1
0
mirror of http://galexander.org/git/simplesshd.git synced 2024-12-29 09:28:07 +00:00
simplesshd/dropbear/cli-main.c

196 lines
5.5 KiB
C
Raw Normal View History

2014-12-10 21:56:49 +00:00
/*
* Dropbear - a SSH2 server
* SSH client implementation
*
* Copyright (c) 2002,2003 Matt Johnston
* Copyright (c) 2004 by Mihnea Stoenescu
* All rights reserved.
*
* Permission is hereby granted, free of charge, to any person obtaining a copy
* of this software and associated documentation files (the "Software"), to deal
* in the Software without restriction, including without limitation the rights
* to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
* copies of the Software, and to permit persons to whom the Software is
* furnished to do so, subject to the following conditions:
*
* The above copyright notice and this permission notice shall be included in
* all copies or substantial portions of the Software.
*
* THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
* IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
* FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
* AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
* LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
* OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
* SOFTWARE. */
#include "includes.h"
#include "dbutil.h"
#include "runopts.h"
#include "session.h"
#include "dbrandom.h"
#include "crypto_desc.h"
2019-06-09 20:44:26 +00:00
#include "netio.h"
2014-12-10 21:56:49 +00:00
static void cli_dropbear_exit(int exitcode, const char* format, va_list param) ATTRIB_NORETURN;
static void cli_dropbear_log(int priority, const char* format, va_list param);
2019-06-09 20:44:26 +00:00
#if DROPBEAR_CLI_PROXYCMD
static void cli_proxy_cmd(int *sock_in, int *sock_out, pid_t *pid_out);
static void kill_proxy_sighandler(int signo);
2014-12-10 21:56:49 +00:00
#endif
2019-06-09 20:44:26 +00:00
#if defined(DBMULTI_dbclient) || !DROPBEAR_MULTI
#if defined(DBMULTI_dbclient) && DROPBEAR_MULTI
2014-12-10 21:56:49 +00:00
int cli_main(int argc, char ** argv) {
#else
int main(int argc, char ** argv) {
#endif
int sock_in, sock_out;
2019-06-09 20:44:26 +00:00
struct dropbear_progress_connection *progress = NULL;
2014-12-10 21:56:49 +00:00
_dropbear_exit = cli_dropbear_exit;
_dropbear_log = cli_dropbear_log;
disallow_core();
seedrandom();
crypto_init();
cli_getopts(argc, argv);
2019-06-09 20:44:26 +00:00
#ifndef DISABLE_SYSLOG
if (opts.usingsyslog) {
startsyslog("dbclient");
}
#endif
TRACE(("user='%s' host='%s' port='%s' bind_address='%s' bind_port='%s'", cli_opts.username,
cli_opts.remotehost, cli_opts.remoteport, cli_opts.bind_address, cli_opts.bind_port))
2014-12-10 21:56:49 +00:00
if (signal(SIGPIPE, SIG_IGN) == SIG_ERR) {
dropbear_exit("signal() error");
}
2019-06-09 20:44:26 +00:00
pid_t proxy_cmd_pid = 0;
#if DROPBEAR_CLI_PROXYCMD
2014-12-10 21:56:49 +00:00
if (cli_opts.proxycmd) {
2019-06-09 20:44:26 +00:00
cli_proxy_cmd(&sock_in, &sock_out, &proxy_cmd_pid);
2014-12-10 21:56:49 +00:00
m_free(cli_opts.proxycmd);
2019-06-09 20:44:26 +00:00
if (signal(SIGINT, kill_proxy_sighandler) == SIG_ERR ||
signal(SIGTERM, kill_proxy_sighandler) == SIG_ERR ||
signal(SIGHUP, kill_proxy_sighandler) == SIG_ERR) {
dropbear_exit("signal() error");
}
2014-12-10 21:56:49 +00:00
} else
#endif
{
2019-06-09 20:44:26 +00:00
progress = connect_remote(cli_opts.remotehost, cli_opts.remoteport,
