mirror of
https://github.com/sheumann/telnetd.git
synced 2024-11-25 20:32:19 +00:00
82ff960df9
/etc/iptos implementation so only numeric values supported. o telnetd.8: steal the -S flag description from telnet.1, bump the date of the document. MFC after: 6 weeks git-svn-id: http://svn0.us-east.freebsd.org/base/head/contrib/telnet@139937 ccf9f872-aa2e-dd11-9fc8-001c23d0bc1f
380 lines
8.3 KiB
C
380 lines
8.3 KiB
C
/*
|
|
* Copyright (c) 1988, 1990, 1993
|
|
* The Regents of the University of California. All rights reserved.
|
|
*
|
|
* Redistribution and use in source and binary forms, with or without
|
|
* modification, are permitted provided that the following conditions
|
|
* are met:
|
|
* 1. Redistributions of source code must retain the above copyright
|
|
* notice, this list of conditions and the following disclaimer.
|
|
* 2. Redistributions in binary form must reproduce the above copyright
|
|
* notice, this list of conditions and the following disclaimer in the
|
|
* documentation and/or other materials provided with the distribution.
|
|
* 3. All advertising materials mentioning features or use of this software
|
|
* must display the following acknowledgement:
|
|
* This product includes software developed by the University of
|
|
* California, Berkeley and its contributors.
|
|
* 4. Neither the name of the University nor the names of its contributors
|
|
* may be used to endorse or promote products derived from this software
|
|
* without specific prior written permission.
|
|
*
|
|
* THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
|
|
* ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
|
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
|
* ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
|
|
* FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
|
|
* DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
|
|
* OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
|
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
|
|
* LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
|
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
|
* SUCH DAMAGE.
|
|
*/
|
|
|
|
#if 0
|
|
#ifndef lint
|
|
static const char sccsid[] = "@(#)main.c 8.3 (Berkeley) 5/30/95";
|
|
#endif
|
|
#endif
|
|
#include <sys/cdefs.h>
|
|
__FBSDID("$FreeBSD$");
|
|
|
|
#include <sys/param.h>
|
|
#include <sys/socket.h>
|
|
#include <stdlib.h>
|
|
#include <string.h>
|
|
#include <unistd.h>
|
|
|
|
#include "ring.h"
|
|
#include "externs.h"
|
|
#include "defines.h"
|
|
|
|
#ifdef AUTHENTICATION
|
|
#include <libtelnet/auth.h>
|
|
#endif
|
|
#ifdef ENCRYPTION
|
|
#include <libtelnet/encrypt.h>
|
|
#endif
|
|
|
|
/* These values need to be the same as defined in libtelnet/kerberos5.c */
|
|
/* Either define them in both places, or put in some common header file. */
|
|
#define OPTS_FORWARD_CREDS 0x00000002
|
|
#define OPTS_FORWARDABLE_CREDS 0x00000001
|
|
|
|
#if defined(IPSEC) && defined(IPSEC_POLICY_IPSEC)
|
|
char *ipsec_policy_in = NULL;
|
|
char *ipsec_policy_out = NULL;
|
|
#endif
|
|
|
|
extern int tos;
|
|
|
|
int family = AF_UNSPEC;
|
|
|
|
/*
|
|
* Initialize variables.
|
|
*/
|
|
void
|
|
tninit(void)
|
|
{
|
|
init_terminal();
|
|
|
|
init_network();
|
|
|
|
init_telnet();
|
|
|
|
init_sys();
|
|
}
|
|
|
|
static void
|
|
usage(void)
|
|
{
|
|
fprintf(stderr, "usage: %s %s%s%s%s\n",
|
|
prompt,
|
|
#ifdef AUTHENTICATION
|
|
"[-4] [-6] [-8] [-E] [-K] [-L] [-N] [-S tos] [-X atype] [-c] [-d]",
|
|
"\n\t[-e char] [-k realm] [-l user] [-f/-F] [-n tracefile] ",
|
|
#else
|
|
"[-4] [-6] [-8] [-E] [-L] [-N] [-S tos] [-c] [-d]",
|
|
"\n\t[-e char] [-l user] [-n tracefile] ",
|
|
#endif
|
|
"[-r] [-s src_addr] [-u] ",
|
|
#if defined(IPSEC) && defined(IPSEC_POLICY_IPSEC)
|
|
"[-P policy] "
|
|
#endif
|
|
#ifdef ENCRYPTION
|
|
"[-y] [host-name [port]]"
|
|
#else /* ENCRYPTION */
|
|
"[host-name [port]]"
|
|
#endif /* ENCRYPTION */
|
|
);
|
|
exit(1);
|
|
}
|
|
|
|
/*
|
|
* main. Parse arguments, invoke the protocol or command parser.
