1511b41d2SMark Murray /* 2511b41d2SMark Murray * Author: Tatu Ylonen <ylo@cs.hut.fi> 3511b41d2SMark Murray * Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland 4511b41d2SMark Murray * All rights reserved 5511b41d2SMark Murray * Server main loop for handling the interactive session. 6b66f2d16SKris Kennaway * 7b66f2d16SKris Kennaway * As far as I am concerned, the code I have written for this software 8b66f2d16SKris Kennaway * can be used freely for any purpose. Any derived versions of this 9b66f2d16SKris Kennaway * software must be clearly marked as such, and if the derived work is 10b66f2d16SKris Kennaway * incompatible with the protocol description in the RFC file, it must be 11b66f2d16SKris Kennaway * called by a name other than "ssh" or "Secure Shell". 12b66f2d16SKris Kennaway * 13a04a10f8SKris Kennaway * SSH2 support by Markus Friedl. 14a04a10f8SKris Kennaway * Copyright (c) 2000 Markus Friedl. All rights reserved. 15b66f2d16SKris Kennaway * 16b66f2d16SKris Kennaway * Redistribution and use in source and binary forms, with or without 17b66f2d16SKris Kennaway * modification, are permitted provided that the following conditions 18b66f2d16SKris Kennaway * are met: 19b66f2d16SKris Kennaway * 1. Redistributions of source code must retain the above copyright 20b66f2d16SKris Kennaway * notice, this list of conditions and the following disclaimer. 21b66f2d16SKris Kennaway * 2. Redistributions in binary form must reproduce the above copyright 22b66f2d16SKris Kennaway * notice, this list of conditions and the following disclaimer in the 23b66f2d16SKris Kennaway * documentation and/or other materials provided with the distribution. 24b66f2d16SKris Kennaway * 25b66f2d16SKris Kennaway * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR 26b66f2d16SKris Kennaway * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES 27b66f2d16SKris Kennaway * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. 28b66f2d16SKris Kennaway * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, 29b66f2d16SKris Kennaway * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT 30b66f2d16SKris Kennaway * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, 31b66f2d16SKris Kennaway * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY 32b66f2d16SKris Kennaway * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT 33b66f2d16SKris Kennaway * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF 34b66f2d16SKris Kennaway * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. 35a04a10f8SKris Kennaway */ 36511b41d2SMark Murray 37511b41d2SMark Murray #include "includes.h" 38e0fbb1d2SBrian Feldman RCSID("$FreeBSD$"); 39ca3176e7SBrian Feldman RCSID("$OpenBSD: serverloop.c,v 1.61 2001/04/13 22:46:54 beck Exp $"); 405b9b2fafSBrian Feldman 41511b41d2SMark Murray #include "xmalloc.h" 42511b41d2SMark Murray #include "packet.h" 43511b41d2SMark Murray #include "buffer.h" 44ca3176e7SBrian Feldman #include "log.h" 45511b41d2SMark Murray #include "servconf.h" 46ca3176e7SBrian Feldman #include "sshpty.h" 47a04a10f8SKris Kennaway #include "channels.h" 48a04a10f8SKris Kennaway #include "compat.h" 49ca3176e7SBrian Feldman #include "ssh1.h" 50a04a10f8SKris Kennaway #include "ssh2.h" 51ca3176e7SBrian Feldman #include "auth.h" 52a04a10f8SKris Kennaway #include "session.h" 53a04a10f8SKris Kennaway #include "dispatch.h" 54b66f2d16SKris Kennaway #include "auth-options.h" 55ca3176e7SBrian Feldman #include "serverloop.h" 56ca3176e7SBrian Feldman #include "misc.h" 57ca3176e7SBrian Feldman #include "kex.h" 58511b41d2SMark Murray 595b9b2fafSBrian Feldman extern ServerOptions options; 605b9b2fafSBrian Feldman 61ca3176e7SBrian Feldman /* XXX */ 62ca3176e7SBrian Feldman extern Kex *xxx_kex; 63ca3176e7SBrian Feldman 64511b41d2SMark Murray static Buffer stdin_buffer; /* Buffer for stdin data. */ 65511b41d2SMark Murray static Buffer stdout_buffer; /* Buffer for stdout data. */ 66511b41d2SMark Murray static Buffer stderr_buffer; /* Buffer for stderr data. */ 67511b41d2SMark Murray static int fdin; /* Descriptor for stdin (for writing) */ 68511b41d2SMark Murray static int fdout; /* Descriptor for stdout (for reading); 69511b41d2SMark Murray May be same number as fdin. */ 70511b41d2SMark Murray static int fderr; /* Descriptor for stderr. May be -1. */ 71511b41d2SMark Murray static long stdin_bytes = 0; /* Number of bytes written to stdin. */ 72511b41d2SMark Murray static long stdout_bytes = 0; /* Number of stdout bytes sent to client. */ 73511b41d2SMark Murray static long stderr_bytes = 0; /* Number of stderr bytes sent to client. */ 74511b41d2SMark Murray static long fdout_bytes = 0; /* Number of stdout bytes read from program. */ 75511b41d2SMark Murray static int stdin_eof = 0; /* EOF message received from client. */ 76511b41d2SMark Murray static int fdout_eof = 0; /* EOF encountered reading from fdout. */ 77511b41d2SMark Murray static int fderr_eof = 0; /* EOF encountered readung from fderr. */ 78e0fbb1d2SBrian Feldman static int fdin_is_tty = 0; /* fdin points to a tty. */ 79511b41d2SMark Murray static int connection_in; /* Connection to client (input). */ 80511b41d2SMark Murray static int connection_out; /* Connection to client (output). */ 81ca3176e7SBrian Feldman static int connection_closed = 0; /* Connection to client closed. */ 82ca3176e7SBrian Feldman static u_int buffer_high; /* "Soft" max buffer size. */ 83511b41d2SMark Murray 84511b41d2SMark Murray /* 85511b41d2SMark Murray * This SIGCHLD kludge is used to detect when the child exits. The server 86511b41d2SMark Murray * will exit after that, as soon as forwarded connections have terminated. 87511b41d2SMark Murray */ 88511b41d2SMark Murray 89a04a10f8SKris Kennaway static pid_t child_pid; /* Pid of the child. */ 90511b41d2SMark Murray static volatile int child_terminated; /* The child has terminated. */ 91511b41d2SMark Murray static volatile int child_wait_status; /* Status from wait(). */ 92511b41d2SMark Murray 93a04a10f8SKris Kennaway void server_init_dispatch(void); 94a04a10f8SKris Kennaway 95ca3176e7SBrian Feldman int client_alive_timeouts = 0; 96ca3176e7SBrian Feldman 97511b41d2SMark Murray void 98511b41d2SMark Murray sigchld_handler(int sig) 99511b41d2SMark Murray { 100511b41d2SMark Murray int save_errno = errno; 101a04a10f8SKris Kennaway pid_t wait_pid; 102a04a10f8SKris Kennaway 103511b41d2SMark Murray debug("Received SIGCHLD."); 104511b41d2SMark Murray wait_pid = wait((int *) &child_wait_status); 105511b41d2SMark Murray if (wait_pid != -1) { 106511b41d2SMark Murray if (wait_pid != child_pid) 107511b41d2SMark Murray error("Strange, got SIGCHLD and wait returned pid %d but child is %d", 108511b41d2SMark Murray wait_pid, child_pid); 109511b41d2SMark Murray if (WIFEXITED(child_wait_status) || 110511b41d2SMark Murray WIFSIGNALED(child_wait_status)) 111511b41d2SMark Murray child_terminated = 1; 112511b41d2SMark Murray } 113511b41d2SMark Murray signal(SIGCHLD, sigchld_handler); 114511b41d2SMark Murray errno = save_errno; 115511b41d2SMark Murray } 116511b41d2SMark Murray void 117a04a10f8SKris Kennaway sigchld_handler2(int sig) 118511b41d2SMark Murray { 119a04a10f8SKris Kennaway int save_errno = errno; 120a04a10f8SKris Kennaway debug("Received SIGCHLD."); 121a04a10f8SKris Kennaway child_terminated = 1; 122a04a10f8SKris Kennaway signal(SIGCHLD, sigchld_handler2); 123a04a10f8SKris Kennaway errno = save_errno; 124511b41d2SMark Murray } 125511b41d2SMark Murray 126511b41d2SMark Murray /* 127511b41d2SMark Murray * Make packets from buffered stderr data, and buffer it for sending 128511b41d2SMark Murray * to the client. 