236
222
perror_plus("strdup");
239
ret = clock_gettime(CLOCK_MONOTONIC, &(new_server->last_seen));
241
perror_plus("clock_gettime");
244
225
/* Special case of first server */
245
226
if(*current_server == NULL){
246
227
new_server->next = new_server;
247
228
new_server->prev = new_server;
248
229
*current_server = new_server;
230
/* Place the new server last in the list */
250
/* Place the new server last in the list */
251
232
new_server->next = *current_server;
252
233
new_server->prev = (*current_server)->prev;
253
234
new_server->prev->next = new_server;
254
235
(*current_server)->prev = new_server;
237
ret = clock_gettime(CLOCK_MONOTONIC, &(*current_server)->last_seen);
239
perror_plus("clock_gettime");
260
246
* Initialize GPGME.
262
__attribute__((nonnull, warn_unused_result))
263
static bool init_gpgme(const char * const seckey,
264
const char * const pubkey,
265
const char * const tempdir,
248
static bool init_gpgme(const char *seckey, const char *pubkey,
249
const char *tempdir, mandos_context *mc){
267
250
gpgme_error_t rc;
268
251
gpgme_engine_info_t engine_info;
271
254
* Helper function to insert pub and seckey to the engine keyring.
273
bool import_key(const char * const filename){
256
bool import_key(const char *filename){
276
259
gpgme_data_t pgp_data;
790
741
char addrstr[(INET_ADDRSTRLEN > INET6_ADDRSTRLEN) ?
791
742
INET_ADDRSTRLEN : INET6_ADDRSTRLEN] = "";
792
744
if(af == AF_INET6){
793
ret = getnameinfo((struct sockaddr *)&to,
794
sizeof(struct sockaddr_in6),
795
addrstr, sizeof(addrstr), NULL, 0,
745
pcret = inet_ntop(af, &(to.in6.sin6_addr), addrstr,
798
ret = getnameinfo((struct sockaddr *)&to,
799
sizeof(struct sockaddr_in),
800
addrstr, sizeof(addrstr), NULL, 0,
748
pcret = inet_ntop(af, &(to.in.sin_addr), addrstr,
803
if(ret == EAI_SYSTEM){
804
perror_plus("getnameinfo");
805
} else if(ret != 0) {
806
fprintf_plus(stderr, "getnameinfo: %s", gai_strerror(ret));
807
} else if(strcmp(addrstr, ip) != 0){
808
fprintf_plus(stderr, "Canonical address form: %s\n", addrstr);
752
perror_plus("inet_ntop");
754
if(strcmp(addrstr, ip) != 0){
755
fprintf_plus(stderr, "Canonical address form: %s\n", addrstr);
1507
1447
return ret_errno;
1510
__attribute__((nonnull))
1511
void run_network_hooks(const char *mode, const char *interface,
1450
bool run_network_hooks(const char *mode, const char *interface,
1512
1451
const float delay){
1513
1452
struct dirent **direntries;
1514
if(hookdir_fd == -1){
1515
hookdir_fd = open(hookdir, O_RDONLY);
1516
if(hookdir_fd == -1){
1517
if(errno == ENOENT){
1519
fprintf_plus(stderr, "Network hook directory \"%s\" not"
1520
" found\n", hookdir);
1523
perror_plus("open");
1529
#if __GLIBC_PREREQ(2, 15)
1530
int numhooks = scandirat(hookdir_fd, ".", &direntries,
1531
runnable_hook, alphasort);
1532
#else /* not __GLIBC_PREREQ(2, 15) */
1533
int numhooks = scandir(hookdir, &direntries, runnable_hook,
1535
#endif /* not __GLIBC_PREREQ(2, 15) */
1536
#else /* not __GLIBC__ */
1537
int numhooks = scandir(hookdir, &direntries, runnable_hook,
1539
#endif /* not __GLIBC__ */
1453
struct dirent *direntry;
1455
int numhooks = scandir(hookdir, &direntries, runnable_hook,
1540
1457
if(numhooks == -1){
1541
perror_plus("scandir");
1544
struct dirent *direntry;
1546
int devnull = open("/dev/null", O_RDONLY);
1547
for(int i = 0; i < numhooks; i++){
1548
direntry = direntries[i];
1550
fprintf_plus(stderr, "Running network hook \"%s\"\n",
1458
if(errno == ENOENT){
1460
fprintf_plus(stderr, "Network hook directory \"%s\" not"
1461
" found\n", hookdir);
1464
perror_plus("scandir");
1553
pid_t hook_pid = fork();
1556
/* Raise privileges */
1557
if(raise_privileges_permanently() != 0){
1558
perror_plus("Failed to raise privileges");
