lshd.c 17 KB
Newer Older
Niels Möller's avatar
Niels Möller committed
1
2
3
/* lshd.c
 *
 * main server program.
4
5
 *
 * $Id$ */
Niels Möller's avatar
Niels Möller committed
6

7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
/* lsh, an implementation of the ssh protocol
 *
 * Copyright (C) 1998 Niels Mller
 *
 * This program is free software; you can redistribute it and/or
 * modify it under the terms of the GNU General Public License as
 * published by the Free Software Foundation; either version 2 of the
 * License, or (at your option) any later version.
 *
 * This program is distributed in the hope that it will be useful, but
 * WITHOUT ANY WARRANTY; without even the implied warranty of
 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
 * General Public License for more details.
 *
 * You should have received a copy of the GNU General Public License
 * along with this program; if not, write to the Free Software
Niels Möller's avatar
Niels Möller committed
23
 * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA  02111-1307  USA
24
 */
Niels Möller's avatar
Niels Möller committed
25

26
#include "algorithms.h"
27
28
#include "alist.h"
#include "atoms.h"
29
#include "channel.h"
30
#include "channel_commands.h"
31
#include "charset.h"
32
#include "compress.h"
33
#include "connection_commands.h"
34
#include "crypto.h"
35
#include "daemon.h"
36
#include "format.h"
Niels Möller's avatar
Niels Möller committed
37
#include "io.h"
38
#include "io_commands.h"
39
#include "lookup_verifier.h"
40
#include "randomness.h"
Niels Möller's avatar
Niels Möller committed
41
#include "reaper.h"
Niels Möller's avatar
Niels Möller committed
42
#include "server.h"
43
#include "server_authorization.h"
44
#include "server_keyexchange.h"
45
46
#include "server_pty.h"
#include "server_session.h"
47
#include "sexp.h"
Balázs Scheidler's avatar
Balázs Scheidler committed
48
#include "sexp_commands.h"
49
#include "spki_commands.h"
Niels Möller's avatar
Niels Möller committed
50
#include "ssh.h"
51
52
#include "tcpforward.h"
#include "tcpforward_commands.h"
53
#include "tcpforward_commands.h"
54
#include "server_userauth.h"
55
#include "version.h"
56
57
58
#include "werror.h"
#include "xalloc.h"

59
#include "lsh_argp.h"
60

61
62
63
64
65
66
67
68
69
70
71
/* Forward declarations */
struct command_simple options2local;
#define OPTIONS2LOCAL (&options2local.super.super)

static struct command options2keyfile;
#define OPTIONS2KEYFILE (&options2keyfile.super)

struct command_simple options2signature_algorithms;
#define OPTIONS2SIGNATURE_ALGORITHMS \
  (&options2signature_algorithms.super.super)

72
73
74
75
76
77
78
79
80
81
82
83
#include "lshd.c.x"

#include <assert.h>

#include <errno.h>
#include <locale.h>
#include <stdio.h>
#include <string.h>

#include <sys/types.h>
#include <sys/stat.h>
#include <fcntl.h>
84
#if HAVE_UNISTD_H
85
#include <unistd.h>
86
#endif
87

88
/* Block size for stdout and stderr buffers */
Niels Möller's avatar
Niels Möller committed
89
90
#define BLOCK_SIZE 32768

91
92
93

/* Option parsing */

94
95
96
97
98
const char *argp_program_version
= "lshd-" VERSION ", secsh protocol version " SERVER_PROTOCOL_VERSION;

const char *argp_program_bug_address = BUG_ADDRESS;

99
#define OPT_NO 0x400
100
101
#define OPT_SSH1_FALLBACK 0x200
#define OPT_INTERFACE 0x201
102

103
#define OPT_TCPIP_FORWARD 0x202
104
#define OPT_NO_TCPIP_FORWARD (OPT_TCPIP_FORWARD | OPT_NO)
105
106
#define OPT_PTY 0x203
#define OPT_NO_PTY (OPT_PTY | OPT_NO)
107