129511b41d2SMark Murray */ 130511b41d2SMark Murray void 131ca3176e7SBrian Feldman make_packets_from_stderr_data(void) 132511b41d2SMark Murray { 133511b41d2SMark Murray int len; 134511b41d2SMark Murray 135511b41d2SMark Murray /* Send buffered stderr data to the client. */ 136511b41d2SMark Murray while (buffer_len(&stderr_buffer) > 0 && 137511b41d2SMark Murray packet_not_very_much_data_to_write()) { 138511b41d2SMark Murray len = buffer_len(&stderr_buffer); 139511b41d2SMark Murray if (packet_is_interactive()) { 140511b41d2SMark Murray if (len > 512) 141511b41d2SMark Murray len = 512; 142511b41d2SMark Murray } else { 143511b41d2SMark Murray /* Keep the packets at reasonable size. */ 144511b41d2SMark Murray if (len > packet_get_maxsize()) 145511b41d2SMark Murray len = packet_get_maxsize(); 146511b41d2SMark Murray } 147511b41d2SMark Murray packet_start(SSH_SMSG_STDERR_DATA); 148511b41d2SMark Murray packet_put_string(buffer_ptr(&stderr_buffer), len); 149511b41d2SMark Murray packet_send(); 150511b41d2SMark Murray buffer_consume(&stderr_buffer, len); 151511b41d2SMark Murray stderr_bytes += len; 152511b41d2SMark Murray } 153511b41d2SMark Murray } 154511b41d2SMark Murray 155511b41d2SMark Murray /* 156511b41d2SMark Murray * Make packets from buffered stdout data, and buffer it for sending to the 157511b41d2SMark Murray * client. 158511b41d2SMark Murray */ 159511b41d2SMark Murray void 160ca3176e7SBrian Feldman make_packets_from_stdout_data(void) 161511b41d2SMark Murray { 162511b41d2SMark Murray int len; 163511b41d2SMark Murray 164511b41d2SMark Murray /* Send buffered stdout data to the client. */ 165511b41d2SMark Murray while (buffer_len(&stdout_buffer) > 0 && 166511b41d2SMark Murray packet_not_very_much_data_to_write()) { 167511b41d2SMark Murray len = buffer_len(&stdout_buffer); 168511b41d2SMark Murray if (packet_is_interactive()) { 169511b41d2SMark Murray if (len > 512) 170511b41d2SMark Murray len = 512; 171511b41d2SMark Murray } else { 172511b41d2SMark Murray /* Keep the packets at reasonable size. */ 173511b41d2SMark Murray if (len > packet_get_maxsize()) 174511b41d2SMark Murray len = packet_get_maxsize(); 175511b41d2SMark Murray } 176511b41d2SMark Murray packet_start(SSH_SMSG_STDOUT_DATA); 177511b41d2SMark Murray packet_put_string(buffer_ptr(&stdout_buffer), len); 178511b41d2SMark Murray packet_send(); 179511b41d2SMark Murray buffer_consume(&stdout_buffer, len); 180511b41d2SMark Murray stdout_bytes += len; 181511b41d2SMark Murray } 182511b41d2SMark Murray } 183511b41d2SMark Murray 184511b41d2SMark Murray /* 185511b41d2SMark Murray * Sleep in select() until we can do something. This will initialize the 186511b41d2SMark Murray * select masks. Upon return, the masks will indicate which descriptors 187511b41d2SMark Murray * have data or can accept data. Optionally, a maximum time can be specified 188511b41d2SMark Murray * for the duration of the wait (0 = infinite). 189511b41d2SMark Murray */ 190511b41d2SMark Murray void 191ca3176e7SBrian Feldman wait_until_can_do_something(fd_set **readsetp, fd_set **writesetp, int *maxfdp, 192ca3176e7SBrian Feldman u_int max_time_milliseconds) 193511b41d2SMark Murray { 194511b41d2SMark Murray struct timeval tv, *tvp; 195511b41d2SMark Murray int ret; 196ca3176e7SBrian Feldman int client_alive_scheduled = 0; 197ca3176e7SBrian Feldman 198ca3176e7SBrian Feldman /* 199ca3176e7SBrian Feldman * if using client_alive, set the max timeout accordingly, 200ca3176e7SBrian Feldman * and indicate that this particular timeout was for client 201ca3176e7SBrian Feldman * alive by setting the client_alive_scheduled flag. 202ca3176e7SBrian Feldman * 203ca3176e7SBrian Feldman * this could be randomized somewhat to make traffic 204ca3176e7SBrian Feldman * analysis more difficult, but we're not doing it yet. 205ca3176e7SBrian Feldman */ 206ca3176e7SBrian Feldman if (max_time_milliseconds == 0 && options.client_alive_interval) { 207ca3176e7SBrian Feldman client_alive_scheduled = 1; 208ca3176e7SBrian Feldman max_time_milliseconds = options.client_alive_interval * 1000; 209ca3176e7SBrian Feldman } else 210ca3176e7SBrian Feldman client_alive_scheduled = 0; 211511b41d2SMark Murray 212511b41d2SMark Murray /* When select fails we restart from here. */ 213511b41d2SMark Murray retry_select: 214511b41d2SMark Murray 215ca3176e7SBrian Feldman /* Allocate and update select() masks for channel descriptors. */ 216ca3176e7SBrian Feldman channel_prepare_select(readsetp, writesetp, maxfdp, 0); 217511b41d2SMark Murray 218a04a10f8SKris Kennaway if (compat20) { 219a04a10f8SKris Kennaway /* wrong: bad condition XXX */ 220a04a10f8SKris Kennaway if (channel_not_very_much_buffered_data()) 221ca3176e7SBrian Feldman FD_SET(connection_in, *readsetp); 222a04a10f8SKris Kennaway } else { 2232632b0c8SKris Kennaway /* 2242632b0c8SKris Kennaway * Read packets from the client unless we have too much 2252632b0c8SKris Kennaway * buffered stdin or channel data. 2262632b0c8SKris Kennaway */ 2272632b0c8SKris Kennaway if (buffer_len(&stdin_buffer) < buffer_high && 228511b41d2SMark Murray channel_not_very_much_buffered_data()) 229ca3176e7SBrian Feldman FD_SET(connection_in, *readsetp); 230511b41d2SMark Murray /* 2312632b0c8SKris Kennaway * If there is not too much data already buffered going to 2322632b0c8SKris Kennaway * the client, try to get some more data from the program. 233511b41d2SMark Murray */ 2342632b0c8SKris Kennaway if (packet_not_very_much_data_to_write()) { 235511b41d2SMark Murray if (!fdout_eof) 236ca3176e7SBrian Feldman FD_SET(fdout, *readsetp); 237511b41d2SMark Murray if (!fderr_eof) 238ca3176e7SBrian Feldman FD_SET(fderr, *readsetp); 239511b41d2SMark Murray } 2402632b0c8SKris Kennaway /* 2412632b0c8SKris Kennaway * If we have buffered data, try to write some of that data 2422632b0c8SKris Kennaway * to the program. 