import.c 6.7 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378
  1. #include <u.h>
  2. #include <libc.h>
  3. #include <auth.h>
  4. #include <libsec.h>
  5. enum {
  6. Encnone,
  7. Encssl,
  8. Enctls,
  9. };
  10. static char *encprotos[] = {
  11. [Encnone] = "clear",
  12. [Encssl] = "ssl",
  13. [Enctls] = "tls",
  14. nil,
  15. };
  16. char *keyspec = "";
  17. char *filterp;
  18. char *ealgs = "rc4_256 sha1";
  19. int encproto = Encnone;
  20. char *aan = "/bin/aan";
  21. AuthInfo *ai;
  22. int debug;
  23. int connect(char*, char*, int);
  24. int passive(void);
  25. int old9p(int);
  26. void catcher(void*, char*);
  27. void sysfatal(char*, ...);
  28. void usage(void);
  29. int filter(int, char *, char *);
  30. static void mksecret(char *, uchar *);
  31. void
  32. post(char *name, char *envname, int srvfd)
  33. {
  34. int fd;
  35. char buf[32];
  36. fd = create(name, OWRITE, 0600);
  37. if(fd < 0)
  38. return;
  39. sprint(buf, "%d",srvfd);
  40. if(write(fd, buf, strlen(buf)) != strlen(buf))
  41. sysfatal("srv write: %r");
  42. close(fd);
  43. putenv(envname, name);
  44. }
  45. static int
  46. lookup(char *s, char *l[])
  47. {
  48. int i;
  49. for (i = 0; l[i] != 0; i++)
  50. if (strcmp(l[i], s) == 0)
  51. return i;
  52. return -1;
  53. }
  54. void
  55. main(int argc, char **argv)
  56. {
  57. char *mntpt;
  58. int fd, mntflags;
  59. int oldserver;
  60. char *srvpost, srvfile[64];
  61. int backwards = 0;
  62. srvpost = nil;
  63. oldserver = 0;
  64. mntflags = MREPL;
  65. ARGBEGIN{
  66. case 'a':
  67. mntflags = MAFTER;
  68. break;
  69. case 'b':
  70. mntflags = MBEFORE;
  71. break;
  72. case 'c':
  73. mntflags |= MCREATE;
  74. break;
  75. case 'C':
  76. mntflags |= MCACHE;
  77. break;
  78. case 'd':
  79. debug++;
  80. break;
  81. case 'f':
  82. /* ignored but allowed for compatibility */
  83. break;
  84. case 'O':
  85. case 'o':
  86. oldserver = 1;
  87. break;
  88. case 'E':
  89. if ((encproto = lookup(EARGF(usage()), encprotos)) < 0)
  90. usage();
  91. break;
  92. case 'e':
  93. ealgs = EARGF(usage());
  94. if(*ealgs == 0 || strcmp(ealgs, "clear") == 0)
  95. ealgs = nil;
  96. break;
  97. case 'k':
  98. keyspec = EARGF(usage());
  99. break;
  100. case 'p':
  101. filterp = aan;
  102. break;
  103. case 's':
  104. srvpost = EARGF(usage());
  105. break;
  106. case 'B':
  107. backwards = 1;
  108. break;
  109. default:
  110. usage();
  111. }ARGEND;
  112. mntpt = 0; /* to shut up compiler */
  113. if(backwards){
  114. switch(argc) {
  115. default:
  116. mntpt = argv[0];
  117. break;
  118. case 0:
  119. usage();
  120. }
  121. } else {
  122. switch(argc) {
  123. case 2:
  124. mntpt = argv[1];
  125. break;
  126. case 3:
  127. mntpt = argv[2];
  128. break;
  129. default:
  130. usage();
  131. }
  132. }
  133. if (encproto == Enctls)
  134. sysfatal("%s: tls has not yet been implemented\n", argv[0]);
  135. notify(catcher);
  136. alarm(60*1000);
  137. if(backwards)
  138. fd = passive();
  139. else
  140. fd = connect(argv[0], argv[1], oldserver);
  141. if (!oldserver)
  142. fprint(fd, "impo %s %s\n", filterp? "aan": "nofilter", encprotos[encproto]);
  143. if (encproto != Encnone && ealgs && ai) {
  144. uchar key[16];
  145. uchar digest[SHA1dlen];
  146. char fromclientsecret[21];
  147. char fromserversecret[21];
  148. int i;
  149. memmove(key+4, ai->secret, ai->nsecret);
  150. /* exchange random numbers */
  151. srand(truerand());
  152. for(i = 0; i < 4; i++)
  153. key[i] = rand();
  154. if(write(fd, key, 4) != 4)
  155. sysfatal("can't write key part: %r");
  156. if(readn(fd, key+12, 4) != 4)
  157. sysfatal("can't read key part: %r");
  158. /* scramble into two secrets */
  159. sha1(key, sizeof(key), digest, nil);
  160. mksecret(fromclientsecret, digest);
  161. mksecret(fromserversecret, digest+10);
  162. if (filterp)
  163. fd = filter(fd, filterp, argv[0]);
  164. /* set up encryption */
  165. fd = pushssl(fd, ealgs, fromclientsecret, fromserversecret, nil);
  166. if(fd < 0)
  167. sysfatal("can't establish ssl connection: %r");
  168. }
  169. else if (filterp)
  170. fd = filter(fd, filterp, argv[0]);
  171. if(srvpost){
  172. sprint(srvfile, "/srv/%s", srvpost);
  173. remove(srvfile);
