9
9
* "browse_callback", and parts of "main".
11
11
* Everything else is
12
* Copyright © 2008-2012 Teddy Hogeborn
13
* Copyright © 2008-2012 Björn Påhlsson
12
* Copyright © 2008-2011 Teddy Hogeborn
13
* Copyright © 2008-2011 Björn Påhlsson
15
15
* This program is free software: you can redistribute it and/or
16
16
* modify it under the terms of the GNU General Public License as
42
42
#include <stdio.h> /* fprintf(), stderr, fwrite(),
43
43
stdout, ferror(), remove() */
44
#include <stdint.h> /* uint16_t, uint32_t, intptr_t */
44
#include <stdint.h> /* uint16_t, uint32_t */
45
45
#include <stddef.h> /* NULL, size_t, ssize_t */
46
46
#include <stdlib.h> /* free(), EXIT_SUCCESS, srand(),
47
47
strtof(), abort() */
173
171
/* Function to use when printing errors */
174
172
void perror_plus(const char *print_text){
176
173
fprintf(stderr, "Mandos plugin %s: ",
177
174
program_invocation_short_name);
179
175
perror(print_text);
182
__attribute__((format (gnu_printf, 2, 3)))
183
178
int fprintf_plus(FILE *stream, const char *format, ...){
185
180
va_start (ap, format);
826
/* This casting via intptr_t is to eliminate warning about casting
827
an int to a pointer type. This is exactly how the GnuTLS Guile
828
function "set-session-transport-fd!" does it. */
829
gnutls_transport_set_ptr(session,
830
(gnutls_transport_ptr_t)(intptr_t)tcp_sd);
821
/* Spurious warning from -Wint-to-pointer-cast */
822
gnutls_transport_set_ptr(session, (gnutls_transport_ptr_t) tcp_sd);
1395
/* Set effective uid to 0, return errno */
1396
int raise_privileges(void){
1397
int old_errno = errno;
1400
if(seteuid(0) == -1){
1401
perror_plus("seteuid");
1408
/* Set effective and real user ID to 0. Return errno. */
1409
int raise_privileges_permanently(void){
1410
int old_errno = errno;
1411
int ret_errno = raise_privileges();
1417
if(setuid(0) == -1){
1418
perror_plus("seteuid");
1425
/* Set effective user ID to unprivileged saved user ID */
1426
int lower_privileges(void){
1427
int old_errno = errno;
1430
if(seteuid(uid) == -1){
1431
perror_plus("seteuid");
1438
1387
bool run_network_hooks(const char *mode, const char *interface,
1439
1388
const float delay){
1440
1389
struct dirent **direntries;
1511
1470
_exit(EX_OSERR);
1513
1472
free(delaystring);
1514
if(connect_to != NULL){
1515
ret = setenv("CONNECT", connect_to, 1);
1517
perror_plus("setenv");
1521
if(execl(fullname, direntry->d_name, mode, NULL) == -1){
1522
perror_plus("execl");
1523
_exit(EXIT_FAILURE);
1473
ret = execl(fullname, direntry->d_name, mode, NULL);
1474
perror_plus("execl");
1527
1477
if(TEMP_FAILURE_RETRY(waitpid(hook_pid, &status, 0)) == -1){
1564
int bring_up_interface(const char * const interface, const float delay){
1567
struct ifreq network;
1568
AvahiIfIndex if_index = (AvahiIfIndex)if_nametoindex(interface);
1570
fprintf_plus(stderr, "No such interface: \"%s\"\n", interface);
1571
return EX_UNAVAILABLE;
1578
/* Re-raise priviliges */
1582
/* Lower kernel loglevel to KERN_NOTICE to avoid KERN_INFO
1583
messages about the network interface to mess up the prompt */
1584
ret = klogctl(8, NULL, 5);
1585
bool restore_loglevel = true;
1587
restore_loglevel = false;
1588
perror_plus("klogctl");
1590
#endif /* __linux__ */
1592
sd = socket(PF_INET6, SOCK_DGRAM, IPPROTO_IP);
1594
perror_plus("socket");
1596
if(restore_loglevel){
1597
ret = klogctl(7, NULL, 0);
1599
perror_plus("klogctl");
1602
#endif /* __linux__ */
1603
/* Lower privileges */
1608
strcpy(network.ifr_name, interface);
1609
ret = ioctl(sd, SIOCGIFFLAGS, &network);
1611
perror_plus("ioctl SIOCGIFFLAGS");
1613
if(restore_loglevel){
1614
ret = klogctl(7, NULL, 0);
1616
perror_plus("klogctl");
1619
#endif /* __linux__ */
1620
/* Lower privileges */
1624
if((network.ifr_flags & IFF_UP) == 0){
1625
network.ifr_flags |= IFF_UP;
1626
ret = ioctl(sd, SIOCSIFFLAGS, &network);
1628
perror_plus("ioctl SIOCSIFFLAGS +IFF_UP");
1630
if(restore_loglevel){
1631
ret = klogctl(7, NULL, 0);
1633
perror_plus("klogctl");
1636
#endif /* __linux__ */
1637
/* Lower privileges */
1642
/* Sleep checking until interface is running.
