diff options
Diffstat (limited to 'src/nu_server.c')
| -rwxr-xr-x | src/nu_server.c | 99 |
1 files changed, 83 insertions, 16 deletions
diff --git a/src/nu_server.c b/src/nu_server.c index 942be1b..29819ee 100755 --- a/src/nu_server.c +++ b/src/nu_server.c | |||
| @@ -1,3 +1,5 @@ | |||
| 1 | #include <time.h> | ||
| 2 | #include <fcntl.h> | ||
| 1 | #include <signal.h> | 3 | #include <signal.h> |
| 2 | #include <sys/types.h> | 4 | #include <sys/types.h> |
| 3 | #include <sys/socket.h> | 5 | #include <sys/socket.h> |
| @@ -8,29 +10,64 @@ | |||
| 8 | #include "nu_header.h" | 10 | #include "nu_header.h" |
| 9 | 11 | ||
| 10 | static void bailout( char *reason ); | 12 | static void bailout( char *reason ); |
| 13 | static void sigint( int reason ) { bailout( "User interrupt." ); } | ||
| 14 | static void packet_dump( SMB_HEADER *buf ); | ||
| 11 | static mainsock = -1; | 15 | static mainsock = -1; |
| 12 | static childsock = -1; | 16 | static childsock = -1; |
| 13 | 17 | ||
| 18 | static QWORD getnttime( struct timeval *t ) { | ||
| 19 | return 10000000ll * ( t->tv_sec + 11644473600ll ) + t->tv_usec * 10ll; | ||
| 20 | } | ||
| 21 | |||
| 14 | static void netbios_read( SMB_HEADER **buf) { | 22 | static void netbios_read( SMB_HEADER **buf) { |
| 15 | BYTE bytes[4]; | 23 | BYTE bytes[4]; |
| 16 | ssize_t bytesread, bytestoread; | 24 | ssize_t bytestoread; |
| 17 | 25 | ||
| 18 | if( read( childsock, bytes, 4) < 4 ) | 26 | if( read( childsock, bytes, 4) < 4 ) |
| 19 | bailout( "Short read." ); | 27 | bailout( "Short read." ); |
| 20 | bytestoread = htons(*(WORD*)(2+bytes)); | 28 | bytestoread = htons(*(WORD*)(bytes+2)); |
| 21 | if( (*buf = (SMB_HEADER*)realloc( *buf, 4 + bytestoread )) == NULL) | 29 | if( (*buf = (SMB_HEADER*)realloc( *buf, 4 + bytestoread )) == NULL) |
| 22 | bailout( "Out of memory"); | 30 | bailout( "Out of memory."); |
| 23 | *(DWORD*)*buf = *(DWORD*)bytes; | 31 | *(DWORD*)*buf = *(DWORD*)bytes; |
| 24 | bytesread = read( childsock, ((BYTE*)buf) + 4, bytestoread); | 32 | if( read( childsock, ((BYTE*)*buf) + 4, bytestoread) != bytestoread ) |
| 25 | if( bytesread != bytestoread ) | ||
| 26 | bailout( "Short read." ); | 33 | bailout( "Short read." ); |
| 27 | } | 34 | } |
| 28 | 35 | ||
| 29 | static void netbios_write( BYTE command, BYTE *buf, WORD size ) { | 36 | static void netbios_write( BYTE cmd, SMB_HEADER *buf, SMB_HEADER2 *buf2 ) { |
| 30 | BYTE netbios_header[4] = { command, 0, size >> 8, size & 255 }; | 37 | const BYTE buf2_[2] = { 0, 0 }; |
| 31 | if( write( childsock, netbios_header, 4 ) <= 0 || | 38 | if(!buf2 ) buf2 = (SMB_HEADER2*)buf2_; |
| 32 | write( childsock, buf, size ) < 0 ) | 39 | if( buf ) { |
| 33 | bailout( "Write failed." ); | 40 | struct iovec iov[2] = { {buf, SIZEOF_SMB_HEADER + 2*buf->WordCount}, |
| 41 | {buf2, 2 + buf2->ByteCount} }; | ||
| 42 | |||
| 43 | buf->netbios_command = cmd; | ||
| 44 | buf->netbios_flags = 0; | ||