|
|
*/
|
|
|
|
int
|
|
main(int argc, char *argv[])
|
|
{
|
|
u_long ultmp;
|
|
int ch;
|
|
char *ep, *user;
|
|
char *src_addr = NULL;
|
|
#ifdef FORWARD
|
|
extern int forward_flags;
|
|
#endif /* FORWARD */
|
|
|
|
tninit(); /* Clear out things */
|
|
|
|
TerminalSaveState();
|
|
|
|
if ((prompt = strrchr(argv[0], '/')))
|
|
++prompt;
|
|
else
|
|
prompt = argv[0];
|
|
|
|
user = NULL;
|
|
|
|
rlogin = (strncmp(prompt, "rlog", 4) == 0) ? '~' : _POSIX_VDISABLE;
|
|
#ifdef AUTHENTICATION
|
|
autologin = 1;
|
|
#else
|
|
autologin = -1;
|
|
#endif
|
|
|
|
#ifdef ENCRYPTION
|
|
encrypt_auto(1);
|
|
decrypt_auto(1);
|
|
#endif
|
|
|
|
#if defined(IPSEC) && defined(IPSEC_POLICY_IPSEC)
|
|
#define IPSECOPT "P:"
|
|
#else
|
|
#define IPSECOPT
|
|
#endif
|
|
while ((ch = getopt(argc, argv,
|
|
"468EKLNS:X:acde:fFk:l:n:rs:uxy" IPSECOPT)) != -1)
|
|
#undef IPSECOPT
|
|
{
|
|
switch(ch) {
|
|
case '4':
|
|
family = AF_INET;
|
|
break;
|
|
#ifdef INET6
|
|
case '6':
|
|
family = AF_INET6;
|
|
break;
|
|
#endif
|
|
case '8':
|
|
eight = 3; /* binary output and input */
|
|
break;
|
|
case 'E':
|
|
rlogin = escape = _POSIX_VDISABLE;
|
|
break;
|
|
case 'K':
|
|
#ifdef AUTHENTICATION
|
|
autologin = 0;
|
|
#endif
|
|
break;
|
|
case 'L':
|
|
eight |= 2; /* binary output only */
|
|
break;
|
|
case 'N':
|
|
doaddrlookup = 0;
|
|
break;
|
|
case 'S':
|
|
#ifdef HAS_GETTOS
|
|
|
|
if ((tos = parsetos(optarg, "tcp")) < 0)
|
|
fprintf(stderr, "%s%s%s%s\n",
|
|
prompt, ": Bad TOS argument '",
|
|
optarg,
|
|
"; will try to use default TOS");
|
|
#else
|
|
#define MAXTOS 255
|
|
ultmp = strtoul(optarg, &ep, 0);
|
|
if (*ep || ep == optarg || ultmp > MAXTOS)
|
|
fprintf(stderr, "%s%s%s%s\n",
|
|
prompt, ": Bad TOS argument '",
|
|
optarg,
|
|
"; will try to use default TOS");
|
|
else
|
|
tos = ultmp;
|
|
#endif
|
|
break;
|
|
case 'X':
|
|
#ifdef AUTHENTICATION
|
|
auth_disable_name(optarg);
|
|
#endif
|
|
break;
|
|
case 'a':
|
|
#ifdef AUTHENTICATION
|
|
/* It's the default now, so ignore */
|
|
#else
|
|
autologin = 1;
|
|
#endif
|
|
break;
|
|
case 'c':
|
|
skiprc = 1;
|
|
break;
|
|
case 'd':
|
|
telnet_debug = 1;
|
|
break;
|
|
case 'e':
|
|
set_escape_char(optarg);
|
|
break;
|
|
case 'f':
|
|
#ifdef AUTHENTICATION
|
|
#if defined(KRB5) && defined(FORWARD)
|
|
if (forward_flags & OPTS_FORWARD_CREDS) {
|
|
fprintf(stderr,
|
|
"%s: Only one of -f and -F allowed.\n",
|
|
prompt);
|
|
usage();
|
|
}
|
|
forward_flags |= OPTS_FORWARD_CREDS;
|
|
#else
|
|
fprintf(stderr,
|
|
"%s: Warning: -f ignored, no Kerberos V5 support.\n",
|
|
prompt);
|
|
#endif
|
|
#else
|
|
fprintf(stderr,
|
|
"%s: Warning: -f ignored, no Kerberos V5 support.\n",
|
|
prompt);
|
|
#endif
|
|
break;
|
|
case 'F':
|
|
#ifdef AUTHENTICATION
