520 lines
12 KiB
Text
520 lines
12 KiB
Text
$NetBSD: patch-bc,v 1.1.1.1 1999/10/08 04:34:43 dbj Exp $
|
|
|
|
--- pppd/cbcp.c.orig2 Sat Sep 25 12:51:36 1999
|
|
+++ pppd/cbcp.c Sat Sep 25 13:11:31 1999
|
|
@@ -17,4 +17,25 @@
|
|
* IMPLIED WARRANTIES, INCLUDING, WITHOUT LIMITATION, THE IMPLIED
|
|
* WARRANTIES OF MERCHANTIBILITY AND FITNESS FOR A PARTICULAR PURPOSE.
|
|
*/
|
|
+
|
|
+/*
|
|
+ * Microsoft Call Back Configuration Protocol.
|
|
+ * by Pedro Roque Marques
|
|
+ *
|
|
+ * The CBCP is a method by which the Microsoft Windows NT Server may
|
|
+ * implement additional security. It is possible to configure the server
|
|
+ * in such a manner so as to require that the client systems which
|
|
+ * connect with it are required that following a valid authentication to
|
|
+ * leave a method by which the number may be returned call.
|
|
+ *
|
|
+ * It is a requirement of servers so configured that the protocol be
|
|
+ * exchanged.
|
|
+ *
|
|
+ * So, this set of patches may be applied to the pppd process to enable
|
|
+ * the cbcp client *only* portion of the specification. It is primarily
|
|
+ * meant to permit connection with Windows NT Servers.
|
|
+ *
|
|
+ * The ietf-working specification may be obtained from ftp.microsoft.com
|
|
+ * in the developr/rfc directory.
|
|
+ */
|
|
|
|
@@ -32,14 +52,25 @@
|
|
|
|
static const char rcsid[] = RCSID;
|
|
|
|
+void network_phase __P((int));
|
|
+
|
|
/*
|
|
* Options.
|
|
*/
|
|
static int setcbcp __P((char **));
|
|
+static int setcbcpreq __P((char **));
|
|
+static int setnocbcp __P((char **));
|
|
|
|
static option_t cbcp_option_list[] = {
|
|
{ "callback", o_special, setcbcp,
|
|
"Ask for callback" },
|
|
+ { "+callback", o_special_noarg, setcbcpreq,
|
|
+ "Ask for callback" },
|
|
+ { "nocallback", o_special, setnocbcp,
|
|
+ "Don't allow callbacks" },
|
|
+ { "-callback", o_special, setnocbcp,
|
|
+ "Don't allow callbacks" },
|
|
+
|
|
{ NULL }
|
|
};
|
|
|
|
@@ -48,7 +79,9 @@
|
|
*/
|
|
static void cbcp_init __P((int unit));
|
|
static void cbcp_open __P((int unit));
|
|
+static void cbcp_close __P((int unit, char *));
|
|
static void cbcp_lowerup __P((int unit));
|
|
+static void cbcp_lowerdown __P((int unit));
|
|
static void cbcp_input __P((int unit, u_char *pkt, int len));
|
|
static void cbcp_protrej __P((int unit));
|
|
static int cbcp_printpkt __P((u_char *pkt, int len,
|
|
@@ -61,12 +94,12 @@
|
|
cbcp_input,
|
|
cbcp_protrej,
|
|
cbcp_lowerup,
|
|
- NULL,
|
|
+ cbcp_lowerdown,
|
|
cbcp_open,
|
|
- NULL,
|
|
+ cbcp_close,
|
|
cbcp_printpkt,
|
|
NULL,
|
|
- 0,
|
|
+ 1,
|
|
"CBCP",
|
|
NULL,
|
|
cbcp_option_list,
|
|
@@ -80,23 +113,46 @@
|
|
