1511b41d2SMark Murray /* 2511b41d2SMark Murray * Author: Tatu Ylonen <ylo@cs.hut.fi> 3511b41d2SMark Murray * Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland 4511b41d2SMark Murray * All rights reserved 5511b41d2SMark Murray * Server main loop for handling the interactive session. 6b66f2d16SKris Kennaway * 7b66f2d16SKris Kennaway * As far as I am concerned, the code I have written for this software 8b66f2d16SKris Kennaway * can be used freely for any purpose. Any derived versions of this 9b66f2d16SKris Kennaway * software must be clearly marked as such, and if the derived work is 10b66f2d16SKris Kennaway * incompatible with the protocol description in the RFC file, it must be 11b66f2d16SKris Kennaway * called by a name other than "ssh" or "Secure Shell". 12b66f2d16SKris Kennaway * 13a04a10f8SKris Kennaway * SSH2 support by Markus Friedl. 14af12a3e7SDag-Erling Smørgrav * Copyright (c) 2000, 2001 Markus Friedl. All rights reserved. 15b66f2d16SKris Kennaway * 16b66f2d16SKris Kennaway * Redistribution and use in source and binary forms, with or without 17b66f2d16SKris Kennaway * modification, are permitted provided that the following conditions 18b66f2d16SKris Kennaway * are met: 19b66f2d16SKris Kennaway * 1. Redistributions of source code must retain the above copyright 20b66f2d16SKris Kennaway * notice, this list of conditions and the following disclaimer. 21b66f2d16SKris Kennaway * 2. Redistributions in binary form must reproduce the above copyright 22b66f2d16SKris Kennaway * notice, this list of conditions and the following disclaimer in the 23b66f2d16SKris Kennaway * documentation and/or other materials provided with the distribution. 24b66f2d16SKris Kennaway * 25b66f2d16SKris Kennaway * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR 26b66f2d16SKris Kennaway * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES 27b66f2d16SKris Kennaway * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. 28b66f2d16SKris Kennaway * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, 29b66f2d16SKris Kennaway * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT 30b66f2d16SKris Kennaway * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, 31b66f2d16SKris Kennaway * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY 32b66f2d16SKris Kennaway * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT 33b66f2d16SKris Kennaway * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF 34b66f2d16SKris Kennaway * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. 35a04a10f8SKris Kennaway */ 36511b41d2SMark Murray 37511b41d2SMark Murray #include "includes.h" 38b74df5b2SDag-Erling Smørgrav RCSID("$OpenBSD: serverloop.c,v 1.124 2005/12/13 15:03:02 reyk Exp $"); 395b9b2fafSBrian Feldman 40511b41d2SMark Murray #include "xmalloc.h" 41511b41d2SMark Murray #include "packet.h" 42511b41d2SMark Murray #include "buffer.h" 43ca3176e7SBrian Feldman #include "log.h" 44511b41d2SMark Murray #include "servconf.h" 45f388f5efSDag-Erling Smørgrav #include "canohost.h" 46ca3176e7SBrian Feldman #include "sshpty.h" 47a04a10f8SKris Kennaway #include "channels.h" 48a04a10f8SKris Kennaway #include "compat.h" 49ca3176e7SBrian Feldman #include "ssh1.h" 50a04a10f8SKris Kennaway #include "ssh2.h" 51ca3176e7SBrian Feldman #include "auth.h" 52a04a10f8SKris Kennaway #include "session.h" 53a04a10f8SKris Kennaway #include "dispatch.h" 54b66f2d16SKris Kennaway #include "auth-options.h" 55ca3176e7SBrian Feldman #include "serverloop.h" 56ca3176e7SBrian Feldman #include "misc.h" 57ca3176e7SBrian Feldman #include "kex.h" 58511b41d2SMark Murray 595b9b2fafSBrian Feldman extern ServerOptions options; 605b9b2fafSBrian Feldman 61ca3176e7SBrian Feldman /* XXX */ 62ca3176e7SBrian Feldman extern Kex *xxx_kex; 631ec0d754SDag-Erling Smørgrav extern Authctxt *the_authctxt; 64b74df5b2SDag-Erling Smørgrav extern int use_privsep; 65ca3176e7SBrian Feldman 66511b41d2SMark Murray static Buffer stdin_buffer; /* Buffer for stdin data. */ 67511b41d2SMark Murray static Buffer stdout_buffer; /* Buffer for stdout data. */ 68511b41d2SMark Murray static Buffer stderr_buffer; /* Buffer for stderr data. */ 69511b41d2SMark Murray static int fdin; /* Descriptor for stdin (for writing) */ 70511b41d2SMark Murray static int fdout; /* Descriptor for stdout (for reading); 71511b41d2SMark Murray May be same number as fdin. */ 72511b41d2SMark Murray static int fderr; /* Descriptor for stderr. May be -1. */ 73511b41d2SMark Murray static long stdin_bytes = 0; /* Number of bytes written to stdin. */ 74511b41d2SMark Murray static long stdout_bytes = 0; /* Number of stdout bytes sent to client. */ 75511b41d2SMark Murray static long stderr_bytes = 0; /* Number of stderr bytes sent to client. */ 76511b41d2SMark Murray static long fdout_bytes = 0; /* Number of stdout bytes read from program. */ 77511b41d2SMark Murray static int stdin_eof = 0; /* EOF message received from client. */ 78511b41d2SMark Murray static int fdout_eof = 0; /* EOF encountered reading from fdout. */ 79511b41d2SMark Murray static int fderr_eof = 0; /* EOF encountered readung from fderr. */ 80e0fbb1d2SBrian Feldman static int fdin_is_tty = 0; /* fdin points to a tty. */ 81511b41d2SMark Murray static int connection_in; /* Connection to client (input). */ 82511b41d2SMark Murray static int connection_out; /* Connection to client (output). */ 83ca3176e7SBrian Feldman static int connection_closed = 0; /* Connection to client closed. */ 84ca3176e7SBrian Feldman static u_int buffer_high; /* "Soft" max buffer size. */ 85af12a3e7SDag-Erling Smørgrav static int client_alive_timeouts = 0; 86511b41d2SMark Murray 87511b41d2SMark Murray /* 88511b41d2SMark Murray * This SIGCHLD kludge is used to detect when the child exits. The server 89511b41d2SMark Murray * will exit after that, as soon as forwarded connections have terminated. 90511b41d2SMark Murray */ 91511b41d2SMark Murray 92af12a3e7SDag-Erling Smørgrav static volatile sig_atomic_t child_terminated = 0; /* The child has terminated. */ 93511b41d2SMark Murray 94b74df5b2SDag-Erling Smørgrav /* Cleanup on signals (!use_privsep case only) */ 95b74df5b2SDag-Erling Smørgrav static volatile sig_atomic_t received_sigterm = 0; 96b74df5b2SDag-Erling Smørgrav 97af12a3e7SDag-Erling Smørgrav /* prototypes */ 98af12a3e7SDag-Erling Smørgrav static void server_init_dispatch(void); 99a04a10f8SKris Kennaway 100af12a3e7SDag-Erling Smørgrav /* 101af12a3e7SDag-Erling Smørgrav * we write to this pipe if a SIGCHLD is caught in order to avoid 102af12a3e7SDag-Erling Smørgrav * the race between select() and child_terminated 103af12a3e7SDag-Erling Smørgrav */ 104af12a3e7SDag-Erling Smørgrav static int notify_pipe[2]; 105af12a3e7SDag-Erling Smørgrav static void 106af12a3e7SDag-Erling Smørgrav notify_setup(void) 107af12a3e7SDag-Erling Smørgrav { 108af12a3e7SDag-Erling Smørgrav if (pipe(notify_pipe) < 0) { 109af12a3e7SDag-Erling Smørgrav error("pipe(notify_pipe) failed %s", strerror(errno)); 110af12a3e7SDag-Erling Smørgrav } else if ((fcntl(notify_pipe[0], F_SETFD, 1) == -1) || 111af12a3e7SDag-Erling Smørgrav (fcntl(notify_pipe[1], F_SETFD, 1) == -1)) { 112af12a3e7SDag-Erling Smørgrav error("fcntl(notify_pipe, F_SETFD) failed %s", strerror(errno)); 113af12a3e7SDag-Erling Smørgrav close(notify_pipe[0]); 114af12a3e7SDag-Erling Smørgrav close(notify_pipe[1]); 115af12a3e7SDag-Erling Smørgrav } else { 116af12a3e7SDag-Erling Smørgrav set_nonblock(notify_pipe[0]); 117af12a3e7SDag-Erling Smørgrav set_nonblock(notify_pipe[1]); 118af12a3e7SDag-Erling Smørgrav return; 119af12a3e7SDag-Erling Smørgrav } 120af12a3e7SDag-Erling Smørgrav notify_pipe[0] = -1; /* read end */ 121af12a3e7SDag-Erling Smørgrav notify_pipe[1] = -1; /* write end */ 122af12a3e7SDag-Erling Smørgrav } 123af12a3e7SDag-Erling Smørgrav static void 124af12a3e7SDag-Erling Smørgrav notify_parent(void) 125af12a3e7SDag-Erling Smørgrav { 126af12a3e7SDag-Erling Smørgrav if (notify_pipe[1] != -1) 127af12a3e7SDag-Erling Smørgrav write(notify_pipe[1], "", 1); 