lshd.c 16.1 KB
Newer Older
Niels Möller's avatar
Niels Möller committed
1
2
3
/* lshd.c
 *
 * main server program.
4
5
 *
 * $Id$ */
Niels Möller's avatar
Niels Möller committed
6

7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
/* lsh, an implementation of the ssh protocol
 *
 * Copyright (C) 1998 Niels Mller
 *
 * This program is free software; you can redistribute it and/or
 * modify it under the terms of the GNU General Public License as
 * published by the Free Software Foundation; either version 2 of the
 * License, or (at your option) any later version.
 *
 * This program is distributed in the hope that it will be useful, but
 * WITHOUT ANY WARRANTY; without even the implied warranty of
 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
 * General Public License for more details.
 *
 * You should have received a copy of the GNU General Public License
 * along with this program; if not, write to the Free Software
Niels Möller's avatar
Niels Möller committed
23
 * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA  02111-1307  USA
24
 */
Niels Möller's avatar
Niels Möller committed
25

26
#include "algorithms.h"
27
28
#include "alist.h"
#include "atoms.h"
29
#include "channel.h"
30
#include "channel_commands.h"
31
#include "charset.h"
32
#include "compress.h"
33
#include "connection_commands.h"
34
#include "crypto.h"
35
#include "daemon.h"
36
#include "format.h"
Niels Möller's avatar
Niels Möller committed
37
#include "io.h"
38
#include "io_commands.h"
39
#include "lookup_verifier.h"
40
#include "randomness.h"
Niels Möller's avatar
Niels Möller committed
41
#include "reaper.h"
Niels Möller's avatar
Niels Möller committed
42
#include "server.h"
43
#include "server_authorization.h"
44
#include "server_keyexchange.h"
45
46
#include "server_pty.h"
#include "server_session.h"
47
#include "sexp.h"
Balázs Scheidler's avatar
Balázs Scheidler committed
48
#include "sexp_commands.h"
49
#include "spki_commands.h"
Niels Möller's avatar
Niels Möller committed
50
#include "ssh.h"
51
52
#include "tcpforward.h"
#include "tcpforward_commands.h"
53
#include "tcpforward_commands.h"
54
#include "server_userauth.h"
55
56
57
#include "werror.h"
#include "xalloc.h"

58
#include "lsh_argp.h"
59

60
61
62
63
64
65
66
67
68
69
70
/* Forward declarations */
struct command_simple options2local;
#define OPTIONS2LOCAL (&options2local.super.super)

static struct command options2keyfile;
#define OPTIONS2KEYFILE (&options2keyfile.super)

struct command_simple options2signature_algorithms;
#define OPTIONS2SIGNATURE_ALGORITHMS \
  (&options2signature_algorithms.super.super)

71
72
73
74
75
76
77
78
79
80
81
82
#include "lshd.c.x"

#include <assert.h>

#include <errno.h>
#include <locale.h>
#include <stdio.h>
#include <string.h>

#include <sys/types.h>
#include <sys/stat.h>
#include <fcntl.h>
83
#if HAVE_UNISTD_H
84
#include <unistd.h>
85
#endif
86

87
/* Block size for stdout and stderr buffers */
Niels Möller's avatar
Niels Möller committed
88
89
#define BLOCK_SIZE 32768

90
91
92

/* Option parsing */

93
#define OPT_NO 0x400
94
95
#define OPT_SSH1_FALLBACK 0x200
#define OPT_INTERFACE 0x201
96

97
#define OPT_TCPIP_FORWARD 0x202
98
#define OPT_NO_TCPIP_FORWARD (OPT_TCPIP_FORWARD | OPT_NO)
99
100
#define OPT_PTY 0x203
#define OPT_NO_PTY (OPT_PTY | OPT_NO)
101

102
#define OPT_DAEMONIC 0x204
103
#define OPT_NO_DAEMONIC (OPT_DAEMONIC | OPT_NO)
104
#define OPT_PIDFILE 0x205
105
106
#define OPT_NO_PIDFILE (OPT_PIDFILE | OPT_NO)
#define OPT_CORE 0x207
107

108
109
110
111
112
#define OPT_PUBLICKEY 0x208
#define OPT_NO_PUBLICKEY (OPT_PUBLICKEY | OPT_NO)
#define OPT_PASSWORD 0x209
#define OPT_NO_PASSWORD (OPT_PASSWORD | OPT_NO)

113
114
115
116
117
/* GABA:
   (class
     (name lshd_options)
     (super algorithms_options)
     (vars
118
119
       (backend object io_backend)
       (signature_algorithms object alist)
120
121
122
123
124
       (style . sexp_argp_state)
       (interface . "char *")
       (port . "char *")
       (hostkey . "char *")
       (local object address_info)
125
126
127

