/* Unix SMB/Netbios implementation. Version 1.9. process incoming packets - main loop Copyright (C) Andrew Tridgell 1992-1998 This program is free software; you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation; either version 2 of the License, or (at your option) any later version. This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details. You should have received a copy of the GNU General Public License along with this program; if not, write to the Free Software Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA. */ #include "includes.h" extern int DEBUGLEVEL; time_t smb_last_time=(time_t)0; char *InBuffer = NULL; char *OutBuffer = NULL; char *last_inbuf = NULL; /* * Size of data we can send to client. Set * by the client for all protocols above CORE. * Set by us for CORE protocol. */ int max_send = BUFFER_SIZE; /* * Size of the data we can receive. Set by us. * Can be modified by the max xmit parameter. */ int max_recv = BUFFER_SIZE; extern int last_message; extern pstring sesssetup_user; extern char *last_inbuf; extern char *InBuffer; extern char *OutBuffer; extern int smb_read_error; extern BOOL reload_after_sighup; extern int max_send; /**************************************************************************** Do a select on an two fd's - with timeout. If a local udp message has been pushed onto the queue (this can only happen during oplock break processing) return this first. If a pending smb message has been pushed onto the queue (this can only happen during oplock break processing) return this next. If the first smbfd is ready then read an smb from it. if the second (loopback UDP) fd is ready then read a message from it and setup the buffer header to identify the length and from address. Returns False on timeout or error. Else returns True. The timeout is in milli seconds ****************************************************************************/ static BOOL receive_message_or_msrpc(int c, char *buffer, int buffer_len, int timeout, BOOL *got_smb) { fd_set fds; int selrtn; struct timeval to; int maxfd; smb_read_error = 0; *got_smb = False; /* * Check to see if we already have a message on the smb queue. * If so - copy and return it. */ /* * Setup the select read fd set. */ FD_ZERO(&fds); FD_SET(c,&fds); maxfd = 0; to.tv_sec = timeout / 1000; to.tv_usec = (timeout % 1000) * 1000; selrtn = sys_select(MAX(maxfd,c)+1,&fds,NULL, timeout>0?&to:NULL); /* Check if error */ if(selrtn == -1) { /* something is wrong. Maybe the socket is dead? */ smb_read_error = READ_ERROR; return False; } /* Did we timeout ? */ if (selrtn == 0) { smb_read_error = READ_TIMEOUT; return False; } if (FD_ISSET(c,&fds)) { *got_smb = True; return receive_smb(c, buffer, 0); } return False; } /* These flags determine some of the permissions required to do an operation Note that I don't set NEED_WRITE on some write operations because they are used by some brain-dead clients when printing, and I don't want to force write permissions on print services. */ #define AS_USER (1<<0) #define NEED_WRITE (1<<1) #define TIME_INIT (1<<2) #define CAN_IPC (1<<3) #define AS_GUEST (1<<5) #define QUEUE_IN_OPLOCK (1<<6) /* define a list of possible SMB messages and their corresponding functions. Any message that has a NULL function is unimplemented - please feel free to contribute implementations! */ /**************************************************************************** do a switch on the message type, and return the response size ****************************************************************************/ static int do_message(pipes_struct *p, char *inbuf,char *outbuf,int size,int bufsize) { static int pid= -1; prs_struct pd; int outsize = -1; /* make a static data parsing structure from the api_fd_reply data */ prs_init(&pd, 0, 4, 0, True); mem_create(pd.data, smb_base(inbuf), 0, smb_len(inbuf), 0, False); if (pid == -1) pid = getpid(); /* dce/rpc command */ if (rpc_to_smb(p, smb_base(inbuf), smb_len(inbuf))) { char *copy_into = smb_base(outbuf); outsize = mem_buf_len(p->rsmb_pdu.data); if (!mem_buf_copy(copy_into, p->rsmb_pdu.data, 0, outsize)) { return -1; } mem_free_data(p->rsmb_pdu.data); } return outsize; } /**************************************************************************** construct a reply to the incoming packet ****************************************************************************/ static int construct_reply(pipes_struct *p, char *inbuf,char *outbuf,int size,int bufsize) { int outsize = 0; smb_last_time = time(NULL); outsize = do_message(p, inbuf,outbuf,size,bufsize) + 4; if(outsize > 4) _smb_setlen(outbuf,outsize - 4); return(outsize); } /**************************************************************************** process an smb from the client - split out from the process() code so it can be used by the oplock break code. ****************************************************************************/ static void process_msrpc(pipes_struct *p, int c, char *inbuf, char *outbuf) { static int trans_num; int32 len = smb_len(inbuf); int nread = len + 4; if (trans_num == 0) { /* on the first packet, check the global hosts allow/ hosts deny parameters before doing any parsing of the packet passed to us by the client. This prevents attacks on our parsing code from hosts not in the hosts allow list */ if (!check_access(c, lp_hostsallow(-1), lp_hostsdeny(-1))) { /* send a negative session response "not listining on calling name" */ DEBUG( 1, ( "Connection denied from %s\n", client_addr(c) ) ); exit_server("connection denied"); } } DEBUG( 6, ( "got message of len 0x%x\n", len ) ); DEBUG( 3, ( "Transaction %d of length %d\n", trans_num, nread ) ); dump_data(10, inbuf, len); #ifdef WITH_VTP if(trans_num == 1 && VT_Check(inbuf)) { VT_Process(); return; } #endif nread = construct_reply(p, inbuf,outbuf,nread,max_send); if(nread > 0) { dump_data(10, outbuf, nread); if (nread != smb_len(outbuf) + 4) { DEBUG(0,("ERROR: Invalid message response size! %d %d\n", nread, smb_len(outbuf))); } else send_smb(c,outbuf); } trans_num++; } /**************************************************************************** reads user credentials from the socket ****************************************************************************/ BOOL get_user_creds(int c, struct user_creds *usr) { pstring buf; int rl; uint32 len; BOOL new_con = False; uint32 status; CREDS_CMD cmd; prs_struct ps; ZERO_STRUCTP(usr); ZERO_STRUCT(cmd); cmd.cred = usr; DEBUG(10,("get_user_creds: first request\n")); rl = read(c, &buf, sizeof(len)); if (rl != sizeof(len)) { DEBUG(0,("Unable to read length\n")); dump_data(0, buf, sizeof(len)); return False; } len = IVAL(buf, 0); if (len > sizeof(buf)) { DEBUG(0,("length %d too long\n", len)); return False; } rl = read(c, buf, len); if (rl < 0) { DEBUG(0,("Unable to read from connection\n")); return False; } #ifdef DEBUG_PASSWORD dump_data(100, buf, rl); #endif /* make a static data parsing structure from the api_fd_reply data */ prs_init(&ps, 0, 4, 0, True); mem_create(ps.data, buf, 0, len, 0, False); if (!creds_io_cmd("creds", &cmd, &ps, 0)) { DEBUG(0,("Unable to parse credentials\n")); mem_free_data(ps.data); return False; } mem_free_data(ps.data); if (ps.offset != rl) { DEBUG(0,("Buffer size %d %d!\n", ps.offset, rl)); return False; } switch (cmd.command) { case AGENT_CMD_CON: case AGENT_CMD_CON_ANON: { new_con = True; break; } case AGENT_CMD_CON_REUSE: { new_con = True; break; } default: { DEBUG(0,("unknown command %d\n", cmd.command)); return False; } } status = new_con ? 0x0 : 0x1; if (write(c, &status, sizeof(status)) != sizeof(status)) { return False; } return new_con; } /**************************************************************************** initialise from pipe ****************************************************************************/ BOOL msrpcd_init(int c, pipes_struct *p) { struct user_creds usr; gid_t *groups = NULL; char *user; if (!get_user_creds(c, &usr)) { DEBUG(0,("authentication failed\n")); free_user_creds(&usr); return False; } if (usr.uxs.num_grps != 0) { int i; groups = malloc(usr.uxs.num_grps * sizeof(groups[0])); if (groups == NULL) { return False; } for (i = 0; i < usr.uxs.num_grps; i++) { groups[i] = (gid_t)usr.uxs.grps[i]; } } p->vuid = create_vuid(usr.uxs.uid, usr.uxs.gid, usr.uxs.num_grps, groups, usr.uxc.user_name, usr.uxc.requested_name, usr.uxc.real_name, usr.uxc.guest, usr.ntc.pwd.sess_key); if (p->vuid == UID_FIELD_INVALID) { return False; } free_user_creds(&usr); if (!become_vuser(p->vuid)) { return False; } p->l = malloc(sizeof(*p->l)); if (p->l == NULL) { return False; } ZERO_STRUCTP(p->l); user = usr.uxc.user_name; if (!strequal(user,lp_guestaccount(-1)) && lp_servicenumber(user) < 0) { int homes = lp_servicenumber(HOMES_NAME); char *home = get_unixhome_dir(user); if (homes >= 0 && home) { pstring home_dir; fstrcpy(home_dir, home); lp_add_home(user,homes,home_dir); } } return True; } /**************************************************************************** process commands from the client ****************************************************************************/ void msrpcd_process(int c, pipes_struct *p) { InBuffer = (char *)malloc(BUFFER_SIZE + SAFETY_MARGIN); OutBuffer = (char *)malloc(BUFFER_SIZE + SAFETY_MARGIN); if ((InBuffer == NULL) || (OutBuffer == NULL)) return; InBuffer += SMB_ALIGNMENT; OutBuffer += SMB_ALIGNMENT; max_recv = MIN(lp_maxxmit(),BUFFER_SIZE); /* re-initialise the timezone */ TimeInit(); while (True) { int counter; int service_load_counter = 0; BOOL got_smb = False; errno = 0; for (counter=SMBD_SELECT_LOOP; !receive_message_or_msrpc(c, InBuffer,BUFFER_SIZE, SMBD_SELECT_LOOP*1000,&got_smb); counter += SMBD_SELECT_LOOP) { time_t t; if (counter > 365 * 3600) /* big number of seconds. */ { counter = 0; service_load_counter = 0; } if (smb_read_error == READ_EOF) { DEBUG(3,("end of file from client\n")); return; } if (smb_read_error == READ_ERROR) { DEBUG(3,("receive_smb error (%s) exiting\n", strerror(errno))); return; } t = time(NULL); /* check for smb.conf reload */ if (counter >= service_load_counter + SMBD_RELOAD_CHECK) { service_load_counter = counter; /* reload services, if files have changed. */ reload_services(True); } /* * If reload_after_sighup == True then we got a SIGHUP * and are being asked to reload. Fix from */ if (reload_after_sighup) { DEBUG(0,("Reloading services after SIGHUP\n")); reload_services(False); reload_after_sighup = False; /* * Use this as an excuse to print some stats. */ } /* automatic timeout if all connections are closed */ if (counter >= IDLE_CLOSED_TIMEOUT) { DEBUG( 2, ( "Closing idle connection\n" ) ); return; } } if(got_smb) process_msrpc(p, c, InBuffer, OutBuffer); } }