128af12a3e7SDag-Erling Smørgrav } 129af12a3e7SDag-Erling Smørgrav static void 130af12a3e7SDag-Erling Smørgrav notify_prepare(fd_set *readset) 131af12a3e7SDag-Erling Smørgrav { 132af12a3e7SDag-Erling Smørgrav if (notify_pipe[0] != -1) 133af12a3e7SDag-Erling Smørgrav FD_SET(notify_pipe[0], readset); 134af12a3e7SDag-Erling Smørgrav } 135af12a3e7SDag-Erling Smørgrav static void 136af12a3e7SDag-Erling Smørgrav notify_done(fd_set *readset) 137af12a3e7SDag-Erling Smørgrav { 138af12a3e7SDag-Erling Smørgrav char c; 139ca3176e7SBrian Feldman 140af12a3e7SDag-Erling Smørgrav if (notify_pipe[0] != -1 && FD_ISSET(notify_pipe[0], readset)) 141af12a3e7SDag-Erling Smørgrav while (read(notify_pipe[0], &c, 1) != -1) 142af12a3e7SDag-Erling Smørgrav debug2("notify_done: reading"); 143af12a3e7SDag-Erling Smørgrav } 144af12a3e7SDag-Erling Smørgrav 145af12a3e7SDag-Erling Smørgrav static void 146511b41d2SMark Murray sigchld_handler(int sig) 147511b41d2SMark Murray { 148511b41d2SMark Murray int save_errno = errno; 149511b41d2SMark Murray debug("Received SIGCHLD."); 150511b41d2SMark Murray child_terminated = 1; 151f388f5efSDag-Erling Smørgrav #ifndef _UNICOS 152989dd127SDag-Erling Smørgrav mysignal(SIGCHLD, sigchld_handler); 153f388f5efSDag-Erling Smørgrav #endif 154af12a3e7SDag-Erling Smørgrav notify_parent(); 155a04a10f8SKris Kennaway errno = save_errno; 156511b41d2SMark Murray } 157511b41d2SMark Murray 158b74df5b2SDag-Erling Smørgrav static void 159b74df5b2SDag-Erling Smørgrav sigterm_handler(int sig) 160b74df5b2SDag-Erling Smørgrav { 161b74df5b2SDag-Erling Smørgrav received_sigterm = sig; 162b74df5b2SDag-Erling Smørgrav } 163b74df5b2SDag-Erling Smørgrav 164511b41d2SMark Murray /* 165511b41d2SMark Murray * Make packets from buffered stderr data, and buffer it for sending 166511b41d2SMark Murray * to the client. 167511b41d2SMark Murray */ 168af12a3e7SDag-Erling Smørgrav static void 169ca3176e7SBrian Feldman make_packets_from_stderr_data(void) 170511b41d2SMark Murray { 171cf2b5f3bSDag-Erling Smørgrav u_int len; 172511b41d2SMark Murray 173511b41d2SMark Murray /* Send buffered stderr data to the client. */ 174511b41d2SMark Murray while (buffer_len(&stderr_buffer) > 0 && 175511b41d2SMark Murray packet_not_very_much_data_to_write()) { 176511b41d2SMark Murray len = buffer_len(&stderr_buffer); 177511b41d2SMark Murray if (packet_is_interactive()) { 178511b41d2SMark Murray if (len > 512) 179511b41d2SMark Murray len = 512; 180511b41d2SMark Murray } else { 181511b41d2SMark Murray /* Keep the packets at reasonable size. */ 182511b41d2SMark Murray if (len > packet_get_maxsize()) 183511b41d2SMark Murray len = packet_get_maxsize(); 184511b41d2SMark Murray } 185511b41d2SMark Murray packet_start(SSH_SMSG_STDERR_DATA); 186511b41d2SMark Murray packet_put_string(buffer_ptr(&stderr_buffer), len); 187511b41d2SMark Murray packet_send(); 188511b41d2SMark Murray buffer_consume(&stderr_buffer, len); 189511b41d2SMark Murray stderr_bytes += len; 190511b41d2SMark Murray } 191511b41d2SMark Murray } 192511b41d2SMark Murray 193511b41d2SMark Murray /* 194511b41d2SMark Murray * Make packets from buffered stdout data, and buffer it for sending to the 195511b41d2SMark Murray * client. 196511b41d2SMark Murray */ 197af12a3e7SDag-Erling Smørgrav static void 198ca3176e7SBrian Feldman make_packets_from_stdout_data(void) 199511b41d2SMark Murray { 200cf2b5f3bSDag-Erling Smørgrav u_int len; 201511b41d2SMark Murray 202511b41d2SMark Murray /* Send buffered stdout data to the client. */ 203511b41d2SMark Murray while (buffer_len(&stdout_buffer) > 0 && 204511b41d2SMark Murray packet_not_very_much_data_to_write()) { 205511b41d2SMark Murray len = buffer_len(&stdout_buffer); 206511b41d2SMark Murray if (packet_is_interactive()) { 207511b41d2SMark Murray if (len > 512) 208511b41d2SMark Murray len = 512; 209511b41d2SMark Murray } else { 210511b41d2SMark Murray /* Keep the packets at reasonable size. */ 211511b41d2SMark Murray if (len > packet_get_maxsize()) 212511b41d2SMark Murray len = packet_get_maxsize(); 213511b41d2SMark Murray } 214511b41d2SMark Murray packet_start(SSH_SMSG_STDOUT_DATA); 215511b41d2SMark Murray packet_put_string(buffer_ptr(&stdout_buffer), len); 216511b41d2SMark Murray packet_send(); 217511b41d2SMark Murray buffer_consume(&stdout_buffer, len); 218511b41d2SMark Murray stdout_bytes += len; 219511b41d2SMark Murray } 220511b41d2SMark Murray } 221511b41d2SMark Murray 222af12a3e7SDag-Erling Smørgrav static void 223af12a3e7SDag-Erling Smørgrav client_alive_check(void) 224af12a3e7SDag-Erling Smørgrav { 2251ec0d754SDag-Erling Smørgrav int channel_id; 226af12a3e7SDag-Erling Smørgrav 227af12a3e7SDag-Erling Smørgrav /* timeout, check to see how many we have had */ 228af12a3e7SDag-Erling Smørgrav if (++client_alive_timeouts > options.client_alive_count_max) 229af12a3e7SDag-Erling Smørgrav packet_disconnect("Timeout, your session not responding."); 230af12a3e7SDag-Erling Smørgrav 231af12a3e7SDag-Erling Smørgrav /* 2321ec0d754SDag-Erling Smørgrav * send a bogus global/channel request with "wantreply", 233af12a3e7SDag-Erling Smørgrav * we should get back a failure 234af12a3e7SDag-Erling Smørgrav */ 2351ec0d754SDag-Erling Smørgrav if ((channel_id = channel_find_open()) == -1) { 2361ec0d754SDag-Erling Smørgrav packet_start(SSH2_MSG_GLOBAL_REQUEST); 2371ec0d754SDag-Erling Smørgrav packet_put_cstring("keepalive@openssh.com"); 2381ec0d754SDag-Erling Smørgrav packet_put_char(1); /* boolean: want reply */ 2391ec0d754SDag-Erling Smørgrav } else { 2401ec0d754SDag-Erling Smørgrav channel_request_start(channel_id, "keepalive@openssh.com", 1); 2411ec0d754SDag-Erling Smørgrav } 242af12a3e7SDag-Erling Smørgrav packet_send(); 243af12a3e7SDag-Erling Smørgrav } 244af12a3e7SDag-Erling Smørgrav 245511b41d2SMark Murray /* 246511b41d2SMark Murray * Sleep in select() until we can do something. This will initialize the 247511b41d2SMark Murray * select masks. Upon return, the masks will indicate which descriptors 248511b41d2SMark Murray * have data or can accept data. Optionally, a maximum time can be specified 249511b41d2SMark Murray * for the duration of the wait (0 = infinite). 250511b41d2SMark Murray */ 251af12a3e7SDag-Erling Smørgrav static void 252ca3176e7SBrian Feldman wait_until_can_do_something(fd_set **readsetp, fd_set **writesetp, int *maxfdp, 25321e764dfSDag-Erling Smørgrav u_int *nallocp, u_int max_time_milliseconds) 254511b41d2SMark Murray { 255511b41d2SMark Murray struct timeval tv, *tvp; 256511b41d2SMark Murray int ret; 257ca3176e7SBrian Feldman int client_alive_scheduled = 0; 258ca3176e7SBrian Feldman 259ca3176e7SBrian Feldman /* 260ca3176e7SBrian Feldman * if using client_alive, set the max timeout accordingly, 261ca3176e7SBrian Feldman * and indicate that this particular timeout was for client 262ca3176e7SBrian Feldman * alive by setting the client_alive_scheduled flag. 263ca3176e7SBrian Feldman * 264ca3176e7SBrian Feldman * this could be randomized somewhat to make traffic 265ca3176e7SBrian Feldman * analysis more difficult, but we're not doing it yet. 266ca3176e7SBrian Feldman */ 267af12a3e7SDag-Erling Smørgrav if (compat20 && 268af12a3e7SDag-Erling Smørgrav max_time_milliseconds == 0 && options.client_alive_interval) { 269ca3176e7SBrian Feldman client_alive_scheduled = 1; 270ca3176e7SBrian Feldman max_time_milliseconds = options.client_alive_interval * 1000; 271af12a3e7SDag-Erling Smørgrav } 272511b41d2SMark Murray 273ca3176e7SBrian Feldman /* Allocate and update select() masks for channel descriptors. */ 274af12a3e7SDag-Erling Smørgrav channel_prepare_select(readsetp, writesetp, maxfdp, nallocp, 0); 275511b41d2SMark Murray 276a04a10f8SKris Kennaway if (compat20) { 277af12a3e7SDag-Erling Smørgrav #if 0 278a04a10f8SKris Kennaway /* wrong: bad condition XXX */ 279a04a10f8SKris Kennaway if (channel_not_very_much_buffered_data()) 280af12a3e7SDag-Erling Smørgrav #endif 281ca3176e7SBrian Feldman FD_SET(connection_in, *readsetp); 282a04a10f8SKris Kennaway } else { 2832632b0c8SKris Kennaway /* 2842632b0c8SKris Kennaway * Read packets from the client unless we have too much 2852632b0c8SKris Kennaway * buffered stdin or channel data. 2862632b0c8SKris Kennaway */ 2872632b0c8SKris Kennaway if (buffer_len(&stdin_buffer) < buffer_high && 288511b41d2SMark Murray channel_not_very_much_buffered_data()) 289ca3176e7SBrian Feldman FD_SET(connection_in, *readsetp); 290511b41d2SMark Murray /* 2912632b0c8SKris Kennaway * If there is not too much data already buffered going to 2922632b0c8SKris Kennaway * the client, try to get some more data from the program. 