108
#define OPT_DAEMONIC 0x204
109
#define OPT_NO_DAEMONIC (OPT_DAEMONIC | OPT_NO)
110
#define OPT_PIDFILE 0x205
111
112
#define OPT_NO_PIDFILE (OPT_PIDFILE | OPT_NO)
#define OPT_CORE 0x207
113

114
115
116
117
118
#define OPT_PUBLICKEY 0x208
#define OPT_NO_PUBLICKEY (OPT_PUBLICKEY | OPT_NO)
#define OPT_PASSWORD 0x209
#define OPT_NO_PASSWORD (OPT_PASSWORD | OPT_NO)

119
120
121
#define OPT_ROOT_LOGIN 0x20A
#define OPT_NO_ROOT_LOGIN (OPT_ROOT_LOGIN | OPT_NO)

122
123
124
125
126
/* GABA:
   (class
     (name lshd_options)
     (super algorithms_options)
     (vars
127
128
       (backend object io_backend)
       (signature_algorithms object alist)
129
130
131
132
133
       (style . sexp_argp_state)
       (interface . "char *")
       (port . "char *")
       (hostkey . "char *")
       (local object address_info)
134
135
136

       (with_publickey . int)
       (with_password . int)
137
138
       (allow_root . int)

139
       (with_tcpip_forward . int)
140
       (with_pty . int)
141
       
142
143
144
       (userauth_methods object int_list)
       (userauth_algorithms object alist)
       
145
146
147
148
149
150
       (sshd1 object ssh1_fallback)
       (daemonic . int)
       (corefile . int)
       (pid_file . "const char *")
       ; -1 means use pid file iff we're in daemonic mode
       (use_pid_file . int)))
151
152
*/

Niels Möller's avatar
Niels Möller committed
153
static struct lshd_options *
154
155
156
make_lshd_options(struct io_backend *backend,
		  struct randomness *random,
		  struct alist *algorithms)
157
{
Niels Möller's avatar
Niels Möller committed
158
  NEW(lshd_options, self);
159
160

  init_algorithms_options(&self->super, algorithms);
161
162
163
164
165

  self->backend = backend;
  self->signature_algorithms
    = make_alist(1,
		 ATOM_DSA, make_dsa_algorithm(random), -1);
166
167
  self->style = SEXP_TRANSPORT;
  self->interface = NULL;
168
169
170
171
172

  /* Default behaviour is to lookup the "ssh" service, and fall back
   * to port 22 if that fails. */
  self->port = NULL;
  
173
174
175
176
  /* FIXME: this should perhaps use sysconfdir */  
  self->hostkey = "/etc/lsh_host_key";
  self->local = NULL;

177
178
  self->with_publickey = 1;
  self->with_password = 1;
179
  self->with_tcpip_forward = 1;
180
  self->with_pty = 1;
181
182
  self->allow_root = 0;
  
183
184
  self->userauth_methods = NULL;
  self->userauth_algorithms = NULL;
185
186
  
  self->sshd1 = NULL;
187
188
189
190
191
192
  self->daemonic = 0;

  /* FIXME: Make the default a configure time option? */
  self->pid_file = "/var/run/lshd.pid";
  self->use_pid_file = -1;
  self->corefile = 0;
193
194
195
196
  
  return self;
}

Niels Möller's avatar
Niels Möller committed
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
/* Port to listen on */
COMMAND_SIMPLE(options2local)
{
  CAST(lshd_options, options, a);
  return &options->local->super;
}

/* alist of signature algorithms */
COMMAND_SIMPLE(options2signature_algorithms)
{
  CAST(lshd_options, options, a);
  return &options->signature_algorithms->super;
}

/* Read server's private key */
static void
do_options2keyfile(struct command *ignored UNUSED,
		   struct lsh_object *a,
		   struct command_continuation *c,
		   struct exception_handler *e)
{
  CAST(lshd_options, options, a);
  
220
  struct lsh_fd *f;
Niels Möller's avatar
Niels Möller committed
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237

  f = io_read_file(options->backend, options->hostkey, e);

  if (f)
    COMMAND_RETURN(c, f);
  else
    {
      werror("Failed to open '%z' (errno = %i): %z.\n",
	     options->hostkey, errno, STRERROR(errno));
      EXCEPTION_RAISE(e, make_io_exception(EXC_IO_OPEN_READ, NULL, errno, NULL));
    }
}

static struct command options2keyfile =
STATIC_COMMAND(do_options2keyfile);


