auth_time.c revision 1219:f89f56c2d9ac
1/*
2 * CDDL HEADER START
3 *
4 * The contents of this file are subject to the terms of the
5 * Common Development and Distribution License, Version 1.0 only
6 * (the "License").  You may not use this file except in compliance
7 * with the License.
8 *
9 * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE
10 * or http://www.opensolaris.org/os/licensing.
11 * See the License for the specific language governing permissions
12 * and limitations under the License.
13 *
14 * When distributing Covered Code, include this CDDL HEADER in each
15 * file and include the License file at usr/src/OPENSOLARIS.LICENSE.
16 * If applicable, add the following below this CDDL HEADER, with the
17 * fields enclosed by brackets "[]" replaced with your own identifying
18 * information: Portions Copyright [yyyy] [name of copyright owner]
19 *
20 * CDDL HEADER END
21 */
22
23/*
24 * Copyright 2006 Sun Microsystems, Inc.  All rights reserved.
25 * Use is subject to license terms.
26 */
27
28/*
29 * This module contains the private function __rpc_get_time_offset()
30 * which will return the difference in seconds between the local system's
31 * notion of time and a remote server's notion of time. This must be
32 * possible without calling any functions that may invoke the name
33 * service. (netdir_getbyxxx, getXbyY, etc). The function is used in the
34 * synchronize call of the authdes code to synchronize clocks between
35 * NIS+ clients and their servers.
36 *
37 * Note to minimize the amount of duplicate code, portions of the
38 * synchronize() function were folded into this code, and the synchronize
39 * call becomes simply a wrapper around this function. Further, if this
40 * function is called with a timehost it *DOES* recurse to the name
41 * server so don't use it in that mode if you are doing name service code.
42 *
43 * Side effects :
44 *	When called a client handle to a RPCBIND process is created
45 *	and destroyed. Two strings "netid" and "uaddr" are malloc'd
46 *	and returned. The SIGALRM processing is modified only if
47 *	needed to deal with TCP connections.
48 */
49
50#pragma ident	"%Z%%M%	%I%	%E% SMI"
51
52#include "mt.h"
53#include <stdio.h>
54#include <stdlib.h>
55#include <unistd.h>
56#include <syslog.h>
57#include <netdir.h>
58#include <string.h>
59#include <strings.h>
60#include <netconfig.h>
61#include <netdb.h>
62#include <signal.h>
63#include <sys/errno.h>
64#include <sys/poll.h>
65#include <rpc/rpc.h>
66#include <rpc/nettype.h>
67#undef NIS
68#include <rpcsvc/nis.h>
69
70
71extern void	__nis_netconfig2ep(struct netconfig *, endpoint *);
72extern bool_t	__nis_netconfig_matches_ep(struct netconfig *, endpoint *);
73
74#ifdef TESTING
75#define	msg(x)	printf("ERROR: %s\n", x)
76/* #define msg(x) syslog(LOG_ERR, "%s", x) */
77#else
78#define	msg(x)
79#endif
80
81static int saw_alarm = 0;
82
83/* ARGSUSED */
84static void
85alarm_hndler(int s)
86{
87	saw_alarm = 1;
88}
89
90/*
91 * The internet time server defines the epoch to be Jan 1, 1900
92 * whereas UNIX defines it to be Jan 1, 1970. To adjust the result
93 * from internet time-service time, into UNIX time we subtract the
94 * following offset :
95 */
96#define	NYEARS	(1970 - 1900)
97#define	TOFFSET ((uint_t)60*60*24*(365*NYEARS + (NYEARS/4)))
98
99/*
100 * free_eps()
101 *
102 * Free the strings that were strduped into the eps structure.
103 */
104static void
105free_eps(endpoint eps[], int num)
106{
107	int		i;
108
109	for (i = 0; i < num; i++) {
110		free(eps[i].uaddr);
111		free(eps[i].proto);
112		free(eps[i].family);
113	}
114}
115
116/*
117 * get_server()
118 *
119 * This function constructs a nis_server structure description for the
120 * indicated hostname.
