1 /* 2 * Copyright (c) 1995, 1996 3 * Bill Paul <wpaul@ctr.columbia.edu>. All rights reserved. 4 * 5 * Redistribution and use in source and binary forms, with or without 6 * modification, are permitted provided that the following conditions 7 * are met: 8 * 1. Redistributions of source code must retain the above copyright 9 * notice, this list of conditions and the following disclaimer. 10 * 2. Redistributions in binary form must reproduce the above copyright 11 * notice, this list of conditions and the following disclaimer in the 12 * documentation and/or other materials provided with the distribution. 13 * 3. All advertising materials mentioning features or use of this software 14 * must display the following acknowledgement: 15 * This product includes software developed by Bill Paul. 16 * 4. Neither the name of the author nor the names of any co-contributors 17 * may be used to endorse or promote products derived from this software 18 * without specific prior written permission. 19 * 20 * THIS SOFTWARE IS PROVIDED BY Bill Paul AND CONTRIBUTORS ``AS IS'' AND 21 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 22 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 23 * ARE DISCLAIMED. IN NO EVENT SHALL Bill Paul OR CONTRIBUTORS BE LIABLE 24 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 25 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 26 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 27 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 28 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 29 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 30 * SUCH DAMAGE. 31 * 32 * $FreeBSD: src/usr.sbin/rpc.yppasswdd/yppasswdd_main.c,v 1.27 2008/10/30 01:54:31 rafan Exp $ 33 * $DragonFly: src/usr.sbin/rpc.yppasswdd/yppasswdd_main.c,v 1.5 2005/11/25 00:32:49 swildner Exp $ 34 */ 35 36 #include <sys/param.h> 37 #include <sys/ioctl.h> 38 #include <sys/stat.h> 39 #include <sys/socket.h> 40 #include <sys/time.h> 41 #include <sys/resource.h> 42 #include <netinet/in.h> 43 44 #include <err.h> 45 #include <errno.h> 46 #include <fcntl.h> 47 #include <memory.h> 48 #include <signal.h> 49 #include <stdio.h> 50 #include <stdlib.h> /* getenv, exit */ 51 #include <string.h> 52 #include <string.h> /* strcmp */ 53 #include <syslog.h> 54 #include <unistd.h> 55 56 #include <rpc/rpc.h> 57 #include <rpc/rpc_com.h> 58 #include <rpc/pmap_clnt.h> /* for pmap_unset */ 59 #include <rpcsvc/yp.h> 60 #include <rpcsvc/ypclnt.h> 61 62 #include "yppasswd.h" 63 #include "yppasswdd_extern.h" 64 #include "yppasswd_private.h" 65 #include "ypxfr_extern.h" 66 #include "yp_extern.h" 67 68 #ifndef SIG_PF 69 #define SIG_PF void(*)(int) 70 #endif 71 72 #ifdef DEBUG 73 #define RPC_SVC_FG 74 #endif 75 76 #define _RPCSVC_CLOSEDOWN 120 77 int _rpcpmstart = 0; /* Started by a port monitor ? */ 78 static int _rpcfdtype; 79 /* Whether Stream or Datagram ? */ 80 /* States a server can be in wrt request */ 81 82 #define _IDLE 0 83 #define _SERVED 1 84 #define _SERVING 2 85 86 static char _localhost[] = "localhost"; 87 static char _passwd_byname[] = "passwd.byname"; 88 extern int _rpcsvcstate; /* Set when a request is serviced */ 89 static char _progname[] = "rpc.yppasswdd"; 90 char *progname = _progname; 91 static