25
25
* along with this program. If not, see
26
26
* <http://www.gnu.org/licenses/>.
28
* Contact the authors at <https://www.fukt.bsnet.se/~belorn/> and
29
* <https://www.fukt.bsnet.se/~teddy/>.
28
* Contact the authors at <mandos@fukt.bsnet.se>.
32
#define _FORTIFY_SOURCE 2
31
/* Needed by GPGME, specifically gpgme_data_seek() */
34
32
#define _LARGEFILE_SOURCE
35
33
#define _FILE_OFFSET_BITS 64
41
#include <net/if.h> /* if_nametoindex */
35
#define _GNU_SOURCE /* TEMP_FAILURE_RETRY(), asprintf() */
37
#include <stdio.h> /* fprintf(), stderr, fwrite(),
39
#include <stdint.h> /* uint16_t, uint32_t */
40
#include <stddef.h> /* NULL, size_t, ssize_t */
41
#include <stdlib.h> /* free(), EXIT_SUCCESS, EXIT_FAILURE,
43
#include <stdbool.h> /* bool, true */
44
#include <string.h> /* memset(), strcmp(), strlen(),
45
strerror(), asprintf(), strcpy() */
46
#include <sys/ioctl.h> /* ioctl */
47
#include <sys/types.h> /* socket(), inet_pton(), sockaddr,
48
sockaddr_in6, PF_INET6,
49
SOCK_STREAM, INET6_ADDRSTRLEN,
51
#include <inttypes.h> /* PRIu16 */
52
#include <sys/socket.h> /* socket(), struct sockaddr_in6,
53
struct in6_addr, inet_pton(),
55
#include <assert.h> /* assert() */
56
#include <errno.h> /* perror(), errno */
57
#include <time.h> /* time() */
58
#include <net/if.h> /* ioctl, ifreq, SIOCGIFFLAGS, IFF_UP,
59
SIOCSIFFLAGS, if_indextoname(),
60
if_nametoindex(), IF_NAMESIZE */
61
#include <unistd.h> /* close(), SEEK_SET, off_t, write(),
62
getuid(), getgid(), setuid(),
64
#include <netinet/in.h>
65
#include <arpa/inet.h> /* inet_pton(), htons */
66
#include <iso646.h> /* not, and */
67
#include <argp.h> /* struct argp_option, error_t, struct
68
argp_state, struct argp,
69
argp_parse(), ARGP_KEY_ARG,
70
ARGP_KEY_END, ARGP_ERR_UNKNOWN */
73
/* All Avahi types, constants and functions
43
76
#include <avahi-core/core.h>
44
77
#include <avahi-core/lookup.h>
45
78
#include <avahi-core/log.h>
47
80
#include <avahi-common/malloc.h>
48
81
#include <avahi-common/error.h>
51
#include <sys/types.h> /* socket(), inet_pton() */
52
#include <sys/socket.h> /* socket(), struct sockaddr_in6,
53
struct in6_addr, inet_pton() */
54
#include <gnutls/gnutls.h> /* All GnuTLS stuff */
55
#include <gnutls/openpgp.h> /* GnuTLS with openpgp stuff */
57
#include <unistd.h> /* close() */
58
#include <netinet/in.h>
59
#include <stdbool.h> /* true */
60
#include <string.h> /* memset */
61
#include <arpa/inet.h> /* inet_pton() */
62
#include <iso646.h> /* not */
65
#include <errno.h> /* perror() */
72
#define CERT_ROOT "/conf/conf.d/cryptkeyreq/"
74
#define CERTFILE CERT_ROOT "openpgp-client.txt"
75
#define KEYFILE CERT_ROOT "openpgp-client-key.txt"
84
#include <gnutls/gnutls.h> /* All GnuTLS types, constants and
87
init_gnutls_session(),
89
#include <gnutls/openpgp.h> /* gnutls_certificate_set_openpgp_key_file(),
90
GNUTLS_OPENPGP_FMT_BASE64 */
93
#include <gpgme.h> /* All GPGME types, constants and
96
GPGME_PROTOCOL_OpenPGP,
76
99
#define BUFFER_SIZE 256
79
101
bool debug = false;
102
static const char *keydir = "/conf/conf.d/mandos";
103
static const char mandos_protocol_version[] = "1";
104
const char *argp_program_version = "password-request 1.0";
105
const char *argp_program_bug_address = "<mandos@fukt.bsnet.se>";
107
/* Used for passing in values through the Avahi callback functions */
82
gnutls_session_t session;
109
AvahiSimplePoll *simple_poll;
83
111
gnutls_certificate_credentials_t cred;
112
unsigned int dh_bits;
84
113
gnutls_dh_params_t dh_params;
88
ssize_t pgp_packet_decrypt (char *packet, size_t packet_size,
89
char **new_packet, const char *homedir){
114
const char *priority;
118
* Make room in "buffer" for at least BUFFER_SIZE additional bytes.