238
239
240
241
242
243
244
245
246
247
248
249
250
251
static const struct argp_option
main_options[] =
{
  /* Name, key, arg-name, flags, doc, group */
  { "interface", OPT_INTERFACE, "interface", 0,
    "Listen on this network interface", 0 }, 
  { "port", 'p', "Port", 0, "Listen on this port.", 0 },
  { "host-key", 'h', "Key file", 0, "Location of the server's private key.", 0},

#if WITH_SSH1_FALLBACK
  { "ssh1-fallback", OPT_SSH1_FALLBACK, "File name", OPTION_ARG_OPTIONAL,
    "Location of the sshd1 program, for falling back to version 1 of the Secure Shell protocol.", 0 },
#endif /* WITH_SSH1_FALLBACK */

252
253
254
255
256
257
258
259
260
  { "password", OPT_PASSWORD, NULL, 0,
    "Enable password user authentication (default).", 0},
  { "no-password", OPT_NO_PASSWORD, NULL, 0,
    "Disable password user authentication.", 0},

  { "publickey", OPT_PUBLICKEY, NULL, 0,
    "Enable publickey user authentication (default).", 0},
  { "no-publickey", OPT_NO_PUBLICKEY, NULL, 0,
    "Disable publickey user authentication.", 0},
261
262
263
264
265

  { "root-login", OPT_ROOT_LOGIN, NULL, 0,
    "Allow root to login.", 0 },
  { "no-root-login", OPT_NO_ROOT_LOGIN, NULL, 0,
    "Don't allow root to login (default).", 0 },
266
  
267
268
269
270
271
#if WITH_TCP_FORWARD
  { "tcp-forward", OPT_TCPIP_FORWARD, NULL, 0, "Enable tcpip forwarding (default).", 0 },
  { "no-tcp-forward", OPT_NO_TCPIP_FORWARD, NULL, 0, "Disable tcpip forwarding.", 0 },
#endif /* WITH_TCP_FORWARD */

272
273
274
275
#if WITH_PTY_SUPPORT
  { "pty-support", OPT_PTY, NULL, 0, "Enable pty allocation (default).", 0 },
  { "no-pty-support", OPT_NO_PTY, NULL, 0, "Disable pty allocation.", 0 },
#endif /* WITH_PTY_SUPPORT */
276
  
277
278
  { NULL, 0, NULL, 0, "Daemonic behaviour", 0 },
  { "daemonic", OPT_DAEMONIC, NULL, 0, "Run in the background, redirect stdio to /dev/null, and chdir to /.", 0 },
279
  { "no-daemonic", OPT_NO_DAEMONIC, NULL, 0, "Run in the foreground, with messages to stderr (default).", 0 },
280
281
  { "pid-file", OPT_PIDFILE, "file name", 0, "Create a pid file. When running in daemonic mode, "
    "the default is /var/run/lshd.pid.", 0 },
282
  { "no-pid-file", OPT_NO_PIDFILE, NULL, 0, "Don't use any pid file. Default in non-daemonic mode.", 0 },
283
284
  { "enable-core", OPT_CORE, NULL, 0, "Dump core on fatal errors (disabled by default).", 0 },
    
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
  { NULL, 0, NULL, 0, NULL, 0 }
};

static const struct argp_child
main_argp_children[] =
{
  { &sexp_input_argp, 0, "", 0 },
  { &algorithms_argp, 0, "", 0 },
  { &werror_argp, 0, "", 0 },
  { NULL, 0, NULL, 0}
};

static error_t
main_argp_parser(int key, char *arg, struct argp_state *state)
{
  CAST(lshd_options, self, state->input);
  
  switch(key)
    {
    default:
      return ARGP_ERR_UNKNOWN;
    case ARGP_KEY_INIT:
      state->child_inputs[0] = &self->style;
      state->child_inputs[1] = &self->super;
309
      state->child_inputs[2] = NULL;
310
      break;
311
#if 0
312
313
314
    case ARGP_KEY_ARG:
      argp_error(state, "Spurious arguments.");
      break;
315
#endif  
316
    case ARGP_KEY_END:
317
318
319
320
321
      if (self->port)
	self->local = make_address_info_c(arg, self->port, 0);
      else
	self->local = make_address_info_c(arg, "ssh", 22);
      
