ClamAV is an open source (GPLv2) anti-virus toolkit.
You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
 
 
 
 
 
 
clamav/clamav-devel/clamdscan/client.c

586 lines
14 KiB

/*
* Copyright (C) 2002 - 2005 Tomasz Kojm <tkojm@clamav.net>
*
* This program is free software; you can redistribute it and/or modify
* it under the terms of the GNU General Public License as published by
* the Free Software Foundation; either version 2 of the License, or
* (at your option) any later version.
*
* This program is distributed in the hope that it will be useful,
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
* GNU General Public License for more details.
*
* You should have received a copy of the GNU General Public License
* along with this program; if not, write to the Free Software
* Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
*/
#if HAVE_CONFIG_H
#include "clamav-config.h"
#endif
#include <stdio.h>
#include <unistd.h>
#include <string.h>
#include <sys/types.h>
#include <sys/stat.h>
#include <sys/socket.h>
#include <sys/un.h>
#include <netinet/in.h>
#include <arpa/inet.h>
#include <netdb.h>
#include <utime.h>
#include <errno.h>
#ifdef HAVE_SYS_UIO_H
#include <sys/uio.h>
#endif
#include "others.h"
#include "defaults.h"
#include "shared.h"
#include "options.h"
#include "cfgparser.h"
#include "memory.h"
#include "output.h"
#include "misc.h"
#include "str.h"
#include "strrcpy.h" /* libclamav */
#ifdef PF_INET
# define SOCKET_INET PF_INET
#else
# define SOCKET_INET AF_INET
#endif
/* #define ENABLE_FD_PASSING FIXME: Doesn't work yet */
void move_infected(const char *filename, const struct optstruct *opt);
int notremoved = 0, notmoved = 0;
int dsresult(int sockd, const struct optstruct *opt)
{
int infected = 0, waserror = 0;
char buff[4096], *pt;
FILE *fd;
#ifndef C_OS2
if((fd = fdopen(dup(sockd), "r")) == NULL) {
#else /* FIXME: accoriding to YD OS/2 does not support dup() for sockets */
if((fd = fdopen(sockd, "r")) == NULL) {
#endif
logg("^Can't open descriptor for reading.\n");
return -1;
}
while(fgets(buff, sizeof(buff), fd)) {
if(strstr(buff, "FOUND\n")) {
infected++;
logg("%s", buff);
if(optl(opt, "move")) {
pt = strrchr(buff, ':');
*pt = 0;
move_infected(buff, opt);
} else if(optl(opt, "remove")) {
pt = strrchr(buff, ':');
*pt = 0;
if(unlink(buff)) {
logg("%s: Can't remove.\n", buff);
notremoved++;
} else {
logg("%s: Removed.\n", buff);
}
}
}
if(strstr(buff, "ERROR\n")) {
logg("%s", buff);
waserror = 1;
}
}
#ifndef C_OS2 /* Small memory leak under OS/2 (see above) */
fclose(fd);
#endif
return infected ? infected : (waserror ? -1 : 0);
}
int dsfile(int sockd, const char *filename, const struct optstruct *opt)
{
int ret;
char *scancmd;
scancmd = mcalloc(strlen(filename) + 20, sizeof(char));
sprintf(scancmd, "CONTSCAN %s", filename);
if(write(sockd, scancmd, strlen(scancmd)) <= 0) {
logg("^Can't write to the socket.\n");
free(scancmd);
return -1;
}
free(scancmd);
ret = dsresult(sockd, opt);
if(!ret)
logg("%s: OK\n", filename);
return ret;
}
#if defined(ENABLE_FD_PASSING) && defined(HAVE_SENDMSG) && (defined(HAVE_ACCRIGHTS_IN_MSGHDR) || defined(HAVE_CONTROL_IN_MSGHDR)) && !defined(C_CYGWIN)
