64
62
#include <string.h> /* memset */
65
63
#include <arpa/inet.h> /* inet_pton() */
66
64
#include <iso646.h> /* not */
67
#include <net/if.h> /* IF_NAMESIZE */
68
#include <argp.h> /* struct argp_option,
69
struct argp_state, struct argp,
72
67
#include <errno.h> /* perror() */
75
73
#define BUFFER_SIZE 256
75
static const char *keydir = "/conf/conf.d/mandos";
76
static const char *pubkeyfile = "pubkey.txt";
77
static const char *seckeyfile = "seckey.txt";
77
79
bool debug = false;
78
static const char *keydir = "/conf/conf.d/mandos";
79
const char *argp_program_version = "mandosclient 0.9";
80
const char *argp_program_bug_address = "<mandos@fukt.bsnet.se>";
81
static const char mandos_protocol_version[] = "1";
83
/* Used for passing in values through the Avahi callback functions */
81
/* Used for passing in values through all the callback functions */
85
83
AvahiSimplePoll *simple_poll;
86
84
AvahiServer *server;
87
85
gnutls_certificate_credentials_t cred;
88
86
unsigned int dh_bits;
89
gnutls_dh_params_t dh_params;
90
87
const char *priority;
93
/* Make room in "buffer" for at least BUFFER_SIZE additional bytes.
94
* "buffer_capacity" is how much is currently allocated,
95
* "buffer_length" is how much is already used. */
96
size_t adjustbuffer(char **buffer, size_t buffer_length,
97
size_t buffer_capacity){
98
if (buffer_length + BUFFER_SIZE > buffer_capacity){
99
*buffer = realloc(*buffer, buffer_capacity + BUFFER_SIZE);
103
buffer_capacity += BUFFER_SIZE;
105
return buffer_capacity;
109
91
* Decrypt OpenPGP data using keyrings in HOMEDIR.
110
92
* Returns -1 on error
300
284
if ((ret = gnutls_global_init ())
301
285
!= GNUTLS_E_SUCCESS) {
302
fprintf (stderr, "GnuTLS global_init: %s\n",
303
safer_gnutls_strerror(ret));
286
fprintf (stderr, "global_init: %s\n", safer_gnutls_strerror(ret));
308
/* "Use a log level over 10 to enable all debugging options."
311
291
gnutls_global_set_log_level(11);
312
292
gnutls_global_set_log_function(debuggnutls);
315
/* OpenPGP credentials */
295
/* openpgp credentials */
316
296
if ((ret = gnutls_certificate_allocate_credentials (&mc->cred))
317
297
!= GNUTLS_E_SUCCESS) {
318
fprintf (stderr, "GnuTLS memory error: %s\n",
298
fprintf (stderr, "memory error: %s\n",
319
299
safer_gnutls_strerror(ret));
329
309
ret = gnutls_certificate_set_openpgp_key_file
330
310
(mc->cred, pubkeyfile, seckeyfile, GNUTLS_OPENPGP_FMT_BASE64);
331
311
if (ret != GNUTLS_E_SUCCESS) {
333
"Error[%d] while reading the OpenPGP key pair ('%s',"
334
" '%s')\n", ret, pubkeyfile, seckeyfile);
335
fprintf(stdout, "The GnuTLS error is: %s\n",
313
(stderr, "Error[%d] while reading the OpenPGP key pair ('%s',"
315
ret, pubkeyfile, seckeyfile);
316
fprintf(stdout, "The Error is: %s\n",
336
317
safer_gnutls_strerror(ret));
340
/* GnuTLS server initialization */
341
ret = gnutls_dh_params_init(&mc->dh_params);
342
if (ret != GNUTLS_E_SUCCESS) {
343
fprintf (stderr, "Error in GnuTLS DH parameter initialization:"
344
" %s\n", safer_gnutls_strerror(ret));
347
ret = gnutls_dh_params_generate2(mc->dh_params, mc->dh_bits);
348
if (ret != GNUTLS_E_SUCCESS) {
349
fprintf (stderr, "Error in GnuTLS prime generation: %s\n",
