101
46
#include <avahi-common/malloc.h>
102
47
#include <avahi-common/error.h>
105
#include <gnutls/gnutls.h> /* All GnuTLS types, constants and
108
init_gnutls_session(),
110
#include <gnutls/openpgp.h>
111
/* gnutls_certificate_set_openpgp_key_file(),
112
GNUTLS_OPENPGP_FMT_BASE64 */
115
#include <gpgme.h> /* All GPGME types, constants and
118
GPGME_PROTOCOL_OpenPGP,
50
#include <sys/types.h> /* socket(), inet_pton() */
51
#include <sys/socket.h> /* socket(), struct sockaddr_in6,
52
struct in6_addr, inet_pton() */
53
#include <gnutls/gnutls.h> /* All GnuTLS stuff */
54
#include <gnutls/openpgp.h> /* GnuTLS with openpgp stuff */
56
#include <unistd.h> /* close() */
57
#include <netinet/in.h>
58
#include <stdbool.h> /* true */
59
#include <string.h> /* memset */
60
#include <arpa/inet.h> /* inet_pton() */
61
#include <iso646.h> /* not */
64
#include <errno.h> /* perror() */
71
#define CERT_ROOT "/conf/conf.d/cryptkeyreq/"
73
#define CERTFILE CERT_ROOT "openpgp-client.txt"
74
#define KEYFILE CERT_ROOT "openpgp-client-key.txt"
121
75
#define BUFFER_SIZE 256
123
#define PATHDIR "/conf/conf.d/mandos"
124
#define SECKEY "seckey.txt"
125
#define PUBKEY "pubkey.txt"
126
#define HOOKDIR "/lib/mandos/network-hooks.d"
128
78
bool debug = false;
129
static const char mandos_protocol_version[] = "1";
130
const char *argp_program_version = "mandos-client " VERSION;
131
const char *argp_program_bug_address = "<mandos@recompile.se>";
132
static const char sys_class_net[] = "/sys/class/net";
133
char *connect_to = NULL;
135
/* Doubly linked list that need to be circularly linked when used */
136
typedef struct server{
139
AvahiIfIndex if_index;
141
struct timespec last_seen;
146
/* Used for passing in values through the Avahi callback functions */
148
AvahiSimplePoll *simple_poll;
81
gnutls_session_t session;
150
82
gnutls_certificate_credentials_t cred;
151
unsigned int dh_bits;
152
83
gnutls_dh_params_t dh_params;
153
const char *priority;
87
ssize_t pgp_packet_decrypt (char *packet, size_t packet_size,
88
char **new_packet, const char *homedir){
89
gpgme_data_t dh_crypto, dh_plain;
155
server *current_server;
158
/* global context so signal handler can reach it*/
159
mandos_context mc = { .simple_poll = NULL, .server = NULL,
160
.dh_bits = 1024, .priority = "SECURE256"
161
":!CTYPE-X.509:+CTYPE-OPENPGP",
162
.current_server = NULL };
164
sig_atomic_t quit_now = 0;
165
int signal_received = 0;
167
/* Function to use when printing errors */
168
void perror_plus(const char *print_text){
169
fprintf(stderr, "Mandos plugin %s: ",
170
program_invocation_short_name);
175
* Make additional room in "buffer" for at least BUFFER_SIZE more
176
* bytes. "buffer_capacity" is how much is currently allocated,
177
* "buffer_length" is how much is already used.
179
size_t incbuffer(char **buffer, size_t buffer_length,
180
size_t buffer_capacity){
181
if(buffer_length + BUFFER_SIZE > buffer_capacity){
182
*buffer = realloc(*buffer, buffer_capacity + BUFFER_SIZE);
186
buffer_capacity += BUFFER_SIZE;
188
return buffer_capacity;
191
/* Add server to set of servers to retry periodically */
192
int add_server(const char *ip, uint16_t port,
193
AvahiIfIndex if_index,
196
server *new_server = malloc(sizeof(server));
197
if(new_server == NULL){
198
perror_plus("malloc");
201
*new_server = (server){ .ip = strdup(ip),
203
.if_index = if_index,
205
if(new_server->ip == NULL){
206
perror_plus("strdup");
209
/* Special case of first server */
210
if (mc.current_server == NULL){
211
new_server->next = new_server;
212
new_server->prev = new_server;
213
mc.current_server = new_server;
214
/* Place the new server last in the list */
216
new_server->next = mc.current_server;
217
new_server->prev = mc.current_server->prev;
218
new_server->prev->next = new_server;
219
mc.current_server->prev = new_server;
221
ret = clock_gettime(CLOCK_MONOTONIC, &mc.current_server->last_seen);
223
perror_plus("clock_gettime");
232
static bool init_gpgme(const char *seckey,
233
const char *pubkey, const char *tempdir){
93
ssize_t new_packet_capacity = 0;
94
ssize_t new_packet_length = 0;
235
95
gpgme_engine_info_t engine_info;
239
* Helper function to insert pub and seckey to the engine keyring.
241
bool import_key(const char *filename){
244
gpgme_data_t pgp_data;
246
fd = (int)TEMP_FAILURE_RETRY(open(filename, O_RDONLY));
252
rc = gpgme_data_new_from_fd(&pgp_data, fd);
253
if(rc != GPG_ERR_NO_ERROR){
254
fprintf(stderr, "bad gpgme_data_new_from_fd: %s: %s\n",
255
gpgme_strsource(rc), gpgme_strerror(rc));
259
rc = gpgme_op_import(mc.ctx, pgp_data);
260
if(rc != GPG_ERR_NO_ERROR){
261
fprintf(stderr, "bad gpgme_op_import: %s: %s\n",
262
gpgme_strsource(rc), gpgme_strerror(rc));
266
ret = (int)TEMP_FAILURE_RETRY(close(fd));
268
perror_plus("close");
270
gpgme_data_release(pgp_data);
275
fprintf(stderr, "Initializing GPGME\n");
98
fprintf(stderr, "Trying to decrypt OpenPGP packet\n");
279
102
gpgme_check_version(NULL);
280
rc = gpgme_engine_check_version(GPGME_PROTOCOL_OpenPGP);
281
if(rc != GPG_ERR_NO_ERROR){
282
fprintf(stderr, "bad gpgme_engine_check_version: %s: %s\n",
283
gpgme_strsource(rc), gpgme_strerror(rc));
103
gpgme_engine_check_version(GPGME_PROTOCOL_OpenPGP);
287
/* Set GPGME home directory for the OpenPGP engine only */
288
rc = gpgme_get_engine_info(&engine_info);
289
if(rc != GPG_ERR_NO_ERROR){
105
/* Set GPGME home directory */
106
rc = gpgme_get_engine_info (&engine_info);
107
if (rc != GPG_ERR_NO_ERROR){
290
108
fprintf(stderr, "bad gpgme_get_engine_info: %s: %s\n",
291
109
gpgme_strsource(rc), gpgme_strerror(rc));
294
112
while(engine_info != NULL){
295
113
if(engine_info->protocol == GPGME_PROTOCOL_OpenPGP){
296
114
gpgme_set_engine_info(GPGME_PROTOCOL_OpenPGP,
297
engine_info->file_name, tempdir);
115
engine_info->file_name, homedir);
300
118
engine_info = engine_info->next;
302
120
if(engine_info == NULL){
303
fprintf(stderr, "Could not set GPGME home dir to %s\n", tempdir);
307
/* Create new GPGME "context" */
308
rc = gpgme_new(&(mc.ctx));
309
if(rc != GPG_ERR_NO_ERROR){
310
fprintf(stderr, "bad gpgme_new: %s: %s\n",
311
gpgme_strsource(rc), gpgme_strerror(rc));
315
if(not import_key(pubkey) or not import_key(seckey)){
323
* Decrypt OpenPGP data.
