reactos/base/services/telnetd/telnetd.c
Hermès Bélusca-Maïto b819608ed8 Create a branch for console restructuration work.
svn path=/branches/condrv_restructure/; revision=63104
2014-05-02 14:13:40 +00:00

648 lines
17 KiB
C

/*
* Abstract: a simple telnet 'daemon' for Windows hosts.
*
* Compiled & run successfully using MSVC 5.0 under Windows95 (requires
* Winsock2 update) and Windows98 and MSVC 6.0 under WindowsNT4
*
* Compiler options : no special options needed
* Linker options : add wsock32.lib or ws2_32.lib
*
* Written by fred.van.lieshout 'at' zonnet.nl
* Use freely, no copyrights.
* Use Linux.
*
* Parts Copyright Steven Edwards
* Public Domain
*
* TODO:
* - access control
* - will/won't handshake
* - Unify Debugging output and return StatusCodes
*/
#include "telnetd.h"
#define telnetd_printf printf
#if 0
static inline int telnetd_printf(const char *format, ...);
{
printf(format,...);
syslog (6, format);
}
#endif
/* Local data */
static BOOLEAN bShutdown = 0;
static BOOLEAN bSocketInterfaceInitialised = 0;
static int sock;
/* In the future, some options might be passed here to handle
* authentication options in the registry or command line
* options passed to the service
*
* Once you are ready to turn on the service
* rename this function
* int kickoff_telnetd(void)
*/
int kickoff_telnetd(void)
{
printf("Attempting to start Simple TelnetD\n");
// DetectPlatform();
SetConsoleCtrlHandler(Cleanup, 1);
if (!StartSocketInterface())
ErrorExit("Unable to start socket interface\n");
CreateSocket();
while(!bShutdown) {
WaitForConnect();
}
WSACleanup();
return 0;
}
/* Cleanup */
static BOOL WINAPI Cleanup(DWORD dwControlType)
{
if (bSocketInterfaceInitialised) {
telnetd_printf("Cleanup...\n");
WSACleanup();
}
return 0;
}
/* StartSocketInterface */
static BOOLEAN StartSocketInterface(void)
{
WORD wVersionRequested;
WSADATA wsaData;
int err;
wVersionRequested = MAKEWORD( 2, 0 );
err = WSAStartup(wVersionRequested, &wsaData);
if (err != 0) {
telnetd_printf("requested winsock version not supported\n");
return 0;
}
bSocketInterfaceInitialised = 1; /* for ErrorExit function */
if ( wsaData.wVersion != wVersionRequested)
ErrorExit("requested winsock version not supported\n");
telnetd_printf("TelnetD, using %s\n", wsaData.szDescription);
return 1;
}
/* CreateSocket */
static void CreateSocket(void)
{
struct sockaddr_in sa;
sock = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP);
if (sock < 0)
ErrorExit("Cannot create socket");
memset(&sa, 0, sizeof(sa));
sa.sin_family = AF_INET;
sa.sin_addr.s_addr = INADDR_ANY;
sa.sin_port = htons(TELNET_PORT);
if (bind(sock, (struct sockaddr*) &sa, sizeof(sa)) != 0)
ErrorExit("Cannot bind address to socket");
}
/* WaitForConnect */
static void WaitForConnect(void)
{
struct sockaddr_in sa;
int new_sock;
if (listen(sock, 1) < 0)
ErrorExit("Cannot listen on socket");
if ((new_sock = accept(sock, (struct sockaddr*) &sa, NULL)) < 0) {
fprintf(stderr, "Failed to accept incoming call\n");
} else {
telnetd_printf("user connected on socket %d, port %d, address %lx\n", new_sock,
htons(sa.sin_port), sa.sin_addr.s_addr);
UserLogin(new_sock);
}
}
/* Function: UserLogin */
static void UserLogin(int client_socket)
{
HANDLE threadHandle;
client_t *client = malloc(sizeof(client_t));
if (client == NULL)
ErrorExit("failed to allocate memory for client");
client->socket = client_socket;
threadHandle = CreateThread(NULL, 0, UserLoginThread, client, 0, NULL);
if (threadHandle == NULL)
free(client);
else
CloseHandle(threadHandle);
}
/* Function: UserLoginThread */
static DWORD WINAPI UserLoginThread(LPVOID data)
{
client_t *client = (client_t *) data;
char welcome[256];
char hostname[64] = "Unknown";
char *pwdPrompt = "\r\npass:";
//char *logonPrompt = "\r\nLogin OK, please wait...";
//char *byebye = "\r\nWrong! bye bye...\r\n";
char userID[USERID_SIZE];
char password[USERID_SIZE];
int received;
char *terminator;
if (DoTelnetHandshake(client->socket)) {
closesocket(client->socket);
free(client);
return 0;
}
gethostname(hostname, sizeof(hostname));
sprintf(welcome, "\r\nWelcome to %s, please identify yourself\r\n\r\nuser:", hostname);
if (send(client->socket, welcome, strlen(welcome), 0) < 0) {
