martin 98/08/28 04:27:21
Modified: src CHANGES src/modules/proxy proxy_ftp.c Log: Changes in ftp proxy: make URL parsing simpler by using the parsed_uri stuff. + Add display of the "current directory" in cases where it's different from the supplied path (e.g., ftp://[EMAIL PROTECTED]/ lives in /home/user, not in /, therefore clicking on "../" in the starting directory might send us to /home/). + When ftp login fails, (esp. when a user name was part of the URL already), we now return [401 Unauthorized ] to allow the browser to pop up an authorization dialog. This makes passwords slightly less visible (they don't appear in the regular log files) and implements a functionality that other www proxy servers already offered. Revision Changes Path 1.1039 +14 -0 apache-1.3/src/CHANGES Index: CHANGES =================================================================== RCS file: /export/home/cvs/apache-1.3/src/CHANGES,v retrieving revision 1.1038 retrieving revision 1.1039 diff -u -r1.1038 -r1.1039 --- CHANGES 1998/08/27 16:02:32 1.1038 +++ CHANGES 1998/08/28 11:27:19 1.1039 @@ -1,5 +1,19 @@ Changes with Apache 1.3.2 + *) Changes in ftp proxy: make URL parsing simpler by using the + parsed_uri stuff. + + Add display of the "current directory" in cases where it's + different from the supplied path (e.g., ftp://[EMAIL PROTECTED]/ lives + in /home/user, not in /, therefore clicking on "../" in the + starting directory might send us to /home/). + + When ftp login fails, (esp. when a user name was part of the + URL already), we now return [401 Unauthorized ] to allow the + browser to pop up an authorization dialog. This makes passwords + slightly less visible (they don't appear in the regular log files) + and implements a functionality that other www proxy servers + already offered. + [Martin Kraemer] + *) Triggered by the recent "Via:" header changes, the proxy module would dump core for replies with invalid headers (e.g., duplicate "HTTP/1.0 200 OK" lines). These errors are now logged and the 1.68 +285 -144 apache-1.3/src/modules/proxy/proxy_ftp.c Index: proxy_ftp.c =================================================================== RCS file: /export/home/cvs/apache-1.3/src/modules/proxy/proxy_ftp.c,v retrieving revision 1.67 retrieving revision 1.68 diff -u -r1.67 -r1.68 --- proxy_ftp.c 1998/08/28 11:02:19 1.67 +++ proxy_ftp.c 1998/08/28 11:27:21 1.68 @@ -61,6 +61,8 @@ #include "http_main.h" #include "http_log.h" +#define AUTODETECT_PWD + DEF_Explain /* @@ -263,60 +265,37 @@ return status; } -static long int send_dir(BUFF *f, request_rec *r, cache_req *c, char *url) +static long int send_dir(BUFF *f, request_rec *r, cache_req *c, char *cwd) { char buf[IOBUFSIZE]; char buf2[IOBUFSIZE]; char *filename; - char *tempurl; int searchidx = 0; char *searchptr = NULL; int firstfile = 1; - char urlptr[HUGE_STRING_LEN]; unsigned long total_bytes_sent = 0; register int n, o, w; - int hostlen; conn_rec *con = r->connection; - char *dir, *path, *reldir, *site, *psite; - - tempurl = ap_pstrdup(r->pool, url); - - (void)decodeenc(tempurl); - - /* Determine length of "scheme://site" prefix */ - for (hostlen=0; tempurl[hostlen]!='/'; ++hostlen) - continue; - if (tempurl[hostlen] == '/' && tempurl[hostlen+1] == '/') { - for (hostlen+=2; tempurl[hostlen]!