       (with_publickey . int)
       (with_password . int)
128
       (with_tcpip_forward . int)
129
       (with_pty . int)
130
131
132
133

       (userauth_methods object int_list)
       (userauth_algorithms object alist)
       
134
135
136
137
138
139
       (sshd1 object ssh1_fallback)
       (daemonic . int)
       (corefile . int)
       (pid_file . "const char *")
       ; -1 means use pid file iff we're in daemonic mode
       (use_pid_file . int)))
140
141
*/

Niels Möller's avatar
Niels Möller committed
142
static struct lshd_options *
143
144
145
make_lshd_options(struct io_backend *backend,
		  struct randomness *random,
		  struct alist *algorithms)
146
{
Niels Möller's avatar
Niels Möller committed
147
  NEW(lshd_options, self);
148
149

  init_algorithms_options(&self->super, algorithms);
150
151
152
153
154

  self->backend = backend;
  self->signature_algorithms
    = make_alist(1,
		 ATOM_DSA, make_dsa_algorithm(random), -1);
155
156
157
158
159
160
161
  self->style = SEXP_TRANSPORT;
  self->interface = NULL;
  self->port = "ssh";
  /* FIXME: this should perhaps use sysconfdir */  
  self->hostkey = "/etc/lsh_host_key";
  self->local = NULL;

162
163
  self->with_publickey = 1;
  self->with_password = 1;
164
  self->with_tcpip_forward = 1;
165
  self->with_pty = 1;
166
167
168

  self->userauth_methods = NULL;
  self->userauth_algorithms = NULL;
169
170
  
  self->sshd1 = NULL;
171
172
173
174
175
176
  self->daemonic = 0;

  /* FIXME: Make the default a configure time option? */
  self->pid_file = "/var/run/lshd.pid";
  self->use_pid_file = -1;
  self->corefile = 0;
177
178
179
180
  
  return self;
}

Niels Möller's avatar
Niels Möller committed
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
/* Port to listen on */
COMMAND_SIMPLE(options2local)
{
  CAST(lshd_options, options, a);
  return &options->local->super;
}

/* alist of signature algorithms */
COMMAND_SIMPLE(options2signature_algorithms)
{
  CAST(lshd_options, options, a);
  return &options->signature_algorithms->super;
}

/* Read server's private key */
static void
do_options2keyfile(struct command *ignored UNUSED,
		   struct lsh_object *a,
		   struct command_continuation *c,
		   struct exception_handler *e)
{
  CAST(lshd_options, options, a);
  
  struct io_fd *f;

  f = io_read_file(options->backend, options->hostkey, e);

  if (f)
    COMMAND_RETURN(c, f);
  else
    {
      werror("Failed to open '%z' (errno = %i): %z.\n",
	     options->hostkey, errno, STRERROR(errno));
      EXCEPTION_RAISE(e, make_io_exception(EXC_IO_OPEN_READ, NULL, errno, NULL));
    }
}

static struct command options2keyfile =
STATIC_COMMAND(do_options2keyfile);


222
223
224
225
226
227
228
229
230
231
232
233
234
235
static const struct argp_option
main_options[] =
{
  /* Name, key, arg-name, flags, doc, group */
  { "interface", OPT_INTERFACE, "interface", 0,
    "Listen on this network interface", 0 }, 
  { "port", 'p', "Port", 0, "Listen on this port.", 0 },
  { "host-key", 'h', "Key file", 0, "Location of the server's private key.", 0},

#if WITH_SSH1_FALLBACK
  { "ssh1-fallback", OPT_SSH1_FALLBACK, "File name", OPTION_ARG_OPTIONAL,
    "Location of the sshd1 program, for falling back to version 1 of the Secure Shell protocol.", 0 },
#endif /* WITH_SSH1_FALLBACK */

236
237
238
239
240
241
242
243
244
245
  { "password", OPT_PASSWORD, NULL, 0,
    "Enable password user authentication (default).", 0},
  { "no-password", OPT_NO_PASSWORD, NULL, 0,
    "Disable password user authentication.", 0},

  { "publickey", OPT_PUBLICKEY, NULL, 0,
    "Enable publickey user authentication (default).", 0},
  { "no-publickey", OPT_NO_PUBLICKEY, NULL, 0,
    "Disable publickey user authentication.", 0},
  