119
* "buffer_capacity" is how much is currently allocated,
120
* "buffer_length" is how much is already used.
122
size_t adjustbuffer(char **buffer, size_t buffer_length,
123
size_t buffer_capacity){
124
if (buffer_length + BUFFER_SIZE > buffer_capacity){
125
*buffer = realloc(*buffer, buffer_capacity + BUFFER_SIZE);
129
buffer_capacity += BUFFER_SIZE;
131
return buffer_capacity;
135
* Decrypt OpenPGP data using keyrings in HOMEDIR.
136
* Returns -1 on error
138
static ssize_t pgp_packet_decrypt (const char *cryptotext,
141
const char *homedir){
90
142
gpgme_data_t dh_crypto, dh_plain;
94
ssize_t new_packet_capacity = 0;
95
ssize_t new_packet_length = 0;
146
size_t plaintext_capacity = 0;
147
ssize_t plaintext_length = 0;
96
148
gpgme_engine_info_t engine_info;
99
fprintf(stderr, "Trying to decrypt OpenPGP packet\n");
151
fprintf(stderr, "Trying to decrypt OpenPGP data\n");
103
155
gpgme_check_version(NULL);
104
gpgme_engine_check_version(GPGME_PROTOCOL_OpenPGP);
156
rc = gpgme_engine_check_version(GPGME_PROTOCOL_OpenPGP);
157
if (rc != GPG_ERR_NO_ERROR){
158
fprintf(stderr, "bad gpgme_engine_check_version: %s: %s\n",
159
gpgme_strsource(rc), gpgme_strerror(rc));
106
/* Set GPGME home directory */
163
/* Set GPGME home directory for the OpenPGP engine only */
107
164
rc = gpgme_get_engine_info (&engine_info);
108
165
if (rc != GPG_ERR_NO_ERROR){
109
166
fprintf(stderr, "bad gpgme_get_engine_info: %s: %s\n",
192
/* Delete the GPGME FILE pointer cryptotext data buffer */
193
gpgme_data_release(dh_crypto);
195
253
/* Seek back to the beginning of the GPGME plaintext data buffer */
196
gpgme_data_seek(dh_plain, (off_t) 0, SEEK_SET);
254
if (gpgme_data_seek(dh_plain, (off_t) 0, SEEK_SET) == -1){
255
perror("pgpme_data_seek");
256
plaintext_length = -1;
200
if (new_packet_length + BUFFER_SIZE > new_packet_capacity){
201
*new_packet = realloc(*new_packet,
202
(unsigned int)new_packet_capacity
204
if (*new_packet == NULL){
208
new_packet_capacity += BUFFER_SIZE;
262
plaintext_capacity = adjustbuffer(plaintext,
263
(size_t)plaintext_length,
265
if (plaintext_capacity == 0){
266
perror("adjustbuffer");
267
plaintext_length = -1;
211
ret = gpgme_data_read(dh_plain, *new_packet + new_packet_length,
271
ret = gpgme_data_read(dh_plain, *plaintext + plaintext_length,
213
273
/* Print the data, if any */
218
279
perror("gpgme_data_read");
280
plaintext_length = -1;
221
new_packet_length += ret;
283
plaintext_length += ret;
224
/* FIXME: check characters before printing to screen so to not print
225
terminal control characters */
227
/* fprintf(stderr, "decrypted password is: "); */
228
/* fwrite(*new_packet, 1, new_packet_length, stderr); */
229
/* fprintf(stderr, "\n"); */
287
fprintf(stderr, "Decrypted password is: ");
288
for(ssize_t i = 0; i < plaintext_length; i++){
289
fprintf(stderr, "%02hhX ", (*plaintext)[i]);
291
fprintf(stderr, "\n");
296
/* Delete the GPGME cryptotext data buffer */
297
gpgme_data_release(dh_crypto);
232
299
/* Delete the GPGME plaintext data buffer */
233
300
gpgme_data_release(dh_plain);
234
