2016-03-22 01:48:59 +00:00
|
|
|
#include <stdio.h>
|
|
|
|
#include <netdb.h>
|
|
|
|
#include <netinet/in.h>
|
|
|
|
#include <sys/types.h>
|
|
|
|
#include <sys/socket.h>
|
2016-03-27 11:53:46 +00:00
|
|
|
#include <sys/wait.h>
|
2016-08-04 09:41:43 +00:00
|
|
|
#include <sys/stat.h>
|
2016-03-27 11:53:46 +00:00
|
|
|
#include <signal.h>
|
2016-03-22 01:48:59 +00:00
|
|
|
#include <unistd.h>
|
|
|
|
#include <stdlib.h>
|
2016-03-27 11:53:46 +00:00
|
|
|
#include <errno.h>
|
2016-04-10 04:10:18 +00:00
|
|
|
#include <arpa/inet.h>
|
2016-08-06 11:57:12 +00:00
|
|
|
#include <libssh/libssh.h>
|
2016-08-07 00:06:21 +00:00
|
|
|
#include <libssh/server.h>
|
|
|
|
#include <libssh/callbacks.h>
|
2016-04-13 07:42:22 +00:00
|
|
|
#include <string.h>
|
2016-08-07 00:06:21 +00:00
|
|
|
#include <poll.h>
|
|
|
|
#if defined(linux)
|
|
|
|
# include <pty.h>
|
2016-08-11 22:43:44 +00:00
|
|
|
#elif defined(__OpenBSD__) || defined(__NetBSD__) || defined(__APPLE__)
|
2016-08-07 00:06:21 +00:00
|
|
|
# include <util.h>
|
|
|
|
#else
|
|
|
|
# include <libutil.h>
|
|
|
|
#endif
|
2016-08-16 10:28:48 +00:00
|
|
|
#if defined(ENABLE_WWW)
|
|
|
|
# include <microhttpd.h>
|
|
|
|
#endif
|
2016-08-07 03:12:54 +00:00
|
|
|
#include <termios.h>
|
2016-03-22 01:48:59 +00:00
|
|
|
#include "bbs.h"
|
2016-08-02 01:58:10 +00:00
|
|
|
#include "inih/ini.h"
|
2016-12-11 04:42:28 +00:00
|
|
|
#include "hashmap/hashmap.h"
|
|
|
|
|
|
|
|
map_t ip_guard_map;
|
2016-08-02 01:58:10 +00:00
|
|
|
|
|
|
|
extern struct bbs_config conf;
|
2016-08-06 11:57:12 +00:00
|
|
|
extern struct user_record *gUser;
|
2016-08-06 23:54:37 +00:00
|
|
|
|
|
|
|
int ssh_pid = -1;
|
2016-08-07 06:15:41 +00:00
|
|
|
int bbs_pid = 0;
|
2016-08-12 06:15:10 +00:00
|
|
|
int server_socket = -1;
|
2016-08-06 23:54:37 +00:00
|
|
|
|
2016-12-11 12:14:36 +00:00
|
|
|
int bbs_stdin;
|
|
|
|
int bbs_stdout;
|
|
|
|
int bbs_stderr;
|
|
|
|
|
2016-08-16 10:28:48 +00:00
|
|
|
#if defined(ENABLE_WWW)
|
|
|
|
struct MHD_Daemon *www_daemon;
|
|
|
|
#endif
|
|
|
|
|
2016-08-02 01:58:10 +00:00
|
|
|
void sigterm_handler(int s)
|
|
|
|
{
|
2016-08-06 23:54:37 +00:00
|
|
|
if (ssh_pid != -1) {
|
|
|
|
kill(ssh_pid, SIGTERM);
|
|
|
|
}
|
2016-08-12 06:15:10 +00:00
|
|
|
if (server_socket != -1) {
|
|
|
|
close(server_socket);
|
|
|
|
}
|
2016-08-16 10:28:48 +00:00
|
|
|
#if defined(ENABLE_WWW)
|
|
|
|
if (www_daemon != NULL) {
|
|
|
|
MHD_stop_daemon(www_daemon);
|
|
|
|
}
|
|
|
|
#endif
|
2016-08-02 01:58:10 +00:00
|
|
|
remove(conf.pid_file);
|
|
|
|
exit(0);
|
|
|
|
}
|
2016-03-22 01:48:59 +00:00
|
|
|
|
2016-03-27 11:53:46 +00:00
|
|
|
void sigchld_handler(int s)
|
|
|
|
{
|
|
|
|
// waitpid() might overwrite errno, so we save and restore it:
|
|
|
|
int saved_errno = errno;
|
|
|
|
|
|
|
|
while(waitpid(-1, NULL, WNOHANG) > 0);
|
|
|
|
|
|
|
|
errno = saved_errno;
|
|
|
|
}
|
|
|
|
|
2016-12-10 07:55:47 +00:00
|
|
|
static int protocol_config_handler(void* user, const char* section, const char* name,
|
|
|
|
const char* value)
|
|
|
|
{
|
|
|
|
struct bbs_config *conf = (struct bbs_config *)user;
|
|
|
|
int i;
|
|
|
|
|
|
|
|
for (i=0;i<conf->protocol_count;i++) {
|
|
|
|
if (strcasecmp(conf->protocols[i]->name, section) == 0) {
|
|
|
|
// found it
|
|
|
|
if (strcasecmp(name, "upload command") == 0) {
|
|
|
|
conf->protocols[i]->upload = strdup(value);
|
|
|
|
} else if (strcasecmp(name, "download command") == 0) {
|
|
|
|
conf->protocols[i]->download = strdup(value);
|
|
|
|
} else if (strcasecmp(name, "internal zmodem") == 0) {
|
|
|
|
if (strcasecmp(value, "true") == 0) {
|
|
|
|
conf->protocols[i]->internal_zmodem = 1;
|
|
|
|
} else {
|
|
|
|
conf->protocols[i]->internal_zmodem = 0;
|
|
|
|
}
|
|
|
|
} else if (strcasecmp(name, "stdio") == 0) {
|
|
|
|
if (strcasecmp(value, "true") == 0) {
|
|
|
|
conf->protocols[i]->stdio = 1;
|
|
|
|
} else {
|
|
|
|
conf->protocols[i]->stdio = 0;
|
|
|
|
}
|
|
|
|
} else if (strcasecmp(name, "upload prompt") == 0) {
|
|
|
|
if (strcasecmp(value, "true") == 0) {
|
|
|
|
conf->protocols[i]->upload_prompt = 1;
|
|
|
|
} else {
|
|
|
|
conf->protocols[i]->upload_prompt = 0;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if (conf->protocol_count == 0) {
|
|
|
|
conf->protocols = (struct protocol **)malloc(sizeof(struct protocol *));
|
|
|
|
} else {
|
|
|
|
conf->protocols = (struct protocol **)realloc(conf->protocols, sizeof(struct protocol *) * (conf->protocol_count + 1));
|
|
|
|
}
|
|
|
|
|
2016-12-14 09:27:57 +00:00
|
|
|
conf->protocols[conf->protocol_count] = (struct protocol *)malloc(sizeof(struct protocol));
|
2016-12-10 07:55:47 +00:00
|
|
|
|
|
|
|
conf->protocols[conf->protocol_count]->name = strdup(section);
|
|
|
|
conf->protocols[conf->protocol_count]->internal_zmodem = 0;
|
|
|
|
conf->protocols[conf->protocol_count]->upload_prompt = 0;
|
|
|
|
conf->protocols[conf->protocol_count]->stdio = 0;
|
|
|
|
|
|
|
|
if (strcasecmp(name, "upload command") == 0) {
|
|
|
|
conf->protocols[conf->protocol_count]->upload = strdup(value);
|
|
|
|
} else if (strcasecmp(name, "download command") == 0) {
|
|
|
|
conf->protocols[conf->protocol_count]->download = strdup(value);
|
|
|
|
} else if (strcasecmp(name, "internal zmodem") == 0) {
|
|
|
|
if (strcasecmp(value, "true") == 0) {
|
|
|
|
conf->protocols[conf->protocol_count]->internal_zmodem = 1;
|
|
|
|
} else {
|
|
|
|
conf->protocols[conf->protocol_count]->internal_zmodem = 0;
|
|
|
|
}
|
|
|
|
} else if (strcasecmp(name, "stdio") == 0) {
|
|
|
|
if (strcasecmp(value, "true") == 0) {
|
|
|
|
conf->protocols[conf->protocol_count]->stdio = 1;
|
|
|
|
} else {
|
|
|
|
conf->protocols[conf->protocol_count]->stdio = 0;
|
|
|
|
}
|
|
|
|
} else if (strcasecmp(name, "upload prompt") == 0) {
|
|
|
|
if (strcasecmp(value, "true") == 0) {
|
|
|
|
conf->protocols[conf->protocol_count]->upload_prompt = 1;
|
|
|
|
} else {
|
|
|
|
conf->protocols[conf->protocol_count]->upload_prompt = 0;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
conf->protocol_count++;
|
|
|
|
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
2016-12-08 04:08:04 +00:00
|
|
|
static int archiver_config_handler(void* user, const char* section, const char* name,
|
|
|
|
const char* value)
|
|
|
|
{
|
|
|
|
struct bbs_config *conf = (struct bbs_config *)user;
|
|
|
|
int i;
|
|
|
|
|
|
|
|
for (i=0;i<conf->archiver_count;i++) {
|
|
