xref: /freebsd/usr.sbin/lpr/lpd/lpd.c (revision 5521ff5a4d1929056e7ffc982fac3341ca54df7c)
1 /*
2  * Copyright (c) 1983, 1993, 1994
3  *	The Regents of the University of California.  All rights reserved.
4  *
5  *
6  * Redistribution and use in source and binary forms, with or without
7  * modification, are permitted provided that the following conditions
8  * are met:
9  * 1. Redistributions of source code must retain the above copyright
10  *    notice, this list of conditions and the following disclaimer.
11  * 2. Redistributions in binary form must reproduce the above copyright
12  *    notice, this list of conditions and the following disclaimer in the
13  *    documentation and/or other materials provided with the distribution.
14  * 3. All advertising materials mentioning features or use of this software
15  *    must display the following acknowledgement:
16  *	This product includes software developed by the University of
17  *	California, Berkeley and its contributors.
18  * 4. Neither the name of the University nor the names of its contributors
19  *    may be used to endorse or promote products derived from this software
20  *    without specific prior written permission.
21  *
22  * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
23  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
24  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
25  * ARE DISCLAIMED.  IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
26  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
27  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
28  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
29  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
30  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
31  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
32  * SUCH DAMAGE.
33  */
34 
35 #ifndef lint
36 static const char copyright[] =
37 "@(#) Copyright (c) 1983, 1993, 1994\n\
38 	The Regents of the University of California.  All rights reserved.\n";
39 #endif /* not lint */
40 
41 #ifndef lint
42 #if 0
43 static char sccsid[] = "@(#)lpd.c	8.7 (Berkeley) 5/10/95";
44 #endif
45 static const char rcsid[] =
46   "$FreeBSD$";
47 #endif /* not lint */
48 
49 /*
50  * lpd -- line printer daemon.
51  *
52  * Listen for a connection and perform the requested operation.
53  * Operations are:
54  *	\1printer\n
55  *		check the queue for jobs and print any found.
56  *	\2printer\n
57  *		receive a job from another machine and queue it.
58  *	\3printer [users ...] [jobs ...]\n
59  *		return the current state of the queue (short form).
60  *	\4printer [users ...] [jobs ...]\n
61  *		return the current state of the queue (long form).
62  *	\5printer person [users ...] [jobs ...]\n
63  *		remove jobs from the queue.
64  *
65  * Strategy to maintain protected spooling area:
66  *	1. Spooling area is writable only by daemon and spooling group
67  *	2. lpr runs setuid root and setgrp spooling group; it uses
68  *	   root to access any file it wants (verifying things before
69  *	   with an access call) and group id to know how it should
70  *	   set up ownership of files in the spooling area.
71  *	3. Files in spooling area are owned by root, group spooling
72  *	   group, with mode 660.
73  *	4. lpd, lpq and lprm run setuid daemon and setgrp spooling group to
74  *	   access files and printer.  Users can't get to anything
75  *	   w/o help of lpq and lprm programs.
