2 * Copyright (c) 1990, 1993
3 * The Regents of the University of California. All rights reserved.
5 * Redistribution and use in source and binary forms, with or without
6 * modification, are permitted provided that the following conditions
8 * 1. Redistributions of source code must retain the above copyright
9 * notice, this list of conditions and the following disclaimer.
10 * 2. Redistributions in binary form must reproduce the above copyright
11 * notice, this list of conditions and the following disclaimer in the
12 * documentation and/or other materials provided with the distribution.
13 * 3. All advertising materials mentioning features or use of this software
14 * must display the following acknowledgement:
15 * This product includes software developed by the University of
16 * California, Berkeley and its contributors.
17 * 4. Neither the name of the University nor the names of its contributors
18 * may be used to endorse or promote products derived from this software
19 * without specific prior written permission.
21 * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
22 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
23 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
24 * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
25 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
26 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
27 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
28 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
29 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
30 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
35 static const char copyright[] =
36 "@(#) Copyright (c) 1990, 1993\n\
37 The Regents of the University of California. All rights reserved.\n";
42 static char sccsid[] = "@(#)portmap.c 8.1 (Berkeley) 6/6/93";
44 static const char rcsid[] =
45 "$FreeBSD: src/usr.sbin/portmap/portmap.c,v 1.10.2.3 2002/05/06 18:18:21 dwmalone Exp $";
49 @(#)portmap.c 2.3 88/08/11 4.0 RPCSRC
50 static char sccsid[] = "@(#)portmap.c 1.32 87/08/06 Copyr 1984 Sun Micro";
54 * portmap.c, Implements the program,version to port number mapping for
59 * Sun RPC is a product of Sun Microsystems, Inc. and is provided for
60 * unrestricted use provided that this legend is included on all tape
61 * media and as a part of the software program in whole or part. Users
62 * may copy or modify Sun RPC without charge, but are not authorized
63 * to license or distribute it to anyone else except as part of a product or
64 * program developed by the user.
66 * SUN RPC IS PROVIDED AS IS WITH NO WARRANTIES OF ANY KIND INCLUDING THE
67 * WARRANTIES OF DESIGN, MERCHANTIBILITY AND FITNESS FOR A PARTICULAR
68 * PURPOSE, OR ARISING FROM A COURSE OF DEALING, USAGE OR TRADE PRACTICE.
70 * Sun RPC is provided with no support and without any obligation on the
71 * part of Sun Microsystems, Inc. to assist in its use, correction,
72 * modification or enhancement.
74 * SUN MICROSYSTEMS, INC. SHALL HAVE NO LIABILITY WITH RESPECT TO THE
75 * INFRINGEMENT OF COPYRIGHTS, TRADE SECRETS OR ANY PATENTS BY SUN RPC
76 * OR ANY PART THEREOF.
78 * In no event will Sun Microsystems, Inc. be liable for any lost revenue
79 * or profits or other special, indirect and consequential damages, even if
80 * Sun has been advised of the possibility of such damages.
82 * Sun Microsystems, Inc.
84 * Mountain View, California 94043
96 #include <rpc/pmap_prot.h>
97 #include <sys/socket.h>
98 #include <sys/ioctl.h>
100 #include <sys/signal.h>
101 #include <sys/resource.h>
103 #include "pmap_check.h"
105 static void reg_service __P((struct svc_req *, SVCXPRT *));
106 static void reap __P((int));
107 static void callit __P((struct svc_req *, SVCXPRT *));
108 static void usage __P((void));
110 struct pmaplist *pmaplist;
122 struct sockaddr_in addr;
123 int len = sizeof(struct sockaddr_in);
124 register struct pmaplist *pml;
126 while ((c = getopt(argc, argv, "dvh:")) != -1) {
139 hosts = realloc(hosts, nhosts * sizeof(char *));
140 hosts[nhosts - 1] = optarg;
148 if (!debugging && daemon(0, 0))
151 openlog("portmap", debugging ? LOG_PID | LOG_PERROR : LOG_PID,
154 bzero(&addr, sizeof(addr));
155 addr.sin_family = AF_INET;
156 addr.sin_port = htons(PMAPPORT);
159 * If no hosts were specified, just bind to INADDR_ANY. Otherwise
160 * make sure 127.0.0.1 is added to the list.
