59
62
#include <string.h> /* memset */
60
63
#include <arpa/inet.h> /* inet_pton() */
61
64
#include <iso646.h> /* not */
65
#include <net/if.h> /* IF_NAMESIZE */
64
68
#include <errno.h> /* perror() */
68
72
#include <getopt.h>
71
#define CERT_ROOT "/conf/conf.d/cryptkeyreq/"
73
#define CERTFILE CERT_ROOT "openpgp-client.txt"
74
#define KEYFILE CERT_ROOT "openpgp-client-key.txt"
75
74
#define BUFFER_SIZE 256
76
static const char *keydir = "/conf/conf.d/mandos";
77
static const char *pubkeyfile = "pubkey.txt";
78
static const char *seckeyfile = "seckey.txt";
78
80
bool debug = false;
82
/* Used for passing in values through all the callback functions */
81
gnutls_session_t session;
84
AvahiSimplePoll *simple_poll;
82
86
gnutls_certificate_credentials_t cred;
83
gnutls_dh_params_t dh_params;
87
ssize_t pgp_packet_decrypt (char *packet, size_t packet_size,
88
char **new_packet, const char *homedir){
92
* Decrypt OpenPGP data using keyrings in HOMEDIR.
95
static ssize_t pgp_packet_decrypt (const char *cryptotext,
89
99
gpgme_data_t dh_crypto, dh_plain;
93
ssize_t new_packet_capacity = 0;
94
ssize_t new_packet_length = 0;
103
size_t plaintext_capacity = 0;
104
ssize_t plaintext_length = 0;
95
105
gpgme_engine_info_t engine_info;
98
fprintf(stderr, "Trying to decrypt OpenPGP packet\n");
108
fprintf(stderr, "Trying to decrypt OpenPGP data\n");
102
112
gpgme_check_version(NULL);
103
gpgme_engine_check_version(GPGME_PROTOCOL_OpenPGP);
113
rc = gpgme_engine_check_version(GPGME_PROTOCOL_OpenPGP);
114
if (rc != GPG_ERR_NO_ERROR){
115
fprintf(stderr, "bad gpgme_engine_check_version: %s: %s\n",
116
gpgme_strsource(rc), gpgme_strerror(rc));
105
/* Set GPGME home directory */
120
/* Set GPGME home directory for the OpenPGP engine only */
106
121
rc = gpgme_get_engine_info (&engine_info);
107
122
if (rc != GPG_ERR_NO_ERROR){
108
123
fprintf(stderr, "bad gpgme_get_engine_info: %s: %s\n",
191
/* Delete the GPGME FILE pointer cryptotext data buffer */
192
gpgme_data_release(dh_crypto);
194
210
/* Seek back to the beginning of the GPGME plaintext data buffer */
195
gpgme_data_seek(dh_plain, (off_t) 0, SEEK_SET);
211
if (gpgme_data_seek(dh_plain, (off_t) 0, SEEK_SET) == -1){
212
perror("pgpme_data_seek");
213
plaintext_length = -1;
199
if (new_packet_length + BUFFER_SIZE > new_packet_capacity){
200
*new_packet = realloc(*new_packet,
201
(unsigned int)new_packet_capacity
219
if (plaintext_length + BUFFER_SIZE
220
> (ssize_t) plaintext_capacity){
221
*plaintext = realloc(*plaintext, plaintext_capacity
203
if (*new_packet == NULL){
223
if (*plaintext == NULL){
204
224
perror("realloc");
225
plaintext_length = -1;
207
new_packet_capacity += BUFFER_SIZE;
228
plaintext_capacity += BUFFER_SIZE;
210
ret = gpgme_data_read(dh_plain, *new_packet + new_packet_length,
231
ret = gpgme_data_read(dh_plain, *plaintext + plaintext_length,
212
233
/* Print the data, if any */
217
239
perror("gpgme_data_read");
240
plaintext_length = -1;
220
new_packet_length += ret;
243
plaintext_length += ret;
223
/* FIXME: check characters before printing to screen so to not print
