import.c 7.8 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427
  1. #include <u.h>
  2. #include <libc.h>
  3. #include <auth.h>
  4. #include <libsec.h>
  5. enum {
  6. Encnone,
  7. Encssl,
  8. Enctls,
  9. };
  10. static char *encprotos[] = {
  11. [Encnone] = "clear",
  12. [Encssl] = "ssl",
  13. [Enctls] = "tls",
  14. nil,
  15. };
  16. char *keyspec = "";
  17. char *filterp;
  18. char *ealgs = "rc4_256 sha1";
  19. int encproto = Encnone;
  20. char *aan = "/bin/aan";
  21. AuthInfo *ai;
  22. int debug;
  23. int doauth = 1;
  24. int timedout;
  25. int connect(char*, char*, int);
  26. int passive(void);
  27. int old9p(int);
  28. void catcher(void*, char*);
  29. void sysfatal(char*, ...);
  30. void usage(void);
  31. int filter(int, char *, char *);
  32. static void mksecret(char *, uchar *);
  33. /*
  34. * based on libthread's threadsetname, but drags in less library code.
  35. * actually just sets the arguments displayed.
  36. */
  37. void
  38. procsetname(char *fmt, ...)
  39. {
  40. int fd;
  41. char *cmdname;
  42. char buf[128];
  43. va_list arg;
  44. va_start(arg, fmt);
  45. cmdname = vsmprint(fmt, arg);
  46. va_end(arg);
  47. if (cmdname == nil)
  48. return;
  49. snprint(buf, sizeof buf, "#p/%d/args", getpid());
  50. if((fd = open(buf, OWRITE)) >= 0){
  51. write(fd, cmdname, strlen(cmdname)+1);
  52. close(fd);
  53. }
  54. free(cmdname);
  55. }
  56. void
  57. post(char *name, char *envname, int srvfd)
  58. {
  59. int fd;
  60. char buf[32];
  61. fd = create(name, OWRITE, 0600);
  62. if(fd < 0)
  63. return;
  64. sprint(buf, "%d",srvfd);
  65. if(write(fd, buf, strlen(buf)) != strlen(buf))
  66. sysfatal("srv write: %r");
  67. close(fd);
  68. putenv(envname, name);
  69. }
  70. static int
  71. lookup(char *s, char *l[])
  72. {
  73. int i;
  74. for (i = 0; l[i] != 0; i++)
  75. if (strcmp(l[i], s) == 0)
  76. return i;
  77. return -1;
  78. }
  79. void
  80. main(int argc, char **argv)
  81. {
  82. char *mntpt, *srvpost, srvfile[64];
  83. int backwards = 0, fd, mntflags, oldserver;
  84. quotefmtinstall();
  85. srvpost = nil;
  86. oldserver = 0;
  87. mntflags = MREPL;
  88. ARGBEGIN{
  89. case 'A':
  90. doauth = 0;
  91. break;
  92. case 'a':
  93. mntflags = MAFTER;
  94. break;
  95. case 'b':
  96. mntflags = MBEFORE;
  97. break;
  98. case 'c':
  99. mntflags |= MCREATE;
  100. break;
  101. case 'C':
  102. mntflags |= MCACHE;
  103. break;
  104. case 'd':
  105. debug++;
  106. break;
  107. case 'f':
  108. /* ignored but allowed for compatibility */
  109. break;
  110. case 'O':
  111. case 'o':
  112. oldserver = 1;
  113. break;
  114. case 'E':
  115. if ((encproto = lookup(EARGF(usage()), encprotos)) < 0)
  116. usage();
  117. break;
  118. case 'e':
  119. ealgs = EARGF(usage());
  120. if(*ealgs == 0 || strcmp(ealgs, "clear") == 0)
  121. ealgs = nil;
  122. break;
  123. case 'k':
  124. keyspec = EARGF(usage());
  125. break;
  126. case 'p':
  127. filterp = aan;
  128. break;
  129. case 's':
  130. srvpost = EARGF(usage());
  131. break;
  132. case 'B':
  133. backwards = 1;
  134. break;
  135. default:
  136. usage();
  137. }ARGEND;
  138. mntpt = 0; /* to shut up compiler */
  139. if(backwards){
  140. switch(argc) {
  141. default:
  142. mntpt = argv[0];
  143. break;
  144. case 0:
  145. usage();
  146. }
  147. } else {
  148. switch(argc) {
  149. case 2:
  150. mntpt = argv[1];
  151. break;
  152. case 3:
  153. mntpt = argv[2];
  154. break;
  155. default:
  156. usage();
  157. }
  158. }
  159. if (encproto == Enctls)
  160. sysfatal("%s: tls has not yet been implemented", argv[0]);
  161. notify(catcher);
  162. alarm(60*1000);
  163. if(backwards)
  164. fd = passive();
  165. else
  166. fd = connect(argv[0], argv[1], oldserver);
  167. if (!oldserver)
