import.c 7.0 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393
  1. #include <u.h>
  2. #include <libc.h>
  3. #include <auth.h>
  4. #include <libsec.h>
  5. enum {
  6. Encnone,
  7. Encssl,
  8. Enctls,
  9. };
  10. static char *encprotos[] = {
  11. [Encnone] = "clear",
  12. [Encssl] = "ssl",
  13. [Enctls] = "tls",
  14. nil,
  15. };
  16. char *keyspec = "";
  17. char *filterp;
  18. char *ealgs = "rc4_256 sha1";
  19. int encproto = Encnone;
  20. char *aan = "/bin/aan";
  21. AuthInfo *ai;
  22. int debug;
  23. int doauth = 1;
  24. int timedout;
  25. int connect(char*, char*, int);
  26. int passive(void);
  27. int old9p(int);
  28. void catcher(void*, char*);
  29. void sysfatal(char*, ...);
  30. void usage(void);
  31. int filter(int, char *, char *);
  32. static void mksecret(char *, uchar *);
  33. void
  34. post(char *name, char *envname, int srvfd)
  35. {
  36. int fd;
  37. char buf[32];
  38. fd = create(name, OWRITE, 0600);
  39. if(fd < 0)
  40. return;
  41. sprint(buf, "%d",srvfd);
  42. if(write(fd, buf, strlen(buf)) != strlen(buf))
  43. sysfatal("srv write: %r");
  44. close(fd);
  45. putenv(envname, name);
  46. }
  47. static int
  48. lookup(char *s, char *l[])
  49. {
  50. int i;
  51. for (i = 0; l[i] != 0; i++)
  52. if (strcmp(l[i], s) == 0)
  53. return i;
  54. return -1;
  55. }
  56. void
  57. main(int argc, char **argv)
  58. {
  59. char *mntpt;
  60. int fd, mntflags;
  61. int oldserver;
  62. char *srvpost, srvfile[64];
  63. int backwards = 0;
  64. srvpost = nil;
  65. oldserver = 0;
  66. mntflags = MREPL;
  67. ARGBEGIN{
  68. case 'A':
  69. doauth = 0;
  70. break;
  71. case 'a':
  72. mntflags = MAFTER;
  73. break;
  74. case 'b':
  75. mntflags = MBEFORE;
  76. break;
  77. case 'c':
  78. mntflags |= MCREATE;
  79. break;
  80. case 'C':
  81. mntflags |= MCACHE;
  82. break;
  83. case 'd':
  84. debug++;
  85. break;
  86. case 'f':
  87. /* ignored but allowed for compatibility */
  88. break;
  89. case 'O':
  90. case 'o':
  91. oldserver = 1;
  92. break;
  93. case 'E':
  94. if ((encproto = lookup(EARGF(usage()), encprotos)) < 0)
  95. usage();
  96. break;
  97. case 'e':
  98. ealgs = EARGF(usage());
  99. if(*ealgs == 0 || strcmp(ealgs, "clear") == 0)
  100. ealgs = nil;
  101. break;
  102. case 'k':
  103. keyspec = EARGF(usage());
  104. break;
  105. case 'p':
  106. filterp = aan;
  107. break;
  108. case 's':
  109. srvpost = EARGF(usage());
  110. break;
  111. case 'B':
  112. backwards = 1;
  113. break;
  114. default:
  115. usage();
  116. }ARGEND;
  117. mntpt = 0; /* to shut up compiler */
  118. if(backwards){
  119. switch(argc) {
  120. default:
  121. mntpt = argv[0];
  122. break;
  123. case 0:
  124. usage();
  125. }
  126. } else {
  127. switch(argc) {
  128. case 2:
  129. mntpt = argv[1];
  130. break;
  131. case 3:
  132. mntpt = argv[2];
  133. break;
  134. default:
  135. usage();
  136. }
  137. }
  138. if (encproto == Enctls)
  139. sysfatal("%s: tls has not yet been implemented\n", argv[0]);
  140. notify(catcher);
  141. alarm(60*1000);
  142. if(backwards)
  143. fd = passive();
  144. else
  145. fd = connect(argv[0], argv[1], oldserver);
  146. if (!oldserver)
  147. fprint(fd, "impo %s %s\n", filterp? "aan": "nofilter", encprotos[encproto]);
  148. if (encproto != Encnone && ealgs && ai) {
