1 /*
2  * Copyright (c) 1995, 1996
3  *	Bill Paul <wpaul@ctr.columbia.edu>.  All rights reserved.
4  *
5  * Redistribution and use in source and binary forms, with or without
6  * modification, are permitted provided that the following conditions
7  * are met:
8  * 1. Redistributions of source code must retain the above copyright
9  *    notice, this list of conditions and the following disclaimer.
10  * 2. Redistributions in binary form must reproduce the above copyright
11  *    notice, this list of conditions and the following disclaimer in the
12  *    documentation and/or other materials provided with the distribution.
13  * 3. All advertising materials mentioning features or use of this software
14  *    must display the following acknowledgement:
15  *	This product includes software developed by Bill Paul.
16  * 4. Neither the name of the author nor the names of any co-contributors
17  *    may be used to endorse or promote products derived from this software
18  *    without specific prior written permission.
19  *
20  * THIS SOFTWARE IS PROVIDED BY Bill Paul AND CONTRIBUTORS ``AS IS'' AND
21  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
22  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
23  * ARE DISCLAIMED.  IN NO EVENT SHALL Bill Paul OR CONTRIBUTORS BE LIABLE
24  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
25  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
26  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
27  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
28  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
29  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
30  * SUCH DAMAGE.
31  *
32  * $FreeBSD: src/usr.sbin/rpc.yppasswdd/yppasswdd_main.c,v 1.27 2008/10/30 01:54:31 rafan Exp $
33  * $DragonFly: src/usr.sbin/rpc.yppasswdd/yppasswdd_main.c,v 1.5 2005/11/25 00:32:49 swildner Exp $
34  */
35 
36 #include <sys/param.h>
37 #include <sys/ioctl.h>
38 #include <sys/stat.h>
39 #include <sys/socket.h>
40 #include <sys/time.h>
41 #include <sys/resource.h>
42 #include <netinet/in.h>
43 
44 #include <err.h>
45 #include <errno.h>
46 #include <fcntl.h>
47 #include <memory.h>
48 #include <signal.h>
49 #include <stdio.h>
50 #include <stdlib.h> /* getenv, exit */
51 #include <string.h>
52 #include <string.h> /* strcmp */
53 #include <syslog.h>
54 #include <unistd.h>
55 
56 #include <rpc/rpc.h>
57 #include <rpc/rpc_com.h>
58 #include <rpc/pmap_clnt.h> /* for pmap_unset */
59 #include <rpcsvc/yp.h>
60 #include <rpcsvc/ypclnt.h>
61 
62 #include "yppasswd.h"
63 #include "yppasswdd_extern.h"
64 #include "yppasswd_private.h"
65 #include "ypxfr_extern.h"
66 #include "yp_extern.h"
67 
68 #ifndef SIG_PF
69 #define	SIG_PF void(*)(int)
70 #endif
71 
72 #ifdef DEBUG
73 #define	RPC_SVC_FG
74 #endif
75 
76 #define	_RPCSVC_CLOSEDOWN 120
77 int _rpcpmstart = 0;		/* Started by a port monitor ? */
78 static int _rpcfdtype;
79 		 /* Whether Stream or Datagram ? */
80 	/* States a server can be in wrt request */
81 
82 #define	_IDLE 0
83 #define	_SERVED 1
84 #define	_SERVING 2
85 
86 static char _localhost[] = "localhost";
87 static char _passwd_byname[] = "passwd.byname";
88 extern int _rpcsvcstate;	 /* Set when a request is serviced */
89 static char _progname[] = "rpc.yppasswdd";
90 char *progname = _progname;
91 static char _yp_dir[] = _PATH_YP;
92 const char *yp_dir = _yp_dir;