322
323
324
325
      if (!self->local)
	argp_error(state, "Invalid interface, port or service, %s:%s'.",
		   self->interface ? self->interface : "ANY",
		   self->port);
326
327
      if (self->use_pid_file < 0)
	self->use_pid_file = self->daemonic;
328
329
330
331

      if (self->with_password || self->with_publickey)
	{
	  int i = 0;
332
333
	  struct user_db *db = make_unix_user_db(self->allow_root);
	  
334
335
336
337
338
339
340
341
	  self->userauth_methods
	    = alloc_int_list(self->with_password + self->with_publickey);
	  self->userauth_algorithms = make_alist(0, -1);

	  if (self->with_password)
	    {
	      LIST(self->userauth_methods)[i++] = ATOM_PASSWORD;
	      ALIST_SET(self->userauth_algorithms,
342
			ATOM_PASSWORD, make_userauth_password(db));
343
344
345
346
347
348
349
350
	    }
	  if (self->with_publickey)
	    {
	      /* Doesn't use spki */
	      LIST(self->userauth_methods)[i++] = ATOM_PUBLICKEY;
	      ALIST_SET(self->userauth_algorithms,
			ATOM_PUBLICKEY,
			make_userauth_publickey
351
352
			(db,
			 make_alist(1,
353
354
355
356
357
358
359
360
361
				    ATOM_SSH_DSS,
				    make_authorization_db(ssh_format("authorized_keys_sha1"),
							  &sha1_algorithm),
				    
				    -1)));
	    }
	}
      else
	argp_error(state, "All user authentication methods disabled.");
362
      
363
364
365
366
367
368
369
370
371
372
373
374
375
      break;
      
    case 'p':
      self->port = arg;
      break;

    case 'h':
      self->hostkey = arg;
      break;

    case OPT_INTERFACE:
      self->interface = arg;
      break;
376

377
378
379
380
381
#if WITH_SSH1_FALLBACK
    case OPT_SSH1_FALLBACK:
      self->sshd1 = make_ssh1_fallback(arg ? arg : SSHD1);
      break;
#endif
Niels Möller's avatar
Niels Möller committed
382

383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
    case OPT_PASSWORD:
      self->with_password = 1;
      break;
      
    case OPT_NO_PASSWORD:
      self->with_password = 0;
      break;

    case OPT_PUBLICKEY:
      self->with_publickey = 1;
      break;
      
    case OPT_NO_PUBLICKEY:
      self->with_publickey = 0;
      break;
398
399
400
401

    case OPT_ROOT_LOGIN:
      self->allow_root = 1;
      break;
402
      
403
#if WITH_TCP_FORWARD
404
405
406
407
408
409
410
    case OPT_TCPIP_FORWARD:
      self->with_tcpip_forward = 1;
      break;

    case OPT_NO_TCPIP_FORWARD:
      self->with_tcpip_forward = 0;
      break;
411
412
413
414
415
416
417
418
419
420
421
#endif /* WITH_TCP_FORWARD */
      
#if WITH_PTY_SUPPORT
    case OPT_PTY:
      self->with_pty = 1;
      break;
    case OPT_NO_PTY:
      self->with_pty = 0;
      break;
#endif /* WITH_PTY_SUPPORT */
	  
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
    case OPT_DAEMONIC:
      self->daemonic = 1;
      break;

    case OPT_NO_DAEMONIC:
      self->daemonic = 0;
      break;

    case OPT_PIDFILE:
      self->pid_file = arg;
      self->use_pid_file = 1;
      break;

    case OPT_NO_PIDFILE:
      self->use_pid_file = 0;
      break;

    case OPT_CORE:
      self->corefile = 1;
      break;
442
443
444
    }
  return 0;
}
Niels Möller's avatar
Niels Möller committed
445

