|
Packit Service |
31306d |
/*
|
|
Packit Service |
31306d |
* bind.c : all ssh_bind functions
|
|
Packit Service |
31306d |
*
|
|
Packit Service |
31306d |
* This file is part of the SSH Library
|
|
Packit Service |
31306d |
*
|
|
Packit Service |
31306d |
* Copyright (c) 2004-2005 by Aris Adamantiadis
|
|
Packit Service |
31306d |
*
|
|
Packit Service |
31306d |
* The SSH Library is free software; you can redistribute it and/or modify
|
|
Packit Service |
31306d |
* it under the terms of the GNU Lesser General Public License as published by
|
|
Packit Service |
31306d |
* the Free Software Foundation; either version 2.1 of the License, or (at your
|
|
Packit Service |
31306d |
* option) any later version.
|
|
Packit Service |
31306d |
*
|
|
Packit Service |
31306d |
* The SSH Library is distributed in the hope that it will be useful, but
|
|
Packit Service |
31306d |
* WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY
|
|
Packit Service |
31306d |
* or FITNESS FOR A PARTICULAR PURPOSE. See the GNU Lesser General Public
|
|
Packit Service |
31306d |
* License for more details.
|
|
Packit Service |
31306d |
*
|
|
Packit Service |
31306d |
* You should have received a copy of the GNU Lesser General Public License
|
|
Packit Service |
31306d |
* along with the SSH Library; see the file COPYING. If not, write to
|
|
Packit Service |
31306d |
* the Free Software Foundation, Inc., 59 Temple Place - Suite 330, Boston,
|
|
Packit Service |
31306d |
* MA 02111-1307, USA.
|
|
Packit Service |
31306d |
*/
|
|
Packit Service |
31306d |
|
|
Packit Service |
31306d |
|
|
Packit Service |
31306d |
#include "config.h"
|
|
Packit Service |
31306d |
|
|
Packit Service |
31306d |
#include <errno.h>
|
|
Packit Service |
31306d |
#include <fcntl.h>
|
|
Packit Service |
31306d |
#include <stdio.h>
|
|
Packit Service |
31306d |
#include <string.h>
|
|
Packit Service |
31306d |
#include <stdlib.h>
|
|
Packit Service |
31306d |
|
|
Packit Service |
31306d |
#include "libssh/priv.h"
|
|
Packit Service |
31306d |
#include "libssh/bind.h"
|
|
Packit Service |
31306d |
#include "libssh/libssh.h"
|
|
Packit Service |
31306d |
#include "libssh/server.h"
|
|
Packit Service |
31306d |
#include "libssh/pki.h"
|
|
Packit Service |
31306d |
#include "libssh/buffer.h"
|
|
Packit Service |
31306d |
#include "libssh/socket.h"
|
|
Packit Service |
31306d |
#include "libssh/session.h"
|
|
Packit Service |
31306d |
#include "libssh/token.h"
|
|
Packit Service |
31306d |
|
|
Packit Service |
31306d |
/**
|
|
Packit Service |
31306d |
* @addtogroup libssh_server
|
|
Packit Service |
31306d |
*
|
|
Packit Service |
31306d |
* @{
|
|
Packit Service |
31306d |
*/
|
|
Packit Service |
31306d |
|
|
Packit Service |
31306d |
|
|
Packit Service |
31306d |
#ifdef _WIN32
|
|
Packit Service |
31306d |
#include <io.h>
|
|
Packit Service |
31306d |
#include <winsock2.h>
|
|
Packit Service |
31306d |
#include <ws2tcpip.h>
|
|
Packit Service |
31306d |
|
|
Packit Service |
31306d |
/*
|
|
Packit Service |
31306d |
* <wspiapi.h> is necessary for getaddrinfo before Windows XP, but it isn't
|
|
Packit Service |
31306d |
* available on some platforms like MinGW.