='/' && tempurl[hostlen]!='?'; ++hostlen) - continue; - } else { - hostlen = 0; - } + char *dir, *path, *reldir, *site; - /* Save "scheme://site" prefix */ - site = psite = ap_pstrndup(r->pool, tempurl, hostlen); + /* Save "scheme://site" prefix without password */ + site = ap_unparse_uri_components(r->pool, &r->parsed_uri, UNP_OMITPASSWORD|UNP_OMITPATHINFO); + /* ... and path without query args */ + path = ap_unparse_uri_components(r->pool, &r->parsed_uri, UNP_OMITSITEPART|UNP_OMITQUERY); + (void)decodeenc(path); - if ((n = strcspn(tempurl, "@")) != strlen(tempurl) && n < hostlen) { /* hide user/passwd */ - memmove(tempurl + (n - 5), tempurl, 6); - tempurl += n - 5; /* leave room for ftp:// */ - hostlen -= (n-5); - - /* Save "scheme://site" prefix without user/password */ - site = ap_pstrndup(r->pool, tempurl, hostlen); - } - /* Copy path, strip (all except the last) trailing slashes */ - path = dir = ap_pstrcat(r->pool, tempurl+hostlen, "/", NULL); + path = dir = ap_pstrcat(r->pool, path, "/", NULL); while ((n = strlen(path)) > 1 && path[n-1] == '/' && path[n-2] == '/') path[n-1] = '\0'; /* print "ftp://host/" */ - ap_snprintf(buf, sizeof(buf), "<!DOCTYPE HTML PUBLIC \"-//W3C//DTD HTML 3.2 Final//EN\">\n" - "<HTML><HEAD><TITLE>%s</TITLE>\n" + n = ap_snprintf(buf, sizeof(buf), "<!DOCTYPE HTML PUBLIC \"-//W3C//DTD HTML 3.2 Final//EN\">\n" + "<HTML><HEAD><TITLE>%s%s</TITLE>\n" "<BASE HREF=\"%s%s\"></HEAD>\n" "<BODY><H2>Directory of " "<A HREF=\"/\">%s</A>/", - tempurl, psite, path, site); + site, path, site, path, site); total_bytes_sent += ap_proxy_bputs2(buf, con->client, c); while ((dir = strchr(dir+1, '/')) != NULL) @@ -330,18 +309,16 @@ ap_snprintf(buf, sizeof(buf), "<A HREF=\"/%s/\">%s</A>/", path+1, reldir); total_bytes_sent += ap_proxy_bputs2(buf, con->client, c); *dir = '/'; + } + /* If the caller has determined the current directory, and it differs */ + /* from what the client requested, then show the real name */ + if (cwd == NULL || strncmp (cwd, path, strlen(cwd)) == 0) { + ap_snprintf(buf, sizeof(buf), "</H2>\n<HR><PRE>"); + } else { + ap_snprintf(buf, sizeof(buf), "</H2>\n(%s)\n<HR><PRE>", cwd); } - ap_snprintf(buf, sizeof(buf), "</H2>\n<HR><PRE>"); total_bytes_sent += ap_proxy_bputs2(buf, con->client, c); - for (hostlen=0; url[hostlen]!='/'; ++hostlen) - continue; - if (url[hostlen] == '/' && url[hostlen+1] == '/') { - for (hostlen+=2; url[hostlen]!='/' && url[hostlen]!='?'; ++hostlen) - continue; - } else - hostlen = 0; - while (!con->aborted) { n = ap_bgets(buf, sizeof buf, f); if (n == -1) { /* input error */ @@ -354,14 +331,13 @@ if (buf[0] == 'l' && (filename=strstr(buf, " -> ")) != NULL) { char *link_ptr = filename; - do + do { filename--; - while (filename[0] != ' '); - *(filename++) = 0; - *(link_ptr++) = 0; + } while (filename[0] != ' '); + *(filename++) = '\0'; + *(link_ptr++) = '\0'; if ((n = strlen(link_ptr)) > 1 && link_ptr[n - 1] == '\n') link_ptr[n - 1] = '\0'; - ap_snprintf(urlptr, sizeof(urlptr), "%s%s%s", url+hostlen, (url[strlen(url) - 1] == '/' ? "" : "/"), filename); ap_snprintf(buf2, sizeof(buf2), "%s <A HREF=\"%s\">%s %s</A>\n", buf, filename, filename, link_ptr); ap_cpystrn(buf, buf2, sizeof(buf)); n = strlen(buf); @@ -428,6 +404,34 @@ return total_bytes_sent; } +/* Common routine for