1565
perror_plus("setgid");
1568
/* Reset supplementary groups */
1570
ret = setgroups(0, NULL);
1572
perror_plus("setgroups");
1575
ret = dup2(devnull, STDIN_FILENO);
1577
perror_plus("dup2(devnull, STDIN_FILENO)");
1580
ret = close(devnull);
1582
perror_plus("close");
1585
ret = dup2(STDERR_FILENO, STDOUT_FILENO);
1587
perror_plus("dup2(STDERR_FILENO, STDOUT_FILENO)");
1590
ret = setenv("MANDOSNETHOOKDIR", hookdir, 1);
1592
perror_plus("setenv");
1595
ret = setenv("DEVICE", interface, 1);
1597
perror_plus("setenv");
1600
ret = setenv("VERBOSITY", debug ? "1" : "0", 1);
1602
perror_plus("setenv");
1605
ret = setenv("MODE", mode, 1);
1607
perror_plus("setenv");
1611
ret = asprintf(&delaystring, "%f", (double)delay);
1467
int devnull = open("/dev/null", O_RDONLY);
1468
for(int i = 0; i < numhooks; i++){
1469
direntry = direntries[i];
1470
char *fullname = NULL;
1471
ret = asprintf(&fullname, "%s/%s", hookdir, direntry->d_name);
1613
1473
perror_plus("asprintf");
1616
ret = setenv("DELAY", delaystring, 1);
1477
fprintf_plus(stderr, "Running network hook \"%s\"\n",
1480
pid_t hook_pid = fork();
1483
/* Raise privileges */
1484
raise_privileges_permanently();
1489
perror_plus("setgid");
1491
/* Reset supplementary groups */
1493
ret = setgroups(0, NULL);
1495
perror_plus("setgroups");
1497
dup2(devnull, STDIN_FILENO);
1499
dup2(STDERR_FILENO, STDOUT_FILENO);
1500
ret = setenv("MANDOSNETHOOKDIR", hookdir, 1);
1502
perror_plus("setenv");
1505
ret = setenv("DEVICE", interface, 1);
1507
perror_plus("setenv");
1510
ret = setenv("VERBOSITY", debug ? "1" : "0", 1);
1512
perror_plus("setenv");
1515
ret = setenv("MODE", mode, 1);
1517
perror_plus("setenv");
1521
ret = asprintf(&delaystring, "%f", delay);
1523
perror_plus("asprintf");
1526
ret = setenv("DELAY", delaystring, 1);
1529
perror_plus("setenv");
1618
1532
free(delaystring);
1619
perror_plus("setenv");
1623
if(connect_to != NULL){
1624
ret = setenv("CONNECT", connect_to, 1);
1626
perror_plus("setenv");
1630
int hook_fd = openat(hookdir_fd, direntry->d_name, O_RDONLY);
1632
perror_plus("openat");
1633
_exit(EXIT_FAILURE);
1635
if((int)TEMP_FAILURE_RETRY(close(hookdir_fd)) == -1){
1636
perror_plus("close");
1637
_exit(EXIT_FAILURE);
1639
if(fexecve(hook_fd, (char *const []){ direntry->d_name, NULL },
1641
perror_plus("fexecve");
1642
_exit(EXIT_FAILURE);
1646
if(TEMP_FAILURE_RETRY(waitpid(hook_pid, &status, 0)) == -1){
1647
perror_plus("waitpid");
1650
if(WIFEXITED(status)){
1651
if(WEXITSTATUS(status) != 0){
1652
fprintf_plus(stderr, "Warning: network hook \"%s\" exited"
1653
" with status %d\n", direntry->d_name,
1654
WEXITSTATUS(status));
1657
} else if(WIFSIGNALED(status)){
1658
fprintf_plus(stderr, "Warning: network hook \"%s\" died by"
1659
" signal %d\n", direntry->d_name,
1533
if(connect_to != NULL){
1534
ret = setenv("CONNECT", connect_to, 1);
1536
perror_plus("setenv");
1540
if(execl(fullname, direntry->d_name, mode, NULL) == -1){
1541
perror_plus("execl");
1542
_exit(EXIT_FAILURE);
1663
fprintf_plus(stderr, "Warning: network hook \"%s\""
1664
" crashed\n", direntry->d_name);
1669
fprintf_plus(stderr, "Network hook \"%s\" ran successfully\n",
1673
if((int)TEMP_FAILURE_RETRY(close(hookdir_fd)) == -1){
1674
perror_plus("close");
1546
if(TEMP_FAILURE_RETRY(waitpid(hook_pid, &status, 0)) == -1){
1547
perror_plus("waitpid");
1551
if(WIFEXITED(status)){
1552
if(WEXITSTATUS(status) != 0){
1553
fprintf_plus(stderr, "Warning: network hook \"%s\" exited"
1554
" with status %d\n", direntry->d_name,
1555
WEXITSTATUS(status));
1559
} else if(WIFSIGNALED(status)){
1560
fprintf_plus(stderr, "Warning: network hook \"%s\" died by"
1561
" signal %d\n", direntry->d_name,
1566
fprintf_plus(stderr, "Warning: network hook \"%s\""
