lshd.c 31.3 KB
Newer Older
Niels Möller's avatar
Niels Möller committed
1 2
/* lshd.c
 *
3
 * Main server program.
4
 *
5
 */
Niels Möller's avatar
Niels Möller committed
6

7 8
/* lsh, an implementation of the ssh protocol
 *
9
 * Copyright (C) 1998, 1999, 2000, 2001, 2002, 2003, 2004 Niels Mller
10 11 12 13 14 15 16 17 18 19 20 21 22
 *
 * This program is free software; you can redistribute it and/or
 * modify it under the terms of the GNU General Public License as
 * published by the Free Software Foundation; either version 2 of the
 * License, or (at your option) any later version.
 *
 * This program is distributed in the hope that it will be useful, but
 * WITHOUT ANY WARRANTY; without even the implied warranty of
 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
 * General Public License for more details.
 *
 * You should have received a copy of the GNU General Public License
 * along with this program; if not, write to the Free Software
Niels Möller's avatar
Niels Möller committed
23
 * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA  02111-1307  USA
24
 */
Niels Möller's avatar
Niels Möller committed
25

26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49
#if HAVE_CONFIG_H
#include "config.h"
#endif

#include <assert.h>

#include <errno.h>
#include <locale.h>
#include <stdio.h>
/* #include <string.h> */

#include <sys/types.h>
#include <sys/stat.h>
#include <fcntl.h>
#if TIME_WITH_SYS_TIME && HAVE_SYS_TIME_H
#include <sys/time.h>
#endif
#if HAVE_SYS_RESOURCE_H
#include <sys/resource.h>
#endif
#if HAVE_UNISTD_H
#include <unistd.h>
#endif

50
#include "algorithms.h"
51 52
#include "alist.h"
#include "atoms.h"
53
#include "channel.h"
54
#include "channel_commands.h"
55
#include "charset.h"
56
#include "compress.h"
57
#include "connection_commands.h"
58
#include "crypto.h"
59
#include "daemon.h"
60
#include "environ.h"
61
#include "format.h"
62
#include "handshake.h"
Niels Möller's avatar
Niels Möller committed
63
#include "io.h"
64
#include "io_commands.h"
65
#include "lookup_verifier.h"
66
#include "randomness.h"
Niels Möller's avatar
Niels Möller committed
67
#include "reaper.h"
Niels Möller's avatar
Niels Möller committed
68
#include "server.h"
69
#include "server_authorization.h"
70
#include "server_keyexchange.h"
71 72
#include "server_pty.h"
#include "server_session.h"
Niels Möller's avatar
Niels Möller committed
73
#include "spki.h"
74
#include "srp.h"
Niels Möller's avatar
Niels Möller committed
75
#include "ssh.h"
76
#include "tcpforward.h"
77
#include "server_userauth.h"
78
#include "version.h"
79 80 81
#include "werror.h"
#include "xalloc.h"

82
#include "lsh_argp.h"
83

84 85 86 87
/* Forward declarations */
static struct install_info install_session_handler;
#define INSTALL_SESSION_HANDLER (&install_session_handler.super.super.super)

88 89
#include "lshd.c.x"

90

91 92
/* Option parsing */

93 94 95 96 97
const char *argp_program_version
= "lshd-" VERSION ", secsh protocol version " SERVER_PROTOCOL_VERSION;

const char *argp_program_bug_address = BUG_ADDRESS;

98
#define OPT_NO 0x400
99
#define OPT_INTERFACE 0x201
100

101
#define OPT_TCPIP_FORWARD 0x202
102
#define OPT_NO_TCPIP_FORWARD (OPT_TCPIP_FORWARD | OPT_NO)
103 104
#define OPT_PTY 0x203
#define OPT_NO_PTY (OPT_PTY | OPT_NO)
105 106
#define OPT_SUBSYSTEMS 0x204
#define OPT_NO_SUBSYSTEMS (OPT_SUBSYSTEMS | OPT_NO)
107

108
#define OPT_DAEMONIC 0x205
109
#define OPT_NO_DAEMONIC (OPT_DAEMONIC | OPT_NO)
110
#define OPT_PIDFILE 0x206
111 112
#define OPT_NO_PIDFILE (OPT_PIDFILE | OPT_NO)
#define OPT_CORE 0x207
113 114
#define OPT_SYSLOG 0x208
#define OPT_NO_SYSLOG (OPT_SYSLOG | OPT_NO)
115 116
#define OPT_X11_FORWARD 0x209
#define OPT_NO_X11_FORWARD (OPT_X11_FORWARD |OPT_NO)
117

118 119 120 121 122 123
#define OPT_SRP 0x210
#define OPT_NO_SRP (OPT_SRP | OPT_NO)
#define OPT_DH 0x211
#define OPT_NO_DH (OPT_DH | OPT_NO)