closesocket(client->socket);
free(client);
return 0;
}
received = ReceiveLine(client->socket, userID, sizeof(userID), Echo );
if (received < 0) {
closesocket(client->socket);
free(client);
return 0;
} else if (received) {
if ((terminator = strchr(userID, CR)) != NULL) {
*terminator = '\0';
}
}
if (send(client->socket, pwdPrompt, strlen(pwdPrompt), 0) < 0) {
closesocket(client->socket);
free(client);
return 0;
}
received = ReceiveLine(client->socket, password, sizeof(password), Password );
#if 0
if (received < 0) {
closesocket(client->socket);
free(client);
return 0;
} else if (received) {
if ((terminator = strchr(password, CR)) != NULL) {
*terminator = '\0';
}
}
#endif
/* TODO: do authentication here */
telnetd_printf("User '%p' logged on\n", userID);
#if 0
strcpy(client->userID, userID);
if (send(client->socket, logonPrompt, strlen(logonPrompt), 0) < 0) {
closesocket(client->socket);
free(client);
return 0;
}
#endif
RunShell(client);
return 0;
}
/* Function: DoTelnetHandshake */
static int DoTelnetHandshake(int sock)
{
int retval;
int received;
fd_set set;
struct timeval timeout = { HANDSHAKE_TIMEOUT, 0 };
char will_echo[]=
IAC DONT ECHO
IAC WILL ECHO
IAC WILL NAWS
IAC WILL SUPPRESS_GO_AHEAD
IAC DO SUPPRESS_GO_AHEAD
IAC DONT NEWENVIRON
IAC WONT NEWENVIRON
IAC WONT LINEMODE
IAC DO NAWS
IAC SB TERMINAL_TYPE "\x01" IAC SE
;
unsigned char client_reply[256];
if (send(sock, will_echo, sizeof(will_echo), 0) < 0) {
return -1;
}
/* Now wait for client response (and ignore it) */
FD_ZERO(&set);
FD_SET(sock, &set);
do {
retval = select(0, &set, NULL, NULL, &timeout);
/* check for error */
if (retval < 0) {
return -1;
/* check for timeout */
} else if (retval == 0) {
return 0;
}
/* no error and no timeout, we have data in our sock */
received = recv(sock, (char *) client_reply, sizeof(client_reply), 0);
if (received <= 0) {
return -1;
}
} while (retval);
return 0;
}
/*
** Function: ReceiveLine
**
** Abstract: receive until timeout or CR
** In : sock, len
** Out : buffer
** Result : int
** Pre : 'sock' must be valid socket
** Post : (result = the number of bytes read into 'buffer')
** OR (result = -1 and error)
*/
static int ReceiveLine(int sock, char *buffer, int len, EchoMode echo)
{
int i = 0;
int retval;
fd_set set;
struct timeval timeout = { 0, 100000 };
char del[3] = { BS, ' ', BS };
char asterisk[1] = { '*' };
FD_ZERO(&set);
FD_SET(sock, &set);
memset(buffer, '\0', len);
do {
/* When we're in echo mode, we do not need a timeout */
retval = select(0, &set, NULL, NULL, (echo ? NULL : &timeout) );
/* check for error */
if (retval < 0) {
return -1;
/* check for timeout */
} else if (retval == 0) {
/* return number of characters received so far */
return i;
}
/* no error and no timeout, we have data in our sock */
if (recv(sock, &buffer[i], 1, 0) <= 0) {
return -1;
}
if ((buffer[i] == '\0') || (buffer[i] == LF)) {
/* ignore null characters and linefeeds from DOS telnet clients */
buffer[i] = '\0';
} else if ((buffer[i] == DEL) || (buffer[i] == BS)) {
/* handle delete and backspace */
buffer[i] = '\0';
if (echo) {
if (i > 0) {
i--;
buffer[i] = '\0';
if (send(sock, del, sizeof(del), 0) < 0) {
return -1;
}
}
} else {
buffer[i] = BS; /* Let shell process handle it */
i++;
}
} else {
/* echo typed characters */
if (echo == Echo && send(sock, &buffer[i], 1, 0) < 0) {
return -1;
} else if (echo == Password && send(sock, asterisk, sizeof(asterisk), 0) < 0) {
return -1;
}
if (buffer[i] == CR) {
i++;
buffer[i] = LF; /* append LF for DOS command processor */
i++;
return i;
}
i++;
}
} while (i < len);
return i;
}
/*
** Function: RunShell
*/
static void RunShell(client_t *client)
{
HANDLE threadHandle;
HANDLE hChildStdinRd;
HANDLE hChildStdinWr;
HANDLE hChildStdoutRd;
HANDLE hChildStdoutWr;
STARTUPINFO si;
PROCESS_INFORMATION piProcInfo;
SECURITY_ATTRIBUTES saAttr;
const char *name = "c:\\reactos\\system32\\cmd.exe";
const char *cmd = NULL;
//const char *name = "d:\\cygwin\\bin\\bash.exe";
//const char *cmd = "d:\\cygwin\\bin\\bash.exe --login -i";
saAttr.nLength = sizeof(SECURITY_ATTRIBUTES);
saAttr.bInheritHandle = TRUE;
saAttr.lpSecurityDescriptor = NULL;
// Create a pipe for the child process's STDOUT.
