xref: /dragonfly/lib/libc/rpc/auth_time.c (revision f02303f9)
1 #pragma ident	"@(#)auth_time.c	1.4	92/11/10 SMI"
2 
3 /*
4  *	auth_time.c
5  *
6  * This module contains the private function __rpc_get_time_offset()
7  * which will return the difference in seconds between the local system's
8  * notion of time and a remote server's notion of time. This must be
9  * possible without calling any functions that may invoke the name
10  * service. (netdir_getbyxxx, getXbyY, etc). The function is used in the
11  * synchronize call of the authdes code to synchronize clocks between
12  * NIS+ clients and their servers.
13  *
14  * Note to minimize the amount of duplicate code, portions of the
15  * synchronize() function were folded into this code, and the synchronize
16  * call becomes simply a wrapper around this function. Further, if this
17  * function is called with a timehost it *DOES* recurse to the name
18  * server so don't use it in that mode if you are doing name service code.
19  *
20  *	Copyright (c) 1992 Sun Microsystems Inc.
21  *	All rights reserved.
22  *
23  * Side effects :
24  *	When called a client handle to a RPCBIND process is created
25  *	and destroyed. Two strings "netid" and "uaddr" are malloc'd
26  *	and returned. The SIGALRM processing is modified only if
27  *	needed to deal with TCP connections.
28  *
29  * NOTE: This code has had the crap beaten out it in order to convert
30  *       it from TI-RPC back to TD-RPC for use on FreeBSD.
31  *
32  * $FreeBSD: src/lib/libc/rpc/auth_time.c,v 1.4 2000/01/27 23:06:35 jasone Exp $
33  * $DragonFly: src/lib/libc/rpc/auth_time.c,v 1.4 2005/11/13 12:27:04 swildner Exp $
34  */
35 #include "namespace.h"
36 #include <stdio.h>
37 #include <syslog.h>
38 #include <string.h>
39 #include <stdlib.h>
40 #include <unistd.h>
41 #include <netdb.h>
42 #include <sys/signal.h>
43 #include <sys/errno.h>
44 #include <sys/socket.h>
45 #include <netinet/in.h>
46 #include <arpa/inet.h>
47 #include <rpc/rpc.h>
48 #include <rpc/rpc_com.h>
49 #undef NIS
50 #include <rpcsvc/nis.h>
51 #include "un-namespace.h"
52 
53 /*
54  * FreeBSD currently uses RPC 4.0, which uses portmap rather than
55  * rpcbind. Consequently, we need to fake up these values here.
56  * Luckily, the RPCB_GETTIME procedure uses only base XDR data types
57  * so we don't need anything besides these magic numbers.
58  */
59 #define RPCBPROG (u_long)100000
60 #define RPCBVERS (u_long)3
61 #define RPCBPROC_GETTIME (u_long)6
62 
63 #ifdef TESTING
64 #define	msg(x)	printf("ERROR: %s\n", x)
65 /* #define msg(x) syslog(LOG_ERR, "%s", x) */
66 #else
67 #define	msg(x)
68 #endif
69 
70 static int saw_alarm = 0;
71 
72 static void
73 alarm_hndler(int s)
74 {
75 	saw_alarm = 1;
76 	return;
77 }
78 
79 /*
80  * The internet time server defines the epoch to be Jan 1, 1900
81  * whereas UNIX defines it to be Jan 1, 1970. To adjust the result
82  * from internet time-service time, into UNIX time we subtract the
83  * following offset :
84  */
85 #define	NYEARS	(1970 - 1900)
86 #define	TOFFSET ((u_long)60*60*24*(365*NYEARS + (NYEARS/4)))
87 
88 
89 /*
90  * Stolen from rpc.nisd:
91  * Turn a 'universal address' into a struct sockaddr_in.
92  * Bletch.
93  */
94 static int
95 uaddr_to_sockaddr(char *uaddr, struct sockaddr_in *sin)
96 {
97 	unsigned char		p_bytes[2];
98 	int			i;
99 	unsigned long		a[6];
100 
101 	i = sscanf(uaddr, "%lu.%lu.%lu.%lu.%lu.%lu", &a[0], &a[1], &a[2],
102 						&a[3], &a[4], &a[5]);
103 
104 	if (i < 6)
105 		return(1);
106 
107 	for (i = 0; i < 4; i++)
108 		sin->sin_addr.s_addr |= (a[i] & 0x000000FF) << (8 * i);
109 
110 	p_bytes[0] = (unsigned char)a[4] & 0x000000FF;
111 	p_bytes[1] = (unsigned char)a[5] & 0x000000FF;
112 
113 	sin->sin_family = AF_INET; /* always */
114 	bcopy((char *)&p_bytes, (char *)&sin->sin_port, 2);
115 
116 	return (0);
117 }
118 
119 /*
120  * free_eps()
121  *
122  * Free the strings that were strduped into the eps structure.