|
|
Packit Service |
31306d |
*/
|
|
Packit Service |
31306d |
#ifdef HAVE_WSPIAPI_H
|
|
Packit Service |
31306d |
# include <wspiapi.h>
|
|
Packit Service |
31306d |
#endif
|
|
Packit Service |
31306d |
|
|
Packit Service |
31306d |
#define SOCKOPT_TYPE_ARG4 char
|
|
Packit Service |
31306d |
|
|
Packit Service |
31306d |
#else /* _WIN32 */
|
|
Packit Service |
31306d |
|
|
Packit Service |
31306d |
#include <sys/socket.h>
|
|
Packit Service |
31306d |
#include <netinet/in.h>
|
|
Packit Service |
31306d |
#include <netdb.h>
|
|
Packit Service |
31306d |
#define SOCKOPT_TYPE_ARG4 int
|
|
Packit Service |
31306d |
|
|
Packit Service |
31306d |
#endif /* _WIN32 */
|
|
Packit Service |
31306d |
|
|
Packit Service |
31306d |
static socket_t bind_socket(ssh_bind sshbind, const char *hostname,
|
|
Packit Service |
31306d |
int port) {
|
|
Packit Service |
31306d |
char port_c[6];
|
|
Packit Service |
31306d |
struct addrinfo *ai;
|
|
Packit Service |
31306d |
struct addrinfo hints;
|
|
Packit Service |
31306d |
int opt = 1;
|
|
Packit Service |
31306d |
socket_t s;
|
|
Packit Service |
31306d |
int rc;
|
|
Packit Service |
31306d |
|
|
Packit Service |
31306d |
ZERO_STRUCT(hints);
|
|
Packit Service |
31306d |
|
|
Packit Service |
31306d |
hints.ai_flags = AI_PASSIVE;
|
|
Packit Service |
31306d |
hints.ai_socktype = SOCK_STREAM;
|
|
Packit Service |
31306d |
|
|
Packit Service |
31306d |
snprintf(port_c, 6, "%d", port);
|
|
Packit Service |
31306d |
rc = getaddrinfo(hostname, port_c, &hints, &ai;;
|
|
Packit Service |
31306d |
if (rc != 0) {
|
|
Packit Service |
31306d |
ssh_set_error(sshbind,
|
|
Packit Service |
31306d |
SSH_FATAL,
|
|
Packit Service |
31306d |
"Resolving %s: %s", hostname, gai_strerror(rc));
|
|
Packit Service |
31306d |
return -1;
|
|
Packit Service |
31306d |
}
|
|
Packit Service |
31306d |
|
|
Packit Service |
31306d |
s = socket (ai->ai_family,
|
|
Packit Service |
31306d |
ai->ai_socktype,
|
|
Packit Service |
31306d |
ai->ai_protocol);
|
|
Packit Service |
31306d |
if (s == SSH_INVALID_SOCKET) {
|
|
Packit Service |
31306d |
ssh_set_error(sshbind, SSH_FATAL, "%s", strerror(errno));
|
|
Packit Service |
31306d |
freeaddrinfo (ai);
|
|
Packit Service |
31306d |
return -1;
|
|
Packit Service |
31306d |
}
|
|
Packit Service |
31306d |
|
|
Packit Service |
31306d |
if (setsockopt(s, SOL_SOCKET, SO_REUSEADDR,
|
|
Packit Service |
31306d |
(char *)&opt, sizeof(opt)) < 0) {
|
|
Packit Service |
31306d |
ssh_set_error(sshbind,
|
|
Packit Service |
31306d |
SSH_FATAL,
|
|
Packit Service |
31306d |
"Setting socket options failed: %s",
|
|
Packit Service |
31306d |
strerror(errno));
|
|
Packit Service |
31306d |
freeaddrinfo (ai);
|
|
Packit Service |
31306d |
CLOSE_SOCKET(s);
|
|
Packit Service |
31306d |
return -1;
|
|
Packit Service |
31306d |
}
|
|
Packit Service |
31306d |
|
|
Packit Service |
31306d |
if (bind(s, ai->ai_addr, ai->ai_addrlen) != 0) {
|
|
Packit Service |
31306d |
ssh_set_error(sshbind,
|
|
Packit Service |
31306d |
SSH_FATAL,
|
|
Packit Service |
31306d |
"Binding to %s:%d: %s",
|
|
Packit Service |
31306d |
hostname,
|
|
Packit Service |
31306d |
port,
|
|
Packit Service |
31306d |
strerror(errno));
|
|
Packit Service |
31306d |
freeaddrinfo (ai);
|
|
Packit Service |
31306d |
CLOSE_SOCKET(s);
|
|
Packit Service |
31306d |
return -1;
|
|
Packit Service |
31306d |
}
|
|
Packit Service |
31306d |
|
|
Packit Service |
31306d |
freeaddrinfo (ai);
|
|
Packit Service |
31306d |
return s;
|
|
Packit Service |
31306d |
}
|
|
Packit Service |
31306d |
|
|
Packit Service |
31306d |
ssh_bind ssh_bind_new(void) {
|
|
Packit Service |
31306d |
ssh_bind ptr;
|
|
Packit Service |
31306d |
|
|
Packit Service |
31306d |
ptr = calloc(1, sizeof(struct ssh_bind_struct));
|
|
Packit Service |
31306d |
if (ptr == NULL) {
|
|
Packit Service |
31306d |
return NULL;
|
|