224
terminal control characters */
226
/* fprintf(stderr, "decrypted password is: "); */
227
/* fwrite(*new_packet, 1, new_packet_length, stderr); */
228
/* fprintf(stderr, "\n"); */
247
fprintf(stderr, "Decrypted password is: ");
248
for(ssize_t i = 0; i < plaintext_length; i++){
249
fprintf(stderr, "%02hhX ", (*plaintext)[i]);
251
fprintf(stderr, "\n");
256
/* Delete the GPGME cryptotext data buffer */
257
gpgme_data_release(dh_crypto);
231
259
/* Delete the GPGME plaintext data buffer */
232
260
gpgme_data_release(dh_plain);
233
return new_packet_length;
261
return plaintext_length;
236
264
static const char * safer_gnutls_strerror (int value) {
243
void debuggnutls(__attribute__((unused)) int level,
245
fprintf(stderr, "%s", string);
271
/* GnuTLS log function callback */
272
static void debuggnutls(__attribute__((unused)) int level,
274
fprintf(stderr, "GnuTLS: %s", string);
248
int initgnutls(encrypted_session *es){
277
static int initgnutls(mandos_context *mc, gnutls_session_t *session,
278
gnutls_dh_params_t *dh_params){
253
282
fprintf(stderr, "Initializing GnuTLS\n");
256
285
if ((ret = gnutls_global_init ())
257
286
!= GNUTLS_E_SUCCESS) {
258
fprintf (stderr, "global_init: %s\n", safer_gnutls_strerror(ret));
287
fprintf (stderr, "GnuTLS global_init: %s\n",
288
safer_gnutls_strerror(ret));
293
/* "Use a log level over 10 to enable all debugging options."
263
296
gnutls_global_set_log_level(11);
264
297
gnutls_global_set_log_function(debuggnutls);
267
/* openpgp credentials */
268
if ((ret = gnutls_certificate_allocate_credentials (&es->cred))
300
/* OpenPGP credentials */
301
if ((ret = gnutls_certificate_allocate_credentials (&mc->cred))
269
302
!= GNUTLS_E_SUCCESS) {
270
fprintf (stderr, "memory error: %s\n",
303
fprintf (stderr, "GnuTLS memory error: %s\n",
271
304
safer_gnutls_strerror(ret));
276
309
fprintf(stderr, "Attempting to use OpenPGP certificate %s"
277
" and keyfile %s as GnuTLS credentials\n", CERTFILE,
310
" and keyfile %s as GnuTLS credentials\n", pubkeyfile,
281
314
ret = gnutls_certificate_set_openpgp_key_file
282
(es->cred, CERTFILE, KEYFILE, GNUTLS_OPENPGP_FMT_BASE64);
315
(mc->cred, pubkeyfile, seckeyfile, GNUTLS_OPENPGP_FMT_BASE64);
283
316
if (ret != GNUTLS_E_SUCCESS) {
285
(stderr, "Error[%d] while reading the OpenPGP key pair ('%s',"
287
ret, CERTFILE, KEYFILE);
288
fprintf(stdout, "The Error is: %s\n",
318
"Error[%d] while reading the OpenPGP key pair ('%s',"
319
" '%s')\n", ret, pubkeyfile, seckeyfile);
320
fprintf(stdout, "The GnuTLS error is: %s\n",
289
321
safer_gnutls_strerror(ret));
293
//GnuTLS server initialization
294
if ((ret = gnutls_dh_params_init (&es->dh_params))
295
!= GNUTLS_E_SUCCESS) {
296
fprintf (stderr, "Error in dh parameter initialization: %s\n",
297
safer_gnutls_strerror(ret));
301
if ((ret = gnutls_dh_params_generate2 (es->dh_params, DH_BITS))
302
!= GNUTLS_E_SUCCESS) {
303
fprintf (stderr, "Error in prime generation: %s\n",
304
safer_gnutls_strerror(ret));
308
gnutls_certificate_set_dh_params (es->cred, es->dh_params);
