mirror of
https://git.savannah.gnu.org/git/inetutils.git
synced 2026-01-12 00:19:39 +08:00
2271 lines
53 KiB
C
2271 lines
53 KiB
C
/*
|
|
Copyright (C) 1994-2025 Free Software Foundation, Inc.
|
|
|
|
This file is part of GNU Inetutils.
|
|
|
|
GNU Inetutils is free software: you can redistribute it and/or modify
|
|
it under the terms of the GNU General Public License as published by
|
|
the Free Software Foundation, either version 3 of the License, or (at
|
|
your option) any later version.
|
|
|
|
GNU Inetutils is distributed in the hope that it will be useful, but
|
|
WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
|
|
General Public License for more details.
|
|
|
|
You should have received a copy of the GNU General Public License
|
|
along with this program. If not, see `http://www.gnu.org/licenses/'. */
|
|
|
|
/* - Ftp Server
|
|
* Copyright (c) 1985, 1988, 1990, 1992, 1993, 1994
|
|
* The Regents of the University of California. All rights reserved.
|
|
*
|
|
* Redistribution and use in source and binary forms, with or without
|
|
* modification, are permitted provided that the following conditions
|
|
* are met:
|
|
* 1. Redistributions of source code must retain the above copyright
|
|
* notice, this list of conditions and the following disclaimer.
|
|
* 2. Redistributions in binary form must reproduce the above copyright
|
|
* notice, this list of conditions and the following disclaimer in the
|
|
* documentation and/or other materials provided with the distribution.
|
|
* 3. Neither the name of the University nor the names of its contributors
|
|
* may be used to endorse or promote products derived from this software
|
|
* without specific prior written permission.
|
|
*
|
|
* THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
|
|
* ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
|
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
|
* ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
|
|
* FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
|
|
* DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
|
|
* OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
|
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
|
|
* LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
|
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
|
* SUCH DAMAGE.
|
|
*/
|
|
|
|
/*
|
|
* FTP server.
|
|
*/
|
|
|
|
#include <config.h>
|
|
|
|
#include <alloca.h>
|
|
#include <sys/param.h>
|
|
#include <sys/stat.h>
|
|
#include <sys/ioctl.h>
|
|
#include <sys/socket.h>
|
|
#include <sys/wait.h>
|
|
|
|
#include <netinet/in.h>
|
|
#ifdef HAVE_NETINET_IN_SYSTM_H
|
|
# include <netinet/in_systm.h>
|
|
#endif
|
|
#ifdef HAVE_NETINET_IP_H
|
|
# include <netinet/ip.h>
|
|
#endif
|
|
|
|
#define FTP_NAMES 1
|
|
#include <arpa/ftp.h>
|
|
#include <arpa/inet.h>
|
|
#include <arpa/telnet.h>
|
|
|
|
#include <ctype.h>
|
|
#include <dirent.h>
|
|
#include <errno.h>
|
|
#include <fcntl.h>
|
|
#include <limits.h>
|
|
#include <netdb.h>
|
|
#include <setjmp.h>
|
|
#include <signal.h>
|
|
#include <grp.h>
|
|
#include <stdarg.h>
|
|
#include <stdio.h>
|
|
#include <stdlib.h>
|
|
#include <string.h>
|
|
#include <syslog.h>
|
|
#include <sys/time.h>
|
|
#include <time.h>
|
|
#include <unistd.h>
|
|
#ifdef HAVE_MMAP
|
|
# include <sys/mman.h>
|
|
#endif
|
|
/* Include glob.h last, because it may define "const" which breaks
|
|
system headers on some platforms. */
|
|
#include <glob.h>
|
|
#include <argp.h>
|
|
#include <error.h>
|
|
#include <xgetcwd.h>
|
|
|
|
#include <progname.h>
|
|
#include <libinetutils.h>
|
|
#include "extern.h"
|
|
#include "attribute.h"
|
|
|
|
#ifndef LINE_MAX
|
|
# define LINE_MAX 2048
|
|
#endif
|
|
|
|
#ifndef LOG_FTP
|
|
# define LOG_FTP LOG_DAEMON /* Use generic facility. */
|
|
#endif
|
|
|
|
#ifndef MAP_FAILED
|
|
# define MAP_FAILED (void*)-1
|
|
#endif
|
|
|
|
/* Exported to ftpcmd.h. */
|
|
struct sockaddr_storage data_dest; /* Data port. */
|
|
socklen_t data_dest_len;
|
|
struct sockaddr_storage his_addr; /* Peer address. */
|
|
socklen_t his_addrlen;
|
|
int logging; /* Enable log to syslog. */
|
|
int no_version; /* Don't print version to client. */
|
|
int type = TYPE_A; /* Default TYPE_A. */
|
|
int form = FORM_N; /* Default FORM_N. */
|
|
int debug; /* Enable debug mode if 1. */
|
|
int rfc2577 = 1; /* Follow suggestions in RFC 2577. */
|
|
int timeout = 900; /* Timeout after 15 minutes of inactivity. */
|
|
int maxtimeout = 7200; /* Don't allow idle time to be set
|
|
beyond 2 hours. */
|
|
int pdata = -1; /* For passive mode. */
|
|
char *hostname; /* Who we are. */
|
|
int usedefault = 1; /* For data transfers. */
|
|
char tmpline[7]; /* Temp buffer use in OOB. */
|
|
char addrstr[NI_MAXHOST]; /* Host name or address string. */
|
|
char portstr[8]; /* Numeric port as string. */
|
|
|
|
/* Requester credentials. */
|
|
struct credentials cred;
|
|
|
|
jmp_buf errcatch;
|
|
|
|
static struct sockaddr_storage ctrl_addr; /* Control address. */
|
|
static socklen_t ctrl_addrlen;
|
|
static struct sockaddr_storage data_source; /* Port address. */
|
|
static socklen_t data_source_len;
|
|
static struct sockaddr_storage pasv_addr; /* Pasv address. */
|
|
static socklen_t pasv_addrlen;
|
|
|
|
static int data = -1; /* Port data connection socket. */
|
|
static jmp_buf urgcatch;
|
|
static int stru = STRU_F; /* Avoid C keyword. */
|
|
static int stru_mode = MODE_S; /* Default STRU mode stru_mode = MODE_S. */
|
|
static int anon_only; /* Allow only anonymous login. */
|
|
static int daemon_mode; /* Start in daemon mode. */
|
|
static off_t file_size;
|
|
static off_t byte_count;
|
|
static sig_atomic_t transflag; /* Flag where in a middle of transfer. */
|
|
static const char *pid_file = PATH_FTPDPID;
|
|
#if !defined CMASK || CMASK == 0
|
|
# undef CMASK
|
|
# define CMASK 027
|
|
#endif
|
|
static int defumask = CMASK; /* Default umask value. */
|
|
static int login_attempts; /* Number of failed login attempts. */
|
|
static int askpasswd; /* Had user command, ask for passwd. */
|
|
static char curname[10]; /* Current USER name. */
|
|
static char ttyline[20]; /* Line to log in utmp. */
|
|
|
|
|
|
#define NUM_SIMUL_OFF_TO_STRS 4
|
|
|
|
/* Returns a string with the decimal representation of the off_t OFF, taking
|
|
into account that off_t might be longer than a long. The return value is
|
|
a pointer to a static buffer, but a return value will only be reused every
|
|
NUM_SIMUL_OFF_TO_STRS calls, to allow multiple off_t's to be conveniently
|
|
printed with a single printf statement. */
|
|
static char *
|
|
off_to_str (off_t off)
|
|
{
|
|
static char bufs[NUM_SIMUL_OFF_TO_STRS][80];
|
|
static char (*next_buf)[80] = bufs;
|
|
|
|
if (next_buf >= (bufs + NUM_SIMUL_OFF_TO_STRS))
|
|
next_buf = bufs;
|
|
|
|
if (sizeof (off) > sizeof (long))
|
|
sprintf (*next_buf, "%lld", (long long int) off);
|
|
else if (sizeof (off) == sizeof (long))
|
|
sprintf (*next_buf, "%ld", (long) off);
|
|
else
|
|
sprintf (*next_buf, "%d", (int) off);
|
|
|
|
return *next_buf++;
|
|
}
|
|
|
|
/*
|
|
* Timeout intervals for retrying connections
|
|
* to hosts that don't accept PORT cmds. This
|
|
* is a kludge, but given the problems with TCP...
