auth_time.c revision 124178
1226048Sobrien/* #pragma ident	"@(#)auth_time.c	1.4	92/11/10 SMI" */
268349Sobrien
3226048Sobrien/*
468349Sobrien *	auth_time.c
568349Sobrien *
6186690Sobrien * This module contains the private function __rpc_get_time_offset()
768349Sobrien * which will return the difference in seconds between the local system's
868349Sobrien * notion of time and a remote server's notion of time. This must be
968349Sobrien * possible without calling any functions that may invoke the name
1068349Sobrien * service. (netdir_getbyxxx, getXbyY, etc). The function is used in the
11192348Sdelphij * synchronize call of the authdes code to synchronize clocks between
12192348Sdelphij * NIS+ clients and their servers.
13133359Sobrien *
14226048Sobrien * Note to minimize the amount of duplicate code, portions of the
15226048Sobrien * synchronize() function were folded into this code, and the synchronize
16226048Sobrien * call becomes simply a wrapper around this function. Further, if this
1768349Sobrien * function is called with a timehost it *DOES* recurse to the name
1868349Sobrien * server so don't use it in that mode if you are doing name service code.
1968349Sobrien *
2068349Sobrien *	Copyright (c) 1992 Sun Microsystems Inc.
2168349Sobrien *	All rights reserved.
2268349Sobrien *
23186690Sobrien * Side effects :
2468349Sobrien *	When called a client handle to a RPCBIND process is created
2568349Sobrien *	and destroyed. Two strings "netid" and "uaddr" are malloc'd
2668349Sobrien *	and returned. The SIGALRM processing is modified only if
2768349Sobrien *	needed to deal with TCP connections.
2868349Sobrien */
2968349Sobrien
3068349Sobrien#include <sys/cdefs.h>
3168349Sobrien__FBSDID("$FreeBSD: head/lib/libc/rpc/auth_time.c 124178 2004-01-06 18:45:58Z nectar $");
3268349Sobrien
3368349Sobrien#include "namespace.h"
3468349Sobrien#include <stdio.h>
3568349Sobrien#include <syslog.h>
3668349Sobrien#include <string.h>
3768349Sobrien#include <stdlib.h>
3868349Sobrien#include <unistd.h>
3968349Sobrien#include <netdb.h>
4068349Sobrien#include <sys/signal.h>
4168349Sobrien#include <sys/errno.h>
4268349Sobrien#include <sys/socket.h>
4368349Sobrien#include <netinet/in.h>
4468349Sobrien#include <arpa/inet.h>
4568349Sobrien#include <rpc/rpc.h>
4668349Sobrien#include <rpc/rpc_com.h>
4768349Sobrien#include <rpc/rpcb_prot.h>
4868349Sobrien#undef NIS
4968349Sobrien#include <rpcsvc/nis.h>
5068349Sobrien#include "un-namespace.h"
5168349Sobrien
5268349Sobrienextern int _rpc_dtablesize( void );
5368349Sobrien
5468349Sobrien#ifdef TESTING
5568349Sobrien#define	msg(x)	printf("ERROR: %s\n", x)
56133359Sobrien/* #define msg(x) syslog(LOG_ERR, "%s", x) */
57133359Sobrien#else
58133359Sobrien#define	msg(x)
59226048Sobrien#endif
60133359Sobrien
61133359Sobrienstatic int saw_alarm = 0;
62133359Sobrien
63133359Sobrienstatic void
64226048Sobrienalarm_hndler(s)
65226048Sobrien	int	s;
66192348Sdelphij{
67226048Sobrien	saw_alarm = 1;
68226048Sobrien	return;
69226048Sobrien}
70226048Sobrien
71226048Sobrien/*
72226048Sobrien * The internet time server defines the epoch to be Jan 1, 1900
73192348Sdelphij * whereas UNIX defines it to be Jan 1, 1970. To adjust the result
74133359Sobrien * from internet time-service time, into UNIX time we subtract the
75226048Sobrien * following offset :
76226048Sobrien */
77133359Sobrien#define	NYEARS	(1970 - 1900)
78169962Sobrien#define	TOFFSET ((u_long)60*60*24*(365*NYEARS + (NYEARS/4)))
79169962Sobrien
80226048Sobrien
81169962Sobrien/*
82226048Sobrien * Stolen from rpc.nisd:
83226048Sobrien * Turn a 'universal address' into a struct sockaddr_in.
84226048Sobrien * Bletch.
85226048Sobrien */
86static int uaddr_to_sockaddr(uaddr, sin)
87#ifdef foo
88	endpoint		*endpt;
89#endif
90	char			*uaddr;
91	struct sockaddr_in	*sin;
92{
93	unsigned char		p_bytes[2];
94	int			i;
95	unsigned long		a[6];
96
97	i = sscanf(uaddr, "%lu.%lu.%lu.%lu.%lu.%lu", &a[0], &a[1], &a[2],
98						&a[3], &a[4], &a[5]);
99
100	if (i < 6)
101		return(1);
102
103	for (i = 0; i < 4; i++)
104		sin->sin_addr.s_addr |= (a[i] & 0x000000FF) << (8 * i);
105
106	p_bytes[0] = (unsigned char)a[4] & 0x000000FF;
107	p_bytes[1] = (unsigned char)a[5] & 0x000000FF;
108
109	sin->sin_family = AF_INET; /* always */
110	bcopy((char *)&p_bytes, (char *)&sin->sin_port, 2);
111
112	return (0);
113}
114
115/*
116 * free_eps()
117 *
118 * Free the strings that were strduped into the eps structure.
119 */
120static void
121free_eps(eps, num)
122	endpoint	eps[];
123	int		num;
124{
125	int		i;
126
127	for (i = 0; i < num; i++) {
128		free(eps[i].uaddr);
129		free(eps[i].proto);
130		free(eps[i].family);
131	}
132	return;
133}
134
135/*
136 * get_server()
137 *
138 * This function constructs a nis_server structure description for the
139 * indicated hostname.
140 *
141 * NOTE: There is a chance we may end up recursing here due to the
142 * fact that gethostbyname() could do an NIS search. Ideally, the
143 * NIS+ server will call __rpc_get_time_offset() with the nis_server
144 * structure already populated.
145 */
146static nis_server *
147get_server(sin, host, srv, eps, maxep)
148	struct sockaddr_in *sin;
149	char		*host;	/* name of the time host	*/
150	nis_server	*srv;	/* nis_server struct to use.	*/
151	endpoint	eps[];	/* array of endpoints		*/
152	int		maxep;	/* max array size		*/
153{
154	char			hname[256];
155	int			num_ep = 0, i;
156	struct hostent		*he;
157	struct hostent		dummy;
158	char			*ptr[2];
159
160	if (host == NULL && sin == NULL)
161		return (NULL);
162
163	if (sin == NULL) {
164		he = gethostbyname(host);
165		if (he == NULL)
166			return(NULL);
167	} else {
168		he = &dummy;
169		ptr[0] = (char *)&sin->sin_addr.s_addr;
170		ptr[1] = NULL;
171		dummy.h_addr_list = ptr;
172	}
173
174	/*
175	 * This is lame. We go around once for TCP, then again
176	 * for UDP.
177	 */
178	for (i = 0; (he->h_addr_list[i] != NULL) && (num_ep < maxep);
179						i++, num_ep++) {
180		struct in_addr *a;
181
182		a = (struct in_addr *)he->h_addr_list[i];
183		snprintf(hname, sizeof(hname), "%s.0.111", inet_ntoa(*a));
184		eps[num_ep].uaddr = strdup(hname);
185		eps[num_ep].family = strdup("inet");
186		eps[num_ep].proto =  strdup("tcp");
187	}
188
189	for (i = 0; (he->h_addr_list[i] != NULL) && (num_ep < maxep);
190						i++, num_ep++) {
191		struct in_addr *a;
192
193		a = (struct in_addr *)he->h_addr_list[i];
194		snprintf(hname, sizeof(hname), "%s.0.111", inet_ntoa(*a));
195		eps[num_ep].uaddr = strdup(hname);
196		eps[num_ep].family = strdup("inet");
197		eps[num_ep].proto =  strdup("udp");
198	}
199
200	srv->name = (nis_name) host;
201	srv->ep.ep_len = num_ep;
202	srv->ep.ep_val = eps;
203	srv->key_type = NIS_PK_NONE;
204	srv->pkey.n_bytes = NULL;
205	srv->pkey.n_len = 0;
206	return (srv);
207}
208
209/*
210 * __rpc_get_time_offset()
211 *
212 * This function uses a nis_server structure to contact the a remote
213 * machine (as named in that structure) and returns the offset in time
214 * between that machine and this one. This offset is returned in seconds
215 * and may be positive or negative.
216 *
217 * The first time through, a lot of fiddling is done with the netconfig
218 * stuff to find a suitable transport. The function is very aggressive
219 * about choosing UDP or at worst TCP if it can. This is because
220 * those transports support both the RCPBIND call and the internet
221 * time service.
222 *
223 * Once through, *uaddr is set to the universal address of
224 * the machine and *netid is set to the local netid for the transport
225 * that uaddr goes with. On the second call, the netconfig stuff
226 * is skipped and the uaddr/netid pair are used to fetch the netconfig
227 * structure and to then contact the machine for the time.
