blob: bccca6967ee8565fa537745d084ea09e90fb5311 [file] [log] [blame]
Simon Kelleyd1ced3a2018-01-01 22:18:03 +00001/* dnsmasq is Copyright (c) 2000-2018 Simon Kelley
Simon Kelley832af0b2007-01-21 20:01:28 +00002
3 This program is free software; you can redistribute it and/or modify
4 it under the terms of the GNU General Public License as published by
Simon Kelley824af852008-02-12 20:43:05 +00005 the Free Software Foundation; version 2 dated June, 1991, or
6 (at your option) version 3 dated 29 June, 2007.
7
Simon Kelley832af0b2007-01-21 20:01:28 +00008 This program is distributed in the hope that it will be useful,
9 but WITHOUT ANY WARRANTY; without even the implied warranty of
10 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
11 GNU General Public License for more details.
Simon Kelley824af852008-02-12 20:43:05 +000012
Simon Kelley73a08a22009-02-05 20:28:08 +000013 You should have received a copy of the GNU General Public License
14 along with this program. If not, see <http://www.gnu.org/licenses/>.
Simon Kelley832af0b2007-01-21 20:01:28 +000015*/
16
17#include "dnsmasq.h"
18
19#ifdef HAVE_TFTP
20
Simon Kelley8bc4cec2012-07-03 21:04:11 +010021static struct tftp_file *check_tftp_fileperm(ssize_t *len, char *prefix);
Simon Kelley832af0b2007-01-21 20:01:28 +000022static void free_transfer(struct tftp_transfer *transfer);
Rosen Penev50a28412017-06-27 22:27:02 +010023static ssize_t tftp_err(int err, char *packet, char *message, char *file);
Simon Kelley1b7ecd12007-02-05 14:57:57 +000024static ssize_t tftp_err_oops(char *packet, char *file);
Simon Kelley832af0b2007-01-21 20:01:28 +000025static ssize_t get_block(char *packet, struct tftp_transfer *transfer);
26static char *next(char **p, char *end);
Simon Kelley42fb8152012-04-20 17:15:01 +010027static void sanitise(char *buf);
Simon Kelley832af0b2007-01-21 20:01:28 +000028
29#define OP_RRQ 1
30#define OP_WRQ 2
31#define OP_DATA 3
32#define OP_ACK 4
33#define OP_ERR 5
34#define OP_OACK 6
35
36#define ERR_NOTDEF 0
37#define ERR_FNF 1
38#define ERR_PERM 2
39#define ERR_FULL 3
40#define ERR_ILL 4
41
Simon Kelley5aabfc72007-08-29 11:24:47 +010042void tftp_request(struct listener *listen, time_t now)
Simon Kelley832af0b2007-01-21 20:01:28 +000043{
44 ssize_t len;
45 char *packet = daemon->packet;
46 char *filename, *mode, *p, *end, *opt;
Simon Kelley28866e92011-02-14 20:19:14 +000047 union mysockaddr addr, peer;
Simon Kelley832af0b2007-01-21 20:01:28 +000048 struct msghdr msg;
Simon Kelley832af0b2007-01-21 20:01:28 +000049 struct iovec iov;
Simon Kelley1f15b812009-10-13 17:49:32 +010050 struct ifreq ifr;
Simon Kelley8bc4cec2012-07-03 21:04:11 +010051 int is_err = 1, if_index = 0, mtu = 0;
Simon Kelley832af0b2007-01-21 20:01:28 +000052 struct iname *tmp;
Simon Kelley5aabfc72007-08-29 11:24:47 +010053 struct tftp_transfer *transfer;
Simon Kelley824af852008-02-12 20:43:05 +000054 int port = daemon->start_tftp_port; /* may be zero to use ephemeral port */
55#if defined(IP_MTU_DISCOVER) && defined(IP_PMTUDISC_DONT)
Simon Kelley1f15b812009-10-13 17:49:32 +010056 int mtuflag = IP_PMTUDISC_DONT;
Simon Kelley824af852008-02-12 20:43:05 +000057#endif
Simon Kelley8ef5ada2010-06-03 19:42:45 +010058 char namebuff[IF_NAMESIZE];
Simon Kelley52d4abf2012-03-21 21:39:48 +000059 char *name = NULL;
Simon Kelley8ef5ada2010-06-03 19:42:45 +010060 char *prefix = daemon->tftp_prefix;
61 struct tftp_prefix *pref;
Simon Kelleye25db1f2013-01-29 22:10:26 +000062 struct all_addr addra;
Simon Kelley2329bef2013-12-03 13:41:16 +000063#ifdef HAVE_IPV6
64 /* Can always get recvd interface for IPv6 */
65 int check_dest = !option_bool(OPT_NOWILD) || listen->family == AF_INET6;
66#else
67 int check_dest = !option_bool(OPT_NOWILD);
68#endif
Simon Kelley832af0b2007-01-21 20:01:28 +000069 union {
70 struct cmsghdr align; /* this ensures alignment */
Simon Kelley28866e92011-02-14 20:19:14 +000071#ifdef HAVE_IPV6
72 char control6[CMSG_SPACE(sizeof(struct in6_pktinfo))];
73#endif
Simon Kelley824af852008-02-12 20:43:05 +000074#if defined(HAVE_LINUX_NETWORK)
Simon Kelley832af0b2007-01-21 20:01:28 +000075 char control[CMSG_SPACE(sizeof(struct in_pktinfo))];
Simon Kelley824af852008-02-12 20:43:05 +000076#elif defined(HAVE_SOLARIS_NETWORK)
77 char control[CMSG_SPACE(sizeof(unsigned int))];
Simon Kelley7622fc02009-06-04 20:32:05 +010078#elif defined(IP_RECVDSTADDR) && defined(IP_RECVIF)
Simon Kelley832af0b2007-01-21 20:01:28 +000079 char control[CMSG_SPACE(sizeof(struct sockaddr_dl))];