324
* Returns -1 on error
326
static ssize_t pgp_packet_decrypt(const char *cryptotext,
329
gpgme_data_t dh_crypto, dh_plain;
332
size_t plaintext_capacity = 0;
333
ssize_t plaintext_length = 0;
336
fprintf(stderr, "Trying to decrypt OpenPGP data\n");
339
/* Create new GPGME data buffer from memory cryptotext */
340
rc = gpgme_data_new_from_mem(&dh_crypto, cryptotext, crypto_size,
342
if(rc != GPG_ERR_NO_ERROR){
121
fprintf(stderr, "Could not set home dir to %s\n", homedir);
125
/* Create new GPGME data buffer from packet buffer */
126
rc = gpgme_data_new_from_mem(&dh_crypto, packet, packet_size, 0);
127
if (rc != GPG_ERR_NO_ERROR){
343
128
fprintf(stderr, "bad gpgme_data_new_from_mem: %s: %s\n",
344
129
gpgme_strsource(rc), gpgme_strerror(rc));
394
fprintf(stderr, "Decryption of OpenPGP data succeeded\n");
191
/* Delete the GPGME FILE pointer cryptotext data buffer */
192
gpgme_data_release(dh_crypto);
397
194
/* Seek back to the beginning of the GPGME plaintext data buffer */
398
if(gpgme_data_seek(dh_plain, (off_t)0, SEEK_SET) == -1){
399
perror_plus("gpgme_data_seek");
400
plaintext_length = -1;
195
gpgme_data_seek(dh_plain, (off_t) 0, SEEK_SET);
406
plaintext_capacity = incbuffer(plaintext,
407
(size_t)plaintext_length,
409
if(plaintext_capacity == 0){
410
perror_plus("incbuffer");
411
plaintext_length = -1;
199
if (new_packet_length + BUFFER_SIZE > new_packet_capacity){
200
*new_packet = realloc(*new_packet,
201
(unsigned int)new_packet_capacity
203
if (*new_packet == NULL){
207
new_packet_capacity += BUFFER_SIZE;
415
ret = gpgme_data_read(dh_plain, *plaintext + plaintext_length,
210
ret = gpgme_data_read(dh_plain, *new_packet + new_packet_length,
417
212
/* Print the data, if any */
423
perror_plus("gpgme_data_read");
424
plaintext_length = -1;
427
plaintext_length += ret;
431
fprintf(stderr, "Decrypted password is: ");
432
for(ssize_t i = 0; i < plaintext_length; i++){
433
fprintf(stderr, "%02hhX ", (*plaintext)[i]);
435
fprintf(stderr, "\n");
440
/* Delete the GPGME cryptotext data buffer */
441
gpgme_data_release(dh_crypto);
217
perror("gpgme_data_read");
220
new_packet_length += ret;
223
/* FIXME: check characters before printing to screen so to not print
224
terminal control characters */
226
/* fprintf(stderr, "decrypted password is: "); */
227
/* fwrite(*new_packet, 1, new_packet_length, stderr); */
228
/* fprintf(stderr, "\n"); */
443
231
/* Delete the GPGME plaintext data buffer */
444
232
gpgme_data_release(dh_plain);
445
return plaintext_length;
233
return new_packet_length;
448
static const char * safer_gnutls_strerror(int value){
449
const char *ret = gnutls_strerror(value); /* Spurious warning from
450
-Wunreachable-code */
236
static const char * safer_gnutls_strerror (int value) {
237
const char *ret = gnutls_strerror (value);
452
239
ret = "(unknown)";
456
/* GnuTLS log function callback */
457
static void debuggnutls(__attribute__((unused)) int level,
459
fprintf(stderr, "GnuTLS: %s", string);
243
void debuggnutls(__attribute__((unused)) int level,
245
fprintf(stderr, "%s", string);
462
static int init_gnutls_global(const char *pubkeyfilename,
463
const char *seckeyfilename){
248
int initgnutls(encrypted_session *es){
467
253
fprintf(stderr, "Initializing GnuTLS\n");
470
ret = gnutls_global_init();
471
if(ret != GNUTLS_E_SUCCESS){
472
fprintf(stderr, "GnuTLS global_init: %s\n",
473
safer_gnutls_strerror(ret));
256
if ((ret = gnutls_global_init ())
257
!= GNUTLS_E_SUCCESS) {
258
fprintf (stderr, "global_init: %s\n", safer_gnutls_strerror(ret));
478
/* "Use a log level over 10 to enable all debugging options."
481
263
gnutls_global_set_log_level(11);
482
264
gnutls_global_set_log_function(debuggnutls);
485
/* OpenPGP credentials */
486
ret = gnutls_certificate_allocate_credentials(&mc.cred);
487
if(ret != GNUTLS_E_SUCCESS){
488
fprintf(stderr, "GnuTLS memory error: %s\n",
489
safer_gnutls_strerror(ret));
490
gnutls_global_deinit();
267
/* openpgp credentials */
268
if ((ret = gnutls_certificate_allocate_credentials (&es->cred))
269
!= GNUTLS_E_SUCCESS) {
270
fprintf (stderr, "memory error: %s\n",
271
safer_gnutls_strerror(ret));
495
fprintf(stderr, "Attempting to use OpenPGP public key %s and"
496
" secret key %s as GnuTLS credentials\n", pubkeyfilename,
276
fprintf(stderr, "Attempting to use OpenPGP certificate %s"
277
" and keyfile %s as GnuTLS credentials\n", CERTFILE,
500
281
ret = gnutls_certificate_set_openpgp_key_file
501
(mc.cred, pubkeyfilename, seckeyfilename,
502
GNUTLS_OPENPGP_FMT_BASE64);
503
if(ret != GNUTLS_E_SUCCESS){
505
"Error[%d] while reading the OpenPGP key pair ('%s',"
506
" '%s')\n", ret, pubkeyfilename, seckeyfilename);
507
fprintf(stderr, "The GnuTLS error is: %s\n",
508
safer_gnutls_strerror(ret));
512
/* GnuTLS server initialization */
513
ret = gnutls_dh_params_init(&mc.dh_params);
514
if(ret != GNUTLS_E_SUCCESS){
515
fprintf(stderr, "Error in GnuTLS DH parameter initialization:"
516
" %s\n", safer_gnutls_strerror(ret));
519
ret = gnutls_dh_params_generate2(mc.dh_params, mc.dh_bits);
520
if(ret != GNUTLS_E_SUCCESS){
521
fprintf(stderr, "Error in GnuTLS prime generation: %s\n",
522
safer_gnutls_strerror(ret));
526
gnutls_certificate_set_dh_params(mc.cred, mc.dh_params);
532
gnutls_certificate_free_credentials(mc.cred);
533
gnutls_global_deinit();
534
gnutls_dh_params_deinit(mc.dh_params);
538
static int init_gnutls_session(gnutls_session_t *session){
