1 /* cmds.c: BetaFTPD command handlers
2 Copyright (C) 1999-2000 Steinar H. Gunderson
4 This program is is free software; you can redistribute it and/or modify
5 it under the terms of the GNU General Public License, version 2 if the
6 License as published by the Free Software Foundation.
8 This program is distributed in the hope that it will be useful,
9 but WITHOUT ANY WARRANTY; without even the implied warranty of
10 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
11 GNU General Public License for more details.
13 You should have received a copy of the GNU General Public License
14 along with this program; if not, write to the Free Software
15 Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA.
81 #include <sys/ioctl.h>
89 #include <sys/param.h>
105 #include <sys/filio.h>
109 #include <sys/poll.h>
134 extern struct conn *first_conn;
136 extern struct dcache *first_dcache;
140 extern struct pollfd fds[];
142 extern fd_set master_fds, master_send_fds;
147 char add_cmlen; /* =1 if the command takes an argument */
148 int (*callback)(struct conn * const);
151 char do_setuid; /* =1 if root is not *really* needed */
155 static const struct handler handler_table[] = {
156 { "user ", 1, cmd_user, 0 NO_SETUID },
157 { "pass ", 1, cmd_pass, 1 NO_SETUID },
158 { "retr ", 1, cmd_retr, 3 DO_SETUID },
159 { "acct ", 1, cmd_acct, 0 NO_SETUID },
160 { "port ", 1, cmd_port, 3 DO_SETUID },
161 { "pasv" , 0, cmd_pasv, 3 DO_SETUID },
162 { "pwd" , 0, cmd_pwd, 3 DO_SETUID },
163 { "cwd " , 1, cmd_cwd, 3 DO_SETUID },
164 { "cdup" , 0, cmd_cdup, 3 DO_SETUID },
165 { "rest ", 1, cmd_rest, 3 DO_SETUID },
166 { "list" , 0, cmd_list, 3 DO_SETUID },
167 { "nlst" , 0, cmd_nlst, 3 DO_SETUID },
168 { "type ", 1, cmd_type, 3 DO_SETUID },
169 { "mode ", 1, cmd_mode, 3 DO_SETUID },
170 { "stru ", 1, cmd_stru, 3 DO_SETUID },
171 { "size ", 1, cmd_size, 3 DO_SETUID },
172 { "mdtm ", 1, cmd_mdtm, 3 DO_SETUID },
173 { "abor" , 0, cmd_abor, 3 DO_SETUID },
174 { "dele ", 1, cmd_dele, 3 DO_SETUID },
175 { "rnfr ", 1, cmd_rnfr, 3 DO_SETUID },
176 { "rnto ", 1, cmd_rnto, 3 DO_SETUID },
177 { "mkd " , 1, cmd_mkd, 3 DO_SETUID },
178 { "rmd " , 1, cmd_rmd, 3 DO_SETUID },
179 { "allo ", 1, cmd_allo, 3 DO_SETUID },
180 { "stat" , 0, cmd_stat, 0 NO_SETUID },
181 { "noop" , 0, cmd_noop, 0 DO_SETUID },
182 { "syst" , 0, cmd_syst, 0 DO_SETUID },
183 { "help" , 0, cmd_help, 0 NO_SETUID },
184 { "quit" , 0, cmd_quit, 0 DO_SETUID },
185 { "rein" , 0, cmd_rein, 0 DO_SETUID },
187 /* deprecated forms */
188 { "xcup" , 0, cmd_cdup, 3 DO_SETUID },
189 { "xcwd ", 1, cmd_cwd, 3 DO_SETUID },
190 { "xpwd" , 0, cmd_pwd, 3 DO_SETUID },
191 { "xmkd ", 1, cmd_mkd, 3 DO_SETUID },
192 { "xrmd ", 1, cmd_rmd, 3 DO_SETUID },
194 { "stor ", 1, cmd_stor, 3 DO_SETUID },
195 { "appe ", 1, cmd_appe, 3 DO_SETUID },
198 #warning Use DOING_PROFILING with caution, and NEVER on a production server! :-)
199 { "exit", 0, cmd_exit, 0 NO_SETUID },
201 { "" , 0, NULL, 0 NO_SETUID }
205 * do_chdir(): Does a chdir() to newd on c, staying inside the
206 * limits of root_dir. Use this instead of a chdir() whenever
207 * you can, and possibly even when you can't :-)
209 * This command quirks around some problems in the rest of
210 * the code (namely translate_path()), so a blank newdir is
211 * interpreted as the root directory.
213 int do_chdir(struct conn * const c, const char * const newd)
215 char chd[512], temp[512];
217 TRAP_ERROR(chdir(c->curr_dir) == -1, 550, return -1);
219 /* handle `absolute' paths */
220 if (newd[0] == '/' || newd[0] == '\0') {
221 strcpy(temp, c->root_dir);
224 * is this the root directory? if not, remove the trailing `/'
225 * and concatenate the new directory on
227 if (newd[1] != '\0' && newd[0] != '\0') {
228 temp[strlen(temp) - 1] = 0;
236 if (nr_check_permission(c->uid, temp, 1, 1, NULL) == -1) {
237 numeric(c, 550, "Permission denied");
242 TRAP_ERROR(chdir(temp) == -1, 550, return -1);
245 if (chd[strlen(chd) - 1] != '/') {
249 if (strncmp(chd, c->root_dir, strlen(c->root_dir)) != 0) {
250 numeric(c, 550, "No such file or directory.");
258 * cmd_user(): Handles the USER command, and does most of the initial
259 * authentication work. User names are limited to 16
260 * characters, by force...
262 int cmd_user(struct conn * const c)
264 strncpy(c->username, c->recv_buf, 16);
267 if (strcasecmp(c->username, "anonymous") == 0) {
268 strcpy(c->username, "ftp");
270 if (strcasecmp(c->username, "ftp") == 0) {
271 numeric(c, 331, "Login OK, send password (your e-mail).");
274 numeric(c, 331, "Password required for %s.", c->username);
281 * cmd_pass(): Handles the PASS command, and checks the password.
