comparison svr-tcpfwd.c @ 391:00fcf5045160

propagate from branch 'au.asn.ucc.matt.ltc.dropbear' (head c1db4398d56c56c6d06ae1e20c1e0d04dbb598ed) to branch 'au.asn.ucc.matt.dropbear' (head d26d5eb2837f46b56a33fb0e7573aa0201abd4d5)
author Matt Johnston <matt@ucc.asn.au>
date Thu, 11 Jan 2007 04:29:08 +0000
parents 454a34b2dfd1
children b895f91c2ee6
comparison
equal deleted inserted replaced
390:d8e44bef7917 391:00fcf5045160
1 /*
2 * Dropbear SSH
3 *
4 * Copyright (c) 2002,2003 Matt Johnston
5 * Copyright (c) 2004 by Mihnea Stoenescu
6 * All rights reserved.
7 *
8 * Permission is hereby granted, free of charge, to any person obtaining a copy
9 * of this software and associated documentation files (the "Software"), to deal
10 * in the Software without restriction, including without limitation the rights
11 * to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
12 * copies of the Software, and to permit persons to whom the Software is
13 * furnished to do so, subject to the following conditions:
14 *
15 * The above copyright notice and this permission notice shall be included in
16 * all copies or substantial portions of the Software.
17 *
18 * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
19 * IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
20 * FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
21 * AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
22 * LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
23 * OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
24 * SOFTWARE. */
25
26 #include "includes.h"
27 #include "ssh.h"
28 #include "tcpfwd.h"
29 #include "dbutil.h"
30 #include "session.h"
31 #include "buffer.h"
32 #include "packet.h"
33 #include "listener.h"
34 #include "runopts.h"
35
36 #ifdef ENABLE_SVR_REMOTETCPFWD
37
38 static void send_msg_request_success();
39 static void send_msg_request_failure();
40 static int svr_cancelremotetcp();
41 static int svr_remotetcpreq();
42 static int newtcpdirect(struct Channel * channel);
43
44
45 const struct ChanType svr_chan_tcpdirect = {
46 1, /* sepfds */
47 "direct-tcpip",
48 newtcpdirect, /* init */
49 NULL, /* checkclose */
50 NULL, /* reqhandler */
51 NULL /* closehandler */
52 };
53
54 static const struct ChanType svr_chan_tcpremote = {
55 1, /* sepfds */
56 "forwarded-tcpip",
57 NULL,
58 NULL,
59 NULL,
60 NULL
61 };
62
63 /* At the moment this is completely used for tcp code (with the name reflecting
64 * that). If new request types are added, this should be replaced with code
65 * similar to the request-switching in chansession.c */
66 void recv_msg_global_request_remotetcp() {
67
68 unsigned char* reqname = NULL;
69 unsigned int namelen;
70 unsigned int wantreply = 0;
71 int ret = DROPBEAR_FAILURE;
72
73 TRACE(("enter recv_msg_global_request_remotetcp"))
74
75 if (svr_opts.noremotetcp) {
76 TRACE(("leave recv_msg_global_request_remotetcp: remote tcp forwarding disabled"))
77 goto out;
78 }
79
80 reqname = buf_getstring(ses.payload, &namelen);
81 wantreply = buf_getbool(ses.payload);
82
83 if (namelen > MAX_NAME_LEN) {
84 TRACE(("name len is wrong: %d", namelen))
85 goto out;
86 }
87
88 if (strcmp("tcpip-forward", reqname) == 0) {
89 ret = svr_remotetcpreq();
90 } else if (strcmp("cancel-tcpip-forward", reqname) == 0) {
91 ret = svr_cancelremotetcp();
92 } else {
93 TRACE(("reqname isn't tcpip-forward: '%s'", reqname))
94 }
95
96 out:
97 if (wantreply) {
98 if (ret == DROPBEAR_SUCCESS) {
99 send_msg_request_success();
100 } else {
101 send_msg_request_failure();
102 }
103 }
104
105 m_free(reqname);
106
107 TRACE(("leave recv_msg_global_request"))
108 }
109
110
111 static void send_msg_request_success() {
112
113 CHECKCLEARTOWRITE();
114 buf_putbyte(ses.writepayload, SSH_MSG_REQUEST_SUCCESS);
115 encrypt_packet();
116
117 }
118
119 static void send_msg_request_failure() {
120
121 CHECKCLEARTOWRITE();
122 buf_putbyte(ses.writepayload, SSH_MSG_REQUEST_FAILURE);
123 encrypt_packet();
124
125 }
126
127 static int matchtcp(void* typedata1, void* typedata2) {
128
129 const struct TCPListener *info1 = (struct TCPListener*)typedata1;
