1 /* cmds.c: BetaFTPD command handlers
2 Copyright (C) 1999-2000 Steinar H. Gunderson
4 This program is is free software; you can redistribute it and/or modify
5 it under the terms of the GNU General Public License, version 2 if the
6 License as published by the Free Software Foundation.
8 This program is distributed in the hope that it will be useful,
9 but WITHOUT ANY WARRANTY; without even the implied warranty of
10 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
11 GNU General Public License for more details.
13 You should have received a copy of the GNU General Public License
14 along with this program; if not, write to the Free Software
15 Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA.
25 #include <sys/types.h>
89 #include <sys/ioctl.h>
93 #include <sys/socket.h>
101 #include <sys/param.h>
109 #include <sys/conf.h>
112 #if HAVE_NETINET_IN_H
113 #include <netinet/in.h>
121 #include <sys/filio.h>
125 #include <sys/poll.h>
146 extern struct conn *first_conn;
148 extern struct dcache *first_dcache;
152 extern struct pollfd fds[];
154 extern fd_set master_fds, master_send_fds;
159 char add_cmlen; /* =1 if the command takes an argument */
160 int (*callback)(struct conn * const);
163 char do_setuid; /* =1 if root is not *really* needed */
167 static const struct handler handler_table[] = {
168 { "user ", 1, cmd_user, 0 NO_SETUID },
169 { "pass ", 1, cmd_pass, 1 NO_SETUID },
170 { "retr ", 1, cmd_retr, 3 DO_SETUID },
171 { "acct ", 1, cmd_acct, 0 NO_SETUID },
172 { "port ", 1, cmd_port, 3 DO_SETUID },
173 { "pasv" , 0, cmd_pasv, 3 DO_SETUID },
174 { "pwd" , 0, cmd_pwd, 3 DO_SETUID },
175 { "cwd " , 1, cmd_cwd, 3 DO_SETUID },
176 { "cdup" , 0, cmd_cdup, 3 DO_SETUID },
177 { "rest ", 1, cmd_rest, 3 DO_SETUID },
178 { "list" , 0, cmd_list, 3 DO_SETUID },
179 { "nlst" , 0, cmd_nlst, 3 DO_SETUID },
180 { "type ", 1, cmd_type, 3 DO_SETUID },
181 { "mode ", 1, cmd_mode, 3 DO_SETUID },
182 { "stru ", 1, cmd_stru, 3 DO_SETUID },
183 { "size ", 1, cmd_size, 3 DO_SETUID },
184 { "mdtm ", 1, cmd_mdtm, 3 DO_SETUID },
185 { "abor" , 0, cmd_abor, 3 DO_SETUID },
186 { "dele ", 1, cmd_dele, 3 DO_SETUID },
187 { "rnfr ", 1, cmd_rnfr, 3 DO_SETUID },
188 { "rnto ", 1, cmd_rnto, 3 DO_SETUID },
189 { "mkd " , 1, cmd_mkd, 3 DO_SETUID },
190 { "rmd " , 1, cmd_rmd, 3 DO_SETUID },
191 { "allo ", 1, cmd_allo, 3 DO_SETUID },
192 { "stat" , 0, cmd_stat, 0 NO_SETUID },
193 { "noop" , 0, cmd_noop, 0 DO_SETUID },
194 { "syst" , 0, cmd_syst, 0 DO_SETUID },
195 { "help" , 0, cmd_help, 0 NO_SETUID },
196 { "quit" , 0, cmd_quit, 0 DO_SETUID },
197 { "rein" , 0, cmd_rein, 0 DO_SETUID },
199 /* deprecated forms */
200 { "xcup" , 0, cmd_cdup, 3 DO_SETUID },
201 { "xcwd ", 1, cmd_cwd, 3 DO_SETUID },
202 { "xpwd" , 0, cmd_pwd, 3 DO_SETUID },
203 { "xmkd ", 1, cmd_mkd, 3 DO_SETUID },
204 { "xrmd ", 1, cmd_rmd, 3 DO_SETUID },
206 { "stor ", 1, cmd_stor, 3 DO_SETUID },
207 { "appe ", 1, cmd_appe, 3 DO_SETUID },
210 #warning Use DOING_PROFILING with caution, and NEVER on a production server! :-)
211 { "exit", 0, cmd_exit, 0 NO_SETUID },
213 { "" , 0, NULL, 0 NO_SETUID }
217 * do_chdir(): Does a chdir() to newd on c, staying inside the
218 * limits of root_dir. Use this instead of a chdir() whenever
219 * you can, and possibly even when you can't :-)
221 * This command quirks around some problems in the rest of
222 * the code (namely translate_path()), so a blank newdir is
223 * interpreted as the root directory.
225 int do_chdir(struct conn * const c, const char * const newd)
227 char chd[512], temp[512];
229 TRAP_ERROR(chdir(c->curr_dir) == -1, 550, return -1);
231 /* handle `absolute' paths */
232 if (newd[0] == '/' || newd[0] == '\0') {
233 strcpy(temp, c->root_dir);
236 * is this the root directory? if not, remove the trailing `/'
237 * and concatenate the new directory on
239 if (newd[1] != '\0' && newd[0] != '\0') {
240 temp[strlen(temp) - 1] = 0;
248 if (nr_check_permission(c->uid, temp, 1, 1, NULL) == -1) {
249 numeric(c, 550, "Permission denied");
254 TRAP_ERROR(chdir(temp) == -1, 550, return -1);
257 if (chd[strlen(chd) - 1] != '/') {
261 if (strncmp(chd, c->root_dir, strlen(c->root_dir)) != 0) {
262 numeric(c, 550, "No such file or directory.");
270 * cmd_user(): Handles the USER command, and does most of the initial
271 * authentication work. User names are limited to 16
272 * characters, by force...