|
|
*/
|
|
#define SWAITMAX 90 /* wait at most 90 seconds */
|
|
#define SWAITINT 5 /* interval between retries */
|
|
|
|
static int swaitmax = SWAITMAX;
|
|
static int swaitint = SWAITINT;
|
|
|
|
#ifdef HAVE_SETPROCTITLE
|
|
char proctitle[LINE_MAX]; /* initial part of title */
|
|
#endif /* SETPROCTITLE */
|
|
|
|
#define LOGCMD(cmd, file) \
|
|
if (logging > 1) \
|
|
syslog(LOG_INFO,"%s %s%s", cmd, \
|
|
*(file) == '/' ? "" : curdir(), file);
|
|
#define LOGCMD2(cmd, file1, file2) \
|
|
if (logging > 1) \
|
|
syslog(LOG_INFO,"%s %s%s %s%s", cmd, \
|
|
*(file1) == '/' ? "" : curdir(), file1, \
|
|
*(file2) == '/' ? "" : curdir(), file2);
|
|
#define LOGBYTES(cmd, file, cnt) \
|
|
if (logging > 1) { \
|
|
if (cnt == (off_t)-1) \
|
|
syslog(LOG_INFO,"%s %s%s", cmd, \
|
|
*(file) == '/' ? "" : curdir(), file); \
|
|
else \
|
|
syslog(LOG_INFO, "%s %s%s = %s bytes", \
|
|
cmd, (*(file) == '/') ? "" : curdir(), file, \
|
|
off_to_str (cnt)); \
|
|
}
|
|
|
|
extern int yyparse (void);
|
|
|
|
static void ack (const char *);
|
|
#ifdef HAVE_LIBWRAP
|
|
static int check_host (struct sockaddr *sa, socklen_t len);
|
|
#endif
|
|
static void complete_login (struct credentials *);
|
|
static char *curdir (void);
|
|
static FILE *dataconn (const char *, off_t, const char *);
|
|
static void dolog (struct sockaddr *, socklen_t, struct credentials *);
|
|
static void end_login (struct credentials *);
|
|
static FILE *getdatasock (const char *);
|
|
static char *gunique (const char *);
|
|
static void lostconn (int);
|
|
static void myoob (int);
|
|
static int receive_data (FILE *, FILE *, off_t);
|
|
static void send_data (FILE *, FILE *, off_t);
|
|
static void sigquit (int);
|
|
|
|
const char doc[] =
|
|
#ifdef WITH_PAM
|
|
"File Transfer Protocol daemon, offering PAM service 'ftp'.";
|
|
#else
|
|
"File Transfer Protocol daemon.";
|
|
#endif
|
|
|
|
enum
|
|
{
|
|
OPT_NONRFC2577 = CHAR_MAX + 1,
|
|
};
|
|
|
|
static struct argp_option options[] = {
|
|
#define GRID 0
|
|
{"anonymous-only", 'A', NULL, 0,
|
|
"server configured for anonymous service only",
|
|
GRID + 1},
|
|
{"daemon", 'D', NULL, 0,
|
|
"start the ftpd standalone",
|
|
GRID + 1},
|
|
{"debug", 'd', NULL, 0,
|
|
"debug mode",
|
|
GRID + 1},
|
|
{"ipv4", '4', NULL, 0,
|
|
"restrict daemon to IPv4",
|
|
GRID + 1},
|
|
{"ipv6", '6', NULL, 0,
|
|
"restrict daemon to IPv6",
|
|
GRID + 1},
|
|
{"logging", 'l', NULL, 0,
|
|
"increase verbosity of syslog messages",
|
|
GRID + 1},
|
|
{"pidfile", 'p', "PIDFILE", OPTION_ARG_OPTIONAL,
|
|
"change default location of pidfile",
|
|
GRID + 1},
|
|
{"no-version", 'q', NULL, 0,
|
|
"do not display version in banner",
|
|
GRID + 1},
|
|
{"timeout", 't', "TIMEOUT", 0,
|
|
"set default idle timeout",
|
|
GRID + 1},
|
|
{"max-timeout", 'T', "MAX_TIMEOUT", 0,
|
|
"set maximum value of timeout allowed",
|
|
GRID + 1},
|
|
{"non-rfc2577", OPT_NONRFC2577, NULL, 0,
|
|
"neglect RFC 2577 by giving info on missing users",
|
|
GRID + 1},
|
|
{"umask", 'u', "VAL", 0,
|
|
"set default umask",
|
|
GRID + 1},
|
|
{"auth", 'a', "AUTH", 0,
|
|
"use AUTH for authentication",
|
|
GRID + 1},
|
|
{NULL, 0, NULL, 0, "AUTH can be one of the following:", GRID + 2},
|
|
{" default", 0, NULL, OPTION_DOC | OPTION_NO_TRANS,
|
|
"passwd authentication",
|
|
GRID + 3},
|
|
#ifdef WITH_PAM
|
|
{" pam", 0, NULL, OPTION_DOC | OPTION_NO_TRANS,
|
|
"using PAM service 'ftp'",
|
|
GRID + 3},
|
|
#endif
|
|
#ifdef WITH_KERBEROS
|
|
{" kerberos", 0, NULL, OPTION_DOC | OPTION_NO_TRANS,
|
|
"",
|
|
GRID + 3},
|
|
#endif
|
|
#ifdef WITH_KERBEROS5
|
|
{" kerberos5", 0, NULL, OPTION_DOC | OPTION_NO_TRANS,
|
|
"",
|
|
GRID + 3},
|
|
#endif
|
|
#ifdef WITH_OPIE
|
|
{" opie", 0, NULL, OPTION_DOC | OPTION_NO_TRANS,
|
|
"",
|
|
GRID + 3},
|
|
#endif
|
|
{NULL, 0, NULL, 0, NULL, 0}
|
|
};
|
|
|
|
static error_t
|
|
parse_opt (int key, char *arg, struct argp_state *state)
|
|
{
|
|
switch (key)
|
|
{
|
|
case '4':
|
|
/* Active in daemon mode only. */
|
|
usefamily = AF_INET;
|
|
break;
|
|
|
|
case '6':
|
|
/* Active in daemon mode only. */
|
|
usefamily = AF_INET6;
|
|
break;
|
|
|
|
case 'A':
|
|
/* Anonymous ftp only. */
|
|
anon_only = 1;
|
|
break;
|
|
|
|
case 'a':
|
|
if (strcasecmp (arg, "default") == 0)
|
|
cred.auth_type = AUTH_TYPE_PASSWD;
|
|
#ifdef WITH_PAM
|
|
else if (strcasecmp (arg, "pam") == 0)
|
|
cred.auth_type = AUTH_TYPE_PAM;
|
|
#endif
|
|
#ifdef WITH_KERBEROS
|
|
else if (strcasecmp (arg, "kerberos") == 0)
|
|
cred.auth_type = AUTH_TYPE_KERBEROS;
|
|
#endif
|
|
#ifdef WITH_KERBEROS5
|
|
else if (strcasecmp (arg, "kerberos5") == 0)
|
|
cred.auth_type = AUTH_TYPE_KERBEROS5;
|
|
#endif
|
|
#ifdef WITH_OPIE
|
|
else if (strcasecmp (arg, "opie") == 0)
|
|
cred.auth_type = AUTH_TYPE_OPIE;
|
|
#endif
|
|
break;
|
|
|
|
case 'D':
|
|
/* Run ftpd as daemon. */
|
|
daemon_mode = 1;
|
|
break;
|
|
|
|
case 'd':
|
|
/* Enable debug mode. */
|
|
debug = 1;
|
|
break;
|
|
|
|
case 'l':
|
|
/* Increase logging level. */
|
|
logging++; /* > 1 == Extra logging. */
|
|
break;
|
|
|
|
case 'p':
|
|
/* Override pid file */
|
|
pid_file = arg;
|
|
break;
|
|
|
|
case 'q':
|
|
/* Don't include version number in banner. */
|
|
no_version = 1;
|
|
break;
|
|
|
|
case 't':
|
|
/* Set default timeout value. */
|
|
timeout = atoi (arg);
|
|
if (maxtimeout < timeout)
|
|
maxtimeout = timeout;
|
|
break;
|
|
|
|
case 'T': /* Maximum timeout allowed. */
|
|
maxtimeout = atoi (arg);
|
|
if (timeout > maxtimeout)
|
|
timeout = maxtimeout;
|
|
break;
|
|
|
|
case 'u': /* Set umask. */
|
|
{
|
|
long val = 0;
|
|
|
|
val = strtol (arg, &arg, 8);
|
|
if (*arg != '\0' || val < 0)
|
|
argp_error (state, "bad value for -u");
|
|
else
|
|
defumask = val;
|
|
break;
|
|
}
|
|
|
|
case OPT_NONRFC2577:
|
|
rfc2577 = 0;
|
|
break;
|
|
|
|
default:
|
|
return ARGP_ERR_UNKNOWN;
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
|
|
static struct argp argp = {
|
|
options,
|
|
parse_opt,
|
|
NULL,
|
|
doc,
|
|
NULL,
|
|
NULL,
|
|
NULL
|
|
};
|
|
|
|
int
|
|
main (int argc, char *argv[], char **envp)
|
|
{
|
|
int index;
|
|
|
|
set_program_name (argv[0]);
|
|
|
|
#ifdef HAVE_TZSET
|
|
tzset (); /* In case no timezone database in ~ftp. */
|
|
#endif
|
|
|
|
#ifdef HAVE_INITSETPROCTITLE
|
|
/* Save start and extent of argv for setproctitle. */
|
|
initsetproctitle (argc, argv, envp);
|
|
#else /* !HAVE_INITSETPROCTITLE */
|
|
(void) envp; /* Silence warnings. */
|
|
#endif
|
|
|
|
/* Parse the command line */
|
|
iu_argp_init ("ftpd", default_program_authors);
|
|
argp_parse (&argp, argc, argv, 0, &index, NULL);
|
|
|
|
/* Bail out, wrong usage */
|
|
if (argc - index != 0)
|
|
error (EXIT_FAILURE, 0,
|
|
"surplus arguments; try `%s --help' for more info", program_name);
|
|
|
|
/* LOG_NDELAY sets up the logging connection immediately,
|
|
necessary for anonymous ftp's that chroot and can't do it later. */
|
|
openlog ("ftpd", LOG_PID | LOG_NDELAY, LOG_FTP);
|
|
freopen (PATH_DEVNULL, "w", stderr);
|
|
|
|
/* If not running via inetd, we detach and dup(fd, 0), dup(fd, 1) the
|
|
fd = accept(). tcpd is check if compile with the support */
|
|
if (daemon_mode)
|
|
{
|
|
#ifndef HAVE_FORK
|
|
/* Shift out the daemon option in subforks */
|
|
int i;
|
|
for (i = 0; i < argc; ++i)
|
|
if (strcmp (argv[i], "-D") == 0)
|
|
{
|
|
int j;
|
|
for (j = i; j < argc; ++j)
|
|
argv[j] = argv[j + 1];
|
|
argv[--argc] = NULL;
|
|
}
|
|
#endif
|
|
his_addrlen = sizeof (his_addr);
|
|
if (server_mode (pid_file, (struct sockaddr *) &his_addr,
|
|
&his_addrlen, argv) < 0)
|
|
exit (EXIT_FAILURE);
|
|
}
|
|
else
|
|
{
|
|
his_addrlen = sizeof (his_addr);
|
|
if (getpeername (STDIN_FILENO, (struct sockaddr *) &his_addr,
|
|
&his_addrlen) < 0)
|
|
{
|
|
syslog (LOG_ERR, "getpeername (%s): %m", program_name);
|
|
exit (EXIT_FAILURE);
|
|
}
|
|
}
|
|
|
|
signal (SIGHUP, sigquit);
|
|
signal (SIGINT, sigquit);
|
|
signal (SIGQUIT, sigquit);
|
|
signal (SIGTERM, sigquit);
|
|
signal (SIGPIPE, lostconn);
|
|
signal (SIGCHLD, SIG_IGN);
|
|
if (signal (SIGURG, myoob) == SIG_ERR)
|
|
syslog (LOG_ERR, "signal: %m");
|
|
|
|
/* Get info on the ctrl connection. */
|
|
{
|
|
ctrl_addrlen = sizeof (ctrl_addr);
|
|
if (getsockname (STDIN_FILENO, (struct sockaddr *) &ctrl_addr,
|
|
&ctrl_addrlen) < 0)
|
|
{
|
|
syslog (LOG_ERR, "getsockname (%s): %m", program_name);
|
|
exit (EXIT_FAILURE);
|
|
}
|
|
}
|
|
|
|
#if defined IP_TOS && defined IPTOS_LOWDELAY && defined IPPROTO_IP
|
|
/* To minimize delays for interactive traffic. */
|
|
if (ctrl_addr.ss_family == AF_INET)
|
|
{
|
|
int tos = IPTOS_LOWDELAY;
|
|
if (setsockopt (STDIN_FILENO, IPPROTO_IP, IP_TOS,
|
|
(char *) &tos, sizeof (int)) < 0)
|
|
syslog (LOG_WARNING, "setsockopt (IP_TOS): %m");
|
|
}
|
|
#endif
|
|
|
|
#ifdef SO_OOBINLINE
|
|
/* Try to handle urgent data inline. */
|
|
{
|
|
int on = 1;
|
|
if (setsockopt (STDIN_FILENO, SOL_SOCKET, SO_OOBINLINE,
|
|
(char *) &on, sizeof (on)) < 0)
|
|
syslog (LOG_ERR, "setsockopt: %m");
|
|
}
|
|
#endif
|
|
|
|
#ifdef SO_KEEPALIVE
|
|
/* Set keepalives on the socket to detect dropped connections. */
|
|
{
|
|
int keepalive = 1;
|
|
if (setsockopt (STDIN_FILENO, SOL_SOCKET, SO_KEEPALIVE,
|
|
(char *) &keepalive, sizeof (keepalive)) < 0)
|
|
syslog (LOG_WARNING, "setsockopt (SO_KEEPALIVE): %m");
|
|
}
|
|
#endif
|
|
|
|
#ifdef F_SETOWN
|
|
if (fcntl (STDIN_FILENO, F_SETOWN, getpid ()) == -1)
|
|
syslog (LOG_ERR, "fcntl F_SETOWN: %m");
|
|
#endif
|
|
|
|
dolog ((struct sockaddr *) &his_addr, his_addrlen, &cred);
|
|
|
|
/* Deal with login disable. */
|
|
if (display_file (PATH_NOLOGIN, 530) == 0)
|
|
{
|
|
reply (530, "System not available.");
|
|
exit (EXIT_SUCCESS);
|
|
}
|
|
|
|
hostname = localhost ();
|
|
if (!hostname)
|
|
perror_reply (550, "Local resource failure: malloc");
|
|
|
|
/* Display a Welcome message if it exists.