failed authorization (i.e., missing or wrong password) + * to an ftp service. This causes most browsers to retry the request + * with username and password (which was presumably queried from the user) + * supplied in the Authorization: header. + * Note that we "invent" a realm name which consists of the + * ftp://[EMAIL PROTECTED] part of the reqest (sans password -if supplied but invalid-) + */ +static int ftp_unauthorized (request_rec *r, int log_it) +{ + r->proxyreq = 0; + /* Log failed requests if they supplied a password + * (log username/password guessing attempts) + */ + if (log_it) + ap_log_rerror(APLOG_MARK, APLOG_INFO|APLOG_NOERRNO, r, + "proxy: missing or failed auth to %s", + ap_unparse_uri_components(r->pool, + &r->parsed_uri, UNP_OMITPATHINFO)); + + ap_table_setn(r->err_headers_out, "WWW-Authenticate", + ap_pstrcat(r->pool, "Basic realm=\"", + ap_unparse_uri_components(r->pool, &r->parsed_uri, + UNP_OMITPASSWORD|UNP_OMITPATHINFO), + "\"", NULL)); + + return HTTP_UNAUTHORIZED; +} + /* * Handles direct access of ftp:// URLs * Original (Non-PASV) version from @@ -436,10 +440,13 @@ */ int ap_proxy_ftp_handler(request_rec *r, cache_req *c, char *url) { - char *host, *path, *strp, *user, *password, *parms; + char *host, *path, *strp, *parms; + char *cwd = NULL; + char *user = NULL; +/* char *account = NULL; how to supply an account in a URL? */ + const char *password = NULL; const char *err; - int port, userlen, i, j, len, sock, dsock, rc, nocache; - int passlen = 0; + int port, i, j, len, sock, dsock, rc, nocache = 0; int csd = 0; struct sockaddr_in server; struct hostent server_hp; @@ -469,8 +476,7 @@ char *pstr; /* stuff for responses */ - char *resp; - int resplen; + char resp[MAX_STRING_LEN]; char *size = NULL; /* we only support GET and HEAD */ @@ -478,58 +484,56 @@ if (r->method_number != M_GET) return HTTP_NOT_IMPLEMENTED; -/* allocate a buffer for the response message */ - resplen = MAX_STRING_LEN; - resp = (char *)ap_palloc(r->pool, resplen); - /* We break the URL into host, port, path-search */ - - host = ap_pstrdup(p, url + 6); - port = DEFAULT_FTP_PORT; - path = strchr(host, '/'); - if (path == NULL) - path = ""; - else - *(path++) = '\0'; - user = password = NULL; - nocache = 0; - strp = strchr(host, '@'); - if (strp != NULL) { - (*strp++) = '\0'; - user = host; - host = strp; -/* find password */ - strp = strchr(user, ':'); - if (strp != NULL) { - *(strp++) = '\0'; - password = strp; - passlen = decodeenc(password); + host = r->parsed_uri.hostname; + port = (r->parsed_uri.port != 0) + ? r->parsed_uri.port + : ap_default_port_for_request(r); + path = ap_pstrdup(p, r->parsed_uri.path); + path = (path != NULL && path[0] != '\0') ? &path[1] : ""; + + /* The "Authorization:" header must be checked first. + * We allow the user to "override" the URL-coded user [ & password ] + * in the Browsers' User&Password Dialog. + * NOTE that this is only marginally more secure than having the + * password travel in plain as part of the URL, because Basic Auth + * simply uuencodes the plain text password. + * But chances are still smaller that the URL is logged regularly. + */ + if ((password = ap_table_get(r->headers_in, "Authorization")) != NULL + && strcasecmp(ap_getword(r->pool, &password, ' '), "Basic") == 0 + && (password = ap_uudecode(r->pool, password))[0] != ':') { + /* Note that this allocation has to be made from r->connection->pool + * because it has the lifetime of the connection. The other allocations + * are temporary and can be tossed away any time. + */ + user = ap_getword_nulls (r->connection->pool, &password, ':'); + r->connection->ap_auth_type = "Basic"; + r->connection->user = r->parsed_uri.user = user; + nocache = 1; /* This resource only accessible with username/password */ + } + else if ((user = r->parsed_uri.user) != NULL) { + user = ap_pstrdup(p, user); + decodeenc(user); + if ((password = r->parsed_uri.password) != NULL) { + char *tmp = ap_pstrdup(p, password); + decodeenc(tmp); + password = tmp; } - userlen = decodeenc(user); - nocache = 1; /* don't cache when a username is supplied */ + nocache = 1; /* This resource only accessible with username/password */ } else { user = "anonymous"; - userlen = 9; - password = "apache_proxy@"; - passlen = strlen(password); } - strp = strchr(host, ':'); - if (strp != NULL) { - *(strp++) = '\0'; - if (ap_isdigit(*strp)) - port = atoi(strp); - } - /* check if ProxyBlock directive on this host */ destaddr.s_addr = ap_inet_addr(host); for (i = 0; i < conf->noproxies->nelts; i++) { if ((npent[i].name != NULL && strstr(host, npent[i].name) != NULL) || destaddr.s_addr == npent[i].addr.s_addr || npent[i].name[0] == '*') - return ap_proxyerror(r, "Connect to remote machine blocked"); + return ap_proxyerror(r, /*HTTP_FORBIDDEN*/ "Connect to remote machine blocked"); } Explain2("FTP: connect to %s:%d", host, port); @@ -552,13 +556,12 @@ return HTTP_INTERNAL_SERVER_ERROR; } - if (conf->recv_buffer_size) { - if (setsockopt(sock, SOL_SOCKET, SO_RCVBUF, + if (conf->recv_buffer_size > 0 + && setsockopt(sock, SOL_SOCKET, SO_RCVBUF, (const char *) &conf->recv_buffer_size, sizeof(int)) == -1) { ap_log_rerror(APLOG_MARK, APLOG_ERR, r, "setsockopt(SO_RCVBUF): Failed to set ProxyReceiveBufferSize, using default"); - } } if (setsockopt(sock, SOL_SOCKET, SO_REUSEADDR, (void *) &one, @@ -608,38 +611,64 @@ ap_bsetflag(f, B_ASCII2EBCDIC|B_EBCDIC2ASCII, 1); #endif /*CHARSET_EBCDIC*/ -/* possible results: 120, 220, 421 */ +/* possible results: */ + /* 120 Service ready in nnn minutes. */ + /* 220 Service ready for new user. */ + /* 421 Service not available, closing control connection. */ ap_hard_timeout("proxy ftp", r); - i = ftp_getrc(f); + i = ftp_getrc_msg(f, resp, sizeof resp); Explain1("FTP: returned status %d", i); if (i == -1) { ap_kill_timeout(r); - return ap_proxyerror(r, "Error reading from remote server"); + return ap_proxyerror(r, /*HTTP_BAD_GATEWAY*/ "Error reading from remote server"); } +#if 0 + if (i == 120) { + ap_kill_timeout(r); + /* RFC2068 states: + * 14.38 Retry-After + * + * The Retry-After response-header field can be used with a 503 (Service + * Unavailable) response to indicate how long the service is expected to + * be unavailable to the requesting client. The value of this field can + * be either an HTTP-date or an integer number of seconds (in decimal) + * after the time of the response. + * Retry-After = "Retry-After" ":" ( HTTP-date | delta-seconds ) + */ + ap_set_header("Retry-After", ap_psprintf(p, "%u", 60*wait_mins); + return ap_proxyerror(r, /*HTTP_SERVICE_UNAVAILABLE*/ resp); + } +#endif if (i != 220) { ap_kill_timeout(r); - return HTTP_BAD_GATEWAY; + return ap_proxyerror(r, /*HTTP_BAD_GATEWAY*/ resp); } Explain0("FTP: connected."); - ap_bputs("USER ", f); - ap_bwrite(f, user, userlen); - ap_bputs(CRLF, f); + ap_bvputs(f, "USER ", user, CRLF, NULL); ap_bflush(f); /* capture any errors */ Explain1("FTP: USER %s", user); /* possible results; 230, 331, 332, 421, 500, 501, 530 */ /* states: 1 - error, 2 - success; 3 - send password, 4,5 fail */ + /* 230 User logged in, proceed. */ + /* 331 User name okay, need password. */ + /* 332 Need account for login. */ + /* 421 Service not available, closing control connection. */ + /* 500 Syntax error, command unrecognized. */ + /* (This may include errors such as command line too long.) */ + /* 501 Syntax error in parameters or arguments. */ + /* 530 Not logged in. */ i = ftp_getrc(f); Explain1("FTP: returned status %d", i); if (i == -1) { ap_kill_timeout(r); - return ap_proxyerror(r, "Error sending to remote server"); + return ap_proxyerror(r, /*HTTP_BAD_GATEWAY*/ "Error reading from remote server"); } if (i == 530) { ap_kill_timeout(r); - return ap_proxyerror(r, "Not logged in"); + return ftp_unauthorized (r, 1); /* log it: user name guessing attempt? */ } if (i != 230 && i != 331) { ap_kill_timeout(r); @@ -647,27 +676,34 @@ } if (i == 331) { /* send password */ - if (password == NULL) - return HTTP_FORBIDDEN; - ap_bputs("PASS ", f); - ap_bwrite(f, password, passlen); - ap_bputs(CRLF, f); + if (password == NULL) { + return ftp_unauthorized (r, 0); + } + ap_bvputs(f, "PASS ", password, CRLF, NULL); ap_bflush(f); Explain1("FTP: PASS %s", password); /* possible results 202, 230, 332, 421, 500, 501, 503, 530 */ + /* 230 User logged in, proceed. */ + /* 332 Need account for login. */ + /* 421 Service not available, closing control connection. */ + /* 500 Syntax error, command unrecognized. */ + /* 501 Syntax error in parameters or arguments. */ + /* 503 Bad sequence of commands. */ + /* 530 Not logged in. */ i = ftp_getrc(f); Explain1("FTP: returned status %d", i); if (i == -1) { ap_kill_timeout(r); - return ap_proxyerror(r, "Error sending to remote server"); + return ap_proxyerror(r, /*HTTP_BAD_GATEWAY*/ "Error reading from remote server"); } if (i == 332) { ap_kill_timeout(r); - return ap_proxyerror(r, "Need account for login"); + return ap_proxyerror(r, /*HTTP_UNAUTHORIZED*/ "Need account for login"); } + /* @@@ questionable -- we might as well return a 403 Forbidden here */ if (i == 530) { ap_kill_timeout(r); - return ap_proxyerror(r, "Not logged in"); + return ftp_unauthorized (r, 1); /* log it: passwd guessing attempt? */ } if (i != 230 && i != 202) { ap_kill_timeout(r); @@ -675,8 +711,8 @@ } } -/* set the directory */ -/* this is what we must do if we don't know the OS type of the remote +/* set the directory (walk directory component by component): + * this is what we must do if we don't know the OS type of the remote * machine */ for (;;) { @@ -686,18 +722,23 @@ *strp = '\0'; len = decodeenc(path); - ap_bputs("CWD ", f); - ap_bwrite(f, path, len); - ap_bputs(CRLF, f); + ap_bvputs(f, "CWD ", path, CRLF, NULL); ap_bflush(f); Explain1("FTP: CWD %s", path); + *strp = '/'; /* responses: 250, 421, 500, 501, 502, 530, 550 */ -/* 1,3 error, 