---
-- FTP functions.
--
-- @copyright Same as Nmap--See https://nmap.org/book/man-legal.html
local comm = require "comm"
local stdnse = require "stdnse"
local string = require "string"
local ipOps = require "ipOps"
local nmap = require "nmap"
_ENV = stdnse.module("ftp", stdnse.seeall)
local ERROR_MESSAGES = {
["EOF"] = "connection closed",
["TIMEOUT"] = "connection timeout",
["ERROR"] = "failed to receive data"
}
local crlf_pattern = "\r?\n"
--- Connects to the FTP server based on the provided options and returns the parsed banner.
--
-- @param host The host table
-- @param port The port table
-- @param opts The connection option table, from comm.lua.
-- @return socket The socket descriptor, or nil on errors
-- @return code The numeric response code, as returned by read_reply, or error message if socket is nil.
-- @return message The response message
-- @return buffer The socket read buffer function, to be passed to read_reply.
-- @see comm.lua
connect = function(host, port, opts)
opts = opts or {}
opts.recv_before = true
local socket, err, proto, ret = comm.tryssl(host, port, '', opts)
if not socket then
return socket, (ERROR_MESSAGES[ret] or 'unspecified error')
end
local buffer = stdnse.make_buffer(socket, crlf_pattern)
local pos = 1
-- Should we just pass the output of buffer()?
local usebuf = false
-- Since we already read the first chunk of banner from the socket,
-- we have to supply it line-by-line to read_reply.
local code, message = read_reply(function()
if usebuf then
-- done reading the initial banner; pass along the socket buffer.
return buffer()
end
-- Look for CRLF
local i, j = ret:find(crlf_pattern, pos)
if not i then
-- Didn't find it! Grab another chunk (up to CRLF) and return it
usebuf = true
local chunk = buffer()
return ret:sub(pos) .. chunk
end
local oldpos = pos
-- start the next search just after CRLF
pos = j + 1
if pos >= #ret then
-- We consumed the whole thing! Start calling buffer() next.
usebuf = true
end
return ret:sub(oldpos, i - 1)
end)
return socket, code, message, buffer
end
---
-- Read an FTP reply and return the numeric code and the message. See RFC 959,
-- section 4.2.
-- @param buffer The buffer returned by ftp.connect or created with
-- stdnse.make_buffer(socket, "\r?\n")
.
-- @return numeric code or nil
.
-- @return text reply or error message.
function read_reply(buffer)
local readline
local line, err
local code, message
local _, p, tmp
line, err = buffer()
if not line then
return line, err
end
-- Single-line response?
code, message = string.match(line, "^(%d%d%d) (.*)$")
if code then
return tonumber(code), message
end
-- Multi-line response?
_, p, code, message = string.find(line, "^(%d%d%d)%-(.*)$")
if p then
while true do
line, err = buffer()
if not line then
return line, err
end
tmp = string.match(line, "^%d%d%d (.*)$")
if tmp then
message = message .. "\n" .. tmp
break
end
message = message .. "\n" .. line
end
return tonumber(code), message
end
return nil, string.format("Unparseable response: %q", line)
end
--- Close an FTP command connection
--
-- @param socket The socket with the live connection
function close(socket)
socket:send("QUIT\r\n")
socket:close()
end
--- Issue a STARTTLS command.
--
-- @param socket The connected command socket
-- @param buffer The socket read buffer
-- @return Boolean true if AUTH TLS succeeded, false otherwise
-- @return error string on failure
function starttls(socket, buffer)
-- Send AUTH TLS command, ask the service to start encryption
local status, err = socket:send("AUTH TLS\r\n")
if not status then
return nil, err
end
local code, result = read_reply(buffer)
return code == 234, result
end
local function is_ssl(socket)
return pcall(socket.get_ssl_certificate, socket)
end
-- Should we try STARTTLS based on this error?
local function should_try_ssl(code, message)
return code and code >= 400 and (
message:match('[Ss][Ss][Ll]') or
message:match('[Tt][Ll][Ss]') or
message:match('[Ss][Ee][Cc][Uu][Rr]')
)
end
-- Try to reconnect over STARTTLS.