|
|
N.B. a reply(220,) must follow as continuation. */
|
|
display_file (PATH_FTPWELCOME, 220);
|
|
|
|
/* Tell them we're ready to roll. */
|
|
if (!no_version)
|
|
reply (220, "%s FTP server (%s %s) ready.",
|
|
hostname, PACKAGE_NAME, PACKAGE_VERSION);
|
|
else
|
|
reply (220, "%s FTP server ready.", hostname);
|
|
|
|
/* Set the jump, if we have an error parsing,
|
|
come here and start fresh. */
|
|
setjmp (errcatch);
|
|
|
|
/* Roll. */
|
|
for (;;)
|
|
yyparse ();
|
|
}
|
|
|
|
static char *
|
|
curdir (void)
|
|
{
|
|
static char *path = 0;
|
|
|
|
free (path);
|
|
path = xgetcwd ();
|
|
if (!path)
|
|
return (char *) "";
|
|
if (path[1] != '\0') /* special case for root dir. */
|
|
{
|
|
char *tmp = realloc (path, strlen (path) + 2); /* '/' + '\0' */
|
|
if (!tmp)
|
|
{
|
|
free (path);
|
|
return (char *) "";
|
|
}
|
|
strcat (tmp, "/");
|
|
path = tmp;
|
|
}
|
|
/* For guest account, skip / since it's chrooted */
|
|
return (cred.guest ? path + 1 : path);
|
|
}
|
|
|
|
static void
|
|
sigquit (int signo)
|
|
{
|
|
syslog (LOG_ERR, "got signal %s", strsignal (signo));
|
|
dologout (-1);
|
|
}
|
|
|
|
|
|
static void
|
|
lostconn (int signo MAYBE_UNUSED)
|
|
{
|
|
if (debug)
|
|
syslog (LOG_DEBUG, "lost connection");
|
|
dologout (-1);
|
|
}
|
|
|
|
/* Helper function. */
|
|
char *
|
|
sgetsave (const char *s)
|
|
{
|
|
char *string;
|
|
size_t len;
|
|
|
|
if (s == NULL)
|
|
s = "";
|
|
|
|
len = strlen (s) + 1;
|
|
string = malloc (len);
|
|
if (string == NULL)
|
|
{
|
|
perror_reply (421, "Local resource failure: malloc");
|
|
dologout (1);
|
|
}
|
|
/* (void) strcpy (string, s); */
|
|
memcpy (string, s, len);
|
|
return string;
|
|
}
|
|
|
|
static void
|
|
complete_login (struct credentials *pcred)
|
|
{
|
|
char *cwd;
|
|
|
|
if (setegid ((gid_t) pcred->gid) < 0)
|
|
{
|
|
reply (550, "Can't set gid.");
|
|
goto bad;
|
|
}
|
|
|
|
#ifdef HAVE_INITGROUPS
|
|
initgroups (pcred->name, pcred->gid);
|
|
#endif
|
|
|
|
/* open wtmp before chroot */
|
|
snprintf (ttyline, sizeof (ttyline), "ftp%d", (int) getpid ());
|
|
logwtmp_keep_open (ttyline, pcred->name, pcred->remotehost);
|
|
|
|
if (pcred->guest)
|
|
{
|
|
/* We MUST do a chdir () after the chroot. Otherwise
|
|
the old current directory will be accessible as "."
|
|
outside the new root! */
|
|
if (chroot (pcred->rootdir) < 0 || chdir (pcred->homedir) < 0)
|
|
{
|
|
reply (550, "Can't set guest privileges.");
|
|
goto bad;
|
|
}
|
|
}
|
|
else if (pcred->dochroot)
|
|
{
|
|
if (chroot (pcred->rootdir) < 0 || chdir (pcred->homedir) < 0)
|
|
{
|
|
reply (550, "Can't change root.");
|
|
goto bad;
|
|
}
|
|
}
|
|
|
|
if (seteuid ((uid_t) pcred->uid) < 0)
|
|
{
|
|
reply (550, "Can't set uid.");
|
|
goto bad;
|
|
}
|
|
|
|
if (!pcred->guest && !pcred->dochroot) /* Remaining case. */
|
|
{
|
|
if (chdir (pcred->rootdir) < 0)
|
|
{
|
|
if (chdir ("/") < 0)
|
|
{
|
|
reply (530, "User %s: can't change directory to %s.",
|
|
pcred->name, pcred->homedir);
|
|
goto bad;
|
|
}
|
|
|
|
lreply (230, "No directory! Logging in with home=/");
|
|
}
|
|
}
|
|
|
|
cwd = xgetcwd ();
|
|
if (cwd)
|
|
{
|
|
setenv ("HOME", cwd, 1);
|
|
free (cwd);
|
|
}
|
|
|
|
/* Display a login message, if it exists.
|
|
N.B. a reply(230,) must follow after this message. */
|
|
display_file (PATH_FTPLOGINMESG, 230);
|
|
|
|
if (pcred->guest)
|
|
{
|
|
reply (230, "Guest login ok, access restrictions apply.");
|
|
#ifdef HAVE_SETPROCTITLE
|
|
snprintf (proctitle, sizeof (proctitle), "%s: anonymous",
|
|
pcred->remotehost);
|
|
setproctitle ("%s", proctitle);
|
|
#endif /* HAVE_SETPROCTITLE */
|
|
if (logging)
|
|
syslog (LOG_INFO, "ANONYMOUS FTP LOGIN FROM %s", pcred->remotehost);
|
|
}
|
|
else
|
|
{
|
|
reply (230, "User %s logged in.", pcred->name);
|
|
#ifdef HAVE_SETPROCTITLE
|
|
snprintf (proctitle, sizeof (proctitle),
|
|
"%s: %s", pcred->remotehost, pcred->name);
|
|
setproctitle ("%s", proctitle);
|
|
#endif /* HAVE_SETPROCTITLE */
|
|
if (logging)
|
|
syslog (LOG_INFO, "FTP LOGIN FROM %s as %s",
|
|
pcred->remotehost, pcred->name);
|
|
}
|
|
umask (defumask);
|
|
return;
|
|
bad:
|
|
/* Forget all about it... */
|
|
end_login (pcred); /* Resets pcred->logged_in. */
|
|
}
|
|
|
|
/* USER command.
|
|
Sets global passwd pointer pw if named account exists and is acceptable;
|
|
sets askpasswd if a PASS command is expected. If logged in previously,
|
|
need to reset state. */
|
|
void
|
|
user (const char *name)
|
|
{
|
|
int ret;
|
|
|
|
if (cred.logged_in)
|
|
{
|
|
if (cred.guest || cred.dochroot)
|
|
{
|
|
reply (530, "Can't change user from guest login.");
|
|
return;
|
|
}
|
|
end_login (&cred);
|
|
}
|
|
|
|
/* Non zero means failed. */
|
|
ret = auth_user (name, &cred);
|
|
if (!rfc2577 && ret != 0)
|
|
{
|
|
/* If they gave us a reason. */
|
|
if (cred.message)
|
|
{
|
|
reply (530, "%s", cred.message);
|
|
free (cred.message);
|
|
cred.message = NULL;
|
|
}
|
|
else
|
|
reply (530, "User %s access denied.", name);
|
|
if (logging)
|
|
syslog (LOG_NOTICE, "FTP LOGIN REFUSED FROM %s, %s",
|
|
cred.remotehost, name);
|
|
return;
|
|
}
|
|
else if (rfc2577 && ret != 0)
|
|
cred.delayed_reject = 1;
|
|
else
|
|
cred.delayed_reject = 0;
|
|
|
|
/* Only messages for anonymous guests are accepted. */
|
|
if (rfc2577 && !cred.guest && cred.message)
|
|
{
|
|
free (cred.message);
|
|
cred.message = NULL;
|
|
}
|
|
|
|
/* If the server is set to serve anonymous service only
|
|
the request have to come from a guest or a chrooted. */
|
|
if (anon_only && !cred.guest && !cred.dochroot)
|
|
{
|
|
reply (530, "Sorry, only anonymous ftp allowed");
|
|
return;
|
|
}
|
|
|
|
if (logging)
|
|
{
|
|
strncpy (curname, name, sizeof (curname) - 1);
|
|
curname[sizeof (curname) - 1] = '\0'; /* Make sure null terminated. */
|
|
}
|
|
|
|
if (cred.message)
|
|
{
|
|
/* Stacked PAM modules for authentication may have
|
|
* produced a multiline message at this point.