2432632b0c8SKris Kennaway */ 2442632b0c8SKris Kennaway if (fdin != -1 && buffer_len(&stdin_buffer) > 0) 245ca3176e7SBrian Feldman FD_SET(fdin, *writesetp); 2462632b0c8SKris Kennaway } 247511b41d2SMark Murray 248511b41d2SMark Murray /* 249511b41d2SMark Murray * If we have buffered packet data going to the client, mark that 250511b41d2SMark Murray * descriptor. 251511b41d2SMark Murray */ 252511b41d2SMark Murray if (packet_have_data_to_write()) 253ca3176e7SBrian Feldman FD_SET(connection_out, *writesetp); 254511b41d2SMark Murray 255511b41d2SMark Murray /* 256511b41d2SMark Murray * If child has terminated and there is enough buffer space to read 257511b41d2SMark Murray * from it, then read as much as is available and exit. 258511b41d2SMark Murray */ 259511b41d2SMark Murray if (child_terminated && packet_not_very_much_data_to_write()) 260ca3176e7SBrian Feldman if (max_time_milliseconds == 0 || client_alive_scheduled) 261511b41d2SMark Murray max_time_milliseconds = 100; 262511b41d2SMark Murray 263511b41d2SMark Murray if (max_time_milliseconds == 0) 264511b41d2SMark Murray tvp = NULL; 265511b41d2SMark Murray else { 266511b41d2SMark Murray tv.tv_sec = max_time_milliseconds / 1000; 267511b41d2SMark Murray tv.tv_usec = 1000 * (max_time_milliseconds % 1000); 268511b41d2SMark Murray tvp = &tv; 269511b41d2SMark Murray } 270a04a10f8SKris Kennaway if (tvp!=NULL) 271ca3176e7SBrian Feldman debug3("tvp!=NULL kid %d mili %d", child_terminated, max_time_milliseconds); 272511b41d2SMark Murray 273511b41d2SMark Murray /* Wait for something to happen, or the timeout to expire. */ 274ca3176e7SBrian Feldman ret = select((*maxfdp)+1, *readsetp, *writesetp, NULL, tvp); 275511b41d2SMark Murray 276ca3176e7SBrian Feldman if (ret == -1) { 277511b41d2SMark Murray if (errno != EINTR) 278511b41d2SMark Murray error("select: %.100s", strerror(errno)); 279511b41d2SMark Murray else 280511b41d2SMark Murray goto retry_select; 281511b41d2SMark Murray } 282ca3176e7SBrian Feldman if (ret == 0 && client_alive_scheduled) { 283ca3176e7SBrian Feldman /* timeout, check to see how many we have had */ 284ca3176e7SBrian Feldman client_alive_timeouts++; 285ca3176e7SBrian Feldman 286ca3176e7SBrian Feldman if (client_alive_timeouts > options.client_alive_count_max ) { 287ca3176e7SBrian Feldman packet_disconnect( 288ca3176e7SBrian Feldman "Timeout, your session not responding."); 289ca3176e7SBrian Feldman } else { 290ca3176e7SBrian Feldman /* 291ca3176e7SBrian Feldman * send a bogus channel request with "wantreply" 292ca3176e7SBrian Feldman * we should get back a failure 293ca3176e7SBrian Feldman */ 294ca3176e7SBrian Feldman int id; 295ca3176e7SBrian Feldman 296ca3176e7SBrian Feldman id = channel_find_open(); 297ca3176e7SBrian Feldman if (id != -1) { 298ca3176e7SBrian Feldman channel_request_start(id, 299ca3176e7SBrian Feldman "keepalive@openssh.com", 1); 300ca3176e7SBrian Feldman packet_send(); 301ca3176e7SBrian Feldman } else 302ca3176e7SBrian Feldman packet_disconnect( 303ca3176e7SBrian Feldman "No open channels after timeout!"); 304ca3176e7SBrian Feldman } 305ca3176e7SBrian Feldman } 306511b41d2SMark Murray } 307511b41d2SMark Murray 308511b41d2SMark Murray /* 309511b41d2SMark Murray * Processes input from the client and the program. Input data is stored 310511b41d2SMark Murray * in buffers and processed later. 311511b41d2SMark Murray */ 312511b41d2SMark Murray void 313511b41d2SMark Murray process_input(fd_set * readset) 314511b41d2SMark Murray { 315511b41d2SMark Murray int len; 316511b41d2SMark Murray char buf[16384]; 317511b41d2SMark Murray 318511b41d2SMark Murray /* Read and buffer any input data from the client. */ 319511b41d2SMark Murray if (FD_ISSET(connection_in, readset)) { 320511b41d2SMark Murray len = read(connection_in, buf, sizeof(buf)); 321511b41d2SMark Murray if (len == 0) { 322511b41d2SMark Murray verbose("Connection closed by remote host."); 323ca3176e7SBrian Feldman connection_closed = 1; 324ca3176e7SBrian Feldman if (compat20) 325ca3176e7SBrian Feldman return; 326511b41d2SMark Murray fatal_cleanup(); 3272632b0c8SKris Kennaway } else if (len < 0) { 3282632b0c8SKris Kennaway if (errno != EINTR && errno != EAGAIN) { 329511b41d2SMark Murray verbose("Read error from remote host: %.100s", strerror(errno)); 330511b41d2SMark Murray fatal_cleanup(); 331511b41d2SMark Murray } 3322632b0c8SKris Kennaway } else { 333511b41d2SMark Murray /* Buffer any received data. */ 334511b41d2SMark Murray packet_process_incoming(buf, len); 335511b41d2SMark Murray } 3362632b0c8SKris Kennaway } 337a04a10f8SKris Kennaway if (compat20) 338a04a10f8SKris Kennaway return; 339a04a10f8SKris Kennaway 340511b41d2SMark Murray /* Read and buffer any available stdout data from the program. */ 341511b41d2SMark Murray if (!fdout_eof && FD_ISSET(fdout, readset)) { 342511b41d2SMark Murray len = read(fdout, buf, sizeof(buf)); 3432632b0c8SKris Kennaway if (len < 0 && (errno == EINTR || errno == EAGAIN)) { 3442632b0c8SKris Kennaway /* do nothing */ 3452632b0c8SKris Kennaway } else if (len <= 0) { 346511b41d2SMark Murray fdout_eof = 1; 3472632b0c8SKris Kennaway } else { 348511b41d2SMark Murray buffer_append(&stdout_buffer, buf, len); 349511b41d2SMark Murray fdout_bytes += len; 350511b41d2SMark Murray } 351511b41d2SMark Murray } 352511b41d2SMark Murray /* Read and buffer any available stderr data from the program. */ 353511b41d2SMark Murray if (!fderr_eof && FD_ISSET(fderr, readset)) { 354511b41d2SMark Murray len = read(fderr, buf, sizeof(buf)); 3552632b0c8SKris Kennaway if (len < 0 && (errno == EINTR || errno == EAGAIN)) { 3562632b0c8SKris Kennaway /* do nothing */ 3572632b0c8SKris Kennaway } else if (len <= 0) { 358511b41d2SMark Murray fderr_eof = 1; 3592632b0c8SKris Kennaway } else { 360511b41d2SMark Murray buffer_append(&stderr_buffer, buf, len); 361511b41d2SMark Murray } 362511b41d2SMark Murray } 3632632b0c8SKris Kennaway } 364511b41d2SMark Murray 365511b41d2SMark Murray /* 366511b41d2SMark Murray * Sends data from internal buffers to client program stdin. 