File: sockd_ckcf.c

package info (click to toggle)
socks4-server 4.3.beta2-12
  • links: PTS
  • area: main
  • in suites: woody
  • size: 1,512 kB
  • ctags: 1,778
  • sloc: ansic: 19,304; makefile: 404; sh: 52
file content (92 lines) | stat: -rw-r--r-- 2,203 bytes parent folder | download | duplicates (9)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
/* sockd_ckcf */

#include <sys/types.h>
#include <sys/stat.h>
#include <fcntl.h>
#include <syslog.h>
#include <netinet/in.h>
#include <arpa/inet.h>
#include <netdb.h>
#include <stdio.h>
#include <ctype.h>
#if (defined(sun) && !defined(SOLARIS)) || defined(sgi)
#include <strings.h>
#else
#include <string.h>
#endif
#include "socks.h"
#include "ident.h"

int sockd_ckcf(srcshp, dstshp, useIdentd, in, cfAddr, Ncf, no_identd_cmd, bad_id_cmd, useSyslog)
/* Return 0 if sockd should be used,
	  1 if direct connection should be made,
	 -1 if the connection request should be denied.
 */
struct sockshost_s *srcshp, *dstshp;
int useIdentd, in;
struct config *cfAddr;
int Ncf;
char *no_identd_cmd, *bad_id_cmd;
int useSyslog;
{
	unsigned short	dst_sin_port = ntohs(dstshp->port); 
	int i;
	struct config *cp;
	IDENT *ident_lookup(), *idp;
	int permit;
  
  
	for (i = 0, cp = cfAddr; i++ < Ncf; cp++) {

		if (socks_ckadr(srcshp, cp->sdomain, &cp->saddr, &cp->smask) &&
		    socks_ckadr(dstshp, cp->ddomain, &cp->daddr, &cp->dmask) &&
		    socks_ckusr(cp->userlist, srcshp->user, useSyslog) &&
		    socks_ckprt(cp->tst, dst_sin_port, cp->dport))
			goto GotIt;

	}

	return SOCKD_DENY;

GotIt:
	permit = cp->action;
	if (cp->use_identd == 3)
		useIdentd = 0;
	else if (cp->use_identd != 0)
		useIdentd = cp->use_identd;

	/* Don't bother to do identd unless we are to permit access */
	if ((useIdentd == 0) || (permit == SOCKD_DENY)) {
		if (cp->cmdp != NULL) {
			socks_shell_cmd(cp->cmdp, srcshp, dstshp);
		}
		return permit;
	}
	idp = ident_lookup(in, IDENTD_TIMEOUT);
	if (idp == NULL) {
		ident_free(idp);
		if (no_identd_cmd != NULL) {
			socks_shell_cmd(no_identd_cmd, srcshp, dstshp);
		}
		if ((useIdentd == 1) && (cp->cmdp != NULL)) {
		/* will permit access */
			socks_shell_cmd(cp->cmdp, srcshp, dstshp);
		}
		permit = -useIdentd;
		return permit;
	}
	strncpy(srcshp->ruser, idp->identifier, sizeof(srcshp->ruser));
	ident_free(idp);
	if (strcmp(srcshp->ruser, srcshp->user) != 0) {
		if (bad_id_cmd != NULL) {
			socks_shell_cmd(bad_id_cmd, srcshp, dstshp);
		}
		permit = -3;
		return permit;
	}
	if (cp->cmdp != NULL) {
		socks_shell_cmd(cp->cmdp, srcshp, dstshp);
	}
	return permit;
}