b151ef55 |
/* |
a2779ebb |
* Copyright (C) 2002 - 2006 Tomasz Kojm <tkojm@clamav.net> |
b151ef55 |
* HTTP/1.1 compliance by Arkadiusz Miskiewicz <misiek@pld.org.pl>
* Proxy support by Nigel Horne <njh@bandsman.co.uk>
* Proxy authorization support by Gernot Tenchio <g.tenchio@telco-tech.de>
* (uses fmt_base64() from libowfat (http://www.fefe.de))
*
* This program is free software; you can redistribute it and/or modify
* it under the terms of the GNU General Public License as published by
* the Free Software Foundation; either version 2 of the License, or
* (at your option) any later version.
*
* This program is distributed in the hope that it will be useful,
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
* GNU General Public License for more details.
*
* You should have received a copy of the GNU General Public License
* along with this program; if not, write to the Free Software |
30738099 |
* Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston,
* MA 02110-1301, USA. |
b151ef55 |
*/
|
8b242bb9 |
#if HAVE_CONFIG_H
#include "clamav-config.h"
#endif
|
b151ef55 |
#include <stdio.h>
#include <stdlib.h>
#include <unistd.h>
#include <string.h>
#include <ctype.h>
#include <netinet/in.h>
#include <netdb.h>
#include <sys/types.h>
#include <sys/socket.h>
#include <sys/time.h>
#include <time.h>
#include <fcntl.h>
#include <sys/stat.h>
#include <clamav.h> |
0539b2a8 |
#include <errno.h> |
b151ef55 |
#include "defaults.h"
#include "manager.h"
#include "notify.h" |
881069d7 |
#include "dns.h" |
236b30a3 |
#include "execute.h" |
a0b09ab7 |
#include "nonblock.h" |
236b30a3 |
|
a2779ebb |
#include "shared/options.h"
#include "shared/cfgparser.h"
#include "shared/output.h"
#include "shared/misc.h"
#include "shared/memory.h"
#include "shared/cdiff.h" |
881069d7 |
|
a2779ebb |
#include "libclamav/others.h"
#include "libclamav/str.h"
#include "libclamav/cvd.h" |
b151ef55 |
|
a2779ebb |
#ifndef O_BINARY
#define O_BINARY 0 |
442d8407 |
#endif
|
a0b09ab7 |
static int wwwconnect(const char *server, const char *proxy, int pport, char *ip, const char *localip, int ctimeout) |
b151ef55 |
{ |
f58ad3be |
int socketfd = -1, port, i; |
b151ef55 |
struct sockaddr_in name;
struct hostent *host; |
8b1cee14 |
char ipaddr[16]; |
4be012e9 |
unsigned char *ia; |
b151ef55 |
const char *hostpt; |
0539b2a8 |
struct hostent *he = NULL; |
b151ef55 |
|
4be012e9 |
if(ip)
strcpy(ip, "???");
|
b151ef55 |
name.sin_family = AF_INET;
|
22e30fac |
#ifdef PF_INET
socketfd = socket(PF_INET, SOCK_STREAM, 0);
#else
socketfd = socket(AF_INET, SOCK_STREAM, 0);
#endif
if(socketfd < 0) {
logg("!Can't create new socket\n");
return -1;
}
|
a2779ebb |
if(localip) {
if((he = gethostbyname(localip)) == NULL) { |
0539b2a8 |
char *herr;
switch(h_errno) {
case HOST_NOT_FOUND:
herr = "Host not found";
break;
case NO_DATA:
herr = "No IP address";
break;
case NO_RECOVERY:
herr = "Unrecoverable DNS error";
break;
case TRY_AGAIN:
herr = "Temporary DNS error";
break;
default:
herr = "Unknown error";
break;
} |
f1c4563e |
logg("!Could not resolve local ip address '%s': %s\n", localip, herr);
logg("^Using standard local ip address and port for fetching.\n"); |
0539b2a8 |
} else {
struct sockaddr_in client;
memset ((char *) &client, 0, sizeof(struct sockaddr_in));
client.sin_family = AF_INET;
client.sin_addr = *(struct in_addr *) he->h_addr_list[0];
if (bind(socketfd, (struct sockaddr *) &client, sizeof(struct sockaddr_in)) != 0) { |
f1c4563e |
logg("!Could not bind to local ip address '%s': %s\n", localip, strerror(errno));
logg("^Using default client ip.\n"); |
0539b2a8 |
} else {
ia = (unsigned char *) he->h_addr_list[0];