350
safer_gnutls_strerror(ret));
354
gnutls_certificate_set_dh_params(mc->cred, mc->dh_params);
359
static int init_gnutls_session(mandos_context *mc,
360
gnutls_session_t *session){
362
/* GnuTLS session creation */
363
ret = gnutls_init(session, GNUTLS_SERVER);
364
if (ret != GNUTLS_E_SUCCESS){
321
//GnuTLS server initialization
322
if ((ret = gnutls_dh_params_init(dh_params))
323
!= GNUTLS_E_SUCCESS) {
324
fprintf (stderr, "Error in dh parameter initialization: %s\n",
325
safer_gnutls_strerror(ret));
329
if ((ret = gnutls_dh_params_generate2(*dh_params, mc->dh_bits))
330
!= GNUTLS_E_SUCCESS) {
331
fprintf (stderr, "Error in prime generation: %s\n",
332
safer_gnutls_strerror(ret));
336
gnutls_certificate_set_dh_params(mc->cred, *dh_params);
338
// GnuTLS session creation
339
if ((ret = gnutls_init(session, GNUTLS_SERVER))
340
!= GNUTLS_E_SUCCESS){
365
341
fprintf(stderr, "Error in GnuTLS session initialization: %s\n",
366
342
safer_gnutls_strerror(ret));
371
ret = gnutls_priority_set_direct(*session, mc->priority, &err);
372
if (ret != GNUTLS_E_SUCCESS) {
373
fprintf(stderr, "Syntax error at: %s\n", err);
374
fprintf(stderr, "GnuTLS error: %s\n",
375
safer_gnutls_strerror(ret));
345
if ((ret = gnutls_priority_set_direct(*session, mc->priority, &err))
346
!= GNUTLS_E_SUCCESS) {
347
fprintf(stderr, "Syntax error at: %s\n", err);
348
fprintf(stderr, "GnuTLS error: %s\n",
349
safer_gnutls_strerror(ret));
380
ret = gnutls_credentials_set(*session, GNUTLS_CRD_CERTIFICATE,
382
if (ret != GNUTLS_E_SUCCESS) {
383
fprintf(stderr, "Error setting GnuTLS credentials: %s\n",
353
if ((ret = gnutls_credentials_set(*session, GNUTLS_CRD_CERTIFICATE,
355
!= GNUTLS_E_SUCCESS) {
356
fprintf(stderr, "Error setting a credentials set: %s\n",
384
357
safer_gnutls_strerror(ret));
397
/* Avahi log function callback */
398
370
static void empty_log(__attribute__((unused)) AvahiLogLevel level,
399
371
__attribute__((unused)) const char *txt){}
401
/* Called when a Mandos server is found */
402
373
static int start_mandos_communication(const char *ip, uint16_t port,
403
374
AvahiIfIndex if_index,
404
375
mandos_context *mc){
406
union { struct sockaddr in; struct sockaddr_in6 in6; } to;
377
struct sockaddr_in6 to;
407
378
char *buffer = NULL;
408
379
char *decrypted_buffer;
409
380
size_t buffer_length = 0;
410
381
size_t buffer_capacity = 0;
411
382
ssize_t decrypted_buffer_size;
414
385
char interface[IF_NAMESIZE];
415
386
gnutls_session_t session;
417
ret = init_gnutls_session (mc, &session);
387
gnutls_dh_params_t dh_params;
423
390
fprintf(stderr, "Setting up a tcp connection to %s, port %d\n",
471
ret = connect(tcp_sd, &to.in, sizeof(to));
436
ret = connect(tcp_sd, (struct sockaddr *) &to, sizeof(to));
473
438
perror("connect");
477
const char *out = mandos_protocol_version;
480
size_t out_size = strlen(out);
481
ret = TEMP_FAILURE_RETRY(write(tcp_sd, out + written,
482
out_size - written));
488
written += (size_t)ret;
489
if(written < out_size){
492
if (out == mandos_protocol_version){
442
ret = initgnutls (mc, &session, &dh_params);
448
gnutls_transport_set_ptr (session, (gnutls_transport_ptr_t) tcp_sd);
502
451
fprintf(stderr, "Establishing TLS session with %s\n", ip);