367511b41d2SMark Murray */ 368511b41d2SMark Murray void 369511b41d2SMark Murray process_output(fd_set * writeset) 370511b41d2SMark Murray { 371e0fbb1d2SBrian Feldman struct termios tio; 372511b41d2SMark Murray int len; 373511b41d2SMark Murray 374511b41d2SMark Murray /* Write buffered data to program stdin. */ 375a04a10f8SKris Kennaway if (!compat20 && fdin != -1 && FD_ISSET(fdin, writeset)) { 376511b41d2SMark Murray len = write(fdin, buffer_ptr(&stdin_buffer), 377511b41d2SMark Murray buffer_len(&stdin_buffer)); 3782632b0c8SKris Kennaway if (len < 0 && (errno == EINTR || errno == EAGAIN)) { 3792632b0c8SKris Kennaway /* do nothing */ 3802632b0c8SKris Kennaway } else if (len <= 0) { 381511b41d2SMark Murray #ifdef USE_PIPES 382511b41d2SMark Murray close(fdin); 383511b41d2SMark Murray #else 384a04a10f8SKris Kennaway if (fdin != fdout) 385511b41d2SMark Murray close(fdin); 386511b41d2SMark Murray else 387511b41d2SMark Murray shutdown(fdin, SHUT_WR); /* We will no longer send. */ 388511b41d2SMark Murray #endif 389511b41d2SMark Murray fdin = -1; 390511b41d2SMark Murray } else { 391e0fbb1d2SBrian Feldman /* Successful write. */ 392e0fbb1d2SBrian Feldman if (fdin_is_tty && tcgetattr(fdin, &tio) == 0 && 393e0fbb1d2SBrian Feldman !(tio.c_lflag & ECHO) && (tio.c_lflag & ICANON)) { 394e0fbb1d2SBrian Feldman /* 395e0fbb1d2SBrian Feldman * Simulate echo to reduce the impact of 396e0fbb1d2SBrian Feldman * traffic analysis 397e0fbb1d2SBrian Feldman */ 398ca3176e7SBrian Feldman packet_send_ignore(len); 399e0fbb1d2SBrian Feldman packet_send(); 400e0fbb1d2SBrian Feldman } 401e0fbb1d2SBrian Feldman /* Consume the data from the buffer. */ 402511b41d2SMark Murray buffer_consume(&stdin_buffer, len); 403511b41d2SMark Murray /* Update the count of bytes written to the program. */ 404511b41d2SMark Murray stdin_bytes += len; 405511b41d2SMark Murray } 406511b41d2SMark Murray } 407511b41d2SMark Murray /* Send any buffered packet data to the client. */ 408511b41d2SMark Murray if (FD_ISSET(connection_out, writeset)) 409511b41d2SMark Murray packet_write_poll(); 410511b41d2SMark Murray } 411511b41d2SMark Murray 412511b41d2SMark Murray /* 413511b41d2SMark Murray * Wait until all buffered output has been sent to the client. 414511b41d2SMark Murray * This is used when the program terminates. 415511b41d2SMark Murray */ 416511b41d2SMark Murray void 417ca3176e7SBrian Feldman drain_output(void) 418511b41d2SMark Murray { 419511b41d2SMark Murray /* Send any buffered stdout data to the client. */ 420511b41d2SMark Murray if (buffer_len(&stdout_buffer) > 0) { 421511b41d2SMark Murray packet_start(SSH_SMSG_STDOUT_DATA); 422511b41d2SMark Murray packet_put_string(buffer_ptr(&stdout_buffer), 423511b41d2SMark Murray buffer_len(&stdout_buffer)); 424511b41d2SMark Murray packet_send(); 425511b41d2SMark Murray /* Update the count of sent bytes. */ 426511b41d2SMark Murray stdout_bytes += buffer_len(&stdout_buffer); 427511b41d2SMark Murray } 428511b41d2SMark Murray /* Send any buffered stderr data to the client. */ 429511b41d2SMark Murray if (buffer_len(&stderr_buffer) > 0) { 430511b41d2SMark Murray packet_start(SSH_SMSG_STDERR_DATA); 431511b41d2SMark Murray packet_put_string(buffer_ptr(&stderr_buffer), 432511b41d2SMark Murray buffer_len(&stderr_buffer)); 433511b41d2SMark Murray packet_send(); 434511b41d2SMark Murray /* Update the count of sent bytes. */ 435511b41d2SMark Murray stderr_bytes += buffer_len(&stderr_buffer); 436511b41d2SMark Murray } 437511b41d2SMark Murray /* Wait until all buffered data has been written to the client. */ 438511b41d2SMark Murray packet_write_wait(); 439511b41d2SMark Murray } 440511b41d2SMark Murray 441a04a10f8SKris Kennaway void 442ca3176e7SBrian Feldman process_buffered_input_packets(void) 443a04a10f8SKris Kennaway { 444ca3176e7SBrian Feldman dispatch_run(DISPATCH_NONBLOCK, NULL, compat20 ? xxx_kex : NULL); 445a04a10f8SKris Kennaway } 446a04a10f8SKris Kennaway 447511b41d2SMark Murray /* 448511b41d2SMark Murray * Performs the interactive session. This handles data transmission between 449511b41d2SMark Murray * the client and the program. Note that the notion of stdin, stdout, and 450511b41d2SMark Murray * stderr in this function is sort of reversed: this function writes to 451511b41d2SMark Murray * stdin (of the child program), and reads from stdout and stderr (of the 452511b41d2SMark Murray * child program). 453511b41d2SMark Murray */ 454511b41d2SMark Murray void 455a04a10f8SKris Kennaway server_loop(pid_t pid, int fdin_arg, int fdout_arg, int fderr_arg) 456511b41d2SMark Murray { 457ca3176e7SBrian Feldman fd_set *readset = NULL, *writeset = NULL; 458ca3176e7SBrian Feldman int max_fd; 459a04a10f8SKris Kennaway int wait_status; /* Status returned by wait(). */ 460a04a10f8SKris Kennaway pid_t wait_pid; /* pid returned by wait(). */ 461511b41d2SMark Murray int waiting_termination = 0; /* Have displayed waiting close message. */ 462ca3176e7SBrian Feldman u_int max_time_milliseconds; 463ca3176e7SBrian Feldman u_int previous_stdout_buffer_bytes; 464ca3176e7SBrian Feldman u_int stdout_buffer_bytes; 465511b41d2SMark Murray int type; 466511b41d2SMark Murray 467511b41d2SMark Murray debug("Entering interactive session."); 468511b41d2SMark Murray 469511b41d2SMark Murray /* Initialize the SIGCHLD kludge. */ 470511b41d2SMark Murray child_pid = pid; 471511b41d2SMark Murray child_terminated = 0; 472511b41d2SMark Murray signal(SIGCHLD, sigchld_handler); 473511b41d2SMark Murray 474511b41d2SMark Murray /* Initialize our global variables. */ 475511b41d2SMark Murray fdin = fdin_arg; 476511b41d2SMark Murray fdout = fdout_arg; 477511b41d2SMark Murray fderr = fderr_arg; 4782632b0c8SKris Kennaway 4792632b0c8SKris Kennaway /* nonblocking IO */ 4802632b0c8SKris Kennaway set_nonblock(fdin); 4812632b0c8SKris Kennaway set_nonblock(fdout); 4822632b0c8SKris Kennaway /* we don't have stderr for interactive terminal sessions, see below */ 4832632b0c8SKris Kennaway if (fderr != -1) 4842632b0c8SKris Kennaway set_nonblock(fderr); 4852632b0c8SKris Kennaway 486e0fbb1d2SBrian Feldman if (!(datafellows & SSH_BUG_IGNOREMSG) && isatty(fdin)) 487e0fbb1d2SBrian Feldman fdin_is_tty = 1; 488e0fbb1d2SBrian Feldman 489511b41d2SMark Murray connection_in = packet_get_connection_in(); 490511b41d2SMark Murray connection_out = packet_get_connection_out(); 491511b41d2SMark Murray 492511b41d2SMark Murray previous_stdout_buffer_bytes = 0; 493511b41d2SMark Murray 494511b41d2SMark Murray /* Set approximate I/O buffer size. */ 495511b41d2SMark Murray if (packet_is_interactive()) 496511b41d2SMark Murray buffer_high = 4096; 497511b41d2SMark Murray else 498511b41d2SMark Murray buffer_high = 64 * 1024; 499511b41d2SMark Murray 500511b41d2SMark Murray /* Initialize max_fd to the maximum of the known file descriptors. */ 501ca3176e7SBrian Feldman max_fd = MAX(fdin, fdout); 502ca3176e7SBrian Feldman if (fderr != -1) 503ca3176e7SBrian Feldman max_fd = MAX(max_fd, fderr); 504ca3176e7SBrian Feldman max_fd = MAX(max_fd, connection_in); 505ca3176e7SBrian Feldman max_fd = MAX(max_fd, connection_out); 506511b41d2SMark Murray 507511b41d2SMark Murray /* Initialize Initialize buffers. */ 508511b41d2SMark Murray buffer_init(&stdin_buffer); 509511b41d2SMark Murray buffer_init(&stdout_buffer); 510511b41d2SMark Murray buffer_init(&stderr_buffer); 511511b41d2SMark Murray 512511b41d2SMark Murray /* 513511b41d2SMark Murray * If we have no separate fderr (which is the case when we have a pty 514511b41d2SMark Murray * - there we cannot make difference between data sent to stdout and 515511b41d2SMark Murray * stderr), indicate that we have seen an EOF from stderr. This way 516511b41d2SMark Murray * we don\'t need to check the descriptor everywhere. 517511b41d2SMark Murray */ 518511b41d2SMark Murray if (fderr == -1) 519511b41d2SMark Murray fderr_eof = 1; 520511b41d2SMark Murray 521a04a10f8SKris Kennaway server_init_dispatch(); 522a04a10f8SKris Kennaway 523511b41d2SMark Murray /* Main loop of the server for the interactive session mode. */ 524511b41d2SMark Murray for (;;) { 525511b41d2SMark Murray 526511b41d2SMark Murray /* Process buffered packets from the client. */ 527511b41d2SMark Murray process_buffered_input_packets(); 528511b41d2SMark Murray 529511b41d2SMark Murray /* 530511b41d2SMark Murray * If we have received eof, and there is no more pending 531511b41d2SMark Murray * input data, cause a real eof by closing fdin. 532511b41d2SMark Murray */ 533511b41d2SMark Murray if (stdin_eof && fdin != -1 && buffer_len(&stdin_buffer) == 0) { 534511b41d2SMark Murray #ifdef USE_PIPES 535511b41d2SMark Murray close(fdin); 536511b41d2SMark Murray #else 537a04a10f8SKris Kennaway if (fdin != fdout) 538511b41d2SMark Murray close(fdin); 539511b41d2SMark Murray else 540511b41d2SMark Murray shutdown(fdin, SHUT_WR); /* We will no longer send. */ 541511b41d2SMark Murray #endif 542511b41d2SMark Murray fdin = -1; 543511b41d2SMark Murray } 544511b41d2SMark Murray /* Make packets from buffered stderr data to send to the client. */ 545511b41d2SMark Murray make_packets_from_stderr_data(); 546511b41d2SMark Murray 547511b41d2SMark Murray /* 548511b41d2SMark Murray * Make packets from buffered stdout data to send to the 549511b41d2SMark Murray * client. If there is very little to send, this arranges to 550511b41d2SMark Murray * not send them now, but to wait a short while to see if we 551511b41d2SMark Murray * are getting more data. This is necessary, as some systems 552511b41d2SMark Murray * wake up readers from a pty after each separate character. 553511b41d2SMark Murray */ 554511b41d2SMark Murray max_time_milliseconds = 0; 555511b41d2SMark Murray stdout_buffer_bytes = buffer_len(&stdout_buffer); 556511b41d2SMark Murray if (stdout_buffer_bytes != 0 && stdout_buffer_bytes < 256 && 557511b41d2SMark Murray stdout_buffer_bytes != previous_stdout_buffer_bytes) { 558511b41d2SMark Murray /* try again after a while */ 559511b41d2SMark Murray max_time_milliseconds = 10; 560511b41d2SMark Murray } else { 561511b41d2SMark Murray /* Send it now. */ 562511b41d2SMark Murray make_packets_from_stdout_data(); 563511b41d2SMark Murray } 564511b41d2SMark Murray previous_stdout_buffer_bytes = buffer_len(&stdout_buffer); 565511b41d2SMark Murray 566511b41d2SMark Murray /* Send channel data to the client. */ 567511b41d2SMark Murray if (packet_not_very_much_data_to_write()) 568511b41d2SMark Murray channel_output_poll(); 569511b41d2SMark Murray 570511b41d2SMark Murray /* 571511b41d2SMark Murray * Bail out of the loop if the program has closed its output 572511b41d2SMark Murray * descriptors, and we have no more data to send to the 573511b41d2SMark Murray * client, and there is no pending buffered data. 574511b41d2SMark Murray */ 575511b41d2SMark Murray if (fdout_eof && fderr_eof && !packet_have_data_to_write() && 576511b41d2SMark Murray buffer_len(&stdout_buffer) == 0 && buffer_len(&stderr_buffer) == 0) { 577511b41d2SMark Murray if (!channel_still_open()) 578a04a10f8SKris Kennaway break; 579511b41d2SMark Murray if (!waiting_termination) { 580511b41d2SMark Murray const char *s = "Waiting for forwarded connections to terminate...\r\n"; 581511b41d2SMark Murray char *cp; 582511b41d2SMark Murray waiting_termination = 1; 583511b41d2SMark Murray buffer_append(&stderr_buffer, s, strlen(s)); 584511b41d2SMark Murray 585511b41d2SMark Murray /* Display list of open channels. */ 586511b41d2SMark Murray cp = channel_open_message(); 587511b41d2SMark Murray buffer_append(&stderr_buffer, cp, strlen(cp)); 588511b41d2SMark Murray xfree(cp); 589511b41d2SMark Murray } 590511b41d2SMark Murray } 591511b41d2SMark Murray /* Sleep in select() until we can do something. */ 592ca3176e7SBrian Feldman wait_until_can_do_something(&readset, &writeset, &max_fd, 593511b41d2SMark Murray max_time_milliseconds); 594511b41d2SMark Murray 595511b41d2SMark Murray /* Process any channel events. */ 596ca3176e7SBrian Feldman channel_after_select(readset, writeset); 597511b41d2SMark Murray 598511b41d2SMark Murray /* Process input from the client and from program stdout/stderr. */ 599ca3176e7SBrian Feldman process_input(readset); 600511b41d2SMark Murray 601511b41d2SMark Murray /* Process output to the client and to program stdin. */ 602ca3176e7SBrian Feldman process_output(writeset); 603511b41d2SMark Murray } 604ca3176e7SBrian Feldman if (readset) 605ca3176e7SBrian Feldman xfree(readset); 606ca3176e7SBrian Feldman if (writeset) 607ca3176e7SBrian Feldman xfree(writeset); 608511b41d2SMark Murray 609511b41d2SMark Murray /* Cleanup and termination code. */ 610511b41d2SMark Murray 611511b41d2SMark Murray /* Wait until all output has been sent to the client. */ 612511b41d2SMark Murray drain_output(); 613511b41d2SMark Murray 614511b41d2SMark Murray debug("End of interactive session; stdin %ld, stdout (read %ld, sent %ld), stderr %ld bytes.", 615511b41d2SMark Murray stdin_bytes, fdout_bytes, stdout_bytes, stderr_bytes); 616511b41d2SMark Murray 617511b41d2SMark Murray /* Free and clear the buffers. */ 618511b41d2SMark Murray buffer_free(&stdin_buffer); 619511b41d2SMark Murray buffer_free(&stdout_buffer); 620511b41d2SMark Murray buffer_free(&stderr_buffer); 621511b41d2SMark Murray 622511b41d2SMark Murray /* Close the file descriptors. */ 623511b41d2SMark Murray if (fdout != -1) 624511b41d2SMark Murray close(fdout); 625511b41d2SMark Murray fdout = -1; 626511b41d2SMark Murray fdout_eof = 1; 627511b41d2SMark Murray if (fderr != -1) 628511b41d2SMark Murray close(fderr); 629511b41d2SMark Murray fderr = -1; 630511b41d2SMark Murray fderr_eof = 1; 631511b41d2SMark Murray if (fdin != -1) 632511b41d2SMark Murray close(fdin); 633511b41d2SMark Murray fdin = -1; 634511b41d2SMark Murray 635511b41d2SMark Murray /* Stop listening for channels; this removes unix domain sockets. */ 636511b41d2SMark Murray channel_stop_listening(); 637511b41d2SMark Murray 638511b41d2SMark Murray /* Wait for the child to exit. Get its exit status. */ 639511b41d2SMark Murray wait_pid = wait(&wait_status); 640ca3176e7SBrian Feldman if (wait_pid == -1) { 641511b41d2SMark Murray /* 642511b41d2SMark Murray * It is possible that the wait was handled by SIGCHLD 643511b41d2SMark Murray * handler. This may result in either: this call 644511b41d2SMark Murray * returning with EINTR, or: this call returning ECHILD. 