274 int cmd_user(struct conn * const c)
276 strncpy(c->username, c->recv_buf, 16);
279 if (strcasecmp(c->username, "anonymous") == 0) {
280 strcpy(c->username, "ftp");
282 if (strcasecmp(c->username, "ftp") == 0) {
283 numeric(c, 331, "Login OK, send password (your e-mail).");
286 numeric(c, 331, "Password required for %s.", c->username);
293 * cmd_pass(): Handles the PASS command, and checks the password.
294 * This function is rather long and complicated, mostly
295 * because there are so many ways of doing users
296 * (including my nonroot system) out there... And we
297 * don't even support PAM or real shadow passwords (with
300 int cmd_pass(struct conn * const c)
303 c->auth = nr_userinfo(c->username, &c->uid, c->curr_dir, c->root_dir,
305 #else /* !WANT_NONROOT */
306 #if WANT_SHADOW && HAVE_SHADOW_H
311 p = getpwnam(c->username);
312 #if WANT_SHADOW && HAVE_SHADOW_H
313 s = getspnam(c->username);
320 strncpy(c->curr_dir, p->pw_dir, 254);
321 c->curr_dir[254] = 0;
325 if (c->curr_dir[strlen(c->curr_dir) - 1] != '/') {
326 strcat(c->curr_dir, "/");
328 strcpy(c->root_dir, c->curr_dir);
330 } else if (c->auth != 0) {
331 strcpy(c->root_dir, "/");
332 if (strcmp(crypt(c->recv_buf, p->pw_passwd), p->pw_passwd) != 0
333 #if WANT_SHADOW && HAVE_SHADOW_H
334 && (s == NULL || strcmp(crypt(c->recv_buf, s->sp_pwdp), s->sp_pwdp) != 0)
342 #endif /* !WANT_NONROOT */
345 numeric(c, 530, "Login incorrect.");
349 dump_file(c, 230, "welcome.msg");
351 numeric(c, 230, "User logged in.");
357 * cmd_acct(): Handle (ignore) the ACCT command. I don't see how we
358 * could make use of this command... wu-ftpd doesn't, either.
359 * However, wu-ftpd (at least the version I have here) uses
360 * 502, which isn't a legal error code according to RFC959.
361 * 202, on the other hand, is, and seems to be applicable.
363 * I'm unsure if this one should require setuid or not, but
364 * I feel that the RFC959 intention is having it _before_
365 * USER/PASS. Therefore, this one runs with root privilegies :-)
367 int cmd_acct(struct conn * const c)
369 numeric(c, 202, "ACCT ignored OK -- not applicable on this system.");
374 * cmd_port(): Handles the PORT command, and sets up the data socket.
375 * Making a brief uid=0 (root) appearance (to bind the socket) --
376 * I feel it's safer that way (instead of running as root
377 * the whole way), in case there are some weird overflows
380 int cmd_port(struct conn * const c)
382 short int a0, a1, a2, a3, p0, p1;
385 struct sockaddr_in sin;
387 if ((c->transfer != NULL) && (c->transfer->state >= 4)) {
388 numeric(c, 500, "Sorry, only one transfer at a time.");
392 sock = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP);
393 TRAP_ERROR(sock == -1, 500, return 1);
395 destroy_ftran(c->transfer);
396 c->transfer = f = alloc_new_ftran(sock, c);
398 i = sscanf(c->recv_buf, "%3hu,%3hu,%3hu,%3hu,%3hu,%3hu", &a0, &a1, &a2, &a3, &p0, &p1);
400 numeric(c, 501, "Parse error.");
405 /* bind to own address, port 20 (FTP data) */
407 err = getsockname(c->sock, (struct sockaddr *)&sin, &tmp);
408 TRAP_ERROR(err == -1, 500, return 1);
409 sin.sin_port = FTP_PORT - 1;
411 numeric(c, 200, "PORT command OK.");
413 /* note that bind() might well fail, so we don't error check */
415 /* need root privilegies for a short while */
418 bind(sock, (struct sockaddr *)&sin, sizeof(sin));
423 f->sin.sin_family = AF_INET;
424 f->sin.sin_addr.s_addr = htonl(
425 ((unsigned char)(a0) << 24) +
426 ((unsigned char)(a1) << 16) +
427 ((unsigned char)(a2) << 8) +
428 ((unsigned char)(a3) ));
429 f->sin.sin_port = htons(
430 ((unsigned char)(p0) << 8) +
431 ((unsigned char)(p1) ));
436 ioctl(f->sock, FIONBIO, &one);
442 * cmd_pasv(): Handles the PASV command, and sets up the data socket.
443 * Uses port numbers > 1024, since it doesn't run as root.
445 int cmd_pasv(struct conn * const c)
449 unsigned int one = 1;
450 struct sockaddr_in addr;
452 if ((c->transfer != NULL) && (c->transfer->state >= 4)) {
453 numeric(c, 503, "Sorry, only one transfer at once.");
456 destroy_ftran(c->transfer);
458 sock = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP);
459 TRAP_ERROR(sock == -1, 500, return 1);
460 err = add_fd(sock, POLLIN);
461 TRAP_ERROR(err != 0, 501, return 1);
463 c->transfer = f = alloc_new_ftran(sock, c);
465 ioctl(sock, FIONBIO, &one);
469 err = getsockname(c->sock, (struct sockaddr *)&addr, &tmp);
470 TRAP_ERROR(err == -1, 500, return 1);
472 addr.sin_port = 0; /* let the system choose */
473 err = bind(sock, (struct sockaddr *)&addr, sizeof(struct sockaddr));
474 TRAP_ERROR(err == -1, 500, return 1);
477 err = getsockname(sock, (struct sockaddr *)&addr, &tmp);
478 TRAP_ERROR(err == -1, 500, return 1);
480 err = listen(f->sock, 1);
481 TRAP_ERROR(err == -1, 500, return 1);
484 numeric(c, 227, "Entering passive mode (%u,%u,%u,%u,%u,%u)",
485 (htonl(addr.sin_addr.s_addr) & 0xff000000) >> 24,
486 (htonl(addr.sin_addr.s_addr) & 0x00ff0000) >> 16,
487 (htonl(addr.sin_addr.s_addr) & 0x0000ff00) >> 8,
488 (htonl(addr.sin_addr.s_addr) & 0x000000ff),
489 (htons(addr.sin_port) & 0xff00) >> 8,
490 (htons(addr.sin_port) & 0x00ff));
495 * cmd_pwd(): Handles PWD command (print working directory).