76  */
77 
78 #include <sys/param.h>
79 #include <sys/wait.h>
80 #include <sys/types.h>
81 #include <sys/socket.h>
82 #include <sys/un.h>
83 #include <sys/stat.h>
84 #include <sys/file.h>
85 #include <netinet/in.h>
86 #include <arpa/inet.h>
87 
88 #include <netdb.h>
89 #include <unistd.h>
90 #include <syslog.h>
91 #include <signal.h>
92 #include <err.h>
93 #include <errno.h>
94 #include <fcntl.h>
95 #include <dirent.h>
96 #include <stdio.h>
97 #include <stdlib.h>
98 #include <string.h>
99 #include <sysexits.h>
100 #include <ctype.h>
101 #include "lp.h"
102 #include "lp.local.h"
103 #include "pathnames.h"
104 #include "extern.h"
105 
106 int	lflag;				/* log requests flag */
107 int	pflag;				/* no incoming port flag */
108 int	from_remote;			/* from remote socket */
109 
110 int		 main(int argc, char **_argv);
111 static void	 reapchild(int _signo);
112 static void	 mcleanup(int _signo);
113 static void	 doit(void);
114 static void	 startup(void);
115 static void	 chkhost(struct sockaddr *_f, int _ch_opts);
116 static int	 ckqueue(struct printer *_pp);
117 static void	 fhosterr(int _dosys, const char *_sysmsg, const char *_usermsg,
118 			  ...);
119 static int	*socksetup(int _af, int _debuglvl);
120 static void	 usage(void);
121 
122 /* XXX from libc/net/rcmd.c */
123 extern int __ivaliduser_sa __P((FILE *, struct sockaddr *, socklen_t,
124 				const char *, const char *));
125 
126 uid_t	uid, euid;
127 
128 #define LPD_NOPORTCHK	0001		/* skip reserved-port check */
129 #define LPD_LOGCONNERR	0002		/* (sys)log connection errors */
130 
131 int
132 main(int argc, char **argv)
133 {
134 	int ch_options, errs, f, funix, *finet, fromlen, i, socket_debug;
135 	fd_set defreadfds;
136 	struct sockaddr_un un, fromunix;
137 	struct sockaddr_storage frominet;
138 	int lfd;
139 	sigset_t omask, nmask;
140 	struct servent *sp, serv;
141 	int inet_flag = 0, inet6_flag = 0;
142 
143 	euid = geteuid();	/* these shouldn't be different */
144 	uid = getuid();
145 
146 	ch_options = 0;
147 	socket_debug = 0;
148 	gethostname(local_host, sizeof(local_host));
149 
150 	progname = "lpd";
151 
152 	if (euid != 0)
153 		errx(EX_NOPERM,"must run as root");
154 
155 	errs = 0;
156 	while ((i = getopt(argc, argv, "cdlpw46")) != -1)
157 		switch (i) {
158 		case 'c':
159 			/* log all kinds of connection-errors to syslog */
160 			ch_options |= LPD_LOGCONNERR;
161 			break;
162 		case 'd':
163 			socket_debug++;
164 			break;
165 		case 'l':
166 			lflag++;
167 			break;
168 		case 'p':
169 			pflag++;
170 			break;
171 		case 'w':
172 			/* allow connections coming from a non-reserved port */
173 			/* (done by some lpr-implementations for MS-Windows) */
174 			ch_options |= LPD_NOPORTCHK;
175 			break;
176 		case '4':
177 			family = PF_INET;
178 			inet_flag++;
179 			break;
180 		case '6':
181 #ifdef INET6
182 			family = PF_INET6;
183 			inet6_flag++;
184 #else
185 			errx(EX_USAGE, "lpd compiled sans INET6 (IPv6 support)");
186 #endif
187 			break;
188 		default:
189 			errs++;
190 		}
191 	if (inet_flag && inet6_flag)
192 		family = PF_UNSPEC;
193 	argc -= optind;
194 	argv += optind;
195 	if (errs)
196 		usage();
197 
198 	if (argc == 1) {
199 		if ((i = atoi(argv[0])) == 0)
200 			usage();
201 		if (i < 0 || i > USHRT_MAX)
202 			errx(EX_USAGE, "port # %d is invalid", i);
203 
204 		serv.s_port = htons(i);
205 		sp = &serv;
206 		argc--;
207 	} else {
208 		sp = getservbyname("printer", "tcp");
209 		if (sp == NULL)
210 			errx(EX_OSFILE, "printer/tcp: unknown service");
211 	}
212 
213 	if (argc != 0)
214 		usage();
215 
216 	/*
217 	 * We run chkprintcap right away to catch any errors and blat them
218 	 * to stderr while we still have it open, rather than sending them
219 	 * to syslog and leaving the user wondering why lpd started and
220 	 * then stopped.  There should probably be a command-line flag to
221 	 * ignore errors from chkprintcap.
222 	 */
223 	{
224 		pid_t pid;
225 		int status;
226 		pid = fork();
227 		if (pid < 0) {
228 			err(EX_OSERR, "cannot fork");
229 		} else if (pid == 0) {	/* child */
230 			execl(_PATH_CHKPRINTCAP, _PATH_CHKPRINTCAP, (char *)0);
231 			err(EX_OSERR, "cannot execute %s", _PATH_CHKPRINTCAP);
232 		}
233 		if (waitpid(pid, &status, 0) < 0) {
234 			err(EX_OSERR, "cannot wait");
235 		}
236 		if (WIFEXITED(status) && WEXITSTATUS(status) != 0)
237 			errx(EX_OSFILE, "%d errors in printcap file, exiting",
238 			     WEXITSTATUS(status));
239 	}
240 
241 #ifndef DEBUG
242 	/*
243 	 * Set up standard environment by detaching from the parent.
