mirror of
https://git.FreeBSD.org/src.git
synced 2024-12-17 10:26:15 +00:00
8360efbd6c
associated changes that had to happen to make this possible as well as bugs fixed along the way. Bring in required TLI library routines to support this. Since we don't support TLI we've essentially copied what NetBSD has done, adding a thin layer to emulate direct the TLI calls into BSD socket calls. This is mostly from Sun's tirpc release that was made in 1994, however some fixes were backported from the 1999 release (supposedly only made available after this porting effort was underway). The submitter has agreed to continue on and bring us up to the 1999 release. Several key features are introduced with this update: Client calls are thread safe. (1999 code has server side thread safe) Updated, a more modern interface. Many userland updates were done to bring the code up to par with the recent RPC API. There is an update to the pthreads library, a function pthread_main_np() was added to emulate a function of Sun's threads library. While we're at it, bring in NetBSD's lockd, it's been far too long of a wait. New rpcbind(8) replaces portmap(8) (supporting communication over an authenticated Unix-domain socket, and by default only allowing set and unset requests over that channel). It's much more secure than the old portmapper. Umount(8), mountd(8), mount_nfs(8), nfsd(8) have also been upgraded to support TI-RPC and to support IPV6. Umount(8) is also fixed to unmount pathnames longer than 80 chars, which are currently truncated by the Kernel statfs structure. Submitted by: Martin Blapp <mb@imp.ch> Manpage review: ru Secure RPC implemented by: wpaul
875 lines
22 KiB
C
875 lines
22 KiB
C
/*
|
|
* Copyright (c) 1992, 1993, 1994
|
|
* The Regents of the University of California. All rights reserved.
|
|
*
|
|
* This code is derived from software contributed to Berkeley by
|
|
* Rick Macklem at The University of Guelph.
|
|
*
|
|
* Redistribution and use in source and binary forms, with or without
|
|
* modification, are permitted provided that the following conditions
|
|
* are met:
|
|
* 1. Redistributions of source code must retain the above copyright
|
|
* notice, this list of conditions and the following disclaimer.
|
|
* 2. Redistributions in binary form must reproduce the above copyright
|
|
* notice, this list of conditions and the following disclaimer in the
|
|
* documentation and/or other materials provided with the distribution.
|
|
* 3. All advertising materials mentioning features or use of this software
|
|
* must display the following acknowledgement:
|
|
* This product includes software developed by the University of
|
|
* California, Berkeley and its contributors.
|
|
* 4. Neither the name of the University nor the names of its contributors
|
|
* may be used to endorse or promote products derived from this software
|
|
* without specific prior written permission.
|
|
*
|
|
* THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
|
|
* ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
|
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
|
* ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
|
|
* FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
|
|
* DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
|
|
* OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
|
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
|
|
* LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
|
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
|
* SUCH DAMAGE.
|
|
*/
|
|
|
|
#ifndef lint
|
|
static const char copyright[] =
|
|
"@(#) Copyright (c) 1992, 1993, 1994\n\
|
|
The Regents of the University of California. All rights reserved.\n";
|
|
#endif /* not lint */
|
|
|
|
#ifndef lint
|
|
#if 0
|
|
static char sccsid[] = "@(#)mount_nfs.c 8.11 (Berkeley) 5/4/95";
|
|
#endif
|
|