282 * This function is rather long and complicated, mostly
283 * because there are so many ways of doing users
284 * (including my nonroot system) out there... And we
285 * don't even support PAM or real shadow passwords (with
288 int cmd_pass(struct conn * const c)
291 c->auth = nr_userinfo(c->username, &c->uid, c->curr_dir, c->root_dir,
293 #else /* !WANT_NONROOT */
294 #if WANT_SHADOW && HAVE_SHADOW_H
299 p = getpwnam(c->username);
300 #if WANT_SHADOW && HAVE_SHADOW_H
301 s = getspnam(c->username);
308 strncpy(c->curr_dir, p->pw_dir, 254);
309 c->curr_dir[254] = 0;
313 if (c->curr_dir[strlen(c->curr_dir) - 1] != '/') {
314 strcat(c->curr_dir, "/");
316 strcpy(c->root_dir, c->curr_dir);
318 } else if (c->auth != 0) {
319 strcpy(c->root_dir, "/");
320 if (strcmp(crypt(c->recv_buf, p->pw_passwd), p->pw_passwd) != 0
321 #if WANT_SHADOW && HAVE_SHADOW_H
322 && (s == NULL || strcmp(crypt(c->recv_buf, s->sp_pwdp), s->sp_pwdp) != 0)
330 #endif /* !WANT_NONROOT */
332 /* root should not be allowed to FTP */
337 numeric(c, 530, "Login incorrect.");
341 dump_file(c, 230, "welcome.msg");
343 numeric(c, 230, "User logged in.");
349 * cmd_acct(): Handle (ignore) the ACCT command. I don't see how we
350 * could make use of this command... wu-ftpd doesn't, either.
351 * However, wu-ftpd (at least the version I have here) uses
352 * 502, which isn't a legal error code according to RFC959.
353 * 202, on the other hand, is, and seems to be applicable.
355 * I'm unsure if this one should require setuid or not, but
356 * I feel that the RFC959 intention is having it _before_
357 * USER/PASS. Therefore, this one runs with root privilegies :-)
359 int cmd_acct(struct conn * const c)
361 numeric(c, 202, "ACCT ignored OK -- not applicable on this system.");
366 * cmd_port(): Handles the PORT command, and sets up the data socket.
367 * Making a brief uid=0 (root) appearance (to bind the socket) --
368 * I feel it's safer that way (instead of running as root
369 * the whole way), in case there are some weird overflows
372 int cmd_port(struct conn * const c)
374 short int a0, a1, a2, a3, p0, p1;
377 struct sockaddr_in sin;
379 if ((c->transfer != NULL) && (c->transfer->state >= 4)) {
380 numeric(c, 500, "Sorry, only one transfer at a time.");
384 sock = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP);
385 TRAP_ERROR(sock == -1, 500, return 1);
387 destroy_ftran(c->transfer);
388 c->transfer = f = alloc_new_ftran(sock, c);
390 i = sscanf(c->recv_buf, "%3hu,%3hu,%3hu,%3hu,%3hu,%3hu", &a0, &a1, &a2, &a3, &p0, &p1);
392 numeric(c, 501, "Parse error.");
397 /* bind to own address, port 20 (FTP data) */
399 err = getsockname(c->sock, (struct sockaddr *)&sin, &tmp);
400 TRAP_ERROR(err == -1, 500, return 1);
401 sin.sin_port = FTP_PORT - 1;
403 numeric(c, 200, "PORT command OK.");
405 /* note that bind() might well fail, so we don't error check */
407 /* need root privilegies for a short while */
410 bind(sock, (struct sockaddr *)&sin, sizeof(sin));
415 f->sin.sin_family = AF_INET;
416 f->sin.sin_addr.s_addr = htonl(
417 ((unsigned char)(a0) << 24) +
418 ((unsigned char)(a1) << 16) +
419 ((unsigned char)(a2) << 8) +
420 ((unsigned char)(a3) ));
421 f->sin.sin_port = htons(
422 ((unsigned char)(p0) << 8) +
423 ((unsigned char)(p1) ));
428 ioctl(f->sock, FIONBIO, &one);
434 * cmd_pasv(): Handles the PASV command, and sets up the data socket.
435 * Uses port numbers > 1024, since it doesn't run as root.
437 int cmd_pasv(struct conn * const c)
441 unsigned int one = 1;
442 struct sockaddr_in addr;
444 if ((c->transfer != NULL) && (c->transfer->state >= 4)) {
445 numeric(c, 503, "Sorry, only one transfer at once.");
448 destroy_ftran(c->transfer);
450 sock = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP);
451 TRAP_ERROR(sock == -1, 500, return 1);
452 err = add_fd(sock, POLLIN);
453 TRAP_ERROR(err != 0, 501, return 1);
455 c->transfer = f = alloc_new_ftran(sock, c);
457 ioctl(sock, FIONBIO, &one);
461 err = getsockname(c->sock, (struct sockaddr *)&addr, &tmp);
462 TRAP_ERROR(err == -1, 500, return 1);
464 addr.sin_port = 0; /* let the system choose */
465 err = bind(sock, (struct sockaddr *)&addr, sizeof(struct sockaddr));
466 TRAP_ERROR(err == -1, 500, return 1);
469 err = getsockname(sock, (struct sockaddr *)&addr, &tmp);
470 TRAP_ERROR(err == -1, 500, return 1);
472 err = listen(f->sock, 1);
473 TRAP_ERROR(err == -1, 500, return 1);
476 numeric(c, 227, "Entering passive mode (%u,%u,%u,%u,%u,%u)",
477 (htonl(addr.sin_addr.s_addr) & 0xff000000) >> 24,
478 (htonl(addr.sin_addr.s_addr) & 0x00ff0000) >> 16,
479 (htonl(addr.sin_addr.s_addr) & 0x0000ff00) >> 8,
480 (htonl(addr.sin_addr.s_addr) & 0x000000ff),
481 (htons(addr.sin_port) & 0xff00) >> 8,
482 (htons(addr.sin_port) & 0x00ff));
487 * cmd_pwd(): Handles PWD command (print working directory).