Packit Service |
31306d |
}
|
|
Packit Service |
31306d |
ptr->bindfd = SSH_INVALID_SOCKET;
|
|
Packit Service |
31306d |
ptr->bindport = 22;
|
|
Packit Service |
31306d |
ptr->common.log_verbosity = 0;
|
|
Packit Service |
31306d |
|
|
Packit Service |
31306d |
return ptr;
|
|
Packit Service |
31306d |
}
|
|
Packit Service |
31306d |
|
|
Packit Service |
31306d |
static int ssh_bind_import_keys(ssh_bind sshbind) {
|
|
Packit Service |
31306d |
int rc;
|
|
Packit Service |
31306d |
|
|
Packit Service |
31306d |
if (sshbind->ecdsakey == NULL &&
|
|
Packit Service |
31306d |
sshbind->dsakey == NULL &&
|
|
Packit Service |
31306d |
sshbind->rsakey == NULL &&
|
|
Packit Service |
31306d |
sshbind->ed25519key == NULL) {
|
|
Packit Service |
31306d |
ssh_set_error(sshbind, SSH_FATAL,
|
|
Packit Service |
31306d |
"ECDSA, ED25519, DSA, or RSA host key file must be set");
|
|
Packit Service |
31306d |
return SSH_ERROR;
|
|
Packit Service |
31306d |
}
|
|
Packit Service |
31306d |
|
|
Packit Service |
31306d |
#ifdef HAVE_ECC
|
|
Packit Service |
31306d |
if (sshbind->ecdsa == NULL && sshbind->ecdsakey != NULL) {
|
|
Packit Service |
31306d |
rc = ssh_pki_import_privkey_file(sshbind->ecdsakey,
|
|
Packit Service |
31306d |
NULL,
|
|
Packit Service |
31306d |
NULL,
|
|
Packit Service |
31306d |
NULL,
|
|
Packit Service |
31306d |
&sshbind->ecdsa);
|
|
Packit Service |
31306d |
if (rc == SSH_ERROR || rc == SSH_EOF) {
|
|
Packit Service |
31306d |
ssh_set_error(sshbind, SSH_FATAL,
|
|
Packit Service |
31306d |
"Failed to import private ECDSA host key");
|
|
Packit Service |
31306d |
return SSH_ERROR;
|
|
Packit Service |
31306d |
}
|
|
Packit Service |
31306d |
|
|
Packit Service |
31306d |
if (!is_ecdsa_key_type(ssh_key_type(sshbind->ecdsa))) {
|
|
Packit Service |
31306d |
ssh_set_error(sshbind, SSH_FATAL,
|
|
Packit Service |
31306d |
"The ECDSA host key has the wrong type");
|
|
Packit Service |
31306d |
ssh_key_free(sshbind->ecdsa);
|
|
Packit Service |
31306d |
sshbind->ecdsa = NULL;
|
|
Packit Service |
31306d |
return SSH_ERROR;
|
|
Packit Service |
31306d |
}
|
|
Packit Service |
31306d |
}
|
|
Packit Service |
31306d |
#endif
|
|
Packit Service |
31306d |
|
|
Packit Service |
31306d |
#ifdef HAVE_DSA
|
|
Packit Service |
31306d |
if (sshbind->dsa == NULL && sshbind->dsakey != NULL) {
|
|
Packit Service |
31306d |
rc = ssh_pki_import_privkey_file(sshbind->dsakey,
|
|
Packit Service |
31306d |
NULL,
|
|
Packit Service |
31306d |
NULL,
|
|
Packit Service |
31306d |
NULL,
|
|
Packit Service |
31306d |
&sshbind->dsa);
|
|
Packit Service |
31306d |
if (rc == SSH_ERROR || rc == SSH_EOF) {
|
|
Packit Service |
31306d |
ssh_set_error(sshbind, SSH_FATAL,
|
|
Packit Service |
31306d |
"Failed to import private DSA host key");
|
|
Packit Service |
31306d |
return SSH_ERROR;
|
|
Packit Service |
31306d |
}
|
|
Packit Service |
31306d |
|
|
Packit Service |
31306d |
if (ssh_key_type(sshbind->dsa) != SSH_KEYTYPE_DSS) {
|
|
Packit Service |
31306d |
ssh_set_error(sshbind, SSH_FATAL,
|
|
Packit Service |
31306d |
"The DSA host key has the wrong type: %d",
|
|
Packit Service |
31306d |
ssh_key_type(sshbind->dsa));
|
|
Packit Service |
31306d |
ssh_key_free(sshbind->dsa);
|
|
Packit Service |
31306d |
sshbind->dsa = NULL;
|
|
Packit Service |
31306d |
return SSH_ERROR;
|
|
Packit Service |
31306d |
}
|
|
Packit Service |
31306d |
}
|
|
Packit Service |
31306d |
#endif
|
|
Packit Service |
31306d |
|
|
Packit Service |
31306d |
if (sshbind->rsa == NULL && sshbind->rsakey != NULL) {
|
|
Packit Service |
31306d |
rc = ssh_pki_import_privkey_file(sshbind->rsakey,
|
|
Packit Service |
31306d |
NULL,
|
|
Packit Service |
31306d |
NULL,
|
|
Packit Service |
31306d |
NULL,
|
|
Packit Service |
31306d |
&sshbind->rsa);
|
|
Packit Service |
31306d |
if (rc == SSH_ERROR || rc == SSH_EOF) {
|
|
Packit Service |
31306d |