93 static char _passfile_default[] = _PATH_YP "master.passwd";
94 char *passfile_default = _passfile_default;
95 char *passfile;
96 char *yppasswd_domain = NULL;
97 int no_chsh = 0;
98 int no_chfn = 0;
99 int allow_additions = 0;
100 int multidomain = 0;
101 int verbose = 0;
102 int resvport = 1;
103 int inplace = 0;
104 char sockname[] = YP_SOCKNAME;
105 
106 static void
107 terminate(int sig __unused)
108 {
109 	rpcb_unset(YPPASSWDPROG, YPPASSWDVERS, NULL);
110 	rpcb_unset(MASTER_YPPASSWDPROG, MASTER_YPPASSWDVERS, NULL);
111 	unlink(sockname);
112 	exit(0);
113 }
114 
115 static void
116 reload(int sig __unused)
117 {
118 	load_securenets();
119 }
120 
121 static void
122 closedown(int sig __unused)
123 {
124 	if (_rpcsvcstate == _IDLE) {
125 		extern fd_set svc_fdset;
126 		static int size;
127 		int i, openfd;
128 
129 		if (_rpcfdtype == SOCK_DGRAM) {
130 			unlink(sockname);
131 			exit(0);
132 		}
133 		if (size == 0) {
134 			size = getdtablesize();
135 		}
136 		for (i = 0, openfd = 0; i < size && openfd < 2; i++)
137 			if (FD_ISSET(i, &svc_fdset))
138 				openfd++;
139 		if (openfd <= 1) {
140 			unlink(sockname);
141 			exit(0);
142 		}
143 	}
144 	if (_rpcsvcstate == _SERVED)
145 		_rpcsvcstate = _IDLE;
146 
147 	signal(SIGALRM, (SIG_PF) closedown);
148 	alarm(_RPCSVC_CLOSEDOWN/2);
149 }
150 
151 static void
152 usage(void)
153 {
154 	fprintf(stderr, "%s\n%s\n",
155 "usage: rpc.yppasswdd [-t master.passwd file] [-d domain] [-p path] [-s]",
156 "                     [-f] [-m] [-i] [-a] [-v] [-u] [-h]");
157 	exit(1);
158 }
159 
160 int
161 main(int argc, char *argv[])
162 {
163 	struct rlimit rlim;
164 	SVCXPRT *transp = NULL;
165 	struct sockaddr_in saddr;
166 	socklen_t asize = sizeof (saddr);
167 	struct netconfig *nconf;
168 	struct sigaction sa;
169 	void *localhandle;
170 	int ch;
171 	char *mastername;
172 	char myname[MAXHOSTNAMELEN + 2];
173 	int maxrec = RPC_MAXDATASIZE;
174 
175 	extern int debug;
176 
177 	debug = 1;
178 
179 	while ((ch = getopt(argc, argv, "t:d:p:sfamuivh")) != -1) {
180 		switch (ch) {
181 		case 't':
182 			passfile_default = optarg;
183 			break;
184 		case 'd':
185 			yppasswd_domain = optarg;
186 			break;
187 		case 's':
188 			no_chsh++;
189 			break;
190 		case 'f':
191 			no_chfn++;
192 			break;
193 		case 'p':
194 			yp_dir = optarg;
195 			break;
196 		case 'a':
197 			allow_additions++;
198 			break;
199 		case 'm':
200 			multidomain++;
201 			break;
202 		case 'i':
203 			inplace++;
204 			break;
205 		case 'v':
206 			verbose++;
207 			break;
208 		case 'u':
209 			resvport = 0;
210 			break;
211 		default:
212 		case 'h':
213 			usage();
214 			break;
215 		}
216 	}
217 
218 	if (yppasswd_domain == NULL) {
219 		if (yp_get_default_domain(&yppasswd_domain)) {
220 			yp_error("no domain specified and system domain \
221 name isn't set -- aborting");
222 		usage();
223 		}
224 	}
225 
226 	load_securenets();
227 
228 	if (getrpcport(_localhost, YPPROG, YPVERS, IPPROTO_UDP) <= 0) {
229 		yp_error("no ypserv processes registered with local portmap");
230 		yp_error("this host is not an NIS server -- aborting");
231 		exit(1);
232 	}
233 
234 	if ((mastername = ypxfr_get_master(yppasswd_domain,
235 		 _passwd_byname, _localhost, 0)) == NULL) {
236 		yp_error("can't get name of NIS master server for domain %s",
237 			 				yppasswd_domain);
238 		exit(1);
239 	}
240 
241 	if (gethostname((char *)&myname, sizeof(myname)) == -1) {
