summaryrefslogtreecommitdiff
path: root/src/daemon/gnuserv.c
diff options
context:
space:
mode:
Diffstat (limited to 'src/daemon/gnuserv.c')
-rw-r--r--src/daemon/gnuserv.c645
1 files changed, 0 insertions, 645 deletions
diff --git a/src/daemon/gnuserv.c b/src/daemon/gnuserv.c
deleted file mode 100644
index 8243b871..00000000
--- a/src/daemon/gnuserv.c
+++ /dev/null
@@ -1,645 +0,0 @@
-/* -*-C-*-
- * Server code for handling requests from clients and forwarding them
- * on to the GNU Emacs process.
- *
- * This file is part of GNU Emacs.
- *
- * Copying is permitted under those conditions described by the GNU
- * General Public License.
- *
- * Copyright (C) 1989 Free Software Foundation, Inc.
- *
- * Author: Andy Norman (ange@hplb.hpl.hp.com), based on 'etc/server.c'
- * from the 18.52 GNU Emacs distribution.
- *
- * Please mail bugs and suggestions to the author at the above address.
- */
-
-/* HISTORY
- * 11-Nov-1990 bristor@simba
- * Added EOT stuff.
- */
-
-/*
- * This file incorporates new features added by Bob Weiner <weiner@mot.com>,
- * Darrell Kindred <dkindred@cmu.edu> and Arup Mukherjee <arup@cmu.edu>.
- * Please see the note at the end of the README file for details.
- *
- * (If gnuserv came bundled with your emacs, the README file is probably
- * ../etc/gnuserv.README relative to the directory containing this file)
- */
-
-#include <config.h>
-
-#include <glib/gi18n-lib.h>
-#include <glibtop.h>
-#include <glibtop/open.h>
-#include <glibtop/close.h>
-#include <glibtop/command.h>
-
-#include <glib/gstrfuncs.h>
-
-#include <glibtop/parameter.h>
-
-#include "server_config.h"
-
-#include <glibtop/gnuserv.h>
-
-#include <errno.h>
-
-#include "daemon.h"
-
-#ifdef AIX
-#include <sys/select.h>
-#endif
-
-#ifdef NEED_DECLARATION_PROGRAM_INVOCATION_NAME
-extern char *program_invocation_name, *program_invocation_short_name;
-#endif
-
-#ifndef HAVE_PROGRAM_INVOCATION_SHORT_NAME
-char *program_invocation_short_name;
-#endif
-
-#ifndef HAVE_PROGRAM_INVOCATION_NAME
-char *program_invocation_name;
-#endif
-
-
-#if !defined(INTERNET_DOMAIN_SOCKETS)
-#error "Internet Domain sockets are required"
-#endif
-
-#ifdef AUTH_MAGIC_COOKIE
-#include <X11/X.h>
-#include <X11/Xauth.h>
-
-static Xauth *server_xauth = NULL;
-
-#endif /* AUTH_MAGIC_COOKIE */
-
-gboolean enable_debug = FALSE;
-gboolean verbose_output = FALSE;
-static gboolean no_daemon = FALSE;
-static gboolean invoked_from_inetd = FALSE;
-static int changed_uid = 0;
-
-void
-syslog_message (int priority, const char *format, ...)
-{
- va_list ap;
- char buffer [BUFSIZ];
-
- va_start (ap, format);
- vsnprintf (buffer, BUFSIZ-1, format, ap);
- va_end (ap);
-
- syslog (priority, "%s", buffer);
-}
-
-void
-syslog_io_message (int priority, const char *format, ...)
-{
- va_list ap;
- char buffer [BUFSIZ];
- char buffer2 [BUFSIZ];
-
- va_start (ap, format);
- vsnprintf (buffer, BUFSIZ-1, format, ap);
- va_end (ap);
-
- snprintf (buffer2, BUFSIZ-1, "%s: %s", buffer, g_strerror (errno));
- syslog (priority, "%s", buffer2);
-}
-
-/*
- * timed_read - Read with timeout.
