249
229
new_server->next = new_server;
250
230
new_server->prev = new_server;
251
231
*current_server = new_server;
232
/* Place the new server last in the list */
253
/* Place the new server last in the list */
254
234
new_server->next = *current_server;
255
235
new_server->prev = (*current_server)->prev;
256
236
new_server->prev->next = new_server;
257
237
(*current_server)->prev = new_server;
239
ret = clock_gettime(CLOCK_MONOTONIC, &(*current_server)->last_seen);
241
perror_plus("clock_gettime");
263
248
* Initialize GPGME.
265
__attribute__((nonnull, warn_unused_result))
266
static bool init_gpgme(const char * const seckey,
267
const char * const pubkey,
268
const char * const tempdir,
250
static bool init_gpgme(const char *seckey, const char *pubkey,
251
const char *tempdir, mandos_context *mc){
270
252
gpgme_error_t rc;
271
253
gpgme_engine_info_t engine_info;
274
256
* Helper function to insert pub and seckey to the engine keyring.
276
bool import_key(const char * const filename){
258
bool import_key(const char *filename){
279
261
gpgme_data_t pgp_data;
793
775
char addrstr[(INET_ADDRSTRLEN > INET6_ADDRSTRLEN) ?
794
776
INET_ADDRSTRLEN : INET6_ADDRSTRLEN] = "";
795
778
if(af == AF_INET6){
796
ret = getnameinfo((struct sockaddr *)&to,
797
sizeof(struct sockaddr_in6),
798
addrstr, sizeof(addrstr), NULL, 0,
779
pcret = inet_ntop(af, &(to.in6.sin6_addr), addrstr,
801
ret = getnameinfo((struct sockaddr *)&to,
802
sizeof(struct sockaddr_in),
803
addrstr, sizeof(addrstr), NULL, 0,
782
pcret = inet_ntop(af, &(to.in.sin_addr), addrstr,
806
if(ret == EAI_SYSTEM){
807
perror_plus("getnameinfo");
808
} else if(ret != 0) {
809
fprintf_plus(stderr, "getnameinfo: %s", gai_strerror(ret));
810
} else if(strcmp(addrstr, ip) != 0){
811
fprintf_plus(stderr, "Canonical address form: %s\n", addrstr);
786
perror_plus("inet_ntop");
788
if(strcmp(addrstr, ip) != 0){
789
fprintf_plus(stderr, "Canonical address form: %s\n", addrstr);
1478
1452
if(setuid(0) == -1){
1479
1453
ret_errno = errno;
1454
perror_plus("seteuid");
1481
1456
errno = old_errno;
1482
1457
return ret_errno;
1485
1460
/* Set effective user ID to unprivileged saved user ID */
1486
__attribute__((warn_unused_result))
1487
1461
error_t lower_privileges(void){
1488
1462
error_t old_errno = errno;
1489
1463
error_t ret_errno = 0;
1490
1464
if(seteuid(uid) == -1){
1491
1465
ret_errno = errno;
1466
perror_plus("seteuid");
1493
1468
errno = old_errno;
1494
1469
return ret_errno;
1497
1472
/* Lower privileges permanently */
1498
__attribute__((warn_unused_result))
1499
1473
error_t lower_privileges_permanently(void){
1500
1474
error_t old_errno = errno;
1501
1475
error_t ret_errno = 0;
1502
1476
if(setuid(uid) == -1){
1503
1477
ret_errno = errno;
1478
perror_plus("setuid");
1505
1480
errno = old_errno;
1506
1481
return ret_errno;
1509
__attribute__((nonnull))
1510
void run_network_hooks(const char *mode, const char *interface,
1484
bool run_network_hooks(const char *mode, const char *interface,
1511
1485
const float delay){
1512
struct dirent **direntries = NULL;
1513
if(hookdir_fd == -1){
1514
hookdir_fd = open(hookdir, O_RDONLY);
1515
if(hookdir_fd == -1){
1516
if(errno == ENOENT){
1518
fprintf_plus(stderr, "Network hook directory \"%s\" not"
1519
" found\n", hookdir);
1522
perror_plus("open");
1528
#if __GLIBC_PREREQ(2, 15)
1529
int numhooks = scandirat(hookdir_fd, ".", &direntries,
1530
runnable_hook, alphasort);
1531
#else /* not __GLIBC_PREREQ(2, 15) */
1532
int numhooks = scandir(hookdir, &direntries, runnable_hook,
1534
#endif /* not __GLIBC_PREREQ(2, 15) */
1535
#else /* not __GLIBC__ */
1536
int numhooks = scandir(hookdir, &direntries, runnable_hook,
1538
#endif /* not __GLIBC__ */
1486
struct dirent **direntries;
1487
struct dirent *direntry;
1489
int numhooks = scandir(hookdir, &direntries, runnable_hook,
1539
1491
if(numhooks == -1){
1540
perror_plus("scandir");
1543
struct dirent *direntry;
1545
int devnull = open("/dev/null", O_RDONLY);
1546
for(int i = 0; i < numhooks; i++){
1547
direntry = direntries[i];
1549
fprintf_plus(stderr, "Running network hook \"%s\"\n",
1492
if(errno == ENOENT){
1494
fprintf_plus(stderr, "Network hook directory \"%s\" not"
1495
" found\n", hookdir);
1498
perror_plus("scandir");
1552
pid_t hook_pid = fork();
1555
/* Raise privileges */
1556
errno = raise_privileges_permanently();
1558
perror_plus("Failed to raise privileges");
1565
perror_plus("setgid");