ssh_set_error(sshbind, SSH_FATAL,
|
|
Packit Service |
31306d |
"Failed to import private RSA host key");
|
|
Packit Service |
31306d |
return SSH_ERROR;
|
|
Packit Service |
31306d |
}
|
|
Packit Service |
31306d |
|
|
Packit Service |
31306d |
if (ssh_key_type(sshbind->rsa) != SSH_KEYTYPE_RSA) {
|
|
Packit Service |
31306d |
ssh_set_error(sshbind, SSH_FATAL,
|
|
Packit Service |
31306d |
"The RSA host key has the wrong type");
|
|
Packit Service |
31306d |
ssh_key_free(sshbind->rsa);
|
|
Packit Service |
31306d |
sshbind->rsa = NULL;
|
|
Packit Service |
31306d |
return SSH_ERROR;
|
|
Packit Service |
31306d |
}
|
|
Packit Service |
31306d |
}
|
|
Packit Service |
31306d |
|
|
Packit Service |
31306d |
if (sshbind->ed25519 == NULL && sshbind->ed25519key != NULL) {
|
|
Packit Service |
31306d |
rc = ssh_pki_import_privkey_file(sshbind->ed25519key,
|
|
Packit Service |
31306d |
NULL,
|
|
Packit Service |
31306d |
NULL,
|
|
Packit Service |
31306d |
NULL,
|
|
Packit Service |
31306d |
&sshbind->ed25519);
|
|
Packit Service |
31306d |
if (rc == SSH_ERROR || rc == SSH_EOF) {
|
|
Packit Service |
31306d |
ssh_set_error(sshbind, SSH_FATAL,
|
|
Packit Service |
31306d |
"Failed to import private ED25519 host key");
|
|
Packit Service |
31306d |
return SSH_ERROR;
|
|
Packit Service |
31306d |
}
|
|
Packit Service |
31306d |
|
|
Packit Service |
31306d |
if (ssh_key_type(sshbind->ed25519) != SSH_KEYTYPE_ED25519) {
|
|
Packit Service |
31306d |
ssh_set_error(sshbind, SSH_FATAL,
|
|
Packit Service |
31306d |
"The ED25519 host key has the wrong type");
|
|
Packit Service |
31306d |
ssh_key_free(sshbind->ed25519);
|
|
Packit Service |
31306d |
sshbind->ed25519 = NULL;
|
|
Packit Service |
31306d |
return SSH_ERROR;
|
|
Packit Service |
31306d |
}
|
|
Packit Service |
31306d |
}
|
|
Packit Service |
31306d |
|
|
Packit Service |
31306d |
return SSH_OK;
|
|
Packit Service |
31306d |
}
|
|
Packit Service |
31306d |
|
|
Packit Service |
31306d |
int ssh_bind_listen(ssh_bind sshbind) {
|
|
Packit Service |
31306d |
const char *host;
|
|
Packit Service |
31306d |
socket_t fd;
|
|
Packit Service |
31306d |
int rc;
|
|
Packit Service |
31306d |
|
|
Packit Service |
31306d |
if (sshbind->rsa == NULL &&
|
|
Packit Service |
31306d |
sshbind->dsa == NULL &&
|
|
Packit Service |
31306d |
sshbind->ecdsa == NULL &&
|
|
Packit Service |
31306d |
sshbind->ed25519 == NULL) {
|
|
Packit Service |
31306d |
rc = ssh_bind_import_keys(sshbind);
|
|
Packit Service |
31306d |
if (rc != SSH_OK) {
|
|
Packit Service |
31306d |
return SSH_ERROR;
|
|
Packit Service |
31306d |
}
|
|
Packit Service |
31306d |
}
|
|
Packit Service |
31306d |
|
|
Packit Service |
31306d |
if (sshbind->bindfd == SSH_INVALID_SOCKET) {
|
|
Packit Service |
31306d |
host = sshbind->bindaddr;
|
|
Packit Service |
31306d |
if (host == NULL) {
|
|
Packit Service |
31306d |
host = "0.0.0.0";
|
|
Packit Service |
31306d |
}
|
|
Packit Service |
31306d |
|
|
Packit Service |
31306d |
fd = bind_socket(sshbind, host, sshbind->bindport);
|
|
Packit Service |
31306d |
if (fd == SSH_INVALID_SOCKET) {
|
|
Packit Service |
31306d |
ssh_key_free(sshbind->dsa);
|
|
Packit Service |
31306d |
sshbind->dsa = NULL;
|
|
Packit Service |
31306d |
ssh_key_free(sshbind->rsa);
|
|
Packit Service |
31306d |
sshbind->rsa = NULL;
|
|
Packit Service |
31306d |
/* XXX should this clear also other structures that were allocated */
|
|
Packit Service |
31306d |
return -1;
|
|
Packit Service |
31306d |
}
|
|
Packit Service |
31306d |
|
|
Packit Service |
31306d |
if (listen(fd, 10) < 0) {
|
|
Packit Service |
31306d |
ssh_set_error(sshbind, SSH_FATAL,
|
|
Packit Service |
31306d |
"Listening to socket %d: %s",
|
|
Packit Service |
31306d |
fd, strerror(errno));
|
|
Packit Service |
31306d |
CLOSE_SOCKET(fd);
|
|
Packit Service |
31306d |
ssh_key_free(sshbind->dsa);
|
|
