// Copyright (c) 2010 The Chromium Authors. All rights reserved. // Use of this source code is governed by a BSD-style license that can be // found in the LICENSE file. #include "net/ftp/ftp_network_transaction.h" #include "base/compiler_specific.h" #include "base/metrics/histogram.h" #include "base/string_number_conversions.h" #include "base/string_util.h" #include "base/utf_string_conversions.h" #include "net/base/address_list.h" #include "net/base/connection_type_histograms.h" #include "net/base/escape.h" #include "net/base/net_errors.h" #include "net/base/net_log.h" #include "net/base/net_util.h" #include "net/ftp/ftp_network_session.h" #include "net/ftp/ftp_request_info.h" #include "net/ftp/ftp_util.h" #include "net/socket/client_socket.h" #include "net/socket/client_socket_factory.h" // TODO(ibrar): Try to avoid sscanf. #if !defined(COMPILER_MSVC) #define sscanf_s sscanf #endif const char kCRLF[] = "\r\n"; const int kCtrlBufLen = 1024; namespace { // Returns true if |input| can be safely used as a part of FTP command. bool IsValidFTPCommandString(const std::string& input) { // RFC 959 only allows ASCII strings, but at least Firefox can send non-ASCII // characters in the command if the request path contains them. To be // compatible, we do the same and allow non-ASCII characters in a command. // Protect agains newline injection attack. if (input.find_first_of("\r\n") != std::string::npos) return false; return true; } enum ErrorClass { // The requested action was initiated. The client should expect another // reply before issuing the next command. ERROR_CLASS_INITIATED, // The requested action has been successfully completed. ERROR_CLASS_OK, // The command has been accepted, but to complete the operation, more // information must be sent by the client. ERROR_CLASS_INFO_NEEDED, // The command was not accepted and the requested action did not take place. // This condition is temporary, and the client is encouraged to restart the // command sequence. ERROR_CLASS_TRANSIENT_ERROR, // The command was not accepted and the requested action did not take place. // This condition is rather permanent, and the client is discouraged from // repeating the exact request. ERROR_CLASS_PERMANENT_ERROR, }; // Returns the error class for given response code. Caller should ensure // that |response_code| is in range 100-599. ErrorClass GetErrorClass(int response_code) { if (response_code >= 100 && response_code <= 199) return ERROR_CLASS_INITIATED; if (response_code >= 200 && response_code <= 299) return ERROR_CLASS_OK; if (response_code >= 300 && response_code <= 399) return ERROR_CLASS_INFO_NEEDED; if (response_code >= 400 && response_code <= 499) return ERROR_CLASS_TRANSIENT_ERROR; if (response_code >= 500 && response_code <= 599) return ERROR_CLASS_PERMANENT_ERROR; // We should not be called on invalid error codes. NOTREACHED() << response_code; return ERROR_CLASS_PERMANENT_ERROR; } // Returns network error code for received FTP |response_code|. int GetNetErrorCodeForFtpResponseCode(int response_code) { switch (response_code) { case 421: return net::ERR_FTP_SERVICE_UNAVAILABLE; case 426: return net::ERR_FTP_TRANSFER_ABORTED; case 450: return net::ERR_FTP_FILE_BUSY; case 500: case 501: return net::ERR_FTP_SYNTAX_ERROR; case 502: case 504: return net::ERR_FTP_COMMAND_NOT_SUPPORTED; case 503: return net::ERR_FTP_BAD_COMMAND_SEQUENCE; default: return net::ERR_FTP_FAILED; } } // From RFC 2428 Section 3: // The text returned in response to the EPSV command MUST be: // <some text> (<d><d><d><tcp-port><d>) // <d> is a delimiter character, ideally to be | bool ExtractPortFromEPSVResponse(const net::FtpCtrlResponse& response, int* port) { if (response.lines.size() != 1) return false; const char* ptr = response.lines[0].c_str(); while (*ptr && *ptr != '(') ++ptr; if (!