/* internal prototypes */
|
|
|
|
static void cbcp_recvreq __P((cbcp_state *us, char *pckt, int len));
|
|
-static void cbcp_resp __P((cbcp_state *us));
|
|
-static void cbcp_up __P((cbcp_state *us));
|
|
static void cbcp_recvack __P((cbcp_state *us, char *pckt, int len));
|
|
+static void cbcp_recvresp __P((cbcp_state *us, char *pckt, int len));
|
|
+static void cbcp_resp __P((cbcp_state *us));
|
|
+static void cbcp_req __P((cbcp_state *us));
|
|
+static void cbcp_ack __P((cbcp_state *us));
|
|
static void cbcp_send __P((cbcp_state *us, u_char code, u_char *buf, int len));
|
|
+static void cbcp_up __P((cbcp_state *us));
|
|
|
|
/* option processing */
|
|
static int
|
|
setcbcp(argv)
|
|
char **argv;
|
|
{
|
|
- lcp_wantoptions[0].neg_cbcp = 1;
|
|
- cbcp_protent.enabled_flag = 1;
|
|
+ lcp_allowoptions[0].neg_cbcp = 1;
|
|
cbcp[0].us_number = strdup(*argv);
|
|
if (cbcp[0].us_number == 0)
|
|
novm("callback number");
|
|
- cbcp[0].us_type |= (1 << CB_CONF_USER);
|
|
- cbcp[0].us_type |= (1 << CB_CONF_ADMIN);
|
|
+ if (cbcp[0].us_number[0] == '-')
|
|
+ cbcp[0].us_type = (1 << CB_CONF_NO);
|
|
+ else
|
|
+ {
|
|
+ cbcp[0].us_type = (1 << CB_CONF_USER);
|
|
+ cbcp[0].us_type |= (1 << CB_CONF_ADMIN);
|
|
+ }
|
|
+ return (1);
|
|
+}
|
|
+
|
|
+static int
|
|
+setnocbcp(argv)
|
|
+ char **argv;
|
|
+{
|
|
+ lcp_allowoptions[0].neg_cbcp = lcp_wantoptions[0].neg_cbcp = 0;
|
|
+ return (1);
|
|
+}
|
|
+
|
|
+static int
|
|
+setcbcpreq(argv)
|
|
+ char **argv;
|
|
+{
|
|
+ lcp_wantoptions[0].neg_cbcp = 1;
|
|
return (1);
|
|
}
|
|
|
|
@@ -110,7 +166,8 @@
|
|
us = &cbcp[iface];
|
|
memset(us, 0, sizeof(cbcp_state));
|
|
us->us_unit = iface;
|
|
- us->us_type |= (1 << CB_CONF_NO);
|
|
+ us->us_type = (1 << CB_CONF_NO);
|
|
+ us->us_id = 1;
|
|
}
|
|
|
|
/* lower layer is up */
|
|
@@ -120,18 +177,60 @@
|
|
{
|
|
cbcp_state *us = &cbcp[iface];
|
|
|
|
- dbglog("cbcp_lowerup");
|
|
- dbglog("want: %d", us->us_type);
|
|
+ if (debug)
|
|
+ {
|
|
+ dbglog("cbcp_lowerup");
|
|
+ dbglog("want: %d", us->us_type);
|
|
|
|
- if (us->us_type == CB_CONF_USER)
|
|
- dbglog("phone no: %s", us->us_number);
|
|
+ if (us->us_type & (1 << CB_CONF_USER))
|
|
+ dbglog("phone no: %s", us->us_number);
|
|
+ }
|
|
+}
|
|
+
|
|
+static void
|
|
+cbcp_lowerdown(iface)
|
|
+ int iface;
|
|
+{
|
|
+ if(debug)
|
|
+ dbglog("cbcp_lowerdown");
|
|
}
|
|
|
|
static void
|
|
cbcp_open(unit)
|
|
int unit;
|
|
{
|
|
- dbglog("cbcp_open");
|
|
+ lcp_options *ho = &lcp_hisoptions[unit];
|
|
+ lcp_options *ao = &lcp_allowoptions[unit];
|
|
+ lcp_options *wo = &lcp_wantoptions[unit];
|
|
+ lcp_options *go = &lcp_gotoptions[unit];
|
|
+ cbcp_state *us = &cbcp[unit];
