281
116
/* Create new empty GPGME data buffer for the plaintext */
282
117
rc = gpgme_data_new(&dh_plain);
283
if(rc != GPG_ERR_NO_ERROR){
118
if (rc != GPG_ERR_NO_ERROR){
284
119
fprintf(stderr, "bad gpgme_data_new: %s: %s\n",
285
120
gpgme_strsource(rc), gpgme_strerror(rc));
286
gpgme_data_release(dh_crypto);
290
/* Decrypt data from the cryptotext data buffer to the plaintext
292
rc = gpgme_op_decrypt(mc.ctx, dh_crypto, dh_plain);
293
if(rc != GPG_ERR_NO_ERROR){
124
/* Create new GPGME "context" */
125
rc = gpgme_new(&ctx);
126
if (rc != GPG_ERR_NO_ERROR){
127
fprintf(stderr, "bad gpgme_new: %s: %s\n",
128
gpgme_strsource(rc), gpgme_strerror(rc));
132
/* Decrypt data from the FILE pointer to the plaintext data buffer */
133
rc = gpgme_op_decrypt(ctx, dh_crypto, dh_plain);
134
if (rc != GPG_ERR_NO_ERROR){
294
135
fprintf(stderr, "bad gpgme_op_decrypt: %s: %s\n",
295
136
gpgme_strsource(rc), gpgme_strerror(rc));
296
plaintext_length = -1;
298
gpgme_decrypt_result_t result;
299
result = gpgme_op_decrypt_result(mc.ctx);
301
fprintf(stderr, "gpgme_op_decrypt_result failed\n");
303
fprintf(stderr, "Unsupported algorithm: %s\n",
304
result->unsupported_algorithm);
305
fprintf(stderr, "Wrong key usage: %u\n",
306
result->wrong_key_usage);
307
if(result->file_name != NULL){
308
fprintf(stderr, "File name: %s\n", result->file_name);
310
gpgme_recipient_t recipient;
311
recipient = result->recipients;
141
fprintf(stderr, "decryption of gpg packet succeeded\n");
145
gpgme_decrypt_result_t result;
146
result = gpgme_op_decrypt_result(ctx);
148
fprintf(stderr, "gpgme_op_decrypt_result failed\n");
150
fprintf(stderr, "Unsupported algorithm: %s\n", result->unsupported_algorithm);
151
fprintf(stderr, "Wrong key usage: %d\n", result->wrong_key_usage);
152
if(result->file_name != NULL){
153
fprintf(stderr, "File name: %s\n", result->file_name);
155
gpgme_recipient_t recipient;
156
recipient = result->recipients;
312
158
while(recipient != NULL){
313
159
fprintf(stderr, "Public key algorithm: %s\n",
314
160
gpgme_pubkey_algo_name(recipient->pubkey_algo));
315
161
fprintf(stderr, "Key ID: %s\n", recipient->keyid);
316
162
fprintf(stderr, "Secret key available: %s\n",
317
recipient->status == GPG_ERR_NO_SECKEY
163
recipient->status == GPG_ERR_NO_SECKEY ? "No" : "Yes");
319
164
recipient = recipient->next;
327
fprintf(stderr, "Decryption of OpenPGP data succeeded\n");
170
/* Delete the GPGME FILE pointer cryptotext data buffer */
171
gpgme_data_release(dh_crypto);
330
173
/* Seek back to the beginning of the GPGME plaintext data buffer */
331
if(gpgme_data_seek(dh_plain, (off_t)0, SEEK_SET) == -1){
332
perror("gpgme_data_seek");
333
plaintext_length = -1;
174
gpgme_data_seek(dh_plain, 0, SEEK_SET);
339
plaintext_capacity = incbuffer(plaintext,
340
(size_t)plaintext_length,
342
if(plaintext_capacity == 0){
344
plaintext_length = -1;
178
if (new_packet_length + BUFFER_SIZE > new_packet_capacity){
179
*new_packet = realloc(*new_packet, new_packet_capacity + BUFFER_SIZE);
180
if (*new_packet == NULL){
184
new_packet_capacity += BUFFER_SIZE;
348
ret = gpgme_data_read(dh_plain, *plaintext + plaintext_length,
187
ret = gpgme_data_read(dh_plain, *new_packet + new_packet_length, BUFFER_SIZE);
350
188
/* Print the data, if any */
190
/* If password is empty, then a incorrect error will be printed */
356
194
perror("gpgme_data_read");
357
plaintext_length = -1;
360
plaintext_length += ret;
197
new_packet_length += ret;
364
fprintf(stderr, "Decrypted password is: ");
365
for(ssize_t i = 0; i < plaintext_length; i++){
366
fprintf(stderr, "%02hhX ", (*plaintext)[i]);
368
fprintf(stderr, "\n");
201
fprintf(stderr, "decrypted password is: %s\n", *new_packet);
373
/* Delete the GPGME cryptotext data buffer */
374
gpgme_data_release(dh_crypto);
376
/* Delete the GPGME plaintext data buffer */
204
/* Delete the GPGME plaintext data buffer */
377
205
gpgme_data_release(dh_plain);
378
return plaintext_length;
206
return new_packet_length;
381
static const char * safer_gnutls_strerror(int value){
382
const char *ret = gnutls_strerror(value); /* Spurious warning from
383
-Wunreachable-code */
209
static const char * safer_gnutls_strerror (int value) {
210
const char *ret = gnutls_strerror (value);
385
212
ret = "(unknown)";
389
/* GnuTLS log function callback */
390
static void debuggnutls(__attribute__((unused)) int level,
392
fprintf(stderr, "GnuTLS: %s", string);
216
void debuggnutls(int level, const char* string){
217
fprintf(stderr, "%s", string);
395
static int init_gnutls_global(const char *pubkeyfilename,
396
const char *seckeyfilename){
220
int initgnutls(encrypted_session *es){
400
fprintf(stderr, "Initializing GnuTLS\n");
225
fprintf(stderr, "Initializing gnutls\n");
403
ret = gnutls_global_init();
404
if(ret != GNUTLS_E_SUCCESS){
405
fprintf(stderr, "GnuTLS global_init: %s\n",
406
safer_gnutls_strerror(ret));
229
if ((ret = gnutls_global_init ())
230
!= GNUTLS_E_SUCCESS) {
231
fprintf (stderr, "global_init: %s\n", safer_gnutls_strerror(ret));
411
/* "Use a log level over 10 to enable all debugging options."