489 * Note that if somebody contacts you with the message `the server
490 * says curr_dir() is outside root_dir()', you should fix your
491 * /betaftpd.users file, if you use nonroot. If not, it's a bug.
492 * Try to get it _reproducible_, and mail it to me.
494 int cmd_pwd(struct conn * const c)
496 char temp[512], *cdir = NULL;
498 cdir = do_pwd(c, temp, c->curr_dir);
500 numeric(c, 257, "\"%s\" is current working directory.", cdir);
506 * do_pwd(): Translates an absolute path to a path suitable for viewing
507 * to the user (ie. removes the root_dir, and removes a trailing
508 * slash if it exists). Note that the retbuf is only used as a
509 * storage place -- the pointer to the right place within retbuf
512 char *do_pwd(struct conn * const c, char * const retbuf, const char * const dir)
517 if (strncmp(retbuf, c->root_dir, strlen(c->root_dir)) != 0) {
518 numeric(c, 550, "curr_dir is outside root_dir, please contact site administrator.");
522 cdir = retbuf + strlen(c->root_dir) - 1;
523 if (cdir[strlen(cdir) - 1] == '/' && strlen(cdir) > 1) {
524 cdir[strlen(cdir) - 1] = 0;
525 } else if (strlen(cdir) == 0) {
533 * cmd_cwd(): Handles CWD command (change working directory). Uses
534 * cmd_cwd_internal() (see below).
536 int cmd_cwd(struct conn * const c)
538 cmd_cwd_internal(c, c->recv_buf);
543 * cmd_cdup(): Handles a CDUP command (identical to `CWD ..'). Note that
544 * RFC959 gives two different response codes (250 and 200) --
545 * 250 is the same as CWD gives, which sounds logical to me.
546 * wu-ftpd uses it as well.
548 * Note that using a CDUP to try to get outside root_dir returns
549 * an error, instead of just staying in the root directory (as
550 * the OS and thus wu-ftpd does).
552 int cmd_cdup(struct conn * const c)
554 cmd_cwd_internal(c, "..");
559 * cmd_cwd_internal():
560 * Does the work for CWD and CDUP (modularized to save some
561 * space and have clearer code). Mostly, it just uses do_chdir(),
562 * and sees where that takes us. It adds a trailing slash if needed.
564 void cmd_cwd_internal(struct conn * const c, const char * const newd)
566 if (do_chdir(c, newd) != -1) {
569 getcwd(c->curr_dir, 254);
570 i = strlen(c->curr_dir);
571 if (c->curr_dir[i - 1] != '/') {
572 c->curr_dir[i++] = '/';
573 c->curr_dir[i] = '\0';
577 dump_file(c, 250, ".message");
581 numeric(c, 250, "CWD successful.");
586 * cmd_rest(): Handles the REST command. All it does is tell the file
587 * sending functions to start at the correct number. We should
588 * perhaps add some better error checking to this?
590 int cmd_rest(struct conn * const c)
592 c->rest_pos = abs(atoi(c->recv_buf));
593 numeric(c, 350, "Setting resume at %u bytes.", c->rest_pos);
598 * cmd_retr(): Handles the RETR command. This command doesn't send the
599 * file, but it opens it and tells the socket handling code
600 * to check for activity on the data socket. When the
601 * connection occurs (or succeeds, if we're using PORT mode),
602 * the actual file transfer begins.
604 int cmd_retr(struct conn * const c)
606 struct ftran *f = c->transfer;
608 if ((f == NULL) || ((f->state != 1) && (f->state != 3))) {
609 numeric(c, 425, "No data connection set up; please use PASV or PORT.");
614 if ((c->rest_pos > 0) && (c->ascii_mode == 1)) {
615 numeric(c, 500, "Cannot resume while in ASCII mode.");
620 f->local_file = do_openfile(c, c->recv_buf, f->filename, O_RDONLY
627 if (f->local_file == -1) {
628 numeric(f->owner, 550, strerror(errno));
630 } else if (f->local_file == -2) {
637 prepare_for_transfer(f);
644 * cmd_stor(): Handles the STOR command (upload file). Pushes the
645 * work down to do_store(), below.
647 int cmd_stor(struct conn * const c)
654 * cmd_appe(): Handles the APPE command (append to file). Pushes
655 * the work down to do_store(), below.
657 int cmd_appe(struct conn * const c)
664 * do_store(): Initiate an upload. Most of the comments to do_retr()
665 * (above) apply to this one as well.
667 void do_store(struct conn * const c, const int append)
669 struct ftran *f = c->transfer;
671 if ((f == NULL) || ((f->state != 1) && (f->state != 3))) {
672 numeric(c, 425, "No data connection set up; please use PASV or PORT.");
677 if ((c->rest_pos > 0) && (c->ascii_mode == 1)) {
678 numeric(c, 500, "Cannot resume while in ASCII mode.");
683 f->local_file = do_openfile(c, c->recv_buf, f->filename, O_WRONLY |
684 O_CREAT | ((append || c->rest_pos > 0) ? 0 : O_TRUNC)
691 if (f->local_file == -1) {
692 numeric(f->owner, 550, strerror(errno));
693 } else if (f->local_file == -2) {
699 f->ascii_mode = c->ascii_mode;
701 prepare_for_transfer(f);
704 #endif /* WANT_UPLOAD */
707 * cmd_size(): Handle the SIZE command -- returns the size of a
708 * file. Note that this command is not part of RFC959,
709 * and thus there is no clear specification (except
710 * for some ftpext documents, which we try to follow
711 * as closely as we can). BetaFTPD deviates from wu-ftpd
712 * in that it lets you check the `size' of directories
713 * as well (instead of giving 550). This is _not_ the
714 * size of all the files in the directory, rather how
715 * much space the directory inode uses.