293511b41d2SMark Murray */ 2942632b0c8SKris Kennaway if (packet_not_very_much_data_to_write()) { 295511b41d2SMark Murray if (!fdout_eof) 296ca3176e7SBrian Feldman FD_SET(fdout, *readsetp); 297511b41d2SMark Murray if (!fderr_eof) 298ca3176e7SBrian Feldman FD_SET(fderr, *readsetp); 299511b41d2SMark Murray } 3002632b0c8SKris Kennaway /* 3012632b0c8SKris Kennaway * If we have buffered data, try to write some of that data 3022632b0c8SKris Kennaway * to the program. 3032632b0c8SKris Kennaway */ 3042632b0c8SKris Kennaway if (fdin != -1 && buffer_len(&stdin_buffer) > 0) 305ca3176e7SBrian Feldman FD_SET(fdin, *writesetp); 3062632b0c8SKris Kennaway } 307af12a3e7SDag-Erling Smørgrav notify_prepare(*readsetp); 308511b41d2SMark Murray 309511b41d2SMark Murray /* 310511b41d2SMark Murray * If we have buffered packet data going to the client, mark that 311511b41d2SMark Murray * descriptor. 312511b41d2SMark Murray */ 313511b41d2SMark Murray if (packet_have_data_to_write()) 314ca3176e7SBrian Feldman FD_SET(connection_out, *writesetp); 315511b41d2SMark Murray 316511b41d2SMark Murray /* 317511b41d2SMark Murray * If child has terminated and there is enough buffer space to read 318511b41d2SMark Murray * from it, then read as much as is available and exit. 319511b41d2SMark Murray */ 320511b41d2SMark Murray if (child_terminated && packet_not_very_much_data_to_write()) 321ca3176e7SBrian Feldman if (max_time_milliseconds == 0 || client_alive_scheduled) 322511b41d2SMark Murray max_time_milliseconds = 100; 323511b41d2SMark Murray 324511b41d2SMark Murray if (max_time_milliseconds == 0) 325511b41d2SMark Murray tvp = NULL; 326511b41d2SMark Murray else { 327511b41d2SMark Murray tv.tv_sec = max_time_milliseconds / 1000; 328511b41d2SMark Murray tv.tv_usec = 1000 * (max_time_milliseconds % 1000); 329511b41d2SMark Murray tvp = &tv; 330511b41d2SMark Murray } 331511b41d2SMark Murray 332511b41d2SMark Murray /* Wait for something to happen, or the timeout to expire. */ 333ca3176e7SBrian Feldman ret = select((*maxfdp)+1, *readsetp, *writesetp, NULL, tvp); 334511b41d2SMark Murray 335ca3176e7SBrian Feldman if (ret == -1) { 336af12a3e7SDag-Erling Smørgrav memset(*readsetp, 0, *nallocp); 337af12a3e7SDag-Erling Smørgrav memset(*writesetp, 0, *nallocp); 338511b41d2SMark Murray if (errno != EINTR) 339511b41d2SMark Murray error("select: %.100s", strerror(errno)); 340af12a3e7SDag-Erling Smørgrav } else if (ret == 0 && client_alive_scheduled) 341af12a3e7SDag-Erling Smørgrav client_alive_check(); 342ca3176e7SBrian Feldman 343af12a3e7SDag-Erling Smørgrav notify_done(*readsetp); 344511b41d2SMark Murray } 345511b41d2SMark Murray 346511b41d2SMark Murray /* 347511b41d2SMark Murray * Processes input from the client and the program. Input data is stored 348511b41d2SMark Murray * in buffers and processed later. 349511b41d2SMark Murray */ 350af12a3e7SDag-Erling Smørgrav static void 351511b41d2SMark Murray process_input(fd_set * readset) 352511b41d2SMark Murray { 353511b41d2SMark Murray int len; 354511b41d2SMark Murray char buf[16384]; 355511b41d2SMark Murray 356511b41d2SMark Murray /* Read and buffer any input data from the client. */ 357511b41d2SMark Murray if (FD_ISSET(connection_in, readset)) { 358511b41d2SMark Murray len = read(connection_in, buf, sizeof(buf)); 359511b41d2SMark Murray if (len == 0) { 360f388f5efSDag-Erling Smørgrav verbose("Connection closed by %.100s", 361f388f5efSDag-Erling Smørgrav get_remote_ipaddr()); 362ca3176e7SBrian Feldman connection_closed = 1; 363ca3176e7SBrian Feldman if (compat20) 364ca3176e7SBrian Feldman return; 3651ec0d754SDag-Erling Smørgrav cleanup_exit(255); 3662632b0c8SKris Kennaway } else if (len < 0) { 3672632b0c8SKris Kennaway if (errno != EINTR && errno != EAGAIN) { 368f388f5efSDag-Erling Smørgrav verbose("Read error from remote host " 369f388f5efSDag-Erling Smørgrav "%.100s: %.100s", 370f388f5efSDag-Erling Smørgrav get_remote_ipaddr(), strerror(errno)); 3711ec0d754SDag-Erling Smørgrav cleanup_exit(255); 372511b41d2SMark Murray } 3732632b0c8SKris Kennaway } else { 374511b41d2SMark Murray /* Buffer any received data. */ 375511b41d2SMark Murray packet_process_incoming(buf, len); 376511b41d2SMark Murray } 3772632b0c8SKris Kennaway } 378a04a10f8SKris Kennaway if (compat20) 379a04a10f8SKris Kennaway return; 380a04a10f8SKris Kennaway 381511b41d2SMark Murray /* Read and buffer any available stdout data from the program. */ 382511b41d2SMark Murray if (!fdout_eof && FD_ISSET(fdout, readset)) { 383511b41d2SMark Murray len = read(fdout, buf, sizeof(buf)); 3842632b0c8SKris Kennaway if (len < 0 && (errno == EINTR || errno == EAGAIN)) { 3852632b0c8SKris Kennaway /* do nothing */ 3862632b0c8SKris Kennaway } else if (len <= 0) { 387511b41d2SMark Murray fdout_eof = 1; 3882632b0c8SKris Kennaway } else { 389511b41d2SMark Murray buffer_append(&stdout_buffer, buf, len); 390511b41d2SMark Murray fdout_bytes += len; 391511b41d2SMark Murray } 392511b41d2SMark Murray } 393511b41d2SMark Murray /* Read and buffer any available stderr data from the program. */ 394511b41d2SMark Murray if (!fderr_eof && FD_ISSET(fderr, readset)) { 395511b41d2SMark Murray len = read(fderr, buf, sizeof(buf)); 3962632b0c8SKris Kennaway if (len < 0 && (errno == EINTR || errno == EAGAIN)) { 3972632b0c8SKris Kennaway /* do nothing */ 3982632b0c8SKris Kennaway } else if (len <= 0) { 399511b41d2SMark Murray fderr_eof = 1; 4002632b0c8SKris Kennaway } else { 401511b41d2SMark Murray buffer_append(&stderr_buffer, buf, len); 402511b41d2SMark Murray } 403511b41d2SMark Murray } 4042632b0c8SKris Kennaway } 405511b41d2SMark Murray 406511b41d2SMark Murray /* 407511b41d2SMark Murray * Sends data from internal buffers to client program stdin. 408511b41d2SMark Murray */ 409af12a3e7SDag-Erling Smørgrav static void 410511b41d2SMark Murray process_output(fd_set * writeset) 411511b41d2SMark Murray { 412e0fbb1d2SBrian Feldman struct termios tio; 413af12a3e7SDag-Erling Smørgrav u_char *data; 414af12a3e7SDag-Erling Smørgrav u_int dlen; 415511b41d2SMark Murray int len; 416511b41d2SMark Murray 417511b41d2SMark Murray /* Write buffered data to program stdin. */ 418a04a10f8SKris Kennaway if (!compat20 && fdin != -1 && FD_ISSET(fdin, writeset)) { 419af12a3e7SDag-Erling Smørgrav data = buffer_ptr(&stdin_buffer); 420af12a3e7SDag-Erling Smørgrav dlen = buffer_len(&stdin_buffer); 421af12a3e7SDag-Erling Smørgrav len = write(fdin, data, dlen); 4222632b0c8SKris Kennaway if (len < 0 && (errno == EINTR || errno == EAGAIN)) { 4232632b0c8SKris Kennaway /* do nothing */ 4242632b0c8SKris Kennaway } else if (len <= 0) { 425a04a10f8SKris Kennaway if (fdin != fdout) 426511b41d2SMark Murray close(fdin); 427511b41d2SMark Murray else 428511b41d2SMark Murray shutdown(fdin, SHUT_WR); /* We will no longer send. */ 429511b41d2SMark Murray fdin = -1; 430511b41d2SMark Murray } else { 431e0fbb1d2SBrian Feldman /* Successful write. */ 432af12a3e7SDag-Erling Smørgrav if (fdin_is_tty && dlen >= 1 && data[0] != '\r' && 433af12a3e7SDag-Erling Smørgrav tcgetattr(fdin, &tio) == 0 && 434e0fbb1d2SBrian Feldman !