logging.c 14 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498
  1. /*
  2. * Session logging.
  3. */
  4. #include <stdio.h>
  5. #include <stdlib.h>
  6. #include <ctype.h>
  7. #include <time.h>
  8. #include <assert.h>
  9. #include "putty.h"
  10. /* log session to file stuff ... */
  11. struct LogContext_tag {
  12. FILE *lgfp;
  13. enum { L_CLOSED, L_OPENING, L_OPEN, L_ERROR } state;
  14. bufchain queue;
  15. Filename *currlogfilename;
  16. Frontend *frontend;
  17. Conf *conf;
  18. int logtype; /* cached out of conf */
  19. };
  20. static Filename *xlatlognam(Filename *s, char *hostname, int port,
  21. struct tm *tm);
  22. /*
  23. * Internal wrapper function which must be called for _all_ output
  24. * to the log file. It takes care of opening the log file if it
  25. * isn't open, buffering data if it's in the process of being
  26. * opened asynchronously, etc.
  27. */
  28. static void logwrite(LogContext *ctx, void *data, int len)
  29. {
  30. /*
  31. * In state L_CLOSED, we call logfopen, which will set the state
  32. * to one of L_OPENING, L_OPEN or L_ERROR. Hence we process all of
  33. * those three _after_ processing L_CLOSED.
  34. */
  35. if (ctx->state == L_CLOSED)
  36. logfopen(ctx);
  37. if (ctx->state == L_OPENING) {
  38. bufchain_add(&ctx->queue, data, len);
  39. } else if (ctx->state == L_OPEN) {
  40. assert(ctx->lgfp);
  41. if (fwrite(data, 1, len, ctx->lgfp) < (size_t)len) {
  42. logfclose(ctx);
  43. ctx->state = L_ERROR;
  44. /* Log state is L_ERROR so this won't cause a loop */
  45. logevent(ctx->frontend,
  46. "Disabled writing session log due to error while writing");
  47. }
  48. } /* else L_ERROR, so ignore the write */
  49. }
  50. /*
  51. * Convenience wrapper on logwrite() which printf-formats the
  52. * string.
  53. */
  54. static void logprintf(LogContext *ctx, const char *fmt, ...)
  55. {
  56. va_list ap;
  57. char *data;
  58. va_start(ap, fmt);
  59. data = dupvprintf(fmt, ap);
  60. va_end(ap);
  61. logwrite(ctx, data, strlen(data));
  62. sfree(data);
  63. }
  64. /*
  65. * Flush any open log file.
  66. */
  67. void logflush(LogContext *ctx)
  68. {
  69. if (ctx->logtype > 0)
  70. if (ctx->state == L_OPEN)
  71. fflush(ctx->lgfp);
  72. }
  73. static void logfopen_callback(void *vctx, int mode)
  74. {
  75. LogContext *ctx = (LogContext *)vctx;
  76. char buf[256], *event;
  77. struct tm tm;
  78. const char *fmode;
  79. int shout = FALSE;
  80. if (mode == 0) {
  81. ctx->state = L_ERROR; /* disable logging */
  82. } else {
  83. fmode = (mode == 1 ? "ab" : "wb");
  84. ctx->lgfp = f_open(ctx->currlogfilename, fmode, FALSE);
  85. if (ctx->lgfp) {
  86. ctx->state = L_OPEN;
  87. } else {
  88. ctx->state = L_ERROR;
  89. shout = TRUE;
  90. }
  91. }
  92. if (ctx->state == L_OPEN) {
  93. /* Write header line into log file. */
  94. tm = ltime();
  95. strftime(buf, 24, "%Y.%m.%d %H:%M:%S", &tm);
  96. logprintf(ctx, "=~=~=~=~=~=~=~=~=~=~=~= PuTTY log %s"
  97. " =~=~=~=~=~=~=~=~=~=~=~=\r\n", buf);
  98. }
  99. event = dupprintf(MPEXT_BOM "%s session log (%s mode) to file: %s",
  100. ctx->state == L_ERROR ?
  101. (mode == 0 ? "Disabled writing" : "Error writing") :
  102. (mode == 1 ? "Appending" : "Writing new"),
  103. (ctx->logtype == LGTYP_ASCII ? "ASCII" :
  104. ctx->logtype == LGTYP_DEBUG ? "raw" :
  105. ctx->logtype == LGTYP_PACKETS ? "SSH packets" :
  106. ctx->logtype == LGTYP_SSHRAW ? "SSH raw data" :
  107. "unknown"),
  108. filename_to_str(ctx->currlogfilename));
  109. logevent(ctx->frontend, event);
  110. if (shout) {
  111. /*
  112. * If we failed to open the log file due to filesystem error
  113. * (as opposed to user action such as clicking Cancel in the
  114. * askappend box), we should log it more prominently. We do
  115. * this by sending it to the same place that stderr output
  116. * from the main session goes (so, either a console tool's
  117. * actual stderr, or a terminal window).