717 int cmd_size(struct conn * const c)
721 numeric(c, 550, "SIZE not available in ASCII mode.");
726 const char * const fname = translate_path(c, c->recv_buf);
729 TRAP_ERROR(fname == NULL || lstat(fname, &buf) == -1, 550, return 1);
731 numeric(c, 213, "%lu", (unsigned long)(buf.st_size));
737 * cmd_mdtm(): Handle the MDTM command -- returns the modification
738 * date/time of a file. See the comments on cmd_size(),
741 int cmd_mdtm(struct conn * const c)
743 const char * const fname = translate_path(c, c->recv_buf);
747 TRAP_ERROR(fname == NULL || lstat(fname, &buf) == -1, 550, return 1);
749 m = gmtime(&(buf.st_mtime)); /* at least wu-ftpd does it in GMT */
750 numeric(c, 213, "%u%02u%02u%02u%02u%02u", m->tm_year + 1900,
751 m->tm_mon + 1, m->tm_mday, m->tm_hour, m->tm_min, m->tm_sec);
756 * cmd_abor(): Handle the ABOR command (abort a file transfer). This should
757 * be clean enough, but isn't tested extensively.
759 int cmd_abor(struct conn * const c)
761 if (c->transfer != NULL) {
762 numeric(c, 426, "File transfer aborted.");
763 destroy_ftran(c->transfer);
765 numeric(c, 226, "ABOR command processed OK.");
770 * cmd_dele(): Handle the DELE command (delete a file).
772 int cmd_dele(struct conn * const c)
774 const char * const fname = translate_path(c, c->recv_buf);
776 TRAP_ERROR(fname == NULL || unlink(fname) == -1, 550, return 1);
777 numeric(c, 250, "File deleted OK.");
782 * cmd_rnfr(): Handle the RNFR command (take a filename to rename from).
784 int cmd_rnfr(struct conn * const c)
786 const char * const fname = translate_path(c, c->recv_buf);
790 c->rename_from[0] = '\0';
791 if (fname == NULL) return 1;
794 snprintf(c->rename_from, 256, "%s/%s", cwd, fname);
796 /* Just check that the file exists. */
797 TRAP_ERROR(lstat(c->rename_from, &buf) == -1, 550, c->rename_from[0] = '\0'; return 1);
799 numeric(c, 350, "File exists, send RNTO.");
804 * cmd_rnto(): Handle the RNTO command (do the actual renaming).
806 int cmd_rnto(struct conn * const c)
808 const char * const fname = translate_path(c, c->recv_buf);
810 if (fname == NULL) return 1;
811 if (c->rename_from[0] == '\0') {
812 numeric(c, 503, "Please send RNFR first.");
816 TRAP_ERROR(rename(c->rename_from, fname) == -1, 550, c->rename_from[0] = '\0'; return 1);
817 c->rename_from[0] = '\0';
819 numeric(c, 250, "File renamed successfully.");
824 * cmd_mkd(): Handle the MKD/XMKD command (create a new directory).
825 * RFC959 is not clear on the error codes for this command --
826 * one place, 521 is cited as the correct error, but is
827 * mentioned nowhere else. Different FTP servers differ here
828 * as well. Thus, I've followed what appears to be the intention
829 * (having `analogous' errors with STOR), and use 550 instead.
831 * Making directories is probably the topic covered most
832 * extensively by RFC959 (and in the most confusing way as
833 * well). I try to follow the conventions, but it isn't always
834 * easy :-) (This code isn't quite easy to understand, because
835 * temp2 is used twice, in two different roles.)
837 int cmd_mkd(struct conn * const c)
839 const char * const fname = translate_path(c, c->recv_buf);
840 char temp[512], temp2[1024], *cdir;
843 TRAP_ERROR(fname == NULL || mkdir(fname, 0755) == -1, 550, return 1);
847 cdir = do_pwd(c, temp, temp2);
849 /* double the quotes in the output */
850 for (i = 0, j = 0; i <= strlen(cdir); i++, j++) {
852 if (cdir[i] == '"') {
856 numeric(c, 257, "\"%s\" created.", temp2);
861 * cmd_rmd(): Handle the RMD/XRMD command. Works just like DELE, only for
864 int cmd_rmd(struct conn * const c)
866 const char * const fname = translate_path(c, c->recv_buf);
868 TRAP_ERROR(fname == NULL || rmdir(fname) == -1, 550, return 1);
869 numeric(c, 250, "Directory deleted.");
874 * cmd_allo(): Handle the ALLO command. The command does not do anything, except
875 * sit around and play compliant. Some Windows FTP servers (Serv-U,
876 * for instance), verifies that there is enough space on the disk,
877 * but since we have no idea on what the filesystem will be stored on,
878 * we just ignore the command.
880 * We could theoretically use this information to give more information
881 * to the full-screen mode, but close to no FTP clients send this
882 * command, and it would touch too much code.
884 int cmd_allo(struct conn * const c)
886 numeric(c, 202, "No storage allocation necessary.");
891 * cmd_stat(): Handle the STAT command. Please see README for more details.
892 * Note that this command is run with euid=root, since it has
893 * to be able to run before USER.