local function reconnect_ssl(socket, buffer)
local status, err = starttls(socket, buffer)
if status then
status, err = socket:reconnect_ssl()
if status then
return true
end
end
return nil, err
end
--- Authenticate with username and password
--
-- May negotiate AUTH TLS if required
-- @param socket The connected command socket
-- @param buffer The socket read buffer
-- @param username The username to send
-- @param password The password to send
-- @param acct (optional) If the server requires it, send this account name. Default: username
-- @return Boolean true if auth succeeded, false otherwise
-- @return FTP response code
-- @return FTP response message
function auth(socket, buffer, username, password, acct)
local already_ssl = is_ssl(socket)
::TRY_AGAIN::
local status, err = socket:send(("USER %s\r\n"):format(username))
if not status then
return nil, err
end
local code, message = read_reply(buffer)
if code == 331 then
-- 331: User name okay, need password.
status, err =socket:send(("PASS %s\r\n"):format(password))
if not status then
return nil, err
end
code, message = read_reply(buffer)
elseif not already_ssl and should_try_ssl(code, message) then
if not reconnect_ssl(socket, buffer) then
return nil
end
already_ssl = true
goto TRY_AGAIN
end
if code == 332 then
-- 332: Need account for login.
-- This is rarely seen but may come in response to a
-- USER or PASS command.
status, err = socket:send("ACCT %s\r\n"):format(acct or username)
if not status then
return nil, err
end
code, message = read_reply(buffer)
if code == 331 then
-- 331: User name okay, need password.
status, err = socket:send("PASS %s\r\n"):format(password)
if not status then
return nil, err
end
code, message = read_reply(buffer)
elseif not already_ssl and should_try_ssl(code, message) then
if not reconnect_ssl(socket, buffer) then
return nil
end
already_ssl = true
goto TRY_AGAIN
end
end
if code and code >= 200 and code < 300 then
-- We are primarily looking for 230: User logged in, proceed.
return true, code, message
else
if code and not already_ssl and should_try_ssl(code, message) then
if not reconnect_ssl(socket, buffer) then
return nil
end
already_ssl = true
goto TRY_AGAIN
end
return nil, code, message
end
end
--- Start PASV mode
--
-- For IPv6 connections, attempts to use EPSV (RFC 2428). If the server sends an address that is not the target address, then this is an error.
-- @param socket The connected command socket
-- @param buffer The receive buffer
-- @return The connected data socket, or nil on error
-- @return Error message if data socket is nil
function pasv(socket, buffer)
local epsv = false
local status, lhost, lport, rhost, rport = socket:get_info()
if not status then
return nil, ("Can't determine remote host IP: %s"):format(lhost)
end
epsv = #ipOps.ip_to_str(rhost) > 4
::TRY_AGAIN::
local cmd = epsv and "EPSV" or "PASV"
-- ask the server for a Passive Mode: it should give us a port to
-- listen to, where it will dump the directory listing
local status, err = socket:send(cmd .. "\r\n")
if not status then
return status, err
end
local code, message = read_reply(buffer)
local pasv_port
if epsv then
if not code then
return nil, ("EPSV failed: socket %s"):format(message)
elseif code ~= 229 then
stdnse.debug2("Falling back to PASV. EPSV: %d %s", code, message)
epsv = false
goto TRY_AGAIN
end
status, pasv_port = string.match(message, "%((.)%1%1(%d+)%1%)")
if not status then
stdnse.debug2("Can't parse EPSV response: %s", message)
epsv = false
goto TRY_AGAIN
end
else
if not code or code >= 300 then
return nil, ("PASV failed: %s %s"):format(code or "socket", message)
end
-- Compute the PASV port as given by the server
-- The server should answer with something like
-- 2xx Entering Passive Mode (a,b,c,d,hp,lp)
-- (-- IP--,PORT)
-- PORT is (hp x 256) + lp
local ip, high, low = string.match(message, "%((%d+,%d+,%d+,%d+),(%d+),(%d+)%)")
if not ip then
return nil, string.format("Can't parse PASV response: %q", message)
end
ip = ip:gsub(",", ".")
if not (ipOps.compare_ip(ip, "eq", rhost) or ipOps.compare_ip(ip, "eq", "0.0.0.0")) then
return nil, ("PASV IP %s is not the same as %s"):format(ip, rhost)
end
pasv_port = high * 256 + low
end
local list_socket = nmap.new_socket()
status, err = list_socket:connect(rhost, pasv_port, "tcp")
if not status then
return status, err
end
return list_socket
end
return _ENV;