|
|
+
|
|
+ if(debug)
|
|
+ dbglog("cbcp_open");
|
|
+ if(ao->neg_cbcp)
|
|
+ {
|
|
+ if(ho->neg_cbcp)
|
|
+ {
|
|
+ cbcp_req(us);
|
|
+ return;
|
|
+ }
|
|
+ }
|
|
+ else if(wo->neg_cbcp)
|
|
+ {
|
|
+ if(!go->neg_cbcp)
|
|
+ lcp_close(0, "Callback required");
|
|
+ return;
|
|
+ }
|
|
+ cbcp_up(us);
|
|
+}
|
|
+
|
|
+static void
|
|
+cbcp_close(unit, reason)
|
|
+ int unit;
|
|
+ char *reason;
|
|
+{
|
|
+ if(debug)
|
|
+ dbglog("cbcp_close: %s", reason);
|
|
}
|
|
|
|
/* process an incomming packet */
|
|
@@ -174,11 +273,13 @@
|
|
break;
|
|
|
|
case CBCP_RESP:
|
|
- dbglog("CBCP_RESP received");
|
|
+ if (id != us->us_id && debug)
|
|
+ dbglog("id doesn't match: expected %d recv %d", us->us_id, id);
|
|
+ cbcp_recvresp(us, inp, len);
|
|
break;
|
|
|
|
case CBCP_ACK:
|
|
- if (id != us->us_id)
|
|
+ if (id != us->us_id && debug)
|
|
dbglog("id doesn't match: expected %d recv %d",
|
|
us->us_id, id);
|
|
|
|
@@ -298,7 +399,8 @@
|
|
address[0] = 0;
|
|
|
|
while (len) {
|
|
- dbglog("length: %d", len);
|
|
+ if (debug)
|
|
+ dbglog("length: %d", len);
|
|
|
|
GETCHAR(type, pckt);
|
|
GETCHAR(opt_len, pckt);
|
|
@@ -310,22 +412,22 @@
|
|
|
|
switch(type) {
|
|
case CB_CONF_NO:
|
|
- dbglog("no callback allowed");
|
|
+ dbglog("Callback: none");
|
|
break;
|
|
|
|
case CB_CONF_USER:
|
|
- dbglog("user callback allowed");
|
|
if (opt_len > 4) {
|
|
GETCHAR(addr_type, pckt);
|
|
memcpy(address, pckt, opt_len - 4);
|
|
address[opt_len - 4] = 0;
|
|
- if (address[0])
|
|
- dbglog("address: %s", address);
|
|
+ dbglog("Callback: user callback, address: '%s'", address);
|
|
}
|
|
+ else
|
|
+ dbglog("Callback: user callback");
|
|
break;
|
|
|
|
case CB_CONF_ADMIN:
|
|
- dbglog("user admin defined allowed");
|
|
+ dbglog("Callback: user admin defined");
|
|
break;
|
|
|
|
case CB_CONF_LIST:
|
|
@@ -347,29 +449,35 @@
|
|
int len = 0;
|
|
|
|
cb_type = us->us_allowed & us->us_type;
|
|
- dbglog("cbcp_resp cb_type=%d", cb_type);
|
|
+ if (debug)
|
|
+ dbglog("cbcp_resp cb_type=%d", cb_type);
|
|
|
|
+ if (!cb_type) {
|
|
+ dbglog("Your remote side wanted a callback-type you don't allow -> doing no callback");
|
|
+ cb_type = 1 << CB_CONF_NO;
|
|
#if 0
|
|
- if (!cb_type)
|
|
lcp_down(us->us_unit);
|
|
#endif
|
|
+ }
|
|
|
|
if (cb_type & ( 1 << CB_CONF_USER ) ) {
|
|
- dbglog("cbcp_resp CONF_USER");
|
|
+ if (debug)
|
|
+ dbglog("cbcp_resp CONF_USER");
|
|
PUTCHAR(CB_CONF_USER, bufp);
|
|
- len = 3 + 1 + strlen(us->us_number) + 1;
|
|
+ len = 2 + 1 + strlen(us->us_number);
|
|
PUTCHAR(len , bufp);
|
|
PUTCHAR(5, bufp); /* delay */
|
|
PUTCHAR(1, bufp);
|
|
- BCOPY(us->us_number, bufp, strlen(us->us_number) + 1);
|