sprintf(ipaddr, "%u.%u.%u.%u", ia[0], ia[1], ia[2], ia[3]); |
f1c4563e |
logg("*Using ip '%s' for fetching.\n", ipaddr); |
0539b2a8 |
}
}
} |
b151ef55 |
if(proxy) { |
0d98d74c |
hostpt = proxy;
if(!(port = pport)) { |
b151ef55 |
#ifndef C_CYGWIN
const struct servent *webcache = getservbyname("webcache", "TCP");
if(webcache)
port = ntohs(webcache->s_port);
else
port = 8080;
endservent();
#else
port = 8080;
#endif
} |
0d98d74c |
|
b151ef55 |
} else {
hostpt = server;
port = 80;
}
if((host = gethostbyname(hostpt)) == NULL) { |
0539b2a8 |
char *herr;
switch(h_errno) {
case HOST_NOT_FOUND:
herr = "Host not found";
break;
case NO_DATA:
herr = "No IP address";
break;
case NO_RECOVERY:
herr = "Unrecoverable DNS error";
break;
case TRY_AGAIN:
herr = "Temporary DNS error";
break;
default:
herr = "Unknown error";
break;
} |
f1c4563e |
logg("^Can't get information about %s: %s\n", hostpt, herr); |
22e30fac |
close(socketfd); |
b151ef55 |
return -1;
}
|
ad8e29f9 |
for(i = 0; host->h_addr_list[i] != 0; i++) {
/* this dirty hack comes from pink - Nosuid TCP/IP ping 1.6 */
ia = (unsigned char *) host->h_addr_list[i];
sprintf(ipaddr, "%u.%u.%u.%u", ia[0], ia[1], ia[2], ia[3]); |
4be012e9 |
|
ad8e29f9 |
if(ip)
strcpy(ip, ipaddr);
if(i > 0) |
f1c4563e |
logg("Trying host %s (%s)...\n", hostpt, ipaddr); |
4be012e9 |
|
ad8e29f9 |
name.sin_addr = *((struct in_addr *) host->h_addr_list[i]);
name.sin_port = htons(port);
|
1fb1cce8 |
#ifdef SO_ERROR |
a0b09ab7 |
if(wait_connect(socketfd, (struct sockaddr *) &name, sizeof(struct sockaddr_in), ctimeout) == -1) { |
1fb1cce8 |
#else
if(connect(socketfd, (struct sockaddr *) &name, sizeof(struct sockaddr_in)) == -1) {
#endif |
f1c4563e |
logg("Can't connect to port %d of host %s (IP: %s)\n", port, hostpt, ipaddr); |
ad8e29f9 |
continue; |
fe811f69 |
} else {
return socketfd; |
ad8e29f9 |
} |
b151ef55 |
}
|
fe811f69 |
close(socketfd); |
ad8e29f9 |
return -2; |
b151ef55 |
}
|
b0674c6e |
static int Rfc2822DateTime(char *buf, time_t mtime) |
66c64a38 |
{
struct tm *time;
time = gmtime(&mtime);
return strftime(buf, 36, "%a, %d %b %Y %X GMT", time);
}
|
a2779ebb |
static unsigned int fmt_base64(char *dest, const char *src, unsigned int len) |
b151ef55 |
{ |
a2779ebb |
unsigned short bits = 0,temp = 0;
unsigned long written = 0;
unsigned int i;
const char base64[]="ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789+/=";
for(i = 0; i < len; i++) {
temp <<= 8;
temp += src[i];
bits += 8;
while(bits > 6) {
dest[written] = base64[((temp >> (bits - 6)) & 63)];
written++;
bits -= 6;
}
}
if(bits) {
temp <<= (6 - bits);
dest[written] = base64[temp & 63];
written++;
}
while(written & 3) {
dest[written] = '=';
written++;
}
return written;
}
static char *proxyauth(const char *user, const char *pass)
{
int len;
char *buf, *userpass, *auth;
userpass = mmalloc(strlen(user) + strlen(pass) + 2);
if(!userpass) {
logg("!proxyauth: Can't allocate memory for 'userpass'\n");
return NULL;
}
sprintf(userpass, "%s:%s", user, pass);
buf = mmalloc((strlen(pass) + strlen(user)) * 2 + 4);
if(!buf) {
logg("!proxyauth: Can't allocate memory for 'buf'\n");
free(userpass);
return NULL;
}
len = fmt_base64(buf, userpass, strlen(userpass));
free(userpass);
buf[len] = '\0';
auth = mmalloc(strlen(buf) + 30);
if(!auth) {
logg("!proxyauth: Can't allocate memory for 'authorization'\n");
return NULL;
}
sprintf(auth, "Proxy-Authorization: Basic %s\r\n", buf);
free(buf);
return auth;
}
|
a0b09ab7 |
static struct cl_cvd *remote_cvdhead(const char *file, const char *hostname, char *ip, const char *localip, const char *proxy, int port, const char *user, const char *pass, const char *uas, int *ims, int ctimeout, int rtimeout) |