163 hosts = realloc(hosts, nhosts * sizeof(char *));
165 hosts[0] = "0.0.0.0";
167 hosts[nhosts - 1] = "127.0.0.1";
170 * Add UDP socket(s) - bind to specific IPs if asked to
175 if (!inet_aton(hosts[nhosts], &addr.sin_addr)) {
176 syslog(LOG_ERR, "bad IP address: %s", hosts[nhosts]);
179 if ((sock = socket(AF_INET, SOCK_DGRAM, IPPROTO_UDP)) < 0) {
180 syslog(LOG_ERR, "cannot create udp socket: %m");
184 if (bind(sock, (struct sockaddr *)&addr, len) != 0) {
185 syslog(LOG_ERR, "cannot bind udp: %m");
189 if ((xprt = svcudp_create(sock)) == (SVCXPRT *)NULL) {
190 syslog(LOG_ERR, "couldn't do udp_create");
194 /* make an entry for ourself */
195 pml = (struct pmaplist *)malloc((u_int)sizeof(struct pmaplist));
197 pml->pml_map.pm_prog = PMAPPROG;
198 pml->pml_map.pm_vers = PMAPVERS;
199 pml->pml_map.pm_prot = IPPROTO_UDP;
200 pml->pml_map.pm_port = PMAPPORT;
206 addr.sin_addr.s_addr = 0;
207 if ((sock = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP)) < 0) {
208 syslog(LOG_ERR, "cannot create tcp socket: %m");
211 if (bind(sock, (struct sockaddr *)&addr, len) != 0) {
212 syslog(LOG_ERR, "cannot bind tcp: %m");
215 if ((xprt = svctcp_create(sock, RPCSMALLMSGSIZE, RPCSMALLMSGSIZE))
216 == (SVCXPRT *)NULL) {
217 syslog(LOG_ERR, "couldn't do tcp_create");
220 /* make an entry for ourself */
221 pml = (struct pmaplist *)malloc((u_int)sizeof(struct pmaplist));
222 pml->pml_map.pm_prog = PMAPPROG;
223 pml->pml_map.pm_vers = PMAPVERS;
224 pml->pml_map.pm_prot = IPPROTO_TCP;
225 pml->pml_map.pm_port = PMAPPORT;
226 pml->pml_next = pmaplist;
229 (void)svc_register(xprt, PMAPPROG, PMAPVERS, reg_service, FALSE);
231 /* additional initializations */
233 (void)signal(SIGCHLD, reap);
235 syslog(LOG_ERR, "svc_run returned unexpectedly");
242 fprintf(stderr, "usage: portmap [-dv] [-h bindip]\n");
247 /* need to override perror calls in rpc library */
252 syslog(LOG_ERR, "%s: %m", what);
256 static struct pmaplist *
257 find_service(prog, vers, prot)
258 u_long prog, vers, prot;
260 register struct pmaplist *hit = NULL;
261 register struct pmaplist *pml;
263 for (pml = pmaplist; pml != NULL; pml = pml->pml_next) {
264 if ((pml->pml_map.pm_prog != prog) ||
265 (pml->pml_map.pm_prot != prot))
268 if (pml->pml_map.pm_vers == vers)
278 reg_service(rqstp, xprt)
279 struct svc_req *rqstp;
283 struct pmaplist *pml, *prevpml, *fnd;
288 * Later wrappers change the logging severity on the fly. Reset to
289 * defaults before handling the next request.