310
// GnuTLS session creation
311
if ((ret = gnutls_init (&es->session, GNUTLS_SERVER))
312
!= GNUTLS_E_SUCCESS){
325
/* GnuTLS server initialization */
326
ret = gnutls_dh_params_init(dh_params);
327
if (ret != GNUTLS_E_SUCCESS) {
328
fprintf (stderr, "Error in GnuTLS DH parameter initialization:"
329
" %s\n", safer_gnutls_strerror(ret));
332
ret = gnutls_dh_params_generate2(*dh_params, mc->dh_bits);
333
if (ret != GNUTLS_E_SUCCESS) {
334
fprintf (stderr, "Error in GnuTLS prime generation: %s\n",
335
safer_gnutls_strerror(ret));
339
gnutls_certificate_set_dh_params(mc->cred, *dh_params);
341
/* GnuTLS session creation */
342
ret = gnutls_init(session, GNUTLS_SERVER);
343
if (ret != GNUTLS_E_SUCCESS){
313
344
fprintf(stderr, "Error in GnuTLS session initialization: %s\n",
314
345
safer_gnutls_strerror(ret));
317
if ((ret = gnutls_priority_set_direct (es->session, "NORMAL", &err))
318
!= GNUTLS_E_SUCCESS) {
319
fprintf(stderr, "Syntax error at: %s\n", err);
320
fprintf(stderr, "GnuTLS error: %s\n",
321
safer_gnutls_strerror(ret));
350
ret = gnutls_priority_set_direct(*session, mc->priority, &err);
351
if (ret != GNUTLS_E_SUCCESS) {
352
fprintf(stderr, "Syntax error at: %s\n", err);
353
fprintf(stderr, "GnuTLS error: %s\n",
354
safer_gnutls_strerror(ret));
325
if ((ret = gnutls_credentials_set
326
(es->session, GNUTLS_CRD_CERTIFICATE, es->cred))
327
!= GNUTLS_E_SUCCESS) {
328
fprintf(stderr, "Error setting a credentials set: %s\n",
359
ret = gnutls_credentials_set(*session, GNUTLS_CRD_CERTIFICATE,
361
if (ret != GNUTLS_E_SUCCESS) {
362
fprintf(stderr, "Error setting GnuTLS credentials: %s\n",
329
363
safer_gnutls_strerror(ret));
333
367
/* ignore client certificate if any. */
334
gnutls_certificate_server_set_request (es->session,
368
gnutls_certificate_server_set_request (*session,
335
369
GNUTLS_CERT_IGNORE);
337
gnutls_dh_set_prime_bits (es->session, DH_BITS);
371
gnutls_dh_set_prime_bits (*session, mc->dh_bits);
342
void empty_log(__attribute__((unused)) AvahiLogLevel level,
343
__attribute__((unused)) const char *txt){}
376
/* Avahi log function callback */
377
static void empty_log(__attribute__((unused)) AvahiLogLevel level,
378
__attribute__((unused)) const char *txt){}
345
int start_mandos_communication(const char *ip, uint16_t port,
346
AvahiIfIndex if_index){
380
/* Called when a Mandos server is found */
381
static int start_mandos_communication(const char *ip, uint16_t port,
382
AvahiIfIndex if_index,
348
385
struct sockaddr_in6 to;
349
encrypted_session es;
350
386
char *buffer = NULL;
351
387
char *decrypted_buffer;
352
388
size_t buffer_length = 0;
515
fprintf(stderr, "Closing TLS session\n");
555
/* Shutdown procedure */
519
gnutls_bye (es.session, GNUTLS_SHUT_RDWR);
522
gnutls_deinit (es.session);
523
gnutls_certificate_free_credentials (es.cred);
560
gnutls_deinit (session);
561
gnutls_certificate_free_credentials (mc->cred);
524
562
gnutls_global_deinit ();
528
static AvahiSimplePoll *simple_poll = NULL;
529
static AvahiServer *server = NULL;
531
static void resolve_callback(
