mirror of
https://git.FreeBSD.org/src.git
synced 2024-12-19 10:53:58 +00:00
5106c67149
Stay as the invoking uid as much as possible. Execution as a normal user is still forbidden for now, so these changes are pretty ineffective. The next commit will implement the modifications suggested on -hackers a number of days ago.
144 lines
3.2 KiB
C
144 lines
3.2 KiB
C
/*
|
|
* $Id: server.c,v 1.6 1997/10/26 01:03:39 brian Exp $
|
|
*/
|
|
|
|
#include <sys/param.h>
|
|
#include <sys/socket.h>
|
|
#include <netinet/in.h>
|
|
#include <arpa/inet.h>
|
|
#include <netinet/in_systm.h>
|
|
#include <netinet/ip.h>
|
|
|
|
#include <errno.h>
|
|
#include <stdio.h>
|
|
#include <string.h>
|
|
#include <sys/stat.h>
|
|
#include <sys/un.h>
|
|
#include <unistd.h>
|
|
|
|
#include "mbuf.h"
|
|
#include "log.h"
|
|
#include "loadalias.h"
|
|
#include "command.h"
|
|
#include "vars.h"
|
|
#include "server.h"
|
|
#include "log.h"
|
|
#include "id.h"
|
|
#include "defs.h"
|
|
|
|
int server = -2;
|
|
|
|
static struct sockaddr_un ifsun;
|
|
static char *rm;
|
|
|
|
int
|
|
ServerLocalOpen(const char *name, mode_t mask)
|
|
{
|
|
int s;
|
|
|
|
if (VarLocalAuth == LOCAL_DENY) {
|
|
LogPrintf(LogERROR, "Local: Can't open socket %s: No password "
|
|
"in ppp.secret\n", name);
|
|
return 1;
|
|
}
|
|
|
|
if (!(mode&(MODE_AUTO|MODE_DEDICATED|MODE_DIRECT))) {
|
|
LogPrintf(LogERROR, "Local: Can't open socket in interactive mode\n");
|
|
return 1;
|
|
}
|
|
|
|
ifsun.sun_len = strlen(name);
|
|
if (ifsun.sun_len > sizeof ifsun.sun_path - 1) {
|
|
LogPrintf(LogERROR, "Local: %s: Path too long\n", name);
|
|
return 2;
|
|
}
|
|
ifsun.sun_family = AF_LOCAL;
|
|
strcpy(ifsun.sun_path, name);
|
|
|
|
s = ID0socket(PF_LOCAL, SOCK_STREAM, 0);
|
|
if (s < 0) {
|
|
LogPrintf(LogERROR, "Local: socket: %s\n", strerror(errno));
|
|
return 3;
|
|
}
|
|
setsockopt(s, SOL_SOCKET, SO_REUSEADDR, &s, sizeof s);
|
|
mask = umask(mask);
|
|
if (bind(s, (struct sockaddr *) & ifsun, sizeof(ifsun)) < 0) {
|
|
umask(mask);
|
|
LogPrintf(LogERROR, "Local: bind: %s\n", strerror(errno));
|
|
if (errno == EADDRINUSE && VarTerm)
|
|
fprintf(VarTerm, "Wait for a while, then try again.\n");
|
|
close(s);
|
|
ID0unlink(name);
|
|
return 4;
|
|
}
|
|
umask(mask);
|
|
if (listen(s, 5) != 0) {
|
|
LogPrintf(LogERROR, "Local: Unable to listen to socket - OS overload?\n");
|
|
close(s);
|
|
ID0unlink(name);
|
|
return 5;
|
|
}
|
|
ServerClose();
|
|
server = s;
|
|
rm = ifsun.sun_path;
|
|
LogPrintf(LogPHASE, "Listening at local socket %s.\n", name);
|
|
return 0;
|
|
}
|
|
|
|
int
|
|
ServerTcpOpen(int port)
|
|
{
|
|
struct sockaddr_in ifsin;
|
|
int s;
|
|
|
|
if (VarLocalAuth == LOCAL_DENY) {
|
|
LogPrintf(LogERROR, "Tcp: Can't open socket %d: No password "
|
|
"in ppp.secret\n", port);
|
|
return 6;
|
|
}
|
|
|
|
if (!(mode&(MODE_AUTO|MODE_DEDICATED|MODE_DIRECT))) {
|
|
LogPrintf(LogERROR, "Tcp: Can't open socket in interactive mode\n");
|
|
return 6;
|
|
}
|
|
|
|
s = ID0socket(PF_INET, SOCK_STREAM, 0);
|
|
if (s < 0) {
|
|
LogPrintf(LogERROR, "Tcp: socket: %s\n", strerror(errno));
|
|
return 7;
|
|
}
|
|
ifsin.sin_family = AF_INET;
|
|
ifsin.sin_addr.s_addr = INADDR_ANY;
|
|
ifsin.sin_port = htons(port);
|
|
setsockopt(s, SOL_SOCKET, SO_REUSEADDR, &s, sizeof s);
|
|
if (bind(s, (struct sockaddr *) & ifsin, sizeof(ifsin)) < 0) {
|
|
LogPrintf(LogERROR, "Tcp: bind: %s\n", strerror(errno));
|
|
if (errno == EADDRINUSE && VarTerm)
|
|
fprintf(VarTerm, "Wait for a while, then try again.\n");
|
|
close(s);
|
|
return 8;
|
|
}
|
|
if (listen(s, 5) != 0) {
|
|
LogPrintf(LogERROR, "Tcp: Unable to listen to socket - OS overload?\n");
|
|
close(s);
|
|
return 9;
|
|
}
|
|
ServerClose();
|
|
server = s;
|
|
LogPrintf(LogPHASE, "Listening at port %d.\n", port);
|
|
return 0;
|
|
}
|
|
|
|
void
|
|
ServerClose()
|
|
{
|
|
if (server >= 0) {
|
|
close(server);
|
|
if (rm) {
|
|
ID0unlink(rm);
|
|
rm = 0;
|
|
}
|
|
}
|
|
server = -1;
|
|
}
|