1/*	$NetBSD: pmap_svc.c,v 1.5 2007/05/13 20:03:47 christos Exp $	*/
2
3/*
4 * Sun RPC is a product of Sun Microsystems, Inc. and is provided for
5 * unrestricted use provided that this legend is included on all tape
6 * media and as a part of the software program in whole or part.  Users
7 * may copy or modify Sun RPC without charge, but are not authorized
8 * to license or distribute it to anyone else except as part of a product or
9 * program developed by the user.
10 *
11 * SUN RPC IS PROVIDED AS IS WITH NO WARRANTIES OF ANY KIND INCLUDING THE
12 * WARRANTIES OF DESIGN, MERCHANTIBILITY AND FITNESS FOR A PARTICULAR
13 * PURPOSE, OR ARISING FROM A COURSE OF DEALING, USAGE OR TRADE PRACTICE.
14 *
15 * Sun RPC is provided with no support and without any obligation on the
16 * part of Sun Microsystems, Inc. to assist in its use, correction,
17 * modification or enhancement.
18 *
19 * SUN MICROSYSTEMS, INC. SHALL HAVE NO LIABILITY WITH RESPECT TO THE
20 * INFRINGEMENT OF COPYRIGHTS, TRADE SECRETS OR ANY PATENTS BY SUN RPC
21 * OR ANY PART THEREOF.
22 *
23 * In no event will Sun Microsystems, Inc. be liable for any lost revenue
24 * or profits or other special, indirect and consequential damages, even if
25 * Sun has been advised of the possibility of such damages.
26 *
27 * Sun Microsystems, Inc.
28 * 2550 Garcia Avenue
29 * Mountain View, California  94043
30 */
31/*
32 * Copyright (c) 1984 - 1991 by Sun Microsystems, Inc.
33 */
34
35/* #ident	"@(#)pmap_svc.c	1.14	93/07/05 SMI" */
36
37#if 0
38#ifndef lint
39static	char sccsid[] = "@(#)pmap_svc.c 1.23 89/04/05 Copyr 1984 Sun Micro";
40#endif
41#endif
42
43/*
44 * pmap_svc.c
45 * The server procedure for the version 2 portmapper.
46 * All the portmapper related interface from the portmap side.
47 */
48
49#ifdef PORTMAP
50#include <sys/types.h>
51#include <sys/socket.h>
52#include <stdio.h>
53#include <rpc/rpc.h>
54#include <rpc/pmap_prot.h>
55#include <rpc/rpcb_prot.h>
56#ifdef RPCBIND_DEBUG
57#include <stdlib.h>
58#endif
59#include "rpcbind.h"
60
61static struct pmaplist *find_service_pmap(rpcprog_t, rpcvers_t, rpcprot_t);
62static bool_t pmapproc_change(struct svc_req *, SVCXPRT *, u_long);
63static bool_t pmapproc_getport(struct svc_req *, SVCXPRT *);
64static bool_t pmapproc_dump(struct svc_req *, SVCXPRT *);
65
66/*
67 * Called for all the version 2 inquiries.
68 */
69void
70pmap_service(struct svc_req *rqstp, SVCXPRT *xprt)
71{
72	rpcbs_procinfo(RPCBVERS_2_STAT, rqstp->rq_proc);
73	switch (rqstp->rq_proc) {
74	case PMAPPROC_NULL:
75		/*
76		 * Null proc call
77		 */
78#ifdef RPCBIND_DEBUG
79		if (debugging)
80			fprintf(stderr, "PMAPPROC_NULL\n");
81#endif
82		check_access(xprt, rqstp->rq_proc, NULL, PMAPVERS);
83		if ((!svc_sendreply(xprt, (xdrproc_t) xdr_void, NULL)) &&
84			debugging) {
85			if (doabort) {
86				rpcbind_abort();
87			}
88		}
89		break;
90
91	case PMAPPROC_SET:
92		/*
93		 * Set a program, version to port mapping
94		 */
95		pmapproc_change(rqstp, xprt, rqstp->rq_proc);
96		break;
97
98	case PMAPPROC_UNSET:
99		/*
100		 * Remove a program, version to port mapping.
101		 */
102		pmapproc_change(rqstp, xprt, rqstp->rq_proc);
103		break;
104
105	case PMAPPROC_GETPORT:
106		/*
107		 * Lookup the mapping for a program, version and return its
108		 * port number.
109		 */
110		pmapproc_getport(rqstp, xprt);
111		break;
112
113	case PMAPPROC_DUMP:
114		/*
115		 * Return the current set of mapped program, version
116		 */
117#ifdef RPCBIND_DEBUG
118		if (debugging)
119			fprintf(stderr, "PMAPPROC_DUMP\n");
120#endif
121		pmapproc_dump(rqstp, xprt);
122		break;
123
124	case PMAPPROC_CALLIT:
125		/*
126		 * Calls a procedure on the local machine. If the requested
127		 * procedure is not registered this procedure does not return
128		 * error information!!