497 * Note that if somebody contacts you with the message `the server
498 * says curr_dir() is outside root_dir()', you should fix your
499 * /betaftpd.users file, if you use nonroot. If not, it's a bug.
500 * Try to get it _reproducible_, and mail it to me.
502 int cmd_pwd(struct conn * const c)
504 char temp[512], *cdir = NULL;
506 cdir = do_pwd(c, temp, c->curr_dir);
508 numeric(c, 257, "\"%s\" is current working directory.", cdir);
514 * do_pwd(): Translates an absolute path to a path suitable for viewing
515 * to the user (ie. removes the root_dir, and removes a trailing
516 * slash if it exists). Note that the retbuf is only used as a
517 * storage place -- the pointer to the right place within retbuf
520 char *do_pwd(struct conn * const c, char * const retbuf, const char * const dir)
525 if (strncmp(retbuf, c->root_dir, strlen(c->root_dir)) != 0) {
526 numeric(c, 550, "curr_dir is outside root_dir, please contact site administrator.");
530 cdir = retbuf + strlen(c->root_dir) - 1;
531 if (cdir[strlen(cdir) - 1] == '/' && strlen(cdir) > 1) {
532 cdir[strlen(cdir) - 1] = 0;
533 } else if (strlen(cdir) == 0) {
541 * cmd_cwd(): Handles CWD command (change working directory). Uses
542 * cmd_cwd_internal() (see below).
544 int cmd_cwd(struct conn * const c)
546 cmd_cwd_internal(c, c->recv_buf);
551 * cmd_cdup(): Handles a CDUP command (identical to `CWD ..'). Note that
552 * RFC959 gives two different response codes (250 and 200) --
553 * 250 is the same as CWD gives, which sounds logical to me.
554 * wu-ftpd uses it as well.
556 * Note that using a CDUP to try to get outside root_dir returns
557 * an error, instead of just staying in the root directory (as
558 * the OS and thus wu-ftpd does).
560 int cmd_cdup(struct conn * const c)
562 cmd_cwd_internal(c, "..");
567 * cmd_cwd_internal():
568 * Does the work for CWD and CDUP (modularized to save some
569 * space and have clearer code). Mostly, it just uses do_chdir(),
570 * and sees where that takes us. It adds a trailing slash if needed.
572 void cmd_cwd_internal(struct conn * const c, const char * const newd)
574 if (do_chdir(c, newd) != -1) {
577 getcwd(c->curr_dir, 254);
578 i = strlen(c->curr_dir);
579 if (c->curr_dir[i - 1] != '/') {
580 c->curr_dir[i++] = '/';
581 c->curr_dir[i] = '\0';
585 dump_file(c, 250, ".message");
589 numeric(c, 250, "CWD successful.");
594 * cmd_rest(): Handles the REST command. All it does is tell the file
595 * sending functions to start at the correct number. We should
596 * perhaps add some better error checking to this?
598 int cmd_rest(struct conn * const c)
600 c->rest_pos = abs(atoi(c->recv_buf));
601 numeric(c, 350, "Setting resume at %u bytes.", c->rest_pos);
606 * cmd_retr(): Handles the RETR command. This command doesn't send the
607 * file, but it opens it and tells the socket handling code
608 * to check for activity on the data socket. When the
609 * connection occurs (or succeeds, if we're using PORT mode),
610 * the actual file transfer begins.
612 int cmd_retr(struct conn * const c)
614 struct ftran *f = c->transfer;
616 if ((f == NULL) || ((f->state != 1) && (f->state != 3))) {
617 numeric(c, 425, "No data connection set up; please use PASV or PORT.");
622 if ((c->rest_pos > 0) && (c->ascii_mode == 1)) {
623 numeric(c, 500, "Cannot resume while in ASCII mode.");
628 f->local_file = do_openfile(c, c->recv_buf, f->filename, O_RDONLY
635 if (f->local_file == -1) {
636 numeric(f->owner, 550, strerror(errno));
638 } else if (f->local_file == -2) {
645 prepare_for_transfer(f);
652 * cmd_stor(): Handles the STOR command (upload file). Pushes the
653 * work down to do_store(), below.
655 int cmd_stor(struct conn * const c)
662 * cmd_appe(): Handles the APPE command (append to file). Pushes
663 * the work down to do_store(), below.
665 int cmd_appe(struct conn * const c)
672 * do_store(): Initiate an upload. Most of the comments to do_retr()
673 * (above) apply to this one as well.