(tio.c_lflag & ECHO) && (tio.c_lflag & ICANON)) { 435e0fbb1d2SBrian Feldman /* 436e0fbb1d2SBrian Feldman * Simulate echo to reduce the impact of 437e0fbb1d2SBrian Feldman * traffic analysis 438e0fbb1d2SBrian Feldman */ 439ca3176e7SBrian Feldman packet_send_ignore(len); 440e0fbb1d2SBrian Feldman packet_send(); 441e0fbb1d2SBrian Feldman } 442e0fbb1d2SBrian Feldman /* Consume the data from the buffer. */ 443511b41d2SMark Murray buffer_consume(&stdin_buffer, len); 444511b41d2SMark Murray /* Update the count of bytes written to the program. */ 445511b41d2SMark Murray stdin_bytes += len; 446511b41d2SMark Murray } 447511b41d2SMark Murray } 448511b41d2SMark Murray /* Send any buffered packet data to the client. */ 449511b41d2SMark Murray if (FD_ISSET(connection_out, writeset)) 450511b41d2SMark Murray packet_write_poll(); 451511b41d2SMark Murray } 452511b41d2SMark Murray 453511b41d2SMark Murray /* 454511b41d2SMark Murray * Wait until all buffered output has been sent to the client. 455511b41d2SMark Murray * This is used when the program terminates. 456511b41d2SMark Murray */ 457af12a3e7SDag-Erling Smørgrav static void 458ca3176e7SBrian Feldman drain_output(void) 459511b41d2SMark Murray { 460511b41d2SMark Murray /* Send any buffered stdout data to the client. */ 461511b41d2SMark Murray if (buffer_len(&stdout_buffer) > 0) { 462511b41d2SMark Murray packet_start(SSH_SMSG_STDOUT_DATA); 463511b41d2SMark Murray packet_put_string(buffer_ptr(&stdout_buffer), 464511b41d2SMark Murray buffer_len(&stdout_buffer)); 465511b41d2SMark Murray packet_send(); 466511b41d2SMark Murray /* Update the count of sent bytes. */ 467511b41d2SMark Murray stdout_bytes += buffer_len(&stdout_buffer); 468511b41d2SMark Murray } 469511b41d2SMark Murray /* Send any buffered stderr data to the client. */ 470511b41d2SMark Murray if (buffer_len(&stderr_buffer) > 0) { 471511b41d2SMark Murray packet_start(SSH_SMSG_STDERR_DATA); 472511b41d2SMark Murray packet_put_string(buffer_ptr(&stderr_buffer), 473511b41d2SMark Murray buffer_len(&stderr_buffer)); 474511b41d2SMark Murray packet_send(); 475511b41d2SMark Murray /* Update the count of sent bytes. */ 476511b41d2SMark Murray stderr_bytes += buffer_len(&stderr_buffer); 477511b41d2SMark Murray } 478511b41d2SMark Murray /* Wait until all buffered data has been written to the client. */ 479511b41d2SMark Murray packet_write_wait(); 480511b41d2SMark Murray } 481511b41d2SMark Murray 482af12a3e7SDag-Erling Smørgrav static void 483ca3176e7SBrian Feldman process_buffered_input_packets(void) 484a04a10f8SKris Kennaway { 485ca3176e7SBrian Feldman dispatch_run(DISPATCH_NONBLOCK, NULL, compat20 ? xxx_kex : NULL); 486a04a10f8SKris Kennaway } 487a04a10f8SKris Kennaway 488511b41d2SMark Murray /* 489511b41d2SMark Murray * Performs the interactive session. This handles data transmission between 490511b41d2SMark Murray * the client and the program. Note that the notion of stdin, stdout, and 491511b41d2SMark Murray * stderr in this function is sort of reversed: this function writes to 492511b41d2SMark Murray * stdin (of the child program), and reads from stdout and stderr (of the 493511b41d2SMark Murray * child program). 494511b41d2SMark Murray */ 495511b41d2SMark Murray void 496a04a10f8SKris Kennaway server_loop(pid_t pid, int fdin_arg, int fdout_arg, int fderr_arg) 497511b41d2SMark Murray { 498ca3176e7SBrian Feldman fd_set *readset = NULL, *writeset = NULL; 49921e764dfSDag-Erling Smørgrav int max_fd = 0; 50021e764dfSDag-Erling Smørgrav u_int nalloc = 0; 501a04a10f8SKris Kennaway int wait_status; /* Status returned by wait(). */ 502a04a10f8SKris Kennaway pid_t wait_pid; /* pid returned by wait(). */ 503511b41d2SMark Murray int waiting_termination = 0; /* Have displayed waiting close message. */ 504ca3176e7SBrian Feldman u_int max_time_milliseconds; 505ca3176e7SBrian Feldman u_int previous_stdout_buffer_bytes; 506ca3176e7SBrian Feldman u_int stdout_buffer_bytes; 507511b41d2SMark Murray int type; 508511b41d2SMark Murray 509511b41d2SMark Murray debug("Entering interactive session."); 510511b41d2SMark Murray 511511b41d2SMark Murray /* Initialize the SIGCHLD kludge. */ 512511b41d2SMark Murray child_terminated = 0; 513989dd127SDag-Erling Smørgrav mysignal(SIGCHLD, sigchld_handler); 514511b41d2SMark Murray 515b74df5b2SDag-Erling Smørgrav if (!use_privsep) { 516b74df5b2SDag-Erling Smørgrav signal(SIGTERM, sigterm_handler); 517b74df5b2SDag-Erling Smørgrav signal(SIGINT, sigterm_handler); 518b74df5b2SDag-Erling Smørgrav signal(SIGQUIT, sigterm_handler); 519b74df5b2SDag-Erling Smørgrav } 520b74df5b2SDag-Erling Smørgrav 521511b41d2SMark Murray /* Initialize our global variables. */ 522511b41d2SMark Murray fdin = fdin_arg; 523511b41d2SMark Murray fdout = fdout_arg; 524511b41d2SMark Murray fderr = fderr_arg; 5252632b0c8SKris Kennaway 5262632b0c8SKris Kennaway /* nonblocking IO */ 5272632b0c8SKris Kennaway set_nonblock(fdin); 5282632b0c8SKris Kennaway set_nonblock(fdout); 5292632b0c8SKris Kennaway /* we don't have stderr for interactive terminal sessions, see below */ 5302632b0c8SKris Kennaway if (fderr != -1) 5312632b0c8SKris Kennaway set_nonblock(fderr); 5322632b0c8SKris Kennaway 533e0fbb1d2SBrian Feldman if (!(datafellows & SSH_BUG_IGNOREMSG) && isatty(fdin)) 534e0fbb1d2SBrian Feldman fdin_is_tty = 1; 535e0fbb1d2SBrian Feldman 536511b41d2SMark Murray connection_in = packet_get_connection_in(); 537511b41d2SMark Murray connection_out = packet_get_connection_out(); 538511b41d2SMark Murray 539af12a3e7SDag-Erling Smørgrav notify_setup(); 540af12a3e7SDag-Erling Smørgrav 541511b41d2SMark Murray previous_stdout_buffer_bytes = 0; 542511b41d2SMark Murray 543511b41d2SMark Murray /* Set approximate I/O buffer size. */ 544511b41d2SMark Murray if (packet_is_interactive()) 545511b41d2SMark Murray buffer_high = 4096; 546511b41d2SMark Murray else 547511b41d2SMark Murray buffer_high = 64 * 1024; 548511b41d2SMark Murray 549af12a3e7SDag-Erling Smørgrav #if 0 550511b41d2SMark Murray /* Initialize max_fd to the maximum of the known file descriptors. */ 551af12a3e7SDag-Erling Smørgrav max_fd = MAX(connection_in, connection_out); 552af12a3e7SDag-Erling Smørgrav max_fd = MAX(max_fd, fdin); 553af12a3e7SDag-Erling Smørgrav max_fd = MAX(max_fd, fdout); 554ca3176e7SBrian Feldman if (fderr != -1) 555ca3176e7SBrian Feldman max_fd = MAX(max_fd, fderr); 556af12a3e7SDag-Erling Smørgrav #endif 557511b41d2SMark Murray 558511b41d2SMark Murray /* Initialize Initialize buffers. */ 559511b41d2SMark Murray buffer_init(&stdin_buffer); 560511b41d2SMark Murray buffer_init(&stdout_buffer); 561511b41d2SMark Murray buffer_init(&stderr_buffer); 562511b41d2SMark Murray 563511b41d2SMark Murray /* 564511b41d2SMark Murray * If we have no separate fderr (which is the case when we have a pty 565511b41d2SMark Murray * - there we cannot make difference between data sent to stdout and 566511b41d2SMark Murray * stderr), indicate that we have seen an EOF from stderr. This way 567b74df5b2SDag-Erling Smørgrav * we don't need to check the descriptor everywhere. 568511b41d2SMark Murray */ 569511b41d2SMark Murray if (fderr == -1) 570511b41d2SMark Murray fderr_eof = 1; 571511b41d2SMark Murray 572a04a10f8SKris Kennaway server_init_dispatch(); 573a04a10f8SKris Kennaway 574511b41d2SMark Murray /* Main loop of the server for the interactive session mode. */ 575511b41d2SMark Murray for (;;) { 576511b41d2SMark Murray 577511b41d2SMark Murray /* Process buffered packets from the client. */ 578511b41d2SMark Murray process_buffered_input_packets(); 579511b41d2SMark Murray 580511b41d2SMark Murray /* 581511b41d2SMark Murray * If we have received eof, and there is no more pending 582511b41d2SMark Murray * input data, cause a real eof by closing fdin. 583511b41d2SMark Murray */ 584511b41d2SMark Murray if (stdin_eof && fdin != -1 && buffer_len(&stdin_buffer) == 0) { 585a04a10f8SKris Kennaway if (fdin != fdout) 586511b41d2SMark Murray close(fdin); 587511b41d2SMark Murray else 588511b41d2SMark Murray shutdown(fdin, SHUT_WR); /* We will no longer send. */ 589511b41d2SMark Murray fdin = -1; 590511b41d2SMark Murray } 591511b41d2SMark Murray /* Make packets from buffered stderr data to send to the client. */ 592511b41d2SMark Murray make_packets_from_stderr_data(); 593511b41d2SMark Murray 594511b41d2SMark Murray /* 595511b41d2SMark Murray * Make packets from buffered stdout data to send to the 596511b41d2SMark Murray * client. If there is very little to send, this arranges to 597511b41d2SMark Murray * not send them now, but to wait a short while to see if we 598511b41d2SMark Murray * are getting more data. This is necessary, as some systems 599511b41d2SMark Murray * wake up readers from a pty after each separate character. 