mirror of
https://git.hardenedbsd.org/hardenedbsd/HardenedBSD.git
synced 2024-11-15 06:42:51 +01:00
2aef693010
Rest of build to follow.
121 lines
3.1 KiB
C
121 lines
3.1 KiB
C
/*
|
|
* Front end to the ULTRIX miscd service. The front end logs the remote host
|
|
* name and then invokes the real miscd daemon. Install as "/usr/etc/miscd",
|
|
* after renaming the real miscd daemon to the name defined with the
|
|
* REAL_MISCD macro.
|
|
*
|
|
* Connections and diagnostics are logged through syslog(3).
|
|
*
|
|
* The Ultrix miscd program implements (among others) the systat service, which
|
|
* pipes the output from who(1) to stdout. This information is potentially
|
|
* useful to systems crackers.
|
|
*
|
|
* Author: Wietse Venema, Eindhoven University of Technology, The Netherlands.
|
|
*/
|
|
|
|
#ifndef lint
|
|
static char sccsid[] = "@(#) miscd.c 1.10 96/02/11 17:01:30";
|
|
#endif
|
|
|
|
/* System libraries. */
|
|
|
|
#include <sys/types.h>
|
|
#include <sys/param.h>
|
|
#include <sys/stat.h>
|
|
#include <sys/socket.h>
|
|
#include <netinet/in.h>
|
|
#include <stdio.h>
|
|
#include <syslog.h>
|
|
|
|
#ifndef MAXPATHNAMELEN
|
|
#define MAXPATHNAMELEN BUFSIZ
|
|
#endif
|
|
|
|
#ifndef STDIN_FILENO
|
|
#define STDIN_FILENO 0
|
|
#endif
|
|
|
|
/* Local stuff. */
|
|
|
|
#include "patchlevel.h"
|
|
#include "tcpd.h"
|
|
|
|
int allow_severity = SEVERITY; /* run-time adjustable */
|
|
int deny_severity = LOG_WARNING; /* ditto */
|
|
|
|
main(argc, argv)
|
|
int argc;
|
|
char **argv;
|
|
{
|
|
struct request_info request;
|
|
char path[MAXPATHNAMELEN];
|
|
|
|
/* Attempt to prevent the creation of world-writable files. */
|
|
|
|
#ifdef DAEMON_UMASK
|
|
umask(DAEMON_UMASK);
|
|
#endif
|
|
|
|
/*
|
|
* Open a channel to the syslog daemon. Older versions of openlog()
|
|
* require only two arguments.
|
|
*/
|
|
|
|
#ifdef LOG_MAIL
|
|
(void) openlog(argv[0], LOG_PID, FACILITY);
|
|
#else
|
|
(void) openlog(argv[0], LOG_PID);
|
|
#endif
|
|
|
|
/*
|
|
* Find out the endpoint addresses of this conversation. Host name
|
|
* lookups and double checks will be done on demand.
|
|
*/
|
|
|
|
request_init(&request, RQ_DAEMON, argv[0], RQ_FILE, STDIN_FILENO, 0);
|
|
fromhost(&request);
|
|
|
|
/*
|
|
* Optionally look up and double check the remote host name. Sites
|
|
* concerned with security may choose to refuse connections from hosts
|
|
* that pretend to have someone elses host name.
|
|
*/
|
|
|
|
#ifdef PARANOID
|
|
if (STR_EQ(eval_hostname(request.client), paranoid))
|
|
refuse(&request);
|
|
#endif
|
|
|
|
/*
|
|
* The BSD rlogin and rsh daemons that came out after 4.3 BSD disallow
|
|
* socket options at the IP level. They do so for a good reason.
|
|
* Unfortunately, we cannot use this with SunOS 4.1.x because the
|
|
* getsockopt() system call can panic the system.
|
|
*/
|
|
|
|
#ifdef KILL_IP_OPTIONS
|
|
fix_options(&request);
|
|
#endif
|
|
|
|
/*
|
|
* Check whether this host can access the service in argv[0]. The
|
|
* access-control code invokes optional shell commands as specified in
|
|
* the access-control tables.
|
|
*/
|
|
|
|
#ifdef HOSTS_ACCESS
|
|
if (!hosts_access(&request))
|
|
refuse(&request);
|
|
#endif
|
|
|
|
/* Report request and invoke the real daemon program. */
|
|
|
|
syslog(allow_severity, "connect from %s", eval_client(&request));
|
|
sprintf(path, "%s/miscd", REAL_DAEMON_DIR);
|
|
closelog();
|
|
(void) execv(path, argv);
|
|
syslog(LOG_ERR, "error: cannot execute %s: %m", path);
|
|
clean_exit(&request);
|
|
/* NOTREACHED */
|
|
}
|