2 success, 4,5 failure */ + /* 250 Requested file action okay, completed. */ + /* 421 Service not available, closing control connection. */ + /* 500 Syntax error, command unrecognized. */ + /* 501 Syntax error in parameters or arguments. */ + /* 502 Command not implemented. */ + /* 530 Not logged in. */ + /* 550 Requested action not taken. */ i = ftp_getrc(f); Explain1("FTP: returned status %d", i); if (i == -1) { ap_kill_timeout(r); - return ap_proxyerror(r, "Error sending to remote server"); + return ap_proxyerror(r, /*HTTP_BAD_GATEWAY*/ "Error reading from remote server"); } if (i == 550) { ap_kill_timeout(r); @@ -730,11 +771,17 @@ ap_bflush(f); Explain0("FTP: TYPE I"); /* responses: 200, 421, 500, 501, 504, 530 */ + /* 200 Command okay. */ + /* 421 Service not available, closing control connection. */ + /* 500 Syntax error, command unrecognized. */ + /* 501 Syntax error in parameters or arguments. */ + /* 504 Command not implemented for that parameter. */ + /* 530 Not logged in. */ i = ftp_getrc(f); Explain1("FTP: returned status %d", i); if (i == -1) { ap_kill_timeout(r); - return ap_proxyerror(r, "Error sending to remote server"); + return ap_proxyerror(r, /*HTTP_BAD_GATEWAY*/ "Error reading from remote server"); } if (i != 200 && i != 504) { ap_kill_timeout(r); @@ -767,8 +814,13 @@ ap_bflush(f); Explain0("FTP: PASV command issued"); /* possible results: 227, 421, 500, 501, 502, 530 */ + /* 227 Entering Passive Mode (h1,h2,h3,h4,p1,p2). */ + /* 421 Service not available, closing control connection. */ + /* 500 Syntax error, command unrecognized. */ + /* 501 Syntax error in parameters or arguments. */ + /* 502 Command not implemented. */ + /* 530 Not logged in. */ i = ap_bgets(pasv, sizeof(pasv), f); - if (i == -1) { ap_log_rerror(APLOG_MARK, APLOG_ERR|APLOG_NOERRNO, r, "PASV: control connection is toast"); @@ -867,7 +919,7 @@ listen(dsock, 2); /* only need a short queue */ } -/* set request */ +/* set request; "path" holds last path component */ len = decodeenc(path); /* TM - if len == 0 then it must be a directory (you can't RETR nothing) */ @@ -876,27 +928,31 @@ parms = "d"; } else { - ap_bputs("SIZE ", f); - ap_bwrite(f, path, len); - ap_bputs(CRLF, f); + ap_bvputs(f, "SIZE ", path, CRLF, NULL); ap_bflush(f); Explain1("FTP: SIZE %s", path); - i = ftp_getrc_msg(f, resp, resplen); + i = ftp_getrc_msg(f, resp, sizeof resp); Explain2("FTP: returned status %d with response %s", i, resp); if (i != 500) { /* Size command not recognized */ if (i == 550) { /* Not a regular file */ Explain0("FTP: SIZE shows this is a directory"); parms = "d"; - ap_bputs("CWD ", f); - ap_bwrite(f, path, len); - ap_bputs(CRLF, f); + ap_bvputs(f, "CWD ", path, CRLF, NULL); ap_bflush(f); Explain1("FTP: CWD %s", path); i = ftp_getrc(f); + /* possible results: 250, 421, 500, 501, 502, 530, 550 */ + /* 250 Requested file action okay, completed. */ + /* 421 Service not available, closing control connection. */ + /* 500 Syntax error, command unrecognized. */ + /* 501 Syntax error in parameters or arguments. */ + /* 502 Command not implemented. */ + /* 530 Not logged in. */ + /* 550 Requested action not taken. */ Explain1("FTP: returned status %d", i); if (i == -1) { ap_kill_timeout(r); - return ap_proxyerror(r, "Error sending to remote server"); + return