On Sun, 13 Sep 2015 09:25:19 -0600, "Todd C. Miller" wrote:

> This should allow us to stop exporting __ivaliduser and __ivaliduser_sa
> from libc and to eventually remove ruserok from libc entirely.
> 
> Needs testing by someone who actually runs lpd...

Newer version that is easy to test separately from lpd.

 - todd

Index: usr.sbin/lpr/lpd/Makefile
===================================================================
RCS file: /cvs/src/usr.sbin/lpr/lpd/Makefile,v
retrieving revision 1.5
diff -u -p -u -r1.5 Makefile
--- usr.sbin/lpr/lpd/Makefile   10 Dec 2013 16:38:04 -0000      1.5
+++ usr.sbin/lpr/lpd/Makefile   13 Sep 2015 15:21:13 -0000
@@ -5,7 +5,7 @@ PROG=   lpd
 CFLAGS+=-I${.CURDIR}/../common_source
 MAN=   lpd.8
 SRCS=  lpd.c printjob.c recvjob.c displayq.c rmjob.c startdaemon.c \
-       lpdchar.c common.c key.c modes.c common_vars.c
+       lpdchar.c common.c key.c modes.c common_vars.c allowedhost.c
 BINGRP=        daemon
 BINMODE=2550
 .PATH: ${.CURDIR}/../common_source
Index: usr.sbin/lpr/lpd/allowedhost.c
===================================================================
RCS file: usr.sbin/lpr/lpd/allowedhost.c
diff -N usr.sbin/lpr/lpd/allowedhost.c
--- /dev/null   1 Jan 1970 00:00:00 -0000
+++ usr.sbin/lpr/lpd/allowedhost.c      14 Sep 2015 01:42:02 -0000
@@ -0,0 +1,260 @@
+/*
+ * Copyright (c) 1995, 1996, 1998 Theo de Raadt.  All rights reserved.
+ * Copyright (c) 1983, 1993, 1994
+ *     The Regents of the University of California.  All rights reserved.
+ *
+ * Redistribution and use in source and binary forms, with or without
+ * modification, are permitted provided that the following conditions
+ * are met:
+ * 1. Redistributions of source code must retain the above copyright
+ *    notice, this list of conditions and the following disclaimer.
+ * 2. Redistributions in binary form must reproduce the above copyright
+ *    notice, this list of conditions and the following disclaimer in the
+ *    documentation and/or other materials provided with the distribution.
+ * 3. Neither the name of the University nor the names of its contributors
+ *    may be used to endorse or promote products derived from this software
+ *    without specific prior written permission.
+ *
+ * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
+ * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
+ * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
+ * ARE DISCLAIMED.  IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
+ * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
+ * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
+ * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
+ * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
+ * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
+ * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
+ * SUCH DAMAGE.
+ */
+
+#include <sys/socket.h>
+#include <sys/types.h>
+
+#include <netinet/in.h>
+#include <arpa/inet.h>
+
+#include <ctype.h>
+#include <limits.h>
+#include <netdb.h>
+#include <netgroup.h>
+#include <signal.h>
+#include <stdio.h>
+#include <stdlib.h>
+#include <string.h>
+#include <syslog.h>
+#include <unistd.h>
+
+static int checkhost(struct sockaddr *, socklen_t, const char *);
+static char *gethostloop(struct sockaddr *, socklen_t);
+
+/*
+ * Check whether the specified addr is listed in hostf.
+ * Returns 0 if ok, -1 if not ok.
+ */
+int
+allowedhost(FILE *hostf, struct sockaddr *raddr, socklen_t salen)
+{
+       char *buf, *cp, *ep;
+       char *rhost = (char *)-1;
+       char host[HOST_NAME_MAX+1], domain[HOST_NAME_MAX+1];
+       size_t buflen;
+       int hostok;
+
+       getdomainname(domain, sizeof(domain));
+
+       while ((buf = fgetln(hostf, &buflen))) {
+               cp = buf;
+               ep = buf + buflen;
+               if (*cp == '#')
+                       continue;
+               while (cp < ep && !isspace((unsigned char)*cp)) {
+                       if (!isprint((unsigned char)*cp))
+                               goto bail;
+                       *cp = isupper((unsigned char)*cp) ?
+                           tolower((unsigned char)*cp) : *cp;
+                       cp++;
+               }
+               if (cp == buf)
+                       continue;
+
+               /* Ignore anything after whitespace. */
+               buflen = (size_t)(cp - buf);
+               if (buflen > HOST_NAME_MAX)
+                       continue;
+               memcpy(host, buf, buflen);
+               host[buflen] = '\0';
+
+               /*
+                * innetgr() must lookup a hostname (we do not attempt
+                * to change the semantics so that netgroups may have
+                * #.#.#.# addresses in the list.)
+                */
+               switch (host[0]) {
+               case '+':
+               case '-':
+                       switch (host[1]) {
+                       case '\0':
+                               hostok = 1;
+                               break;
+                       case '@':
+                               if (rhost == (char *)-1)
+                                       rhost = gethostloop(raddr, salen);
+                               hostok = 0;
+                               if (rhost)
+                                       hostok = innetgr(&host[2], rhost,