246
247
248
249
250
#if WITH_TCP_FORWARD
  { "tcp-forward", OPT_TCPIP_FORWARD, NULL, 0, "Enable tcpip forwarding (default).", 0 },
  { "no-tcp-forward", OPT_NO_TCPIP_FORWARD, NULL, 0, "Disable tcpip forwarding.", 0 },
#endif /* WITH_TCP_FORWARD */

251
252
253
254
#if WITH_PTY_SUPPORT
  { "pty-support", OPT_PTY, NULL, 0, "Enable pty allocation (default).", 0 },
  { "no-pty-support", OPT_NO_PTY, NULL, 0, "Disable pty allocation.", 0 },
#endif /* WITH_PTY_SUPPORT */
255
  
256
257
  { NULL, 0, NULL, 0, "Daemonic behaviour", 0 },
  { "daemonic", OPT_DAEMONIC, NULL, 0, "Run in the background, redirect stdio to /dev/null, and chdir to /.", 0 },
258
  { "no-daemonic", OPT_NO_DAEMONIC, NULL, 0, "Run in the foreground, with messages to stderr (default).", 0 },
259
260
  { "pid-file", OPT_PIDFILE, "file name", 0, "Create a pid file. When running in daemonic mode, "
    "the default is /var/run/lshd.pid.", 0 },
261
  { "no-pid-file", OPT_NO_PIDFILE, NULL, 0, "Don't use any pid file. Default in non-daemonic mode.", 0 },
262
263
  { "enable-core", OPT_CORE, NULL, 0, "Dump core on fatal errors (disabled by default).", 0 },
    
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
  { NULL, 0, NULL, 0, NULL, 0 }
};

static const struct argp_child
main_argp_children[] =
{
  { &sexp_input_argp, 0, "", 0 },
  { &algorithms_argp, 0, "", 0 },
  { &werror_argp, 0, "", 0 },
  { NULL, 0, NULL, 0}
};

static error_t
main_argp_parser(int key, char *arg, struct argp_state *state)
{
  CAST(lshd_options, self, state->input);
  
  switch(key)
    {
    default:
      return ARGP_ERR_UNKNOWN;
    case ARGP_KEY_INIT:
      state->child_inputs[0] = &self->style;
      state->child_inputs[1] = &self->super;
288
      state->child_inputs[2] = NULL;
289
290
291
292
293
294
295
      break;
    case ARGP_KEY_ARG:
      argp_error(state, "Spurious arguments.");
      break;
      
    case ARGP_KEY_END:
      self->local = make_address_info_c(self->interface, self->port);
296

297
298
299
300
      if (!self->local)
	argp_error(state, "Invalid interface, port or service, %s:%s'.",
		   self->interface ? self->interface : "ANY",
		   self->port);
301
302
      if (self->use_pid_file < 0)
	self->use_pid_file = self->daemonic;
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333

      if (self->with_password || self->with_publickey)
	{
	  int i = 0;
	  self->userauth_methods
	    = alloc_int_list(self->with_password + self->with_publickey);
	  self->userauth_algorithms = make_alist(0, -1);

	  if (self->with_password)
	    {
	      LIST(self->userauth_methods)[i++] = ATOM_PASSWORD;
	      ALIST_SET(self->userauth_algorithms,
			ATOM_PASSWORD, &unix_userauth.super);
	    }
	  if (self->with_publickey)
	    {
	      /* Doesn't use spki */
	      LIST(self->userauth_methods)[i++] = ATOM_PUBLICKEY;
	      ALIST_SET(self->userauth_algorithms,
			ATOM_PUBLICKEY,
			make_userauth_publickey
			(make_alist(1,
				    ATOM_SSH_DSS,
				    make_authorization_db(ssh_format("authorized_keys_sha1"),
							  &sha1_algorithm),
				    
				    -1)));
	    }
	}
      else
	argp_error(state, "All user authentication methods disabled.");
334
      
335
336
337
338
339
340
341
342
343
344
345
346
347
      break;
      
    case 'p':
      self->port = arg;
      break;

    case 'h':
      self->hostkey = arg;
      break;

    case OPT_INTERFACE:
      self->interface = arg;
      break;
348

349
350
351
352
353
#if WITH_SSH1_FALLBACK
    case OPT_SSH1_FALLBACK:
      self->sshd1 = make_ssh1_fallback(arg ? arg : SSHD1);
      break;
#endif
Niels Möller's avatar
Niels Möller committed
354

355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
    case OPT_PASSWORD:
      self->with_password = 1;
      break;
      
    case OPT_NO_PASSWORD:
      self->with_password = 0;
      break;

    case OPT_PUBLICKEY:
      self->with_publickey = 1;
      break;
      
    case OPT_NO_PUBLICKEY:
      self->with_publickey = 0;
      break;
      