244 	 */
245 	daemon(0, 0);
246 #endif
247 
248 	openlog("lpd", LOG_PID, LOG_LPR);
249 	syslog(LOG_INFO, "lpd startup: logging=%d%s", lflag,
250 	    socket_debug ? " dbg" : "");
251 	(void) umask(0);
252 	/*
253 	 * NB: This depends on O_NONBLOCK semantics doing the right thing;
254 	 * i.e., applying only to the O_EXLOCK and not to the rest of the
255 	 * open/creation.  As of 1997-12-02, this is the case for commonly-
256 	 * used filesystems.  There are other places in this code which
257 	 * make the same assumption.
258 	 */
259 	lfd = open(_PATH_MASTERLOCK, O_WRONLY|O_CREAT|O_EXLOCK|O_NONBLOCK,
260 		   LOCK_FILE_MODE);
261 	if (lfd < 0) {
262 		if (errno == EWOULDBLOCK)	/* active deamon present */
263 			exit(0);
264 		syslog(LOG_ERR, "%s: %m", _PATH_MASTERLOCK);
265 		exit(1);
266 	}
267 	fcntl(lfd, F_SETFL, 0);	/* turn off non-blocking mode */
268 	ftruncate(lfd, 0);
269 	/*
270 	 * write process id for others to know
271 	 */
272 	sprintf(line, "%u\n", getpid());
273 	f = strlen(line);
274 	if (write(lfd, line, f) != f) {
275 		syslog(LOG_ERR, "%s: %m", _PATH_MASTERLOCK);
276 		exit(1);
277 	}
278 	signal(SIGCHLD, reapchild);
279 	/*
280 	 * Restart all the printers.
281 	 */
282 	startup();
283 	(void) unlink(_PATH_SOCKETNAME);
284 	funix = socket(AF_UNIX, SOCK_STREAM, 0);
285 	if (funix < 0) {
286 		syslog(LOG_ERR, "socket: %m");
287 		exit(1);
288 	}
289 
290 	sigemptyset(&nmask);
291 	sigaddset(&nmask, SIGHUP);
292 	sigaddset(&nmask, SIGINT);
293 	sigaddset(&nmask, SIGQUIT);
294 	sigaddset(&nmask, SIGTERM);
295 	sigprocmask(SIG_BLOCK, &nmask, &omask);
296 
297 	(void) umask(07);
298 	signal(SIGHUP, mcleanup);
299 	signal(SIGINT, mcleanup);
300 	signal(SIGQUIT, mcleanup);
301 	signal(SIGTERM, mcleanup);
302 	memset(&un, 0, sizeof(un));
303 	un.sun_family = AF_UNIX;
304 	strcpy(un.sun_path, _PATH_SOCKETNAME);
305 #ifndef SUN_LEN
306 #define SUN_LEN(unp) (strlen((unp)->sun_path) + 2)
307 #endif
308 	if (bind(funix, (struct sockaddr *)&un, SUN_LEN(&un)) < 0) {
309 		syslog(LOG_ERR, "ubind: %m");
310 		exit(1);
311 	}
312 	(void) umask(0);
313 	sigprocmask(SIG_SETMASK, &omask, (sigset_t *)0);
314 	FD_ZERO(&defreadfds);
315 	FD_SET(funix, &defreadfds);
316 	listen(funix, 5);
317 	if (pflag == 0) {
318 		finet = socksetup(family, socket_debug);
319 	} else
320 		finet = NULL;	/* pretend we couldn't open TCP socket. */
321 	if (finet) {
322 		for (i = 1; i <= *finet; i++) {
323 			FD_SET(finet[i], &defreadfds);
324 			listen(finet[i], 5);
325 		}
326 	}
327 	/*
328 	 * Main loop: accept, do a request, continue.
329 	 */
330 	memset(&frominet, 0, sizeof(frominet));
331 	memset(&fromunix, 0, sizeof(fromunix));
332 	if (lflag)
333 		syslog(LOG_INFO, "lpd startup: ready to accept requests");
334 	/*
335 	 * XXX - should be redone for multi-protocol
336 	 */
337 	for (;;) {
338 		int domain, nfds, s;
339 		fd_set readfds;
340 
341 		FD_COPY(&defreadfds, &readfds);
342 		nfds = select(20, &readfds, 0, 0, 0);
343 		if (nfds <= 0) {
344 			if (nfds < 0 && errno != EINTR)
345 				syslog(LOG_WARNING, "select: %m");
346 			continue;
347 		}
348 		domain = -1;		    /* avoid compile-time warning */
349 		s = -1;			    /* avoid compile-time warning */
350 		if (FD_ISSET(funix, &readfds)) {
351 			domain = AF_UNIX, fromlen = sizeof(fromunix);
352 			s = accept(funix,
353 			    (struct sockaddr *)&fromunix, &fromlen);
354  		} else {
355                         for (i = 1; i <= *finet; i++)
356 				if (FD_ISSET(finet[i], &readfds)) {
357 					domain = AF_INET;
358 					fromlen = sizeof(frominet);
359 					s = accept(finet[i],
360 					    (struct sockaddr *)&frominet,
361 					    &fromlen);
362 				}
363 		}
364 		if (s < 0) {
365 			if (errno != EINTR)
366 				syslog(LOG_WARNING, "accept: %m");
367 			continue;
368 		}
369 		if (fork() == 0) {
370 			signal(SIGCHLD, SIG_IGN);
371 			signal(SIGHUP, SIG_IGN);
372 			signal(SIGINT, SIG_IGN);
373 			signal(SIGQUIT, SIG_IGN);
374 			signal(SIGTERM, SIG_IGN);
375 			(void) close(funix);
376 			if (pflag == 0 && finet) {
377                         	for (i = 1; i <= *finet; i++)
378 					(void)close(finet[i]);
379 			}
380 			dup2(s, 1);
381 			(void) close(s);
382 			if (domain == AF_INET) {
383 				/* for both AF_INET and AF_INET6 */
384 				from_remote = 1;
385  				chkhost((struct sockaddr *)&frominet,
386 				    ch_options);
387 			} else
388 				from_remote = 0;
389 			doit();
390 			exit(0);
391 		}
392 		(void) close(s);
393 	}
394 }
395 
396 static void
397 reapchild(int signo __unused)
398 {
399 	union wait status;
400 
401 	while (wait3((int *)&status, WNOHANG, 0) > 0)
402 		;
403 }
404 
405 static void
406 mcleanup(int signo)
407 {
408 	/*
409 	 * XXX syslog(3) is not signal-safe.
410 	 */
411 	if (lflag) {
412 		if (signo)
413 			syslog(LOG_INFO, "exiting on signal %d", signo);
414 		else
415 			syslog(LOG_INFO, "exiting");
416 	}
417 	unlink(_PATH_SOCKETNAME);
418 	exit(0);
419 }
420 
421 /*
422  * Stuff for handling job specifications
423  */
424 char	*user[MAXUSERS];	/* users to process */
425 int	users;			/* # of users in user array */
426 int	requ[MAXREQUESTS];	/* job number of spool entries */
427 int	requests;		/* # of spool requests */
428 char	*person;		/* name of person doing lprm */
429 
430 		 /* buffer to hold the client's machine-name */
431 static char	 frombuf[MAXHOSTNAMELEN];
432 char	cbuf[BUFSIZ];		/* command line buffer */
433 const char	*cmdnames[] = {
434 	"null",
435 	"printjob",
436 	"recvjob",
437 	"displayq short",
438 	"displayq long",
439 	"rmjob"