123  */
124 static void
125 free_eps(endpoint eps[], int num)
126 {
127 	int		i;
128 
129 	for (i = 0; i < num; i++) {
130 		free(eps[i].uaddr);
131 		free(eps[i].proto);
132 		free(eps[i].family);
133 	}
134 	return;
135 }
136 
137 /*
138  * get_server()
139  *
140  * This function constructs a nis_server structure description for the
141  * indicated hostname.
142  *
143  * NOTE: There is a chance we may end up recursing here due to the
144  * fact that gethostbyname() could do an NIS search. Ideally, the
145  * NIS+ server will call __rpc_get_time_offset() with the nis_server
146  * structure already populated.
147  */
148 static nis_server *
149 get_server(struct sockaddr_in *sin,
150 	   char *host,			/* name of the time host	*/
151 	   nis_server *srv,		/* nis_server struct to use.	*/
152 	   endpoint eps[],		/* array of endpoints		*/
153 	   int maxep)			/* max array size		*/
154 {
155 	char			hname[256];
156 	int			num_ep = 0, i;
157 	struct hostent		*he;
158 	struct hostent		dummy;
159 	char			*ptr[2];
160 
161 	if (host == NULL && sin == NULL)
162 		return (NULL);
163 
164 	if (sin == NULL) {
165 		he = gethostbyname(host);
166 		if (he == NULL)
167 			return(NULL);
168 	} else {
169 		he = &dummy;
170 		ptr[0] = (char *)&sin->sin_addr.s_addr;
171 		ptr[1] = NULL;
172 		dummy.h_addr_list = ptr;
173 	}
174 
175 	/*
176 	 * This is lame. We go around once for TCP, then again
177 	 * for UDP.
178 	 */
179 	for (i = 0; (he->h_addr_list[i] != NULL) && (num_ep < maxep);
180 						i++, num_ep++) {
181 		struct in_addr *a;
182 
183 		a = (struct in_addr *)he->h_addr_list[i];
184 		snprintf(hname, sizeof(hname), "%s.0.111", inet_ntoa(*a));
185 		eps[num_ep].uaddr = strdup(hname);
186 		eps[num_ep].family = strdup("inet");
187 		eps[num_ep].proto =  strdup("tcp");
188 	}
189 
190 	for (i = 0; (he->h_addr_list[i] != NULL) && (num_ep < maxep);
191 						i++, num_ep++) {
192 		struct in_addr *a;
193 
194 		a = (struct in_addr *)he->h_addr_list[i];
195 		snprintf(hname, sizeof(hname), "%s.0.111", inet_ntoa(*a));
196 		eps[num_ep].uaddr = strdup(hname);
197 		eps[num_ep].family = strdup("inet");
198 		eps[num_ep].proto =  strdup("udp");
199 	}
200 
201 	srv->name = (nis_name) host;
202 	srv->ep.ep_len = num_ep;
203 	srv->ep.ep_val = eps;
204 	srv->key_type = NIS_PK_NONE;
205 	srv->pkey.n_bytes = NULL;
206 	srv->pkey.n_len = 0;
207 	return (srv);
208 }
209 
210 /*
211  * __rpc_get_time_offset()
212  *
213  * This function uses a nis_server structure to contact the a remote
214  * machine (as named in that structure) and returns the offset in time
215  * between that machine and this one. This offset is returned in seconds
216  * and may be positive or negative.
217  *
218  * The first time through, a lot of fiddling is done with the netconfig
219  * stuff to find a suitable transport. The function is very aggressive
220  * about choosing UDP or at worst TCP if it can. This is because
221  * those transports support both the RCPBIND call and the internet
222  * time service.
223  *
224  * Once through, *uaddr is set to the universal address of
225  * the machine and *netid is set to the local netid for the transport
226  * that uaddr goes with. On the second call, the netconfig stuff
227  * is skipped and the uaddr/netid pair are used to fetch the netconfig
228  * structure and to then contact the machine for the time.