static const char rcsid[] =
|
|
"$FreeBSD$";
|
|
#endif /* not lint */
|
|
|
|
#include <sys/param.h>
|
|
#include <sys/mount.h>
|
|
#include <sys/socket.h>
|
|
#include <sys/stat.h>
|
|
#include <sys/syslog.h>
|
|
|
|
#include <rpc/rpc.h>
|
|
#include <rpc/pmap_clnt.h>
|
|
#include <rpc/pmap_prot.h>
|
|
|
|
#ifdef NFSKERB
|
|
#include <kerberosIV/des.h>
|
|
#include <kerberosIV/krb.h>
|
|
#endif
|
|
|
|
#include <nfs/rpcv2.h>
|
|
#include <nfs/nfsproto.h>
|
|
#include <nfs/nfs.h>
|
|
#include <nfs/nqnfs.h>
|
|
|
|
#include <arpa/inet.h>
|
|
|
|
#include <ctype.h>
|
|
#include <err.h>
|
|
#include <errno.h>
|
|
#include <fcntl.h>
|
|
#include <netdb.h>
|
|
#include <stdio.h>
|
|
#include <stdlib.h>
|
|
#include <strings.h>
|
|
#include <sysexits.h>
|
|
#include <unistd.h>
|
|
|
|
#include "mntopts.h"
|
|
#include "mounttab.h"
|
|
|
|
#define ALTF_BG 0x1
|
|
#define ALTF_NOCONN 0x2
|
|
#define ALTF_DUMBTIMR 0x4
|
|
#define ALTF_INTR 0x8
|
|
#define ALTF_KERB 0x10
|
|
#define ALTF_NFSV3 0x20
|
|
#define ALTF_RDIRPLUS 0x40
|
|
#define ALTF_MNTUDP 0x80
|
|
#define ALTF_RESVPORT 0x100
|
|
#define ALTF_SEQPACKET 0x200
|
|
#define ALTF_NQNFS 0x400
|
|
#define ALTF_SOFT 0x800
|
|
#define ALTF_TCP 0x1000
|
|
#define ALTF_PORT 0x2000
|
|
#define ALTF_NFSV2 0x4000
|
|
#define ALTF_ACREGMIN 0x8000
|
|
#define ALTF_ACREGMAX 0x10000
|
|
#define ALTF_ACDIRMIN 0x20000
|
|
#define ALTF_ACDIRMAX 0x40000
|
|
|
|
struct mntopt mopts[] = {
|
|
MOPT_STDOPTS,
|
|
MOPT_FORCE,
|
|
MOPT_UPDATE,
|
|
MOPT_ASYNC,
|
|
{ "bg", 0, ALTF_BG, 1 },
|
|
{ "conn", 1, ALTF_NOCONN, 1 },
|
|
{ "dumbtimer", 0, ALTF_DUMBTIMR, 1 },
|
|
{ "intr", 0, ALTF_INTR, 1 },
|
|
#ifdef NFSKERB
|
|
{ "kerb", 0, ALTF_KERB, 1 },
|
|
#endif
|
|
{ "nfsv3", 0, ALTF_NFSV3, 1 },
|
|
{ "rdirplus", 0, ALTF_RDIRPLUS, 1 },
|
|
{ "mntudp", 0, ALTF_MNTUDP, 1 },
|
|
{ "resvport", 0, ALTF_RESVPORT, 1 },
|
|
{ "nqnfs", 0, ALTF_NQNFS, 1 },
|
|
{ "soft", 0, ALTF_SOFT, 1 },
|
|
{ "tcp", 0, ALTF_TCP, 1 },
|
|
{ "port=", 0, ALTF_PORT, 1 },
|
|
{ "nfsv2", 0, ALTF_NFSV2, 1 },
|
|
{ "acregmin=", 0, ALTF_ACREGMIN, 1 },
|
|
{ "acregmax=", 0, ALTF_ACREGMAX, 1 },
|
|
{ "acdirmin=", 0, ALTF_ACDIRMIN, 1 },
|
|
{ "acdirmax=", 0, ALTF_ACDIRMAX, 1 },
|
|
{ NULL }
|
|
};
|
|
|
|
struct nfs_args nfsdefargs = {
|
|
NFS_ARGSVERSION,
|
|
(struct sockaddr *)0,
|
|
sizeof (struct sockaddr_in),
|
|
SOCK_DGRAM,
|
|
0,
|
|
(u_char *)0,
|
|
0,
|
|
NFSMNT_RESVPORT,
|
|
NFS_WSIZE,
|
|
NFS_RSIZE,
|
|
NFS_READDIRSIZE,
|
|
10,
|
|
NFS_RETRANS,
|
|
NFS_MAXGRPS,
|
|
NFS_DEFRAHEAD,
|
|
NQ_DEFLEASE,
|
|
NQ_DEADTHRESH,
|
|
(char *)0,
|
|
/* args version 4 */
|
|
NFS_MINATTRTIMO,
|
|
NFS_MAXATTRTIMO,
|
|
NFS_MINDIRATTRTIMO,
|
|
NFS_MAXDIRATTRTIMO,
|
|
};
|
|
|
|
struct nfhret {
|
|
u_long stat;
|
|
long vers;
|
|
long auth;
|
|
long fhsize;
|
|
u_char nfh[NFSX_V3FHMAX];
|
|
};
|
|
#define DEF_RETRY 10000
|
|
#define BGRND 1
|
|
#define ISBGRND 2
|
|
int retrycnt = DEF_RETRY;
|
|
int opflags = 0;
|
|
int nfsproto = IPPROTO_UDP;
|
|
int mnttcp_ok = 1;
|
|
u_short port_no = 0;
|
|
enum {
|
|
ANY,
|
|
V2,
|
|
V3
|
|
} mountmode = ANY;
|
|
|
|
#ifdef NFSKERB
|
|
char inst[INST_SZ];
|
|
char realm[REALM_SZ];
|
|
struct {
|
|
u_long kind;
|
|
KTEXT_ST kt;
|
|
} ktick;
|
|
struct nfsrpc_nickverf kverf;
|
|
struct nfsrpc_fullblock kin, kout;
|
|
NFSKERBKEY_T kivec;
|
|
CREDENTIALS kcr;
|
|
struct timeval ktv;
|
|
NFSKERBKEYSCHED_T kerb_keysched;
|
|
#endif
|
|
|
|
int getnfsargs __P((char *, struct nfs_args *));
|
|
/* void set_rpc_maxgrouplist __P((int)); */
|
|
void usage __P((void)) __dead2;
|
|
int xdr_dir __P((XDR *, char *));
|
|
int xdr_fh __P((XDR *, struct nfhret *));
|
|
|
|
/*
|
|
* Used to set mount flags with getmntopts. Call with dir=TRUE to
|
|
* initialize altflags from the current mount flags. Call with
|
|
* dir=FALSE to update mount flags with the new value of altflags after
|
|
* the call to getmntopts.