675 void do_store(struct conn * const c, const int append)
677 struct ftran *f = c->transfer;
679 if ((f == NULL) || ((f->state != 1) && (f->state != 3))) {
680 numeric(c, 425, "No data connection set up; please use PASV or PORT.");
685 if ((c->rest_pos > 0) && (c->ascii_mode == 1)) {
686 numeric(c, 500, "Cannot resume while in ASCII mode.");
691 f->local_file = do_openfile(c, c->recv_buf, f->filename, O_WRONLY |
692 O_CREAT | ((append || c->rest_pos > 0) ? 0 : O_TRUNC)
699 if (f->local_file == -1) {
700 numeric(f->owner, 550, strerror(errno));
701 } else if (f->local_file == -2) {
707 f->ascii_mode = c->ascii_mode;
709 prepare_for_transfer(f);
712 #endif /* WANT_UPLOAD */
715 * cmd_size(): Handle the SIZE command -- returns the size of a
716 * file. Note that this command is not part of RFC959,
717 * and thus there is no clear specification (except
718 * for some ftpext documents, which we try to follow
719 * as closely as we can). BetaFTPD deviates from wu-ftpd
720 * in that it lets you check the `size' of directories
721 * as well (instead of giving 550). This is _not_ the
722 * size of all the files in the directory, rather how
723 * much space the directory inode uses.
725 int cmd_size(struct conn * const c)
729 numeric(c, 550, "SIZE not available in ASCII mode.");
734 const char * const fname = translate_path(c, c->recv_buf);
737 TRAP_ERROR(fname == NULL || lstat(fname, &buf) == -1, 550, return 1);
739 numeric(c, 213, "%lu", (unsigned long)(buf.st_size));
745 * cmd_mdtm(): Handle the MDTM command -- returns the modification
746 * date/time of a file. See the comments on cmd_size(),
749 int cmd_mdtm(struct conn * const c)
751 const char * const fname = translate_path(c, c->recv_buf);
755 TRAP_ERROR(fname == NULL || lstat(fname, &buf) == -1, 550, return 1);
757 m = gmtime(&(buf.st_mtime)); /* at least wu-ftpd does it in GMT */
758 numeric(c, 213, "%u%02u%02u%02u%02u%02u", m->tm_year + 1900,
759 m->tm_mon + 1, m->tm_mday, m->tm_hour, m->tm_min, m->tm_sec);
764 * cmd_abor(): Handle the ABOR command (abort a file transfer). This should
765 * be clean enough, but isn't tested extensively.
767 int cmd_abor(struct conn * const c)
769 if (c->transfer != NULL) {
770 numeric(c, 426, "File transfer aborted.");
771 destroy_ftran(c->transfer);
773 numeric(c, 226, "ABOR command processed OK.");
778 * cmd_dele(): Handle the DELE command (delete a file).
780 int cmd_dele(struct conn * const c)
782 const char * const fname = translate_path(c, c->recv_buf);
784 TRAP_ERROR(fname == NULL || unlink(fname) == -1, 550, return 1);
785 numeric(c, 250, "File deleted OK.");
790 * cmd_rnfr(): Handle the RNFR command (take a filename to rename from).
792 int cmd_rnfr(struct conn * const c)
794 const char * const fname = translate_path(c, c->recv_buf);
798 c->rename_from[0] = '\0';
799 if (fname == NULL) return 1;
802 snprintf(c->rename_from, 256, "%s/%s", cwd, fname);
804 /* Just check that the file exists. */
805 TRAP_ERROR(lstat(c->rename_from, &buf) == -1, 550, return 1);
807 numeric(c, 350, "File exists, send RNTO.");
812 * cmd_rnto(): Handle the RNTO command (do the actual renaming).
814 int cmd_rnto(struct conn * const c)
816 const char * const fname = translate_path(c, c->recv_buf);
818 if (fname == NULL) return 1;
819 if (c->rename_from[0] == '\0') {
820 numeric(c, 503, "Please send RNFR first.");
824 TRAP_ERROR(rename(c->rename_from, fname) == -1, 550, return 1);
826 numeric(c, 250, "File renamed successfulyy.");
831 * cmd_mkd(): Handle the MKD/XMKD command (create a new directory).
832 * RFC959 is not clear on the error codes for this command --
833 * one place, 521 is cited as the correct error, but is
834 * mentioned nowhere else. Different FTP servers differ here
835 * as well. Thus, I've followed what appears to be the intention
836 * (having `analogous' errors with STOR), and use 550 instead.
838 * Making directories is probably the topic covered most
839 * extensively by RFC959 (and in the most confusing way as
840 * well). I try to follow the conventions, but it isn't always
841 * easy :-) (This code isn't quite easy to understand, because
842 * temp2 is used twice, in two different roles.)
844 int cmd_mkd(struct conn * const c)
846 const char * const fname = translate_path(c, c->recv_buf);
847 char temp[512], temp2[1024], *cdir;
850 TRAP_ERROR(fname == NULL || mkdir(fname, 0755) == -1, 550, return 1);
854 cdir = do_pwd(c, temp, temp2);
856 /* double the quotes in the output */
857 for (i = 0, j = 0; i <= strlen(cdir); i++, j++) {
859 if (cdir[i] == '"') {
863 numeric(c, 257, "\"%s\" created.", temp2);
868 * cmd_rmd(): Handle the RMD/XRMD command. Works just like DELE, only for
871 int cmd_rmd(struct conn * const c)
873 const char * const fname = translate_path(c, c->recv_buf);
875 TRAP_ERROR(fname == NULL || rmdir(fname) == -1, 550, return 1);
876 numeric(c, 250, "Directory deleted.");
881 * cmd_allo(): Handle the ALLO command. The command does not do anything, except
882 * sit around and play compliant. Some Windows FTP servers (Serv-U,
883 * for instance), verifies that there is enough space on the disk,
884 * but since we have no idea on what the filesystem will be stored on,
885 * we just ignore the command.
887 * We could theoretically use this information to give more information
888 * to the full-screen mode, but close to no FTP clients send this
889 * command, and it would touch too much code.
891 int cmd_allo(struct conn * const c)
893 numeric(c, 202, "No storage allocation necessary.");
898 * cmd_stat(): Handle the STAT command. Please see README for more details.