*ptr) return false; char sep = *(++ptr); if (!sep || isdigit(sep) || *(++ptr) != sep || *(++ptr) != sep) return false; if (!isdigit(*(++ptr))) return false; *port = *ptr - '0'; while (isdigit(*(++ptr))) { *port *= 10; *port += *ptr - '0'; } if (*ptr != sep) return false; return true; } // There are two way we can receive IP address and port. // (127,0,0,1,23,21) IP address and port encapsulated in (). // 127,0,0,1,23,21 IP address and port without (). // // See RFC 959, Section 4.1.2 bool ExtractPortFromPASVResponse(const net::FtpCtrlResponse& response, int* port) { if (response.lines.size() != 1) return false; const char* ptr = response.lines[0].c_str(); while (*ptr && *ptr != '(') // Try with bracket. ++ptr; if (*ptr) { ++ptr; } else { ptr = response.lines[0].c_str(); // Try without bracket. while (*ptr && *ptr != ',') ++ptr; while (*ptr && *ptr != ' ') --ptr; } int i0, i1, i2, i3, p0, p1; if (sscanf_s(ptr, "%d,%d,%d,%d,%d,%d", &i0, &i1, &i2, &i3, &p0, &p1) != 6) return false; // Ignore the IP address supplied in the response. We are always going // to connect back to the same server to prevent FTP PASV port scanning. *port = (p0 << 8) + p1; return true; } } // namespace namespace net { FtpNetworkTransaction::FtpNetworkTransaction( FtpNetworkSession* session, ClientSocketFactory* socket_factory) : command_sent_(COMMAND_NONE), ALLOW_THIS_IN_INITIALIZER_LIST( io_callback_(this, &FtpNetworkTransaction::OnIOComplete)), user_callback_(NULL), session_(session), request_(NULL), resolver_(session->host_resolver()), read_ctrl_buf_(new IOBuffer(kCtrlBufLen)), ctrl_response_buffer_(new FtpCtrlResponseBuffer()), read_data_buf_len_(0), last_error_(OK), system_type_(SYSTEM_TYPE_UNKNOWN), // Use image (binary) transfer by default. It should always work, // whereas the ascii transfer may damage binary data. data_type_(DATA_TYPE_IMAGE), resource_type_(RESOURCE_TYPE_UNKNOWN), use_epsv_(true), data_connection_port_(0), socket_factory_(socket_factory), next_state_(STATE_NONE) { } FtpNetworkTransaction::~FtpNetworkTransaction() { } int FtpNetworkTransaction::Stop(int error) { if (command_sent_ == COMMAND_QUIT) return error; next_state_ = STATE_CTRL_WRITE_QUIT; last_error_ = error; return OK; } int FtpNetworkTransaction::RestartIgnoringLastError( CompletionCallback* callback) { return ERR_NOT_IMPLEMENTED; } int FtpNetworkTransaction::Start(const FtpRequestInfo* request_info, CompletionCallback* callback, const BoundNetLog& net_log) { net_log_ = net_log; request_ = request_info; if (request_->url.has_username()) { GetIdentityFromURL(request_->url, &username_, &password_); } else { username_ = ASCIIToUTF16("anonymous"); password_ = ASCIIToUTF16("chrome@example.com"); } DetectTypecode(); next_state_ = STATE_CTRL_RESOLVE_HOST; int rv = DoLoop(OK); if (rv == ERR_IO_PENDING) user_callback_ = callback; return rv; } int FtpNetworkTransaction::RestartWithAuth(const string16& username, const string16& password, CompletionCallback* callback) { ResetStateForRestart(); username_ = username; password_ = password; next_state_ = STATE_CTRL_RESOLVE_HOST; int rv = DoLoop(OK); if (rv == ERR_IO_PENDING) user_callback_ = callback; return rv; } int FtpNetworkTransaction::Read(IOBuffer* buf, int buf_len, CompletionCallback* callback) { DCHECK(buf); DCHECK_GT(buf_len, 0); read_data_buf_ = buf; read_data_buf_len_ = buf_len; next_state_ = STATE_DATA_READ; int rv = DoLoop(OK); if (rv == ERR_IO_PENDING) user_callback_ = callback; return rv; } const FtpResponseInfo* FtpNetworkTransaction::GetResponseInfo() const { return &response_; } LoadState FtpNetworkTransaction::GetLoadState() const { if (next_state_ == STATE_CTRL_RESOLVE_HOST_COMPLETE) return LOAD_STATE_RESOLVING_HOST; if (next_state_ == STATE_CTRL_CONNECT_COMPLETE || next_state_ == STATE_DATA_CONNECT_COMPLETE) return LOAD_STATE_CONNECTING; if (next_state_ == STATE_DATA_READ_COMPLETE) return LOAD_STATE_READING_RESPONSE; if (command_sent_ == COMMAND_RETR && read_data_buf_.get()) return LOAD_STATE_READING_RESPONSE; if (command_sent_ == COMMAND_QUIT) return LOAD_STATE_IDLE; if (command_sent_ != COMMAND_NONE) return LOAD_STATE_SENDING_REQUEST; return LOAD_STATE_IDLE; } uint64 FtpNetworkTransaction::GetUploadProgress() const { return 0; } void FtpNetworkTransaction::ResetStateForRestart() { command_sent_ = COMMAND_NONE; user_callback_ = NULL; response_ = FtpResponseInfo(); read_ctrl_buf_ = new IOBuffer(kCtrlBufLen); ctrl_response_buffer_.reset(new FtpCtrlResponseBuffer()); read_data_buf_ = NULL; read_data_buf_len_ = 0; if (write_buf_) write_buf_->SetOffset(0); last_error_ = OK; data_connection_port_ = 0; ctrl_socket_.reset(); data_socket_.reset(); next_state_ = STATE_NONE; } void FtpNetworkTransaction::DoCallback(int rv) { DCHECK(rv != ERR_IO_PENDING); DCHECK(user_callback_); // Since Run may result in Read being called, clear callback_ up front. CompletionCallback* c = user_callback_; user_callback_ = NULL; c->Run(rv); } void FtpNetworkTransaction::OnIOComplete(int result) { int rv = DoLoop(result); if (rv != ERR_IO_PENDING) DoCallback(rv); } int FtpNetworkTransaction::ProcessCtrlResponse() { FtpCtrlResponse response = ctrl_response_buffer_->PopResponse(); int rv = OK; switch (command_sent_) { case COMMAND_NONE: // TODO(phajdan.jr): Check for errors in the welcome message. next_state_ = STATE_CTRL_WRITE_USER; break; case COMMAND_USER: rv = ProcessResponseUSER(response); break; case COMMAND_PASS: rv = ProcessResponsePASS(response); break; case COMMAND_SYST: rv = ProcessResponseSYST(response); break; case COMMAND_PWD: rv = ProcessResponsePWD(response); break; case COMMAND_TYPE: rv = ProcessResponseTYPE(response); break; case COMMAND_EPSV: rv = ProcessResponseEPSV(response); break; case COMMAND_PASV: rv = ProcessResponsePASV(response); break; case COMMAND_SIZE: rv = ProcessResponseSIZE(response); break; case COMMAND_RETR: rv = ProcessResponseRETR(response); break; case COMMAND_CWD: rv = ProcessResponseCWD(response); break; case COMMAND_LIST: rv = ProcessResponseLIST(response); break; case COMMAND_QUIT: rv = ProcessResponseQUIT(response); break; default: LOG(DFATAL) << "Unexpected value of command_sent_: " << command_sent_; return ERR_UNEXPECTED; } // We may get multiple responses for some commands, // see http://crbug.com/18036. while (ctrl_response_buffer_->ResponseAvailable() && rv == OK) { response = ctrl_response_buffer_->PopResponse(); switch (command_sent_) { case COMMAND_RETR: rv = ProcessResponseRETR(response); break; case COMMAND_LIST: rv = ProcessResponseLIST(response); break; default: // Multiple responses for other commands are invalid. return Stop(ERR_INVALID_RESPONSE); } } return rv; } // Used to prepare and send FTP command. int FtpNetworkTransaction::SendFtpCommand(const std::string& command, Command cmd) { // If we send a new command when we still have unprocessed responses // for previous commands, the response receiving code will have no way to know // which responses are for which command. DCHECK(!ctrl_response_buffer_->ResponseAvailable()); DCHECK(!write_command_buf_); DCHECK(!write_buf_); if (!IsValidFTPCommandString(command)) { // Callers should validate the command themselves and return a more specific // error code. NOTREACHED(); return Stop(ERR_UNEXPECTED); } command_sent_ = cmd; write_command_buf_ = new IOBufferWithSize(command.length() + 2); write_buf_ = new DrainableIOBuffer(write_command_buf_, write_command_buf_->size()); memcpy(write_command_buf_->data(), command.data(), command.length()); memcpy(write_command_buf_->data() + command.length(), kCRLF, 2); next_state_ = STATE_CTRL_WRITE; return OK; } std::string FtpNetworkTransaction::GetRequestPathForFtpCommand( bool is_directory) const { std::string path(current_remote_directory_); if (request_->url.has_path()) { std::string gurl_path(request_->url.path()); // Get rid of the typecode, see RFC 1738 section 3.2.2. FTP url-path. std::string::size_type pos = gurl_path.rfind(';'); if (pos != std::string::npos) gurl_path.resize(pos); path.append(gurl_path); } // Make sure that if the path is expected to be a file, it won't end // with a trailing slash. if (!is_directory && path.length() > 1 && path[path.length() - 1] == '/') path.erase(path.length() - 1); UnescapeRule::Type unescape_rules = UnescapeRule::SPACES | UnescapeRule::URL_SPECIAL_CHARS; // This may unescape to non-ASCII characters, but we allow that. See the // comment for IsValidFTPCommandString. path = UnescapeURLComponent(path, unescape_rules); if (system_type_ == SYSTEM_TYPE_VMS) { if (is_directory) path = FtpUtil::UnixDirectoryPathToVMS(path); else path = FtpUtil::UnixFilePathToVMS(path); } DCHECK(IsValidFTPCommandString(path)); return path; } void FtpNetworkTransaction::DetectTypecode() { if (!request_->url.has_path()) return; std::string gurl_path(request_->url.path()); // Extract the typecode, see RFC 1738 section 3.2.2. FTP url-path. std::string::size_type pos = gurl_path.rfind(';'); if (pos == std::string::npos) return; std::string typecode_string(gurl_path.substr(pos)); if (typecode_string == ";type=a") { data_type_ = DATA_TYPE_ASCII; resource_type_ = RESOURCE_TYPE_FILE; } else if (typecode_string == ";type=i") { data_type_ = DATA_TYPE_IMAGE; resource_type_ = RESOURCE_TYPE_FILE; } else if (typecode_string == ";type=d") { resource_type_ = RESOURCE_TYPE_DIRECTORY; } } int FtpNetworkTransaction::DoLoop(int result) { DCHECK(next_state_ != STATE_NONE); int rv = result; do { State state = next_state_; next_state_ = STATE_NONE; switch (state) { case STATE_CTRL_RESOLVE_HOST: DCHECK(rv == OK); rv = DoCtrlResolveHost(); break; case STATE_CTRL_RESOLVE_HOST_COMPLETE: rv = DoCtrlResolveHostComplete(rv); break; case