505
gnutls_transport_set_ptr (session, (gnutls_transport_ptr_t) tcp_sd);
507
454
ret = gnutls_handshake (session);
509
456
if (ret != GNUTLS_E_SUCCESS){
511
fprintf(stderr, "*** GnuTLS Handshake failed ***\n");
458
fprintf(stderr, "\n*** Handshake failed ***\n");
512
459
gnutls_perror (ret);
518
/* Read OpenPGP packet that contains the wanted password */
465
//Retrieve OpenPGP packet that contains the wanted password
521
468
fprintf(stderr, "Retrieving pgp encrypted password from %s\n",
544
492
case GNUTLS_E_REHANDSHAKE:
545
493
ret = gnutls_handshake (session);
547
fprintf(stderr, "*** GnuTLS Re-handshake failed ***\n");
495
fprintf(stderr, "\n*** Handshake failed ***\n");
548
496
gnutls_perror (ret);
554
502
fprintf(stderr, "Unknown error while reading data from"
555
" encrypted session with Mandos server\n");
503
" encrypted session with mandos server\n");
557
505
gnutls_bye (session, GNUTLS_SHUT_RDWR);
561
509
buffer_length += (size_t) ret;
566
fprintf(stderr, "Closing TLS session\n");
569
gnutls_bye (session, GNUTLS_SHUT_RDWR);
571
513
if (buffer_length > 0){
572
514
decrypted_buffer_size = pgp_packet_decrypt(buffer,
574
516
&decrypted_buffer,
576
518
if (decrypted_buffer_size >= 0){
578
519
while(written < (size_t) decrypted_buffer_size){
579
520
ret = (int)fwrite (decrypted_buffer + written, 1,
580
521
(size_t)decrypted_buffer_size - written,
672
618
case AVAHI_BROWSER_FAILURE:
674
fprintf(stderr, "(Avahi browser) %s\n",
620
fprintf(stderr, "(Browser) %s\n",
675
621
avahi_strerror(avahi_server_errno(mc->server)));
676
622
avahi_simple_poll_quit(mc->simple_poll);
679
625
case AVAHI_BROWSER_NEW:
680
/* We ignore the returned Avahi resolver object. In the callback
681
function we free it. If the Avahi server is terminated before
682
the callback function is called the Avahi server will free the
626
/* We ignore the returned resolver object. In the callback
627
function we free it. If the server is terminated before
628
the callback function is called the server will free
629
the resolver for us. */
685
631
if (!(avahi_s_service_resolver_new(mc->server, interface,
686
632
protocol, name, type, domain,
687
633
AVAHI_PROTO_INET6, 0,
688
634
resolve_callback, mc)))
689
fprintf(stderr, "Avahi: Failed to resolve service '%s': %s\n",
690
name, avahi_strerror(avahi_server_errno(mc->server)));
635
fprintf(stderr, "Failed to resolve service '%s': %s\n", name,
636
avahi_strerror(avahi_server_errno(mc->server)));
693
639
case AVAHI_BROWSER_REMOVE:
726
int main(int argc, char *argv[]){
669
int main(AVAHI_GCC_UNUSED int argc, AVAHI_GCC_UNUSED char*argv[]) {
670
AvahiServerConfig config;
727
671
AvahiSServiceBrowser *sb = NULL;
730
int exitcode = EXIT_SUCCESS;
675
int returncode = EXIT_SUCCESS;
731
676
const char *interface = "eth0";
732
677
struct ifreq network;
736
679
char *connect_to = NULL;
737
680
AvahiIfIndex if_index = AVAHI_IF_UNSPEC;
738
const char *pubkeyfile = "pubkey.txt";
739
const char *seckeyfile = "seckey.txt";
740
681
mandos_context mc = { .simple_poll = NULL, .server = NULL,
741
682
.dh_bits = 1024, .priority = "SECURE256"};
744
struct argp_option options[] = {
745
{ .name = "debug", .key = 128,
