mirror of
https://github.com/topjohnwu/ndk-busybox.git
synced 2024-11-23 19:59:41 +00:00
b164cdb854
function old new delta packed_usage 33485 33527 +42 Signed-off-by: Denys Vlasenko <vda.linux@googlemail.com>
178 lines
5.3 KiB
C
178 lines
5.3 KiB
C
/*
|
|
* Pscan is a mini port scanner implementation for busybox
|
|
*
|
|
* Copyright 2007 Tito Ragusa <farmatito@tiscali.it>
|
|
*
|
|
* Licensed under GPLv2 or later, see file LICENSE in this source tree.
|
|
*/
|
|
//config:config PSCAN
|
|
//config: bool "pscan (6 kb)"
|
|
//config: default y
|
|
//config: help
|
|
//config: Simple network port scanner.
|
|
|
|
//applet:IF_PSCAN(APPLET(pscan, BB_DIR_USR_BIN, BB_SUID_DROP))
|
|
|
|
//kbuild:lib-$(CONFIG_PSCAN) += pscan.o
|
|
|
|
//usage:#define pscan_trivial_usage
|
|
//usage: "[-cb] [-p MIN_PORT] [-P MAX_PORT] [-t TIMEOUT] [-T MIN_RTT] HOST"
|
|
//usage:#define pscan_full_usage "\n\n"
|
|
//usage: "Scan HOST, print all open ports\n"
|
|
//usage: "\n -c Show closed ports too"
|
|
//usage: "\n -b Show blocked ports too"
|
|
//usage: "\n -p PORT Scan from this port (default 1)"
|
|
//usage: "\n -P PORT Scan up to this port (default 1024)"
|
|
//usage: "\n -t MS Timeout (default 5000 ms)"
|
|
//usage: "\n -T MS Minimum rtt (default 5 ms)"
|
|
|
|
#include "libbb.h"
|
|
|
|
/* debugging */
|
|
#ifdef DEBUG_PSCAN
|
|
#define DMSG(...) bb_error_msg(__VA_ARGS__)
|
|
#define DERR(...) bb_perror_msg(__VA_ARGS__)
|
|
#else
|
|
#define DMSG(...) ((void)0)
|
|
#define DERR(...) ((void)0)
|
|
#endif
|
|
|
|
static const char *port_name(unsigned port)
|
|
{
|
|
struct servent *server;
|
|
|
|
server = getservbyport(htons(port), NULL);
|
|
if (server)
|
|
return server->s_name;
|
|
return "unknown";
|
|
}
|
|
|
|
/* We don't expect to see 1000+ seconds delay, unsigned is enough */
|
|
#define MONOTONIC_US() ((unsigned)monotonic_us())
|
|
|
|
int pscan_main(int argc, char **argv) MAIN_EXTERNALLY_VISIBLE;
|
|
int pscan_main(int argc UNUSED_PARAM, char **argv)
|
|
{
|
|
const char *opt_max_port = "1024"; /* -P: default max port */
|
|
const char *opt_min_port = "1"; /* -p: default min port */
|
|
const char *opt_timeout = "5000"; /* -t: default timeout in msec */
|
|
/* We estimate rtt and wait rtt*4 before concluding that port is
|
|
* totally blocked. min rtt of 5 ms may be too low if you are
|
|
* scanning an Internet host behind saturated/traffic shaped link.