414
236
gnutls_global_set_log_level(11);
415
237
gnutls_global_set_log_function(debuggnutls);
418
/* OpenPGP credentials */
419
gnutls_certificate_allocate_credentials(&mc.cred);
420
if(ret != GNUTLS_E_SUCCESS){
421
fprintf(stderr, "GnuTLS memory error: %s\n", /* Spurious warning
425
safer_gnutls_strerror(ret));
426
gnutls_global_deinit();
241
/* openpgp credentials */
242
if ((ret = gnutls_certificate_allocate_credentials (&es->cred))
243
!= GNUTLS_E_SUCCESS) {
244
fprintf (stderr, "memory error: %s\n", safer_gnutls_strerror(ret));
431
fprintf(stderr, "Attempting to use OpenPGP public key %s and"
432
" secret key %s as GnuTLS credentials\n", pubkeyfilename,
249
fprintf(stderr, "Attempting to use openpgp certificate %s"
250
" and keyfile %s as gnutls credentials\n", CERTFILE, KEYFILE);
436
253
ret = gnutls_certificate_set_openpgp_key_file
437
(mc.cred, pubkeyfilename, seckeyfilename,
438
GNUTLS_OPENPGP_FMT_BASE64);
439
if(ret != GNUTLS_E_SUCCESS){
441
"Error[%d] while reading the OpenPGP key pair ('%s',"
442
" '%s')\n", ret, pubkeyfilename, seckeyfilename);
443
fprintf(stderr, "The GnuTLS error is: %s\n",
444
safer_gnutls_strerror(ret));
448
/* GnuTLS server initialization */
449
ret = gnutls_dh_params_init(&mc.dh_params);
450
if(ret != GNUTLS_E_SUCCESS){
451
fprintf(stderr, "Error in GnuTLS DH parameter initialization:"
452
" %s\n", safer_gnutls_strerror(ret));
455
ret = gnutls_dh_params_generate2(mc.dh_params, mc.dh_bits);
456
if(ret != GNUTLS_E_SUCCESS){
457
fprintf(stderr, "Error in GnuTLS prime generation: %s\n",
458
safer_gnutls_strerror(ret));
462
gnutls_certificate_set_dh_params(mc.cred, mc.dh_params);
468
gnutls_certificate_free_credentials(mc.cred);
469
gnutls_global_deinit();
470
gnutls_dh_params_deinit(mc.dh_params);
474
static int init_gnutls_session(gnutls_session_t *session){
476
/* GnuTLS session creation */
477
ret = gnutls_init(session, GNUTLS_SERVER);
478
if(ret != GNUTLS_E_SUCCESS){
479
fprintf(stderr, "Error in GnuTLS session initialization: %s\n",
480
safer_gnutls_strerror(ret));
485
ret = gnutls_priority_set_direct(*session, mc.priority, &err);
486
if(ret != GNUTLS_E_SUCCESS){
487
fprintf(stderr, "Syntax error at: %s\n", err);
488
fprintf(stderr, "GnuTLS error: %s\n",
489
safer_gnutls_strerror(ret));
490
gnutls_deinit(*session);
495
ret = gnutls_credentials_set(*session, GNUTLS_CRD_CERTIFICATE,
497
if(ret != GNUTLS_E_SUCCESS){
498
fprintf(stderr, "Error setting GnuTLS credentials: %s\n",
499
safer_gnutls_strerror(ret));
500
gnutls_deinit(*session);
254
(es->cred, CERTFILE, KEYFILE, GNUTLS_OPENPGP_FMT_BASE64);
255
if (ret != GNUTLS_E_SUCCESS) {
257
(stderr, "Error[%d] while reading the OpenPGP key pair ('%s', '%s')\n",
258
ret, CERTFILE, KEYFILE);
259
fprintf(stdout, "The Error is: %s\n",
260
safer_gnutls_strerror(ret));
264
//Gnutls server initialization
265
if ((ret = gnutls_dh_params_init (&es->dh_params))
266
!= GNUTLS_E_SUCCESS) {
267
fprintf (stderr, "Error in dh parameter initialization: %s\n",
268
safer_gnutls_strerror(ret));
272
if ((ret = gnutls_dh_params_generate2 (es->dh_params, DH_BITS))
273
!= GNUTLS_E_SUCCESS) {
274
fprintf (stderr, "Error in prime generation: %s\n",
275
safer_gnutls_strerror(ret));
279
gnutls_certificate_set_dh_params (es->cred, es->dh_params);
281
// Gnutls session creation
282
if ((ret = gnutls_init (&es->session, GNUTLS_SERVER))
283
!= GNUTLS_E_SUCCESS){
284
fprintf(stderr, "Error in gnutls session initialization: %s\n",
285
safer_gnutls_strerror(ret));
288