|
+ BCOPY(us->us_number, bufp, strlen(us->us_number));
|
|
cbcp_send(us, CBCP_RESP, buf, len);
|
|
return;
|
|
}
|
|
|
|
if (cb_type & ( 1 << CB_CONF_ADMIN ) ) {
|
|
- dbglog("cbcp_resp CONF_ADMIN");
|
|
+ if (debug)
|
|
+ dbglog("cbcp_resp CONF_ADMIN");
|
|
PUTCHAR(CB_CONF_ADMIN, bufp);
|
|
- len = 3;
|
|
+ len = 2 + 1;
|
|
PUTCHAR(len, bufp);
|
|
PUTCHAR(5, bufp); /* delay */
|
|
cbcp_send(us, CBCP_RESP, buf, len);
|
|
@@ -377,18 +485,181 @@
|
|
}
|
|
|
|
if (cb_type & ( 1 << CB_CONF_NO ) ) {
|
|
- dbglog("cbcp_resp CONF_NO");
|
|
+ if (debug)
|
|
+ dbglog("cbcp_resp CONF_NO");
|
|
PUTCHAR(CB_CONF_NO, bufp);
|
|
- len = 3;
|
|
+ len = 2;
|
|
PUTCHAR(len , bufp);
|
|
- PUTCHAR(0, bufp);
|
|
cbcp_send(us, CBCP_RESP, buf, len);
|
|
- start_networks();
|
|
return;
|
|
}
|
|
}
|
|
|
|
static void
|
|
+cbcp_ack(us)
|
|
+ cbcp_state *us;
|
|
+{
|
|
+ u_char cb_type;
|
|
+ u_char buf[256];
|
|
+ u_char *bufp = buf;
|
|
+ int len = 0;
|
|
+
|
|
+ cb_type = us->us_allowed & us->us_type;
|
|
+ if(debug)
|
|
+ dbglog("cbcp_ack cb_type=%d", cb_type);
|
|
+
|
|
+ if (!cb_type) {
|
|
+ dbglog("Your remote side wanted a callback-type you don't allow -> doing no callback");
|
|
+ cb_type = 1 << CB_CONF_NO;
|
|
+ lcp_close(us->us_unit, "Invalid callback requested");
|
|
+ return;
|
|
+ }
|
|
+
|
|
+ if (cb_type & ( 1 << CB_CONF_USER ) ) {
|
|
+ if(debug)
|
|
+ dbglog("cbcp_ack CONF_USER");
|
|
+ PUTCHAR(CB_CONF_USER, bufp);
|
|
+ len = 2 + 1 + strlen(us->us_number);
|
|
+ PUTCHAR(len , bufp);
|
|
+ PUTCHAR(5, bufp); /* delay */
|
|
+ PUTCHAR(1, bufp);
|
|
+ BCOPY(us->us_number, bufp, strlen(us->us_number));
|
|
+ cbcp_send(us, CBCP_ACK, buf, len);
|
|
+ cbcp_up(us);
|
|
+ return;
|
|
+ }
|
|
+
|
|
+ if (cb_type & ( 1 << CB_CONF_ADMIN ) ) {
|
|
+ if(debug)
|
|
+ dbglog("cbcp_ack CONF_ADMIN");
|
|
+ PUTCHAR(CB_CONF_ADMIN, bufp);
|
|
+ len = 2 + 1;
|
|
+ PUTCHAR(len , bufp);
|
|
+ PUTCHAR(5, bufp); /* delay */
|
|
+ PUTCHAR(0, bufp);
|
|
+ cbcp_send(us, CBCP_ACK, buf, len);
|
|
+ cbcp_up(us);
|
|
+ return;
|
|
+ }
|
|
+
|
|
+ if (cb_type & ( 1 << CB_CONF_NO ) ) {
|
|
+ if(debug)
|
|
+ dbglog("cbcp_ack CONF_NO");
|
|
+ PUTCHAR(CB_CONF_NO, bufp);
|
|
+ len = 2;
|
|
+ PUTCHAR(len , bufp);
|
|
+ cbcp_send(us, CBCP_ACK, buf, len);
|
|
+ cbcp_up(us);
|
|
+ return;
|
|
+ }
|
|
+}
|
|
+
|
|
+static void
|
|
+cbcp_req(us)
|
|
+ cbcp_state *us;
|
|
+{
|
|
+ u_char cb_type;
|
|
+ u_char buf[256];
|
|
+ u_char *bufp = buf;
|
|
+ int len = 0;
|
|
+
|
|
+ cb_type = us->us_type;
|
|
+
|
|
+ if (cb_type & ( 1 << CB_CONF_USER ) ) {
|
|
+ if(debug)
|
|
+ dbglog("cbcp_req CONF_USER");
|
|
+ PUTCHAR(CB_CONF_USER, bufp);
|
|
+ len = 2 + 1 + strlen(us->us_number);
