⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 session.c

📁 OpenSSH 是 SSH (Secure SHell) 协议的免费开源实现。它用安全、加密的网络连接工具代替了 telnet、ftp、 rlogin、rsh 和 rcp 工具。OpenSSH 支持
💻 C
📖 第 1 页 / 共 4 页
字号:
		f = popen(cmd, "w");		if (f) {			if (do_xauth)				fprintf(f, "%s %s\n", s->auth_proto,				    s->auth_data);			pclose(f);		} else			fprintf(stderr, "Could not run %s\n",			    _PATH_SSH_USER_RC);	} else if (stat(_PATH_SSH_SYSTEM_RC, &st) >= 0) {		if (debug_flag)			fprintf(stderr, "Running %s %s\n", _PATH_BSHELL,			    _PATH_SSH_SYSTEM_RC);		f = popen(_PATH_BSHELL " " _PATH_SSH_SYSTEM_RC, "w");		if (f) {			if (do_xauth)				fprintf(f, "%s %s\n", s->auth_proto,				    s->auth_data);			pclose(f);		} else			fprintf(stderr, "Could not run %s\n",			    _PATH_SSH_SYSTEM_RC);	} else if (do_xauth && options.xauth_location != NULL) {		/* Add authority data to .Xauthority if appropriate. */		if (debug_flag) {			fprintf(stderr,			    "Running %.500s remove %.100s\n",			    options.xauth_location, s->auth_display);			fprintf(stderr,			    "%.500s add %.100s %.100s %.100s\n",			    options.xauth_location, s->auth_display,			    s->auth_proto, s->auth_data);		}		snprintf(cmd, sizeof cmd, "%s -q -",		    options.xauth_location);		f = popen(cmd, "w");		if (f) {			fprintf(f, "remove %s\n",			    s->auth_display);			fprintf(f, "add %s %s %s\n",			    s->auth_display, s->auth_proto,			    s->auth_data);			pclose(f);		} else {			fprintf(stderr, "Could not run %s\n",			    cmd);		}	}}static voiddo_nologin(struct passwd *pw){	FILE *f = NULL;	char buf[1024];#ifdef HAVE_LOGIN_CAP	if (!login_getcapbool(lc, "ignorenologin", 0) && pw->pw_uid)		f = fopen(login_getcapstr(lc, "nologin", _PATH_NOLOGIN,		    _PATH_NOLOGIN), "r");#else	if (pw->pw_uid)		f = fopen(_PATH_NOLOGIN, "r");#endif	if (f) {		/* /etc/nologin exists.  Print its contents and exit. */		logit("User %.100s not allowed because %s exists",		    pw->pw_name, _PATH_NOLOGIN);		while (fgets(buf, sizeof(buf), f))			fputs(buf, stderr);		fclose(f);		fflush(NULL);		exit(254);	}}/* Set login name, uid, gid, and groups. */voiddo_setusercontext(struct passwd *pw){#ifndef HAVE_CYGWIN	if (getuid() == 0 || geteuid() == 0)#endif /* HAVE_CYGWIN */	{#ifdef HAVE_SETPCRED		if (setpcred(pw->pw_name, (char **)NULL) == -1)			fatal("Failed to set process credentials");#endif /* HAVE_SETPCRED */#ifdef HAVE_LOGIN_CAP# ifdef __bsdi__		setpgid(0, 0);# endif#ifdef GSSAPI		if (options.gss_authentication) {			temporarily_use_uid(pw);			ssh_gssapi_storecreds();			restore_uid();		}#endif# ifdef USE_PAM		if (options.use_pam) {			do_pam_session();			do_pam_setcred(0);		}# endif /* USE_PAM */		if (setusercontext(lc, pw, pw->pw_uid,		    (LOGIN_SETALL & ~LOGIN_SETPATH)) < 0) {			perror("unable to set user context");			exit(1);		}#else# if defined(HAVE_GETLUID) && defined(HAVE_SETLUID)		/* Sets login uid for accounting */		if (getluid() == -1 && setluid(pw->pw_uid) == -1)			error("setluid: %s", strerror(errno));# endif /* defined(HAVE_GETLUID) && defined(HAVE_SETLUID) */		if (setlogin(pw->pw_name) < 0)			error("setlogin failed: %s", strerror(errno));		if (setgid(pw->pw_gid) < 0) {			perror("setgid");			exit(1);		}		/* Initialize the group list. */		if (initgroups(pw->pw_name, pw->pw_gid) < 0) {			perror("initgroups");			exit(1);		}		endgrent();#ifdef GSSAPI		if (options.gss_authentication) {			temporarily_use_uid(pw);			ssh_gssapi_storecreds();			restore_uid();		}#endif# ifdef USE_PAM		/*		 * PAM credentials may take the form of supplementary groups.		 * These will have been wiped by the above initgroups() call.		 * Reestablish them here.		 */		if (options.use_pam) {			do_pam_session();			do_pam_setcred(0);		}# endif /* USE_PAM */# if defined(WITH_IRIX_PROJECT) || defined(WITH_IRIX_JOBS) || defined(WITH_IRIX_ARRAY)		irix_setusercontext(pw);#  endif /* defined(WITH_IRIX_PROJECT) || defined(WITH_IRIX_JOBS) || defined(WITH_IRIX_ARRAY) */# ifdef _AIX		aix_usrinfo(pw);# endif /* _AIX */		/* Permanently switch to the desired uid. */		permanently_set_uid(pw);#endif	}#ifdef HAVE_CYGWIN	if (is_winnt)#endif	if (getuid() != pw->pw_uid || geteuid() != pw->pw_uid)		fatal("Failed to set uids to %u.", (u_int) pw->pw_uid);}static voiddo_pwchange(Session *s){	fflush(NULL);	fprintf(stderr, "WARNING: Your password has expired.\n");	if (s->ttyfd != -1) {		fprintf(stderr,		    "You must change your password now and login again!\n");#ifdef PASSWD_NEEDS_USERNAME		execl(_PATH_PASSWD_PROG, "passwd", s->pw->pw_name,		    (char *)NULL);#else		execl(_PATH_PASSWD_PROG, "passwd", (char *)NULL);#endif		perror("passwd");	} else {		fprintf(stderr,		    "Password change required but no TTY available.\n");	}	exit(1);}static voidlaunch_login(struct passwd *pw, const char *hostname){	/* Launch login(1). */	execl(LOGIN_PROGRAM, "login", "-h", hostname,#ifdef xxxLOGIN_NEEDS_TERM		    (s->term ? s->term : "unknown"),#endif /* LOGIN_NEEDS_TERM */#ifdef LOGIN_NO_ENDOPT	    "-p", "-f", pw->pw_name, (char *)NULL);#else	    "-p", "-f", "--", pw->pw_name, (char *)NULL);#endif	/* Login couldn't be executed, die. */	perror("login");	exit(1);}static voidchild_close_fds(void){	int i;	if (packet_get_connection_in() == packet_get_connection_out())		close(packet_get_connection_in());	else {		close(packet_get_connection_in());		close(packet_get_connection_out());	}	/*	 * Close all descriptors related to channels.  They will still remain	 * open in the parent.	 */	/* XXX better use close-on-exec? -markus */	channel_close_all();	/*	 * Close any extra file descriptors.  Note that there may still be	 * descriptors left by system functions.  They will be closed later.	 */	endpwent();	/*	 * Close any extra open file descriptors so that we don\'t have them	 * hanging around in clients.  Note that we want to do this after	 * initgroups, because at least on Solaris 2.3 it leaves file	 * descriptors open.	 */	for (i = 3; i < 64; i++)		close(i);}/* * Performs common processing for the child, such as setting up the * environment, closing extra file descriptors, setting the user and group * ids, and executing the command or shell. */voiddo_child(Session *s, const char *command){	extern char **environ;	char **env;	char *argv[10];	const char *shell, *shell0, *hostname = NULL;	struct passwd *pw = s->pw;	/* remove hostkey from the child's memory */	destroy_sensitive_data();	/* Force a password change */	if (s->authctxt->force_pwchange) {		do_setusercontext(pw);		child_close_fds();		do_pwchange(s);		exit(1);	}	/* login(1) is only called if we execute the login shell */	if (options.use_login && command != NULL)		options.use_login = 0;#ifdef _UNICOS	cray_setup(pw->pw_uid, pw->pw_name, command);#endif /* _UNICOS */	/*	 * Login(1) does this as well, and it needs uid 0 for the "-h"	 * switch, so we let login(1) to this for us.	 */	if (!options.use_login) {#ifdef HAVE_OSF_SIA		session_setup_sia(pw, s->ttyfd == -1 ? NULL : s->tty);		if (!check_quietlogin(s, command))			do_motd();#else /* HAVE_OSF_SIA */		do_nologin(pw);		do_setusercontext(pw);		/*		 * PAM session modules in do_setusercontext may have		 * generated messages, so if this in an interactive		 * login then display them too.		 */		if (!check_quietlogin(s, command))			display_loginmsg();#endif /* HAVE_OSF_SIA */	}#ifdef USE_PAM	if (options.use_pam && !is_pam_session_open()) {		display_loginmsg();		exit(254);	}#endif	/*	 * Get the shell from the password data.  An empty shell field is	 * legal, and means /bin/sh.	 */	shell = (pw->pw_shell[0] == '\0') ? _PATH_BSHELL : pw->pw_shell;	/*	 * Make sure $SHELL points to the shell from the password file,	 * even if shell is overridden from login.conf	 */	env = do_setup_env(s, shell);#ifdef HAVE_LOGIN_CAP	shell = login_getcapstr(lc, "shell", (char *)shell, (char *)shell);#endif	/* we have to stash the hostname before we close our socket. */	if (options.use_login)		hostname = get_remote_name_or_ip(utmp_len,		    options.use_dns);	/*	 * Close the connection descriptors; note that this is the child, and	 * the server will still have the socket open, and it is important	 * that we do not shutdown it.  Note that the descriptors cannot be	 * closed before building the environment, as we call	 * get_remote_ipaddr there.	 */	child_close_fds();	/*	 * Must take new environment into use so that .ssh/rc,	 * /etc/ssh/sshrc and xauth are run in the proper environment.	 */	environ = env;#if defined(KRB5) && defined(USE_AFS)	/*	 * At this point, we check to see if AFS is active and if we have	 * a valid Kerberos 5 TGT. If so, it seems like a good idea to see	 * if we can (and need to) extend the ticket into an AFS token. If	 * we don't do this, we run into potential problems if the user's	 * home directory is in AFS and it's not world-readable.	 */	if (options.kerberos_get_afs_token && k_hasafs() &&	     (s->authctxt->krb5_ctx != NULL)) {		char cell[64];		debug("Getting AFS token");		k_setpag();		if (k_afs_cell_of_file(pw->pw_dir, cell, sizeof(cell)) == 0)			krb5_afslog(s->authctxt->krb5_ctx,			    s->authctxt->krb5_fwd_ccache, cell, NULL);		krb5_afslog_home(s->authctxt->krb5_ctx,		    s->authctxt->krb5_fwd_ccache, NULL, NULL, pw->pw_dir);	}#endif	/* Change current directory to the user\'s home directory. */	if (chdir(pw->pw_dir) < 0) {		fprintf(stderr, "Could not chdir to home directory %s: %s\n",		    pw->pw_dir, strerror(errno));#ifdef HAVE_LOGIN_CAP		if (login_getcapbool(lc, "requirehome", 0))			exit(1);#endif	}	if (!options.use_login)		do_rc_files(s, shell);	/* restore SIGPIPE for child */	signal(SIGPIPE,  SIG_DFL);	if (options.use_login) {		launch_login(pw, hostname);		/* NEVERREACHED */	}	/* Get the last component of the shell name. */	if ((shell0 = strrchr(shell, '/')) != NULL)		shell0++;	else		shell0 = shell;	/*	 * If we have no command, execute the shell.  In this case, the shell	 * name to be passed in argv[0] is preceded by '-' to indicate that	 * this is a login shell.	 */	if (!command) {		char argv0[256];		/* Start the shell.  Set initial character to '-'. */		argv0[0] = '-';		if (strlcpy(argv0 + 1, shell0, sizeof(argv0) - 1)		    >= sizeof(argv0) - 1) {			errno = EINVAL;			perror(shell);			exit(1);		}		/* Execute the shell. */		argv[0] = argv0;		argv[1] = NULL;		execve(shell, argv, env);		/* Executing the shell failed. */		perror(shell);		exit(1);	}	/*	 * Execute the command using the user's shell.  