Packit Service |
31306d |
sshbind->dsa = NULL;
|
|
Packit Service |
31306d |
ssh_key_free(sshbind->rsa);
|
|
Packit Service |
31306d |
sshbind->rsa = NULL;
|
|
Packit Service |
31306d |
/* XXX should this clear also other structures that were allocated */
|
|
Packit Service |
31306d |
return -1;
|
|
Packit Service |
31306d |
}
|
|
Packit Service |
31306d |
|
|
Packit Service |
31306d |
sshbind->bindfd = fd;
|
|
Packit Service |
31306d |
} else {
|
|
Packit Service |
31306d |
SSH_LOG(SSH_LOG_INFO, "Using app-provided bind socket");
|
|
Packit Service |
31306d |
}
|
|
Packit Service |
31306d |
return 0;
|
|
Packit Service |
31306d |
}
|
|
Packit Service |
31306d |
|
|
Packit Service |
31306d |
int ssh_bind_set_callbacks(ssh_bind sshbind, ssh_bind_callbacks callbacks,
|
|
Packit Service |
31306d |
void *userdata){
|
|
Packit Service |
31306d |
if (sshbind == NULL) {
|
|
Packit Service |
31306d |
return SSH_ERROR;
|
|
Packit Service |
31306d |
}
|
|
Packit Service |
31306d |
if (callbacks == NULL) {
|
|
Packit Service |
31306d |
ssh_set_error_invalid(sshbind);
|
|
Packit Service |
31306d |
return SSH_ERROR;
|
|
Packit Service |
31306d |
}
|
|
Packit Service |
31306d |
if(callbacks->size <= 0 || callbacks->size > 1024 * sizeof(void *)){
|
|
Packit Service |
31306d |
ssh_set_error(sshbind,SSH_FATAL,
|
|
Packit Service |
31306d |
"Invalid callback passed in (badly initialized)");
|
|
Packit Service |
31306d |
return SSH_ERROR;
|
|
Packit Service |
31306d |
}
|
|
Packit Service |
31306d |
sshbind->bind_callbacks = callbacks;
|
|
Packit Service |
31306d |
sshbind->bind_callbacks_userdata=userdata;
|
|
Packit Service |
31306d |
return 0;
|
|
Packit Service |
31306d |
}
|
|
Packit Service |
31306d |
|
|
Packit Service |
31306d |
/** @internal
|
|
Packit Service |
31306d |
* @brief callback being called by poll when an event happens
|
|
Packit Service |
31306d |
*
|
|
Packit Service |
31306d |
*/
|
|
Packit Service |
31306d |
static int ssh_bind_poll_callback(ssh_poll_handle sshpoll,
|
|
Packit Service |
31306d |
socket_t fd, int revents, void *user){
|
|
Packit Service |
31306d |
ssh_bind sshbind=(ssh_bind)user;
|
|
Packit Service |
31306d |
(void)sshpoll;
|
|
Packit Service |
31306d |
(void)fd;
|
|
Packit Service |
31306d |
|
|
Packit Service |
31306d |
if(revents & POLLIN){
|
|
Packit Service |
31306d |
/* new incoming connection */
|
|
Packit Service |
31306d |
if(ssh_callbacks_exists(sshbind->bind_callbacks,incoming_connection)){
|
|
Packit Service |
31306d |
sshbind->bind_callbacks->incoming_connection(sshbind,
|
|
Packit Service |
31306d |
sshbind->bind_callbacks_userdata);
|
|
Packit Service |
31306d |
}
|
|
Packit Service |
31306d |
}
|
|
Packit Service |
31306d |
return 0;
|
|
Packit Service |
31306d |
}
|
|
Packit Service |
31306d |
|
|
Packit Service |
31306d |
/** @internal
|
|
Packit Service |
31306d |
* @brief returns the current poll handle, or create it
|
|
Packit Service |
31306d |
* @param sshbind the ssh_bind object
|
|
Packit Service |
31306d |
* @returns a ssh_poll handle suitable for operation
|
|
Packit Service |
31306d |
*/
|
|
Packit Service |
31306d |
ssh_poll_handle ssh_bind_get_poll(ssh_bind sshbind)
|
|
Packit Service |
31306d |
{
|
|
Packit Service |
31306d |
short events = POLLIN;
|
|
Packit Service |
31306d |
|
|
Packit Service |
31306d |
if (sshbind->poll) {
|
|
Packit Service |
31306d |
return sshbind->poll;
|
|
Packit Service |
31306d |
}
|
|
Packit Service |
31306d |
|
|
Packit Service |
31306d |
#ifdef POLLRDHUP
|
|
Packit Service |
31306d |
events |= POLLRDHUP;
|
|
Packit Service |
31306d |
#endif /* POLLRDHUP */
|
|
Packit Service |
31306d |
|
|
Packit Service |
31306d |
sshbind->poll = ssh_poll_new(sshbind->bindfd,
|
|
Packit Service |
31306d |
events,
|
|
Packit Service |
31306d |
ssh_bind_poll_callback,
|
|
Packit Service |
31306d |
sshbind);
|
|