600511b41d2SMark Murray */ 601511b41d2SMark Murray max_time_milliseconds = 0; 602511b41d2SMark Murray stdout_buffer_bytes = buffer_len(&stdout_buffer); 603511b41d2SMark Murray if (stdout_buffer_bytes != 0 && stdout_buffer_bytes < 256 && 604511b41d2SMark Murray stdout_buffer_bytes != previous_stdout_buffer_bytes) { 605511b41d2SMark Murray /* try again after a while */ 606511b41d2SMark Murray max_time_milliseconds = 10; 607511b41d2SMark Murray } else { 608511b41d2SMark Murray /* Send it now. */ 609511b41d2SMark Murray make_packets_from_stdout_data(); 610511b41d2SMark Murray } 611511b41d2SMark Murray previous_stdout_buffer_bytes = buffer_len(&stdout_buffer); 612511b41d2SMark Murray 613511b41d2SMark Murray /* Send channel data to the client. */ 614511b41d2SMark Murray if (packet_not_very_much_data_to_write()) 615511b41d2SMark Murray channel_output_poll(); 616511b41d2SMark Murray 617511b41d2SMark Murray /* 618511b41d2SMark Murray * Bail out of the loop if the program has closed its output 619511b41d2SMark Murray * descriptors, and we have no more data to send to the 620511b41d2SMark Murray * client, and there is no pending buffered data. 621511b41d2SMark Murray */ 622511b41d2SMark Murray if (fdout_eof && fderr_eof && !packet_have_data_to_write() && 623511b41d2SMark Murray buffer_len(&stdout_buffer) == 0 && buffer_len(&stderr_buffer) == 0) { 624511b41d2SMark Murray if (!channel_still_open()) 625a04a10f8SKris Kennaway break; 626511b41d2SMark Murray if (!waiting_termination) { 627511b41d2SMark Murray const char *s = "Waiting for forwarded connections to terminate...\r\n"; 628511b41d2SMark Murray char *cp; 629511b41d2SMark Murray waiting_termination = 1; 630511b41d2SMark Murray buffer_append(&stderr_buffer, s, strlen(s)); 631511b41d2SMark Murray 632511b41d2SMark Murray /* Display list of open channels. */ 633511b41d2SMark Murray cp = channel_open_message(); 634511b41d2SMark Murray buffer_append(&stderr_buffer, cp, strlen(cp)); 635511b41d2SMark Murray xfree(cp); 636511b41d2SMark Murray } 637511b41d2SMark Murray } 638af12a3e7SDag-Erling Smørgrav max_fd = MAX(connection_in, connection_out); 639af12a3e7SDag-Erling Smørgrav max_fd = MAX(max_fd, fdin); 640af12a3e7SDag-Erling Smørgrav max_fd = MAX(max_fd, fdout); 641af12a3e7SDag-Erling Smørgrav max_fd = MAX(max_fd, fderr); 642af12a3e7SDag-Erling Smørgrav max_fd = MAX(max_fd, notify_pipe[0]); 643af12a3e7SDag-Erling Smørgrav 644511b41d2SMark Murray /* Sleep in select() until we can do something. */ 645ca3176e7SBrian Feldman wait_until_can_do_something(&readset, &writeset, &max_fd, 646af12a3e7SDag-Erling Smørgrav &nalloc, max_time_milliseconds); 647511b41d2SMark Murray 648b74df5b2SDag-Erling Smørgrav if (received_sigterm) { 649b74df5b2SDag-Erling Smørgrav logit("Exiting on signal %d", received_sigterm); 650b74df5b2SDag-Erling Smørgrav /* Clean up sessions, utmp, etc. */ 651b74df5b2SDag-Erling Smørgrav cleanup_exit(255); 652b74df5b2SDag-Erling Smørgrav } 653b74df5b2SDag-Erling Smørgrav 654511b41d2SMark Murray /* Process any channel events. */ 655ca3176e7SBrian Feldman channel_after_select(readset, writeset); 656511b41d2SMark Murray 657511b41d2SMark Murray /* Process input from the client and from program stdout/stderr. */ 658ca3176e7SBrian Feldman process_input(readset); 659511b41d2SMark Murray 660511b41d2SMark Murray /* Process output to the client and to program stdin. */ 661ca3176e7SBrian Feldman process_output(writeset); 662511b41d2SMark Murray } 663ca3176e7SBrian Feldman if (readset) 664ca3176e7SBrian Feldman xfree(readset); 665ca3176e7SBrian Feldman if (writeset) 666ca3176e7SBrian Feldman xfree(writeset); 667511b41d2SMark Murray 668511b41d2SMark Murray /* Cleanup and termination code. */ 669511b41d2SMark Murray 670511b41d2SMark Murray /* Wait until all output has been sent to the client. */ 671511b41d2SMark Murray drain_output(); 672511b41d2SMark Murray 673511b41d2SMark Murray debug("End of interactive session; stdin %ld, stdout (read %ld, sent %ld), stderr %ld bytes.", 674511b41d2SMark Murray stdin_bytes, fdout_bytes, stdout_bytes, stderr_bytes); 675511b41d2SMark Murray 676511b41d2SMark Murray /* Free and clear the buffers. */ 677511b41d2SMark Murray buffer_free(&stdin_buffer); 678511b41d2SMark Murray buffer_free(&stdout_buffer); 679511b41d2SMark Murray buffer_free(&stderr_buffer); 680511b41d2SMark Murray 681511b41d2SMark Murray /* Close the file descriptors. */ 682511b41d2SMark Murray if (fdout != -1) 683511b41d2SMark Murray close(fdout); 684511b41d2SMark Murray fdout = -1; 685511b41d2SMark Murray fdout_eof = 1; 686511b41d2SMark Murray if (fderr != -1) 687511b41d2SMark Murray close(fderr); 688511b41d2SMark Murray fderr = -1; 689511b41d2SMark Murray fderr_eof = 1; 690511b41d2SMark Murray if (fdin != -1) 691511b41d2SMark Murray close(fdin); 692511b41d2SMark Murray fdin = -1; 693511b41d2SMark Murray 694af12a3e7SDag-Erling Smørgrav channel_free_all(); 695511b41d2SMark Murray 696511b41d2SMark Murray /* We no longer want our SIGCHLD handler to be called. */ 697989dd127SDag-Erling Smørgrav mysignal(SIGCHLD, SIG_DFL); 698511b41d2SMark Murray 69980628bacSDag-Erling Smørgrav while ((wait_pid = waitpid(-1, &wait_status, 0)) < 0) 70080628bacSDag-Erling Smørgrav if (errno != EINTR) 701af12a3e7SDag-Erling Smørgrav packet_disconnect("wait: %.100s", strerror(errno)); 70280628bacSDag-Erling Smørgrav if (wait_pid != pid) 70380628bacSDag-Erling Smørgrav error("Strange, wait returned pid %ld, expected %ld", 70480628bacSDag-Erling Smørgrav (long)wait_pid, (long)pid); 705af12a3e7SDag-Erling Smørgrav 706511b41d2SMark Murray /* Check if it exited normally. */ 707511b41d2SMark Murray if (WIFEXITED(wait_status)) { 708511b41d2SMark Murray /* Yes, normal exit. Get exit status and send it to the client. */ 709511b41d2SMark Murray debug("Command exited with status %d.", WEXITSTATUS(wait_status)); 710511b41d2SMark Murray packet_start(SSH_SMSG_EXITSTATUS); 711511b41d2SMark Murray packet_put_int(WEXITSTATUS(wait_status)); 712511b41d2SMark Murray packet_send(); 713511b41d2SMark Murray packet_write_wait(); 714511b41d2SMark Murray 715511b41d2SMark Murray /* 716511b41d2SMark Murray * Wait for exit confirmation. Note that there might be 717511b41d2SMark Murray * other packets coming before it; however, the program has 718511b41d2SMark Murray * already died so we just ignore them. The client is 719511b41d2SMark Murray * supposed to respond with the confirmation when it receives 720511b41d2SMark Murray * the exit status. 