/* Submitted by Richard Lyons <frob-clamav*webcentral.com.au> */
int dsfd(int sockfd, int fd, const struct optstruct *opt)
{
struct iovec iov[1];
struct msghdr msg;
#ifdef HAVE_CONTROL_IN_MSGHDR
#ifndef CMSG_SPACE
#define CMSG_SPACE(len) (_CMSG_ALIGN(sizeof(struct cmsghdr)) + _CMSG_ALIGN(len))
#endif
#ifndef CMSG_LEN
#define CMSG_LEN(len) (_CMSG_ALIGN(sizeof(struct cmsghdr)) + (len))
#endif
struct cmsghdr *cmsg;
char tmp[CMSG_SPACE(sizeof(fd))];
#endif
iov[0].iov_base = "";
iov[0].iov_len = 1;
memset(&msg, 0, sizeof(msg));
msg.msg_iov = iov;
msg.msg_iovlen = 1;
#ifdef HAVE_CONTROL_IN_MSGHDR
msg.msg_control = tmp;
msg.msg_controllen = sizeof(tmp);
cmsg = CMSG_FIRSTHDR(&msg);
cmsg->cmsg_level = SOL_SOCKET;
cmsg->cmsg_type = SCM_RIGHTS;
cmsg->cmsg_len = CMSG_LEN(sizeof(fd));
*(int *)CMSG_DATA(cmsg) = fd;
#endif
#ifdef HAVE_ACCRIGHTS_IN_MSGHDR
msg.msg_accrights = (caddr_t)&fd;
msg.msg_accrightslen = sizeof(fd);
#endif
if (sendmsg(sockfd, &msg, 0) != iov[0].iov_len) {
logg("^Can't write to the socket.\n");
return -1;
}
return dsresult(sockfd, opt);
}
#else
int dsfd(int sockfd, int fd, const struct optstruct *opt)
{
return -1;
}
#endif
int dsstream(int sockd, const struct optstruct *opt)
{
int wsockd, loopw = 60, bread, port, infected = 0;
struct sockaddr_in server;
struct sockaddr_in peer;
int peer_size;
char buff[4096], *pt;
if(write(sockd, "STREAM", 6) <= 0) {
logg("^Can't write to the socket.\n");
return 2;
}
memset(buff, 0, sizeof(buff));
while(loopw) {
read(sockd, buff, sizeof(buff));
if((pt = strstr(buff, "PORT"))) {
pt += 5;
sscanf(pt, "%d", &port);
break;
}
loopw--;
}
if(!loopw) {
logg("^Daemon not ready for stream scanning.\n");
return -1;
}
/* connect to clamd */
if((wsockd = socket(SOCKET_INET, SOCK_STREAM, 0)) < 0) {
perror("socket()");
logg("^Can't create the socket.\n");
return -1;
}
server.sin_family = AF_INET;
server.sin_port = htons(port);
peer_size = sizeof(peer);
if(getpeername(sockd, (struct sockaddr *) &peer, &peer_size) < 0) {
perror("getpeername()");
logg("^Can't get socket peer name.\n");
return -1;
}
switch (peer.sin_family) {
case AF_UNIX:
server.sin_addr.s_addr = inet_addr("127.0.0.1");
break;
case AF_INET:
server.sin_addr.s_addr = peer.sin_addr.s_addr;
break;
default:
mprintf("^Unexpected socket type: %d.\n", peer.sin_family);
return -1;
}
if(connect(wsockd, (struct sockaddr *) &server, sizeof(struct sockaddr_in)) < 0) {
close(wsockd);
perror("connect()");
logg("^Can't connect to clamd [port: %d].\n", port);
return -1;
}
while((bread = read(0, buff, sizeof(buff))) > 0) {
if(write(wsockd, buff, bread) <= 0) {
logg("^Can't write to the socket.\n");
close(wsockd);
return -1;
}
}
close(wsockd);
memset(buff, 0, sizeof(buff));
while((bread = read(sockd, buff, sizeof(buff))) > 0) {
logg("%s", buff);
if(strstr(buff, "FOUND\n")) {
infected++;
} else if(strstr(buff, "ERROR\n")) {
logg("%s", buff);
return -1;
}
memset(buff, 0, sizeof(buff));
}
return infected;
}
char *abpath(const char *filename)
{
struct stat foo;
char *fullpath, cwd[200];
if(stat(filename, &foo) == -1) {
logg("^Can't access file %s\n", filename);
perror(filename);