1568
/* Reset supplementary groups */
1570
ret = setgroups(0, NULL);
1572
perror_plus("setgroups");
1575
ret = dup2(devnull, STDIN_FILENO);
1577
perror_plus("dup2(devnull, STDIN_FILENO)");
1580
ret = close(devnull);
1582
perror_plus("close");
1585
ret = dup2(STDERR_FILENO, STDOUT_FILENO);
1587
perror_plus("dup2(STDERR_FILENO, STDOUT_FILENO)");
1590
ret = setenv("MANDOSNETHOOKDIR", hookdir, 1);
1592
perror_plus("setenv");
1595
ret = setenv("DEVICE", interface, 1);
1597
perror_plus("setenv");
1600
ret = setenv("VERBOSITY", debug ? "1" : "0", 1);
1602
perror_plus("setenv");
1605
ret = setenv("MODE", mode, 1);
1607
perror_plus("setenv");
1611
ret = asprintf(&delaystring, "%f", (double)delay);
1501
int devnull = open("/dev/null", O_RDONLY);
1502
for(int i = 0; i < numhooks; i++){
1503
direntry = direntries[i];
1504
char *fullname = NULL;
1505
ret = asprintf(&fullname, "%s/%s", hookdir, direntry->d_name);
1613
1507
perror_plus("asprintf");
1616
ret = setenv("DELAY", delaystring, 1);
1511
fprintf_plus(stderr, "Running network hook \"%s\"\n",
1514
pid_t hook_pid = fork();
1517
/* Raise privileges */
1518
raise_privileges_permanently();
1523
perror_plus("setgid");
1525
/* Reset supplementary groups */
1527
ret = setgroups(0, NULL);
1529
perror_plus("setgroups");
1531
dup2(devnull, STDIN_FILENO);
1533
dup2(STDERR_FILENO, STDOUT_FILENO);
1534
ret = setenv("MANDOSNETHOOKDIR", hookdir, 1);
1536
perror_plus("setenv");
1539
ret = setenv("DEVICE", interface, 1);
1541
perror_plus("setenv");
1544
ret = setenv("VERBOSITY", debug ? "1" : "0", 1);
1546
perror_plus("setenv");
1549
ret = setenv("MODE", mode, 1);
1551
perror_plus("setenv");
1555
ret = asprintf(&delaystring, "%f", delay);
1557
perror_plus("asprintf");
1560
ret = setenv("DELAY", delaystring, 1);
1563
perror_plus("setenv");
1618
1566
free(delaystring);
1619
perror_plus("setenv");
1623
if(connect_to != NULL){
1624
ret = setenv("CONNECT", connect_to, 1);
1626
perror_plus("setenv");
1630
int hook_fd = openat(hookdir_fd, direntry->d_name, O_RDONLY);
1632
perror_plus("openat");
1633
_exit(EXIT_FAILURE);
1635
if((int)TEMP_FAILURE_RETRY(close(hookdir_fd)) == -1){
1636
perror_plus("close");
1637
_exit(EXIT_FAILURE);
1639
if(fexecve(hook_fd, (char *const []){ direntry->d_name, NULL },
1641
perror_plus("fexecve");
1642
_exit(EXIT_FAILURE);
1646
if(TEMP_FAILURE_RETRY(waitpid(hook_pid, &status, 0)) == -1){
1647
perror_plus("waitpid");
1650
if(WIFEXITED(status)){
1651
if(WEXITSTATUS(status) != 0){
1652
fprintf_plus(stderr, "Warning: network hook \"%s\" exited"
1653
" with status %d\n", direntry->d_name,
1654
WEXITSTATUS(status));
1657
} else if(WIFSIGNALED(status)){
1658
fprintf_plus(stderr, "Warning: network hook \"%s\" died by"
1659
" signal %d\n", direntry->d_name,
1567
if(connect_to != NULL){
1568
ret = setenv("CONNECT", connect_to, 1);
1570
perror_plus("setenv");
1574
if(execl(fullname, direntry->d_name, mode, NULL) == -1){
1575
perror_plus("execl");
1576
_exit(EXIT_FAILURE);
1663
fprintf_plus(stderr, "Warning: network hook \"%s\""
1664
" crashed\n", direntry->d_name);
1669
fprintf_plus(stderr, "Network hook \"%s\" ran successfully\n",
1674
if((int)TEMP_FAILURE_RETRY(close(hookdir_fd)) == -1){
1675
perror_plus("close");
1580
if(TEMP_FAILURE_RETRY(waitpid(hook_pid, &status, 0)) == -1){
1581
perror_plus("waitpid");
1585
if(WIFEXITED(status)){
1586
if(WEXITSTATUS(status) != 0){
1587
fprintf_plus(stderr, "Warning: network hook \"%s\" exited"
1588
" with status %d\n", direntry->d_name,
1589
WEXITSTATUS(status));
1593
} else if(WIFSIGNALED(status)){
1594
fprintf_plus(stderr, "Warning: network hook \"%s\" died by"
1595
" signal %d\n", direntry->d_name,
1600
fprintf_plus(stderr, "Warning: network hook \"%s\""
1601
" crashed\n", direntry->d_name);
1608
fprintf_plus(stderr, "Network hook \"%s\" ran successfully\n",
1682
__attribute__((nonnull, warn_unused_result))
1683
1617
error_t bring_up_interface(const char *const interface,
1684
1618
const float delay){
1685
1620
error_t old_errno = errno;
1621
error_t ret_errno = 0;
1622
int ret, ret_setflags;
1687
1623
struct ifreq network;
1688
1624
unsigned int if_index = if_nametoindex(interface);
1689
1625
if(if_index == 0){
2557
/* Re-raise privileges */
2445
/* Re-raise priviliges */
2559
ret_errno = raise_privileges();
2562
perror_plus("Failed to raise privileges");
2565
/* Run network hooks */
2566
run_network_hooks("stop", interfaces_hooks != NULL ?