  168. fprint(fd, "impo %s %s\n", filterp? "aan": "nofilter",
  169. encprotos[encproto]);
  170. if (encproto != Encnone && ealgs && ai) {
  171. uchar key[16];
  172. uchar digest[SHA1dlen];
  173. char fromclientsecret[21];
  174. char fromserversecret[21];
  175. int i;
  176. memmove(key+4, ai->secret, ai->nsecret);
  177. /* exchange random numbers */
  178. srand(truerand());
  179. for(i = 0; i < 4; i++)
  180. key[i] = rand();
  181. if(write(fd, key, 4) != 4)
  182. sysfatal("can't write key part: %r");
  183. if(readn(fd, key+12, 4) != 4)
  184. sysfatal("can't read key part: %r");
  185. /* scramble into two secrets */
  186. sha1(key, sizeof(key), digest, nil);
  187. mksecret(fromclientsecret, digest);
  188. mksecret(fromserversecret, digest+10);
  189. if (filterp)
  190. fd = filter(fd, filterp, argv[0]);
  191. /* set up encryption */
  192. procsetname("pushssl");
  193. fd = pushssl(fd, ealgs, fromclientsecret, fromserversecret, nil);
  194. if(fd < 0)
  195. sysfatal("can't establish ssl connection: %r");
  196. }
  197. else if (filterp)
  198. fd = filter(fd, filterp, argv[0]);
  199. if(srvpost){
  200. sprint(srvfile, "/srv/%s", srvpost);
  201. remove(srvfile);
  202. post(srvfile, srvpost, fd);
  203. }
  204. procsetname("mount on %s", mntpt);
  205. if(mount(fd, -1, mntpt, mntflags, "") < 0)
  206. sysfatal("can't mount %s: %r", argv[1]);
  207. alarm(0);
  208. if(backwards && argc > 1){
  209. exec(argv[1], &argv[1]);
  210. sysfatal("exec: %r");
  211. }
  212. exits(0);
  213. }
  214. void
  215. catcher(void*, char *msg)
  216. {
  217. timedout = 1;
  218. if(strcmp(msg, "alarm") == 0)
  219. noted(NCONT);
  220. noted(NDFLT);
  221. }
  222. int
  223. old9p(int fd)
  224. {
  225. int p[2];
  226. procsetname("old9p");
  227. if(pipe(p) < 0)
  228. sysfatal("pipe: %r");
  229. switch(rfork(RFPROC|RFFDG|RFNAMEG)) {
  230. case -1:
  231. sysfatal("rfork srvold9p: %r");
  232. case 0:
  233. if(fd != 1){
  234. dup(fd, 1);
  235. close(fd);
  236. }
  237. if(p[0] != 0){
  238. dup(p[0], 0);
  239. close(p[0]);
  240. }
  241. close(p[1]);
  242. if(0){
  243. fd = open("/sys/log/cpu", OWRITE);
  244. if(fd != 2){
  245. dup(fd, 2);
  246. close(fd);
  247. }
  248. execl("/bin/srvold9p", "srvold9p", "-ds", nil);
  249. } else
  250. execl("/bin/srvold9p", "srvold9p", "-s", nil);
  251. sysfatal("exec srvold9p: %r");
  252. default:
  253. close(fd);
  254. close(p[0]);
  255. }
  256. return p[1];
  257. }
  258. int
  259. connect(char *system, char *tree, int oldserver)
  260. {
  261. char buf[ERRMAX], dir[128], *na;
  262. int fd, n;
  263. char *authp;
  264. na = netmkaddr(system, 0, "exportfs");
  265. procsetname("dial %s", na);
  266. if((fd = dial(na, 0, dir, 0)) < 0)
  267. sysfatal("can't dial %s: %r", system);
  268. if(doauth){
  269. if(oldserver)
  270. authp = "p9sk2";
  271. else
  272. authp = "p9any";
  273. procsetname("auth_proxy auth_getkey proto=%q role=client %s",
  274. authp, keyspec);
  275. ai = auth_proxy(fd, auth_getkey, "proto=%q role=client %s",
  276. authp, keyspec);
  277. if(ai == nil)
  278. sysfatal("%r: %s", system);
  279. }
  280. procsetname("writing tree name %s", tree);
  281. n = write(fd, tree, strlen(tree));
  282. if(n < 0)
  283. sysfatal("can't write tree: %r");
  284. strcpy(buf, "can't read tree");
  285. procsetname("awaiting OK for %s", tree);
  286. n = read(fd, buf, sizeof buf - 1);
  287. if(n!=2 || buf[0]!='O' || buf[1]!='K'){
  288. if (timedout)
  289. sysfatal("timed out connecting to %s", na);
  290. buf[sizeof buf - 1] = '\0';
  291. sysfatal("bad remote tree: %s", buf);
  292. }
  293. if(oldserver)
  294. return old9p(fd);
  295. return fd;
  296. }
  297. int
  298. passive(void)
  299. {
  300. int fd;
  301. /*
  302. * Ignore doauth==0 on purpose. Is it useful here?