a2779ebb |
{
char cmd[512], head[513], buffer[FILEBUFF], ipaddr[16], *ch, *tmp;
int bread, cnt, sd;
unsigned int i, j; |
b151ef55 |
char *remotename = NULL, *authorization = NULL; |
db7875bc |
const char *agent; |
442d8407 |
struct cl_cvd *cvd; |
66c64a38 |
char last_modified[36];
struct stat sb;
|
b151ef55 |
if(proxy) {
remotename = mmalloc(strlen(hostname) + 8); |
a2779ebb |
if(!remotename) {
logg("!remote_cvdhead: Can't allocate memory for 'remotename'\n");
return NULL;
} |
b151ef55 |
sprintf(remotename, "http://%s", hostname);
|
a2779ebb |
if(user) {
authorization = proxyauth(user, pass);
if(!authorization)
return NULL;
} |
b151ef55 |
}
|
b9194b42 |
if(stat(file, &sb) != -1 && sb.st_mtime < time(NULL)) { |
66c64a38 |
Rfc2822DateTime(last_modified, sb.st_mtime);
} else {
time_t mtime = 1104119530; |
a2779ebb |
|
66c64a38 |
Rfc2822DateTime(last_modified, mtime); |
f1c4563e |
logg("*Assuming modification time in the past\n"); |
66c64a38 |
} |
b151ef55 |
|
f1c4563e |
logg("*If-Modified-Since: %s\n", last_modified); |
66c64a38 |
|
f1c4563e |
logg("Reading CVD header (%s): ", file); |
db7875bc |
if(uas)
agent = uas;
else
agent = PACKAGE"/"VERSION;
|
a2779ebb |
snprintf(cmd, sizeof(cmd),
"GET %s/%s HTTP/1.1\r\n" |
35ea9b81 |
"Host: %s\r\n%s" |
db7875bc |
"User-Agent: %s\r\n" |
35ea9b81 |
"Connection: close\r\n"
"Range: bytes=0-511\r\n" |
66c64a38 |
"If-Modified-Since: %s\r\n" |
a2779ebb |
"\r\n", (remotename != NULL) ? remotename : "", file, hostname, (authorization != NULL) ? authorization : "", agent, last_modified); |
b151ef55 |
free(remotename);
free(authorization);
|
a2779ebb |
memset(ipaddr, 0, sizeof(ipaddr));
if(ip[0]) /* use ip to connect */ |
a0b09ab7 |
sd = wwwconnect(ip, proxy, port, ipaddr, localip, ctimeout); |
a2779ebb |
else |
a0b09ab7 |
sd = wwwconnect(hostname, proxy, port, ipaddr, localip, ctimeout); |
a2779ebb |
if(sd < 0) {
return NULL;
} else {
logg("*Connected to %s (IP: %s).\n", hostname, ipaddr);
logg("*Trying to retrieve CVD header of http://%s/%s\n", hostname, file);
}
if(!ip[0])
strcpy(ip, ipaddr);
if(write(sd, cmd, strlen(cmd)) < 0) {
logg("!remote_cvdhead: write failed\n");
close(sd);
return NULL;
}
|
b151ef55 |
tmp = buffer; |
7b7b3ca5 |
cnt = FILEBUFF; |
1fb1cce8 |
#ifdef SO_ERROR |
a0b09ab7 |
while((bread = wait_recv(sd, tmp, cnt, 0, rtimeout)) > 0) { |
1fb1cce8 |
#else
while((bread = recv(sd, tmp, cnt, 0)) > 0) {
#endif |
a2779ebb |
tmp += bread;
cnt -= bread;
if(cnt <= 0)
break; |
b151ef55 |
} |
a2779ebb |
close(sd); |
b151ef55 |
if(bread == -1) { |
a2779ebb |
logg("!remote_cvdhead: Error while reading CVD header from %s\n", hostname); |
b151ef55 |
return NULL;
}
|
20535d8a |
if((strstr(buffer, "HTTP/1.1 404")) != NULL || (strstr(buffer, "HTTP/1.0 404")) != NULL) { |
a2779ebb |
logg("!CVD file not found on remote server\n"); |
66c64a38 |
return NULL;
}
/* check whether the resource is up-to-date */ |
20535d8a |
if((strstr(buffer, "HTTP/1.1 304")) != NULL || (strstr(buffer, "HTTP/1.0 304")) != NULL) { |
66c64a38 |
*ims = 0; |
f1c4563e |
logg("OK (IMS)\n"); |
66c64a38 |
return NULL;
} else {
*ims = 1; |
b151ef55 |
}
|
bfdd343f |
if(!strstr(buffer, "HTTP/1.1 200") && !strstr(buffer, "HTTP/1.0 200") &&
!strstr(buffer, "HTTP/1.1 206") && !strstr(buffer, "HTTP/1.0 206")) {
logg("!Unknown response from remote server\n");
return NULL;
}
|
b5caad64 |
i = 3;
ch = buffer + i;
while(i < sizeof(buffer)) { |
a2779ebb |
if (*ch == '\n' && *(ch - 1) == '\r' && *(ch - 2) == '\n' && *(ch - 3) == '\r') {
ch++;
i++;
break;
} |
b151ef55 |
ch++;
i++; |
b5caad64 |
}
if(sizeof(buffer) - i < 512) { |
a2779ebb |
logg("!remote_cvdhead: Malformed CVD header (too short)\n"); |