540
/* GnuTLS session creation */
542
ret = gnutls_init(session, GNUTLS_SERVER);
546
} while(ret == GNUTLS_E_INTERRUPTED or ret == GNUTLS_E_AGAIN);
547
if(ret != GNUTLS_E_SUCCESS){
282
(es->cred, CERTFILE, KEYFILE, GNUTLS_OPENPGP_FMT_BASE64);
283
if (ret != GNUTLS_E_SUCCESS) {
285
(stderr, "Error[%d] while reading the OpenPGP key pair ('%s',"
287
ret, CERTFILE, KEYFILE);
288
fprintf(stdout, "The Error is: %s\n",
289
safer_gnutls_strerror(ret));
293
//GnuTLS server initialization
294
if ((ret = gnutls_dh_params_init (&es->dh_params))
295
!= GNUTLS_E_SUCCESS) {
296
fprintf (stderr, "Error in dh parameter initialization: %s\n",
297
safer_gnutls_strerror(ret));
301
if ((ret = gnutls_dh_params_generate2 (es->dh_params, DH_BITS))
302
!= GNUTLS_E_SUCCESS) {
303
fprintf (stderr, "Error in prime generation: %s\n",
304
safer_gnutls_strerror(ret));
308
gnutls_certificate_set_dh_params (es->cred, es->dh_params);
310
// GnuTLS session creation
311
if ((ret = gnutls_init (&es->session, GNUTLS_SERVER))
312
!= GNUTLS_E_SUCCESS){
548
313
fprintf(stderr, "Error in GnuTLS session initialization: %s\n",
549
314
safer_gnutls_strerror(ret));
555
ret = gnutls_priority_set_direct(*session, mc.priority, &err);
557
gnutls_deinit(*session);
560
} while(ret == GNUTLS_E_INTERRUPTED or ret == GNUTLS_E_AGAIN);
561
if(ret != GNUTLS_E_SUCCESS){
562
fprintf(stderr, "Syntax error at: %s\n", err);
563
fprintf(stderr, "GnuTLS error: %s\n",
564
safer_gnutls_strerror(ret));
565
gnutls_deinit(*session);
317
if ((ret = gnutls_priority_set_direct (es->session, "NORMAL", &err))
318
!= GNUTLS_E_SUCCESS) {
319
fprintf(stderr, "Syntax error at: %s\n", err);
320
fprintf(stderr, "GnuTLS error: %s\n",
321
safer_gnutls_strerror(ret));
571
ret = gnutls_credentials_set(*session, GNUTLS_CRD_CERTIFICATE,
574
gnutls_deinit(*session);
577
} while(ret == GNUTLS_E_INTERRUPTED or ret == GNUTLS_E_AGAIN);
578
if(ret != GNUTLS_E_SUCCESS){
579
fprintf(stderr, "Error setting GnuTLS credentials: %s\n",
325
if ((ret = gnutls_credentials_set
326
(es->session, GNUTLS_CRD_CERTIFICATE, es->cred))
327
!= GNUTLS_E_SUCCESS) {
328
fprintf(stderr, "Error setting a credentials set: %s\n",
580
329
safer_gnutls_strerror(ret));
581
gnutls_deinit(*session);
585
333
/* ignore client certificate if any. */
586
gnutls_certificate_server_set_request(*session, GNUTLS_CERT_IGNORE);
334
gnutls_certificate_server_set_request (es->session,
588
gnutls_dh_set_prime_bits(*session, mc.dh_bits);
337
gnutls_dh_set_prime_bits (es->session, DH_BITS);
593
/* Avahi log function callback */
594
static void empty_log(__attribute__((unused)) AvahiLogLevel level,
595
__attribute__((unused)) const char *txt){}
342
void empty_log(__attribute__((unused)) AvahiLogLevel level,
343
__attribute__((unused)) const char *txt){}
597
/* Called when a Mandos server is found */
598
static int start_mandos_communication(const char *ip, uint16_t port,
599
AvahiIfIndex if_index,
601
int ret, tcp_sd = -1;
604
struct sockaddr_in in;
605
struct sockaddr_in6 in6;
345
int start_mandos_communication(const char *ip, uint16_t port,
346
AvahiIfIndex if_index){
348
struct sockaddr_in6 to;
349
encrypted_session es;
607
350
char *buffer = NULL;
608
char *decrypted_buffer = NULL;
351
char *decrypted_buffer;
609
352
size_t buffer_length = 0;
610
353
size_t buffer_capacity = 0;
613
gnutls_session_t session;
614
int pf; /* Protocol family */
631
fprintf(stderr, "Bad address family: %d\n", af);
636
ret = init_gnutls_session(&session);
642
fprintf(stderr, "Setting up a TCP connection to %s, port %" PRIu16
646
tcp_sd = socket(pf, SOCK_STREAM, 0);
649
perror_plus("socket");
659
memset(&to, 0, sizeof(to));
661
to.in6.sin6_family = (sa_family_t)af;
662
ret = inet_pton(af, ip, &to.in6.sin6_addr);
664
to.in.sin_family = (sa_family_t)af;
665
ret = inet_pton(af, ip, &to.in.sin_addr);
669
perror_plus("inet_pton");
354
ssize_t decrypted_buffer_size;
357
char interface[IF_NAMESIZE];
360
fprintf(stderr, "Setting up a tcp connection to %s, port %d\n",
364
tcp_sd = socket(PF_INET6, SOCK_STREAM, 0);
370
if(if_indextoname((unsigned int)if_index, interface) == NULL){
372
perror("if_indextoname");
378
fprintf(stderr, "Binding to interface %s\n", interface);
381
memset(&to,0,sizeof(to)); /* Spurious warning */
382
to.sin6_family = AF_INET6;
383
ret = inet_pton(AF_INET6, ip, &to.sin6_addr);
675
389
fprintf(stderr, "Bad address: %s\n", ip);
680
to.in6.sin6_port = htons(port); /* Spurious warnings from
682
-Wunreachable-code */
684
if(IN6_IS_ADDR_LINKLOCAL /* Spurious warnings from */
685
(&to.in6.sin6_addr)){ /* -Wstrict-aliasing=2 or lower and
687
if(if_index == AVAHI_IF_UNSPEC){
688
fprintf(stderr, "An IPv6 link-local address is incomplete"
689
" without a network interface\n");
693
/* Set the network interface number as scope */
694
to.in6.sin6_scope_id = (uint32_t)if_index;
697
to.in.sin_port = htons(port); /* Spurious warnings from
699
-Wunreachable-code */
392
to.sin6_port = htons(port); /* Spurious warning */
394
to.sin6_scope_id = (uint32_t)if_index;
708
if(af == AF_INET6 and if_index != AVAHI_IF_UNSPEC){
709
char interface[IF_NAMESIZE];
710
if(if_indextoname((unsigned int)if_index, interface) == NULL){
711
perror_plus("if_indextoname");
713
fprintf(stderr, "Connection to: %s%%%s, port %" PRIu16 "\n",
714
ip, interface, port);
717
fprintf(stderr, "Connection to: %s, port %" PRIu16 "\n", ip,
720
char addrstr[(INET_ADDRSTRLEN > INET6_ADDRSTRLEN) ?