if ((ret = gnutls_priority_set_direct (es->session, "NORMAL", &err))
289
!= GNUTLS_E_SUCCESS) {
290
fprintf(stderr, "Syntax error at: %s\n", err);
291
fprintf(stderr, "Gnutls error: %s\n",
292
safer_gnutls_strerror(ret));
296
if ((ret = gnutls_credentials_set
297
(es->session, GNUTLS_CRD_CERTIFICATE, es->cred))
298
!= GNUTLS_E_SUCCESS) {
299
fprintf(stderr, "Error setting a credentials set: %s\n",
300
safer_gnutls_strerror(ret));
504
304
/* ignore client certificate if any. */
505
gnutls_certificate_server_set_request(*session,
305
gnutls_certificate_server_set_request (es->session, GNUTLS_CERT_IGNORE);
508
gnutls_dh_set_prime_bits(*session, mc.dh_bits);
307
gnutls_dh_set_prime_bits (es->session, DH_BITS);
513
/* Avahi log function callback */
514
static void empty_log(__attribute__((unused)) AvahiLogLevel level,
515
__attribute__((unused)) const char *txt){}
517
sig_atomic_t quit_now = 0;
518
int signal_received = 0;
520
/* Called when a Mandos server is found */
521
static int start_mandos_communication(const char *ip, uint16_t port,
522
AvahiIfIndex if_index,
312
void empty_log(AvahiLogLevel level, const char *txt){}
314
int start_mandos_communcation(char *ip, uint16_t port){
527
struct sockaddr_in in;
528
struct sockaddr_in6 in6;
316
struct sockaddr_in6 to;
317
struct in6_addr ip_addr;
318
encrypted_session es;
530
319
char *buffer = NULL;
531
320
char *decrypted_buffer;
532
321
size_t buffer_length = 0;
533
322
size_t buffer_capacity = 0;
534
323
ssize_t decrypted_buffer_size;
537
gnutls_session_t session;
538
int pf; /* Protocol family */
548
fprintf(stderr, "Bad address family: %d\n", af);
552
ret = init_gnutls_session(&session);
325
const char interface[] = "eth0";
558
fprintf(stderr, "Setting up a TCP connection to %s, port %" PRIu16
328
fprintf(stderr, "Setting up a tcp connection to %s\n", ip);
562
tcp_sd = socket(pf, SOCK_STREAM, 0);
331
tcp_sd = socket(PF_INET6, SOCK_STREAM, 0);
564
333
perror("socket");
338
fprintf(stderr, "Binding to interface %s\n", interface);
341
ret = setsockopt(tcp_sd, SOL_SOCKET, SO_BINDTODEVICE, interface, 5);
343
perror("setsockopt bindtodevice");
568
memset(&to, 0, sizeof(to));
570
to.in6.sin6_family = (sa_family_t)af;
571
ret = inet_pton(af, ip, &to.in6.sin6_addr);
573
to.in.sin_family = (sa_family_t)af;
574
ret = inet_pton(af, ip, &to.in.sin_addr);
347
memset(&to,0,sizeof(to));
348
to.sin6_family = AF_INET6;
349
ret = inet_pton(AF_INET6, ip, &ip_addr);
577
351
perror("inet_pton");
581
355
fprintf(stderr, "Bad address: %s\n", ip);
585
to.in6.sin6_port = htons(port); /* Spurious warnings from
587
-Wunreachable-code */
589
if(IN6_IS_ADDR_LINKLOCAL /* Spurious warnings from */
590
(&to.in6.sin6_addr)){ /* -Wstrict-aliasing=2 or lower and
592
if(if_index == AVAHI_IF_UNSPEC){
593
fprintf(stderr, "An IPv6 link-local address is incomplete"
594
" without a network interface\n");
597
/* Set the network interface number as scope */
598
to.in6.sin6_scope_id = (uint32_t)if_index;
601
to.in.sin_port = htons(port); /* Spurious warnings from
603
-Wunreachable-code */
358
to.sin6_port = htons(port);
359
to.sin6_scope_id = if_nametoindex(interface);
607
if(af == AF_INET6 and if_index != AVAHI_IF_UNSPEC){
608
char interface[IF_NAMESIZE];
609
if(if_indextoname((unsigned int)if_index, interface) == NULL){
610
perror("if_indextoname");
612
fprintf(stderr, "Connection to: %s%%%s, port %" PRIu16 "\n",
613
ip, interface, port);
616
fprintf(stderr, "Connection to: %s, port %" PRIu16 "\n", ip,
619
char addrstr[(INET_ADDRSTRLEN > INET6_ADDRSTRLEN) ?