#define OPT_PUBLICKEY 0x220
124
#define OPT_NO_PUBLICKEY (OPT_PUBLICKEY | OPT_NO)
125
#define OPT_PASSWORD 0x221
126 127
#define OPT_NO_PASSWORD (OPT_PASSWORD | OPT_NO)

128
#define OPT_ROOT_LOGIN 0x222
129 130
#define OPT_NO_ROOT_LOGIN (OPT_ROOT_LOGIN | OPT_NO)

131 132 133
#define OPT_KERBEROS_PASSWD 0x223
#define OPT_NO_KERBEROS_PASSWD (OPT_KERBEROS_PASSWD | OPT_NO)

134 135
#define OPT_PASSWORD_HELPER 0x224

136 137
#define OPT_LOGIN_SHELL 0x225

138 139 140 141 142
#define OPT_TCPWRAPPERS 0x226
#define OPT_NO_TCPWRAPPERS 0x227

#define OPT_TCPWRAP_GOAWAY_MSG 0x228

143 144 145 146 147 148
#define OPT_LOGIN_AUTH_MODE 0x230
#define OPT_NO_LOGIN_AUTH_MODE (OPT_LOGIN_AUTH_MODE | OPT_NO)
#define OPT_LOGIN_AUTH_USER 0x231

#define OPT_BANNER_FILE 0x232

149 150 151 152 153
/* GABA:
   (class
     (name lshd_options)
     (super algorithms_options)
     (vars
154
       (reaper object reaper)
155
       (random object randomness)
156
       
157
       (signature_algorithms object alist)
158
       ;; Addresses to bind
159
       (local struct addr_queue)
160 161
       (port . "char *")
       (hostkey . "char *")
162 163
       (tcp_wrapper_name . "char *")
       (tcp_wrapper_message . "char *")
164

165 166 167 168 169
       (with_srp_keyexchange . int)
       (with_dh_keyexchange . int)

       ;; (kexinit object make_kexinit)
       (kex_algorithms object int_list)
170 171

       (with_loginauthmode . int)
172 173
       (with_publickey . int)
       (with_password . int)
174
       (allow_root . int)
175
       (pw_helper . "const char *")
176
       (login_shell . "const char *")
177
       ;; (loginauthmode_user . "const char *")
178 179

       (banner_file . "const char *")
180
       
181
       (with_tcpip_forward . int)
182
       (with_x11_forward . int)
183
       (with_pty . int)
184
       (subsystems . "const char **")
185
       
186 187 188
       (userauth_methods object int_list)
       (userauth_algorithms object alist)
       
189
       (daemonic . int)
190
       (no_syslog . int)
191 192 193
       (corefile . int)
       (pid_file . "const char *")
       ; -1 means use pid file iff we're in daemonic mode
194
       (use_pid_file . int)))
195 196
*/

197

Niels Möller's avatar
Niels Möller committed
198
static struct lshd_options *
199
make_lshd_options(void)
200
{
Niels Möller's avatar
Niels Möller committed
201
  NEW(lshd_options, self);
202

203
  init_algorithms_options(&self->super, all_symmetric_algorithms());
204

205
  self->reaper = make_reaper();
206
  self->random = make_system_random();
207

208 209
  /* OK to initialize with NULL */
  self->signature_algorithms = all_signature_algorithms(self->random);
210

211
  addr_queue_init(&self->local);
212
  
213 214 215 216
  /* Default behaviour is to lookup the "ssh" service, and fall back
   * to port 22 if that fails. */
  self->port = NULL;
  
217 218
  /* FIXME: this should perhaps use sysconfdir */  
  self->hostkey = "/etc/lsh_host_key";
219
  
220 221 222 223 224
  self->with_dh_keyexchange = 1;
  self->with_srp_keyexchange = 0;

  self->kex_algorithms = NULL;
  
225
  self->with_loginauthmode = 0;
226 227
  self->with_publickey = 1;
  self->with_password = 1;
228
  self->with_tcpip_forward = 1;
229 230
  /* Enabled by default. */
  self->with_x11_forward = 1;
231
  self->with_pty = 1;
232
  self->subsystems = NULL;
233 234

#if 0
235
  self->loginauthmode_user = NULL;
236
#endif
237 238
  self->banner_file = NULL;

239 240 241
  self->tcp_wrapper_name = "lshd";
  self->tcp_wrapper_message = NULL;

242
  self->allow_root = 0;
243
  self->pw_helper = NULL;
244
  self->login_shell = NULL;
245
  
246 247
  self->userauth_methods = NULL;
  self->userauth_algorithms = NULL;
248
  
249
  self->daemonic = 0;
250 251
  self->no_syslog = 0;
  
