554
536
/* GnuTLS server initialization */
555
ret = gnutls_dh_params_init(&mc->dh_params);
537
ret = gnutls_dh_params_init(&mc.dh_params);
556
538
if(ret != GNUTLS_E_SUCCESS){
557
539
fprintf_plus(stderr, "Error in GnuTLS DH parameter"
558
540
" initialization: %s\n",
559
541
safer_gnutls_strerror(ret));
562
ret = gnutls_dh_params_generate2(mc->dh_params, mc->dh_bits);
544
ret = gnutls_dh_params_generate2(mc.dh_params, mc.dh_bits);
563
545
if(ret != GNUTLS_E_SUCCESS){
564
546
fprintf_plus(stderr, "Error in GnuTLS prime generation: %s\n",
565
547
safer_gnutls_strerror(ret));
569
gnutls_certificate_set_dh_params(mc->cred, mc->dh_params);
551
gnutls_certificate_set_dh_params(mc.cred, mc.dh_params);
575
gnutls_certificate_free_credentials(mc->cred);
557
gnutls_certificate_free_credentials(mc.cred);
576
558
gnutls_global_deinit();
577
gnutls_dh_params_deinit(mc->dh_params);
559
gnutls_dh_params_deinit(mc.dh_params);
581
__attribute__((nonnull, warn_unused_result))
582
static int init_gnutls_session(gnutls_session_t *session,
563
static int init_gnutls_session(gnutls_session_t *session){
585
565
/* GnuTLS session creation */
790
743
char addrstr[(INET_ADDRSTRLEN > INET6_ADDRSTRLEN) ?
791
744
INET_ADDRSTRLEN : INET6_ADDRSTRLEN] = "";
792
746
if(af == AF_INET6){
793
ret = getnameinfo((struct sockaddr *)&to,
794
sizeof(struct sockaddr_in6),
795
addrstr, sizeof(addrstr), NULL, 0,
747
pcret = inet_ntop(af, &(to.in6.sin6_addr), addrstr,
798
ret = getnameinfo((struct sockaddr *)&to,
799
sizeof(struct sockaddr_in),
800
addrstr, sizeof(addrstr), NULL, 0,
750
pcret = inet_ntop(af, &(to.in.sin_addr), addrstr,
803
if(ret == EAI_SYSTEM){
804
perror_plus("getnameinfo");
805
} else if(ret != 0) {
806
fprintf_plus(stderr, "getnameinfo: %s", gai_strerror(ret));
807
} else if(strcmp(addrstr, ip) != 0){
808
fprintf_plus(stderr, "Canonical address form: %s\n", addrstr);
754
perror_plus("inet_ntop");
756
if(strcmp(addrstr, ip) != 0){
757
fprintf_plus(stderr, "Canonical address form: %s\n", addrstr);
1507
1442
return ret_errno;
1512
* Based on the example in the GNU LibC manual chapter 13.13 "File
1513
* Descriptor Flags".
1514
| [[info:libc:Descriptor%20Flags][File Descriptor Flags]] |
1516
__attribute__((warn_unused_result))
1517
static int set_cloexec_flag(int fd){
1518
int ret = (int)TEMP_FAILURE_RETRY(fcntl(fd, F_GETFD, 0));
1519
/* If reading the flags failed, return error indication now. */
1523
/* Store modified flag word in the descriptor. */
1524
return (int)TEMP_FAILURE_RETRY(fcntl(fd, F_SETFD,
1527
#endif /* not O_CLOEXEC */
1529
__attribute__((nonnull))
1530
void run_network_hooks(const char *mode, const char *interface,
1445
bool run_network_hooks(const char *mode, const char *interface,
1531
1446
const float delay){
1532
1447
struct dirent **direntries;
1533
if(hookdir_fd == -1){
1534
hookdir_fd = open(hookdir, O_RDONLY |
1537
#else /* not O_CLOEXEC */
1539
#endif /* not O_CLOEXEC */
1541
if(hookdir_fd == -1){
1542
if(errno == ENOENT){
1544
fprintf_plus(stderr, "Network hook directory \"%s\" not"
1545
" found\n", hookdir);
1548
perror_plus("open");
1553
if(set_cloexec_flag(hookdir_fd) < 0){
1554
perror_plus("set_cloexec_flag");
1555
if((int)TEMP_FAILURE_RETRY(close(hookdir_fd)) == -1){
1556
perror_plus("close");
1562
#endif /* not O_CLOEXEC */
1565
#if __GLIBC_PREREQ(2, 15)
1566
int numhooks = scandirat(hookdir_fd, ".", &direntries,
1567
runnable_hook, alphasort);
1568
#else /* not __GLIBC_PREREQ(2, 15) */
1569
int numhooks = scandir(hookdir, &direntries, runnable_hook,
1571
#endif /* not __GLIBC_PREREQ(2, 15) */