620
INET_ADDRSTRLEN : INET6_ADDRSTRLEN] = "";
623
pcret = inet_ntop(af, &(to.in6.sin6_addr), addrstr,
626
pcret = inet_ntop(af, &(to.in.sin_addr), addrstr,
632
if(strcmp(addrstr, ip) != 0){
633
fprintf(stderr, "Canonical address form: %s\n", addrstr);
362
fprintf(stderr, "Connection to: %s\n", ip);
639
ret = connect(tcp_sd, &to.in6, sizeof(to));
641
ret = connect(tcp_sd, &to.in, sizeof(to)); /* IPv4 */
365
ret = connect(tcp_sd, (struct sockaddr *) &to, sizeof(to));
644
367
perror("connect");
648
const char *out = mandos_protocol_version;
371
ret = initgnutls (&es);
378
gnutls_transport_set_ptr (es.session, (gnutls_transport_ptr_t) tcp_sd);
381
fprintf(stderr, "Establishing tls session with %s\n", ip);
385
ret = gnutls_handshake (es.session);
387
if (ret != GNUTLS_E_SUCCESS){
388
fprintf(stderr, "\n*** Handshake failed ***\n");
394
//Retrieve gpg packet that contains the wanted password
397
fprintf(stderr, "Retrieving pgp encrypted password from %s\n", ip);
651
size_t out_size = strlen(out);
652
ret = (int)TEMP_FAILURE_RETRY(write(tcp_sd, out + written,
653
out_size - written));
659
written += (size_t)ret;
660
if(written < out_size){
663
if(out == mandos_protocol_version){
401
if (buffer_length + BUFFER_SIZE > buffer_capacity){
402
buffer = realloc(buffer, buffer_capacity + BUFFER_SIZE);
673
fprintf(stderr, "Establishing TLS session with %s\n", ip);
676
gnutls_transport_set_ptr(session, (gnutls_transport_ptr_t) tcp_sd);
679
ret = gnutls_handshake(session);
680
} while(ret == GNUTLS_E_AGAIN or ret == GNUTLS_E_INTERRUPTED);
682
if(ret != GNUTLS_E_SUCCESS){
684
fprintf(stderr, "*** GnuTLS Handshake failed ***\n");
691
/* Read OpenPGP packet that contains the wanted password */
694
fprintf(stderr, "Retrieving OpenPGP encrypted password from %s\n",
699
buffer_capacity = incbuffer(&buffer, buffer_length,
701
if(buffer_capacity == 0){
407
buffer_capacity += BUFFER_SIZE;
707
sret = gnutls_record_recv(session, buffer+buffer_length,
410
ret = gnutls_record_recv
411
(es.session, buffer+buffer_length, BUFFER_SIZE);
714
417
case GNUTLS_E_INTERRUPTED:
715
418
case GNUTLS_E_AGAIN:
717
420
case GNUTLS_E_REHANDSHAKE:
719
ret = gnutls_handshake(session);
720
} while(ret == GNUTLS_E_AGAIN or ret == GNUTLS_E_INTERRUPTED);
722
fprintf(stderr, "*** GnuTLS Re-handshake failed ***\n");
421
ret = gnutls_handshake (es.session);
423
fprintf(stderr, "\n*** Handshake failed ***\n");
729
fprintf(stderr, "Unknown error while reading data from"
730
" encrypted session with Mandos server\n");
430
fprintf(stderr, "Unknown error while reading data from encrypted session with mandos server\n");
732
gnutls_bye(session, GNUTLS_SHUT_RDWR);
432
gnutls_bye (es.session, GNUTLS_SHUT_RDWR);
736
buffer_length += (size_t) sret;
436
buffer_length += ret;
741
fprintf(stderr, "Closing TLS session\n");
744
gnutls_bye(session, GNUTLS_SHUT_RDWR);
746
if(buffer_length > 0){
747
decrypted_buffer_size = pgp_packet_decrypt(buffer,
750
if(decrypted_buffer_size >= 0){
752
while(written < (size_t) decrypted_buffer_size){
753
ret = (int)fwrite(decrypted_buffer + written, 1,
754
(size_t)decrypted_buffer_size - written,
756
if(ret == 0 and ferror(stdout)){
758
fprintf(stderr, "Error writing encrypted data: %s\n",
764
written += (size_t)ret;
440
if (buffer_length > 0){
441
if ((decrypted_buffer_size = gpg_packet_decrypt(buffer, buffer_length, &decrypted_buffer, CERT_ROOT)) >= 0){
442
fwrite (decrypted_buffer, 1, decrypted_buffer_size, stdout);
766
443
free(decrypted_buffer);
774
/* Shutdown procedure */
452
fprintf(stderr, "Closing tls session\n");
778
ret = (int)TEMP_FAILURE_RETRY(close(tcp_sd));
782
gnutls_deinit(session);
456
gnutls_bye (es.session, GNUTLS_SHUT_RDWR);
459
gnutls_deinit (es.session);
460
gnutls_certificate_free_credentials (es.cred);
461
gnutls_global_deinit ();
786
static void resolve_callback(AvahiSServiceResolver *r,
787
AvahiIfIndex interface,
789