Packit Service |
31306d |
|
|
Packit Service |
31306d |
return sshbind->poll;
|
|
Packit Service |
31306d |
}
|
|
Packit Service |
31306d |
|
|
Packit Service |
31306d |
void ssh_bind_set_blocking(ssh_bind sshbind, int blocking) {
|
|
Packit Service |
31306d |
sshbind->blocking = blocking ? 1 : 0;
|
|
Packit Service |
31306d |
}
|
|
Packit Service |
31306d |
|
|
Packit Service |
31306d |
socket_t ssh_bind_get_fd(ssh_bind sshbind) {
|
|
Packit Service |
31306d |
return sshbind->bindfd;
|
|
Packit Service |
31306d |
}
|
|
Packit Service |
31306d |
|
|
Packit Service |
31306d |
void ssh_bind_set_fd(ssh_bind sshbind, socket_t fd) {
|
|
Packit Service |
31306d |
sshbind->bindfd = fd;
|
|
Packit Service |
31306d |
}
|
|
Packit Service |
31306d |
|
|
Packit Service |
31306d |
void ssh_bind_fd_toaccept(ssh_bind sshbind) {
|
|
Packit Service |
31306d |
sshbind->toaccept = 1;
|
|
Packit Service |
31306d |
}
|
|
Packit Service |
31306d |
|
|
Packit Service |
31306d |
void ssh_bind_free(ssh_bind sshbind){
|
|
Packit Service |
31306d |
int i;
|
|
Packit Service |
31306d |
|
|
Packit Service |
31306d |
if (sshbind == NULL) {
|
|
Packit Service |
31306d |
return;
|
|
Packit Service |
31306d |
}
|
|
Packit Service |
31306d |
|
|
Packit Service |
31306d |
if (sshbind->bindfd >= 0) {
|
|
Packit Service |
31306d |
CLOSE_SOCKET(sshbind->bindfd);
|
|
Packit Service |
31306d |
}
|
|
Packit Service |
31306d |
sshbind->bindfd = SSH_INVALID_SOCKET;
|
|
Packit Service |
31306d |
|
|
Packit Service |
31306d |
/* options */
|
|
Packit Service |
31306d |
SAFE_FREE(sshbind->banner);
|
|
Packit Service |
31306d |
SAFE_FREE(sshbind->bindaddr);
|
|
Packit Service |
31306d |
SAFE_FREE(sshbind->config_dir);
|
|
Packit Service |
31306d |
SAFE_FREE(sshbind->pubkey_accepted_key_types);
|
|
Packit Service |
31306d |
|
|
Packit Service |
31306d |
SAFE_FREE(sshbind->dsakey);
|
|
Packit Service |
31306d |
SAFE_FREE(sshbind->rsakey);
|
|
Packit Service |
31306d |
SAFE_FREE(sshbind->ecdsakey);
|
|
Packit Service |
31306d |
SAFE_FREE(sshbind->ed25519key);
|
|
Packit Service |
31306d |
|
|
Packit Service |
31306d |
ssh_key_free(sshbind->dsa);
|
|
Packit Service |
31306d |
sshbind->dsa = NULL;
|
|
Packit Service |
31306d |
ssh_key_free(sshbind->rsa);
|
|
Packit Service |
31306d |
sshbind->rsa = NULL;
|
|
Packit Service |
31306d |
ssh_key_free(sshbind->ecdsa);
|
|
Packit Service |
31306d |
sshbind->ecdsa = NULL;
|
|
Packit Service |
31306d |
ssh_key_free(sshbind->ed25519);
|
|
Packit Service |
31306d |
sshbind->ed25519 = NULL;
|
|
Packit Service |
31306d |
|
|
Packit Service |
31306d |
for (i = 0; i < SSH_KEX_METHODS; i++) {
|
|
Packit Service |
31306d |
if (sshbind->wanted_methods[i]) {
|
|
Packit Service |
31306d |
SAFE_FREE(sshbind->wanted_methods[i]);
|
|
Packit Service |
31306d |
}
|
|
Packit Service |
31306d |
}
|
|
Packit Service |
31306d |
|
|
Packit Service |
31306d |
SAFE_FREE(sshbind);
|
|
Packit Service |
31306d |
}
|
|
Packit Service |
31306d |
|
|
Packit Service |
31306d |
int ssh_bind_accept_fd(ssh_bind sshbind, ssh_session session, socket_t fd){
|
|
Packit Service |
31306d |
int i, rc;
|
|
Packit Service |
31306d |
|
|
Packit Service |
31306d |
if (sshbind == NULL) {
|
|
Packit Service |
31306d |
return SSH_ERROR;
|
|
Packit Service |
31306d |
}
|
|
Packit Service |
31306d |
|
|
Packit Service |
31306d |
if (session == NULL){
|
|
Packit Service |
31306d |
ssh_set_error(sshbind, SSH_FATAL,"session is null");
|
|
Packit Service |
31306d |
return SSH_ERROR;
|
|
Packit Service |
31306d |
}
|
|
Packit Service |
31306d |
|
|
Packit Service |
31306d |
/* Apply global bind configurations, if it hasn't been applied before */
|
|
Packit Service |
31306d |
rc = ssh_bind_options_parse_config(sshbind, NULL);
|
|
Packit Service |
31306d |
if (rc != 0) {
|
|
Packit Service |
31306d |
ssh_set_error(sshbind, SSH_FATAL,"Could not parse global config");