  149. uchar key[16];
  150. uchar digest[SHA1dlen];
  151. char fromclientsecret[21];
  152. char fromserversecret[21];
  153. int i;
  154. memmove(key+4, ai->secret, ai->nsecret);
  155. /* exchange random numbers */
  156. srand(truerand());
  157. for(i = 0; i < 4; i++)
  158. key[i] = rand();
  159. if(write(fd, key, 4) != 4)
  160. sysfatal("can't write key part: %r");
  161. if(readn(fd, key+12, 4) != 4)
  162. sysfatal("can't read key part: %r");
  163. /* scramble into two secrets */
  164. sha1(key, sizeof(key), digest, nil);
  165. mksecret(fromclientsecret, digest);
  166. mksecret(fromserversecret, digest+10);
  167. if (filterp)
  168. fd = filter(fd, filterp, argv[0]);
  169. /* set up encryption */
  170. fd = pushssl(fd, ealgs, fromclientsecret, fromserversecret, nil);
  171. if(fd < 0)
  172. sysfatal("can't establish ssl connection: %r");
  173. }
  174. else if (filterp)
  175. fd = filter(fd, filterp, argv[0]);
  176. if(srvpost){
  177. sprint(srvfile, "/srv/%s", srvpost);
  178. remove(srvfile);
  179. post(srvfile, srvpost, fd);
  180. }
  181. if(mount(fd, -1, mntpt, mntflags, "") < 0)
  182. sysfatal("can't mount %s: %r", argv[1]);
  183. alarm(0);
  184. if(backwards && argc > 1){
  185. exec(argv[1], &argv[1]);
  186. sysfatal("exec: %r");
  187. }
  188. exits(0);
  189. }
  190. void
  191. catcher(void*, char *msg)
  192. {
  193. timedout = 1;
  194. if(strcmp(msg, "alarm") == 0)
  195. noted(NCONT);
  196. noted(NDFLT);
  197. }
  198. int
  199. old9p(int fd)
  200. {
  201. int p[2];
  202. if(pipe(p) < 0)
  203. sysfatal("pipe: %r");
  204. switch(rfork(RFPROC|RFFDG|RFNAMEG)) {
  205. case -1:
  206. sysfatal("rfork srvold9p: %r");
  207. case 0:
  208. if(fd != 1){
  209. dup(fd, 1);
  210. close(fd);
  211. }
  212. if(p[0] != 0){
  213. dup(p[0], 0);
  214. close(p[0]);
  215. }
  216. close(p[1]);
  217. if(0){
  218. fd = open("/sys/log/cpu", OWRITE);
  219. if(fd != 2){
  220. dup(fd, 2);
  221. close(fd);
  222. }
  223. execl("/bin/srvold9p", "srvold9p", "-ds", nil);
  224. } else
  225. execl("/bin/srvold9p", "srvold9p", "-s", nil);
  226. sysfatal("exec srvold9p: %r");
  227. default:
  228. close(fd);
  229. close(p[0]);
  230. }
  231. return p[1];
  232. }
  233. int
  234. connect(char *system, char *tree, int oldserver)
  235. {
  236. char buf[ERRMAX], dir[128], *na;
  237. int fd, n;
  238. char *authp;
  239. na = netmkaddr(system, 0, "exportfs");
  240. if((fd = dial(na, 0, dir, 0)) < 0)
  241. sysfatal("can't dial %s: %r", system);
  242. if(doauth){
  243. if(oldserver)
  244. authp = "p9sk2";
  245. else
  246. authp = "p9any";
  247. ai = auth_proxy(fd, auth_getkey, "proto=%q role=client %s",
  248. authp, keyspec);
  249. if(ai == nil)
  250. sysfatal("%r: %s", system);
  251. }
  252. n = write(fd, tree, strlen(tree));
  253. if(n < 0)
  254. sysfatal("can't write tree: %r");
  255. strcpy(buf, "can't read tree");
  256. n = read(fd, buf, sizeof buf - 1);
  257. if(n!=2 || buf[0]!='O' || buf[1]!='K'){
  258. if (timedout)
  259. sysfatal("timed out connecting to %s", na);
  260. buf[sizeof buf - 1] = '\0';
  261. sysfatal("bad remote tree: %s", buf);
  262. }
  263. if(oldserver)
  264. return old9p(fd);
  265. return fd;
  266. }
  267. int
  268. passive(void)
  269. {
  270. int fd;
  271. /*
  272. * Ignore doauth==0 on purpose. Is it useful here?