80#endif
81 } control_u;
82
83 msg.msg_controllen = sizeof(control_u);
84 msg.msg_control = control_u.control;
85 msg.msg_flags = 0;
86 msg.msg_name = &peer;
87 msg.msg_namelen = sizeof(peer);
88 msg.msg_iov = &iov;
89 msg.msg_iovlen = 1;
90
91 iov.iov_base = packet;
92 iov.iov_len = daemon->packet_buff_sz;
93
94 /* we overwrote the buffer... */
95 daemon->srv_save = NULL;
96
97 if ((len = recvmsg(listen->tftpfd, &msg, 0)) < 2)
98 return;
Simon Kelley2329bef2013-12-03 13:41:16 +000099
100 /* Can always get recvd interface for IPv6 */
101 if (!check_dest)
Simon Kelley1f15b812009-10-13 17:49:32 +0100102 {
Simon Kelley52d4abf2012-03-21 21:39:48 +0000103 if (listen->iface)
104 {
105 addr = listen->iface->addr;
Simon Kelley52d4abf2012-03-21 21:39:48 +0000106 name = listen->iface->name;
Simon Kelleybec366b2016-02-24 22:03:26 +0000107 mtu = listen->iface->mtu;
108 if (daemon->tftp_mtu != 0 && daemon->tftp_mtu < mtu)
109 mtu = daemon->tftp_mtu;
Simon Kelley52d4abf2012-03-21 21:39:48 +0000110 }
111 else
112 {
113 /* we're listening on an address that doesn't appear on an interface,
114 ask the kernel what the socket is bound to */
115 socklen_t tcp_len = sizeof(union mysockaddr);
116 if (getsockname(listen->tftpfd, (struct sockaddr *)&addr, &tcp_len) == -1)
117 return;
118 }
Simon Kelley1f15b812009-10-13 17:49:32 +0100119 }
Simon Kelley1b7ecd12007-02-05 14:57:57 +0000120 else
121 {
Simon Kelley7622fc02009-06-04 20:32:05 +0100122 struct cmsghdr *cmptr;
Simon Kelley8ef5ada2010-06-03 19:42:45 +0100123
Simon Kelley28866e92011-02-14 20:19:14 +0000124 if (msg.msg_controllen < sizeof(struct cmsghdr))
125 return;
126
127 addr.sa.sa_family = listen->family;
Simon Kelley1b7ecd12007-02-05 14:57:57 +0000128
Simon Kelley832af0b2007-01-21 20:01:28 +0000129#if defined(HAVE_LINUX_NETWORK)
Simon Kelley28866e92011-02-14 20:19:14 +0000130 if (listen->family == AF_INET)
131 for (cmptr = CMSG_FIRSTHDR(&msg); cmptr; cmptr = CMSG_NXTHDR(&msg, cmptr))
Simon Kelleyc72daea2012-01-05 21:33:27 +0000132 if (cmptr->cmsg_level == IPPROTO_IP && cmptr->cmsg_type == IP_PKTINFO)
Simon Kelley28866e92011-02-14 20:19:14 +0000133 {
134 union {
135 unsigned char *c;
136 struct in_pktinfo *p;
137 } p;
138 p.c = CMSG_DATA(cmptr);
139 addr.in.sin_addr = p.p->ipi_spec_dst;
140 if_index = p.p->ipi_ifindex;
141 }
142
143#elif defined(HAVE_SOLARIS_NETWORK)
144 if (listen->family == AF_INET)
145 for (cmptr = CMSG_FIRSTHDR(&msg); cmptr; cmptr = CMSG_NXTHDR(&msg, cmptr))
Simon Kelley1b7ecd12007-02-05 14:57:57 +0000146 {
Simon Kelley8ef5ada2010-06-03 19:42:45 +0100147 union {
148 unsigned char *c;
Simon Kelley28866e92011-02-14 20:19:14 +0000149 struct in_addr *a;
150 unsigned int *i;
Simon Kelley8ef5ada2010-06-03 19:42:45 +0100151 } p;
152 p.c = CMSG_DATA(cmptr);
Simon Kelley28866e92011-02-14 20:19:14 +0000153 if (cmptr->cmsg_level == IPPROTO_IP && cmptr->cmsg_type == IP_RECVDSTADDR)
154 addr.in.sin_addr = *(p.a);
155 else if (cmptr->cmsg_level == IPPROTO_IP && cmptr->cmsg_type == IP_RECVIF)
156 if_index = *(p.i);
Simon Kelley1b7ecd12007-02-05 14:57:57 +0000157 }
Simon Kelley1b7ecd12007-02-05 14:57:57 +0000158
Simon Kelley832af0b2007-01-21 20:01:28 +0000159#elif defined(IP_RECVDSTADDR) && defined(IP_RECVIF)
Simon Kelley28866e92011-02-14 20:19:14 +0000160 if (listen->family == AF_INET)
161 for (cmptr = CMSG_FIRSTHDR(&msg); cmptr; cmptr = CMSG_NXTHDR(&msg, cmptr))
162 {
163 union {
164 unsigned char *c;
165 struct in_addr *a;
166 struct sockaddr_dl *s;
167 } p;
168 p.c = CMSG_DATA(cmptr);
169 if (cmptr->cmsg_level == IPPROTO_IP && cmptr->cmsg_type == IP_RECVDSTADDR)
170 addr.in.sin_addr = *(p.a);
171 else if (cmptr->cmsg_level == IPPROTO_IP && cmptr->cmsg_type == IP_RECVIF)
172 if_index = p.s->sdl_index;
173 }
Simon Kelley8ef5ada2010-06-03 19:42:45 +0100174
Simon Kelley824af852008-02-12 20:43:05 +0000175#endif
Simon Kelley28866e92011-02-14 20:19:14 +0000176
177#ifdef HAVE_IPV6
178 if (listen->family == AF_INET6)
179 {
180 for (cmptr = CMSG_FIRSTHDR(&msg); cmptr; cmptr = CMSG_NXTHDR(&msg, cmptr))
Simon Kelleyc72daea2012-01-05 21:33:27 +0000181 if (cmptr->cmsg_level == IPPROTO_IPV6 && cmptr->cmsg_type == daemon->v6pktinfo)
Simon Kelley28866e92011-02-14 20:19:14 +0000182 {
183 union {
184 unsigned char *c;
185 struct in6_pktinfo *p;
186 } p;
187 p.c = CMSG_DATA(cmptr);
188
189 addr.in6.sin6_addr = p.p->ipi6_addr;
190 if_index = p.p->ipi6_ifindex;
191 }
192 }
193#endif