1572
#else /* not __GLIBC__ */
1573
int numhooks = scandir(hookdir, &direntries, runnable_hook,
1575
#endif /* not __GLIBC__ */
1448
struct dirent *direntry;
1450
int numhooks = scandir(hookdir, &direntries, runnable_hook,
1576
1452
if(numhooks == -1){
1577
perror_plus("scandir");
1580
struct dirent *direntry;
1582
int devnull = open("/dev/null", O_RDONLY);
1583
for(int i = 0; i < numhooks; i++){
1584
direntry = direntries[i];
1586
fprintf_plus(stderr, "Running network hook \"%s\"\n",
1453
if(errno == ENOENT){
1455
fprintf_plus(stderr, "Network hook directory \"%s\" not"
1456
" found\n", hookdir);
1459
perror_plus("scandir");
1589
pid_t hook_pid = fork();
1592
/* Raise privileges */
1593
if(raise_privileges_permanently() != 0){
1594
perror_plus("Failed to raise privileges");
1601
perror_plus("setgid");
1604
/* Reset supplementary groups */
1606
ret = setgroups(0, NULL);
1608
perror_plus("setgroups");
1611
ret = dup2(devnull, STDIN_FILENO);
1613
perror_plus("dup2(devnull, STDIN_FILENO)");
1616
ret = close(devnull);
1618
perror_plus("close");
1621
ret = dup2(STDERR_FILENO, STDOUT_FILENO);
1623
perror_plus("dup2(STDERR_FILENO, STDOUT_FILENO)");
1626
ret = setenv("MANDOSNETHOOKDIR", hookdir, 1);
1628
perror_plus("setenv");
1631
ret = setenv("DEVICE", interface, 1);
1633
perror_plus("setenv");
1636
ret = setenv("VERBOSITY", debug ? "1" : "0", 1);
1638
perror_plus("setenv");
1641
ret = setenv("MODE", mode, 1);
1643
perror_plus("setenv");
1647
ret = asprintf(&delaystring, "%f", (double)delay);
1462
int devnull = open("/dev/null", O_RDONLY);
1463
for(int i = 0; i < numhooks; i++){
1464
direntry = direntries[i];
1465
char *fullname = NULL;
1466
ret = asprintf(&fullname, "%s/%s", hookdir, direntry->d_name);
1649
1468
perror_plus("asprintf");
1652
ret = setenv("DELAY", delaystring, 1);
1472
fprintf_plus(stderr, "Running network hook \"%s\"\n",
1475
pid_t hook_pid = fork();
1478
/* Raise privileges */
1479
raise_privileges_permanently();
1484
perror_plus("setgid");
1486
/* Reset supplementary groups */
1488
ret = setgroups(0, NULL);
1490
perror_plus("setgroups");
1492
dup2(devnull, STDIN_FILENO);
1494
dup2(STDERR_FILENO, STDOUT_FILENO);
1495
ret = setenv("MANDOSNETHOOKDIR", hookdir, 1);
1497
perror_plus("setenv");
1500
ret = setenv("DEVICE", interface, 1);
1502
perror_plus("setenv");
1505
ret = setenv("VERBOSITY", debug ? "1" : "0", 1);
1507
perror_plus("setenv");
1510
ret = setenv("MODE", mode, 1);
1512
perror_plus("setenv");
1516
ret = asprintf(&delaystring, "%f", delay);
1518
perror_plus("asprintf");
1521
ret = setenv("DELAY", delaystring, 1);
1524
perror_plus("setenv");
1654
1527
free(delaystring);
1655
perror_plus("setenv");
1659
if(connect_to != NULL){
1660
ret = setenv("CONNECT", connect_to, 1);
1662
perror_plus("setenv");
1666
if(fexecve(hookdir_fd, (char *const [])
1667
{ direntry->d_name, NULL }, environ) == -1){
1668
perror_plus("fexecve");
1669
_exit(EXIT_FAILURE);
1673
if(TEMP_FAILURE_RETRY(waitpid(hook_pid, &status, 0)) == -1){
1674
perror_plus("waitpid");
1677
if(WIFEXITED(status)){
1678
if(WEXITSTATUS(status) != 0){
1679
fprintf_plus(stderr, "Warning: network hook \"%s\" exited"
1680
" with status %d\n", direntry->d_name,
1681
WEXITSTATUS(status));
1684
} else if(WIFSIGNALED(status)){
1685
fprintf_plus(stderr, "Warning: network hook \"%s\" died by"
1686
" signal %d\n", direntry->d_name,
1528
if(connect_to != NULL){
1529
ret = setenv("CONNECT", connect_to, 1);
1531
perror_plus("setenv");
1535
if(execl(fullname, direntry->d_name, mode, NULL) == -1){
1536
perror_plus("execl");