|
|
if (strcasecmp(conf->archivers[i]->name, section) == 0) {
|
|
|
|
// found it
|
|
|
|
if (strcasecmp(name, "extension") == 0) {
|
|
|
|
conf->archivers[i]->extension = strdup(value);
|
|
|
|
} else if (strcasecmp(name, "unpack") == 0) {
|
|
|
|
conf->archivers[i]->unpack = strdup(value);
|
|
|
|
} else if (strcasecmp(name, "pack") == 0) {
|
|
|
|
conf->archivers[i]->pack = strdup(value);
|
|
|
|
}
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if (conf->archiver_count == 0) {
|
|
|
|
conf->archivers = (struct archiver **)malloc(sizeof(struct archiver *));
|
|
|
|
} else {
|
|
|
|
conf->archivers = (struct archiver **)realloc(conf->archivers, sizeof(struct archiver *) * (conf->archiver_count + 1));
|
|
|
|
}
|
|
|
|
|
|
|
|
conf->archivers[conf->archiver_count] = (struct archiver *)malloc(sizeof(struct archiver));
|
|
|
|
|
|
|
|
conf->archivers[conf->archiver_count]->name = strdup(section);
|
|
|
|
|
|
|
|
if (strcasecmp(name, "extension") == 0) {
|
|
|
|
conf->archivers[conf->archiver_count]->extension = strdup(value);
|
|
|
|
} else if (strcasecmp(name, "unpack") == 0) {
|
|
|
|
conf->archivers[conf->archiver_count]->unpack = strdup(value);
|
|
|
|
} else if (strcasecmp(name, "pack") == 0) {
|
|
|
|
conf->archivers[conf->archiver_count]->pack = strdup(value);
|
|
|
|
}
|
|
|
|
conf->archiver_count++;
|
|
|
|
|
|
|
|
return 1;
|
|
|
|
}
|
2016-03-27 11:53:46 +00:00
|
|
|
|
2016-08-02 01:58:10 +00:00
|
|
|
static int door_config_handler(void* user, const char* section, const char* name,
|
|
|
|
const char* value)
|
|
|
|
{
|
|
|
|
struct bbs_config *conf = (struct bbs_config *)user;
|
|
|
|
int i;
|
|
|
|
|
|
|
|
for (i=0;i<conf->door_count;i++) {
|
|
|
|
if (strcasecmp(conf->doors[i]->name, section) == 0) {
|
|
|
|
// found it
|
2017-04-12 12:37:21 +00:00
|
|
|
if (strcasecmp(name, "command") == 0) {
|
2016-08-02 01:58:10 +00:00
|
|
|
conf->doors[i]->command = strdup(value);
|
|
|
|
} else if (strcasecmp(name, "stdio") == 0) {
|
|
|
|
if (strcasecmp(value, "true") == 0) {
|
|
|
|
conf->doors[i]->stdio = 1;
|
|
|
|
} else {
|
|
|
|
conf->doors[i]->stdio = 0;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if (conf->door_count == 0) {
|
|
|
|
conf->doors = (struct door_config **)malloc(sizeof(struct door_config *));
|
|
|
|
} else {
|
|
|
|
conf->doors = (struct door_config **)realloc(conf->doors, sizeof(struct door_config *) * (conf->door_count + 1));
|
|
|
|
}
|
|
|
|
|
|
|
|
conf->doors[conf->door_count] = (struct door_config *)malloc(sizeof(struct door_config));
|
|
|
|
|
|
|
|
conf->doors[conf->door_count]->name = strdup(section);
|
|
|
|
|
2017-04-12 12:37:21 +00:00
|
|
|
if (strcasecmp(name, "command") == 0) {
|
2016-08-02 01:58:10 +00:00
|
|
|
conf->doors[conf->door_count]->command = strdup(value);
|
|
|
|
} else if (strcasecmp(name, "stdio") == 0) {
|
|
|
|
if (strcasecmp(value, "true") == 0) {
|
|
|
|
conf->doors[conf->door_count]->stdio = 1;
|
|
|
|
} else {
|
|
|
|
conf->doors[conf->door_count]->stdio = 0;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
conf->door_count++;
|
|
|
|
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int file_sub_handler(void* user, const char* section, const char* name,
|
|
|
|
const char* value)
|
|
|
|
{
|
|
|
|
struct file_directory *fd = (struct file_directory *)user;
|
|
|
|
int i;
|
|
|
|
|
|
|
|
if (strcasecmp(section, "main") == 0) {
|
2016-08-08 07:21:04 +00:00
|
|
|
if (strcasecmp(name, "visible sec level") == 0) {
|
2016-08-02 01:58:10 +00:00
|
|
|
fd->sec_level = atoi(value);
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
// check if it's partially filled in
|
|
|
|
for (i=0;i<fd->file_sub_count;i++) {
|
|
|
|
if (strcasecmp(fd->file_subs[i]->name, section) == 0) {
|
|
|
|
if (strcasecmp(name, "upload sec level") == 0) {
|
|
|
|
fd->file_subs[i]->upload_sec_level = atoi(value);
|
|
|
|
} else if (strcasecmp(name, "download sec level") == 0) {
|
|
|
|
fd->file_subs[i]->download_sec_level = atoi(value);
|
|
|
|
} else if (strcasecmp(name, "database") == 0) {
|
|
|
|
fd->file_subs[i]->database = strdup(value);
|
|
|
|
} else if (strcasecmp(name, "upload path") == 0) {
|
|
|
|
fd->file_subs[i]->upload_path = strdup(value);
|
|
|
|
}
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if (fd->file_sub_count == 0) {
|
|
|
|
fd->file_subs = (struct file_sub **)malloc(sizeof(struct file_sub *));
|
|
|
|
} else {
|
|
|
|
fd->file_subs = (struct file_sub **)realloc(fd->file_subs, sizeof(struct file_sub *) * (fd->file_sub_count + 1));
|
|
|
|
}
|
|
|
|
|
|
|
|
fd->file_subs[fd->file_sub_count] = (struct file_sub *)malloc(sizeof(struct file_sub));
|
|
|
|
|
|
|
|
fd->file_subs[fd->file_sub_count]->name = strdup(section);
|
|
|
|
if (strcasecmp(name, "upload sec level") == 0) {
|
|
|
|
fd->file_subs[fd->file_sub_count]->upload_sec_level = atoi(value);
|
|
|
|
} else if (strcasecmp(name, "download sec level") == 0) {
|
|
|
|
fd->file_subs[fd->file_sub_count]->download_sec_level = atoi(value);
|
|
|
|
} else if (strcasecmp(name, "database") == 0) {
|
|
|
|
fd->file_subs[fd->file_sub_count]->database = strdup(value);
|
|
|
|
} else if (strcasecmp(name, "upload path") == 0) {
|
|
|
|
fd->file_subs[fd->file_sub_count]->upload_path = strdup(value);
|
|
|
|
}
|
|
|
|
fd->file_sub_count++;
|
|
|
|
}
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
static int mail_area_handler(void* user, const char* section, const char* name,
|
|
|
|
const char* value)
|
|
|
|
{
|
|
|
|
struct mail_conference *mc = (struct mail_conference *)user;
|
|
|
|
int i;
|
|
|
|
|
|
|
|
if (strcasecmp(section, "main") == 0) {
|
|
|
|
if (strcasecmp(name, "visible sec level") == 0) {
|
|
|
|
mc->sec_level = atoi(value);
|
|
|
|
} else if (strcasecmp(name, "networked") == 0) {
|
|
|
|
if (strcasecmp(value, "true") == 0) {
|
|
|
|
mc->networked = 1;
|
|
|
|
} else {
|
|
|
|
mc->networked = 0;
|
|
|
|
}
|
|
|
|
} else if (strcasecmp(name, "real names") == 0) {
|
|
|
|
if (strcasecmp(value, "true") == 0) {
|
|
|
|
mc->realnames = 1;
|
|
|
|
} else {
|
|
|
|
mc->realnames = 0;
|
|
|
|
}
|
|
|
|
} else if (strcasecmp(name, "tagline") == 0) {
|
|
|
|
mc->tagline = strdup(value);
|
|
|
|
}
|
|
|
|
} else if (strcasecmp(section, "network") == 0) {
|
|
|
|
if (strcasecmp(name, "type") == 0) {
|
|
|
|
if (strcasecmp(value, "fido") == 0) {
|
|
|
|
mc->nettype = NETWORK_FIDO;
|
2017-03-20 11:06:52 +00:00