return new_packet_length;
301
return plaintext_length;
237
304
static const char * safer_gnutls_strerror (int value) {
238
const char *ret = gnutls_strerror (value);
305
const char *ret = gnutls_strerror (value); /* Spurious warning */
240
307
ret = "(unknown)";
244
void debuggnutls(__attribute__((unused)) int level,
246
fprintf(stderr, "%s", string);
311
/* GnuTLS log function callback */
312
static void debuggnutls(__attribute__((unused)) int level,
314
fprintf(stderr, "GnuTLS: %s", string);
249
int initgnutls(encrypted_session *es){
317
static int init_gnutls_global(mandos_context *mc,
318
const char *pubkeyfilename,
319
const char *seckeyfilename){
254
323
fprintf(stderr, "Initializing GnuTLS\n");
257
if ((ret = gnutls_global_init ())
258
!= GNUTLS_E_SUCCESS) {
259
fprintf (stderr, "global_init: %s\n", safer_gnutls_strerror(ret));
326
ret = gnutls_global_init();
327
if (ret != GNUTLS_E_SUCCESS) {
328
fprintf (stderr, "GnuTLS global_init: %s\n",
329
safer_gnutls_strerror(ret));
334
/* "Use a log level over 10 to enable all debugging options."
264
337
gnutls_global_set_log_level(11);
265
338
gnutls_global_set_log_function(debuggnutls);
268
/* openpgp credentials */
269
if ((ret = gnutls_certificate_allocate_credentials (&es->cred))
270
!= GNUTLS_E_SUCCESS) {
271
fprintf (stderr, "memory error: %s\n",
341
/* OpenPGP credentials */
342
gnutls_certificate_allocate_credentials(&mc->cred);
343
if (ret != GNUTLS_E_SUCCESS){
344
fprintf (stderr, "GnuTLS memory error: %s\n", /* Spurious
272
346
safer_gnutls_strerror(ret));
347
gnutls_global_deinit ();
277
352
fprintf(stderr, "Attempting to use OpenPGP certificate %s"
278
" and keyfile %s as GnuTLS credentials\n", CERTFILE,
353
" and keyfile %s as GnuTLS credentials\n", pubkeyfilename,
282
357
ret = gnutls_certificate_set_openpgp_key_file
283
(es->cred, CERTFILE, KEYFILE, GNUTLS_OPENPGP_FMT_BASE64);
358
(mc->cred, pubkeyfilename, seckeyfilename,
359
GNUTLS_OPENPGP_FMT_BASE64);
284
360
if (ret != GNUTLS_E_SUCCESS) {
286
(stderr, "Error[%d] while reading the OpenPGP key pair ('%s',"
288
ret, CERTFILE, KEYFILE);
289
fprintf(stdout, "The Error is: %s\n",
362
"Error[%d] while reading the OpenPGP key pair ('%s',"
363
" '%s')\n", ret, pubkeyfilename, seckeyfilename);
364
fprintf(stdout, "The GnuTLS error is: %s\n",
290
365
safer_gnutls_strerror(ret));
294
//GnuTLS server initialization
295
if ((ret = gnutls_dh_params_init (&es->dh_params))
296
!= GNUTLS_E_SUCCESS) {
297
fprintf (stderr, "Error in dh parameter initialization: %s\n",
298
safer_gnutls_strerror(ret));
302
if ((ret = gnutls_dh_params_generate2 (es->dh_params, DH_BITS))
303
!= GNUTLS_E_SUCCESS) {
304
fprintf (stderr, "Error in prime generation: %s\n",
305
safer_gnutls_strerror(ret));
309
gnutls_certificate_set_dh_params (es->cred, es->dh_params);
311
// GnuTLS session creation
312
if ((ret = gnutls_init (&es->session, GNUTLS_SERVER))
313
!= GNUTLS_E_SUCCESS){
369
/* GnuTLS server initialization */
370
ret = gnutls_dh_params_init(&mc->dh_params);
371
if (ret != GNUTLS_E_SUCCESS) {
372
fprintf (stderr, "Error in GnuTLS DH parameter initialization:"
