101
47
#include <avahi-common/malloc.h>
102
48
#include <avahi-common/error.h>
105
#include <gnutls/gnutls.h> /* All GnuTLS types, constants and
108
init_gnutls_session(),
110
#include <gnutls/openpgp.h>
111
/* gnutls_certificate_set_openpgp_key_file(),
112
GNUTLS_OPENPGP_FMT_BASE64 */
115
#include <gpgme.h> /* All GPGME types, constants and
118
GPGME_PROTOCOL_OpenPGP,
51
#include <sys/types.h> /* socket(), inet_pton() */
52
#include <sys/socket.h> /* socket(), struct sockaddr_in6,
53
struct in6_addr, inet_pton() */
54
#include <gnutls/gnutls.h> /* All GnuTLS stuff */
55
#include <gnutls/openpgp.h> /* GnuTLS with openpgp stuff */
57
#include <unistd.h> /* close() */
58
#include <netinet/in.h>
59
#include <stdbool.h> /* true */
60
#include <string.h> /* memset */
61
#include <arpa/inet.h> /* inet_pton() */
62
#include <iso646.h> /* not */
65
#include <errno.h> /* perror() */
121
71
#define BUFFER_SIZE 256
123
#define PATHDIR "/conf/conf.d/mandos"
124
#define SECKEY "seckey.txt"
125
#define PUBKEY "pubkey.txt"
74
const char *certdir = "/conf/conf.d/cryptkeyreq/";
75
const char *certfile = "openpgp-client.txt";
76
const char *certkey = "openpgp-client-key.txt";
127
78
bool debug = false;
128
static const char mandos_protocol_version[] = "1";
129
const char *argp_program_version = "mandos-client " VERSION;
130
const char *argp_program_bug_address = "<mandos@recompile.se>";
131
static const char sys_class_net[] = "/sys/class/net";
132
char *connect_to = NULL;
134
/* Doubly linked list that need to be circularly linked when used */
135
typedef struct server{
138
AvahiIfIndex if_index;
140
struct timespec last_seen;
145
/* Used for passing in values through the Avahi callback functions */
147
AvahiSimplePoll *simple_poll;
81
gnutls_session_t session;
149
82
gnutls_certificate_credentials_t cred;
150
unsigned int dh_bits;
151
83
gnutls_dh_params_t dh_params;
152
const char *priority;
87
ssize_t pgp_packet_decrypt (char *packet, size_t packet_size,
88
char **new_packet, const char *homedir){
89
gpgme_data_t dh_crypto, dh_plain;
154
server *current_server;
157
/* global context so signal handler can reach it*/
158
mandos_context mc = { .simple_poll = NULL, .server = NULL,
159
.dh_bits = 1024, .priority = "SECURE256"
160
":!CTYPE-X.509:+CTYPE-OPENPGP",
161
.current_server = NULL };
163
sig_atomic_t quit_now = 0;
164
int signal_received = 0;
166
/* Function to use when printing errors */
167
void perror_plus(const char *print_text){
168
fprintf(stderr, "Mandos plugin %s: ",
169
program_invocation_short_name);
174
* Make additional room in "buffer" for at least BUFFER_SIZE more
175
* bytes. "buffer_capacity" is how much is currently allocated,
176
* "buffer_length" is how much is already used.
178
size_t incbuffer(char **buffer, size_t buffer_length,
179
size_t buffer_capacity){
180
if(buffer_length + BUFFER_SIZE > buffer_capacity){
181
*buffer = realloc(*buffer, buffer_capacity + BUFFER_SIZE);
185
buffer_capacity += BUFFER_SIZE;
187
return buffer_capacity;
190
/* Add server to set of servers to retry periodically */
191
int add_server(const char *ip, uint16_t port,
192
AvahiIfIndex if_index,
195
server *new_server = malloc(sizeof(server));
196
if(new_server == NULL){
197
perror_plus("malloc");
200
*new_server = (server){ .ip = strdup(ip),
202
.if_index = if_index,
204
if(new_server->ip == NULL){
205
perror_plus("strdup");
208
/* Special case of first server */
209
if (mc.current_server == NULL){
210
new_server->next = new_server;
211
new_server->prev = new_server;
212
mc.current_server = new_server;
213
/* Place the new server last in the list */
215
new_server->next = mc.current_server;
216
new_server->prev = mc.current_server->prev;
217
new_server->prev->next = new_server;
218
mc.current_server->prev = new_server;
220
ret = clock_gettime(CLOCK_MONOTONIC, &mc.current_server->last_seen);
222
perror_plus("clock_gettime");
231
static bool init_gpgme(const char *seckey,
232
const char *pubkey, const char *tempdir){
93
ssize_t new_packet_capacity = 0;
94
ssize_t new_packet_length = 0;
234
95
gpgme_engine_info_t engine_info;
238
* Helper function to insert pub and seckey to the engine keyring.
240
bool import_key(const char *filename){
243
gpgme_data_t pgp_data;
245
fd = (int)TEMP_FAILURE_RETRY(open(filename, O_RDONLY));
251
rc = gpgme_data_new_from_fd(&pgp_data, fd);
252
if(rc != GPG_ERR_NO_ERROR){
253
fprintf(stderr, "bad gpgme_data_new_from_fd: %s: %s\n",
254
gpgme_strsource(rc), gpgme_strerror(rc));
258
rc = gpgme_op_import(mc.ctx, pgp_data);
259
if(rc != GPG_ERR_NO_ERROR){
260
fprintf(stderr, "bad gpgme_op_import: %s: %s\n",
261
gpgme_strsource(rc), gpgme_strerror(rc));
265
ret = (int)TEMP_FAILURE_RETRY(close(fd));
267
perror_plus("close");
269
gpgme_data_release(pgp_data);
274
fprintf(stderr, "Initializing GPGME\n");
98
fprintf(stderr, "Trying to decrypt OpenPGP packet\n");
278
102
gpgme_check_version(NULL);
279
103
rc = gpgme_engine_check_version(GPGME_PROTOCOL_OpenPGP);
280
if(rc != GPG_ERR_NO_ERROR){
104
if (rc != GPG_ERR_NO_ERROR){
281
105
fprintf(stderr, "bad gpgme_engine_check_version: %s: %s\n",
282
106
gpgme_strsource(rc), gpgme_strerror(rc));
286
/* Set GPGME home directory for the OpenPGP engine only */
287
rc = gpgme_get_engine_info(&engine_info);
288
if(rc != GPG_ERR_NO_ERROR){
110
/* Set GPGME home directory */
111
rc = gpgme_get_engine_info (&engine_info);
112
if (rc != GPG_ERR_NO_ERROR){
289
113
fprintf(stderr, "bad gpgme_get_engine_info: %s: %s\n",
290
114
gpgme_strsource(rc), gpgme_strerror(rc));
293
117
while(engine_info != NULL){
294
118
if(engine_info->protocol == GPGME_PROTOCOL_OpenPGP){
295
119
gpgme_set_engine_info(GPGME_PROTOCOL_OpenPGP,
296
engine_info->file_name, tempdir);
120
engine_info->file_name, homedir);
299
123
engine_info = engine_info->next;
301
125
if(engine_info == NULL){
302
fprintf(stderr, "Could not set GPGME home dir to %s\n", tempdir);
306
/* Create new GPGME "context" */
307
rc = gpgme_new(&(mc.ctx));
308
if(rc != GPG_ERR_NO_ERROR){
309
fprintf(stderr, "bad gpgme_new: %s: %s\n",
310
gpgme_strsource(rc), gpgme_strerror(rc));
314
if(not import_key(pubkey) or not import_key(seckey)){
322
* Decrypt OpenPGP data.
