ftppr.c 11 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336
  1. /*
  2. 3APA3A simpliest proxy server
  3. (c) 2002-2016 by Vladimir Dubrovin <3proxy@3proxy.ru>
  4. please read License Agreement
  5. */
  6. #include "proxy.h"
  7. #define RETURN(xxx) { param->res = xxx; goto CLEANRET; }
  8. #define BUFSIZE 2048
  9. void * ftpprchild(struct clientparam* param) {
  10. int i=0, res;
  11. unsigned char *buf;
  12. unsigned char *se;
  13. int status = 0;
  14. int inbuf;
  15. int pasv = 0;
  16. SOCKET sc = INVALID_SOCKET, ss = INVALID_SOCKET, clidatasock = INVALID_SOCKET;
  17. SASIZETYPE sasize;
  18. char * req = NULL;
  19. struct linger lg;
  20. struct pollfd fds;
  21. if(!(buf = myalloc(BUFSIZE))) RETURN(876);
  22. param->ctrlsock = param->clisock;
  23. param->operation = CONNECT;
  24. lg.l_onoff = 1;
  25. lg.l_linger = conf.timeouts[STRING_L];;
  26. if(socksend(param->ctrlsock, (unsigned char *)"220 Ready\r\n", 11, conf.timeouts[STRING_S])!=11) {RETURN (801);}
  27. for(;;){
  28. i = sockgetlinebuf(param, CLIENT, buf, BUFSIZE - 10, '\n', conf.timeouts[CONNECTION_S]);
  29. if(!i) {
  30. RETURN(0);
  31. }
  32. if(i<4) {RETURN(802);}
  33. buf[i] = 0;
  34. if ((se=(unsigned char *)strchr((char *)buf, '\r'))) *se = 0;
  35. if (req) myfree (req);
  36. req = NULL;
  37. if (!strncasecmp((char *)buf, "OPEN ", 5)){
  38. if(parsehostname((char *)buf+5, param, 21)){RETURN(803);}
  39. if(param->remsock != INVALID_SOCKET) {
  40. so._shutdown(param->remsock, SHUT_RDWR);
  41. so._closesocket(param->remsock);
  42. param->remsock = INVALID_SOCKET;
  43. }
  44. if((res = (*param->srv->authfunc)(param))) {RETURN(res);}
  45. param->ctrlsocksrv = param->remsock;
  46. if(socksend(param->ctrlsock, (unsigned char *)"220 Ready\r\n", 11, conf.timeouts[STRING_S])!=11) {RETURN (801);}
  47. status = 1;
  48. }
  49. else if (!strncasecmp((char *)buf, "USER ", 5)){
  50. if(parseconnusername((char *)buf +5, param, 0, 21)){RETURN(804);}
  51. if(!status){
  52. if((res = (*param->srv->authfunc)(param))) {RETURN(res);}
  53. param->ctrlsocksrv = param->remsock;
  54. }
  55. if(socksend(param->ctrlsock, (unsigned char *)"331 ok\r\n", 8, conf.timeouts[STRING_S])!=8) {RETURN (807);}
  56. status = 2;
  57. }
  58. else if (!strncasecmp((char *)buf, "PASS ", 5)){
  59. param->extpassword = (unsigned char *)mystrdup((char *)buf+5);
  60. inbuf = BUFSIZE;
  61. res = ftplogin(param, (char *)buf, &inbuf);
  62. param->res = res;
  63. if(inbuf && inbuf != BUFSIZE && socksend(param->ctrlsock, buf, inbuf, conf.timeouts[STRING_S])!=inbuf) {RETURN (807);}
  64. if(!res) status = 3;
  65. sprintf((char *)buf, "%.128s@%.128s%c%hu", param->extusername, param->hostname, (ntohs(*SAPORT(&param->sinsr))==21)?0:':', ntohs(*SAPORT(&param->sinsr)));
  66. req = mystrdup((char *)buf);
  67. #ifndef WITHMAIN
  68. {
  69. int action, reqbufsize, reqsize;
  70. reqbufsize = BUFSIZE;
  71. reqsize = (int)strlen((char *)buf) + 1;
  72. action = handlereqfilters(param, &buf, &reqbufsize, 0, &reqsize);
  73. if(action == HANDLED){
  74. RETURN(0);
