lshd.c 29.9 KB
Newer Older
Niels Möller's avatar
Niels Möller committed
1
2
/* lshd.c
 *
3
 * Main server program.
4
 *
5
 */
Niels Möller's avatar
Niels Möller committed
6

7
8
/* lsh, an implementation of the ssh protocol
 *
9
 * Copyright (C) 1998 Niels Mller
10
11
12
13
14
15
16
17
18
19
20
21
22
 *
 * This program is free software; you can redistribute it and/or
 * modify it under the terms of the GNU General Public License as
 * published by the Free Software Foundation; either version 2 of the
 * License, or (at your option) any later version.
 *
 * This program is distributed in the hope that it will be useful, but
 * WITHOUT ANY WARRANTY; without even the implied warranty of
 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
 * General Public License for more details.
 *
 * You should have received a copy of the GNU General Public License
 * along with this program; if not, write to the Free Software
Niels Möller's avatar
Niels Möller committed
23
 * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA  02111-1307  USA
24
 */
Niels Möller's avatar
Niels Möller committed
25

26
#include "algorithms.h"
27
28
#include "alist.h"
#include "atoms.h"
29
#include "channel.h"
30
#include "channel_commands.h"
31
#include "charset.h"
32
#include "compress.h"
33
#include "connection_commands.h"
34
#include "crypto.h"
35
#include "daemon.h"
36
#include "environ.h"
37
#include "format.h"
38
#include "handshake.h"
Niels Möller's avatar
Niels Möller committed
39
#include "io.h"
40
#include "io_commands.h"
41
#include "lookup_verifier.h"
42
#include "randomness.h"
Niels Möller's avatar
Niels Möller committed
43
#include "reaper.h"
Niels Möller's avatar
Niels Möller committed
44
#include "server.h"
45
#include "server_authorization.h"
46
#include "server_keyexchange.h"
47
48
#include "server_pty.h"
#include "server_session.h"
Niels Möller's avatar
Niels Möller committed
49
#include "spki.h"
50
#include "srp.h"
Niels Möller's avatar
Niels Möller committed
51
#include "ssh.h"
52
53
#include "tcpforward.h"
#include "tcpforward_commands.h"
54
#include "tcpforward_commands.h"
55
#include "server_userauth.h"
56
#include "version.h"
57
58
59
#include "werror.h"
#include "xalloc.h"

60
#include "lsh_argp.h"
61

62
/* Forward declarations */
63
64
struct command options2local;
#define OPTIONS2LOCAL (&options2local.super)
65

66
67
struct command options2keys;
#define OPTIONS2KEYS (&options2keys.super)
68

69
70
71
struct command options2tcp_wrapper;
#define OPTIONS2TCP_WRAPPER (&options2tcp_wrapper.super)

72
73
struct command_2 close_on_sighup;
#define CLOSE_ON_SIGHUP (&close_on_sighup.super.super)
74

75
76
77
78
79
80
81
#include "lshd.c.x"

#include <assert.h>

#include <errno.h>
#include <locale.h>
#include <stdio.h>
82
/* #include <string.h> */
83
84
85
86

#include <sys/types.h>
#include <sys/stat.h>
#include <fcntl.h>
87
88
89
90
91
92
#if TIME_WITH_SYS_TIME && HAVE_SYS_TIME_H
#include <sys/time.h>
#endif
#if HAVE_SYS_RESOURCE_H
#include <sys/resource.h>
#endif
93
#if HAVE_UNISTD_H
94
#include <unistd.h>
95
#endif
96

97

98
99
/* Option parsing */

100
101
102
103
104
const char *argp_program_version
= "lshd-" VERSION ", secsh protocol version " SERVER_PROTOCOL_VERSION;

const char *argp_program_bug_address = BUG_ADDRESS;

105
#define OPT_NO 0x400
106
107
#define OPT_SSH1_FALLBACK 0x200
#define OPT_INTERFACE 0x201
108

109
#define OPT_TCPIP_FORWARD 0x202
110
#define OPT_NO_TCPIP_FORWARD (OPT_TCPIP_FORWARD | OPT_NO)
111
112
#define OPT_PTY 0x203
#define OPT_NO_PTY (OPT_PTY | OPT_NO)
113
114
#define OPT_SUBSYSTEMS 0x204
#define OPT_NO_SUBSYSTEMS (OPT_SUBSYSTEMS | OPT_NO)
115

116
#define OPT_DAEMONIC 0x205
117
#define OPT_NO_DAEMONIC (OPT_DAEMONIC | OPT_NO)
118
#define OPT_PIDFILE 0x206
119
120
#define OPT_NO_PIDFILE (OPT_PIDFILE | OPT_NO)
#define OPT_CORE 0x207
121
122
#define OPT_SYSLOG 0x208
#define OPT_NO_SYSLOG (OPT_SYSLOG | OPT_NO)
123
124
#define OPT_X11_FORWARD 0x209
#define OPT_NO_X11_FORWARD (OPT_X11_FORWARD |OPT_NO)
125

126
127
128
129
130
131
#define OPT_SRP 0x210
#define OPT_NO_SRP (OPT_SRP | OPT_NO)
#define OPT_DH 0x211
#define OPT_NO_DH (OPT_DH | OPT_NO)

#define OPT_PUBLICKEY 0x220
132
#define OPT_NO_PUBLICKEY (OPT_PUBLICKEY | OPT_NO)
133
#define OPT_PASSWORD 0x221
134
135
#define OPT_NO_PASSWORD (OPT_PASSWORD | OPT_NO)

