diff options
author | Egor Duda <deo@logos-m.ru> | 2001-04-09 07:21:32 +0000 |
---|---|---|
committer | Egor Duda <deo@logos-m.ru> | 2001-04-09 07:21:32 +0000 |
commit | 619f7fa0324c0eecdb7d32c5721c46b7d9a7f80b (patch) | |
tree | 0462f1c72eccd24184399cf1db47f005eff59cab /winsup/cygwin/net.cc | |
parent | c08e6c44304063ee61333154339c523ad2f7d6aa (diff) | |
download | newlib-619f7fa0324c0eecdb7d32c5721c46b7d9a7f80b.zip newlib-619f7fa0324c0eecdb7d32c5721c46b7d9a7f80b.tar.gz newlib-619f7fa0324c0eecdb7d32c5721c46b7d9a7f80b.tar.bz2 |
* fhandler.h (class fhandler_socket): Add members and methods to
support secure connections on AF_UNIX sockets.
* fhandler_socket.cc (fhandler_socket::set_connect_secret): New method.
(fhandler_socket::get_connect_secret): Ditto.
(fhandler_socket::create_secret_event): Ditto.
(fhandler_socket::close_secret_event): Ditto.
(fhandler_socket::check_peer_secret_event): Ditto.
(fhandler_socket::fixup_after_fork): Duplicate secret event to child.
(fhandler_socket::dup): Copy address family.
(fhandler_socket::close): Close secret event.
* net.cc (get_inet_addr): Read secret cookie.
(cygwin_connect): Check if peer knows secret cookie value.
(cygwin_accept): Ditto. Copy address family to newly created socket.
(cygwin_bind): Generate and write secret cookie.
(wsock_init): Initialize random number generator.
Diffstat (limited to 'winsup/cygwin/net.cc')
-rw-r--r-- | winsup/cygwin/net.cc | 95 |
1 files changed, 86 insertions, 9 deletions
diff --git a/winsup/cygwin/net.cc b/winsup/cygwin/net.cc index 5f10a68..e089cd6 100644 --- a/winsup/cygwin/net.cc +++ b/winsup/cygwin/net.cc @@ -18,6 +18,7 @@ details. */ #include <sys/un.h> #include <iphlpapi.h> +#include <stdlib.h> #include <unistd.h> #include <netdb.h> #include <fcntl.h> @@ -377,8 +378,11 @@ done: /* cygwin internal: map sockaddr into internet domain address */ static int get_inet_addr (const struct sockaddr *in, int inlen, - struct sockaddr_in *out, int *outlen) + struct sockaddr_in *out, int *outlen, int* secret = 0) { + int secret_buf [4]; + int* secret_ptr = (secret ? : secret_buf); + if (in->sa_family == AF_INET) { *out = * (sockaddr_in *)in; @@ -392,13 +396,15 @@ static int get_inet_addr (const struct sockaddr *in, int inlen, return 0; int ret = 0; - char buf[32]; + char buf[128]; memset (buf, 0, sizeof buf); if (read (fd, buf, sizeof buf) != -1) { sockaddr_in sin; sin.sin_family = AF_INET; - sscanf (buf + strlen (SOCKET_COOKIE), "%hu", &sin.sin_port); + sscanf (buf + strlen (SOCKET_COOKIE), "%hu %08x-%08x-%08x-%08x", + &sin.sin_port, + secret_ptr, secret_ptr + 1, secret_ptr + 2, secret_ptr + 3); sin.sin_port = htons (sin.sin_port); sin.sin_addr.s_addr = htonl (INADDR_LOOPBACK); *out = sin; @@ -615,11 +621,13 @@ cygwin_connect (int fd, int namelen) { int res; + BOOL secret_check_failed = FALSE; fhandler_socket *sock = get (fd); sockaddr_in sin; + int secret [4]; sigframe thisframe (mainthread); - if (get_inet_addr (name, namelen, &sin, &namelen) == 0) + if (get_inet_addr (name, namelen, &sin, &namelen, secret) == 0) return -1; if (!sock) @@ -638,6 +646,34 @@ cygwin_connect (int fd, set_winsock_errno (); } + if (sock->get_addr_family () == AF_UNIX) + { + if (!res || errno == EINPROGRESS) + { + if (!sock->create_secret_event (secret)) + { + secret_check_failed = TRUE; + } + } + + if (!secret_check_failed && !res) + { + if (!sock->check_peer_secret_event (&sin, secret)) + { + debug_printf ( "accept from unauthorized server" ); + secret_check_failed = TRUE; + } + } + + if (secret_check_failed) + { + sock->close_secret_event (); + if (res) + closesocket (res); + set_errno (ECONNREFUSED); + res = -1; + } + } } return res; } @@ -733,6 +769,7 @@ extern "C" int cygwin_accept (int fd, struct sockaddr *peer, int *len) { int res = -1; + BOOL secret_check_failed = FALSE; sigframe thisframe (mainthread); fhandler_socket *sock = get (fd); @@ -747,6 +784,38 @@ cygwin_accept (int fd, struct sockaddr *peer, int *len) res = accept (sock->get_socket (), peer, len); // can't use a blocking call inside a lock + if (sock->get_addr_family () == AF_UNIX) + { + if (((SOCKET) res != (SOCKET) INVALID_SOCKET || + WSAGetLastError () == WSAEWOULDBLOCK)) + { + if (!sock->create_secret_event ()) + { + secret_check_failed = TRUE; + } + } + + if (!secret_check_failed && + (SOCKET) res != (SOCKET) INVALID_SOCKET) + { + if (!sock->check_peer_secret_event ((struct sockaddr_in*) peer)) + { + debug_printf ("connect from unauthorized client"); + secret_check_failed = TRUE; + } + } + + if (secret_check_failed) + { + sock->close_secret_event (); + if ((SOCKET) res != (SOCKET) INVALID_SOCKET) + closesocket (res); + set_errno (ECONNABORTED); + res = -1; + goto done; + } + } + SetResourceLock (LOCK_FD_LIST, WRITE_LOCK|READ_LOCK, "accept"); int res_fd = fdtab.find_unused_handle (); @@ -754,19 +823,21 @@ cygwin_accept (int fd, struct sockaddr *peer, int *len) { /* FIXME: what is correct errno? */ set_errno (EMFILE); - goto done; + goto lock_done; } if ((SOCKET) res == (SOCKET) INVALID_SOCKET) set_winsock_errno (); else { - fdsock (res_fd, sock->get_name (), res); + fhandler_socket* res_fh = fdsock (res_fd, sock->get_name (), res); + res_fh->set_addr_family (sock->get_addr_family ()); res = res_fd; } } +lock_done: + ReleaseResourceLock (LOCK_FD_LIST, WRITE_LOCK|READ_LOCK, "accept"); done: syscall_printf ("%d = accept (%d, %x, %x)", res, fd, peer, len); - ReleaseResourceLock (LOCK_FD_LIST, WRITE_LOCK|READ_LOCK, "accept"); return res; } @@ -822,8 +893,11 @@ cygwin_bind (int fd, const struct sockaddr *my_addr, int addrlen) goto out; } - char buf[sizeof (SOCKET_COOKIE) + 10]; - __small_sprintf (buf, "%s%u", SOCKET_COOKIE, sin.sin_port); + sock->set_connect_secret (); + + char buf[sizeof (SOCKET_COOKIE) + 80]; + __small_sprintf (buf, "%s%u ", SOCKET_COOKIE, sin.sin_port); + sock->get_connect_secret (strchr (buf, '\0')); len = strlen (buf) + 1; /* Note that the terminating nul is written. */ @@ -1866,5 +1940,8 @@ wsock_init () if (FIONBIO != REAL_FIONBIO) debug_printf ("**************** FIONBIO != REAL_FIONBIO"); + + /* FIXME: will resulting random sequence be unpredictable enough? */ + srandom (GetTickCount ()); } |