|
|
* The FTP protocol does not cope well with this,
|
|
* so we transfer only the very last line, which
|
|
* should reflect the active authentication mechanism.
|
|
*/
|
|
char *msg = strrchr (cred.message, '\n');
|
|
|
|
if (msg)
|
|
msg++; /* Step over separator. */
|
|
else
|
|
msg = cred.message;
|
|
|
|
reply (331, "%s", msg);
|
|
free (cred.message);
|
|
cred.message = NULL;
|
|
}
|
|
else
|
|
reply (331, "Password required for %s.", name);
|
|
|
|
askpasswd = 1;
|
|
|
|
/* Delay before reading passwd after first failed
|
|
attempt to slow down passwd-guessing programs. */
|
|
if (login_attempts)
|
|
sleep ((unsigned) login_attempts);
|
|
}
|
|
|
|
/* Terminate login as previous user, if any, resetting state;
|
|
used when USER command is given or login fails. */
|
|
static void
|
|
end_login (struct credentials *pcred)
|
|
{
|
|
char *remotehost = pcred->remotehost;
|
|
int atype = pcred->auth_type;
|
|
|
|
if (seteuid ((uid_t) 0) == -1)
|
|
_exit (EXIT_FAILURE);
|
|
|
|
if (pcred->logged_in)
|
|
{
|
|
logwtmp_keep_open (ttyline, "", "");
|
|
#ifdef WITH_PAM
|
|
pam_end_login (pcred);
|
|
#endif
|
|
}
|
|
|
|
free (pcred->name);
|
|
if (pcred->passwd)
|
|
{
|
|
memset (pcred->passwd, 0, strlen (pcred->passwd));
|
|
free (pcred->passwd);
|
|
}
|
|
free (pcred->homedir);
|
|
free (pcred->rootdir);
|
|
free (pcred->shell);
|
|
if (pcred->pass) /* Properly erase old password. */
|
|
{
|
|
memset (pcred->pass, 0, strlen (pcred->pass));
|
|
free (pcred->pass);
|
|
}
|
|
free (pcred->message);
|
|
memset (pcred, 0, sizeof (*pcred));
|
|
pcred->remotehost = remotehost;
|
|
pcred->auth_type = atype;
|
|
pcred->logged_in = 0;
|
|
pcred->delayed_reject = 0;
|
|
}
|
|
|
|
void
|
|
pass (const char *passwd)
|
|
{
|
|
if (cred.logged_in || askpasswd == 0)
|
|
{
|
|
reply (503, "Login with USER first.");
|
|
return;
|
|
}
|
|
askpasswd = 0;
|
|
|
|
if (!cred.guest) /* "ftp" is the only account allowed no password. */
|
|
{
|
|
/* Try to authenticate the user. Failed if != 0. */
|
|
if (auth_pass (passwd, &cred) != 0 || cred.delayed_reject)
|
|
{
|
|
/* Any particular reason? */
|
|
if (rfc2577)
|
|
{
|
|
if (cred.message)
|
|
{
|
|
free (cred.message);
|
|
cred.message = NULL;
|
|
}
|
|
reply (530, "Login incorrect.");
|
|
}
|
|
else if (cred.message)
|
|
{
|
|
reply (530, "%s", cred.message);
|
|
free (cred.message);
|
|
cred.message = NULL;
|
|
}
|
|
else if (cred.expired & AUTH_EXPIRED_ACCT)
|
|
reply (530, "Account is expired.");
|
|
else if (cred.expired & AUTH_EXPIRED_PASS)
|
|
reply (530, "Password has expired.");
|
|
else
|
|
reply (530, "Login incorrect.");
|
|
|
|
if (logging)
|
|
syslog (LOG_NOTICE, "FTP LOGIN FAILED FROM %s, %s",
|
|
cred.remotehost, curname);
|
|
if (login_attempts++ >= 5)
|
|
{
|
|
syslog (LOG_NOTICE, "repeated login failures from %s",
|
|
cred.remotehost);
|
|
reply (421,
|
|
"Service not available, closing control connection.");
|
|
exit (EXIT_SUCCESS);
|
|
}
|
|
return;
|
|
}
|
|
if (cred.message)
|
|
{
|
|
/* At least PAM might have committed additional messages.
|
|
* Reply code 230 is used, since at this point the client
|
|
* has been accepted. */
|
|
lreply_multiline (230, cred.message);
|
|
free (cred.message);
|
|
cred.message = NULL;
|
|
}
|
|
}
|
|
cred.logged_in = 1; /* Everything seems to be all right. */
|
|
complete_login (&cred);
|
|
if (cred.logged_in)
|
|
login_attempts = 0; /* This time successful. */
|
|
else
|
|
++login_attempts;
|
|
}
|
|
|
|
void
|
|
retrieve (const char *cmd, const char *name)
|
|
{
|
|
FILE *fin, *dout;
|
|
struct stat st;
|
|
int (*closefunc) (FILE *);
|
|
size_t buffer_size = BUFSIZ; /* Dynamic buffer. */
|
|
|
|
if (cmd == 0)
|
|
{
|
|
fin = fopen (name, "r"), closefunc = fclose;
|
|
st.st_size = 0;
|
|
}
|
|
else
|
|
{
|
|
char line[BUFSIZ];
|
|
|
|
snprintf (line, sizeof line, cmd, name);
|
|
name = line;
|
|
fin = ftpd_popen (line, "r"), closefunc = ftpd_pclose;
|
|
st.st_size = -1;
|
|
}
|
|
|
|
if (fin == NULL)
|
|
{
|
|
if (errno != 0)
|
|
{
|
|
perror_reply (550, name);
|
|
if (cmd == 0)
|
|
{
|
|
LOGCMD ("get", name);
|
|
}
|
|
}
|
|
return;
|
|
}
|
|
byte_count = -1;
|
|
if (cmd == 0 && (fstat (fileno (fin), &st) < 0 || !S_ISREG (st.st_mode)))
|
|
{
|
|
reply (550, "%s: not a plain file.", name);
|
|
goto done;
|
|
}
|
|
else if (cmd == 0)
|
|
buffer_size = st.st_blksize; /* Depends on file system. */
|
|
|
|
if (restart_point)
|
|
{
|
|
if (type == TYPE_A)
|
|
{
|
|
off_t i, n;
|
|
int c;
|
|
|
|
n = restart_point;
|
|
i = 0;
|
|
while (i++ < n)
|
|
{
|
|
c = getc (fin);
|
|
if (c == EOF)
|
|
{
|
|
/* Error code 554 was introduced in RFC 1123. */
|
|
reply (554,
|
|
"Action not taken: invalid REST value %jd for %s.",
|
|
restart_point, name);
|
|
goto done;
|
|
}
|
|
if (c == '\n')
|
|
i++;
|
|
}
|
|
}
|
|
else if (lseek (fileno (fin), restart_point, SEEK_SET) < 0)
|
|
{
|
|
if (errno == EINVAL)
|
|
reply (554, "Action not taken: invalid REST value %jd for %s.",
|
|
restart_point, name);
|
|
else
|
|
perror_reply (550, name);
|
|
goto done;
|
|
}
|
|
}
|
|
dout = dataconn (name, st.st_size, "w");
|
|
if (dout == NULL)
|
|
goto done;
|
|
send_data (fin, dout, buffer_size);
|
|
fclose (dout);
|
|
data = -1;
|
|
pdata = -1;
|
|
done:
|
|
if (cmd == 0)
|
|
LOGBYTES ("get", name, byte_count);
|
|
(*closefunc) (fin);
|
|
}
|
|
|
|
void
|
|
store (const char *name, const char *mode, int unique)
|
|
{
|
|
FILE *fout, *din;
|
|
struct stat st;
|
|
int (*closefunc) (FILE *);
|
|
|
|
if (unique && stat (name, &st) == 0)
|
|
{
|
|
const char *name_unique = gunique (name);
|
|
|
|
if (name_unique)
|
|
name = name_unique;
|
|
else
|
|
{
|
|
LOGCMD (*mode == 'w' ? "put" : "append", name);
|
|
return;
|
|
}
|
|
}
|
|
|
|
if (restart_point)
|
|
mode = "r+";
|
|
fout = fopen (name, mode);
|
|
closefunc = fclose;
|
|
if (fout == NULL || fstat (fileno (fout), &st) < 0)
|
|
{
|
|
perror_reply (553, name);
|
|
LOGCMD (*mode == 'w' ? "put" : "append", name);
|
|
return;
|
|
}
|
|
byte_count = -1;
|
|
if (restart_point)
|
|
{
|
|
if (type == TYPE_A)
|
|
{
|
|
off_t i, n;
|
|
int c;
|
|
|
|
n = restart_point;
|
|
i = 0;
|
|
while (i++ < n)
|
|
{
|
|
c = getc (fout);
|
|
if (c == EOF)
|
|
{
|
|