136
#define OPT_ROOT_LOGIN 0x222
137
138
#define OPT_NO_ROOT_LOGIN (OPT_ROOT_LOGIN | OPT_NO)

139
140
141
#define OPT_KERBEROS_PASSWD 0x223
#define OPT_NO_KERBEROS_PASSWD (OPT_KERBEROS_PASSWD | OPT_NO)

142
143
#define OPT_PASSWORD_HELPER 0x224

144
145
#define OPT_LOGIN_SHELL 0x225

146
147
148
149
150
#define OPT_TCPWRAPPERS 0x226
#define OPT_NO_TCPWRAPPERS 0x227

#define OPT_TCPWRAP_GOAWAY_MSG 0x228

151
152
153
154
155
/* GABA:
   (class
     (name lshd_options)
     (super algorithms_options)
     (vars
156
157
       (e object exception_handler)
       
158
       (reaper object reaper)
159
       (random object randomness)
160
       
161
       (signature_algorithms object alist)
162
163
       ;; Addresses to bind
       (local object sockaddr_list)
164
165
       (port . "char *")
       (hostkey . "char *")
166
167
       (tcp_wrapper_name . "char *")
       (tcp_wrapper_message . "char *")
168

169
170
171
172
173
174
       (with_srp_keyexchange . int)
       (with_dh_keyexchange . int)

       ;; (kexinit object make_kexinit)
       (kex_algorithms object int_list)
       
175
176
       (with_publickey . int)
       (with_password . int)
177
       (allow_root . int)
178
       (pw_helper . "const char *")
179
       (login_shell . "const char *")
180
       
181
       (with_tcpip_forward . int)
182
       (with_x11_forward . int)
183
       (with_pty . int)
184
       (subsystems . "const char **")
185
       
186
187
188
       (userauth_methods object int_list)
       (userauth_algorithms object alist)
       
189
190
       (sshd1 object ssh1_fallback)
       (daemonic . int)
191
       (no_syslog . int)
192
193
194
       (corefile . int)
       (pid_file . "const char *")
       ; -1 means use pid file iff we're in daemonic mode
195
196
197
198
       (use_pid_file . int)
       ; Resources that should be killed when SIGHUP is received,
       ; or when the program exits.
       (resources object resource_list)))
199
200
*/

201
202
203
204
205
206
static void
do_exc_lshd_handler(struct exception_handler *s,
		    const struct exception *e)
{
  switch(e->type)
    {
207
    case EXC_RESOLVE:
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
    case EXC_RANDOMNESS_LOW_ENTROPY:
      werror("lshd: %z\n", e->msg);
      exit(EXIT_FAILURE);
    default:
      EXCEPTION_RAISE(s->parent, e);
    }
}

static struct exception_handler *
make_lshd_exception_handler(struct exception_handler *parent,
			    const char *context)
{
  return make_exception_handler(do_exc_lshd_handler, parent, context);
}

Niels Möller's avatar
Niels Möller committed
223
static struct lshd_options *
224
make_lshd_options(void)
225
{
Niels Möller's avatar
Niels Möller committed
226
  NEW(lshd_options, self);
227

228
  init_algorithms_options(&self->super, all_symmetric_algorithms());
229

230
231
  self->e = make_lshd_exception_handler(&default_exception_handler,
					HANDLER_CONTEXT);
232
  self->reaper = make_reaper();
233
  self->random = make_system_random();
234

235
236
  /* OK to initialize with NULL */
  self->signature_algorithms = all_signature_algorithms(self->random);
237

238
239
  self->local = NULL;
  
240
241
242
243
  /* Default behaviour is to lookup the "ssh" service, and fall back
   * to port 22 if that fails. */
  self->port = NULL;
  
244
245
  /* FIXME: this should perhaps use sysconfdir */  
  self->hostkey = "/etc/lsh_host_key";
246
  
247
248
249
250
251
  self->with_dh_keyexchange = 1;
  self->with_srp_keyexchange = 0;

  self->kex_algorithms = NULL;
  
252
253
  self->with_publickey = 1;
  self->with_password = 1;
254
  self->with_tcpip_forward = 1;
255
256
  /* Experimental, so disabled by default. */
  self->with_x11_forward = 0;
257
  self->with_pty = 1;
258
259
  self->subsystems = NULL;
  
260
261
262
  self->tcp_wrapper_name = "lshd";
  self->tcp_wrapper_message = NULL;

263
  self->allow_root = 0;
264
  self->pw_helper = NULL;
265
  self->login_shell = NULL;
266
  
267
268
  self->userauth_methods = NULL;
  self->userauth_algorithms = NULL;
269
270
  
  self->sshd1 = NULL;
271
  self->daemonic = 0;
272
273
  self->no_syslog = 0;
  
274
275
276
277
  /* FIXME: Make the default a configure time option? */
  self->pid_file = "/var/run/lshd.pid";
  self->use_pid_file = -1;
  self->corefile = 0;
278
279
280
281
282
283

  self->resources = make_resource_list();
  /* Not strictly needed for gc, but makes sure the
   * resource list is killed properly by gc_final. */
  gc_global(&self->resources->super);