373
" %s\n", safer_gnutls_strerror(ret));
376
ret = gnutls_dh_params_generate2(mc->dh_params, mc->dh_bits);
377
if (ret != GNUTLS_E_SUCCESS) {
378
fprintf (stderr, "Error in GnuTLS prime generation: %s\n",
379
safer_gnutls_strerror(ret));
383
gnutls_certificate_set_dh_params(mc->cred, mc->dh_params);
389
gnutls_certificate_free_credentials(mc->cred);
390
gnutls_global_deinit();
395
static int init_gnutls_session(mandos_context *mc,
396
gnutls_session_t *session){
398
/* GnuTLS session creation */
399
ret = gnutls_init(session, GNUTLS_SERVER);
400
if (ret != GNUTLS_E_SUCCESS){
314
401
fprintf(stderr, "Error in GnuTLS session initialization: %s\n",
315
402
safer_gnutls_strerror(ret));
318
if ((ret = gnutls_priority_set_direct (es->session, "NORMAL", &err))
319
!= GNUTLS_E_SUCCESS) {
320
fprintf(stderr, "Syntax error at: %s\n", err);
321
fprintf(stderr, "GnuTLS error: %s\n",
322
safer_gnutls_strerror(ret));
407
ret = gnutls_priority_set_direct(*session, mc->priority, &err);
408
if (ret != GNUTLS_E_SUCCESS) {
409
fprintf(stderr, "Syntax error at: %s\n", err);
410
fprintf(stderr, "GnuTLS error: %s\n",
411
safer_gnutls_strerror(ret));
412
gnutls_deinit (*session);
326
if ((ret = gnutls_credentials_set
327
(es->session, GNUTLS_CRD_CERTIFICATE, es->cred))
328
!= GNUTLS_E_SUCCESS) {
329
fprintf(stderr, "Error setting a credentials set: %s\n",
417
ret = gnutls_credentials_set(*session, GNUTLS_CRD_CERTIFICATE,
419
if (ret != GNUTLS_E_SUCCESS) {
420
fprintf(stderr, "Error setting GnuTLS credentials: %s\n",
330
421
safer_gnutls_strerror(ret));
422
gnutls_deinit (*session);
334
426
/* ignore client certificate if any. */
335
gnutls_certificate_server_set_request (es->session,
427
gnutls_certificate_server_set_request (*session,
336
428
GNUTLS_CERT_IGNORE);
338
gnutls_dh_set_prime_bits (es->session, DH_BITS);
430
gnutls_dh_set_prime_bits (*session, mc->dh_bits);
343
void empty_log(__attribute__((unused)) AvahiLogLevel level,
344
__attribute__((unused)) const char *txt){}
435
/* Avahi log function callback */
436
static void empty_log(__attribute__((unused)) AvahiLogLevel level,
437
__attribute__((unused)) const char *txt){}
346
int start_mandos_communication(const char *ip, uint16_t port,
347
unsigned int if_index){
439
/* Called when a Mandos server is found */
440
static int start_mandos_communication(const char *ip, uint16_t port,
441
AvahiIfIndex if_index,
349
struct sockaddr_in6 to;
350
encrypted_session es;
444
union { struct sockaddr in; struct sockaddr_in6 in6; } to;
351
445
char *buffer = NULL;
352
446
char *decrypted_buffer;
353
447
size_t buffer_length = 0;
354
448
size_t buffer_capacity = 0;
355
449
ssize_t decrypted_buffer_size;
358
452
char interface[IF_NAMESIZE];
453
gnutls_session_t session;
455
ret = init_gnutls_session (mc, &session);
361
fprintf(stderr, "Setting up a tcp connection to %s\n", ip);
461
fprintf(stderr, "Setting up a tcp connection to %s, port %" PRIu16
364
465
tcp_sd = socket(PF_INET6, SOCK_STREAM, 0);
366
467
perror("socket");
370
if(if_indextoname(if_index, interface) == NULL){
472