645511b41d2SMark Murray */ 646511b41d2SMark Murray if (child_terminated) 647511b41d2SMark Murray wait_status = child_wait_status; 648511b41d2SMark Murray else 649511b41d2SMark Murray packet_disconnect("wait: %.100s", strerror(errno)); 650511b41d2SMark Murray } else { 651511b41d2SMark Murray /* Check if it matches the process we forked. */ 652511b41d2SMark Murray if (wait_pid != pid) 653511b41d2SMark Murray error("Strange, wait returned pid %d, expected %d", 654511b41d2SMark Murray wait_pid, pid); 655511b41d2SMark Murray } 656511b41d2SMark Murray 657511b41d2SMark Murray /* We no longer want our SIGCHLD handler to be called. */ 658511b41d2SMark Murray signal(SIGCHLD, SIG_DFL); 659511b41d2SMark Murray 660511b41d2SMark Murray /* Check if it exited normally. */ 661511b41d2SMark Murray if (WIFEXITED(wait_status)) { 662511b41d2SMark Murray /* Yes, normal exit. Get exit status and send it to the client. */ 663511b41d2SMark Murray debug("Command exited with status %d.", WEXITSTATUS(wait_status)); 664511b41d2SMark Murray packet_start(SSH_SMSG_EXITSTATUS); 665511b41d2SMark Murray packet_put_int(WEXITSTATUS(wait_status)); 666511b41d2SMark Murray packet_send(); 667511b41d2SMark Murray packet_write_wait(); 668511b41d2SMark Murray 669511b41d2SMark Murray /* 670511b41d2SMark Murray * Wait for exit confirmation. Note that there might be 671511b41d2SMark Murray * other packets coming before it; however, the program has 672511b41d2SMark Murray * already died so we just ignore them. The client is 673511b41d2SMark Murray * supposed to respond with the confirmation when it receives 674511b41d2SMark Murray * the exit status. 675511b41d2SMark Murray */ 676511b41d2SMark Murray do { 677511b41d2SMark Murray int plen; 678511b41d2SMark Murray type = packet_read(&plen); 679511b41d2SMark Murray } 680511b41d2SMark Murray while (type != SSH_CMSG_EXIT_CONFIRMATION); 681511b41d2SMark Murray 682511b41d2SMark Murray debug("Received exit confirmation."); 683511b41d2SMark Murray return; 684511b41d2SMark Murray } 685511b41d2SMark Murray /* Check if the program terminated due to a signal. */ 686511b41d2SMark Murray if (WIFSIGNALED(wait_status)) 687511b41d2SMark Murray packet_disconnect("Command terminated on signal %d.", 688511b41d2SMark Murray WTERMSIG(wait_status)); 689511b41d2SMark Murray 690511b41d2SMark Murray /* Some weird exit cause. Just exit. */ 691511b41d2SMark Murray packet_disconnect("wait returned status %04x.", wait_status); 692511b41d2SMark Murray /* NOTREACHED */ 693511b41d2SMark Murray } 694a04a10f8SKris Kennaway 695a04a10f8SKris Kennaway void 696a04a10f8SKris Kennaway server_loop2(void) 697a04a10f8SKris Kennaway { 698ca3176e7SBrian Feldman fd_set *readset = NULL, *writeset = NULL; 699ca3176e7SBrian Feldman int rekeying = 0, max_fd, status; 700a04a10f8SKris Kennaway pid_t pid; 701a04a10f8SKris Kennaway 702a04a10f8SKris Kennaway debug("Entering interactive session for SSH2."); 703a04a10f8SKris Kennaway 704a04a10f8SKris Kennaway signal(SIGCHLD, sigchld_handler2); 705a04a10f8SKris Kennaway child_terminated = 0; 706a04a10f8SKris Kennaway connection_in = packet_get_connection_in(); 707a04a10f8SKris Kennaway connection_out = packet_get_connection_out(); 708ca3176e7SBrian Feldman 709ca3176e7SBrian Feldman max_fd = MAX(connection_in, connection_out); 710ca3176e7SBrian Feldman 711a04a10f8SKris Kennaway server_init_dispatch(); 712a04a10f8SKris Kennaway 713a04a10f8SKris Kennaway for (;;) { 714a04a10f8SKris Kennaway process_buffered_input_packets(); 715ca3176e7SBrian Feldman 716ca3176e7SBrian Feldman rekeying = (xxx_kex != NULL && !xxx_kex->done); 717ca3176e7SBrian Feldman 718ca3176e7SBrian Feldman if (!rekeying && packet_not_very_much_data_to_write()) 719a04a10f8SKris Kennaway channel_output_poll(); 720ca3176e7SBrian Feldman wait_until_can_do_something(&readset, &writeset, &max_fd, 721ca3176e7SBrian Feldman rekeying); 722a04a10f8SKris Kennaway if (child_terminated) { 723a04a10f8SKris Kennaway while ((pid = waitpid(-1, &status, WNOHANG)) > 0) 724a04a10f8SKris Kennaway session_close_by_pid(pid, status); 725a04a10f8SKris Kennaway child_terminated = 0; 726a04a10f8SKris Kennaway } 727ca3176e7SBrian Feldman if (!rekeying) 728ca3176e7SBrian Feldman channel_after_select(readset, writeset); 729ca3176e7SBrian Feldman process_input(readset); 730ca3176e7SBrian Feldman if (connection_closed) 731ca3176e7SBrian Feldman break; 732ca3176e7SBrian Feldman process_output(writeset); 733a04a10f8SKris Kennaway } 734ca3176e7SBrian Feldman if (readset) 735ca3176e7SBrian Feldman xfree(readset); 736ca3176e7SBrian Feldman if (writeset) 737ca3176e7SBrian Feldman xfree(writeset); 738ca3176e7SBrian Feldman 739a04a10f8SKris Kennaway signal(SIGCHLD, SIG_DFL); 740a04a10f8SKris Kennaway while ((pid = waitpid(-1, &status, WNOHANG)) > 0) 741a04a10f8SKris Kennaway session_close_by_pid(pid, status); 742a04a10f8SKris Kennaway channel_stop_listening(); 743a04a10f8SKris Kennaway } 744a04a10f8SKris Kennaway 745a04a10f8SKris Kennaway void 746ca3176e7SBrian Feldman server_input_channel_failure(int type, int plen, void *ctxt) 747ca3176e7SBrian Feldman { 748ca3176e7SBrian Feldman debug("Got CHANNEL_FAILURE for keepalive"); 749ca3176e7SBrian Feldman /* 750ca3176e7SBrian Feldman * reset timeout, since we got a sane answer from the client. 751ca3176e7SBrian Feldman * even if this was generated by something other than 752ca3176e7SBrian Feldman * the bogus CHANNEL_REQUEST we send for keepalives. 