yppasswdd_main.c revision 184459
1/*
2 * Copyright (c) 1995, 1996
3 *	Bill Paul <wpaul@ctr.columbia.edu>.  All rights reserved.
4 *
5 * Redistribution and use in source and binary forms, with or without
6 * modification, are permitted provided that the following conditions
7 * are met:
8 * 1. Redistributions of source code must retain the above copyright
9 *    notice, this list of conditions and the following disclaimer.
10 * 2. Redistributions in binary form must reproduce the above copyright
11 *    notice, this list of conditions and the following disclaimer in the
12 *    documentation and/or other materials provided with the distribution.
13 * 3. All advertising materials mentioning features or use of this software
14 *    must display the following acknowledgement:
15 *	This product includes software developed by Bill Paul.
16 * 4. Neither the name of the author nor the names of any co-contributors
17 *    may be used to endorse or promote products derived from this software
18 *    without specific prior written permission.
19 *
20 * THIS SOFTWARE IS PROVIDED BY Bill Paul AND CONTRIBUTORS ``AS IS'' AND
21 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
22 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
23 * ARE DISCLAIMED.  IN NO EVENT SHALL Bill Paul OR CONTRIBUTORS BE LIABLE
24 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
25 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
26 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
27 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
28 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
29 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
30 * SUCH DAMAGE.
31 */
32
33#include <sys/cdefs.h>
34__FBSDID("$FreeBSD: head/usr.sbin/rpc.yppasswdd/yppasswdd_main.c 184459 2008-10-30 01:54:31Z rafan $");
35
36#include <sys/param.h>
37#include <sys/ioctl.h>
38#include <sys/stat.h>
39#include <sys/socket.h>
40#include <sys/time.h>
41#include <sys/resource.h>
42#include <netinet/in.h>
43
44#include <err.h>
45#include <errno.h>
46#include <fcntl.h>
47#include <memory.h>
48#include <signal.h>
49#include <stdio.h>
50#include <stdlib.h> /* getenv, exit */
51#include <string.h>
52#include <string.h> /* strcmp */
53#include <syslog.h>
54#include <unistd.h>
55
56#include <rpc/rpc.h>
57#include <rpc/rpc_com.h>
58#include <rpc/pmap_clnt.h> /* for pmap_unset */
59#include <rpcsvc/yp.h>
60#include <rpcsvc/ypclnt.h>
61
62#include "yppasswd.h"
63#include "yppasswdd_extern.h"
64#include "yppasswd_private.h"
65#include "ypxfr_extern.h"
66#include "yp_extern.h"
67
68#ifndef SIG_PF
69#define	SIG_PF void(*)(int)
70#endif
71
72#ifdef DEBUG
73#define	RPC_SVC_FG
74#endif
75
76#define	_RPCSVC_CLOSEDOWN 120
77int _rpcpmstart = 0;		/* Started by a port monitor ? */
78static int _rpcfdtype;
79		 /* Whether Stream or Datagram ? */
80	/* States a server can be in wrt request */
81
82#define	_IDLE 0
83#define	_SERVED 1
84#define	_SERVING 2
85
86static char _localhost[] = "localhost";
87static char _passwd_byname[] = "passwd.byname";
88extern int _rpcsvcstate;	 /* Set when a request is serviced */
89static char _progname[] = "rpc.yppasswdd";
90char *progname = _progname;
91static char _yp_dir[] = _PATH_YP;
92char *yp_dir = _yp_dir;
93static char _passfile_default[] = _PATH_YP "master.passwd";
