAN_TCP_PACKET_DEFAULT, 0, xstrdup("direct-tcpip"), 1); 873af12a3e7SDag-Erling Smørgrav return c; 874ca3176e7SBrian Feldman } 875ca3176e7SBrian Feldman 876af12a3e7SDag-Erling Smørgrav static Channel * 877ca3176e7SBrian Feldman server_request_session(char *ctype) 878ca3176e7SBrian Feldman { 879af12a3e7SDag-Erling Smørgrav Channel *c; 880ca3176e7SBrian Feldman 881ca3176e7SBrian Feldman debug("input_session_request"); 882af12a3e7SDag-Erling Smørgrav packet_check_eom(); 883ca3176e7SBrian Feldman /* 884ca3176e7SBrian Feldman * A server session has no fd to read or write until a 885ca3176e7SBrian Feldman * CHANNEL_REQUEST for a shell is made, so we set the type to 886ca3176e7SBrian Feldman * SSH_CHANNEL_LARVAL. Additionally, a callback for handling all 887ca3176e7SBrian Feldman * CHANNEL_REQUEST messages is registered. 888ca3176e7SBrian Feldman */ 889af12a3e7SDag-Erling Smørgrav c = channel_new(ctype, SSH_CHANNEL_LARVAL, 890af12a3e7SDag-Erling Smørgrav -1, -1, -1, /*window size*/0, CHAN_SES_PACKET_DEFAULT, 891ca3176e7SBrian Feldman 0, xstrdup("server-session"), 1); 892af12a3e7SDag-Erling Smørgrav if (session_open(xxx_authctxt, c->self) != 1) { 893af12a3e7SDag-Erling Smørgrav debug("session open failed, free channel %d", c->self); 894af12a3e7SDag-Erling Smørgrav channel_free(c); 895ca3176e7SBrian Feldman return NULL; 896a04a10f8SKris Kennaway } 897af12a3e7SDag-Erling Smørgrav channel_register_cleanup(c->self, session_close_by_channel); 898af12a3e7SDag-Erling Smørgrav return c; 899af12a3e7SDag-Erling Smørgrav } 900a04a10f8SKris Kennaway 901af12a3e7SDag-Erling Smørgrav static void 902af12a3e7SDag-Erling Smørgrav server_input_channel_open(int type, u_int32_t seq, void *ctxt) 903a04a10f8SKris Kennaway { 904a04a10f8SKris Kennaway Channel *c = NULL; 905a04a10f8SKris Kennaway char *ctype; 906ca3176e7SBrian Feldman u_int len; 907a04a10f8SKris Kennaway int rchan; 908a04a10f8SKris Kennaway int rmaxpack; 909a04a10f8SKris Kennaway int rwindow; 910a04a10f8SKris Kennaway 911a04a10f8SKris Kennaway ctype = packet_get_string(&len); 912a04a10f8SKris Kennaway rchan = packet_get_int(); 913a04a10f8SKris Kennaway rwindow = packet_get_int(); 914a04a10f8SKris Kennaway rmaxpack = packet_get_int(); 915a04a10f8SKris Kennaway 9165b9b2fafSBrian Feldman debug("server_input_channel_open: ctype %s rchan %d win %d max %d", 917a04a10f8SKris Kennaway ctype, rchan, rwindow, rmaxpack); 918a04a10f8SKris Kennaway 919a04a10f8SKris Kennaway if (strcmp(ctype, "session") == 0) { 920ca3176e7SBrian Feldman c = server_request_session(ctype); 921a04a10f8SKris Kennaway } else if (strcmp(ctype, "direct-tcpip") == 0) { 922ca3176e7SBrian Feldman c = server_request_direct_tcpip(ctype); 923a04a10f8SKris Kennaway } 924a04a10f8SKris Kennaway if (c != NULL) { 925ca3176e7SBrian Feldman debug("server_input_channel_open: confirm %s", ctype); 926a04a10f8SKris Kennaway c->remote_id = rchan; 927a04a10f8SKris Kennaway c->remote_window = rwindow; 