291 allow_severity = LOG_INFO;
292 deny_severity = LOG_WARNING;
295 (void) fprintf(stderr, "server: about to do a switch\n");
296 switch (rqstp->rq_proc) {
302 /* remote host authorization check */
303 check_default(svc_getcaller(xprt), rqstp->rq_proc, (u_long) 0);
304 if (!svc_sendreply(xprt, xdr_void, (caddr_t)0) && debugging) {
311 * Set a program,version to port mapping
313 if (!svc_getargs(xprt, xdr_pmap, (caddr_t)®))
316 /* reject non-local requests, protect priv. ports */
317 if (!check_setunset(svc_getcaller(xprt),
318 rqstp->rq_proc, reg.pm_prog, reg.pm_port)) {
323 * check to see if already used
324 * find_service returns a hit even if
325 * the versions don't match, so check for it
327 fnd = find_service(reg.pm_prog, reg.pm_vers, reg.pm_prot);
328 if (fnd && fnd->pml_map.pm_vers == reg.pm_vers) {
329 if (fnd->pml_map.pm_port == reg.pm_port) {
341 pml = (struct pmaplist *)
342 malloc((u_int)sizeof(struct pmaplist));
348 for (fnd= pmaplist; fnd->pml_next != 0;
349 fnd = fnd->pml_next);
355 if ((!svc_sendreply(xprt, xdr_long, (caddr_t)&ans)) &&
357 (void) fprintf(stderr, "svc_sendreply\n");
365 * Remove a program,version to port mapping.
367 if (!svc_getargs(xprt, xdr_pmap, (caddr_t)®))
371 /* reject non-local requests */
372 if (!check_setunset(svc_getcaller(xprt),
373 rqstp->rq_proc, reg.pm_prog, (u_long) 0))
375 for (prevpml = NULL, pml = pmaplist; pml != NULL; ) {
376 if ((pml->pml_map.pm_prog != reg.pm_prog) ||
377 (pml->pml_map.pm_vers != reg.pm_vers)) {
378 /* both pml & prevpml move forwards */
383 /* found it; pml moves forward, prevpml stays */
384 /* privileged port check */
385 if (!check_privileged_port(svc_getcaller(xprt),
388 pml->pml_map.pm_port)) {
398 prevpml->pml_next = pml;
401 if ((!svc_sendreply(xprt, xdr_long, (caddr_t)&ans)) &&
403 (void) fprintf(stderr, "svc_sendreply\n");
409 case PMAPPROC_GETPORT:
411 * Lookup the mapping for a program,version and return its port
413 if (!svc_getargs(xprt, xdr_pmap, (caddr_t)®))
416 /* remote host authorization check */
417 if (!check_default(svc_getcaller(xprt),
423 fnd = find_service(reg.pm_prog, reg.pm_vers, reg.pm_prot);
425 port = fnd->pml_map.pm_port;
428 if ((!svc_sendreply(xprt, xdr_long, (caddr_t)&port)) &&
430 (void) fprintf(stderr, "svc_sendreply\n");
438 * Return the current set of mapped program,version
440 if (!svc_getargs(xprt, xdr_void, NULL))
443 /* remote host authorization check */
445 if (!check_default(svc_getcaller(xprt),
446 rqstp->rq_proc, (u_long) 0)) {
447 p = 0; /* send empty list */
451 if ((!svc_sendreply(xprt, xdr_pmaplist,
452 (caddr_t)&p)) && debugging) {
453 (void) fprintf(stderr, "svc_sendreply\n");
459 case PMAPPROC_CALLIT:
461 * Calls a procedure on the local machine. If the requested
462 * procedure is not registered this procedure does not return
463 * error information!!
464 * This procedure is only supported on rpc/udp and calls via
465 * rpc/udp. It passes null authentication parameters.