371
#if WITH_TCP_FORWARD
372
373
374
375
376
377
378
    case OPT_TCPIP_FORWARD:
      self->with_tcpip_forward = 1;
      break;

    case OPT_NO_TCPIP_FORWARD:
      self->with_tcpip_forward = 0;
      break;
379
380
381
382
383
384
385
386
387
388
389
#endif /* WITH_TCP_FORWARD */
      
#if WITH_PTY_SUPPORT
    case OPT_PTY:
      self->with_pty = 1;
      break;
    case OPT_NO_PTY:
      self->with_pty = 0;
      break;
#endif /* WITH_PTY_SUPPORT */
	  
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
    case OPT_DAEMONIC:
      self->daemonic = 1;
      break;

    case OPT_NO_DAEMONIC:
      self->daemonic = 0;
      break;

    case OPT_PIDFILE:
      self->pid_file = arg;
      self->use_pid_file = 1;
      break;

    case OPT_NO_PIDFILE:
      self->use_pid_file = 0;
      break;

    case OPT_CORE:
      self->corefile = 1;
      break;
410
411
412
    }
  return 0;
}
Niels Möller's avatar
Niels Möller committed
413

Niels Möller's avatar
Niels Möller committed
414
415
416
417
418
419
static const struct argp
main_argp =
{ main_options, main_argp_parser, 
  NULL,
  "Server for the ssh-2 protocol.",
  main_argp_children,
420
  NULL, NULL
Niels Möller's avatar
Niels Möller committed
421
422
};

423

424
425
426
427
428
/* GABA:
   (expr
     (name lshd_listen)
     (params
       (listen object command)
429
       (handshake object handshake_info)
430
       (services object command) )
431
432
433
434
435
436
     (expr (lambda (options)
             (services (connection_handshake
	                    handshake
			    (spki_read_hostkeys (options2signature_algorithms options)
			                        (options2keyfile options))
			    (log_peer (listen (options2local options))))))))
437
438
*/

439
/* Invoked when the client requests the userauth service. */
440
441
/* GABA:
   (expr
442
443
     (name lshd_services)
     (params 
444
       (userauth object command))
445
446
447
448
449
     (expr
       (lambda (connection)
         ((userauth connection) connection))))
*/

450
/* Invoked when starting the ssh-connection service */
451
452
/* GABA:
   (expr
453
     (name lshd_connection_service)
454
     (params
455
456
457
458
       (login object command)     
       (hooks object object_list))
     (expr
       (lambda (user connection)
459
460
461
         ((progn hooks) (login user
	                       ; We have to initialize the connection
			       ; before logging in.
462
	                       (init_connection_service connection))))))
463
464
*/

465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
static void
do_lshd_default_handler(struct exception_handler *s,
			const struct exception *e)
{
  switch(e->type)
    {
    case EXC_SEXP_SYNTAX:
    case EXC_SPKI_TYPE:
      werror("lshd: %z\n", e->msg);
      exit(EXIT_FAILURE);
    default:
      EXCEPTION_RAISE(s->parent, e);
    }
}

Niels Möller's avatar
Niels Möller committed
480
static struct exception_handler *
481
482
483
484
485
486
make_lshd_exception_handler(struct exception_handler *parent,
			    const char *context)
{
  return make_exception_handler(do_lshd_default_handler, parent, context);
}

Niels Möller's avatar
Niels Möller committed
487
488
int main(int argc, char **argv)
{
489
  struct lshd_options *options;
490
  
Niels Möller's avatar
Niels Möller committed
491
492
  struct reap *reaper;
  
493
494
  struct randomness *r;
  struct alist *algorithms;
495
  
496
  /* FIXME: Why not allocate backend statically? */
497
  NEW(io_backend, backend);
498
  init_backend(backend);
499

Niels Möller's avatar
Niels Möller committed
500
501
502
  /* For filtering messages. Could perhaps also be used when converting
   * strings to and from UTF8. */
  setlocale(LC_CTYPE, "");
503
504
  /* FIXME: Choose character set depending on the locale */
  set_local_charset(CHARSET_LATIN1);
505
506

  r = make_reasonably_random();
Niels Möller's avatar
Niels Möller committed
507
  
508
  algorithms = many_algorithms(1,
509
510
			       ATOM_DIFFIE_HELLMAN_GROUP1_SHA1,
			       make_dh_server(make_dh1(r)),
511
			       -1);
512
513
  
  options = make_lshd_options(backend, r, algorithms);
514
  
Niels Möller's avatar
Niels Möller committed
515
  argp_parse(&main_argp, argc, argv, 0, NULL, options);
516