252 253 254 255
  /* FIXME: Make the default a configure time option? */
  self->pid_file = "/var/run/lshd.pid";
  self->use_pid_file = -1;
  self->corefile = 0;
256

257 258 259
  return self;
}

260 261 262 263 264 265 266 267 268 269 270 271 272 273 274 275
/* GABA:
   (class
     (name pid_file_resource)
     (super resource)
     (vars
       (file . "const char *")))
*/

static void
do_kill_pid_file(struct resource *s)
{
  CAST(pid_file_resource, self, s);
  if (self->super.alive)
    {
      self->super.alive = 0;
      if (unlink(self->file) < 0)
276
	werror("Unlinking pidfile failed %e\n", errno);
277 278 279 280 281 282 283 284 285 286 287 288 289 290 291 292 293 294
    }
}

static struct resource *
make_pid_file_resource(const char *file)
{
  NEW(pid_file_resource, self);
  init_resource(&self->super, do_kill_pid_file);
  self->file = file;

  return &self->super;
}

/* GABA:
   (class
     (name sighup_close_callback)
     (super lsh_callback)
     (vars
295
       (resource object resource)))
296 297 298 299 300 301 302 303 304
*/

static void
do_sighup_close_callback(struct lsh_callback *s)
{
  CAST(sighup_close_callback, self, s);
  unsigned nfiles;
  
  werror("SIGHUP received.\n");
305
  KILL_RESOURCE(self->resource);
306 307 308 309 310 311 312 313 314
  
  nfiles = io_nfiles();

  if (nfiles)
    werror("Waiting for active connections to terminate, "
	   "%i files still open.\n", nfiles);
}

static struct lsh_callback *
315
make_sighup_close_callback(struct resource *resource)
316 317 318
{
  NEW(sighup_close_callback, self);
  self->super.f = do_sighup_close_callback;
319
  self->resource = resource;
320 321 322 323

  return &self->super;
}

324 325 326 327 328
static const struct argp_option
main_options[] =
{
  /* Name, key, arg-name, flags, doc, group */
  { "interface", OPT_INTERFACE, "interface", 0,
329
    "Listen on this network interface.", 0 }, 
330 331
  { "port", 'p', "Port", 0, "Listen on this port.", 0 },
  { "host-key", 'h', "Key file", 0, "Location of the server's private key.", 0},
332 333
  { "banner-file", OPT_BANNER_FILE, "File name", 0, "Banner file to send before " "handshake.", 9 },

334 335 336 337 338 339 340 341
#if WITH_TCPWRAPPERS
  { NULL, 0, NULL, 0, "Connection filtering:", 0 },
  { "tcpwrappers", OPT_TCPWRAPPERS, "name", 0, "Set service name for tcp wrappers (default lshd)", 0 },
  { "no-tcpwrappers", OPT_NO_TCPWRAPPERS, NULL, 0, "Disable wrappers", 0 },
  { "tcpwrappers-msg", OPT_TCPWRAP_GOAWAY_MSG, "'Message'", 0, "Message sent to clients " 
    "who aren't allowed to connect. A newline will be added.", 0 },
#endif /* WITH_TCPWRAPPERS */

342
  { NULL, 0, NULL, 0, "Keyexchange options:", 0 },
343 344 345 346 347 348 349 350
#if WITH_SRP
  { "srp-keyexchange", OPT_SRP, NULL, 0, "Enable experimental SRP support.", 0 },
  { "no-srp-keyexchange", OPT_NO_SRP, NULL, 0, "Disable experimental SRP support (default).", 0 },
#endif /* WITH_SRP */

  { "dh-keyexchange", OPT_DH, NULL, 0, "Enable DH support (default).", 0 },
  { "no-dh-keyexchange", OPT_NO_DH, NULL, 0, "Disable DH support.", 0 },
  
351
  { NULL, 0, NULL, 0, "User authentication options:", 0 },
352

353 354
  { "login-auth-mode", OPT_LOGIN_AUTH_MODE, NULL, 0, 
    "Enable a telnet like mode (accept none-authentication and launch the" 
355
    "login-shell, making it responsible for authenticating the user).", 0 },
356 357 358 359

  { "no-login-auth-mode", OPT_NO_LOGIN_AUTH_MODE, NULL, 0, 
    "Disable login-auth-mode (default).", 0 },

360
#if 0
361 362 363
  { "login-auth-mode-user", OPT_LOGIN_AUTH_USER, "username", 0,
    "Run login-program as this user, defaults to the user "
    "who started lshd.", 0 },
364 365
#endif
  