if(if_indextoname((unsigned int)if_index, interface) == NULL){
372
473
perror("if_indextoname");
378
476
fprintf(stderr, "Binding to interface %s\n", interface);
381
memset(&to,0,sizeof(to)); /* Spurious warning */
382
to.sin6_family = AF_INET6;
383
ret = inet_pton(AF_INET6, ip, &to.sin6_addr);
479
memset(&to, 0, sizeof(to));
480
to.in6.sin6_family = AF_INET6;
481
/* It would be nice to have a way to detect if we were passed an
482
IPv4 address here. Now we assume an IPv6 address. */
483
ret = inet_pton(AF_INET6, ip, &to.in6.sin6_addr);
385
485
perror("inet_pton");
389
489
fprintf(stderr, "Bad address: %s\n", ip);
392
to.sin6_port = htons(port); /* Spurious warning */
492
to.in6.sin6_port = htons(port); /* Spurious warning */
394
to.sin6_scope_id = (uint32_t)if_index;
494
to.in6.sin6_scope_id = (uint32_t)if_index;
397
fprintf(stderr, "Connection to: %s\n", ip);
497
fprintf(stderr, "Connection to: %s, port %" PRIu16 "\n", ip,
499
char addrstr[INET6_ADDRSTRLEN] = "";
500
if(inet_ntop(to.in6.sin6_family, &(to.in6.sin6_addr), addrstr,
501
sizeof(addrstr)) == NULL){
504
if(strcmp(addrstr, ip) != 0){
505
fprintf(stderr, "Canonical address form: %s\n", addrstr);
400
ret = connect(tcp_sd, (struct sockaddr *) &to, sizeof(to));
510
ret = connect(tcp_sd, &to.in, sizeof(to));
402
512
perror("connect");
406
ret = initgnutls (&es);
516
const char *out = mandos_protocol_version;
519
size_t out_size = strlen(out);
520
ret = TEMP_FAILURE_RETRY(write(tcp_sd, out + written,
521
out_size - written));
527
written += (size_t)ret;
528
if(written < out_size){
531
if (out == mandos_protocol_version){
412
gnutls_transport_set_ptr (es.session,
413
(gnutls_transport_ptr_t) tcp_sd);
416
541
fprintf(stderr, "Establishing TLS session with %s\n", ip);
419
ret = gnutls_handshake (es.session);
544
gnutls_transport_set_ptr (session, (gnutls_transport_ptr_t) tcp_sd);
547
ret = gnutls_handshake (session);
548
} while(ret == GNUTLS_E_AGAIN or ret == GNUTLS_E_INTERRUPTED);
421
550
if (ret != GNUTLS_E_SUCCESS){
423
fprintf(stderr, "\n*** Handshake failed ***\n");
552
fprintf(stderr, "*** GnuTLS Handshake failed ***\n");
424
553
gnutls_perror (ret);
430
//Retrieve OpenPGP packet that contains the wanted password
559
/* Read OpenPGP packet that contains the wanted password */
433
562
fprintf(stderr, "Retrieving pgp encrypted password from %s\n",
553
682
char ip[AVAHI_ADDRESS_STR_MAX];
554
683
avahi_address_snprint(ip, sizeof(ip), address);
556
fprintf(stderr, "Mandos server \"%s\" found on %s (%s) on"
557
" port %d\n", name, host_name, ip, port);
685
fprintf(stderr, "Mandos server \"%s\" found on %s (%s, %"
686
PRIu16 ") on port %d\n", name, host_name, ip,
559
int ret = start_mandos_communication(ip, port,
560
(unsigned int) interface);
689
int ret = start_mandos_communication(ip, port, interface, mc);
691
avahi_simple_poll_quit(mc->simple_poll);
566
695
avahi_s_service_resolver_free(r);
569
static void browse_callback(
570
AvahiSServiceBrowser *b,
571
AvahiIfIndex interface,
572
AvahiProtocol protocol,
573
AvahiBrowserEvent event,
577
AVAHI_GCC_UNUSED AvahiLookupResultFlags flags,
580
AvahiServer *s = userdata;
581
assert(b); /* Spurious warning */
583
/* Called whenever a new services becomes available on the LAN or
584
is removed from the LAN */
588
case AVAHI_BROWSER_FAILURE:
590
fprintf(stderr, "(Browser) %s\n",
591
avahi_strerror(avahi_server_errno(server)));
592
avahi_simple_poll_quit(simple_poll);
595
case AVAHI_BROWSER_NEW:
596
/* We ignore the returned resolver object. In the callback
597
function we free it. If the server is terminated before
598
the callback function is called the server will free
599
the resolver for us. */
601
if (!(avahi_s_service_resolver_new(s, interface, protocol, name,
603
AVAHI_PROTO_INET6, 0,
604
resolve_callback, s)))
605
fprintf(stderr, "Failed to resolve service '%s': %s\n", name,
606
avahi_strerror(avahi_server_errno(s)));
609
case AVAHI_BROWSER_REMOVE:
612
case AVAHI_BROWSER_ALL_FOR_NOW:
613
case AVAHI_BROWSER_CACHE_EXHAUSTED:
698
static void browse_callback( AvahiSServiceBrowser *b,
699
AvahiIfIndex interface,
700
AvahiProtocol protocol,
701
AvahiBrowserEvent event,
705
AVAHI_GCC_UNUSED AvahiLookupResultFlags
708
mandos_context *mc = userdata;
711
/* Called whenever a new services becomes available on the LAN or
712
is removed from the LAN */
716
case AVAHI_BROWSER_FAILURE:
718
fprintf(stderr, "(Avahi browser) %s\n",
719
avahi_strerror(avahi_server_errno(mc->server)));
720
avahi_simple_poll_quit(mc->simple_poll);
723
case AVAHI_BROWSER_NEW:
724
/* We ignore the returned Avahi resolver object. In the callback
725
function we free it. If the Avahi server is terminated before
726
the callback function is called the Avahi server will free the
729
if (!(avahi_s_service_resolver_new(mc->server, interface,
730
protocol, name, type, domain,
731
AVAHI_PROTO_INET6, 0,
732
resolve_callback, mc)))
733
fprintf(stderr, "Avahi: Failed to resolve service '%s': %s\n",
734
name, avahi_strerror(avahi_server_errno(mc->server)));
737
case AVAHI_BROWSER_REMOVE:
740
case AVAHI_BROWSER_ALL_FOR_NOW:
741
case AVAHI_BROWSER_CACHE_EXHAUSTED:
743
fprintf(stderr, "No Mandos server found, still searching...\n");
618
int main(AVAHI_GCC_UNUSED int argc, AVAHI_GCC_UNUSED char*argv[]) {
619
AvahiServerConfig config;
749
/* Combines file name and path and returns the malloced new
750
string. some sane checks could/should be added */
751
static char *combinepath(const char *first, const char *second){
753
int ret = asprintf(&tmp, "%s/%s", first, second);
761
int main(int argc, char *argv[]){
620
762
AvahiSServiceBrowser *sb = NULL;
623
int returncode = EXIT_SUCCESS;
765
int exitcode = EXIT_SUCCESS;
624
766
const char *interface = "eth0";
627
static struct option long_options[] = {
628
{"debug", no_argument, (int *)&debug, 1},
629
{"interface", required_argument, 0, 'i'},
632
int option_index = 0;
633
ret = getopt_long (argc, argv, "i:", long_options,
767
struct ifreq network;
771
char *connect_to = NULL;
772
AvahiIfIndex if_index = AVAHI_IF_UNSPEC;
773
char *pubkeyfilename = NULL;
774
char *seckeyfilename = NULL;
775
const char *pubkeyname = "pubkey.txt";
776