  118. *
  119. * Of course this is one case in which that policy won't cause
  120. * it to turn up embarrassingly in a log file of real server
  121. * output, because the whole point is that we haven't managed
  122. * to open any such log file :-)
  123. */
  124. from_backend(ctx->frontend, 1, event, strlen(event));
  125. from_backend(ctx->frontend, 1, "\r\n", 2);
  126. }
  127. sfree(event);
  128. /*
  129. * Having either succeeded or failed in opening the log file,
  130. * we should write any queued data out.
  131. */
  132. assert(ctx->state != L_OPENING); /* make _sure_ it won't be requeued */
  133. while (bufchain_size(&ctx->queue)) {
  134. void *data;
  135. int len;
  136. bufchain_prefix(&ctx->queue, &data, &len);
  137. logwrite(ctx, data, len);
  138. bufchain_consume(&ctx->queue, len);
  139. }
  140. }
  141. /*
  142. * Open the log file. Takes care of detecting an already-existing
  143. * file and asking the user whether they want to append, overwrite
  144. * or cancel logging.
  145. */
  146. void logfopen(LogContext *ctx)
  147. {
  148. struct tm tm;
  149. int mode;
  150. /* Prevent repeat calls */
  151. if (ctx->state != L_CLOSED)
  152. return;
  153. if (!ctx->logtype)
  154. return;
  155. tm = ltime();
  156. /* substitute special codes in file name */
  157. if (ctx->currlogfilename)
  158. filename_free(ctx->currlogfilename);
  159. ctx->currlogfilename =
  160. xlatlognam(conf_get_filename(ctx->conf, CONF_logfilename),
  161. conf_get_str(ctx->conf, CONF_host),
  162. conf_get_int(ctx->conf, CONF_port), &tm);
  163. if (open_for_write_would_lose_data(ctx->currlogfilename)) {
  164. int logxfovr = conf_get_int(ctx->conf, CONF_logxfovr);
  165. if (logxfovr != LGXF_ASK) {
  166. mode = ((logxfovr == LGXF_OVR) ? 2 : 1);
  167. } else
  168. mode = askappend(ctx->frontend, ctx->currlogfilename,
  169. logfopen_callback, ctx);
  170. } else
  171. mode = 2; /* create == overwrite */
  172. if (mode < 0)
  173. ctx->state = L_OPENING;
  174. else
  175. logfopen_callback(ctx, mode); /* open the file */
  176. }
  177. void logfclose(LogContext *ctx)
  178. {
  179. if (ctx->lgfp) {
  180. fclose(ctx->lgfp);
  181. ctx->lgfp = NULL;
  182. }
  183. ctx->state = L_CLOSED;
  184. }
  185. /*
  186. * Log session traffic.
  187. */
  188. void logtraffic(LogContext *ctx, unsigned char c, int logmode)
  189. {
  190. if (ctx->logtype > 0) {
  191. if (ctx->logtype == logmode)
  192. logwrite(ctx, &c, 1);
  193. }
  194. }
  195. /*
  196. * Log an Event Log entry. Used in SSH packet logging mode; this is
  197. * also as convenient a place as any to put the output of Event Log
  198. * entries to stderr when a command-line tool is in verbose mode.
  199. * (In particular, this is a better place to put it than in the
  200. * front ends, because it only has to be done once for all
  201. * platforms. Platforms which don't have a meaningful stderr can
  202. * just avoid defining FLAG_STDERR.
  203. */
  204. void log_eventlog(LogContext *ctx, const char *event)
  205. {
  206. if ((flags & FLAG_STDERR) && (flags & FLAG_VERBOSE)) {
  207. fprintf(stderr, "%s\n", event);
  208. fflush(stderr);
  209. }
  210. /* If we don't have a context yet (eg winnet.c init) then skip entirely */
  211. if (!ctx)
  212. return;
  213. if (ctx->logtype != LGTYP_PACKETS &&
  214. ctx->logtype != LGTYP_SSHRAW)
  215. return;
  216. logprintf(ctx, "Event Log: %s\r\n", event);
  217. logflush(ctx);
  218. }
  219. /*
  220. * Log an SSH packet.
  221. * If n_blanks != 0, blank or omit some parts.