AvahiResolverEvent event,
793
const char *host_name,
794
const AvahiAddress *address,
796
AVAHI_GCC_UNUSED AvahiStringList *txt,
797
AVAHI_GCC_UNUSED AvahiLookupResultFlags
799
AVAHI_GCC_UNUSED void* userdata){
802
/* Called whenever a service has been resolved successfully or
811
case AVAHI_RESOLVER_FAILURE:
812
fprintf(stderr, "(Avahi Resolver) Failed to resolve service '%s'"
813
" of type '%s' in domain '%s': %s\n", name, type, domain,
814
avahi_strerror(avahi_server_errno(mc.server)));
817
case AVAHI_RESOLVER_FOUND:
819
char ip[AVAHI_ADDRESS_STR_MAX];
820
avahi_address_snprint(ip, sizeof(ip), address);
822
fprintf(stderr, "Mandos server \"%s\" found on %s (%s, %"
823
PRIdMAX ") on port %" PRIu16 "\n", name, host_name,
824
ip, (intmax_t)interface, port);
826
int ret = start_mandos_communication(ip, port, interface,
827
avahi_proto_to_af(proto));
829
avahi_simple_poll_quit(mc.simple_poll);
833
avahi_s_service_resolver_free(r);
836
static void browse_callback(AvahiSServiceBrowser *b,
837
AvahiIfIndex interface,
838
AvahiProtocol protocol,
839
AvahiBrowserEvent event,
843
AVAHI_GCC_UNUSED AvahiLookupResultFlags
845
AVAHI_GCC_UNUSED void* userdata){
848
/* Called whenever a new services becomes available on the LAN or
849
is removed from the LAN */
853
case AVAHI_BROWSER_FAILURE:
855
fprintf(stderr, "(Avahi browser) %s\n",
856
avahi_strerror(avahi_server_errno(mc.server)));
857
avahi_simple_poll_quit(mc.simple_poll);
860
case AVAHI_BROWSER_NEW:
861
/* We ignore the returned Avahi resolver object. In the callback
862
function we free it. If the Avahi server is terminated before
863
the callback function is called the Avahi server will free the
866
if(avahi_s_service_resolver_new(mc.server, interface, protocol,
867
name, type, domain, protocol, 0,
868
resolve_callback, NULL) == NULL)
869
fprintf(stderr, "Avahi: Failed to resolve service '%s': %s\n",
870
name, avahi_strerror(avahi_server_errno(mc.server)));
873
case AVAHI_BROWSER_REMOVE:
876
case AVAHI_BROWSER_ALL_FOR_NOW:
877
case AVAHI_BROWSER_CACHE_EXHAUSTED:
879
fprintf(stderr, "No Mandos server found, still searching...\n");
885
/* stop main loop after sigterm has been called */
886
static void handle_sigterm(int sig){
891
signal_received = sig;
892
int old_errno = errno;
893
if(mc.simple_poll != NULL){
894
avahi_simple_poll_quit(mc.simple_poll);
899
int main(int argc, char *argv[]){
900
AvahiSServiceBrowser *sb = NULL;
905
int exitcode = EXIT_SUCCESS;
906
const char *interface = "eth0";
907
struct ifreq network;
909
bool take_down_interface = false;
912
char *connect_to = NULL;
913
char tempdir[] = "/tmp/mandosXXXXXX";
914
bool tempdir_created = false;
915
AvahiIfIndex if_index = AVAHI_IF_UNSPEC;
916
const char *seckey = PATHDIR "/" SECKEY;
917
const char *pubkey = PATHDIR "/" PUBKEY;
919
bool gnutls_initialized = false;
920
bool gpgme_initialized = false;
923
struct sigaction old_sigterm_action;
924
struct sigaction sigterm_action = { .sa_handler = handle_sigterm };
927
struct argp_option options[] = {
928
{ .name = "debug", .key = 128,
929
.doc = "Debug mode", .group = 3 },
930
{ .name = "connect", .key = 'c',
931
.arg = "ADDRESS:PORT",
932
.doc = "Connect directly to a specific Mandos server",
934
{ .name = "interface", .key = 'i',
936
.doc = "Network interface that will be used to search for"
939
{ .name = "seckey", .key = 's',
941
.doc = "OpenPGP secret key file base name",
943
{ .name = "pubkey", .key = 'p',
945
.doc = "OpenPGP public key file base name",
947
{ .name = "dh-bits", .key = 129,
949
.doc = "Bit length of the prime number used in the"
950
" Diffie-Hellman key exchange",
952
{ .name = "priority", .key = 130,
954
.doc = "GnuTLS priority string for the TLS handshake",
956
{ .name = "delay", .key = 131,
958
.doc = "Maximum delay to wait for interface startup",
963
error_t parse_opt(int key, char *arg,
964
struct argp_state *state){
966