229  *
230  * td = "server" - "client"
231  */
232 int
233 __rpc_get_time_offset(struct timeval *td,	/* Time difference			*/
234 		      nis_server *srv,		/* NIS Server description 		*/
235 		      char *thost,		/* if no server, this is the timehost	*/
236 		      char **uaddr,		/* known universal address		*/
237 		      struct sockaddr_in *netid)/* known network identifier		*/
238 {
239 	CLIENT			*clnt; 		/* Client handle 	*/
240 	endpoint		*ep,		/* useful endpoints	*/
241 				*useep = NULL;	/* endpoint of xp	*/
242 	char			*useua = NULL;	/* uaddr of selected xp	*/
243 	int			epl, i;		/* counters		*/
244 	enum clnt_stat		status;		/* result of clnt_call	*/
245 	u_long			thetime, delta;
246 	int			needfree = 0;
247 	struct timeval		tv;
248 	int			time_valid;
249 	int			udp_ep = -1, tcp_ep = -1;
250 	int			a1, a2, a3, a4;
251 	char			ut[64], ipuaddr[64];
252 	endpoint		teps[32];
253 	nis_server		tsrv;
254 	void			(*oldsig)() = NULL; /* old alarm handler */
255 	struct sockaddr_in	sin;
256 	int			s = RPC_ANYSOCK, len;
257 	int			type = 0;
258 
259 	td->tv_sec = 0;
260 	td->tv_usec = 0;
261 
262 	/*
263 	 * First check to see if we need to find and address for this
264 	 * server.
265 	 */
266 	if (*uaddr == NULL) {
267 		if ((srv != NULL) && (thost != NULL)) {
268 			msg("both timehost and srv pointer used!");
269 			return (0);
270 		}
271 		if (! srv) {
272 			srv = get_server(netid, thost, &tsrv, teps, 32);
273 			if (srv == NULL) {
274 				msg("unable to contruct server data.");
275 				return (0);
276 			}
277 			needfree = 1;	/* need to free data in endpoints */
278 		}
279 
280 		ep = srv->ep.ep_val;
281 		epl = srv->ep.ep_len;
282 
283 		/* Identify the TCP and UDP endpoints */
284 		for (i = 0;
285 			(i < epl) && ((udp_ep == -1) || (tcp_ep == -1)); i++) {
286 			if (strcasecmp(ep[i].proto, "udp") == 0)
287 				udp_ep = i;
288 			if (strcasecmp(ep[i].proto, "tcp") == 0)
289 				tcp_ep = i;
290 		}
291 
292 		/* Check to see if it is UDP or TCP */
293 		if (tcp_ep > -1) {
294 			useep = &ep[tcp_ep];
295 			useua = ep[tcp_ep].uaddr;
296 			type = SOCK_STREAM;
297 		} else if (udp_ep > -1) {
298 			useep = &ep[udp_ep];
299 			useua = ep[udp_ep].uaddr;
300 			type = SOCK_DGRAM;
301 		}
302 
303 		if (useep == NULL) {
304 			msg("no acceptable transport endpoints.");
305 			if (needfree)
306 				free_eps(teps, tsrv.ep.ep_len);
307 			return (0);
308 		}
309 	}
310 
311 	/*
312 	 * Create a sockaddr from the uaddr.
313 	 */
314 	if (*uaddr != NULL)
315 		useua = *uaddr;
316 
317 	/* Fixup test for NIS+ */
318 	sscanf(useua, "%d.%d.%d.%d.", &a1, &a2, &a3, &a4);
319 	sprintf(ipuaddr, "%d.%d.%d.%d.0.111", a1, a2, a3, a4);
320 	useua = &ipuaddr[0];
321 
322 	bzero((char *)&sin, sizeof(sin));
323 	if (uaddr_to_sockaddr(useua, &sin)) {
324 		msg("unable to translate uaddr to sockaddr.");
325 		if (needfree)
326 			free_eps(teps, tsrv.ep.ep_len);
327 		return (0);
328 	}
329 
330 	/*
331 	 * Create the client handle to rpcbind. Note we always try
332 	 * version 3 since that is the earliest version that supports
333 	 * the RPCB_GETTIME call. Also it is the version that comes
334 	 * standard with SVR4. Since most everyone supports TCP/IP
335 	 * we could consider trying the rtime call first.
336 	 */
337 	clnt = clnttcp_create(&sin, RPCBPROG, RPCBVERS, &s, 0, 0);
338 	if (clnt == NULL) {
339 		msg("unable to create client handle to rpcbind.");
340 		if (needfree)
341 			free_eps(teps, tsrv.ep.ep_len);
342 		return (0);
343 	}
344 
345 	tv.tv_sec = 5;
346 	tv.tv_usec = 0;
347 	time_valid = 0;
348 	status = clnt_call(clnt, RPCBPROC_GETTIME, xdr_void, NULL,
349 					xdr_u_long, (char *)&thetime, tv);
350 	/*
351 	 * The only error we check for is anything but success. In
352 	 * fact we could have seen PROGMISMATCH if talking to a 4.1
353 	 * machine (pmap v2) or TIMEDOUT if the net was busy.