  75. }
  76. if(action != PASS) RETURN(877);
  77. }
  78. #endif
  79. }
  80. else if (status >= 3 && (
  81. (!strncasecmp((char *)buf, "PASV", 4) && (pasv = 1)) ||
  82. (!strncasecmp((char *)buf, "EPSV", 4) && (pasv = 2)) ||
  83. (!strncasecmp((char *)buf, "PORT ", 5) && !(pasv = 0))
  84. )){
  85. #ifndef WITHMAIN
  86. {
  87. int action, reqbufsize, reqsize;
  88. reqbufsize = BUFSIZE;
  89. reqsize = (int)strlen((char *)buf) + 1;
  90. action = handlehdrfilterscli(param, &buf, &reqbufsize, 0, &reqsize);
  91. if(action == HANDLED){
  92. RETURN(0);
  93. }
  94. if(action != PASS) RETURN(878);
  95. }
  96. #endif
  97. if(sc != INVALID_SOCKET) {
  98. so._shutdown(sc, SHUT_RDWR);
  99. so._closesocket(sc);
  100. sc = INVALID_SOCKET;
  101. }
  102. if(ss != INVALID_SOCKET) {
  103. so._shutdown(ss, SHUT_RDWR);
  104. so._closesocket(ss);
  105. ss = INVALID_SOCKET;
  106. }
  107. if(clidatasock != INVALID_SOCKET) {
  108. so._shutdown(clidatasock, SHUT_RDWR);
  109. so._closesocket(clidatasock);
  110. clidatasock = INVALID_SOCKET;
  111. }
  112. if ((clidatasock=socket(SASOCK(&param->sincl), SOCK_STREAM, IPPROTO_TCP)) == INVALID_SOCKET) {RETURN(821);}
  113. *SAPORT(&param->sincl) = 0;
  114. if(so._bind(clidatasock, (struct sockaddr *)&param->sincl, SASIZE(&param->sincl))){RETURN(822);}
  115. if (pasv) {
  116. if(so._listen(clidatasock, 1)) {RETURN(823);}
  117. sasize = sizeof(param->sincl);
  118. if(so._getsockname(clidatasock, (struct sockaddr *)&param->sincl, &sasize)){RETURN(824);}
  119. if(pasv == 1){
  120. if(*SAFAMILY(&param->sincl) == AF_INET)
  121. sprintf((char *)buf, "227 OK (%u,%u,%u,%u,%u,%u)\r\n",
  122. (unsigned)(((unsigned char *)(SAADDR(&param->sincl)))[0]),
  123. (unsigned)(((unsigned char *)(SAADDR(&param->sincl)))[1]),
  124. (unsigned)(((unsigned char *)(SAADDR(&param->sincl)))[2]),
  125. (unsigned)(((unsigned char *)(SAADDR(&param->sincl)))[3]),
  126. (unsigned)(((unsigned char *)(SAPORT(&param->sincl)))[0]),
  127. (unsigned)(((unsigned char *)(SAPORT(&param->sincl)))[1])
  128. );
  129. else sprintf((char *)buf, "227 OK (127,0,0,1,%u,%u)\r\n",
  130. (unsigned)(((unsigned char *)(SAPORT(&param->sincl)))[0]),
  131. (unsigned)(((unsigned char *)(SAPORT(&param->sincl)))[1])
  132. );
  133. }
  134. else {
  135. sprintf((char *)buf, "229 OK (|||%u|)\r\n",
  136. (unsigned)ntohs(*SAPORT(&param->sincl))
  137. );
  138. }
  139. }
  140. else {
  141. unsigned long b1, b2, b3, b4;
  142. unsigned short b5, b6;
  143. if(sscanf((char *)buf+5, "%lu,%lu,%lu,%lu,%hu,%hu", &b1, &b2, &b3, &b4, &b5, &b6)!=6) {RETURN(828);}
  144. *SAPORT(&param->sincr) = htons((unsigned short)((b5<<8)^b6));
  145. if(connectwithpoll(clidatasock, (struct sockaddr *)&param->sincr, SASIZE(&param->sincr),CONNECT_TO)) {
  146. so._closesocket(clidatasock);
  147. clidatasock = INVALID_SOCKET;
  148. RETURN(826);
  149. }
  150. sprintf((char *)buf, "200 OK\r\n");
  151. }
  152. #ifndef WITHMAIN
  153. {
  154. int action, reqbufsize, reqsize;
  155. reqbufsize = BUFSIZE;
  156. reqsize = (int)strlen((char *)buf) + 1;