|
|
*/
|
|
static void
|
|
set_flags(int* altflags, int* nfsflags, int dir)
|
|
{
|
|
#define F2(af, nf) \
|
|
if (dir) { \
|
|
if (*nfsflags & NFSMNT_##nf) \
|
|
*altflags |= ALTF_##af; \
|
|
else \
|
|
*altflags &= ~ALTF_##af; \
|
|
} else { \
|
|
if (*altflags & ALTF_##af) \
|
|
*nfsflags |= NFSMNT_##nf; \
|
|
else \
|
|
*nfsflags &= ~NFSMNT_##nf; \
|
|
}
|
|
#define F(f) F2(f,f)
|
|
|
|
F(NOCONN);
|
|
F(DUMBTIMR);
|
|
F2(INTR, INT);
|
|
#ifdef NFSKERB
|
|
F(KERB);
|
|
#endif
|
|
F(RDIRPLUS);
|
|
F(RESVPORT);
|
|
F(NQNFS);
|
|
F(SOFT);
|
|
|
|
#undef F
|
|
#undef F2
|
|
}
|
|
|
|
int
|
|
main(argc, argv)
|
|
int argc;
|
|
char *argv[];
|
|
{
|
|
register int c;
|
|
register struct nfs_args *nfsargsp;
|
|
struct nfs_args nfsargs;
|
|
struct nfsd_cargs ncd;
|
|
int mntflags, altflags, i, nfssvc_flag, num;
|
|
char *name, *p, *spec;
|
|
char mntpath[MAXPATHLEN];
|
|
struct vfsconf vfc;
|
|
int error = 0;
|
|
#ifdef NFSKERB
|
|
uid_t last_ruid;
|
|
|
|
last_ruid = -1;
|
|
(void)strcpy(realm, KRB_REALM);
|
|
if (sizeof (struct nfsrpc_nickverf) != RPCX_NICKVERF ||
|
|
sizeof (struct nfsrpc_fullblock) != RPCX_FULLBLOCK ||
|
|
((char *)&ktick.kt) - ((char *)&ktick) != NFSX_UNSIGNED ||
|
|
((char *)ktick.kt.dat) - ((char *)&ktick) != 2 * NFSX_UNSIGNED)
|
|
fprintf(stderr, "Yikes! NFSKERB structs not packed!!\n");
|
|
#endif /* NFSKERB */
|
|
retrycnt = DEF_RETRY;
|
|
|
|
mntflags = 0;
|
|
altflags = 0;
|
|
nfsargs = nfsdefargs;
|
|
nfsargsp = &nfsargs;
|
|
while ((c = getopt(argc, argv,
|
|
"23a:bcdD:g:I:iKL:lm:No:PpqR:r:sTt:w:x:U")) != -1)
|
|
switch (c) {
|
|
case '2':
|
|
mountmode = V2;
|
|
break;
|
|
case '3':
|
|
mountmode = V3;
|
|
break;
|
|
case 'a':
|
|
num = strtol(optarg, &p, 10);
|
|
if (*p || num < 0)
|
|
errx(1, "illegal -a value -- %s", optarg);
|
|
nfsargsp->readahead = num;
|
|
nfsargsp->flags |= NFSMNT_READAHEAD;
|
|
break;
|
|
case 'b':
|
|
opflags |= BGRND;
|
|
break;
|
|
case 'c':
|
|
nfsargsp->flags |= NFSMNT_NOCONN;
|
|
break;
|
|
case 'D':
|
|
num = strtol(optarg, &p, 10);
|
|
if (*p || num <= 0)
|
|
errx(1, "illegal -D value -- %s", optarg);
|
|
nfsargsp->deadthresh = num;
|
|
nfsargsp->flags |= NFSMNT_DEADTHRESH;
|
|
break;
|
|
case 'd':
|
|
nfsargsp->flags |= NFSMNT_DUMBTIMR;
|
|
break;
|
|
#if 0 /* XXXX */
|
|
case 'g':
|
|
num = strtol(optarg, &p, 10);
|
|
if (*p || num <= 0)
|
|
errx(1, "illegal -g value -- %s", optarg);
|
|
set_rpc_maxgrouplist(num);
|
|
nfsargsp->maxgrouplist = num;
|
|
nfsargsp->flags |= NFSMNT_MAXGRPS;
|
|
break;
|
|
#endif
|
|
case 'I':
|
|
num = strtol(optarg, &p, 10);
|
|
if (*p || num <= 0)
|
|
errx(1, "illegal -I value -- %s", optarg);
|
|
nfsargsp->readdirsize = num;
|
|
nfsargsp->flags |= NFSMNT_READDIRSIZE;
|
|
break;
|
|
case 'i':
|
|
nfsargsp->flags |= NFSMNT_INT;
|
|
break;
|
|