1537
_exit(EXIT_FAILURE);
1690
fprintf_plus(stderr, "Warning: network hook \"%s\""
1691
" crashed\n", direntry->d_name);
1696
fprintf_plus(stderr, "Network hook \"%s\" ran successfully\n",
1700
if((int)TEMP_FAILURE_RETRY(close(hookdir_fd)) == -1){
1701
perror_plus("close");
1541
if(TEMP_FAILURE_RETRY(waitpid(hook_pid, &status, 0)) == -1){
1542
perror_plus("waitpid");
1546
if(WIFEXITED(status)){
1547
if(WEXITSTATUS(status) != 0){
1548
fprintf_plus(stderr, "Warning: network hook \"%s\" exited"
1549
" with status %d\n", direntry->d_name,
1550
WEXITSTATUS(status));
1554
} else if(WIFSIGNALED(status)){
1555
fprintf_plus(stderr, "Warning: network hook \"%s\" died by"
1556
" signal %d\n", direntry->d_name,
1561
fprintf_plus(stderr, "Warning: network hook \"%s\""
1562
" crashed\n", direntry->d_name);
1569
fprintf_plus(stderr, "Network hook \"%s\" ran successfully\n",
1708
__attribute__((nonnull, warn_unused_result))
1709
1578
error_t bring_up_interface(const char *const interface,
1710
1579
const float delay){
1711
1581
error_t old_errno = errno;
1582
error_t ret_errno = 0;
1583
int ret, ret_setflags;
1713
1584
struct ifreq network;
1714
1585
unsigned int if_index = if_nametoindex(interface);
1715
1586
if(if_index == 0){
2311
/* Bring up interfaces which are down, and remove any "none"s */
2150
/* If we only got one interface, explicitly use only that one */
2151
if(argz_count(interfaces, interfaces_size) == 1){
2153
fprintf_plus(stderr, "Using only interface \"%s\"\n",
2156
if_index = (AvahiIfIndex)if_nametoindex(interfaces);
2159
/* Bring up interfaces which are down */
2160
if(not (argz_count(interfaces, interfaces_size) == 1
2161
and strcmp(interfaces, "none") == 0)){
2313
2162
char *interface = NULL;
2314
while((interface = argz_next(mc.interfaces, mc.interfaces_size,
2163
while((interface = argz_next(interfaces, interfaces_size,
2316
/* If interface name is "none", stop bringing up interfaces.
2317
Also remove all instances of "none" from the list */
2318
if(strcmp(interface, "none") == 0){
2319
argz_delete(&mc.interfaces, &mc.interfaces_size,
2322
while((interface = argz_next(mc.interfaces,
2323
mc.interfaces_size, interface))){
2324
if(strcmp(interface, "none") == 0){
2325
argz_delete(&mc.interfaces, &mc.interfaces_size,
2332
2165
bool interface_was_up = interface_is_up(interface);
2333
errno = bring_up_interface(interface, delay);
2166
ret = bring_up_interface(interface, delay);
2334
2167
if(not interface_was_up){
2336
2170
perror_plus("Failed to bring up interface");
2338
errno = argz_add(&interfaces_to_take_down,
2339
&interfaces_to_take_down_size,
2342
perror_plus("argz_add");
2172
ret_errno = argz_add(&interfaces_to_take_down,
2173
&interfaces_to_take_down_size,
2180
interfaces_size = 0;
2347
2181
if(debug and (interfaces_to_take_down == NULL)){
2348
2182
fprintf_plus(stderr, "No interfaces were brought up\n");
2352
/* If we only got one interface, explicitly use only that one */
2353
if(argz_count(mc.interfaces, mc.interfaces_size) == 1){
2355
fprintf_plus(stderr, "Using only interface \"%s\"\n",
2358
if_index = (AvahiIfIndex)if_nametoindex(mc.interfaces);
2365
ret = init_gnutls_global(pubkey, seckey, &mc);
2190
ret = init_gnutls_global(pubkey, seckey);
2367
2192
fprintf_plus(stderr, "init_gnutls_global failed\n");
2368
2193
exitcode = EX_UNAVAILABLE;
2579
/* Re-raise privileges */
2393
/* Re-raise priviliges */
2581
ret_errno = raise_privileges();
2583
perror_plus("Failed to raise privileges");
2586
/* Run network hooks */
2587
run_network_hooks("stop", interfaces_hooks != NULL ?