|
|
|
}
|
2016-08-02 01:58:10 +00:00
|
|
|
} else if (strcasecmp(name, "fido node") == 0) {
|
|
|
|
mc->fidoaddr = parse_fido_addr(value);
|
2017-03-20 11:06:52 +00:00
|
|
|
}
|
2016-08-02 01:58:10 +00:00
|
|
|
} else {
|
|
|
|
// check if it's partially filled in
|
|
|
|
for (i=0;i<mc->mail_area_count;i++) {
|
|
|
|
if (strcasecmp(mc->mail_areas[i]->name, section) == 0) {
|
|
|
|
if (strcasecmp(name, "read sec level") == 0) {
|
|
|
|
mc->mail_areas[i]->read_sec_level = atoi(value);
|
|
|
|
} else if (strcasecmp(name, "write sec level") == 0) {
|
|
|
|
mc->mail_areas[i]->write_sec_level = atoi(value);
|
|
|
|
} else if (strcasecmp(name, "path") == 0) {
|
|
|
|
mc->mail_areas[i]->path = strdup(value);
|
|
|
|
} else if (strcasecmp(name, "type") == 0) {
|
|
|
|
if (strcasecmp(value, "local") == 0) {
|
|
|
|
mc->mail_areas[i]->type = TYPE_LOCAL_AREA;
|
|
|
|
} else if (strcasecmp(value, "echo") == 0) {
|
|
|
|
mc->mail_areas[i]->type = TYPE_ECHOMAIL_AREA;
|
|
|
|
} else if (strcasecmp(value, "netmail") == 0) {
|
|
|
|
mc->mail_areas[i]->type = TYPE_NETMAIL_AREA;
|
2016-12-09 09:47:33 +00:00
|
|
|
} else if (strcasecmp(value, "newsgroup") == 0) {
|
|
|
|
mc->mail_areas[i]->type = TYPE_NEWSGROUP_AREA;
|
2016-08-02 01:58:10 +00:00
|
|
|
}
|
2016-12-05 03:38:03 +00:00
|
|
|
} else if (strcasecmp(name, "qwk name") == 0) {
|
|
|
|
mc->mail_areas[i]->qwkname = strdup(value);
|
2016-12-06 07:06:28 +00:00
|
|
|
if (strlen(mc->mail_areas[i]->qwkname) > 8) {
|
|
|
|
mc->mail_areas[i]->qwkname[8] = '\0';
|
|
|
|
}
|
2016-08-02 01:58:10 +00:00
|
|
|
}
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if (mc->mail_area_count == 0) {
|
|
|
|
mc->mail_areas = (struct mail_area **)malloc(sizeof(struct mail_area *));
|
|
|
|
} else {
|
|
|
|
mc->mail_areas = (struct mail_area **)realloc(mc->mail_areas, sizeof(struct mail_area *) * (mc->mail_area_count + 1));
|
|
|
|
}
|
|
|
|
|
|
|
|
mc->mail_areas[mc->mail_area_count] = (struct mail_area *)malloc(sizeof(struct mail_area));
|
2016-12-05 03:38:03 +00:00
|
|
|
|
|
|
|
mc->mail_areas[mc->mail_area_count]->qwkname = NULL;
|
|
|
|
|
2016-08-02 01:58:10 +00:00
|
|
|
mc->mail_areas[mc->mail_area_count]->name = strdup(section);
|
|
|
|
if (strcasecmp(name, "read sec level") == 0) {
|
|
|
|
mc->mail_areas[mc->mail_area_count]->read_sec_level = atoi(value);
|
|
|
|
} else if (strcasecmp(name, "write sec level") == 0) {
|
|
|
|
mc->mail_areas[mc->mail_area_count]->write_sec_level = atoi(value);
|
|
|
|
} else if (strcasecmp(name, "path") == 0) {
|
|
|
|
mc->mail_areas[mc->mail_area_count]->path = strdup(value);
|
|
|
|
} else if (strcasecmp(name, "type") == 0) {
|
|
|
|
if (strcasecmp(value, "local") == 0) {
|
|
|
|
mc->mail_areas[mc->mail_area_count]->type = TYPE_LOCAL_AREA;
|
|
|
|
} else if (strcasecmp(value, "echo") == 0) {
|
|
|
|
mc->mail_areas[mc->mail_area_count]->type = TYPE_ECHOMAIL_AREA;
|
|
|
|
} else if (strcasecmp(value, "netmail") == 0) {
|
|
|
|
mc->mail_areas[mc->mail_area_count]->type = TYPE_NETMAIL_AREA;
|
2016-12-09 09:47:33 +00:00
|
|
|
} else if (strcasecmp(value, "newsgroup") == 0) {
|
|
|
|
mc->mail_areas[mc->mail_area_count]->type = TYPE_NEWSGROUP_AREA;
|
2016-08-02 01:58:10 +00:00
|
|
|
}
|
2016-12-05 03:38:03 +00:00
|
|
|
} else if (strcasecmp(name, "qwk name") == 0) {
|
|
|
|
mc->mail_areas[mc->mail_area_count]->qwkname = strdup(value);
|
2016-12-06 07:06:28 +00:00
|
|
|
if (strlen(mc->mail_areas[mc->mail_area_count]->qwkname) > 8) {
|
|
|
|
mc->mail_areas[mc->mail_area_count]->qwkname[8] = '\0';
|
|
|
|
}
|
2016-08-02 01:58:10 +00:00
|
|
|
}
|
|
|
|
mc->mail_area_count++;
|
|
|
|
}
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int handler(void* user, const char* section, const char* name,
|
|
|
|
const char* value)
|
|
|
|
{
|
|
|
|
struct bbs_config *conf = (struct bbs_config *)user;
|
|
|
|
|
|
|
|
if (strcasecmp(section, "main") == 0) {
|
|
|
|
if (strcasecmp(name, "bbs name") == 0) {
|
|
|
|
conf->bbs_name = strdup(value);
|
2016-08-06 11:57:12 +00:00
|
|
|
} else if (strcasecmp(name, "telnet port") == 0) {
|
|
|
|
conf->telnet_port = atoi(value);
|
|
|
|
} else if (strcasecmp(name, "enable ssh") == 0) {
|
|
|
|
if (strcasecmp(value, "true") == 0) {
|
|
|
|
conf->ssh_server = 1;
|
|
|
|
} else {
|
|
|
|
conf->ssh_server = 0;
|
|
|
|
}
|
2016-08-16 10:28:48 +00:00
|
|
|
} else if (strcasecmp(name, "enable www") == 0) {
|
|
|
|
if (strcasecmp(value, "true") == 0) {
|
|
|
|
conf->www_server = 1;
|
|
|
|
} else {
|
|
|
|
conf->www_server = 0;
|
|
|
|
}
|
|
|
|
} else if (strcasecmp(name, "www port") == 0) {
|
|
|
|
conf->www_port = atoi(value);
|
2016-08-06 11:57:12 +00:00
|
|
|
} else if (strcasecmp(name, "ssh port") == 0) {
|
|
|
|
conf->ssh_port = atoi(value);
|
|
|
|
} else if (strcasecmp(name, "ssh dsa key") == 0) {
|
|
|
|
conf->ssh_dsa_key = strdup(value);
|
|
|
|
} else if (strcasecmp(name, "ssh rsa key") == 0) {
|
|
|
|
conf->ssh_rsa_key = strdup(value);
|
2016-08-02 01:58:10 +00:00
|
|
|
} else if (strcasecmp(name, "sysop name") == 0) {
|
|
|
|
conf->sysop_name = strdup(value);
|
|
|
|
} else if (strcasecmp(name, "nodes") == 0) {
|
|
|
|
conf->nodes = atoi(value);
|
|
|
|
} else if (strcasecmp(name, "new user level") == 0) {
|
|
|
|
conf->newuserlvl = atoi(value);
|
2017-03-20 01:37:56 +00:00
|
|
|
} else if (strcasecmp(name, "magichat server") == 0) {
|
|
|
|
conf->mgchat_server = strdup(value);
|
|
|
|
} else if (strcasecmp(name, "magichat port") == 0) {
|
|
|
|
conf->mgchat_port = atoi(value);
|
|
|
|
} else if (strcasecmp(name, "magichat bbstag") == 0) {
|
|
|
|
conf->mgchat_bbstag = strdup(value);
|
2016-08-02 01:58:10 +00:00
|
|
|
} else if (strcasecmp(name, "default tagline") == 0) {
|
|
|
|
conf->default_tagline = strdup(value);
|
|
|
|
} else if (strcasecmp(name, "external editor cmd") == 0) {
|
|
|
|
conf->external_editor_cmd = strdup(value);
|
|
|
|
} else if (strcasecmp(name, "external editor stdio") == 0) {
|
|
|
|
if (strcasecmp(value, "true") == 0) {
|
|
|
|
conf->external_editor_stdio = 1;
|
|
|
|
} else {
|
|
|
|
conf->external_editor_stdio = 0;
|
|
|
|
}
|
|
|
|
} else if (strcasecmp(name, "automessage write level") == 0) {
|
|
|
|
conf->automsgwritelvl = atoi(value);
|
|
|
|
} else if (strcasecmp(name, "fork") == 0) {
|
|
|
|
if (strcasecmp(value, "true") == 0) {
|
|
|
|
conf->fork = 1;
|
|
|
|
} else {
|
|
|
|
conf->fork = 0;
|
|
|
|
}
|