|
|
Packit Service |
31306d |
return SSH_ERROR;
|
|
Packit Service |
31306d |
}
|
|
Packit Service |
31306d |
|
|
Packit Service |
31306d |
session->server = 1;
|
|
Packit Service |
31306d |
|
|
Packit Service |
31306d |
/* Copy options from bind to session */
|
|
Packit Service |
31306d |
for (i = 0; i < SSH_KEX_METHODS; i++) {
|
|
Packit Service |
31306d |
if (sshbind->wanted_methods[i]) {
|
|
Packit Service |
31306d |
session->opts.wanted_methods[i] = strdup(sshbind->wanted_methods[i]);
|
|
Packit Service |
31306d |
if (session->opts.wanted_methods[i] == NULL) {
|
|
Packit Service |
31306d |
return SSH_ERROR;
|
|
Packit Service |
31306d |
}
|
|
Packit Service |
31306d |
}
|
|
Packit Service |
31306d |
}
|
|
Packit Service |
31306d |
|
|
Packit Service |
31306d |
if (sshbind->bindaddr == NULL)
|
|
Packit Service |
31306d |
session->opts.bindaddr = NULL;
|
|
Packit Service |
31306d |
else {
|
|
Packit Service |
31306d |
SAFE_FREE(session->opts.bindaddr);
|
|
Packit Service |
31306d |
session->opts.bindaddr = strdup(sshbind->bindaddr);
|
|
Packit Service |
31306d |
if (session->opts.bindaddr == NULL) {
|
|
Packit Service |
31306d |
return SSH_ERROR;
|
|
Packit Service |
31306d |
}
|
|
Packit Service |
31306d |
}
|
|
Packit Service |
31306d |
|
|
Packit Service |
31306d |
if (sshbind->pubkey_accepted_key_types != NULL) {
|
|
Packit Service |
31306d |
if (session->opts.pubkey_accepted_types == NULL) {
|
|
Packit Service |
31306d |
session->opts.pubkey_accepted_types = strdup(sshbind->pubkey_accepted_key_types);
|
|
Packit Service |
31306d |
if (session->opts.pubkey_accepted_types == NULL) {
|
|
Packit Service |
31306d |
ssh_set_error_oom(sshbind);
|
|
Packit Service |
31306d |
return SSH_ERROR;
|
|
Packit Service |
31306d |
}
|
|
Packit Service |
31306d |
} else {
|
|
Packit Service |
31306d |
char *p;
|
|
Packit Service |
31306d |
/* If something was set to the session prior to calling this
|
|
Packit Service |
31306d |
* function, keep only what is allowed by the options set in
|
|
Packit Service |
31306d |
* sshbind */
|
|
Packit Service |
31306d |
p = ssh_find_all_matching(sshbind->pubkey_accepted_key_types,
|
|
Packit Service |
31306d |
session->opts.pubkey_accepted_types);
|
|
Packit Service |
31306d |
if (p == NULL) {
|
|
Packit Service |
31306d |
return SSH_ERROR;
|
|
Packit Service |
31306d |
}
|
|
Packit Service |
31306d |
|
|
Packit Service |
31306d |
SAFE_FREE(session->opts.pubkey_accepted_types);
|
|
Packit Service |
31306d |
session->opts.pubkey_accepted_types = p;
|
|
Packit Service |
31306d |
}
|
|
Packit Service |
31306d |
}
|
|
Packit Service |
31306d |
|
|
Packit Service |
31306d |
session->common.log_verbosity = sshbind->common.log_verbosity;
|
|
Packit Service |
31306d |
if(sshbind->banner != NULL)
|
|
Packit Service |
31306d |
session->opts.custombanner = strdup(sshbind->banner);
|
|
Packit Service |
31306d |
ssh_socket_free(session->socket);
|
|
Packit Service |
31306d |
session->socket = ssh_socket_new(session);
|
|
Packit Service |
31306d |
if (session->socket == NULL) {
|
|
Packit Service |
31306d |
/* perhaps it may be better to copy the error from session to sshbind */
|
|
Packit Service |
31306d |
ssh_set_error_oom(sshbind);
|
|
Packit Service |
31306d |
return SSH_ERROR;
|
|
Packit Service |
31306d |
}
|
|
Packit Service |
31306d |
ssh_socket_set_fd(session->socket, fd);
|
|
Packit Service |
31306d |
ssh_socket_get_poll_handle(session->socket);
|
|
Packit Service |
31306d |
|
|
Packit Service |
31306d |
/* We must try to import any keys that could be imported in case
|
|
Packit Service |
31306d |
* we are not using ssh_bind_listen (which is the other place
|
|
Packit Service |
31306d |
* where keys can be imported) on this ssh_bind and are instead
|
|
Packit Service |
31306d |
* only using ssh_bind_accept_fd to manage sockets ourselves.