354 	 */
355 	if (status == RPC_SUCCESS)
356 		time_valid = 1;
357 	else {
358 		int save;
359 
360 		/* Blow away possible stale CLNT handle. */
361 		if (clnt != NULL) {
362 			clnt_destroy(clnt);
363 			clnt = NULL;
364 		}
365 
366 		/*
367 		 * Convert PMAP address into timeservice address
368 		 * We take advantage of the fact that we "know" what
369 		 * the universal address looks like for inet transports.
370 		 *
371 		 * We also know that the internet timeservice is always
372 		 * listening on port 37.
373 		 */
374 		sscanf(useua, "%d.%d.%d.%d.", &a1, &a2, &a3, &a4);
375 		sprintf(ut, "%d.%d.%d.%d.0.37", a1, a2, a3, a4);
376 
377 		if (uaddr_to_sockaddr(ut, &sin)) {
378 			msg("cannot convert timeservice uaddr to sockaddr.");
379 			goto error;
380 		}
381 
382 		s = _socket(AF_INET, type, 0);
383 		if (s == -1) {
384 			msg("unable to open fd to network.");
385 			goto error;
386 		}
387 
388 		/*
389 		 * Now depending on whether or not we're talking to
390 		 * UDP we set a timeout or not.
391 		 */
392 		if (type == SOCK_DGRAM) {
393 			struct timeval timeout = { 20, 0 };
394 			struct sockaddr_in from;
395 			fd_set readfds;
396 			int res;
397 
398 			if (_sendto(s, &thetime, sizeof(thetime), 0,
399 				(struct sockaddr *)&sin, sizeof(sin)) == -1) {
400 				msg("udp : sendto failed.");
401 				goto error;
402 			}
403 			do {
404 				FD_ZERO(&readfds);
405 				FD_SET(s, &readfds);
406 				res = _select(_rpc_dtablesize(), &readfds,
407 				     (fd_set *)NULL, (fd_set *)NULL, &timeout);
408 			} while (res < 0 && errno == EINTR);
409 			if (res <= 0)
410 				goto error;
411 			len = sizeof(from);
412 			res = _recvfrom(s, (char *)&thetime, sizeof(thetime), 0,
413 				       (struct sockaddr *)&from, &len);
414 			if (res == -1) {
415 				msg("recvfrom failed on udp transport.");
416 				goto error;
417 			}
418 			time_valid = 1;
419 		} else {
420 			int res;
421 
422 			oldsig = (void (*)())signal(SIGALRM, alarm_hndler);
423 			saw_alarm = 0; /* global tracking the alarm */
424 			alarm(20); /* only wait 20 seconds */
425 			res = _connect(s, (struct sockaddr *)&sin, sizeof(sin));
426 			if (res == -1) {
427 				msg("failed to connect to tcp endpoint.");
428 				goto error;
429 			}
430 			if (saw_alarm) {
431 				msg("alarm caught it, must be unreachable.");
432 				goto error;
433 			}
434 			res = _read(s, (char *)&thetime, sizeof(thetime));
435 			if (res != sizeof(thetime)) {
436 				if (saw_alarm)
437 					msg("timed out TCP call.");
438 				else
439 					msg("wrong size of results returned");
440 
441 				goto error;
442 			}
443 			time_valid = 1;
444 		}
445 		save = errno;
446 		_close(s);
447 		errno = save;
448 		s = RPC_ANYSOCK;
449 
450 		if (time_valid) {
451 			thetime = ntohl(thetime);
452 			thetime = thetime - TOFFSET; /* adjust to UNIX time */
453 		} else
454 			thetime = 0;
455 	}
456 
457 	gettimeofday(&tv, 0);
458 
459 error:
460 	/*
461 	 * clean up our allocated data structures.
462 	 */
463 
464 	if (s != RPC_ANYSOCK)
465 		_close(s);
466 
467 	if (clnt != NULL)
468 		clnt_destroy(clnt);
469 
470 	alarm(0);	/* reset that alarm if its outstanding */
471 	if (oldsig) {
472 		signal(SIGALRM, oldsig);
473 	}
474 
475 	/*
476 	 * note, don't free uaddr strings until after we've made a
477 	 * copy of them.
478 	 */
479 	if (time_valid) {
480 		if (*uaddr == NULL)
481 			*uaddr = strdup(useua);
482 
483 		/* Round to the nearest second */
484 		tv.tv_sec += (tv.tv_sec > 500000) ? 1 : 0;
485 		delta = (thetime > tv.tv_sec) ? thetime - tv.tv_sec :
486 						tv.tv_sec - thetime;
487 		td->tv_sec = (thetime < tv.tv_sec) ? - delta : delta;
488 		td->tv_usec = 0;
489 	} else {
490 		msg("unable to get the server's time.");
491 	}
492 
493 	if (needfree)
494 		free_eps(teps, tsrv.ep.ep_len);
495 
496 	return (time_valid);
497 }
498