|
|
+ PUTCHAR(len , bufp);
|
|
+ PUTCHAR(5, bufp); /* delay */
|
|
+ PUTCHAR(1, bufp);
|
|
+ BCOPY(us->us_number, bufp, strlen(us->us_number));
|
|
+ cbcp_send(us, CBCP_REQ, buf, len);
|
|
+ return;
|
|
+ }
|
|
+
|
|
+ if (cb_type & ( 1 << CB_CONF_ADMIN ) ) {
|
|
+ if(debug)
|
|
+ dbglog("cbcp_req CONF_ADMIN");
|
|
+ PUTCHAR(CB_CONF_ADMIN, bufp);
|
|
+ len = 2 + 1;
|
|
+ PUTCHAR(len , bufp);
|
|
+ PUTCHAR(5, bufp); /* delay */
|
|
+ PUTCHAR(0, bufp);
|
|
+ cbcp_send(us, CBCP_REQ, buf, len);
|
|
+ return;
|
|
+ }
|
|
+
|
|
+ if (cb_type & ( 1 << CB_CONF_NO ) ) {
|
|
+ if(debug)
|
|
+ dbglog("cbcp_req CONF_NO");
|
|
+ PUTCHAR(CB_CONF_NO, bufp);
|
|
+ len = 2;
|
|
+ PUTCHAR(len , bufp);
|
|
+ cbcp_send(us, CBCP_REQ, buf, len);
|
|
+ return;
|
|
+ }
|
|
+}
|
|
+
|
|
+/* received CBCP request */
|
|
+static void
|
|
+cbcp_recvresp(us, pckt, pcktlen)
|
|
+ cbcp_state *us;
|
|
+ char *pckt;
|
|
+ int pcktlen;
|
|
+{
|
|
+ u_char type, opt_len, delay, addr_type;
|
|
+ char address[256];
|
|
+ int len = pcktlen;
|
|
+
|
|
+ address[0] = 0;
|
|
+
|
|
+ if(debug)
|
|
+ dbglog("CBCP_RESP received");
|
|
+
|
|
+ while (len) {
|
|
+ if(debug)
|
|
+ dbglog("length: %d", len);
|
|
+
|
|
+ GETCHAR(type, pckt);
|
|
+ GETCHAR(opt_len, pckt);
|
|
+
|
|
+ if (opt_len > 2)
|
|
+ GETCHAR(delay, pckt);
|
|
+
|
|
+ us->us_allowed |= (1 << type);
|
|
+
|
|
+ switch(type) {
|
|
+ case CB_CONF_NO:
|
|
+ dbglog("Callback: none");
|
|
+ break;
|
|
+
|
|
+ case CB_CONF_USER:
|
|
+ if (opt_len > 4) {
|
|
+ GETCHAR(addr_type, pckt);
|
|
+ memcpy(address, pckt, opt_len - 4);
|
|
+ address[opt_len - 4] = 0;
|
|
+ dbglog("Callback: user callback, address: '%s'", address);
|
|
+ }
|
|
+ else
|
|
+ dbglog("Callback: user callback");
|
|
+ break;
|
|
+
|
|
+ case CB_CONF_ADMIN:
|
|
+ dbglog("Callback: user admin defined");
|
|
+ break;
|
|
+
|
|
+ case CB_CONF_LIST:
|
|
+ break;
|
|
+ }
|
|
+ len -= opt_len;
|
|
+ }
|
|
+
|
|
+ cbcp_ack(us);
|
|
+}
|
|
+
|
|
+
|
|
+static void
|
|
cbcp_send(us, code, buf, len)
|
|
cbcp_state *us;
|
|
u_char code;
|
|
@@ -436,10 +707,14 @@
|
|
memcpy(address, pckt, opt_len - 4);
|
|
address[opt_len - 4] = 0;
|
|
if (address[0])
|
|
- dbglog("peer will call: %s", address);
|
|
+ dbglog("Callback: peer will call: '%s'", address);
|
|
}
|
|
- if (type == CB_CONF_NO)
|
|
+ if (type != CB_CONF_NO)
|
|
+ {
|
|
+ persist = 0;
|
|
+ lcp_close(0, "Call me back, please");
|
|
return;
|
|
+ }
|
|
}
|
|
|
|
cbcp_up(us);
|
|
@@ -450,7 +725,6 @@
|
|
cbcp_up(us)
|
|
cbcp_state *us;
|
|
{
|
|
- persist = 0;
|
|
- lcp_close(0, "Call me back, please");
|
|
+ network_phase(us->us_unit);
|
|
status = EXIT_CALLBACK;
|
|
}
|