2016-12-06 07:06:28 +00:00
|
|
|
} else if (strcasecmp(name, "qwk name") == 0) {
|
|
|
|
conf->bwave_name = strdup(value);
|
|
|
|
if (strlen(conf->bwave_name) > 8) {
|
|
|
|
conf->bwave_name[8] = '\0';
|
|
|
|
}
|
|
|
|
} else if (strcasecmp(name, "main aka") == 0) {
|
|
|
|
conf->main_aka = parse_fido_addr(value);
|
|
|
|
} else if (strcasecmp(name, "qwk max messages") == 0) {
|
|
|
|
conf->bwave_max_msgs = atoi(value);
|
2016-12-08 12:17:19 +00:00
|
|
|
} else if (strcasecmp(name, "broadcast enable") == 0) {
|
|
|
|
if (strcasecmp(value, "true") == 0) {
|
|
|
|
conf->broadcast_enable = 1;
|
|
|
|
} else {
|
|
|
|
conf->broadcast_enable = 0;
|
|
|
|
}
|
|
|
|
} else if (strcasecmp(name, "broadcast port") == 0) {
|
|
|
|
conf->broadcast_port = atoi(value);
|
2016-12-08 12:27:06 +00:00
|
|
|
} else if (strcasecmp(name, "broadcast address") == 0) {
|
|
|
|
conf->broadcast_address = strdup(value);
|
2016-12-11 04:42:28 +00:00
|
|
|
} else if (strcasecmp(name, "ip guard enable") == 0) {
|
|
|
|
if (strcasecmp(value, "true") == 0) {
|
|
|
|
conf->ipguard_enable = 1;
|
|
|
|
} else {
|
|
|
|
conf->ipguard_enable = 0;
|
|
|
|
}
|
|
|
|
} else if (strcasecmp(name, "ip guard timeout") == 0) {
|
|
|
|
conf->ipguard_timeout = atoi(value);
|
|
|
|
} else if (strcasecmp(name, "ip guard tries") == 0) {
|
|
|
|
conf->ipguard_tries = atoi(value);
|
2017-04-12 06:38:33 +00:00
|
|
|
} else if (strcasecmp(name, "root menu") == 0) {
|
|
|
|
conf->root_menu = strdup(value);
|
2016-08-02 01:58:10 +00:00
|
|
|
}
|
|
|
|
} else if (strcasecmp(section, "paths") == 0){
|
|
|
|
if (strcasecmp(name, "ansi path") == 0) {
|
|
|
|
conf->ansi_path = strdup(value);
|
|
|
|
} else if (strcasecmp(name, "bbs path") == 0) {
|
|
|
|
conf->bbs_path = strdup(value);
|
|
|
|
} else if (strcasecmp(name, "log path") == 0) {
|
|
|
|
conf->log_path = strdup(value);
|
|
|
|
} else if (strcasecmp(name, "script path") == 0) {
|
|
|
|
conf->script_path = strdup(value);
|
|
|
|
} else if (strcasecmp(name, "echomail semaphore") == 0) {
|
|
|
|
conf->echomail_sem = strdup(value);
|
|
|
|
} else if (strcasecmp(name, "netmail semaphore") == 0) {
|
|
|
|
conf->netmail_sem = strdup(value);
|
|
|
|
} else if (strcasecmp(name, "pid file") == 0) {
|
|
|
|
conf->pid_file = strdup(value);
|
2016-08-14 09:56:15 +00:00
|
|
|
} else if (strcasecmp(name, "string file") == 0) {
|
|
|
|
conf->string_file = strdup(value);
|
2016-08-16 10:28:48 +00:00
|
|
|
} else if (strcasecmp(name, "www path") == 0) {
|
|
|
|
conf->www_path = strdup(value);
|
2016-12-10 07:55:47 +00:00
|
|
|
} else if (strcasecmp(name, "config path") == 0) {
|
|
|
|
conf->config_path = strdup(value);
|
2017-04-12 12:34:08 +00:00
|
|
|
} else if (strcasecmp(name, "menu path") == 0) {
|
|
|
|
conf->menu_path = strdup(value);
|
2016-08-02 01:58:10 +00:00
|
|
|
}
|
|
|
|
} else if (strcasecmp(section, "mail conferences") == 0) {
|
|
|
|
if (conf->mail_conference_count == 0) {
|
|
|
|
conf->mail_conferences = (struct mail_conference **)malloc(sizeof(struct mail_conference *));
|
|
|
|
} else {
|
|
|
|
conf->mail_conferences = (struct mail_conference **)realloc(conf->mail_conferences, sizeof(struct mail_conference *) * (conf->mail_conference_count + 1));
|
|
|
|
}
|
|
|
|
|
|
|
|
conf->mail_conferences[conf->mail_conference_count] = (struct mail_conference *)malloc(sizeof(struct mail_conference));
|
|
|
|
conf->mail_conferences[conf->mail_conference_count]->name = strdup(name);
|
|
|
|
conf->mail_conferences[conf->mail_conference_count]->path = strdup(value);
|
|
|
|
conf->mail_conferences[conf->mail_conference_count]->tagline = NULL;
|
|
|
|
conf->mail_conferences[conf->mail_conference_count]->mail_area_count = 0;
|
|
|
|
conf->mail_conferences[conf->mail_conference_count]->nettype = 0;
|
|
|
|
conf->mail_conference_count++;
|
|
|
|
} else if (strcasecmp(section, "file directories") == 0) {
|
|
|
|
if (conf->file_directory_count == 0) {
|
|
|
|
conf->file_directories = (struct file_directory **)malloc(sizeof(struct file_directory *));
|
|
|
|
} else {
|
|
|
|
conf->file_directories = (struct file_directory **)realloc(conf->file_directories, sizeof(struct file_directory *) * (conf->file_directory_count + 1));
|
|
|
|
}
|
|
|
|
|
|
|
|
conf->file_directories[conf->file_directory_count] = (struct file_directory *)malloc(sizeof(struct file_directory));
|
|
|
|
conf->file_directories[conf->file_directory_count]->name = strdup(name);
|
|
|
|
conf->file_directories[conf->file_directory_count]->path = strdup(value);
|
|
|
|
conf->file_directories[conf->file_directory_count]->file_sub_count = 0;
|
|
|
|
conf->file_directory_count++;
|
|
|
|
} else if (strcasecmp(section, "text files") == 0) {
|
|
|
|
if (conf->text_file_count == 0) {
|
|
|
|
conf->text_files = (struct text_file **)malloc(sizeof(struct text_file *));
|
|
|
|
} else {
|
|
|
|
conf->text_files = (struct text_file **)realloc(conf->text_files, sizeof(struct text_file *) * (conf->text_file_count + 1));
|
|
|
|
}
|
|
|
|
|
|
|
|
conf->text_files[conf->text_file_count] = (struct text_file *)malloc(sizeof(struct text_file));
|
|
|
|
conf->text_files[conf->text_file_count]->name = strdup(name);
|
|
|
|
conf->text_files[conf->text_file_count]->path = strdup(value);
|
|
|
|
conf->text_file_count++;
|
|
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
2016-08-06 11:57:12 +00:00
|
|
|
int ssh_authenticate(ssh_session p_ssh_session) {
|
|
|
|
ssh_message message;
|
|
|
|
char *username;
|
|
|
|
char *password;
|
|
|
|
|
|
|
|
do {
|
2016-08-07 00:06:21 +00:00
|
|
|
message = ssh_message_get(p_ssh_session);
|
2016-08-06 11:57:12 +00:00
|
|
|
switch(ssh_message_type(message)) {
|
|
|
|
case SSH_REQUEST_AUTH:
|
|
|
|
switch(ssh_message_subtype(message)) {
|
|
|
|
case SSH_AUTH_METHOD_PASSWORD:
|
|
|
|
username = ssh_message_auth_user(message);
|
|
|
|
password = ssh_message_auth_password(message);
|
|
|
|
|
|
|
|
if (strcasecmp(username, "new") == 0 && strcasecmp(password, "new") == 0) {
|
2016-08-07 02:29:21 +00:00
|
|
|
ssh_message_auth_reply_success(message, 0);
|
2016-08-06 11:57:12 +00:00
|
|
|
ssh_message_free(message);
|
|
|
|
gUser = NULL;
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
gUser = check_user_pass(username, password);
|
|
|
|
if (gUser != NULL) {
|
2016-08-07 02:29:21 +00:00
|
|
|
ssh_message_auth_reply_success(message, 0);
|
2016-08-06 11:57:12 +00:00
|
|
