mirror of
https://github.com/clearml/dropbear
synced 2025-04-06 21:54:24 +00:00
Rework netcat-alike to be a proper mode, with -B argument.
--HG-- branch : dbclient-netcat-alike extra : convert_revision : b02ba6628cf2095017c60d202ac630f231e6b553
This commit is contained in:
parent
1c72a35ddb
commit
af00c78e21
@ -78,6 +78,9 @@ void addnewvar(const char* param, const char* var);
|
|||||||
void cli_send_chansess_request();
|
void cli_send_chansess_request();
|
||||||
void cli_tty_cleanup();
|
void cli_tty_cleanup();
|
||||||
void cli_chansess_winchange();
|
void cli_chansess_winchange();
|
||||||
|
#ifdef ENABLE_CLI_NETCAT
|
||||||
|
void cli_send_netcat_request();
|
||||||
|
#endif
|
||||||
|
|
||||||
void svr_chansessinitialise();
|
void svr_chansessinitialise();
|
||||||
extern const struct ChanType svrchansess;
|
extern const struct ChanType svrchansess;
|
||||||
|
@ -338,9 +338,8 @@ static void send_chansess_shell_req(struct Channel *channel) {
|
|||||||
TRACE(("leave send_chansess_shell_req"))
|
TRACE(("leave send_chansess_shell_req"))
|
||||||
}
|
}
|
||||||
|
|
||||||
static int cli_initchansess(struct Channel *channel) {
|
/* Shared for normal client channel and netcat-alike */
|
||||||
|
static int cli_init_stdpipe_sess(struct Channel *channel) {
|
||||||
|
|
||||||
channel->writefd = STDOUT_FILENO;
|
channel->writefd = STDOUT_FILENO;
|
||||||
setnonblocking(STDOUT_FILENO);
|
setnonblocking(STDOUT_FILENO);
|
||||||
|
|
||||||
@ -351,6 +350,12 @@ static int cli_initchansess(struct Channel *channel) {
|
|||||||
setnonblocking(STDERR_FILENO);
|
setnonblocking(STDERR_FILENO);
|
||||||
|
|
||||||
channel->extrabuf = cbuf_new(opts.recv_window);
|
channel->extrabuf = cbuf_new(opts.recv_window);
|
||||||
|
return 0;
|
||||||
|
}
|
||||||
|
|
||||||
|
static int cli_initchansess(struct Channel *channel) {
|
||||||
|
|
||||||
|
cli_init_stdpipe_sess(channel);
|
||||||
|
|
||||||
if (cli_opts.wantpty) {
|
if (cli_opts.wantpty) {
|
||||||
send_chansess_pty_req(channel);
|
send_chansess_pty_req(channel);
|
||||||
@ -363,52 +368,60 @@ static int cli_initchansess(struct Channel *channel) {
|
|||||||
}
|
}
|
||||||
|
|
||||||
return 0; /* Success */
|
return 0; /* Success */
|
||||||
|
|
||||||
}
|
}
|
||||||
|
|
||||||
void cli_send_chansess_request() {
|
#ifdef ENABLE_CLI_NETCAT
|
||||||
|
|
||||||
unsigned int port = 0;
|
void cli_send_netcat_request() {
|
||||||
unsigned char* addr = NULL;
|
|
||||||
unsigned char* ipstring = "127.0.0.1";
|
|
||||||
unsigned char* portstring = "22";
|
|
||||||
|
|
||||||
/* hack hack */
|
const unsigned char* source_host = "127.0.0.1";
|
||||||
static const struct ChanType cli_chan_tcphack = {
|
const int source_port = 22;
|
||||||
|
|
||||||
|
const struct ChanType cli_chan_netcat = {
|
||||||
0, /* sepfds */
|
0, /* sepfds */
|
||||||
"direct-tcpip",
|
"direct-tcpip",
|
||||||
NULL,
|
cli_init_stdpipe_sess, /* inithandler */
|
||||||
NULL,
|
NULL,
|
||||||
NULL,
|
NULL,
|
||||||
cli_closechansess
|
cli_closechansess
|
||||||
};
|
};
|
||||||
|
|
||||||