242 		yp_error("can't get local hostname: %s", strerror(errno));
243 		exit(1);
244 	}
245 
246 	if (strncasecmp(mastername, (char *)&myname, sizeof(myname))) {
247 		yp_error("master of %s is %s, but we are %s",
248 			"passwd.byname", mastername, myname);
249 		yp_error("this host is not the NIS master server for \
250 the %s domain -- aborting", yppasswd_domain);
251 		exit(1);
252 	}
253 
254 	debug = 0;
255 
256 	if (getsockname(0, (struct sockaddr *)&saddr, &asize) == 0) {
257 		socklen_t ssize = sizeof (int);
258 		if (saddr.sin_family != AF_INET)
259 			exit(1);
260 		if (getsockopt(0, SOL_SOCKET, SO_TYPE,
261 		    (char *)&_rpcfdtype, &ssize) == -1)
262 			exit(1);
263 		_rpcpmstart = 1;
264 	}
265 
266 	if (!debug && _rpcpmstart == 0) {
267 		if (daemon(0,0)) {
268 			err(1,"cannot fork");
269 		}
270 	}
271 	openlog("rpc.yppasswdd", LOG_PID, LOG_DAEMON);
272 	memset(&sa, 0, sizeof(sa));
273 	sa.sa_flags = SA_NOCLDWAIT;
274 	sigaction(SIGCHLD, &sa, NULL);
275 
276 	rpcb_unset(YPPASSWDPROG, YPPASSWDVERS, NULL);
277 	rpcb_unset(MASTER_YPPASSWDPROG, MASTER_YPPASSWDVERS, NULL);
278 
279 	rpc_control(RPC_SVC_CONNMAXREC_SET, &maxrec);
280 
281 	if (svc_create(yppasswdprog_1, YPPASSWDPROG, YPPASSWDVERS, "netpath") == 0) {
282 		yp_error("cannot create yppasswd service.");
283 		exit(1);
284 	}
285 	if (svc_create(master_yppasswdprog_1, MASTER_YPPASSWDPROG,
286 	    MASTER_YPPASSWDVERS, "netpath") == 0) {
287 		yp_error("cannot create master_yppasswd service.");
288 		exit(1);
289 	}
290 
291 	nconf = NULL;
292 	localhandle = setnetconfig();
293 	while ((nconf = getnetconfig(localhandle)) != NULL) {
294 		if (nconf->nc_protofmly != NULL &&
295 		    strcmp(nconf->nc_protofmly, NC_LOOPBACK) == 0)
296 			break;
297 	}
298 	if (nconf == NULL) {
299 		yp_error("getnetconfigent unix: %s", nc_sperror());
300 		exit(1);
301 	}
302 	unlink(sockname);
303 	transp = svcunix_create(RPC_ANYSOCK, 0, 0, sockname);
304 	if (transp == NULL) {
305 		yp_error("cannot create AF_LOCAL service.");
306 		exit(1);
307 	}
308 	if (!svc_reg(transp, MASTER_YPPASSWDPROG, MASTER_YPPASSWDVERS,
309 	    master_yppasswdprog_1, nconf)) {
310 		yp_error("unable to register (MASTER_YPPASSWDPROG, \
311 		    MASTER_YPPASSWDVERS, unix).");
312 		exit(1);
313 	}
314 	endnetconfig(localhandle);
315 
316 	/* Only root may connect() to the AF_UNIX link. */
317 	if (chmod(sockname, 0))
318 		err(1, "chmod of %s failed", sockname);
319 
320 	if (transp == NULL) {
321 		yp_error("could not create a handle");
322 		exit(1);
323 	}
324 	if (_rpcpmstart) {
325 		signal(SIGALRM, (SIG_PF) closedown);
326 		alarm(_RPCSVC_CLOSEDOWN/2);
327 	}
328 
329 	/* Unlimited resource limits. */
330 	rlim.rlim_cur = rlim.rlim_max = RLIM_INFINITY;
331 	setrlimit(RLIMIT_CPU, &rlim);
332 	setrlimit(RLIMIT_FSIZE, &rlim);
333 	setrlimit(RLIMIT_STACK, &rlim);
334 	setrlimit(RLIMIT_DATA, &rlim);
335 	setrlimit(RLIMIT_RSS, &rlim);
336 
337 	/* Don't drop core (not really necessary, but GP's). */
338 	rlim.rlim_cur = rlim.rlim_max = 0;
339 	setrlimit(RLIMIT_CORE, &rlim);
340 
341 	/* Turn off signals. */
342 	signal(SIGALRM, SIG_IGN);
343 	signal(SIGHUP, (SIG_PF) reload);
344 	signal(SIGINT, SIG_IGN);
345 	signal(SIGPIPE, SIG_IGN);
346 	signal(SIGQUIT, SIG_IGN);
347 	signal(SIGTERM, (SIG_PF) terminate);
348 
349 	svc_run();
350 	yp_error("svc_run returned");
351 	exit(1);
352 	/* NOTREACHED */
353 }
354