130 const struct TCPListener *info2 = (struct TCPListener*)typedata2;
131
132 return (info1->listenport == info2->listenport)
133 && (info1->chantype == info2->chantype)
134 && (strcmp(info1->listenaddr, info2->listenaddr) == 0);
135 }
136
137 static int svr_cancelremotetcp() {
138
139 int ret = DROPBEAR_FAILURE;
140 unsigned char * bindaddr = NULL;
141 unsigned int addrlen;
142 unsigned int port;
143 struct Listener * listener = NULL;
144 struct TCPListener tcpinfo;
145
146 TRACE(("enter cancelremotetcp"))
147
148 bindaddr = buf_getstring(ses.payload, &addrlen);
149 if (addrlen > MAX_IP_LEN) {
150 TRACE(("addr len too long: %d", addrlen))
151 goto out;
152 }
153
154 port = buf_getint(ses.payload);
155
156 tcpinfo.sendaddr = NULL;
157 tcpinfo.sendport = 0;
158 tcpinfo.listenaddr = bindaddr;
159 tcpinfo.listenport = port;
160 listener = get_listener(CHANNEL_ID_TCPFORWARDED, &tcpinfo, matchtcp);
161 if (listener) {
162 remove_listener( listener );
163 ret = DROPBEAR_SUCCESS;
164 }
165
166 out:
167 m_free(bindaddr);
168 TRACE(("leave cancelremotetcp"))
169 return ret;
170 }
171
172 static int svr_remotetcpreq() {
173
174 int ret = DROPBEAR_FAILURE;
175 unsigned char * bindaddr = NULL;
176 unsigned int addrlen;
177 struct TCPListener *tcpinfo = NULL;
178 unsigned int port;
179
180 TRACE(("enter remotetcpreq"))
181
182 bindaddr = buf_getstring(ses.payload, &addrlen);
183 if (addrlen > MAX_IP_LEN) {
184 TRACE(("addr len too long: %d", addrlen))
185 goto out;
186 }
187
188 port = buf_getint(ses.payload);
189
190 if (port == 0) {
191 dropbear_log(LOG_INFO, "Server chosen tcpfwd ports are unsupported");
192 goto out;
193 }
194
195 if (port < 1 || port > 65535) {
196 TRACE(("invalid port: %d", port))
197 goto out;
198 }
199
200 if (!ses.allowprivport && port < IPPORT_RESERVED) {
201 TRACE(("can't assign port < 1024 for non-root"))
202 goto out;
203 }
204
205 tcpinfo = (struct TCPListener*)m_malloc(sizeof(struct TCPListener));
206 tcpinfo->sendaddr = NULL;
207 tcpinfo->sendport = 0;
208 tcpinfo->listenaddr = bindaddr;
209 tcpinfo->listenport = port;
210 tcpinfo->chantype = &svr_chan_tcpremote;
211 tcpinfo->tcp_type = forwarded;
212
213 ret = listen_tcpfwd(tcpinfo);
214
215 out:
216 if (ret == DROPBEAR_FAILURE) {
217 /* we only free it if a listener wasn't created, since the listener
218 * has to remember it if it's to be cancelled */
219 m_free(bindaddr);
220 m_free(tcpinfo);
221 }
222 TRACE(("leave remotetcpreq"))
223 return ret;
224 }
225
226 /* Called upon creating a new direct tcp channel (ie we connect out to an
227 * address */
228 static int newtcpdirect(struct Channel * channel) {
229
230 unsigned char* desthost = NULL;
231 unsigned int destport;
232 unsigned char* orighost = NULL;
233 unsigned int origport;
234 char portstring[NI_MAXSERV];
235 int sock;
236 int len;
237 int err = SSH_OPEN_ADMINISTRATIVELY_PROHIBITED;
238
239 if (svr_opts.nolocaltcp) {
240 TRACE(("leave newtcpdirect: local tcp forwarding disabled"))
241 goto out;
242 }
243
244 desthost = buf_getstring(ses.payload, &len);
245 if (len > MAX_HOST_LEN) {
246 TRACE(("leave newtcpdirect: desthost too long"))
247 goto out;
248 }
249
250 destport = buf_getint(ses.payload);
251
252 orighost = buf_getstring(ses.payload, &len);
253 if (len > MAX_HOST_LEN) {
254 TRACE(("leave newtcpdirect: orighost too long"))
255 goto out;
256 }
257
258 origport = buf_getint(ses.payload);
259
260 /* best be sure */
261 if (origport > 65535 || destport > 65535) {
262 TRACE(("leave newtcpdirect: port > 65535"))
263 goto out;
264 }
265
266 snprintf(portstring, sizeof(portstring), "%d", destport);
267 sock = connect_remote(desthost, portstring, 1, NULL);
268 if (sock < 0) {
269 err = SSH_OPEN_CONNECT_FAILED;
270 TRACE(("leave newtcpdirect: sock failed"))
271 goto out;
272 }
273
274 ses.maxfd = MAX(ses.maxfd, sock);
275
276 /* We don't set readfd, that will get set after the connection's
277 * progress succeeds */
278 channel->writefd = sock;
279 channel->initconn = 1;
280
281 err = SSH_OPEN_IN_PROGRESS;
282
283 out:
284 m_free(desthost);
285 m_free(orighost);
286 TRACE(("leave newtcpdirect: err %d", err))
287 return err;
288 }
289
290 #endif