| 45 | buf->netbios_size = htons( SIZEOF_SMB_HEADER - 4 + | ||
| 46 | 2 * buf->WordCount + | ||
| 47 | 2 + buf2->ByteCount ); | ||
| 48 | buf->Flags = 0x88; | ||
| 49 | buf->Flags2 = 0x4001; | ||
| 50 | |||
| 51 | if( writev( childsock, iov, 2 ) < htons( buf->netbios_size ) + 4 ) | ||
| 52 | bailout( "Write failed." ); | ||
| 53 | } else { | ||
| 54 | const BYTE buf_[4] = { cmd, 0, 0, 0 }; | ||
| 55 | if( write( childsock, buf_, 4 ) < 4) | ||
| 56 | bailout( "Write failed." ); | ||
| 57 | } | ||
| 58 | } | ||
| 59 | |||
| 60 | static void packet_dump( SMB_HEADER *buf ) { | ||
| 61 | fprintf( stderr, "netbios_cmd, flag, size = %02X, %02X, %04X\n", buf->netbios_command, buf->netbios_flags, buf->netbios_size ); | ||
| 62 | fprintf( stderr, "Protocol = %08X\n", *(DWORD*)&buf->Protocol); | ||
| 63 | fprintf( stderr, "Command = %02X\n", buf->Command); | ||
| 64 | fprintf( stderr, "Status = %08X\n", *(DWORD*)&buf->Status); | ||
| 65 | fprintf( stderr, "Flags, Flags2 = %02X, %04X\n", buf->Flags, buf->Flags2); | ||
| 66 | fprintf( stderr, "Pad = %04X %04X %04X %04X %04X %04X\n", | ||
| 67 | buf->Pad[0], buf->Pad[1], buf->Pad[2], | ||
| 68 | buf->Pad[3], buf->Pad[4], buf->Pad[5] ); | ||
| 69 | fprintf( stderr, "TreeID,ProcessID,UserID = %04X, %04X, %04X\n", buf->TreeID, buf->ProcessID, buf->UserID); | ||
| 70 | fprintf( stderr, "MultiplexID, WordCount = %04X, %02X\n", buf->MultiplexID, buf->WordCount); | ||
| 34 | } | 71 | } |
| 35 | 72 | ||
| 36 | static void child( ) { | 73 | static void child( ) { |
| @@ -44,25 +81,53 @@ static void child( ) { | |||
| 44 | netbios_read( &inpacket ); | 81 | netbios_read( &inpacket ); |
| 45 | if( inpacket->netbios_command != 0x81 ) | 82 | if( inpacket->netbios_command != 0x81 ) |
| 46 | bailout( "No session request"); | 83 | bailout( "No session request"); |
| 47 | netbios_write( 0x82, NULL, 0 ); | 84 | netbios_write( 0x82, NULL, NULL ); |
| 48 | 85 | ||
| 49 | while( 1 ) { | 86 | while( 1 ) { |
| 87 | WORD *ParameterWords; | ||
| 50 | netbios_read( &inpacket ); | 88 | netbios_read( &inpacket ); |
| 89 | packet_dump( inpacket ); | ||
| 90 | ParameterWords = (WORD*)(((BYTE*)inpacket)+SIZEOF_SMB_HEADER); | ||
| 91 | |||
| 51 | if( inpacket->netbios_command != 0 ) | 92 | if( inpacket->netbios_command != 0 ) |
| 52 | bailout( "Unhandled netbios command" ); | 93 | bailout( "Unhandled netbios command" ); |
| 53 | if( inpacket->Protocol != SMB_HEADER_PROTOCOL_MAGIC ) | 94 | if( *(DWORD*)&inpacket->Protocol != SMB_HEADER_PROTOCOL_MAGIC ) |
| 54 | bailout( "Protocol identifier mismatch"); | 95 | bailout( "Protocol identifier mismatch"); |
| 55 | 96 | ||
| 56 | switch( inpacket->Command ) { | 97 | switch( inpacket->Command ) { |
| 57 | case SMB_COM_NEGOTIATE: | 98 | case SMB_COM_NEGOTIATE: |
| 58 | { | 99 | { |
| 59 | BYTE outblock[5] = { 0xff,0,0,0,0 }; | 100 | BYTE myself[] = { 8,0,0x67,0x61,0x74,0x6c,0x69,0x6e,0x67,0x00 }; |
| 60 | netbios_write( 0, outblock, sizeof( outblock )); | 101 | struct timeval t; gettimeofday( &t, NULL ); |