440 };
441 
442 static void
443 doit(void)
444 {
445 	char *cp, *printer;
446 	int n;
447 	int status;
448 	struct printer myprinter, *pp = &myprinter;
449 
450 	init_printer(&myprinter);
451 
452 	for (;;) {
453 		cp = cbuf;
454 		do {
455 			if (cp >= &cbuf[sizeof(cbuf) - 1])
456 				fatal(0, "Command line too long");
457 			if ((n = read(1, cp, 1)) != 1) {
458 				if (n < 0)
459 					fatal(0, "Lost connection");
460 				return;
461 			}
462 		} while (*cp++ != '\n');
463 		*--cp = '\0';
464 		cp = cbuf;
465 		if (lflag) {
466 			if (*cp >= '\1' && *cp <= '\5')
467 				syslog(LOG_INFO, "%s requests %s %s",
468 					from_host, cmdnames[(u_char)*cp], cp+1);
469 			else
470 				syslog(LOG_INFO, "bad request (%d) from %s",
471 					*cp, from_host);
472 		}
473 		switch (*cp++) {
474 		case CMD_CHECK_QUE: /* check the queue, print any jobs there */
475 			startprinting(cp);
476 			break;
477 		case CMD_TAKE_THIS: /* receive files to be queued */
478 			if (!from_remote) {
479 				syslog(LOG_INFO, "illegal request (%d)", *cp);
480 				exit(1);
481 			}
482 			recvjob(cp);
483 			break;
484 		case CMD_SHOWQ_SHORT: /* display the queue (short form) */
485 		case CMD_SHOWQ_LONG: /* display the queue (long form) */
486 			/* XXX - this all needs to be redone. */
487 			printer = cp;
488 			while (*cp) {
489 				if (*cp != ' ') {
490 					cp++;
491 					continue;
492 				}
493 				*cp++ = '\0';
494 				while (isspace(*cp))
495 					cp++;
496 				if (*cp == '\0')
497 					break;
498 				if (isdigit(*cp)) {
499 					if (requests >= MAXREQUESTS)
500 						fatal(0, "Too many requests");
501 					requ[requests++] = atoi(cp);
502 				} else {
503 					if (users >= MAXUSERS)
504 						fatal(0, "Too many users");
505 					user[users++] = cp;
506 				}
507 			}
508 			status = getprintcap(printer, pp);
509 			if (status < 0)
510 				fatal(pp, pcaperr(status));
511 			displayq(pp, cbuf[0] == CMD_SHOWQ_LONG);
512 			exit(0);
513 		case CMD_RMJOB:	/* remove a job from the queue */
514 			if (!from_remote) {
515 				syslog(LOG_INFO, "illegal request (%d)", *cp);
516 				exit(1);
517 			}
518 			printer = cp;
519 			while (*cp && *cp != ' ')
520 				cp++;
521 			if (!*cp)
522 				break;
523 			*cp++ = '\0';
524 			person = cp;
525 			while (*cp) {
526 				if (*cp != ' ') {
527 					cp++;
528 					continue;
529 				}
530 				*cp++ = '\0';
531 				while (isspace(*cp))
532 					cp++;
533 				if (*cp == '\0')
534 					break;
535 				if (isdigit(*cp)) {
536 					if (requests >= MAXREQUESTS)
537 						fatal(0, "Too many requests");
538 					requ[requests++] = atoi(cp);
539 				} else {
540 					if (users >= MAXUSERS)
541 						fatal(0, "Too many users");
542 					user[users++] = cp;
543 				}
544 			}
545 			rmjob(printer);
546 			break;
547 		}
548 		fatal(0, "Illegal service request");
549 	}
550 }
551 
552 /*
553  * Make a pass through the printcap database and start printing any
554  * files left from the last time the machine went down.
