cpu: implement aan(8) support
This commit is contained in:
parent
e077349fef
commit
1b6577785e
2 changed files with 139 additions and 11 deletions
|
@ -4,6 +4,8 @@ cpu \- connection to CPU server
|
|||
.SH SYNOPSIS
|
||||
.B cpu
|
||||
[
|
||||
.B -p
|
||||
] [
|
||||
.B -h
|
||||
.I server
|
||||
] [
|
||||
|
@ -31,6 +33,9 @@ cpu \- connection to CPU server
|
|||
.B -R
|
||||
|
|
||||
.B -O
|
||||
] [
|
||||
.B -A
|
||||
.I address
|
||||
]
|
||||
.SH DESCRIPTION
|
||||
.I Cpu
|
||||
|
@ -176,6 +181,21 @@ flag is similar but simulates the pre-9P2000 version
|
|||
of the
|
||||
.I cpu
|
||||
protocol.
|
||||
.PP
|
||||
The
|
||||
.B -p
|
||||
flag pushes the
|
||||
.IR aan (8)
|
||||
filter onto the connection to protect against temporary
|
||||
network outages.
|
||||
.PP
|
||||
The
|
||||
.B -A
|
||||
flag sets the announce-string
|
||||
.I address
|
||||
to use for
|
||||
.IR aan (8)
|
||||
connections, if requested by the initial protocol.
|
||||
.SH FILES
|
||||
The name space of the terminal side of the
|
||||
.I cpu
|
||||
|
@ -191,7 +211,8 @@ are bound to their standard locations from there.
|
|||
.SH SEE ALSO
|
||||
.IR rc (1) ,
|
||||
.IR rio (1) ,
|
||||
.IR exportfs (4)
|
||||
.IR exportfs (4) ,
|
||||
.IR aan (8)
|
||||
.SH BUGS
|
||||
Binds and mounts done after the terminal
|
||||
.B lib/profile
|
||||
|
|
|
@ -69,10 +69,16 @@ char *p9authproto = "p9any";
|
|||
|
||||
int setam(char*);
|
||||
|
||||
char *aan = "/bin/aan";
|
||||
char *anstring = "tcp!*!0";
|
||||
char *filterp = nil;
|
||||
|
||||
int filter(int fd, char *host);
|
||||
|
||||
void
|
||||
usage(void)
|
||||
{
|
||||
fprint(2, "usage: cpu [-h system] [-u user] [-a authmethod] "
|
||||
fprint(2, "usage: cpu [-p] [-h system] [-u user] [-a authmethod] "
|
||||
"[-e 'crypt hash'] [-k keypattern] [-P patternfile] "
|
||||
"[-c cmd arg ...]\n");
|
||||
exits("usage");
|
||||
|
@ -171,6 +177,9 @@ main(int argc, char **argv)
|
|||
case 'f':
|
||||
/* ignored but accepted for compatibility */
|
||||
break;
|
||||
case 'A':
|
||||
anstring = EARGF(usage());
|
||||
break;
|
||||
case 'O':
|
||||
p9authproto = "p9sk2";
|
||||
remoteside(1); /* From listen */
|
||||
|
@ -199,6 +208,9 @@ main(int argc, char **argv)
|
|||
user = EARGF(usage());
|
||||
keyspec = smprint("%s user=%s", keyspec, user);
|
||||
break;
|
||||
case 'p':
|
||||
filterp = aan;
|
||||
break;
|
||||
default:
|
||||
usage();
|
||||
}ARGEND;
|
||||
|
@ -285,7 +297,7 @@ old9p(int fd)
|
|||
if(pipe(p) < 0)
|
||||
fatal("pipe: %r");
|
||||
|
||||
switch(rfork(RFPROC|RFFDG|RFNAMEG)) {
|
||||
switch(rfork(RFPROC|RFMEM|RFFDG|RFNAMEG)) {
|
||||
case -1:
|
||||
fatal("rfork srvold9p: %r");
|
||||
case 0:
|
||||
|
@ -330,6 +342,14 @@ remoteside(int old)
|
|||
n = readstr(fd, cmd, sizeof(cmd));
|
||||
if(n < 0)
|
||||
fatal("authenticating: %r");
|
||||
filterp = nil;
|
||||
if(!old && strcmp(cmd, "aan") == 0){
|
||||
filterp = aan;
|
||||
writestr(fd, "", nil, 1);
|
||||
n = readstr(fd, cmd, sizeof(cmd));
|
||||
if(n < 0)
|
||||
fatal("authenticating: %r");
|
||||
}
|
||||
if(setamalg(cmd) < 0){
|
||||
writestr(fd, "unsupported auth method", nil, 0);
|
||||
fatal("bad auth method %s: %r", cmd);
|
||||
|
@ -422,6 +442,18 @@ rexcall(int *fd, char *host, char *service)
|
|||
if((*fd = dial(na, 0, dir, 0)) < 0)
|
||||
return "can't dial";
|
||||
|
||||
/* negotiate aan filter extension */
|
||||
if(filterp == aan){
|
||||
writestr(*fd, "aan", "negotiating aan", 0);
|
||||
n = readstr(*fd, err, sizeof err);
|
||||
if(n < 0)
|
||||
return "negotiating aan";
|
||||
if(*err){
|
||||
werrstr(err);
|
||||
return negstr;
|
||||
}
|
||||
}
|
||||
|
||||
/* negotiate authentication mechanism */
|
||||
if(ealgs != nil)
|
||||
snprint(msg, sizeof(msg), "%s %s", am->name, ealgs);
|
||||
|
@ -514,7 +546,7 @@ netkeyauth(int fd)
|
|||
if(readstr(fd, chall, sizeof chall) < 0)