#ifdef NFSKERB
|
|
case 'K':
|
|
nfsargsp->flags |= NFSMNT_KERB;
|
|
break;
|
|
#endif
|
|
case 'L':
|
|
num = strtol(optarg, &p, 10);
|
|
if (*p || num < 2)
|
|
errx(1, "illegal -L value -- %s", optarg);
|
|
nfsargsp->leaseterm = num;
|
|
nfsargsp->flags |= NFSMNT_LEASETERM;
|
|
break;
|
|
case 'l':
|
|
nfsargsp->flags |= NFSMNT_RDIRPLUS;
|
|
break;
|
|
#ifdef NFSKERB
|
|
case 'm':
|
|
(void)strncpy(realm, optarg, REALM_SZ - 1);
|
|
realm[REALM_SZ - 1] = '\0';
|
|
break;
|
|
#endif
|
|
case 'N':
|
|
nfsargsp->flags &= ~NFSMNT_RESVPORT;
|
|
break;
|
|
case 'o':
|
|
altflags = 0;
|
|
set_flags(&altflags, &nfsargsp->flags, TRUE);
|
|
if (mountmode == V2)
|
|
altflags |= ALTF_NFSV2;
|
|
else if (mountmode == V3)
|
|
altflags |= ALTF_NFSV3;
|
|
getmntopts(optarg, mopts, &mntflags, &altflags);
|
|
set_flags(&altflags, &nfsargsp->flags, FALSE);
|
|
/*
|
|
* Handle altflags which don't map directly to
|
|
* mount flags.
|
|
*/
|
|
if(altflags & ALTF_BG)
|
|
opflags |= BGRND;
|
|
if(altflags & ALTF_MNTUDP)
|
|
mnttcp_ok = 0;
|
|
if(altflags & ALTF_TCP) {
|
|
nfsargsp->sotype = SOCK_STREAM;
|
|
nfsproto = IPPROTO_TCP;
|
|
}
|
|
if(altflags & ALTF_PORT)
|
|
port_no = atoi(strstr(optarg, "port=") + 5);
|
|
mountmode = ANY;
|
|
if(altflags & ALTF_NFSV2)
|
|
mountmode = V2;
|
|
if(altflags & ALTF_NFSV3)
|
|
mountmode = V3;
|
|
if(altflags & ALTF_ACREGMIN)
|
|
nfsargsp->acregmin = atoi(strstr(optarg,
|
|
"acregmin=") + 9);
|
|
if(altflags & ALTF_ACREGMAX)
|
|
nfsargsp->acregmax = atoi(strstr(optarg,
|
|
"acregmax=") + 9);
|
|
if(altflags & ALTF_ACDIRMIN)
|
|
nfsargsp->acdirmin = atoi(strstr(optarg,
|
|
"acdirmin=") + 9);
|
|
if(altflags & ALTF_ACDIRMAX)
|
|
nfsargsp->acdirmax = atoi(strstr(optarg,
|
|
"acdirmax=") + 9);
|
|
break;
|
|
case 'P':
|
|
/* obsolete for NFSMNT_RESVPORT, now default */
|
|
break;
|
|
case 'q':
|
|
mountmode = V3;
|
|
nfsargsp->flags |= NFSMNT_NQNFS;
|
|
break;
|
|
case 'R':
|
|
num = strtol(optarg, &p, 10);
|
|
if (*p || num <= 0)
|
|
errx(1, "illegal -R value -- %s", optarg);
|
|
retrycnt = num;
|
|
break;
|
|
case 'r':
|
|
num = strtol(optarg, &p, 10);
|
|
if (*p || num <= 0)
|
|
errx(1, "illegal -r value -- %s", optarg);
|
|
nfsargsp->rsize = num;
|
|
nfsargsp->flags |= NFSMNT_RSIZE;
|
|
break;
|
|
case 's':
|
|
nfsargsp->flags |= NFSMNT_SOFT;
|
|
break;
|
|
case 'T':
|
|
nfsargsp->sotype = SOCK_STREAM;
|
|
nfsproto = IPPROTO_TCP;
|
|
break;
|
|
case 't':
|
|
num = strtol(optarg, &p, 10);
|
|
if (*p || num <= 0)
|
|
errx(1, "illegal -t value -- %s", optarg);
|
|
nfsargsp->timeo = num;
|
|
nfsargsp->flags |= NFSMNT_TIMEO;
|
|
break;
|
|
case 'w':
|
|
num = strtol(optarg, &p, 10);
|
|
if (*p || num <= 0)
|
|
errx(1, "illegal -w value -- %s", optarg);
|
|
nfsargsp->wsize = num;
|
|
nfsargsp->flags |= NFSMNT_WSIZE;
|
|
break;
|
|