TRACE(("enter cli_send_chansess_request"))
|
cli_opts.wantpty = 0;
|
||||||
if (send_msg_channel_open_init(STDIN_FILENO, &cli_chan_tcphack)
|
|
||||||
|
if (send_msg_channel_open_init(STDIN_FILENO, &cli_chan_netcat)
|
||||||
== DROPBEAR_FAILURE) {
|
== DROPBEAR_FAILURE) {
|
||||||
dropbear_exit("Couldn't open initial channel");
|
dropbear_exit("Couldn't open initial channel");
|
||||||
}
|
}
|
||||||
|
|
||||||
if (cli_opts.localfwds == NULL) {
|
buf_putstring(ses.writepayload, cli_opts.netcat_host,
|
||||||
dropbear_exit("You need to give a \"-L ignored:host:port\" option with this hacked up dbclient.");
|
strlen(cli_opts.netcat_host));
|
||||||
|
buf_putint(ses.writepayload, cli_opts.netcat_port);
|
||||||
|
|
||||||
|
/* originator ip - localhost is accurate enough */
|
||||||
|
buf_putstring(ses.writepayload, source_host, strlen(source_host));
|
||||||
|
buf_putint(ses.writepayload, source_port);
|
||||||
|
|
||||||
|
encrypt_packet();
|
||||||
|
TRACE(("leave cli_send_chansess_request"))
|
||||||
|
}
|
||||||
|
#endif
|
||||||
|
|
||||||
|
void cli_send_chansess_request() {
|
||||||
|
|
||||||
|
TRACE(("enter cli_send_chansess_request"))
|
||||||
|
|
||||||
|
if (send_msg_channel_open_init(STDIN_FILENO, &clichansess)
|
||||||
|
== DROPBEAR_FAILURE) {
|
||||||
|
dropbear_exit("Couldn't open initial channel");
|
||||||
}
|
}
|
||||||
|
|
||||||
addr = cli_opts.localfwds->connectaddr;
|
/* No special channel request data */
|
||||||
port = cli_opts.localfwds->connectport;
|
|
||||||
|
|
||||||
buf_putstring(ses.writepayload, addr, strlen(addr));
|
|
||||||
buf_putint(ses.writepayload, port);
|
|
||||||
|
|
||||||
/* originator ip */
|
|
||||||
buf_putstring(ses.writepayload, ipstring, strlen(ipstring));
|
|
||||||
/* originator port */
|
|
||||||
buf_putint(ses.writepayload, atol(portstring));
|
|
||||||
|
|
||||||
encrypt_packet();
|
encrypt_packet();
|
||||||
TRACE(("leave cli_send_chansess_request"))
|
TRACE(("leave cli_send_chansess_request"))
|
||||||
|
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
||||||
#if 0
|
#if 0
|
||||||
while (cli_opts.localfwds != NULL) {
|
while (cli_opts.localfwds != NULL) {
|
||||||
ret = cli_localtcp(cli_opts.localfwds->listenport,
|
ret = cli_localtcp(cli_opts.localfwds->listenport,
|
||||||
|
@ -33,12 +33,15 @@
|
|||||||
cli_runopts cli_opts; /* GLOBAL */
|
cli_runopts cli_opts; /* GLOBAL */
|
||||||
|
|
||||||
static void printhelp();
|
static void printhelp();
|
||||||
static void parsehostname(char* userhostarg);
|
static void parsehostname(const char* orighostarg);
|
||||||
#ifdef ENABLE_CLI_PUBKEY_AUTH
|
#ifdef ENABLE_CLI_PUBKEY_AUTH
|
||||||
static void loadidentityfile(const char* filename);
|
static void loadidentityfile(const char* filename);
|
||||||
#endif
|
#endif
|
||||||
#ifdef ENABLE_CLI_ANYTCPFWD
|
#ifdef ENABLE_CLI_ANYTCPFWD
|
||||||
static void addforward(char* str, struct TCPFwdList** fwdlist);
|
static void addforward(const char* str, struct TCPFwdList** fwdlist);
|
||||||
|
#endif
|
||||||
|
#ifdef ENABLE_CLI_NETCAT
|
||||||