+                                           NULL, domain);
+                               break;
+                       default:
+                               hostok = checkhost(raddr, salen, &host[1]);
+                               break;
+                       }
+                       if (host[0] == '-')
+                               hostok = -hostok;
+                       break;
+               default:
+                       hostok = checkhost(raddr, salen, host);
+                       break;
+               }
+
+               /* Check if one component did not match */
+               if (hostok == 0)
+                       continue;
+
+               /* Check if we got a forbidden pair */
+               if (hostok <= -1)
+                       return (-1);
+
+               /* Check if we got a valid pair */
+               if (hostok >= 1)
+                       return (0);
+       }
+bail:
+       return (-1);
+}
+
+/*
+ * Returns "true" if match, 0 if no match.  If we do not find any
+ * semblance of an A->PTR->A loop, allow a simple #.#.#.# match to work.
+ */
+static int
+checkhost(struct sockaddr *raddr, socklen_t salen, const char *lhost)
+{
+       struct addrinfo hints, *res, *r;
+       char h1[NI_MAXHOST], h2[NI_MAXHOST];
+       int error;
+       const int niflags = NI_NUMERICHOST;
+
+       h1[0] = '\0';
+       if (getnameinfo(raddr, salen, h1, sizeof(h1), NULL, 0,
+           niflags) != 0)
+               return (0);
+
+       /* Resolve laddr into sockaddr */
+       memset(&hints, 0, sizeof(hints));
+       hints.ai_family = raddr->sa_family;
+       hints.ai_socktype = SOCK_DGRAM; /*dummy*/
+       res = NULL;
+       error = getaddrinfo(lhost, "0", &hints, &res);
+       if (error)
+               return (0);
+
+       /*
+        * Try string comparisons between raddr and laddr.
+        */
+       for (r = res; r; r = r->ai_next) {
+               h2[0] = '\0';
+               if (getnameinfo(r->ai_addr, r->ai_addrlen, h2, sizeof(h2),
+                   NULL, 0, niflags) != 0)
+                       continue;
+               if (strcmp(h1, h2) == 0) {
+                       freeaddrinfo(res);
+                       return (1);
+               }
+       }
+
+       /* No match. */
+       freeaddrinfo(res);
+       return (0);
+}
+
+/*
+ * Return the hostname associated with the supplied address.
+ * Do a reverse lookup as well for security. If a loop cannot
+ * be found, pack the result of inet_ntoa() into the string.
+ */
+static char *
+gethostloop(struct sockaddr *raddr, socklen_t salen)
+{
+       static char remotehost[NI_MAXHOST];
+       char h1[NI_MAXHOST], h2[NI_MAXHOST];
+       struct addrinfo hints, *res, *r;
+       int error;
+       const int niflags = NI_NUMERICHOST;
+
+       h1[0] = remotehost[0] = '\0';
+       if (getnameinfo(raddr, salen, remotehost, sizeof(remotehost),
+           NULL, 0, NI_NAMEREQD) != 0)
+               return (NULL);
+       if (getnameinfo(raddr, salen, h1, sizeof(h1), NULL, 0,
+           niflags) != 0)
+               return (NULL);
+
+       /*
+        * Look up the name and check that the supplied
+        * address is in the list
+        */
+       memset(&hints, 0, sizeof(hints));
+       hints.ai_family = raddr->sa_family;
+       hints.ai_socktype = SOCK_DGRAM; /*dummy*/
+       hints.ai_flags = AI_CANONNAME;
+       res = NULL;
+       error = getaddrinfo(remotehost, "0", &hints, &res);
+       if (error)
+               return (NULL);
+
+       for (r = res; r; r = r->ai_next) {
+               h2[0] = '\0';
+               if (getnameinfo(r->ai_addr, r->ai_addrlen, h2, sizeof(h2),
+                   NULL, 0, niflags) != 0)
+                       continue;
+               if (strcmp(h1, h2) == 0) {
+                       freeaddrinfo(res);
+                       return (remotehost);
+               }
+       }
+
+       /*
+        * either the DNS adminstrator has made a configuration
+        * mistake, or someone has attempted to spoof us
+        */
+       syslog(LOG_NOTICE, "lpd: address %s not listed for host %s",
+           h1, res->ai_canonname ? res->ai_canonname : remotehost);
+       freeaddrinfo(res);
+       return (NULL);
+}
+
+#ifdef DEBUG
+int
+main(int argc, char *argv[])
+{
+       struct addrinfo hints;
+       int i;
+
+       memset(&hints, 0, sizeof(hints));
+       hints.ai_family = PF_UNSPEC;
+       hints.ai_socktype = SOCK_STREAM;
+
+       for (i = 1; i < argc; i++) {
+               struct addrinfo *res0;
+               int error = getaddrinfo(argv[i], NULL, &hints, &res0);
+               if (error) {
+                       printf("%s: %s\n", argv[i], gai_strerror(error));
+                       continue;
+               }
+               error = allowedhost(stdin, res0->ai_addr, res0->ai_addrlen);
+               printf("%s: %s\n", argv[i], error ? "denied" : "allowed");
+       }
+       exit(0);
+}
+#endif /* DEBUG */
Index: usr.sbin/lpr/lpd/extern.h
===================================================================
RCS file: /cvs/src/usr.sbin/lpr/lpd/extern.h,v
retrieving revision 1.8
diff -u -p -u -r1.8 extern.h
--- usr.sbin/lpr/lpd/extern.h   10 Dec 2013 16:38:04 -0000      1.8
+++ usr.sbin/lpr/lpd/extern.h   14 Sep 2015 01:24:45 -0000
@@ -32,6 +32,8 @@
  */
 