899 * Note that this command is run with euid=root, since it has
900 * to be able to run before USER.
902 * Note that we need to bypass numeric(), to get a multi-line
906 char conn_state[5][27] = {
908 "Waiting for e-mail address",
909 "Waiting for password",
911 "Waiting for password", /* actually non-existant user */
914 char ftran_state[6][42] = {
916 "Decided PASV address/port",
917 "Waiting on PASV socket",
918 "Got PORT address/port",
919 "Connecting on PORT address/port",
920 "Transferring file (or connecting on PORT)"
924 int cmd_stat(struct conn * const c)
929 struct ftran *f = c->transfer;
931 snprintf(buf, 1024, "211- FTP server status:\r\n"
932 " BetaFTPD version " VERSION " (http://members.xoom.com/sneeze/betaftpd.html)\r\n"
933 " Connected to %s\r\n"
934 " Control connection state: %s\r\n"
935 " TYPE: Image; STRUcture: File; transfer MODE: Stream\r\n"
936 " Data connection state: %s\r\n"
937 "211 End of status\r\n",
938 inet_ntoa(((struct sockaddr_in *)(&(c->addr)))->sin_addr),
939 conn_state[c->auth], (f) ? ftran_state[f->state] : ftran_state[0]);
943 err = send(c->sock, buf, i, 0);
944 if (err == -1 && errno == EPIPE) {
949 numeric(c, 502, "STAT command disabled for security reasons.");
956 * _mwrite(): This define is for mmap-listing. It works as a write()
957 * (not in parameter, but in function), and is used in
958 * cmd_list() and cmd_nlst() only.
960 * Note that this function returns the new position in the
961 * `file'. The caller is expected to send this information
962 * back in `pos' at the next call to _mwrite().
964 int _mwrite(const char * const buf, const struct ftran * const f,
965 const int pos, const int count, const int size)
967 if (pos + count >= size) return size; /* out of space */
968 memcpy(f->file_data + pos, buf, count);
974 * mwrite: This is a short_hand define, making calls to _mwrite() very
975 * similiar to calls to write().
977 #define mwrite(buf, count) pos = _mwrite((buf), (f), (pos), (count), (size));
981 * Formats output in `ls -l' style. It returns one line for the
982 * file PATHNAME, and returns it in retbuf. Setting do_classify
983 * to nonzero has the same effect as `ls -F'.
985 * This command is so long, because simply there is so much to
986 * be done. GNU ls has some extra functions, but it's close to
989 int long_listing(char * const retbuf, const char * const pathname, const int do_classify)
992 char newd[512], temp[1026];
996 char username[17], groupname[17];
999 year = localtime(&now)->tm_year;
1006 if (lstat(pathname, &buf) == -1) return 0;
1009 strcpy(username, nr_get_uname(buf.st_uid));
1010 strcpy(groupname, nr_get_gname(buf.st_gid));
1012 p = getpwuid(buf.st_uid);
1014 strncpy(username, p->pw_name, 16);
1017 snprintf(username, 16, "%u", buf.st_uid);
1020 g = getgrgid(buf.st_gid);
1022 strncpy(groupname, g->gr_name, 16);
1025 snprintf(groupname, 16, "%u", buf.st_gid);
1031 * This POSIX approximation is based on GNU ls code (and obfuscated
1032 * a bit...), to be compatible with `real' ls implementations.
1034 t = localtime(&(buf.st_mtime));
1035 strftime(newd, 512, ((now > buf.st_mtime + 6L * 30L * 24L * 60L * 60L) ||
1036 (now < buf.st_mtime - 60L * 60L))
1037 ? "%b %e %Y" : "%b %e %H:%M", t);
1043 if (nr_check_permission(0, pathname, 0, (buf.st_mode & S_IFDIR), rights) == -1) {
1044 /* no permission to even see this file */
1048 i = snprintf(temp, 1024, "%c%s %3u %-8s %-8s %8lu %12s %s\r\n",
1050 i = snprintf(temp, 1024, "%c%c%c%c%c%c%c%c%c%c %3u %-8s %-8s %8lu %12s %s",
1052 decode_mode(buf.st_mode),
1056 (buf.st_mode & S_IRUSR) ? 'r' : '-',
1057 (buf.st_mode & S_IWUSR) ? 'w' : '-',
1058 (buf.st_mode & S_IXUSR) ? ((buf.st_mode & S_ISUID) ? 's' : 'x') : '-',
1059 (buf.st_mode & S_IRGRP) ? 'r' : '-',
1060 (buf.st_mode & S_IWGRP) ? 'w' : '-',
1061 (buf.st_mode & S_IXGRP) ? ((buf.st_mode & S_ISGID) ? 's' : 'x') : '-',
1062 (buf.st_mode & S_IROTH) ? 'r' : '-',
1063 (buf.st_mode & S_IWOTH) ? 'w' : '-',
1064 (buf.st_mode & S_IXOTH) ? ((buf.st_mode & S_ISVTX) ? 't' : 'x') : '-',
1066 buf.st_nlink, username, groupname,
1067 (unsigned long)(buf.st_size), newd, pathname);
1071 * vim needs this extra character for some reason... It's too
1072 * bad I'll have to do it this way, but syntax colouring
1073 * that works properly is almost a `must' for me :-)
1078 /* add an extra classification `sign' if we got -F */
1080 int len = strlen(temp);
1081 temp[len] = classify(buf.st_mode);
1082 temp[len + 1] = '\0';
1086 strcpy(retbuf, temp);
1091 * cmd_list(): Handles the LIST command (directory listing). Does a
1092 * long listing (of type `ls -l'). The listing work is
1093 * done by do_listing(), below.