895 * Note that we need to bypass numeric(), to get a multi-line
899 char conn_state[5][27] = {
901 "Waiting for e-mail address",
902 "Waiting for password",
904 "Waiting for password", /* actually non-existant user */
907 char ftran_state[6][42] = {
909 "Decided PASV address/port",
910 "Waiting on PASV socket",
911 "Got PORT address/port",
912 "Connecting on PORT address/port",
913 "Transferring file (or connecting on PORT)"
917 int cmd_stat(struct conn * const c)
922 struct ftran *f = c->transfer;
924 snprintf(buf, 1024, "211- FTP server status:\r\n"
925 " BetaFTPD version " VERSION " (http://members.xoom.com/sneeze/betaftpd.html)\r\n"
926 " Connected to %s\r\n"
927 " Control connection state: %s\r\n"
929 " TYPE: %s; STRUcture: File; transfer MODE: Stream\r\n"
931 " TYPE: Image; STRUcture: File; transfer MODE: Stream\r\n"
933 " Data connection state: %s\r\n"
934 "211 End of status\r\n",
935 inet_ntoa(((struct sockaddr_in *)(&(c->addr)))->sin_addr),
938 (c->ascii_mode == 1) ? "ASCII, FORM: Nonprint" : "Image",
940 (f) ? ftran_state[f->state] : ftran_state[0]);
944 err = send(c->sock, buf, i, 0);
945 if (err == -1 && errno == EPIPE) {
950 numeric(c, 502, "STAT command disabled for security reasons.");
957 * _mwrite(): This define is for mmap-listing. It works as a write()
958 * (not in parameter, but in function), and is used in
959 * cmd_list() and cmd_nlst() only.
961 * Note that this function returns the new position in the
962 * `file'. The caller is expected to send this information
963 * back in `pos' at the next call to _mwrite().
965 int _mwrite(const char * const buf, const struct ftran * const f,
966 const int pos, const int count, const int size)
968 if (pos + count >= size) return size; /* out of space */
969 memcpy(f->file_data + pos, buf, count);
975 * mwrite: This is a short_hand define, making calls to _mwrite() very
976 * similiar to calls to write(). It works both with and without
980 #define mwrite(buf, count) pos = _mwrite((buf), (f), (pos), (count), (size));
982 #define mwrite(buf, count) write(f->local_file, buf, count);
987 * Formats output in `ls -l' style. It returns one line for the
988 * file PATHNAME, and returns it in retbuf. Setting do_classify
989 * to nonzero has the same effect as `ls -F'.
991 * This command is so long, because simply there is so much to
992 * be done. GNU ls has some extra functions, but it's close to
995 int long_listing(char * const retbuf, const char * const pathname, const int do_classify)
998 char newd[512], temp[1026];
1002 char username[17], groupname[17];
1005 year = localtime(&now)->tm_year;
1012 if (lstat(pathname, &buf) == -1) return 0;
1015 strcpy(username, nr_get_uname(buf.st_uid));
1016 strcpy(groupname, nr_get_gname(buf.st_gid));
1018 p = getpwuid(buf.st_uid);
1020 strncpy(username, p->pw_name, 16);
1023 snprintf(username, 16, "%u", buf.st_uid);
1026 g = getgrgid(buf.st_gid);
1028 strncpy(groupname, g->gr_name, 16);
1031 snprintf(groupname, 16, "%u", buf.st_gid);
1037 * This POSIX approximation is based on GNU ls code (and obfuscated
1038 * a bit...), to be compatible with `real' ls implementations.
1040 t = localtime(&(buf.st_mtime));
1041 strftime(newd, 512, ((now > buf.st_mtime + 6L * 30L * 24L * 60L * 60L) ||
1042 (now < buf.st_mtime - 60L * 60L))
1043 ? "%b %e %Y" : "%b %e %H:%M", t);
1049 if (nr_check_permission(0, pathname, 0, (S_ISDIR(buf.st_mode)), rights) == -1) {
1050 /* no permission to even see this file */
1054 snprintf(temp, 1024, "%c%s %3u %-8s %-8s %8lu %12s %s\r\n",
1056 snprintf(temp, 1024, "%c%c%c%c%c%c%c%c%c%c %3u %-8s %-8s %8lu %12s %s",
1058 decode_mode(buf.st_mode),
1062 (buf.st_mode & S_IRUSR) ? 'r' : '-',
1063 (buf.st_mode & S_IWUSR) ? 'w' : '-',
1064 (buf.st_mode & S_IXUSR) ? ((buf.st_mode & S_ISUID) ? 's' : 'x') : '-',
1065 (buf.st_mode & S_IRGRP) ? 'r' : '-',
1066 (buf.st_mode & S_IWGRP) ? 'w' : '-',
1067 (buf.st_mode & S_IXGRP) ? ((buf.st_mode & S_ISGID) ? 's' : 'x') : '-',
1068 (buf.st_mode & S_IROTH) ? 'r' : '-',
1069 (buf.st_mode & S_IWOTH) ? 'w' : '-',
1070 (buf.st_mode & S_IXOTH) ? ((buf.st_mode & S_ISVTX) ? 't' : 'x') : '-',
1072 buf.st_nlink, username, groupname,
1073 (unsigned long)(buf.st_size), newd, pathname);
1078 * vim needs this extra character for some reason... It's too
1079 * bad I'll have to do it this way, but syntax colouring
1080 * that works properly is almost a `must' for me :-)
1085 /* add an extra classification `sign' if we got -F */
1087 int len = strlen(temp);
1088 temp[len] = classify(buf.st_mode);
1089 temp[len + 1] = '\0';
1093 strcpy(retbuf, temp);
1098 * cmd_list(): Handles the LIST command (directory listing). Does a
1099 * long listing (of type `ls -l'). The listing work is
1100 * done by do_listing(), below.
1102 int cmd_list(struct conn * const c)
1104 struct list_options lo;
1107 lo.long_listing = 1;
1115 * cmd_nlst(): Handles the NLST command (plain directory listing).
1116 * Does a plain listing (no dates etc.), unless overridden
1117 * by the `-l' or `-L' flag (case insensitivity because most
1118 * FTP clients don't have a clue about what they send out).
1119 * The listing work is done by do_listing(), below.