94char *passfile_default = _passfile_default;
95char *passfile;
96char *yppasswd_domain = NULL;
97int no_chsh = 0;
98int no_chfn = 0;
99int allow_additions = 0;
100int multidomain = 0;
101int verbose = 0;
102int resvport = 1;
103int inplace = 0;
104char sockname[] = YP_SOCKNAME;
105
106static void
107terminate(int sig __unused)
108{
109	rpcb_unset(YPPASSWDPROG, YPPASSWDVERS, NULL);
110	rpcb_unset(MASTER_YPPASSWDPROG, MASTER_YPPASSWDVERS, NULL);
111	unlink(sockname);
112	exit(0);
113}
114
115static void
116reload(int sig __unused)
117{
118	load_securenets();
119}
120
121static void
122closedown(int sig __unused)
123{
124	if (_rpcsvcstate == _IDLE) {
125		extern fd_set svc_fdset;
126		static int size;
127		int i, openfd;
128
129		if (_rpcfdtype == SOCK_DGRAM) {
130			unlink(sockname);
131			exit(0);
132		}
133		if (size == 0) {
134			size = getdtablesize();
135		}
136		for (i = 0, openfd = 0; i < size && openfd < 2; i++)
137			if (FD_ISSET(i, &svc_fdset))
138				openfd++;
139		if (openfd <= 1) {
140			unlink(sockname);
141			exit(0);
142		}
143	}
144	if (_rpcsvcstate == _SERVED)
145		_rpcsvcstate = _IDLE;
146
147	(void) signal(SIGALRM, (SIG_PF) closedown);
148	(void) alarm(_RPCSVC_CLOSEDOWN/2);
149}
150
151static void
152usage(void)
153{
154	fprintf(stderr, "%s\n%s\n",
155"usage: rpc.yppasswdd [-t master.passwd file] [-d domain] [-p path] [-s]",
156"                     [-f] [-m] [-i] [-a] [-v] [-u] [-h]");
157	exit(1);
158}
159
160int
161main(int argc, char *argv[])
162{
163	struct rlimit rlim;
164	SVCXPRT *transp = NULL;
165	struct sockaddr_in saddr;
166	socklen_t asize = sizeof (saddr);
167	struct netconfig *nconf;
168	struct sigaction sa;
169	void *localhandle;
170	int ch;
171	char *mastername;
172	char myname[MAXHOSTNAMELEN + 2];
173	int maxrec = RPC_MAXDATASIZE;
174
175	extern int debug;
176
177	debug = 1;
178
179	while ((ch = getopt(argc, argv, "t:d:p:sfamuivh")) != -1) {
180		switch (ch) {
181		case 't':
182			passfile_default = optarg;
183			break;
184		case 'd':
185			yppasswd_domain = optarg;
186			break;
187		case 's':
188			no_chsh++;
189			break;
190		case 'f':
191			no_chfn++;
192			break;
193		case 'p':
194			yp_dir = optarg;
195			break;
196		case 'a':
197			allow_additions++;
198			break;
199		case 'm':
200			multidomain++;
201			break;
202		case 'i':
203			inplace++;
204			break;
205		case 'v':
206			verbose++;
207			break;
208		case 'u':
209			resvport = 0;
210			break;
211		default:
212		case 'h':
213			usage();
214			break;
215		}
216	}
217
218	if (yppasswd_domain == NULL) {
219		if (yp_get_default_domain(&yppasswd_domain)) {
220			yp_error("no domain specified and system domain \
221name isn't set -- aborting");
222		usage();
223		}
224	}
225
226	load_securenets();
227
228	if (getrpcport(_localhost, YPPROG, YPVERS, IPPROTO_UDP) <= 0) {
229		yp_error("no ypserv processes registered with local portmap");
230		yp_error("this host is not an NIS server -- aborting");
231		exit(1);
232	}
233
234	if ((mastername = ypxfr_get_master(yppasswd_domain,
235		 _passwd_byname, _localhost, 0)) == NULL) {
236		yp_error("can't get name of NIS master server for domain %s",
237			 				yppasswd_domain);
238		exit(1);
239	}
240
241	if (gethostname((char *)&myname, sizeof(myname)) == -1) {
242		yp_error("can't get local hostname: %s", strerror(errno));
243		exit(1);