1095 int cmd_list(struct conn * const c)
1097 struct list_options lo;
1099 /* lo.recursive = 0; */
1100 lo.long_listing = 1;
1108 * cmd_nlst(): Handles the NLST command (plain directory listing).
1109 * Does a plain listing (no dates etc.), unless overridden
1110 * by the `-l' or `-L' flag (case insensitivity because most
1111 * FTP clients don't have a clue about what they send out).
1112 * The listing work is done by do_listing(), below.
1114 int cmd_nlst(struct conn * const c)
1116 struct list_options lo;
1118 /* lo.recursive = 0; */
1119 lo.long_listing = 0;
1128 * Prepares any listing buffers, temp files, etc., before
1129 * pushing the work one step further :-)
1131 * If the directory listing cache is enabled, the cache
1132 * is checked first, to see if we still have a valid entry.
1134 void do_listing(struct conn * const c, struct list_options * const lo)
1141 struct ftran * const f = c->transfer;
1148 #warning No nonroot checking for list_core() yet
1151 i = prepare_for_listing(c, &ptr, lo);
1153 destroy_ftran(c->transfer);
1162 strcpy(f->filename, "(directory listing)");
1167 struct dcache *d = NULL, *next = first_dcache->next_dcache;
1170 if (stat(cwd, &buf) > -1) {
1171 /* run through the linked list */
1172 while (next != NULL) {
1174 next = d->next_dcache;
1176 if (buf.st_mtime <= d->generated &&
1177 strcmp(d->dir_name, cwd) == 0 &&
1178 strcmp(d->pattern, ptr) == 0 &&
1179 memcmp(&(d->lo), lo,
1180 sizeof(struct list_options)) == 0) {
1183 f->file_data = d->dir_data;
1184 f->size = d->dir_size;
1187 prepare_for_transfer(f);
1197 int num_files = get_num_files(c, ptr, lo);
1198 if (num_files == -1) return;
1200 size = num_files * 160;
1201 f->file_data = malloc(size + 1);
1202 TRAP_ERROR(f->file_data == NULL, 550, return);
1203 list_core(c, ptr, lo, size);
1206 list_core(c, ptr, lo);
1210 /* populate the directory listing cache */
1213 struct dcache *d = alloc_new_dcache();
1214 if (d != NULL && stat(cwd, &buf) > -1) {
1217 d->dir_data = f->file_data;
1218 d->dir_size = f->size;
1219 d->generated = buf.st_mtime;
1221 strcpy(d->dir_name, cwd);
1222 strncpy(d->pattern, ptr, 255);
1223 d->pattern[255] = 0;
1232 prepare_for_transfer(f);
1237 * Get the number of files in PATHNAME (optionally matching
1238 * a pattern). Note that c is needed for TRAP_ERROR.
1240 int get_num_files(struct conn * const c, const char * const pathname,
1241 struct list_options * const lo)
1247 * glob() fails to set errno correctly, so we simply guess on
1248 * `permission denied'... The others are far less likely to happen.
1250 switch (glob(pathname, 0, NULL, &pglob)) {
1256 num_files = pglob.gl_pathc;
1259 numeric(c, 550, strerror(EACCES));
1263 #if 0 /* the rest of the code doesn't support recursion yet */
1264 if (lo->recursive) {
1265 for (i = 0; i < pglob.gl_pathc; i++) {
1266 char *temp = pglob.gl_pathv[i];
1270 if (S_ISDIR(buf.st_mode)) {
1272 num_files += get_num_files(c, "*", lo);
1283 * list_core(): Enumerate all the files in PATHNAME, and formats them
1284 * according to list_options (calling format functions if
1287 * Note that we don't do any realloc() yet, so if your
1288 * _average_ file name length is over a certain size (a little
1289 * under 80 for long listings, and a little under 160 for
1290 * short listings), the list will be truncated. Fix...
1292 * This function is rather long.
1294 void list_core(struct conn * const c, const char * const pathname,
1295 struct list_options * const lo
1306 struct ftran * const f = c->transfer;
1309 * glob() fails to set errno correctly, so we simply guess on
1310 * `permission denied'... The others are far less likely to happen.
1312 switch (glob(pathname, GLOB_MARK, NULL, &pglob)) {
1319 numeric(c, 550, strerror(EACCES));
1323 if (lo->long_listing) {
1324 /* FIX: we may get too high total number if we are running nonroot! */
1326 long unsigned int total = 0;
1329 for (i = 0; i < pglob.gl_pathc; i++) {
1330 if (lstat(pglob.gl_pathv[i], &buf) != -1) {
1331 total += buf.st_blocks;
1334 i = snprintf(temp, 1024, "total %lu\r\n", total >> 1);
1338 write(f->local_file, temp, i);
1342 for (i = 0; i < pglob.gl_pathc; i++) {
1343 char * const temp = pglob.gl_pathv[i];
1346 /* strip `/' away from the pathname -- add it later if -F */
1348 int len = strlen(temp);
1349 if (temp[len - 1] == '/') {
1350 temp[len - 1] = '\0';
1354 if (lo->long_listing) {
1355 if (long_listing(buf, temp, lo->classify) == 0) continue;
1359 struct stat statbuf;
1361 if (lstat(buf, &statbuf) != -1) {
1362 const int len = strlen(buf);
1364 buf[len] = classify(statbuf.st_mode);
1370 /* support recursion here some day... */
1373 mwrite(buf, strlen(buf));
1376 write(f->local_file, buf, strlen(buf));
1377 write(f->local_file, "\r\n", 2);
1384 lseek(f->local_file, 0, SEEK_SET);
1391 * cmd_noop(): Handles the NOOP command. Does nothing, doesn't even
1392 * reset the timeout.
1394 int cmd_noop(struct conn * const c)
1396 numeric(c, 200, "NOOP command successful.");
1401 * cmd_syst(): Handles the SYST command. Returns the system identification.