928a04a10f8SKris Kennaway c->remote_maxpacket = rmaxpack; 929af12a3e7SDag-Erling Smørgrav if (c->type != SSH_CHANNEL_CONNECTING) { 930a04a10f8SKris Kennaway packet_start(SSH2_MSG_CHANNEL_OPEN_CONFIRMATION); 931a04a10f8SKris Kennaway packet_put_int(c->remote_id); 932a04a10f8SKris Kennaway packet_put_int(c->self); 933a04a10f8SKris Kennaway packet_put_int(c->local_window); 934a04a10f8SKris Kennaway packet_put_int(c->local_maxpacket); 935a04a10f8SKris Kennaway packet_send(); 936af12a3e7SDag-Erling Smørgrav } 937a04a10f8SKris Kennaway } else { 938ca3176e7SBrian Feldman debug("server_input_channel_open: failure %s", ctype); 939a04a10f8SKris Kennaway packet_start(SSH2_MSG_CHANNEL_OPEN_FAILURE); 940a04a10f8SKris Kennaway packet_put_int(rchan); 941a04a10f8SKris Kennaway packet_put_int(SSH2_OPEN_ADMINISTRATIVELY_PROHIBITED); 942af12a3e7SDag-Erling Smørgrav if (!(datafellows & SSH_BUG_OPENFAILURE)) { 943af12a3e7SDag-Erling Smørgrav packet_put_cstring("open failed"); 944a04a10f8SKris Kennaway packet_put_cstring(""); 945af12a3e7SDag-Erling Smørgrav } 946a04a10f8SKris Kennaway packet_send(); 947a04a10f8SKris Kennaway } 948a04a10f8SKris Kennaway xfree(ctype); 949a04a10f8SKris Kennaway } 950a04a10f8SKris Kennaway 951af12a3e7SDag-Erling Smørgrav static void 952af12a3e7SDag-Erling Smørgrav server_input_global_request(int type, u_int32_t seq, void *ctxt) 953ca3176e7SBrian Feldman { 954ca3176e7SBrian Feldman char *rtype; 955ca3176e7SBrian Feldman int want_reply; 956ca3176e7SBrian Feldman int success = 0; 957ca3176e7SBrian Feldman 958ca3176e7SBrian Feldman rtype = packet_get_string(NULL); 959ca3176e7SBrian Feldman want_reply = packet_get_char(); 960ca3176e7SBrian Feldman debug("server_input_global_request: rtype %s want_reply %d", rtype, want_reply); 961ca3176e7SBrian Feldman 962ca3176e7SBrian Feldman /* -R style forwarding */ 963ca3176e7SBrian Feldman if (strcmp(rtype, "tcpip-forward") == 0) { 964ca3176e7SBrian Feldman struct passwd *pw; 965ca3176e7SBrian Feldman char *listen_address; 966ca3176e7SBrian Feldman u_short listen_port; 967ca3176e7SBrian Feldman 968ca3176e7SBrian Feldman pw = auth_get_user(); 969ca3176e7SBrian Feldman if (pw == NULL) 970ca3176e7SBrian Feldman fatal("server_input_global_request: no user"); 971ca3176e7SBrian Feldman listen_address = packet_get_string(NULL); /* XXX currently ignored */ 972ca3176e7SBrian Feldman listen_port = (u_short)packet_get_int(); 973ca3176e7SBrian Feldman debug("server_input_global_request: tcpip-forward listen %s port %d", 974ca3176e7SBrian Feldman listen_address, listen_port); 975ca3176e7SBrian Feldman 976ca3176e7SBrian Feldman /* check permissions */ 977ca3176e7SBrian Feldman if (!options.allow_tcp_forwarding || 978ca3176e7SBrian Feldman no_port_forwarding_flag || 979ca3176e7SBrian Feldman (listen_port < IPPORT_RESERVED && pw->pw_uid != 0)) { 980ca3176e7SBrian Feldman success = 0; 981ca3176e7SBrian Feldman packet_send_debug("Server has