Simon Kelley1b7ecd12007-02-05 14:57:57 +0000194
Simon Kelley28866e92011-02-14 20:19:14 +0000195 if (!indextoname(listen->tftpfd, if_index, namebuff))
Simon Kelley1b7ecd12007-02-05 14:57:57 +0000196 return;
Simon Kelley8ef5ada2010-06-03 19:42:45 +0100197
198 name = namebuff;
Simon Kelleye25db1f2013-01-29 22:10:26 +0000199
200 addra.addr.addr4 = addr.in.sin_addr;
Simon Kelley28866e92011-02-14 20:19:14 +0000201
202#ifdef HAVE_IPV6
203 if (listen->family == AF_INET6)
Simon Kelleye25db1f2013-01-29 22:10:26 +0000204 addra.addr.addr6 = addr.in6.sin6_addr;
205#endif
206
Simon Kelley2937f8a2013-07-29 19:49:07 +0100207 if (daemon->tftp_interfaces)
Simon Kelley3169daa2012-08-13 17:39:57 +0100208 {
Simon Kelley2937f8a2013-07-29 19:49:07 +0100209 /* dedicated tftp interface list */
210 for (tmp = daemon->tftp_interfaces; tmp; tmp = tmp->next)
211 if (tmp->name && wildcard_match(tmp->name, name))
212 break;
213
214 if (!tmp)
Simon Kelley3169daa2012-08-13 17:39:57 +0100215 return;
216 }
Simon Kelley2937f8a2013-07-29 19:49:07 +0100217 else
218 {
219 /* Do the same as DHCP */
220 if (!iface_check(listen->family, &addra, name, NULL))
221 {
222 if (!option_bool(OPT_CLEVERBIND))
223 enumerate_interfaces(0);
224 if (!loopback_exception(listen->tftpfd, listen->family, &addra, name) &&
225 !label_exception(if_index, listen->family, &addra) )
226 return;
227 }
228
Simon Kelley8ef5ada2010-06-03 19:42:45 +0100229#ifdef HAVE_DHCP
Simon Kelley2937f8a2013-07-29 19:49:07 +0100230 /* allowed interfaces are the same as for DHCP */
231 for (tmp = daemon->dhcp_except; tmp; tmp = tmp->next)
232 if (tmp->name && wildcard_match(tmp->name, name))
233 return;
Simon Kelley8ef5ada2010-06-03 19:42:45 +0100234#endif
Simon Kelley2937f8a2013-07-29 19:49:07 +0100235 }
236
Simon Kelley316e2732010-01-22 20:16:09 +0000237 strncpy(ifr.ifr_name, name, IF_NAMESIZE);
Simon Kelley1f15b812009-10-13 17:49:32 +0100238 if (ioctl(listen->tftpfd, SIOCGIFMTU, &ifr) != -1)
Simon Kelleybec366b2016-02-24 22:03:26 +0000239 {
240 mtu = ifr.ifr_mtu;
241 if (daemon->tftp_mtu != 0 && daemon->tftp_mtu < mtu)
242 mtu = daemon->tftp_mtu;
243 }
Simon Kelley1b7ecd12007-02-05 14:57:57 +0000244 }
Stefan Tomanek7aa970e2015-04-01 17:55:07 +0100245
Simon Kelleybec366b2016-02-24 22:03:26 +0000246 /* Failed to get interface mtu - can use configured value. */
247 if (mtu == 0)
248 mtu = daemon->tftp_mtu;
249
Simon Kelley52d4abf2012-03-21 21:39:48 +0000250 if (name)
251 {
252 /* check for per-interface prefix */
253 for (pref = daemon->if_prefix; pref; pref = pref->next)
254 if (strcmp(pref->interface, name) == 0)
Simon Kelley8bc4cec2012-07-03 21:04:11 +0100255 prefix = pref->prefix;
Simon Kelley52d4abf2012-03-21 21:39:48 +0000256 }
Simon Kelley8ef5ada2010-06-03 19:42:45 +0100257
Simon Kelley28866e92011-02-14 20:19:14 +0000258 if (listen->family == AF_INET)
Simon Kelley7de060b2011-08-26 17:24:52 +0100259 {
260 addr.in.sin_port = htons(port);
261#ifdef HAVE_SOCKADDR_SA_LEN
262 addr.in.sin_len = sizeof(addr.in);
263#endif
264 }
Simon Kelley28866e92011-02-14 20:19:14 +0000265#ifdef HAVE_IPV6
266 else
267 {
268 addr.in6.sin6_port = htons(port);
269 addr.in6.sin6_flowinfo = 0;
Simon Kelley7de060b2011-08-26 17:24:52 +0100270 addr.in6.sin6_scope_id = 0;
271#ifdef HAVE_SOCKADDR_SA_LEN
272 addr.in6.sin6_len = sizeof(addr.in6);
273#endif
Simon Kelley28866e92011-02-14 20:19:14 +0000274 }
275#endif
276
Simon Kelley5aabfc72007-08-29 11:24:47 +0100277 if (!(transfer = whine_malloc(sizeof(struct tftp_transfer))))
Simon Kelley832af0b2007-01-21 20:01:28 +0000278 return;
279
Simon Kelley28866e92011-02-14 20:19:14 +0000280 if ((transfer->sockfd = socket(listen->family, SOCK_DGRAM, 0)) == -1)
Simon Kelley832af0b2007-01-21 20:01:28 +0000281 {
282 free(transfer);
283 return;
284 }
285
286 transfer->peer = peer;
Simon Kelley5aabfc72007-08-29 11:24:47 +0100287 transfer->timeout = now + 2;
Simon Kelley832af0b2007-01-21 20:01:28 +0000288 transfer->backoff = 1;
289 transfer->block = 1;
290 transfer->blocksize = 512;
Simon Kelley9e038942008-05-30 20:06:34 +0100291 transfer->offset = 0;
Simon Kelley832af0b2007-01-21 20:01:28 +0000292 transfer->file = NULL;
293 transfer->opt_blocksize = transfer->opt_transize = 0;
Simon Kelley9e038942008-05-30 20:06:34 +0100294 transfer->netascii = transfer->carrylf = 0;
Simon Kelley28866e92011-02-14 20:19:14 +0000295
Simon Kelleyc72daea2012-01-05 21:33:27 +0000296 prettyprint_addr(&peer, daemon->addrbuff);