ap_proxyerror(r, /*HTTP_BAD_GATEWAY*/ "Error reading from remote server"); } if (i == 550) { ap_kill_timeout(r); @@ -910,7 +966,7 @@ len = 0; } else if (i == 213) { /* Size command ok */ - for (j = 0; j < resplen && ap_isdigit(resp[j]); j++) + for (j = 0; j < sizeof resp && ap_isdigit(resp[j]); j++) ; resp[j] = '\0'; if (resp[0] != '\0') @@ -919,41 +975,86 @@ } } +#ifdef AUTODETECT_PWD + ap_bvputs(f, "PWD", CRLF, NULL); + ap_bflush(f); + Explain0("FTP: PWD"); +/* responses: 257, 500, 501, 502, 421, 550 */ + /* 257 "<directory-name>" <commentary> */ + /* 421 Service not available, closing control connection. */ + /* 500 Syntax error, command unrecognized. */ + /* 501 Syntax error in parameters or arguments. */ + /* 502 Command not implemented. */ + /* 550 Requested action not taken. */ + i = ftp_getrc_msg(f, resp, sizeof resp); + Explain1("FTP: PWD returned status %d", i); + if (i == -1 || i == 421) { + ap_kill_timeout(r); + return ap_proxyerror(r, /*HTTP_BAD_GATEWAY*/ "Error reading from remote server"); + } + if (i == 550) { + ap_kill_timeout(r); + return HTTP_NOT_FOUND; + } + if (i == 257) { + const char *dirp = resp; + cwd = ap_getword_conf(r->pool, &dirp); + } +#endif /*AUTODETECT_PWD*/ + if (parms[0] == 'd') { if (len != 0) - ap_bputs("LIST ", f); + ap_bvputs(f, "LIST ", path, CRLF, NULL); else - ap_bputs("LIST -lag", f); + ap_bputs("LIST -lag" CRLF, f); Explain1("FTP: LIST %s", (len == 0 ? "" : path)); } else { - ap_bputs("RETR ", f); + ap_bvputs(f, "RETR ", path, CRLF, NULL); Explain1("FTP: RETR %s", path); } - ap_bwrite(f, path, len); - ap_bputs(CRLF, f); ap_bflush(f); /* RETR: 110, 125, 150, 226, 250, 421, 425, 426, 450, 451, 500, 501, 530, 550 NLST: 125, 150, 226, 250, 421, 425, 426, 450, 451, 500, 501, 502, 530 */ + /* 110 Restart marker reply. */ + /* 125 Data connection already open; transfer starting. */ + /* 150 File status okay; about to open data connection. */ + /* 226 Closing data connection. */ + /* 250 Requested file action okay, completed. */ + /* 421 Service not available, closing control connection. */ + /* 425 Can't open data connection. */ + /* 426 Connection closed; transfer aborted. */ + /* 450 Requested file action not taken. */ + /* 451 Requested action aborted. Local error in processing. */ + /* 500 Syntax error, command unrecognized. */ + /* 501 Syntax error in parameters or arguments. */ + /* 530 Not logged in. */ + /* 550 Requested action not taken. */ rc = ftp_getrc(f); Explain1("FTP: returned status %d", rc); if (rc == -1) { ap_kill_timeout(r); - return ap_proxyerror(r, "Error sending to remote server"); + return ap_proxyerror(r, /*HTTP_BAD_GATEWAY*/ "Error reading from remote server"); } if (rc == 550) { Explain0("FTP: RETR failed, trying LIST instead"); parms = "d"; - ap_bputs("CWD ", f); - ap_bwrite(f, path, len); - ap_bputs(CRLF, f); + ap_bvputs(f, "CWD ", path, CRLF, NULL); ap_bflush(f); Explain1("FTP: CWD %s", path); + /* possible results: 250, 421, 500, 501, 502, 530, 550 */ + /* 250 Requested file action okay, completed. */ + /* 421 Service not available, closing control connection. */ + /* 500 Syntax error, command unrecognized. */ + /* 501 Syntax error in parameters or arguments. */ + /* 502 Command not implemented. */ + /* 530 Not logged in. */ + /* 550 Requested action