return NULL;
} else {
fullpath = mcalloc(200 + strlen(filename) + 10, sizeof(char));
#ifdef C_CYGWIN
sprintf(fullpath, "%s", filename);
#else
if(!getcwd(cwd, 200)) {
logg("^Can't get absolute pathname of current working directory.\n");
return NULL;
}
sprintf(fullpath, "%s/%s", cwd, filename);
#endif
}
return fullpath;
}
int dconnect(const struct optstruct *opt)
{
struct sockaddr_un server;
struct sockaddr_in server2;
struct hostent *he;
struct cfgstruct *copt, *cpt;
const char *clamav_conf = getargl(opt, "config-file");
int sockd;
if(!clamav_conf)
clamav_conf = DEFAULT_CFG;
if((copt = getcfg(clamav_conf, 1)) == NULL) {
logg("^Can't parse the configuration file.\n");
return -1;
}
memset((char *) &server, 0, sizeof(server));
memset((char *) &server2, 0, sizeof(server2));
/* Set default address to connect to */
server2.sin_addr.s_addr = inet_addr("127.0.0.1");
if((cpt = cfgopt(copt, "LocalSocket"))->enabled) {
server.sun_family = AF_UNIX;
strncpy(server.sun_path, cpt->strarg, sizeof(server.sun_path));
if((sockd = socket(AF_UNIX, SOCK_STREAM, 0)) < 0) {
perror("socket()");
logg("^Can't create the socket.\n");
return -1;
}
if(connect(sockd, (struct sockaddr *) &server, sizeof(struct sockaddr_un)) < 0) {
close(sockd);
perror("connect()");
logg("^Can't connect to clamd.\n");
return -1;
}
} else if((cpt = cfgopt(copt, "TCPSocket"))->enabled) {
if((sockd = socket(SOCKET_INET, SOCK_STREAM, 0)) < 0) {
perror("socket()");
logg("^Can't create the socket.\n");
return -1;
}
server2.sin_family = AF_INET;
server2.sin_port = htons(cpt->numarg);
if((cpt = cfgopt(copt, "TCPAddr"))->enabled) {
if ((he = gethostbyname(cpt->strarg)) == 0) {
close(sockd);
perror("gethostbyname()");
logg("^Can't lookup clamd hostname.\n");
return -1;
}
server2.sin_addr = *(struct in_addr *) he->h_addr_list[0];
}
if(connect(sockd, (struct sockaddr *) &server2, sizeof(struct sockaddr_in)) < 0) {
close(sockd);
perror("connect()");
logg("^Can't connect to clamd.\n");
return -1;
}
} else {
logg("^Clamd is not configured properly.\n");
return -1;
}
return sockd;
}
int client(const struct optstruct *opt, int *infected)
{
char cwd[200], *fullpath;
int sockd, ret, errors = 0;
struct stat sb;
*infected = 0;
/* parse argument list */
if(opt->filename == NULL || strlen(opt->filename) == 0) {
/* scan current directory */
if(!getcwd(cwd, 200)) {
logg("^Can't get absolute pathname of current working directory.\n");
return 2;
}
if((sockd = dconnect(opt)) < 0)
return 2;
if((ret = dsfile(sockd, cwd, opt)) >= 0)
*infected += ret;
else
errors++;
close(sockd);
#if defined(ENABLE_FD_PASSING) && defined(HAVE_SENDMSG) && (defined(HAVE_ACCRIGHTS_IN_MSGHDR) || defined(HAVE_CONTROL_IN_MSGHDR)) && !defined(C_CYGWIN)
} else if(!strcmp(opt->filename, "-")) { /* scan data from stdin */
if((sockd = dconnect(opt)) < 0)
return 2;
if((ret = dsfd(sockd, 0, opt)) >= 0)
*infected += ret;
else
errors++;
close(sockd);
#else
} else if(!strcmp(opt->filename, "-")) { /* scan data from stdin */
if((sockd = dconnect(opt)) < 0)
return 2;
if((ret = dsstream(sockd, opt)) >= 0)
*infected += ret;
else
errors++;
close(sockd);
#endif
} else {
int x;
char *thefilename;