case 'x':
|
|
num = strtol(optarg, &p, 10);
|
|
if (*p || num <= 0)
|
|
errx(1, "illegal -x value -- %s", optarg);
|
|
nfsargsp->retrans = num;
|
|
nfsargsp->flags |= NFSMNT_RETRANS;
|
|
break;
|
|
case 'U':
|
|
mnttcp_ok = 0;
|
|
break;
|
|
default:
|
|
usage();
|
|
break;
|
|
}
|
|
argc -= optind;
|
|
argv += optind;
|
|
|
|
if (argc != 2) {
|
|
usage();
|
|
/* NOTREACHED */
|
|
}
|
|
|
|
spec = *argv++;
|
|
name = *argv;
|
|
|
|
if (!getnfsargs(spec, nfsargsp))
|
|
exit(1);
|
|
|
|
/* resolve the mountpoint with realpath(3) */
|
|
(void)checkpath(name, mntpath);
|
|
|
|
error = getvfsbyname("nfs", &vfc);
|
|
if (error && vfsisloadable("nfs")) {
|
|
if(vfsload("nfs"))
|
|
err(EX_OSERR, "vfsload(nfs)");
|
|
endvfsent(); /* clear cache */
|
|
error = getvfsbyname("nfs", &vfc);
|
|
}
|
|
if (error)
|
|
errx(EX_OSERR, "nfs filesystem is not available");
|
|
|
|
if (mount(vfc.vfc_name, mntpath, mntflags, nfsargsp))
|
|
err(1, "%s", mntpath);
|
|
if (nfsargsp->flags & (NFSMNT_NQNFS | NFSMNT_KERB)) {
|
|
if ((opflags & ISBGRND) == 0) {
|
|
if ((i = fork())) {
|
|
if (i == -1)
|
|
err(1, "nqnfs 1");
|
|
exit(0);
|
|
}
|
|
(void) setsid();
|
|
(void) close(STDIN_FILENO);
|
|
(void) close(STDOUT_FILENO);
|
|
(void) close(STDERR_FILENO);
|
|
(void) chdir("/");
|
|
}
|
|
openlog("mount_nfs:", LOG_PID, LOG_DAEMON);
|
|
nfssvc_flag = NFSSVC_MNTD;
|
|
ncd.ncd_dirp = mntpath;
|
|
while (nfssvc(nfssvc_flag, (caddr_t)&ncd) < 0) {
|
|
if (errno != ENEEDAUTH) {
|
|
syslog(LOG_ERR, "nfssvc err %m");
|
|
continue;
|
|
}
|
|
nfssvc_flag =
|
|
NFSSVC_MNTD | NFSSVC_GOTAUTH | NFSSVC_AUTHINFAIL;
|
|
#ifdef NFSKERB
|
|
/*
|
|
* Set up as ncd_authuid for the kerberos call.
|
|
* Must set ruid to ncd_authuid and reset the
|
|
* ticket name iff ncd_authuid is not the same
|
|
* as last time, so that the right ticket file
|
|
* is found.
|
|
* Get the Kerberos credential structure so that
|
|
* we have the session key and get a ticket for
|
|
* this uid.
|
|
* For more info see the IETF Draft "Authentication
|
|
* in ONC RPC".
|
|
*/
|
|
if (ncd.ncd_authuid != last_ruid) {
|
|
char buf[512];
|
|
(void)sprintf(buf, "%s%d",
|
|
TKT_ROOT, ncd.ncd_authuid);
|
|
krb_set_tkt_string(buf);
|
|
last_ruid = ncd.ncd_authuid;
|
|
}
|
|
setreuid(ncd.ncd_authuid, 0);
|
|
kret = krb_get_cred(NFS_KERBSRV, inst, realm, &kcr);
|
|
if (kret == RET_NOTKT) {
|
|
kret = get_ad_tkt(NFS_KERBSRV, inst, realm,
|
|
DEFAULT_TKT_LIFE);
|
|
if (kret == KSUCCESS)
|
|
kret = krb_get_cred(NFS_KERBSRV, inst, realm,
|
|
&kcr);
|
|
}
|
|
if (kret == KSUCCESS)
|
|
kret = krb_mk_req(&ktick.kt, NFS_KERBSRV, inst,
|
|
realm, 0);
|
|
|
|
/*
|
|
* Fill in the AKN_FULLNAME authenticator and verifier.
|
|
* Along with the Kerberos ticket, we need to build
|
|
* the timestamp verifier and encrypt it in CBC mode.