284
285
286
  return self;
}

287
/* Port(s) to listen on */
288
289
290
291
292
DEFINE_COMMAND(options2local)
     (struct command *s UNUSED,
      struct lsh_object *a,
      struct command_continuation *c,
      struct exception_handler *e UNUSED)
Niels Möller's avatar
Niels Möller committed
293
294
{
  CAST(lshd_options, options, a);
295
  /* FIXME: Call bind already here? */
296
  assert(options->local);
297
  COMMAND_RETURN(c, options->local);
Niels Möller's avatar
Niels Möller committed
298
299
300
}

/* alist of signature algorithms */
301
302
303
304
305
DEFINE_COMMAND(options2signature_algorithms)
     (struct command *s UNUSED,
      struct lsh_object *a,
      struct command_continuation *c,
      struct exception_handler *e UNUSED)
Niels Möller's avatar
Niels Möller committed
306
307
{
  CAST(lshd_options, options, a);
308
  COMMAND_RETURN(c, options->signature_algorithms);
Niels Möller's avatar
Niels Möller committed
309
310
}

311

312
313
/* FIXME: Call read_host_key directly from main instead. */
DEFINE_COMMAND(options2keys)
314
315
316
     (struct command *ignored UNUSED,
      struct lsh_object *a,
      struct command_continuation *c,
317
      struct exception_handler *e UNUSED)
Niels Möller's avatar
Niels Möller committed
318
319
320
{
  CAST(lshd_options, options, a);

321
322
323
  struct alist *keys = make_alist(0, -1);
  read_host_key(options->hostkey, options->signature_algorithms, keys);
  COMMAND_RETURN(c, keys);
Niels Möller's avatar
Niels Möller committed
324
325
}

326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
/* GABA:
   (class
     (name pid_file_resource)
     (super resource)
     (vars
       (file . "const char *")))
*/

static void
do_kill_pid_file(struct resource *s)
{
  CAST(pid_file_resource, self, s);
  if (self->super.alive)
    {
      self->super.alive = 0;
      if (unlink(self->file) < 0)
342
	werror("Unlinking pidfile failed %e\n", errno);
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
    }
}

static struct resource *
make_pid_file_resource(const char *file)
{
  NEW(pid_file_resource, self);
  init_resource(&self->super, do_kill_pid_file);
  self->file = file;

  return &self->super;
}

/* GABA:
   (class
     (name sighup_close_callback)
     (super lsh_callback)
     (vars
       (resources object resource_list)))
*/

static void
do_sighup_close_callback(struct lsh_callback *s)
{
  CAST(sighup_close_callback, self, s);
  unsigned nfiles;
  
  werror("SIGHUP received.\n");
  KILL_RESOURCE_LIST(self->resources);
  
  nfiles = io_nfiles();

  if (nfiles)
    werror("Waiting for active connections to terminate, "
	   "%i files still open.\n", nfiles);
}

static struct lsh_callback *
make_sighup_close_callback(struct lshd_options *options)
{
  NEW(sighup_close_callback, self);
  self->super.f = do_sighup_close_callback;
  self->resources = options->resources;

  return &self->super;
}

/* (close_on_sighup options file) */
DEFINE_COMMAND2(close_on_sighup)
     (struct command_2 *ignored UNUSED,
      struct lsh_object *a1,
      struct lsh_object *a2,
      struct command_continuation *c,
      struct exception_handler *e UNUSED)
{
  CAST(lshd_options, options, a1);
399
  CAST_SUBTYPE(resource, fds, a2);
400

401
  remember_resource(options->resources, fds);
402
403
404

  COMMAND_RETURN(c, a2);
}
Niels Möller's avatar
Niels Möller committed
405

406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430

DEFINE_COMMAND(options2tcp_wrapper)
     (struct command *s UNUSED,
      struct lsh_object *a,
      struct command_continuation *c,
      struct exception_handler *e UNUSED)
{
#if WITH_TCPWRAPPERS
  CAST(lshd_options, options, a);

  if (options->tcp_wrapper_name) 
    COMMAND_RETURN(c, 
		   make_tcp_wrapper(
				    make_string(options->tcp_wrapper_name),
				    options->tcp_wrapper_message ? 
				    ssh_format("%lz\n", options->tcp_wrapper_message ) :
				    ssh_format("")
				    )
		   ); 
  else
#endif /* WITH_TCPWRAPPERS */
    COMMAND_RETURN(c, &io_log_peer_command);
}


431
432
433
434
435
static const struct argp_option
main_options[] =
{
  /* Name, key, arg-name, flags, doc, group */
  { "interface", OPT_INTERFACE, "interface", 0,
436
    "Listen on this network interface.", 0 }, 
437
438
  { "port", 'p', "Port", 0, "Listen on this port.", 0 },
  { "host-key", 'h', "Key file", 0, "Location of the server's private key.", 0},
439
440
441
442
#if WITH_SSH1_FALLBACK
  { "ssh1-fallback", OPT_SSH1_FALLBACK, "File name", OPTION_ARG_OPTIONAL,
    "Location of the sshd1 program, for falling back to version 1 of the Secure Shell protocol.", 0 },
#endif /* WITH_SSH1_FALLBACK */
443

444
445
446
447
448
449
450
451
#if WITH_TCPWRAPPERS
  { NULL, 0, NULL, 0, "Connection filtering:", 0 },
  { "tcpwrappers", OPT_TCPWRAPPERS, "name", 0, "Set service name for tcp wrappers (default lshd)", 0 },
  { "no-tcpwrappers", OPT_NO_TCPWRAPPERS, NULL, 0, "Disable wrappers", 0 },
  { "tcpwrappers-msg", OPT_TCPWRAP_GOAWAY_MSG, "'Message'", 0, "Message sent to clients " 
    "who aren't allowed to connect. A newline will be added.", 0 },
#endif /* WITH_TCPWRAPPERS */