121 */
122static nis_server *
123get_server(char *host, nis_server *srv, endpoint eps[], int  maxep)
124{
125	int			num_ep = 0, i;
126	struct netconfig	*nc;
127	void			*nch;
128	struct nd_hostserv	hs;
129	struct nd_addrlist	*addrs;
130
131	if (! host)
132		return (NULL);
133	hs.h_host = host;
134	hs.h_serv = "rpcbind";
135	nch = setnetconfig();
136	while (nc = getnetconfig(nch)) {
137		if ((nc->nc_flag & NC_VISIBLE) == 0)
138			continue;
139		if (! netdir_getbyname(nc, &hs, &addrs)) {
140			for (i = 0; (i < (addrs->n_cnt)) && (num_ep < maxep);
141								i++, num_ep++) {
142				eps[num_ep].uaddr =
143					taddr2uaddr(nc, &(addrs->n_addrs[i]));
144				__nis_netconfig2ep(nc, &(eps[num_ep]));
145			}
146			netdir_free((char *)addrs, ND_ADDRLIST);
147		}
148	}
149	(void) endnetconfig(nch);
150
151	srv->name = (nis_name) host;
152	srv->ep.ep_len = num_ep;
153	srv->ep.ep_val = eps;
154	srv->key_type = NIS_PK_NONE;
155	srv->pkey.n_bytes = NULL;
156	srv->pkey.n_len = 0;
157	return (srv);
158}
159
160#define	MEP(ep, prot)	(strcasecmp(ep.proto, prot) == 0)
161#define	MAX_ENDPOINTS	32
162
163/*
164 * __rpc_get_time_offset()
165 *
166 * This function uses a nis_server structure to contact the a remote
167 * machine (as named in that structure) and returns the offset in time
168 * between that machine and this one. This offset is returned in seconds
169 * and may be positive or negative.
170 *
171 * The first time through, a lot of fiddling is done with the netconfig
172 * stuff to find a suitable transport. The function is very aggressive
173 * about choosing UDP or at worst TCP if it can. This is because
174 * those transports support both the RCPBIND call and the internet
175 * time service.
176 *
177 * Once through, *uaddr is set to the universal address of
178 * the machine and *netid is set to the local netid for the transport
179 * that uaddr goes with. On the second call, the netconfig stuff
180 * is skipped and the uaddr/netid pair are used to fetch the netconfig
181 * structure and to then contact the machine for the time.
182 *
183 * td = "server" - "client"
184 */
185int
186__rpc_get_time_offset(struct timeval *td, nis_server *srv,
187	char *thost, char **uaddr, char **netid)
188{
189	CLIENT			*clnt; 		/* Client handle 	*/
190	struct netbuf		*addr = 0;	/* address 		*/
191	void			*nc_handle;	/* Netconfig "state"	*/
192	struct netconfig	*nc;		/* Various handles	*/
193	endpoint		*ep;		/* useful endpoints	*/
194	char			*useua = NULL,	/* uaddr of selected xp	*/
195				*useid = NULL;	/* netid of selected xp	*/
196	int			epl, i;		/* counters		*/
197	enum clnt_stat		status;		/* result of clnt_call	*/
198	uint_t			thetime;
199	ulong_t			delta;
200	int			needfree = 0;
201	struct timeval		tv;
202	int			rtime_fd = -1, time_valid, flag = 0;
203	int			a1, a2, a3, a4;
204	char			ut[INET6_ADDRSTRLEN];
205	char			ipuaddr[INET6_ADDRSTRLEN];
206	endpoint		teps[MAX_ENDPOINTS],
207				*epcand[MAX_ENDPOINTS],
208				*nonipcand[MAX_ENDPOINTS],
209				supplied;
210	uint32_t		epc, nonip;
211	nis_server		tsrv;
212	void			(*oldsig)() = NULL; /* old alarm handler */
213	char 			*dot = NULL; /* tmp pointer */
214
215
216
217	nc = NULL;
218	td->tv_sec = 0;
219	td->tv_usec = 0;
220
221	/*
222	 * First check to see if we need to find and address for this
223	 * server.
224	 */
225	if (*uaddr == NULL) {
226		if ((srv != NULL) && (thost != NULL)) {
227			msg("both timehost and srv pointer used!");
228			return (0);
229		}
230		if (! srv) {
231			srv = get_server(thost, &tsrv, teps, 32);
232			if (! srv) {
233				msg("unable to contruct server data.");
234				return (0);
235			}
236			needfree = 1;	/* need to free data in endpoints */
237		}
238
239		nc_handle = (void *) setnetconfig();
240		if (! nc_handle) {
241			msg("unable to get netconfig info.");
242			if (needfree)
243				free_eps(teps, tsrv.ep.ep_len);
244			return (0);
245		}
246
247		ep = srv->ep.ep_val;
248		epl = srv->ep.ep_len;
249		for (i = 0; i < sizeof (epcand)/sizeof (epcand[0]); i++) {
250			epcand[i] = 0;
251			nonipcand[i] = 0;
252		}
253		epc = 0;
254		nonip = 0;
255
256		/*
257		 * Build the list of endpoint candidates. We prefer transports
258		 * that we know are IP, but let /etc/netconfig determine the
259		 * ordering among the IP transports.