555  */
556 static void
557 startup(void)
558 {
559 	int pid, status, more;
560 	struct printer myprinter, *pp = &myprinter;
561 
562 	more = firstprinter(pp, &status);
563 	if (status)
564 		goto errloop;
565 	while (more) {
566 		if (ckqueue(pp) <= 0) {
567 			goto next;
568 		}
569 		if (lflag)
570 			syslog(LOG_INFO, "lpd startup: work for %s",
571 			    pp->printer);
572 		if ((pid = fork()) < 0) {
573 			syslog(LOG_WARNING, "lpd startup: cannot fork for %s",
574 			    pp->printer);
575 			mcleanup(0);
576 		}
577 		if (pid == 0) {
578 			lastprinter();
579 			printjob(pp);
580 			/* NOTREACHED */
581 		}
582 		do {
583 next:
584 			more = nextprinter(pp, &status);
585 errloop:
586 			if (status)
587 				syslog(LOG_WARNING,
588 				    "lpd startup: printcap entry for %s has errors, skipping",
589 				    pp->printer ? pp->printer : "<noname?>");
590 		} while (more && status);
591 	}
592 }
593 
594 /*
595  * Make sure there's some work to do before forking off a child
596  */
597 static int
598 ckqueue(struct printer *pp)
599 {
600 	register struct dirent *d;
601 	DIR *dirp;
602 	char *spooldir;
603 
604 	spooldir = pp->spool_dir;
605 	if ((dirp = opendir(spooldir)) == NULL)
606 		return (-1);
607 	while ((d = readdir(dirp)) != NULL) {
608 		if (d->d_name[0] != 'c' || d->d_name[1] != 'f')
609 			continue;	/* daemon control files only */
610 		closedir(dirp);
611 		return (1);		/* found something */
612 	}
613 	closedir(dirp);
614 	return (0);
615 }
616 
617 #define DUMMY ":nobody::"
618 
619 /*
620  * Check to see if the host connecting to this host has access to any
621  * lpd services on this host.
622  */
623 static void
624 chkhost(struct sockaddr *f, int ch_opts)
625 {
626 	struct addrinfo hints, *res, *r;
627 	register FILE *hostf;
628 	char hostbuf[NI_MAXHOST], ip[NI_MAXHOST];
629 	char serv[NI_MAXSERV];
630 	int error, errsav, fpass, good, wantsl;
631 
632 	wantsl = 0;
633 	if (ch_opts & LPD_LOGCONNERR)
634 		wantsl = 1;			/* also syslog the errors */
635 
636 	from_host = ".na.";
637 
638 	/* Need real hostname for temporary filenames */
639 	error = getnameinfo(f, f->sa_len, hostbuf, sizeof(hostbuf), NULL, 0,
640 	    NI_NAMEREQD);
641 	if (error) {
642 		errsav = error;
643 		error = getnameinfo(f, f->sa_len, hostbuf, sizeof(hostbuf),
644 		    NULL, 0, NI_NUMERICHOST | NI_WITHSCOPEID);
645 		if (error)
646 			fhosterr(wantsl,
647 			    "can not determine hostname for remote host (%d)",
648 			    "Host name for your address not known", error);
649 		else
650 			fhosterr(wantsl,
651 			    "Host name for remote host (%s) not known (%d)",
652 			    "Host name for your address (%s) not known",
653 			    hostbuf, errsav);
654 	}
655 
656 	strlcpy(frombuf, hostbuf, sizeof(frombuf));
657 	from_host = frombuf;
658 
659 	/* Need address in stringform for comparison (no DNS lookup here) */
660 	error = getnameinfo(f, f->sa_len, hostbuf, sizeof(hostbuf), NULL, 0,
661 	    NI_NUMERICHOST | NI_WITHSCOPEID);
662 	if (error)
663 		fhosterr(wantsl, "Cannot print IP address (error %d)",
664 		    "Cannot print IP address", error);
665 	from_ip = strdup(hostbuf);
666 
667 	/* Reject numeric addresses */
668 	memset(&hints, 0, sizeof(hints));
669 	hints.ai_family = family;
670 	hints.ai_socktype = SOCK_DGRAM;	/*dummy*/
671 	hints.ai_flags = AI_PASSIVE | AI_NUMERICHOST;
672 	if (getaddrinfo(from_host, NULL, &hints, &res) == 0) {
673 		freeaddrinfo(res);
674 		fhosterr(wantsl, NULL, "reverse lookup results in non-FQDN %s",
675 		    from_host);
676 	}
677 