|
|
*/
|
|
if (kret == KSUCCESS &&
|
|
ktick.kt.length <= (RPCAUTH_MAXSIZ-3*NFSX_UNSIGNED)
|
|
&& gettimeofday(&ktv, (struct timezone *)0) == 0) {
|
|
ncd.ncd_authtype = RPCAUTH_KERB4;
|
|
ncd.ncd_authstr = (u_char *)&ktick;
|
|
ncd.ncd_authlen = nfsm_rndup(ktick.kt.length) +
|
|
3 * NFSX_UNSIGNED;
|
|
ncd.ncd_verfstr = (u_char *)&kverf;
|
|
ncd.ncd_verflen = sizeof (kverf);
|
|
memmove(ncd.ncd_key, kcr.session,
|
|
sizeof (kcr.session));
|
|
kin.t1 = htonl(ktv.tv_sec);
|
|
kin.t2 = htonl(ktv.tv_usec);
|
|
kin.w1 = htonl(NFS_KERBTTL);
|
|
kin.w2 = htonl(NFS_KERBTTL - 1);
|
|
bzero((caddr_t)kivec, sizeof (kivec));
|
|
|
|
/*
|
|
* Encrypt kin in CBC mode using the session
|
|
* key in kcr.
|
|
*/
|
|
XXX
|
|
|
|
/*
|
|
* Finally, fill the timestamp verifier into the
|
|
* authenticator and verifier.
|
|
*/
|
|
ktick.kind = htonl(RPCAKN_FULLNAME);
|
|
kverf.kind = htonl(RPCAKN_FULLNAME);
|
|
NFS_KERBW1(ktick.kt) = kout.w1;
|
|
ktick.kt.length = htonl(ktick.kt.length);
|
|
kverf.verf.t1 = kout.t1;
|
|
kverf.verf.t2 = kout.t2;
|
|
kverf.verf.w2 = kout.w2;
|
|
nfssvc_flag = NFSSVC_MNTD | NFSSVC_GOTAUTH;
|
|
}
|
|
setreuid(0, 0);
|
|
#endif /* NFSKERB */
|
|
}
|
|
}
|
|
exit(0);
|
|
}
|
|
|
|
int
|
|
getnfsargs(spec, nfsargsp)
|
|
char *spec;
|
|
struct nfs_args *nfsargsp;
|
|
{
|
|
CLIENT *clp;
|
|
struct addrinfo hints, *ai_nfs, *ai;
|
|
int ecode;
|
|
char host[NI_MAXHOST], serv[NI_MAXSERV];
|
|
static struct netbuf nfs_nb;
|
|
static struct sockaddr_storage nfs_ss;
|
|
struct netconfig *nconf;
|
|
char *netid;
|
|
struct timeval pertry, try;
|
|
enum clnt_stat clnt_stat;
|
|
int so, i, nfsvers, mntvers, orgcnt, speclen;
|
|
char *hostp, *delimp;
|
|
#ifdef NFSKERB
|
|
char *cp;
|
|
#endif
|
|
size_t len;
|
|
static struct nfhret nfhret;
|
|
static char nam[MNAMELEN + 1];
|
|
|
|
so = i = 0;
|
|
if ((delimp = strrchr(spec, ':')) != NULL) {
|
|
hostp = spec;
|
|
spec = delimp + 1;
|
|
} else if ((delimp = strrchr(spec, '@')) != NULL) {
|
|
warnx("path@server syntax is deprecated, use server:path");
|
|
hostp = delimp + 1;
|
|
} else {
|
|
warnx("no <host>:<dirpath> nfs-name");
|
|
return (0);
|
|
}
|
|
|
|
*delimp = '\0';
|
|
|
|
/*
|
|
* If there has been a trailing slash at mounttime it seems
|
|
* that some mountd implementations fail to remove the mount
|
|
* entries from their mountlist while unmounting.
|
|
*/
|
|
for (speclen = strlen(spec);
|
|
speclen > 1 && spec[speclen - 1] == '/';
|
|
speclen--)
|
|
spec[speclen - 1] = '\0';
|
|
if (strlen(hostp) + strlen(spec) + 1 > MNAMELEN) {
|
|
warnx("%s:%s: %s", hostp, spec, strerror(ENAMETOOLONG));
|
|
return (0);
|
|
}
|
|
/* Make both '@' and ':' notations equal */
|
|
if (*hostp != '\0') {
|
|
len = strlen(hostp);
|
|
memmove(nam, hostp, len);
|
|
nam[len] = ':';
|
|
memmove(nam + len + 1, spec, speclen);
|
|
nam[len + speclen + 1] = '\0';
|
|
}
|
|
|
|
/*
|
|
* Handle an internet host address and reverse resolve it if
|
|
* doing Kerberos.