- */
-
-static int
-timed_read (int fd, char *buf, int max, int timeout, int one_line)
-{
- fd_set rmask;
- struct timeval tv; /* = {timeout, 0}; */
- char c = 0;
- int nbytes = 0;
- int r;
-
- tv.tv_sec = timeout;
- tv.tv_usec = 0;
-
- FD_ZERO (&rmask);
- FD_SET (fd, &rmask);
-
- do {
- r = select (fd + 1, &rmask, NULL, NULL, &tv);
-
- if (r > 0) {
- if (read (fd, &c, 1) == 1) {
- *buf++ = c;
- ++nbytes;
- } else {
- syslog_io_message (LOG_WARNING, "read error on socket");
- return -1;
- }
- } else if (r == 0) {
- syslog_io_message (LOG_WARNING, "read timed out");
- return -1;
- } else {
- syslog_io_message (LOG_WARNING, "error in select");
- return -1;
- }
- } while ((nbytes < max) && !(one_line && (c == '\n')));
-
- --buf;
- if (one_line && *buf == '\n') {
- *buf = 0;
- }
- return nbytes;
-}
-
-
-/*
- * permitted -- return whether a given host is allowed to connect to the server.
- */
-
-static int
-permitted (u_long host_addr, int fd)
-{
- int i;
-
- char auth_protocol[128];
- char buf[1024];
- int auth_data_len;
-
- /* Read auth protocol name */
-
- if (timed_read (fd, auth_protocol, AUTH_NAMESZ, AUTH_TIMEOUT, 1) <= 0)
- return FALSE;
-
- if (enable_debug)
- syslog_message (LOG_DEBUG,
- "Client sent authenticatin protocol '%s'.",
- auth_protocol);
-
- if (strcmp (auth_protocol, DEFAUTH_NAME) &&
- strcmp (auth_protocol, MCOOKIE_NAME)) {
- syslog_message (LOG_WARNING,
- "Invalid authentication protocol "
- "'%s' from client",
- auth_protocol);
- return FALSE;
- }
-
- if (!strcmp (auth_protocol, MCOOKIE_NAME)) {
- /*
- * doing magic cookie auth
- */
-
- if (timed_read (fd, buf, 10, AUTH_TIMEOUT, 1) <= 0)
- return FALSE;
-
- auth_data_len = atoi (buf);
-
- if (auth_data_len < 1 || (size_t)auth_data_len > sizeof(buf)) {
- syslog_message(LOG_WARNING, "Invalid data length supplied by client");
- return FALSE;
- }
-
- if (timed_read (fd, buf, auth_data_len, AUTH_TIMEOUT, 0) != auth_data_len)
- return FALSE;
-
-#ifdef AUTH_MAGIC_COOKIE
- if (!invoked_from_inetd && server_xauth && server_xauth->data &&
- !memcmp (buf, server_xauth->data, auth_data_len)) {
- return TRUE;
- }
-#else
- syslog_message (LOG_WARNING,
- "Client tried Xauth, but server is "
- "not compiled with Xauth");
-#endif
-
- /*
- * auth failed, but allow this to fall through to the
- * GNU_SECURE protocol....
- */
-
- if (verbose_output) {
- if (changed_uid || invoked_from_inetd)
- syslog_message (LOG_WARNING,
- "Xauth authentication not allowed, "
- "trying GNU_SECURE ...");
- else
- syslog_message (LOG_WARNING,
- "Xauth authentication failed, "
- "trying GNU_SECURE auth...");
- }
- }
-
- /* Other auth protocols go here, and should execute only if
- * the * auth_protocol name matches. */
-
- /* Now, try the old GNU_SECURE stuff... */
-
- if (enable_debug)
- syslog_message (LOG_DEBUG, "Doing GNU_SECURE auth ...");
-
- /* Now check the chain for that hash key */
- for (i = 0; i < HOST_TABLE_ENTRIES; i++) {
- if (enable_debug)
- syslog_message (LOG_DEBUG, "Trying %lx - %lx",
- host_addr, permitted_hosts [i]);
- if (permitted_hosts [i] == 0L)
- return (FALSE);
- if (host_addr == permitted_hosts [i])
- return (TRUE);
- }
-
- return (FALSE);
-}
-
-
-/*
- * setup_table -- initialise the table of hosts allowed to contact the server,
- * by reading from the file specified by the GNU_SECURE
- * environment variable
- * Put in the local machine, and, if a security file is specifed,
- * add each host that is named in the file.