366 367 368 369 370 371 372 373 374
  { "password", OPT_PASSWORD, NULL, 0,
    "Enable password user authentication (default).", 0},
  { "no-password", OPT_NO_PASSWORD, NULL, 0,
    "Disable password user authentication.", 0},

  { "publickey", OPT_PUBLICKEY, NULL, 0,
    "Enable publickey user authentication (default).", 0},
  { "no-publickey", OPT_NO_PUBLICKEY, NULL, 0,
    "Disable publickey user authentication.", 0},
375 376 377 378 379

  { "root-login", OPT_ROOT_LOGIN, NULL, 0,
    "Allow root to login.", 0 },
  { "no-root-login", OPT_NO_ROOT_LOGIN, NULL, 0,
    "Don't allow root to login (default).", 0 },
380

381 382 383 384
  { "login-shell", OPT_LOGIN_SHELL, "Program", 0,
    "Use this program as the login shell for all users. "
    "(Experimental)", 0 },
  
385 386
  { "kerberos-passwords", OPT_KERBEROS_PASSWD, NULL, 0,
    "Recognize kerberos passwords, using the helper program "
387
    "\"" PATH_KERBEROS_HELPER "\". This option is experimental.", 0 },
388
  { "no-kerberos-passwords", OPT_NO_KERBEROS_PASSWD, NULL, 0,
Niels Möller's avatar
Niels Möller committed
389
    "Don't recognize kerberos passwords (default behaviour).", 0 },
390

391 392
  { "password-helper", OPT_PASSWORD_HELPER, "Program", 0,
    "Use the named helper program for password verification. "
393
    "(Experimental).", 0 },
394

395
  { NULL, 0, NULL, 0, "Offered services:", 0 },
396

397 398 399 400
#if WITH_PTY_SUPPORT
  { "pty-support", OPT_PTY, NULL, 0, "Enable pty allocation (default).", 0 },
  { "no-pty-support", OPT_NO_PTY, NULL, 0, "Disable pty allocation.", 0 },
#endif /* WITH_PTY_SUPPORT */
401 402 403 404 405 406 407 408
#if WITH_TCP_FORWARD
  { "tcpip-forward", OPT_TCPIP_FORWARD, NULL, 0,
    "Enable tcpip forwarding (default).", 0 },
  { "no-tcpip-forward", OPT_NO_TCPIP_FORWARD, NULL, 0,
    "Disable tcpip forwarding.", 0 },
#endif /* WITH_TCP_FORWARD */
#if WITH_X11_FORWARD
  { "x11-forward", OPT_X11_FORWARD, NULL, 0,
409
    "Enable x11 forwarding (default).", 0 },
410
  { "no-x11-forward", OPT_NO_X11_FORWARD, NULL, 0,
411
    "Disable x11 forwarding.", 0 },
412 413
#endif /* WITH_X11_FORWARD */
  
414 415 416
  { "subsystems", OPT_SUBSYSTEMS, "List of subsystem names and programs", 0,
    "For example `sftp=/usr/sbin/sftp-server,foosystem=/usr/bin/foo' "
    "(experimental).", 0},
417
  
418 419
  { NULL, 0, NULL, 0, "Daemonic behaviour", 0 },
  { "daemonic", OPT_DAEMONIC, NULL, 0, "Run in the background, redirect stdio to /dev/null, and chdir to /.", 0 },
420
  { "no-daemonic", OPT_NO_DAEMONIC, NULL, 0, "Run in the foreground, with messages to stderr (default).", 0 },
421 422
  { "pid-file", OPT_PIDFILE, "file name", 0, "Create a pid file. When running in daemonic mode, "
    "the default is /var/run/lshd.pid.", 0 },
423
  { "no-pid-file", OPT_NO_PIDFILE, NULL, 0, "Don't use any pid file. Default in non-daemonic mode.", 0 },
424
  { "enable-core", OPT_CORE, NULL, 0, "Dump core on fatal errors (disabled by default).", 0 },
425 426
  { "no-syslog", OPT_NO_SYSLOG, NULL, 0, "Don't use syslog (by default, syslog is used "
    "when running in daemonic mode).", 0 },
427 428 429 430 431 432 433 434 435 436 437
  { NULL, 0, NULL, 0, NULL, 0 }
};

static const struct argp_child
main_argp_children[] =
{
  { &algorithms_argp, 0, "", 0 },
  { &werror_argp, 0, "", 0 },
  { NULL, 0, NULL, 0}
};

438 439 440 441 442 443 444 445 446 447 448 449 450 451 452 453 454 455 456 457 458 459 460 461 462 463 464 465 466 467 468 469 470 471 472 473 474 475 476 477 478 479 480 481 482 483 484 485 486
/* NOTE: Modifies the argument string. */
static const char **
parse_subsystem_list(char *arg)
{
  const char **subsystems;
  char *separator;
  unsigned length;
  unsigned i;
  