532
AvahiSServiceResolver *r,
533
AvahiIfIndex interface,
534
AVAHI_GCC_UNUSED AvahiProtocol protocol,
535
AvahiResolverEvent event,
539
const char *host_name,
540
const AvahiAddress *address,
542
AVAHI_GCC_UNUSED AvahiStringList *txt,
543
AVAHI_GCC_UNUSED AvahiLookupResultFlags flags,
544
AVAHI_GCC_UNUSED void* userdata) {
566
static void resolve_callback(AvahiSServiceResolver *r,
567
AvahiIfIndex interface,
568
AVAHI_GCC_UNUSED AvahiProtocol protocol,
569
AvahiResolverEvent event,
573
const char *host_name,
574
const AvahiAddress *address,
576
AVAHI_GCC_UNUSED AvahiStringList *txt,
577
AVAHI_GCC_UNUSED AvahiLookupResultFlags
580
mandos_context *mc = userdata;
546
581
assert(r); /* Spurious warning */
548
583
/* Called whenever a service has been resolved successfully or
573
608
avahi_s_service_resolver_free(r);
576
static void browse_callback(
577
AvahiSServiceBrowser *b,
578
AvahiIfIndex interface,
579
AvahiProtocol protocol,
580
AvahiBrowserEvent event,
584
AVAHI_GCC_UNUSED AvahiLookupResultFlags flags,
587
AvahiServer *s = userdata;
588
assert(b); /* Spurious warning */
590
/* Called whenever a new services becomes available on the LAN or
591
is removed from the LAN */
595
case AVAHI_BROWSER_FAILURE:
597
fprintf(stderr, "(Browser) %s\n",
598
avahi_strerror(avahi_server_errno(server)));
599
avahi_simple_poll_quit(simple_poll);
602
case AVAHI_BROWSER_NEW:
603
/* We ignore the returned resolver object. In the callback
604
function we free it. If the server is terminated before
605
the callback function is called the server will free
606
the resolver for us. */
608
if (!(avahi_s_service_resolver_new(s, interface, protocol, name,
610
AVAHI_PROTO_INET6, 0,
611
resolve_callback, s)))
612
fprintf(stderr, "Failed to resolve service '%s': %s\n", name,
613
avahi_strerror(avahi_server_errno(s)));
616
case AVAHI_BROWSER_REMOVE:
619
case AVAHI_BROWSER_ALL_FOR_NOW:
620
case AVAHI_BROWSER_CACHE_EXHAUSTED:
611
static void browse_callback( AvahiSServiceBrowser *b,
612
AvahiIfIndex interface,
613
AvahiProtocol protocol,
614
AvahiBrowserEvent event,
618
AVAHI_GCC_UNUSED AvahiLookupResultFlags
621
mandos_context *mc = userdata;
622
assert(b); /* Spurious warning */
624
/* Called whenever a new services becomes available on the LAN or
625
is removed from the LAN */
629
case AVAHI_BROWSER_FAILURE:
631
fprintf(stderr, "(Avahi browser) %s\n",
632
avahi_strerror(avahi_server_errno(mc->server)));
633
avahi_simple_poll_quit(mc->simple_poll);
636
case AVAHI_BROWSER_NEW:
637
/* We ignore the returned Avahi resolver object. In the callback
638
function we free it. If the Avahi server is terminated before
639
the callback function is called the Avahi server will free the
642
if (!(avahi_s_service_resolver_new(mc->server, interface,
643
protocol, name, type, domain,
644
AVAHI_PROTO_INET6, 0,
645
resolve_callback, mc)))
646
fprintf(stderr, "Avahi: Failed to resolve service '%s': %s\n",
647
name, avahi_strerror(avahi_server_errno(mc->server)));
650
case AVAHI_BROWSER_REMOVE:
653
case AVAHI_BROWSER_ALL_FOR_NOW:
654
