summaryrefslogtreecommitdiff
path: root/sys/src/cmd/ssh/sshserve.c
diff options
context:
space:
mode:
authorkhm <devnull@localhost>2017-01-12 16:36:38 -0800
committerkhm <devnull@localhost>2017-01-12 16:36:38 -0800
commitdc8c7bf2b73d608ac2483aee303a51a3507b4c5a (patch)
treef8c69dbf5f36de6f9acea724f2068054b5b8e7a6 /sys/src/cmd/ssh/sshserve.c
parentcb1555c7d741fa482c339aa9ac8a44753e2ad296 (diff)
ssh: R.I.P.
Diffstat (limited to 'sys/src/cmd/ssh/sshserve.c')
-rw-r--r--sys/src/cmd/ssh/sshserve.c315
1 files changed, 0 insertions, 315 deletions
diff --git a/sys/src/cmd/ssh/sshserve.c b/sys/src/cmd/ssh/sshserve.c
deleted file mode 100644
index 87b0536c5..000000000
--- a/sys/src/cmd/ssh/sshserve.c
+++ /dev/null
@@ -1,315 +0,0 @@
-#include "ssh.h"
-
-char *cipherlist = "blowfish rc4 3des";
-char *authlist = "tis";
-
-void fromnet(Conn*);
-void startcmd(Conn*, char*, int*, int*);
-int maxmsg = 256*1024;
-
-Cipher *allcipher[] = {
- &cipherrc4,
- &cipherblowfish,
- &cipher3des,
- &cipherdes,
- &ciphernone,
- &ciphertwiddle,
-};
-
-Authsrv *allauthsrv[] = {
- &authsrvpassword,
- &authsrvtis,
-};
-
-Cipher*
-findcipher(char *name, Cipher **list, int nlist)
-{
- int i;
-
- for(i=0; i<nlist; i++)
- if(strcmp(name, list[i]->name) == 0)
- return list[i];
- error("unknown cipher %s", name);
- return nil;
-}
-
-Authsrv*
-findauthsrv(char *name, Authsrv **list, int nlist)
-{
- int i;
-
- for(i=0; i<nlist; i++)
- if(strcmp(name, list[i]->name) == 0)
- return list[i];
- error("unknown authsrv %s", name);
- return nil;
-}
-
-void
-usage(void)
-{
- fprint(2, "usage: sshserve [-A authlist] [-c cipherlist] client-ip-address\n");
- exits("usage");
-}
-
-void
-main(int argc, char **argv)
-{
- char *f[16];
- int i;
- Conn c;
-
- fmtinstall('B', mpfmt);
- fmtinstall('H', encodefmt);
- atexit(atexitkiller);
- atexitkill(getpid());
-
- memset(&c, 0, sizeof c);
-
- ARGBEGIN{
- case 'D':
- debuglevel = atoi(EARGF(usage()));
- break;
- case 'A':
- authlist = EARGF(usage());
- break;
- case 'c':
- cipherlist = EARGF(usage());
- break;
- default:
- usage();
- }ARGEND
-
- if(argc != 1)
- usage();
- c.host = argv[0];
-
- sshlog("connect from %s", c.host);
-
- /* limit of 768 bits in remote host key? */
- c.serverpriv = rsagen(768, 6, 0);
- if(c.serverpriv == nil)
- sysfatal("rsagen failed: %r");
- c.serverkey = &c.serverpriv->pub;
-
- c.nokcipher = getfields(cipherlist, f, nelem(f), 1, ", ");
- c.okcipher = emalloc(sizeof(Cipher*)*c.nokcipher);
- for(i=0; i<c.nokcipher; i++)
- c.okcipher[i] = findcipher(f[i], allcipher, nelem(allcipher));
-
- c.nokauthsrv = getfields(authlist, f, nelem(f), 1, ", ");
- c.okauthsrv = emalloc(sizeof(Authsrv*)*c.nokauthsrv);
- for(i=0; i<c.nokauthsrv; i++)
- c.okauthsrv[i] = findauthsrv(f[i], allauthsrv, nelem(allauthsrv));
-
- sshserverhandshake(&c);
-
- fromnet(&c);
-}
-
-void
-fromnet(Conn *c)
-{
- int infd, kidpid, n;
- char *cmd;
- Msg *m;
-
- infd = kidpid = -1;
- for(;;){
- m = recvmsg(c, -1);
- if(m == nil)
- exits(nil);
- switch(m->type){
- default:
- //badmsg(m, 0);
- sendmsg(allocmsg(c, SSH_SMSG_FAILURE, 0));
- break;
-
- case SSH_MSG_DISCONNECT:
- sysfatal("client disconnected");
-
- case SSH_CMSG_REQUEST_PTY:
- sendmsg(allocmsg(c, SSH_SMSG_SUCCESS, 0));
- break;
-
- case SSH_CMSG_X11_REQUEST_FORWARDING:
- sendmsg(allocmsg(c, SSH_SMSG_FAILURE, 0));