1403 int cmd_syst(struct conn * const c)
1405 numeric(c, 215, "UNIX Type: L%u", NBBY);
1410 * cmd_type(): Handles the TYPE command.
1412 int cmd_type(struct conn * const c)
1415 c->recv_buf[0] &= (255-32); /* convert to upper case */
1416 if (c->recv_buf[0] == 'A') {
1418 numeric(c, 200, "Type is ASCII.");
1419 } else if (c->recv_buf[0] == 'I') {
1421 numeric(c, 200, "Type is IMAGE.");
1423 numeric(c, 504, "Unknown type.");
1426 numeric(c, 200, "TYPE ignored (always I)");
1432 * cmd_mode(): Handles the MODE command. We always use stream mode,
1433 * so the argument is ignored.
1435 int cmd_mode(struct conn * const c)
1437 numeric(c, 200, "MODE ignored (always S)");
1442 * cmd_stru(): Handles the STRU command. We always use file mode,
1443 * so the argument is ignored.
1445 int cmd_stru(struct conn * const c)
1447 numeric(c, 200, "STRU ignored (always F)");
1452 * cmd_help(): Handle the HELP command. I'm sorry, but I'm unwilling
1453 * to use a lot of space to explain the RFCs in such a message,
1454 * and BetaFTPD doesn't have any special things that should
1455 * be noted anywhere. Thus, this message is close to empty. I
1456 * feel that a 5xx entry would have been better, but that is
1459 * As with ACCT, this command is supposed to be executed from
1460 * everywhere, so we have to run without setuid. I don't like
1461 * it, but at the same time I have to idea what could go
1464 * Perhaps I should make this message sound a little less
1465 * like an error, since the error code is intended for helpful
1468 int cmd_help(struct conn * const c)
1470 numeric(c, 414, "Sorry, no detailed help; use standard FTP commands.");
1475 * cmd_quit(): Handles the QUIT command, which shuts down the control
1478 int cmd_quit(struct conn * const c)
1480 numeric(c, 221, "Have a nice day!");
1486 * cmd_rein(): Handle the REIN command, which does close to a full reset
1487 * of the connection. Much of the code here is intentionally
1488 * copied directly from alloc_new_conn() -- perhaps we should
1491 int cmd_rein(struct conn * const c)
1493 destroy_ftran(c->transfer);
1494 c->buf_len = c->auth = c->rest_pos = 0;
1496 /* equals: strcpy(c->curr_dir, "/") ; strcpy(c->last_cmd, ""); */
1497 c->curr_dir[0] = '/';
1499 c->curr_dir[1] = c->last_cmd[0] = '\0';
1501 c->curr_dir[1] = '\0';
1504 time(&(c->last_transfer));
1505 numeric(c, 220, "BetaFTPD " VERSION " ready.");
1512 * cmd_exit(): Handles the EXIT command, my own `extension' to the
1513 * FTP protocol... IMPORTANT: Only to be used for profiling
1514 * purposes!! (It's needed to get some profiling data out
1515 * of the server after compiling it with -pg, since such data
1516 * is only written on a clear exit()). Any user (even those
1517 * not logged in) can issue an EXIT, and make the server shut
1518 * down without clearing any sockets etc. In other words:
1519 * Don't use it on a production site.
1521 void cmd_exit(struct conn * const c)
1523 while (first_conn->next_conn)
1524 destroy_conn(first_conn->next_conn);
1531 * Gets a command from c->recv_buf, determines which command
1532 * it is, sets proper effective user-ID and calls the command
1533 * handler. Finally, it cleans up.
1535 * To me, this command seems optimizable, but I'm not really
1538 void parse_command(struct conn *c)
1541 const struct handler *h = handler_table; /* first entry */
1543 if (c == NULL) return;
1545 /* strip any leading non-ASCII characters (including CR/LFs) */
1546 while (c->buf_len > 0 && (c->recv_buf[0] < 'a' || c->recv_buf[0] > 'z')
1547 && (c->recv_buf[0] < 'A' || c->recv_buf[0] > 'Z')) {
1548 remove_bytes(c, 1); /* not good */
1551 /* scan, searching for CR or LF */
1552 cmlen = strcspn(c->recv_buf, "\r\n");
1553 if (cmlen >= c->buf_len) return;
1556 strncpy(c->last_cmd, c->recv_buf, cmlen);
1557 c->last_cmd[cmlen] = 0;
1561 if ((cmlen >= (strlen(h->cmd_name) + h->add_cmlen)) &&
1562 (strncasecmp(c->recv_buf, h->cmd_name, strlen(h->cmd_name)) == 0)) {
1563 if (c->auth < h->min_auth) {
1564 numeric(c, 503, "Please login with USER and PASS.");
1565 while (c->recv_buf[0] != '\n') remove_bytes(c, 1);
1577 remove_bytes(c, strlen(h->cmd_name));
1578 cmlen -= strlen(h->cmd_name);
1579 while (c->recv_buf[0] == ' ') {
1584 schar = c->recv_buf[cmlen];
1585 c->recv_buf[cmlen] = 0;
1587 /* result of zero means the connection is freed */
1588 if (h->callback(c)) {
1589 c->recv_buf[cmlen] = schar;
1591 if (h->do_setuid) seteuid(getuid());
1593 remove_bytes(c, cmlen);
1598 } while ((++h)->callback != NULL);
1600 numeric(c, 500, "Sorry, no such command.");
1601 remove_bytes(c, cmlen);
1605 * prepare_for_transfer():
1606 * Prepares an ftran object for a file transfer, setting
1607 * file size, opening sockets etc.
1609 * nonroot notice: prepare_for_transfer() assumes all access
1610 * checks are already done.
1612 void prepare_for_transfer(struct ftran *f)
1615 #warning No nonroot checking for prepare_for_transfer() yet
1619 /* mmap doesn't make temp files for dir listings */
1620 if (!f->dir_listing) {
1623 f->size = lseek(f->local_file, 0, SEEK_END);
1626 if (f->upload == 0 || f->append == 0 || f->owner->rest_pos != 0)
1628 lseek(f->local_file, f->owner->rest_pos, SEEK_SET);
1633 if (f->state == 1) { /* PASV connection */
1634 f->state = 2; /* waiting */
1635 } else if (f->state == 3) { /* PORT connection */
1637 connect(f->sock, (struct sockaddr *)&f->sin, sizeof(f->sin));
1638 add_fd(f->sock, POLLOUT);
1640 time(&(f->tran_start));
1645 * Takes a mode_t argument (from a `struct stat'), and
1646 * returns the proper dirlist letter for that type.
1648 * Note: S_IFLNK seems to be broken, or perhaps I just have
1649 * missed something (S_IFLNK is always set for all *files* on
1650 * my glibc 2.0.111 system).
1652 * The most common cases are put first, for speed :-)
1654 char decode_mode(mode_t mode) {
1655 if (mode & S_IFREG) return '-';
1656 if (mode & S_IFDIR) return 'd';
1657 if (mode & S_IFLNK) return 'l';
1658 if (mode & S_IFBLK) return 'b';
1659 if (mode & S_IFCHR) return 'c';
1660 if (mode & S_IFSOCK) return 's';
1661 if (mode & S_IFIFO) return 'f';
1668 * Take an FTP path, do all neccessary root_dir checks,
1669 * change to the correct directory and return the proper
1670 * file name to open/stat/whatever. The path returned is
1671 * relative to the current directory (NOT absolute). chdir()
1672 * in any way will `destroy' this argument.
1674 * Note that `path' will be _changed_, and used as a return pointer
1675 * base. Do not attempt to free the result from this function --
1676 * if you need to, free path instead.
1678 char *translate_path(struct conn * const c, char * const path)
1682 /* chdir to the right dir, then chop it off */
1685 ptr = strrchr(path, '/');
1687 char save_char = ptr[0];
1690 if (do_chdir(c, path) == -1) {
1703 * Opens the file PATH with access parameters FLAGS, translating
1704 * paths and checking permissions as neccessary. Generally, this
1705 * should be used whenever you need an open().
1707 * The parameters might be a bit confusing. To clarify them a bit:
1708 * c: IN/OUT (will be changed)
1709 * path: IN (but _will_ be changed)
1714 int do_openfile(struct conn * const c, char * const path,
1715 char * const filename, const int flags
1717 , const int check_permission
1725 if (nr_check_permission(c->uid, path, check_permission, 0, NULL) == -1) {
1730 ptr = translate_path(c, c->recv_buf);
1731 if (ptr == NULL) return -1;
1734 if ((flags & O_CREAT) == 0) {
1737 if (!S_ISREG(buf.st_mode)) {
1738 numeric(c, 550, "%s: Not a plain file.", ptr);
1745 if (filename != NULL) { /* filename should always be != NULL */
1746 strcpy(filename, ptr);
1748 return open(ptr, flags, 0666);
1752 * prepare_for_listing():
1753 * Parse list options, put them back into the list_options
1754 * structure lo, and make temporary room for the list.
1756 int prepare_for_listing(struct conn * const c, char ** const ptr,
1757 struct list_options * const lo)
1762 struct ftran *f = c->transfer;
1764 char *optr = NULL, *fptr = NULL;
1770 #warning No nonroot checking for prepare_for_listing() yet
1773 if ((f == NULL) || ((f->state != 1) && (f->state != 3))) {
1774 numeric(c, 425, "No data connection set up; please use PASV or PORT.");
1779 * A little parameter scanning is required here. There can only
1780 * be two parts: the directory name, and any options. We'll find
1781 * any options first.
1783 if (c->recv_buf[0] == '-') {
1786 optr = strstr(c->recv_buf, " -");
1789 /* Then see if there are any options to parse. */
1792 switch (*optr & (255-32)) { /* uppercase */
1794 case 'R': /* actually case sensitive... */
1799 lo->long_listing = 1;
1816 /* then we chdir to the dir in fptr (if any) */
1817 tmp = fptr ? strrchr(fptr, '/') : NULL;
1820 if (do_chdir(c, fptr) == -1) return -1;
1823 /* current directory */
1824 TRAP_ERROR(chdir(c->curr_dir) == -1, 550, return -1);
1827 /* if no argument, choose all files */
1828 if (fptr == NULL || fptr[0] == 0) fptr = "*";
1833 if (nr_check_permission(c->uid, chd, 4, 1, NULL) == -1) {
1834 numeric(c, 550, "Permission denied");
1840 tfname = tempnam(NULL, "ftp");
1843 if (tfname == NULL) tfname = tempnam("/", "ftp");
1846 TRAP_ERROR(tfname == NULL, 550, return -1);
1847 strcpy(f->filename, tfname);
1850 f->local_file = open(f->filename, O_RDWR | O_CREAT | O_TRUNC, 0666);
1851 TRAP_ERROR(f->local_file == -1, 550, return -1);
1862 * classify(): Takes a mode_t argument (from `struct stat'), and returns
1863 * the parameter to be used in an `ls -F'-style listing.
1865 char classify(const mode_t mode)
1867 if (S_ISREG(mode)) {
1868 if (mode & (S_IXUSR | S_IXGRP | S_IXOTH)) {
1874 if (S_ISDIR(mode)) return '/';
1875 if (S_ISLNK(mode)) return '@';
1876 if (S_ISSOCK(mode)) return '=';
1877 if (S_ISFIFO(mode)) return '|';