452
  { NULL, 0, NULL, 0, "Keyexchange options:", 0 },
453
454
455
456
457
458
459
460
#if WITH_SRP
  { "srp-keyexchange", OPT_SRP, NULL, 0, "Enable experimental SRP support.", 0 },
  { "no-srp-keyexchange", OPT_NO_SRP, NULL, 0, "Disable experimental SRP support (default).", 0 },
#endif /* WITH_SRP */

  { "dh-keyexchange", OPT_DH, NULL, 0, "Enable DH support (default).", 0 },
  { "no-dh-keyexchange", OPT_NO_DH, NULL, 0, "Disable DH support.", 0 },
  
461
  { NULL, 0, NULL, 0, "User authentication options:", 0 },
462

463
464
465
466
467
468
469
470
471
  { "password", OPT_PASSWORD, NULL, 0,
    "Enable password user authentication (default).", 0},
  { "no-password", OPT_NO_PASSWORD, NULL, 0,
    "Disable password user authentication.", 0},

  { "publickey", OPT_PUBLICKEY, NULL, 0,
    "Enable publickey user authentication (default).", 0},
  { "no-publickey", OPT_NO_PUBLICKEY, NULL, 0,
    "Disable publickey user authentication.", 0},
472
473
474
475
476

  { "root-login", OPT_ROOT_LOGIN, NULL, 0,
    "Allow root to login.", 0 },
  { "no-root-login", OPT_NO_ROOT_LOGIN, NULL, 0,
    "Don't allow root to login (default).", 0 },
477

478
479
480
481
  { "login-shell", OPT_LOGIN_SHELL, "Program", 0,
    "Use this program as the login shell for all users. "
    "(Experimental)", 0 },
  
482
483
  { "kerberos-passwords", OPT_KERBEROS_PASSWD, NULL, 0,
    "Recognize kerberos passwords, using the helper program "
484
    "\"" PATH_KERBEROS_HELPER "\". This option is experimental.", 0 },
485
  { "no-kerberos-passwords", OPT_NO_KERBEROS_PASSWD, NULL, 0,
Niels Möller's avatar
Niels Möller committed
486
    "Don't recognize kerberos passwords (default behaviour).", 0 },
487

488
489
  { "password-helper", OPT_PASSWORD_HELPER, "Program", 0,
    "Use the named helper program for password verification. "
490
    "(Experimental).", 0 },
491

492
  { NULL, 0, NULL, 0, "Offered services:", 0 },
493

494
495
496
497
#if WITH_PTY_SUPPORT
  { "pty-support", OPT_PTY, NULL, 0, "Enable pty allocation (default).", 0 },
  { "no-pty-support", OPT_NO_PTY, NULL, 0, "Disable pty allocation.", 0 },
#endif /* WITH_PTY_SUPPORT */
498
499
500
501
502
503
504
505
506
507
508
509
510
#if WITH_TCP_FORWARD
  { "tcpip-forward", OPT_TCPIP_FORWARD, NULL, 0,
    "Enable tcpip forwarding (default).", 0 },
  { "no-tcpip-forward", OPT_NO_TCPIP_FORWARD, NULL, 0,
    "Disable tcpip forwarding.", 0 },
#endif /* WITH_TCP_FORWARD */
#if WITH_X11_FORWARD
  { "x11-forward", OPT_X11_FORWARD, NULL, 0,
    "Enable x11 forwarding.", 0 },
  { "no-x11-forward", OPT_NO_X11_FORWARD, NULL, 0,
    "Disable x11 forwarding (default).", 0 },
#endif /* WITH_X11_FORWARD */
  
511
512
513
  { "subsystems", OPT_SUBSYSTEMS, "List of subsystem names and programs", 0,
    "For example `sftp=/usr/sbin/sftp-server,foosystem=/usr/bin/foo' "
    "(experimental).", 0},
514
  
515
516
  { NULL, 0, NULL, 0, "Daemonic behaviour", 0 },
  { "daemonic", OPT_DAEMONIC, NULL, 0, "Run in the background, redirect stdio to /dev/null, and chdir to /.", 0 },
517
  { "no-daemonic", OPT_NO_DAEMONIC, NULL, 0, "Run in the foreground, with messages to stderr (default).", 0 },
518
519
  { "pid-file", OPT_PIDFILE, "file name", 0, "Create a pid file. When running in daemonic mode, "
    "the default is /var/run/lshd.pid.", 0 },
520
  { "no-pid-file", OPT_NO_PIDFILE, NULL, 0, "Don't use any pid file. Default in non-daemonic mode.", 0 },
521
  { "enable-core", OPT_CORE, NULL, 0, "Dump core on fatal errors (disabled by default).", 0 },
522
523
  { "no-syslog", OPT_NO_SYSLOG, NULL, 0, "Don't use syslog (by default, syslog is used "
    "when running in daemonic mode).", 0 },
524
525
526
527
528
529
530
531
532
533
534
  { NULL, 0, NULL, 0, NULL, 0 }
};

static const struct argp_child
main_argp_children[] =
{
  { &algorithms_argp, 0, "", 0 },
  { &werror_argp, 0, "", 0 },
  { NULL, 0, NULL, 0}
};

535
536
537
538
539
540
541
542
543
544
545
546
547
548
549
550
551
552
553
554
555
556
557
558
559
560
561
562
563
564
565
566
567
568
569
570
571
572
573
574
575
576
577
578
579
580
581
582
583
/* NOTE: Modifies the argument string. */
static const char **
parse_subsystem_list(char *arg)
{
  const char **subsystems;
  char *separator;
  unsigned length;
  unsigned i;
  
  /* First count the number of elements. */
  for (length = 1, i = 0; arg[i]; i++)
    if (arg[i] == ',')
      length++;

  subsystems = lsh_space_alloc((length * 2 + 1) * sizeof(*subsystems));

  for (i = 0; ; i++)
    {
      subsystems[2*i] = arg;

      separator = strchr(arg, '=');

      if (!separator)
	goto fail;

      *separator = '\0';

      subsystems[2*i+1] = arg = separator + 1;
      
      separator = strchr(arg, ',');

      if (i == (length - 1))
	break;
      
      if (!separator)
	goto fail;

      *separator = '\0';
      arg = separator + 1;
    }
  if (separator)
    {
    fail:
      lsh_space_free(subsystems);
      return NULL;
    }
  return subsystems;
}

584
585
586
/* NOTE: On success, modifies interface destructively. */
static int
parse_interface(char *interface, const char **host, const char **port)
587
{
588
  *port = NULL;
589
590
591
592
  
  if (interface[0] == '[')
    {
      /* A literal address */
593
      char *end;
594
595
596
597
      interface++;
      
      end = strchr(interface, ']');
      if (!end)
598
	return 0;
599
600
601
602

      switch (end[1])
	{
	case ':':
603
	  *port = end + 2;
604
605
606
607
	  break;
	case 0:
	  break;
	default:
608
	  return 0;
609
	}
610
611
612
613

      *host = interface;
      *end = 0;
      return 1;
614
615
616
    }
  else
    {
617
      char *end = strchr(interface, ':');
618
619
      if (end)
	{
620
621
	  *port = end + 1;
	  *end = 0;
622
	}
623
624
      *host = interface;
      return 1;
625
626
627
    }
}

628
629
630
631
632
633
634
635
636
637
static error_t
main_argp_parser(int key, char *arg, struct argp_state *state)
{
  CAST(lshd_options, self, state->input);
  
  switch(key)
    {
    default:
      return ARGP_ERR_UNKNOWN;
    case ARGP_KEY_INIT:
Niels Möller's avatar
Niels Möller committed
638
639
      state->child_inputs[0] = &self->super;
      state->child_inputs[1] = NULL;
640
641
      break;
    case ARGP_KEY_END:
642
      {
643
	struct user_db *user_db = NULL;
644
	
645
646
	if (!self->random)
	  argp_failure( state, EXIT_FAILURE, 0,  "No randomness generator available.");
647
648
	
       	if (self->with_password || self->with_publickey || self->with_srp_keyexchange)
649
	  user_db = make_unix_user_db(self->reaper,
650
651
				      self->pw_helper, self->login_shell,
				      self->allow_root);
652
	  
653
654
655
656
657
658
659
660
661
662
663
	if (self->with_dh_keyexchange || self->with_srp_keyexchange)
	  {
	    int i = 0;
	    self->kex_algorithms 
	      = alloc_int_list(self->with_dh_keyexchange + self->with_srp_keyexchange);
	    
	    if (self->with_dh_keyexchange)
	      {
		LIST(self->kex_algorithms)[i++] = ATOM_DIFFIE_HELLMAN_GROUP1_SHA1;
		ALIST_SET(self->super.algorithms,
			  ATOM_DIFFIE_HELLMAN_GROUP1_SHA1,
664
			  &make_dh_server(make_dh1(self->random))
665
			  ->super);
666
667
668
669
	      }
#if WITH_SRP	    
	    if (self->with_srp_keyexchange)
	      {
670
		assert(user_db);
671
		LIST(self->kex_algorithms)[i++] = ATOM_SRP_RING1_SHA1_LOCAL;
672
		ALIST_SET(self->super.algorithms,
673
			  ATOM_SRP_RING1_SHA1_LOCAL,
674
			  &make_srp_server(make_srp1(self->random),
675
					   user_db)
676
			  ->super);
677
678
679
680
681
682
683
	      }
#endif /* WITH_SRP */
	  }
	else
	  argp_error(state, "All keyexchange algorithms disabled.");

	if (!self->local)
684
685
686
	  {
	    /* Default interface */

687
688
689
690
	    if (!(self->port
		  ? io_resolv_address(NULL, self->port, 0, &self->local)
		  : io_resolv_address(NULL, "ssh", 22, &self->local)))
		
691
692
693
694
695
	      argp_failure(state, EXIT_FAILURE, 0,
			   "Strange. Could not resolve the ANY address.");
	  }
	assert(self->local);
	
696
697
698
699
700
701
702
703
704
705
706
707
708
709
710
	if (self->use_pid_file < 0)
	  self->use_pid_file = self->daemonic;

	if (self->with_password || self->with_publickey)
	  {
	    int i = 0;
	    
	    self->userauth_methods
	      = alloc_int_list(self->with_password + self->with_publickey);
	    self->userauth_algorithms = make_alist(0, -1);
	    
	    if (self->with_password)
	      {
		LIST(self->userauth_methods)[i++] = ATOM_PASSWORD;
		ALIST_SET(self->userauth_algorithms,
711
			  ATOM_PASSWORD,
712
			  &make_userauth_password(user_db)->super);
713
714
715
	      }
	    if (self->with_publickey)
	      {
716
717
718
		/* FIXME: Doesn't use spki */
		struct lookup_verifier *key_db
		  = make_authorization_db(ssh_format("authorized_keys_sha1"),
719
					  &crypto_sha1_algorithm);
720
		
721
722
723
		LIST(self->userauth_methods)[i++] = ATOM_PUBLICKEY;
		ALIST_SET(self->userauth_algorithms,
			  ATOM_PUBLICKEY,
724
			  &make_userauth_publickey
725
726
727
728
			  (user_db,
			   make_alist(2,
				      ATOM_SSH_DSS, key_db,
				      ATOM_SSH_RSA, key_db,
729
730
				      -1))
			  ->super);
731
732
	      }
	  }
733
734
735
736
737
738
        if (self->with_srp_keyexchange)
          ALIST_SET(self->userauth_algorithms,
                    ATOM_NONE,
                    &server_userauth_none.super);

        if (!self->userauth_algorithms->size)
739
	  argp_error(state, "All user authentication methods disabled.");
740

741
742
	break;
      }
743
    case 'p':
744
745
      /* FIXME: Interpret multiple -p:s as a request to listen on
       * several ports. */
746
747
748
749
750
751
752
753
      self->port = arg;
      break;

    case 'h':
      self->hostkey = arg;
      break;

    case OPT_INTERFACE:
754
      {
755
756
	const char *host;
	const char *port;
757

758
759
760
	/* On success, modifies arg destructively. */
	if (!parse_interface(arg, &host, &port))
	  argp_error(state, "Invalid interface, port or service: %s.", arg);
761

762
763
764
765
766
767
768
769
770
	if (!port)
	  port = self->port;
	
	if (!(port
	      ? io_resolv_address(host, port, 0, &self->local)
	      : io_resolv_address(host, "ssh", 22, &self->local)))
	  argp_failure(state, EXIT_FAILURE, 0,
		       "Address %s:%s could not be resolved.\n",
		       host, port ? port : "ssh");
771
772
      }
	
773
      break;
774

775
776
777
778
779
#if WITH_SSH1_FALLBACK
    case OPT_SSH1_FALLBACK:
      self->sshd1 = make_ssh1_fallback(arg ? arg : SSHD1);
      break;
#endif
Niels Möller's avatar
Niels Möller committed
780

781
782
783
784
785
786
787
788
789
790
791
792
793
794
795
796
    case OPT_SRP:
      self->with_srp_keyexchange = 1;
      break;

    case OPT_NO_SRP:
      self->with_srp_keyexchange = 0;
      break;
      
    case OPT_DH:
      self->with_dh_keyexchange = 1;
      break;

    case OPT_NO_DH:
      self->with_dh_keyexchange = 0;
      break;
      
797
798
799
800
801
802
803
804
805
806
807
808
809
810
811
    case OPT_PASSWORD:
      self->with_password = 1;
      break;
      
    case OPT_NO_PASSWORD:
      self->with_password = 0;
      break;

    case OPT_PUBLICKEY:
      self->with_publickey = 1;
      break;
      
    case OPT_NO_PUBLICKEY:
      self->with_publickey = 0;
      break;
812
813
814
815

    case OPT_ROOT_LOGIN:
      self->allow_root = 1;
      break;
816
817

    case OPT_KERBEROS_PASSWD:
818
      self->pw_helper = PATH_KERBEROS_HELPER;
819
820
821
822
823
      break;

    case OPT_NO_KERBEROS_PASSWD:
      self->pw_helper = NULL;
      break;
824
825
826
827

    case OPT_PASSWORD_HELPER:
      self->pw_helper = arg;
      break;
828
829
830
831

    case OPT_LOGIN_SHELL:
      self->login_shell = arg;
      break;
832
      
833
#if WITH_TCP_FORWARD
834
835
836
837
838
839
840
    case OPT_TCPIP_FORWARD:
      self->with_tcpip_forward = 1;
      break;

    case OPT_NO_TCPIP_FORWARD:
      self->with_tcpip_forward = 0;
      break;
841
#endif /* WITH_TCP_FORWARD */
842
843
844
845
846
847
848
849
#if WITH_X11_FORWARD
    case OPT_X11_FORWARD:
      self->with_x11_forward = 1;
      break;
    case OPT_NO_X11_FORWARD:
      self->with_x11_forward = 0;
      break;
#endif /* WITH_X11_FORWARD */
850
851
852
853
854
855
856
857
858
      
#if WITH_PTY_SUPPORT
    case OPT_PTY:
      self->with_pty = 1;
      break;
    case OPT_NO_PTY:
      self->with_pty = 0;
      break;
#endif /* WITH_PTY_SUPPORT */
859

860
861
862
863
864
865
866
867
868
869
870
871
872
873
#if WITH_TCPWRAPPERS
    case OPT_TCPWRAPPERS:
      self->tcp_wrapper_name = arg; /* Name given */
      break;
    case OPT_NO_TCPWRAPPERS:
      self->tcp_wrapper_name = NULL; /* Disable by giving name NULL */
      break;
      
    case OPT_TCPWRAP_GOAWAY_MSG:
      self->tcp_wrapper_message = arg;
      break;