323
* Returns -1 on error
325
static ssize_t pgp_packet_decrypt(const char *cryptotext,
328
gpgme_data_t dh_crypto, dh_plain;
331
size_t plaintext_capacity = 0;
332
ssize_t plaintext_length = 0;
335
fprintf(stderr, "Trying to decrypt OpenPGP data\n");
338
/* Create new GPGME data buffer from memory cryptotext */
339
rc = gpgme_data_new_from_mem(&dh_crypto, cryptotext, crypto_size,
341
if(rc != GPG_ERR_NO_ERROR){
126
fprintf(stderr, "Could not set home dir to %s\n", homedir);
130
/* Create new GPGME data buffer from packet buffer */
131
rc = gpgme_data_new_from_mem(&dh_crypto, packet, packet_size, 0);
132
if (rc != GPG_ERR_NO_ERROR){
342
133
fprintf(stderr, "bad gpgme_data_new_from_mem: %s: %s\n",
343
134
gpgme_strsource(rc), gpgme_strerror(rc));
393
fprintf(stderr, "Decryption of OpenPGP data succeeded\n");
196
/* Delete the GPGME FILE pointer cryptotext data buffer */
197
gpgme_data_release(dh_crypto);
396
199
/* Seek back to the beginning of the GPGME plaintext data buffer */
397
if(gpgme_data_seek(dh_plain, (off_t)0, SEEK_SET) == -1){
398
perror_plus("gpgme_data_seek");
399
plaintext_length = -1;
200
if (gpgme_data_seek(dh_plain, (off_t) 0, SEEK_SET) == -1){
201
perror("pgpme_data_seek");
405
plaintext_capacity = incbuffer(plaintext,
406
(size_t)plaintext_length,
408
if(plaintext_capacity == 0){
409
perror_plus("incbuffer");
410
plaintext_length = -1;
206
if (new_packet_length + BUFFER_SIZE > new_packet_capacity){
207
*new_packet = realloc(*new_packet,
208
(unsigned int)new_packet_capacity
210
if (*new_packet == NULL){
214
new_packet_capacity += BUFFER_SIZE;
414
ret = gpgme_data_read(dh_plain, *plaintext + plaintext_length,
217
ret = gpgme_data_read(dh_plain, *new_packet + new_packet_length,
416
219
/* Print the data, if any */
422
perror_plus("gpgme_data_read");
423
plaintext_length = -1;
426
plaintext_length += ret;
430
fprintf(stderr, "Decrypted password is: ");
431
for(ssize_t i = 0; i < plaintext_length; i++){
432
fprintf(stderr, "%02hhX ", (*plaintext)[i]);
434
fprintf(stderr, "\n");
439
/* Delete the GPGME cryptotext data buffer */
440
gpgme_data_release(dh_crypto);
224
perror("gpgme_data_read");
227
new_packet_length += ret;
230
/* FIXME: check characters before printing to screen so to not print
231
terminal control characters */
233
/* fprintf(stderr, "decrypted password is: "); */
234
/* fwrite(*new_packet, 1, new_packet_length, stderr); */
235
/* fprintf(stderr, "\n"); */
442
238
/* Delete the GPGME plaintext data buffer */
443
239
gpgme_data_release(dh_plain);
444
return plaintext_length;
240
return new_packet_length;
447
static const char * safer_gnutls_strerror(int value){
448
const char *ret = gnutls_strerror(value); /* Spurious warning from
449
-Wunreachable-code */
243
static const char * safer_gnutls_strerror (int value) {
244
const char *ret = gnutls_strerror (value);
451
246
ret = "(unknown)";
455
/* GnuTLS log function callback */
456
static void debuggnutls(__attribute__((unused)) int level,
458
fprintf(stderr, "GnuTLS: %s", string);
250
void debuggnutls(__attribute__((unused)) int level,
252
fprintf(stderr, "%s", string);
461
static int init_gnutls_global(const char *pubkeyfilename,
462
const char *seckeyfilename){
255
int initgnutls(encrypted_session *es){
466
260
fprintf(stderr, "Initializing GnuTLS\n");
469
ret = gnutls_global_init();
470
if(ret != GNUTLS_E_SUCCESS){
471
fprintf(stderr, "GnuTLS global_init: %s\n",
472
safer_gnutls_strerror(ret));
263
if ((ret = gnutls_global_init ())
264
!= GNUTLS_E_SUCCESS) {
265
fprintf (stderr, "global_init: %s\n", safer_gnutls_strerror(ret));
477
/* "Use a log level over 10 to enable all debugging options."
480
270
gnutls_global_set_log_level(11);
481
271
gnutls_global_set_log_function(debuggnutls);
484
/* OpenPGP credentials */
485
ret = gnutls_certificate_allocate_credentials(&mc.cred);
486
if(ret != GNUTLS_E_SUCCESS){
487
fprintf(stderr, "GnuTLS memory error: %s\n",
488
safer_gnutls_strerror(ret));
489
gnutls_global_deinit();
274
/* openpgp credentials */
275
if ((ret = gnutls_certificate_allocate_credentials (&es->cred))
276
!= GNUTLS_E_SUCCESS) {
277
fprintf (stderr, "memory error: %s\n",
278
safer_gnutls_strerror(ret));
494
fprintf(stderr, "Attempting to use OpenPGP public key %s and"
495
" secret key %s as GnuTLS credentials\n", pubkeyfilename,
283
fprintf(stderr, "Attempting to use OpenPGP certificate %s"
284
" and keyfile %s as GnuTLS credentials\n", certfile,
499
288
ret = gnutls_certificate_set_openpgp_key_file
500
(mc.cred, pubkeyfilename, seckeyfilename,
501
GNUTLS_OPENPGP_FMT_BASE64);
502
if(ret != GNUTLS_E_SUCCESS){
504
"Error[%d] while reading the OpenPGP key pair ('%s',"
505
" '%s')\n", ret, pubkeyfilename, seckeyfilename);
506
fprintf(stderr, "The GnuTLS error is: %s\n",
507
safer_gnutls_strerror(ret));
511
/* GnuTLS server initialization */
512
ret = gnutls_dh_params_init(&mc.dh_params);
513
if(ret != GNUTLS_E_SUCCESS){
514
fprintf(stderr, "Error in GnuTLS DH parameter initialization:"
515
" %s\n", safer_gnutls_strerror(ret));
518
ret = gnutls_dh_params_generate2(mc.dh_params, mc.dh_bits);
519
if(ret != GNUTLS_E_SUCCESS){
520
fprintf(stderr, "Error in GnuTLS prime generation: %s\n",
521
safer_gnutls_strerror(ret));
525
gnutls_certificate_set_dh_params(mc.cred, mc.dh_params);
531
gnutls_certificate_free_credentials(mc.cred);
532
gnutls_global_deinit();
533
gnutls_dh_params_deinit(mc.dh_params);
537