|
|
*/
|
|
memset(&hints, 0, sizeof hints);
|
|
hints.ai_flags = AI_NUMERICHOST;
|
|
hints.ai_socktype = nfsargsp->sotype;
|
|
if (getaddrinfo(hostp, "nfs", &hints, &ai_nfs) == 0) {
|
|
if ((nfsargsp->flags & NFSMNT_KERB)) {
|
|
hints.ai_flags = 0;
|
|
if (getnameinfo(ai->ai_addr, ai->ai_addrlen, host,
|
|
sizeof host, serv, sizeof serv, 0) != 0) {
|
|
warnx("can't reverse resolve net address");
|
|
return (0);
|
|
}
|
|
hostp = host;
|
|
}
|
|
} else {
|
|
hints.ai_flags = 0;
|
|
if ((ecode = getaddrinfo(hostp, "nfs", &hints, &ai_nfs)) != 0) {
|
|
warnx("can't get net id for host/nfs: %s",
|
|
gai_strerror(ecode));
|
|
return (0);
|
|
}
|
|
}
|
|
#ifdef NFSKERB
|
|
if (nfsargsp->flags & NFSMNT_KERB) {
|
|
strncpy(inst, hp->h_name, INST_SZ);
|
|
inst[INST_SZ - 1] = '\0';
|
|
if (cp = strchr(inst, '.'))
|
|
*cp = '\0';
|
|
}
|
|
#endif /* NFSKERB */
|
|
|
|
orgcnt = retrycnt;
|
|
|
|
if (mountmode == ANY || mountmode == V3) {
|
|
nfsvers = 3;
|
|
mntvers = 3;
|
|
nfsargsp->flags |= NFSMNT_NFSV3;
|
|
} else {
|
|
nfsvers = 2;
|
|
mntvers = 1;
|
|
nfsargsp->flags &= ~NFSMNT_NFSV3;
|
|
}
|
|
nfhret.stat = EACCES; /* Mark not yet successful */
|
|
ai = ai_nfs;
|
|
while (ai != NULL) {
|
|
/*
|
|
* XXX. Nead a generic (family, type, proto) -> nconf interface.
|
|
* __rpc_*2nconf exist, maybe they should be exported.
|
|
*/
|
|
if (nfsargsp->sotype == SOCK_STREAM) {
|
|
if (ai->ai_family == AF_INET6)
|
|
netid = "tcp6";
|
|
else
|
|
netid = "tcp";
|
|
} else {
|
|
if (ai->ai_family == AF_INET6)
|
|
netid = "udp6";
|
|
else
|
|
netid = "udp";
|
|
}
|
|
|
|
nconf = getnetconfigent(netid);
|
|
|
|
tryagain:
|
|
retrycnt = orgcnt;
|
|
|
|
while (retrycnt > 0) {
|
|
nfs_nb.buf = &nfs_ss;
|
|
nfs_nb.maxlen = sizeof nfs_ss;
|
|
if (!rpcb_getaddr(RPCPROG_NFS, nfsvers, nconf,
|
|
&nfs_nb, hostp)){
|
|
if (rpc_createerr.cf_stat == RPC_SYSTEMERROR) {
|
|
nfhret.stat = rpc_createerr.cf_error.re_errno;
|
|
break;
|
|
}
|
|
if (rpc_createerr.cf_stat == RPC_UNKNOWNPROTO) {
|
|
nfhret.stat = EPROTONOSUPPORT;
|
|
break;
|
|
}
|
|
if ((opflags & ISBGRND) == 0)
|
|
clnt_pcreateerror(
|
|
"mount_nfs: rpcbind on server");
|
|
} else {
|
|
pertry.tv_sec = 10;
|
|
pertry.tv_usec = 0;
|
|
/*
|
|
* XXX relies on clnt_tcp_create to bind
|
|
* to a reserved socket.