|
|
#if defined(KRB5) && defined(FORWARD)
|
|
if (forward_flags & OPTS_FORWARD_CREDS) {
|
|
fprintf(stderr,
|
|
"%s: Only one of -f and -F allowed.\n",
|
|
prompt);
|
|
usage();
|
|
}
|
|
forward_flags |= OPTS_FORWARD_CREDS;
|
|
forward_flags |= OPTS_FORWARDABLE_CREDS;
|
|
#else
|
|
fprintf(stderr,
|
|
"%s: Warning: -F ignored, no Kerberos V5 support.\n",
|
|
prompt);
|
|
#endif
|
|
#else
|
|
fprintf(stderr,
|
|
"%s: Warning: -F ignored, no Kerberos V5 support.\n",
|
|
prompt);
|
|
#endif
|
|
break;
|
|
case 'k':
|
|
#ifdef AUTHENTICATION
|
|
#if defined(KRB4)
|
|
{
|
|
extern char *dest_realm, dst_realm_buf[], dst_realm_sz;
|
|
dest_realm = dst_realm_buf;
|
|
(void)strncpy(dest_realm, optarg, dst_realm_sz);
|
|
}
|
|
#else
|
|
fprintf(stderr,
|
|
"%s: Warning: -k ignored, no Kerberos V4 support.\n",
|
|
prompt);
|
|
#endif
|
|
#else
|
|
fprintf(stderr,
|
|
"%s: Warning: -k ignored, no Kerberos V4 support.\n",
|
|
prompt);
|
|
#endif
|
|
break;
|
|
case 'l':
|
|
#ifdef AUTHENTICATION
|
|
/* This is the default now, so ignore it */
|
|
#else
|
|
autologin = 1;
|
|
#endif
|
|
user = optarg;
|
|
break;
|
|
case 'n':
|
|
SetNetTrace(optarg);
|
|
break;
|
|
case 'r':
|
|
rlogin = '~';
|
|
break;
|
|
case 's':
|
|
src_addr = optarg;
|
|
break;
|
|
case 'u':
|
|
family = AF_UNIX;
|
|
break;
|
|
case 'x':
|
|
#ifndef ENCRYPTION
|
|
fprintf(stderr,
|
|
"%s: Warning: -x ignored, no ENCRYPT support.\n",
|
|
prompt);
|
|
#endif /* ENCRYPTION */
|
|
break;
|
|
case 'y':
|
|
#ifdef ENCRYPTION
|
|
encrypt_auto(0);
|
|
decrypt_auto(0);
|
|
#else
|
|
fprintf(stderr,
|
|
"%s: Warning: -y ignored, no ENCRYPT support.\n",
|
|
prompt);
|
|
#endif /* ENCRYPTION */
|
|
break;
|
|
#if defined(IPSEC) && defined(IPSEC_POLICY_IPSEC)
|
|
case 'P':
|
|
if (!strncmp("in", optarg, 2))
|
|
ipsec_policy_in = strdup(optarg);
|
|
else if (!strncmp("out", optarg, 3))
|
|
ipsec_policy_out = strdup(optarg);
|
|
else
|
|
usage();
|
|
break;
|
|
#endif
|
|
case '?':
|
|
default:
|
|
usage();
|
|
/* NOTREACHED */
|
|
}
|
|
}
|
|
if (autologin == -1)
|
|
autologin = (rlogin == _POSIX_VDISABLE) ? 0 : 1;
|
|
|
|
argc -= optind;
|
|
argv += optind;
|
|
|
|
if (argc) {
|
|
char *args[9], **argp = args;
|
|
|
|
if (argc > 2)
|
|
usage();
|
|
*argp++ = prompt;
|
|
if (user) {
|
|
*argp++ = strdup("-l");
|
|
*argp++ = user;
|
|
}
|
|
if (src_addr) {
|
|
*argp++ = strdup("-s");
|
|
*argp++ = src_addr;
|
|
}
|
|
*argp++ = argv[0]; /* host */
|
|
if (argc > 1)
|
|
*argp++ = argv[1]; /* port */
|
|
*argp = 0;
|
|
|
|
if (setjmp(toplevel) != 0)
|
|
Exit(0);
|
|
if (tn(argp - args, args) == 1)
|
|
return (0);
|
|
else
|
|
return (1);
|
|
}
|
|
(void)setjmp(toplevel);
|
|
for (;;) {
|
|
command(1, 0, 0);
|
|
}
|
|
return 0;
|
|
}
|