1121 int cmd_nlst(struct conn * const c)
1123 struct list_options lo;
1126 lo.long_listing = 0;
1135 * Prepares any listing buffers, temp files, etc., before
1136 * pushing the work one step further :-)
1138 * If the directory listing cache is enabled, the cache
1139 * is checked first, to see if we still have a valid entry.
1141 void do_listing(struct conn * const c, struct list_options * const lo)
1148 struct ftran * const f = c->transfer;
1155 #warning No nonroot checking for list_core() yet
1158 i = prepare_for_listing(c, &ptr, lo);
1160 destroy_ftran(c->transfer);
1169 strcpy(f->filename, "(directory listing)");
1174 struct dcache *d = find_dcache(cwd, ptr, lo);
1178 f->file_data = d->dir_data;
1179 f->size = d->dir_size;
1183 prepare_for_transfer(f);
1191 int num_files = get_num_files(c, ptr, lo);
1192 if (num_files == -1) return;
1194 size = num_files * 160;
1195 f->file_data = malloc(size + 1);
1196 TRAP_ERROR(f->file_data == NULL, 550, return);
1197 list_core(c, ptr, "", lo, size, 0);
1200 list_core(c, ptr, "", lo);
1204 populate_dcache(f, cwd, ptr, lo);
1210 prepare_for_transfer(f);
1215 * Get the number of files in PATHNAME (optionally matching
1216 * a pattern). Note that c is needed for TRAP_ERROR.
1218 int get_num_files(struct conn * const c, const char * const pathname,
1219 struct list_options * const lo)
1225 * glob() fails to set errno correctly, so we simply guess on
1226 * `permission denied'... The others are far less likely to happen.
1228 switch (glob(pathname, 0, NULL, &pglob)) {
1234 num_files = pglob.gl_pathc;
1237 numeric(c, 550, strerror(EACCES));
1241 if (lo->recursive) {
1243 for (i = 0; i < pglob.gl_pathc; i++) {
1244 char *temp = pglob.gl_pathv[i];
1248 if (S_ISDIR(buf.st_mode)) {
1250 num_files += get_num_files(c, "*", lo);
1262 * list_core(): Enumerate all the files in PATHNAME, and formats them
1263 * according to list_options (calling format functions if
1266 * Note that we don't do any realloc() yet, so if your
1267 * _average_ file name length is over a certain size (a little
1268 * under 80 for long listings, and a little under 160 for
1269 * short listings), the list will be truncated. Fix...
1271 * The return value only makes sense if mmap()'ing, since it
1272 * returns the number of bytes written into the buffer.
1274 * This function is rather long.
1276 int list_core(struct conn * const c, const char * const pathname,
1277 char * const disp_pathname, struct list_options * const lo
1279 , const int size, int pos
1285 struct ftran * const f = c->transfer;
1288 * glob() fails to set errno correctly, so we simply guess on
1289 * `permission denied'... The others are far less likely to happen.
1291 switch (glob(pathname, GLOB_MARK, NULL, &pglob)) {
1296 break; /* note: break, not return */
1298 numeric(c, 550, strerror(EACCES));
1306 if (lo->recursive) {
1307 if (disp_pathname[0] == '\0') {
1308 mwrite(".:\r\n", 4);
1313 snprintf(temp, 1024, "%s:\r\n", disp_pathname);
1318 if (lo->long_listing) {
1319 /* FIX: we may get too high total number if we are running nonroot! */
1321 long unsigned int total = 0;
1324 for (i = 0; i < pglob.gl_pathc; i++) {
1325 if (lstat(pglob.gl_pathv[i], &buf) != -1) {
1326 total += buf.st_blocks;
1329 snprintf(temp, 1024, "total %lu\r\n", total >> 1);
1334 for (i = 0; i < pglob.gl_pathc; i++) {
1335 char * const temp = pglob.gl_pathv[i];
1338 /* strip `/' away from the pathname -- add it later if -F */
1340 int len = strlen(temp);
1341 if (temp[len - 1] == '/') {
1342 temp[len - 1] = '\0';
1346 if (lo->long_listing) {
1347 if (long_listing(buf, temp, lo->classify) == 0) continue;
1351 struct stat statbuf;
1353 if (lstat(buf, &statbuf) != -1) {
1354 const int len = strlen(buf);
1356 buf[len] = classify(statbuf.st_mode);
1362 mwrite(buf, strlen(buf));
1367 * If recursion is on, dive into any subdirectories now -- note
1368 * that each entry is stat()'ed twice, hopefully the OS will manage,
1369 * and we've got our own dcache anyways -- this could be fixed at
1370 * the expense of some memory, consider for later inclusion.
1372 if (lo->recursive) {
1373 for (i = 0; i < pglob.gl_pathc; i++) {
1375 const char * const temp = pglob.gl_pathv[i];
1377 /* don't dive into `.' or `..' */
1378 if (lstat(temp, &buf) != -1 && S_ISDIR(buf.st_mode) &&
1379 (temp[0] != '.' || (temp[1] != '.' && temp[1] != '\0'))) {
1384 /* attach the pathname to the end of the displayed path */
1385 if (disp_pathname[0] == '\0') {
1386 snprintf(tmp2, 1024, "%s", temp);
1388 snprintf(tmp2, 1024, "%s/%s", disp_pathname, temp);
1392 pos = list_core(c, "*", tmp2, lo,
1404 lseek(f->local_file, 0, SEEK_SET);
1416 * cmd_noop(): Handles the NOOP command. Does nothing, doesn't even
1417 * reset the timeout.
1419 int cmd_noop(struct conn * const c)
1421 numeric(c, 200, "NOOP command successful.");
1426 * cmd_syst(): Handles the SYST command. Returns the system identification.
1428 int cmd_syst(struct conn * const c)
1430 numeric(c, 215, "UNIX Type: L%u", NBBY);
1435 * cmd_type(): Handles the TYPE command.