753ca3176e7SBrian Feldman */ 754ca3176e7SBrian Feldman client_alive_timeouts = 0; 755ca3176e7SBrian Feldman } 756ca3176e7SBrian Feldman 757ca3176e7SBrian Feldman 758ca3176e7SBrian Feldman void 7595b9b2fafSBrian Feldman server_input_stdin_data(int type, int plen, void *ctxt) 760a04a10f8SKris Kennaway { 761a04a10f8SKris Kennaway char *data; 762ca3176e7SBrian Feldman u_int data_len; 763a04a10f8SKris Kennaway 764a04a10f8SKris Kennaway /* Stdin data from the client. Append it to the buffer. */ 765a04a10f8SKris Kennaway /* Ignore any data if the client has closed stdin. */ 766a04a10f8SKris Kennaway if (fdin == -1) 767a04a10f8SKris Kennaway return; 768a04a10f8SKris Kennaway data = packet_get_string(&data_len); 769a04a10f8SKris Kennaway packet_integrity_check(plen, (4 + data_len), type); 770a04a10f8SKris Kennaway buffer_append(&stdin_buffer, data, data_len); 771a04a10f8SKris Kennaway memset(data, 0, data_len); 772a04a10f8SKris Kennaway xfree(data); 773a04a10f8SKris Kennaway } 774a04a10f8SKris Kennaway 775a04a10f8SKris Kennaway void 7765b9b2fafSBrian Feldman server_input_eof(int type, int plen, void *ctxt) 777a04a10f8SKris Kennaway { 778a04a10f8SKris Kennaway /* 779a04a10f8SKris Kennaway * Eof from the client. The stdin descriptor to the 780a04a10f8SKris Kennaway * program will be closed when all buffered data has 781a04a10f8SKris Kennaway * drained. 782a04a10f8SKris Kennaway */ 783a04a10f8SKris Kennaway debug("EOF received for stdin."); 784a04a10f8SKris Kennaway packet_integrity_check(plen, 0, type); 785a04a10f8SKris Kennaway stdin_eof = 1; 786a04a10f8SKris Kennaway } 787a04a10f8SKris Kennaway 788a04a10f8SKris Kennaway void 7895b9b2fafSBrian Feldman server_input_window_size(int type, int plen, void *ctxt) 790a04a10f8SKris Kennaway { 791a04a10f8SKris Kennaway int row = packet_get_int(); 792a04a10f8SKris Kennaway int col = packet_get_int(); 793a04a10f8SKris Kennaway int xpixel = packet_get_int(); 794a04a10f8SKris Kennaway int ypixel = packet_get_int(); 795a04a10f8SKris Kennaway 796a04a10f8SKris Kennaway debug("Window change received."); 797a04a10f8SKris Kennaway packet_integrity_check(plen, 4 * 4, type); 798a04a10f8SKris Kennaway if (fdin != -1) 799a04a10f8SKris Kennaway pty_change_window_size(fdin, row, col, xpixel, ypixel); 800a04a10f8SKris Kennaway } 801a04a10f8SKris Kennaway 802ca3176e7SBrian Feldman Channel * 803ca3176e7SBrian Feldman server_request_direct_tcpip(char *ctype) 804a04a10f8SKris Kennaway { 805ca3176e7SBrian Feldman int sock, newch; 806a04a10f8SKris Kennaway char *target, *originator; 807a04a10f8SKris Kennaway int target_port, originator_port; 808a04a10f8SKris Kennaway 809a04a10f8SKris Kennaway target = packet_get_string(NULL); 810a04a10f8SKris Kennaway target_port = packet_get_int(); 811a04a10f8SKris Kennaway originator = packet_get_string(NULL); 812a04a10f8SKris Kennaway originator_port = packet_get_int(); 813a04a10f8SKris Kennaway packet_done(); 8142632b0c8SKris Kennaway 815ca3176e7SBrian Feldman debug("server_request_direct_tcpip: originator %s port %d, target %s port %d", 8162632b0c8SKris Kennaway originator, originator_port, target, target_port); 817b66f2d16SKris Kennaway 818a04a10f8SKris Kennaway /* XXX check permission */ 819a04a10f8SKris Kennaway sock = channel_connect_to(target, target_port); 820a04a10f8SKris Kennaway xfree(target); 821a04a10f8SKris Kennaway xfree(originator); 822a04a10f8SKris Kennaway if (sock < 0) 823ca3176e7SBrian Feldman return NULL; 824ca3176e7SBrian Feldman newch = channel_new(ctype, SSH_CHANNEL_CONNECTING, 825b66f2d16SKris Kennaway sock, sock, -1, CHAN_TCP_WINDOW_DEFAULT, 8265b9b2fafSBrian Feldman CHAN_TCP_PACKET_DEFAULT, 0, xstrdup("direct-tcpip"), 1); 827ca3176e7SBrian Feldman return (newch >= 0) ? channel_lookup(newch) : NULL; 828ca3176e7SBrian Feldman } 829ca3176e7SBrian Feldman 830ca3176e7SBrian Feldman Channel * 831ca3176e7SBrian Feldman server_request_session(char *ctype) 832ca3176e7SBrian Feldman { 833ca3176e7SBrian Feldman int newch; 834ca3176e7SBrian Feldman 835ca3176e7SBrian Feldman debug("input_session_request"); 836ca3176e7SBrian Feldman packet_done(); 837ca3176e7SBrian Feldman /* 838ca3176e7SBrian Feldman * A server session has no fd to read or write until a 839ca3176e7SBrian Feldman * CHANNEL_REQUEST for a shell is made, so we set the type to 840ca3176e7SBrian Feldman * SSH_CHANNEL_LARVAL. Additionally, a callback for handling all 841ca3176e7SBrian Feldman * CHANNEL_REQUEST messages is registered. 842ca3176e7SBrian Feldman */ 843ca3176e7SBrian Feldman newch = channel_new(ctype, SSH_CHANNEL_LARVAL, 844ca3176e7SBrian Feldman -1, -1, -1, 0, CHAN_SES_PACKET_DEFAULT, 845ca3176e7SBrian Feldman 0, xstrdup("server-session"), 1); 846ca3176e7SBrian Feldman if (session_open(newch) == 1) { 847ca3176e7SBrian Feldman channel_register_callback(newch, SSH2_MSG_CHANNEL_REQUEST, 848ca3176e7SBrian Feldman session_input_channel_req, (void *)0); 849ca3176e7SBrian Feldman channel_register_cleanup(newch, session_close_by_channel); 850ca3176e7SBrian Feldman return channel_lookup(newch); 851ca3176e7SBrian Feldman } else { 852ca3176e7SBrian Feldman debug("session open failed, free channel %d", newch); 853ca3176e7SBrian Feldman channel_free(newch); 854ca3176e7SBrian Feldman } 855ca3176e7SBrian Feldman return NULL; 856a04a10f8SKris Kennaway } 857a04a10f8SKris Kennaway 858a04a10f8SKris Kennaway void 8595b9b2fafSBrian Feldman server_input_channel_open(int type, int plen, void *ctxt) 860a04a10f8SKris Kennaway { 861a04a10f8SKris Kennaway Channel *c = NULL; 862a04a10f8SKris Kennaway char *ctype; 863ca3176e7SBrian Feldman u_int len; 864a04a10f8SKris Kennaway int rchan; 865a04a10f8SKris Kennaway int rmaxpack; 866a04a10f8SKris Kennaway int rwindow; 867a04a10f8SKris Kennaway 868a04a10f8SKris Kennaway ctype = packet_get_string(&len); 869a04a10f8SKris Kennaway rchan = packet_get_int(); 870a04a10f8SKris Kennaway rwindow = packet_get_int(); 871a04a10f8SKris Kennaway rmaxpack = packet_get_int(); 872a04a10f8SKris Kennaway 8735b9b2fafSBrian Feldman debug("server_input_channel_open: ctype %s rchan %d win %d max %d", 874a04a10f8SKris Kennaway ctype, rchan, rwindow, rmaxpack); 875a04a10f8SKris Kennaway 876a04a10f8SKris Kennaway if (strcmp(ctype, "session") == 0) { 877ca3176e7SBrian Feldman c = server_request_session(ctype); 878a04a10f8SKris Kennaway } else if (strcmp(ctype, "direct-tcpip") == 0) { 879ca3176e7SBrian Feldman c = server_request_direct_tcpip(ctype); 880a04a10f8SKris Kennaway } 881a04a10f8SKris Kennaway if (c != NULL) { 882ca3176e7SBrian Feldman debug("server_input_channel_open: confirm %s", ctype); 883a04a10f8SKris Kennaway c->remote_id = rchan; 884a04a10f8SKris Kennaway c->remote_window = rwindow; 885a04a10f8SKris Kennaway c->remote_maxpacket = rmaxpack; 886a04a10f8SKris Kennaway 887a04a10f8SKris Kennaway packet_start(SSH2_MSG_CHANNEL_OPEN_CONFIRMATION); 888a04a10f8SKris Kennaway packet_put_int(c->remote_id); 889a04a10f8SKris Kennaway packet_put_int(c->self); 890a04a10f8SKris Kennaway packet_put_int(c->local_window); 891a04a10f8SKris Kennaway packet_put_int(c->local_maxpacket); 892a04a10f8SKris Kennaway packet_send(); 893a04a10f8SKris Kennaway } else { 894ca3176e7SBrian