#endif /* WITH_TCPWRAPPERS */

874
875
876
877
878
879
880
881
882
883
    case OPT_SUBSYSTEMS:
      self->subsystems = parse_subsystem_list(arg);
      if (!self->subsystems)
	argp_error(state, "Invalid subsystem list.");
      break;

    case OPT_NO_SUBSYSTEMS:
      self->subsystems = NULL;
      break;
      
884
885
886
    case OPT_DAEMONIC:
      self->daemonic = 1;
      break;
887
      
888
889
890
891
    case OPT_NO_DAEMONIC:
      self->daemonic = 0;
      break;

892
893
894
895
    case OPT_NO_SYSLOG:
      self->no_syslog = 1;
      break;
      
896
897
898
899
900
901
902
903
904
905
906
907
    case OPT_PIDFILE:
      self->pid_file = arg;
      self->use_pid_file = 1;
      break;

    case OPT_NO_PIDFILE:
      self->use_pid_file = 0;
      break;

    case OPT_CORE:
      self->corefile = 1;
      break;
908
909
910
    }
  return 0;
}
Niels Möller's avatar
Niels Möller committed
911

Niels Möller's avatar
Niels Möller committed
912
913
914
915
916
917
static const struct argp
main_argp =
{ main_options, main_argp_parser, 
  NULL,
  "Server for the ssh-2 protocol.",
  main_argp_children,
918
  NULL, NULL
Niels Möller's avatar
Niels Möller committed
919
920
};

921

922
923
/* GABA:
   (expr
924
     (name make_lshd_listen)
925
     (params
926
       (handshake object handshake_info)
927
       (init object make_kexinit)
928
       (services object command) )
929
     (expr (lambda (options)
930
             (let ((keys (options2keys options)))
931
	       (close_on_sighup options
932
	         (listen_list
933
934
935
936
937
	           (lambda (lv)
    	             (services (connection_handshake
    	           		  handshake
    	           		  (kexinit_filter init keys)
    	           		  keys 
938
				  (options2tcp_wrapper options lv))))
939
	           (options2local options) ))))))
940
941
*/

942

943
/* Invoked when starting the ssh-connection service */
944
945
/* GABA:
   (expr
946
     (name make_lshd_connection_service)
947
     (params
948
949
       (hooks object object_list))
     (expr
950
951
952
953
       (lambda (connection)
         ((progn hooks)
	    ; We have to initialize the connection
	    ; before adding handlers.
954
955
956
	    (init_connection_service
	      ; Disconnect if connection->user is NULL
	      (connection_require_userauth connection)))))))
957
958
*/

959
960
961
static void
do_terminate_callback(struct lsh_callback *s UNUSED)
{
962
  io_final();
963
964
965
966
967
968

  /* If we're using GCOV, just call exit(). That way, profiling info
   * is written properly when the process is terminated. */
#if !WITH_GCOV
  kill(getpid(), SIGKILL);
#endif
969
970
971
  exit(0);
}

972
static struct lsh_callback
973
sigterm_handler = { STATIC_HEADER, do_terminate_callback };
974
975

static void
976
install_signal_handlers(struct lshd_options *options)
977
{
978
979
980
  io_signal_handler(SIGTERM, &sigterm_handler);
  io_signal_handler(SIGHUP,
		    make_sighup_close_callback(options));
981
}
982

983
984
int
main(int argc, char **argv)
Niels Möller's avatar
Niels Möller committed
985
{
986
  struct lshd_options *options;
987

988
989
990
991
992
993
994
995
996
997
998
#if HAVE_SETRLIMIT && HAVE_SYS_RESOURCE_H
  /* Try to increase max number of open files, ignore any error */

  struct rlimit r;

  r.rlim_max = RLIM_INFINITY;
  r.rlim_cur = RLIM_INFINITY;

  setrlimit(RLIMIT_NOFILE, &r);
#endif

999
  io_init();
1000
  
Niels Möller's avatar
Niels Möller committed
1001
1002
1003
  /* For filtering messages. Could perhaps also be used when converting
   * strings to and from UTF8. */
  setlocale(LC_CTYPE, "");
1004

1005
1006
  /* FIXME: Choose character set depending on the locale */
  set_local_charset(CHARSET_LATIN1);
1007

1008

1009
  options = make_lshd_options();
1010
1011
1012

  if (!options)
    return EXIT_FAILURE;
1013
1014

  install_signal_handlers(options);
1015
  
Niels Möller's avatar
Niels Möller committed
1016
  trace("Parsing options...\n");
Niels Möller's avatar
Niels Möller committed
1017
  argp_parse(&main_argp, argc, argv, 0, NULL, options);
Niels Möller's avatar
Niels Möller committed
1018
  trace("Parsing options... done\n");  
1019

1020
1021
1022
1023
1024
  if (!options->corefile && !daemon_disable_core())
    {
      werror("Disabling of core dumps failed.\n");
      return EXIT_FAILURE;
    }
1025

1026
1027
1028
1029
1030
1031
  if (!options->random) 
    {
      werror("Failed to initialize randomness generator.\n");
      return EXIT_FAILURE;
    }
  