1437 int cmd_type(struct conn * const c)
1440 c->recv_buf[0] &= (255-32); /* convert to upper case */
1441 if (c->recv_buf[0] == 'A') {
1443 numeric(c, 200, "Type is ASCII.");
1444 } else if (c->recv_buf[0] == 'I') {
1446 numeric(c, 200, "Type is IMAGE.");
1448 numeric(c, 504, "Unknown type.");
1451 numeric(c, 200, "TYPE ignored (always I)");
1457 * cmd_mode(): Handles the MODE command. Only stream mode is supported.
1459 int cmd_mode(struct conn * const c)
1461 c->recv_buf[0] &= (255-32); /* convert to upper case */
1462 if (c->recv_buf[0] == 'S') {
1463 numeric(c, 200, "Mode is STREAM.");
1465 numeric(c, 504, "Unknown mode.");
1471 * cmd_stru(): Handles the STRU command. Only file mode is supported.
1473 int cmd_stru(struct conn * const c)
1475 c->recv_buf[0] &= (255-32); /* convert to upper case */
1476 if (c->recv_buf[0] == 'F') {
1477 numeric(c, 200, "Structure is FILE.");
1479 numeric(c, 504, "Unknown structure.");
1485 * cmd_help(): Handle the HELP command. I'm sorry, but I'm unwilling
1486 * to use a lot of space to explain the RFCs in such a message,
1487 * and BetaFTPD doesn't have any special things that should
1488 * be noted anywhere. Thus, this message is close to empty. I
1489 * feel that a 5xx entry would have been better, but that is
1492 * As with ACCT, this command is supposed to be executed from
1493 * everywhere, so we have to run without setuid. I don't like
1494 * it, but at the same time I have to idea what could go
1497 * Perhaps I should make this message sound a little less
1498 * like an error, since the error code is intended for helpful
1501 int cmd_help(struct conn * const c)
1503 numeric(c, 414, "Sorry, no detailed help; use standard FTP commands.");
1508 * cmd_quit(): Handles the QUIT command, which shuts down the control
1511 int cmd_quit(struct conn * const c)
1513 numeric(c, 221, "Have a nice day!");
1519 * cmd_rein(): Handle the REIN command, which does close to a full reset
1520 * of the connection. Much of the code here is intentionally
1521 * copied directly from alloc_new_conn() -- perhaps we should
1524 int cmd_rein(struct conn * const c)
1526 destroy_ftran(c->transfer);
1527 c->buf_len = c->auth = c->rest_pos = 0;
1529 /* equals: strcpy(c->curr_dir, "/") ; strcpy(c->last_cmd, ""); */
1530 c->curr_dir[0] = '/';
1532 c->curr_dir[1] = c->last_cmd[0] = '\0';
1534 c->curr_dir[1] = '\0';
1537 time(&(c->last_transfer));
1538 numeric(c, 220, "BetaFTPD " VERSION " ready.");
1545 * cmd_exit(): Handles the EXIT command, my own `extension' to the
1546 * FTP protocol... IMPORTANT: Only to be used for profiling
1547 * purposes!! (It's needed to get some profiling data out
1548 * of the server after compiling it with -pg, since such data
1549 * is only written on a clear exit()). Any user (even those
1550 * not logged in) can issue an EXIT, and make the server shut
1551 * down without clearing any sockets etc. In other words:
1552 * Don't use it on a production site.
1554 void cmd_exit(struct conn * const c)
1556 while (first_conn->next_conn)
1557 destroy_conn(first_conn->next_conn);
1564 * Gets a command from c->recv_buf, determines which command
1565 * it is, sets proper effective user-ID and calls the command
1566 * handler. Finally, it cleans up.
1568 * To me, this command seems optimizable, but I'm not really
1571 void parse_command(struct conn *c)
1574 const struct handler *h = handler_table; /* first entry */
1576 if (c == NULL) return;
1578 /* strip any leading non-ASCII characters (including CR/LFs) */
1579 while (c->buf_len > 0 && (c->recv_buf[0] < 'a' || c->recv_buf[0] > 'z')
1580 && (c->recv_buf[0] < 'A' || c->recv_buf[0] > 'Z')) {
1581 remove_bytes(c, 1); /* not good */
1584 /* scan, searching for CR or LF */
1585 cmlen = strcspn(c->recv_buf, "\r\n");
1586 if (cmlen >= c->buf_len) return;
1589 strncpy(c->last_cmd, c->recv_buf, cmlen);
1590 c->last_cmd[cmlen] = 0;
1594 if ((cmlen >= (strlen(h->cmd_name) + h->add_cmlen)) &&
1595 (strncasecmp(c->recv_buf, h->cmd_name, strlen(h->cmd_name)) == 0)) {
1596 if (c->auth < h->min_auth) {
1597 numeric(c, 503, "Please login with USER and PASS.");
1598 while (c->recv_buf[0] != '\n') remove_bytes(c, 1);
1610 remove_bytes(c, strlen(h->cmd_name));
1611 cmlen -= strlen(h->cmd_name);
1612 while (c->recv_buf[0] == ' ') {
1617 schar = c->recv_buf[cmlen];
1618 c->recv_buf[cmlen] = 0;
1620 /* result of zero means the connection is freed */
1621 if (h->callback(c)) {
1622 c->recv_buf[cmlen] = schar;
1624 if (h->do_setuid) seteuid(getuid());
1626 remove_bytes(c, cmlen);
1631 } while ((++h)->callback != NULL);
1633 numeric(c, 500, "Sorry, no such command.");
1634 remove_bytes(c, cmlen);
1638 * prepare_for_transfer():
1639 * Prepares an ftran object for a file transfer, setting
1640 * file size, opening sockets etc.
1642 * nonroot notice: prepare_for_transfer() assumes all access
1643 * checks are already done.