  /* First count the number of elements. */
  for (length = 1, i = 0; arg[i]; i++)
    if (arg[i] == ',')
      length++;

  subsystems = lsh_space_alloc((length * 2 + 1) * sizeof(*subsystems));

  for (i = 0; ; i++)
    {
      subsystems[2*i] = arg;

      separator = strchr(arg, '=');

      if (!separator)
	goto fail;

      *separator = '\0';

      subsystems[2*i+1] = arg = separator + 1;
      
      separator = strchr(arg, ',');

      if (i == (length - 1))
	break;
      
      if (!separator)
	goto fail;

      *separator = '\0';
      arg = separator + 1;
    }
  if (separator)
    {
    fail:
      lsh_space_free(subsystems);
      return NULL;
    }
  return subsystems;
}

487 488 489
/* NOTE: On success, modifies interface destructively. */
static int
parse_interface(char *interface, const char **host, const char **port)
490
{
491
  *port = NULL;
492 493 494 495
  
  if (interface[0] == '[')
    {
      /* A literal address */
496
      char *end;
497 498 499 500
      interface++;
      
      end = strchr(interface, ']');
      if (!end)
501
	return 0;
502 503 504 505

      switch (end[1])
	{
	case ':':
506
	  *port = end + 2;
507 508 509 510
	  break;
	case 0:
	  break;
	default:
511
	  return 0;
512
	}
513 514 515 516

      *host = interface;
      *end = 0;
      return 1;
517 518 519
    }
  else
    {
520
      char *end = strchr(interface, ':');
521 522
      if (end)
	{
523 524
	  *port = end + 1;
	  *end = 0;
525
	}
526 527
      *host = interface;
      return 1;
528 529 530
    }
}

531 532 533 534 535 536 537 538 539 540
static error_t
main_argp_parser(int key, char *arg, struct argp_state *state)
{
  CAST(lshd_options, self, state->input);
  
  switch(key)
    {
    default:
      return ARGP_ERR_UNKNOWN;
    case ARGP_KEY_INIT:
Niels Möller's avatar
Niels Möller committed
541 542
      state->child_inputs[0] = &self->super;
      state->child_inputs[1] = NULL;
543 544
      break;
    case ARGP_KEY_END:
545
      {
546
	struct user_db *user_db = NULL;
547
	
548 549
	if (!self->random)
	  argp_failure( state, EXIT_FAILURE, 0,  "No randomness generator available.");
550
	
551
       	if (self->with_password || self->with_publickey || self->with_srp_keyexchange)
552
	  user_db = make_unix_user_db(self->reaper,
553 554
				      self->pw_helper, self->login_shell,
				      self->allow_root);
555
	  
556 557 558 559
	if (self->with_dh_keyexchange || self->with_srp_keyexchange)
	  {
	    int i = 0;
	    self->kex_algorithms 
560
	      = alloc_int_list(2 * self->with_dh_keyexchange + self->with_srp_keyexchange);
561 562 563
	    
	    if (self->with_dh_keyexchange)
	      {
564 565 566
		LIST(self->kex_algorithms)[i++] = ATOM_DIFFIE_HELLMAN_GROUP14_SHA1;
		ALIST_SET(self->super.algorithms,
			  ATOM_DIFFIE_HELLMAN_GROUP14_SHA1,
567 568
			  &make_dh_server(make_dh14(self->random))
			  ->super);
569

570 571 572
		LIST(self->kex_algorithms)[i++] = ATOM_DIFFIE_HELLMAN_GROUP1_SHA1;
		ALIST_SET(self->super.algorithms,
			  ATOM_DIFFIE_HELLMAN_GROUP1_SHA1,
573
			  &make_dh_server(make_dh1(self->random))
574
			  ->super);
575 576 577 578
	      }
#if WITH_SRP	    
	    if (self->with_srp_keyexchange)
	      {
579
		assert(user_db);
580
		LIST(self->kex_algorithms)[i++] = ATOM_SRP_RING1_SHA1_LOCAL;
581
		ALIST_SET(self->super.algorithms,
582
			  ATOM_SRP_RING1_SHA1_LOCAL,
583
			  &make_srp_server(make_srp1(self->random),
584
					   user_db)
585
			  ->super);
586 587 588 589 590 591
	      }
#endif /* WITH_SRP */
	  }
	else
	  argp_error(state, "All keyexchange algorithms disabled.");

592
	if (addr_queue_is_empty(&self->local))
593 594 595
	  {
	    /* Default interface */

596 597 598 599
	    if (!(self->port
		  ? io_resolv_address(NULL, self->port, 0, &self->local)
		  : io_resolv_address(NULL, "ssh", 22, &self->local)))
		