case AVAHI_BROWSER_CACHE_EXHAUSTED:
656
fprintf(stderr, "No Mandos server found, still searching...\n");
625
int main(AVAHI_GCC_UNUSED int argc, AVAHI_GCC_UNUSED char*argv[]) {
626
AvahiServerConfig config;
662
/* Combines file name and path and returns the malloced new
663
string. some sane checks could/should be added */
664
static const char *combinepath(const char *first, const char *second){
665
size_t f_len = strlen(first);
666
size_t s_len = strlen(second);
667
char *tmp = malloc(f_len + s_len + 2);
672
memcpy(tmp, first, f_len); /* Spurious warning */
676
memcpy(tmp + f_len + 1, second, s_len); /* Spurious warning */
678
tmp[f_len + 1 + s_len] = '\0';
683
int main(int argc, char *argv[]){
627
684
AvahiSServiceBrowser *sb = NULL;
630
int returncode = EXIT_SUCCESS;
631
const char *interface = NULL;
687
int exitcode = EXIT_SUCCESS;
688
const char *interface = "eth0";
689
struct ifreq network;
691
char *connect_to = NULL;
632
692
AvahiIfIndex if_index = AVAHI_IF_UNSPEC;
633
char *connect_to = NULL;
636
static struct option long_options[] = {
637
{"debug", no_argument, (int *)&debug, 1},
638
{"connect", required_argument, 0, 'c'},
639
{"interface", required_argument, 0, 'i'},
642
int option_index = 0;
643
ret = getopt_long (argc, argv, "i:", long_options,
664
if(interface != NULL){
665
if_index = (AvahiIfIndex) if_nametoindex(interface);
667
fprintf(stderr, "No such interface: \"%s\"\n", interface);
693
mandos_context mc = { .simple_poll = NULL, .server = NULL,
694
.dh_bits = 1024, .priority = "SECURE256"};
697
/* Temporary int to get the address of for getopt_long */
698
int debug_int = debug ? 1 : 0;
700
struct option long_options[] = {
701
{"debug", no_argument, &debug_int, 1},
702
{"connect", required_argument, NULL, 'c'},
703
{"interface", required_argument, NULL, 'i'},
704
{"keydir", required_argument, NULL, 'd'},
705
{"seckey", required_argument, NULL, 's'},
706
{"pubkey", required_argument, NULL, 'p'},
707
{"dh-bits", required_argument, NULL, 'D'},
708
{"priority", required_argument, NULL, 'P'},
711
int option_index = 0;
712
ret = getopt_long (argc, argv, "i:", long_options,
739
mc.dh_bits = (unsigned int) strtol(optarg, NULL, 10);
746
mc.priority = optarg;
750
/* getopt_long() has already printed a message about the
751
unrcognized option, so just exit. */
755
/* Set the global debug flag from the temporary int */
756
debug = debug_int ? true : false;
759
pubkeyfile = combinepath(keydir, pubkeyfile);
760
if (pubkeyfile == NULL){
761
perror("combinepath");
762
exitcode = EXIT_FAILURE;
766
seckeyfile = combinepath(keydir, seckeyfile);
767
if (seckeyfile == NULL){
768
perror("combinepath");
772
if_index = (AvahiIfIndex) if_nametoindex(interface);
774
fprintf(stderr, "No such interface: \"%s\"\n", interface);
672
778
if(connect_to != NULL){
802
/* If the interface is down, bring it up */
804
sd = socket(PF_INET6, SOCK_DGRAM, IPPROTO_IP);
807
exitcode = EXIT_FAILURE;
810
strcpy(network.ifr_name, interface); /* Spurious warning */
811
ret = ioctl(sd, SIOCGIFFLAGS, &network);
813
perror("ioctl SIOCGIFFLAGS");
814