Simon Kelley28866e92011-02-14 20:19:14 +0000297
Simon Kelley824af852008-02-12 20:43:05 +0000298 /* if we have a nailed-down range, iterate until we find a free one. */
299 while (1)
Simon Kelley832af0b2007-01-21 20:01:28 +0000300 {
Simon Kelley7de060b2011-08-26 17:24:52 +0100301 if (bind(transfer->sockfd, &addr.sa, sa_len(&addr)) == -1 ||
Simon Kelley824af852008-02-12 20:43:05 +0000302#if defined(IP_MTU_DISCOVER) && defined(IP_PMTUDISC_DONT)
Simon Kelleyc72daea2012-01-05 21:33:27 +0000303 setsockopt(transfer->sockfd, IPPROTO_IP, IP_MTU_DISCOVER, &mtuflag, sizeof(mtuflag)) == -1 ||
Simon Kelley824af852008-02-12 20:43:05 +0000304#endif
305 !fix_fd(transfer->sockfd))
306 {
307 if (errno == EADDRINUSE && daemon->start_tftp_port != 0)
308 {
309 if (++port <= daemon->end_tftp_port)
310 {
Simon Kelley28866e92011-02-14 20:19:14 +0000311 if (listen->family == AF_INET)
312 addr.in.sin_port = htons(port);
313#ifdef HAVE_IPV6
314 else
315 addr.in6.sin6_port = htons(port);
316#endif
Simon Kelley824af852008-02-12 20:43:05 +0000317 continue;
318 }
Simon Kelley7622fc02009-06-04 20:32:05 +0100319 my_syslog(MS_TFTP | LOG_ERR, _("unable to get free port for TFTP"));
Simon Kelley824af852008-02-12 20:43:05 +0000320 }
321 free_transfer(transfer);
322 return;
323 }
324 break;
Simon Kelley832af0b2007-01-21 20:01:28 +0000325 }
Simon Kelley824af852008-02-12 20:43:05 +0000326
Simon Kelley832af0b2007-01-21 20:01:28 +0000327 p = packet + 2;
328 end = packet + len;
329
330 if (ntohs(*((unsigned short *)packet)) != OP_RRQ ||
331 !(filename = next(&p, end)) ||
332 !(mode = next(&p, end)) ||
Simon Kelley9e038942008-05-30 20:06:34 +0100333 (strcasecmp(mode, "octet") != 0 && strcasecmp(mode, "netascii") != 0))
Simon Kelley6a69ab52012-04-24 14:42:26 +0100334 {
335 len = tftp_err(ERR_ILL, packet, _("unsupported request from %s"), daemon->addrbuff);
336 is_err = 1;
337 }
Simon Kelley832af0b2007-01-21 20:01:28 +0000338 else
339 {
Simon Kelley9e038942008-05-30 20:06:34 +0100340 if (strcasecmp(mode, "netascii") == 0)
341 transfer->netascii = 1;
342
Simon Kelley832af0b2007-01-21 20:01:28 +0000343 while ((opt = next(&p, end)))
344 {
Simon Kelley77e94da2009-08-31 17:32:17 +0100345 if (strcasecmp(opt, "blksize") == 0)
Simon Kelley832af0b2007-01-21 20:01:28 +0000346 {
Simon Kelley8bc4cec2012-07-03 21:04:11 +0100347 if ((opt = next(&p, end)) && !option_bool(OPT_TFTP_NOBLOCK))
Simon Kelley77e94da2009-08-31 17:32:17 +0100348 {
Simon Kelleyd1377fa2016-03-04 21:32:21 +0000349 /* 32 bytes for IP, UDP and TFTP headers, 52 bytes for IPv6 */
350 int overhead = (listen->family == AF_INET) ? 32 : 52;
Simon Kelley77e94da2009-08-31 17:32:17 +0100351 transfer->blocksize = atoi(opt);
352 if (transfer->blocksize < 1)
353 transfer->blocksize = 1;
354 if (transfer->blocksize > (unsigned)daemon->packet_buff_sz - 4)
355 transfer->blocksize = (unsigned)daemon->packet_buff_sz - 4;
Simon Kelleyd1377fa2016-03-04 21:32:21 +0000356 if (mtu != 0 && transfer->blocksize > (unsigned)mtu - overhead)
357 transfer->blocksize = (unsigned)mtu - overhead;
Simon Kelley77e94da2009-08-31 17:32:17 +0100358 transfer->opt_blocksize = 1;
359 transfer->block = 0;
360 }
Simon Kelley832af0b2007-01-21 20:01:28 +0000361 }
Simon Kelley77e94da2009-08-31 17:32:17 +0100362 else if (strcasecmp(opt, "tsize") == 0 && next(&p, end) && !transfer->netascii)
Simon Kelley832af0b2007-01-21 20:01:28 +0000363 {
364 transfer->opt_transize = 1;
365 transfer->block = 0;
366 }
367 }
368
Simon Kelley1f15b812009-10-13 17:49:32 +0100369 /* cope with backslashes from windows boxen. */
Simon Kelley61ce6002012-04-20 21:28:49 +0100370 for (p = filename; *p; p++)
371 if (*p == '\\')
372 *p = '/';
373 else if (option_bool(OPT_TFTP_LC))
374 *p = tolower(*p);
375
Simon Kelleyf2621c72007-04-29 19:47:21 +0100376 strcpy(daemon->namebuff, "/");
Simon Kelley8ef5ada2010-06-03 19:42:45 +0100377 if (prefix)
Simon Kelley832af0b2007-01-21 20:01:28 +0000378 {
Simon Kelley8ef5ada2010-06-03 19:42:45 +0100379 if (prefix[0] == '/')
Simon Kelleyf2621c72007-04-29 19:47:21 +0100380 daemon->namebuff[0] = 0;
Simon Kelley8ef5ada2010-06-03 19:42:45 +0100381 strncat(daemon->namebuff, prefix, (MAXDNAME-1) - strlen(daemon->namebuff));
382 if (prefix[strlen(prefix)-1] != '/')
Simon Kelley77e94da2009-08-31 17:32:17 +0100383 strncat(daemon->namebuff, "/", (MAXDNAME-1) - strlen(daemon->namebuff));
Simon Kelley5aabfc72007-08-29 11:24:47 +0100384
Floris Bos60704f52017-04-09 22:22:49 +0100385 if (option_bool(OPT_TFTP_APREF_IP))