case 128: /* --debug */
969
case 'c': /* --connect */
972
case 'i': /* --interface */
975
case 's': /* --seckey */
978
case 'p': /* --pubkey */
981
case 129: /* --dh-bits */
983
tmpmax = strtoimax(arg, &tmp, 10);
984
if(errno != 0 or tmp == arg or *tmp != '\0'
985
or tmpmax != (typeof(mc.dh_bits))tmpmax){
986
fprintf(stderr, "Bad number of DH bits\n");
989
mc.dh_bits = (typeof(mc.dh_bits))tmpmax;
991
case 130: /* --priority */
994
case 131: /* --delay */
996
delay = strtof(arg, &tmp);
997
if(errno != 0 or tmp == arg or *tmp != '\0'){
998
fprintf(stderr, "Bad delay\n");
1007
return ARGP_ERR_UNKNOWN;
1012
struct argp argp = { .options = options, .parser = parse_opt,
1014
.doc = "Mandos client -- Get and decrypt"
1015
" passwords from a Mandos server" };
1016
ret = argp_parse(&argp, argc, argv, 0, 0, NULL);
1017
if(ret == ARGP_ERR_UNKNOWN){
1018
fprintf(stderr, "Unknown error while parsing arguments\n");
1019
exitcode = EXIT_FAILURE;
1025
avahi_set_log_function(empty_log);
1028
/* Initialize Avahi early so avahi_simple_poll_quit() can be called
1029
from the signal handler */
1030
/* Initialize the pseudo-RNG for Avahi */
1031
srand((unsigned int) time(NULL));
1032
mc.simple_poll = avahi_simple_poll_new();
1033
if(mc.simple_poll == NULL){
1034
fprintf(stderr, "Avahi: Failed to create simple poll object.\n");
1035
exitcode = EXIT_FAILURE;
1039
sigemptyset(&sigterm_action.sa_mask);
1040
ret = sigaddset(&sigterm_action.sa_mask, SIGINT);
1042
perror("sigaddset");
1043
exitcode = EXIT_FAILURE;
1046
ret = sigaddset(&sigterm_action.sa_mask, SIGHUP);
1048
perror("sigaddset");
1049
exitcode = EXIT_FAILURE;
1052
ret = sigaddset(&sigterm_action.sa_mask, SIGTERM);
1054
perror("sigaddset");
1055
exitcode = EXIT_FAILURE;
1058
ret = sigaction(SIGINT, &sigterm_action, &old_sigterm_action);
1060
perror("sigaction");
1061
exitcode = EXIT_FAILURE;
1064
ret = sigaction(SIGHUP, &sigterm_action, NULL);
1066
perror("sigaction");
1067
exitcode = EXIT_FAILURE;
1070
ret = sigaction(SIGTERM, &sigterm_action, NULL);
1072
perror("sigaction");
1073
exitcode = EXIT_FAILURE;
1077
/* If the interface is down, bring it up */
1078
if(interface[0] != '\0'){
1079
if_index = (AvahiIfIndex) if_nametoindex(interface);
1081
fprintf(stderr, "No such interface: \"%s\"\n", interface);
1082
exitcode = EXIT_FAILURE;
1091
/* Lower kernel loglevel to KERN_NOTICE to avoid KERN_INFO
1092
messages to mess up the prompt */
1093
ret = klogctl(8, NULL, 5);
1094
bool restore_loglevel = true;
1096
restore_loglevel = false;
1099
#endif /* __linux__ */
1101
sd = socket(PF_INET6, SOCK_DGRAM, IPPROTO_IP);
1104
exitcode = EXIT_FAILURE;
1106
if(restore_loglevel){
1107
ret = klogctl(7, NULL, 0);
1112
#endif /* __linux__ */
1115
strcpy(network.ifr_name, interface);
1116
ret = ioctl(sd, SIOCGIFFLAGS, &network);
1118
perror("ioctl SIOCGIFFLAGS");
1120
if(restore_loglevel){
1121
ret = klogctl(7, NULL, 0);
1126
#endif /* __linux__ */
1127
exitcode = EXIT_FAILURE;
1130
if((network.ifr_flags & IFF_UP) == 0){
1131
network.ifr_flags |= IFF_UP;
1132
take_down_interface = true;
1133
ret = ioctl(sd, SIOCSIFFLAGS, &network);
1135
take_down_interface = false;
1136
perror("ioctl SIOCSIFFLAGS");
1137
exitcode = EXIT_FAILURE;
1139
if(restore_loglevel){
1140
ret = klogctl(7, NULL, 0);
1145
#endif /* __linux__ */
1149
/* sleep checking until interface is running */
1150
for(int i=0; i < delay * 4; i++){
1151
ret = ioctl(sd, SIOCGIFFLAGS, &network);
1153
perror("ioctl SIOCGIFFLAGS");
1154
} else if(network.ifr_flags & IFF_RUNNING){
1157
struct timespec sleeptime = { .tv_nsec = 250000000 };
1158
ret = nanosleep(&sleeptime, NULL);
1159
if(ret == -1 and errno != EINTR){
1160
perror("nanosleep");
1163
if(not take_down_interface){
1164
/* We won't need the socket anymore */
1165
ret = (int)TEMP_FAILURE_RETRY(close(sd));
1171
if(restore_loglevel){
1172
/* Restores kernel loglevel to default */
1173