228 *
229 * td = "server" - "client"
230 */
231int
232__rpc_get_time_offset(td, srv, thost, uaddr, netid)
233	struct timeval	*td;	 /* Time difference			*/
234	nis_server	*srv;	 /* NIS Server description 		*/
235	char		*thost;	 /* if no server, this is the timehost	*/
236	char		**uaddr; /* known universal address		*/
237	struct sockaddr_in *netid; /* known network identifier		*/
238{
239	CLIENT			*clnt; 		/* Client handle 	*/
240	endpoint		*ep,		/* useful endpoints	*/
241				*useep = NULL;	/* endpoint of xp	*/
242	char			*useua = NULL;	/* uaddr of selected xp	*/
243	int			epl, i;		/* counters		*/
244	enum clnt_stat		status;		/* result of clnt_call	*/
245	u_long			thetime, delta;
246	int			needfree = 0;
247	struct timeval		tv;
248	int			time_valid;
249	int			udp_ep = -1, tcp_ep = -1;
250	int			a1, a2, a3, a4;
251	char			ut[64], ipuaddr[64];
252	endpoint		teps[32];
253	nis_server		tsrv;
254	void			(*oldsig)() = NULL; /* old alarm handler */
255	struct sockaddr_in	sin;
256	int			s = RPC_ANYSOCK, len;
257	int			type = 0;
258
259	td->tv_sec = 0;
260	td->tv_usec = 0;
261
262	/*
263	 * First check to see if we need to find and address for this
264	 * server.
265	 */
266	if (*uaddr == NULL) {
267		if ((srv != NULL) && (thost != NULL)) {
268			msg("both timehost and srv pointer used!");
269			return (0);
270		}
271		if (! srv) {
272			srv = get_server(netid, thost, &tsrv, teps, 32);
273			if (srv == NULL) {
274				msg("unable to contruct server data.");
275				return (0);
276			}
277			needfree = 1;	/* need to free data in endpoints */
278		}
279
280		ep = srv->ep.ep_val;
281		epl = srv->ep.ep_len;
282
283		/* Identify the TCP and UDP endpoints */
284		for (i = 0;
285			(i < epl) && ((udp_ep == -1) || (tcp_ep == -1)); i++) {
286			if (strcasecmp(ep[i].proto, "udp") == 0)
287				udp_ep = i;
288			if (strcasecmp(ep[i].proto, "tcp") == 0)
289				tcp_ep = i;
290		}
291
292		/* Check to see if it is UDP or TCP */
293		if (tcp_ep > -1) {
294			useep = &ep[tcp_ep];
295			useua = ep[tcp_ep].uaddr;
296			type = SOCK_STREAM;
297		} else if (udp_ep > -1) {
298			useep = &ep[udp_ep];
299			useua = ep[udp_ep].uaddr;
300			type = SOCK_DGRAM;
301		}
302
303		if (useep == NULL) {
304			msg("no acceptable transport endpoints.");
305			if (needfree)
306				free_eps(teps, tsrv.ep.ep_len);
307			return (0);
308		}
309	}
310
311	/*
312	 * Create a sockaddr from the uaddr.
313	 */
314	if (*uaddr != NULL)
315		useua = *uaddr;
316
317	/* Fixup test for NIS+ */
318	sscanf(useua, "%d.%d.%d.%d.", &a1, &a2, &a3, &a4);
319	sprintf(ipuaddr, "%d.%d.%d.%d.0.111", a1, a2, a3, a4);
320	useua = &ipuaddr[0];
321
322	bzero((char *)&sin, sizeof(sin));
323	if (uaddr_to_sockaddr(useua, &sin)) {
324		msg("unable to translate uaddr to sockaddr.");
325		if (needfree)
326			free_eps(teps, tsrv.ep.ep_len);
327		return (0);
328	}
329
330	/*
331	 * Create the client handle to rpcbind. Note we always try
332	 * version 3 since that is the earliest version that supports
333	 * the RPCB_GETTIME call. Also it is the version that comes
334	 * standard with SVR4. Since most everyone supports TCP/IP
335	 * we could consider trying the rtime call first.
336	 */
337	clnt = clnttcp_create(&sin, RPCBPROG, RPCBVERS, &s, 0, 0);
338	if (clnt == NULL) {
339		msg("unable to create client handle to rpcbind.");
340		if (needfree)
341			free_eps(teps, tsrv.ep.ep_len);
342		return (0);
343	}
344
345	tv.tv_sec = 5;
346	tv.tv_usec = 0;
347	time_valid = 0;
348	status = clnt_call(clnt, RPCBPROC_GETTIME, (xdrproc_t)xdr_void, NULL,
349					(xdrproc_t)xdr_u_long, &thetime, tv);
350	/*
351	 * The only error we check for is anything but success. In
352	 * fact we could have seen PROGMISMATCH if talking to a 4.1
353	 * machine (pmap v2) or TIMEDOUT if the net was busy.