721
INET_ADDRSTRLEN : INET6_ADDRSTRLEN] = "";
724
pcret = inet_ntop(af, &(to.in6.sin6_addr), addrstr,
727
pcret = inet_ntop(af, &(to.in.sin_addr), addrstr,
731
perror_plus("inet_ntop");
733
if(strcmp(addrstr, ip) != 0){
734
fprintf(stderr, "Canonical address form: %s\n", addrstr);
745
ret = connect(tcp_sd, &to.in6, sizeof(to));
747
ret = connect(tcp_sd, &to.in, sizeof(to)); /* IPv4 */
750
if ((errno != ECONNREFUSED and errno != ENETUNREACH) or debug){
752
perror_plus("connect");
763
const char *out = mandos_protocol_version;
766
size_t out_size = strlen(out);
767
ret = (int)TEMP_FAILURE_RETRY(write(tcp_sd, out + written,
768
out_size - written));
771
perror_plus("write");
775
written += (size_t)ret;
776
if(written < out_size){
779
if(out == mandos_protocol_version){
397
fprintf(stderr, "Connection to: %s, port %d\n", ip, port);
398
/* char addrstr[INET6_ADDRSTRLEN]; */
399
/* if(inet_ntop(to.sin6_family, &(to.sin6_addr), addrstr, */
400
/* sizeof(addrstr)) == NULL){ */
401
/* perror("inet_ntop"); */
403
/* fprintf(stderr, "Really connecting to: %s, port %d\n", */
404
/* addrstr, ntohs(to.sin6_port)); */
408
ret = connect(tcp_sd, (struct sockaddr *) &to, sizeof(to));
414
ret = initgnutls (&es);
420
gnutls_transport_set_ptr (es.session,
421
(gnutls_transport_ptr_t) tcp_sd);
794
424
fprintf(stderr, "Establishing TLS session with %s\n", ip);
802
/* Spurious warning from -Wint-to-pointer-cast */
803
gnutls_transport_set_ptr(session, (gnutls_transport_ptr_t) tcp_sd);
811
ret = gnutls_handshake(session);
816
} while(ret == GNUTLS_E_AGAIN or ret == GNUTLS_E_INTERRUPTED);
818
if(ret != GNUTLS_E_SUCCESS){
427
ret = gnutls_handshake (es.session);
429
if (ret != GNUTLS_E_SUCCESS){
820
fprintf(stderr, "*** GnuTLS Handshake failed ***\n");
431
fprintf(stderr, "\n*** Handshake failed ***\n");
827
/* Read OpenPGP packet that contains the wanted password */
438
//Retrieve OpenPGP packet that contains the wanted password
830
fprintf(stderr, "Retrieving OpenPGP encrypted password from %s\n",
441
fprintf(stderr, "Retrieving pgp encrypted password from %s\n",
841
buffer_capacity = incbuffer(&buffer, buffer_length,
843
if(buffer_capacity == 0){
845
perror_plus("incbuffer");
855
sret = gnutls_record_recv(session, buffer+buffer_length,
446
if (buffer_length + BUFFER_SIZE > buffer_capacity){
447
buffer = realloc(buffer, buffer_capacity + BUFFER_SIZE);
452
buffer_capacity += BUFFER_SIZE;
455
ret = gnutls_record_recv
456
(es.session, buffer+buffer_length, BUFFER_SIZE);
862
462
case GNUTLS_E_INTERRUPTED:
863
463
case GNUTLS_E_AGAIN:
865
465
case GNUTLS_E_REHANDSHAKE:
867
ret = gnutls_handshake(session);
873
} while(ret == GNUTLS_E_AGAIN or ret == GNUTLS_E_INTERRUPTED);
875
fprintf(stderr, "*** GnuTLS Re-handshake failed ***\n");
466
ret = gnutls_handshake (es.session);
468
fprintf(stderr, "\n*** Handshake failed ***\n");
882
475
fprintf(stderr, "Unknown error while reading data from"
883
" encrypted session with Mandos server\n");
884
gnutls_bye(session, GNUTLS_SHUT_RDWR);
476
" encrypted session with mandos server\n");
478
gnutls_bye (es.session, GNUTLS_SHUT_RDWR);
889
buffer_length += (size_t) sret;
894
fprintf(stderr, "Closing TLS session\n");
903
ret = gnutls_bye(session, GNUTLS_SHUT_RDWR);
908
} while(ret == GNUTLS_E_AGAIN or ret == GNUTLS_E_INTERRUPTED);
910
if(buffer_length > 0){
911
ssize_t decrypted_buffer_size;
482
buffer_length += (size_t) ret;
486
if (buffer_length > 0){
912
487
decrypted_buffer_size = pgp_packet_decrypt(buffer,
915
if(decrypted_buffer_size >= 0){
491
if (decrypted_buffer_size >= 0){
918
492
while(written < (size_t) decrypted_buffer_size){
924
ret = (int)fwrite(decrypted_buffer + written, 1,
925
(size_t)decrypted_buffer_size - written,
493
ret = (int)fwrite (decrypted_buffer + written, 1,
494
(size_t)decrypted_buffer_size - written,
927
496
if(ret == 0 and ferror(stdout)){
930
498
fprintf(stderr, "Error writing encrypted data: %s\n",
931
499
strerror(errno));
936
504
written += (size_t)ret;
942
/* Shutdown procedure */
947
free(decrypted_buffer);
950
ret = (int)TEMP_FAILURE_RETRY(close(tcp_sd));
956
perror_plus("close");
958
gnutls_deinit(session);
506
free(decrypted_buffer);
515
fprintf(stderr, "Closing TLS session\n");
519
gnutls_bye (es.session, GNUTLS_SHUT_RDWR);
522
gnutls_deinit (es.session);
523
gnutls_certificate_free_credentials (es.cred);
524
gnutls_global_deinit ();
968
static void resolve_callback(AvahiSServiceResolver *r,
969
AvahiIfIndex interface,
971
AvahiResolverEvent event,
975
const char *host_name,
976
const AvahiAddress *address,
978
AVAHI_GCC_UNUSED AvahiStringList *txt,
979
AVAHI_GCC_UNUSED AvahiLookupResultFlags
981
AVAHI_GCC_UNUSED void* userdata){
528
static AvahiSimplePoll *simple_poll = NULL;
529
static AvahiServer *server = NULL;
531
static void resolve_callback(
532
AvahiSServiceResolver *r,
533
AvahiIfIndex interface,
534
AVAHI_GCC_UNUSED AvahiProtocol protocol,
535
AvahiResolverEvent event,
539
const char *host_name,
540
const AvahiAddress *address,
542
AVAHI_GCC_UNUSED AvahiStringList *txt,
543
AVAHI_GCC_UNUSED AvahiLookupResultFlags flags,
544
AVAHI_GCC_UNUSED void* userdata) {
546
assert(r); /* Spurious warning */
984
548
/* Called whenever a service has been resolved successfully or
993
553
case AVAHI_RESOLVER_FAILURE:
994
fprintf(stderr, "(Avahi Resolver) Failed to resolve service '%s'"
995
" of type '%s' in domain '%s': %s\n", name, type, domain,
996
avahi_strerror(avahi_server_errno(mc.server)));
554
fprintf(stderr, "(Resolver) Failed to resolve service '%s' of"
555
" type '%s' in domain '%s': %s\n", name, type, domain,
556
avahi_strerror(avahi_server_errno(server)));
999
559
case AVAHI_RESOLVER_FOUND:
1001
561
char ip[AVAHI_ADDRESS_STR_MAX];
1002
562
avahi_address_snprint(ip, sizeof(ip), address);
1004
fprintf(stderr, "Mandos server \"%s\" found on %s (%s, %"
1005
PRIdMAX ") on port %" PRIu16 "\n", name, host_name,