- * Return the number of hosts added.
- */
-
-static int
-setup_table (void)
-{
- char hostname [HOSTNAMSZ];
-
-#ifdef AUTH_MAGIC_COOKIE
- char screen [BUFSIZ];
-#endif
-
- long host_addr;
- int i, hosts = 0;
-
- /* Make sure every entry is null */
- for (i = 0; i < HOST_TABLE_ENTRIES; i++)
- permitted_hosts [i] = 0;
-
- gethostname (hostname, HOSTNAMSZ);
-
- if ((host_addr = glibtop_internet_addr (hostname)) == -1) {
- syslog_io_message (LOG_ERR, "Can't resolve '%s'", hostname);
- exit (1);
- }
-
-#ifdef AUTH_MAGIC_COOKIE
-
- sprintf (screen, "%d", SERVER_PORT);
-
- server_xauth = XauGetAuthByAddr
- (FamilyInternet,
- sizeof (host_addr), (char *) &host_addr,
- strlen (screen), screen,
- strlen (MCOOKIE_X_NAME), MCOOKIE_X_NAME);
- hosts++;
-
-#endif /* AUTH_MAGIC_COOKIE */
-
- /* Resolv host names from permitted_host_names []. */
-
- for (i = 0; i < HOST_TABLE_ENTRIES; i++) {
- if (!permitted_host_names [i])
- continue;
- if (enable_debug)
- syslog_message (LOG_DEBUG, "Resolving %s ...",
- permitted_host_names [i]);
- permitted_hosts [i] =
- glibtop_internet_addr (permitted_host_names [i]);
- if ((long) permitted_hosts [i] == -1) {
- syslog_io_message (LOG_ERR, "Can't resolve '%s'",
- permitted_host_names [i]);
- exit (1);
- }
- }
-
- if (enable_debug)
- for (i = 0; i < HOST_TABLE_ENTRIES; i++)
- syslog_message (LOG_DEBUG, "Host %s - %lx",
- permitted_host_names [i],
- permitted_hosts [i]);
-
- hosts += HOST_TABLE_ENTRIES;
-
- return hosts;
-} /* setup_table */
-
-/*
- * internet_init -- initialize server, returning an internet socket that can
- * be listened on.
- */
-
-static int
-internet_init (void)
-{
- int ls; /* socket descriptor */
- struct sockaddr_in server; /* for local socket address */
-
- if (setup_table () == 0)
- return -1;
-
- /* clear out address structure */
- memset ((char *) &server, 0, sizeof (struct sockaddr_in));
-
- /* Set up address structure for the listen socket. */
- server.sin_family = AF_INET;
- server.sin_addr.s_addr = INADDR_ANY;
-
- /* We use a fixed port given in the config file. */
- server.sin_port = htons (SERVER_PORT);
-
- if (verbose_output)
- syslog_message (LOG_INFO, "Using port %u.", SERVER_PORT);
-
- /* Create the listen socket. */
- if ((ls = socket (AF_INET, SOCK_STREAM, 0)) == -1) {
- syslog_io_message (LOG_ERR, "unable to create socket");
- exit (1);
- }
-
- /* Bind the listen address to the socket. */
- if (bind (ls, (struct sockaddr *) &server,
- sizeof (struct sockaddr_in)) == -1) {
- syslog_io_message (LOG_ERR, "bind");
- exit (1);
- }
-
- /* Initiate the listen on the socket so remote users * can connect. */
- if (listen (ls, 20) == -1) {
- syslog_io_message (LOG_ERR, "listen");
- exit (1);
- }
-
- return (ls);
-} /* internet_init */
-
-
-/*
- * handle_internet_request -- accept a request from a client and send the
- * information to stdout (the gnu process).
