long id;
slap_ssf_t ssf = 0;
char *authid = NULL;
+#ifdef SLAPD_RLOOKUPS
+ char *hebuf = NULL;
+#endif
char *dnsname = NULL;
char *peeraddr = NULL;
case AF_LOCAL:
sprintf( peername, "PATH=%s", from.sa_un_addr.sun_path );
ssf = LDAP_PVT_SASL_LOCAL_SSF;
-# ifdef SO_PEERCRED
{
- struct ucred peercred;
- size_t peercred_len = sizeof(peercred);
-
- if (getsockopt( s, SOL_SOCKET, SO_PEERCRED,
- (void *)&peercred, &peercred_len ) == 0 &&
- peercred_len == sizeof(peercred) ) {
- authid = ch_malloc(sizeof("uidNumber=+gidNumber=+,cn=peercred,cn=external,cn=auth") + 32);
- sprintf(authid, "uidNumber=%d+gidNumber=%d,cn=peercred,cn=external,cn=auth", peercred.uid, peercred.gid);
+ uid_t uid;
+ gid_t gid;
+
+ if( getpeereid( s, &uid, &gid ) == 0 ) {
+ authid = ch_malloc(
+ sizeof("uidNumber=4294967295+gidNumber=4294967295,"
+ "cn=peercred,cn=external,cn=auth"));
+ sprintf(authid, "uidNumber=%d+gidNumber=%d,"
+ "cn=peercred,cn=external,cn=auth",
+ uid, gid);
}
}
-# endif /* SO_PEERCRED */
dnsname = "local";
break;
#endif /* LDAP_PF_LOCAL */
) {
#ifdef SLAPD_RLOOKUPS
if ( use_reverse_lookup ) {
+ struct hostent he;
+ int herr;
+ struct hostent *hp = NULL;
# ifdef LDAP_PF_INET6
if ( from.sa_addr.sa_family == AF_INET6 )
- hp = gethostbyaddr(
+ ldap_pvt_gethostbyaddr_a(
(char *)&(from.sa_in6_addr.sin6_addr),
sizeof(from.sa_in6_addr.sin6_addr),
- AF_INET6 );
+ AF_INET6, &he, &hebuf,
+ &hp, &herr );
else
# endif /* LDAP_PF_INET6 */
- hp = gethostbyaddr(
+ ldap_pvt_gethostbyaddr_a(
(char *) &(from.sa_in_addr.sin_addr),
sizeof(from.sa_in_addr.sin_addr),
- AF_INET );
+ AF_INET, &he, &hebuf, &hp, &herr );
dnsname = hp ? ldap_pvt_str2lower( hp->h_name ) : NULL;
}
#else
{
/* DENY ACCESS */
Statslog( LDAP_DEBUG_STATS,
- "fd=%ld host access from %s (%s) denied.\n",
+ "fd=%ld DENIED from %s (%s)",
(long) s,
dnsname != NULL ? dnsname : SLAP_STRING_UNKNOWN,
peeraddr != NULL ? peeraddr : SLAP_STRING_UNKNOWN,
authid );
if( authid ) ch_free(authid);
+#ifdef SLAPD_RLOOKUPS
+ if( hebuf ) ldap_memfree(hebuf);
+#endif
if( id < 0 ) {
#ifdef NEW_LOGGING
}
Statslog( LDAP_DEBUG_STATS,
- "daemon: conn=%ld fd=%ld connection from %s "
- "(%s) accepted.\n",
+ "conn=%ld fd=%ld ACCEPT from %s "
+ "(%s)\n",
id, (long) s,
peername,
slap_listeners[l]->sl_name.bv_val,