static int init_gnutls_session(gnutls_session_t *session){
539
/* GnuTLS session creation */
541
ret = gnutls_init(session, GNUTLS_SERVER);
545
} while(ret == GNUTLS_E_INTERRUPTED or ret == GNUTLS_E_AGAIN);
546
if(ret != GNUTLS_E_SUCCESS){
289
(es->cred, certfile, certkey, GNUTLS_OPENPGP_FMT_BASE64);
290
if (ret != GNUTLS_E_SUCCESS) {
292
(stderr, "Error[%d] while reading the OpenPGP key pair ('%s',"
294
ret, certfile, certkey);
295
fprintf(stdout, "The Error is: %s\n",
296
safer_gnutls_strerror(ret));
300
//GnuTLS server initialization
301
if ((ret = gnutls_dh_params_init (&es->dh_params))
302
!= GNUTLS_E_SUCCESS) {
303
fprintf (stderr, "Error in dh parameter initialization: %s\n",
304
safer_gnutls_strerror(ret));
308
if ((ret = gnutls_dh_params_generate2 (es->dh_params, DH_BITS))
309
!= GNUTLS_E_SUCCESS) {
310
fprintf (stderr, "Error in prime generation: %s\n",
311
safer_gnutls_strerror(ret));
315
gnutls_certificate_set_dh_params (es->cred, es->dh_params);
317
// GnuTLS session creation
318
if ((ret = gnutls_init (&es->session, GNUTLS_SERVER))
319
!= GNUTLS_E_SUCCESS){
547
320
fprintf(stderr, "Error in GnuTLS session initialization: %s\n",
548
321
safer_gnutls_strerror(ret));
554
ret = gnutls_priority_set_direct(*session, mc.priority, &err);
556
gnutls_deinit(*session);
559
} while(ret == GNUTLS_E_INTERRUPTED or ret == GNUTLS_E_AGAIN);
560
if(ret != GNUTLS_E_SUCCESS){
561
fprintf(stderr, "Syntax error at: %s\n", err);
562
fprintf(stderr, "GnuTLS error: %s\n",
563
safer_gnutls_strerror(ret));
564
gnutls_deinit(*session);
324
if ((ret = gnutls_priority_set_direct (es->session, "NORMAL", &err))
325
!= GNUTLS_E_SUCCESS) {
326
fprintf(stderr, "Syntax error at: %s\n", err);
327
fprintf(stderr, "GnuTLS error: %s\n",
328
safer_gnutls_strerror(ret));
570
ret = gnutls_credentials_set(*session, GNUTLS_CRD_CERTIFICATE,
573
gnutls_deinit(*session);
576
} while(ret == GNUTLS_E_INTERRUPTED or ret == GNUTLS_E_AGAIN);
577
if(ret != GNUTLS_E_SUCCESS){
578
fprintf(stderr, "Error setting GnuTLS credentials: %s\n",
332
if ((ret = gnutls_credentials_set
333
(es->session, GNUTLS_CRD_CERTIFICATE, es->cred))
334
!= GNUTLS_E_SUCCESS) {
335
fprintf(stderr, "Error setting a credentials set: %s\n",
579
336
safer_gnutls_strerror(ret));
580
gnutls_deinit(*session);
584
340
/* ignore client certificate if any. */
585
gnutls_certificate_server_set_request(*session, GNUTLS_CERT_IGNORE);
341
gnutls_certificate_server_set_request (es->session,
587
gnutls_dh_set_prime_bits(*session, mc.dh_bits);
344
gnutls_dh_set_prime_bits (es->session, DH_BITS);
592
/* Avahi log function callback */
593
static void empty_log(__attribute__((unused)) AvahiLogLevel level,
594
__attribute__((unused)) const char *txt){}
349
void empty_log(__attribute__((unused)) AvahiLogLevel level,
350
__attribute__((unused)) const char *txt){}
596
/* Called when a Mandos server is found */
597
static int start_mandos_communication(const char *ip, uint16_t port,
598
AvahiIfIndex if_index,
600
int ret, tcp_sd = -1;
603
struct sockaddr_in in;
604
struct sockaddr_in6 in6;
352
int start_mandos_communication(const char *ip, uint16_t port,
353
unsigned int if_index){
355
struct sockaddr_in6 to;
356
encrypted_session es;
606
357
char *buffer = NULL;
607
char *decrypted_buffer = NULL;
358
char *decrypted_buffer;
608
359
size_t buffer_length = 0;
609
360
size_t buffer_capacity = 0;
612
gnutls_session_t session;
613
int pf; /* Protocol family */
630
fprintf(stderr, "Bad address family: %d\n", af);
635
ret = init_gnutls_session(&session);
641
fprintf(stderr, "Setting up a TCP connection to %s, port %" PRIu16
645
tcp_sd = socket(pf, SOCK_STREAM, 0);
648
perror_plus("socket");
658
memset(&to, 0, sizeof(to));
660
to.in6.sin6_family = (sa_family_t)af;
661
ret = inet_pton(af, ip, &to.in6.sin6_addr);
663
to.in.sin_family = (sa_family_t)af;
664
ret = inet_pton(af, ip, &to.in.sin_addr);
668
perror_plus("inet_pton");
361
ssize_t decrypted_buffer_size;
364
char interface[IF_NAMESIZE];
367
fprintf(stderr, "Setting up a tcp connection to %s\n", ip);
370
tcp_sd = socket(PF_INET6, SOCK_STREAM, 0);
376
if(if_indextoname(if_index, interface) == NULL){
378
perror("if_indextoname");
384
fprintf(stderr, "Binding to interface %s\n", interface);
387
memset(&to,0,sizeof(to)); /* Spurious warning */
388
to.sin6_family = AF_INET6;
389
ret = inet_pton(AF_INET6, ip, &to.sin6_addr);
674
395
fprintf(stderr, "Bad address: %s\n", ip);
679
to.in6.sin6_port = htons(port); /* Spurious warnings from
681
-Wunreachable-code */
683
if(IN6_IS_ADDR_LINKLOCAL /* Spurious warnings from */
684
(&to.in6.sin6_addr)){ /* -Wstrict-aliasing=2 or lower and
686
if(if_index == AVAHI_IF_UNSPEC){
687
fprintf(stderr, "An IPv6 link-local address is incomplete"
688
" without a network interface\n");
692
/* Set the network interface number as scope */
693
to.in6.sin6_scope_id = (uint32_t)if_index;
696
to.in.sin_port = htons(port); /* Spurious warnings from
698
-Wunreachable-code */
398
to.sin6_port = htons(port); /* Spurious warning */
400
to.sin6_scope_id = (uint32_t)if_index;
707
if(af == AF_INET6 and if_index != AVAHI_IF_UNSPEC){
708
char interface[IF_NAMESIZE];
709
if(if_indextoname((unsigned int)if_index, interface) == NULL){
710
perror_plus("if_indextoname");
712
fprintf(stderr, "Connection to: %s%%%s, port %" PRIu16 "\n",
713
ip, interface, port);
716
fprintf(stderr, "Connection to: %s, port %" PRIu16 "\n", ip,
719
char addrstr[(INET_ADDRSTRLEN > INET6_ADDRSTRLEN) ?