/* Error code 554 was introduced in RFC 1123. */
|
|
reply (554,
|
|
"Action not taken: invalid REST value %jd for %s.",
|
|
restart_point, name);
|
|
goto done;
|
|
}
|
|
if (c == '\n')
|
|
i++;
|
|
}
|
|
/* We must do this seek to "current" position
|
|
because we are changing from reading to
|
|
writing. */
|
|
if (fseeko (fout, 0L, SEEK_CUR) < 0)
|
|
{
|
|
perror_reply (550, name);
|
|
goto done;
|
|
}
|
|
}
|
|
else if (lseek (fileno (fout), restart_point, SEEK_SET) < 0)
|
|
{
|
|
if (errno == EINVAL)
|
|
reply (554, "Action not taken: invalid REST value %jd for %s.",
|
|
restart_point, name);
|
|
else
|
|
perror_reply (550, name);
|
|
goto done;
|
|
}
|
|
}
|
|
din = dataconn (name, (off_t) - 1, "r");
|
|
if (din == NULL)
|
|
goto done;
|
|
if (receive_data (din, fout, st.st_blksize) == 0)
|
|
{
|
|
if (unique)
|
|
reply (226, "Transfer complete (unique file name:%s).", name);
|
|
else
|
|
reply (226, "Transfer complete.");
|
|
}
|
|
fclose (din);
|
|
data = -1;
|
|
pdata = -1;
|
|
done:
|
|
LOGBYTES (*mode == 'w' ? "put" : "append", name, byte_count);
|
|
(*closefunc) (fout);
|
|
}
|
|
|
|
static FILE *
|
|
getdatasock (const char *mode)
|
|
{
|
|
int s, t, tries;
|
|
|
|
if (data >= 0)
|
|
return fdopen (data, mode);
|
|
if (seteuid ((uid_t) 0) == -1)
|
|
_exit (EXIT_FAILURE);
|
|
s = socket (ctrl_addr.ss_family, SOCK_STREAM, 0);
|
|
if (s < 0)
|
|
goto bad;
|
|
|
|
/* Enables local reuse address. */
|
|
{
|
|
int on = 1;
|
|
if (setsockopt (s, SOL_SOCKET, SO_REUSEADDR,
|
|
(char *) &on, sizeof (on)) < 0)
|
|
goto bad;
|
|
}
|
|
|
|
/* Anchor socket to avoid multi-homing problems. */
|
|
memcpy (&data_source, &ctrl_addr, sizeof (data_source));
|
|
data_source_len = ctrl_addrlen;
|
|
|
|
/* Erase port number, suggesting bind() to allocate a new port. */
|
|
switch (data_source.ss_family)
|
|
{
|
|
case AF_INET6:
|
|
((struct sockaddr_in6 *) &data_source)->sin6_port = 0;
|
|
break;
|
|
case AF_INET:
|
|
((struct sockaddr_in *) &data_source)->sin_port = 0;
|
|
break;
|
|
default:
|
|
break; /* Do nothing; should not happen! */
|
|
}
|
|
|
|
for (tries = 1;; tries++)
|
|
{
|
|
if (bind (s, (struct sockaddr *) &data_source, data_source_len) >= 0)
|
|
break;
|
|
if (errno != EADDRINUSE || tries > 10)
|
|
goto bad;
|
|
sleep (tries);
|
|
}
|
|
if (seteuid ((uid_t) cred.uid) != 0)
|
|
_exit (EXIT_FAILURE);
|
|
|
|
#if defined IP_TOS && defined IPTOS_THROUGHPUT && defined IPPROTO_IP
|
|
if (ctrl_addr.ss_family == AF_INET)
|
|
{
|
|
int on = IPTOS_THROUGHPUT;
|
|
if (setsockopt (s, IPPROTO_IP, IP_TOS, (char *) &on, sizeof (int)) < 0)
|
|
syslog (LOG_WARNING, "setsockopt (IP_TOS): %m");
|
|
}
|
|
#endif
|
|
|
|
return (fdopen (s, mode));
|
|
bad:
|
|
/* Return the real value of errno (close may change it) */
|
|
t = errno;
|
|
if (seteuid ((uid_t) cred.uid) != 0)
|
|
_exit (EXIT_FAILURE);
|
|
close (s);
|
|
errno = t;
|
|
return NULL;
|
|
}
|
|
|
|
static FILE *
|
|
dataconn (const char *name, off_t size, const char *mode)
|
|
{
|
|
char sizebuf[32];
|
|
FILE *file;
|
|
int retry = 0;
|
|
|
|
file_size = size;
|
|
byte_count = 0;
|
|
if (size != (off_t) - 1)
|
|
snprintf (sizebuf, sizeof (sizebuf), " (%s bytes)", off_to_str (size));
|
|
else
|
|
*sizebuf = '\0';
|
|
if (pdata >= 0)
|
|
{
|
|
struct sockaddr_storage from;
|
|
int s;
|
|
socklen_t fromlen = sizeof (from);
|
|
|
|
signal (SIGALRM, toolong);
|
|
alarm ((unsigned) timeout);
|
|
s = accept (pdata, (struct sockaddr *) &from, &fromlen);
|
|
alarm (0);
|
|
if (s < 0)
|
|
{
|
|
reply (425, "Can't open data connection.");
|
|
close (pdata);
|
|
pdata = -1;
|
|
return NULL;
|
|
}
|
|
close (pdata);
|
|
pdata = s;
|
|
#if defined IP_TOS && defined IPTOS_THROUGHPUT && defined IPPROTO_IP
|
|
/* Optimize throughput. */
|
|
if (from.ss_family == AF_INET)
|
|
{
|
|
int tos = IPTOS_THROUGHPUT;
|
|
setsockopt (s, IPPROTO_IP, IP_TOS, (char *) &tos, sizeof (int));
|
|
}
|
|
#endif
|
|
#ifdef SO_KEEPALIVE
|
|
/* Set keepalives on the socket to detect dropped conns. */
|
|
{
|
|
int keepalive = 1;
|
|
setsockopt (s, SOL_SOCKET, SO_KEEPALIVE,
|
|
(char *) &keepalive, sizeof (int));
|
|
}
|
|
#endif
|
|
reply (150, "Opening %s mode data connection for '%s'%s.",
|
|
type == TYPE_A ? "ASCII" : "BINARY", name, sizebuf);
|
|
return fdopen (pdata, mode);
|
|
}
|
|
if (data >= 0)
|
|
{
|
|
reply (125, "Using existing data connection for '%s'%s.",
|
|
name, sizebuf);
|
|
usedefault = 1;
|
|
return fdopen (data, mode);
|
|
}
|
|
if (usedefault)
|
|
{
|
|
memcpy (&data_dest, &his_addr, sizeof (data_dest));
|
|
data_dest_len = his_addrlen;
|
|
}
|
|
usedefault = 1;
|
|
file = getdatasock (mode);
|
|
if (file == NULL)
|
|
{
|
|
int oerrno = errno;
|
|
(void) getnameinfo ((struct sockaddr *) &data_source, data_source_len,
|
|
addrstr, sizeof (addrstr),
|
|
portstr, sizeof (portstr), NI_NUMERICSERV);
|
|
reply (425, "Can't create data socket (%s,%s): %s.",
|
|
addrstr, portstr, strerror (oerrno));
|
|
return NULL;
|
|
}
|
|
data = fileno (file);
|
|
while (connect (data, (struct sockaddr *) &data_dest, data_dest_len) < 0)
|
|
{
|
|
if (errno == EADDRINUSE && retry < swaitmax)
|
|
{
|
|
sleep ((unsigned) swaitint);
|
|
retry += swaitint;
|
|
continue;
|
|
}
|
|
perror_reply (425, "Can't build data connection");
|
|
fclose (file);
|
|
data = -1;
|
|
return NULL;
|
|
}
|
|
reply (150, "Opening %s mode data connection for '%s'%s.",
|
|
type == TYPE_A ? "ASCII" : "BINARY", name, sizebuf);
|
|
return file;
|
|
}
|
|
|
|
#define IU_MMAP_SIZE 0x800000 /* 8 MByte */
|
|
|
|
/* Transfer the contents of "instr" to "outstr" peer using the appropriate
|
|
encapsulation of the data subject * to Mode, Structure, and Type.
|
|
|
|
NB: Form isn't handled. */
|
|
static void
|
|
send_data (FILE *instr, FILE *outstr, off_t blksize)
|
|
{
|
|
int c, cnt, filefd, netfd;
|
|
char *buf = MAP_FAILED, *bp;
|
|
off_t curpos;
|
|
off_t len, filesize;
|
|
|
|
transflag++;
|
|
if (setjmp (urgcatch))
|
|
{
|
|
transflag = 0;
|
|
return;
|
|
}
|
|
|
|
netfd = fileno (outstr);
|
|
filefd = fileno (instr);
|
|
#ifdef HAVE_MMAP
|
|
/* Last argument in mmap() must be page aligned,
|
|
* at least for Solaris and Linux, so use mmap()
|
|
* only with null offset retrievals.