- */
-
-static void
-handle_internet_request (int ls)
-{
- int s;
- size_t addrlen = sizeof (struct sockaddr_in);
- struct sockaddr_in peer; /* for peer socket address */
- pid_t pid;
-
- memset ((char *) &peer, 0, sizeof (struct sockaddr_in));
-
- if ((s = accept (ls, (struct sockaddr *) &peer, (void *) &addrlen)) == -1) {
- syslog_io_message (LOG_ERR, "accept");
- exit (1);
- }
-
- if (verbose_output)
- syslog_message (LOG_INFO, "Connection was made from %s port %u.",
- inet_ntoa (peer.sin_addr), ntohs (peer.sin_port));
-
- /* Check that access is allowed - if not return crud to the client */
- if (!permitted (peer.sin_addr.s_addr, s)) {
- close (s);
- syslog_message (LOG_CRIT, "Refused connection from %s.",
- inet_ntoa (peer.sin_addr));
- return;
- } /* if */
-
- if (verbose_output)
- syslog_message (LOG_INFO, "Accepted connection from %s port %u.",
- inet_ntoa (peer.sin_addr), ntohs (peer.sin_port));
-
- pid = fork ();
-
- if (pid == -1) {
- syslog_io_message (LOG_ERR, "fork failed");
- exit (1);
- }
-
- if (pid) {
- if (verbose_output)
- syslog_message (LOG_INFO, "Child pid is %d.", pid);
- return;
- }
-
- handle_parent_connection (s);
-
- close (s);
-
- if (verbose_output)
- syslog_message (LOG_INFO, "Closed connection to %s port %u.",
- inet_ntoa (peer.sin_addr), ntohs (peer.sin_port));
-
- _exit (0);
-} /* handle_internet_request */
-
-static void
-handle_signal (int sig)
-{
- if (sig == SIGCHLD)
- return;
-
- syslog_message (LOG_ERR, "Catched signal %d.\n", sig);
- exit (1);
-}
-
-static const GOptionEntry options [] = {
- { "debug", 'd', 0, G_OPTION_ARG_NONE, &enable_debug,
- N_("Enable debugging"), NULL },
- { "verbose", 'v', 0, G_OPTION_ARG_NONE, &verbose_output,
- N_("Enable verbose output"), NULL },
- { "no-daemon", 'f', 0, G_OPTION_ARG_NONE, &no_daemon,
- N_("Don't fork into background"), NULL },
- { "inetd", 'i', 0, G_OPTION_ARG_NONE, &invoked_from_inetd,
- N_("Invoked from inetd"), NULL },
- { NULL }
-};
-
-int
-main (int argc, char **argv)
-{
- const unsigned method = GLIBTOP_METHOD_PIPE;
- const unsigned long features = GLIBTOP_SYSDEPS_ALL;
- glibtop *server = glibtop_global_server;
- GOptionContext *goption_context;
- GError *error = NULL;
-
- int ils = -1; /* internet domain listen socket */
-
- /* On non-glibc systems, this is not set up for us. */
- if (!program_invocation_name) {
- char *arg;
-
- program_invocation_name = (char *) argv[0];
- arg = strrchr (argv[0], '/');
- program_invocation_short_name =
- arg ? (arg + 1) : program_invocation_name;
- }
-
- g_set_prgname (program_invocation_short_name);
- goption_context = g_option_context_new (NULL);
- g_option_context_add_main_entries (goption_context, options, NULL);
- g_option_context_parse (goption_context, &argc, &argv, &error);
- g_option_context_free (goption_context);
-
- if (error != NULL) {
- g_printerr ("%s\n", error->message);
- g_error_free (error);
- g_printerr (_("Run '%s --help' to see a full list of "
- "available command line options.\n"),
- program_invocation_name);
- exit(1);
- }
-
- if (enable_debug)
- verbose_output = 1;
-
- if (no_daemon) {
- openlog ("libgtop-daemon", LOG_PERROR | LOG_PID, LOG_LOCAL0);
- } else {
- openlog ("libgtop-daemon", LOG_PID, LOG_LOCAL0);
- }
-
- if (!no_daemon && !invoked_from_inetd) {
- pid_t pid = fork ();
-
- if (pid == -1) {
- syslog_io_message (LOG_ERR, "fork failed");
- exit (1);
- } else if (pid)
- exit (0);
-
- close (0);
-
- setsid ();
- }
-
- glibtop_init_r (&glibtop_global_server, 0, GLIBTOP_INIT_NO_INIT);
-
- signal (SIGCHLD, handle_signal);
-
- /* If we are root, completely switch to SERVER_UID and
- * SERVER_GID. Otherwise we completely drop any priviledges.