720
INET_ADDRSTRLEN : INET6_ADDRSTRLEN] = "";
723
pcret = inet_ntop(af, &(to.in6.sin6_addr), addrstr,
726
pcret = inet_ntop(af, &(to.in.sin_addr), addrstr,
730
perror_plus("inet_ntop");
732
if(strcmp(addrstr, ip) != 0){
733
fprintf(stderr, "Canonical address form: %s\n", addrstr);
744
ret = connect(tcp_sd, &to.in6, sizeof(to));
746
ret = connect(tcp_sd, &to.in, sizeof(to)); /* IPv4 */
749
if ((errno != ECONNREFUSED and errno != ENETUNREACH) or debug){
751
perror_plus("connect");
762
const char *out = mandos_protocol_version;
765
size_t out_size = strlen(out);
766
ret = (int)TEMP_FAILURE_RETRY(write(tcp_sd, out + written,
767
out_size - written));
770
perror_plus("write");
774
written += (size_t)ret;
775
if(written < out_size){
778
if(out == mandos_protocol_version){
403
fprintf(stderr, "Connection to: %s\n", ip);
406
ret = connect(tcp_sd, (struct sockaddr *) &to, sizeof(to));
412
ret = initgnutls (&es);
418
gnutls_transport_set_ptr (es.session,
419
(gnutls_transport_ptr_t) tcp_sd);
793
422
fprintf(stderr, "Establishing TLS session with %s\n", ip);
801
/* Spurious warning from -Wint-to-pointer-cast */
802
gnutls_transport_set_ptr(session, (gnutls_transport_ptr_t) tcp_sd);
810
ret = gnutls_handshake(session);
815
} while(ret == GNUTLS_E_AGAIN or ret == GNUTLS_E_INTERRUPTED);
817
if(ret != GNUTLS_E_SUCCESS){
425
ret = gnutls_handshake (es.session);
427
if (ret != GNUTLS_E_SUCCESS){
819
fprintf(stderr, "*** GnuTLS Handshake failed ***\n");
429
fprintf(stderr, "\n*** Handshake failed ***\n");
826
/* Read OpenPGP packet that contains the wanted password */
436
//Retrieve OpenPGP packet that contains the wanted password
829
fprintf(stderr, "Retrieving OpenPGP encrypted password from %s\n",
439
fprintf(stderr, "Retrieving pgp encrypted password from %s\n",
840
buffer_capacity = incbuffer(&buffer, buffer_length,
842
if(buffer_capacity == 0){
844
perror_plus("incbuffer");
854
sret = gnutls_record_recv(session, buffer+buffer_length,
444
if (buffer_length + BUFFER_SIZE > buffer_capacity){
445
buffer = realloc(buffer, buffer_capacity + BUFFER_SIZE);
450
buffer_capacity += BUFFER_SIZE;
453
ret = gnutls_record_recv
454
(es.session, buffer+buffer_length, BUFFER_SIZE);
861
460
case GNUTLS_E_INTERRUPTED:
862
461
case GNUTLS_E_AGAIN:
864
463
case GNUTLS_E_REHANDSHAKE:
866
ret = gnutls_handshake(session);
872
} while(ret == GNUTLS_E_AGAIN or ret == GNUTLS_E_INTERRUPTED);
874
fprintf(stderr, "*** GnuTLS Re-handshake failed ***\n");
464
ret = gnutls_handshake (es.session);
466
fprintf(stderr, "\n*** Handshake failed ***\n");
881
473
fprintf(stderr, "Unknown error while reading data from"
882
" encrypted session with Mandos server\n");
883
gnutls_bye(session, GNUTLS_SHUT_RDWR);
474
" encrypted session with mandos server\n");
476
gnutls_bye (es.session, GNUTLS_SHUT_RDWR);
888
buffer_length += (size_t) sret;
893
fprintf(stderr, "Closing TLS session\n");
902
ret = gnutls_bye(session, GNUTLS_SHUT_RDWR);
907
} while(ret == GNUTLS_E_AGAIN or ret == GNUTLS_E_INTERRUPTED);
909
if(buffer_length > 0){
910
ssize_t decrypted_buffer_size;
480
buffer_length += (size_t) ret;
484
if (buffer_length > 0){
911
485
decrypted_buffer_size = pgp_packet_decrypt(buffer,
914
if(decrypted_buffer_size >= 0){
917
while(written < (size_t) decrypted_buffer_size){
923
ret = (int)fwrite(decrypted_buffer + written, 1,
924
(size_t)decrypted_buffer_size - written,
489
if (decrypted_buffer_size >= 0){
490
while(written < decrypted_buffer_size){
491
ret = (int)fwrite (decrypted_buffer + written, 1,
492
(size_t)decrypted_buffer_size - written,
926
494
if(ret == 0 and ferror(stdout)){
929
496
fprintf(stderr, "Error writing encrypted data: %s\n",
930
497
strerror(errno));
935
502
written += (size_t)ret;
941
/* Shutdown procedure */
946
free(decrypted_buffer);
949
ret = (int)TEMP_FAILURE_RETRY(close(tcp_sd));
955
perror_plus("close");
957
gnutls_deinit(session);
504
free(decrypted_buffer);
513
fprintf(stderr, "Closing TLS session\n");
517
gnutls_bye (es.session, GNUTLS_SHUT_RDWR);
520
gnutls_deinit (es.session);
521
gnutls_certificate_free_credentials (es.cred);
522
gnutls_global_deinit ();
967
static void resolve_callback(AvahiSServiceResolver *r,
968
AvahiIfIndex interface,
970
AvahiResolverEvent event,
974
const char *host_name,
975
const AvahiAddress *address,
977
AVAHI_GCC_UNUSED AvahiStringList *txt,
978
AVAHI_GCC_UNUSED AvahiLookupResultFlags
980
AVAHI_GCC_UNUSED void* userdata){
526
static AvahiSimplePoll *simple_poll = NULL;
527
static AvahiServer *server = NULL;
529
static void resolve_callback(
530
AvahiSServiceResolver *r,
531
AvahiIfIndex interface,
532
AVAHI_GCC_UNUSED AvahiProtocol protocol,
533
AvahiResolverEvent event,
537
const char *host_name,
538
const AvahiAddress *address,
540
AVAHI_GCC_UNUSED AvahiStringList *txt,
541
AVAHI_GCC_UNUSED AvahiLookupResultFlags flags,
542
AVAHI_GCC_UNUSED void* userdata) {
544
assert(r); /* Spurious warning */
983
546
/* Called whenever a service has been resolved successfully or
992
551
case AVAHI_RESOLVER_FAILURE:
993
fprintf(stderr, "(Avahi Resolver) Failed to resolve service '%s'"