1643
Check every 0.25s, up to total time of delay */
1644
for(int i=0; i < delay * 4; i++){
1645
ret = ioctl(sd, SIOCGIFFLAGS, &network);
1647
perror_plus("ioctl SIOCGIFFLAGS");
1648
} else if(network.ifr_flags & IFF_RUNNING){
1651
struct timespec sleeptime = { .tv_nsec = 250000000 };
1652
ret = nanosleep(&sleeptime, NULL);
1653
if(ret == -1 and errno != EINTR){
1654
perror_plus("nanosleep");
1657
/* Close the socket */
1658
ret = (int)TEMP_FAILURE_RETRY(close(sd));
1660
perror_plus("close");
1663
if(restore_loglevel){
1664
/* Restores kernel loglevel to default */
1665
ret = klogctl(7, NULL, 0);
1667
perror_plus("klogctl");
1670
#endif /* __linux__ */
1671
/* Lower privileges */
1676
1514
int main(int argc, char *argv[]){
1677
1515
AvahiSServiceBrowser *sb = NULL;
2042
1886
/* If the interface is down, bring it up */
2043
if((interface[0] != '\0') and (strcmp(interface, "none") != 0)){
2044
ret = bring_up_interface(interface, delay);
2047
perror_plus("Failed to bring up interface");
1887
if(strcmp(interface, "none") != 0){
1888
if_index = (AvahiIfIndex) if_nametoindex(interface);
1890
fprintf_plus(stderr, "No such interface: \"%s\"\n", interface);
1891
exitcode = EX_UNAVAILABLE;
1899
/* Re-raise priviliges */
1903
perror_plus("seteuid");
1907
/* Lower kernel loglevel to KERN_NOTICE to avoid KERN_INFO
1908
messages about the network interface to mess up the prompt */
1909
ret = klogctl(8, NULL, 5);
1910
bool restore_loglevel = true;
1912
restore_loglevel = false;
1913
perror_plus("klogctl");
1915
#endif /* __linux__ */
1917
sd = socket(PF_INET6, SOCK_DGRAM, IPPROTO_IP);
1919
perror_plus("socket");
1920
exitcode = EX_OSERR;
1922
if(restore_loglevel){
1923
ret = klogctl(7, NULL, 0);
1925
perror_plus("klogctl");
1928
#endif /* __linux__ */
1929
/* Lower privileges */
1933
perror_plus("seteuid");
1937
strcpy(network.ifr_name, interface);
1938
ret = ioctl(sd, SIOCGIFFLAGS, &network);
1940
perror_plus("ioctl SIOCGIFFLAGS");
1942
if(restore_loglevel){
1943
ret = klogctl(7, NULL, 0);
1945
perror_plus("klogctl");
1948
#endif /* __linux__ */
1949
exitcode = EX_OSERR;
1950
/* Lower privileges */
1954
perror_plus("seteuid");
1958
if((network.ifr_flags & IFF_UP) == 0){
1959
network.ifr_flags |= IFF_UP;
1960
take_down_interface = true;
1961
ret = ioctl(sd, SIOCSIFFLAGS, &network);
1963
take_down_interface = false;
1964
perror_plus("ioctl SIOCSIFFLAGS +IFF_UP");
1965
exitcode = EX_OSERR;
1967
if(restore_loglevel){
1968
ret = klogctl(7, NULL, 0);
1970
perror_plus("klogctl");
1973
#endif /* __linux__ */
1974
/* Lower privileges */
1978
perror_plus("seteuid");
1983
/* Sleep checking until interface is running.
1984
Check every 0.25s, up to total time of delay */
1985
for(int i=0; i < delay * 4; i++){
1986
ret = ioctl(sd, SIOCGIFFLAGS, &network);
1988
perror_plus("ioctl SIOCGIFFLAGS");
1989
} else if(network.ifr_flags & IFF_RUNNING){
1992
struct timespec sleeptime = { .tv_nsec = 250000000 };
1993
ret = nanosleep(&sleeptime, NULL);
1994
if(ret == -1 and errno != EINTR){
1995
perror_plus("nanosleep");
1998
if(not take_down_interface){
1999
/* We won't need the socket anymore */
2000
ret = (int)TEMP_FAILURE_RETRY(close(sd));
2002
perror_plus("close");
2006
if(restore_loglevel){
2007
/* Restores kernel loglevel to default */
2008
ret = klogctl(7, NULL, 0);
2010
perror_plus("klogctl");
2013
#endif /* __linux__ */
2014
/* Lower privileges */
2016
/* Lower privileges */
2019
perror_plus("seteuid");