ret = klogctl(7, NULL, 0);
1178
#endif /* __linux__ */
1203
ret = init_gnutls_global(pubkey, seckey);
1205
fprintf(stderr, "init_gnutls_global failed\n");
1206
exitcode = EXIT_FAILURE;
1209
gnutls_initialized = true;
1216
tempdir_created = true;
1217
if(mkdtemp(tempdir) == NULL){
1218
tempdir_created = false;
1227
if(not init_gpgme(pubkey, seckey, tempdir)){
1228
fprintf(stderr, "init_gpgme failed\n");
1229
exitcode = EXIT_FAILURE;
1232
gpgme_initialized = true;
1239
if(connect_to != NULL){
1240
/* Connect directly, do not use Zeroconf */
1241
/* (Mainly meant for debugging) */
1242
char *address = strrchr(connect_to, ':');
1243
if(address == NULL){
1244
fprintf(stderr, "No colon in address\n");
1245
exitcode = EXIT_FAILURE;
1255
tmpmax = strtoimax(address+1, &tmp, 10);
1256
if(errno != 0 or tmp == address+1 or *tmp != '\0'
1257
or tmpmax != (uint16_t)tmpmax){
1258
fprintf(stderr, "Bad port number\n");
1259
exitcode = EXIT_FAILURE;
1267
port = (uint16_t)tmpmax;
1269
address = connect_to;
1270
/* Colon in address indicates IPv6 */
1272
if(strchr(address, ':') != NULL){
1282
ret = start_mandos_communication(address, port, if_index, af);
1284
exitcode = EXIT_FAILURE;
1286
exitcode = EXIT_SUCCESS;
465
static AvahiSimplePoll *simple_poll = NULL;
466
static AvahiServer *server = NULL;
468
static void resolve_callback(
469
AvahiSServiceResolver *r,
470
AVAHI_GCC_UNUSED AvahiIfIndex interface,
471
AVAHI_GCC_UNUSED AvahiProtocol protocol,
472
AvahiResolverEvent event,
476
const char *host_name,
477
const AvahiAddress *address,
479
AvahiStringList *txt,
480
AvahiLookupResultFlags flags,
481
AVAHI_GCC_UNUSED void* userdata) {
485
/* Called whenever a service has been resolved successfully or timed out */
488
case AVAHI_RESOLVER_FAILURE:
489
fprintf(stderr, "(Resolver) Failed to resolve service '%s' of type '%s' in domain '%s': %s\n", name, type, domain, avahi_strerror(avahi_server_errno(server)));
492
case AVAHI_RESOLVER_FOUND: {
493
char ip[AVAHI_ADDRESS_STR_MAX];
494
avahi_address_snprint(ip, sizeof(ip), address);
496
fprintf(stderr, "Mandos server found at %s on port %d\n", ip, port);
498
int ret = start_mandos_communcation(ip, port);
506
avahi_s_service_resolver_free(r);
509
static void browse_callback(
510
AvahiSServiceBrowser *b,
511
AvahiIfIndex interface,
512
AvahiProtocol protocol,
513
AvahiBrowserEvent event,
517
AVAHI_GCC_UNUSED AvahiLookupResultFlags flags,
520
AvahiServer *s = userdata;
523
/* Called whenever a new services becomes available on the LAN or is removed from the LAN */
527
case AVAHI_BROWSER_FAILURE:
529
fprintf(stderr, "(Browser) %s\n", avahi_strerror(avahi_server_errno(server)));
530
avahi_simple_poll_quit(simple_poll);
533
case AVAHI_BROWSER_NEW:
534
/* We ignore the returned resolver object. In the callback
535
function we free it. If the server is terminated before
536
the callback function is called the server will free
537
the resolver for us. */
539
if (!(avahi_s_service_resolver_new(s, interface, protocol, name, type, domain, AVAHI_PROTO_INET6, 0, resolve_callback, s)))
540
fprintf(stderr, "Failed to resolve service '%s': %s\n", name, avahi_strerror(avahi_server_errno(s)));
544
case AVAHI_BROWSER_REMOVE:
547
case AVAHI_BROWSER_ALL_FOR_NOW:
548
case AVAHI_BROWSER_CACHE_EXHAUSTED:
553
int main(AVAHI_GCC_UNUSED int argc, AVAHI_GCC_UNUSED char*argv[]) {
1296
554
AvahiServerConfig config;
1297
/* Do not publish any local Zeroconf records */
555
AvahiSServiceBrowser *sb = NULL;
556
const char db[] = "--debug";
559
int returncode = EXIT_SUCCESS;
560
char *basename = rindex(argv[0], '/');
561
if(basename == NULL){
567
char *program_name = malloc(strlen(basename) + sizeof(db));
569
if (program_name == NULL){
574
program_name[0] = '\0';
576
for (int i = 1; i < argc; i++){
577
if (not strncmp(argv[i], db, 5)){
578
strcat(strcat(strcat(program_name, db ), "="), basename);
579