  303. */
  304. procsetname("auth_proxy auth_getkey proto=p9any role=server");
  305. ai = auth_proxy(0, auth_getkey, "proto=p9any role=server");
  306. if(ai == nil)
  307. sysfatal("auth_proxy: %r");
  308. if(auth_chuid(ai, nil) < 0)
  309. sysfatal("auth_chuid: %r");
  310. putenv("service", "import");
  311. fd = dup(0, -1);
  312. close(0);
  313. open("/dev/null", ORDWR);
  314. close(1);
  315. open("/dev/null", ORDWR);
  316. return fd;
  317. }
  318. void
  319. usage(void)
  320. {
  321. fprint(2, "usage: import [-abcC] [-A] [-E clear|ssl|tls] "
  322. "[-e 'crypt auth'|clear] [-k keypattern] [-p] host remotefs [mountpoint]\n");
  323. exits("usage");
  324. }
  325. /* Network on fd1, mount driver on fd0 */
  326. int
  327. filter(int fd, char *cmd, char *host)
  328. {
  329. int p[2], len, argc;
  330. char newport[256], buf[256], *s;
  331. char *argv[16], *file, *pbuf;
  332. if ((len = read(fd, newport, sizeof newport - 1)) < 0)
  333. sysfatal("filter: cannot write port; %r");
  334. newport[len] = '\0';
  335. if ((s = strchr(newport, '!')) == nil)
  336. sysfatal("filter: illegally formatted port %s", newport);
  337. strecpy(buf, buf+sizeof buf, netmkaddr(host, "tcp", "0"));
  338. pbuf = strrchr(buf, '!');
  339. strecpy(pbuf, buf+sizeof buf, s);
  340. if(debug)
  341. fprint(2, "filter: remote port %s\n", newport);
  342. argc = tokenize(cmd, argv, nelem(argv)-2);
  343. if (argc == 0)
  344. sysfatal("filter: empty command");
  345. argv[argc++] = "-c";
  346. argv[argc++] = buf;
  347. argv[argc] = nil;
  348. file = argv[0];
  349. if (s = strrchr(argv[0], '/'))
  350. argv[0] = s+1;
  351. if(pipe(p) < 0)
  352. sysfatal("pipe: %r");
  353. switch(rfork(RFNOWAIT|RFPROC|RFFDG)) {
  354. case -1:
  355. sysfatal("rfork record module: %r");
  356. case 0:
  357. dup(p[0], 1);
  358. dup(p[0], 0);
  359. close(p[0]);
  360. close(p[1]);
  361. exec(file, argv);
  362. sysfatal("exec record module: %r");
  363. default:
  364. close(fd);
  365. close(p[0]);
  366. }
  367. return p[1];
  368. }
  369. static void
  370. mksecret(char *t, uchar *f)
  371. {
  372. sprint(t, "%2.2ux%2.2ux%2.2ux%2.2ux%2.2ux%2.2ux%2.2ux%2.2ux%2.2ux%2.2ux",
  373. f[0], f[1], f[2], f[3], f[4], f[5], f[6], f[7], f[8], f[9]);
  374. }