600 601 602
	      argp_failure(state, EXIT_FAILURE, 0,
			   "Strange. Could not resolve the ANY address.");
	  }
603
	assert(!addr_queue_is_empty(&self->local));
604
	
605 606 607
	if (self->use_pid_file < 0)
	  self->use_pid_file = self->daemonic;

608 609
	self->userauth_algorithms = make_alist(0, -1);

610 611 612 613 614 615 616 617 618 619 620
	if (self->with_password || self->with_publickey)
	  {
	    int i = 0;
	    
	    self->userauth_methods
	      = alloc_int_list(self->with_password + self->with_publickey);
	    
	    if (self->with_password)
	      {
		LIST(self->userauth_methods)[i++] = ATOM_PASSWORD;
		ALIST_SET(self->userauth_algorithms,
621
			  ATOM_PASSWORD,
622
			  &make_userauth_password(user_db)->super);
623 624 625
	      }
	    if (self->with_publickey)
	      {
626 627 628
		/* FIXME: Doesn't use spki */
		struct lookup_verifier *key_db
		  = make_authorization_db(ssh_format("authorized_keys_sha1"),
629
					  &crypto_sha1_algorithm);
630
		
631 632 633
		LIST(self->userauth_methods)[i++] = ATOM_PUBLICKEY;
		ALIST_SET(self->userauth_algorithms,
			  ATOM_PUBLICKEY,
634
			  &make_userauth_publickey
635 636 637 638
			  (user_db,
			   make_alist(2,
				      ATOM_SSH_DSS, key_db,
				      ATOM_SSH_RSA, key_db,
639 640
				      -1))
			  ->super);
641 642
	      }
	  }
643 644


645 646 647
        if (self->with_srp_keyexchange)
          ALIST_SET(self->userauth_algorithms,
                    ATOM_NONE,
648 649 650
		    /* username must match the name from the key
		       exchange */		    
                    &server_userauth_none_preauth.super);
651 652
	else if (self->with_loginauthmode)
	  {
653
	    const char *name;
654 655

	    USER_NAME_FROM_ENV(name);
656 657 658
	    if (!name)
	      argp_failure(state, EXIT_FAILURE, 0,
			   "$LOGNAME not set in the environment.\n");
659 660 661

	    ALIST_SET(self->userauth_algorithms,
		      ATOM_NONE,
662 663 664 665 666 667
		      &make_userauth_none_permit
		      (make_unix_user_self(make_string(name),
					   self->reaper,
					   /* Make home dir configurable? */
					   "/",
					   self->login_shell))->super);
668 669
	  }

670
        if (!self->userauth_algorithms->size)
671
	  argp_error(state, "All user authentication methods disabled.");
672

673 674
	break;
      }
675
    case 'p':
676 677
      /* FIXME: Interpret multiple -p:s as a request to listen on
       * several ports. */
678 679 680 681 682 683 684 685
      self->port = arg;
      break;

    case 'h':
      self->hostkey = arg;
      break;

    case OPT_INTERFACE:
686
      {
687 688
	const char *host;
	const char *port;
689

690 691 692
	/* On success, modifies arg destructively. */
	if (!parse_interface(arg, &host, &port))
	  argp_error(state, "Invalid interface, port or service: %s.", arg);
693

694 695 696 697 698 699 700 701 702
	if (!port)
	  port = self->port;
	
	if (!(port
	      ? io_resolv_address(host, port, 0, &self->local)
	      : io_resolv_address(host, "ssh", 22, &self->local)))
	  argp_failure(state, EXIT_FAILURE, 0,
		       "Address %s:%s could not be resolved.\n",
		       host, port ? port : "ssh");
703 704
      }
	
705
      break;
706

707 708 709 710 711 712 713 714 715 716 717 718 719 720 721 722
    case OPT_SRP:
      self->with_srp_keyexchange = 1;
      break;

    case OPT_NO_SRP:
      self->with_srp_keyexchange = 0;
      break;
      
    case OPT_DH:
      self->with_dh_keyexchange = 1;
      break;

    case OPT_NO_DH:
      self->with_dh_keyexchange = 0;
      break;
      
723 724 725 726 727 728 729 730 731 732 733 734 735 736 737
    case OPT_PASSWORD:
      self->with_password = 1;
      break;
      
    case OPT_NO_PASSWORD:
      self->with_password = 0;
      break;

    case OPT_PUBLICKEY:
      self->with_publickey = 1;
      break;
      
    case OPT_NO_PUBLICKEY:
      self->with_publickey = 0;
      break;
738

739 740 741 742 743 744 745 746
    case OPT_LOGIN_AUTH_MODE:
      self->with_loginauthmode = 1;
      break;

    case OPT_NO_LOGIN_AUTH_MODE:
      self->with_loginauthmode = 0;
      break;