if (! CreatePipe(&hChildStdoutRd, &hChildStdoutWr, &saAttr, 0))
ErrorExit("Stdout pipe creation failed\n");
if (! CreatePipe(&hChildStdinRd, &hChildStdinWr, &saAttr, 0))
ErrorExit("Stdin pipe creation failed\n");
client->bTerminate = FALSE;
client->bWriteToPipe = TRUE;
client->bReadFromPipe = TRUE;
client->hChildStdinWr = hChildStdinWr;
client->hChildStdoutRd = hChildStdoutRd;
// Create the child process (the shell)
telnetd_printf("Creating child process...\n");
ZeroMemory( &si, sizeof(STARTUPINFO) );
si.cb = sizeof(STARTUPINFO);
si.dwFlags = STARTF_USESTDHANDLES;
si.hStdInput = hChildStdinRd;
si.hStdOutput = hChildStdoutWr;
si.hStdError = hChildStdoutWr;
//si.dwFlags |= STARTF_USESHOWWINDOW;
//si.wShowWindow = SW_SHOW;
if (!CreateProcess((LPSTR) name, // executable module
(LPSTR) cmd, // command line
NULL, // process security attributes
NULL, // primary thread security attributes
TRUE, // handles are inherited
DETACHED_PROCESS + // creation flags
CREATE_NEW_PROCESS_GROUP,
NULL, // use parent's environment
NULL, // use parent's current directory
&si, // startup info
&piProcInfo)) {
ErrorExit("Create process failed");
}
client->hProcess = piProcInfo.hProcess;
client->dwProcessId = piProcInfo.dwProcessId;
telnetd_printf("New child created (groupid=%lu)\n", client->dwProcessId);
// No longer need these in the parent...
if (!CloseHandle(hChildStdoutWr))
ErrorExit("Closing handle failed");
if (!CloseHandle(hChildStdinRd))
ErrorExit("Closing handle failed");
threadHandle = CreateThread(NULL, 0, WriteToPipeThread, client, 0, NULL);
if (threadHandle != NULL)
CloseHandle(threadHandle);
threadHandle = CreateThread(NULL, 0, ReadFromPipeThread, client, 0, NULL);
if (threadHandle != NULL)
CloseHandle(threadHandle);
threadHandle = CreateThread(NULL, 0, MonitorChildThread, client, 0, NULL);
if (threadHandle != NULL)
CloseHandle(threadHandle);
}
/*
* Function: MonitorChildThread
*
* Abstract: Monitor the child (shell) process
*/
static DWORD WINAPI MonitorChildThread(LPVOID data)
{
DWORD exitCode;
client_t *client = (client_t *) data;
telnetd_printf("Monitor thread running...\n");
WaitForSingleObject(client->hProcess, INFINITE);
GetExitCodeProcess(client->hProcess, &exitCode);
telnetd_printf("Child process terminated with code %lx\n", exitCode);
/* signal the other threads to give up */
client->bTerminate = TRUE;
Sleep(500);
CloseHandle(client->hChildStdoutRd);
CloseHandle(client->hChildStdinWr);
CloseHandle(client->hProcess);
closesocket(client->socket);
telnetd_printf("Waiting for all threads to give up..\n");
while (client->bWriteToPipe || client->bReadFromPipe) {
telnetd_printf(".");
fflush(stdout);
Sleep(1000);
}
telnetd_printf("Cleanup for user '%s'\n", client->userID);
free(client);
return 0;
}
/*
* Function: WriteToPipeThread
*
* Abstract: read data from the telnet client socket
* and pass it on to the shell process.