1645 void prepare_for_transfer(struct ftran *f)
1648 #warning No nonroot checking for prepare_for_transfer() yet
1652 /* mmap doesn't make temp files for dir listings */
1653 if (!f->dir_listing) {
1656 f->size = lseek(f->local_file, 0, SEEK_END);
1659 if (f->upload == 0 || f->append == 0 || f->owner->rest_pos != 0)
1661 lseek(f->local_file, f->owner->rest_pos, SEEK_SET);
1666 if (f->state == 1) { /* PASV connection */
1667 f->state = 2; /* waiting */
1668 } else if (f->state == 3) { /* PORT connection */
1670 connect(f->sock, (struct sockaddr *)&f->sin, sizeof(f->sin));
1671 add_fd(f->sock, POLLOUT);
1673 time(&(f->tran_start));
1678 * Takes a mode_t argument (from a `struct stat'), and
1679 * returns the proper dirlist letter for that type.
1681 * Note: S_IFLNK seems to be broken, or perhaps I just have
1682 * missed something (S_IFLNK is always set for all *files* on
1683 * my glibc 2.0.111 system).
1685 * The most common cases are put first, for speed :-)
1687 char decode_mode(mode_t mode) {
1688 if (S_ISREG(mode)) return '-';
1689 if (S_ISDIR(mode)) return 'd';
1690 if (S_ISLNK(mode)) return 'l';
1691 if (S_ISBLK(mode)) return 'b';
1692 if (S_ISCHR(mode)) return 'c';
1693 if (S_ISSOCK(mode)) return 's';
1694 if (S_ISFIFO(mode)) return 'f';
1701 * Take an FTP path, do all neccessary root_dir checks,
1702 * change to the correct directory and return the proper
1703 * file name to open/stat/whatever. The path returned is
1704 * relative to the current directory (NOT absolute). chdir()
1705 * in any way will `destroy' this argument.
1707 * Note that `path' will be _changed_, and used as a return pointer
1708 * base. Do not attempt to free the result from this function --
1709 * if you need to, free path instead.
1711 char *translate_path(struct conn * const c, char * const path)
1715 /* chdir to the right dir, then chop it off */
1718 ptr = strrchr(path, '/');
1720 char save_char = ptr[0];
1723 if (do_chdir(c, path) == -1) {
1736 * Opens the file PATH with access parameters FLAGS, translating
1737 * paths and checking permissions as neccessary. Generally, this
1738 * should be used whenever you need an open().
1740 * The parameters might be a bit confusing. To clarify them a bit:
1741 * c: IN/OUT (will be changed)
1742 * path: IN (but _will_ be changed)
1747 int do_openfile(struct conn * const c, char * const path,
1748 char * const filename, const int flags
1750 , const int check_permission
1758 if (nr_check_permission(c->uid, path, check_permission, 0, NULL) == -1) {
1763 ptr = translate_path(c, c->recv_buf);
1764 if (ptr == NULL) return -1;
1767 if ((flags & O_CREAT) == 0) {
1769 TRAP_ERROR(stat(ptr, &buf) == -1, 550, return -2);
1770 if (!S_ISREG(buf.st_mode)) {
1771 numeric(c, 550, "Not a plain file.", ptr);
1778 if (filename != NULL) { /* filename should always be != NULL */
1779 strcpy(filename, ptr);
1781 return open(ptr, flags, 0666);
1785 * prepare_for_listing():
1786 * Parse list options, put them back into the list_options
1787 * structure lo, and make temporary room for the list.
1789 int prepare_for_listing(struct conn * const c, char ** const ptr,
1790 struct list_options * const lo)
1795 struct ftran *f = c->transfer;
1797 char *optr = NULL, *fptr = NULL;
1803 #warning No nonroot checking for prepare_for_listing() yet
1806 if ((f == NULL) || ((f->state != 1) && (f->state != 3))) {
1807 numeric(c, 425, "No data connection set up; please use PASV or PORT.");
1812 * A little parameter scanning is required here. There can only
1813 * be two parts: the directory name, and any options. We'll find
1814 * any options first.
1816 if (c->recv_buf[0] == '-') {
1819 optr = strstr(c->recv_buf, " -");
1822 /* Then see if there are any options to parse. */
1825 switch (*optr & (255-32)) { /* uppercase */
1826 case 'R': /* actually case sensitive... */
1830 lo->long_listing = 1;
1847 /* then we chdir to the dir in fptr (if any) */
1848 tmp = fptr ? strrchr(fptr, '/') : NULL;
1851 if (do_chdir(c, fptr) == -1) return -1;
1854 /* current directory */
1855 TRAP_ERROR(chdir(c->curr_dir) == -1, 550, return -1);
1858 /* if no argument, choose all files */
1859 if (fptr == NULL || fptr[0] == 0) fptr = "*";
1864 if (nr_check_permission(c->uid, chd, 4, 1, NULL) == -1) {
1865 numeric(c, 550, "Permission denied");
1871 tfname = tempnam(NULL, "ftp");
1874 if (tfname == NULL) tfname = tempnam("/", "ftp");
1877 TRAP_ERROR(tfname == NULL, 550, return -1);
1878 strcpy(f->filename, tfname);
1881 f->local_file = open(f->filename, O_RDWR | O_CREAT | O_TRUNC, 0666);
1882 TRAP_ERROR(f->local_file == -1, 550, return -1);
1893 * classify(): Takes a mode_t argument (from `struct stat'), and returns
1894 * the parameter to be used in an `ls -F'-style listing.
1896 char classify(const mode_t mode)
1898 if (S_ISREG(mode)) {
1899 if (mode & (S_IXUSR | S_IXGRP | S_IXOTH)) {
1905 if (S_ISDIR(mode)) return '/';
1906 if (S_ISLNK(mode)) return '@';
1907 if (S_ISSOCK(mode)) return '=';
1908 if (S_ISFIFO(mode)) return '|';