Niels Möller's avatar
Niels Möller committed
446
447
448
449
450
451
static const struct argp
main_argp =
{ main_options, main_argp_parser, 
  NULL,
  "Server for the ssh-2 protocol.",
  main_argp_children,
452
  NULL, NULL
Niels Möller's avatar
Niels Möller committed
453
454
};

455

456
457
458
459
460
/* GABA:
   (expr
     (name lshd_listen)
     (params
       (listen object command)
461
       (handshake object handshake_info)
462
       (services object command) )
463
464
465
466
467
468
     (expr (lambda (options)
             (services (connection_handshake
	                    handshake
			    (spki_read_hostkeys (options2signature_algorithms options)
			                        (options2keyfile options))
			    (log_peer (listen (options2local options))))))))
469
470
*/

471
/* Invoked when the client requests the userauth service. */
472
473
/* GABA:
   (expr
474
475
     (name lshd_services)
     (params 
476
       (userauth object command))
477
478
479
480
481
     (expr
       (lambda (connection)
         ((userauth connection) connection))))
*/

482
/* Invoked when starting the ssh-connection service */
483
484
/* GABA:
   (expr
485
     (name lshd_connection_service)
486
     (params
487
488
489
490
       (login object command)     
       (hooks object object_list))
     (expr
       (lambda (user connection)
491
492
493
         ((progn hooks) (login user
	                       ; We have to initialize the connection
			       ; before logging in.
494
	                       (init_connection_service connection))))))
495
496
*/

497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
static void
do_lshd_default_handler(struct exception_handler *s,
			const struct exception *e)
{
  switch(e->type)
    {
    case EXC_SEXP_SYNTAX:
    case EXC_SPKI_TYPE:
      werror("lshd: %z\n", e->msg);
      exit(EXIT_FAILURE);
    default:
      EXCEPTION_RAISE(s->parent, e);
    }
}

Niels Möller's avatar
Niels Möller committed
512
static struct exception_handler *
513
514
515
516
517
518
make_lshd_exception_handler(struct exception_handler *parent,
			    const char *context)
{
  return make_exception_handler(do_lshd_default_handler, parent, context);
}

Niels Möller's avatar
Niels Möller committed
519
520
int main(int argc, char **argv)
{
521
  struct lshd_options *options;
522
  
Niels Möller's avatar
Niels Möller committed
523
524
  struct reap *reaper;
  
525
526
  struct randomness *r;
  struct alist *algorithms;
527
  
528
  /* FIXME: Why not allocate backend statically? */
529
  NEW(io_backend, backend);
530
  init_backend(backend);
531

Niels Möller's avatar
Niels Möller committed
532
533
534
  /* For filtering messages. Could perhaps also be used when converting
   * strings to and from UTF8. */
  setlocale(LC_CTYPE, "");
535
536
  /* FIXME: Choose character set depending on the locale */
  set_local_charset(CHARSET_LATIN1);
537
538

  r = make_reasonably_random();
Niels Möller's avatar
Niels Möller committed
539
  
540
  algorithms = many_algorithms(1,
541
542
			       ATOM_DIFFIE_HELLMAN_GROUP1_SHA1,
			       make_dh_server(make_dh1(r)),
543
			       -1);
544
545
  
  options = make_lshd_options(backend, r, algorithms);
546
  
Niels Möller's avatar
Niels Möller committed
547
  argp_parse(&main_argp, argc, argv, 0, NULL, options);
548