|
static void add_netcat(const char *str);
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
static void printhelp() {
|
static void printhelp() {
|
||||||
@ -65,6 +68,9 @@ static void printhelp() {
|
|||||||
#endif
|
#endif
|
||||||
"-W <receive_window_buffer> (default %d, larger may be faster, max 1MB)\n"
|
"-W <receive_window_buffer> (default %d, larger may be faster, max 1MB)\n"
|
||||||
"-K <keepalive> (0 is never, default %d)\n"
|
"-K <keepalive> (0 is never, default %d)\n"
|
||||||
|
#ifdef ENABLE_CLI_NETCAT
|
||||||
|
"-B <endhost:endport> Netcat-alike bouncing\n"
|
||||||
|
#endif
|
||||||
#ifdef DEBUG_TRACE
|
#ifdef DEBUG_TRACE
|
||||||
"-v verbose\n"
|
"-v verbose\n"
|
||||||
#endif
|
#endif
|
||||||
@ -86,6 +92,9 @@ void cli_getopts(int argc, char ** argv) {
|
|||||||
#endif
|
#endif
|
||||||
#ifdef ENABLE_CLI_REMOTETCPFWD
|
#ifdef ENABLE_CLI_REMOTETCPFWD
|
||||||
int nextisremote = 0;
|
int nextisremote = 0;
|
||||||
|
#endif
|
||||||
|
#ifdef ENABLE_CLI_NETCAT
|
||||||
|
int nextisnetcat = 0;
|
||||||
#endif
|
#endif
|
||||||
char* dummy = NULL; /* Not used for anything real */
|
char* dummy = NULL; /* Not used for anything real */
|
||||||
|
|
||||||
@ -143,6 +152,14 @@ void cli_getopts(int argc, char ** argv) {
|
|||||||
nextislocal = 0;
|
nextislocal = 0;
|
||||||
continue;
|
continue;
|
||||||
}
|
}
|
||||||
|
#endif
|
||||||
|
#ifdef ENABLE_CLI_NETCAT
|
||||||
|
if (nextisnetcat) {
|
||||||
|
TRACE(("nextisnetcat true"))
|
||||||
|
add_netcat(argv[i]);
|
||||||
|
nextisnetcat = 0;
|
||||||
|
continue;
|
||||||
|
}
|
||||||
#endif
|
#endif
|
||||||
if (next) {
|
if (next) {
|
||||||
/* The previous flag set a value to assign */
|
/* The previous flag set a value to assign */
|
||||||
@ -198,6 +215,11 @@ void cli_getopts(int argc, char ** argv) {
|
|||||||
case 'R':
|
case 'R':
|
||||||
nextisremote = 1;
|
nextisremote = 1;
|
||||||
break;
|
break;
|
||||||
|
#endif
|
||||||
|
#ifdef ENABLE_CLI_NETCAT
|
||||||
|
case 'B':
|
||||||
|
nextisnetcat = 1;
|
||||||
|
break;
|
||||||
#endif
|
#endif
|
||||||
case 'l':
|
case 'l':
|
||||||
next = &cli_opts.username;
|
next = &cli_opts.username;
|
||||||
@ -351,15 +373,13 @@ static void loadidentityfile(const char* filename) {
|
|||||||
#endif
|
#endif
|
||||||
|
|
||||||
|
|
||||||
/* Parses a [user@]hostname argument. userhostarg is the argv[i] corresponding
|
/* Parses a [user@]hostname argument. orighostarg is the argv[i] corresponding */
|
||||||
* - note that it will be modified */
|
static void parsehostname(const char* orighostarg) {
|
||||||
static void parsehostname(char* orighostarg) {
|
|
||||||
|
|
||||||
uid_t uid;
|
uid_t uid;
|
||||||
struct passwd *pw = NULL;
|
struct passwd *pw = NULL;
|
||||||
char *userhostarg = NULL;
|
char *userhostarg = NULL;
|
||||||
|
|
||||||
/* We probably don't want to be editing argvs */
|
|
||||||
userhostarg = m_strdup(orighostarg);
|
userhostarg = m_strdup(orighostarg);
|
||||||
|
|
||||||
cli_opts.remotehost = strchr(userhostarg, '@');
|
cli_opts.remotehost = strchr(userhostarg, '@');