1006
ip, (intmax_t)interface, port);
564
fprintf(stderr, "Mandos server \"%s\" found on %s (%s) on"
565
" port %d\n", name, host_name, ip, port);
1008
int ret = start_mandos_communication(ip, port, interface,
1009
avahi_proto_to_af(proto));
1011
avahi_simple_poll_quit(mc.simple_poll);
1013
ret = add_server(ip, port, interface,
1014
avahi_proto_to_af(proto));
567
int ret = start_mandos_communication(ip, port, interface);
1018
573
avahi_s_service_resolver_free(r);
1021
static void browse_callback(AvahiSServiceBrowser *b,
1022
AvahiIfIndex interface,
1023
AvahiProtocol protocol,
1024
AvahiBrowserEvent event,
1028
AVAHI_GCC_UNUSED AvahiLookupResultFlags
1030
AVAHI_GCC_UNUSED void* userdata){
1033
/* Called whenever a new services becomes available on the LAN or
1034
is removed from the LAN */
1042
case AVAHI_BROWSER_FAILURE:
1044
fprintf(stderr, "(Avahi browser) %s\n",
1045
avahi_strerror(avahi_server_errno(mc.server)));
1046
avahi_simple_poll_quit(mc.simple_poll);
1049
case AVAHI_BROWSER_NEW:
1050
/* We ignore the returned Avahi resolver object. In the callback
1051
function we free it. If the Avahi server is terminated before
1052
the callback function is called the Avahi server will free the
1055
if(avahi_s_service_resolver_new(mc.server, interface, protocol,
1056
name, type, domain, protocol, 0,
1057
resolve_callback, NULL) == NULL)
1058
fprintf(stderr, "Avahi: Failed to resolve service '%s': %s\n",
1059
name, avahi_strerror(avahi_server_errno(mc.server)));
1062
case AVAHI_BROWSER_REMOVE:
1065
case AVAHI_BROWSER_ALL_FOR_NOW:
1066
case AVAHI_BROWSER_CACHE_EXHAUSTED:
1068
fprintf(stderr, "No Mandos server found, still searching...\n");
1074
/* Signal handler that stops main loop after SIGTERM */
1075
static void handle_sigterm(int sig){
1080
signal_received = sig;
1081
int old_errno = errno;
1082
/* set main loop to exit */
1083
if(mc.simple_poll != NULL){
1084
avahi_simple_poll_quit(mc.simple_poll);
1089
bool get_flags(const char *ifname, struct ifreq *ifr){
1092
int s = socket(PF_INET6, SOCK_DGRAM, IPPROTO_IP);
1094
perror_plus("socket");
1097
strcpy(ifr->ifr_name, ifname);
1098
ret = ioctl(s, SIOCGIFFLAGS, ifr);
1101
perror_plus("ioctl SIOCGIFFLAGS");
1108
bool good_flags(const char *ifname, const struct ifreq *ifr){
1110
/* Reject the loopback device */
1111
if(ifr->ifr_flags & IFF_LOOPBACK){
1113
fprintf(stderr, "Rejecting loopback interface \"%s\"\n",
1118
/* Accept point-to-point devices only if connect_to is specified */
1119
if(connect_to != NULL and (ifr->ifr_flags & IFF_POINTOPOINT)){
1121
fprintf(stderr, "Accepting point-to-point interface \"%s\"\n",
1126
/* Otherwise, reject non-broadcast-capable devices */
1127
if(not (ifr->ifr_flags & IFF_BROADCAST)){
1129
fprintf(stderr, "Rejecting non-broadcast interface \"%s\"\n",
1134
/* Reject non-ARP interfaces (including dummy interfaces) */
1135
if(ifr->ifr_flags & IFF_NOARP){
1137
fprintf(stderr, "Rejecting non-ARP interface \"%s\"\n", ifname);
1142
/* Accept this device */
1144
fprintf(stderr, "Interface \"%s\" is good\n", ifname);
1150
* This function determines if a directory entry in /sys/class/net
1151
* corresponds to an acceptable network device.
1152
* (This function is passed to scandir(3) as a filter function.)
1154
int good_interface(const struct dirent *if_entry){
1155
if(if_entry->d_name[0] == '.'){
1160
if(not get_flags(if_entry->d_name, &ifr)){
1162
fprintf(stderr, "Failed to get flags for interface \"%s\"\n",
1168
if(not good_flags(if_entry->d_name, &ifr)){
1175
* This function determines if a directory entry in /sys/class/net
1176
* corresponds to an acceptable network device which is up.
1177
* (This function is passed to scandir(3) as a filter function.)
1179
int up_interface(const struct dirent *if_entry){
1180
if(if_entry->d_name[0] == '.'){
1185
if(not get_flags(if_entry->d_name, &ifr)){
1187
fprintf(stderr, "Failed to get flags for interface \"%s\"\n",
1193
/* Reject down interfaces */
1194
if(not (ifr.ifr_flags & IFF_UP)){
1196
fprintf(stderr, "Rejecting down interface \"%s\"\n",
1202
/* Reject non-running interfaces */
1203
if(not (ifr.ifr_flags & IFF_RUNNING)){
1205
fprintf(stderr, "Rejecting non-running interface \"%s\"\n",
1211
if(not good_flags(if_entry->d_name, &ifr)){
1217
int notdotentries(const struct dirent *direntry){
1218
/* Skip "." and ".." */
1219
if(direntry->d_name[0] == '.'
1220
and (direntry->d_name[1] == '\0'
1221
or (direntry->d_name[1] == '.'
1222
and direntry->d_name[2] == '\0'))){
1228
/* Is this directory entry a runnable program? */
1229
int runnable_hook(const struct dirent *direntry){
1233
if((direntry->d_name)[0] == '\0'){
1238
/* Save pointer to last character */
1239
char *end = strchr(direntry->d_name, '\0')-1;
1246
if(((direntry->d_name)[0] == '#')
1248
/* Temporary #name# */
1252
/* XXX more rules here */
1254
ret = stat(direntry->d_name, &st);
1257
perror_plus("Could not stat plugin");
1261
if(not (S_ISREG(st.st_mode))){
1262
/* Not a regular file */
1265
if(not (st.st_mode & (S_IXUSR | S_IXGRP | S_IXOTH))){
1266
/* Not executable */
1272
int avahi_loop_with_timeout(AvahiSimplePoll *s, int retry_interval){
1274
struct timespec now;
1275
struct timespec waited_time;
1276
intmax_t block_time;
1279
if(mc.current_server == NULL){
1282
"Wait until first server is found. No timeout!\n");
1284
ret = avahi_simple_poll_iterate(s, -1);
1287
fprintf(stderr, "Check current_server if we should run it,"
1290
/* the current time */
1291
ret = clock_gettime(CLOCK_MONOTONIC, &now);
1293
perror_plus("clock_gettime");
1296
/* Calculating in ms how long time between now and server
1297
who we visted longest time ago. Now - last seen. */
1298
waited_time.tv_sec = (now.tv_sec
1299
- mc.current_server->last_seen.tv_sec);
1300
waited_time.tv_nsec = (now.tv_nsec
1301
- mc.current_server->last_seen.tv_nsec);
1302
/* total time is 10s/10,000ms.