549
550
551
552
553
554
555
556
557
558
559
560
561
562
563
564
565
566
567
568
569
570
571
572
573
574
575
576
577
578
  if (!options->corefile && !daemon_disable_core())
    {
      werror("Disabling of core dumps failed.\n");
      return EXIT_FAILURE;
    }
  
  if (options->daemonic)
    {
#if HAVE_SYSLOG
      set_error_syslog("lshd");
#else /* !HAVE_SYSLOG */
      werror("lshd: No syslog. Further messages will be directed to /dev/null.\n");
#endif /* !HAVE_SYSLOG */
    }

  if (options->daemonic)
    switch (daemon_init())
      {
      case 0:
	werror("lshd: Spawning into background failed.\n");
	return EXIT_FAILURE;
      case DAEMON_INETD:
	werror("lshd: spawning from inetd not yet supported.\n");
	return EXIT_FAILURE;
      case DAEMON_INIT:
      case DAEMON_NORMAL:
	break;
      default:
	fatal("Internal error\n");
      }
579
580
581
582
583
584
  
  if (options->use_pid_file && !daemon_pidfile(options->pid_file))
    {
      werror("lshd seems to be running already.\n");
      return EXIT_FAILURE;
    }
585
  
Niels Möller's avatar
Niels Möller committed
586
  reaper = make_reaper();
587
  
588
  {
589
590
    /* Commands to be invoked on the connection */
    struct object_list *connection_hooks;
591

592
593
    /* Supported channel requests */
    struct alist *supported_channel_requests
594
595
596
      = make_alist(2,
		   ATOM_SHELL, make_shell_handler(backend, reaper),
		   ATOM_EXEC, make_exec_handler(backend, reaper),
597
598
599
		   -1);
    
    
600
#if WITH_TCP_FORWARD
601
    if (options->with_tcpip_forward)
602
603
      connection_hooks = make_object_list
	(3,
Niels Möller's avatar
Niels Möller committed
604
	 make_tcpip_forward_hook(backend),
605
606
607
608
	 make_install_fix_global_request_handler
	 (ATOM_CANCEL_TCPIP_FORWARD, &tcpip_cancel_forward),
	 make_direct_tcpip_hook(backend),
	 -1);
609
610
    else
#endif
611
      connection_hooks = make_object_list(0, -1);
612
613
614
615
616
#if WITH_PTY_SUPPORT
    if (options->with_pty)
      ALIST_SET(supported_channel_requests,
		ATOM_PTY_REQ, make_pty_handler());
#endif /* WITH_PTY_SUPPORT */
617
    {
618
619
620
621
      /* FIXME: We should check that we have at least one host key.
       * We should also extract the host-key algorithms for which we have keys,
       * instead of hardcoding ssh-dss below. */
 
622
623
      struct lsh_object *o = lshd_listen
	(make_simple_listen(backend, NULL),
624
625
	 make_handshake_info(CONNECTION_SERVER,
			     "lsh - a free ssh",
626
			     NULL,
627
628
629
			     SSH_MAX_PACKET,
			     r,
			     algorithms,
Niels Möller's avatar
Niels Möller committed
630
631
632
633
634
635
636
637
638
			     make_simple_kexinit(
			       r,
			       make_int_list(1, ATOM_DIFFIE_HELLMAN_GROUP1_SHA1,
					     -1),
			       make_int_list(1, ATOM_SSH_DSS, -1),
			       options->super.crypto_algorithms,
			       options->super.mac_algorithms,
			       options->super.compression_algorithms,
			       make_int_list(0, -1)),
639
			     options->sshd1),
640
641
642
643
	 make_offer_service
	 (make_alist
	  (1, ATOM_SSH_USERAUTH,
	   lshd_services(make_userauth_service
644
645
			 (options->userauth_methods,
			  options->userauth_algorithms,
646
			  make_alist(1, ATOM_SSH_CONNECTION,
647
				     lshd_connection_service
648
				     (make_server_connection_service(supported_channel_requests),
649
				      connection_hooks),
650
651
				     -1))),
	   -1)));
652
    
653
      CAST_SUBTYPE(command, server_listen, o);
654
    
655
      COMMAND_CALL(server_listen, options,
656
		   &discard_continuation,
657
658
659
660
661
		   make_report_exception_handler
		   (make_report_exception_info(EXC_IO, EXC_IO, "lshd: "),
		    make_lshd_exception_handler(&default_exception_handler,
						HANDLER_CONTEXT),
		    HANDLER_CONTEXT));
662
    }
663
  }
Niels Möller's avatar
Niels Möller committed
664
  
665
  reaper_run(reaper, backend);
Niels Möller's avatar
Niels Möller committed
666
667
668

  return 0;
}