2588
interfaces_hooks : "", delay);
2590
/* Take down the network interfaces which were brought up */
2592
char *interface = NULL;
2593
while((interface=argz_next(interfaces_to_take_down,
2594
interfaces_to_take_down_size,
2596
ret_errno = take_down_interface(interface);
2599
perror_plus("Failed to take down interface");
2602
if(debug and (interfaces_to_take_down == NULL)){
2603
fprintf_plus(stderr, "No interfaces needed to be taken"
2609
ret_errno = lower_privileges_permanently();
2611
perror_plus("Failed to lower privileges permanently");
2397
/* Run network hooks */
2398
run_network_hooks("stop", interfaces_hooks != NULL ?
2399
interfaces_hooks : "", delay);
2401
/* Take down the network interfaces which were brought up */
2403
char *interface = NULL;
2404
while((interface=argz_next(interfaces_to_take_down,
2405
interfaces_to_take_down_size,
2407
ret_errno = take_down_interface(interface);
2410
perror_plus("Failed to take down interface");
2413
if(debug and (interfaces_to_take_down == NULL)){
2414
fprintf_plus(stderr, "No interfaces needed to be taken"
2419
lower_privileges_permanently();
2615
2422
free(interfaces_to_take_down);
2616
2423
free(interfaces_hooks);
2618
2425
/* Removes the GPGME temp directory and all files inside */
2619
if(tempdir != NULL){
2426
if(tempdir_created){
2620
2427
struct dirent **direntries = NULL;
2621
int tempdir_fd = (int)TEMP_FAILURE_RETRY(open(tempdir, O_RDONLY));
2622
if(tempdir_fd == -1){
2623
perror_plus("open");
2626
#if __GLIBC_PREREQ(2, 15)
2627
int numentries = scandirat(tempdir_fd, ".", &direntries,
2628
notdotentries, alphasort);
2629
#else /* not __GLIBC_PREREQ(2, 15) */
2630
int numentries = scandir(tempdir, &direntries, notdotentries,
2632
#endif /* not __GLIBC_PREREQ(2, 15) */
2633
#else /* not __GLIBC__ */
2634
int numentries = scandir(tempdir, &direntries, notdotentries,
2636
#endif /* not __GLIBC__ */
2638
for(int i = 0; i < numentries; i++){
2639
ret = unlinkat(tempdir_fd, direntries[i]->d_name, 0);
2641
fprintf_plus(stderr, "unlinkat(open(\"%s\", O_RDONLY),"
2642
" \"%s\", 0): %s\n", tempdir,
2643
direntries[i]->d_name, strerror(errno));
2647
/* need to clean even if 0 because man page doesn't specify */
2649
if(numentries == -1){
2650
perror_plus("scandir");
2652
ret = rmdir(tempdir);
2653
if(ret == -1 and errno != ENOENT){
2654
perror_plus("rmdir");
2428
struct dirent *direntry = NULL;
2429
int numentries = scandir(tempdir, &direntries, notdotentries,
2431
if (numentries > 0){
2432
for(int i = 0; i < numentries; i++){
2433
direntry = direntries[i];
2434
char *fullname = NULL;
2435
ret = asprintf(&fullname, "%s/%s", tempdir,
2438
perror_plus("asprintf");
2441
ret = remove(fullname);
2443
fprintf_plus(stderr, "remove(\"%s\"): %s\n", fullname,
2657
TEMP_FAILURE_RETRY(close(tempdir_fd));
2450
/* need to clean even if 0 because man page doesn't specify */
2452
if (numentries == -1){
2453
perror_plus("scandir");
2455
ret = rmdir(tempdir);
2456
if(ret == -1 and errno != ENOENT){
2457
perror_plus("rmdir");