Simon Kelley5aabfc72007-08-29 11:24:47 +0100386 {
387 size_t oldlen = strlen(daemon->namebuff);
388 struct stat statbuf;
389
Simon Kelleyc72daea2012-01-05 21:33:27 +0000390 strncat(daemon->namebuff, daemon->addrbuff, (MAXDNAME-1) - strlen(daemon->namebuff));
Simon Kelley77e94da2009-08-31 17:32:17 +0100391 strncat(daemon->namebuff, "/", (MAXDNAME-1) - strlen(daemon->namebuff));
Simon Kelley5aabfc72007-08-29 11:24:47 +0100392
393 /* remove unique-directory if it doesn't exist */
394 if (stat(daemon->namebuff, &statbuf) == -1 || !S_ISDIR(statbuf.st_mode))
395 daemon->namebuff[oldlen] = 0;
396 }
Floris Bos503c6092017-04-09 23:07:13 +0100397
Floris Bos60704f52017-04-09 22:22:49 +0100398 if (option_bool(OPT_TFTP_APREF_MAC))
399 {
400 unsigned char *macaddr = NULL;
401 unsigned char macbuf[DHCP_CHADDR_MAX];
Floris Bos503c6092017-04-09 23:07:13 +0100402
Floris Bos60704f52017-04-09 22:22:49 +0100403#ifdef HAVE_DHCP
404 if (daemon->dhcp && peer.sa.sa_family == AF_INET)
405 {
406 /* Check if the client IP is in our lease database */
407 struct dhcp_lease *lease = lease_find_by_addr(peer.in.sin_addr);
408 if (lease && lease->hwaddr_type == ARPHRD_ETHER && lease->hwaddr_len == ETHER_ADDR_LEN)
409 macaddr = lease->hwaddr;
410 }
411#endif
Floris Bos503c6092017-04-09 23:07:13 +0100412
Floris Bos60704f52017-04-09 22:22:49 +0100413 /* If no luck, try to find in ARP table. This only works if client is in same (V)LAN */
414 if (!macaddr && find_mac(&peer, macbuf, 1, now) > 0)
Floris Bos503c6092017-04-09 23:07:13 +0100415 macaddr = macbuf;
416
Floris Bos60704f52017-04-09 22:22:49 +0100417 if (macaddr)
418 {
419 size_t oldlen = strlen(daemon->namebuff);
420 struct stat statbuf;
421
422 snprintf(daemon->namebuff + oldlen, (MAXDNAME-1) - oldlen, "%.2x-%.2x-%.2x-%.2x-%.2x-%.2x/",
423 macaddr[0], macaddr[1], macaddr[2], macaddr[3], macaddr[4], macaddr[5]);
Floris Bos503c6092017-04-09 23:07:13 +0100424
Floris Bos60704f52017-04-09 22:22:49 +0100425 /* remove unique-directory if it doesn't exist */
426 if (stat(daemon->namebuff, &statbuf) == -1 || !S_ISDIR(statbuf.st_mode))
427 daemon->namebuff[oldlen] = 0;
428 }
429 }
Floris Bos503c6092017-04-09 23:07:13 +0100430
Simon Kelleyf2621c72007-04-29 19:47:21 +0100431 /* Absolute pathnames OK if they match prefix */
432 if (filename[0] == '/')
433 {
434 if (strstr(filename, daemon->namebuff) == filename)
435 daemon->namebuff[0] = 0;
436 else
437 filename++;
438 }
Simon Kelley832af0b2007-01-21 20:01:28 +0000439 }
Simon Kelleyf2621c72007-04-29 19:47:21 +0100440 else if (filename[0] == '/')
Simon Kelley832af0b2007-01-21 20:01:28 +0000441 daemon->namebuff[0] = 0;
Simon Kelley77e94da2009-08-31 17:32:17 +0100442 strncat(daemon->namebuff, filename, (MAXDNAME-1) - strlen(daemon->namebuff));
Floris Bos503c6092017-04-09 23:07:13 +0100443
Simon Kelley5aabfc72007-08-29 11:24:47 +0100444 /* check permissions and open file */
Simon Kelley8bc4cec2012-07-03 21:04:11 +0100445 if ((transfer->file = check_tftp_fileperm(&len, prefix)))
Simon Kelley832af0b2007-01-21 20:01:28 +0000446 {
Simon Kelley1b7ecd12007-02-05 14:57:57 +0000447 if ((len = get_block(packet, transfer)) == -1)
448 len = tftp_err_oops(packet, daemon->namebuff);
449 else
450 is_err = 0;
Simon Kelley832af0b2007-01-21 20:01:28 +0000451 }
452 }
453
454 while (sendto(transfer->sockfd, packet, len, 0,
Simon Kelley04363602012-04-27 10:11:51 +0100455 (struct sockaddr *)&peer, sa_len(&peer)) == -1 && errno == EINTR);
Simon Kelley832af0b2007-01-21 20:01:28 +0000456
457 if (is_err)
458 free_transfer(transfer);
459 else
460 {
Simon Kelley832af0b2007-01-21 20:01:28 +0000461 transfer->next = daemon->tftp_trans;
462 daemon->tftp_trans = transfer;
463 }
464}
Simon Kelley1b7ecd12007-02-05 14:57:57 +0000465
Simon Kelley8bc4cec2012-07-03 21:04:11 +0100466static struct tftp_file *check_tftp_fileperm(ssize_t *len, char *prefix)
Simon Kelley1b7ecd12007-02-05 14:57:57 +0000467{
468 char *packet = daemon->packet, *namebuff = daemon->namebuff;
469 struct tftp_file *file;
Simon Kelley5aabfc72007-08-29 11:24:47 +0100470 struct tftp_transfer *t;
Simon Kelley1b7ecd12007-02-05 14:57:57 +0000471 uid_t uid = geteuid();
472 struct stat statbuf;
Simon Kelley5aabfc72007-08-29 11:24:47 +0100473 int fd = -1;
Simon Kelley1b7ecd12007-02-05 14:57:57 +0000474
475 /* trick to ban moving out of the subtree */
Simon Kelley8ef5ada2010-06-03 19:42:45 +0100476 if (prefix && strstr(namebuff, "/../"))