994
" of type '%s' in domain '%s': %s\n", name, type, domain,
995
avahi_strerror(avahi_server_errno(mc.server)));
552
fprintf(stderr, "(Resolver) Failed to resolve service '%s' of"
553
" type '%s' in domain '%s': %s\n", name, type, domain,
554
avahi_strerror(avahi_server_errno(server)));
998
557
case AVAHI_RESOLVER_FOUND:
1000
559
char ip[AVAHI_ADDRESS_STR_MAX];
1001
560
avahi_address_snprint(ip, sizeof(ip), address);
1003
fprintf(stderr, "Mandos server \"%s\" found on %s (%s, %"
1004
PRIdMAX ") on port %" PRIu16 "\n", name, host_name,
1005
ip, (intmax_t)interface, port);
562
fprintf(stderr, "Mandos server \"%s\" found on %s (%s) on"
563
" port %d\n", name, host_name, ip, port);
1007
int ret = start_mandos_communication(ip, port, interface,
1008
avahi_proto_to_af(proto));
1010
avahi_simple_poll_quit(mc.simple_poll);
1012
ret = add_server(ip, port, interface,
1013
avahi_proto_to_af(proto));
565
int ret = start_mandos_communication(ip, port,
566
(unsigned int) interface);
1017
572
avahi_s_service_resolver_free(r);
1020
static void browse_callback(AvahiSServiceBrowser *b,
1021
AvahiIfIndex interface,
1022
AvahiProtocol protocol,
1023
AvahiBrowserEvent event,
1027
AVAHI_GCC_UNUSED AvahiLookupResultFlags
1029
AVAHI_GCC_UNUSED void* userdata){
1032
/* Called whenever a new services becomes available on the LAN or
1033
is removed from the LAN */
1041
case AVAHI_BROWSER_FAILURE:
1043
fprintf(stderr, "(Avahi browser) %s\n",
1044
avahi_strerror(avahi_server_errno(mc.server)));
1045
avahi_simple_poll_quit(mc.simple_poll);
1048
case AVAHI_BROWSER_NEW:
1049
/* We ignore the returned Avahi resolver object. In the callback
1050
function we free it. If the Avahi server is terminated before
1051
the callback function is called the Avahi server will free the
1054
if(avahi_s_service_resolver_new(mc.server, interface, protocol,
1055
name, type, domain, protocol, 0,
1056
resolve_callback, NULL) == NULL)
1057
fprintf(stderr, "Avahi: Failed to resolve service '%s': %s\n",
1058
name, avahi_strerror(avahi_server_errno(mc.server)));
1061
case AVAHI_BROWSER_REMOVE:
1064
case AVAHI_BROWSER_ALL_FOR_NOW:
1065
case AVAHI_BROWSER_CACHE_EXHAUSTED:
1067
fprintf(stderr, "No Mandos server found, still searching...\n");
1073
/* Signal handler that stops main loop after SIGTERM */
1074
static void handle_sigterm(int sig){
1079
signal_received = sig;
1080
int old_errno = errno;
1081
/* set main loop to exit */
1082
if(mc.simple_poll != NULL){
1083
avahi_simple_poll_quit(mc.simple_poll);
1088
bool get_flags(const char *ifname, struct ifreq *ifr){
1091
int s = socket(PF_INET6, SOCK_DGRAM, IPPROTO_IP);
1093
perror_plus("socket");
1096
strcpy(ifr->ifr_name, ifname);
1097
ret = ioctl(s, SIOCGIFFLAGS, ifr);
1100
perror_plus("ioctl SIOCGIFFLAGS");
1107
bool good_flags(const char *ifname, const struct ifreq *ifr){
1109
/* Reject the loopback device */
1110
if(ifr->ifr_flags & IFF_LOOPBACK){
1112
fprintf(stderr, "Rejecting loopback interface \"%s\"\n",
1117
/* Accept point-to-point devices only if connect_to is specified */
1118
if(connect_to != NULL and (ifr->ifr_flags & IFF_POINTOPOINT)){
1120
fprintf(stderr, "Accepting point-to-point interface \"%s\"\n",
1125
/* Otherwise, reject non-broadcast-capable devices */
1126
if(not (ifr->ifr_flags & IFF_BROADCAST)){
1128
fprintf(stderr, "Rejecting non-broadcast interface \"%s\"\n",
1133
/* Reject non-ARP interfaces (including dummy interfaces) */
1134
if(ifr->ifr_flags & IFF_NOARP){
1136
fprintf(stderr, "Rejecting non-ARP interface \"%s\"\n", ifname);
1141
/* Accept this device */
1143
fprintf(stderr, "Interface \"%s\" is good\n", ifname);
1149
* This function determines if a directory entry in /sys/class/net
1150
* corresponds to an acceptable network device.
1151
* (This function is passed to scandir(3) as a filter function.)
1153
int good_interface(const struct dirent *if_entry){
1155
if(if_entry->d_name[0] == '.'){
1160
if(not get_flags(if_entry->d_name, &ifr)){
1164
if(not good_flags(if_entry->d_name, &ifr)){
1170
int notdotentries(const struct dirent *direntry){
1171
/* Skip "." and ".." */
1172
if(direntry->d_name[0] == '.'
1173
and (direntry->d_name[1] == '\0'
1174
or (direntry->d_name[1] == '.'
1175
and direntry->d_name[2] == '\0'))){
1181
int avahi_loop_with_timeout(AvahiSimplePoll *s, int retry_interval){
1183
struct timespec now;
1184
struct timespec waited_time;
1185
intmax_t block_time;
1188
if(mc.current_server == NULL){
1191
"Wait until first server is found. No timeout!\n");
1193
ret = avahi_simple_poll_iterate(s, -1);
1196
fprintf(stderr, "Check current_server if we should run it,"
1199
/* the current time */
1200
ret = clock_gettime(CLOCK_MONOTONIC, &now);
1202
perror_plus("clock_gettime");
1205
/* Calculating in ms how long time between now and server
1206
who we visted longest time ago. Now - last seen. */
1207
waited_time.tv_sec = (now.tv_sec
1208
- mc.current_server->last_seen.tv_sec);
1209
waited_time.tv_nsec = (now.tv_nsec
1210
- mc.current_server->last_seen.tv_nsec);
1211
/* total time is 10s/10,000ms.
