/*
* CDDL HEADER START
*
* The contents of this file are subject to the terms of the
* Common Development and Distribution License, Version 1.0 only
* (the "License"). You may not use this file except in compliance
* with the License.
*
* You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE
* or http://www.opensolaris.org/os/licensing.
* See the License for the specific language governing permissions
* and limitations under the License.
*
* When distributing Covered Code, include this CDDL HEADER in each
* file and include the License file at usr/src/OPENSOLARIS.LICENSE.
* If applicable, add the following below this CDDL HEADER, with the
* fields enclosed by brackets "[]" replaced with your own identifying
* information: Portions Copyright [yyyy] [name of copyright owner]
*
* CDDL HEADER END
*/
/*
* Copyright 2005 Sun Microsystems, Inc. All rights reserved.
* Use is subject to license terms.
*/
/* Copyright (c) 1984, 1986, 1987, 1988, 1989 AT&T */
/* All Rights Reserved */
#pragma ident "%Z%%M% %I% %E% SMI"
/*
* logs attempts by unknown remote machines to run uucico in FOREIGN
* ("/var/uucp/.Admin/Foreign"). if anything goes wrong,
* sends mail to login MAILTO ("uucp"). the executable should be
* placed in /usr/lib/uucp/remote.unknown, and should run setuid-uucp.
*/
#include <stdio.h>
#include <sys/types.h>
#include <time.h>
#include <errno.h>
#include "uucp.h"
#define FOREIGN "/var/uucp/.Admin/Foreign"
#define MAILTO "uucp"
#define LOGLEN 256
void fall_on_sword();
int
main(argc, argv)
int argc;
char *argv[];
{
char buf[LOGLEN], *ctoday, *logname, tmpbuf[MAXBASENAME+1];
FILE *fp;
time_t today;
extern char *ctime();
extern FILE *fopen();
if ( argc != 2 ) {
(void) fprintf(stderr, "USAGE: %s remotename\n", argv[0]);
exit(101);
}
if ( time(&today) != -1 ) {
ctoday = ctime(&today);
*(ctoday + strlen(ctoday) - 1) = '\0'; /* no ending \n */
} else
ctoday = "NO DATE";
logname = cuserid((char *) NULL);
(void) strncpy(tmpbuf, argv[1], MAXBASENAME);
tmpbuf[MAXBASENAME] = '\0';
(void) snprintf(buf, sizeof(buf), "%s: call from system %s login %s\n",
ctoday, tmpbuf, (logname == NULL ? "<unknown>" : logname));
errno = 0;
if ( (fp = fopen(FOREIGN, "a+")) == (FILE *)NULL )
fall_on_sword("cannot open", buf);
if ( fputs(buf, fp) == EOF )
fall_on_sword("cannot write", buf);
if ( fclose(fp) != 0 )
fall_on_sword("cannot close", buf);
return (0);
}
/* don't return from here */
void
fall_on_sword(errmsg, logmsg)
char *errmsg, *logmsg;
{
char ebuf[BUFSIZ+1];
int fds[2];
size_t sz;
(void) snprintf(ebuf, BUFSIZ,
"To: %s\nSubject: %s %s\n\n%s %s:\t%s (%d)\nlog msg:\t%s",
MAILTO, errmsg, FOREIGN, errmsg, FOREIGN,
strerror(errno), errno, logmsg);
sz = strlen(ebuf);
if (ebuf[sz-1] != '\n') {
ebuf[sz] = '\n';
ebuf[sz+1] = '\0';
}
/* reset to real uid. get a pipe. put error message on */
/* "write end" of pipe, close it. dup "read end" to */
/* stdin and then execl mail (which will read the error */
/* message we just wrote). */
if ( setuid(getuid()) == -1 || pipe(fds) != 0
|| write(fds[1], ebuf, strlen(ebuf)) != strlen(ebuf)
|| close(fds[1]) != 0 )
exit(errno);
if ( fds[0] != 0 ) {
close(0);
if ( dup(fds[0]) != 0 )
exit(errno);
}
execl("/usr/bin/mail", "mail", MAILTO, (char *) 0);
exit(errno); /* shouldn't get here */
}