747
#if 0
748 749 750
    case OPT_LOGIN_AUTH_USER:
      self->loginauthmode_user = arg;
      break;
751 752
#endif
      
753 754 755 756
    case OPT_BANNER_FILE:
      self->banner_file = arg;
      break;

757 758 759
    case OPT_ROOT_LOGIN:
      self->allow_root = 1;
      break;
760 761

    case OPT_KERBEROS_PASSWD:
762
      self->pw_helper = PATH_KERBEROS_HELPER;
763 764 765 766 767
      break;

    case OPT_NO_KERBEROS_PASSWD:
      self->pw_helper = NULL;
      break;
768 769 770 771

    case OPT_PASSWORD_HELPER:
      self->pw_helper = arg;
      break;
772 773 774 775

    case OPT_LOGIN_SHELL:
      self->login_shell = arg;
      break;
776
      
777
#if WITH_TCP_FORWARD
778 779 780 781 782 783 784
    case OPT_TCPIP_FORWARD:
      self->with_tcpip_forward = 1;
      break;

    case OPT_NO_TCPIP_FORWARD:
      self->with_tcpip_forward = 0;
      break;
785
#endif /* WITH_TCP_FORWARD */
786 787 788 789 790 791 792 793
#if WITH_X11_FORWARD
    case OPT_X11_FORWARD:
      self->with_x11_forward = 1;
      break;
    case OPT_NO_X11_FORWARD:
      self->with_x11_forward = 0;
      break;
#endif /* WITH_X11_FORWARD */
794 795 796 797 798 799 800 801 802
      
#if WITH_PTY_SUPPORT
    case OPT_PTY:
      self->with_pty = 1;
      break;
    case OPT_NO_PTY:
      self->with_pty = 0;
      break;
#endif /* WITH_PTY_SUPPORT */
803

804 805 806 807 808 809 810 811 812 813 814 815 816 817
#if WITH_TCPWRAPPERS
    case OPT_TCPWRAPPERS:
      self->tcp_wrapper_name = arg; /* Name given */
      break;
    case OPT_NO_TCPWRAPPERS:
      self->tcp_wrapper_name = NULL; /* Disable by giving name NULL */
      break;
      
    case OPT_TCPWRAP_GOAWAY_MSG:
      self->tcp_wrapper_message = arg;
      break;

#endif /* WITH_TCPWRAPPERS */

818 819 820 821 822 823 824 825 826 827
    case OPT_SUBSYSTEMS:
      self->subsystems = parse_subsystem_list(arg);
      if (!self->subsystems)
	argp_error(state, "Invalid subsystem list.");
      break;

    case OPT_NO_SUBSYSTEMS:
      self->subsystems = NULL;
      break;
      
828 829 830
    case OPT_DAEMONIC:
      self->daemonic = 1;
      break;
831
      
832 833 834 835
    case OPT_NO_DAEMONIC:
      self->daemonic = 0;
      break;

836 837 838 839
    case OPT_NO_SYSLOG:
      self->no_syslog = 1;
      break;
      
840 841 842 843 844 845 846 847 848 849 850 851
    case OPT_PIDFILE:
      self->pid_file = arg;
      self->use_pid_file = 1;
      break;

    case OPT_NO_PIDFILE:
      self->use_pid_file = 0;
      break;

    case OPT_CORE:
      self->corefile = 1;
      break;
852 853 854
    }
  return 0;
}
Niels Möller's avatar
Niels Möller committed
855

Niels Möller's avatar
Niels Möller committed
856 857 858 859 860 861
static const struct argp
main_argp =
{ main_options, main_argp_parser, 
  NULL,
  "Server for the ssh-2 protocol.",
  main_argp_children,
862
  NULL, NULL
Niels Möller's avatar
Niels Möller committed
863 864
};

865

866 867 868
static void
do_terminate_callback(struct lsh_callback *s UNUSED)
{
869
  io_final();
870 871 872 873 874 875

  /* If we're using GCOV, just call exit(). That way, profiling info
   * is written properly when the process is terminated. */
#if !WITH_GCOV
  kill(getpid(), SIGKILL);
#endif
876 877 878
  exit(0);
}

879
static struct lsh_callback
880
sigterm_handler = { STATIC_HEADER, do_terminate_callback };
881 882

static void
883
install_signal_handlers(struct resource *resource)
884
{
885 886
  io_signal_handler(SIGTERM, &sigterm_handler);
  io_signal_handler(SIGHUP,
887 888 889
		    make_sighup_close_callback(resource));
}

