Mercurial > dropbear
view tcpfwd-remote.c @ 40:b4874d772210
- Added terminal mode handling etc for the client, and window change
- Refactored the terminal-mode handling for the server
- Improved session closing for the client
author | Matt Johnston <matt@ucc.asn.au> |
---|---|
date | Sun, 01 Aug 2004 08:54:01 +0000 |
parents | 469950e86d0f |
children |
line wrap: on
line source
#include "includes.h" #include "ssh.h" #include "tcpfwd-remote.h" #include "dbutil.h" #include "session.h" #include "buffer.h" #include "packet.h" #include "listener.h" #include "runopts.h" #ifndef DISABLE_REMOTETCPFWD struct RemoteTCP { unsigned char* addr; unsigned int port; }; static void send_msg_request_success(); static void send_msg_request_failure(); static int cancelremotetcp(); static int remotetcpreq(); static int listen_tcpfwd(unsigned char* bindaddr, unsigned int port); static void acceptremote(struct Listener *listener); /* At the moment this is completely used for tcp code (with the name reflecting * that). If new request types are added, this should be replaced with code * similar to the request-switching in chansession.c */ void recv_msg_global_request_remotetcp() { unsigned char* reqname = NULL; unsigned int namelen; unsigned int wantreply = 0; int ret = DROPBEAR_FAILURE; TRACE(("enter recv_msg_global_request_remotetcp")); if (opts.noremotetcp) { TRACE(("leave recv_msg_global_request_remotetcp: remote tcp forwarding disabled")); goto out; } reqname = buf_getstring(ses.payload, &namelen); wantreply = buf_getbyte(ses.payload); if (namelen > MAXNAMLEN) { TRACE(("name len is wrong: %d", namelen)); goto out; } if (strcmp("tcpip-forward", reqname) == 0) { ret = remotetcpreq(); } else if (strcmp("cancel-tcpip-forward", reqname) == 0) { ret = cancelremotetcp(); } else { TRACE(("reqname isn't tcpip-forward: '%s'", reqname)); } out: if (wantreply) { if (ret == DROPBEAR_SUCCESS) { send_msg_request_success(); } else { send_msg_request_failure(); } } m_free(reqname); TRACE(("leave recv_msg_global_request")); } static const struct ChanType chan_tcpremote = { 1, /* sepfds */ "forwarded-tcpip", NULL, NULL, NULL, NULL }; static void acceptremote(struct Listener *listener) { int fd; struct sockaddr addr; int len; char ipstring[NI_MAXHOST], portstring[NI_MAXSERV]; struct RemoteTCP *tcpinfo = (struct RemoteTCP*)(listener->typedata); len = sizeof(addr); fd = accept(listener->sock, &addr, &len); if (fd < 0) { return; } if (getnameinfo(&addr, len, ipstring, sizeof(ipstring), portstring, sizeof(portstring), NI_NUMERICHOST | NI_NUMERICSERV) != 0) { return; } if (send_msg_channel_open_init(fd, &chan_tcpremote) == DROPBEAR_SUCCESS) { buf_putstring(ses.writepayload, tcpinfo->addr, strlen(tcpinfo->addr)); buf_putint(ses.writepayload, tcpinfo->port); buf_putstring(ses.writepayload, ipstring, strlen(ipstring)); buf_putint(ses.writepayload, atol(portstring)); encrypt_packet(); } else { /* XXX debug? */ close(fd); } } static void cleanupremote(struct Listener *listener) { struct RemoteTCP *tcpinfo = (struct RemoteTCP*)(listener->typedata); m_free(tcpinfo->addr); m_free(tcpinfo); } static void send_msg_request_success() { CHECKCLEARTOWRITE(); buf_putbyte(ses.writepayload, SSH_MSG_REQUEST_SUCCESS); encrypt_packet(); } static void send_msg_request_failure() { CHECKCLEARTOWRITE(); buf_putbyte(ses.writepayload, SSH_MSG_REQUEST_FAILURE); encrypt_packet(); } static int matchtcp(void* typedata1, void* typedata2) { const struct RemoteTCP *info1 = (struct RemoteTCP*)typedata1; const