|
||||
break;
|
||||
if(*chall == 0)
|
||||
return fd;
|
||||
return filter(fd, system);
|
||||
print("challenge: %s\nresponse: ", chall);
|
||||
if(readln(resp, sizeof(resp)) < 0)
|
||||
break;
|
||||
|
@ -554,7 +586,7 @@ netkeysrvauth(int fd, char *user)
|
|||
if(auth_chuid(ai, 0) < 0)
|
||||
fatal("newns: %r");
|
||||
auth_freeAI(ai);
|
||||
return fd;
|
||||
return filter(fd, nil);
|
||||
}
|
||||
|
||||
static void
|
||||
|
@ -605,12 +637,15 @@ p9auth(int fd)
|
|||
mksecret(fromclientsecret, digest);
|
||||
mksecret(fromserversecret, digest+10);
|
||||
|
||||
if((fd = filter(fd, system)) < 0)
|
||||
return -1;
|
||||
|
||||
/* set up encryption */
|
||||
procsetname("pushssl");
|
||||
i = pushssl(fd, ealgs, fromclientsecret, fromserversecret, nil);
|
||||
if(i < 0)
|
||||
fd = pushssl(fd, ealgs, fromclientsecret, fromserversecret, nil);
|
||||
if(fd < 0)
|
||||
werrstr("can't establish ssl connection: %r");
|
||||
return i;
|
||||
return fd;
|
||||
}
|
||||
|
||||
static int
|
||||
|
@ -677,11 +712,14 @@ srvp9auth(int fd, char *user)
|
|||
mksecret(fromclientsecret, digest);
|
||||
mksecret(fromserversecret, digest+10);
|
||||
|
||||
if((fd = filter(fd, nil)) < 0)
|
||||
return -1;
|
||||
|
||||
/* set up encryption */
|
||||
i = pushssl(fd, ealgs, fromserversecret, fromclientsecret, nil);
|
||||
if(i < 0)
|
||||
fd = pushssl(fd, ealgs, fromserversecret, fromclientsecret, nil);
|
||||
if(fd < 0)
|
||||
werrstr("can't establish ssl connection: %r");
|
||||
return i;
|
||||
return fd;
|
||||
}
|
||||
|
||||
/*
|
||||
|
@ -709,6 +747,75 @@ setamalg(char *s)
|
|||
return setam(s);
|
||||
}
|
||||
|
||||
int
|
||||
filter(int fd, char *host)
|
||||
{
|
||||
char addr[128], buf[256], *s, *file, *argv[16];
|
||||
int p[2], lfd, flags, len, argc;
|
||||
|
||||
if(filterp == nil)
|
||||
return fd;
|
||||
procsetname("filter %s", filterp);
|
||||
flags = RFNOWAIT|RFPROC|RFMEM|RFFDG;
|
||||
if(host == nil){
|
||||
/* remote side */
|
||||
if(announce(anstring, addr) < 0)
|
||||
fatal("filter: Cannot announce %s: %r", anstring);
|
||||
snprint(buf, sizeof(buf), "%s/local", addr);
|
||||
if((lfd = open(buf, OREAD)) < 0)
|
||||
fatal("filter: Cannot open %s: %r", buf);
|
||||
if((len = read(lfd, buf, sizeof buf - 1)) < 0)
|
||||
fatal("filter: Cannot read %s: %r", buf);
|
||||
close(lfd);
|
||||
buf[len] = 0;
|
||||
if(s = strchr(buf, '\n'))
|
||||
len = s - buf;
|
||||
if(write(fd, buf, len) != len)
|
||||
fatal("filter: cannot write port; %r");
|
||||
} else {
|
||||
/* client side */
|
||||
flags |= RFNOTEG;
|
||||
if((len = read(fd, buf, sizeof buf - 1)) < 0)
|
||||
fatal("filter: cannot read port; %r");
|
||||
buf[len] = '\0';
|
||||
if((s = strrchr(buf, '!')) == nil)
|
||||
fatal("filter: malformed remote port: %s", buf);
|
||||
snprint(addr, sizeof(addr), "%s", netmkaddr(host, "tcp", s+1));
|
||||
}
|
||||
|
||||
snprint(buf, sizeof(buf), "%s", filterp);
|
||||
if((argc = tokenize(buf, argv, nelem(argv)-3)) <= 0)
|
||||
fatal("filter: empty command");
|
||||
if(host)
|
||||
argv[argc++] = "-c";
|
||||
argv[argc++] = addr;
|
||||
argv[argc] = nil;
|
||||
file = argv[0];
|
||||
if(s = strrchr(argv[0], '/'))
|
||||
argv[0] = s+1;
|
||||
|
||||
if(pipe(p) < 0)
|
||||
fatal("filter: pipe; %r");
|
||||
|
||||
switch(rfork(flags)) {
|
||||
case -1:
|
||||
fatal("filter: rfork; %r\n");
|
||||
case 0:
|
||||
if (dup(p[0], 1) < 0)
|
||||
fatal("filter: Cannot dup to 1; %r");
|
||||
if (dup(p[0], 0) < 0)
|
||||
fatal("filter: Cannot dup to 0; %r");
|
||||
close(p[0]);
|
||||
close(p[1]);
|
||||
exec(file, argv);
|
||||
fatal("filter: exec; %r");
|
||||
default:
|
||||
close(fd);
|
||||
close(p[0]);
|
||||
}
|
||||
return p[1];
|
||||
}
|
||||
|
||||
char *rmtnotefile = "/mnt/term/dev/cpunote";
|
||||
|
||||
/*
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue