2013-09-06 04:01:55 +02:00
|
|
|
/*
|
2013-09-06 04:42:52 +02:00
|
|
|
Fiche - Command line pastebin for sharing terminal output.
|
|
|
|
|
|
|
|
|
|
-------------------------------------------------------------------------------
|
|
|
|
|
|
|
|
|
|
License: MIT (http://www.opensource.org/licenses/mit-license.php)
|
|
|
|
|
Repository: https://github.com/solusipse/fiche/
|
|
|
|
|
Live example: http://code.solusipse.net/
|
|
|
|
|
|
|
|
|
|
-------------------------------------------------------------------------------
|
|
|
|
|
|
2013-09-14 00:29:00 +02:00
|
|
|
usage: fiche [-pbsdolBuw].
|
2013-09-13 23:51:58 +02:00
|
|
|
[-d domain] [-p port] [-s slug size]
|
|
|
|
|
[-o output directory] [-B buffer size] [-u user name]
|
|
|
|
|
[-l log file] [-b banlist] [-w whitelist]
|
2013-09-06 04:42:52 +02:00
|
|
|
|
|
|
|
|
Compile with Makefile or manually with -O2 and -pthread flags.
|
|
|
|
|
To install use `make install` command.
|
|
|
|
|
|
|
|
|
|
Use netcat to push text - example:
|
|
|
|
|
|
|
|
|
|
$ cat fiche.c | nc localhost 9999
|
|
|
|
|
|
|
|
|
|
-------------------------------------------------------------------------------
|
2013-09-06 04:01:55 +02:00
|
|
|
*/
|
|
|
|
|
|
|
|
|
|
#include "fiche.h"
|
|
|
|
|
|
|
|
|
|
int main(int argc, char **argv)
|
|
|
|
|
{
|
2013-09-06 05:03:11 +02:00
|
|
|
time_seed = time(0);
|
2013-09-06 04:01:55 +02:00
|
|
|
|
|
|
|
|
parse_parameters(argc, argv);
|
2013-09-06 14:40:09 +02:00
|
|
|
if (BASEDIR == NULL)
|
|
|
|
|
set_basedir();
|
|
|
|
|
|
2013-09-06 04:01:55 +02:00
|
|
|
startup_message();
|
|
|
|
|
|
|
|
|
|
int listen_socket, address_lenght, optval = 1;
|
|
|
|
|
struct sockaddr_in server_address;
|
|
|
|
|
|
|
|
|
|
listen_socket = create_socket();
|
|
|
|
|
setsockopt(listen_socket, SOL_SOCKET, SO_REUSEADDR, (const void *)&optval , sizeof(int));
|
|
|
|
|
|
|
|
|
|
server_address = set_address(server_address);
|
|
|
|
|
bind_to_port(listen_socket, server_address);
|
|
|
|
|
|
|
|
|
|
while (1) perform_connection(listen_socket);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
void *thread_connection(void *args)
|
|
|
|
|
{
|
2013-09-09 03:47:25 +02:00
|
|
|
int connection_socket = ((struct thread_arguments *) args ) -> connection_socket;
|
|
|
|
|
struct sockaddr_in client_address = ((struct thread_arguments *) args ) -> client_address;
|
|
|
|
|
|
2013-09-10 10:30:49 +02:00
|
|
|
struct client_data data = get_client_address(client_address);
|
|
|
|
|
|
2013-09-09 03:47:25 +02:00
|
|
|
int n;
|
2013-09-06 04:01:55 +02:00
|
|
|
char buffer[BUFSIZE];
|
|
|
|
|
bzero(buffer, BUFSIZE);
|
2013-09-13 20:28:01 +02:00
|
|
|
int status = recv(connection_socket, buffer, BUFSIZE, MSG_WAITALL);
|
2013-09-06 04:01:55 +02:00
|
|
|
|
2013-09-14 00:17:26 +02:00
|
|
|
if (WHITELIST != NULL)
|
|
|
|
|
if (check_whitelist(data.ip_address) == NULL)
|
|
|
|
|
{
|
|
|
|
|
printf("Rejected connection from unknown user.\n");
|
|
|
|
|
display_line();
|
|
|
|
|
save_log(NULL, data.ip_address, data.hostname);
|
|
|
|
|
write(connection_socket, "You are not whitelisted!\n", 17);
|
|
|
|
|
close(connection_socket);
|
|
|
|
|
pthread_exit(NULL);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if ((BANLIST != NULL))
|
2013-09-10 10:30:49 +02:00
|
|
|
if (check_banlist(data.ip_address) != NULL)
|
|
|
|
|
{
|
|
|
|
|
printf("Rejected connection from banned user.\n");
|
|
|
|
|
display_line();
|
|
|
|
|
save_log(NULL, data.ip_address, data.hostname);
|
|
|
|
|
write(connection_socket, "You are banned!\n", 17);
|
|
|
|
|
close(connection_socket);
|
|
|
|
|
pthread_exit(NULL);
|
|
|
|
|
}
|
|
|
|
|
|
2013-09-06 04:01:55 +02:00
|
|
|
if (status != -1)
|
|
|
|
|
{
|
|
|
|
|
char slug[SLUG_SIZE];
|
|
|
|
|
generate_url(buffer, slug);
|
2013-09-10 10:30:49 +02:00
|
|
|
save_log(slug, data.ip_address, data.hostname);
|
2013-09-06 04:01:55 +02:00
|
|
|
char response[strlen(slug) + strlen(DOMAIN) + 2];
|
2013-09-10 10:30:49 +02:00
|
|
|
snprintf(response, sizeof response, "%s%s\n", DOMAIN, slug);
|
2013-09-09 03:47:25 +02:00
|
|
|
write(connection_socket, response, strlen(response));
|
2013-09-06 04:01:55 +02:00
|
|
|
}
|
|
|
|
|
else
|
|
|
|
|
{
|
|
|
|
|
printf("Invalid connection.\n");
|
2013-09-10 10:30:49 +02:00
|
|
|
display_line();
|
|
|
|
|
save_log(NULL, data.ip_address, data.hostname);
|
2013-09-09 03:47:25 +02:00
|
|
|
write(connection_socket, "Use netcat.\n", 13);
|
2013-09-06 04:01:55 +02:00
|
|
|
}
|
2013-09-10 10:30:49 +02:00
|
|
|
|
2013-09-09 03:47:25 +02:00
|
|
|
close(connection_socket);
|
2013-09-06 04:01:55 +02:00
|
|
|
pthread_exit(NULL);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
void perform_connection(int listen_socket)
|
|
|
|
|
{
|
|
|
|
|
void *status = 0;
|
|
|
|
|
pthread_t thread_id;
|
|
|
|
|
struct sockaddr_in client_address;
|
|
|
|
|
|
|
|
|
|
int address_lenght = sizeof(client_address);
|
2013-09-09 03:47:25 +02:00
|
|
|
int connection_socket = accept(listen_socket, (struct sockaddr *) &client_address, (void *) &address_lenght);
|
2013-09-06 04:01:55 +02:00
|
|
|
|
2013-09-09 03:47:25 +02:00
|
|
|
struct timeval timeout;
|
2013-09-13 20:28:01 +02:00
|
|
|
timeout.tv_sec = 120;
|
2013-09-06 04:01:55 +02:00
|
|
|
timeout.tv_usec = 0;
|
|
|
|
|
|
|
|
|
|
if (setsockopt (connection_socket, SOL_SOCKET, SO_RCVTIMEO, (char *)&timeout, sizeof(timeout)) < 0)
|
|
|
|
|
error();
|
|
|
|
|
if (setsockopt (connection_socket, SOL_SOCKET, SO_SNDTIMEO, (char *)&timeout, sizeof(timeout)) < 0)
|
|
|
|
|
error();
|
|
|
|
|
|
2013-09-09 03:47:25 +02:00
|
|
|
struct thread_arguments arguments;
|
|
|
|
|
arguments.connection_socket = connection_socket;
|
|
|
|
|
arguments.client_address = client_address;
|
2013-09-06 04:01:55 +02:00
|
|
|
|
2013-09-09 03:47:25 +02:00
|
|
|
if (pthread_create(&thread_id, NULL, &thread_connection, &arguments) != 0)
|
2013-09-06 04:01:55 +02:00
|
|
|
error();
|
|
|
|
|
else
|
|
|
|
|
pthread_detach(thread_id);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
void display_date()
|
2013-09-10 10:30:49 +02:00
|
|
|
{
|
|
|
|
|
printf("%s", get_date());
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
char *get_date()
|
2013-09-06 04:01:55 +02:00
|
|
|
{
|
|
|
|
|
time_t rawtime;
|
|
|
|
|
struct tm *timeinfo;
|
|
|
|
|
|
|
|
|
|
time(&rawtime);
|
|
|
|
|
timeinfo = localtime(&rawtime);
|
2013-09-10 10:30:49 +02:00
|
|
|
|
|
|
|
|
return asctime(timeinfo);
|
2013-09-06 04:01:55 +02:00
|
|
|
}
|
|
|
|
|
|
2013-09-10 10:30:49 +02:00
|
|
|
struct client_data get_client_address(struct sockaddr_in client_address)
|
2013-09-06 04:01:55 +02:00
|
|
|
{
|
|
|
|
|
struct hostent *hostp;
|
2013-09-10 10:30:49 +02:00
|
|
|
struct client_data data;
|
2013-09-06 04:01:55 +02:00
|
|
|
char *hostaddrp;
|
|
|
|
|
|
|
|
|
|
hostp = gethostbyaddr((const char *)&client_address.sin_addr.s_addr, sizeof(client_address.sin_addr.s_addr), AF_INET);
|
|
|
|
|
if (hostp == NULL) error();
|
|
|
|
|
|
|
|
|
|
hostaddrp = inet_ntoa(client_address.sin_addr);
|
|
|
|
|
if (hostaddrp == NULL) error();
|
|
|
|
|
|
|
|
|
|
display_date();
|
|
|
|
|
printf("Client: %s (%s)\n", hostaddrp, hostp->h_name);
|
2013-09-09 21:02:33 +02:00
|
|
|
|
2013-09-10 10:30:49 +02:00
|
|
|
data.ip_address = hostaddrp;
|
|
|
|
|
data.hostname = hostp->h_name;
|
|
|
|
|
|
|
|
|
|
return data;
|
2013-09-09 21:02:33 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
void save_log(char *slug, char *hostaddrp, char *h_name)
|
|
|
|
|
{
|
2013-09-10 10:30:49 +02:00
|
|
|
if (LOG != NULL)
|
|
|
|
|
{
|
|
|
|
|
char contents[256];
|
2013-09-09 21:02:33 +02:00
|
|
|
|
2013-09-10 10:30:49 +02:00
|
|
|
if (slug != NULL)
|
|
|
|
|
snprintf(contents, sizeof contents, "\n%s%s|%s|%s%s", get_date(), slug, hostaddrp, h_name, return_line());
|
|
|
|
|
else
|
|
|
|
|
snprintf(contents, sizeof contents, "\n%s%s|%s|%s%s", get_date(), "rejected", hostaddrp, h_name, return_line());
|
2013-09-09 21:02:33 +02:00
|
|
|
|
2013-09-10 10:30:49 +02:00
|
|
|
FILE *fp;
|
|
|
|
|
fp = fopen(LOG, "a");
|
|
|
|
|
fprintf(fp, "%s", contents);
|
|
|
|
|
fclose(fp);
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
char *check_banlist(char *ip_address)
|
|
|
|
|
{
|
2013-09-14 00:17:26 +02:00
|
|
|
load_list(BANFILE, 0);
|
2013-09-10 10:30:49 +02:00
|
|
|
return strstr(BANLIST, ip_address);
|
|
|
|
|
}
|
|
|
|
|
|
2013-09-14 00:17:26 +02:00
|
|
|
char *check_whitelist(char *ip_address)
|
|
|
|
|
{
|
|
|
|
|
load_list(WHITEFILE, 1);
|
|
|
|
|
return strstr(WHITELIST, ip_address);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
void load_list(char *file_path, int type)
|
2013-09-10 10:30:49 +02:00
|
|
|
{
|
|
|
|
|
FILE *fp = fopen(file_path, "r");
|
|
|
|
|
fseek(fp, 0, SEEK_END);
|
|
|
|
|
long fsize = ftell(fp);
|
|
|
|
|
fseek(fp, 0, SEEK_SET);
|
|
|
|
|
|
|
|
|
|
char *buffer = malloc(fsize + 1);
|
|
|
|
|
fread(buffer, fsize, 1, fp);
|
2013-09-09 21:02:33 +02:00
|
|
|
fclose(fp);
|
2013-09-10 10:30:49 +02:00
|
|
|
|
|
|
|
|
buffer[fsize] = 0;
|
2013-09-14 00:17:26 +02:00
|
|
|
|
|
|
|
|
if (type == 0)
|
|
|
|
|
BANLIST = buffer;
|
|
|
|
|
else
|
|
|
|
|
WHITELIST = buffer;
|
2013-09-10 10:30:49 +02:00
|
|
|
|
|
|
|
|
free(buffer);
|
2013-09-06 04:01:55 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
int create_socket()
|
|
|
|
|
{
|
|
|
|
|
int lsocket = socket(AF_INET, SOCK_STREAM, 0);
|
|
|
|
|
if (lsocket < 0)
|
|
|
|
|
error();
|
|
|
|
|
else return lsocket;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
struct sockaddr_in set_address(struct sockaddr_in server_address)
|
|
|
|
|
{
|
|
|
|
|
bzero((char *) &server_address, sizeof(server_address));
|
|
|
|
|
server_address.sin_family = AF_INET;
|
|
|
|
|
server_address.sin_addr.s_addr = htonl(INADDR_ANY);
|
|
|
|
|
server_address.sin_port = htons((unsigned short)PORT);
|
|
|
|
|
return server_address;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
void bind_to_port(int listen_socket, struct sockaddr_in server_address)
|
|
|
|
|
{
|
|
|
|
|
if (bind(listen_socket, (struct sockaddr *) &server_address, sizeof(server_address)) < 0)
|
|
|
|
|
error();
|
|
|
|
|
if (listen(listen_socket, QUEUE_SIZE) < 0)
|
|
|
|
|
error();
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
void generate_url(char *buffer, char *slug)
|
|
|
|
|
{
|
2013-09-06 05:03:11 +02:00
|
|
|
int i;
|
2013-09-06 04:01:55 +02:00
|
|
|
memset(slug, '\0', sizeof(slug));
|
|
|
|
|
|
|
|
|
|
for (i = 0; i <= SLUG_SIZE - 1; i++)
|
|
|
|
|
{
|
|
|
|
|
int symbol_id = rand_r(&time_seed) % strlen(symbols);
|
|
|
|
|
slug[i] = symbols[symbol_id];
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
while (create_directory(slug) == -1)
|
|
|
|
|
{
|
2013-09-06 04:42:52 +02:00
|
|
|
int symbol_id = rand_r(&time_seed) % strlen(symbols);
|
2013-09-06 04:01:55 +02:00
|
|
|
slug[strlen(slug)] = symbols[symbol_id];
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
save_to_file(slug, buffer);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
int create_directory(char *slug)
|
|
|
|
|
{
|
2013-09-06 04:42:52 +02:00
|
|
|
char *directory = malloc(strlen(BASEDIR) + strlen(slug));
|
2013-09-06 04:01:55 +02:00
|
|
|
|
|
|
|
|
strcpy(directory, BASEDIR);
|
|
|
|
|
strcat(directory, slug);
|
|
|
|
|
|
2013-09-06 14:08:50 +02:00
|
|
|
mkdir(BASEDIR, S_IRWXU | S_IRGRP | S_IROTH | S_IXOTH | S_IXGRP);
|
|
|
|
|
int result = mkdir(directory, S_IRWXU | S_IRGRP | S_IROTH | S_IXOTH | S_IXGRP);
|
2013-09-06 04:01:55 +02:00
|
|
|
|
2013-09-13 23:51:58 +02:00
|
|
|
change_owner(directory);
|
|
|
|
|
|
2013-09-06 04:01:55 +02:00
|
|
|
free(directory);
|
|
|
|
|
|
|
|
|
|
return result;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
void save_to_file(char *slug, char *buffer)
|
|
|
|
|
{
|
2013-09-13 22:16:05 +02:00
|
|
|
char *directory = malloc(strlen(BASEDIR) + strlen(slug) + strlen("/index.txt"));
|
2013-09-06 04:01:55 +02:00
|
|
|
strcpy(directory, BASEDIR);
|
|
|
|
|
strcat(directory, slug);
|
2013-09-13 22:16:05 +02:00
|
|
|
strcat(directory, "/index.txt");
|
2013-09-06 04:01:55 +02:00
|
|
|
|
|
|
|
|
FILE *fp;
|
|
|
|
|
fp = fopen(directory, "w");
|
|
|
|
|
fprintf(fp, "%s", buffer);
|
|
|
|
|
fclose(fp);
|
|
|
|
|
|
2013-09-13 23:51:58 +02:00
|
|
|
change_owner(directory);
|
|
|
|
|
|
2013-09-06 04:01:55 +02:00
|
|
|
printf("Saved to: %s\n", directory);
|
2013-09-10 10:30:49 +02:00
|
|
|
display_line();
|
2013-09-06 04:01:55 +02:00
|
|
|
free(directory);
|
|
|
|
|
}
|
|
|
|
|
|
2013-09-13 23:51:58 +02:00
|
|
|
void change_owner(char *directory)
|
|
|
|
|
{
|
|
|
|
|
if ((UID != -1)&&(GID != -1))
|
|
|
|
|
chown(directory, UID, GID);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
void set_uid_gid(char *username)
|
|
|
|
|
{
|
|
|
|
|
struct passwd *userdata = getpwnam(username);
|
|
|
|
|
if (userdata == NULL)
|
|
|
|
|
error();
|
|
|
|
|
|
|
|
|
|
UID = userdata->pw_uid;
|
|
|
|
|
GID = userdata->pw_gid;
|
|
|
|
|
}
|
|
|
|
|
|
2013-09-06 04:01:55 +02:00
|
|
|
void set_basedir()
|
|
|
|
|
{
|
|
|
|
|
BASEDIR = getenv("HOME");
|
|
|
|
|
strcat(BASEDIR, "/code/");
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
void startup_message()
|
|
|
|
|
{
|
2013-09-10 10:30:49 +02:00
|
|
|
display_line();
|
2013-09-06 04:01:55 +02:00
|
|
|
printf("Domain name: %s\n", DOMAIN);
|
|
|
|
|
printf("Saving files to: %s\n", BASEDIR);
|
2013-09-09 21:02:33 +02:00
|
|
|
printf("Fiche started listening on port %d.\n", PORT);
|
2013-09-10 10:30:49 +02:00
|
|
|
display_line();
|
2013-09-06 04:01:55 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
void parse_parameters(int argc, char **argv)
|
|
|
|
|
{
|
|
|
|
|
int c;
|
|
|
|
|
|
2013-09-13 23:51:58 +02:00
|
|
|
while ((c = getopt (argc, argv, "p:b:s:d:o:l:B:u:w:")) != -1)
|
2013-09-06 04:01:55 +02:00
|
|
|
switch (c)
|
|
|
|
|
{
|
|
|
|
|
case 'd':
|
|
|
|
|
snprintf(DOMAIN, sizeof DOMAIN, "%s%s%s", "http://", optarg, "/");
|
|
|
|
|
break;
|
|
|
|
|
case 'p':
|
|
|
|
|
PORT = atoi(optarg);
|
|
|
|
|
break;
|
2013-09-10 10:30:49 +02:00
|
|
|
case 'B':
|
2013-09-06 04:01:55 +02:00
|
|
|
BUFSIZE = atoi(optarg);
|
|
|
|
|
printf("Buffer size set to: %d.\n", BUFSIZE);
|
|
|
|
|
break;
|
2013-09-10 10:30:49 +02:00
|
|
|
case 'b':
|
|
|
|
|
BANFILE = optarg;
|
2013-09-14 00:17:26 +02:00
|
|
|
load_list(BANFILE, 0);
|
2013-09-10 10:30:49 +02:00
|
|
|
break;
|
2013-09-06 04:01:55 +02:00
|
|
|
case 's':
|
|
|
|
|
SLUG_SIZE = atoi(optarg);
|
|
|
|
|
printf("Slug size set to: %d.\n", SLUG_SIZE);
|
|
|
|
|
break;
|
|
|
|
|
case 'o':
|
|
|
|
|
BASEDIR = optarg;
|
|
|
|
|
if((BASEDIR[strlen(BASEDIR) - 1]) != '/')
|
|
|
|
|
strcat(BASEDIR, "/");
|
|
|
|
|
break;
|
2013-09-09 21:02:33 +02:00
|
|
|
case 'l':
|
|
|
|
|
LOG = optarg;
|
|
|
|
|
printf("Log file: %s\n", LOG);
|
|
|
|
|
break;
|
2013-09-13 23:51:58 +02:00
|
|
|
case 'u':
|
|
|
|
|
set_uid_gid(optarg);
|
|
|
|
|
break;
|
|
|
|
|
case 'w':
|
2013-09-14 00:17:26 +02:00
|
|
|
WHITEFILE = optarg;
|
|
|
|
|
load_list(WHITEFILE, 1);
|
2013-09-13 23:51:58 +02:00
|
|
|
break;
|
2013-09-06 04:01:55 +02:00
|
|
|
default:
|
2013-09-14 00:29:00 +02:00
|
|
|
printf("usage: fiche [-pbsdolBuw].\n");
|
2013-09-09 21:02:33 +02:00
|
|
|
printf(" [-d domain] [-p port] [-s slug_size]\n");
|
2013-09-13 23:51:58 +02:00
|
|
|
printf(" [-o output directory] [-B buffer_size] [-u user name]\n");
|
|
|
|
|
printf(" [-l log file] [-b banlist] [-w whitelist]\n");
|
2013-09-06 04:01:55 +02:00
|
|
|
exit(1);
|
|
|
|
|
}
|
|
|
|
|
}
|