1303
Converting to s from ms by dividing by 1,000,
1304
and ns to ms by dividing by 1,000,000. */
1305
block_time = ((retry_interval
1306
- ((intmax_t)waited_time.tv_sec * 1000))
1307
- ((intmax_t)waited_time.tv_nsec / 1000000));
1310
fprintf(stderr, "Blocking for %" PRIdMAX " ms\n", block_time);
1313
if(block_time <= 0){
1314
ret = start_mandos_communication(mc.current_server->ip,
1315
mc.current_server->port,
1316
mc.current_server->if_index,
1317
mc.current_server->af);
1319
avahi_simple_poll_quit(mc.simple_poll);
1322
ret = clock_gettime(CLOCK_MONOTONIC,
1323
&mc.current_server->last_seen);
1325
perror_plus("clock_gettime");
1328
mc.current_server = mc.current_server->next;
1329
block_time = 0; /* Call avahi to find new Mandos
1330
servers, but don't block */
1333
ret = avahi_simple_poll_iterate(s, (int)block_time);
1336
if (ret > 0 or errno != EINTR) {
1337
return (ret != 1) ? ret : 0;
1343
int main(int argc, char *argv[]){
1344
AvahiSServiceBrowser *sb = NULL;
1349
int exitcode = EXIT_SUCCESS;
1350
const char *interface = "";
1351
struct ifreq network;
1353
bool take_down_interface = false;
1356
char tempdir[] = "/tmp/mandosXXXXXX";
1357
bool tempdir_created = false;
1358
AvahiIfIndex if_index = AVAHI_IF_UNSPEC;
1359
const char *seckey = PATHDIR "/" SECKEY;
1360
const char *pubkey = PATHDIR "/" PUBKEY;
1362
bool gnutls_initialized = false;
1363
bool gpgme_initialized = false;
1365
double retry_interval = 10; /* 10s between trying a server and
1366
retrying the same server again */
1368
struct sigaction old_sigterm_action = { .sa_handler = SIG_DFL };
1369
struct sigaction sigterm_action = { .sa_handler = handle_sigterm };
1374
/* Lower any group privileges we might have, just to be safe */
1378
perror_plus("setgid");
1381
/* Lower user privileges (temporarily) */
1385
perror_plus("seteuid");
1393
struct argp_option options[] = {
1394
{ .name = "debug", .key = 128,
1395
.doc = "Debug mode", .group = 3 },
1396
{ .name = "connect", .key = 'c',
1397
.arg = "ADDRESS:PORT",
1398
.doc = "Connect directly to a specific Mandos server",
1400
{ .name = "interface", .key = 'i',
1402
.doc = "Network interface that will be used to search for"
1405
{ .name = "seckey", .key = 's',
1407
.doc = "OpenPGP secret key file base name",
1409
{ .name = "pubkey", .key = 'p',
1411
.doc = "OpenPGP public key file base name",
1413
{ .name = "dh-bits", .key = 129,
1415
.doc = "Bit length of the prime number used in the"
1416
" Diffie-Hellman key exchange",
1418
{ .name = "priority", .key = 130,
1420
.doc = "GnuTLS priority string for the TLS handshake",
1422
{ .name = "delay", .key = 131,
1424
.doc = "Maximum delay to wait for interface startup",
1426
{ .name = "retry", .key = 132,
1428
.doc = "Retry interval used when denied by the mandos server",
1431
* These reproduce what we would get without ARGP_NO_HELP
1433
{ .name = "help", .key = '?',
1434
.doc = "Give this help list", .group = -1 },
1435
{ .name = "usage", .key = -3,
1436
.doc = "Give a short usage message", .group = -1 },
1437
{ .name = "version", .key = 'V',
1438
.doc = "Print program version", .group = -1 },
1442
error_t parse_opt(int key, char *arg,
1443
struct argp_state *state){
1446
case 128: /* --debug */
1449
case 'c': /* --connect */
1452
case 'i': /* --interface */
1455
case 's': /* --seckey */
1458
case 'p': /* --pubkey */
1461
case 129: /* --dh-bits */
1463
tmpmax = strtoimax(arg, &tmp, 10);
1464
if(errno != 0 or tmp == arg or *tmp != '\0'
1465
or tmpmax != (typeof(mc.dh_bits))tmpmax){
1466
argp_error(state, "Bad number of DH bits");
1468
mc.dh_bits = (typeof(mc.dh_bits))tmpmax;
1470
case 130: /* --priority */
1473
case 131: /* --delay */
1475
delay = strtof(arg, &tmp);
1476
if(errno != 0 or tmp == arg or *tmp != '\0'){
1477
argp_error(state, "Bad delay");
1479
case 132: /* --retry */
1481
retry_interval = strtod(arg, &tmp);
1482
if(errno != 0 or tmp == arg or *tmp != '\0'
1483
or (retry_interval * 1000) > INT_MAX
1484
or retry_interval < 0){
1485
argp_error(state, "Bad retry interval");
1489
* These reproduce what we would get without ARGP_NO_HELP
1491
case '?': /* --help */
1492
argp_state_help(state, state->out_stream,
1493
(ARGP_HELP_STD_HELP | ARGP_HELP_EXIT_ERR)
1494
& ~(unsigned int)ARGP_HELP_EXIT_OK);
1495
case -3: /* --usage */
1496
argp_state_help(state, state->out_stream,
1497
ARGP_HELP_USAGE | ARGP_HELP_EXIT_ERR);
1498
case 'V': /* --version */
1499
fprintf(state->out_stream, "%s\n", argp_program_version);
1500
exit(argp_err_exit_status);
1503
return ARGP_ERR_UNKNOWN;
1508
struct argp argp = { .options = options, .parser = parse_opt,
1510
.doc = "Mandos client -- Get and decrypt"
1511
" passwords from a Mandos server" };
1512
ret = argp_parse(&argp, argc, argv,
1513
ARGP_IN_ORDER | ARGP_NO_HELP, 0, NULL);
576
static void browse_callback(
577
AvahiSServiceBrowser *b,
578
AvahiIfIndex interface,
579
AvahiProtocol protocol,
580
AvahiBrowserEvent event,
584
AVAHI_GCC_UNUSED AvahiLookupResultFlags flags,
587
AvahiServer *s = userdata;
588
assert(b); /* Spurious warning */
590
/* Called whenever a new services becomes available on the LAN or
591
is removed from the LAN */
1520
perror_plus("argp_parse");
1521
exitcode = EX_OSERR;
1524
exitcode = EX_USAGE;
1530
/* Work around Debian bug #633582:
1531
<http://bugs.debian.org/633582> */
1534
/* Re-raise priviliges */
1538
perror_plus("seteuid");
1541
if(strcmp(seckey, PATHDIR "/" SECKEY) == 0){
1542
int seckey_fd = open(seckey, O_RDONLY);
1543
if(seckey_fd == -1){
1544
perror_plus("open");
1546
ret = (int)TEMP_FAILURE_RETRY(fstat(seckey_fd, &st));
1548
perror_plus("fstat");
1550
if(S_ISREG(st.st_mode) and st.st_uid == 0 and st.st_gid == 0){
1551
ret = fchown(seckey_fd, uid, gid);
1553
perror_plus("fchown");
1557
TEMP_FAILURE_RETRY(close(seckey_fd));
1561
if(strcmp(pubkey, PATHDIR "/" PUBKEY) == 0){
1562
int pubkey_fd = open(pubkey, O_RDONLY);
1563
if(pubkey_fd == -1){
1564
perror_plus("open");
1566
ret = (int)TEMP_FAILURE_RETRY(fstat(pubkey_fd, &st));
1568
perror_plus("fstat");
1570
if(S_ISREG(st.st_mode) and st.st_uid == 0 and st.st_gid == 0){
1571
ret = fchown(pubkey_fd, uid, gid);
1573
perror_plus("fchown");
1577
TEMP_FAILURE_RETRY(close(pubkey_fd));
1581
/* Lower privileges */
1585
perror_plus("seteuid");
1589
/* Find network hooks and run them */
1591
struct dirent **direntries;
1592
struct dirent *direntry;
1593
int numhooks = scandir(HOOKDIR, &direntries, runnable_hook,