char _yp_dir[] = _PATH_YP; 92 const char *yp_dir = _yp_dir; 93 static char _passfile_default[] = _PATH_YP "master.passwd"; 94 char *passfile_default = _passfile_default; 95 char *passfile; 96 char *yppasswd_domain = NULL; 97 int no_chsh = 0; 98 int no_chfn = 0; 99 int allow_additions = 0; 100 int multidomain = 0; 101 int verbose = 0; 102 int resvport = 1; 103 int inplace = 0; 104 char sockname[] = YP_SOCKNAME; 105 106 static void 107 terminate(int sig __unused) 108 { 109 rpcb_unset(YPPASSWDPROG, YPPASSWDVERS, NULL); 110 rpcb_unset(MASTER_YPPASSWDPROG, MASTER_YPPASSWDVERS, NULL); 111 unlink(sockname); 112 exit(0); 113 } 114 115 static void 116 reload(int sig __unused) 117 { 118 load_securenets(); 119 } 120 121 static void 122 closedown(int sig __unused) 123 { 124 if (_rpcsvcstate == _IDLE) { 125 extern fd_set svc_fdset; 126 static int size; 127 int i, openfd; 128 129 if (_rpcfdtype == SOCK_DGRAM) { 130 unlink(sockname); 131 exit(0); 132 } 133 if (size == 0) { 134 size = getdtablesize(); 135 } 136 for (i = 0, openfd = 0; i < size && openfd < 2; i++) 137 if (FD_ISSET(i, &svc_fdset)) 138 openfd++; 139 if (openfd <= 1) { 140 unlink(sockname); 141 exit(0); 142 } 143 } 144 if (_rpcsvcstate == _SERVED) 145 _rpcsvcstate = _IDLE; 146 147 signal(SIGALRM, (SIG_PF) closedown); 148 alarm(_RPCSVC_CLOSEDOWN/2); 149 } 150 151 static void 152 usage(void) 153 { 154 fprintf(stderr, "%s\n%s\n", 155 "usage: rpc.yppasswdd [-t master.passwd file] [-d domain] [-p path] [-s]", 156 " [-f] [-m] [-i] [-a] [-v] [-u] [-h]"); 157 exit(1); 158 } 159 160 int 161 main(int argc, char *argv[]) 162 { 163 struct rlimit rlim; 164 SVCXPRT *transp = NULL; 165 struct sockaddr_in saddr; 166 socklen_t asize = sizeof (saddr); 167 struct netconfig *nconf; 168 struct sigaction sa; 169 void *localhandle; 170 int ch; 171 char *mastername; 172 char myname[MAXHOSTNAMELEN + 2]; 173 int maxrec = RPC_MAXDATASIZE; 174 175 extern int debug; 176 177 debug = 1; 178 179 while ((ch = getopt(argc, argv, "t:d:p:sfamuivh")) != -1) { 180 switch (ch) { 181 case 't': 182 passfile_default = optarg; 183 break; 184 case 'd': 185 yppasswd_domain = optarg; 186 break; 187 case 's': 188 no_chsh++; 189 break; 190 case 'f': 191 no_chfn++; 192 break; 193 case 'p': 194 yp_dir = optarg; 195 break; 196 case 'a': 197 allow_additions++; 198 break; 199 case 'm': 200 multidomain++; 201 break; 202 case 'i': 203 inplace++; 204 break; 205 case 'v': 206 verbose++; 207 break; 208 case 'u': 209 resvport = 0; 210 break; 211 default: 212 case 'h': 213 usage(); 214 break; 215 } 216 } 217 218 if (yppasswd_domain == NULL) { 219 if (yp_get_default_domain(&yppasswd_domain)) { 220 yp_error("no domain specified and system domain \ 221 name isn't set -- aborting"); 222 usage(); 223 } 224 } 225 226 load_securenets(); 227 228 if (getrpcport(_localhost, YPPROG, YPVERS, IPPROTO_UDP) <= 0) { 229 yp_error("no ypserv processes registered with local portmap"); 230 yp_error("this host is not an NIS server -- aborting"); 231 exit(1); 232 } 233 234 if ((mastername = ypxfr_get_master(yppasswd_domain, 235 _passwd_byname, _localhost, 0)) == NULL) { 236 yp_error("can't get name of NIS master server for domain %s", 237 yppasswd_domain); 238 exit(1); 239 } 240 241 if (gethostname((char *)&myname, sizeof(myname)) == -1) { 242 yp_error("can't get local hostname: %s", strerror(errno)); 243 exit(1); 244 } 245 246 if (strncasecmp(mastername, (char *)&myname, sizeof(myname))) { 247 yp_error("master of %s is %s, but we are %s", 248 "passwd.byname", mastername, myname); 249 yp_error("this host is not the NIS master server for \ 250 the %s domain -- aborting", yppasswd_domain); 251 exit(1); 252 } 253 254 debug = 0; 255 256 if (getsockname(0, (struct sockaddr *)&saddr, &asize) == 0) { 257 socklen_t ssize = sizeof (int); 258 if (saddr.sin_family != AF_INET) 259 exit(1); 260 if (getsockopt(0, SOL_SOCKET, SO_TYPE, 261 (char *)&_rpcfdtype, &ssize) == -1) 262 exit(1); 263 _rpcpmstart = 1; 264 } 265 266 if (!debug && _rpcpmstart == 0) { 267 if (daemon(0,0)) { 268 err(1,"cannot fork"); 269 } 270 } 271 openlog("rpc.yppasswdd", LOG_PID, LOG_DAEMON); 272 memset(&sa, 0, sizeof(sa)); 273 sa.sa_flags = SA_NOCLDWAIT; 274 sigaction(SIGCHLD, &sa, NULL); 275 276 rpcb_unset(YPPASSWDPROG, YPPASSWDVERS, NULL); 277 rpcb_unset(MASTER_YPPASSWDPROG, MASTER_YPPASSWDVERS, NULL); 278 279 rpc_control(RPC_SVC_CONNMAXREC_SET, &maxrec); 280 281 if (svc_create(yppasswdprog_1, YPPASSWDPROG, YPPASSWDVERS, "netpath") == 0) { 282 yp_error("cannot create yppasswd service."); 283 exit(1); 284 } 285 if (svc_create(master_yppasswdprog_1, MASTER_YPPASSWDPROG, 286 MASTER_YPPASSWDVERS, "netpath") == 0) { 287 yp_error("cannot create master_yppasswd service."); 288 exit(1); 289 } 290 291 nconf = NULL; 292 localhandle = setnetconfig(); 293 while ((nconf = getnetconfig(localhandle)) != NULL) { 294 if (nconf->nc_protofmly != NULL && 295 strcmp(nconf->nc_protofmly, NC_LOOPBACK) == 0) 296 break; 297 } 298 if (nconf == NULL) { 299 yp_error("getnetconfigent unix: %s", nc_sperror()); 300 exit(1); 301 } 302 unlink(sockname); 303 transp = svcunix_create(RPC_ANYSOCK, 0, 0, sockname); 304 if (transp == NULL) { 305 yp_error("cannot create AF_LOCAL service."); 306 exit(1); 307 } 308 if (!svc_reg(transp, MASTER_YPPASSWDPROG, MASTER_YPPASSWDVERS, 309 master_yppasswdprog_1, nconf)) { 310 yp_error("unable to register (MASTER_YPPASSWDPROG, \ 311 MASTER_YPPASSWDVERS, unix)."); 312 exit(1); 313 } 314 endnetconfig(localhandle); 315 316 /* Only root may connect() to the AF_UNIX link. */ 317 if (chmod(sockname, 0)) 318 err(1, "chmod of %s failed", sockname); 319 320 if (transp == NULL) { 321 yp_error("could not create a handle"); 322 exit(1); 323 } 324 if (_rpcpmstart) { 325 signal(SIGALRM, (SIG_PF) closedown); 326 alarm(_RPCSVC_CLOSEDOWN/2); 327 } 328 329 /* Unlimited resource limits. */ 330 rlim.rlim_cur = rlim.rlim_max = RLIM_INFINITY; 331 setrlimit(RLIMIT_CPU, &rlim); 332 setrlimit(RLIMIT_FSIZE, &rlim); 333 setrlimit(RLIMIT_STACK, &rlim); 334 setrlimit(RLIMIT_DATA, &rlim); 335 setrlimit(RLIMIT_RSS, &rlim); 336 337 /* Don't drop core (not really necessary, but GP's). */ 338 rlim.rlim_cur = rlim.rlim_max = 0; 339 setrlimit(RLIMIT_CORE, &rlim); 340 341 /* Turn off signals. */ 342 signal(SIGALRM, SIG_IGN); 343 signal(SIGHUP, (SIG_PF) reload); 344 signal(SIGINT, SIG_IGN); 345 signal(SIGPIPE, SIG_IGN); 346 signal(SIGQUIT, SIG_IGN); 347 signal(SIGTERM, (SIG_PF) terminate); 348 349 svc_run(); 350 yp_error("svc_run returned"); 351 exit(1); 352 /* NOTREACHED */ 353 } 354