|
|
*/
|
|
if (file_size > 0 && file_size < IU_MMAP_SIZE && restart_point == 0)
|
|
{
|
|
curpos = lseek (filefd, 0, SEEK_CUR);
|
|
if (debug)
|
|
syslog (LOG_DEBUG, "Position is %jd. Attempting mmap call.", curpos);
|
|
if (curpos >= 0)
|
|
{
|
|
filesize = file_size - curpos;
|
|
buf = mmap (0, filesize, PROT_READ, MAP_SHARED, filefd, curpos);
|
|
}
|
|
}
|
|
#endif
|
|
|
|
switch (type)
|
|
{
|
|
|
|
case TYPE_A:
|
|
#ifdef HAVE_MMAP
|
|
if (file_size > 0 && curpos >= 0 && buf != MAP_FAILED)
|
|
{
|
|
if (debug)
|
|
syslog (LOG_DEBUG, "Reading file as ascii in mmap mode.");
|
|
len = 0;
|
|
while (len < filesize)
|
|
{
|
|
byte_count++;
|
|
if (buf[len] == '\n')
|
|
{
|
|
if (ferror (outstr))
|
|
break;
|
|
putc ('\r', outstr);
|
|
}
|
|
putc (buf[len], outstr);
|
|
len++;
|
|
}
|
|
fflush (outstr);
|
|
transflag = 0;
|
|
munmap (buf, filesize);
|
|
if (ferror (outstr))
|
|
goto data_err;
|
|
reply (226, "Transfer complete.");
|
|
return;
|
|
}
|
|
#endif
|
|
if (debug)
|
|
syslog (LOG_DEBUG, "Reading file as ascii in byte mode.");
|
|
while ((c = getc (instr)) != EOF)
|
|
{
|
|
byte_count++;
|
|
if (c == '\n')
|
|
{
|
|
if (ferror (outstr))
|
|
goto data_err;
|
|
putc ('\r', outstr);
|
|
}
|
|
putc (c, outstr);
|
|
}
|
|
fflush (outstr);
|
|
transflag = 0;
|
|
if (ferror (instr))
|
|
goto file_err;
|
|
if (ferror (outstr))
|
|
goto data_err;
|
|
reply (226, "Transfer complete.");
|
|
return;
|
|
|
|
case TYPE_I:
|
|
case TYPE_L:
|
|
#ifdef HAVE_MMAP
|
|
if (file_size > 0 && curpos >= 0 && buf != MAP_FAILED)
|
|
{
|
|
if (debug)
|
|
syslog (LOG_DEBUG, "Reading file as image in mmap mode.");
|
|
bp = buf;
|
|
len = filesize;
|
|
do
|
|
{
|
|
cnt = write (netfd, bp, len);
|
|
len -= cnt;
|
|
bp += cnt;
|
|
if (cnt > 0)
|
|
byte_count += cnt;
|
|
}
|
|
while (cnt > 0 && len > 0);
|
|
transflag = 0;
|
|
munmap (buf, (size_t) filesize);
|
|
if (cnt < 0)
|
|
goto data_err;
|
|
reply (226, "Transfer complete.");
|
|
return;
|
|
}
|
|
#endif
|
|
if (debug)
|
|
{
|
|
syslog (LOG_DEBUG, "Reading file as image in block mode.");
|
|
curpos = lseek (filefd, 0, SEEK_CUR);
|
|
if (curpos < 0)
|
|
syslog (LOG_DEBUG, "Input file: %m");
|
|
else
|
|
syslog (LOG_DEBUG, "Starting at position %jd.", curpos);
|
|
}
|
|
|
|
buf = malloc ((unsigned int) blksize);
|
|
if (buf == NULL)
|
|
{
|
|
transflag = 0;
|
|
perror_reply (451, "Local resource failure: malloc");
|
|
return;
|
|
}
|
|
while ((cnt = read (filefd, buf, (unsigned int) blksize)) > 0 &&
|
|
write (netfd, buf, cnt) == cnt)
|
|
byte_count += cnt;
|
|
|
|
transflag = 0;
|
|
free (buf);
|
|
if (cnt != 0)
|
|
{
|
|
if (cnt < 0)
|
|
goto file_err;
|
|
goto data_err;
|
|
}
|
|
reply (226, "Transfer complete.");
|
|
return;
|
|
default:
|
|
transflag = 0;
|
|
reply (550, "Unimplemented TYPE %d in send_data", type);
|
|
return;
|
|
}
|
|
|
|
data_err:
|
|
transflag = 0;
|
|
perror_reply (426, "Data connection");
|
|
return;
|
|
|
|
file_err:
|
|
transflag = 0;
|
|
perror_reply (551, "Error on input file");
|
|
}
|
|
|
|
/* Transfer data from peer to "outstr" using the appropriate encapulation of
|
|
the data subject to Mode, Structure, and Type.
|
|
|
|
N.B.: Form isn't handled. */
|
|
static int
|
|
receive_data (FILE *instr, FILE *outstr, off_t blksize)
|
|
{
|
|
int c;
|
|
int cnt, bare_lfs = 0;
|
|
char *buf;
|
|
|
|
transflag++;
|
|
if (setjmp (urgcatch))
|
|
{
|
|
transflag = 0;
|
|
return -1;
|
|
}
|
|
switch (type)
|
|
{
|
|
case TYPE_I:
|
|
case TYPE_L:
|
|
buf = malloc ((unsigned int) blksize);
|
|
if (buf == NULL)
|
|
{
|
|
transflag = 0;
|
|
perror_reply (451, "Local resource failure: malloc");
|
|
return -1;
|
|
}
|
|
|
|
while ((cnt = read (fileno (instr), buf, blksize)) > 0)
|
|
{
|
|
if (write (fileno (outstr), buf, cnt) != cnt)
|
|
{
|
|
free (buf);
|
|
goto file_err;
|
|
}
|
|
byte_count += cnt;
|
|
}
|
|
free (buf);
|
|
if (cnt < 0)
|
|
goto data_err;
|
|
transflag = 0;
|
|
return 0;
|
|
|
|
case TYPE_E:
|
|
reply (553, "TYPE E not implemented.");
|
|
transflag = 0;
|
|
return -1;
|
|
|
|
case TYPE_A:
|
|
while ((c = getc (instr)) != EOF)
|
|
{
|
|
byte_count++;
|
|
if (c == '\n')
|
|
bare_lfs++;
|
|
while (c == '\r')
|
|
{
|
|
if (ferror (outstr))
|
|
goto data_err;
|
|
c = getc (instr);
|
|
if (c != '\n')
|
|
{
|
|
putc ('\r', outstr);
|
|
if (c == '\0' || c == EOF)
|
|
goto contin2;
|
|
}
|
|
}
|
|
putc (c, outstr);
|
|
contin2:;
|
|
}
|
|
fflush (outstr);
|
|
if (ferror (instr))
|
|
goto data_err;
|
|
if (ferror (outstr))
|
|
goto file_err;
|
|
transflag = 0;
|
|
if (bare_lfs)
|
|
{
|
|
lreply (226, "WARNING! %d bare linefeeds received in ASCII mode",
|
|
bare_lfs);
|
|
printf (" File may not have transferred correctly.\r\n");
|
|
}
|
|
return (0);
|
|
default:
|
|
reply (550, "Unimplemented TYPE %d in receive_data", type);
|
|
transflag = 0;
|
|
return -1;
|
|
}
|
|
|
|
data_err:
|
|
transflag = 0;
|
|
perror_reply (426, "Data Connection");
|
|
return -1;
|
|
|
|
file_err:
|
|
transflag = 0;
|
|
perror_reply (452, "Error writing file");
|
|
return -1;
|
|
}
|
|
|
|
void
|
|
statfilecmd (const char *filename)
|
|
{
|
|
FILE *fin;
|
|
int c;
|
|
char line[LINE_MAX];
|
|
|
|
snprintf (line, sizeof (line), "/bin/ls -lgA %s", filename);
|
|
fin = ftpd_popen (line, "r");
|
|
lreply (211, "status of %s:", filename);
|
|
while ((c = getc (fin)) != EOF)
|
|
{
|
|
if (c == '\n')
|
|
{
|
|
if (ferror (stdout))
|
|
{
|
|
perror_reply (421, "control connection");
|
|
ftpd_pclose (fin);
|
|
dologout (1);
|
|
}
|
|
if (ferror (fin))
|
|
{
|
|
perror_reply (551, filename);
|
|
ftpd_pclose (fin);
|
|
return;
|
|
}
|
|
putc ('\r', stdout);
|
|
}
|
|
putc (c, stdout);
|
|
}
|
|
ftpd_pclose (fin);
|
|
reply (211, "End of Status");
|
|
}
|
|
|
|
void
|
|
statcmd (void)
|
|
{
|
|
struct sockaddr_storage *sin;
|
|
unsigned char *a, *p;
|
|
|
|
lreply (211, "%s FTP server status:", hostname);
|
|
if (!no_version)
|
|
printf (" ftpd (%s) %s\r\n", PACKAGE_NAME, PACKAGE_VERSION);
|
|
printf (" Connected to %s", cred.remotehost);
|
|
(void) getnameinfo ((struct sockaddr *) &his_addr, his_addrlen,
|
|
addrstr, sizeof (addrstr), NULL, 0, NI_NUMERICHOST);
|
|
if (!isdigit (cred.remotehost[0]))
|
|
printf (" (%s)", addrstr);
|
|
printf ("\r\n");
|
|
printf (" Session timeout is %d seconds\r\n", timeout);
|
|
if (cred.logged_in)
|
|
{
|
|
if (cred.guest)
|
|
printf (" Logged in anonymously\r\n");
|
|
else
|
|
printf (" Logged in as %s\r\n", cred.name);
|
|
}
|
|
else if (askpasswd)
|
|
printf (" Waiting for password\r\n");
|
|
else
|
|
printf (" Waiting for user name\r\n");
|
|
printf (" TYPE: %s", typenames[type]);
|
|
if (type == TYPE_A || type == TYPE_E)
|
|
printf (", FORM: %s", formnames[form]);
|
|
if (type == TYPE_L)
|
|
#ifdef CHAR_BIT
|
|
printf (" %d", CHAR_BIT);
|
|
#else
|
|
# if NBBY == 8
|
|
printf (" %d", NBBY);
|
|
# else
|
|
printf (" %d", bytesize); /* need definition! */
|
|
# endif
|
|
#endif
|
|
printf ("; STRUcture: %s; transfer MODE: %s\r\n",
|
|
strunames[stru], modenames[stru_mode]);
|
|
if (data != -1)
|
|
printf (" Data connection open\r\n");
|
|
else if (pdata != -1)
|
|
{
|
|
printf (" in Passive mode");
|
|
sin = &pasv_addr;
|
|
goto printaddr;
|
|
}
|
|
else if (usedefault == 0)
|
|
{
|
|
printf (" PORT");
|
|
sin = &data_dest;
|
|
printaddr:
|
|
a = (unsigned char *) &((struct sockaddr_in *) sin)->sin_addr;
|
|
p = (unsigned char *) &((struct sockaddr_in *) sin)->sin_port;
|
|
#define UC(b) (((int) b) & 0xff)
|
|
printf (" (%d,%d,%d,%d,%d,%d)\r\n", UC (a[0]),
|
|
UC (a[1]), UC (a[2]), UC (a[3]), UC (p[0]), UC (p[1]));
|
|
#undef UC
|
|
}
|
|
else
|
|
printf (" No data connection\r\n");
|
|
reply (211, "End of status");
|
|
}
|
|
|
|
void
|
|
fatal (const char *s)
|
|
{
|
|
reply (451, "Error in server: %s\n", s);
|
|
reply (221, "Closing connection due to server error.");
|
|
dologout (0);
|
|
}
|
|
|
|
void
|
|
reply (int n, const char *fmt, ...)