| 102 | |||
| 103 | inpacket = (SMB_HEADER*)realloc( inpacket, SIZEOF_SMB_HEADER + 17 * 2 ); | ||
| 104 | *(DWORD*)&inpacket->Status = STATUS_SUCCESS; | ||
| 105 | |||
| 106 | ParameterWords = (WORD*)(((BYTE*)inpacket)+SIZEOF_SMB_HEADER-1); | ||
| 107 | ParameterWords[0] = 0x0511; /* Protocol Version 5, 17 bytes */ | ||
| 108 | ParameterWords[1] = 0; /* security mode: share, no c/r */ | ||
| 109 | ParameterWords[2] = 1; /* Max pending */ | ||
| 110 | ParameterWords[3] = 1; /* Only one VC */ | ||
| 111 | ParameterWords[4] = 0; /* Max Buffer Size */ | ||
| 112 | ParameterWords[5] = 0x100; /* Max Buffer Size #2 */ | ||
| 113 | ParameterWords[6] = 0; /* Max Raw Size */ | ||
| 114 | ParameterWords[7] = 0x100; /* Max Raw Size #2 */ | ||
| 115 | ParameterWords[8] = getpid(); /* unique id */ | ||
| 116 | ParameterWords[9] = getppid(); /* unique id #2 */ | ||
| 117 | ParameterWords[10] = 0; /* Capabilities */ | ||
| 118 | ParameterWords[11] = 0; /* Capabilities #2 */ | ||
| 119 | *(QWORD*)&ParameterWords[12] = getnttime( &t ); | ||
| 120 | ParameterWords[16] = 0; | ||
| 121 | *(BYTE *)&ParameterWords[17] = 0; | ||
| 122 | netbios_write( 0, inpacket, (SMB_HEADER2*)myself); | ||
| 61 | break; | 123 | break; |
| 62 | } | 124 | } |
| 63 | default: | 125 | default: |
| 64 | { | 126 | { |
| 65 | fprintf( stderr, "Got message: %02X\n", inpacket->Command ); | 127 | fprintf( stderr, "Got message: %02X\n", inpacket->Command ); |
| 128 | inpacket->WordCount = 0; | ||
| 129 | *(DWORD*)&inpacket->Status = 0x00400002; | ||
| 130 | netbios_write( 0, inpacket, NULL ); | ||
| 66 | break; | 131 | break; |
| 67 | } | 132 | } |
| 68 | } | 133 | } |
| @@ -70,8 +135,6 @@ static void child( ) { | |||
| 70 | } /* End main loop */ | 135 | } /* End main loop */ |
| 71 | } | 136 | } |
| 72 | 137 | ||
| 73 | void sigint( int reason ) { bailout( "User interrupt." ); } | ||
| 74 | |||
| 75 | int main() | 138 | int main() |
| 76 | { | 139 | { |
| 77 | struct sockaddr_in sa; | 140 | struct sockaddr_in sa; |
| @@ -86,7 +149,11 @@ int main() | |||
| 86 | 149 | ||
| 87 | if( ( mainsock = socket( PF_INET, SOCK_STREAM, 0) ) == -1) | 150 | if( ( mainsock = socket( PF_INET, SOCK_STREAM, 0) ) == -1) |
| 88 | bailout( "Could not open socket"); | 151 | bailout( "Could not open socket"); |
| 152 | #ifdef SO_REUSEPORT | ||
| 89 | setsockopt( mainsock, SOL_SOCKET, SO_REUSEPORT, &l, sizeof(l)); | 153 | setsockopt( mainsock, SOL_SOCKET, SO_REUSEPORT, &l, sizeof(l)); |
| 154 | #else | ||
| 155 | setsockopt( mainsock, SOL_SOCKET, SO_REUSEADDR, &l, sizeof(l)); | ||
| 156 | #endif | ||
| 90 | if( bind( mainsock, (struct sockaddr *)&sa, sizeof( sa)) != 0) | 157 | if( bind( mainsock, (struct sockaddr *)&sa, sizeof( sa)) != 0) |
| 91 | bailout( "Could not bind socket"); | 158 | bailout( "Could not bind socket"); |
| 92 | if( listen( mainsock, 1024) != 0 ) | 159 | if( listen( mainsock, 1024) != 0 ) |