1567
" crashed\n", direntry->d_name);
1574
fprintf_plus(stderr, "Network hook \"%s\" ran successfully\n",
1681
__attribute__((nonnull, warn_unused_result))
1682
1583
error_t bring_up_interface(const char *const interface,
1683
1584
const float delay){
1684
1586
error_t old_errno = errno;
1587
error_t ret_errno = 0;
1588
int ret, ret_setflags;
1686
1589
struct ifreq network;
1687
1590
unsigned int if_index = if_nametoindex(interface);
1688
1591
if(if_index == 0){
1881
1755
int main(int argc, char *argv[]){
1882
1756
mandos_context mc = { .server = NULL, .dh_bits = 1024,
1883
1757
.priority = "SECURE256:!CTYPE-X.509:"
1884
"+CTYPE-OPENPGP", .current_server = NULL,
1885
.interfaces = NULL, .interfaces_size = 0 };
1758
"+CTYPE-OPENPGP", .current_server = NULL };
1886
1759
AvahiSServiceBrowser *sb = NULL;
1887
1760
error_t ret_errno;
1889
1762
intmax_t tmpmax;
1891
1764
int exitcode = EXIT_SUCCESS;
1765
char *interfaces = NULL;
1766
size_t interfaces_size = 0;
1892
1767
char *interfaces_to_take_down = NULL;
1893
1768
size_t interfaces_to_take_down_size = 0;
1894
char run_tempdir[] = "/run/tmp/mandosXXXXXX";
1895
char old_tempdir[] = "/tmp/mandosXXXXXX";
1896
char *tempdir = NULL;
1769
char tempdir[] = "/tmp/mandosXXXXXX";
1770
bool tempdir_created = false;
1897
1771
AvahiIfIndex if_index = AVAHI_IF_UNSPEC;
1898
1772
const char *seckey = PATHDIR "/" SECKEY;
1899
1773
const char *pubkey = PATHDIR "/" PUBKEY;
1900
1774
char *interfaces_hooks = NULL;
1775
size_t interfaces_hooks_size = 0;
1902
1777
bool gnutls_initialized = false;
1903
1778
bool gpgme_initialized = false;
2284
/* Bring up interfaces which are down, and remove any "none"s */
2158
/* If we only got one interface, explicitly use only that one */
2159
if(argz_count(interfaces, interfaces_size) == 1){
2161
fprintf_plus(stderr, "Using only interface \"%s\"\n",
2164
if_index = (AvahiIfIndex)if_nametoindex(interfaces);
2167
/* Bring up interfaces which are down */
2168
if(not (argz_count(interfaces, interfaces_size) == 1
2169
and strcmp(interfaces, "none") == 0)){
2286
2170
char *interface = NULL;
2287
while((interface = argz_next(mc.interfaces, mc.interfaces_size,
2171
while((interface = argz_next(interfaces, interfaces_size,
2289
/* If interface name is "none", stop bringing up interfaces.
2290
Also remove all instances of "none" from the list */
2291
if(strcmp(interface, "none") == 0){
2292
argz_delete(&mc.interfaces, &mc.interfaces_size,
2295
while((interface = argz_next(mc.interfaces,
2296
mc.interfaces_size, interface))){
2297
if(strcmp(interface, "none") == 0){
2298
argz_delete(&mc.interfaces, &mc.interfaces_size,
2305
2173
bool interface_was_up = interface_is_up(interface);
2306
errno = bring_up_interface(interface, delay);
2174
ret = bring_up_interface(interface, delay);
2307
2175
if(not interface_was_up){
2309
2178
perror_plus("Failed to bring up interface");
2311
errno = argz_add(&interfaces_to_take_down,
2312
&interfaces_to_take_down_size,
2315
perror_plus("argz_add");
2180
ret_errno = argz_add(&interfaces_to_take_down,
2181
&interfaces_to_take_down_size,
2188
interfaces_size = 0;
2320
2189
if(debug and (interfaces_to_take_down == NULL)){
2321
2190
fprintf_plus(stderr, "No interfaces were brought up\n");
2325
/* If we only got one interface, explicitly use only that one */
2326
if(argz_count(mc.interfaces, mc.interfaces_size) == 1){
2328
fprintf_plus(stderr, "Using only interface \"%s\"\n",
2331
if_index = (AvahiIfIndex)if_nametoindex(mc.interfaces);
2552
/* Re-raise privileges */
2402
/* Re-raise priviliges */
2554
ret_errno = raise_privileges();
2556
perror_plus("Failed to raise privileges");
2559
/* Run network hooks */
2560
run_network_hooks("stop", interfaces_hooks != NULL ?