721511b41d2SMark Murray */ 722511b41d2SMark Murray do { 723af12a3e7SDag-Erling Smørgrav type = packet_read(); 724511b41d2SMark Murray } 725511b41d2SMark Murray while (type != SSH_CMSG_EXIT_CONFIRMATION); 726511b41d2SMark Murray 727511b41d2SMark Murray debug("Received exit confirmation."); 728511b41d2SMark Murray return; 729511b41d2SMark Murray } 730511b41d2SMark Murray /* Check if the program terminated due to a signal. */ 731511b41d2SMark Murray if (WIFSIGNALED(wait_status)) 732511b41d2SMark Murray packet_disconnect("Command terminated on signal %d.", 733511b41d2SMark Murray WTERMSIG(wait_status)); 734511b41d2SMark Murray 735511b41d2SMark Murray /* Some weird exit cause. Just exit. */ 736511b41d2SMark Murray packet_disconnect("wait returned status %04x.", wait_status); 737511b41d2SMark Murray /* NOTREACHED */ 738511b41d2SMark Murray } 739a04a10f8SKris Kennaway 740af12a3e7SDag-Erling Smørgrav static void 741af12a3e7SDag-Erling Smørgrav collect_children(void) 742af12a3e7SDag-Erling Smørgrav { 743af12a3e7SDag-Erling Smørgrav pid_t pid; 744af12a3e7SDag-Erling Smørgrav sigset_t oset, nset; 745af12a3e7SDag-Erling Smørgrav int status; 746af12a3e7SDag-Erling Smørgrav 747af12a3e7SDag-Erling Smørgrav /* block SIGCHLD while we check for dead children */ 748af12a3e7SDag-Erling Smørgrav sigemptyset(&nset); 749af12a3e7SDag-Erling Smørgrav sigaddset(&nset, SIGCHLD); 750af12a3e7SDag-Erling Smørgrav sigprocmask(SIG_BLOCK, &nset, &oset); 751af12a3e7SDag-Erling Smørgrav if (child_terminated) { 75280628bacSDag-Erling Smørgrav while ((pid = waitpid(-1, &status, WNOHANG)) > 0 || 75380628bacSDag-Erling Smørgrav (pid < 0 && errno == EINTR)) 75480628bacSDag-Erling Smørgrav if (pid > 0) 755af12a3e7SDag-Erling Smørgrav session_close_by_pid(pid, status); 756af12a3e7SDag-Erling Smørgrav child_terminated = 0; 757af12a3e7SDag-Erling Smørgrav } 758af12a3e7SDag-Erling Smørgrav sigprocmask(SIG_SETMASK, &oset, NULL); 759af12a3e7SDag-Erling Smørgrav } 760af12a3e7SDag-Erling Smørgrav 761a04a10f8SKris Kennaway void 762af12a3e7SDag-Erling Smørgrav server_loop2(Authctxt *authctxt) 763a04a10f8SKris Kennaway { 764ca3176e7SBrian Feldman fd_set *readset = NULL, *writeset = NULL; 765af12a3e7SDag-Erling Smørgrav int rekeying = 0, max_fd, nalloc = 0; 766a04a10f8SKris Kennaway 767a04a10f8SKris Kennaway debug("Entering interactive session for SSH2."); 768a04a10f8SKris Kennaway 769989dd127SDag-Erling Smørgrav mysignal(SIGCHLD, sigchld_handler); 770a04a10f8SKris Kennaway child_terminated = 0; 771a04a10f8SKris Kennaway connection_in = packet_get_connection_in(); 772a04a10f8SKris Kennaway connection_out = packet_get_connection_out(); 773ca3176e7SBrian Feldman 774b74df5b2SDag-Erling Smørgrav if (!use_privsep) { 775b74df5b2SDag-Erling Smørgrav signal(SIGTERM, sigterm_handler); 776b74df5b2SDag-Erling Smørgrav signal(SIGINT, sigterm_handler); 777b74df5b2SDag-Erling Smørgrav signal(SIGQUIT, sigterm_handler); 778b74df5b2SDag-Erling Smørgrav } 779b74df5b2SDag-Erling Smørgrav 780af12a3e7SDag-Erling Smørgrav notify_setup(); 781af12a3e7SDag-Erling Smørgrav 782ca3176e7SBrian Feldman max_fd = MAX(connection_in, connection_out); 783af12a3e7SDag-Erling Smørgrav max_fd = MAX(max_fd, notify_pipe[0]); 784af12a3e7SDag-Erling Smørgrav 785a04a10f8SKris Kennaway server_init_dispatch(); 786a04a10f8SKris Kennaway 787a04a10f8SKris Kennaway for (;;) { 788a04a10f8SKris Kennaway process_buffered_input_packets(); 789ca3176e7SBrian Feldman 790ca3176e7SBrian Feldman rekeying = (xxx_kex != NULL && !xxx_kex->done); 791ca3176e7SBrian Feldman 792ca3176e7SBrian Feldman if (!rekeying && packet_not_very_much_data_to_write()) 793a04a10f8SKris Kennaway channel_output_poll(); 794ca3176e7SBrian Feldman wait_until_can_do_something(&readset, &writeset, &max_fd, 795af12a3e7SDag-Erling Smørgrav &nalloc, 0); 796af12a3e7SDag-Erling Smørgrav 797b74df5b2SDag-Erling Smørgrav if (received_sigterm) { 798b74df5b2SDag-Erling Smørgrav logit("Exiting on signal %d", received_sigterm); 799b74df5b2SDag-Erling Smørgrav /* Clean up sessions, utmp, etc. */ 800b74df5b2SDag-Erling Smørgrav cleanup_exit(255); 801b74df5b2SDag-Erling Smørgrav } 802b74df5b2SDag-Erling Smørgrav 803af12a3e7SDag-Erling Smørgrav collect_children(); 804cf2b5f3bSDag-Erling Smørgrav if (!rekeying) { 805ca3176e7SBrian Feldman channel_after_select(readset, writeset); 806cf2b5f3bSDag-Erling Smørgrav if (packet_need_rekeying()) { 807cf2b5f3bSDag-Erling Smørgrav debug("need rekeying"); 808cf2b5f3bSDag-Erling Smørgrav xxx_kex->done = 0; 809cf2b5f3bSDag-Erling Smørgrav kex_send_kexinit(xxx_kex); 810cf2b5f3bSDag-Erling Smørgrav } 811cf2b5f3bSDag-Erling Smørgrav } 812ca3176e7SBrian Feldman process_input(readset); 813ca3176e7SBrian Feldman if (connection_closed) 814ca3176e7SBrian Feldman break; 815ca3176e7SBrian Feldman process_output(writeset); 816a04a10f8SKris Kennaway } 817af12a3e7SDag-Erling Smørgrav collect_children(); 818af12a3e7SDag-Erling Smørgrav 819ca3176e7SBrian Feldman if (readset) 820ca3176e7SBrian Feldman xfree(readset); 821ca3176e7SBrian Feldman if (writeset) 822ca3176e7SBrian Feldman xfree(writeset); 823ca3176e7SBrian Feldman 824af12a3e7SDag-Erling Smørgrav /* free all channels, no more reads and writes */ 825af12a3e7SDag-Erling Smørgrav channel_free_all(); 826af12a3e7SDag-Erling Smørgrav 827af12a3e7SDag-Erling Smørgrav /* free remaining sessions, e.g. remove wtmp entries */ 82880628bacSDag-Erling Smørgrav session_destroy_all(NULL); 829a04a10f8SKris Kennaway } 830a04a10f8SKris Kennaway 831af12a3e7SDag-Erling Smørgrav static void 8321ec0d754SDag-Erling Smørgrav server_input_keep_alive(int type, u_int32_t seq, void *ctxt) 833ca3176e7SBrian Feldman { 8341ec0d754SDag-Erling Smørgrav debug("Got %d/%u for keepalive", type, seq); 835ca3176e7SBrian Feldman /* 836ca3176e7SBrian Feldman * reset timeout, since we got a sane answer from the client. 837ca3176e7SBrian Feldman * even if this was generated by something other than 838ca3176e7SBrian Feldman * the bogus CHANNEL_REQUEST we send for keepalives. 839ca3176e7SBrian Feldman */ 840ca3176e7SBrian Feldman client_alive_timeouts = 0; 841ca3176e7SBrian Feldman } 842ca3176e7SBrian Feldman 843af12a3e7SDag-Erling Smørgrav static void 844af12a3e7SDag-Erling Smørgrav server_input_stdin_data(int type, u_int32_t seq, void *ctxt) 845a04a10f8SKris Kennaway { 846a04a10f8SKris Kennaway char *data; 847ca3176e7SBrian Feldman u_int data_len; 848a04a10f8SKris Kennaway 849a04a10f8SKris Kennaway /* Stdin data from the client. Append it to the buffer. */ 850a04a10f8SKris Kennaway /* Ignore any data if the client has closed stdin. */ 851a04a10f8SKris Kennaway if (fdin == -1) 852a04a10f8SKris Kennaway return; 853a04a10f8SKris Kennaway data = packet_get_string(&data_len); 854af12a3e7SDag-Erling Smørgrav packet_check_eom(); 855a04a10f8SKris Kennaway buffer_append(&stdin_buffer, data, data_len); 856a04a10f8SKris Kennaway memset(data, 0, data_len); 857a04a10f8SKris Kennaway xfree(data); 858a04a10f8SKris Kennaway } 859a04a10f8SKris Kennaway 860af12a3e7SDag-Erling Smørgrav static void 861af12a3e7SDag-Erling Smørgrav server_input_eof(int type, u_int32_t seq, void *ctxt) 862a04a10f8SKris Kennaway { 863a04a10f8SKris Kennaway /* 864a04a10f8SKris Kennaway * Eof from the client. The stdin descriptor to the 865a04a10f8SKris Kennaway * program will be closed when all buffered data has 866a04a10f8SKris Kennaway * drained. 867a04a10f8SKris Kennaway */ 868a04a10f8SKris Kennaway debug("EOF received for stdin."); 869af12a3e7SDag-Erling Smørgrav packet_check_eom(); 870a04a10f8SKris Kennaway stdin_eof = 1; 871a04a10f8SKris Kennaway } 872a04a10f8SKris Kennaway 873af12a3e7SDag-Erling Smørgrav static void 874af12a3e7SDag-Erling Smørgrav server_input_window_size(int type, u_int32_t seq, void *ctxt) 875a04a10f8SKris Kennaway { 876a04a10f8SKris Kennaway int row = packet_get_int(); 877a04a10f8SKris Kennaway int col = packet_get_int(); 878a04a10f8SKris Kennaway int xpixel = packet_get_int(); 879a04a10f8SKris Kennaway int ypixel = packet_get_int(); 880a04a10f8SKris Kennaway 881a04a10f8SKris Kennaway debug("Window change received."); 882af12a3e7SDag-Erling Smørgrav packet_check_eom(); 883a04a10f8SKris Kennaway if (fdin != -1) 884a04a10f8SKris Kennaway pty_change_window_size(fdin, row, col, xpixel, ypixel); 885a04a10f8SKris Kennaway } 886a04a10f8SKris Kennaway 887af12a3e7SDag-Erling Smørgrav static Channel * 8881ec0d754SDag-Erling Smørgrav server_request_direct_tcpip(void) 889a04a10f8SKris Kennaway { 890af12a3e7SDag-Erling Smørgrav Channel *c; 891af12a3e7SDag-Erling Smørgrav int sock; 892a04a10f8SKris Kennaway char *target, *originator; 893a04a10f8SKris Kennaway int target_port, originator_port; 894a04a10f8SKris Kennaway 895a04a10f8SKris Kennaway target = packet_get_string(NULL); 896a04a10f8SKris Kennaway target_port = packet_get_int(); 897a04a10f8SKris Kennaway originator = packet_get_string(NULL); 898a04a10f8SKris Kennaway originator_port = packet_get_int(); 899af12a3e7SDag-Erling Smørgrav packet_check_eom(); 9002632b0c8SKris Kennaway 901ca3176e7SBrian Feldman debug("server_request_direct_tcpip: originator %s port %d, target %s port %d", 9022632b0c8SKris Kennaway originator, originator_port, target, target_port); 