2567
interfaces_hooks : "", delay);
2569
/* Take down the network interfaces which were brought up */
2571
char *interface = NULL;
2572
while((interface=argz_next(interfaces_to_take_down,
2573
interfaces_to_take_down_size,
2575
ret_errno = take_down_interface(interface);
2578
perror_plus("Failed to take down interface");
2581
if(debug and (interfaces_to_take_down == NULL)){
2582
fprintf_plus(stderr, "No interfaces needed to be taken"
2588
ret_errno = lower_privileges_permanently();
2591
perror_plus("Failed to lower privileges permanently");
2449
/* Run network hooks */
2450
run_network_hooks("stop", interfaces_hooks != NULL ?
2451
interfaces_hooks : "", delay);
2453
/* Take down the network interfaces which were brought up */
2455
char *interface = NULL;
2456
while((interface=argz_next(interfaces_to_take_down,
2457
interfaces_to_take_down_size,
2459
ret_errno = take_down_interface(interface);
2462
perror_plus("Failed to take down interface");
2465
if(debug and (interfaces_to_take_down == NULL)){
2466
fprintf_plus(stderr, "No interfaces needed to be taken"
2471
lower_privileges_permanently();
2595
2474
free(interfaces_to_take_down);
2596
2475
free(interfaces_hooks);
2598
2477
/* Removes the GPGME temp directory and all files inside */
2599
if(tempdir != NULL){
2478
if(tempdir_created){
2600
2479
struct dirent **direntries = NULL;
2601
int tempdir_fd = (int)TEMP_FAILURE_RETRY(open(tempdir, O_RDONLY |
2603
if(tempdir_fd == -1){
2604
perror_plus("open");
2607
#if __GLIBC_PREREQ(2, 15)
2608
int numentries = scandirat(tempdir_fd, ".", &direntries,
2609
notdotentries, alphasort);
2610
#else /* not __GLIBC_PREREQ(2, 15) */
2611
int numentries = scandir(tempdir, &direntries, notdotentries,
2613
#endif /* not __GLIBC_PREREQ(2, 15) */
2614
#else /* not __GLIBC__ */
2615
int numentries = scandir(tempdir, &direntries, notdotentries,
2617
#endif /* not __GLIBC__ */
2618
if(numentries >= 0){
2619
for(int i = 0; i < numentries; i++){
2620
ret = unlinkat(tempdir_fd, direntries[i]->d_name, 0);
2622
fprintf_plus(stderr, "unlinkat(open(\"%s\", O_RDONLY),"
2623
" \"%s\", 0): %s\n", tempdir,
2624
direntries[i]->d_name, strerror(errno));
2628
/* need to clean even if 0 because man page doesn't specify */
2630
if(numentries == -1){
2631
perror_plus("scandir");
2633
ret = rmdir(tempdir);
2634
if(ret == -1 and errno != ENOENT){
2635
perror_plus("rmdir");
2480
struct dirent *direntry = NULL;
2481
int numentries = scandir(tempdir, &direntries, notdotentries,
2483
if (numentries > 0){
2484
for(int i = 0; i < numentries; i++){
2485
direntry = direntries[i];
2486
char *fullname = NULL;
2487
ret = asprintf(&fullname, "%s/%s", tempdir,
2490
perror_plus("asprintf");
2493
ret = remove(fullname);
2495
fprintf_plus(stderr, "remove(\"%s\"): %s\n", fullname,
2638
TEMP_FAILURE_RETRY(close(tempdir_fd));
2502
/* need to clean even if 0 because man page doesn't specify */
2504
if (numentries == -1){
2505
perror_plus("scandir");
2507
ret = rmdir(tempdir);
2508
if(ret == -1 and errno != ENOENT){
2509
perror_plus("rmdir");