471 /* remote host authorization check */
472 check_default(svc_getcaller(xprt), rqstp->rq_proc, (u_long) 0);
480 * Stuff for the rmtcall service
490 xdr_encap_parms(xdrs, epp)
492 struct encap_parms *epp;
495 return (xdr_bytes(xdrs, &(epp->args), &(epp->arglen), ARGSIZE));
503 struct encap_parms rmt_args;
507 xdr_rmtcall_args(xdrs, cap)
509 struct rmtcallargs *cap;
512 /* does not get a port number */
513 if (xdr_u_long(xdrs, &(cap->rmt_prog)) &&
514 xdr_u_long(xdrs, &(cap->rmt_vers)) &&
515 xdr_u_long(xdrs, &(cap->rmt_proc))) {
516 return (xdr_encap_parms(xdrs, &(cap->rmt_args)));
522 xdr_rmtcall_result(xdrs, cap)
524 struct rmtcallargs *cap;
526 if (xdr_u_long(xdrs, &(cap->rmt_port)))
527 return (xdr_encap_parms(xdrs, &(cap->rmt_args)));
532 * only worries about the struct encap_parms part of struct rmtcallargs.
533 * The arglen must already be set!!
536 xdr_opaque_parms(xdrs, cap)
538 struct rmtcallargs *cap;
540 return (xdr_opaque(xdrs, cap->rmt_args.args, cap->rmt_args.arglen));
544 * This routine finds and sets the length of incoming opaque paraters
545 * and then calls xdr_opaque_parms.
548 xdr_len_opaque_parms(xdrs, cap)
550 struct rmtcallargs *cap;
552 register u_int beginpos, lowpos, highpos, currpos, pos;
554 beginpos = lowpos = pos = xdr_getpos(xdrs);
555 highpos = lowpos + ARGSIZE;
556 while ((int)(highpos - lowpos) >= 0) {
557 currpos = (lowpos + highpos) / 2;
558 if (xdr_setpos(xdrs, currpos)) {
560 lowpos = currpos + 1;
562 highpos = currpos - 1;
565 xdr_setpos(xdrs, beginpos);
566 cap->rmt_args.arglen = pos - beginpos;
567 return (xdr_opaque_parms(xdrs, cap));
571 * Call a remote procedure service
572 * This procedure is very quiet when things go wrong.
573 * The proc is written to support broadcast rpc. In the broadcast case,
574 * a machine should shut-up instead of complain, less the requestor be
575 * overrun with complaints at the expense of not hearing a valid reply ...
577 * This now forks so that the program & process that it calls can call
578 * back to the portmapper.
582 struct svc_req *rqstp;
585 struct rmtcallargs a;
586 struct pmaplist *pml;
588 struct sockaddr_in me;
591 struct authunix_parms *au = (struct authunix_parms *)rqstp->rq_clntcred;
592 struct timeval timeout;
597 a.rmt_args.args = buf;
598 if (!svc_getargs(xprt, xdr_rmtcall_args, (caddr_t)&a))
600 /* host and service access control */
601 if (!check_callit(svc_getcaller(xprt),
602 rqstp->rq_proc, a.rmt_prog, a.rmt_proc))
604 if ((pml = find_service(a.rmt_prog, a.rmt_vers,
605 (u_long)IPPROTO_UDP)) == NULL)
608 * fork a child to do the work. Parent immediately returns.
609 * Child exits upon completion.
611 if ((pid = fork()) != 0) {
613 syslog(LOG_ERR, "CALLIT (prog %lu): fork: %m",
617 port = pml->pml_map.pm_port;
619 me.sin_port = htons(port);
620 client = clntudp_create(&me, a.rmt_prog, a.rmt_vers, timeout, &so);
621 if (client != (CLIENT *)NULL) {
622 if (rqstp->rq_cred.oa_flavor == AUTH_UNIX) {
623 client->cl_auth = authunix_create(au->aup_machname,
624 au->aup_uid, au->aup_gid, au->aup_len, au->aup_gids);
626 a.rmt_port = (u_long)port;
627 if (clnt_call(client, a.rmt_proc, xdr_opaque_parms, &a,
628 xdr_len_opaque_parms, &a, timeout) == RPC_SUCCESS) {
629 svc_sendreply(xprt, xdr_rmtcall_result, (caddr_t)&a);
631 AUTH_DESTROY(client->cl_auth);
632 clnt_destroy(client);
645 while (wait3((int *)NULL, WNOHANG, (struct rusage *)NULL) > 0);