busybox/ipsvd/udpsvd.c
2007-04-02 06:17:45 +00:00

222 lines
5.4 KiB
C

/* Based on ipsvd utilities written by Gerrit Pape <pape@smarden.org>
* which are released into public domain by the author.
* Homepage: http://smarden.sunsite.dk/ipsvd/
*
* Copyright (C) 2007 Denis Vlasenko.
*
* Licensed under GPLv2, see file LICENSE in this tarball for details.
*/
/* Based on ipsvd ipsvd-0.12.1. This tcpsvd accepts all options
* which are supported by one from ipsvd-0.12.1, but not all are
* functional. See help text at the end of this file for details.
*
* Code inside #if 0" is parts of original tcpsvd which are not implemented
* for busyboxed version.
*
* Output of verbose mode matches original (modulo bugs and
* unimplemented stuff). Unnatural splitting of IP and PORT
* is retained (personally I prefer one-value "IP:PORT" notation -
* it is a natural string representation of struct sockaddr_XX).
*/
#include "busybox.h"
unsigned verbose;
static void sig_term_handler(int sig)
{
if (verbose)
printf("udpsvd: info: sigterm received, exit\n");
exit(0);
}
int udpsvd_main(int argc, char **argv);
int udpsvd_main(int argc, char **argv)
{
const char *instructs;
char *str_t, *user;
unsigned opt;
// unsigned lookuphost = 0;
// unsigned paranoid = 0;
// unsigned long timeout = 0;
char *remote_hostname;
char *local_hostname;
char *remote_ip;
char *local_ip;
uint16_t local_port, remote_port;
union {
struct sockaddr sa;
struct sockaddr_in sin;
USE_FEATURE_IPV6(struct sockaddr_in6 sin6;)
} sock_adr;
socklen_t sockadr_size;
int sock;
int wstat;
unsigned pid;
struct bb_uidgid_t ugid;
enum {
OPT_v = (1 << 0),
OPT_u = (1 << 1),
OPT_l = (1 << 2),
OPT_h = (1 << 3),
OPT_p = (1 << 4),
OPT_i = (1 << 5),
OPT_x = (1 << 6),
OPT_t = (1 << 7),
};
opt_complementary = "ph:vv";
opt = getopt32(argc, argv, "vu:l:hpi:x:t:",
&user, &local_hostname, &instructs, &instructs, &str_t, &verbose);
//if (opt & OPT_x) iscdb =1;
//if (opt & OPT_t) timeout = xatou(str_t);
if (!(opt & OPT_h))
remote_hostname = (char *)"";
if (opt & OPT_u) {
if (!get_uidgid(&ugid, user, 1))
bb_error_msg_and_die("unknown user/group: %s", user);
}
argv += optind;
if (!argv[0][0] || LONE_CHAR(argv[0], '0'))
argv[0] = (char*)"0.0.0.0";
setlinebuf(stdout);
signal(SIGTERM, sig_term_handler);
signal(SIGPIPE, SIG_IGN);
local_port = bb_lookup_port(argv[1], "udp", 0);
sock = create_and_bind_dgram_or_die(argv[0], local_port);
if (opt & OPT_u) { /* drop permissions */
xsetgid(ugid.gid);
xsetuid(ugid.uid);
}
bb_sanitize_stdio(); /* fd# 1,2 must be opened */
close(0);
if (verbose) {
/* we do it only for ":port" cosmetics... oh well */
len_and_sockaddr *lsa = xhost2sockaddr(argv[0], local_port);
char *addr = xmalloc_sockaddr2dotted(&lsa->sa, lsa->len);
printf("udpsvd: info: listening on %s", addr);
free(addr);
if (option_mask32 & OPT_u)
printf(", uid %u, gid %u",
(unsigned)ugid.uid, (unsigned)ugid.gid);
puts(", starting");
}
again:
/* io[0].fd = s;
io[0].events = IOPAUSE_READ;
io[0].revents = 0;
taia_now(&now);
taia_uint(&deadline, 3600);
taia_add(&deadline, &now, &deadline);
iopause(io, 1, &deadline, &now);
if (!(io[0].revents | IOPAUSE_READ))
goto again;
io[0].revents = 0;
*/
sockadr_size = sizeof(sock_adr);
if (recvfrom(sock, NULL, 0, MSG_PEEK, &sock_adr.sa, &sockadr_size) == -1) {
bb_perror_msg("recvfrom");
goto again;
}
while ((pid = fork()) < 0) {
bb_perror_msg("fork failed, sleeping");
sleep(5);
}
if (pid > 0) { /* parent */
while (wait_pid(&wstat, pid) == -1)
bb_perror_msg("error waiting for child");
if (verbose)
printf("udpsvd: info: end %u\n", pid);
goto again;
}
/* Child */
/* if (recvfrom(sock, 0, 0, MSG_PEEK, (struct sockaddr *)&sock_adr, &sockadr_size) == -1)
drop("unable to read from socket");
*/
remote_ip = xmalloc_sockaddr2dotted_noport(&sock_adr.sa, sockadr_size);
remote_port = get_nport(&sock_adr.sa);
remote_port = ntohs(remote_port);
if (verbose) {
printf("udpsvd: info: pid %u from %s\n", pid, remote_ip);
}
if (opt & OPT_h) {
remote_hostname = xmalloc_sockaddr2host(&sock_adr.sa, sizeof(sock_adr));
if (!remote_hostname) {
bb_error_msg("warning: cannot look up hostname for %s", remote_ip);
remote_hostname = (char*)"";
}
}
#if 0
if (instructs) {
ac = ipsvd_check(iscdb, &inst, &match, (char*)instructs,
remote_ip, remote_hostname.s, timeout);
if (ac == -1) discard("unable to check inst", remote_ip);
if (ac == IPSVD_ERR) discard("unable to read", (char*)instructs);
} else
ac = IPSVD_DEFAULT;
#endif
if (verbose) {
#if 0
out("udpsvd: info: ");
switch(ac) {
case IPSVD_DENY: out("deny "); break;
case IPSVD_DEFAULT: case IPSVD_INSTRUCT: out("start "); break;
case IPSVD_EXEC: out("exec "); break;
}
#endif
printf("udpsvd: info: %u %s:%s :%s:%s:%u\n",
pid, local_hostname, local_ip,
remote_hostname, remote_ip, remote_port);
#if 0
if (instructs) {
out(" ");
if (iscdb) {
out((char*)instructs); out("/");
}
outfix(match.s);
if(inst.s && inst.len && (verbose > 1)) {
out(": "); outinst(&inst);
}
}
#endif
}
#if 0
if (ac == IPSVD_DENY) {
recv(s, 0, 0, 0);
_exit(100);
}
if (ac == IPSVD_EXEC) {
args[0] = "/bin/sh";
args[1] = "-c";
args[2] = inst.s;
args[3] = NULL;
run = args;
} else run = prog;
#endif
xmove_fd(sock, 0);
dup2(0, 1);
signal(SIGTERM, SIG_DFL);
signal(SIGPIPE, SIG_DFL);
argv += 2;
BB_EXECVP(argv[0], argv);
bb_perror_msg_and_die("exec '%s'", argv[0]);
}