|
|
{
|
|
va_list ap;
|
|
va_start (ap, fmt);
|
|
printf ("%d ", n);
|
|
vprintf (fmt, ap);
|
|
va_end (ap);
|
|
printf ("\r\n");
|
|
fflush (stdout);
|
|
if (debug)
|
|
{
|
|
syslog (LOG_DEBUG, "<--- %d ", n);
|
|
va_start (ap, fmt);
|
|
vsyslog (LOG_DEBUG, fmt, ap);
|
|
va_end (ap);
|
|
}
|
|
}
|
|
|
|
void
|
|
lreply (int n, const char *fmt, ...)
|
|
{
|
|
va_list ap;
|
|
va_start (ap, fmt);
|
|
printf ("%d- ", n);
|
|
vprintf (fmt, ap);
|
|
va_end (ap);
|
|
printf ("\r\n");
|
|
fflush (stdout);
|
|
if (debug)
|
|
{
|
|
syslog (LOG_DEBUG, "<--- %d- ", n);
|
|
va_start (ap, fmt);
|
|
vsyslog (LOG_DEBUG, fmt, ap);
|
|
va_end (ap);
|
|
}
|
|
}
|
|
|
|
/* Send a possibly multiline reply as individual
|
|
* lines of message with identical status code.
|
|
* No format string input!
|
|
*/
|
|
void
|
|
lreply_multiline (int n, const char *text)
|
|
{
|
|
char *line;
|
|
|
|
line = strdup (text);
|
|
if (line == NULL)
|
|
return;
|
|
else
|
|
{
|
|
int stop = 0;
|
|
char *p1 = line, *p2;
|
|
|
|
do
|
|
{
|
|
p2 = strchrnul (p1, '\n');
|
|
stop = (*p2 == '\0'); /* End of input string? */
|
|
*p2 = '\0';
|
|
printf ("%d- ", n);
|
|
printf ("%s\r\n", p1);
|
|
if (debug)
|
|
{
|
|
syslog (LOG_DEBUG, "<--- %d- ", n);
|
|
syslog (LOG_DEBUG, "%s", p1);
|
|
}
|
|
p1 = ++p2; /* P1 is used within bounds. */
|
|
}
|
|
while (!stop);
|
|
free (line);
|
|
}
|
|
}
|
|
|
|
static void
|
|
ack (const char *s)
|
|
{
|
|
reply (250, "%s command successful.", s);
|
|
}
|
|
|
|
void
|
|
nack (const char *s)
|
|
{
|
|
reply (502, "%s command not implemented.", s);
|
|
}
|
|
|
|
void
|
|
delete (const char *name)
|
|
{
|
|
struct stat st;
|
|
|
|
LOGCMD ("delete", name);
|
|
if (stat (name, &st) < 0)
|
|
{
|
|
perror_reply (550, name);
|
|
return;
|
|
}
|
|
if (S_ISDIR (st.st_mode))
|
|
{
|
|
if (rmdir (name) < 0)
|
|
{
|
|
perror_reply (550, name);
|
|
return;
|
|
}
|
|
goto done;
|
|
}
|
|
if (unlink (name) < 0)
|
|
{
|
|
perror_reply (550, name);
|
|
return;
|
|
}
|
|
done:
|
|
ack ("DELE");
|
|
}
|
|
|
|
void
|
|
cwd (const char *path)
|
|
{
|
|
if (chdir (path) < 0)
|
|
perror_reply (550, path);
|
|
else
|
|
ack ("CWD");
|
|
}
|
|
|
|
void
|
|
makedir (const char *name)
|
|
{
|
|
LOGCMD ("mkdir", name);
|
|
if (mkdir (name, 0777) < 0)
|
|
perror_reply (550, name);
|
|
else if (name[0] == '/')
|
|
reply (257, "\"%s\" new directory created.", name);
|
|
else
|
|
{
|
|
/* We have to figure out what our current directory is so that we can
|
|
give an absolute name in the reply. */
|
|
char *current = xgetcwd ();
|
|
if (current)
|
|
{
|
|
if (current[1] == '\0')
|
|
current[0] = '\0';
|
|
reply (257, "\"%s/%s\" new directory created.", current, name);
|
|
free (current);
|
|
}
|
|
else
|
|
reply (257, "(unknown absolute name) new directory created.");
|
|
}
|
|
}
|
|
|
|
void
|
|
removedir (const char *name)
|
|
{
|
|
LOGCMD ("rmdir", name);
|
|
if (rmdir (name) < 0)
|
|
perror_reply (550, name);
|
|
else
|
|
ack ("RMD");
|
|
}
|
|
|
|
void
|
|
pwd (void)
|
|
{
|
|
char *path = xgetcwd ();
|
|
|
|
if (path)
|
|
{
|
|
reply (257, "\"%s\" is current directory.", path);
|
|
free (path);
|
|
}
|
|
else
|
|
reply (550, "%s.", strerror (errno));
|
|
}
|
|
|
|
char *
|
|
renamefrom (const char *name)
|
|
{
|
|
struct stat st;
|
|
|
|
if (stat (name, &st) < 0)
|
|
{
|
|
perror_reply (550, name);
|
|
return ((char *) 0);
|
|
}
|
|
reply (350, "File exists, ready for destination name");
|
|
return (char *) (name);
|
|
}
|
|
|
|
void
|
|
renamecmd (const char *from, const char *to)
|
|
{
|
|
LOGCMD2 ("rename", from, to);
|
|
if (rename (from, to) < 0)
|
|
perror_reply (550, "rename");
|
|
else
|
|
ack ("RNTO");
|
|
}
|
|
|
|
static void
|
|
dolog (struct sockaddr *sa, socklen_t salen, struct credentials *pcred)
|
|
{
|
|
(void) getnameinfo (sa, salen, addrstr, sizeof (addrstr), NULL, 0, 0);
|
|
|
|
free (pcred->remotehost);
|
|
pcred->remotehost = sgetsave (addrstr);
|
|
|
|
#ifdef HAVE_SETPROCTITLE
|
|
snprintf (proctitle, sizeof (proctitle), "%s: connected",
|
|
pcred->remotehost);
|
|
setproctitle ("%s", proctitle);
|
|
#endif /* HAVE_SETPROCTITLE */
|
|
|
|
if (logging)
|
|
syslog (LOG_INFO, "connection from %s", pcred->remotehost);
|
|
}
|
|
|
|
/* Record logout in wtmp file
|
|
and exit with supplied status. */
|
|
void
|
|
dologout (int status)
|
|
{
|
|
/* Race condition with SIGURG: If SIGURG is received
|
|
here, it will jump back has root in the main loop.
|
|
David Greenman:dg@root.com. */
|
|
transflag = 0;
|
|
end_login (&cred);
|
|
|
|
/* Beware of flushing buffers after a SIGPIPE. */
|
|
_exit (status);
|
|
}
|
|
|
|
static void
|
|
myoob (int signo MAYBE_UNUSED)
|
|
{
|
|
char *cp;
|
|
|
|
/* only process if transfer occurring */
|
|
if (!transflag)
|
|
return;
|
|
cp = tmpline;
|
|
if (telnet_fgets (cp, 7, stdin) == NULL)
|
|
{
|
|
reply (221, "You could at least say goodbye.");
|
|
dologout (0);
|
|
}
|
|
upper (cp);
|
|
if (strcmp (cp, "ABOR\r\n") == 0)
|
|
{
|
|
tmpline[0] = '\0';
|
|
reply (426, "Transfer aborted. Data connection closed.");
|
|
reply (226, "Abort successful");
|
|
longjmp (urgcatch, 1);
|
|
}
|
|
if (strcmp (cp, "STAT\r\n") == 0)
|
|
{
|
|
if (file_size != (off_t) - 1)
|
|
reply (213, "Status: %s of %s bytes transferred",
|
|
off_to_str (byte_count), off_to_str (file_size));
|
|
else
|
|
reply (213, "Status: %s bytes transferred", off_to_str (byte_count));
|
|
}
|
|
}
|
|
|
|
/* Note: a response of 425 is not mentioned as a possible response to
|
|
the PASV command in RFC959. However, it has been blessed as
|
|
a legitimate response by Jon Postel in a telephone conversation
|
|
with Rick Adams on 25 Jan 89. */
|
|
void
|
|
passive (int epsv, int af)
|
|
{
|
|
char *p, *a;
|
|
int try_af;
|
|
|
|
/* EPSV might ask for a particular address family. */
|
|
if (epsv == PASSIVE_EPSV && af > 0)
|
|
try_af = af;
|
|
else
|
|
try_af = ctrl_addr.ss_family;
|
|
|
|
pdata = socket (try_af, SOCK_STREAM, 0);
|
|
if (pdata < 0)
|
|
{
|
|
perror_reply (425, "Can't open passive connection");
|
|
return;
|
|
}
|
|
memcpy (&pasv_addr, &ctrl_addr, sizeof (pasv_addr));
|
|
pasv_addrlen = ctrl_addrlen;
|
|
|
|
/* Erase the port number. */
|
|
if (pasv_addr.ss_family == AF_INET6)
|
|
((struct sockaddr_in6 *) &pasv_addr)->sin6_port = 0;
|
|
else /* !AF_INET6 */
|
|
((struct sockaddr_in *) &pasv_addr)->sin_port = 0;
|
|
|
|
if (seteuid ((uid_t) 0) == -1)
|
|
_exit (EXIT_FAILURE);
|
|
if (bind (pdata, (struct sockaddr *) &pasv_addr, pasv_addrlen) < 0)
|
|
{
|
|
if (seteuid ((uid_t) cred.uid))
|
|
_exit (EXIT_FAILURE);
|
|
goto pasv_error;
|
|
}
|
|
if (seteuid ((uid_t) cred.uid))
|
|
_exit (EXIT_FAILURE);
|
|
pasv_addrlen = sizeof (pasv_addr);
|
|
if (getsockname (pdata, (struct sockaddr *) &pasv_addr, &pasv_addrlen) < 0)
|
|
goto pasv_error;
|
|
if (listen (pdata, 1) < 0)
|
|
goto pasv_error;
|
|
|
|
if (epsv == PASSIVE_EPSV)
|
|
{
|
|
/* EPSV for IPv4 and IPv6. */
|
|
reply (229, "Entering Extended Passive Mode (|||%u|)",
|
|
ntohs ((pasv_addr.ss_family == AF_INET)
|
|
? ((struct sockaddr_in *) &pasv_addr)->sin_port
|
|
: ((struct sockaddr_in6 *) &pasv_addr)->sin6_port));
|
|
return;
|
|
}
|
|
else /* !EPSV */
|
|
{
|
|
/* PASV for IPv4, or LPSV for IPv4 or IPv6.