260		 *
261		 * Note: We assume that the endpoint 'proto' field contains
262		 *	 the netid of the transport.
263		 */
264		while ((nc = getnetconfig(nc_handle)) != NULL) {
265
266			/* Is it a visible transport ? */
267			if ((nc->nc_flag & NC_VISIBLE) == 0)
268				continue;
269
270			/* Check against the end points */
271			for (i = 0; i < epl; i++) {
272				if (__nis_netconfig_matches_ep(nc, &(ep[i]))) {
273					if (MEP(ep[i], "udp") ||
274							MEP(ep[i], "udp6") ||
275							MEP(ep[i], "tcp") ||
276							MEP(ep[i], "tcp6")) {
277						epcand[epc++] = &(ep[i]);
278					} else {
279						nonipcand[nonip++] = &ep[i];
280					}
281					break;
282				}
283			}
284		}
285
286		(void) endnetconfig(nc_handle);
287
288		/*
289		 * epcand[] now contains the candidate transports. If there
290		 * were non-IP transports as well, add them to the end of the
291		 * candidate list.
292		 */
293		for (i = 0; i < nonip; i++) {
294			epcand[epc++] = nonipcand[i];
295		}
296
297		if (epc == 0) {
298			msg("no acceptable transport endpoints.");
299			if (needfree)
300				free_eps(teps, tsrv.ep.ep_len);
301			return (0);
302		}
303	} else {
304		/* Caller supplied a uaddr. Fake an endpoint. */
305		if (*netid != 0) {
306			supplied.proto = *netid;
307			/* Is it one of the known IP transports ? */
308			if (strcmp("udp", supplied.proto) &&
309				strcmp("udp6", supplied.proto) &&
310				strcmp("tcp", supplied.proto) &&
311				strcmp("tcp6", supplied.proto)) {
312				/* No, it's not */
313				nonip = 1;
314			} else {
315				nonip = 0;
316			}
317		} else {
318			supplied.proto = (strchr(*uaddr, ':') != 0) ?
319						"udp6" : "udp";
320			nonip = 0;
321		}
322		supplied.uaddr = *uaddr;
323		supplied.family = (strchr(*uaddr, ':') != 0) ?
324						"inet6" : "inet";
325		epcand[0] = &supplied;
326		epc = 1;
327		nonip = 0;
328	}
329
330	nc = 0;
331	clnt = 0;
332	status = RPC_FAILED;	/* Anything except RPC_SUCCESS */
333
334	/*
335	 * Loop over the endpoint candidates. Defer error reporting (except
336	 * for the netconfig entry) until we've looked at all candidates.
337	 */
338	for (i = 0; i < epc; i++) {
339
340		if (nc != 0)
341			freenetconfigent(nc);
342		nc = getnetconfigent(epcand[i]->proto);
343
344		if (nc == 0) {
345			msg("unable to locate netconfig info for netid.");
346			if (needfree)
347				free_eps(teps, tsrv.ep.ep_len);
348			return (0);
349		}
350
351		/*
352		 * Add the appropriate port number to the uaddr
353		 */
354		useua = epcand[i]->uaddr;
355		useid = epcand[i]->proto;
356		if (strcasecmp(nc->nc_protofmly, NC_INET) == 0) {
357			(void) sscanf(useua,
358					"%d.%d.%d.%d.", &a1, &a2, &a3, &a4);
359			(void) sprintf(ipuaddr, "%d.%d.%d.%d.0.111",
360					a1, a2, a3, a4);
361			useua = &ipuaddr[0];
362		} else if (strcasecmp(nc->nc_protofmly, NC_INET6) == 0) {
363			size_t	len;
364			char	*port = ".0.111";
365
366			if (strlen(useua) >= sizeof (ipuaddr)) {
367				freenetconfigent(nc);
368				if (needfree)
369					free_eps(teps, tsrv.ep.ep_len);
370				return (0);
371			}
372
373			(void) strcpy(ipuaddr, useua);
374
375			/* get the IPv6 address out of the uaddr */
376			if ((dot = strrchr(ipuaddr, '.')) != 0) {
377				*dot = '\0';
378				if ((dot = strrchr(ipuaddr, '.')) != 0)
379					*dot = '\0';
380			}
381
382			if (dot == 0 ||
383				(len = strlen(ipuaddr))+strlen(port) >=
384						sizeof (ipuaddr)) {
385				freenetconfigent(nc);
386				if (needfree)
387					free_eps(teps, tsrv.ep.ep_len);
388				return (0);
389			}
390
391			/* now put in 0.111 */
392			(void) strcat(ipuaddr + len, port);
393			useua = ipuaddr;
394		}
395
396		/*
397		 * Create the client handle to rpcbind. Note we always try
398		 * version 3 since that is the earliest version that supports
399		 * the RPCB_GETTIME call. Also it is the version that comes
400		 * standard with SVR4. Since most everyone supports TCP/IP
401		 * we could consider trying the rtime call first.