  222. * Set of blanking areas must be in increasing order.
  223. */
  224. void log_packet(LogContext *ctx, int direction, int type,
  225. const char *texttype, const void *data, int len,
  226. int n_blanks, const struct logblank_t *blanks,
  227. const unsigned long *seq,
  228. unsigned downstream_id, const char *additional_log_text)
  229. {
  230. char dumpdata[80], smalldata[5];
  231. int p = 0, b = 0, omitted = 0;
  232. int output_pos = 0; /* NZ if pending output in dumpdata */
  233. if (!(ctx->logtype == LGTYP_SSHRAW ||
  234. (ctx->logtype == LGTYP_PACKETS && texttype)))
  235. return;
  236. /* Packet header. */
  237. if (texttype) {
  238. logprintf(ctx, "%s packet ",
  239. direction == PKT_INCOMING ? "Incoming" : "Outgoing");
  240. if (seq)
  241. logprintf(ctx, "#0x%lx, ", *seq);
  242. logprintf(ctx, "type %d / 0x%02x (%s)", type, type, texttype);
  243. if (downstream_id) {
  244. logprintf(ctx, " on behalf of downstream #%u", downstream_id);
  245. if (additional_log_text)
  246. logprintf(ctx, " (%s)", additional_log_text);
  247. }
  248. logprintf(ctx, "\r\n");
  249. } else {
  250. /*
  251. * Raw data is logged with a timestamp, so that it's possible
  252. * to determine whether a mysterious delay occurred at the
  253. * client or server end. (Timestamping the raw data avoids
  254. * cluttering the normal case of only logging decrypted SSH
  255. * messages, and also adds conceptual rigour in the case where
  256. * an SSH message arrives in several pieces.)
  257. */
  258. char buf[256];
  259. struct tm tm;
  260. tm = ltime();
  261. strftime(buf, 24, "%Y-%m-%d %H:%M:%S", &tm);
  262. logprintf(ctx, "%s raw data at %s\r\n",
  263. direction == PKT_INCOMING ? "Incoming" : "Outgoing",
  264. buf);
  265. }
  266. /*
  267. * Output a hex/ASCII dump of the packet body, blanking/omitting
  268. * parts as specified.
  269. */
  270. while (p < len) {
  271. int blktype;
  272. /* Move to a current entry in the blanking array. */
  273. while ((b < n_blanks) &&
  274. (p >= blanks[b].offset + blanks[b].len))
  275. b++;
  276. /* Work out what type of blanking to apply to
  277. * this byte. */
  278. blktype = PKTLOG_EMIT; /* default */
  279. if ((b < n_blanks) &&
  280. (p >= blanks[b].offset) &&
  281. (p < blanks[b].offset + blanks[b].len))
  282. blktype = blanks[b].type;
  283. /* If we're about to stop omitting, it's time to say how
  284. * much we omitted. */
  285. if ((blktype != PKTLOG_OMIT) && omitted) {
  286. logprintf(ctx, " (%d byte%s omitted)\r\n",
  287. omitted, (omitted==1?"":"s"));
  288. omitted = 0;
  289. }
  290. /* (Re-)initialise dumpdata as necessary
  291. * (start of row, or if we've just stopped omitting) */
  292. if (!output_pos && !omitted)
  293. sprintf(dumpdata, " %08x%*s\r\n", p-(p%16), 1+3*16+2+16, "");
  294. /* Deal with the current byte. */
  295. if (blktype == PKTLOG_OMIT) {
  296. omitted++;
  297. } else {
  298. int c;
  299. if (blktype == PKTLOG_BLANK) {
  300. c = 'X';
  301. sprintf(smalldata, "XX");
  302. } else { /* PKTLOG_EMIT */
  303. c = ((unsigned char *)data)[p];
  304. sprintf(smalldata, "%02x", c);
  305. }
  306. dumpdata[10+2+3*(p%16)] = smalldata[0];
  307. dumpdata[10+2+3*(p%16)+1] = smalldata[1];
  308. dumpdata[10+1+3*16+2+(p%16)] = (c >= 0x20 && c < 0x7F ? c : '.');
  309. output_pos = (p%16) + 1;
  310. }
  311. p++;
  312. /* Flush row if necessary */
  313. if (((p % 16) == 0) || (p == len) || omitted) {
  314. if (output_pos) {
  315. strcpy(dumpdata + 10+1+3*16+2+output_pos, "\r\n");
  316. logwrite(ctx, dumpdata, strlen(dumpdata));
  317. output_pos = 0;
  318. }
  319. }