|
ssh_message_free(message);
|
|
|
|
return 1;
|
|
|
|
}
|
2016-08-07 04:18:57 +00:00
|
|
|
ssh_message_free(message);
|
|
|
|
return 0;
|
2016-08-06 11:57:12 +00:00
|
|
|
case SSH_AUTH_METHOD_NONE:
|
|
|
|
default:
|
|
|
|
ssh_message_auth_set_methods(message, SSH_AUTH_METHOD_PASSWORD | SSH_AUTH_METHOD_INTERACTIVE);
|
|
|
|
ssh_message_reply_default(message);
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
break;
|
|
|
|
default:
|
|
|
|
ssh_message_auth_set_methods(message, SSH_AUTH_METHOD_PASSWORD | SSH_AUTH_METHOD_INTERACTIVE);
|
|
|
|
ssh_message_reply_default(message);
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
ssh_message_free(message);
|
|
|
|
} while(1);
|
|
|
|
}
|
2017-04-04 05:07:25 +00:00
|
|
|
/*
|
2016-08-06 23:54:37 +00:00
|
|
|
char *ssh_getip(ssh_session session) {
|
|
|
|
struct sockaddr_storage tmp;
|
|
|
|
struct sockaddr_in *sock;
|
|
|
|
unsigned int len = 100;
|
|
|
|
char ip[100] = "\0";
|
|
|
|
|
|
|
|
getpeername(ssh_get_fd(session), (struct sockaddr*)&tmp, &len);
|
|
|
|
sock = (struct sockaddr_in *)&tmp;
|
|
|
|
inet_ntop(AF_INET, &sock->sin_addr, ip, len);
|
|
|
|
|
|
|
|
return strdup(ip);
|
|
|
|
}
|
2017-04-04 05:07:25 +00:00
|
|
|
*/
|
2016-08-06 23:54:37 +00:00
|
|
|
static int ssh_copy_fd_to_chan(socket_t fd, int revents, void *userdata) {
|
|
|
|
ssh_channel chan = (ssh_channel)userdata;
|
|
|
|
char buf[2048];
|
|
|
|
int sz = 0;
|
|
|
|
|
|
|
|
if(!chan) {
|
|
|
|
close(fd);
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
if(revents & POLLIN) {
|
|
|
|
sz = read(fd, buf, 2048);
|
|
|
|
if(sz > 0) {
|
|
|
|
ssh_channel_write(chan, buf, sz);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if(revents & POLLHUP) {
|
|
|
|
ssh_channel_close(chan);
|
|
|
|
sz = -1;
|
|
|
|
}
|
|
|
|
return sz;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int ssh_copy_chan_to_fd(ssh_session session,
|
|
|
|
ssh_channel channel,
|
|
|
|
void *data,
|
|
|
|
uint32_t len,
|
|
|
|
int is_stderr,
|
|
|
|
void *userdata) {
|
|
|
|
int fd = *(int*)userdata;
|
|
|
|
int sz;
|
|
|
|
(void)session;
|
|
|
|
(void)channel;
|
|
|
|
(void)is_stderr;
|
|
|
|
|
|
|
|
sz = write(fd, data, len);
|
|
|
|
return sz;
|
|
|
|
}
|
|
|
|
|
|
|
|
static void ssh_chan_close(ssh_session session, ssh_channel channel, void *userdata) {
|
2016-08-07 05:43:29 +00:00
|
|
|
int fd = *(int*)userdata;
|
2016-08-10 01:22:55 +00:00
|
|
|
int status;
|
2016-08-06 23:54:37 +00:00
|
|
|
(void)session;
|
|
|
|
(void)channel;
|
2016-08-07 06:15:41 +00:00
|
|
|
kill(bbs_pid, SIGTERM);
|
2016-08-10 01:22:55 +00:00
|
|
|
waitpid(bbs_pid, &status, 0);
|
2016-08-06 23:54:37 +00:00
|
|
|
close(fd);
|
|
|
|
}
|
|
|
|
|
|
|
|
struct ssh_channel_callbacks_struct ssh_cb = {
|
|
|
|
.channel_data_function = ssh_copy_chan_to_fd,
|
2016-12-11 04:42:28 +00:00
|
|
|
.channel_eof_function = ssh_chan_close,
|
|
|
|
.channel_close_function = ssh_chan_close,
|
2016-08-06 23:54:37 +00:00
|
|
|
.userdata = NULL
|
|
|
|
};
|
|
|
|
|
2016-08-06 11:57:12 +00:00
|
|
|
void serverssh(int port) {
|
|
|
|
ssh_session p_ssh_session;
|
|
|
|
ssh_bind p_ssh_bind;
|
|
|
|
int err;
|
|
|
|
int pid;
|
2016-08-07 03:56:33 +00:00
|
|
|
int shell = 0;
|
2016-08-06 23:54:37 +00:00
|
|
|
int fd;
|
2016-08-06 11:57:12 +00:00
|
|
|
ssh_channel chan = 0;
|
2016-08-06 23:54:37 +00:00
|
|
|
char *ip;
|
|
|
|
ssh_event event;
|
|
|
|
short events;
|
2016-08-07 00:06:21 +00:00
|
|
|
ssh_message message;
|
2016-08-07 03:12:54 +00:00
|
|
|
struct termios tios;
|
2016-12-11 12:14:36 +00:00
|
|
|
struct ip_address_guard *ip_guard;
|
|
|
|
int i;
|
|
|
|
char buffer[1024];
|
|
|
|
FILE *fptr;
|
2017-04-04 05:07:25 +00:00
|
|
|
struct sockaddr_in6 server, client;
|
|
|
|
int ssh_sock, csock, c;
|
|
|
|
int on = 1;
|
|
|
|
char str[INET6_ADDRSTRLEN];
|
|
|
|
|
2016-12-11 12:14:36 +00:00
|
|
|
bbs_stdin = dup(STDIN_FILENO);
|
|
|
|
bbs_stdout = dup(STDOUT_FILENO);
|
|
|
|
bbs_stderr = dup(STDERR_FILENO);
|
|
|
|
|
2016-08-06 11:57:12 +00:00
|
|
|
err = ssh_init();
|
|
|
|
if (err == -1) {
|
|
|
|
fprintf(stderr, "Error starting SSH server.\n");
|
|
|
|
exit(-1);
|
|
|
|
}
|
|
|
|
p_ssh_session = ssh_new();
|
|
|
|
if (p_ssh_session == NULL) {
|
|
|
|
fprintf(stderr, "Error starting SSH server.\n");
|
|
|
|
exit(-1);
|
|
|
|
}
|
|
|
|
|
|
|
|
p_ssh_bind = ssh_bind_new();
|
|
|
|
if (p_ssh_bind == NULL) {
|
|
|
|
fprintf(stderr, "Error starting SSH server.\n");
|
2016-08-07 00:06:21 +00:00
|
|
|
exit(-1);
|
2016-08-06 11:57:12 +00:00
|
|
|
}
|
|
|
|
|
2016-08-07 00:06:21 +00:00
|
|
|
ssh_bind_options_set(p_ssh_bind, SSH_BIND_OPTIONS_DSAKEY, conf.ssh_dsa_key);
|
|
|
|
ssh_bind_options_set(p_ssh_bind, SSH_BIND_OPTIONS_RSAKEY, conf.ssh_rsa_key);
|
2016-08-06 11:57:12 +00:00
|
|
|
|
2017-04-04 05:07:25 +00:00
|
|
|
//ssh_bind_listen(p_ssh_bind);
|
|
|
|
|
|
|
|
ssh_sock = socket(AF_INET6, SOCK_STREAM, 0);
|
2017-04-04 05:10:35 +00:00
|
|
|
if (ssh_sock == -1) {
|
2017-04-04 05:07:25 +00:00
|
|
|
fprintf(stderr, "Error starting SSH server.\n");
|
|
|
|
exit(-1);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
if (setsockopt(ssh_sock, SOL_SOCKET, SO_REUSEADDR, (char *)&on, sizeof(on)) < 0) {
|
|
|
|
fprintf(stderr, "setsockopt(SO_REUSEADDR) failed");
|
|
|
|
exit(-1);
|
|
|
|
}
|
|
|
|
|
|
|
|
memset(&server, 0, sizeof(server));
|
|
|
|
|
|
|
|
server.sin6_family = AF_INET6;
|
|
|
|
server.sin6_addr = in6addr_any;
|
|
|
|
server.sin6_port = htons(port);
|
|
|
|
|
|
|
|
if (bind(ssh_sock, (struct sockaddr *)&server, sizeof(server)) < 0) {
|
|
|
|
perror("Bind Failed, Error\n");
|
|
|
|
exit(1);
|
|
|
|
}
|
2016-08-06 11:57:12 +00:00
|
|
|
|
2017-04-04 05:07:25 +00:00
|
|
|
listen(ssh_sock, 3);
|
|
|
|
c = sizeof(struct sockaddr_in6);
|
|
|
|
while ((csock = accept(ssh_sock, (struct sockaddr *)&client, (socklen_t *)&c))) {
|
|
|
|
if (ssh_bind_accept_fd(p_ssh_bind, p_ssh_session, csock) == SSH_OK) {
|
|
|
|
ip = strdup(inet_ntop(AF_INET6, &client.sin6_addr, str, sizeof(str)));
|
2016-12-11 12:14:36 +00:00
|
|
|
|
|
|
|
if (conf.ipguard_enable) {
|
|
|
|
i = hashmap_get(ip_guard_map, ip, (void **)(&ip_guard));
|
|
|
|
|
|
|
|
if (i == MAP_MISSING) {
|
|
|
|
ip_guard = (struct ip_address_guard *)malloc(sizeof(struct ip_address_guard));
|
|
|
|
ip_guard->status = IP_STATUS_UNKNOWN;
|
|
|
|
ip_guard->last_connection = time(NULL);
|
|
|
|
ip_guard->connection_count = 1;
|
|
|
|