Simon Kelley5aabfc72007-08-29 11:24:47 +0100477 goto perm;
478
479 if ((fd = open(namebuff, O_RDONLY)) == -1)
Simon Kelley1b7ecd12007-02-05 14:57:57 +0000480 {
Simon Kelley5aabfc72007-08-29 11:24:47 +0100481 if (errno == ENOENT)
482 {
483 *len = tftp_err(ERR_FNF, packet, _("file %s not found"), namebuff);
484 return NULL;
485 }
Simon Kelley1b7ecd12007-02-05 14:57:57 +0000486 else if (errno == EACCES)
487 goto perm;
488 else
489 goto oops;
490 }
Simon Kelley5aabfc72007-08-29 11:24:47 +0100491
492 /* stat the file descriptor to avoid stat->open races */
493 if (fstat(fd, &statbuf) == -1)
494 goto oops;
495
Simon Kelley1b7ecd12007-02-05 14:57:57 +0000496 /* running as root, must be world-readable */
497 if (uid == 0)
498 {
499 if (!(statbuf.st_mode & S_IROTH))
Simon Kelley5aabfc72007-08-29 11:24:47 +0100500 goto perm;
Simon Kelley1b7ecd12007-02-05 14:57:57 +0000501 }
502 /* in secure mode, must be owned by user running dnsmasq */
Simon Kelley8bc4cec2012-07-03 21:04:11 +0100503 else if (option_bool(OPT_TFTP_SECURE) && uid != statbuf.st_uid)
Simon Kelley5aabfc72007-08-29 11:24:47 +0100504 goto perm;
505
Josh Soref730c6742017-02-06 16:14:04 +0000506 /* If we're doing many transfers from the same file, only
Simon Kelley5aabfc72007-08-29 11:24:47 +0100507 open it once this saves lots of file descriptors
508 when mass-booting a big cluster, for instance.
509 Be conservative and only share when inode and name match
510 this keeps error messages sane. */
511 for (t = daemon->tftp_trans; t; t = t->next)
512 if (t->file->dev == statbuf.st_dev &&
513 t->file->inode == statbuf.st_ino &&
514 strcmp(t->file->filename, namebuff) == 0)
515 {
516 close(fd);
517 t->file->refcount++;
518 return t->file;
519 }
520
521 if (!(file = whine_malloc(sizeof(struct tftp_file) + strlen(namebuff) + 1)))
Simon Kelley1b7ecd12007-02-05 14:57:57 +0000522 {
523 errno = ENOMEM;
524 goto oops;
525 }
526
Simon Kelley5aabfc72007-08-29 11:24:47 +0100527 file->fd = fd;
Simon Kelley1b7ecd12007-02-05 14:57:57 +0000528 file->size = statbuf.st_size;
Simon Kelley5aabfc72007-08-29 11:24:47 +0100529 file->dev = statbuf.st_dev;
530 file->inode = statbuf.st_ino;
Simon Kelley1b7ecd12007-02-05 14:57:57 +0000531 file->refcount = 1;
532 strcpy(file->filename, namebuff);
533 return file;
Simon Kelley5aabfc72007-08-29 11:24:47 +0100534
Simon Kelley1b7ecd12007-02-05 14:57:57 +0000535 perm:
Simon Kelley5aabfc72007-08-29 11:24:47 +0100536 errno = EACCES;
Simon Kelley1b7ecd12007-02-05 14:57:57 +0000537 *len = tftp_err(ERR_PERM, packet, _("cannot access %s: %s"), namebuff);
Simon Kelley5aabfc72007-08-29 11:24:47 +0100538 if (fd != -1)
539 close(fd);
Simon Kelley1b7ecd12007-02-05 14:57:57 +0000540 return NULL;
541
Simon Kelley5aabfc72007-08-29 11:24:47 +0100542 oops:
Simon Kelley1b7ecd12007-02-05 14:57:57 +0000543 *len = tftp_err_oops(packet, namebuff);
Simon Kelley5aabfc72007-08-29 11:24:47 +0100544 if (fd != -1)
545 close(fd);
Simon Kelley1b7ecd12007-02-05 14:57:57 +0000546 return NULL;
547}
548
Simon Kelleyb842bc92015-07-12 21:09:11 +0100549void check_tftp_listeners(time_t now)
Simon Kelley832af0b2007-01-21 20:01:28 +0000550{
551 struct tftp_transfer *transfer, *tmp, **up;
552 ssize_t len;
553
554 struct ack {
555 unsigned short op, block;
556 } *mess = (struct ack *)daemon->packet;
557
558 /* Check for activity on any existing transfers */
559 for (transfer = daemon->tftp_trans, up = &daemon->tftp_trans; transfer; transfer = tmp)
560 {
561 tmp = transfer->next;
562
Simon Kelley6a69ab52012-04-24 14:42:26 +0100563 prettyprint_addr(&transfer->peer, daemon->addrbuff);
564
Simon Kelleyb842bc92015-07-12 21:09:11 +0100565 if (poll_check(transfer->sockfd, POLLIN))
Simon Kelley832af0b2007-01-21 20:01:28 +0000566 {
567 /* we overwrote the buffer... */
568 daemon->srv_save = NULL;
569
570 if ((len = recv(transfer->sockfd, daemon->packet, daemon->packet_buff_sz, 0)) >= (ssize_t)sizeof(struct ack))
571 {
572 if (ntohs(mess->op) == OP_ACK && ntohs(mess->block) == (unsigned short)transfer->block)
573 {
574 /* Got ack, ensure we take the (re)transmit path */
575 transfer->timeout = now;
576 transfer->backoff = 0;
Simon Kelley9e038942008-05-30 20:06:34 +0100577 if (transfer->block++ != 0)
578 transfer->offset += transfer->blocksize - transfer->expansion;
Simon Kelley832af0b2007-01-21 20:01:28 +0000579 }
580 else if (ntohs(mess->op) == OP_ERR)
581 {
582 char *p = daemon->packet + sizeof(struct ack);
583 char *end = daemon->packet + len;
