/* ====================================================================
* The Apache Software License, Version 1.1
*
* Copyright (c) 2000 The Apache Software Foundation. All rights
* reserved.
*
* Redistribution and use in source and binary forms, with or without
* modification, are permitted provided that the following conditions
* are met:
*
* 1. Redistributions of source code must retain the above copyright
* notice, this list of conditions and the following disclaimer.
*
* 2. Redistributions in binary form must reproduce the above copyright
* notice, this list of conditions and the following disclaimer in
* the documentation and/or other materials provided with the
* distribution.
*
* 3. The end-user documentation included with the redistribution,
* if any, must include the following acknowledgment:
* "This product includes software developed by the
* Apache Software Foundation (http://www.apache.org/)."
* Alternately, this acknowledgment may appear in the software itself,
* if and wherever such third-party acknowledgments normally appear.
*
* 4. The names "Apache" and "Apache Software Foundation" must
* not be used to endorse or promote products derived from this
* software without prior written permission. For written
* permission, please contact apache@apache.org.
*
* 5. Products derived from this software may not be called "Apache",
* nor may "Apache" appear in their name, without prior written
* permission of the Apache Software Foundation.
*
* THIS SOFTWARE IS PROVIDED ``AS IS'' AND ANY EXPRESSED OR IMPLIED
* WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
* OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
* DISCLAIMED. IN NO EVENT SHALL THE APACHE SOFTWARE FOUNDATION OR
* ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
* SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
* LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF
* USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND
* ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY,
* OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT
* OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
* SUCH DAMAGE.
* ====================================================================
*
* This software consists of voluntary contributions made by many
* individuals on behalf of the Apache Software Foundation. For more
* information on the Apache Software Foundation, please see
*
"); } else { apr_snprintf(buf, sizeof(buf), "\n(%s)\n", cwd); } total_bytes_sent += ap_proxy_bputs2(buf, con->client_socket, c); while (!con->aborted) { n = ap_bgets(buf, sizeof buf, f); if (n == -1) { /* input error */ if (c != NULL) { ap_log_rerror(APLOG_MARK, APLOG_ERR, 0, r, "proxy: error reading from cache"); ap_proxy_cache_error(&c); } break; } if (n == 0) break; /* EOF */ if (buf[0] == 'l' && (filename=strstr(buf, " -> ")) != NULL) { char *link_ptr = filename; do { filename--; } while (filename[0] != ' '); *(filename++) = '\0'; *(link_ptr++) = '\0'; if ((n = strlen(link_ptr)) > 1 && link_ptr[n - 1] == '\n') link_ptr[n - 1] = '\0'; apr_snprintf(buf2, sizeof(buf2), "%s %s %s\n", buf, filename, filename, link_ptr); apr_cpystrn(buf, buf2, sizeof(buf)); n = strlen(buf); } else if (buf[0] == 'd' || buf[0] == '-' || buf[0] == 'l' || apr_isdigit(buf[0])) { if (apr_isdigit(buf[0])) { /* handle DOS dir */ searchptr = strchr(buf, '<'); if (searchptr != NULL) *searchptr = '['; searchptr = strchr(buf, '>'); if (searchptr != NULL) *searchptr = ']'; } filename = strrchr(buf, ' '); *(filename++) = 0; filename[strlen(filename) - 1] = 0; /* handle filenames with spaces in 'em */ if (!strcmp(filename, ".") || !strcmp(filename, "..") || firstfile) { firstfile = 0; searchidx = filename - buf; } else if (searchidx != 0 && buf[searchidx] != 0) { *(--filename) = ' '; buf[searchidx - 1] = 0; filename = &buf[searchidx]; } /* Special handling for '.' and '..' */ if (!strcmp(filename, ".") || !strcmp(filename, "..") || buf[0] == 'd') { apr_snprintf(buf2, sizeof(buf2), "%s %s\n", buf, filename, filename); } else { apr_snprintf(buf2, sizeof(buf2), "%s %s\n", buf, filename, filename); } apr_cpystrn(buf, buf2, sizeof(buf)); n = strlen(buf); } o = 0; total_bytes_sent += n; cntr = n; if (cachefp && apr_write(cachefp, buf, &cntr) != APR_SUCCESS) { ap_log_rerror(APLOG_MARK, APLOG_ERR, 0, r, "proxy: error writing to cache"); ap_proxy_cache_error(&c); cachefp = NULL; } while (n && !r->connection->aborted) { cntr = n; w = apr_send(con->client_socket, &buf[o], &cntr); if (w <= 0) break; n -= w; o += w; } } total_bytes_sent += ap_proxy_bputs2("
\n", con->client_socket, c); total_bytes_sent += ap_proxy_bputs2(ap_psignature("", r), con->client_socket, c); total_bytes_sent += ap_proxy_bputs2("\n", con->client_socket, c); /* Flushing the actual socket doesn't make much sense, because we don't * buffer it yet. ap_flush(con->client); */ return total_bytes_sent; } /* Common routine for failed authorization (i.e., missing or wrong password) * to an ftp service. This causes most browsers to retry the request * with username and password (which was presumably queried from the user) * supplied in the Authorization: header. * Note that we "invent" a realm name which consists of the * ftp://user@host part of the reqest (sans password -if supplied but invalid-) */ static int ftp_unauthorized (request_rec *r, int log_it) { r->proxyreq = 0; /* Log failed requests if they supplied a password * (log username/password guessing attempts) */ if (log_it) ap_log_rerror(APLOG_MARK, APLOG_INFO|APLOG_NOERRNO, 0, r, "proxy: missing or failed auth to %s", ap_unparse_uri_components(r->pool, &r->parsed_uri, UNP_OMITPATHINFO)); apr_table_setn(r->err_headers_out, "WWW-Authenticate", apr_pstrcat(r->pool, "Basic realm=\"", ap_unparse_uri_components(r->pool, &r->parsed_uri, UNP_OMITPASSWORD|UNP_OMITPATHINFO), "\"", NULL)); return HTTP_UNAUTHORIZED; } /* * Handles direct access of ftp:// URLs * Original (Non-PASV) version from * Troy Morrison* PASV added by Chuck */ int ap_proxy_ftp_handler(request_rec *r, ap_cache_el *c, char *url) { char *host, *path, *strp, *parms; char *cwd = NULL; char *user = NULL; /* char *account = NULL; how to supply an account in a URL? */ const char *password = NULL; apr_socket_t *sock, *dsock, *inc; int port, i, j, len, rc, nocache = 0; apr_socket_t *csd; struct in_addr destaddr; apr_table_t *resp_hdrs; BUFF *f; BUFF *data = NULL; apr_file_t *cachefp = NULL; apr_pool_t *p = r->pool; int one = 1; const long int zero = 0L; void *sconf = r->server->module_config; proxy_server_conf *conf = (proxy_server_conf *) ap_get_module_config(sconf, &proxy_module); struct noproxy_entry *npent = (struct noproxy_entry *) conf->noproxies->elts; struct nocache_entry *ncent = (struct nocache_entry *) conf->nocaches->elts; /* stuff for PASV mode */ unsigned int presult, h0, h1, h2, h3, p0, p1; unsigned short pport; int pasvmode = 0; char pasv[64]; char *pstr, dates[AP_RFC822_DATE_LEN]; char *npaddr; apr_port_t npport; /* stuff for responses */ char resp[MAX_STRING_LEN]; char *size = NULL; /* we only support GET and HEAD */ if (r->method_number != M_GET) return HTTP_NOT_IMPLEMENTED; /* We break the URL into host, port, path-search */ host = r->parsed_uri.hostname; port = (r->parsed_uri.port != 0) ? r->parsed_uri.port : ap_default_port_for_request(r); path = apr_pstrdup(p, r->parsed_uri.path); path = (path != NULL && path[0] != '\0') ? &path[1] : ""; /* The "Authorization:" header must be checked first. * We allow the user to "override" the URL-coded user [ & password ] * in the Browsers' User&Password Dialog. * NOTE that this is only marginally more secure than having the * password travel in plain as part of the URL, because Basic Auth * simply uuencodes the plain text password. * But chances are still smaller that the URL is logged regularly. */ if ((password = apr_table_get(r->headers_in, "Authorization")) != NULL && strcasecmp(ap_getword(r->pool, &password, ' '), "Basic") == 0 && (password = ap_pbase64decode(r->pool, password))[0] != ':') { /* Note that this allocation has to be made from r->connection->pool * because it has the lifetime of the connection. The other allocations * are temporary and can be tossed away any time. */ user = ap_getword_nulls (r->pool, &password, ':'); r->ap_auth_type = "Basic"; r->user = r->parsed_uri.user = user; nocache = 1; /* This resource only accessible with username/password */ } else if ((user = r->parsed_uri.user) != NULL) { user = apr_pstrdup(p, user); decodeenc(user); if ((password = r->parsed_uri.password) != NULL) { char *tmp = apr_pstrdup(p, password); decodeenc(tmp); password = tmp; } nocache = 1; /* This resource only accessible with username/password */ } else { user = "anonymous"; password = "apache_proxy@"; } /* check if ProxyBlock directive on this host */ destaddr.s_addr = ap_inet_addr(host); for (i = 0; i < conf->noproxies->nelts; i++) { if ((npent[i].name != NULL && ap_strstr_c(host, npent[i].name) != NULL) || destaddr.s_addr == npent[i].addr.s_addr || npent[i].name[0] == '*') return ap_proxyerror(r, HTTP_FORBIDDEN, "Connect to remote machine blocked"); } ap_log_error(APLOG_MARK, APLOG_DEBUG|APLOG_NOERRNO, 0, NULL, "FTP: connect to %s:%d", host, port); parms = strchr(path, ';'); if (parms != NULL) *(parms++) = '\0'; if ((apr_create_tcp_socket(&sock, r->pool)) != APR_SUCCESS) { ap_log_rerror(APLOG_MARK, APLOG_ERR, 0, r, "proxy: error creating socket"); return HTTP_INTERNAL_SERVER_ERROR; } #if !defined(TPF) && !defined(BEOS) if (conf->recv_buffer_size > 0 && apr_setsocketopt(sock, APR_SO_RCVBUF, conf->recv_buffer_size)) { ap_log_rerror(APLOG_MARK, APLOG_ERR, 0, r, "setsockopt(SO_RCVBUF): Failed to set ProxyReceiveBufferSize, using default"); } #endif if (apr_setsocketopt(sock, APR_SO_REUSEADDR, one)) { #ifndef _OSD_POSIX /* BS2000 has this option "always on" */ ap_log_rerror(APLOG_MARK, APLOG_ERR, 0, r, "proxy: error setting reuseaddr option: setsockopt(SO_REUSEADDR)"); apr_close_socket(sock); return HTTP_INTERNAL_SERVER_ERROR; #endif /*_OSD_POSIX*/ } if (ap_proxy_doconnect(sock, host, port, r) != APR_SUCCESS) { apr_close_socket(sock); return ap_proxyerror(r, HTTP_BAD_GATEWAY, apr_pstrcat(r->pool, "Could not connect to remote machine: ", host, NULL)); } f = ap_bcreate(p, B_RDWR); ap_bpush_socket(f, sock); /* shouldn't we implement telnet control options here? */ #ifdef CHARSET_EBCDIC ap_bsetflag(f, B_ASCII2EBCDIC|B_EBCDIC2ASCII, 1); #endif /*CHARSET_EBCDIC*/ /* possible results: */ /* 120 Service ready in nnn minutes. */ /* 220 Service ready for new user. */ /* 421 Service not available, closing control connection. */ i = ftp_getrc_msg(f, resp, sizeof resp); ap_log_error(APLOG_MARK, APLOG_DEBUG|APLOG_NOERRNO, 0, NULL, "FTP: returned status %d", i); if (i == -1) { return ap_proxyerror(r, HTTP_BAD_GATEWAY, "Error reading from remote server"); } #if 0 if (i == 120) { /* RFC2068 states: * 14.38 Retry-After * * The Retry-After response-header field can be used with a 503 (Service * Unavailable) response to indicate how long the service is expected to * be unavailable to the requesting client. The value of this field can * be either an HTTP-date or an integer number of seconds (in decimal) * after the time of the response. * Retry-After = "Retry-After" ":" ( HTTP-date | delta-seconds ) */ ap_set_header("Retry-After", apr_psprintf(p, "%u", 60*wait_mins); return ap_proxyerror(r, HTTP_SERVICE_UNAVAILABLE, resp); } #endif if (i != 220) { return ap_proxyerror(r, HTTP_BAD_GATEWAY, resp); } ap_log_error(APLOG_MARK, APLOG_DEBUG|APLOG_NOERRNO, 0, NULL, "FTP: connected."); ap_bvputs(f, "USER ", user, CRLF, NULL); ap_bflush(f); /* capture any errors */ ap_log_error(APLOG_MARK, APLOG_DEBUG|APLOG_NOERRNO, 0, NULL, "FTP: USER %s", user); /* possible results; 230, 331, 332, 421, 500, 501, 530 */ /* states: 1 - error, 2 - success; 3 - send password, 4,5 fail */ /* 230 User logged in, proceed. */ /* 331 User name okay, need password. */ /* 332 Need account for login. */ /* 421 Service not available, closing control connection. */ /* 500 Syntax error, command unrecognized. */ /* (This may include errors such as command line too long.) */ /* 501 Syntax error in parameters or arguments. */ /* 530 Not logged in. */ i = ftp_getrc(f); ap_log_error(APLOG_MARK, APLOG_DEBUG|APLOG_NOERRNO, 0, NULL, "FTP: returned status %d", i); if (i == -1) { return ap_proxyerror(r, HTTP_BAD_GATEWAY, "Error reading from remote server"); } if (i == 530) { return ftp_unauthorized (r, 1); /* log it: user name guessing attempt? */ } if (i != 230 && i != 331) { return HTTP_BAD_GATEWAY; } if (i == 331) { /* send password */ if (password == NULL) { return ftp_unauthorized (r, 0); } ap_bvputs(f, "PASS ", password, CRLF, NULL); ap_bflush(f); ap_log_error(APLOG_MARK, APLOG_DEBUG|APLOG_NOERRNO, 0, NULL, "FTP: PASS %s", password); /* possible results 202, 230, 332, 421, 500, 501, 503, 530 */ /* 230 User logged in, proceed. */ /* 332 Need account for login. */ /* 421 Service not available, closing control connection. */ /* 500 Syntax error, command unrecognized. */ /* 501 Syntax error in parameters or arguments. */ /* 503 Bad sequence of commands. */ /* 530 Not logged in. */ i = ftp_getrc(f); ap_log_error(APLOG_MARK, APLOG_DEBUG|APLOG_NOERRNO, 0, NULL, "FTP: returned status %d", i); if (i == -1) { return ap_proxyerror(r, HTTP_BAD_GATEWAY, "Error reading from remote server"); } if (i == 332) { return ap_proxyerror(r, HTTP_UNAUTHORIZED, "Need account for login"); } /* @@@ questionable -- we might as well return a 403 Forbidden here */ if (i == 530) { return ftp_unauthorized (r, 1); /* log it: passwd guessing attempt? */ } if (i != 230 && i != 202) { return HTTP_BAD_GATEWAY; } } /* set the directory (walk directory component by component): * this is what we must do if we don't know the OS type of the remote * machine */ for (;;) { strp = strchr(path, '/'); if (strp == NULL) break; *strp = '\0'; len = decodeenc(path); ap_bvputs(f, "CWD ", path, CRLF, NULL); ap_bflush(f); ap_log_error(APLOG_MARK, APLOG_DEBUG|APLOG_NOERRNO, 0, NULL, "FTP: CWD %s", path); *strp = '/'; /* responses: 250, 421, 500, 501, 502, 530, 550 */ /* 250 Requested file action okay, completed. */ /* 421 Service not available, closing control connection. */ /* 500 Syntax error, command unrecognized. */ /* 501 Syntax error in parameters or arguments. */ /* 502 Command not implemented. */ /* 530 Not logged in. */ /* 550 Requested action not taken. */ i = ftp_getrc(f); ap_log_error(APLOG_MARK, APLOG_DEBUG|APLOG_NOERRNO, 0, NULL, "FTP: returned status %d", i); if (i == -1) { return ap_proxyerror(r, HTTP_BAD_GATEWAY, "Error reading from remote server"); } if (i == 550) { return HTTP_NOT_FOUND; } if (i != 250) { return HTTP_BAD_GATEWAY; } path = strp + 1; } if (parms != NULL && strncmp(parms, "type=", 5) == 0) { parms += 5; if ((parms[0] != 'd' && parms[0] != 'a' && parms[0] != 'i') || parms[1] != '\0') parms = ""; } else parms = ""; /* changed to make binary transfers the default */ if (parms[0] != 'a') { /* set type to image */ /* TM - Added CRLF to the end of TYPE I, otherwise it hangs the connection */ ap_bputs("TYPE I" CRLF, f); ap_bflush(f); ap_log_error(APLOG_MARK, APLOG_DEBUG|APLOG_NOERRNO, 0, NULL, "FTP: TYPE I"); /* responses: 200, 421, 500, 501, 504, 530 */ /* 200 Command okay. */ /* 421 Service not available, closing control connection. */ /* 500 Syntax error, command unrecognized. */ /* 501 Syntax error in parameters or arguments. */ /* 504 Command not implemented for that parameter. */ /* 530 Not logged in. */ i = ftp_getrc(f); ap_log_error(APLOG_MARK, APLOG_DEBUG|APLOG_NOERRNO, 0, NULL, "FTP: returned status %d", i); if (i == -1) { return ap_proxyerror(r, HTTP_BAD_GATEWAY, "Error reading from remote server"); } if (i != 200 && i != 504) { return HTTP_BAD_GATEWAY; } /* Allow not implemented */ if (i == 504) parms[0] = '\0'; } /* try to set up PASV data connection first */ if ((apr_create_tcp_socket(&dsock, r->pool)) != APR_SUCCESS) { ap_log_rerror(APLOG_MARK, APLOG_ERR, 0, r, "proxy: error creating PASV socket"); ap_bclose(f); return HTTP_INTERNAL_SERVER_ERROR; } #if !defined (TPF) && !defined(BEOS) if (conf->recv_buffer_size > 0 && apr_setsocketopt(dsock, APR_SO_RCVBUF, conf->recv_buffer_size)) { ap_log_rerror(APLOG_MARK, APLOG_ERR, 0, r, "setsockopt(SO_RCVBUF): Failed to set ProxyReceiveBufferSize, using default"); } #endif ap_bputs("PASV" CRLF, f); ap_bflush(f); ap_log_error(APLOG_MARK, APLOG_DEBUG|APLOG_NOERRNO, 0, NULL, "FTP: PASV command issued"); /* possible results: 227, 421, 500, 501, 502, 530 */ /* 227 Entering Passive Mode (h1,h2,h3,h4,p1,p2). */ /* 421 Service not available, closing control connection. */ /* 500 Syntax error, command unrecognized. */ /* 501 Syntax error in parameters or arguments. */ /* 502 Command not implemented. */ /* 530 Not logged in. */ i = ap_bgets(pasv, sizeof(pasv), f); if (i == -1) { ap_log_rerror(APLOG_MARK, APLOG_ERR|APLOG_NOERRNO, 0, r, "PASV: control connection is toast"); apr_close_socket(dsock); ap_bclose(f); return HTTP_INTERNAL_SERVER_ERROR; } else { pasv[i - 1] = '\0'; pstr = strtok(pasv, " "); /* separate result code */ if (pstr != NULL) { presult = atoi(pstr); if (*(pstr + strlen(pstr) + 1) == '=') pstr += strlen(pstr) + 2; else { pstr = strtok(NULL, "("); /* separate address & port params */ if (pstr != NULL) pstr = strtok(NULL, ")"); } } else presult = atoi(pasv); ap_log_error(APLOG_MARK, APLOG_DEBUG|APLOG_NOERRNO, 0, NULL, "FTP: returned status %d", presult); if (presult == 227 && pstr != NULL && (sscanf(pstr, "%d,%d,%d,%d,%d,%d", &h3, &h2, &h1, &h0, &p1, &p0) == 6)) { /* pardon the parens, but it makes gcc happy */ destaddr.s_addr = htonl((((((h3 << 8) + h2) << 8) + h1) << 8) + h0); pport = (p1 << 8) + p0; ap_log_error(APLOG_MARK, APLOG_DEBUG|APLOG_NOERRNO, 0, NULL, "FTP: contacting host %d.%d.%d.%d:%d", h3, h2, h1, h0, pport); /* scary */ if (ap_proxy_doconnect(dsock, inet_ntoa(destaddr), pport, r) == APR_SUCCESS) { return ap_proxyerror(r, HTTP_BAD_GATEWAY, apr_pstrcat(r->pool, "Could not connect to remote machine: ", inet_ntoa(destaddr), NULL)); } else { pasvmode = 1; } } else apr_close_socket(dsock); /* and try the regular way */ } if (!pasvmode) { /* set up data connection */ if ((apr_create_tcp_socket(&dsock, r->pool)) != APR_SUCCESS) { ap_log_rerror(APLOG_MARK, APLOG_ERR, 0, r, "proxy: error creating socket"); ap_bclose(f); return HTTP_INTERNAL_SERVER_ERROR; } apr_get_port(&npport, APR_LOCAL, sock); apr_get_ipaddr(&npaddr, APR_LOCAL, sock); apr_set_port(dsock, APR_LOCAL, npport); apr_set_ipaddr(dsock, APR_LOCAL, npaddr); if (apr_setsocketopt(dsock, APR_SO_REUSEADDR, one) != APR_SUCCESS) { #ifndef _OSD_POSIX /* BS2000 has this option "always on" */ ap_log_rerror(APLOG_MARK, APLOG_ERR, 0, r, "proxy: error setting reuseaddr option"); apr_close_socket(dsock); ap_bclose(f); return HTTP_INTERNAL_SERVER_ERROR; #endif /*_OSD_POSIX*/ } if (apr_bind(dsock) != APR_SUCCESS) { char buff[22]; apr_snprintf(buff, sizeof(buff), "%s:%d", npaddr, npport); ap_log_rerror(APLOG_MARK, APLOG_ERR, 0, r, "proxy: error binding to ftp data socket %s", buff); ap_bclose(f); apr_close_socket(dsock); return HTTP_INTERNAL_SERVER_ERROR; } apr_listen(dsock, 2); /* only need a short queue */ } /* set request; "path" holds last path component */ len = decodeenc(path); /* TM - if len == 0 then it must be a directory (you can't RETR nothing) */ if (len == 0) { parms = "d"; } else { ap_bvputs(f, "SIZE ", path, CRLF, NULL); ap_bflush(f); ap_log_error(APLOG_MARK, APLOG_DEBUG|APLOG_NOERRNO, 0, NULL, "FTP: SIZE %s", path); i = ftp_getrc_msg(f, resp, sizeof resp); ap_log_error(APLOG_MARK, APLOG_DEBUG|APLOG_NOERRNO, 0, NULL, "FTP: returned status %d with response %s", i, resp); if (i != 500) { /* Size command not recognized */ if (i == 550) { /* Not a regular file */ ap_log_error(APLOG_MARK, APLOG_DEBUG|APLOG_NOERRNO, 0, NULL, "FTP: SIZE shows this is a directory"); parms = "d"; ap_bvputs(f, "CWD ", path, CRLF, NULL); ap_bflush(f); ap_log_error(APLOG_MARK, APLOG_DEBUG|APLOG_NOERRNO, 0, NULL, "FTP: CWD %s", path); i = ftp_getrc(f); /* possible results: 250, 421, 500, 501, 502, 530, 550 */ /* 250 Requested file action okay, completed. */ /* 421 Service not available, closing control connection. */ /* 500 Syntax error, command unrecognized. */ /* 501 Syntax error in parameters or arguments. */ /* 502 Command not implemented. */ /* 530 Not logged in. */ /* 550 Requested action not taken. */ ap_log_error(APLOG_MARK, APLOG_DEBUG|APLOG_NOERRNO, 0, NULL, "FTP: returned status %d", i); if (i == -1) { return ap_proxyerror(r, HTTP_BAD_GATEWAY, "Error reading from remote server"); } if (i == 550) { return HTTP_NOT_FOUND; } if (i != 250) { return HTTP_BAD_GATEWAY; } path = ""; len = 0; } else if (i == 213) { /* Size command ok */ for (j = 0; j < sizeof resp && apr_isdigit(resp[j]); j++) ; resp[j] = '\0'; if (resp[0] != '\0') size = apr_pstrdup(p, resp); } } } #ifdef AUTODETECT_PWD ap_bvputs(f, "PWD", CRLF, NULL); ap_bflush(f); ap_log_error(APLOG_MARK, APLOG_DEBUG|APLOG_NOERRNO, 0, NULL, "FTP: PWD"); /* responses: 257, 500, 501, 502, 421, 550 */ /* 257 " " */ /* 421 Service not available, closing control connection. */ /* 500 Syntax error, command unrecognized. */ /* 501 Syntax error in parameters or arguments. */ /* 502 Command not implemented. */ /* 550 Requested action not taken. */ i = ftp_getrc_msg(f, resp, sizeof resp); ap_log_error(APLOG_MARK, APLOG_DEBUG|APLOG_NOERRNO, 0, NULL, "FTP: PWD returned status %d", i); if (i == -1 || i == 421) { return ap_proxyerror(r, HTTP_BAD_GATEWAY, "Error reading from remote server"); } if (i == 550) { return HTTP_NOT_FOUND; } if (i == 257) { const char *dirp = resp; cwd = ap_getword_conf(r->pool, &dirp); } #endif /*AUTODETECT_PWD*/ if (parms[0] == 'd') { if (len != 0) ap_bvputs(f, "LIST ", path, CRLF, NULL); else ap_bputs("LIST -lag" CRLF, f); ap_log_error(APLOG_MARK, APLOG_DEBUG|APLOG_NOERRNO, 0, NULL, "FTP: LIST %s", (len == 0 ? "" : path)); } else { ap_bvputs(f, "RETR ", path, CRLF, NULL); ap_log_error(APLOG_MARK, APLOG_DEBUG|APLOG_NOERRNO, 0, NULL, "FTP: RETR %s", path); } ap_bflush(f); /* RETR: 110, 125, 150, 226, 250, 421, 425, 426, 450, 451, 500, 501, 530, 550 NLST: 125, 150, 226, 250, 421, 425, 426, 450, 451, 500, 501, 502, 530 */ /* 110 Restart marker reply. */ /* 125 Data connection already open; transfer starting. */ /* 150 File status okay; about to open data connection. */ /* 226 Closing data connection. */ /* 250 Requested file action okay, completed. */ /* 421 Service not available, closing control connection. */ /* 425 Can't open data connection. */ /* 426 Connection closed; transfer aborted. */ /* 450 Requested file action not taken. */ /* 451 Requested action aborted. Local error in processing. */ /* 500 Syntax error, command unrecognized. */ /* 501 Syntax error in parameters or arguments. */ /* 530 Not logged in. */ /* 550 Requested action not taken. */ rc = ftp_getrc(f); ap_log_error(APLOG_MARK, APLOG_DEBUG|APLOG_NOERRNO, 0, NULL, "FTP: returned status %d", rc); if (rc == -1) { return ap_proxyerror(r, HTTP_BAD_GATEWAY, "Error reading from remote server"); } if (rc == 550) { ap_log_error(APLOG_MARK, APLOG_DEBUG|APLOG_NOERRNO, 0, NULL, "FTP: RETR failed, trying LIST instead"); parms = "d"; ap_bvputs(f, "CWD ", path, CRLF, NULL); ap_bflush(f); ap_log_error(APLOG_MARK, APLOG_DEBUG|APLOG_NOERRNO, 0, NULL, "FTP: CWD %s", path); /* possible results: 250, 421, 500, 501, 502, 530, 550 */ /* 250 Requested file action okay, completed. */ /* 421 Service not available, closing control connection. */ /* 500 Syntax error, command unrecognized. */ /* 501 Syntax error in parameters or arguments. */ /* 502 Command not implemented. */ /* 530 Not logged in. */ /* 550 Requested action not taken. */ rc = ftp_getrc(f); ap_log_error(APLOG_MARK, APLOG_DEBUG|APLOG_NOERRNO, 0, NULL, "FTP: returned status %d", rc); if (rc == -1) { return ap_proxyerror(r, HTTP_BAD_GATEWAY, "Error reading from remote server"); } if (rc == 550) { return HTTP_NOT_FOUND; } if (rc != 250) { return HTTP_BAD_GATEWAY; } #ifdef AUTODETECT_PWD ap_bvputs(f, "PWD", CRLF, NULL); ap_bflush(f); ap_log_error(APLOG_MARK, APLOG_DEBUG|APLOG_NOERRNO, 0, NULL, "FTP: PWD"); /* responses: 257, 500, 501, 502, 421, 550 */ /* 257 " " */ /* 421 Service not available, closing control connection. */ /* 500 Syntax error, command unrecognized. */ /* 501 Syntax error in parameters or arguments. */ /* 502 Command not implemented. */ /* 550 Requested action not taken. */ i = ftp_getrc_msg(f, resp, sizeof resp); ap_log_error(APLOG_MARK, APLOG_DEBUG|APLOG_NOERRNO, 0, NULL, "FTP: PWD returned status %d", i); if (i == -1 || i == 421) { return ap_proxyerror(r, HTTP_BAD_GATEWAY, "Error reading from remote server"); } if (i == 550) { return HTTP_NOT_FOUND; } if (i == 257) { const char *dirp = resp; cwd = ap_getword_conf(r->pool, &dirp); } #endif /*AUTODETECT_PWD*/ ap_bputs("LIST -lag" CRLF, f); ap_bflush(f); ap_log_error(APLOG_MARK, APLOG_DEBUG|APLOG_NOERRNO, 0, NULL, "FTP: LIST -lag"); rc = ftp_getrc(f); ap_log_error(APLOG_MARK, APLOG_DEBUG|APLOG_NOERRNO, 0, NULL, "FTP: returned status %d", rc); if (rc == -1) return ap_proxyerror(r, HTTP_BAD_GATEWAY, "Error reading from remote server"); } if (rc != 125 && rc != 150 && rc != 226 && rc != 250) return HTTP_BAD_GATEWAY; r->status = HTTP_OK; r->status_line = "200 OK"; resp_hdrs = ap_make_table(p, 2); apr_rfc822_date(dates, r->request_time); apr_table_setn(resp_hdrs, "Date", dates); apr_table_setn(resp_hdrs, "Server", ap_get_server_version()); if (parms[0] == 'd') apr_table_setn(resp_hdrs, "Content-Type", "text/html"); else { if (r->content_type != NULL) { apr_table_setn(resp_hdrs, "Content-Type", r->content_type); ap_log_error(APLOG_MARK, APLOG_DEBUG|APLOG_NOERRNO, 0, NULL, "FTP: Content-Type set to %s", r->content_type); } else { apr_table_setn(resp_hdrs, "Content-Type", ap_default_type(r)); } if (parms[0] != 'a' && size != NULL) { /* We "trust" the ftp server to really serve (size) bytes... */ apr_table_setn(resp_hdrs, "Content-Length", size); ap_log_error(APLOG_MARK, APLOG_DEBUG|APLOG_NOERRNO, 0, NULL, "FTP: Content-Length set to %s", size); } } if (r->content_encoding != NULL && r->content_encoding[0] != '\0') { ap_log_error(APLOG_MARK, APLOG_DEBUG|APLOG_NOERRNO, 0, NULL, "FTP: Content-Encoding set to %s", r->content_encoding); apr_table_setn(resp_hdrs, "Content-Encoding", r->content_encoding); } ap_cache_el_header_merge(c, resp_hdrs); /* check if NoCache directive on this host */ for (i = 0; i < conf->nocaches->nelts; i++) { if ((ncent[i].name != NULL && ap_strstr_c(host, ncent[i].name) != NULL) || destaddr.s_addr == ncent[i].addr.s_addr || ncent[i].name[0] == '*') nocache = 1; } #if 0 i = ap_proxy_cache_update(c, resp_hdrs, 0, nocache); if (i != DECLINED) { ap_pclosesocket(p, dsock); ap_bclose(f); return i; } #endif if(nocache || !ap_proxy_cache_should_cache(r, resp_hdrs, 0)) ap_proxy_cache_error(&c); else ap_cache_el_data(c, &cachefp); if (!pasvmode) { /* wait for connection */ for(;;) { switch(apr_accept(&inc, dsock, r->pool)) { case APR_EINTR: continue; case APR_SUCCESS: break; default: ap_log_rerror(APLOG_MARK, APLOG_ERR, 0, r, "proxy: failed to accept data connection"); apr_close_socket(dsock); ap_bclose(f); if (c != NULL) ap_proxy_cache_error(&c); return HTTP_BAD_GATEWAY; } } data = ap_bcreate(p, B_RDWR); ap_bpush_socket(f, csd); } else { data = ap_bcreate(p, B_RDWR); ap_bpush_socket(data, dsock); } /* send response */ /* write status line */ if (!r->assbackwards) ap_rvputs(r, "HTTP/1.0 ", r->status_line, CRLF, NULL); if (cachefp && apr_puts(apr_pstrcat(r->pool, "HTTP/1.0 ", r->status_line, CRLF, NULL), cachefp) != APR_SUCCESS) { ap_log_rerror(APLOG_MARK, APLOG_ERR, 0, r, "proxy: error writing CRLF to cache"); ap_proxy_cache_error(&c); cachefp = NULL; } /* send headers */ ap_cache_el_header_walk(c, ap_proxy_send_hdr_line, r, NULL); if (!r->assbackwards) ap_rputs(CRLF, r); if (cachefp && apr_puts(CRLF, cachefp) == -1) { ap_log_rerror(APLOG_MARK, APLOG_ERR, 0, r, "proxy: error writing CRLF to cache"); ap_proxy_cache_error(&c); cachefp = NULL; } /* This is done by a filter now, so this can probably be removed cleanly. ap_bsetopt(r->connection->client, BO_BYTECT, &zero); */ r->sent_bodyct = 1; /* send body */ if (!r->header_only) { if (parms[0] != 'd') { ap_proxy_send_fb(NULL, dsock, r, c); } else send_dir(data, r, c, cwd); if (rc == 125 || rc == 150) rc = ftp_getrc(f); /* XXX: we checked for 125||150||226||250 above. This is redundant. */ if (rc != 226 && rc != 250) /* XXX: we no longer log an "error writing to c->tempfile" - should we? */ ap_proxy_cache_error(&c); } else { /* abort the transfer */ ap_bputs("ABOR" CRLF, f); ap_bflush(f); if (!pasvmode) ap_bclose(data); ap_log_error(APLOG_MARK, APLOG_DEBUG|APLOG_NOERRNO, 0, NULL, "FTP: ABOR"); /* responses: 225, 226, 421, 500, 501, 502 */ /* 225 Data connection open; no transfer in progress. */ /* 226 Closing data connection. */ /* 421 Service not available, closing control connection. */ /* 500 Syntax error, command unrecognized. */ /* 501 Syntax error in parameters or arguments. */ /* 502 Command not implemented. */ i = ftp_getrc(f); ap_log_error(APLOG_MARK, APLOG_DEBUG|APLOG_NOERRNO, 0, NULL, "FTP: returned status %d", i); } /* finish */ ap_bputs("QUIT" CRLF, f); ap_bflush(f); ap_log_error(APLOG_MARK, APLOG_DEBUG|APLOG_NOERRNO, 0, NULL, "FTP: QUIT"); /* responses: 221, 500 */ /* 221 Service closing control connection. */ /* 500 Syntax error, command unrecognized. */ i = ftp_getrc(f); ap_log_error(APLOG_MARK, APLOG_DEBUG|APLOG_NOERRNO, 0, NULL, "FTP: QUIT: status %d", i); if (pasvmode) ap_bclose(data); ap_bclose(f); ap_rflush(r); /* flush before garbage collection */ if(c) ap_proxy_cache_update(c); return OK; }