1595
int devnull = open("/dev/null", O_RDONLY);
1596
for(int i = 0; i < numhooks; i++){
1597
direntry = direntries[0];
1598
char *fullname = NULL;
1599
ret = asprintf(&fullname, "%s/%s", tempdir,
595
case AVAHI_BROWSER_FAILURE:
597
fprintf(stderr, "(Browser) %s\n",
598
avahi_strerror(avahi_server_errno(server)));
599
avahi_simple_poll_quit(simple_poll);
602
case AVAHI_BROWSER_NEW:
603
/* We ignore the returned resolver object. In the callback
604
function we free it. If the server is terminated before
605
the callback function is called the server will free
606
the resolver for us. */
608
if (!(avahi_s_service_resolver_new(s, interface, protocol, name,
610
AVAHI_PROTO_INET6, 0,
611
resolve_callback, s)))
612
fprintf(stderr, "Failed to resolve service '%s': %s\n", name,
613
avahi_strerror(avahi_server_errno(s)));
616
case AVAHI_BROWSER_REMOVE:
619
case AVAHI_BROWSER_ALL_FOR_NOW:
620
case AVAHI_BROWSER_CACHE_EXHAUSTED:
625
int main(AVAHI_GCC_UNUSED int argc, AVAHI_GCC_UNUSED char*argv[]) {
626
AvahiServerConfig config;
627
AvahiSServiceBrowser *sb = NULL;
630
int returncode = EXIT_SUCCESS;
631
const char *interface = NULL;
632
AvahiIfIndex if_index = AVAHI_IF_UNSPEC;
633
char *connect_to = NULL;
636
static struct option long_options[] = {
637
{"debug", no_argument, (int *)&debug, 1},
638
{"connect", required_argument, 0, 'c'},
639
{"interface", required_argument, 0, 'i'},
642
int option_index = 0;
643
ret = getopt_long (argc, argv, "i:", long_options,
664
if(interface != NULL){
665
if_index = (AvahiIfIndex) if_nametoindex(interface);
667
fprintf(stderr, "No such interface: \"%s\"\n", interface);
672
if(connect_to != NULL){
673
/* Connect directly, do not use Zeroconf */
674
/* (Mainly meant for debugging) */
675
char *address = strrchr(connect_to, ':');
677
fprintf(stderr, "No colon in address\n");
681
uint16_t port = (uint16_t) strtol(address+1, NULL, 10);
683
perror("Bad port number");
687
address = connect_to;
688
ret = start_mandos_communication(address, port, if_index);
1602
perror_plus("asprintf");
1605
pid_t hook_pid = fork();
1608
dup2(devnull, STDIN_FILENO);
1610
dup2(STDERR_FILENO, STDOUT_FILENO);
1611
setenv("DEVICE", interface, 1);
1612
setenv("VERBOSE", debug ? "1" : "0", 1);
1613
setenv("MODE", "start", 1);
1614
/* setenv( XXX more here */
1615
ret = execl(fullname, direntry->d_name, "start", NULL);
1616
perror_plus("execl");
1627
avahi_set_log_function(empty_log);
1630
if(interface[0] == '\0'){
1631
struct dirent **direntries;
1632
/* First look for interfaces that are up */
1633
ret = scandir(sys_class_net, &direntries, up_interface,
1636
/* No up interfaces, look for any good interfaces */
1638
ret = scandir(sys_class_net, &direntries, good_interface,
1642
/* Pick the first interface returned */
1643
interface = strdup(direntries[0]->d_name);
1645
fprintf(stderr, "Using interface \"%s\"\n", interface);
1647
if(interface == NULL){
1648
perror_plus("malloc");
1650
exitcode = EXIT_FAILURE;
1656
fprintf(stderr, "Could not find a network interface\n");
1657
exitcode = EXIT_FAILURE;
1662
/* Initialize Avahi early so avahi_simple_poll_quit() can be called
1663
from the signal handler */
1664
/* Initialize the pseudo-RNG for Avahi */
1665
srand((unsigned int) time(NULL));
1666
mc.simple_poll = avahi_simple_poll_new();
1667
if(mc.simple_poll == NULL){
1668
fprintf(stderr, "Avahi: Failed to create simple poll object.\n");
1669
exitcode = EX_UNAVAILABLE;
1673
sigemptyset(&sigterm_action.sa_mask);
1674
ret = sigaddset(&sigterm_action.sa_mask, SIGINT);
1676
perror_plus("sigaddset");
1677
exitcode = EX_OSERR;
1680
ret = sigaddset(&sigterm_action.sa_mask, SIGHUP);
1682
perror_plus("sigaddset");
1683
exitcode = EX_OSERR;
1686
ret = sigaddset(&sigterm_action.sa_mask, SIGTERM);
1688
perror_plus("sigaddset");
1689
exitcode = EX_OSERR;
1692
/* Need to check if the handler is SIG_IGN before handling:
1693
| [[info:libc:Initial Signal Actions]] |
1694
| [[info:libc:Basic Signal Handling]] |
1696
ret = sigaction(SIGINT, NULL, &old_sigterm_action);
1698
perror_plus("sigaction");
1701
if(old_sigterm_action.sa_handler != SIG_IGN){
1702
ret = sigaction(SIGINT, &sigterm_action, NULL);
1704
perror_plus("sigaction");
1705
exitcode = EX_OSERR;
1709
ret = sigaction(SIGHUP, NULL, &old_sigterm_action);
1711
perror_plus("sigaction");
1714
if(old_sigterm_action.sa_handler != SIG_IGN){
1715
ret = sigaction(SIGHUP, &sigterm_action, NULL);
1717
perror_plus("sigaction");
1718
exitcode = EX_OSERR;
1722
ret = sigaction(SIGTERM, NULL, &old_sigterm_action);
1724
perror_plus("sigaction");
1727
if(old_sigterm_action.sa_handler != SIG_IGN){
1728
ret = sigaction(SIGTERM, &sigterm_action, NULL);
1730
perror_plus("sigaction");
1731
exitcode = EX_OSERR;
1736
/* If the interface is down, bring it up */
1737
if(strcmp(interface, "none") != 0){
1738
if_index = (AvahiIfIndex) if_nametoindex(interface);
1740
fprintf(stderr, "No such interface: \"%s\"\n", interface);
1741
exitcode = EX_UNAVAILABLE;
1749
/* Re-raise priviliges */
1753
perror_plus("seteuid");
1757
/* Lower kernel loglevel to KERN_NOTICE to avoid KERN_INFO
1758
messages about the network interface to mess up the prompt */
1759
ret = klogctl(8, NULL, 5);
1760
bool restore_loglevel = true;
1762
restore_loglevel = false;
1763
perror_plus("klogctl");
1765
#endif /* __linux__ */
1767
sd = socket(PF_INET6, SOCK_DGRAM, IPPROTO_IP);
1769
perror_plus("socket");
1770
exitcode = EX_OSERR;
1772
if(restore_loglevel){
1773
ret = klogctl(7, NULL, 0);
1775
perror_plus("klogctl");
1778
#endif /* __linux__ */
1779
/* Lower privileges */
1783
perror_plus("seteuid");
1787
strcpy(network.ifr_name, interface);
1788
ret = ioctl(sd, SIOCGIFFLAGS, &network);
1790
perror_plus("ioctl SIOCGIFFLAGS");
1792
if(restore_loglevel){
1793
ret = klogctl(7, NULL, 0);
1795
perror_plus("klogctl");
1798
#endif /* __linux__ */
1799
exitcode = EX_OSERR;
1800
/* Lower privileges */
1804
perror_plus("seteuid");
1808
if((network.ifr_flags & IFF_UP) == 0){
1809
network.ifr_flags |= IFF_UP;
1810
take_down_interface = true;
1811
ret = ioctl(sd, SIOCSIFFLAGS, &network);
1813
take_down_interface = false;
1814
perror_plus("ioctl SIOCSIFFLAGS +IFF_UP");
1815
exitcode = EX_OSERR;
1817
if(restore_loglevel){
1818
ret = klogctl(7, NULL, 0);
1820
perror_plus("klogctl");
1823
#endif /* __linux__ */
1824
/* Lower privileges */
1828
perror_plus("seteuid");
1833
/* Sleep checking until interface is running.
