123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177 |
- /*
- * Pscan is a mini port scanner implementation for busybox
- *
- * Copyright 2007 Tito Ragusa <farmatito@tiscali.it>
- *
- * Licensed under GPLv2 or later, see file LICENSE in this source tree.
- */
- //config:config PSCAN
- //config: bool "pscan (6.6 kb)"
- //config: default y
- //config: help
- //config: Simple network port scanner.
- //applet:IF_PSCAN(APPLET(pscan, BB_DIR_USR_BIN, BB_SUID_DROP))
- //kbuild:lib-$(CONFIG_PSCAN) += pscan.o
- //usage:#define pscan_trivial_usage
- //usage: "[-cb] [-p MIN_PORT] [-P MAX_PORT] [-t TIMEOUT] [-T MIN_RTT] HOST"
- //usage:#define pscan_full_usage "\n\n"
- //usage: "Scan a host, print all open ports\n"
- //usage: "\n -c Show closed ports too"
- //usage: "\n -b Show blocked ports too"
- //usage: "\n -p Scan from this port (default 1)"
- //usage: "\n -P Scan up to this port (default 1024)"
- //usage: "\n -t Timeout (default 5000 ms)"
- //usage: "\n -T Minimum rtt (default 5 ms, increase for congested hosts)"
- #include "libbb.h"
- /* debugging */
- #ifdef DEBUG_PSCAN
- #define DMSG(...) bb_error_msg(__VA_ARGS__)
- #define DERR(...) bb_perror_msg(__VA_ARGS__)
- #else
- #define DMSG(...) ((void)0)
- #define DERR(...) ((void)0)
- #endif
- static const char *port_name(unsigned port)
- {
- struct servent *server;
- server = getservbyport(htons(port), NULL);
- if (server)
- return server->s_name;
- return "unknown";
- }
- /* We don't expect to see 1000+ seconds delay, unsigned is enough */
- #define MONOTONIC_US() ((unsigned)monotonic_us())
- int pscan_main(int argc, char **argv) MAIN_EXTERNALLY_VISIBLE;
- int pscan_main(int argc UNUSED_PARAM, char **argv)
- {
- const char *opt_max_port = "1024"; /* -P: default max port */
- const char *opt_min_port = "1"; /* -p: default min port */
- const char *opt_timeout = "5000"; /* -t: default timeout in msec */
- /* We estimate rtt and wait rtt*4 before concluding that port is
- * totally blocked. min rtt of 5 ms may be too low if you are
- * scanning an Internet host behind saturated/traffic shaped link.
- * Rule of thumb: with min_rtt of N msec, scanning 1000 ports
- * will take N seconds at absolute minimum */
- const char *opt_min_rtt = "5"; /* -T: default min rtt in msec */
- const char *result_str;
- len_and_sockaddr *lsap;
- int s;
- unsigned opt;
- unsigned port, max_port, nports;
- unsigned closed_ports = 0;
- unsigned open_ports = 0;
- /* all in usec */
- unsigned timeout;
- unsigned min_rtt;
- unsigned rtt_4;
- unsigned start, diff;
- opt = getopt32(argv, "^"
- "cbp:P:t:T:"
- "\0" "=1", /* exactly one non-option */
- &opt_min_port, &opt_max_port, &opt_timeout, &opt_min_rtt
- );
- argv += optind;
- max_port = xatou_range(opt_max_port, 1, 65535);
- port = xatou_range(opt_min_port, 1, max_port);
- nports = max_port - port + 1;
- min_rtt = xatou_range(opt_min_rtt, 1, INT_MAX/1000 / 4) * 1000;
- timeout = xatou_range(opt_timeout, 1, INT_MAX/1000 / 4) * 1000;
- /* Initial rtt is BIG: */
- rtt_4 = timeout;
- DMSG("min_rtt %u timeout %u", min_rtt, timeout);
- lsap = xhost2sockaddr(*argv, port);
- printf("Scanning %s ports %u to %u\n Port\tProto\tState\tService\n",
- *argv, port, max_port);
- for (; port <= max_port; port++) {
- DMSG("rtt %u", rtt_4);
- /* The SOCK_STREAM socket type is implemented on the TCP/IP protocol. */
- set_nport(&lsap->u.sa, htons(port));
- s = xsocket(lsap->u.sa.sa_family, SOCK_STREAM, 0);
- /* We need unblocking socket so we don't need to wait for ETIMEOUT. */
- /* Nonblocking connect typically "fails" with errno == EINPROGRESS */
- ndelay_on(s);
- DMSG("connect to port %u", port);
- result_str = NULL;
- start = MONOTONIC_US();
- if (connect(s, &lsap->u.sa, lsap->len) == 0) {
- /* Unlikely, for me even localhost fails :) */
- DMSG("connect succeeded");
- goto open;
- }
- /* Check for untypical errors... */
- if (errno != EAGAIN && errno != EINPROGRESS
- && errno != ECONNREFUSED
- ) {
- bb_perror_nomsg_and_die();
- }
- diff = 0;
- while (1) {
- if (errno == ECONNREFUSED) {
- if (opt & 1) /* -c: show closed too */
- result_str = "closed";
- closed_ports++;
- break;
- }
- DERR("port %u errno %d @%u", port, errno, diff);
- if (diff > rtt_4) {
- if (opt & 2) /* -b: show blocked too */
- result_str = "blocked";
- break;
- }
- /* Can sleep (much) longer than specified delay.
- * We check rtt BEFORE we usleep, otherwise
- * on localhost we'll have no writes done (!)
- * before we exceed (rather small) rtt */
- usleep(rtt_4/8);
- open:
- diff = MONOTONIC_US() - start;
- DMSG("write to port %u @%u", port, diff - start);
- if (write(s, " ", 1) >= 0) { /* We were able to write to the socket */
- open_ports++;
- result_str = "open";
- break;
- }
- }
- DMSG("out of loop @%u", diff);
- if (result_str)
- printf("%5u" "\t" "tcp" "\t" "%s" "\t" "%s" "\n",
- port, result_str, port_name(port));
- /* Estimate new rtt - we don't want to wait entire timeout
- * for each port. *4 allows for rise in net delay.
- * We increase rtt quickly (rtt_4*4), decrease slowly
- * (diff is at least rtt_4/8, *4 == rtt_4/2)
- * because we don't want to accidentally miss ports. */
- rtt_4 = diff * 4;
- if (rtt_4 < min_rtt)
- rtt_4 = min_rtt;
- if (rtt_4 > timeout)
- rtt_4 = timeout;
- /* Clean up */
- close(s);
- }
- if (ENABLE_FEATURE_CLEAN_UP) free(lsap);
- printf("%u closed, %u open, %u timed out (or blocked) ports\n",
- closed_ports,
- open_ports,
- nports - (closed_ports + open_ports));
- return EXIT_SUCCESS;
- }
|