  174. post(srvfile, srvpost, fd);
  175. }
  176. if(mount(fd, -1, mntpt, mntflags, "") < 0)
  177. sysfatal("can't mount %s: %r", argv[1]);
  178. alarm(0);
  179. if(backwards && argc > 1){
  180. execl(argv[1], &argv[1], nil);
  181. sysfatal("exec: %r");
  182. }
  183. exits(0);
  184. }
  185. void
  186. catcher(void*, char *msg)
  187. {
  188. if(strcmp(msg, "alarm") == 0)
  189. noted(NCONT);
  190. noted(NDFLT);
  191. }
  192. int
  193. old9p(int fd)
  194. {
  195. int p[2];
  196. if(pipe(p) < 0)
  197. sysfatal("pipe: %r");
  198. switch(rfork(RFPROC|RFFDG|RFNAMEG)) {
  199. case -1:
  200. sysfatal("rfork srvold9p: %r");
  201. case 0:
  202. if(fd != 1){
  203. dup(fd, 1);
  204. close(fd);
  205. }
  206. if(p[0] != 0){
  207. dup(p[0], 0);
  208. close(p[0]);
  209. }
  210. close(p[1]);
  211. if(0){
  212. fd = open("/sys/log/cpu", OWRITE);
  213. if(fd != 2){
  214. dup(fd, 2);
  215. close(fd);
  216. }
  217. execl("/bin/srvold9p", "srvold9p", "-ds", nil);
  218. } else
  219. execl("/bin/srvold9p", "srvold9p", "-s", nil);
  220. sysfatal("exec srvold9p: %r");
  221. default:
  222. close(fd);
  223. close(p[0]);
  224. }
  225. return p[1];
  226. }
  227. int
  228. connect(char *system, char *tree, int oldserver)
  229. {
  230. char buf[ERRMAX], dir[128], *na;
  231. int fd, n;
  232. char *authp;
  233. na = netmkaddr(system, 0, "exportfs");
  234. if((fd = dial(na, 0, dir, 0)) < 0)
  235. sysfatal("can't dial %s: %r", system);
  236. if(oldserver)
  237. authp = "p9sk2";
  238. else
  239. authp = "p9any";
  240. ai = auth_proxy(fd, auth_getkey, "proto=%q role=client %s", authp, keyspec);
  241. if(ai == nil)
  242. sysfatal("%r: %s", system);
  243. n = write(fd, tree, strlen(tree));
  244. if(n < 0)
  245. sysfatal("can't write tree: %r");
  246. strcpy(buf, "can't read tree");
  247. n = read(fd, buf, sizeof buf - 1);
  248. if(n!=2 || buf[0]!='O' || buf[1]!='K'){
  249. buf[sizeof buf - 1] = '\0';
  250. sysfatal("bad remote tree: %s", buf);
  251. }
  252. if(oldserver)
  253. return old9p(fd);
  254. return fd;
  255. }
  256. int
  257. passive(void)
  258. {
  259. int fd;
  260. ai = auth_proxy(0, auth_getkey, "proto=p9any role=server");
  261. if(ai == nil)
  262. sysfatal("auth_proxy: %r");
  263. if(auth_chuid(ai, nil) < 0)
  264. sysfatal("auth_chuid: %r");
  265. putenv("service", "import");
  266. fd = dup(0, -1);
  267. close(0);
  268. open("/dev/null", ORDWR);
  269. close(1);
  270. open("/dev/null", ORDWR);
  271. return fd;
  272. }
  273. void
  274. usage(void)
  275. {
  276. fprint(2, "usage: import [-abcC] [-E clear|ssl|tls] [-e 'crypt auth'|clear] [-k keypattern] [-p] host remotefs [mountpoint]\n");
  277. exits("usage");
  278. }
  279. /* Network on fd1, mount driver on fd0 */
  280. int
  281. filter(int fd, char *cmd, char *host)
  282. {
  283. int p[2], len, argc;
  284. char newport[256], buf[256], *s;
  285. char *argv[16], *file, *pbuf;
  286. if ((len = read(fd, newport, sizeof newport - 1)) < 0)
  287. sysfatal("filter: cannot write port; %r\n");
  288. newport[len] = '\0';
  289. if ((s = strchr(newport, '!')) == nil)
  290. sysfatal("filter: illegally formatted port %s\n", newport);
  291. strecpy(buf, buf+sizeof buf, netmkaddr(host, "tcp", "0"));
  292. pbuf = strrchr(buf, '!');
  293. strecpy(pbuf, buf+sizeof buf, s);
  294. if(debug)
  295. fprint(2, "filter: remote port %s\n", newport);
  296. argc = tokenize(cmd, argv, nelem(argv)-2);
  297. if (argc == 0)
  298. sysfatal("filter: empty command");
  299. argv[argc++] = "-c";
  300. argv[argc++] = buf;
  301. argv[argc] = nil;
  302. file = argv[0];
  303. if (s = strrchr(argv[0], '/'))
  304. argv[0] = s+1;
  305. if(pipe(p) < 0)
  306. sysfatal("pipe: %r");
  307. switch(rfork(RFNOWAIT|RFPROC|RFFDG)) {
  308. case -1:
  309. sysfatal("rfork record module: %r");
  310. case 0:
  311. dup(p[0], 1);
  312. dup(p[0], 0);
  313. close(p[0]);
  314. close(p[1]);
  315. exec(file, argv);
  316. sysfatal("exec record module: %r");
  317. default:
  318. close(fd);
  319. close(p[0]);
  320. }
  321. return p[1];
  322. }
  323. static void
  324. mksecret(char *t, uchar *f)
  325. {
  326. sprint(t, "%2.2ux%2.2ux%2.2ux%2.2ux%2.2ux%2.2ux%2.2ux%2.2ux%2.2ux%2.2ux",
  327. f[0], f[1], f[2], f[3], f[4], f[5], f[6], f[7], f[8], f[9]);
  328. }