not taken. */ rc = ftp_getrc(f); Explain1("FTP: returned status %d", rc); if (rc == -1) { ap_kill_timeout(r); - return ap_proxyerror(r, "Error sending to remote server"); + return ap_proxyerror(r, /*HTTP_BAD_GATEWAY*/ "Error reading from remote server"); } if (rc == 550) { ap_kill_timeout(r); @@ -964,13 +1065,40 @@ return HTTP_BAD_GATEWAY; } +#ifdef AUTODETECT_PWD + ap_bvputs(f, "PWD", CRLF, NULL); + ap_bflush(f); + Explain0("FTP: PWD"); +/* responses: 257, 500, 501, 502, 421, 550 */ + /* 257 "<directory-name>" <commentary> */ + /* 421 Service not available, closing control connection. */ + /* 500 Syntax error, command unrecognized. */ + /* 501 Syntax error in parameters or arguments. */ + /* 502 Command not implemented. */ + /* 550 Requested action not taken. */ + i = ftp_getrc_msg(f, resp, sizeof resp); + Explain1("FTP: PWD returned status %d", i); + if (i == -1 || i == 421) { + ap_kill_timeout(r); + return ap_proxyerror(r, /*HTTP_BAD_GATEWAY*/ "Error reading from remote server"); + } + if (i == 550) { + ap_kill_timeout(r); + return HTTP_NOT_FOUND; + } + if (i == 257) { + const char *dirp = resp; + cwd = ap_getword_conf(r->pool, &dirp); + } +#endif /*AUTODETECT_PWD*/ + ap_bputs("LIST -lag" CRLF, f); ap_bflush(f); Explain0("FTP: LIST -lag"); rc = ftp_getrc(f); Explain1("FTP: returned status %d", rc); if (rc == -1) - return ap_proxyerror(r, "Error sending to remote server"); + return ap_proxyerror(r, /*HTTP_BAD_GATEWAY*/ "Error reading from remote server"); } ap_kill_timeout(r); if (rc != 125 && rc != 150 && rc != 226 && rc != 250) @@ -993,6 +1121,7 @@ ap_table_set(resp_hdrs, "Content-Type", "text/plain"); } if (parms[0] != 'a' && size != NULL) { + /* We "trust" the ftp server to really serve (size) bytes... */ ap_table_set(resp_hdrs, "Content-Length", size); Explain1("FTP: Content-Length set to %s", size); } @@ -1048,8 +1177,8 @@ /* write status line */ if (!r->assbackwards) ap_rvputs(r, "HTTP/1.0 ", r->status_line, CRLF, NULL); - if (c != NULL && c->fp != NULL && - ap_bvputs(c->fp, "HTTP/1.0 ", r->status_line, CRLF, NULL) == -1) + if (c != NULL && c->fp != NULL + && ap_bvputs(c->fp, "HTTP/1.0 ", r->status_line, CRLF, NULL) == -1) c = ap_proxy_cache_error(c); /* send headers */ @@ -1072,10 +1201,12 @@ c->cache_completion = 0; ap_proxy_send_fb(data, r, c); } else - send_dir(data, r, c, url); + send_dir(data, r, c, cwd); if (rc == 125 || rc == 150) rc = ftp_getrc(f); + + /* XXX: we checked for 125||150||226||250 above. This is redundant. */ if (rc != 226 && rc != 250) c = ap_proxy_cache_error(c); } @@ -1087,6 +1218,12 @@ ap_bclose(data); Explain0("FTP: ABOR"); /* responses: 225, 226, 421, 500, 501, 502 */ + /* 225 Data connection open; no transfer in progress. */ + /* 226 Closing data connection. */ + /* 421 Service not available, closing control connection. */ + /* 500 Syntax error, command unrecognized. */ + /* 501 Syntax error in parameters or arguments. */ + /* 502 Command not implemented. */ i = ftp_getrc(f); Explain1("FTP: returned status %d", i); } @@ -1099,6 +1236,10 @@ ap_bflush(f); Explain0("FTP: QUIT"); /* responses: 221, 500 */ + /* 221 Service closing control connection. */ + /* 500 Syntax error, command unrecognized. */ + i = ftp_getrc(f); + Explain1("FTP: QUIT: status %d", i); if (pasvmode) ap_bclose(data);