exitcode = EXIT_FAILURE;
817
if((network.ifr_flags & IFF_UP) == 0){
818
network.ifr_flags |= IFF_UP;
819
ret = ioctl(sd, SIOCSIFFLAGS, &network);
821
perror("ioctl SIOCSIFFLAGS");
822
exitcode = EXIT_FAILURE;
697
830
avahi_set_log_function(empty_log);
700
/* Initialize the psuedo-RNG */
833
/* Initialize the pseudo-RNG for Avahi */
701
834
srand((unsigned int) time(NULL));
703
/* Allocate main loop object */
704
if (!(simple_poll = avahi_simple_poll_new())) {
705
fprintf(stderr, "Failed to create simple poll object.\n");
710
/* Do not publish any local records */
711
avahi_server_config_init(&config);
712
config.publish_hinfo = 0;
713
config.publish_addresses = 0;
714
config.publish_workstation = 0;
715
config.publish_domain = 0;
717
/* Allocate a new server */
718
server = avahi_server_new(avahi_simple_poll_get(simple_poll),
719
&config, NULL, NULL, &error);
721
/* Free the configuration data */
722
avahi_server_config_free(&config);
724
/* Check if creating the server object succeeded */
726
fprintf(stderr, "Failed to create server: %s\n",
836
/* Allocate main Avahi loop object */
837
mc.simple_poll = avahi_simple_poll_new();
838
if (mc.simple_poll == NULL) {
839
fprintf(stderr, "Avahi: Failed to create simple poll"
841
exitcode = EXIT_FAILURE;
846
AvahiServerConfig config;
847
/* Do not publish any local Zeroconf records */
848
avahi_server_config_init(&config);
849
config.publish_hinfo = 0;
850
config.publish_addresses = 0;
851
config.publish_workstation = 0;
852
config.publish_domain = 0;
854
/* Allocate a new server */
855
mc.server = avahi_server_new(avahi_simple_poll_get
856
(mc.simple_poll), &config, NULL,
859
/* Free the Avahi configuration data */
860
avahi_server_config_free(&config);
863
/* Check if creating the Avahi server object succeeded */
864
if (mc.server == NULL) {
865
fprintf(stderr, "Failed to create Avahi server: %s\n",
727
866
avahi_strerror(error));
728
returncode = EXIT_FAILURE;
867
exitcode = EXIT_FAILURE;
732
/* Create the service browser */
733
sb = avahi_s_service_browser_new(server, if_index,
871
/* Create the Avahi service browser */
872
sb = avahi_s_service_browser_new(mc.server, if_index,
734
873
AVAHI_PROTO_INET6,
735
874
"_mandos._tcp", NULL, 0,
736
browse_callback, server);
875
browse_callback, &mc);
738
877
fprintf(stderr, "Failed to create service browser: %s\n",
739
avahi_strerror(avahi_server_errno(server)));
740
returncode = EXIT_FAILURE;
878
avahi_strerror(avahi_server_errno(mc.server)));
879
exitcode = EXIT_FAILURE;
744
883
/* Run the main loop */
747
fprintf(stderr, "Starting avahi loop search\n");
886
fprintf(stderr, "Starting Avahi loop search\n");
750
avahi_simple_poll_loop(simple_poll);
889
avahi_simple_poll_loop(mc.simple_poll);
755
894
fprintf(stderr, "%s exiting\n", argv[0]);
758
897
/* Cleanup things */
760
899
avahi_s_service_browser_free(sb);
763
avahi_server_free(server);
766
avahi_simple_poll_free(simple_poll);
901
if (mc.server != NULL)
902
avahi_server_free(mc.server);
904
if (mc.simple_poll != NULL)
905
avahi_simple_poll_free(mc.simple_poll);