517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
532
533
534
535
536
537
538
539
540
541
542
543
544
545
546
  if (!options->corefile && !daemon_disable_core())
    {
      werror("Disabling of core dumps failed.\n");
      return EXIT_FAILURE;
    }
  
  if (options->daemonic)
    {
#if HAVE_SYSLOG
      set_error_syslog("lshd");
#else /* !HAVE_SYSLOG */
      werror("lshd: No syslog. Further messages will be directed to /dev/null.\n");
#endif /* !HAVE_SYSLOG */
    }

  if (options->daemonic)
    switch (daemon_init())
      {
      case 0:
	werror("lshd: Spawning into background failed.\n");
	return EXIT_FAILURE;
      case DAEMON_INETD:
	werror("lshd: spawning from inetd not yet supported.\n");
	return EXIT_FAILURE;
      case DAEMON_INIT:
      case DAEMON_NORMAL:
	break;
      default:
	fatal("Internal error\n");
      }
547
548
549
550
551
552
  
  if (options->use_pid_file && !daemon_pidfile(options->pid_file))
    {
      werror("lshd seems to be running already.\n");
      return EXIT_FAILURE;
    }
553
  
Niels Möller's avatar
Niels Möller committed
554
  reaper = make_reaper();
555
  
556
  {
557
558
    /* Commands to be invoked on the connection */
    struct object_list *connection_hooks;
559

560
561
562
563
564
565
566
567
    /* Supported channel requests */
    struct alist *supported_channel_requests
      = make_alist(1,
		   ATOM_SHELL, make_shell_handler(backend,
						  reaper),
		   -1);
    
    
568
#if WITH_TCP_FORWARD
569
    if (options->with_tcpip_forward)
570
571
      connection_hooks = make_object_list
	(3,
Niels Möller's avatar
Niels Möller committed
572
	 make_tcpip_forward_hook(backend),
573
574
575
576
	 make_install_fix_global_request_handler
	 (ATOM_CANCEL_TCPIP_FORWARD, &tcpip_cancel_forward),
	 make_direct_tcpip_hook(backend),
	 -1);
577
578
    else
#endif
579
      connection_hooks = make_object_list(0, -1);
580
581
582
583
584
#if WITH_PTY_SUPPORT
    if (options->with_pty)
      ALIST_SET(supported_channel_requests,
		ATOM_PTY_REQ, make_pty_handler());
#endif /* WITH_PTY_SUPPORT */
585
    {
586
587
588
589
      /* FIXME: We should check that we have at least one host key.
       * We should also extract the host-key algorithms for which we have keys,
       * instead of hardcoding ssh-dss below. */
 
590
591
      struct lsh_object *o = lshd_listen
	(make_simple_listen(backend, NULL),
592
593
594
595
596
	 make_handshake_info(CONNECTION_SERVER,
			     "lsh - a free ssh",
			     SSH_MAX_PACKET,
			     r,
			     algorithms,
Niels Möller's avatar
Niels Möller committed
597
598
599
600
601
602
603
604
605
			     make_simple_kexinit(
			       r,
			       make_int_list(1, ATOM_DIFFIE_HELLMAN_GROUP1_SHA1,
					     -1),
			       make_int_list(1, ATOM_SSH_DSS, -1),
			       options->super.crypto_algorithms,
			       options->super.mac_algorithms,
			       options->super.compression_algorithms,
			       make_int_list(0, -1)),
606
			     options->sshd1),
607
608
609
610
	 make_offer_service
	 (make_alist
	  (1, ATOM_SSH_USERAUTH,
	   lshd_services(make_userauth_service
611
612
			 (options->userauth_methods,
			  options->userauth_algorithms,
613
			  make_alist(1, ATOM_SSH_CONNECTION,
614
				     lshd_connection_service
615
				     (make_server_connection_service(supported_channel_requests),
616
				      connection_hooks),
617
618
				     -1))),
	   -1)));
619
    
620
      CAST_SUBTYPE(command, server_listen, o);
621
    
622
      COMMAND_CALL(server_listen, options,
623
624
		   &discard_continuation,
		   make_report_exception_handler(EXC_IO, EXC_IO, "lshd: ",
625
626
						 make_lshd_exception_handler(&default_exception_handler,
									     HANDLER_CONTEXT),
627
						 HANDLER_CONTEXT));
628
    }
629
  }
Niels Möller's avatar
Niels Möller committed
630
  
631
  reaper_run(reaper, backend);
Niels Möller's avatar
Niels Möller committed
632
633
634

  return 0;
}