for (x = 0; (thefilename = cli_strtok(opt->filename, x, "\t")) != NULL; x++) {
fullpath = thefilename;
if(stat(fullpath, &sb) == -1) {
logg("^Can't access file %s\n", fullpath);
perror(fullpath);
errors++;
} else {
if(strlen(fullpath) < 2 || (fullpath[0] != '/' && fullpath[0] != '\\' && fullpath[1] != ':')) {
fullpath = abpath(thefilename);
free(thefilename);
if(!fullpath) {
logg("^Can't determine absolute path.\n");
return 2;
}
}
switch(sb.st_mode & S_IFMT) {
case S_IFREG:
case S_IFDIR:
if((sockd = dconnect(opt)) < 0)
return 2;
if((ret = dsfile(sockd, fullpath, opt)) >= 0)
*infected += ret;
else
errors++;
close(sockd);
break;
default:
logg("^Not supported file type (%s)\n", fullpath);
errors++;
}
}
free(fullpath);
}
}
return *infected ? 1 : (errors ? 2 : 0);
}
void move_infected(const char *filename, const struct optstruct *opt)
{
char *movedir, *movefilename, *tmp, numext[4 + 1];
struct stat fstat, mfstat;
int n, len, movefilename_size;
struct utimbuf ubuf;
if(!(movedir = getargl(opt, "move"))) {
/* Should never reach here */
logg("^getargc() returned NULL\n");
notmoved++;
return;
}
if(access(movedir, W_OK|X_OK) == -1) {
logg("^error moving file '%s': cannot write to '%s': %s\n", filename, movedir, strerror(errno));
notmoved++;
return;
}
if(stat(filename, &fstat) == -1) {
logg("^Can't stat file %s\n", filename);
logg("Try to run clamdscan with clamd privileges\n");
notmoved++;
return;
}
if(!(tmp = strrchr(filename, '/')))
tmp = (char *) filename;
movefilename_size = sizeof(char) * (strlen(movedir) + strlen(tmp) + sizeof(numext) + 2);
if(!(movefilename = mmalloc(movefilename_size))) {
logg("^Memory allocation error\n");
exit(2);
}
if(!(strrcpy(movefilename, movedir))) {
logg("^strrcpy() returned NULL\n");
notmoved++;
free(movefilename);
return;
}
strcat(movefilename, "/");
if(!(strcat(movefilename, tmp))) {
logg("^strcat() returned NULL\n");
notmoved++;
free(movefilename);
return;
}
if(!stat(movefilename, &mfstat)) {
if(fstat.st_ino == mfstat.st_ino) { /* It's the same file*/
logg("File excluded '%s'\n", filename);
notmoved++;
free(movefilename);
return;
} else {
/* file exists - try to append an ordinal number to the
* quranatined file in an attempt not to overwrite existing
* files in quarantine
*/
len = strlen(movefilename);
n = 0;
do {
/* reset the movefilename to it's initial value by
* truncating to the original filename length
*/
movefilename[len] = 0;
/* append .XXX */
sprintf(numext, ".%03d", n++);
strcat(movefilename, numext);
} while(!stat(movefilename, &mfstat) && (n < 1000));
}
}
if(rename(filename, movefilename) == -1) {
if(filecopy(filename, movefilename) == -1) {
logg("^cannot move '%s' to '%s': %s\n", filename, movefilename, strerror(errno));
notmoved++;
free(movefilename);
return;
}
chmod(movefilename, fstat.st_mode);
chown(movefilename, fstat.st_uid, fstat.st_gid);
ubuf.actime = fstat.st_atime;
ubuf.modtime = fstat.st_mtime;
utime(movefilename, &ubuf);
if(unlink(filename)) {
logg("^cannot unlink '%s': %s\n", filename, strerror(errno));
notremoved++;
free(movefilename);
return;
}
}
logg("%s: moved to '%s'\n", filename, movefilename);
free(movefilename);
}