2561
interfaces_hooks : "", delay);
2563
/* Take down the network interfaces which were brought up */
2565
char *interface = NULL;
2566
while((interface=argz_next(interfaces_to_take_down,
2567
interfaces_to_take_down_size,
2569
ret_errno = take_down_interface(interface);
2572
perror_plus("Failed to take down interface");
2575
if(debug and (interfaces_to_take_down == NULL)){
2576
fprintf_plus(stderr, "No interfaces needed to be taken"
2582
ret_errno = lower_privileges_permanently();
2584
perror_plus("Failed to lower privileges permanently");
2406
/* Run network hooks */
2407
run_network_hooks("stop", interfaces_hooks != NULL ?
2408
interfaces_hooks : "", delay);
2410
/* Take down the network interfaces which were brought up */
2412
char *interface = NULL;
2413
while((interface=argz_next(interfaces_to_take_down,
2414
interfaces_to_take_down_size,
2416
ret_errno = take_down_interface(interface);
2419
perror_plus("Failed to take down interface");
2422
if(debug and (interfaces_to_take_down == NULL)){
2423
fprintf_plus(stderr, "No interfaces needed to be taken"
2428
lower_privileges_permanently();
2588
2431
free(interfaces_to_take_down);
2589
2432
free(interfaces_hooks);
2591
2434
/* Removes the GPGME temp directory and all files inside */
2592
if(tempdir != NULL){
2435
if(tempdir_created){
2593
2436
struct dirent **direntries = NULL;
2594
int tempdir_fd = (int)TEMP_FAILURE_RETRY(open(tempdir, O_RDONLY));
2595
if(tempdir_fd == -1){
2596
perror_plus("open");
2599
#if __GLIBC_PREREQ(2, 15)
2600
int numentries = scandirat(tempdir_fd, ".", &direntries,
2601
notdotentries, alphasort);
2602
#else /* not __GLIBC_PREREQ(2, 15) */
2603
int numentries = scandir(tempdir, &direntries, notdotentries,
2605
#endif /* not __GLIBC_PREREQ(2, 15) */
2606
#else /* not __GLIBC__ */
2607
int numentries = scandir(tempdir, &direntries, notdotentries,
2609
#endif /* not __GLIBC__ */
2611
for(int i = 0; i < numentries; i++){
2612
ret = unlinkat(tempdir_fd, direntries[i]->d_name, 0);
2614
fprintf_plus(stderr, "unlinkat(open(\"%s\", O_RDONLY),"
2615
" \"%s\", 0): %s\n", tempdir,
2616
direntries[i]->d_name, strerror(errno));
2620
/* need to clean even if 0 because man page doesn't specify */
2622
if(numentries == -1){
2623
perror_plus("scandir");
2625
ret = rmdir(tempdir);
2626
if(ret == -1 and errno != ENOENT){
2627
perror_plus("rmdir");
2437
struct dirent *direntry = NULL;
2438
int numentries = scandir(tempdir, &direntries, notdotentries,
2440
if (numentries > 0){
2441
for(int i = 0; i < numentries; i++){
2442
direntry = direntries[i];
2443
char *fullname = NULL;
2444
ret = asprintf(&fullname, "%s/%s", tempdir,
2447
perror_plus("asprintf");
2450
ret = remove(fullname);
2452
fprintf_plus(stderr, "remove(\"%s\"): %s\n", fullname,
2630
TEMP_FAILURE_RETRY(close(tempdir_fd));
2459
/* need to clean even if 0 because man page doesn't specify */
2461
if (numentries == -1){
2462
perror_plus("scandir");
2464
ret = rmdir(tempdir);
2465
if(ret == -1 and errno != ENOENT){
2466
perror_plus("rmdir");