  273. */
  274. ai = auth_proxy(0, auth_getkey, "proto=p9any role=server");
  275. if(ai == nil)
  276. sysfatal("auth_proxy: %r");
  277. if(auth_chuid(ai, nil) < 0)
  278. sysfatal("auth_chuid: %r");
  279. putenv("service", "import");
  280. fd = dup(0, -1);
  281. close(0);
  282. open("/dev/null", ORDWR);
  283. close(1);
  284. open("/dev/null", ORDWR);
  285. return fd;
  286. }
  287. void
  288. usage(void)
  289. {
  290. fprint(2, "usage: import [-abcC] [-A] [-E clear|ssl|tls] [-e 'crypt auth'|clear] [-k keypattern] [-p] host remotefs [mountpoint]\n");
  291. exits("usage");
  292. }
  293. /* Network on fd1, mount driver on fd0 */
  294. int
  295. filter(int fd, char *cmd, char *host)
  296. {
  297. int p[2], len, argc;
  298. char newport[256], buf[256], *s;
  299. char *argv[16], *file, *pbuf;
  300. if ((len = read(fd, newport, sizeof newport - 1)) < 0)
  301. sysfatal("filter: cannot write port; %r\n");
  302. newport[len] = '\0';
  303. if ((s = strchr(newport, '!')) == nil)
  304. sysfatal("filter: illegally formatted port %s\n", newport);
  305. strecpy(buf, buf+sizeof buf, netmkaddr(host, "tcp", "0"));
  306. pbuf = strrchr(buf, '!');
  307. strecpy(pbuf, buf+sizeof buf, s);
  308. if(debug)
  309. fprint(2, "filter: remote port %s\n", newport);
  310. argc = tokenize(cmd, argv, nelem(argv)-2);
  311. if (argc == 0)
  312. sysfatal("filter: empty command");
  313. argv[argc++] = "-c";
  314. argv[argc++] = buf;
  315. argv[argc] = nil;
  316. file = argv[0];
  317. if (s = strrchr(argv[0], '/'))
  318. argv[0] = s+1;
  319. if(pipe(p) < 0)
  320. sysfatal("pipe: %r");
  321. switch(rfork(RFNOWAIT|RFPROC|RFFDG)) {
  322. case -1:
  323. sysfatal("rfork record module: %r");
  324. case 0:
  325. dup(p[0], 1);
  326. dup(p[0], 0);
  327. close(p[0]);
  328. close(p[1]);
  329. exec(file, argv);
  330. sysfatal("exec record module: %r");
  331. default:
  332. close(fd);
  333. close(p[0]);
  334. }
  335. return p[1];
  336. }
  337. static void
  338. mksecret(char *t, uchar *f)
  339. {
  340. sprint(t, "%2.2ux%2.2ux%2.2ux%2.2ux%2.2ux%2.2ux%2.2ux%2.2ux%2.2ux%2.2ux",
  341. f[0], f[1], f[2], f[3], f[4], f[5], f[6], f[7], f[8], f[9]);
  342. }