ftpsesame status
Gergo Szakal
bastyaelvtars at gmail.com
Thu Aug 31 02:13:24 PDT 2006
Last time I checked ftpsesame still dropped those strange errors (and we
debugged with Joerg), if one could feed me with the current state, I
should be very grateful.
Apologies for my impatience, don't wanna seem a pest, but I need this
piece of software badly, since the lack of it prevents me from using DF
in a real "production" environment.
Debug info:
bash-3.1# gdb ftpsesame
GNU gdb 6.2.1
Copyright 2004 Free Software Foundation, Inc.
GDB is free software, covered by the GNU General Public License, and you are
welcome to change it and/or distribute copies of it under certain
conditions.
Type "show copying" to see the conditions.
There is absolutely no warranty for GDB. Type "show warranty" for details.
This GDB was configured as "i386-dragonfly"...
(gdb) set args -d -D7 -irl0
(gdb) b filter_allow
Breakpoint 1 at 0x80493c0: file filter.c, line 104.
(gdb) run
Starting program: /home/szg/ftpsesame-0.95/ftpsesame -d -D7 -irl0
listening on rl0, filter 'tcp and port 21', snaplen 500
#1 session init: client 160.114.118.95:4421, server 193.6.210.44:21
#1 client: USER anonymous
#1 server: 331 Please specify the password.
#1 client: PASS -wget@
#1 server: 230 Login successful.
#1 client: SYST
#1 server: 215 UNIX Type: L8
#1 client: PWD
#1 server: 257 "/"
#1 client: TYPE I
#1 server: 200 Switching to Binary mode.
#1 client: CWD /pub/linux/mirrors/knoppix
#1 server: 250-Check KNOPPIX-CHANGELOG.txt for the recent changes in
KNOPPIX.
#1 client: SIZE KNOPPIX_V5.0.1CD-2006-06-01-DE.iso
#1 server: 213 730036224
#1 client: PORT 160,114,118,95,17,70
#1 server: 200 PORT command successful. Consider using PASV.
#1 active: PORT 160,114,118,95,17,70
#1 allowing 193.6.210.44 to 160.114.118.95 port 4422
Breakpoint 1, filter_allow (id=1, src=0x28161974, src2=0x281270ab,
dst=0xbfbff738, d_port=4422) at filter.c:104
104 {
(gdb) n
109 snprintf(an, PF_ANCHOR_NAME_SIZE, "%s/%d.%d",
FTPSESAME_ANCHOR,
(gdb) n
111 strlcpy(pfp.anchor, an, PF_ANCHOR_NAME_SIZE);
(gdb) n
112 strlcpy(pfr.anchor, an, PF_ANCHOR_NAME_SIZE);
(gdb) n
113 strlcpy(pfte.anchor, an, PF_ANCHOR_NAME_SIZE);
(gdb) n
114 strlcpy(pfte.ruleset, "ftpsesame/*", PF_RULESET_NAME_SIZE);
(gdb) n
116 if (ioctl(dev, DIOCXBEGIN, &pft) == -1)
(gdb) n
117 return (0);
(gdb) n
116 if (ioctl(dev, DIOCXBEGIN, &pft) == -1)
(gdb) n
118 pfr.ticket = pfte.ticket;
(gdb) n
120 if (ioctl(dev, DIOCBEGINADDRS, &pfp) == -1)
(gdb) n
121 return (0);
(gdb) n
120 if (ioctl(dev, DIOCBEGINADDRS, &pfp) == -1)
(gdb) n
122 pfr.pool_ticket = pfp.ticket;
(gdb) n
124 if (src != NULL && dst != NULL && d_port != 0) {
(gdb) n
125 memcpy(&pfr.rule.src.addr.v.a.addr.v4, src, 4);
(gdb) n
126 memcpy(&pfr.rule.dst.addr.v.a.addr.v4, dst, 4);
(gdb) n
166 return (__byte_swap16(_x));
(gdb) n
165 {
(gdb) n
128 if (ioctl(dev, DIOCADDRULE, &pfr) == -1)
(gdb) n
129 return (0);
(gdb) n
128 if (ioctl(dev, DIOCADDRULE, &pfr) == -1)
(gdb) n
142 }
(gdb) n
servertalk (s=0x28169000, sbuf=0x28161974 "200 PORT command successful.
Consider using PASV.") at errno.h:52
52 return (&errno);
(gdb) n
51 {
(gdb) n
#1 filter_allow failed: Invalid argument
201 }
(gdb) n
process_pkt (notused=0x0, h=0xa, p=0x28161954 "") at ftpsesame.c:438
438 s->clientbuf[0] = '\0';
(gdb) n
439 }
More information about the Users
mailing list