- */
-
- if (enable_debug)
- syslog_message (LOG_DEBUG, "Parent ID: (%d, %d) - (%d, %d)",
- getuid (), geteuid (), getgid (), getegid ());
-
- if (geteuid () == 0) {
- changed_uid = 1;
- if (setregid (SERVER_GID, SERVER_GID)) {
- syslog_io_message (LOG_ERR, "setregid (SERVER_GID)");
- exit (1);
- }
- if (setreuid (SERVER_UID, SERVER_UID)) {
- syslog_io_message (LOG_ERR, "setreuid (SERVER_UID)");
- exit (1);
- }
- } else {
- if (setreuid (geteuid (), geteuid ())) {
- syslog_io_message (LOG_ERR, "setreuid (euid)");
- exit (1);
- }
- }
-
- if (enable_debug)
- syslog_message (LOG_DEBUG, "Parent ID: (%d, %d) - (%d, %d)",
- getuid (), geteuid (), getgid (), getegid ());
-
- if (invoked_from_inetd) {
- size_t addrlen = sizeof (struct sockaddr_in);
- struct sockaddr_in peer;
-
- memset ((char *) &peer, 0, sizeof (struct sockaddr_in));
-
- if (getpeername (0, (struct sockaddr *) &peer, (void *) &addrlen)) {
- syslog_io_message (LOG_ERR, "getpeername");
- exit (1);
- }
-
- if (verbose_output)
- syslog_message (LOG_INFO, "Connection was made from %s port %u.",
- inet_ntoa (peer.sin_addr), ntohs (peer.sin_port));
-
- /* Check that access is allowed - if not return crud to the client */
- if (!permitted (peer.sin_addr.s_addr, 0)) {
- close (0);
- syslog_message (LOG_CRIT, "Refused connection from %s.",
- inet_ntoa (peer.sin_addr));
- exit (1);
- }
-
- handle_parent_connection (0);
- exit (0);
- }
-
- /* get a internet domain socket to listen on. */
- ils = internet_init ();
-
- if (ils <= 0) {
- syslog_message (LOG_ERR, "Unable to get internet domain socket.");
- exit (1);
- }
-
- glibtop_set_parameter_l (server, GLIBTOP_PARAM_METHOD,
- &method, sizeof (method));
-
- server->features = features;
-
- glibtop_init_r (&server, 0, 0);
-
- while (1) {
- fd_set rmask;
- int status, ret;
-
- while ((ret = wait3 (&status, WNOHANG, NULL)) != 0) {
- if ((ret == -1) && (errno == ECHILD))
- break;
-
- if ((ret == -1) && ((errno == EAGAIN)))
- continue;
- if (ret == 0) {
- syslog_io_message (LOG_WARNING, "wait3");
- continue;
- }
-
- if (verbose_output)
- syslog_message (LOG_INFO, "Child %d exited.", ret);
- }
-
- FD_ZERO (&rmask);
-
- /* Only the child accepts connections from standard
- * input made by its parent. */
-
- FD_SET (ils, &rmask);
-
- if (enable_debug)
- syslog_message (LOG_DEBUG,
- "Server ready and waiting for connections.");
-
- if (select (ils+1, &rmask, (fd_set *) NULL, (fd_set *) NULL,
- (struct timeval *) NULL) < 0) {
- if (errno == EINTR)
- continue;
- syslog_io_message (LOG_ERR, "select");
- exit (1);
- }
-
- if (FD_ISSET (ils, &rmask))
- handle_internet_request (ils);
- }
-
- return 0;
-}