402		 */
403		if (clnt != 0)
404			clnt_destroy(clnt);
405		clnt = __nis_clnt_create(RPC_ANYFD, nc, useua, 0, 0, RPCBPROG,
406					RPCBVERS, 0, 0);
407		if (! clnt)
408			continue;
409
410		tv.tv_sec = 5;
411		tv.tv_usec = 0;
412		time_valid = 0;
413
414		status = clnt_call(clnt, RPCBPROC_GETTIME, xdr_void, NULL,
415					xdr_u_int, (char *)&thetime, tv);
416		/*
417		 * The only error we check for is anything but success. In
418		 * fact we could have seen PROGMISMATCH if talking to a 4.1
419		 * machine (pmap v2) or TIMEDOUT if the net was busy.
420		 */
421		if (status == RPC_SUCCESS)
422			break;
423
424	}
425
426	if (status == RPC_SUCCESS) {
427		time_valid = 1;
428	} else if (clnt == 0) {
429		msg("unable to create client handle to rpcbind.");
430		freenetconfigent(nc);
431		if (needfree)
432			free_eps(teps, tsrv.ep.ep_len);
433		return (0);
434	} else {
435
436		/*
437		 * Try the timeservice port. This presumably only exists
438		 * for IP transports, so we ignore the non-IP ones.
439		 */
440
441		for (i = 0; i < epc-nonip; i++) {
442
443			/*
444			 * Convert PMAP address into timeservice address
445			 * We take advantage of the fact that we "know" what
446			 * a universal address looks like for inet transports.
447			 *
448			 * We also know that the internet timeservice is always
449			 * listening on port 37.
450			 */
451
452			if (nc != 0)
453				freenetconfigent(nc);
454			nc = getnetconfigent(epcand[i]->proto);
455
456			if (nc == 0) {
457				msg("no netconfig info for netid.");
458				if (needfree)
459					free_eps(teps, tsrv.ep.ep_len);
460				return (0);
461			}
462
463			useua = epcand[i]->uaddr;
464			useid = epcand[i]->proto;
465
466			if (strcasecmp(nc->nc_protofmly, NC_INET) == 0)  {
467				(void) sscanf(useua,
468					"%d.%d.%d.%d.", &a1, &a2, &a3, &a4);
469				(void) sprintf(ut, "%d.%d.%d.%d.0.37",
470							a1, a2, a3, a4);
471			} else if (strcasecmp(nc->nc_protofmly, NC_INET6) ==
472					0) {
473				size_t	len;
474				char	*port = ".0.37";
475
476				if (strlen(useua) >= sizeof (ut)) {
477					goto error;
478				}
479
480				(void) strcpy(ut, useua);
481
482				/* get the IPv6 address out of the uaddr */
483				if ((dot = strrchr(ut, '.')) != 0) {
484					*dot = '\0';
485					if ((dot = strrchr(ut, '.')) != 0)
486						*dot = '\0';
487				}
488
489				if (dot == 0) {
490					goto error;
491				}
492
493				if ((len = strlen(ut))+strlen(port) >=
494						sizeof (ut)) {
495					goto error;
496				}
497
498				(void) strcat(ut + len, port);
499
500			}
501
502			addr = uaddr2taddr(nc, ut);
503			if (! addr) {
504				msg("timeservice uaddr to taddr failed.");
505				goto error;
506			}
507
508			rtime_fd = t_open(nc->nc_device, O_RDWR, NULL);
509			if (rtime_fd == -1) {
510				msg("unable to open fd to network.");
511				goto error;
512			}
513
514			if (t_bind(rtime_fd, NULL, NULL) < 0) {
515				msg("unable to bind an endpoint to fd.");
516				goto error;
517			}
518
519			/*
520			 * Now depending on whether or not we're talking to
521			 * UDP we set a timeout or not.
