summaryrefslogtreecommitdiffhomepage
path: root/tcpfwd-remote.c
diff options
context:
space:
mode:
Diffstat (limited to 'tcpfwd-remote.c')
-rw-r--r--tcpfwd-remote.c317
1 files changed, 0 insertions, 317 deletions
diff --git a/tcpfwd-remote.c b/tcpfwd-remote.c
deleted file mode 100644
index d0a67a1..0000000
--- a/tcpfwd-remote.c
+++ /dev/null
@@ -1,317 +0,0 @@
-#include "includes.h"
-#include "ssh.h"
-#include "tcpfwd-remote.h"
-#include "dbutil.h"
-#include "session.h"
-#include "buffer.h"
-#include "packet.h"
-#include "listener.h"
-#include "runopts.h"
-
-#ifndef DISABLE_REMOTETCPFWD
-
-struct RemoteTCP {
-
- unsigned char* addr;
- unsigned int port;
-
-};
-
-static void send_msg_request_success();
-static void send_msg_request_failure();
-static int cancelremotetcp();
-static int remotetcpreq();
-static int listen_tcpfwd(unsigned char* bindaddr, unsigned int port);
-static void acceptremote(struct Listener *listener);
-
-/* At the moment this is completely used for tcp code (with the name reflecting
- * that). If new request types are added, this should be replaced with code
- * similar to the request-switching in chansession.c */
-void recv_msg_global_request_remotetcp() {
-
- unsigned char* reqname = NULL;
- unsigned int namelen;
- unsigned int wantreply = 0;
- int ret = DROPBEAR_FAILURE;
-
- TRACE(("enter recv_msg_global_request_remotetcp"));
-
- if (opts.noremotetcp) {
- TRACE(("leave recv_msg_global_request_remotetcp: remote tcp forwarding disabled"));
- goto out;
- }
-
- reqname = buf_getstring(ses.payload, &namelen);
- wantreply = buf_getbyte(ses.payload);
-
- if (namelen > MAXNAMLEN) {
- TRACE(("name len is wrong: %d", namelen));
- goto out;
- }
-
- if (strcmp("tcpip-forward", reqname) == 0) {
- ret = remotetcpreq();
- } else if (strcmp("cancel-tcpip-forward", reqname) == 0) {
- ret = cancelremotetcp();
- } else {
- TRACE(("reqname isn't tcpip-forward: '%s'", reqname));
- }
-
-out:
- if (wantreply) {
- if (ret == DROPBEAR_SUCCESS) {
- send_msg_request_success();
- } else {
- send_msg_request_failure();
- }
- }
-
- m_free(reqname);
-
- TRACE(("leave recv_msg_global_request"));
-}
-
-static const struct ChanType chan_tcpremote = {
- 1, /* sepfds */
- "forwarded-tcpip",
- NULL,
- NULL,
- NULL,
- NULL
-};
-
-
-static void acceptremote(struct Listener *listener) {
-
- int fd;
- struct sockaddr addr;
- int len;
- char ipstring[NI_MAXHOST], portstring[NI_MAXSERV];
- struct RemoteTCP *tcpinfo = (struct RemoteTCP*)(listener->typedata);
-
- len = sizeof(addr);
-
- fd = accept(listener->sock, &addr, &len);
- if (fd < 0) {
- return;
- }
-
- if (getnameinfo(&addr, len, ipstring, sizeof(ipstring), portstring,
- sizeof(portstring), NI_NUMERICHOST | NI_NUMERICSERV) != 0) {
- return;
- }
-
- if (send_msg_channel_open_init(fd, &chan_tcpremote) == DROPBEAR_SUCCESS) {
-
- buf_putstring(ses.writepayload, tcpinfo->addr,
- strlen(tcpinfo->addr));
- buf_putint(ses.writepayload, tcpinfo->port);
- buf_putstring(ses.writepayload, ipstring, strlen(ipstring));
- buf_putint(ses.writepayload, atol(portstring));
- encrypt_packet();
-
- } else {
- /* XXX debug? */
- close(fd);
- }
-}
-
-static void cleanupremote(struct Listener *listener) {
-
- struct RemoteTCP *tcpinfo = (struct RemoteTCP*)(listener->typedata);
-
- m_free(tcpinfo->addr);
- m_free(tcpinfo);
-}
-
-static void send_msg_request_success() {
-
- CHECKCLEARTOWRITE();
- buf_putbyte(ses.writepayload, SSH_MSG_REQUEST_SUCCESS);
- encrypt_packet();
-
-}
-
-static void send_msg_request_failure() {
-
- CHECKCLEARTOWRITE();
- buf_putbyte(ses.writepayload, SSH_MSG_REQUEST_FAILURE);
- encrypt_packet();
-
-}
-
-static int matchtcp(void* typedata1, void* typedata2) {
-
- const struct RemoteTCP *info1 = (struct RemoteTCP*)typedata1;
- const struct RemoteTCP *info2 = (struct RemoteTCP*)typedata2;