678 	/* Check for spoof, ala rlogind */
679 	memset(&hints, 0, sizeof(hints));
680 	hints.ai_family = family;
681 	hints.ai_socktype = SOCK_DGRAM;	/*dummy*/
682 	error = getaddrinfo(from_host, NULL, &hints, &res);
683 	if (error) {
684 		fhosterr(wantsl, "dns lookup for address %s failed: %s",
685 		    "hostname for your address (%s) unknown: %s", from_ip,
686 		    gai_strerror(error));
687 	}
688 	good = 0;
689 	for (r = res; good == 0 && r; r = r->ai_next) {
690 		error = getnameinfo(r->ai_addr, r->ai_addrlen, ip, sizeof(ip),
691 		    NULL, 0, NI_NUMERICHOST | NI_WITHSCOPEID);
692 		if (!error && !strcmp(from_ip, ip))
693 			good = 1;
694 	}
695 	if (res)
696 		freeaddrinfo(res);
697 	if (good == 0)
698 		fhosterr(wantsl, "address for remote host (%s) not matched",
699 		    "address for your hostname (%s) not matched", from_ip);
700 
701 	fpass = 1;
702 	hostf = fopen(_PATH_HOSTSEQUIV, "r");
703 again:
704 	if (hostf) {
705 		if (__ivaliduser_sa(hostf, f, f->sa_len, DUMMY, DUMMY) == 0) {
706 			(void) fclose(hostf);
707 			goto foundhost;
708 		}
709 		(void) fclose(hostf);
710 	}
711 	if (fpass == 1) {
712 		fpass = 2;
713 		hostf = fopen(_PATH_HOSTSLPD, "r");
714 		goto again;
715 	}
716 	fhosterr(wantsl, "refused connection from %s, sip=%s",
717 	    "Print-services are not available to your host (%s).", from_host,
718 	    from_ip);
719 	/*NOTREACHED*/
720 
721 foundhost:
722 	if (ch_opts & LPD_NOPORTCHK)
723 		return;			/* skip the reserved-port check */
724 
725 	error = getnameinfo(f, f->sa_len, NULL, 0, serv, sizeof(serv),
726 	    NI_NUMERICSERV);
727 	if (error)
728 		fhosterr(wantsl, NULL, "malformed from-address (%d)", error);
729 
730 	if (atoi(serv) >= IPPORT_RESERVED)
731 		fhosterr(wantsl, NULL, "connected from invalid port (%s)",
732 		    serv);
733 }
734 
735 #include <stdarg.h>
736 /*
737  * Handle fatal errors in chkhost.  The first message will optionally be sent
738  * to syslog, the second one is sent to the connecting host.  If the first
739  * message is NULL, then the same message is used for both.  Note that the
740  * argument list for both messages are assumed to be the same (or at least
741  * the initial arguments for one must be EXACTLY the same as the complete
742  * argument list for the other message).
743  *
744  * The idea is that the syslog message is meant for an administrator of a
745  * print server (the host receiving connections), while the usermsg is meant
746  * for a remote user who may or may not be clueful, and may or may not be
747  * doing something nefarious.  Some remote users (eg, MS-Windows...) may not
748  * even see whatever message is sent, which is why there's the option to
749  * start 'lpd' with the connection-errors also sent to syslog.
750  *
751  * Given that hostnames can theoretically be fairly long (well, over 250
752  * bytes), it would probably be helpful to have the 'from_host' field at
753  * the end of any error messages which include that info.
754  */
755 void
756 fhosterr(int dosys, const char *sysmsg, const char *usermsg, ...)
757 {
758 	va_list ap;
759 	char *sbuf, *ubuf;
760 	const char *testone;
761 
762 	va_start(ap, usermsg);
763 	vasprintf(&ubuf, usermsg, ap);
764 	va_end(ap);
765 
766 	if (dosys) {
767 		sbuf = ubuf;			/* assume sysmsg == NULL */
768 		if (sysmsg != NULL) {
769 			va_start(ap, usermsg);
770 			vasprintf(&sbuf, sysmsg, ap);
771 			va_end(ap);
772 		}
773 		/*
774 		 * If the first variable-parameter is not the 'from_host',
775 		 * then first write THAT information as a line to syslog.