Feldman debug("server_input_channel_open: failure %s", ctype); 895a04a10f8SKris Kennaway packet_start(SSH2_MSG_CHANNEL_OPEN_FAILURE); 896a04a10f8SKris Kennaway packet_put_int(rchan); 897a04a10f8SKris Kennaway packet_put_int(SSH2_OPEN_ADMINISTRATIVELY_PROHIBITED); 898a04a10f8SKris Kennaway packet_put_cstring("bla bla"); 899a04a10f8SKris Kennaway packet_put_cstring(""); 900a04a10f8SKris Kennaway packet_send(); 901a04a10f8SKris Kennaway } 902a04a10f8SKris Kennaway xfree(ctype); 903a04a10f8SKris Kennaway } 904a04a10f8SKris Kennaway 905a04a10f8SKris Kennaway void 906ca3176e7SBrian Feldman server_input_global_request(int type, int plen, void *ctxt) 907ca3176e7SBrian Feldman { 908ca3176e7SBrian Feldman char *rtype; 909ca3176e7SBrian Feldman int want_reply; 910ca3176e7SBrian Feldman int success = 0; 911ca3176e7SBrian Feldman 912ca3176e7SBrian Feldman rtype = packet_get_string(NULL); 913ca3176e7SBrian Feldman want_reply = packet_get_char(); 914ca3176e7SBrian Feldman debug("server_input_global_request: rtype %s want_reply %d", rtype, want_reply); 915ca3176e7SBrian Feldman 916ca3176e7SBrian Feldman /* -R style forwarding */ 917ca3176e7SBrian Feldman if (strcmp(rtype, "tcpip-forward") == 0) { 918ca3176e7SBrian Feldman struct passwd *pw; 919ca3176e7SBrian Feldman char *listen_address; 920ca3176e7SBrian Feldman u_short listen_port; 921ca3176e7SBrian Feldman 922ca3176e7SBrian Feldman pw = auth_get_user(); 923ca3176e7SBrian Feldman if (pw == NULL) 924ca3176e7SBrian Feldman fatal("server_input_global_request: no user"); 925ca3176e7SBrian Feldman listen_address = packet_get_string(NULL); /* XXX currently ignored */ 926ca3176e7SBrian Feldman listen_port = (u_short)packet_get_int(); 927ca3176e7SBrian Feldman debug("server_input_global_request: tcpip-forward listen %s port %d", 928ca3176e7SBrian Feldman listen_address, listen_port); 929ca3176e7SBrian Feldman 930ca3176e7SBrian Feldman /* check permissions */ 931ca3176e7SBrian Feldman if (!options.allow_tcp_forwarding || 932ca3176e7SBrian Feldman no_port_forwarding_flag || 933ca3176e7SBrian Feldman (listen_port < IPPORT_RESERVED && pw->pw_uid != 0)) { 934ca3176e7SBrian Feldman success = 0; 935ca3176e7SBrian Feldman packet_send_debug("Server has disabled port forwarding."); 936ca3176e7SBrian Feldman } else { 937ca3176e7SBrian Feldman /* Start listening on the port */ 938ca3176e7SBrian Feldman success = channel_request_forwarding( 939ca3176e7SBrian Feldman listen_address, listen_port, 940ca3176e7SBrian Feldman /*unspec host_to_connect*/ "<unspec host>", 941ca3176e7SBrian Feldman /*unspec port_to_connect*/ 0, 942ca3176e7SBrian Feldman options.gateway_ports, /*remote*/ 1); 943ca3176e7SBrian Feldman } 944ca3176e7SBrian Feldman xfree(listen_address); 945ca3176e7SBrian Feldman } 946ca3176e7SBrian Feldman if (want_reply) { 947ca3176e7SBrian Feldman packet_start(success ? 948ca3176e7SBrian Feldman SSH2_MSG_REQUEST_SUCCESS : SSH2_MSG_REQUEST_FAILURE); 949ca3176e7SBrian Feldman packet_send(); 950ca3176e7SBrian Feldman packet_write_wait(); 951ca3176e7SBrian Feldman } 952ca3176e7SBrian Feldman xfree(rtype); 953ca3176e7SBrian Feldman } 954ca3176e7SBrian Feldman 955ca3176e7SBrian Feldman void 956ca3176e7SBrian Feldman server_init_dispatch_20(void) 957a04a10f8SKris Kennaway { 958a04a10f8SKris Kennaway debug("server_init_dispatch_20"); 959a04a10f8SKris Kennaway dispatch_init(&dispatch_protocol_error); 960a04a10f8SKris Kennaway dispatch_set(SSH2_MSG_CHANNEL_CLOSE, &channel_input_oclose); 961a04a10f8SKris Kennaway dispatch_set(SSH2_MSG_CHANNEL_DATA, &channel_input_data); 962a04a10f8SKris Kennaway dispatch_set(SSH2_MSG_CHANNEL_EOF, &channel_input_ieof); 963a04a10f8SKris Kennaway dispatch_set(SSH2_MSG_CHANNEL_EXTENDED_DATA, &channel_input_extended_data); 964a04a10f8SKris Kennaway dispatch_set(SSH2_MSG_CHANNEL_OPEN, &server_input_channel_open); 965a04a10f8SKris Kennaway dispatch_set(SSH2_MSG_CHANNEL_OPEN_CONFIRMATION, &channel_input_open_confirmation); 966a04a10f8SKris Kennaway dispatch_set(SSH2_MSG_CHANNEL_OPEN_FAILURE, &channel_input_open_failure); 967a04a10f8SKris Kennaway dispatch_set(SSH2_MSG_CHANNEL_REQUEST, &channel_input_channel_request); 968a04a10f8SKris Kennaway dispatch_set(SSH2_MSG_CHANNEL_WINDOW_ADJUST, &channel_input_window_adjust); 969ca3176e7SBrian Feldman dispatch_set(SSH2_MSG_GLOBAL_REQUEST, &server_input_global_request); 970ca3176e7SBrian Feldman /* client_alive */ 971ca3176e7SBrian Feldman dispatch_set(SSH2_MSG_CHANNEL_FAILURE, &server_input_channel_failure); 972ca3176e7SBrian Feldman /* rekeying */ 973ca3176e7SBrian Feldman dispatch_set(SSH2_MSG_KEXINIT, &kex_input_kexinit); 974a04a10f8SKris Kennaway } 975a04a10f8SKris Kennaway void 976ca3176e7SBrian Feldman server_init_dispatch_13(void) 977a04a10f8SKris Kennaway { 978a04a10f8SKris Kennaway debug("server_init_dispatch_13"); 979a04a10f8SKris Kennaway dispatch_init(NULL); 980a04a10f8SKris Kennaway dispatch_set(SSH_CMSG_EOF, &server_input_eof); 981a04a10f8SKris Kennaway dispatch_set(SSH_CMSG_STDIN_DATA, &server_input_stdin_data); 982a04a10f8SKris Kennaway dispatch_set(SSH_CMSG_WINDOW_SIZE, &server_input_window_size); 983a04a10f8SKris Kennaway dispatch_set(SSH_MSG_CHANNEL_CLOSE, &channel_input_close); 984a04a10f8SKris Kennaway dispatch_set(SSH_MSG_CHANNEL_CLOSE_CONFIRMATION, &channel_input_close_confirmation); 985a04a10f8SKris Kennaway dispatch_set(SSH_MSG_CHANNEL_DATA, &channel_input_data); 986a04a10f8SKris Kennaway dispatch_set(SSH_MSG_CHANNEL_OPEN_CONFIRMATION, &channel_input_open_confirmation); 987a04a10f8SKris Kennaway dispatch_set(SSH_MSG_CHANNEL_OPEN_FAILURE, &channel_input_open_failure); 988a04a10f8SKris Kennaway dispatch_set(SSH_MSG_PORT_OPEN, &channel_input_port_open); 989a04a10f8SKris Kennaway } 990a04a10f8SKris Kennaway void 991ca3176e7SBrian Feldman server_init_dispatch_15(void) 992a04a10f8SKris Kennaway { 993a04a10f8SKris Kennaway server_init_dispatch_13(); 994a04a10f8SKris Kennaway debug("server_init_dispatch_15"); 995a04a10f8SKris Kennaway dispatch_set(SSH_MSG_CHANNEL_CLOSE, &channel_input_ieof); 996a04a10f8SKris Kennaway dispatch_set(SSH_MSG_CHANNEL_CLOSE_CONFIRMATION, &channel_input_oclose); 997a04a10f8SKris Kennaway } 998a04a10f8SKris Kennaway void 999ca3176e7SBrian Feldman server_init_dispatch(void) 1000a04a10f8SKris Kennaway { 1001a04a10f8SKris Kennaway if (compat20) 1002a04a10f8SKris Kennaway server_init_dispatch_20(); 1003a04a10f8SKris Kennaway else if (compat13) 1004a04a10f8SKris Kennaway server_init_dispatch_13(); 1005a04a10f8SKris Kennaway else 1006a04a10f8SKris Kennaway server_init_dispatch_15(); 1007a04a10f8SKris Kennaway } 1008ca3176e7SBrian Feldman 1009