 #include <sys/ioctl.h>
+#include <sys/socket.h>
+#include <stdio.h>
 #include <termios.h>
 
 /*
@@ -48,6 +50,7 @@ struct info {
        struct winsize win;                     /* window info */
 }; 
 
+int       allowedhost(FILE *, struct sockaddr *, socklen_t);
 int       ksearch(char ***, struct info *);
 int       msearch(char ***, struct info *);
 void       printjob(void);
Index: usr.sbin/lpr/lpd/lpd.c
===================================================================
RCS file: /cvs/src/usr.sbin/lpr/lpd/lpd.c,v
retrieving revision 1.58
diff -u -p -u -r1.58 lpd.c
--- usr.sbin/lpr/lpd/lpd.c      9 Feb 2015 23:00:14 -0000       1.58
+++ usr.sbin/lpr/lpd/lpd.c      14 Sep 2015 01:22:02 -0000
@@ -111,9 +111,6 @@ static int          ckqueue(char *);
 static __dead void     usage(void);
 static int             *socksetup(int, int, const char *);
 
-extern int             __ivaliduser_sa(FILE *, struct sockaddr *, socklen_t,
-                           const char *, const char *);
-
 /* unused, needed for lpc */
 volatile sig_atomic_t gotintr;
 
@@ -650,8 +647,6 @@ ckqueue(char *cap)
        return (0);
 }
 
-#define DUMMY ":nobody::"
-
 /*
  * Check to see if the from host has access to the line printer.
  */
@@ -715,7 +710,7 @@ chkhost(struct sockaddr *f)
        hostf = fopen(_PATH_HOSTSLPD, "r");
        PRIV_END;
        if (hostf) {
-               if (__ivaliduser_sa(hostf, f, f->sa_len, DUMMY, DUMMY) == 0) {
+               if (allowedhost(hostf, f, f->sa_len) == 0) {
                        (void)fclose(hostf);
                        return;
                }

Reply via email to