const char *seckeyname = "seckey.txt";
777
mandos_context mc = { .simple_poll = NULL, .server = NULL,
778
.dh_bits = 1024, .priority = "SECURE256"};
779
bool gnutls_initalized = false;
782
struct argp_option options[] = {
783
{ .name = "debug", .key = 128,
784
.doc = "Debug mode", .group = 3 },
785
{ .name = "connect", .key = 'c',
787
.doc = "Connect directly to a sepcified mandos server",
789
{ .name = "interface", .key = 'i',
791
.doc = "Interface that Avahi will conntect through",
793
{ .name = "keydir", .key = 'd',
795
.doc = "Directory where the openpgp keyring is",
797
{ .name = "seckey", .key = 's',
799
.doc = "Secret openpgp key for gnutls authentication",
801
{ .name = "pubkey", .key = 'p',
803
.doc = "Public openpgp key for gnutls authentication",
805
{ .name = "dh-bits", .key = 129,
807
.doc = "dh-bits to use in gnutls communication",
809
{ .name = "priority", .key = 130,
811
.doc = "GNUTLS priority", .group = 1 },
816
error_t parse_opt (int key, char *arg,
817
struct argp_state *state) {
818
/* Get the INPUT argument from `argp_parse', which we know is
819
a pointer to our plugin list pointer. */
841
mc.dh_bits = (unsigned int) strtol(arg, NULL, 10);
855
return ARGP_ERR_UNKNOWN;
860
struct argp argp = { .options = options, .parser = parse_opt,
862
.doc = "Mandos client -- Get and decrypt"
863
" passwords from mandos server" };
864
ret = argp_parse (&argp, argc, argv, 0, 0, NULL);
865
if (ret == ARGP_ERR_UNKNOWN){
866
fprintf(stderr, "Unknown error while parsing arguments\n");
867
exitcode = EXIT_FAILURE;
872
pubkeyfilename = combinepath(keydir, pubkeyname);
873
if (pubkeyfilename == NULL){
874
perror("combinepath");
875
exitcode = EXIT_FAILURE;
879
seckeyfilename = combinepath(keydir, seckeyname);
880
if (seckeyfilename == NULL){
881
perror("combinepath");
882
exitcode = EXIT_FAILURE;
886
ret = init_gnutls_global(&mc, pubkeyfilename, seckeyfilename);
888
fprintf(stderr, "init_gnutls_global failed\n");
889
exitcode = EXIT_FAILURE;
892
gnutls_initalized = true;
895
/* If the interface is down, bring it up */
897
sd = socket(PF_INET6, SOCK_DGRAM, IPPROTO_IP);
900
exitcode = EXIT_FAILURE;
903
strcpy(network.ifr_name, interface);
904
ret = ioctl(sd, SIOCGIFFLAGS, &network);
906
perror("ioctl SIOCGIFFLAGS");
907
exitcode = EXIT_FAILURE;
910
if((network.ifr_flags & IFF_UP) == 0){
911
network.ifr_flags |= IFF_UP;
912
ret = ioctl(sd, SIOCSIFFLAGS, &network);
914
perror("ioctl SIOCSIFFLAGS");
915
exitcode = EXIT_FAILURE;
935
if_index = (AvahiIfIndex) if_nametoindex(interface);
937
fprintf(stderr, "No such interface: \"%s\"\n", interface);
941
if(connect_to != NULL){
942
/* Connect directly, do not use Zeroconf */
943
/* (Mainly meant for debugging) */
944
char *address = strrchr(connect_to, ':');
946
fprintf(stderr, "No colon in address\n");
947
exitcode = EXIT_FAILURE;
951
uint16_t port = (uint16_t) strtol(address+1, NULL, 10);
953
perror("Bad port number");
954
exitcode = EXIT_FAILURE;
958
address = connect_to;
959
ret = start_mandos_communication(address, port, if_index, &mc);
961
exitcode = EXIT_FAILURE;
963