1212
Converting to s from ms by dividing by 1,000,
1213
and ns to ms by dividing by 1,000,000. */
1214
block_time = ((retry_interval
1215
- ((intmax_t)waited_time.tv_sec * 1000))
1216
- ((intmax_t)waited_time.tv_nsec / 1000000));
1219
fprintf(stderr, "Blocking for %" PRIdMAX " ms\n", block_time);
1222
if(block_time <= 0){
1223
ret = start_mandos_communication(mc.current_server->ip,
1224
mc.current_server->port,
1225
mc.current_server->if_index,
1226
mc.current_server->af);
1228
avahi_simple_poll_quit(mc.simple_poll);
1231
ret = clock_gettime(CLOCK_MONOTONIC,
1232
&mc.current_server->last_seen);
1234
perror_plus("clock_gettime");
1237
mc.current_server = mc.current_server->next;
1238
block_time = 0; /* Call avahi to find new Mandos
1239
servers, but don't block */
1242
ret = avahi_simple_poll_iterate(s, (int)block_time);
1245
if (ret > 0 or errno != EINTR) {
1246
return (ret != 1) ? ret : 0;
1252
int main(int argc, char *argv[]){
1253
AvahiSServiceBrowser *sb = NULL;
575
static void browse_callback(
576
AvahiSServiceBrowser *b,
577
AvahiIfIndex interface,
578
AvahiProtocol protocol,
579
AvahiBrowserEvent event,
583
AVAHI_GCC_UNUSED AvahiLookupResultFlags flags,
586
AvahiServer *s = userdata;
587
assert(b); /* Spurious warning */
589
/* Called whenever a new services becomes available on the LAN or
590
is removed from the LAN */
594
case AVAHI_BROWSER_FAILURE:
596
fprintf(stderr, "(Browser) %s\n",
597
avahi_strerror(avahi_server_errno(server)));
598
avahi_simple_poll_quit(simple_poll);
601
case AVAHI_BROWSER_NEW:
602
/* We ignore the returned resolver object. In the callback
603
function we free it. If the server is terminated before
604
the callback function is called the server will free
605
the resolver for us. */
607
if (!(avahi_s_service_resolver_new(s, interface, protocol, name,
609
AVAHI_PROTO_INET6, 0,
610
resolve_callback, s)))
611
fprintf(stderr, "Failed to resolve service '%s': %s\n", name,
612
avahi_strerror(avahi_server_errno(s)));
615
case AVAHI_BROWSER_REMOVE:
618
case AVAHI_BROWSER_ALL_FOR_NOW:
619
case AVAHI_BROWSER_CACHE_EXHAUSTED:
624
/* combinds file name and path and returns the malloced new string. som sane checks could/should be added */
625
const char *combinepath(const char *first, const char *second){
1258
int exitcode = EXIT_SUCCESS;
1259
const char *interface = "";
1260
struct ifreq network;
1262
bool take_down_interface = false;
1265
char tempdir[] = "/tmp/mandosXXXXXX";
1266
bool tempdir_created = false;
1267
AvahiIfIndex if_index = AVAHI_IF_UNSPEC;
1268
const char *seckey = PATHDIR "/" SECKEY;
1269
const char *pubkey = PATHDIR "/" PUBKEY;
1271
bool gnutls_initialized = false;
1272
bool gpgme_initialized = false;
1274
double retry_interval = 10; /* 10s between trying a server and
1275
retrying the same server again */
1277
struct sigaction old_sigterm_action = { .sa_handler = SIG_DFL };
1278
struct sigaction sigterm_action = { .sa_handler = handle_sigterm };
1283
/* Lower any group privileges we might have, just to be safe */
1287
perror_plus("setgid");
1290
/* Lower user privileges (temporarily) */
1294
perror_plus("seteuid");
1302
struct argp_option options[] = {
1303
{ .name = "debug", .key = 128,
1304
.doc = "Debug mode", .group = 3 },
1305
{ .name = "connect", .key = 'c',
1306
.arg = "ADDRESS:PORT",
1307
.doc = "Connect directly to a specific Mandos server",
1309
{ .name = "interface", .key = 'i',
1311
.doc = "Network interface that will be used to search for"
1314
{ .name = "seckey", .key = 's',
1316
.doc = "OpenPGP secret key file base name",
1318
{ .name = "pubkey", .key = 'p',
1320
.doc = "OpenPGP public key file base name",
1322
{ .name = "dh-bits", .key = 129,
1324
.doc = "Bit length of the prime number used in the"
1325
" Diffie-Hellman key exchange",
1327
{ .name = "priority", .key = 130,
1329
.doc = "GnuTLS priority string for the TLS handshake",
1331
{ .name = "delay", .key = 131,
1333
.doc = "Maximum delay to wait for interface startup",
1335
{ .name = "retry", .key = 132,
1337
.doc = "Retry interval used when denied by the mandos server",
1340
* These reproduce what we would get without ARGP_NO_HELP
1342
{ .name = "help", .key = '?',
1343
.doc = "Give this help list", .group = -1 },
1344
{ .name = "usage", .key = -3,
1345
.doc = "Give a short usage message", .group = -1 },
1346
{ .name = "version", .key = 'V',
1347
.doc = "Print program version", .group = -1 },
1351
error_t parse_opt(int key, char *arg,
1352
struct argp_state *state){
1355
case 128: /* --debug */
1358
case 'c': /* --connect */
1361
case 'i': /* --interface */
1364
case 's': /* --seckey */
1367
case 'p': /* --pubkey */
1370
case 129: /* --dh-bits */
1372
tmpmax = strtoimax(arg, &tmp, 10);
1373
if(errno != 0 or tmp == arg or *tmp != '\0'
1374
or tmpmax != (typeof(mc.dh_bits))tmpmax){
1375
argp_error(state, "Bad number of DH bits");
1377
mc.dh_bits = (typeof(mc.dh_bits))tmpmax;
1379
case 130: /* --priority */
1382
case 131: /* --delay */
1384
delay = strtof(arg, &tmp);
1385
if(errno != 0 or tmp == arg or *tmp != '\0'){
1386
argp_error(state, "Bad delay");
1388
case 132: /* --retry */
1390
retry_interval = strtod(arg, &tmp);
1391
if(errno != 0 or tmp == arg or *tmp != '\0'
1392
or (retry_interval * 1000) > INT_MAX
1393
or retry_interval < 0){
1394
argp_error(state, "Bad retry interval");
1398
* These reproduce what we would get without ARGP_NO_HELP
1400
case '?': /* --help */
1401
argp_state_help(state, state->out_stream,
1402
(ARGP_HELP_STD_HELP | ARGP_HELP_EXIT_ERR)
1403
& ~(unsigned int)ARGP_HELP_EXIT_OK);
1404
case -3: /* --usage */
1405
argp_state_help(state, state->out_stream,
1406
ARGP_HELP_USAGE | ARGP_HELP_EXIT_ERR);
1407
case 'V': /* --version */
1408
fprintf(state->out_stream, "%s\n", argp_program_version);
1409
exit(argp_err_exit_status);
1412
return ARGP_ERR_UNKNOWN;
1417
struct argp argp = { .options = options, .parser = parse_opt,
1419
.doc = "Mandos client -- Get and decrypt"
1420
" passwords from a Mandos server" };
1421
ret = argp_parse(&argp, argc, argv,
1422
ARGP_IN_ORDER | ARGP_NO_HELP, 0, NULL);
1429
perror_plus("argp_parse");
1430
exitcode = EX_OSERR;
1433
exitcode = EX_USAGE;
1439
/* Work around Debian bug #633582:
1440
<http://bugs.debian.org/633582> */
1443
/* Re-raise priviliges */
1447
perror_plus("seteuid");
1450
if(strcmp(seckey, PATHDIR "/" SECKEY) == 0){
1451