903b66f2d16SKris Kennaway 904a04a10f8SKris Kennaway /* XXX check permission */ 905a04a10f8SKris Kennaway sock = channel_connect_to(target, target_port); 906a04a10f8SKris Kennaway xfree(target); 907a04a10f8SKris Kennaway xfree(originator); 908a04a10f8SKris Kennaway if (sock < 0) 909ca3176e7SBrian Feldman return NULL; 9101ec0d754SDag-Erling Smørgrav c = channel_new("direct-tcpip", SSH_CHANNEL_CONNECTING, 911b66f2d16SKris Kennaway sock, sock, -1, CHAN_TCP_WINDOW_DEFAULT, 912cf2b5f3bSDag-Erling Smørgrav CHAN_TCP_PACKET_DEFAULT, 0, "direct-tcpip", 1); 913af12a3e7SDag-Erling Smørgrav return c; 914ca3176e7SBrian Feldman } 915ca3176e7SBrian Feldman 916af12a3e7SDag-Erling Smørgrav static Channel * 917b74df5b2SDag-Erling Smørgrav server_request_tun(void) 918b74df5b2SDag-Erling Smørgrav { 919b74df5b2SDag-Erling Smørgrav Channel *c = NULL; 920b74df5b2SDag-Erling Smørgrav int mode, tun; 921b74df5b2SDag-Erling Smørgrav int sock; 922b74df5b2SDag-Erling Smørgrav 923b74df5b2SDag-Erling Smørgrav mode = packet_get_int(); 924b74df5b2SDag-Erling Smørgrav switch (mode) { 925b74df5b2SDag-Erling Smørgrav case SSH_TUNMODE_POINTOPOINT: 926b74df5b2SDag-Erling Smørgrav case SSH_TUNMODE_ETHERNET: 927b74df5b2SDag-Erling Smørgrav break; 928b74df5b2SDag-Erling Smørgrav default: 929b74df5b2SDag-Erling Smørgrav packet_send_debug("Unsupported tunnel device mode."); 930b74df5b2SDag-Erling Smørgrav return NULL; 931b74df5b2SDag-Erling Smørgrav } 932b74df5b2SDag-Erling Smørgrav if ((options.permit_tun & mode) == 0) { 933b74df5b2SDag-Erling Smørgrav packet_send_debug("Server has rejected tunnel device " 934b74df5b2SDag-Erling Smørgrav "forwarding"); 935b74df5b2SDag-Erling Smørgrav return NULL; 936b74df5b2SDag-Erling Smørgrav } 937b74df5b2SDag-Erling Smørgrav 938b74df5b2SDag-Erling Smørgrav tun = packet_get_int(); 939b74df5b2SDag-Erling Smørgrav if (forced_tun_device != -1) { 940b74df5b2SDag-Erling Smørgrav if (tun != SSH_TUNID_ANY && forced_tun_device != tun) 941b74df5b2SDag-Erling Smørgrav goto done; 942b74df5b2SDag-Erling Smørgrav tun = forced_tun_device; 943b74df5b2SDag-Erling Smørgrav } 944b74df5b2SDag-Erling Smørgrav sock = tun_open(tun, mode); 945b74df5b2SDag-Erling Smørgrav if (sock < 0) 946b74df5b2SDag-Erling Smørgrav goto done; 947b74df5b2SDag-Erling Smørgrav c = channel_new("tun", SSH_CHANNEL_OPEN, sock, sock, -1, 948b74df5b2SDag-Erling Smørgrav CHAN_TCP_WINDOW_DEFAULT, CHAN_TCP_PACKET_DEFAULT, 0, "tun", 1); 949b74df5b2SDag-Erling Smørgrav c->datagram = 1; 950b74df5b2SDag-Erling Smørgrav #if defined(SSH_TUN_FILTER) 951b74df5b2SDag-Erling Smørgrav if (mode == SSH_TUNMODE_POINTOPOINT) 952b74df5b2SDag-Erling Smørgrav channel_register_filter(c->self, sys_tun_infilter, 953b74df5b2SDag-Erling Smørgrav sys_tun_outfilter); 954b74df5b2SDag-Erling Smørgrav #endif 955b74df5b2SDag-Erling Smørgrav 956b74df5b2SDag-Erling Smørgrav done: 957b74df5b2SDag-Erling Smørgrav if (c == NULL) 958b74df5b2SDag-Erling Smørgrav packet_send_debug("Failed to open the tunnel device."); 959b74df5b2SDag-Erling Smørgrav return c; 960b74df5b2SDag-Erling Smørgrav } 961b74df5b2SDag-Erling Smørgrav 962b74df5b2SDag-Erling Smørgrav static Channel * 9631ec0d754SDag-Erling Smørgrav server_request_session(void) 964ca3176e7SBrian Feldman { 965af12a3e7SDag-Erling Smørgrav Channel *c; 966ca3176e7SBrian Feldman 967ca3176e7SBrian Feldman debug("input_session_request"); 968af12a3e7SDag-Erling Smørgrav packet_check_eom(); 969ca3176e7SBrian Feldman /* 970ca3176e7SBrian Feldman * A server session has no fd to read or write until a 971ca3176e7SBrian Feldman * CHANNEL_REQUEST for a shell is made, so we set the type to 972ca3176e7SBrian Feldman * SSH_CHANNEL_LARVAL. Additionally, a callback for handling all 973ca3176e7SBrian Feldman * CHANNEL_REQUEST messages is registered. 974ca3176e7SBrian Feldman */ 9751ec0d754SDag-Erling Smørgrav c = channel_new("session", SSH_CHANNEL_LARVAL, 976af12a3e7SDag-Erling Smørgrav -1, -1, -1, /*window size*/0, CHAN_SES_PACKET_DEFAULT, 977cf2b5f3bSDag-Erling Smørgrav 0, "server-session", 1); 9781ec0d754SDag-Erling Smørgrav if (session_open(the_authctxt, c->self) != 1) { 979af12a3e7SDag-Erling Smørgrav debug("session open failed, free channel %d", c->self); 980af12a3e7SDag-Erling Smørgrav channel_free(c); 981ca3176e7SBrian Feldman return NULL; 982a04a10f8SKris Kennaway } 983b74df5b2SDag-Erling Smørgrav channel_register_cleanup(c->self, session_close_by_channel, 0); 984af12a3e7SDag-Erling Smørgrav return c; 985af12a3e7SDag-Erling Smørgrav } 986a04a10f8SKris Kennaway 987af12a3e7SDag-Erling Smørgrav static void 988af12a3e7SDag-Erling Smørgrav server_input_channel_open(int type, u_int32_t seq, void *ctxt) 989a04a10f8SKris Kennaway { 990a04a10f8SKris Kennaway Channel *c = NULL; 991a04a10f8SKris Kennaway char *ctype; 992a04a10f8SKris Kennaway int rchan; 993a82e551fSDag-Erling Smørgrav u_int rmaxpack, rwindow, len; 994a04a10f8SKris Kennaway 995a04a10f8SKris Kennaway ctype = packet_get_string(&len); 996a04a10f8SKris Kennaway rchan = packet_get_int(); 997a04a10f8SKris Kennaway rwindow = packet_get_int(); 998a04a10f8SKris Kennaway rmaxpack = packet_get_int(); 999a04a10f8SKris Kennaway 10005b9b2fafSBrian Feldman debug("server_input_channel_open: ctype %s rchan %d win %d max %d", 1001a04a10f8SKris Kennaway ctype, rchan, rwindow, rmaxpack); 1002a04a10f8SKris Kennaway 1003a04a10f8SKris Kennaway if (strcmp(ctype, "session") == 0) { 10041ec0d754SDag-Erling Smørgrav c = server_request_session(); 1005a04a10f8SKris Kennaway } else if (strcmp(ctype, "direct-tcpip") == 0) { 10061ec0d754SDag-Erling Smørgrav c = server_request_direct_tcpip(); 1007b74df5b2SDag-Erling Smørgrav } else if (strcmp(ctype, "tun@openssh.com") == 0) { 1008b74df5b2SDag-Erling Smørgrav c = server_request_tun(); 1009a04a10f8SKris Kennaway } 1010a04a10f8SKris Kennaway if (c != NULL) { 1011ca3176e7SBrian Feldman debug("server_input_channel_open: confirm %s", ctype); 1012a04a10f8SKris Kennaway c->remote_id = rchan; 1013a04a10f8SKris Kennaway c->remote_window = rwindow; 1014a04a10f8SKris Kennaway c->remote_maxpacket = rmaxpack; 1015af12a3e7SDag-Erling Smørgrav if (c->type != SSH_CHANNEL_CONNECTING) { 1016a04a10f8SKris Kennaway packet_start(SSH2_MSG_CHANNEL_OPEN_CONFIRMATION); 1017a04a10f8SKris Kennaway packet_put_int(c->remote_id); 1018a04a10f8SKris Kennaway packet_put_int(c->self); 1019a04a10f8SKris Kennaway packet_put_int(c->local_window); 1020a04a10f8SKris Kennaway packet_put_int(c->local_maxpacket); 1021a04a10f8SKris Kennaway packet_send(); 1022af12a3e7SDag-Erling Smørgrav } 1023a04a10f8SKris Kennaway } else { 1024ca3176e7SBrian Feldman debug("server_input_channel_open: failure %s", ctype); 1025a04a10f8SKris Kennaway packet_start(SSH2_MSG_CHANNEL_OPEN_FAILURE); 1026a04a10f8SKris Kennaway packet_put_int(rchan); 1027a04a10f8SKris Kennaway packet_put_int(SSH2_OPEN_ADMINISTRATIVELY_PROHIBITED); 1028af12a3e7SDag-Erling Smørgrav if (!