if(not strcmp(argv[i], db) or not strcmp(argv[i], program_name)){
587
avahi_set_log_function(empty_log);
590
/* Initialize the psuedo-RNG */
593
/* Allocate main loop object */
594
if (!(simple_poll = avahi_simple_poll_new())) {
595
fprintf(stderr, "Failed to create simple poll object.\n");
600
/* Do not publish any local records */
1298
601
avahi_server_config_init(&config);
1299
602
config.publish_hinfo = 0;
1300
603
config.publish_addresses = 0;
1301
604
config.publish_workstation = 0;
1302
605
config.publish_domain = 0;
1304
607
/* Allocate a new server */
1305
mc.server = avahi_server_new(avahi_simple_poll_get
1306
(mc.simple_poll), &config, NULL,
1309
/* Free the Avahi configuration data */
608
server = avahi_server_new(avahi_simple_poll_get(simple_poll), &config, NULL, NULL, &error);
610
/* Free the configuration data */
1310
611
avahi_server_config_free(&config);
1313
/* Check if creating the Avahi server object succeeded */
1314
if(mc.server == NULL){
1315
fprintf(stderr, "Failed to create Avahi server: %s\n",
1316
avahi_strerror(error));
1317
exitcode = EXIT_FAILURE;
1325
/* Create the Avahi service browser */
1326
sb = avahi_s_service_browser_new(mc.server, if_index,
1327
AVAHI_PROTO_UNSPEC, "_mandos._tcp",
1328
NULL, 0, browse_callback, NULL);
1330
fprintf(stderr, "Failed to create service browser: %s\n",
1331
avahi_strerror(avahi_server_errno(mc.server)));
1332
exitcode = EXIT_FAILURE;
1340
/* Run the main loop */
1343
fprintf(stderr, "Starting Avahi loop search\n");
1346
avahi_simple_poll_loop(mc.simple_poll);
1351
fprintf(stderr, "%s exiting\n", argv[0]);
1354
/* Cleanup things */
1356
avahi_s_service_browser_free(sb);
1358
if(mc.server != NULL)
1359
avahi_server_free(mc.server);
1361
if(mc.simple_poll != NULL)
1362
avahi_simple_poll_free(mc.simple_poll);
1364
if(gnutls_initialized){
1365
gnutls_certificate_free_credentials(mc.cred);
1366
gnutls_global_deinit();
1367
gnutls_dh_params_deinit(mc.dh_params);
1370
if(gpgme_initialized){
1371
gpgme_release(mc.ctx);
1374
/* Take down the network interface */
1375
if(take_down_interface){
1376
ret = ioctl(sd, SIOCGIFFLAGS, &network);
1378
perror("ioctl SIOCGIFFLAGS");
1379
} else if(network.ifr_flags & IFF_UP) {
1380
network.ifr_flags &= ~IFF_UP; /* clear flag */
1381
ret = ioctl(sd, SIOCSIFFLAGS, &network);
1383
perror("ioctl SIOCSIFFLAGS");
1386
ret = (int)TEMP_FAILURE_RETRY(close(sd));
1392
/* Removes the temp directory used by GPGME */
1393
if(tempdir_created){
1395
struct dirent *direntry;
1396
d = opendir(tempdir);
1398
if(errno != ENOENT){
1403
direntry = readdir(d);
1404
if(direntry == NULL){
1407
/* Skip "." and ".." */
1408
if(direntry->d_name[0] == '.'
1409
and (direntry->d_name[1] == '\0'
1410
or (direntry->d_name[1] == '.'
1411
and direntry->d_name[2] == '\0'))){
1414
char *fullname = NULL;
1415
ret = asprintf(&fullname, "%s/%s", tempdir,
1421
ret = remove(fullname);
1423
fprintf(stderr, "remove(\"%s\"): %s\n", fullname,
1430
ret = rmdir(tempdir);
1431
if(ret == -1 and errno != ENOENT){
1437
ret = sigaction(signal_received, &old_sigterm_action, NULL);
1439
perror("sigaction");
1441
raise(signal_received);
613
/* Check if creating the server object succeeded */
615
fprintf(stderr, "Failed to create server: %s\n", avahi_strerror(error));
616
returncode = EXIT_FAILURE;
620
/* Create the service browser */
621
if (!(sb = avahi_s_service_browser_new(server, if_nametoindex("eth0"), AVAHI_PROTO_INET6, "_mandos._tcp", NULL, 0, browse_callback, server))) {
622
fprintf(stderr, "Failed to create service browser: %s\n", avahi_strerror(avahi_server_errno(server)));
623
returncode = EXIT_FAILURE;
627
/* Run the main loop */
630
fprintf(stderr, "Starting avahi loop search\n");
633
avahi_simple_poll_loop(simple_poll);
638
fprintf(stderr, "%s exiting\n", argv[0]);
643
avahi_s_service_browser_free(sb);
646
avahi_server_free(server);
649
avahi_simple_poll_free(simple_poll);