exitcode = EXIT_SUCCESS;
652
969
avahi_set_log_function(empty_log);
655
/* Initialize the psuedo-RNG */
972
/* Initialize the pseudo-RNG for Avahi */
656
973
srand((unsigned int) time(NULL));
658
/* Allocate main loop object */
659
if (!(simple_poll = avahi_simple_poll_new())) {
660
fprintf(stderr, "Failed to create simple poll object.\n");
665
/* Do not publish any local records */
666
avahi_server_config_init(&config);
667
config.publish_hinfo = 0;
668
config.publish_addresses = 0;
669
config.publish_workstation = 0;
670
config.publish_domain = 0;
672
/* Allocate a new server */
673
server = avahi_server_new(avahi_simple_poll_get(simple_poll),
674
&config, NULL, NULL, &error);
676
/* Free the configuration data */
677
avahi_server_config_free(&config);
679
/* Check if creating the server object succeeded */
681
fprintf(stderr, "Failed to create server: %s\n",
975
/* Allocate main Avahi loop object */
976
mc.simple_poll = avahi_simple_poll_new();
977
if (mc.simple_poll == NULL) {
978
fprintf(stderr, "Avahi: Failed to create simple poll"
980
exitcode = EXIT_FAILURE;
985
AvahiServerConfig config;
986
/* Do not publish any local Zeroconf records */
987
avahi_server_config_init(&config);
988
config.publish_hinfo = 0;
989
config.publish_addresses = 0;
990
config.publish_workstation = 0;
991
config.publish_domain = 0;
993
/* Allocate a new server */
994
mc.server = avahi_server_new(avahi_simple_poll_get
995
(mc.simple_poll), &config, NULL,
998
/* Free the Avahi configuration data */
999
avahi_server_config_free(&config);
1002
/* Check if creating the Avahi server object succeeded */
1003
if (mc.server == NULL) {
1004
fprintf(stderr, "Failed to create Avahi server: %s\n",
682
1005
avahi_strerror(error));
683
returncode = EXIT_FAILURE;
1006
exitcode = EXIT_FAILURE;
687
/* Create the service browser */
688
sb = avahi_s_service_browser_new(server,
690
if_nametoindex(interface),
1010
/* Create the Avahi service browser */
1011
sb = avahi_s_service_browser_new(mc.server, if_index,
691
1012
AVAHI_PROTO_INET6,
692
1013
"_mandos._tcp", NULL, 0,
693
browse_callback, server);
1014
browse_callback, &mc);
695
1016
fprintf(stderr, "Failed to create service browser: %s\n",
696
avahi_strerror(avahi_server_errno(server)));
697
returncode = EXIT_FAILURE;
1017
avahi_strerror(avahi_server_errno(mc.server)));
1018
exitcode = EXIT_FAILURE;
701
1022
/* Run the main loop */
704
fprintf(stderr, "Starting avahi loop search\n");
1025
fprintf(stderr, "Starting Avahi loop search\n");
707
avahi_simple_poll_loop(simple_poll);
1028
avahi_simple_poll_loop(mc.simple_poll);
712
1033
fprintf(stderr, "%s exiting\n", argv[0]);
715
1036
/* Cleanup things */
717
1038
avahi_s_service_browser_free(sb);
720
avahi_server_free(server);
723
avahi_simple_poll_free(simple_poll);
1040
if (mc.server != NULL)
1041
avahi_server_free(mc.server);
1043
if (mc.simple_poll != NULL)
1044
avahi_simple_poll_free(mc.simple_poll);
1045
free(pubkeyfilename);
1046
free(seckeyfilename);
1048
if (gnutls_initalized){
1049
gnutls_certificate_free_credentials(mc.cred);
1050
gnutls_global_deinit ();