522			 */
523			if (nc->nc_semantics == NC_TPI_CLTS) {
524				struct t_unitdata tu_data;
525				struct pollfd pfd;
526				int res;
527
528				tu_data.addr = *addr;
529				tu_data.udata.buf = (char *)&thetime;
530				tu_data.udata.len = (uint_t)sizeof (thetime);
531				tu_data.udata.maxlen = tu_data.udata.len;
532				tu_data.opt.len = 0;
533				tu_data.opt.maxlen = 0;
534				if (t_sndudata(rtime_fd, &tu_data) == -1) {
535					msg("udp : t_sndudata failed.");
536					goto error;
537				}
538				pfd.fd = rtime_fd;
539				pfd.events =
540				POLLIN | POLLPRI | POLLRDNORM | POLLRDBAND;
541
542				do {
543					res = poll(&pfd, 1, 10000);
544				} while (res < 0);
545				if ((res <= 0) || (pfd.revents & POLLNVAL))
546					goto error;
547				if (t_rcvudata(rtime_fd, &tu_data, &flag) <
548						0) {
549					msg("t_rvcdata failed on udp trpt.");
550					goto error;
551				}
552				time_valid = 1;
553			} else {
554				struct t_call sndcall;
555
556				sndcall.addr = *addr;
557				sndcall.opt.len = sndcall.opt.maxlen = 0;
558				sndcall.udata.len = sndcall.udata.maxlen = 0;
559
560				oldsig = (void (*)())signal(SIGALRM,
561							alarm_hndler);
562				saw_alarm = 0; /* global tracking the alarm */
563				(void) alarm(20); /* only wait 20 seconds */
564				if (t_connect(rtime_fd, &sndcall, NULL) ==
565						-1) {
566					msg("connect tcp endpoint failedd.");
567					goto error;
568				}
569				if (saw_alarm) {
570					msg("alarm caught it; unreachable.");
571					goto error;
572				}
573				if (t_rcv(rtime_fd, (char *)&thetime,
574				    (uint_t)sizeof (thetime), &flag) !=
575						(uint_t)sizeof (thetime)) {
576					if (saw_alarm) {
577						/*EMPTY*/
578						msg("timed out TCP call.");
579					} else {
580						/*EMPTY*/
581						msg("wrong size results");
582					}
583					goto error;
584				}
585				time_valid = 1;
586			}
587			if (time_valid) {
588				thetime = ntohl(thetime);
589				/* adjust to UNIX time */
590				thetime = thetime - TOFFSET;
591			} else
592				thetime = 0;
593		}
594	}
595
596error:
597	/*
598	 * clean up our allocated data structures.
599	 */
600	if (addr)
601		netdir_free((char *)(addr), ND_ADDR);
602
603	if (rtime_fd != -1)
604		(void) t_close(rtime_fd);
605
606	if (clnt)
607		clnt_destroy(clnt);
608
609	if (nc)
610		freenetconfigent(nc);
611
612	if (oldsig) {
613		(void) alarm(0); /* reset that alarm if its outstanding */
614		(void) signal(SIGALRM, oldsig);
615	}
616
617	/*
618	 * note, don't free uaddr strings until after we've made a
619	 * copy of them.
620	 */
621	if (time_valid) {
622		if (! *netid) {
623			*netid = strdup(useid);
624			if (! *netid) {
625				msg("__rpc_get_time_offset: strdup failed.");
626				if (needfree)
627					free_eps(teps, tsrv.ep.ep_len);
628				return (0);
629			}
630
631			*uaddr = strdup(useua);
632			if (! *uaddr) {
633				msg("__rpc_get_time_offset: strdup failed.");
634				if (*netid)
635					free(*netid);
636				if (needfree)
637					free_eps(teps, tsrv.ep.ep_len);
638				return (0);
639			}
640		}
641
642		(void) gettimeofday(&tv, 0);
643
644		/* Round to the nearest second */
645		tv.tv_sec += (tv.tv_sec > 500000) ? 1 : 0;
646		delta = (thetime > tv.tv_sec) ? thetime - tv.tv_sec :
647						tv.tv_sec - thetime;
648		td->tv_sec = (thetime < tv.tv_sec) ? - delta : delta;
649		td->tv_usec = 0;
650	} else {
651		/*EMPTY*/
652		msg("unable to get the server's time.");
653	}
654
655	if (needfree)
656		free_eps(teps, tsrv.ep.ep_len);
657
658	return (time_valid);
659}
660