int seckey_fd = open(seckey, O_RDONLY);
1452
if(seckey_fd == -1){
1453
perror_plus("open");
1455
ret = (int)TEMP_FAILURE_RETRY(fstat(seckey_fd, &st));
1457
perror_plus("fstat");
1459
if(S_ISREG(st.st_mode) and st.st_uid == 0 and st.st_gid == 0){
1460
ret = fchown(seckey_fd, uid, gid);
1462
perror_plus("fchown");
1466
TEMP_FAILURE_RETRY(close(seckey_fd));
1470
if(strcmp(pubkey, PATHDIR "/" PUBKEY) == 0){
1471
int pubkey_fd = open(pubkey, O_RDONLY);
1472
if(pubkey_fd == -1){
1473
perror_plus("open");
1475
ret = (int)TEMP_FAILURE_RETRY(fstat(pubkey_fd, &st));
1477
perror_plus("fstat");
1479
if(S_ISREG(st.st_mode) and st.st_uid == 0 and st.st_gid == 0){
1480
ret = fchown(pubkey_fd, uid, gid);
1482
perror_plus("fchown");
1486
TEMP_FAILURE_RETRY(close(pubkey_fd));
1490
/* Lower privileges */
1494
perror_plus("seteuid");
1499
avahi_set_log_function(empty_log);
1502
if(interface[0] == '\0'){
1503
struct dirent **direntries;
1504
ret = scandir(sys_class_net, &direntries, good_interface,
1507
/* Pick the first good interface */
1508
interface = strdup(direntries[0]->d_name);
1510
fprintf(stderr, "Using interface \"%s\"\n", interface);
1512
if(interface == NULL){
1513
perror_plus("malloc");
1515
exitcode = EXIT_FAILURE;
1521
fprintf(stderr, "Could not find a network interface\n");
1522
exitcode = EXIT_FAILURE;
1527
/* Initialize Avahi early so avahi_simple_poll_quit() can be called
1528
from the signal handler */
1529
/* Initialize the pseudo-RNG for Avahi */
1530
srand((unsigned int) time(NULL));
1531
mc.simple_poll = avahi_simple_poll_new();
1532
if(mc.simple_poll == NULL){
1533
fprintf(stderr, "Avahi: Failed to create simple poll object.\n");
1534
exitcode = EX_UNAVAILABLE;
1538
sigemptyset(&sigterm_action.sa_mask);
1539
ret = sigaddset(&sigterm_action.sa_mask, SIGINT);
1541
perror_plus("sigaddset");
1542
exitcode = EX_OSERR;
1545
ret = sigaddset(&sigterm_action.sa_mask, SIGHUP);
1547
perror_plus("sigaddset");
1548
exitcode = EX_OSERR;
1551
ret = sigaddset(&sigterm_action.sa_mask, SIGTERM);
1553
perror_plus("sigaddset");
1554
exitcode = EX_OSERR;
1557
/* Need to check if the handler is SIG_IGN before handling:
1558
| [[info:libc:Initial Signal Actions]] |
1559
| [[info:libc:Basic Signal Handling]] |
1561
ret = sigaction(SIGINT, NULL, &old_sigterm_action);
1563
perror_plus("sigaction");
1566
if(old_sigterm_action.sa_handler != SIG_IGN){
1567
ret = sigaction(SIGINT, &sigterm_action, NULL);
1569
perror_plus("sigaction");
1570
exitcode = EX_OSERR;
1574
ret = sigaction(SIGHUP, NULL, &old_sigterm_action);
1576
perror_plus("sigaction");
1579
if(old_sigterm_action.sa_handler != SIG_IGN){
1580
ret = sigaction(SIGHUP, &sigterm_action, NULL);
1582
perror_plus("sigaction");
1583
exitcode = EX_OSERR;
1587
ret = sigaction(SIGTERM, NULL, &old_sigterm_action);
1589
perror_plus("sigaction");
1592
if(old_sigterm_action.sa_handler != SIG_IGN){
1593
ret = sigaction(SIGTERM, &sigterm_action, NULL);
1595
perror_plus("sigaction");
1596
exitcode = EX_OSERR;
1601
/* If the interface is down, bring it up */
1602
if(strcmp(interface, "none") != 0){
1603
if_index = (AvahiIfIndex) if_nametoindex(interface);
1605
fprintf(stderr, "No such interface: \"%s\"\n", interface);
1606
exitcode = EX_UNAVAILABLE;
1614
/* Re-raise priviliges */
1618
perror_plus("seteuid");
1622
/* Lower kernel loglevel to KERN_NOTICE to avoid KERN_INFO
1623
messages about the network interface to mess up the prompt */
1624
ret = klogctl(8, NULL, 5);
1625
bool restore_loglevel = true;
1627
restore_loglevel = false;
1628
perror_plus("klogctl");
1630
#endif /* __linux__ */
1632
sd = socket(PF_INET6, SOCK_DGRAM, IPPROTO_IP);
1634
perror_plus("socket");
1635
exitcode = EX_OSERR;
1637
if(restore_loglevel){
1638
ret = klogctl(7, NULL, 0);
1640
perror_plus("klogctl");
1643
#endif /* __linux__ */
1644
/* Lower privileges */
1648
perror_plus("seteuid");
1652
strcpy(network.ifr_name, interface);
1653
ret = ioctl(sd, SIOCGIFFLAGS, &network);
1655
perror_plus("ioctl SIOCGIFFLAGS");
1657
if(restore_loglevel){
1658
ret = klogctl(7, NULL, 0);
1660
perror_plus("klogctl");
1663
#endif /* __linux__ */
1664
exitcode = EX_OSERR;
1665
/* Lower privileges */
1669
perror_plus("seteuid");
1673
if((network.ifr_flags & IFF_UP) == 0){
1674
network.ifr_flags |= IFF_UP;
1675
take_down_interface = true;
1676
ret = ioctl(sd, SIOCSIFFLAGS, &network);
1678
take_down_interface = false;
1679
perror_plus("ioctl SIOCSIFFLAGS +IFF_UP");
1680
exitcode = EX_OSERR;
1682
if(restore_loglevel){
1683
ret = klogctl(7, NULL, 0);
1685
perror_plus("klogctl");
1688
#endif /* __linux__ */
1689
/* Lower privileges */
1693
perror_plus("seteuid");
1698
/* Sleep checking until interface is running.
1699
Check every 0.25s, up to total time of delay */
1700
for(int i=0; i < delay * 4; i++){
1701
ret = ioctl(sd, SIOCGIFFLAGS, &network);
1703
perror_plus("ioctl SIOCGIFFLAGS");
1704
} else if(network.ifr_flags & IFF_RUNNING){
1707
struct timespec sleeptime = { .tv_nsec = 250000000 };
1708
ret = nanosleep(&sleeptime, NULL);
1709
if(ret == -1 and errno != EINTR){
1710
perror_plus("nanosleep");
1713
if(not take_down_interface){
1714
/* We won't need the socket anymore */
1715
ret = (int)TEMP_FAILURE_RETRY(close(sd));
1717
perror_plus("close");
1721
if(restore_loglevel){
1722
/* Restores kernel loglevel to default */
1723
ret = klogctl(7, NULL, 0);
1725
perror_plus("klogctl");
1728
#endif /* __linux__ */
1729
/* Lower privileges */
1731
if(take_down_interface){
1732
/* Lower privileges */
1735
perror_plus("seteuid");
1738
/* Lower privileges permanently */
1741
perror_plus("setuid");
1750
ret = init_gnutls_global(pubkey, seckey);
1752
fprintf(stderr, "init_gnutls_global failed\n");
1753
exitcode = EX_UNAVAILABLE;
1756
gnutls_initialized = true;
1763
if(mkdtemp(tempdir) == NULL){
1764
perror_plus("mkdtemp");
1767
tempdir_created = true;
1773
if(not init_gpgme(pubkey, seckey, tempdir)){
1774
fprintf(stderr, "init_gpgme failed\n");
1775
exitcode = EX_UNAVAILABLE;
1778
gpgme_initialized = true;
1785
if(connect_to != NULL){
1786
/* Connect directly, do not use Zeroconf */
1787
/* (Mainly meant for debugging) */
1788
char *address = strrchr(connect_to, ':');
1789
if(address == NULL){
1790
fprintf(stderr, "No colon in address\n");
1791
exitcode = EX_USAGE;
1801
tmpmax = strtoimax(address+1, &tmp, 10);
1802
if(errno != 0 or tmp == address+1 or *tmp != '\0'
1803