(datafellows & SSH_BUG_OPENFAILURE)) { 1029af12a3e7SDag-Erling Smørgrav packet_put_cstring("open failed"); 1030a04a10f8SKris Kennaway packet_put_cstring(""); 1031af12a3e7SDag-Erling Smørgrav } 1032a04a10f8SKris Kennaway packet_send(); 1033a04a10f8SKris Kennaway } 1034a04a10f8SKris Kennaway xfree(ctype); 1035a04a10f8SKris Kennaway } 1036a04a10f8SKris Kennaway 1037af12a3e7SDag-Erling Smørgrav static void 1038af12a3e7SDag-Erling Smørgrav server_input_global_request(int type, u_int32_t seq, void *ctxt) 1039ca3176e7SBrian Feldman { 1040ca3176e7SBrian Feldman char *rtype; 1041ca3176e7SBrian Feldman int want_reply; 1042ca3176e7SBrian Feldman int success = 0; 1043ca3176e7SBrian Feldman 1044ca3176e7SBrian Feldman rtype = packet_get_string(NULL); 1045ca3176e7SBrian Feldman want_reply = packet_get_char(); 1046ca3176e7SBrian Feldman debug("server_input_global_request: rtype %s want_reply %d", rtype, want_reply); 1047ca3176e7SBrian Feldman 1048ca3176e7SBrian Feldman /* -R style forwarding */ 1049ca3176e7SBrian Feldman if (strcmp(rtype, "tcpip-forward") == 0) { 1050ca3176e7SBrian Feldman struct passwd *pw; 1051ca3176e7SBrian Feldman char *listen_address; 1052ca3176e7SBrian Feldman u_short listen_port; 1053ca3176e7SBrian Feldman 10541ec0d754SDag-Erling Smørgrav pw = the_authctxt->pw; 10551ec0d754SDag-Erling Smørgrav if (pw == NULL || !the_authctxt->valid) 10561ec0d754SDag-Erling Smørgrav fatal("server_input_global_request: no/invalid user"); 1057cf2b5f3bSDag-Erling Smørgrav listen_address = packet_get_string(NULL); 1058ca3176e7SBrian Feldman listen_port = (u_short)packet_get_int(); 1059ca3176e7SBrian Feldman debug("server_input_global_request: tcpip-forward listen %s port %d", 1060ca3176e7SBrian Feldman listen_address, listen_port); 1061ca3176e7SBrian Feldman 1062ca3176e7SBrian Feldman /* check permissions */ 1063ca3176e7SBrian Feldman if (!options.allow_tcp_forwarding || 1064f388f5efSDag-Erling Smørgrav no_port_forwarding_flag 1065f388f5efSDag-Erling Smørgrav #ifndef NO_IPPORT_RESERVED_CONCEPT 1066f388f5efSDag-Erling Smørgrav || (listen_port < IPPORT_RESERVED && pw->pw_uid != 0) 1067f388f5efSDag-Erling Smørgrav #endif 1068f388f5efSDag-Erling Smørgrav ) { 1069ca3176e7SBrian Feldman success = 0; 1070ca3176e7SBrian Feldman packet_send_debug("Server has disabled port forwarding."); 1071ca3176e7SBrian Feldman } else { 1072ca3176e7SBrian Feldman /* Start listening on the port */ 1073af12a3e7SDag-Erling Smørgrav success = channel_setup_remote_fwd_listener( 1074af12a3e7SDag-Erling Smørgrav listen_address, listen_port, options.gateway_ports); 1075ca3176e7SBrian Feldman } 1076ca3176e7SBrian Feldman xfree(listen_address); 107721e764dfSDag-Erling Smørgrav } else if (strcmp(rtype, "cancel-tcpip-forward") == 0) { 107821e764dfSDag-Erling Smørgrav char *cancel_address; 107921e764dfSDag-Erling Smørgrav u_short cancel_port; 108021e764dfSDag-Erling Smørgrav 108121e764dfSDag-Erling Smørgrav cancel_address = packet_get_string(NULL); 108221e764dfSDag-Erling Smørgrav cancel_port = (u_short)packet_get_int(); 108321e764dfSDag-Erling Smørgrav debug("%s: cancel-tcpip-forward addr %s port %d", __func__, 108421e764dfSDag-Erling Smørgrav cancel_address, cancel_port); 108521e764dfSDag-Erling Smørgrav 108621e764dfSDag-Erling Smørgrav success = channel_cancel_rport_listener(cancel_address, 108721e764dfSDag-Erling Smørgrav cancel_port); 1088ca3176e7SBrian Feldman } 1089ca3176e7SBrian Feldman if (want_reply) { 1090ca3176e7SBrian Feldman packet_start(success ? 1091ca3176e7SBrian Feldman SSH2_MSG_REQUEST_SUCCESS : SSH2_MSG_REQUEST_FAILURE); 1092ca3176e7SBrian Feldman packet_send(); 1093ca3176e7SBrian Feldman packet_write_wait(); 1094ca3176e7SBrian Feldman } 1095ca3176e7SBrian Feldman xfree(rtype); 1096ca3176e7SBrian Feldman } 1097af12a3e7SDag-Erling Smørgrav static void 1098af12a3e7SDag-Erling Smørgrav server_input_channel_req(int type, u_int32_t seq, void *ctxt) 1099af12a3e7SDag-Erling Smørgrav { 1100af12a3e7SDag-Erling Smørgrav Channel *c; 1101af12a3e7SDag-Erling Smørgrav int id, reply, success = 0; 1102af12a3e7SDag-Erling Smørgrav char *rtype; 1103ca3176e7SBrian Feldman 1104af12a3e7SDag-Erling Smørgrav id = packet_get_int(); 1105af12a3e7SDag-Erling Smørgrav rtype = packet_get_string(NULL); 1106af12a3e7SDag-Erling Smørgrav reply = packet_get_char(); 1107af12a3e7SDag-Erling Smørgrav 1108af12a3e7SDag-Erling Smørgrav debug("server_input_channel_req: channel %d request %s reply %d", 1109af12a3e7SDag-Erling Smørgrav id, rtype, reply); 1110af12a3e7SDag-Erling Smørgrav 1111af12a3e7SDag-Erling Smørgrav if ((c = channel_lookup(id)) == NULL) 1112af12a3e7SDag-Erling Smørgrav packet_disconnect("server_input_channel_req: " 1113af12a3e7SDag-Erling Smørgrav "unknown channel %d", id); 1114af12a3e7SDag-Erling Smørgrav if (c->type == SSH_CHANNEL_LARVAL || c->type == SSH_CHANNEL_OPEN) 1115af12a3e7SDag-Erling Smørgrav success = session_input_channel_req(c, rtype); 1116af12a3e7SDag-Erling Smørgrav if (reply) { 1117af12a3e7SDag-Erling Smørgrav packet_start(success ? 1118af12a3e7SDag-Erling Smørgrav SSH2_MSG_CHANNEL_SUCCESS : SSH2_MSG_CHANNEL_FAILURE); 1119af12a3e7SDag-Erling Smørgrav packet_put_int(c->remote_id); 1120af12a3e7SDag-Erling Smørgrav packet_send(); 1121af12a3e7SDag-Erling Smørgrav } 1122af12a3e7SDag-Erling Smørgrav xfree(rtype); 1123af12a3e7SDag-Erling Smørgrav } 1124af12a3e7SDag-Erling Smørgrav 1125af12a3e7SDag-Erling Smørgrav static void 1126ca3176e7SBrian Feldman server_init_dispatch_20(void) 1127a04a10f8SKris Kennaway { 1128a04a10f8SKris Kennaway debug("server_init_dispatch_20"); 1129a04a10f8SKris Kennaway dispatch_init(&dispatch_protocol_error); 1130a04a10f8SKris Kennaway dispatch_set(SSH2_MSG_CHANNEL_CLOSE, &channel_input_oclose); 1131a04a10f8SKris Kennaway dispatch_set(SSH2_MSG_CHANNEL_DATA, &channel_input_data); 1132a04a10f8SKris Kennaway dispatch_set(SSH2_MSG_CHANNEL_EOF, &channel_input_ieof); 1133a04a10f8SKris Kennaway dispatch_set(SSH2_MSG_CHANNEL_EXTENDED_DATA, &channel_input_extended_data); 1134a04a10f8SKris Kennaway dispatch_set(SSH2_MSG_CHANNEL_OPEN, &server_input_channel_open); 1135a04a10f8SKris Kennaway dispatch_set(SSH2_MSG_CHANNEL_OPEN_CONFIRMATION, &channel_input_open_confirmation); 1136a04a10f8SKris Kennaway dispatch_set(SSH2_MSG_CHANNEL_OPEN_FAILURE, &channel_input_open_failure); 1137af12a3e7SDag-Erling Smørgrav dispatch_set(SSH2_MSG_CHANNEL_REQUEST, &server_input_channel_req); 1138a04a10f8SKris Kennaway dispatch_set(SSH2_MSG_CHANNEL_WINDOW_ADJUST, &channel_input_window_adjust); 1139ca3176e7SBrian Feldman dispatch_set(SSH2_MSG_GLOBAL_REQUEST, &server_input_global_request); 1140ca3176e7SBrian Feldman /* client_alive */ 11411ec0d754SDag-Erling Smørgrav dispatch_set(SSH2_MSG_CHANNEL_FAILURE, &server_input_keep_alive); 11421ec0d754SDag-Erling Smørgrav dispatch_set(SSH2_MSG_REQUEST_SUCCESS, &server_input_keep_alive); 11431ec0d754SDag-Erling Smørgrav dispatch_set(SSH2_MSG_REQUEST_FAILURE, &server_input_keep_alive); 1144ca3176e7SBrian Feldman /* rekeying */ 1145ca3176e7SBrian Feldman dispatch_set(SSH2_MSG_KEXINIT, &kex_input_kexinit); 1146a04a10f8SKris Kennaway } 1147af12a3e7SDag-Erling Smørgrav static void 1148ca3176e7SBrian Feldman server_init_dispatch_13(void) 1149a04a10f8SKris Kennaway { 1150a04a10f8SKris Kennaway debug("server_init_dispatch_13"); 1151a04a10f8SKris Kennaway dispatch_init(NULL); 1152a04a10f8SKris Kennaway dispatch_set(SSH_CMSG_EOF, &server_input_eof); 1153a04a10f8SKris Kennaway dispatch_set(SSH_CMSG_STDIN_DATA, &server_input_stdin_data); 1154a04a10f8SKris Kennaway dispatch_set(SSH_CMSG_WINDOW_SIZE, &server_input_window_size); 1155a04a10f8SKris Kennaway dispatch_set(SSH_MSG_CHANNEL_CLOSE, &channel_input_close); 1156a04a10f8SKris Kennaway dispatch_set(SSH_MSG_CHANNEL_CLOSE_CONFIRMATION, &channel_input_close_confirmation); 1157a04a10f8SKris Kennaway dispatch_set(SSH_MSG_CHANNEL_DATA, &channel_input_data); 1158a04a10f8SKris Kennaway dispatch_set(SSH_MSG_CHANNEL_OPEN_CONFIRMATION, &channel_input_open_confirmation); 1159a04a10f8SKris Kennaway dispatch_set(SSH_MSG_CHANNEL_OPEN_FAILURE, &channel_input_open_failure); 1160a04a10f8SKris Kennaway dispatch_set(SSH_MSG_PORT_OPEN, &channel_input_port_open); 1161a04a10f8SKris Kennaway } 1162af12a3e7SDag-Erling Smørgrav static void 1163ca3176e7SBrian Feldman server_init_dispatch_15(void) 1164a04a10f8SKris Kennaway { 1165a04a10f8SKris Kennaway server_init_dispatch_13(); 1166a04a10f8SKris Kennaway debug("server_init_dispatch_15"); 1167a04a10f8SKris Kennaway dispatch_set(SSH_MSG_CHANNEL_CLOSE, &channel_input_ieof); 1168a04a10f8SKris Kennaway dispatch_set(SSH_MSG_CHANNEL_CLOSE_CONFIRMATION, &channel_input_oclose); 1169a04a10f8SKris Kennaway } 1170af12a3e7SDag-Erling Smørgrav static void 1171ca3176e7SBrian Feldman server_init_dispatch(void) 1172a04a10f8SKris Kennaway { 1173a04a10f8SKris Kennaway if (compat20) 1174a04a10f8SKris Kennaway server_init_dispatch_20(); 1175a04a10f8SKris Kennaway else if (compat13) 1176a04a10f8SKris Kennaway server_init_dispatch_13(); 1177a04a10f8SKris Kennaway else 1178a04a10f8SKris Kennaway server_init_dispatch_15(); 1179a04a10f8SKris Kennaway } 1180