- break;
-
- case SSH_CMSG_MAX_PACKET_SIZE:
- maxmsg = getlong(m);
- sendmsg(allocmsg(c, SSH_SMSG_SUCCESS, 0));
- break;
-
- case SSH_CMSG_REQUEST_COMPRESSION:
- sendmsg(allocmsg(c, SSH_SMSG_FAILURE, 0));
- break;
-
- case SSH_CMSG_EXEC_SHELL:
- startcmd(c, nil, &kidpid, &infd);
- goto InteractiveMode;
-
- case SSH_CMSG_EXEC_CMD:
- cmd = getstring(m);
- startcmd(c, cmd, &kidpid, &infd);
- goto InteractiveMode;
- }
- free(m);
- }
-
-InteractiveMode:
- for(;;){
- free(m);
- m = recvmsg(c, -1);
- if(m == nil)
- exits(nil);
- switch(m->type){
- default:
- badmsg(m, 0);
-
- case SSH_MSG_DISCONNECT:
- postnote(PNGROUP, kidpid, "hangup");
- sysfatal("client disconnected");
-
- case SSH_CMSG_STDIN_DATA:
- if(infd != 0){
- n = getlong(m);
- write(infd, getbytes(m, n), n);
- }
- break;
-
- case SSH_CMSG_EOF:
- close(infd);
- infd = -1;
- break;
-
- case SSH_CMSG_EXIT_CONFIRMATION:
- /* sent by some clients as dying breath */
- exits(nil);
-
- case SSH_CMSG_WINDOW_SIZE:
- /* we don't care */
- break;
- }
- }
-}
-
-void
-copyout(Conn *c, int fd, int mtype)
-{
- char buf[8192];
- int n, max, pid;
- Msg *m;
-
- max = sizeof buf;
- if(max > maxmsg - 32) /* 32 is an overestimate of packet overhead */
- max = maxmsg - 32;
- if(max <= 0)
- sysfatal("maximum message size too small");
-
- switch(pid = rfork(RFPROC|RFMEM|RFNOWAIT)){
- case -1:
- sysfatal("fork: %r");
- case 0:
- break;
- default:
- atexitkill(pid);
- return;
- }
-
- while((n = read(fd, buf, max)) > 0){
- m = allocmsg(c, mtype, 4+n);
- putlong(m, n);
- putbytes(m, buf, n);
- sendmsg(m);
- }
- exits(nil);
-}
-
-void
-startcmd(Conn *c, char *cmd, int *kidpid, int *kidin)
-{
- int i, pid, kpid;
- int pfd[3][2];
- char *dir;
- char *sysname, *tz;
- Msg *m;
- Waitmsg *w;
-
- for(i=0; i<3; i++)
- if(pipe(pfd[i]) < 0)
- sysfatal("pipe: %r");
-
- sysname = getenv("sysname");
- tz = getenv("timezone");
-
- switch(pid = rfork(RFPROC|RFMEM|RFNOWAIT)){
- case -1:
- sysfatal("fork: %r");
- case 0:
- switch(kpid = rfork(RFPROC|RFNOTEG|RFENVG|RFFDG)){
- case -1:
- sysfatal("fork: %r");
- case 0:
- for(i=0; i<3; i++){
- if(dup(pfd[i][1], i) < 0)
- sysfatal("dup: %r");
- close(pfd[i][0]);
- close(pfd[i][1]);
- }
- putenv("user", c->user);
- if(sysname)
- putenv("sysname", sysname);
- if(tz)
- putenv("tz", tz);
-
- dir = smprint("/usr/%s", c->user);
- if(dir == nil || chdir(dir) < 0)
- chdir("/");
- if(cmd){
- putenv("service", "rx");
- execl("/bin/rc", "rc", "-lc", cmd, nil);
- sysfatal("cannot exec /bin/rc: %r");
- }else{
- putenv("service", "con");
- execl("/bin/ip/telnetd", "telnetd", "-tn", nil);
- sysfatal("cannot exec /bin/ip/telnetd: %r");
- }
- default:
- *kidpid = kpid;
- rendezvous(kidpid, 0);
- for(;;){
- if((w = wait()) == nil)
- sysfatal("wait: %r");
- if(w->pid == kpid)
- break;
- free(w);
- }
- if(w->msg[0]){
- m = allocmsg(c, SSH_MSG_DISCONNECT, 4+strlen(w->msg));
- putstring(m, w->msg);
- sendmsg(m);
- }else{
- m = allocmsg(c, SSH_SMSG_EXITSTATUS, 4);
- putlong(m, 0);
- sendmsg(m);
- }
- for(i=0; i<3; i++)
- close(pfd[i][0]);
- free(w);
- exits(nil);
- break;
- }
- default:
- atexitkill(pid);
- rendezvous(kidpid, 0);
- break;
- }
-
- for(i=0; i<3; i++)
- close(pfd[i][1]);
-
- copyout(c, pfd[1][0], SSH_SMSG_STDOUT_DATA);
- copyout(c, pfd[2][0], SSH_SMSG_STDERR_DATA);
- *kidin = pfd[0][0];
-}