584 char *err = next(&p, end);
Simon Kelley28866e92011-02-14 20:19:14 +0000585
Simon Kelley832af0b2007-01-21 20:01:28 +0000586 /* Sanitise error message */
587 if (!err)
588 err = "";
589 else
Simon Kelley7a14dfe2012-04-20 20:50:42 +0100590 sanitise(err);
Simon Kelley6a69ab52012-04-24 14:42:26 +0100591
Simon Kelley316e2732010-01-22 20:16:09 +0000592 my_syslog(MS_TFTP | LOG_ERR, _("error %d %s received from %s"),
Simon Kelleyf2621c72007-04-29 19:47:21 +0100593 (int)ntohs(mess->block), err,
Simon Kelleyc72daea2012-01-05 21:33:27 +0000594 daemon->addrbuff);
Simon Kelley832af0b2007-01-21 20:01:28 +0000595
596 /* Got err, ensure we take abort */
597 transfer->timeout = now;
598 transfer->backoff = 100;
599 }
600 }
601 }
602
603 if (difftime(now, transfer->timeout) >= 0.0)
604 {
605 int endcon = 0;
606
607 /* timeout, retransmit */
Simon Kelley5aabfc72007-08-29 11:24:47 +0100608 transfer->timeout += 1 + (1<<transfer->backoff);
Simon Kelley832af0b2007-01-21 20:01:28 +0000609
610 /* we overwrote the buffer... */
611 daemon->srv_save = NULL;
612
613 if ((len = get_block(daemon->packet, transfer)) == -1)
614 {
Simon Kelley1b7ecd12007-02-05 14:57:57 +0000615 len = tftp_err_oops(daemon->packet, transfer->file->filename);
Simon Kelley832af0b2007-01-21 20:01:28 +0000616 endcon = 1;
617 }
Simon Kelley42fb8152012-04-20 17:15:01 +0100618 /* don't complain about timeout when we're awaiting the last
619 ACK, some clients never send it */
Simon Kelleyb4b93082013-06-19 10:31:23 +0100620 else if (++transfer->backoff > 7 && len != 0)
Simon Kelley832af0b2007-01-21 20:01:28 +0000621 {
Simon Kelley42fb8152012-04-20 17:15:01 +0100622 endcon = 1;
623 len = 0;
Simon Kelley832af0b2007-01-21 20:01:28 +0000624 }
Simon Kelley42fb8152012-04-20 17:15:01 +0100625
Simon Kelley832af0b2007-01-21 20:01:28 +0000626 if (len != 0)
627 while(sendto(transfer->sockfd, daemon->packet, len, 0,
Simon Kelley04363602012-04-27 10:11:51 +0100628 (struct sockaddr *)&transfer->peer, sa_len(&transfer->peer)) == -1 && errno == EINTR);
Simon Kelley832af0b2007-01-21 20:01:28 +0000629
630 if (endcon || len == 0)
631 {
Simon Kelley42fb8152012-04-20 17:15:01 +0100632 strcpy(daemon->namebuff, transfer->file->filename);
633 sanitise(daemon->namebuff);
634 my_syslog(MS_TFTP | LOG_INFO, endcon ? _("failed sending %s to %s") : _("sent %s to %s"), daemon->namebuff, daemon->addrbuff);
Simon Kelley832af0b2007-01-21 20:01:28 +0000635 /* unlink */
636 *up = tmp;
Simon Kelley231d0612012-04-27 13:50:45 +0100637 if (endcon)
638 free_transfer(transfer);
639 else
640 {
641 /* put on queue to be sent to script and deleted */
642 transfer->next = daemon->tftp_done_trans;
643 daemon->tftp_done_trans = transfer;
644 }
Simon Kelley832af0b2007-01-21 20:01:28 +0000645 continue;
646 }
647 }
648
649 up = &transfer->next;
Simon Kelley28866e92011-02-14 20:19:14 +0000650 }
Simon Kelley832af0b2007-01-21 20:01:28 +0000651}
652
653static void free_transfer(struct tftp_transfer *transfer)
654{
655 close(transfer->sockfd);
656 if (transfer->file && (--transfer->file->refcount) == 0)
657 {
658 close(transfer->file->fd);
659 free(transfer->file);
660 }
661 free(transfer);
662}
663
664static char *next(char **p, char *end)
665{
666 char *ret = *p;
667 size_t len;
668
669 if (*(end-1) != 0 ||
670 *p == end ||
671 (len = strlen(ret)) == 0)
672 return NULL;
673
674 *p += len + 1;
675 return ret;
676}
677
Simon Kelley42fb8152012-04-20 17:15:01 +0100678static void sanitise(char *buf)
679{
Simon Kelley7a14dfe2012-04-20 20:50:42 +0100680 unsigned char *q, *r;
681 for (q = r = (unsigned char *)buf; *r; r++)
Simon Kelley11263a42012-04-27 14:00:55 +0100682 if (isprint((int)*r))
Simon Kelley7a14dfe2012-04-20 20:50:42 +0100683 *(q++) = *r;
684 *q = 0;
Simon Kelley42fb8152012-04-20 17:15:01 +0100685
Simon Kelley7a14dfe2012-04-20 20:50:42 +0100686}
Simon Kelley42fb8152012-04-20 17:15:01 +0100687
Simon Kelley294d36d2016-07-06 21:30:25 +0100688#define MAXMESSAGE 500 /* limit to make packet < 512 bytes and definitely smaller than buffer */
Simon Kelley832af0b2007-01-21 20:01:28 +0000689static ssize_t tftp_err(int err, char *packet, char *message, char *file)
690{
691 struct errmess {
692 unsigned short op, err;
693 char message[];
694 } *mess = (struct errmess *)packet;
Simon Kelley294d36d2016-07-06 21:30:25 +0100695 ssize_t len, ret = 4;
Simon Kelley832af0b2007-01-21 20:01:28 +0000696 char *errstr = strerror(errno);
Simon Kelley42fb8152012-04-20 17:15:01 +0100697
Simon Kelleyfa785732016-07-22 20:56:01 +0100698 memset(packet, 0, daemon->packet_buff_sz);
Simon Kelley42fb8152012-04-20 17:15:01 +0100699 sanitise(file);
Simon Kelleyfa785732016-07-22 20:56:01 +0100700
Simon Kelley832af0b2007-01-21 20:01:28 +0000701 mess->op = htons(OP_ERR);
702 mess->err = htons(err);
Simon Kelley294d36d2016-07-06 21:30:25 +0100703 len = snprintf(mess->message, MAXMESSAGE, message, file, errstr);
704 ret += (len < MAXMESSAGE) ? len + 1 : MAXMESSAGE; /* include terminating zero */
705
Simon Kelley316e2732010-01-22 20:16:09 +0000706 my_syslog(MS_TFTP | LOG_ERR, "%s", mess->message);
Simon Kelley832af0b2007-01-21 20:01:28 +0000707
708 return ret;
709}
710
Simon Kelley1b7ecd12007-02-05 14:57:57 +0000711static ssize_t tftp_err_oops(char *packet, char *file)
712{
Simon Kelley42fb8152012-04-20 17:15:01 +0100713 /* May have >1 refs to file, so potentially mangle a copy of the name */
714 strcpy(daemon->namebuff, file);
715 return tftp_err(ERR_NOTDEF, packet, _("cannot read %s: %s"), daemon->namebuff);
Simon Kelley1b7ecd12007-02-05 14:57:57 +0000716}
717
Simon Kelley832af0b2007-01-21 20:01:28 +0000718/* return -1 for error, zero for done. */
719static ssize_t get_block(char *packet, struct tftp_transfer *transfer)
720{
Simon Kelleyfa785732016-07-22 20:56:01 +0100721 memset(packet, 0, daemon->packet_buff_sz);
722
Simon Kelley832af0b2007-01-21 20:01:28 +0000723 if (transfer->block == 0)
724 {
725 /* send OACK */
726 char *p;
727 struct oackmess {
728 unsigned short op;
729 char data[];
730 } *mess = (struct oackmess *)packet;
731
732 p = mess->data;
733 mess->op = htons(OP_OACK);
734 if (transfer->opt_blocksize)
735 {
736 p += (sprintf(p, "blksize") + 1);
Rosen Penevcbd29e52017-06-27 22:29:51 +0100737 p += (sprintf(p, "%u", transfer->blocksize) + 1);
Simon Kelley832af0b2007-01-21 20:01:28 +0000738 }
739 if (transfer->opt_transize)
740 {
741 p += (sprintf(p,"tsize") + 1);
742 p += (sprintf(p, "%u", (unsigned int)transfer->file->size) + 1);
743 }
744
745 return p - packet;
746 }
747 else
748 {
749 /* send data packet */
750 struct datamess {
751 unsigned short op, block;
752 unsigned char data[];
753 } *mess = (struct datamess *)packet;
754
Simon Kelley9e038942008-05-30 20:06:34 +0100755 size_t size = transfer->file->size - transfer->offset;
Simon Kelley832af0b2007-01-21 20:01:28 +0000756
Simon Kelley9e038942008-05-30 20:06:34 +0100757 if (transfer->offset > transfer->file->size)
Simon Kelley832af0b2007-01-21 20:01:28 +0000758 return 0; /* finished */
759
760 if (size > transfer->blocksize)
761 size = transfer->blocksize;
762
Simon Kelley832af0b2007-01-21 20:01:28 +0000763 mess->op = htons(OP_DATA);
764 mess->block = htons((unsigned short)(transfer->block));
765
Simon Kelley9e038942008-05-30 20:06:34 +0100766 if (lseek(transfer->file->fd, transfer->offset, SEEK_SET) == (off_t)-1 ||
767 !read_write(transfer->file->fd, mess->data, size, 1))
Simon Kelley832af0b2007-01-21 20:01:28 +0000768 return -1;
Simon Kelley9e038942008-05-30 20:06:34 +0100769
770 transfer->expansion = 0;
771
772 /* Map '\n' to CR-LF in netascii mode */
773 if (transfer->netascii)
774 {
775 size_t i;
776 int newcarrylf;
777
778 for (i = 0, newcarrylf = 0; i < size; i++)
779 if (mess->data[i] == '\n' && ( i != 0 || !transfer->carrylf))
780 {
Simon Kelley7de060b2011-08-26 17:24:52 +0100781 transfer->expansion++;
782
783 if (size != transfer->blocksize)
Simon Kelley9e038942008-05-30 20:06:34 +0100784 size++; /* room in this block */
Simon Kelley7de060b2011-08-26 17:24:52 +0100785 else if (i == size - 1)
786 newcarrylf = 1; /* don't expand LF again if it moves to the next block */
787
Simon Kelley9e038942008-05-30 20:06:34 +0100788 /* make space and insert CR */
789 memmove(&mess->data[i+1], &mess->data[i], size - (i + 1));
790 mess->data[i] = '\r';
791
792 i++;
793 }
794 transfer->carrylf = newcarrylf;
795
796 }
797
798 return size + 4;
Simon Kelley832af0b2007-01-21 20:01:28 +0000799 }
800}
801
Simon Kelleya9530962012-03-20 22:07:35 +0000802
803int do_tftp_script_run(void)
804{
805 struct tftp_transfer *transfer;
806
807 if ((transfer = daemon->tftp_done_trans))
808 {
809 daemon->tftp_done_trans = transfer->next;
810#ifdef HAVE_SCRIPT
811 queue_tftp(transfer->file->size, transfer->file->filename, &transfer->peer);
812#endif
813 free_transfer(transfer);
814 return 1;
815 }
816
817 return 0;
818}
Simon Kelley832af0b2007-01-21 20:01:28 +0000819#endif