aboutsummaryrefslogtreecommitdiff
path: root/networking/udhcp/dhcpc.c
diff options
context:
space:
mode:
authorDenys Vlasenko <vda.linux@googlemail.com>2011-12-08 16:41:05 +0100
committerDenys Vlasenko <vda.linux@googlemail.com>2011-12-08 16:41:05 +0100
commit7280d2017d8075267a12e469983e38277dcf0374 (patch)
tree3a6bd5c562b04dfadeb72ba7f599db66026977f1 /networking/udhcp/dhcpc.c
parent53782d9221c854be057edfc4e847ea13717dfece (diff)
downloadbusybox-w32-7280d2017d8075267a12e469983e38277dcf0374.tar.gz
busybox-w32-7280d2017d8075267a12e469983e38277dcf0374.tar.bz2
busybox-w32-7280d2017d8075267a12e469983e38277dcf0374.zip
udhcpc: sanitize hostnames in incoming packets. Closes 3979.
The following options are replaced with string "bad" if they contain malformed hostname: HOST_NAME, DOMAIN_NAME, NIS_DOMAIN, TFTP_SERVER_NAME function old new delta xmalloc_optname_optval 850 888 +38 attach_option 440 443 +3 len_of_option_as_string 13 14 +1 dhcp_option_lengths 13 14 +1 ------------------------------------------------------------------------------ (add/remove: 0/0 grow/shrink: 4/0 up/down: 43/0) Total: 43 bytes Signed-off-by: Denys Vlasenko <vda.linux@googlemail.com>
Diffstat (limited to 'networking/udhcp/dhcpc.c')
-rw-r--r--networking/udhcp/dhcpc.c61
1 files changed, 61 insertions, 0 deletions
diff --git a/networking/udhcp/dhcpc.c b/networking/udhcp/dhcpc.c
index 945600c6b..2f2016cd5 100644
--- a/networking/udhcp/dhcpc.c
+++ b/networking/udhcp/dhcpc.c
@@ -135,6 +135,63 @@ static int mton(uint32_t mask)
135 return i; 135 return i;
136} 136}
137 137
138/* Check if a given label represents a valid DNS label
139 * Return pointer to the first character after the label upon success,
140 * NULL otherwise.
141 * See RFC1035, 2.3.1
142 */
143/* We don't need to be particularly anal. For example, allowing _, hyphen
144 * at the end, or leading and trailing dots would be ok, since it
145 * can't be used for attacks. (Leading hyphen can be, if someone uses
146 * cmd "$hostname"
147 * in the script: then hostname may be treated as an option)
148 */
149static const char *valid_domain_label(const char *label)
150{
151 unsigned char ch;
152 unsigned pos = 0;
153
154 for (;;) {
155 ch = *label;
156 if ((ch|0x20) < 'a' || (ch|0x20) > 'z') {
157 if (pos == 0) {
158 /* label must begin with letter */
159 return NULL;
160 }
161 if (ch < '0' || ch > '9') {
162 if (ch == '\0' || ch == '.')
163 return label;
164 /* DNS allows only '-', but we are more permissive */
165 if (ch != '-' && ch != '_')
166 return NULL;
167 }
168 }
169 label++;
170 pos++;
171 //Do we want this?
172 //if (pos > 63) /* NS_MAXLABEL; labels must be 63 chars or less */
173 // return NULL;
174 }
175}
176
177/* Check if a given name represents a valid DNS name */
178/* See RFC1035, 2.3.1 */
179static int good_hostname(const char *name)
180{
181 //const char *start = name;
182
183 for (;;) {
184 name = valid_domain_label(name);
185 if (!name)
186 return 0;
187 if (!name[0])
188 return 1;
189 //Do we want this?
190 //return ((name - start) < 1025); /* NS_MAXDNAME */
191 name++;
192 }
193}
194
138/* Create "opt_name=opt_value" string */ 195/* Create "opt_name=opt_value" string */
139static NOINLINE char *xmalloc_optname_optval(uint8_t *option, const struct dhcp_optflag *optflag, const char *opt_name) 196static NOINLINE char *xmalloc_optname_optval(uint8_t *option, const struct dhcp_optflag *optflag, const char *opt_name)
140{ 197{
@@ -187,8 +244,11 @@ static NOINLINE char *xmalloc_optname_optval(uint8_t *option, const struct dhcp_
187 * the case of list of options. 244 * the case of list of options.
188 */ 245 */
189 case OPTION_STRING: 246 case OPTION_STRING:
247 case OPTION_STRING_HOST:
190 memcpy(dest, option, len); 248 memcpy(dest, option, len);
191 dest[len] = '\0'; 249 dest[len] = '\0';
250 if (type == OPTION_STRING_HOST && !good_hostname(dest))
251 safe_strncpy(dest, "bad", len);
192 return ret; 252 return ret;
193 case OPTION_STATIC_ROUTES: { 253 case OPTION_STATIC_ROUTES: {
194 /* Option binary format: 254 /* Option binary format:
@@ -368,6 +428,7 @@ static char **fill_envp(struct dhcp_packet *packet)
368 /* +1 element for each option, +2 for subnet option: */ 428 /* +1 element for each option, +2 for subnet option: */
369 if (packet) { 429 if (packet) {
370 /* note: do not search for "pad" (0) and "end" (255) options */ 430 /* note: do not search for "pad" (0) and "end" (255) options */
431//TODO: change logic to scan packet _once_
371 for (i = 1; i < 255; i++) { 432 for (i = 1; i < 255; i++) {
372 temp = udhcp_get_option(packet, i); 433 temp = udhcp_get_option(packet, i);
373 if (temp) { 434 if (temp) {