b5caad64 |
return NULL;
} |
b151ef55 |
|
442d8407 |
memset(head, 0, sizeof(head));
|
a2779ebb |
for(j = 0; j < 512; j++) {
if(!ch || (ch && !*ch) || (ch && !isprint(ch[j]))) {
logg("!remote_cvdhead: Malformed CVD header (bad chars)\n");
return NULL;
}
head[j] = ch[j]; |
b151ef55 |
}
|
a2779ebb |
if(!(cvd = cl_cvdparse(head)))
logg("!Malformed CVD header (can't parser)\n"); |
442d8407 |
else |
f1c4563e |
logg("OK\n"); |
442d8407 |
return cvd; |
b151ef55 |
}
|
a0b09ab7 |
static int getfile(const char *srcfile, const char *destfile, const char *hostname, char *ip, const char *localip, const char *proxy, int port, const char *user, const char *pass, const char *uas, int ctimeout, int rtimeout) |
b151ef55 |
{ |
0d98d74c |
char cmd[512], buffer[FILEBUFF], *ch; |
a2779ebb |
int bread, fd, totalsize = 0, rot = 0, totaldownloaded = 0,
percentage = 0, sd;
unsigned int i;
char *remotename = NULL, *authorization = NULL, *headerline, ipaddr[16];
const char *rotation = "|/-\\", *agent; |
b151ef55 |
if(proxy) {
remotename = mmalloc(strlen(hostname) + 8); |
a2779ebb |
if(!remotename) {
logg("!getfile: Can't allocate memory for 'remotename'\n");
return 75; /* FIXME */
} |
b151ef55 |
sprintf(remotename, "http://%s", hostname);
|
a2779ebb |
if(user) {
authorization = proxyauth(user, pass);
if(!authorization)
return 75; /* FIXME */
} |
b151ef55 |
}
|
777c8869 |
if(uas)
agent = uas;
else
agent = PACKAGE"/"VERSION;
|
a2779ebb |
snprintf(cmd, sizeof(cmd),
"GET %s/%s HTTP/1.1\r\n"
"Host: %s\r\n%s"
"User-Agent: %s\r\n" |
f63babe5 |
#ifdef FRESHCLAM_NO_CACHE |
a2779ebb |
"Cache-Control: no-cache\r\n" |
f63babe5 |
#endif |
a2779ebb |
"Connection: close\r\n"
"\r\n", (remotename != NULL) ? remotename : "", srcfile, hostname, (authorization != NULL) ? authorization : "", agent); |
b151ef55 |
|
a2779ebb |
memset(ipaddr, 0, sizeof(ipaddr));
if(ip[0]) /* use ip to connect */ |
a0b09ab7 |
sd = wwwconnect(ip, proxy, port, ipaddr, localip, ctimeout); |
a2779ebb |
else |
a0b09ab7 |
sd = wwwconnect(hostname, proxy, port, ipaddr, localip, ctimeout); |
b151ef55 |
|
a2779ebb |
if(sd < 0) {
return 52;
} else {
logg("*Trying to download http://%s/%s (IP: %s)\n", hostname, srcfile, ipaddr);
}
if(!ip[0])
strcpy(ip, ipaddr);
if(write(sd, cmd, strlen(cmd)) < 0) {
logg("!getfile: Can't write to socket\n");
return 52;
} |
b151ef55 |
|
a2779ebb |
if(remotename)
free(remotename);
if(authorization)
free(authorization);
/* read http headers */ |
b151ef55 |
ch = buffer;
i = 0; |
a2779ebb |
while(1) {
/* recv one byte at a time, until we reach \r\n\r\n */ |
1fb1cce8 |
#ifdef SO_ERROR |
a0b09ab7 |
if((i >= sizeof(buffer) - 1) || wait_recv(sd, buffer + i, 1, 0, rtimeout) == -1) { |
1fb1cce8 |
#else
if((i >= sizeof(buffer) - 1) || recv(sd, buffer + i, 1, 0) == -1) {
#endif |
a2779ebb |
logg("!getfile: Error while reading database from %s\n", hostname);
return 52;
} |
c5e5f90a |
|
a2779ebb |
if(i > 2 && *ch == '\n' && *(ch - 1) == '\r' && *(ch - 2) == '\n' && *(ch - 3) == '\r') {
i++;
break;
}
ch++; |
b151ef55 |
i++; |
1f5be3bf |
} |
b151ef55 |
|
1b2046e3 |
buffer[i] = 0;
|
c5e5f90a |
/* check whether the resource actually existed or not */ |
385ed4be |
if((strstr(buffer, "HTTP/1.1 404")) != NULL || (strstr(buffer, "HTTP/1.0 404")) != NULL) { |
a2779ebb |
logg("!getfile: %s not found on remote server\n", srcfile);
close(sd);
return 58; |
c5e5f90a |
}
|
bfdd343f |
if(!strstr(buffer, "HTTP/1.1 200") && !strstr(buffer, "HTTP/1.0 200") &&
!strstr(buffer, "HTTP/1.1 206") && !strstr(buffer, "HTTP/1.0 206")) {
logg("!getfile: Unknown response from remote server\n"); |
a43f5fa4 |
return 58; |
bfdd343f |
}
|
585afa65 |
/* get size of resource */