|
|
*/
|
|
clp = clnt_tp_create(hostp, RPCPROG_MNT, mntvers,
|
|
mnttcp_ok ? nconf : getnetconfigent("udp"));
|
|
if (clp == NULL) {
|
|
if ((opflags & ISBGRND) == 0)
|
|
clnt_pcreateerror("Cannot MNT RPC");
|
|
} else {
|
|
CLNT_CONTROL(clp, CLSET_RETRY_TIMEOUT,
|
|
(char *)&pertry);
|
|
clp->cl_auth = authsys_create_default();
|
|
try.tv_sec = 10;
|
|
try.tv_usec = 0;
|
|
if (nfsargsp->flags & NFSMNT_KERB)
|
|
nfhret.auth = RPCAUTH_KERB4;
|
|
else
|
|
nfhret.auth = RPCAUTH_UNIX;
|
|
nfhret.vers = mntvers;
|
|
clnt_stat = clnt_call(clp, RPCMNT_MOUNT,
|
|
xdr_dir, spec, xdr_fh, &nfhret, try);
|
|
if (clnt_stat != RPC_SUCCESS) {
|
|
if (clnt_stat == RPC_PROGVERSMISMATCH) {
|
|
if (mountmode == ANY) {
|
|
mountmode = V2;
|
|
goto tryagain;
|
|
} else {
|
|
errx(1, "%s",
|
|
clnt_sperror(clp, "MNT RPC"));
|
|
}
|
|
}
|
|
if ((opflags & ISBGRND) == 0)
|
|
warnx("%s", clnt_sperror(clp,
|
|
"bad MNT RPC"));
|
|
} else {
|
|
retrycnt = 0;
|
|
}
|
|
auth_destroy(clp->cl_auth);
|
|
clnt_destroy(clp);
|
|
so = RPC_ANYSOCK;
|
|
}
|
|
}
|
|
if (--retrycnt > 0) {
|
|
if (opflags & BGRND) {
|
|
warnx("Cannot immediately mount %s:%s, "
|
|
"backgrounding", hostp, spec);
|
|
opflags &= ~BGRND;
|
|
if ((i = fork())) {
|
|
if (i == -1)
|
|
err(1, "nqnfs 2");
|
|
exit(0);
|
|
}
|
|
(void) setsid();
|
|
(void) close(STDIN_FILENO);
|
|
(void) close(STDOUT_FILENO);
|
|
(void) close(STDERR_FILENO);
|
|
(void) chdir("/");
|
|
opflags |= ISBGRND;
|
|
}
|
|
sleep(60);
|
|
}
|
|
}
|
|
if (nfhret.stat == 0)
|
|
break;
|
|
ai = ai->ai_next;
|
|
}
|
|
freeaddrinfo(ai_nfs);
|
|
if (nfhret.stat) {
|
|
if (opflags & ISBGRND)
|
|
exit(1);
|
|
warnx("can't access %s: %s", spec, strerror(nfhret.stat));
|
|
return (0);
|
|
}
|
|
{
|
|
nfsargsp->addr = (struct sockaddr *) nfs_nb.buf;
|
|
nfsargsp->addrlen = nfs_nb.len;
|
|
}
|
|
nfsargsp->fh = nfhret.nfh;
|
|
nfsargsp->fhsize = nfhret.fhsize;
|
|
nfsargsp->hostname = nam;
|
|
/* Add mounted filesystem to PATH_MOUNTTAB */
|
|
if (!add_mtab(hostp, spec))
|
|
warnx("can't update %s for %s:%s", PATH_MOUNTTAB, hostp, spec);
|
|
return (1);
|
|
}
|
|
|
|
/*
|
|
* xdr routines for mount rpc's
|
|
*/
|
|
int
|
|
xdr_dir(xdrsp, dirp)
|
|
XDR *xdrsp;
|
|
char *dirp;
|
|
{
|
|
return (xdr_string(xdrsp, &dirp, RPCMNT_PATHLEN));
|
|
}
|
|
|
|
int
|
|
xdr_fh(xdrsp, np)
|
|
XDR *xdrsp;
|
|
register struct nfhret *np;
|
|
{
|
|
register int i;
|
|
long auth, authcnt, authfnd = 0;
|
|
|
|
if (!xdr_u_long(xdrsp, &np->stat))
|
|
return (0);
|
|
if (np->stat)
|
|
return (1);
|
|
switch (np->vers) {
|
|
case 1:
|
|
np->fhsize = NFSX_V2FH;
|
|
return (xdr_opaque(xdrsp, (caddr_t)np->nfh, NFSX_V2FH));
|
|
case 3:
|
|
if (!xdr_long(xdrsp, &np->fhsize))
|
|
return (0);
|
|
if (np->fhsize <= 0 || np->fhsize > NFSX_V3FHMAX)
|
|
return (0);
|
|
if (!xdr_opaque(xdrsp, (caddr_t)np->nfh, np->fhsize))
|
|
return (0);
|
|
if (!xdr_long(xdrsp, &authcnt))
|
|
return (0);
|
|
for (i = 0; i < authcnt; i++) {
|
|
if (!xdr_long(xdrsp, &auth))
|
|
return (0);
|
|
if (auth == np->auth)
|
|
authfnd++;
|
|
}
|
|
/*
|
|
* Some servers, such as DEC's OSF/1 return a nil authenticator
|
|
* list to indicate RPCAUTH_UNIX.
|
|
*/
|
|
if (!authfnd && (authcnt > 0 || np->auth != RPCAUTH_UNIX))
|
|
np->stat = EAUTH;
|
|
return (1);
|
|
};
|
|
return (0);
|
|
}
|
|
|
|
void
|
|
usage()
|
|
{
|
|
(void)fprintf(stderr, "%s\n%s\n%s\n%s\n",
|
|
"usage: mount_nfs [-23KNPTUbcdilqs] [-D deadthresh] [-I readdirsize]",
|
|
" [-L leaseterm] [-R retrycnt] [-a maxreadahead]",
|
|
" [-g maxgroups] [-m realm] [-o options] [-r readsize]",
|
|
" [-t timeout] [-w writesize] [-x retrans] rhost:path node");
|
|
exit(1);
|
|
}
|