  320. }
  321. /* Tidy up */
  322. if (omitted)
  323. logprintf(ctx, " (%d byte%s omitted)\r\n",
  324. omitted, (omitted==1?"":"s"));
  325. logflush(ctx);
  326. }
  327. LogContext *log_init(Frontend *frontend, Conf *conf)
  328. {
  329. LogContext *ctx = snew(LogContext);
  330. ctx->lgfp = NULL;
  331. ctx->state = L_CLOSED;
  332. ctx->frontend = frontend;
  333. ctx->conf = conf_copy(conf);
  334. ctx->logtype = conf_get_int(ctx->conf, CONF_logtype);
  335. ctx->currlogfilename = NULL;
  336. bufchain_init(&ctx->queue);
  337. return ctx;
  338. }
  339. void log_free(LogContext *ctx)
  340. {
  341. logfclose(ctx);
  342. bufchain_clear(&ctx->queue);
  343. if (ctx->currlogfilename)
  344. filename_free(ctx->currlogfilename);
  345. conf_free(ctx->conf);
  346. sfree(ctx);
  347. }
  348. void log_reconfig(LogContext *ctx, Conf *conf)
  349. {
  350. int reset_logging;
  351. if (!filename_equal(conf_get_filename(ctx->conf, CONF_logfilename),
  352. conf_get_filename(conf, CONF_logfilename)) ||
  353. conf_get_int(ctx->conf, CONF_logtype) !=
  354. conf_get_int(conf, CONF_logtype))
  355. reset_logging = TRUE;
  356. else
  357. reset_logging = FALSE;
  358. if (reset_logging)
  359. logfclose(ctx);
  360. conf_free(ctx->conf);
  361. ctx->conf = conf_copy(conf);
  362. ctx->logtype = conf_get_int(ctx->conf, CONF_logtype);
  363. if (reset_logging)
  364. logfopen(ctx);
  365. }
  366. /*
  367. * translate format codes into time/date strings
  368. * and insert them into log file name
  369. *
  370. * "&Y":YYYY "&m":MM "&d":DD "&T":hhmmss "&h":<hostname> "&&":&
  371. */
  372. static Filename *xlatlognam(Filename *src, char *hostname, int port,
  373. struct tm *tm)
  374. {
  375. char buf[32], *bufp;
  376. int size;
  377. char *buffer;
  378. int buflen, bufsize;
  379. const char *s;
  380. Filename *ret;
  381. bufsize = FILENAME_MAX;
  382. buffer = snewn(bufsize, char);
  383. buflen = 0;
  384. s = filename_to_str(src);
  385. while (*s) {
  386. int sanitise = FALSE;
  387. /* Let (bufp, len) be the string to append. */
  388. bufp = buf; /* don't usually override this */
  389. if (*s == '&') {
  390. char c;
  391. s++;
  392. size = 0;
  393. if (*s) switch (c = *s++, tolower((unsigned char)c)) {
  394. case 'y':
  395. size = strftime(buf, sizeof(buf), "%Y", tm);
  396. break;
  397. case 'm':
  398. size = strftime(buf, sizeof(buf), "%m", tm);
  399. break;
  400. case 'd':
  401. size = strftime(buf, sizeof(buf), "%d", tm);
  402. break;
  403. case 't':
  404. size = strftime(buf, sizeof(buf), "%H%M%S", tm);
  405. break;
  406. case 'h':
  407. bufp = hostname;
  408. size = strlen(bufp);
  409. break;
  410. case 'p':
  411. size = sprintf(buf, "%d", port);
  412. break;
  413. default:
  414. buf[0] = '&';
  415. size = 1;
  416. if (c != '&')
  417. buf[size++] = c;
  418. }
  419. /* Never allow path separators - or any other illegal
  420. * filename character - to come out of any of these
  421. * auto-format directives. E.g. 'hostname' can contain
  422. * colons, if it's an IPv6 address, and colons aren't
  423. * legal in filenames on Windows. */
  424. sanitise = TRUE;
  425. } else {
  426. buf[0] = *s++;
  427. size = 1;
  428. }
  429. if (bufsize <= buflen + size) {
  430. bufsize = (buflen + size) * 5 / 4 + 512;
  431. buffer = sresize(buffer, bufsize, char);
  432. }
  433. while (size-- > 0) {
  434. char c = *bufp++;
  435. if (sanitise)
  436. c = filename_char_sanitise(c);
  437. buffer[buflen++] = c;
  438. }
  439. }
  440. buffer[buflen] = '\0';
  441. ret = filename_from_str(buffer);
  442. sfree(buffer);
  443. return ret;
  444. }