746
.doc = "Debug mode", .group = 3 },
747
{ .name = "connect", .key = 'c',
749
.doc = "Connect directly to a sepcified mandos server",
751
{ .name = "interface", .key = 'i',
753
.doc = "Interface that Avahi will conntect through",
755
{ .name = "keydir", .key = 'd',
757
.doc = "Directory where the openpgp keyring is",
759
{ .name = "seckey", .key = 's',
761
.doc = "Secret openpgp key for gnutls authentication",
763
{ .name = "pubkey", .key = 'p',
765
.doc = "Public openpgp key for gnutls authentication",
767
{ .name = "dh-bits", .key = 129,
769
.doc = "dh-bits to use in gnutls communication",
771
{ .name = "priority", .key = 130,
773
.doc = "GNUTLS priority", .group = 1 },
778
error_t parse_opt (int key, char *arg,
779
struct argp_state *state) {
780
/* Get the INPUT argument from `argp_parse', which we know is
781
a pointer to our plugin list pointer. */
803
mc.dh_bits = (unsigned int) strtol(arg, NULL, 10);
818
return ARGP_ERR_UNKNOWN;
684
debug_int = debug ? 1 : 0;
686
struct option long_options[] = {
687
{"debug", no_argument, &debug_int, 1},
688
{"connect", required_argument, NULL, 'c'},
689
{"interface", required_argument, NULL, 'i'},
690
{"keydir", required_argument, NULL, 'd'},
691
{"seckey", required_argument, NULL, 's'},
692
{"pubkey", required_argument, NULL, 'p'},
693
{"dh-bits", required_argument, NULL, 'D'},
694
{"priority", required_argument, NULL, 'P'},
697
int option_index = 0;
698
ret = getopt_long (argc, argv, "i:", long_options,
725
mc.dh_bits = (unsigned int) strtol(optarg, NULL, 10);
732
mc.priority = optarg;
823
struct argp argp = { .options = options, .parser = parse_opt,
825
.doc = "Mandos client -- Get and decrypt"
826
" passwords from mandos server" };
827
argp_parse (&argp, argc, argv, 0, 0, NULL);
739
debug = debug_int ? true : false;
830
741
pubkeyfile = combinepath(keydir, pubkeyfile);
831
742
if (pubkeyfile == NULL){
832
743
perror("combinepath");
833
exitcode = EXIT_FAILURE;
744
returncode = EXIT_FAILURE;
837
748
seckeyfile = combinepath(keydir, seckeyfile);
838
749
if (seckeyfile == NULL){
839
750
perror("combinepath");
843
ret = init_gnutls_global(&mc, pubkeyfile, seckeyfile);
845
fprintf(stderr, "init_gnutls_global\n");
862
754
if_index = (AvahiIfIndex) if_nametoindex(interface);
871
763
char *address = strrchr(connect_to, ':');
872
764
if(address == NULL){
873
765
fprintf(stderr, "No colon in address\n");
874
exitcode = EXIT_FAILURE;
878
769
uint16_t port = (uint16_t) strtol(address+1, NULL, 10);
880
771
perror("Bad port number");
881
exitcode = EXIT_FAILURE;
885
775
address = connect_to;
886
776
ret = start_mandos_communication(address, port, if_index, &mc);
888
exitcode = EXIT_FAILURE;
890
exitcode = EXIT_SUCCESS;
895
/* If the interface is down, bring it up */
897
sd = socket(PF_INET6, SOCK_DGRAM, IPPROTO_IP);
900
exitcode = EXIT_FAILURE;
903
strcpy(network.ifr_name, interface); /* Spurious warning */
904
ret = ioctl(sd, SIOCGIFFLAGS, &network);
784
sd = socket(PF_INET6, SOCK_DGRAM, IPPROTO_IP);
787
returncode = EXIT_FAILURE;
790
strcpy(network.ifr_name, interface); /* Spurious warning */
791
ret = ioctl(sd, SIOCGIFFLAGS, &network);
794
perror("ioctl SIOCGIFFLAGS");