STATE_CTRL_CONNECT: DCHECK(rv == OK); rv = DoCtrlConnect(); break; case STATE_CTRL_CONNECT_COMPLETE: rv = DoCtrlConnectComplete(rv); break; case STATE_CTRL_READ: DCHECK(rv == OK); rv = DoCtrlRead(); break; case STATE_CTRL_READ_COMPLETE: rv = DoCtrlReadComplete(rv); break; case STATE_CTRL_WRITE: DCHECK(rv == OK); rv = DoCtrlWrite(); break; case STATE_CTRL_WRITE_COMPLETE: rv = DoCtrlWriteComplete(rv); break; case STATE_CTRL_WRITE_USER: DCHECK(rv == OK); rv = DoCtrlWriteUSER(); break; case STATE_CTRL_WRITE_PASS: DCHECK(rv == OK); rv = DoCtrlWritePASS(); break; case STATE_CTRL_WRITE_SYST: DCHECK(rv == OK); rv = DoCtrlWriteSYST(); break; case STATE_CTRL_WRITE_PWD: DCHECK(rv == OK); rv = DoCtrlWritePWD(); break; case STATE_CTRL_WRITE_TYPE: DCHECK(rv == OK); rv = DoCtrlWriteTYPE(); break; case STATE_CTRL_WRITE_EPSV: DCHECK(rv == OK); rv = DoCtrlWriteEPSV(); break; case STATE_CTRL_WRITE_PASV: DCHECK(rv == OK); rv = DoCtrlWritePASV(); break; case STATE_CTRL_WRITE_RETR: DCHECK(rv == OK); rv = DoCtrlWriteRETR(); break; case STATE_CTRL_WRITE_SIZE: DCHECK(rv == OK); rv = DoCtrlWriteSIZE(); break; case STATE_CTRL_WRITE_CWD: DCHECK(rv == OK); rv = DoCtrlWriteCWD(); break; case STATE_CTRL_WRITE_LIST: DCHECK(rv == OK); rv = DoCtrlWriteLIST(); break; case STATE_CTRL_WRITE_QUIT: DCHECK(rv == OK); rv = DoCtrlWriteQUIT(); break; case STATE_DATA_CONNECT: DCHECK(rv == OK); rv = DoDataConnect(); break; case STATE_DATA_CONNECT_COMPLETE: rv = DoDataConnectComplete(rv); break; case STATE_DATA_READ: DCHECK(rv == OK); rv = DoDataRead(); break; case STATE_DATA_READ_COMPLETE: rv = DoDataReadComplete(rv); break; default: NOTREACHED() << "bad state"; rv = ERR_UNEXPECTED; break; } } while (rv != ERR_IO_PENDING && next_state_ != STATE_NONE); return rv; } int FtpNetworkTransaction::DoCtrlResolveHost() { next_state_ = STATE_CTRL_RESOLVE_HOST_COMPLETE; HostResolver::RequestInfo info(HostPortPair::FromURL(request_->url)); // No known referrer. return resolver_.Resolve(info, &addresses_, &io_callback_, net_log_); } int FtpNetworkTransaction::DoCtrlResolveHostComplete(int result) { if (result == OK) next_state_ = STATE_CTRL_CONNECT; return result; } int FtpNetworkTransaction::DoCtrlConnect() { next_state_ = STATE_CTRL_CONNECT_COMPLETE; ctrl_socket_.reset(socket_factory_->CreateTransportClientSocket( addresses_, net_log_.net_log(), net_log_.source())); return ctrl_socket_->Connect(&io_callback_); } int FtpNetworkTransaction::DoCtrlConnectComplete(int result) { if (result == OK) { // Put the peer's IP address and port into the response. AddressList address; result = ctrl_socket_->GetPeerAddress(&address); if (result == OK) { response_.socket_address = HostPortPair::FromAddrInfo(address.head()); next_state_ = STATE_CTRL_READ; } } return result; } int FtpNetworkTransaction::DoCtrlRead() { next_state_ = STATE_CTRL_READ_COMPLETE; return ctrl_socket_->Read( read_ctrl_buf_, kCtrlBufLen, &io_callback_); } int FtpNetworkTransaction::DoCtrlReadComplete(int result) { if (result == 0) { // Some servers (for example Pure-FTPd) apparently close the control // connection when anonymous login is not permitted. For more details // see http://crbug.com/25023. if (command_sent_ == COMMAND_USER && username_ == ASCIIToUTF16("anonymous")) response_.needs_auth = true; return Stop(ERR_EMPTY_RESPONSE); } if (result < 0) return Stop(result); ctrl_response_buffer_->ConsumeData(read_ctrl_buf_->data(), result); if (!ctrl_response_buffer_->ResponseAvailable()) { // Read more data from the control socket. next_state_ = STATE_CTRL_READ; return OK; } return ProcessCtrlResponse(); } int FtpNetworkTransaction::DoCtrlWrite() { next_state_ = STATE_CTRL_WRITE_COMPLETE; return ctrl_socket_->Write(write_buf_, write_buf_->BytesRemaining(), &io_callback_); } int FtpNetworkTransaction::DoCtrlWriteComplete(int result) { if (result < 0) return result; write_buf_->DidConsume(result); if (write_buf_->BytesRemaining() == 0) { // Clear the write buffer. write_buf_ = NULL; write_command_buf_ = NULL; next_state_ = STATE_CTRL_READ; } else { next_state_ = STATE_CTRL_WRITE; } return OK; } // FTP Commands and responses // USER Command. int FtpNetworkTransaction::DoCtrlWriteUSER() { std::string command = "USER " + UTF16ToUTF8(username_); if (!IsValidFTPCommandString(command)) return Stop(ERR_MALFORMED_IDENTITY); next_state_ = STATE_CTRL_READ; return SendFtpCommand(command, COMMAND_USER); } int FtpNetworkTransaction::ProcessResponseUSER( const FtpCtrlResponse& response) { switch (GetErrorClass(response.status_code)) { case ERROR_CLASS_OK: next_state_ = STATE_CTRL_WRITE_SYST; break; case ERROR_CLASS_INFO_NEEDED: next_state_ = STATE_CTRL_WRITE_PASS; break; case ERROR_CLASS_TRANSIENT_ERROR: return Stop(GetNetErrorCodeForFtpResponseCode(response.status_code)); case ERROR_CLASS_PERMANENT_ERROR: response_.needs_auth = true; return Stop(GetNetErrorCodeForFtpResponseCode(response.status_code)); default: NOTREACHED(); return Stop(ERR_UNEXPECTED); } return OK; } // PASS command. int FtpNetworkTransaction::DoCtrlWritePASS() { std::string command = "PASS " + UTF16ToUTF8(password_); if (!IsValidFTPCommandString(command)) return Stop(ERR_MALFORMED_IDENTITY); next_state_ = STATE_CTRL_READ; return SendFtpCommand(command, COMMAND_PASS); } int FtpNetworkTransaction::ProcessResponsePASS( const FtpCtrlResponse& response) { switch (GetErrorClass(response.status_code)) { case ERROR_CLASS_OK: next_state_ = STATE_CTRL_WRITE_SYST; break; case ERROR_CLASS_INFO_NEEDED: return Stop(GetNetErrorCodeForFtpResponseCode(response.status_code)); case ERROR_CLASS_TRANSIENT_ERROR: return Stop(GetNetErrorCodeForFtpResponseCode(response.status_code)); case ERROR_CLASS_PERMANENT_ERROR: response_.needs_auth = true; return Stop(GetNetErrorCodeForFtpResponseCode(response.status_code)); default: NOTREACHED(); return Stop(ERR_UNEXPECTED); } return OK; } // SYST command. int FtpNetworkTransaction::DoCtrlWriteSYST() { std::string command = "SYST"; next_state_ = STATE_CTRL_READ; return SendFtpCommand(command, COMMAND_SYST); } int FtpNetworkTransaction::ProcessResponseSYST( const FtpCtrlResponse& response) { switch (GetErrorClass(response.status_code)) { case ERROR_CLASS_INITIATED: return Stop(ERR_INVALID_RESPONSE); case ERROR_CLASS_OK: { // All important info should be on the first line. std::string line = response.lines[0]; // The response should be ASCII, which allows us to do case-insensitive // comparisons easily. If it is not ASCII, we leave the system type // as unknown. if (IsStringASCII(line)) { line = StringToLowerASCII(line); // The "magic" strings we test for below have been gathered by an // empirical study. if (line.find("l8") != std::string::npos || line.find("unix") != std::string::npos || line.find("bsd") != std::string::npos) { system_type_ = SYSTEM_TYPE_UNIX; } else if (line.find("win32") != std::string::npos || line.find("windows") != std::string::npos) { system_type_ = SYSTEM_TYPE_WINDOWS; } else if (line.find("os/2") != std::string::npos) { system_type_ = SYSTEM_TYPE_OS2; } else if (line.find("vms") != std::string::npos) { system_type_ = SYSTEM_TYPE_VMS; } } next_state_ = STATE_CTRL_WRITE_PWD; break; } case ERROR_CLASS_INFO_NEEDED: return Stop(ERR_INVALID_RESPONSE); case ERROR_CLASS_TRANSIENT_ERROR: return Stop(GetNetErrorCodeForFtpResponseCode(response.status_code)); case ERROR_CLASS_PERMANENT_ERROR: // Server does not recognize the SYST command so proceed. next_state_ = STATE_CTRL_WRITE_PWD; break; default: NOTREACHED(); return Stop(ERR_UNEXPECTED); } return OK; } // PWD command. int FtpNetworkTransaction::DoCtrlWritePWD() { std::string command = "PWD"; next_state_ = STATE_CTRL_READ; return SendFtpCommand(command, COMMAND_PWD); } int FtpNetworkTransaction::ProcessResponsePWD(const FtpCtrlResponse& response) { switch (GetErrorClass(response.status_code)) { case ERROR_CLASS_INITIATED: return Stop(ERR_INVALID_RESPONSE); case ERROR_CLASS_OK: { // The info we look for should be on the first line. std::string line = response.lines[0]; if (line.empty()) return Stop(ERR_INVALID_RESPONSE); std::string::size_type quote_pos = line.find('"'); if (quote_pos != std::string::npos) { line = line.substr(quote_pos + 1); quote_pos = line.find('"'); if (quote_pos == std::string::npos) return Stop(ERR_INVALID_RESPONSE); line = line.substr(0, quote_pos); } if (system_type_ == SYSTEM_TYPE_VMS) line = FtpUtil::VMSPathToUnix(line); if (line.length() && line[line.length() - 1] == '/') line.erase(line.length() - 1); current_remote_directory_ = line; next_state_ = STATE_CTRL_WRITE_TYPE; break; } case ERROR_CLASS_INFO_NEEDED: return Stop(ERR_INVALID_RESPONSE); case ERROR_CLASS_TRANSIENT_ERROR: return Stop(GetNetErrorCodeForFtpResponseCode(response.status_code)); case ERROR_CLASS_PERMANENT_ERROR: return Stop(GetNetErrorCodeForFtpResponseCode(response.status_code)); default: NOTREACHED(); return Stop(ERR_UNEXPECTED); } return OK; } // TYPE command. int FtpNetworkTransaction::DoCtrlWriteTYPE() { std::string command = "TYPE "; if (data_type_ == DATA_TYPE_ASCII) { command += "A"; } else if (data_type_ == DATA_TYPE_IMAGE) { command += "I"; } else { NOTREACHED(); return Stop(ERR_UNEXPECTED); } next_state_ = STATE_CTRL_READ; return SendFtpCommand(command, COMMAND_TYPE); } int FtpNetworkTransaction::ProcessResponseTYPE( const FtpCtrlResponse& response) { switch (GetErrorClass(response.status_code)) { case ERROR_CLASS_INITIATED: return Stop(ERR_INVALID_RESPONSE); case ERROR_CLASS_OK: next_state_ = use_epsv_ ? STATE_CTRL_WRITE_EPSV : STATE_CTRL_WRITE_PASV; break; case ERROR_CLASS_INFO_NEEDED: return Stop(ERR_INVALID_RESPONSE); case ERROR_CLASS_TRANSIENT_ERROR: return Stop(GetNetErrorCodeForFtpResponseCode(response.status_code)); case ERROR_CLASS_PERMANENT_ERROR: return Stop(GetNetErrorCodeForFtpResponseCode(response.status_code)); default: NOTREACHED(); return Stop(ERR_UNEXPECTED); } return OK; } // EPSV command int FtpNetworkTransaction::DoCtrlWriteEPSV() { const std::string command = "EPSV"; next_state_ = STATE_CTRL_READ; return SendFtpCommand(command, COMMAND_EPSV); } int FtpNetworkTransaction::ProcessResponseEPSV( const FtpCtrlResponse& response) { switch (GetErrorClass(response.status_code)) { case ERROR_CLASS_INITIATED: return Stop(ERR_INVALID_RESPONSE); case ERROR_CLASS_OK: if (!ExtractPortFromEPSVResponse( response, &data_connection_port_)) return Stop(ERR_INVALID_RESPONSE); if (data_connection_port_ < 1024 || !IsPortAllowedByFtp(data_connection_port_)) return Stop(ERR_UNSAFE_PORT); next_state_ = STATE_DATA_CONNECT; break; case ERROR_CLASS_INFO_NEEDED: return Stop(ERR_INVALID_RESPONSE); case ERROR_CLASS_TRANSIENT_ERROR: case ERROR_CLASS_PERMANENT_ERROR: use_epsv_ = false; next_state_ = STATE_CTRL_WRITE_PASV; return OK; default: NOTREACHED(); return Stop(ERR_UNEXPECTED); } return OK; } // PASV command int FtpNetworkTransaction::DoCtrlWritePASV() { std::string command = "PASV"; next_state_ = STATE_CTRL_READ; return SendFtpCommand(command, COMMAND_PASV); } int FtpNetworkTransaction::ProcessResponsePASV( const FtpCtrlResponse& response) { switch (GetErrorClass(response.status_code)) { case ERROR_CLASS_INITIATED: return Stop(ERR_INVALID_RESPONSE); case ERROR_CLASS_OK: if (!ExtractPortFromPASVResponse(response, &data_connection_port_)) return Stop(ERR_INVALID_RESPONSE); if (data_connection_port_ < 1024 || !IsPortAllowedByFtp(data_connection_port_)) return Stop(ERR_UNSAFE_PORT); next_state_ = STATE_DATA_CONNECT; break; case ERROR_CLASS_INFO_NEEDED: return Stop(ERR_INVALID_RESPONSE); case ERROR_CLASS_TRANSIENT_ERROR: return Stop(GetNetErrorCodeForFtpResponseCode(response.status_code)); case ERROR_CLASS_PERMANENT_ERROR: return Stop(GetNetErrorCodeForFtpResponseCode(response.status_code)); default: NOTREACHED(); return Stop(ERR_UNEXPECTED); } return OK; } // RETR command int FtpNetworkTransaction::DoCtrlWriteRETR() { std::string command = "RETR " + GetRequestPathForFtpCommand(false); next_state_ = STATE_CTRL_READ; return SendFtpCommand(command, COMMAND_RETR); } int FtpNetworkTransaction::ProcessResponseRETR( const FtpCtrlResponse& response) { switch (GetErrorClass(response.status_code)) { case ERROR_CLASS_INITIATED: // We want the client to start reading the response at this point. // It got here either through Start or RestartWithAuth. We want that // method to complete. Not setting next state here will make DoLoop exit // and in turn make Start/RestartWithAuth complete. resource_type_ = RESOURCE_TYPE_FILE; break; case ERROR_CLASS_OK: resource_type_ = RESOURCE_TYPE_FILE; next_state_ = STATE_CTRL_WRITE_QUIT; break; case ERROR_CLASS_INFO_NEEDED: return Stop(GetNetErrorCodeForFtpResponseCode(response.status_code)); case ERROR_CLASS_TRANSIENT_ERROR: return Stop(GetNetErrorCodeForFtpResponseCode(response.status_code)); case ERROR_CLASS_PERMANENT_ERROR: // Code 550 means "Failed to open file". Other codes are unrelated, // like "Not logged in" etc. if (response.status_code != 550 || resource_type_ == RESOURCE_TYPE_FILE) return Stop(GetNetErrorCodeForFtpResponseCode(response.status_code)); // It's possible that RETR failed because the path is a directory. resource_type_ = RESOURCE_TYPE_DIRECTORY; // We're going to try CWD next, but first send a PASV one more time, // because some FTP servers, including FileZilla, require that. // See http://crbug.com/25316. next_state_ = use_epsv_ ? STATE_CTRL_WRITE_EPSV : STATE_CTRL_WRITE_PASV; break; default: NOTREACHED(); return Stop(ERR_UNEXPECTED); } // We should be sure about our