890 891 892 893 894 895 896 897 898 899 900 901 902 903 904 905
static void
do_exc_lshd_handler(struct exception_handler *self,
		    const struct exception *e)
{
  if (e->type & EXC_IO)
    {
      CAST_SUBTYPE(io_exception, exc, e);
      
      werror("%z, (errno = %i)\n", e->msg, exc->error);
    }
  else
    EXCEPTION_RAISE(self->parent, e);
}

static struct exception_handler lshd_exception_handler
= STATIC_EXCEPTION_HANDLER(do_exc_lshd_handler, &default_exception_handler);
906 907 908 909 910 911 912 913 914 915 916 917 918 919 920 921 922

/* Invoked when starting the ssh-connection service */
/* GABA:
   (expr
     (name lshd_connection_service)
     (params
       (hooks object object_list))
     (expr
       (lambda (connection)
         ((progn hooks)
	    ; We have to initialize the connection
	    ; before adding handlers.
	    (init_connection_service
	      ; Disconnect if connection->user is NULL
	      (connection_require_userauth connection)))))))
*/

923 924 925 926 927 928 929
static struct command *
make_lshd_connection_service(struct lshd_options *options)
{
  /* Commands to be invoked on the connection */
  /* FIXME: Use a queue instead. */
  struct object_list *connection_hooks;
  struct command *session_setup;
930 931
  struct alist *supported_channel_requests;

932
  /* Supported channel requests */
933 934 935 936 937 938


  supported_channel_requests = make_alist(2,
					  ATOM_SHELL, &shell_request_handler,
					  ATOM_EXEC, &exec_request_handler,
					  -1);
939 940 941 942 943 944 945 946 947 948 949 950 951 952 953 954 955 956 957 958 959 960 961 962 963 964 965 966 967 968 969 970 971 972 973 974 975 976
    
#if WITH_PTY_SUPPORT
  if (options->with_pty)
    {
      ALIST_SET(supported_channel_requests,
		ATOM_PTY_REQ, &pty_request_handler.super);
      ALIST_SET(supported_channel_requests,
		ATOM_WINDOW_CHANGE, &window_change_request_handler.super);
    }
#endif /* WITH_PTY_SUPPORT */

#if WITH_X11_FORWARD
  if (options->with_x11_forward)
    ALIST_SET(supported_channel_requests,
	      ATOM_X11_REQ, &x11_req_handler.super);
#endif /* WITH_X11_FORWARD */
  
  if (options->subsystems)
    ALIST_SET(supported_channel_requests,
	      ATOM_SUBSYSTEM,
	      &make_subsystem_handler(options->subsystems)->super);
  
  session_setup = make_install_fix_channel_open_handler
    (ATOM_SESSION, make_open_session(supported_channel_requests));
  
#if WITH_TCP_FORWARD
  if (options->with_tcpip_forward)
    connection_hooks = make_object_list
      (4,
       session_setup,
       make_tcpip_forward_hook(),
       make_install_fix_global_request_handler
       (ATOM_CANCEL_TCPIP_FORWARD, &tcpip_cancel_forward),
       make_direct_tcpip_hook(),
       -1);
  else
#endif
    connection_hooks
977
      = make_object_list (1, session_setup, -1); 
978 979 980 981 982 983 984 985

  {
    CAST_SUBTYPE(command, connection_service,
		 lshd_connection_service(connection_hooks));
    return connection_service;
  }
}

986 987 988
/* Command to install session handler */
static struct install_info install_session_handler =
STATIC_INSTALL_OPEN_HANDLER(ATOM_SESSION);
989

990 991 992 993 994
/* Invoked when starting the ssh-connection service */ 
/* GABA: 
   (expr 
     (name lshd_login_service) 
     (params
995
       (handler object channel_open))
996 997
     (expr 
       (lambda (connection) 
998 999 1000 1001 1002 1003 1004 1005
         (install_session_handler
            ; We have to initialize the connection 
	    ; before adding handlers.
	    (init_connection_service
	      ; The fix user object is installed by the
	      ; userauth "none" handler.
	      (connection_require_userauth connection))
	    handler))))
1006
*/ 
1007
  
1008 1009 1010 1011
static struct command *
make_lshd_login_service(struct lshd_options *options)
{
  struct alist *supported_channel_requests;
1012
  
1013 1014 1015
#if WITH_PTY_SUPPORT
  if (options->with_pty)
    {
1016 1017 1018 1019 1020 1021
      supported_channel_requests
	= make_alist(3,
		     ATOM_SHELL, &shell_request_handler,
		     ATOM_PTY_REQ, &pty_request_handler.super,
		     ATOM_WINDOW_CHANGE, &window_change_request_handler.super,
		     -1);
1022
    }
Niels Möller's avatar