for(i = 0; (headerline = cli_strtok(buffer, i, "\n")); i++){
if(strstr(headerline, "Content-Length:")) { |
a2779ebb |
if((ch = cli_strtok(headerline, 1, ": "))) {
totalsize = atoi(ch);
free(ch);
} else {
totalsize = 0;
} |
585afa65 |
} |
a2779ebb |
free(headerline);
}
if((fd = open(destfile, O_WRONLY|O_CREAT|O_EXCL|O_BINARY, 0644)) == -1) {
char currdir[512];
getcwd(currdir, sizeof(currdir));
logg("!getfile: Can't create new file %s in %s\n", destfile, currdir);
logg("Hint: The database directory must be writable for UID %d or GID %d\n", getuid(), getgid());
close(sd);
return 57; |
585afa65 |
}
|
1fb1cce8 |
#ifdef SO_ERROR |
a0b09ab7 |
while((bread = wait_recv(sd, buffer, FILEBUFF, 0, rtimeout)) > 0) { |
1fb1cce8 |
#else
while((bread = recv(sd, buffer, FILEBUFF, 0)) > 0) {
#endif |
a2779ebb |
if(write(fd, buffer, bread) != bread) {
logg("getfile: Can't write %d bytes to %s\n", bread, destfile);
unlink(destfile);
close(fd);
close(sd);
return 57; /* FIXME */
} |
c5e5f90a |
|
585afa65 |
if(!mprintf_quiet) {
if(totalsize > 0) { |
a2779ebb |
totaldownloaded += bread;
percentage = (int) (100 * (float) totaldownloaded / totalsize);
mprintf("Downloading %s [%3i%%]\r", srcfile, percentage); |
585afa65 |
} else { |
a2779ebb |
mprintf("Downloading %s [%c]\r", srcfile, rotation[rot]); |
585afa65 |
rot++;
rot %= 4;
}
fflush(stdout);
} |
b151ef55 |
} |
a2779ebb |
close(sd);
close(fd); |
b151ef55 |
|
585afa65 |
if(totalsize > 0) |
a2779ebb |
logg("Downloading %s [%i%]\n", srcfile, percentage); |
585afa65 |
else |
a2779ebb |
logg("Downloading %s [*]\n", srcfile);
return 0;
}
|
a0b09ab7 |
static int getcvd(const char *dbfile, const char *hostname, char *ip, const char *localip, const char *proxy, int port, const char *user, const char *pass, const char *uas, int nodb, int newver, int ctimeout, int rtimeout) |
a2779ebb |
{
char *tempname;
struct cl_cvd *cvd;
int ret;
tempname = cli_gentemp(".");
logg("*Retrieving http://%s/%s\n", hostname, dbfile); |
a0b09ab7 |
if((ret = getfile(dbfile, tempname, hostname, ip, localip, proxy, port, user, pass, uas, ctimeout, rtimeout))) { |
a2779ebb |
logg("!Can't download %s from %s (IP: %s)\n", dbfile, hostname, ip);
unlink(tempname);
free(tempname);
return ret;
}
if((ret = cl_cvdverify(tempname))) {
logg("!Verification: %s\n", cl_strerror(ret));
unlink(tempname);
free(tempname);
return 54;
}
if(!(cvd = cl_cvdhead(tempname))) {
logg("!Can't read CVD header of new %s database.\n", dbfile);
unlink(tempname);
free(tempname);
return 54;
}
if(cvd->version < newver) { |
e6cdd96b |
logg("^Mirror %s is not synchronized.\n", ip); |
a2779ebb |
cl_cvdfree(cvd);
unlink(tempname);
free(tempname);
return 59;
}
if(!nodb && unlink(dbfile)) {
logg("!Can't unlink %s. Please fix it and try again.\n", dbfile);
cl_cvdfree(cvd);
unlink(tempname);
free(tempname);
return 53;
} else {
if(rename(tempname, dbfile) == -1) {
if(errno == EEXIST) {
unlink(dbfile);
if(rename(tempname, dbfile) == -1) {
logg("!All attempts to rename the temporary file failed: %s\n", strerror(errno));
return 57;
}
}
}
} |
585afa65 |
|
b151ef55 |
return 0;
}
|
a2779ebb |
static int chdir_inc(const char *dbname)
{
struct stat sb;
char path[32], dbfile[32];
sprintf(path, "%s.inc", dbname);
sprintf(dbfile, "%s.cvd", dbname);
if(stat(path, &sb) == -1) {
if(mkdir(path, 0755) == -1) {
logg("!chdir_inc: Can't create directory %s\n", path);
return -1;
}
if(cvd_unpack(dbfile, path) == -1) {
logg("!chdir_inc: Can't unpack %s into %s\n", path);
rmdirs(path);
return -1; |
b151ef55 |
}
} |
a2779ebb |
if(chdir(path) == -1) {
logg("!chdir_inc: Can't change directory to %s\n", path);
return -1; |
b151ef55 |
} |
a2779ebb |
return 0;
}
|