resource type now. Otherwise we risk // an infinite loop (RETR can later send CWD, and CWD can later send RETR). DCHECK_NE(RESOURCE_TYPE_UNKNOWN, resource_type_); return OK; } // SIZE command int FtpNetworkTransaction::DoCtrlWriteSIZE() { std::string command = "SIZE " + GetRequestPathForFtpCommand(false); next_state_ = STATE_CTRL_READ; return SendFtpCommand(command, COMMAND_SIZE); } int FtpNetworkTransaction::ProcessResponseSIZE( const FtpCtrlResponse& response) { switch (GetErrorClass(response.status_code)) { case ERROR_CLASS_INITIATED: break; case ERROR_CLASS_OK: if (response.lines.size() != 1) return Stop(ERR_INVALID_RESPONSE); int64 size; if (!base::StringToInt64(response.lines[0], &size)) return Stop(ERR_INVALID_RESPONSE); if (size < 0) return Stop(ERR_INVALID_RESPONSE); // A successful response to SIZE does not mean the resource is a file. // Some FTP servers (for example, the qnx one) send a SIZE even for // directories. response_.expected_content_size = size; break; case ERROR_CLASS_INFO_NEEDED: break; case ERROR_CLASS_TRANSIENT_ERROR: break; case ERROR_CLASS_PERMANENT_ERROR: // It's possible that SIZE failed because the path is a directory. if (resource_type_ == RESOURCE_TYPE_UNKNOWN && response.status_code != 550) { return Stop(GetNetErrorCodeForFtpResponseCode(response.status_code)); } break; default: NOTREACHED(); return Stop(ERR_UNEXPECTED); } if (resource_type_ == RESOURCE_TYPE_FILE) next_state_ = STATE_CTRL_WRITE_RETR; else next_state_ = STATE_CTRL_WRITE_CWD; return OK; } // CWD command int FtpNetworkTransaction::DoCtrlWriteCWD() { std::string command = "CWD " + GetRequestPathForFtpCommand(true); next_state_ = STATE_CTRL_READ; return SendFtpCommand(command, COMMAND_CWD); } int FtpNetworkTransaction::ProcessResponseCWD(const FtpCtrlResponse& response) { // We should never issue CWD if we know the target resource is a file. DCHECK_NE(RESOURCE_TYPE_FILE, resource_type_); switch (GetErrorClass(response.status_code)) { case ERROR_CLASS_INITIATED: return Stop(ERR_INVALID_RESPONSE); case ERROR_CLASS_OK: next_state_ = STATE_CTRL_WRITE_LIST; break; case ERROR_CLASS_INFO_NEEDED: return Stop(ERR_INVALID_RESPONSE); case ERROR_CLASS_TRANSIENT_ERROR: return Stop(GetNetErrorCodeForFtpResponseCode(response.status_code)); case ERROR_CLASS_PERMANENT_ERROR: if (response.status_code == 550) { if (resource_type_ == RESOURCE_TYPE_DIRECTORY) { // We're assuming that the resource is a directory, but the server // says it's not true. The most probable interpretation is that it // doesn't exist (with FTP we can't be sure). return Stop(ERR_FILE_NOT_FOUND); } // We are here because SIZE failed and we are not sure what the resource // type is. It could still be file, and SIZE could fail because of // an access error (http://crbug.com/56734). Try RETR just to be sure. resource_type_ = RESOURCE_TYPE_FILE; next_state_ = STATE_CTRL_WRITE_RETR; return OK; } return Stop(GetNetErrorCodeForFtpResponseCode(response.status_code)); default: NOTREACHED(); return Stop(ERR_UNEXPECTED); } return OK; } // LIST command int FtpNetworkTransaction::DoCtrlWriteLIST() { std::string command(system_type_ == SYSTEM_TYPE_VMS ? "LIST *.*;0" : "LIST"); next_state_ = STATE_CTRL_READ; return SendFtpCommand(command, COMMAND_LIST); } int FtpNetworkTransaction::ProcessResponseLIST( const FtpCtrlResponse& response) { switch (GetErrorClass(response.status_code)) { case ERROR_CLASS_INITIATED: // We want the client to start reading the response at this point. // It got here either through Start or RestartWithAuth. We want that // method to complete. Not setting next state here will make DoLoop exit // and in turn make Start/RestartWithAuth complete. response_.is_directory_listing = true; break; case ERROR_CLASS_OK: response_.is_directory_listing = true; next_state_ = STATE_CTRL_WRITE_QUIT; break; case ERROR_CLASS_INFO_NEEDED: return Stop(ERR_INVALID_RESPONSE); case ERROR_CLASS_TRANSIENT_ERROR: return Stop(GetNetErrorCodeForFtpResponseCode(response.status_code)); case ERROR_CLASS_PERMANENT_ERROR: return Stop(GetNetErrorCodeForFtpResponseCode(response.status_code)); default: NOTREACHED(); return Stop(ERR_UNEXPECTED); } return OK; } // QUIT command int FtpNetworkTransaction::DoCtrlWriteQUIT() { std::string command = "QUIT"; next_state_ = STATE_CTRL_READ; return SendFtpCommand(command, COMMAND_QUIT); } int FtpNetworkTransaction::ProcessResponseQUIT( const FtpCtrlResponse& response) { ctrl_socket_->Disconnect(); return last_error_; } // Data Connection