776 		 */
777 		va_start(ap, usermsg);
778 		testone = va_arg(ap, const char *);
779 		if (testone != from_host) {
780 		    syslog(LOG_WARNING, "for connection from %s:", from_host);
781 		}
782 		va_end(ap);
783 
784 		/* now write the syslog message */
785 		syslog(LOG_WARNING, "%s", sbuf);
786 	}
787 
788 	printf("%s [@%s]: %s\n", progname, local_host, ubuf);
789 	fflush(stdout);
790 
791 	/*
792 	 * Add a minimal delay before exiting (and disconnecting from the
793 	 * sending-host).  This is just in case that machine responds by
794 	 * INSTANTLY retrying (and instantly re-failing...).  This may also
795 	 * give the other side more time to read the error message.
796 	 */
797 	sleep(2);			/* a paranoid throttling measure */
798 	exit(1);
799 }
800 
801 /* setup server socket for specified address family */
802 /* if af is PF_UNSPEC more than one socket may be returned */
803 /* the returned list is dynamically allocated, so caller needs to free it */
804 static int *
805 socksetup(int af, int debuglvl)
806 {
807 	struct addrinfo hints, *res, *r;
808 	int error, maxs, *s, *socks;
809 	const int on = 1;
810 
811 	memset(&hints, 0, sizeof(hints));
812 	hints.ai_flags = AI_PASSIVE;
813 	hints.ai_family = af;
814 	hints.ai_socktype = SOCK_STREAM;
815 	error = getaddrinfo(NULL, "printer", &hints, &res);
816 	if (error) {
817 		syslog(LOG_ERR, "%s", gai_strerror(error));
818 		mcleanup(0);
819 	}
820 
821 	/* Count max number of sockets we may open */
822 	for (maxs = 0, r = res; r; r = r->ai_next, maxs++)
823 		;
824 	socks = malloc((maxs + 1) * sizeof(int));
825 	if (!socks) {
826 		syslog(LOG_ERR, "couldn't allocate memory for sockets");
827 		mcleanup(0);
828 	}
829 
830 	*socks = 0;   /* num of sockets counter at start of array */
831 	s = socks + 1;
832 	for (r = res; r; r = r->ai_next) {
833 		*s = socket(r->ai_family, r->ai_socktype, r->ai_protocol);
834 		if (*s < 0) {
835 			syslog(LOG_DEBUG, "socket(): %m");
836 			continue;
837 		}
838 		if (setsockopt(*s, SOL_SOCKET, SO_REUSEADDR, &on, sizeof(on))
839 		    < 0) {
840 			syslog(LOG_ERR, "setsockopt(SO_REUSEADDR): %m");
841 			close(*s);
842 			continue;
843 		}
844 		if (debuglvl)
845 			if (setsockopt(*s, SOL_SOCKET, SO_DEBUG, &debuglvl,
846 			    sizeof(debuglvl)) < 0) {
847 				syslog(LOG_ERR, "setsockopt (SO_DEBUG): %m");
848 				close(*s);
849 				continue;
850 			}
851 #ifdef IPV6_BINDV6ONLY
852 		if (r->ai_family == AF_INET6) {
853 			if (setsockopt(*s, IPPROTO_IPV6, IPV6_BINDV6ONLY,
854 				       &on, sizeof(on)) < 0) {
855 				syslog(LOG_ERR,
856 				       "setsockopt (IPV6_BINDV6ONLY): %m");
857 				close(*s);
858 				continue;
859 			}
860 		}
861 #endif
862 		if (bind(*s, r->ai_addr, r->ai_addrlen) < 0) {
863 			syslog(LOG_DEBUG, "bind(): %m");
864 			close(*s);
865 			continue;
866 		}
867 		(*socks)++;
868 		s++;
869 	}
870 
871 	if (res)
872 		freeaddrinfo(res);
873 
874 	if (*socks == 0) {
875 		syslog(LOG_ERR, "Couldn't bind to any socket");
876 		free(socks);
877 		mcleanup(0);
878 	}
879 	return(socks);
880 }
881 
882 static void
883 usage(void)
884 {
885 #ifdef INET6
886 	fprintf(stderr, "usage: lpd [-cdlpw46] [port#]\n");
887 #else
888 	fprintf(stderr, "usage: lpd [-cdlpw] [port#]\n");
889 #endif
890 	exit(EX_USAGE);
891 }
892