cli_connected, &ses, cli_opts.bind_address, cli_opts.bind_port);
sock_in = sock_out = -1;
2014-12-10 21:56:49 +00:00
}
2019-06-09 20:44:26 +00:00
cli_session(sock_in, sock_out, progress, proxy_cmd_pid);
2014-12-10 21:56:49 +00:00
/* not reached */
return -1;
}
#endif /* DBMULTI stuff */
static void cli_dropbear_exit(int exitcode, const char* format, va_list param) {
2019-06-09 20:44:26 +00:00
char exitmsg[150];
char fullmsg[300];
/* Note that exit message must be rendered before session cleanup */
2014-12-10 21:56:49 +00:00
2019-06-09 20:44:26 +00:00
/* Render the formatted exit message */
vsnprintf(exitmsg, sizeof(exitmsg), format, param);
2014-12-10 21:56:49 +00:00
2019-06-09 20:44:26 +00:00
/* Add the prefix depending on session/auth state */
if (!ses.init_done) {
snprintf(fullmsg, sizeof(fullmsg), "Exited: %s", exitmsg);
2014-12-10 21:56:49 +00:00
} else {
2019-06-09 20:44:26 +00:00
snprintf(fullmsg, sizeof(fullmsg),
2014-12-10 21:56:49 +00:00
"Connection to %s@%s:%s exited: %s",
cli_opts.username, cli_opts.remotehost,
2019-06-09 20:44:26 +00:00
cli_opts.remoteport, exitmsg);
2014-12-10 21:56:49 +00:00
}
/* Do the cleanup first, since then the terminal will be reset */
session_cleanup();
/* Avoid printing onwards from terminal cruft */
fprintf(stderr, "\n");
2019-06-09 20:44:26 +00:00
dropbear_log(LOG_INFO, "%s", fullmsg);
2014-12-10 21:56:49 +00:00
exit(exitcode);
}
2019-06-09 20:44:26 +00:00
static void cli_dropbear_log(int priority,
2014-12-10 21:56:49 +00:00
const char* format, va_list param) {
char printbuf[1024];
vsnprintf(printbuf, sizeof(printbuf), format, param);
2019-06-09 20:44:26 +00:00
#ifndef DISABLE_SYSLOG
if (opts.usingsyslog) {
syslog(priority, "%s", printbuf);
}
#endif
2014-12-10 21:56:49 +00:00
fprintf(stderr, "%s: %s\n", cli_opts.progname, printbuf);
fflush(stderr);
}
2019-06-09 20:44:26 +00:00
static void exec_proxy_cmd(const void *user_data_cmd) {
2014-12-10 21:56:49 +00:00
const char *cmd = user_data_cmd;
char *usershell;
usershell = m_strdup(get_user_shell());
run_shell_command(cmd, ses.maxfd, usershell);
dropbear_exit("Failed to run '%s'\n", cmd);
}
2019-06-09 20:44:26 +00:00
#if DROPBEAR_CLI_PROXYCMD
static void cli_proxy_cmd(int *sock_in, int *sock_out, pid_t *pid_out) {
char * ex_cmd = NULL;
size_t ex_cmdlen;
2014-12-10 21:56:49 +00:00
int ret;
2019-06-09 20:44:26 +00:00
/* File descriptor "-j &3" */
if (*cli_opts.proxycmd == '&') {
char *p = cli_opts.proxycmd + 1;
int sock = strtoul(p, &p, 10);
/* must be a single number, and not stdin/stdout/stderr */
if (sock > 2 && sock < 1024 && *p == '\0') {
*sock_in = sock;
*sock_out = sock;
return;
}
}
/* Normal proxycommand */
/* So that spawn_command knows which shell to run */
2014-12-10 21:56:49 +00:00
fill_passwd(cli_opts.own_user);
2019-06-09 20:44:26 +00:00
ex_cmdlen = strlen(cli_opts.proxycmd) + 6; /* "exec " + command + '\0' */
ex_cmd = m_malloc(ex_cmdlen);
snprintf(ex_cmd, ex_cmdlen, "exec %s", cli_opts.proxycmd);
ret = spawn_command(exec_proxy_cmd, ex_cmd,
sock_out, sock_in, NULL, pid_out);
m_free(ex_cmd);
2014-12-10 21:56:49 +00:00
if (ret == DROPBEAR_FAILURE) {
dropbear_exit("Failed running proxy command");
*sock_in = *sock_out = -1;
}
}
2019-06-09 20:44:26 +00:00
static void kill_proxy_sighandler(int UNUSED(signo)) {
kill_proxy_command();
_exit(1);
}
#endif /* DROPBEAR_CLI_PROXYCMD */