795
returncode = EXIT_FAILURE;
798
if((network.ifr_flags & IFF_UP) == 0){
799
network.ifr_flags |= IFF_UP;
800
ret = ioctl(sd, SIOCSIFFLAGS, &network);
906
perror("ioctl SIOCGIFFLAGS");
907
exitcode = EXIT_FAILURE;
910
if((network.ifr_flags & IFF_UP) == 0){
911
network.ifr_flags |= IFF_UP;
912
ret = ioctl(sd, SIOCSIFFLAGS, &network);
914
perror("ioctl SIOCSIFFLAGS");
915
exitcode = EXIT_FAILURE;
802
perror("ioctl SIOCSIFFLAGS");
803
returncode = EXIT_FAILURE;
923
810
avahi_set_log_function(empty_log);
926
/* Initialize the pseudo-RNG for Avahi */
813
/* Initialize the psuedo-RNG */
927
814
srand((unsigned int) time(NULL));
929
/* Allocate main Avahi loop object */
930
mc.simple_poll = avahi_simple_poll_new();
931
if (mc.simple_poll == NULL) {
932
fprintf(stderr, "Avahi: Failed to create simple poll"
934
exitcode = EXIT_FAILURE;
939
AvahiServerConfig config;
940
/* Do not publish any local Zeroconf records */
941
avahi_server_config_init(&config);
942
config.publish_hinfo = 0;
943
config.publish_addresses = 0;
944
config.publish_workstation = 0;
945
config.publish_domain = 0;
947
/* Allocate a new server */
948
mc.server = avahi_server_new(avahi_simple_poll_get
949
(mc.simple_poll), &config, NULL,
952
/* Free the Avahi configuration data */
953
avahi_server_config_free(&config);
956
/* Check if creating the Avahi server object succeeded */
957
if (mc.server == NULL) {
958
fprintf(stderr, "Failed to create Avahi server: %s\n",
816
/* Allocate main loop object */
817
if (!(mc.simple_poll = avahi_simple_poll_new())) {
818
fprintf(stderr, "Failed to create simple poll object.\n");
819
returncode = EXIT_FAILURE;
823
/* Do not publish any local records */
824
avahi_server_config_init(&config);
825
config.publish_hinfo = 0;
826
config.publish_addresses = 0;
827
config.publish_workstation = 0;
828
config.publish_domain = 0;
830
/* Allocate a new server */
831
mc.server=avahi_server_new(avahi_simple_poll_get(mc.simple_poll),
832
&config, NULL, NULL, &error);
834
/* Free the configuration data */
835
avahi_server_config_free(&config);
837
/* Check if creating the server object succeeded */
839
fprintf(stderr, "Failed to create server: %s\n",
959
840
avahi_strerror(error));
960
exitcode = EXIT_FAILURE;
841
returncode = EXIT_FAILURE;
964
/* Create the Avahi service browser */
845
/* Create the service browser */
965
846
sb = avahi_s_service_browser_new(mc.server, if_index,
966
847
AVAHI_PROTO_INET6,
967
848
"_mandos._tcp", NULL, 0,
968
849
browse_callback, &mc);
970
851
fprintf(stderr, "Failed to create service browser: %s\n",
971
852
avahi_strerror(avahi_server_errno(mc.server)));
972
exitcode = EXIT_FAILURE;
853
returncode = EXIT_FAILURE;
976
857
/* Run the main loop */
979
fprintf(stderr, "Starting Avahi loop search\n");
860
fprintf(stderr, "Starting avahi loop search\n");
982
863
avahi_simple_poll_loop(mc.simple_poll);
987
868
fprintf(stderr, "%s exiting\n", argv[0]);
990
871
/* Cleanup things */
992
873
avahi_s_service_browser_free(sb);
994
if (mc.server != NULL)
995
876
avahi_server_free(mc.server);
997
if (mc.simple_poll != NULL)
998
879
avahi_simple_poll_free(mc.simple_poll);
999
880
free(pubkeyfile);
1000
881
free(seckeyfile);