|
||||||
@ -389,10 +409,48 @@ static void parsehostname(char* orighostarg) {
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
#ifdef ENABLE_CLI_NETCAT
|
||||||
|
static void add_netcat(const char* origstr) {
|
||||||
|
char *portstr = NULL;
|
||||||
|
|
||||||
|
char * str = m_strdup(origstr);
|
||||||
|
|
||||||
|
portstr = strchr(str, ':');
|
||||||
|
if (portstr == NULL) {
|
||||||
|
TRACE(("No netcat port"))
|
||||||
|
goto fail;
|
||||||
|
}
|
||||||
|
*portstr = '\0';
|
||||||
|
portstr++;
|
||||||
|
|
||||||
|
if (strchr(portstr, ':')) {
|
||||||
|
TRACE(("Multiple netcat colons"))
|
||||||
|
goto fail;
|
||||||
|
}
|
||||||
|
|
||||||
|
cli_opts.netcat_port = strtoul(portstr, NULL, 10);
|
||||||
|
if (errno != 0) {
|
||||||
|
TRACE(("bad netcat port"))
|
||||||
|
goto fail;
|
||||||
|
}
|
||||||
|
|
||||||
|
if (cli_opts.netcat_port > 65535) {
|
||||||
|
TRACE(("too large netcat port"))
|
||||||
|
goto fail;
|
||||||
|
}
|
||||||
|
|
||||||
|
cli_opts.netcat_host = str;
|
||||||
|
return;
|
||||||
|
|
||||||
|
fail:
|
||||||
|
dropbear_exit("Bad netcat endpoint '%s'", origstr);
|
||||||
|
}
|
||||||
|
#endif
|
||||||
|
|
||||||
#ifdef ENABLE_CLI_ANYTCPFWD
|
#ifdef ENABLE_CLI_ANYTCPFWD
|
||||||
/* Turn a "listenport:remoteaddr:remoteport" string into into a forwarding
|
/* Turn a "listenport:remoteaddr:remoteport" string into into a forwarding
|
||||||
* set, and add it to the forwarding list */
|
* set, and add it to the forwarding list */
|
||||||
static void addforward(char* origstr, struct TCPFwdList** fwdlist) {
|
static void addforward(const char* origstr, struct TCPFwdList** fwdlist) {
|
||||||
|
|
||||||
char * listenport = NULL;
|
char * listenport = NULL;
|
||||||
char * connectport = NULL;
|
char * connectport = NULL;
|
||||||
@ -428,13 +486,13 @@ static void addforward(char* origstr, struct TCPFwdList** fwdlist) {
|
|||||||
|
|
||||||
/* Now we check the ports - note that the port ints are unsigned,
|
/* Now we check the ports - note that the port ints are unsigned,
|
||||||
* the check later only checks for >= MAX_PORT */
|
* the check later only checks for >= MAX_PORT */
|
||||||
newfwd->listenport = strtol(listenport, NULL, 10);
|
newfwd->listenport = strtoul(listenport, NULL, 10);
|
||||||
if (errno != 0) {
|
if (errno != 0) {
|
||||||
TRACE(("bad listenport strtol"))
|
TRACE(("bad listenport strtol"))
|
||||||
goto fail;
|
goto fail;
|
||||||
}
|
}
|
||||||
|
|
||||||
newfwd->connectport = strtol(connectport, NULL, 10);
|
newfwd->connectport = strtoul(connectport, NULL, 10);
|
||||||
if (errno != 0) {
|
if (errno != 0) {
|
||||||
TRACE(("bad connectport strtol"))
|
TRACE(("bad connectport strtol"))
|
||||||
goto fail;
|
goto fail;
|
||||||
|
@ -197,20 +197,6 @@ static void cli_sessionloop() {
|
|||||||
TRACE(("leave cli_sessionloop: cli_auth_try"))
|
TRACE(("leave cli_sessionloop: cli_auth_try"))
|
||||||
return;
|
return;
|
||||||
|
|
||||||
/*
|
|
||||||
case USERAUTH_SUCCESS_RCVD:
|
|
||||||
send_msg_service_request(SSH_SERVICE_CONNECTION);
|
|
||||||