struct RemoteTCP *info2 = (struct RemoteTCP*)typedata2; return info1->port == info2->port && (strcmp(info1->addr, info2->addr) == 0); } static int cancelremotetcp() { int ret = DROPBEAR_FAILURE; unsigned char * bindaddr = NULL; unsigned int addrlen; unsigned int port; struct Listener * listener = NULL; struct RemoteTCP tcpinfo; TRACE(("enter cancelremotetcp")); bindaddr = buf_getstring(ses.payload, &addrlen); if (addrlen > MAX_IP_LEN) { TRACE(("addr len too long: %d", addrlen)); goto out; } port = buf_getint(ses.payload); tcpinfo.addr = bindaddr; tcpinfo.port = port; listener = get_listener(CHANNEL_ID_TCPFORWARDED, &tcpinfo, matchtcp); if (listener) { remove_listener( listener ); ret = DROPBEAR_SUCCESS; } out: m_free(bindaddr); TRACE(("leave cancelremotetcp")); return ret; } static int remotetcpreq() { int ret = DROPBEAR_FAILURE; unsigned char * bindaddr = NULL; unsigned int addrlen; unsigned int port; TRACE(("enter remotetcpreq")); bindaddr = buf_getstring(ses.payload, &addrlen); if (addrlen > MAX_IP_LEN) { TRACE(("addr len too long: %d", addrlen)); goto out; } port = buf_getint(ses.payload); if (port == 0) { dropbear_log(LOG_INFO, "Server chosen tcpfwd ports are unsupported"); goto out; } if (port < 1 || port > 65535) { TRACE(("invalid port: %d", port)); goto out; } if (!ses.allowprivport && port < IPPORT_RESERVED) { TRACE(("can't assign port < 1024 for non-root")); goto out; } ret = listen_tcpfwd(bindaddr, port); out: if (ret == DROPBEAR_FAILURE) { /* we only free it if a listener wasn't created, since the listener * has to remember it if it's to be cancelled */ m_free(bindaddr); } TRACE(("leave remotetcpreq")); return ret; } static int listen_tcpfwd(unsigned char* bindaddr, unsigned int port) { struct RemoteTCP * tcpinfo = NULL; char portstring[6]; /* "65535\0" */ struct addrinfo *res = NULL, *ai = NULL; struct addrinfo hints; int sock = -1; struct Listener *listener = NULL; TRACE(("enter listen_tcpfwd")); /* first we try to bind, so don't need to do so much cleanup on failure */ snprintf(portstring, sizeof(portstring), "%d", port); memset(&hints, 0x0, sizeof(hints)); hints.ai_socktype = SOCK_STREAM; hints.ai_family = PF_INET; hints.ai_flags = AI_PASSIVE | AI_NUMERICHOST; if (getaddrinfo(bindaddr, portstring, &hints, &res) < 0) { TRACE(("leave listen_tcpfwd: getaddrinfo failed: %s", strerror(errno))); goto done; } /* find the first one which works */ for (ai = res; ai != NULL; ai = ai->ai_next) { if (ai->ai_family != PF_INET && ai->ai_family != PF_INET6) { continue; } sock = socket(ai->ai_family, SOCK_STREAM, 0); if (sock < 0) { TRACE(("socket failed: %s", strerror(errno))); goto fail; } if (bind(sock, ai->ai_addr, ai->ai_addrlen) < 0) { TRACE(("bind failed: %s", strerror(errno))); goto fail; } if (listen(sock, 20) < 0) { TRACE(("listen failed: %s", strerror(errno))); goto fail; } if (fcntl(sock, F_SETFL, O_NONBLOCK) < 0) { TRACE(("fcntl nonblocking failed: %s", strerror(errno))); goto fail; } /* success */ break; fail: close(sock); } if (ai == NULL) { TRACE(("no successful sockets")); goto done; } tcpinfo = (struct RemoteTCP*)m_malloc(sizeof(struct RemoteTCP)); tcpinfo->addr = bindaddr; tcpinfo->port = port; listener = new_listener(sock, CHANNEL_ID_TCPFORWARDED, tcpinfo, acceptremote, cleanupremote); if (listener == NULL) { m_free(tcpinfo); } done: if (res) { freeaddrinfo(res); } TRACE(("leave listen_tcpfwd")); if (listener == NULL) { return DROPBEAR_FAILURE; } else { return DROPBEAR_SUCCESS; } } #endif /* DISABLE_REMOTETCPFWD */