ftpsesame status

Gergo Szakal bastyaelvtars at gmail.com
Thu Aug 31 02:13:24 PDT 2006


Last time I checked ftpsesame still dropped those strange errors (and we 
debugged with Joerg), if one could feed me with the current state, I 
should be very grateful.
Apologies for my impatience, don't wanna seem a pest, but I need this 
piece of software badly, since the lack of it prevents me from using DF 
in a real "production" environment.

Debug info:

bash-3.1# gdb ftpsesame
GNU gdb 6.2.1
Copyright 2004 Free Software Foundation, Inc.
GDB is free software, covered by the GNU General Public License, and you are
welcome to change it and/or distribute copies of it under certain 
conditions.
Type "show copying" to see the conditions.
There is absolutely no warranty for GDB.  Type "show warranty" for details.
This GDB was configured as "i386-dragonfly"...
(gdb) set args -d -D7 -irl0
(gdb) b filter_allow
Breakpoint 1 at 0x80493c0: file filter.c, line 104.
(gdb) run
Starting program: /home/szg/ftpsesame-0.95/ftpsesame -d -D7 -irl0
listening on rl0, filter 'tcp and port 21', snaplen 500
#1 session init: client 160.114.118.95:4421, server 193.6.210.44:21
#1 client: USER anonymous
#1 server: 331 Please specify the password.
#1 client: PASS -wget@
#1 server: 230 Login successful.
#1 client: SYST
#1 server: 215 UNIX Type: L8
#1 client: PWD
#1 server: 257 "/"
#1 client: TYPE I
#1 server: 200 Switching to Binary mode.
#1 client: CWD /pub/linux/mirrors/knoppix
#1 server: 250-Check KNOPPIX-CHANGELOG.txt for the recent changes in 
KNOPPIX.
#1 client: SIZE KNOPPIX_V5.0.1CD-2006-06-01-DE.iso
#1 server: 213 730036224
#1 client: PORT 160,114,118,95,17,70
#1 server: 200 PORT command successful. Consider using PASV.
#1 active: PORT 160,114,118,95,17,70
#1 allowing 193.6.210.44 to 160.114.118.95 port 4422

Breakpoint 1, filter_allow (id=1, src=0x28161974, src2=0x281270ab, 
dst=0xbfbff738, d_port=4422) at filter.c:104
104     {
(gdb) n
109             snprintf(an, PF_ANCHOR_NAME_SIZE, "%s/%d.%d", 
FTPSESAME_ANCHOR,
(gdb) n
111             strlcpy(pfp.anchor, an, PF_ANCHOR_NAME_SIZE);
(gdb) n
112             strlcpy(pfr.anchor, an, PF_ANCHOR_NAME_SIZE);
(gdb) n
113             strlcpy(pfte.anchor, an, PF_ANCHOR_NAME_SIZE);
(gdb) n
114             strlcpy(pfte.ruleset, "ftpsesame/*", PF_RULESET_NAME_SIZE);
(gdb) n
116             if (ioctl(dev, DIOCXBEGIN, &pft) == -1)
(gdb) n
117                     return (0);
(gdb) n
116             if (ioctl(dev, DIOCXBEGIN, &pft) == -1)
(gdb) n
118             pfr.ticket = pfte.ticket;
(gdb) n
120             if (ioctl(dev, DIOCBEGINADDRS, &pfp) == -1)
(gdb) n
121                     return (0);
(gdb) n
120             if (ioctl(dev, DIOCBEGINADDRS, &pfp) == -1)
(gdb) n
122             pfr.pool_ticket = pfp.ticket;
(gdb) n
124             if (src != NULL && dst != NULL && d_port != 0) {
(gdb) n
125                     memcpy(&pfr.rule.src.addr.v.a.addr.v4, src, 4);
(gdb) n
126                     memcpy(&pfr.rule.dst.addr.v.a.addr.v4, dst, 4);
(gdb) n
166             return (__byte_swap16(_x));
(gdb) n
165     {
(gdb) n
128                     if (ioctl(dev, DIOCADDRULE, &pfr) == -1)
(gdb) n
129                             return (0);
(gdb) n
128                     if (ioctl(dev, DIOCADDRULE, &pfr) == -1)
(gdb) n
142     }
(gdb) n
servertalk (s=0x28169000, sbuf=0x28161974 "200 PORT command successful. 
Consider using PASV.") at errno.h:52
52              return (&errno);
(gdb) n
51      {
(gdb) n
#1 filter_allow failed: Invalid argument
201     }
(gdb) n
process_pkt (notused=0x0, h=0xa, p=0x28161954 "") at ftpsesame.c:438
438             s->clientbuf[0] = '\0';
(gdb) n
439     }





More information about the Users mailing list