|
|
* Rule of thumb: with min_rtt of N msec, scanning 1000 ports
|
|
* will take N seconds at absolute minimum */
|
|
const char *opt_min_rtt = "5"; /* -T: default min rtt in msec */
|
|
const char *result_str;
|
|
len_and_sockaddr *lsap;
|
|
int s;
|
|
unsigned opt;
|
|
unsigned port, max_port, nports;
|
|
unsigned closed_ports = 0;
|
|
unsigned open_ports = 0;
|
|
/* all in usec */
|
|
unsigned timeout;
|
|
unsigned min_rtt;
|
|
unsigned rtt_4;
|
|
unsigned start, diff;
|
|
|
|
opt = getopt32(argv, "^"
|
|
"cbp:P:t:T:"
|
|
"\0" "=1", /* exactly one non-option */
|
|
&opt_min_port, &opt_max_port, &opt_timeout, &opt_min_rtt
|
|
);
|
|
argv += optind;
|
|
max_port = xatou_range(opt_max_port, 1, 65535);
|
|
port = xatou_range(opt_min_port, 1, max_port);
|
|
nports = max_port - port + 1;
|
|
min_rtt = xatou_range(opt_min_rtt, 1, INT_MAX/1000 / 4) * 1000;
|
|
timeout = xatou_range(opt_timeout, 1, INT_MAX/1000 / 4) * 1000;
|
|
/* Initial rtt is BIG: */
|
|
rtt_4 = timeout;
|
|
|
|
DMSG("min_rtt %u timeout %u", min_rtt, timeout);
|
|
|
|
lsap = xhost2sockaddr(*argv, port);
|
|
printf("Scanning %s ports %u to %u\n Port\tProto\tState\tService\n",
|
|
*argv, port, max_port);
|
|
|
|
for (; port <= max_port; port++) {
|
|
DMSG("rtt %u", rtt_4);
|
|
|
|
/* The SOCK_STREAM socket type is implemented on the TCP/IP protocol. */
|
|
set_nport(&lsap->u.sa, htons(port));
|
|
s = xsocket(lsap->u.sa.sa_family, SOCK_STREAM, 0);
|
|
/* We need unblocking socket so we don't need to wait for ETIMEOUT. */
|
|
/* Nonblocking connect typically "fails" with errno == EINPROGRESS */
|
|
ndelay_on(s);
|
|
|
|
DMSG("connect to port %u", port);
|
|
result_str = NULL;
|
|
start = MONOTONIC_US();
|
|
if (connect(s, &lsap->u.sa, lsap->len) == 0) {
|
|
/* Unlikely, for me even localhost fails :) */
|
|
DMSG("connect succeeded");
|
|
goto open;
|
|
}
|
|
/* Check for untypical errors... */
|
|
if (errno != EAGAIN && errno != EINPROGRESS
|
|
&& errno != ECONNREFUSED
|
|
) {
|
|
bb_perror_nomsg_and_die();
|
|
}
|
|
|
|
diff = 0;
|
|
while (1) {
|
|
if (errno == ECONNREFUSED) {
|
|
if (opt & 1) /* -c: show closed too */
|
|
result_str = "closed";
|
|
closed_ports++;
|
|
break;
|
|
}
|
|
DERR("port %u errno %d @%u", port, errno, diff);
|
|
|
|
if (diff > rtt_4) {
|
|
if (opt & 2) /* -b: show blocked too */
|
|
result_str = "blocked";
|
|
break;
|
|
}
|
|
/* Can sleep (much) longer than specified delay.
|
|
* We check rtt BEFORE we usleep, otherwise
|
|
* on localhost we'll have no writes done (!)
|
|
* before we exceed (rather small) rtt */
|
|
usleep(rtt_4 / 8);
|
|
open:
|
|
diff = MONOTONIC_US() - start;
|
|
DMSG("write to port %u @%u", port, diff - start);
|
|
if (write(s, " ", 1) >= 0) { /* We were able to write to the socket */
|
|
open_ports++;
|
|
result_str = "open";
|
|
break;
|
|
}
|
|
}
|
|
DMSG("out of loop @%u", diff);
|
|
if (result_str)
|
|
printf("%5u" "\t" "tcp" "\t" "%s" "\t" "%s" "\n",
|
|
port, result_str, port_name(port));
|
|
|
|
/* Estimate new rtt - we don't want to wait entire timeout
|
|
* for each port. *4 allows for rise in net delay.
|
|
* We increase rtt quickly (rtt_4*4), decrease slowly
|
|
* (diff is at least rtt_4/8, *4 == rtt_4/2)
|
|
* because we don't want to accidentally miss ports. */
|
|
rtt_4 = diff * 4;
|
|
if (rtt_4 < min_rtt)
|
|
rtt_4 = min_rtt;
|
|
if (rtt_4 > timeout)
|
|
rtt_4 = timeout;
|
|
/* Clean up */
|
|
close(s);
|
|
}
|
|
if (ENABLE_FEATURE_CLEAN_UP) free(lsap);
|
|
|
|
printf("%u closed, %u open, %u timed out (or blocked) ports\n",
|
|
closed_ports,
|
|
open_ports,
|
|
nports - (closed_ports + open_ports));
|
|
return EXIT_SUCCESS;
|
|
}
|