129		 * This procedure is only supported on rpc/udp and calls via
130		 * rpc/udp. It passes null authentication parameters.
131		 */
132		rpcbproc_callit_com(rqstp, xprt, PMAPPROC_CALLIT, PMAPVERS);
133		break;
134
135	default:
136		svcerr_noproc(xprt);
137		break;
138	}
139}
140
141/*
142 * returns the item with the given program, version number. If that version
143 * number is not found, it returns the item with that program number, so that
144 * the port number is now returned to the caller. The caller when makes a
145 * call to this program, version number, the call will fail and it will
146 * return with PROGVERS_MISMATCH. The user can then determine the highest
147 * and the lowest version number for this program using clnt_geterr() and
148 * use those program version numbers.
149 */
150static struct pmaplist *
151find_service_pmap(rpcprog_t prog, rpcvers_t vers, rpcprot_t prot)
152{
153	register struct pmaplist *hit = NULL;
154	register struct pmaplist *pml;
155
156	for (pml = list_pml; pml != NULL; pml = pml->pml_next) {
157		if ((pml->pml_map.pm_prog != prog) ||
158			(pml->pml_map.pm_prot != prot))
159			continue;
160		hit = pml;
161		if (pml->pml_map.pm_vers == vers)
162			break;
163	}
164	return (hit);
165}
166
167static bool_t
168pmapproc_change(struct svc_req *rqstp, SVCXPRT *xprt, unsigned long op)
169{
170	struct pmap reg;
171	RPCB rpcbreg;
172	long ans;
173	struct sockaddr_in *who;
174	struct sockcred *sc;
175	char uidbuf[32];
176
177#ifdef RPCBIND_DEBUG
178	if (debugging)
179		fprintf(stderr, "%s request for (%lu, %lu) : ",
180		    op == PMAPPROC_SET ? "PMAP_SET" : "PMAP_UNSET",
181		    reg.pm_prog, reg.pm_vers);
182#endif
183
184	if (!svc_getargs(xprt, (xdrproc_t) xdr_pmap, (char *)&reg)) {
185		svcerr_decode(xprt);
186		return (FALSE);
187	}
188
189	if (!check_access(xprt, op, &reg, PMAPVERS)) {
190		svcerr_weakauth(xprt);
191		return FALSE;
192	}
193
194	who = svc_getcaller(xprt);
195	sc = __svc_getcallercreds(xprt);
196
197	/*
198	 * Can't use getpwnam here. We might end up calling ourselves
199	 * and looping.
200	 */
201	if (sc == NULL)
202		rpcbreg.r_owner = __UNCONST(rpcbind_unknown);
203	else if (sc->sc_uid == 0)
204		rpcbreg.r_owner = __UNCONST(rpcbind_superuser);
205	else {
206		/* r_owner will be strdup-ed later */
207		snprintf(uidbuf, sizeof uidbuf, "%d", sc->sc_uid);
208		rpcbreg.r_owner = uidbuf;
209	}
210
211	rpcbreg.r_prog = reg.pm_prog;
212	rpcbreg.r_vers = reg.pm_vers;
213
214	if (op == PMAPPROC_SET) {
215		char buf[32];
216
217		snprintf(buf, sizeof(buf), "0.0.0.0.%d.%d",
218		    (int)((reg.pm_port >> 8) & 0xff),
219		    (int)(reg.pm_port & 0xff));
220		rpcbreg.r_addr = buf;
221		if (reg.pm_prot == IPPROTO_UDP) {
222			rpcbreg.r_netid = __UNCONST(udptrans);
223		} else if (reg.pm_prot == IPPROTO_TCP) {
224			rpcbreg.r_netid = __UNCONST(tcptrans);
225		} else {
226			ans = FALSE;
227			goto done_change;
228		}
229		ans = map_set(&rpcbreg, rpcbreg.r_owner);
230	} else if (op == PMAPPROC_UNSET) {
231		bool_t ans1, ans2;
232
233		rpcbreg.r_addr = NULL;
234		rpcbreg.r_netid = __UNCONST(tcptrans);
235		ans1 = map_unset(&rpcbreg, rpcbreg.r_owner);
236		rpcbreg.r_netid = __UNCONST(udptrans);
237		ans2 = map_unset(&rpcbreg, rpcbreg.r_owner);
238		ans = ans1 || ans2;
239	} else {
240		ans = FALSE;