1834
Check every 0.25s, up to total time of delay */
1835
for(int i=0; i < delay * 4; i++){
1836
ret = ioctl(sd, SIOCGIFFLAGS, &network);
1838
perror_plus("ioctl SIOCGIFFLAGS");
1839
} else if(network.ifr_flags & IFF_RUNNING){
1842
struct timespec sleeptime = { .tv_nsec = 250000000 };
1843
ret = nanosleep(&sleeptime, NULL);
1844
if(ret == -1 and errno != EINTR){
1845
perror_plus("nanosleep");
1848
if(not take_down_interface){
1849
/* We won't need the socket anymore */
1850
ret = (int)TEMP_FAILURE_RETRY(close(sd));
1852
perror_plus("close");
1856
if(restore_loglevel){
1857
/* Restores kernel loglevel to default */
1858
ret = klogctl(7, NULL, 0);
1860
perror_plus("klogctl");
1863
#endif /* __linux__ */
1864
/* Lower privileges */
1866
if(take_down_interface){
1867
/* Lower privileges */
1870
perror_plus("seteuid");
1873
/* Lower privileges permanently */
1876
perror_plus("setuid");
1885
ret = init_gnutls_global(pubkey, seckey);
1887
fprintf(stderr, "init_gnutls_global failed\n");
1888
exitcode = EX_UNAVAILABLE;
1891
gnutls_initialized = true;
1898
if(mkdtemp(tempdir) == NULL){
1899
perror_plus("mkdtemp");
1902
tempdir_created = true;
1908
if(not init_gpgme(pubkey, seckey, tempdir)){
1909
fprintf(stderr, "init_gpgme failed\n");
1910
exitcode = EX_UNAVAILABLE;
1913
gpgme_initialized = true;
1920
if(connect_to != NULL){
1921
/* Connect directly, do not use Zeroconf */
1922
/* (Mainly meant for debugging) */
1923
char *address = strrchr(connect_to, ':');
1924
if(address == NULL){
1925
fprintf(stderr, "No colon in address\n");
1926
exitcode = EX_USAGE;
1936
tmpmax = strtoimax(address+1, &tmp, 10);
1937
if(errno != 0 or tmp == address+1 or *tmp != '\0'
1938
or tmpmax != (uint16_t)tmpmax){
1939
fprintf(stderr, "Bad port number\n");
1940
exitcode = EX_USAGE;
1948
port = (uint16_t)tmpmax;
1950
/* Colon in address indicates IPv6 */
1952
if(strchr(connect_to, ':') != NULL){
1954
/* Accept [] around IPv6 address - see RFC 5952 */
1955
if(connect_to[0] == '[' and address[-1] == ']')
1963
address = connect_to;
1969
while(not quit_now){
1970
ret = start_mandos_communication(address, port, if_index, af);
1971
if(quit_now or ret == 0){
1975
fprintf(stderr, "Retrying in %d seconds\n",
1976
(int)retry_interval);
1978
sleep((int)retry_interval);
1982
exitcode = EXIT_SUCCESS;
1993
AvahiServerConfig config;
1994
/* Do not publish any local Zeroconf records */
697
avahi_set_log_function(empty_log);
700
/* Initialize the psuedo-RNG */
701
srand((unsigned int) time(NULL));
703
/* Allocate main loop object */
704
if (!(simple_poll = avahi_simple_poll_new())) {
705
fprintf(stderr, "Failed to create simple poll object.\n");
710
/* Do not publish any local records */
1995
711
avahi_server_config_init(&config);
1996
712
config.publish_hinfo = 0;
1997
713
config.publish_addresses = 0;
1998
714
config.publish_workstation = 0;
1999
715
config.publish_domain = 0;
2001
717
/* Allocate a new server */
2002
mc.server = avahi_server_new(avahi_simple_poll_get
2003
(mc.simple_poll), &config, NULL,
2006
/* Free the Avahi configuration data */
718
server = avahi_server_new(avahi_simple_poll_get(simple_poll),
719
&config, NULL, NULL, &error);
721
/* Free the configuration data */
2007
722
avahi_server_config_free(&config);
2010
/* Check if creating the Avahi server object succeeded */
2011
if(mc.server == NULL){
2012
fprintf(stderr, "Failed to create Avahi server: %s\n",
2013
avahi_strerror(error));
2014
exitcode = EX_UNAVAILABLE;
2022
/* Create the Avahi service browser */
2023
sb = avahi_s_service_browser_new(mc.server, if_index,
2024
AVAHI_PROTO_UNSPEC, "_mandos._tcp",
2025
NULL, 0, browse_callback, NULL);
2027
fprintf(stderr, "Failed to create service browser: %s\n",
2028
avahi_strerror(avahi_server_errno(mc.server)));
2029
exitcode = EX_UNAVAILABLE;
2037
/* Run the main loop */
2040
fprintf(stderr, "Starting Avahi loop search\n");
2043
ret = avahi_loop_with_timeout(mc.simple_poll,
2044
(int)(retry_interval * 1000));
2046
fprintf(stderr, "avahi_loop_with_timeout exited %s\n",
2047
(ret == 0) ? "successfully" : "with error");
2053
fprintf(stderr, "%s exiting\n", argv[0]);
2056
/* Cleanup things */
2058
avahi_s_service_browser_free(sb);
2060
if(mc.server != NULL)
2061
avahi_server_free(mc.server);
2063
if(mc.simple_poll != NULL)
2064
avahi_simple_poll_free(mc.simple_poll);
2066
if(gnutls_initialized){
2067
gnutls_certificate_free_credentials(mc.cred);
2068
gnutls_global_deinit();
2069
gnutls_dh_params_deinit(mc.dh_params);
2072
if(gpgme_initialized){
2073
gpgme_release(mc.ctx);
2076
/* Cleans up the circular linked list of Mandos servers the client
2078
if(mc.current_server != NULL){
2079
mc.current_server->prev->next = NULL;
2080
while(mc.current_server != NULL){
2081
server *next = mc.current_server->next;
2082
free(mc.current_server);
2083
mc.current_server = next;
2087
/* XXX run network hooks "stop" here */
2089
/* Take down the network interface */
2090
if(take_down_interface){
2091
/* Re-raise priviliges */
2095
perror_plus("seteuid");
2098
ret = ioctl(sd, SIOCGIFFLAGS, &network);
2100
perror_plus("ioctl SIOCGIFFLAGS");
2101
} else if(network.ifr_flags & IFF_UP) {
2102
network.ifr_flags &= ~(short)IFF_UP; /* clear flag */
2103
ret = ioctl(sd, SIOCSIFFLAGS, &network);
2105
perror_plus("ioctl SIOCSIFFLAGS -IFF_UP");
2108
ret = (int)TEMP_FAILURE_RETRY(close(sd));
2110
perror_plus("close");
2112
/* Lower privileges permanently */
2116
perror_plus("setuid");
2121
/* Removes the GPGME temp directory and all files inside */
2122
if(tempdir_created){
2123
struct dirent **direntries = NULL;
2124
struct dirent *direntry = NULL;
2125
int numentries = scandir(tempdir, &direntries, notdotentries,
2127
if (numentries > 0){
2128
for(int i = 0; i < numentries; i++){
2129
direntry = direntries[i];
2130
char *fullname = NULL;
2131
ret = asprintf(&fullname, "%s/%s", tempdir,
2134
perror_plus("asprintf");
2137
ret = remove(fullname);
2139
fprintf(stderr, "remove(\"%s\"): %s\n", fullname,
2146
/* need to clean even if 0 because man page doesn't specify */
2148
if (numentries == -1){
2149
perror_plus("scandir");
2151
ret = rmdir(tempdir);
2152
if(ret == -1 and errno != ENOENT){
2153
perror_plus("rmdir");
2158
sigemptyset(&old_sigterm_action.sa_mask);
2159
old_sigterm_action.sa_handler = SIG_DFL;
2160
ret = (int)TEMP_FAILURE_RETRY(sigaction(signal_received,
2161
&old_sigterm_action,
2164
perror_plus("sigaction");
2167
ret = raise(signal_received);
2168
} while(ret != 0 and errno == EINTR);
2170
perror_plus("raise");
2173
TEMP_FAILURE_RETRY(pause());
724
/* Check if creating the server object succeeded */
726
fprintf(stderr, "Failed to create server: %s\n",
727
avahi_strerror(error));
728
returncode = EXIT_FAILURE;
732
/* Create the service browser */
733
sb = avahi_s_service_browser_new(server, if_index,
735
"_mandos._tcp", NULL, 0,
736
browse_callback, server);
738
fprintf(stderr, "Failed to create service browser: %s\n",
739
avahi_strerror(avahi_server_errno(server)));
740
returncode = EXIT_FAILURE;
744
/* Run the main loop */
747
fprintf(stderr, "Starting avahi loop search\n");
750
avahi_simple_poll_loop(simple_poll);
755
fprintf(stderr, "%s exiting\n", argv[0]);
760
avahi_s_service_browser_free(sb);
763
avahi_server_free(server);
766
avahi_simple_poll_free(simple_poll);