  157. action = handlehdrfilterssrv(param, &buf, &reqbufsize, 0, &reqsize);
  158. if(action == HANDLED){
  159. RETURN(0);
  160. }
  161. if(action != PASS) RETURN(879);
  162. }
  163. #endif
  164. if(socksend(param->ctrlsock, buf, (int)strlen((char *)buf), conf.timeouts[STRING_S])!=(int)strlen((char *)buf)) {RETURN (825);}
  165. status = 4;
  166. }
  167. else if (status == 4 && (
  168. !(strncasecmp((char *)buf, "RETR ", 5) && (param->operation = FTP_GET)) ||
  169. !(strncasecmp((char *)buf, "LIST", 4) && (param->operation = FTP_LIST))||
  170. !(strncasecmp((char *)buf, "NLST ", 5) && (param->operation = FTP_LIST)) ||
  171. !(strncasecmp((char *)buf, "MLSD", 4) && (param->operation = FTP_LIST)) ||
  172. !(strncasecmp((char *)buf, "APPE ", 5) && (param->operation = FTP_PUT)) ||
  173. !(strncasecmp((char *)buf, "STOR ", 5) && (param->operation = FTP_PUT))
  174. )){
  175. int arg = (buf[4] && buf[5])? 1:0;
  176. int ressent = 0;
  177. #ifndef WITHMAIN
  178. {
  179. int action, reqbufsize, reqsize;
  180. reqbufsize = BUFSIZE;
  181. reqsize = (int)strlen((char *)buf) + 1;
  182. action = handlehdrfilterscli(param, &buf, &reqbufsize, 0, &reqsize);
  183. if(action == HANDLED){
  184. RETURN(0);
  185. }
  186. if(action != PASS) RETURN(880);
  187. }
  188. #endif
  189. if(clidatasock == INVALID_SOCKET) { RETURN (829);}
  190. if(pasv){
  191. memset(&fds, 0, sizeof(fds));
  192. fds.fd = clidatasock;
  193. fds.events = POLLIN;
  194. res = so._poll (&fds, 1, conf.timeouts[STRING_L]*1000);
  195. if(res != 1) {
  196. RETURN(857);
  197. }
  198. sasize = sizeof(param->sincr);
  199. ss = so._accept(clidatasock, (struct sockaddr *)&param->sincr, &sasize);
  200. if (ss == INVALID_SOCKET) { RETURN (858);}
  201. so._shutdown(clidatasock, SHUT_RDWR);
  202. so._closesocket(clidatasock);
  203. clidatasock = ss;
  204. ss = INVALID_SOCKET;
  205. }
  206. if(clidatasock == INVALID_SOCKET){RETURN(828);}
  207. req = mystrdup((char *)buf);
  208. buf[4] = 0;
  209. status = 3;
  210. ss = ftpcommand(param, buf, arg? buf+5 : NULL);
  211. if (ss == INVALID_SOCKET) {
  212. so._shutdown(clidatasock, SHUT_RDWR);
  213. so._closesocket(clidatasock);
  214. clidatasock = INVALID_SOCKET;
  215. if(socksend(param->ctrlsock, (unsigned char *)"550 err\r\n", 9, conf.timeouts[STRING_S])!=9) {RETURN (831);}
  216. continue;
  217. }
  218. if(socksend(param->ctrlsock, (unsigned char *)"125 data\r\n", 10, conf.timeouts[STRING_S]) != 10) {
  219. param->remsock = INVALID_SOCKET;
  220. RETURN (832);
  221. }
  222. if(param->srvoffset < param->srvinbuf)while((i = sockgetlinebuf(param, SERVER, buf, BUFSIZE, '\n', 0)) > 3){
  223. if(socksend(param->ctrlsock, buf, i, conf.timeouts[STRING_S])!=i) {RETURN(833);}
  224. if(isnumber(*buf) && buf[3] != '-') {
  225. ressent = 1;
  226. break;
  227. }
  228. }
  229. sc = param->remsock;
  230. param->remsock = ss;
  231. so._setsockopt(param->remsock, SOL_SOCKET, SO_LINGER, (char *)&lg, sizeof(lg));
  232. so._setsockopt(clidatasock, SOL_SOCKET, SO_LINGER, (char *)&lg, sizeof(lg));