hashmap_put(ip_guard_map, strdup(ip), ip_guard);
|
|
|
|
} else if (i == MAP_OK) {
|
|
|
|
|
|
|
|
if (ip_guard->status == IP_STATUS_BLACKLISTED) {
|
|
|
|
free(ip);
|
|
|
|
ssh_disconnect(p_ssh_session);
|
|
|
|
continue;
|
|
|
|
} else if (ip_guard->status == IP_STATUS_UNKNOWN) {
|
|
|
|
if (ip_guard->last_connection + conf.ipguard_timeout > time(NULL)) {
|
|
|
|
ip_guard->connection_count++;
|
|
|
|
if (ip_guard->connection_count == conf.ipguard_tries) {
|
|
|
|
ip_guard->status = IP_STATUS_BLACKLISTED;
|
|
|
|
snprintf(buffer, 1024, "%s/blacklist.ip", conf.bbs_path);
|
|
|
|
fptr = fopen(buffer, "a");
|
|
|
|
fprintf(fptr, "%s\n", ip);
|
|
|
|
fclose(fptr);
|
|
|
|
free(ip);
|
|
|
|
ssh_disconnect(p_ssh_session);
|
|
|
|
continue;
|
|
|
|
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
ip_guard->connection_count = 0;
|
|
|
|
ip_guard->last_connection = time(NULL);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2016-08-06 11:57:12 +00:00
|
|
|
pid = fork();
|
|
|
|
if (pid == 0) {
|
2017-04-04 05:19:16 +00:00
|
|
|
close(ssh_sock);
|
2016-08-06 11:57:12 +00:00
|
|
|
if (ssh_handle_key_exchange(p_ssh_session)) {
|
2017-04-04 05:19:16 +00:00
|
|
|
fprintf(stderr, "Key exchange failed.\n");
|
2016-08-06 11:57:12 +00:00
|
|
|
exit(-1);
|
|
|
|
}
|
|
|
|
if (ssh_authenticate(p_ssh_session) == 1) {
|
|
|
|
do {
|
|
|
|
message = ssh_message_get(p_ssh_session);
|
|
|
|
if (message) {
|
2016-08-07 02:29:21 +00:00
|
|
|
|
2016-08-06 11:57:12 +00:00
|
|
|
if (ssh_message_type(message) == SSH_REQUEST_CHANNEL_OPEN && ssh_message_subtype(message) == SSH_CHANNEL_SESSION) {
|
|
|
|
chan = ssh_message_channel_request_open_reply_accept(message);
|
|
|
|
ssh_message_free(message);
|
|
|
|
break;
|
|
|
|
} else {
|
|
|
|
ssh_message_reply_default(message);
|
|
|
|
ssh_message_free(message);
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
} while(!chan);
|
|
|
|
if (!chan) {
|
2016-08-07 02:20:31 +00:00
|
|
|
fprintf(stderr, "Failed to get channel\n");
|
2016-08-06 11:57:12 +00:00
|
|
|
ssh_finalize();
|
|
|
|
exit(-1);
|
|
|
|
}
|
|
|
|
|
|
|
|
do {
|
|
|
|
message = ssh_message_get(p_ssh_session);
|
|
|
|
if (message) {
|
|
|
|
if (ssh_message_type(message) == SSH_REQUEST_CHANNEL) {
|
|
|
|
if (ssh_message_subtype(message) == SSH_CHANNEL_REQUEST_SHELL) {
|
|
|
|
shell = 1;
|
2016-08-07 02:01:50 +00:00
|
|
|
ssh_message_channel_request_reply_success(message);
|
2016-08-06 11:57:12 +00:00
|
|
|
ssh_message_free(message);
|
|
|
|
break;
|
|
|
|
} else if (ssh_message_subtype(message) == SSH_CHANNEL_REQUEST_PTY) {
|
2016-08-07 02:01:50 +00:00
|
|
|
ssh_message_channel_request_reply_success(message);
|
2016-08-06 11:57:12 +00:00
|
|
|
ssh_message_free(message);
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
} while (!shell);
|
|
|
|
|
|
|
|
if (!shell) {
|
2016-08-07 02:20:31 +00:00
|
|
|
fprintf(stderr, "Failed to get shell\n");
|
2016-08-06 11:57:12 +00:00
|
|
|
ssh_finalize();
|
|
|
|
exit(-1);
|
|
|
|
}
|
|
|
|
|
2016-12-11 12:14:36 +00:00
|
|
|
|
2016-08-06 23:54:37 +00:00
|
|
|
|
2016-08-07 03:12:54 +00:00
|
|
|
|
|
|
|
|
2016-08-06 23:54:37 +00:00
|
|
|
bbs_pid = forkpty(&fd, NULL, NULL, NULL);
|
|
|
|
if (bbs_pid == 0) {
|
2016-08-07 03:14:26 +00:00
|
|
|
tcgetattr(STDIN_FILENO, &tios);
|
2016-08-07 03:12:54 +00:00
|
|
|
tios.c_lflag &= ~(ICANON | ECHO | ECHONL);
|
2016-08-07 03:45:52 +00:00
|
|
|
tios.c_iflag &= INLCR;
|
2016-08-07 03:14:26 +00:00
|
|
|
tcsetattr(STDIN_FILENO, TCSAFLUSH, &tios);
|
2016-08-06 23:54:37 +00:00
|
|
|
runbbs_ssh(ip);
|
|
|
|
exit(0);
|
|
|
|
}
|
|
|
|
free(ip);
|
|
|
|
ssh_cb.userdata = &fd;
|
|
|
|
ssh_callbacks_init(&ssh_cb);
|
2016-08-07 00:07:32 +00:00
|
|
|
ssh_set_channel_callbacks(chan, &ssh_cb);
|
2016-08-06 23:54:37 +00:00
|
|
|
|
|
|
|
events = POLLIN | POLLPRI | POLLERR | POLLHUP | POLLNVAL;
|
|
|
|
|
|
|
|
event = ssh_event_new();
|
|
|
|
if(event == NULL) {
|
|
|
|
ssh_finalize();
|
|
|
|
exit(0);
|
|
|
|
}
|
|
|
|
if(ssh_event_add_fd(event, fd, events, ssh_copy_fd_to_chan, chan) != SSH_OK) {
|
|
|
|
ssh_finalize();
|
|
|
|
exit(0);
|
|
|
|
}
|
|
|
|
if(ssh_event_add_session(event, p_ssh_session) != SSH_OK) {
|
|
|
|
ssh_finalize();
|
|
|
|
exit(0);
|
|
|
|
}
|
|
|
|
|
|
|
|
do {
|
|
|
|
ssh_event_dopoll(event, 1000);
|
|
|
|
} while(!ssh_channel_is_closed(chan));
|
|
|
|
|
|
|
|
ssh_event_remove_fd(event, fd);
|
|
|
|
|
|
|
|
ssh_event_remove_session(event, p_ssh_session);
|
|
|
|
|
|
|
|
ssh_event_free(event);
|
2016-08-06 11:57:12 +00:00
|
|
|
}
|
2016-08-07 04:28:27 +00:00
|
|
|
ssh_disconnect(p_ssh_session);
|
2016-08-06 23:54:37 +00:00
|
|
|
ssh_finalize();
|
2017-04-04 05:14:06 +00:00
|
|
|
close(csock);
|
2016-08-06 11:57:12 +00:00
|
|
|
exit(0);
|
|
|
|
} else if (pid > 0) {
|
2017-04-04 05:14:06 +00:00
|
|
|
close(csock);
|
2017-04-04 05:19:16 +00:00
|
|
|
free(ip);
|
2016-08-06 11:57:12 +00:00
|
|
|
} else {
|
|
|
|
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2016-08-02 01:58:10 +00:00
|
|
|
void server(int port) {
|
|
|
|
struct sigaction sa;
|
|
|
|
struct sigaction st;
|
2016-08-12 06:15:10 +00:00
|
|
|
struct sigaction sq;
|
|
|
|
int client_sock, c;
|
2016-03-22 01:48:59 +00:00
|
|
|
int pid;
|
2016-12-11 04:42:28 +00:00
|
|
|
char *ip;
|
2017-04-04 04:19:05 +00:00
|
|
|
struct sockaddr_in6 server, client;
|
2016-12-11 04:42:28 +00:00
|
|
|
FILE *fptr;
|
|
|
|
char buffer[1024];
|
|
|
|
struct ip_address_guard *ip_guard;
|
|
|
|
int i;
|
2017-04-04 04:19:05 +00:00
|
|
|
int on = 1;
|
|
|
|
char str[INET6_ADDRSTRLEN];
|
2016-08-16 10:28:48 +00:00
|
|
|
#if defined(ENABLE_WWW)
|
|
|
|
www_daemon = NULL;
|
|
|
|
#endif
|
2016-08-02 01:58:10 +00:00
|
|
|
|
2017-04-09 03:17:22 +00:00
|
|
|
if (!conf.fork) {
|
|
|
|
printf("Magicka BBS Server Starting....\n");
|
|
|
|
}
|
|
|
|
|
2016-12-11 04:42:28 +00:00
|
|
|
if (conf.ipguard_enable) {
|
|
|
|
|
|
|
|
ip_guard_map = hashmap_new();
|
|
|
|
|
|
|
|
snprintf(buffer, 1024, "%s/whitelist.ip", conf.bbs_path);
|
|
|
|
|
|
|
|
fptr = fopen(buffer, "r");
|
|
|
|
if (fptr) {
|
|
|
|
fgets(buffer, 1024, fptr);
|
|
|
|
while (!feof(fptr)) {
|
|
|
|
for (i=strlen(buffer)-1;i> 0; i--) {
|
|
|
|
if (buffer[i] == '\r' || buffer[i] == '\n') {
|
|
|
|
buffer[i] = '\0';
|
|
|
|
} else {
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
ip_guard = (struct ip_address_guard *)malloc(sizeof(struct ip_address_guard));
|
|
|
|
ip_guard->status = IP_STATUS_WHITELISTED;
|
|
|
|
|
|
|
|
hashmap_put(ip_guard_map, strdup(buffer), ip_guard);
|
|
|
|
|
|
|
|
fgets(buffer, 1024, fptr);
|
|
|
|
}
|
|
|
|
fclose(fptr);
|
|
|
|
}
|
|
|
|
snprintf(buffer, 1024, "%s/blacklist.ip", conf.bbs_path);
|
|
|
|
|
|
|
|
fptr = fopen(buffer, "r");
|
|
|
|
if (fptr) {
|
|
|
|
fgets(buffer, 1024, fptr);
|
|
|
|
while (!feof(fptr)) {
|
|
|
|
for (i=strlen(buffer)-1;i> 0; i--) {
|
|
|
|
if (buffer[i] == '\r' || buffer[i] == '\n') {
|
|
|
|
buffer[i] = '\0';
|
|
|
|
} else {
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
ip_guard = (struct ip_address_guard *)malloc(sizeof(struct ip_address_guard));
|
|
|
|
ip_guard->status = IP_STATUS_BLACKLISTED;
|
|
|
|
|
|
|
|
hashmap_put(ip_guard_map, strdup(buffer), ip_guard);
|
|
|
|
|
|
|
|
fgets(buffer, 1024, fptr);
|
|
|
|
}
|
|
|
|
fclose(fptr);
|
|
|
|
}
|
|
|
|
}
|
2016-03-27 11:53:46 +00:00
|
|
|
sa.sa_handler = sigchld_handler; // reap all dead processes
|
2016-08-02 01:58:10 +00:00
|
|
|
sigemptyset(&sa.sa_mask);
|
2016-08-16 10:28:48 +00:00
|
|
|
sa.sa_flags = SA_RESTART | SA_SIGINFO;
|
2016-08-02 01:58:10 +00:00
|
|
|
if (sigaction(SIGCHLD, &sa, NULL) == -1) {
|
2016-08-16 10:28:48 +00:00
|
|
|
perror("sigaction - sigchld");
|
2016-08-05 03:49:24 +00:00
|
|
|
remove(conf.pid_file);
|
2016-08-02 01:58:10 +00:00
|
|
|
exit(1);
|
|
|
|
}
|
|
|
|
|
|
|
|
st.sa_handler = sigterm_handler;
|
|
|
|
sigemptyset(&st.sa_mask);
|
2016-08-16 10:28:48 +00:00
|
|
|
st.sa_flags = SA_SIGINFO;
|
2016-08-02 01:58:10 +00:00
|
|
|
if (sigaction(SIGTERM, &st, NULL) == -1) {
|
2016-08-16 10:28:48 +00:00
|
|
|
perror("sigaction - sigterm");
|
2016-08-05 03:49:24 +00:00
|
|
|
remove(conf.pid_file);
|
2016-08-02 01:58:10 +00:00
|
|
|
exit(1);
|
|
|
|
}
|
|
|
|
|
2016-08-12 06:15:10 +00:00
|
|
|
sq.sa_handler = sigterm_handler;
|
|
|
|
sigemptyset(&sq.sa_mask);
|
2016-08-16 10:28:48 +00:00
|
|
|
sq.sa_flags = SA_SIGINFO;
|
2016-08-12 06:15:10 +00:00
|
|
|
if (sigaction(SIGQUIT, &sq, NULL) == -1) {
|
2016-08-16 10:28:48 +00:00
|
|
|
perror("sigaction - sigquit");
|
2016-08-12 06:15:10 +00:00
|
|
|
remove(conf.pid_file);
|
|
|
|
exit(1);
|
|
|
|
}
|
|
|
|
|
2016-08-06 23:54:37 +00:00
|
|
|
if (conf.ssh_server) {
|
2017-04-09 03:17:22 +00:00
|
|
|
if (!conf.fork) {
|
|
|
|
printf(" - SSH Starting on Port %d\n", conf.ssh_port);
|
|
|
|
}
|
|
|
|
|
2016-08-06 23:54:37 +00:00
|
|
|
// fork ssh server
|
|
|
|
ssh_pid = fork();
|
|
|
|
|
2016-08-13 01:07:02 +00:00
|
|
|
if (ssh_pid == 0) {
|
2016-08-13 04:17:28 +00:00
|
|
|
ssh_pid = -1;
|
2016-08-06 23:54:37 +00:00
|
|
|
serverssh(conf.ssh_port);
|
|
|
|
exit(0);
|
|
|
|
}
|
2016-08-13 01:07:02 +00:00
|
|
|
if (ssh_pid < 0) {
|
2016-08-06 23:54:37 +00:00
|
|
|
fprintf(stderr, "Error forking ssh server.");
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2016-08-16 10:28:48 +00:00
|
|
|
#if defined(ENABLE_WWW)
|
|
|
|
if (conf.www_server && conf.www_path != NULL) {
|
2017-04-09 03:17:22 +00:00
|
|
|
if (!conf.fork) {
|
|
|
|
printf(" - HTTP Starting on Port %d\n", conf.www_port);
|
|
|
|
}
|
2016-08-17 00:55:03 +00:00
|
|
|
www_init();
|
2017-04-04 05:26:49 +00:00
|
|
|
www_daemon = MHD_start_daemon(MHD_USE_THREAD_PER_CONNECTION|MHD_USE_DUAL_STACK, conf.www_port, NULL, NULL, &www_handler, NULL, MHD_OPTION_NOTIFY_COMPLETED, &www_request_completed, NULL, MHD_OPTION_URI_LOG_CALLBACK, &www_logger, NULL, MHD_OPTION_END);
|
2016-08-16 10:28:48 +00:00
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
2017-04-04 04:19:05 +00:00
|
|
|
server_socket = socket(AF_INET6, SOCK_STREAM, 0);
|
2016-08-12 06:15:10 +00:00
|
|
|
if (server_socket == -1) {
|
2016-08-05 03:49:24 +00:00
|
|
|
remove(conf.pid_file);
|
2016-08-04 09:25:49 +00:00
|
|
|
fprintf(stderr, "Couldn't create socket..\n");
|
2016-08-02 01:58:10 +00:00
|
|
|
exit(1);
|
2016-03-22 01:48:59 +00:00
|
|
|
}
|
2016-08-02 01:58:10 +00:00
|
|
|
|
|
|
|
|
2017-04-04 04:19:05 +00:00
|
|
|
if (setsockopt(server_socket, SOL_SOCKET, SO_REUSEADDR, (char *)&on, sizeof(on)) < 0) {
|
|
|
|
remove(conf.pid_file);
|
|
|
|
fprintf(stderr, "setsockopt(SO_REUSEADDR) failed");
|
|
|
|
exit(1);
|
|
|
|
}
|
|
|
|
|
|
|
|
memset(&server, 0, sizeof(server));
|
|
|
|
|
|
|
|
server.sin6_family = AF_INET6;
|
|
|
|
server.sin6_addr = in6addr_any;
|
|
|
|
server.sin6_port = htons(port);
|
2016-08-02 01:58:10 +00:00
|
|
|
|
2017-04-09 03:17:22 +00:00
|
|
|
if (!conf.fork) {
|
|
|
|
printf(" - Telnet Starting on Port %d\n", port);
|
|
|
|
}
|
|
|
|
|
2016-08-12 06:15:10 +00:00
|
|
|
if (bind(server_socket, (struct sockaddr *)&server, sizeof(server)) < 0) {
|
2016-03-22 01:48:59 +00:00
|
|
|
perror("Bind Failed, Error\n");
|
2016-08-12 06:15:10 +00:00
|
|
|
remove(conf.pid_file);
|
2016-08-02 01:58:10 +00:00
|
|
|
exit(1);
|
2016-03-22 01:48:59 +00:00
|
|
|
}
|
2016-08-02 01:58:10 +00:00
|
|
|
|
2016-08-12 06:15:10 +00:00
|
|
|
listen(server_socket, 3);
|
2016-08-02 01:58:10 +00:00
|
|
|
|
2017-04-04 04:19:05 +00:00
|
|
|
c = sizeof(struct sockaddr_in6);
|
2016-08-02 01:58:10 +00:00
|
|
|
|
2016-08-12 06:15:10 +00:00
|
|
|
while ((client_sock = accept(server_socket, (struct sockaddr *)&client, (socklen_t *)&c))) {
|
2017-04-04 04:19:05 +00:00
|
|
|
ip = strdup(inet_ntop(AF_INET6, &client.sin6_addr, str, sizeof(str)));
|
2016-08-01 12:03:46 +00:00
|
|
|
if (client_sock == -1) {
|
2016-08-02 01:58:10 +00:00
|
|
|
if (errno == EINTR) {
|
2016-08-01 12:03:46 +00:00
|
|
|
continue;
|
|
|
|
} else {
|
|
|
|
exit(-1);
|
|
|
|
}
|
|
|
|
}
|
2016-12-11 04:42:28 +00:00
|
|
|
|
|
|
|
if (conf.ipguard_enable) {
|
|
|
|
i = hashmap_get(ip_guard_map, ip, (void **)(&ip_guard));
|
|
|
|
|
|
|
|
if (i == MAP_MISSING) {
|
|
|
|
ip_guard = (struct ip_address_guard *)malloc(sizeof(struct ip_address_guard));
|
|
|
|
ip_guard->status = IP_STATUS_UNKNOWN;
|
|
|
|
ip_guard->last_connection = time(NULL);
|
|
|
|
ip_guard->connection_count = 1;
|
2016-12-11 05:12:18 +00:00
|
|
|
hashmap_put(ip_guard_map, strdup(ip), ip_guard);
|
2016-12-11 04:42:28 +00:00
|
|
|
} else if (i == MAP_OK) {
|
|
|
|
|
|
|
|
if (ip_guard->status == IP_STATUS_BLACKLISTED) {
|
|
|
|
write(client_sock, "BLOCKED\r\n", 9);
|
|
|
|
free(ip);
|
|
|
|
close(client_sock);
|
|
|
|
continue;
|
|
|
|
} else if (ip_guard->status == IP_STATUS_UNKNOWN) {
|
2016-12-11 05:17:09 +00:00
|
|
|
if (ip_guard->last_connection + conf.ipguard_timeout > time(NULL)) {