244	}
245
246	if (strncasecmp(mastername, (char *)&myname, sizeof(myname))) {
247		yp_error("master of %s is %s, but we are %s",
248			"passwd.byname", mastername, myname);
249		yp_error("this host is not the NIS master server for \
250the %s domain -- aborting", yppasswd_domain);
251		exit(1);
252	}
253
254	debug = 0;
255
256	if (getsockname(0, (struct sockaddr *)&saddr, &asize) == 0) {
257		socklen_t ssize = sizeof (int);
258		if (saddr.sin_family != AF_INET)
259			exit(1);
260		if (getsockopt(0, SOL_SOCKET, SO_TYPE,
261		    (char *)&_rpcfdtype, &ssize) == -1)
262			exit(1);
263		_rpcpmstart = 1;
264	}
265
266	if (!debug && _rpcpmstart == 0) {
267		if (daemon(0,0)) {
268			err(1,"cannot fork");
269		}
270	}
271	openlog("rpc.yppasswdd", LOG_PID, LOG_DAEMON);
272	memset(&sa, 0, sizeof(sa));
273	sa.sa_flags = SA_NOCLDWAIT;
274	sigaction(SIGCHLD, &sa, NULL);
275
276	rpcb_unset(YPPASSWDPROG, YPPASSWDVERS, NULL);
277	rpcb_unset(MASTER_YPPASSWDPROG, MASTER_YPPASSWDVERS, NULL);
278
279	rpc_control(RPC_SVC_CONNMAXREC_SET, &maxrec);
280
281	if (svc_create(yppasswdprog_1, YPPASSWDPROG, YPPASSWDVERS, "netpath") == 0) {
282		yp_error("cannot create yppasswd service.");
283		exit(1);
284	}
285	if (svc_create(master_yppasswdprog_1, MASTER_YPPASSWDPROG,
286	    MASTER_YPPASSWDVERS, "netpath") == 0) {
287		yp_error("cannot create master_yppasswd service.");
288		exit(1);
289	}
290
291	nconf = NULL;
292	localhandle = setnetconfig();
293	while ((nconf = getnetconfig(localhandle)) != NULL) {
294		if (nconf->nc_protofmly != NULL &&
295		    strcmp(nconf->nc_protofmly, NC_LOOPBACK) == 0)
296			break;
297	}
298	if (nconf == NULL) {
299		yp_error("getnetconfigent unix: %s", nc_sperror());
300		exit(1);
301	}
302	unlink(sockname);
303	transp = svcunix_create(RPC_ANYSOCK, 0, 0, sockname);
304	if (transp == NULL) {
305		yp_error("cannot create AF_LOCAL service.");
306		exit(1);
307	}
308	if (!svc_reg(transp, MASTER_YPPASSWDPROG, MASTER_YPPASSWDVERS,
309	    master_yppasswdprog_1, nconf)) {
310		yp_error("unable to register (MASTER_YPPASSWDPROG, \
311		    MASTER_YPPASSWDVERS, unix).");
312		exit(1);
313	}
314	endnetconfig(localhandle);
315
316	/* Only root may connect() to the AF_UNIX link. */
317	if (chmod(sockname, 0))
318		err(1, "chmod of %s failed", sockname);
319
320	if (transp == (SVCXPRT *)NULL) {
321		yp_error("could not create a handle");
322		exit(1);
323	}
324	if (_rpcpmstart) {
325		(void) signal(SIGALRM, (SIG_PF) closedown);
326		(void) alarm(_RPCSVC_CLOSEDOWN/2);
327	}
328
329	/* Unlimited resource limits. */
330	rlim.rlim_cur = rlim.rlim_max = RLIM_INFINITY;
331	(void)setrlimit(RLIMIT_CPU, &rlim);
332	(void)setrlimit(RLIMIT_FSIZE, &rlim);
333	(void)setrlimit(RLIMIT_STACK, &rlim);
334	(void)setrlimit(RLIMIT_DATA, &rlim);
335	(void)setrlimit(RLIMIT_RSS, &rlim);
336
337	/* Don't drop core (not really necessary, but GP's). */
338	rlim.rlim_cur = rlim.rlim_max = 0;
339	(void)setrlimit(RLIMIT_CORE, &rlim);
340
341	/* Turn off signals. */
342	(void)signal(SIGALRM, SIG_IGN);
343	(void)signal(SIGHUP, (SIG_PF) reload);
344	(void)signal(SIGINT, SIG_IGN);
345	(void)signal(SIGPIPE, SIG_IGN);
346	(void)signal(SIGQUIT, SIG_IGN);
347	(void)signal(SIGTERM, (SIG_PF) terminate);
348
349	svc_run();
350	yp_error("svc_run returned");
351	exit(1);
352	/* NOTREACHED */
353}
354