or tmpmax != (uint16_t)tmpmax){
1804
fprintf(stderr, "Bad port number\n");
1805
exitcode = EX_USAGE;
1813
port = (uint16_t)tmpmax;
1815
/* Colon in address indicates IPv6 */
1817
if(strchr(connect_to, ':') != NULL){
1819
/* Accept [] around IPv6 address - see RFC 5952 */
1820
if(connect_to[0] == '[' and address[-1] == ']')
1828
address = connect_to;
1834
while(not quit_now){
1835
ret = start_mandos_communication(address, port, if_index, af);
1836
if(quit_now or ret == 0){
1840
fprintf(stderr, "Retrying in %d seconds\n",
1841
(int)retry_interval);
1843
sleep((int)retry_interval);
1847
exitcode = EXIT_SUCCESS;
627
tmp = malloc(strlen(first) + strlen(second) + 2);
633
if (first[0] != '\0' and first[strlen(first) - 1] != '/'){
641
int main(AVAHI_GCC_UNUSED int argc, AVAHI_GCC_UNUSED char*argv[]) {
1858
642
AvahiServerConfig config;
1859
/* Do not publish any local Zeroconf records */
643
AvahiSServiceBrowser *sb = NULL;
646
int returncode = EXIT_SUCCESS;
647
const char *interface = "eth0";
650
static struct option long_options[] = {
651
{"debug", no_argument, (int *)&debug, 1},
652
{"interface", required_argument, 0, 'i'},
653
{"certdir", required_argument, 0, 'd'},
654
{"certkey", required_argument, 0, 'c'},
655
{"certfile", required_argument, 0, 'k'},
658
int option_index = 0;
659
ret = getopt_long (argc, argv, "i:", long_options,
686
certfile = combinepath(certdir, certfile);
687
if (certfile == NULL){
691
certkey = combinepath(certdir, certkey);
692
if (certkey == NULL){
697
avahi_set_log_function(empty_log);
700
/* Initialize the psuedo-RNG */
701
srand((unsigned int) time(NULL));
703
/* Allocate main loop object */
704
if (!(simple_poll = avahi_simple_poll_new())) {
705
fprintf(stderr, "Failed to create simple poll object.\n");
710
/* Do not publish any local records */
1860
711
avahi_server_config_init(&config);
1861
712
config.publish_hinfo = 0;
1862
713
config.publish_addresses = 0;
1863
714
config.publish_workstation = 0;
1864
715
config.publish_domain = 0;
1866
717
/* Allocate a new server */
1867
mc.server = avahi_server_new(avahi_simple_poll_get
1868
(mc.simple_poll), &config, NULL,
1871
/* Free the Avahi configuration data */
718
server = avahi_server_new(avahi_simple_poll_get(simple_poll),
719
&config, NULL, NULL, &error);
721
/* Free the configuration data */
1872
722
avahi_server_config_free(&config);
1875
/* Check if creating the Avahi server object succeeded */
1876
if(mc.server == NULL){
1877
fprintf(stderr, "Failed to create Avahi server: %s\n",
1878
avahi_strerror(error));
1879
exitcode = EX_UNAVAILABLE;
1887
/* Create the Avahi service browser */
1888
sb = avahi_s_service_browser_new(mc.server, if_index,
1889
AVAHI_PROTO_UNSPEC, "_mandos._tcp",
1890
NULL, 0, browse_callback, NULL);
1892
fprintf(stderr, "Failed to create service browser: %s\n",
1893
avahi_strerror(avahi_server_errno(mc.server)));
1894
exitcode = EX_UNAVAILABLE;
1902
/* Run the main loop */
1905
fprintf(stderr, "Starting Avahi loop search\n");
1908
ret = avahi_loop_with_timeout(mc.simple_poll,
1909
(int)(retry_interval * 1000));
1911
fprintf(stderr, "avahi_loop_with_timeout exited %s\n",
1912
(ret == 0) ? "successfully" : "with error");
1918
fprintf(stderr, "%s exiting\n", argv[0]);
1921
/* Cleanup things */
1923
avahi_s_service_browser_free(sb);
1925
if(mc.server != NULL)
1926
avahi_server_free(mc.server);
1928
if(mc.simple_poll != NULL)
1929
avahi_simple_poll_free(mc.simple_poll);
1931
if(gnutls_initialized){
1932
gnutls_certificate_free_credentials(mc.cred);
1933
gnutls_global_deinit();
1934
gnutls_dh_params_deinit(mc.dh_params);
1937
if(gpgme_initialized){
1938
gpgme_release(mc.ctx);
1941
/* Cleans up the circular linked list of Mandos servers the client
1943
if(mc.current_server != NULL){
1944
mc.current_server->prev->next = NULL;
1945
while(mc.current_server != NULL){
1946
server *next = mc.current_server->next;
1947
free(mc.current_server);
1948
mc.current_server = next;
1952
/* Take down the network interface */
1953
if(take_down_interface){
1954
/* Re-raise priviliges */
1958
perror_plus("seteuid");
1961
ret = ioctl(sd, SIOCGIFFLAGS, &network);
1963
perror_plus("ioctl SIOCGIFFLAGS");
1964
} else if(network.ifr_flags & IFF_UP) {
1965
network.ifr_flags &= ~(short)IFF_UP; /* clear flag */
1966
ret = ioctl(sd, SIOCSIFFLAGS, &network);
1968
perror_plus("ioctl SIOCSIFFLAGS -IFF_UP");
1971
ret = (int)TEMP_FAILURE_RETRY(close(sd));
1973
perror_plus("close");
1975
/* Lower privileges permanently */
1979
perror_plus("setuid");
1984
/* Removes the GPGME temp directory and all files inside */
1985
if(tempdir_created){
1986
struct dirent **direntries = NULL;
1987
struct dirent *direntry = NULL;
1988
int numentries = scandir(tempdir, &direntries, notdotentries,
1990
if (numentries > 0){
1991
for(int i = 0; i < numentries; i++){
1992
direntry = direntries[i];
1993
char *fullname = NULL;
1994
ret = asprintf(&fullname, "%s/%s", tempdir,
1997
perror_plus("asprintf");
2000
ret = remove(fullname);
2002
fprintf(stderr, "remove(\"%s\"): %s\n", fullname,
2009
/* need to clean even if 0 because man page doesn't specify */
2011
if (numentries == -1){
2012
perror_plus("scandir");
2014
ret = rmdir(tempdir);
2015
if(ret == -1 and errno != ENOENT){
2016
perror_plus("rmdir");
2021
sigemptyset(&old_sigterm_action.sa_mask);
2022
old_sigterm_action.sa_handler = SIG_DFL;
2023
ret = (int)TEMP_FAILURE_RETRY(sigaction(signal_received,
2024
&old_sigterm_action,
2027
perror_plus("sigaction");
2030
ret = raise(signal_received);
2031
} while(ret != 0 and errno == EINTR);
2033
perror_plus("raise");
2036
TEMP_FAILURE_RETRY(pause());
724
/* Check if creating the server object succeeded */
726
fprintf(stderr, "Failed to create server: %s\n",
727
avahi_strerror(error));
728
returncode = EXIT_FAILURE;
732
/* Create the service browser */
733
sb = avahi_s_service_browser_new(server,
735
if_nametoindex(interface),
737
"_mandos._tcp", NULL, 0,
738
browse_callback, server);
740
fprintf(stderr, "Failed to create service browser: %s\n",
741
avahi_strerror(avahi_server_errno(server)));
742
returncode = EXIT_FAILURE;
746
/* Run the main loop */
749
fprintf(stderr, "Starting avahi loop search\n");
752
avahi_simple_poll_loop(simple_poll);
757
fprintf(stderr, "%s exiting\n", argv[0]);
762
avahi_s_service_browser_free(sb);
765
avahi_server_free(server);
768
avahi_simple_poll_free(simple_poll);