disabled port forwarding."); 982ca3176e7SBrian Feldman } else { 983ca3176e7SBrian Feldman /* Start listening on the port */ 984af12a3e7SDag-Erling Smørgrav success = channel_setup_remote_fwd_listener( 985af12a3e7SDag-Erling Smørgrav listen_address, listen_port, options.gateway_ports); 986ca3176e7SBrian Feldman } 987ca3176e7SBrian Feldman xfree(listen_address); 988ca3176e7SBrian Feldman } 989ca3176e7SBrian Feldman if (want_reply) { 990ca3176e7SBrian Feldman packet_start(success ? 991ca3176e7SBrian Feldman SSH2_MSG_REQUEST_SUCCESS : SSH2_MSG_REQUEST_FAILURE); 992ca3176e7SBrian Feldman packet_send(); 993ca3176e7SBrian Feldman packet_write_wait(); 994ca3176e7SBrian Feldman } 995ca3176e7SBrian Feldman xfree(rtype); 996ca3176e7SBrian Feldman } 997af12a3e7SDag-Erling Smørgrav static void 998af12a3e7SDag-Erling Smørgrav server_input_channel_req(int type, u_int32_t seq, void *ctxt) 999af12a3e7SDag-Erling Smørgrav { 1000af12a3e7SDag-Erling Smørgrav Channel *c; 1001af12a3e7SDag-Erling Smørgrav int id, reply, success = 0; 1002af12a3e7SDag-Erling Smørgrav char *rtype; 1003ca3176e7SBrian Feldman 1004af12a3e7SDag-Erling Smørgrav id = packet_get_int(); 1005af12a3e7SDag-Erling Smørgrav rtype = packet_get_string(NULL); 1006af12a3e7SDag-Erling Smørgrav reply = packet_get_char(); 1007af12a3e7SDag-Erling Smørgrav 1008af12a3e7SDag-Erling Smørgrav debug("server_input_channel_req: channel %d request %s reply %d", 1009af12a3e7SDag-Erling Smørgrav id, rtype, reply); 1010af12a3e7SDag-Erling Smørgrav 1011af12a3e7SDag-Erling Smørgrav if ((c = channel_lookup(id)) == NULL) 1012af12a3e7SDag-Erling Smørgrav packet_disconnect("server_input_channel_req: " 1013af12a3e7SDag-Erling Smørgrav "unknown channel %d", id); 1014af12a3e7SDag-Erling Smørgrav if (c->type == SSH_CHANNEL_LARVAL || c->type == SSH_CHANNEL_OPEN) 1015af12a3e7SDag-Erling Smørgrav success = session_input_channel_req(c, rtype); 1016af12a3e7SDag-Erling Smørgrav if (reply) { 1017af12a3e7SDag-Erling Smørgrav packet_start(success ? 1018af12a3e7SDag-Erling Smørgrav SSH2_MSG_CHANNEL_SUCCESS : SSH2_MSG_CHANNEL_FAILURE); 1019af12a3e7SDag-Erling Smørgrav packet_put_int(c->remote_id); 1020af12a3e7SDag-Erling Smørgrav packet_send(); 1021af12a3e7SDag-Erling Smørgrav } 1022af12a3e7SDag-Erling Smørgrav xfree(rtype); 1023af12a3e7SDag-Erling Smørgrav } 1024af12a3e7SDag-Erling Smørgrav 1025af12a3e7SDag-Erling Smørgrav static void 1026ca3176e7SBrian Feldman server_init_dispatch_20(void) 1027a04a10f8SKris Kennaway { 1028a04a10f8SKris Kennaway debug("server_init_dispatch_20"); 1029a04a10f8SKris Kennaway dispatch_init(&dispatch_protocol_error); 1030a04a10f8SKris Kennaway dispatch_set(SSH2_MSG_CHANNEL_CLOSE, &channel_input_oclose); 1031a04a10f8SKris Kennaway dispatch_set(SSH2_MSG_CHANNEL_DATA, &channel_input_data); 1032a04a10f8SKris Kennaway dispatch_set(SSH2_MSG_CHANNEL_EOF, &channel_input_ieof); 1033a04a10f8SKris Kennaway dispatch_set(SSH2_MSG_CHANNEL_EXTENDED_DATA, &channel_input_extended_data); 