a0b09ab7 |
static int getpatch(const char *dbname, int version, const char *hostname, char *ip, const char *localip, const char *proxy, int port, const char *user, const char *pass, const char *uas, int ctimeout, int rtimeout) |
a2779ebb |
{
char *tempname, patch[32], olddir[512];
int ret, fd;
if(!getcwd(olddir, sizeof(olddir))) {
logg("!getpatch: Can't get path of current working directory\n");
return 50; /* FIXME */
}
if(chdir_inc(dbname) == -1)
return 50;
tempname = cli_gentemp(".");
snprintf(patch, sizeof(patch), "%s-%d.cdiff", dbname, version);
logg("*Retrieving http://%s/%s\n", hostname, patch); |
a0b09ab7 |
if((ret = getfile(patch, tempname, hostname, ip, localip, proxy, port, user, pass, uas, ctimeout, rtimeout))) { |
a2779ebb |
logg("!getpatch: Can't download %s from %s (IP: %s)\n", patch, hostname, ip);
unlink(tempname);
free(tempname);
chdir(olddir);
return ret;
}
if((fd = open(tempname, O_RDONLY)) == -1) {
logg("!getpatch: Can't open %s for reading\n", tempname);
unlink(tempname);
free(tempname);
chdir(olddir);
return 55;
}
|
aa7d9cef |
if(cdiff_apply(fd, 1) == -1) { |
a2779ebb |
logg("!getpatch: Can't apply patch\n"); |
fcbd14be |
close(fd); |
a2779ebb |
unlink(tempname);
free(tempname);
chdir(olddir);
return 70; /* FIXME */
}
|
fcbd14be |
close(fd); |
73279253 |
unlink(tempname);
free(tempname); |
a2779ebb |
chdir(olddir);
return 0;
}
static struct cl_cvd *currentdb(const char *dbname)
{
struct stat sb;
char path[512];
struct cl_cvd *cvd;
short inc = 0;
snprintf(path, sizeof(path), "%s.inc", dbname);
if(stat(path, &sb) != -1) {
snprintf(path, sizeof(path), "%s.inc/%s.info", dbname, dbname);
inc = 1;
} else
snprintf(path, sizeof(path), "%s.cvd", dbname);
cvd = cl_cvdhead(path);
return cvd;
}
int updatedb(const char *dbname, const char *hostname, char *ip, int *signo, const struct cfgstruct *copt, const char *dnsreply, char *localip, int outdated)
{
struct cl_cvd *current, *remote;
struct cfgstruct *cpt; |
537f2326 |
int nodb = 0, currver = 0, newver = -1, ret, port = 0, ims = -1, i; |
a2779ebb |
char *pt, dbfile[32], dbinc[32];
const char *proxy = NULL, *user = NULL, *pass = NULL, *uas = NULL;
int flevel = cl_retflevel();
struct stat sb; |
a0b09ab7 |
int ctimeout, rtimeout; |
a2779ebb |
snprintf(dbfile, sizeof(dbfile), "%s.cvd", dbname);
snprintf(dbinc, sizeof(dbinc), "%s.inc", dbname);
if(!(current = currentdb(dbname))) {
nodb = 1;
if(stat(dbinc, &sb) != -1) {
logg("^Removing corrupted incremental directory %s\n", dbinc);
if(rmdirs(dbinc)) {
logg("!Can't remove incremental directory\n");
return 53;
}
if(stat(dbfile, &sb) != -1) {
logg("^Removing obsolete %s\n", dbfile);
if(unlink(dbfile)) {
logg("!Can't unlink %s\n", dbfile);
return 53;
}
}
}
}
if(!nodb && dnsreply) {
int field = 0;
if(!strcmp(dbname, "main")) {
field = 1;
} else if(!strcmp(dbname, "daily")) {
field = 2;
} else {
logg("!updatedb: Unknown database name (%s) passed.\n", dbname);
cl_cvdfree(current);
return 70;
}
if(field && (pt = cli_strtok(dnsreply, field, ":"))) {
if(!isnumb(pt)) {
logg("^Broken database version in TXT record.\n");
} else {
newver = atoi(pt);
logg("*%s version from DNS: %d\n", dbfile, newver);
}
free(pt);
} else {
logg("^Invalid DNS reply. Falling back to HTTP mode.\n");
}
}
/* Initialize proxy settings */
if((cpt = cfgopt(copt, "HTTPProxyServer"))->enabled) {
proxy = cpt->strarg;
if(strncasecmp(proxy, "http://", 7) == 0)
proxy += 7;
if((cpt = cfgopt(copt, "HTTPProxyUsername"))->enabled) {
user = cpt->strarg;
if((cpt = cfgopt(copt, "HTTPProxyPassword"))->enabled) {
pass = cpt->strarg;
} else {
logg("HTTPProxyUsername requires HTTPProxyPassword\n");
if(current)
cl_cvdfree(current);