354	 */
355	if (status == RPC_SUCCESS)
356		time_valid = 1;
357	else {
358		int save;
359
360		/* Blow away possible stale CLNT handle. */
361		if (clnt != NULL) {
362			clnt_destroy(clnt);
363			clnt = NULL;
364		}
365
366		/*
367		 * Convert PMAP address into timeservice address
368		 * We take advantage of the fact that we "know" what
369		 * the universal address looks like for inet transports.
370		 *
371		 * We also know that the internet timeservice is always
372		 * listening on port 37.
373		 */
374		sscanf(useua, "%d.%d.%d.%d.", &a1, &a2, &a3, &a4);
375		sprintf(ut, "%d.%d.%d.%d.0.37", a1, a2, a3, a4);
376
377		if (uaddr_to_sockaddr(ut, &sin)) {
378			msg("cannot convert timeservice uaddr to sockaddr.");
379			goto error;
380		}
381
382		s = _socket(AF_INET, type, 0);
383		if (s == -1) {
384			msg("unable to open fd to network.");
385			goto error;
386		}
387
388		/*
389		 * Now depending on whether or not we're talking to
390		 * UDP we set a timeout or not.
391		 */
392		if (type == SOCK_DGRAM) {
393			struct timeval timeout = { 20, 0 };
394			struct sockaddr_in from;
395			fd_set readfds;
396			int res;
397
398			if (_sendto(s, &thetime, sizeof(thetime), 0,
399				(struct sockaddr *)&sin, sizeof(sin)) == -1) {
400				msg("udp : sendto failed.");
401				goto error;
402			}
403			do {
404				FD_ZERO(&readfds);
405				FD_SET(s, &readfds);
406				res = _select(_rpc_dtablesize(), &readfds,
407				     (fd_set *)NULL, (fd_set *)NULL, &timeout);
408			} while (res < 0 && errno == EINTR);
409			if (res <= 0)
410				goto error;
411			len = sizeof(from);
412			res = _recvfrom(s, (char *)&thetime, sizeof(thetime), 0,
413				       (struct sockaddr *)&from, &len);
414			if (res == -1) {
415				msg("recvfrom failed on udp transport.");
416				goto error;
417			}
418			time_valid = 1;
419		} else {
420			int res;
421
422			oldsig = (void (*)())signal(SIGALRM, alarm_hndler);
423			saw_alarm = 0; /* global tracking the alarm */
424			alarm(20); /* only wait 20 seconds */
425			res = _connect(s, (struct sockaddr *)&sin, sizeof(sin));
426			if (res == -1) {
427				msg("failed to connect to tcp endpoint.");
428				goto error;
429			}
430			if (saw_alarm) {
431				msg("alarm caught it, must be unreachable.");
432				goto error;
433			}
434			res = _read(s, (char *)&thetime, sizeof(thetime));
435			if (res != sizeof(thetime)) {
436				if (saw_alarm)
437					msg("timed out TCP call.");
438				else
439					msg("wrong size of results returned");
440
441				goto error;
442			}
443			time_valid = 1;
444		}
445		save = errno;
446		(void)_close(s);
447		errno = save;
448		s = RPC_ANYSOCK;
449
450		if (time_valid) {
451			thetime = ntohl(thetime);
452			thetime = thetime - TOFFSET; /* adjust to UNIX time */
453		} else
454			thetime = 0;
455	}
456
457	gettimeofday(&tv, 0);
458
459error:
460	/*
461	 * clean up our allocated data structures.
462	 */
463
464	if (s != RPC_ANYSOCK)
465		(void)_close(s);
466
467	if (clnt != NULL)
468		clnt_destroy(clnt);
469
470	alarm(0);	/* reset that alarm if its outstanding */
471	if (oldsig) {
472		signal(SIGALRM, oldsig);
473	}
474
475	/*
476	 * note, don't free uaddr strings until after we've made a
477	 * copy of them.
478	 */
479	if (time_valid) {
480		if (*uaddr == NULL)
481			*uaddr = strdup(useua);
482
483		/* Round to the nearest second */
484		tv.tv_sec += (tv.tv_sec > 500000) ? 1 : 0;
485		delta = (thetime > tv.tv_sec) ? thetime - tv.tv_sec :
486						tv.tv_sec - thetime;
487		td->tv_sec = (thetime < tv.tv_sec) ? - delta : delta;
488		td->tv_usec = 0;
489	} else {
490		msg("unable to get the server's time.");
491	}
492
493	if (needfree)
494		free_eps(teps, tsrv.ep.ep_len);
495
496	return (time_valid);
497}
498