-
- return info1->port == info2->port
- && (strcmp(info1->addr, info2->addr) == 0);
-}
-
-static int cancelremotetcp() {
-
- int ret = DROPBEAR_FAILURE;
- unsigned char * bindaddr = NULL;
- unsigned int addrlen;
- unsigned int port;
- struct Listener * listener = NULL;
- struct RemoteTCP tcpinfo;
-
- TRACE(("enter cancelremotetcp"));
-
- bindaddr = buf_getstring(ses.payload, &addrlen);
- if (addrlen > MAX_IP_LEN) {
- TRACE(("addr len too long: %d", addrlen));
- goto out;
- }
-
- port = buf_getint(ses.payload);
-
- tcpinfo.addr = bindaddr;
- tcpinfo.port = port;
- listener = get_listener(CHANNEL_ID_TCPFORWARDED, &tcpinfo, matchtcp);
- if (listener) {
- remove_listener( listener );
- ret = DROPBEAR_SUCCESS;
- }
-
-out:
- m_free(bindaddr);
- TRACE(("leave cancelremotetcp"));
- return ret;
-}
-
-static int remotetcpreq() {
-
- int ret = DROPBEAR_FAILURE;
- unsigned char * bindaddr = NULL;
- unsigned int addrlen;
- unsigned int port;
-
- TRACE(("enter remotetcpreq"));
-
- bindaddr = buf_getstring(ses.payload, &addrlen);
- if (addrlen > MAX_IP_LEN) {
- TRACE(("addr len too long: %d", addrlen));
- goto out;
- }
-
- port = buf_getint(ses.payload);
-
- if (port == 0) {
- dropbear_log(LOG_INFO, "Server chosen tcpfwd ports are unsupported");
- goto out;
- }
-
- if (port < 1 || port > 65535) {
- TRACE(("invalid port: %d", port));
- goto out;
- }
-
- if (!ses.allowprivport && port < IPPORT_RESERVED) {
- TRACE(("can't assign port < 1024 for non-root"));
- goto out;
- }
-
- ret = listen_tcpfwd(bindaddr, port);
-
-out:
- if (ret == DROPBEAR_FAILURE) {
- /* we only free it if a listener wasn't created, since the listener
- * has to remember it if it's to be cancelled */
- m_free(bindaddr);
- }
- TRACE(("leave remotetcpreq"));
- return ret;
-}
-
-static int listen_tcpfwd(unsigned char* bindaddr, unsigned int port) {
-
- struct RemoteTCP * tcpinfo = NULL;
- char portstring[6]; /* "65535\0" */
- struct addrinfo *res = NULL, *ai = NULL;
- struct addrinfo hints;
- int sock = -1;
- struct Listener *listener = NULL;
-
- TRACE(("enter listen_tcpfwd"));
-
- /* first we try to bind, so don't need to do so much cleanup on failure */
- snprintf(portstring, sizeof(portstring), "%d", port);
- memset(&hints, 0x0, sizeof(hints));
- hints.ai_socktype = SOCK_STREAM;
- hints.ai_family = PF_INET;
- hints.ai_flags = AI_PASSIVE | AI_NUMERICHOST;
-
- if (getaddrinfo(bindaddr, portstring, &hints, &res) < 0) {
- TRACE(("leave listen_tcpfwd: getaddrinfo failed: %s",
- strerror(errno)));
- goto done;
- }
-
- /* find the first one which works */
- for (ai = res; ai != NULL; ai = ai->ai_next) {
- if (ai->ai_family != PF_INET && ai->ai_family != PF_INET6) {
- continue;
- }
-
- sock = socket(ai->ai_family, SOCK_STREAM, 0);
- if (sock < 0) {
- TRACE(("socket failed: %s", strerror(errno)));
- goto fail;
- }
-
- if (bind(sock, ai->ai_addr, ai->ai_addrlen) < 0) {
- TRACE(("bind failed: %s", strerror(errno)));
- goto fail;
- }
-
- if (listen(sock, 20) < 0) {
- TRACE(("listen failed: %s", strerror(errno)));
- goto fail;
- }
-
- if (fcntl(sock, F_SETFL, O_NONBLOCK) < 0) {
- TRACE(("fcntl nonblocking failed: %s", strerror(errno)));
- goto fail;
- }
-
- /* success */
- break;
-
-fail:
- close(sock);
- }
-
-
- if (ai == NULL) {
- TRACE(("no successful sockets"));
- goto done;
- }
-
- tcpinfo = (struct RemoteTCP*)m_malloc(sizeof(struct RemoteTCP));
- tcpinfo->addr = bindaddr;
- tcpinfo->port = port;
-
- listener = new_listener(sock, CHANNEL_ID_TCPFORWARDED, tcpinfo,
- acceptremote, cleanupremote);
-
- if (listener == NULL) {
- m_free(tcpinfo);
- }
-
-done:
- if (res) {
- freeaddrinfo(res);
- }
-
- TRACE(("leave listen_tcpfwd"));
- if (listener == NULL) {
- return DROPBEAR_FAILURE;
- } else {
- return DROPBEAR_SUCCESS;
- }
-}
-
-#endif /* DISABLE_REMOTETCPFWD */