return 56;
}
}
if((cpt = cfgopt(copt, "HTTPProxyPort"))->enabled)
port = cpt->numarg;
logg("Connecting via %s\n", proxy);
}
if((cpt = cfgopt(copt, "HTTPUserAgent"))->enabled)
uas = cpt->strarg;
|
a0b09ab7 |
ctimeout = cfgopt(copt, "ConnectTimeout")->numarg;
rtimeout = cfgopt(copt, "ReceiveTimeout")->numarg; |
a2779ebb |
if(!nodb && newver == -1) {
|
a0b09ab7 |
remote = remote_cvdhead(dbfile, hostname, ip, localip, proxy, port, user, pass, uas, &ims, ctimeout, rtimeout); |
a2779ebb |
if(!nodb && !ims) {
logg("%s is up to date (version: %d, sigs: %d, f-level: %d, builder: %s)\n", dbfile, current->version, current->sigs, current->fl, current->builder);
*signo += current->sigs;
cl_cvdfree(current);
return 1;
}
if(!remote) {
logg("^Can't read %s header from %s (IP: %s)\n", dbfile, hostname, ip);
cl_cvdfree(current);
return 58;
}
newver = remote->version;
cl_cvdfree(remote);
}
if(!nodb && (current->version >= newver)) {
logg("%s is up to date (version: %d, sigs: %d, f-level: %d, builder: %s)\n", dbfile, current->version, current->sigs, current->fl, current->builder);
if(!outdated && flevel < current->fl) {
/* display warning even for already installed database */
logg("^Current functionality level = %d, recommended = %d\n", flevel, current->fl);
logg("Please check if ClamAV tools are linked against proper version of libclamav\n");
logg("DON'T PANIC! Read http://www.clamav.net/faq.html\n");
}
*signo += current->sigs;
cl_cvdfree(current);
return 1;
}
|
8d75413d |
if(current) {
currver = current->version; |
a2779ebb |
cl_cvdfree(current); |
8d75413d |
} |
a2779ebb |
/*
if(ipaddr[0]) {
hostfd = wwwconnect(ipaddr, proxy, port, NULL, localip);
} else {
hostfd = wwwconnect(hostname, proxy, port, ipaddr, localip);
if(!ip[0])
strcpy(ip, ipaddr);
}
if(hostfd < 0) {
if(ipaddr[0])
logg("Connection with %s (IP: %s) failed.\n", hostname, ipaddr);
else
logg("Connection with %s failed.\n", hostname);
return 52;
};
*/
if(nodb) { |
a0b09ab7 |
ret = getcvd(dbfile, hostname, ip, localip, proxy, port, user, pass, uas, nodb, newver, ctimeout, rtimeout); |
a2779ebb |
if(ret)
return ret;
} else {
ret = 0;
for(i = currver + 1; i <= newver; i++) { |
fad1b6db |
/*
* !!! FIXME !!!: Redesign this code to make more than one attempt
* to download a single cdiff.
*/ |
a0b09ab7 |
ret = getpatch(dbname, i, hostname, ip, localip, proxy, port, user, pass, uas, ctimeout, rtimeout); |
a2779ebb |
if(ret) {
logg("^Removing incremental directory %s\n", dbinc);
rmdirs(dbinc);
break;
}
}
if(ret) {
logg("^Incremental update failed, downloading complete database\n");
|
a0b09ab7 |
ret = getcvd(dbfile, hostname, ip, localip, proxy, port, user, pass, uas, 1, newver, ctimeout, rtimeout); |
a2779ebb |
if(ret)
return ret; |
fcbd14be |
} else {
unlink(dbfile); |
a2779ebb |
}
}
if(!(current = currentdb(dbname))) {
/* should never be reached */
logg("!Can't parse new database\n");
return 55; /* FIXME */
}
logg("%s updated (version: %d, sigs: %d, f-level: %d, builder: %s)\n", dbfile, current->version, current->sigs, current->fl, current->builder);
if(flevel < current->fl) {
logg("^Your ClamAV installation is OUTDATED!\n");
logg("^Current functionality level = %d, recommended = %d\n", flevel, current->fl);
logg("DON'T PANIC! Read http://www.clamav.net/faq.html\n");
}
*signo += current->sigs;
cl_cvdfree(current);
return 0; |
b151ef55 |
} |
a2779ebb |
int downloadmanager(const struct cfgstruct *copt, const struct optstruct *opt, const char *hostname)
{
time_t currtime;
int ret, updated = 0, outdated = 0, signo = 0;
unsigned int ttl;
char ipaddr[16], *dnsreply = NULL, *pt, *localip = NULL, *newver = NULL;
const char *arg = NULL;
struct cfgstruct *cpt;