|
2016-12-11 04:42:28 +00:00
|
|
|
ip_guard->connection_count++;
|
|
|
|
if (ip_guard->connection_count == conf.ipguard_tries) {
|
|
|
|
ip_guard->status = IP_STATUS_BLACKLISTED;
|
|
|
|
snprintf(buffer, 1024, "%s/blacklist.ip", conf.bbs_path);
|
|
|
|
fptr = fopen(buffer, "a");
|
|
|
|
fprintf(fptr, "%s\n", ip);
|
|
|
|
fclose(fptr);
|
|
|
|
write(client_sock, "BLOCKED\r\n", 9);
|
|
|
|
free(ip);
|
|
|
|
close(client_sock);
|
|
|
|
continue;
|
|
|
|
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
ip_guard->connection_count = 0;
|
|
|
|
ip_guard->last_connection = time(NULL);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
2016-03-22 01:48:59 +00:00
|
|
|
pid = fork();
|
2016-08-02 01:58:10 +00:00
|
|
|
|
2016-03-22 01:48:59 +00:00
|
|
|
if (pid < 0) {
|
|
|
|
perror("Error on fork\n");
|
2016-08-02 01:58:10 +00:00
|
|
|
exit(1);
|
2016-03-22 01:48:59 +00:00
|
|
|
}
|
2016-08-02 01:58:10 +00:00
|
|
|
|
2016-03-22 01:48:59 +00:00
|
|
|
if (pid == 0) {
|
2016-08-12 06:15:10 +00:00
|
|
|
close(server_socket);
|
|
|
|
server_socket = -1;
|
2016-12-11 04:42:28 +00:00
|
|
|
runbbs(client_sock, ip);
|
2016-08-02 01:58:10 +00:00
|
|
|
|
2016-03-22 01:48:59 +00:00
|
|
|
exit(0);
|
|
|
|
} else {
|
2016-12-11 04:42:28 +00:00
|
|
|
free(ip);
|
2016-03-22 01:48:59 +00:00
|
|
|
close(client_sock);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
2016-08-02 01:58:10 +00:00
|
|
|
|
|
|
|
int main(int argc, char **argv) {
|
|
|
|
int i;
|
|
|
|
int main_pid;
|
|
|
|
FILE *fptr;
|
2016-08-04 09:42:50 +00:00
|
|
|
struct stat s;
|
2016-12-10 07:55:47 +00:00
|
|
|
char buffer[1024];
|
|
|
|
|
2016-08-06 11:57:12 +00:00
|
|
|
if (argc < 2) {
|
|
|
|
fprintf(stderr, "Usage ./magicka config/bbs.ini\n");
|
2016-08-02 01:58:10 +00:00
|
|
|
exit(1);
|
|
|
|
}
|
|
|
|
|
|
|
|
conf.mail_conference_count = 0;
|
|
|
|
conf.door_count = 0;
|
|
|
|
conf.file_directory_count = 0;
|
2017-03-20 01:37:56 +00:00
|
|
|
conf.mgchat_server = NULL;
|
|
|
|
conf.mgchat_port = 2025;
|
2017-03-20 01:47:36 +00:00
|
|
|
conf.mgchat_bbstag = NULL;
|
2016-08-02 01:58:10 +00:00
|
|
|
conf.text_file_count = 0;
|
|
|
|
conf.external_editor_cmd = NULL;
|
|
|
|
conf.log_path = NULL;
|
|
|
|
conf.script_path = NULL;
|
|
|
|
conf.automsgwritelvl = 10;
|
|
|
|
conf.echomail_sem = NULL;
|
|
|
|
conf.netmail_sem = NULL;
|
2016-08-06 11:57:12 +00:00
|
|
|
conf.telnet_port = 0;
|
2016-08-14 09:56:15 +00:00
|
|
|
conf.string_file = NULL;
|
2016-08-16 10:28:48 +00:00
|
|
|
conf.www_path = NULL;
|
2016-12-08 04:08:04 +00:00
|
|
|
conf.archiver_count = 0;
|
2016-12-08 12:17:19 +00:00
|
|
|
conf.broadcast_enable = 0;
|
2016-12-09 03:57:17 +00:00
|
|
|
conf.broadcast_port = 0;
|
|
|
|
conf.broadcast_address = NULL;
|
2016-12-10 07:55:47 +00:00
|
|
|
conf.config_path = NULL;
|
2016-12-11 04:42:28 +00:00
|
|
|
conf.ipguard_enable = 0;
|
|
|
|
conf.ipguard_tries = 4;
|
|
|
|
conf.ipguard_timeout = 120;
|
2016-12-14 01:31:04 +00:00
|
|
|
conf.protocol_count = 0;
|
2016-12-14 09:27:57 +00:00
|
|
|
|
2016-08-02 01:58:10 +00:00
|
|
|
// Load BBS data
|
|
|
|
if (ini_parse(argv[1], handler, &conf) <0) {
|
2016-08-04 09:25:49 +00:00
|
|
|
fprintf(stderr, "Unable to load configuration ini (%s)!\n", argv[1]);
|
2016-08-02 01:58:10 +00:00
|
|
|
exit(-1);
|
|
|
|
}
|
2016-12-10 07:55:47 +00:00
|
|
|
|
|
|
|
if (conf.config_path == NULL) {
|
|
|
|
fprintf(stderr, "Config Path must be set in your bbs ini!\n");
|
|
|
|
exit(-1);
|
|
|
|
}
|
|
|
|
|
2017-04-12 12:34:08 +00:00
|
|
|
if (conf.root_menu == NULL) {
|
|
|
|
fprintf(stderr, "Root Menu must be set in your bbs ini!\n");
|
|
|
|
exit(-1);
|
|
|
|
}
|
|
|
|
|
2016-08-02 01:58:10 +00:00
|
|
|
// Load mail Areas
|
|
|
|
for (i=0;i<conf.mail_conference_count;i++) {
|
|
|
|
if (ini_parse(conf.mail_conferences[i]->path, mail_area_handler, conf.mail_conferences[i]) <0) {
|
2016-08-04 09:25:49 +00:00
|
|
|
fprintf(stderr, "Unable to load configuration ini (%s)!\n", conf.mail_conferences[i]->path);
|
2016-08-02 01:58:10 +00:00
|
|
|
exit(-1);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
// Load file Subs
|
|
|
|
for (i=0;i<conf.file_directory_count;i++) {
|
|
|
|
if (ini_parse(conf.file_directories[i]->path, file_sub_handler, conf.file_directories[i]) <0) {
|
2016-08-04 09:25:49 +00:00
|
|
|
fprintf(stderr, "Unable to load configuration ini (%s)!\n", conf.file_directories[i]->path);
|
2016-08-02 01:58:10 +00:00
|
|
|
exit(-1);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2016-12-10 07:55:47 +00:00
|
|
|
snprintf(buffer, 1024, "%s/doors.ini", conf.config_path);
|
|
|
|
|
|
|
|
if (ini_parse(buffer, door_config_handler, &conf) <0) {
|
2016-08-04 09:25:49 +00:00
|
|
|
fprintf(stderr, "Unable to load configuration ini (doors.ini)!\n");
|
2016-08-02 01:58:10 +00:00
|
|
|
exit(-1);
|
|
|
|
}
|
|
|
|
|
2016-12-10 07:55:47 +00:00
|
|
|
snprintf(buffer, 1024, "%s/archivers.ini", conf.config_path);
|
|
|
|
if (ini_parse(buffer, archiver_config_handler, &conf) <0) {
|
|
|
|
fprintf(stderr, "Unable to load configuration ini %s\n", buffer);
|
|
|
|
exit(-1);
|
|
|
|
}
|
|
|
|
|
|
|
|
snprintf(buffer, 1024, "%s/protocols.ini", conf.config_path);
|
|
|
|
if (ini_parse(buffer, protocol_config_handler, &conf) <0) {
|
|
|
|
fprintf(stderr, "Unable to load configuration ini %s\n", buffer);
|
|
|
|
exit(-1);
|
2016-12-08 04:08:04 +00:00
|
|
|
}
|
|
|
|
|
2016-12-10 07:55:47 +00:00
|
|
|
|
2016-08-14 09:56:15 +00:00
|
|
|
load_strings();
|
|
|
|
|
2016-08-02 01:58:10 +00:00
|
|
|
if (conf.fork) {
|
2016-08-04 09:41:43 +00:00
|
|
|
if (stat(conf.pid_file, &s) == 0) {
|
|
|
|
fprintf(stderr, "Magicka already running or stale pid file at: %s\n", conf.pid_file);
|
|
|
|
exit(-1);
|
|
|
|
}
|
|
|
|
|
2016-08-02 01:58:10 +00:00
|
|
|
main_pid = fork();
|
|
|
|
|
|
|
|
if (main_pid < 0) {
|
|
|
|
fprintf(stderr, "Error forking.\n");
|
|
|
|
exit(-1);
|
|
|
|
} else
|
|
|
|
if (main_pid > 0) {
|
|
|
|
fptr = fopen(conf.pid_file, "w");
|
|
|
|
if (!fptr) {
|
|
|
|
fprintf(stderr, "Unable to open pid file for writing.\n");
|
|
|
|
} else {
|
|
|
|
fprintf(fptr, "%d", main_pid);
|
|
|
|
fclose(fptr);
|
|
|
|
}
|
|
|
|
} else {
|
2016-08-07 00:06:21 +00:00
|
|
|
server(conf.telnet_port);
|
2016-08-02 01:58:10 +00:00
|
|
|
}
|
|
|
|
} else {
|
2016-08-07 00:06:21 +00:00
|
|
|
server(conf.telnet_port);
|
2016-08-02 01:58:10 +00:00
|
|
|
}
|
|
|
|
}
|