241	}
242done_change:
243	if ((!svc_sendreply(xprt, (xdrproc_t) xdr_long, (caddr_t) &ans)) &&
244	    debugging) {
245		fprintf(stderr, "portmap: svc_sendreply\n");
246		if (doabort) {
247			rpcbind_abort();
248		}
249	}
250#ifdef RPCBIND_DEBUG
251	if (debugging)
252		fprintf(stderr, "%s\n", ans == TRUE ? "succeeded" : "failed");
253#endif
254	if (op == PMAPPROC_SET)
255		rpcbs_set(RPCBVERS_2_STAT, ans);
256	else
257		rpcbs_unset(RPCBVERS_2_STAT, ans);
258	return (TRUE);
259}
260
261/* ARGSUSED */
262static bool_t
263pmapproc_getport(struct svc_req *rqstp, SVCXPRT *xprt)
264{
265	struct pmap reg;
266	long lport;
267	int port = 0;
268	struct pmaplist *fnd;
269#ifdef RPCBIND_DEBUG
270	char *uaddr;
271#endif
272
273	if (!svc_getargs(xprt, (xdrproc_t) xdr_pmap, (char *)&reg)) {
274		svcerr_decode(xprt);
275		return (FALSE);
276	}
277
278	if (!check_access(xprt, PMAPPROC_GETPORT, &reg, PMAPVERS)) {
279		svcerr_weakauth(xprt);
280		return FALSE;
281	}
282
283#ifdef RPCBIND_DEBUG
284	if (debugging) {
285		uaddr =  taddr2uaddr(rpcbind_get_conf(xprt->xp_netid),
286			    svc_getrpccaller(xprt));
287		fprintf(stderr, "PMAP_GETPORT req for (%lu, %lu, %s) from %s :",
288			reg.pm_prog, reg.pm_vers,
289			reg.pm_prot == IPPROTO_UDP ? "udp" : "tcp", uaddr);
290		free(uaddr);
291	}
292#endif
293	fnd = find_service_pmap(reg.pm_prog, reg.pm_vers, reg.pm_prot);
294	if (fnd) {
295		char serveuaddr[32];
296		int h1, h2, h3, h4, p1, p2;
297		const char *netid, *ua;
298
299		if (reg.pm_prot == IPPROTO_UDP) {
300			ua = udp_uaddr;
301			netid = udptrans;
302		} else {
303			ua = tcp_uaddr; /* To get the len */
304			netid = tcptrans;
305		}
306		if (ua == NULL) {
307			goto sendreply;
308		}
309		if (sscanf(ua, "%d.%d.%d.%d.%d.%d", &h1, &h2, &h3,
310				&h4, &p1, &p2) == 6) {
311			p1 = (fnd->pml_map.pm_port >> 8) & 0xff;
312			p2 = (fnd->pml_map.pm_port) & 0xff;
313			snprintf(serveuaddr, sizeof(serveuaddr),
314			    "%d.%d.%d.%d.%d.%d", h1, h2, h3, h4, p1, p2);
315			if (is_bound(netid, serveuaddr)) {
316				port = fnd->pml_map.pm_port;
317			} else { /* this service is dead; delete it */
318				delete_prog(reg.pm_prog);
319			}
320		}
321	}
322sendreply:
323	lport = port;
324	if ((!svc_sendreply(xprt, (xdrproc_t) xdr_long, (caddr_t)&lport)) &&
325			debugging) {
326		(void) fprintf(stderr, "portmap: svc_sendreply\n");
327		if (doabort) {
328			rpcbind_abort();
329		}
330	}
331#ifdef RPCBIND_DEBUG
332	if (debugging)
333		fprintf(stderr, "port = %d\n", port);
334#endif
335	rpcbs_getaddr(RPCBVERS_2_STAT, reg.pm_prog, reg.pm_vers,
336		reg.pm_prot == IPPROTO_UDP ? udptrans : tcptrans,
337		port ? udptrans : "");
338
339	return (TRUE);
340}
341
342/* ARGSUSED */
343static bool_t
344pmapproc_dump(struct svc_req *rqstp, SVCXPRT *xprt)
345{
346	if (!svc_getargs(xprt, (xdrproc_t)xdr_void, NULL)) {
347		svcerr_decode(xprt);
348		return (FALSE);
349	}
350
351	if (!check_access(xprt, PMAPPROC_DUMP, NULL, PMAPVERS)) {
352		svcerr_weakauth(xprt);
353		return FALSE;
354	}
355
356	if ((!svc_sendreply(xprt, (xdrproc_t) xdr_pmaplist_ptr,
357			(caddr_t)&list_pml)) && debugging) {
358		if (debugging)
359			(void) fprintf(stderr, "portmap: svc_sendreply\n");
360		if (doabort) {
361			rpcbind_abort();
362		}
363	}
364	return (TRUE);
365}
366
367#endif /* PORTMAP */
368