#ifdef HAVE_RESOLV_H
const char *dnsdbinfo;
#endif
time(&currtime);
logg("ClamAV update process started at %s", ctime(&currtime));
#ifndef HAVE_GMP
logg("SECURITY WARNING: NO SUPPORT FOR DIGITAL SIGNATURES\n");
logg("See the FAQ at http://www.clamav.net/faq.html for an explanation.\n");
#endif
#ifdef HAVE_RESOLV_H
dnsdbinfo = cfgopt(copt, "DNSDatabaseInfo")->strarg;
if(opt_check(opt, "no-dns")) {
dnsreply = NULL;
} else {
if((dnsreply = txtquery(dnsdbinfo, &ttl))) {
logg("*TTL: %d\n", ttl);
if((pt = cli_strtok(dnsreply, 3, ":"))) {
int rt;
time_t ct;
rt = atoi(pt);
free(pt);
time(&ct);
if((int) ct - rt > 10800) {
logg("^DNS record is older than 3 hours.\n");
free(dnsreply);
dnsreply = NULL;
}
} else {
free(dnsreply);
dnsreply = NULL;
}
if(dnsreply) {
int vwarning = 1;
if((pt = cli_strtok(dnsreply, 4, ":"))) {
if(*pt == '0')
vwarning = 0;
free(pt);
}
if((newver = cli_strtok(dnsreply, 0, ":"))) {
logg("*Software version from DNS: %s\n", newver);
if(vwarning && !strstr(cl_retver(), "devel") && !strstr(cl_retver(), "rc")) {
if(strcmp(cl_retver(), newver)) {
logg("^Your ClamAV installation is OUTDATED!\n");
logg("^Local version: %s Recommended version: %s\n", cl_retver(), pt);
logg("DON'T PANIC! Read http://www.clamav.net/faq.html\n");
outdated = 1;
}
}
}
} else {
if(dnsreply) {
free(dnsreply);
dnsreply = NULL;
}
}
}
if(!dnsreply) {
logg("^Invalid DNS reply. Falling back to HTTP mode.\n");
}
}
#endif /* HAVE_RESOLV_H */
if(opt_check(opt, "local-address")) {
localip = opt_arg(opt, "local-address");
} else if((cpt = cfgopt(copt, "LocalIPAddress"))->enabled) {
localip = cpt->strarg;
}
memset(ipaddr, 0, sizeof(ipaddr));
if((ret = updatedb("main", hostname, ipaddr, &signo, copt, dnsreply, localip, outdated)) > 50) {
if(dnsreply)
free(dnsreply);
if(newver)
free(newver);
return ret;
} else if(ret == 0)
updated = 1;
/* if ipaddr[0] != 0 it will use it to connect to the web host */
if((ret = updatedb("daily", hostname, ipaddr, &signo, copt, dnsreply, localip, outdated)) > 50) {
if(dnsreply)
free(dnsreply);
if(newver)
free(newver);
return ret;
} else if(ret == 0)
updated = 1;
if(dnsreply)
free(dnsreply);
if(updated) {
if(cfgopt(copt, "HTTPProxyServer")->enabled) {
logg("Database updated (%d signatures) from %s\n", signo, hostname);
} else {
logg("Database updated (%d signatures) from %s (IP: %s)\n", signo, hostname, ipaddr);
}
#ifdef BUILD_CLAMD
if(opt_check(opt, "daemon-notify")) {
const char *clamav_conf = opt_arg(opt, "daemon-notify");
if(!clamav_conf)
clamav_conf = CONFDIR"/clamd.conf";
notify(clamav_conf);
} else if((cpt = cfgopt(copt, "NotifyClamd"))->enabled) {
notify(cpt->strarg);
}
#endif
if(opt_check(opt, "on-update-execute"))
arg = opt_arg(opt, "on-update-execute");
else if((cpt = cfgopt(copt, "OnUpdateExecute"))->enabled)
arg = cpt->strarg;
if(arg) {
if(opt_check(opt, "daemon"))
execute("OnUpdateExecute", arg);
else
system(arg);
}
}
if(outdated) {
if(opt_check(opt, "on-outdated-execute"))
arg = opt_arg(opt, "on-outdated-execute");
else if((cpt = cfgopt(copt, "OnOutdatedExecute"))->enabled)
arg = cpt->strarg;
if(arg) {
char *cmd = strdup(arg);
if((pt = strstr(cmd, "%v")) && newver && isdigit(*newver)) {
char *buffer = (char *) mcalloc(strlen(cmd) + strlen(newver) + 10, sizeof(char));
if(!buffer) {
logg("!downloadmanager: Can't allocate memory for buffer\n");
free(cmd);
if(newver)
free(newver);
return 0;
}
*pt = 0; pt += 2;
strcpy(buffer, cmd);
strcat(buffer, newver);
strcat(buffer, pt);
free(cmd);
cmd = strdup(buffer);
free(buffer);
}
if(opt_check(opt, "daemon"))
execute("OnOutdatedExecute", cmd);
else
system(cmd);
free(cmd);
}
}
if(newver)
free(newver);
return updated ? 0 : 1;
}
|