1032
  if (options->daemonic)
1033
    {
1034
1035
1036
1037
1038
1039
1040
1041
1042
1043
1044
1045
1046
1047
1048
      if (options->no_syslog)
        {
          /* Just put process into the background. --no-syslog is an
           * inappropriate name */
          switch (fork())
            {
            case 0:
              /* Child */
              /* FIXME: Should we create a new process group, close our tty
               * and stdio, etc? */
              trace("forked into background. New pid: %i.\n", getpid());
              break;
              
            case -1:
              /* Error */
1049
              werror("background_process: fork failed %e\n", errno);
1050
1051
1052
1053
1054
1055
1056
1057
1058
              break;
              
            default:
              /* Parent */
              _exit(EXIT_SUCCESS);
            }
        }
      else
        {
1059
#if HAVE_SYSLOG
1060
          set_error_syslog("lshd");
1061
#else /* !HAVE_SYSLOG */
1062
          werror("lshd: No syslog. Further messages will be directed to /dev/null.\n");
1063
1064
#endif /* !HAVE_SYSLOG */

1065
1066
1067
1068
1069
1070
1071
1072
1073
1074
1075
1076
1077
1078
1079
1080
          switch (daemon_init())
            {
            case 0:
              werror("lshd: Spawning into background failed.\n");
              return EXIT_FAILURE;
            case DAEMON_INETD:
              werror("lshd: spawning from inetd not yet supported.\n");
              return EXIT_FAILURE;
            case DAEMON_INIT:
            case DAEMON_NORMAL:
              break;
            default:
              fatal("Internal error\n");
            }
        }
    }
1081
  
1082
  if (options->use_pid_file)
1083
    {
1084
1085
1086
1087
1088
1089
1090
1091
      if (daemon_pidfile(options->pid_file))
	remember_resource(options->resources, 
			  make_pid_file_resource(options->pid_file));
      else
	{
	  werror("lshd seems to be running already.\n");
	  return EXIT_FAILURE;
	}
1092
    }
1093
  {
1094
    /* Commands to be invoked on the connection */
1095
    /* FIXME: Use a queue instead. */
1096
    struct object_list *connection_hooks;
1097
1098
    struct command *session_setup;
    
1099
1100
    /* Supported channel requests */
    struct alist *supported_channel_requests
1101
      = make_alist(2,
Niels Möller's avatar
Niels Möller committed
1102
1103
		   ATOM_SHELL, &shell_request_handler,
		   ATOM_EXEC, &exec_request_handler,
1104
1105
		   -1);
    
1106
1107
#if WITH_PTY_SUPPORT
    if (options->with_pty)
1108
1109
1110
1111
      {
        ALIST_SET(supported_channel_requests,
                  ATOM_PTY_REQ, &pty_request_handler.super);
        ALIST_SET(supported_channel_requests,
Niels Möller's avatar
Niels Möller committed
1112
                  ATOM_WINDOW_CHANGE, &window_change_request_handler.super);
1113
      }
1114
1115
#endif /* WITH_PTY_SUPPORT */

1116
1117
1118
1119
1120
1121
#if WITH_X11_FORWARD
      if (options->with_x11_forward)
        ALIST_SET(supported_channel_requests,
		  ATOM_X11_REQ, &x11_req_handler.super);
#endif /* WITH_X11_FORWARD */

1122
1123
1124
    if (options->subsystems)
      ALIST_SET(supported_channel_requests,
		ATOM_SUBSYSTEM,
1125
		&make_subsystem_handler(options->subsystems)->super);
1126
		
1127
1128
    session_setup = make_install_fix_channel_open_handler
      (ATOM_SESSION, make_open_session(supported_channel_requests));
1129
    
1130
#if WITH_TCP_FORWARD
1131
    if (options->with_tcpip_forward)
1132
      connection_hooks = make_object_list
1133
1134
	(4,
	 session_setup,
1135
	 make_tcpip_forward_hook(),
1136
1137
	 make_install_fix_global_request_handler
	 (ATOM_CANCEL_TCPIP_FORWARD, &tcpip_cancel_forward),
1138
	 make_direct_tcpip_hook(),
1139
	 -1);
1140
1141
    else
#endif
1142
1143
      connection_hooks
	= make_object_list (1, session_setup, -1);
1144
    {
1145
1146
      CAST_SUBTYPE(command, connection_service,
		   make_lshd_connection_service(connection_hooks));
1147
      CAST_SUBTYPE(command, server_listen, 		   
1148
		   make_lshd_listen
1149
		   (make_handshake_info(CONNECTION_SERVER,
1150
1151
1152
					"lsh - a free ssh",
					NULL,
					SSH_MAX_PACKET,
1153
					options->random,
1154
1155
					options->super.algorithms,
					options->sshd1),
1156
		    make_simple_kexinit
1157
		    (options->random,
1158
1159
1160
1161
1162
1163
		     options->kex_algorithms,
		     options->super.hostkey_algorithms,
		     options->super.crypto_algorithms,
		     options->super.mac_algorithms,
		     options->super.compression_algorithms,
		     make_int_list(0, -1)),
1164
1165
		    make_offer_service
		    (make_alist
1166
		     (1,
1167
1168
1169
1170
1171
1172
		      ATOM_SSH_USERAUTH,
		      make_userauth_service(options->userauth_methods,
					    options->userauth_algorithms,
					    make_alist(1, ATOM_SSH_CONNECTION,
						       connection_service,-1)),
		      -1))));
1173
1174
1175
1176
1177

      static const struct report_exception_info report =
	STATIC_REPORT_EXCEPTION_INFO(EXC_IO, EXC_IO,
				     "lshd: ");
	    
1178
      
1179
      COMMAND_CALL(server_listen, options,
1180
		   &discard_continuation,
1181
		   make_report_exception_handler
1182
		   (&report,
1183
		    options->e,
1184
		    HANDLER_CONTEXT));
1185
    }