  233. param->clisock = clidatasock;
  234. res = mapsocket(param, conf.timeouts[CONNECTION_S]);
  235. if(param->remsock != INVALID_SOCKET) {
  236. so._shutdown (param->remsock, SHUT_RDWR);
  237. so._closesocket(param->remsock);
  238. }
  239. if(param->clisock != INVALID_SOCKET) {
  240. so._shutdown (param->clisock, SHUT_RDWR);
  241. so._closesocket(param->clisock);
  242. }
  243. param->clisock = param->ctrlsock;
  244. param->remsock = sc;
  245. sc = INVALID_SOCKET;
  246. ss = INVALID_SOCKET;
  247. clidatasock = INVALID_SOCKET;
  248. if(!ressent){
  249. while((i = sockgetlinebuf(param, SERVER, buf, BUFSIZE, '\n', conf.timeouts[STRING_L])) > 3){
  250. if(socksend(param->ctrlsock, buf, i, conf.timeouts[STRING_S])!=i) {RETURN(833);}
  251. if(isnumber(*buf) && buf[3] != '-') break;
  252. }
  253. if(i < 3) {RETURN(834);}
  254. }
  255. }
  256. else {
  257. if(status < 3) {
  258. if(socksend(param->remsock, (unsigned char *)"530 login\r\n", 11, conf.timeouts[STRING_S])!=1) {RETURN (810);}
  259. continue;
  260. }
  261. if(!strncasecmp((char *)buf, "QUIT", 4)) status = 5;
  262. if(!strncasecmp((char *)buf, "CWD ", 4)) req = mystrdup((char *)buf);
  263. i = (int)strlen((char *)buf);
  264. buf[i++] = '\r';
  265. buf[i++] = '\n';
  266. if(socksend(param->remsock, buf, i, conf.timeouts[STRING_S])!=i) {RETURN (811);}
  267. param->statscli64+=(i);
  268. param->nwrites++;
  269. while((i = sockgetlinebuf(param, SERVER, buf, BUFSIZE, '\n', conf.timeouts[STRING_L])) > 0){
  270. if(socksend(param->ctrlsock, buf, i, conf.timeouts[STRING_S])!=i) {RETURN (812);}
  271. if(i > 4 && isnumber(*buf) && buf[3] != '-') break;
  272. }
  273. if(status == 5) {RETURN (0);}
  274. if(i < 3) {RETURN (813);}
  275. }
  276. sasize = sizeof(param->sincr);
  277. if(so._getpeername(param->ctrlsock, (struct sockaddr *)&param->sincr, &sasize)){RETURN(819);}
  278. if(req && (param->statscli64 || param->statssrv64)){
  279. (*param->srv->logfunc)(param, (unsigned char *)req);
  280. }
  281. }
  282. CLEANRET:
  283. if(sc != INVALID_SOCKET) {
  284. so._shutdown(sc, SHUT_RDWR);
  285. so._closesocket(sc);
  286. }
  287. if(ss != INVALID_SOCKET) {
  288. so._shutdown(ss, SHUT_RDWR);
  289. so._closesocket(ss);
  290. }
  291. if(clidatasock != INVALID_SOCKET) {
  292. so._shutdown(clidatasock, SHUT_RDWR);
  293. so._closesocket(clidatasock);
  294. }
  295. sasize = sizeof(param->sincr);
  296. so._getpeername(param->ctrlsock, (struct sockaddr *)&param->sincr, &sasize);
  297. if(param->res != 0 || param->statscli64 || param->statssrv64 ){
  298. (*param->srv->logfunc)(param, (unsigned char *)((req && (param->res > 802))? req:NULL));
  299. }
  300. if(req) myfree(req);
  301. if(buf) myfree(buf);
  302. freeparam(param);
  303. return (NULL);
  304. }
  305. #ifdef WITHMAIN
  306. struct proxydef childdef = {
  307. ftpprchild,
  308. 21,
  309. 0,
  310. S_FTPPR,
  311. " -hdefault_host[:port] - use this host and port as default if no host specified\n"
  312. };
  313. #include "proxymain.c"
  314. #endif