This uses the -c	 * option to execute the command.	 */	argv[0] = (char *) shell0;	argv[1] = "-c";	argv[2] = (char *) command;	argv[3] = NULL;	execve(shell, argv, env);	perror(shell);	exit(1);}Session *session_new(void){	int i;	static int did_init = 0;	if (!did_init) {		debug("session_new: init");		for (i = 0; i < MAX_SESSIONS; i++) {			sessions[i].used = 0;		}		did_init = 1;	}	for (i = 0; i < MAX_SESSIONS; i++) {		Session *s = &sessions[i];		if (! s->used) {			memset(s, 0, sizeof(*s));			s->chanid = -1;			s->ptyfd = -1;			s->ttyfd = -1;			s->used = 1;			s->self = i;			debug("session_new: session %d", i);			return s;		}	}	return NULL;}static voidsession_dump(void){	int i;	for (i = 0; i < MAX_SESSIONS; i++) {		Session *s = &sessions[i];		debug("dump: used %d session %d %p channel %d pid %ld",		    s->used,		    s->self,		    s,		    s->chanid,		    (long)s->pid);	}}intsession_open(Authctxt *authctxt, int chanid){	Session *s = session_new();	debug("session_open: channel %d", chanid);	if (s == NULL) {		error("no more sessions");		return 0;	}	s->authctxt = authctxt;	s->pw = authctxt->pw;	if (s->pw == NULL || !authctxt->valid)		fatal("no user for session %d", s->self);	debug("session_open: session %d: link with channel %d", s->self, chanid);	s->chanid = chanid;	return 1;}Session *session_by_tty(char *tty){	int i;	for (i = 0; i < MAX_SESSIONS; i++) {		Session *s = &sessions[i];		if (s->used && s->ttyfd != -1 && strcmp(s->tty, tty) == 0) {			debug("session_by_tty: session %d tty %s", i, tty);			return s;		}	}	debug("session_by_tty: unknown tty %.100s", tty);	session_dump();	return NULL;}static Session *session_by_channel(int id){	int i;	for (i = 0; i < MAX_SESSIONS; i++) {		Session *s = &sessions[i];		if (s->used && s->chanid == id) {			debug("session_by_channel: session %d channel %d", i, id);			return s;		}	}	debug("session_by_channel: unknown channel %d", id);	session_dump();	return NULL;}static Session *session_by_pid(pid_t pid){	int i;	debug("session_by_pid: pid %ld", (long)pid);	for (i = 0; i < MAX_SESSIONS; i++) {		Session *s = &sessions[i];		if (s->used && s->pid == pid)			return s;	}	error("session_by_pid: unknown pid %ld", (long)pid);	session_dump();	return NULL;}static intsession_window_change_req(Session *s){	s->col = packet_get_int();	s->row = packet_get_int();	s->xpixel = packet_get_int();	s->ypixel = packet_get_int();	packet_check_eom();	pty_change_window_size(s->ptyfd, s->row, s->col, s->xpixel, s->ypixel);	return 1;}static intsession_pty_req(Session *s){	u_int len;	int n_bytes;	if (no_pty_flag) {		debug("Allocating a pty not permitted for this authentication.");		return 0;	}	if (s->ttyfd != -1) {		packet_disconnect("Protocol error: you already have a pty.");		return 0;	}	s->term = packet_get_string(&len);	if (compat20) {		s->col = packet_get_int();		s->row = packet_get_int();	} else {		s->row = packet_get_int();		s->col = packet_get_int();	}	s->xpixel = packet_get_int();	s->ypixel = packet_get_int();	if (strcmp(s->term, "") == 0) {		xfree(s->term);		s->term = NULL;	}	/* Allocate a pty and open it. */	debug("Allocating pty.");	if (!PRIVSEP(pty_allocate(&s->ptyfd, &s->ttyfd, s->tty, sizeof(s->tty)))) {		if (s->term)			xfree(s->term);

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -