/* ==================================================================== * The Apache Software License, Version 1.1 * * Copyright (c) 2000-2001 The Apache Software Foundation. All rights * reserved. * * Redistribution and use in source and binary forms, with or without * modification, are permitted provided that the following conditions * are met: * * 1. Redistributions of source code must retain the above copyright * notice, this list of conditions and the following disclaimer. * * 2. Redistributions in binary form must reproduce the above copyright * notice, this list of conditions and the following disclaimer in * the documentation and/or other materials provided with the * distribution. * * 3. The end-user documentation included with the redistribution, * if any, must include the following acknowledgment: * "This product includes software developed by the * Apache Software Foundation (http://www.apache.org/)." * Alternately, this acknowledgment may appear in the software itself, * if and wherever such third-party acknowledgments normally appear. * * 4. The names "Apache" and "Apache Software Foundation" must * not be used to endorse or promote products derived from this * software without prior written permission. For written * permission, please contact apache@apache.org. * * 5. Products derived from this software may not be called "Apache", * nor may "Apache" appear in their name, without prior written * permission of the Apache Software Foundation. * * THIS SOFTWARE IS PROVIDED ``AS IS'' AND ANY EXPRESSED OR IMPLIED * WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE * DISCLAIMED. IN NO EVENT SHALL THE APACHE SOFTWARE FOUNDATION OR * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT * LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF * USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND * ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, * OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT * OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF * SUCH DAMAGE. * ==================================================================== * * This software consists of voluntary contributions made by many * individuals on behalf of the Apache Software Foundation. For more * information on the Apache Software Foundation, please see * . * * Portions of this software are based upon public domain software * originally written at the National Center for Supercomputing Applications, * University of Illinois, Urbana-Champaign. */ /* FTP routines for Apache proxy */ #include "mod_proxy.h" #define AUTODETECT_PWD module AP_MODULE_DECLARE_DATA proxy_ftp_module; int ap_proxy_ftp_canon(request_rec *r, char *url); int ap_proxy_ftp_handler(request_rec *r, proxy_server_conf *conf, char *url, const char *proxyhost, apr_port_t proxyport); apr_status_t ap_proxy_send_dir_filter(ap_filter_t *f, apr_bucket_brigade *bb); /* * Decodes a '%' escaped string, and returns the number of characters */ static int decodeenc(char *x) { int i, j, ch; if (x[0] == '\0') return 0; /* special case for no characters */ for (i = 0, j = 0; x[i] != '\0'; i++, j++) { /* decode it if not already done */ ch = x[i]; if (ch == '%' && ap_isxdigit(x[i + 1]) && ap_isxdigit(x[i + 2])) { ch = ap_proxy_hex2c(&x[i + 1]); i += 2; } x[j] = ch; } x[j] = '\0'; return j; } /* * checks an encoded ftp string for bad characters, namely, CR, LF or * non-ascii character */ static int ftp_check_string(const char *x) { int i, ch = 0; for (i = 0; x[i] != '\0'; i++) { ch = x[i]; if (ch == '%' && ap_isxdigit(x[i + 1]) && ap_isxdigit(x[i + 2])) { ch = ap_proxy_hex2c(&x[i + 1]); i += 2; } #if !APR_CHARSET_EBCDIC if (ch == '\015' || ch == '\012' || (ch & 0x80)) #else /*APR_CHARSET_EBCDIC*/ if (ch == '\r' || ch == '\n' || (os_toascii[ch] & 0x80)) #endif /*APR_CHARSET_EBCDIC*/ return 0; } return 1; } /* * Canonicalise ftp URLs. */ int ap_proxy_ftp_canon(request_rec *r, char *url) { char *user, *password, *host, *path, *parms, *strp, sport[7]; apr_pool_t *p = r->pool; const char *err; apr_port_t port, def_port; /* */ if (strncasecmp(url, "ftp:", 4) == 0) { url += 4; } else { return DECLINED; } def_port = apr_uri_default_port_for_scheme("ftp"); ap_log_error(APLOG_MARK, APLOG_DEBUG|APLOG_NOERRNO, 0, r->server, "proxy: FTP: canonicalising URL %s", url); port = def_port; err = ap_proxy_canon_netloc(p, &url, &user, &password, &host, &port); if (err) return HTTP_BAD_REQUEST; if (user != NULL && !ftp_check_string(user)) return HTTP_BAD_REQUEST; if (password != NULL && !ftp_check_string(password)) return HTTP_BAD_REQUEST; /* now parse path/parameters args, according to rfc1738 */ /* N.B. if this isn't a true proxy request, then the URL path * (but not query args) has already been decoded. * This gives rise to the problem of a ; being decoded into the * path. */ strp = strchr(url, ';'); if (strp != NULL) { *(strp++) = '\0'; parms = ap_proxy_canonenc(p, strp, strlen(strp), enc_parm, r->proxyreq); if (parms == NULL) return HTTP_BAD_REQUEST; } else parms = ""; path = ap_proxy_canonenc(p, url, strlen(url), enc_path, r->proxyreq); if (path == NULL) return HTTP_BAD_REQUEST; if (!ftp_check_string(path)) return HTTP_BAD_REQUEST; if (r->proxyreq && r->args != NULL) { if (strp != NULL) { strp = ap_proxy_canonenc(p, r->args, strlen(r->args), enc_parm, 1); if (strp == NULL) return HTTP_BAD_REQUEST; parms = apr_pstrcat(p, parms, "?", strp, NULL); } else { strp = ap_proxy_canonenc(p, r->args, strlen(r->args), enc_fpath, 1); if (strp == NULL) return HTTP_BAD_REQUEST; path = apr_pstrcat(p, path, "?", strp, NULL); } r->args = NULL; } /* now, rebuild URL */ if (port != def_port) apr_snprintf(sport, sizeof(sport), ":%d", port); else sport[0] = '\0'; r->filename = apr_pstrcat(p, "proxy:ftp://", (user != NULL) ? user : "", (password != NULL) ? ":" : "", (password != NULL) ? password : "", (user != NULL) ? "@" : "", host, sport, "/", path, (parms[0] != '\0') ? ";" : "", parms, NULL); return OK; } /* we chop lines longer than 80 characters */ #define MAX_LINE_LEN 80 /* * Reads response lines, returns both the ftp status code and * remembers the response message in the supplied buffer */ static int ftp_getrc_msg(conn_rec *c, apr_bucket_brigade *bb, char *msgbuf, int msglen) { int status; char response[MAX_LINE_LEN]; char buff[5]; char *mb = msgbuf, *me = &msgbuf[msglen]; apr_status_t rv; int eos; if (APR_SUCCESS != (rv = ap_proxy_string_read(c, bb, response, sizeof(response), &eos))) { return -1; } if (!apr_isdigit(response[0]) || !apr_isdigit(response[1]) || !apr_isdigit(response[2]) || (response[3] != ' ' && response[3] != '-')) status = 0; else status = 100 * response[0] + 10 * response[1] + response[2] - 111 * '0'; mb = apr_cpystrn(mb, response+4, me - mb); if (response[3] == '-') { memcpy(buff, response, 3); buff[3] = ' '; do { if (APR_SUCCESS != (rv = ap_proxy_string_read(c, bb, response, sizeof(response), &eos))) { return -1; } mb = apr_cpystrn(mb, response + (' ' == response[0] ? 1 : 4), me - mb); } while (memcmp(response, buff, 4) != 0); } return status; } /* this is a filter that turns a raw ASCII directory listing into pretty HTML */ /* ideally, mod_proxy should simply send the raw directory list up the filter * stack to mod_autoindex, which in theory should turn the raw ascii into * pretty html along with all the bells and whistles it provides... * * all in good time...! :) */ typedef struct { apr_bucket_brigade *in; char buffer[MAX_STRING_LEN]; enum {HEADER, BODY, FOOTER} state; } proxy_dir_ctx_t; apr_status_t ap_proxy_send_dir_filter(ap_filter_t *f, apr_bucket_brigade *in) { request_rec *r = f->r; apr_pool_t *p = r->pool; apr_bucket *e; apr_bucket_brigade *out = apr_brigade_create(p); apr_status_t rv; register int n; char *dir, *path, *reldir, *site, *str; const char *pwd = apr_table_get(r->notes, "Directory-PWD"); const char *readme = apr_table_get(r->notes, "Directory-README"); proxy_dir_ctx_t *ctx = f->ctx; if (!ctx) { f->ctx = ctx = apr_pcalloc(p, sizeof(*ctx)); ctx->in = apr_brigade_create(p); ctx->buffer[0] = 0; ctx->state = HEADER; } /* combine the stored and the new */ APR_BRIGADE_CONCAT(ctx->in, in); if (HEADER == ctx->state) { /* Save "scheme://site" prefix without password */ site = apr_uri_unparse_components(p, &f->r->parsed_uri, UNP_OMITPASSWORD|UNP_OMITPATHINFO); /* ... and path without query args */ path = apr_uri_unparse_components(p, &f->r->parsed_uri, UNP_OMITSITEPART|UNP_OMITQUERY); (void)decodeenc(path); /* Copy path, strip (all except the last) trailing slashes */ path = dir = apr_pstrcat(p, path, "/", NULL); while ((n = strlen(path)) > 1 && path[n-1] == '/' && path[n-2] == '/') path[n-1] = '\0'; /* print "ftp://host/" */ str = apr_psprintf(p, DOCTYPE_HTML_3_2 "\n\n\n\n%s%s\n" "\n\n\n" "\n\n

Directory of " "%s/", site, path, site, path, site); e = apr_bucket_pool_create(str, strlen(str), p); APR_BRIGADE_INSERT_TAIL(out, e); while ((dir = strchr(dir+1, '/')) != NULL) { *dir = '\0'; if ((reldir = strrchr(path+1, '/'))==NULL) reldir = path+1; else ++reldir; /* print "path/" component */ str = apr_psprintf(p, "%s/", path+1, reldir); e = apr_bucket_pool_create(str, strlen(str), p); APR_BRIGADE_INSERT_TAIL(out, e); *dir = '/'; } /* If the caller has determined the current directory, and it differs */ /* from what the client requested, then show the real name */ if (pwd == NULL || strncmp (pwd, path, strlen(pwd)) == 0) { str = apr_psprintf(p, "

\n\n
\n\n
");
	} else {
	    str = apr_psprintf(p, "\n\n(%s)\n\n
\n\n
", pwd);
	}
	e = apr_bucket_pool_create(str, strlen(str), p);
	APR_BRIGADE_INSERT_TAIL(out, e);

	/* print README */
	if (readme) {
	    str = apr_psprintf(p, "%s\n
\n\n
\n\n
\n",
			     readme);

	    e = apr_bucket_pool_create(str, strlen(str), p);
	    APR_BRIGADE_INSERT_TAIL(out, e);
	}

	/* make sure page intro gets sent out */
	e = apr_bucket_flush_create();
	APR_BRIGADE_INSERT_TAIL(out, e);
	if (APR_SUCCESS != (rv = ap_pass_brigade(f->next, out))) {
	    return rv;
	}
	apr_brigade_cleanup(out);

	ctx->state = BODY;
    }

    /* loop through each line of directory */
    while (BODY == ctx->state) {
	char *filename;
	int found = 0;
	int eos = 0;

	/* get a complete line */
	/* if the buffer overruns - throw data away */
	while (!found && !APR_BRIGADE_EMPTY(ctx->in)) {
	    char *pos, *response;
	    apr_size_t len, max;
	    e = APR_BRIGADE_FIRST(ctx->in);
	    if (APR_BUCKET_IS_EOS(e)) {
		eos = 1;
		break;
	    }
	    if (APR_SUCCESS != (rv = apr_bucket_read(e, (const char **)&response, &len, APR_BLOCK_READ))) {
		return rv;
	    }
	    pos = memchr(response, APR_ASCII_LF, len);
	    if (pos != NULL) {
		if ((pos - response + 1) != len) {
		    len = pos - response + 1;
		    apr_bucket_split(e, pos - response + 1);
		    
		}
		found = 1;
	    }
	    max = sizeof(ctx->buffer)-strlen(ctx->buffer)-1;
	    if (len > max) {
		len = max;
	    }
/* strncat works here, but apr_cpystrn does not - the last char gets chopped, dunno why */
/*	    apr_cpystrn(ctx->buffer+strlen(ctx->buffer), response, len);*/
	    strncat(ctx->buffer, response, len);
	    APR_BUCKET_REMOVE(e);
	    apr_bucket_destroy(e);
	}

	/* EOS? jump to footer */
	if (eos) {
	    ctx->state = FOOTER;
	    break;
	}

	/* not complete? leave and try get some more */
	if (!found) {
	    return APR_SUCCESS;
	}

	/* a symlink? */
	if (ctx->buffer[0] == 'l' && (filename=strstr(ctx->buffer, " -> ")) != NULL) {
	    char *link_ptr = filename;

	    do {
		filename--;
	    } while (filename[0] != ' ');
	    *(filename++) = '\0';
	    *(link_ptr++) = '\0';
	    if ((n = strlen(link_ptr)) > 1 && link_ptr[n - 1] == '\n')
	      link_ptr[n - 1] = '\0';
	    str = apr_psprintf(p, "%s %s %s\n", ctx->buffer, filename, filename, link_ptr);
	}

	/* a directory/file? */
	else if (ctx->buffer[0] == 'd' || ctx->buffer[0] == '-' || ctx->buffer[0] == 'l' || apr_isdigit(ctx->buffer[0])) {
	    int searchidx = 0;
	    char *searchptr = NULL;
	    int firstfile = 1;
	    if (apr_isdigit(ctx->buffer[0])) {	/* handle DOS dir */
		searchptr = strchr(ctx->buffer, '<');
		if (searchptr != NULL)
		    *searchptr = '[';
		searchptr = strchr(ctx->buffer, '>');
		if (searchptr != NULL)
		    *searchptr = ']';
	    }

	    filename = strrchr(ctx->buffer, ' ');
	    *(filename++) = 0;
	    filename[strlen(filename) - 1] = 0;

	    /* handle filenames with spaces in 'em */
	    if (!strcmp(filename, ".") || !strcmp(filename, "..") || firstfile) {
		firstfile = 0;
		searchidx = filename - ctx->buffer;
	    }
	    else if (searchidx != 0 && ctx->buffer[searchidx] != 0) {
		*(--filename) = ' ';
		ctx->buffer[searchidx - 1] = 0;
		filename = &ctx->buffer[searchidx];
	    }

	    /* Special handling for '.' and '..' */
	    if (!strcmp(filename, ".") || !strcmp(filename, "..") || ctx->buffer[0] == 'd') {
		str = apr_psprintf(p, "%s %s\n",
		    ctx->buffer, filename, filename);
	    }
	    else {
		str = apr_psprintf(p, "%s %s\n",
		    ctx->buffer, filename, filename);
	    }
	}
	else {
	    str = apr_pstrdup(p, ctx->buffer);
	}

	/* erase buffer for next time around */
	ctx->buffer[0] = 0;

	e = apr_bucket_pool_create(str, strlen(str), p);
	APR_BRIGADE_INSERT_TAIL(out, e);
	e = apr_bucket_flush_create();
	APR_BRIGADE_INSERT_TAIL(out, e);
	if (APR_SUCCESS != (rv = ap_pass_brigade(f->next, out))) {
	    return rv;
	}
	apr_brigade_cleanup(out);

    }

    if (FOOTER == ctx->state) {
	str = apr_psprintf(p, "
\n\n
\n\n%s\n\n\n\n", ap_psignature("", r)); e = apr_bucket_pool_create(str, strlen(str), p); APR_BRIGADE_INSERT_TAIL(out, e); e = apr_bucket_flush_create(); APR_BRIGADE_INSERT_TAIL(out, e); e = apr_bucket_eos_create(); APR_BRIGADE_INSERT_TAIL(out, e); if (APR_SUCCESS != (rv = ap_pass_brigade(f->next, out))) { return rv; } apr_brigade_destroy(out); } return APR_SUCCESS; } /* Common routine for failed authorization (i.e., missing or wrong password) * to an ftp service. This causes most browsers to retry the request * with username and password (which was presumably queried from the user) * supplied in the Authorization: header. * Note that we "invent" a realm name which consists of the * ftp://user@host part of the reqest (sans password -if supplied but invalid-) */ static int ftp_unauthorized (request_rec *r, int log_it) { r->proxyreq = PROXYREQ_NONE; /* Log failed requests if they supplied a password * (log username/password guessing attempts) */ if (log_it) ap_log_rerror(APLOG_MARK, APLOG_INFO|APLOG_NOERRNO, 0, r, "proxy: missing or failed auth to %s", apr_uri_unparse_components(r->pool, &r->parsed_uri, UNP_OMITPATHINFO)); apr_table_setn(r->err_headers_out, "WWW-Authenticate", apr_pstrcat(r->pool, "Basic realm=\"", apr_uri_unparse_components(r->pool, &r->parsed_uri, UNP_OMITPASSWORD|UNP_OMITPATHINFO), "\"", NULL)); return HTTP_UNAUTHORIZED; } /* * Handles direct access of ftp:// URLs * Original (Non-PASV) version from * Troy Morrison * PASV added by Chuck * Filters by [Graham Leggett ] */ int ap_proxy_ftp_handler(request_rec *r, proxy_server_conf *conf, char *url, const char *proxyhost, apr_port_t proxyport) { apr_pool_t *p = r->pool; conn_rec *c = r->connection; proxy_conn_rec *backend; apr_socket_t *sock, *local_sock, *remote_sock; apr_sockaddr_t *connect_addr; apr_status_t rv; conn_rec *origin, *remote; int err; apr_bucket *e; apr_bucket_brigade *bb = apr_brigade_create(p); apr_bucket_brigade *cbb = apr_brigade_create(p); char *buf, *connectname; apr_port_t connectport; char buffer[MAX_STRING_LEN]; char *path, *strp, *parms; char *user = NULL; /* char *account = NULL; how to supply an account in a URL? */ const char *password = NULL; int i = 0, j, len, rc; int one = 1; char *size = NULL; apr_size_t readbytes = -1; /* stuff for PASV mode */ int connect = 0, use_port = 0; char dates[AP_RFC822_DATE_LEN]; /* is this for us? */ if (proxyhost) { ap_log_error(APLOG_MARK, APLOG_DEBUG|APLOG_NOERRNO, 0, r->server, "proxy: FTP: rejecting URL %s - proxyhost %s specified:", url, proxyhost); return DECLINED; /* proxy connections are via HTTP */ } if (strncasecmp(url, "ftp:", 4)) { ap_log_error(APLOG_MARK, APLOG_DEBUG|APLOG_NOERRNO, 0, r->server, "proxy: FTP: rejecting URL %s - not ftp:", url); return DECLINED; /* only interested in FTP */ } ap_log_error(APLOG_MARK, APLOG_DEBUG|APLOG_NOERRNO, 0, r->server, "proxy: FTP: serving URL %s", url); /* create space for state information */ backend = (proxy_conn_rec *) ap_get_module_config(c->conn_config, &proxy_ftp_module); if (!backend) { backend = ap_pcalloc(c->pool, sizeof(proxy_conn_rec)); backend->connection = NULL; backend->hostname = NULL; backend->port = 0; ap_set_module_config(c->conn_config, &proxy_ftp_module, backend); } /* * I: Who Do I Connect To? * ----------------------- * * Break up the URL to determine the host to connect to */ /* we only support GET and HEAD */ if (r->method_number != M_GET) return HTTP_NOT_IMPLEMENTED; /* We break the URL into host, port, path-search */ connectname = r->parsed_uri.hostname; connectport = (r->parsed_uri.port != 0) ? r->parsed_uri.port : apr_uri_default_port_for_scheme("ftp"); path = apr_pstrdup(p, r->parsed_uri.path); path = (path != NULL && path[0] != '\0') ? &path[1] : ""; parms = strchr(path, ';'); if (parms != NULL) *(parms++) = '\0'; /* The "Authorization:" header must be checked first. * We allow the user to "override" the URL-coded user [ & password ] * in the Browsers' User&Password Dialog. * NOTE that this is only marginally more secure than having the * password travel in plain as part of the URL, because Basic Auth * simply uuencodes the plain text password. * But chances are still smaller that the URL is logged regularly. */ if ((password = apr_table_get(r->headers_in, "Authorization")) != NULL && strcasecmp(ap_getword(r->pool, &password, ' '), "Basic") == 0 && (password = ap_pbase64decode(r->pool, password))[0] != ':') { /* Note that this allocation has to be made from r->connection->pool * because it has the lifetime of the connection. The other allocations * are temporary and can be tossed away any time. */ user = ap_getword_nulls (r->connection->pool, &password, ':'); r->ap_auth_type = "Basic"; r->user = r->parsed_uri.user = user; } else if ((user = r->parsed_uri.user) != NULL) { user = apr_pstrdup(p, user); decodeenc(user); if ((password = r->parsed_uri.password) != NULL) { char *tmp = apr_pstrdup(p, password); decodeenc(tmp); password = tmp; } } else { user = "anonymous"; password = "apache-proxy@"; } ap_log_error(APLOG_MARK, APLOG_DEBUG|APLOG_NOERRNO, 0, r->server, "proxy: FTP: connecting %s to %s:%d", url, connectname, connectport); /* do a DNS lookup for the destination host */ err = apr_sockaddr_info_get(&connect_addr, connectname, APR_UNSPEC, connectport, 0, p); /* check if ProxyBlock directive on this host */ if (OK != ap_proxy_checkproxyblock(r, conf, connect_addr)) { return ap_proxyerror(r, HTTP_FORBIDDEN, "Connect to remote machine blocked"); } /* * II: Make the Connection * ----------------------- * * We have determined who to connect to. Now make the connection. */ /* get all the possible IP addresses for the destname and loop through them * until we get a successful connection */ if (APR_SUCCESS != err) { return ap_proxyerror(r, HTTP_BAD_GATEWAY, apr_pstrcat(p, "DNS lookup failure for: ", connectname, NULL)); } if ((rv = apr_socket_create(&sock, APR_INET, SOCK_STREAM, APR_INHERIT, r->pool)) != APR_SUCCESS) { ap_log_rerror(APLOG_MARK, APLOG_ERR, rv, r, "proxy: FTP: error creating socket"); return HTTP_INTERNAL_SERVER_ERROR; } #if !defined(TPF) && !defined(BEOS) if (conf->recv_buffer_size > 0 && (rv = apr_setsocketopt(sock, APR_SO_RCVBUF, conf->recv_buffer_size))) { ap_log_rerror(APLOG_MARK, APLOG_ERR, rv, r, "setsockopt(SO_RCVBUF): Failed to set ProxyReceiveBufferSize, using default"); } #endif if (APR_SUCCESS != (rv = apr_setsocketopt(sock, APR_SO_REUSEADDR, one))) { #ifndef _OSD_POSIX /* BS2000 has this option "always on" */ ap_log_rerror(APLOG_MARK, APLOG_ERR, rv, r, "proxy: FTP: error setting reuseaddr option: setsockopt(SO_REUSEADDR)"); return HTTP_INTERNAL_SERVER_ERROR; #endif /*_OSD_POSIX*/ } ap_log_error(APLOG_MARK, APLOG_DEBUG|APLOG_NOERRNO, 0, r->server, "proxy: FTP: socket has been created"); /* * At this point we have a list of one or more IP addresses of * the machine to connect to. If configured, reorder this * list so that the "best candidate" is first try. "best * candidate" could mean the least loaded server, the fastest * responding server, whatever. * * For now we do nothing, ie we get DNS round robin. * XXX FIXME */ /* try each IP address until we connect successfully */ { int failed = 1; while (connect_addr) { /* make the connection out of the socket */ rv = apr_connect(sock, connect_addr); /* if an error occurred, loop round and try again */ if (rv != APR_SUCCESS) { ap_log_error(APLOG_MARK, APLOG_ERR, rv, r->server, "proxy: FTP: attempt to connect to %pI (%s) failed", connect_addr, connectname); connect_addr = connect_addr->next; continue; } /* if we get here, all is well */ failed = 0; break; } /* handle a permanent error from the above loop */ if (failed) { return ap_proxyerror(r, HTTP_BAD_GATEWAY, apr_psprintf(r->pool, "Could not connect to remote machine: %s port %d", connectname, connectport)); } } /* the socket is now open, create a new connection */ origin = ap_new_connection(p, r->server, sock, r->connection->id); if (!origin) { /* the peer reset the connection already; ap_new_connection() * closed the socket */ ap_log_error(APLOG_MARK, APLOG_DEBUG|APLOG_NOERRNO, 0, r->server, "proxy: FTP: an error occurred creating a new connection to %pI (%s)", connect_addr, connectname); return HTTP_INTERNAL_SERVER_ERROR; } /* if a keepalive connection is floating around, close it first! */ /* we might support ftp keepalives later, but not now... */ if (backend->connection) { apr_socket_close(backend->connection->client_socket); backend->connection = NULL; } ap_log_error(APLOG_MARK, APLOG_DEBUG|APLOG_NOERRNO, 0, r->server, "proxy: FTP: control connection complete"); /* * III: Send Control Request * ------------------------- * * Log into the ftp server, send the username & password, change to the correct * directory... */ /* set up the connection filters */ ap_proxy_pre_http_connection(origin, NULL); /* possible results: */ /* 120 Service ready in nnn minutes. */ /* 220 Service ready for new user. */ /* 421 Service not available, closing control connection. */ rc = ftp_getrc_msg(origin, cbb, buffer, sizeof(buffer)); ap_log_error(APLOG_MARK, APLOG_DEBUG|APLOG_NOERRNO, 0, r->server, "proxy: FTP: %d %s", rc, buffer); if (rc == -1) { return ap_proxyerror(r, HTTP_BAD_GATEWAY, "Error reading from remote server"); } if (rc == 120) { /* RFC2616 states: * 14.37 Retry-After * * The Retry-After response-header field can be used with a 503 (Service * Unavailable) response to indicate how long the service is expected to * be unavailable to the requesting client. [...] The value of this field * can be either an HTTP-date or an integer number of seconds (in decimal) * after the time of the response. * Retry-After = "Retry-After" ":" ( HTTP-date | delta-seconds ) */ for (i = 0; buffer[i] && !isdigit(buffer[i]); i++); if (buffer[i]) { ap_table_add(r->headers_out, "Retry-After", apr_psprintf(p, "%lu", 60*atol(buffer+i))); } return ap_proxyerror(r, HTTP_SERVICE_UNAVAILABLE, buffer); } if (rc != 220) { return ap_proxyerror(r, HTTP_BAD_GATEWAY, buffer); } ap_log_error(APLOG_MARK, APLOG_DEBUG|APLOG_NOERRNO, 0, r->server, "proxy: FTP: connected."); buf = apr_pstrcat(p, "USER ", user, CRLF, NULL); e = apr_bucket_pool_create(buf, strlen(buf), p); APR_BRIGADE_INSERT_TAIL(bb, e); e = apr_bucket_flush_create(); APR_BRIGADE_INSERT_TAIL(bb, e); ap_pass_brigade(origin->output_filters, bb); ap_log_error(APLOG_MARK, APLOG_DEBUG|APLOG_NOERRNO, 0, r->server, "proxy: FTP: USER %s", user); /* possible results; 230, 331, 332, 421, 500, 501, 530 */ /* states: 1 - error, 2 - success; 3 - send password, 4,5 fail */ /* 230 User logged in, proceed. */ /* 331 User name okay, need password. */ /* 332 Need account for login. */ /* 421 Service not available, closing control connection. */ /* 500 Syntax error, command unrecognized. */ /* (This may include errors such as command line too long.) */ /* 501 Syntax error in parameters or arguments. */ /* 530 Not logged in. */ rc = ftp_getrc_msg(origin, cbb, buffer, sizeof(buffer)); ap_log_error(APLOG_MARK, APLOG_DEBUG|APLOG_NOERRNO, 0, r->server, "proxy: FTP: %d %s", rc, buffer); if (rc == -1) { return ap_proxyerror(r, HTTP_BAD_GATEWAY, "Error reading from remote server"); } if (rc == 530) { return ftp_unauthorized (r, 1); /* log it: user name guessing attempt? */ } if (rc != 230 && rc != 331) { return ap_proxyerror(r, HTTP_BAD_GATEWAY, buffer); } if (rc == 331) { /* send password */ if (password == NULL) { return ftp_unauthorized (r, 0); } buf = apr_pstrcat(p, "PASS ", password, CRLF, NULL); e = apr_bucket_pool_create(buf, strlen(buf), p); APR_BRIGADE_INSERT_TAIL(bb, e); e = apr_bucket_flush_create(); APR_BRIGADE_INSERT_TAIL(bb, e); ap_pass_brigade(origin->output_filters, bb); ap_log_error(APLOG_MARK, APLOG_DEBUG|APLOG_NOERRNO, 0, r->server, "proxy: FTP: PASS %s", password); /* possible results 202, 230, 332, 421, 500, 501, 503, 530 */ /* 230 User logged in, proceed. */ /* 332 Need account for login. */ /* 421 Service not available, closing control connection. */ /* 500 Syntax error, command unrecognized. */ /* 501 Syntax error in parameters or arguments. */ /* 503 Bad sequence of commands. */ /* 530 Not logged in. */ rc = ftp_getrc_msg(origin, cbb, buffer, sizeof(buffer)); ap_log_error(APLOG_MARK, APLOG_DEBUG|APLOG_NOERRNO, 0, r->server, "proxy: FTP: %d %s", rc, buffer); if (rc == -1) { return ap_proxyerror(r, HTTP_BAD_GATEWAY, "Error reading from remote server"); } if (rc == 332) { return ap_proxyerror(r, HTTP_UNAUTHORIZED, apr_pstrcat(p, "Need account for login: ", buffer, NULL)); } /* @@@ questionable -- we might as well return a 403 Forbidden here */ if (rc == 530) { return ftp_unauthorized (r, 1); /* log it: passwd guessing attempt? */ } if (rc != 230 && rc != 202) { return ap_proxyerror(r, HTTP_BAD_GATEWAY, buffer); } } apr_table_set(r->notes, "Directory-README", buffer); /* set the directory (walk directory component by component): * this is what we must do if we don't know the OS type of the remote * machine */ for (;;) { strp = strchr(path, '/'); if (strp == NULL) break; *strp = '\0'; len = decodeenc(path); buf = apr_pstrcat(p, "CWD ", path, CRLF, NULL); e = apr_bucket_pool_create(buf, strlen(buf), p); APR_BRIGADE_INSERT_TAIL(bb, e); e = apr_bucket_flush_create(); APR_BRIGADE_INSERT_TAIL(bb, e); ap_pass_brigade(origin->output_filters, bb); ap_log_error(APLOG_MARK, APLOG_DEBUG|APLOG_NOERRNO, 0, r->server, "proxy: FTP: CWD %s", path); *strp = '/'; /* responses: 250, 421, 500, 501, 502, 530, 550 */ /* 250 Requested file action okay, completed. */ /* 421 Service not available, closing control connection. */ /* 500 Syntax error, command unrecognized. */ /* 501 Syntax error in parameters or arguments. */ /* 502 Command not implemented. */ /* 530 Not logged in. */ /* 550 Requested action not taken. */ rc = ftp_getrc_msg(origin, cbb, buffer, sizeof(buffer)); ap_log_error(APLOG_MARK, APLOG_DEBUG|APLOG_NOERRNO, 0, r->server, "proxy: FTP: %d %s", rc, buffer); if (rc == -1) { return ap_proxyerror(r, HTTP_BAD_GATEWAY, "Error reading from remote server"); } if (rc == 550) { return ap_proxyerror(r, HTTP_NOT_FOUND, buffer); } if (rc != 250) { return ap_proxyerror(r, HTTP_BAD_GATEWAY, buffer); } path = strp + 1; } if (parms != NULL && strncasecmp(parms, "type=a", 6) == 0) { parms = "A"; } else { parms = "I"; } /* changed to make binary transfers the default */ /* set type to binary */ buf = apr_pstrcat(p, "TYPE ", parms, CRLF, NULL); e = apr_bucket_pool_create(buf, strlen(buf), p); APR_BRIGADE_INSERT_TAIL(bb, e); e = apr_bucket_flush_create(); APR_BRIGADE_INSERT_TAIL(bb, e); ap_pass_brigade(origin->output_filters, bb); ap_log_error(APLOG_MARK, APLOG_DEBUG|APLOG_NOERRNO, 0, r->server, "proxy: FTP: TYPE I"); /* responses: 200, 421, 500, 501, 504, 530 */ /* 200 Command okay. */ /* 421 Service not available, closing control connection. */ /* 500 Syntax error, command unrecognized. */ /* 501 Syntax error in parameters or arguments. */ /* 504 Command not implemented for that parameter. */ /* 530 Not logged in. */ rc = ftp_getrc_msg(origin, cbb, buffer, sizeof(buffer)); ap_log_error(APLOG_MARK, APLOG_DEBUG|APLOG_NOERRNO, 0, r->server, "proxy: FTP: %d %s", rc, buffer); if (rc == -1) { return ap_proxyerror(r, HTTP_BAD_GATEWAY, "Error reading from remote server"); } if (rc != 200 && rc != 504) { return ap_proxyerror(r, HTTP_BAD_GATEWAY, buffer); } /* Allow not implemented */ if (rc == 504) { parms[0] = '\0'; } /* * IV: Make Data Connection? * ------------------------- * * Try EPSV, if that fails... * try PASV, if that fails... * try PORT. */ /* this temporarily switches off EPSV/PASV */ /*goto bypass;*/ /* set up data connection - EPSV */ { apr_sockaddr_t *remote_addr; char *remote_ip; apr_port_t remote_port; /* The EPSV command replaces PASV where both IPV4 and IPV6 is supported. Only * the port is returned, the IP address is always the same as that on the * control connection. Example: * Entering Extended Passive Mode (|||6446|) */ buf = apr_pstrcat(p, "EPSV", CRLF, NULL); e = apr_bucket_pool_create(buf, strlen(buf), p); APR_BRIGADE_INSERT_TAIL(bb, e); e = apr_bucket_flush_create(); APR_BRIGADE_INSERT_TAIL(bb, e); ap_pass_brigade(origin->output_filters, bb); ap_log_error(APLOG_MARK, APLOG_DEBUG|APLOG_NOERRNO, 0, r->server, "proxy: FTP: EPSV"); /* possible results: 227, 421, 500, 501, 502, 530 */ /* 227 Entering Passive Mode (h1,h2,h3,h4,p1,p2). */ /* 421 Service not available, closing control connection. */ /* 500 Syntax error, command unrecognized. */ /* 501 Syntax error in parameters or arguments. */ /* 502 Command not implemented. */ /* 530 Not logged in. */ rc = ftp_getrc_msg(origin, cbb, buffer, sizeof(buffer)); ap_log_error(APLOG_MARK, APLOG_DEBUG|APLOG_NOERRNO, 0, r->server, "proxy: FTP: %d %s", rc, buffer); if (rc == -1) { return ap_proxyerror(r, HTTP_BAD_GATEWAY, "Error reading from remote server"); } if (rc != 229 && rc != 500 && rc != 501 && rc != 502) { return ap_proxyerror(r, HTTP_BAD_GATEWAY, buffer); } else if (rc == 229) { char *pstr; char *tok_cntx; pstr = apr_pstrdup(p, buffer); pstr = apr_strtok(pstr, " ", &tok_cntx); /* separate result code */ if (pstr != NULL) { if (*(pstr + strlen(pstr) + 1) == '=') { pstr += strlen(pstr) + 2; } else { pstr = apr_strtok(NULL, "(", &tok_cntx); /* separate address & port params */ if (pstr != NULL) pstr = apr_strtok(NULL, ")", &tok_cntx); } } if (pstr) { apr_sockaddr_t *epsv_addr; remote_port = atoi(pstr+3); ap_log_error(APLOG_MARK, APLOG_DEBUG|APLOG_NOERRNO, 0, r->server, "proxy: FTP: EPSV contacting remote host on port %d", remote_port); if ((rv = apr_socket_create(&remote_sock, APR_INET, SOCK_STREAM, APR_INHERIT, r->pool)) != APR_SUCCESS) { ap_log_rerror(APLOG_MARK, APLOG_ERR, rv, r, "proxy: FTP: error creating EPSV socket"); return HTTP_INTERNAL_SERVER_ERROR; } #if !defined (TPF) && !defined(BEOS) if (conf->recv_buffer_size > 0 && (rv = apr_setsocketopt(remote_sock, APR_SO_RCVBUF, conf->recv_buffer_size))) { ap_log_rerror(APLOG_MARK, APLOG_ERR, rv, r, "proxy: FTP: setsockopt(SO_RCVBUF): Failed to set ProxyReceiveBufferSize, using default"); } #endif /* make the connection */ apr_socket_addr_get(&remote_addr, APR_REMOTE, sock); apr_sockaddr_ip_get(&remote_ip, remote_addr); apr_sockaddr_info_get(&epsv_addr, remote_ip, APR_INET, remote_port, 0, p); rv = apr_connect(remote_sock, epsv_addr); if (rv != APR_SUCCESS) { ap_log_error(APLOG_MARK, APLOG_ERR, rv, r->server, "proxy: FTP: EPSV attempt to connect to %pI failed - Firewall/NAT?", epsv_addr); return ap_proxyerror(r, HTTP_BAD_GATEWAY, apr_psprintf(r->pool, "EPSV attempt to connect to %pI failed - firewall/NAT?", epsv_addr)); } else { connect = 1; } } else { /* and try the regular way */ apr_socket_close(remote_sock); } } } /* set up data connection - PASV */ if (!connect) { buf = apr_pstrcat(p, "PASV", CRLF, NULL); e = apr_bucket_pool_create(buf, strlen(buf), p); APR_BRIGADE_INSERT_TAIL(bb, e); e = apr_bucket_flush_create(); APR_BRIGADE_INSERT_TAIL(bb, e); ap_pass_brigade(origin->output_filters, bb); ap_log_error(APLOG_MARK, APLOG_DEBUG|APLOG_NOERRNO, 0, r->server, "proxy: FTP: PASV"); /* possible results: 227, 421, 500, 501, 502, 530 */ /* 227 Entering Passive Mode (h1,h2,h3,h4,p1,p2). */ /* 421 Service not available, closing control connection. */ /* 500 Syntax error, command unrecognized. */ /* 501 Syntax error in parameters or arguments. */ /* 502 Command not implemented. */ /* 530 Not logged in. */ rc = ftp_getrc_msg(origin, cbb, buffer, sizeof(buffer)); ap_log_error(APLOG_MARK, APLOG_DEBUG|APLOG_NOERRNO, 0, r->server, "proxy: FTP: %d %s", rc, buffer); if (rc == -1) { return ap_proxyerror(r, HTTP_BAD_GATEWAY, "Error reading from remote server"); } if (rc != 227 && rc != 502) { return ap_proxyerror(r, HTTP_BAD_GATEWAY, buffer); } else if (rc == 227) { unsigned int h0, h1, h2, h3, p0, p1; char *pstr; char *tok_cntx; /* FIXME: Check PASV against RFC1123 */ pstr = apr_pstrdup(p, buffer); pstr = apr_strtok(pstr, " ", &tok_cntx); /* separate result code */ if (pstr != NULL) { if (*(pstr + strlen(pstr) + 1) == '=') { pstr += strlen(pstr) + 2; } else { pstr = apr_strtok(NULL, "(", &tok_cntx); /* separate address & port params */ if (pstr != NULL) pstr = apr_strtok(NULL, ")", &tok_cntx); } } /* FIXME: Only supports IPV4 - fix in RFC2428 */ if (pstr != NULL && (sscanf(pstr, "%d,%d,%d,%d,%d,%d", &h3, &h2, &h1, &h0, &p1, &p0) == 6)) { apr_sockaddr_t *pasv_addr; int pasvport = (p1 << 8) + p0; ap_log_error(APLOG_MARK, APLOG_DEBUG|APLOG_NOERRNO, 0, r->server, "proxy: FTP: PASV contacting host %d.%d.%d.%d:%d", h3, h2, h1, h0, pasvport); if ((rv = apr_socket_create(&remote_sock, APR_INET, SOCK_STREAM, APR_INHERIT, r->pool)) != APR_SUCCESS) { ap_log_rerror(APLOG_MARK, APLOG_ERR, rv, r, "proxy: error creating PASV socket"); return HTTP_INTERNAL_SERVER_ERROR; } #if !defined (TPF) && !defined(BEOS) if (conf->recv_buffer_size > 0 && (rv = apr_setsocketopt(remote_sock, APR_SO_RCVBUF, conf->recv_buffer_size))) { ap_log_rerror(APLOG_MARK, APLOG_ERR, rv, r, "proxy: FTP: setsockopt(SO_RCVBUF): Failed to set ProxyReceiveBufferSize, using default"); } #endif /* make the connection */ apr_sockaddr_info_get(&pasv_addr, apr_psprintf(p, "%d.%d.%d.%d", h3, h2, h1, h0), APR_INET, pasvport, 0, p); rv = apr_connect(remote_sock, pasv_addr); if (rv != APR_SUCCESS) { ap_log_error(APLOG_MARK, APLOG_ERR, rv, r->server, "proxy: FTP: PASV attempt to connect to %pI failed - Firewall/NAT?", pasv_addr); return ap_proxyerror(r, HTTP_BAD_GATEWAY, apr_psprintf(r->pool, "PASV attempt to connect to %pI failed - firewall/NAT?", pasv_addr)); } else { connect = 1; } } else { /* and try the regular way */ apr_socket_close(remote_sock); } } } /*bypass:*/ /* set up data connection - PORT */ if (!connect) { apr_sockaddr_t *local_addr; char *local_ip; apr_port_t local_port; unsigned int h0, h1, h2, h3, p0, p1; if ((rv = apr_socket_create(&local_sock, APR_INET, SOCK_STREAM, APR_INHERIT, r->pool)) != APR_SUCCESS) { ap_log_rerror(APLOG_MARK, APLOG_ERR, rv, r, "proxy: FTP: error creating local socket"); return HTTP_INTERNAL_SERVER_ERROR; } apr_socket_addr_get(&local_addr, APR_LOCAL, sock); apr_sockaddr_port_get(&local_port, local_addr); apr_sockaddr_ip_get(&local_ip, local_addr); if ((rv = apr_setsocketopt(local_sock, APR_SO_REUSEADDR, one)) != APR_SUCCESS) { #ifndef _OSD_POSIX /* BS2000 has this option "always on" */ ap_log_rerror(APLOG_MARK, APLOG_ERR, rv, r, "proxy: FTP: error setting reuseaddr option"); return HTTP_INTERNAL_SERVER_ERROR; #endif /*_OSD_POSIX*/ } apr_sockaddr_info_get(&local_addr, local_ip, APR_UNSPEC, local_port, 0, r->pool); if ((rv = apr_bind(local_sock, local_addr)) != APR_SUCCESS) { ap_log_rerror(APLOG_MARK, APLOG_ERR, rv, r, "proxy: FTP: error binding to ftp data socket %pI", local_addr); return HTTP_INTERNAL_SERVER_ERROR; } /* only need a short queue */ if ((rv = apr_listen(local_sock, 2)) != APR_SUCCESS) { ap_log_rerror(APLOG_MARK, APLOG_ERR, rv, r, "proxy: FTP: error listening to ftp data socket %pI", local_addr); return HTTP_INTERNAL_SERVER_ERROR; } /* FIXME: Sent PORT here */ if (local_ip && (sscanf(local_ip, "%d.%d.%d.%d", &h3, &h2, &h1, &h0) == 4)) { p1 = (local_port >> 8); p0 = (local_port & 0xFF); buf = apr_psprintf(p, "PORT %d,%d,%d,%d,%d,%d" CRLF, h3, h2, h1, h0, p1, p0); e = apr_bucket_pool_create(buf, strlen(buf), p); APR_BRIGADE_INSERT_TAIL(bb, e); e = apr_bucket_flush_create(); APR_BRIGADE_INSERT_TAIL(bb, e); ap_pass_brigade(origin->output_filters, bb); ap_log_error(APLOG_MARK, APLOG_DEBUG|APLOG_NOERRNO, 0, r->server, "proxy: FTP: PORT %d,%d,%d,%d,%d,%d", h3, h2, h1, h0, p1, p0); /* possible results: 200, 421, 500, 501, 502, 530 */ /* 200 Command okay. */ /* 421 Service not available, closing control connection. */ /* 500 Syntax error, command unrecognized. */ /* 501 Syntax error in parameters or arguments. */ /* 502 Command not implemented. */ /* 530 Not logged in. */ rc = ftp_getrc_msg(origin, cbb, buffer, sizeof(buffer)); ap_log_error(APLOG_MARK, APLOG_DEBUG|APLOG_NOERRNO, 0, r->server, "proxy: FTP: %d %s", rc, buffer); if (rc == -1) { return ap_proxyerror(r, HTTP_BAD_GATEWAY, "Error reading from remote server"); } if (rc != 200) { return ap_proxyerror(r, HTTP_BAD_GATEWAY, buffer); } /* signal that we must use the EPRT/PORT loop */ use_port = 1; } else { /* IPV6 FIXME: * The EPRT command replaces PORT where both IPV4 and IPV6 is supported. The first * number (1,2) indicates the protocol type. Examples: * EPRT |1|132.235.1.2|6275| * EPRT |2|1080::8:800:200C:417A|5282| */ return ap_proxyerror(r, HTTP_NOT_IMPLEMENTED, "Connect to IPV6 ftp server using EPRT not supported. Enable EPSV."); } } /* * V: Set The Headers * ------------------- * * Get the size of the request, set up the environment for HTTP. */ /* set request; "path" holds last path component */ len = decodeenc(path); /* TM - if len == 0 then it must be a directory (you can't RETR nothing) */ if (len == 0) { parms = "d"; } else { buf = apr_pstrcat(p, "SIZE ", path, CRLF, NULL); e = apr_bucket_pool_create(buf, strlen(buf), p); APR_BRIGADE_INSERT_TAIL(bb, e); e = apr_bucket_flush_create(); APR_BRIGADE_INSERT_TAIL(bb, e); ap_pass_brigade(origin->output_filters, bb); ap_log_error(APLOG_MARK, APLOG_DEBUG|APLOG_NOERRNO, 0, r->server, "proxy: FTP: SIZE %s", path); rc = ftp_getrc_msg(origin, cbb, buffer, sizeof buffer); ap_log_error(APLOG_MARK, APLOG_DEBUG|APLOG_NOERRNO, 0, r->server, "proxy: FTP: returned status %d with response %s", rc, buffer); if (rc != 500) { /* Size command not recognized */ if (rc == 550) { /* Not a regular file */ ap_log_error(APLOG_MARK, APLOG_DEBUG|APLOG_NOERRNO, 0, r->server, "proxy: FTP: SIZE shows this is a directory"); parms = "d"; buf = apr_pstrcat(p, "CWD ", path, CRLF, NULL); e = apr_bucket_pool_create(buf, strlen(buf), p); APR_BRIGADE_INSERT_TAIL(bb, e); e = apr_bucket_flush_create(); APR_BRIGADE_INSERT_TAIL(bb, e); ap_pass_brigade(origin->output_filters, bb); ap_log_error(APLOG_MARK, APLOG_DEBUG|APLOG_NOERRNO, 0, r->server, "proxy: FTP: CWD %s", path); rc = ftp_getrc_msg(origin, cbb, buffer, sizeof(buffer)); /* possible results: 250, 421, 500, 501, 502, 530, 550 */ /* 250 Requested file action okay, completed. */ /* 421 Service not available, closing control connection. */ /* 500 Syntax error, command unrecognized. */ /* 501 Syntax error in parameters or arguments. */ /* 502 Command not implemented. */ /* 530 Not logged in. */ /* 550 Requested action not taken. */ ap_log_error(APLOG_MARK, APLOG_DEBUG|APLOG_NOERRNO, 0, r->server, "proxy: FTP: %d %s", rc, buffer); if (rc == -1) { return ap_proxyerror(r, HTTP_BAD_GATEWAY, "Error reading from remote server"); } if (rc == 550) { return ap_proxyerror(r, HTTP_NOT_FOUND, buffer); } if (rc != 250) { return ap_proxyerror(r, HTTP_BAD_GATEWAY, buffer); } path = ""; len = 0; } else if (i == 213) { /* Size command ok */ for (j = 0; j < sizeof(buffer) && apr_isdigit(buffer[j]); j++); buffer[j] = '\0'; if (buffer[0] != '\0') size = apr_pstrdup(p, buffer); } } } #ifdef AUTODETECT_PWD buf = apr_pstrcat(p, "PWD", CRLF, NULL); e = apr_bucket_pool_create(buf, strlen(buf), p); APR_BRIGADE_INSERT_TAIL(bb, e); e = apr_bucket_flush_create(); APR_BRIGADE_INSERT_TAIL(bb, e); ap_pass_brigade(origin->output_filters, bb); ap_log_error(APLOG_MARK, APLOG_DEBUG|APLOG_NOERRNO, 0, r->server, "proxy: FTP: PWD"); /* responses: 257, 500, 501, 502, 421, 550 */ /* 257 "" */ /* 421 Service not available, closing control connection. */ /* 500 Syntax error, command unrecognized. */ /* 501 Syntax error in parameters or arguments. */ /* 502 Command not implemented. */ /* 550 Requested action not taken. */ rc = ftp_getrc_msg(origin, cbb, buffer, sizeof(buffer)); ap_log_error(APLOG_MARK, APLOG_DEBUG|APLOG_NOERRNO, 0, r->server, "proxy: FTP: %d %s", rc, buffer); if (rc == -1 || rc == 421) { return ap_proxyerror(r, HTTP_BAD_GATEWAY, "Error reading from remote server"); } if (rc == 550) { return ap_proxyerror(r, HTTP_NOT_FOUND, buffer); } if (rc == 257) { const char *dirp = buffer; apr_table_set(r->notes, "Directory-PWD", ap_getword_conf(r->pool, &dirp)); } #endif /*AUTODETECT_PWD*/ if (parms[0] == 'd') { if (len != 0) buf = apr_pstrcat(p, "LIST ", path, CRLF, NULL); else buf = apr_pstrcat(p, "LIST -lag", CRLF, NULL); ap_log_error(APLOG_MARK, APLOG_DEBUG|APLOG_NOERRNO, 0, r->server, "proxy: FTP: LIST %s", (len == 0 ? "-lag" : path)); } else { /* FIXME: Handle range requests - send REST */ buf = apr_pstrcat(p, "RETR ", path, CRLF, NULL); ap_log_error(APLOG_MARK, APLOG_DEBUG|APLOG_NOERRNO, 0, r->server, "proxy: FTP: RETR %s", path); } e = apr_bucket_pool_create(buf, strlen(buf), p); APR_BRIGADE_INSERT_TAIL(bb, e); e = apr_bucket_flush_create(); APR_BRIGADE_INSERT_TAIL(bb, e); ap_pass_brigade(origin->output_filters, bb); /* RETR: 110, 125, 150, 226, 250, 421, 425, 426, 450, 451, 500, 501, 530, 550 * NLST: 125, 150, 226, 250, 421, 425, 426, 450, 451, 500, 501, 502, 530 */ /* 110 Restart marker reply. */ /* 125 Data connection already open; transfer starting. */ /* 150 File status okay; about to open data connection. */ /* 226 Closing data connection. */ /* 250 Requested file action okay, completed. */ /* 421 Service not available, closing control connection. */ /* 425 Can't open data connection. */ /* 426 Connection closed; transfer aborted. */ /* 450 Requested file action not taken. */ /* 451 Requested action aborted. Local error in processing. */ /* 500 Syntax error, command unrecognized. */ /* 501 Syntax error in parameters or arguments. */ /* 530 Not logged in. */ /* 550 Requested action not taken. */ rc = ftp_getrc_msg(origin, cbb, buffer, sizeof(buffer)); ap_log_error(APLOG_MARK, APLOG_DEBUG|APLOG_NOERRNO, 0, r->server, "proxy: FTP: %d %s", rc, buffer); if (rc == -1) { return ap_proxyerror(r, HTTP_BAD_GATEWAY, "Error reading from remote server"); } if (rc == 550) { ap_log_error(APLOG_MARK, APLOG_DEBUG|APLOG_NOERRNO, 0, r->server, "proxy: FTP: RETR failed, trying LIST instead"); parms = "d"; buf = apr_pstrcat(p, "CWD ", path, CRLF, NULL); e = apr_bucket_pool_create(buf, strlen(buf), p); APR_BRIGADE_INSERT_TAIL(bb, e); e = apr_bucket_flush_create(); APR_BRIGADE_INSERT_TAIL(bb, e); ap_pass_brigade(origin->output_filters, bb); ap_log_error(APLOG_MARK, APLOG_DEBUG|APLOG_NOERRNO, 0, r->server, "proxy: FTP: CWD %s", path); /* possible results: 250, 421, 500, 501, 502, 530, 550 */ /* 250 Requested file action okay, completed. */ /* 421 Service not available, closing control connection. */ /* 500 Syntax error, command unrecognized. */ /* 501 Syntax error in parameters or arguments. */ /* 502 Command not implemented. */ /* 530 Not logged in. */ /* 550 Requested action not taken. */ rc = ftp_getrc_msg(origin, cbb, buffer, sizeof(buffer)); ap_log_error(APLOG_MARK, APLOG_DEBUG|APLOG_NOERRNO, 0, r->server, "proxy: FTP: %d %s", rc, buffer); if (rc == -1) { return ap_proxyerror(r, HTTP_BAD_GATEWAY, "Error reading from remote server"); } if (rc == 550) { return ap_proxyerror(r, HTTP_NOT_FOUND, buffer); } if (rc != 250) { return ap_proxyerror(r, HTTP_BAD_GATEWAY, buffer); } #ifdef AUTODETECT_PWD buf = apr_pstrcat(p, "PWD ", CRLF, NULL); e = apr_bucket_pool_create(buf, strlen(buf), p); APR_BRIGADE_INSERT_TAIL(bb, e); e = apr_bucket_flush_create(); APR_BRIGADE_INSERT_TAIL(bb, e); ap_pass_brigade(origin->output_filters, bb); ap_log_error(APLOG_MARK, APLOG_DEBUG|APLOG_NOERRNO, 0, r->server, "proxy: FTP: PWD"); /* responses: 257, 500, 501, 502, 421, 550 */ /* 257 "" */ /* 421 Service not available, closing control connection. */ /* 500 Syntax error, command unrecognized. */ /* 501 Syntax error in parameters or arguments. */ /* 502 Command not implemented. */ /* 550 Requested action not taken. */ rc = ftp_getrc_msg(origin, cbb, buffer, sizeof(buffer)); ap_log_error(APLOG_MARK, APLOG_DEBUG|APLOG_NOERRNO, 0, r->server, "proxy: FTP: %d %s", rc, buffer); if (rc == -1 || rc == 421) { return ap_proxyerror(r, HTTP_BAD_GATEWAY, "Error reading from remote server"); } if (rc == 550) { return ap_proxyerror(r, HTTP_NOT_FOUND, buffer); } if (rc == 257) { const char *dirp = buffer; apr_table_set(r->notes, "Directory-PWD", ap_getword_conf(r->pool, &dirp)); } #endif /*AUTODETECT_PWD*/ buf = apr_pstrcat(p, "LIST -lag", CRLF, NULL); e = apr_bucket_pool_create(buf, strlen(buf), p); APR_BRIGADE_INSERT_TAIL(bb, e); e = apr_bucket_flush_create(); APR_BRIGADE_INSERT_TAIL(bb, e); ap_pass_brigade(origin->output_filters, bb); ap_log_error(APLOG_MARK, APLOG_DEBUG|APLOG_NOERRNO, 0, r->server, "proxy: FTP: LIST -lag"); rc = ftp_getrc_msg(origin, cbb, buffer, sizeof(buffer)); ap_log_error(APLOG_MARK, APLOG_DEBUG|APLOG_NOERRNO, 0, r->server, "proxy: FTP: %d %s", rc, buffer); if (rc == -1) return ap_proxyerror(r, HTTP_BAD_GATEWAY, "Error reading from remote server"); } if (rc != 125 && rc != 150 && rc != 226 && rc != 250) { return ap_proxyerror(r, HTTP_BAD_GATEWAY, buffer); } r->status = HTTP_OK; r->status_line = "200 OK"; apr_rfc822_date(dates, r->request_time); apr_table_setn(r->headers_out, "Date", dates); apr_table_setn(r->headers_out, "Server", ap_get_server_version()); /* set content-type */ if (parms[0] == 'd') { r->content_type = "text/html"; } else { if (r->content_type) { ap_log_error(APLOG_MARK, APLOG_DEBUG|APLOG_NOERRNO, 0, r->server, "proxy: FTP: Content-Type set to %s", r->content_type); } else { r->content_type = ap_default_type(r); } if (parms[0] != 'a' && size != NULL) { /* We "trust" the ftp server to really serve (size) bytes... */ apr_table_setn(r->headers_out, "Content-Length", size); ap_log_error(APLOG_MARK, APLOG_DEBUG|APLOG_NOERRNO, 0, r->server, "proxy: FTP: Content-Length set to %s", size); } } apr_table_setn(r->headers_out, "Content-Type", r->content_type); ap_log_error(APLOG_MARK, APLOG_DEBUG|APLOG_NOERRNO, 0, r->server, "proxy: FTP: Content-Type set to %s", r->content_type); /* set content-encoding */ if (r->content_encoding != NULL && r->content_encoding[0] != '\0') { ap_log_error(APLOG_MARK, APLOG_DEBUG|APLOG_NOERRNO, 0, r->server, "proxy: FTP: Content-Encoding set to %s", r->content_encoding); apr_table_setn(r->headers_out, "Content-Encoding", r->content_encoding); } /* wait for connection */ if (use_port) { for(;;) { rv = apr_accept(&remote_sock, local_sock, r->pool); if (rv == APR_EINTR) { continue; } else if (rv == APR_SUCCESS) { break; } else { ap_log_rerror(APLOG_MARK, APLOG_ERR, rv, r, "proxy: FTP: failed to accept data connection"); return HTTP_BAD_GATEWAY; } } } /* the transfer socket is now open, create a new connection */ remote = ap_new_connection(p, r->server, remote_sock, r->connection->id); if (!remote) { /* the peer reset the connection already; ap_new_connection() * closed the socket */ ap_log_error(APLOG_MARK, APLOG_DEBUG|APLOG_NOERRNO, 0, r->server, "proxy: FTP: an error occurred creating the transfer connection"); return HTTP_INTERNAL_SERVER_ERROR; } /* set up the connection filters */ ap_proxy_pre_http_connection(remote, NULL); /* * VI: Receive the Response * ------------------------ * * Get response from the remote ftp socket, and pass it up the * filter chain. */ /* send response */ r->sent_bodyct = 1; if (parms[0] == 'd') { /* insert directory filter */ ap_add_output_filter("PROXY_SEND_DIR", NULL, r, r->connection); } /* send body */ if (!r->header_only) { ap_log_error(APLOG_MARK, APLOG_DEBUG|APLOG_NOERRNO, 0, r->server, "proxy: FTP: start body send"); /* read the body, pass it to the output filters */ while (ap_get_brigade(remote->input_filters, bb, AP_MODE_BLOCKING, &readbytes) == APR_SUCCESS) { if (APR_BUCKET_IS_EOS(APR_BRIGADE_LAST(bb))) { e = apr_bucket_flush_create(); APR_BRIGADE_INSERT_TAIL(bb, e); ap_pass_brigade(r->output_filters, bb); break; } if (ap_pass_brigade(r->output_filters, bb) != APR_SUCCESS) { /* Ack! Phbtt! Die! User aborted! */ break; } apr_brigade_cleanup(bb); } } ap_flush_conn(remote); apr_socket_close(remote->client_socket); ap_log_error(APLOG_MARK, APLOG_DEBUG|APLOG_NOERRNO, 0, r->server, "proxy: FTP: Closing Data connection."); rc = ftp_getrc_msg(origin, cbb, buffer, sizeof(buffer)); ap_log_error(APLOG_MARK, APLOG_DEBUG|APLOG_NOERRNO, 0, r->server, "proxy: FTP: %d %s", rc, buffer); apr_brigade_cleanup(bb); ap_log_error(APLOG_MARK, APLOG_DEBUG|APLOG_NOERRNO, 0, r->server, "proxy: FTP: end body send"); /* * VII: Clean Up * ------------- * * If there are no KeepAlives, or if the connection has been signalled * to close, close the socket and clean up */ /* finish */ buf = apr_pstrcat(p, "QUIT", CRLF, NULL); e = apr_bucket_pool_create(buf, strlen(buf), p); APR_BRIGADE_INSERT_TAIL(bb, e); e = apr_bucket_flush_create(); APR_BRIGADE_INSERT_TAIL(bb, e); ap_pass_brigade(origin->output_filters, bb); ap_log_error(APLOG_MARK, APLOG_DEBUG|APLOG_NOERRNO, 0, r->server, "proxy: FTP: QUIT"); /* responses: 221, 500 */ /* 221 Service closing control connection. */ /* 500 Syntax error, command unrecognized. */ rc = ftp_getrc_msg(origin, cbb, buffer, sizeof(buffer)); ap_log_error(APLOG_MARK, APLOG_DEBUG|APLOG_NOERRNO, 0, r->server, "proxy: FTP: %d %s", rc, buffer); ap_flush_conn(origin); apr_socket_close(origin->client_socket); apr_brigade_destroy(bb); return OK; } static void ap_proxy_ftp_register_hook(apr_pool_t *p) { /* hooks */ proxy_hook_scheme_handler(ap_proxy_ftp_handler, NULL, NULL, APR_HOOK_MIDDLE); proxy_hook_canon_handler(ap_proxy_ftp_canon, NULL, NULL, APR_HOOK_MIDDLE); /* filters */ ap_register_output_filter("PROXY_SEND_DIR", ap_proxy_send_dir_filter, AP_FTYPE_CONTENT); } module AP_MODULE_DECLARE_DATA proxy_ftp_module = { STANDARD20_MODULE_STUFF, NULL, /* create per-directory config structure */ NULL, /* merge per-directory config structures */ NULL, /* create per-server config structure */ NULL, /* merge per-server config structures */ NULL, /* command apr_table_t */ ap_proxy_ftp_register_hook /* register hooks */ };