int FtpNetworkTransaction::DoDataConnect() { next_state_ = STATE_DATA_CONNECT_COMPLETE; AddressList data_address; // Connect to the same host as the control socket to prevent PASV port // scanning attacks. int rv = ctrl_socket_->GetPeerAddress(&data_address); if (rv != OK) return Stop(rv); data_address.SetPort(data_connection_port_); data_socket_.reset(socket_factory_->CreateTransportClientSocket( data_address, net_log_.net_log(), net_log_.source())); return data_socket_->Connect(&io_callback_); } int FtpNetworkTransaction::DoDataConnectComplete(int result) { if (result != OK && use_epsv_) { // It's possible we hit a broken server, sadly. They can break in different // ways. Some time out, some reset a connection. Fall back to PASV. // TODO(phajdan.jr): remember it for future transactions with this server. // TODO(phajdan.jr): write a test for this code path. use_epsv_ = false; next_state_ = STATE_CTRL_WRITE_PASV; return OK; } // Only record the connection error after we've applied all our fallbacks. // We want to capture the final error, one we're not going to recover from. RecordDataConnectionError(result); if (result != OK) return Stop(result); next_state_ = STATE_CTRL_WRITE_SIZE; return OK; } int FtpNetworkTransaction::DoDataRead() { DCHECK(read_data_buf_); DCHECK_GT(read_data_buf_len_, 0); if (data_socket_ == NULL || !data_socket_->IsConnected()) { // If we don't destroy the data socket completely, some servers will wait // for us (http://crbug.com/21127). The half-closed TCP connection needs // to be closed on our side too. data_socket_.reset(); if (ctrl_socket_->IsConnected()) { // Wait for the server's response, we should get it before sending QUIT. next_state_ = STATE_CTRL_READ; return OK; } // We are no longer connected to the server, so just finish the transaction. return Stop(OK); } next_state_ = STATE_DATA_READ_COMPLETE; read_data_buf_->data()[0] = 0; return data_socket_->Read(read_data_buf_, read_data_buf_len_, &io_callback_); } int FtpNetworkTransaction::DoDataReadComplete(int result) { return result; } // We're using a histogram as a group of counters, with one bucket for each // enumeration value. We're only interested in the values of the counters. // Ignore the shape, average, and standard deviation of the histograms because // they are meaningless. // // We use two histograms. In the first histogram we tally whether the user has // seen an error of that type during the session. In the second histogram we // tally the total number of times the users sees each errer. void FtpNetworkTransaction::RecordDataConnectionError(int result) { // Gather data for http://crbug.com/3073. See how many users have trouble // establishing FTP data connection in passive FTP mode. enum { // Data connection successful. NET_ERROR_OK = 0, // Local firewall blocked the connection. NET_ERROR_ACCESS_DENIED = 1, // Connection timed out. NET_ERROR_TIMED_OUT = 2, // Connection has been estabilished, but then got broken (either reset // or aborted). NET_ERROR_CONNECTION_BROKEN = 3, // Connection has been refused. NET_ERROR_CONNECTION_REFUSED = 4, // No connection to the internet. NET_ERROR_INTERNET_DISCONNECTED = 5, // Could not reach the destination address. NET_ERROR_ADDRESS_UNREACHABLE = 6, // A programming error in our network stack. NET_ERROR_UNEXPECTED = 7, // Other kind of error. NET_ERROR_OTHER = 20, NUM_OF_NET_ERROR_TYPES } type; switch (result) { case OK: type = NET_ERROR_OK; break; case ERR_ACCESS_DENIED: case ERR_NETWORK_ACCESS_DENIED: type = NET_ERROR_ACCESS_DENIED; break; case ERR_TIMED_OUT: type = NET_ERROR_TIMED_OUT; break; case ERR_CONNECTION_ABORTED: case ERR_CONNECTION_RESET: case ERR_CONNECTION_CLOSED: type = NET_ERROR_CONNECTION_BROKEN; break; case ERR_CONNECTION_FAILED: case ERR_CONNECTION_REFUSED: type = NET_ERROR_CONNECTION_REFUSED; break; case ERR_INTERNET_DISCONNECTED: type = NET_ERROR_INTERNET_DISCONNECTED; break; case ERR_ADDRESS_INVALID: case ERR_ADDRESS_UNREACHABLE: type = NET_ERROR_ADDRESS_UNREACHABLE; break; case ERR_UNEXPECTED: type = NET_ERROR_UNEXPECTED; break; default: type = NET_ERROR_OTHER; break; }; static bool had_error_type[NUM_OF_NET_ERROR_TYPES]; DCHECK(type >= 0 && type < NUM_OF_NET_ERROR_TYPES); if (!had_error_type[type]) { had_error_type[type] = true; UMA_HISTOGRAM_ENUMERATION("Net.FtpDataConnectionErrorHappened", type, NUM_OF_NET_ERROR_TYPES); } UMA_HISTOGRAM_ENUMERATION("Net.FtpDataConnectionErrorCount", type, NUM_OF_NET_ERROR_TYPES); } } // namespace net