|
|
*
|
|
* Some systems, like OpenSolaris, prefer to return
|
|
* an IPv4-mapped-IPv6 address, which must be processed
|
|
* for printout. */
|
|
|
|
#define UC(b) (((int) b) & 0xff)
|
|
|
|
if (pasv_addr.ss_family == AF_INET6
|
|
&&
|
|
IN6_IS_ADDR_V4MAPPED (&
|
|
((struct sockaddr_in6 *)
|
|
&pasv_addr)->sin6_addr))
|
|
{
|
|
a = (char *) &((struct sockaddr_in6 *) &pasv_addr)->sin6_addr;
|
|
a += 3 * sizeof (struct in_addr); /* Skip padding up to IPv4 content. */
|
|
p = (char *) &((struct sockaddr_in6 *) &pasv_addr)->sin6_port;
|
|
}
|
|
else if (pasv_addr.ss_family == AF_INET6)
|
|
{
|
|
/* LPSV for IPv6, not mapped. */
|
|
a = (char *) &((struct sockaddr_in6 *) &pasv_addr)->sin6_addr;
|
|
p = (char *) &((struct sockaddr_in6 *) &pasv_addr)->sin6_port;
|
|
|
|
reply (228, "Entering Long Passive Mode " "(6,16,%d,%d,%d,%d,%d,%d,%d,%d" /* a[0..7] */
|
|
",%d,%d,%d,%d,%d,%d,%d,%d" /* a[8..15] */
|
|
",2,%d,%d)", /* p0, p1 */
|
|
UC (a[0]), UC (a[1]), UC (a[2]), UC (a[3]),
|
|
UC (a[4]), UC (a[5]), UC (a[6]), UC (a[7]),
|
|
UC (a[8]), UC (a[9]), UC (a[10]), UC (a[11]),
|
|
UC (a[12]), UC (a[13]), UC (a[14]), UC (a[15]),
|
|
UC (p[0]), UC (p[1]));
|
|
return;
|
|
}
|
|
else
|
|
{
|
|
a = (char *) &((struct sockaddr_in *) &pasv_addr)->sin_addr;
|
|
p = (char *) &((struct sockaddr_in *) &pasv_addr)->sin_port;
|
|
}
|
|
|
|
if (epsv == PASSIVE_LPSV)
|
|
reply (228, "Entering Long Passive Mode "
|
|
"(4,4,%d,%d,%d,%d,2,%d,%d)",
|
|
UC (a[0]), UC (a[1]), UC (a[2]), UC (a[3]),
|
|
UC (p[0]), UC (p[1]));
|
|
else
|
|
reply (227, "Entering Passive Mode (%d,%d,%d,%d,%d,%d)",
|
|
UC (a[0]), UC (a[1]), UC (a[2]), UC (a[3]),
|
|
UC (p[0]), UC (p[1]));
|
|
return;
|
|
}
|
|
|
|
pasv_error:
|
|
close (pdata);
|
|
pdata = -1;
|
|
perror_reply (425, "Can't open passive connection");
|
|
return;
|
|
}
|
|
|
|
/* Generate unique name for file with basename "local".
|
|
The file named "local" is already known to exist.
|
|
Generates failure reply on error. */
|
|
static char *
|
|
gunique (const char *local)
|
|
{
|
|
static char *string = 0;
|
|
struct stat st;
|
|
int count;
|
|
char *cp;
|
|
|
|
cp = strrchr (local, '/');
|
|
if (cp)
|
|
*cp = '\0';
|
|
if (stat (cp ? local : ".", &st) < 0)
|
|
{
|
|
perror_reply (553, cp ? local : ".");
|
|
return ((char *) 0);
|
|
}
|
|
if (cp)
|
|
*cp = '/';
|
|
|
|
free (string);
|
|
string = malloc (strlen (local) + 5); /* '.' + DIG + DIG + '\0' */
|
|
if (string)
|
|
{
|
|
strcpy (string, local);
|
|
cp = string + strlen (string);
|
|
*cp++ = '.';
|
|
for (count = 1; count < 100; count++)
|
|
{
|
|
sprintf (cp, "%d", count);
|
|
if (stat (string, &st) < 0)
|
|
return string;
|
|
}
|
|
}
|
|
|
|
reply (452, "Unique file name cannot be created.");
|
|
return NULL;
|
|
}
|
|
|
|
/*
|
|
* Format and send reply containing system error number.
|
|
*/
|
|
void
|
|
perror_reply (int code, const char *string)
|
|
{
|
|
reply (code, "%s: %s.", string, strerror (errno));
|
|
}
|
|
|
|
static char *onefile[] = {
|
|
"",
|
|
0
|
|
};
|
|
|
|
void
|
|
send_file_list (const char *whichf)
|
|
{
|
|
struct stat st;
|
|
DIR *dirp = NULL;
|
|
struct dirent *dir;
|
|
FILE *dout = NULL;
|
|
char **dirlist, *dirname;
|
|
int simple = 0;
|
|
int freeglob = 0;
|
|
glob_t gl;
|
|
char *p = NULL;
|
|
|
|
if (strpbrk (whichf, "~{[*?") != NULL)
|
|
{
|
|
int flags = GLOB_NOCHECK;
|
|
|
|
#ifdef GLOB_BRACE
|
|
flags |= GLOB_BRACE;
|
|
#endif
|
|
#ifdef GLOB_QUOTE
|
|
flags |= GLOB_QUOTE;
|
|
#endif
|
|
#ifdef GLOB_TILDE
|
|
flags |= GLOB_TILDE;
|
|
#endif
|
|
|
|
memset (&gl, 0, sizeof (gl));
|
|
freeglob = 1;
|
|
if (glob (whichf, flags, 0, &gl))
|
|
{
|
|
reply (550, "not found");
|
|
goto out;
|
|
}
|
|
else if (gl.gl_pathc == 0)
|
|
{
|
|
errno = ENOENT;
|
|
perror_reply (550, whichf);
|
|
goto out;
|
|
}
|
|
dirlist = gl.gl_pathv;
|
|
}
|
|
else
|
|
{
|
|
p = strdup (whichf);
|
|
onefile[0] = p;
|
|
dirlist = onefile;
|
|
simple = 1;
|
|
}
|
|
|
|
if (setjmp (urgcatch))
|
|
{
|
|
transflag = 0;
|
|
goto out;
|
|
}
|
|
while ((dirname = *dirlist++))
|
|
{
|
|
if (stat (dirname, &st) < 0)
|
|
{
|
|
/* If user typed "ls -l", etc, and the client
|
|
used NLST, do what the user meant. */
|
|
if (dirname[0] == '-' && *dirlist == NULL && transflag == 0)
|
|
{
|
|
retrieve ("/bin/ls %s", dirname);
|
|
goto out;
|
|
}
|
|
perror_reply (550, whichf);
|
|
if (dout != NULL)
|
|
{
|
|
fclose (dout);
|
|
transflag = 0;
|
|
data = -1;
|
|
pdata = -1;
|
|
}
|
|
goto out;
|
|
}
|
|
|
|
if (S_ISREG (st.st_mode))
|
|
{
|
|
if (dout == NULL)
|
|
{
|
|
dout = dataconn ("file list", (off_t) - 1, "w");
|
|
if (dout == NULL)
|
|
goto out;
|
|
transflag++;
|
|
}
|
|
fprintf (dout, "%s%s\n", dirname, type == TYPE_A ? "\r" : "");
|
|
byte_count += strlen (dirname) + 1;
|
|
continue;
|
|
}
|
|
else if (!S_ISDIR (st.st_mode))
|
|
continue;
|
|
|
|
dirp = opendir (dirname);
|
|
if (dirp == NULL)
|
|
continue;
|
|
|
|
while ((dir = readdir (dirp)) != NULL)
|
|
{
|
|
char *nbuf;
|
|
|
|
if (dir->d_name[0] == '.' && dir->d_name[1] == '\0')
|
|
continue;
|
|
if (dir->d_name[0] == '.' && dir->d_name[1] == '.' &&
|
|
dir->d_name[2] == '\0')
|
|
continue;
|
|
|
|
nbuf = alloca (strlen (dirname) + 1 + strlen (dir->d_name) + 1);
|
|
sprintf (nbuf, "%s/%s", dirname, dir->d_name);
|
|
|
|
/* We have to do a stat to insure it's
|
|
not a directory or special file. */
|
|
if (simple || (stat (nbuf, &st) == 0 && S_ISREG (st.st_mode)))
|
|
{
|
|
if (dout == NULL)
|
|
{
|
|
dout = dataconn ("file list", (off_t) - 1, "w");
|
|
if (dout == NULL)
|
|
goto out;
|
|
transflag++;
|
|
}
|
|
if (nbuf[0] == '.' && nbuf[1] == '/')
|
|
fprintf (dout, "%s%s\n", &nbuf[2],
|
|
type == TYPE_A ? "\r" : "");
|
|
else
|
|
fprintf (dout, "%s%s\n", nbuf, type == TYPE_A ? "\r" : "");
|
|
byte_count += strlen (nbuf) + 1;
|
|
}
|
|
}
|
|
closedir (dirp);
|
|
}
|
|
|
|
if (dout == NULL)
|
|
reply (550, "No files found.");
|
|
else if (ferror (dout) != 0)
|
|
perror_reply (550, "Data connection");
|
|
else
|
|
reply (226, "Transfer complete.");
|
|
|
|
transflag = 0;
|
|
if (dout != NULL)
|
|
fclose (dout);
|
|
data = -1;
|
|
pdata = -1;
|
|
out:
|
|
free (p);
|
|
if (freeglob)
|
|
{
|
|
freeglob = 0;
|
|
globfree (&gl);
|
|
}
|
|
}
|