|
|
Packit Service |
31306d |
*/
|
|
Packit Service |
31306d |
if (sshbind->rsa == NULL &&
|
|
Packit Service |
31306d |
sshbind->dsa == NULL &&
|
|
Packit Service |
31306d |
sshbind->ecdsa == NULL &&
|
|
Packit Service |
31306d |
sshbind->ed25519 == NULL) {
|
|
Packit Service |
31306d |
rc = ssh_bind_import_keys(sshbind);
|
|
Packit Service |
31306d |
if (rc != SSH_OK) {
|
|
Packit Service |
31306d |
return SSH_ERROR;
|
|
Packit Service |
31306d |
}
|
|
Packit Service |
31306d |
}
|
|
Packit Service |
31306d |
|
|
Packit Service |
31306d |
#ifdef HAVE_ECC
|
|
Packit Service |
31306d |
if (sshbind->ecdsa) {
|
|
Packit Service |
31306d |
session->srv.ecdsa_key = ssh_key_dup(sshbind->ecdsa);
|
|
Packit Service |
31306d |
if (session->srv.ecdsa_key == NULL) {
|
|
Packit Service |
31306d |
ssh_set_error_oom(sshbind);
|
|
Packit Service |
31306d |
return SSH_ERROR;
|
|
Packit Service |
31306d |
}
|
|
Packit Service |
31306d |
}
|
|
Packit Service |
31306d |
#endif
|
|
Packit Service |
31306d |
#ifdef HAVE_DSA
|
|
Packit Service |
31306d |
if (sshbind->dsa) {
|
|
Packit Service |
31306d |
session->srv.dsa_key = ssh_key_dup(sshbind->dsa);
|
|
Packit Service |
31306d |
if (session->srv.dsa_key == NULL) {
|
|
Packit Service |
31306d |
ssh_set_error_oom(sshbind);
|
|
Packit Service |
31306d |
return SSH_ERROR;
|
|
Packit Service |
31306d |
}
|
|
Packit Service |
31306d |
}
|
|
Packit Service |
31306d |
#endif
|
|
Packit Service |
31306d |
if (sshbind->rsa) {
|
|
Packit Service |
31306d |
session->srv.rsa_key = ssh_key_dup(sshbind->rsa);
|
|
Packit Service |
31306d |
if (session->srv.rsa_key == NULL) {
|
|
Packit Service |
31306d |
ssh_set_error_oom(sshbind);
|
|
Packit Service |
31306d |
return SSH_ERROR;
|
|
Packit Service |
31306d |
}
|
|
Packit Service |
31306d |
}
|
|
Packit Service |
31306d |
if (sshbind->ed25519 != NULL) {
|
|
Packit Service |
31306d |
session->srv.ed25519_key = ssh_key_dup(sshbind->ed25519);
|
|
Packit Service |
31306d |
if (session->srv.ed25519_key == NULL){
|
|
Packit Service |
31306d |
ssh_set_error_oom(sshbind);
|
|
Packit Service |
31306d |
return SSH_ERROR;
|
|
Packit Service |
31306d |
}
|
|
Packit Service |
31306d |
}
|
|
Packit Service |
31306d |
|
|
Packit Service |
31306d |
/* force PRNG to change state in case we fork after ssh_bind_accept */
|
|
Packit Service |
31306d |
ssh_reseed();
|
|
Packit Service |
31306d |
return SSH_OK;
|
|
Packit Service |
31306d |
}
|
|
Packit Service |
31306d |
|
|
Packit Service |
31306d |
int ssh_bind_accept(ssh_bind sshbind, ssh_session session) {
|
|
Packit Service |
31306d |
socket_t fd = SSH_INVALID_SOCKET;
|
|
Packit Service |
31306d |
int rc;
|
|
Packit Service |
31306d |
if (sshbind->bindfd == SSH_INVALID_SOCKET) {
|
|
Packit Service |
31306d |
ssh_set_error(sshbind, SSH_FATAL,
|
|
Packit Service |
31306d |
"Can't accept new clients on a not bound socket.");
|
|
Packit Service |
31306d |
return SSH_ERROR;
|
|
Packit Service |
31306d |
}
|
|
Packit Service |
31306d |
|
|
Packit Service |
31306d |
if (session == NULL){
|
|
Packit Service |
31306d |
ssh_set_error(sshbind, SSH_FATAL,"session is null");
|
|
Packit Service |
31306d |
return SSH_ERROR;
|
|
Packit Service |
31306d |
}
|
|
Packit Service |
31306d |
|
|
Packit Service |
31306d |
fd = accept(sshbind->bindfd, NULL, NULL);
|
|
Packit Service |
31306d |
if (fd == SSH_INVALID_SOCKET) {
|
|
Packit Service |
31306d |
ssh_set_error(sshbind, SSH_FATAL,
|
|
Packit Service |
31306d |
"Accepting a new connection: %s",
|
|
Packit Service |
31306d |
strerror(errno));
|
|
Packit Service |
31306d |
return SSH_ERROR;
|
|
Packit Service |
31306d |
}
|
|
Packit Service |
31306d |
rc = ssh_bind_accept_fd(sshbind, session, fd);
|
|
Packit Service |
31306d |
|
|
Packit Service |
31306d |
if(rc == SSH_ERROR){
|
|
Packit Service |
31306d |
CLOSE_SOCKET(fd);
|
|
Packit Service |
31306d |
ssh_socket_free(session->socket);
|
|
Packit Service |
31306d |
}
|
|
Packit Service |
31306d |
return rc;
|
|
Packit Service |
31306d |
}
|
|
Packit Service |
31306d |
|
|
Packit Service |
31306d |
|
|
Packit Service |
31306d |
/**
|
|
Packit Service |
31306d |
* @}
|
|
Packit Service |
31306d |
*/
|