1034a04a10f8SKris Kennaway dispatch_set(SSH2_MSG_CHANNEL_OPEN, &server_input_channel_open); 1035a04a10f8SKris Kennaway dispatch_set(SSH2_MSG_CHANNEL_OPEN_CONFIRMATION, &channel_input_open_confirmation); 1036a04a10f8SKris Kennaway dispatch_set(SSH2_MSG_CHANNEL_OPEN_FAILURE, &channel_input_open_failure); 1037af12a3e7SDag-Erling Smørgrav dispatch_set(SSH2_MSG_CHANNEL_REQUEST, &server_input_channel_req); 1038a04a10f8SKris Kennaway dispatch_set(SSH2_MSG_CHANNEL_WINDOW_ADJUST, &channel_input_window_adjust); 1039ca3176e7SBrian Feldman dispatch_set(SSH2_MSG_GLOBAL_REQUEST, &server_input_global_request); 1040ca3176e7SBrian Feldman /* client_alive */ 1041ca3176e7SBrian Feldman dispatch_set(SSH2_MSG_CHANNEL_FAILURE, &server_input_channel_failure); 1042ca3176e7SBrian Feldman /* rekeying */ 1043ca3176e7SBrian Feldman dispatch_set(SSH2_MSG_KEXINIT, &kex_input_kexinit); 1044a04a10f8SKris Kennaway } 1045af12a3e7SDag-Erling Smørgrav static void 1046ca3176e7SBrian Feldman server_init_dispatch_13(void) 1047a04a10f8SKris Kennaway { 1048a04a10f8SKris Kennaway debug("server_init_dispatch_13"); 1049a04a10f8SKris Kennaway dispatch_init(NULL); 1050a04a10f8SKris Kennaway dispatch_set(SSH_CMSG_EOF, &server_input_eof); 1051a04a10f8SKris Kennaway dispatch_set(SSH_CMSG_STDIN_DATA, &server_input_stdin_data); 1052a04a10f8SKris Kennaway dispatch_set(SSH_CMSG_WINDOW_SIZE, &server_input_window_size); 1053a04a10f8SKris Kennaway dispatch_set(SSH_MSG_CHANNEL_CLOSE, &channel_input_close); 1054a04a10f8SKris Kennaway dispatch_set(SSH_MSG_CHANNEL_CLOSE_CONFIRMATION, &channel_input_close_confirmation); 1055a04a10f8SKris Kennaway dispatch_set(SSH_MSG_CHANNEL_DATA, &channel_input_data); 1056a04a10f8SKris Kennaway dispatch_set(SSH_MSG_CHANNEL_OPEN_CONFIRMATION, &channel_input_open_confirmation); 1057a04a10f8SKris Kennaway dispatch_set(SSH_MSG_CHANNEL_OPEN_FAILURE, &channel_input_open_failure); 1058a04a10f8SKris Kennaway dispatch_set(SSH_MSG_PORT_OPEN, &channel_input_port_open); 1059a04a10f8SKris Kennaway } 1060af12a3e7SDag-Erling Smørgrav static void 1061ca3176e7SBrian Feldman server_init_dispatch_15(void) 1062a04a10f8SKris Kennaway { 1063a04a10f8SKris Kennaway server_init_dispatch_13(); 1064a04a10f8SKris Kennaway debug("server_init_dispatch_15"); 1065a04a10f8SKris Kennaway dispatch_set(SSH_MSG_CHANNEL_CLOSE, &channel_input_ieof); 1066a04a10f8SKris Kennaway dispatch_set(SSH_MSG_CHANNEL_CLOSE_CONFIRMATION, &channel_input_oclose); 1067a04a10f8SKris Kennaway } 1068af12a3e7SDag-Erling Smørgrav static void 1069ca3176e7SBrian Feldman server_init_dispatch(void) 1070a04a10f8SKris Kennaway { 1071a04a10f8SKris Kennaway if (compat20) 1072a04a10f8SKris Kennaway server_init_dispatch_20(); 1073a04a10f8SKris Kennaway else if (compat13) 1074a04a10f8SKris Kennaway server_init_dispatch_13(); 1075a04a10f8SKris Kennaway else 1076a04a10f8SKris Kennaway server_init_dispatch_15(); 1077a04a10f8SKris Kennaway } 1078