cli_ses.state = SERVICE_CONN_REQ_SENT;
|
|
||||||
TRACE(("leave cli_sessionloop: sent ssh-connection service req"))
|
|
||||||
return;
|
|
||||||
|
|
||||||
case SERVICE_CONN_ACCEPT_RCVD:
|
|
||||||
cli_send_chansess_request();
|
|
||||||
TRACE(("leave cli_sessionloop: cli_send_chansess_request"))
|
|
||||||
cli_ses.state = SESSION_RUNNING;
|
|
||||||
return;
|
|
||||||
*/
|
|
||||||
|
|
||||||
case USERAUTH_SUCCESS_RCVD:
|
case USERAUTH_SUCCESS_RCVD:
|
||||||
|
|
||||||
if (cli_opts.backgrounded) {
|
if (cli_opts.backgrounded) {
|
||||||
@ -230,12 +216,18 @@ static void cli_sessionloop() {
|
|||||||
}
|
}
|
||||||
|
|
||||||
#ifdef ENABLE_CLI_LOCALTCPFWD
|
#ifdef ENABLE_CLI_LOCALTCPFWD
|
||||||
//setup_localtcp();
|
setup_localtcp();
|
||||||
#endif
|
#endif
|
||||||
#ifdef ENABLE_CLI_REMOTETCPFWD
|
#ifdef ENABLE_CLI_REMOTETCPFWD
|
||||||
//setup_remotetcp();
|
setup_remotetcp();
|
||||||
#endif
|
#endif
|
||||||
if (!cli_opts.no_cmd) {
|
|
||||||
|
#ifdef ENABLE_CLI_NETCAT
|
||||||
|
if (cli_opts.netcat_host) {
|
||||||
|
cli_send_netcat_request();
|
||||||
|
} else
|
||||||
|
#endif
|
||||||
|
if (!cli_opts.no_cmd) {
|
||||||
cli_send_chansess_request();
|
cli_send_chansess_request();
|
||||||
}
|
}
|
||||||
TRACE(("leave cli_sessionloop: running"))
|
TRACE(("leave cli_sessionloop: running"))
|
||||||
|
2
dbutil.c
2
dbutil.c
@ -146,7 +146,7 @@ void dropbear_trace(const char* format, ...) {
|
|||||||
}
|
}
|
||||||
|
|
||||||
va_start(param, format);
|
va_start(param, format);
|
||||||
fprintf(stderr, "TRACE: ");
|
fprintf(stderr, "TRACE (%d): ", getpid());
|
||||||
vfprintf(stderr, format, param);
|
vfprintf(stderr, format, param);
|
||||||
fprintf(stderr, "\n");
|
fprintf(stderr, "\n");
|
||||||
va_end(param);
|
va_end(param);
|
||||||
|
@ -66,6 +66,10 @@ etc) slower (perhaps by 50%). Recommended for most small systems. */
|
|||||||
/* Enable Authentication Agent Forwarding - server only for now */
|
/* Enable Authentication Agent Forwarding - server only for now */
|
||||||
#define ENABLE_AGENTFWD
|
#define ENABLE_AGENTFWD
|
||||||
|
|
||||||
|
/* Enable "Netcat mode". TODO describe here. */
|
||||||
|
#define ENABLE_CLI_NETCAT
|
||||||
|
|
||||||
|
|
||||||
/* Encryption - at least one required.
|
/* Encryption - at least one required.
|
||||||
* RFC Draft requires 3DES and recommends AES128 for interoperability.
|
* RFC Draft requires 3DES and recommends AES128 for interoperability.
|
||||||
* Including multiple keysize variants the same cipher
|
* Including multiple keysize variants the same cipher
|
||||||
|
@ -118,6 +118,11 @@ typedef struct cli_runopts {
|
|||||||
struct TCPFwdList * localfwds;
|
struct TCPFwdList * localfwds;
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
|
#ifdef ENABLE_CLI_NETCAT
|
||||||
|
char *netcat_host;
|
||||||
|
unsigned int netcat_port;
|
||||||
|
#endif
|
||||||
|
|
||||||
} cli_runopts;
|
} cli_runopts;
|
||||||
|
|
||||||
extern cli_runopts cli_opts;
|
extern cli_runopts cli_opts;
|
||||||
|
Loading…
Reference in New Issue
Block a user