*/
static DWORD WINAPI WriteToPipeThread(LPVOID data)
{
int iRead;
DWORD dwWritten;
CHAR chBuf[BUFSIZE];
client_t *client = (client_t *) data;
while (!client->bTerminate) {
iRead = ReceiveLine(client->socket, chBuf, BUFSIZE, FALSE);
if (iRead < 0) {
telnetd_printf("Client disconnect\n");
break;
} else if (iRead > 0) {
if (strchr(chBuf, CTRLC)) {
GenerateConsoleCtrlEvent(CTRL_C_EVENT, client->dwProcessId);
}
if (send(client->socket, chBuf, iRead, 0) < 0) {
telnetd_printf("error writing to socket\n");
break;
}
if (! WriteFile(client->hChildStdinWr, chBuf, (DWORD) iRead, &dwWritten, NULL)) {
telnetd_printf("Error writing to pipe\n");
break;
}
}
}
if (!client->bTerminate)
TerminateShell(client);
telnetd_printf("WriteToPipeThread terminated\n");
client->bWriteToPipe = FALSE;
return 0;
}
/*
* Function: ReadFromPipeThread
*
* Abstract: Read data from the shell's stdout handle and
* pass it on to the telnet client socket.
*/
static DWORD WINAPI ReadFromPipeThread(LPVOID data)
{
DWORD dwRead;
DWORD dwAvail;
CHAR chBuf[BUFSIZE];
CHAR txBuf[BUFSIZE*2];
DWORD from,to;
//char warning[] = "warning: rl_prep_terminal: cannot get terminal settings";
client_t *client = (client_t *) data;
while (!client->bTerminate && client->bWriteToPipe) {
// Since we do not want to block, first peek...
if (PeekNamedPipe(client->hChildStdoutRd, NULL, 0, NULL, &dwAvail, NULL) == 0) {
telnetd_printf("Failed to peek in pipe\n");
break;
}
if (dwAvail) {
if( ! ReadFile( client->hChildStdoutRd, chBuf, BUFSIZE, &dwRead, NULL) ||
dwRead == 0) {
telnetd_printf("Failed to read from pipe\n");
break;
}
for (from=0, to=0; from<dwRead; from++, to++) {
txBuf[to] = chBuf[from];
if (txBuf[to] == '\n') {
txBuf[to] = '\r';
to++;
txBuf[to] = '\n';
}
}
if (send(client->socket, txBuf, to, 0) < 0) {
telnetd_printf("error writing to socket\n");
break;
}
}
Sleep(100); /* Hmmm, oh well... what the heck! */
}
if (!client->bTerminate)
TerminateShell(client);
telnetd_printf("ReadFromPipeThread terminated\n");
client->bReadFromPipe = FALSE;
return 0;
}
/* TerminateShell */
static void TerminateShell(client_t *client)
{
DWORD exitCode;
DWORD dwWritten;
char stop[] = "\003\r\nexit\r\n"; /* Ctrl-C + exit */
GetExitCodeProcess(client->hProcess, &exitCode);
if (exitCode == STILL_ACTIVE)
{
HANDLE hEvent = NULL;
DWORD dwWaitResult;
telnetd_printf("user shell still active, send Ctrl-Break to group-id %lu\n", client->dwProcessId );
hEvent = CreateEvent(NULL, TRUE, FALSE, NULL);
if (hEvent == NULL)
printf("CreateEvent error\n");
if (!GenerateConsoleCtrlEvent( CTRL_BREAK_EVENT, client->dwProcessId ))
telnetd_printf("Failed to send Ctrl_break\n");
if (!GenerateConsoleCtrlEvent( CTRL_C_EVENT, client->dwProcessId ))
telnetd_printf("Failed to send Ctrl_C\n");
if (!WriteFile(client->hChildStdinWr, stop, sizeof(stop), &dwWritten, NULL))
telnetd_printf("Error writing to pipe\n");
/* wait for our handler to be called */
dwWaitResult=WaitForSingleObject(hEvent, 500);
if (WAIT_FAILED==dwWaitResult)
telnetd_printf("WaitForSingleObject failed\n");
GetExitCodeProcess(client->hProcess, &exitCode);
if (exitCode == STILL_ACTIVE)
{
telnetd_printf("user shell still active, attempt to terminate it now...\n");
if (hEvent != NULL)
{
if (!CloseHandle(hEvent))
telnetd_printf("CloseHandle");
}
TerminateProcess(client->hProcess, 0);
}
TerminateProcess(client->hProcess, 0);
}
TerminateProcess(client->hProcess, 0);
}
/* ErrorExit */
static VOID ErrorExit (LPTSTR lpszMessage)
{
fprintf(stderr, "%s\n", lpszMessage);
if (bSocketInterfaceInitialised) {
telnetd_printf("WSAGetLastError=%d\n", WSAGetLastError());
WSACleanup();
}
ExitProcess(0);
}